summaryrefslogtreecommitdiffstats
path: root/sys/netinet (follow)
Commit message (Expand)AuthorAgeFilesLines
* wrap a long line. no functional change.dlg2020-06-211-2/+3
* if an inp_upcall is set, let it look at and maybe steal the udp packet.dlg2020-06-211-3/+11
* knf: the inp_upcall line was too long.dlg2020-06-211-2/+3
* add a inp_upcall function pointer and inp_upcall_arg to struct in_pcb.dlg2020-06-211-1/+3
* Break a glass ceiling on cwnd due to integer division during congestionprocter2020-06-191-2/+2
* Refuse to set 0 or a negative value for net.inet.tcp.synbucketlimit.mpi2020-06-181-1/+14
* Connectionless sockets like UDP can be re-connected to a differentbluhm2020-05-271-1/+8
* Document the various flavors of NET_LOCK() and rename the reader version.mpi2020-05-272-8/+8
* don't count packets in the carp protocol handling against an interface.dlg2020-05-211-7/+1
* implement a carp_transmit that bypasses the ifq on output.dlg2020-05-211-41/+65
* remove some trailing whitespace. no functional change.dlg2020-04-291-5/+5
* Add support for autmatically moving traffic between rdomains on ipsec(4)tobhe2020-04-234-47/+50
* Stop processing packets under non-exclusive (read) netlock.mpi2020-04-121-3/+3
* Guard SIOCDELMULTI if_ioctl calls with KERNEL_LOCK() where the call isvisa2020-03-152-2/+6
* Fix uninitialized use of variable 'len'.tobhe2020-03-061-6/+4
* add define for IPTOS_DSCP_LE; "low effort" DSCP codepoint standardiseddjm2020-01-261-1/+2
* rdr-to with loopback destination should work even thoughsashan2019-12-231-2/+3
* Make bundled IPcomp/ESP policies work with IPSEC_LEVEL_REQUIRE.tobhe2019-12-101-1/+19
* always pull in if_types.h, to unbreak ramdisksderaadt2019-12-091-2/+2
* Make sure packet destination address matches interface address,sashan2019-12-083-4/+44
* Checking the IPsec policy is expensive. Check only when IPsec is used.tobhe2019-12-062-30/+34
* Don't require a valid sa_len for a bunch of IPv4 "get" ioctlsjca2019-12-011-3/+6
* Change the default security level for incoming IPsec flows fromtobhe2019-11-292-60/+63
* Although ifconfig(8) checks it already, enforce contiguous inetbluhm2019-11-281-4/+21
* Add DoT 853 to DEFBADDYNAMICPORTS_TCP. This port will be increasinglyderaadt2019-11-131-2/+2
* Prevent underflows in tp->snd_wnd if the remote side ACKs more thanbluhm2019-11-111-3/+9
* void being too clever about setting/clearing ifpromisc on the parent.dlg2019-11-081-8/+6
* convert interface address change hooks to tasks and a task_list.dlg2019-11-082-11/+11
* Do propper kernel input validation for in_control() ioctl(2)bluhm2019-11-071-40/+63
* Avoid NULL dereference in arpinvalidate() and nd6_invalidate() bykrw2019-11-071-1/+3
* turn the linkstate hooks into a task list, like the detach hooks.dlg2019-11-071-47/+27
* replace the hooks used with if_detachhooks with a task list.dlg2019-11-061-14/+8
* remove mobileip(4)dlg2019-11-043-34/+4
* make whitespace in the IPPROTO defines consistent. no functional change.dlg2019-10-251-13/+13
* +#define IPPROTO_UDPLITE 136, as per RFC 3828 and the IANA allocationdlg2019-10-251-1/+2
* Kernel is missing propper input validation when configuring addresses.bluhm2019-10-232-34/+66
* in6_setsockaddr and in6_setpeeraddr can't fail, so let them return void.dlg2019-10-171-3/+3
* tsleep(9) -> tsleep_nsec(9)mpi2019-10-161-2/+3
* ip_ether.c is empty, and now unlinked from the build.dlg2019-10-071-28/+0
* gif shouldn't include netinet/ip_ether.h, cos gif doesnt do etherip.dlg2019-10-042-4/+4
* get rid of prototypes for mplsip_input and mplsip_output. they don't exist.dlg2019-10-041-6/+1
* remove the "copy function" argument to bpf_mtap_hdr.dlg2019-09-304-8/+8
* Fix a route use after free in multicast route. Move the rt_mcast_del()bluhm2019-09-021-33/+36
* When we needed the kernel lock for local IP packet delivery, mpi@bluhm2019-08-061-44/+3
* Add IFXF_AUTOCONF4 to if_xflags to match IFXF_AUTOCONF6. Letkrw2019-07-251-1/+4
* Introduce ETHER_IS_BROADCAST/ANYADDR/EQ() and use them where appropriate.mpi2019-07-172-4/+11
* Initialize struct inpcb pool not on demand, but during initialization.bluhm2019-07-153-9/+16
* Count the number of TCP SACK options that were dropped due to thebluhm2019-07-123-10/+14
* Received SACK options are managed by a linked list at the TCP socket.bluhm2019-07-102-3/+8
* free(9) sizes for M_RTABLE.mpi2019-07-081-2/+3