summaryrefslogtreecommitdiffstats
path: root/sys/net/pf_ioctl.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* pfsync_state_import() must not be called with the pf state lock held,patrick2021-02-091-3/+1
* Activate use of PF_LOCK() by removing the WITH_PF_LOCK ifdefs.patrick2021-02-091-3/+1
* Reject rules with invalid port rangeskn2020-12-161-1/+23
* - missing NET_UNLOCK() in pf_ioctl.c error pathsashan2020-10-221-1/+2
* - move NET_LOCK() further down in pf_ioctl.c. Also move memory allocationssashan2020-10-211-64/+239
* relax check for valid onrdomain range. onrdomain is -1 if the value isclaudio2020-10-021-2/+3
* rdomain IDs do not need to exist for "on rdomain N" to workkn2020-10-011-5/+3
* Rehash main ruleset after rule expirationkn2020-08-241-12/+9
* Remove ptr_array from struct pf_rulesetkn2020-08-241-19/+2
* when calculating the ruleset's checksum, skip automatic table names.henning2020-07-211-2/+4
* kernel: use gettime(9)/getuptime(9) in lieu of time_second(9)/time_uptime(9)cheloha2020-06-241-6/+6
* Document the various flavors of NET_LOCK() and rename the reader version.mpi2020-05-271-3/+3
* fix insufficient input sanitization in pf_rulecopyin() and pf_pool_copyin()sashan2020-04-191-1/+4
* Stop processing packets under non-exclusive (read) netlock.mpi2020-04-121-3/+3
* Cleanup <sys/kthread.h> and <sys/proc.h> includes.mpi2020-02-181-2/+2
* Check address family of pf ioctl(2) DIOCNATLOOK parameter at kernelbluhm2020-01-081-1/+13
* Use proper NUL byte not zero with stringskn2019-11-261-7/+7
* fix kernel crash in pf_ioctl with WITH_PF_LOCK and NET_TASKQ > 1sashan2019-11-261-4/+2
* "set delay" never worked as committed: the delay field was not copiedotto2019-11-171-1/+2
* Add a sysctl accessor to struct pf_status. The pf_status only holds theclaudio2019-05-091-1/+17
* Change ps_len of struct pfioc_states and psn_len of structbluhm2019-02-181-4/+4
* Check for main ruleset explicitlykn2018-12-271-3/+3
* Rename pf_anchor_remove() to pf_remove_anchor()kn2018-12-171-2/+2
* Use timeout_add_sec() instead of timeout_add() with a multiplication with hzclaudio2018-12-171-2/+2
* Remove useless macroskn2018-12-101-11/+13
* Allow DIOCRGETADDRS when securelevel(7) > 1kn2018-10-011-1/+2
* - moving state look up outside of PF_LOCK()sashan2018-09-111-10/+43
* Fix arguments of pf_purge_expired_{src_nodes,rules}()sf2018-07-221-4/+4
* provide a generic packet delay functionality. packets to be delayed are markedhenning2018-07-101-1/+4
* Use pf_rm_rule() instead of pool_put() to decrement references bybluhm2018-04-241-2/+2
* Remove compatibility with pfctl from 6.1 and plug a few leaksmikeb2018-04-131-1/+7
* Explicitly check PF_TRANS_RULESET in DIOCXBEGIN, DIOCXCOMMIT, and DIOCXROLLBACK.lteo2018-04-051-5/+29
* add DIOCGETSYNFLWATS to get current synflood detection watermarks,henning2018-02-081-2/+13
* look ma, henning forgot to PF_LOCK/_UNLOCK in the new ioctls, ok procterhenning2018-02-071-1/+5
* syncookies for pf.henning2018-02-061-1/+16
* some finger muscle workout:henning2018-02-061-21/+21
* In pfioctl() a pf unlock was missing in the error path.bluhm2018-01-191-1/+2
* The divert structure was using the port number to indicate thatbluhm2017-11-281-3/+2
* add a generic packet rate matching filter. allows things likehenning2017-11-131-1/+4
* - add one more softnet taskqsashan2017-10-311-2/+2
* - fine tuning PF_LOCK in pfioctl()sashan2017-10-301-3/+176
* Remove NET_LOCK()'s argument.mpi2017-08-111-4/+3
* Reduce contention on the NET_LOCK() by moving the logic of the pfpurgempi2017-08-061-12/+3
* For pf the anchor is a C string so ensure that the value passed in via ioctlclaudio2017-07-271-1/+29
* Rework HFSC vs FQ-CoDel checksmikeb2017-07-191-6/+7
* Convert pf tagname malloc(9) into pool_get(9) to make it MP safe.bluhm2017-07-051-9/+13
* Introduce a simple mechanism to select the appropriate queue managermikeb2017-06-281-1/+9
* Tighten up FQ-CoDel vs HFSC checksmikeb2017-06-281-3/+4
* - let's add PF_LOCK()sashan2017-06-051-1/+7
* Return time_uptime as value for when pf was enabled instead ofpatrick2017-06-011-4/+4