Lines Matching +defs:stack +defs:limit
117 int pf_hdr_limit = 20; /* arbitrary limit, tune in ddb */
412 u_int32_t limit, u_int32_t seconds)
414 threshold->limit = limit * PF_THRESHOLD_MULT;
437 return (threshold->count > threshold->limit);
499 if ((*stp)->rule.ptr->max_src_conn_rate.limit &&
604 rule->max_src_conn_rate.limit,
771 "wire" : "stack",
1218 if (st->rule.ptr->pktrate.limit && pd->dir == st->direction) {
1597 * task will reschedule itself until the limit is reduced to zero,
1603 * limit how many states are processed with locks held per run of
1611 unsigned int limit = pf_status.states;
1614 if (limit == 0) {
1624 limit /= interval;
1626 pf_purge_states_limit = limit;
1633 unsigned int limit;
1636 limit = pf_purge_states_limit;
1637 if (limit < pf_purge_states_collect)
1638 limit = pf_purge_states_collect;
1640 scanned = pf_purge_expired_states(limit, pf_purge_states_collect);
1901 pf_purge_expired_states(const unsigned int limit, const unsigned int collect)
1930 return (limit);
1939 for (scanned = 0; scanned < limit; scanned++) {
2143 addlog(" stack: (%d) ", sks->rdomain);
3622 struct pf_anchor_stackframe *stack;
3624 stack = (struct pf_anchor_stackframe *)cpumem_enter(pf_anchor_stack);
3625 stack[PF_ANCHOR_STACK_MAX].sf_stack_top = &stack[0];
3626 cpumem_leave(pf_anchor_stack, stack);
3632 struct pf_anchor_stackframe *stack;
3635 stack = (struct pf_anchor_stackframe *)cpumem_enter(pf_anchor_stack);
3636 rv = (sf == &stack[PF_ANCHOR_STACK_MAX]);
3637 cpumem_leave(pf_anchor_stack, stack);
3645 struct pf_anchor_stackframe *stack;
3648 stack = (struct pf_anchor_stackframe *)cpumem_enter(pf_anchor_stack);
3649 rv = (sf == &stack[0]);
3650 cpumem_leave(pf_anchor_stack, stack);
3658 struct pf_anchor_stackframe *stack;
3661 stack = (struct pf_anchor_stackframe *)cpumem_enter(pf_anchor_stack);
3662 top_sf = stack[PF_ANCHOR_STACK_MAX].sf_stack_top;
3663 cpumem_leave(pf_anchor_stack, stack);
3672 struct pf_anchor_stackframe *stack;
3685 stack = (struct pf_anchor_stackframe *)cpumem_enter(pf_anchor_stack);
3687 if ((top_sf <= &stack[0]) || (top_sf >= &stack[PF_ANCHOR_STACK_MAX]))
3688 panic("%s: top frame outside of anchor stack range", __func__);
3690 stack[PF_ANCHOR_STACK_MAX].sf_stack_top = top_sf;
3691 cpumem_leave(pf_anchor_stack, stack);
3701 struct pf_anchor_stackframe *stack;
3704 stack = (struct pf_anchor_stackframe *)cpumem_enter(pf_anchor_stack);
3708 if ((top_sf <= &stack[0]) ||
3709 (top_sf >= &stack[PF_ANCHOR_STACK_MAX]))
3710 panic("%s: top frame outside of anchor stack range",
3719 stack[PF_ANCHOR_STACK_MAX].sf_stack_top = top_sf;
3722 cpumem_leave(pf_anchor_stack, stack);
4234 if (r->pktrate.limit) {
4961 * the crappy stack check or if we picked up the connection
5016 * any security implications of bad SACKing unless the target stack
7004 DPFPRINTF(LOG_NOTICE, "IPv4 nested authentication header limit");
7223 * sent with hop-limit (ttl) set to 1, and link
7253 DPFPRINTF(LOG_NOTICE, "IPv6 nested extension header limit");