[FS#3459] 802.11s mesh kernel trace at net/core/flow_dissector.c:958 __skb_flow_dissect+0x2c0/0x149c

OpenWrt Bugs openwrt-bugs at lists.openwrt.org
Wed Nov 18 00:32:56 EST 2020


THIS IS AN AUTOMATED MESSAGE, DO NOT REPLY.

A new Flyspray task has been opened.  Details are below. 

User who did this - Michael Pratt (mcpratt) 

Attached to Project - OpenWrt/LEDE Project
Summary - 802.11s mesh kernel trace at net/core/flow_dissector.c:958 __skb_flow_dissect+0x2c0/0x149c
Task Type - Bug Report
Category - Kernel
Status - Unconfirmed
Assigned To - 
Operating System - All
Severity - Low
Priority - Very Low
Reported Version - Trunk
Due in Version - Undecided
Due Date - Undecided
Details - reproduce the problem:

1. use build from master branch at kernel version 5.4.72

2. set wireless interface to 802.11s and establish a connection to another mesh point


The link is still good after this, but the impact on performance is unknown.


[   44.133721] ------------[ cut here ]------------
[   44.138481] WARNING: CPU: 0 PID: 0 at net/core/flow_dissector.c:958 __skb_flow_dissect+0x2c0/0x149c
[   44.147605] Modules linked in: ath9k ath9k_common pppoe ppp_async iptable_nat ath9k_hw ath xt_state xt_nat xt_conntrack xt_REDIRECT xt_MASQUERADE xt_FLOWOFFLOAD pppox ppp_generic nf_nat nf_flow_table_hw nf_flow_table nf_conntrack_rtcache nf_conntrack mac80211 ipt_REJECT cfg80211 xt_time xt_tcpudp xt_multiport xt_mark xt_mac xt_limit xt_comment xt_TCPMSS xt_LOG slhc nf_reject_ipv4 nf_log_ipv4 nf_defrag_ipv6 nf_defrag_ipv4 iptable_mangle iptable_filter ip_tables crc_ccitt compat nf_log_ipv6 nf_log_common ip6table_mangle ip6table_filter ip6_tables ip6t_REJECT x_tables nf_reject_ipv6 gpio_button_hotplug
[   44.201117] CPU: 0 PID: 0 Comm: swapper Not tainted 5.4.72 #0
[   44.206914] Stack : 80650000 805ee988 00000000 00000000 805edb58 81c0bc3c 806240fc 80623ce3
[   44.215337]         80590b9c 00000000 807832d8 81788d44 80d0f418 00000001 81c0bbf0 2470403f
[   44.223761]         00000000 00000000 807b0000 000000c4 61696e74 00000000 2e342e37 32202330
[   44.232191]         000000c4 71e00000 00000000 0003119d 00000000 00000009 00000000 8039f3b0
[   44.240618]         00000009 81788d44 80d0f418 80620000 00000000 802feaa4 00000000 80780000
[   44.249040]         ...
[   44.251515] Call Trace:
[   44.254014] [] show_stack+0x30/0x100
[   44.258510] [] __warn+0xc0/0x10c
[   44.262647] [] warn_slowpath_fmt+0x5c/0xac
[   44.267666] [] __skb_flow_dissect+0x2c0/0x149c
[   44.273027] [] __skb_get_hash+0x7c/0x284
[   44.278026] [] ieee80211_reserve_tid+0x4f0/0x1188 [mac80211]
[   44.284682] ---[ end trace 4da33b10a9de4dac ]---


More information can be found at the following URL:
https://bugs.openwrt.org/index.php?do=details&task_id=3459

You are receiving this message because you have requested it from the Flyspray bugtracking system.  If you did not expect this message or don't want to receive mails in future, you can change your notification settings at the URL shown above.



More information about the openwrt-bugs mailing list