openwrt / openwrt

This repository is a mirror of https://git.openwrt.org/openwrt/openwrt.git It is for reference only and is not active for check-ins. We will continue to accept Pull Requests here. They will be merged via staging trees then into openwrt.git.
Other
19.53k stars 10.21k forks source link

Xiaomi AX3600 - ath11k crash and "Out of memory" #15929

Open MisiekDP opened 1 month ago

MisiekDP commented 1 month ago

Describe the bug

When using the router (when browsing the web), crashes occur in the form of: switching off the WiFi network, disconnection of the connection. If you go through the router's logbook, you will notice all sorts of errors, including those with the message "Out of memory" and the killing of given processes. Using a package that allows the logging of component usage, it is possible to see increased RAM usage up to the time of failure. There was also a situation where, due to lack of memory, it was also impossible to log into the LUCI GUI panel (the only solution to enable WiFi was to restart the device).

Memory usage during the error: image

CPU usage during the error: image

Signal quality: image

Kernel logs:

[    9.190032] ath10k_pci 0000:01:00.0: qca9887 hw1.0 target 0x4100016d chip_id 0x004000ff sub 0000:0000
[    9.190088] ath10k_pci 0000:01:00.0: kconfig debug 0 debugfs 1 tracing 0 dfs 1 testmode 0
[    9.198407] ath10k_pci 0000:01:00.0: firmware ver 10.1-ct-87-__fW-022-ecad3248 api 2 features wmi-10.x,has-wmi-mgmt-tx,mfp,txstatus-noack,wmi-10.x-CT,ratemask-CT,txrate-CT,get-temp-CT,tx-rc-CT,cust-stats-CT,retry-gt2-CT,txrate2-CT,beacon-cb-CT,wmi-block-ack-CT crc32 61a92df5
[    9.233886] ath10k_pci 0000:01:00.0: Loading BDF type 0
[    9.234107] ath10k_pci 0000:01:00.0: board_file api 2 bmi_id N/A crc32 b4ce36fa
[   10.104510] ath10k_pci 0000:01:00.0: 10.1 wmi init: vdevs: 16  peers: 127  tid: 256
[   10.111937] ath10k_pci 0000:01:00.0: wmi print 'P 128 V 8 T 410'
[   10.111983] ath10k_pci 0000:01:00.0: wmi print 'msdu-desc: 1424  sw-crypt: 0 ct-sta: 0'
[   10.117287] ath10k_pci 0000:01:00.0: wmi print 'alloc rem: 25560 iram: 24780'
[   10.168326] ath10k_pci 0000:01:00.0: htt-ver 2.1 wmi-op 2 htt-op 2 cal nvmem max-sta 128 raw 0 hwcrypto 1
[   10.168688] ath10k_pci 0000:01:00.0: NOTE:  Firmware DBGLOG output disabled in debug_mask: 0x10000000
[   10.307586] ath: EEPROM regdomain: 0x0
[   10.307594] ath: EEPROM indicates default country code should be used
[   10.307598] ath: doing EEPROM country->regdmn map search
[   10.307603] ath: country maps to regdmn code: 0x3a
[   10.307607] ath: Country alpha2 being used: US
[   10.307611] ath: Regpair used: 0x3a
[   10.318788] ath11k c000000.wifi: ipq8074 hw2.0
[   10.318824] ath11k c000000.wifi: FW memory mode: 1
[   10.322440] remoteproc remoteproc0: powering up cd00000.q6v5_wcss
[   10.327112] remoteproc remoteproc0: Booting fw image IPQ8074/q6_fw.mdt, size 668
[   11.558989] remoteproc remoteproc0: remote processor cd00000.q6v5_wcss is now up
[   11.564891] kmodloader: done loading kernel modules from /etc/modules.d/*
[   11.603292] ath11k c000000.wifi: qmi ignore invalid mem req type 3
[   11.610769] ath11k c000000.wifi: chip_id 0x0 chip_family 0x0 board_id 0xff soc_id 0xffffffff
[   11.610824] ath11k c000000.wifi: fw_version 0x290c84a5 fw_build_timestamp 2023-03-25 07:34 fw_build_id WLAN.HK.2.9.0.1-01385-QCAHKSWPL_SILICONZ-1
[   11.824869] ath11k c000000.wifi: htt event 48 not handled
[   14.206812] br-lan: port 1(lan1) entered blocking state
[   14.206861] br-lan: port 1(lan1) entered disabled state
[   14.211110] device lan1 entered promiscuous mode
[   14.224016] br-lan: port 2(lan2) entered blocking state
[   14.224070] br-lan: port 2(lan2) entered disabled state
[   14.228417] device lan2 entered promiscuous mode
[   14.237737] br-lan: port 3(lan3) entered blocking state
[   14.238138] br-lan: port 3(lan3) entered disabled state
[   14.243347] device lan3 entered promiscuous mode
[   14.367869] ath: EEPROM regdomain: 0x8268
[   14.367920] ath: EEPROM indicates we should expect a country code
[   14.370882] ath: doing EEPROM country->regdmn map search
[   14.377030] ath: country maps to regdmn code: 0x37
[   14.382336] ath: Country alpha2 being used: PL
[   14.386976] ath: Regpair used: 0x37
[   14.391364] ath: regdomain 0x8268 dynamically updated by user
[   14.796871] br-lan: port 4(phy1-ap0) entered blocking state
[   14.796921] br-lan: port 4(phy1-ap0) entered disabled state
[   14.801492] device phy1-ap0 entered promiscuous mode
[   14.806935] br-lan: port 4(phy1-ap0) entered blocking state
[   14.812029] br-lan: port 4(phy1-ap0) entered forwarding state
[   14.819772] device phy1-ap0 left promiscuous mode
[   14.823331] br-lan: port 4(phy1-ap0) entered disabled state
[   14.889297] br-lan: port 4(phy1-ap0) entered blocking state
[   14.889353] br-lan: port 4(phy1-ap0) entered disabled state
[   14.893982] device phy1-ap0 entered promiscuous mode
[   14.899494] br-lan: port 4(phy1-ap0) entered blocking state
[   14.904467] br-lan: port 4(phy1-ap0) entered forwarding state
[   15.206569] br-lan: port 4(phy1-ap0) entered disabled state
[   15.827132] br-lan: port 5(phy2-ap0) entered blocking state
[   15.827181] br-lan: port 5(phy2-ap0) entered disabled state
[   15.831762] device phy2-ap0 entered promiscuous mode
[   15.837253] br-lan: port 5(phy2-ap0) entered blocking state
[   15.842291] br-lan: port 5(phy2-ap0) entered forwarding state
[   16.241008] br-lan: port 5(phy2-ap0) entered disabled state
[   16.326905] nss-dp 3a001800.dp5 lan3: PHY Link up speed: 100
[   16.326997] br-lan: port 3(lan3) entered blocking state
[   16.331648] br-lan: port 3(lan3) entered forwarding state
[   16.335213] nss-dp 3a001600.dp4 lan2: PHY Link up speed: 100
[   16.342252] br-lan: port 2(lan2) entered blocking state
[   16.347936] br-lan: port 2(lan2) entered forwarding state
[   17.366690] nss-dp 3a001200.dp2 wan: PHY Link up speed: 1000
[   17.366779] IPv6: ADDRCONF(NETDEV_CHANGE): wan: link becomes ready
[   18.406658] nss-dp 3a001600.dp4 lan2: PHY Link is down
[   18.406943] br-lan: port 2(lan2) entered disabled state
[   19.089181] IPv6: ADDRCONF(NETDEV_CHANGE): phy1-ap0: link becomes ready
[   19.089383] br-lan: port 4(phy1-ap0) entered blocking state
[   19.094621] br-lan: port 4(phy1-ap0) entered forwarding state
[   19.446730] nss-dp 3a001800.dp5 lan3: PHY Link is down
