[Bug 284606] Kernel Panic with ipfw

From: <bugzilla-noreply_at_freebsd.org>
Date: Tue, 04 Nov 2025 00:54:27 UTC
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=284606

--- Comment #33 from commit-hook@FreeBSD.org ---
A commit in branch stable/13 references this bug:

URL:
https://cgit.FreeBSD.org/src/commit/?id=94360584542abc49a1d947844cf4d8ca1369d4df

commit 94360584542abc49a1d947844cf4d8ca1369d4df
Author:     Kyle Evans <kevans@FreeBSD.org>
AuthorDate: 2025-11-01 17:34:11 +0000
Commit:     Kyle Evans <kevans@FreeBSD.org>
CommitDate: 2025-11-04 00:52:12 +0000

    ipfw: pmod: avoid further rule processing after tcp-mod failures

    m_pullup() here will have freed the mbuf chain, but we pass back an
    IP_FW_DENY without any signal that the outer loop should finish.  Thus,
    rule processing continues without an mbuf and there's a chance that we
    conclude that the packet may pass (but there's no mbuf remaining)
    depending on the rules that follow it.

    PR:             284606
    Reviewed by:    ae

    (cherry picked from commit c0382512bfce872102d213b9bc2550de0bc30b67)

 sys/netpfil/ipfw/pmod/tcpmod.c | 25 ++++++++++++++++---------
 1 file changed, 16 insertions(+), 9 deletions(-)

-- 
You are receiving this mail because:
You are on the CC list for the bug.