[FS#1372] 802.11s Mesh with SAE / using wpad-mesh crashing randomly

OpenWrt Bugs openwrt-bugs at lists.openwrt.org
Fri Jul 31 21:25:29 EDT 2020


THIS IS AN AUTOMATED MESSAGE, DO NOT REPLY.

The following task has a new comment added:

FS#1372 - 802.11s Mesh with SAE / using  wpad-mesh crashing randomly
User who did this - Craig Matsuura (thelinuxdude)

----------
I see the same warn when using 802.11s over 5GHz mtk7612.  It appears a skb buffer is full?

This is the section of code that is generating the error.  Is there anything I can try?  I'm on a 18.04 build?

ccmp_encrypt_skb:

        if (WARN_ON(skb_tailroom(skb) < tail ||
                    skb_headroom(skb) < IEEE80211_CCMP_HDR_LEN))
                return -1;


[  234.629726] ------------[ cut here ]------------
[  234.639113] WARNING: CPU: 0 PID: 0 at backports-2017-11-01/net/mac80211/wpa.c:431 ieee80211_crypto_ccmp_encrypt+0xe0/0x248 [mac80211]
[  234.663087] Modules linked in: rt2800soc rt2800pci rt2800mmio rt2800lib pppoe ppp_async rt2x00soc rt2x00pci rt2x00mmio rt2x00lib pppox ppp_generic nf_conntrack_ipv6 mt76x2e mt76x2_common mt76x02_lib mt7603e mt76 mac80211 iptable_nat ipt_REJECT ipt_MASQUERADE cfg80211 xt_time xt_tcpudp xt_state xt_nat xt_multiport xt_mark xt_mac xt_limit xt_conntrack xt_comment xt_TCPMSS xt_REDIRECT xt_LOG xt_FLOWOFFLOAD slhc nf_reject_ipv4 nf_nat_redirect nf_nat_masquerade_ipv4 nf_conntrack_ipv4 nf_nat_ipv4 nf_nat_ftp nf_nat nf_log_ipv4 nf_flow_table_hw nf_flow_table nf_defrag_ipv6 nf_defrag_ipv4 nf_conntrack_rtcache nf_conntrack_netlink nf_conntrack_ftp nf_conntrack iptable_mangle iptable_filter ip_tables crc_itu_t crc_ccitt compat arptable_filter arpt_mangle arp_tables xt_set ip_set_list_set ip_set_hash_netiface
[  234.804092]  ip_set_hash_netport ip_set_hash_netnet ip_set_hash_net ip_set_hash_netportnet ip_set_hash_mac ip_set_hash_ipportnet ip_set_hash_ipportip ip_set_hash_ipport ip_set_hash_ipmark ip_set_hash_ip ip_set_bitmap_port ip_set_bitmap_ipmac ip_set_bitmap_ip ip_set nfnetlink ip6t_REJECT nf_reject_ipv6 nf_log_ipv6 nf_log_common ip6table_mangle ip6table_filter ip6_tables x_tables tun eeprom_93cx6 leds_gpio gpio_button_hotplug
[  234.879023] CPU: 0 PID: 0 Comm: swapper Tainted: G        W       4.14.131 #0
[  234.893240] Stack : 80483660 80373fe4 00000000 00000000 803d882c 83807bf4 80427ccc 804278e7
[  234.909918]         803d4b48 00000000 80483660 000001af 00000123 00000001 83807ba8 a434d50c
[  234.926591]         00000000 00000000 80480000 00000000 0000011e 00000000 33312e34 30232031
[  234.943258]         6e757420 00000000 3fff0000 70656520 00000000 00000000 83288754 832d9e40
[  234.959924]         00000009 000001af 00000123 83807dc0 00000000 801da924 00000000 80480000
[  234.976589]         ...
[  234.981465] Call Trace:
[  234.986351] [] show_stack+0x74/0x104
[  234.995229] [] __warn+0x110/0x118
[  235.003575] [] warn_slowpath_null+0x1c/0x30
[  235.013783] [] ieee80211_crypto_ccmp_encrypt+0xe0/0x248 [mac80211]
[  235.027964] [] ieee80211_probereq_get+0x6d8/0x1668 [mac80211]
[  235.041219] ---[ end trace c50314b568e42025 ]---



----------

More information can be found at the following URL:
https://bugs.openwrt.org/index.php?do=details&task_id=1372#comment8609

You are receiving this message because you have requested it from the Flyspray bugtracking system.  If you did not expect this message or don't want to receive mails in future, you can change your notification settings at the URL shown above.



More information about the openwrt-bugs mailing list