Re: PANIC at net/xfrm/xfrm_output.c:125 (3.9.4)

2013-06-27 Thread Chris Boot
On 26/06/2013 23:17, David Miller wrote:
> From: Chris Boot 
> Date: Thu, 20 Jun 2013 21:36:44 +0100
> 
>> On 06/06/2013 09:38, Timo Teras wrote:
>>> On Thu, 06 Jun 2013 08:47:56 +0100
>>> Chris Boot  wrote:
>>> 
 On 06/06/13 02:24, Fan Du wrote:
> Hello Chris/Jean
>
> This issue might have already been fixed by this:
> https://git.kernel.org/cgit/linux/kernel/git/davem/net-next.git/commit/net/xfrm/xfrm_output.c?id=497574c72c9922cf20c12aed15313c389f722fa0
>
>
> Hope it helps.

 Hi Fan, Jean,

 Thanks, that looks like it's the patch for exactly my problem.
 Unfortunately I can't test it until next week now. :-/

 Timo/Dave: are there any plans to push this into 3.10-rc and/or
 stable? I seem to be able to hit the issue pretty reliably.
>>> 
>>> It is already present in 3.10-rc3 [1], and Dave has it queued for
>>> 3.9-stable [2].
>>> 
>>> - Timo
>>> 
>>> [1] http://lwn.net/Articles/551922/
>>> [2] http://patchwork.ozlabs.org/patch/245594/
>> 
>> I'm just wondering if this patch has got lost in the cracks; I reported
>> the issue in 3.9.4 and 3.9.7 is just out without any sign of it. Have I
>> missed something?
> 
> It got submitted to -stable last week.

Dave,

Thank you, I see it's in 3.9.8 that has been just released.

Cheers,
Chris

-- 
Chris Boot
bo...@bootc.net
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


Re: PANIC at net/xfrm/xfrm_output.c:125 (3.9.4)

2013-06-26 Thread David Miller
From: Chris Boot 
Date: Thu, 20 Jun 2013 21:36:44 +0100

> On 06/06/2013 09:38, Timo Teras wrote:
>> On Thu, 06 Jun 2013 08:47:56 +0100
>> Chris Boot  wrote:
>> 
>>> On 06/06/13 02:24, Fan Du wrote:
 Hello Chris/Jean

 This issue might have already been fixed by this:
 https://git.kernel.org/cgit/linux/kernel/git/davem/net-next.git/commit/net/xfrm/xfrm_output.c?id=497574c72c9922cf20c12aed15313c389f722fa0


 Hope it helps.
>>>
>>> Hi Fan, Jean,
>>>
>>> Thanks, that looks like it's the patch for exactly my problem.
>>> Unfortunately I can't test it until next week now. :-/
>>>
>>> Timo/Dave: are there any plans to push this into 3.10-rc and/or
>>> stable? I seem to be able to hit the issue pretty reliably.
>> 
>> It is already present in 3.10-rc3 [1], and Dave has it queued for
>> 3.9-stable [2].
>> 
>> - Timo
>> 
>> [1] http://lwn.net/Articles/551922/
>> [2] http://patchwork.ozlabs.org/patch/245594/
> 
> I'm just wondering if this patch has got lost in the cracks; I reported
> the issue in 3.9.4 and 3.9.7 is just out without any sign of it. Have I
> missed something?

It got submitted to -stable last week.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


Re: PANIC at net/xfrm/xfrm_output.c:125 (3.9.4)

2013-06-20 Thread Chris Boot
On 06/06/2013 09:38, Timo Teras wrote:
> On Thu, 06 Jun 2013 08:47:56 +0100
> Chris Boot  wrote:
> 
>> On 06/06/13 02:24, Fan Du wrote:
>>> Hello Chris/Jean
>>>
>>> This issue might have already been fixed by this:
>>> https://git.kernel.org/cgit/linux/kernel/git/davem/net-next.git/commit/net/xfrm/xfrm_output.c?id=497574c72c9922cf20c12aed15313c389f722fa0
>>>
>>>
>>> Hope it helps.
>>
>> Hi Fan, Jean,
>>
>> Thanks, that looks like it's the patch for exactly my problem.
>> Unfortunately I can't test it until next week now. :-/
>>
>> Timo/Dave: are there any plans to push this into 3.10-rc and/or
>> stable? I seem to be able to hit the issue pretty reliably.
> 
> It is already present in 3.10-rc3 [1], and Dave has it queued for
> 3.9-stable [2].
> 
> - Timo
> 
> [1] http://lwn.net/Articles/551922/
> [2] http://patchwork.ozlabs.org/patch/245594/

Hi folks,

I'm just wondering if this patch has got lost in the cracks; I reported
the issue in 3.9.4 and 3.9.7 is just out without any sign of it. Have I
missed something?

Thanks,
Chris

-- 
Chris Boot
bo...@bootc.net
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


Re: PANIC at net/xfrm/xfrm_output.c:125 (3.9.4)

2013-06-06 Thread Chris Boot
On 06/06/13 09:38, Timo Teras wrote:
> On Thu, 06 Jun 2013 08:47:56 +0100
> Chris Boot  wrote:
> 
>> On 06/06/13 02:24, Fan Du wrote:
>>> Hello Chris/Jean
>>>
>>> This issue might have already been fixed by this:
>>> https://git.kernel.org/cgit/linux/kernel/git/davem/net-next.git/commit/net/xfrm/xfrm_output.c?id=497574c72c9922cf20c12aed15313c389f722fa0
>>>
>>>
>>> Hope it helps.
>>
>> Hi Fan, Jean,
>>
>> Thanks, that looks like it's the patch for exactly my problem.
>> Unfortunately I can't test it until next week now. :-/
>>
>> Timo/Dave: are there any plans to push this into 3.10-rc and/or
>> stable? I seem to be able to hit the issue pretty reliably.
> 
> It is already present in 3.10-rc3 [1], and Dave has it queued for
> 3.9-stable [2].
> 
> - Timo
> 
> [1] http://lwn.net/Articles/551922/
> [2] http://patchwork.ozlabs.org/patch/245594/

Thank you!

Cheers,
Cheers

-- 
Chris Boot
bo...@bootc.net
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


Re: PANIC at net/xfrm/xfrm_output.c:125 (3.9.4)

2013-06-06 Thread Timo Teras
On Thu, 06 Jun 2013 08:47:56 +0100
Chris Boot  wrote:

> On 06/06/13 02:24, Fan Du wrote:
> > Hello Chris/Jean
> > 
> > This issue might have already been fixed by this:
> > https://git.kernel.org/cgit/linux/kernel/git/davem/net-next.git/commit/net/xfrm/xfrm_output.c?id=497574c72c9922cf20c12aed15313c389f722fa0
> > 
> > 
> > Hope it helps.
> 
> Hi Fan, Jean,
> 
> Thanks, that looks like it's the patch for exactly my problem.
> Unfortunately I can't test it until next week now. :-/
> 
> Timo/Dave: are there any plans to push this into 3.10-rc and/or
> stable? I seem to be able to hit the issue pretty reliably.

It is already present in 3.10-rc3 [1], and Dave has it queued for
3.9-stable [2].

- Timo

[1] http://lwn.net/Articles/551922/
[2] http://patchwork.ozlabs.org/patch/245594/
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


Re: PANIC at net/xfrm/xfrm_output.c:125 (3.9.4)

2013-06-06 Thread Chris Boot
On 06/06/13 02:24, Fan Du wrote:
> Hello Chris/Jean
> 
> This issue might have already been fixed by this:
> https://git.kernel.org/cgit/linux/kernel/git/davem/net-next.git/commit/net/xfrm/xfrm_output.c?id=497574c72c9922cf20c12aed15313c389f722fa0
> 
> 
> Hope it helps.

Hi Fan, Jean,

Thanks, that looks like it's the patch for exactly my problem.
Unfortunately I can't test it until next week now. :-/

Timo/Dave: are there any plans to push this into 3.10-rc and/or stable?
I seem to be able to hit the issue pretty reliably.

