[Bug 235684] security/ipsec-tools kernel panic
bugzilla-noreply at freebsd.org
bugzilla-noreply at freebsd.org
Tue Feb 12 09:03:32 UTC 2019
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=235684
Bug ID: 235684
Summary: security/ipsec-tools kernel panic
Product: Ports & Packages
Version: Latest
Hardware: amd64
OS: Any
Status: New
Severity: Affects Only Me
Priority: ---
Component: Individual Port(s)
Assignee: ports-bugs at FreeBSD.org
Reporter: admin at 5034.ru
Hi All,
I see kernel panic during racoon restart.
# uname -rv
12.0-STABLE FreeBSD 12.0-STABLE r343904 SERVER
# pkg info | grep ipsec-tools
ipsec-tools-0.8.2_7 KAME racoon IKE daemon, ipsec-tools version
Port config options:
[ ] ADMINPORT Enable Admin port
[x] DEBUG Build with debugging support
[x] DOCS Build and/or install documentation
[x] DPD Dead Peer Detection
[ ] EXAMPLES Build and/or install examples
[x] FRAG IKE fragmentation payload support
[ ] GSSAPI GSSAPI Security API support
[x] HYBRID Hybrid, Xauth and Mode-cfg support
[x] IDEA IDEA encryption (patented)
[x] IPV6 IPv6 protocol support
[ ] LDAP LDAP authentication (Xauth server)
[x] NATT NAT-Traversal (kernel-patch required before 11.1)
[ ] NATTF require NAT-Traversal (fail without kernel-patch)
[ ] PAM PAM authentication (Xauth server)
[ ] RADIUS Radius authentication (Xauth server)
[x] RC5 RC5 encryption (patented)
[x] SAUNSPEC Unspecified SA mode
[x] STATS Statistics logging function
[x] WCPSKEY Allow wildcard matching for pre-shared keys
(pts/2)[root at server:/usr/obj/usr/src/amd64.amd64/sys/SERVER]# kgdb kernel
/var/crash/vmcore.0
GNU gdb (GDB) 8.2.1 [GDB v8.2.1 for FreeBSD]
Copyright (C) 2018 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.
Type "show copying" and "show warranty" for details.
This GDB was configured as "x86_64-portbld-freebsd12.0".
Type "show configuration" for configuration details.
For bug reporting instructions, please see:
<http://www.gnu.org/software/gdb/bugs/>.
Find the GDB manual and other documentation resources online at:
<http://www.gnu.org/software/gdb/documentation/>.
For help, type "help".
Type "apropos word" to search for commands related to "word"...
Reading symbols from kernel...Reading symbols from
/usr/obj/usr/src/amd64.amd64/sys/SERVER/kernel.debug...done.
done.
Unread portion of the kernel message buffer:
Fatal trap 12: page fault while in kernel mode
cpuid = 2; apic id = 02
fault virtual address = 0x28
fault code = supervisor read data, page not present
instruction pointer = 0x20:0xffffffff80ecd31d
stack pointer = 0x28:0xfffffe003fca7a40
frame pointer = 0x28:0xfffffe003fca7a60
code segment = base 0x0, limit 0xfffff, type 0x1b
= DPL 0, pres 1, long 1, def32 0, gran 1
processor eflags = interrupt enabled, resume, IOPL = 0
current process = 0 (softirq_2)
trap number = 12
panic: page fault
cpuid = 2
time = 1549912176
KDB: stack backtrace:
#0 0xffffffff80c531c7 at kdb_backtrace+0x67
#1 0xffffffff80c07143 at vpanic+0x1a3
#2 0xffffffff80c06f93 at panic+0x43
#3 0xffffffff8118d9ff at trap_fatal+0x35f
#4 0xffffffff8118da59 at trap_pfault+0x49
#5 0xffffffff8118d07e at trap+0x29e
#6 0xffffffff81168ac5 at calltrap+0x8
#7 0xffffffff80eca240 at ipsec_delete_pcbpolicy+0x20
#8 0xffffffff80dbaeec at in_pcbfree_deferred+0x6c
#9 0xffffffff80c4db1a at epoch_call_task+0x1ca
#10 0xffffffff80c51a54 at gtaskqueue_run_locked+0x144
#11 0xffffffff80c516b8 at gtaskqueue_thread_loop+0x98
#12 0xffffffff80bc6f23 at fork_exit+0x83
#13 0xffffffff81169abe at fork_trampoline+0xe
Uptime: 1h17m12s
Dumping 1147 out of 8077 MB:..2%..12%..21%..31%..41%..51%..62%..72%..81%..91%
__curthread () at ./machine/pcpu.h:230
230 __asm("movq %%gs:%P1,%0" : "=r" (td) : "n"
(OFFSETOF_CURTHREAD));
(kgdb) bt
#0 __curthread () at ./machine/pcpu.h:230
#1 doadump (textdump=<optimized out>) at /usr/src/sys/kern/kern_shutdown.c:366
#2 0xffffffff80c06d2b in kern_reboot (howto=260) at
/usr/src/sys/kern/kern_shutdown.c:446
#3 0xffffffff80c071a3 in vpanic (fmt=<optimized out>, ap=0xfffffe003fca7790)
at /usr/src/sys/kern/kern_shutdown.c:872
#4 0xffffffff80c06f93 in panic (fmt=<unavailable>) at
/usr/src/sys/kern/kern_shutdown.c:799
#5 0xffffffff8118d9ff in trap_fatal (frame=0xfffffe003fca7980, eva=40) at
/usr/src/sys/amd64/amd64/trap.c:929
#6 0xffffffff8118da59 in trap_pfault (frame=0xfffffe003fca7980, usermode=0) at
/usr/src/sys/amd64/amd64/trap.c:765
#7 0xffffffff8118d07e in trap (frame=0xfffffe003fca7980) at
/usr/src/sys/amd64/amd64/trap.c:441
#8 <signal handler called>
#9 0xffffffff80ecd31d in key_freesp (spp=0xfffff80267101100) at
/usr/src/sys/netipsec/key.c:1199
#10 0xffffffff80eca240 in ipsec_delete_pcbpolicy (inp=0xfffff80017ff63d0) at
/usr/src/sys/netipsec/ipsec_pcb.c:176
#11 0xffffffff80dbaeec in in_pcbfree_deferred (ctx=0xfffff80017ff65a8) at
/usr/src/sys/netinet/in_pcb.c:1576
#12 0xffffffff80c4db1a in epoch_call_task (arg=<optimized out>) at
/usr/src/sys/kern/subr_epoch.c:507
#13 0xffffffff80c51a54 in gtaskqueue_run_locked (queue=0xfffff80003363c00) at
/usr/src/sys/kern/subr_gtaskqueue.c:376
#14 0xffffffff80c516b8 in gtaskqueue_thread_loop (arg=<optimized out>) at
/usr/src/sys/kern/subr_gtaskqueue.c:557
#15 0xffffffff80bc6f23 in fork_exit (callout=0xffffffff80c51620
<gtaskqueue_thread_loop>, arg=0xfffffe00025f5038, frame=0xfffffe003fca7c00)
at /usr/src/sys/kern/kern_fork.c:1059
#16 <signal handler called>
(kgdb) frame 9
#9 0xffffffff80ecd31d in key_freesp (spp=0xfffff80267101100) at
/usr/src/sys/netipsec/key.c:1199
1199 KEYDBG(IPSEC_STAMP,
(kgdb)
--
You are receiving this mail because:
You are the assignee for the bug.
More information about the freebsd-ports-bugs
mailing list