0
zanzibar

[Odroid C2] Wifi AR9271 causes kernel crash after upgrade

Recommended Posts

Hello,

I am using up to date Armbian Buster.


TP-Link TL-WN722N V1 USB WiFi dongle causes system crashes after kernel upgrade to 5.4.12-meson64 #19.11.8 SMP PREEMPT Thu Jan 16 20:12:23 CET 2020 aarch64 GNU/Linux.
Before updating the kernel, I had no such problem.

Feb 12 20:17:15 xxx systemd[1]: Found device AR9271 802.11n.
Feb 12 20:17:15 xxx systemd[1]: Started ifup for wlx54e6fc8d208e.
Feb 12 20:17:15 xxx wpa_supplicant[2360]: Successfully initialized wpa_supplicant
Feb 12 20:17:15 xxx sh[2344]: wlx54e6fc8d208e=wlx54e6fc8d208e
Feb 12 20:17:17 xxx wpa_supplicant[2361]: Using interface wlx54e6fc8d208e with hwaddr 54:e6:fc:8d:20:8e and ssid "mynetwork"
Feb 12 20:17:17 xxx wpa_supplicant[2361]: wlx54e6fc8d208e: interface state UNINITIALIZED->ENABLED
Feb 12 20:17:17 xxx wpa_supplicant[2361]: wlx54e6fc8d208e: AP-ENABLED
Feb 12 20:17:17 xxx wpa_supplicant[2361]: wlx54e6fc8d208e: CTRL-EVENT-CONNECTED - Connection to 54:e6:fc:8d:20:8e completed [id=0 id_str=]
Feb 12 20:17:20 xxx systemd[1]: systemd-rfkill.service: Succeeded.
Feb 12 20:17:41 xxx wpa_supplicant[2361]: wlx54e6fc8d208e: AP-STA-CONNECTED 2c:d0:5a:38:bd:3b
Feb 12 20:18:00 xxx sshd[2403]: Accepted password for myuser from 10.0.0.5 port 22 ssh2
Feb 12 20:18:00 xxx sshd[2403]: pam_unix(sshd:session): session opened for user myuser by (uid=0)
Feb 12 20:18:00 xxx systemd[1]: Created slice User Slice of UID 1001.
Feb 12 20:18:00 xxx systemd[1]: Starting User Runtime Directory /run/user/1001...
Feb 12 20:18:00 xxx systemd-logind[1584]: New session 7 of user myuser.
Feb 12 20:18:00 xxx systemd[1]: Started User Runtime Directory /run/user/1001.
Feb 12 20:18:00 xxx systemd[1]: Starting User Manager for UID 1001...
Feb 12 20:18:00 xxx systemd[2406]: pam_unix(systemd-user:session): session opened for user myuser by (uid=0)
Feb 12 20:18:00 xxx systemd[2406]: Reached target Paths.
Feb 12 20:18:00 xxx systemd[2406]: Reached target Sockets.
Feb 12 20:18:00 xxx systemd[2406]: Reached target Timers.
Feb 12 20:18:00 xxx systemd[2406]: Reached target Basic System.
Feb 12 20:18:00 xxx systemd[2406]: Reached target Default.
Feb 12 20:18:00 xxx systemd[2406]: Startup finished in 123ms.
Feb 12 20:18:00 xxx systemd[1]: Started User Manager for UID 1001.
Feb 12 20:18:00 xxx systemd[1]: Started Session 7 of user myuser.
Feb 12 20:18:48 xxx sshd[2505]: Received disconnect from 10.0.0.5 port 22:11: disconnected by user
Feb 12 20:18:48 xxx sshd[2505]: Disconnected from user myuser 10.0.0.5 port 22
Feb 12 20:18:48 xxx sshd[2403]: pam_unix(sshd:session): session closed for user myuser
Feb 12 20:18:48 xxx systemd[1]: session-7.scope: Succeeded.
Feb 12 20:18:48 xxx systemd-logind[1584]: Session 7 logged out. Waiting for processes to exit.
Feb 12 20:18:48 xxx systemd-logind[1584]: Removed session 7.
Feb 12 20:18:54 xxx wpa_supplicant[2361]: wlx54e6fc8d208e: AP-STA-DISCONNECTED 2c:d0:5a:38:bd:3b
Feb 12 20:18:56 xxx kernel: ath: phy0: Unable to remove station entry for: 2c:d0:5a:38:bd:3b

