Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

FS#2741 - IPv6 traffic stops switch on Linksys EA6350 #8047

Closed
openwrt-bot opened this issue Jan 15, 2020 · 6 comments
Closed

FS#2741 - IPv6 traffic stops switch on Linksys EA6350 #8047

openwrt-bot opened this issue Jan 15, 2020 · 6 comments
Labels

Comments

@openwrt-bot
Copy link

TPSJR:

I use a Linksys EA6350v3 running 19.07 (issue occurs in the latest snapshots) and IPv6 traffic is able stop the built in switch from working cutting off internet access (IPv4 traffic does not impact the switch). Through WiFi you are still able to access Luci and a reboot of the router is needed to fix the issue.

The topic is being discussed here and seems to impact other router models as well:
https://forum.openwrt.org/t/ethernet-cuts-out-on-linksys-ea6350v3/39111

The following are from "logread -f" after the switch stops working during an iperf3 IPv6 test:

Wed Jan 15 00:37:11 2020 kern.alert kernel: [ 1094.936813] BUG: Bad page state in process swapper/0 pfn:8d4d0
Wed Jan 15 00:37:11 2020 kern.emerg kernel: [ 1094.936855] page:cffa2a00 count:-1 mapcount:0 mapping: (null) index:0x0
Wed Jan 15 00:37:11 2020 kern.emerg kernel: [ 1094.941546] flags: 0x0()
Wed Jan 15 00:37:11 2020 kern.alert kernel: [ 1094.948495] raw: 00000000 00000000 00000000 ffffffff ffffffff 00000100 00000200 00000000
Wed Jan 15 00:37:11 2020 kern.alert kernel: [ 1094.951008] page dumped because: nonzero _count
Wed Jan 15 00:37:11 2020 kern.warn kernel: [ 1094.959074] Modules linked in: pppoe ppp_async ath10k_pci ath10k_core ath pppox ppp_generic nf_conntrack_ipv6 mac80211 iptable_nat ipt_REJECT ipt_MASQUERADE cfg80211 xt_time xt_tcpudp xt_state xt_nat xt_multiport xt_mark xt_mac xt_limit xt_conntrack xt_comment xt_TCPMSS xt_REDIRECT xt_LOG xt_FLOWOFFLOAD xt_CT slhc nf_reject_ipv4 nf_nat_redirect nf_nat_masquerade_ipv4 nf_conntrack_ipv4 nf_nat_ipv4 nf_nat nf_log_ipv4 nf_flow_table_hw nf_flow_table nf_defrag_ipv6 nf_defrag_ipv4 nf_conntrack_rtcache nf_conntrack iptable_mangle iptable_filter ip_tables hwmon crc_ccitt compat nf_log_ipv6 nf_log_common ip6table_mangle ip6table_filter ip6_tables ip6t_REJECT x_tables nf_reject_ipv6 leds_gpio xhci_plat_hcd xhci_pci xhci_hcd dwc3 dwc3_of_simple gpio_button_hotplug
Wed Jan 15 00:37:11 2020 kern.warn kernel: [ 1095.007768] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 4.14.162 #0
Wed Jan 15 00:37:11 2020 kern.warn kernel: [ 1095.029997] Hardware name: Generic DT based system
Wed Jan 15 00:37:11 2020 kern.warn kernel: [ 1095.036257] Function entered at [] from []
Wed Jan 15 00:37:11 2020 kern.warn kernel: [ 1095.040938] Function entered at [] from []
Wed Jan 15 00:37:11 2020 kern.warn kernel: [ 1095.046754] Function entered at [] from []
Wed Jan 15 00:37:11 2020 kern.warn kernel: [ 1095.052570] Function entered at [] from []
Wed Jan 15 00:37:11 2020 kern.warn kernel: [ 1095.058386] Function entered at [] from []
Wed Jan 15 00:37:11 2020 kern.warn kernel: [ 1095.064201] Function entered at [] from []
Wed Jan 15 00:37:11 2020 kern.warn kernel: [ 1095.070016] Function entered at [] from []
Wed Jan 15 00:37:11 2020 kern.warn kernel: [ 1095.075834] Function entered at [] from []
Wed Jan 15 00:37:11 2020 kern.warn kernel: [ 1095.081647] Function entered at [] from []
Wed Jan 15 00:37:11 2020 kern.warn kernel: [ 1095.087466] Function entered at [] from []
Wed Jan 15 00:37:11 2020 kern.warn kernel: [ 1095.093280] Function entered at [] from []
Wed Jan 15 00:37:11 2020 kern.warn kernel: [ 1095.099097] Function entered at [] from []
Wed Jan 15 00:37:11 2020 kern.warn kernel: [ 1095.104912] Function entered at [] from []
Wed Jan 15 00:37:11 2020 kern.warn kernel: [ 1095.110729] Function entered at [] from []
Wed Jan 15 00:37:11 2020 kern.warn kernel: [ 1095.116546] Function entered at [] from []
Wed Jan 15 00:37:11 2020 kern.warn kernel: [ 1095.122360] Function entered at [] from []
Wed Jan 15 00:37:11 2020 kern.warn kernel: [ 1095.128176] Exception stack(0xc0a01f40 to 0xc0a01f88)
Wed Jan 15 00:37:11 2020 kern.warn kernel: [ 1095.133997] 1f40: 00000001 00000000 00000000 c0313960 ffffe000 c0a03cb8 c0a03c6c 00000000
Wed Jan 15 00:37:11 2020 kern.warn kernel: [ 1095.139124] 1f60: 00000000 00000001 cfffcd40 c092da28 c0a01f88 c0a01f90 c0307d88 c0307d8c
Wed Jan 15 00:37:11 2020 kern.warn kernel: [ 1095.147276] 1f80: 60000013 ffffffff
Wed Jan 15 00:37:11 2020 kern.warn kernel: [ 1095.155429] Function entered at [] from []
Wed Jan 15 00:37:11 2020 kern.warn kernel: [ 1095.158733] Function entered at [] from []
Wed Jan 15 00:37:11 2020 kern.warn kernel: [ 1095.164635] Function entered at [] from []
Wed Jan 15 00:37:11 2020 kern.warn kernel: [ 1095.170451] Function entered at [] from []
Wed Jan 15 00:37:11 2020 kern.warn kernel: [ 1095.176267] Disabling lock debugging due to kernel taint

