summaryrefslogtreecommitdiffstats
path: root/sys/netinet
Commit message (Collapse)AuthorAgeFilesLines
...
* | Revive the sysctl net.inet.ip.fastforward to control the tryforward use.Luiz Otavio O Souza2016-05-031-2/+7
| | | | | | | | | | | | This is mainly provided for debug aid and should not be used in common cases. The fastforward sysctl is enabled by default.
* | Merge remote-tracking branch 'origin/stable/10' into develRenato Botelho2016-02-2810-81/+135
|\ \ | |/
| * MFC r295549:tuexen2016-02-2510-81/+135
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Loopback addresses are 127.0.0.0/8, not 127.0.0.1/32. MFC r295668: Improve the teardown of the SCTP stack. MFC r295670: Whitespace changes. MFC r295708: Address a warning reported by D5245 / PVS. MFC r295709: Code cleanup which will silence a warning in PVS / D5245. MFC r295710: Add protection code for issues reported by PVS / D5245. MFC r295771: Fix reporting of mapped addressed in getpeername() and getsockname() for IPv6 SCTP sockets. This bugs were found because of an issue reported by PVS / D5245. MFC r295772: Add some protection code. MFC r295773: Add protection code. MFC r295805: Use the SCTP level pointer, not the interface level. MFC r295929: Don't leak an address in an error path. Approved by: re (marius)
* | Revert "Revert 295285 which was an MFC of the tryforward work ↵Renato Botelho2016-02-223-113/+18
| | | | | | | | | | | | | | | | | | (r290383,295282,295283)" We are keeping tryforward enabled on pfSense since we do not use IPFW + NAT This reverts commit b899cad3faf3673f41a3fcf021164dcd7ee19a7e.
* | Merge remote-tracking branch 'origin/stable/10' into develRenato Botelho2016-02-223-18/+113
|\ \ | |/
| * Revert 295285 which was an MFC of the tryforward work (r290383,295282,295283)gnn2016-02-223-18/+113
| | | | | | | | | | | | | | In the IPFW+NAT+divergent MTU case there is a bug in sening ICMP MTU updates. Approved by: re (marius, gjb) Sponsored by: Rubicon Communications (Netgate)
* | Merge remote-tracking branch 'origin/stable/10' into develLuiz Otavio O Souza2016-02-092-5/+1
|\ \ | |/
| * MFC r292601,292654:bz2016-02-081-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | Since r256624 (head) we have been leaking routing table allocations on vnet enabled jail shutdown. Call the provided cleanup routines for IP versions 4 and 6 to plug these leaks. Sponsored by: The FreeBSD Foundation Reviewed by: gnn Differential Revision:https://reviews.freebsd.org/D4530 Approved by: re (gjb)
| * MFC r294514:bz2016-02-071-4/+0
| | | | | | | | | | | | | | | | | | | | | | | | The variable is write once only and not used. Recover the vertical space. Sponsored by: The FreeBSD Foundation Obtained from: p4 CH=180830 Reviewed by: gnn, hiren Differential Revision:https://reviews.freebsd.org/D4898 Approved by: re (marius, gjb)
* | Merge remote-tracking branch 'origin/stable/10' into develRenato Botelho2016-02-053-113/+18
|\ \ | |/
| * MFC: r290383,295282,295283gnn2016-02-043-113/+18
| | | | | | | | | | | | | | | | | | | | | | | | Replace the fastforward path with tryforward which does not require a sysctl and will always be on. The former split between default and fast forwarding is removed by this commit while preserving the ability to use all network stack features. Differential Revision: https://reviews.freebsd.org/D4042 Reviewed by: ae, melifaro, olivier, rwatson Approved by: re (glebius) Sponsored by: Rubicon Communications (Netgate)
* | Revert "MFC r290383:"Renato Botelho2016-02-053-19/+113
| | | | | | | | This reverts commit 5e6268df600406a1570e822ac652576059d820e3.
