Please note: This project is no longer active. The website is kept online for historic purposes only.
If you´re looking for a Linux driver for your Atheros WLAN device, you should continue here .

Ticket #1433 (new defect)

Opened 14 years ago

Last modified 12 years ago

skb_over_panic with iMediaLinux 5.0.2

Reported by: gavinjarman10@googlemail.com Assigned to:
Priority: major Milestone:
Component: madwifi: other Version: v0.9.3.1
Keywords: iMediaLinux Cc:
Patch is attached: 0 Pending:

Description (Last modified by mentor)

Hi

I've compiled 0.9.3.1 under iMediaLinux 5.0.2 for WRAP (using a WRAP 2E board) and when I bring up the interface :

wlanconfig ath0 create wlandev wifi0 wlanmode ap
ifconfig ath0 192.168.1.1 netmask 255.255.255.0

I get this :

skb_over_panic: text:c88b28a1 len:53 put:53 head:c7603428 data:c760345d tail:c7603400 end:c7603480 dev:<NULL>
skb_over_panic: text:c88c608f len:82 put:82 head:c1152020 data:c1152072 tail:c1152000 end:c1152c80 dev:wifi0
skb_over_panic: text:c88c608f len:76 put:76 head:c685a020 data:c685a06c tail:c685a000 end:c685ac80 dev:wifi0
skb_over_panic: text:c88b28a1 len:53 put:53 head:c7603438 data:c760346d tail:c7603410 end:c7603490 dev:<NULL>

....etc

Followed by eventual kernel panic and crash.

I had no such problem with iMediaLinux 5.0.1 (www.imedialinux.com)

Thanks

Gavin

Change History

07/07/07 01:00:28 changed by mentor

  • priority changed from critical to major.
  • description changed.

07/07/07 01:02:54 changed by mentor

  • description changed.

(follow-up: ↓ 5 ) 07/07/07 01:19:56 changed by gavinjarman10@googlemail.com

[root@imedia ~]# BUG: unable to handle kernel NULL pointer dereference at virtua l address 00000000

printing eip:

*pde = 00000000 Oops: 0000 #1 Modules linked in: cls_route cls_u32 cls_fw sch_prio sch_sfq sch_tbf sch_cbq sch _htb ndiswrapper orinoco_pci orinoco hermes ath_pci wlan_acl wlan_ccmp wlan_tkip

wlan_wep wlan_xauth wlan_scan_sta wlan_scan_ap ath_rate_sample wlan ath_hal(P)

tun emlog CPU: 0 EIP: 0060:[<c013abd7>] Tainted: P VLI EFLAGS: 00010246 (2.6.20-imedia-wrap #1) eax: 00000000 ebx: 00000000 ecx: 00000000 edx: c116a520 esi: c113df58 edi: c1171f9c ebp: 00000000 esp: c1171f68 ds: 007b es: 007b ss: 0068 Process pdflush (pid: 73, ti=c1170000 task=c1208590 task.ti=c1170000) Stack: c1171fbc c113df58 c0129f2b 00000000 00000000 c1171f9c 00000000 00000000

00000000 00000000 00000000 00000000 00000025 c113df58 c1171fbc c012a1d2 c012a2a5 c1139570 c1208590 c0129f08 00000000 c1171fbc c1171fbc ffffb011

Call Trace:

[<c0129f2b>] <0> [<c012a1d2>] <0> [<c012a2a5>] <0> [<c0129f08>] <0> [<c011c27c>

] <0> [<c011c1dc>] <0> [<c0103797>] <0> ======================= Code: 74 0e 8b 43 20 8b 50 24 85 d2 74 04 89 d8 ff d2 89 d8 e8 e1 f7 ff ff 89 f0

e8 44 3b fe ff 89 d8 e8 1b f8 ff ff 85 c0 75 ab 8b 1b <8b> 03 8d 74 26 00 81 fb 0c ff 28 c0 75 a3 5b 5e c3 57 89 c7 b8

EIP: [<c013abd7>] SS:ESP 0068:c1171f68

07/07/07 18:24:47 changed by mentor

  • description changed.

(in reply to: ↑ 3 ) 07/09/07 06:43:50 changed by mrenzmann

Replying to gavinjarman10@googlemail.com:

[root@imedia ~]# BUG: unable to handle kernel NULL pointer dereference at virtual address 00000000

Please follow the advices given on DevDocs/KernelOops to provide a decoded oops dump. In addition please give some more details on your environment, such as the kernel version that gets used in iMediaLinux - not everyone knows that distro.

