freebsd-nq/sys/netpfil/pf
Gleb Smirnoff 59cc9fde4f Rule memory garbage collecting in new pf scans only states that are on
id hash. If a state has been disconnected from id hash, its rule pointers
can no longer be dereferenced, and referenced memory can't be modified.
Thus, move rule statistics from pf_free_rule() to pf_unlink_rule() and
update them prior to releasing id hash slot lock.

Reported by:	Ian FREISLICH <ianf cloudseed.co.za>
2012-12-06 08:38:14 +00:00
..
if_pflog.c Make the "struct if_clone" opaque to users of the cloning API. Users 2012-10-16 13:37:54 +00:00
if_pfsync.c Remove extra PFSYNC_LOCK() in pfsync_bulk_update() which lead to lock 2012-12-06 08:22:08 +00:00
in4_cksum.c
pf_if.c
pf_ioctl.c Revert previous commit... 2012-10-10 08:36:38 +00:00
pf_lb.c Make ruleset anchors in pf(4) reentrant. We've got two problems here: 2012-09-18 10:54:56 +00:00
pf_norm.c
pf_osfp.c
pf_ruleset.c
pf_table.c When connection rate hits and we overload a source to a table, 2012-09-22 10:14:47 +00:00
pf.c Rule memory garbage collecting in new pf scans only states that are on 2012-12-06 08:38:14 +00:00