pf: Fix misdetection of forwarding when net.link.bridge.pfil_bridge is set
If net.link.bridge.pfil_bridge is set we can end up thinking we're forwarding in pf_test6() because the rcvif and the ifp (output interface) are different. In that case we're bridging though, and the rcvif the the bridge member on which the packet was received and ifp is the bridge itself. If we'd set dir to PF_FWD we'd end up calling ip6_forward() which is incorrect. Instead check if the rcvif is a member of the ifp bridge. (In other words, the if_bridge is the ifp's softc). If that's the case we're not forwarding but bridging. PR: 202351 Reviewed by: eri Differential Revision: https://reviews.freebsd.org/D3534
This commit is contained in:
parent
5fbb8e5fa1
commit
e2b95e62f0
@ -6085,7 +6085,17 @@ pf_test6(int dir, struct ifnet *ifp, struct mbuf **m0, struct inpcb *inp)
|
||||
|
||||
M_ASSERTPKTHDR(m);
|
||||
|
||||
if (dir == PF_OUT && m->m_pkthdr.rcvif && ifp != m->m_pkthdr.rcvif)
|
||||
/* Detect packet forwarding.
|
||||
* If the input interface is different from the output interface we're
|
||||
* forwarding.
|
||||
* We do need to be careful about bridges. If the
|
||||
* net.link.bridge.pfil_bridge sysctl is set we can be filtering on a
|
||||
* bridge, so if the input interface is a bridge member and the output
|
||||
* interface is its bridge we're not actually forwarding but bridging.
|
||||
*/
|
||||
if (dir == PF_OUT && m->m_pkthdr.rcvif && ifp != m->m_pkthdr.rcvif
|
||||
&& (m->m_pkthdr.rcvif->if_bridge == NULL
|
||||
|| m->m_pkthdr.rcvif->if_bridge != ifp->if_softc))
|
||||
fwdir = PF_FWD;
|
||||
|
||||
if (!V_pf_status.running)
|
||||
|
Loading…
x
Reference in New Issue
Block a user