Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

FS#1263 - Archer C7 Periodic 2.4G WiFi Failure (ath10k_pci failed to parse phyerr tlv payload at byte 0) #7969

Closed
openwrt-bot opened this issue Jan 8, 2018 · 8 comments
Labels

Comments

@openwrt-bot
Copy link

imac:

We run 17.01.4 (with latest package updates) on Archer C7 (4.4.92 mips / ath10k)

We have several similar ArcherC7s that experience a periodic disconnect on 2.4G band. We are fairly certain it occurs on all of them, though about 5 of them actively see this issue where we have to deal with it.

The result is no 2.4G devices can connect (no issue with 5G) until we execute "wifi" or reboot the ArcherC7s.

We have applied a cron job that runs each night and executes "wifi" to workaround this issue since 17.01.2 but believe it may have been present since 17.01.1. It is still present in 17.01.4 unfortunately so we have decided to commit some time to resolving.

In one of our office locations, to monitor this bug with the hope of oneday resolving it, we do not run the cron job, and only have two 2.4G devices connected.

On this device where we have to manually intervene to work around the problem, in the last 52 days (current uptime), the 2.4G failure has happenened three times.

Between the 1st and 2nd occurence we saw these SWBA messages in our dmesg.

[2506537.784853] ath: phy1: DMA failed to stop in 10 ms AR_CR=0x00000024 AR_DIAG_SW=0x02100020 DMADBG_7=0x00028800
[2506539.854485] ath10k_pci 0000:01:00.0: SWBA overrun on vdev 0, skipped old beacon
[2506539.862178] ath10k_pci 0000:01:00.0: SWBA overrun on vdev 0, skipped old beacon
[2506539.869849] ath10k_pci 0000:01:00.0: SWBA overrun on vdev 0, skipped old beacon
[2506539.877511] ath10k_pci 0000:01:00.0: SWBA overrun on vdev 0, skipped old beacon
[2506539.885148] ath10k_pci 0000:01:00.0: SWBA overrun on vdev 0, skipped old beacon
[2506539.892821] ath10k_pci 0000:01:00.0: SWBA overrun on vdev 0, skipped old beacon
[2506539.900499] ath10k_pci 0000:01:00.0: SWBA overrun on vdev 0, skipped old beacon
[2506539.908171] ath10k_pci 0000:01:00.0: SWBA overrun on vdev 0, skipped old beacon
[2506539.915809] ath10k_pci 0000:01:00.0: SWBA overrun on vdev 0, skipped old beacon
[2506539.923492] ath10k_pci 0000:01:00.0: SWBA overrun on vdev 0, skipped old beacon

Before each occurence of the 2.4G failure, at some point we see these messages noting the three different timestamps:

[290147.737347] ath10k_pci 0000:01:00.0: failed to parse phyerr tlv payload at byte 0
[463582.984526] ath10k_pci 0000:01:00.0: failed to parse phyerr tlv payload at byte 0

[2794383.390501] ath10k_pci 0000:01:00.0: failed to parse phyerr tlv payload at byte 0
[2794532.486186] ath10k_pci 0000:01:00.0: failed to parse phyerr tlv payload at byte 0

[4541364.695287] ath10k_pci 0000:01:00.0: failed to parse phyerr tlv payload at byte 0
[4541500.990587] ath10k_pci 0000:01:00.0: failed to parse phyerr tlv payload at byte 0

The only other message that jumps out in the dmesg is the one below, but like thw SWBA, it is not associated with each occurence.

[3311103.068324] ath: phy1: Unable to reset channel, reset status -5

The 2.4G clients are a D-LINK DCH-S150 motion detector (70:62:b8:93:98:b8) and a Google Chromecast (6C:AD:F8:4B:A3:52)

There is not much else in the dmesg (which I have attached), other then the bridge changes that occur when we execute "wifi" to resolve the issue which help identify which messages occur before resolving the issue each time (which can be days later as we only really notice when Chromecast is offline and we are trying to use it).

Nothing jumps out of our logread (and has not in the past), but typically the buffer has wrapped (as was the case today) and provided no messages related to the 2.4G clients.

