OpenWrt/LEDE Project

Welcome to the OpenWrt Project bug reporting and issue tracking system

Problems to be reported here are for the current OpenWrt and legacy LEDE Project’s targets, sources, toolchain, core packages, build procedures, distribution and infrastructure. Guidelines for submitting a good bug report can be found at the OpenWrt Project website. Problems related to LuCI or OpenWrt packages need to be reported in their repositories:

Notifications of all submissions and task changes are sent to openwrt-bugs@infradead.org.

OpenedIDCategoryTask TypePrioritySeveritySummary  descReported InStatus
16.12.20192678Base systemBug ReportVery LowLowWireless client cannot connect to open wireless network...TrunkUnconfirmed Task Description

Wireless client won’t connect to an open wireless network (encryption set to none) after previous encrypted connection. A reboot fixes the problem. Sounds similar to OpenWISP problem: https://github.com/openwisp/netjsonconfig/issues/113

I’m using Comfast CF-E110N-V2 8MB
OpenWRT SNAPSHOT r11676-a15f658ed0
target: ath79/generic mips_24kc

Steps to reproduce:
1. Connect to an encrypted wireless network, eg.
config wifi-iface ‘wifinet0’ option ssid ‘homewifi’ option device ‘radio0’ option mode ‘sta’ option network ‘wwan’ option key ‘versecurepassword’ option encryption ‘psk2’ 2. Confirm it’s working.
3. Disable ssid ‘homewifi’ option disabled ‘1’ 4. Connect to an open wireless network, eg.
config wifi-iface ‘wifinet1’ option ssid ‘airport free wifi’ option device ‘radio0’ option mode ‘sta’ option network ‘wwan2’ option encryption ‘none’ 5. Confirm that the device doesn’t connect to the ‘airport free wifi’ network
6. restart device
7. confirm that the device now connects to the ‘airport free wifi’ network.

19.04.20213745Base systemBug ReportVery LowLowWireless 'isolate' option not working in brcmfmac drive...openwrt-21.02Unconfirmed Task Description

Device: BCM4356 WiFi chip + brcmfmac
OpenWRT Version: 21.02 (commit 50f2f25d58 [4 days ago])

I experienced the problem using OpenWrt 21.02 on a device using the brcmfmac driver for the BCM4356 chip.

I’ve only been able to test this on an InvizBox 2 (not supported by OpenWRT) but I suspect it to also be a problem for other devices using brcmfmac.

Steps to reproduce:

On a device running OpenWRT 21.02 and with a WiFi chip using the brcmfmac driver:

Set wireless.<wifi-iface>.isolate=’1’ on the WiFi interface that uses the brcmfmac driver.

Devices connected to the WiFi interface should be isolated from each other, but are not.

Notes / Potential fixes:

I was able to fix this issue by building with a specific patch for brcmfmac from the latest Cypress Linux WiFi Driver Release (FMAC)(https://community.cypress.com/t5/Wi-Fi-Bluetooth-for-Linux/Cypress-Linux-WiFi-Driver-Release-FMAC-2021-01-14/m-p/268899). The particular patch that fixed the issue can be found in the .zip file linked in the latest Cypress driver release. cypress-fmac-v5.4.18-2021_0114.zip > cypress-patch-v5.4.18-2021_0114.tar.gz > cypress-patch > 0004-brcmfmac-support-AP-isolation.patch.

The patch has not been accepted into linux-wireless yet. But there are details about it here: https://patchwork.kernel.org/project/linux-wireless/patch/20200901063237.15549-2-wright.feng@cypress.com/.

Let me know if you need any more information or there’s anything I can do to help sort this out. Thanks.

28.07.20213953Base systemBug ReportVery LowMediumWireguard slow performance - mpc85xx (Tp-Link WDR-4900)...openwrt-21.02Unconfirmed Task Description

With openwrt-21.02-rc3 the wireguard vpn speed is quite slow ~ 50 Mbps, compared to 19.07.7 where I get 100 Mbps.
My hardware is Tp-Link WDR-4900 - mpc85xx.

01.03.20213653KernelBug ReportVery LowMediumwireguard is not working - not sending any packetsTrunkUnconfirmed Task Description

I’m using 19.07.7 r11306-c4a6851c72 build on xiaomi mi router 4a gigabit, built by David Betham (it doesn’t affect wireguard, I think).

The problem I’m having is that wireguard is completely not working: although the tunnel is configured, it never sends any traffic to the destination peer.

My wg config:

# wg show
interface: wg0
  public key: Kus59Dar/4ki3/IWM7UVn5uFFco79btQgH9CKCDERF8=
  private key: (hidden)
  listening port: 31833

peer: qEgo8fA/w9pXtBoQnB5/U/jNn30AFxloPV/owjxKj0A=
  endpoint: 185.X.Y.Z:1195
  allowed ips: 10.10.10.0/24
  persistent keepalive: every 15 seconds

Now, I start

tcpdump -i any -f "udp and port 1195"

and ping the remote end tunnel, but not a single ping is returned nor I see a single packet captured by tcpdump. The same config and device were working on some unofficial 17.07.4 build I was using previously.

