| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
| |
struct ipovly (they don't exist anymore because they don't work when
pointers are 64bit).
|
|
|
|
|
|
|
|
|
|
| |
- Don't bother checking for conflicting sockets if we're binding to a
multicast address.
- Don't return an error if we're binding to INADDR_ANY, the conflicting
socket is bound to INADDR_ANY, and the conflicting socket has SO_REUSEPORT
set.
PR: kern/7713
|
|
|
|
|
| |
Ignore ARP replies from the wrong interface (discussion on mailing list)
Add interface name to a couple of error messages
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
addresses by default.
Add a knob "icmp_bmcastecho" to "rc.network" to allow this
behaviour to be controlled from "rc.conf".
Document the controlling sysctl variable "net.inet.icmp.bmcastecho"
in sysctl(3).
Reviewed by: dg, jkh
Reminded on -hackers by: Steinar Haug <sthaug@nethelp.no>
|
| |
|
|
|
|
|
| |
PR: 7892
Submitted by: Don.Lewis@tsc.tdk.com
|
| |
|
|
|
|
|
|
|
|
|
|
| |
4.1.4. Experimental Protocol
A system should not implement an experimental protocol unless it
is participating in the experiment and has coordinated its use of
the protocol with the developer of the protocol.
Pointed out by: Steinar Haug <sthaug@nethelp.no>
|
|
|
|
|
|
| |
This will allow us to add dummynet to 3.0
Recompile /sbin/ipfw AND your kernel.
|
|
|
|
|
| |
PR: 7802
Submitted by: Steve McCanne <mccanne@cs.berkeley.edu>
|
|
|
|
|
|
|
|
| |
OS rather than making it a mess and potentially screwing
up cross builds.
Suggested by: bde
Add Id keyword.
|
| |
|
|
|
|
|
|
| |
ip header which can't work on alpha since pointers are too big.
Reviewed by: Garrett Wollman <wollman@khavrinen.lcs.mit.edu>
|
|
|
|
|
|
| |
another specialized mbuf type in the process. Also clean up some
of the cruft surrounding IPFW, multicast routing, RSVP, and other
ill-explored corners.
|
| |
|
|
|
|
|
| |
for `u_long cmd' ioctl args if __FreeBSD_version >= 300003. Some ioctls
were broken on machines with 32-bit ints and 64-bit longs.
|
|
|
|
|
| |
on some 64-bit systems). print_ip() should use inet_ntoa() instead of
bloated inline code with 4 ntohl()s.
|
| |
|
|
|
|
| |
Reviewed by: Julian Elischer <julian@whistle.com>
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
several new features are added:
- support vc/vp shaping
- support pvc shadow interface
code cleanup:
- remove WMAYBE related code. ENI WMAYBE DMA doen't work.
- remove updating if_lastchange for every packet.
- BPF related code is moved to midway.c as it should be.
(bpfwrite should work if atm_pseudohdr and LLC/SNAP are
prepended.)
- BPF link type is changed to DLT_ATM_RFC1483.
BPF now understands only LLC/SNAP!! (because bpf can't
handle variable link header length.)
It is recommended to use LLC/SNAP instead of NULL
encapsulation for various reasons. (BPF, IPv6,
interoperability, etc.)
the code has been used for months in ALTQ and KAME IPv6.
OKed by phk long time ago.
|
| |
|
|
|
|
| |
Cleaned up ifdefs.
|
| |
|
|
|
|
|
|
|
|
|
|
|
| |
`len = min(so->so_snd.sb_cc, win) - off;'. min() has type u_int
and `off' has type int, so when min() is 0 and `off' is 1, the RHS
overflows to 0U - 1 = UINT_MAX. `len' has type long, so when
sizeof(long) == sizeof(int), the LHS normally overflows to to the
correct value of -1, but when sizeof(long) > sizeof(int), the LHS
is UINT_MAX.
Fixed some u_long's that should have been fixed-sized types.
|
|
|
|
|
|
| |
mismatches exposed by this (the prototype for tcp_respond() didn't
match the function definition lexically, and still depends on a
gcc feature to match if ints have more than 32 bits).
|
| |
|
|
|
|
| |
n_long or n_short specially for alphas.
|
|
|
|
|
| |
routed packets that aren't destined for us, as required by RFC-1122.
PR: 7191
|
| |
|
| |
|
|
|
|
| |
included.
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Any packet that can be matched by a ipfw rule can be redirected
transparently to another port or machine. Redirection to another port
mostly makes sense with tcp, where a session can be set up
between a proxy and an unsuspecting client. Redirection to another machine
requires that the other machine also be expecting to receive the forwarded
packets, as their headers will not have been modified.
/sbin/ipfw must be recompiled!!!
Reviewed by: Peter Wemm <peter@freebsd.org>
Submitted by: Chrisy Luke <chrisy@flix.net>
|
| |
|
|
|
|
|
| |
WRT diversion reinjection. No-one has been bitten by the new behaviour
that I know of.
|
|
|
|
|
|
|
| |
The problem is caused by a wrong endianess in the sum.
PR: 7115
Submitted by: Joao Carlos Mendes Luis <jonny@jonny.eng.br>
|
|
|
|
|
| |
are defined.
Reviewed by: bde
|
|
|
|
|
| |
could I find anyone to test it, so please report any
problems to me.
|
| |
|
| |
|
|\
| |
| |
| | |
which included commits to RCS files with non-trunk default branches.
|
| | |
|
| | |
|
| | |
|
| | |
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
Remove lots'o'hacks.
looutput is now static.
Other callers who want to use loopback to allow shortcutting
should call the special entrypoint for this, if_simloop(), which is
specifically designed for this purpose. Using looutput for this purpose
was problematic, particularly with bpf and trying to keep track
of whether one should be using the charateristics of the loopback interface
or the interface (e.g. if_ethersubr.c) that was requesting the loopback.
There was a whole class of errors due to this mis-use each of which had
hacks to cover them up.
Consists largly of hack removal :-)
|
| | |
|
| |
| |
| |
| |
| | |
had a recv interface and allow that state to be available
after re-injection for further tests.
|
| | |
|