Age | Commit message (Collapse) | Author |
|
outbound), using a new BIOCSDIRFILT ioctl;
guidance, feedback and ok canacar@
|
|
bpf FILDROP interface exists for about one year but the required
interface to the drivers was missing - so it was useless. this new
approach based on a design by henning@ uses a new mbuf flag to mark
filtered packets and to drop them in the generic network stack input
routines (like ether_input).
for example; after some additional testing, this could be used by
dhclient to filter everything except DHCP packets (track tech@
for a corresponding dhclient diff). the "filter dropped" packets won't
reach the network stack. so it's probably some kind of a very basic
application layer packet filter ;).
ok canacar@, discussed with henning@ and others
|
|
to bpf with either an address family or other header added.
These helpers only allocate a much smaller struct m_hdr on the stack when
needed, rather than leaving 256 byte struct mbufs on the stack in deep
call paths. Also removes a fair bit of duplicated code.
commit now, tune after deraadt@
|
|
ok canacar@, fgsch@, tested by some other people
|
|
consistent style in sys/net/bpf.c.
ok henning@, "looks fine" canacar@
|
|
When enabled, it notifies the calling interface that the packet
matches a bpf filter and should be dropped.
ok henning@ markus@ frantzen@
|
|
From NetBSD
ok deraadt@
|
|
manual page.
- more strict bpf code validation, preventing arbitrary kernel memory
read and writes.
Some help from frantzen@ and canacar@; testing jmc@ markus@;
ok canacar@ henning@ franzen@
|
|
max size goes to 2MB, default goes to 32k. ok canacar@ mcbride@
|
|
Locking prevents dangerous ioctls such as changing the
interface and sending signals to be executed by an
unprivileged process. A filter can also be applied
to packets injected through a bpf descriptor.
These features allow programs using bpf descriptors to
safely drop/seperate privileges.
ok frantzen@ henning@ mcbride@
|
|
|
|
rescinded 22 July 1999. Proofed by myself and Theo.
|
|
With this change, the log header format also changes.
The new log format is extendible and allows logging
of the originating anchor and ruleset information.
ok henning@ dhartmei@ frantzen@
|
|
|
|
|
|
|
|
portability
|
|
action and rule nr.
|
|
same naming style.
|
|
source address in forged frames. from NetBSD. art@ok
|
|
|
|
other families than inet.
|
|
|
|
|
|
|
|
|
|
bpf via the enc0 interface, using linktype DLT_ENC.
|
|
|
|
as it begins with a timeval struct. This fixes the alpha bpf panics.
Removed double prototypes. Reordered includes. The last change came from
NetBSD. Updated $NetBSD$ tags. Slight KNF too.
|
|
|
|
|
|
|
|
|