<feed xmlns='http://www.w3.org/2005/Atom'>
<title>src/sys/netgraph/bluetooth, branch releng/5.3</title>
<subtitle>FreeBSD source tree</subtitle>
<id>https://cgit-dev.freebsd.org/src/atom?h=releng%2F5.3</id>
<link rel='self' href='https://cgit-dev.freebsd.org/src/atom?h=releng%2F5.3'/>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/'/>
<updated>2004-10-21T09:30:48Z</updated>
<entry>
<title>Merge kern_descrip.c:1.246, uipc_socket.c:1.214, uipc_usrreq.c:1.141,</title>
<updated>2004-10-21T09:30:48Z</updated>
<author>
<name>Robert Watson</name>
<email>rwatson@FreeBSD.org</email>
</author>
<published>2004-10-21T09:30:48Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=689a28d6610af4c680f8bd5d9c5be33811a50754'/>
<id>urn:sha1:689a28d6610af4c680f8bd5d9c5be33811a50754</id>
<content type='text'>
raw_cb.c:1.30, raw_usrreq.c:1.35, ddp_pcb.c:1.45, atm_socket.c:1.21,
ng_btsocket_hci_raw.c:1.16, ng_btsocket_l2cap.c:1.14,
ng_btsocket_l2cap_raw.c:1.13, ng_btsocket_rfcomm.c:1.13, in_pcb.c:1.156,
tcp_subr.c:1.205, in6_pcb.c:1.61, ipx_pcb.c:1.29, ipx_usrreq.c:1.41,
natm.c:1.35, socketvar.h:1.135 from HEAD to RELENG_5_3:

  Push acquisition of the accept mutex out of sofree() into the caller
  (sorele()/sotryfree()):

  - This permits the caller to acquire the accept mutex before the socket
    mutex, avoiding sofree() having to drop the socket mutex and re-order,
    which could lead to races permitting more than one thread to enter
    sofree() after a socket is ready to be free'd.

  - This also covers clearing of the so_pcb weak socket reference from
    the protocol to the socket, preventing races in clearing and
    evaluation of the reference such that sofree() might be called more
    than once on the same socket.

  This appears to close a race I was able to easily trigger by repeatedly
  opening and resetting TCP connections to a host, in which the
  tcp_close() code called as a result of the RST raced with the close()
  of the accepted socket in the user process resulting in simultaneous
  attempts to de-allocate the same socket.  The new locking increases
  the overhead for operations that may potentially free the socket, so we
  will want to revise the synchronization strategy here as we normalize
  the reference counting model for sockets.  The use of the accept mutex
  in freeing of sockets that are not listen sockets is primarily
  motivated by the potential need to remove the socket from the
  incomplete connection queue on its parent (listen) socket, so cleaning
  up the reference model here may allow us to substantially weaken the
  synchronization requirements.

  RELENG_5_3 candidate.

  MFC after:      3 days
  Reviewed by:    dwhite
  Discussed with: gnn, dwhite, green
  Reported by:    Marc UBM Bocklet &lt;ubm at u-boot-man dot de&gt;
  Reported by:    Vlad &lt;marchenko at gmail dot com&gt;

Approved by:    re (scottl)
</content>
</entry>
<entry>
<title>MFC of field alignment change and a filed size change.</title>
<updated>2004-08-26T20:58:46Z</updated>
<author>
<name>Julian Elischer</name>
<email>julian@FreeBSD.org</email>
</author>
<published>2004-08-26T20:58:46Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=8e2a6e7ee69b6c2db03b195d47ec5ba7f42339ce'/>
<id>urn:sha1:8e2a6e7ee69b6c2db03b195d47ec5ba7f42339ce</id>
<content type='text'>
5.3 seems the last change to get this in before we freeze the ABI
for a while.
 MFC'd from:
&gt;  1.345     +7 -0      src/UPDATING
&gt;  1.6       +1 -6      src/sys/netgraph/bluetooth/include/ng_btsocket.h
&gt;  1.44      +1 -1      src/sys/netgraph/netgraph.h
&gt;  1.24      +5 -3      src/sys/netgraph/ng_message.h

