Re: PANIC at net/xfrm/xfrm_output.c:125 (3.9.4)
On 26/06/2013 23:17, David Miller wrote: > From: Chris Boot > Date: Thu, 20 Jun 2013 21:36:44 +0100 > >> On 06/06/2013 09:38, Timo Teras wrote: >>> On Thu, 06 Jun 2013 08:47:56 +0100 >>> Chris Boot wrote: >>> On 06/06/13 02:24, Fan Du wrote: > Hello Chris/Jean > > This issue might have already been fixed by this: > https://git.kernel.org/cgit/linux/kernel/git/davem/net-next.git/commit/net/xfrm/xfrm_output.c?id=497574c72c9922cf20c12aed15313c389f722fa0 > > > Hope it helps. Hi Fan, Jean, Thanks, that looks like it's the patch for exactly my problem. Unfortunately I can't test it until next week now. :-/ Timo/Dave: are there any plans to push this into 3.10-rc and/or stable? I seem to be able to hit the issue pretty reliably. >>> >>> It is already present in 3.10-rc3 [1], and Dave has it queued for >>> 3.9-stable [2]. >>> >>> - Timo >>> >>> [1] http://lwn.net/Articles/551922/ >>> [2] http://patchwork.ozlabs.org/patch/245594/ >> >> I'm just wondering if this patch has got lost in the cracks; I reported >> the issue in 3.9.4 and 3.9.7 is just out without any sign of it. Have I >> missed something? > > It got submitted to -stable last week. Dave, Thank you, I see it's in 3.9.8 that has been just released. Cheers, Chris -- Chris Boot bo...@bootc.net -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Re: PANIC at net/xfrm/xfrm_output.c:125 (3.9.4)
From: Chris Boot Date: Thu, 20 Jun 2013 21:36:44 +0100 > On 06/06/2013 09:38, Timo Teras wrote: >> On Thu, 06 Jun 2013 08:47:56 +0100 >> Chris Boot wrote: >> >>> On 06/06/13 02:24, Fan Du wrote: Hello Chris/Jean This issue might have already been fixed by this: https://git.kernel.org/cgit/linux/kernel/git/davem/net-next.git/commit/net/xfrm/xfrm_output.c?id=497574c72c9922cf20c12aed15313c389f722fa0 Hope it helps. >>> >>> Hi Fan, Jean, >>> >>> Thanks, that looks like it's the patch for exactly my problem. >>> Unfortunately I can't test it until next week now. :-/ >>> >>> Timo/Dave: are there any plans to push this into 3.10-rc and/or >>> stable? I seem to be able to hit the issue pretty reliably. >> >> It is already present in 3.10-rc3 [1], and Dave has it queued for >> 3.9-stable [2]. >> >> - Timo >> >> [1] http://lwn.net/Articles/551922/ >> [2] http://patchwork.ozlabs.org/patch/245594/ > > I'm just wondering if this patch has got lost in the cracks; I reported > the issue in 3.9.4 and 3.9.7 is just out without any sign of it. Have I > missed something? It got submitted to -stable last week. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Re: PANIC at net/xfrm/xfrm_output.c:125 (3.9.4)
On 06/06/2013 09:38, Timo Teras wrote: > On Thu, 06 Jun 2013 08:47:56 +0100 > Chris Boot wrote: > >> On 06/06/13 02:24, Fan Du wrote: >>> Hello Chris/Jean >>> >>> This issue might have already been fixed by this: >>> https://git.kernel.org/cgit/linux/kernel/git/davem/net-next.git/commit/net/xfrm/xfrm_output.c?id=497574c72c9922cf20c12aed15313c389f722fa0 >>> >>> >>> Hope it helps. >> >> Hi Fan, Jean, >> >> Thanks, that looks like it's the patch for exactly my problem. >> Unfortunately I can't test it until