From owner-freebsd-net@freebsd.org  Tue Nov  1 22:41:06 2016
Return-Path: <owner-freebsd-net@freebsd.org>
Delivered-To: freebsd-net@mailman.ysv.freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
 [IPv6:2001:1900:2254:206a::19:1])
 by mailman.ysv.freebsd.org (Postfix) with ESMTP id 31318C2ACB2
 for <freebsd-net@mailman.ysv.freebsd.org>;
 Tue,  1 Nov 2016 22:41:06 +0000 (UTC)
 (envelope-from bugzilla-noreply@freebsd.org)
Received: from kenobi.freebsd.org (kenobi.freebsd.org
 [IPv6:2001:1900:2254:206a::16:76])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client did not present a certificate)
 by mx1.freebsd.org (Postfix) with ESMTPS id B4F6C1814
 for <freebsd-net@FreeBSD.org>; Tue,  1 Nov 2016 22:41:05 +0000 (UTC)
 (envelope-from bugzilla-noreply@freebsd.org)
Received: from bugs.freebsd.org ([127.0.1.118])
 by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id uA1Mf51J030355
 for <freebsd-net@FreeBSD.org>; Tue, 1 Nov 2016 22:41:05 GMT
 (envelope-from bugzilla-noreply@freebsd.org)
From: bugzilla-noreply@freebsd.org
To: freebsd-net@FreeBSD.org
Subject: [Bug 213232] [tcp] [panic] tcp_output() Panic String: tcp_output:
 len > IP_MAXPACKET on -head and stable/11
Date: Tue, 01 Nov 2016 22:41:04 +0000
X-Bugzilla-Reason: AssignedTo
X-Bugzilla-Type: changed
X-Bugzilla-Watch-Reason: None
X-Bugzilla-Product: Base System
X-Bugzilla-Component: kern
X-Bugzilla-Version: CURRENT
X-Bugzilla-Keywords: 
X-Bugzilla-Severity: Affects Only Me
X-Bugzilla-Who: commit-hook@freebsd.org
X-Bugzilla-Status: New
X-Bugzilla-Resolution: 
X-Bugzilla-Priority: ---
X-Bugzilla-Assigned-To: freebsd-net@FreeBSD.org
X-Bugzilla-Flags: 
X-Bugzilla-Changed-Fields: 
Message-ID: <bug-213232-2472-8HCvcma0RY@https.bugs.freebsd.org/bugzilla/>
In-Reply-To: <bug-213232-2472@https.bugs.freebsd.org/bugzilla/>
References: <bug-213232-2472@https.bugs.freebsd.org/bugzilla/>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/
Auto-Submitted: auto-generated
MIME-Version: 1.0
X-BeenThere: freebsd-net@freebsd.org
X-Mailman-Version: 2.1.23
Precedence: list
List-Id: Networking and TCP/IP with FreeBSD <freebsd-net.freebsd.org>
List-Unsubscribe: <https://lists.freebsd.org/mailman/options/freebsd-net>,
 <mailto:freebsd-net-request@freebsd.org?subject=unsubscribe>
List-Archive: <http://lists.freebsd.org/pipermail/freebsd-net/>
List-Post: <mailto:freebsd-net@freebsd.org>
List-Help: <mailto:freebsd-net-request@freebsd.org?subject=help>
List-Subscribe: <https://lists.freebsd.org/mailman/listinfo/freebsd-net>,
 <mailto:freebsd-net-request@freebsd.org?subject=subscribe>
X-List-Received-Date: Tue, 01 Nov 2016 22:41:06 -0000

https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D213232

--- Comment #8 from commit-hook@freebsd.org ---
A commit references this bug:

Author: hiren
Date: Tue Nov  1 22:40:25 UTC 2016
New revision: 308184
URL: https://svnweb.freebsd.org/changeset/base/308184

Log:
  MFC r307545
  Make sure tcp_mss() has the same check as tcp_mss_update() to have t_maxs=
eg
set
  to at least 64.

  This is still just a coverup to avoid kernel panic and not an actual fix.

  PR:                   213232
  Sponsored by:         Limelight Networks

Changes:
_U  stable/11/
  stable/11/sys/netinet/tcp_input.c

--=20
You are receiving this mail because:
You are the assignee for the bug.=