#
9d176904 |
| 10-May-2020 |
Michael Tuexen <tuexen@FreeBSD.org> |
Remove trailing whitespace.
|
#
d3b6c96b |
| 04-May-2020 |
Randall Stewart <rrs@FreeBSD.org> |
Adjust the fb to have a way to ask the underlying stack if it can support the PRUS option (OOB). And then have the new function call that to validate and give the correct error response if needed to
Adjust the fb to have a way to ask the underlying stack if it can support the PRUS option (OOB). And then have the new function call that to validate and give the correct error response if needed to the user (rack and bbr do not support obsoleted OOB data).
Sponsoered by: Netflix Inc. Differential Revision: https://reviews.freebsd.org/D24574
show more ...
|
#
f1f93475 |
| 28-Apr-2020 |
John Baldwin <jhb@FreeBSD.org> |
Initial support for kernel offload of TLS receive.
- Add a new TCP_RXTLS_ENABLE socket option to set the encryption and authentication algorithms and keys as well as the initial sequence number.
Initial support for kernel offload of TLS receive.
- Add a new TCP_RXTLS_ENABLE socket option to set the encryption and authentication algorithms and keys as well as the initial sequence number.
- When reading from a socket using KTLS receive, applications must use recvmsg(). Each successful call to recvmsg() will return a single TLS record. A new TCP control message, TLS_GET_RECORD, will contain the TLS record header of the decrypted record. The regular message buffer passed to recvmsg() will receive the decrypted payload. This is similar to the interface used by Linux's KTLS RX except that Linux does not return the full TLS header in the control message.
- Add plumbing to the TOE KTLS interface to request either transmit or receive KTLS sessions.
- When a socket is using receive KTLS, redirect reads from soreceive_stream() into soreceive_generic().
- Note that this interface is currently only defined for TLS 1.1 and 1.2, though I believe we will be able to reuse the same interface and structures for 1.3.
show more ...
|
#
ec1db6e1 |
| 28-Apr-2020 |
John Baldwin <jhb@FreeBSD.org> |
Add the initial sequence number to the TLS enable socket option.
This will be needed for KTLS RX.
Reviewed by: gallatin Sponsored by: Chelsio Communications Differential Revision: https://reviews.f
Add the initial sequence number to the TLS enable socket option.
This will be needed for KTLS RX.
Reviewed by: gallatin Sponsored by: Chelsio Communications Differential Revision: https://reviews.freebsd.org/D24451
show more ...
|
#
74dc6beb |
| 14-Feb-2020 |
Dimitry Andric <dim@FreeBSD.org> |
Merge ^/head r357855 through r357920.
|
#
a3574665 |
| 13-Feb-2020 |
Michael Tuexen <tuexen@FreeBSD.org> |
sack_newdata and snd_recover hold the same value. Therefore, use only a single instance: use snd_recover also where sack_newdata was used.
Submitted by: Richard Scheffenegger Differential Revision:
sack_newdata and snd_recover hold the same value. Therefore, use only a single instance: use snd_recover also where sack_newdata was used.
Submitted by: Richard Scheffenegger Differential Revision: https://reviews.freebsd.org/D18811
show more ...
|
#
44e86fbd |
| 13-Feb-2020 |
Dimitry Andric <dim@FreeBSD.org> |
Merge ^/head r357662 through r357854.
|
#
481be5de |
| 12-Feb-2020 |
Randall Stewart <rrs@FreeBSD.org> |
White space cleanup -- remove trailing tab's or spaces from any line.
Sponsored by: Netflix Inc.
|
#
59abbffa |
| 31-Jan-2020 |
Dimitry Andric <dim@FreeBSD.org> |
Merge ^/head r357270 through r357349.
|
#
42ce7937 |
| 29-Jan-2020 |
Gleb Smirnoff <glebius@FreeBSD.org> |
Fix missing NET_EPOCH_ENTER() when compiled with TCP_OFFLOAD.
Reported by: Coverity CID: 1413162
|
#
051669e8 |
| 25-Jan-2020 |
Dimitry Andric <dim@FreeBSD.org> |
Merge ^/head r356931 through r357118.
|
#
7754e281 |
| 22-Jan-2020 |
Bjoern A. Zeeb <bz@FreeBSD.org> |
Fix NOINET kernels after r356983.
All gotos to the label are within the #ifdef INET section, which leaves us with an unused label. Cover the label under #ifdef INET as well to avoid the warning and
Fix NOINET kernels after r356983.
All gotos to the label are within the #ifdef INET section, which leaves us with an unused label. Cover the label under #ifdef INET as well to avoid the warning and compile time error.
show more ...
|
#
c1604fe4 |
| 22-Jan-2020 |
Gleb Smirnoff <glebius@FreeBSD.org> |
Make in_pcbladdr() require network epoch entered by its callers. Together with this widen network epoch coverage up to tcp_connect() and udp_connect().
Revisions from r356974 and up to this revisio
Make in_pcbladdr() require network epoch entered by its callers. Together with this widen network epoch coverage up to tcp_connect() and udp_connect().
Revisions from r356974 and up to this revision cover D23187.
