summaryrefslogtreecommitdiffstats
path: root/sys/net/pf.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* States in pf(4) let ICMP and ICMP6 packets pass if they have abluhm2019-03-201-4/+24
* Use timeout_add_sec() instead of timeout_add() with a multiplication with hzclaudio2018-12-171-2/+2
* Remove useless macroskn2018-12-101-32/+34
* in the "pf: key search" debug message, add the direction. interface *and*henning2018-11-151-2/+3
* - pf: honor quick on anchor rulessashan2018-10-161-4/+5
* Honor quick on anchor ruleskn2018-10-041-1/+7
* Add reference counting for inet pcb, this will be needed when webluhm2018-09-131-7/+27
* - moving state look up outside of PF_LOCK()sashan2018-09-111-33/+117
* Fix arguments of pf_purge_expired_{src_nodes,rules}()sf2018-07-221-2/+2
* trade few 'goto unlock: for 'break' in pf_test()sashan2018-07-121-6/+5
* the STATE_LOOKUP macro made sense ages ago. It stopped making sensehenning2018-07-111-56/+69
* in pf_set_protostate(), only decrement the half-open states counter whenhenning2018-07-101-2/+2
* provide a generic packet delay functionality. packets to be delayed are markedhenning2018-07-101-3/+43
* Refactor the six ways to find TCP options into one new function. As a result:procter2018-06-181-106/+91
* The function pf_create_state() calls pf_set_protostate() beforebluhm2018-06-041-2/+3
* While sending the pf syncookie, we are holding the pf lock. Sobluhm2018-06-011-2/+2
* pf route-to should not send packets from 127.0.0.1 or ::1 addressbluhm2018-05-101-3/+5
* All users of the PFLOG_PACKET() macro are inside "#if NPFLOG > 0".bluhm2018-04-061-6/+6
* If source and destination addresses are equal, the incoming andbluhm2018-03-061-5/+4
* make kernel compile again without INET6benno2018-02-271-1/+5
* - regression in pflog outputsashan2018-02-181-9/+16
* syncookies for pf.henning2018-02-061-4/+51
* some finger muscle workout:henning2018-02-061-16/+16
* Use the pf state key linking functions in two more places insteadbluhm2018-01-191-21/+6
* If pf route-to is used for locally generated packets, they may havebluhm2018-01-161-6/+13
* When pf(4) forwards incoming packets with route-to or reply-to,bluhm2018-01-151-1/+23
* Use pf_send_icmp() consistently in pf_route(). It sets the routingbluhm2018-01-101-15/+17
* Make sure that pf_mbuf_link_state_key() does not overwrite anbluhm2017-12-291-1/+2
* Make the functions which link the pf state keys to mbufs, inpcbs,bluhm2017-12-291-34/+59
* pf drops IPv4 packets with any options by default. For IPv6 thebluhm2017-12-281-1/+3
* There was a corner case where linking the inp to the state key didbluhm2017-12-241-3/+15
* RFC 4861 requires that all neighbor discovery packets have 255 inbluhm2017-12-041-1/+9
* Simplify the reverse PCB lookup logic. The PF_TAG_TRANSLATE_LOCALHOSTbluhm2017-12-011-4/+4
* The divert structure was using the port number to indicate thatbluhm2017-11-281-8/+11
* It does not make sense to call pcb lookup from pf during packetbluhm2017-11-221-2/+14
* Sprinkle some NET_ASSERT_LOCKED(), const and co to prepare runningmpi2017-11-201-1/+3
* add a generic packet rate matching filter. allows things likehenning2017-11-131-3/+15
* remove the ability for pf_ouraddr to say that a packet is forwarded.dlg2017-11-131-5/+1
* - add one more softnet taskqsashan2017-10-311-2/+2
* move pf_get_wscale + pf_get_mss prototypes to pfvar.h (diff shrinkage)henning2017-08-141-3/+1
* add half-open tcp states accounting, road paved by sashanhenning2017-08-141-3/+13
* to change a state's state (that term is overloaded in pf, protocol statehenning2017-08-131-57/+95
* Remove NET_LOCK()'s argument.mpi2017-08-111-4/+3
* Reduce contention on the NET_LOCK() by moving the logic of the pfpurgempi2017-08-061-24/+35
* Revert previous, it exposed two edge cases still requiring thempi2017-07-041-6/+5
* Drop the KERNEL_LOCK() in pf_purge_thread().mpi2017-07-031-5/+6
* Fix kernel diagnostic assertion "(sk->inp == NULL) || (sk->inp->inp_pf_skbluhm2017-06-211-3/+3
* - let's add PF_LOCK()sashan2017-06-051-13/+34
* Block IPv6 packets in pf(4) that have hop-by-hop options header orbluhm2017-05-311-3/+8
* teach pf_build_tcp() about SACK, ok & with sashanhenning2017-05-301-5/+13