* | Merge remote-tracking branch 'origin/stable/10' into develRenato Botelho2016-02-039-75/+149
|\ \ | |/
| * MFC r294995:tuexen2016-02-035-73/+135
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Always look in the TCP pool. This fixes issues with a restarting peer when the listening 1-to-1 style socket is closed. MFC r295021: Remove debug output which was committed by accident. Thanks to Oliver Pinter for reporting. MFC r295069: Ignore peer addresses in a consistent way also when checking for new addresses during restart. If this is not done, restart doesn't work when the local socket is IPv4 only and the peer uses IPv4 and IPv6 addresses. MFC r295070: Don't change the remote UDP encapsulation port for SCTP packets containing an INIT chunk. MFC r295072: Don't allow a remote encapsulation port change during the SCTP restart procedure. MFC r295075: Update the path mtu when turning on/off UDP encapsulation for SCTP. MFC r295077: Add missing parentheses. This was reported by ccaughie via GitHub for the userland stack. Approved by: re (kib)
| * MFC r294840hiren2016-01-284-2/+14
| | | | | | | | | | | | Persist timers TCPTV_PERSMIN and TCPTV_PERSMAX are hardcoded with 5 seconds and 60 seconds, respectively. Turn them into sysctls that can be tuned live. The default values of 5 seconds and 60 seconds have been retained.
* | Merge remote-tracking branch 'origin/stable/10' into develRenato Botelho2016-01-2522-553/+915
|\ \ | |/
| * MFC r292603:bz2016-01-211-1/+1
| | | | | | | | | | | | | | | | | | If bootverbose is enabled every vnet startup and virtual interface creation will print extra lines on the console. We are generally not interested in this (repeated) information for each VNET. Thus only print it for the default VNET. Virtual interfaces on the base system will remain printing information, but e.g. each loopback in each vnet will no longer cause a "bpf attached" line.
| * MFC r294057:tuexen2016-01-171-2/+6
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Fix a bug in INIT handling on accepted 1-to-1 style sockets when the listener is closed. This fix allows the following packetdrill test to pass: // Setup a connected, blocking 1-to-1 style socket +0.0 socket(..., SOCK_STREAM, IPPROTO_SCTP) = 3 // Check the handshake with en empty(!) cookie +0.0 bind(3, ..., ...) = 0 +0.0 listen(3, 1) = 0 +0.0 < sctp: INIT[flgs=0, tag=1, a_rwnd=1500, os=1, is=1, tsn=1] +0.0 > sctp: INIT_ACK[flgs=0, tag=2, a_rwnd=..., os=..., is=..., tsn=1, ...] +0.0 < sctp: COOKIE_ECHO[flgs=0, len=..., val=...] +0.0 > sctp: COOKIE_ACK[flgs=0] +0.0 accept(3, ..., ...) = 4 +0.0 close(3) = 0 // Inject an INIT chunk and expect an INIT-ACK +0.0 < sctp: INIT[flgs=0, tag=3, a_rwnd=1500, os=1, is=1, tsn=1] +0.0 > sctp: INIT_ACK[flgs=0, tag=..., a_rwnd=..., os=..., is=..., tsn=..., ...]
| * MFC r293913:tuexen2016-01-171-2/+16
| | | | | | | | | | Fail the SCTP_GET_ASSOC_NUMBER and SCTP_GET_ASSOC_ID_LIST socket options for 1-to-1 style sockets as specified in RFC 6458.
| * MFC r293828:tuexen2016-01-171-8/+9
| | | | | | | | | | Store the timer type for logging, because the timer can be freed during processing the timerout.
| * MFC r292734:tuexen2016-01-171-4/+1
| | | | | | | | | | | | | | Don't implicitly terminate a user message when moving it to the send_queue and the socket is closed. This results in strange race conditions for the application. While there, remove a stray character.
| * MFC r292558:tuexen2016-01-171-0/+1
| | | | | | | | Stop processing of a SACK when the association has been aborted.
| * MFC r292060:tuexen2016-01-173-42/+0
| | | | | | | | | | | | | | | | | | Retire sctp_validate_no_locks(). This routine checks that there are no locks held for an inp, without having any lock on the inp. This breaks if the inp goes away when it is called. This happens on stress tests on a RPi B+.
| * MFC r291904:tuexen2016-01-177-8/+13
| | | | | | | | | | | | | | | | | | Fix the allocation of outgoing streams: * When processing a cookie, use the number of streams announced in the INIT-ACK. * When sending an INIT-ACK for an existing association, use the value from the association, not from the end-point.
| * MFC r291752:tuexen2016-01-171-0/+1
| | | | | | | | | | Fix a bug where a stream reset request wasn't retranmitted when the peer indicated "In progress".
| * MFC r291700:tuexen2016-01-174-3/+24
| | | | | | | | Ensure that outgoing streams get reset when they run dry.
| * MFC r291659:tuexen2016-01-171-1/+1
| | | | | | | | Minor cleanup. No functional change.
| * MFC r291651:tuexen2016-01-171-3/+7
| | | | | | | | | | Adjust the MTU when accepting an SCTP association using UDP encapsulation.