Thanks,
Chris
> On 2013年06月06日 09:04, Jean Sacren wrote:
>> From: Chris Boot
>> Date: Wed, 05 Jun 2013 22:47:48 +0100
>>>
>>> Hi folks,
>>>
>>> I have a re-purposed Watchguard Firebox running Debian GNU/Linux with a
>>> self-built vanilla 3.9.4 kernel. I have an IPsec tunnel up to a remote
>>> router through which I was passing a fair bit of traffic when I hit the
>>> following panic:
>>>
>>> [486832.949560] BUG: unable to handle kernel NULL pointer dereference at
>>> 0010
>>> [486832.953431] IP: [] xfrm_output_resume+0x61/0x29f
>>> [486832.953431] *pde = 
>>> [486832.953431] Oops:  [#1]
>>> [486832.953431] Modules linked in: xt_realm xt_nat authenc esp4
>>> xfrm4_mode_tunnel tun ip6table_nat nf_nat_ipv6 sch_fq_codel xt_statistic
>>> xt_CT xt_LOG xt_connlimit xt_recent xt_time xt_TCPMSS xt_sctp
>>> ip6t_REJECT pppoe deflate zlib_deflate pppox ctr twofish_generic
>>> twofish_i586 twofish_common camellia_generic serpent_sse2_i586 xts
>>> serpent_generic lrw gf128mul glue_helper ablk_helper cryptd
>>> blowfish_generic blowfish_common cast5_generic cast_common des_generic
>>> cbc xcbc rmd160 sha512_generic sha256_generic sha1_generic hmac
>>> crypto_null af_key xfrm_algo xt_comment xt_addrtype xt_policy
>>> ip_set_hash_ip ipt_ULOG ipt_REJECT ipt_MASQUERADE ipt_ECN ipt_CLUSTERIP
>>> ipt_ah act_police cls_basic cls_flow cls_fw cls_u32 sch_tbf sch_prio
>>> sch_htb sch_hfsc sch_ingress sch_sfq xt_set ip_set nf_nat_tftp
>>> nf_nat_snmp_basic nf_conntrack_snmp nf_nat_sip nf_nat_pptp
>>> nf_nat_proto_gre nf_nat_irc nf_nat_h323 nf_nat_ftp nf_nat_amanda ts_kmp
>>> nf_conntrack_amanda nf_conntrack_sane nf_conntrack_tftp nf_conntrack_sip
>>> nf_conntrack_proto_udplite nf_conntrack_proto_sctp nf_conntrack_pptp
>>> nf_conntrack_proto_gre nf_conntrack_netlink nf_conntrack_netbios_ns
>>> nf_conntrack_broadcast nf_conntrack_irc nf_conntrack_h323
>>> nf_conntrack_ftp xt_TPROXY nf_tproxy_core xt_tcpmss xt_pkttype
>>> xt_physdev xt_owner xt_NFQUEUE xt_NFLOG nfnetlink_log xt_multiport
>>> xt_mark xt_mac xt_limit xt_length xt_iprange xt_helper xt_hashlimit
>>> xt_DSCP xt_dscp xt_dccp xt_connmark xt_CLASSIFY xt_AUDIT xt_state
>>> nfnetlink bridge 8021q garp stp mrp llc ppp_generic slhc
>>> nf_conntrack_ipv6 nf_defrag_ipv6 ip6table_mangle ip6table_raw
>>> ip6table_filter ip6_tables xt_tcpudp xt_conntrack iptable_mangle
>>> iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat
>>> nf_conntrack iptable_raw iptable_filter ip_tables x_tables w83627hf
>>> hwmon_vid loop iTCO_wdt iTCO_vendor_support evdev snd_pcm snd_page_alloc
>>> snd_timer snd soundcore acpi_cpufreq mperf processor pcspkr serio_raw
>>> drm_kms_helper lpc_ich i2c_i801 of_i2c drm rng_core thermal_sys
>>> i2c_algo_bit ehci_pci i2c_core ext4 crc16 jbd2 mbcache dm_mod sg sd_mod
>>> crc_t10dif ata_generic ata_piix uhci_hcd ehci_hcd libata microcode
>>> scsi_mod skge sky2 usbcore usb_common
>>> [486832.953431] Pid: 0, comm: swapper Not tainted 3.9.4-1-bootc #1
>>> [486832.953431] EIP: 0060:[] EFLAGS: 00210246 CPU: 0
>>> [486832.953431] EIP is at xfrm_output_resume+0x61/0x29f
>>> [486832.953431] EAX:  EBX: f3fbc100 ECX: f77f1288 EDX: f6130200
>>> [486832.953431] ESI: 0016 EDI:  EBP: f70b3c00 ESP: c1407c44
>>> [486832.953431]  DS: 007b ES: 007b FS:  GS: 00e0 SS: 0068
>>> [486832.953431] CR0: 8005003b CR2: 0010 CR3: 37247000 CR4: 07d0
>>> [486832.953431] DR0:  DR1:  DR2:  DR3: 
>>> [486832.953431] DR6: 0ff0 DR7: 0400
>>> [486832.953431] Process swapper (pid: 0, ti=c1406000 task=c1413490
>>> task.ti=c1406000)
>>> [486832.953431] Stack:
>>> [486832.953431]  c129d44f 8000 0002 c1457254 f3fbc100 c129d44f
>>>  0008
>>> [486832.953431]  c129d49e  f4524000 c129d44f 8000 
>>> f3fbc100 c1268b49
>>> [486832.953431]  f3fbc100 f127604e c12678c3  f7123000 c1267685
>>> c1457f8c c1456b80
>>> [486832.953431] Call Trace:
>>> [486832.953431]  [] ? xfrm4_extract_output+0x94/0x94
>>> [486832.953431]  [] ? xfrm4_extract_output+0x94/0x94
>>> [486832.953431]  [] ? xfrm4_output+0x2c/0x6a
>>> [486832.953431]  [] ? xfrm4_extract_output+0x94/0x94
>>> [486832.953431]  [] ? ip_forward_finish+0x59/0x5c
>>> [486832.953431]  [] ? ip_rcv_finish+0x23e/0x274
>>> [486832.953431]  [] ? pskb_may_pull+0x2d/0x2d
>>> [486832.953431]  [] ? __netif_receive_skb_core+0x39d/0x406
>>> [486832.953431]  [] ? br_handle_frame_finish+0x22c/0x264
>>> [bridge]
>>> [4868

