summaryrefslogtreecommitdiffstats
path: root/sys/netinet
Commit message (Expand)AuthorAgeFilesLines
* Make a comment that IP source routing is not SMP and PREEMPTION safe.andre2004-08-091-0/+1
* Make a comment that "ipfw forward" is not SMP and PREEMPTION safe.andre2004-08-091-0/+1
* New ipfw option "antispoof":andre2004-08-092-0/+12
* Pass pcbinfo structures to in6_pcbnotify() rather than pcbheadrwatson2004-08-062-4/+4
* When iterating the UDP inpcb list processing an inbound broadcastrwatson2004-08-061-10/+9
* Now that IPv6 performs basic in6pcb and inpcb locking, enable inpcbrwatson2004-08-041-15/+0
* Fix Skinny and PPTP NAT'ing after the introduction of the {ip,tcp,udp}_nextmarcus2004-08-042-2/+2
* o Delayed checksums are now calculated in divert_packet() for diverted packetsandre2004-08-031-10/+0
* o Move the inflight sysctls to their own sub-tree under net.inet.tcp to beandre2004-08-032-10/+18
* o Move all parts of the IP reassembly process into the function ip_reass() toandre2004-08-032-116/+131
* Fix bug with tracking the previous element in a list.hsu2004-08-031-1/+1
* Disallow a particular kind of port theft described by the following scenario:yar2004-07-281-10/+1
* Fix a bug in the sack code that was causing data to be retransmittedjayanth2004-07-281-4/+13
* Fix for a SACK bug where the very last segment retransmittedjayanth2004-07-261-1/+1
* compare pointer against NULL, not 0jmg2004-07-261-2/+2
* Rename suser_cred()'s PRISON_ROOT flag to SUSER_ALLOWJAIL. This iscperciva2004-07-265-8/+8
* Extend versrcreach by checking against the rt_flags for RTF_REJECT andandre2004-07-211-0/+6
* M_PREPEND() the IP header on to the front of an outgoing raw IP packetrwatson2004-07-201-1/+1
* Let IN_FASTREOCOVERY macro decide if we are in recovery mode.jayanth2004-07-193-9/+1
* Fix a potential panic in the SACK code that was causingjayanth2004-07-191-8/+29
* Fix the !INET6 build.dwmalone2004-07-171-0/+4
* The tcp syncache code was leaving the IPv6 flowlabel uninitialiseddwmalone2004-07-172-6/+32
* Define semantic of M_SKIP_FIREWALL more precisely, i.e. also pass associatedmlaier2004-07-171-11/+5
* Make M_SKIP_FIREWALL a global (and semantic) flag, preventing anything fromjmallett2004-07-171-12/+0
* when IN6P_AUTOFLOWLABEL is set, the flowlabel is not set onume2004-07-161-2/+10
* Do a pass over all modules in the kernel and make them return EOPNOTSUPPphk2004-07-153-0/+4
* Remove erroneous semicolons.stefanf2004-07-132-2/+2
* After each label in tcp_input(), assert the inpcbinfo and inpcb lockrwatson2004-07-122-2/+34
* Change the following environment variables to kernel options:brian2004-07-081-6/+5
* Change the following kernel options to environment variables:brian2004-07-081-5/+6
* Push WARNS back up to 6, but define NO_WERROR; I want the warts out in thedes2004-07-061-1/+2
* Introduce inline {ip,udp,tcp}_next() functions which take a pointer to andes2004-07-0612-52/+77
* Rewrite twowords() to access its argument through a char pointer and notdes2004-07-061-3/+10
* Temporarily lower WARNS to 3 while I figure out the alignment issues ondes2004-07-061-1/+1
* Make libalias WARNS?=6-clean. This mostly involves renaming variablesdes2004-07-0515-676/+721
* Parenthesize return values.des2004-07-056-120/+120
* Mechanical whitespace cleanup.des2004-07-056-126/+126
* Add LibAliasOutTry() which checks a packet for a hit in the tables, butphk2004-07-042-16/+29
* Mechanically kill hard sentence breaks.ru2004-07-021-7/+7
* On receiving 3 duplicate acknowledgements, SACK recovery was not being entere...jayanth2004-07-012-14/+40
* Bumped document date.ru2004-07-011-5/+7
* Rwatson, write 100 times for tomorrow:phk2004-06-271-1/+1
* Those are unneeded too.pjd2004-06-271-1/+0
* Add two missing includes and remove two uneeded.pjd2004-06-271-1/+0
* Reduce the number of unnecessary unlock-relocks on socket buffer mutexesrwatson2004-06-266-27/+51
* Remove spl's from TCP protocol entry points. While not all lockingrwatson2004-06-261-32/+1
* White space & spelling fixesps2004-06-252-6/+6
* Whitespace.bms2004-06-251-3/+3
* Broaden scope of the socket buffer lock when processing an ACK so thatrwatson2004-06-242-4/+8
* Protect so_oobmark with with SOCKBUF_LOCK(&so->so_rcv), and broadenrwatson2004-06-242-8/+6
OpenPOWER on IntegriCloud