[   19.447025] br-lan: port 3(lan3) entered disabled state
[   20.486646] nss-dp 3a001600.dp4 lan2: PHY Link up speed: 100
[   20.486735] br-lan: port 2(lan2) entered blocking state
[   20.491386] br-lan: port 2(lan2) entered forwarding state
[   21.536664] nss-dp 3a001800.dp5 lan3: PHY Link up speed: 100
[   21.536750] br-lan: port 3(lan3) entered blocking state
[   21.541404] br-lan: port 3(lan3) entered forwarding state
[   22.566673] nss-dp 3a001800.dp5 lan3: PHY Link is down
[   22.566710] nss-dp 3a001600.dp4 lan2: PHY Link is down
[   22.570937] br-lan: port 3(lan3) entered disabled state
[   22.576453] br-lan: port 2(lan2) entered disabled state
[   23.606751] nss-dp 3a001600.dp4 lan2: PHY Link up speed: 100
[   23.606833] br-lan: port 2(lan2) entered blocking state
[   23.611488] br-lan: port 2(lan2) entered forwarding state
[   24.646730] nss-dp 3a001600.dp4 lan2: PHY Link is down
[   24.646778] nss-dp 3a001800.dp5 lan3: PHY Link up speed: 100
[   24.651026] br-lan: port 2(lan2) entered disabled state
[   24.656925] br-lan: port 3(lan3) entered blocking state
[   24.661541] br-lan: port 3(lan3) entered forwarding state
[   25.686663] nss-dp 3a001800.dp5 lan3: PHY Link is down
[   25.686954] br-lan: port 3(lan3) entered disabled state
[   26.726786] nss-dp 3a001600.dp4 lan2: PHY Link up speed: 100
[   26.726818] nss-dp 3a001800.dp5 lan3: PHY Link up speed: 100
[   26.726871] br-lan: port 2(lan2) entered blocking state
[   26.737194] br-lan: port 2(lan2) entered forwarding state
[   26.742597] br-lan: port 3(lan3) entered blocking state
[   26.747704] br-lan: port 3(lan3) entered forwarding state
[   27.766692] nss-dp 3a001600.dp4 lan2: PHY Link is down
[   27.766984] br-lan: port 2(lan2) entered disabled state
[   28.806702] nss-dp 3a001600.dp4 lan2: PHY Link up speed: 100
[   28.806788] br-lan: port 2(lan2) entered blocking state
[   28.811442] br-lan: port 2(lan2) entered forwarding state
[   29.846639] nss-dp 3a001800.dp5 lan3: PHY Link is down
[   29.846704] nss-dp 3a001600.dp4 lan2: PHY Link is down
[   29.850914] br-lan: port 3(lan3) entered disabled state
[   30.886710] br-lan: port 2(lan2) entered disabled state
[   30.886824] nss-dp 3a001600.dp4 lan2: PHY Link up speed: 10
[   30.886956] nss-dp 3a001800.dp5 lan3: PHY Link up speed: 100
[   30.890849] br-lan: port 2(lan2) entered blocking state
[   30.902250] br-lan: port 2(lan2) entered forwarding state
[   30.907458] br-lan: port 3(lan3) entered blocking state
[   30.912722] br-lan: port 3(lan3) entered forwarding state
[   31.229414] IPv6: ADDRCONF(NETDEV_CHANGE): phy2-ap0: link becomes ready
[   31.229642] br-lan: port 5(phy2-ap0) entered blocking state
[   31.234860] br-lan: port 5(phy2-ap0) entered forwarding state
[   32.966660] nss-dp 3a001800.dp5 lan3: PHY Link is down
[   32.966953] br-lan: port 3(lan3) entered disabled state
[   33.126456] l11: disabling
[   34.006763] nss-dp 3a001800.dp5 lan3: PHY Link up speed: 100
[   34.006856] br-lan: port 3(lan3) entered blocking state
[   34.011506] br-lan: port 3(lan3) entered forwarding state
[   36.086675] nss-dp 3a001800.dp5 lan3: PHY Link is down
[   36.086968] br-lan: port 3(lan3) entered disabled state
[   40.246745] nss-dp 3a001800.dp5 lan3: PHY Link up speed: 100
[   40.246858] br-lan: port 3(lan3) entered blocking state
[   40.251498] br-lan: port 3(lan3) entered forwarding state
[   44.406598] nss-dp 3a001800.dp5 lan3: PHY Link is down
[   44.406951] br-lan: port 3(lan3) entered disabled state
[   45.446795] nss-dp 3a001800.dp5 lan3: PHY Link up speed: 100
[   45.446891] br-lan: port 3(lan3) entered blocking state
[   45.451550] br-lan: port 3(lan3) entered forwarding state
[   46.486729] nss-dp 3a001800.dp5 lan3: PHY Link is down
[   46.487048] br-lan: port 3(lan3) entered disabled state
[   47.526776] nss-dp 3a001800.dp5 lan3: PHY Link up speed: 100
[   47.526864] br-lan: port 3(lan3) entered blocking state
[   47.531517] br-lan: port 3(lan3) entered forwarding state
[   49.606705] nss-dp 3a001800.dp5 lan3: PHY Link is down
[   49.607026] br-lan: port 3(lan3) entered disabled state
[   50.646710] nss-dp 3a001800.dp5 lan3: PHY Link up speed: 100
[   50.646796] br-lan: port 3(lan3) entered blocking state
[   50.651451] br-lan: port 3(lan3) entered forwarding state
[45214.618316] nss-dp 3a001400.dp3 lan1: PHY Link up speed: 10
[45214.618401] br-lan: port 1(lan1) entered blocking state
[45214.622711] br-lan: port 1(lan1) entered forwarding state
[45217.738267] nss-dp 3a001400.dp3 lan1: PHY Link is down
[45217.738713] br-lan: port 1(lan1) entered disabled state
[45219.818310] nss-dp 3a001400.dp3 lan1: PHY Link up speed: 1000
[45219.818398] br-lan: port 1(lan1) entered blocking state
[45219.823053] br-lan: port 1(lan1) entered forwarding state
[45243.738231] nss-dp 3a001400.dp3 lan1: PHY Link is down
[45243.738720] br-lan: port 1(lan1) entered disabled state
[45245.818284] nss-dp 3a001400.dp3 lan1: PHY Link up speed: 1000
[45245.818372] br-lan: port 1(lan1) entered blocking state
[45245.823028] br-lan: port 1(lan1) entered forwarding state
[68239.156454] nss-dp 3a001400.dp3 lan1: PHY Link is down
[68239.156762] br-lan: port 1(lan1) entered disabled state
[142661.497070] nss-dp 3a001400.dp3 lan1: PHY Link up speed: 10
[142661.497161] br-lan: port 1(lan1) entered blocking state
[142661.501818] br-lan: port 1(lan1) entered forwarding state
[142665.656923] nss-dp 3a001400.dp3 lan1: PHY Link is down
[142665.657350] br-lan: port 1(lan1) entered disabled state
[142667.736960] nss-dp 3a001400.dp3 lan1: PHY Link up speed: 1000
[142667.737051] br-lan: port 1(lan1) entered blocking state
[142667.741704] br-lan: port 1(lan1) entered forwarding state
[142692.696913] nss-dp 3a001400.dp3 lan1: PHY Link is down
[142692.697220] br-lan: port 1(lan1) entered disabled state
[142694.776936] nss-dp 3a001400.dp3 lan1: PHY Link up speed: 1000
[142694.777023] br-lan: port 1(lan1) entered blocking state
[142694.781680] br-lan: port 1(lan1) entered forwarding state
[150201.490492] nss-dp 3a001400.dp3 lan1: PHY Link is down
[150201.490973] br-lan: port 1(lan1) entered disabled state
[175506.181831] ath11k c000000.wifi: Spurious quick kickout for STA e8:db:84:e5:3c:56
[187480.659123] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
[189620.400508] ath11k c000000.wifi: Spurious quick kickout for STA e8:db:84:e5:3c:56
[216510.792896] nss-dp 3a001400.dp3 lan1: PHY Link up speed: 10
