[FS#3896] Kernel panic when starting hcxdumptool on mt76x2e wlan interface

OpenWrt Bugs openwrt-bugs at lists.openwrt.org
Tue Jun 22 12:45:18 PDT 2021


THIS IS AN AUTOMATED MESSAGE, DO NOT REPLY.

A new Flyspray task has been opened.  Details are below. 

User who did this - JuniorJPDJ (JuniorJPDJ) 

Attached to Project - OpenWrt/LEDE Project
Summary - Kernel panic when starting hcxdumptool on mt76x2e wlan interface
Task Type - Bug Report
Category - Kernel
Status - Unconfirmed
Assigned To - 
Operating System - All
Severity - High
Priority - Very Low
Reported Version - openwrt-21.02
Due in Version - Undecided
Due Date - Undecided
Details - Device: Netgear R6220
Reproducible on: 21.02-SNAPSHOT; trunk SNAPSHOT
I'm getting kernel panic when I run hcxdumptool on 5GHz interface (mt76x2e driver).
It works on 2.4GHz interface.
When tried on 19.07 it didn't panic.

Log when crashed on trunk:

$ ssh root at 192.168.1.1 logread -f
Tue Jun 22 19:14:36 2021 authpriv.info dropbear[2778]: Exit (root) from : Disconnect received
Tue Jun 22 19:14:41 2021 authpriv.info dropbear[3123]: Child connection from 192.168.1.168:44252
Tue Jun 22 19:14:41 2021 authpriv.notice dropbear[3123]: Auth succeeded with blank password for 'root' from 192.168.1.168:44252
Tue Jun 22 19:14:47 2021 kern.info kernel: [   84.159302] device wlan1 entered promiscuous mode
Tue Jun 22 19:14:51 2021 kern.alert kernel: [   87.627062] CPU 1 Unable to handle kernel paging request at virtual address 00000010, epc == 86439038, ra == 86438dcc
Tue Jun 22 19:14:51 2021 kern.warn kernel: [   87.648212] Oops[#1]:
Tue Jun 22 19:14:51 2021 kern.warn kernel: [   87.652731] CPU: 1 PID: 3134 Comm: hcxdumptool Not tainted 5.4.124 #0
Tue Jun 22 19:14:51 2021 kern.warn kernel: [   87.665533] $ 0   : 00000000 00000001 00000000 00000004
Tue Jun 22 19:14:51 2021 kern.warn kernel: [   87.675923] $ 4   : 87d3a26c 00000004 ffffffff 00000000
Tue Jun 22 19:14:51 2021 kern.warn kernel: [   87.686313] $ 8   : 86c6844e 00000000 00000002 0000001f
Tue Jun 22 19:14:51 2021 kern.warn kernel: [   87.696702] $12   : 0000000a 8000001f 0000001e 0000001d
Tue Jun 22 19:14:51 2021 kern.warn kernel: [   87.707092] $16   : 87d3a240 86471454 00000000 00000001
Tue Jun 22 19:14:51 2021 kern.warn kernel: [   87.717481] $20   : 864981c0 00000002 00000000 00000000
Tue Jun 22 19:14:51 2021 kern.warn kernel: [   87.727873] $24   : ffffffe0 00000001
Tue Jun 22 19:14:51 2021 kern.warn kernel: [   87.738268] $28   : 867ea000 867ebbf0 00000000 86438dcc
Tue Jun 22 19:14:51 2021 kern.warn kernel: [   87.748663] Hi    : 00000042
Tue Jun 22 19:14:51 2021 kern.warn kernel: [   87.754380] Lo    : 00000002
Tue Jun 22 19:14:51 2021 kern.warn kernel: [   87.760243] epc   : 86439038 ieee80211_parse_tx_radiotap+0x36c/0x538 [mac80211]
Tue Jun 22 19:14:51 2021 kern.warn kernel: [   87.774810] ra    : 86438dcc ieee80211_parse_tx_radiotap+0x100/0x538 [mac80211]
Tue Jun 22 19:14:51 2021 kern.warn kernel: [   87.789341] Status: 11007c03      KERNEL EXL IE
Tue Jun 22 19:14:51 2021 kern.warn kernel: [   87.797653] Cause : 40800008 (ExcCode 02)
Tue Jun 22 19:14:51 2021 kern.warn kernel: [   87.805615] BadVA : 00000010
Tue Jun 22 19:14:51 2021 kern.warn kernel: [   87.811332] PrId  : 0001992f (MIPS 1004Kc)
Tue Jun 22 19:14:51 2021 kern.warn kernel: [   87.819464] Modules linked in: pppoe ppp_async iptable_nat xt_state xt_nat xt_conntrack xt_REDIRECT xt_MASQUERADE xt_FLOWOFFLOAD xt_CT rndis_host pppox ppp_generic nf_nat nf_flow_table_hw nf_flow_table nf_conntrack mt76x2e mt76x2_common mt76x02_lib mt7603e mt76 mac80211 ipt_REJECT cfg80211 cdc_ether xt_time xt_tcpudp xt_multiport xt_mark xt_mac xt_limit xt_comment xt_TCPMSS xt_LOG usbnet slhc nf_reject_ipv4 nf_log_ipv4 nf_defrag_ipv6 nf_defrag_ipv4 iptable_mangle iptable_filter ip_tables crc_ccitt compat ledtrig_usbport nf_log_ipv6 nf_log_common ip6table_mangle ip6table_filter ip6_tables ip6t_REJECT x_tables nf_reject_ipv6 mii sha256_generic libsha256 seqiv jitterentropy_rng drbg hmac ghash_generic gf128mul gcm ctr cmac ccm leds_gpio xhci_plat_hcd xhci_pci xhci_mtk xhci_hcd gpio_button_hotplug usbcore nls_base usb_common
Tue Jun 22 19:14:51 2021 kern.warn kernel: [   87.964288] Process hcxdumptool (pid: 3134, threadinfo=b724dc4d, task=5224ded9, tls=77e6aec8)
Tue Jun 22 19:14:51 2021 kern.warn kernel: [   87.981236] Stack : 867ebe04 86fe67b0 87d5e000 00000000 81013d80 00000000 bfffffff 00000000
Tue Jun 22 19:14:51 2021 kern.warn kernel: [   87.997854]         86c68442 00000000 86fbe460 86c6844e 00000008 86c6844a 86c6844c 0000000f


Cmdline to reproduce:

hcxdumptool -i wlan1 -o wlan1.pcapng --filtermode=1 -c 36,40,44,48,52,56,60,64,100,104,108,112,116,120,124,128,132,136,140,149,153,157,161,165 -t 60 --filterlist_ap=filterlist.txt --enable_status=95 --active_beacon

Probably reproduce could be simplified but wanted to leave it as close to mine case as possible.

More information can be found at the following URL:
https://bugs.openwrt.org/index.php?do=details&task_id=3896

You are receiving this message because you have requested it from the Flyspray bugtracking system.  If you did not expect this message or don't want to receive mails in future, you can change your notification settings at the URL shown above.



More information about the openwrt-bugs mailing list