Date: Thu, 9 Sep 2004 20:29:55 +0100 From: Brian Somers <brian@Awfulhak.org> To: Hannes Mehnert <hannes@mehnert.org> Cc: freebsd-net@freebsd.org Subject: Re: Racoon breakage with recent kernel - what NOT to do Message-ID: <20040909202955.438a4327@dev.lan.Awfulhak.org> In-Reply-To: <20040714185248.GC70193@mehnert.org> References: <200406091423.31355.durian@boogie.com> <200407121532.18503.durian@boogie.com> <20040714185248.GC70193@mehnert.org>
next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, 14 Jul 2004 20:52:48 +0200, Hannes Mehnert <hannes@mehnert.org> wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > Hi, > > On Mon, Jul 12, 2004 at 03:32:18PM -0600, Mike Durian wrote: > > This is just a follow-up to say the problem still exists in a -current > > system I built from source yesterday (7/11/04). Does anyone know > > what's going on? > > > > And to clarify, the URL listed above does show the same problem I'm > > seeing. > > A workaround is setting MSIZE to 320 in your kernel config: > options MSIZE=320 Well, I applied this tweak to my kernel config file (some time ago!) and it fixed the racoon issue.... **BUT** doing this badly breaks dtom() - all sorts of issues turn up when a data pointer can't be turned back into its owning mbuf pointer. This explains all of the mis-aligned mbuf frees that turn up and panic the system. In fact, I can't really explain *why* dtom() actually works, but that's the content of my other posting.... -- Brian <brian@Awfulhak.org> <brian@[uk.]FreeBSD.org> <http://www.Awfulhak.org> <brian@[uk.]OpenBSD.org> Don't _EVER_ lose your sense of humour !
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20040909202955.438a4327>