From nobody Sun May 14 12:34:15 2023 X-Original-To: bugs@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4QK24R1zRGz4BfbD for ; Sun, 14 May 2023 12:34:15 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4QK24Q70r6z42sV for ; Sun, 14 May 2023 12:34:14 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1684067655; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=H6gDpKVAhS0qxuRtbBdoUgJM/O7R1lVJ/j/lYyfCAEQ=; b=szISVBqSCvEwlsAUcKXfM0YdpIJEofb1reYrhz6WeD9kYqBMA39W0wMKpCU1CzryQpnwh/ Fm6cUjXFnRtR4Ujpb2lFlnqxJVG9VkzJjdMymMAYwE42ZKs5KR7FkxL0kOD0wzODkCChWP M+zIjttu2HRL5FFxN2kWKxTIRTuxW21R6sY0aB/D537D8StJU3CwxkAUJLAnhJHXXB/uKp 3y0UNBCfkOs64lZU/GPr//QomZLrpKD+7UkpiHJS6HcGZd6dUhCdRunfXxgzKe0ye/tF4N yPHkiClY+g1EhE6/BM8fbMDGnXT7oWCC4QdqU+vYYrnw6z1NDvzuyad+15Z5+A== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1684067655; a=rsa-sha256; cv=none; b=np5uRit4m+h5PVzVz63EDKKzPeOL+ul3XjW1OaiQX9ecUis8fKQMEYSsh7hdNF8osQjKn5 uK0zB6xqlr6OtIp3/pUDW5uNfL+NRaWVuuCFWKfs10KlurwfHcTnzGTN4GMGM1jDJi3UwQ p7toxscKhuonvFm+lBHpX1KBdFIfDgcj7HqRKMSTLbNTJdT3DyF303JvYGikH641t2T0V7 DKBLOqucF1yduu9E1hDxe0d4BgLaZACGOuEP1w5Saq45sYn7tQaLBHGZXbUR92vOyRosV9 o6yjIyjYaR5JzqdKM52yZat2XtgqJTZirxTDKkq6rLXY5gd1c+WtNB8Bew2SQA== Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4QK24Q65jsz101x for ; Sun, 14 May 2023 12:34:14 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 34ECYEJ7048354 for ; Sun, 14 May 2023 12:34:14 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 34ECYEuB048353 for bugs@FreeBSD.org; Sun, 14 May 2023 12:34:14 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 271409] kernel panic triggered by iscsi via IPSec Date: Sun, 14 May 2023 12:34:15 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 13.2-RELEASE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: noah.bergbauer@tum.de X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status bug_severity priority component assigned_to reporter Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Bug reports List-Archive: https://lists.freebsd.org/archives/freebsd-bugs List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-bugs@freebsd.org MIME-Version: 1.0 X-ThisMailContainsUnwantedMimeParts: N https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D271409 Bug ID: 271409 Summary: kernel panic triggered by iscsi via IPSec Product: Base System Version: 13.2-RELEASE Hardware: Any OS: Any Status: New Severity: Affects Only Me Priority: --- Component: kern Assignee: bugs@FreeBSD.org Reporter: noah.bergbauer@tum.de When upgrading from 13.1 to 13.2, I'm running into the panic below. The panic is triggered by running "fsck_ffs -p" on a filesystem via iSCSI w= here the iSCSI is protedted using IPSec (strongswan ESP:AES_GCM_16-128). Fatal trap 12: page fault while in kernel mode cpuid =3D 7; apic id =3D 07 fault virtual address =3D 0x0 fault code =3D supervisor read data, page not present instruction pointer =3D 0x20:0xffffffff810adf16 stack pointer =3D 0x28:0xfffffe0568cba730 frame pointer =3D 0x28:0xfffffe0568cba730 code segment =3D base 0x0, limit 0xfffff, type 0x1b =3D DPL 0, pres 1, long 1, def32 0, gran 1 processor eflags =3D interrupt enabled, resume, IOPL =3D 0 current process =3D 0 (iscsitx) trap number =3D 12 panic: page fault cpuid =3D 7 time =3D 1684066170 KDB: stack backtrace: #0 0xffffffff80c53dc5 at kdb_backtrace+0x65 #1 0xffffffff80c06741 at vpanic+0x151 #2 0xffffffff80c065e3 at panic+0x43 #3 0xffffffff810b1fa7 at trap_fatal+0x387 #4 0xffffffff810b1fff at trap_pfault+0x4f #5 0xffffffff81088e78 at calltrap+0x8 #6 0xffffffff80c9cb87 at m_unshare+0x297 #7 0xffffffff8288e4b3 at esp_output+0x183 #8 0xffffffff8288af13 at ipsec4_perform_request+0x3b3 #9 0xffffffff8288b063 at ipsec4_common_output+0x83 #10 0xffffffff80e3970c at ipsec_kmod_output+0x2c #11 0xffffffff80dbcf84 at ip_output+0xb64 #12 0xffffffff80dd43af at tcp_output+0x1dbf #13 0xffffffff80de638d at tcp_usr_send+0x17d #14 0xffffffff80ca7807 at sosend_generic+0x617 #15 0xffffffff80ca7d20 at sosend+0x50 #16 0xffffffff828a0899 at icl_send_thread+0x499 #17 0xffffffff80bc2fce at fork_exit+0x7e Uptime: 7m7s Dumping 5022 out of 130720 MB:..1%..11%..21%..31%..41%..51%..61%..71%..81%.