Dynalink DL-WRX36 Askey RT5010W IPQ8072A technical discussion

Looking at the discussion there, I made a classification patch for ethernet and ath11k in DL-WRX36, based on the interrupt data:

root@router5:~# cat /proc/interrupts
           CPU0       CPU1       CPU2       CPU3
  9:          0          0          0          0     GIC-0  39 Level     arch_mem_timer
 13:    4797513     486501     483777     475057     GIC-0  20 Level     arch_timer
 16:          2          0          0          0     GIC-0 354 Edge      smp2p
 17:          0          0          0          0     GIC-0 216 Level     4a9000.thermal-sensor
 18:          0          0          0          0     GIC-0 239 Level     bam_dma
 21:          0          0          0          0     GIC-0 270 Level     bam_dma
 22:          5          0          0          0     GIC-0 340 Level     msm_serial0
 23:      86416          0          0          0     GIC-0 178 Level     bam_dma
 24:          0          0          0          0     GIC-0  35 Edge      wdt_bark
 25:          0          0          0          0     GIC-0 357 Edge      q6v5 wdog
 29:          5          0          0          0     GIC-0 348 Edge      ce0
 30:    1163748          0          0          0     GIC-0 347 Edge      ce1
 31:      33650          0          0          0     GIC-0 346 Edge      ce2
 32:       4515          0          0          0     GIC-0 343 Edge      ce3
 34:          0          0          0          0     GIC-0 443 Edge      ce5
 36:       3408          0          0          0     GIC-0  72 Edge      ce7
 38:          0          0          0          0     GIC-0 334 Edge      ce9
 39:          0          0          0          0     GIC-0 333 Edge      ce10
 40:          0          0          0          0     GIC-0  69 Edge      ce11
 47:          0          0          0          0     GIC-0 323 Edge      reo2ost-exception
 48:         30          0          0          0     GIC-0 322 Edge      wbm2host-rx-release
 49:         30          0          0          0     GIC-0 321 Edge      reo2host-status
 50:     173515          0          0          0     GIC-0 320 Edge      reo2host-destination-ring4
 51:     183588          0          0          0     GIC-0 271 Edge      reo2host-destination-ring3
 52:      29378          0          0          0     GIC-0 268 Edge      reo2host-destination-ring2
 53:     143897          0          0          0     GIC-0 267 Edge      reo2host-destination-ring1
 57:      32213          0          0          0     GIC-0 263 Edge      ppdu-end-interrupts-mac3
 58:          0          0          0          0     GIC-0 262 Edge      ppdu-end-interrupts-mac2
 59:     238340          0          0          0     GIC-0 261 Edge      ppdu-end-interrupts-mac1
 60:          1          0          0          0     GIC-0 260 Edge      rxdma2host-monitor-status-ring-mac3
 61:          0          0          0          0     GIC-0 256 Edge      rxdma2host-monitor-status-ring-mac2
 62:          1          0          0          0     GIC-0 255 Edge      rxdma2host-monitor-status-ring-mac1
 63:          1          0          0          0     GIC-0 235 Edge      host2rxdma-host-buf-ring-mac3
 64:          0          0          0          0     GIC-0 215 Edge      host2rxdma-host-buf-ring-mac2
 65:          1          0          0          0     GIC-0 212 Edge      host2rxdma-host-buf-ring-mac1
 66:          0          0          0          0     GIC-0 211 Edge      rxdma2host-destination-ring-mac3
 67:          0          0          0          0     GIC-0 210 Edge      rxdma2host-destination-ring-mac2
 68:          0          0          0          0     GIC-0 209 Edge      rxdma2host-destination-ring-mac1
 73:        682          0          0          0     GIC-0 191 Edge      wbm2host-tx-completions-ring3
 74:        813          0          0          0     GIC-0 190 Edge      wbm2host-tx-completions-ring2
 75:     196030          0          0          0     GIC-0 189 Edge      wbm2host-tx-completions-ring1
 77:         19          0          0          0     GIC-0  47 Edge      cpr3
 78:    1630192          0          0          0     GIC-0 377 Level     edma_txcmpl
 79:          0          0          0          0     GIC-0 385 Level     edma_rxfill
 80:    3099397          0          0          0     GIC-0 393 Level     edma_rxdesc
 81:          0          0          0          0     GIC-0 376 Level     edma_misc
 82:          0          0          0          0  pmic_arb 51380237 Edge      pm-adc5
 83:          0          0          0          0     smp2p   0 Edge      q6v5 fatal
 84:          1          0          0          0     smp2p   1 Edge      q6v5 ready
 85:          0          0          0          0     smp2p   2 Edge      q6v5 handover
 86:          0          0          0          0     smp2p   3 Edge      q6v5 stop
 87:          0          0          0          0   msmgpio  34 Edge      keys
 88:          0          0          0          0   msmgpio  63 Edge      keys
 89:          0          0          0          0     GIC-0 172 Level     xhci-hcd:usb1
 90:         64          0          0          0     GIC-0 353 Edge      glink-native
IPI0:      3057       3478       3356       7411       Rescheduling interrupts
IPI1:     35659     355804     329030     334136       Function call interrupts
IPI2:         0          0          0          0       CPU stop interrupts
IPI3:         0          0          0          0       CPU stop (for crash dump) interrupts
IPI4:         0          0          0          0       Timer broadcast interrupts
IPI5:       736        474        418        448       IRQ work interrupts
IPI6:         0          0          0          0       CPU wake-up interrupts
Err:          0

