There should not be zero length mbufs in socket buffers. The code comes
from r1451, and thus can't be explained. A patch with explicit panic() here survived all tests. Tested by: pho Sponsored by: Nginx, Inc.
This commit is contained in:
parent
7707f31dc5
commit
f274e25659
@ -905,13 +905,6 @@ sbcut_internal(struct sockbuf *sb, int len)
|
||||
mfree = m;
|
||||
m = n;
|
||||
}
|
||||
while (m && m->m_len == 0) {
|
||||
sbfree(sb, m);
|
||||
n = m->m_next;
|
||||
m->m_next = mfree;
|
||||
mfree = m;
|
||||
m = n;
|
||||
}
|
||||
if (m) {
|
||||
sb->sb_mb = m;
|
||||
m->m_nextpkt = next;
|
||||
|
Loading…
x
Reference in New Issue
Block a user