Skip to content
Snippets Groups Projects
This project is mirrored from https://github.com/nplab/packetdrill. Pull mirroring failed .
Repository mirroring has been paused due to too many failed attempts. It can be resumed by a project maintainer or owner.
Last successful update .
  1. Jul 23, 2017
  2. Jun 01, 2017
  3. May 23, 2017
  4. Jun 29, 2016
  5. May 23, 2015
  6. May 21, 2015
  7. May 14, 2015
  8. May 01, 2015
    • Michael Tüxen's avatar
      Add initial support for SCTP tests. · 1672402c
      Michael Tüxen authored
      Current limitations:
      * Chunk parameters are not yet supported.
      * Error causes are not yet supported.
      * Chunks can't be bundled with COOKIE-ECHO chunks.
      * Chunk flags are not supported.
      * Chunk lengths are not supported.
      * Gap reports and duplicate TSNs are not supported for SACK chunks.
      * SCTP related ICMP messages are not supported.
      This version is only tested in a limited way, only on FreeBSD and
      only in local mode.
      1672402c
  9. Dec 28, 2014
    • Michael Tüxen's avatar
      Add support for UDPLite (RFC 3828) · 5acc3289
      Michael Tüxen authored
      
      This commit adds support for UDPLite as specified in RFC 3828
      and the corresponding socket options.
      It is tested on FreeBSD 10.1 and Linux, the platforms supporting
      UDPLite.
      
      Signed-off-by: default avatarMichael Tuexen <tuexen@fh-muenster.de>
      5acc3289
    • Michael Tüxen's avatar
      Fix alignment of headers in the packet buffer · a9e2e535
      Michael Tüxen authored
      
      This patch makes sure that all heaaders start at a four byte
      boundary. This is done by not having the ethernet header, which
      is 14 bytes long, in the packet buffer.
      This fixes the remote mode for platforms having strict alignment
      restrictions, like ARM. Without this patch you can't use the remote
      mode on a Rasperry Pi running FreeBSD.
      This patch has been tested on Linux (Intel) in local and remote mode
      and one FreeBSD (Intel and ARM) in local and remote mode.
      
      Signed-off-by: default avatarMichael Tuexen <tuexen@fh-muenster.de>
      a9e2e535
  10. May 09, 2014
    • Neal Cardwell's avatar
      net-test: packetdrill: read outbound packets from tun device · d799c219
      Neal Cardwell authored
      In local mode, read the outbound packets from the tun device.
      
      A recent Linux patch "tcp: avoid retransmits of TCP packets hanging in
      host queues" means that TCP behavior now depends on whether and when
      the network device (tun device here) consumes the packets. We now read
      all these packets so that the kernel can exercise its normal code
      paths for packet transmit completion.
      
      An alternative approach would be to set the tun txqueuelen to 0, but
      this would impact qdisc behavior. It is more realistic, and has fewer
      side-effects, to make sure the network device has a non-zero queue
      length, but packets are still consumed.
      
      Change-Id: Ia922994d4eeea12e61d7876b4c4ef34bc9cef34e
      d799c219
  11. Jan 24, 2014
    • Neal Cardwell's avatar
      net-test: packetdrill: fix bug in remote mode packet sniffing direction · 05737427
      Neal Cardwell authored
      Fix wire_server_netdev_receive() to reflect the fact that in remote
      mode the server is sniffing packets that are inbound (whereas in local
      mode we are sniffing *outbound* packets).
      
      This was a bug introduced in "net-test: packetdrill encap
      support: refactor packet receive loops into one loop".
      
      Remote mode has been broken since the addition of encapsulation
      support, partly due to this issue.
      
      Change-Id: Ia92f70f48ae90cb2e089ee51d728473a12c63595
      05737427
  12. Nov 30, 2013
    • Neal Cardwell's avatar
      net-test: packetdrill: support remote prefixes of arbitrary length · 8c2959a0
      Neal Cardwell authored
      Allow the --remote_ip config parameter to be a prefix, not just a
      single address. The entire remote prefix is routed to the tun device
      or remote packetdrill machine.
      
      The goal here is to all tests to use more than one remote IP. The
      immediate motivation is testing GRE, where there is a remote IP for
      the TCP endpoint and a separate remote IP for the GRE decapsulator.
      But eventually we'll also want to allow testing multiple concurrent
      TCP connections from multiple remote IPs addresses as well.
      
      Here are examples of the remote prefix you get for various values of
      the --remote_ip field. These are chosen for convenience and backwards
      compatibility with existing tests that are already using the
      --remote_ip parameter.
      
      o Default:
      
      configuration                      remote prefix
      ------------------------------     -----------------
      IPv4, no --remote_ip            -> 192.0.2.0/24   (default)
      v4/6, no --remote_ip            -> 192.0.2.0/24   (default)
      IPv6, no --remote_ip            -> 2001:DB8::0/32 (default)
      
      o Explicit IP without prefix length (prefix includes all bits):
      
      configuration                      remote prefix
      ------------------------------     -----------------
      IPv4 --remote_ip=10.248.0.3     -> 10.248.0.3/32
      v4/6 --remote_ip=10.248.0.3     -> 10.248.0.3/32
      IPv6 --remote_ip=2001:db8::3    -> 2001:db8::3/128
      
      o Explicit with prefix length:
      
      configuration                      remote prefix
      ------------------------------     -----------------
      IPv4 --remote_ip=10.248.0.3/16  -> 10.248.0.0/16
      v4/6 --remote_ip=10.248.0.3/16  -> 10.248.0.0/16
      IPv6 --remote_ip=2001:db8::3/16 -> 2001::0/16
      
      Change-Id: Ibc95c3419d66bcf1bbfd8a1fc7650d0003345ef2
      8c2959a0
  13. Nov 28, 2013
    • Neal Cardwell's avatar
      net-test: packetdrill encap support: free unknown sniffed packets · f023c1e8
      Neal Cardwell authored
      When we sniff an unknown packet, free it and allocate another packet
      at the top of the sniffing loop. Previously we were not clearing state
      after parsing an unknown packet, so state from the unkbown packet
      could linger on, co-mingling with state from the next sniffed packet.
      
      
      Change-Id: Ia9a330766969b114fd6084a087ff3f0d6b11d9d4
      f023c1e8
    • Neal Cardwell's avatar
      net-test: packetdrill encap support: refactor packet receive loops into one loop · d0e56fdd
      Neal Cardwell authored
      Factor out the packet sniffing loop that's common to local and remote
      mode, since it is nearly identical in both cases. This is in
      preparation for fixing a bug that is found in both loops, so we can
      make the fix in just one place.
      
      
      Change-Id: Ic9a9b84b66a9f812866b1e29cd7c897f7c1d40cf
      d0e56fdd
  14. Jun 26, 2013
Loading