07/11/07 12:22:35 changed by anonymous

I folks

I just got the same BUG skb_over_panic but with the latest SVN on 2.6.22 with a 3Com card in a plain i386 system. Unfortunetely it happens in the interrupt handler for handling the beacons interrupt and so results in a panic, not syncing... and i don't have console on the serial port so i don't have a log. The only place i can see skb_over_panic() being called is in skb_put(), so i guess it is one of the calls in ieee80211_beacon.c, however im not sure....

07/11/07 12:58:58 changed by anonymous

Here is an hand written/pen+paper stack trace:

ieee80211_beacon_update+0x6d6/0x8e6[wlan] ieee80211_beacon_update+0x6e2/0x8e6[wlan] ath_beacon_generate[ath_pci] try_to_wake_up ath_intr getnstimeofday hrtimer_run_queues handle_IRQ_event handle_level_irq .... ....

And the BUG is reporting:

test: e18bd7a0 len: 500 head:dfe41400 data dfe31410 tail 0xdfe31604 end 0xdfe31600 dev <null>

08/04/07 04:00:39 changed by mentor

There has recently been a fix for a skb_over_panic in #1477. Would you verify if you are still experiencing the porblem?

06/18/09 04:56:38 changed by anonymous

sample UDP throughput run with basic router on MPC8572 in basic 2.6.27 kernel routing is causing the kernel to crash with the following dump.A bidirection 64 byte UDP traffic test running at 60Mbps throughput on each interface aggregrating to 240Mbps across the system.

