Closed barhom closed 6 years ago
@laadayush AFAIK the proprietary driver does not support adhoc so it's not a viable alternative for us. Do correct me if I'm wrong. Thanks.
But that proprietary version is vulnerable to KRACK ATTACKS isn't it?
Not sure if it is entirly due to mt76 driver, but I tested latest version. After a while the wifi is not emitted anymore. Hostapd process does not respond and is unkillable even with kill -9
Then any network command like ifconfig or hostapd or /etc/init.d/network restart, ... is freezing the console. (Even ctrl+c does not reply). Although, the network itself is still working. If you want to know more I still have my router in this freezy state and I can try other commands.
I've already seen this, but I cannot remember when, and what was the solution.
With commit 792dbe02613299f67e92815f0b2b7584dc951ffd (still not happening with wifi disabled)
<1>[79032.004078] CPU 1 Unable to handle kernel paging request at virtual address 07407800, epc == 80108880, ra == 80108764
<4>[79032.014717] Oops[#1]:
<4>[79032.017009] CPU: 1 PID: 0 Comm: swapper/1 Not tainted 4.14.44 #0
<4>[79032.023010] task: 8fc43e80 task.stack: 8fc64000
<4>[79032.027541] $ 0 : 00000000 00000001 00000000 814a56f0
<4>[79032.032780] $ 4 : 8058e1b8 00000001 00000001 07407800
<4>[79032.038020] $ 8 : 000c6a65 000c6a64 8f0bc830 8f3e8000
<4>[79032.043263] $12 : 80590000 ffffffff 8e21c930 00000000
<4>[79032.048506] $16 : 8fc02a00 01090220 8c89a000 8032f4d8
<4>[79032.053759] $20 : 00000800 8fc1e05c 01080020 01080020
<4>[79032.059005] $24 : 0000000a 8038af24
<4>[79032.064271] $28 : 8fc64000 8fc0dbc8 8058e8f0 80108764
<4>[79032.069525] Hi : 00001ef9
<4>[79032.072422] Lo : f704a000
<4>[79032.075348] epc : 80108880 __kmalloc_track_caller+0x1d4/0x228
<4>[79032.081294] ra : 80108764 __kmalloc_track_caller+0xb8/0x228
<4>[79032.087127] Status: 11007c03 KERNEL EXL IE
<4>[79032.091316] Cause : 40800008 (ExcCode 02)
<4>[79032.095307] BadVA : 07407800
<4>[79032.098176] PrId : 0001992f (MIPS 1004Kc)
<4>[79032.102257] Modules linked in: xt_coova rtl8192cu rtl8192c_common rtl_usb pppoe ppp_async rtlwifi pppox ppp_generic nf_conntrack_ipv6 mt7603e mt76 mac80211 iptable_nat ipt_REJECT ipt_MASQUERADE cfg80211 xt_time xt_tcpudp xt_tcpmss xt_statistic xt_state xt_recent xt_nat xt_multiport xt_mark xt_mac xt_limit xt_length xt_hl xt_helper xt_ecn xt_dscp xt_conntrack xt_connmark xt_connlimit xt_connbytes xt_comment xt_TCPMSS xt_REDIRECT xt_LOG xt_HL xt_FLOWOFFLOAD xt_DSCP xt_CT xt_CLASSIFY slhc nf_reject_ipv4 nf_nat_redirect nf_nat_masquerade_ipv4 nf_conntrack_ipv4 nf_nat_ipv4 nf_nat nf_log_ipv4 nf_flow_table_hw nf_flow_table nf_defrag_ipv6 nf_defrag_ipv4 nf_conntrack_rtcache nf_conntrack iptable_mangle iptable_filter ipt_ECN ip_tables crc_ccitt compat br_netfilter em_cmp sch_multiq sch_teql em_nbyte sch_pie
