[FS#4141] Wifi unstable Kernel warning in mac80211/rate.c

OpenWrt Bugs openwrt-bugs at lists.openwrt.org
Thu Nov 18 10:30:36 PST 2021


THIS IS AN AUTOMATED MESSAGE, DO NOT REPLY.

A new Flyspray task has been opened.  Details are below. 

User who did this - Dean Bayliss (Dean0) 

Attached to Project - OpenWrt/LEDE Project
Summary - Wifi unstable Kernel warning in mac80211/rate.c
Task Type - Bug Report
Category - Kernel
Status - Unconfirmed
Assigned To - 
Operating System - All
Severity - Low
Priority - Very Low
Reported Version - openwrt-21.02
Due in Version - Undecided
Due Date - Undecided
Details - Wifi unstable Kernel warning in mac80211/rate.c

Is this related to https://patchwork.kernel.org/project/linux-wireless/patch/20180117101405.16700-1-nbd@nbd.name/

Name the tree/revision/version = 21.02.1 and 21.02.2
Name the affected device = WDR4900  4 units all the same
What does it do that it should not do / what does it not do that it should do  = Wifi becomes unstable fails and restarts with error shown
Steps to reproduce = leave it on for a couple of days
What you have already done to workaround/fix the problem = Revert to v19

------------[ cut here ]------------
[723741.978905] WARNING: CPU: 0 PID: 0 at backports-5.10.68-1/net/mac80211/rate.c:677 0xc9636ea0 [mac80211 at 880b69f1+0xa2660]
[723741.989848] Modules linked in: tun ath9k ath9k_common xt_connlimit pppoe ppp_async nf_conncount iptable_nat ath9k_hw ath xt_state xt_nat xt_helper xt_conntrack xt_connmark xt_connbytes xt_REDIRECT xt_MASQUERADE xt_FLOWOFFLOAD xt_CT wireguard pppox ppp_generic nf_nat nf_flow_table_hw nf_flow_table nf_conntrack_netlink nf_conntrack mac80211 libchacha20poly1305 libblake2s ipt_REJECT cfg80211 xt_time xt_tcpudp xt_tcpmss xt_statistic xt_recent xt_multiport xt_mark xt_mac xt_limit xt_length xt_hl xt_ecn xt_dscp xt_comment xt_TCPMSS xt_LOG xt_HL xt_DSCP xt_CLASSIFY slhc sch_cake nf_reject_ipv4 nf_log_ipv4 nf_defrag_ipv6 nf_defrag_ipv4 libpoly1305 libcurve25519_generic libchacha libblake2s_generic iptable_raw iptable_mangle iptable_filter ipt_ECN ip_tables crc_ccitt compat sch_tbf sch_ingress sch_htb sch_hfsc em_u32 cls_u32 cls_tcindex cls_route cls_matchall cls_fw cls_flow cls_basic act_skbedit act_mirred act_gact xt_set ip_set_list_set ip_set_hash_netportnet ip_set_hash_netport
[723741.989980]  ip_set_hash_netnet ip_set_hash_netiface ip_set_hash_net ip_set_hash_mac ip_set_hash_ipportnet ip_set_hash_ipportip ip_set_hash_ipport ip_set_hash_ipmark ip_set_hash_ip ip_set_bitmap_port ip_set_bitmap_ipmac ip_set_bitmap_ip ip_set nfnetlink nf_log_ipv6 nf_log_common ip6table_mangle ip6table_filter ip6_tables ip6t_REJECT x_tables nf_reject_ipv6 ifb ip6_udp_tunnel udp_tunnel kpp gpio_keys leds_gpio fsl_mph_dr_of ehci_platform ehci_fsl ehci_hcd button_hotplug input_core usbcore usb_common
[723742.120347] CPU: 0 PID: 0 Comm: swapper Not tainted 5.4.154 #0
[723742.126256] NIP:  c9636ea0 LR: c9594104 CTR: c006d108
[723742.131385] REGS: c7ff5ca8 TRAP: 0700   Not tainted  (5.4.154)
[723742.137292] MSR:  00029000   CR: 48048882  XER: 00000000
[723742.143555]
[723742.143555] GPR00: 00000000 c7ff5d60 c068ba40 00000100 ffffffff 000000c7 00000001 00000001
[723742.143555] GPR08: 0000000a c448ae58 000007c6 c47583e0 88044482 00000000 c068fcac c0690000
[723742.143555] GPR16: 00200002 00000000 c06b0000 c05b1b04 00000009 00000000 fffff000 00000001
[723742.143555] GPR24: c3914cf8 00000000 c4480130 c4a3b708 c3914cf8 00000004 c448ae58 c47583c0
[723742.178843] Call Trace:
[723742.181368] [c7ff5d60] [c7ff5d64] 0xc7ff5d64 (unreliable)
[723742.186847] [c7ff5dd0] [c95940c4] 0xc95940c4 [ath9k at 814d09d6+0x1f4f8]
[723742.193368] [c7ff5e10] [c958b980] 0xc958b980 [ath9k at 814d09d6+0x1f4f8]
[723742.199890] [c7ff5e50] [c96498fc] 0xc96498fc [mac80211 at 880b69f1+0xa2660]
[723742.206671] [c7ff5e90] [c9649ae0] 0xc9649ae0 [mac80211 at 880b69f1+0xa2660]
[723742.213453] [c7ff5eb0] [c96518e4] 0xc96518e4 [mac80211 at 880b69f1+0xa2660]
[723742.220235] [c7ff5f10] [c96535bc] 0xc96535bc [mac80211 at 880b69f1+0xa2660]
[723742.227013] [c7ff5f60] [c002e6e0] 0xc002e6e0
[723742.231361] [c7ff5f90] [c05a9d3c] 0xc05a9d3c
[723742.235709] [c7ff5ff0] [c000d294] 0xc000d294
[723742.240058] [c06afe88] [c00057b8] 0xc00057b8
[723742.244405] [c06afea8] [c000f4ac] 0xc000f4ac
[723742.248754] --- interrupt: 501 at 0xc00084e8
[723742.248754]     LR = 0xc00084e8
[723742.256312] [c06aff70] [c0054c00] 0xc0054c00 (unreliable)
[723742.261790] [c06aff80] [c0052c6c] 0xc0052c6c
[723742.266138] [c06affa0] [c0052de4] 0xc0052de4
[723742.270485] [c06affb0] [c0660ae4] 0xc0660ae4
[723742.274833] [c06afff0] [c000038c] 0xc000038c
[723742.279178] Instruction dump:
[723742.282227] 40820010 891f002d 71080040 40820054 7f9d3800 40bdfe44 39290003 4bfffde4
[723742.290061] 54c6073e 2b86000a 38c00001 7cc0371e  7f9d3800 40bdfe20 39290003
[723742.298068] ---[ end trace 2b9045ebeb5ab14c ]---



   

 

More information can be found at the following URL:
https://bugs.openwrt.org/index.php?do=details&task_id=4141

You are receiving this message because you have requested it from the Flyspray bugtracking system.  If you did not expect this message or don't want to receive mails in future, you can change your notification settings at the URL shown above.



More information about the openwrt-bugs mailing list