Thinkpad X1 Carbon gen11 - suspend not work

2023-10-05 Thread Oleksandr Kryvulia

Hi,
I have Thinkpad X1 Carbon gen11 where s3 is not available:

# sysctl hw.acpi.supported_sleep_state
hw.acpi.supported_sleep_state: S4 S5

FreeBSD 15.0-CURRENT #47 main-n265480-95a4709b2cca-dirty, latest 
available bios.


What can be done to investigate?



Re: Thinkpad X1 Carbon gen11 - suspend not work

2023-10-05 Thread Li-Wen Hsu
On Thu, Oct 5, 2023 at 4:00 PM Oleksandr Kryvulia 
wrote:

> Hi,
> I have Thinkpad X1 Carbon gen11 where s3 is not available:
>
> # sysctl hw.acpi.supported_sleep_state
> hw.acpi.supported_sleep_state: S4 S5
>
> FreeBSD 15.0-CURRENT #47 main-n265480-95a4709b2cca-dirty, latest available
> bios.
>
> What can be done to investigate?
>

I'm not sure about gen11, but for the earlier generations, the sleep state
can be adjusted in BIOS. This is what on my gen6:
https://twitter.com/lwhsu/status/1039711710913945601


panic in cypto code

2023-10-05 Thread Steve Kargl
In case anyone else is using openvpn.

%  pkg info openvpn
openvpn-2.6.6
Name   : openvpn
Version: 2.6.6
Installed on   : Tue Sep 19 08:48:55 2023 PDT
Origin : security/openvpn
Architecture   : FreeBSD:15:amd64

% uname -a
FreeBSD hotrats 15.0-CURRENT #1 main-n265325-9c30461dd25b:
Thu Sep 14 08:09:18 PDT 2023 kargl@hotrats:$PATH/HOTRATS amd64


Fatal double fault
rip 0x8099b408 rsp 0xfe000e1cc000 rbp 0xfe000e1cc010
rax 0x53749f62934c5349 rdx 0x53749f62934c5349 rbx 0xfe000e1cc200
rcx 0x57bf32fec3cbde70 rsi 0x32e8db2f0591c5da rdi 0x832f0fb1e6d07eb0
r8 0 r9 0 r10 0
r11 0x60 r12 0x5af7589946bd13d9 r13 0xbeddd6a808e1dd54
r14 0xcdf12bbf2708189c r15 0xeb262ae8536a7adf rflags 0x10246
cs 0x20 ss 0x28 ds 0x3b es 0x3b fs 0x13 gs 0x1b
fsbase 0x1c02e381d120 gsbase 0x81a1 kgsbase 0
cpuid = 0; apic id = 00
panic: double fault
cpuid = 0
time = 1696512769
KDB: stack backtrace:
db_trace_self_wrapper() at db_trace_self_wrapper+0x2b/frame 0x812b3060
vpanic() at vpanic+0x132/frame 0x812b3190
panic() at panic+0x43/frame 0x812b31f0
dblfault_handler() at dblfault_handler+0x1ce/frame 0x812b32b0
Xdblfault() at Xdblfault+0xd7/frame 0x812b32b0
--- trap 0x17, rip = 0x8099b408, rsp = 0xfe000e1cc000, rbp = 
0xfe000e1cc010 ---
gfmultword4() at gfmultword4+0x8/frame 0xfe000e1cc010
gf128_mul4b() at gf128_mul4b+0x63/frame 0xfe000e1cc050
AES_GMAC_Update() at AES_GMAC_Update+0x73/frame 0xfe000e1cc0b0
swcr_gcm() at swcr_gcm+0x660/frame 0xfe000e1cc830
swcr_process() at swcr_process+0x1a/frame 0xfe000e1cc850
crypto_dispatch() at crypto_dispatch+0x42/frame 0xfe000e1cc870
ovpn_transmit_to_peer() at ovpn_transmit_to_peer+0x54e/frame 0xfe000e1cc8d0
ovpn_output() at ovpn_output+0x2a2/frame 0xfe000e1cc950
ip_output() at ip_output+0x11f6/frame 0xfe000e1cca40
ovpn_encap() at ovpn_encap+0x3e7/frame 0xfe000e1ccac0

