Date: Tue, 9 Jun 2009 21:27:11 +0000 (UTC) From: Oleg Bulyzhin <oleg@FreeBSD.org> To: cvs-src-old@freebsd.org Subject: cvs commit: src/sys/net if_bridge.c if_ethersubr.c src/sys/netgraph ng_ipfw.c ng_ipfw.h src/sys/netinet ip_dummynet.h ip_fw.h src/sys/netinet/ipfw ip_dummynet.c ip_fw2.c ip_fw_pfil.c Message-ID: <200906092127.n59LRUJW092731@repoman.freebsd.org>
next in thread | raw e-mail | index | archive | help
oleg 2009-06-09 21:27:11 UTC
FreeBSD src repository
Modified files:
sys/net if_bridge.c if_ethersubr.c
sys/netgraph ng_ipfw.c ng_ipfw.h
sys/netinet ip_dummynet.h ip_fw.h
sys/netinet/ipfw ip_dummynet.c ip_fw2.c ip_fw_pfil.c
Log:
SVN rev 193859 on 2009-06-09 21:27:11Z by oleg
Close long existed race with net.inet.ip.fw.one_pass = 0:
If packet leaves ipfw to other kernel subsystem (dummynet, netgraph, etc)
it carries pointer to matching ipfw rule. If this packet then reinjected back
to ipfw, ruleset processing starts from that rule. If rule was deleted
meanwhile, due to existed race condition panic was possible (as well as
other odd effects like parsing rules in 'reap list').
P.S. this commit changes ABI so userland ipfw related binaries should be
recompiled.
MFC after: 1 month
Tested by: Mikolaj Golub
Revision Changes Path
1.127 +11 -3 src/sys/net/if_bridge.c
1.264 +16 -13 src/sys/net/if_ethersubr.c
1.12 +2 -0 src/sys/netgraph/ng_ipfw.c
1.3 +2 -0 src/sys/netgraph/ng_ipfw.h
1.46 +6 -4 src/sys/netinet/ip_dummynet.h
1.130 +13 -9 src/sys/netinet/ip_fw.h
1.2 +2 -57 src/sys/netinet/ipfw/ip_dummynet.c
1.3 +29 -19 src/sys/netinet/ipfw/ip_fw2.c
1.2 +8 -0 src/sys/netinet/ipfw/ip_fw_pfil.c
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200906092127.n59LRUJW092731>
