Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 151401 Details for
Bug 234794
Kernel Panic when using ipsec
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
kernel dump
ipsec-oops.txt (text/plain), 3.51 KB, created by
Jost Diederichs
on 2007-04-02 04:03:24 UTC
(
hide
)
Description:
kernel dump
Filename:
MIME Type:
Creator:
Jost Diederichs
Created:
2007-04-02 04:03:24 UTC
Size:
3.51 KB
patch
obsolete
> [<ffffffff80333b1f>] scatterwalk_start+0x3/0x19 >PGD 720ed067 PUD 720ee067 PMD 0 >Oops: 0000 [1] SMP >last sysfs file: /class/net/eth1/address >CPU 0 >Modules linked in: xfrm4_mode_tunnel esp4 deflate zlib_deflate twofish twofish_common camellia serpent blowfish des cbc ecb d >Pid: 0, comm: swapper Tainted: PF 2.6.20-1.3036.fc7 #1 >RIP: 0010:[<ffffffff80333b1f>] [<ffffffff80333b1f>] scatterwalk_start+0x3/0x19 >RSP: 0018:ffffffff806de760 EFLAGS: 00010246 >RAX: 000000000000124c RBX: 0000000000000004 RCX: ffff810075b44d90 >RDX: 0000000000002000 RSI: 0000000000000000 RDI: ffffffff806de890 >RBP: ffffffff806de768 R08: 0000000000000000 R09: ffff810037d93500 >R10: 0000000000000080 R11: ffff810075104740 R12: ffffffff806de890 >R13: 0000000000000004 R14: ffff810037d9350c R15: 0000000000000000 >FS: 00002aaaaaadaf80(0000) GS:ffffffff805d1000(0000) knlGS:0000000000000000 >CS: 0010 DS: 0018 ES: 0018 CR0: 000000008005003b >CR2: 000000000000000c CR3: 00000000720ec000 CR4: 00000000000006e0 >Process swapper (pid: 0, threadinfo ffffffff8067c000, task ffffffff8057f6e0) >Stack: ffffffff80333b6f ffffffff806de7a0 ffffffff80333c0b 0000000000000250 > ffffffff806de870 ffffffff806de890 ffffffff806de950 0000000000000003 > ffffffff806de7f0 ffffffff88b5248c ffffffff806de8a8 00000008806de870 >Call Trace: > <IRQ> [<ffffffff80333b6f>] scatterwalk_pagedone+0x3a/0x3c > [<ffffffff80333c0b>] scatterwalk_copychunks+0x9a/0xaa > [<ffffffff88b5248c>] :blkcipher:blkcipher_walk_next+0x19e/0x39e > [<ffffffff88b52262>] :blkcipher:blkcipher_walk_done+0x12d/0x1b9 > [<ffffffff88b627b8>] :des:des3_ede_encrypt+0x0/0x4bc > [<ffffffff88b5c449>] :cbc:crypto_cbc_encrypt+0x152/0x16f > [<ffffffff88b5c02b>] :cbc:xor_64+0x0/0x10 > [<ffffffff88ba2b3b>] :esp4:esp_output+0x33f/0x464 > [<ffffffff80453268>] xfrm4_output_finish2+0x20d/0x2ec > [<ffffffff80255a1b>] nf_hook_slow+0x5e/0xc0 > [<ffffffff80453384>] xfrm4_output_finish+0x3d/0xb8 > [<ffffffff8045345a>] xfrm4_output+0x5b/0x5d > [<ffffffff80234f10>] ip_queue_xmit+0x439/0x492 > [<ffffffff80228625>] kfree_skbmem+0x7a/0x7f > [<ffffffff80212524>] poison_obj+0x27/0x32 > [<ffffffff80222758>] tcp_transmit_skb+0x6fd/0x739 > [<ffffffff80233ddf>] __tcp_push_pending_frames+0x7cf/0x8b7 > [<ffffffff8043a1d8>] tcp_v4_md5_lookup+0xf/0x11 > [<ffffffff8021bcb2>] tcp_rcv_established+0x8c0/0x97a > [<ffffffff8023c1c6>] tcp_v4_do_rcv+0x1c4/0x4c8 > [<ffffffff80227f7e>] tcp_v4_rcv+0x96f/0xa07 > [<ffffffff8042a49c>] ip_local_deliver_finish+0x0/0x20e > [<ffffffff8023511f>] ip_local_deliver+0x1b6/0x27e > [<ffffffff8023623c>] ip_rcv+0x4ac/0x4f4 > [<ffffffff8040b712>] kfree_skb+0x2a/0x2c > [<ffffffff802209cf>] netif_receive_skb+0x341/0x3cc > [<ffffffff802310da>] process_backlog+0xab/0x10f > [<ffffffff8020cbba>] net_rx_action+0xb0/0x1cf > [<ffffffff80211ca6>] __do_softirq+0x5f/0xe3 > [<ffffffff8025d31c>] call_softirq+0x1c/0x28 > [<ffffffff8026be1b>] do_softirq+0x3d/0xab > [<ffffffff8029004a>] irq_exit+0x4e/0x50 > [<ffffffff8026bfcd>] do_IRQ+0x144/0x166 > [<ffffffff8026a666>] default_idle+0x0/0x51 > [<ffffffff8025c666>] ret_from_intr+0x0/0xf > <EOI> [<ffffffff80260eba>] __sched_text_start+0x92a/0x962 > [<ffffffff8026a69d>] default_idle+0x37/0x51 > [<ffffffff8026a69b>] default_idle+0x35/0x51 > [<ffffffff80248941>] cpu_idle+0xa1/0xc4 > [<ffffffff80269cea>] rest_init+0x2b/0x2d > [<ffffffff80686893>] start_kernel+0x2e3/0x2f0 > [<ffffffff80686158>] _sinittext+0x158/0x15f > > >Code: 83 7e 0c 00 55 48 89 e5 75 04 0f 0b eb fe 8b 46 08 89 47 08 >RIP [<ffffffff80333b1f>] scatterwalk_start+0x3/0x19 > RSP <ffffffff806de760> >CR2: 000000000000000c >KB/s --:-- ETAKernel panic - not syncing: Aiee, killing interrupt handler! >
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 234794
: 151401