Skip site navigation (1)Skip section navigation (2)

Site Navigation

PRs for tag 'pf'

This is an experimental report containing PRs for tag 'pf' as of 4-18-2014. GNATS has no finer-grained categorization than 'kern', 'bin', 'ports', and so forth. To augment this, the bugmeisters have adopted the convention of adding '[<tagname>]' to the Synopsis field. Consider this a prototype of a better search function.

This report is generated statically.

Please give feedback on this report to Thanks.

PRs for tag 'pf':
o2014/04/12kern/188511pf[pf] [patch] divert-reply implementation for pf
o2014/04/02kern/188188pf[pf] [panic] pfsync0 mtu 9000 results in 10-STABLE reboot
o2014/03/29kern/188063pf[pf] [hang] deadlock between syncache(4) and pf(4)
o2014/03/28kern/188035pf[pf] Can not set limit for table
o2014/01/10kern/185633[pf] scrubbing bug in transparent mode bug with bigger than MTU UDP packet
f2013/12/04kern/184485glebius[pf] pfioctl causing kernel panics in 10-BETA{3,4}
o2013/10/22kern/183198pf[pf] pf tables not loaded if only used inside anchor
o2013/10/14kern/182964[pf] panics on 10-BETA1 r256398 with VIMAGE and pf
o2013/09/26kern/182401pf[pf] pf state for some IPs reaches 4294967295 suspicously
o2013/09/24kern/182350pf[pf] core dump with packet filter -- pf_overlad_task
o2013/06/07kern/179392pf[pf] [ip6] Incorrect TCP checksums in rdr return packets
a2013/06/03kern/179264net[vimage] [pf] Core dump with Packet filter and VIMAGE options compile in a kernel
o2013/04/12kern/177810pf[pf] traffic dropped by accepting rules is not counted
o2013/04/12kern/177808pf[pf] [patch] route-to rule forwarding traffic inspite of state limit
o2013/03/26kern/177402net[igb] [pf] problem with ethernet driver igb + pf / altq [regression]
o2013/02/19kern/176268pf[pf] [patch] synproxy not working with route-to
o2013/01/13kern/175267net[pf] [tap] pf + tap keep state problem
o2012/10/12kern/172648pf[pf] [ip6]: 'scrub reassemble tcp' breaks IPv6 packet checksum on SYN ACK
o2012/09/18kern/171733pf[pf] PF problem with modulate state in [regression]
o2012/07/03kern/169630pf[pf] [patch] pf fragment reassembly of padded (undersized) fragments
o2012/07/03kern/169620net[ng] [pf] ng_l2tp incoming packet bypass pf firewall
o2012/06/11kern/168952pf[pf] direction scrub rules don't work
o2012/05/21kern/168190pf[pf] panic when using pf and route-to (maybe: bad fragment handling?)
a2012/03/29kern/166501andre[pf] FreeBSD 9.0 generates incorrect SEC/ACK numbers under load
o2012/03/23kern/166336pf[pf] kern.securelevel 3 +pf reload
o2012/02/20kern/165315pf[pf] States never cleared in PF with DEVICE_POLLING
o2012/02/17kern/165252virtualization[vimage] [pf] [panic] kernel panics with VIMAGE and PF on FreeBSD 9.0 rel
o2012/01/23kern/164402pf[pf] pf crashes with a particular set of rules when first matching packet arrives
o2012/01/18kern/164271pf[pf] not working pf nat on FreeBSD 9.0 [regression]
o2011/12/12kern/163208pf[pf] PF state key linking mismatch
o2011/09/28kern/161094virtualization[vimage] [pf] [panic] kernel panic with pf + VIMAGE when stopping a jail
o2011/09/07kern/160541virtualization[vimage][pf][patch] panic: userret: Returning on td 0xxxxxxxxx (pid xxxx, pftop) with vnet 0xxxxxxxxx set in pfioctl
o2011/09/06kern/160496virtualization[vimage] [pf] [patch] kernel panic with pf + VIMAGE
o2011/09/01kern/160370pf[pf] Incorrect pfctl check of pf.conf
o2011/03/20kern/155736pf[pf] [altq] borrow from parent queue does not work with cbq
o2010/12/20kern/153307pf[pf] Bug with PF firewall
o2010/07/01kern/148290pf[pf] "sticky-address" option of Packet Filter (PF) blocks connection
o2010/06/30kern/148260pf[pf] [patch] pf rdr incompatible with dummynet
o2010/06/26kern/148155virtualization[vimage] [pf] Kernel panic with PF + VIMAGE kernel option
