From owner-freebsd-ports-bugs@freebsd.org Tue Feb 12 09:03:32 2019 Return-Path: Delivered-To: freebsd-ports-bugs@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 95FD614DDCCF for ; Tue, 12 Feb 2019 09:03:32 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id 2AAB3817A0 for ; Tue, 12 Feb 2019 09:03:32 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.ysv.freebsd.org (Postfix) id E22F214DDCCE; Tue, 12 Feb 2019 09:03:31 +0000 (UTC) Delivered-To: ports-bugs@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id A53DF14DDCCD for ; Tue, 12 Feb 2019 09:03:31 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.ysv.freebsd.org (mxrelay.ysv.freebsd.org [IPv6:2001:1900:2254:206a::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.ysv.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 379BE8179F for ; Tue, 12 Feb 2019 09:03:31 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.ysv.freebsd.org (Postfix) with ESMTPS id 650EB1B6F for ; Tue, 12 Feb 2019 09:03:30 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id x1C93Ua9051472 for ; Tue, 12 Feb 2019 09:03:30 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id x1C93UHP051462 for ports-bugs@FreeBSD.org; Tue, 12 Feb 2019 09:03:30 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: ports-bugs@FreeBSD.org Subject: [Bug 235684] security/ipsec-tools kernel panic Date: Tue, 12 Feb 2019 09:03:30 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Ports & Packages X-Bugzilla-Component: Individual Port(s) X-Bugzilla-Version: Latest X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: admin@5034.ru X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: ports-bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status bug_severity priority component assigned_to reporter Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-ports-bugs@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Ports bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 12 Feb 2019 09:03:32 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D235684 Bug ID: 235684 Summary: security/ipsec-tools kernel panic Product: Ports & Packages Version: Latest Hardware: amd64 OS: Any Status: New Severity: Affects Only Me Priority: --- Component: Individual Port(s) Assignee: ports-bugs@FreeBSD.org Reporter: admin@5034.ru Hi All, I see kernel panic during racoon restart. # uname -rv 12.0-STABLE FreeBSD 12.0-STABLE r343904 SERVER # pkg info | grep ipsec-tools ipsec-tools-0.8.2_7 KAME racoon IKE daemon, ipsec-tools version Port config options: [ ] ADMINPORT Enable Admin port=20 [x] DEBUG Build with debugging support=20 [x] DOCS Build and/or install documentation=20 [x] DPD Dead Peer Detection=20 [ ] EXAMPLES Build and/or install examples=20 [x] FRAG IKE fragmentation payload support=20 [ ] GSSAPI GSSAPI Security API support=20 [x] HYBRID Hybrid, Xauth and Mode-cfg support=20 [x] IDEA IDEA encryption (patented)=20 [x] IPV6 IPv6 protocol support=20 [ ] LDAP LDAP authentication (Xauth server)=20 [x] NATT NAT-Traversal (kernel-patch required before 11.1)=20 [ ] NATTF require NAT-Traversal (fail without kernel-patch)=20 [ ] PAM PAM authentication (Xauth server)=20 [ ] RADIUS Radius authentication (Xauth server)=20 [x] RC5 RC5 encryption (patented)=20 [x] SAUNSPEC Unspecified SA mode=20 [x] STATS Statistics logging function=20 [x] WCPSKEY Allow wildcard matching for pre-shared keys=20 (pts/2)[root@server:/usr/obj/usr/src/amd64.amd64/sys/SERVER]# kgdb kernel /var/crash/vmcore.0 GNU gdb (GDB) 8.2.1 [GDB v8.2.1 for FreeBSD] Copyright (C) 2018 Free Software Foundation, Inc. License GPLv3+: GNU GPL version 3 or later This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. Type "show copying" and "show warranty" for details. This GDB was configured as "x86_64-portbld-freebsd12.0". Type "show configuration" for configuration details. For bug reporting instructions, please see: . Find the GDB manual and other documentation resources online at: . For help, type "help". Type "apropos word" to search for commands related to "word"... Reading symbols from kernel...Reading symbols from /usr/obj/usr/src/amd64.amd64/sys/SERVER/kernel.debug...done. done. Unread portion of the kernel message buffer: Fatal trap 12: page fault while in kernel mode cpuid =3D 2; apic id =3D 02 fault virtual address =3D 0x28 fault code =3D supervisor read data, page not present instruction pointer =3D 0x20:0xffffffff80ecd31d stack pointer =3D 0x28:0xfffffe003fca7a40 frame pointer =3D 0x28:0xfffffe003fca7a60 code segment =3D base 0x0, limit 0xfffff, type 0x1b =3D DPL 0, pres 1, long 1, def32 0, gran 1 processor eflags =3D interrupt enabled, resume, IOPL =3D 0 current process =3D 0 (softirq_2) trap number =3D 12 panic: page fault cpuid =3D 2 time =3D 1549912176 KDB: stack backtrace: #0 0xffffffff80c531c7 at kdb_backtrace+0x67 #1 0xffffffff80c07143 at vpanic+0x1a3 #2 0xffffffff80c06f93 at panic+0x43 #3 0xffffffff8118d9ff at trap_fatal+0x35f #4 0xffffffff8118da59 at trap_pfault+0x49 #5 0xffffffff8118d07e at trap+0x29e #6 0xffffffff81168ac5 at calltrap+0x8 #7 0xffffffff80eca240 at ipsec_delete_pcbpolicy+0x20 #8 0xffffffff80dbaeec at in_pcbfree_deferred+0x6c #9 0xffffffff80c4db1a at epoch_call_task+0x1ca #10 0xffffffff80c51a54 at gtaskqueue_run_locked+0x144 #11 0xffffffff80c516b8 at gtaskqueue_thread_loop+0x98 #12 0xffffffff80bc6f23 at fork_exit+0x83 #13 0xffffffff81169abe at fork_trampoline+0xe Uptime: 1h17m12s Dumping 1147 out of 8077 MB:..2%..12%..21%..31%..41%..51%..62%..72%..81%..9= 1% __curthread () at ./machine/pcpu.h:230 230 __asm("movq %%gs:%P1,%0" : "=3Dr" (td) : "n" (OFFSETOF_CURTHREAD)); (kgdb) bt #0 __curthread () at ./machine/pcpu.h:230 #1 doadump (textdump=3D) at /usr/src/sys/kern/kern_shutdown= .c:366 #2 0xffffffff80c06d2b in kern_reboot (howto=3D260) at /usr/src/sys/kern/kern_shutdown.c:446 #3 0xffffffff80c071a3 in vpanic (fmt=3D, ap=3D0xfffffe003fc= a7790) at /usr/src/sys/kern/kern_shutdown.c:872 #4 0xffffffff80c06f93 in panic (fmt=3D) at /usr/src/sys/kern/kern_shutdown.c:799 #5 0xffffffff8118d9ff in trap_fatal (frame=3D0xfffffe003fca7980, eva=3D40)= at /usr/src/sys/amd64/amd64/trap.c:929 #6 0xffffffff8118da59 in trap_pfault (frame=3D0xfffffe003fca7980, usermode= =3D0) at /usr/src/sys/amd64/amd64/trap.c:765 #7 0xffffffff8118d07e in trap (frame=3D0xfffffe003fca7980) at /usr/src/sys/amd64/amd64/trap.c:441 #8 #9 0xffffffff80ecd31d in key_freesp (spp=3D0xfffff80267101100) at /usr/src/sys/netipsec/key.c:1199 #10 0xffffffff80eca240 in ipsec_delete_pcbpolicy (inp=3D0xfffff80017ff63d0)= at /usr/src/sys/netipsec/ipsec_pcb.c:176 #11 0xffffffff80dbaeec in in_pcbfree_deferred (ctx=3D0xfffff80017ff65a8) at /usr/src/sys/netinet/in_pcb.c:1576 #12 0xffffffff80c4db1a in epoch_call_task (arg=3D) at /usr/src/sys/kern/subr_epoch.c:507 #13 0xffffffff80c51a54 in gtaskqueue_run_locked (queue=3D0xfffff80003363c00= ) at /usr/src/sys/kern/subr_gtaskqueue.c:376 #14 0xffffffff80c516b8 in gtaskqueue_thread_loop (arg=3D) at /usr/src/sys/kern/subr_gtaskqueue.c:557 #15 0xffffffff80bc6f23 in fork_exit (callout=3D0xffffffff80c51620 , arg=3D0xfffffe00025f5038, frame=3D0xfffffe003fca7= c00) at /usr/src/sys/kern/kern_fork.c:1059 #16 (kgdb) frame 9 #9 0xffffffff80ecd31d in key_freesp (spp=3D0xfffff80267101100) at /usr/src/sys/netipsec/key.c:1199 1199 KEYDBG(IPSEC_STAMP, (kgdb) --=20 You are receiving this mail because: You are the assignee for the bug.=