[216510.792985] br-lan: port 1(lan1) entered blocking state
[216510.797641] br-lan: port 1(lan1) entered forwarding state
[216513.912849] nss-dp 3a001400.dp3 lan1: PHY Link is down
[216513.913327] br-lan: port 1(lan1) entered disabled state
[216515.992875] nss-dp 3a001400.dp3 lan1: PHY Link up speed: 1000
[216515.992959] br-lan: port 1(lan1) entered blocking state
[216515.997617] br-lan: port 1(lan1) entered forwarding state
[216539.912844] nss-dp 3a001400.dp3 lan1: PHY Link is down
[216539.913314] br-lan: port 1(lan1) entered disabled state
[216541.992860] nss-dp 3a001400.dp3 lan1: PHY Link up speed: 1000
[216541.992946] br-lan: port 1(lan1) entered blocking state
[216541.997603] br-lan: port 1(lan1) entered forwarding state
[217505.432051] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 3
[228659.652046] ath11k c000000.wifi: Spurious quick kickout for STA e8:db:84:e5:3c:56
[228661.743942] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 1
[232841.819263] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 1
[234274.697449] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 1
[237619.438912] writer#3 invoked oom-killer: gfp_mask=0x1100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0
[237619.438978] CPU: 3 PID: 3615 Comm: writer#3 Not tainted 5.15.150 #0
[237619.447852] Hardware name: Xiaomi AX3600 (DT)
[237619.454168] Call trace:
[237619.458414]  0xffffffc00801cf60
[237619.461100]  0xffffffc00801d158
[237619.464311]  0xffffffc00878e3e4
[237619.467530]  0xffffffc00878e418
[237619.470733]  0xffffffc00878caac
[237619.473946]  0xffffffc008136480
[237619.477158]  0xffffffc008136ecc
[237619.480369]  0xffffffc0081861b4
[237619.483589]  0xffffffc0081865c8
[237619.486794]  0xffffffc008132664
[237619.490005]  0xffffffc008132ad8
[237619.493217]  0xffffffc008168880
[237619.496427]  0xffffffc00816db8c
[237619.499641]  0xffffffc00816e194
[237619.502852]  0xffffffc00802697c
[237619.506063]  0xffffffc008026ca4
[237619.509284]  0xffffffc008026ee4
[237619.512496]  0xffffffc00879433c
[237619.515699]  0xffffffc008794864
[237619.518912]  0xffffffc0080115f4
[237619.523549] Mem-Info:
[237619.525339] active_anon:1396 inactive_anon:882 isolated_anon:0
[237619.525339]  active_file:460 inactive_file:26 isolated_file:0
[237619.525339]  unevictable:0 dirty:0 writeback:0
[237619.525339]  slab_reclaimable:1881 slab_unreclaimable:10059
[237619.525339]  mapped:69 shmem:616 pagetables:206 bounce:0
[237619.525339]  kernel_misc_reclaimable:0
[237619.525339]  free:6174 free_pcp:794 free_cma:0
[237619.540993] Node 0 active_anon:5584kB inactive_anon:3528kB active_file:1916kB inactive_file:104kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:552kB dirty:0kB writeback:0kB shmem:2464kB writeback_tmp:0kB kernel_stack:1904kB pagetables:824kB all_unreclaimable? no
[237619.565472] DMA free:23840kB min:16384kB low:20480kB high:24576kB reserved_highatomic:0KB active_anon:3524kB inactive_anon:5592kB active_file:480kB inactive_file:880kB unevictable:0kB writepending:0kB present:524288kB managed:417320kB mlocked:0kB bounce:0kB free_pcp:3128kB local_pcp:704kB free_cma:0kB
[237619.592202] lowmem_reserve[]: 0 0 0 0
[237619.614438] DMA: 343*4kB (UME) 376*8kB (UE) 207*16kB (UE) 46*32kB (UME) 23*64kB (UE) 10*128kB (UME) 22*256kB (UME) 3*512kB (U) 1*1024kB (M) 0*2048kB 0*4096kB = 20108kB
[237619.618243] 1287 total pagecache pages
[237619.633436] 0 pages in swap cache
[237619.636974] Swap cache stats: add 0, delete 0, find 0/0
[237619.640449] Free swap  = 0kB
[237619.645926] Total swap = 0kB
[237619.648773] 131072 pages RAM
[237619.651722] 0 pages HighMem/MovableOnly
[237619.654685] 26742 pages reserved
[237619.658669] Tasks state (memory values in pages):
[237619.661890] [  pid  ]   uid  tgid total_vm      rss pgtables_bytes swapents oom_score_adj name
[237619.666624] [    754]    81   754      354       36    36864        0             0 ubusd
[237619.675236] [    755]     0   755      227        9    32768        0             0 askfirst
[237619.683532] [    790]     0   790      266       16    28672        0             0 urngd
[237619.692110] [   1310]   514  1310      817      259    36864        0             0 logd
[237619.700289] [   1311]     0  1311      383       25    32768        0             0 logread
[237619.708528] [   1371]     0  1371      983      185    36864        0             0 rpcd
[237619.717031] [   1696]     0  1696      277       16    32768        0             0 dropbear
[237619.725103] [   1800]     0  1800      691       24    40960        0             0 hostapd
[237619.733605] [   1801]     0  1801      691       24    36864        0             0 wpa_supplicant
[237619.742103] [   1826]   101  1826     1203      159    45056        0             0 hostapd
[237619.750908] [   1825]   101  1825     1117      115    40960        0             0 wpa_supplicant
[237619.759580] [   1865]     0  1865      516       49    32768        0             0 netifd
[237619.768333] [   2100]     0  2100      406       30    32768        0             0 odhcpd
[237619.776659] [   2173]     0  2173      282       16    28672        0             0 netserver
[237619.784993] [   2896]     0  2896      469       48    32768        0             0 uhttpd
[237619.793681] [   3028]     0  3028      356       24    28672        0             0 nlbwmon
[237619.801920] [   3289]     0  3289     1690      241    40960        0             0 collectd
[237619.810612] [   4228]     0  4228      691       28    36864        0             0 ntpd
[237619.819029] [   4244]   123  4244      329       14    28672        0             0 ntpd
[237619.827184] [   4292]     0  4292     1890      147    40960        0             0 ttyd
[237619.835341] [   4371]     0  4371      329        9    28672        0             0 udhcpc
[237619.843499] [   4505]     0  4505      691       28    36864        0             0 dnsmasq
[237619.851649] [   4508]   453  4508      440       85    36864        0             0 dnsmasq
[237619.860355] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/,task=logd,pid=1310,uid=514
[237619.868869] Out of memory: Killed process 1310 (logd) total-vm:3268kB, anon-rss:1032kB, file-rss:4kB, shmem-rss:0kB, UID:514 pgtables:36kB oom_score_adj:0
[237812.292955] nss-dp 3a001400.dp3 lan1: PHY Link is down
[237812.293257] br-lan: port 1(lan1) entered disabled state

