#
532106f7 |
| 22-Feb-2025 |
Gleb Smirnoff <glebius@FreeBSD.org> |
netinet: use in_broadcast() inline
There should be no functional change.
Reviewed by: rrs, markj Differential Revision: https://reviews.freebsd.org/D49088
|
Revision tags: release/14.2.0-p2, release/14.1.0-p8, release/13.4.0-p4, release/14.1.0-p7, release/14.2.0-p1, release/13.4.0-p3, release/14.2.0, release/13.4.0, release/14.1.0 |
|
#
5120ea0d |
| 10-May-2024 |
Michael Tuexen <tuexen@FreeBSD.org> |
sctp: improve heartbeat timer computation PR: 278666 Reviewed by: Albin Hellqvist MFC after: 3 days Pull Request: https://reviews.freebsd.org/D45107
|
#
9d8a3718 |
| 10-May-2024 |
Michael Tuexen <tuexen@FreeBSD.org> |
sctp: store cookie secret change time as time_t Reported by: Coverity Scan CID: 1492349 CID: 1493281 MFC after: 3 days
|
Revision tags: release/13.3.0 |
|
#
f79a8585 |
| 30-Jan-2024 |
Gleb Smirnoff <glebius@FreeBSD.org> |
sockets: garbage collect SS_ISCONFIRMING
Fixes: 8df32b19dee92b5eaa4b488ae78dca6accfcb38e
|
Revision tags: release/14.0.0 |
|
#
1e81a4e7 |
| 08-Sep-2023 |
Michael Tuexen <tuexen@FreeBSD.org> |
sctp: don't call sctp_ulp_notify() recursively
This does not work with the new locking scheme.
MFC after: 3 days
|
#
f9425b3a |
| 08-Sep-2023 |
Michael Tuexen <tuexen@FreeBSD.org> |
sctp: cleanup locking for notifications
All notifications are now queued via sctp_ulp_notify(). Do the locking of the inp read lock there and validate this in all functions being used. This is one s
sctp: cleanup locking for notifications
All notifications are now queued via sctp_ulp_notify(). Do the locking of the inp read lock there and validate this in all functions being used. This is one step in avoiding race conditions when closing the read end of an SCTP socket.
MFC after: 3 days
show more ...
|
#
3ac76647 |
| 08-Sep-2023 |
Michael Tuexen <tuexen@FreeBSD.org> |
sctp: make sure all SCTP RESET notifications use sctp_ulp_notify()
While there, improve consistency of the notification related code. No functional change intended.
MFC after: 3 days
|
#
cd3770c5 |
| 08-Sep-2023 |
Michael Tuexen <tuexen@FreeBSD.org> |
sctp: cleanup SCTP AUTH related notification
This makes consistent use of the parameters and ensures that all SCTP AUTH related notifications are using sctp_ulp_notify().
No functional change inten
sctp: cleanup SCTP AUTH related notification
This makes consistent use of the parameters and ensures that all SCTP AUTH related notifications are using sctp_ulp_notify().
No functional change intended.
MFC after: 3 days
show more ...
|
#
e40d16ad |
| 25-Aug-2023 |
Michael Tuexen <tuexen@FreeBSD.org> |
sctp: cleanup
In particular, don't use a socket level flag, use the inp level one. After adding appropriate locking, this will close a race condition.
MFC after: 1 week
|
#
c3179e66 |
| 18-Aug-2023 |
Michael Tuexen <tuexen@FreeBSD.org> |
sctp: cleanup cdefs.h include
|
#
685dc743 |
| 16-Aug-2023 |
Warner Losh <imp@FreeBSD.org> |
sys: Remove $FreeBSD$: one-line .c pattern
Remove /^[\s*]*__FBSDID\("\$FreeBSD\$"\);?\s*\n/
|
#
749a7fb5 |
| 14-Aug-2023 |
Michael Tuexen <tuexen@FreeBSD.org> |
sctp: cleanup
Do not put a variable in the stcb for passing it to a function. Just use a parameter of the function. No functional change intended.
MFC after: 1 week
|
#
e8eb0b71 |
| 13-Aug-2023 |
Michael Tuexen <tuexen@FreeBSD.org> |
sctp: add an assert
This enforces a condition mentioned in a comment.
MFC after: 1 week
|
#
10b2b306 |
| 05-Aug-2023 |
Michael Tuexen <tuexen@FreeBSD.org> |
sctp: improve consistency
MFC after: 1 week
|
#
e3771cc0 |
| 05-Aug-2023 |
Michael Tuexen <tuexen@FreeBSD.org> |
sctp: remove redundant check
This is already checked by the caller.
