From nobody Sun Mar 31 04:54:52 2024 X-Original-To: bugs@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4V6hdm2wFTz5Gqjh for ; Sun, 31 Mar 2024 04:54:52 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4V6hdm0drqz4g4b for ; Sun, 31 Mar 2024 04:54:52 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1711860892; a=rsa-sha256; cv=none; b=aI0DA5qgvAL9dfRhsexUzlW8TmP81ZUyq6me3Xx1TdhStjronXUoztNYDxA0NoLSLfTzUG ej54k5lnzd1sdlSb+x/E2RJ9EdpCYJN4X/zSZHvYAxeSv24v1xH39TxIL2Ynd0F9/vwf03 ZBGbpFcE65TwmmN03ZvqEXttDFh3yiMDtwoJVWwRPjlFw7QkjG/Jd/ycgSrDe2zpC2cRsd iynI4CqipbOExivlwI20ExPKEUIJbiJZKSFLktp+qKD/IaWf0DHwJbt3BZcDEOauGLjGzK aCfp3oF8TBrAqe8dzUkHeA6S667Gb4mGszhXRrQ465HifmrcQx57aHme7zivWQ== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1711860892; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=t5Y0oGyeRblAAFqrE2aFzvCVUnEXX2NuETYn3JBjjss=; b=yRfmvlmdauUNH1gxbZx2UL9JIyEd20HzgiRwqM7fCkm1CkP4rPG6iQEYzGCwYRLtjNl14j LN4/xD2db/+ksLSSodbLIF2lSV3Rc7Qri+Tmr+4Qt6ZECh6kA4Ye6hxFAPrqUtwHeiqjeK KroLlqhNFeJL3uDE2yeali/Eg95b8bpnACymaUvAWfBzSqbHQgpM4vdLj7P5NUkC/RFdwo s39FVCb+ZzRi3ypd/5wkucawccxPK5HY8yIQ6h2dJoBk+9O/VpXB4JfOHcGYqgYTTAT199 ldbQMduaB5A9yUp99QdCRwBECqW/F9j5HLDeI3iz32AwMPGitTS/A8S1V+jjzQ== Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4V6hdm08pnzPPC for ; Sun, 31 Mar 2024 04:54:52 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 42V4spJh071462 for ; Sun, 31 Mar 2024 04:54:51 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 42V4sps9071458 for bugs@FreeBSD.org; Sun, 31 Mar 2024 04:54:51 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 278059] Kernel panic in ipfw_chk starting in FreeBSD 14 Date: Sun, 31 Mar 2024 04:54:52 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 14.0-RELEASE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Many People X-Bugzilla-Who: freebsd@spatula.net X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status bug_severity priority component assigned_to reporter Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Bug reports List-Archive: https://lists.freebsd.org/archives/freebsd-bugs List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-bugs@freebsd.org MIME-Version: 1.0 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D278059 Bug ID: 278059 Summary: Kernel panic in ipfw_chk starting in FreeBSD 14 Product: Base System Version: 14.0-RELEASE Hardware: amd64 OS: Any Status: New Severity: Affects Many People Priority: --- Component: kern Assignee: bugs@FreeBSD.org Reporter: freebsd@spatula.net I recently updated to FreeBSD 14 while keeping the same configuration otherwise. I just experienced a kernel panic which appears to have been ca= used by ipfw. >From kgdb: Unread portion of the kernel message buffer: Fatal trap 12: page fault while in kernel mode cpuid =3D 1; apic id =3D 02 fault virtual address =3D 0x0 fault code =3D supervisor read data, page not present instruction pointer =3D 0x20:0xffffffff81008300 stack pointer =3D 0x28:0xfffffe00aece5380 frame pointer =3D 0x28:0xfffffe00aece5380 code segment =3D base 0x0, limit 0xfffff, type 0x1b =3D DPL 0, pres 1, long 1, def32 0, gran 1 processor eflags =3D interrupt enabled, resume, IOPL =3D 0 current process =3D 91770 (python3.10) rdi: fffff80095e17998 rsi: 0000000000000000 rdx: 000000000000003c rcx: 000000000000003c r8: fffff80095e17998 r9: ffffffff80c67b10 rax: fffff80095e17998 rbx: fffff80095e17900 rbp: fffffe00aece5380 r10: 0000000000000000 r11: fffffe00aece5610 r12: 000000000000003c r13: 0000000000000068 r14: 0000000000000006 r15: fffff801e118cc00 trap number =3D 12 panic: page fault cpuid =3D 1 time =3D 1711859735 KDB: stack backtrace: #0 0xffffffff80b9009d at kdb_backtrace+0x5d #1 0xffffffff80b431a2 at vpanic+0x132 #2 0xffffffff80b43063 at panic+0x43 #3 0xffffffff8100c85c at trap_fatal+0x40c #4 0xffffffff8100c8af at trap_pfault+0x4f #5 0xffffffff80fe3ac8 at calltrap+0x8 #6 0xffffffff80bda858 at m_pullup+0x1c8 #7 0xffffffff82e39516 at ipfw_chk+0x11f6 #8 0xffffffff82e3e3f4 at ipfw_check_frame_mbuf+0xd4 #9 0xffffffff80c871d8 at pfil_mbuf_out+0x38 #10 0xffffffff80c68362 at ether_output_frame+0xe2 #11 0xffffffff80c68198 at ether_output+0x688 #12 0xffffffff80d02156 at ip_output+0x1266 #13 0xffffffff80d1b4ef at tcp_default_output+0x1eef #14 0xffffffff80d2c70e at tcp_usr_ready+0x18e #15 0xffffffff80b413e5 at sendfile_iodone+0x115 #16 0xffffffff80b40703 at vn_sendfile+0x1163 #17 0xffffffff80b41779 at sendfile+0x119 It appears this was caused by ipfw, and it looks like possibly it would have been applying some layer-2 rules, which may be somewhat less commonly exercised. In case it helps, here are my ethernet ipfw rules: 00010 deny ip from any to any MAC any 54:e0:19:92:69:ba in recv em0 00010 deny ip from any to any MAC any 9c:76:13:14:64:08 in recv em0 00020 allow ip from any to any MAC any any via em0 (These rules block-list a few devices on my home network which occasionally advertise themselves via ARP as the network's router.) I will try disabling layer-2 for now, as I have employed a different workar= ound for the devices on my LAN that I needed to block, and see if that prevents a recurrence. I'll also keep my vmcore around in case there are any commands someone wishes me to run against it. --=20 You are receiving this mail because: You are the assignee for the bug.=