System logs:

Thu Jul 11 21:52:45 2024 kern.warn kernel: [237619.618243] 1287 total pagecache pages
Thu Jul 11 21:52:45 2024 kern.warn kernel: [237619.633436] 0 pages in swap cache
Thu Jul 11 21:52:45 2024 kern.warn kernel: [237619.636974] Swap cache stats: add 0, delete 0, find 0/0
Thu Jul 11 21:52:45 2024 kern.warn kernel: [237619.640449] Free swap  = 0kB
Thu Jul 11 21:52:45 2024 kern.warn kernel: [237619.645926] Total swap = 0kB
Thu Jul 11 21:52:45 2024 kern.warn kernel: [237619.648773] 131072 pages RAM
Thu Jul 11 21:52:45 2024 kern.warn kernel: [237619.651722] 0 pages HighMem/MovableOnly
Thu Jul 11 21:52:45 2024 kern.warn kernel: [237619.654685] 26742 pages reserved
Thu Jul 11 21:52:45 2024 kern.info kernel: [237619.658669] Tasks state (memory values in pages):
Thu Jul 11 21:52:45 2024 kern.info kernel: [237619.661890] [  pid  ]   uid  tgid total_vm      rss pgtables_bytes swapents oom_score_adj name
Thu Jul 11 21:52:45 2024 kern.info kernel: [237619.666624] [    754]    81   754      354       36    36864        0             0 ubusd
Thu Jul 11 21:52:45 2024 kern.info kernel: [237619.675236] [    755]     0   755      227        9    32768        0             0 askfirst
Thu Jul 11 21:52:45 2024 kern.info kernel: [237619.683532] [    790]     0   790      266       16    28672        0             0 urngd
Thu Jul 11 21:52:45 2024 kern.info kernel: [237619.692110] [   1310]   514  1310      817      259    36864        0             0 logd
Thu Jul 11 21:52:45 2024 kern.info kernel: [237619.700289] [   1311]     0  1311      383       25    32768        0             0 logread
Thu Jul 11 21:52:45 2024 kern.info kernel: [237619.708528] [   1371]     0  1371      983      185    36864        0             0 rpcd
Thu Jul 11 21:52:45 2024 kern.info kernel: [237619.717031] [   1696]     0  1696      277       16    32768        0             0 dropbear
Thu Jul 11 21:52:45 2024 kern.info kernel: [237619.725103] [   1800]     0  1800      691       24    40960        0             0 hostapd
Thu Jul 11 21:52:45 2024 kern.info kernel: [237619.733605] [   1801]     0  1801      691       24    36864        0             0 wpa_supplicant
Thu Jul 11 21:52:45 2024 kern.info kernel: [237619.742103] [   1826]   101  1826     1203      159    45056        0             0 hostapd
Thu Jul 11 21:52:45 2024 kern.info kernel: [237619.750908] [   1825]   101  1825     1117      115    40960        0             0 wpa_supplicant
Thu Jul 11 21:52:45 2024 kern.info kernel: [237619.759580] [   1865]     0  1865      516       49    32768        0             0 netifd
Thu Jul 11 21:52:45 2024 kern.info kernel: [237619.768333] [   2100]     0  2100      406       30    32768        0             0 odhcpd
Thu Jul 11 21:52:45 2024 kern.info kernel: [237619.776659] [   2173]     0  2173      282       16    28672        0             0 netserver
Thu Jul 11 21:52:45 2024 kern.info kernel: [237619.784993] [   2896]     0  2896      469       48    32768        0             0 uhttpd
Thu Jul 11 21:52:45 2024 kern.info kernel: [237619.793681] [   3028]     0  3028      356       24    28672        0             0 nlbwmon
Thu Jul 11 21:52:45 2024 kern.info kernel: [237619.801920] [   3289]     0  3289     1690      241    40960        0             0 collectd
Thu Jul 11 21:52:45 2024 kern.info kernel: [237619.810612] [   4228]     0  4228      691       28    36864        0             0 ntpd
Thu Jul 11 21:52:45 2024 kern.info kernel: [237619.819029] [   4244]   123  4244      329       14    28672        0             0 ntpd
Thu Jul 11 21:52:45 2024 kern.info kernel: [237619.827184] [   4292]     0  4292     1890      147    40960        0             0 ttyd
Thu Jul 11 21:52:45 2024 kern.info kernel: [237619.835341] [   4371]     0  4371      329        9    28672        0             0 udhcpc
Thu Jul 11 21:52:45 2024 kern.info kernel: [237619.843499] [   4505]     0  4505      691       28    36864        0             0 dnsmasq
Thu Jul 11 21:52:45 2024 kern.info kernel: [237619.851649] [   4508]   453  4508      440       85    36864        0             0 dnsmasq
Thu Jul 11 21:52:45 2024 kern.info kernel: [237619.860355] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/,task=logd,pid=1310,uid=514
Thu Jul 11 21:52:45 2024 kern.err kernel: [237619.868869] Out of memory: Killed process 1310 (logd) total-vm:3268kB, anon-rss:1032kB, file-rss:4kB, shmem-rss:0kB, UID:514 pgtables:36kB oom_score_adj:0
Thu Jul 11 21:55:52 2024 daemon.notice netifd: Network device 'lan1' link is down
Thu Jul 11 21:55:52 2024 kern.info kernel: [237812.292955] nss-dp 3a001400.dp3 lan1: PHY Link is down
Thu Jul 11 21:55:52 2024 kern.info kernel: [237812.293257] br-lan: port 1(lan1) entered disabled state
Thu Jul 11 22:04:35 2024 daemon.info logread[1311]: Logread connected to 89.168.36.69:514 via tcp
Thu Jul 11 22:29:05 2024 daemon.debug hostapd: phy2-ap0: STA 70:5f:a3:ae:76:3a IEEE 802.11: authentication OK (open system)
Thu Jul 11 22:29:05 2024 daemon.debug hostapd: phy2-ap0: STA 70:5f:a3:ae:76:3a MLME: MLME-AUTHENTICATE.indication(70:5f:a3:ae:76:3a, OPEN_SYSTEM)
Thu Jul 11 22:29:05 2024 daemon.debug hostapd: phy2-ap0: STA 70:5f:a3:ae:76:3a MLME: MLME-DELETEKEYS.request(70:5f:a3:ae:76:3a)
Thu Jul 11 22:29:05 2024 daemon.info hostapd: phy2-ap0: STA 70:5f:a3:ae:76:3a IEEE 802.11: authenticated
Thu Jul 11 22:29:05 2024 daemon.debug hostapd: phy2-ap0: STA 70:5f:a3:ae:76:3a IEEE 802.11: association OK (aid 10)
Thu Jul 11 22:29:05 2024 daemon.info hostapd: phy2-ap0: STA 70:5f:a3:ae:76:3a IEEE 802.11: associated (aid 10)
Thu Jul 11 22:29:05 2024 daemon.debug hostapd: phy2-ap0: STA 70:5f:a3:ae:76:3a MLME: MLME-ASSOCIATE.indication(70:5f:a3:ae:76:3a)
Thu Jul 11 22:29:05 2024 daemon.debug hostapd: phy2-ap0: STA 70:5f:a3:ae:76:3a MLME: MLME-DELETEKEYS.request(70:5f:a3:ae:76:3a)
Thu Jul 11 22:29:05 2024 daemon.debug hostapd: phy2-ap0: STA 70:5f:a3:ae:76:3a IEEE 802.11: binding station to interface 'phy2-ap0'
Thu Jul 11 22:29:05 2024 daemon.debug hostapd: phy2-ap0: STA 70:5f:a3:ae:76:3a WPA: event 1 notification
Thu Jul 11 22:29:05 2024 daemon.debug hostapd: phy2-ap0: STA 70:5f:a3:ae:76:3a WPA: start authentication
Thu Jul 11 22:29:05 2024 daemon.debug hostapd: phy2-ap0: STA 70:5f:a3:ae:76:3a IEEE 802.1X: unauthorizing port
Thu Jul 11 22:29:05 2024 daemon.debug hostapd: phy2-ap0: STA 70:5f:a3:ae:76:3a WPA: sending 1/4 msg of 4-Way Handshake
Thu Jul 11 22:29:05 2024 daemon.debug hostapd: phy2-ap0: STA 70:5f:a3:ae:76:3a WPA: received EAPOL-Key frame (2/4 Pairwise)
Thu Jul 11 22:29:05 2024 daemon.debug hostapd: phy2-ap0: STA 70:5f:a3:ae:76:3a WPA: sending 3/4 msg of 4-Way Handshake
Thu Jul 11 22:29:05 2024 daemon.debug hostapd: phy2-ap0: STA 70:5f:a3:ae:76:3a WPA: received EAPOL-Key frame (4/4 Pairwise)
Thu Jul 11 22:29:05 2024 daemon.notice hostapd: phy2-ap0: AP-STA-CONNECTED 70:5f:a3:ae:76:3a auth_alg=open
Thu Jul 11 22:29:05 2024 daemon.debug hostapd: phy2-ap0: STA 70:5f:a3:ae:76:3a IEEE 802.1X: authorizing port
Thu Jul 11 22:29:05 2024 daemon.info hostapd: phy2-ap0: STA 70:5f:a3:ae:76:3a WPA: pairwise key handshake completed (RSN)
Thu Jul 11 22:29:05 2024 daemon.notice hostapd: phy2-ap0: EAPOL-4WAY-HS-COMPLETED 70:5f:a3:ae:76:3a
Thu Jul 11 22:45:32 2024 daemon.info logread[1311]: Logread connected to 89.168.36.69:514 via tcp
Fri Jul 12 00:31:00 2024 daemon.notice hostapd: phy2-ap0: AP-STA-DISCONNECTED d8:13:2a:2f:48:68
Fri Jul 12 00:31:00 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 WPA: event 2 notification
Fri Jul 12 00:31:00 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 IEEE 802.1X: unauthorizing port
Fri Jul 12 00:31:00 2024 daemon.info hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 IEEE 802.11: disassociated
Fri Jul 12 00:31:00 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 MLME: MLME-DISASSOCIATE.indication(d8:13:2a:2f:48:68, 4)
Fri Jul 12 00:31:00 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 MLME: MLME-DELETEKEYS.request(d8:13:2a:2f:48:68)
Fri Jul 12 00:31:01 2024 daemon.info hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Fri Jul 12 00:31:01 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 MLME: MLME-DEAUTHENTICATE.indication(d8:13:2a:2f:48:68, 2)
Fri Jul 12 00:31:01 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 MLME: MLME-DELETEKEYS.request(d8:13:2a:2f:48:68)
Fri Jul 12 00:31:23 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 IEEE 802.11: authentication OK (open system)
Fri Jul 12 00:31:23 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 MLME: MLME-AUTHENTICATE.indication(d8:13:2a:2f:48:68, OPEN_SYSTEM)
Fri Jul 12 00:31:23 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 MLME: MLME-DELETEKEYS.request(d8:13:2a:2f:48:68)
Fri Jul 12 00:31:23 2024 daemon.notice hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 IEEE 802.11: did not acknowledge authentication response
Fri Jul 12 00:31:23 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 IEEE 802.11: association OK (aid 6)
Fri Jul 12 00:31:23 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 IEEE 802.11: did not acknowledge association response
Fri Jul 12 00:31:36 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 IEEE 802.11: authentication OK (open system)
Fri Jul 12 00:31:36 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 WPA: event 0 notification
Fri Jul 12 00:31:36 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 MLME: MLME-AUTHENTICATE.indication(d8:13:2a:2f:48:68, OPEN_SYSTEM)
Fri Jul 12 00:31:36 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 MLME: MLME-DELETEKEYS.request(d8:13:2a:2f:48:68)
Fri Jul 12 00:31:36 2024 daemon.notice hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 IEEE 802.11: did not acknowledge authentication response
Fri Jul 12 00:31:59 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 IEEE 802.11: authentication OK (open system)
Fri Jul 12 00:31:59 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 WPA: event 0 notification
Fri Jul 12 00:31:59 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 MLME: MLME-AUTHENTICATE.indication(d8:13:2a:2f:48:68, OPEN_SYSTEM)
Fri Jul 12 00:31:59 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 MLME: MLME-DELETEKEYS.request(d8:13:2a:2f:48:68)
Fri Jul 12 00:31:59 2024 daemon.notice hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 IEEE 802.11: did not acknowledge authentication response
Fri Jul 12 00:32:06 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 IEEE 802.11: authentication OK (open system)
Fri Jul 12 00:32:06 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 WPA: event 0 notification
Fri Jul 12 00:32:06 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 MLME: MLME-AUTHENTICATE.indication(d8:13:2a:2f:48:68, OPEN_SYSTEM)
Fri Jul 12 00:32:06 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 MLME: MLME-DELETEKEYS.request(d8:13:2a:2f:48:68)
Fri Jul 12 00:32:06 2024 daemon.notice hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 IEEE 802.11: did not acknowledge authentication response
Fri Jul 12 00:32:22 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 IEEE 802.11: authentication OK (open system)
Fri Jul 12 00:32:22 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 WPA: event 0 notification
Fri Jul 12 00:32:22 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 MLME: MLME-AUTHENTICATE.indication(d8:13:2a:2f:48:68, OPEN_SYSTEM)
Fri Jul 12 00:32:22 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 MLME: MLME-DELETEKEYS.request(d8:13:2a:2f:48:68)
Fri Jul 12 00:32:22 2024 daemon.info hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 IEEE 802.11: authenticated
Fri Jul 12 00:32:22 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 IEEE 802.11: association OK (aid 6)
Fri Jul 12 00:32:22 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 IEEE 802.11: did not acknowledge association response
Fri Jul 12 00:32:57 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 IEEE 802.11: authentication OK (open system)
Fri Jul 12 00:32:57 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 WPA: event 0 notification
Fri Jul 12 00:32:57 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 MLME: MLME-AUTHENTICATE.indication(d8:13:2a:2f:48:68, OPEN_SYSTEM)
Fri Jul 12 00:32:57 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 MLME: MLME-DELETEKEYS.request(d8:13:2a:2f:48:68)
Fri Jul 12 00:32:57 2024 daemon.notice hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 IEEE 802.11: did not acknowledge authentication response
Fri Jul 12 00:32:57 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 IEEE 802.11: association OK (aid 6)
Fri Jul 12 00:32:57 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 IEEE 802.11: did not acknowledge association response
Fri Jul 12 00:33:05 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 IEEE 802.11: authentication OK (open system)
Fri Jul 12 00:33:05 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 WPA: event 0 notification
Fri Jul 12 00:33:05 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 MLME: MLME-AUTHENTICATE.indication(d8:13:2a:2f:48:68, OPEN_SYSTEM)
Fri Jul 12 00:33:05 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 MLME: MLME-DELETEKEYS.request(d8:13:2a:2f:48:68)
Fri Jul 12 00:33:05 2024 daemon.notice hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 IEEE 802.11: did not acknowledge authentication response
Fri Jul 12 00:33:27 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 IEEE 802.11: authentication OK (open system)
Fri Jul 12 00:33:27 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 WPA: event 0 notification
Fri Jul 12 00:33:27 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 MLME: MLME-AUTHENTICATE.indication(d8:13:2a:2f:48:68, OPEN_SYSTEM)
Fri Jul 12 00:33:27 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 MLME: MLME-DELETEKEYS.request(d8:13:2a:2f:48:68)
