<feed xmlns='http://www.w3.org/2005/Atom'>
<title>src-test2/sys/netinet/ip_input.c, branch releng/5.0</title>
<subtitle>FreeBSD source tree</subtitle>
<id>https://cgit-dev.freebsd.org/src-test2/atom?h=releng%2F5.0</id>
<link rel='self' href='https://cgit-dev.freebsd.org/src-test2/atom?h=releng%2F5.0'/>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/'/>
<updated>2002-11-20T19:07:27Z</updated>
<entry>
<title>Move fw_one_pass from ip_fw2.c to ip_input.c so that neither</title>
<updated>2002-11-20T19:07:27Z</updated>
<author>
<name>Luigi Rizzo</name>
<email>luigi@FreeBSD.org</email>
</author>
<published>2002-11-20T19:07:27Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=97850a5dd9c14361417fef688aed00fa6568c770'/>
<id>urn:sha1:97850a5dd9c14361417fef688aed00fa6568c770</id>
<content type='text'>
bridge.c nor if_ethersubr.c depend on IPFIREWALL.
Restore the use of fw_one_pass in if_ethersubr.c

ipfw.8 will be updated with a separate commit.

Approved by: re
</content>
</entry>
<entry>
<title>Add a sysctl to control the generation of source quench packets,</title>
<updated>2002-11-19T17:06:06Z</updated>
<author>
<name>Mike Silbersack</name>
<email>silby@FreeBSD.org</email>
</author>
<published>2002-11-19T17:06:06Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=df285b3d1d6d1c0682d5c1991f27def40674e316'/>
<id>urn:sha1:df285b3d1d6d1c0682d5c1991f27def40674e316</id>
<content type='text'>
and set it to 0 by default.

Partially obtained from:	NetBSD
Suggested by:	David Gilbert
MFC after:	5 days
</content>
</entry>
<entry>
<title>Massive cleanup of the ip_mroute code.</title>
<updated>2002-11-15T22:53:53Z</updated>
<author>
<name>Luigi Rizzo</name>
<email>luigi@FreeBSD.org</email>
</author>
<published>2002-11-15T22:53:53Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=bbb4330b6156ef2827cc03ff4aab7a0fe307683c'/>
<id>urn:sha1:bbb4330b6156ef2827cc03ff4aab7a0fe307683c</id>
<content type='text'>
No functional changes, but:

  + the mrouting module now should behave the same as the compiled-in
    version (it did not before, some of the rsvp code was not loaded
    properly);
  + netinet/ip_mroute.c is now truly optional;
  + removed some redundant/unused code;
  + changed many instances of '0' to NULL and INADDR_ANY as appropriate;
  + removed several static variables to make the code more SMP-friendly;
  + fixed some minor bugs in the mrouting code (mostly, incorrect return
    values from functions).

This commit is also a prerequisite to the addition of support for PIM,
which i would like to put in before DP2 (it does not change any of
the existing APIs, anyways).

Note, in the process we found out that some device drivers fail to
properly handle changes in IFF_ALLMULTI, leading to interesting
behaviour when a multicast router is started. This bug is not
corrected by this commit, and will be fixed with a separate commit.

Detailed changes:
--------------------
netinet/ip_mroute.c     all the above.
conf/files              make ip_mroute.c optional
net/route.c             fix mrt_ioctl hook
netinet/ip_input.c      fix ip_mforward hook, move rsvp_input() here
                        together with other rsvp code, and a couple
                        of indentation fixes.
netinet/ip_output.c     fix ip_mforward and ip_mcast_src hooks
netinet/ip_var.h        rsvp function hooks
netinet/raw_ip.c        hooks for mrouting and rsvp functions, plus
                        interface cleanup.
netinet/ip_mroute.h     remove an unused and optional field from a struct

Most of the code is from Pavlin Radoslavov and the XORP project

Reviewed by: sam
MFC after: 1 week
</content>
</entry>
<entry>
<title>Fix two instances of variant struct definitions in sys/netinet:</title>
<updated>2002-10-20T22:52:07Z</updated>
<author>
<name>Poul-Henning Kamp</name>
<email>phk@FreeBSD.org</email>
</author>
<published>2002-10-20T22:52:07Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=53be11f68094cc5a97a63759a91d4a8f1a8a38b6'/>
<id>urn:sha1:53be11f68094cc5a97a63759a91d4a8f1a8a38b6</id>
<content type='text'>
Remove the never completed _IP_VHL version, it has not caught on
anywhere and it would make us incompatible with other BSD netstacks
to retain this version.

Add a CTASSERT protecting sizeof(struct ip) == 20.

Don't let the size of struct ipq depend on the IPDIVERT option.

This is a functional no-op commit.

Approved by:	re
</content>
</entry>
<entry>
<title>Get rid of checking for ip sec history. It is true that packets are not</title>
<updated>2002-10-16T09:01:48Z</updated>
<author>
<name>Guido van Rooij</name>
<email>guido@FreeBSD.org</email>
</author>
<published>2002-10-16T09:01:48Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=2f591ab8fe8e5ff651f2d1edf9e1cdd61318abbf'/>
<id>urn:sha1:2f591ab8fe8e5ff651f2d1edf9e1cdd61318abbf</id>
<content type='text'>
supposed to be checked by the firewall rules twice. However, because the
various ipsec handlers never call ip_input(), this never happens anyway.

