aparcar / openwrt

Staging tree of Paul Spooren
Other
8 stars 1 forks source link

FS#1326 - Kernel crash #1140

Open aparcar opened 6 years ago

aparcar commented 6 years ago

systemcrash:

Supply the following if possible:

OpenWrt SNAPSHOT r5994-fd30187c87 / LuCI Master (git-18.031.70145-518ac52)

Feb 3rd 2018 snapshot.

install snapshot, let it run, normal usage, connect disconnect etc.

info from kernel log:

========= [14458.634926] ath10k_pci 0000:01:00.0: failed to delete peer c4:b3:01:8f:ef:62 for vdev 0: -145 [14458.643587] ath10k_pci 0000:01:00.0: found sta peer c4:b3:01:8f:ef:62 (ptr 86958c00 id 27) entry on vdev 0 after it was supposedly removed [14458.656870] ------------[ cut here ]------------ [14458.661686] WARNING: CPU: 0 PID: 13630 at backports-2017-11-01/net/mac80211/sta_info.c:1001 sta_set_sinfo+0x930/0x9d8 [mac80211] [14458.673453] Modules linked in: xt_tcpmss xt_statistic xt_recent xt_length xt_hl xt_helper xt_ecn xt_dscp xt_connmark xt_connlimit xt_connbytes xt_HL xt_DSCP xt_CLASSIFY ipt_ECN sch_cake act_skbedit act_mirred em_u32 cls_u32 cls_tcindex cls_flow cls_route cls_fw sch_tbf sch_htb sch_hfsc sch_ingress ifb ath9k ath9k_common pppoe ppp_async ath9k_hw ath10k_pci ath10k_core ath pppox ppp_generic nf_conntrack_netlink nf_conntrack_ipv6 mac80211 iptable_nat ipt_REJECT ipt_MASQUERADE cfg80211 xt_time xt_tcpudp xt_state xt_nat xt_multiport xt_mark xt_mac xt_limit xt_conntrack xt_comment xt_TCPMSS xt_REDIRECT xt_LOG xt_CT slhc nfnetlink nf_reject_ipv4 nf_nat_redirect nf_nat_masquerade_ipv4 nf_conntrack_ipv4 nf_nat_ipv4 nf_nat nf_log_ipv4 nf_defrag_ipv6 nf_defrag_ipv4 nf_conntrack_rtcache nf_conntrack iptable_mangle [14458.745995] iptable_filter ip_tables crc_ccitt compat ledtrig_usbport ip6t_REJECT nf_reject_ipv6 nf_log_ipv6 nf_log_common ip6table_mangle ip6table_filter ip6_tables x_tables sit tunnel4 ip_tunnel nls_utf8 nls_iso8859_1 nls_cp437 vfat fat usb_storage sd_mod scsi_mod ehci_platform ehci_hcd gpio_button_hotplug usbcore nls_base usb_common [14458.775167] CPU: 0 PID: 13630 Comm: hostapd Not tainted 4.9.77 #0 [14458.781337] Stack : 804f765a 00000035 00000000 00000001 87c2f614 80489347 80439b58 0000353e [14458.789882] 804f37a0 000003e9 00000000 00000000 00000000 800a9934 8043f378 80480000 [14458.798426] 00000003 000003e9 8043d53c 86b5fb0c 00000000 800d847c 804f765a 00000074 [14458.806971] 00000000 8022ef00 00000000 00000000 00000000 00000000 00000000 00000000 [14458.815516] 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [14458.824051] ... [14458.826552] Call Trace: [14458.829043] [<8006b2c8>] show_stack+0x54/0x88 [14458.833482] [<8007ff40>] __warn+0xe4/0x118 [14458.837657] [<80080008>] warn_slowpath_null+0x1c/0x34 [14458.842880] [<87706fd8>] sta_set_sinfo+0x930/0x9d8 [mac80211] [14458.848830] [<87704940>] sta_info_get_bss+0x18/0x68 [mac80211] [14458.854870] [<87707160>] sta_info_destroy_addr_bss+0x38/0x60 [mac80211] [14458.861694] [<8764e3d0>] cfg80211_check_station_change+0x21cc/0x3848 [cfg80211] [14458.869154] ---[ end trace e47c69f6c533b83e ]--- [14461.914797] ath10k_pci 0000:01:00.0: failed to wait for created wmi peer