Subject: Re: TCP ECN diff
To: Rui Paulo <rpaulo@fnop.net>
From: Hubert Feyrer <hubert@feyrer.de>
List: tech-net
Date: 08/31/2006 21:13:46
> + if (TCP_ECN_ALLOWED(tp)) {
> + switch (iptos & IPTOS_ECN_MASK) {
> + case IPTOS_ECN_CE:
> + tp->t_flags |= TF_ECN_SND_ECE;
> + tcpstat.tcps_ecn_ce++;
> + break;
> + case IPTOS_ECN_ECT0:
> + tcpstat.tcps_ecn_ect++;
> + break;
> + case IPTOS_ECN_ECT1:
> + /* XXX: ignore for now -- rpaulo */
> + break;
Would it make sense to print a message to the console that a
unsupported/not allowed option was used? FWIW, Solaris prints something
like this (for something IPv6 related):
Jul 17 00:26:22 foo ip: [ID 976445 kern.notice] ip_option_process: bad opt 0x5
I think there was no patch for sysctl.[13].
Also: should tcp(4) mention this?
- Hubert