greearb / ath10k-ct

Stand-alone ath10k driver based on Candela Technologies Linux kernel.
110 stars 40 forks source link

ipq40xx: invalid VHT TX rate code 0xff. Is that right? #188

Open siwind opened 2 years ago

siwind commented 2 years ago

My router is ipq40xx/ipq4019 platform with openwrt latest master branch.

root@OpenWrt:~# opkg list | grep ath10k
ath10k-board-qca4019 - 20210511-1
ath10k-firmware-qca4019-ct - 2020-11-08-1
kmod-ath10k-ct - 5.4.152+2021-09-22-e6a7d5b5-5
root@OpenWrt:~# cat /etc/openwrt_release 
DISTRIB_ID='OpenWrt'
DISTRIB_RELEASE='SNAPSHOT'
DISTRIB_REVISION='r18110+57-fb073aaebd'
DISTRIB_TARGET='ipq40xx/generic'
DISTRIB_ARCH='arm_cortex-a7_neon-vfpv4'
DISTRIB_DESCRIPTION='OpenWrt SNAPSHOT r18110+57-fb073aaebd'
DISTRIB_TAINTS='no-all busybox'
root@OpenWrt:~# uname -a
Linux OpenWrt 5.4.152 #0 SMP Mon Oct 11 16:20:53 2021 armv7l GNU/Linux

Following is the "dmesg log":

