ipfw2 (was Re: Hard-coded M_* flags)
YONETANI Tomokazu
qhwt+dfly at les.ath.cx
Sun Jun 11 03:20:56 PDT 2006
On Thu, Jun 08, 2006 at 12:41:51PM +0900, YONETANI Tomokazu wrote:
> [hardcoded M_ flags]
> M_SKIP_FIREWALL: defined as 0x4000, which conflicts with M_EXT_CLUSTER
> /sys/net/ipfw/ip_fw2.c
Can I commit the following patch? This only helps ipv4-only environment,
but those who are in ipv6 network are not probably using ipfw2.
Without this, you get a kernel panic in m_free() as soon as ipfw2
sends out a packet generated by send_pkt().
Index: sys/net/ipfw/ip_fw2.c
===================================================================
RCS file: /home/source/dragonfly/cvs/src/sys/net/ipfw/ip_fw2.c,v
retrieving revision 1.17
diff -u -p -r1.17 ip_fw2.c
--- sys/net/ipfw/ip_fw2.c 17 Jun 2005 19:12:19 -0000 1.17
+++ sys/net/ipfw/ip_fw2.c 11 Jun 2006 09:55:23 -0000
@@ -82,7 +82,7 @@
* a firewall-generated packet loops forever through the firewall.
*/
#ifndef M_SKIP_FIREWALL
-#define M_SKIP_FIREWALL 0x4000
+#define M_SKIP_FIREWALL M_PROTO5
#endif
/*
More information about the Submit
mailing list