kaloz / mwlwifi

mac80211 driver for the Marvell 88W8864 802.11ac chip
394 stars 119 forks source link

Host command timeout #232

Closed yuhhaurlin closed 6 years ago

yuhhaurlin commented 6 years ago

Please use this one to check this issue.

aaron1959 commented 6 years ago

Mine has been up 31hours 44 minutes (dd-wrt 33816) Samsung S7 in and out of range along with other clients.

@05dyna Can you open a separate issue please since you are not testing these wifi devices or host command timeout? it seems it will make this thread easier to follow.

ghost commented 6 years ago

Weird messages using latest mwlwifi code, the logs are flooding with these messages.

Nov 28 22:54:06 WRT3200ACM daemon.info hostapd: ath1: STA fc:a6:67:5c:32:07 IEEE 802.11: associated (aid 3) Nov 28 22:54:06 WRT3200ACM daemon.info hostapd: ath1: STA fc:a6:67:5c:32:07 RADIUS: starting accounting session 011F7EC532C44095 Nov 28 22:54:06 WRT3200ACM daemon.info hostapd: ath1: STA fc:a6:67:5c:32:07 WPA: pairwise key handshake completed (RSN) Nov 28 22:54:06 WRT3200ACM daemon.info hostapd: ath0: STA fc:a6:67:c8:aa:45 IEEE 802.11: Station does not support mandatory VHT PHY - reject association Nov 28 22:54:06 WRT3200ACM daemon.info hostapd: ath0: STA fc:a6:67:c8:aa:45 IEEE 802.11: Station does not support mandatory VHT PHY - reject association Nov 28 22:54:06 WRT3200ACM daemon.info hostapd: ath0: STA fc:a6:67:c8:aa:45 IEEE 802.11: Station does not support mandatory VHT PHY - reject association Nov 28 22:54:06 WRT3200ACM daemon.info hostapd: ath0: STA fc:a6:67:c8:aa:45 IEEE 802.11: Station does not support mandatory VHT PHY - reject association Nov 28 22:54:06 WRT3200ACM daemon.info hostapd: ath0: STA fc:a6:67:c8:aa:45 IEEE 802.11: Station does not support mandatory VHT PHY - reject association Nov 28 22:54:06 WRT3200ACM daemon.info hostapd: ath0: STA fc:a6:67:c8:aa:45 IEEE 802.11: Station does not support mandatory VHT PHY - reject association Nov 28 22:54:06 WRT3200ACM daemon.info hostapd: ath1: STA fc:a6:67:5c:32:07 IEEE 802.11: associated (aid 3) Nov 28 22:54:06 WRT3200ACM daemon.info hostapd: ath1: STA fc:a6:67:5c:32:07 RADIUS: starting accounting session 011F7EC532C44095 Nov 28 22:54:06 WRT3200ACM daemon.info hostapd: ath1: STA fc:a6:67:5c:32:07 WPA: pairwise key handshake completed (RSN) Nov 28 22:54:06 WRT3200ACM daemon.info hostapd: ath0: STA fc:a6:67:c8:aa:45 IEEE 802.11: Station does not support mandatory VHT PHY - reject association Nov 28 22:54:06 WRT3200ACM daemon.info hostapd: ath0: STA fc:a6:67:c8:aa:45 IEEE 802.11: Station does not support mandatory VHT PHY - reject association Nov 28 22:54:06 WRT3200ACM daemon.info hostapd: ath0: STA fc:a6:67:c8:aa:45 IEEE 802.11: Station does not support mandatory VHT PHY - reject association Nov 28 22:54:06 WRT3200ACM daemon.info hostapd: ath0: STA fc:a6:67:c8:aa:45 IEEE 802.11: Station does not support mandatory VHT PHY - reject association Nov 28 22:54:06 WRT3200ACM daemon.info hostapd: ath0: STA fc:a6:67:c8:aa:45 IEEE 802.11: Station does not support mandatory VHT PHY - reject association Nov 28 22:54:06 WRT3200ACM daemon.info hostapd: ath0: STA fc:a6:67:c8:aa:45 IEEE 802.11: Station does not support mandatory VHT PHY - reject association

root@WRT3200ACM:~# cat /sys/kernel/debug/ieee80211/phy0/mwlwifi/info

driver name: mwlwifi chip type: 88W8964 hw version: 7 driver version: 10.3.4.0-20170810 firmware version: 0x0903bee1 power table loaded from dts: no firmware region code: 0x0 mac address: 60:38:e0:b9:8d:d2 2g: enable 5g: enable antenna: 4 4 irq number: 46 ap macid support: 0000ffff sta macid support: 00010000 macid used: 00000001 radio: enable iobase0: e0c00000 iobase1: e0e80000 tx limit: 1024 rx limit: 16384

root@WRT3200ACM:~# cat /sys/kernel/debug/ieee80211/phy1/mwlwifi/info

driver name: mwlwifi chip type: 88W8964 hw version: 7 driver version: 10.3.4.0-20170810 firmware version: 0x0903bee1 power table loaded from dts: no firmware region code: 0x0 mac address: 60:38:e0:b9:8d:d1 2g: enable 5g: disable antenna: 4 4 irq number: 47 ap macid support: 0000ffff sta macid support: 00010000 macid used: 00000003 radio: enable iobase0: e1000000 iobase1: e1280000 tx limit: 1024 rx limit: 16384

root@WRT3200ACM:~# iw dev phy#1 Interface ath1.1 ifindex 11 wdev 0x100000003 addr 62:38:e0:b9:8d:d4 ssid The Promised LAN type AP channel 1 (2412 MHz), width: 20 MHz, center1: 2412 MHz txpower 30.00 dBm Interface ath1 ifindex 10 wdev 0x100000002 addr 60:38:e0:b9:8d:d3 ssid Abraham Linksys type AP channel 1 (2412 MHz), width: 20 MHz, center1: 2412 MHz txpower 30.00 dBm phy#0 Interface ath0 ifindex 9 wdev 0x2 addr 60:38:e0:b9:8d:d2 ssid House Stark type AP channel 153 (5765 MHz), width: 80 MHz, center1: 5775 MHz txpower 30.00 dBm


@BrainSlayer v.33857

Nov 28 16:53:45 WRT3200ACM user.err : Caught SIGSEGV (11) in json_object_iter_next Nov 28 16:53:45 WRT3200ACM user.err : Thread 2614: startservice Nov 28 16:53:45 WRT3200ACM user.err : === Context: Nov 28 16:53:45 WRT3200ACM user.err : TRAPNO:0000000e ERRCODE:00000017 OLDMASK:00000000 R0:b6e71f40 Nov 28 16:53:45 WRT3200ACM user.err : R1:b6ec8498 R2:be993a10 R3:00000000 R4:b6ec8498 Nov 28 16:53:45 WRT3200ACM user.err : R5:00000000 R6:b6eb2860 R7:ffffffff R8:b6ec8470 Nov 28 16:53:45 WRT3200ACM user.err : R9:b6ec84a8 R10:b6e71eb0 FP:b6e71eb0 IP:b6d42028 Nov 28 16:53:45 WRT3200ACM user.err : SP:be9939b0 LR:b6d30c60 PC:b6d1b354 CPSR:60000010 Nov 28 16:53:45 WRT3200ACM user.err : FAULTADDR:00000008 Nov 28 16:53:45 WRT3200ACM user.err : === Backtrace: Nov 28 16:53:45 WRT3200ACM user.err : # Searching frame 0 (FP=0xb6e71eb0, PC=0xb6d1b354) Nov 28 16:53:45 WRT3200ACM user.err : # PC-1d0[0xb6d1b184]: 0xe92d4ff0 stmfd sp! Nov 28 16:53:45 WRT3200ACM user.err : # FP-00[0xb6e71eb0]: 0x00000000 {LR} Nov 28 16:53:45 WRT3200ACM user.err : # FP-04[0xb6e71eac]: 0x00000091 {FP} Nov 28 16:53:45 WRT3200ACM user.err : # FP-08[0xb6e71ea8]: 0x000000e1 {R10} Nov 28 16:53:45 WRT3200ACM user.err : # FP-0c[0xb6e71ea4]: 0x00000000 {R9} Nov 28 16:53:45 WRT3200ACM user.err : # FP-10[0xb6e71ea0]: 0x00000000 {R8} Nov 28 16:53:45 WRT3200ACM user.err : # FP-14[0xb6e71e9c]: 0x00000000 {R7} Nov 28 16:53:45 WRT3200ACM user.err : # FP-18[0xb6e71e98]: 0x00000000 {R6} Nov 28 16:53:45 WRT3200ACM user.err : # FP-1c[0xb6e71e94]: 0x342e6f73 {R5} Nov 28 16:53:45 WRT3200ACM user.err : # FP-20[0xb6e71e90]: 0x2e6e6f73 {R4} Nov 28 16:53:45 WRT3200ACM user.err : # Crashed at /usr/lib/libjson-c.so.20xb6d18000[0xb6d1b354] Nov 28 16:53:45 WRT3200ACM user.err : # Searching frame 1 (FP=0x00000091, PC=0x00000000) Nov 28 16:53:45 WRT3200ACM user.err : # Instruction at 0x00000000 is not mapped; terminating backtrace. Nov 28 16:53:45 WRT3200ACM user.err : /usr/lib/libjson-c.so.20xb6d18000[0xb6d1b354] Nov 28 16:53:45 WRT3200ACM user.err : ???(+0)[0x00000000] Nov 28 16:53:45 WRT3200ACM user.err : === Code: Nov 28 16:53:45 WRT3200ACM user.err : b6d1b314: 00002dfb 00003160 00002db3 00003130 00002d9f 000030f0 00002d4d 00002cb0 Nov 28 16:53:45 WRT3200ACM user.err : b6d1b334: 00002c96 e92d4010 ebfffd5f e5900020 e8bd8010 e3a00000 e12fff1e e5903000 Nov 28 16:53:45 WRT3200ACM user.err : b6d1b354: >e5933008 e5803000 e12fff1e e5903000 e5930000 e12fff1e e5903000 e5930004 Nov 28 16:53:45 WRT3200ACM user.err : b6d1b374: e12fff1e e5900000 e5913000 e0400003 e16f0f10 e1a002a0 e12fff1e e3a00000

ghost commented 6 years ago

Something just happened, Wifi started to malfunction but router didn't completely lockup or reset, I was able to get this via dmesg.

