Hi,

With the latest trunk, building madwifi and ebtables packages together throws a kernel panic while brining up ath0 interface
on the Pronghorn IXP4xx board.

Can anybody precise me the source of the kernel panic.?

root@OpenWrt:/# ifconfig
br-lan    Link encap:Ethernet  HWaddr 00:08:A2:03:86:F0
          inet addr:192.168.1.1  Bcast:192.168.1.255  Mask:255.255.255.0
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:5 errors:0 dropped:0 overruns:0 frame:0
          TX packets:2 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0
          RX bytes:794 (794.0 B)  TX bytes:812 (812.0 B)

eth0      Link encap:Ethernet  HWaddr 00:08:A2:03:86:F0
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:5 errors:0 dropped:0 overruns:0 frame:0
          TX packets:2 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:100
          RX bytes:794 (794.0 B)  TX bytes:812 (812.0 B)

lo        Link encap:Local Loopback
          inet addr:127.0.0.1  Mask:255.0.0.0
          UP LOOPBACK RUNNING  MTU:16436  Metric:1
          RX packets:66 errors:0 dropped:0 overruns:0 frame:0
          TX packets:66 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0
          RX bytes:4488 (4.3 KiB)  TX bytes:4488 (4.3 KiB)

root@OpenWrt:/# wlanconfig ath0 create wlandev wifi0 wlanmode ap
ath0
root@OpenWrt:/# ifconfig ath0 up
skb_under_panic: text:bf085148 len:28 put:24 head:c3e8da1e data:c3e8d9f8 tail:0xc3e8da14 end:0xc3e8da80 dev:<NULL>
Unable to handle kernel NULL pointer dereference at virtual address 00000000
pgd = c0004000
[00000000] *pgd=00000000
Internal error: Oops: 817 [#1]
Modules linked in: ixp4xx_crypto ath_pci wlan_xauth wlan_wep wlan_tkip wlan_ccmp wlan_acl ath_rate_minstrel ath_hal(P) w
lan_scan_sta wlan_scan_ap wlan nf_nat_tftp nf_conntrack_tftp nf_nat_irc nf_conntrack_irc nf_nat_ftp nf_conntrack_ftp ipt
_TTL xt_MARK ipt_ECN xt_CLASSIFY ipt_ttl xt_time ipt_time xt_tcpmss xt_statistic xt_mark xt_mac xt_length ipt_ecn xt_DSC
P xt_dscp ipt_LOG xt_CHAOS xt_DELUDE xt_TARPIT xt_quota xt_portscan xt_pkttype xt_physdev iptable_raw arptable_filter ar
pt_mangle arp_tables ppp_async ppp_generic slhc crc_ccitt michael_mic des_generic authenc arc4 aes_generic aead deflate
ecb cbc crypto_blkcipher crypto_hash cryptomgr crypto_algapi
CPU: 0    Tainted: P           (2.6.26.2 #16)
pc : [<c01373e8>]    lr : [<c002d4f8>]    psr: 60000013
sp : c3e91cf0  ip : c01fa30c  fp : c3e91d20
r10: c3d3415c  r9 : c3d35000  r8 : c3d3415c
r7 : c3e8da80  r6 : c3e8da14  r5 : c3e8d9f8  r4 : c3e8da1e
r3 : 00000000  r2 : 60000013  r1 : 00000001  r0 : 00000076
Flags: nZCv  IRQs on  FIQs on  Mode SVC_32  ISA ARM  Segment user
Control: 000039ff  Table: 03f08000  DAC: 00000015
Process ifconfig (pid: 2329, stack limit = 0xc3e90260)
Stack: (0xc3e91cf0 to 0xc3e92000)
1ce0:                                     c3e8da1e c3e8d9f8 c3e8da14 c3e8da80
1d00: c01d0408 c3e8da1e c3e9e6c0 00000040 c3d34360 c3e91d38 c3e91d24 c01382b0
1d20: c01373a0 c3f603f0 c3d34360 c3e91d64 c3e91d3c bf085148 c0138280 c3f603f0
1d40: c3d34360 c3d35000 c3e9e6c0 c3f60360 00000000 00000000 c3e91dac c3e91d68
1d60: bf08580c bf084fb0 c3d345a4 c3d3415c c3d3415c c3d3415c c3d3415c c3d345a4
1d80: c3e8da22 c3e3e000 00000000 c3d34360 c3f60494 c3d3415c 0000001e 400a0fff
