<feed xmlns='http://www.w3.org/2005/Atom'>
<title>src/sys/netinet6, branch release/13.4.0</title>
<subtitle>FreeBSD source tree</subtitle>
<id>https://cgit-dev.freebsd.org/src/atom?h=release%2F13.4.0</id>
<link rel='self' href='https://cgit-dev.freebsd.org/src/atom?h=release%2F13.4.0'/>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/'/>
<updated>2024-08-08T22:41:29Z</updated>
<entry>
<title>nd6: Fix the routing table subscription</title>
<updated>2024-08-08T22:41:29Z</updated>
<author>
<name>Mark Johnston</name>
<email>markj@FreeBSD.org</email>
</author>
<published>2024-07-25T14:26:36Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=751c889691cc93087251a5af45b6da796d5d2e85'/>
<id>urn:sha1:751c889691cc93087251a5af45b6da796d5d2e85</id>
<content type='text'>
The nd6 code listens for RTM_DELETE events so that it can mark the
corresponding default router as inactive in the case where the default
route is deleted.  A subsequent RA from the router may then reinstall
the default route.

Commit fedeb08b6a58e broke this for non-multipath routes, as
rib_decompose_notification() only invokes the callback for multipath
routes.  Restore the old behaviour.  Also ensure that we update the
router only for RTM_DELETE notifications, lost in commit 2259a03020fe0.

Approved by:	re (cperciva)
Reviewed by:	bz
Fixes:	fedeb08b6a58 ("Introduce scalable route multipath.")
Fixes:	2259a03020fe ("Rework part of routing code to reduce difference to D26449.")
MFC after:	2 weeks
Sponsored by:	Klara, Inc.
Sponsored by:	Bell Tower Integration
Differential Revision:	https://reviews.freebsd.org/D46020

(cherry picked from commit a48df53e4249499be3e8779dd30888a405aa81ae)
(cherry picked from commit c611f050d0dc01bf1f738300365895da84aa5fef)
</content>
</entry>
<entry>
<title>inet6: protect address manipulation with a lock</title>
<updated>2024-05-10T16:27:07Z</updated>
<author>
<name>Mateusz Guzik</name>
<email>mjg@FreeBSD.org</email>
</author>
<published>2023-03-29T12:46:41Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=ff99bfe3ef739a026e0cf554295774c8bf02d326'/>
<id>urn:sha1:ff99bfe3ef739a026e0cf554295774c8bf02d326</id>
<content type='text'>
This is a total hack/bare minimum which follows inet4.

Otherwise 2 threads removing the same address can easily crash.

Reviewed by:	kp
Sponsored by:	Rubicon Communications, LLC ("Netgate")
Differential Revision:	https://reviews.freebsd.org/D39317

(cherry picked from commit f5a365e51feea75d1e5ebc86c53808d8cae7b6d7)
</content>
</entry>
<entry>
<title>inpcb: Restore some NULL checks of credential pointers</title>
<updated>2024-02-07T14:46:34Z</updated>
<author>
<name>Mark Johnston</name>
<email>markj@FreeBSD.org</email>
</author>
<published>2024-02-07T14:43:25Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=fe8df7ed1aae444a09361c080d52bfcb6aaae64f'/>
<id>urn:sha1:fe8df7ed1aae444a09361c080d52bfcb6aaae64f</id>
<content type='text'>
At least one out-of-tree port (net-mgmt/ng_ipacct) depends on being able
to call in_pcblookup_local() with cred == NULL, so the MFC of commit
ac1750dd143e ("inpcb: Remove NULL checks of credential references")
broke compatibility.

Restore a subset of the NULL checks to avoid breaking the module in the
13.3 release.  This is a direct commit to stable/13.

PR:		276868
</content>
</entry>
<entry>
<title>netinet6: Fix two typos in source code comments</title>
<updated>2024-01-25T06:52:11Z</updated>
<author>
<name>Gordon Bergling</name>
<email>gbe@FreeBSD.org</email>
</author>
<published>2024-01-22T20:48:34Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=e347b72a3914be25ff77f987511165fc1af4562c'/>
<id>urn:sha1:e347b72a3914be25ff77f987511165fc1af4562c</id>
<content type='text'>
- s/adddress/address/

(cherry picked from commit 496432f192165b8700da4b0ab8ebdd253002e265)
</content>
</entry>
<entry>
<title>inpcb: Allow SO_REUSEPORT_LB to be used in jails</title>
<updated>2024-01-22T18:45:03Z</updated>
<author>
<name>Mark Johnston</name>
<email>markj@FreeBSD.org</email>
</author>
<published>2022-11-02T17:08:07Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=535984471641c9435854ed23a80e49a8bf0e53b0'/>
<id>urn:sha1:535984471641c9435854ed23a80e49a8bf0e53b0</id>
<content type='text'>
Currently SO_REUSEPORT_LB silently does nothing when set by a jailed
process.  It is trivial to support this option in VNET jails, but it's
also useful in traditional jails.

