Subject: kern/18392: bpf problems: traffic on loopback while bpf is active => kernel panic, incorrect length
To: None <gnats-bugs@gnats.netbsd.org>
From: None <itojun@itojun.org>
List: netbsd-bugs
Date: 09/24/2002 11:45:38
>Number: 18392
>Category: kern
>Synopsis: bpf problems: traffic on loopback while bpf is active => kernel panic, incorrect length
>Confidential: no
>Severity: critical
>Priority: high
>Responsible: kern-bug-people
>State: open
>Class: sw-bug
>Submitter-Id: net
>Arrival-Date: Mon Sep 23 19:46:00 PDT 2002
>Closed-Date:
>Last-Modified:
>Originator: Jun-ichiro itojun Hagino
>Release: 1.6H as of yesterday (sep23)
>Organization:
itojun.org
>Environment:
Architecture: i386
Machine: i386
>Description:
it seems that bpf got some bugs, in terms of DLT_NULL handling.
>How-To-Repeat:
# tcpdump -n -i lo0 &
# ping6 -n ::1
leads us to kernel panic.
# tcpdump -n -i ppp0
will emit "truncated packet" messages for outgoing traffic (4 byte smaller
than expected)
>Fix:
i suspect recent changes to sys/net/bpf.c. i will try to identify which one
was it.
>Release-Note:
>Audit-Trail:
>Unformatted: