Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

FS#3538 - ramips-mt7621: CPU 3 Unable to handle kernel paging request at virtual address #8566

Closed
openwrt-bot opened this issue Dec 26, 2020 · 11 comments
Labels
flyspray kernel pull request/issue with Linux kernel related changes release/19.07 pull request/issue targeted (also) for OpenWrt 19.07 release

Comments

@openwrt-bot
Copy link

dfberger:

Model: UBNT-ERX
Architecture: MediaTek MT7621 ver:1 eco:3
Firmware Version: OpenWrt 19.07.5 r11257-5090152ae3 / LuCI openwrt-19.07 branch git-20.341.57626-51f55b5
Kernel Version: 4.14.209

# cat /sys/kernel/debug/crashlog Time: 1609020971.160675 Modules: pppoe@8eb00000+2400 ppp_async@8ea24000+1b90 pppox@8e99d000+4b0 ppp_generic@8eb18000+5970 nf_nat_pptp@8f060000+700 nf_conntrack_pptp@8f0d7000+ef0 nf_conntrack_ipv6@8eae8000+1590 iptable_nat@8e91e000+2c0 ipt_REJECT@8e83f000+3c0 ipt_MASQUERADE@8e80c000+2a0 xt_time@8f1b2000+6e0 xt_tcpudp@8f1b0000+700 xt_tcpmss@8f1ba000+420 xt_statistic@8ea1e000+340 xt_state@8e8c6000+2c0 xt_recent@8eb10000+1bf0 xt_nat@8e8c4000+600 xt_multiport@8e8ff000+500 xt_mark@8e8fd000+2a0 xt_mac@8e8d2000+260 xt_limit@8e8db000+4a0 xt_length@8e8d9000+2c0 xt_hl@8e8ce000+320 xt_helper@8eb38000+360 xt_ecn@8eb3a000+540 xt_dscp@8eb3e000+3e0 xt_conntrack@8e8f7000+900 xt_connmark@8e836000+4e0 xt_connlimit@8e8c2000+1510 xt_connbytes@8eafa000+640 xt_comment@8e8e2000+1e0 xt_TCPMSS@8e8e1000+ae0 xt_REDIRECT@8e8e5000+2c0 xt_LOG@8e8ea000+300 xt_HL@8ea57000+540 xt_FLOWOFFLOAD@8e8e9000+c10 xt_DSCP@8e8ec000+5e0 xt_CT@8e8ee000+a60 xt_CLASSIFY@8e8f2000+240 wireguard@8eb20000+166c0 ts_fsm@8e837000+ac0 ts_bm@8eaf6000+580 slhc@8e8c8000+1400 nf_reject_ipv4@8e907000+840 nf_nat_tftp@8f1e5000+220 nf_nat_snmp_basic@8e806000+18d0 nf_nat_sip@8e8ae000+1ee0 nf_nat_redirect@8f1de000+580 nf_nat_proto_gre@8e835000+370 nf_nat_masquerade_ipv4@8e8a0000+650 nf_nat_irc@8f1da000+400 nf_conntrack_ipv4@8e8c0000+1420 nf_nat_ipv4@8ea54000+f30 nf_nat_h323@8ea6a000+1520 nf_nat_amanda@8ea16000+300 nf_nat@8e8a8000+37b0 nf_log_ipv4@8f1e1000+d60 nf_flow_table_hw@8ea9f000+8f0 nf_flow_table@8eaac000+3370 nf_defrag_ipv6@8f1e6000+12e0 nf_defrag_ipv4@8f1bc000+440 nf_conntrack_tftp@8e9fa000+ae0 nf_conntrack_snmp@8ea47000+2f0 nf_conntrack_sip@8e890000+48c0 nf_conntrack_rtcache@8f1ff000+aa0 nf_conntrack_proto_gre@8e803000+a60 nf_conntrack_netlink@8e838000+5a70 nf_conntrack_irc@8e935000+b60 nf_conntrack_h323@8e860000+8a20 nf_conntrack_broadcast@8f1c7000+360 ts_kmp@8eadf000+520 nf_conntrack_amanda@8eaab000+6c0 iptable_raw@8ea66000+260 iptable_mangle@8ea17000+380 iptable_filter@8ea50000+280 ipt_ECN@8f1c4000+580 ip_tables@8e914000+2b30 crc_ccitt@8e80d000+3e0 br_netfilter@8f1f4000+30f0 sch_cake@8ea90000+74d0 act_connmark@8eae7000+830 nf_conntrack@8e840000+10770 sch_tbf@8e826000+1700 sch_ingress@8f1c6000+4c0 sch_htb@8e820000+36d0 sch_hfsc@8e808000+3a00 em_u32@8ea8e000+220 cls_u32@8e800000+22d0 cls_tcindex@8eafc000+1500 cls_route@8eaf4000+1470 cls_matchall@8f1b8000+9e0 cls_fw@8ea51000+f20 cls_flow@8e91a000+1680 cls_basic@8ea4e000+c40 act_skbedit@8ea45000+9f0 act_mirred@8ea46000+f50 xt_set@8eaea000+1b20 ip_set_list_set@8ead6000+1c60 ip_set_hash_netportnet@8eae0000+6c60 ip_set_hash_netport@8ead8000+61e0 ip_set_hash_netnet@8eac8000+6780 ip_set_hash_netiface@8eac0000+62c0 