<feed xmlns='http://www.w3.org/2005/Atom'>
<title>src-test/sys/netinet, branch main</title>
<subtitle>FreeBSD source tree</subtitle>
<id>https://cgit-dev.freebsd.org/src-test/atom?h=main</id>
<link rel='self' href='https://cgit-dev.freebsd.org/src-test/atom?h=main'/>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test/'/>
<updated>2020-12-23T17:03:47Z</updated>
<entry>
<title>Improve input validation for parameters in ASCONF and ASCONF-ACK chunks</title>
<updated>2020-12-23T17:03:47Z</updated>
<author>
<name>Michael Tuexen</name>
<email>tuexen@FreeBSD.org</email>
</author>
<published>2020-12-23T17:03:47Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test/commit/?id=0ec2ce0d32735e14708653ea08da055816f3f817'/>
<id>urn:sha1:0ec2ce0d32735e14708653ea08da055816f3f817</id>
<content type='text'>
Thanks to Tolya Korniltsev for drawing my attention to this part of the
code by reporting an issue for the userland stack.
</content>
</entry>
<entry>
<title>Filter TCP connections to SO_REUSEPORT_LB listen sockets by NUMA domain</title>
<updated>2020-12-19T22:04:46Z</updated>
<author>
<name>Andrew Gallatin</name>
<email>gallatin@FreeBSD.org</email>
</author>
<published>2020-12-19T22:04:46Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test/commit/?id=a034518ac8793059220af22e6ab25f84c5a6ddb8'/>
<id>urn:sha1:a034518ac8793059220af22e6ab25f84c5a6ddb8</id>
<content type='text'>
In order to efficiently serve web traffic on a NUMA
machine, one must avoid as many NUMA domain crossings as
possible. With SO_REUSEPORT_LB, a number of workers can share a
listen socket. However, even if a worker sets affinity to a core
or set of cores on a NUMA domain, it will receive connections
associated with all NUMA domains in the system. This will lead to
cross-domain traffic when the server writes to the socket or
calls sendfile(), and memory is allocated on the server's local
NUMA node, but transmitted on the NUMA node associated with the
TCP connection. Similarly, when the server reads from the socket,
he will likely be reading memory allocated on the NUMA domain
associated with the TCP connection.

This change provides a new socket ioctl, TCP_REUSPORT_LB_NUMA. A
server can now tell the kernel to filter traffic so that only
incoming connections associated with the desired NUMA domain are
given to the server. (Of course, in the case where there are no
servers sharing the listen socket on some domain, then as a
fallback, traffic will be hashed as normal to all servers sharing
the listen socket regardless of domain). This allows a server to
deal only with traffic that is local to its NUMA domain, and
avoids cross-domain traffic in most cases.

This patch, and a corresponding small patch to nginx to use
TCP_REUSPORT_LB_NUMA allows us to serve 190Gb/s of kTLS encrypted
https media content from dual-socket Xeons with only 13% (as
measured by pcm.x) cross domain traffic on the memory controller.

Reviewed by:	jhb, bz (earlier version), bcr (man page)
Tested by: gonzo
Sponsored by:	Netfix
Differential Revision:	https://reviews.freebsd.org/D21636
</content>
</entry>
<entry>
<title>Harden the handling of outgoing streams in case of an restart or INIT</title>
<updated>2020-12-13T23:51:51Z</updated>
<author>
<name>Michael Tuexen</name>
<email>tuexen@FreeBSD.org</email>
</author>
<published>2020-12-13T23:51:51Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test/commit/?id=0066de1c4b72e9283e2098f4db6aea77832ea0ad'/>
<id>urn:sha1:0066de1c4b72e9283e2098f4db6aea77832ea0ad</id>
<content type='text'>
collision. This avouds an out-of-bounce access in case the peer can
break the cookie signature. Thanks to Felix Wilhelm from Google for
reporting the issue.

MFC after:		1 week
</content>
</entry>
<entry>
<title>Clean up more resouces of an existing SCTP association in case of</title>
<updated>2020-12-12T22:23:45Z</updated>
<author>
<name>Michael Tuexen</name>
<email>tuexen@FreeBSD.org</email>
</author>
<published>2020-12-12T22:23:45Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test/commit/?id=aa6db9a045345e45a95dc9765780e38273b62767'/>
<id>urn:sha1:aa6db9a045345e45a95dc9765780e38273b62767</id>
<content type='text'>
a restart.

This fixes a use-after-free scenario, which was reported by Felix
Wilhelm from Google in case a peer is able to modify the cookie.
However, this can also be triggered by an assciation restart under
some specific conditions.

MFC after:		1 week
</content>
</entry>
<entry>
<title>Add TCP feature Proportional Rate Reduction (PRR) - RFC6937</title>
<updated>2020-12-04T11:29:27Z</updated>
<author>
<name>Richard Scheffenegger</name>
<email>rscheff@FreeBSD.org</email>
</author>
<published>2020-12-04T11:29:27Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test/commit/?id=0e1d7c25c5ab4014eb5ddd7676a1b64041a57d17'/>
<id>urn:sha1:0e1d7c25c5ab4014eb5ddd7676a1b64041a57d17</id>
<content type='text'>
PRR improves loss recovery and avoids RTOs in a wide range
of scenarios (ACK thinning) over regular SACK loss recovery.

