Closed yuhhaurlin closed 6 years ago
Mine has been up 31hours 44 minutes (dd-wrt 33816) Samsung S7 in and out of range along with other clients.
@05dyna Can you open a separate issue please since you are not testing these wifi devices or host command timeout? it seems it will make this thread easier to follow.
Weird messages using latest mwlwifi code, the logs are flooding with these messages.
Nov 28 22:54:06 WRT3200ACM daemon.info hostapd: ath1: STA fc:a6:67:5c:32:07 IEEE 802.11: associated (aid 3) Nov 28 22:54:06 WRT3200ACM daemon.info hostapd: ath1: STA fc:a6:67:5c:32:07 RADIUS: starting accounting session 011F7EC532C44095 Nov 28 22:54:06 WRT3200ACM daemon.info hostapd: ath1: STA fc:a6:67:5c:32:07 WPA: pairwise key handshake completed (RSN) Nov 28 22:54:06 WRT3200ACM daemon.info hostapd: ath0: STA fc:a6:67:c8:aa:45 IEEE 802.11: Station does not support mandatory VHT PHY - reject association Nov 28 22:54:06 WRT3200ACM daemon.info hostapd: ath0: STA fc:a6:67:c8:aa:45 IEEE 802.11: Station does not support mandatory VHT PHY - reject association Nov 28 22:54:06 WRT3200ACM daemon.info hostapd: ath0: STA fc:a6:67:c8:aa:45 IEEE 802.11: Station does not support mandatory VHT PHY - reject association Nov 28 22:54:06 WRT3200ACM daemon.info hostapd: ath0: STA fc:a6:67:c8:aa:45 IEEE 802.11: Station does not support mandatory VHT PHY - reject association Nov 28 22:54:06 WRT3200ACM daemon.info hostapd: ath0: STA fc:a6:67:c8:aa:45 IEEE 802.11: Station does not support mandatory VHT PHY - reject association Nov 28 22:54:06 WRT3200ACM daemon.info hostapd: ath0: STA fc:a6:67:c8:aa:45 IEEE 802.11: Station does not support mandatory VHT PHY - reject association Nov 28 22:54:06 WRT3200ACM daemon.info hostapd: ath1: STA fc:a6:67:5c:32:07 IEEE 802.11: associated (aid 3) Nov 28 22:54:06 WRT3200ACM daemon.info hostapd: ath1: STA fc:a6:67:5c:32:07 RADIUS: starting accounting session 011F7EC532C44095 Nov 28 22:54:06 WRT3200ACM daemon.info hostapd: ath1: STA fc:a6:67:5c:32:07 WPA: pairwise key handshake completed (RSN) Nov 28 22:54:06 WRT3200ACM daemon.info hostapd: ath0: STA fc:a6:67:c8:aa:45 IEEE 802.11: Station does not support mandatory VHT PHY - reject association Nov 28 22:54:06 WRT3200ACM daemon.info hostapd: ath0: STA fc:a6:67:c8:aa:45 IEEE 802.11: Station does not support mandatory VHT PHY - reject association Nov 28 22:54:06 WRT3200ACM daemon.info hostapd: ath0: STA fc:a6:67:c8:aa:45 IEEE 802.11: Station does not support mandatory VHT PHY - reject association Nov 28 22:54:06 WRT3200ACM daemon.info hostapd: ath0: STA fc:a6:67:c8:aa:45 IEEE 802.11: Station does not support mandatory VHT PHY - reject association Nov 28 22:54:06 WRT3200ACM daemon.info hostapd: ath0: STA fc:a6:67:c8:aa:45 IEEE 802.11: Station does not support mandatory VHT PHY - reject association Nov 28 22:54:06 WRT3200ACM daemon.info hostapd: ath0: STA fc:a6:67:c8:aa:45 IEEE 802.11: Station does not support mandatory VHT PHY - reject association
root@WRT3200ACM:~# cat /sys/kernel/debug/ieee80211/phy0/mwlwifi/info
driver name: mwlwifi chip type: 88W8964 hw version: 7 driver version: 10.3.4.0-20170810 firmware version: 0x0903bee1 power table loaded from dts: no firmware region code: 0x0 mac address: 60:38:e0:b9:8d:d2 2g: enable 5g: enable antenna: 4 4 irq number: 46 ap macid support: 0000ffff sta macid support: 00010000 macid used: 00000001 radio: enable iobase0: e0c00000 iobase1: e0e80000 tx limit: 1024 rx limit: 16384
root@WRT3200ACM:~# cat /sys/kernel/debug/ieee80211/phy1/mwlwifi/info
driver name: mwlwifi chip type: 88W8964 hw version: 7 driver version: 10.3.4.0-20170810 firmware version: 0x0903bee1 power table loaded from dts: no firmware region code: 0x0 mac address: 60:38:e0:b9:8d:d1 2g: enable 5g: disable antenna: 4 4 irq number: 47 ap macid support: 0000ffff sta macid support: 00010000 macid used: 00000003 radio: enable iobase0: e1000000 iobase1: e1280000 tx limit: 1024 rx limit: 16384
root@WRT3200ACM:~# iw dev phy#1 Interface ath1.1 ifindex 11 wdev 0x100000003 addr 62:38:e0:b9:8d:d4 ssid The Promised LAN type AP channel 1 (2412 MHz), width: 20 MHz, center1: 2412 MHz txpower 30.00 dBm Interface ath1 ifindex 10 wdev 0x100000002 addr 60:38:e0:b9:8d:d3 ssid Abraham Linksys type AP channel 1 (2412 MHz), width: 20 MHz, center1: 2412 MHz txpower 30.00 dBm phy#0 Interface ath0 ifindex 9 wdev 0x2 addr 60:38:e0:b9:8d:d2 ssid House Stark type AP channel 153 (5765 MHz), width: 80 MHz, center1: 5775 MHz txpower 30.00 dBm
@BrainSlayer v.33857
Nov 28 16:53:45 WRT3200ACM user.err : Caught SIGSEGV (11) in json_object_iter_next Nov 28 16:53:45 WRT3200ACM user.err : Thread 2614: startservice Nov 28 16:53:45 WRT3200ACM user.err : === Context: Nov 28 16:53:45 WRT3200ACM user.err : TRAPNO:0000000e ERRCODE:00000017 OLDMASK:00000000 R0:b6e71f40 Nov 28 16:53:45 WRT3200ACM user.err : R1:b6ec8498 R2:be993a10 R3:00000000 R4:b6ec8498 Nov 28 16:53:45 WRT3200ACM user.err : R5:00000000 R6:b6eb2860 R7:ffffffff R8:b6ec8470 Nov 28 16:53:45 WRT3200ACM user.err : R9:b6ec84a8 R10:b6e71eb0 FP:b6e71eb0 IP:b6d42028 Nov 28 16:53:45 WRT3200ACM user.err : SP:be9939b0 LR:b6d30c60 PC:b6d1b354 CPSR:60000010 Nov 28 16:53:45 WRT3200ACM user.err : FAULTADDR:00000008 Nov 28 16:53:45 WRT3200ACM user.err : === Backtrace: Nov 28 16:53:45 WRT3200ACM user.err : # Searching frame 0 (FP=0xb6e71eb0, PC=0xb6d1b354) Nov 28 16:53:45 WRT3200ACM user.err : # PC-1d0[0xb6d1b184]: 0xe92d4ff0 stmfd sp! Nov 28 16:53:45 WRT3200ACM user.err : # FP-00[0xb6e71eb0]: 0x00000000 {LR} Nov 28 16:53:45 WRT3200ACM user.err : # FP-04[0xb6e71eac]: 0x00000091 {FP} Nov 28 16:53:45 WRT3200ACM user.err : # FP-08[0xb6e71ea8]: 0x000000e1 {R10} Nov 28 16:53:45 WRT3200ACM user.err : # FP-0c[0xb6e71ea4]: 0x00000000 {R9} Nov 28 16:53:45 WRT3200ACM user.err : # FP-10[0xb6e71ea0]: 0x00000000 {R8} Nov 28 16:53:45 WRT3200ACM user.err : # FP-14[0xb6e71e9c]: 0x00000000 {R7} Nov 28 16:53:45 WRT3200ACM user.err : # FP-18[0xb6e71e98]: 0x00000000 {R6} Nov 28 16:53:45 WRT3200ACM user.err : # FP-1c[0xb6e71e94]: 0x342e6f73 {R5} Nov 28 16:53:45 WRT3200ACM user.err : # FP-20[0xb6e71e90]: 0x2e6e6f73 {R4} Nov 28 16:53:45 WRT3200ACM user.err : # Crashed at /usr/lib/libjson-c.so.20xb6d18000[0xb6d1b354] Nov 28 16:53:45 WRT3200ACM user.err : # Searching frame 1 (FP=0x00000091, PC=0x00000000) Nov 28 16:53:45 WRT3200ACM user.err : # Instruction at 0x00000000 is not mapped; terminating backtrace. Nov 28 16:53:45 WRT3200ACM user.err : /usr/lib/libjson-c.so.20xb6d18000[0xb6d1b354] Nov 28 16:53:45 WRT3200ACM user.err : ???(+0)[0x00000000] Nov 28 16:53:45 WRT3200ACM user.err : === Code: Nov 28 16:53:45 WRT3200ACM user.err : b6d1b314: 00002dfb 00003160 00002db3 00003130 00002d9f 000030f0 00002d4d 00002cb0 Nov 28 16:53:45 WRT3200ACM user.err : b6d1b334: 00002c96 e92d4010 ebfffd5f e5900020 e8bd8010 e3a00000 e12fff1e e5903000 Nov 28 16:53:45 WRT3200ACM user.err : b6d1b354: >e5933008 e5803000 e12fff1e e5903000 e5930000 e12fff1e e5903000 e5930004 Nov 28 16:53:45 WRT3200ACM user.err : b6d1b374: e12fff1e e5900000 e5913000 e0400003 e16f0f10 e1a002a0 e12fff1e e3a00000
Something just happened, Wifi started to malfunction but router didn't completely lockup or reset, I was able to get this via dmesg.