ip_set_hash_net@8eab8000+5c00 ip_set_hash_mac@8eaa8000+2920 ip_set_hash_ipportnet@8eaa0000+6740 ip_set_hash_ipportip@8ea98000+54a0 ip_set_hash_ipport@8ea88000+5140 ip_set_hash_ipmark@8ea80000+4e60 ip_set_hash_ip@8ea78000+4d80 ip_set_bitmap_port@8ea70000+1800 ip_set_bitmap_ipmac@8ea6c000+1ba0 ip_set_bitmap_ip@8ea68000+1b00 ip_set@8ea60000+5690 nfnetlink@8ea52000+1110 nf_log_ipv6@8f1fa000+1020 nf_log_common@8f44b000+aa0 ip6table_mangle@8f06e000+4a0 ip6table_filter@8e99b000+280 ip6_tables@8f1ec000+2a20 ip6t_REJECT@8f7d7000+400 x_tables@8f1e8000+3290 nf_reject_ipv6@8ea22000+9e0 ifb@8f0d2000+ce0ip6_udp_tunnel@8f077000+640 udp_tunnel@8f44e000+980 sit@8f1b4000+37a0 tunnel4@8f1a5000+820 ip_tunnel@8e910000+2c20 usb_storage@8f0e0000+a000 leds_gpio@8f7ce000+b60 sd_mod@8f038000+7430 scsi_mod@8f040000+15770 gpio_button_hotplug@8f7d8000+1ac0 f2fs@8f080000+41fd0 ext4@8f100000+5ebc0 mbcache@8f7d6000+e10 jbd2@8f020000+d4f0 usbcore@8f000000+1fe90 nls_base@8f454000+1430 usb_common@8f7b7000+8c0 crc32c_generic@8f7b4000+560 crc32_generic@8f7b1000+560 <5>[ 1.790896] 0x0000000e0000-0x000000140000 : "factory" <5>[ 1.801981] 0x000000140000-0x000000440000 : "kernel1" <5>[ 1.813075] 0x000000440000-0x000000740000 : "kernel2" <5>[ 1.824242] 0x000000740000-0x00000ff00000 : "ubi" <4>[ 1.836547] [mtk_nand] probe successfully! <4>[ 1.845433] Signature matched and data read! <4>[ 1.853936] load_fact_bbt success 2047 <6>[ 1.862079] libphy: Fixed MDIO Bus: probed <6>[ 1.942611] libphy: mdio: probed <6>[ 3.348616] mtk_soc_eth 1e100000.ethernet: loaded mt7530 driver <6>[ 3.361135] mtk_soc_eth 1e100000.ethernet eth0: mediatek frame engine at 0xbe100000, irq 20 <6>[ 3.380543] NET: Registered protocol family 10 <6>[ 3.390986] Segment Routing with IPv6 <6>[ 3.398358] NET: Registered protocol family 17 <6>[ 3.407323] bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. <6>[ 3.433121] 8021q: 802.1Q VLAN Support v1.8 <5>[ 3.444288] UBI: auto-attach mtd5 <5>[ 3.450971] ubi0: attaching mtd5 <6>[ 4.898762] mtk_soc_eth 1e100000.ethernet eth0: port 0 link up <6>[ 5.054752] mtk_soc_eth 1e100000.ethernet eth0: port 1 link up <5>[ 5.749269] ubi0: scanning is finished <5>[ 5.774006] ubi0: attached mtd5 (name "ubi", size 247 MiB) <5>[ 5.784953] ubi0: PEB size: 131072 bytes (128 KiB), LEB size: 126976 bytes <5>[ 5.798632] ubi0: min./max. I/O unit sizes: 2048/2048, sub-page size 2048 <5>[ 5.812143] ubi0: VID header offset: 2048 (aligned 2048), data offset: 4096 <5>[ 5.825995] ubi0: good PEBs: 1982, bad PEBs: 0, corrupted PEBs: 0 <5>[ 5.838118] ubi0: user volume: 2, internal volumes: 1, max. volumes count: 128 <5>[ 5.852495] ubi0: max/mean erase counter: 2/0, WL threshold: 4096, image sequence number: 1550099540 <5>[ 5.870672] ubi0: available PEBs: 0, total reserved PEBs: 1982, PEBs reserved for bad PEB handling: 40 <5>[ 5.889214] ubi0: background thread "ubi_bgt0d" started, PID 366 <6>[ 5.891153] block ubiblock0_0: created from ubi0:0(rootfs) <5>[ 5.912133] ubiblock: device ubiblock0_0 (rootfs) set to be root filesystem <6>[ 5.925999] hctosys: unable to open rtc device (rtc0) <6>[ 5.943697] VFS: Mounted root (squashfs filesystem) readonly on device 254:0. <6>[ 5.962156] Freeing unused kernel memory: 1252K <4>[ 5.971197] This architecture does not have kernel memory protection. <14>[ 6.464290] init: Console is alive <14>[ 6.471334] init: - watchdog - <14>[ 7.326596] kmodloader: loading kernel modules from /etc/modules-boot.d/* <6>[ 7.437188] usbcore: registered new interface driver usbfs <6>[ 7.448229] usbcore: registered new interface driver hub <6>[ 7.458977] usbcore: registered new device driver usb <5>[ 7.507708] SCSI subsystem initialized <6>[ 7.520990] usbcore: registered new interface driver usb-storage <14>[ 7.533334] kmodloader: done loading kernel modules from /etc/modules-boot.d/* <14>[ 7.550506] init: - preinit - <6>[ 8.519957] mtk_soc_eth 1e100000.ethernet: PPE started <14>[ 11.735899] mount_root: loading kmods from internal overlay <14>[ 11.778945] kmodloader: loading kernel modules from //etc/modules-boot.d/* <14>[ 11.796110] kmodloader: done loading kernel modules from //etc/modules-boot.d/* <5>[ 12.156598] UBIFS (ubi0:1): background thread "ubifs_bgt0_1" started, PID 470 <5>[ 12.216428] random: procd: uninitialized urandom read (4 bytes read) <5>[ 12.230605] UBIFS (ubi0:1): recovery needed <5>[ 12.424552] UBIFS (ubi0:1): recovery completed <5>[ 12.433524] UBIFS (ubi0:1): UBIFS: mounted UBI device 0, volume 1, name "rootfs_data" <5>[ 12.449109] UBIFS (ubi0:1): LEB size: 126976 bytes (124 KiB), min./max. I/O unit sizes: 2048 bytes/2048 bytes <5>[ 12.468847] UBIFS (ubi0:1): FS size: 227160064 bytes (216 MiB, 1789 LEBs), journal size 11427840 bytes (10 MiB, 90 LEBs) <5>[ 12.490482] UBIFS (ubi0:1): reserved for root: 4952683 bytes (4836 KiB) <5>[ 12.503647] UBIFS (ubi0:1): media format: w4/r0 (latest is w5/r0), UUID 1F66C89D-FDD6-4471-A309-2A1153E8A4C8, small LPT model <14>[ 12.527623] block: attempting to load /tmp/ubifs_cfg/upper/etc/config/fstab <14>[ 12.551419] block: extroot: not configured <5>[ 12.590271] UBIFS (ubi0:1): un-mount UBI device 0 <5>[ 12.599647] UBIFS (ubi0:1): background thread "ubifs_bgt0_1" stops <5>[ 12.617946] UBIFS (ubi0:1): background thread "ubifs_bgt0_1" started, PID 473 <5>[ 12.765184] UBIFS (ubi0:1): UBIFS: mounted UBI device 0, volume 1, name "rootfs_data" <5>[ 12.780794] UBIFS (ubi0:1): LEB size: 126976 bytes (124 KiB), min./max. I/O unit sizes: 2048 bytes/2048 bytes <5>[ 12.800531] UBIFS (ubi0:1): FS size: 227160064 bytes (216 MiB, 1789 LEBs), journal size 11427840 bytes (10 MiB, 90 LEBs) <5>[ 12.822167] UBIFS (ubi0:1): reserved for root: 4952683 bytes (4836 KiB) <5>[ 12.835332] UBIFS (ubi0:1): media format: w4/r0 (latest is w5/r0), UUID 1F66C89D-FDD6-4471-A309-2A1153E8A4C8, small LPT model <14>[ 13.105964] block: attempting to load /tmp/ubifs_cfg/upper/etc/config/fstab <14>[ 13.128693] block: extroot: not configured <14>[ 13.193397] mount_root: switching to ubifs overlay <12>[ 13.246045] urandom-seed: Seeding with /etc/urandom.seed <6>[ 13.353193] mtk_soc_eth 1e100000.ethernet: 0x100 = 0x6060000c, 0x10c = 0x80818 <14>[ 13.375239] procd: - early - <14>[ 13.381113] procd: - watchdog - <14>[ 14.030208] procd: - watchdog - <14>[ 14.036773] procd: - ubus - <5>[ 14.124886] random: ubusd: uninitialized urandom read (4 bytes read) <5>[ 14.141149] random: ubusd: uninitialized urandom read (4 bytes read) <5>[ 14.154270] random: ubusd: uninitialized urandom read (4 bytes read) <14>[ 14.167802] procd: - init - <14>[ 15.243934] kmodloader: loading kernel modules