Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 9 Jun 2009 21:27:11 +0000 (UTC)
From:      Oleg Bulyzhin <oleg@FreeBSD.org>
To:        cvs-src-old@freebsd.org
Subject:   cvs commit: src/sys/net if_bridge.c if_ethersubr.c src/sys/netgraph ng_ipfw.c ng_ipfw.h src/sys/netinet ip_dummynet.h ip_fw.h src/sys/netinet/ipfw ip_dummynet.c ip_fw2.c ip_fw_pfil.c
Message-ID:  <200906092127.n59LRUJW092731@repoman.freebsd.org>

next in thread | raw e-mail | index | archive | help
oleg        2009-06-09 21:27:11 UTC

  FreeBSD src repository

  Modified files:
    sys/net              if_bridge.c if_ethersubr.c 
    sys/netgraph         ng_ipfw.c ng_ipfw.h 
    sys/netinet          ip_dummynet.h ip_fw.h 
    sys/netinet/ipfw     ip_dummynet.c ip_fw2.c ip_fw_pfil.c 
  Log:
  SVN rev 193859 on 2009-06-09 21:27:11Z by oleg
  
  Close long existed race with net.inet.ip.fw.one_pass = 0:
  If packet leaves ipfw to other kernel subsystem (dummynet, netgraph, etc)
  it carries pointer to matching ipfw rule. If this packet then reinjected back
  to ipfw, ruleset processing starts from that rule. If rule was deleted
  meanwhile, due to existed race condition panic was possible (as well as
  other odd effects like parsing rules in 'reap list').
  
  P.S. this commit changes ABI so userland ipfw related binaries should be
  recompiled.
  
  MFC after:      1 month
  Tested by:      Mikolaj Golub
  
  Revision  Changes    Path
  1.127     +11 -3     src/sys/net/if_bridge.c
  1.264     +16 -13    src/sys/net/if_ethersubr.c
  1.12      +2 -0      src/sys/netgraph/ng_ipfw.c
  1.3       +2 -0      src/sys/netgraph/ng_ipfw.h
  1.46      +6 -4      src/sys/netinet/ip_dummynet.h
  1.130     +13 -9     src/sys/netinet/ip_fw.h
  1.2       +2 -57     src/sys/netinet/ipfw/ip_dummynet.c
  1.3       +29 -19    src/sys/netinet/ipfw/ip_fw2.c
  1.2       +8 -0      src/sys/netinet/ipfw/ip_fw_pfil.c



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200906092127.n59LRUJW092731>