From owner-freebsd-bugs@freebsd.org Sun Jul 31 21:04:08 2016 Return-Path: Delivered-To: freebsd-bugs@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id C1993BA8E08 for ; Sun, 31 Jul 2016 21:04:08 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id A69EC1F69 for ; Sun, 31 Jul 2016 21:04:08 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id u6VL48Go088960 for ; Sun, 31 Jul 2016 21:04:08 GMT (envelope-from bugzilla-noreply@freebsd.org) From: bugzilla-noreply@freebsd.org To: freebsd-bugs@FreeBSD.org Subject: [Bug 211486] [panic] [IPSec] [IP6] Crash with IPv6 ESP usage Date: Sun, 31 Jul 2016 21:04:08 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 11.0-STABLE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Many People X-Bugzilla-Who: bugzilla.freebsd@omnilan.de X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: freebsd-bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status bug_severity priority component assigned_to reporter Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-bugs@freebsd.org X-Mailman-Version: 2.1.22 Precedence: list List-Id: Bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 31 Jul 2016 21:04:08 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D211486 Bug ID: 211486 Summary: [panic] [IPSec] [IP6] Crash with IPv6 ESP usage Product: Base System Version: 11.0-STABLE Hardware: Any OS: Any Status: New Severity: Affects Many People Priority: --- Component: kern Assignee: freebsd-bugs@FreeBSD.org Reporter: bugzilla.freebsd@omnilan.de Unread portion of the kernel message buffer: Kernel page fault with the following non-sleepable locks held: exclusive rw tcpinp (tcpinp) r =3D 0 (0xfffff80007b1fe18) locked @ /usr/local/share/deploy-tools/RELENG_11/src/sys/netinet6/in6_pcb.c:1172 shared rw tcp (tcp) r =3D 0 (0xffffffff82ad2bd8) locked @ /usr/local/share/deploy-tools/RELENG_11/src/sys/netinet/tcp_input.c:802 stack backtrace: #0 0xffffffff80ab4d30 at witness_debugger+0x70 #1 0xffffffff80ab6017 at witness_warn+0x3d7 #2 0xffffffff80ec63d7 at trap_pfault+0x57 #3 0xffffffff80ec5a64 at trap+0x284 #4 0xffffffff80ea6161 at calltrap+0x8 #5 0xffffffff80c43c51 at tcp_twrespond+0x231 #6 0xffffffff80c436f5 at tcp_twstart+0x1f5 #7 0xffffffff80c34078 at tcp_do_segment+0x23c8 #8 0xffffffff80c310b4 at tcp_input+0xe44 #9 0xffffffff80c30221 at tcp6_input+0xf1 #10 0xffffffff80c82799 at ipsec6_common_input_cb+0x4c9 #11 0xffffffff80c97101 at esp_input_cb+0x671 #12 0xffffffff80ca9e69 at swcr_process+0xd69 #13 0xffffffff80ca6c2f at crypto_dispatch+0x7f #14 0xffffffff80c9605a at esp_input+0x4fa #15 0xffffffff80c8179b at ipsec_common_input+0x40b #16 0xffffffff80c8222d at ipsec6_common_input+0xcd #17 0xffffffff80c64070 at ip6_input+0xc70 Fatal trap 12: page fault while in kernel mode cpuid =3D 2; apic id =3D 02 fault virtual address =3D 0x1a fault code =3D supervisor read data, page not present instruction pointer =3D 0x20:0xffffffff80c65afc stack pointer =3D 0x28:0xfffffe0091f1e5f0 frame pointer =3D 0x28:0xfffffe0091f1e850 code segment =3D base 0x0, limit 0xfffff, type 0x1b =3D DPL 0, pres 1, long 1, def32 0, gran 1 processor eflags =3D interrupt enabled, resume, IOPL =3D 0 current process =3D 0 (em0 que) I have static keys and policy (via ipsec.conf) which is in use for several years. Updated stable/10 to stable/11 whci crashes the machine as soon as there's traffic mathcing the IPSec policy. core dump available, just tell me how I can help =E2=80=93 not able to diag= nose furthere :-( -Harry --=20 You are receiving this mail because: You are the assignee for the bug.=