summaryrefslogtreecommitdiffstats
path: root/sys/netinet
Commit message (Expand)AuthorAgeFilesLines
...
* When performing IP fast forwarding, immediately drop traffic which isbms2004-11-041-0/+6
* Until this change, the UDP input code used global variables udp_in,rwatson2004-11-041-57/+24
* Remove RFC1644 T/TCP support from the TCP side of the network stack.andre2004-11-0213-841/+34
* Correct a bug in TCP SACK that could result in wedging of the TCP stackrwatson2004-10-301-2/+2
* Add a matching tunable for net.inet.tcp.sack.enable sysctl.rwatson2004-10-261-0/+1
* Check that rt_mask(rt) is non-NULL before dereferencing it, in thebms2004-10-261-0/+1
* IPDIVERT is a module now and tell the other parts of the kernel about it.andre2004-10-251-0/+4
* For variables that are only checked with defined(), don't provideru2004-10-241-1/+1
* Shave 40 unused bytes from struct tcpcb.andre2004-10-221-1/+0
* When printing the initialization string and IPDIVERT is not compiled into theandre2004-10-221-1/+1
* Refuse to unload the ipdivert module unless the 'force' flag is given to kldu...andre2004-10-221-1/+11
* Destroy the UMA zone on unload.andre2004-10-191-0/+1
* Slightly extend the locking during unload to fully cover the protocolandre2004-10-191-5/+6
* Annotate a newly introduced race present due to the unloading ofrwatson2004-10-191-0/+4
* Convert IPDIVERT into a loadable module. This makes use of the dynamic loada...andre2004-10-195-37/+92
* Properly declare the "net.inet" sysctl subtree.andre2004-10-191-0/+1
* Pre-emptively define IPPROTO_SPACER to 32767, the same value as PROTO_SPACERandre2004-10-191-0/+6
* Make use of the PROTO_SPACER functionality for dynamically loadableandre2004-10-191-2/+19
* Support for dynamically loadable and unloadable IP protocols in the ipmux.andre2004-10-192-1/+64
* Add a macro for the destruction of INP_INFO_LOCK's used by loadable modules.andre2004-10-191-0/+1
* Make comments more clear. Change the order of one if() statement to check theandre2004-10-191-3/+8
* Push acquisition of the accept mutex out of sofree() into the callerrwatson2004-10-183-0/+3
* Don't release the udbinfo lock until after the last use of UDP inpcbrwatson2004-10-121-3/+3
* Modify the thrilling "%D is using my IP address %s!" message so thatrwatson2004-10-121-1/+7
* When the access control on creating raw sockets was modified so thatrwatson2004-10-121-20/+41
* Acquire the send socket buffer lock around tcp_output() activitiesrwatson2004-10-091-2/+14
* When running with debug.mpsafenet=0, initialize IP multicast routingrwatson2004-10-071-4/+7
* - Estimate the amount of data in flight in sack recovery and use itps2004-10-057-59/+83
* Add support to IPFW for matching by TCP data length.green2004-10-032-0/+24
* Add support to IPFW for classification based on "diverted" statusgreen2004-10-033-16/+42
* Add to IPFW the ability to do ALTQ classification/tagging.green2004-10-032-0/+54
* Validate the action pointer to be within the rule size, so that trying togreen2004-09-301-0/+5
* Add an additional struct inpcb * argument to pfil(9) in order to enablemlaier2004-09-296-19/+45
* Assign so_pcb to NULL rather than 0 as it's a pointer.rwatson2004-09-291-1/+1
* o Turn net.inet.ip.check_interface sysctl off by default.maxim2004-09-241-1/+1
* Fix an out of bounds write during the initialization of the PF_INET protocolandre2004-09-161-4/+14
* Clarify some comments for the M_FASTFWD_OURS case in ip_input().andre2004-09-151-4/+4
* Remove the last two global variables that are used to store packet state whileandre2004-09-154-39/+48
* Do not allow 'ipfw fwd' command when IPFIREWALL_FORWARD is not compiled intoandre2004-09-131-0/+4
* If we have to 'ipfw fwd'-tag a packet the second time in ipfw_pfil_out() don'tandre2004-09-131-3/+5
* Make comments more clear for the packet changed cases after pfil hooks.andre2004-09-131-1/+2
* Fix ip_input() fallback for the destination modified cases (from the packetandre2004-09-131-6/+4
* Make 'ipfw tee' behave as inteded and designed. A tee'd packet is copiedandre2004-09-131-11/+11
* Check flag do_bridge always, even if kernel was compiled withoutglebius2004-09-091-11/+5
* revert comment from rev1.158 now that rev1.225 backed it out..jmg2004-09-061-3/+1
* Recover normal behavior: return EINVAL to attempt to add a divert ruleglebius2004-09-051-2/+5
* fix up socket/ip layer violation... don't assume/know thatjmg2004-09-056-8/+17
* Apply error and success logic consistently to the function netisr_queue() andandre2004-08-271-1/+1
* In the case the destination of a packet was changed by the packet filterandre2004-08-271-2/+2
* Remove a junk line left over from the recent IPFW to PFIL_HOOKS conversion.andre2004-08-271-1/+0
OpenPOWER on IntegriCloud