Message from syslogd@localhost at Feb 12 20:18:59 ...
 kernel:[  571.404886] Internal error: Oops: 96000004 [#1] PREEMPT SMP

Message from syslogd@localhost at Feb 12 20:18:59 ...
 kernel:[  571.612865] Code: d5384101 b9402262 b9401020 11000400 (f8626a99) 

Message from syslogd@localhost at Feb 12 20:18:59 ...
 kernel:[  571.623551] Kernel panic - not syncing: Attempted to kill init! exitcode=0x0000000b

 

Second one:

Feb 12 20:23:08 xxx wpa_supplicant[2125]: Using interface wlx54e6fc8d208e with hwaddr 54:e6:fc:8d:20:8e and ssid "mynetwork"
Feb 12 20:23:08 xxx wpa_supplicant[2125]: wlx54e6fc8d208e: interface state UNINITIALIZED->ENABLED
Feb 12 20:23:08 xxx wpa_supplicant[2125]: wlx54e6fc8d208e: AP-ENABLED
Feb 12 20:23:08 xxx wpa_supplicant[2125]: wlx54e6fc8d208e: CTRL-EVENT-CONNECTED - Connection to 54:e6:fc:8d:20:8e completed [id=0 id_str=]
Feb 12 20:23:11 xxx systemd[1]: systemd-rfkill.service: Succeeded.

Message from syslogd@localhost at Feb 12 20:23:25 ...
 kernel:[   77.921372] Internal error: Oops: 96000004 [#1] PREEMPT SMP