from /etc/modules.d/* <6>[ 15.266742] sit: IPv6, IPv4 and MPLS over IPv4 tunneling driver <14>[ 15.377103] urngd: v1.0.2 started. <6>[ 15.378128] ip6_tables: (C) 2000-2006 Netfilter Core Team <6>[ 15.402802] Netfilter messages via NETLINK v0.30. <6>[ 15.414998] ip_set: protocol 6 <6>[ 15.453488] Mirror/redirect action on <6>[ 15.473202] u32 classifier <6>[ 15.478646] input device check on <6>[ 15.486012] Actions configured <6>[ 15.511782] nf_conntrack version 0.5.0 (4096 buckets, 16384 max) <5>[ 15.538082] Bridge firewalling registered <6>[ 15.550673] ip_tables: (C) 2000-2006 Netfilter Core Team <6>[ 15.615026] ctnetlink v0.93: registering with nfnetlink. <5>[ 15.621042] random: crng init done <5>[ 15.632549] random: 6 urandom warning(s) missed due to ratelimiting <6>[ 15.744028] wireguard: WireGuard 1.0.20200611 loaded. See www.wireguard.com for information. <6>[ 15.761011] wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. <6>[ 15.834038] xt_time: kernel timezone is -0000 <6>[ 15.858288] PPP generic driver version 2.4.2 <6>[ 15.869391] NET: Registered protocol family 24 <14>[ 15.882534] kmodloader: done loading kernel modules from /etc/modules.d/* <6>[ 22.699616] mtk_soc_eth 1e100000.ethernet: PPE started <6>[ 22.718875] br-lan: port 1(eth0.1) entered blocking state <6>[ 22.730002] br-lan: port 1(eth0.1) entered disabled state <6>[ 22.741541] device eth0.1 entered promiscuous mode <6>[ 22.751223] device eth0 entered promiscuous mode <6>[ 22.764586] br-lan: port 1(eth0.1) entered blocking state <6>[ 22.775424] br-lan: port 1(eth0.1) entered forwarding state <6>[ 22.787226] IPv6: ADDRCONF(NETDEV_UP): br-lan: link is not ready <6>[ 23.710555] IPv6: ADDRCONF(NETDEV_CHANGE): br-lan: link becomes ready <6>[ 717.323641] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. <1>[64037.837093] CPU 3 Unable to handle kernel paging request at virtual address 017f4eec, epc == 8006bf1c, ra == 8006be90 <4>[64037.858236] Oops[#1]: <4>[64037.862751] CPU: 3 PID: 0 Comm: swapper/3 Not tainted 4.14.209 #0 <4>[64037.874865] task: 8fc3cc80 task.stack: 8fc68000 <4>[64037.883863] $ 0 : 00000000 00000001 0000000c 81249bc0 <4>[64037.894263] $ 4 : 00000002 00100000 00614c15 00614c15 <4>[64037.904664] $ 8 : 0000ffff ffff0000 00000002 8de4b080 <4>[64037.915076] $12 : 8febb900 8febb944 804d06fc 00000001 <4>[64037.925483] $16 : 8fd7ce7c 81240320 8054c1e8 00100000 <4>[64037.935880] $20 : 017f4eec 8fd7cc3c 0000001f 8df75f00 <4>[64037.946274] $24 : 6bbf3ed6 00000000 <4>[64037.956675] $28 : 8fc68000 8fc0fc10 8fc0fca4 8006be90 <4>[64037.967094] Hi : 00000000 <4>[64037.972813] Lo : 00000000 <4>[64037.978530] epc : 8006bf1c 0x8006bf1c <4>[64037.986146] ra : 8006be90 0x8006be90 <4>[64037.993761] Status: 11007c03 KERNEL EXL IE <4>[64038.002081] Cause : c080000c (ExcCode 03) <4>[64038.010041] BadVA : 017f4eec <4>[64038.015756] PrId : 0001992f (MIPS 1004Kc) <4>[64038.023890] Modules linked in: pppoe ppp_async pppox ppp_generic nf_nat_pptp nf_conntrack_pptp nf_conntrack_ipv6 iptable_nat ipt_REJECT ipt_MASQUERADE xt_time xt_tcpudp xt_tcpmss xt_statistic xt_state xt_recent xt_nat xt_multiport xt_mark xt_mac xt_limit xt_length xt_hl xt_helper xt_ecn xt_dscp xt_conntrack xt_connmark xt_connlimit xt_connbytes xt_comment xt_TCPMSS xt_REDIRECT xt_LOG xt_HL xt_FLOWOFFLOAD