Fri Jul 12 00:33:27 2024 daemon.notice hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 IEEE 802.11: did not acknowledge authentication response
Fri Jul 12 00:33:28 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 IEEE 802.11: authentication OK (open system)
Fri Jul 12 00:33:28 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 WPA: event 0 notification
Fri Jul 12 00:33:28 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 MLME: MLME-AUTHENTICATE.indication(d8:13:2a:2f:48:68, OPEN_SYSTEM)
Fri Jul 12 00:33:28 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 MLME: MLME-DELETEKEYS.request(d8:13:2a:2f:48:68)
Fri Jul 12 00:33:28 2024 daemon.info hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 IEEE 802.11: authenticated
Fri Jul 12 00:33:28 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 IEEE 802.11: association OK (aid 6)
Fri Jul 12 00:33:28 2024 daemon.info hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 IEEE 802.11: associated (aid 6)
Fri Jul 12 00:33:28 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 MLME: MLME-ASSOCIATE.indication(d8:13:2a:2f:48:68)
Fri Jul 12 00:33:28 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 MLME: MLME-DELETEKEYS.request(d8:13:2a:2f:48:68)
Fri Jul 12 00:33:28 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 IEEE 802.11: binding station to interface 'phy2-ap0'
Fri Jul 12 00:33:28 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 WPA: event 1 notification
Fri Jul 12 00:33:28 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 WPA: start authentication
Fri Jul 12 00:33:28 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 IEEE 802.1X: unauthorizing port
Fri Jul 12 00:33:28 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 WPA: sending 1/4 msg of 4-Way Handshake
Fri Jul 12 00:33:28 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 WPA: received EAPOL-Key frame (2/4 Pairwise)
Fri Jul 12 00:33:28 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 WPA: sending 3/4 msg of 4-Way Handshake
Fri Jul 12 00:33:28 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 WPA: received EAPOL-Key frame (4/4 Pairwise)
Fri Jul 12 00:33:28 2024 daemon.notice hostapd: phy2-ap0: AP-STA-CONNECTED d8:13:2a:2f:48:68 auth_alg=open
Fri Jul 12 00:33:28 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 IEEE 802.1X: authorizing port
Fri Jul 12 00:33:28 2024 daemon.info hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 WPA: pairwise key handshake completed (RSN)
Fri Jul 12 00:33:28 2024 daemon.notice hostapd: phy2-ap0: EAPOL-4WAY-HS-COMPLETED d8:13:2a:2f:48:68
Fri Jul 12 00:35:56 2024 daemon.debug hostapd: phy1-ap0: STA 24:2f:d0:16:bc:ed IEEE 802.11: authentication OK (open system)
Fri Jul 12 00:35:56 2024 daemon.debug hostapd: phy1-ap0: STA 24:2f:d0:16:bc:ed MLME: MLME-AUTHENTICATE.indication(24:2f:d0:16:bc:ed, OPEN_SYSTEM)
Fri Jul 12 00:35:56 2024 daemon.debug hostapd: phy1-ap0: STA 24:2f:d0:16:bc:ed MLME: MLME-DELETEKEYS.request(24:2f:d0:16:bc:ed)
Fri Jul 12 00:35:56 2024 daemon.info hostapd: phy1-ap0: STA 24:2f:d0:16:bc:ed IEEE 802.11: authenticated
Fri Jul 12 00:35:56 2024 daemon.debug hostapd: phy1-ap0: STA 24:2f:d0:16:bc:ed IEEE 802.11: association OK (aid 2)
Fri Jul 12 00:35:56 2024 daemon.notice hostapd: phy1-ap0: STA-OPMODE-N_SS-CHANGED 24:2f:d0:16:bc:ed 2
Fri Jul 12 00:35:56 2024 daemon.info hostapd: phy1-ap0: STA 24:2f:d0:16:bc:ed IEEE 802.11: associated (aid 2)
Fri Jul 12 00:35:56 2024 daemon.debug hostapd: phy1-ap0: STA 24:2f:d0:16:bc:ed MLME: MLME-REASSOCIATE.indication(24:2f:d0:16:bc:ed)
Fri Jul 12 00:35:56 2024 daemon.debug hostapd: phy1-ap0: STA 24:2f:d0:16:bc:ed MLME: MLME-DELETEKEYS.request(24:2f:d0:16:bc:ed)
Fri Jul 12 00:35:56 2024 daemon.debug hostapd: phy1-ap0: STA 24:2f:d0:16:bc:ed IEEE 802.11: binding station to interface 'phy1-ap0'
Fri Jul 12 00:35:56 2024 daemon.debug hostapd: phy1-ap0: STA 24:2f:d0:16:bc:ed WPA: event 1 notification
Fri Jul 12 00:35:56 2024 daemon.debug hostapd: phy1-ap0: STA 24:2f:d0:16:bc:ed WPA: start authentication
Fri Jul 12 00:35:56 2024 daemon.debug hostapd: phy1-ap0: STA 24:2f:d0:16:bc:ed IEEE 802.1X: unauthorizing port
Fri Jul 12 00:35:56 2024 daemon.debug hostapd: phy1-ap0: STA 24:2f:d0:16:bc:ed WPA: sending 1/4 msg of 4-Way Handshake
Fri Jul 12 00:35:57 2024 daemon.debug hostapd: phy1-ap0: STA 24:2f:d0:16:bc:ed WPA: EAPOL-Key timeout
Fri Jul 12 00:35:57 2024 daemon.debug hostapd: phy1-ap0: STA 24:2f:d0:16:bc:ed WPA: sending 1/4 msg of 4-Way Handshake
Fri Jul 12 00:35:57 2024 daemon.debug hostapd: phy1-ap0: STA 24:2f:d0:16:bc:ed WPA: received EAPOL-Key frame (2/4 Pairwise)
Fri Jul 12 00:35:57 2024 daemon.debug hostapd: phy1-ap0: STA 24:2f:d0:16:bc:ed WPA: sending 3/4 msg of 4-Way Handshake
Fri Jul 12 00:35:57 2024 daemon.debug hostapd: phy1-ap0: STA 24:2f:d0:16:bc:ed WPA: received EAPOL-Key frame (4/4 Pairwise)
Fri Jul 12 00:35:57 2024 daemon.notice hostapd: phy1-ap0: AP-STA-CONNECTED 24:2f:d0:16:bc:ed auth_alg=open
Fri Jul 12 00:35:57 2024 daemon.debug hostapd: phy1-ap0: STA 24:2f:d0:16:bc:ed IEEE 802.1X: authorizing port
Fri Jul 12 00:35:57 2024 daemon.info hostapd: phy1-ap0: STA 24:2f:d0:16:bc:ed WPA: pairwise key handshake completed (RSN)
Fri Jul 12 00:35:57 2024 daemon.notice hostapd: phy1-ap0: EAPOL-4WAY-HS-COMPLETED 24:2f:d0:16:bc:ed
Fri Jul 12 00:37:59 2024 daemon.err nlbwmon[3028]: Netlink receive failure: Out of memory
Fri Jul 12 00:37:59 2024 daemon.err nlbwmon[3028]: Unable to dump conntrack: No buffer space available
Fri Jul 12 00:41:16 2024 daemon.notice hostapd: phy2-ap0: AP-STA-DISCONNECTED d8:13:2a:2f:48:68
Fri Jul 12 00:41:16 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 WPA: event 2 notification
Fri Jul 12 00:41:16 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 IEEE 802.1X: unauthorizing port
Fri Jul 12 00:41:16 2024 daemon.info hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 IEEE 802.11: disassociated
Fri Jul 12 00:41:16 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 MLME: MLME-DISASSOCIATE.indication(d8:13:2a:2f:48:68, 4)
Fri Jul 12 00:41:16 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 MLME: MLME-DELETEKEYS.request(d8:13:2a:2f:48:68)
Fri Jul 12 00:41:17 2024 daemon.info hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Fri Jul 12 00:41:17 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 MLME: MLME-DEAUTHENTICATE.indication(d8:13:2a:2f:48:68, 2)
Fri Jul 12 00:41:17 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 MLME: MLME-DELETEKEYS.request(d8:13:2a:2f:48:68)
Fri Jul 12 00:42:10 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 IEEE 802.11: authentication OK (open system)
Fri Jul 12 00:42:10 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 MLME: MLME-AUTHENTICATE.indication(d8:13:2a:2f:48:68, OPEN_SYSTEM)
Fri Jul 12 00:42:10 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 MLME: MLME-DELETEKEYS.request(d8:13:2a:2f:48:68)