Kernel used:

# uname -a
Linux coffee 4.14.221 #0 SMP Mon Feb 15 15:22:37 2021 mips GNU/Linux

My software versions are:

kmod-udptunnel4 - 4.14.221-1
kmod-udptunnel6 - 4.14.221-1
kmod-wireguard - 4.14.221+1.0.20200611-2
luci-app-wireguard - git-21.054.03371-3b137b5-1
luci-proto-wireguard - git-21.054.03371-3b137b5-1
wireguard - 1.0.20200611-2
wireguard-tools - 1.0.20191226-1

Please let me know how can I help investigate it further.

04.10.20214062Base systemBug ReportVery LowHighwireguard fails to route to non-VPN addresses at far-en...openwrt-19.07Unconfirmed Task Description

Hardware : Ubiquiti Routerstation Pro
Software : OpenWrt 19.07.6, r11278-8055e38794
Updated : 2021-10-03

Problem does not occur with an OpenVPN tunnel providing the same functionality.

Problem occurs with the following combination :

1 : Wireguard tunnel from RSPro gateway (device wgc21) to a CentOS 7 server (device wg21) which uses the 2 non-public DNS servers in the data centre that it’s located in.

2 : RSPro networking DNS settings are the 2 data centre server addresses.

3 : The RSPro has routes to those DNS servers via dev wgc21

4 : RSPro iptables MASQUERADEs packets going out interface wgc21

On the RSPro’s local network, doing “$ host foo.com” gets a REFUSED reply. Browsers report failure to resolve.

On a local machine, a Wireshark remote capture on the RSPro’s wgc21 interface shows the DNS request packets (with DST=data_centre_dns_server), and a remote capture on the server’s wg21 interface doesn’t show them.

ssh sessions from local machines via the RSPro to the server’s wg21 address succeed.

How to reproduce : As above.

Workaround :

RSPro networking DNS addresses changed to 2 addresses on the wg21 network, and on the remote server two iptables PREROUTING rules added that DNAT those 2 addresses to the data centre DNS addresses.

15.11.20181952Base systemBug ReportVery LowHighwifi with hidden ssid and mac-filter doesn't work on IO...AllUnconfirmed Task Description

on tp-link_tl-wr842nd_v1 18.06 and 18.06.1

If hidden ssid and mac-filter is enabled, IOS 12 doesn't able to connect on this wifi network.

But if ssid broadcast is running with mac-filter enabled or ssid broadcast hidden and mac-filter disabled, then it works.

24.10.20171110Base systemBug ReportVery LowLowWifi unusable on HG556a using current trunkTrunkUnconfirmed Task Description

Supply the following if possible:
- Device problem occurs on: Huawei ECHOLIFE HG556a Type B
- Software versions of LEDE release, packages, etc: Current Trunk - Powered by LuCI Master (git-17.294.24601-59a4e40) / LEDE Reboot SNAPSHOT r5122-f7a6fd3153

- Steps to reproduce: reboot

I did an update to trunk and made a lede build for the HG556a type B the other day. I have two of these HG556a type B routers both configured as wireless repeaters. I made no changes to the config, I simply wanted the latest security patches installed on my wifi repeaters. The first HG556a connects to a WWAN router that broadcasts 802.11n only, the other WWAN router broadcasts legacy wifi modes and 802.11n. The first works perfectly. The second throws up numerous errors in syslog from boot time, reboot every few hours and repeatedly disconnects from clients and the WWAN router. See syslog below:

Powered by LuCI Master (git-17.294.24601-59a4e40) / LEDE Reboot SNAPSHOT r5122-f7a6fd3153