xt_DSCP xt_CT xt_CLASSIFY wireguard ts_fsm ts_bm slhc nf_reject_ipv4 nf_nat_tftp nf_nat_snmp_basic nf_nat_sip nf_nat_redirect nf_nat_proto_gre nf_nat_masquerade_ipv4 nf_nat_irc nf_conntrack_ipv4 nf_nat_ipv4 nf_nat_h323 nf_nat_amanda nf_nat nf_log_ipv4 nf_flow_table_hw nf_flow_table nf_defrag_ipv6 nf_defrag_ipv4 nf_conntrack_tftp nf_conntrack_snmp nf_conntrack_sip nf_conntrack_rtcache nf_conntrack_proto_gre <4>[64038.166184] nf_conntrack_netlink nf_conntrack_irc nf_conntrack_h323 nf_conntrack_broadcast ts_kmp nf_conntrack_amanda iptable_raw iptable_mangle iptable_filter ipt_ECN ip_tables crc_ccitt br_netfilter sch_cake act_connmark nf_conntrack sch_tbf sch_ingress sch_htb sch_hfsc em_u32 cls_u32 cls_tcindex cls_route cls_matchall cls_fw cls_flow cls_basic act_skbedit act_mirred xt_set ip_set_list_set ip_set_hash_netportnet ip_set_hash_netport ip_set_hash_netnet ip_set_hash_netiface ip_set_hash_net ip_set_hash_mac ip_set_hash_ipportnet ip_set_hash_ipportip ip_set_hash_ipport ip_set_hash_ipmark ip_set_hash_ip ip_set_bitmap_port ip_set_bitmap_ipmac ip_set_bitmap_ip ip_set nfnetlink nf_log_ipv6 nf_log_common ip6table_mangle ip6table_filter ip6_tables ip6t_REJECT x_tables nf_reject_ipv6 ifb ip6_udp_tunnel udp_tunnel <4>[64038.307953] sit tunnel4 ip_tunnel usb_storage leds_gpio sd_mod scsi_mod gpio_button_hotplug f2fs ext4 mbcache jbd2 usbcore nls_base usb_common crc32c_generic crc32_generic <4>[64038.338634] Process swapper/3 (pid: 0, threadinfo=8fc68000, task=8fc3cc80, tls=00000000) <4>[64038.354718] Stack : 00000000 00000000 8ecdbd20 8fd7cc00 8fc0fc84 8fd7cc00 8e8e9b78 8fd7cc00 <4>[64038.371349] 8e8e9b80 8f30dc00 8fd7ce7c 8eaada6c 00000000 00000000 00000000 00000002 <4>[64038.387975] 8fc0fd48 8ecdbd20 8fc0fca0 8df815d0 8dd51ca4 8ecdbd90 8fd7cc00 8e8e9870 <4>[64038.404604] 00000001 00000000 8fc0fca0 8eb94600 00000000 8df75f00 8ebbdd00 803f1870 <4>[64038.421231] 00000100 00000002 00000001 8eb94600 8df81358 8df815b0 8ddb2800 8df80000 <4>[64038.437862] ... <4>[64038.442722] Call Trace: <4>[64038.442818] [<8eaada6c>] 0x8eaada6c [nf_flow_table@8eaac000+0x3370] <4>[64038.460142] [<8e8e9870>] 0x8e8e9870 [xt_FLOWOFFLOAD@8e8e9000+0xc10] <4>[64038.472616] [<803f1870>] 0x803f1870 <4>[64038.479573] [<8e91561c>] 0x8e91561c [ip_tables@8e914000+0x2b30] <4>[64038.491353] [<80364514>] 0x80364514 <4>[64038.498332] [<8e910000>] 0x8e910000 [ip_tunnel@8e910000+0x2c20] <4>[64038.510136] [<8e8403f0>] 0x8e8403f0 [nf_conntrack@8e840000+0x10770] <4>[64038.522619] [<803a0a78>] 0x803a0a78 <4>[64038.529574] [<803aa688>] 0x803aa688 <4>[64038.536531] [<803aa220>] 0x803aa220 <4>[64038.543468] [<803a94d8>] 0x803a94d8 <4>[64038.550395] [<803a8a40>] 0x803a8a40 <4>[64038.557330] [<8036270c>] 0x8036270c <4>[64038.564265] [<80011860>] 0x80011860 <4>[64038.571196] [<803629e8>] 0x803629e8 <4>[64038.578149] [<803652b0>] 0x803652b0 <4>[64038.585076] [<80078510>] 0x80078510 <4>[64038.592014] [<804a4898>] 0x804a4898 <4>[64038.598945] [<80033164>] 0x80033164 <4>[64038.605871] [<8025b4c0>] 0x8025b4c0 <4>[64038.612816] [<80007488>] 0x80007488 <4>[64038.619744] <4>[64038.622691] Code: 0282a021 0283a021 0000000f <10000001> ae910000 8e220004 0000000f 1040fffd 00000000 <4>[64038.642098] <4>[64038.645454] ---[ end trace 1f417dae2c6e7324 ]---
@openwrt-bot
Copy link
Author