[ 1979.526968] Unable to handle kernel NULL pointer dereference at virtual address 00000000
[ 1979.535129] pgd = d4a74000
[ 1979.537846] [00000000] pgd=149d5831, pte=00000000, *ppte=00000000
[ 1979.544176] Internal error: Oops: 17 [#1] SMP ARM
[ 1979.548899] Modules linked in: xt_IMQ imq nf_nat_pptp nf_conntrack_pptp nf_nat_proto_gre nf_conntrack_proto_gre cifs fscache xt_opendpi xt_physdev xt_DSCP xt_dscp ext4 jbd2 mbcache ledtrig_usbport pwrseq_simple pwrseq_emmc ahci_mvebu ahci_platform ahci libahci_platform libahci ehci_orion sata_mv usb_storage sd_mod xhci_plat_hcd xhci_pci xhci_hcd ehci_pci ehci_platform ehci_hcd usbcore usb_common btmrvl_sdio btmrvl bluetooth mwifiex_sdio mvsdio sdhci_pxav3 sdhci_pltfm sdhci mmc_block mmc_core mwifiex mwlwifi mac80211 cfg80211 compat mii tmp421 pwm_fan leds_pca963x leds_tlc591xx orion_wdt [last unloaded: shortcut_fe]
[ 1979.604189] CPU: 0 PID: 2255 Comm: cron Not tainted 4.9.65 #78
[ 1979.610045] Hardware name: Marvell Armada 380/385 (Device Tree)
[ 1979.615988] task: d48cb0c0 task.stack: d4a04000
[ 1979.620542] PC is at anon_vma_clone+0x9c/0x1b0
[ 1979.625003] LR is at 0x1
[ 1979.627546] pc : [
These log messages are not related to mwlwifi. Please make you can reproduce problem on LEDE, then you can create an issue to track it. I will set a formal release version to mwlwifi today, so we can have a stable version before checking in new firmware and modifications for WDS.
@yuhhaurlin I would have loved to say it was ok, this night returned near the router and this happened
Wed Nov 29 01:24:23 2017 daemon.info hostapd: wlan0: STA 40:40:a7:xx:xx:xx IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Wed Nov 29 01:26:54 2017 daemon.notice hostapd: wlan0: AP-STA-POLL-OK a4:e4:b8:xx:xx:xx
Wed Nov 29 01:28:00 2017 cron.info crond[1651]: USER root pid 24256 cmd /etc/checkip
Wed Nov 29 01:30:29 2017 daemon.info hostapd: wlan0: STA 40:40:a7:xx:xx:xx IEEE 802.11: associated (aid 2)
Wed Nov 29 01:30:29 2017 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 40:40:a7:xx:xx:xx
Wed Nov 29 01:30:29 2017 daemon.info hostapd: wlan0: STA 40:40:a7:xx:xx:xx RADIUS: starting accounting session 5B6EE1867D7507C6
Wed Nov 29 01:30:29 2017 daemon.info hostapd: wlan0: STA 40:40:a7:xx:xx:xx WPA: pairwise key handshake completed (RSN)
Wed Nov 29 01:30:31 2017 daemon.info hostapd: wlan0: STA 40:40:a7:xx:xx:xx IEEE 802.11: authenticated
Wed Nov 29 01:31:57 2017 daemon.notice hostapd: wlan0: AP-STA-POLL-OK a4:e4:b8:xx:xx:xx
Wed Nov 29 01:35:00 2017 cron.info crond[1651]: USER root pid 24266 cmd /etc/checkip
Wed Nov 29 01:37:00 2017 daemon.notice hostapd: wlan0: AP-STA-POLL-OK a4:e4:b8:xx:xx:xx
Wed Nov 29 01:40:16 2017 kern.info kernel: [132613.957033] ieee80211 phy0: staid 1 deleted
Wed Nov 29 01:40:16 2017 daemon.info hostapd: wlan0: STA a4:e4:b8:xx:xx:xx IEEE 802.11: associated (aid 1)
Wed Nov 29 01:40:25 2017 kern.err kernel: [132623.079573] ieee80211 phy0: cmd 0x9111=SetNewStation timed out
Wed Nov 29 01:40:25 2017 kern.err kernel: [132623.085528] ieee80211 phy0: return code: 0x1111
Wed Nov 29 01:40:25 2017 kern.err kernel: [132623.090163] ieee80211 phy0: timeout: 0x1111
Wed Nov 29 01:40:25 2017 daemon.info hostapd: wlan0: STA a4:e4:b8:xx:xx:xx IEEE 802.11: deauthenticated due to local deauth request
Wed Nov 29 01:42:00 2017 cron.info crond[1651]: USER root pid 24286 cmd /etc/checkip
Wed Nov 29 01:44:44 2017 daemon.notice hostapd: wlan0: AP-STA-POLL-OK 40:40:a7:xx:xx:xx
Wed Nov 29 01:44:48 2017 kern.err kernel: [132886.097331] ieee80211 phy0: cmd 0x9143=GetSeqno timed out
Wed Nov 29 01:44:48 2017 kern.err kernel: [132886.102851] ieee80211 phy0: return code: 0x1143
Wed Nov 29 01:44:48 2017 kern.err kernel: [132886.107486] ieee80211 phy0: timeout: 0x1143
Wed Nov 29 01:49:00 2017 cron.info crond[1651]: USER root pid 24295 cmd /etc/checkip
Wed Nov 29 01:49:47 2017 kern.warn kernel: [133185.061714] ieee80211 phy0: can't send packet during ADDBA
Wed Nov 29 01:49:50 2017 daemon.notice hostapd: wlan0: AP-STA-DISCONNECTED 40:40:a7:xx:xx:xx
Wed Nov 29 01:49:50 2017 daemon.info hostapd: wlan0: STA 40:40:a7:xx:xx:xx IEEE 802.11: disassociated due to inactivity
Wed Nov 29 01:49:54 2017 kern.err kernel: [133192.070394] ieee80211 phy0: cmd 0x9122=UpdateEncryption timed out
Wed Nov 29 01:49:54 2017 kern.err kernel: [133192.076612] ieee80211 phy0: return code: 0x1122
Wed Nov 29 01:49:54 2017 kern.err kernel: [133192.081248] ieee80211 phy0: timeout: 0x1122
Wed Nov 29 01:49:54 2017 kern.err kernel: [133192.085541] wlan0: failed to remove key (0, 40:40:a7:xx:xx:xx) from hardware (-5)
Wed Nov 29 01:49:54 2017 daemon.info hostapd: wlan0: STA 40:40:a7:xx:xx:xx IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Wed Nov 29 01:49:58 2017 kern.err kernel: [133196.094330] ieee80211 phy0: cmd 0x9125=BAStream timed out
Wed Nov 29 01:49:58 2017 kern.err kernel: [133196.099843] ieee80211 phy0: return code: 0x1125
Wed Nov 29 01:49:58 2017 kern.err kernel: [133196.104488] ieee80211 phy0: timeout: 0x1125
Wed Nov 29 01:50:02 2017 kern.err kernel: [133200.108266] ieee80211 phy0: cmd 0x9125=BAStream timed out
Wed Nov 29 01:50:02 2017 kern.err kernel: [133200.113784] ieee80211 phy0: return code: 0x1125
Wed Nov 29 01:50:02 2017 kern.err kernel: [133200.118434] ieee80211 phy0: timeout: 0x1125
Wed Nov 29 01:50:06 2017 kern.err kernel: [133204.121979] ieee80211 phy0: cmd 0x9125=BAStream timed out
Wed Nov 29 01:50:06 2017 kern.err kernel: [133204.127497] ieee80211 phy0: return code: 0x1125
Wed Nov 29 01:50:06 2017 kern.err kernel: [133204.132132] ieee80211 phy0: timeout: 0x1125
Wed Nov 29 01:50:10 2017 kern.err kernel: [133208.135795] ieee80211 phy0: cmd 0x9125=BAStream timed out
Wed Nov 29 01:50:10 2017 kern.err kernel: [133208.141307] ieee80211 phy0: return code: 0x1125
Wed Nov 29 01:50:10 2017 kern.err kernel: [133208.145954] ieee80211 phy0: timeout: 0x1125
Wed Nov 29 01:50:10 2017 kern.alert kernel: [133208.150391] Unable to handle kernel NULL pointer dereference at virtual address 0000000c
Wed Nov 29 01:50:10 2017 kern.alert kernel: [133208.158612] pgd = d5754000
Wed Nov 29 01:50:10 2017 kern.alert kernel: [133208.161415] [0000000c] *pgd=14933831, *pte=00000000, *ppte=00000000
Wed Nov 29 01:50:10 2017 kern.emerg kernel: [133208.167830] Internal error: Oops: 17 [#1] SMP ARM
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.172638] Modules linked in: pppoe ppp_async l2tp_ppp cdc_mbim qmi_wwan pppox ppp_mppe ppp_generic nf_conntrack_netlink nf_conntrack_ipv6 iptable_nat ipt_REJECT ipt_MASQUERADE huawei_cdc_ncm dm9601 cdc_subset cdc_ncm xt_time xt_tcpudp xt_tcpmss xt_statistic xt_state xt_recent xt_quota xt_policy xt_pkttype xt_physdev xt_owner xt_nat xt_multiport xt_mark xt_mac xt_limit xt_length xt_hl xt_helper xt_esp xt_ecn xt_dscp xt_conntrack xt_connmark xt_connlimit xt_connbytes xt_comment xt_addrtype xt_TCPMSS xt_REDIRECT xt_NETMAP xt_LOG xt_HL xt_DSCP xt_CLASSIFY wireguard usbnet slhc rfcomm r8152 nfnetlink nf_reject_ipv4 nf_nat_redirect nf_nat_masquerade_ipv4 nf_conntrack_ipv4 nf_nat_ipv4 nf_nat nf_log_ipv4 nf_defrag_ipv6 nf_defrag_ipv4 nf_conntrack_rtcache nf_conntrack iptable_mangle iptable_filter ipt_ah
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.244183] ipt_ECN ip_tables hidp hci_uart crc_ccitt cdc_wdm btusb btmrvl_sdio btmrvl btintel br_netfilter bnep bluetooth hid evdev input_core mwlwifi mac80211 cfg80211 compat cryptodev ip6t_rt ip6t_frag ip6t_hbh ip6t_eui64 ip6t_mh ip6t_ah ip6t_ipv6header ip6t_REJECT nf_reject_ipv6 nf_log_ipv6 nf_log_common ip6table_mangle ip6table_filter ip6_tables x_tables ip_gre gre l2tp_netlink l2tp_core udp_tunnel ip6_udp_tunnel ipcomp6 xfrm6_tunnel xfrm6_mode_tunnel xfrm6_mode_transport xfrm6_mode_beet esp6 ah6 ipcomp xfrm4_tunnel xfrm4_mode_tunnel xfrm4_mode_transport xfrm4_mode_beet esp4 ah4 tunnel6 tunnel4 ip_tunnel af_key xfrm_user xfrm_ipcomp xfrm_algo vfat fat ntfs nls_utf8 nls_iso8859_1 nls_cp437 regmap_mmio sha256_generic jitterentropy_rng drbg md5 hmac echainiv ecb cmac cbc authenc gpio_button_hotplug mii
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.315305] CPU: 1 PID: 2712 Comm: hostapd Not tainted 4.9.65 #0
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.321421] Hardware name: Marvell Armada 380/385 (Device Tree)
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.327451] task: ded2e140 task.stack: d34b4000
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.332097] PC is at mwl_fwcmd_destroy_ba+0x98/0xf4 [mwlwifi]
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.337958] LR is at mwl_fwcmd_destroy_ba+0x34/0xf4 [mwlwifi]
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.343814] pc : [<bf1f5624>] lr : [<bf1f55c0>] psr: 60000013
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.343814] sp : d34b5c80 ip : 00000000 fp : 00000000
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.355512] r10: ddd40000 r9 : ddd400a8 r8 : ddd400b4
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.360843] r7 : ddec1620 r6 : ddec2924 r5 : 00000000 r4 : de348000
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.367482] r3 : 00000000 r2 : 00000002 r1 : 00000000 r0 : 00000000
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.374122] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.381373] Control: 10c5387d Table: 1575404a DAC: 00000051
Wed Nov 29 01:50:11 2017 kern.emerg kernel: [133208.387228] Process hostapd (pid: 2712, stack limit = 0xd34b4210)
Wed Nov 29 01:50:11 2017 kern.emerg kernel: [133208.393432] Stack: (0xd34b5c80 to 0xd34b6000)
Wed Nov 29 01:50:11 2017 kern.emerg kernel: [133208.397894] 5c80: ddd400b4 0000000f d1d1b5d8 ddec45e0 ddec0be0 bf1f5ac8 d1d1b5d8 ddec1620
Wed Nov 29 01:50:11 2017 kern.emerg kernel: [133208.406192] 5ca0: ddec0be0 db1b5314 de351ce0 de7fe800 00000014 bf1f0b94 d1d1b000 00000002
Wed Nov 29 01:50:11 2017 kern.emerg kernel: [133208.414490] 5cc0: 00000001 db1b5314 dc462840 de7fe800 00000014 bf183ca4 ddec0be0 de3514c0
Wed Nov 29 01:50:11 2017 kern.emerg kernel: [133208.422789] 5ce0: d1d1b000 bf1862e4 00000002 00000002 d1d1b000 ddec0be0 de3514c0 bf187278
Wed Nov 29 01:50:11 2017 kern.emerg kernel: [133208.431086] 5d00: d1d1b000 00000000 00000000 d1d1b000 db1b5320 bf1873c4 de3514c0 00000454
Wed Nov 29 01:50:11 2017 kern.emerg kernel: [133208.439385] 5d20: db1b5320 bf18743c ddec0000 de351000 d34b5d68 bf153dd8 db1b5320 0002000c
Wed Nov 29 01:50:11 2017 kern.emerg kernel: [133208.447683] 5d40: d34b5d68 dc462840 df57c000 bf1426e8 00000000 df57c1fc df57c000 c03c3878
Wed Nov 29 01:50:11 2017 kern.emerg kernel: [133208.455981] 5d60: bf16f4a2 80150014 5a1c0183 0000071d db1b5300 db1b5310 daf13900 de7fe800
Wed Nov 29 01:50:11 2017 kern.emerg kernel: [133208.464279] 5d80: ddec0000 de351000 db1b5300 dc462840 c03c35f0 ddd15800 d34b5dcc 00000000
Wed Nov 29 01:50:11 2017 kern.emerg kernel: [133208.472578] 5da0: 00000008 c03c2c14 c063e0b0 dc462840 dc462840 c03c35dc df4ba400 00000028
Wed Nov 29 01:50:11 2017 kern.emerg kernel: [133208.480876] 5dc0: dc462840 c03c2618 ddd15800 7fffffff 00000000 dc462840 00000000 d34b5f68
Wed Nov 29 01:50:11 2017 kern.emerg kernel: [133208.489174] 5de0: 00000028 ddd15800 00000000 c03c2a84 00000000 c021df4c 00000028 d3482f40
Wed Nov 29 01:50:11 2017 kern.emerg kernel: [133208.497472] 5e00: 00000000 00000a98 00000000 00000000 00000001 d34b5f68 00000000 d34b5e8c
Wed Nov 29 01:50:11 2017 kern.emerg kernel: [133208.505770] 5e20: df1e2c00 00000000 c0618fc8 00000000 00000000 c0381824 d34b5f68 c0381db4
