From jylefort@brutele.be  Tue Jan 25 13:46:54 2005
Return-Path: <jylefort@brutele.be>
Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125])
	by hub.freebsd.org (Postfix) with ESMTP id 1D43016A4D9
	for <FreeBSD-gnats-submit@freebsd.org>; Tue, 25 Jan 2005 13:46:54 +0000 (GMT)
Received: from gateway.lefort.net (212.68.242.35.brutele.be [212.68.242.35])
	by mx1.FreeBSD.org (Postfix) with ESMTP id 5BC9443D39
	for <FreeBSD-gnats-submit@freebsd.org>; Tue, 25 Jan 2005 13:46:53 +0000 (GMT)
	(envelope-from jylefort@brutele.be)
Received: from jsite.lefort.net (jsite.lefort.net [192.168.1.2])
	by gateway.lefort.net (Postfix) with ESMTP id 33271550B
	for <FreeBSD-gnats-submit@freebsd.org>; Tue, 25 Jan 2005 14:46:48 +0100 (CET)
Received: by jsite.lefort.net (Postfix, from userid 1000)
	id CAC8822F49; Tue, 25 Jan 2005 14:46:47 +0100 (CET)
Message-Id: <20050125134647.CAC8822F49@jsite.lefort.net>
Date: Tue, 25 Jan 2005 14:46:47 +0100 (CET)
From: Jean-Yves Lefort <jylefort@brutele.be>
Reply-To: Jean-Yves Lefort <jylefort@brutele.be>
To: FreeBSD-gnats-submit@freebsd.org
Cc:
Subject: panic with FAST_IPSEC and IPv6
X-Send-Pr-Version: 3.113
X-GNATS-Notify:

>Number:         76663
>Category:       kern
>Synopsis:       panic with FAST_IPSEC and IPv6
>Confidential:   no
>Severity:       serious
>Priority:       medium
>Responsible:    gnn
>State:          closed
>Quarter:        
>Keywords:       
>Date-Required:  
>Class:          sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Tue Jan 25 13:50:11 GMT 2005
>Closed-Date:    Tue Jun 15 17:46:58 UTC 2010
>Last-Modified:  Tue Jun 15 17:46:58 UTC 2010
>Originator:     Jean-Yves Lefort
>Release:        FreeBSD 5.3-RELEASE i386
>Organization:
>Environment:
System: FreeBSD jsite.lefort.net 5.3-RELEASE FreeBSD 5.3-RELEASE #0: Tue Jan 25 10:48:58 CET 2005 jylefort@jsite.lefort.net:/usr/obj/usr/src/sys/JSITE i386
>Description:
Reproducible panics on 5.3-RELEASE when using a FAST_IPSEC IPv6 tunnel
(the kernel panics when processing the first IPv6 packet), both with
mpsafenet=1 and mpsafenet=0. Removing the IPv6 entries from
/etc/ipsec.conf "fixes" the issue.
>How-To-Repeat:
add an IPsec v6 tunnel to /etc/ipsec.conf, eg:

add 2001:838:339::1 2001:838:339::2 esp 15700 -E blowfish-cbc "xxx";
add 2001:838:339::2 2001:838:339::1 esp 24500 -E blowfish-cbc "xxx";
spdadd 2001:838:339::2 ::/0 any -P out ipsec
        esp/tunnel/2001:838:339::2-2001:838:339::1/use;
spdadd ::/0 2001:838:339::2 any -P out ipsec
        esp/tunnel/2001:838:339::1-2001:838:339::2/use;

$ /etc/rc.d/ipsec reload
$ ping6 www.kame.net
>Fix:
>Release-Note:
>Audit-Trail:
State-Changed-From-To: open->feedback 
State-Changed-By: kmacy 
State-Changed-When: Fri Nov 16 01:35:18 UTC 2007 
State-Changed-Why:  

likely stale 


Responsible-Changed-From-To: freebsd-bugs->gnn 
Responsible-Changed-By: kmacy 
Responsible-Changed-When: Fri Nov 16 01:35:18 UTC 2007 
Responsible-Changed-Why:  

This is likely to be stale. 

http://www.freebsd.org/cgi/query-pr.cgi?pr=76663 
State-Changed-From-To: feedback->closed 
State-Changed-By: gnn 
State-Changed-When: Tue Jun 15 17:46:20 UTC 2010 
State-Changed-Why:  
Stale PR. 

http://www.freebsd.org/cgi/query-pr.cgi?pr=76663 
>Unformatted:
George has done substantial work here recently, is this still present?