Message from syslogd@localhost at Feb 12 20:23:25 ...
 kernel:[   78.152254] Code: d5384101 b9402262 b9401020 11000400 (f8626a99) 
Feb 12 20:23:25 xxx kernel: Unable to handle kernel paging request at virtual address 0005001700000048
Feb 12 20:23:25 xxx kernel: Mem abort info:
Feb 12 20:23:25 xxx kernel:   ESR = 0x96000004
Feb 12 20:23:25 xxx kernel:   EC = 0x25: DABT (current EL), IL = 32 bits
Feb 12 20:23:25 xxx kernel:   SET = 0, FnV = 0
Feb 12 20:23:25 xxx kernel:   EA = 0, S1PTW = 0
Feb 12 20:23:25 xxx kernel: Data abort info:
Feb 12 20:23:25 xxx kernel:   ISV = 0, ISS = 0x00000004
Feb 12 20:23:25 xxx kernel:   CM = 0, WnR = 0
Feb 12 20:23:25 xxx kernel: [0005001700000048] address between user and kernel address ranges
Feb 12 20:23:25 xxx kernel: Internal error: Oops: 96000004 [#1] PREEMPT SMP
Feb 12 20:23:25 xxx kernel: Modules linked in: ath9k_htc ath9k_common ath9k_hw mac80211 ath cfg80211 rfkill libarc4 cdc_ether usbnet uas nf_log_ipv4 nf_log_common nft_limit cpufreq_powersave cpufreq_conservative xt_tcpudp xt_multiport xt_LOG xt_limit xt_conntrack nft_counter nft_chain_nat xt_MASQUERADE nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 nft_compat nf_tables nfnetlink meson_rng rng_core meson_gxbb_wdt scpi_hwmon ip_tables x_tables dwmac_generic realtek dwmac_meson8b
Feb 12 20:23:25 xxx kernel: CPU: 1 PID: 2125 Comm: wpa_supplicant Not tainted 5.4.12-meson64 #19.11.8
Feb 12 20:23:25 xxx kernel: Hardware name: Hardkernel ODROID-C2 (DT)
Feb 12 20:23:25 xxx kernel: pstate: 60000005 (nZCv daif -PAN -UAO)
Feb 12 20:23:25 xxx kernel: pc : __kmalloc_node_track_caller+0x150/0x288
Feb 12 20:23:25 xxx kernel: lr : __kmalloc_node_track_caller+0x4c/0x288
Feb 12 20:23:25 xxx kernel: sp : ffff800010603710
Feb 12 20:23:25 xxx kernel: x29: ffff800010603710 x28: 0000000000000014 
Feb 12 20:23:25 xxx kernel: x27: ffff80001249d3c0 x26: ffff000042d90d00 
Feb 12 20:23:25 xxx kernel: x25: 00000000ffffffff x24: 0000000000159801 
Feb 12 20:23:25 xxx kernel: x23: ffff800011c67510 x22: 00000000ffffffff 
Feb 12 20:23:25 xxx kernel: x21: 00000000000928c0 x20: 0005001700000048 
