[Swan-dev] kernel warnings with klips and kernel 3.3 or higher
Wolfgang Nothdurft
wolfgang at linogate.de
Thu Apr 9 12:33:17 EEST 2015
When starting pluto on a system with kernel 3.3 or higher, the kernel
print warnings (see attached log from kernel 3.14.37):
WARNING: CPU: 1 PID: 3599 at kernel/smp.c:347
smp_call_function_many+0xad/0x270()
WARNING: CPU: 1 PID: 3599 at kernel/smp.c:210
smp_call_function_single+0x125/0x170()
The problem is that udp_encap_enable() is called between the
spin_lock_irqsave/spin_unlock_irqrestore in linux/net/ipsec/ipsec_tunnel.c
I'm not sure, if it is safe to move the spin_lock_irqsave right before
the list_add command, instead of disabling irqs for the whole block
including the udp_encap_enable.
Wolfgang
-------------- next part --------------
Apr 9 10:45:18 d3 ipsec__plutorun: Starting Pluto subsystem...
Apr 9 10:45:20 d3 kernel: [ 28.349554] ------------[ cut here ]------------
Apr 9 10:45:20 d3 kernel: [ 28.349582] WARNING: CPU: 1 PID: 3599 at kernel/smp.c:347 smp_call_function_many+0xad/0x270()
Apr 9 10:45:20 d3 kernel: [ 28.349584] Modules linked in: crypto_null ipsec(O) sha1_ssse3 crc32c_intel deflate zlib_deflate cts ctr ccm serpent_sse2_x86_64 serpent_generic blowfish_generic blowfish_x86_64 blowfish_common twofish_generic twofish_x86_64_3way xts twofish_x86_64 twofish_common ecb cbc md5 sha512_generi
c des_generic aes_x86_64 ablk_helper cryptd lrw gf128mul glue_helper tpm_rng tpm rng_core fuse ip_vs libcrc32c ppp_generic slhc tun af_packet 8021q ipv6 nfnetlink_queue xt_recent iptable_mangle ipt_MASQUERADE xt_REDIRECT xt_nat iptable_nat nf_nat_ipv4 xt_hl ipt_REJECT xt_tcpudp xt_psd(O) ipt_ifrange(O) xt_pkttype xt_L
OG xt_limit nf_conntrack_ipv4 nf_defrag_ipv4 xt_NFQUEUE xt_hashlimit xt_mark xt_connmark xt_conntrack iptable_filter ip_tables ip_set_hash_ip(O) xt_set(O) ip_set(O) nfnetlink x_tables nf_nat_sip nf_conntrack_sip nf_nat_h323 nf_conntrack_h323 nf_nat_pptp nf_nat_proto_gre nf_conntrack_pptp nf_conntrack_proto_gre nf_nat_
irc nf_conntrack_irc nf_nat_ftp nf_conntrack_ftp nf_nat nf_conntra
Apr 9 10:45:20 d3 kernel: ck binfmt_misc hid_generic usbhid hid usbcore usb_common pcnet32 vmxnet(O)
Apr 9 10:45:20 d3 kernel: [ 28.349627] CPU: 1 PID: 3599 Comm: pluto Tainted: G O 3.14.37-riab.x86_64 #1
Apr 9 10:45:20 d3 kernel: [ 28.349629] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 09/30/2014
Apr 9 10:45:20 d3 kernel: [ 28.349630] 0000000000000009 ffff88000dfadbb8 ffffffff8145a0b1 0000000000000000
Apr 9 10:45:20 d3 kernel: [ 28.349632] ffff88000dfadbf0 ffffffff8103cc03 0000000000000001 ffffffff81629540
Apr 9 10:45:20 d3 kernel: [ 28.349633] 0000000000000005 ffffffff81008c10 0000000000000000 ffff88000dfadc00
Apr 9 10:45:20 d3 kernel: [ 28.349635] Call Trace:
Apr 9 10:45:20 d3 kernel: [ 28.349649] [<ffffffff8145a0b1>] dump_stack+0x45/0x56
Apr 9 10:45:20 d3 kernel: [ 28.349661] [<ffffffff8103cc03>] warn_slowpath_common+0x73/0x90
Apr 9 10:45:20 d3 kernel: [ 28.349670] [<ffffffff81008c10>] ? force_hpet_resume+0x1d0/0x1d0
Apr 9 10:45:20 d3 kernel: [ 28.349672] [<ffffffff8103ccd5>] warn_slowpath_null+0x15/0x20
Apr 9 10:45:20 d3 kernel: [ 28.349674] [<ffffffff810865fd>] smp_call_function_many+0xad/0x270
Apr 9 10:45:20 d3 kernel: [ 28.349676] [<ffffffff81008c10>] ? force_hpet_resume+0x1d0/0x1d0
Apr 9 10:45:20 d3 kernel: [ 28.349685] [<ffffffff8142375e>] ? udp_queue_rcv_skb+0x9e/0x390
Apr 9 10:45:20 d3 kernel: [ 28.349687] [<ffffffff81086818>] on_each_cpu+0x28/0x40
Apr 9 10:45:20 d3 kernel: [ 28.349689] [<ffffffff8142375d>] ? udp_queue_rcv_skb+0x9d/0x390
Apr 9 10:45:20 d3 kernel: [ 28.349691] [<ffffffff810094c6>] text_poke_bp+0x56/0xc0
Apr 9 10:45:20 d3 kernel: [ 28.349693] [<ffffffff8142375d>] ? udp_queue_rcv_skb+0x9d/0x390
Apr 9 10:45:20 d3 kernel: [ 28.349696] [<ffffffff81006982>] arch_jump_label_transform+0x82/0xf0
Apr 9 10:45:20 d3 kernel: [ 28.349702] [<ffffffff810acd87>] __jump_label_update+0x57/0x70
Apr 9 10:45:20 d3 kernel: [ 28.349705] [<ffffffff810ace35>] jump_label_update+0x95/0xa0
Apr 9 10:45:20 d3 kernel: [ 28.349707] [<ffffffff810ad245>] static_key_slow_inc+0xa5/0xb0
Apr 9 10:45:20 d3 kernel: [ 28.349709] [<ffffffff814212c0>] udp_encap_enable+0x20/0x30
Apr 9 10:45:20 d3 kernel: [ 28.349714] [<ffffffffa03b0b30>] ipsec_tunnel_ioctl+0x190/0x750 [ipsec]
Apr 9 10:45:20 d3 kernel: [ 28.349725] [<ffffffff813db8b3>] dev_ifsioc+0x303/0x350
Apr 9 10:45:20 d3 kernel: [ 28.349729] [<ffffffff813c2a39>] ? dev_get_by_name_rcu+0x69/0x90
Apr 9 10:45:20 d3 kernel: [ 28.349732] [<ffffffff813dbc9d>] dev_ioctl+0x31d/0x5b0
Apr 9 10:45:20 d3 kernel: [ 28.349740] [<ffffffff813ad27a>] sock_ioctl+0x12a/0x2c0
Apr 9 10:45:20 d3 kernel: [ 28.349750] [<ffffffff810f88f8>] do_vfs_ioctl+0x2c8/0x4a0
Apr 9 10:45:20 d3 kernel: [ 28.349752] [<ffffffff810f8b51>] SyS_ioctl+0x81/0xa0
Apr 9 10:45:20 d3 kernel: [ 28.349757] [<ffffffff8145ffc2>] system_call_fastpath+0x16/0x1b
Apr 9 10:45:20 d3 kernel: [ 28.349759] ---[ end trace 2d7f8f398beb7ce3 ]---
Apr 9 10:45:20 d3 kernel: [ 28.349760] ------------[ cut here ]------------
Apr 9 10:45:20 d3 kernel: [ 28.349763] WARNING: CPU: 1 PID: 3599 at kernel/smp.c:210 smp_call_function_single+0x125/0x170()
Apr 9 10:45:20 d3 kernel: [ 28.349763] Modules linked in: crypto_null ipsec(O) sha1_ssse3 crc32c_intel deflate zlib_deflate cts ctr ccm serpent_sse2_x86_64 serpent_generic blowfish_generic blowfish_x86_64 blowfish_common twofish_generic twofish_x86_64_3way xts twofish_x86_64 twofish_common ecb cbc md5 sha512_generi
c des_generic aes_x86_64 ablk_helper cryptd lrw gf128mul glue_helper tpm_rng tpm rng_core fuse ip_vs libcrc32c ppp_generic slhc tun af_packet 8021q ipv6 nfnetlink_queue xt_recent iptable_mangle ipt_MASQUERADE xt_REDIRECT xt_nat iptable_nat nf_nat_ipv4 xt_hl ipt_REJECT xt_tcpudp xt_psd(O) ipt_ifrange(O) xt_pkttype xt_L
OG xt_limit nf_conntrack_ipv4 nf_defrag_ipv4 xt_NFQUEUE xt_hashlimit xt_mark xt_connmark xt_conntrack iptable_filter ip_tables ip_set_hash_ip(O) xt_set(O) ip_set(O) nfnetlink x_tables nf_nat_sip nf_conntrack_sip nf_nat_h323 nf_conntrack_h323 nf_nat_pptp nf_nat_proto_gre nf_conntrack_pptp nf_conntrack_proto_gre nf_nat_
irc nf_conntrack_irc nf_nat_ftp nf_conntrack_ftp nf_nat nf_conntra
Apr 9 10:45:20 d3 kernel: ck binfmt_misc hid_generic usbhid hid usbcore usb_common pcnet32 vmxnet(O)
Apr 9 10:45:20 d3 kernel: [ 28.349794] CPU: 1 PID: 3599 Comm: pluto Tainted: G W O 3.14.37-riab.x86_64 #1
Apr 9 10:45:20 d3 kernel: [ 28.349796] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 09/30/2014
Apr 9 10:45:20 d3 kernel: [ 28.349796] 0000000000000009 ffff88000dfadb48 ffffffff8145a0b1 0000000000000000
Apr 9 10:45:20 d3 kernel: [ 28.349798] ffff88000dfadb80 ffffffff8103cc03 0000000000000000 0000000000000001
Apr 9 10:45:20 d3 kernel: [ 28.349800] ffffffff81629540 ffffffff81008c10 0000000000000000 ffff88000dfadb90
Apr 9 10:45:20 d3 kernel: [ 28.349801] Call Trace:
Apr 9 10:45:20 d3 kernel: [ 28.349803] [<ffffffff8145a0b1>] dump_stack+0x45/0x56
Apr 9 10:45:20 d3 kernel: [ 28.349806] [<ffffffff8103cc03>] warn_slowpath_common+0x73/0x90
Apr 9 10:45:20 d3 kernel: [ 28.349808] [<ffffffff81008c10>] ? force_hpet_resume+0x1d0/0x1d0
Apr 9 10:45:20 d3 kernel: [ 28.349810] [<ffffffff8103ccd5>] warn_slowpath_null+0x15/0x20
Apr 9 10:45:20 d3 kernel: [ 28.349812] [<ffffffff81086455>] smp_call_function_single+0x125/0x170
Apr 9 10:45:20 d3 kernel: [ 28.349814] [<ffffffff81008c10>] ? force_hpet_resume+0x1d0/0x1d0
Apr 9 10:45:20 d3 kernel: [ 28.349816] [<ffffffff81086774>] smp_call_function_many+0x224/0x270
Apr 9 10:45:20 d3 kernel: [ 28.349817] [<ffffffff81008c10>] ? force_hpet_resume+0x1d0/0x1d0
Apr 9 10:45:20 d3 kernel: [ 28.349820] [<ffffffff8142375e>] ? udp_queue_rcv_skb+0x9e/0x390
Apr 9 10:45:20 d3 kernel: [ 28.349822] [<ffffffff81086818>] on_each_cpu+0x28/0x40
Apr 9 10:45:20 d3 kernel: [ 28.349824] [<ffffffff8142375d>] ? udp_queue_rcv_skb+0x9d/0x390
Apr 9 10:45:20 d3 kernel: [ 28.349825] [<ffffffff810094c6>] text_poke_bp+0x56/0xc0
Apr 9 10:45:20 d3 kernel: [ 28.349827] [<ffffffff8142375d>] ? udp_queue_rcv_skb+0x9d/0x390
Apr 9 10:45:20 d3 kernel: [ 28.349829] [<ffffffff81006982>] arch_jump_label_transform+0x82/0xf0
Apr 9 10:45:20 d3 kernel: [ 28.349832] [<ffffffff810acd87>] __jump_label_update+0x57/0x70
Apr 9 10:45:20 d3 kernel: [ 28.349833] [<ffffffff810ace35>] jump_label_update+0x95/0xa0
Apr 9 10:45:20 d3 kernel: [ 28.349835] [<ffffffff810ad245>] static_key_slow_inc+0xa5/0xb0
Apr 9 10:45:20 d3 kernel: [ 28.349837] [<ffffffff814212c0>] udp_encap_enable+0x20/0x30
Apr 9 10:45:20 d3 kernel: [ 28.349841] [<ffffffffa03b0b30>] ipsec_tunnel_ioctl+0x190/0x750 [ipsec]
Apr 9 10:45:20 d3 kernel: [ 28.349844] [<ffffffff813db8b3>] dev_ifsioc+0x303/0x350
Apr 9 10:45:20 d3 kernel: [ 28.349845] [<ffffffff813c2a39>] ? dev_get_by_name_rcu+0x69/0x90
Apr 9 10:45:20 d3 kernel: [ 28.349848] [<ffffffff813dbc9d>] dev_ioctl+0x31d/0x5b0
Apr 9 10:45:20 d3 kernel: [ 28.349850] [<ffffffff813ad27a>] sock_ioctl+0x12a/0x2c0
Apr 9 10:45:20 d3 kernel: [ 28.349851] [<ffffffff810f88f8>] do_vfs_ioctl+0x2c8/0x4a0
Apr 9 10:45:20 d3 kernel: [ 28.349853] [<ffffffff810f8b51>] SyS_ioctl+0x81/0xa0
Apr 9 10:45:20 d3 kernel: [ 28.349855] [<ffffffff8145ffc2>] system_call_fastpath+0x16/0x1b
Apr 9 10:45:20 d3 kernel: [ 28.349857] ---[ end trace 2d7f8f398beb7ce4 ]---
More information about the Swan-dev
mailing list