wan/lan are edma_txcmpl, edma_rxdesc etc.

Regex:
edma_[rt]x.*

All interrupts 29-75 are wireless ath11k related (as also documented in the ahb.c file linked in the github issue.)

The following regex might be ok for wifi:

ce[0-9][0-9]*
host2rxdma-host-buf-ring-mac[0-9]
ppdu-end-interrupts-mac[0-9]
reo2host-destination-ring[0-9]
rxdma2host-.*-ring-mac[0-9]
wbm2host-tx-completions-ring[0-9]

Wildcarding could reduce this to four regex rules:

ce[0-9][0-9]*
edma_[rt]x.*
ppdu-end-interrupts-mac[0-9][0-9]*
.*2.*host-.*-ring.*[0-9]

As a patch for our irqbalance that is:

perus@ub2210:/Openwrt/e8450/feeds/packages/utils/irqbalance$ cat patches/120-add-ipq807x-ath11k-ints.patch 
--- a/procinterrupts.c
+++ b/procinterrupts.c
@@ -108,6 +108,10 @@ static void guess_arm_irq_hints(char *na
 	/* Note: Last entry is a catchall */
 	static struct irq_match matches[] = {
 		{ "eth.*" ,{NULL} ,NULL, IRQ_TYPE_LEGACY, IRQ_GBETH },
+		{ "ce[0-9][0-9]*" ,{NULL} ,NULL, IRQ_TYPE_LEGACY, IRQ_GBETH },
+		{ "edma_[rt]x.*" ,{NULL} ,NULL, IRQ_TYPE_LEGACY, IRQ_GBETH },
+		{ "ppdu-end-interrupts-mac[0-9][0-9]*" ,{NULL} ,NULL, IRQ_TYPE_LEGACY, IRQ_GBETH },
+		{ ".*2.*host-.*-ring.*[0-9]" ,{NULL} ,NULL, IRQ_TYPE_LEGACY, IRQ_GBETH },
 		{ "[A-Z0-9]{4}[0-9a-f]{4}", {NULL} ,check_platform_device, IRQ_TYPE_LEGACY, IRQ_OTHER},
 		{ "PNP[0-9a-f]{4}", {NULL} ,check_platform_device, IRQ_TYPE_LEGACY, IRQ_OTHER},
 		{ ".*", {NULL}, NULL, IRQ_TYPE_LEGACY, IRQ_OTHER},

Irqbalance nicely classifies them:

IRQ bam_dma(23) guessed as class 0
IRQ wdt_bark(24) guessed as class 0
IRQ q6v5 wdog(25) guessed as class 0
IRQ ce0(29) guessed as class 5
IRQ ce1(30) guessed as class 5
IRQ ce2(31) guessed as class 5
IRQ ce3(32) guessed as class 5
IRQ ce5(34) guessed as class 5
IRQ ce7(36) guessed as class 5
IRQ ce9(38) guessed as class 5
IRQ ce10(39) guessed as class 5
IRQ ce11(40) guessed as class 5
IRQ reo2ost-exception(47) guessed as class 0
IRQ wbm2host-rx-release(48) guessed as class 0
IRQ reo2host-status(49) guessed as class 0
IRQ reo2host-destination-ring4(50) guessed as class 5
IRQ reo2host-destination-ring3(51) guessed as class 5
IRQ reo2host-destination-ring2(52) guessed as class 5
IRQ reo2host-destination-ring1(53) guessed as class 5
IRQ ppdu-end-interrupts-mac3(57) guessed as class 5
IRQ ppdu-end-interrupts-mac2(58) guessed as class 5
IRQ ppdu-end-interrupts-mac1(59) guessed as class 5
IRQ rxdma2host-monitor-status-ring-mac3(60) guessed as class 5
IRQ rxdma2host-monitor-status-ring-mac2(61) guessed as class 5
IRQ rxdma2host-monitor-status-ring-mac1(62) guessed as class 5
IRQ host2rxdma-host-buf-ring-mac3(63) guessed as class 5
IRQ host2rxdma-host-buf-ring-mac2(64) guessed as class 5
IRQ host2rxdma-host-buf-ring-mac1(65) guessed as class 5
IRQ rxdma2host-destination-ring-mac3(66) guessed as class 5
IRQ rxdma2host-destination-ring-mac2(67) guessed as class 5
IRQ rxdma2host-destination-ring-mac1(68) guessed as class 5
IRQ wbm2host-tx-completions-ring3(73) guessed as class 5
IRQ wbm2host-tx-completions-ring2(74) guessed as class 5
IRQ wbm2host-tx-completions-ring1(75) guessed as class 5
IRQ cpr3(77) guessed as class 0
IRQ edma_txcmpl(78) guessed as class 5
IRQ edma_rxfill(79) guessed as class 5
IRQ edma_rxdesc(80) guessed as class 5
IRQ edma_misc(81) guessed as class 0
IRQ pm-adc5(82) guessed as class 0
IRQ q6v5 fatal(83) guessed as class 0

And irqbalance seems to balance them.

But the big BUT is that ath11k crashes pretty soon. It starts with channel survey error, and wifi remains unusable until reboot:

[  432.235328] ath11k c000000.wifi: bss channel survey timed out
[  435.275349] ath11k c000000.wifi: bss channel survey timed out
[  438.315363] ath11k c000000.wifi: bss channel survey timed out
[  440.365426] qcom-q6v5-wcss-pil cd00000.q6v5_wcss: fatal error received:
[  440.365426] QC Image Version: QC_IMAGE_VERSION_STRING=WLAN.HK.2.5.0.1-01208-QCAHKSWPL_SILICONZ-1
[  440.365426] Image Variant : IMAGE_VARIANT_STRING=8074.wlanfw.eval_v2Q
[  440.365426]
[  440.365426] hif_ce.c:641 Assertion 0 failedparam0 :zero, param1 :zero, param2 :zero.
[  440.365426] Thread ID      : 0x00000067  Thread name    : WLAN_HIF  Process ID     : 0
[  440.365426] Register:
[  440.365426] SP : 0x4c11fc90
[  440.365426] FP : 0x4c11fc98
[  440.365426] PC : 0x4b195a10
[  440.365426] SSR : 0x00000008
[  440.365426] BADVA : 0x00020000
[  440.365426] LR : 0x4b1951ac
[  440.365426]
[  440.365426] Stack Dump
[  440.365426] from : 0x4c11fc90
[  440.365426] to   : 0x4c11ff20
[  440.365426]
[  440.411613] remoteproc remoteproc0: crash detected in cd00000.q6v5_wcss: type fatal error
[  440.433869] remoteproc remoteproc0: handling crash #1 in cd00000.q6v5_wcss
[  440.442178] remoteproc remoteproc0: recovering cd00000.q6v5_wcss
[  440.474826] remoteproc remoteproc0: stopped remote processor cd00000.q6v5_wcss
[  440.495880] ath11k c000000.wifi: failed to send WMI_PDEV_BSS_CHAN_INFO_REQUEST cmd
[  440.495933] ath11k c000000.wifi: failed to send pdev bss chan info request
[  440.755647] ath11k c000000.wifi: failed to send WMI_PDEV_SET_PARAM cmd
[  440.755689] ath11k c000000.wifi: Failed to set beacon mode for VDEV: 1
[  440.761089] ath11k c000000.wifi: failed to send WMI_BCN_TMPL_CMDID
[  440.767607] ath11k c000000.wifi: failed to submit beacon template command: -108
[  440.773748] ath11k c000000.wifi: failed to update bcn template: -108
[  440.780966] ath11k c000000.wifi: failed to send WMI_VDEV_SET_PARAM_CMDID
[  440.787563] ath11k c000000.wifi: failed to set BA BUFFER SIZE 256 for vdev: 1
[  444.315989] ath11k_warn: 39 callbacks suppressed
[  444.316012] ath11k c000000.wifi: failed to send WMI_PDEV_BSS_CHAN_INFO_REQUEST cmd
[  444.319704] ath11k c000000.wifi: failed to send pdev bss chan info request
[  444.327376] ath11k c000000.wifi: failed to send WMI_PDEV_SET_PARAM cmd
[  444.333937] ath11k c000000.wifi: Failed to set beacon mode for VDEV: 2
[  444.340484] ath11k c000000.wifi: failed to send WMI_BCN_TMPL_CMDID
[  444.346969] ath11k c000000.wifi: failed to submit beacon template command: -108
[  444.353120] ath11k c000000.wifi: failed to update bcn template: -108
[  444.360348] ath11k c000000.wifi: failed to send WMI_VDEV_SET_PARAM_CMDID
[  444.366943] ath11k c000000.wifi: failed to set BA BUFFER SIZE 256 for vdev: 2
[  444.373608] ath11k c000000.wifi: failed to send WMI_VDEV_SET_PARAM_CMDID
[  445.755416] qcom-q6v5-wcss-pil cd00000.q6v5_wcss: start timed out
[  445.759512] remoteproc remoteproc0: can't start rproc cd00000.q6v5_wcss: -110
[  450.382064] ath11k c000000.wifi: failed to send WMI_PDEV_BSS_CHAN_INFO_REQUEST cmd
[  450.385783] ath11k c000000.wifi: failed to send pdev bss chan info request
[  450.393353] ath11k c000000.wifi: failed to send WMI_PDEV_SET_PARAM cmd
[  450.400004] ath11k c000000.wifi: Failed to set beacon mode for VDEV: 2
[  450.406524] ath11k c000000.wifi: failed to send WMI_BCN_TMPL_CMDID
[  450.413005] ath11k c000000.wifi: failed to submit beacon template command: -108
[  450.419192] ath11k c000000.wifi: failed to update bcn template: -108
[  450.426390] ath11k c000000.wifi: failed to send WMI_VDEV_SET_PARAM_CMDID
[  450.432972] ath11k c000000.wifi: failed to set BA BUFFER SIZE 256 for vdev: 2
[  450.439685] ath11k c000000.wifi: failed to send WMI_VDEV_SET_PARAM_CMDID
[  456.449776] ath11k_warn: 49 callbacks suppressed

Apparently some of those interrupts should not be dynamically changed during heavy operation.
Would be nice if also others might try to figure out if there is certain interrupt that can not be manipulated by irqbalance.

7 Likes

Alright, I was able to restore openwrt by connecting through serial port, wanted to share my experience (as someone that never worked with serial before)

Ordered the usb adapter and the jumper cables (as mentioned in OP), to my surprise the default for these cables are 2.54mm spacing, while the port in the router has a spacing of 2.0mm, which of course made the connection impossible as it (now that I searched this post, I see some mentions of it, but again, I didn't know what exactly these did mean).

Spend a lot of time for a 2.0mm cable, but seems that in my area that's basically non-existent, only available was 2.54mm cable or at best a 2.0mm cable on just one end with the other end being just the cable (and for me with no experience in soldering, that didn't work as well).

Thanks to post #36, I searched around for some old mouses and found one with a 3pin 2.0mm, which would be suitable for the task, however the other end was soldered to the mouse board so I had to rip it off. Luckily I had a friend with soldering experience and I got the original cables to be soldered to this mouse cable, which ended up being a 2.0mm to 2.54mm (required by the usb adapter) cable.

After that, connection was working correctly in minicom and similar with defaults parameters (just had to select usb dev which was /dev/ttyUSB0 in my case) and with a root prompt I could restart the flashing instructions.

Would that be manually assigning affinities one by one to something other than Core0 until the error pops?

I was playing some days ago with that and I think remember that it crashed assigning the ceX interrupts.

2 Likes

ideally interrupt should just be assigned to one specific core... ath11k is a bad boy with how each ring and copy engine are handled so i guess we really can't change interrupt on the go.

but it totally can be a bug in the channel survey... The wifi became unusable as the fw crash and currently fw recovery is not a thing.

