[Openswan dev] openswan bug reporting.... (fwd)

Paul Wouters paul at xelerance.com
Mon Jun 6 18:09:36 EDT 2011


On Mon, 6 Jun 2011, Paul Wouters wrote:

> I still have problems with 2.6.34rc6 on one machine. I've

I also managed to get a kernel panic on l2tp.xelerance.com:

-bash-3.2# ipsec version
Linux Openswan 2.6.34rc6 (klips)
See `ipsec --copyright' for copyright information.
-bash-3.2# [  139.484734] BUG: unable to handle kernel NULL pointer dereference at 0000000000000078
[  139.484767] IP: [<ffffffffa022902e>] ipsec_set_dst+0x7e/0x290 [ipsec]
[  139.484800] PGD 0 
[  139.484810] Oops: 0000 [#1] SMP 
[  139.484824] last sysfs file: /sys/module/ipsec/parameters/ipsec_ixs_cache_allocated_max
[  139.484838] CPU 0 
[  139.484848] Modules linked in: iptable_mangle ipsec lzo lzo_decompress lzo_compress cast6 cts ctr gcm ccm serpent twofish twofish_common xcbc camellia sha512_generic sha256_generic deflate zlib_deflate crypto_null arc4 cryptd aes_x86_64 aes_generic sha1_generic cast5 blowfish des_generic cryptosoft ipt_REJECT xt_tcpudp iptable_filter ip_tables x_tables be2iscsi ib_iser rdma_cm ib_cm iw_cm ib_sa ib_mad ib_core ib_addr iscsi_tcp bnx2i cnic uio cxgb3i cxgb3 mdio libiscsi_tcp libiscsi scsi_transport_iscsi binfmt_misc parport_pc lp parport nvram snd_seq_dummy snd_seq_oss snd_seq_midi_event snd_seq snd_seq_device snd_pcm_oss evbug snd_mixer_oss snd_pcm snd_timer snd soundcore snd_page_alloc xen_netfront pcspkr xen_blkfront
[  139.485140] Pid: 4, comm: ksoftirqd/0 Not tainted 2.6.32-29-server #58ocf2011+saref1 
[  139.485154] RIP: e030:[<ffffffffa022902e>]  [<ffffffffa022902e>] ipsec_set_dst+0x7e/0x290 [ipsec]
[  139.485178] RSP: e02b:ffff880003324df8  EFLAGS: 00010246
[  139.485188] RAX: 0000000000000000 RBX: ffff88000e080000 RCX: 0000000000000000
[  139.485200] RDX: ffff880003324df8 RSI: 0000000000000000 RDI: ffff880003324e38
[  139.485212] RBP: ffff880003324e68 R08: 0000000000000004 R09: 0000000000000004
[  139.485223] R10: ffff88000f3ec03c R11: 0000000000000004 R12: 00000000000003e7
[  139.485235] R13: 0000000000000001 R14: 0000000000000006 R15: ffff88000fd07fd8
[  139.485253] FS:  00007f13adf576e0(0000) GS:ffff880003321000(0000) knlGS:0000000000000000
[  139.485266] CS:  e033 DS: 0000 ES: 0000 CR0: 000000008005003b
[  139.485277] CR2: 0000000000000078 CR3: 000000000eed6000 CR4: 0000000000000660
[  139.485289] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  139.485301] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000000
[  139.485314] Process ksoftirqd/0 (pid: 4, threadinfo ffff88000fd06000, task ffff88000fcfc500)
[  139.485327] Stack:
[  139.485334]  0000000000000000 0000000000000000 0000000000000000 0000000000000000
[  139.485354] <0> 0000000000000000 0000000000000000 0000000000000000 0000000000000000
[  139.485379] <0> ffffffff8100f34f 000000006508c6ca ffff88000ecdfc00 ffff88000e080000
[  139.485408] Call Trace:
[  139.485415]  <IRQ> 
[  139.485433]  [<ffffffff8100f34f>] ? xen_restore_fl_direct_end+0x0/0x1
[  139.485454]  [<ffffffffa022c917>] ipsec_xmit_send+0x37/0x400 [ipsec]
[  139.485474]  [<ffffffffa022940f>] ? ipsec_nat_encap+0xef/0x1f0 [ipsec]
[  139.485495]  [<ffffffffa0233061>] ipsec_mast_xsm_complete+0x91/0xb0 [ipsec]
