Lines Matching +defs:stack +defs:limit
811 u_int32_t limit, u_int32_t seconds)
813 threshold->limit = limit * PF_THRESHOLD_MULT;
836 return (threshold->count > threshold->limit);
859 if (state->rule->max_src_conn_rate.limit &&
1090 rule->max_src_conn_rate.limit,
1185 uma_zone_set_warning(V_pf_state_z, "PF states limit reached");
1222 uma_zone_set_warning(V_pf_sources_z, "PF source nodes limit reached");
1480 "wire" : "stack",
1542 * Continue attaching with stack key.
2997 printf(" stack: ");
3989 /* The rest of the stack assumes a rcvif, so provide one.
4094 /* The rest of the stack assumes a rcvif, so provide one.
4573 pf_step_into_anchor(struct pf_kanchor_stackframe *stack, int *depth,
4584 printf("%s: anchor stack overflow on %s\n",
4590 f = stack + (*depth)++;
4609 pf_step_out_of_anchor(struct pf_kanchor_stackframe *stack, int *depth,
4622 f = stack + *depth - 1;
4675 pf_step_into_keth_anchor(struct pf_keth_anchor_stackframe *stack, int *depth,
4686 printf("%s: anchor stack overflow on %s\n",
4692 f = stack + (*depth)++;
4711 pf_step_out_of_keth_anchor(struct pf_keth_anchor_stackframe *stack, int *depth,
4724 f = stack + *depth - 1;
6491 * the crappy stack check or if we picked up the connection
6546 * any security implications of bad SACKing unless the target stack
7492 } else { /* stack side, reverse */
10322 * If we end up changing IP addresses (e.g. binat) the stack may get