possible connectivity bug?

Bug #1711877 reported by Zack
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
linux (Ubuntu)
Expired
Medium
Unassigned

Bug Description

having some connectivity issues and found this message repeating in the kern.log thought it might be worth reporting.

```
ug 19 22:40:51 zack kernel: [ 4645.749394] ------------[ cut here ]------------
Aug 19 22:40:51 zack kernel: [ 4645.749405] WARNING: CPU: 2 PID: 1259 at /build/linux-hwe-CXNcgz/linux-hwe-4.10.0/drivers/net/wireless/intel/iwlwifi/mvm/sta.c:1523 iwl_mvm_rm_sta+0x3ea/0x460 [iwlmvm]
Aug 19 22:40:51 zack kernel: [ 4645.749406] Modules linked in: ccm rfcomm xt_CHECKSUM iptable_mangle ipt_REJECT nf_reject_ipv4 xt_tcpudp ipt_MASQUERADE nf_nat_masquerade_ipv4 nf_conntrack_netlink nfnetlink xfrm_user xfrm_algo iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 xt_addrtype xt_conntrack nf_nat nf_conntrack libcrc32c br_netfilter bridge stp llc aufs ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter ip_tables x_tables bnep snd_hda_codec_hdmi snd_hda_codec_realtek snd_hda_codec_generic nls_iso8859_1 joydev arc4 intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp crct10dif_pclmul crc32_pclmul snd_soc_skl snd_soc_skl_ipc ghash_clmulni_intel snd_soc_sst_ipc snd_soc_sst_dsp snd_hda_ext_core snd_soc_sst_match pcbc snd_soc_core snd_compress ac97_bus snd_pcm_dmaengine snd_hda_intel snd_hda_codec
Aug 19 22:40:51 zack kernel: [ 4645.749429] snd_hda_core iwlmvm aesni_intel snd_hwdep mac80211 aes_x86_64 crypto_simd glue_helper cryptd snd_pcm intel_cstate intel_rapl_perf snd_seq_midi snd_seq_midi_event hid_sensor_accel_3d snd_rawmidi iwlwifi snd_seq hid_sensor_trigger snd_seq_device industrialio_triggered_buffer snd_timer kfifo_buf cfg80211 hid_sensor_iio_common snd rtsx_pci_ms input_leds hid_multitouch soundcore memstick serio_raw mei_me shpchp btusb mei btrtl intel_pch_thermal toshiba_acpi sparse_keymap industrialio wmi ucsi toshiba_bluetooth hci_uart btbcm btqca btintel bluetooth intel_lpss_acpi intel_lpss acpi_pad mac_hid kvm_intel kvm irqbypass parport_pc ppdev lp parport autofs4 hid_sensor_custom hid_sensor_hub usbhid rtsx_pci_sdmmc i915 i2c_algo_bit drm_kms_helper syscopyarea sysfillrect psmouse sysimgblt fb_sys_fops
Aug 19 22:40:51 zack kernel: [ 4645.749455] drm ahci rtsx_pci libahci pinctrl_sunrisepoint pinctrl_intel i2c_hid video hid fjes
