From mboxrd@z Thu Jan 1 00:00:00 1970 From: Wolfgang Grandegger Subject: Re: Socketcan kernel panic when using dhclient. Date: Tue, 04 Jun 2013 09:11:03 +0200 Message-ID: <51AD9307.1000404@grandegger.com> References: <41B73DFEBC62264A887C90F789C9F99C4452DC@bws-exmb01.bama.eu.com> Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Return-path: Received: from ngcobalt02.manitu.net ([217.11.48.102]:38319 "EHLO ngcobalt02.manitu.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1759872Ab3FDHLH (ORCPT ); Tue, 4 Jun 2013 03:11:07 -0400 In-Reply-To: <41B73DFEBC62264A887C90F789C9F99C4452DC@bws-exmb01.bama.eu.com> Sender: linux-can-owner@vger.kernel.org List-ID: To: "Tietz, Fabian" Cc: "linux-can@vger.kernel.org" On 06/03/2013 05:27 PM, Tietz, Fabian wrote: > Hello, > > We are using socketcan on AT91SAM 9x25 Hardware, Stock Kernel 2.6.39, no experimental Atmel patches applied. > > When using dhclient, we experience the following kernel oops. Any hints on this issue? > > Regards, > Fabian > -------snip-------- > > ioctl(6, SIOCGIFADDR, {ifr_name="lo", ifr_addr={AF_INET, inet_addr("127.0.0.1")}}) = 0 > ioctl(6, SIOCGIFFLAGS, {ifr_name="lo", ifr_flags=IFF_UP|IFF_LOOPBACK|IFF_RUNNING}) = 0 > ioctl(6, SIOCGIFADDR, {ifr_name="can0", ???}) = -1 EADDRNOTAVAIL (Cannot assiskb_under_panic: text:c02ac490 len:-960460656 put:-960460672 head:c6c08860 data: (null) tail:0xc6c08890 end:0xc6c088a0 dev:can0 > kernel BUG at net/core/skbuff.c:146! > Unable to handle kernel NULL pointer dereference at virtual address 00000000 > pgd = c0004000 > [00000000] *pgd=00000000 > Internal error: Oops: 817 [#1] > last sysfs file: /sys/devices/platform/leds-gpio/leds/can_red/brightness > Modules linked in: > CPU: 0 Tainted: G W (2.6.39-GHOST-Rev.:167 #34) > PC is at __bug+0x1c/0x28 > LR is at __bug+0x18/0x28 > pc : [] lr : [] psr: 60000013 > sp : c7991e18 ip : 00000003 fp : c7991f84 > r10: c7adabd0 r9 : 00000003 r8 : c03aa464 > r7 : 00000000 r6 : c6c08890 r5 : c6c088a0 r4 : c0367451 > r3 : 00000000 r2 : c7991e0c r1 : c03412f9 r0 : 0000002b > Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment kernel > Control: 0005317f Table: 27bf4000 DAC: 00000017 > Process kworker/0:1 (pid: 397, stack limit = 0xc7990270) > Stack: (0xc7991e18 to 0xc7992000) > 1e00: c6c08890 c01f3960 > 1e20: c6c08860 00000000 c6c08890 c6c088a0 c7963800 c01f28a0 c784d200 c7963800 > 1e40: c7adaa00 c02ac490 c7963800 c7963800 c03ae778 00000000 00000c00 c01fc510 > 1e60: c7963800 00000000 0000012c c784d2c0 c7991ea4 c03ae798 0000012c c7963800 > 1e80: 00000000 0000012c 00000006 44200000 c7963be8 c01b0cb4 20000013 ffffffff > 1ea0: fefff000 c6c08880 00000000 c7963be8 00000001 0000012c 00000006 0000000a > 1ec0: 00000003 ffffa4e0 c7991f84 c01fc918 c03b3b1c 00000001 0000000c c7990000 > 1ee0: 00000100 0000000a c03d4f04 c00442cc 00000000 00000008 0000001e 00000000 > 1f00: 0000001e 00000000 00000000 00000000 c79d64a8 c002a080 60000013 ffffffff > 1f20: fefff000 c002f7b4 c03bcd54 00000003 c03bcd60 00000000 60000013 c7812800 > 1f40: c0163a50 00000000 00000000 00000000 c79d64a8 c7991f84 60000093 c7991f70 > 1f60: c003a3e4 c003a3e8 60000013 ffffffff 00000000 c0163a50 c7923da0 c7923da0 > 1f80: 00000000 c00510fc 80000093 c7923da0 c03b4e3c c7923db0 00000001 c03b4e3c > 1fa0: 00000000 00000009 00000000 c0051cf8 