Hi Moritz, I just tested with latest Squeeze (and latest kernel). Same problem, another state though:
[1046073.600266] Kernel unaligned access at TPC[104ea7fc] copy_to_user_state+0x54/0x9c [xfrm_user] [1046073.715755] Kernel unaligned access at TPC[104ea7fc] copy_to_user_state+0x54/0x9c [xfrm_user] It happens as soon as there's traffic over the tunnel. Kernel: 2.6.32-trunk-sparc64 #1 Sun Jan 10 23:56:57 UTC 2010 sparc64 GNU/Linux Regards, Sebastian ________________________________ Von: Moritz Muehlenhoff <j...@inutil.org> An: Sebastian <reg9...@yahoo.de> CC: 535...@bugs.debian.org Gesendet: Samstag, den 20. Februar 2010, 12:51:22 Uhr Betreff: Re: kernel unaligned access copy_to_user_state with IPSec On Fri, Jul 03, 2009 at 12:47:23PM +0200, Sebastian wrote: > Package: linux-image-2.6.26-2-sparc64-smp > Version: 2.6.26-17 > Severity: important > > I'm continiously getting these kernel messages while running several IPSec > tunnels: > > [3881706.284682] Kernel unaligned access at TPC[10276320] > copy_to_user_state+0x50/0x9c [xfrm_user] > [3881706.403493] Kernel unaligned access at TPC[10276330] > copy_to_user_state+0x60/0x9c [xfrm_user] > > It doesn't seem to affect any functionality, as tunnels are up and running. The next release of Debian (6.0, code name Squeeze) will be based on 2.6.32. Please test the current 2.6.32 from unstable/testing and tell us whether the problem persists. If so, we should report it upstream to the kernel.org developers. The 2.6.32 kernel is available from packages.debian.org and can be installed in both Debian stable, testing and unstable installations. Thanks, Moritz __________________________________________________ Do You Yahoo!? Sie sind Spam leid? Yahoo! Mail verfügt über einen herausragenden Schutz gegen Massenmails. http://mail.yahoo.com