Subject: kern/5661: ipf rules cause panic
To: None <gnats-bugs@gnats.netbsd.org>
From: Martin J. Laubach <mjl@emsi.priv.at>
List: netbsd-bugs
Date: 06/26/1998 19:33:52
>Number: 5661
>Category: kern
>Synopsis: Some more elaborate ipf filter rules can crash the system
>Confidential: no
>Severity: serious
>Priority: medium
>Responsible: kern-bug-people (Kernel Bug People)
>State: open
>Class: sw-bug
>Submitter-Id: net
>Arrival-Date: Fri Jun 26 10:35:01 1998
>Last-Modified:
>Originator: Martin J. Laubach
>Organization:
>Release: 1.3.2
>Environment:
System: NetBSD asparagus 1.3.2 NetBSD 1.3.2 (ASPARAGUS) #1: Mon Jun 15 20:08:31 CEST 1998 mjl@asparagus:/home/temp/kernel/sys/arch/i386/compile/ASPARAGUS i386
>Description:
In trying to route packets on source address, I tried the
following ipf rule
pass out log quick on ne0 to tun3:195.26.201.28 from 195.26.201.18 to any
and the reception of a matching packet will cause an instant kernel panic
(vm fault, fatal page fault).
>How-To-Repeat:
Simplified version, suppose you have two interfaces ne0 and ep0,
with the default route going out of ne0, then the following will reproduce
the problem:
ipf -f - <<EOF
pass out on ne0 to ep0 from any to 192.99.99.99
EOF
ping 192.99.99.99
>Fix:
>Audit-Trail:
>Unformatted: