From nobody Thu Jul 20 13:47:18 2023 X-Original-To: net@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4R6DWq4P27z4nZ9M for ; Thu, 20 Jul 2023 13:47:19 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4R6DWq2JYmz3HDx for ; Thu, 20 Jul 2023 13:47:19 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1689860839; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=SSFHZ6SFGqOBz81STC5+l2+m7Rqy0hUIPJzTedzyvYM=; b=nr0I92Scwp/JN5iUHS5zgLBTQHiyWkY15x47CEtk6493qfLT2JKFlHo4G7zKAVyGQN9Z5f tY5MnkjiMTMrQmA6prRvP7T+81KbfRf/78377ypOQaOrOu5JSA52M+3GN8n8/r9xhJDjIp tgsEJEvfD/BlVPFxXupn6g6/Vr8Ij31kDQMY8YjYZ7oCDobMTe5kzp2GVB7dbTZXlBn7i0 7pj/fDyuYwnfO60mYuO3pS9crARNOtFbBFch9UCFPmaFVSRgBH33puiqx6m7RouxSzDkWv edopBEA2k0GFuCpWu0NZ28BSS46pVhk+mRqgZNPxsJ4qEYhJ5Z6pi9o5xBKDkg== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1689860839; a=rsa-sha256; cv=none; b=KwAub5gLRUPvPOkfrjd9SiVjG2GJZaHuma+Zg6wjq4EBXawgF2JRY64UO+2C1A1n/brwoW hZ5+MSmdf4bldDDVrLPXfxc5LC4/XBymQ/rYf+a2nYYJWCa6LSCvyprL9J9i93gVKvlc4q SnwJqkdiW5KYnsTt4VC7mw9f2p/3uplv5+ZqliYPaUkaLLUDJpjcl7qdXvrEslXOAXNV1l qAHGscUyWgKWJd3+JHV1JyPADcESdhxOekJAJKTSH4UOfOadYqdRx4kiBRF/QPOIR8djvs UT2BQ9uOdWKLfoYDKR/dqXP9SmBwXv5N4bt88ghJIPtH0lJcSI4LWWCs2Lko2w== Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4R6DWq0QvBzYGg for ; Thu, 20 Jul 2023 13:47:19 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 36KDlITB040926 for ; Thu, 20 Jul 2023 13:47:18 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 36KDlINA040925 for net@FreeBSD.org; Thu, 20 Jul 2023 13:47:18 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: net@FreeBSD.org Subject: [Bug 272616] [panic] Reproducible kernel panic related to sendfile and IPSec Date: Thu, 20 Jul 2023 13:47:18 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 13.2-STABLE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: kib@FreeBSD.org X-Bugzilla-Status: Open X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: net@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Networking and TCP/IP with FreeBSD List-Archive: https://lists.freebsd.org/archives/freebsd-net List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-net@freebsd.org MIME-Version: 1.0 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D272616 --- Comment #7 from Konstantin Belousov --- (In reply to Mark Johnston from comment #6) By payload you mean mbuf data, right? IPSEC needs to match packet IP header against policy to decide should it do anything with it at all. Then it needs to select SA based on IP header, policy, and perhaps system defaults. All that requires access to the mbuf data. After the SA is selected, transformations are applied, which call into OCF. --=20 You are receiving this mail because: You are the assignee for the bug.=