Our 2.4G config is below, noting we do have a 40Mhz wide config enabled leveraging ht_coex and htmode.

config wifi-device 'radio1'
option type 'mac80211'
option hwmode '11g'
option path 'platform/qca955x_wmac'
option channel '11'
option htmode 'HT40-'
option txpower '24'
option ht_coex '0'
option noscan '1'
option country 'US'

config wifi-iface
option device 'radio1'
option network 'lan'
option mode 'ap'
option ssid 'xxxx'
option key 'xxxx'
option encryption 'psk2+ccmp'

@openwrt-bot
Copy link
Author

imac:

It looks like we have seen this issue since 17.01.1, we did initially believe a 2.4G printer may have been the culprit as logged in this older closed ticket here.

https://bugs.lede-project.org/index.php?do=details&task_id=791

Eventually this printer was hardwired, but the 2.4G dropping issues have persisted.

@openwrt-bot
Copy link
Author

avbohemen:

The ath10k driver is for the 802.11ac radio, so 5Ghz. The Archer C7 also has an ath9k driver for the 2.4GHz radio. So the messages probably have very little to do with disconnects on the 2.4GHz radio.

@openwrt-bot
Copy link
Author

imac:

We think this issue was related to the Chromecast Client (https://support.google.com/chromecast/answer/7634752)

We have had almost a month now without seeing this issue.

@openwrt-bot
Copy link
Author

imac:

Unfortunately I posted a day too soon, as the 2.4G dropped again today. At then end of dmesg a bunch of these:

[9168557.004798] ath: phy1: Unable to reset channel, reset status -5
[9241466.313947] ath: phy1: Unable to reset channel, reset status -5
[9254122.212029] ath: phy1: Unable to reset channel, reset status -5
[9335809.580928] ath: phy1: Unable to reset channel, reset status -5
[9556895.581143] ath: phy1: Unable to reset channel, reset status -5
[9582029.460103] ath: phy1: Unable to reset channel, reset status -5
[9583890.920623] ath: phy1: Unable to reset channel, reset status -5
[9831339.046998] ath: phy1: Unable to reset channel, reset status -5
[9842621.140994] ath: phy1: Unable to reset channel, reset status -5
[9861604.741015] ath: phy1: Unable to reset channel, reset status -5
[10031427.853988] ath: phy1: Unable to reset channel, reset status -5
[10075998.458644] ath: phy1: Unable to reset channel, reset status -5
[10210275.723499] ath: phy1: Unable to reset channel, reset status -5

In the logs, you can see the three 2.4G devices drop off (wlan1) and the two 5G devices make it to the next handshake.

Wed Mar 14 23:15:11 2018 daemon.info hostapd: wlan0: STA a0:cc:2b:15:20:97 WPA: group key handshake completed (RSN)
Wed Mar 14 23:15:12 2018 daemon.info hostapd: wlan1: STA 70:62:b8:93:98:b8 WPA: group key handshake completed (RSN)
Wed Mar 14 23:15:12 2018 daemon.info hostapd: wlan1: STA 14:91:82:50:2b:a1 WPA: group key handshake completed (RSN)
Wed Mar 14 23:15:12 2018 daemon.info hostapd: wlan0: STA b8:f6:b1:a6:c4:e0 WPA: group key handshake completed (RSN)
Wed Mar 14 23:15:12 2018 daemon.info hostapd: wlan1: STA 6c:ad:f8:4b:a3:52 WPA: group key handshake completed (RSN)
Wed Mar 14 23:15:34 2018 daemon.info odhcpd[856]: Using a RA lifetime of 0 seconds on br-lan
Wed Mar 14 23:18:16 2018 daemon.info hostapd: wlan1: STA 6c:ad:f8:4b:a3:52 IEEE 802.11: disconnected due to excessive missing ACKs
Wed Mar 14 23:18:16 2018 daemon.notice hostapd: wlan1: AP-STA-DISCONNECTED 6c:ad:f8:4b:a3:52
Wed Mar 14 23:18:46 2018 daemon.info hostapd: wlan1: STA 6c:ad:f8:4b:a3:52 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Wed Mar 14 23:19:59 2018 daemon.info odhcpd[856]: Using a RA lifetime of 0 seconds on br-lan
Wed Mar 14 23:20:17 2018 daemon.notice hostapd: wlan1: AP-STA-DISCONNECTED 14:91:82:50:2b:a1
Wed Mar 14 23:20:17 2018 daemon.info hostapd: wlan1: STA 14:91:82:50:2b:a1 IEEE 802.11: disassociated due to inactivity
Wed Mar 14 23:20:18 2018 daemon.info hostapd: wlan1: STA 14:91:82:50:2b:a1 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Wed Mar 14 23:20:36 2018 daemon.notice hostapd: wlan1: AP-STA-DISCONNECTED 70:62:b8:93:98:b8
Wed Mar 14 23:20:36 2018 daemon.info hostapd: wlan1: STA 70:62:b8:93:98:b8 IEEE 802.11: disassociated due to inactivity
Wed Mar 14 23:20:37 2018 daemon.info hostapd: wlan1: STA 70:62:b8:93:98:b8 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Wed Mar 14 23:23:38 2018 daemon.info odhcpd[856]: Using a RA lifetime of 0 seconds on br-lan
Wed Mar 14 23:25:11 2018 daemon.info hostapd: wlan0: STA a0:cc:2b:15:20:97 WPA: group key handshake completed (RSN)
Wed Mar 14 23:25:12 2018 daemon.info hostapd: wlan0: STA b8:f6:b1:a6:c4:e0 WPA: group key handshake completed (RSN)

