From nobody Sat May 13 19:36:09 2023 X-Original-To: bugs@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4QJbTj6cWnz4BhkL for ; Sat, 13 May 2023 19:36:09 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4QJbTj32pjz3nVq for ; Sat, 13 May 2023 19:36:09 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1684006569; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=VUY75/Pcn8rbgC+sUobaEUGHIMu17Yt3HkY7HT4VmgU=; b=sPs7rCBIPb8hivxx0rLa0Wg5mmPEEsecr8mi5VkoF8BKB/6bUnsJQD4CGPzltswLz9w2v+ vH56uS+Qn7db8L60pD0BWfvInueGWS6MMFMtVBOJ7pKu9bLq09Wuefl23U8TNDBBaqOs8J 40qUwHodx85FlGXTH1pqDOzpqvklBqnm/d+lW7F2wKnbUQeqfpNWOiewT73ZZr+hGLLjMJ UhGBU06uDo6OxdwKWIIaqj0ZRRblT26VQUeOMzO4UNzmxalfV7XCie+QMC7tqS7+ohMhb6 wn2gzL9d/kb3rym7VMH0/Q375q0P/Sk3UtU1f1+5+V/XLkPmzRgSi1zBac9a3A== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1684006569; a=rsa-sha256; cv=none; b=Xa7ShzEdJnNuEe3sMR4spGxlxjdC1hWoaVugZOZxSzvLB5yZkP+zw2OcLV83O/Yj/aNFU+ Lszo75W/lL2DMqUFEnQD7wcstW9OtCx7qYkEV//A5FCQgN6x6unR2/Tnx9qNQA2RialAhW ykeJxoE8jmY4uzR4UgttdFmSkR+fCNZm+XcwmrYUHWGIbWxmy5H8BvFjVuynFoyudfs7Gy Vh9VIjN5YrfuzPUoiSdJh02/c1YqhwkvA+vVpY+ONdbIt3obqRyibAoTPOXTTqbpY+qvUm yvmtg9Ti6dCh1H0jfuEYHpnC9iVrhFFTwkxLEOc1oY7m/0KeUn5Ji/3NXwtRVg== Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4QJbTj2609zVDT for ; Sat, 13 May 2023 19:36:09 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 34DJa9De035763 for ; Sat, 13 May 2023 19:36:09 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 34DJa9ut035762 for bugs@FreeBSD.org; Sat, 13 May 2023 19:36:09 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 271393] 13.2 IPSEC panics accessing web server on vpn server when packets are fragmented Date: Sat, 13 May 2023 19:36:09 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 13.1-STABLE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: Russell.Yount@gmail.com X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status bug_severity priority component assigned_to reporter attachments.created Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Bug reports List-Archive: https://lists.freebsd.org/archives/freebsd-bugs List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-bugs@freebsd.org MIME-Version: 1.0 X-ThisMailContainsUnwantedMimeParts: N https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D271393 Bug ID: 271393 Summary: 13.2 IPSEC panics accessing web server on vpn server when packets are fragmented Product: Base System Version: 13.1-STABLE Hardware: amd64 OS: Any Status: New Severity: Affects Only Me Priority: --- Component: kern Assignee: bugs@FreeBSD.org Reporter: Russell.Yount@gmail.com Created attachment 242146 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D242146&action= =3Dedit Output from dmesg related to panics The FreeBSD 13.2 kernel crashes when VPN client accesses web service on the VPN server and the web server respond requires packet to fragemented. This occurs with either IPv4 or IPv6 with or without UDP encapsulation. Sending large pings from vpn client works correctly. The uname output of the vpn server is FreeBSD XXX 13.2-RELEASE (continued on next line) FreeBSD 13.2-RELEASE releng/13.2-n254617-525ecfdad597 GENERIC amd64 The panic messages are attached. I am willing to work with a developer to get this fixed. -Russ Russell J. Yount --=20 You are receiving this mail because: You are the assignee for the bug.=