next week now. :-/ >> >> Timo/Dave: are there any plans to push this into 3.10-rc and/or >> stable? I seem to be able to hit the issue pretty reliably. > > It is already present in 3.10-rc3 [1], and Dave has it queued for > 3.9-stable [2]. > > - Timo > > [1] http://lwn.net/Articles/551922/ > [2] http://patchwork.ozlabs.org/patch/245594/ Hi folks, I'm just wondering if this patch has got lost in the cracks; I reported the issue in 3.9.4 and 3.9.7 is just out without any sign of it. Have I missed something? Thanks, Chris -- Chris Boot bo...@bootc.net -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Re: PANIC at net/xfrm/xfrm_output.c:125 (3.9.4)
On 06/06/13 09:38, Timo Teras wrote: > On Thu, 06 Jun 2013 08:47:56 +0100 > Chris Boot wrote: > >> On 06/06/13 02:24, Fan Du wrote: >>> Hello Chris/Jean >>> >>> This issue might have already been fixed by this: >>> https://git.kernel.org/cgit/linux/kernel/git/davem/net-next.git/commit/net/xfrm/xfrm_output.c?id=497574c72c9922cf20c12aed15313c389f722fa0 >>> >>> >>> Hope it helps. >> >> Hi Fan, Jean, >> >> Thanks, that looks like it's the patch for exactly my problem. >> Unfortunately I can't test it until next week now. :-/ >> >> Timo/Dave: are there any plans to push this into 3.10-rc and/or >> stable? I seem to be able to hit the issue pretty reliably. > > It is already present in 3.10-rc3 [1], and Dave has it queued for > 3.9-stable [2]. > > - Timo > > [1] http://lwn.net/Articles/551922/ > [2] http://patchwork.ozlabs.org/patch/245594/ Thank you! Cheers, Cheers -- Chris Boot bo...@bootc.net -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Re: PANIC at net/xfrm/xfrm_output.c:125 (3.9.4)
On Thu, 06 Jun 2013 08:47:56 +0100 Chris Boot wrote: > On 06/06/13 02:24, Fan Du wrote: > > Hello Chris/Jean > > > > This issue might have already been fixed by this: > > https://git.kernel.org/cgit/linux/kernel/git/davem/net-next.git/commit/net/xfrm/xfrm_output.c?id=497574c72c9922cf20c12aed15313c389f722fa0 > > > > > > Hope it helps. > > Hi Fan, Jean, > > Thanks, that looks like it's the patch for exactly my problem. > Unfortunately I can't test it until next week now. :-/ > > Timo/Dave: are there any plans to push this into 3.10-rc and/or > stable? I seem to be able to hit the issue pretty reliably. It is already present in 3.10-rc3 [1], and Dave has it queued for 3.9-stable [2]. - Timo [1] http://lwn.net/Articles/551922/ [2] http://patchwork.ozlabs.org/patch/245594/ -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Re: PANIC at net/xfrm/xfrm_output.c:125 (3.9.4)
On 06/06/13 02:24, Fan Du wrote: > Hello Chris/Jean > > This issue might have already been fixed by this: > https://git.kernel.org/cgit/linux/kernel/git/davem/net-next.git/commit/net/xfrm/xfrm_output.c?id=497574c72c9922cf20c12aed15313c389f722fa0 > > > Hope it helps. Hi Fan, Jean, Thanks, that looks like it's the patch for exactly my problem. Unfortunately I can't test it until next week now. :-/ Timo/Dave: are there any plans to push this into 3.10-rc and/or stable? I seem to be able to hit the issue pretty reliably. Thanks, Chris > On 2013年06月06日 09:04, Jean Sacren wrote: >> From: Chris Boot >> Date: Wed, 05 Jun 2013 22:47:48 +0100 >>> >>> Hi folks, >>> >>> I have a re-purposed Watchguard Firebox running Debian GNU/Linux with a >>> self-built vanilla 3.9.4 kernel. I have an IPsec tunnel up to a remote >>> router through which I was passing a fair bit of traffic when I hit the >>> following panic: >>> >>> [486832.949560] BUG: unable to handle kernel NULL pointer dereference at >>> 0010 >>> [486832.953431] IP: [] xfrm_output_resume+0x61/0x29f >>> [486832.953431] *pde = >>> [486832.953431] Oops: [#1] >>> [486832.953431] Modules linked in: xt_realm xt_nat authenc esp4 >>> xfrm4_mode_tunnel tun ip6table_nat nf_nat_ipv6 sch_fq_codel xt_statistic >>> xt_CT xt_LOG xt_connlimit xt_recent xt_time xt_TCPMSS xt_sctp >>> ip6t_REJECT pppoe deflate zlib_deflate pppox ctr twofish_generic >>> twofish_i586 twofish_common camellia_generic serpent_sse2_i586 xts >>> serpent_generic lrw gf128mul glue_helper ablk_helper cryptd >>> blowfish_generic blowfish_common cast5_generic cast_common des_generic >>> cbc xcbc rmd160 sha512_generic sha256_generic sha1_generic hmac >>> crypto_null af_key xfrm_algo xt_comment xt_addrtype xt_policy >>> ip_set_hash_ip ipt_ULOG ipt_REJECT ipt_MASQUERADE ipt_ECN ipt_CLUSTERIP >>> ipt_ah act_police cls_basic cls_flow cls_fw cls_u32 sch_tbf sch_prio >>> sch_htb sch_hfsc sch_ingress sch_sfq xt_set ip_set nf_nat_tftp >>> nf_nat_snmp_basic nf_conntrack_snmp nf_nat_sip nf_nat_pptp >>> nf_nat_proto_gre nf_nat_irc nf_nat_h323 nf_nat_ftp nf_nat_amanda ts_kmp >>> nf_conntrack_amanda nf_conntrack_sane nf_conntrack_tftp nf_conntrack_sip >>> nf_conntrack_proto_udplite nf_conntrack_proto_sctp nf_conntrack_pptp >>> nf_conntrack_proto_gre nf_conntrack_netlink nf_conntrack_netbios_ns >>> nf_conntrack_broadcast nf_conntrack_irc nf_conntrack_h323 >>> nf_conntrack_ftp xt_TPROXY nf_tproxy_core xt_tcpmss xt_pkttype >>> xt_physdev xt_owner xt_NFQUEUE xt_NFLOG nfnetlink_log xt_multiport >>> xt_mark xt_mac xt_limit xt_length xt_iprange xt_helper xt_hashlimit >>> xt_DSCP xt_dscp xt_dccp xt_connmark xt_CLASSIFY xt_AUDIT xt_state >>> nfnetlink bridge 8021q garp stp mrp llc ppp_generic slhc >>> nf_conntrack_ipv6 nf_defrag_ipv6 ip6table_mangle ip6table_raw >>> ip6table_filter ip6_tables xt_tcpudp xt_conntrack iptable_mangle >>> iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat >>> nf_conntrack iptable_raw iptable_filter ip_tables x_tables w83627hf >>> hwmon_vid loop iTCO_wdt iTCO_vendor_support evdev snd_pcm snd_page_alloc >>> snd_timer snd soundcore acpi_cpufreq mperf processor pcspkr serio_raw >>> drm_kms_helper lpc_ich i2c_i801 of_i2c drm rng_core thermal_sys >>> i2c_algo_bit ehci_pci i2c_core ext4 crc16 jbd2 mbcache dm_mod sg sd_mod >>> crc_t10dif ata_generic ata_piix uhci_hcd ehci_hcd libata microcode >>> scsi_mod skge sky2 usbcore usb_common >>> [486832.953431] Pid: 0, comm: swapper Not tainted 3.9.4-1-bootc #1 >>> [486832.953431] EIP: 0060:[] EFLAGS: 00210246 CPU: 0 >>> [486832.953431] EIP is at xfrm_output_resume+0x61/0x29f >>> [486832.953431] EAX: EBX: f3fbc100 ECX: f77f1288 EDX: f6130200 >>> [486832.953431] ESI: 0016 EDI: EBP: f70b3c00 ESP: c1407c44 >>> [486832.953431] DS: 007b ES: 007b FS: GS: 00e0 SS: 0068 >>> [486832.953431] CR0: 8005003b CR2: 0010 CR3: 37247000 CR4: 07d0 >>> [486832.953431] DR0: DR1: DR2: DR3: >>> [486832.953431] DR6: 0ff0 DR7: 0400 >>> [486832.953431] Process swapper (pid: 0, ti=c1406000 task=c1413490 >>> task.ti=c1406000) >>> [486832.953431] Stack: >>> [486832.953431] c129d44f 8000 0002 c1457254 f3fbc100 c129d44f >>> 0008 >>> [486832.953431] c129d49e f4524000 c129d44f 8000 >>> f3fbc100 c1268b49 >>> [486832.953431] f3fbc100 f127604e c12678c3 f7123000 c1267685 >>> c1457f8c c1456b80 >>> [486832.953431] Call Trace: >>> [486832.953431] [] ? xfrm4_extract_output+0x94/0x94 >>> [486832.953431] [] ? xfrm4_extract_output+0x94/0x94 >>> [486832.953431] [] ? xfrm4_output+0x2c/0x6a >>> [486832.953431] [] ? xfrm4_extract_output+0x94/0x94 >>> [486832.953431] [] ? ip_forward_finish+0x59/0x5c >>> [486832.953431] [] ? ip_rcv_finish+0x23e/0x274 >>> [486832.953431] [] ? pskb_may_pull+0x2d/0x2d >>> [486832.953431] [] ? __netif_receive_skb_core+0x39d/0x406 >>> [486832.953431] [] ? br_handle_frame_finish+0x22c/0x264 >>> [bridge] >>> [4868
Re: PANIC at net/xfrm/xfrm_output.c:125 (3.9.4)
Hello Chris/Jean This issue might have already been fixed by this: https://git.kernel.org/cgit/linux/kernel/git/davem/net-next.git/commit/net/xfrm/xfrm_output.c?id=497574c72c9922cf20c12aed15313c389f722fa0 Hope it helps. On 2013年06月06日 09:04, Jean Sacren wrote: From: Chris Boot Date: Wed, 05 Jun 2013 22:47:48 +0100 Hi folks, I have a re-purposed Watchguard Firebox running Debian GNU/Linux with a self-built vanilla 3.9.4 kernel. I have an IPsec tunnel up to a remote router through which I was passing a fair bit of traffic when I hit the following panic: [486832.949560] BUG: unable to handle kernel NULL pointer dereference at 0010 [486832.953431] IP: [] xfrm_output_resume+0x61/0x29f [486832.953431] *pde = [486832.953431] Oops: [#1] [486832.953431] Modules linked in: xt_realm xt_nat authenc esp4 xfrm4_mode_tunnel tun ip6table_nat nf_nat_ipv6 sch_fq_codel xt_statistic xt_CT xt_LOG xt_connlimit xt_recent xt_time xt_TCPMSS xt_sctp ip6t_REJECT pppoe deflate zlib_deflate pppox ctr twofish_generic twofish_i586 twofish_common camellia_generic serpent_sse2_i586 xts serpent_generic lrw gf128mul glue_helper ablk_helper cryptd blowfish_generic blowfish_common cast5_generic cast_common des_generic cbc xcbc rmd160 sha512_generic sha256_generic sha1_generic hmac crypto_null af_key xfrm_algo xt_comment xt_addrtype xt_policy ip_set_hash_ip ipt_ULOG ipt_REJECT ipt_MASQUERADE ipt_ECN ipt_CLUSTERIP ipt_ah act_police cls_basic cls_flow cls_fw cls_u32 sch_tbf sch_prio sch_htb sch_hfsc sch_ingress sch_sfq xt_set ip_set nf_nat_tftp nf_nat_snmp_basic nf_conntrack_snmp nf_nat_sip nf_nat_pptp nf_nat_proto_gre nf_nat_irc nf_nat_h323 nf_nat_ftp nf_nat_amanda ts_kmp nf_conntrack_amanda nf_conntrack_sane nf_conntrack_tftp nf_conntrack_sip nf_conntrack_proto_udplite nf_conntrack_proto_sctp nf_conntrack_pptp nf_conntrack_proto_gre nf_conntrack_netlink nf_conntrack_netbios_ns nf_conntrack_broadcast nf_conntrack_irc nf_conntrack_h323 nf_conntrack_ftp xt_TPROXY nf_tproxy_core xt_tcpmss