Back to resetting wifi nightly for now via cron.

@openwrt-bot
Copy link
Author

imac:

The first one to disconnect has a unique error, not sure if that is related or just a symptom

Wed Mar 14 23:18:16 2018 daemon.info hostapd: wlan1: STA 6c:ad:f8:4b:a3:52 IEEE 802.11: disconnected due to excessive missing ACKs

@openwrt-bot
Copy link
Author

imac:

Here is a dump of logread and dmesg from a failure I caught in the last few minutes. I restarted wifi at Wed Apr 11 15:19:35 2018; All that seems to be logged at the time of the outage is the "Unable to reset channel, reset status -5".

Logread:
Wed Apr 11 15:16:00 2018 kern.err kernel: [12609090.577341] ath: phy1: Unable to reset channel, reset status -5

Dmesg:
[12609090.577341] ath: phy1: Unable to reset channel, reset status -5

Wed Apr 11 15:16:00 2018 kern.err kernel: [12609090.577341] ath: phy1: Unable to reset channel, reset status -5
Wed Apr 11 15:16:19 2018 daemon.info hostapd: wlan0: STA a0:cc:2b:15:20:97 IEEE 802.11: authenticated
Wed Apr 11 15:16:19 2018 daemon.info hostapd: wlan0: STA a0:cc:2b:15:20:97 IEEE 802.11: associated (aid 5)
Wed Apr 11 15:16:19 2018 daemon.notice hostapd: wlan0: AP-STA-CONNECTED a0:cc:2b:15:20:97
Wed Apr 11 15:16:19 2018 daemon.info hostapd: wlan0: STA a0:cc:2b:15:20:97 WPA: pairwise key handshake completed (RSN)
Wed Apr 11 15:16:20 2018 daemon.info dnsmasq-dhcp[7921]: DHCPDISCOVER(br-lan) a0:cc:2b:15:20:97
Wed Apr 11 15:16:20 2018 daemon.info dnsmasq-dhcp[7921]: DHCPOFFER(br-lan) 192.168.11.197 a0:cc:2b:15:20:97
Wed Apr 11 15:16:20 2018 daemon.info dnsmasq-dhcp[7921]: DHCPREQUEST(br-lan) 192.168.11.197 a0:cc:2b:15:20:97
Wed Apr 11 15:16:20 2018 daemon.info dnsmasq-dhcp[7921]: DHCPACK(br-lan) 192.168.11.197 a0:cc:2b:15:20:97 Galaxy-S8
Wed Apr 11 15:16:21 2018 daemon.info odhcpd[856]: Using a RA lifetime of 0 seconds on br-lan
Wed Apr 11 15:19:34 2018 authpriv.info dropbear[12961]: Child connection from 192.168.11.15:47424
Wed Apr 11 15:19:35 2018 authpriv.notice dropbear[12961]: Pubkey auth succeeded for 'root' with key md5 5f:7d:b7:cc:89:bd:67:16:6f:bf:14:04:3b:30:ca:c8 from 192.168.11.15:47424
Wed Apr 11 15:19:36 2018 daemon.notice hostapd: wlan1: interface state ENABLED->DISABLED
Wed Apr 11 15:19:36 2018 daemon.notice hostapd: wlan1: AP-STA-DISCONNECTED c0:bd:d1:3a:cb:1b
Wed Apr 11 15:19:36 2018 daemon.notice hostapd: wlan1: AP-STA-DISCONNECTED 6c:ad:f8:4b:a3:52
Wed Apr 11 15:19:36 2018 daemon.notice hostapd: wlan1: AP-STA-DISCONNECTED 14:91:82:50:2b:a1
Wed Apr 11 15:19:36 2018 daemon.notice hostapd: wlan1: AP-STA-DISCONNECTED 70:62:b8:93:98:b8
Wed Apr 11 15:19:36 2018 daemon.notice hostapd: wlan1: AP-DISABLED
Wed Apr 11 15:19:36 2018 daemon.notice hostapd: wlan1: CTRL-EVENT-TERMINATING
Wed Apr 11 15:19:36 2018 daemon.notice hostapd: nl80211: deinit ifname=wlan1 disabled_11b_rates=0
Wed Apr 11 15:19:36 2018 kern.info kernel: [12609307.269187] device wlan1 left promiscuous mode
Wed Apr 11 15:19:36 2018 kern.info kernel: [12609307.269294] br-lan: port 3(wlan1) entered disabled state
Wed Apr 11 15:19:36 2018 daemon.notice netifd: Network device 'wlan1' link is down