[ 1979.526968] Unable to handle kernel NULL pointer dereference at virtual address 00000000 [ 1979.535129] pgd = d4a74000 [ 1979.537846] [00000000] pgd=149d5831, pte=00000000, *ppte=00000000 [ 1979.544176] Internal error: Oops: 17 [#1] SMP ARM [ 1979.548899] Modules linked in: xt_IMQ imq nf_nat_pptp nf_conntrack_pptp nf_nat_proto_gre nf_conntrack_proto_gre cifs fscache xt_opendpi xt_physdev xt_DSCP xt_dscp ext4 jbd2 mbcache ledtrig_usbport pwrseq_simple pwrseq_emmc ahci_mvebu ahci_platform ahci libahci_platform libahci ehci_orion sata_mv usb_storage sd_mod xhci_plat_hcd xhci_pci xhci_hcd ehci_pci ehci_platform ehci_hcd usbcore usb_common btmrvl_sdio btmrvl bluetooth mwifiex_sdio mvsdio sdhci_pxav3 sdhci_pltfm sdhci mmc_block mmc_core mwifiex mwlwifi mac80211 cfg80211 compat mii tmp421 pwm_fan leds_pca963x leds_tlc591xx orion_wdt [last unloaded: shortcut_fe] [ 1979.604189] CPU: 0 PID: 2255 Comm: cron Not tainted 4.9.65 #78 [ 1979.610045] Hardware name: Marvell Armada 380/385 (Device Tree) [ 1979.615988] task: d48cb0c0 task.stack: d4a04000 [ 1979.620542] PC is at anon_vma_clone+0x9c/0x1b0 [ 1979.625003] LR is at 0x1 [ 1979.627546] pc : [] lr : [<00000001>] psr: a0000013 [ 1979.627546] sp : d4a05e88 ip : dfbd6da8 fp : 02000200 [ 1979.639073] r10: c09597e0 r9 : d4b36480 r8 : d4b36480 [ 1979.644319] r7 : d4a9a580 r6 : 00000000 r5 : d4066714 r4 : de07e3e0 [ 1979.650874] r3 : c0847da8 r2 : 00000030 r1 : 1f38f000 r0 : de07e3e0 [ 1979.657429] Flags: NzCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 1979.664594] Control: 10c5387d Table: 14a7404a DAC: 00000051 [ 1979.670364] Process cron (pid: 2255, stack limit = 0xd4a04210) [ 1979.676220] Stack: (0xd4a05e88 to 0xd4a06000) [ 1979.680596] 5e80: c090b784 d4b4671c d4b466e0 c091409a 00000001 d4a9a580 [ 1979.688809] 5ea0: d4b466e0 d4a9a580 c092e600 d4b38540 df02bf2c 00000000 00000001 c01c44e4 [ 1979.697023] 5ec0: d4b466e0 d3a6c540 d4a9a580 c092e600 d4b38540 c0121240 0000000b 00000000 [ 1979.705236] 5ee0: 00000000 00000000 00000000 d3a6c540 df709ac0 d3a6c578 d4a9a5d8 d4b38578 [ 1979.713450] 5f00: d4a9a5e0 d4a9a5ec d4a9a5e8 024000c0 fff7cdff df709d68 00000011 00000000 [ 1979.721663] 5f20: e4efc646 000001cc 5a1de8fb fffffff4 c0954600 00000011 00000000 00000001 [ 1979.729876] 5f40: 00000000 00000000 d4a04000 00000000 00000008 c0121ea8 00000000 00000000 [ 1979.738090] 5f60: ffffffff b6fdd65c 00000051 beb86b30 00000008 00000000 00024d20 beb86b30 [ 1979.746303] 5f80: 00000001 00000002 c0107884 d4a04000 00000000 c0122158 00000000 00000000 [ 1979.754516] 5fa0: c0107884 c01076c0 00024d20 beb86b30 00000000 b6fdd65c beb86b30 00000008 [ 1979.762730] 5fc0: 00024d20 beb86b30 00000001 00000002 00000001 00000000 00000003 00000008 [ 1979.770943] 5fe0: 000240a0 beb86b30 b6fbaf84 b6fbaf88 60000010 00000000 00000000 00000000 [ 1979.779162] [] (anon_vma_clone) from [] (anon_vma_fork+0x2c/0x15c) [ 1979.787119] [] (anon_vma_fork) from [] (copy_process.part.2+0x90c/0x1418) [ 1979.795684] [] (copy_process.part.2) from [] (_do_fork+0xbc/0x2f4) [ 1979.803635] [] (_do_fork) from [] (sys_fork+0x24/0x2c) [ 1979.810543] [] (sys_fork) from [] (ret_fast_syscall+0x0/0x3c) [ 1979.818058] Code: 01a09008 0a000015 ea000011 e5956004 (e5968000) [ 1979.824196] ---[ end trace 00c71da272c71d28 ]---

yuhhaurlin commented 6 years ago

These log messages are not related to mwlwifi. Please make you can reproduce problem on LEDE, then you can create an issue to track it. I will set a formal release version to mwlwifi today, so we can have a stable version before checking in new firmware and modifications for WDS.

lucize commented 6 years ago

@yuhhaurlin I would have loved to say it was ok, this night returned near the router and this happened

