[Openswan dev] openswan bug reporting.... (fwd)

David McCullough david_mccullough at mcafee.com
Mon Jun 6 19:41:34 EDT 2011


Jivin Paul Wouters lays it down ...
> On Mon, 6 Jun 2011, Paul Wouters wrote:
> 
> > I still have problems with 2.6.34rc6 on one machine. I've
> 
> I also managed to get a kernel panic on l2tp.xelerance.com:

Thats crash looks like ixs->skb or ixs->skb->dev is null at the top of
ipsec_xmit_send ?

Try this ??

heers,
Davidm
diff --git a/linux/net/ipsec/ipsec_xmit.c b/linux/net/ipsec/ipsec_xmit.c
index 53e14df..c668c41 100644
--- a/linux/net/ipsec/ipsec_xmit.c
+++ b/linux/net/ipsec/ipsec_xmit.c
@@ -2595,6 +2595,9 @@ ipsec_xmit_send(struct ipsec_xmit_state *ixs)
 	int error;
 	int is_mast_packet;
 
+	if (ixs->skb == NULL || ixs->skb->dev == NULL)
+		return IPSEC_XMIT_NODEV;
+
 	/* check if this packet is sent from the mast, before we route */
 	is_mast_packet = ipsec_is_mast_device(ixs->skb->dev);
 

