| Commit message (Collapse) | Author | Age | Files | Lines |
... | |
| |
| |
| |
| |
| |
| | |
Sponsored by: ABT Systems Ltd
(cherry picked from commit 7168ae84d82220caac0bb5f5f5d68ccc4e20915b)
|
| |
| |
| |
| |
| |
| | |
compatible string.
(cherry picked from commit 00c4defc2969be2094c365ef1a83f0449da76aa1)
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
* Currently supports only Armada38X family but other Marvell SoC's
can be added if needed.
* Provides temperature is C deg.
* To print the temperature one can use:
sysctl dev.armada_thermal.0.temperature
Submitted by: Zbigniew Bodek <zbb@semihalf.com>
Obtained from: Semihalf
Sponsored by: Stormshield
Differential revision: https://reviews.freebsd.org/D9217
(cherry picked from commit 600bb57f9bdeaed529586c08753e2518e5746959)
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
Fix the regression introduced in r275710.
When a security policy should match TCP connection with specific ports,
the SYN+ACK segment send by syncache_respond() is considered as forwarded
packet, because at this moment TCP connection does not have PCB structure,
and ip_output() is called without inpcb pointer. In this case SPIDX filled
for SP lookup will not contain TCP ports and security policy will not
be found. This can lead to unencrypted SYN+ACK on the wire.
This patch restores the old behavior, when ports will not be filled only
for forwarded packets.
Reported by: Dewayne Geraghty <dewayne.geraghty at heuristicsystems.com.au>
MFC r322751:
Remove stale comments.
(cherry picked from commit 4e0ff7d0a944d10581e904bc3057524ce7071e30)
|
|\ \
| |/ |
|
| |
| |
| |
| |
| |
| |
| |
| | |
Fix VNET kernel panic with asynchronous I/O. [EN-17:07]
Fix pf(4) housekeeping thread causes kernel panic. [EN-17:08]
Approved by: so
|
| |
| |
| |
| | |
(cherry picked from commit 316530deb8bcf9c3f9dafdb814c73f1c7ec6b9e9)
|
| |
| |
| |
| | |
(cherry picked from commit 4ca30a279eec9a6d08825ec4deba707c8a9d359c)
|
| |
| |
| |
| |
| |
| | |
tentative flag on interface address.
(cherry picked from commit cc11287496510575f2f0e07e93e28cb81316d70f)
|
| |
| |
| |
| |
| |
| |
| |
| | |
counted in IFQ_HANDOFF().
Ticket #7751
(cherry picked from commit 327d0a443586caf89a7d663c081f536cb4bba770)
|
| |
| |
| |
| | |
(cherry picked from commit c7cb7c5dd18db88217dd3fc69cbd48beceac7ae3)
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
By adding it to the option priorities table.
PR: 184117
Submitted by: Lowell Gilbert <freebsd-bugs-local at be-well.ilk.org>
Reported by: Tomek CEDRO <cederom at tlen.pl>
Reviewed by: jhb
Differential Revision: https://reviews.freebsd.org/D7911
(cherry picked from commit df343ad2c22ac5702463b6f9f13e95808381e2b7)
|
| |
| |
| |
| | |
(cherry picked from commit a49dcfe92933091515b9df7272f9f2d37d7137b6)
|
| |
| |
| |
| | |
(cherry picked from commit 2e8d3ef621d72c1673969bec47744def87033b15)
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
New flag 0x4 can be configured in net.enc.[in|out].ipsec_bpf_mask.
When it is set, if_enc(4) additionally captures a packet via BPF after
invoking pfil hook. This may be useful for debugging.
MFC after: 2 weeks
Sponsored by: Yandex LLC
Differential Revision: https://reviews.freebsd.org/D11804
(cherry picked from commit 6dd69d60f664b5687f5b7eb3a77f079dac3df6c2)
|
| |
| |
| |
| |
| |
| | |
Ticket #7116
(cherry picked from commit 713562395203d4c40981e0a56121ffd611329bce)
|
| |
| |
| |
| | |
(cherry picked from commit 7e2bac9957c7c8da5275b6eb186cabbb36f4584f)
|
| |
| |
| |
| |
| |
| | |
when there is no match.
(cherry picked from commit 73a63890285a675bcddbbadc343f7f134af0ef23)
|
| |
| |
| |
| |
| |
| | |
Ticket #6606
(cherry picked from commit a9a1aa674f93e8a266555fe82809bd8e9d864d1a)
|
| |
| |
| |
| |
| |
| |
| |
| | |
Update the patch to -head and stable/11.
Ticket #7272
(cherry picked from commit 9b4f61fbff06039b57566ba7332b763188d6d301)
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
from enc_hhook().
This should solve the problem when pf is used with if_enc(4) interface,
and outbound packet with existing PCB checked by pf, and this leads to
deadlock due to pf does its own PCB lookup and tries to take rlock when
wlock is already held.
Now we pass PCB pointer if it is known to the pfil hook, this helps to
avoid extra PCB lookup and thus rlock acquiring is not needed.
For inbound packets it is safe to pass NULL, because we do not held any
PCB locks yet.
