I use my Raspberry Pi 3B as a router. I have seen this crash:

  • [34502.095007] Internal error: Oops: 96000004 [#1] SMP
  • [34502.099917] Modules linked in: afpacket ip6tMASQUERADE nfnatmasqueradeipv6 nfconntracknetbiosns nfconntrackbroadcast xtCT xttcpudp iptMASQUERADE nfnatmasqueradeipv4 ip6trpfilter ip6tREJECT iptREJECT xtconntrack ipset nfnetlink ebtablenat ebtablebroute bridge stp llc ip6tablenat nfconntrackipv6 nfdefragipv6 nfnatipv6 ip6tablemangle ip6tableraw ip6tablesecurity iptablenat nfconntrackipv4 nfdefragipv4 nfnatipv4 nfnat nfconntrack libcrc32c iptablemangle iptableraw iptablesecurity ebtablefilter ebtables ip6tablefilter ip6tables iptablefilter iptables xtables cdcether vc4 sndsoccore sndpcmdmaengine sndpcm sndtimer snd nlsiso88591 nlscp437 soundcore vfat fat drmkmshelper smsc95xx usbnet drm r8152 mii crc32ce drmpanelorientationquirks syscopyarea sysfillrect sysimgblt raspberrypihwmon joydev fbsysfops bcm2835wdt bcm2835thermal bcm2835rng ledsgpio btrfs xor zlibdeflate hidgeneric usbhid raid6pq mmcblock dwc2 usbcore bcm2835 mmccore i2cbcm2835 bcm2835dma phygeneric fixed sg efivarfs
  • [34502.195081] Supported: Yes
  • [34502.197800] CPU: 0 PID: 1658 Comm: dmesg Not tainted 4.12.14-150.22-default #1 SLE15
  • [34502.205559] Hardware name: raspberrypi rpi/rpi, BIOS 2018.03 04/12/2018
  • [34502.212180] task: ffff80002bbb8000 task.stack: ffff800036388000
  • [34502.218116] PC is at pskbexpandhead+0x108/0x270
  • [34502.222829] LR is at pskbexpandhead+0xc4/0x270
  • [34502.227453] pc : [<ffff0000087be358>] lr : [<ffff0000087be314>] pstate: 20000005
  • [34502.234864] sp : ffff80003df4b600
  • [34502.238183] x29: ffff80003df4b600 x28: 0000000000000000
  • [34502.243506] x27: ffff80003590a0a0 x26: ffff000008e6ef90
  • [34502.248828] x25: 0000000000000e80 x24: ffff80003495c000
  • [34502.254150] x23: ffff80003495c000 x22: 0000000001080020
  • [34502.259472] x21: 0000000000000880 x20: 0000000000000000
  • [34502.264794] x19: ffff80002c37e200 x18: 0000ffffd3cbd373
  • [34502.270116] x17: 0000000000000000 x16: 0000000000000000
  • [34502.275438] x15: 0000000000000000 x14: e099f75de22819dc
  • [34502.280760] x13: 176e60b3a5d08afa x12: 60dadc4edb20a3ba
  • [34502.286082] x11: eccdeb74cdb0496e x10: edc242ea5b7b9cce
  • [34502.291404] x9 : 28ebc6fa40c98105 x8 : 3f680af7d85a9f83
  • [34502.296726] x7 : c6dd8860b3f21471 x6 : ffff80003495d2d0
  • [34502.302047] x5 : 0000000000001000 x4 : 0000000000000042
  • [34502.307369] x3 : 0000000000000000 x2 : 0000000000000000
  • [34502.312690] x1 : ffff8000207a9c00 x0 : 0000000000000001
  • [34502.318014] Process dmesg (pid: 1658, stack limit = 0xffff800036388000)
  • [34502.324633] Call trace:
  • [34502.327087] Exception stack(0xffff80003df4b4c0 to 0xffff80003df4b600)
  • [34502.333537] b4c0: 0000000000000001 ffff8000207a9c00 0000000000000000 0000000000000000
  • [34502.341386] b4e0: 0000000000000042 0000000000001000 ffff80003495d2d0 c6dd8860b3f21471
  • [34502.349236] b500: 3f680af7d85a9f83 28ebc6fa40c98105 edc242ea5b7b9cce eccdeb74cdb0496e
  • [34502.357085] b520: 60dadc4edb20a3ba 176e60b3a5d08afa e099f75de22819dc 0000000000000000
  • [34502.364934] b540: 0000000000000000 0000000000000000 0000ffffd3cbd373 ffff80002c37e200
  • [34502.372783] b560: 0000000000000000 0000000000000880 0000000001080020 ffff80003495c000
  • [34502.380632] b580: ffff80003495c000 0000000000000e80 ffff000008e6ef90 ffff80003590a0a0
  • [34502.388481] b5a0: 0000000000000000 ffff80003df4b600 ffff0000087be314 ffff80003df4b600
  • [34502.396330] b5c0: ffff0000087be358 0000000020000005 0000000000000880 0000000001080020
  • [34502.404180] b5e0: 0000ffffffffffff ffff0000087be2d8 ffff80003df4b600 ffff0000087be358
  • [34502.412031] [<ffff0000087be358>] pskbexpandhead+0x108/0x270
  • [34502.417787] [<ffff0000087be6e0>] _pskbpull_tail+0x50/0x410
  • [34502.423458] [<ffff000008819b64>] skbmakewritable+0x84/0xd8
  • [34502.429136] [<ffff0000010e20ac>] nfnatipv4manippkt+0x3c/0x158 [nfnatipv4]
  • [34502.436484] [<ffff0000010d32e4>] nfnatpacket+0xcc/0x110 [nf_nat]
  • [34502.442679] [<ffff0000010e25d8>] nfnatipv4fn+0xf8/0x278 [nfnat_ipv4]
  • [34502.449394] [<ffff0000010e296c>] nfnatipv4in+0x4c/0xa8 [nfnat_ipv4]
  • [34502.456022] [<ffff0000010fe1b0>] iptablenatipv4in+0x38/0x50 [iptablenat]
  • [34502.463082] [<ffff000008819a3c>] nfhookslow+0x3c/0xe0
  • [34502.468318] [<ffff000008822be4>] ip_rcv+0x2d4/0x3a0
  • [34502.473208] [<ffff0000087cfaa8>] _netifreceiveskbcore+0x3f8/0xa90
  • [34502.479659] [<ffff0000087d2948>] _netifreceive_skb+0x28/0x80
  • [34502.485502] [<ffff0000087d2a3c>] process_backlog+0x9c/0x158
  • [34502.491085] [<ffff0000087d6938>] netrxaction+0x150/0x3c8
  • [34502.496582] [<ffff000008081a28>] _dosoftirq+0x130/0x334
  • [34502.501992] [<ffff0000080dc66c>] irq_exit+0x11c/0x160
  • [34502.507056] [<ffff00000813ec44>] _handledomain_irq+0x6c/0xc0
  • [34502.512898] [<ffff0000080815e0>] bcm2836armirqchiphandleirq+0x78/0xd8

The objectives are:

  • learn A64 assembly
  • interpret the Oops
  • fix the kernel

Looking for hackers with the skills:

Nothing? Add some keywords!

This project is part of:

Hack Week 18

Activity

  • almost 5 years ago: a_faerber liked this project.
  • almost 5 years ago: jiriwiesner started this project.
  • almost 5 years ago: jiriwiesner originated this project.

  • Comments

    Be the first to comment!

    Similar Projects

    This project is one of its kind!