From nobody Sun Jul 02 15:08:16 2023 X-Original-To: net@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4QvC9Y0rpfz4lL5r for ; Sun, 2 Jul 2023 15:08:17 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4QvC9X5c8kz4SQX for ; Sun, 2 Jul 2023 15:08:16 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1688310496; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=uiV+hFiedqx+B+38BKa59dl8TQOsaGzMHvGK7OBTubU=; b=vEKbWcMolRNnxQJkUR2uHxiTzk5mUk33qzgmcsSw6w6vILGoPcOaTCel0fgl8Vx5xbHEAl EMwf2ZLPpkC3uKuynme1bdr64sZXObnbCFGgsDKN2y7JzAt08y+XSSSYrdJdFxCttt3hiW YerYFPuzQJ00Hxh6LbATnivgZ8XLA8GqdPoks9bEjMemfE6SdQ0TuvjI/J5NBk6ILAK/X+ zo2ns+vNZDa7qTP8TldGG/j8LsIv4S+VgG8QNzo2XH0kFrsL1BqFYAqjIaoZ5wi5kZDI1K OtZHKTHm/J/xsD+o17WtF/1nZ51+s8KoSCW5D4J3SzsFxJ0BPyD3tVlVDX/v/A== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1688310496; a=rsa-sha256; cv=none; b=ctNVXMQ3pmeMPf1to5TpXZg22FIZLdwp28osaEFmIw09f0Lq0+quJKBdGO0SoxVGqK3/Zc iROFYFqbWOFjNpBAkIXC5gs7tiGY55iJed5RjGSQ52vVmnq2sxPyX34lw6DFeUK+3HEXFn ODaanlAtXWQ01d990cqfkgiCOFN5P4vUkryQ+WfOCeyCtwD0b4xtmeyJ4641Bkx36A9G6y UoNg7LISMJhhTg4z5KOG1mKHM63+MAlxJBeuAwpQdTXJsTcR+Iv5tfGrYHHGb4Cojo87LZ 5XYrk+iQIXd5/LZxRfqidhoUXdoG0AlqmoFh758HObFswZJYFh45gW3b9SoMeA== Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4QvC9X4gvnz1CGf for ; Sun, 2 Jul 2023 15:08:16 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 362F8GNb021957 for ; Sun, 2 Jul 2023 15:08:16 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 362F8GPT021956 for net@FreeBSD.org; Sun, 2 Jul 2023 15:08:16 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: net@FreeBSD.org Subject: [Bug 272319] FreeBSD kernel crash on MPD5 restart with PPP configuration. Date: Sun, 02 Jul 2023 15:08:16 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 13.2-RELEASE X-Bugzilla-Keywords: crash X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: afedorov@FreeBSD.org X-Bugzilla-Status: Open X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: net@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Networking and TCP/IP with FreeBSD List-Archive: https://lists.freebsd.org/archives/freebsd-net List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-net@freebsd.org MIME-Version: 1.0 X-ThisMailContainsUnwantedMimeParts: N https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D272319 --- Comment #15 from Aleksandr Fedorov --- (In reply to ny from comment #11) Yes, I think there is an additional bug here. After commit https://github.com/freebsd/freebsd-src/commit/779f106aa169256b7010a1d8f963f= f656b881e92 A new KPI has been added - solisten_upcall_set() which is used to catch eve= nts associated with a listening socket. But, the current version of ng_ksocket(4) continues to use the old KPI for = data sockets. Therefore, I think, because ng_ksocket(4) doesn't set the handler function = via solisten_upcall_set(), it doesn't get ACCEPT event, etc. For an example, see how it was done for ctl_ha.c https://github.com/freebsd/freebsd-src/commit/779f106aa169256b7010a1d8f963f= f656b881e92#diff-77eaa0ac186398050c82052906359306b18a8a274c b81b7ee3dbd897f8207705 The same things should be done with ng_ksocket(4). --=20 You are receiving this mail because: You are the assignee for the bug.=