<4>[79032.173110] sch_gred sch_dsmark act_police cls_basic act_ipt sch_prio em_meta em_text sch_codel sch_sfq sch_fq sch_red act_skbedit act_mirred em_u32 cls_u32 cls_tcindex cls_flow cls_route cls_fw sch_tbf sch_htb sch_hfsc sch_ingress ledtrig_usbport xt_set ip_set_list_set ip_set_hash_netiface ip_set_hash_netport ip_set_hash_netnet ip_set_hash_net ip_set_hash_netportnet ip_set_hash_mac ip_set_hash_ipportnet ip_set_hash_ipportip ip_set_hash_ipport ip_set_hash_ipmark ip_set_hash_ip ip_set_bitmap_port ip_set_bitmap_ipmac ip_set_bitmap_ip ip_set nfnetlink ip6t_REJECT nf_reject_ipv6 nf_log_ipv6 nf_log_common ip6table_mangle ip6table_filter ip6_tables x_tables tun mmc_block usb_storage mtk_sd mmc_core leds_gpio xhci_mtk xhci_plat_hcd xhci_pci xhci_hcd ahci libahci libata sd_mod scsi_mod gpio_button_hotplug
<4>[79032.243700] ext4 jbd2 mbcache usbcore nls_base usb_common crc32c_generic [last unloaded: xt_coova]
<4>[79032.252751] Process swapper/1 (pid: 0, threadinfo=8fc64000, task=8fc43e80, tls=00000000)
<4>[79032.260805] Stack : 00000000 00000001 805ee694 8f11e5a0 8f5ec840 00000000 01080020 8032d5b0
<4>[79032.269150] 8f2bc000 8f11e5e0 8f11e638 00000014 8f5ec840 8d9c1b00 00000000 00000740
<4>[79032.277496] 000005dc 8032f4d8 8e9f9918 8f2bcd48 8f5ec840 ac07f535 8f5ec840 8f5ec840
<4>[79032.285839] 8d9c1b00 805af320 805b0000 000005dc 8fc1e05c 01080020 00000000 8038b22c
<7>[79032.292476] dotspot-7617IN=br-lan OUT= MAC=78:a3:51:2b:f4:1a:04:79:70:f4:99:49:08:00 SRC=192.168.182.19 DST=216.58.198.202 LEN=83 TOS=0x00 PREC=0x00 TTL=64 ID=47908 DF PROTO=TCP SPT=60174 DPT=443 SEQ=3708027957 ACK=2252467739 WINDOW=1520 RES=0x00 ACK PSH URGP=0 OPT (0101080A00B331006563CC36) MARK=0x100
<7>[79032.298805] dotspot-7617IN=br-lan OUT= MAC=78:a3:51:2b:f4:1a:04:79:70:f4:99:49:08:00 SRC=192.168.182.19 DST=216.58.198.202 LEN=83 TOS=0x00 PREC=0x00 TTL=64 ID=55728 DF PROTO=TCP SPT=60175 DPT=443 SEQ=2581358021 ACK=3043162869 WINDOW=1520 RES=0x00 ACK PSH URGP=0 OPT (0101080A00B33101D50CA9A6) MARK=0x100
<4>[79032.347627] 00000004 803815d4 8e75a064 8fc0dca4 8f180b80 800657f0 80590002 8fc1e000
<4>[79032.355978] ...