HanabishiRecca:

This is caused by hardware flow offloading. The only workaround for now is just to disable it.

@openwrt-bot
Copy link
Author

kevin-david:

I've hit this a few times - seems to happen every few days. I do have hardware NAT/offloading enabled to support my gigabit connection. Router model is RB750Gr3. Crash log attached.

@openwrt-bot
Copy link
Author

thiagoricciardi:

I can confirm that this bug also happens to both MikroTik RB750Gr3, firmware version OpenWrt 19.07.7 r11306-c4a6851c72 and firmware version OpenWrt 19.07.8 r11364-ef56c85848.
Crash logs attached.
Disabling HW flow offloading would degrade the internet performance, since both devices have 300 mbps internet and, the last time I checked, the SW could not handle that speed.
Is there any other solution? This problem didn't seem to happen on earlier versions of 19.07, but I cannot track which one has broke it now, if this information is relevant maybe later I can do this (please let me know).

Thanks and best regards!

@aparcar aparcar added release/19.07 pull request/issue targeted (also) for OpenWrt 19.07 release kernel pull request/issue with Linux kernel related changes labels Feb 22, 2022
@ynezz
Copy link
Member

ynezz commented May 23, 2022

Try to reproduce it with latest 22.03-rc2 or development snapshot and report back, we can re-open the ticket.

