From nobody Sat Jan 24 06:46:33 2026 X-Original-To: freebsd-current@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4dylhz2tpKz6PHsq for ; Sat, 24 Jan 2026 06:47:15 +0000 (UTC) (envelope-from freebsd@walstatt-de.de) Received: from smtp6.goneo.de (smtp6.goneo.de [85.220.129.31]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4dylhx64STz3ryC; Sat, 24 Jan 2026 06:47:13 +0000 (UTC) (envelope-from freebsd@walstatt-de.de) Authentication-Results: mx1.freebsd.org; dkim=pass header.d=walstatt-de.de header.s=DKIM001 header.b=neTIvNIp; dmarc=none; spf=pass (mx1.freebsd.org: domain of freebsd@walstatt-de.de designates 85.220.129.31 as permitted sender) smtp.mailfrom=freebsd@walstatt-de.de Received: from hub2.goneo.de (hub2.goneo.de [IPv6:2001:1640:5::8:53]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits)) (No client certificate requested) by smtp6.goneo.de (Postfix) with ESMTPS id 5F26A240E6E; Sat, 24 Jan 2026 07:47:10 +0100 (CET) Received: from hub2.goneo.de (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits)) (No client certificate requested) by hub2.goneo.de (Postfix) with ESMTPS id 8CA532400A4; Sat, 24 Jan 2026 07:47:08 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=walstatt-de.de; s=DKIM001; t=1769237228; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=d4GyedVq4/ikHQ4TjhvUpCkEbaO0AKygpoxZjEzIVag=; b=neTIvNIpCGh5mEsnmJnXPAhE5NGhawaoTIskzqM7o22MNX7g7AewWrFaQUEY0tVbhM2KiO v7QpYCQaicNHWa+Snj9jY3RPUqpYDjE3fqK1QjXWzvYASu41mWQDV1826fYFFTrIxsJwIm FNDELU5YBvHLTXTZjbCu1nh/054uRoyl2e8WvBmhSMpi1jf2JHGA4rpJU4zY1mBUDZ7WWs DDtlMmrKzXbrULrUmlMC4RmGOUYeZZ0TDfJDvIptXQFIpd5rEhZfrdsWvuptf90g182OmK UJWNrja23cRDKgRdgfSP4tvdxOgwn66oUoZkBjwN/JBjHCjaxIH9KgAqB9NoLg== Received: from thor.sb211.local (dynamic-2a02-3100-23b3-4202-021b-21ff-fe4e-8f4d.310.pool.telefonica.de [IPv6:2a02:3100:23b3:4202:21b:21ff:fe4e:8f4d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (prime256v1) server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by hub2.goneo.de (Postfix) with ESMTPSA id 6898E240025; Sat, 24 Jan 2026 07:47:07 +0100 (CET) Date: Sat, 24 Jan 2026 07:46:33 +0100 From: A FreeBSD User To: Gleb Smirnoff Cc: Alastair Hogge , Ronald Klop , FreeBSD CURRENT , David Wolfskill Subject: Re: CURRENT: kernel panic in IPFW while stopping jails Message-ID: <20260124074700.27eff4e0@thor.sb211.local> In-Reply-To: References: <20251225170828.7aef61df@hermann> <902742484.3865.1766683845222@localhost> <20251225190836.6769e6d6@hermann> <20251226103308.72204662@thor.sb211.local> <291e26bfbe2b51835f7672db3a2e3593@riseup.net> X-Mailer: Claws Mail 3.21.0 (GTK+ 2.24.33; amd64-portbld-freebsd16.0) List-Id: Discussions about the use of FreeBSD-current List-Archive: https://lists.freebsd.org/archives/freebsd-current List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-current@FreeBSD.org MIME-Version: 1.0 Content-Type: multipart/signed; boundary="Sig_/hZ62s_jhEXdJS2Yho8r/Ot/"; protocol="application/pgp-signature"; micalg=pgp-sha512 X-Rspamd-UID: 0f56e1 X-Rspamd-UID: 0d0aaa X-Spamd-Bar: ----- X-Spamd-Result: default: False [-5.68 / 15.00]; SIGNED_PGP(-2.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; NEURAL_HAM_SHORT(-0.98)[-0.985]; R_SPF_ALLOW(-0.20)[+ip4:85.220.129.0/25]; MIME_GOOD(-0.20)[multipart/signed,text/plain]; R_DKIM_ALLOW(-0.20)[walstatt-de.de:s=DKIM001]; RCVD_IN_DNSWL_LOW(-0.10)[85.220.129.31:from]; MIME_TRACE(0.00)[0:+,1:+,2:~]; ASN(0.00)[asn:25394, ipnet:85.220.128.0/17, country:DE]; RCVD_VIA_SMTP_AUTH(0.00)[]; ARC_NA(0.00)[]; DMARC_NA(0.00)[walstatt-de.de]; RCVD_TLS_ALL(0.00)[]; MLMMJ_DEST(0.00)[freebsd-current@freebsd.org]; FROM_EQ_ENVFROM(0.00)[]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_FIVE(0.00)[5]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RCVD_COUNT_THREE(0.00)[3]; TO_DN_ALL(0.00)[]; DKIM_TRACE(0.00)[walstatt-de.de:+] X-Rspamd-Queue-Id: 4dylhx64STz3ryC --Sig_/hZ62s_jhEXdJS2Yho8r/Ot/ Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: quoted-printable Am Tage des Herren Mon, 29 Dec 2025 12:51:03 -0800 Gleb Smirnoff schrieb: > Alastair, >=20 > thanks for running bisect. I see that you started it from a revision > that already has 