PRR is disabled by default, enable by net.inet.tcp.do_prr = 1.
Performance may be impeded by token bucket rate policers at
the bottleneck, where net.inet.tcp.do_prr_conservate = 1
should be enabled in addition.

Submitted by:	Aris Angelogiannopoulos
Sponsored by:	NetApp, Inc.
Differential Revision:	https://reviews.freebsd.org/D18892
</content>
</entry>
<entry>
<title>Remove RADIX_MPATH config option.</title>
<updated>2020-11-29T19:43:33Z</updated>
<author>
<name>Alexander V. Chernikov</name>
<email>melifaro@FreeBSD.org</email>
</author>
<published>2020-11-29T19:43:33Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test/commit/?id=d1d941c5b910e075495cb06b92a99d3a3e7a3d6c'/>
<id>urn:sha1:d1d941c5b910e075495cb06b92a99d3a3e7a3d6c</id>
<content type='text'>
ROUTE_MPATH is the new config option controlling new multipath routing
 implementation. Remove the last pieces of RADIX_MPATH-related code and
 the config option.

Reviewed by:	glebius
Differential Revision:	https://reviews.freebsd.org/D27244
</content>
</entry>
<entry>
<title>Refactor fib4/fib6 functions.</title>
<updated>2020-11-29T13:41:49Z</updated>
<author>
<name>Alexander V. Chernikov</name>
<email>melifaro@FreeBSD.org</email>
</author>
<published>2020-11-29T13:41:49Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test/commit/?id=b712e3e343c1437d28c90e9da28e7339426ba8e2'/>
<id>urn:sha1:b712e3e343c1437d28c90e9da28e7339426ba8e2</id>
<content type='text'>
No functional changes.

* Make lookup path of fib&lt;4|6&gt;_lookup_debugnet() separate functions
 (fib&lt;46&gt;_lookup_rt()). These will be used in the control plane code
 requiring unlocked radix operations and actual prefix pointer.
* Make lookup part of fib&lt;4|6&gt;_check_urpf() separate functions.
 This change simplifies the switch to alternative lookup implementations,
 which helps algorithmic lookups introduction.
* While here, use static initializers for IPv4/IPv6 keys

Differential Revision:	https://reviews.freebsd.org/D27405
</content>
</entry>
<entry>
<title>Fix two occurences of a typo in a comment introduced in r367530.</title>
<updated>2020-11-23T10:13:56Z</updated>
<author>
<name>Michael Tuexen</name>
<email>tuexen@FreeBSD.org</email>
</author>
<published>2020-11-23T10:13:56Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test/commit/?id=75fcd27ac28333bc204947400f21f7a3ac81fb28'/>
<id>urn:sha1:75fcd27ac28333bc204947400f21f7a3ac81fb28</id>
<content type='text'>
Reported by:		lstewart@
MFC after:		1 week
Differential Revision:	https://reviews.freebsd.org/D27148
</content>
</entry>
<entry>
<title>Refactor rib iterator functions.</title>
<updated>2020-11-22T20:21:10Z</updated>
<author>
<name>Alexander V. Chernikov</name>
<email>melifaro@FreeBSD.org</email>
</author>
<published>2020-11-22T20:21:10Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test/commit/?id=7511a638255051fa0bf18a945cb04bfa513c9242'/>
<id>urn:sha1:7511a638255051fa0bf18a945cb04bfa513c9242</id>
<content type='text'>
* Make rib_walk() order of arguments consistent with the rest of RIB api
* Add rib_walk_ext() allowing to exec callback before/after iteration.
* Rename rt_foreach_fib_walk_del -&gt; rib_foreach_table_walk_del
* Rename rt_forach_fib_walk -&gt; rib_foreach_table_walk
* Move rib_foreach_table_walk{_del} to route/route_helpers.c
* Slightly refactor rib_foreach_table_walk{_del} to make the implementation
 consistent and prepare for upcoming iterator optimizations.

Differential Revision:	https://reviews.freebsd.org/D27219
</content>
</entry>
<entry>
<title>Fix an issue I introuced in r367530: tcp_twcheck() can be called</title>
<updated>2020-11-20T13:00:28Z</updated>
<author>
<name>Michael Tuexen</name>
<email>tuexen@FreeBSD.org</email>
</author>
<published>2020-11-20T13:00:28Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test/commit/?id=47384244f90374f5e27eb749cfe0edabf93c62e5'/>
<id>urn:sha1:47384244f90374f5e27eb749cfe0edabf93c62e5</id>
<content type='text'>
with to == NULL for SYN segments. So don't assume tp != NULL.
Thanks to jhb@ for reporting and suggesting a fix.

PR:			250499
MFC after:		1 week
XMFC-with:		r367530
Sponsored by:		Netflix, Inc.
</content>
</entry>
</feed>
