freebsd-skq/sys/netipx
2008-10-23 15:53:51 +00:00
..
ipx_cksum.c
ipx_if.h
ipx_input.c Begin the sysctl descriptions with a capital letter. 2008-07-25 23:54:07 +00:00
ipx_outputfl.c
ipx_pcb.c Retire the MALLOC and FREE macros. They are an abomination unto style(9). 2008-10-23 15:53:51 +00:00
ipx_pcb.h
ipx_proto.c
ipx_usrreq.c Begin the sysctl descriptions with a capital letter. 2008-07-25 23:54:07 +00:00
ipx_var.h
ipx.c Remove the suser(9) interface from the kernel. It has been replaced from 2008-09-17 15:49:44 +00:00
ipx.h
README
spx_debug.c
spx_debug.h
spx_timer.h
spx_usrreq.c Retire the MALLOC and FREE macros. They are an abomination unto style(9). 2008-10-23 15:53:51 +00:00
spx_var.h
spx.h

$FreeBSD$

This protocol implements IPX/SPX over Ethernet_II frame type 0x8137.
Please note: the SPX implementation may require further work and testing
to insure proper operation.

Mike Mitchell, Network Engineer
AMTECH Systems Corporation, Technology and Manufacturing
8600 Jefferson Street, Albuquerque, New Mexico 87113 (505) 856-8000
supervisor@alb.asctmd.com

John Hay
Some Company
Some Address
jhay@mikom.csir.co.za

Adapted for multi-processor, multi-threaded network stack by Robert N. M.
Watson, Computer Laboratory, University of Cambridge.

--- Copyright Information ---
/*-

Copyright (c) 1984, 1985, 1986, 1987, 1993
The Regents of the University of California.  All rights reserved.

Modifications Copyright (c) 1995, Mike Mitchell
Modifications Copyright (c) 1995, John Hay
Modifications Copyright (c) 2004-2006 Robert N. M. Watson

*/

--- TODO ---

(1) netipx default socket buffer sizes are very small by contemporary
    standards, and should be increased following testing and measurement.

(2) SPX will free the PCB and socket buffer memory on close(), which means
    close() in effects terminates the transfer of any outstanding buffered
    but unsent data.  As with TCP, it should instead grab its own
    reference to the socket so that it is not released, as hold onto it
    until the data transfer is complete.

(3) Raw socket capture of IPX output intercepts packets in the SPX output
    routine in order to feed them back into the raw socket.  This results
    in recursion into the socket code in the transmit path; instead,
    captured packets should be fed into a netisr that reinjects them into
    raw sockets from a new (asynchronous) context.

(4) IPX over IP encapsulation needs work to make it properly MPSAFE.