Wed Jan 15 00:51:36 2020 kern.alert kernel: [ 443.412420] BUG: Bad page state in process swapper/0 pfn:8d8fa
Wed Jan 15 00:51:36 2020 kern.emerg kernel: [ 443.412461] page:cffaaf40 count:-1 mapcount:0 mapping: (null) index:0x0
Wed Jan 15 00:51:36 2020 kern.emerg kernel: [ 443.417152] flags: 0x0()
Wed Jan 15 00:51:36 2020 kern.alert kernel: [ 443.424100] raw: 00000000 00000000 00000000 ffffffff ffffffff 00000000 cffaaf54 00000000
Wed Jan 15 00:51:36 2020 kern.alert kernel: [ 443.426615] page dumped because: nonzero _count
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 443.434680] Modules linked in: pppoe ppp_async ath10k_pci ath10k_core ath pppox ppp_generic nf_conntrack_ipv6 mac80211 iptable_nat ipt_REJECT ipt_MASQUERADE cfg80211 xt_time xt_tcpudp xt_state xt_nat xt_multiport xt_mark xt_mac xt_limit xt_conntrack xt_comment xt_TCPMSS xt_REDIRECT xt_LOG xt_FLOWOFFLOAD xt_CT slhc nf_reject_ipv4 nf_nat_redirect nf_nat_masquerade_ipv4 nf_conntrack_ipv4 nf_nat_ipv4 nf_nat nf_log_ipv4 nf_flow_table_hw nf_flow_table nf_defrag_ipv6 nf_defrag_ipv4 nf_conntrack_rtcache nf_conntrack iptable_mangle iptable_filter ip_tables hwmon crc_ccitt compat nf_log_ipv6 nf_log_common ip6table_mangle ip6table_filter ip6_tables ip6t_REJECT x_tables nf_reject_ipv6 leds_gpio xhci_plat_hcd xhci_pci xhci_hcd dwc3 dwc3_of_simple gpio_button_hotplug
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 443.483374] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 4.14.162 #0
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 443.505602] Hardware name: Generic DT based system
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 443.511863] Function entered at [] from []
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 443.516543] Function entered at [] from []
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 443.522360] Function entered at [] from []
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 443.528175] Function entered at [] from []
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 443.533992] Function entered at [] from []
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 443.539807] Function entered at [] from []
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 443.545621] Function entered at [] from []
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 443.551440] Function entered at [] from []
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 443.557254] Function entered at [] from []
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 443.563071] Function entered at [] from []
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 443.568886] Function entered at [] from []
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 443.574704] Function entered at [] from []
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 443.580520] Function entered at [] from []
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 443.586335] Function entered at [] from []
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 443.592152] Function entered at [] from []
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 443.597965] Function entered at [] from []
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 443.603783] Exception stack(0xc0a01f40 to 0xc0a01f88)
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 443.609604] 1f40: 00000001 00000000 00000000 c0313960 ffffe000 c0a03cb8 c0a03c6c 00000000
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 443.614729] 1f60: 00000000 00000001 cfffcd40 c092da28 c0a01f88 c0a01f90 c0307d88 c0307d8c
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 443.622883] 1f80: 60000013 ffffffff
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 443.631035] Function entered at [] from []
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 443.634337] Function entered at [] from []
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 443.640241] Function entered at [] from []
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 443.646056] Function entered at [] from []
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 443.651873] Disabling lock debugging due to kernel taint
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 443.663306] ------------[ cut here ]------------
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 443.663359] WARNING: CPU: 0 PID: 1767 at net/core/dev.c:4700 0xc063c104