#13 0x80ae08ce in dblfault_handler (frame=)
at /usr/src/sys/amd64/amd64/trap.c:1012
#14 
#15 0x8099b408 in gfmultword4 (worda=3668422891496654298, 
wordb=9452791399630012080, wordc=6013606648173318985, 
wordd=6322828471639465584, x=..., tbl=0xfe000e1cc200)
at /usr/src/sys/opencrypto/gfmult.c:174
#16 0x8099b5d3 in gf128_mul4b (r=..., 
v=v@entry=0xf800076b9a64 
"\3156}\373\312w\254iBnD\001ܹ˾\353&*\350Sjz߃/\017\261\346\320~\260Z\367X\231F\275\023\331St\237b\223LSI\276\335֨\b\341\335TW\2772\376\303\313\336pN\265\023\352\2054\002\a/˦9R\321\366p\f\352\204P\360\270\371\250\\\aE?7s\377\253\217b\262%\214\317m",
 
tbl=tbl@entry=0xfe000e1cc200) at /usr/src/sys/opencrypto/gfmult.c:268
#17 0x8099ab13 in AES_GMAC_Update (ctx=0xfe000e1cc200, 
vdata=, len=144) at /usr/src/sys/opencrypto/gmac.c:94
#18 0x80998ae0 in swcr_gcm (ses=0xf8020376a048, 
crp=0xf80023386c08) at /usr/src/sys/opencrypto/cryptosoft.c:505
#19 0x80997c4a in swcr_process (dev=, 
crp=0xf80023386c08, hint=)
at /usr/src/sys/opencrypto/cryptosoft.c:1680