c4:b3:01:8f:ef:62 on vdev 0: -145 [14461.924661] ath10k_pci 0000:01:00.0: failed to add peer c4:b3:01:8f:ef:62 for vdev 0 when adding a new sta: -145 [14746.711911] ath10k_pci 0000:01:00.0: failed to install key for vdev 0 peer 2c:0e:3d:12:09:95: -11 [14746.720962] wlan0: failed to remove key (0, 2c:0e:3d:12:09:95) from hardware (-11) [14746.753467] ath10k_pci 0000:01:00.0: cipher 0 is not supported [14746.759445] ath10k_pci 0000:01:00.0: failed to remove peer wep key 0: -122 [14746.766463] ath10k_pci 0000:01:00.0: failed to clear all peer wep keys for vdev 0: -122 [14746.774607] ath10k_pci 0000:01:00.0: failed to disassociate station: 2c:0e:3d:12:09:95 vdev 0: -122 [14746.783787] ------------[ cut here ]------------ [14746.788602] WARNING: CPU: 0 PID: 13630 at backports-2017-11-01/net/mac80211/sta_info.c:993 sta_set_sinfo+0x8e0/0x9d8 [mac80211] [14746.800249] Modules linked in: xt_tcpmss xt_statistic xt_recent xt_length xt_hl xt_helper xt_ecn xt_dscp xt_connmark xt_connlimit xt_connbytes xt_HL xt_DSCP xt_CLASSIFY ipt_ECN sch_cake act_skbedit act_mirred em_u32 cls_u32 cls_tcindex cls_flow cls_route cls_fw sch_tbf sch_htb sch_hfsc sch_ingress ifb ath9k ath9k_common pppoe ppp_async ath9k_hw ath10k_pci ath10k_core ath pppox ppp_generic nf_conntrack_netlink nf_conntrack_ipv6 mac80211 iptable_nat ipt_REJECT ipt_MASQUERADE cfg80211 xt_time xt_tcpudp xt_state xt_nat xt_multiport xt_mark xt_mac xt_limit xt_conntrack xt_comment xt_TCPMSS xt_REDIRECT xt_LOG xt_CT slhc nfnetlink nf_reject_ipv4 nf_nat_redirect nf_nat_masquerade_ipv4 nf_conntrack_ipv4 nf_nat_ipv4 nf_nat nf_log_ipv4 nf_defrag_ipv6 nf_defrag_ipv4 nf_conntrack_rtcache nf_conntrack iptable_mangle [14746.872787] iptable_filter ip_tables crc_ccitt compat ledtrig_usbport ip6t_REJECT nf_reject_ipv6 nf_log_ipv6 nf_log_common ip6table_mangle ip6table_filter ip6_tables x_tables sit tunnel4 ip_tunnel nls_utf8 nls_iso8859_1 nls_cp437 vfat fat usb_storage sd_mod scsi_mod ehci_platform ehci_hcd gpio_button_hotplug usbcore nls_base usb_common [14746.901958] CPU: 0 PID: 13630 Comm: hostapd Tainted: G W 4.9.77 #0 [14746.909370] Stack : 804f765a 00000043 00000000 00000001 87c2f614 80489347 80439b58 0000353e [14746.917913] 804f37a0 000003e1 00000000 00000000 00000000 800a9934 8043f378 80480000 [14746.926458] 00000003 000003e1 8043d53c 86b5fb0c 00000000 800d847c 804f765a 00000073 [14746.935002] 8049ae60 8022ef00 00000000 00000000 00000000 00000000 00000000 00000000 [14746.943547] 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [14746.952092] ... [14746.954583] Call Trace: [14746.957064] [<8006b2c8>] show_stack+0x54/0x88 [14746.961495] [<8007ff40>] __warn+0xe4/0x118 [14746.965666] [<80080008>] warn_slowpath_null+0x1c/0x34 [14746.970889] [<87706f88>] sta_set_sinfo+0x8e0/0x9d8 [mac80211] [14746.976845] [<87704940>] sta_info_get_bss+0x18/0x68 [mac80211] [14746.982873] [<87707160>] sta_info_destroy_addr_bss+0x38/0x60 [mac80211] [14746.989699] [<8764e3d0>] cfg80211_check_station_change+0x21cc/0x3848 [cfg80211] [14746.997160] ---[ end trace e47c69f6c533b83f ]--- [14750.071885] ath10k_pci 0000:01:00.0: failed to delete peer 2c:0e:3d:12:09:95 for