Date: Fri, 3 Aug 2001 14:04:36 -0700 From: Bill Fenner <fenner@research.att.com> To: itojun@iijlab.net Cc: freebsd-net@freebsd.org Subject: Re: kernel upgrade causes truncated IPSEC packets Message-ID: <200108032104.OAA22596@windsor.research.att.com>
next in thread | raw e-mail | index | archive | help
> [0-length mbuf in the chain] is perfectly legal, and can happen > by result of m_cat()/m_split() calls from ipsec code. I don't see any m_cat() or m_split() happening on output; they're all in ah_input.c and esp_input.c . A 0-length mbuf in the chain is at best useless and perhaps fairly unexpected (thus the bug in if_tun.c lasting for 6.5 years before being found). Bill To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-net" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200108032104.OAA22596>