On 05.07.2017 19:23, Adrian Chadd wrote:
>> As many of you know, when dealing with IP fragments the kernel will build a
>> list of packets (fragments) chained together through the m_nextpkt pointer.
>> This is all good until someone tries to do a M_PREPEND on one of the packet
>> in the chain and t
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=186114
Donald Baud changed:
What|Removed |Added
CC||donaldb...@yahoo.com
--- Comment #10
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=186114
--- Comment #109 from Eugene Grosbein ---
(In reply to Donald Baud from comment #108)
It does not really matter what triggered the panic as its reason is known:
ng_iface lacks protection of its private data from modifications while it is
b
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=186114
--- Comment #110 from Cassiano Peixoto ---
(In reply to Eugene Grosbein from comment #109)
Hi,
Should i update with this last patch (PR 220076) and rebuild the kernel?
--
You are receiving this mail because:
You are on the CC list for t
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=186114
--- Comment #111 from Eugene Grosbein ---
(In reply to Cassiano Peixoto from comment #110)
Yes, just like I've asked in the comment 107.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=186114
--- Comment #112 from Cassiano Peixoto ---
(In reply to Eugene Grosbein from comment #111)
Ok, just applied and rebooted. I'll keep you posted.
--
You are receiving this mail because:
You are on the CC list for the bug.
__