From owner-freebsd-bugs Thu Mar 29 10:20: 7 2001 Delivered-To: freebsd-bugs@hub.freebsd.org Received: from freefall.freebsd.org (freefall.freebsd.org [216.136.204.21]) by hub.freebsd.org (Postfix) with ESMTP id 7365037B71B for ; Thu, 29 Mar 2001 10:20:02 -0800 (PST) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.11.1/8.11.1) id f2TIK2Q71786; Thu, 29 Mar 2001 10:20:02 -0800 (PST) (envelope-from gnats) Date: Thu, 29 Mar 2001 10:20:02 -0800 (PST) Message-Id: <200103291820.f2TIK2Q71786@freefall.freebsd.org> To: freebsd-bugs@FreeBSD.org Cc: From: Gunther Schadow Subject: Re: kern/26176: Kernel panic when using IPsec on high loads Reply-To: Gunther Schadow Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org The following reply was made to PR kern/26176; it has been noted by GNATS. From: Gunther Schadow To: freebsd-gnats-submit@FreeBSD.org Cc: Subject: Re: kern/26176: Kernel panic when using IPsec on high loads Date: Thu, 29 Mar 2001 18:14:05 +0000 Here is more information: Fatal trap 12: page fault while in kernel mode fault virtual address = 0xb2c04400 fault code = supervisor read, page not present instruction pointer = 0x8:0xc0199fa0 stack pointer = 0x10:0xc020c218 frame pointer = 0x10:0xc020c268 code segment = base 0x0, limit 0xfffff, type 0x1b = DPL 0, pres 1, def32 1, gran 1 processor eflags = interrupt enabled, resume, IOPL = 0 current process = Idle interrupt mask = net tty kernel: type 12 trap, code=0 Stopped at esp_hdrsiz+0x498: movl 0(%edx),%eax So, the problem seems to be in the IPsec code, sys/netinet6/esp_output.c called from sys/netinet6/ipsec.c. Here is the stack trace: esp_hdrsiz(c0b48500,c0b485f5,c0b3f400,c0ceb800,2) at esp_hdrsiz+0x498 esp4_output(c0b48500,c0ceb800,c0ceba00,0,1) at esp4_output+0x48 ipsec4_output(c020c418,c0ceba00,1,c0ceef00,c0b5af00) at ipsec4_output+0x2e3 ip_output(c0b1be00,0,c0229a50,1,0) at ip_output+0x762 ip_stripoptions(c0b1be00,0,c0b1be00,0,ffffffff) at ip_stripoptions+0x211 ip_input(c0b1be00) at ip_input+0x462 ip_input(c01d374f,0,d0f0010,10,c7a50010) at ip_input+0x7b7 doreti_popl_fs_fault() at doreti_popl_fs_fault+0x91 I am assuming if I upgrade to some more current version of the IPsec code the problem might have been fixed. But am not sure... I will report more later. thanks -- Gunther Schadow, M.D., Ph.D. gschadow@regenstrief.org Medical Information Scientist Regenstrief Institute for Health Care Adjunct Assistent Professor Indiana University School of Medicine tel:1(317)630-7960 http://aurora.regenstrief.org To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message