FreeBSD Bugzilla – Attachment 185799 Details for
Bug 221845
bridge0 causes kernel panic on BBB using usb wifi in hostap mode (RT3071)
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Help
|
New Account
|
Log In
Remember
[x]
|
Forgot Password
Login:
[x]
Kernel panic caused by client request for web page.
bbb-panic-wifi-ap-bridge.txt (text/plain), 4.63 KB, created by
Russell Haley
on 2017-08-27 06:46:27 UTC
(
hide
)
Description:
Kernel panic caused by client request for web page.
Filename:
MIME Type:
Creator:
Russell Haley
Created:
2017-08-27 06:46:27 UTC
Size:
4.63 KB
patch
obsolete
>root@bbb:~ # uname -a >FreeBSD bbb.highfell.local 12.0-CURRENT FreeBSD 12.0-CURRENT #7 r321601M: Thu Aug 17 22:13:21 PDT 2017 russellh@prescott.highfell.local:/usr/home/russellh/FreeBSD/rh-armv6/obj/arm.armv6/usr/home/russellh/FreeBSD/rh-armv6/src/sys/BEAGLEBONE-MMCCAM arm > > >root@bbb:~ # panic: m_dup: bogus m_pkthdr.len >time = 1503192270 >KDB: stack backtrace: >db_trace_self() at db_trace_self > pc = 0xc067b73c lr = 0xc025db7c (db_trace_self_wrapper+0x30) > sp = 0xdce1dac0 fp = 0xdce1dbd8 >db_trace_self_wrapper() at db_trace_self_wrapper+0x30 > pc = 0xc025db7c lr = 0xc03c1fc4 (vpanic+0xe0) > sp = 0xdce1dbe0 fp = 0xdce1dc00 > r4 = 0x00000100 r5 = 0xdce1dc24 > r6 = 0xc071a3d2 r7 = 0x00000001 >vpanic() at vpanic+0xe0 > pc = 0xc03c1fc4 lr = 0xc03c1ee4 (vpanic) > sp = 0xdce1dc08 fp = 0xdce1dc1c > r4 = 0xc071a3d2 r5 = 0xdce1dc24 > r6 = 0xc2d39c00 r7 = 0x000000b8 > r8 = 0x000000b8 r9 = 0xdce1dc48 > r10 = 0xc2f2e100 >vpanic() at vpanic > pc = 0xc03c1ee4 lr = 0xc0443454 (m_dup+0x33c) > sp = 0xdce1dc24 fp = 0xdce1dc70 > r4 = 0xdce1dc1c r5 = 0xc03c1ee4 > r6 = 0xdce1dc24 r7 = 0xffffffa4 > r8 = 0x000000b8 r9 = 0xc2d39c00 > r10 = 0xc2f2e100 >m_dup() at m_dup+0x33c > pc = 0xc0443454 lr = 0xc30c3bc8 (bridge_broadcast+0x1c4) > sp = 0xdce1dc78 fp = 0xdce1dca0 > r4 = 0xc2729000 r5 = 0xc2729200 > r6 = 0xc2ca0c00 r7 = 0xc2ca1c00 > r8 = 0xc2728e00 r9 = 0x00000001 > r10 = 0xc272921c >bridge_broadcast() at bridge_broadcast+0x1c4 > pc = 0xc30c3bc8 lr = 0xc30c6960 (bridge_forward+0x238) > sp = 0xdce1dca8 fp = 0xdce1dcd8 > r4 = 0x00000001 r5 = 0xc09ad6b4 > r6 = 0xc2729000 r7 = 0xc09abc44 > r8 = 0xc2ca1000 r9 = 0x00000000 > r10 = 0xc2729200 >bridge_forward() at bridge_forward+0x238 > pc = 0xc30c6960 lr = 0xc30c5a5c (bridge_input+0x3c8) > sp = 0xdce1dce0 fp = 0xdce1dd18 > r4 = 0xc2d9b806 r5 = 0x00000000 > r6 = 0xc2729000 r7 = 0xc2d9b800 > r8 = 0xc272921c r9 = 0xc09ab804 > r10 = 0xc2d39c00 >bridge_input() at bridge_input+0x3c8 > pc = 0xc30c5a5c lr = 0xc04b5534 (ether_nh_input+0x2f0) > sp = 0xdce1dd20 fp = 0xdce1dd40 > r4 = 0xc2ca1c00 r5 = 0xc2d39c00 > r6 = 0xc09ab890 r7 = 0xc2d39c10 > r8 = 0x00008590 r9 = 0xc0722cc0 > r10 = 0x00000005 >ether_nh_input() at ether_nh_input+0x2f0 > pc = 0xc04b5534 lr = 0xc04bb094 (netisr_dispatch_src+0xb4) > sp = 0xdce1dd48 fp = 0xdce1dd70 > r4 = 0xc09a02f4 r5 = 0xc2d39c00 > r6 = 0x00000637 r7 = 0x00000000 > r8 = 0xc0722c98 r10 = 0x00000005 >netisr_dispatch_src() at netisr_dispatch_src+0xb4 > pc = 0xc04bb094 lr = 0xc04b4abc (ether_input+0x6c) > sp = 0xdce1dd78 fp = 0xdce1dd98 > r4 = 0xc2ca1c00 r5 = 0xc2d39c00 > r6 = 0x00000000 r7 = 0x00000000 > r8 = 0xc0722c98 r9 = 0xc0722cc0 > r10 = 0xc2cd2c00 >ether_input() at ether_input+0x6c > pc = 0xc04b4abc lr = 0xc06aa7a0 (cpsw_intr_rx+0xec) > sp = 0xdce1dda0 fp = 0xdce1ddb0 > r4 = 0xc2ca1c00 r5 = 0x00000000 > r6 = 0xc2d39c00 r7 = 0x00000000 > r8 = 0xc09ab214 r9 = 0xc0706833 >cpsw_intr_rx() at cpsw_intr_rx+0xec > pc = 0xc06aa7a0 lr = 0xc038d850 (intr_event_execute_handlers+0xc4) > sp = 0xdce1ddb8 fp = 0xdce1ddd8 > r4 = 0xc2a5f5c0 r5 = 0xc2cd2c48 > r6 = 0xc2a5f5ec r7 = 0x00000000 >intr_event_execute_handlers() at intr_event_execute_handlers+0xc4 > pc = 0xc038d850 lr = 0xc038dfa8 (ithread_loop+0x134) > sp = 0xdce1dde0 fp = 0xdce1de20 > r4 = 0xc2cd2c70 r5 = 0x00000000 > r6 = 0xc2cd2c00 r7 = 0xc2c1c740 > r8 = 0xc2cd2c6c r9 = 0xc07fc3a8 > r10 = 0xc2c03eac >ithread_loop() at ithread_loop+0x134 > pc = 0xc038dfa8 lr = 0xc038a9f0 (fork_exit+0x84) > sp = 0xdce1de28 fp = 0xdce1de40 > r4 = 0xc2c1c740 r5 = 0xc2bc6730 > r6 = 0xc038de74 r7 = 0xc2c03ea0 > r8 = 0xdce1de48 r9 = 0x00000000 > r10 = 0x00000000 >fork_exit() at fork_exit+0x84 > pc = 0xc038a9f0 lr = 0xc067e04c (swi_exit) > sp = 0xdce1de48 fp = 0x00000000 > r4 = 0xc038de74 r5 = 0xc2c03ea0 > r6 = 0x00000000 r7 = 0x00000000 > r8 = 0x00000000 r10 = 0x00000000 >swi_exit() at swi_exit > pc = 0xc067e04c lr = 0xc067e04c (swi_exit) > sp = 0xdce1de48 fp = 0x00000000 >KDB: enter: panic >[ thread pid 11 tid 100039 ] >Stopped at $d.3: ldrb r15, [r15, r15, ror r15]! >db>
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 221845
: 185799