kernel: ------------[ cut here ]------------
kernel: kernel BUG at net/xfrm/xfrm_policy.c:185!
kernel: invalid operand: 0000 [#2]
kernel: CPU: 0
kernel: EIP: 0060:[__xfrm_policy_destroy+20/96] Not tainted
kernel: EFLAGS: 00010246
kernel: EIP is at __xfrm_policy_destroy+0x14/0x60
kernel: eax: 00000001 ebx: cfd48c00 ecx: 00000000 edx: 00000000
kernel: esi: c873ed80 edi: c86fde54 ebp: 00000001 esp: c86fddb4
kernel: ds: 007b es: 007b ss: 0068
kernel: Process ping (pid: 500, threadinfo=c86fc000 task=c874d240)
kernel: Stack: cfd48c00 cfd48c00 c03207ad cfd48c00 c86fde14 00000001
c86fde58 c8
6fddf0
kernel: 00000002 c86f2e60 cfc66000 00000400 00000002 00000003
00000000 c8
6f2e60
kernel: c02e20cf 0100a8c0 0a00a8c0 00000000 c86fde58 c86fde54
00000000 c0
2e221f
kernel: Call Trace:
kernel: [xfrm_lookup+493/1184] xfrm_lookup+0x1ed/0x4a0
kernel: [__ip_route_output_key+47/240] __ip_route_output_key+0x2f/0xf0
kernel: [ip_route_output_flow+47/128] ip_route_output_flow+0x2f/0x80
kernel: [udp_connect+391/816] udp_connect+0x187/0x330
kernel: [inet_autobind+134/336] inet_autobind+0x86/0x150
kernel: [inet_dgram_connect+79/128] inet_dgram_connect+0x4f/0x80
kernel: [sys_connect+155/208] sys_connect+0x9b/0xd0
kernel: [sock_map_fd+250/304] sock_map_fd+0xfa/0x130
kernel: [sock_create+406/704] sock_create+0x196/0x2c0
kernel: [sys_socket+61/96] sys_socket+0x3d/0x60
kernel: [sys_socketcall+201/672] sys_socketcall+0xc9/0x2a0
kernel: [capable+35/80] capable+0x23/0x50
kernel: [syscall_call+7/11] syscall_call+0x7/0xb
kernel:
kernel: Code: 0f 0b b9 00 33 88 37 c0 8b 8b c0 00 00 00 85 c9 74 08 0f
0b
setkey -f mysettings
and I can go on as usual.
seems to happen when racoon does some update
and some packet is still in the queue.
racoon is
2003-05-29 21:29:31: INFO: main.c:174:main(): @(#)racoon 20001216
20001216 sakane@xxxxxxxx
2003-05-29 21:29:31: INFO: main.c:175:main(): @(#)This product linked
OpenSSL 0.9.7b 10 Apr 2003 (http://www.openssl.org/)
I think it is 0.2.2 from ipsec-tools.sf.net ...
Andreas
|