| #
f937c412 |
| 03-Jun-2023 |
lukem <lukem@NetBSD.org> |
bsd.own.mk: rename to CC_WNO_ADDRESS_OF_PACKED_MEMBER
Provide a single variable CC_WNO_ADDRESS_OF_PACKED_MEMBER with options for both clang and gcc, to replace CLANG_NO_ADDR_OF_PACKED_MEMBER CC_N
bsd.own.mk: rename to CC_WNO_ADDRESS_OF_PACKED_MEMBER
Provide a single variable CC_WNO_ADDRESS_OF_PACKED_MEMBER with options for both clang and gcc, to replace CLANG_NO_ADDR_OF_PACKED_MEMBER CC_NO_ADDR_OF_PACKED_MEMBER GCC_NO_ADDR_OF_PACKED_MEMBER
Using the convention CC_compilerflag, where compilerflag is based on the full compiler flag name.
show more ...
|
| #
11f18d41 |
| 29-May-2023 |
lukem <lukem@NetBSD.org> |
bsd.own.mk: rename NO_ADDR_OF_PACKED_MEMBER to CC_NO_ADDR_OF_PACKED_MEMBER
Add "CC_" prefix to NO_ADDR_OF_PACKED_MEMBER.
We now have the following convention: GCC_NO_*: Disable specific warnings fr
bsd.own.mk: rename NO_ADDR_OF_PACKED_MEMBER to CC_NO_ADDR_OF_PACKED_MEMBER
Add "CC_" prefix to NO_ADDR_OF_PACKED_MEMBER.
We now have the following convention: GCC_NO_*: Disable specific warnings from GCC. CLANG_NO_*: Disable specific warnings from Clang. CC_NO_*: Disable specific warnings from both Clang and GCC.
This reserves "NO_*" Makefile variables to disable other features.
Some space->tab fixes.
show more ...
|
| #
0f75d4c1 |
| 18-Oct-2020 |
christos <christos@NetBSD.org> |
Provide a global no-packed-address for both gcc and clang
|
| #
facf2dbe |
| 18-Oct-2020 |
christos <christos@NetBSD.org> |
use the GCC_ warning variable
|
| #
53f398bf |
| 18-Oct-2020 |
christos <christos@NetBSD.org> |
Avoid alignment of packed member
|
| #
5305e005 |
| 26-Sep-2019 |
christos <christos@NetBSD.org> |
kill WARNS = 3
|
| #
f9f078e3 |
| 24-Jul-2019 |
rmind <rmind@NetBSD.org> |
Update the NPF kernel module Makefile. Missed in the previous commit.
|
| #
2bc4fb1f |
| 17-Feb-2019 |
rin <rin@NetBSD.org> |
Bump default value of WARNS for modules from 3 to 5, and explicitly set WARNS for modules that fail with WARNS=5.
Also, turn on -Wno-missing-noreturn for clang for some files.
At the moment, among
Bump default value of WARNS for modules from 3 to 5, and explicitly set WARNS for modules that fail with WARNS=5.
Also, turn on -Wno-missing-noreturn for clang for some files.
At the moment, among ~ 360 modules, - 2 (lua and zfs) need WARNS=0 - 1 (solaris) needs WARNS=1 - 136 need WARNS=3 (mostly due to sign-compare) - 4 need WARNS=4 - others can be compiled with WARNS=5
Discussed on tech-kern.
show more ...
|
| #
39013e66 |
| 29-Sep-2018 |
rmind <rmind@NetBSD.org> |
NPF: Major rework -- migrate NPF to the libnv library. - This conversion significantly simplifies the code and moves NPF to a binary serialisation format (replacing the XML-like format). - Fix some
NPF: Major rework -- migrate NPF to the libnv library. - This conversion significantly simplifies the code and moves NPF to a binary serialisation format (replacing the XML-like format). - Fix some memory/reference leaks and possibly use-after-free bugs. - Bump NPF_VERSION as this change makes libnpf incompatible with the previous versions. Also, different serialisation format means NPF connection/config saving and loading is not compatible with the previous versions either.
Thanks to christos@ for extra testing.
show more ...
|
| #
0b635e7c |
| 02-Jan-2017 |
rmind <rmind@NetBSD.org> |
NPF: implement dynamic handling of interface addresses (the kernel part).
|
| #
fd60c59b |
| 28-Dec-2016 |
christos <christos@NetBSD.org> |
oops forgot to commit this one.
|
| #
658319f6 |
| 09-Dec-2016 |
christos <christos@NetBSD.org> |
ditch ptree and use lpm
|
| #
3bf8f262 |
| 20-Aug-2015 |
christos <christos@NetBSD.org> |
Add ioconf entries to the pseudo-devices.