-- 
Steve



Re: panic in cypto code

2023-10-05 Thread Kristof Provost
Hi Steve,

On 5 Oct 2023, at 17:36, Steve Kargl wrote:
> In case anyone else is using openvpn.
>
> %  pkg info openvpn
> openvpn-2.6.6
> Name   : openvpn
> Version: 2.6.6
> Installed on   : Tue Sep 19 08:48:55 2023 PDT
> Origin : security/openvpn
> Architecture   : FreeBSD:15:amd64
>
> % uname -a
> FreeBSD hotrats 15.0-CURRENT #1 main-n265325-9c30461dd25b:
> Thu Sep 14 08:09:18 PDT 2023 kargl@hotrats:$PATH/HOTRATS amd64
>
>
> Fatal double fault
> rip 0x8099b408 rsp 0xfe000e1cc000 rbp 0xfe000e1cc010
> rax 0x53749f62934c5349 rdx 0x53749f62934c5349 rbx 0xfe000e1cc200
> rcx 0x57bf32fec3cbde70 rsi 0x32e8db2f0591c5da rdi 0x832f0fb1e6d07eb0
> r8 0 r9 0 r10 0
> r11 0x60 r12 0x5af7589946bd13d9 r13 0xbeddd6a808e1dd54
> r14 0xcdf12bbf2708189c r15 0xeb262ae8536a7adf rflags 0x10246
> cs 0x20 ss 0x28 ds 0x3b es 0x3b fs 0x13 gs 0x1b
> fsbase 0x1c02e381d120 gsbase 0x81a1 kgsbase 0
> cpuid = 0; apic id = 00
> panic: double fault
> cpuid = 0
> time = 1696512769
> KDB: stack backtrace:
> db_trace_self_wrapper() at db_trace_self_wrapper+0x2b/frame 0x812b3060
> vpanic() at vpanic+0x132/frame 0x812b3190
> panic() at panic+0x43/frame 0x812b31f0
> dblfault_handler() at dblfault_handler+0x1ce/frame 0x812b32b0
> Xdblfault() at Xdblfault+0xd7/frame 0x812b32b0
> --- trap 0x17, rip = 0x8099b408, rsp = 0xfe000e1cc000, rbp = 
> 0xfe000e1cc010 ---
> gfmultword4() at gfmultword4+0x8/frame 0xfe000e1cc010
> gf128_mul4b() at gf128_mul4b+0x63/frame 0xfe000e1cc050
> AES_GMAC_Update() at AES_GMAC_Update+0x73/frame 0xfe000e1cc0b0
> swcr_gcm() at swcr_gcm+0x660/frame 0xfe000e1cc830
> swcr_process() at swcr_process+0x1a/frame 0xfe000e1cc850
> crypto_dispatch() at crypto_dispatch+0x42/frame 0xfe000e1cc870
> ovpn_transmit_to_peer() at ovpn_transmit_to_peer+0x54e/frame 
> 0xfe000e1cc8d0
> ovpn_output() at ovpn_output+0x2a2/frame 0xfe000e1cc950
> ip_output() at ip_output+0x11f6/frame 0xfe000e1cca40
> ovpn_encap() at ovpn_encap+0x3e7/frame 0xfe000e1ccac0
>
> #13 0x80ae08ce in dblfault_handler (frame=)
> at /usr/src/sys/amd64/amd64/trap.c:1012
> #14 
> #15 0x8099b408 in gfmultword4 (worda=3668422891496654298,
> wordb=9452791399630012080, wordc=6013606648173318985,
> wordd=6322828471639465584, x=..., tbl=0xfe000e1cc200)
> at /usr/src/sys/opencrypto/gfmult.c:174
> #16 0x8099b5d3 in gf128_mul4b (r=...,
> v=v@entry=0xf800076b9a64 
> "\3156}\373\312w\254iBnD\001ܹ˾\353&*\350Sjz߃/\017\261\346\320~\260Z\367X\231F\275\023\331St\237b\223LSI\276\335֨\b\341\335TW\2772\376\303\313\336pN\265\023\352\2054\002\a/˦9R\321\366p\f\352\204P\360\270\371\250\\\aE?7s\377\253\217b\262%\214\317m",
> tbl=tbl@entry=0xfe000e1cc200) at /usr/src/sys/opencrypto/gfmult.c:268
> #17 0x8099ab13 in AES_GMAC_Update (ctx=0xfe000e1cc200,
> vdata=, len=144) at /usr/src/sys/opencrypto/gmac.c:94
> #18 0x80998ae0 in swcr_gcm (ses=0xf8020376a048,
> crp=0xf80023386c08) at /usr/src/sys/opencrypto/cryptosoft.c:505
> #19 0x80997c4a in swcr_process (dev=,
> crp=0xf80023386c08, hint=)
> at /usr/src/sys/opencrypto/cryptosoft.c:1680
>
Do you have a bit more information about what happened here? As in: can you 
reproduce this, or do you have any idea what was going on to trigger this? Did 
anything change in your setup (i.e. is if_ovpn use new, or did you update 
either kernel or userspace or …?

Do you have the full core dump to poke at?

It might be a bug in the crypto code, but it could also be a bug in the if_ovpn 
code, so I’d like to work out what caused this.

Best regards,
Kristof



status of openssl 3.0.11 in stable/14?

2023-10-05 Thread Michael Grimm
Hi

About two weeks ago openssl 3.0.11 has been imported into git: 

https://cgit.freebsd.org/src/commit/?h=vendor/openssl/3.0.11&id=315108b81694de474bbc273c0050b195047f5eed

I do only want to understand if this means that openssl 3.0.11 has yet to 
become committed?

And, where are those files stored in git after import?

Sorry, I am still not understanding git repositories well enough.

Thanks and regards,
Michael


Re: panic in cypto code

2023-10-05 Thread Steve Kargl
On Thu, Oct 05, 2023 at 06:05:37PM +0200, Kristof Provost wrote:
> Hi Steve,
> 
> On 5 Oct 2023, at 17:36, Steve Kargl wrote:
> > In case anyone else is using openvpn.
> >
> > %  pkg info openvpn
> > openvpn-2.6.6
> > Name   : openvpn
> > Version: 2.6.6
> > Installed on   : Tue Sep 19 08:48:55 2023 PDT
> > Origin : security/openvpn
> > Architecture   : FreeBSD:15:amd64
> >
> > % uname -a
> > FreeBSD hotrats 15.0-CURRENT #1 main-n265325-9c30461dd25b:
> > Thu Sep 14 08:09:18 PDT 2023 kargl@hotrats:$PATH/HOTRATS amd64
> >
> >
> > Fatal double fault
> > rip 0x8099b408 rsp 0xfe000e1cc000 rbp 0xfe000e1cc010
> > rax 0x53749f62934c5349 rdx 0x53749f62934c5349 rbx 0xfe000e1cc200
> > rcx 0x57bf32fec3cbde70 rsi 0x32e8db2f0591c5da rdi 0x832f0fb1e6d07eb0
> > r8 0 r9 0 r10 0
> > r11 0x60 r12 0x5af7589946bd13d9 r13 0xbeddd6a808e1dd54
> > r14 0xcdf12bbf2708189c r15 0xeb262ae8536a7adf rflags 0x10246
> > cs 0x20 ss 0x28 ds 0x3b es 0x3b fs 0x13 gs 0x1b
> > fsbase 0x1c02e381d120 gsbase 0x81a1 kgsbase 0
> > cpuid = 0; apic id = 00
> > panic: double fault
> > cpuid = 0
> > time = 1696512769
> > KDB: stack backtrace:
> > db_trace_self_wrapper() at db_trace_self_wrapper+0x2b/frame 
> > 0x812b3060
> > vpanic() at vpanic+0x132/frame 0x812b3190
> > panic() at panic+0x43/frame 0x812b31f0
> > dblfault_handler() at dblfault_handler+0x1ce/frame 0x812b32b0
> > Xdblfault() at Xdblfault+0xd7/frame 0x812b32b0
> > --- trap 0x17, rip = 0x8099b408, rsp = 0xfe000e1cc000, rbp = 
> > 0xfe000e1cc010 ---
> > gfmultword4() at gfmultword4+0x8/frame 0xfe000e1cc010
> > gf128_mul4b() at gf128_mul4b+0x63/frame 0xfe000e1cc050
> > AES_GMAC_Update() at AES_GMAC_Update+0x73/frame 0xfe000e1cc0b0
> > swcr_gcm() at swcr_gcm+0x660/frame 0xfe000e1cc830
> > swcr_process() at swcr_process+0x1a/frame 0xfe000e1cc850
> > crypto_dispatch() at crypto_dispatch+0x42/frame 0xfe000e1cc870
> > ovpn_transmit_to_peer() at ovpn_transmit_to_peer+0x54e/frame 
> > 0xfe000e1cc8d0
> > ovpn_output() at ovpn_output+0x2a2/frame 0xfe000e1cc950
> > ip_output() at ip_output+0x11f6/frame 0xfe000e1cca40
> > ovpn_encap() at ovpn_encap+0x3e7/frame 0xfe000e1ccac0
> >
> > #13 0x80ae08ce in dblfault_handler (frame=)
> > at /usr/src/sys/amd64/amd64/trap.c:1012
> > #14 
> > #15 0x8099b408 in gfmultword4 (worda=3668422891496654298,
> > wordb=9452791399630012080, wordc=6013606648173318985,
> > wordd=6322828471639465584, x=..., tbl=0xfe000e1cc200)
> > at /usr/src/sys/opencrypto/gfmult.c:174
> > #16 0x8099b5d3 in gf128_mul4b (r=...,
> > v=v@entry=0xf800076b9a64 
> > "\3156}\373\312w\254iBnD\001ܹ˾\353&*\350Sjz߃/\017\261\346\320~\260Z\367X\231F\275\023\331St\237b\223LSI\276\335֨\b\341\335TW\2772\376\303\313\336pN\265\023\352\2054\002\a/˦9R\321\366p\f\352\204P\360\270\371\250\\\aE?7s\377\253\217b\262%\214\317m",
> > tbl=tbl@entry=0xfe000e1cc200) at 
> > /usr/src/sys/opencrypto/gfmult.c:268
> > #17 0x8099ab13 in AES_GMAC_Update (ctx=0xfe000e1cc200,
> > vdata=, len=144) at /usr/src/sys/opencrypto/gmac.c:94
> > #18 0x80998ae0 in swcr_gcm (ses=0xf8020376a048,
> > crp=0xf80023386c08) at /usr/src/sys/opencrypto/cryptosoft.c:505
> > #19 0x80997c4a in swcr_process (dev=,
> > crp=0xf80023386c08, hint=)
> > at /usr/src/sys/opencrypto/cryptosoft.c:1680
> >
> Do you have a bit more information about what happened here?
> As in: can you reproduce this, or do you have any idea what
> was going on to trigger this?  Did anything change in your
> setup (i.e. is if_ovpn use new, or did you update either kernel
> or userspace or ?