129e15d4994311958db59a1718d4ff42d440ce2b and it still > is bad for you. This means a second problem exists in > 3daae1ac1d82ecdcd855101bab5206e914b12350. >=20 > I just tried to reproduce with exactly Dan's ruleset - no panic :( >=20 > Maybe you can share how you reproduced during your bisection? >=20 > Or maybe you can dump a core and share it? >=20 > Very sorry for this breakage during the holidays. I really want to > fix that ASAP, but I need more data. >=20 > On Sun, Dec 28, 2025 at 11:36:05AM +0000, Alastair Hogge wrote: > A> $ git bisect log > A> git bisect start > A> # status: waiting for both good and bad commits > A> # bad: [086bedb11a853801e82234b8a1a64f0df52d9e52] tools.build: also add > A> sys/_visible.h to SYSINCS > A> git bisect bad 086bedb11a853801e82234b8a1a64f0df52d9e52 > A> # status: waiting for good commit(s), bad commit known > A> # good: [44cb1e857f048d2326bdc1a032ccd2c04d2bcdc9] tcp: improve > A> credential handling in syncache > A> git bisect good 44cb1e857f048d2326bdc1a032ccd2c04d2bcdc9 > A> # good: [b0c7eaf83d21bbc333e247ab9e136965b3ca54ed] bhyve/slirp: Drop > A> privileges before entering capability mode > A> git bisect good b0c7eaf83d21bbc333e247ab9e136965b3ca54ed > A> # good: [6a75e3951506c12b42428a47710d07cadcdd723e] ofed/libibverbs: > A> remove strdupa() hack from config.h > A> git bisect good 6a75e3951506c12b42428a47710d07cadcdd723e > A> # bad: [1fad49baf390cb52f238e6c352d0bc0893c008c3] sdhci: Try to comple= te > A> the last transaction if dumping > A> git bisect bad 1fad49baf390cb52f238e6c352d0bc0893c008c3 > A> # good: [9d9974457ce8c6cf9023884ab457d4712dcc237f] bhyvectl: fix build > A> without BHYVE_SNAPSHOT > A> git bisect good 9d9974457ce8c6cf9023884ab457d4712dcc237f > A> # bad: [52395203f9ac40d321ed55d93e9887300261d3bf] MFV: Import blocklist > A> 2025-12-15 (8a4b011) > A> git bisect bad 52395203f9ac40d321ed55d93e9887300261d3bf > A> # good: [c112ad75605ccdfcb8bbce2f57b0e7a077f057f8] options: describe > A> WITH_IPFILTER_IPFS > A> git bisect good c112ad75605ccdfcb8bbce2f57b0e7a077f057f8 > A> # good: [8774a990ee4094f16d596d4b78e0f3239e5d0c88] bpf: modularize > A> ifnet(9) part of bpf > A> git bisect good 8774a990ee4094f16d596d4b78e0f3239e5d0c88 > A> # bad: [1615eff94cda8619561b73186ec8098cc8b14c5c] usb: don't create > A> ifnet(9) for usbus devices > A> git bisect bad 1615eff94cda8619561b73186ec8098cc8b14c5c > A> # good: [ddf4f9eda9c295082f17e7f26963666b72c97bb9] ipfw: create "ipfw0" > A> and "ipfwlog0" bpf tapping points without ifnet(9) > A> git bisect good ddf4f9eda9c295082f17e7f26963666b72c97bb9 > A> # bad: [3daae1ac1d82ecdcd855101bab5206e914b12350] ipfw: create a bpf t= ap > A> point for every log rule > A> git bisect bad 3daae1ac1d82ecdcd855101bab5206e914b12350 > A> # good: [1c5021f5251b231b614ad9cd175bcb4250495c12] ifconfig: print > A> warning and return success on ipfw0, ipfwlog0 cloning > A> git bisect good 1c5021f5251b231b614ad9cd175bcb4250495c12 > A> # first bad commit: [3daae1ac1d82ecdcd855101bab5206e914b12350] ipfw: > A> create a bpf tap point for every log rule > A>=20 > A> https://codeberg.org/FreeBSD/freebsd-src/commit/3daae1ac1d82ecdcd85510= 1bab5206e914b12350 > A> ipfw: create a bpf tap point for every log rule > A>=20 > A> Dynamically allocate bpf tap points for every rule that has "log". > A> The name is "ipfw%u", where %u is substituted to the rule number. > A> The default catch all "ipfw0" tap still exists for compatibility > A> and it will catch packets in case if there are no bpf listeners > A> on a per-rule tap. > A>=20 > A> Reviewed by: ae > A> Differential Revision: https://reviews.freebsd.org/D53877 =20 >=20 After upgrade sources with the fix I can confirm that all reported problems= of mine are gone! Thank you very much for the fix. Kind regards, oh --=20 A FreeBSD user --Sig_/hZ62s_jhEXdJS2Yho8r/Ot/ Content-Type: application/pgp-signature Content-Description: OpenPGP digital signature -----BEGIN PGP SIGNATURE----- iHUEARYKAB0WIQRQheDybVktG5eW/1Kxzvs8OqokrwUCaXRq5AAKCRCxzvs8Oqok r3kAAQC8g+L1CFCk1g27zMlFobdHZMhyeGF9RKzPnWjY8DtHKgD+LohqkT7hxC3R +BBTxppyV9ixAjUD3DeNxMfmV6qdEAY= =EBZK -----END PGP SIGNATURE----- --Sig_/hZ62s_jhEXdJS2Yho8r/Ot/--