|
| #
0621553d |
| 19-Jul-2014 |
rmind <rmind@NetBSD.org> |
NPF: partially rewrite the connection tracking mechanism: - Separate the tracking interface from the storage (state table) and thus prepare to use a new data structure for the storage. - Fix some r
NPF: partially rewrite the connection tracking mechanism: - Separate the tracking interface from the storage (state table) and thus prepare to use a new data structure for the storage. - Fix some race conditions in NAT association logic.
show more ...
|
| #
a79812ea |
| 08-Nov-2013 |
rmind <rmind@NetBSD.org> |
NPF: add support for specifying the interfaces before they are attached. If an interface is or gets detached, all associated rules and connections will be deactivated (it might be useful to have an o
NPF: add support for specifying the interfaces before they are attached. If an interface is or gets detached, all associated rules and connections will be deactivated (it might be useful to have an option to invalidate the associated connections). Once the interface is reattached they will become active.
Bump NPF_VERSION.
show more ...
|
| #
7b5edfdc |
| 19-Sep-2013 |
rmind <rmind@NetBSD.org> |
NPF: G/C n-code in favour of BPF byte-code. Delete lots of code, mmm!
|
| #
4e592132 |
| 19-Sep-2013 |
rmind <rmind@NetBSD.org> |
- Convert NPF to use BPF byte-code by default. Compile BPF byte-code in npfctl(8) and generate separate marks to describe the filter criteria. - Rewrite 'npfctl show' functionality and fix some of
- Convert NPF to use BPF byte-code by default. Compile BPF byte-code in npfctl(8) and generate separate marks to describe the filter criteria. - Rewrite 'npfctl show' functionality and fix some of the bugs. - npftest: add a test for BPF COP. - Bump NPF_VERSION.
show more ...
|
| #
bdfcfdca |
| 02-Jun-2013 |
rmind <rmind@NetBSD.org> |
- NPF connection tracking: rework synchronisation on tracking disable/enable points and document it. Split the worker thread into a separate module with an interface, so it could be re-used for
- NPF connection tracking: rework synchronisation on tracking disable/enable points and document it. Split the worker thread into a separate module with an interface, so it could be re-used for other tasks. - Replace ALG list with arrays and thus hit fewer cache lines. - Misc bug fixes.
show more ...
|
| #
0e218254 |
| 09-Feb-2013 |
rmind <rmind@NetBSD.org> |
NPF: - Implement dynamic NPF rules. Controlled through npf(3) library of via npfctl rule command. A rule can be removed using a unique identifier, returned on addition, or using a key which is
NPF: - Implement dynamic NPF rules. Controlled through npf(3) library of via npfctl rule command. A rule can be removed using a unique identifier, returned on addition, or using a key which is SHA1 hash of the rule. Adjust npftest and add a regression test. - Improvements to rule inspection mechanism. - Initial BPF support as an alternative to n-code. - Minor fixes; bump the version.
show more ...
|
| #
8c6e21bf |
| 16-Sep-2012 |
rmind <rmind@NetBSD.org> |
Implement dynamic NPF extensions interface. An extension consists of dynamically loaded module (.so) supplementing npfctl(8) and a kernel module. Move normalisation and logging functionality into t
Implement dynamic NPF extensions interface. An extension consists of dynamically loaded module (.so) supplementing npfctl(8) and a kernel module. Move normalisation and logging functionality into their own extensions. More improvements to come.
show more ...
|
| #
63f44833 |
| 12-Aug-2012 |
rmind <rmind@NetBSD.org> |
- Extend npftest: add ruleset inspection testing from the config generated by npfctl debug functionality. Auto-create npftest interfaces for this. - NPF sessions: combine protocol and interface in
- Extend npftest: add ruleset inspection testing from the config generated by npfctl debug functionality. Auto-create npftest interfaces for this. - NPF sessions: combine protocol and interface into a separate substructure, share between the entries and thus fix the handling of them. Constify. - npftest: add regression tests for NAT policies. - npf_build_nat: simplify and fix bi-NAT regression. - Bump yacc stack size for npfctl.
show more ...
|
| #
2d3c715f |
| 06-Feb-2012 |
rmind <rmind@NetBSD.org> |
- Split NPF rule procedure code into a separate module (no functional changes). - Simplify some code, add more comments, some asserts. - G/C unused rule hook code.
|
| #
fad8b2d7 |
| 29-Nov-2011 |
rmind <rmind@NetBSD.org> |
- Rework and improve TCP state tracking. - Fix regressions after IPv6 patch merge.
Note: npfctl(8) rework will come soon.
|
| #
0783b126 |
| 06-Nov-2011 |
tron <tron@NetBSD.org> |
Fix breakage caused by last commit. "npf_alg_icmp.c" is supposed to be its own kernel module.
|
| #
2f22aacf |
| 06-Nov-2011 |
tron <tron@NetBSD.org> |
Define "INET6" to get IPv6 support.
|