Feb 12 20:23:25 xxx kernel: x19: ffff000007303800 x18: 0000000000000000 
Feb 12 20:23:25 xxx kernel: x17: 0000000000000000 x16: 0000000000000000 
Feb 12 20:23:25 xxx kernel: x15: 0000000000000000 x14: 85a901e7583f6960 
Feb 12 20:23:25 xxx kernel: x13: 3c82001b6c5b05ca x12: 32d0f6c2e6c1b305 
Feb 12 20:23:25 xxx kernel: x11: ed25b09923fa1d1c x10: 32b5a2a8b0fc50fa 
Feb 12 20:23:25 xxx kernel: x9 : 0000000000000000 x8 : ffff00003c5a1020 
Feb 12 20:23:25 xxx kernel: x7 : 0000000000000000 x6 : ffff00003c5a1020 
Feb 12 20:23:25 xxx kernel: x5 : 0000000000000020 x4 : 0000000000000000 
Feb 12 20:23:25 xxx kernel: x3 : 0000000000159801 x2 : 0000000000000000 
Feb 12 20:23:25 xxx kernel: x1 : ffff00003c56aac0 x0 : 0000000000000001 
Feb 12 20:23:25 xxx kernel: Call trace:
Feb 12 20:23:25 xxx kernel:  __kmalloc_node_track_caller+0x150/0x288
Feb 12 20:23:25 xxx kernel:  __kmalloc_reserve.isra.56+0x44/0xa0
Feb 12 20:23:25 xxx kernel:  pskb_expand_head+0x70/0x2d0
Feb 12 20:23:25 xxx kernel:  netlink_trim+0xa0/0xe0
Feb 12 20:23:25 xxx kernel:  netlink_unicast+0x54/0x1f8
Feb 12 20:23:25 xxx kernel:  nl80211_tx_mgmt+0x32c/0x370 [cfg80211]
Feb 12 20:23:25 xxx kernel:  genl_family_rcv_msg+0x1dc/0x3b0
Feb 12 20:23:25 xxx kernel:  genl_rcv_msg+0x58/0xd0
Feb 12 20:23:25 xxx kernel:  netlink_rcv_skb+0x58/0x118
Feb 12 20:23:25 xxx kernel:  genl_rcv+0x34/0x48
Feb 12 20:23:25 xxx kernel:  netlink_unicast+0x180/0x1f8
Feb 12 20:23:25 xxx kernel:  netlink_sendmsg+0x198/0x338
Feb 12 20:23:25 xxx kernel:  sock_sendmsg+0x44/0x50
Feb 12 20:23:25 xxx kernel:  ____sys_sendmsg+0x250/0x290
Feb 12 20:23:25 xxx kernel:  ___sys_sendmsg+0x80/0xc0
Feb 12 20:23:25 xxx kernel:  __sys_sendmsg+0x68/0xb8
Feb 12 20:23:25 xxx kernel:  __arm64_sys_sendmsg+0x20/0x28
Feb 12 20:23:25 xxx kernel:  el0_svc_common.constprop.2+0x88/0x150
Feb 12 20:23:25 xxx kernel:  el0_svc_handler+0x20/0x80
Feb 12 20:23:25 xxx kernel:  el0_svc+0x8/0xc
Feb 12 20:23:25 xxx kernel: Code: d5384101 b9402262 b9401020 11000400 (f8626a99) 
Feb 12 20:23:25 xxx kernel: ---[ end trace 7b6592514db85574 ]---

