[strongSwan] [strongSwan 5.0.1] kernel panic occur
신충수
cavatina at samji.com
Thu Dec 13 02:29:15 CET 2012
Sefficeware
Hello, all
I'm trying to setup a IPsec IPv4 tunnel with strongSwan. And it looks like success establishing SA.
But when using the Tunnel, Kernel panic is occured. How can I solve this problem?
Below is console log. If someone can answer the question, I appreciate you very much. Thanks in advance!
Jason
-------------- console log --------------------------
test:/usr/local/sbin> ./ipsec start --debug-all
Starting strongSwan 5.0.1 IPsec [starter]...
Loading config setup
Loading conn %default
ikelifetime=60m
keylife=20m
rekeymargin=3m
keyingtries=1
keyexchange=ikev2
authby=secret
Loading conn 'home'
left=172.16.41.63
leftfirewall=no
right=172.16.41.64
rightsubnet=10.1.0.0/24
auto=add
sh: modprobe: not found
sh: modprobe: not found
sh: modprobe: not found
sh: modprobe: not found
sh: modprobe: not found
found netkey IPsec stack
test:/usr/local/sbin> ./ipsec up home
initiating IKE_SA home[1] to 172.16.41.64
generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) ]
sending packet: from 172.16.41.63[500] to 172.16.41.64[500]
received packet: from 172.16.41.64[500] to 172.16.41.63[500]
parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(MULT_AUTH) ]
authentication of '172.16.41.63' (myself) with pre-shared key
establishing CHILD_SA home
generating IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr AUTH SA TSi TSr N(MOBIKE_SUP) N(NO_ADD_ADDR) N(MULT_AUTH) N(EAP_ONLY) ]
sending packet: from 172.16.41.63[4500] to 172.16.41.64[4500]
received packet: from 172.16.41.64alg: No test for authenc(hmac(sha1),cbc(aes)) (authenc(hmac(sha1-generic),cbc(aes-generic)))
[4500] to 172.16.41.63[4500]
parsed IKE_AUTH response 1 [ IDr Acavium_delete_hndl : NULL Sa/SA Handle : with x a800000026981800 x->sa_handle (null)
UTH SA TSi TSr N(AUTH_LFT) N(MOBIKE_SUP) N(NO_ADD_ADDR) ]
authentication of '172.16.41.64' with pre-shared key successful
IKE_SA home[1] established between 172.16.41.63[172.16.41.63]...172.16.41.64[172.16.41.64]
scheduling reauthentication in 3404s
maximum IKE_SA lifetime 3584s
CHILD_SA home{1} established with SPIs cbe681ac_i cb4240e0_o and TS 172.16.41.63/32 === 10.1.0.0/24
test:/usr/local/sbin>
test:/usr/local/sbin> ./ipsec statusall
Status of IKE charon daemon (strongSwan 5.0.1, Linux 2.6.32.27-Cavium-Octeon, mips64):
uptime: 24 seconds, since Jan 01 00:02:10 1970
malloc: sbrk 270336, mmap 0, used 211312, free 59024
worker threads: 8 of 16 idle, 7/1/0/0 working, job queue: 0/0/0/0, scheduled: 3
loaded plugins: charon aes des sha1 sha2 md5 random nonce x509 revocation constraints pubkey pkcs1 pkcs8 pgp dnskey pem fips-prf gmp xcbc cmac hmac attr kernel-netlink resolve socket-default stroke updown eap-identity eap-sim eap-aka eap-aka-3gpp2 xauth-generic
Listening IP addresses:
172.16.41.63
Connections:
home: 172.16.41.63...172.16.41.64 IKEv2
home: local: [172.16.41.63] uses pre-shared key authentication
home: remote: [172.16.41.64] uses pre-shared key authentication
home: child: dynamic === 10.1.0.0/24 TUNNEL
Security Associations (1 up, 0 connecting):
home[1]: ESTABLISHED 8 seconds ago, 172.16.41.63[172.16.41.63]...172.16.41.64[172.16.41.64]
home[1]: IKEv2 SPIs: 61a7dbfe28992e3d_i* aaea0425f8f17eb6_r, pre-shared key reauthentication in 53 minutes
home[1]: IKE proposal: AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048
home{1}: INSTALLED, TUNNEL, ESP SPIs: cbe681ac_i cb4240e0_o
home{1}: AES_CBC_128/HMAC_SHA1_96, 0 bytes_i, 0 bytes_o, rekeying in 14 minutes
home{1}: 172.16.41.63/32 === 10.1.0.0/24
test:/usr/local/sbin>
test:/usr/local/sbin>
test:/usr/local/sbin> ping 10.1.0.10
PING 10.1.0.10 (10.1.0.10) 56(84) bytes of data.CPU 0 Unable to handle kernel paging request at virtual address 0000010000000010, epc == ffffffffc0007f84, ra == ffffffffc0007f44
Oops[#1]:
Cpu 0
$ 0 : 0000000000000000 0000000000000008 0000010000000010 a800000026964180
$ 4 : 0000000000000002 0000000000000001 0000000000000054 0000010000000010
$ 8 : fffffffffffffffe 0000000000000000 0000000000000070 1011121314151617
$12 : 0000000000000010 ffffffff80105b14 0000000060f89f07 3031323334353637
$16 : 0000000000000060 a800000026964180 a800000026981c00 a8000000314bee00
$20 : a800000026964180 0000000000000000 a80000003149f240 000000000000000c
$24 : 0000000000000000 ffffffffc0007ea8
$28 : a800000026a40000 a800000026a43940 a800000000845400 ffffffffc0007f44
Hi : 00000000000002b0
Lo : 00000000000271c9
epc : ffffffffc0007f84 cavium_ipsec_esp4_output+0xdc/0x3c0 [cvm_ipsec_kame]
Not tainted
ra : ffffffffc0007f44 cavium_ipsec_esp4_output+0x9c/0x3c0 [cvm_ipsec_kame]
Status: 1000cce3 KX SX UX KERNEL EXL IE
Cause : 0080000c
BadVA : 0000010000000010
PrId : 000d9401 (Cavium Octeon II)
Modules linked in: cvm_ipsec_kame lge_femto1588_irq
Process ping (pid: 917, threadinfo=a800000026a40000, task=a800000026a27540, tls=000000555e4252a0)
Stack : a800000026964180 a800000026964180 a800000026981c00 ffffffff804cf4d4
0000000000000000 a800000026964180 a800000026981c00 a8000000314bee00
a800000026981c34 0000000000000000 ffffffff8083b120 a8000000269641b8
ffffffff808e0000 ffffffff8051dec0 a800000026964180 a80000002696903c
a80000002ed5e080 a8000000314bee00 0000000000004000 0000000000000040
0000000000004000 a800000026a43ce0 ffffffff808e0000 ffffffff804d076c
a800000026a43a68 0000000000000000 a800000026a43ce0 a80000002ed5e080
0000000000000040 a800000026a43a48 0000000000000000 ffffffff804f0d3c
0000000000100100 0000000000000000 0a01000a00000000 0000000000000000
00ffffff80837b00 0000000000000000 000000000a01000a ac10293f00000000
...
Call Trace:
[<ffffffffc0007f84>] cavium_ipsec_esp4_output+0xdc/0x3c0 [cvm_ipsec_kame]
[<ffffffff8051dec0>] xfrm_output_resume+0x2f8/0x420
[<ffffffff804d076c>] ip_push_pending_frames+0x28c/0x3f8
[<ffffffff804f0d3c>] raw_sendmsg+0x4b4/0x890
[<ffffffff804904d4>] sock_sendmsg+0xec/0x128
[<ffffffff80490710>] SyS_sendmsg+0x200/0x2e0
[<ffffffff80102c44>] handle_sys64+0x44/0x64
Code: 24a2ffff 24a40001 00e2102d <a0450000> 8e860068 01061023 00501021 00a2182b 1460fff7
Disabling lock debugging due to kernel taint
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.strongswan.org/pipermail/users/attachments/20121213/91b37cc3/attachment.html>
More information about the Users
mailing list