Fri Jul 12 00:42:10 2024 daemon.notice hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 IEEE 802.11: did not acknowledge authentication response
Fri Jul 12 00:42:10 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 IEEE 802.11: association OK (aid 6)
Fri Jul 12 00:42:10 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 IEEE 802.11: did not acknowledge association response
Fri Jul 12 00:42:20 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 WPA: event 2 notification
Fri Jul 12 00:42:20 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 IEEE 802.1X: unauthorizing port
Fri Jul 12 00:42:20 2024 daemon.info hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 IEEE 802.11: disassociated
Fri Jul 12 00:42:20 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 MLME: MLME-DISASSOCIATE.indication(d8:13:2a:2f:48:68, 8)
Fri Jul 12 00:42:20 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 MLME: MLME-DELETEKEYS.request(d8:13:2a:2f:48:68)
Fri Jul 12 00:42:20 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 IEEE 802.11: authentication OK (open system)
Fri Jul 12 00:42:20 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 WPA: event 0 notification
Fri Jul 12 00:42:20 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 MLME: MLME-AUTHENTICATE.indication(d8:13:2a:2f:48:68, OPEN_SYSTEM)
Fri Jul 12 00:42:20 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 MLME: MLME-DELETEKEYS.request(d8:13:2a:2f:48:68)
Fri Jul 12 00:42:20 2024 daemon.info hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 IEEE 802.11: authenticated
Fri Jul 12 00:42:20 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 IEEE 802.11: association OK (aid 6)
Fri Jul 12 00:42:20 2024 daemon.info hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 IEEE 802.11: associated (aid 6)
Fri Jul 12 00:42:20 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 MLME: MLME-ASSOCIATE.indication(d8:13:2a:2f:48:68)
Fri Jul 12 00:42:20 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 MLME: MLME-DELETEKEYS.request(d8:13:2a:2f:48:68)
Fri Jul 12 00:42:20 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 IEEE 802.11: binding station to interface 'phy2-ap0'
Fri Jul 12 00:42:20 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 WPA: event 1 notification
Fri Jul 12 00:42:20 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 WPA: start authentication
Fri Jul 12 00:42:20 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 IEEE 802.1X: unauthorizing port
Fri Jul 12 00:42:20 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 WPA: sending 1/4 msg of 4-Way Handshake
Fri Jul 12 00:42:20 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 WPA: received EAPOL-Key frame (2/4 Pairwise)
Fri Jul 12 00:42:20 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 WPA: sending 3/4 msg of 4-Way Handshake
Fri Jul 12 00:42:20 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 WPA: received EAPOL-Key frame (4/4 Pairwise)
Fri Jul 12 00:42:21 2024 daemon.notice hostapd: phy2-ap0: AP-STA-CONNECTED d8:13:2a:2f:48:68 auth_alg=open
Fri Jul 12 00:42:21 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 IEEE 802.1X: authorizing port
Fri Jul 12 00:42:21 2024 daemon.info hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 WPA: pairwise key handshake completed (RSN)
Fri Jul 12 00:42:21 2024 daemon.notice hostapd: phy2-ap0: EAPOL-4WAY-HS-COMPLETED d8:13:2a:2f:48:68
Fri Jul 12 00:42:25 2024 daemon.notice hostapd: phy2-ap0: AP-STA-DISCONNECTED d8:13:2a:2f:48:68
Fri Jul 12 00:42:25 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 WPA: event 2 notification
Fri Jul 12 00:42:26 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 IEEE 802.1X: unauthorizing port
Fri Jul 12 00:42:26 2024 daemon.info hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 IEEE 802.11: disassociated
Fri Jul 12 00:42:26 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 MLME: MLME-DISASSOCIATE.indication(d8:13:2a:2f:48:68, 8)
Fri Jul 12 00:42:26 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 MLME: MLME-DELETEKEYS.request(d8:13:2a:2f:48:68)
Fri Jul 12 00:42:27 2024 daemon.info hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Fri Jul 12 00:42:27 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 MLME: MLME-DEAUTHENTICATE.indication(d8:13:2a:2f:48:68, 2)
Fri Jul 12 00:42:27 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 MLME: MLME-DELETEKEYS.request(d8:13:2a:2f:48:68)
Fri Jul 12 00:42:28 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 IEEE 802.11: authentication OK (open system)
Fri Jul 12 00:42:28 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 MLME: MLME-AUTHENTICATE.indication(d8:13:2a:2f:48:68, OPEN_SYSTEM)
Fri Jul 12 00:42:28 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 MLME: MLME-DELETEKEYS.request(d8:13:2a:2f:48:68)
Fri Jul 12 00:42:28 2024 daemon.info hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 IEEE 802.11: authenticated
Fri Jul 12 00:42:28 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 IEEE 802.11: association OK (aid 6)
Fri Jul 12 00:42:28 2024 daemon.info hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 IEEE 802.11: associated (aid 6)
Fri Jul 12 00:42:28 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 MLME: MLME-ASSOCIATE.indication(d8:13:2a:2f:48:68)
Fri Jul 12 00:42:28 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 MLME: MLME-DELETEKEYS.request(d8:13:2a:2f:48:68)
Fri Jul 12 00:42:28 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 IEEE 802.11: binding station to interface 'phy2-ap0'
Fri Jul 12 00:42:28 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 WPA: event 1 notification
Fri Jul 12 00:42:28 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 WPA: start authentication
Fri Jul 12 00:42:28 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 IEEE 802.1X: unauthorizing port
Fri Jul 12 00:42:28 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 WPA: sending 1/4 msg of 4-Way Handshake
Fri Jul 12 00:42:28 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 WPA: received EAPOL-Key frame (2/4 Pairwise)
Fri Jul 12 00:42:28 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 WPA: sending 3/4 msg of 4-Way Handshake
Fri Jul 12 00:42:28 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 WPA: received EAPOL-Key frame (4/4 Pairwise)
Fri Jul 12 00:42:28 2024 daemon.notice hostapd: phy2-ap0: AP-STA-CONNECTED d8:13:2a:2f:48:68 auth_alg=open
Fri Jul 12 00:42:28 2024 daemon.debug hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 IEEE 802.1X: authorizing port
Fri Jul 12 00:42:28 2024 daemon.info hostapd: phy2-ap0: STA d8:13:2a:2f:48:68 WPA: pairwise key handshake completed (RSN)
Fri Jul 12 00:42:28 2024 daemon.notice hostapd: phy2-ap0: EAPOL-4WAY-HS-COMPLETED d8:13:2a:2f:48:68
Fri Jul 12 00:47:29 2024 daemon.info logread[1311]: Logread connected to 89.168.36.69:514 via tcp
Fri Jul 12 00:48:09 2024 daemon.err uhttpd[2896]: [info] luci: accepted login on / for root from 10.0.0.112

