5045 use atomic_{inc,dec}_* instead of atomic_add_*Reviewed by: Matthew Ahrens <mahrens@delphix.com>Reviewed by: Garrett D'Amore <garrett@damore.org>Approved by: Robert Mustacchi <rm@joyent.com>
6972175 assertion failed: tcp->tcp_fin_sent, file: ../../common/inet/tcp/tcp_input.c, line: 43066971322 sof_inject_data_out() cannot inject data from close callback6971886 missing NULL cookie check
6972175 assertion failed: tcp->tcp_fin_sent, file: ../../common/inet/tcp/tcp_input.c, line: 43066971322 sof_inject_data_out() cannot inject data from close callback6971886 missing NULL cookie checks in some kssl filter callbacks
show more ...
6961070 kssl should send close_notify on socket shutdown6949092 create_instance_name() leaks instance_name
6939100 convert KSSL into a socket filter
6947183 kssl generates invalid SSL records in response to SSLv2-only Client Hello messages
6940069 KSSL should advertise secure renegotiation awareness6911323 the ksslcfg create command should fail immediately when the ssl port is missing6911304 ksslcfg should do more strict checks on th
6940069 KSSL should advertise secure renegotiation awareness6911323 the ksslcfg create command should fail immediately when the ssl port is missing6911304 ksslcfg should do more strict checks on the proxy port and ssl port
6932563 KSSL implicitly allows cipher suites with NULL encryption6935267 KSSL should terminate the connection if cipher suite cannot be found and there is no fallback point
PSARC/2009/354 Always on / no reboot Solaris Audit6192139 Solaris auditing should be able to start collecting audit records without a reboot
PSARC/2009/396 Tickless Kernel Architecture / lbolt decoupling6860030 tickless clock requires a clock() decoupled lbolt / lbolt64Portions contributed by Chad Mynhier <cmynhier@gmail.com>
PSARC/2009/331 IP Datapath RefactoringPSARC/2008/522 EOF of 2001/070 IPsec HW Acceleration supportPSARC/2009/495 netstat -r flags for blackhole and reject routesPSARC 2009/496 EOF of XRESOLVPSARC
PSARC/2009/331 IP Datapath RefactoringPSARC/2008/522 EOF of 2001/070 IPsec HW Acceleration supportPSARC/2009/495 netstat -r flags for blackhole and reject routesPSARC 2009/496 EOF of XRESOLVPSARC/2009/494 IP_DONTFRAG socket optionPSARC/2009/515 fragmentation controls for ping and traceroute6798716 ip_newroute delenda est6798739 ARP and IP are too separate6807265 IPv4 ip2mac() support6756382 Please remove Venus IPsec HWACCEL code6880632 sendto/sendmsg never returns EHOSTUNREACH in Solaris6748582 sendmsg() return OK, but doesn't send message using IPv4-mapped x IPv6 addr1119790 TCP and path mtu discovery4637227 should support equal-cost multi-path (ECMP)5078568 getsockopt() for IPV6_PATHMTU on a non-connected socket should not succeed6419648 "AR* contract private note" should be removed as part of ATM SW EOL6274715 Arp could keep the old entry in the cache while it waits for an arp response6605615 Remove duplicated TCP/IP opt_set/opt_get code; use conn_t6874677 IP_TTL can be used to send with ttl zero4034090 arp should not let you delete your own entry6882140 Implement IP_DONTFRAG socket option6883858 Implement ping -D option; traceroute -F should work for IPv6 and shared-IP zones1119792 TCP/IP black hole detection is broken on receiver4078796 Directed broadcast forwarding code has problems4104337 restrict the IPPROTO_IP and IPPROTO_IPV6 options based on the socket family4203747 Source address selection for source routed packets4230259 pmtu is increased every ip_ire_pathmtu_interval timer value.4300533 When sticky option ipv6_pktinfo set to bogus address subsequent connect time out4471035 ire_delete_cache_gw is called through ire_walk unnecessarily4514572 SO_DONTROUTE socket option doesn't work with IPv64524980 tcp_lookup_ipv4() should compare the ifindex against tcpb->tcpb_bound_if4532714 machine fails to switch quickly among failed default routes4634219 IPv6 path mtu discovery is broken when using routing header4691581 udp broadcast handling causes too many replicas4708405 mcast is broken on machines when all interfaces are IFF_POINTOPOINT4770457 netstat/route: source address of interface routes pretends to be gateway address4786974 use routing table to determine routes/interface for multicast4792619 An ip_fanout_udp_ipc_v6() routine might lead to some simpler code4816115 Nuke