On Friday, October 17, 2014 11:32:13 PM Jason Wolfe wrote:
> Producing 10G of random traffic against a server with this assertion
> added took about 2 hours to panic, so if it turns out we need anything
> further it should be pretty quick.
>
> #4 list
> 2816 * timer and remembe
On Friday, October 17, 2014 11:43:26 PM Adrian Chadd wrote:
> Hm, is this the bug that was just fixed in -HEAD?
>
> I saw this similar bug on -HEAD with lots of quick connections and
> reused ports. It ended up deferencing a NULL tcp timer pointer from
> the inpcb. Is that what the code in your tr
Like I said before, it is not per RFC. It is trivial to derive solicited
node multicast address from the target IP, so If someone were to launch a
flood attack to poison cache entry for X host by sending Address resolution
request for all other local hosts in the network, with NS's source IP=X's
IP