From owner-cvs-all Wed Sep 20 14:19:25 2000 Delivered-To: cvs-all@freebsd.org Received: from freefall.freebsd.org (freefall.FreeBSD.org [216.136.204.21]) by hub.freebsd.org (Postfix) with ESMTP id DFA5737B424; Wed, 20 Sep 2000 14:19:22 -0700 (PDT) Received: (from ps@localhost) by freefall.freebsd.org (8.9.3/8.9.2) id OAA43896; Wed, 20 Sep 2000 14:19:22 -0700 (PDT) (envelope-from ps@FreeBSD.org) Message-Id: <200009202119.OAA43896@freefall.freebsd.org> From: Paul Saab Date: Wed, 20 Sep 2000 14:19:22 -0700 (PDT) To: cvs-committers@FreeBSD.org, cvs-all@FreeBSD.org Subject: cvs commit: src/sys/kern uipc_accf.c src/sys/netinet accf_http.c src/sys/sys socketvar.h X-FreeBSD-CVS-Branch: RELENG_4 Sender: owner-cvs-all@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG ps 2000/09/20 14:19:22 PDT Modified files: (Branch: RELENG_4) sys/kern uipc_accf.c sys/netinet accf_http.c sys/sys socketvar.h Log: MFC: A near complete re-write of the accf_http filter: 1) Parse check if the request is HTTP/1.0 or HTTP/1.1 if not dump to the application. Because of the performance implications of this there is a sysctl 'net.inet.accf.http.parsehttpversion' that when set to non-zero parses the HTTP version. The default is to parse the version. 2) Check if a socket has filled and dump to the listener 3) optimize the way that mbuf boundries are handled using some voodoo 4) even though you'd expect accept filters to only be used on TCP connections that don't use m_nextpkt I've fixed the accept filter for socket connections that use this. Revision Changes Path 1.2.2.2 +17 -8 src/sys/kern/uipc_accf.c 1.1.2.2 +258 -82 src/sys/netinet/accf_http.c 1.46.2.3 +3 -2 src/sys/sys/socketvar.h To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe cvs-all" in the body of the message