Date: Sun, 6 Sep 1998 11:21:41 +0100 (BST) From: Doug Rabson <dfr@nlsystems.com> To: Mike Haertel <mike@ducky.net> Cc: current@FreeBSD.ORG, wollman@khavrinen.lcs.mit.edu Subject: Re: DANGER: new IP fragment code breaks SLIP Message-ID: <Pine.BSF.4.01.9809061119430.796-100000@herring.nlsystems.com> In-Reply-To: <199809052110.OAA00369@ducky.net>
next in thread | previous in thread | raw e-mail | index | archive | help
On Sat, 5 Sep 1998, Mike Haertel wrote: > I've been experiencing crashes with recent 3.0 kernels using SLIP > based dialin networking. Haven't had time yet to set up kernel > debugging, however I spent a half an hour doing binary search via > kernel builds on recent CVS commits. The bug is either contained > in, or perhaps exposed by, the following commit: Would it be possible to get a packet trace with tcpdump for one of these crashes? It would make it easier to deduce the path taken through the reassembly code. In the mean time could you add this patch to uipc_socket2.c to test out a possible cause of the crash: Index: uipc_socket2.c =================================================================== RCS file: /home/ncvs/src/sys/kern/uipc_socket2.c,v retrieving revision 1.39 diff -u -r1.39 uipc_socket2.c --- uipc_socket2.c 1998/09/05 13:24:39 1.39 +++ uipc_socket2.c 1998/09/06 09:35:59 @@ -457,6 +457,8 @@ if (m == 0) return; + if (m->m_nextpkt) + panic("sbappend: unexpected packet chain"); n = sb->sb_mb; if (n) { while (n->m_nextpkt) -- Doug Rabson Mail: dfr@nlsystems.com Nonlinear Systems Ltd. Phone: +44 181 951 1891 Fax: +44 181 381 1039 To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-current" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.01.9809061119430.796-100000>