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 443.667803] Modules linked in: pppoe ppp_async ath10k_pci ath10k_core ath pppox ppp_generic nf_conntrack_ipv6 mac80211 iptable_nat ipt_REJECT ipt_MASQUERADE cfg80211 xt_time xt_tcpudp xt_state xt_nat xt_multiport xt_mark xt_mac xt_limit xt_conntrack xt_comment xt_TCPMSS xt_REDIRECT xt_LOG xt_FLOWOFFLOAD xt_CT slhc nf_reject_ipv4 nf_nat_redirect nf_nat_masquerade_ipv4 nf_conntrack_ipv4 nf_nat_ipv4 nf_nat nf_log_ipv4 nf_flow_table_hw nf_flow_table nf_defrag_ipv6 nf_defrag_ipv4 nf_conntrack_rtcache nf_conntrack iptable_mangle iptable_filter ip_tables hwmon crc_ccitt compat nf_log_ipv6 nf_log_common ip6table_mangle ip6table_filter ip6_tables ip6t_REJECT x_tables nf_reject_ipv6 leds_gpio xhci_plat_hcd xhci_pci xhci_hcd dwc3 dwc3_of_simple gpio_button_hotplug
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 443.718585] CPU: 0 PID: 1767 Comm: dropbear Tainted: G B 4.14.162 #0
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 443.740761] Hardware name: Generic DT based system
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 443.748407] Function entered at [] from []
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 443.753089] Function entered at [] from []
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 443.758905] Function entered at [] from []
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 443.764721] Function entered at [] from []
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 443.770534] Function entered at [] from []
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 443.776353] Function entered at [] from []
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 443.782167] Function entered at [] from []
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 443.787983] Function entered at [] from []
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 443.793800] Function entered at [] from []
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 443.799615] Function entered at [] from []
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 443.805433] Function entered at [] from []
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 443.811246] Function entered at [] from []
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 443.817064] Exception stack(0xce95ffb0 to 0xce95fff8)
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 443.822881] ffa0: 00000001 bed43480 000001f0 0000002b
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 443.828011] ffc0: bed43480 b6f76230 0000005e 000001d0 bed434a4 00000020 b6f73010 00025a9c
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 443.836169] ffe0: 00000010 bed43468 0001f5d0 000123c4 60000010 ffffffff
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 443.844409] ---[ end trace 963ab92f22dbc474 ]---
Wed Jan 15 00:51:36 2020 kern.alert kernel: [ 443.853363] BUG: Bad page state in process ksoftirqd/0 pfn:8d928
Wed Jan 15 00:51:36 2020 kern.emerg kernel: [ 443.855616] page:cffab500 count:-1 mapcount:0 mapping: (null) index:0x0
Wed Jan 15 00:51:36 2020 kern.emerg kernel: [ 443.861595] flags: 0x0()
Wed Jan 15 00:51:36 2020 kern.alert kernel: [ 443.868372] raw: 00000000 00000000 00000000 ffffffff ffffffff 00000100 00000200 00000000
Wed Jan 15 00:51:36 2020 kern.alert kernel: [ 443.870884] page dumped because: nonzero _count
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 443.878951] Modules linked in: pppoe ppp_async ath10k_pci ath10k_core ath pppox ppp_generic nf_conntrack_ipv6 mac80211 iptable_nat ipt_REJECT ipt_MASQUERADE cfg80211 xt_time xt_tcpudp xt_state xt_nat xt_multiport xt_mark xt_mac xt_limit xt_conntrack xt_comment xt_TCPMSS xt_REDIRECT xt_LOG xt_FLOWOFFLOAD xt_CT slhc nf_reject_ipv4 nf_nat_redirect nf_nat_masquerade_ipv4 nf_conntrack_ipv4 nf_nat_ipv4 nf_nat nf_log_ipv4 nf_flow_table_hw nf_flow_table nf_defrag_ipv6 nf_defrag_ipv4 nf_conntrack_rtcache nf_conntrack iptable_mangle iptable_filter ip_tables hwmon crc_ccitt compat nf_log_ipv6 nf_log_common ip6table_mangle ip6table_filter ip6_tables ip6t_REJECT x_tables nf_reject_ipv6 leds_gpio xhci_plat_hcd xhci_pci xhci_hcd dwc3 dwc3_of_simple gpio_button_hotplug
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 443.927646] CPU: 0 PID: 7 Comm: ksoftirqd/0 Tainted: G B W 4.14.162 #0
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 443.949876] Hardware name: Generic DT based system
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 443.957522] Function entered at [] from []
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 443.962204] Function entered at [] from []
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 443.968020] Function entered at [] from []
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 443.973835] Function entered at [] from []
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 443.979650] Function entered at [] from []