[  139.485515]  [<ffffffffa0228d00>] ipsec_xsm+0xe0/0x390 [ipsec]
[  139.485538]  [<ffffffffa0243d11>] ipsec_ocf_skbq_process+0x21/0x50 [ipsec]
[  139.485554]  [<ffffffff8106d325>] tasklet_action+0xd5/0xe0
[  139.485567]  [<ffffffff8106ed47>] __do_softirq+0xb7/0x1e0
[  139.485581]  [<ffffffff810142ec>] call_softirq+0x1c/0x30
[  139.485591]  <EOI> 
[  139.485603]  [<ffffffff81015cb5>] do_softirq+0x65/0xa0
[  139.485615]  [<ffffffff8106e890>] ksoftirqd+0x80/0x110
[  139.485628]  [<ffffffff8106e810>] ? ksoftirqd+0x0/0x110
[  139.485642]  [<ffffffff810857c6>] kthread+0x96/0xa0
[  139.485654]  [<ffffffff810141ea>] child_rip+0xa/0x20
[  139.485668]  [<ffffffff810133d1>] ? int_ret_from_sys_call+0x7/0x1b
[  139.485682]  [<ffffffff81013b5d>] ? retint_restore_args+0x5/0x6
[  139.485695]  [<ffffffff810141e0>] ? child_rip+0x0/0x20
[  139.485705] Code: c9 c3 0f 1f 00 48 8d 55 90 31 c0 b9 08 00 00 00 48 89 d7 f3 48 ab 48 8b 03 48 8b 8b 40 01 00 00 48 89 48 20 48 8b 83 40 01 00 00 <8b> 40 78 89 45 90 48 8b 43 30 0f b6 08 83 e1 f0 80 f9 60 0f 84 
[  139.485911] RIP  [<ffffffffa022902e>] ipsec_set_dst+0x7e/0x290 [ipsec]
[  139.485932]  RSP <ffff880003324df8>
[  139.485940] CR2: 0000000000000078
[  139.485952] ---[ end trace 057896259d597475 ]---
[  139.485962] Kernel panic - not syncing: Fatal exception in interrupt
[  139.485974] Pid: 4, comm: ksoftirqd/0 Tainted: G      D    2.6.32-29-server #58ocf2011+saref1
[  139.485987] Call Trace:
[  139.485994]  <IRQ>  [<ffffffff8155ef8f>] panic+0x78/0x139
[  139.486016]  [<ffffffff81562f0a>] oops_end+0xea/0xf0
[  139.486030]  [<ffffffff81040ba3>] no_context+0xf3/0x190
[  139.486043]  [<ffffffff81040d65>] __bad_area_nosemaphore+0x125/0x1e0
[  139.486057]  [<ffffffff8100ebcd>] ? xen_force_evtchn_callback+0xd/0x10
[  139.486071]  [<ffffffff81040e33>] bad_area_nosemaphore+0x13/0x20
[  139.486084]  [<ffffffff81564ab4>] do_page_fault+0x2e4/0x3b0
[  139.486097]  [<ffffffff81562245>] page_fault+0x25/0x30
[  139.486115]  [<ffffffffa022902e>] ? ipsec_set_dst+0x7e/0x290 [ipsec]
[  139.486132]  [<ffffffff81094efa>] ? tick_program_event+0x2a/0x30
[  139.486145]  [<ffffffff8100f34f>] ? xen_restore_fl_direct_end+0x0/0x1
[  139.486164]  [<ffffffffa022c917>] ipsec_xmit_send+0x37/0x400 [ipsec]
[  139.486183]  [<ffffffffa022940f>] ? ipsec_nat_encap+0xef/0x1f0 [ipsec]
[  139.486203]  [<ffffffffa0233061>] ipsec_mast_xsm_complete+0x91/0xb0 [ipsec]
[  139.486222]  [<ffffffffa0228d00>] ipsec_xsm+0xe0/0x390 [ipsec]
[  139.486244]  [<ffffffffa0243d11>] ipsec_ocf_skbq_process+0x21/0x50 [ipsec]
[  139.486258]  [<ffffffff8106d325>] tasklet_action+0xd5/0xe0
[  139.486273]  [<ffffffff8106ed47>] __do_softirq+0xb7/0x1e0
[  139.486286]  [<ffffffff810142ec>] call_softirq+0x1c/0x30
[  139.486295]  <EOI>  [<ffffffff81015cb5>] do_softirq+0x65/0xa0
[  139.486314]  [<ffffffff8106e890>] ksoftirqd+0x80/0x110
[  139.486326]  [<ffffffff8106e810>] ? ksoftirqd+0x0/0x110
[  139.486338]  [<ffffffff810857c6>] kthread+0x96/0xa0
[  139.486351]  [<ffffffff810141ea>] child_rip+0xa/0x20
[  139.486364]  [<ffffffff810133d1>] ? int_ret_from_sys_call+0x7/0x1b
[  139.486377]  [<ffffffff81013b5d>] ? retint_restore_args+0x5/0x6
[  139.493784]  [<ffffffff810141e0>] ? child_rip+0x0/0x20




More information about the Dev mailing list