This fixes the situation where a gif tunnel is encrypted with IPsec. In
such a case, after IPsec processing, the unencrypted contents from the
GIF tunnel are fed back to the ipintrq and subsequently handeld by
ip_input(). Yet, since there still is IPSec history attached, the
packets coming out from the gif device are never fed into the filtering
code.
This fix was sent to Itojun, and he pointed towartds
    http://www.netbsd.org/Documentation/network/ipsec/#ipf-interaction.
This patch actually implements what is stated there (specifically:
Packet came from tunnel devices (gif(4) and ipip(4)) will still
go through ipf(4). You may need to identify these packets by
using interface name directive in ipf.conf(5).

Reviewed by:	rwatson
MFC after:	3 weeks
</content>
</entry>
<entry>
<title>Tie new "Fast IPsec" code into the build.  This involves the usual</title>
<updated>2002-10-16T02:25:05Z</updated>
<author>
<name>Sam Leffler</name>
<email>sam@FreeBSD.org</email>
</author>
<published>2002-10-16T02:25:05Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=b9234fafa0783687e83b2fa646e3ee137d87913a'/>
<id>urn:sha1:b9234fafa0783687e83b2fa646e3ee137d87913a</id>
<content type='text'>
configuration stuff as well as conditional code in the IPv4 and IPv6
areas.  Everything is conditional on FAST_IPSEC which is mutually
exclusive with IPSEC (KAME IPsec implmentation).

As noted previously, don't use FAST_IPSEC with INET6 at the moment.

Reviewed by:	KAME, rwatson
Approved by:	silence
Supported by:	Vernier Networks
</content>
</entry>
<entry>
<title>Replace aux mbufs with packet tags:</title>
<updated>2002-10-16T01:54:46Z</updated>
<author>
<name>Sam Leffler</name>
<email>sam@FreeBSD.org</email>
</author>
<published>2002-10-16T01:54:46Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=5d846453059191a77d5a696064b702aca7dc4760'/>
<id>urn:sha1:5d846453059191a77d5a696064b702aca7dc4760</id>
<content type='text'>
o instead of a list of mbufs use a list of m_tag structures a la openbsd
o for netgraph et. al. extend the stock openbsd m_tag to include a 32-bit
  ABI/module number cookie
o for openbsd compatibility define a well-known cookie MTAG_ABI_COMPAT and
  use this in defining openbsd-compatible m_tag_find and m_tag_get routines
o rewrite KAME use of aux mbufs in terms of packet tags
o eliminate the most heavily used aux mbufs by adding an additional struct
  inpcb parameter to ip_output and ip6_output to allow the IPsec code to
  locate the security policy to apply to outbound packets
o bump __FreeBSD_version so code can be conditionalized
o fixup ipfilter's call to ip_output based on __FreeBSD_version

Reviewed by:	julian, luigi (silent), -arch, -net, darren
Approved by:	julian, silence from everyone else
Obtained from:	openbsd (mostly)
MFC after:	1 month
</content>
</entry>
<entry>
<title>Fix IPOPT_TS processing: do not overwrite IP address by timestamp.</title>
<updated>2002-10-10T12:03:36Z</updated>
<author>
<name>Maxim Konovalov</name>
<email>maxim@FreeBSD.org</email>
</author>
<published>2002-10-10T12:03:36Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=a5428e3a9acae6607e36d8c986e1746869156ef7'/>
<id>urn:sha1:a5428e3a9acae6607e36d8c986e1746869156ef7</id>
<content type='text'>
PR:		misc/42121
Submitted by:	Praveen Khurjekar &lt;praveen@codito.com&gt;
Reviewed by:	silence on -net
MFC after:	1 month
</content>
</entry>
<entry>
<title>Be consistent about "static" functions: if the function is marked</title>
<updated>2002-09-28T17:15:38Z</updated>
<author>
<name>Poul-Henning Kamp</name>
<email>phk@FreeBSD.org</email>
</author>
<published>2002-09-28T17:15:38Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=37c841831ff323187d7f749947244f7e278a14ea'/>
<id>urn:sha1:37c841831ff323187d7f749947244f7e278a14ea</id>
<content type='text'>
static in its prototype, mark it static at the definition too.

Inspired by:    FlexeLint warning #512
</content>
</entry>
<entry>
<title>Use m_fixhdr() rather than roll our own.</title>
<updated>2002-09-18T19:43:01Z</updated>
<author>
<name>Poul-Henning Kamp</name>
<email>phk@FreeBSD.org</email>
</author>
<published>2002-09-18T19:43:01Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=a5554bf05bdc817d612c72f5841c6d87d8dbf191'/>
<id>urn:sha1:a5554bf05bdc817d612c72f5841c6d87d8dbf191</id>
<content type='text'>
</content>
</entry>
</feed>