ipsec_out_use_global_policy4862844 ipsec offload corner case4867533 tcp_rq and tcp_wq are redundant4868589 NCEs should be shared across an IPMP group4872093 unplumbing an improper virtual interface panics in ip_newroute_get_dst_ill()4901671 FireEngine needs some cleanup4907617 IPsec identity latching should be done before sending SYN-ACK4941461 scopeid and IPV6_PKTINFO with UDP/ICMP connect() does not work properly4944981 ip does nothing with IP6I_NEXTHOP4963353 IPv4 and IPv6 proto fanout codes could be brought closer4963360 consider passing zoneid using ip6i_t instead of ipsec_out_t in NDP4963734 new ip6_asp locking is used incorrectly in ip_newroute_v6()5008315 IPv6 code passes ip6i_t to IPsec code instead of ip6_t5009636 memory leak in ip_fanout_proto_v6()5092337 tcp/udp option handling can use some cleanup5035841 Solaris can fail to create a valid broadcast ire5043747 ar_query_xmit: Could not find the ace5051574 tcp_check_policy is missing some checks6305037 full hardware checksum is discarded when there're more than 2 mblks in the chain6311149 ip.c needs to be put through a woodchipper4708860 Unable to reassemble CGTP fragmented multicast packets6224628 Large IPv6 packets with IPsec protection sometimes have length mismatch.6213243 Solaris does not currently support Dead Gateway Detection5029091 duplicate code in IP's input path for TCP/UDP/SCTP4674643 through IPv6 CGTP routes, the very first packet is sent only after a while6207318 Multiple default routes do not round robin connections to routers.4823410 IP has an inconsistent view of link mtu5105520 adding interface route to down interface causes ifconfig hang5105707 advanced sockets API introduced some dead code6318399 IP option handling for icmp and udp is too complicated6321434 Every dropped packet in IP should use ip_drop_packet()6341693 ifconfig mtu should operate on the physical interface, not individual ipif's6352430 The credentials attached to an mblk are not particularly useful6357894 uninitialised ipp_hoplimit needs to be cleaned up.6363568 ip_xmit_v6() may be missing IRE releases in error cases6364828 ip_rput_forward needs a makeover6384416 System panics when running as multicast forwarder using multicast tunnels6402382 TX: UDP v6 slowpath is not modified to handle mac_exempt conns6418413 assertion failed ipha->ipha_ident == 0||ipha->ipha_ident == 0xFFFF6420916 assertion failures in ipv6 wput path6430851 use of b_prev to store ifindex is not 100% safe6446106 IPv6 packets stored in nce->nce_qd_mp will be sent with incorrect tcp/udp checksums6453711 SCTP OOTB sent as if genetated by global zone6465212 ARP/IP merge should remove ire_freemblk.esballoc6490163 ip_input() could misbehave if the first mblk's size is not big enough6496664 missing ipif_refrele leads to reference leak and deferred crash in ip_wput_ipsec_out_v66504856 memory leak in ip_fanout_proto_v6() when using link local outer tunnel addresses6507765 IRE cache hash function performs badly6510186 IP_FORWARD_PROG bit is easily overlooked6514727 cgtp ipv6 failure on snv546528286 MULTIRT (CGTP) should offload checksum to hardware6533904 SCTP: doesn't support traffic class for IPv66539415 TX: ipif source selection is flawed for unlabeled gateways6539851 plumbed unworking nic blocks sending broadcast packets6564468 non-solaris SCTP stack over rawip socket: netstat command counts rawipInData not rawipOutDatagrams6568511 ipIfStatsOutDiscards not bumped when discarding an ipsec packet on the wrong NIC6584162 tcp_g_q_inactive() makes incorrect use of taskq_dispatch()6603974 round-robin default with many interfaces causes infinite temporary IRE thrashing6611750 ilm_lookup_ill_index_v4 was born an orphan6618423 ip_wput_frag_mdt sends out packets that void pfhooks6620964 IRE max bucket count calculations performed in ip_ire_init() are flawed6626266 various _broadcasts seem redundant6638182 IP_PKTINFO + SO_DONTROUTE + CIPSO IP option == panic6647710 IPv6 possible DoS vulnerability6657357 nce should be kmem_cache alloc'ed from an nce_cache.6685131 ilg_add -> conn_ilg_alloc interacting with conn_ilg[] walkers can cause panic.6730298 adding 0.0.0.0 key with mask != 0 causes 'route delete default' to fail6730976 vni and ipv6 doesn't quite work.6740956 assertion failed: mp->b_next == 0L && mp->b_prev == 0L in nce_queue_mp_common()6748515 