Date: Mon, 24 Sep 2018 07:57:12 +0000 From: bugzilla-noreply@freebsd.org To: net@FreeBSD.org Subject: [Bug 231428] 12.0-ALPHA6 crashes with gif (IPv4 in IPv4) over vtnet Message-ID: <bug-231428-7501-IDTTnDHLNr@https.bugs.freebsd.org/bugzilla/> In-Reply-To: <bug-231428-7501@https.bugs.freebsd.org/bugzilla/> References: <bug-231428-7501@https.bugs.freebsd.org/bugzilla/>
next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D231428 --- Comment #4 from Andrey V. Elsukov <ae@FreeBSD.org> --- (In reply to Matthew Macy from comment #3) > I think the assertion is generally useful. Andrey - is there any way to > infer that we're in encap context? In which case we could just set > TI_RLOCKED to true and everything would work. I think currently there is no way to infer that we are in encap context. The call path is like this: ip_input() encap_input() gif_input() netisr_dispatch() ip_input() tcp_input() Starting from encap_input we are in encap context. --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-231428-7501-IDTTnDHLNr>