Appears to be issue with ethernet driver..any one seen suc issue

4 root 15 -5 0 skb_over_panic: text:c0276d74 len:70 put:70 head:e

f355000 data:ef350040 tail:0xef355386 end:0xef350040 dev:eth24279951087304208182

0 0 S -0 ------------[ cut here ]------------1:45.38 top

Kernel BUG at c03777a8 [verbose debug info unavailable]9.98 events/0 Oops: Exception in kernel mode, sig: 5 #10 0.0 0:27.16 events/1 SMP NR_CPUS=2 MPC8572 DS292 660 572 S 0 -2.0 0:01.30 init Modules linked in: -5 0 0 0 S 0 0.0 0:00.00 kthreadd NIP: c03777a8 LR: c03777a8 CTR: c0224f60 0 0.0 0:00.00 migration/0 REGS: ef867da0 TRAP: 0700 Not tainted (2.6.27.6) 0:00.00 migration/1 MSR: 00029000 <EE,ME> CR: 24024022 XER: 20000000 0:00.00 khelper TASK = ef844500[4] 'ksoftirqd/0' THREAD: ef866000 CPU: 0.12 kblockd/0 GPR00: c03777a8 ef867e50 ef844500 00000073 00021000 ffffffff c02283ec 00005115 GPR08: 00000001 c059a18c 00005115 c059a1d0 24024082 1009c8a0 eecfde00 eed87400 GPR16: 00000010 ef997000 00000000 00000001 ef997400 ef997470 00000000 00000000 GPR24: 000000f4 eedf3560 eed875d0 eef4a340 ef997000 00000046 ef997400 ef355340 NIP [c03777a8] skb_over_panic+0x48/0x5c LR [c03777a8] skb_over_panic+0x48/0x5c Call Trace: [ef867e50] [c03777a8] skb_over_panic+0x48/0x5c (unreliable) [ef867e60] [c03794f0] skb_put+0x5c/0x60 [ef867e70] [c0276d74] gfar_clean_rx_ring+0x1b0/0x770 [ef867ee0] [c0278ad0] gfar_poll+0x228/0x4f0 [ef867f30] [c03834d8] net_rx_action+0x10c/0x1cc [ef867f70] [c003fa78] do_softirq+0x98/0x12c [ef867fa0] [c0004bdc] do_softirq+0x60/0x64 [ef867fb0] [c003f93c] ksoftirqd+0x80/0x124 [ef867fd0] [c005163c] kthread+0x48/0x84 [ef867ff0] [c000e83c] kernel_thread+0x44/0x60 Instruction dump: 80a30054 80e300a4 2f800000 810300a8 8163009c 814300a0 419e0020 3c60c053 7d695b78 3863b8fc 90010008 4bcc3481 <0fe00000> 48000000 3d20c04e 380977c0 Kernel panic - not syncing: Fatal exception in interrupt ------------[ cut here ]------------ Badness at c005ec7c [verbose debug info unavailable] NIP: c005ec7c LR: c005ee9c CTR: c0224f60 REGS: ef867ad0 TRAP: 0700 Tainted: G D (2.6.27.6) MSR: 00021000 <ME> CR: 24024024 XER: 20000000 TASK = ef844500[4] 'ksoftirqd/0' THREAD: ef866000 CPU: 0 GPR00: 00000001 ef867b80 ef844500 ef867c18 c000f998 00000000 00000000 00005736 GPR08: 00000001 c05d0000 00005736 00000003 24024024 1009c8a0 eecfde00 eed87400 GPR16: 00000010 ef997000 00000000 00000001 ef997400 ef997470 00000000 00000000 GPR24: 000000f4 eedf3560 00000000 c000f998 c04e7ae8 00000000 ef867c18 c05d0000 NIP [c005ec7c] smp_call_function_mask+0x34/0x224 LR [c005ee9c] smp_call_function+0x30/0x40 Call Trace: [ef867b80] [ef867bc0] 0xef867bc0 (unreliable) [ef867c10] [c005ee9c] smp_call_function+0x30/0x40 [ef867c20] [c000fb58] smp_send_stop+0x20/0x30 [ef867c30] [c0039cd0] panic+0x98/0x160 [ef867c80] [c000c404] die+0x16c/0x178 [ef867ca0] [c000c6a8] _exception+0x154/0x19c [ef867d90] [c000f0d8] ret_from_except_full+0x0/0x4c [ef867e50] [c03777a8] skb_over_panic+0x48/0x5c [ef867e60] [c03794f0] skb_put+0x5c/0x60 [ef867e70] [c0276d74] gfar_clean_rx_ring+0x1b0/0x770 [ef867ee0] [c0278ad0] gfar_poll+0x228/0x4f0 [ef867f30] [c03834d8] net_rx_action+0x10c/0x1cc [ef867f70] [c003fa78] do_softirq+0x98/0x12c [ef867fa0] [c0004bdc] do_softirq+0x60/0x64 [ef867fb0] [c003f93c] ksoftirqd+0x80/0x124 [ef867fd0] [c005163c] kthread+0x48/0x84 [ef867ff0] [c000e83c] kernel_thread+0x44/0x60 Instruction dump: 7c0802a6 7d800026 bf010070 7c7e1b78 90010094 7c9b2378 9181006c 7cba2b78 7cdd3378 7c0000a6 68008000 54008ffe <0f000000> 54290024 3d60c05d 81490008 ------------[ cut here ]------------ Badness at c005eb74 [verbose debug info unavailable] NIP: c005eb74 LR: c005eddc CTR: c0224f60 REGS: ef867a90 TRAP: 0700 Tainted: G D W (2.6.27.6) MSR: 00021000 <ME> CR: 44024028 XER: 20000000 TASK = ef844500[4] 'ksoftirqd/0' THREAD: ef866000 CPU: 0 GPR00: 00000001 ef867b40 ef844500 00000001 c000f998 00000000 00000000 00000000 GPR08: 00000000 ef866000 00000002 00000000 24024024 1009c8a0 eecfde00 eed87400 GPR16: 00000010 ef997000 00000000 00000001 ef997400 ef997470 00000000 00000000 GPR24: 000000f4 eedf3560 00000000 c000f998 00000001 00000001 c000f998 00000000 NIP [c005eb74] smp_call_function_single+0x30/0x104 LR [c005eddc] smp_call_function_mask+0x194/0x224 Call Trace: [ef867b80] [c005eddc] smp_call_function_mask+0x194/0x224 [ef867c10] [c005ee9c] smp_call_function+0x30/0x40 [ef867c20] [c000fb58] smp_send_stop+0x20/0x30 [ef867c30] [c0039cd0] panic+0x98/0x160 [ef867c80] [c000c404] die+0x16c/0x178 [ef867ca0] [c000c6a8] _exception+0x154/0x19c [ef867d90] [c000f0d8] ret_from_except_full+0x0/0x4c [ef867e50] [c03777a8] skb_over_panic+0x48/0x5c [ef867e60] [c03794f0] skb_put+0x5c/0x60 [ef867e70] [c0276d74] gfar_clean_rx_ring+0x1b0/0x770 [ef867ee0] [c0278ad0] gfar_poll+0x228/0x4f0 [ef867f30] [c03834d8] net_rx_action+0x10c/0x1cc [ef867f70] [c003fa78] do_softirq+0x98/0x12c [ef867fa0] [c0004bdc] do_softirq+0x60/0x64 [ef867fb0] [c003f93c] ksoftirqd+0x80/0x124 [ef867fd0] [c005163c] kthread+0x48/0x84