xt_pkttype xt_physdev xt_owner xt_NFQUEUE xt_NFLOG nfnetlink_log xt_multiport xt_mark xt_mac xt_limit xt_length xt_iprange xt_helper xt_hashlimit xt_DSCP xt_dscp xt_dccp xt_connmark xt_CLASSIFY xt_AUDIT xt_state nfnetlink bridge 8021q garp stp mrp llc ppp_generic slhc nf_conntrack_ipv6 nf_defrag_ipv6 ip6table_mangle ip6table_raw ip6table_filter ip6_tables xt_tcpudp xt_conntrack iptable_mangle iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack iptable_raw iptable_filter ip_tables x_tables w83627hf hwmon_vid loop iTCO_wdt iTCO_vendor_support evdev snd_pcm snd_page_alloc snd_timer snd soundcore acpi_cpufreq mperf processor pcspkr serio_raw drm_kms_helper lpc_ich i2c_i801 of_i2c drm rng_core thermal_sys i2c_algo_bit ehci_pci i2c_core ext4 crc16 jbd2 mbcache dm_mod sg sd_mod crc_t10dif ata_generic ata_piix uhci_hcd ehci_hcd libata microcode scsi_mod skge sky2 usbcore usb_common [486832.953431] Pid: 0, comm: swapper Not tainted 3.9.4-1-bootc #1 [486832.953431] EIP: 0060:[] EFLAGS: 00210246 CPU: 0 [486832.953431] EIP is at xfrm_output_resume+0x61/0x29f [486832.953431] EAX: EBX: f3fbc100 ECX: f77f1288 EDX: f6130200 [486832.953431] ESI: 0016 EDI: EBP: f70b3c00 ESP: c1407c44 [486832.953431] DS: 007b ES: 007b FS: GS: 00e0 SS: 0068 [486832.953431] CR0: 8005003b CR2: 0010 CR3: 37247000 CR4: 07d0 [486832.953431] DR0: DR1: DR2: DR3: [486832.953431] DR6: 0ff0 DR7: 0400 [486832.953431] Process swapper (pid: 0, ti=c1406000 task=c1413490 task.ti=c1406000) [486832.953431] Stack: [486832.953431] c129d44f 8000 0002 c1457254 f3fbc100 c129d44f 0008 [486832.953431] c129d49e f4524000 c129d44f 8000 f3fbc100 c1268b49 [486832.953431] f3fbc100 f127604e c12678c3 f7123000 c1267685 c1457f8c c1456b80 [486832.953431] Call Trace: [486832.953431] [] ? xfrm4_extract_output+0x94/0x94 [486832.953431] [] ? xfrm4_extract_output+0x94/0x94 [486832.953431] [] ? xfrm4_output+0x2c/0x6a [486832.953431] [] ? xfrm4_extract_output+0x94/0x94 [486832.953431] [] ? ip_forward_finish+0x59/0x5c [486832.953431] [] ? ip_rcv_finish+0x23e/0x274 [486832.953431] [] ? pskb_may_pull+0x2d/0x2d [486832.953431] [] ? __netif_receive_skb_core+0x39d/0x406 [486832.953431] [] ? br_handle_frame_finish+0x22c/0x264 [bridge] [486832.953431] [] ? process_backlog+0xd0/0xd0 [486832.953431] [] ? br_handle_local_finish+0x4d/0x4d [bridge] [486832.953431] [] ? NF_HOOK_THRESH+0x1d/0x4c [bridge] [486832.953431] [] ? br_handle_local_finish+0x4d/0x4d [bridge] [486832.953431] [] ? br_nf_pre_routing_finish+0x1c8/0x1d2 [bridge] [486832.953431] [] ? br_handle_local_finish+0x4d/0x4d [bridge] [486832.953431] [] ? nf_hook_slow+0x52/0xed [486832.953431] [] ? nf_bridge_alloc.isra.18+0x32/0x32 [bridge] [486832.953431] [] ? nf_bridge_alloc.isra.18+0x32/0x32 [bridge] [486832.953431] [] ? NF_HOOK_THRESH+0x1d/0x4c [bridge] [486832.953431] [] ? nf_bridge_alloc
Re: PANIC at net/xfrm/xfrm_output.c:125 (3.9.4)
