<feed xmlns='http://www.w3.org/2005/Atom'>
<title>src/sys/netinet6/ip6_forward.c, branch release/9.3.0</title>
<subtitle>FreeBSD source tree</subtitle>
<id>https://cgit-dev.freebsd.org/src/atom?h=release%2F9.3.0</id>
<link rel='self' href='https://cgit-dev.freebsd.org/src/atom?h=release%2F9.3.0'/>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/'/>
<updated>2014-04-07T12:59:17Z</updated>
<entry>
<title>MFC r263969,263971:</title>
<updated>2014-04-07T12:59:17Z</updated>
<author>
<name>Andrey V. Elsukov</name>
<email>ae@FreeBSD.org</email>
</author>
<published>2014-04-07T12:59:17Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=9b3891bf3e101a7b1ffa826b723ac2fba4c50926'/>
<id>urn:sha1:9b3891bf3e101a7b1ffa826b723ac2fba4c50926</id>
<content type='text'>
  Don't generate an ICMPv6 error message if packet was consumed by filter.
  Remove unused label.

Sponsored by:	Yandex LLC
</content>
</entry>
<entry>
<title>MFC r252026:</title>
<updated>2013-07-04T08:57:13Z</updated>
<author>
<name>Andrey V. Elsukov</name>
<email>ae@FreeBSD.org</email>
</author>
<published>2013-07-04T08:57:13Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=f481828c484e8704a0826074079773e8477d6a91'/>
<id>urn:sha1:f481828c484e8704a0826074079773e8477d6a91</id>
<content type='text'>
  Use IPSECSTAT_INC() and IPSEC6STAT_INC() macros for ipsec statistics
  accounting.
</content>
</entry>
<entry>
<title>MFC r249294:</title>
<updated>2013-04-29T10:52:45Z</updated>
<author>
<name>Andrey V. Elsukov</name>
<email>ae@FreeBSD.org</email>
</author>
<published>2013-04-29T10:52:45Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=d00fb9ac60275809d50971558273204e36fced84'/>
<id>urn:sha1:d00fb9ac60275809d50971558273204e36fced84</id>
<content type='text'>
  Use IP6STAT_INC/IP6STAT_DEC macros to update ip6 stats.

MFC r249528,249546:
  Add accounting to the source address selection algorithm for cases, when
  it fails to select an address, also add several another counters to
  the statistics.

MFC r249543,249552:
  Replace hardcoded numbers.

MFC r249544:
  Use IP6S_M2MMAX macro.

MFC r249545:
  Replace hardcoded numbers. Also use interface-local scope name instead
  of node-local.
</content>
</entry>
<entry>
<title>MFC r242079:</title>
<updated>2012-11-27T01:59:51Z</updated>
<author>
<name>Andrey V. Elsukov</name>
<email>ae@FreeBSD.org</email>
</author>
<published>2012-11-27T01:59:51Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=379401c4319c2a8f4118215cafb6dede82462a6d'/>
<id>urn:sha1:379401c4319c2a8f4118215cafb6dede82462a6d</id>
<content type='text'>
  Remove the IPFIREWALL_FORWARD kernel option and make possible to turn
  on the related functionality in the runtime via the sysctl variable
  net.pfil.forward. It is turned off by default.

MFC r242082:
  Note the removal of the IPFIREWALL_FORWARD kernel option.

MFC r242463:
  Remove the recently added sysctl variable net.pfil.forward.
  Instead, add protocol specific mbuf flags M_IP_NEXTHOP and
  M_IP6_NEXTHOP. Use them to indicate that the mbuf's chain
  contains the PACKET_TAG_IPFORWARD tag. And do a tag lookup
  only when this flag is set.
</content>
</entry>
<entry>
<title>MFC r236332:</title>
<updated>2012-07-08T16:00:45Z</updated>
<author>
<name>Michael Tuexen</name>
<email>tuexen@FreeBSD.org</email>
</author>
<published>2012-07-08T16:00:45Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=eabc603cde830c2b4c667bd6fac1a31c891a982a'/>
<id>urn:sha1:eabc603cde830c2b4c667bd6fac1a31c891a982a</id>
<content type='text'>
Seperate SCTP checksum offloading for IPv4 and IPv6.
While there: remove some trainling whitespaces.

Approved by: re@
</content>
</entry>
<entry>
<title>MFC r236170,236176:</title>
<updated>2012-07-08T14:21:36Z</updated>
<author>
<name>Bjoern A. Zeeb</name>
<email>bz@FreeBSD.org</email>
</author>
<published>2012-07-08T14:21:36Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=da1a8f1ea29126bee8e41719c5fb2c633ba2c86f'/>
<id>urn:sha1:da1a8f1ea29126bee8e41719c5fb2c633ba2c86f</id>
<content type='text'>
 It turns out that too many drivers are not only parsing the L2/3/4
 headers for TSO but also for generic checksum offloading.  Ideally we
 would only have one common function shared amongst all drivers, and
 perhaps when updating them for IPv6 we should introduce that.
 Eventually we should provide the meta information along with mbufs to
 avoid (re-)parsing entirely.