BUMP_MIB() is occasionally done on the wrong ill6753250 ip_output_v6() `notv6' error path has an errant ill_refrele()6756411 NULL-pointer dereference in ip_wput_local()6769582 IP must forward packet returned from FW-HOOK6781525 bogus usesrc usage leads directly to panic6422839 System paniced in ip_multicast_loopback due to NULL pointer dereference6785521 initial IPv6 DAD solicitation is dropped in ip_newroute_ipif_v6()6787370 ipnet devices not seeing forwarded IP packets on outgoing interface6791187 ip*dbg() calls in ip_output_options() claim to originate from ip_wput()6794047 nce_fp_mp prevents sharing of NCEs across an IPMP group6797926 many unnecessary ip0dbg() in ip_rput_data_v66846919 Packet queued for ND gets sent in the clear.6856591 ping doesn't send packets with DF set6861113 arp module has incorrect dependency path for hook module6865664 IPV6_NEXTHOP does not work with TCP socket6874681 No ICMP time exceeded when a router receives packet with ttl = 06880977 ip_wput_ire() uses over 1k of stack6595433 IPsec performance could be significantly better when calling hw crypto provider synchronously6848397 ifconfig down of an interface can hang.6849602 IPV6_PATHMTU size issue for UDP6885359 Add compile-time option for testing pure IPsec overhead6889268 Odd loopback source address selection with IPMP6895420 assertion failed: connp->conn_helper_info == NULL6851189 Routing-related panic occurred during reboot on T2000 system running snv_1176896174 Post-async-encryption, AH+ESP packets may have misinitialized ipha/ip66896687 iptun presents IPv6 with an MTU < 12806897006 assertion failed: ipif->ipif_id != 0 in ip_sioctl_slifzone_restart
6228975 Need IPv6 support for KSSL6627569 need kssl_sid_cached kstat counter6846333 ksslcfg no longer displays version6668826 missing curly brackets in kssl_release_ent6873066 cleanup unused code
6228975 Need IPv6 support for KSSL6627569 need kssl_sid_cached kstat counter6846333 ksslcfg no longer displays version6668826 missing curly brackets in kssl_release_ent6873066 cleanup unused code in ksslproto.h and ksslapi.h
6860305 OpenSSL 0.9.8k fails to establish ssl3/tls1 connections with a KSSL server6860941 KSSL fails client hello that has compression methods other than null
6836329 KSSL should handle bind time checks for IPv4-mapped IPv6 addresses
PSARC 2008/382 Fast Reboot6714038 Fast Reboot support for x86 platforms
PSARC/2008/330 AES cipher suite support in kernel SSL6276663 Offer TLS_*_AES* ciphersuites
6651635 macro KSSL_ENQUEUE_MP() is unsafe after 6556447
6556447 better observability for kssl6614159 kstrgetmsg()/struiocopyout() are greedy monsters lurking for raw kssl data6641496 incoming TCP segments destined for KSSL lost when received out-of-orde
6556447 better observability for kssl6614159 kstrgetmsg()/struiocopyout() are greedy monsters lurking for raw kssl data6641496 incoming TCP segments destined for KSSL lost when received out-of-order--HG--rename : usr/src/uts/common/inet/kssl/kssldebug.h => deleted_files/usr/src/uts/common/inet/kssl/kssldebug.h
1162981 Remove C2_AUDIT #defines from the kernel and build files
6578428 kssl_input() clears DBLK_COOKED flag in the wrong field6578997 KSSL should use hardware acceleration for ssl3 macs when available
6497668 need sanity checks in the incoming data path6539337 prevmp in kssl_handle_record() mis-initialized6556443 tcp should not be eating SSL records intended for kssl
PSARC/2006/540 Crypto event notification update6385143 Support usage of non-extractable keys6466686 need events to support session based clients6466693 need a routine to get provider information g
PSARC/2006/540 Crypto event notification update6385143 Support usage of non-extractable keys6466686 need events to support session based clients6466693 need a routine to get provider information given a provider handle6465847 ksslcfg reports service to be online even when there is an error6469846 dprov needs to set CKF_LOGIN_REQUIRED
6401687 kernel SSL could panic after misconfiguration
6364201 kstat_create('kssl', 0, 'kssl_stats'): namespace collision6376643 add kssl ioctls to truss/codes.c6376684 i.minorperm entry for kssl is incorrect
6364043 kssl shouldn't submit non multiple of the cipher's block size for decryption
PSARC/2005/625 Greyhound - Solaris Kernel SSL proxy4931229 Kernel-level SSL proxy