@ynezz ynezz closed this as completed May 23, 2022
@RydjGit
Copy link

RydjGit commented Oct 14, 2023

I have the same issue on

OpenWrt 23.05.0-rc4 r23482-7fe85ce1f2 / LuCI openwrt-23.05 branch git-23.236.53405-fc638c8

Sat Oct 14 22:32:37 2023 kern.alert kernel: [ 342.143356] CPU 2 Unable to handl e kernel paging request at virtual address 6009ec94, epc == 8016dad0, ra == 8016 d99c

@azmras
Copy link

azmras commented Nov 28, 2023

I encountered this issue on both 23.05.0 and 23.05.2 when I tried to do some IO operation on external disk. and soon after that, a hard reboot occurs.

Target Platform	ramips/mt7621
Firmware Version	OpenWrt 23.05.2 r23630-842932a63d / LuCI openwrt-23.05 branch git-23.306.39416-c86c256
Kernel Version	5.15.137
Tue Nov 28 10:30:21 2023 kern.alert kernel: [  632.608660] 
CPU 0 Unable to handle kernel paging request at virtual address 00000000, epc == 8016cc5c, ra == 8016f51c

@ashleyghooper
Copy link

I have the same issue on

OpenWrt 23.05.0-rc4 r23482-7fe85ce1f2 / LuCI openwrt-23.05 branch git-23.236.53405-fc638c8

Sat Oct 14 22:32:37 2023 kern.alert kernel: [ 342.143356] CPU 2 Unable to handl e kernel paging request at virtual address 6009ec94, epc == 8016dad0, ra == 8016 d99c

@RydjGit, I'm on the same version (rc4) and seeing the same issue (D-Link DIR-3060 A1). Have you tried updating to any of the subsequent updates to OpenWrt 23.05?

@RydjGit
Copy link

RydjGit commented Jan 22, 2024

I have the same issue on
OpenWrt 23.05.0-rc4 r23482-7fe85ce1f2 / LuCI openwrt-23.05 branch git-23.236.53405-fc638c8
Sat Oct 14 22:32:37 2023 kern.alert kernel: [ 342.143356] CPU 2 Unable to handl e kernel paging request at virtual address 6009ec94, epc == 8016dad0, ra == 8016 d99c

@RydjGit, I'm on the same version (rc4) and seeing the same issue (D-Link DIR-3060 A1). Have you tried updating to any of the subsequent updates to OpenWrt 23.05?

Yes I did and it is still present, sorry for very late reply.

@maximst
Copy link

maximst commented Mar 25, 2024

I encountered this issue on both 23.05.0 and 23.05.2 when I tried to do some IO operation on external disk. and soon after that, a hard reboot occurs.

Target Platform	ramips/mt7621
Firmware Version	OpenWrt 23.05.2 r23630-842932a63d / LuCI openwrt-23.05 branch git-23.306.39416-c86c256
Kernel Version	5.15.137
Tue Nov 28 10:30:21 2023 kern.alert kernel: [  632.608660] 
CPU 0 Unable to handle kernel paging request at virtual address 00000000, epc == 8016cc5c, ra == 8016f51c

I have the same problem on the latest stable version of OpenWRT and the Newifi D2(MT7621) router

OpenWrt 23.05.2, r23630-842932a63d

CPU 0 Unable to handle kernel paging request at virtual address 601127f8, epc == 8016dbd4, ra == 8016daa0

@RydjGit
Copy link

RydjGit commented Mar 25, 2024

@maximst I migrated to OPENWRT SNAPSHOT and all kernel panics have stoped, I think there is an issue with kernel 5.x regarding I/O operations , the latest SNAPSHOT is built on kernel 6.1 and it is stable for I/O.

@maximst
Copy link

maximst commented Mar 26, 2024

@RydjGit, thanks a lot! I also found your issue #14846 and although I have a different chip (VL711), I hope that the new kernel will help me.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
flyspray kernel pull request/issue with Linux kernel related changes release/19.07 pull request/issue targeted (also) for OpenWrt 19.07 release
Projects
None yet
Development

No branches or pull requests

7 participants