linux-wireless.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Tomasz Chmielewski <mangoo@wpkg.org>
To: Bob Copeland <me@bobcopeland.com>
Cc: linux-wireless@vger.kernel.org, linux-mips@vger.kernel.org
Subject: Re: ath5k AP kernel panic when client uses SCP
Date: Mon, 12 Oct 2009 10:13:05 +0200	[thread overview]
Message-ID: <4AD2E511.1050808@wpkg.org> (raw)
In-Reply-To: <b6c5339f0910111547w33a88f7dtd9d16cd3380877cd@mail.gmail.com>

Bob Copeland wrote:
> On Sun, Oct 11, 2009 at 1:49 PM, Tomasz Chmielewski <mangoo@wpkg.org> wrote:
>> The AP is Asus WL-500gP, it's a MIPS platform, running 2.6.31.1 kernel,
>> hostapd v0.6.9.
>>
>> I can reproduce the issue reliably.
>>
>> Let me know if you need more info here.
> 
> Yes, please -- it would really be helpful if instead of just the addresses
> we have all the function names in the stack trace.  Or at least what is
> at 8006f058 and 80276190.  We've had a couple of reports of unaligned
> accesses but I haven't yet seen a useful stack trace.

OK, will try to send it later today.


>> [67359.700000] ------------[ cut here ]------------
>> [67359.710000] WARNING: at net/core/dev.c:1566 0x80280890()
>> [67359.710000] b44: caps=(0x0, 0x0) len=80 data_len=0 ip_summed=1
>> [67359.720000] Modules linked in: tun sch_sfq cls_fw sch_htb ipt_MASQUERADE
>> iptable_nat nf_nat xt_MARK iptable_mangle ipt_ULOG xt_recent
>> nf_conntrack_ipv4 nf_defrag1
> 
> Did you replace the wireless device?  I don't see ath5k in the
> above list; IIRC that AP is originally some broadcom chipset.

The AP device comes with a broadcom wireless card, which doesn't work well.
So I replaced broadcom with an ath5k card.
ath5k and other modules were probably "eaten" by the terminal/minicom/konsole/whatever.
This is the list of modules which should be loaded when the panic occurs:

# lsmod
Module                  Size  Used by
tun                    12160  2
sch_sfq                 4496  1
cls_fw                  3216  1
sch_htb                12480  1
ipt_MASQUERADE           976  1
iptable_nat             2800  1
nf_nat                 12496  2 ipt_MASQUERADE,iptable_nat
xt_MARK                  912  1
iptable_mangle          1008  1
ipt_ULOG                4144  1
xt_recent               5408  9
nf_conntrack_ipv4       4560  7 iptable_nat,nf_nat
nf_defrag_ipv4           624  1 nf_conntrack_ipv4
xt_state                 784  4
nf_conntrack           46640  5 ipt_MASQUERADE,iptable_nat,nf_nat,nf_conntrack_ipv4,xt_state
xt_tcpudp               1888  5
iptable_filter           768  1
ip_tables               8848  3 iptable_nat,iptable_mangle,iptable_filter
x_tables                9648  8 ipt_MASQUERADE,iptable_nat,xt_MARK,ipt_ULOG,xt_recent,xt_state,xt_tcpudp,ip_tables
ath5k                 131616  0
mac80211              130208  1 ath5k
ath                     6256  1 ath5k
ohci_hcd               17344  0
uhci_hcd               18048  0
cfg80211               72000  3 ath5k,mac80211,ath

 
>> [67360.080000] Disabling lock debugging due to kernel taint
>> [67360.560000] Kernel panic - not syncing: Fatal exception in interrupt
> 
> Why's it tainted?  I can't remember and can't check right now if
> TAINT_WARN counts.

Yes, WARN taints the kernel.


-- 
Tomasz Chmielewski
http://wpkg.org

  reply	other threads:[~2009-10-12  8:13 UTC|newest]

Thread overview: 14+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2009-10-11 17:49 ath5k AP kernel panic when client uses SCP Tomasz Chmielewski
2009-10-11 17:55 ` Tomasz Chmielewski
2009-10-11 22:47 ` Bob Copeland
2009-10-12  8:13   ` Tomasz Chmielewski [this message]
2009-10-12  8:13   ` Tomasz Chmielewski
2009-10-23 13:15 ` Tomasz Chmielewski
2009-10-23 13:21   ` Gábor Stefanik
2009-10-23 13:24     ` Tomasz Chmielewski
2009-10-24 11:59       ` Tomasz Chmielewski
2009-10-24 12:52         ` Bob Copeland
2009-10-24 15:27           ` Tomasz Chmielewski
2009-10-24 16:09             ` Bob Copeland
2009-10-24 18:10               ` Tomasz Chmielewski
2009-10-25 20:19                 ` Bob Copeland

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=4AD2E511.1050808@wpkg.org \
    --to=mangoo@wpkg.org \
    --cc=linux-mips@vger.kernel.org \
    --cc=linux-wireless@vger.kernel.org \
    --cc=me@bobcopeland.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).