Test system. kernel is 2.6.0-test1 from bk (current as of Fri, July 25), talking to a 2.4.21 kernel with IPSec backport. IPSec is tunnel mode, ESP and AH with AES and MD5 for phase 1 and phase 2. PFS is off. default lifetimes. no modules loaded on 2.6 kernel. Starting tetheral (intf going into promiscuous mode ?) triggers this bug consistently. Ranjeet. ------------------------------------------------- Oops report. ------------------------------------------------- kernel BUG at net/xfrm/xfrm_state.c:54! invalid operand: 0000 [#1] CPU: 0 EIP: 0060:[<c041d62c>] Not tainted EFLAGS: 00010202 EIP is at xfrm_state_gc_destroy+0x1c/0xb8 eax: 00000001 ebx: c535a728 ecx: c12e8000 edx: c04dcab0 esi: c12e9f48 edi: 00000283 ebp: c12e9f3c esp: c12e9f34 ds: 007b es: 007b ss: 0068 Process events/0 (pid: 3, threadinfo=c12e8000 task=c12ecc80) Stack: c535a844 c12e9f48 c12e9f58 c041d745 c535a728 c535a728 c535a728 c05e8e24 c05e8e20 c12e9fec c012b608 00000000 c12e9fa0 00000000 cf755464 cf75545c c12e8000 c12e8000 c12e8000 c12e8000 c12e8000 00000000 c041d6c8 c12e8000 Call Trace: [<c041d745>] xfrm_state_gc_task+0x7d/0x93 [<c012b608>] worker_thread+0x1df/0x2c0 [<c041d6c8>] xfrm_state_gc_task+0x0/0x93 [<c0119b40>] default_wake_function+0x0/0x2e [<c01090e2>] ret_from_fork+0x6/0x14 [<c0119b40>] default_wake_function+0x0/0x2e [<c012b429>] worker_thread+0x0/0x2c0 [<c0107291>] kernel_thread_helper+0x5/0xb Code: 0f 0b 36 00 18 cf 4b c0 8b 83 cc 00 00 00 85 c0 75 7d 8b 83 KERNEL: assertion (x->km.state == XFRM_STATE_DEAD) failed at net/xfrm/ xfrm_state.c(193) ------------------------------------------------- Ksymoops - output. ------------------------------------------------- ksymoops 2.4.9 on i686 2.6.0-test1-bk. Options used -v /usr/src/linux/vmlinux (specified) -k /proc/ksyms (default) -l /proc/modules (default) -o /lib/modules/2.6.0-test1-bk/ (default) -m /usr/src/linux/System.map (specified) Error (regular_file): read_ksyms stat /proc/ksyms failed ksymoops: No such file or directory No modules in ksyms, skipping objects No ksyms, skipping lsmod CPU: 0 EIP: 0060:[<c041d62c>] Not tainted Using defaults from ksymoops -t elf32-i386 -a i386 EFLAGS: 00010202 eax: 00000001 ebx: c535a728 ecx: c12e8000 edx: c04dcab0 esi: c12e9f48 edi: 00000283 ebp: c12e9f3c esp: c12e9f34 ds: 007b es: 007b ss: 0068 Stack: c535a844 c12e9f48 c12e9f58 c041d745 c535a728 c535a728 c535a728 c05e8e24 c05e8e20 c12e9fec c012b608 00000000 c12e9fa0 00000000 cf755464 cf75545c c12e8000 c12e8000 c12e8000 c12e8000 c12e8000 00000000 c041d6c8 c12e8000 Code: 0f 0b 36 00 18 cf 4b c0 8b 83 cc 00 00 00 85 c0 75 7d 8b 83 >> EIP; c041d62c <xfrm_state_gc_destroy+1c/b8> <===== >> ebx; c535a728 <__crc_parport_read+7ef3d/64e113> >> ecx; c12e8000 <__crc_memcpy_tokerneliovec+89f78/4e7a4d> >> edx; c04dcab0 <__crc_blk_insert_request+62/39a> >> esi; c12e9f48 <__crc_memcpy_tokerneliovec+8bec0/4e7a4d> >> ebp; c12e9f3c <__crc_memcpy_tokerneliovec+8beb4/4e7a4d> >> esp; c12e9f34 <__crc_memcpy_tokerneliovec+8beac/4e7a4d> Code; c041d62c <xfrm_state_gc_destroy+1c/b8> 00000000 <_EIP>: Code; c041d62c <xfrm_state_gc_destroy+1c/b8> <===== 0: 0f 0b ud2a <===== Code; c041d62e <xfrm_state_gc_destroy+1e/b8> 2: 36 00 18 add %bl,%ss:(%eax) Code; c041d631 <xfrm_state_gc_destroy+21/b8> 5: cf iret Code; c041d632 <xfrm_state_gc_destroy+22/b8> 6: 4b dec %ebx Code; c041d633 <xfrm_state_gc_destroy+23/b8> 7: c0 8b 83 cc 00 00 00 rorb $0x0,0xcc83(%ebx) Code; c041d63a <xfrm_state_gc_destroy+2a/b8> e: 85 c0 test %eax,%eax Code; c041d63c <xfrm_state_gc_destroy+2c/b8> 10: 75 7d jne 8f <_EIP+0x8f> Code; c041d63e <xfrm_state_gc_destroy+2e/b8> 12: 8b 83 00 00 00 00 mov 0x0(%ebx),%eax 1 error issued. Results may not be reliable. -- Ranjeet Shetye Senior Software Engineer Zultys Technologies Ranjeet dot Shetye2 at Zultys dot com http://www.zultys.com/ -- The views, opinions, and judgements expressed in this message are solely those of the author. The message contents have not been reviewed or approved by Zultys. - : send the line "unsubscribe linux-net" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html