Subject: kern/18392: bpf problems: traffic on loopback while bpf is active => kernel panic, incorrect length
To: None <gnats-bugs@gnats.netbsd.org>
From: None <itojun@itojun.org>
List: netbsd-bugs
Date: 09/24/2002 11:45:38
>Number:         18392
>Category:       kern
>Synopsis:       bpf problems: traffic on loopback while bpf is active => kernel panic, incorrect length
>Confidential:   no
>Severity:       critical
>Priority:       high
>Responsible:    kern-bug-people
>State:          open
>Class:          sw-bug
>Submitter-Id:   net
>Arrival-Date:   Mon Sep 23 19:46:00 PDT 2002
>Closed-Date:
>Last-Modified:
>Originator:     Jun-ichiro itojun Hagino
>Release:        1.6H as of yesterday (sep23)
>Organization:
	itojun.org
>Environment:
Architecture: i386
Machine: i386
>Description:
	it seems that bpf got some bugs, in terms of DLT_NULL handling.
>How-To-Repeat:
	# tcpdump -n -i lo0 &
	# ping6 -n ::1
	leads us to kernel panic.

	# tcpdump -n -i ppp0
	will emit "truncated packet" messages for outgoing traffic (4 byte smaller
	than expected)
>Fix:
	i suspect recent changes to sys/net/bpf.c.  i will try to identify which one
	was it.
>Release-Note:
>Audit-Trail:
>Unformatted: