Modify

Opened 3 years ago

Closed 3 years ago

Last modified 3 years ago

#19128 closed defect (not_a_bug)

CPU: 0 PID: 12322 Comm: netifd : Unable to handle kernel paging request at virtual address 00000000, epc == 80268964, ra == 800a4330

Reported by: christian@… Owned by: developers
Priority: normal Milestone: Chaos Calmer 15.05
Component: kernel Version: Trunk
Keywords: Cc:

Description

[ 3377.350000] CPU 0 Unable to handle kernel paging request at virtual address 00000000, epc == 80268964, ra == 800a4330
[ 3377.350000] Oops[#1]:
[ 3377.350000] CPU: 0 PID: 12322 Comm: netifd Not tainted 3.18.8 #6
[ 3377.350000] task: 8607e6c0 ti: 862d4000 task.ti: 862d4000
[ 3377.350000] $ 0   : 00000000 00000001 00000001 00000000
[ 3377.350000] $ 4   : 86860c64 86860c64 00000000 004d3067
[ 3377.350000] $ 8   : 0000ffff 86860d04 00000000 0000ffff
[ 3377.350000] $12   : 00000000 00000000 00000000 00000000
[ 3377.350000] $16   : 86860c00 86860c64 000000a4 86860c50
[ 3377.350000] $20   : 00000000 00000000 00000001 00000001
[ 3377.350000] $24   : 00000000 801cb088                  
[ 3377.350000] $28   : 862d4000 862d5cb8 87807000 800a4330
[ 3377.350000] Hi    : 00000000
[ 3377.350000] Lo    : 00000000
[ 3377.350000] epc   : 80268964 skb_queue_tail+0x18/0x44
[ 3377.350000]     Not tainted
[ 3377.350000] ra    : 800a4330 __netlink_sendskb+0x48/0x70
[ 3377.350000] Status: 1100fc02 KERNEL EXL 
[ 3377.350000] Cause : 0080000c
[ 3377.350000] BadVA : 00000000
[ 3377.350000] PrId  : 00019750 (MIPS 74Kc)
[ 3377.350000] Modules linked in: iptable_nat ath9k nf_nat_pptp nf_nat_ipv4 nf_nat_amanda nf_conntrack_pptp nf_conntrack_ipv6 nf_conntrack_ipv4 nf_conntrack_amanda ipt_REJECT ipt_MASQUERADE ebtable_nat ebtable_filter ebtable_broute ath9k_common xt_time xt_tcpudp xt_tcpmss xt_string xt_statistic xt_state xt_recent xt_quota xt_policy xt_pkttype xt_physdev xt_owner xt_nat xt_multiport xt_mark xt_mac xt_limit xt_length xt_ipv4options xt_iface xt_id xt_hl xt_helper xt_esp xt_ecn xt_dscp xt_conntrack xt_connmark xt_connlimit xt_connbytes xt_condition xt_comment xt_addrtype xt_TRACE xt_TCPMSS xt_REDIRECT xt_NETMAP xt_LOG xt_IPMARK xt_HL xt_DSCP xt_CT xt_CLASSIFY ts_kmp ts_fsm ts_bm nf_reject_ipv4 nf_nat_tftp nf_nat_snmp_basic nf_nat_sip nf_nat_proto_gre nf_nat_masquerade_ipv4 nf_nat_irc nf_nat_h323 nf_nat_ftp nf_nat nf_log_ipv4 nf_defrag_ipv6 nf_defrag_ipv4 nf_conntrack_tftp nf_conntrack_snmp nf_conntrack_sip nf_conntrack_rtcache nf_conntrack_proto_gre nf_conntrack_netlink nf_conntrack_irc nf_conntrack_h323 nf_conntrack_ftp nf_conntrack_broadcast nf_conntrack macvlan iptable_raw iptable_mangle iptable_filter ipt_ah ipt_ECN ip_tables ebtables ebt_vlan ebt_stp ebt_snat ebt_redirect ebt_pkttype ebt_mark_m ebt_mark ebt_limit ebt_ip ebt_dnat ebt_arpreply ebt_arp ebt_among ebt_802_3 crc_ccitt compat_xtables ath9k_hw arptable_filter arpt_mangle arp_tables em_cmp sch_teql em_nbyte sch_codel sch_dsmark em_meta sch_gred sch_htb cls_basic act_ipt sch_red act_police em_text sch_tbf sch_sfq sch_prio act_skbedit act_mirred em_u32 cls_u32 cls_tcindex cls_flow cls_route cls_fw sch_hfsc sch_ingress ath10k_pci ath10k_core ath mac80211 cfg80211 compat ledtrig_usbdev batman_adv libcrc32c crc16 xt_set ip_set_list_set ip_set_hash_netport ip_set_hash_netiface ip_set_hash_net ip_set_hash_ipportnet ip_set_hash_ipportip ip_set_hash_ipport ip_set_hash_ip