From owner-freebsd-ports-bugs@freebsd.org Tue Feb 12 22:18:11 2019 Return-Path: Delivered-To: freebsd-ports-bugs@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id EBAE314D4572 for ; Tue, 12 Feb 2019 22:18:10 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id 5072885A61 for ; Tue, 12 Feb 2019 22:18:10 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.ysv.freebsd.org (Postfix) id 1142B14D456D; Tue, 12 Feb 2019 22:18:10 +0000 (UTC) Delivered-To: ports-bugs@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id C847614D4569 for ; Tue, 12 Feb 2019 22:18:09 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.ysv.freebsd.org (mxrelay.ysv.freebsd.org [IPv6:2001:1900:2254:206a::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.ysv.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 5C92585A59 for ; Tue, 12 Feb 2019 22:18:09 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.ysv.freebsd.org (Postfix) with ESMTPS id 8F6E29128 for ; Tue, 12 Feb 2019 22:18:08 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id x1CMI8uW028479 for ; Tue, 12 Feb 2019 22:18:08 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id x1CMI8CE028478 for ports-bugs@FreeBSD.org; Tue, 12 Feb 2019 22:18:08 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: ports-bugs@FreeBSD.org Subject: [Bug 235684] security/ipsec-tools kernel panic Date: Tue, 12 Feb 2019 22:18:07 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Ports & Packages X-Bugzilla-Component: Individual Port(s) X-Bugzilla-Version: Latest X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: admin@5034.ru X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: ports-bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-ports-bugs@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Ports bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 12 Feb 2019 22:18:11 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D235684 --- Comment #10 from Sergey Anokhin --- (In reply to Jan Bramkamp from comment #6) Will it ok? (pts/1)[root@server:~]# sysctl kern.maxssiz=3D1073741824 kern.maxssiz: 536870912 -> 1073741824 (pts/1)[root@server:~]# /usr/local/etc/rc.d/racoon onestart Starting racoon. (pts/1)[root@server:~]# /usr/local/etc/rc.d/racoon onestop Stopping racoon. Waiting for PIDS: 5662 kernel panic btw, I've noticed that kernel panic during stopping racoon. # kgdb kernel /var/crash/vmcore.last GNU gdb (GDB) 8.2.1 [GDB v8.2.1 for FreeBSD] Copyright (C) 2018 Free Software Foundation, Inc. License GPLv3+: GNU GPL version 3 or later This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. Type "show copying" and "show warranty" for details. This GDB was configured as "x86_64-portbld-freebsd12.0". Type "show configuration" for configuration details. For bug reporting instructions, please see: . Find the GDB manual and other documentation resources online at: . For help, type "help". Type "apropos word" to search for commands related to "word"... Reading symbols from kernel...Reading symbols from /usr/obj/usr/src/amd64.amd64/sys/SERVER/kernel.debug...done. done. Unread portion of the kernel message buffer: Fatal trap 12: page fault while in kernel mode cpuid =3D 2; apic id =3D 02 fault virtual address =3D 0x28 fault code =3D supervisor read data, page not present instruction pointer =3D 0x20:0xffffffff80ecd31d stack pointer =3D 0x28:0xfffffe003fca7a40 frame pointer =3D 0x28:0xfffffe003fca7a60 code segment =3D base 0x0, limit 0xfffff, type 0x1b =3D DPL 0, pres 1, long 1, def32 0, gran 1 processor eflags =3D interrupt enabled, resume, IOPL =3D 0 current process =3D 0 (softirq_2) trap number =3D 12 panic: page fault cpuid =3D 2 time =3D 1550009599 KDB: stack backtrace: #0 0xffffffff80c531c7 at kdb_backtrace+0x67 #1 0xffffffff80c07143 at vpanic+0x1a3 #2 0xffffffff80c06f93 at panic+0x43 #3 0xffffffff8118d9ff at trap_fatal+0x35f #4 0xffffffff8118da59 at trap_pfault+0x49 #5 0xffffffff8118d07e at trap+0x29e #6 0xffffffff81168ac5 at calltrap+0x8 #7 0xffffffff80eca240 at ipsec_delete_pcbpolicy+0x20 #8 0xffffffff80dbaeec at in_pcbfree_deferred+0x6c #9 0xffffffff80c4db1a at epoch_call_task+0x1ca #10 0xffffffff80c51a54 at gtaskqueue_run_locked+0x144 #11 0xffffffff80c516b8 at gtaskqueue_thread_loop+0x98 #12 0xffffffff80bc6f23 at fork_exit+0x83 #13 0xffffffff81169abe at fork_trampoline+0xe Uptime: 8m33s Dumping 950 out of 8077 MB:..2%..11%..21%..31%..41%..51%..61%..71%..81%..91% __curthread () at ./machine/pcpu.h:230 230 __asm("movq %%gs:%P1,%0" : "=3Dr" (td) : "n" (OFFSETOF_CURTHREAD)); (kgdb) bt #0 __curthread () at ./machine/pcpu.h:230 #1 doadump (textdump=3D) at /usr/src/sys/kern/kern_shutdown= .c:366 #2 0xffffffff80c06d2b in kern_reboot (howto=3D260) at /usr/src/sys/kern/kern_shutdown.c:446 #3 0xffffffff80c071a3 in vpanic (fmt=3D, ap=3D0xfffffe003fc= a7790) at /usr/src/sys/kern/kern_shutdown.c:872 #4 0xffffffff80c06f93 in panic (fmt=3D) at /usr/src/sys/kern/kern_shutdown.c:799 #5 0xffffffff8118d9ff in trap_fatal (frame=3D0xfffffe003fca7980, eva=3D40)= at /usr/src/sys/amd64/amd64/trap.c:929 #6 0xffffffff8118da59 in trap_pfault (frame=3D0xfffffe003fca7980, usermode= =3D0) at /usr/src/sys/amd64/amd64/trap.c:765 #7 0xffffffff8118d07e in trap (frame=3D0xfffffe003fca7980) at /usr/src/sys/amd64/amd64/trap.c:441 #8 #9 0xffffffff80ecd31d in key_freesp (spp=3D0xfffff80211241880) at /usr/src/sys/netipsec/key.c:1199 #10 0xffffffff80eca240 in ipsec_delete_pcbpolicy (inp=3D0xfffff800151aa1e8)= at /usr/src/sys/netipsec/ipsec_pcb.c:176 #11 0xffffffff80dbaeec in in_pcbfree_deferred (ctx=3D0xfffff800151aa3c0) at /usr/src/sys/netinet/in_pcb.c:1576 #12 0xffffffff80c4db1a in epoch_call_task (arg=3D) at /usr/src/sys/kern/subr_epoch.c:507 #13 0xffffffff80c51a54 in gtaskqueue_run_locked (queue=3D0xfffff80003363c00= ) at /usr/src/sys/kern/subr_gtaskqueue.c:376 #14 0xffffffff80c516b8 in gtaskqueue_thread_loop (arg=3D) at /usr/src/sys/kern/subr_gtaskqueue.c:557 #15 0xffffffff80bc6f23 in fork_exit (callout=3D0xffffffff80c51620 , arg=3D0xfffffe00025f5038, frame=3D0xfffffe003fca7= c00) at /usr/src/sys/kern/kern_fork.c:1059 #16 (kgdb) frame 9 #9 0xffffffff80ecd31d in key_freesp (spp=3D0xfffff80211241880) at /usr/src/sys/netipsec/key.c:1199 1199 KEYDBG(IPSEC_STAMP, (kgdb) --=20 You are receiving this mail because: You are the assignee for the bug.=