Tue Oct 24 13:08:04 2017 kern.warn kernel: [19932.596484] CPU: 0 PID: 1399 Comm: wpa_supplicant Tainted: G W 4.4.93 #0
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19932.604568] Stack : 80546d42 00000049 00000000 803f0000 82f116a4 803e6da3 80372ae0 00000577
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19932.604568] 80543fac 00000000 00000004 81f73908 00000000 800594cc 8037d094 803e0000
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19932.604568] 00000000 00000000 8037b4a0 82f0f8d4 00000000 800573d0 80546d42 00000072
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19932.604568] 803e5e50 801bdc00 00000000 00000000 00000000 00000000 00000000 00000000
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19932.604568] 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19932.604568] ...
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19932.641077] Call Trace:
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19932.643652] [<80024f84>] show_stack+0×54/0×88 Tue Oct 24 13:08:04 2017 kern.warn kernel: [19932.648182] [<80032f00>] warn_slowpath_common+0xa0/0xd0
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19932.653588] [<80032fb8>] warn_slowpath_null+0×18/0×24 Tue Oct 24 13:08:04 2017 kern.warn kernel: [19932.659056] [<82c262e4>] ieee80211_rx_napi+0×240/0x97c [mac80211]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19932.665646] [<832c7260>] ath_rx_tasklet+0xc24/0xc88 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19932.671458] [<832c733c>] ath_stoprecv+0×78/0xf34 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19932.676979] [<832c3230>] ath9k_deinit_device+0x6d0/0×944 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19932.683219] [<832c503c>] ath9k_calculate_summary_state+0×500/0×600 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19932.690367]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19932.691843] —[ end trace 0902623f520cb0c7 ]— Tue Oct 24 13:08:04 2017 kern.warn kernel: [19932.698309] ————[ cut here ]———— Tue Oct 24 13:08:04 2017 kern.warn kernel: [19932.703376] WARNING: CPU: 0 PID: 1399 at backports-2017-10-06/net/mac80211/rx.c:629 ieee80211_rx_napi+0×240/0x97c [mac80211]()
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19932.715140] Modules linked in: ath9k ath9k_htc ath9k_common pppoe ppp_async option cdc_mbim ath9k_hw ath usb_wwan rndis_host qmi_wwan pppox ppp_generic nf_conntrack_ipv6 mac80211 iptable_nat ipt_REJECT ipt_MASQUERADE huawei_cdc_ncm cfg80211 cdc_subset cdc_ncm cdc_ether cdc_eem xt_time xt_tcpudp xt_tcpmss xt_statistic xt_state xt_recent xt_nat xt_multiport xt_mark xt_mac xt_limit xt_length xt_hl xt_helper xt_ecn xt_dscp xt_conntrack xt_connmark xt_connlimit xt_cTue Oct 24 13:08:04 2017 kern.warn kernel: [19932.858376] CPU: 0 PID: 1399 Comm: wpa_supplicant Tainted: G W 4.4.93 #0
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19932.866468] Stack : 80546d42 00000049 00000000 803f0000 82f116a4 803e6da3 80372ae0 00000577
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19932.866468] 80543fac 00000000 00000004 81f76648 00000000 800594cc 8037d094 803e0000
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19932.866468] 00000000 00000000 8037b4a0 82f0f8d4 00000000 800573d0 80546d42 00000072
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19932.866468] 803e5e50 801bdc00 00000000 00000000 00000000 00000000 00000000 00000000
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19932.866468] 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19932.866468] ...
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19932.902968] Call Trace:
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19932.905544] [<80024f84>] show_stack+0×54/0×88 Tue Oct 24 13:08:04 2017 kern.warn kernel: [19932.910072] [<80032f00>] warn_slowpath_common+0xa0/0xd0
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19932.915479] [<80032fb8>] warn_slowpath_null+0×18/0×24 Tue Oct 24 13:08:04 2017 kern.warn kernel: [19932.920933] [<82c262e4>] ieee80211_rx_napi+0×240/0x97c [mac80211]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19932.927490] [<832c7260>] ath_rx_tasklet+0xc24/0xc88 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19932.933304] [<832c733c>] ath_stoprecv+0×78/0xf34 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19932.938829] [<832c3230>] ath9k_deinit_device+0x6d0/0×944 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19932.945064] [<832c503c>] ath9k_calculate_summary_state+0×500/0×600 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19932.952230]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19932.953769] —[ end trace 0902623f520cb0c8 ]— Tue Oct 24 13:08:04 2017 kern.warn kernel: [19932.958850] ————[ cut here ]———— Tue Oct 24 13:08:04 2017 kern.warn kernel: [19932.963902] WARNING: CPU: 0 PID: 1399 at backports-2017-10-06/net/mac80211/rx.c:629 ieee80211_rx_napi+0×240/0x97c [mac80211]()
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19932.975678] Modules linked in: ath9k ath9k_htc ath9k_common pppoe ppp_async option cdc_mbim ath9k_hw ath usb_wwan rndis_host qmi_wwan pppox ppp_generic nf_conntrack_ipv6 mac80211 iptable_nat ipt_REJECT ipt_MASQUERADE huawei_cdc_ncm cfg80211 cdc_subset cdc_ncm cdc_ether cdc_eem xt_time xt_tcpudp xt_tcpmss xt_statistic xt_state xt_recent xt_nat xt_multiport xt_mark xt_mac xt_limit xt_length xt_hl xt_helper xt_ecn xt_dscp xt_conntrack xt_connmark xt_connlimit xt_cTue Oct 24 13:08:04 2017 kern.warn kernel: [19933.118913] CPU: 0 PID: 1399 Comm: wpa_supplicant Tainted: G W 4.4.93 #0
