From owner-p4-projects@FreeBSD.ORG Tue Jun 21 07:25:30 2011 Return-Path: Delivered-To: p4-projects@freebsd.org Received: by hub.freebsd.org (Postfix, from userid 32767) id 0CDE8106576D; Tue, 21 Jun 2011 07:25:30 +0000 (UTC) Delivered-To: perforce@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 9DE35106566B for ; Tue, 21 Jun 2011 07:25:29 +0000 (UTC) (envelope-from cnicutar@freebsd.org) Received: from skunkworks.freebsd.org (skunkworks.freebsd.org [IPv6:2001:4f8:fff6::2d]) by mx1.freebsd.org (Postfix) with ESMTP id 838F68FC19 for ; Tue, 21 Jun 2011 07:25:29 +0000 (UTC) Received: from skunkworks.freebsd.org (localhost [127.0.0.1]) by skunkworks.freebsd.org (8.14.4/8.14.4) with ESMTP id p5L7PTAa027198 for ; Tue, 21 Jun 2011 07:25:29 GMT (envelope-from cnicutar@freebsd.org) Received: (from perforce@localhost) by skunkworks.freebsd.org (8.14.4/8.14.4/Submit) id p5L7PTgY027195 for perforce@freebsd.org; Tue, 21 Jun 2011 07:25:29 GMT (envelope-from cnicutar@freebsd.org) Date: Tue, 21 Jun 2011 07:25:29 GMT Message-Id: <201106210725.p5L7PTgY027195@skunkworks.freebsd.org> X-Authentication-Warning: skunkworks.freebsd.org: perforce set sender to cnicutar@freebsd.org using -f From: Catalin Nicutar To: Perforce Change Reviews Precedence: bulk Cc: Subject: PERFORCE change 195086 for review X-BeenThere: p4-projects@freebsd.org X-Mailman-Version: 2.1.5 List-Id: p4 projects tree changes List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 21 Jun 2011 07:25:30 -0000 http://p4web.freebsd.org/@@195086?ac=10 Change 195086 by cnicutar@cnicutar_cronos on 2011/06/21 07:24:52 Cleanup style (broken in previous changelist) Affected files ... .. //depot/projects/soc2011/cnicutar_tcputo_8/src/sys/netinet/tcp_output.c#3 edit .. //depot/projects/soc2011/cnicutar_tcputo_8/src/sys/netinet/tcp_usrreq.c#3 edit Differences ... ==== //depot/projects/soc2011/cnicutar_tcputo_8/src/sys/netinet/tcp_output.c#3 (text+ko) ==== @@ -1375,21 +1375,6 @@ bcopy((u_char *)&to->to_mss, optp, sizeof(to->to_mss)); optp += sizeof(to->to_mss); break; - case TOF_UTO: - while (optlen % 4) { - optlen += TCPOLEN_NOP; - *optp++ = TCPOPT_NOP; - } - if (TCP_MAXOLEN - optlen < TCPOLEN_UTO) - continue; - optlen += TCPOLEN_UTO; - *optp++ = TCPOPT_UTO; - *optp++ = TCPOLEN_UTO; - - to->to_uto = htons(to->to_uto); - bcopy((u_char *)&to->to_uto, optp, sizeof(to->to_uto)); - optp += sizeof(to->to_uto); - break; case TOF_SCALE: while (!optlen || optlen % 2 != 1) { optlen += TCPOLEN_NOP; @@ -1478,6 +1463,21 @@ TCPSTAT_INC(tcps_sack_send_blocks); break; } + case TOF_UTO: + while (optlen % 4) { + optlen += TCPOLEN_NOP; + *optp++ = TCPOPT_NOP; + } + if (TCP_MAXOLEN - optlen < TCPOLEN_UTO) + continue; + optlen += TCPOLEN_UTO; + *optp++ = TCPOPT_UTO; + *optp++ = TCPOLEN_UTO; + + to->to_uto = htons(to->to_uto); + bcopy((u_char *)&to->to_uto, optp, sizeof(to->to_uto)); + optp += sizeof(to->to_uto); + break; default: panic("%s: unknown TCP option type", __func__); break; ==== //depot/projects/soc2011/cnicutar_tcputo_8/src/sys/netinet/tcp_usrreq.c#3 (text+ko) ==== @@ -1305,22 +1305,26 @@ INP_WLOCK_RECHECK(inp); if (optval == 0) { - /* disable sending the option */ + /* Disable sending the option. */ tp->t_flags &= ~TF_SND_UTO; tp->snd_uto = 0; - } - else if (optval >= V_uto_min_timeout && - optval <= V_uto_max_timeout) { - /* acceptable timeout */ - /* - * TODO set granularity - */ + } else if (optval >= V_uto_min_timeout && + optval <= V_uto_max_timeout) { + /* The timeout is acceptable. */ + tp->snd_uto = optval; + if (tp->snd_uto > 3600) { + /* + * If the timeout is larger than 3600 + * we'll specify minutes. + * XXX-CN 3600 is arbitrary. + */ + tp->snd_uto /= 60; + tp->snd_uto |= 0x8000; + } tp->t_flags |= TF_SND_UTO; - tp->snd_uto = optval; - } - else { + } else error = EINVAL; - } + INP_WUNLOCK(inp); break; @@ -1332,13 +1336,11 @@ return (error); INP_WLOCK_RECHECK(inp); - if (optval <= 0) { - /* this connection will disregard suggestions */ + if (optval <= 0) + /* This connection will ignore suggestions. */ tp->t_flags &= ~TF_RCV_UTO; - } - else { + else tp->t_flags |= TF_RCV_UTO; - } INP_WUNLOCK(inp); break;