[Bug 255164] Panic with ipfw/nat under 13.0-RELEASE amd64
bugzilla-noreply at freebsd.org
bugzilla-noreply at freebsd.org
Wed Apr 21 20:00:43 UTC 2021
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=255164
--- Comment #6 from commit-hook at FreeBSD.org ---
A commit in branch main references this bug:
URL:
https://cgit.FreeBSD.org/src/commit/?id=652908599b6fa7285ee60cb567b97e70b648ac29
commit 652908599b6fa7285ee60cb567b97e70b648ac29
Author: Mark Johnston <markj at FreeBSD.org>
AuthorDate: 2021-04-21 19:38:01 +0000
Commit: Mark Johnston <markj at FreeBSD.org>
CommitDate: 2021-04-21 19:47:05 +0000
Add required checks for unmapped mbufs in ipdivert and ipfw
Also add an M_ASSERTMAPPED() macro to verify that all mbufs in the chain
are mapped. Use it in ipfw_nat, which operates on a chain returned by
m_megapullup().
PR: 255164
Reviewed by: ae, gallatin
MFC after: 1 week
Sponsored by: The FreeBSD Foundation
Differential Revision: https://reviews.freebsd.org/D29838
sys/netinet/ip_divert.c | 6 ++++++
sys/netpfil/ipfw/ip_fw_nat.c | 1 +
sys/netpfil/ipfw/nat64/nat64_translate.c | 10 ++++++++++
sys/sys/mbuf.h | 11 +++++++++++
4 files changed, 28 insertions(+)
--
You are receiving this mail because:
You are the assignee for the bug.
More information about the freebsd-ipfw
mailing list