1da0: c3e91dec c3e91db0 bf08aac8 bf0856e0 bf0978c8 00000000 00000000 00000000
1dc0: c3d345a4 00000100 bf08a988 c020cfc0 00000000 c3e90000 c0207d24 400a0fff
1de0: c3e91e18 c3e91df0 c003b13c bf08a994 c3e91df0 c3e91df0 00000081 c020cdcc
1e00: 0000000a 400a1000 c3f09000 c3e91e34 c3e91e1c c0036ff4 c003b000 00000005
1e20: c01fbc8c 00000000 c3e91e44 c3e91e38 c0037380 c0036fa4 c3e91e60 c3e91e48
1e40: c0021048 c0037348 ffffffff 0000001f 00000020 c3e91eb8 c3e91e64 c0021664
1e60: c002100c c029b160 00000000 60000013 60000093 400a1000 c3f09000 400a1000
1e80: 400a1000 c3f09000 c0207d24 400a0fff c3e91eb8 c3e91ebc c3e91eac 00000000
1ea0: c005cda0 60000013 ffffffff c3e91ee8 c3e91ebc c0067d64 c005cd94 c3e91f28
1ec0: c3db9f6c c3db9f6c c3db9f6c 40000000 00000000 c3e91f28 00001000 c3e91f18
1ee0: c3e91eec c0068138 c0067bfc bea1a000 c3e91f28 c3db9738 00000000 c3d9f000
1f00: c0021be4 c3e90000 00000001 c3e91f48 c3e91f1c c006949c c00680b8 c3e91f24
1f20: 00000000 00000036 c0207d24 c3d9f000 00000000 c3c1bcc0 00000001 c3e91f60
1f40: c3e91f4c c0030268 c0069400 c3d9f000 c3d9f038 c3e91f7c c3e91f64 c0033d58
1f60: c0030234 c3e90000 c3c1bcc0 00000000 c3e91f94 c3e91f80 c00352dc c0033ca0
1f80: c00271d0 c0026f04 c3e91fa4 c3e91f98 c0035818 c0035108 00000000 c3e91fa8
1fa0: c0021a40 c003580c 4009b5b4 00000000 00000000 4008fe34 00000000 4009b360
1fc0: 4009b5b4 00000000 000000ed 00074ab4 0000002c 00000003 4009b000 0000c95c
1fe0: 00000000 bea2ee00 4008a20c 40050ba0 60000010 00000000 00000000 00000000
Backtrace:
Function entered at [<c0137394>] from [<c01382b0>]
r7:c3d34360 r6:00000040 r5:c3e9e6c0 r4:c3e8da1e
Function entered at [<c0138274>] from [<bf085148>]
r5:c3d34360 r4:c3f603f0
Function entered at [<bf084fa4>] from [<bf08580c>]
Function entered at [<bf0856d4>] from [<bf08aac8>]
Function entered at [<bf08a988>] from [<c003b13c>]
Function entered at [<c003aff4>] from [<c0036ff4>]
r8:c3f09000 r7:400a1000 r6:0000000a r5:c020cdcc r4:00000081
Function entered at [<c0036f98>] from [<c0037380>]
r6:00000000 r5:c01fbc8c r4:00000005
Function entered at [<c003733c>] from [<c0021048>]
Function entered at [<c0021000>] from [<c0021664>]
Exception stack(0xc3e91e64 to 0xc3e91eac)
1e60:          c029b160 00000000 60000013 60000093 400a1000 c3f09000 400a1000
1e80: 400a1000 c3f09000 c0207d24 400a0fff c3e91eb8 c3e91ebc c3e91eac 00000000
1ea0: c005cda0 60000013 ffffffff
r6:00000020 r5:0000001f r4:ffffffff
Function entered at [<c005cd88>] from [<c0067d64>]
Function entered at [<c0067bf0>] from [<c0068138>]
Function entered at [<c00680ac>] from [<c006949c>]
Function entered at [<c00693f4>] from [<c0030268>]
r7:00000001 r6:c3c1bcc0 r5:00000000 r4:c3d9f000
Function entered at [<c0030228>] from [<c0033d58>]
r5:c3d9f038 r4:c3d9f000
Function entered at [<c0033c94>] from [<c00352dc>]
r6:00000000 r5:c3c1bcc0 r4:c3e90000
Function entered at [<c00350fc>] from [<c0035818>]
Function entered at [<c0035800>] from [<c0021a40>]
Code: e88d00f0 e58dc010 ebfbeedf e3a03000 (e5833000)
Kernel panic - not syncing: Fatal exception in interrupt
Rebooting in 3 seconds..+No devices on IDE controller 0


Whereas the interface ath0 works fine when deselecting the ebtables packages.

any ideas pls ?

Sara