Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 02 Feb 2024 15:17:04 +0000
From:      bugzilla-noreply@freebsd.org
To:        transport@FreeBSD.org
Subject:   [Bug 276761] panic: sbsndptr_noadv: sb_mb is NULL
Message-ID:  <bug-276761-38102-w7fC2E02iL@https.bugs.freebsd.org/bugzilla/>
In-Reply-To: <bug-276761-38102@https.bugs.freebsd.org/bugzilla/>
References:  <bug-276761-38102@https.bugs.freebsd.org/bugzilla/>

next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D276761

--- Comment #6 from Daniel <ddaniel@nvidia.com> ---
Hi=20

I was able to reproduce the bug by running the following test in a loop ~20
times


test flow (ran it ~20 times till reproduced):

  run in loop 8 esp\IKE alg (twice):
      1. set IPsec configuration
      2. start ipsec - ipsec start
      3. send IPerf stress traffic ~10 sec
         iperf params: -P 100 -t 20 --format g -p 17123

      4. stop iperf traffic
         stop iperf traffic after ~10 sec -  killall iperf

      5. stop ipsec  - ipsec stop
      6. change IKE and esp alg
      7. return to stage 1.

IKE and ESP algorithms I am running in a loop
  1. aes256-sha2_256-modp1024!
  2. aes256-sha256-modp4096
  3. aes256gcm16-prfsha384-ecp384
  4. aes256gcm16-sha256-modp1024
  5. aes128-sha2_256-modp1024!
  6. aes128gcm16-prfsha256-ecp256
  7. aes128-sha256-ecp256
  8. aes128gcm16-sha256-modp1024


IPSEC version
FreeBSD strongSwan U5.9.10/K15.0-CURRENT

iperf version: 2.1.9

--=20
You are receiving this mail because:
You are the assignee for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-276761-38102-w7fC2E02iL>