[FS#1383] [kmod-b43]Crashes after 5GHz Scan

LEDE Bugs lede-bugs at lists.infradead.org
Wed Feb 21 19:53:14 PST 2018


A new Flyspray task has been opened.  Details are below. 

User who did this - Sora Kim (sora) 

Attached to Project - OpenWrt/LEDE Project
Summary - [kmod-b43]Crashes after 5GHz Scan
Task Type - Bug Report
Category - Packages
Status - Unconfirmed
Assigned To - 
Operating System - All
Severity - Medium
Priority - Very Low
Reported Version - lede-17.01
Due in Version - Undecided
Due Date - Undecided
Details - Supply the following if possible:
 - Device: Linksys E3000
 - LEDE version: LEDE Reboot 17.01.4 r3560-79f57e422d, kmod-b43 - 4.4.92+2017-01-31-3
 - Steps to reproduce
Open LuCI page, Network-Wireless, press Scan for "Generic MAC80211 802.11a (radio1)", then LEDE crashes, and router reboots itself.
dmesg output:
[   77.097162] random: nonblocking pool is initialized
[  364.790599] b43-phy1: Loading firmware version 666.2 (2011-02-23 01:15:07)
[  364.846607] Data bus error, epc == 8016dd88, ra == 801df05c
[  364.852277] Oops[#1]:
[  364.854607] CPU: 0 PID: 1370 Comm: luci Not tainted 4.4.92 #0
[  364.860446] task: 8399ed48 ti: 83938000 task.ti: 83938000
[  364.865928] $ 0   : 00000000 1100bc00 00000002 1100bc03
[  364.871269] $ 4   : a80003fa 838fc058 00000108 00007000
[  364.876610] $ 8   : 00000023 00000000 00000001 00000006
[  364.881952] $12   : 00000000 000002a0 00000000 00000000
[  364.887293] $16   : 838fc000 838fc058 000003fa 838fc328
[  364.892634] $20   : 838fc034 0000029a 00000002 00000001
[  364.897977] $24   : 00000001 801df014                  
[  364.903318] $28   : 83938000 83939b38 00000001 801df05c
[  364.908660] Hi    : 00000000
[  364.911592] Lo    : 0f5c28f6
[  364.914528] epc   : 8016dd88 0x8016dd88
[  364.918425] ra    : 801df05c 0x801df05c
[  364.922317] Status: 1100bc03	KERNEL EXL IE 
[  364.926597] Cause : c080801c (ExcCode 07)
[  364.930671] PrId  : 00019740 (MIPS 74Kc)
[  364.934654] Modules linked in: pppoe ppp_async iptable_nat b43 pppox ppp_generic nf_nat_ipv4 nf_conntrack_ipv6 nf_conntrack_ipv4 mac80211 ipt_REJECT ipt_MASQUERADE cfg80211 bgmac_bcma xt_time xt_tcpudp xt_state xt_nat xt_multiport xt_mark xt_mac xt_limit xt_conntrack xt_comment xt_TCPMSS xt_REDIRECT xt_LOG xt_CT slhc nf_reject_ipv4 nf_nat_redirect nf_nat_masquerade_ipv4 nf_nat nf_log_ipv4 nf_defrag_ipv6 nf_defrag_ipv4 nf_conntrack_rtcache nf_conntrack iptable_mangle iptable_filter ip_tables crc8 crc_ccitt cordic compat bgmac_bcma_mdio bgmac ip6t_REJECT nf_reject_ipv6 nf_log_ipv6 nf_log_common ip6table_mangle ip6table_filter ip6_tables x_tables leds_gpio ohci_platform ohci_hcd ehci_platform ehci_hcd gpio_button_hotplug usbcore nls_base usb_common ssb_hcd bcma_hcd
[  365.003649] Process luci (pid: 1370, threadinfo=83938000, task=8399ed48, tls=776aad48)
[  365.011680] Stack : 0000016c 000c1047 00000000 800489fc 0000016c 611fc6ba 803b6b60 8036c254
[  365.011680] 	  00000000 803b436c 00000000 00000001 803d0000 803b0000 00000000 00000080
[  365.011680] 	  00000004 838fc000 838fc058 801dee98 838fc058 801defb8 00000001 801ebce8
[  365.011680] 	  00000000 838fc000 838fc058 801dee98 00000000 83213a94 1100bc00 803b22ec
[  365.011680] 	  00000080 83248ee0 00000074 838fc000 838fc058 83939bf0 838fc058 801df03c
[  365.011680] 	  ...
[  365.048015] Call Trace:[] 0x800489fc
[  365.052577] [] 0x801dee98
[  365.056131] [] 0x801defb8
[  365.059682] [] 0x801ebce8
[  365.063236] [] 0x801dee98
[  365.066791] [] 0x83213a94 [b43 at 83200000+0x55470]
[  365.072378] [] 0x801df03c
[  365.075943] [] 0x801df03c
[  365.079501] [] 0x83213a30 [b43 at 83200000+0x55470]
[  365.085077] [] 0x83212284 [b43 at 83200000+0x55470]
[  365.090661] [] 0x83212948 [b43 at 83200000+0x55470]
[  365.096252] [] 0x83216f5c [b43 at 83200000+0x55470]
[  365.101838] [] 0x801dee98
[  365.105394] [] 0x801dea54
[  365.108951] [] 0x801dee98
[  365.112521] [] 0x832131b8 [b43 at 83200000+0x55470]
[  365.118114] [] 0x83213230 [b43 at 83200000+0x55470]
[  365.123710] [] 0x83206be0 [b43 at 83200000+0x55470]
[  365.129317] [] 0x83207560 [b43 at 83200000+0x55470]
[  365.134907] [] 0x83182ff8 [mac80211 at 83180000+0x60860]
[  365.140941] [] 0x831960f8 [mac80211 at 83180000+0x60860]
[  365.146965] [] 0x8020b664
[  365.150524] [] 0x8020b96c
[  365.154074] [] 0x801f0534
[  365.157633] [] 0x8020ba50
[  365.161181] [] 0x80220ab8
[  365.164736] [] 0x8027449c
[  365.168282] [] 0x8029bfb4
[  365.171841] [] 0x801effb4
[  365.175408] [] 0x800bb3cc
[  365.178960] [] 0x800ac178
[  365.182512] [] 0x800bdea0
[  365.186063] [] 0x801eea94
[  365.189614] [] 0x800c469c
[  365.193175] [] 0x800bb4d4
[  365.196730] [] 0x80003398
[  365.200296] 
[  365.201814] 
[  365.201814] Code: 03e00008  304200ff  94820000  3042ffff  8c820000  03e00008  00000000  308400ff 
[  365.212331] ---[ end trace f01c15e372c1be21 ]---


More information can be found at the following URL:
https://bugs.openwrt.org/index.php?do=details&task_id=1383



More information about the lede-bugs mailing list