I updated the system on the date displayed by 'uname -a'.
This included both base system and all installed ports;
including openvpn.  I normally leave the system running Xorg,
and I would find the system in a "locked-up" blank-screen
saver state.  I assumed I was having a Xorg/drm-kmod problem,
so I shut Xorg down last night.  The above panic was waiting
for me this morning.  The panic happens every night.

Note , I don't use if_ovpn.  This a client over a tun0 device
through wlan0.

> 
> Do you have the full core dump to poke at?
> 

Yes, I do, but it's on a home system.  I can put it up on
my kargl@freefall later tonight (in 10-ish hours).  I'll
include the dmesg.boot so you have some idea about the 
hardware.

> It might be a bug in the crypto code, but it could also
> be a bug in the if_ovpn code, so I’d like to work out
> what caused this.

Thanks for the quick reply.

-- 
Steve



Re: panic in cypto code

2023-10-05 Thread Kristof Provost
On 5 Oct 2023, at 19:34, Steve Kargl wrote:
> On Thu, Oct 05, 2023 at 06:05:37PM +0200, Kristof Provost wrote:
>> Hi Steve,
>>
>> On 5 Oct 2023, at 17:36, Steve Kargl wrote:
>>> In case anyone else is using openvpn.
>>>
>>> %  pkg info openvpn
>>> openvpn-2.6.6
>>> Name   : openvpn
>>> Version: 2.6.6
>>> Installed on   : Tue Sep 19 08:48:55 2023 PDT
>>> Origin : security/openvpn
>>> Architecture   : FreeBSD:15:amd64
>>>
>>> % uname -a
>>> FreeBSD hotrats 15.0-CURRENT #1 main-n265325-9c30461dd25b:
>>> Thu Sep 14 08:09:18 PDT 2023 kargl@hotrats:$PATH/HOTRATS amd64
>>>
>>>
>>> Fatal double fault
>>> rip 0x8099b408 rsp 0xfe000e1cc000 rbp 0xfe000e1cc010
>>> rax 0x53749f62934c5349 rdx 0x53749f62934c5349 rbx 0xfe000e1cc200
>>> rcx 0x57bf32fec3cbde70 rsi 0x32e8db2f0591c5da rdi 0x832f0fb1e6d07eb0
>>> r8 0 r9 0 r10 0
>>> r11 0x60 r12 0x5af7589946bd13d9 r13 0xbeddd6a808e1dd54
>>> r14 0xcdf12bbf2708189c r15 0xeb262ae8536a7adf rflags 0x10246
>>> cs 0x20 ss 0x28 ds 0x3b es 0x3b fs 0x13 gs 0x1b
>>> fsbase 0x1c02e381d120 gsbase 0x81a1 kgsbase 0
>>> cpuid = 0; apic id = 00
>>> panic: double fault
>>> cpuid = 0
>>> time = 1696512769
>>> KDB: stack backtrace:
>>> db_trace_self_wrapper() at db_trace_self_wrapper+0x2b/frame 
>>> 0x812b3060
>>> vpanic() at vpanic+0x132/frame 0x812b3190
>>> panic() at panic+0x43/frame 0x812b31f0
>>> dblfault_handler() at dblfault_handler+0x1ce/frame 0x812b32b0
>>> Xdblfault() at Xdblfault+0xd7/frame 0x812b32b0
>>> --- trap 0x17, rip = 0x8099b408, rsp = 0xfe000e1cc000, rbp = 
>>> 0xfe000e1cc010 ---
>>> gfmultword4() at gfmultword4+0x8/frame 0xfe000e1cc010
>>> gf128_mul4b() at gf128_mul4b+0x63/frame 0xfe000e1cc050