Wed Nov 29 01:24:23 2017 daemon.info hostapd: wlan0: STA 40:40:a7:xx:xx:xx IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Wed Nov 29 01:26:54 2017 daemon.notice hostapd: wlan0: AP-STA-POLL-OK a4:e4:b8:xx:xx:xx
Wed Nov 29 01:28:00 2017 cron.info crond[1651]: USER root pid 24256 cmd /etc/checkip
Wed Nov 29 01:30:29 2017 daemon.info hostapd: wlan0: STA 40:40:a7:xx:xx:xx IEEE 802.11: associated (aid 2)
Wed Nov 29 01:30:29 2017 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 40:40:a7:xx:xx:xx
Wed Nov 29 01:30:29 2017 daemon.info hostapd: wlan0: STA 40:40:a7:xx:xx:xx RADIUS: starting accounting session 5B6EE1867D7507C6
Wed Nov 29 01:30:29 2017 daemon.info hostapd: wlan0: STA 40:40:a7:xx:xx:xx WPA: pairwise key handshake completed (RSN)
Wed Nov 29 01:30:31 2017 daemon.info hostapd: wlan0: STA 40:40:a7:xx:xx:xx IEEE 802.11: authenticated
Wed Nov 29 01:31:57 2017 daemon.notice hostapd: wlan0: AP-STA-POLL-OK a4:e4:b8:xx:xx:xx
Wed Nov 29 01:35:00 2017 cron.info crond[1651]: USER root pid 24266 cmd /etc/checkip
Wed Nov 29 01:37:00 2017 daemon.notice hostapd: wlan0: AP-STA-POLL-OK a4:e4:b8:xx:xx:xx
Wed Nov 29 01:40:16 2017 kern.info kernel: [132613.957033] ieee80211 phy0: staid 1 deleted
Wed Nov 29 01:40:16 2017 daemon.info hostapd: wlan0: STA a4:e4:b8:xx:xx:xx IEEE 802.11: associated (aid 1)
Wed Nov 29 01:40:25 2017 kern.err kernel: [132623.079573] ieee80211 phy0: cmd 0x9111=SetNewStation timed out
Wed Nov 29 01:40:25 2017 kern.err kernel: [132623.085528] ieee80211 phy0: return code: 0x1111
Wed Nov 29 01:40:25 2017 kern.err kernel: [132623.090163] ieee80211 phy0: timeout: 0x1111
Wed Nov 29 01:40:25 2017 daemon.info hostapd: wlan0: STA a4:e4:b8:xx:xx:xx IEEE 802.11: deauthenticated due to local deauth request
Wed Nov 29 01:42:00 2017 cron.info crond[1651]: USER root pid 24286 cmd /etc/checkip
Wed Nov 29 01:44:44 2017 daemon.notice hostapd: wlan0: AP-STA-POLL-OK 40:40:a7:xx:xx:xx
Wed Nov 29 01:44:48 2017 kern.err kernel: [132886.097331] ieee80211 phy0: cmd 0x9143=GetSeqno timed out
Wed Nov 29 01:44:48 2017 kern.err kernel: [132886.102851] ieee80211 phy0: return code: 0x1143
Wed Nov 29 01:44:48 2017 kern.err kernel: [132886.107486] ieee80211 phy0: timeout: 0x1143
Wed Nov 29 01:49:00 2017 cron.info crond[1651]: USER root pid 24295 cmd /etc/checkip
Wed Nov 29 01:49:47 2017 kern.warn kernel: [133185.061714] ieee80211 phy0: can't send packet during ADDBA
Wed Nov 29 01:49:50 2017 daemon.notice hostapd: wlan0: AP-STA-DISCONNECTED 40:40:a7:xx:xx:xx
Wed Nov 29 01:49:50 2017 daemon.info hostapd: wlan0: STA 40:40:a7:xx:xx:xx IEEE 802.11: disassociated due to inactivity
Wed Nov 29 01:49:54 2017 kern.err kernel: [133192.070394] ieee80211 phy0: cmd 0x9122=UpdateEncryption timed out
Wed Nov 29 01:49:54 2017 kern.err kernel: [133192.076612] ieee80211 phy0: return code: 0x1122
Wed Nov 29 01:49:54 2017 kern.err kernel: [133192.081248] ieee80211 phy0: timeout: 0x1122
Wed Nov 29 01:49:54 2017 kern.err kernel: [133192.085541] wlan0: failed to remove key (0, 40:40:a7:xx:xx:xx) from hardware (-5)
Wed Nov 29 01:49:54 2017 daemon.info hostapd: wlan0: STA 40:40:a7:xx:xx:xx IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Wed Nov 29 01:49:58 2017 kern.err kernel: [133196.094330] ieee80211 phy0: cmd 0x9125=BAStream timed out
Wed Nov 29 01:49:58 2017 kern.err kernel: [133196.099843] ieee80211 phy0: return code: 0x1125
Wed Nov 29 01:49:58 2017 kern.err kernel: [133196.104488] ieee80211 phy0: timeout: 0x1125
Wed Nov 29 01:50:02 2017 kern.err kernel: [133200.108266] ieee80211 phy0: cmd 0x9125=BAStream timed out
Wed Nov 29 01:50:02 2017 kern.err kernel: [133200.113784] ieee80211 phy0: return code: 0x1125
Wed Nov 29 01:50:02 2017 kern.err kernel: [133200.118434] ieee80211 phy0: timeout: 0x1125
Wed Nov 29 01:50:06 2017 kern.err kernel: [133204.121979] ieee80211 phy0: cmd 0x9125=BAStream timed out
Wed Nov 29 01:50:06 2017 kern.err kernel: [133204.127497] ieee80211 phy0: return code: 0x1125
Wed Nov 29 01:50:06 2017 kern.err kernel: [133204.132132] ieee80211 phy0: timeout: 0x1125
Wed Nov 29 01:50:10 2017 kern.err kernel: [133208.135795] ieee80211 phy0: cmd 0x9125=BAStream timed out
Wed Nov 29 01:50:10 2017 kern.err kernel: [133208.141307] ieee80211 phy0: return code: 0x1125
Wed Nov 29 01:50:10 2017 kern.err kernel: [133208.145954] ieee80211 phy0: timeout: 0x1125
Wed Nov 29 01:50:10 2017 kern.alert kernel: [133208.150391] Unable to handle kernel NULL pointer dereference at virtual address 0000000c
Wed Nov 29 01:50:10 2017 kern.alert kernel: [133208.158612] pgd = d5754000
Wed Nov 29 01:50:10 2017 kern.alert kernel: [133208.161415] [0000000c] *pgd=14933831, *pte=00000000, *ppte=00000000
Wed Nov 29 01:50:10 2017 kern.emerg kernel: [133208.167830] Internal error: Oops: 17 [#1] SMP ARM
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.172638] Modules linked in: pppoe ppp_async l2tp_ppp cdc_mbim qmi_wwan pppox ppp_mppe ppp_generic nf_conntrack_netlink nf_conntrack_ipv6 iptable_nat ipt_REJECT ipt_MASQUERADE huawei_cdc_ncm dm9601 cdc_subset cdc_ncm xt_time xt_tcpudp xt_tcpmss xt_statistic xt_state xt_recent xt_quota xt_policy xt_pkttype xt_physdev xt_owner xt_nat xt_multiport xt_mark xt_mac xt_limit xt_length xt_hl xt_helper xt_esp xt_ecn xt_dscp xt_conntrack xt_connmark xt_connlimit xt_connbytes xt_comment xt_addrtype xt_TCPMSS xt_REDIRECT xt_NETMAP xt_LOG xt_HL xt_DSCP xt_CLASSIFY wireguard usbnet slhc rfcomm r8152 nfnetlink nf_reject_ipv4 nf_nat_redirect nf_nat_masquerade_ipv4 nf_conntrack_ipv4 nf_nat_ipv4 nf_nat nf_log_ipv4 nf_defrag_ipv6 nf_defrag_ipv4 nf_conntrack_rtcache nf_conntrack iptable_mangle iptable_filter ipt_ah
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.244183]  ipt_ECN ip_tables hidp hci_uart crc_ccitt cdc_wdm btusb btmrvl_sdio btmrvl btintel br_netfilter bnep bluetooth hid evdev input_core mwlwifi mac80211 cfg80211 compat cryptodev ip6t_rt ip6t_frag ip6t_hbh ip6t_eui64 ip6t_mh ip6t_ah ip6t_ipv6header ip6t_REJECT nf_reject_ipv6 nf_log_ipv6 nf_log_common ip6table_mangle ip6table_filter ip6_tables x_tables ip_gre gre l2tp_netlink l2tp_core udp_tunnel ip6_udp_tunnel ipcomp6 xfrm6_tunnel xfrm6_mode_tunnel xfrm6_mode_transport xfrm6_mode_beet esp6 ah6 ipcomp xfrm4_tunnel xfrm4_mode_tunnel xfrm4_mode_transport xfrm4_mode_beet esp4 ah4 tunnel6 tunnel4 ip_tunnel af_key xfrm_user xfrm_ipcomp xfrm_algo vfat fat ntfs nls_utf8 nls_iso8859_1 nls_cp437 regmap_mmio sha256_generic jitterentropy_rng drbg md5 hmac echainiv ecb cmac cbc authenc gpio_button_hotplug mii
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.315305] CPU: 1 PID: 2712 Comm: hostapd Not tainted 4.9.65 #0
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.321421] Hardware name: Marvell Armada 380/385 (Device Tree)
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.327451] task: ded2e140 task.stack: d34b4000
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.332097] PC is at mwl_fwcmd_destroy_ba+0x98/0xf4 [mwlwifi]
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.337958] LR is at mwl_fwcmd_destroy_ba+0x34/0xf4 [mwlwifi]
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.343814] pc : [<bf1f5624>]    lr : [<bf1f55c0>]    psr: 60000013
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.343814] sp : d34b5c80  ip : 00000000  fp : 00000000
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.355512] r10: ddd40000  r9 : ddd400a8  r8 : ddd400b4
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.360843] r7 : ddec1620  r6 : ddec2924  r5 : 00000000  r4 : de348000
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.367482] r3 : 00000000  r2 : 00000002  r1 : 00000000  r0 : 00000000
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.374122] Flags: nZCv  IRQs on  FIQs on  Mode SVC_32  ISA ARM  Segment none
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.381373] Control: 10c5387d  Table: 1575404a  DAC: 00000051
Wed Nov 29 01:50:11 2017 kern.emerg kernel: [133208.387228] Process hostapd (pid: 2712, stack limit = 0xd34b4210)
Wed Nov 29 01:50:11 2017 kern.emerg kernel: [133208.393432] Stack: (0xd34b5c80 to 0xd34b6000)
Wed Nov 29 01:50:11 2017 kern.emerg kernel: [133208.397894] 5c80: ddd400b4 0000000f d1d1b5d8 ddec45e0 ddec0be0 bf1f5ac8 d1d1b5d8 ddec1620
Wed Nov 29 01:50:11 2017 kern.emerg kernel: [133208.406192] 5ca0: ddec0be0 db1b5314 de351ce0 de7fe800 00000014 bf1f0b94 d1d1b000 00000002
Wed Nov 29 01:50:11 2017 kern.emerg kernel: [133208.414490] 5cc0: 00000001 db1b5314 dc462840 de7fe800 00000014 bf183ca4 ddec0be0 de3514c0
Wed Nov 29 01:50:11 2017 kern.emerg kernel: [133208.422789] 5ce0: d1d1b000 bf1862e4 00000002 00000002 d1d1b000 ddec0be0 de3514c0 bf187278
Wed Nov 29 01:50:11 2017 kern.emerg kernel: [133208.431086] 5d00: d1d1b000 00000000 00000000 d1d1b000 db1b5320 bf1873c4 de3514c0 00000454
Wed Nov 29 01:50:11 2017 kern.emerg kernel: [133208.439385] 5d20: db1b5320 bf18743c ddec0000 de351000 d34b5d68 bf153dd8 db1b5320 0002000c
Wed Nov 29 01:50:11 2017 kern.emerg kernel: [133208.447683] 5d40: d34b5d68 dc462840 df57c000 bf1426e8 00000000 df57c1fc df57c000 c03c3878
Wed Nov 29 01:50:11 2017 kern.emerg kernel: [133208.455981] 5d60: bf16f4a2 80150014 5a1c0183 0000071d db1b5300 db1b5310 daf13900 de7fe800
Wed Nov 29 01:50:11 2017 kern.emerg kernel: [133208.464279] 5d80: ddec0000 de351000 db1b5300 dc462840 c03c35f0 ddd15800 d34b5dcc 00000000
Wed Nov 29 01:50:11 2017 kern.emerg kernel: [133208.472578] 5da0: 00000008 c03c2c14 c063e0b0 dc462840 dc462840 c03c35dc df4ba400 00000028
Wed Nov 29 01:50:11 2017 kern.emerg kernel: [133208.480876] 5dc0: dc462840 c03c2618 ddd15800 7fffffff 00000000 dc462840 00000000 d34b5f68
Wed Nov 29 01:50:11 2017 kern.emerg kernel: [133208.489174] 5de0: 00000028 ddd15800 00000000 c03c2a84 00000000 c021df4c 00000028 d3482f40
Wed Nov 29 01:50:11 2017 kern.emerg kernel: [133208.497472] 5e00: 00000000 00000a98 00000000 00000000 00000001 d34b5f68 00000000 d34b5e8c
Wed Nov 29 01:50:11 2017 kern.emerg kernel: [133208.505770] 5e20: df1e2c00 00000000 c0618fc8 00000000 00000000 c0381824 d34b5f68 c0381db4
Wed Nov 29 01:50:11 2017 kern.emerg kernel: [133208.514067] 5e40: 00000000 00000000 00000000 0042b010 00000028 bec2fbac 00000000 d34b5eb4
Wed Nov 29 01:50:11 2017 kern.emerg kernel: [133208.522365] 5e60: df1e2c00 c0381fac c0614ec0 00000000 bec2fc04 0043f030 00004000 c004f1c0
Wed Nov 29 01:50:11 2017 kern.emerg kernel: [133208.530663] 5e80: dfbdfef0 ffffffff 337143a8 00007923 00000000 00000000 0118b5e5 00000000
Wed Nov 29 01:50:11 2017 kern.emerg kernel: [133208.538960] 5ea0: dfbdfef0 00000000 e7485430 00000010 00000000 00000000 00000000 00000000
Wed Nov 29 01:50:11 2017 kern.emerg kernel: [133208.547258] 5ec0: dfbdfef0 c0619998 c0614ec0 00000000 d34b5f8c c0055078 df401080 d348a700
Wed Nov 29 01:50:11 2017 kern.emerg kernel: [133208.555556] 5ee0: 00000000 d348a700 df375e20 c00f2a44 df375e84 00000007 00000000 00000000
Wed Nov 29 01:50:11 2017 kern.emerg kernel: [133208.563855] 5f00: ded2e140 c005aca0 d34b5f08 d34b5f08 df401180 df375e00 ffffffff 00000000
Wed Nov 29 01:50:11 2017 kern.emerg kernel: [133208.572154] 5f20: 00000002 c0043634 d2e52018 00040941 de035880 df1e2c00 bec2fc20 00000000
Wed Nov 29 01:50:11 2017 kern.emerg kernel: [133208.580452] 5f40: 00000128 c000ef04 d34b4000 00000000 b6f3a8d0 c0382b50 00000000 00000000
Wed Nov 29 01:50:11 2017 kern.emerg kernel: [133208.588750] 5f60: 00000000 fffffff7 d34b5eac 0000000c 00000001 00000000 00000000 d34b5e54
Wed Nov 29 01:50:11 2017 kern.emerg kernel: [133208.597048] 5f80: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Wed Nov 29 01:50:11 2017 kern.emerg kernel: [133208.605345] 5fa0: b6fb4110 c000ed40 00000000 00000000 00000005 bec2fc20 00000000 00000000
Wed Nov 29 01:50:11 2017 kern.emerg kernel: [133208.613643] 5fc0: 00000000 00000000 b6fb4110 00000128 b6fb1660 00000000 0002bbac b6f3a8d0
Wed Nov 29 01:50:11 2017 kern.emerg kernel: [133208.621941] 5fe0: bec2fbc8 bec2fbb4 b6f8b16c b6f8a638 60000010 00000005 00000000 00000000
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.630270] [<bf1f5624>] (mwl_fwcmd_destroy_ba [mwlwifi]) from [<bf1f5ac8>] (mwl_fwcmd_del_sta_streams+0x1d4/0x330 [mwlwifi])
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.641718] [<bf1f5ac8>] (mwl_fwcmd_del_sta_streams [mwlwifi]) from [<bf1f0b94>] (mwl_mac80211_sta_remove+0x38/0x1c4 [mwlwifi])
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.653375] [<bf1f0b94>] (mwl_mac80211_sta_remove [mwlwifi]) from [<bf183ca4>] (drv_sta_state+0x16c/0x184 [mac80211])
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.664157] [<bf183ca4>] (drv_sta_state [mac80211]) from [<bf1862e4>] (sta_info_move_state+0xbc/0x1d0 [mac80211])
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.674585] [<bf1862e4>] (sta_info_move_state [mac80211]) from [<bf187278>] (sta_set_sinfo+0x954/0xa80 [mac80211])
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.685099] [<bf187278>] (sta_set_sinfo [mac80211]) from [<bf1873c4>] (__sta_info_destroy+0x20/0x28 [mac80211])
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.695350] [<bf1873c4>] (__sta_info_destroy [mac80211]) from [<bf18743c>] (sta_info_destroy_addr_bss+0x2c/0x44 [mac80211])
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.706648] [<bf18743c>] (sta_info_destroy_addr_bss [mac80211]) from [<bf153dd8>] (nl80211_del_station+0xe8/0xf0 [cfg80211])
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.718020] [<bf153dd8>] (nl80211_del_station [cfg80211]) from [<bf1426e8>] (extack_doit+0x2c/0x70 [compat])
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.727987] [<bf1426e8>] (extack_doit [compat]) from [<c03c3878>] (genl_rcv_msg+0x288/0x310)
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.736550] [<c03c3878>] (genl_rcv_msg) from [<c03c2c14>] (netlink_rcv_skb+0x58/0xb4)
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.744500] [<c03c2c14>] (netlink_rcv_skb) from [<c03c35dc>] (genl_rcv+0x20/0x34)
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.752101] [<c03c35dc>] (genl_rcv) from [<c03c2618>] (netlink_unicast+0x138/0x1fc)
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.759877] [<c03c2618>] (netlink_unicast) from [<c03c2a84>] (netlink_sendmsg+0x2f0/0x310)
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.768267] [<c03c2a84>] (netlink_sendmsg) from [<c0381824>] (sock_sendmsg+0x14/0x24)
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.776218] [<c0381824>] (sock_sendmsg) from [<c0381db4>] (___sys_sendmsg+0x184/0x228)
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.784256] [<c0381db4>] (___sys_sendmsg) from [<c0382b50>] (__sys_sendmsg+0x40/0x64)
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.792209] [<c0382b50>] (__sys_sendmsg) from [<c000ed40>] (ret_fast_syscall+0x0/0x3c)
Wed Nov 29 01:50:11 2017 kern.emerg kernel: [133208.800248] Code: e5840010 e5d81004 e5c41014 e598c000 (e59c300c)
Wed Nov 29 01:50:11 2017 kern.warn kernel: [133208.806512] ---[ end trace 1087e18106012c22 ]---
yuhhaurlin commented 6 years ago

It looks like you did not use the latest commit.

yuhhaurlin commented 6 years ago

If you use latest commit, AP-STA-POLL-OK should not happen.

lucize commented 6 years ago

I made a clean, replaced the git hash, deleted the tar.gz file from the download folder, I'm sure I made the update right, even unpacked the file and made a git pull on the sources and it told me i'm up to date. don't know how I could did it wrong

lucize commented 6 years ago

i'll try another time, clone the git repo, archive it and put it in the download folder

yuhhaurlin commented 6 years ago

I will put a formal release version to mwlwifi today. You can test it and give me log if the problem is still happened. With latest commit if device is idle for the configured inactivity time, the client will be disconnected. Unless the code has problem.

lucize commented 6 years ago

looking at the logs, the xperia was dissociated about 2 hours after away, but the priv was still seen connected, the devices were away ~5 hours I'll wait for the new commit

yuhhaurlin commented 6 years ago

No new commit, I will only put a version to mwlwifi today.

aaron1959 commented 6 years ago

ddwrt I'm still having no problems with the last version of dd-wrt with the latest commit. I can't get it to fail yet, I wonder how the others who are testing for this issue are still doing?

lucize commented 6 years ago

don't know why it didn't get the new commit last time from the last update I don't have the AP-STA-POLL-OK in the log files anymore, i'll keep you posted

aaron1959 commented 6 years ago

ddwrtnew This is the one with latest commit. I hope that works for you @lucize I think it may be good.

andyVSR commented 6 years ago

@yuhhaurlin : what about the firmware to be used ? this repo still has 0x09030008 as latest. dd-wrt and maybe other builds use 0x0903bee1. is your intention to commit the firmware change too ?

yuhhaurlin commented 6 years ago

Please use 9.3.0.8. Firmware will be updated with WDS and the version will be 9.3.2.1.

lucize commented 6 years ago

@aaron1959 I was talking about the driver version, I use LEDE, now I think it would be ok, as the stations are disassociated when they are out of reach, had several out and in of range and for now is still ok, but only about 9h of uptime

BrainSlayer commented 6 years ago

just as information. dd-wrt still uses the more recent firmware since it shows better performance and not negative effects so far. if there are known issues which do not exist in 9.3.0.8, i will get back to the older version

yuhhaurlin commented 6 years ago

Please use 9.3.0.8. 9.3.2.1 will be verified with WDS (under developement). If everything is all right, then it will be updated here. Version 0x0903bee1 is only a temporary version, please don't use it.

aaron1959 commented 6 years ago

@lucize yes I was talking about the driver as well I believe this dd-wrt build contains the commits for the "new" driver just different firmware now.