Wed Nov 29 01:50:11 2017 kern.emerg kernel: [133208.514067] 5e40: 00000000 00000000 00000000 0042b010 00000028 bec2fbac 00000000 d34b5eb4
Wed Nov 29 01:50:11 2017 kern.emerg kernel: [133208.522365] 5e60: df1e2c00 c0381fac c0614ec0 00000000 bec2fc04 0043f030 00004000 c004f1c0
Wed Nov 29 01:50:11 2017 kern.emerg kernel: [133208.530663] 5e80: dfbdfef0 ffffffff 337143a8 00007923 00000000 00000000 0118b5e5 00000000
Wed Nov 29 01:50:11 2017 kern.emerg kernel: [133208.538960] 5ea0: dfbdfef0 00000000 e7485430 00000010 00000000 00000000 00000000 00000000
Wed Nov 29 01:50:11 2017 kern.emerg kernel: [133208.547258] 5ec0: dfbdfef0 c0619998 c0614ec0 00000000 d34b5f8c c0055078 df401080 d348a700
Wed Nov 29 01:50:11 2017 kern.emerg kernel: [133208.555556] 5ee0: 00000000 d348a700 df375e20 c00f2a44 df375e84 00000007 00000000 00000000
Wed Nov 29 01:50:11 2017 kern.emerg kernel: [133208.563855] 5f00: ded2e140 c005aca0 d34b5f08 d34b5f08 df401180 df375e00 ffffffff 00000000
Wed Nov 29 01:50:11 2017 kern.emerg kernel: [133208.572154] 5f20: 00000002 c0043634 d2e52018 00040941 de035880 df1e2c00 bec2fc20 00000000
Wed Nov 29 01:50:11 2017 kern.emerg kernel: [133208.580452] 5f40: 00000128 c000ef04 d34b4000 00000000 b6f3a8d0 c0382b50 00000000 00000000
Wed Nov 29 01:50:11 2017 kern.emerg kernel: [133208.588750] 5f60: 00000000 fffffff7 d34b5eac 0000000c 00000001 00000000 00000000 d34b5e54
Wed Nov 29 01:50:11 2017 kern.emerg kernel: [133208.597048] 5f80: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Wed Nov 29 01:50:11 2017 kern.emerg kernel: [133208.605345] 5fa0: b6fb4110 c000ed40 00000000 00000000 00000005 bec2fc20 00000000 00000000
Wed Nov 29 01:50:11 2017 kern.emerg kernel: [133208.613643] 5fc0: 00000000 00000000 b6fb4110 00000128 b6fb1660 00000000 0002bbac b6f3a8d0
Wed Nov 29 01:50:11 2017 kern.emerg kernel: [133208.621941] 5fe0: bec2fbc8 bec2fbb4 b6f8b16c b6f8a638 60000010 00000005 00000000 00000000
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.630270] [<bf1f5624>] (mwl_fwcmd_destroy_ba [mwlwifi]) from [<bf1f5ac8>] (mwl_fwcmd_del_sta_streams+0x1d4/0x330 [mwlwifi])
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.641718] [<bf1f5ac8>] (mwl_fwcmd_del_sta_streams [mwlwifi]) from [<bf1f0b94>] (mwl_mac80211_sta_remove+0x38/0x1c4 [mwlwifi])
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.653375] [<bf1f0b94>] (mwl_mac80211_sta_remove [mwlwifi]) from [<bf183ca4>] (drv_sta_state+0x16c/0x184 [mac80211])
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.664157] [<bf183ca4>] (drv_sta_state [mac80211]) from [<bf1862e4>] (sta_info_move_state+0xbc/0x1d0 [mac80211])
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.674585] [<bf1862e4>] (sta_info_move_state [mac80211]) from [<bf187278>] (sta_set_sinfo+0x954/0xa80 [mac80211])
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.685099] [<bf187278>] (sta_set_sinfo [mac80211]) from [<bf1873c4>] (__sta_info_destroy+0x20/0x28 [mac80211])
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.695350] [<bf1873c4>] (__sta_info_destroy [mac80211]) from [<bf18743c>] (sta_info_destroy_addr_bss+0x2c/0x44 [mac80211])
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.706648] [<bf18743c>] (sta_info_destroy_addr_bss [mac80211]) from [<bf153dd8>] (nl80211_del_station+0xe8/0xf0 [cfg80211])
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.718020] [<bf153dd8>] (nl80211_del_station [cfg80211]) from [<bf1426e8>] (extack_doit+0x2c/0x70 [compat])
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.727987] [<bf1426e8>] (extack_doit [compat]) from [<c03c3878>] (genl_rcv_msg+0x288/0x310)
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.736550] [<c03c3878>] (genl_rcv_msg) from [<c03c2c14>] (netlink_rcv_skb+0x58/0xb4)
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.744500] [<c03c2c14>] (netlink_rcv_skb) from [<c03c35dc>] (genl_rcv+0x20/0x34)
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.752101] [<c03c35dc>] (genl_rcv) from [<c03c2618>] (netlink_unicast+0x138/0x1fc)
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.759877] [<c03c2618>] (netlink_unicast) from [<c03c2a84>] (netlink_sendmsg+0x2f0/0x310)
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.768267] [<c03c2a84>] (netlink_sendmsg) from [<c0381824>] (sock_sendmsg+0x14/0x24)
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.776218] [<c0381824>] (sock_sendmsg) from [<c0381db4>] (___sys_sendmsg+0x184/0x228)
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.784256] [<c0381db4>] (___sys_sendmsg) from [<c0382b50>] (__sys_sendmsg+0x40/0x64)
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.792209] [<c0382b50>] (__sys_sendmsg) from [<c000ed40>] (ret_fast_syscall+0x0/0x3c)
Wed Nov 29 01:50:11 2017 kern.emerg kernel: [133208.800248] Code: e5840010 e5d81004 e5c41014 e598c000 (e59c300c)
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.806512] ---[ end trace 1087e18106012c22 ]---
It looks like you did not use the latest commit.
If you use latest commit, AP-STA-POLL-OK should not happen.
I made a clean, replaced the git hash, deleted the tar.gz file from the download folder, I'm sure I made the update right, even unpacked the file and made a git pull on the sources and it told me i'm up to date. don't know how I could did it wrong
i'll try another time, clone the git repo, archive it and put it in the download folder
I will put a formal release version to mwlwifi today. You can test it and give me log if the problem is still happened. With latest commit if device is idle for the configured inactivity time, the client will be disconnected. Unless the code has problem.
looking at the logs, the xperia was dissociated about 2 hours after away, but the priv was still seen connected, the devices were away ~5 hours I'll wait for the new commit
No new commit, I will only put a version to mwlwifi today.