From: Chris Boot Date: Wed, 05 Jun 2013 22:47:48 +0100 > > Hi folks, > > I have a re-purposed Watchguard Firebox running Debian GNU/Linux with a > self-built vanilla 3.9.4 kernel. I have an IPsec tunnel up to a remote > router through which I was passing a fair bit of traffic when I hit the > following panic: > > [486832.949560] BUG: unable to handle kernel NULL pointer dereference at > 0010 > [486832.953431] IP: [] xfrm_output_resume+0x61/0x29f > [486832.953431] *pde = > [486832.953431] Oops: [#1] > [486832.953431] Modules linked in: xt_realm xt_nat authenc esp4 > xfrm4_mode_tunnel tun ip6table_nat nf_nat_ipv6 sch_fq_codel xt_statistic > xt_CT xt_LOG xt_connlimit xt_recent xt_time xt_TCPMSS xt_sctp > ip6t_REJECT pppoe deflate zlib_deflate pppox ctr twofish_generic > twofish_i586 twofish_common camellia_generic serpent_sse2_i586 xts > serpent_generic lrw gf128mul glue_helper ablk_helper cryptd > blowfish_generic blowfish_common cast5_generic cast_common des_generic > cbc xcbc rmd160 sha512_generic sha256_generic sha1_generic hmac > crypto_null af_key xfrm_algo xt_comment xt_addrtype xt_policy > ip_set_hash_ip ipt_ULOG ipt_REJECT ipt_MASQUERADE ipt_ECN ipt_CLUSTERIP > ipt_ah act_police cls_basic cls_flow cls_fw cls_u32 sch_tbf sch_prio > sch_htb sch_hfsc sch_ingress sch_sfq xt_set ip_set nf_nat_tftp > nf_nat_snmp_basic nf_conntrack_snmp nf_nat_sip nf_nat_pptp > nf_nat_proto_gre nf_nat_irc nf_nat_h323 nf_nat_ftp nf_nat_amanda ts_kmp > nf_conntrack_amanda nf_conntrack_sane nf_conntrack_tftp nf_conntrack_sip > nf_conntrack_proto_udplite nf_conntrack_proto_sctp nf_conntrack_pptp > nf_conntrack_proto_gre nf_conntrack_netlink nf_conntrack_netbios_ns > nf_conntrack_broadcast nf_conntrack_irc nf_conntrack_h323 > nf_conntrack_ftp xt_TPROXY nf_tproxy_core xt_tcpmss xt_pkttype > xt_physdev xt_owner xt_NFQUEUE xt_NFLOG nfnetlink_log xt_multiport > xt_mark xt_mac xt_limit xt_length xt_iprange xt_helper xt_hashlimit > xt_DSCP xt_dscp xt_dccp xt_connmark xt_CLASSIFY xt_AUDIT xt_state > nfnetlink bridge 8021q garp stp mrp llc ppp_generic slhc > nf_conntrack_ipv6 nf_defrag_ipv6 ip6table_mangle ip6table_raw > ip6table_filter ip6_tables xt_tcpudp xt_conntrack iptable_mangle > iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat > nf_conntrack iptable_raw iptable_filter ip_tables x_tables w83627hf > hwmon_vid loop iTCO_wdt iTCO_vendor_support evdev snd_pcm snd_page_alloc > snd_timer snd soundcore acpi_cpufreq mperf processor pcspkr serio_raw > drm_kms_helper lpc_ich i2c_i801 of_i2c drm rng_core thermal_sys > i2c_algo_bit ehci_pci i2c_core ext4 crc16 jbd2 mbcache dm_mod sg sd_mod > crc_t10dif ata_generic ata_piix uhci_hcd ehci_hcd libata microcode > scsi_mod skge sky2 usbcore usb_common > [486832.953431] Pid: 0, comm: swapper Not tainted 3.9.4-1-bootc #1 > [486832.953431] EIP: 0060:[] EFLAGS: 00210246 CPU: 0 > [486832.953431] EIP is at xfrm_output_resume+0x61/0x29f > [486832.953431] EAX: EBX: f3fbc100 ECX: f77f1288 EDX: f6130200 > [486832.953431] ESI: 0016 EDI: EBP: f70b3c00 ESP: c1407c44 > [486832.953431] DS: 007b ES: 007b FS: GS: 00e0 SS: 0068 > [486832.953431] CR0: 8005003b CR2: 0010 CR3: 37247000 CR4: 07d0 > [486832.953431] DR0: DR1: DR2: DR3: > [486832.953431] DR6: 0ff0 DR7: 0400 > [486832.953431] Process swapper (pid: 0, ti=c1406000 task=c1413490 > task.ti=c1406000) > [486832.953431] Stack: > [486832.953431] c129d44f 8000 0002 c1457254 f3fbc100 