1 Like

Now it's time to test with a external antennas router. If I could have a WR36 I would like to test it with a Xiaomi AX3600

Unfortunately I followed the instructions as close as I could but it ended up borking it, I think related to the command (previous command mtd18 worked fine):

ubiformat /dev/mtd20 -y -f /path_to/factory_image

@sampson Thanks for your detailed instructions on how to connect to the serial console. As I am now trying to recover. I am able to get the serial console working and see the boot process. However, appears that keystrokes are not working for me to interrupt the the u-boot autoboot. I am use:

  • Mac with Minicom
  • Baud Rate: 115200
  • Parity: N
  • Bits: 8
  • Stopbits: 1
  • Flow control: hardware

I have see some posts where you should continually hitting enter to make sure the autoboot is interrupted properly, but that is not working. I have also see some mention that keystroke not being received could be related to 3.3v.

Looking for any help on how to interrupt the autoboot. Any thoughts?

Thanks!

1 Like

What are you using for connecting via serial?

I ask because keystrokes did not work for me when I used minicom, so I tried GNU screen and that worked for me

Flow control: none

Ended up not being flow control or terminal software. It was the connection. I saw someone mention about unidirectional comm on a serial UART so I thought I would try changing it out.

This provides ONE WAY communication (no keystrokes): https://www.amazon.com/gp/product/B08BLK9HFY

This provides TWO WAY communication (returns keystrokes): https://www.amazon.com/gp/product/B07V556Q82

3 Likes

5 posts were split to a new topic: Replacing libustream-mbedtls and wpad-basic-mbedtls packages with openssl variants?

Thanks, hnyman. Yes, I have removed mbedtls packages, otherwise the build would not succeed since they conflict on the same files. I have already generated a build.

BTW, I use your builds for R7800, thanks for your efforts.

Yes, wolfssl is also a good choice. I have been using openssl for a long time in openwrt so just going with it.

4 posts were split to a new topic: DL-WRX36 slow WAN speed

I have installed OpenWRT on my unit via serial header pins and it is been flawless.

The router now forms part of an AC mix of WDS between R7800, EA8500, DL-WRX36. This unit which broadcasts AX on 5 GHz and 2.4 GHz bands helps with throughput.

Plus the DL-WRX36 looks pretty elegant next to my NAS (which my wife loved), and the speeds are awesome!

1 Like

with the latest kernel 5.15.96 i am unable to sysupgrade ... has anyone getting this ?

Unable to handle kernel access to user memory outside uaccess routines at virtual address 0000000000000070

