[Swan-dev] kernel warnings with klips and kernel 3.3 or higher

Wolfgang Nothdurft wolfgang at linogate.de
Thu Apr 9 12:33:17 EEST 2015


When starting pluto on a system with kernel 3.3 or higher, the kernel 
print warnings (see attached log from kernel 3.14.37):

WARNING: CPU: 1 PID: 3599 at kernel/smp.c:347 
smp_call_function_many+0xad/0x270()

WARNING: CPU: 1 PID: 3599 at kernel/smp.c:210 
smp_call_function_single+0x125/0x170()

The problem is that udp_encap_enable() is called between the 
spin_lock_irqsave/spin_unlock_irqrestore in linux/net/ipsec/ipsec_tunnel.c

I'm not sure, if it is safe to move the spin_lock_irqsave right before 
the list_add command, instead of disabling irqs for the whole block 
including the udp_encap_enable.

Wolfgang
-------------- next part --------------
Apr  9 10:45:18 d3 ipsec__plutorun: Starting Pluto subsystem...
Apr  9 10:45:20 d3 kernel: [   28.349554] ------------[ cut here ]------------
Apr  9 10:45:20 d3 kernel: [   28.349582] WARNING: CPU: 1 PID: 3599 at kernel/smp.c:347 smp_call_function_many+0xad/0x270()
Apr  9 10:45:20 d3 kernel: [   28.349584] Modules linked in: crypto_null ipsec(O) sha1_ssse3 crc32c_intel deflate zlib_deflate cts ctr ccm serpent_sse2_x86_64 serpent_generic blowfish_generic blowfish_x86_64 blowfish_common twofish_generic twofish_x86_64_3way xts twofish_x86_64 twofish_common ecb cbc md5 sha512_generi
c des_generic aes_x86_64 ablk_helper cryptd lrw gf128mul glue_helper tpm_rng tpm rng_core fuse ip_vs libcrc32c ppp_generic slhc tun af_packet 8021q ipv6 nfnetlink_queue xt_recent iptable_mangle ipt_MASQUERADE xt_REDIRECT xt_nat iptable_nat nf_nat_ipv4 xt_hl ipt_REJECT xt_tcpudp xt_psd(O) ipt_ifrange(O) xt_pkttype xt_L
OG xt_limit nf_conntrack_ipv4 nf_defrag_ipv4 xt_NFQUEUE xt_hashlimit xt_mark xt_connmark xt_conntrack iptable_filter ip_tables ip_set_hash_ip(O) xt_set(O) ip_set(O) nfnetlink x_tables nf_nat_sip nf_conntrack_sip nf_nat_h323 nf_conntrack_h323 nf_nat_pptp nf_nat_proto_gre nf_conntrack_pptp nf_conntrack_proto_gre nf_nat_
irc nf_conntrack_irc nf_nat_ftp nf_conntrack_ftp nf_nat nf_conntra
Apr  9 10:45:20 d3 kernel: ck binfmt_misc hid_generic usbhid hid usbcore usb_common pcnet32 vmxnet(O)
Apr  9 10:45:20 d3 kernel: [   28.349627] CPU: 1 PID: 3599 Comm: pluto Tainted: G           O 3.14.37-riab.x86_64 #1
Apr  9 10:45:20 d3 kernel: [   28.349629] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 09/30/2014
Apr  9 10:45:20 d3 kernel: [   28.349630]  0000000000000009 ffff88000dfadbb8 ffffffff8145a0b1 0000000000000000
Apr  9 10:45:20 d3 kernel: [   28.349632]  ffff88000dfadbf0 ffffffff8103cc03 0000000000000001 ffffffff81629540
Apr  9 10:45:20 d3 kernel: [   28.349633]  0000000000000005 ffffffff81008c10 0000000000000000 ffff88000dfadc00
Apr  9 10:45:20 d3 kernel: [   28.349635] Call Trace:
Apr  9 10:45:20 d3 kernel: [   28.349649]  [<ffffffff8145a0b1>] dump_stack+0x45/0x56
Apr  9 10:45:20 d3 kernel: [   28.349661]  [<ffffffff8103cc03>] warn_slowpath_common+0x73/0x90
Apr  9 10:45:20 d3 kernel: [   28.349670]  [<ffffffff81008c10>] ? force_hpet_resume+0x1d0/0x1d0
Apr  9 10:45:20 d3 kernel: [   28.349672]  [<ffffffff8103ccd5>] warn_slowpath_null+0x15/0x20
Apr  9 10:45:20 d3 kernel: [   28.349674]  [<ffffffff810865fd>] smp_call_function_many+0xad/0x270
Apr  9 10:45:20 d3 kernel: [   28.349676]  [<ffffffff81008c10>] ? force_hpet_resume+0x1d0/0x1d0
Apr  9 10:45:20 d3 kernel: [   28.349685]  [<ffffffff8142375e>] ? udp_queue_rcv_skb+0x9e/0x390
Apr  9 10:45:20 d3 kernel: [   28.349687]  [<ffffffff81086818>] on_each_cpu+0x28/0x40
Apr  9 10:45:20 d3 kernel: [   28.349689]  [<ffffffff8142375d>] ? udp_queue_rcv_skb+0x9d/0x390
Apr  9 10:45:20 d3 kernel: [   28.349691]  [<ffffffff810094c6>] text_poke_bp+0x56/0xc0
Apr  9 10:45:20 d3 kernel: [   28.349693]  [<ffffffff8142375d>] ? udp_queue_rcv_skb+0x9d/0x390
Apr  9 10:45:20 d3 kernel: [   28.349696]  [<ffffffff81006982>] arch_jump_label_transform+0x82/0xf0
Apr  9 10:45:20 d3 kernel: [   28.349702]  [<ffffffff810acd87>] __jump_label_update+0x57/0x70
Apr  9 10:45:20 d3 kernel: [   28.349705]  [<ffffffff810ace35>] jump_label_update+0x95/0xa0
Apr  9 10:45:20 d3 kernel: [   28.349707]  [<ffffffff810ad245>] static_key_slow_inc+0xa5/0xb0
Apr  9 10:45:20 d3 kernel: [   28.349709]  [<ffffffff814212c0>] udp_encap_enable+0x20/0x30
Apr  9 10:45:20 d3 kernel: [   28.349714]  [<ffffffffa03b0b30>] ipsec_tunnel_ioctl+0x190/0x750 [ipsec]
Apr  9 10:45:20 d3 kernel: [   28.349725]  [<ffffffff813db8b3>] dev_ifsioc+0x303/0x350
Apr  9 10:45:20 d3 kernel: [   28.349729]  [<ffffffff813c2a39>] ? dev_get_by_name_rcu+0x69/0x90
Apr  9 10:45:20 d3 kernel: [   28.349732]  [<ffffffff813dbc9d>] dev_ioctl+0x31d/0x5b0
Apr  9 10:45:20 d3 kernel: [   28.349740]  [<ffffffff813ad27a>] sock_ioctl+0x12a/0x2c0
Apr  9 10:45:20 d3 kernel: [   28.349750]  [<ffffffff810f88f8>] do_vfs_ioctl+0x2c8/0x4a0
Apr  9 10:45:20 d3 kernel: [   28.349752]  [<ffffffff810f8b51>] SyS_ioctl+0x81/0xa0
Apr  9 10:45:20 d3 kernel: [   28.349757]  [<ffffffff8145ffc2>] system_call_fastpath+0x16/0x1b
Apr  9 10:45:20 d3 kernel: [   28.349759] ---[ end trace 2d7f8f398beb7ce3 ]---
Apr  9 10:45:20 d3 kernel: [   28.349760] ------------[ cut here ]------------
Apr  9 10:45:20 d3 kernel: [   28.349763] WARNING: CPU: 1 PID: 3599 at kernel/smp.c:210 smp_call_function_single+0x125/0x170()
Apr  9 10:45:20 d3 kernel: [   28.349763] Modules linked in: crypto_null ipsec(O) sha1_ssse3 crc32c_intel deflate zlib_deflate cts ctr ccm serpent_sse2_x86_64 serpent_generic blowfish_generic blowfish_x86_64 blowfish_common twofish_generic twofish_x86_64_3way xts twofish_x86_64 twofish_common ecb cbc md5 sha512_generi
c des_generic aes_x86_64 ablk_helper cryptd lrw gf128mul glue_helper tpm_rng tpm rng_core fuse ip_vs libcrc32c ppp_generic slhc tun af_packet 8021q ipv6 nfnetlink_queue xt_recent iptable_mangle ipt_MASQUERADE xt_REDIRECT xt_nat iptable_nat nf_nat_ipv4 xt_hl ipt_REJECT xt_tcpudp xt_psd(O) ipt_ifrange(O) xt_pkttype xt_L
OG xt_limit nf_conntrack_ipv4 nf_defrag_ipv4 xt_NFQUEUE xt_hashlimit xt_mark xt_connmark xt_conntrack iptable_filter ip_tables ip_set_hash_ip(O) xt_set(O) ip_set(O) nfnetlink x_tables nf_nat_sip nf_conntrack_sip nf_nat_h323 nf_conntrack_h323 nf_nat_pptp nf_nat_proto_gre nf_conntrack_pptp nf_conntrack_proto_gre nf_nat_
irc nf_conntrack_irc nf_nat_ftp nf_conntrack_ftp nf_nat nf_conntra
Apr  9 10:45:20 d3 kernel: ck binfmt_misc hid_generic usbhid hid usbcore usb_common pcnet32 vmxnet(O)
Apr  9 10:45:20 d3 kernel: [   28.349794] CPU: 1 PID: 3599 Comm: pluto Tainted: G        W  O 3.14.37-riab.x86_64 #1
Apr  9 10:45:20 d3 kernel: [   28.349796] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 09/30/2014
Apr  9 10:45:20 d3 kernel: [   28.349796]  0000000000000009 ffff88000dfadb48 ffffffff8145a0b1 0000000000000000
Apr  9 10:45:20 d3 kernel: [   28.349798]  ffff88000dfadb80 ffffffff8103cc03 0000000000000000 0000000000000001
Apr  9 10:45:20 d3 kernel: [   28.349800]  ffffffff81629540 ffffffff81008c10 0000000000000000 ffff88000dfadb90
Apr  9 10:45:20 d3 kernel: [   28.349801] Call Trace:
Apr  9 10:45:20 d3 kernel: [   28.349803]  [<ffffffff8145a0b1>] dump_stack+0x45/0x56
Apr  9 10:45:20 d3 kernel: [   28.349806]  [<ffffffff8103cc03>] warn_slowpath_common+0x73/0x90
Apr  9 10:45:20 d3 kernel: [   28.349808]  [<ffffffff81008c10>] ? force_hpet_resume+0x1d0/0x1d0
Apr  9 10:45:20 d3 kernel: [   28.349810]  [<ffffffff8103ccd5>] warn_slowpath_null+0x15/0x20
Apr  9 10:45:20 d3 kernel: [   28.349812]  [<ffffffff81086455>] smp_call_function_single+0x125/0x170
Apr  9 10:45:20 d3 kernel: [   28.349814]  [<ffffffff81008c10>] ? force_hpet_resume+0x1d0/0x1d0
Apr  9 10:45:20 d3 kernel: [   28.349816]  [<ffffffff81086774>] smp_call_function_many+0x224/0x270
Apr  9 10:45:20 d3 kernel: [   28.349817]  [<ffffffff81008c10>] ? force_hpet_resume+0x1d0/0x1d0
Apr  9 10:45:20 d3 kernel: [   28.349820]  [<ffffffff8142375e>] ? udp_queue_rcv_skb+0x9e/0x390
Apr  9 10:45:20 d3 kernel: [   28.349822]  [<ffffffff81086818>] on_each_cpu+0x28/0x40
Apr  9 10:45:20 d3 kernel: [   28.349824]  [<ffffffff8142375d>] ? udp_queue_rcv_skb+0x9d/0x390
Apr  9 10:45:20 d3 kernel: [   28.349825]  [<ffffffff810094c6>] text_poke_bp+0x56/0xc0
Apr  9 10:45:20 d3 kernel: [   28.349827]  [<ffffffff8142375d>] ? udp_queue_rcv_skb+0x9d/0x390
Apr  9 10:45:20 d3 kernel: [   28.349829]  [<ffffffff81006982>] arch_jump_label_transform+0x82/0xf0
Apr  9 10:45:20 d3 kernel: [   28.349832]  [<ffffffff810acd87>] __jump_label_update+0x57/0x70
Apr  9 10:45:20 d3 kernel: [   28.349833]  [<ffffffff810ace35>] jump_label_update+0x95/0xa0
Apr  9 10:45:20 d3 kernel: [   28.349835]  [<ffffffff810ad245>] static_key_slow_inc+0xa5/0xb0
Apr  9 10:45:20 d3 kernel: [   28.349837]  [<ffffffff814212c0>] udp_encap_enable+0x20/0x30
Apr  9 10:45:20 d3 kernel: [   28.349841]  [<ffffffffa03b0b30>] ipsec_tunnel_ioctl+0x190/0x750 [ipsec]
Apr  9 10:45:20 d3 kernel: [   28.349844]  [<ffffffff813db8b3>] dev_ifsioc+0x303/0x350
Apr  9 10:45:20 d3 kernel: [   28.349845]  [<ffffffff813c2a39>] ? dev_get_by_name_rcu+0x69/0x90
Apr  9 10:45:20 d3 kernel: [   28.349848]  [<ffffffff813dbc9d>] dev_ioctl+0x31d/0x5b0
Apr  9 10:45:20 d3 kernel: [   28.349850]  [<ffffffff813ad27a>] sock_ioctl+0x12a/0x2c0
Apr  9 10:45:20 d3 kernel: [   28.349851]  [<ffffffff810f88f8>] do_vfs_ioctl+0x2c8/0x4a0
Apr  9 10:45:20 d3 kernel: [   28.349853]  [<ffffffff810f8b51>] SyS_ioctl+0x81/0xa0
Apr  9 10:45:20 d3 kernel: [   28.349855]  [<ffffffff8145ffc2>] system_call_fastpath+0x16/0x1b
Apr  9 10:45:20 d3 kernel: [   28.349857] ---[ end trace 2d7f8f398beb7ce4 ]---


More information about the Swan-dev mailing list