Wed Apr 11 15:19:36 2018 daemon.notice hostapd: wlan0: interface state ENABLED->DISABLED
Wed Apr 11 15:19:36 2018 daemon.notice hostapd: wlan0: AP-STA-DISCONNECTED a0:cc:2b:15:20:97
Wed Apr 11 15:19:36 2018 daemon.notice hostapd: wlan0: AP-STA-DISCONNECTED a0:cc:2b:9c:a5:77
Wed Apr 11 15:19:36 2018 daemon.notice hostapd: wlan0: AP-STA-DISCONNECTED 04:d6:aa:98:67:62
Wed Apr 11 15:19:36 2018 daemon.notice hostapd: wlan0: AP-STA-DISCONNECTED a0:cc:2b:a5:7c:50
Wed Apr 11 15:19:36 2018 daemon.notice hostapd: wlan0: AP-STA-DISCONNECTED b8:f6:b1:a6:c4:e0
Wed Apr 11 15:19:36 2018 daemon.notice hostapd: wlan0: AP-DISABLED
Wed Apr 11 15:19:36 2018 daemon.notice hostapd: wlan0: CTRL-EVENT-TERMINATING
Wed Apr 11 15:19:36 2018 daemon.notice hostapd: nl80211: deinit ifname=wlan0 disabled_11b_rates=0
Wed Apr 11 15:19:36 2018 kern.info kernel: [12609307.293161] device wlan0 left promiscuous mode
Wed Apr 11 15:19:36 2018 kern.info kernel: [12609307.293266] br-lan: port 2(wlan0) entered disabled state
Wed Apr 11 15:19:37 2018 daemon.notice netifd: Network device 'wlan0' link is down
Wed Apr 11 15:19:37 2018 daemon.err hostapd: Configuration file: /var/run/hostapd-phy1.conf
Wed Apr 11 15:19:37 2018 daemon.err hostapd: Configuration file: /var/run/hostapd-phy0.conf
Wed Apr 11 15:19:37 2018 kern.info kernel: [12609308.303671] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready
Wed Apr 11 15:19:39 2018 daemon.notice hostapd: wlan1: interface state UNINITIALIZED->COUNTRY_UPDATE
Wed Apr 11 15:19:39 2018 kern.info kernel: [12609309.578823] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready
Wed Apr 11 15:19:39 2018 kern.info kernel: [12609309.579367] device wlan1 entered promiscuous mode
Wed Apr 11 15:19:39 2018 daemon.err hostapd: Using interface wlan1 with hwaddr d4:6e:0e:64:a1:2e and ssid "dotto1"
Wed Apr 11 15:19:39 2018 daemon.notice hostapd: wlan0: interface state UNINITIALIZED->COUNTRY_UPDATE
Wed Apr 11 15:19:39 2018 daemon.notice hostapd: wlan0: interface state COUNTRY_UPDATE->HT_SCAN
Wed Apr 11 15:19:39 2018 kern.info kernel: [12609309.596166] device wlan0 entered promiscuous mode
Wed Apr 11 15:19:39 2018 daemon.err hostapd: Using interface wlan0 with hwaddr d4:6e:0e:64:a1:2d and ssid "dotto1-5G"
Wed Apr 11 15:19:39 2018 kern.info kernel: [12609309.966354] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready
Wed Apr 11 15:19:39 2018 kern.info kernel: [12609309.966508] br-lan: port 2(wlan1) entered forwarding state
Wed Apr 11 15:19:39 2018 kern.info kernel: [12609309.966559] br-lan: port 2(wlan1) entered forwarding state
Wed Apr 11 15:19:39 2018 daemon.notice hostapd: wlan1: interface state COUNTRY_UPDATE->ENABLED
Wed Apr 11 15:19:39 2018 daemon.notice hostapd: wlan1: AP-ENABLED
Wed Apr 11 15:19:39 2018 daemon.notice netifd: Network device 'wlan1' link is up
Wed Apr 11 15:19:40 2018 daemon.notice hostapd: wlan0: interface state HT_SCAN->ENABLED
Wed Apr 11 15:19:40 2018 daemon.notice hostapd: wlan0: AP-ENABLED
Wed Apr 11 15:19:40 2018 kern.info kernel: [12609310.408411] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