> 
> -bash-3.2# ipsec version
> Linux Openswan 2.6.34rc6 (klips)
> See `ipsec --copyright' for copyright information.
> -bash-3.2# [  139.484734] BUG: unable to handle kernel NULL pointer dereference at 0000000000000078
> [  139.484767] IP: [<ffffffffa022902e>] ipsec_set_dst+0x7e/0x290 [ipsec]
> [  139.484800] PGD 0 
> [  139.484810] Oops: 0000 [#1] SMP 
> [  139.484824] last sysfs file: /sys/module/ipsec/parameters/ipsec_ixs_cache_allocated_max
> [  139.484838] CPU 0 
> [  139.484848] Modules linked in: iptable_mangle ipsec lzo lzo_decompress lzo_compress cast6 cts ctr gcm ccm serpent twofish twofish_common xcbc camellia sha512_generic sha256_generic deflate zlib_deflate crypto_null arc4 cryptd aes_x86_64 aes_generic sha1_generic cast5 blowfish des_generic cryptosoft ipt_REJECT xt_tcpudp iptable_filter ip_tables x_tables be2iscsi ib_iser rdma_cm ib_cm iw_cm ib_sa ib_mad ib_core ib_addr iscsi_tcp bnx2i cnic uio cxgb3i cxgb3 mdio libiscsi_tcp libiscsi scsi_transport_iscsi binfmt_misc parport_pc lp parport nvram snd_seq_dummy snd_seq_oss snd_seq_midi_event snd_seq snd_seq_device snd_pcm_oss evbug snd_mixer_oss snd_pcm snd_timer snd soundcore snd_page_alloc xen_netfront pcspkr xen_blkfront
> [  139.485140] Pid: 4, comm: ksoftirqd/0 Not tainted 2.6.32-29-server #58ocf2011+saref1 
> [  139.485154] RIP: e030:[<ffffffffa022902e>]  [<ffffffffa022902e>] ipsec_set_dst+0x7e/0x290 [ipsec]
> [  139.485178] RSP: e02b:ffff880003324df8  EFLAGS: 00010246
> [  139.485188] RAX: 0000000000000000 RBX: ffff88000e080000 RCX: 0000000000000000
> [  139.485200] RDX: ffff880003324df8 RSI: 0000000000000000 RDI: ffff880003324e38
> [  139.485212] RBP: ffff880003324e68 R08: 0000000000000004 R09: 0000000000000004
> [  139.485223] R10: ffff88000f3ec03c R11: 0000000000000004 R12: 00000000000003e7
> [  139.485235] R13: 0000000000000001 R14: 0000000000000006 R15: ffff88000fd07fd8
> [  139.485253] FS:  00007f13adf576e0(0000) GS:ffff880003321000(0000) knlGS:0000000000000000
> [  139.485266] CS:  e033 DS: 0000 ES: 0000 CR0: 000000008005003b
> [  139.485277] CR2: 0000000000000078 CR3: 000000000eed6000 CR4: 0000000000000660
> [  139.485289] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
> [  139.485301] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000000
> [  139.485314] Process ksoftirqd/0 (pid: 4, threadinfo ffff88000fd06000, task ffff88000fcfc500)
> [  139.485327] Stack:
> [  139.485334]  0000000000000000 0000000000000000 0000000000000000 0000000000000000
> [  139.485354] <0> 0000000000000000 0000000000000000 0000000000000000 0000000000000000
> [  139.485379] <0> ffffffff8100f34f 000000006508c6ca ffff88000ecdfc00 ffff88000e080000
> [  139.485408] Call Trace:
> [  139.485415]  <IRQ> 
> [  139.485433]  [<ffffffff8100f34f>] ? xen_restore_fl_direct_end+0x0/0x1
> [  139.485454]  [<ffffffffa022c917>] ipsec_xmit_send+0x37/0x400 [ipsec]
> [  139.485474]  [<ffffffffa022940f>] ? ipsec_nat_encap+0xef/0x1f0 [ipsec]
> [  139.485495]  [<ffffffffa0233061>] ipsec_mast_xsm_complete+0x91/0xb0 [ipsec]
> [  139.485515]  [<ffffffffa0228d00>] ipsec_xsm+0xe0/0x390 [ipsec]
> [  139.485538]  [<ffffffffa0243d11>] ipsec_ocf_skbq_process+0x21/0x50 [ipsec]
> [  139.485554]  [<ffffffff8106d325>] tasklet_action+0xd5/0xe0
> [  139.485567]  [<ffffffff8106ed47>] __do_softirq+0xb7/0x1e0
> [  139.485581]  [<ffffffff810142ec>] call_softirq+0x1c/0x30
> [  139.485591]  <EOI> 
> [  139.485603]  [<ffffffff81015cb5>] do_softirq+0x65/0xa0
> [  139.485615]  [<ffffffff8106e890>] ksoftirqd+0x80/0x110
> [  139.485628]  [<ffffffff8106e810>] ? ksoftirqd+0x0/0x110
> [  139.485642]  [<ffffffff810857c6>] kthread+0x96/0xa0
> [  139.485654]  [<ffffffff810141ea>] child_rip+0xa/0x20
> [  139.485668]  [<ffffffff810133d1>] ? int_ret_from_sys_call+0x7/0x1b
> [  139.485682]  [<ffffffff81013b5d>] ? retint_restore_args+0x5/0x6
> [  139.485695]  [<ffffffff810141e0>] ? child_rip+0x0/0x20
> [  139.485705] Code: c9 c3 0f 1f 00 48 8d 55 90 31 c0 b9 08 00 00 00 48 89 d7 f3 48 ab 48 8b 03 48 8b 8b 40 01 00 00 48 89 48 20 48 8b 83 40 01 00 00 <8b> 40 78 89 45 90 48 8b 43 30 0f b6 08 83 e1 f0 80 f9 60 0f 84 
> [  139.485911] RIP  [<ffffffffa022902e>] ipsec_set_dst+0x7e/0x290 [ipsec]
> [  139.485932]  RSP <ffff880003324df8>
> [  139.485940] CR2: 0000000000000078
> [  139.485952] ---[ end trace 057896259d597475 ]---
> [  139.485962] Kernel panic - not syncing: Fatal exception in interrupt
> [  139.485974] Pid: 4, comm: ksoftirqd/0 Tainted: G      D    2.6.32-29-server #58ocf2011+saref1
> [  139.485987] Call Trace:
> [  139.485994]  <IRQ>  [<ffffffff8155ef8f>] panic+0x78/0x139
> [  139.486016]  [<ffffffff81562f0a>] oops_end+0xea/0xf0
> [  139.486030]  [<ffffffff81040ba3>] no_context+0xf3/0x190
> [  139.486043]  [<ffffffff81040d65>] __bad_area_nosemaphore+0x125/0x1e0
> [  139.486057]  [<ffffffff8100ebcd>] ? xen_force_evtchn_callback+0xd/0x10
> [  139.486071]  [<ffffffff81040e33>] bad_area_nosemaphore+0x13/0x20
> [  139.486084]  [<ffffffff81564ab4>] do_page_fault+0x2e4/0x3b0
> [  139.486097]  [<ffffffff81562245>] page_fault+0x25/0x30
> [  139.486115]  [<ffffffffa022902e>] ? ipsec_set_dst+0x7e/0x290 [ipsec]
> [  139.486132]  [<ffffffff81094efa>] ? tick_program_event+0x2a/0x30
> [  139.486145]  [<ffffffff8100f34f>] ? xen_restore_fl_direct_end+0x0/0x1
> [  139.486164]  [<ffffffffa022c917>] ipsec_xmit_send+0x37/0x400 [ipsec]
> [  139.486183]  [<ffffffffa022940f>] ? ipsec_nat_encap+0xef/0x1f0 [ipsec]
> [  139.486203]  [<ffffffffa0233061>] ipsec_mast_xsm_complete+0x91/0xb0 [ipsec]
> [  139.486222]  [<ffffffffa0228d00>] ipsec_xsm+0xe0/0x390 [ipsec]
> [  139.486244]  [<ffffffffa0243d11>] ipsec_ocf_skbq_process+0x21/0x50 [ipsec]
> [  139.486258]  [<ffffffff8106d325>] tasklet_action+0xd5/0xe0
> [  139.486273]  [<ffffffff8106ed47>] __do_softirq+0xb7/0x1e0
> [  139.486286]  [<ffffffff810142ec>] call_softirq+0x1c/0x30
> [  139.486295]  <EOI>  [<ffffffff81015cb5>] do_softirq+0x65/0xa0
> [  139.486314]  [<ffffffff8106e890>] ksoftirqd+0x80/0x110
> [  139.486326]  [<ffffffff8106e810>] ? ksoftirqd+0x0/0x110
> [  139.486338]  [<ffffffff810857c6>] kthread+0x96/0xa0
> [  139.486351]  [<ffffffff810141ea>] child_rip+0xa/0x20
> [  139.486364]  [<ffffffff810133d1>] ? int_ret_from_sys_call+0x7/0x1b
> [  139.486377]  [<ffffffff81013b5d>] ? retint_restore_args+0x5/0x6
> [  139.493784]  [<ffffffff810141e0>] ? child_rip+0x0/0x20
> 
> 
> 
> 

-- 
David McCullough,      david_mccullough at mcafee.com,  Ph:+61 734352815
McAfee - SnapGear      http://www.mcafee.com         http://www.uCdot.org


More information about the Dev mailing list