Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 10 Mar 2019 04:42:22 +0000
From:      bugzilla-noreply@freebsd.org
To:        ipfw@FreeBSD.org
Subject:   [Bug 236292] sbin/ipfw doesn't allow returning packets with limit-source address
Message-ID:  <bug-236292-8303-1Qy3elDMXe@https.bugs.freebsd.org/bugzilla/>
In-Reply-To: <bug-236292-8303@https.bugs.freebsd.org/bugzilla/>
References:  <bug-236292-8303@https.bugs.freebsd.org/bugzilla/>

next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D236292

--- Comment #8 from commit-hook@freebsd.org ---
A commit references this bug:

Author: ae
Date: Sun Mar 10 04:41:31 UTC 2019
New revision: 344976
URL: https://svnweb.freebsd.org/changeset/base/344976

Log:
  MFC r344870:
    Fix the problem with O_LIMIT states introduced in r344018.

    dyn_install_state() uses `rule` pointer when it creates state.
    For O_LIMIT states this pointer actually is not struct ip_fw,
    it is pointer to O_LIMIT_PARENT state, that keeps actual pointer
    to ip_fw parent rule. Thus we need to cache rule id and number
    before calling dyn_get_parent_state(), so we can use them later
    when the `rule` pointer is overrided.

    PR:         236292

Changes:
_U  stable/12/
  stable/12/sys/netpfil/ipfw/ip_fw_dynamic.c

--=20
You are receiving this mail because:
You are the assignee for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-236292-8303-1Qy3elDMXe>