History log of /freebsd/sys/netinet/sctputil.c (Results 1 – 25 of 716)
Revision (<<< Hide revision tags) (Show revision tags >>>) Date Author Comments
# 532106f7 22-Feb-2025 Gleb Smirnoff <glebius@FreeBSD.org>

netinet: use in_broadcast() inline

There should be no functional change.

Reviewed by: rrs, markj
Differential Revision: https://reviews.freebsd.org/D49088


Revision tags: release/14.2.0-p2, release/14.1.0-p8, release/13.4.0-p4, release/14.1.0-p7, release/14.2.0-p1, release/13.4.0-p3, release/14.2.0, release/13.4.0, release/14.1.0
# 5120ea0d 10-May-2024 Michael Tuexen <tuexen@FreeBSD.org>

sctp: improve heartbeat timer computation
PR: 278666
Reviewed by: Albin Hellqvist
MFC after: 3 days
Pull Request: https://reviews.freebsd.org/D45107


# 9d8a3718 10-May-2024 Michael Tuexen <tuexen@FreeBSD.org>

sctp: store cookie secret change time as time_t
Reported by: Coverity Scan
CID: 1492349
CID: 1493281
MFC after: 3 days


Revision tags: release/13.3.0
# f79a8585 30-Jan-2024 Gleb Smirnoff <glebius@FreeBSD.org>

sockets: garbage collect SS_ISCONFIRMING

Fixes: 8df32b19dee92b5eaa4b488ae78dca6accfcb38e


Revision tags: release/14.0.0
# 1e81a4e7 08-Sep-2023 Michael Tuexen <tuexen@FreeBSD.org>

sctp: don't call sctp_ulp_notify() recursively

This does not work with the new locking scheme.

MFC after: 3 days


# f9425b3a 08-Sep-2023 Michael Tuexen <tuexen@FreeBSD.org>

sctp: cleanup locking for notifications

All notifications are now queued via sctp_ulp_notify(). Do
the locking of the inp read lock there and validate this in all
functions being used.
This is one s

sctp: cleanup locking for notifications

All notifications are now queued via sctp_ulp_notify(). Do
the locking of the inp read lock there and validate this in all
functions being used.
This is one step in avoiding race conditions when closing the
read end of an SCTP socket.

MFC after: 3 days

show more ...


# 3ac76647 08-Sep-2023 Michael Tuexen <tuexen@FreeBSD.org>

sctp: make sure all SCTP RESET notifications use sctp_ulp_notify()

While there, improve consistency of the notification related code.
No functional change intended.

MFC after: 3 days


# cd3770c5 08-Sep-2023 Michael Tuexen <tuexen@FreeBSD.org>

sctp: cleanup SCTP AUTH related notification

This makes consistent use of the parameters and ensures that
all SCTP AUTH related notifications are using sctp_ulp_notify().

No functional change inten

sctp: cleanup SCTP AUTH related notification

This makes consistent use of the parameters and ensures that
all SCTP AUTH related notifications are using sctp_ulp_notify().

No functional change intended.

MFC after: 3 days

show more ...


# e40d16ad 25-Aug-2023 Michael Tuexen <tuexen@FreeBSD.org>

sctp: cleanup

In particular, don't use a socket level flag, use the inp level one.
After adding appropriate locking, this will close a race condition.

MFC after: 1 week


# c3179e66 18-Aug-2023 Michael Tuexen <tuexen@FreeBSD.org>

sctp: cleanup cdefs.h include


# 685dc743 16-Aug-2023 Warner Losh <imp@FreeBSD.org>

sys: Remove $FreeBSD$: one-line .c pattern

Remove /^[\s*]*__FBSDID\("\$FreeBSD\$"\);?\s*\n/


# 749a7fb5 14-Aug-2023 Michael Tuexen <tuexen@FreeBSD.org>

sctp: cleanup

Do not put a variable in the stcb for passing it to a function.
Just use a parameter of the function. No functional change intended.

MFC after: 1 week


# e8eb0b71 13-Aug-2023 Michael Tuexen <tuexen@FreeBSD.org>

sctp: add an assert

This enforces a condition mentioned in a comment.

MFC after: 1 week


# 10b2b306 05-Aug-2023 Michael Tuexen <tuexen@FreeBSD.org>

sctp: improve consistency

MFC after: 1 week


# e3771cc0 05-Aug-2023 Michael Tuexen <tuexen@FreeBSD.org>

sctp: remove redundant check

This is already checked by the caller.