= .91% __curthread () at /usr/src/sys/amd64/include/pcpu_aux.h:55 55 __asm("movq %%gs:%P1,%0" : "=3Dr" (td) : "n" (offsetof(stru= ct pcpu, (kgdb) bt #0 __curthread () at /usr/src/sys/amd64/include/pcpu_aux.h:55 #1 doadump (textdump=3D) at /usr/src/sys/kern/kern_shutdown= .c:396 #2 0xffffffff80c0630a in kern_reboot (howto=3D260) at /usr/src/sys/kern/kern_shutdown.c:484 #3 0xffffffff80c067ae in vpanic (fmt=3D, ap=3Dap@entry=3D0xfffffe0568cba580) at /usr/src/sys/kern/kern_shutdown.c:923 #4 0xffffffff80c065e3 in panic (fmt=3D) at /usr/src/sys/kern/kern_shutdown.c:847 #5 0xffffffff810b1fa7 in trap_fatal (frame=3D0xfffffe0568cba670, eva=3D0) = at /usr/src/sys/amd64/amd64/trap.c:942 #6 0xffffffff810b1fff in trap_pfault (frame=3D0xfffffe0568cba670, usermode=3Dfalse, signo=3D, ucode=3D) at /usr/src/sys/amd64/amd64/trap.c:761 #7 #8 memcpy_erms () at /usr/src/sys/amd64/amd64/support.S:553 #9 0xffffffff80c9cb87 in m_unshare (m0=3Dm0@entry=3D0xfffff8028a647b00, how=3Dhow@entry=3D1) at /usr/src/sys/kern/uipc_mbuf.c:2082 #10 0xffffffff8288e4b3 in esp_output (m=3D0xfffff801ea078800, sp=3D, sav=3D0xfffff801ea8d8c00, idx=3D0, skip=3D20, protoff=3D9) at /usr/src/sys/netipsec/xform_esp.c:770 #11 0xffffffff8288af13 in ipsec4_perform_request (m=3D0xfffff801ea078800, m@entry=3D0xfffff8028a647b00, sp=3D0x0, sp@entry=3D0xfffff801ea8d8800, inp=3Dinp@entry=3D0xfffff8037760b5d0, idx=3Didx@entry=3D0) at /usr/src/sys/netipsec/ipsec_output.c:275 #12 0xffffffff8288b063 in ipsec4_process_packet (m=3D0xfffff8028a647b00, sp=3D0xfffff801ea8d8800, inp=3D0xfffff8037760b5d0) at /usr/src/sys/netipsec/ipsec_output.c:292 #13 ipsec4_common_output (m=3D0xfffff8028a647b00, inp=3D0xfffff8037760b5d0, forwarding=3D) at /usr/src/sys/netipsec/ipsec_output.c:340 #14 0xffffffff80e3970c in ipsec_kmod_output (sc=3Dsc@entry=3D0xffffffff81d1= 72a8 , m=3D0xfffff801ea078800, inp=3D0x517, inp@entry=3D0xfffff80377= 60b5d0) at /usr/src/sys/netipsec/subr_ipsec.c:369 #15 0xffffffff80dbcf84 in ip_output (m=3D0x0, m@entry=3D0xfffff8028a647b00, opt=3D, ro=3D0xfffff8037760b760, flags=3D0, imo=3Dimo@entry= =3D0x0, inp=3D0x517) at /usr/src/sys/netinet/ip_output.c:680 #16 0xffffffff80dd43af in tcp_output (tp=3D0xfffffe0568a0f000) at /usr/src/sys/netinet/tcp_output.c:1553 #17 0xffffffff80de638d in tcp_usr_send (so=3D0xfffff8017674f760, flags=3D0,= m=3D0x0, nam=3D0x0, control=3D, td=3D0xfffffe020d66c020) at /usr/src/sys/netinet/tcp_usrreq.c:1178 #18 0xffffffff80ca7807 in sosend_generic (so=3D0xfffff8017674f760, addr=3D0= x517, uio=3D0x0, top=3D0x517, control=3D0xfffff80357919b00, flags=3D128, td=3D0xfffffe020d66c020) at /usr/src/sys/kern/uipc_socket.c:1759 #19 0xffffffff80ca7d20 in sosend (so=3D0xfffff801ea078800, so@entry=3D0xfffff8017674f760, addr=3Daddr@entry=3D0x0, uio=3D0x517, uio@en= try=3D0x0, top=3D0x517, control=3Dcontrol@entry=3D0x0, flags=3D1469161464, flags@entry=3D128, td=3D0xfffffe020d66c020) at /usr/src/sys/kern/uipc_socket.c:1809 #20 0xffffffff828a0899 in icl_conn_send_pdus (isc=3D0xfffff8039b839500, queue=3D0xfffffe0568cbaeb8) at /usr/src/sys/dev/iscsi/icl_soft.c:989 #21 icl_send_thread (arg=3Darg@entry=3D0xfffff8039b839500) at /usr/src/sys/dev/iscsi/icl_soft.c:1027 #22 0xffffffff80bc2fce in fork_exit (callout=3D0xffffffff828a0400 , arg=3D0xfffff8039b839500, frame=3D0xfffffe0568cbaf40) at /usr/src/sys/kern/kern_fork.c:1093 #23 #24 0x000000082f05ad2c in ?? () Backtrace stopped: Cannot access memory at address 0x84c4f4e08 (kgdb) frame 9 #9 0xffffffff80c9cb87 in m_unshare (m0=3Dm0@entry=3D0xfffff8028a647b00, how=3Dhow@entry=3D1) at /usr/src/sys/kern/uipc_mbuf.c:2082 2082 memcpy(mtod(n, caddr_t), mtod(m, caddr_t) + off, cc); (kgdb) q --=20 You are receiving this mail because: You are the assignee for the bug.=