>>> AES_GMAC_Update() at AES_GMAC_Update+0x73/frame 0xfe000e1cc0b0
>>> swcr_gcm() at swcr_gcm+0x660/frame 0xfe000e1cc830
>>> swcr_process() at swcr_process+0x1a/frame 0xfe000e1cc850
>>> crypto_dispatch() at crypto_dispatch+0x42/frame 0xfe000e1cc870
>>> ovpn_transmit_to_peer() at ovpn_transmit_to_peer+0x54e/frame 
>>> 0xfe000e1cc8d0
>>> ovpn_output() at ovpn_output+0x2a2/frame 0xfe000e1cc950
>>> ip_output() at ip_output+0x11f6/frame 0xfe000e1cca40
>>> ovpn_encap() at ovpn_encap+0x3e7/frame 0xfe000e1ccac0
>>>
>>> #13 0x80ae08ce in dblfault_handler (frame=)
>>> at /usr/src/sys/amd64/amd64/trap.c:1012
>>> #14 
>>> #15 0x8099b408 in gfmultword4 (worda=3668422891496654298,
>>> wordb=9452791399630012080, wordc=6013606648173318985,
>>> wordd=6322828471639465584, x=..., tbl=0xfe000e1cc200)
>>> at /usr/src/sys/opencrypto/gfmult.c:174
>>> #16 0x8099b5d3 in gf128_mul4b (r=...,
>>> v=v@entry=0xf800076b9a64 
>>> "\3156}\373\312w\254iBnD\001ܹ˾\353&*\350Sjz߃/\017\261\346\320~\260Z\367X\231F\275\023\331St\237b\223LSI\276\335֨\b\341\335TW\2772\376\303\313\336pN\265\023\352\2054\002\a/˦9R\321\366p\f\352\204P\360\270\371\250\\\aE?7s\377\253\217b\262%\214\317m",
>>> tbl=tbl@entry=0xfe000e1cc200) at 
>>> /usr/src/sys/opencrypto/gfmult.c:268
>>> #17 0x8099ab13 in AES_GMAC_Update (ctx=0xfe000e1cc200,
>>> vdata=, len=144) at /usr/src/sys/opencrypto/gmac.c:94
>>> #18 0x80998ae0 in swcr_gcm (ses=0xf8020376a048,
>>> crp=0xf80023386c08) at /usr/src/sys/opencrypto/cryptosoft.c:505
>>> #19 0x80997c4a in swcr_process (dev=,
>>> crp=0xf80023386c08, hint=)
>>> at /usr/src/sys/opencrypto/cryptosoft.c:1680
>>>
>> Do you have a bit more information about what happened here?
>> As in: can you reproduce this, or do you have any idea what
>> was going on to trigger this?  Did anything change in your
>> setup (i.e. is if_ovpn use new, or did you update either kernel
>> or userspace or ?
>
> I updated the system on the date displayed by 'uname -a'.
> This included both base system and all installed ports;
> including openvpn.  I normally leave the system running Xorg,
> and I would find the system in a "locked-up" blank-screen
> saver state.  I assumed I was having a Xorg/drm-kmod problem,
> so I shut Xorg down last night.  The above panic was waiting
> for me this morning.  The panic happens every night.
>
> Note , I don't use if_ovpn.  This a client over a tun0 device
> through wlan0.
>
The backtrace contradicts you, but DCO is relatively transparent, so it’s quite 
possible you didn’t notice. It defaults to being enabled, and ought to just 
work.