Wed Apr 11 15:19:40 2018 kern.info kernel: [12609310.408617] br-lan: port 3(wlan0) entered forwarding state
Wed Apr 11 15:19:40 2018 kern.info kernel: [12609310.408674] br-lan: port 3(wlan0) entered forwarding state
Wed Apr 11 15:19:40 2018 daemon.notice netifd: Network device 'wlan0' link is up
Wed Apr 11 15:19:40 2018 daemon.info hostapd: wlan1: STA 14:91:82:50:2b:a1 IEEE 802.11: authenticated
Wed Apr 11 15:19:40 2018 daemon.info hostapd: wlan1: STA 14:91:82:50:2b:a1 IEEE 802.11: associated (aid 1)
Wed Apr 11 15:19:40 2018 daemon.notice hostapd: wlan1: AP-STA-CONNECTED 14:91:82:50:2b:a1
Wed Apr 11 15:19:40 2018 daemon.info hostapd: wlan1: STA 14:91:82:50:2b:a1 WPA: pairwise key handshake completed (RSN)
Wed Apr 11 15:19:41 2018 daemon.notice hostapd: wlan0: STA a0:cc:2b:9c:a5:77 IEEE 802.11: did not acknowledge authentication response
Wed Apr 11 15:19:41 2018 daemon.info hostapd: wlan0: STA b8:f6:b1:a6:c4:e0 IEEE 802.11: authenticated
Wed Apr 11 15:19:41 2018 daemon.info hostapd: wlan0: STA b8:f6:b1:a6:c4:e0 IEEE 802.11: associated (aid 1)
Wed Apr 11 15:19:41 2018 daemon.notice hostapd: wlan0: AP-STA-CONNECTED b8:f6:b1:a6:c4:e0
Wed Apr 11 15:19:41 2018 daemon.info hostapd: wlan0: STA b8:f6:b1:a6:c4:e0 WPA: pairwise key handshake completed (RSN)
Wed Apr 11 15:19:41 2018 kern.info kernel: [12609311.963119] br-lan: port 2(wlan1) entered forwarding state
Wed Apr 11 15:19:41 2018 daemon.info dnsmasq-dhcp[7921]: DHCPREQUEST(br-lan) 192.168.11.231 b8:f6:b1:a6:c4:e0
Wed Apr 11 15:19:41 2018 daemon.info dnsmasq-dhcp[7921]: DHCPACK(br-lan) 192.168.11.231 b8:f6:b1:a6:c4:e0 iPad
Wed Apr 11 15:19:41 2018 daemon.info odhcpd[856]: Using a RA lifetime of 0 seconds on br-lan
Wed Apr 11 15:19:42 2018 kern.info kernel: [12609312.403100] br-lan: port 3(wlan0) entered forwarding state
Wed Apr 11 15:19:42 2018 daemon.info hostapd: wlan0: STA a0:cc:2b:15:20:97 IEEE 802.11: authenticated
Wed Apr 11 15:19:42 2018 daemon.info hostapd: wlan0: STA a0:cc:2b:15:20:97 IEEE 802.11: associated (aid 2)
Wed Apr 11 15:19:43 2018 daemon.info hostapd: wlan0: STA 04:d6:aa:98:67:62 IEEE 802.11: authenticated
Wed Apr 11 15:19:43 2018 daemon.info hostapd: wlan0: STA 04:d6:aa:98:67:62 IEEE 802.11: associated (aid 3)
Wed Apr 11 15:19:43 2018 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 04:d6:aa:98:67:62
Wed Apr 11 15:19:43 2018 daemon.info hostapd: wlan0: STA 04:d6:aa:98:67:62 WPA: pairwise key handshake completed (RSN)
Wed Apr 11 15:19:43 2018 daemon.notice hostapd: wlan1: AP-STA-DISCONNECTED 14:91:82:50:2b:a1
Wed Apr 11 15:19:44 2018 daemon.info hostapd: wlan1: STA 70:62:b8:93:98:b8 IEEE 802.11: authenticated
Wed Apr 11 15:19:44 2018 daemon.info hostapd: wlan1: STA 70:62:b8:93:98:b8 IEEE 802.11: associated (aid 1)
Wed Apr 11 15:19:44 2018 daemon.info dnsmasq-dhcp[7921]: DHCPDISCOVER(br-lan) 04:d6:aa:98:67:62
Wed Apr 11 15:19:44 2018 daemon.info dnsmasq-dhcp[7921]: DHCPOFFER(br-lan) 192.168.11.157 04:d6:aa:98:67:62
Wed Apr 11 15:19:44 2018 daemon.info dnsmasq-dhcp[7921]: DHCPREQUEST(br-lan) 192.168.11.157 04:d6:aa:98:67:62
