New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
FS#1723 - WARNING: CPU: 0 PID: 0 at backports-2017-11-01/drivers/net/wireless/ath/ath10k/htt_rx.c:1015 0xbf2ca #8490
Comments
esters: Good day, I noticed the same issue on My TP-Link Archer C2600. Here is the device information and dmesg information. I also note that sometimes the router looses Wifi functionality or even reboots:
|
dfberger: Same, also on an Archer C2600 running 18.06.2 - spontaneous reboots every few days, often the (remote) logs are empty, occasionally they catch that warning before the oops. |
ynezz:
Please try to reproduce the problem on 18.06.4 and ideally on snapshot images as well, as it's more likely, that someone would be able to decypher the stack trace properly and then maybe fix the problem. |
esters: Good day, The same crash happens on 18.06.4
|
esters: Good day, The same crash happens on 18.06.5
|
rolandd:
I am running openwrt-18.06 on Linksys EA8500 (ipq806x).
I see the following warning in the kernel log (nothing for 10+ minutes in dmesg prior to this, and nothing after):
[ 745.944042] ------------[ cut here ]------------ [ 745.944108] WARNING: CPU: 0 PID: 0 at backports-2017-11-01/drivers/net/wireless/ath/ath10k/htt_rx.c:1015 0xbf2caf0c [ath10k_core@bf2b5000+0x3d000] [ 745.947840] Modules linked in: pppoe ppp_async ath10k_pci ath10k_core ath pppox ppp_generic nf_conntrack_ipv6 mac80211 iptable_nat ipt_REJECT ipt_MASQUERADE cfg80211 xt_time xt_tcpudp xt_state xt_nat xt_multiport xt_mark xt_mac xt_limit xt_conntrack xt_comment xt_TCPMSS xt_REDIRECT xt_LOG xt_FLOWOFFLOAD xt_CT slhc nf_reject_ipv4 nf_nat_redirect nf_nat_masquerade_ipv4 nf_conntrack_ipv4 nf_nat_ipv4 nf_nat nf_log_ipv4 nf_flow_table_hw nf_flow_table nf_defrag_ipv6 nf_defrag_ipv4 nf_conntrack_rtcache nf_conntrack iptable_mangle iptable_filter ip_tables crc_ccitt compat ledtrig_usbport ip6t_REJECT nf_reject_ipv6 nf_log_ipv6 nf_log_common ip6table_mangle ip6table_filter ip6_tables x_tables leds_gpio xhci_plat_hcd xhci_pci xhci_hcd dwc3 dwc3_of_simple ohci_platform ohci_hcd phy_qcom_dwc3 ahci ehci_platform [ 746.009232] sd_mod ahci_platform libahci_platform libahci libata scsi_mod ehci_hcd gpio_button_hotplug [ 746.031433] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 4.14.54 #0 [ 746.040610] Hardware name: Generic DT based system [ 746.046865] Function entered at [] from [] [ 746.051463] Function entered at [] from [] [ 746.057278] Function entered at [] from [] [ 746.063094] Function entered at [] from [] [ 746.068908] Function entered at [] from [] [ 746.074768] Function entered at [] from [] [ 746.080544] Function entered at [] from [] [ 746.086374] Function entered at [] from [] [ 746.092173] Function entered at [] from [] [ 746.097989] Function entered at [] from [] [ 746.103805] Function entered at [] from [] [ 746.109621] Function entered at [] from [] [ 746.115436] Function entered at [] from [] [ 746.121253] Exception stack(0xc0a01f48 to 0xc0a01f90) [ 746.127092] 1f40: 00000001 00000000 00000000 c03154c0 ffffe000 c0a03c70 [ 746.132225] 1f60: c0a03c24 00000000 00000000 c092da28 00000000 00000000 c0a01f90 c0a01f98 [ 746.140369] 1f80: c0308844 c0308848 60000013 ffffffff [ 746.148510] Function entered at [] from [] [ 746.153544] Function entered at [] from [] [ 746.159273] Function entered at [] from [] [ 746.165087] Function entered at [] from [] [ 746.170998] ---[ end trace d7b584a1e69fa5ab ]--- [ 746.179889] ath10k_pci 0000:01:00.0: SWBA overrun on vdev 0, skipped old beacon [ 746.181533] ath10k_pci 0000:01:00.0: SWBA overrun on vdev 1, skipped old beacon
not sure what if anything provoked it, and wireless appears to work fine afterwards.
I looked at the backports-2017-11-01 tarball but apparently the source doesn't quite correspond to what I'm actually running (prebuilt binary from openwrt release downloads):
998 static void ath10k_htt_rx_h_undecap_raw(struct ath10k *ar,
999 struct sk_buff *msdu,
1000 struct ieee80211_rx_status *status,
1001 enum htt_rx_mpdu_encrypt_type enctype,
1002 bool is_decrypted)
1003 {
1004 struct ieee80211_hdr *hdr;
1005 struct htt_rx_desc *rxd;
1006 size_t hdr_len;
1007 size_t crypto_len;
1008 bool is_first;
1009 bool is_last;
1010
1011 rxd = (void *)msdu->data - sizeof(rxd);
1012 is_first = !!(rxd->msdu_end.common.info0 &
1013 __cpu_to_le32(RX_MSDU_END_INFO0_FIRST_MSDU));
1014 is_last = !!(rxd->msdu_end.common.info0 &
1015 __cpu_to_le32(RX_MSDU_END_INFO0_LAST_MSDU));
1016
1017 / Delivered decapped frame:
1018 * [802.11 header]
1019 * [crypto param] <-- can be trimmed if !fcs_err &&
1020 * !decrypt_err && !peer_idx_invalid
1021 * [amsdu header] <-- only if A-MSDU
1022 * [rfc1042/llc]
1023 * [payload]
1024 * [FCS] <-- at end, needs to be trimmed
1025 /
1026
1027 / This probably shouldn't happen but warn just in case /
1028 if (unlikely(WARN_ON_ONCE(!is_first)))
1029 return;
1030
1031 / This probably shouldn't happen but warn just in case */
1032 if (unlikely(WARN_ON_ONCE(!(is_first && is_last))))
1033 return;
I suspect one of those two warnings is what is being hit but neither of them is quite at line 1015...
The text was updated successfully, but these errors were encountered: