Kernel panic when using Openswan 2.6.21 with KLIPS

Bug #388837 reported by angriukas
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
linux (Ubuntu)
Expired
Undecided
Unassigned

Bug Description

Binary package hint: reportbug

Hello,

When using Openswan 2.6.21 with KLIPS, kernel panic occur:
"Kernel panic - not syncing: Fatal exception in interrupt"

Hardware: CPU-Intel Celeron 633, on Intel D815EFV
OS: Ubuntu 9.04, 2.6.28-11-server #42-Ubuntu SMP Fri Apr 17

Details:
Compiled sources of Openswan 2.6.21 for using ipsec via Openswan stack KLIPS:
- compiled usreland component
- compiled KLIPS IPstack -> ipsec.ko module (because there is need to have virtual ipsec adapter),
- kernel is not re-compiled - using standard kernel 2.6.28-11-server
- IPSEC Nat-Traversal - disabled in ipsec.conf
- unloaded NETKEY modules before loading KLIPS: rmmod af_key esp4 ah4 ipcomp
- ip forward - ON

Start IPSec tunnel, any access to the tunnel will lead to: "Kernel panic - not syncing: Fatal exception in interrupt"

Extra info:
re-compiled same kernel version without SMP - didn't help.
No kernel panic on Ubuntu 8.04.2, kernel 2.6.24-24-server #1 SMP Wed Apr 15

Regards,
Andrius.

Revision history for this message
Daniel Hahler (blueyed) wrote :

Re-assigning to "linux" package, it does not sound like a bug in reportbug.

affects: reportbug (Ubuntu) → linux (Ubuntu)
Revision history for this message
Jeremy Foshee (jeremyfoshee) wrote :

Hi angriukas,

This bug was reported a while ago and there hasn't been any activity in it recently. We were wondering if this is still an issue? Can you try with the latest development release of Ubuntu? ISO CD images are available from http://cdimage.ubuntu.com/releases/ .

If it remains an issue, could you run the following command from a Terminal (Applications->Accessories->Terminal). It will automatically gather and attach updated debug information to this report.

apport-collect -p linux 388837

Also, if you could test the latest upstream kernel available that would be great. It will allow additional upstream developers to examine the issue. Refer to https://wiki.ubuntu.com/KernelMainlineBuilds . Once you've tested the upstream kernel, please remove the 'needs-upstream-testing' tag. This can be done by clicking on the yellow pencil icon next to the tag located at the bottom of the bug description and deleting the 'needs-upstream-testing' text. Please let us know your results.

Thanks in advance.

[This is an automated message. Apologies if it has reached you inappropriately; please just reply to this message indicating so.]

tags: added: needs-kernel-logs
tags: added: needs-upstream-testing
tags: added: kj-triage
Changed in linux (Ubuntu):
status: New → Incomplete
Revision history for this message
angriukas (andrius-uskevicius) wrote :

Hello Jeremy,

this issue have been occur on Pentium III 1GHz CPU (also on Pentium Celeron 633 Mhz) with Ubuntu 9.04/9.10
This is quite an old CPU, we are using such hardware as firewall.
At this moment we are using 8.04 LTS.
In several days I will prepare testing platform on latest kernel available.
Will post message about results.

regards,
Andrius.

Revision history for this message
Jeremy Foshee (jeremyfoshee) wrote :

This bug report was marked as Incomplete and has not had any updated comments for quite some time. As a result this bug is being closed. Please reopen if this is still an issue in the current Ubuntu development release http://cdimage.ubuntu.com/daily-live/current/ . Also, please be sure to provide any requested information that may have been missing. To reopen the bug, click on the current status under the Status column and change the status back to "New". Thanks.

[This is an automated message. Apologies if it has reached you inappropriately; please just reply to this message indicating so.]

tags: added: kj-expired
Changed in linux (Ubuntu):
status: Incomplete → Expired
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.