committer filter by committer.
@path/to/ filter by path in repository.
committer@path/to/ filter by committer AND path in repository.
abdef0123 filter by commit's SHA hash.
rNNN filter by SVN revision.
rNNN-rMMM filter by SVN revisions range (inclusive).
Multiple filters can be specified separated by spaces or comas in which case they'll be combined using OR operator.
|93abcf17||kp||May 7, 2021, 8:13 p.m.||pf: Support killing 'matching' states
Optionally also kill states that match (i.e. are the NATed state or opposite direction state entry for) the state we're killing. See also https://redmine.pfsense.org/issues/8555 Submitted by: Steven Brown Reviewed by: bcr (man page) Obtained from: https://github.com/pfsense/FreeBSD-src/pull/11/ MFC after: 1 week Sponsored by: Rubicon Communications, LLC ("Netgate") Differential Revision: https://reviews.freebsd.org/D30092cgit
|c2e11d81||kp||May 7, 2021, 8:13 p.m.||pf tests: Test killing states by gateway|
|abbcba9c||kp||May 7, 2021, 8:13 p.m.||pf: Allow states to by killed per 'gateway'
This allows us to kill states created from a rule with route-to/reply-to set. This is particularly useful in multi-wan setups, where one of the WAN links goes down. Submitted by: Steven Brown Obtained from: https://github.com/pfsense/FreeBSD-src/pull/11/ MFC after: 1 week Sponsored by: Rubicon Communications, LLC ("Netgate") Differential Revision: https://reviews.freebsd.org/D30058cgit
|2b2ed4a6||kp||May 7, 2021, 8:13 p.m.||authpf: Start using libpfctl|
|2a00c4db||kp||May 7, 2021, 8:13 p.m.||pfctl: Start using DIOCKILLSTATESNV|
|e989530a||kp||May 7, 2021, 8:13 p.m.||pf: Introduce DIOCKILLSTATESNV|
|53714a58||kp||May 7, 2021, 8:13 p.m.||pfctl: Start using DIOCCLRSTATESNV|
|7606a45d||kp||May 7, 2021, 8:13 p.m.||pf: Introduce DIOCCLRSTATESNV|
|cc948296||kp||May 7, 2021, 8:13 p.m.||pfctl: Optionally show gateway information for states|
|f0c914ba||maxim||May 7, 2021, 7:50 p.m.||Releases history update
Add DragonFly 5.8.1, OpenBSD 6.7, FreeBSD 11.4, DragonFly 5.8.2, DragonFly 5.8.3, OpenBSD 6.8, NetBSD 9.1, FreeBSD 13.0, OpenBSD 6.9.cgit
|a1fadf7d||markj||May 7, 2021, 6:31 p.m.||divert: Fix mbuf ownership confusion in div_output()
div_output_outbound() and div_output_inbound() relied on the caller to free the mbuf if an error occurred. However, this is contrary to the semantics of their callees, ip_output(), ip6_output() and netisr_queue_src(), which always consume the mbuf. So, if one of these functions returned an error, that would get propagated up to div_output(), resulting in a double free. Fix the problem by making div_output_outbound() and div_output_inbound() responsible for freeing the mbuf in all cases. Reported by: Michael Schmiedgen <email@example.com> Tested by: Michael Schmiedgen Reviewed by: donner MFC after: 3 days Sponsored by: The FreeBSD Foundation Differential Revision: https://reviews.freebsd.org/D30129cgit
|831850d8||markj||May 7, 2021, 6:31 p.m.||stack(9): Disable KASAN in stack_capture()|
|cfad8bd2||markj||May 7, 2021, 6:31 p.m.||cdefs: Make __nosanitizeaddress work for KASAN as well|
|2d499d50||markj||May 7, 2021, 6:31 p.m.||linker_set: Disable ASAN only in userspace
KASAN does not insert redzones around global variables and so is not susceptible to the problem that led to us disabling ASAN for linker set elements in the first place (see commit fe3d8086fb6f). Reviewed by: andrew, kib Sponsored by: The FreeBSD Foundation Differential Revision: https://reviews.freebsd.org/D30126cgit
|1a212abd||markj||May 7, 2021, 6:31 p.m.||devd.conf: Remove support for coldsync|