[Openswan dev] openswan bug reporting.... (fwd)
David McCullough
david_mccullough at mcafee.com
Mon Jun 6 19:41:34 EDT 2011
Jivin Paul Wouters lays it down ...
> On Mon, 6 Jun 2011, Paul Wouters wrote:
>
> > I still have problems with 2.6.34rc6 on one machine. I've
>
> I also managed to get a kernel panic on l2tp.xelerance.com:
Thats crash looks like ixs->skb or ixs->skb->dev is null at the top of
ipsec_xmit_send ?
Try this ??
heers,
Davidm
diff --git a/linux/net/ipsec/ipsec_xmit.c b/linux/net/ipsec/ipsec_xmit.c
index 53e14df..c668c41 100644
--- a/linux/net/ipsec/ipsec_xmit.c
+++ b/linux/net/ipsec/ipsec_xmit.c
@@ -2595,6 +2595,9 @@ ipsec_xmit_send(struct ipsec_xmit_state *ixs)
int error;
int is_mast_packet;
+ if (ixs->skb == NULL || ixs->skb->dev == NULL)
+ return IPSEC_XMIT_NODEV;
+
/* check if this packet is sent from the mast, before we route */
is_mast_packet = ipsec_is_mast_device(ixs->skb->dev);
>
> -bash-3.2# ipsec version
> Linux Openswan 2.6.34rc6 (klips)
> See `ipsec --copyright' for copyright information.
> -bash-3.2# [ 139.484734] BUG: unable to handle kernel NULL pointer dereference at 0000000000000078
> [ 139.484767] IP: [<ffffffffa022902e>] ipsec_set_dst+0x7e/0x290 [ipsec]
> [ 139.484800] PGD 0
> [ 139.484810] Oops: 0000 [#1] SMP
> [ 139.484824] last sysfs file: /sys/module/ipsec/parameters/ipsec_ixs_cache_allocated_max
> [ 139.484838] CPU 0
> [ 139.484848] Modules linked in: iptable_mangle ipsec lzo lzo_decompress lzo_compress cast6 cts ctr gcm ccm serpent twofish twofish_common xcbc camellia sha512_generic sha256_generic deflate zlib_deflate crypto_null arc4 cryptd aes_x86_64 aes_generic sha1_generic cast5 blowfish des_generic cryptosoft ipt_REJECT xt_tcpudp iptable_filter ip_tables x_tables be2iscsi ib_iser rdma_cm ib_cm iw_cm ib_sa ib_mad ib_core ib_addr iscsi_tcp bnx2i cnic uio cxgb3i cxgb3 mdio libiscsi_tcp libiscsi scsi_transport_iscsi binfmt_misc parport_pc lp parport nvram snd_seq_dummy snd_seq_oss snd_seq_midi_event snd_seq snd_seq_device snd_pcm_oss evbug snd_mixer_oss snd_pcm snd_timer snd soundcore snd_page_alloc xen_netfront pcspkr xen_blkfront
> [ 139.485140] Pid: 4, comm: ksoftirqd/0 Not tainted 2.6.32-29-server #58ocf2011+saref1
> [ 139.485154] RIP: e030:[<ffffffffa022902e>] [<ffffffffa022902e>] ipsec_set_dst+0x7e/0x290 [ipsec]
> [ 139.485178] RSP: e02b:ffff880003324df8 EFLAGS: 00010246
> [ 139.485188] RAX: 0000000000000000 RBX: ffff88000e080000 RCX: 0000000000000000
> [ 139.485200] RDX: ffff880003324df8 RSI: 0000000000000000 RDI: ffff880003324e38
> [ 139.485212] RBP: ffff880003324e68 R08: 0000000000000004 R09: 0000000000000004
> [ 139.485223] R10: ffff88000f3ec03c R11: 0000000000000004 R12: 00000000000003e7
> [ 139.485235] R13: 0000000000000001 R14: 0000000000000006 R15: ffff88000fd07fd8
> [ 139.485253] FS: 00007f13adf576e0(0000) GS:ffff880003321000(0000) knlGS:0000000000000000
> [ 139.485266] CS: e033 DS: 0000 ES: 0000 CR0: 000000008005003b
> [ 139.485277] CR2: 0000000000000078 CR3: 000000000eed6000 CR4: 0000000000000660
> [ 139.485289] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
> [ 139.485301] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000000
> [ 139.485314] Process ksoftirqd/0 (pid: 4, threadinfo ffff88000fd06000, task ffff88000fcfc500)
> [ 139.485327] Stack:
> [ 139.485334] 0000000000000000 0000000000000000 0000000000000000 0000000000000000
> [ 139.485354] <0> 0000000000000000 0000000000000000 0000000000000000 0000000000000000
> [ 139.485379] <0> ffffffff8100f34f 000000006508c6ca ffff88000ecdfc00 ffff88000e080000
> [ 139.485408] Call Trace:
> [ 139.485415] <IRQ>
> [ 139.485433] [<ffffffff8100f34f>] ? xen_restore_fl_direct_end+0x0/0x1
