summaryrefslogtreecommitdiffstats
path: root/sys/net/bpf.c
Commit message (Expand)AuthorAgeFilesLines
* rev bpf attach/detach event api to include the dltsam2009-05-251-2/+2
* add bpf_track eventhandler for monitoring bpf taps attached/detachedsam2009-05-181-0/+4
* Change the curvnet variable from a global const struct vnet *,zec2009-05-051-2/+2
* Disable zerocopy by default for now. It's causing some problems in pcapcsjp2009-03-101-1/+1
* When resetting a BPF descriptor, properly check that zero-copy buffersrwatson2009-03-071-5/+11
* Mark the bpf stats sysctl as being mpsafe. We do not requirecsjp2009-03-071-1/+1
* Switch the default buffer mode in bpf(4) to zero-copy buffers.csjp2009-03-021-1/+1
* Merge more of currently non-functional (i.e. resolving tozec2008-11-261-0/+7
* Retire the MALLOC and FREE macros. They are an abomination unto style(9).des2008-10-231-1/+1
* Make bpf_maxinsns visible from ng_bpf.c.jkim2008-08-291-1/+1
* Change bpf(4) to use the cdevpriv API.ed2008-08-131-80/+62
* Annotate why we do not call BPF_CHECK_DIRECTION() in this tapping routine.csjp2008-08-011-0/+6
* Allow injecting big packets via bpf(4) up to min(MTU, 16K-byte).jkim2008-07-141-3/+9
* Add a new ioctl for changing the read filter (BIOCSETFNR). This isdwmalone2008-07-071-4/+8
* Make sure we are clearing the ZBUF_FLAG_IMMUTABLE any time a free buffercsjp2008-07-051-0/+25
* Set D_TRACKCLOSE to avoid a race in devfs that could lead to orphaned bpfjhb2008-05-091-0/+1
* Check packet directions more properly instead of just checking receivedjkim2008-04-281-5/+5
* Revert the previous commit and use M_PROMISC flag instead.jkim2008-04-151-8/+17
* Remove M_SKIP_FIREWALL abuse and add more appropriate check.jkim2008-04-151-20/+11
* Maintain and observe a ZBUF_FLAG_IMMUTABLE flag on zero-copy BPFrwatson2008-04-071-10/+50
* Replaced the misleading uses of a historical artefact M_TRYWAIT with M_WAIT.ru2008-03-251-7/+4
* Check for a NULL free buffer pointer in BPF before invokingrwatson2008-03-251-1/+1
* Introduce support for zero-copy BPF buffering, which reduces thecsjp2008-03-241-109/+313
* In keeping with style(9)'s recommendations on macros, use a ';'rwatson2008-03-161-1/+1
* Add comment that bpfread() has multi-threading issues.rwatson2008-02-021-1/+4
* Use __FBSDID() in the kernel BPF implementation.rwatson2007-12-251-2/+3
* Remove trailing whitespace from lines in BPF.rwatson2007-12-231-3/+3
* Merge first in a series of TrustedBSD MAC Framework KPI changesrwatson2007-10-241-8/+8
* Make sure that we refresh the PID on read(2) and write(2) operations.csjp2007-10-121-0/+2
* Check for multicast destination on bpf injected packets and update the M_*CASTthompsa2007-09-101-4/+19
* Remove the now-unused NET_{LOCK,UNLOCK,ASSERT}_GIANT() macros, whichrwatson2007-08-061-10/+2
* Replace references to NET_CALLOUT_MPSAFE with CALLOUT_MPSAFE, and removerwatson2007-07-281-1/+1
* Silence some gcc 4 warnings. It is expected that the bpf_movein() routinecsjp2007-06-171-0/+2
* - Conditionally pickup Giant around the network interfacecsjp2007-06-151-3/+4
* Add three new ioctl(2) commands for bpf(4).jkim2007-02-261-31/+88
* Remove slightly dubious comment; add descriptive strings for severalrwatson2007-01-281-5/+2
* Sweep kernel replacing suser(9) calls with priv(9) calls, assigningrwatson2006-11-061-1/+2
* Complete break-out of sys/sys/mac.h into sys/security/mac/mac_framework.hrwatson2006-10-221-1/+2
* Since bpf_allocbufs() uses malloc() with M_WAITOK, don't check returnrwatson2006-08-091-16/+9
* add support for 802.11 packet injection via bpfsam2006-07-261-0/+31
* Rather than calling mircotime() in catchpacket(), make catchpacket()dwmalone2006-07-241-6/+30
* Adjust descriptor locking to tell the kqueue subsystem that our descriptor iscsjp2006-07-031-3/+1
* Since we are doing some bpf(4) clean up, change a couple of function prototypescsjp2006-06-151-142/+48
* If bpf(4) has not been compiled into the kernel, initialize the bpf interfacecsjp2006-06-141-0/+5
* Fix the following bpf(4) race condition which can result in a panic:csjp2006-06-021-71/+24
* Fix -Wundef warnings.ru2006-05-301-7/+7
* Pickup locks for the BPF interface structure. It's quite possible thatcsjp2006-05-071-0/+2
* Add BPF Just-In-Time compiler support for ng_bpf(4).jkim2005-12-071-6/+0
* Add experimental BPF Just-In-Time compiler for amd64 and i386.jkim2005-12-061-3/+54
* Protect PID initializations for statistics by the bpf descriptorcsjp2005-10-041-2/+6
OpenPOWER on IntegriCloud