Aug 19 22:40:51 zack kernel: [ 4645.749460] CPU: 2 PID: 1259 Comm: wpa_supplicant Tainted: G W 4.10.0-32-generic #36~16.04.1-Ubuntu
Aug 19 22:40:51 zack kernel: [ 4645.749461] Hardware name: TOSHIBA Satellite P55W-C/0693, BIOS 1.20 10/07/2015
Aug 19 22:40:51 zack kernel: [ 4645.749461] Call Trace:
Aug 19 22:40:51 zack kernel: [ 4645.749465] dump_stack+0x63/0x90
Aug 19 22:40:51 zack kernel: [ 4645.749467] __warn+0xcb/0xf0
Aug 19 22:40:51 zack kernel: [ 4645.749468] warn_slowpath_null+0x1d/0x20
Aug 19 22:40:51 zack kernel: [ 4645.749473] iwl_mvm_rm_sta+0x3ea/0x460 [iwlmvm]
Aug 19 22:40:51 zack kernel: [ 4645.749477] iwl_mvm_mac_sta_state+0x40a/0x600 [iwlmvm]
Aug 19 22:40:51 zack kernel: [ 4645.749490] drv_sta_state+0x8a/0x460 [mac80211]
Aug 19 22:40:51 zack kernel: [ 4645.749498] __sta_info_destroy_part2+0x17a/0x1b0 [mac80211]
Aug 19 22:40:51 zack kernel: [ 4645.749506] __sta_info_flush+0x103/0x1b0 [mac80211]
Aug 19 22:40:51 zack kernel: [ 4645.749518] ieee80211_set_disassoc+0xba/0x3f0 [mac80211]
Aug 19 22:40:51 zack kernel: [ 4645.749530] ieee80211_mgd_auth+0x26c/0x3c0 [mac80211]
Aug 19 22:40:51 zack kernel: [ 4645.749543] ? cfg80211_get_bss+0x1c5/0x2d0 [cfg80211]
Aug 19 22:40:51 zack kernel: [ 4645.749553] ieee80211_auth+0x18/0x20 [mac80211]
Aug 19 22:40:51 zack kernel: [ 4645.749563] cfg80211_mlme_auth+0x101/0x210 [cfg80211]
Aug 19 22:40:51 zack kernel: [ 4645.749571] nl80211_authenticate+0x30b/0x370 [cfg80211]
Aug 19 22:40:51 zack kernel: [ 4645.749581] genl_family_rcv_msg+0x1db/0x3b0
Aug 19 22:40:51 zack kernel: [ 4645.749582] genl_rcv_msg+0x59/0xa0
Aug 19 22:40:51 zack kernel: [ 4645.749583] ? genl_notify+0x80/0x80
Aug 19 22:40:51 zack kernel: [ 4645.749584] netlink_rcv_skb+0xa4/0xc0
Aug 19 22:40:51 zack kernel: [ 4645.749585] genl_rcv+0x28/0x40
Aug 19 22:40:51 zack kernel: [ 4645.749586] netlink_unicast+0x18c/0x240
Aug 19 22:40:51 zack kernel: [ 4645.749588] netlink_sendmsg+0x2fb/0x3a0
Aug 19 22:40:51 zack kernel: [ 4645.749590] ? aa_sock_msg_perm+0x61/0x150
Aug 19 22:40:51 zack kernel: [ 4645.749592] sock_sendmsg+0x38/0x50
Aug 19 22:40:51 zack kernel: [ 4645.749593] ___sys_sendmsg+0x2c2/0x2d0
Aug 19 22:40:51 zack kernel: [ 4645.749594] ? destroy_inode+0x3b/0x60
Aug 19 22:40:51 zack kernel: [ 4645.749595] ? evict+0x136/0x1a0
Aug 19 22:40:51 zack kernel: [ 4645.749597] ? iput+0x1bb/0x240