Differential Revision: https://reviews.freebsd.org/D23187
show more ...
|
#
e2636f0a |
| 22-Jan-2020 |
Gleb Smirnoff <glebius@FreeBSD.org> |
Remove extraneous NET_EPOCH_ASSERT - the full function is covered.
|
#
3fed74e9 |
| 22-Jan-2020 |
Gleb Smirnoff <glebius@FreeBSD.org> |
Re-absorb tcp_detach() back into tcp_usr_detach() as the comment suggests. Not a functional change.
|
#
5fc8df3c |
| 22-Jan-2020 |
Gleb Smirnoff <glebius@FreeBSD.org> |
Don't enter network epoch in tcp_usr_detach. A PCB removal doesn't require that.
|
#
7669c586 |
| 22-Jan-2020 |
Gleb Smirnoff <glebius@FreeBSD.org> |
tcp_usr_attach() doesn't need network epoch. in_pcbfree() and in_pcbdetach() perform all necessary synchronization themselves.
|
#
0f6385e7 |
| 22-Jan-2020 |
Gleb Smirnoff <glebius@FreeBSD.org> |
Inline tcp_attach() into tcp_usr_attach(). Not a functional change.
|
#
109eb549 |
| 22-Jan-2020 |
Gleb Smirnoff <glebius@FreeBSD.org> |
Make tcp_output() require network epoch.
Enter the epoch before calling into tcp_output() from those functions, that didn't do that before.
This eliminates a bunch of epoch recursions in TCP.
|
#
adc56f5a |
| 02-Dec-2019 |
Edward Tomasz Napierala <trasz@FreeBSD.org> |
Make use of the stats(3) framework in the TCP stack.
This makes it possible to retrieve per-connection statistical information such as the receive window size, RTT, or goodput, using a newly added T
Make use of the stats(3) framework in the TCP stack.
This makes it possible to retrieve per-connection statistical information such as the receive window size, RTT, or goodput, using a newly added TCP_STATS getsockopt(3) option, and extract them using the stats_voistat_fetch(3) API.
See the net/tcprtt port for an example consumer of this API.
Compared to the existing TCP_INFO system, the main differences are that this mechanism is easy to extend without breaking ABI, and provides statistical information instead of raw "snapshots" of values at a given point in time. stats(3) is more generic and can be used in both userland and the kernel.
Reviewed by: thj Tested by: thj Obtained from: Netflix Relnotes: yes Sponsored by: Klara Inc, Netflix Differential Revision: https://reviews.freebsd.org/D20655
show more ...
|
#
3cf38784 |
| 01-Dec-2019 |
Michael Tuexen <tuexen@FreeBSD.org> |
Move all ECN related flags from the flags to the flags2 field. This allows adding more ECN related flags in the future. No functional change intended.
Submitted by: Richard Scheffenegger Reviewed b
Move all ECN related flags from the flags to the flags2 field. This allows adding more ECN related flags in the future. No functional change intended.
Submitted by: Richard Scheffenegger Reviewed by: rrs@, tuexen@ Differential Revision: https://reviews.freebsd.org/D22497
show more ...
|
#
97a95ee1 |
| 07-Nov-2019 |
Gleb Smirnoff <glebius@FreeBSD.org> |
Mechanically convert INP_INFO_RLOCK() to NET_EPOCH_ENTER() in TCP functions that are executed in syscall context. No functional change here.
|
Revision tags: release/12.1.0 |
|
#
4a91aa8f |
| 24-Oct-2019 |
Michael Tuexen <tuexen@FreeBSD.org> |
Ensure that the flags indicating IPv4/IPv6 are not changed by failing bind() calls. This would lead to inconsistent state resulting in a panic. A fix for stable/11 was committed in https://svnweb.fre
Ensure that the flags indicating IPv4/IPv6 are not changed by failing bind() calls. This would lead to inconsistent state resulting in a panic. A fix for stable/11 was committed in https://svnweb.freebsd.org/base?view=revision&revision=338986 An accelerated MFC is planned as discussed with emaste@.
Reported by: syzbot+2609a378d89264ff5a42@syzkaller.appspotmail.com Obtained from: jtl@ MFC after: 1 day Sponsored by: Netflix, Inc.
show more ...
|
#
9122aeea |
| 09-Oct-2019 |
Dimitry Andric <dim@FreeBSD.org> |
Merge ^/head r353316 through r353350.
|
#
9e14430d |
| 08-Oct-2019 |
John Baldwin <jhb@FreeBSD.org> |
Add a TOE KTLS mode and a TOE hook for allocating TLS sessions.
This adds the glue to allocate TLS sessions and invokes it from the TLS enable socket option handler. This also adds some counters fo
Add a TOE KTLS mode and a TOE hook for allocating TLS sessions.
This adds the glue to allocate TLS sessions and invokes it from the TLS enable socket option handler. This also adds some counters for active TOE sessions.
The TOE KTLS mode is returned by getsockopt(TLSTX_TLS_MODE) when TOE KTLS is in use on a socket, but cannot be set via setsockopt().
To simplify various checks, a TLS session now includes an explicit 'mode' member set to the value returned by TLSTX_TLS_MODE. Various places that used to check 'sw_encrypt' against NULL to determine software vs ifnet (NIC) TLS now check 'mode' instead.
Reviewed by: np, gallatin Sponsored by: Chelsio Communications Differential Revision: https://reviews.freebsd.org/D21891
show more ...
|