https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=256610
Bug ID: 256610
Summary: Kernel panic with ngtee
Product: Base System
Version: 13.0-STABLE
Hardware: amd64
OS: Any
Status: New
Severity: Affects Only Me
Priority: ---
Component: kern
Assignee: [email protected]
Reporter: [email protected]
Created attachment 225814
--> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=225814&action=edit
savecore
With the following in /etc/rc.conf:
ipfw_netflow_enable="YES"
ipfw_netflow_rule=1111
ipfw_netflow_ip="192.168.1.2"
ipfw_netflow_port=9995
ipfw_netflow_version=9
I can reliably get a kernel panic as soon as there is network traffic between a
host on the LAN and a jail whose IPv4 address is attached to a VLAN interface
which also has a bridge by vm-bhyve. 192.168.1.2 is another jail on the local
machine. This is a kernel compiled with INVARIANTS but it also panics without,
and did so on 13.0-RELEASE.
#9 memmove_erms () at /usr/src/sys/amd64/amd64/support.S:547
#10 0xffffffff80c80f18 in m_dup (m=0xfffff8021e841200,
m@entry=0xfffff801345d9d00, how=how@entry=1)
at /usr/src/sys/kern/uipc_mbuf.c:722
#11 0xffffffff834ab3c1 in ng_ipfw_input (m0=<optimized out>,
fwa=0xfffffe0144090300, tee=false) at /usr/src/sys/netgraph/ng_ipfw.c:324
#12 0xffffffff82936df0 in ipfw_check_packet (m0=0xfffffe01440904e8,
ifp=0xfffff80004e5b800, flags=131072, ruleset=<optimized out>,
inp=0xfffff8004cff35b8) at /usr/src/sys/netpfil/ipfw/ip_fw_pfil.c:297
#13 0xffffffff80d2a8c7 in pfil_run_hooks (head=<optimized out>, p=...,
ifp=ifp@entry=0xfffff80004e5b800, flags=flags@entry=131072,
inp=inp@entry=0xfffff8004cff35b8) at /usr/src/sys/net/pfil.c:187
Possibly related to Bug #256439.
--
You are receiving this mail because:
You are the assignee for the bug.