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 443.985467] Function entered at [] from []
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 443.991281] Function entered at [] from []
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 443.997099] Function entered at [] from []
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 444.002913] Function entered at [] from []
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 444.008731] Function entered at [] from []
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 444.014545] Function entered at [] from []
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 444.020363] Function entered at [] from []
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 444.026179] Function entered at [] from []
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 444.031995] Function entered at [] from []
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 444.037811] Function entered at [] from []
Wed Jan 15 00:51:36 2020 kern.warn kernel: [ 444.043626] Function entered at [] from []
Wed Jan 15 00:51:59 2020 kern.warn kernel: [ 467.147594] ------------[ cut here ]------------
Wed Jan 15 00:51:59 2020 kern.warn kernel: [ 467.147640] WARNING: CPU: 0 PID: 0 at net/core/dev.c:4700 0xc063c104
Wed Jan 15 00:51:59 2020 kern.warn kernel: [ 467.151298] Modules linked in: pppoe ppp_async ath10k_pci ath10k_core ath pppox ppp_generic nf_conntrack_ipv6 mac80211 iptable_nat ipt_REJECT ipt_MASQUERADE cfg80211 xt_time xt_tcpudp xt_state xt_nat xt_multiport xt_mark xt_mac xt_limit xt_conntrack xt_comment xt_TCPMSS xt_REDIRECT xt_LOG xt_FLOWOFFLOAD xt_CT slhc nf_reject_ipv4 nf_nat_redirect nf_nat_masquerade_ipv4 nf_conntrack_ipv4 nf_nat_ipv4 nf_nat nf_log_ipv4 nf_flow_table_hw nf_flow_table nf_defrag_ipv6 nf_defrag_ipv4 nf_conntrack_rtcache nf_conntrack iptable_mangle iptable_filter ip_tables hwmon crc_ccitt compat nf_log_ipv6 nf_log_common ip6table_mangle ip6table_filter ip6_tables ip6t_REJECT x_tables nf_reject_ipv6 leds_gpio xhci_plat_hcd xhci_pci xhci_hcd dwc3 dwc3_of_simple gpio_button_hotplug
Wed Jan 15 00:51:59 2020 kern.warn kernel: [ 467.201852] CPU: 0 PID: 0 Comm: swapper/0 Tainted: G B W 4.14.162 #0
Wed Jan 15 00:52:00 2020 kern.warn kernel: [ 467.224032] Hardware name: Generic DT based system
Wed Jan 15 00:52:00 2020 kern.warn kernel: [ 467.231328] Function entered at [] from []
Wed Jan 15 00:52:00 2020 kern.warn kernel: [ 467.236184] Function entered at [] from []
Wed Jan 15 00:52:00 2020 kern.warn kernel: [ 467.242001] Function entered at [] from []
Wed Jan 15 00:52:00 2020 kern.warn kernel: [ 467.247817] Function entered at [] from []
Wed Jan 15 00:52:00 2020 kern.warn kernel: [ 467.253630] Function entered at [] from []
Wed Jan 15 00:52:00 2020 kern.warn kernel: [ 467.259447] Function entered at [] from []
Wed Jan 15 00:52:00 2020 kern.warn kernel: [ 467.265262] Function entered at [] from []
Wed Jan 15 00:52:00 2020 kern.warn kernel: [ 467.271078] Function entered at [] from []
Wed Jan 15 00:52:00 2020 kern.warn kernel: [ 467.276896] Function entered at [] from []
Wed Jan 15 00:52:00 2020 kern.warn kernel: [ 467.282709] Function entered at [] from []
Wed Jan 15 00:52:00 2020 kern.warn kernel: [ 467.288527] Function entered at [] from []
Wed Jan 15 00:52:00 2020 kern.warn kernel: [ 467.294344] Function entered at [] from []
Wed Jan 15 00:52:00 2020 kern.warn kernel: [ 467.300159] Function entered at [] from []
Wed Jan 15 00:52:00 2020 kern.warn kernel: [ 467.305974] Function entered at [] from []
Wed Jan 15 00:52:00 2020 kern.warn kernel: [ 467.311791] Exception stack(0xc0a01f40 to 0xc0a01f88)
Wed Jan 15 00:52:00 2020 kern.warn kernel: [ 467.317613] 1f40: 00000001 00000000 00000000 c0313960 ffffe000 c0a03cb8 c0a03c6c 00000000
Wed Jan 15 00:52:00 2020 kern.warn kernel: [ 467.322738] 1f60: 00000000 00000001 cfffcd40 c092da28 c0a01f88 c0a01f90 c0307d88 c0307d8c
Wed Jan 15 00:52:00 2020 kern.warn kernel: [ 467.330892] 1f80: 60000013 ffffffff
Wed Jan 15 00:52:00 2020 kern.warn kernel: [ 467.339045] Function entered at [] from []
Wed Jan 15 00:52:00 2020 kern.warn kernel: [ 467.342347] Function entered at [] from []
Wed Jan 15 00:52:00 2020 kern.warn kernel: [ 467.348249] Function entered at [] from []
Wed Jan 15 00:52:00 2020 kern.warn kernel: [ 467.354066] Function entered at [] from []
Wed Jan 15 00:52:00 2020 kern.warn kernel: [ 467.359978] ---[ end trace 963ab92f22dbc475 ]---
Wed Jan 15 00:52:00 2020 kern.alert kernel: [ 467.370760] Unable to handle kernel NULL pointer dereference at virtual address 00000000
Wed Jan 15 00:52:00 2020 kern.alert kernel: [ 467.370804] pgd = c0204000

