On Sun, Feb 14, 2010 at 07:45:07PM +0200, Alexey Dobriyan wrote: > BUG: unable to handle kernel NULL pointer dereference at 0000000000000018 > IP: [<ffffffff81145bf4>] crypto_remove_spawns+0xd4/0x340 > PGD bdc48067 PUD bc954067 PMD 0 > Oops: 0000 [#1] PREEMPT SMP DEBUG_PAGEALLOC > last sysfs file: /sys/devices/pci0000:00/0000:00:1f.2/host0/target0:0:0/0:0:0:0/block/sda/uevent > CPU 0 > Pid: 16500, comm: rmmod Not tainted 2.6.33-rc7-next-20100212+ #9 P5E/P5E > RIP: 0010:[<ffffffff81145bf4>] [<ffffffff81145bf4>] crypto_remove_spawns+0xd4/0x340 > RSP: 0018:ffff8800bc9dfde8 EFLAGS: 00010282 > RAX: ffff8800bc901498 RBX: 0000000000000000 RCX: ffff8800ba859610 > RDX: ffff8800bc900380 RSI: ffff8800bc9dfe18 RDI: ffff8800bc9015c0 > RBP: ffff8800bc9dfe68 R08: 0000000000000000 R09: 0000000000000000 > R10: 0000000000000000 R11: 0000000000000000 R12: ffff8800bc901488 > R13: ffff8800bc9dfe18 R14: ffffffffa05817e0 R15: 0000000000000000 > FS: 00007fdd2ec1c6f0(0000) GS:ffff880002200000(0000) knlGS:0000000000000000 > CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b > CR2: 0000000000000018 CR3: 00000000bca34000 CR4: 00000000000006f0 > DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 > DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 > Process rmmod (pid: 16500, threadinfo ffff8800bc9de000, task ffff8800bd53ad90) > Stack: > ffff8800bc9dfe08 ffff8800bc9dfe28 ffff8800bc9dfe98 0000042181636020 > <0> ffff8800bc9dfe08 ffff8800bc9dfe08 ffff8800bc9015c0 ffff8800bc900380 > <0> ffff8800ba859808 ffff8800ba859610 ffff8800bc9dfe98 ffffffffa05817e0 > Call Trace: > [<ffffffff81145eb1>] crypto_remove_alg+0x51/0x60 > [<ffffffff81145ef3>] crypto_unregister_alg+0x33/0x90 > [<ffffffffa058175c>] aes_fini+0x10/0x12 [aes_x86_64] > [<ffffffff8107266c>] sys_delete_module+0x19c/0x250 > [<ffffffff8100256b>] system_call_fastpath+0x16/0x1b > Code: 02 00 eb c3 0f 1f 00 48 8b 47 08 48 8d 75 c0 4c 89 28 49 89 45 08 48 8b 55 c0 e8 a8 fa 02 00 48 8d 45 a0 48 8b 18 48 39 d8 74 44 <4c> 8b 63 18 4d 39 f4 0f 84 4e 02 00 00 48 8b 13 48 8b 43 08 4c > RIP [<ffffffff81145bf4>] crypto_remove_spawns+0xd4/0x340 > RSP <ffff8800bc9dfde8> > CR2: 0000000000000018 > > > crypto_remove_spawns: > > spawn = list_first_entry(spawns, struct crypto_spawn, list); > inst = spawn->inst; > > spawn is NULL here. Is this reproducible every time you unload aes_x86_64 after boot? Please attach your config file? Thanks, -- Visit Openswan at http://www.openswan.org/ Email: Herbert Xu ~{PmV>HI~} <herbert@xxxxxxxxxxxxxxxxxxx> Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt -- To unsubscribe from this list: send the line "unsubscribe linux-crypto" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html