Wed Apr 11 15:19:44 2018 daemon.info dnsmasq-dhcp[7921]: DHCPACK(br-lan) 192.168.11.157 04:d6:aa:98:67:62 Galaxy-S8
Wed Apr 11 15:19:44 2018 daemon.info odhcpd[856]: Using a RA lifetime of 0 seconds on br-lan
Wed Apr 11 15:19:45 2018 daemon.notice hostapd: wlan1: AP-STA-CONNECTED 70:62:b8:93:98:b8
Wed Apr 11 15:19:45 2018 daemon.info hostapd: wlan1: STA 70:62:b8:93:98:b8 WPA: pairwise key handshake completed (RSN)
Wed Apr 11 15:19:46 2018 daemon.info odhcpd[856]: Using a RA lifetime of 0 seconds on br-lan
Wed Apr 11 15:19:46 2018 daemon.info hostapd: wlan1: STA 14:91:82:50:2b:a1 IEEE 802.11: authenticated
Wed Apr 11 15:19:46 2018 daemon.info hostapd: wlan1: STA 14:91:82:50:2b:a1 IEEE 802.11: associated (aid 2)
Wed Apr 11 15:19:46 2018 daemon.info hostapd: wlan0: STA a0:cc:2b:a5:7c:50 IEEE 802.11: authenticated
Wed Apr 11 15:19:46 2018 daemon.info hostapd: wlan0: STA a0:cc:2b:a5:7c:50 IEEE 802.11: associated (aid 4)
Wed Apr 11 15:19:46 2018 daemon.notice hostapd: wlan1: AP-STA-CONNECTED 14:91:82:50:2b:a1
Wed Apr 11 15:19:46 2018 daemon.info hostapd: wlan1: STA 14:91:82:50:2b:a1 WPA: pairwise key handshake completed (RSN)
Wed Apr 11 15:19:46 2018 daemon.notice hostapd: wlan0: AP-STA-CONNECTED a0:cc:2b:a5:7c:50
Wed Apr 11 15:19:46 2018 daemon.info hostapd: wlan0: STA a0:cc:2b:a5:7c:50 WPA: pairwise key handshake completed (RSN)
Wed Apr 11 15:19:46 2018 daemon.notice hostapd: wlan1: AP-STA-DISCONNECTED 14:91:82:50:2b:a1
Wed Apr 11 15:19:47 2018 daemon.info hostapd: wlan0: STA a0:cc:2b:9c:a5:77 IEEE 802.11: authenticated
Wed Apr 11 15:19:47 2018 daemon.info hostapd: wlan0: STA a0:cc:2b:9c:a5:77 IEEE 802.11: associated (aid 5)
Wed Apr 11 15:19:47 2018 daemon.notice hostapd: wlan0: AP-STA-CONNECTED a0:cc:2b:9c:a5:77
Wed Apr 11 15:19:47 2018 daemon.info hostapd: wlan0: STA a0:cc:2b:9c:a5:77 WPA: pairwise key handshake completed (RSN)
Wed Apr 11 15:19:47 2018 daemon.info dnsmasq-dhcp[7921]: DHCPDISCOVER(br-lan) a0:cc:2b:a5:7c:50
Wed Apr 11 15:19:47 2018 daemon.info dnsmasq-dhcp[7921]: DHCPOFFER(br-lan) 192.168.11.208 a0:cc:2b:a5:7c:50
Wed Apr 11 15:19:47 2018 daemon.info dnsmasq-dhcp[7921]: DHCPREQUEST(br-lan) 192.168.11.208 a0:cc:2b:a5:7c:50
Wed Apr 11 15:19:47 2018 daemon.info dnsmasq-dhcp[7921]: DHCPACK(br-lan) 192.168.11.208 a0:cc:2b:a5:7c:50 DOTTO-S8
Wed Apr 11 15:19:47 2018 daemon.info dnsmasq-dhcp[7921]: DHCPDISCOVER(br-lan) a0:cc:2b:9c:a5:77
Wed Apr 11 15:19:47 2018 daemon.info dnsmasq-dhcp[7921]: DHCPOFFER(br-lan) 192.168.11.111 a0:cc:2b:9c:a5:77
Wed Apr 11 15:19:47 2018 daemon.info dnsmasq-dhcp[7921]: DHCPREQUEST(br-lan) 192.168.11.111 a0:cc:2b:9c:a5:77
Wed Apr 11 15:19:47 2018 daemon.info dnsmasq-dhcp[7921]: DHCPACK(br-lan) 192.168.11.111 a0:cc:2b:9c:a5:77 Galaxy-S8
Wed Apr 11 15:19:47 2018 daemon.info odhcpd[856]: Using a RA lifetime of 0 seconds on br-lan
Wed Apr 11 15:19:48 2018 daemon.info odhcpd[856]: Using a RA lifetime of 0 seconds on br-lan
Wed Apr 11 15:19:48 2018 daemon.info hostapd: wlan0: STA a0:cc:2b:15:20:97 IEEE 802.11: authenticated
Wed Apr 11 15:19:48 2018 daemon.info hostapd: wlan0: STA a0:cc:2b:15:20:97 IEEE 802.11: associated (aid 2)
