Home
last modified time | relevance | path

Searched hist:dda02192 (Results 1 – 1 of 1) sorted by relevance

/freebsd/sys/netinet6/
H A Dfrag6.cdda02192 Thu Oct 24 19:57:18 GMT 2019 Bjoern A. Zeeb <bz@FreeBSD.org> frag6: fix counter leak in error case and optimise code

In case the first fragmented part (off=0) arrives we check for the
maximum packet size for each fragmented part we already queued with the
addition of the unfragmentable part from the first one.

For one we do not have to enter the loop at all if this is the first
fragmented part to arrive, and we can skip the check.

Should we encounter an error case we send an ICMPv6 message for any
fragment exceeding the maximum length limit. While dequeueing the
original packet and freeing it, statistics were not updated and leaked
both the reassembly queue count for the fragment and the global
fragment count. Found by code inspection and confirmed by tightening
test cases checking more statistical and system counters.

While here properly wrap a line.

MFC after: 3 weeks
Sponsored by: Netflix
dda02192 Thu Oct 24 19:57:18 GMT 2019 Bjoern A. Zeeb <bz@FreeBSD.org> frag6: fix counter leak in error case and optimise code

In case the first fragmented part (off=0) arrives we check for the
maximum packet size for each fragmented part we already queued with the
addition of the unfragmentable part from the first one.

For one we do not have to enter the loop at all if this is the first
fragmented part to arrive, and we can skip the check.

Should we encounter an error case we send an ICMPv6 message for any
fragment exceeding the maximum length limit. While dequeueing the
original packet and freeing it, statistics were not updated and leaked
both the reassembly queue count for the fragment and the global
fragment count. Found by code inspection and confirmed by tightening
test cases checking more statistical and system counters.

While here properly wrap a line.

MFC after: 3 weeks
Sponsored by: Netflix
dda02192 Thu Oct 24 19:57:18 GMT 2019 Bjoern A. Zeeb <bz@FreeBSD.org> frag6: fix counter leak in error case and optimise code

In case the first fragmented part (off=0) arrives we check for the
maximum packet size for each fragmented part we already queued with the
addition of the unfragmentable part from the first one.

For one we do not have to enter the loop at all if this is the first
fragmented part to arrive, and we can skip the check.

Should we encounter an error case we send an ICMPv6 message for any
fragment exceeding the maximum length limit. While dequeueing the
original packet and freeing it, statistics were not updated and leaked
both the reassembly queue count for the fragment and the global
fragment count. Found by code inspection and confirmed by tightening
test cases checking more statistical and system counters.

While here properly wrap a line.

MFC after: 3 weeks
Sponsored by: Netflix
dda02192 Thu Oct 24 19:57:18 GMT 2019 Bjoern A. Zeeb <bz@FreeBSD.org> frag6: fix counter leak in error case and optimise code

In case the first fragmented part (off=0) arrives we check for the
maximum packet size for each fragmented part we already queued with the
addition of the unfragmentable part from the first one.

For one we do not have to enter the loop at all if this is the first
fragmented part to arrive, and we can skip the check.

Should we encounter an error case we send an ICMPv6 message for any
fragment exceeding the maximum length limit. While dequeueing the
original packet and freeing it, statistics were not updated and leaked
both the reassembly queue count for the fragment and the global
fragment count. Found by code inspection and confirmed by tightening
test cases checking more statistical and system counters.

While here properly wrap a line.

MFC after: 3 weeks
Sponsored by: Netflix
dda02192 Thu Oct 24 19:57:18 GMT 2019 Bjoern A. Zeeb <bz@FreeBSD.org> frag6: fix counter leak in error case and optimise code

In case the first fragmented part (off=0) arrives we check for the
maximum packet size for each fragmented part we already queued with the
addition of the unfragmentable part from the first one.

For one we do not have to enter the loop at all if this is the first
fragmented part to arrive, and we can skip the check.

Should we encounter an error case we send an ICMPv6 message for any
fragment exceeding the maximum length limit. While dequeueing the
original packet and freeing it, statistics were not updated and leaked
both the reassembly queue count for the fragment and the global
fragment count. Found by code inspection and confirmed by tightening
test cases checking more statistical and system counters.

While here properly wrap a line.

MFC after: 3 weeks
Sponsored by: Netflix
dda02192 Thu Oct 24 19:57:18 GMT 2019 Bjoern A. Zeeb <bz@FreeBSD.org> frag6: fix counter leak in error case and optimise code

In case the first fragmented part (off=0) arrives we check for the
maximum packet size for each fragmented part we already queued with the
addition of the unfragmentable part from the first one.

For one we do not have to enter the loop at all if this is the first
fragmented part to arrive, and we can skip the check.

Should we encounter an error case we send an ICMPv6 message for any
fragment exceeding the maximum length limit. While dequeueing the
original packet and freeing it, statistics were not updated and leaked
both the reassembly queue count for the fragment and the global
fragment count. Found by code inspection and confirmed by tightening
test cases checking more statistical and system counters.

While here properly wrap a line.

MFC after: 3 weeks
Sponsored by: Netflix
dda02192 Thu Oct 24 19:57:18 GMT 2019 Bjoern A. Zeeb <bz@FreeBSD.org> frag6: fix counter leak in error case and optimise code

In case the first fragmented part (off=0) arrives we check for the
maximum packet size for each fragmented part we already queued with the
addition of the unfragmentable part from the first one.

For one we do not have to enter the loop at all if this is the first
fragmented part to arrive, and we can skip the check.

Should we encounter an error case we send an ICMPv6 message for any
fragment exceeding the maximum length limit. While dequeueing the
original packet and freeing it, statistics were not updated and leaked
both the reassembly queue count for the fragment and the global
fragment count. Found by code inspection and confirmed by tightening
test cases checking more statistical and system counters.

While here properly wrap a line.

MFC after: 3 weeks
Sponsored by: Netflix