<4>[79032.358425] Call Trace:
<4>[79032.360900] [<80108880>] __kmalloc_track_caller+0x1d4/0x228
<4>[79032.366488] [<8032d5b0>] __kmalloc_reserve.isra.7+0x40/0xa4
<4>[79032.372053] [<8032f4d8>] pskb_expand_head+0x8c/0x31c
<4>[79032.377024] [<8038b22c>] ip_forward+0x308/0x48c
<4>[79032.381538] [<80389ce0>] ip_rcv+0x2a0/0x320
<4>[79032.385719] [<80340078>] __netif_receive_skb_core+0xa94/0xc5c
<4>[79032.391463] [<80345fe8>] netif_receive_skb_internal+0xd8/0xf0
<4>[79032.397186] [<8044ba70>] br_pass_frame_up+0xe8/0x154
<4>[79032.402136] [<8044c070>] br_handle_frame_finish+0x53c/0x580
<4>[79032.407683] [<8044c3e4>] br_handle_frame+0x330/0x3dc
<4>[79032.412630] [<8033fd6c>] __netif_receive_skb_core+0x788/0xc5c
<4>[79032.418387] [<80342be4>] process_backlog+0x98/0x160
<4>[79032.423258] [<80346454>] net_rx_action+0x150/0x30c
<4>[79032.428054] [<8047cb90>] __do_softirq+0x128/0x2ec
<4>[79032.432777] [<80032910>] irq_exit+0x98/0xcc
<4>[79032.436972] [<8024a6cc>] plat_irq_dispatch+0xfc/0x138
<4>[79032.442012] [<8000b5a8>] except_vec_vi_end+0xb8/0xc4
<4>[79032.446958] [<8000cf70>] r4k_wait_irqoff+0x1c/0x24
<4>[79032.451757] [<8006645c>] do_idle+0xe4/0x168
<4>[79032.455934] [<800666d8>] cpu_startup_entry+0x24/0x2c
<4>[79032.460884] Code: 00000000 8e020014 00e23821 <8ce20000> 10000009 cc400000 1040ffbd 00000000 8e060010
<4>[79032.470617]
<4>[79032.472480] ---[ end trace 8ecf7d1623c6d529 ]---
you should've used mt7602 chipset. is better than 7603
Haha ... nice, but already invested a lot in this hardware, and it has 7603.
Spencer
On Sun, Jul 8, 2018 at 3:08 PM psyborg55 notifications@github.com wrote:
you should've used mt7602 chipset. is better than 7603
— You are receiving this because you were mentioned. Reply to this email directly, view it on GitHub https://github.com/openwrt/mt76/issues/149#issuecomment-403321039, or mute the thread https://github.com/notifications/unsubscribe-auth/AB0TcnY72zuW7z3MKqq0iByFn1vq6pewks5uEoLNgaJpZM4SCrz0 .
I have massive Wifi disconnection problem with Archer C50 and OpenWrt 18.06 on both 2.4 and 5 GHz. Option option disassoc_low_ack '0'
doesn't fix it. I observe the problem only on Lenovo Yoga Tablet 2 which has no problems when using different router. On Xiaomi Mi 4, iPad, Runbo X6 ang HP laptop there is no such problem.
...
Wed Aug 8 21:45:08 2018 daemon.notice hostapd: wlan1: STA 6c:5f:1c:db:12:f9 IEEE 802.11: did not acknowledge authentication response
Wed Aug 8 21:45:20 2018 daemon.info hostapd: wlan1: STA 6c:5f:1c:db:12:f9 IEEE 802.11: authenticated
Wed Aug 8 21:45:20 2018 daemon.info hostapd: wlan1: STA 6c:5f:1c:db:12:f9 IEEE 802.11: associated (aid 2)
Wed Aug 8 21:45:20 2018 daemon.notice hostapd: wlan1: AP-STA-CONNECTED 6c:5f:1c:db:12:f9
Wed Aug 8 21:45:20 2018 daemon.info hostapd: wlan1: STA 6c:5f:1c:db:12:f9 WPA: pairwise key handshake completed (RSN)
Wed Aug 8 21:45:21 2018 daemon.info dnsmasq-dhcp[1521]: DHCPREQUEST(br-lan) 192.168.1.112 6c:5f:1c:db:12:f9
Wed Aug 8 21:45:21 2018 daemon.info dnsmasq-dhcp[1521]: DHCPACK(br-lan) 192.168.1.112 6c:5f:1c:db:12:f9 android-920fcb9d4829c68b
Wed Aug 8 21:45:50 2018 daemon.info hostapd: wlan1: STA 6c:5f:1c:db:12:f9 IEEE 802.11: disconnected due to excessive missing ACKs
Wed Aug 8 21:45:50 2018 daemon.notice hostapd: wlan1: AP-STA-DISCONNECTED 6c:5f:1c:db:12:f9
Wed Aug 8 21:45:54 2018 daemon.info hostapd: wlan1: STA 6c:5f:1c:db:12:f9 IEEE 802.11: authenticated
Wed Aug 8 21:45:54 2018 daemon.info hostapd: wlan1: STA 6c:5f:1c:db:12:f9 IEEE 802.11: associated (aid 2)
Wed Aug 8 21:45:54 2018 daemon.notice hostapd: wlan1: AP-STA-CONNECTED 6c:5f:1c:db:12:f9
Wed Aug 8 21:45:54 2018 daemon.info hostapd: wlan1: STA 6c:5f:1c:db:12:f9 WPA: pairwise key handshake completed (RSN)
Wed Aug 8 21:45:55 2018 daemon.info dnsmasq-dhcp[1521]: DHCPREQUEST(br-lan) 192.168.1.112 6c:5f:1c:db:12:f9
Wed Aug 8 21:45:55 2018 daemon.info dnsmasq-dhcp[1521]: DHCPACK(br-lan) 192.168.1.112 6c:5f:1c:db:12:f9 android-920fcb9d4829c68b
Wed Aug 8 21:45:58 2018 daemon.info hostapd: wlan1: STA 6c:5f:1c:db:12:f9 IEEE 802.11: disconnected due to excessive missing ACKs
Wed Aug 8 21:45:58 2018 daemon.notice hostapd: wlan1: AP-STA-DISCONNECTED 6c:5f:1c:db:12:f9
Wed Aug 8 21:45:59 2018 daemon.notice hostapd: wlan1: STA 6c:5f:1c:db:12:f9 IEEE 802.11: did not acknowledge authentication response
...
