Hi,
I may look into this, but here it is. HEAD as of this week.
lock order reversal:
1st 0xc2be2508 if_addr_lock (if_addr_lock) @
/home/rpaulo/freebsd/sys/netinet/igmp.c:1716
2nd 0xc070d9bc ifnet_rw (ifnet_rw) @ /home/rpaulo/freebsd/sys/net/if.c:243
KDB: stack backtrace:
db_trace_self() at db
At Sat, 20 Dec 2014 23:40:37 +0100,
Ilya Bakulin wrote:
> But what we do is just silently discarding the overlapping segment, see [2].
> When using PF with fragment reassembly, the behavior changes to what RFC
> says
> and the packet is completely dropped.
>
> There is no security issue with curr