I'm still having no problems with the last version of dd-wrt with the latest commit. I can't get it to fail yet, I wonder how the others who are testing for this issue are still doing?
don't know why it didn't get the new commit last time
from the last update I don't have the AP-STA-POLL-OK
in the log files anymore, i'll keep you posted
This is the one with latest commit. I hope that works for you @lucize I think it may be good.
@yuhhaurlin : what about the firmware to be used ? this repo still has 0x09030008 as latest. dd-wrt and maybe other builds use 0x0903bee1. is your intention to commit the firmware change too ?
Please use 9.3.0.8. Firmware will be updated with WDS and the version will be 9.3.2.1.
@aaron1959 I was talking about the driver version, I use LEDE, now I think it would be ok, as the stations are disassociated when they are out of reach, had several out and in of range and for now is still ok, but only about 9h of uptime
just as information. dd-wrt still uses the more recent firmware since it shows better performance and not negative effects so far. if there are known issues which do not exist in 9.3.0.8, i will get back to the older version
Please use 9.3.0.8. 9.3.2.1 will be verified with WDS (under developement). If everything is all right, then it will be updated here. Version 0x0903bee1 is only a temporary version, please don't use it.
@lucize yes I was talking about the driver as well I believe this dd-wrt build contains the commits for the "new" driver just different firmware now.
@aaron1959 yes it contains latest changes. that was the reason for posting. so we get quick feedback about this issue
I'm still testing the heck out of this..
Trying very hard to cause the issue but it keeps functioning as expected it let's go of the 5 Ghz clients and re-acquires them with no issues and no errors in the logs. The logs look completely normal I have two days and some hours. The Samsung S7 can no longer bring it to it's knees.
I still have not been able to reproduce this issue or cause any router instability at all since the "Don't ack null or qos null data packet" commit. It's been smooth sailing with continuous uptime.
Thanks. I close this one. If you still encounter the same problem, please report here. If you encounter any other issues, please create another issue to track it.
what could be this?
Wed Nov 29 07:43:07 2017 daemon.info odhcpd[1480]: Using a RA lifetime of 0 seconds on br-lan
Wed Nov 29 07:43:11 2017 daemon.info odhcpd[1480]: Using a RA lifetime of 0 seconds on br-lan
Wed Nov 29 07:44:26 2017 daemon.info odhcpd[1480]: Using a RA lifetime of 0 seconds on br-lan
Wed Nov 29 07:44:27 2017 daemon.info odhcpd[1480]: Using a RA lifetime of 0 seconds on br-lan
Wed Nov 29 07:44:30 2017 daemon.info odhcpd[1480]: Using a RA lifetime of 0 seconds on br-lan
Wed Nov 29 07:44:35 2017 daemon.info odhcpd[1480]: Using a RA lifetime of 0 seconds on br-lan
Wed Nov 29 07:45:21 2017 daemon.info odhcpd[1480]: Using a RA lifetime of 0 seconds on br-lan
Wed Nov 29 07:45:26 2017 daemon.info odhcpd[1480]: Using a RA lifetime of 0 seconds on br-lan
[117118.644091] Unable to handle kernel paging request at virtual address 00060004
[117118.651435] pgd = c0004000
[117118.654239] [00060004] *pgd=00000000
[117118.657927] Internal error: Oops: 817 [#1] SMP ARM
[117118.662822] Modules linked in: pppoe ppp_async uvcvideo snd_usb_audio pppox ppp_generic nf_conntrack_ipv6 iptable_nat ipt_REJECT ipt_MASQUERADE xt_time xt_tcpudp xt_state xt_recent xt_quota xt_pkttype xt_physdev xt_owner xt_nat xt_multiport xt_mark xt_mac xt_limit xt_helper xt_conntrack xt_connmark xt_connlimit xt_connbytes xt_comment xt_addrtype xt_TCPMSS xt_REDIRECT xt_LOG videobuf2_v4l2 snd_usbmidi_lib slhc nf_reject_ipv4 nf_nat_redirect nf_nat_masquerade_ipv4 nf_conntrack_ipv4 nf_nat_ipv4 nf_nat nf_log_ipv4 nf_defrag_ipv6 nf_defrag_ipv4 nf_conntrack_rtcache nf_conntrack_netlink nf_conntrack iptable_mangle iptable_filter ip_tables input_core crc_ccitt br_netfilter videobuf2_vmalloc videobuf2_memops videobuf2_core v4l2_common videodev mwlwifi mac80211 cfg80211 compat cryptodev xt_set ip_set_list_set ip_set_hash_netiface ip_set_hash_netport ip_set_hash_netnet ip_set_hash_net ip_set_hash_netportnet ip_set_hash_mac ip_set_hash_ipportnet ip_set_hash_ipportip ip_set_hash_ipport ip_set_hash_ipmark ip_set_hash_ip ip_set_bitmap_port ip_set_bitmap_ipmac ip_set_bitmap_ip ip_set nfnetlink ip6t_REJECT nf_reject_ipv6 nf_log_ipv6 nf_log_common ip6table_mangle ip6table_filter ip6_tables x_tables nfsd nfs sit tunnel4 ip_tunnel tun snd_compress snd_pcm_oss snd_mixer_oss snd_pcm snd_timer snd_rawmidi snd_seq_device snd_hwdep snd soundcore lockd sunrpc grace dma_shared_buffer sha256_generic seqiv jitterentropy_rng drbg hmac ctr ccm cbc authenc gpio_button_hotplug exportfs
[117118.793565] CPU: 1 PID: 0 Comm: swapper/1 Not tainted 4.9.65 #0
[117118.799595] Hardware name: Marvell Armada 380/385 (Device Tree)
[117118.805625] task: df456f80 task.stack: df47c000
[117118.810263] PC is at detach_if_pending+0x94/0xb0
[117118.814985] LR is at try_to_del_timer_sync+0x3c/0x58
[117118.820056] pc : [
BootROM - 1.73 Booting from NAND flash
General initialization - Version: 1.0.0 AVS selection from EFUSE disabled (Skip reading EFUSE values) mvSysEnvIsFlavourReduced: TWSI Read of 'flavor' failed
Is that with the very latest commit? it doesn't seem to be so. Is your driver 10.3.4.0-20171129 ?
I don't think so. The last commit just free null and qos null packets without sending ack to upper layer. From the Oops, I can't figure out what causes this problem. How to reproduce it?
@aaron1959 @yuhhaurlin it looks so, look at the very recent kernel version. the previous version did have a different kernel version
but its also not clear where it crashed. the stackdump is curious. i just can see its related to a timer function
@BrainSlayer Yes.
The lastest fimware version has already the fix for this problem?
@s-pimenta YES!
Hi, now pls fix if you can the 1900acs :) unfourtunately theres nothing in logs except i think
Sun Dec 3 20:20:02 2017 daemon.info hostapd: wlan0: STA ac:5f:3e:65:85:6f WPA: received EAPOL-Key with invalid MIC,
router just freeezd, cant connect to it in any way and i had to turn it off and on. Log saved becouse of writing it to file.
