I'm seeing what appears to me to be a socket leak in the accept()
operation provided by the new BSD network stack.
One of my customers is doing something goofy (but legal) on his end
which occasionally opens a socket (SYN,SYN/ACK,ACK) and then 140-150
us later sends a TCP RST. This results in
I don't know about the socket leak, per se, but I have had some
dealings with the original BSD network stack with regards to the
accept() call. From my memory, I remember there being two queues on
which the socket might be placed (so_comp, so_incomp). Depending on the
timing, the socket
On 2010-07-27, Jay Foster j...@systech.com wrote:
I don't know about the socket leak, per se, but I have had some
dealings with the original BSD network stack with regards to the
accept() call. From my memory, I remember there being two queues on
which the socket might be placed
You could try TCP/IP Illustrated, Volume 2 (and volume 1) by Gary R.
Wright and W. Richard Stevens, published by Addison Wesley. It's a bit
dated, but the basics are there. It shows the network code listings,
bit by bit, with an explanation for each line.
Jay
On 7/27/2010 3:39 PM, Grant