From nobody Thu Oct 5 15:36:45 2023 X-Original-To: freebsd-current@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4S1bJl4y6cz4vntg for ; Thu, 5 Oct 2023 15:36:55 +0000 (UTC) (envelope-from sgk@troutmask.apl.washington.edu) Received: from troutmask.apl.washington.edu (troutmask.apl.washington.edu [128.95.76.21]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4S1bJk0wvGz3DnJ for ; Thu, 5 Oct 2023 15:36:53 +0000 (UTC) (envelope-from sgk@troutmask.apl.washington.edu) Authentication-Results: mx1.freebsd.org; dkim=none; spf=none (mx1.freebsd.org: domain of sgk@troutmask.apl.washington.edu has no SPF policy when checking 128.95.76.21) smtp.mailfrom=sgk@troutmask.apl.washington.edu; dmarc=fail reason="No valid SPF, No valid DKIM" header.from=washington.edu (policy=none) Received: from troutmask.apl.washington.edu (localhost [127.0.0.1]) by troutmask.apl.washington.edu (8.17.1/8.17.1) with ESMTP id 395Faj3H097612 for ; Thu, 5 Oct 2023 08:36:45 -0700 (PDT) (envelope-from sgk@troutmask.apl.washington.edu) Received: (from sgk@localhost) by troutmask.apl.washington.edu (8.17.1/8.17.1/Submit) id 395Fajgf097611 for freebsd-current@freebsd.org; Thu, 5 Oct 2023 08:36:45 -0700 (PDT) (envelope-from sgk) Date: Thu, 5 Oct 2023 08:36:45 -0700 From: Steve Kargl To: freebsd-current@freebsd.org Subject: panic in cypto code Message-ID: Reply-To: sgk@troutmask.apl.washington.edu List-Id: Discussions about the use of FreeBSD-current List-Archive: https://lists.freebsd.org/archives/freebsd-current List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-current@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit X-Spamd-Bar: -- X-Spamd-Result: default: False [-2.92 / 15.00]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; NEURAL_HAM_LONG(-1.00)[-1.000]; NEURAL_HAM_SHORT(-0.92)[-0.921]; DMARC_POLICY_SOFTFAIL(0.10)[washington.edu : No valid SPF, No valid DKIM,none]; MIME_GOOD(-0.10)[text/plain]; R_SPF_NA(0.00)[no SPF record]; MLMMJ_DEST(0.00)[freebsd-current@freebsd.org]; ASN(0.00)[asn:73, ipnet:128.95.0.0/16, country:US]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; RCVD_COUNT_TWO(0.00)[2]; MIME_TRACE(0.00)[0:+]; TO_DN_NONE(0.00)[]; RCPT_COUNT_ONE(0.00)[1]; MID_RHS_MATCH_FROM(0.00)[]; ARC_NA(0.00)[]; RCVD_TLS_LAST(0.00)[]; FROM_HAS_DN(0.00)[]; REPLYTO_ADDR_EQ_FROM(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; HAS_REPLYTO(0.00)[sgk@troutmask.apl.washington.edu] X-Rspamd-Queue-Id: 4S1bJk0wvGz3DnJ In case anyone else is using openvpn. % pkg info openvpn openvpn-2.6.6 Name : openvpn Version : 2.6.6 Installed on : Tue Sep 19 08:48:55 2023 PDT Origin : security/openvpn Architecture : FreeBSD:15:amd64 % uname -a FreeBSD hotrats 15.0-CURRENT #1 main-n265325-9c30461dd25b: Thu