`Sun Dec 3 20:04:13 2017 daemon.info dnsmasq-dhcp[2974]: DHCPINFORM(br-lan) 192.168.1.125 74:29:af:13:d5:0f Sun Dec 3 20:04:13 2017 daemon.info dnsmasq-dhcp[2974]: DHCPACK(br-lan) 192.168.1.125 74:29:af:13:d5:0f NR90BPHKG Sun Dec 3 20:08:08 2017 daemon.info dnsmasq-dhcp[2974]: DHCPINFORM(br-lan) 192.168.1.125 74:29:af:13:d5:0f Sun Dec 3 20:08:08 2017 daemon.info dnsmasq-dhcp[2974]: DHCPACK(br-lan) 192.168.1.125 74:29:af:13:d5:0f NR90BPHKG Sun Dec 3 20:09:19 2017 daemon.info hostapd: wlan1: STA 74:29:af:13:d5:0f IEEE 802.11: disassociated Sun Dec 3 20:09:20 2017 daemon.info hostapd: wlan1: STA 74:29:af:13:d5:0f IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE) Sun Dec 3 20:10:02 2017 daemon.info hostapd: wlan1: STA 6c:fa:a7:44:3f:84 WPA: group key handshake completed (RSN) Sun Dec 3 20:10:02 2017 daemon.info hostapd: wlan1: STA ac:5f:3e:65:85:6f WPA: group key handshake completed (RSN) Sun Dec 3 20:10:05 2017 daemon.info hostapd: wlan0: STA 5c:70:a3:7d:a2:d6 WPA: group key handshake completed (RSN) Sun Dec 3 20:11:05 2017 daemon.info hostapd: wlan0: STA ac:5f:3e:65:85:6f IEEE 802.11: authenticated Sun Dec 3 20:11:05 2017 daemon.info hostapd: wlan0: STA ac:5f:3e:65:85:6f IEEE 802.11: associated (aid 2) Sun Dec 3 20:11:06 2017 daemon.info hostapd: wlan0: STA ac:5f:3e:65:85:6f WPA: pairwise key handshake completed (RSN) Sun Dec 3 20:11:06 2017 daemon.info dnsmasq-dhcp[2974]: DHCPREQUEST(br-lan) 192.168.1.162 ac:5f:3e:65:85:6f Sun Dec 3 20:11:06 2017 daemon.info dnsmasq-dhcp[2974]: DHCPACK(br-lan) 192.168.1.162 ac:5f:3e:65:85:6f Samsung-Galaxy-S7 Sun Dec 3 20:14:05 2017 daemon.info hostapd: wlan1: STA ac:5f:3e:65:85:6f IEEE 802.11: authenticated Sun Dec 3 20:14:05 2017 daemon.info hostapd: wlan1: STA ac:5f:3e:65:85:6f IEEE 802.11: associated (aid 1) Sun Dec 3 20:14:06 2017 daemon.info hostapd: wlan1: STA ac:5f:3e:65:85:6f WPA: pairwise key handshake completed (RSN) Sun Dec 3 20:14:06 2017 daemon.info dnsmasq-dhcp[2974]: DHCPREQUEST(br-lan) 192.168.1.162 ac:5f:3e:65:85:6f Sun Dec 3 20:14:06 2017 daemon.info dnsmasq-dhcp[2974]: DHCPACK(br-lan) 192.168.1.162 ac:5f:3e:65:85:6f Samsung-Galaxy-S7 Sun Dec 3 20:20:02 2017 daemon.info hostapd: wlan0: STA ac:5f:3e:65:85:6f WPA: received EAPOL-Key with invalid MIC Sun Dec 3 20:20:02 2017 daemon.info hostapd: wlan1: STA ac:5f:3e:65:85:6f WPA: group key handshake completed (RSN) Sun Dec 3 20:20:02 2017 daemon.info hostapd: wlan1: STA 6c:fa:a7:44:3f:84 WPA: group key handshake completed (RSN) Sun Dec 3 20:20:05 2017 daemon.info hostapd: wlan0: STA 5c:70:a3:7d:a2:d6 WPA: group key handshake completed (RSN) Sun Dec 3 20:20:10 2017 daemon.info hostapd: wlan0: STA ac:5f:3e:65:85:6f IEEE 802.11: deauthenticated due to local deauth request Sun Dec 3 20:24:23 2017 daemon.info hostapd: wlan0: STA ac:5f:3e:65:85:6f IEEE 802.11: authenticated Sun Dec 3 20:24:23 2017 daemon.info hostapd: wlan0: STA ac:5f:3e:65:85:6f IEEE 802.11: associated (aid 2) Sun Dec 3 20:24:23 2017 daemon.info hostapd: wlan0: STA ac:5f:3e:65:85:6f WPA: pairwise key handshake completed (RSN) Sun Dec 3 20:24:23 2017 daemon.info dnsmasq-dhcp[2974]: DHCPREQUEST(br-lan) 192.168.1.162 ac:5f:3e:65:85:6f Sun Dec 3 20:24:23 2017 daemon.info dnsmasq-dhcp[2974]: DHCPACK(br-lan) 192.168.1.162 ac:5f:3e:65:85:6f Samsung-Galaxy-S7 Sun Dec 3 20:29:02 2017 daemon.info hostapd: wlan1: STA ac:5f:3e:65:85:6f IEEE 802.11: authenticated Sun Dec 3 20:29:02 2017 daemon.info hostapd: wlan1: STA ac:5f:3e:65:85:6f IEEE 802.11: associated (aid 1) Sun Dec 3 20:29:02 2017 daemon.info hostapd: wlan1: STA ac:5f:3e:65:85:6f WPA: pairwise key handshake completed (RSN) Sun Dec 3 20:29:02 2017 daemon.info dnsmasq-dhcp[2974]: DHCPREQUEST(br-lan) 192.168.1.162 ac:5f:3e:65:85:6f Sun Dec 3 20:29:02 2017 daemon.info dnsmasq-dhcp[2974]: DHCPACK(br-lan) 192.168.1.162 ac:5f:3e:65:85:6f Samsung-Galaxy-S7 Sun Dec 3 20:29:09 2017 daemon.info hostapd: wlan1: STA 74:29:af:13:d5:0f IEEE 802.11: authenticated Sun Dec 3 20:29:09 2017 daemon.info hostapd: wlan1: STA 74:29:af:13:d5:0f IEEE 802.11: associated (aid 3) Sun Dec 3 20:29:10 2017 daemon.info hostapd: wlan1: STA 74:29:af:13:d5:0f WPA: pairwise key handshake completed (RSN) Sun Dec 3 20:29:10 2017 daemon.info dnsmasq-dhcp[2974]: DHCPINFORM(br-lan) 192.168.1.125 74:29:af:13:d5:0f Sun Dec 3 20:29:10 2017 daemon.info dnsmasq-dhcp[2974]: DHCPACK(br-lan) 192.168.1.125 74:29:af:13:d5:0f NR90BPHKG Sun Dec 3 20:29:10 2017 daemon.info dnsmasq-dhcp[2974]: DHCPREQUEST(br-lan) 192.168.1.125 74:29:af:13:d5:0f Sun Dec 3 20:29:10 2017 daemon.warn dnsmasq-dhcp[2974]: Ignoring domain nt.impel.sa for DHCP host name NR90BPHKG Sun Dec 3 20:29:10 2017 daemon.info dnsmasq-dhcp[2974]: DHCPACK(br-lan) 192.168.1.125 74:29:af:13:d5:0f NR90BPHKG Sun Dec 3 20:30:01 2017 daemon.info hostapd: wlan1: STA 74:29:af:13:d5:0f WPA: group key handshake completed (RSN) Sun Dec 3 20:30:02 2017 daemon.info hostapd: wlan1: STA ac:5f:3e:65:85:6f WPA: group key handshake completed (RSN) Sun Dec 3 20:30:02 2017 daemon.info hostapd: wlan1: STA 6c:fa:a7:44:3f:84 WPA: group key handshake completed (RSN) Sun Dec 3 20:30:03 2017 daemon.info hostapd: wlan0: STA 5c:70:a3:7d:a2:d6 WPA: group key handshake completed (RSN) Sun Dec 3 20:30:10 2017 daemon.info hostapd: wlan0: STA ac:5f:3e:65:85:6f IEEE 802.11: deauthenticated due to local deauth request Sun Dec 3 20:30:11 2017 daemon.info dnsmasq-dhcp[2974]: DHCPINFORM(br-lan) 192.168.1.125 74:29:af:13:d5:0f Sun Dec 3 20:30:11 2017 daemon.info dnsmasq-dhcp[2974]: DHCPACK(br-lan) 192.168.1.125 74:29:af:13:d5:0f NR90BPHKG Sun Dec 3 20:30:15 2017 daemon.info dnsmasq-dhcp[2974]: DHCPINFORM(br-lan) 192.168.1.125 74:29:af:13:d5:0f Sun Dec 3 20:30:15 2017 daemon.info dnsmasq-dhcp[2974]: DHCPACK(br-lan) 192.168.1.125 74:29:af:13:d5:0f NR90BPHKG Sun Dec 3 20:40:02 2017 daemon.info hostapd: wlan1: STA 6c:fa:a7:44:3f:84 WPA: group key handshake completed (RSN) Sun Dec 3 20:40:02 2017 daemon.info hostapd: wlan0: STA 5c:70:a3:7d:a2:d6 WPA: group key handshake completed (RSN) Sun Dec 3 20:40:03 2017 daemon.info hostapd: wlan1: STA 74:29:af:13:d5:0f WPA: group key handshake completed (RSN) Sun Dec 3 20:40:03 2017 daemon.info hostapd: wlan1: STA ac:5f:3e:65:85:6f WPA: group key handshake completed (RSN) Sun Dec 3 20:40:32 2017 daemon.info dnsmasq-dhcp[2974]: DHCPINFORM(br-lan) 192.168.1.125 74:29:af:13:d5:0f Sun Dec 3 20:40:32 2017 daemon.info dnsmasq-dhcp[2974]: DHCPACK(br-lan) 192.168.1.125 74:29:af:13:d5:0f NR90BPHKG Sun Dec 3 20:44:27 2017 daemon.info dnsmasq-dhcp[2974]: DHCPINFORM(br-lan) 192.168.1.125 74:29:af:13:d5:0f Sun Dec 3 20:44:27 2017 daemon.info dnsmasq-dhcp[2974]: DHCPACK(br-lan) 192.168.1.125 74:29:af:13:d5:0f NR90BPHKG Sun Dec 3 20:47:12 2017 daemon.info dnsmasq-dhcp[2974]: DHCPINFORM(br-lan) 192.168.1.125 74:29:af:13:d5:0f Sun Dec 3 20:47:12 2017 daemon.info dnsmasq-dhcp[2974]: DHCPACK(br-lan) 192.168.1.125 74:29:af:13:d5:0f NR90BPHKG Sun Dec 3 20:50:02 2017 daemon.info hostapd: wlan1: STA 6c:fa:a7:44:3f:84 WPA: group key handshake completed (RSN) Sun Dec 3 20:50:02 2017 daemon.info hostapd: wlan1: STA ac:5f:3e:65:85:6f WPA: group key handshake completed (RSN) Sun Dec 3 20:50:02 2017 daemon.info hostapd: wlan1: STA 74:29:af:13:d5:0f WPA: group key handshake completed (RSN) Sun Dec 3 20:50:03 2017 daemon.info hostapd: wlan0: STA 5c:70:a3:7d:a2:d6 WPA: group key handshake completed (RSN) Sun Dec 3 20:50:32 2017 daemon.info dnsmasq-dhcp[2974]: DHCPINFORM(br-lan) 192.168.1.125 74:29:af:13:d5:0f Sun Dec 3 20:50:32 2017 daemon.info dnsmasq-dhcp[2974]: DHCPACK(br-lan) 192.168.1.125 74:29:af:13:d5:0f NR90BPHKG Sun Dec 3 20:54:18 2017 daemon.info hostapd: wlan0: STA ac:5f:3e:65:85:6f IEEE 802.11: authenticated Sun Dec 3 20:54:18 2017 daemon.info hostapd: wlan0: STA ac:5f:3e:65:85:6f IEEE 802.11: associated (aid 2) Sun Dec 3 20:54:18 2017 daemon.info hostapd: wlan0: STA ac:5f:3e:65:85:6f WPA: pairwise key handshake completed (RSN) Sun Dec 3 20:54:18 2017 daemon.info dnsmasq-dhcp[2974]: DHCPREQUEST(br-lan) 192.168.1.162 ac:5f:3e:65:85:6f Sun Dec 3 20:54:18 2017 daemon.info dnsmasq-dhcp[2974]: DHCPACK(br-lan) 192.168.1.162 ac:5f:3e:65:85:6f Samsung-Galaxy-S7 Sun Dec 3 20:55:31 2017 daemon.info hostapd: wlan1: STA ac:5f:3e:65:85:6f IEEE 802.11: authenticated Sun Dec 3 20:55:31 2017 daemon.info hostapd: wlan1: STA ac:5f:3e:65:85:6f IEEE 802.11: associated (aid 1) Sun Dec 3 20:55:31 2017 daemon.info hostapd: wlan1: STA ac:5f:3e:65:85:6f WPA: pairwise key handshake completed (RSN) Sun Dec 3 20:55:31 2017 daemon.info dnsmasq-dhcp[2974]: DHCPREQUEST(br-lan) 192.168.1.162 ac:5f:3e:65:85:6f Sun Dec 3 20:55:31 2017 daemon.info dnsmasq-dhcp[2974]: DHCPACK(br-lan) 192.168.1.162 ac:5f:3e:65:85:6f Samsung-Galaxy-S7 Sun Dec 3 20:59:07 2017 daemon.info dnsmasq-dhcp[2974]: DHCPINFORM(br-lan) 192.168.1.125 74:29:af:13:d5:0f Sun Dec 3 20:59:07 2017 daemon.info dnsmasq-dhcp[2974]: DHCPACK(br-lan) 192.168.1.125 74:29:af:13:d5:0f NR90BPHKG Sun Dec 3 21:00:02 2017 daemon.info hostapd: wlan1: STA 6c:fa:a7:44:3f:84 WPA: group key handshake completed (RSN) Sun Dec 3 21:00:02 2017 daemon.info hostapd: wlan1: STA ac:5f:3e:65:85:6f WPA: group key handshake completed (RSN) Sun Dec 3 21:00:02 2017 daemon.info hostapd: wlan1: STA 74:29:af:13:d5:0f WPA: group key handshake completed (RSN) Sun Dec 3 21:00:02 2017 daemon.info hostapd: wlan0: STA 5c:70:a3:7d:a2:d6 WPA: group key handshake completed (RSN) Sun Dec 3 21:00:10 2017 daemon.info hostapd: wlan0: STA ac:5f:3e:65:85:6f IEEE 802.11: deauthenticated due to local deauth request Sun Dec 3 21:00:32 2017 daemon.info dnsmasq-dhcp[2974]: DHCPINFORM(br-lan) 192.168.1.125 74:29:af:13:d5:0f Sun Dec 3 21:00:32 2017 daemon.info dnsmasq-dhcp[2974]: DHCPACK(br-lan) 192.168.1.125 74:29:af:13:d5:0f NR90BPHKG
Sun Dec 3 21:10:02 2017 daemon.info hostapd: wlan1: STA 74:29:af:13:d5:0f WPA: group key handshake completed (RSN) Sun Dec 3 21:10:02 2017 daemon.info hostapd: wlan1: STA 6c:fa:a7:44:3f:84 WPA: group key handshake completed (RSN) Sun Dec 3 21:10:02 2017 daemon.info hostapd: wlan1: STA ac:5f:3e:65:85:6f WPA: group key handshake completed (RSN) Sun Dec 3 21:10:02 2017 daemon.info hostapd: wlan0: STA 5c:70:a3:7d:a2:d6 WPA: group key handshake completed (RSN) Sun Dec 3 21:10:32 2017 daemon.info dnsmasq-dhcp[2974]: DHCPINFORM(br-lan) 192.168.1.125 74:29:af:13:d5:0f Sun Dec 3 21:10:32 2017 daemon.info dnsmasq-dhcp[2974]: DHCPACK(br-lan) 192.168.1.125 74:29:af:13:d5:0f NR90BPHKG Sun Dec 3 21:14:51 2017 daemon.info dnsmasq-dhcp[2974]: DHCPINFORM(br-lan) 192.168.1.125 74:29:af:13:d5:0f Sun Dec 3 21:14:51 2017 daemon.info dnsmasq-dhcp[2974]: DHCPACK(br-lan) 192.168.1.125 74:29:af:13:d5:0f NR90BPHKG Sun Dec 3 21:20:02 2017 daemon.info hostapd: wlan1: STA 6c:fa:a7:44:3f:84 WPA: group key handshake completed (RSN) Sun Dec 3 21:20:02 2017 daemon.info hostapd: wlan1: STA 74:29:af:13:d5:0f WPA: group key handshake completed (RSN) Sun Dec 3 21:20:02 2017 daemon.info hostapd: wlan1: STA ac:5f:3e:65:85:6f WPA: group key handshake completed (RSN) Sun Dec 3 21:20:02 2017 daemon.info hostapd: wlan0: STA 5c:70:a3:7d:a2:d6 WPA: group key handshake completed (RSN) Sun Dec 3 21:20:32 2017 daemon.info dnsmasq-dhcp[2974]: DHCPINFORM(br-lan) 192.168.1.125 74:29:af:13:d5:0f Sun Dec 3 21:20:32 2017 daemon.info dnsmasq-dhcp[2974]: DHCPACK(br-lan) 192.168.1.125 74:29:af:13:d5:0f NR90BPHKG Sun Dec 3 21:29:08 2017 daemon.info dnsmasq-dhcp[2974]: DHCPINFORM(br-lan) 192.168.1.125 74:29:af:13:d5:0f Sun Dec 3 21:29:08 2017 daemon.info dnsmasq-dhcp[2974]: DHCPACK(br-lan) 192.168.1.125 74:29:af:13:d5:0f NR90BPHKG Sun Dec 3 21:30:02 2017 daemon.info hostapd: wlan1: STA 6c:fa:a7:44:3f:84 WPA: group key handshake completed (RSN) Sun Dec 3 21:30:02 2017 daemon.info hostapd: wlan1: STA 74:29:af:13:d5:0f WPA: group key handshake completed (RSN) Sun Dec 3 21:30:02 2017 daemon.info hostapd: wlan1: STA ac:5f:3e:65:85:6f WPA: group key handshake completed (RSN) Sun Dec 3 21:30:02 2017 daemon.info hostapd: wlan0: STA 5c:70:a3:7d:a2:d6 WPA: group key handshake completed (RSN) Sun Dec 3 21:30:32 2017 daemon.info dnsmasq-dhcp[2974]: DHCPINFORM(br-lan) 192.168.1.125 74:29:af:13:d5:0f Sun Dec 3 21:30:32 2017 daemon.info dnsmasq-dhcp[2974]: DHCPACK(br-lan) 192.168.1.125 74:29:af:13:d5:0f