00000000 c7827f38 c7923da0 c0051b30 > 1fc0: 00000013 00000000 00000000 c005500c 00000000 00000000 c7923da0 00000000 > 1fe0: c7991fe0 c7991fe0 c7827f38 c0054f90 c0030a18 c0030a18 c1200092 11100a25 > [] (__bug+0x1c/0x28) from [] (skb_push+0x78/0x8c) > [] (skb_push+0x78/0x8c) from [] (packet_rcv_spkt+0xd4/0x118) > [] (packet_rcv_spkt+0xd4/0x118) from [] (__netif_receive_skb+0x32c/0x3d0) > [] (__netif_receive_skb+0x32c/0x3d0) from [] (at91_poll+0x3e0/0x468) > [] (at91_poll+0x3e0/0x468) from [] (net_rx_action+0x4c/0x174) > [] (net_rx_action+0x4c/0x174) from [] (__do_softirq+0x84/0x120) > [] (__do_softirq+0x84/0x120) from [] (asm_do_IRQ+0x80/0xa0) > [] (asm_do_IRQ+0x80/0xa0) from [] (__irq_svc+0x34/0x60) > Exception stack(0xc7991f28 to 0xc7991f70) > 1f20: c03bcd54 00000003 c03bcd60 00000000 60000013 c7812800 > 1f40: c0163a50 00000000 00000000 00000000 c79d64a8 c7991f84 60000093 c7991f70 > 1f60: c003a3e4 c003a3e8 60000013 ffffffff > [] (__irq_svc+0x34/0x60) from [] (__wake_up+0x28/0x30) > [] (__wake_up+0x28/0x30) from [] (process_one_work+0x1e8/0x328) > [] (process_one_work+0x1e8/0x328) from [] (worker_thread+0x1c8/0x2f8) > [] (worker_thread+0x1c8/0x2f8) from [] (kthread+0x7c/0x84) > [] (kthread+0x7c/0x84) from [] (kernel_thread_exit+0x0/0x8) > Code: e59f0010 e1a0100c eb0a2a7d e3a03000 (e5833000) > ---[ end trace 1b75b31a2719ed1f ]--- > Kernel panic - not syncing: Fatal exception in interrupt > [] (unwind_backtrace+0x0/0xe0) from [] (panic+0x50/0x174) > [] (panic+0x50/0x174) from [] (die+0x184/0x1c4) > [] (die+0x184/0x1c4) from [] (__do_kernel_fault+0x64/0x84) > [] (__do_kernel_fault+0x64/0x84) from [] (do_page_fault+0x1b4/0x1c8) > [] (do_page_fault+0x1b4/0x1c8) from [] (do_DataAbort+0x34/0x98) > [] (do_DataAbort+0x34/0x98) from [] (__dabt_svc+0x4c/0x60) > Exception stack(0xc7991dd0 to 0xc7991e18) > 1dc0: 0000002b c03412f9 c7991e0c 00000000 > 1de0: c0367451 c6c088a0 c6c08890 00000000 c03aa464 00000003 c7adabd0 c7991f84 > 1e00: 00000003 c7991e18 c0032780 c0032784 60000013 ffffffff > [] (__dabt_svc+0x4c/0x60) from [] (__bug+0x1c/0x28) > [] (__bug+0x1c/0x28) from [] (skb_push+0x78/0x8c) > [] (skb_push+0x78/0x8c) from [] (packet_rcv_spkt+0xd4/0x118) > [] (packet_rcv_spkt+0xd4/0x118) from [] (__netif_receive_skb+0x32c/0x3d0) > [] (__netif_receive_skb+0x32c/0x3d0) from [] (at91_poll+0x3e0/0x468) > [] (at91_poll+0x3e0/0x468) from [] (net_rx_action+0x4c/0x174) > [] (net_rx_action+0x4c/0x174) from [] (__do_softirq+0x84/0x120) > [] (__do_softirq+0x84/0x120) from [] (asm_do_IRQ+0x80/0xa0) > [] (asm_do_IRQ+0x80/0xa0) from [] (__irq_svc+0x34/0x60) > Exception stack(0xc7991f28 to 0xc7991f70) > 1f20: c03bcd54 00000003 c03bcd60 00000000 60000013 c7812800 > 1f40: c0163a50 00000000 00000000 00000000 c79d64a8 c7991f84 60000093 c7991f70 > 1f60: c003a3e4 c003a3e8 60000013 ffffffff > [] (__irq_svc+0x34/0x60) from [] (__wake_up+0x28/0x30) > [] (__wake_up+0x28/0x30) from [] (process_one_work+0x1e8/0x328) > [] (process_one_work+0x1e8/0x328) from [] (worker_thread+0x1c8/0x2f8) > [] (worker_thread+0x1c8/0x2f8) from [] (kthread+0x7c/0x84) > [] (kthread+0x7c/0x84) from [] (kernel_thread_exit+0x0/0x8) > > ------------------------------------ The error happens when packet_rcv_spkt() calls skb_push(). Why do you think it's a problem/bug in the CAN layer? Wolfgang.