Message from syslogd@localhost at Feb 12 20:23:26 ...
 kernel:[   78.799696] Internal error: Oops: 96000004 [#2] PREEMPT SMP

Message from syslogd@localhost at Feb 12 20:23:26 ...
 kernel:[   79.010560] Code: d5384101 b9402262 b9401020 11000400 (f8626a99) 
Feb 12 20:23:26 xxx kernel: Unable to handle kernel paging request at virtual address 0005001700000048
Feb 12 20:23:26 xxx kernel: Mem abort info:
Feb 12 20:23:26 xxx kernel:   ESR = 0x96000004
Feb 12 20:23:26 xxx kernel:   EC = 0x25: DABT (current EL), IL = 32 bits
Feb 12 20:23:26 xxx kernel:   SET = 0, FnV = 0
Feb 12 20:23:26 xxx kernel:   EA = 0, S1PTW = 0
Feb 12 20:23:26 xxx kernel: Data abort info:
Feb 12 20:23:26 xxx kernel:   ISV = 0, ISS = 0x00000004
Feb 12 20:23:26 xxx kernel:   CM = 0, WnR = 0
Feb 12 20:23:26 xxx kernel: [0005001700000048] address between user and kernel address ranges
Feb 12 20:23:26 xxx kernel: Internal error: Oops: 96000004 [#2] PREEMPT SMP
Feb 12 20:23:26 xxx kernel: Modules linked in: ath9k_htc ath9k_common ath9k_hw mac80211 ath cfg80211 rfkill libarc4 cdc_ether usbnet uas nf_log_ipv4 nf_log_common nft_limit cpufreq_powersave cpufreq_conservative xt_tcpudp xt_multiport xt_LOG xt_limit xt_conntrack nft_counter nft_chain_nat xt_MASQUERADE nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 nft_compat nf_tables nfnetlink meson_rng rng_core meson_gxbb_wdt scpi_hwmon ip_tables x_tables dwmac_generic realtek dwmac_meson8b
Feb 12 20:23:26 xxx kernel: CPU: 1 PID: 7 Comm: kworker/u8:0 Tainted: G      D           5.4.12-meson64 #19.11.8
Feb 12 20:23:26 xxx kernel: Hardware name: Hardkernel ODROID-C2 (DT)
Feb 12 20:23:26 xxx kernel: Workqueue: phy0 ath9k_led_work [ath9k_htc]
Feb 12 20:23:26 xxx kernel: pstate: 60000005 (nZCv daif -PAN -UAO)
Feb 12 20:23:26 xxx kernel: pc : __kmalloc_node_track_caller+0x150/0x288
Feb 12 20:23:26 xxx kernel: lr : __kmalloc_node_track_caller+0x4c/0x288
Feb 12 20:23:26 xxx kernel: sp : ffff80001005bbe0
Feb 12 20:23:26 xxx kernel: x29: ffff80001005bbe0 x28: 0000000000000000 
Feb 12 20:23:26 xxx kernel: x27: ffff00000735a0b8 x26: ffff80001005bd70 
Feb 12 20:23:26 xxx kernel: x25: 00000000ffffffff x24: 0000000000159801 
Feb 12 20:23:26 xxx kernel: x23: ffff800011c62c54 x22: 00000000ffffffff 
Feb 12 20:23:26 xxx kernel: x21: 0000000000082a20 x20: 0005001700000048 
Feb 12 20:23:26 xxx kernel: x19: ffff000007303800 x18: 0000000000000010 
Feb 12 20:23:26 xxx kernel: x17: 0000000000000000 x16: 0000000000000000 
Feb 12 20:23:26 xxx kernel: x15: 0000000000000000 x14: 3239353662372065 
Feb 12 20:23:26 xxx kernel: x13: 0000000000000000 x12: 0000000000000001 
Feb 12 20:23:26 xxx kernel: x11: 0000000000000000 x10: 00000000000009f0 
Feb 12 20:23:26 xxx kernel: x9 : ffff80001005bd60 x8 : fefefefefefefeff 
Feb 12 20:23:26 xxx kernel: x7 : 0000000000000001 x6 : 0000000000000064 
Feb 12 20:23:26 xxx kernel: x5 : 000000000000000c x4 : 0000000000000000 
Feb 12 20:23:26 xxx kernel: x3 : 0000000000159801 x2 : 0000000000000000 
Feb 12 20:23:26 xxx kernel: x1 : ffff000007395580 x0 : 0000000000000001 
Feb 12 20:23:26 xxx kernel: Call trace:
Feb 12 20:23:26 xxx kernel:  __kmalloc_node_track_caller+0x150/0x288
Feb 12 20:23:26 xxx kernel:  __kmalloc_reserve.isra.56+0x44/0xa0
Feb 12 20:23:26 xxx kernel:  __alloc_skb+0x84/0x198
Feb 12 20:23:26 xxx kernel:  ath9k_wmi_cmd+0x6c/0x1c8 [ath9k_htc]
Feb 12 20:23:26 xxx kernel:  ath9k_reg_rmw+0x7c/0x170 [ath9k_htc]
Feb 12 20:23:26 xxx kernel:  ath9k_hw_set_gpio+0xa8/0xf0 [ath9k_hw]
Feb 12 20:23:26 xxx kernel:  ath9k_led_work+0x28/0x30 [ath9k_htc]
Feb 12 20:23:26 xxx kernel:  process_one_work+0x1e0/0x338
Feb 12 20:23:26 xxx kernel:  worker_thread+0x40/0x440
Feb 12 20:23:26 xxx kernel:  kthread+0x120/0x128
Feb 12 20:23:26 xxx kernel:  ret_from_fork+0x10/0x18
Feb 12 20:23:26 xxx kernel: Code: d5384101 b9402262 b9401020 11000400 (f8626a99) 
Feb 12 20:23:26 xxx kernel: ---[ end trace 7b6592514db85575 ]---

Message from syslogd@localhost at Feb 12 20:23:47 ...
 kernel:[   99.419758] Internal error: Oops: 96000004 [#3] PREEMPT SMP

Message from syslogd@localhost at Feb 12 20:23:47 ...
 kernel:[   99.642872] Code: d5384101 b9402262 b9401020 11000400 (f8626a99) 
Feb 12 20:23:46 xxx kernel: Unable to handle kernel paging request at virtual address 0005001700000048
Feb 12 20:23:46 xxx kernel: Mem abort info:
Feb 12 20:23:46 xxx kernel:   ESR = 0x96000004
Feb 12 20:23:46 xxx kernel:   EC = 0x25: DABT (current EL), IL = 32 bits
Feb 12 20:23:46 xxx kernel:   SET = 0, FnV = 0
Feb 12 20:23:46 xxx kernel:   EA = 0, S1PTW = 0
Feb 12 20:23:46 xxx kernel: Data abort info:
Feb 12 20:23:46 xxx kernel:   ISV = 0, ISS = 0x00000004
Feb 12 20:23:46 xxx kernel:   CM = 0, WnR = 0
Feb 12 20:23:46 xxx kernel: [0005001700000048] address between user and kernel address ranges
Feb 12 20:23:47 xxx kernel: Internal error: Oops: 96000004 [#3] PREEMPT SMP
Feb 12 20:23:47 xxx kernel: Modules linked in: ath9k_htc ath9k_common ath9k_hw mac80211 ath cfg80211 rfkill libarc4 cdc_ether usbnet uas nf_log_ipv4 nf_log_common nft_limit cpufreq_powersave cpufreq_conservative xt_tcpudp xt_multiport xt_LOG xt_limit xt_conntrack nft_counter nft_chain_nat xt_MASQUERADE nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 nft_compat nf_tables nfnetlink meson_rng rng_core meson_gxbb_wdt scpi_hwmon ip_tables x_tables dwmac_generic realtek dwmac_meson8b
Feb 12 20:23:47 xxx kernel: CPU: 1 PID: 1557 Comm: systemd-timesyn Tainted: G      D           5.4.12-meson64 #19.11.8
Feb 12 20:23:47 xxx kernel: Hardware name: Hardkernel ODROID-C2 (DT)
Feb 12 20:23:47 xxx kernel: pstate: 60000005 (nZCv daif -PAN -UAO)
Feb 12 20:23:47 xxx kernel: pc : __kmalloc_node_track_caller+0x150/0x288
Feb 12 20:23:47 xxx kernel: lr : __kmalloc_node_track_caller+0x4c/0x288
Feb 12 20:23:47 xxx kernel: sp : ffff8000105f37c0
Feb 12 20:23:47 xxx kernel: x29: ffff8000105f37c0 x28: 0000000000000000 
Feb 12 20:23:47 xxx kernel: x27: 0000000000000cc0 x26: 0000000000000000 
Feb 12 20:23:47 xxx kernel: x25: 00000000ffffffff x24: 0000000000159801 
Feb 12 20:23:47 xxx kernel: x23: ffff800011c62c54 x22: 00000000ffffffff 
Feb 12 20:23:47 xxx kernel: x21: 0000000000082cc0 x20: 0005001700000048 
Feb 12 20:23:47 xxx kernel: x19: ffff000007303800 x18: 0000000000000000 
Feb 12 20:23:47 xxx kernel: x17: 0000000000000000 x16: 0000000000000000 
Feb 12 20:23:47 xxx kernel: x15: 0000000000000000 x14: 0000000000000000 
Feb 12 20:23:47 xxx kernel: x13: 0000000000000001 x12: 0000000000000000 
Feb 12 20:23:47 xxx kernel: x11: 0000000000000000 x10: 0000000000000000 
Feb 12 20:23:47 xxx kernel: x9 : 0000000000000000 x8 : 00000000000005c8 
Feb 12 20:23:47 xxx kernel: x7 : 0000000000000014 x6 : 0000000000000000 
Feb 12 20:23:47 xxx kernel: x5 : ffff000042d90e00 x4 : ffff00007fbb42f0 
Feb 12 20:23:47 xxx kernel: x3 : 0000000000159801 x2 : 0000000000000000 
Feb 12 20:23:47 xxx kernel: x1 : ffff00007ef4e3c0 x0 : 0000000000000001 
Feb 12 20:23:47 xxx kernel: Call trace:
Feb 12 20:23:47 xxx kernel:  __kmalloc_node_track_caller+0x150/0x288
Feb 12 20:23:47 xxx kernel:  __kmalloc_reserve.isra.56+0x44/0xa0
Feb 12 20:23:47 xxx kernel:  __alloc_skb+0x84/0x198
Feb 12 20:23:47 xxx kernel:  alloc_skb_with_frags+0x50/0x1e0
Feb 12 20:23:47 xxx kernel:  sock_alloc_send_pskb+0x200/0x238
Feb 12 20:23:47 xxx kernel:  sock_alloc_send_skb+0x1c/0x28
Feb 12 20:23:47 xxx kernel:  __ip_append_data.isra.59+0x770/0xc10
Feb 12 20:23:47 xxx kernel:  ip_make_skb+0xe8/0x140
Feb 12 20:23:47 xxx kernel:  udp_sendmsg+0x794/0xa10
Feb 12 20:23:47 xxx kernel:  inet_sendmsg+0x40/0x68
Feb 12 20:23:47 xxx kernel:  sock_sendmsg+0x44/0x50
Feb 12 20:23:47 xxx kernel:  __sys_sendto+0xcc/0x130
Feb 12 20:23:47 xxx kernel:  __arm64_sys_sendto+0x24/0x30
Feb 12 20:23:47 xxx kernel:  el0_svc_common.constprop.2+0x88/0x150
Feb 12 20:23:47 xxx kernel:  el0_svc_handler+0x20/0x80
Feb 12 20:23:47 xxx kernel:  el0_svc+0x8/0xc
Feb 12 20:23:47 xxx kernel: Code: d5384101 b9402262 b9401020 11000400 (f8626a99) 
Feb 12 20:23:47 xxx kernel: ---[ end trace 7b6592514db85576 ]---

 

Share this post


Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Restore formatting

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
0