diff options
author | mlaier <mlaier@FreeBSD.org> | 2004-10-03 10:42:42 +0000 |
---|---|---|
committer | mlaier <mlaier@FreeBSD.org> | 2004-10-03 10:42:42 +0000 |
commit | 283a694fdbf7d5c4312b08ca63c009ba58cc937a (patch) | |
tree | ed5ba30d9dc3b61a861aa9c15271a76ecf57cb13 /contrib | |
parent | be3092c71a0cdee4a55a55a32cb1615859fbabd9 (diff) | |
download | FreeBSD-src-283a694fdbf7d5c4312b08ca63c009ba58cc937a.zip FreeBSD-src-283a694fdbf7d5c4312b08ca63c009ba58cc937a.tar.gz |
Document a problem with user/group filtering. With debug.mpsafenet=1 this
might result in a deadlock. The fix involves critical changes in the PF
locking strategy (which will happen after 5.3R). For now advise users to set
debug.mpsafenet=0 if they use this kind of filtering.
The same problem exists for IPFW.
mdoc help from: simon
MFC after: 2 days
Diffstat (limited to 'contrib')
-rw-r--r-- | contrib/pf/man/pf.conf.5 | 33 |
1 files changed, 32 insertions, 1 deletions
diff --git a/contrib/pf/man/pf.conf.5 b/contrib/pf/man/pf.conf.5 index 1eefeb7..a245505 100644 --- a/contrib/pf/man/pf.conf.5 +++ b/contrib/pf/man/pf.conf.5 @@ -28,7 +28,7 @@ .\" ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE .\" POSSIBILITY OF SUCH DAMAGE. .\" -.Dd September 14, 2004 +.Dd October 3, 2004 .Dt PF.CONF 5 .Os .Sh NAME @@ -1316,6 +1316,17 @@ This is equivalent to "from any to any". Similar to .Ar user , this rule only applies to packets of sockets owned by the specified group. +.Pp +The use of +.Ar group +or +.Ar user +in +.Va debug.mpsafenet Ns = Ns 1 +environments may result in a deadlock. +Please see the +.Sx BUGS +section for details. .It Ar user <user> This rule only applies to packets of sockets owned by the specified user. For outgoing connections initiated from the firewall, this is the user @@ -2610,6 +2621,26 @@ Service name database. .It Pa /usr/share/examples/pf Example rulesets. .El +.Sh BUGS +Due to a lock order reversal (LOR) with the socket layer, the use of the +.Ar group +and +.Ar user +filter parameter in conjuction with a Giant-free netstack +can result in a deadlock. +If you have to use +.Ar group +or +.Ar user +you must set +.Va debug.mpsafenet +to +.Dq 0 +from the +.Xr loader 8 , +for the moment. +This workaround will still produce the LOR, but Giant will protect from the +deadlock. .Sh SEE ALSO .Xr icmp 4 , .Xr icmp6 4 , |