PR: 220217
MFC after: 3 weeks
Sponsored by: Yandex LLC
(cherry picked from commit 4c7d86cbec231dc1fe6814f0e5e2db63394a2bcb)
|
| |
| |
| |
| | |
(cherry picked from commit 4ff0e4a77646d70078e5be332359df4967d187f2)
|
| |
| |
| |
| |
| |
| | |
Reported by: garga
(cherry picked from commit 4fbc95c7ac1751266543e1c17e547fc8daec2981)
|
|\ \
| |/ |
|
| |
| |
| |
| |
| |
| |
| |
| | |
- Add the anticipated 11.1-RELEASE date to UPDATING.
- Set a static __FreeBSD_version.
Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation
|
| |
| |
| |
| | |
(cherry picked from commit cc274278302a81add472ccf3344e8ec09a44f737)
|
| |
| |
| |
| | |
(cherry picked from commit dc59fff1188c9c81632773b3ddf0ba6e0ee843e3)
|
| |
| |
| |
| | |
(cherry picked from commit f12a05b2e54dc5fd9af1b44316516af0a1e2a1c8)
|
| |
| |
| |
| |
| |
| | |
The mixed tables are used to match against the IP[4|6] and the MAC address of the peer.
(cherry picked from commit edfbe4e11e3f835451d36dfb533e0785f4437497)
|
| |
| |
| |
| |
| |
| | |
No functional changes.
(cherry picked from commit 149c98cc6bcd55e12dab57b7ea5f7a27aceadba0)
|
| |
| |
| |
| | |
(cherry picked from commit 2ede8a241662d3c07773cb25ece6be513e741b60)
|
| |
| |
| |
| |
| |
| |
| |
| | |
searches based on interface as this will cause issues with multi-wan setups.
Ticket #6986
(cherry picked from commit 114dc4a89011a560c32421ca842ca73f5b29d449)
|
| |
| |
| |
| | |
(cherry picked from commit c5118da571b9ef9e22fd40b1cab8dec097e9fd7d)
|
| |
| |
| |
| |
| |
| |
| |
| | |
drop the packet. While it even works for forwarded packets it will close the connection for a local bound sockets.
Ticket #7050
(cherry picked from commit 4c908ee9021b280805f8f240274e7cb06bba80db)
|
| |
| |
| |
| |
| |
| |
| |
| | |
not M_SKIP_FIREWALL.
Ticket #7050
(cherry picked from commit 994e779f035e9ed49909936d5773f930adfc4075)
|
| |
| |
| |
| |
| |
| |
| |
| | |
m_tag_first() to do the right thing.
Ticket #7050
(cherry picked from commit 3eb3c59dd40ec6da4e6c3f46946fdc89ddfb5a11)
|
| |
| |
| |
| |
| |
| | |
undo/redo.
(cherry picked from commit 3af193c1cec01f6188c35021a07e3f43201f105f)
|
| |
| |
| |
| |
| |
| | |
Ticket #7050
(cherry picked from commit bf80603857ea4d11cb666429c1ec7917bbac9bf0)
|
| |
| |
| |
| | |
(cherry picked from commit e32688857d7d7435fa62dd2bc0079f51cabefeca)
|
| |
| |
| |
| |
| |
| | |
Tested with dummynet rules (limiters).
(cherry picked from commit 1d722dd06892ee05b1117ba6b3454baeec5f2690)
|
| |
| |
| |
| | |
(cherry picked from commit 4a13836be57e438f8e088ecd478441dc132db3f9)
|
| |
| |
| |
| | |
(cherry picked from commit 3109c027bc0d10653af18b6463929abbbea8afaf)
|
| |
| |
| |
| | |
(cherry picked from commit da345171c852e8ab229591c46daef6bf3c0c676e)
|
| |
| |
| |
| | |
(cherry picked from commit 201ab78f020c884be5c1e5b69e5f40e4a57eef89)
|
| |
| |
| |
| |
| |
| |
| |
| | |
FreeBSD 8.
Fix IPv6 code too.
(cherry picked from commit 4e68aed43a934b9b166c017fb6fbd2dc9f45b193)
|
| |
| |
| |
| | |
(cherry picked from commit 53775034bf00702f6c0a512bc44c72bff049060f)
|
| |
| |
| |
| |
| |
| | |
Ticket #7219
(cherry picked from commit 5c1daa5ea1098b67d4c331d5e21b39178d616031)
|
| |
| |
| |
| |
| |
| | |
Ticket #7026
(cherry picked from commit aa25003286b43c3710fe1a98b09b15385b736944)
|
| |
| |
| |
| |
| |
| |
| |
| | |
Fixes the tcpdump decoding on pflog interface.
Reported as a secondary bug in Ticket #4723
(cherry picked from commit 58df8b93be71a46ae8829e57ca1bfd94c4179e59)
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
net/vlan: Shift for pri is 13 (pri mask 0xe000) not 1.
Reviewed by: araujo, hps
Sponsored by: Microsoft
Differential Revision: https://reviews.freebsd.org/D7710
(cherry picked from commit 860932ee33fe82330891c9acc939827c05f20999)
|