> [ 139.485454] [<ffffffffa022c917>] ipsec_xmit_send+0x37/0x400 [ipsec]
> [ 139.485474] [<ffffffffa022940f>] ? ipsec_nat_encap+0xef/0x1f0 [ipsec]
> [ 139.485495] [<ffffffffa0233061>] ipsec_mast_xsm_complete+0x91/0xb0 [ipsec]
> [ 139.485515] [<ffffffffa0228d00>] ipsec_xsm+0xe0/0x390 [ipsec]
> [ 139.485538] [<ffffffffa0243d11>] ipsec_ocf_skbq_process+0x21/0x50 [ipsec]
> [ 139.485554] [<ffffffff8106d325>] tasklet_action+0xd5/0xe0
> [ 139.485567] [<ffffffff8106ed47>] __do_softirq+0xb7/0x1e0
> [ 139.485581] [<ffffffff810142ec>] call_softirq+0x1c/0x30
> [ 139.485591] <EOI>
> [ 139.485603] [<ffffffff81015cb5>] do_softirq+0x65/0xa0
> [ 139.485615] [<ffffffff8106e890>] ksoftirqd+0x80/0x110
> [ 139.485628] [<ffffffff8106e810>] ? ksoftirqd+0x0/0x110
> [ 139.485642] [<ffffffff810857c6>] kthread+0x96/0xa0
> [ 139.485654] [<ffffffff810141ea>] child_rip+0xa/0x20
> [ 139.485668] [<ffffffff810133d1>] ? int_ret_from_sys_call+0x7/0x1b
> [ 139.485682] [<ffffffff81013b5d>] ? retint_restore_args+0x5/0x6
> [ 139.485695] [<ffffffff810141e0>] ? child_rip+0x0/0x20
> [ 139.485705] Code: c9 c3 0f 1f 00 48 8d 55 90 31 c0 b9 08 00 00 00 48 89 d7 f3 48 ab 48 8b 03 48 8b 8b 40 01 00 00 48 89 48 20 48 8b 83 40 01 00 00 <8b> 40 78 89 45 90 48 8b 43 30 0f b6 08 83 e1 f0 80 f9 60 0f 84
> [ 139.485911] RIP [<ffffffffa022902e>] ipsec_set_dst+0x7e/0x290 [ipsec]
> [ 139.485932] RSP <ffff880003324df8>
> [ 139.485940] CR2: 0000000000000078
> [ 139.485952] ---[ end trace 057896259d597475 ]---
> [ 139.485962] Kernel panic - not syncing: Fatal exception in interrupt
> [ 139.485974] Pid: 4, comm: ksoftirqd/0 Tainted: G D 2.6.32-29-server #58ocf2011+saref1
> [ 139.485987] Call Trace:
> [ 139.485994] <IRQ> [<ffffffff8155ef8f>] panic+0x78/0x139
> [ 139.486016] [<ffffffff81562f0a>] oops_end+0xea/0xf0
> [ 139.486030] [<ffffffff81040ba3>] no_context+0xf3/0x190
> [ 139.486043] [<ffffffff81040d65>] __bad_area_nosemaphore+0x125/0x1e0
> [ 139.486057] [<ffffffff8100ebcd>] ? xen_force_evtchn_callback+0xd/0x10
> [ 139.486071] [<ffffffff81040e33>] bad_area_nosemaphore+0x13/0x20
> [ 139.486084] [<ffffffff81564ab4>] do_page_fault+0x2e4/0x3b0
> [ 139.486097] [<ffffffff81562245>] page_fault+0x25/0x30
> [ 139.486115] [<ffffffffa022902e>] ? ipsec_set_dst+0x7e/0x290 [ipsec]
> [ 139.486132] [<ffffffff81094efa>] ? tick_program_event+0x2a/0x30
> [ 139.486145] [<ffffffff8100f34f>] ? xen_restore_fl_direct_end+0x0/0x1
> [ 139.486164] [<ffffffffa022c917>] ipsec_xmit_send+0x37/0x400 [ipsec]
> [ 139.486183] [<ffffffffa022940f>] ? ipsec_nat_encap+0xef/0x1f0 [ipsec]
> [ 139.486203] [<ffffffffa0233061>] ipsec_mast_xsm_complete+0x91/0xb0 [ipsec]
> [ 139.486222] [<ffffffffa0228d00>] ipsec_xsm+0xe0/0x390 [ipsec]
> [ 139.486244] [<ffffffffa0243d11>] ipsec_ocf_skbq_process+0x21/0x50 [ipsec]
> [ 139.486258] [<ffffffff8106d325>] tasklet_action+0xd5/0xe0
> [ 139.486273] [<ffffffff8106ed47>] __do_softirq+0xb7/0x1e0
> [ 139.486286] [<ffffffff810142ec>] call_softirq+0x1c/0x30
> [ 139.486295] <EOI> [<ffffffff81015cb5>] do_softirq+0x65/0xa0
> [ 139.486314] [<ffffffff8106e890>] ksoftirqd+0x80/0x110
> [ 139.486326] [<ffffffff8106e810>] ? ksoftirqd+0x0/0x110
> [ 139.486338] [<ffffffff810857c6>] kthread+0x96/0xa0
> [ 139.486351] [<ffffffff810141ea>] child_rip+0xa/0x20
> [ 139.486364] [<ffffffff810133d1>] ? int_ret_from_sys_call+0x7/0x1b
> [ 139.486377] [<ffffffff81013b5d>] ? retint_restore_args+0x5/0x6
> [ 139.493784] [<ffffffff810141e0>] ? child_rip+0x0/0x20
>
>
>
>
--
David McCullough, david_mccullough at mcafee.com, Ph:+61 734352815
McAfee - SnapGear http://www.mcafee.com http://www.uCdot.org
More information about the Dev
mailing list