Wed Jan 15 00:56:36 2020 kern.err kernel: [ 121.687088] ess_edma c080000.edma: Invalid RRD source port bit set
Wed Jan 15 00:56:36 2020 kern.err kernel: [ 121.687195] ess_edma c080000.edma: Invalid RRD source port bit set
Wed Jan 15 00:56:36 2020 kern.err kernel: [ 121.695201] ess_edma c080000.edma: Invalid RRD source port bit set
Wed Jan 15 00:56:36 2020 kern.alert kernel: [ 121.703775] Unable to handle kernel NULL pointer dereference at virtual address 00000004
Wed Jan 15 00:56:36 2020 kern.alert kernel: [ 121.704505] pgd = c0204000
Wed Jan 15 00:56:36 2020 kern.alert kernel: [ 121.712797] [00000004] *pgd=00000000

I have reset the router to defaults and only changed the WAN IPv6 prefix length and during the failures many error lines are in logs like posts above.

Enabling the Wifi appears to generate less errors (but could be unrelated)
2.4GHz only:Wed Jan 15 01:40:36 2020 kern.alert kernel: [ 103.230457] Unable to handle kernel NULL pointer dereference at virtual address 00000004
Wed Jan 15 01:40:36 2020 kern.alert kernel: [ 103.230497] pgd = c0204000
Wed Jan 15 01:40:36 2020 kern.alert kernel: [ 103.237612] [00000004] *pgd=00000000
Wed Jan 15 01:40:36 2020 kern.emerg kernel: [ 103.240191] Internal error: Oops: 817 [#1] SMP ARM