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.126999] Stack : 80546d42 00000049 00000000 803f0000 82f116a4 803e6da3 80372ae0 00000577
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.126999] 80543fac 00000000 00000004 81f76b18 00000000 800594cc 8037d094 803e0000
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.126999] 00000000 00000000 8037b4a0 82f0f8d4 00000000 800573d0 80546d42 00000072
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.126999] 803e5e50 801bdc00 00000000 00000000 00000000 00000000 00000000 00000000
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.126999] 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.126999] ...
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.163508] Call Trace:
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.166083] [<80024f84>] show_stack+0×54/0×88 Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.170613] [<80032f00>] warn_slowpath_common+0xa0/0xd0
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.176018] [<80032fb8>] warn_slowpath_null+0×18/0×24 Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.181482] [<82c262e4>] ieee80211_rx_napi+0×240/0x97c [mac80211]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.188060] [<832c7260>] ath_rx_tasklet+0xc24/0xc88 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.193877] [<832c733c>] ath_stoprecv+0×78/0xf34 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.199401] [<832c3230>] ath9k_deinit_device+0x6d0/0×944 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.205641] [<832c503c>] ath9k_calculate_summary_state+0×500/0×600 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.212796]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.214330] —[ end trace 0902623f520cb0c9 ]— Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.219582] ————[ cut here ]———— Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.224643] WARNING: CPU: 0 PID: 1399 at backports-2017-10-06/net/mac80211/rx.c:629 ieee80211_rx_napi+0×240/0x97c [mac80211]()
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.236421] Modules linked in: ath9k ath9k_htc ath9k_common pppoe ppp_async option cdc_mbim ath9k_hw ath usb_wwan rndis_host qmi_wwan pppox ppp_generic nf_conntrack_ipv6 mac80211 iptable_nat ipt_REJECT ipt_MASQUERADE huawei_cdc_ncm cfg80211 cdc_subset cdc_ncm cdc_ether cdc_eem xt_time xt_tcpudp xt_tcpmss xt_statistic xt_state xt_recent xt_nat xt_multiport xt_mark xt_mac xt_limit xt_length xt_hl xt_helper xt_ecn xt_dscp xt_conntrack xt_connmark xt_connlimit xt_cTue Oct 24 13:08:04 2017 kern.warn kernel: [19933.379658] CPU: 0 PID: 1399 Comm: wpa_supplicant Tainted: G W 4.4.93 #0
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.387752] Stack : 80546d42 00000049 00000000 803f0000 82f116a4 803e6da3 80372ae0 00000577
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.387752] 80543fac 00000000 00000004 81e79bc8 00000000 800594cc 8037d094 803e0000
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.387752] 00000000 00000000 8037b4a0 82f0f8d4 00000000 800573d0 80546d42 00000072
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.387752] 803e5e50 801bdc00 00000000 00000000 00000000 00000000 00000000 00000000
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.387752] 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.387752] ...
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.424254] Call Trace:
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.426828] [<80024f84>] show_stack+0×54/0×88 Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.431359] [<80032f00>] warn_slowpath_common+0xa0/0xd0
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.436764] [<80032fb8>] warn_slowpath_null+0×18/0×24 Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.442218] [<82c262e4>] ieee80211_rx_napi+0×240/0x97c [mac80211]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.448774] [<832c7260>] ath_rx_tasklet+0xc24/0xc88 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.454587] [<832c733c>] ath_stoprecv+0×78/0xf34 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.460111] [<832c3230>] ath9k_deinit_device+0x6d0/0×944 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.466350] [<832c503c>] ath9k_calculate_summary_state+0×500/0×600 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.473507]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.474982] —[ end trace 0902623f520cb0ca ]— Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.480524] ————[ cut here ]———— Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.485601] WARNING: CPU: 0 PID: 1399 at backports-2017-10-06/net/mac80211/rx.c:629 ieee80211_rx_napi+0×240/0x97c [mac80211]()
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.497400] Modules linked in: ath9k ath9k_htc ath9k_common pppoe ppp_async option cdc_mbim ath9k_hw ath usb_wwan rndis_host qmi_wwan pppox ppp_generic nf_conntrack_ipv6 mac80211 iptable_nat ipt_REJECT ipt_MASQUERADE huawei_cdc_ncm cfg80211 cdc_subset cdc_ncm cdc_ether cdc_eem xt_time xt_tcpudp xt_tcpmss xt_statistic xt_state xt_recent xt_nat xt_multiport xt_mark xt_mac xt_limit xt_length xt_hl xt_helper xt_ecn xt_dscp xt_conntrack xt_connmark xt_connlimit xt_cTue Oct 24 13:08:04 2017 kern.warn kernel: [19933.640637] CPU: 0 PID: 1399 Comm: wpa_supplicant Tainted: G W 4.4.93 #0
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.648719] Stack : 80546d42 00000049 00000000 803f0000 82f116a4 803e6da3 80372ae0 00000577
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.648719] 80543fac 00000000 00000004 82f334e8 00000000 800594cc 8037d094 803e0000
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.648719] 00000000 00000000 8037b4a0 82f0f8d4 00000000 800573d0 80546d42 00000072
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.648719] 803e5e50 801bdc00 00000000 00000000 00000000 00000000 00000000 00000000
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.648719] 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.648719] ...
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.685231] Call Trace:
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.687807] [<80024f84>] show_stack+0×54/0×88 Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.692346] [<80032f00>] warn_slowpath_common+0xa0/0xd0
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.697751] [<80032fb8>] warn_slowpath_null+0×18/0×24 Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.703222] [<82c262e4>] ieee80211_rx_napi+0×240/0x97c [mac80211]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.709776] [<832c7260>] ath_rx_tasklet+0xc24/0xc88 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.715590] [<832c733c>] ath_stoprecv+0×78/0xf34 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.721115] [<832c3230>] ath9k_deinit_device+0x6d0/0×944 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.727354] [<832c503c>] ath9k_calculate_summary_state+0×500/0×600 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.734503]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.735978] —[ end trace 0902623f520cb0cb ]— Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.741140] ————[ cut here ]———— Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.746190] WARNING: CPU: 0 PID: 1399 at backports-2017-10-06/net/mac80211/rx.c:629 ieee80211_rx_napi+0×240/0x97c [mac80211]()
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.757949] Modules linked in: ath9k ath9k_htc ath9k_common pppoe ppp_async option cdc_mbim ath9k_hw ath usb_wwan rndis_host qmi_wwan pppox ppp_generic nf_conntrack_ipv6 mac80211 iptable_nat ipt_REJECT ipt_MASQUERADE huawei_cdc_ncm cfg80211 cdc_subset cdc_ncm cdc_ether cdc_eem xt_time xt_tcpudp xt_tcpmss xt_statistic xt_state xt_recent xt_nat xt_multiport xt_mark xt_mac xt_limit xt_length xt_hl xt_helper xt_ecn xt_dscp xt_conntrack xt_connmark xt_connlimit xt_cTue Oct 24 13:08:04 2017 kern.warn kernel: [19933.901184] CPU: 0 PID: 1399 Comm: wpa_supplicant Tainted: G W 4.4.93 #0
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.909277] Stack : 80546d42 00000049 00000000 803f0000 82f116a4 803e6da3 80372ae0 00000577
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.909277] 80543fac 00000000 00000004 82f822d8 00000000 800594cc 8037d094 803e0000
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.909277] 00000000 00000000 8037b4a0 82f0f8d4 00000000 800573d0 80546d42 00000072
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.909277] 803e5e50 801bdc00 00000000 00000000 00000000 00000000 00000000 00000000
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.909277] 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.909277] ...
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.945779] Call Trace:
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.948307] [<80024f84>] show_stack+0×54/0×88 Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.952874] [<80032f00>] warn_slowpath_common+0xa0/0xd0
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.958280] [<80032fb8>] warn_slowpath_null+0×18/0×24 Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.963731] [<82c262e4>] ieee80211_rx_napi+0×240/0x97c [mac80211]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.970280] [<832c7260>] ath_rx_tasklet+0xc24/0xc88 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.976092] [<832c733c>] ath_stoprecv+0×78/0xf34 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.981608] [<832c3230>] ath9k_deinit_device+0x6d0/0×944 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.987845] [<832c503c>] ath9k_calculate_summary_state+0×500/0×600 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.994995]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19933.996472] —[ end trace 0902623f520cb0cc ]— Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.001802] ————[ cut here ]———— Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.006851] WARNING: CPU: 0 PID: 1399 at backports-2017-10-06/net/mac80211/rx.c:629 ieee80211_rx_napi+0×240/0x97c [mac80211]()
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.018628] Modules linked in: ath9k ath9k_htc ath9k_common pppoe ppp_async option cdc_mbim ath9k_hw ath usb_wwan rndis_host qmi_wwan pppox ppp_generic nf_conntrack_ipv6 mac80211 iptable_nat ipt_REJECT ipt_MASQUERADE huawei_cdc_ncm cfg80211 cdc_subset cdc_ncm cdc_ether cdc_eem xt_time xt_tcpudp xt_tcpmss xt_statistic xt_state xt_recent xt_nat xt_multiport xt_mark xt_mac xt_limit xt_length xt_hl xt_helper xt_ecn xt_dscp xt_conntrack xt_connmark xt_connlimit xt_cTue Oct 24 13:08:04 2017 kern.warn kernel: [19934.161867] CPU: 0 PID: 1399 Comm: wpa_supplicant Tainted: G W 4.4.93 #0
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.169949] Stack : 80546d42 00000049 00000000 803f0000 82f116a4 803e6da3 80372ae0 00000577
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.169949] 80543fac 00000000 00000004 82f82a68 00000000 800594cc 8037d094 803e0000
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.169949] 00000000 00000000 8037b4a0 82f0f8d4 00000000 800573d0 80546d42 00000072
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.169949] 803e5e50 801bdc00 00000000 00000000 00000000 00000000 00000000 00000000
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.169949] 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.169949] ...
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.206460] Call Trace:
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.208989] [<80024f84>] show_stack+0×54/0×88 Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.213559] [<80032f00>] warn_slowpath_common+0xa0/0xd0
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.218963] [<80032fb8>] warn_slowpath_null+0×18/0×24 Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.224427] [<82c262e4>] ieee80211_rx_napi+0×240/0x97c [mac80211]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.230982] [<832c7260>] ath_rx_tasklet+0xc24/0xc88 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.236793] [<832c733c>] ath_stoprecv+0×78/0xf34 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.242310] [<832c3230>] ath9k_deinit_device+0x6d0/0×944 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.248546] [<832c503c>] ath9k_calculate_summary_state+0×500/0×600 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.255694]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.257173] —[ end trace 0902623f520cb0cd ]— Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.263788] ————[ cut here ]———— Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.268875] WARNING: CPU: 0 PID: 1399 at backports-2017-10-06/net/mac80211/rx.c:629 ieee80211_rx_napi+0×240/0x97c [mac80211]()
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.280640] Modules linked in: ath9k ath9k_htc ath9k_common pppoe ppp_async option cdc_mbim ath9k_hw ath usb_wwan rndis_host qmi_wwan pppox ppp_generic nf_conntrack_ipv6 mac80211 iptable_nat ipt_REJECT ipt_MASQUERADE huawei_cdc_ncm cfg80211 cdc_subset cdc_ncm cdc_ether cdc_eem xt_time xt_tcpudp xt_tcpmss xt_statistic xt_state xt_recent xt_nat xt_multiport xt_mark xt_mac xt_limit xt_length xt_hl xt_helper xt_ecn xt_dscp xt_conntrack xt_connmark xt_connlimit xt_cTue Oct 24 13:08:04 2017 kern.warn kernel: [19934.423875] CPU: 0 PID: 1399 Comm: wpa_supplicant Tainted: G W 4.4.93 #0
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.431969] Stack : 80546d42 00000049 00000000 803f0000 82f116a4 803e6da3 80372ae0 00000577
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.431969] 80543fac 00000000 00000004 82f85598 00000000 800594cc 8037d094 803e0000
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.431969] 00000000 00000000 8037b4a0 82f0f8d4 00000000 800573d0 80546d42 00000072
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.431969] 803e5e50 801bdc00 00000000 00000000 00000000 00000000 00000000 00000000
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.431969] 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.431969] ...
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.468470] Call Trace:
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.471043] [<80024f84>] show_stack+0×54/0×88 Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.475571] [<80032f00>] warn_slowpath_common+0xa0/0xd0
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.480985] [<80032fb8>] warn_slowpath_null+0×18/0×24 Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.486443] [<82c262e4>] ieee80211_rx_napi+0×240/0x97c [mac80211]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.492998] [<832c7260>] ath_rx_tasklet+0xc24/0xc88 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.498812] [<832c733c>] ath_stoprecv+0×78/0xf34 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.504334] [<832c3230>] ath9k_deinit_device+0x6d0/0×944 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.510574] [<832c503c>] ath9k_calculate_summary_state+0×500/0×600 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.517723]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.519198] —[ end trace 0902623f520cb0ce ]— Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.524808] ————[ cut here ]———— Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.529872] WARNING: CPU: 0 PID: 1399 at backports-2017-10-06/net/mac80211/rx.c:629 ieee80211_rx_napi+0×240/0x97c [mac80211]()
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.541651] Modules linked in: ath9k ath9k_htc ath9k_common pppoe ppp_async option cdc_mbim ath9k_hw ath usb_wwan rndis_host qmi_wwan pppox ppp_generic nf_conntrack_ipv6 mac80211 iptable_nat ipt_REJECT ipt_MASQUERADE huawei_cdc_ncm cfg80211 cdc_subset cdc_ncm cdc_ether cdc_eem xt_time xt_tcpudp xt_tcpmss xt_statistic xt_state xt_recent xt_nat xt_multiport xt_mark xt_mac xt_limit xt_length xt_hl xt_helper xt_ecn xt_dscp xt_conntrack xt_connmark xt_connlimit xt_cTue Oct 24 13:08:04 2017 kern.warn kernel: [19934.684889] CPU: 0 PID: 1399 Comm: wpa_supplicant Tainted: G W 4.4.93 #0