Aug 19 22:40:51 zack kernel: [ 4645.749598] ? __dentry_kill+0x110/0x160
Aug 19 22:40:51 zack kernel: [ 4645.749598] ? dput+0x214/0x250
Aug 19 22:40:51 zack kernel: [ 4645.749600] ? mntput+0x24/0x40
Aug 19 22:40:51 zack kernel: [ 4645.749601] ? __fput+0x190/0x220
Aug 19 22:40:51 zack kernel: [ 4645.749603] __sys_sendmsg+0x54/0x90
Aug 19 22:40:51 zack kernel: [ 4645.749604] SyS_sendmsg+0x12/0x20
Aug 19 22:40:51 zack kernel: [ 4645.749606] entry_SYSCALL_64_fastpath+0x1e/0xad
Aug 19 22:40:51 zack kernel: [ 4645.749607] RIP: 0033:0x7fd1941ad450
Aug 19 22:40:51 zack kernel: [ 4645.749608] RSP: 002b:00007ffdd7156da8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
Aug 19 22:40:51 zack kernel: [ 4645.749609] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00007fd1941ad450
Aug 19 22:40:51 zack kernel: [ 4645.749609] RDX: 0000000000000000 RSI: 00007ffdd7156e30 RDI: 0000000000000007
Aug 19 22:40:51 zack kernel: [ 4645.749610] RBP: 000055ed3cc6e84c R08: 0000000000000000 R09: 000000000000008c
Aug 19 22:40:51 zack kernel: [ 4645.749610] R10: 0000000000001000 R11: 0000000000000246 R12: 000055ed3cc6e84c
Aug 19 22:40:51 zack kernel: [ 4645.749611] R13: 000055ed3cc716e0 R14: 0000000000000000 R15: 0000000000000000
Aug 19 22:40:51 zack kernel: [ 4645.749612] ---[ end trace e05d38b0c933b143 ]---
Aug 19 22:40:51 zack kernel: [ 4645.753800] wlp1s0: authenticate with a4:2b:b0:e9:c2:8c
Aug 19 22:40:51 zack kernel: [ 4645.758951] wlp1s0: send auth to a4:2b:b0:e9:c2:8c (try 1/3)
Aug 19 22:40:51 zack kernel: [ 4645.761210] wlp1s0: authenticated
Aug 19 22:40:51 zack kernel: [ 4645.762524] wlp1s0: associate with a4:2b:b0:e9:c2:8c (try 1/3)
Aug 19 22:40:51 zack kernel: [ 4645.763441] wlp1s0: RX AssocResp from a4:2b:b0:e9:c2:8c (capab=0x1011 status=0 aid=3)
Aug 19 22:40:51 zack kernel: [ 4645.764626] wlp1s0: associated
Aug 19 22:40:51 zack NetworkManager[1024]: <info> [1503196851.2235] device (wlp1s0): supplicant interface state: completed -> authenticating
Aug 19 22:40:51 zack NetworkManager[1024]: <info> [1503196851.2435] device (wlp1s0): supplicant interface state: authenticating -> associated
Aug 19 22:40:51 zack NetworkManager[1024]: <info> [1503196851.2703] device (wlp1s0): supplicant interface state: associated -> 4-way handshake
Aug 19 22:40:51 zack NetworkManager[1024]: <info> [1503196851.2703] device (wlp1s0): supplicant interface state: 4-way handshake -> completed
```