MFC after: 1 week
|
#
c6207881 |
| 28-Jul-2023 |
Michael Tuexen <tuexen@FreeBSD.org> |
sctp: keep sb_acc and sb_ccc in sync
PR: 260116 MFC after: 1 week
|
#
b279e84a |
| 28-Jul-2023 |
Michael Tuexen <tuexen@FreeBSD.org> |
sctp: improve consistency
This is simplifying a patch to address PR 260116.
PR: 260116 MFC after: 1 week
|
#
52640d61 |
| 23-Jul-2023 |
Michael Tuexen <tuexen@FreeBSD.org> |
sctp: update zero checksum support
Implement support for the error detection method identifier. MFC after: 2 weeks
|
Revision tags: release/13.2.0 |
|
#
4a2b92d9 |
| 10-Mar-2023 |
Michael Tuexen <tuexen@FreeBSD.org> |
sctp: initial implementation of draft-tuexen-tsvwg-sctp-zero-checksum
|
#
7b2f1a7f |
| 02-Feb-2023 |
Michael Tuexen <tuexen@FreeBSD.org> |
sctp: improve delivery of stream reset notifications
Two functions are not called via sctp_ulp_notify() and therefore need additional checks when being called.
Reported by: syzbot+eb888d3a5a6c54413
sctp: improve delivery of stream reset notifications
Two functions are not called via sctp_ulp_notify() and therefore need additional checks when being called.
Reported by: syzbot+eb888d3a5a6c54413de5@syzkaller.appspotmail.com MFC after: 3 days
show more ...
|
Revision tags: release/12.4.0 |
|
#
fcb3f813 |
| 04-Oct-2022 |
Gleb Smirnoff <glebius@FreeBSD.org> |
netinet*: remove PRC_ constants and streamline ICMP processing
In the original design of the network stack from the protocol control input method pr_ctlinput was used notify the protocols about two
netinet*: remove PRC_ constants and streamline ICMP processing
In the original design of the network stack from the protocol control input method pr_ctlinput was used notify the protocols about two very different kinds of events: internal system events and receival of an ICMP messages from outside. These events were coded with PRC_ codes. Today these methods are removed from the protosw(9) and are isolated to IPv4 and IPv6 stacks and are called only from icmp*_input(). The PRC_ codes now just create a shim layer between ICMP codes and errors or actions taken by protocols.
- Change ipproto_ctlinput_t to pass just pointer to ICMP header. This allows protocols to not deduct it from the internal IP header. - Change ip6proto_ctlinput_t to pass just struct ip6ctlparam pointer. It has all the information needed to the protocols. In the structure, change ip6c_finaldst fields to sockaddr_in6. The reason is that icmp6_input() already has this address wrapped in sockaddr, and the protocols want this address as sockaddr. - For UDP tunneling control input, as well as for IPSEC control input, change the prototypes to accept a transparent union of either ICMP header pointer or struct ip6ctlparam pointer. - In icmp_input() and icmp6_input() do only validation of ICMP header and count bad packets. The translation of ICMP codes to errors/actions is done by protocols. - Provide icmp_errmap() and icmp6_errmap() as substitute to inetctlerrmap, inet6ctlerrmap arrays. - In protocol ctlinput methods either trust what icmp_errmap() recommend, or do our own logic based on the ICMP header.
Differential revision: https://reviews.freebsd.org/D36731
show more ...
|
#
a5c2009d |
| 04-Jun-2022 |
Michael Tuexen <tuexen@FreeBSD.org> |
sctp: improve handling of sctp inpcb flags
Use an atomic operation when the inp is not write locked.
Reported by: syzbot+bf27083e9a3f8fde8b4d@syzkaller.appspotmail.com MFC after: 3 days
|
#
5cebd830 |
| 23-May-2022 |
Michael Tuexen <tuexen@FreeBSD.org> |
sctp: more sb_cc related cleanups
No functional change intended. It allows a simpler patch for PR 260116.
MFC after: 3 days
|
#
edc5b6ea |
| 14-May-2022 |
Michael Tuexen <tuexen@FreeBSD.org> |
sctp: use sb_avail() when accessing sb_acc for reading
This is a cleanup to simplify a patch for PR 260116.
PR: 260116 MFC after: 3 days
|
#
f210e4fb |
| 14-May-2022 |
Michael Tuexen <tuexen@FreeBSD.org> |
sctp: cleanup, no functional change intended
MFC after: 3 days
|