summaryrefslogtreecommitdiffstats
path: root/sys/netinet (follow)
Commit message (Expand)AuthorAgeFilesLines
* Use m_align() and while there reorder the pkthdr initalisation a bit.claudio2018-12-041-8/+6
* In PRU_DISCONNECT don't fall through into PRU_ABORT since the latter freesclaudio2018-12-031-2/+4
* MH_ALIGN -> m_align. In revarprequest() set the ph_rtableid so thatclaudio2018-11-301-3/+4
* Further cleanup of icmp_do_error.claudio2018-11-281-19/+13
* Retire dom_rtkeylen from struct domain. Nothing is using this anymore.claudio2018-11-191-2/+1
* provide ip_tos_patch() for setting ip_tos and patching the ipv4 cksum.dlg2018-11-143-8/+28
* Do not translate the EACCES error from pf(4) to EHOSTUNREACH anymore.bluhm2018-11-104-12/+4
* M_LEADINGSPACE() and M_TRAILINGSPACE() are just wrappers forclaudio2018-11-091-2/+2
* Remove the last few XXX rdomain markers. Even those functions respect theclaudio2018-11-091-4/+1
* In icmp_input_if() m_pullup up the maximum size of required data at the start.claudio2018-11-052-13/+5
* Consider the size of IP header when doing the ICMP length overflowbluhm2018-11-051-3/+3
* Fixup the case where an mbuf cluster is used. Correctly offset the data toclaudio2018-11-051-3/+5
* The change of the sb_mbmax calculation in sbreserve() broke settingbluhm2018-11-041-3/+4
* ipsec: use monotonic clock for SA creation/lookup timestamps; ok dlg@cheloha2018-10-222-5/+5
* Partial revert of previous. Only the queue(3) stuff should have gone in.cheloha2018-10-181-38/+7
* igmp, struct router_info: use queue(3)cheloha2018-10-182-26/+52
* Expose net.inet.ip.arpq.drops to help debug what's going on when a lotflorian2018-10-132-4/+13
* RT_TABLEID_MAX is 255, fix places that assumed that it is less than 255.reyk2018-10-101-5/+5
* Revert the inpcb table mutex commit. It triggers a witness panicbluhm2018-10-046-84/+21
* Turn carp_ourether() mp-safe, this is a requirement for taking bridge(4)mpi2018-09-241-16/+15
* As a step towards per inpcb or socket locks, remove the net lockbluhm2018-09-206-22/+85
* Do not acknowledge a received ack-only tcp packet that we would drop due tofriehm2018-09-171-2/+4
* Initialize the TDB to NULL in ipsec_common_input() andmestre2018-09-142-5/+5
* In general it is a bad idea to use one random secret for two things.bluhm2018-09-142-12/+15
* unbreak userland uses of in_pcb.h by including sys/refcnt.hjsg2018-09-141-1/+2
* Add reference counting for inet pcb, this will be needed when webluhm2018-09-135-9/+40
* Include the size of IPCOMP header when checking for compression.mpi2018-09-131-2/+2
* Convert inetctlerrmap to u_char like inet6ctlerrmap. That is alsobluhm2018-09-112-5/+5
* Make the distribution of in_ and in6_ functions in in_pcb.c andbluhm2018-09-112-162/+11
* Remove useless INPCBHASH() macros. Just expand them.bluhm2018-09-101-31/+24
* Instead of calculating the mbuf packet header length here and there,bluhm2018-09-101-9/+2
* During fragment reassembly, mbuf chains with packet headers werebluhm2018-09-101-3/+5
* Explain the special case for redirect to localhost in a comment.bluhm2018-09-071-1/+14
* sync icmp_mtudisc_clone() with icmp6_mtudisc_clone(); prompted by bluhm@miko2018-09-061-17/+12
* Add per-TDB counters and a new SADB extension to export them tompi2018-08-289-34/+97
* Coverity CID 1470233 complainst that the m != NULL check inbluhm2018-07-231-4/+3
* Fix for uninitialized variables.mpi2018-07-161-4/+4
* Introduce ipsec_output_cb() to merge duplicate code and account formpi2018-07-126-176/+135
* Disambiguate the source of panics in sys/net* by adding __func__nayden2018-07-111-4/+4
* Retire RTM_LOSING, it no longer makes sense and on busy servers theclaudio2018-07-111-18/+6
* rtm_send() the cloned routes because of ICMP mtu changes. Until nowclaudio2018-07-111-1/+2
* Convert AH & IPcomp to ipsec_input_cb() and count drops on input.mpi2018-07-115-119/+37
* Introduce new IPsec (per-CPU) statistics and refactor ESP inputmpi2018-07-105-73/+181
* Remove DELAY(1000) from carp_send_arp() / carp_send_na() since it is not clearfriehm2018-07-101-3/+1
* It was possible to leak the control mbuf in raw ip user requestbluhm2018-07-052-4/+5
* Prevent a mbuf double free by not freeing it along the error-path inanton2018-07-041-3/+5
* Assert that the NET_LOCK() is held when iterating over `ipsec_acquire_head'.mpi2018-06-251-1/+3
* In in_pcballoc() finish the inp initialization before adding it tobluhm2018-06-141-12/+13
* Assert that the INP_IPV6 in in6_pcbconnect() is correct. Just callbluhm2018-06-142-25/+6
* Use mbuf (not cluster) always for t_template of tcpcb.yasuoka2018-06-141-14/+4