ip_set_bitmap_port ip_set_bitmap_ipmac ip_set_bitmap_ip ip_set nfnetlink ip6t_REJECT nf_reject_ipv6 nf_log_ipv6 nf_log_common ip6table_raw ip6table_mangle ip6table_filter ip6_tables x_tables ipcomp6 xfrm6_tunnel xfrm6_mode_tunnel xfrm6_mode_transport xfrm6_mode_beet esp6 ah6 ipcomp xfrm4_tunnel xfrm4_mode_tunnel xfrm4_mode_transport xfrm4_mode_beet esp4 ah4 ipip tunnel6 tunnel4 ip_tunnel af_key xfrm_user xfrm_ipcomp xfrm_algo ipv6 chainiv eseqiv crypto_wq sha1_generic krng rng md5 hmac des_generic deflate zlib_inflate zlib_deflate cbc authenc aead arc4 crypto_blkcipher uhci_hcd ehci_pci ehci_platform ehci_hcd gpio_button_hotplug usbcore nls_base usb_common crc32c_generic crypto_hash
[ 3377.350000] Process netifd (pid: 12322, threadinfo=862d4000, task=8607e6c0, tls=77f0b750)
[ 3377.350000] Stack : 86301400 801e5ef4 86be0e00 800a4374 86860c00 86860c64 86bb5780 801e5400
          00000222 86be0e00 86bb5780 801ea970 00000001 00000000 00000001 00000000
          00000000 86bb5780 00000000 87807000 00000000 00000000 00000000 00000000
          7fe6faa8 801e5190 86bb5780 86bf7a58 00000000 800ecc50 00000020 00000000
          00000000 000000e3 00000010 801eac7c 00000002 000005dc 00000033 06000000
          ...
[ 3377.350000] Call Trace:
[ 3377.350000] [<80268964>] skb_queue_tail+0x18/0x44
[ 3377.350000] [<800a4330>] __netlink_sendskb+0x48/0x70
[ 3377.350000] [<801e5400>] netlink_broadcast_filtered+0x264/0x384
[ 3377.350000] [<801e5190>] netlink_broadcast+0x20/0x2c
[ 3377.350000] [<801eac7c>] nlmsg_notify+0x70/0xd0
[ 3377.350000] [<800edbe0>] br_ifinfo_notify+0xbc/0x10c
[ 3377.350000] [<800f5530>] br_stp_disable_port+0x70/0x10c
[ 3377.350000] [<8011a504>] del_nbp+0x7c/0x134
[ 3377.350000] [<800eaf1c>] br_del_if+0x40/0xa0
[ 3377.350000] [<8011f71c>] dev_ifsioc+0x30c/0x330
[ 3377.350000] [<8011fe30>] dev_ioctl+0x5d8/0x6c8
[ 3377.350000] [<8013be5c>] do_vfs_ioctl+0x4d0/0x5dc
[ 3377.350000] [<80074694>] SyS_ioctl+0x50/0x94
[ 3377.350000] [<80062b5c>] handle_sys+0x11c/0x140
[ 3377.350000] 
[ 3377.350000] 
Code: 8c830004  aca40000  aca30004 <ac650000> 8c830008  ac850004  24630001  ac830008  10400002 
[ 3377.810000] ---[ end trace a0d1ceaeb21e2e5e ]---
[ 3377.810000] Kernel panic - not syncing: Fatal exception in interrupt
[ 3377.810000] Rebooting in 3 seconds..

Attachments (0)

Change History (3)

comment:1 Changed 3 years ago by jow

  • Resolution set to not_a_bug
  • Status changed from new to closed

You ran out of free ram. See if you have memory consuming processes like torrent clients that crash your system.

comment:2 Changed 3 years ago by anonymous

@jow how do I detect that? how do you see that with this trace (I just want to learn).
so userspace ram consumption causes kernel panic?

comment:3 Changed 3 years ago by bittorf@…

http://web.mit.edu/humor/Computers/real.programmers

"Real Programmers can read core dumps."

beside that, you can see on top:
"Unable to handle kernel paging request at virtual address 00000000"

this is IMHO 'null pointer dereference', because of "virtual address 00000000" - jow?

christian: ask $searchengine for "linux analyze core dump"

Add Comment

Modify Ticket

Action
as closed .
The resolution will be deleted. Next status will be 'reopened'.
Author


E-mail address and user name can be saved in the Preferences.

 
Note: See TracTickets for help on using tickets.