From owner-freebsd-pf@FreeBSD.ORG Thu May 24 06:36:26 2012 Return-Path: Delivered-To: freebsd-pf@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [69.147.83.52]) by hub.freebsd.org (Postfix) with ESMTP id 9BF91106566B for ; Thu, 24 May 2012 06:36:26 +0000 (UTC) (envelope-from dhartmei@insomnia.benzedrine.cx) Received: from insomnia.benzedrine.cx (106-30.3-213.fix.bluewin.ch [213.3.30.106]) by mx1.freebsd.org (Postfix) with ESMTP id E4D068FC12 for ; Thu, 24 May 2012 06:36:24 +0000 (UTC) Received: from insomnia.benzedrine.cx (localhost.benzedrine.cx [127.0.0.1]) by insomnia.benzedrine.cx (8.14.1/8.13.4) with ESMTP id q4O6SbMF026417 (version=TLSv1/SSLv3 cipher=DHE-DSS-AES256-SHA bits=256 verify=NO); Thu, 24 May 2012 08:28:37 +0200 (MEST) Received: (from dhartmei@localhost) by insomnia.benzedrine.cx (8.14.1/8.12.10/Submit) id q4O6SZJi024018; Thu, 24 May 2012 08:28:35 +0200 (MEST) Date: Thu, 24 May 2012 08:28:35 +0200 From: Daniel Hartmeier To: Joerg Pulz Message-ID: <20120524062835.GI29536@insomnia.benzedrine.cx> References: <201205232210.q4NMA4PF058452@freefall.freebsd.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <201205232210.q4NMA4PF058452@freefall.freebsd.org> User-Agent: Mutt/1.5.12-2006-07-14 Cc: freebsd-pf@freebsd.org Subject: Re: kern/168190: [pf] panic when using pf and route-to (maybe: bad fragment handling?) X-BeenThere: freebsd-pf@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: "Technical discussion and general questions about packet filter \(pf\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 24 May 2012 06:36:26 -0000 On Wed, May 23, 2012 at 10:10:04PM +0000, Joerg Pulz wrote: > here is what i could get out. > I was unable to print *pfh and pfh->pfil_func, but i printed the other > two and *ph, maybe this helps. That looks corrupted: ph_type = 92404512, ph_nhooks = -512 makes no sense to me. Can you go up one stack frame (to #11), which should be ip_output() 509 /* Run through list of hooks for output packets. */ 510 odst.s_addr = ip->ip_dst.s_addr; 511 ASSERT_HOST_BYTE_ORDER(m); 512 error = pfil_run_hooks(&V_inet_pfil_hook, &m, ifp, PFIL_OUT, inp); 513 if (error != 0 || m == NULL) 514 goto done; and there print V_inet_pfil_hook? Kind regards, Daniel