o2010/06/11kern/147789pf[pf] Firewall PF no longer drops connections by sending TCP RST packets
o2010/05/22kern/146832bz[pf] "(self)" not always matching all local IPv6 addresses
o2010/05/18kern/146719net[pf] [panic] PF or dumynet kernel panic
o2010/02/26kern/144311bz[pf] [icmp] massive ICMP storm on lo0 occurs when using pf(4) 'reply-to'
s2010/02/11kern/143808virtualization[pf] pf does not work inside jail
o2010/02/04kern/143543pf[pf] [panic] PF route-to causes kernel panic
o2010/01/19conf/142961pf[pf] No way to adjust pidfile in pflogd
o2009/12/22kern/141905pf[pf] [panic] pf kernel panic on 7.2-RELEASE with empty pf.conf
o2009/11/19kern/140697pf[pf] pf behaviour changes - must be documented
o2009/08/20kern/137982pf[pf] when pf can hit state limits, random IP failures and no debugging info is provided
o2009/07/15kern/136781pf[pf] Packets appear to drop with pf scrub and if_bridge
o2009/07/09kern/136618net[pf][stf] panic on cloning interface without unit number, e.g. `stf'
o2009/06/23kern/135948pf[pf] [gre] pf not natting gre protocol
o2009/05/27kern/134996pf[pf] Anchor tables not included when pfctl(8) is run with -o
o2009/04/14kern/133732pf[pf] max-src-conn issue
o2009/01/11conf/130381pf[rc.d] [pf] [ip6] ipv6 not fully configured when pf startup script is run
o2008/10/07kern/127920pf[pf] ipv6 and synproxy don't play well together
o2008/10/03conf/127814pf[pf] The flush in pf_reload in /etc/rc.d/pf does not work as intended
o2008/09/05kern/127121pf[pf] [patch] pf incorrect log priority
o2008/09/02kern/127042pf[pf] [patch] pf recursion panic if interface group is the same as the new interface name
o2008/07/10kern/125467pf[pf] pf keep state bug while handling sessions between vlan trunk
s2008/06/24kern/124933pf[pf] [ip6] pf does not support (drops) IPv6 fragmented packets
o2008/04/14kern/122773pf[pf] pf doesn't log uid or pid when configured to
o2008/03/23kern/122014pf[pf] [panic] FreeBSD 6.2 panic in pf
o2008/02/05kern/120281pf[pf] [request] lost returning packets to PF for a rdr rule
o2008/01/27kern/120057pf[pf] [patch] Allow proper settings of ALTQ_HFSC. The check i wrong since even with the values forbidden from this check you get a concave curve.
o2007/11/30bin/118355pf[pf] [patch] pfctl(8) help message options order false -t must before -T
o2007/07/13kern/114567pf[pf] [lor] pf_ioctl.c + if.c
o2006/02/25kern/93825pf[pf] pf reply-to doesn't work
o2006/02/18sparc64/93530pf[pf] Incorrect checksums when using pf's route-to on sparc64
o2006/02/07kern/92949pf[pf] PF + ALTQ problems with latency
o2005/10/07kern/87074pf[pf] pf does not log dropped packets when max-* stateful tracking options watermark are reached
a2005/09/30kern/86752pf[pf] pf does not use default timeouts when reloading config file
o2005/06/15kern/82271pf[pf] cbq scheduler cause bad latency
73 problems total.

Bugs can be in one of several states:

o - open
A problem report has been submitted, no sanity checking performed.
a - analyzed
The problem is understood and a solution is being sought.
f - feedback
Further work requires additional information from the originator or the community - possibly confirmation of the effectiveness of a proposed solution.
p - patched
A patch has been committed, but some issues (MFC and / or confirmation from originator) are still open.
r - repocopy
The resolution of the problem report is dependent on a repocopy operation within the CVS repository which is awaiting completion.
s - suspended
The problem is not being worked on, due to lack of information or resources. This is a prime candidate for somebody who is looking for a project to do. If the problem cannot be solved at all, it will be closed, rather than suspended.
c - closed
A problem report is closed when any changes have been integrated, documented, and tested -- or when fixing the problem is abandoned.