BrainSlayer commented 6 years ago

@aaron1959 yes it contains latest changes. that was the reason for posting. so we get quick feedback about this issue

aaron1959 commented 6 years ago

I'm still testing the heck out of this..

Trying very hard to cause the issue but it keeps functioning as expected it let's go of the 5 Ghz clients and re-acquires them with no issues and no errors in the logs. The logs look completely normal I have two days and some hours. The Samsung S7 can no longer bring it to it's knees.

WildByDesign commented 6 years ago

I still have not been able to reproduce this issue or cause any router instability at all since the "Don't ack null or qos null data packet" commit. It's been smooth sailing with continuous uptime.

yuhhaurlin commented 6 years ago

Thanks. I close this one. If you still encounter the same problem, please report here. If you encounter any other issues, please create another issue to track it.

gsustek commented 6 years ago

what could be this?

Wed Nov 29 07:43:07 2017 daemon.info odhcpd[1480]: Using a RA lifetime of 0 seconds on br-lan Wed Nov 29 07:43:11 2017 daemon.info odhcpd[1480]: Using a RA lifetime of 0 seconds on br-lan Wed Nov 29 07:44:26 2017 daemon.info odhcpd[1480]: Using a RA lifetime of 0 seconds on br-lan Wed Nov 29 07:44:27 2017 daemon.info odhcpd[1480]: Using a RA lifetime of 0 seconds on br-lan Wed Nov 29 07:44:30 2017 daemon.info odhcpd[1480]: Using a RA lifetime of 0 seconds on br-lan Wed Nov 29 07:44:35 2017 daemon.info odhcpd[1480]: Using a RA lifetime of 0 seconds on br-lan Wed Nov 29 07:45:21 2017 daemon.info odhcpd[1480]: Using a RA lifetime of 0 seconds on br-lan Wed Nov 29 07:45:26 2017 daemon.info odhcpd[1480]: Using a RA lifetime of 0 seconds on br-lan [117118.644091] Unable to handle kernel paging request at virtual address 00060004 [117118.651435] pgd = c0004000 [117118.654239] [00060004] *pgd=00000000 [117118.657927] Internal error: Oops: 817 [#1] SMP ARM [117118.662822] Modules linked in: pppoe ppp_async uvcvideo snd_usb_audio pppox ppp_generic nf_conntrack_ipv6 iptable_nat ipt_REJECT ipt_MASQUERADE xt_time xt_tcpudp xt_state xt_recent xt_quota xt_pkttype xt_physdev xt_owner xt_nat xt_multiport xt_mark xt_mac xt_limit xt_helper xt_conntrack xt_connmark xt_connlimit xt_connbytes xt_comment xt_addrtype xt_TCPMSS xt_REDIRECT xt_LOG videobuf2_v4l2 snd_usbmidi_lib slhc nf_reject_ipv4 nf_nat_redirect nf_nat_masquerade_ipv4 nf_conntrack_ipv4 nf_nat_ipv4 nf_nat nf_log_ipv4 nf_defrag_ipv6 nf_defrag_ipv4 nf_conntrack_rtcache nf_conntrack_netlink nf_conntrack iptable_mangle iptable_filter ip_tables input_core crc_ccitt br_netfilter videobuf2_vmalloc videobuf2_memops videobuf2_core v4l2_common videodev mwlwifi mac80211 cfg80211 compat cryptodev xt_set ip_set_list_set ip_set_hash_netiface ip_set_hash_netport ip_set_hash_netnet ip_set_hash_net ip_set_hash_netportnet ip_set_hash_mac ip_set_hash_ipportnet ip_set_hash_ipportip ip_set_hash_ipport ip_set_hash_ipmark ip_set_hash_ip ip_set_bitmap_port ip_set_bitmap_ipmac ip_set_bitmap_ip ip_set nfnetlink ip6t_REJECT nf_reject_ipv6 nf_log_ipv6 nf_log_common ip6table_mangle ip6table_filter ip6_tables x_tables nfsd nfs sit tunnel4 ip_tunnel tun snd_compress snd_pcm_oss snd_mixer_oss snd_pcm snd_timer snd_rawmidi snd_seq_device snd_hwdep snd soundcore lockd sunrpc grace dma_shared_buffer sha256_generic seqiv jitterentropy_rng drbg hmac ctr ccm cbc authenc gpio_button_hotplug exportfs [117118.793565] CPU: 1 PID: 0 Comm: swapper/1 Not tainted 4.9.65 #0 [117118.799595] Hardware name: Marvell Armada 380/385 (Device Tree) [117118.805625] task: df456f80 task.stack: df47c000 [117118.810263] PC is at detach_if_pending+0x94/0xb0 [117118.814985] LR is at try_to_del_timer_sync+0x3c/0x58 [117118.820056] pc : [] lr : [] psr: 20000193 [117118.820056] sp : df47dd00 ip : 00060000 fp : d9cff0ac [117118.831754] r10: ad021080 r9 : 00001000 r8 : 00000000 [117118.837086] r7 : 00000000 r6 : d3e7ce00 r5 : d3e7ce7c r4 : dfbdd2c0 [117118.843725] r3 : d3e7cd7c r2 : 00000001 r1 : dfbdd2c0 r0 : d3e7ce7c [117118.850365] Flags: nzCv IRQs off FIQs on Mode SVC_32 ISA ARM Segment none [117118.857702] Control: 10c5387d Table: 13dc804a DAC: 00000051 [117118.863558] Process swapper/1 (pid: 0, stack limit = 0xdf47c210) [117118.869674] Stack: (0xdf47dd00 to 0xdf47e000) [117118.874136] dd00: d3e7ce7c 40000113 d3e7ce00 d3e7ce7c d5200c00 c0071374 d3e7ce00 c03dc4f8 [117118.882434] dd20: de5e4e00 d5200c00 d3e7ce00 de5e4e00 00000000 c03dc9e0 d3e7ce00 d5200c00 [117118.890732] dd40: d9b5a0c0 c03f28b8 d3e7ce00 df47dd57 00000026 01000000 5a1e5849 047cfdb8 [117118.899030] dd60: 047cfdb8 00b240be 00000001 c0390648 df47dd78 d9b5a0c0 d3e7ce00 d5200c64 [117118.907328] dd80: d9cff098 d5200c00 00000001 c0686500 c0637240 c03f18e0 00000000 00000000 [117118.915626] dda0: d9b5a0c0 d6ac7600 d9b5a0c0 bf33828c 000039da bf33835c d9b5a0c0 00000008 [117118.923923] ddc0: d9cff098 d9b5a0c0 c049df70 00000000 c06156f0 00000008 d9b5a170 00000000 [117118.932222] dde0: 00000000 c03d1968 d9b5a0c0 00000098 dd989000 d9cff000 00000008 c03d1d68 [117118.940521] de00: d9b5a170 00000001 80000000 c03d1a02 dd989000 00000000 00000000 c0637240 [117118.948818] de20: d505eec0 c03d186c d9b5a0c0 c03d1fa8 d449b000 00000000 80000000 c0637202 [117118.957116] de40: dd989000 00000000 00000000 c0637240 d50b6580 c03d19b0 d9b5a0c0 c0615c70 [117118.965415] de60: c03d1de8 dd989000 d9b5a0c0 c039dc9c 0289a840 dd98905c 16759800 dfbe2a40 [117118.973713] de80: 00000000 d9b5a0c0 00006a85 dfbe0830 00000002 00000000 dfbe0788 00000040 [117118.982011] dea0: 00000001 df47dee0 00000040 c03a07a8 dfbe0830 dfbe0780 c060e780 1f5d2000 [117118.990310] dec0: df47ded8 c039ff5c 0000012c c0614698 00b240c1 c0612d00 df47ded8 df47ded8 [117118.998607] dee0: df47dee0 df47dee0 dfbddbf8 40000003 ffffe000 00000008 00000003 c0612080 [117119.006905] df00: c061208c 00000100 c0612080 c002d504 dfbdfef0 c0470908 00200040 0000000a [117119.015202] df20: c063db80 00b240c0 00000004 c0612d00 00000001 c060c088 00000001 00000000 [117119.023501] df40: df47df90 e0803100 df47c000 c060d168 00000001 c002d810 c060c088 c0014fac [117119.031800] df60: e0802100 c0613b04 df47df90 c0624240 e0803100 c0009474 c000f874 60000013 [117119.040098] df80: ffffffff df47dfc4 00000000 c0012d4c 00000001 00000000 00000000 c001b200 [117119.048395] dfa0: ffffe000 00000000 c0612fe4 00000002 00000000 c0613034 c060d168 00000001 [117119.056694] dfc0: d3e74040 df47dfe0 c000f884 c000f874 60000013 ffffffff 00000051 00000000 [117119.064991] dfe0: ffffe000 c005be10 1f46006a c063d398 00000000 000095ac 00000000 00000001 [117119.073295] [] (detach_if_pending) from [<40000113>] (0x40000113) [117119.080373] Code: e1a00003 e12fff1e e3520000 e583c000 (e58c3004) [117119.086577] ---[ end trace 02884aa3e0d4a23a ]--- [117119.092134] Kernel panic - not syncing: Fatal exception in interrupt [117119.098605] CPU0: stopping [117119.101415] CPU: 0 PID: 0 Comm: swapper/0 Tainted: G D 4.9.65 #0 [117119.108665] Hardware name: Marvell Armada 380/385 (Device Tree) [117119.114708] [] (unwind_backtrace) from [] (show_stack+0x10/0x14) [117119.122577] [] (show_stack) from [] (dump_stack+0x7c/0x9c) [117119.129917] [] (dump_stack) from [] (handle_IPI+0xdc/0x184) [117119.137344] [] (handle_IPI) from [] (gic_handle_irq+0x80/0x8c) [117119.145030] [] (gic_handle_irq) from [] (__irq_svc+0x6c/0x90) [117119.152629] Exception stack(0xc0611f60 to 0xc0611fa8) [117119.157788] 1f60: 00000001 00000000 00000000 c001b200 ffffe000 00000000 c0612fe4 00000001 [117119.166086] 1f80: 00000000 c0613034 c060d168 00000001 d3260040 c0611fb0 c000f884 c000f874 [117119.174382] 1fa0: 60000013 ffffffff [117119.177972] [] (__irq_svc) from [] (arch_cpu_idle+0x1c/0x38) [117119.185492] [] (arch_cpu_idle) from [] (cpu_startup_entry+0x10c/0x1b0) [117119.193884] [] (cpu_startup_entry) from [] (start_kernel+0x3a4/0x428) [117119.202757] Rebooting in 3 seconds..

BootROM - 1.73 Booting from NAND flash

General initialization - Version: 1.0.0 AVS selection from EFUSE disabled (Skip reading EFUSE values) mvSysEnvIsFlavourReduced: TWSI Read of 'flavor' failed

aaron1959 commented 6 years ago

Is that with the very latest commit? it doesn't seem to be so. Is your driver 10.3.4.0-20171129 ?

yuhhaurlin commented 6 years ago

I don't think so. The last commit just free null and qos null packets without sending ack to upper layer. From the Oops, I can't figure out what causes this problem. How to reproduce it?

BrainSlayer commented 6 years ago

@aaron1959 @yuhhaurlin it looks so, look at the very recent kernel version. the previous version did have a different kernel version

BrainSlayer commented 6 years ago

but its also not clear where it crashed. the stackdump is curious. i just can see its related to a timer function

yuhhaurlin commented 6 years ago

@BrainSlayer Yes.

s-pimenta commented 6 years ago

The lastest fimware version has already the fix for this problem?

aaron1959 commented 6 years ago

@s-pimenta YES!

lukaszekk commented 6 years ago

Hi, now pls fix if you can the 1900acs :) unfourtunately theres nothing in logs except i think

Sun Dec 3 20:20:02 2017 daemon.info hostapd: wlan0: STA ac:5f:3e:65:85:6f WPA: received EAPOL-Key with invalid MIC,

router just freeezd, cant connect to it in any way and i had to turn it off and on. Log saved becouse of writing it to file.

`Sun Dec 3 20:04:13 2017 daemon.info dnsmasq-dhcp[2974]: DHCPINFORM(br-lan) 192.168.1.125 74:29:af:13:d5:0f Sun Dec 3 20:04:13 2017 daemon.info dnsmasq-dhcp[2974]: DHCPACK(br-lan) 192.168.1.125 74:29:af:13:d5:0f NR90BPHKG Sun Dec 3 20:08:08 2017 daemon.info dnsmasq-dhcp[2974]: DHCPINFORM(br-lan) 192.168.1.125 74:29:af:13:d5:0f Sun Dec 3 20:08:08 2017 daemon.info dnsmasq-dhcp[2974]: DHCPACK(br-lan) 192.168.1.125 74:29:af:13:d5:0f NR90BPHKG Sun Dec 3 20:09:19 2017 daemon.info hostapd: wlan1: STA 74:29:af:13:d5:0f IEEE 802.11: disassociated Sun Dec 3 20:09:20 2017 daemon.info hostapd: wlan1: STA 74:29:af:13:d5:0f IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE) Sun Dec 3 20:10:02 2017 daemon.info hostapd: wlan1: STA 6c:fa:a7:44:3f:84 WPA: group key handshake completed (RSN) Sun Dec 3 20:10:02 2017 daemon.info hostapd: wlan1: STA ac:5f:3e:65:85:6f WPA: group key handshake completed (RSN) Sun Dec 3 20:10:05 2017 daemon.info hostapd: wlan0: STA 5c:70:a3:7d:a2:d6 WPA: group key handshake completed (RSN) Sun Dec 3 20:11:05 2017 daemon.info hostapd: wlan0: STA ac:5f:3e:65:85:6f IEEE 802.11: authenticated Sun Dec 3 20:11:05 2017 daemon.info hostapd: wlan0: STA ac:5f:3e:65:85:6f IEEE 802.11: associated (aid 2) Sun Dec 3 20:11:06 2017 daemon.info hostapd: wlan0: STA ac:5f:3e:65:85:6f WPA: pairwise key handshake completed (RSN) Sun Dec 3 20:11:06 2017 daemon.info dnsmasq-dhcp[2974]: DHCPREQUEST(br-lan) 192.168.1.162 ac:5f:3e:65:85:6f Sun Dec 3 20:11:06 2017 daemon.info dnsmasq-dhcp[2974]: DHCPACK(br-lan) 192.168.1.162 ac:5f:3e:65:85:6f Samsung-Galaxy-S7 Sun Dec 3 20:14:05 2017 daemon.info hostapd: wlan1: STA ac:5f:3e:65:85:6f IEEE 802.11: authenticated Sun Dec 3 20:14:05 2017 daemon.info hostapd: wlan1: STA ac:5f:3e:65:85:6f IEEE 802.11: associated (aid 1) Sun Dec 3 20:14:06 2017 daemon.info hostapd: wlan1: STA ac:5f:3e:65:85:6f WPA: pairwise key handshake completed (RSN) Sun Dec 3 20:14:06 2017 daemon.info dnsmasq-dhcp[2974]: DHCPREQUEST(br-lan) 192.168.1.162 ac:5f:3e:65:85:6f Sun Dec 3 20:14:06 2017 daemon.info dnsmasq-dhcp[2974]: DHCPACK(br-lan) 192.168.1.162 ac:5f:3e:65:85:6f Samsung-Galaxy-S7 Sun Dec 3 20:20:02 2017 daemon.info hostapd: wlan0: STA ac:5f:3e:65:85:6f WPA: received EAPOL-Key with invalid MIC Sun Dec 3 20:20:02 2017 daemon.info hostapd: wlan1: STA ac:5f:3e:65:85:6f WPA: group key handshake completed (RSN) Sun Dec 3 20:20:02 2017 daemon.info hostapd: wlan1: STA 6c:fa:a7:44:3f:84 WPA: group key handshake completed (RSN) Sun Dec 3 20:20:05 2017 daemon.info hostapd: wlan0: STA 5c:70:a3:7d:a2:d6 WPA: group key handshake completed (RSN) Sun Dec 3 20:20:10 2017 daemon.info hostapd: wlan0: STA ac:5f:3e:65:85:6f IEEE 802.11: deauthenticated due to local deauth request Sun Dec 3 20:24:23 2017 daemon.info hostapd: wlan0: STA ac:5f:3e:65:85:6f IEEE 802.11: authenticated Sun Dec 3 20:24:23 2017 daemon.info hostapd: wlan0: STA ac:5f:3e:65:85:6f IEEE 802.11: associated (aid 2) Sun Dec 3 20:24:23 2017 daemon.info hostapd: wlan0: STA ac:5f:3e:65:85:6f WPA: pairwise key handshake completed (RSN) Sun Dec 3 20:24:23 2017 daemon.info dnsmasq-dhcp[2974]: DHCPREQUEST(br-lan) 192.168.1.162 ac:5f:3e:65:85:6f Sun Dec 3 20:24:23 2017 daemon.info dnsmasq-dhcp[2974]: DHCPACK(br-lan) 192.168.1.162 ac:5f:3e:65:85:6f Samsung-Galaxy-S7 Sun Dec 3 20:29:02 2017 daemon.info hostapd: wlan1: STA ac:5f:3e:65:85:6f IEEE 802.11: authenticated Sun Dec 3 20:29:02 2017 daemon.info hostapd: wlan1: STA ac:5f:3e:65:85:6f IEEE 802.11: associated (aid 1) Sun Dec 3 20:29:02 2017 daemon.info hostapd: wlan1: STA ac:5f:3e:65:85:6f WPA: pairwise key handshake completed (RSN) Sun Dec 3 20:29:02 2017 daemon.info dnsmasq-dhcp[2974]: DHCPREQUEST(br-lan) 192.168.1.162 ac:5f:3e:65:85:6f Sun Dec 3 20:29:02 2017 daemon.info dnsmasq-dhcp[2974]: DHCPACK(br-lan) 192.168.1.162 ac:5f:3e:65:85:6f Samsung-Galaxy-S7 Sun Dec 3 20:29:09 2017 daemon.info hostapd: wlan1: STA 74:29:af:13:d5:0f IEEE 802.11: authenticated Sun Dec 3 20:29:09 2017 daemon.info hostapd: wlan1: STA 74:29:af:13:d5:0f IEEE 802.11: associated (aid 3) Sun Dec 3 20:29:10 2017 daemon.info hostapd: wlan1: STA 74:29:af:13:d5:0f WPA: pairwise key handshake completed (RSN) Sun Dec 3 20:29:10 2017 daemon.info dnsmasq-dhcp[2974]: DHCPINFORM(br-lan) 192.168.1.125 74:29:af:13:d5:0f Sun Dec 3 20:29:10 2017 daemon.info dnsmasq-dhcp[2974]: DHCPACK(br-lan) 192.168.1.125 74:29:af:13:d5:0f NR90BPHKG Sun Dec 3 20:29:10 2017 daemon.info dnsmasq-dhcp[2974]: DHCPREQUEST(br-lan) 192.168.1.125 74:29:af:13:d5:0f Sun Dec 3 20:29:10 2017 daemon.warn dnsmasq-dhcp[2974]: Ignoring domain nt.impel.sa for DHCP host name NR90BPHKG Sun Dec 3 20:29:10 2017 daemon.info dnsmasq-dhcp[2974]: DHCPACK(br-lan) 192.168.1.125 74:29:af:13:d5:0f NR90BPHKG Sun Dec 3 20:30:01 2017 daemon.info hostapd: wlan1: STA 74:29:af:13:d5:0f WPA: group key handshake completed (RSN) Sun Dec 3 20:30:02 2017 daemon.info hostapd: wlan1: STA ac:5f:3e:65:85:6f WPA: group key handshake completed (RSN) Sun Dec 3 20:30:02 2017 daemon.info hostapd: wlan1: STA 6c:fa:a7:44:3f:84 WPA: group key handshake completed (RSN) Sun Dec 3 20:30:03 2017 daemon.info hostapd: wlan0: STA 5c:70:a3:7d:a2:d6 WPA: group key handshake completed (RSN) Sun Dec 3 20:30:10 2017 daemon.info hostapd: wlan0: STA ac:5f:3e:65:85:6f IEEE 802.11: deauthenticated due to local deauth request Sun Dec 3 20:30:11 2017 daemon.info dnsmasq-dhcp[2974]: DHCPINFORM(br-lan) 192.168.1.125 74:29:af:13:d5:0f Sun Dec 3 20:30:11 2017 daemon.info dnsmasq-dhcp[2974]: DHCPACK(br-lan) 192.168.1.125 74:29:af:13:d5:0f NR90BPHKG Sun Dec 3 20:30:15 2017 daemon.info dnsmasq-dhcp[2974]: DHCPINFORM(br-lan) 192.168.1.125 74:29:af:13:d5:0f Sun Dec 3 20:30:15 2017 daemon.info dnsmasq-dhcp[2974]: DHCPACK(br-lan) 192.168.1.125 74:29:af:13:d5:0f NR90BPHKG Sun Dec 3 20:40:02 2017 daemon.info hostapd: wlan1: STA 6c:fa:a7:44:3f:84 WPA: group key handshake completed (RSN) Sun Dec 3 20:40:02 2017 daemon.info hostapd: wlan0: STA 5c:70:a3:7d:a2:d6 WPA: group key handshake completed (RSN) Sun Dec 3 20:40:03 2017 daemon.info hostapd: wlan1: STA 74:29:af:13:d5:0f WPA: group key handshake completed (RSN) Sun Dec 3 20:40:03 2017 daemon.info hostapd: wlan1: STA ac:5f:3e:65:85:6f WPA: group key handshake completed (RSN) Sun Dec 3 20:40:32 2017 daemon.info dnsmasq-dhcp[2974]: DHCPINFORM(br-lan) 192.168.1.125 74:29:af:13:d5:0f Sun Dec 3 20:40:32 2017 daemon.info dnsmasq-dhcp[2974]: DHCPACK(br-lan) 192.168.1.125 74:29:af:13:d5:0f NR90BPHKG Sun Dec 3 20:44:27 2017 daemon.info dnsmasq-dhcp[2974]: DHCPINFORM(br-lan) 192.168.1.125 74:29:af:13:d5:0f Sun Dec 3 20:44:27 2017 daemon.info dnsmasq-dhcp[2974]: DHCPACK(br-lan) 192.168.1.125 74:29:af:13:d5:0f NR90BPHKG Sun Dec 3 20:47:12 2017 daemon.info dnsmasq-dhcp[2974]: DHCPINFORM(br-lan) 192.168.1.125 74:29:af:13:d5:0f Sun Dec 3 20:47:12 2017 daemon.info dnsmasq-dhcp[2974]: DHCPACK(br-lan) 192.168.1.125 74:29:af:13:d5:0f NR90BPHKG Sun Dec 3 20:50:02 2017 daemon.info hostapd: wlan1: STA 6c:fa:a7:44:3f:84 WPA: group key handshake completed (RSN) Sun Dec 3 20:50:02 2017 daemon.info hostapd: wlan1: STA ac:5f:3e:65:85:6f WPA: group key handshake completed (RSN) Sun Dec 3 20:50:02 2017 daemon.info hostapd: wlan1: STA 74:29:af:13:d5:0f WPA: group key handshake completed (RSN) Sun Dec 3 20:50:03 2017 daemon.info hostapd: wlan0: STA 5c:70:a3:7d:a2:d6 WPA: group key handshake completed (RSN) Sun Dec 3 20:50:32 2017 daemon.info dnsmasq-dhcp[2974]: DHCPINFORM(br-lan) 192.168.1.125 74:29:af:13:d5:0f Sun Dec 3 20:50:32 2017 daemon.info dnsmasq-dhcp[2974]: DHCPACK(br-lan) 192.168.1.125 74:29:af:13:d5:0f NR90BPHKG Sun Dec 3 20:54:18 2017 daemon.info hostapd: wlan0: STA ac:5f:3e:65:85:6f IEEE 802.11: authenticated Sun Dec 3 20:54:18 2017 daemon.info hostapd: wlan0: STA ac:5f:3e:65:85:6f IEEE 802.11: associated (aid 2) Sun Dec 3 20:54:18 2017 daemon.info hostapd: wlan0: STA ac:5f:3e:65:85:6f WPA: pairwise key handshake completed (RSN) Sun Dec 3 20:54:18 2017 daemon.info dnsmasq-dhcp[2974]: DHCPREQUEST(br-lan) 192.168.1.162 ac:5f:3e:65:85:6f Sun Dec 3 20:54:18 2017 daemon.info dnsmasq-dhcp[2974]: DHCPACK(br-lan) 192.168.1.162 ac:5f:3e:65:85:6f Samsung-Galaxy-S7 Sun Dec 3 20:55:31 2017 daemon.info hostapd: wlan1: STA ac:5f:3e:65:85:6f IEEE 802.11: authenticated Sun Dec 3 20:55:31 2017 daemon.info hostapd: wlan1: STA ac:5f:3e:65:85:6f IEEE 802.11: associated (aid 1) Sun Dec 3 20:55:31 2017 daemon.info hostapd: wlan1: STA ac:5f:3e:65:85:6f WPA: pairwise key handshake completed (RSN) Sun Dec 3 20:55:31 2017 daemon.info dnsmasq-dhcp[2974]: DHCPREQUEST(br-lan) 192.168.1.162 ac:5f:3e:65:85:6f Sun Dec 3 20:55:31 2017 daemon.info dnsmasq-dhcp[2974]: DHCPACK(br-lan) 192.168.1.162 ac:5f:3e:65:85:6f Samsung-Galaxy-S7 Sun Dec 3 20:59:07 2017 daemon.info dnsmasq-dhcp[2974]: DHCPINFORM(br-lan) 192.168.1.125 74:29:af:13:d5:0f Sun Dec 3 20:59:07 2017 daemon.info dnsmasq-dhcp[2974]: DHCPACK(br-lan) 192.168.1.125 74:29:af:13:d5:0f NR90BPHKG Sun Dec 3 21:00:02 2017 daemon.info hostapd: wlan1: STA 6c:fa:a7:44:3f:84 WPA: group key handshake completed (RSN) Sun Dec 3 21:00:02 2017 daemon.info hostapd: wlan1: STA ac:5f:3e:65:85:6f WPA: group key handshake completed (RSN) Sun Dec 3 21:00:02 2017 daemon.info hostapd: wlan1: STA 74:29:af:13:d5:0f WPA: group key handshake completed (RSN) Sun Dec 3 21:00:02 2017 daemon.info hostapd: wlan0: STA 5c:70:a3:7d:a2:d6 WPA: group key handshake completed (RSN) Sun Dec 3 21:00:10 2017 daemon.info hostapd: wlan0: STA ac:5f:3e:65:85:6f IEEE 802.11: deauthenticated due to local deauth request Sun Dec 3 21:00:32 2017 daemon.info dnsmasq-dhcp[2974]: DHCPINFORM(br-lan) 192.168.1.125 74:29:af:13:d5:0f Sun Dec 3 21:00:32 2017 daemon.info dnsmasq-dhcp[2974]: DHCPACK(br-lan) 192.168.1.125 74:29:af:13:d5:0f NR90BPHKG