Re: PANIC at net/xfrm/xfrm_output.c:125 (3.9.4)

2013-06-05 Thread Fan Du

Hello Chris/Jean

This issue might have already been fixed by this:
https://git.kernel.org/cgit/linux/kernel/git/davem/net-next.git/commit/net/xfrm/xfrm_output.c?id=497574c72c9922cf20c12aed15313c389f722fa0

Hope it helps.

On 2013年06月06日 09:04, Jean Sacren wrote:

From: Chris Boot
Date: Wed, 05 Jun 2013 22:47:48 +0100


Hi folks,

I have a re-purposed Watchguard Firebox running Debian GNU/Linux with a
self-built vanilla 3.9.4 kernel. I have an IPsec tunnel up to a remote
router through which I was passing a fair bit of traffic when I hit the
following panic:

[486832.949560] BUG: unable to handle kernel NULL pointer dereference at
0010
[486832.953431] IP: [] xfrm_output_resume+0x61/0x29f
[486832.953431] *pde = 
[486832.953431] Oops:  [#1]
[486832.953431] Modules linked in: xt_realm xt_nat authenc esp4
xfrm4_mode_tunnel tun ip6table_nat nf_nat_ipv6 sch_fq_codel xt_statistic
xt_CT xt_LOG xt_connlimit xt_recent xt_time xt_TCPMSS xt_sctp
ip6t_REJECT pppoe deflate zlib_deflate pppox ctr twofish_generic
twofish_i586 twofish_common camellia_generic serpent_sse2_i586 xts
serpent_generic lrw gf128mul glue_helper ablk_helper cryptd
blowfish_generic blowfish_common cast5_generic cast_common des_generic
cbc xcbc rmd160 sha512_generic sha256_generic sha1_generic hmac
crypto_null af_key xfrm_algo xt_comment xt_addrtype xt_policy
ip_set_hash_ip ipt_ULOG ipt_REJECT ipt_MASQUERADE ipt_ECN ipt_CLUSTERIP
ipt_ah act_police cls_basic cls_flow cls_fw cls_u32 sch_tbf sch_prio
sch_htb sch_hfsc sch_ingress sch_sfq xt_set ip_set nf_nat_tftp
nf_nat_snmp_basic nf_conntrack_snmp nf_nat_sip nf_nat_pptp
nf_nat_proto_gre nf_nat_irc nf_nat_h323 nf_nat_ftp nf_nat_amanda ts_kmp
nf_conntrack_amanda nf_conntrack_sane nf_conntrack_tftp nf_conntrack_sip
nf_conntrack_proto_udplite nf_conntrack_proto_sctp nf_conntrack_pptp
nf_conntrack_proto_gre nf_conntrack_netlink nf_conntrack_netbios_ns
nf_conntrack_broadcast nf_conntrack_irc nf_conntrack_h323
nf_conntrack_ftp xt_TPROXY nf_tproxy_core xt_tcpmss xt_pkttype
xt_physdev xt_owner xt_NFQUEUE xt_NFLOG nfnetlink_log xt_multiport
xt_mark xt_mac xt_limit xt_length xt_iprange xt_helper xt_hashlimit
xt_DSCP xt_dscp xt_dccp xt_connmark xt_CLASSIFY xt_AUDIT xt_state
nfnetlink bridge 8021q garp stp mrp llc ppp_generic slhc
nf_conntrack_ipv6 nf_defrag_ipv6 ip6table_mangle ip6table_raw
ip6table_filter ip6_tables xt_tcpudp xt_conntrack iptable_mangle
iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat
nf_conntrack iptable_raw iptable_filter ip_tables x_tables w83627hf
hwmon_vid loop iTCO_wdt iTCO_vendor_support evdev snd_pcm snd_page_alloc
snd_timer snd soundcore acpi_cpufreq mperf processor pcspkr serio_raw
drm_kms_helper lpc_ich i2c_i801 of_i2c drm rng_core thermal_sys
i2c_algo_bit ehci_pci i2c_core ext4 crc16 jbd2 mbcache dm_mod sg sd_mod
crc_t10dif ata_generic ata_piix uhci_hcd ehci_hcd libata microcode
scsi_mod skge sky2 usbcore usb_common
[486832.953431] Pid: 0, comm: swapper Not tainted 3.9.4-1-bootc #1
[486832.953431] EIP: 0060:[] EFLAGS: 00210246 CPU: 0
[486832.953431] EIP is at xfrm_output_resume+0x61/0x29f
[486832.953431] EAX:  EBX: f3fbc100 ECX: f77f1288 EDX: f6130200
[486832.953431] ESI: 0016 EDI:  EBP: f70b3c00 ESP: c1407c44
[486832.953431]  DS: 007b ES: 007b FS:  GS: 00e0 SS: 0068
[486832.953431] CR0: 8005003b CR2: 0010 CR3: 37247000 CR4: 07d0
[486832.953431] DR0:  DR1:  DR2:  DR3: 
[486832.953431] DR6: 0ff0 DR7: 0400
[486832.953431] Process swapper (pid: 0, ti=c1406000 task=c1413490
task.ti=c1406000)
[486832.953431] Stack:
[486832.953431]  c129d44f 8000 0002 c1457254 f3fbc100 c129d44f
 0008
[486832.953431]  c129d49e  f4524000 c129d44f 8000 
f3fbc100 c1268b49
[486832.953431]  f3fbc100 f127604e c12678c3  f7123000 c1267685
c1457f8c c1456b80
[486832.953431] Call Trace:
[486832.953431]  [] ? xfrm4_extract_output+0x94/0x94
[486832.953431]  [] ? xfrm4_extract_output+0x94/0x94
[486832.953431]  [] ? xfrm4_output+0x2c/0x6a
[486832.953431]  [] ? xfrm4_extract_output+0x94/0x94
[486832.953431]  [] ? ip_forward_finish+0x59/0x5c
[486832.953431]  [] ? ip_rcv_finish+0x23e/0x274
[486832.953431]  [] ? pskb_may_pull+0x2d/0x2d
[486832.953431]  [] ? __netif_receive_skb_core+0x39d/0x406
[486832.953431]  [] ? br_handle_frame_finish+0x22c/0x264 [bridge]
[486832.953431]  [] ? process_backlog+0xd0/0xd0
[486832.953431]  [] ? br_handle_local_finish+0x4d/0x4d [bridge]
[486832.953431]  [] ? NF_HOOK_THRESH+0x1d/0x4c [bridge]
[486832.953431]  [] ? br_handle_local_finish+0x4d/0x4d [bridge]
[486832.953431]  [] ? br_nf_pre_routing_finish+0x1c8/0x1d2
[bridge]
[486832.953431]  [] ? br_handle_local_finish+0x4d/0x4d [bridge]
[486832.953431]  [] ? nf_hook_slow+0x52/0xed
[486832.953431]  [] ? nf_bridge_alloc.isra.18+0x32/0x32 [bridge]
[486832.953431]  [] ? nf_bridge_alloc.isra.18+0x32/0x32 [bridge]
[486832.953431]  [] ? NF_HOOK_THRESH+0x1d/0x4c [bridge]
[486832.953431]  [] ? nf_bridge_alloc

Re: PANIC at net/xfrm/xfrm_output.c:125 (3.9.4)

