Hi Moritz,

I just tested with latest Squeeze (and latest kernel). Same problem, another 
state though:

[1046073.600266] Kernel unaligned access at TPC[104ea7fc] 
copy_to_user_state+0x54/0x9c [xfrm_user]
[1046073.715755] Kernel unaligned access at TPC[104ea7fc] 
copy_to_user_state+0x54/0x9c [xfrm_user]

It happens as soon as there's traffic over the tunnel.

Kernel: 2.6.32-trunk-sparc64 #1 Sun Jan 10 23:56:57 UTC 2010 sparc64 GNU/Linux

Regards,
Sebastian




________________________________
Von: Moritz Muehlenhoff <j...@inutil.org>
An: Sebastian <reg9...@yahoo.de>
CC: 535...@bugs.debian.org
Gesendet: Samstag, den 20. Februar 2010, 12:51:22 Uhr
Betreff: Re: kernel unaligned access copy_to_user_state with IPSec

On Fri, Jul 03, 2009 at 12:47:23PM +0200, Sebastian wrote:
> Package: linux-image-2.6.26-2-sparc64-smp
> Version: 2.6.26-17
> Severity: important
> 
> I'm continiously getting these kernel messages while running several IPSec 
> tunnels:
> 
> [3881706.284682] Kernel unaligned access at TPC[10276320] 
> copy_to_user_state+0x50/0x9c [xfrm_user]
> [3881706.403493] Kernel unaligned access at TPC[10276330] 
> copy_to_user_state+0x60/0x9c [xfrm_user]
> 
> It doesn't seem to affect any functionality, as tunnels are up and running.

The next release of Debian (6.0, code name Squeeze) will be based
on 2.6.32. Please test the current 2.6.32 from unstable/testing and tell
us whether the problem persists. If so, we should report it upstream
to the kernel.org developers.

The 2.6.32 kernel is available from packages.debian.org and can
be installed in both Debian stable, testing and unstable
installations.

Thanks,
        Moritz


__________________________________________________
Do You Yahoo!?
Sie sind Spam leid? Yahoo! Mail verfügt über einen herausragenden Schutz gegen 
Massenmails. 
http://mail.yahoo.com 

Reply via email to