|
@@ -2945,7 +2945,7 @@ sctp_disposition_t sctp_sf_eat_data_6_2(struct net *net,
|
|
return sctp_sf_violation_chunklen(net, ep, asoc, type, arg,
|
|
return sctp_sf_violation_chunklen(net, ep, asoc, type, arg,
|
|
commands);
|
|
commands);
|
|
|
|
|
|
- error = sctp_eat_data(asoc, chunk, commands );
|
|
|
|
|
|
+ error = sctp_eat_data(asoc, chunk, commands);
|
|
switch (error) {
|
|
switch (error) {
|
|
case SCTP_IERROR_NO_ERROR:
|
|
case SCTP_IERROR_NO_ERROR:
|
|
break;
|
|
break;
|
|
@@ -3066,7 +3066,7 @@ sctp_disposition_t sctp_sf_eat_data_fast_4_4(struct net *net,
|
|
return sctp_sf_violation_chunklen(net, ep, asoc, type, arg,
|
|
return sctp_sf_violation_chunklen(net, ep, asoc, type, arg,
|
|
commands);
|
|
commands);
|
|
|
|
|
|
- error = sctp_eat_data(asoc, chunk, commands );
|
|
|
|
|
|
+ error = sctp_eat_data(asoc, chunk, commands);
|
|
switch (error) {
|
|
switch (error) {
|
|
case SCTP_IERROR_NO_ERROR:
|
|
case SCTP_IERROR_NO_ERROR:
|
|
case SCTP_IERROR_HIGH_TSN:
|
|
case SCTP_IERROR_HIGH_TSN:
|
|
@@ -3765,7 +3765,7 @@ sctp_disposition_t sctp_sf_do_asconf_ack(struct net *net,
|
|
*/
|
|
*/
|
|
sctp_add_cmd_sf(commands, SCTP_CMD_TIMER_STOP,
|
|
sctp_add_cmd_sf(commands, SCTP_CMD_TIMER_STOP,
|
|
SCTP_TO(SCTP_EVENT_TIMEOUT_T4_RTO));
|
|
SCTP_TO(SCTP_EVENT_TIMEOUT_T4_RTO));
|
|
- sctp_add_cmd_sf(commands, SCTP_CMD_DISCARD_PACKET,SCTP_NULL());
|
|
|
|
|
|
+ sctp_add_cmd_sf(commands, SCTP_CMD_DISCARD_PACKET, SCTP_NULL());
|
|
sctp_add_cmd_sf(commands, SCTP_CMD_SET_SK_ERR,
|
|
sctp_add_cmd_sf(commands, SCTP_CMD_SET_SK_ERR,
|
|
SCTP_ERROR(ECONNABORTED));
|
|
SCTP_ERROR(ECONNABORTED));
|
|
sctp_add_cmd_sf(commands, SCTP_CMD_ASSOC_FAILED,
|
|
sctp_add_cmd_sf(commands, SCTP_CMD_ASSOC_FAILED,
|
|
@@ -3799,7 +3799,7 @@ sctp_disposition_t sctp_sf_do_asconf_ack(struct net *net,
|
|
/* We are going to ABORT, so we might as well stop
|
|
/* We are going to ABORT, so we might as well stop
|
|
* processing the rest of the chunks in the packet.
|
|
* processing the rest of the chunks in the packet.
|
|
*/
|
|
*/
|
|
- sctp_add_cmd_sf(commands, SCTP_CMD_DISCARD_PACKET,SCTP_NULL());
|
|
|
|
|
|
+ sctp_add_cmd_sf(commands, SCTP_CMD_DISCARD_PACKET, SCTP_NULL());
|
|
sctp_add_cmd_sf(commands, SCTP_CMD_SET_SK_ERR,
|
|
sctp_add_cmd_sf(commands, SCTP_CMD_SET_SK_ERR,
|
|
SCTP_ERROR(ECONNABORTED));
|
|
SCTP_ERROR(ECONNABORTED));
|
|
sctp_add_cmd_sf(commands, SCTP_CMD_ASSOC_FAILED,
|
|
sctp_add_cmd_sf(commands, SCTP_CMD_ASSOC_FAILED,
|
|
@@ -4451,7 +4451,7 @@ static sctp_disposition_t sctp_sf_violation_chunklen(
|
|
void *arg,
|
|
void *arg,
|
|
sctp_cmd_seq_t *commands)
|
|
sctp_cmd_seq_t *commands)
|
|
{
|
|
{
|
|
- static const char err_str[]="The following chunk had invalid length:";
|
|
|
|
|
|
+ static const char err_str[] = "The following chunk had invalid length:";
|
|
|
|
|
|
return sctp_sf_abort_violation(net, ep, asoc, arg, commands, err_str,
|
|
return sctp_sf_abort_violation(net, ep, asoc, arg, commands, err_str,
|
|
sizeof(err_str));
|
|
sizeof(err_str));
|
|
@@ -4514,7 +4514,7 @@ static sctp_disposition_t sctp_sf_violation_ctsn(
|
|
void *arg,
|
|
void *arg,
|
|
sctp_cmd_seq_t *commands)
|
|
sctp_cmd_seq_t *commands)
|
|
{
|
|
{
|
|
- static const char err_str[]="The cumulative tsn ack beyond the max tsn currently sent:";
|
|
|
|
|
|
+ static const char err_str[] = "The cumulative tsn ack beyond the max tsn currently sent:";
|
|
|
|
|
|
return sctp_sf_abort_violation(net, ep, asoc, arg, commands, err_str,
|
|
return sctp_sf_abort_violation(net, ep, asoc, arg, commands, err_str,
|
|
sizeof(err_str));
|
|
sizeof(err_str));
|
|
@@ -4534,7 +4534,7 @@ static sctp_disposition_t sctp_sf_violation_chunk(
|
|
void *arg,
|
|
void *arg,
|
|
sctp_cmd_seq_t *commands)
|
|
sctp_cmd_seq_t *commands)
|
|
{
|
|
{
|
|
- static const char err_str[]="The following chunk violates protocol:";
|
|
|
|
|
|
+ static const char err_str[] = "The following chunk violates protocol:";
|
|
|
|
|
|
if (!asoc)
|
|
if (!asoc)
|
|
return sctp_sf_violation(net, ep, asoc, type, arg, commands);
|
|
return sctp_sf_violation(net, ep, asoc, type, arg, commands);
|
|
@@ -6000,7 +6000,7 @@ static struct sctp_packet *sctp_ootb_pkt_new(struct net *net,
|
|
/* Special case the INIT-ACK as there is no peer's vtag
|
|
/* Special case the INIT-ACK as there is no peer's vtag
|
|
* yet.
|
|
* yet.
|
|
*/
|
|
*/
|
|
- switch(chunk->chunk_hdr->type) {
|
|
|
|
|
|
+ switch (chunk->chunk_hdr->type) {
|
|
case SCTP_CID_INIT_ACK:
|
|
case SCTP_CID_INIT_ACK:
|
|
{
|
|
{
|
|
sctp_initack_chunk_t *initack;
|
|
sctp_initack_chunk_t *initack;
|
|
@@ -6017,7 +6017,7 @@ static struct sctp_packet *sctp_ootb_pkt_new(struct net *net,
|
|
/* Special case the INIT and stale COOKIE_ECHO as there is no
|
|
/* Special case the INIT and stale COOKIE_ECHO as there is no
|
|
* vtag yet.
|
|
* vtag yet.
|
|
*/
|
|
*/
|
|
- switch(chunk->chunk_hdr->type) {
|
|
|
|
|
|
+ switch (chunk->chunk_hdr->type) {
|
|
case SCTP_CID_INIT:
|
|
case SCTP_CID_INIT:
|
|
{
|
|
{
|
|
sctp_init_chunk_t *init;
|
|
sctp_init_chunk_t *init;
|
|
@@ -6231,7 +6231,7 @@ static int sctp_eat_data(const struct sctp_association *asoc,
|
|
/* We are going to ABORT, so we might as well stop
|
|
/* We are going to ABORT, so we might as well stop
|
|
* processing the rest of the chunks in the packet.
|
|
* processing the rest of the chunks in the packet.
|
|
*/
|
|
*/
|
|
- sctp_add_cmd_sf(commands, SCTP_CMD_DISCARD_PACKET,SCTP_NULL());
|
|
|
|
|
|
+ sctp_add_cmd_sf(commands, SCTP_CMD_DISCARD_PACKET, SCTP_NULL());
|
|
sctp_add_cmd_sf(commands, SCTP_CMD_SET_SK_ERR,
|
|
sctp_add_cmd_sf(commands, SCTP_CMD_SET_SK_ERR,
|
|
SCTP_ERROR(ECONNABORTED));
|
|
SCTP_ERROR(ECONNABORTED));
|
|
sctp_add_cmd_sf(commands, SCTP_CMD_ASSOC_FAILED,
|
|
sctp_add_cmd_sf(commands, SCTP_CMD_ASSOC_FAILED,
|