This patch enables LB groups in jails with the following semantics:
- all PCBs in a group must belong to the same jail,
- PCB lookup prefers jailed groups to non-jailed groups

This is a straightforward extension of the semantics used for individual
listening sockets.  One pre-existing quirk of the lbgroup implementation
is that non-jailed lbgroups are searched before jailed listening
sockets; that is preserved with this change.

Discussed with:	glebius
MFC after:	1 month
Sponsored by:	Modirum MDPay
Sponsored by:	Klara, Inc.
Differential Revision:	https://reviews.freebsd.org/D37029

(cherry picked from commit d93ec8cb1324d04d7cae19fb7fa98ade2ff33c80)
</content>
</entry>
<entry>
<title>inpcb: Remove NULL checks of credential references</title>
<updated>2024-01-22T18:45:03Z</updated>
<author>
<name>Mark Johnston</name>
<email>markj@FreeBSD.org</email>
</author>
<published>2022-11-02T17:03:41Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=3e27fcf057937ef93258dc4f8e67a308e02f349c'/>
<id>urn:sha1:3e27fcf057937ef93258dc4f8e67a308e02f349c</id>
<content type='text'>
Some auditing of the code shows that "cred" is never non-NULL in these
functions, either because all callers pass a non-NULL reference or
because they unconditionally dereference "cred".  So, let's simplify the
code a bit and remove NULL checks.  No functional change intended.

Reviewed by:	glebius
MFC after:	1 week
Sponsored by:	Modirum MDPay
Sponsored by:	Klara, Inc.
Differential Revision:	https://reviews.freebsd.org/D37025

(cherry picked from commit ac1750dd143e53225c518bc1ca0462c3fffe10f6)
</content>
</entry>
<entry>
<title>routing: plug mbuf leak for the packets hitting IPv6 blackhole route</title>
<updated>2024-01-22T18:21:34Z</updated>
<author>
<name>Alexander V. Chernikov</name>
<email>melifaro@FreeBSD.org</email>
</author>
<published>2023-05-17T09:06:04Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=166bc357c6a4813e7c03ecaea54d7ef6508e7132'/>
<id>urn:sha1:166bc357c6a4813e7c03ecaea54d7ef6508e7132</id>
<content type='text'>
Reported by:	Dmitriy Smirnov &lt;fox@sage.su&gt;
Tested by:	Dmitriy Smirnov &lt;fox@sage.su&gt;
MFC after:	1 day

(cherry picked from commit b50e1465e88dcf5f6f008892d802df010e7029d1)
</content>
</entry>
<entry>
<title>sys: Use mbufq_empty instead of comparing mbufq_len against 0</title>
<updated>2024-01-18T22:37:32Z</updated>
<author>
<name>John Baldwin</name>
<email>jhb@FreeBSD.org</email>
</author>
<published>2024-01-09T19:00:46Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=3c274e9efb46330e87ad36619c79cadedd776664'/>
<id>urn:sha1:3c274e9efb46330e87ad36619c79cadedd776664</id>
<content type='text'>
Reviewed by:	bz, emaste
Sponsored by:	Chelsio Communications
Differential Revision:	https://reviews.freebsd.org/D43338

(cherry picked from commit 8cb9b68f5821e45c63ee08d8ee3029ca523ac174)
</content>
</entry>
<entry>
<title>sctp: cleanup cdefs.h include</title>
<updated>2024-01-11T12:44:49Z</updated>
<author>
<name>Michael Tuexen</name>
<email>tuexen@FreeBSD.org</email>
</author>
<published>2023-08-18T13:25:34Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=bb374dd2c10317ee18a50ff99d3474acb0be74a0'/>
<id>urn:sha1:bb374dd2c10317ee18a50ff99d3474acb0be74a0</id>
<content type='text'>
(cherry picked from commit c3179e6660e1365111b89cb6c05c3a4c47375e73)
</content>
</entry>
<entry>
<title>sctp: remove duplicate code</title>
<updated>2024-01-11T12:30:20Z</updated>
<author>
<name>Michael Tuexen</name>
<email>tuexen@FreeBSD.org</email>
</author>
<published>2023-08-08T11:05:39Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=31acdb17668ec28798fdace1f1f192d18ec50765'/>
<id>urn:sha1:31acdb17668ec28798fdace1f1f192d18ec50765</id>
<content type='text'>
No functional change intended.

(cherry picked from commit 9ade2745db8be213e9da2225795cafb8e7575e29)
</content>
</entry>
</feed>
