Re: CVS commit: src/sys/net/npf

2025-07-08 Thread Christoph Badura
On Tue, Jul 08, 2025 at 03:56:23PM +, Emmanuel wrote: > Module Name: src > Committed By: joe > Date: Tue Jul 8 15:56:23 UTC 2025 > > Modified Files: > src/sys/net/npf: npf_handler.c > > Log Message: > Pass frames directly when no layer 2 rules are set > > NPF's original imple

Re: CVS commit: src/sys/net/npf

2025-03-26 Thread Emmanuel Nyarko
When did it start causing panics ? Can I get a log of the crash ? > On 20 Mar 2025, at 9:49 AM, Paul Goyette wrote: > > Module Name: src > Committed By: pgoyette > Date: Thu Mar 20 09:49:02 UTC 2025 > > Modified Files: > src/sys/net/npf: npf_os.c > > Log Message: > Disable auto

Re: CVS commit: src/sys/net/npf

2025-03-20 Thread Paul Goyette
On Thu, 20 Mar 2025, Emmanuel Nyarko wrote: When did it start causing panics ? sometime between Feb 9 and March 19 Can I get a log of the crash ? No serial coonsole, but I did transcribe the backtrace: vpanic kern_assert spec_close VOP_CLOSE vn_clos

Re: CVS commit: src/sys/net/npf

2019-08-06 Thread Maxime Villard
Le 06/08/2019 à 12:31, Christos Zoulas a écrit : I did not see any messages about it, and the fix is fine until rmind comes up with something better. Yes turns out it was an off-list email It is not nice to have HEAD unusable for 2 weeks now (since July 22nd). Given your second commit, I s

Re: CVS commit: src/sys/net/npf

2019-08-06 Thread Christos Zoulas
Yes, rmind asked me to commit the change in private email. christos > On Aug 6, 2019, at 3:59 PM, Maxime Villard wrote: > > Le 06/08/2019 à 12:31, Christos Zoulas a écrit : >> I did not see any messages about it, and the fix is fine until rmind comes >> up with something better. > > Yes turns

Re: CVS commit: src/sys/net/npf

2019-08-06 Thread Christos Zoulas
I did not see any messages about it, and the fix is fine until rmind comes up with something better. It is not nice to have HEAD unusable for 2 weeks now (since July 22nd). christos > On Aug 6, 2019, at 1:26 PM, Maxime Villard wrote: > > Le 06/08/2019 à 12:25, Christos Zoulas a écrit : >> Modu

Re: CVS commit: src/sys/net/npf

2019-08-06 Thread Maxime Villard
Le 06/08/2019 à 12:25, Christos Zoulas a écrit : Module Name:src Committed By: christos Date: Tue Aug 6 10:25:13 UTC 2019 Modified Files: src/sys/net/npf: npf_conn.c Log Message: Introduce an npf_conn_destroy_idx() that can handle partially constructed conn structures.

Re: CVS commit: src/sys/net/npf

2018-04-07 Thread Maxime Villard
Le 07/04/2018 à 23:28, Christos Zoulas a écrit : In article <20180407090627.20058f...@cvs.netbsd.org>, Maxime Villard wrote: -=-=-=-=-=- Module Name:src Committed By: maxv Date: Sat Apr 7 09:06:27 UTC 2018 Modified Files: src/sys/net/npf: npf_inet.c Log Message: Rewr

Re: CVS commit: src/sys/net/npf

2018-04-07 Thread Christos Zoulas
In article <20180407090627.20058f...@cvs.netbsd.org>, Maxime Villard wrote: >-=-=-=-=-=- > >Module Name: src >Committed By: maxv >Date: Sat Apr 7 09:06:27 UTC 2018 > >Modified Files: > src/sys/net/npf: npf_inet.c > >Log Message: >Rewrite npf_fetch_tcpopts: > > * Instead of doing

Re: CVS commit: src/sys/net/npf

2018-01-30 Thread Maxime Villard
Le 31/01/2018 à 00:18, Mindaugas Rasiukevicius a écrit : [...] Fix this by using uint32_t. While here, it seems to me there is also a memory overflow: still in npf_cache_ip, npc_hlen may be incremented with a value that goes beyond the mbuf. [...] If the npc_hlen value is beyond the packet leng

Re: CVS commit: src/sys/net/npf

2018-01-30 Thread Mindaugas Rasiukevicius
"Maxime Villard" wrote: > Module Name: src > Committed By: maxv > Date: Fri Dec 15 21:00:26 UTC 2017 > > Modified Files: > src/sys/net/npf: npf.h > > Log Message: > Fix a vulnerability in NPF, that allows whatever incoming IPv6 packet to > bypass a certain number of filtering rule

Re: CVS commit: src/sys/net/npf

2015-10-18 Thread Christos Zoulas
In article <20151019002957.b972...@cvs.netbsd.org>, Christos Zoulas wrote: >Log Message: >Fix the code so that it works in all 3 cases: non-modular, modular/builtin, >modular/filesystem. In the non-modular case we initialize through attach. >In the modular/builtin case we define the module to be c

Re: CVS commit: src/sys/net/npf

2013-10-29 Thread Paul Goyette
On Tue, 29 Oct 2013, Mindaugas Rasiukevicius wrote: npf_session_setnat: fix the race condition when the old connection is still being expired while a new/duplicate is being created. Should we have (or do we have) a regression test to catch this race condition? You would need to write a test

Re: CVS commit: src/sys/net/npf

2013-10-29 Thread Mindaugas Rasiukevicius
Paul Goyette wrote: > On Tue, 29 Oct 2013, Mindaugas Rasiukevicius wrote: > > > Module Name:src > > Committed By: rmind > > Date: Tue Oct 29 16:39:10 UTC 2013 > > > > Modified Files: > > src/sys/net/npf: npf_impl.h npf_nat.c npf_session.c > > > > Log Message: > > n

Re: CVS commit: src/sys/net/npf

2013-10-29 Thread Paul Goyette
On Tue, 29 Oct 2013, Mindaugas Rasiukevicius wrote: Module Name:src Committed By: rmind Date: Tue Oct 29 16:39:10 UTC 2013 Modified Files: src/sys/net/npf: npf_impl.h npf_nat.c npf_session.c Log Message: npf_session_setnat: fix the race condition when the old connection