MFC after: 1 week


# c6207881 28-Jul-2023 Michael Tuexen <tuexen@FreeBSD.org>

sctp: keep sb_acc and sb_ccc in sync

PR: 260116
MFC after: 1 week


# b279e84a 28-Jul-2023 Michael Tuexen <tuexen@FreeBSD.org>

sctp: improve consistency

This is simplifying a patch to address PR 260116.

PR: 260116
MFC after: 1 week


# 52640d61 23-Jul-2023 Michael Tuexen <tuexen@FreeBSD.org>

sctp: update zero checksum support

Implement support for the error detection method identifier.
MFC after: 2 weeks


Revision tags: release/13.2.0
# 4a2b92d9 10-Mar-2023 Michael Tuexen <tuexen@FreeBSD.org>

sctp: initial implementation of draft-tuexen-tsvwg-sctp-zero-checksum


# 7b2f1a7f 02-Feb-2023 Michael Tuexen <tuexen@FreeBSD.org>

sctp: improve delivery of stream reset notifications

Two functions are not called via sctp_ulp_notify() and therefore
need additional checks when being called.

Reported by: syzbot+eb888d3a5a6c54413

sctp: improve delivery of stream reset notifications

Two functions are not called via sctp_ulp_notify() and therefore
need additional checks when being called.

Reported by: syzbot+eb888d3a5a6c54413de5@syzkaller.appspotmail.com
MFC after: 3 days

show more ...


Revision tags: release/12.4.0
# fcb3f813 04-Oct-2022 Gleb Smirnoff <glebius@FreeBSD.org>

netinet*: remove PRC_ constants and streamline ICMP processing

In the original design of the network stack from the protocol control
input method pr_ctlinput was used notify the protocols about two

netinet*: remove PRC_ constants and streamline ICMP processing

In the original design of the network stack from the protocol control
input method pr_ctlinput was used notify the protocols about two very
different kinds of events: internal system events and receival of an
ICMP messages from outside. These events were coded with PRC_ codes.
Today these methods are removed from the protosw(9) and are isolated
to IPv4 and IPv6 stacks and are called only from icmp*_input(). The
PRC_ codes now just create a shim layer between ICMP codes and errors
or actions taken by protocols.

- Change ipproto_ctlinput_t to pass just pointer to ICMP header. This
allows protocols to not deduct it from the internal IP header.
- Change ip6proto_ctlinput_t to pass just struct ip6ctlparam pointer.
It has all the information needed to the protocols. In the structure,
change ip6c_finaldst fields to sockaddr_in6. The reason is that
icmp6_input() already has this address wrapped in sockaddr, and the
protocols want this address as sockaddr.
- For UDP tunneling control input, as well as for IPSEC control input,
change the prototypes to accept a transparent union of either ICMP
header pointer or struct ip6ctlparam pointer.
- In icmp_input() and icmp6_input() do only validation of ICMP header and
count bad packets. The translation of ICMP codes to errors/actions is
done by protocols.
- Provide icmp_errmap() and icmp6_errmap() as substitute to inetctlerrmap,
inet6ctlerrmap arrays.
- In protocol ctlinput methods either trust what icmp_errmap() recommend,
or do our own logic based on the ICMP header.

Differential revision: https://reviews.freebsd.org/D36731

show more ...


# a5c2009d 04-Jun-2022 Michael Tuexen <tuexen@FreeBSD.org>

sctp: improve handling of sctp inpcb flags

Use an atomic operation when the inp is not write locked.

Reported by: syzbot+bf27083e9a3f8fde8b4d@syzkaller.appspotmail.com
MFC after: 3 days


# 5cebd830 23-May-2022 Michael Tuexen <tuexen@FreeBSD.org>

sctp: more sb_cc related cleanups

No functional change intended. It allows a simpler patch for PR 260116.

MFC after: 3 days


# edc5b6ea 14-May-2022 Michael Tuexen <tuexen@FreeBSD.org>

sctp: use sb_avail() when accessing sb_acc for reading

This is a cleanup to simplify a patch for PR 260116.

PR: 260116
MFC after: 3 days


# f210e4fb 14-May-2022 Michael Tuexen <tuexen@FreeBSD.org>

sctp: cleanup, no functional change intended

MFC after: 3 days


12345678910>>...29