vdev 0: -11 [14750.080493] ath10k_pci 0000:01:00.0: found sta peer 2c:0e:3d:12:09:95 (ptr 86115e00 id 57) entry on vdev 0 after it was supposedly removed [14753.111859] ath10k_pci 0000:01:00.0: failed to set beacon mode for vdev 0: -11 [14756.151812] ath10k_pci 0000:01:00.0: failed to set dtim period for vdev 0: -11 [14759.191795] ath10k_pci 0000:01:00.0: failed to recalculate rts/cts prot for vdev 0: -11 [14762.231753] ath10k_pci 0000:01:00.0: failed to set cts protection for vdev 0: -11 [14765.271707] ath10k_pci 0000:01:00.0: failed to set preamble for vdev 0: -11 [88965.620794] ath10k_pci 0000:01:00.0: failed to install key for vdev 0 peer a4:2b:b0:df:39:70: -11 [88965.630032] wlan0: failed to set key (2, ff:ff:ff:ff:ff:ff) to hardware (-11) [111930.445474] ath10k_pci 0000:01:00.0: failed to send pdev bss chan info request [111933.485423] ath10k_pci 0000:01:00.0: failed to send pdev bss chan info request [111937.165444] ath10k_pci 0000:01:00.0: failed to send pdev bss chan info request [111940.205359] ath10k_pci 0000:01:00.0: failed to send pdev bss chan info request [111947.165313] ath10k_pci 0000:01:00.0: failed to send pdev bss chan info request [111950.205384] ath10k_pci 0000:01:00.0: failed to send pdev bss chan info request [111957.165174] ath10k_pci 0000:01:00.0: failed to send pdev bss chan info request [111960.205293] ath10k_pci 0000:01:00.0: failed to send pdev bss chan info request [111964.685124] ath10k_pci 0000:01:00.0: failed to send pdev bss chan info request [111967.725111] ath10k_pci 0000:01:00.0: failed to send pdev bss chan info request [111974.525032] ath10k_pci 0000:01:00.0: failed to send pdev bss chan info request [111977.565030] ath10k_pci 0000:01:00.0: failed to send pdev bss chan info request [111984.524945] ath10k_pci 0000:01:00.0: failed to send pdev bss chan info request [111987.564913] ath10k_pci 0000:01:00.0: failed to send pdev bss chan info request [111994.524853] ath10k_pci 0000:01:00.0: failed to send pdev bss chan info request [111997.564835] ath10k_pci 0000:01:00.0: failed to send pdev bss chan info request [112004.524759] ath10k_pci 0000:01:00.0: failed to send pdev bss chan info request [112007.564726] ath10k_pci 0000:01:00.0: failed to send pdev bss chan info request

aparcar commented 6 years ago

systemcrash:

log in txt

aparcar commented 6 years ago

systemcrash:

reference WEP keys - no WEP keys in use at all...

aparcar commented 6 years ago

systemcrash:

Only 2.4GHz wifi was available after this, 5GHZ SSID was not showing.

aparcar commented 6 years ago

systemcrash:

sorry, Feb 2rd 2018 snapshot.

shasum c0c6e5a04c7210774f1123a80e0b50e385694165 openwrt-ar71xx-generic-archer-c7-v2-squashfs-sysupgrade.bin

aparcar commented 6 years ago

systemcrash:

Same with Feb 3rd 2018 snapshot.

OpenWrt SNAPSHOT r5996-256477f7af / LuCI Master (git-18.034.37656-e386d76)

(kernel log says otherwise: [ 0.000000] Linux version 4.9.77 (buildbot@buildslave) (gcc version 5.5.0 (OpenWrt GCC 5.5.0 r5985-33e8f7ee49) ) #0 Wed Jan 31 13:43:12 2018 )

5GHz unavailable

aparcar commented 6 years ago

rmaffeo:

Comment deleted - ignore attached log