Modify

Opened 4 years ago

Closed 4 years ago

Last modified 4 years ago

#14756 closed defect (fixed)

New kernel warning ieee80211_smps_is_restrictive

Reported by: duvi Owned by: developers
Priority: normal Milestone: Barrier Breaker 14.07
Component: base system Version: Trunk
Keywords: Cc:

Description

I'm seeing a new kernel warning on latest trunk on a TP-LINK TL-WDR4300.
It only happens when the first wireless connection is made to the AP, but never after that.

Sun Jan 12 15:44:17 2014 daemon.info hostapd: wlan1: STA 18:3d:a2:2e:ea:ec IEEE 802.11: authenticated
Sun Jan 12 15:44:17 2014 daemon.info hostapd: wlan1: STA 18:3d:a2:2e:ea:ec IEEE 802.11: associated (aid 1)
Sun Jan 12 15:44:17 2014 daemon.info hostapd: wlan1: STA 18:3d:a2:2e:ea:ec RADIUS: VLAN ID 100
Sun Jan 12 15:44:17 2014 kern.info kernel: [  206.320000] device vlan100 entered promiscuous mode
Sun Jan 12 15:44:17 2014 kern.info kernel: [  206.320000] breth0.100: port 1(vlan100) entered forwarding state
Sun Jan 12 15:44:17 2014 kern.info kernel: [  206.330000] breth0.100: port 1(vlan100) entered forwarding state
Sun Jan 12 15:44:17 2014 kern.info kernel: [  206.340000] breth0.100: port 1(vlan100) entered forwarding state
Sun Jan 12 15:44:17 2014 kern.info kernel: [  206.340000] device wlan1.100 entered promiscuous mode
Sun Jan 12 15:44:17 2014 kern.info kernel: [  206.350000] breth0.100: port 2(wlan1.100) entered forwarding state
Sun Jan 12 15:44:17 2014 kern.info kernel: [  206.350000] breth0.100: port 2(wlan1.100) entered forwarding state
Sun Jan 12 15:44:17 2014 kern.info kernel: [  206.360000] breth0.100: port 2(wlan1.100) entered forwarding state
Sun Jan 12 15:44:17 2014 daemon.info hostapd: wlan1: STA 18:3d:a2:2e:ea:ec WPA: pairwise key handshake completed (RSN)
Sun Jan 12 15:44:17 2014 daemon.info hostapd: wlan1: STA 18:3d:a2:2e:ea:ec RADIUS: starting accounting session 00000025-00000000
Sun Jan 12 15:44:17 2014 daemon.info hostapd: wlan1: STA 18:3d:a2:2e:ea:ec IEEE 802.1X: authenticated - EAP type: 25 (PEAP)
Sun Jan 12 15:44:21 2014 authpriv.notice dropbear[956]: Password auth succeeded for 'root' from 192.168.100.83:62425
Sun Jan 12 15:45:21 2014 kern.warn kernel: [  270.270000] ------------[ cut here ]------------
Sun Jan 12 15:45:21 2014 kern.warn kernel: [  270.270000] WARNING: at /mnt/sda/openwrt/trunk/build_dir/target-mips_34kc_uClibc-0.9.33.2/linux-ar71xx_generic/compat-wireless-2013-11-05/net/mac80211/util.c:2375 ieee80211_smps_is_restrictive+0x40/0xa8 [mac80211]()
Sun Jan 12 15:45:21 2014 kern.warn kernel: [  270.290000] Modules linked in: ath9k ath9k_common ath9k_hw ath mac80211 cfg80211 compat ledtrig_usbdev ledtrig_netdev ipv6 arc4 crypto_blkcipher leds_gpio ledtrig_timer ledtrig_default_on ehci_platform ehci_hcd gpio_button_hotplug usbcore nls_base usb_common
Sun Jan 12 15:45:21 2014 kern.warn kernel: [  270.320000] CPU: 0 PID: 0 Comm: swapper Not tainted 3.10.26 #1
Sun Jan 12 15:45:21 2014 kern.warn kernel: [  270.320000] Stack : 00000006 00000000 00000000 00000000 00000000 00000000 80372ac6 00000032
Sun Jan 12 15:45:21 2014 kern.warn kernel: [  270.320000]         80301098 802b3558 80352a38 80300e1b 00000000 00000004 86cbc6d8 0000000c
Sun Jan 12 15:45:21 2014 kern.warn kernel: [  270.320000]         00000001 80078ff0 00000003 80076a30 00000000 00000000 802b4e20 802fba84
Sun Jan 12 15:45:21 2014 kern.warn kernel: [  270.320000]         002fba84 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Sun Jan 12 15:45:21 2014 kern.warn kernel: [  270.320000]         00000000 00000000 00000000 00000000 00000000 00000000 00000000 802fba10
Sun Jan 12 15:45:21 2014 kern.warn kernel: [  270.320000]         ...
Sun Jan 12 15:45:21 2014 kern.warn kernel: [  270.360000] Call Trace:
Sun Jan 12 15:45:21 2014 kern.warn kernel: [  270.360000] [<8006e230>] show_stack+0x48/0x70
Sun Jan 12 15:45:21 2014 kern.warn kernel: [  270.360000] [<80076b2c>] warn_slowpath_common+0x78/0xa8
Sun Jan 12 15:45:21 2014 kern.warn kernel: [  270.370000] [<80076b74>] warn_slowpath_null+0x18/0x24
Sun Jan 12 15:45:21 2014 kern.warn kernel: [  270.380000] [<871a77bc>] ieee80211_smps_is_restrictive+0x40/0xa8 [mac80211]
Sun Jan 12 15:45:21 2014 kern.warn kernel: [  270.380000] [<87184d6c>] ieee80211_sta_ps_deliver_wakeup+0x1f0/0x560 [mac80211]
Sun Jan 12 15:45:21 2014 kern.warn kernel: [  270.390000] [<8719adac>] ieee80211_sta_ps_transition+0x978/0x301c [mac80211]
Sun Jan 12 15:45:21 2014 kern.warn kernel: [  270.400000]
Sun Jan 12 15:45:21 2014 kern.warn kernel: [  270.400000] ---[ end trace 22badfedc5dabada ]---

Attachments (0)

Change History (4)

comment:1 Changed 4 years ago by duvi

It seems to be related to WPA enterprise security or dynamic vlans enabled.
It doesn't happen on a VIF with general WPA PSK security.

comment:2 Changed 4 years ago by anonymous

Hits me too.

comment:3 Changed 4 years ago by nbd

  • Resolution set to fixed
  • Status changed from new to closed

fixed in r41827

comment:4 Changed 4 years ago by jow

  • Milestone changed from Attitude Adjustment 12.09 to Barrier Breaker 14.07

Milestone Attitude Adjustment 12.09 deleted

Add Comment

Modify Ticket

Action
as closed .
The resolution will be deleted. Next status will be 'reopened'.
Author


E-mail address and user name can be saved in the Preferences.

 
Note: See TracTickets for help on using tickets.