[FS#3409] can not connect to wifi after "WARNING" in klog

OpenWrt Bugs openwrt-bugs at lists.openwrt.org
Mon Oct 26 10:13:42 EDT 2020


THIS IS AN AUTOMATED MESSAGE, DO NOT REPLY.

A new Flyspray task has been opened.  Details are below. 

User who did this - Bastian Bittorf (bittorf) 

Attached to Project - OpenWrt/LEDE Project
Summary - can not connect to wifi after "WARNING" in klog
Task Type - Bug Report
Category - Base system
Status - Unconfirmed
Assigned To - 
Operating System - All
Severity - Low
Priority - Very Low
Reported Version - Trunk
Due in Version - Undecided
Due Date - Undecided
Details - On "TP-LINK TL-WDR4900 v1" with trunk r14723, i could
not connect to wifi anymore. I found this message in klog.
Executing 'wifi' fixed it.
I'am not 100% sure if this 'WARNING' is the root cause.

----

 3138.668410] ------------[ cut here ]------------
[ 3138.673122] WARNING: CPU: 0 PID: 9094 at backports-5.8-1/net/mac80211/ibss.c:1087 ieee80211_he_spr_ie_to_bss_conf+0x20c0/0x2168 [mac80211]
[ 3138.685541] Modules linked in: ath9k ath9k_common xt_connlimit nf_conncount iptable_nat ath9k_hw ath xt_state xt_nat xt_helper xt_conntrack xt_connmark xt_connbytes xt_REDIRECT xt_NETMAP xt_MASQUERADE xt_FLOWOFFLOAD xt_CT nf_nat nf_flow_table_hw nf_flow_table nf_conntrack_rtcache nf_conntrack mac80211 ipt_REJECT cfg80211 xt_time xt_tcpudp xt_tcpmss xt_statistic xt_recent xt_multiport xt_mark xt_mac xt_limit xt_length xt_hl xt_ecn xt_dscp xt_comment xt_TCPMSS xt_LOG xt_HL xt_DSCP xt_CLASSIFY ums_usbat ums_sddr55 ums_sddr09 ums_karma ums_jumpshot ums_isd200 ums_freecom ums_datafab ums_cypress ums_alauda nf_reject_ipv4 nf_log_ipv4 nf_defrag_ipv6 nf_defrag_ipv4 macvlan iptable_raw iptable_mangle iptable_filter ipt_ECN ip_tables compat sch_sfq sch_red sch_prio sch_pie sch_multiq sch_gred sch_fq sch_dsmark sch_codel em_text em_nbyte em_meta em_cmp act_simple act_police act_pedit act_ipt act_gact act_csum libcrc32c sch_tbf sch_ingress sch_htb sch_hfsc em_u32 cls_u32 cls_tcindex cls_route
[ 3138.685685]  cls_matchall cls_fw cls_flow cls_basic act_skbedit act_mirred nf_log_ipv6 nf_log_common ip6table_mangle ip6table_filter ip6_tables ip6t_REJECT x_tables nf_reject_ipv6 nls_utf8 zram zsmalloc usb_storage gpio_keys leds_gpio fsl_mph_dr_of ehci_platform ehci_fsl scsi_mod ehci_hcd mbcache button_hotplug input_core usbcore usb_common crc32c_generic [last unloaded: sd_mod]
[ 3138.806062] CPU: 0 PID: 9094 Comm: kworker/u2:0 Not tainted 5.4.71 #0
[ 3138.812521] Workqueue: phy1 ieee80211_ibss_leave [mac80211]
[ 3138.818085] NIP:  c97538cc LR: c9753684 CTR: 00000000
[ 3138.823127] REGS: c79f7ac0 TRAP: 0700   Not tainted  (5.4.71)
[ 3138.828862] MSR:  00029000   CR: 22002422  XER: 00000000
[ 3138.835038]
[ 3138.835038] GPR00: c9753540 c79f7b78 c791d4a0 00000000 c79f7bb0 00000000 00000001 00000000
[ 3138.835038] GPR08: c49a2d28 c49a2cf0 00000000 c41e4a8c c0016400 00000000 c004844c c4be3160
[ 3138.835038] GPR16: 00000000 00000000 00000fff 00000000 c4b0e130 c4341000 c4150c00 00000000
[ 3138.835038] GPR24: 00000000 c42a7080 c49a2d28 c4150c00 c4f3d3d8 00000087 c42a7070 c41e4460
[ 3138.869913] NIP [c97538cc] ieee80211_he_spr_ie_to_bss_conf+0x20c0/0x2168 [mac80211]
[ 3138.877576] LR [c9753684] ieee80211_he_spr_ie_to_bss_conf+0x1e78/0x2168 [mac80211]
[ 3138.885133] Call Trace:
[ 3138.887589] [c79f7b78] [c9753540] ieee80211_he_spr_ie_to_bss_conf+0x1d34/0x2168 [mac80211] (unreliable)
[ 3138.896990] [c79f7d08] [c9753e10] ieee80211_ibss_rx_queued_mgmt+0xcc/0x3dc [mac80211]
[ 3138.904828] [c79f7e28] [c9755aa8] ieee80211_ibss_leave+0xdbc/0x1c64 [mac80211]
[ 3138.912053] [c79f7e78] [c0042084] process_one_work+0x290/0x3dc
[ 3138.917879] [c79f7ea8] [c0042b20] worker_thread+0x88/0x4c8
[ 3138.923360] [c79f7ef8] [c004858c] kthread+0x140/0x144
[ 3138.928408] [c79f7f38] [c000f26c] ret_from_kernel_thread+0x14/0x1c
[ 3138.934577] Instruction dump:
[ 3138.937538] 39200001 7ea3ab78 993506f0 4801f779 4bfffb58 0fe00000 38bd0004 7f84e378
[ 3138.945282] 38c00018 7f63db78 4802bf65 4bffff78  8261015c 4bfffdbc 7f8b2040
[ 3138.953202] ---[ end trace 7041a104a2b1da00 ]---



More information can be found at the following URL:
https://bugs.openwrt.org/index.php?do=details&task_id=3409

You are receiving this message because you have requested it from the Flyspray bugtracking system.  If you did not expect this message or don't want to receive mails in future, you can change your notification settings at the URL shown above.



More information about the openwrt-bugs mailing list