| * MFC r291410:tuexen2016-01-171-4/+8
| | | | | | | | | | Take also the send queue and sent queue into account when triggering the sending of outgoing stream reset requests.
| * MFC r291376:tuexen2016-01-171-3/+12
| | | | | | | | | | | | When the sending of an SCTP outgoing stream reset request fails, don't report it to the user since all stream have been marked as pending.
| * MFC r291364:tuexen2016-01-161-0/+12
| | | | | | | | | | | | | | | | | | When receiving an SCTP/UDP packet and the interface performed the UDP checksum computation and signals that it was OK, clear this bit when passing the packet to SCTP. Since the bits indicating a valid UDP checksum and a valid SCTP checksum are the same, the SCTP stack would assume that also an SCTP checksum check has been performed.
| * MFC r291141:tuexen2016-01-162-47/+9
| | | | | | | | | | Fix the handling of IPSec policies in the SCTP stack. At least make sure they are not leaked...
| * MFC r291140:tuexen2016-01-161-2/+4
| | | | | | | | | | Revert part of r291137 which seems correct, bit does not fix the resource problem I'm currently hunting down.
| * MFC r291138:tuexen2016-01-161-1/+2
| | | | | | | | Clear the so_pcb pointer in case of ipsec_init_policy() fails.
| * MFC r291137:tuexen2016-01-162-8/+5
| | | | | | | | | | | | Don't send SHUTDOWN chunk when the association is in a front state and the applications calls shutdown(..., SHUT_WR) or shutdown(..., SHUT_RDWR).
| * MFC r291078:tuexen2016-01-161-51/+52
| | | | | | | | | | Fix a bug where an SCTP association was moved back to SHUTDOWN_SENT state when the user issued a shutdown() call.
| * MFC r290468:tuexen2016-01-161-1/+1
| | | | | | | | Use the correct length. The wrong one was too large.
| * MFC r290444:tuexen2016-01-161-1/+2
| | | | | | | | | | The field sinfo_timetolive should have been sinfo_pr_value. Thanks to Jens Hoelscher for making me aware of the bug.
| * MFC r290442:tuexen2016-01-163-27/+33
| | | | | | | | | | | | Fix typos in field names of struct sctp_extrcvinfo. Provide defines to allow applications to compile. Thanks to Jens Hoelscher for making me aware of the typos.
| * MFC r290023:tuexen2016-01-161-2/+2
| | | | | | | | | | | | When processing a cookie, any mismatch in port numbers or the vtag results in failing the check. This fixes https://github.com/nplab/ETSI-SCTP-Conformance-Testsuite/blob/master/sctp-imh-tests/sctp-imh-i-3-3.pkt
| * MFC r289570:tuexen2016-01-166-26/+26
| | | | | | | | | | | | | | Use __func__ instead of __FUNCTION__. This allows to compile the userland stack without errors using gcc5. Thanks to saghul for makeing me aware and providing the patch.
| * MFC r289240:tuexen2016-01-161-1/+5
| | | | | | | | | | Fix the timeout for INIT retransmissions in the case where RTO_MIN is smaller than RTO_INITIAL.
| * MFC r287725:tuexen2016-01-161-1/+1
| | | | | | | | | | Fix compilation issue introduced in r287717. Thanks to bz@ for making me aware of it.
| * MFC r287719:tuexen2016-01-161-2/+2
| | | | | | | | Address a compile warning.
| * MFC r287717:tuexen2016-01-165-156/+82
| | | | | | | | | | | | Cleanup the handling of error causes for ERROR chunks. This fixes an inconsistency of the padding handling. The final padding is now considered to be a chunk padding.
| * MFC r287669:tuexen2016-01-164-26/+38
| | | | | | | | | | | | | | Ensure that ERROR chunks are always padded by implementing this in the routine, which queues an ERROR chunk, instead on relyinh on the callers to do so. Since one caller missed this, this actially fixes a bug.
| * MFC r287535:tuexen2016-01-161-6/+4
| | | | | | | | | | | | RFC 4960 requires that packets containing an INIT chunk bundled with another chunk are silently discarded. Do so, instead of sending an ABORT.
| * MFC r287457:tuexen2016-01-161-0/+5
| | | | | | | | Don't leak memory in an error case.
| * MFC r287456:tuexen2016-01-161-0/+3
| | | | | | | | Add a NULL pointer check to silence the clang code analyzer.
| * MFC r287444:tuexen2016-01-161-10/+15
| | | | | | | | | | Fix a bug where two SHUTDOWN_ACK chunks were sent if a SHUTDOWN chunk was received acking all outstanding data.
OpenPOWER on IntegriCloud