5GHz only:

Wed Jan 15 01:43:58 2020 kern.warn kernel: [ 184.317800] backlog: Budget exhausted after napi rescheduled
With both 2.4GHz and 5GHz enabled it seems to fail so you can still connect to Luci over WiFi but with no errors in logs (like I experienced at parents).

@openwrt-bot
Copy link
Author

pgwipeout:

Would you be able to flash a debug kernel and re-run the test?

@openwrt-bot
Copy link
Author

TPSJR:

The following logs are from 19.07 release build with "Collect kernel debug information" checked:

root@OpenWrt:~# logread -f
Wed Jan 22 20:26:55 2020 kern.alert kernel: [ 118.339257] BUG: Bad page state in process swapper/0 pfn:8d44a
Wed Jan 22 20:26:55 2020 kern.emerg kernel: [ 118.339305] page:cffa1940 count:-1 mapcount:0 mapping: (null) index:0x0
Wed Jan 22 20:26:55 2020 kern.emerg kernel: [ 118.344006] flags: 0x0()
Wed Jan 22 20:26:55 2020 kern.alert kernel: [ 118.350960] raw: 00000000 00000000 00000000 ffffffff ffffffff 00000000 cffa1954 00000000
Wed Jan 22 20:26:55 2020 kern.alert kernel: [ 118.353453] page dumped because: nonzero _count
Wed Jan 22 20:26:55 2020 kern.warn kernel: [ 118.361521] Modules linked in: pppoe ppp_async ath10k_pci ath10k_core ath pppox ppp_generic nf_conntrack_ipv6 mac80211 iptable_nat ipt_REJECT ipt_MASQUERADE cfg80211 xt_time xt_tcpudp xt_state xt_nat xt_multiport xt_mark xt_mac xt_limit xt_conntrack xt_comment xt_TCPMSS xt_REDIRECT xt_LOG xt_FLOWOFFLOAD slhc nf_reject_ipv4 nf_nat_redirect nf_nat_masquerade_ipv4 nf_conntrack_ipv4 nf_nat_ipv4 nf_nat nf_log_ipv4 nf_flow_table_hw nf_flow_table nf_defrag_ipv6 nf_defrag_ipv4 nf_conntrack_rtcache nf_conntrack iptable_mangle iptable_filter ip_tables hwmon crc_ccitt compat nf_log_ipv6 nf_log_common ip6table_mangle ip6table_filter ip6_tables ip6t_REJECT x_tables nf_reject_ipv6 leds_gpio xhci_plat_hcd xhci_pci xhci_hcd dwc3 dwc3_of_simple gpio_button_hotplug
Wed Jan 22 20:26:55 2020 kern.warn kernel: [ 118.409867] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 4.14.162 #0
Wed Jan 22 20:26:55 2020 kern.warn kernel: [ 118.432094] Hardware name: Generic DT based system
Wed Jan 22 20:26:55 2020 kern.warn kernel: [ 118.438200] [] (unwind_backtrace) from [] (show_stack+0x10/0x14)
Wed Jan 22 20:26:55 2020 kern.warn kernel: [ 118.442876] [] (show_stack) from [] (dump_stack+0x94/0xa8)
Wed Jan 22 20:26:55 2020 kern.warn kernel: [ 118.450773] [] (dump_stack) from [] (bad_page+0x11c/0x138)
Wed Jan 22 20:26:55 2020 kern.warn kernel: [ 118.457802] [] (bad_page) from [] (get_page_from_freelist+0x4d4/0x800)
Wed Jan 22 20:26:55 2020 kern.warn kernel: [ 118.465008] [] (get_page_from_freelist) from [] (__alloc_pages_nodemask+0x10c/0xd0c)
Wed Jan 22 20:26:55 2020 kern.warn kernel: [ 118.473255] [] (__alloc_pages_nodemask) from [] (page_frag_alloc+0x3c/0x140)
Wed Jan 22 20:26:55 2020 kern.warn kernel: [ 118.482893] [] (page_frag_alloc) from [] (__netdev_alloc_skb+0x8c/0xfc)
