Date: Sat, 04 Aug 2001 06:07:20 +0900 From: itojun@iijlab.net To: Bill Fenner <fenner@research.att.com> Cc: freebsd-net@freebsd.org Subject: Re: kernel upgrade causes truncated IPSEC packets Message-ID: <5032.996872840@itojun.org> In-Reply-To: fenner's message of Fri, 03 Aug 2001 14:04:36 MST. <200108032104.OAA22596@windsor.research.att.com>
next in thread | previous in thread | raw e-mail | index | archive | help
>> [0-length mbuf in the chain] is perfectly legal, and can happen >> by result of m_cat()/m_split() calls from ipsec code. >I don't see any m_cat() or m_split() happening on output; they're all in >ah_input.c and esp_input.c . i need to go through the detail, but something equivalent to these functions happen everywhere in ipsec code. itojun To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-net" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?5032.996872840>