Submitted by:	jdp, emax
Approved by:	re (scottl)
</content>
</entry>
<entry>
<title>Introduce ng_hci_inquiry_response structure and use it in the hccontrol(8)</title>
<updated>2004-08-10T00:38:50Z</updated>
<author>
<name>Maksim Yevmenkin</name>
<email>emax@FreeBSD.org</email>
</author>
<published>2004-08-10T00:38:50Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=b25877a3842d40cc3bfd27a2f64c6e19939b080f'/>
<id>urn:sha1:b25877a3842d40cc3bfd27a2f64c6e19939b080f</id>
<content type='text'>
</content>
</entry>
<entry>
<title>MFp4: Last references to dev/usb/usbdevs.h converted.</title>
<updated>2004-06-27T16:51:01Z</updated>
<author>
<name>Warner Losh</name>
<email>imp@FreeBSD.org</email>
</author>
<published>2004-06-27T16:51:01Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=107af8f9ebdd622f01c4963a24f5df9d1a2caade'/>
<id>urn:sha1:107af8f9ebdd622f01c4963a24f5df9d1a2caade</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Catch up with usbd_get_string_desc() change.</title>
<updated>2004-06-26T13:24:29Z</updated>
<author>
<name>Lukas Ertl</name>
<email>le@FreeBSD.org</email>
</author>
<published>2004-06-26T13:24:29Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=f3617a33961e8c8ee43b1cac38a0654c9302f053'/>
<id>urn:sha1:f3617a33961e8c8ee43b1cac38a0654c9302f053</id>
<content type='text'>
Spotted by:  Tai-hwa Liang &lt;avatar@mmlab.cse.yzu.edu.tw&gt;
</content>
</entry>
<entry>
<title>Fix line discipline switching issues: If opening a new ldisc fails,</title>
<updated>2004-06-26T08:44:04Z</updated>
<author>
<name>Poul-Henning Kamp</name>
<email>phk@FreeBSD.org</email>
</author>
<published>2004-06-26T08:44:04Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=4776c074260ab7883d22d32f70147c5304feba43'/>
<id>urn:sha1:4776c074260ab7883d22d32f70147c5304feba43</id>
<content type='text'>
we have to revert to TTYDISC which we know will successfully open
rather than try the previous ldisc which might also fail to open.

Do not let ldisc implementations muck about with -&gt;t_line, and remove
code which checks for reopens, it should never happen.

Move ldisc-&gt;l_hotchar to tty-&gt;t_hotchar and have ldisc implementation
initialize it in their open routines.  Reset to zero when we enter
TTYDISC.  ("no" should really be -1 since zero could be a valid
hotchar for certain old european mainframe protocols.)
</content>
</entry>
<entry>
<title>Add '#include &lt;sys/mbuf.h&gt;' to fix the kernel build.</title>
<updated>2004-06-25T23:03:33Z</updated>
<author>
<name>Maksim Yevmenkin</name>
<email>emax@FreeBSD.org</email>
</author>
<published>2004-06-25T23:03:33Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=21da5727431ba999c628a55b8299e5f3ec55d028'/>
<id>urn:sha1:21da5727431ba999c628a55b8299e5f3ec55d028</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Correct merge-o: make sure to unlock symmetrically socket buffer</title>
<updated>2004-06-18T05:09:42Z</updated>
<author>
<name>Robert Watson</name>
<email>rwatson@FreeBSD.org</email>
</author>
<published>2004-06-18T05:09:42Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=68548aa4c6fb3f51053217c682ca8e93237c4ad8'/>
<id>urn:sha1:68548aa4c6fb3f51053217c682ca8e93237c4ad8</id>
<content type='text'>
locks on bluetooth sockets when clearing upcall flags.

Submitted by:	emax
</content>
</entry>
<entry>
<title>Merge additional socket buffer locking from rwatson_netperf:</title>
<updated>2004-06-17T22:48:11Z</updated>
<author>
<name>Robert Watson</name>
<email>rwatson@FreeBSD.org</email>
</author>
<published>2004-06-17T22:48:11Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=9535efc00de36129762534223a2f5782cc5fe472'/>
<id>urn:sha1:9535efc00de36129762534223a2f5782cc5fe472</id>
<content type='text'>
- Lock down low hanging fruit use of sb_flags with socket buffer
  lock.

- Lock down low hanging fruit use of so_state with socket lock.

- Lock down low hanging fruit use of so_options.

- Lock down low-hanging fruit use of sb_lowwat and sb_hiwat with
  socket buffer lock.

- Annotate situations in which we unlock the socket lock and then
  grab the receive socket buffer lock, which are currently actually
  the same lock.  Depending on how we want to play our cards, we
  may want to coallesce these lock uses to reduce overhead.

- Convert a if()-&gt;panic() into a KASSERT relating to so_state in
  soaccept().

- Remove a number of splnet()/splx() references.

More complex merging of socket and socket buffer locking to
follow.
</content>
</entry>
<entry>
<title>Second half of the dev_t cleanup.</title>
<updated>2004-06-17T17:16:53Z</updated>
<author>
<name>Poul-Henning Kamp</name>
<email>phk@FreeBSD.org</email>
</author>
<published>2004-06-17T17:16:53Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=f3732fd15b5a493a090a0453f937a78949c65f7d'/>
<id>urn:sha1:f3732fd15b5a493a090a0453f937a78949c65f7d</id>
<content type='text'>
The big lines are:
	NODEV -&gt; NULL
	NOUDEV -&gt; NODEV
	udev_t -&gt; dev_t
	udev2dev() -&gt; findcdev()

Various minor adjustments including handling of userland access to kernel
space struct cdev etc.
</content>
</entry>
</feed>
