Begin forwarded message:

Date: Tue, 6 Sep 2005 03:49:57 -0700
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: [Bugme-new] [Bug 5194] New: IPSec related OOps in 2.6.13


http://bugzilla.kernel.org/show_bug.cgi?id=5194

           Summary: IPSec related OOps in 2.6.13
    Kernel Version: 2.6.13
            Status: NEW
          Severity: high
             Owner: [EMAIL PROTECTED]
         Submitter: [EMAIL PROTECTED]


Most recent kernel where this bug did not occur: 2.6.12
Distribution: Slackware

Software Environment:

Linux gate 2.6.13 #1 Sat Sep 3 11:32:13 CEST 2005 i686 unknown

Gnu C                  3.3.5
Gnu make               3.80
binutils               2.15.92.0.2
util-linux             2.11z
mount                  2.11z
module-init-tools      3.1
e2fsprogs              1.35
reiserfsprogs          line
reiser4progs           line
Linux C Library        2.3.5
Dynamic linker (ldd)   2.3.5
Linux C++ Library      5.0.7
Procps                 3.1.8
Net-tools              1.60
Kbd                    1.08
Sh-utils               2.0
Modules Loaded

Problem Description:

Oops: 0000 [#1]
PREEMPT
Modules linked in:
CPU:    0
EIP:    0060:[<c01f562c>]    Not tainted VLI
EFLAGS: 00010216   (2.6.13)
EIP is at sha1_update+0x7c/0x160
eax: dce92e6c   ebx: 00000014   ecx: 00000005   edx: 00000104
esi: 907529d5   edi: dce92eb4   ebp: 907529d5   esp: c04c5c98
ds: 007b   es: 007b   ss: 0068
Process swapper (pid: 0, threadinfo=c04c5000 task=c03eeb80)
Stack: dce92e74 dbe09db4 c04c5ca4 00000000 00000000 00000000 00000000 00000000
       00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
       00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call Trace:
 [<c01f39e0>] update+0x80/0xb0
 [<c01f4106>] crypto_hmac_update+0x26/0x40
 [<c036d370>] skb_icv_walk+0xf0/0x200
 [<c01f4071>] crypto_hmac_init+0xd1/0x140
 [<c0348a23>] esp_hmac_digest+0x93/0xf0
 [<c01f40e0>] crypto_hmac_update+0x0/0x40
 [<c01f3644>] cbc_encrypt+0x54/0x60
 [<c0347ecb>] esp_output+0x38b/0x4a0
 [<c0366e1a>] xfrm4_output+0x7a/0x1a0
 [<c031537b>] ip_forward+0x17b/0x2e0
 [<c03154e0>] ip_forward_finish+0x0/0x60
 [<c0313a96>] ip_rcv+0x266/0x520
 [<c0313f30>] ip_rcv_finish+0x0/0x2d0
 [<c02e5918>] netif_receive_skb+0x198/0x240
 [<c02e5a3f>] process_backlog+0x7f/0x100
 [<c02e5b4e>] net_rx_action+0x8e/0x1c0
 [<c011f7cd>] __do_softirq+0x8d/0xa0
 [<c0105493>] do_softirq+0x63/0x70
 =======================
 [<c011f8a8>] irq_exit+0x38/0x40
 [<c0105359>] do_IRQ+0x59/0x80
 [<c01035fe>] common_interrupt+0x1a/0x20
 [<c0241d07>] acpi_processor_idle+0x123/0x299
 [<c01009d8>] cpu_idle+0x48/0x60
 [<c044b7b7>] start_kernel+0x157/0x180
 [<c044b390>] unknown_bootoption+0x0/0x1b0
Code: 0f 86 f9 00 00 00 8b 84 24 60 01 00 00 bb 40 00 00 00 29 f3 81 fb ff 01 00
00 8d 7c 06 1c 0f 87 c4 00 00 00 89 d9 89 ee
c1 e9 02 <f3> a5 89 d9 83 e1 03 74 02 f3 a4 8b 84 24 60 01 00 00 8b b4 24
 <0>Kernel panic - not syncing: Fatal exception in interrupt


Steps to reproduce:
Setup IPsec & wait. Sometimes 30m, sometimes 5h.

------- You are receiving this mail because: -------
You are on the CC list for the bug, or are watching someone who is.
-
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to