summaryrefslogtreecommitdiffstats
path: root/sys/netinet
Commit message (Expand)AuthorAgeFilesLines
* o Turn net.inet.ip.check_interface sysctl off by default.maxim2004-09-241-1/+1
* Fix an out of bounds write during the initialization of the PF_INET protocolandre2004-09-161-4/+14
* Clarify some comments for the M_FASTFWD_OURS case in ip_input().andre2004-09-151-4/+4
* Remove the last two global variables that are used to store packet state whileandre2004-09-154-39/+48
* Do not allow 'ipfw fwd' command when IPFIREWALL_FORWARD is not compiled intoandre2004-09-131-0/+4
* If we have to 'ipfw fwd'-tag a packet the second time in ipfw_pfil_out() don'tandre2004-09-131-3/+5
* Make comments more clear for the packet changed cases after pfil hooks.andre2004-09-131-1/+2
* Fix ip_input() fallback for the destination modified cases (from the packetandre2004-09-131-6/+4
* Make 'ipfw tee' behave as inteded and designed. A tee'd packet is copiedandre2004-09-131-11/+11
* Check flag do_bridge always, even if kernel was compiled withoutglebius2004-09-091-11/+5
* revert comment from rev1.158 now that rev1.225 backed it out..jmg2004-09-061-3/+1
* Recover normal behavior: return EINVAL to attempt to add a divert ruleglebius2004-09-051-2/+5
* fix up socket/ip layer violation... don't assume/know thatjmg2004-09-056-8/+17
* Apply error and success logic consistently to the function netisr_queue() andandre2004-08-271-1/+1
* In the case the destination of a packet was changed by the packet filterandre2004-08-271-2/+2
* Remove a junk line left over from the recent IPFW to PFIL_HOOKS conversion.andre2004-08-271-1/+0
* Always compile PFIL_HOOKS into the kernel and remove the associated kernelandre2004-08-275-47/+29
* Revert the last change to sys/modules/ipfw/Makefile and fix aru2004-08-262-1/+5
* Allocate memory when dumping pipes with M_WAITOK flag.pjd2004-08-251-9/+33
* Allow early drop for non-ALTQ enabled queues in an ALTQ-enabled kernel.mlaier2004-08-221-13/+14
* When sliding the m_data pointer forward, update m_pktrhdr.len as wellrwatson2004-08-221-1/+3
* When a prison is given the ability to create raw sockets (when thecsjp2004-08-212-0/+18
* When prepending space onto outgoing UDP datagram payloads to hold therwatson2004-08-211-4/+7
* Fix a stupid typo which prevented an ipfw KLD unload from successfully cleaningandre2004-08-201-1/+1
* When unloading ipfw module use callout_drain() to make absolutely sure thatandre2004-08-191-1/+1
* For IPv6 access pointer to tcpcb only after we have checked it is valid.andre2004-08-192-2/+8
* Give a useful error message if someone tries to compile IPFIREWALL into theandre2004-08-191-0/+4
* Do not unconditionally ignore IPDIVERT and IPFIREWALL_FORWARD when buildingandre2004-08-192-4/+0
* Bring back the sysctl 'net.inet.ip.fw.enable' to unbreak the startup scriptsandre2004-08-194-0/+11
* Push down pcbinfo and inpcb locking from udp_send() into udp_output().rwatson2004-08-191-25/+35
* In in_pcbrehash(), do assert the inpcb lock as well as the pcbinfo lock.rwatson2004-08-191-1/+1
* Fix build of ip_input.c with "options IPSEC" -- the "pass:" labelrwatson2004-08-181-1/+1
* Make the kernel compile again if you are not using PFIL_HOOKSpeter2004-08-181-0/+4
* Convert ipfw to use PFIL_HOOKS. This is change is transparent to userlandandre2004-08-1714-836/+648
* White space cleanup for netinet before branch:rwatson2004-08-1632-674/+674
* Put the 'antispoof' opcode in the proper place in the opcode list suchobrien2004-08-161-1/+1
* Get rid of the RANDOM_IP_ID option and make it a sysctl. NetBSDdwmalone2004-08-148-46/+23
* Fix outgoing ICMP on global instance.phk2004-08-141-5/+5
* Add the ability to associate ipfw rules with a specific prison ID.csjp2004-08-122-2/+14
* In tcp6_ctlinput, lock tcbinfo around the call to syncache_unreachdwmalone2004-08-122-0/+4
* Fix two cases of incorrect IPQ_UNLOCK'ing in the merged ip_reass() function.andre2004-08-121-2/+2
* When udp_send() fails, make sure to free the control mbufs as well asrwatson2004-08-121-0/+2
* Backout removal of UMA_ZONE_NOFREE flag for all zones which are establishedandre2004-08-116-12/+12
* Remove the UMA_ZONE_NOFREE flag to all uma_zcreate() calls in the IP andandre2004-08-117-13/+13
* Make use of in_localip() function and replace previous direct LIST_FOREACHandre2004-08-111-45/+39
* Add the function in_localip() which returns 1 if an internet address is forandre2004-08-112-0/+18
* Only invoke verify_path() for verrevpath and versrcreach when we have an IP p...andre2004-08-111-4/+4
* Only check for local broadcast addresses if the mbuf is flagged with M_BCAST.andre2004-08-111-1/+2
* Consistently use NULL for pointer comparisons.andre2004-08-112-21/+21
* Make IP fastforwarding ALTQ-aware by adding the input traffic conditionerandre2004-08-111-0/+10
OpenPOWER on IntegriCloud