2013-06-05 Thread Jean Sacren
From: Chris Boot 
Date: Wed, 05 Jun 2013 22:47:48 +0100
>
> Hi folks,
> 
> I have a re-purposed Watchguard Firebox running Debian GNU/Linux with a
> self-built vanilla 3.9.4 kernel. I have an IPsec tunnel up to a remote
> router through which I was passing a fair bit of traffic when I hit the
> following panic:
> 
> [486832.949560] BUG: unable to handle kernel NULL pointer dereference at
> 0010
> [486832.953431] IP: [] xfrm_output_resume+0x61/0x29f
> [486832.953431] *pde = 
> [486832.953431] Oops:  [#1]
> [486832.953431] Modules linked in: xt_realm xt_nat authenc esp4
> xfrm4_mode_tunnel tun ip6table_nat nf_nat_ipv6 sch_fq_codel xt_statistic
> xt_CT xt_LOG xt_connlimit xt_recent xt_time xt_TCPMSS xt_sctp
> ip6t_REJECT pppoe deflate zlib_deflate pppox ctr twofish_generic
> twofish_i586 twofish_common camellia_generic serpent_sse2_i586 xts
> serpent_generic lrw gf128mul glue_helper ablk_helper cryptd
> blowfish_generic blowfish_common cast5_generic cast_common des_generic
> cbc xcbc rmd160 sha512_generic sha256_generic sha1_generic hmac
> crypto_null af_key xfrm_algo xt_comment xt_addrtype xt_policy
> ip_set_hash_ip ipt_ULOG ipt_REJECT ipt_MASQUERADE ipt_ECN ipt_CLUSTERIP
> ipt_ah act_police cls_basic cls_flow cls_fw cls_u32 sch_tbf sch_prio
> sch_htb sch_hfsc sch_ingress sch_sfq xt_set ip_set nf_nat_tftp
> nf_nat_snmp_basic nf_conntrack_snmp nf_nat_sip nf_nat_pptp
> nf_nat_proto_gre nf_nat_irc nf_nat_h323 nf_nat_ftp nf_nat_amanda ts_kmp
> nf_conntrack_amanda nf_conntrack_sane nf_conntrack_tftp nf_conntrack_sip
> nf_conntrack_proto_udplite nf_conntrack_proto_sctp nf_conntrack_pptp
> nf_conntrack_proto_gre nf_conntrack_netlink nf_conntrack_netbios_ns
> nf_conntrack_broadcast nf_conntrack_irc nf_conntrack_h323
> nf_conntrack_ftp xt_TPROXY nf_tproxy_core xt_tcpmss xt_pkttype
> xt_physdev xt_owner xt_NFQUEUE xt_NFLOG nfnetlink_log xt_multiport
> xt_mark xt_mac xt_limit xt_length xt_iprange xt_helper xt_hashlimit
> xt_DSCP xt_dscp xt_dccp xt_connmark xt_CLASSIFY xt_AUDIT xt_state
> nfnetlink bridge 8021q garp stp mrp llc ppp_generic slhc
> nf_conntrack_ipv6 nf_defrag_ipv6 ip6table_mangle ip6table_raw
> ip6table_filter ip6_tables xt_tcpudp xt_conntrack iptable_mangle
> iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat
> nf_conntrack iptable_raw iptable_filter ip_tables x_tables w83627hf
> hwmon_vid loop iTCO_wdt iTCO_vendor_support evdev snd_pcm snd_page_alloc
> snd_timer snd soundcore acpi_cpufreq mperf processor pcspkr serio_raw
> drm_kms_helper lpc_ich i2c_i801 of_i2c drm rng_core thermal_sys
> i2c_algo_bit ehci_pci i2c_core ext4 crc16 jbd2 mbcache dm_mod sg sd_mod
> crc_t10dif ata_generic ata_piix uhci_hcd ehci_hcd libata microcode
> scsi_mod skge sky2 usbcore usb_common
> [486832.953431] Pid: 0, comm: swapper Not tainted 3.9.4-1-bootc #1
> [486832.953431] EIP: 0060:[] EFLAGS: 00210246 CPU: 0
> [486832.953431] EIP is at xfrm_output_resume+0x61/0x29f
> [486832.953431] EAX:  EBX: f3fbc100 ECX: f77f1288 EDX: f6130200
> [486832.953431] ESI: 0016 EDI:  EBP: f70b3c00 ESP: c1407c44
> [486832.953431]  DS: 007b ES: 007b FS:  GS: 00e0 SS: 0068
> [486832.953431] CR0: 8005003b CR2: 0010 CR3: 37247000 CR4: 07d0
> [486832.953431] DR0:  DR1:  DR2:  DR3: 
> [486832.953431] DR6: 0ff0 DR7: 0400
> [486832.953431] Process swapper (pid: 0, ti=c1406000 task=c1413490
> task.ti=c1406000)
> [486832.953431] Stack:
> [486832.953431]  c129d44f 8000 0002 c1457254 f3fbc100 c129d44f
>  0008
> [486832.953431]  c129d49e  f4524000 c129d44f 8000 
> f3fbc100 c1268b49
> [486832.953431]  f3fbc100 f127604e c12678c3  f7123000 c1267685
> c1457f8c c1456b80
> [486832.953431] Call Trace:
> [486832.953431]  [] ? xfrm4_extract_output+0x94/0x94
> [486832.953431]  [] ? xfrm4_extract_output+0x94/0x94
> [486832.953431]  [] ? xfrm4_output+0x2c/0x6a
> [486832.953431]  [] ? xfrm4_extract_output+0x94/0x94
> [486832.953431]  [] ? ip_forward_finish+0x59/0x5c
> [486832.953431]  [] ? ip_rcv_finish+0x23e/0x274
> [486832.953431]  [] ? pskb_may_pull+0x2d/0x2d
> [486832.953431]  [] ? __netif_receive_skb_core+0x39d/0x406
> [486832.953431]  [] ? br_handle_frame_finish+0x22c/0x264 [bridge]
> [486832.953431]  [] ? process_backlog+0xd0/0xd0
> [486832.953431]  [] ? br_handle_local_finish+0x4d/0x4d [bridge]
> [486832.953431]  [] ? NF_HOOK_THRESH+0x1d/0x4c [bridge]
> [486832.953431]  [] ? br_handle_local_finish+0x4d/0x4d [bridge]
> [486832.953431]  [] ? br_nf_pre_routing_finish+0x1c8/0x1d2
> [bridge]
> [486832.953431]  [] ? br_handle_local_finish+0x4d/0x4d [bridge]
> [486832.953431]  [] ? nf_hook_slow+0x52/0xed
> [486832.953431]  [] ? nf_bridge_alloc.isra.18+0x32/0x32 [bridge]
> [486832.953431]  [] ? nf_bridge_alloc.isra.18+0x32/0x32 [bridge]
> [486832.953431]  [] ? NF_HOOK_THRESH+0x1d/0x4c [bridge]
> [486832.953431]  [] ? nf_bridge_alloc.isra.18+0x32/0x32 [bridge]
> [486832.953431]  [] ? br_nf_pre_routing+0x32c/0x33f [bridge]
> [4

