summaryrefslogtreecommitdiffstats
path: root/sys/net/pf.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* spellingjsg2021-03-101-2/+2
* Refactor ip_fragment() and ip6_fragment(). Use a mbuf list tobluhm2021-03-011-17/+13
* Use NULL instead of 0 in `m_nextpkt' assignment.mvs2021-02-231-2/+2
* use rtalloc_mpath in pf_route and pf_route6.dlg2021-02-161-3/+4
* pf_remove_divert_state() is an entry point into pf, modifying the pf statepatrick2021-02-121-1/+7
* Fix null pointer dereference in pf_route6(). Embedding scope intobluhm2021-02-121-3/+1
* make if_pfsync.c a better friend with PF_LOCKsashan2021-02-041-4/+4
* change pf_route so pf only runs when packets enter and leave the stack.dlg2021-02-031-3/+3
* change route-to so it sends packets to IPs instead of interfaces.dlg2021-02-011-108/+72
* handle "once" rules before letting pfsync defer tx of a packet.dlg2021-01-281-15/+15
* if the route resolved in pf_route is invalid, generate an icmp error.dlg2021-01-271-1/+10
* have pf_route{,6} clear the pf_pdesc mbuf ref early for route-to/reply-to.dlg2021-01-271-5/+3
* don't run copies of packets made by dup-to through pf_test.dlg2021-01-271-3/+3
* pflog(4) tried to log the translated packet with rdr-to, nat-to,bluhm2021-01-191-10/+3
* The sysctl variable net.inet.ip.forwarding is checked beforebluhm2021-01-161-7/+19
* Remove a check that bypasses pf state tests. It dates back to 2003bluhm2021-01-151-7/+1
* Fix build without carp: ifp0 is only used within #if NCARP > 0.tb2021-01-141-2/+7
* Minor refactoring in pf(4). Note that struct pfsync_state is nobluhm2021-01-041-18/+4
* when setting a flowid, set the M_FLOWID csum_flags bit too.dlg2020-12-101-2/+4
* synproxy should be processing incoming SYN packets only.sashan2020-12-071-2/+2
* Use interface index instead of pointer to `ifnet' in carp(4).mvs2020-07-241-9/+15
* kernel: use gettime(9)/getuptime(9) in lieu of time_second(9)/time_uptime(9)cheloha2020-06-241-20/+20
* make ph_flowid in mbufs 16bits by storing whether it's set in csum_flags.dlg2020-06-171-5/+3
* "set delay" never worked as committed: the delay field was not copiedotto2019-11-171-3/+3
* Use -1 to indicate an invalid uid/gid, not UID_MAX and GID_MAX.millert2019-10-171-7/+7
* pf_state_insert() must grab state lock exclusivelysashan2019-08-291-2/+9
* pf.conf "set timeout interval 1" causes kernel crashsashan2019-08-261-2/+5
* follow up to 'once rule' expirationsashan2019-07-181-3/+4
* This commit fixes two bugs involving PF once rules:lteo2019-07-181-4/+20
* fix NULL pointer dereference, reported and fix tested by sthensashan2019-07-111-3/+5
* Fix previous commit which made src-node have a reference for the kif.yasuoka2019-07-091-1/+3
* When source address tracking record is used for "route-to", the nextyasuoka2019-07-021-3/+4
* Link the state and the source track to keep the source track whileyasuoka2019-07-011-10/+9
* States in pf(4) let ICMP and ICMP6 packets pass if they have abluhm2019-03-201-4/+24
* Use timeout_add_sec() instead of timeout_add() with a multiplication with hzclaudio2018-12-171-2/+2
* Remove useless macroskn2018-12-101-32/+34
* in the "pf: key search" debug message, add the direction. interface *and*henning2018-11-151-2/+3
* - pf: honor quick on anchor rulessashan2018-10-161-4/+5
* Honor quick on anchor ruleskn2018-10-041-1/+7
* Add reference counting for inet pcb, this will be needed when webluhm2018-09-131-7/+27
* - moving state look up outside of PF_LOCK()sashan2018-09-111-33/+117
* Fix arguments of pf_purge_expired_{src_nodes,rules}()sf2018-07-221-2/+2
* trade few 'goto unlock: for 'break' in pf_test()sashan2018-07-121-6/+5
* the STATE_LOOKUP macro made sense ages ago. It stopped making sensehenning2018-07-111-56/+69
* in pf_set_protostate(), only decrement the half-open states counter whenhenning2018-07-101-2/+2
* provide a generic packet delay functionality. packets to be delayed are markedhenning2018-07-101-3/+43
* Refactor the six ways to find TCP options into one new function. As a result:procter2018-06-181-106/+91
* The function pf_create_state() calls pf_set_protostate() beforebluhm2018-06-041-2/+3
* While sending the pf syncookie, we are holding the pf lock. Sobluhm2018-06-011-2/+2
* pf route-to should not send packets from 127.0.0.1 or ::1 addressbluhm2018-05-101-3/+5