Tags: zesty
Revision history for this message
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote : Missing required logs.

This bug is missing log files that will aid in diagnosing the problem. While running an Ubuntu kernel (not a mainline or third-party kernel) please enter the following command in a terminal window:

apport-collect 1711877

and then change the status of the bug to 'Confirmed'.

If, due to the nature of the issue you have encountered, you are unable to run this command, please add a comment stating that fact and change the bug status to 'Confirmed'.

This change has been made by an automated script, maintained by the Ubuntu Kernel Team.

Changed in linux (Ubuntu):
status: New → Incomplete
tags: added: zesty
Revision history for this message
Joseph Salisbury (jsalisbury) wrote :

Did this issue start happening after an update/upgrade? Was there a prior kernel version where you were not having this particular problem?

Would it be possible for you to test the latest upstream kernel? Refer to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest v4.13 kernel[0].

If this bug is fixed in the mainline kernel, please add the following tag 'kernel-fixed-upstream'.

If the mainline kernel does not fix this bug, please add the tag: 'kernel-bug-exists-upstream'.

Once testing of the upstream kernel is complete, please mark this bug as "Confirmed".

Thanks in advance.

[0] http://kernel.ubuntu.com/~kernel-ppa/mainline/v4.13-rc6

Changed in linux (Ubuntu):
importance: Undecided → Medium
Revision history for this message
Zack (zacbayhan) wrote : Re: [Bug 1711877] Re: possible connectivity bug?
Download full text (8.5 KiB)

Ok I will try the upstream kernel and then report back any findings

On Mon, Aug 21, 2017 at 4:41 PM, Joseph Salisbury <
<email address hidden>> wrote:

> Did this issue start happening after an update/upgrade? Was there a
> prior kernel version where you were not having this particular problem?
>
> Would it be possible for you to test the latest upstream kernel? Refer
> to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest
> v4.13 kernel[0].
>
> If this bug is fixed in the mainline kernel, please add the following
> tag 'kernel-fixed-upstream'.
>
> If the mainline kernel does not fix this bug, please add the tag:
> 'kernel-bug-exists-upstream'.
>
> Once testing of the upstream kernel is complete, please mark this bug as
> "Confirmed".
>
>
> Thanks in advance.
>
> [0] http://kernel.ubuntu.com/~kernel-ppa/mainline/v4.13-rc6
>
> ** Changed in: linux (Ubuntu)
> Importance: Undecided => Medium
>
> --
> You received this bug notification because you are subscribed to the bug
> report.
> https://bugs.launchpad.net/bugs/1711877
>
> Title:
> possible connectivity bug?
>
> Status in linux package in Ubuntu:
> Incomplete
>
> Bug description:
> having some connectivity issues and found this message repeating in
> the kern.log thought it might be worth reporting.
>
> ```
> ug 19 22:40:51 zack kernel: [ 4645.749394] ------------[ cut here
> ]------------
> Aug 19 22:40:51 zack kernel: [ 4645.749405] WARNING: CPU: 2 PID: 1259 at
> /build/linux-hwe-CXNcgz/linux-hwe-4.10.0/drivers/net/
> wireless/intel/iwlwifi/mvm/sta.c:1523 iwl_mvm_rm_sta+0x3ea/0x460 [iwlmvm]
> Aug 19 22:40:51 zack kernel: [ 4645.749406] Modules linked in: ccm
> rfcomm xt_CHECKSUM iptable_mangle ipt_REJECT nf_reject_ipv4 xt_tcpudp
> ipt_MASQUERADE nf_nat_masquerade_ipv4 nf_conntrack_netlink nfnetlink
> xfrm_user xfrm_algo iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4
> nf_nat_ipv4 xt_addrtype xt_conntrack nf_nat nf_conntrack libcrc32c
> br_netfilter bridge stp llc aufs ebtable_filter ebtables ip6table_filter
> ip6_tables iptable_filter ip_tables x_tables bnep snd_hda_codec_hdmi
> snd_hda_codec_realtek snd_hda_codec_generic nls_iso8859_1 joydev arc4
> intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp crct10dif_pclmul
> crc32_pclmul snd_soc_skl snd_soc_skl_ipc ghash_clmulni_intel
> snd_soc_sst_ipc snd_soc_sst_dsp snd_hda_ext_core snd_soc_sst_match pcbc
> snd_soc_core snd_compress ac97_bus snd_pcm_dmaengine snd_hda_intel
> snd_hda_codec
> Aug 19 22:40:51 zack kernel: [ 4645.749429] snd_hda_core iwlmvm
> aesni_intel snd_hwdep mac80211 aes_x86_64 crypto_simd glue_helper cryptd
> snd_pcm intel_cstate intel_rapl_perf snd_seq_midi snd_seq_midi_event
> hid_sensor_accel_3d snd_rawmidi iwlwifi snd_seq hid_sensor_trigger
> snd_seq_device industrialio_triggered_buffer snd_timer kfifo_buf cfg80211
> hid_sensor_iio_common snd rtsx_pci_ms input_leds hid_multitouch soundcore
> memstick serio_raw mei_me shpchp btusb mei btrtl intel_pch_thermal
> toshiba_acpi sparse_keymap industrialio wmi ucsi toshiba_bluetooth hci_uart
> btbcm btqca btintel bluetooth intel_lpss_acpi intel_lpss acpi_pad mac_hid
> kvm_intel kvm irqbypass parport_pc ppdev lp parport aut...

Read more...

Revision history for this message
Launchpad Janitor (janitor) wrote :

[Expired for linux (Ubuntu) because there has been no activity for 60 days.]

Changed in linux (Ubuntu):
status: Incomplete → Expired
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.