[FS#4054] ath10k kernel error out of the blue on WiFi dump AP running with 802.11s mesh backhaul

OpenWrt Bugs openwrt-bugs at lists.openwrt.org
Tue Jan 25 08:11:36 PST 2022


THIS IS AN AUTOMATED MESSAGE, DO NOT REPLY.

The following task has a new comment added:

FS#4054 - ath10k kernel error out of the blue on WiFi dump AP running with 802.11s mesh backhaul
User who did this - benpicco (benpicco)

----------
I see the same issue on Archer C5v1 with OpenWrt 21.02.1

```
[726210.713445] ------------[ cut here ]------------
[726210.718292] WARNING: CPU: 0 PID: 0 at backports-5.10.68-1/net/mac80211/rate.c:677 0x8771e700 [mac80211 at a2a1a7d4+0x7cdb0]
[726210.729427] Modules linked in: ath9k ath9k_common pppoe ppp_async iptable_nat ath9k_hw ath10k_pci ath10k_core ath xt_state xt_nat xt_conntrack xt_REDIRECT xt_MASQUERADE xt_FLOWOFFLOAD xt_CT pppox ppp_generic nf_nat nf_flow_table_hw nf_flow_table nf_conntrack mac80211 ipt_REJECT cfg80211 xt_time xt_tcpudp xt_multiport xt_mark xt_mac xt_limit xt_comment xt_TCPMSS xt_LOG slhc nf_reject_ipv4 nf_log_ipv4 nf_defrag_ipv6 nf_defrag_ipv4 iptable_mangle iptable_filter ip_tables hwmon crc_ccitt compat ledtrig_usbport nf_log_ipv6 nf_log_common ip6table_mangle ip6table_filter ip6_tables ip6t_REJECT x_tables nf_reject_ipv6 fsl_mph_dr_of ehci_platform ehci_fsl ehci_hcd gpio_button_hotplug usbcore nls_base usb_common
[726210.792587] CPU: 0 PID: 0 Comm: swapper Not tainted 5.4.154 #0
[726210.798591] Stack : 87780000 800b98ec 80660000 805fa498 00000000 00000000 00000000 00000000
[726210.807160]         00000000 00000000 00000000 00000000 00000000 00000001 87c0bc30 897cbe95
[726210.815731]         87c0bcc8 00000000 00000000 0000012a 00000038 8057ac04 352e342e 31353420
[726210.824302]         0000012a be6adfcc 00000000 73776170 00000000 87c0bc10 00000000 8771e700
[726210.832872]         00000009 87776760 870581a0 80630000 00000002 8032041c 00000000 80790000
[726210.841444]         ...
[726210.844014] Call Trace:
[726210.844028] [] 0x87780000 [ath10k_core at e42640e8+0x6bb00]
[726210.852957] [] 0x800b98ec
[726210.856584] [] 0x80660000
[726210.860211] [] 0x8057ac04
[726210.863849] [] 0x8771e700 [mac80211 at a2a1a7d4+0x7cdb0]
[726210.869957] [] 0x8032041c
[726210.873592] [] 0x87780000 [ath10k_core at e42640e8+0x6bb00]
[726210.879948] [] 0x80069364
[726210.883572] [] 0x8006936c
[726210.887199] [] 0x800824f4
[726210.890831] [] 0x8771e700 [mac80211 at a2a1a7d4+0x7cdb0]
[726210.896923] [] 0x8008259c
[726210.900560] [] 0x8771e700 [mac80211 at a2a1a7d4+0x7cdb0]
[726210.906668] [] 0x8772e728 [mac80211 at a2a1a7d4+0x7cdb0]
[726210.912769] [] 0x800c3f10
[726210.916407] [] 0x8706991c [ath9k at 625c8d39+0x19450]
[726210.922258] [] 0x8706cc84 [ath9k at 625c8d39+0x19450]
[726210.928102] [] 0x87064664 [ath9k at 625c8d39+0x19450]
[726210.933947] [] 0x87730d9c [mac80211 at a2a1a7d4+0x7cdb0]
[726210.940059] [] 0x87730ef0 [mac80211 at a2a1a7d4+0x7cdb0]
[726210.946169] [] 0x87738bf0 [mac80211 at a2a1a7d4+0x7cdb0]
[726210.952287] [] 0x8773a838 [mac80211 at a2a1a7d4+0x7cdb0]
[726210.958398] [] 0x87064eb8 [ath9k at 625c8d39+0x19450]
[726210.964227] [] 0x80660000
[726210.967858] [] 0x80660000
[726210.971486] [] 0x80085380
[726210.975111] [] 0x800ba7e4
[726210.978737] [] 0x80580170
[726210.982377] [] 0x800bf374
[726210.986008] [] 0x802bfc1c
[726210.989640] [] 0x80064f78
[726210.993257] 
[726210.994857] ---[ end trace 2715ec3721563753 ]---
```

This is just running in AP mode with a few clients connected, nothing unusual.
I just noticed this when checking dmesg.
----------

More information can be found at the following URL:
https://bugs.openwrt.org/index.php?do=details&task_id=4054#comment10477

You are receiving this message because you have requested it from the Flyspray bugtracking system.  If you did not expect this message or don't want to receive mails in future, you can change your notification settings at the URL shown above.



More information about the openwrt-bugs mailing list