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.692972] Stack : 80546d42 00000049 00000000 803f0000 82f116a4 803e6da3 80372ae0 00000577
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.692972] 80543fac 00000000 00000004 832f2f38 00000000 800594cc 8037d094 803e0000
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.692972] 00000000 00000000 8037b4a0 82f0f8d4 00000000 800573d0 80546d42 00000072
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.692972] 803e5e50 801bdc00 00000000 00000000 00000000 00000000 00000000 00000000
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.692972] 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.692972] ...
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.729518] Call Trace:
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.732012] [<80024f84>] show_stack+0×54/0×88 Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.736580] [<80032f00>] warn_slowpath_common+0xa0/0xd0
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.741986] [<80032fb8>] warn_slowpath_null+0×18/0×24 Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.747459] [<82c262e4>] ieee80211_rx_napi+0×240/0x97c [mac80211]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.754014] [<832c7260>] ath_rx_tasklet+0xc24/0xc88 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.759824] [<832c733c>] ath_stoprecv+0×78/0xf34 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.765340] [<832c3230>] ath9k_deinit_device+0x6d0/0×944 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.771598] [<832c503c>] ath9k_calculate_summary_state+0×500/0×600 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.778745]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.780221] —[ end trace 0902623f520cb0cf ]— Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.785086] ————[ cut here ]———— Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.790094] WARNING: CPU: 0 PID: 1399 at backports-2017-10-06/net/mac80211/rx.c:629 ieee80211_rx_napi+0×240/0x97c [mac80211]()
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.801851] Modules linked in: ath9k ath9k_htc ath9k_common pppoe ppp_async option cdc_mbim ath9k_hw ath usb_wwan rndis_host qmi_wwan pppox ppp_generic nf_conntrack_ipv6 mac80211 iptable_nat ipt_REJECT ipt_MASQUERADE huawei_cdc_ncm cfg80211 cdc_subset cdc_ncm cdc_ether cdc_eem xt_time xt_tcpudp xt_tcpmss xt_statistic xt_state xt_recent xt_nat xt_multiport xt_mark xt_mac xt_limit xt_length xt_hl xt_helper xt_ecn xt_dscp xt_conntrack xt_connmark xt_connlimit xt_cTue Oct 24 13:08:04 2017 kern.warn kernel: [19934.945087] CPU: 0 PID: 1399 Comm: wpa_supplicant Tainted: G W 4.4.93 #0
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.953182] Stack : 80546d42 00000049 00000000 803f0000 82f116a4 803e6da3 80372ae0 00000577
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.953182] 80543fac 00000000 00000004 82face88 00000000 800594cc 8037d094 803e0000
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.953182] 00000000 00000000 8037b4a0 82f0f8d4 00000000 800573d0 80546d42 00000072
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.953182] 803e5e50 801bdc00 00000000 00000000 00000000 00000000 00000000 00000000
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.953182] 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.953182] ...
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.989682] Call Trace:
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.992210] [<80024f84>] show_stack+0×54/0×88 Tue Oct 24 13:08:04 2017 kern.warn kernel: [19934.996777] [<80032f00>] warn_slowpath_common+0xa0/0xd0
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.002184] [<80032fb8>] warn_slowpath_null+0×18/0×24 Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.007645] [<82c262e4>] ieee80211_rx_napi+0×240/0x97c [mac80211]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.014194] [<832c7260>] ath_rx_tasklet+0xc24/0xc88 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.020006] [<832c733c>] ath_stoprecv+0×78/0xf34 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.025529] [<832c3230>] ath9k_deinit_device+0x6d0/0×944 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.031769] [<832c503c>] ath9k_calculate_summary_state+0×500/0×600 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.038926]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.040402] —[ end trace 0902623f520cb0d0 ]— Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.045585] ————[ cut here ]———— Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.050620] WARNING: CPU: 0 PID: 1399 at backports-2017-10-06/net/mac80211/rx.c:629 ieee80211_rx_napi+0×240/0x97c [mac80211]()
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.062398] Modules linked in: ath9k ath9k_htc ath9k_common pppoe ppp_async option cdc_mbim ath9k_hw ath usb_wwan rndis_host qmi_wwan pppox ppp_generic nf_conntrack_ipv6 mac80211 iptable_nat ipt_REJECT ipt_MASQUERADE huawei_cdc_ncm cfg80211 cdc_subset cdc_ncm cdc_ether cdc_eem xt_time xt_tcpudp xt_tcpmss xt_statistic xt_state xt_recent xt_nat xt_multiport xt_mark xt_mac xt_limit xt_length xt_hl xt_helper xt_ecn xt_dscp xt_conntrack xt_connmark xt_connlimit xt_cTue Oct 24 13:08:04 2017 kern.warn kernel: [19935.205636] CPU: 0 PID: 1399 Comm: wpa_supplicant Tainted: G W 4.4.93 #0