 To not break IPv6 (checksums and offload) and to be able to MFC the
 changes without risking to hurt 3rd party drivers, duplicate the v4
 framework, as other OSes have done as well.

 Introduce interface capability flags for TX/RX checksum offload with
 IPv6, to allow independent toggling (where possible).  Add CSUM_*_IPV6
 flags for UDP/TCP over IPv6, and reserve further for SCTP, and IPv6
 fragmentation.  Define CSUM_DELAY_DATA_IPV6 as we do for legacy IP and
 add an alias for CSUM_DATA_VALID_IPV6.

 This pretty much brings IPv6 handling in line with IPv4.
 TSO is still handled in a different way and not via if_hwassist.

 Update ifconfig to allow (un)setting of the new capability flags.
 Update loopback to announce the new capabilities and if_hwassist flags.

 Individual driver updates will have to follow, as will SCTP.

 Removed the IFCAP_ prefix when printing the IPv6 checksum capabilities.

Approved by:	re
</content>
</entry>
<entry>
<title>MFC r235958,236130:</title>
<updated>2012-07-08T11:53:13Z</updated>
<author>
<name>Bjoern A. Zeeb</name>
<email>bz@FreeBSD.org</email>
</author>
<published>2012-07-08T11:53:13Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=99ecf29017500d176ca38e42c728ccb2ac2c8cc1'/>
<id>urn:sha1:99ecf29017500d176ca38e42c728ccb2ac2c8cc1</id>
<content type='text'>
   Add support for delayed checksum calculations in the IPv6
   output path.  We currently cannot offload to the card if we
   add extension headers (which incl. fragmentation).

   Fix two SCTP offload support copy&amp;paste bugs: calculate
   checksums if fragmenting and no need to flag IPv4 header
   checksums in the IPv6 forwarding path.

 Correctly get the payload length in host byte order.  While we
 already plan to support &gt;64k payload here, the IPv6 header payload
 length obviously is only 16 bit and the calculations need to be right.

Approved by:	re
</content>
</entry>
<entry>
<title>MFC r231852,232127:</title>
<updated>2012-02-29T09:47:26Z</updated>
<author>
<name>Bjoern A. Zeeb</name>
<email>bz@FreeBSD.org</email>
</author>
<published>2012-02-29T09:47:26Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=6a9d575377648b74e26b707fd6c6d2c297df99d0'/>
<id>urn:sha1:6a9d575377648b74e26b707fd6c6d2c297df99d0</id>
<content type='text'>
 Merge multi-FIB IPv6 support.

 Extend the so far IPv4-only support for multiple routing tables (FIBs)
 introduced in r178888 to IPv6 providing feature parity.

 This includes an extended rtalloc(9) KPI for IPv6, the necessary
 adjustments to the network stack, and user land support as in netstat.

Sponsored by:	Cisco Systems, Inc.
</content>
</entry>
<entry>
<title>Add support for IPv6 to ipfw fwd:</title>
<updated>2011-08-20T17:05:11Z</updated>
<author>
<name>Bjoern A. Zeeb</name>
<email>bz@FreeBSD.org</email>
</author>
<published>2011-08-20T17:05:11Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=8a006adb24414b61097ec694cc28fb15de51ac2e'/>
<id>urn:sha1:8a006adb24414b61097ec694cc28fb15de51ac2e</id>
<content type='text'>
Distinguish IPv4 and IPv6 addresses and optional port numbers in
user space to set the option for the correct protocol family.
Add support in the kernel for carrying the new IPv6 destination
address and port.
Add support to TCP and UDP for IPv6 and fix UDP IPv4 to not change
the address in the IP header.
Add support for IPv6 forwarding to a non-local destination.
Add a regession test uitilizing VIMAGE to check all 20 possible
combinations I could think of.

Obtained from:	David Dolson at Sandvine Incorporated
		(original version for ipfw fwd IPv6 support)
Sponsored by:	Sandvine Incorporated
PR:		bin/117214
MFC after:	4 weeks
Approved by:	re (kib)
</content>
</entry>
<entry>
<title>Virtualize the pfil hooks so that different jails may chose different</title>
<updated>2009-10-11T05:59:43Z</updated>
<author>
<name>Julian Elischer</name>
<email>julian@FreeBSD.org</email>
</author>
<published>2009-10-11T05:59:43Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=0b4b0b0feea2734cdf46d8542dee3cc4a56fa52b'/>
<id>urn:sha1:0b4b0b0feea2734cdf46d8542dee3cc4a56fa52b</id>
<content type='text'>
packet filters. ALso allows ipfw to be enabled on on ejail and disabled
on another. In 8.0 it's a global setting.

Sitting aroung in tree waiting to commit for: 2 months
MFC after:	2 months
</content>
</entry>
</feed>
