FreeBSD Bugzilla – Attachment 242146 Details for
Bug 271393
13.2 IPSEC panics accessing web server on vpn server when packets are fragmented
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Help
|
New Account
|
Log In
Remember
[x]
|
Forgot Password
Login:
[x]
Output from dmesg related to panics
panic.txt (text/plain), 2.67 KB, created by
Russell.Yount
on 2023-05-13 19:36:09 UTC
(
hide
)
Description:
Output from dmesg related to panics
Filename:
MIME Type:
Creator:
Russell.Yount
Created:
2023-05-13 19:36:09 UTC
Size:
2.67 KB
patch
obsolete
>---- IPv4 ---- > >Fatal trap 12: page fault while in kernel mode >cpuid = 1; apic id = 01 >fault virtual address = 0x0 >fault code = supervisor read data, page not present >instruction pointer = 0x20:0xffffffff810adf1a >stack pointer = 0x28:0xfffffe00254a04e0 >frame pointer = 0x28:0xfffffe00254a04e0 >code segment = base 0x0, limit 0xfffff, type 0x1b > = DPL 0, pres 1, long 1, def32 0, gran 1 >processor eflags = interrupt enabled, resume, IOPL = 0 >current process = 890 (httpd) >trap number = 12 >panic: page fault >cpuid = 1 >time = 1684003416 >KDB: stack backtrace: >#0 0xffffffff80c53dc5 at kdb_backtrace+0x65 >#1 0xffffffff80c06741 at vpanic+0x151 >#2 0xffffffff80c065e3 at panic+0x43 >#3 0xffffffff810b1fa7 at trap_fatal+0x387 >#4 0xffffffff810b1fff at trap_pfault+0x4f >#5 0xffffffff81088e78 at calltrap+0x8 >#6 0xffffffff80c9cca3 at m_unshare+0x3b3 >#7 0xffffffff8234b4b3 at esp_output+0x183 >#8 0xffffffff82347f13 at ipsec4_perform_request+0x3b3 >#9 0xffffffff82348063 at ipsec4_common_output+0x83 >#10 0xffffffff80e3970c at ipsec_kmod_output+0x2c >#11 0xffffffff80dbcf84 at ip_output+0xb64 >#12 0xffffffff80dd43af at tcp_output+0x1dbf >#13 0xffffffff80de638d at tcp_usr_send+0x17d >#14 0xffffffff80c03f54 at vn_sendfile+0x12a4 >#15 0xffffffff80c04e97 at sendfile+0x117 >#16 0xffffffff810b289c at amd64_syscall+0x10c >#17 0xffffffff8108978b at fast_syscall_common+0xf8 > >---- IPv6 ---- > >Fatal trap 12: page fault while in kernel mode >cpuid = 1; apic id = 01 >fault virtual address = 0x0 >fault code = supervisor read data, page not present >instruction pointer = 0x20:0xffffffff810adf1a >stack pointer = 0x28:0xfffffe001e42d3c0 >frame pointer = 0x28:0xfffffe001e42d3c0 >code segment = base 0x0, limit 0xfffff, type 0x1b > = DPL 0, pres 1, long 1, def32 0, gran 1 >processor eflags = interrupt enabled, resume, IOPL = 0 >current process = 882 (httpd) >trap number = 12 >panic: page fault >cpuid = 1 >time = 1684004248 >KDB: stack backtrace: >#0 0xffffffff80c53dc5 at kdb_backtrace+0x65 >#1 0xffffffff80c06741 at vpanic+0x151 >#2 0xffffffff80c065e3 at panic+0x43 >#3 0xffffffff810b1fa7 at trap_fatal+0x387 >#4 0xffffffff810b1fff at trap_pfault+0x4f >#5 0xffffffff81088e78 at calltrap+0x8 >#6 0xffffffff80c9cca3 at m_unshare+0x3b3 >#7 0xffffffff8234b4b3 at esp_output+0x183 >#8 0xffffffff82348636 at ipsec6_perform_request+0x506 >#9 0xffffffff8234878f at ipsec6_common_output+0x8f >#10 0xffffffff80e3970c at ipsec_kmod_output+0x2c >#11 0xffffffff80e0b1bd at ip6_output+0xad >#12 0xffffffff80dd4490 at tcp_output+0x1ea0 >#13 0xffffffff80de638d at tcp_usr_send+0x17d >#14 0xffffffff80c03f54 at vn_sendfile+0x12a4 >#15 0xffffffff80c04e97 at sendfile+0x117 >#16 0xffffffff810b289c at amd64_syscall+0x10c >#17 0xffffffff8108978b at fast_syscall_common+0xf8
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 271393
: 242146