detailed log

Watchdog handover: fd=3
- watchdog -
Watchdog did not previously reset the system
Thu Mar  2 17:31:51 GMT 2023 upgrade: Sending TERM to remaining processes ...
Thu Mar  2 17:31:51 GMT 2023 upgrade: Sending signal TERM to uwsgi (3517)
Thu Mar  2 17:31:55 GMT 2023 upgrade: Sending KILL to remaining processes ...
[   76.104968] stage2 (5352): drop_caches: 3
Thu Mar  2 17:32:02 GMT 2023 upgrade: Switching to ramdisk...
[   77.446669] UBIFS (ubi0:2): background thread "ubifs_bgt0_2" stops
[   77.450707] Unable to handle kernel access to user memory outside uaccess routines at virtual address 0000000000000070
[   77.451754] Mem abort info:
[   77.462433]   ESR = 0x0000000096000005
[   77.465108]   EC = 0x25: DABT (current EL), IL = 32 bits
[   77.468929]   SET = 0, FnV = 0
[   77.474407]   EA = 0, S1PTW = 0
[   77.477258]   FSC = 0x05: level 1 translation fault
[   77.480301] Data abort info:
[   77.485171]   ISV = 0, ISS = 0x00000005
[   77.488283]   CM = 0, WnR = 0
[   77.491843] user pgtable: 4k pages, 39-bit VAs, pgdp=000000005589d000
[   77.494978] [0000000000000070] pgd=08000000523a8003, p4d=08000000523a8003, pud=08000000523a8003, pmd=0000000000000000
[   77.501407] Internal error: Oops: 96000005 [#1] SMP
[   77.511984] Modules linked in: pppoe ppp_async ath11k_ahb ath11k ath10k_pci ath10k_core ath pppox ppp_mppe ppp_generic nft_fib_inet nf_flow_table                     _ipv6 nf_flow_table_ipv4 nf_flow_table_inet mac80211 ipt_REJECT cfg80211 xt_time xt_tcpudp xt_tcpmss xt_statistic xt_state xt_socket xt_recent xt_qu                     ota xt_pkttype xt_physdev xt_owner xt_nat xt_multiport xt_mark xt_mac xt_limit xt_length xt_iprange xt_iface xt_hl xt_helper xt_esp xt_ecn xt_dscp x                     t_conntrack xt_connmark xt_connlimit xt_connlabel xt_connbytes xt_comment xt_cgroup xt_addrtype xt_TCPMSS xt_TARPIT xt_SYSRQ xt_REDIRECT xt_PROTO xt                     _NETMAP xt_MASQUERADE xt_LOG xt_IPMARK xt_HL xt_FLOWOFFLOAD xt_DSCP xt_DHCPMAC xt_CT xt_CLASSIFY ums_usbat ums_sddr55 ums_sddr09 ums_karma ums_jumps                     hot ums_isd200 ums_freecom ums_datafab ums_cypress ums_alauda ts_kmp ts_fsm ts_bm spi_gpio spi_bitbang slhc sch_cake qrtr_tun qrtr_smd qrtr_mhi qrtr                      qmi_helpers ns nft_reject_ipv6 nft_reject_ipv4 nft_reject_inet nft_reject_bridge nft_reject nft_redir nft_quota
[   77.512192]  nft_objref nft_numgen nft_nat nft_meta_bridge nft_masq nft_log nft_limit nft_hash nft_flow_offload nft_fib_ipv6 nft_fib_ipv4 nft_fib                      nft_ct nft_counter nft_compat nft_chain_nat nf_tables nf_socket_ipv6 nf_socket_ipv4 nf_reject_ipv4 nf_log_syslog nf_flow_table nf_conntrack_netlink                      nf_conntrack_bridge nf_conncount mhi_pci_generic mhi_net mhi mdio_netlink mdio_gpio mdio_bitbang macvlan iptable_raw iptable_nat iptable_mangle ipt                     able_filter ipt_rpfilter ipt_ah ipt_ECN ip6t_rpfilter ip_tables crc_ccitt compat_xtables compat br_netfilter fuse sch_teql sch_sfq sch_multiq sch_gr                     ed sch_fq sch_dsmark sch_codel em_text em_nbyte em_meta em_cmp act_simple act_pedit act_csum libcrc32c sch_tbf sch_ingress sch_htb sch_hfsc em_u32 c                     ls_u32 cls_tcindex cls_route cls_matchall cls_fw cls_flow cls_basic act_skbedit act_mirred act_gact i2c_gpio i2c_algo_bit i2c_mux_gpio i2c_mux crypt                     odev xt_set ip_set_list_set ip_set_hash_netportnet ip_set_hash_netport ip_set_hash_netnet ip_set_hash_netiface
[   77.581779]  ip_set_hash_net ip_set_hash_mac ip_set_hash_ipportnet ip_set_hash_ipportip ip_set_hash_ipport ip_set_hash_ipmark ip_set_hash_ipmac i                     p_set_hash_ip ip_set_bitmap_port ip_set_bitmap_ipmac ip_set_bitmap_ip ip_set nfnetlink ip6table_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv                     4 ip6t_NPT ip6t_rt ip6t_mh ip6t_ipv6header ip6t_hbh ip6t_frag ip6t_eui64 ip6t_ah ip6table_mangle ip6table_filter ip6_tables ip6t_REJECT x_tables nf_                     reject_ipv6 swconfig bonding ifb sit tunnel4 ip_tunnel veth tun cifs cifs_md4 cifs_arc4 autofs4 dns_resolver nls_utf8 vxlan udp_tunnel ip6_udp_tunne                     l wp512 twofish_generic twofish_common tea serpent_generic khazad cast6_generic cast5_generic cast_common camellia_generic blowfish_generic blowfish                     _common anubis ecdh_generic ecc xcbc crypto_user algif_skcipher algif_rng algif_hash algif_aead af_alg sha512_generic seqiv jitterentropy_rng drbg r                     md160 pcbc michael_mic md5 md4 kpp hmac fcrypt echainiv des_generic cts cmac arc4 uas usb_storage leds_gpio
[   77.668420]  xhci_plat_hcd xhci_pci xhci_hcd dwc3 dwc3_qcom uhci_hcd ehci_pci fsl_mph_dr_of ehci_platform ehci_fsl ehci_hcd qca_nss_dp qca_ssdk g                     pio_button_hotplug f2fs ext4 mbcache jbd2 gpio_cascade mux_gpio mux_core aquantia hwmon crc32c_generic crc32_generic encrypted_keys trusted tpm rng_                     core oid_registry asn1_encoder asn1_decoder
[   77.784630] CPU: 1 PID: 5352 Comm: busybox Not tainted 5.15.94 #0
[   77.806865] Hardware name: Dynalink DL-WRX36 (DT)
[   77.812853] pstate: 20400005 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[   77.817543] pc : percpu_counter_add_batch+0x18/0xac
[   77.824311] lr : account_page_cleaned+0xac/0x100
[   77.829172] sp : ffffffc00dd3b940
[   77.834031] x29: ffffffc00dd3b940 x28: 0000000000000000 x27: 0000000000000000
[   77.837249] x26: fffffffffffffffe x25: ffffffc008770fc0 x24: ffffffffffffffff
[   77.844367] x23: 0000000000000000 x22: 0000000000000000 x21: 0000000000000000
[   77.851485] x20: fffffffe00539d00 x19: 0000000000000060 x18: 0000000000000014
[   77.858604] x17: 00000000bafb1036 x16: 00000000f411f9f6 x15: ffffff8002462e48
[   77.865722] x14: 000000000000000c x13: 0000000000000000 x12: 0000000000000000
[   77.872840] x11: ffffffc0089d924a x10: 0000000000000000 x9 : 0000000000000000
[   77.879958] x8 : 0000000000000000 x7 : ffffffc0089d9246 x6 : ffffff803fdc5246
[   77.887075] x5 : ffffffffffffffff x4 : 000000000000001d x3 : 0000000000000004
[   77.894194] x2 : 0000000000000018 x1 : ffffffffffffffff x0 : 0000000000000060
[   77.901312] Call trace:
[   77.908421]  percpu_counter_add_batch+0x18/0xac
[   77.910681]  account_page_cleaned+0xac/0x100
[   77.915196]  __cancel_dirty_page+0x10c/0x160
[   77.919709]  truncate_cleanup_page+0xd8/0xf0
[   77.923962]  truncate_inode_pages_range+0xe4/0x490
[   77.928216]  truncate_inode_pages_final+0x9c/0xbc
[   77.932817]  evict+0x178/0x194
[   77.937588]  evict_inodes+0x1cc/0x21c
[   77.940541]  generic_shutdown_super+0x44/0x130
[   77.944275]  kill_block_super+0x20/0x70
[   77.948613]  deactivate_locked_super+0x54/0xfc
[   77.952348]  deactivate_super+0x70/0x90
[   77.956861]  cleanup_mnt+0xdc/0x174
[   77.960592]  __cleanup_mnt+0x14/0x20
[   77.964065]  task_work_run+0xc8/0x130
[   77.967885]  do_notify_resume+0x3e8/0x7bc
[   77.971445]  el0_svc+0x44/0x54
[   77.975436]  el0t_64_sync_handler+0xe8/0x114
[   77.978389]  el0t_64_sync+0x184/0x188
[   77.982821] Code: 910003fd a90153f3 aa0003f3 f90013f5 (f9400803)
[   77.986380] ---[ end trace 1d9fc6a9f941812c ]---
[   77.992454] Kernel panic - not syncing: Oops: Fatal exception
[   77.997143] SMP: stopping secondary CPUs
[   78.002785] Kernel Offset: disabled
[   78.006772] CPU features: 0x0,00000000,00000802
[   78.009986] Memory Limit: none
[   78.014499] Rebooting in 3 seconds..

Dynalink DL-WRX36 Askey RT5010W IPQ8072A technical discussion - #1057 by sqrwv ?

nope ... I am not running wifi nor wpad ... and as I remember the issue was not about Unable to handle kernel access to user memory outside uaccess r ... besides it is only showing this issue with this latest kernel ...

this issue happens even if rmmod all of the ath modules ...

so I end up ... reformatting the mtd18 and restore a backup ...

How to activate the Serial Console ?

1 Like