summaryrefslogtreecommitdiffstats
path: root/regress/sys/netinet/pmtu/tcp_connect6.py (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Switch to scapy with python 3.bluhm2020-12-251-12/+12
|
* Replace fork with sniffer thread in Python. Clear the BPF listbluhm2018-07-301-8/+26
| | | | | before sniffing, Scapy 2.4.0 remembers old packets that confuse the test.
* Our kernel does not generate IPv6 atomic fragments anymore. Checkbluhm2017-01-191-1/+2
| | | | that the test does not receive any.
* Sending a PMTU ICMP packet will trigger a TCP retransmit. The testbluhm2017-01-191-3/+10
| | | | | | | assumed that it would have to send an additional ACK for that. There was a race where the test could miss the TCP retransmit before it did send the ACK. Sniff for the TCP retransmit before sending the ICMP packet and do not send the ACK.
* Do not use privileged or NFS source ports for UDP packets as inetdbluhm2017-01-181-2/+2
| | | | | ignores such packets. This should avoid some sporadic failures. While there, use variable names consistently in all tests.
* Add tests that generate IPv6 atomic fragments for UDP and TCP bybluhm2017-01-181-1/+1
| | | | sending an ICMP6 too big packet with MTU 1272.
* Print better error messages in case an expected packet is missing.bluhm2016-12-131-0/+12
|
* Add regression tests for the path MTU discovery implementation in bluhm2016-07-111-0/+40
the kernel. Generate TCP and TCP6 and UDP6 packets with Scapy, check the kernel's reaction to ICMP fragmentation needed and ICMP6 packet too big. OK mpi@