Gabor <div><br></div><div>Thanks for taking an interest in this</div><div><br></div><div>Attached is the kernel panic (with kernel symbols)</div><div>I will send others if the stack trace differs.</div><div>I assume that you really only want the stack trace</div>
<div><br></div><div><br></div><div><div>skb_over_panic: text:80c1a5f0 len:2382 put:2382 head:80d1d000 data:80d1d040 tail:0x80d 1d98e end:0x80d1d980 dev:<NULL></div><div>Kernel bug detected[#1]:</div><div>Cpu 0</div>
<div>$ 0 : 00000000 1000b800 0000007c 00000001</div><div>$ 4 : 80299480 00001e55 ffffffff 00001e55</div><div>$ 8 : 00004000 00000000 8029fcf0 00000001</div><div>$12 : 0000000f 8023b738 ffffffff 00480000</div><div>
$16 : 00d1d040 80d1d040 00000930 81c41d40</div><div>$20 : 81e1e300 00000024 a1faf240 80c21198</div><div>$24 : 00000002 8015f4d4</div><div>$28 : 80dac000 80daddb0 00000026 8019c3a0</div><div>Hi : 00000000</div>
<div>
Lo : 00000077</div><div>epc : 8019c3a0 skb_put+0x74/0x90</div><div> Not tainted</div><div>ra : 8019c3a0 skb_put+0x74/0x90</div><div>Status: 1000b803 KERNEL EXL IE</div><div>Cause : 00800024</div><div>PrId : 00029029 (Broadcom BCM3302)</div>
<div>Modules linked in: nf_nat_tftp nf_conntrack_tftp nf_nat_irc nf_conntrack_irc nf_nat_ftp nf_conntrack_ftp xt_HL xt _hl xt_MARK ipt_ECN xt_CLASSIFY xt_time xt_tcpmss xt_statistic xt_mark xt_length ipt_ecn xt_DSCP xt_dscp xt_IMQ i mq xt_string xt_layer7 ipt_MASQUERADE iptable_nat nf_nat xt_CONNMARK xt_recent xt_helper xt_conntrack xt_connmark xt_connbytes xt_NOTRACK iptable_raw xt_state nf_conntrack_ipv4 nf_defrag_ipv4 nf_conntrack pppoe pppox ipt_REJEC T xt_TCPMSS ipt_LOG xt_comment xt_multiport xt_mac xt_limit iptable_mangle iptable_filter ip_tables xt_tcpudp x_t ables ppp_async ppp_generic slhc b43 mac80211 ts_fsm ts_bm ts_kmp crc_ccitt cfg80211 compat_firmware_class compat arc4 aes_generic deflate ecb cbc switch_robo switch_core diag</div>
<div>Process irq/5-b43 (pid: 845, threadinfo=80dac000, task=81eb5168, tls=00000000)</div><div>Stack : 00000000 80c1a5f0 0000094e 0000094e 80d1d000 80d1d040 80d1d98e 80d1d980</div><div> 80275e08 81e1e300 00000024 80c1a5f0 80d533fc 00ff0000 00000054 00010000</div>
<div> 81e3ac00 81e3ac00 80d505b0 00ff0000 80c21198 00010000 00010000 81e3ac00</div><div> 00008000 00010000 81e1e2a4 00010000 802d3880 00000000 8029b324 80c072b8</div><div> 1000b803 81eb5168 81e1e280 81eb5168 81eb52f8 81e1e2a4 00010000 802d3880</div>
<div> ...</div><div>Call Trace:</div><div>[<8019c3a0>] skb_put+0x74/0x90</div><div>[<80c1a5f0>] b43_dma_rx+0x350/0x474 [b43]</div><div>[<80c072b8>] b43_controller_restart+0x7a8/0x97c [b43]</div><div>
<br></div><div><br></div><div>Code: afab001c 0c0028f6 afa20020 <0200000d> 080670e9 00000000 8fbf002c 01201021 03e00008</div><div>Disabling lock debugging due to kernel taint</div><div>exiting task "irq/5-b43" (845) is an active IRQ thread (irq 5)</div>
</div><div><br></div><div><br></div><div>Cheers</div><div><br clear="all">----------------------------------------------------------<br>Chris Martin<br>m: 0419812371<br>----------------------------------------------------------<br>
<br><br></div>