NR90BPHKG Sun Dec 3 21:32:54 2017 daemon.info hostapd: wlan1: STA 74:29:af:13:d5:0f IEEE 802.11: disassociated Sun Dec 3 21:32:55 2017 daemon.info hostapd: wlan1: STA 74:29:af:13:d5:0f IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE) Sun Dec 3 21:40:02 2017 daemon.info hostapd: wlan1: STA 6c:fa:a7:44:3f:84 WPA: group key handshake completed (RSN) Sun Dec 3 21:40:03 2017 daemon.info hostapd: wlan0: STA 5c:70:a3:7d:a2:d6 WPA: group key handshake completed (RSN) Sun Dec 3 21:40:03 2017 daemon.info hostapd: wlan1: STA ac:5f:3e:65:85:6f WPA: group key handshake completed (RSN) Sun Dec 3 21:50:02 2017 daemon.info hostapd: wlan1: STA 6c:fa:a7:44:3f:84 WPA: group key handshake completed (RSN) Sun Dec 3 21:50:02 2017 daemon.info hostapd: wlan0: STA 5c:70:a3:7d:a2:d6 WPA: group key handshake completed (RSN) Sun Dec 3 21:50:03 2017 daemon.info hostapd: wlan1: STA ac:5f:3e:65:85:6f WPA: group key handshake completed (RSN) `
Please show me version you used and useful logs.
ok i started logging and installed stable lede 17.01
@lukaszekk stable lede 17.01 contains an old version of the driver, which does not contain the fix for this issue.
After installing stable LEDE 17.01.4, grab an updated mwlwifi driver from here: https://github.com/eduperez/mwlwifi_LEDE
@eduperez I am having more instability with the latest mwlwifi driver. I removed the old one and installed the latest one from your repo. At this point I fully disabled wireless on my WRT3200ACM. What consistently happens at random points, are all wifi connections drop and they are still being broadcasted, but cannot connect. The entire LEDE interface will not come up, lights are on the router yet nothing is blinking (meaning the entire thing froze) requiring a hard reset.
I enabled logging, and waiting for it to crash again so I can get the system log. Has there been another driver update since 9 days ago?
@kiwidoggie Can you do cat /sys/kernel/debug/ieee80211/phy1/mwlwifi/info
So we can see what exactly you are using? I ask because the symptoms would indicate wrong driver or wrong firmware. It seems that no one is having these issues with the very latest driver/firmware combo.
@kiwidoggie I just create packages from the source code published here, so people can test the latest commits without having to reinstall LEDE from scratch. My repo is a mirror of this repo, so the latest package from my repo contains the same code as the latest commit in this repo, and there will not be any update in my repo until there is an update here.
Please, do as @aaron1959 requested, and post the info here.
Yes, here is that information
driver name: mwlwifi
chip type: 88W8964
hw version: 7
driver version: 10.3.4.0-20170606
firmware version: 0x09030007
power table loaded from dts: no
firmware region code: 0x10
mac address: 60:38:e0:be:cc:e1
2g: enable
5g: disable
antenna: 4 4
irq number: 106
ap macid support: 0000ffff
sta macid support: 00010000
macid used: 00000001
radio: enable
iobase0: e1200000
iobase1: e1480000
tx limit: 1024
rx limit: 16384
Are there any more commands, that I should run in order to get more information for you guys. Could be that I may need a fresh install on this router.
I've also noticed, my WLAN has dropped when only enabling one of the WIFI interfaces (2g, 5g radios ac, bgnac are disabled) that my signal level is 0. It shows that there are 2 devices attached, but each one has a signal level of 0 (my phone/chromcast cannot seem to pull DNS or any real information other than DHCP, reboot and everything works fine) Enabling both, leads to the instability and no luci on LAN, and 0 blinking lights/packet flow.
Your driver and firmware are VERY OLD. That driver and firmware are broken and probably the reason you are having problems.
You very much need to use a current build and I think your problems will be gone.
Until you update to the current driver and firmware your router will not work properly. Please load the new stuff and post your new results if you continue to have any other issues. I'm amazed if your wireless is working at all lol.
Is there a build server for builds, or do I have to build everything from scratch? I used the latest on the lede wiki page (if there's an updated link, I will request an edit to it)
Glad to know
@kiwidoggie Here is the link to the router information for the WRT3200ACM: https://lede-project.org/toh/views/toh_fwdownload?dataflt%5BModel*~%5D=WRT3200ACM
Here's a direct link to the latest release firmware (upgrade): https://downloads.lede-project.org/releases/17.01.4/targets/mvebu/generic/lede-17.01.4-mvebu-linksys-wrt3200acm-squashfs-sysupgrade.bin
Once you upgrade to the latest version, you can install the package @eduperez referenced to get the latest fixes.
Thank you everyone so much, I think my install may have been corrupt, as it didn't want to take the sysupgrade. I upgraded via ssh, and then removed the old driver, and installed the new ipk. Currently outputting
driver name: mwlwifi
chip type: 88W8964
hw version: 7
driver version: 10.3.4.0-20171129
firmware version: 0x09030201
power table loaded from dts: no
firmware region code: 0x0
mac address: 60:38:e0:be:cc:e1
2g: enable
5g: disable
antenna: 4 4
irq number: 106
ap macid support: 0000ffff
sta macid support: 00010000
macid used: 00000001
radio: enable
iobase0: e1200000
iobase1: e1480000
tx limit: 1024
rx limit: 16384
Going to enable the radios again, and see how it fares.
Still same issue, I managed to catch something on the ssh kernel log before the router died (it never writes this to file, why I always missed it)
Mon Dec 11 05:44:42 2017 kern.info kernel: [ 317.186828] mwifiex_sdio mmc0:0001:1: Tx: Bridge packet limit reached. Drop packet!
Mon Dec 11 05:45:53 2017 kern.info kernel: [ 388.788510] mwifiex_sdio mmc0:0001:1: cmd_wait_q terminated: -110
I have changed my txqueuelen using ifconfig
to be of 20000 up from 1000 to try and remedy this situation, I'm not sure what this actually changed and if it comes with dangerous implications.
These messages are not related to mwlwifi.
Please use this one to check this issue.