[   61.406933] ath10k_ahb a000000.wifi: qca4019 hw1.0 target 0x01000000 chip_id 0x003b00ff sub 0000:0000
[   61.406983] ath10k_ahb a000000.wifi: kconfig debug 0 debugfs 1 tracing 0 dfs 1 testmode 0
[   61.418874] ath10k_ahb a000000.wifi: firmware ver 10.4b-ct-4019-fW-13-5ae337bb1 api 5 features mfp,peer-flow-ctrl,txstatus-noack,wmi-10.x-CT,ratemask-CT,regdump-CT,txrate-CT,flush-all-CT,pingpong-CT,ch-regs-CT,nop-CT,set-special-CT,tx-rc-CT,cust-stats-CT,txrate2-CT,beacon-cb-CT,wmi-block-ack-CT,wmi-bcn-rc-CT crc32 6b2b5c5b
[   61.471125] ath10k_ahb a000000.wifi: board_file api 2 bmi_id 0:16 crc32 6ce1f887
[   62.759355] ath10k_ahb a000000.wifi: 10.4 wmi init: vdevs: 16  peers: 48  tid: 96
[   62.759400] ath10k_ahb a000000.wifi: msdu-desc: 2500  skid: 32
[   62.795425] ath10k_ahb a000000.wifi: wmi print 'P 48/48 V 16 K 144 PH 176 T 186  msdu-desc: 2500  sw-crypt: 0 ct-sta: 0'
[   62.796416] ath10k_ahb a000000.wifi: wmi print 'free: 53252 iram: 13432 sram: 35752'
[   62.957770] ath10k_ahb a000000.wifi: htt-ver 2.2 wmi-op 6 htt-op 4 cal pre-cal-file max-sta 32 raw 0 hwcrypto 1
[   63.076376] ath: EEPROM regdomain sanitized
[   63.076405] ath: EEPROM regdomain: 0x64
[   63.076418] ath: EEPROM indicates we should expect a direct regpair map
[   63.076455] ath: Country alpha2 being used: 00
[   63.076468] ath: Regpair used: 0x64
[   63.875881] ath10k_ahb a800000.wifi: qca4019 hw1.0 target 0x01000000 chip_id 0x003b00ff sub 0000:0000
[   63.875929] ath10k_ahb a800000.wifi: kconfig debug 0 debugfs 1 tracing 0 dfs 1 testmode 0
[   63.896554] ath10k_ahb a800000.wifi: firmware ver 10.4b-ct-4019-fW-13-5ae337bb1 api 5 features mfp,peer-flow-ctrl,txstatus-noack,wmi-10.x-CT,ratemask-CT,regdump-CT,txrate-CT,flush-all-CT,pingpong-CT,ch-regs-CT,nop-CT,set-special-CT,tx-rc-CT,cust-stats-CT,txrate2-CT,beacon-cb-CT,wmi-block-ack-CT,wmi-bcn-rc-CT crc32 6b2b5c5b
[   63.943048] ath10k_ahb a800000.wifi: board_file api 2 bmi_id 0:17 crc32 6ce1f887
[   65.232218] ath10k_ahb a800000.wifi: 10.4 wmi init: vdevs: 16  peers: 48  tid: 96
[   65.232270] ath10k_ahb a800000.wifi: msdu-desc: 2500  skid: 32
[   65.268029] ath10k_ahb a800000.wifi: wmi print 'P 48/48 V 16 K 144 PH 176 T 186  msdu-desc: 2500  sw-crypt: 0 ct-sta: 0'
[   65.269017] ath10k_ahb a800000.wifi: wmi print 'free: 53252 iram: 13432 sram: 35752'
[   65.394240] ath10k_ahb a800000.wifi: htt-ver 2.2 wmi-op 6 htt-op 4 cal pre-cal-file max-sta 32 raw 0 hwcrypto 1
[   65.539944] ath: EEPROM regdomain sanitized
[   65.539958] ath: EEPROM regdomain: 0x64
[   65.539963] ath: EEPROM indicates we should expect a direct regpair map
[   65.539974] ath: Country alpha2 being used: 00
[   65.539978] ath: Regpair used: 0x64
[   65.547107] kmodloader: done loading kernel modules from /etc/modules.d/*
[   76.724600] device eth0 entered promiscuous mode
[   76.725239] br-lan: port 1(eth0.1) entered blocking state
[   76.728306] br-lan: port 1(eth0.1) entered disabled state
[   76.734208] device eth0.1 entered promiscuous mode
[   76.742686] br-lan: port 1(eth0.1) entered blocking state
[   76.743685] br-lan: port 1(eth0.1) entered forwarding state
[   77.444499] pppoe-wan: renamed from ppp0
[   77.644057] ath: EEPROM regdomain: 0x8024
[   77.644069] ath: EEPROM indicates we should expect a country code
[   77.644113] ath: doing EEPROM country->regdmn map search
[   77.644127] ath: country maps to regdmn code: 0x3b
[   77.644133] ath: Country alpha2 being used: AU
[   77.644154] ath: Regpair used: 0x3b
[   77.644160] ath: regdomain 0x8024 dynamically updated by user
[   77.644189] ath: EEPROM regdomain: 0x8024
[   77.644215] ath: EEPROM indicates we should expect a country code
[   77.644220] ath: doing EEPROM country->regdmn map search
[   77.644224] ath: country maps to regdmn code: 0x3b
[   77.644229] ath: Country alpha2 being used: AU
[   77.644233] ath: Regpair used: 0x3b
[   77.644238] ath: regdomain 0x8024 dynamically updated by user
[   77.750465] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
[   77.751402] IPv6: ADDRCONF(NETDEV_CHANGE): br-lan: link becomes ready
[   77.783144] netlink: 'iw': attribute type 302 has an invalid length.
[   79.900033] ath10k_ahb a800000.wifi: 10.4 wmi init: vdevs: 16  peers: 48  tid: 96
[   79.900081] ath10k_ahb a800000.wifi: msdu-desc: 2500  skid: 32
[   79.935879] ath10k_ahb a800000.wifi: wmi print 'P 48/48 V 16 K 144 PH 176 T 186  msdu-desc: 2500  sw-crypt: 0 ct-sta: 0'
[   79.937472] ath10k_ahb a800000.wifi: wmi print 'free: 53252 iram: 13432 sram: 35752'
[   80.221444] ath10k_ahb a800000.wifi: rts threshold -1
[   80.221830] ath10k_ahb a800000.wifi: Firmware lacks feature flag indicating a retry limit of > 2 is OK, requested limit: 4
[   80.244224] netlink: 'iw': attribute type 302 has an invalid length.
[   80.252043] br-lan: port 2(wlan1) entered blocking state
[   80.252079] br-lan: port 2(wlan1) entered disabled state
[   80.256842] device wlan1 entered promiscuous mode
[   80.425085] ath10k_ahb a800000.wifi: NOTE:  Firmware DBGLOG output disabled in debug_mask: 0x10000000
[   80.985968] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready
[   80.988198] br-lan: port 2(wlan1) entered blocking state
[   80.992187] br-lan: port 2(wlan1) entered forwarding state
[   82.601269] ath10k_ahb a000000.wifi: 10.4 wmi init: vdevs: 16  peers: 48  tid: 96
[   82.601315] ath10k_ahb a000000.wifi: msdu-desc: 2500  skid: 32
[   82.636895] ath10k_ahb a000000.wifi: wmi print 'P 48/48 V 16 K 144 PH 176 T 186  msdu-desc: 2500  sw-crypt: 0 ct-sta: 0'
[   82.639376] ath10k_ahb a000000.wifi: wmi print 'free: 53252 iram: 13432 sram: 35752'
[   82.979248] ath10k_ahb a000000.wifi: rts threshold -1
[   82.981161] ath10k_ahb a000000.wifi: Firmware lacks feature flag indicating a retry limit of > 2 is OK, requested limit: 4
[   82.992736] br-lan: port 3(wlan0) entered blocking state
[   82.994348] br-lan: port 3(wlan0) entered disabled state
[   83.000413] device wlan0 entered promiscuous mode
[   95.590891] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
[   95.593445] br-lan: port 3(wlan0) entered blocking state
[   95.597629] br-lan: port 3(wlan0) entered forwarding state
[  127.141647] ath10k_ahb a800000.wifi: Invalid VHT mcs 15 peer stats
[  264.508749] ath10k_ahb a800000.wifi: htt tx: fixing invalid VHT TX rate code 0xff
[10643.295362] ath10k_ahb a000000.wifi: wmi: fixing invalid VHT TX rate code 0xff