[FS#3436] Kernel OOPS with hw offload enable

OpenWrt Bugs openwrt-bugs at lists.openwrt.org
Sat Nov 7 10:23:12 EST 2020


THIS IS AN AUTOMATED MESSAGE, DO NOT REPLY.

A new Flyspray task has been opened.  Details are below. 

User who did this - Why? (gray-_-wolf) 

Attached to Project - OpenWrt/LEDE Project
Summary - Kernel OOPS with hw offload enable
Task Type - Bug Report
Category - Kernel
Status - Unconfirmed
Assigned To - 
Operating System - All
Severity - Medium
Priority - Very Low
Reported Version - openwrt-19.07
Due in Version - Undecided
Due Date - Undecided
Details - Supply the following if possible:
 - Device problem occurs on

Ubiquiti EdgeRouterX

 - Software versions of OpenWrt/LEDE release, packages, etc.

Linux OpenWrt 4.14.195 #0 SMP Sun Sep 6 16:19:39 2020 mips GNU/Linux

 - Steps to reproduce

I'm not doing anything specific. This reported instance happend over night when
I was sleeping. I do have the flow offload (the HW variant) enabled.

Here is output from logread:


Sat Nov  7 03:26:00 2020 [1604719560.750] kern.alert kernel: [30317.854831] CPU 3 Unable to handle kernel paging request at virtual address 002dd990, epc == 8ef60384, ra == 8ef603ac
Sat Nov  7 03:26:00 2020 [1604719560.750] kern.warn kernel: [30317.875985] Oops[#1]:
Sat Nov  7 03:26:00 2020 [1604719560.750] kern.warn kernel: [30317.880503] CPU: 3 PID: 25 Comm: kworker/3:0 Not tainted 4.14.195 #0
Sat Nov  7 03:26:00 2020 [1604719560.750] kern.warn kernel: [30317.893151] Workqueue: events_power_efficient 0x8ef27304 [xt_FLOWOFFLOAD at 8ef27000+0xc10]
Sat Nov  7 03:26:00 2020 [1604719560.750] kern.warn kernel: [30317.909245] task: 8fc7aca0 task.stack: 8fc96000
Sat Nov  7 03:26:00 2020 [1604719560.750] kern.warn kernel: [30317.918246] $ 0   : 00000000 00000001 002dd962 00000001
Sat Nov  7 03:26:00 2020 [1604719560.750] kern.warn kernel: [30317.928644] $ 4   : 002dd962 8fc97e4f 8fc97e4f ffff00fe
Sat Nov  7 03:26:00 2020 [1604719560.751] kern.warn kernel: [30317.939044] $ 8   : 8fc97fe0 00007c00 00001b92 00000001
Sat Nov  7 03:26:00 2020 [1604719560.751] kern.warn kernel: [30317.949443] $12   : 00000154 8f2e9c80 ffffffff 00001844
Sat Nov  7 03:26:00 2020 [1604719560.751] kern.warn kernel: [30317.959843] $16   : 8fc97e4f 8ef27000 00000000 fffffff5
Sat Nov  7 03:26:00 2020 [1604719560.751] kern.warn kernel: [30317.970243] $20   : 8056bba0 00000001 000000c0 fffffffe
Sat Nov  7 03:26:00 2020 [1604719560.751] kern.warn kernel: [30317.980643] $24   : 3b9aca00 80008e34
Sat Nov  7 03:26:00 2020 [1604719560.751] kern.warn kernel: [30317.991042] $28   : 8fc96000 8fc97df0 80550000 8ef603ac
Sat Nov  7 03:26:00 2020 [1604719560.751] kern.warn kernel: [30318.001441] Hi    : 0000000a
Sat Nov  7 03:26:00 2020 [1604719560.751] kern.warn kernel: [30318.007159] Lo    : 66666669
Sat Nov  7 03:26:00 2020 [1604719560.751] kern.warn kernel: [30318.012885] epc   : 8ef60384 0x8ef60384 [nf_flow_table at 8ef60000+0x3350]
Sat Nov  7 03:26:00 2020 [1604719560.751] kern.warn kernel: [30318.026051] ra    : 8ef603ac 0x8ef603ac [nf_flow_table at 8ef60000+0x3350]
Sat Nov  7 03:26:00 2020 [1604719560.752] kern.warn kernel: [30318.039203] Status: 11007c03     KERNEL EXL IE
Sat Nov  7 03:26:00 2020 [1604719560.752] kern.warn kernel: [30318.047529] Cause : 40800008 (ExcCode 02)
Sat Nov  7 03:26:00 2020 [1604719560.752] kern.warn kernel: [30318.055495] BadVA : 002dd990
Sat Nov  7 03:26:00 2020 [1604719560.752] kern.warn kernel: [30318.061211] PrId  : 0001992f (MIPS 1004Kc)
Sat Nov  7 03:26:00 2020 [1604719560.752] kern.warn kernel: [30318.069346] Modules linked in: pppoe ppp_async pppox ppp_generic nf_conntrack_ipv6 iptable_nat ipt_REJECT ipt_MASQUERADE xt_time xt_tcpudp xt_state xt_nat xt_multiport xt_mark xt_mac xt_limit xt_conntrack xt_comment xt_TCPMSS xt_REDIRECT xt_LOG xt_FLOWOFFLOAD xt_CT slhc nf_reject_ipv4 nf_nat_redirect nf_nat_masquerade_ipv4 nf_conntrack_ipv4 nf_nat_ipv4 nf_nat nf_log_ipv4 nf_flow_table_hw nf_flow_table nf_defrag_ipv6 nf_defrag_ipv4 nf_conntrack_rtcache nf_conntrack iptable_mangle iptable_filter ip_tables crc_ccitt nf_log_ipv6 nf_log_common ip6table_mangle ip6table_filter ip6_tables ip6t_REJECT x_tables nf_reject_ipv6 leds_gpio gpio_button_hotplug
client_loop: send disconnect: Broken pipe


More information can be found at the following URL:
https://bugs.openwrt.org/index.php?do=details&task_id=3436

You are receiving this message because you have requested it from the Flyspray bugtracking system.  If you did not expect this message or don't want to receive mails in future, you can change your notification settings at the URL shown above.



More information about the openwrt-bugs mailing list