IPv6 locking crash (recursion)

Brian F. Feldman green at FreeBSD.org
Mon Dec 29 09:24:22 PST 2003


Brian Fundakowski Feldman <green at FreeBSD.org> wrote:
> Has anyone else tried out the most basic IPv6 test: ndp -I <iface> and
> then ping6 fe80::<normal address without %<iface> extension>? I was
> greeted by recursion on a non-recursive lock. After some sleuthing,
> I tried to determine what conditions could be tested for that would
> indicate "this must not call the nd6_is_addr_neighbor() call because
> we're from a normal RTM_RESOLVE initializing a new route", and this
> is the most correct thing I can come up with. It actually would do
> something entirely different if recursion were allowed. Comments?
> 
> Index: nd6.c
> ===================================================================
> RCS file: /u/FreeBSD-cvs/src/sys/netinet6/nd6.c,v
> retrieving revision 1.37
> diff -u -r1.37 nd6.c
> --- nd6.c	8 Nov 2003 23:36:32 -0000	1.37
> +++ nd6.c	26 Nov 2003 13:45:45 -0000
> @@ -1095,7 +1095,8 @@
>  
>  	if (req == RTM_RESOLVE &&
>  	    (nd6_need_cache(ifp) == 0 || /* stf case */
> -	     !nd6_is_addr_neighbor((struct sockaddr_in6 *)rt_key(rt), ifp))) {
> +	    ((!(rt->rt_flags & RTF_WASCLONED) || rt->rt_flags & RTF_LLINFO) &&
> +	    !nd6_is_addr_neighbor((struct sockaddr_in6 *)rt_key(rt), ifp)))) {
>  		/*
>  		 * FreeBSD and BSD/OS often make a cloned host route based
>  		 * on a less-specific route (e.g. the default route).

Does anyone know anything about this yet??  I get the crash using completely 
legitimate methods, trying to receive packets that are directed explicitly to
ff02::1%wi0 via interface wi0, unless I enable this workaround.

-- 
Brian Fundakowski Feldman                           \'[ FreeBSD ]''''''''''\
  <> green at FreeBSD.org                               \  The Power to Serve! \
 Opinions expressed are my own.                       \,,,,,,,,,,,,,,,,,,,,,,\




More information about the freebsd-net mailing list