Project

General

Profile

Actions

Bug #143

closed

kernel warning stack trace(s) followed by spontaneous reboot

Added by Anonymous almost 14 years ago. Updated almost 8 years ago.

Status:
Closed
Priority:
Normal
Assignee:
Target version:
Start date:
Due date:
% Done:

100%

Estimated time:

Description

I have seen this same warning several times, captured on a serial port attached to a soekris net4826, running r24954 OpenWrt with r1902 + some fragmentation patches. The device has vis_mode server turned on. The first time the same stack trace was emitted 90-some times in a row before the device rebooted itself:

------------[ cut here ]------------
WARNING: at lib/kref.c:34 kref_get+0x18/0x30()
Modules linked in: scx200_wdt ath_pci ath_hal(P) leds_net48xx scx200_gpio batman_adv nf_nat_tftp nf_conntrack_tftp nf_nat_irc nf_conntrack_irc nf_nat_ftp nf_conntrack_ftp ipt_MASQUERADE iptable_nat
 nf_nat xt_NOTRACK iptable_raw xt_state nf_conntrack_ipv4 nf_defrag_ipv4 nf_conntrack ipt_REJECT xt_TCPMSS ipt_LOG xt_comment xt_multiport xt_mac xt_limit iptable_mangle iptable_filter ip_tables xt
_tcpudp x_tables nsc_gpio natsemi ipv6
Pid: 322, comm: kworker/u:2 Tainted: P        W   2.6.37 #4
Call Trace:
 [<c1120be8>] ? kref_get+0x18/0x30
 [<c1026a97>] ? warn_slowpath_common+0x87/0xb0
 [<c1120be8>] ? kref_get+0x18/0x30
 [<c1026adb>] ? warn_slowpath_null+0x1b/0x20
 [<c1120be8>] ? kref_get+0x18/0x30
 [<c4bc1a8f>] ? receive_client_update_packet+0x46f/0x730 [batman_adv]
 [<c1035ec5>] ? process_one_work+0x155/0x250
 [<c4bc16f0>] ? receive_client_update_packet+0xd0/0x730 [batman_adv]
 [<c1036e74>] ? worker_thread+0x124/0x200
 [<c1036d50>] ? worker_thread+0x0/0x200
 [<c1039c6c>] ? kthread+0x6c/0x80
 [<c1039c00>] ? kthread+0x0/0x80
 [<c1002e36>] ? kernel_thread_helper+0x6/0x30
---[ end trace 98aa451a0a91a4e2 ]---

The second time, several of these same stack traces were followed by a panic:

------------[ cut here ]------------
Kernel BUG at c107be6e [verbose debug info unavailable]
invalid opcode: 0000 [#1] 
last sysfs file: /sys/devices/virtual/net/bat0/mesh/vis_mode
Modules linked in: scx200_wdt ath_pci ath_hal(P) leds_net48xx scx200_gpio batman_adv nf_nat_tftp nf_conntrack_tftp nf_nat_irc nf_conntrack_irc nf_nat_ftp nf_conntrack_ftp ipt_MASQUERADE iptable_nat nf_nat xt_NOTRACK iptable_raw xt_state nf_conntrack_ipv4 nf_defrag_ipv4 nf_conntrack ipt_REJECT xt_TCPMSS ipt_LOG xt_comment xt_multiport xt_mac xt_limit iptable_mangle iptable_filter ip_tables xt_tcpudp x_tables nsc_gpio natsemi ipv6

Pid: 322, comm: kworker/u:2 Tainted: P        W   2.6.37 #4 /
EIP: 0060:[<c107be6e>] EFLAGS: 00010246 CPU: 0
EIP is at kfree+0x4e/0xb0
EAX: 40000000 EBX: c3f80000 ECX: 00000000 EDX: c3fcc560
ESI: c262b000 EDI: 00000000 EBP: c2da32e0 ESP: c3809e3c
 DS: 007b ES: 007b FS: 0000 GS: 0000 SS: 0068
Process kworker/u:2 (pid: 322, ti=c3808000 task=c3853980 task.ti=c391e000)
Stack:
 c262b040 c2d74a80 c3809ef4 00000000 c11f62d8 c2d74a80 c4cfd5b6 00000000
 c2d74a80 c4d02bb1 00000080 00000031 ef462c9f 00000014 c2459000 c2d74a80
 00000000 c2da0000 00000001 c121f1d0 c1358e20 c2e449c0 c1358e40 c11fd156
Call Trace:
 [<c11f62d8>] ? +kfree_skb+0x8/0x80
 [<c4cfd5b6>] ? ieee80211_dev_kfree_skb+0x46/0x60 [ath_pci]
 [<c4d02bb1>] ? ieee80211_input+0x1211/0x1240 [ath_pci]
 [<c121f1d0>] ? ip_rcv+0x0/0x2a0
 [<c11fd156>] ? +netif_receive_skb+0x446/0x480
 [<c107c0c4>] ? +slab_alloc+0x74/0x1e0
 [<c4cfd5b6>] ? ieee80211_dev_kfree_skb+0x46/0x60 [ath_pci]
 [<c11f8000>] ? skb_shift+0xf0/0x360
 [<c11f6fd9>] ? dev_alloc_skb+0x19/0x30
 [<c11f6fd9>] ? dev_alloc_skb+0x19/0x30
 [<c4d02cb8>] ? ieee80211_input_all+0xd8/0x120 [ath_pci]
 [<c4cf7824>] ? ath_sysctl_register+0x8b34/0x8ed0 [ath_pci]
 [<c102f7e2>] ? run_timer_softirq+0xf2/0x180
 [<c1200520>] ? net_rx_action+0x50/0x110
 [<c102aff9>] ? +do_softirq+0x69/0x100
 [<c102af90>] ? +do_softirq+0x0/0x100
 <IRQ> 
 [<c102b265>] ? local_bh_enable+0x65/0x80
 [<c4bc1a94>] ? receive_client_update_packet+0x474/0x730 [batman_adv]
 [<c1035ec5>] ? process_one_work+0x155/0x250
 [<c4bc16f0>] ? receive_client_update_packet+0xd0/0x730 [batman_adv]
 [<c1036e74>] ? worker_thread+0x124/0x200
 [<c1036d50>] ? worker_thread+0x0/0x200
 [<c1039c6c>] ? kthread+0x6c/0x80
 [<c1039c00>] ? kthread+0x0/0x80
 [<c1002e36>] ? kernel_thread_helper+0x6/0x30
Code: 00 00 40 c1 ea 0c c1 e2 05 01 da 8b 02 25 00 80 00 00 66 85 c0 74 06 8b 52 0c 8d 76 00 8b 02 84 c0 78 22 f7 02 00 c0 00 00 75 04 <0f> 0b eb fe 8b 5c 24 04 89 d0 8b 74 24 08 8b 7c 24 0c 83 c4 10 
EIP: [<c107be6e>] kfree+0x4e/0xb0 SS:ESP 0068:c3809e3c
---[ end trace 98aa451a0a91a4e3 ]---
Kernel panic - not syncing: Fatal exception in interrupt
Actions

Also available in: Atom PDF