Wed Jan 22 20:26:55 2020 kern.warn kernel: [ 118.491658] [] (__netdev_alloc_skb) from [] (__netdev_alloc_skb_ip_align+0xc/0x30)
Wed Jan 22 20:26:55 2020 kern.warn kernel: [ 118.499732] [] (__netdev_alloc_skb_ip_align) from [] (edma_alloc_rx_buf+0xa8/0x414)
Wed Jan 22 20:26:55 2020 kern.warn kernel: [ 118.509109] [] (edma_alloc_rx_buf) from [] (edma_poll+0xcbc/0xe4c)
Wed Jan 22 20:26:55 2020 kern.warn kernel: [ 118.518397] [] (edma_poll) from [] (net_rx_action+0x138/0x2fc)
Wed Jan 22 20:26:55 2020 kern.warn kernel: [ 118.526378] [] (net_rx_action) from [] (__do_softirq+0xe0/0x240)
Wed Jan 22 20:26:55 2020 kern.warn kernel: [ 118.533930] [] (__do_softirq) from [] (irq_exit+0xd4/0x138)
Wed Jan 22 20:26:55 2020 kern.warn kernel: [ 118.541830] [] (irq_exit) from [] (__handle_domain_irq+0x9c/0xac)
Wed Jan 22 20:26:55 2020 kern.warn kernel: [ 118.548860] [] (__handle_domain_irq) from [] (gic_handle_irq+0x5c/0x90)
Wed Jan 22 20:26:55 2020 kern.warn kernel: [ 118.556847] [] (gic_handle_irq) from [] (__irq_svc+0x6c/0x90)
Wed Jan 22 20:26:55 2020 kern.warn kernel: [ 118.564999] Exception stack(0xc0a01f40 to 0xc0a01f88)
Wed Jan 22 20:26:55 2020 kern.warn kernel: [ 118.572642] 1f40: 00000001 00000000 00000000 c0313a60 ffffe000 c0a03cb8 c0a03c6c 00000000
Wed Jan 22 20:26:55 2020 kern.warn kernel: [ 118.577680] 1f60: 00000000 00000001 cfffcd40 c092ca28 c0a01f88 c0a01f90 c0307e48 c0307e4c
Wed Jan 22 20:26:55 2020 kern.warn kernel: [ 118.585833] 1f80: 60000013 ffffffff
Wed Jan 22 20:26:55 2020 kern.warn kernel: [ 118.593993] [] (__irq_svc) from [] (arch_cpu_idle+0x34/0x38)
Wed Jan 22 20:26:55 2020 kern.warn kernel: [ 118.597301] [] (arch_cpu_idle) from [] (do_idle+0xdc/0x1a0)
Wed Jan 22 20:26:55 2020 kern.warn kernel: [ 118.604938] [] (do_idle) from [] (cpu_startup_entry+0x18/0x1c)
Wed Jan 22 20:26:55 2020 kern.warn kernel: [ 118.611972] [] (cpu_startup_entry) from [] (start_kernel+0x3b8/0x3c4)
Wed Jan 22 20:26:55 2020 kern.warn kernel: [ 118.619603] Disabling lock debugging due to kernel taint

@openwrt-bot
Copy link
Author

TPSJR:

The two logs attached caused the in progress speedtest result to drop to 0 and then recover for a second before the router automatically rebooted itself.

@openwrt-bot
Copy link
Author

rainer:

My EA8300 got stuck again several times after the upgrade to 19.07.2.

@openwrt-bot
Copy link
Author

mnlipp:

(It seems that you cannot directly get a link to a comment in this bug tracker.) I've just (look at the date) added a comment to https://bugs.openwrt.org/index.php?do=details&task_id=2591 which may have some relevance here as well.

@openwrt-bot
Copy link
Author

TPSJR:

This looks to have fixed this issue:
https://git.openwrt.org/?p=openwrt/openwrt.git;a=commitdiff;h=678569505623e50bbbbc344c7e820fb315b79ede

I have tested with SNAPSHOT r13684-3b0f698760 and no lock ups while using IPv6.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

1 participant