summaryrefslogtreecommitdiffstats
path: root/sys/netinet/raw_ip.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* Avoid an mbuf double free in the oob soreceive() path. In thebluhm2019-02-041-8/+8
* Botched up an if conditional in the last commit. The IP length needs toclaudio2019-01-081-2/+2
* Validate the version, and all length fields of IP packets passed to a raw socketclaudio2019-01-071-16/+82
* In PRU_DISCONNECT don't fall through into PRU_ABORT since the latter freesclaudio2018-12-031-2/+4
* Do not translate the EACCES error from pf(4) to EHOSTUNREACH anymore.bluhm2018-11-101-3/+1
* Revert the inpcb table mutex commit. It triggers a witness panicbluhm2018-10-041-4/+1
* As a step towards per inpcb or socket locks, remove the net lockbluhm2018-09-201-1/+4
* Add reference counting for inet pcb, this will be needed when webluhm2018-09-131-2/+2
* It was possible to leak the control mbuf in raw ip user requestbluhm2018-07-051-2/+4
* Prevent a mbuf double free by not freeing it along the error-path inanton2018-07-041-3/+5
* Push NET_LOCK down in the default ifioctl case.pirofti2018-04-241-3/+3
* Make divert lookup similar for all socket types. If PF_TAG_DIVERTEDbluhm2017-12-041-16/+22
* The divert structure was using the port number to indicate thatbluhm2017-11-281-2/+2
* Sprinkle some NET_ASSERT_LOCKED(), const and co to prepare runningmpi2017-11-201-4/+6
* Move PRU_DETACH out of pr_usrreq into per proto pr_detachflorian2017-11-021-4/+21
* Kill the divert-packet socket option IP_DIVERTFL to filter packets.bluhm2017-10-061-33/+2
* Replace NET_ASSERT_LOCKED() by soassertlocked() in *_usrreq().mpi2017-09-051-2/+2
* Change sosetopt() to no longer free the mbuf it receives and changempi2017-09-011-10/+2
* Validate sockaddr from userland in central functions. This resultsbluhm2017-08-111-19/+10
* Assert that the corresponding socket is locked when manipulating socketmpi2017-06-261-4/+5
* The raw ip input functions are called from several places. Use thebluhm2017-04-171-1/+3
* Pass down the address family through the pr_input calls. Thisbluhm2017-04-141-2/+2
* Move PRU_ATTACH out of the pr_usrreq functions into pr_attach.claudio2017-03-131-21/+24
* Convert the variable argument list of the pr_output functions tobluhm2017-03-031-15/+12
* In sogetopt, preallocate an mbuf to avoid using sleeping mallocs withdhill2017-02-011-19/+17
* Change the IPv4 pr_input function to the way IPv6 is implemented,bluhm2017-01-291-3/+5
* Since raw_input() and route_input() are gone from pr_input, we canbluhm2017-01-251-2/+2
* The function raw_input() has not been called since netiso has beenbluhm2017-01-231-6/+1
* Remove NULL checks before m_free(9), it deals with it.mpi2017-01-101-3/+2
* Extend the multicast sockets and multicast hash table support to multiplerzalamena2016-12-191-3/+3
* Introduce the NET_LOCK() a rwlock used to serialize accesses to the partsmpi2016-12-191-2/+2
* Enforce that pr_usrreq functions are called at IPL_SOFTNET.mpi2016-11-211-5/+3
* turn ipstat into a set of percpu counters.dlg2016-11-141-4/+9
* Sync no-argument function declaration and definition by adding (void).naddy2016-03-071-2/+2
* Remove broadcast matching from ifa_ifwithaddr(), use in_broadcast() wherevgross2015-12-031-1/+2
* Implement pf divert-reply for raw sockets. Note that an emptybluhm2015-07-281-1/+4
* use mp for the name of a variable of type struct mbuf **, rather than mderaadt2015-07-151-20/+20
* m_freem() can handle NULL, do not check for this condition beforehands.deraadt2015-07-151-10/+7
* Get rid of the undocumented & temporary* m_copy() macro added formpi2015-06-301-2/+2
* Replace a bunch of == 0 with == NULL in pointer tests. Nuke somekrw2015-06-071-8/+8
* Userland (base & ports) was adapted to always include <netinet/in.h>deraadt2015-01-241-2/+3
* Explicitly include <net/if_var.h> instead of pulling it in <net/if.h>.mpi2014-12-051-1/+2
* To implement transparent relays for connectionless protocols, thebluhm2014-11-091-1/+7
* Don't check for an empty list of interfaces. This is never true even ifmpi2014-10-141-6/+2
* Kill MRT_{ADD,DEL}_BW_UPCALL interfaces and the bandwidth monitoringmpi2014-08-141-3/+1
* Fewer <netinet/in_systm.h> !mpi2014-07-221-2/+1
* Simply use ifa_ifwithaddr() to check if the binding address is on thempi2014-06-021-4/+4
* ip_output() using varargs always struck me as bizarre, esp since it's onlyhenning2014-04-211-2/+2
* "struct pkthdr" holds a routing table ID, not a routing domain one.mpi2014-04-141-4/+4
* Retire kernel support for SO_DONTROUTE, this time without breakingmpi2014-04-071-2/+2