[FS#3265] AP crashed when enabling multicast_snooping

OpenWrt Bugs openwrt-bugs at lists.openwrt.org
Mon Aug 3 01:05:48 EDT 2020


THIS IS AN AUTOMATED MESSAGE, DO NOT REPLY.

The following task has a new comment added:

FS#3265 - AP crashed when enabling multicast_snooping
User who did this - Erik Larsson (whooo)

----------
Forgot to add some output from the kernel log:
[ 2346.354659] rcu: INFO: rcu_sched self-detected stall on CPU
[ 2346.355038] rcu: #0112-....: (2105 ticks this GP) idle=45a/1/0x40000002 softirq=6045/6046 fqs=1049
[ 2346.359303] #011(t=2100 jiffies g=34437 q=3)
[ 2346.368277] NMI backtrace for cpu 2
[ 2346.372231] CPU: 2 PID: 1338 Comm: ash Not tainted 5.4.52 #0
[ 2346.375480] Hardware name: Generic DT based system
[ 2346.381571] [] (unwind_backtrace) from [] (show_stack+0x10/0x14)
[ 2346.386116] [] (show_stack) from [] (dump_stack+0x94/0xa8)
[ 2346.394032] [] (dump_stack) from [] (nmi_cpu_backtrace+0x90/0xc4)
[ 2346.401084] [] (nmi_cpu_backtrace) from [] (nmi_trigger_cpumask_backtrace+0x124/0x138)
[ 2346.409004] [] (nmi_trigger_cpumask_backtrace) from [] (rcu_dump_cpu_stacks+0xa4/0xcc)
[ 2346.418549] [] (rcu_dump_cpu_stacks) from [] (rcu_sched_clock_irq+0x62c/0x808)
[ 2346.428178] [] (rcu_sched_clock_irq) from [] (update_process_times+0x30/0x60)
[ 2346.437125] [] (update_process_times) from [] (tick_sched_timer+0x4c/0xa8)
[ 2346.446059] [] (tick_sched_timer) from [] (__hrtimer_run_queues+0x154/0x200)
[ 2346.454552] [] (__hrtimer_run_queues) from [] (hrtimer_interrupt+0x118/0x2a0)
[ 2346.463494] [] (hrtimer_interrupt) from [] (arch_timer_handler_virt+0x28/0x30)
[ 2346.472277] [] (arch_timer_handler_virt) from [] (handle_percpu_devid_irq+0x78/0x138)
[ 2346.481121] [] (handle_percpu_devid_irq) from [] (generic_handle_irq+0x24/0x34)
[ 2346.490726] [] (generic_handle_irq) from [] (__handle_domain_irq+0x5c/0xb4)
[ 2346.499617] [] (__handle_domain_irq) from [] (gic_handle_irq+0x4c/0x90)
[ 2346.508290] [] (gic_handle_irq) from [] (__irq_svc+0x6c/0x90)
[ 2346.516490] Exception stack(0xcbe35ae0 to 0xcbe35b28)
[ 2346.524221] 5ae0: cf200e34 00000000 0000000d 0000000c ce30d780 c0c04e48 00000000 cf200e34
[ 2346.529280] 5b00: cf200cc0 ce065e08 cbe35b90 c0c05f3c c0c03d00 cbe35b30 c085f7dc c088b59c
[ 2346.537345] 5b20: 80000013 ffffffff
[ 2346.545603] [] (__irq_svc) from [] (_raw_spin_lock+0x2c/0x40)
[ 2346.548933] [] (_raw_spin_lock) from [] (br_multicast_add_group+0x34/0x17c)
[ 2346.556576] [] (br_multicast_add_group) from [] (br_multicast_rcv+0xad8/0xedc)
[ 2346.565068] [] (br_multicast_rcv) from [] (br_dev_xmit+0x170/0x3c0)
[ 2346.574096] [] (br_dev_xmit) from [] (dev_hard_start_xmit+0x8c/0x11c)
[ 2346.582009] [] (dev_hard_start_xmit) from [] (__dev_queue_xmit+0x718/0x880)
[ 2346.590342] [] (__dev_queue_xmit) from [] (ip6_finish_output2+0x1a4/0x460)
[ 2346.598837] [] (ip6_finish_output2) from [] (ip6_output+0x5c/0xd0)
[ 2346.607513] [] (ip6_output) from [] (igmp6_send+0x29c/0x2a4)
[ 2346.615407] [] (igmp6_send) from [] (igmp6_join_group.part.7+0x20/0xd4)
[ 2346.622955] [] (igmp6_join_group.part.7) from [] (igmp6_group_added+0xf0/0xf8)
[ 2346.631042] [] (igmp6_group_added) from [] (__ipv6_dev_mc_inc+0x200/0x2c8)
[ 2346.640081] [] (__ipv6_dev_mc_inc) from [] (br_multicast_open+0xcc/0x110)
[ 2346.648675] [] (br_multicast_open) from [] (br_multicast_toggle+0x74/0xac)
[ 2346.657250] [] (br_multicast_toggle) from [] (store_bridge_parm+0x70/0xd4)
[ 2346.665778] [] (store_bridge_parm) from [] (kernfs_fop_write+0x108/0x220)
[ 2346.674357] [] (kernfs_fop_write) from [] (__vfs_write+0x1c/0x1a4)
[ 2346.682908] [] (__vfs_write) from [] (vfs_write+0xa4/0x188)
[ 2346.690714] [] (vfs_write) from [] (ksys_write+0x48/0xb4)
[ 2346.697920] [] (ksys_write) from [] (ret_fast_syscall+0x0/0x54)
[ 2346.705117] Exception stack(0xcbe35fa8 to 0xcbe35ff0)
[ 2346.712638] 5fa0:                   00000000 00000000 00000001 b6f243e0 00000002 00000000
[ 2346.717897] 5fc0: 00000000 00000000 00000000 00000004 00000002 00000020 00084bfc 00084bfc
[ 2346.726004] 5fe0: bec13928 bec13918 b6ef8020 b6ef74f0

This output is forwarded to a syslog server as I don't have serial access, so might not be 100% complete.
----------

More information can be found at the following URL:
https://bugs.openwrt.org/index.php?do=details&task_id=3265#comment8613

You are receiving this message because you have requested it from the Flyspray bugtracking system.  If you did not expect this message or don't want to receive mails in future, you can change your notification settings at the URL shown above.



More information about the openwrt-bugs mailing list