Wed Apr 11 15:19:48 2018 daemon.notice hostapd: wlan0: AP-STA-CONNECTED a0:cc:2b:15:20:97
Wed Apr 11 15:19:48 2018 daemon.info hostapd: wlan0: STA a0:cc:2b:15:20:97 WPA: pairwise key handshake completed (RSN)
Wed Apr 11 15:19:48 2018 daemon.info dnsmasq-dhcp[7921]: DHCPDISCOVER(br-lan) a0:cc:2b:15:20:97
Wed Apr 11 15:19:48 2018 daemon.info dnsmasq-dhcp[7921]: DHCPOFFER(br-lan) 192.168.11.197 a0:cc:2b:15:20:97
Wed Apr 11 15:19:48 2018 daemon.info dnsmasq-dhcp[7921]: DHCPREQUEST(br-lan) 192.168.11.197 a0:cc:2b:15:20:97
Wed Apr 11 15:19:48 2018 daemon.info dnsmasq-dhcp[7921]: DHCPACK(br-lan) 192.168.11.197 a0:cc:2b:15:20:97 Galaxy-S8
Wed Apr 11 15:19:48 2018 daemon.info hostapd: wlan1: STA 14:91:82:50:2b:a1 IEEE 802.11: authenticated
Wed Apr 11 15:19:49 2018 daemon.info hostapd: wlan1: STA 14:91:82:50:2b:a1 IEEE 802.11: associated (aid 2)
Wed Apr 11 15:19:49 2018 daemon.notice hostapd: wlan1: AP-STA-CONNECTED 14:91:82:50:2b:a1
Wed Apr 11 15:19:49 2018 daemon.info hostapd: wlan1: STA 14:91:82:50:2b:a1 WPA: pairwise key handshake completed (RSN)
Wed Apr 11 15:19:49 2018 daemon.info dnsmasq-dhcp[7921]: DHCPDISCOVER(br-lan) 70:62:b8:93:98:b8
Wed Apr 11 15:19:49 2018 daemon.info dnsmasq-dhcp[7921]: DHCPOFFER(br-lan) 192.168.11.203 70:62:b8:93:98:b8
Wed Apr 11 15:19:49 2018 daemon.info odhcpd[856]: Using a RA lifetime of 0 seconds on br-lan
Wed Apr 11 15:19:49 2018 daemon.info dnsmasq-dhcp[7921]: DHCPREQUEST(br-lan) 192.168.11.203 70:62:b8:93:98:b8
Wed Apr 11 15:19:49 2018 daemon.info dnsmasq-dhcp[7921]: DHCPACK(br-lan) 192.168.11.203 70:62:b8:93:98:b8 DCH-S150
Wed Apr 11 15:19:50 2018 daemon.info dnsmasq-dhcp[7921]: DHCPDISCOVER(br-lan) 14:91:82:50:2b:a1
Wed Apr 11 15:19:50 2018 daemon.info dnsmasq-dhcp[7921]: DHCPOFFER(br-lan) 192.168.11.165 14:91:82:50:2b:a1
Wed Apr 11 15:19:50 2018 daemon.info dnsmasq-dhcp[7921]: DHCPREQUEST(br-lan) 192.168.11.165 14:91:82:50:2b:a1
Wed Apr 11 15:19:50 2018 daemon.info dnsmasq-dhcp[7921]: DHCPACK(br-lan) 192.168.11.165 14:91:82:50:2b:a1
Wed Apr 11 15:19:51 2018 daemon.info odhcpd[856]: Using a RA lifetime of 0 seconds on br-lan
Wed Apr 11 15:20:02 2018 daemon.info hostapd: wlan1: STA 6c:ad:f8:4b:a3:52 IEEE 802.11: authenticated
Wed Apr 11 15:20:02 2018 daemon.info hostapd: wlan1: STA 6c:ad:f8:4b:a3:52 IEEE 802.11: associated (aid 3)
Wed Apr 11 15:20:02 2018 daemon.notice hostapd: wlan1: AP-STA-CONNECTED 6c:ad:f8:4b:a3:52
Wed Apr 11 15:20:02 2018 daemon.info hostapd: wlan1: STA 6c:ad:f8:4b:a3:52 WPA: pairwise key handshake completed (RSN)
Wed Apr 11 15:20:03 2018 daemon.info dnsmasq-dhcp[7921]: DHCPDISCOVER(br-lan) 6c:ad:f8:4b:a3:52
Wed Apr 11 15:20:03 2018 daemon.info dnsmasq-dhcp[7921]: DHCPOFFER(br-lan) 192.168.11.191 6c:ad:f8:4b:a3:52
Wed Apr 11 15:20:03 2018 daemon.info dnsmasq-dhcp[7921]: DHCPREQUEST(br-lan) 192.168.11.191 6c:ad:f8:4b:a3:52
Wed Apr 11 15:20:03 2018 daemon.info dnsmasq-dhcp[7921]: DHCPACK(br-lan) 192.168.11.191 6c:ad:f8:4b:a3:52 DottoCast
Wed Apr 11 15:20:05 2018 daemon.info odhcpd[856]: Using a RA lifetime of 0 seconds on br-lan

