| Summary: | Kernel panic when using IPsec on high loads | ||
|---|---|---|---|
| Product: | Base System | Reporter: | gunther <gunther> |
| Component: | kern | Assignee: | freebsd-bugs (Nobody) <bugs> |
| Status: | Closed FIXED | ||
| Severity: | Affects Only Me | ||
| Priority: | Normal | ||
| Version: | 4.2-RELEASE | ||
| Hardware: | Any | ||
| OS: | Any | ||
|
Description
gunther
2001-03-28 19:10:01 UTC
Here is more information: Fatal trap 12: page fault while in kernel mode fault virtual address = 0xb2c04400 fault code = supervisor read, page not present instruction pointer = 0x8:0xc0199fa0 stack pointer = 0x10:0xc020c218 frame pointer = 0x10:0xc020c268 code segment = base rx0, limit 0xfffff, type 0x1b = DPL 0, pres 1, def32 1, gran 1 processor eflags = interrupt enabled, resume, IOPL = 0 current process = Idle interrupt mask = net tty kernel: type 12 trap, code=0 Stopped at esp_hdrsiz+0x498: movl 0(%edx),%eax So, the problem seems to be in the IPsec code, sys/netinet6/esp_output.c called from sys/netinet6/ipsec.c. Here is the stack trace: esp_hdrsiz(c0b48500,c0b485f5,c0b3f400,c0ceb800,2) at esp_hdrsiz+0x498 esp4_output(c0b48500,c0ceb800,c0ceba00,0,1) at esp4_output+0x48 ipsec4_output(c020c418,c0ceba00,1,c0ceef00,c0b5af00) at ipsec4_output+0x2e3 ip_output(c0b1be00,0,c0229a50,1,0) at ip_output+0x762 ip_stripoptions(c0b1be00,0,c0b1be00,0,ffffffff) at ip_stripoptions+0x211 ip_input(c0b1be00) at ip_input+0x462 ip_input(c01d374f,0,d0f0010,10,c7a50010) at ip_input+0x7b7 doreti_popl_fs_fault() at doreti_popl_fs_fault+0x91 I am assuming if I upgrade to some more current version of the IPsec code the problem might have been fixed. But am not sure... I will report more later. thanks -- Gunther Schadow, M.D., Ph.D. gschadow@regenstrief.org Medical Information Scientist Regenstrief Institute for Health Care Adjunct Assistent Professor Indiana University School of Medicine tel:1(317)630-7960 http://aurora.regenstrief.org State Changed From-To: open->feedback I think this may have been fixed in revision 1.130.2.21 of src/sys/netinet/ip_input.c. Could you try updating to a more recent -stable to see if this problem still exists? State Changed From-To: feedback->closed This bug (icmp_error mbuf corruption) has been fixed. Thanks for the bug report! |