c129d44f > 0008 > [486832.953431] c129d49e f4524000 c129d44f 8000 > f3fbc100 c1268b49 > [486832.953431] f3fbc100 f127604e c12678c3 f7123000 c1267685 > c1457f8c c1456b80 > [486832.953431] Call Trace: > [486832.953431] [] ? xfrm4_extract_output+0x94/0x94 > [486832.953431] [] ? xfrm4_extract_output+0x94/0x94 > [486832.953431] [] ? xfrm4_output+0x2c/0x6a > [486832.953431] [] ? xfrm4_extract_output+0x94/0x94 > [486832.953431] [] ? ip_forward_finish+0x59/0x5c > [486832.953431] [] ? ip_rcv_finish+0x23e/0x274 > [486832.953431] [] ? pskb_may_pull+0x2d/0x2d > [486832.953431] [] ? __netif_receive_skb_core+0x39d/0x406 > [486832.953431] [] ? br_handle_frame_finish+0x22c/0x264 [bridge] > [486832.953431] [] ? process_backlog+0xd0/0xd0 > [486832.953431] [] ? br_handle_local_finish+0x4d/0x4d [bridge] > [486832.953431] [] ? NF_HOOK_THRESH+0x1d/0x4c [bridge] > [486832.953431] [] ? br_handle_local_finish+0x4d/0x4d [bridge] > [486832.953431] [] ? br_nf_pre_routing_finish+0x1c8/0x1d2 > [bridge] > [486832.953431] [] ? br_handle_local_finish+0x4d/0x4d [bridge] > [486832.953431] [] ? nf_hook_slow+0x52/0xed > [486832.953431] [] ? nf_bridge_alloc.isra.18+0x32/0x32 [bridge] > [486832.953431] [] ? nf_bridge_alloc.isra.18+0x32/0x32 [bridge] > [486832.953431] [] ? NF_HOOK_THRESH+0x1d/0x4c [bridge] > [486832.953431] [] ? nf_bridge_alloc.isra.18+0x32/0x32 [bridge] > [486832.953431] [] ? br_nf_pre_routing+0x32c/0x33f [bridge] > [4
PANIC at net/xfrm/xfrm_output.c:125 (3.9.4)
Hi folks, I have a re-purposed Watchguard Firebox running Debian GNU/Linux with a self-built vanilla 3.9.4 kernel. I have an IPsec tunnel up to a remote router through which I was passing a fair bit of traffic when I hit the following panic: [486832.949560] BUG: unable to handle kernel NULL pointer dereference at 0010 [486832.953431] IP: [] xfrm_output_resume+0x61/0x29f [486832.953431] *pde = [486832.953431] Oops: [#1] [486832.953431] Modules linked in: xt_realm xt_nat authenc esp4 xfrm4_mode_tunnel tun ip6table_nat nf_nat_ipv6 sch_fq_codel xt_statistic xt_CT xt_LOG xt_connlimit xt_recent xt_time xt_TCPMSS xt_sctp ip6t_REJECT pppoe deflate zlib_deflate pppox ctr twofish_generic twofish_i586 twofish_common camellia_generic serpent_sse2_i586 xts serpent_generic lrw gf128mul glue_helper ablk_helper cryptd blowfish_generic blowfish_common cast5_generic cast_common des_generic cbc xcbc rmd160 sha512_generic sha256_generic sha1_generic hmac crypto_null af_key xfrm_algo xt_comment xt_addrtype xt_policy ip_set_hash_ip ipt_ULOG ipt_REJECT ipt_MASQUERADE ipt_ECN ipt_CLUSTERIP ipt_ah act_police cls_basic cls_flow cls_fw cls_u32 sch_tbf sch_prio sch_htb sch_hfsc sch_ingress sch_sfq xt_set ip_set nf_nat_tftp nf_nat_snmp_basic nf_conntrack_snmp nf_nat_sip nf_nat_pptp nf_nat_proto_gre nf_nat_irc nf_nat_h323 nf_nat_ftp nf_nat_amanda ts_kmp nf_conntrack_amanda nf_conntrack_sane nf_conntrack_tftp nf_conntrack_sip nf_conntrack_proto_udplite nf_conntrack_proto_sctp nf_conntrack_pptp nf_conntrack_proto_gre nf_conntrack_netlink nf_conntrack_netbios_ns nf_conntrack_broadcast nf_conntrack_irc nf_conntrack_h323 nf_conntrack_ftp xt_TPROXY nf_tproxy_core xt_tcpmss