PANIC at net/xfrm/xfrm_output.c:125 (3.9.4)

2013-06-05 Thread Chris Boot
Hi folks,

I have a re-purposed Watchguard Firebox running Debian GNU/Linux with a
self-built vanilla 3.9.4 kernel. I have an IPsec tunnel up to a remote
router through which I was passing a fair bit of traffic when I hit the
following panic:

[486832.949560] BUG: unable to handle kernel NULL pointer dereference at
0010
[486832.953431] IP: [] xfrm_output_resume+0x61/0x29f
[486832.953431] *pde = 
[486832.953431] Oops:  [#1]
[486832.953431] Modules linked in: xt_realm xt_nat authenc esp4
xfrm4_mode_tunnel tun ip6table_nat nf_nat_ipv6 sch_fq_codel xt_statistic
xt_CT xt_LOG xt_connlimit xt_recent xt_time xt_TCPMSS xt_sctp
ip6t_REJECT pppoe deflate zlib_deflate pppox ctr twofish_generic
twofish_i586 twofish_common camellia_generic serpent_sse2_i586 xts
serpent_generic lrw gf128mul glue_helper ablk_helper cryptd
blowfish_generic blowfish_common cast5_generic cast_common des_generic
cbc xcbc rmd160 sha512_generic sha256_generic sha1_generic hmac
crypto_null af_key xfrm_algo xt_comment xt_addrtype xt_policy
ip_set_hash_ip ipt_ULOG ipt_REJECT ipt_MASQUERADE ipt_ECN ipt_CLUSTERIP
ipt_ah act_police cls_basic cls_flow cls_fw cls_u32 sch_tbf sch_prio
sch_htb sch_hfsc sch_ingress sch_sfq xt_set ip_set nf_nat_tftp
nf_nat_snmp_basic nf_conntrack_snmp nf_nat_sip nf_nat_pptp
nf_nat_proto_gre nf_nat_irc nf_nat_h323 nf_nat_ftp nf_nat_amanda ts_kmp
nf_conntrack_amanda nf_conntrack_sane nf_conntrack_tftp nf_conntrack_sip
nf_conntrack_proto_udplite nf_conntrack_proto_sctp nf_conntrack_pptp
nf_conntrack_proto_gre nf_conntrack_netlink nf_conntrack_netbios_ns
nf_conntrack_broadcast nf_conntrack_irc nf_conntrack_h323
nf_conntrack_ftp xt_TPROXY nf_tproxy_core xt_tcpmss xt_pkttype
xt_physdev xt_owner xt_NFQUEUE xt_NFLOG nfnetlink_log xt_multiport
xt_mark xt_mac xt_limit xt_length xt_iprange xt_helper xt_hashlimit
xt_DSCP xt_dscp xt_dccp xt_connmark xt_CLASSIFY xt_AUDIT xt_state
nfnetlink bridge 8021q garp stp mrp llc ppp_generic slhc
nf_conntrack_ipv6 nf_defrag_ipv6 ip6table_mangle ip6table_raw
ip6table_filter ip6_tables xt_tcpudp xt_conntrack iptable_mangle
iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat
nf_conntrack iptable_raw iptable_filter ip_tables x_tables w83627hf
hwmon_vid loop iTCO_wdt iTCO_vendor_support evdev snd_pcm snd_page_alloc
snd_timer snd soundcore acpi_cpufreq mperf processor pcspkr serio_raw
drm_kms_helper lpc_ich i2c_i801 of_i2c drm rng_core thermal_sys
