<feed xmlns='http://www.w3.org/2005/Atom'>
<title>src/sys/netinet/ip6.h, branch main</title>
<subtitle>FreeBSD source tree</subtitle>
<id>https://cgit-dev.freebsd.org/src/atom?h=main</id>
<link rel='self' href='https://cgit-dev.freebsd.org/src/atom?h=main'/>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/'/>
<updated>2026-01-27T13:20:33Z</updated>
<entry>
<title>ip6: Remove support for RFC2675 (Jumbo Payload Option)</title>
<updated>2026-01-27T13:20:33Z</updated>
<author>
<name>Tom Jones</name>
<email>thj@FreeBSD.org</email>
</author>
<published>2026-01-23T12:43:25Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=069a67374ed9641ff1ada2aecaac1cc61a560649'/>
<id>urn:sha1:069a67374ed9641ff1ada2aecaac1cc61a560649</id>
<content type='text'>
The Jumbo Payload option was intended to allow the deployment of IPv6 on
networks with a link MTU in excess of 65,735 octets.

Speaking to one of the authors of RFC2675 the networks which motivated
the Jumbo Payload option no longer exist.

FreeBSD does not currently support any links with this capacity and
discussion when this change was first proposed suggested that the loop
back interface had to be patched to test implementation.

As there are no known devices that can carry Jumbo Payloads remove
support.

Reviewed by:	glebius, teuxen, kp
Sponsored by:	The FreeBSD Foundation
Differential Revision:	https://reviews.freebsd.org/D19960
</content>
</entry>
<entry>
<title>netinet: Define IPv6 ECN mask</title>
<updated>2024-01-03T17:56:28Z</updated>
<author>
<name>Jose Luis Duran</name>
<email>jlduran@gmail.com</email>
</author>
<published>2023-10-28T02:50:18Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=b0e13f785b336670bdf39b83a78435b00d00f43c'/>
<id>urn:sha1:b0e13f785b336670bdf39b83a78435b00d00f43c</id>
<content type='text'>
Define a mask for the code point used for ECN in the Traffic Class field
(2 bits) of an IPv6 header.

     BE:    0       0       3       0       0       0       0       0
    Bit: 0 0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
        |Version| Traffic Class |           Flow Label                  |
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
        |                              ...                              |

For BE (Big Endian), or network-byte order, this corresponds to 0x00300000.
For Little Endian, it corresponds to 0x00003000.

Reviewed by:	imp, markj
MFC after:	1 week
Pull Request:	https://github.com/freebsd/freebsd-src/pull/879
</content>
</entry>
<entry>
<title>sys: Remove ancient SCCS tags.</title>
<updated>2023-11-27T05:23:30Z</updated>
<author>
<name>Warner Losh</name>
<email>imp@FreeBSD.org</email>
</author>
<published>2023-11-23T17:21:37Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=29363fb446372cb3f10bc98664e9767c53fbb457'/>
<id>urn:sha1:29363fb446372cb3f10bc98664e9767c53fbb457</id>
<content type='text'>
Remove ancient SCCS tags from the tree, automated scripting, with two
minor fixup to keep things compiling. All the common forms in the tree
were removed with a perl script.

Sponsored by:		Netflix
</content>
</entry>
<entry>
<title>sys: Remove $FreeBSD$: one-line .c comment pattern</title>
<updated>2023-08-16T17:54:24Z</updated>
<author>
<name>Warner Losh</name>
<email>imp@FreeBSD.org</email>
</author>
<published>2023-08-16T17:54:24Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=71625ec9ad2a9bc8c09784fbd23b759830e0ee5f'/>
<id>urn:sha1:71625ec9ad2a9bc8c09784fbd23b759830e0ee5f</id>
<content type='text'>
Remove /^/[*/]\s*\$FreeBSD\$.*\n/
</content>
</entry>
<entry>
<title>netinet6: make IPv6 fragment TTL per-VNET configurable.</title>
<updated>2023-06-01T12:04:49Z</updated>
<author>
<name>Alexander V. Chernikov</name>
<email>melifaro@FreeBSD.org</email>
</author>
<published>2023-06-01T12:04:49Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=e32221a15f089282e5dfe18891c5312b26cbe3ba'/>
<id>urn:sha1:e32221a15f089282e5dfe18891c5312b26cbe3ba</id>
<content type='text'>
Having it configurable adds more flexibility, especially
 for the systems with low amount of memory.
Additionally, it allows to speedup frag6/ tests execution.