Wed Aug 8 21:47:03 2018 daemon.info hostapd: wlan0: STA 6c:5f:1c:db:12:f9 IEEE 802.11: disconnected due to excessive missing ACKs
Wed Aug 8 21:47:03 2018 daemon.notice hostapd: wlan0: AP-STA-DISCONNECTED 6c:5f:1c:db:12:f9
Wed Aug 8 21:47:09 2018 daemon.info hostapd: wlan0: STA 6c:5f:1c:db:12:f9 IEEE 802.11: authenticated
Wed Aug 8 21:47:09 2018 daemon.info hostapd: wlan0: STA 6c:5f:1c:db:12:f9 IEEE 802.11: associated (aid 1)
Wed Aug 8 21:47:09 2018 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 6c:5f:1c:db:12:f9
Wed Aug 8 21:47:09 2018 daemon.info hostapd: wlan0: STA 6c:5f:1c:db:12:f9 WPA: pairwise key handshake completed (RSN)
Wed Aug 8 21:47:10 2018 daemon.info dnsmasq-dhcp[1521]: DHCPREQUEST(br-lan) 192.168.1.112 6c:5f:1c:db:12:f9
Wed Aug 8 21:47:10 2018 daemon.info dnsmasq-dhcp[1521]: DHCPACK(br-lan) 192.168.1.112 6c:5f:1c:db:12:f9 android-920fcb9d4829c68b
Wed Aug 8 21:47:14 2018 daemon.info hostapd: wlan0: STA 6c:5f:1c:db:12:f9 IEEE 802.11: disconnected due to excessive missing ACKs
Wed Aug 8 21:47:14 2018 daemon.notice hostapd: wlan0: AP-STA-DISCONNECTED 6c:5f:1c:db:12:f9
...
root@OpenWrt:~# lsmod | grep mt7
cfg80211 202032 5 rt2x00lib,mt76x2e,mt7603e,mt76,mac80211
mac80211 390272 7 rt2800lib,rt2x00soc,rt2x00pci,rt2x00lib,mt76x2e,mt7603e,mt76
mt76 18880 2 mt76x2e,mt7603e
mt7603e 28288 0
mt76x2e 42944 0
I am closing this issue. I hope that everyone who have issues with MT7603 opens a new issue writes a detailed report on what the issues are.
@CR-Ryan I have the same device ZBT WE1326 and haven't been able to get 5Ghz working. Can you please point me to the last working commit and some sample settings corresponding to it. Thanks.
Hello,
I thought that maybe we should try to put together all the different issues that everyone is facing with 2.4ghz on MT7603 (specifically this chipset) into this main issue that everyone can easily follow.
I suggest closing the following issues:
26, #66, #90, #107, #121, #136, #146
And then for anyone that still have issues on MT7603 write us here.
Please always mention which TARGET device you are using and make sure you are on trunk when reporting.
Also mention if you are using disassoc_low_ack='0' or not (default is 1)