Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 07 Mar 2019 04:41:05 +0000
From:      bugzilla-noreply@freebsd.org
To:        ipfw@FreeBSD.org
Subject:   [Bug 236292] sbin/ipfw doesn't allow returning packets with limit-source address
Message-ID:  <bug-236292-8303-eMDOq0G5nS@https.bugs.freebsd.org/bugzilla/>
In-Reply-To: <bug-236292-8303@https.bugs.freebsd.org/bugzilla/>
References:  <bug-236292-8303@https.bugs.freebsd.org/bugzilla/>

next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D236292

--- Comment #7 from commit-hook@freebsd.org ---
A commit references this bug:

Author: ae
Date: Thu Mar  7 04:40:45 UTC 2019
New revision: 344870
URL: https://svnweb.freebsd.org/changeset/base/344870

Log:
  Fix the problem with O_LIMIT states introduced in r344018.

  dyn_install_state() uses `rule` pointer when it creates state.
  For O_LIMIT states this pointer actually is not struct ip_fw,
  it is pointer to O_LIMIT_PARENT state, that keeps actual pointer
  to ip_fw parent rule. Thus we need to cache rule id and number
  before calling dyn_get_parent_state(), so we can use them later
  when the `rule` pointer is overrided.

  PR:           236292
  MFC after:    3 days

Changes:
  head/sys/netpfil/ipfw/ip_fw_dynamic.c

--=20
You are receiving this mail because:
You are the assignee for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-236292-8303-eMDOq0G5nS>