Reviewed by:	kp, markj, bz
Differential Revision:	https://reviews.freebsd.org/D35755
MFC after:	2 weeks
</content>
</entry>
<entry>
<title>tcp: use IPV6_FLOWLABEL_LEN</title>
<updated>2023-04-11T16:53:51Z</updated>
<author>
<name>Richard Scheffenegger</name>
<email>rscheff@FreeBSD.org</email>
</author>
<published>2023-04-11T16:53:20Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=2169f71277b4703606f97d2dfc703d1d0e2c9c9e'/>
<id>urn:sha1:2169f71277b4703606f97d2dfc703d1d0e2c9c9e</id>
<content type='text'>
Avoid magic numbers when handling the IPv6 flow ID for
DSCP and ECN fields and use the named variable instead.

Reviewed By:		tuexen, #transport
Sponsored by:		NetApp, Inc.
Differential Revision:	https://reviews.freebsd.org/D39503
</content>
</entry>
<entry>
<title>net: Introduce IPV6_DSCP(), IPV6_ECN() and IPV6_TRAFFIC_CLASS() macros</title>
<updated>2021-03-04T19:56:48Z</updated>
<author>
<name>Kristof Provost</name>
<email>kp@FreeBSD.org</email>
</author>
<published>2021-03-04T10:26:40Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=bb4a7d94b99fbf7f59c876ffff8ded5f6a5b5c3e'/>
<id>urn:sha1:bb4a7d94b99fbf7f59c876ffff8ded5f6a5b5c3e</id>
<content type='text'>
Introduce convenience macros to retrieve the DSCP, ECN or traffic class
bits from an IPv6 header.

Use them where appropriate.

Reviewed by:	ae (previous version), rscheff, tuexen, rgrimes
MFC after:	2 weeks
Sponsored by:	Rubicon Communications, LLC ("Netgate")
Differential Revision:	https://reviews.freebsd.org/D29056
</content>
</entry>
<entry>
<title>Remove stale definitions. The removed definitions are not used right</title>
<updated>2020-03-01T12:34:27Z</updated>
<author>
<name>Michael Tuexen</name>
<email>tuexen@FreeBSD.org</email>
</author>
<published>2020-03-01T12:34:27Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=7e1e491f60553f6fd8440f70fbcb3945a5277bae'/>
<id>urn:sha1:7e1e491f60553f6fd8440f70fbcb3945a5277bae</id>
<content type='text'>
now and are incompatible with the correct ones in RFC 3168.

Submitted by:		Richard Scheffenegger
Differential Revision:	https://reviews.freebsd.org/D23903
</content>
</entry>
<entry>
<title>Remove now unused IPv6 macros and update docs.</title>
<updated>2019-11-15T21:55:41Z</updated>
<author>
<name>Bjoern A. Zeeb</name>
<email>bz@FreeBSD.org</email>
</author>
<published>2019-11-15T21:55:41Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=b141dd5ddfe9d0b5da8ee88541860c8629a4aeed'/>
<id>urn:sha1:b141dd5ddfe9d0b5da8ee88541860c8629a4aeed</id>
<content type='text'>
After r354748-354750 all uses of the IP6_EXTHDR_CHECK() and
IP6_EXTHDR_GET() macros are gone from the kernel.  IP6_EXTHDR_GET0()
was unused.  Remove the macros and update the documentation.

Sponsored by:	Netflix
</content>
</entry>
<entry>
<title>carp: Set DSCP value CS7</title>
<updated>2018-07-01T08:37:07Z</updated>
<author>
<name>Kristof Provost</name>
<email>kp@FreeBSD.org</email>
</author>
<published>2018-07-01T08:37:07Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=0d3d234cd13f6ea19a88df267bb814a889d176e9'/>
<id>urn:sha1:0d3d234cd13f6ea19a88df267bb814a889d176e9</id>
<content type='text'>
Update carp to set DSCP value CS7(Network Traffic) in the flowlabel field of
packets by default. Currently carp only sets TOS_LOWDELAY in IPv4 which was
deprecated in 1998. This also implements sysctl that can revert carp back to
it's old behavior if desired.

This will allow implementation of QOS on modern network devices to make sure
carp packets aren't dropped during interface contention.

Submitted by:	Nick Wolff &lt;darkfiberiru AT gmail.com&gt;
Reviewed by:	kp, mav (earlier version)
Differential Revision:	https://reviews.freebsd.org/D14536
</content>
</entry>
</feed>
