Date: Wed, 10 Nov 2004 17:53:28 +0100 From: Arjan Van Leeuwen <avleeuwen@gmail.com> To: Robert Watson <rwatson@freebsd.org> Cc: freebsd-stable@freebsd.org Subject: Re: Panic in 5.3, related to network traffic Message-ID: <d86b4873041110085317a9724f@mail.gmail.com> In-Reply-To: <Pine.NEB.3.96L.1041110164128.60848c-100000@fledge.watson.org> References: <d86b48730411091641640ce546@mail.gmail.com> <Pine.NEB.3.96L.1041110164128.60848c-100000@fledge.watson.org>
next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, 10 Nov 2004 16:42:01 +0000 (GMT), Robert Watson <rwatson@freebsd.org> wrote: > > On Wed, 10 Nov 2004, Arjan Van Leeuwen wrote: > > > > Could you send a copy of your dmesg? Could you also use gdb on a kernel > > > with debug symbols or addr2line to convert the function+offsets in the > > > trace to file and line number in the source? This is a NULL pointer > > > dereference, so presumably somewhere there is a poor assumption about > > > memory allocation or the like. > > > > dmesg is attached. > > Could you say a little about how ipfilter is being used on the box; would > it be possible to test with it disabled? Sure. It's a very standard setup; I block all traffic by default. I allow all traffic on the internal network (fxp0), I allow outgoing traffic on the external network (rl0), and I allow only selected ports as incoming traffic on rl0 (ssh, http, https, some other things I need). I can send you the ruleset privately if you want me to. What might be interesting is that I also have ipfw enabled (with default to accept), because I use dummynet for traffic shaping. I'll compile a new kernel without ipfilter tonight, and I'll mail you the results as soon as possible. Arjan > > > > Robert N M Watson FreeBSD Core Team, TrustedBSD Projects > robert@fledge.watson.org Principal Research Scientist, McAfee Research > >
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?d86b4873041110085317a9724f>