[12570336.615632] br-lan: port 2(wlan0) entered forwarding state
[12600178.944878] ath10k_pci 0000:01:00.0: failed to parse phyerr tlv payload at byte 0
[12609090.577341] ath: phy1: Unable to reset channel, reset status -5
[12609307.269187] device wlan1 left promiscuous mode
[12609307.269294] br-lan: port 3(wlan1) entered disabled state
[12609307.293161] device wlan0 left promiscuous mode
[12609307.293266] br-lan: port 2(wlan0) entered disabled state
[12609308.303671] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready
[12609309.578823] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready
[12609309.579367] device wlan1 entered promiscuous mode
[12609309.596166] device wlan0 entered promiscuous mode
[12609309.966354] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready
[12609309.966508] br-lan: port 2(wlan1) entered forwarding state
[12609309.966559] br-lan: port 2(wlan1) entered forwarding state
[12609310.408411] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
[12609310.408617] br-lan: port 3(wlan0) entered forwarding state
[12609310.408674] br-lan: port 3(wlan0) entered forwarding state
[12609311.963119] br-lan: port 2(wlan1) entered forwarding state
[12609312.403100] br-lan: port 3(wlan0) entered forwarding state

@openwrt-bot
Copy link
Author

psyborg:

i've observed similar on ath79: https://bugs.openwrt.org/index.php?do=details&task_id=2172

not sure bootup procedure would have any effect on later device operation but with original fw there are bunch of "check DDR activity HIGH" "RTC reset" messages before wifi interfaces initialise

@openwrt-bot
Copy link
Author

zorxd:

I just had a similar problem with an Archer c7 v2, OpenWRT 19.07.1 (ath79)
2.4 GHz radio (phy1) was unusable after 3 of the following error message:

ath: phy1: Unable to reset channel, reset status -5

Somehow, it's only after the third error that the radio became unusable. I then have a bunch of "disassociated due to inactivity" messages from hostapd wlan1.

I clicked the "restart" button in LuCI and it started working again.
Uptime was about 4 days.

A short time ago, I removed the candela tech driver/firmware and installed the non-ct ones. Not sure if it's related since this driver is only used for the 5 GHz radio (phy0) and it's the 2.4 GHz radio (phy1, ath9k) that failed.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

1 participant