From nobody Sun Dec 18 20:55:48 2022 X-Original-To: bugs@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4NZw9055CMzt9NM for ; Sun, 18 Dec 2022 20:55:48 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4NZw903gNvz3lfv for ; Sun, 18 Dec 2022 20:55:48 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1671396948; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=tM5pPnvewO+9b5jdntVcNDGKF30ur2sdS/zQwHqg2xI=; b=QhP7ELni1tHPieuvI+4rLmn2tkh+x3pXHYd71EZ8RpDFxSEuP0VnDMqxO8kelHT18MTl6R HG976McU+VZG0AvVfmE7UAyBfz3DfNxjLv1RjWYpJ4bkh8KiLyiW6564kSyPi/pQ+9YwUM WKWuFv6vC/2jw40wPd/6L5UBYXaI8hatEUl5Pn/D65AWeBcJh+ZntoIWv6wZmIec2BXvqR BTIqYyvOfVpBwVHoTjLgDZqPqJSp8Qk8XiRoKhPdVjuWcr8y3vIeNbrGzxHN+MJCik678d pWVY0TyprvB5y59Dcn7HhN0+8B2QejOt+JZt5C1pD3KFU6gleW2JpuyBvddQaA== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1671396948; a=rsa-sha256; cv=none; b=X8aICopz6AyHRckoseljm1DlLmCO5yBvkH/S5v3zAeL4p5nOKaWMgdTnkvQ+H/WmmwA7DN XGUAMkvLv3LSqdzsmREQ+67Wp9lipQetRThhDCEQKeQ6aAAFSY2TwDuEgaBvftws2Y+s0e 3CjDTO/uIKEb2Quu0hyA4P6TBlOEHk9UJZ/7hSCmzWreCWJLC2auJduzfzS/2q6rEESJJU qw6X9h5GUqeoD5kJ/WzRHTTEjwVncR/4ixWoxqru01OT/ROWsO6sayjCwBq6kACfqMcYiY lnTXlsNFXMtWm4UxSd7c1HHjvYd0MB31FsbB9A1k7l8+4DUeIYETZ9DYRloMOA== Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4NZw902ZDDzVG1 for ; Sun, 18 Dec 2022 20:55:48 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 2BIKtmpa084729 for ; Sun, 18 Dec 2022 20:55:48 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 2BIKtmpI084728 for bugs@FreeBSD.org; Sun, 18 Dec 2022 20:55:48 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 262676] vimage: on starting jail instant kernel panic Date: Sun, 18 Dec 2022 20:55:48 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 13.1-RELEASE X-Bugzilla-Keywords: crash, ipv6, regression, vimage X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: dinoex@FreeBSD.org X-Bugzilla-Status: Open X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Bug reports List-Archive: https://lists.freebsd.org/archives/freebsd-bugs List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-bugs@freebsd.org MIME-Version: 1.0 X-ThisMailContainsUnwantedMimeParts: N https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D262676 --- Comment #7 from Dirk Meyer --- Inside the jail: # /etc/pf.conf nat on tun0 from any to any -> (tun0) nat on tun1 from any to any -> (tun1) pass quick on lo0 pass quick on epair1b pass quick on vlan14 pass quick on tun0 # eof It might be related that vimage/vnet jails in 13.x have their own fibs. Previously the number of fibs have been inherited. Now each jail can have its own set, defaults to 0. # sysctl net.fibs net.fibs: 8 # jexec 3 sysctl net.fibs net.fibs: 1 # jexec 3 setfib 4 netstat -nr4 setfib: 4: invalid FIB (max 0) So moving an Interface with fib set in the jail may cause the crash. Should there be an out of bounds check? Or Should the fib reset on attach? --=20 You are receiving this mail because: You are the assignee for the bug.=