[Bug 281082] sys/netgraph/ng_ipfw.c: Using 32bit cookies breaks ipfw ngtee
Date: Mon, 26 Aug 2024 19:56:42 UTC
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=281082 Bug ID: 281082 Summary: sys/netgraph/ng_ipfw.c: Using 32bit cookies breaks ipfw ngtee Product: Base System Version: Unspecified Hardware: Any OS: Any Status: New Severity: Affects Some People Priority: --- Component: kern Assignee: bugs@FreeBSD.org Reporter: ruben@verweg.com The MFC’ed commit 20e1f207cc789a28783344614d6d1d1c639c5797 (https://cgit.freebsd.org/src/commit/?id=20e1f207cc789a28783344614d6d1d1c639c5797) MFC’ed to 14.1 as dadf64c5586e5fa5e1018a3d8a02c9873b1121b8 and to 13.3 as 0b9242dea68c44dc630921d3802f3f80f4d84b48 breaks ipfw_netflow. Reversing the patch restores functionality. This might be due to * sys/netinet/ip_fw.h’s ipfw_insn->arg1 still sit at u_int16_t, perhaps truncating one or another so that it remains invisible for ng_ipfw and the rest of netgraph * sbin/ipfw/ipfw2.c chkarg in case TOK_NGTEE poses a limit of IP_FW_TABLEARG (65535) on the ngtee parameter. Tested on 13.3 with ipfw_netflow and a packetcapture on the receiving port / sudo flowctl netflow: show human Reversing the patch seems less impacting than to figure out where arg1 handling needs to be adjusted for full 32bit operation. -- You are receiving this mail because: You are the assignee for the bug.