i2c_algo_bit ehci_pci i2c_core ext4 crc16 jbd2 mbcache dm_mod sg sd_mod
crc_t10dif ata_generic ata_piix uhci_hcd ehci_hcd libata microcode
scsi_mod skge sky2 usbcore usb_common
[486832.953431] Pid: 0, comm: swapper Not tainted 3.9.4-1-bootc #1
[486832.953431] EIP: 0060:[] EFLAGS: 00210246 CPU: 0
[486832.953431] EIP is at xfrm_output_resume+0x61/0x29f
[486832.953431] EAX:  EBX: f3fbc100 ECX: f77f1288 EDX: f6130200
[486832.953431] ESI: 0016 EDI:  EBP: f70b3c00 ESP: c1407c44
[486832.953431]  DS: 007b ES: 007b FS:  GS: 00e0 SS: 0068
[486832.953431] CR0: 8005003b CR2: 0010 CR3: 37247000 CR4: 07d0
[486832.953431] DR0:  DR1:  DR2:  DR3: 
[486832.953431] DR6: 0ff0 DR7: 0400
[486832.953431] Process swapper (pid: 0, ti=c1406000 task=c1413490
task.ti=c1406000)
[486832.953431] Stack:
[486832.953431]  c129d44f 8000 0002 c1457254 f3fbc100 c129d44f
 0008
[486832.953431]  c129d49e  f4524000 c129d44f 8000 
f3fbc100 c1268b49
[486832.953431]  f3fbc100 f127604e c12678c3  f7123000 c1267685
c1457f8c c1456b80
[486832.953431] Call Trace:
[486832.953431]  [] ? xfrm4_extract_output+0x94/0x94
[486832.953431]  [] ? xfrm4_extract_output+0x94/0x94
[486832.953431]  [] ? xfrm4_output+0x2c/0x6a
[486832.953431]  [] ? xfrm4_extract_output+0x94/0x94
[486832.953431]  [] ? ip_forward_finish+0x59/0x5c
[486832.953431]  [] ? ip_rcv_finish+0x23e/0x274
[486832.953431]  [] ? pskb_may_pull+0x2d/0x2d
[486832.953431]  [] ? __netif_receive_skb_core+0x39d/0x406
[486832.953431]  [] ? br_handle_frame_finish+0x22c/0x264 [bridge]
[486832.953431]  [] ? process_backlog+0xd0/0xd0
[486832.953431]  [] ? br_handle_local_finish+0x4d/0x4d [bridge]
[486832.953431]  [] ? NF_HOOK_THRESH+0x1d/0x4c [bridge]
[486832.953431]  [] ? br_handle_local_finish+0x4d/0x4d [bridge]
[486832.953431]  [] ? br_nf_pre_routing_finish+0x1c8/0x1d2
[bridge]
[486832.953431]  [] ? br_handle_local_finish+0x4d/0x4d [bridge]
[486832.953431]  [] ? nf_hook_slow+0x52/0xed
[486832.953431]  [] ? nf_bridge_alloc.isra.18+0x32/0x32 [bridge]
[486832.953431]  [] ? nf_bridge_alloc.isra.18+0x32/0x32 [bridge]
[486832.953431]  [] ? NF_HOOK_THRESH+0x1d/0x4c [bridge]
[486832.953431]  [] ? nf_bridge_alloc.isra.18+0x32/0x32 [bridge]
[486832.953431]  [] ? br_nf_pre_routing+0x32c/0x33f [bridge]
[486832.953431]  [] ? nf_bridge_alloc.isra.18+0x32/0x32 [bridge]
[486832.953431]  [] ? nf_iterate+0x3c/0x69
[486832.953431]  [] ? br_handle_local_finish+0x4d/0x4d [bridge]
[486832.953431]  [] ? nf_hook_slow+0x52/0xed
[486832.953431]