Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 3 Aug 2001 14:04:36 -0700
From:      Bill Fenner <fenner@research.att.com>
To:        itojun@iijlab.net
Cc:        freebsd-net@freebsd.org
Subject:   Re: kernel upgrade causes truncated IPSEC packets
Message-ID:  <200108032104.OAA22596@windsor.research.att.com>

next in thread | raw e-mail | index | archive | help

>	[0-length mbuf in the chain] is perfectly legal, and can happen
>	by result of m_cat()/m_split() calls from ipsec code.

I don't see any m_cat() or m_split() happening on output; they're all in
ah_input.c and esp_input.c .

A 0-length mbuf in the chain is at best useless and perhaps fairly
unexpected (thus the bug in if_tun.c lasting for 6.5 years before
being found).

  Bill

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-net" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200108032104.OAA22596>