>>
>> Do you have the full core dump to poke at?
>>
>
> Yes, I do, but it's on a home system.  I can put it up on
> my kargl@freefall later tonight (in 10-ish hours).  I'll
> include the dmesg.boot so you have some idea about the
> hardware.
>
That’d be very helpful, thanks.

Best regards,
Kristof



Re: panic in cypto code

2023-10-05 Thread Steve Kargl
On Thu, Oct 05, 2023 at 11:33:46PM +0200, Kristof Provost wrote:
> On 5 Oct 2023, at 19:34, Steve Kargl wrote:
> > On Thu, Oct 05, 2023 at 06:05:37PM +0200, Kristof Provost wrote:
> >>
> >> On 5 Oct 2023, at 17:36, Steve Kargl wrote:
> >>> In case anyone else is using openvpn.
> >>>

(dump removed to keep this brief)

> >>>
> >> Do you have a bit more information about what happened here?
> >> As in: can you reproduce this, or do you have any idea what
> >> was going on to trigger this?  Did anything change in your
> >> setup (i.e. is if_ovpn use new, or did you update either kernel
> >> or userspace or ?
> >
> > I updated the system on the date displayed by 'uname -a'.
> > This included both base system and all installed ports;
> > including openvpn.  I normally leave the system running Xorg,
> > and I would find the system in a "locked-up" blank-screen
> > saver state.  I assumed I was having a Xorg/drm-kmod problem,
> > so I shut Xorg down last night.  The above panic was waiting
> > for me this morning.  The panic happens every night.
> >
> > Note , I don't use if_ovpn.  This a client over a tun0 device
> > through wlan0.
> >
> The backtrace contradicts you, but DCO is relatively transparent,
> so it’s quite possible you didn’t notice. It defaults to being
> enabled, and ought to just work.

Certainly, possible as I only quickly reviewed the dump.
The kernel is a custom kernel.  I don't recall adding a 
"device opvn" line.  Perhaps, starting openvpn autoloads a 
kernel module.  I'll need to check when I get home.

> >>
> >> Do you have the full core dump to poke at?
> >>
> >
> > Yes, I do, but it's on a home system.  I can put it up on
> > my kargl@freefall later tonight (in 10-ish hours).  I'll
> > include the dmesg.boot so you have some idea about the
> > hardware.
> >
> That’d be very helpful, thanks.
> 

I'll ping you off list when it's available.

-- 
Steve



Re: panic in cypto code

2023-10-05 Thread Steve Kargl
On Thu, Oct 05, 2023 at 03:11:02PM -0700, Steve Kargl wrote:
> 
> I'll ping you off list when it's available.
> 

Well, this is interesting.  I cannot upload the files to 
a location from which I can then put them up on freefall. :(

% scp -P1234 kernel.debug 10.95.76.21:
kernel.debug0%  255KB 255.0KB/s   04:01 
ETAclient_loop: send disconnect: Broken pipe
lost connection
% scp -P1234 vmcore.2  10.95.76.21:
vmcore.20%  255KB 254.9KB/s   49:46 
ETAclient_loop: send disconnect: Broken pipe
lost connection

Looks like if_ovpn,ko is autoloaded.
%  kldstat | grep ovpn
231 0x82042000 6650 if_ovpn.ko

Don't know what if_ovpn.ko does in hijacking tun0, but dying after
255kB is likely not correct.

-- 
Steve