Sep 14 08:09:18 PDT 2023 kargl@hotrats:$PATH/HOTRATS amd64 Fatal double fault rip 0xffffffff8099b408 rsp 0xfffffe000e1cc000 rbp 0xfffffe000e1cc010 rax 0x53749f62934c5349 rdx 0x53749f62934c5349 rbx 0xfffffe000e1cc200 rcx 0x57bf32fec3cbde70 rsi 0x32e8db2f0591c5da rdi 0x832f0fb1e6d07eb0 r8 0 r9 0 r10 0 r11 0x60 r12 0x5af7589946bd13d9 r13 0xbeddd6a808e1dd54 r14 0xcdf12bbf2708189c r15 0xeb262ae8536a7adf rflags 0x10246 cs 0x20 ss 0x28 ds 0x3b es 0x3b fs 0x13 gs 0x1b fsbase 0x1c02e381d120 gsbase 0xffffffff81a10000 kgsbase 0 cpuid = 0; apic id = 00 panic: double fault cpuid = 0 time = 1696512769 KDB: stack backtrace: db_trace_self_wrapper() at db_trace_self_wrapper+0x2b/frame 0xffffffff812b3060 vpanic() at vpanic+0x132/frame 0xffffffff812b3190 panic() at panic+0x43/frame 0xffffffff812b31f0 dblfault_handler() at dblfault_handler+0x1ce/frame 0xffffffff812b32b0 Xdblfault() at Xdblfault+0xd7/frame 0xffffffff812b32b0 --- trap 0x17, rip = 0xffffffff8099b408, rsp = 0xfffffe000e1cc000, rbp = 0xfffffe000e1cc010 --- gfmultword4() at gfmultword4+0x8/frame 0xfffffe000e1cc010 gf128_mul4b() at gf128_mul4b+0x63/frame 0xfffffe000e1cc050 AES_GMAC_Update() at AES_GMAC_Update+0x73/frame 0xfffffe000e1cc0b0 swcr_gcm() at swcr_gcm+0x660/frame 0xfffffe000e1cc830 swcr_process() at swcr_process+0x1a/frame 0xfffffe000e1cc850 crypto_dispatch() at crypto_dispatch+0x42/frame 0xfffffe000e1cc870 ovpn_transmit_to_peer() at ovpn_transmit_to_peer+0x54e/frame 0xfffffe000e1cc8d0 ovpn_output() at ovpn_output+0x2a2/frame 0xfffffe000e1cc950 ip_output() at ip_output+0x11f6/frame 0xfffffe000e1cca40 ovpn_encap() at ovpn_encap+0x3e7/frame 0xfffffe000e1ccac0 #13 0xffffffff80ae08ce in dblfault_handler (frame=) at /usr/src/sys/amd64/amd64/trap.c:1012 #14 #15 0xffffffff8099b408 in gfmultword4 (worda=3668422891496654298, wordb=9452791399630012080, wordc=6013606648173318985, wordd=6322828471639465584, x=..., tbl=0xfffffe000e1cc200) at /usr/src/sys/opencrypto/gfmult.c:174 #16 0xffffffff8099b5d3 in gf128_mul4b (r=..., v=v@entry=0xfffff800076b9a64 "\3156}\373\312w\254iBnD\001ܹ˾\353&*\350Sjz߃/\017\261\346\320~\260Z\367X\231F\275\023\331St\237b\223LSI\276\335֨\b\341\335TW\2772\376\303\313\336pN\265\023\352\2054\002\a/˦9R\321\366p\f\352\204P\360\270\371\250\\\aE?7s\377\253\217b\262%\214\317m", tbl=tbl@entry=0xfffffe000e1cc200) at /usr/src/sys/opencrypto/gfmult.c:268 #17 0xffffffff8099ab13 in AES_GMAC_Update (ctx=0xfffffe000e1cc200, vdata=, len=144) at /usr/src/sys/opencrypto/gmac.c:94 #18 0xffffffff80998ae0 in swcr_gcm (ses=0xfffff8020376a048, crp=0xfffff80023386c08) at /usr/src/sys/opencrypto/cryptosoft.c:505 #19 0xffffffff80997c4a in swcr_process (dev=, crp=0xfffff80023386c08, hint=) at /usr/src/sys/opencrypto/cryptosoft.c:1680 -- Steve