<feed xmlns='http://www.w3.org/2005/Atom'>
<title>src-test2/sbin/ipfw, branch stable/5</title>
<subtitle>FreeBSD source tree</subtitle>
<id>https://cgit-dev.freebsd.org/src-test2/atom?h=stable%2F5</id>
<link rel='self' href='https://cgit-dev.freebsd.org/src-test2/atom?h=stable%2F5'/>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/'/>
<updated>2005-07-04T08:29:11Z</updated>
<entry>
<title>MFC revisions 1.174-1.175: Document some limitations of uid/gid rules.</title>
<updated>2005-07-04T08:29:11Z</updated>
<author>
<name>Colin Percival</name>
<email>cperciva@FreeBSD.org</email>
</author>
<published>2005-07-04T08:29:11Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=dd958362c516924e4e4272bcd2320ecec1cd84c8'/>
<id>urn:sha1:dd958362c516924e4e4272bcd2320ecec1cd84c8</id>
<content type='text'>
</content>
</entry>
<entry>
<title>MFC: ipfw.8 r.1.172, ip_fw2.c r.1.100</title>
<updated>2005-06-17T23:30:32Z</updated>
<author>
<name>Brian Feldman</name>
<email>green@FreeBSD.org</email>
</author>
<published>2005-06-17T23:30:32Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=a02fbaf8a5d0c41e19ed89b0032122b62b78481c'/>
<id>urn:sha1:a02fbaf8a5d0c41e19ed89b0032122b62b78481c</id>
<content type='text'>
     Properly document the IPFW ALTQ first-match behavior that was
     intended, as well as actually implementing it.
</content>
</entry>
<entry>
<title>MFC: IPFW ALTQ(4) classification support, diverted traffic match rules,</title>
<updated>2005-05-12T15:11:30Z</updated>
<author>
<name>Brian Feldman</name>
<email>green@FreeBSD.org</email>
</author>
<published>2005-05-12T15:11:30Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=efb93e779a4dd1d7a15d73eeae73db4ab63d9b08'/>
<id>urn:sha1:efb93e779a4dd1d7a15d73eeae73db4ab63d9b08</id>
<content type='text'>
     and the TCP packet data length match rule.
</content>
</entry>
<entry>
<title>MFC: Bring back full packet destination manipulation for 'ipfw fwd'</title>
<updated>2005-03-02T19:50:12Z</updated>
<author>
<name>Andre Oppermann</name>
<email>andre@FreeBSD.org</email>
</author>
<published>2005-03-02T19:50:12Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=d2c9038812184aa8abd590704225431cb44b53f0'/>
<id>urn:sha1:d2c9038812184aa8abd590704225431cb44b53f0</id>
<content type='text'>
with the kernel compile time option:

   options IPFIREWALL_FORWARD_EXTENDED

This option has to be specified in addition to IPFIRWALL_FORWARD.

PR:		kern/71910
PR:		kern/73129
</content>
</entry>
<entry>
<title>MFC 1.68:</title>
<updated>2005-01-25T07:23:34Z</updated>
<author>
<name>Gleb Smirnoff</name>
<email>glebius@FreeBSD.org</email>
</author>
<published>2005-01-25T07:23:34Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=99d58d531c8cb45ca6a7416c170102cfff5b7ffb'/>
<id>urn:sha1:99d58d531c8cb45ca6a7416c170102cfff5b7ffb</id>
<content type='text'>
  Don't print extra " via ", if we have already printed one. While here,
  slightly style brackets.

  PR:             misc/75297
</content>
</entry>
<entry>
<title>MFC v1.160</title>
<updated>2005-01-07T23:12:11Z</updated>
<author>
<name>Christian S.J. Peron</name>
<email>csjp@FreeBSD.org</email>
</author>
<published>2005-01-07T23:12:11Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=8e80cd47fe208902bdc13d4b61fd67896d7c3be7'/>
<id>urn:sha1:8e80cd47fe208902bdc13d4b61fd67896d7c3be7</id>
<content type='text'>
  Log:
  Update the IPFW man page to reflect reality. mpsafenet=0 is no longer
  required when using ucred based rules.

  Pointed out by: seanc (thanks!)
</content>
</entry>
<entry>
<title>MFC r1.159:</title>
<updated>2004-11-08T19:07:03Z</updated>
<author>
<name>Ceri Davies</name>
<email>ceri@FreeBSD.org</email>
</author>
<published>2004-11-08T19:07:03Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=07f3cbff8c3d6e2fd5c8ce9eff346761ce65ba9e'/>
<id>urn:sha1:07f3cbff8c3d6e2fd5c8ce9eff346761ce65ba9e</id>
<content type='text'>
  Be more clear that "bridged" is a synonym for "layer2".
</content>
</entry>
<entry>
<title>  Log:</title>
<updated>2004-10-10T00:57:23Z</updated>
<author>
<name>Christian S.J. Peron</name>
<email>csjp@FreeBSD.org</email>
</author>
<published>2004-10-10T00:57:23Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=5d1e011ac870302eca8611e2f7bd4cdc19567c8e'/>
<id>urn:sha1:5d1e011ac870302eca8611e2f7bd4cdc19567c8e</id>
<content type='text'>
  Add a note to the man page warning users about possible lock order
  reversals+system lock ups if they are using ucred based rules
  while running with debug.mpsafenet=1.

  I am working on merging a shared locking mechanism into ipfw which
  should take care of this problem, but it still requires a bit more                                                                                        testing and review.

Approved by:	re@ (hrs)
</content>
</entry>
<entry>
<title>MFC: 1.152: Get ready for 5.x becoming -STABLE soon.</title>
<updated>2004-09-21T15:57:06Z</updated>
<author>
<name>Ruslan Ermilov</name>
<email>ru@FreeBSD.org</email>
</author>
<published>2004-09-21T15:57:06Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=e0b30b76dcfe890bec9431f9a77d15d06feb6ff0'/>
<id>urn:sha1:e0b30b76dcfe890bec9431f9a77d15d06feb6ff0</id>
<content type='text'>
Approved by:	re (hrs)
</content>
</entry>
<entry>
<title>MFC v1.58</title>
<updated>2004-09-17T14:49:08Z</updated>
<author>
<name>Christian S.J. Peron</name>
<email>csjp@FreeBSD.org</email>
</author>
<published>2004-09-17T14:49:08Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=c098407bf34016e467bf48c847ac404b51ae722d'/>
<id>urn:sha1:c098407bf34016e467bf48c847ac404b51ae722d</id>
<content type='text'>
Currently when ipfw(8) generates the micro-instructions for rules which
contain O_UID, O_GID and O_JAIL opcodes, the F_NOT or F_OR logical
operator bits get clobbered. Making it impossible to use the ``NOT'' or
``OR'' operators with uid, gid and jail based constraints.

The ipfw_insn instruction template contains a ``len'' element which
stores two pieces of information, the size of the instruction
(in 32-bit words) in the low 6 bits of "len" with the 2 remaining
bits to implement OR and NOT.

The current code clobbers the OR and NOT bits by initializing the
``len'' element to the size, rather than OR'ing the bits. This change
fixes this by changing the initialization of cmd-&gt;len to an OR operation
for the O_UID, O_GID and O_JAIL opcodes.

Approved by:	re@ (scottl)
PR:		kern/63961 (partially)
</content>
</entry>
</feed>
