Re: IPsec/crypto kernel panic in 2.6.[456]

From: Christophe Saout
Date: Fri May 21 2004 - 19:57:51 EST


Am Mi, den 19.05.2004 um 21:48 Uhr +0200 schrieb Tobias Ringström:

> I have not analyzed the code closely, so I cannot say for certain that
> there is a problem with that specific changeset, and I'm certainly not
> out to blame anyone, but reverting it at least seems to fix the problem.
> The panic occurs when I receive more than a little TCP data in an
> IPsec ESP tunnel. I'm of course willing to test patches or provide
> further info if required.

I've been using linux 2.6. IPSec myself for quite some time and never
seen this. Hmm. What kind of tunnel is this? How large are the packets
involved?

Can you send me your .config and tell me what compiler was used, and
perhaps the object files in your kernel crypto/ directory?

> eax: 0030f000 ebx: 00030f00 ecx: 1b24b797 edx: ba4d7f77
> esi: dcf91438 edi: 77d89bb3 ebp: c040fbb0 esp: c040fb5c
^^^^^^^^

What kind of address is this? Something random? The ESP code uses
in-place decryption, so this should point on the stack.

> ds: 007b es: 007b ss: 0068
> Process swapper (pid: 0, threadinfo=c040e000 task=c0386a40)
> Stack:
> 77d89bb3 dcf91330 da6e4458 e38c28ed dcf91438 77d89bb3 c040fbf0 77d89bb3
^^^^^^^^ ^^^^^^^^ ^^^^^^^

Here it is again.


-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/