Sun Dec 3 21:10:02 2017 daemon.info hostapd: wlan1: STA 74:29:af:13:d5:0f WPA: group key handshake completed (RSN) Sun Dec 3 21:10:02 2017 daemon.info hostapd: wlan1: STA 6c:fa:a7:44:3f:84 WPA: group key handshake completed (RSN) Sun Dec 3 21:10:02 2017 daemon.info hostapd: wlan1: STA ac:5f:3e:65:85:6f WPA: group key handshake completed (RSN) Sun Dec 3 21:10:02 2017 daemon.info hostapd: wlan0: STA 5c:70:a3:7d:a2:d6 WPA: group key handshake completed (RSN) Sun Dec 3 21:10:32 2017 daemon.info dnsmasq-dhcp[2974]: DHCPINFORM(br-lan) 192.168.1.125 74:29:af:13:d5:0f Sun Dec 3 21:10:32 2017 daemon.info dnsmasq-dhcp[2974]: DHCPACK(br-lan) 192.168.1.125 74:29:af:13:d5:0f NR90BPHKG Sun Dec 3 21:14:51 2017 daemon.info dnsmasq-dhcp[2974]: DHCPINFORM(br-lan) 192.168.1.125 74:29:af:13:d5:0f Sun Dec 3 21:14:51 2017 daemon.info dnsmasq-dhcp[2974]: DHCPACK(br-lan) 192.168.1.125 74:29:af:13:d5:0f NR90BPHKG Sun Dec 3 21:20:02 2017 daemon.info hostapd: wlan1: STA 6c:fa:a7:44:3f:84 WPA: group key handshake completed (RSN) Sun Dec 3 21:20:02 2017 daemon.info hostapd: wlan1: STA 74:29:af:13:d5:0f WPA: group key handshake completed (RSN) Sun Dec 3 21:20:02 2017 daemon.info hostapd: wlan1: STA ac:5f:3e:65:85:6f WPA: group key handshake completed (RSN) Sun Dec 3 21:20:02 2017 daemon.info hostapd: wlan0: STA 5c:70:a3:7d:a2:d6 WPA: group key handshake completed (RSN) Sun Dec 3 21:20:32 2017 daemon.info dnsmasq-dhcp[2974]: DHCPINFORM(br-lan) 192.168.1.125 74:29:af:13:d5:0f Sun Dec 3 21:20:32 2017 daemon.info dnsmasq-dhcp[2974]: DHCPACK(br-lan) 192.168.1.125 74:29:af:13:d5:0f NR90BPHKG Sun Dec 3 21:29:08 2017 daemon.info dnsmasq-dhcp[2974]: DHCPINFORM(br-lan) 192.168.1.125 74:29:af:13:d5:0f Sun Dec 3 21:29:08 2017 daemon.info dnsmasq-dhcp[2974]: DHCPACK(br-lan) 192.168.1.125 74:29:af:13:d5:0f NR90BPHKG Sun Dec 3 21:30:02 2017 daemon.info hostapd: wlan1: STA 6c:fa:a7:44:3f:84 WPA: group key handshake completed (RSN) Sun Dec 3 21:30:02 2017 daemon.info hostapd: wlan1: STA 74:29:af:13:d5:0f WPA: group key handshake completed (RSN) Sun Dec 3 21:30:02 2017 daemon.info hostapd: wlan1: STA ac:5f:3e:65:85:6f WPA: group key handshake completed (RSN) Sun Dec 3 21:30:02 2017 daemon.info hostapd: wlan0: STA 5c:70:a3:7d:a2:d6 WPA: group key handshake completed (RSN) Sun Dec 3 21:30:32 2017 daemon.info dnsmasq-dhcp[2974]: DHCPINFORM(br-lan) 192.168.1.125 74:29:af:13:d5:0f Sun Dec 3 21:30:32 2017 daemon.info dnsmasq-dhcp[2974]: DHCPACK(br-lan) 192.168.1.125 74:29:af:13:d5:0f NR90BPHKG Sun Dec 3 21:32:54 2017 daemon.info hostapd: wlan1: STA 74:29:af:13:d5:0f IEEE 802.11: disassociated Sun Dec 3 21:32:55 2017 daemon.info hostapd: wlan1: STA 74:29:af:13:d5:0f IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE) Sun Dec 3 21:40:02 2017 daemon.info hostapd: wlan1: STA 6c:fa:a7:44:3f:84 WPA: group key handshake completed (RSN) Sun Dec 3 21:40:03 2017 daemon.info hostapd: wlan0: STA 5c:70:a3:7d:a2:d6 WPA: group key handshake completed (RSN) Sun Dec 3 21:40:03 2017 daemon.info hostapd: wlan1: STA ac:5f:3e:65:85:6f WPA: group key handshake completed (RSN) Sun Dec 3 21:50:02 2017 daemon.info hostapd: wlan1: STA 6c:fa:a7:44:3f:84 WPA: group key handshake completed (RSN) Sun Dec 3 21:50:02 2017 daemon.info hostapd: wlan0: STA 5c:70:a3:7d:a2:d6 WPA: group key handshake completed (RSN) Sun Dec 3 21:50:03 2017 daemon.info hostapd: wlan1: STA ac:5f:3e:65:85:6f WPA: group key handshake completed (RSN) `

yuhhaurlin commented 6 years ago

Please show me version you used and useful logs.

lukaszekk commented 6 years ago

ok i started logging and installed stable lede 17.01

kubrickfr commented 6 years ago

@lukaszekk stable lede 17.01 contains an old version of the driver, which does not contain the fix for this issue.

eduperez commented 6 years ago

After installing stable LEDE 17.01.4, grab an updated mwlwifi driver from here: https://github.com/eduperez/mwlwifi_LEDE

kiwidoggie commented 6 years ago

@eduperez I am having more instability with the latest mwlwifi driver. I removed the old one and installed the latest one from your repo. At this point I fully disabled wireless on my WRT3200ACM. What consistently happens at random points, are all wifi connections drop and they are still being broadcasted, but cannot connect. The entire LEDE interface will not come up, lights are on the router yet nothing is blinking (meaning the entire thing froze) requiring a hard reset.

I enabled logging, and waiting for it to crash again so I can get the system log. Has there been another driver update since 9 days ago?

aaron1959 commented 6 years ago

@kiwidoggie Can you do cat /sys/kernel/debug/ieee80211/phy1/mwlwifi/info

So we can see what exactly you are using? I ask because the symptoms would indicate wrong driver or wrong firmware. It seems that no one is having these issues with the very latest driver/firmware combo.

eduperez commented 6 years ago

@kiwidoggie I just create packages from the source code published here, so people can test the latest commits without having to reinstall LEDE from scratch. My repo is a mirror of this repo, so the latest package from my repo contains the same code as the latest commit in this repo, and there will not be any update in my repo until there is an update here.

Please, do as @aaron1959 requested, and post the info here.

kiwidoggie commented 6 years ago

Yes, here is that information

driver name: mwlwifi
chip type: 88W8964
hw version: 7
driver version: 10.3.4.0-20170606
firmware version: 0x09030007
power table loaded from dts: no
firmware region code: 0x10
mac address: 60:38:e0:be:cc:e1
2g: enable
5g: disable
antenna: 4 4
irq number: 106
ap macid support: 0000ffff
sta macid support: 00010000
macid used: 00000001
radio: enable
iobase0: e1200000
iobase1: e1480000
tx limit: 1024
rx limit: 16384

Are there any more commands, that I should run in order to get more information for you guys. Could be that I may need a fresh install on this router.

I've also noticed, my WLAN has dropped when only enabling one of the WIFI interfaces (2g, 5g radios ac, bgnac are disabled) that my signal level is 0. It shows that there are 2 devices attached, but each one has a signal level of 0 (my phone/chromcast cannot seem to pull DNS or any real information other than DHCP, reboot and everything works fine) Enabling both, leads to the instability and no luci on LAN, and 0 blinking lights/packet flow.

image

aaron1959 commented 6 years ago

Your driver and firmware are VERY OLD. That driver and firmware are broken and probably the reason you are having problems.

You very much need to use a current build and I think your problems will be gone.

aaron1959 commented 6 years ago

Until you update to the current driver and firmware your router will not work properly. Please load the new stuff and post your new results if you continue to have any other issues. I'm amazed if your wireless is working at all lol.

kiwidoggie commented 6 years ago

Is there a build server for builds, or do I have to build everything from scratch? I used the latest on the lede wiki page (if there's an updated link, I will request an edit to it)

Glad to know

ratsputin commented 6 years ago

@kiwidoggie Here is the link to the router information for the WRT3200ACM: https://lede-project.org/toh/views/toh_fwdownload?dataflt%5BModel*~%5D=WRT3200ACM

Here's a direct link to the latest release firmware (upgrade): https://downloads.lede-project.org/releases/17.01.4/targets/mvebu/generic/lede-17.01.4-mvebu-linksys-wrt3200acm-squashfs-sysupgrade.bin

ratsputin commented 6 years ago

Once you upgrade to the latest version, you can install the package @eduperez referenced to get the latest fixes.

kiwidoggie commented 6 years ago

Thank you everyone so much, I think my install may have been corrupt, as it didn't want to take the sysupgrade. I upgraded via ssh, and then removed the old driver, and installed the new ipk. Currently outputting

driver name: mwlwifi
chip type: 88W8964
hw version: 7
driver version: 10.3.4.0-20171129
firmware version: 0x09030201
power table loaded from dts: no
firmware region code: 0x0
mac address: 60:38:e0:be:cc:e1
2g: enable
5g: disable
antenna: 4 4
irq number: 106
ap macid support: 0000ffff
sta macid support: 00010000
macid used: 00000001
radio: enable
iobase0: e1200000
iobase1: e1480000
tx limit: 1024
rx limit: 16384

Going to enable the radios again, and see how it fares.

kiwidoggie commented 6 years ago

Still same issue, I managed to catch something on the ssh kernel log before the router died (it never writes this to file, why I always missed it)

Mon Dec 11 05:44:42 2017 kern.info kernel: [  317.186828] mwifiex_sdio mmc0:0001:1: Tx: Bridge packet limit reached. Drop packet!
Mon Dec 11 05:45:53 2017 kern.info kernel: [  388.788510] mwifiex_sdio mmc0:0001:1: cmd_wait_q terminated: -110

I have changed my txqueuelen using ifconfig to be of 20000 up from 1000 to try and remedy this situation, I'm not sure what this actually changed and if it comes with dangerous implications.

yuhhaurlin commented 6 years ago

These messages are not related to mwlwifi.