Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

FS#3130 - WARNING: CPU: 0 PID: 2865 at net/core/flow_dissector.c:942 __skb_flow_dissect+0x448/0x156c #7883

Open
openwrt-bot opened this issue May 27, 2020 · 1 comment
Labels
flyspray kernel

Comments

@openwrt-bot
Copy link

@openwrt-bot openwrt-bot commented May 27, 2020

jonozzz:

Supply the following if possible:

  • Device problem occurs on

Linksys EA8500

  • Software versions of OpenWrt/LEDE release, packages, etc.

OpenWrt SNAPSHOT r13373-e8fbb98c6d

  • Steps to reproduce

Run dmesg and look for this exception stack. The system appears to run normally after boot.

[ 43.556644] ------------[ cut here ]------------
[ 43.556725] WARNING: CPU: 0 PID: 2865 at net/core/flow_dissector.c:942 __skb_flow_dissect+0x448/0x156c
[ 43.560479] Modules linked in: ath10k_pci ath10k_core ath mac80211 iptable_nat ipt_REJECT cfg80211 xt_time xt_tcpudp xt_tcpmss xt_statistic xt_state xt_recent xt_policy xt_nat xt_multiport xt_mark xt_mac xt_limit xt_length xt_hl xt_helper xt_esp xt_ecn xt_dscp xt_conntrack xt_connmark xt_connlimit xt_connbytes xt_comment xt_TCPMSS xt_REDIRECT xt_MASQUERADE xt_LOG xt_HL xt_FLOWOFFLOAD xt_DSCP xt_CT xt_CLASSIFY nf_reject_ipv4 nf_nat nf_log_ipv4 nf_flow_table_hw nf_flow_table nf_conntrack_rtcache nf_conntrack_netlink nf_conncount iptable_raw iptable_mangle iptable_filter ipt_ah ipt_ECN ip_tables compat br_netfilter fuse act_connmark nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 sch_tbf sch_ingress sch_htb sch_hfsc em_u32 cls_u32 cls_tcindex cls_route cls_matchall cls_fw cls_flow cls_basic act_skbedit act_mirred ledtrig_usbport ledtrig_heartbeat xt_set ip_set_list_set ip_set_hash_netportnet ip_set_hash_netport ip_set_hash_netnet ip_set_hash_netiface ip_set_hash_net ip_set_hash_mac
[ 43.560909] ip_set_hash_ipportnet ip_set_hash_ipportip ip_set_hash_ipport ip_set_hash_ipmark ip_set_hash_ip ip_set_bitmap_port ip_set_bitmap_ipmac ip_set_bitmap_ip ip_set nfnetlink nf_log_ipv6 nf_log_common ip6table_mangle ip6table_filter ip6_tables ip6t_REJECT x_tables nf_reject_ipv6 ifb ipcomp6 xfrm6_tunnel esp6 ah6 xfrm4_tunnel ipcomp esp4 ah4 tunnel6 tunnel4 tun xfrm_user xfrm_ipcomp af_key xfrm_algo vfat fat ntfs nls_utf8 nls_iso8859_1 nls_cp437 sha1_generic md5 echainiv des_generic libdes cbc authenc usb_storage leds_gpio xhci_plat_hcd xhci_pci xhci_hcd dwc3 dwc3_qcom ohci_platform ohci_hcd phy_qcom_dwc3 ahci fsl_mph_dr_of ehci_platform ehci_fsl sd_mod ahci_platform libahci_platform libahci libata scsi_mod ehci_hcd gpio_button_hotplug ext4 mbcache jbd2 exfat(C) crc32c_generic
[ 43.702907] CPU: 0 PID: 2865 Comm: charon Tainted: G C 5.4.42 #0
[ 43.725016] Hardware name: Generic DT based system
[ 43.732162] [] (unwind_backtrace) from [] (show_stack+0x14/0x20)
[ 43.737012] [] (show_stack) from [] (dump_stack+0x94/0xa8)
[ 43.744922] [] (dump_stack) from [] (__warn+0xb4/0xd0)
[ 43.751944] [] (__warn) from [] (warn_slowpath_fmt+0x50/0x90)
[ 43.758805] [] (warn_slowpath_fmt) from [] (__skb_flow_dissect+0x448/0x156c)
[ 43.766357] [] (__skb_flow_dissect) from [] (skb_get_hash_perturb+0x6c/0x1ac)
[ 43.775380] [] (skb_get_hash_perturb) from [] (ieee80211_reserve_tid+0xb50/0xf74 [mac80211])
[ 43.784311] [] (ieee80211_reserve_tid [mac80211]) from [] (ieee80211_tx_prepare_skb+0x23c/0x294 [mac80211])
[ 43.794456] [] (ieee80211_tx_prepare_skb [mac80211]) from [] (ieee80211_tx_pending+0xc4/0x294 [mac80211])
[ 43.805544] [] (ieee80211_tx_pending [mac80211]) from [] (tasklet_action_common.constprop.3+0x74/0x10c)
[ 43.816879] [] (tasklet_action_common.constprop.3) from [] (__do_softirq+0x130/0x2d4)
[ 43.827812] [] (__do_softirq) from [] (do_softirq.part.2+0x48/0x58)
[ 43.837524] [] (do_softirq.part.2) from [] (__local_bh_enable_ip+0xd8/0xe8)
[ 43.845354] [] (__local_bh_enable_ip) from [] (packet_poll+0x84/0x118)
[ 43.854038] [] (packet_poll) from [] (sock_poll+0x98/0xc0)
[ 43.862370] [] (sock_poll) from [] (do_sys_poll+0x2f0/0x558)
[ 43.869576] [] (do_sys_poll) from [] (sys_poll+0x24/0x120)
[ 43.877118] [] (sys_poll) from [] (ret_fast_syscall+0x0/0x54)
[ 43.884136] Exception stack(0xd8fabfa8 to 0xd8fabff0)
[ 43.891708] bfa0: 00000000 00000000 b6920c40 00000006 ffffffff 00000000
[ 43.896756] bfc0: 00000000 00000000 012b4470 000000a8 b6920ce8 b6f3a8a4 b6920c40 b6920cbc
[ 43.904896] bfe0: b6920c00 b6920bf0 b6f8d5cc b6f8caa4
[ 43.913185] ---[ end trace 36ce985abed2ad7b ]---

@openwrt-bot
Copy link
Author

@openwrt-bot openwrt-bot commented May 27, 2020

jonozzz:

I should add that I have strongswan 5.8.4 installed along with:

root@EA8500:~# opkg list-installed|grep ipsec
iptables-mod-ipsec - 1.8.4-1
kmod-ipsec - 5.4.42-1
kmod-ipsec4 - 5.4.42-1
kmod-ipsec6 - 5.4.42-1
kmod-ipt-ipsec - 5.4.42-1
strongswan-ipsec - 5.8.4-1
strongswan-mod-kernel-libipsec - 5.8.4-1

@aparcar aparcar added the kernel label Feb 22, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
flyspray kernel
Projects
None yet
Development

No branches or pull requests

2 participants