OpenWrt version

r23809-234f1a2efa

OpenWrt release

23.05.3

OpenWrt target/subtarget

ipq807x/generic

Device

Xiaomi AX3600

Image kind

Official downloaded image

Steps to reproduce

  1. Start up the router.
  2. Use the internet.
  3. After some random time (especially when using a high 250Mpbs connection), expect a rash of errors and "Out of memory" messages and some process to be killed.

Actual behaviour

When using the router (when browsing the web), crashes occur in the form of: switching off the WiFi network, disconnection of the connection. If you go through the router's logbook, you will notice all sorts of errors, including those with the message "Out of memory" and the killing of given processes.

Expected behaviour

I expect stable router operation without a rash of errors.

Additional info

No response

Diffconfig

No response

Terms

github-actions[bot] commented 1 month ago

Invalid Version reported. `` Is this from a clean repository?

github-actions[bot] commented 1 month ago

Invalid Release reported. `` Is this from a clean repository?

github-actions[bot] commented 1 month ago

Invalid Target/Subtarget reported. `` Is this from a supported device?

lorand-horvath commented 1 month ago

You might want to try the latest snapshot version 26937 or newer, there are some fixes for ath11k.

edrikk commented 1 month ago

Yes, snapshot will be significantly more stable based on my experience for the AX3600 vs. the 23.X branch. The OOM issue for my has been significantly reduced due to the addition of the SMP Affinity script in snapshot. You can also try running the script yourself on each reboot on 23.05.

https://github.com/openwrt/openwrt/issues/13562#issuecomment-1817573570

https://forum.openwrt.org/t/re-xiaomi-ax3600-ath11k-firmware-crash-qcom-q6v5-wcss-pil-cd00000-q6v5-wcss-fatal-error-received/180276/11

MisiekDP commented 1 month ago

Wow, thanks for ideas guys @edrikk @lorand-horvath but could you tell me how to build this SNAPSHOT version with my own packages? All the time I used firmware selector with Attendedsysupgrade package but how to build SNAPSHOT?

edrikk commented 1 month ago

I’m fairly sure ASU gives that option. At least in advanced mode maybe?

https://openwrt.org/docs/guide-user/installation/attended.sysupgrade

But maybe first just try running the script on your current version after a reboot.

MisiekDP commented 1 month ago

@edrikk I can send you later screenshots from Advanced mode later. I tried yesterday using ASU but I couldn't find any options to choose SNAPSHOT.

And yea, it is good idea to try script first - could you mąybe tell me how to run this script and where? Or maybe you have any instruction for this? And how to check if this script is running? Should I get any logs of this script in Systm Log section?

danpawlik commented 1 month ago

@MisiekDP in the snapshot release, auc has been replaced with owut, but if I remember correctly, command should be more less: auc -c -b 23.05 -B snapshot. Another way is just to add desire packages on https://firmware-selector.openwrt.org/ when you click on Customize installed packages and/or first boot script

AgustinLorenzo commented 1 month ago

Hi boys,

For this failure:

[175506.181831] ath11k c000000.wifi: Spurious quick kickout for STA e8:db:84:e5:3c:56
[187480.659123] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
[189620.400508] ath11k c000000.wifi: Spurious quick kickout for STA e8:db:84:e5:3c:56

[228661.743942] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 1
[232841.819263] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 1
[234274.697449] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 1

@qosmio in the NSS repository added this patch and the bug disappeared, the patch comes from ath-next: https://github.com/qosmio/openwrt-ipq/blob/qualcommax-6.x-nss-wifi/package/kernel/mac80211/patches/nss/ath11k/453-ath11k-flush-management-frames-to-firmware-before-wa.patch

Maybe when @robimarko or @ansuel or @PolynomialDivision (was the last contributor to the last ath-next sync in October 2023) synchronize again with ath-next this patch will be already incorporated and the bug will disappear.

Regards, Agustin