xt_pkttype xt_physdev xt_owner xt_NFQUEUE xt_NFLOG nfnetlink_log xt_multiport xt_mark xt_mac xt_limit xt_length xt_iprange xt_helper xt_hashlimit xt_DSCP xt_dscp xt_dccp xt_connmark xt_CLASSIFY xt_AUDIT xt_state nfnetlink bridge 8021q garp stp mrp llc ppp_generic slhc nf_conntrack_ipv6 nf_defrag_ipv6 ip6table_mangle ip6table_raw ip6table_filter ip6_tables xt_tcpudp xt_conntrack iptable_mangle iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack iptable_raw iptable_filter ip_tables x_tables w83627hf hwmon_vid loop iTCO_wdt iTCO_vendor_support evdev snd_pcm snd_page_alloc snd_timer snd soundcore acpi_cpufreq mperf processor pcspkr serio_raw drm_kms_helper lpc_ich i2c_i801 of_i2c drm rng_core thermal_sys i2c_algo_bit ehci_pci i2c_core ext4 crc16 jbd2 mbcache dm_mod sg sd_mod crc_t10dif ata_generic ata_piix uhci_hcd ehci_hcd libata microcode scsi_mod skge sky2 usbcore usb_common [486832.953431] Pid: 0, comm: swapper Not tainted 3.9.4-1-bootc #1 [486832.953431] EIP: 0060:[] EFLAGS: 00210246 CPU: 0 [486832.953431] EIP is at xfrm_output_resume+0x61/0x29f [486832.953431] EAX: EBX: f3fbc100 ECX: f77f1288 EDX: f6130200 [486832.953431] ESI: 0016 EDI: EBP: f70b3c00 ESP: c1407c44 [486832.953431] DS: 007b ES: 007b FS: GS: 00e0 SS: 0068 [486832.953431] CR0: 8005003b CR2: 0010 CR3: 37247000 CR4: 07d0 [486832.953431] DR0: DR1: DR2: DR3: [486832.953431] DR6: 0ff0 DR7: 0400 [486832.953431] Process swapper (pid: 0, ti=c1406000 task=c1413490 task.ti=c1406000) [486832.953431] Stack: [486832.953431] c129d44f 8000 0002 c1457254 f3fbc100 c129d44f 0008 [486832.953431] c129d49e f4524000 c129d44f 8000 f3fbc100 c1268b49 [486832.953431] f3fbc100 f127604e c12678c3 f7123000 c1267685 c1457f8c c1456b80 [486832.953431] Call Trace: [486832.953431] [] ? xfrm4_extract_output+0x94/0x94 [486832.953431] [] ? xfrm4_extract_output+0x94/0x94 [486832.953431] [] ? xfrm4_output+0x2c/0x6a [486832.953431] [] ? xfrm4_extract_output+0x94/0x94 [486832.953431] [] ? ip_forward_finish+0x59/0x5c [486832.953431] [] ? ip_rcv_finish+0x23e/0x274 [486832.953431] [] ? pskb_may_pull+0x2d/0x2d [486832.953431] [] ? __netif_receive_skb_core+0x39d/0x406 [486832.953431] [] ? br_handle_frame_finish+0x22c/0x264 [bridge] [486832.953431] [] ? process_backlog+0xd0/0xd0 [486832.953431] [] ? br_handle_local_finish+0x4d/0x4d [bridge] [486832.953431] [] ? NF_HOOK_THRESH+0x1d/0x4c [bridge] [486832.953431] [] ? br_handle_local_finish+0x4d/0x4d [bridge] [486832.953431] [] ? br_nf_pre_routing_finish+0x1c8/0x1d2 [bridge] [486832.953431] [] ? br_handle_local_finish+0x4d/0x4d [bridge] [486832.953431] [] ? nf_hook_slow+0x52/0xed [486832.953431] [] ? nf_bridge_alloc.isra.18+0x32/0x32 [bridge] [486832.953431] [] ? nf_bridge_alloc.isra.18+0x32/0x32 [bridge] [486832.953431] [] ? NF_HOOK_THRESH+0x1d/0x4c [bridge] [486832.953431] [] ? nf_bridge_alloc.isra.18+0x32/0x32 [bridge] [486832.953431] [] ? br_nf_pre_routing+0x32c/0x33f [bridge] [486832.953431] [] ? nf_bridge_alloc.isra.18+0x32/0x32 [bridge] [486832.953431] [] ? nf_iterate+0x3c/0x69 [486832.953431] [] ? br_handle_local_finish+0x4d/0x4d [bridge] [486832.953431] [] ? nf_hook_slow+0x52/0xed [486832.953431]