summaryrefslogtreecommitdiffstats
path: root/sys/netinet (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* Simplify igmp_sysctl to directly return error in default casegnezdo2020-08-172-15/+3
* No longer prevent TCP connections to IPv6 anycast addresses.florian2020-08-081-15/+1
* Don't compare pointers against zero.mglocker2020-08-051-3/+3
* Move range check inside sysctl_int_arrgnezdo2020-08-017-88/+56
* Don't treat an error if carppeer is an unicast and the peer is down.yasuoka2020-07-281-2/+4
* After the previous commit, src/regress/sys/netinet/carp triggeredbluhm2020-07-281-3/+3
* netinet: tcp_close(): delay reaper timeout by one tickcheloha2020-07-241-2/+2
* Use interface index instead of pointer to `ifnet' in carp(4).mvs2020-07-242-58/+96
* deprecate interface input handler lists, just use one input function.dlg2020-07-221-2/+2
* move carp_input into ether_input, instead of via an input handler.dlg2020-07-222-23/+9
* add code to coordinate how bridges attach to ethernet interfaces.dlg2020-07-221-1/+14
* kernel: use gettime(9)/getuptime(9) in lieu of time_second(9)/time_uptime(9)cheloha2020-06-246-29/+29
* wrap a long line. no functional change.dlg2020-06-211-2/+3
* if an inp_upcall is set, let it look at and maybe steal the udp packet.dlg2020-06-211-3/+11
* knf: the inp_upcall line was too long.dlg2020-06-211-2/+3
* add a inp_upcall function pointer and inp_upcall_arg to struct in_pcb.dlg2020-06-211-1/+3
* Break a glass ceiling on cwnd due to integer division during congestionprocter2020-06-191-2/+2
* Refuse to set 0 or a negative value for net.inet.tcp.synbucketlimit.mpi2020-06-181-1/+14
* Connectionless sockets like UDP can be re-connected to a differentbluhm2020-05-271-1/+8
* Document the various flavors of NET_LOCK() and rename the reader version.mpi2020-05-272-8/+8
* don't count packets in the carp protocol handling against an interface.dlg2020-05-211-7/+1
* implement a carp_transmit that bypasses the ifq on output.dlg2020-05-211-41/+65
* remove some trailing whitespace. no functional change.dlg2020-04-291-5/+5
* Add support for autmatically moving traffic between rdomains on ipsec(4)tobhe2020-04-234-47/+50
* Stop processing packets under non-exclusive (read) netlock.mpi2020-04-121-3/+3
* Guard SIOCDELMULTI if_ioctl calls with KERNEL_LOCK() where the call isvisa2020-03-152-2/+6
* Fix uninitialized use of variable 'len'.tobhe2020-03-061-6/+4
* add define for IPTOS_DSCP_LE; "low effort" DSCP codepoint standardiseddjm2020-01-261-1/+2
* rdr-to with loopback destination should work even thoughsashan2019-12-231-2/+3
* Make bundled IPcomp/ESP policies work with IPSEC_LEVEL_REQUIRE.tobhe2019-12-101-1/+19
* always pull in if_types.h, to unbreak ramdisksderaadt2019-12-091-2/+2
* Make sure packet destination address matches interface address,sashan2019-12-083-4/+44
* Checking the IPsec policy is expensive. Check only when IPsec is used.tobhe2019-12-062-30/+34
* Don't require a valid sa_len for a bunch of IPv4 "get" ioctlsjca2019-12-011-3/+6
* Change the default security level for incoming IPsec flows fromtobhe2019-11-292-60/+63
* Although ifconfig(8) checks it already, enforce contiguous inetbluhm2019-11-281-4/+21
* Add DoT 853 to DEFBADDYNAMICPORTS_TCP. This port will be increasinglyderaadt2019-11-131-2/+2
* Prevent underflows in tp->snd_wnd if the remote side ACKs more thanbluhm2019-11-111-3/+9
* void being too clever about setting/clearing ifpromisc on the parent.dlg2019-11-081-8/+6
* convert interface address change hooks to tasks and a task_list.dlg2019-11-082-11/+11
* Do propper kernel input validation for in_control() ioctl(2)bluhm2019-11-071-40/+63
* Avoid NULL dereference in arpinvalidate() and nd6_invalidate() bykrw2019-11-071-1/+3
* turn the linkstate hooks into a task list, like the detach hooks.dlg2019-11-071-47/+27
* replace the hooks used with if_detachhooks with a task list.dlg2019-11-061-14/+8
* remove mobileip(4)dlg2019-11-043-34/+4
* make whitespace in the IPPROTO defines consistent. no functional change.dlg2019-10-251-13/+13
* +#define IPPROTO_UDPLITE 136, as per RFC 3828 and the IANA allocationdlg2019-10-251-1/+2
* Kernel is missing propper input validation when configuring addresses.bluhm2019-10-232-34/+66
* in6_setsockaddr and in6_setpeeraddr can't fail, so let them return void.dlg2019-10-171-3/+3
* tsleep(9) -> tsleep_nsec(9)mpi2019-10-161-2/+3