Date: Mon, 28 Dec 2009 14:40:58 +0000 (UTC) From: "Bjoern A. Zeeb" <bz@FreeBSD.org> To: cvs-src-old@freebsd.org Subject: cvs commit: src/sys/kern kern_jail.c src/sys/net rtsock.c src/sys/netinet raw_ip.c src/sys/netinet6 raw_ip6.c src/sys/sys jail.h Message-ID: <200912281442.nBSEgNp3096208@repoman.freebsd.org>
next in thread | raw e-mail | index | archive | help
bz 2009-12-28 14:40:58 UTC
FreeBSD src repository
Modified files: (Branch: RELENG_8)
sys/kern kern_jail.c
sys/net rtsock.c
sys/netinet raw_ip.c
sys/netinet6 raw_ip6.c
sys/sys jail.h
Log:
SVN rev 201128 on 2009-12-28 14:40:58Z by bz
MFC r200473:
Throughout the network stack we have a few places of
if (jailed(cred))
left. If you are running with a vnet (virtual network stack) those will
return true and defer you to classic IP-jails handling and thus things
will be "denied" or returned with an error.
Work around this problem by introducing another "jailed()" function,
jailed_without_vnet(), that also takes vnets into account, and permits
the calls, should the jail from the given cred have its own virtual
network stack.
We cannot change the classic jailed() call to do that, as it is used
outside the network stack as well.
Discussed with: julian, zec, jamie, rwatson (back in Sept)
Revision Changes Path
1.118.2.7 +24 -1 src/sys/kern/kern_jail.c
1.181.2.5 +2 -2 src/sys/net/rtsock.c
1.220.2.5 +2 -2 src/sys/netinet/raw_ip.c
1.111.2.3 +1 -1 src/sys/netinet6/raw_ip6.c
1.50.2.3 +1 -0 src/sys/sys/jail.h
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200912281442.nBSEgNp3096208>