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.213720] Stack : 80546d42 00000049 00000000 803f0000 82f116a4 803e6da3 80372ae0 00000577
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.213720] 80543fac 00000000 00000004 82facbc8 00000000 800594cc 8037d094 803e0000
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.213720] 00000000 00000000 8037b4a0 82f0f8d4 00000000 800573d0 80546d42 00000072
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.213720] 803e5e50 801bdc00 00000000 00000000 00000000 00000000 00000000 00000000
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.213720] 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.213720] ...
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.250228] Call Trace:
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.252758] [<80024f84>] show_stack+0×54/0×88 Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.257326] [<80032f00>] warn_slowpath_common+0xa0/0xd0
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.262734] [<80032fb8>] warn_slowpath_null+0×18/0×24 Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.268204] [<82c262e4>] ieee80211_rx_napi+0×240/0x97c [mac80211]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.274764] [<832c7260>] ath_rx_tasklet+0xc24/0xc88 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.280582] [<832c733c>] ath_stoprecv+0×78/0xf34 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.286105] [<832c3230>] ath9k_deinit_device+0x6d0/0×944 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.292342] [<832c503c>] ath9k_calculate_summary_state+0×500/0×600 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.299491]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.300968] —[ end trace 0902623f520cb0d1 ]— Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.306459] ————[ cut here ]———— Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.311521] WARNING: CPU: 0 PID: 1399 at backports-2017-10-06/net/mac80211/rx.c:629 ieee80211_rx_napi+0×240/0x97c [mac80211]()
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.323280] Modules linked in: ath9k ath9k_htc ath9k_common pppoe ppp_async option cdc_mbim ath9k_hw ath usb_wwan rndis_host qmi_wwan pppox ppp_generic nf_conntrack_ipv6 mac80211 iptable_nat ipt_REJECT ipt_MASQUERADE huawei_cdc_ncm cfg80211 cdc_subset cdc_ncm cdc_ether cdc_eem xt_time xt_tcpudp xt_tcpmss xt_statistic xt_state xt_recent xt_nat xt_multiport xt_mark xt_mac xt_limit xt_length xt_hl xt_helper xt_ecn xt_dscp xt_conntrack xt_connmark xt_connlimit xt_cTue Oct 24 13:08:04 2017 kern.warn kernel: [19935.466515] CPU: 0 PID: 1399 Comm: wpa_supplicant Tainted: G W 4.4.93 #0
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.474607] Stack : 80546d42 00000049 00000000 803f0000 82f116a4 803e6da3 80372ae0 00000577
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.474607] 80543fac 00000000 00000004 82e5fc78 00000000 800594cc 8037d094 803e0000
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.474607] 00000000 00000000 8037b4a0 82f0f8d4 00000000 800573d0 80546d42 00000072
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.474607] 803e5e50 801bdc00 00000000 00000000 00000000 00000000 00000000 00000000
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.474607] 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.474607] ...
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.511109] Call Trace:
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.513687] [<80024f84>] show_stack+0×54/0×88 Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.518223] [<80032f00>] warn_slowpath_common+0xa0/0xd0
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.523627] [<80032fb8>] warn_slowpath_null+0×18/0×24 Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.529085] [<82c262e4>] ieee80211_rx_napi+0×240/0x97c [mac80211]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.535639] [<832c7260>] ath_rx_tasklet+0xc24/0xc88 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.541450] [<832c733c>] ath_stoprecv+0×78/0xf34 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.546964] [<832c3230>] ath9k_deinit_device+0x6d0/0×944 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.553203] [<832c503c>] ath9k_calculate_summary_state+0×500/0×600 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.560352]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.561886] —[ end trace 0902623f520cb0d2 ]— Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.566864] ————[ cut here ]———— Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.571907] WARNING: CPU: 0 PID: 1399 at backports-2017-10-06/net/mac80211/rx.c:629 ieee80211_rx_napi+0×240/0x97c [mac80211]()
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.583683] Modules linked in: ath9k ath9k_htc ath9k_common pppoe ppp_async option cdc_mbim ath9k_hw ath usb_wwan rndis_host qmi_wwan pppox ppp_generic nf_conntrack_ipv6 mac80211 iptable_nat ipt_REJECT ipt_MASQUERADE huawei_cdc_ncm cfg80211 cdc_subset cdc_ncm cdc_ether cdc_eem xt_time xt_tcpudp xt_tcpmss xt_statistic xt_state xt_recent xt_nat xt_multiport xt_mark xt_mac xt_limit xt_length xt_hl xt_helper xt_ecn xt_dscp xt_conntrack xt_connmark xt_connlimit xt_cTue Oct 24 13:08:04 2017 kern.warn kernel: [19935.726919] CPU: 0 PID: 1399 Comm: wpa_supplicant Tainted: G W 4.4.93 #0
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.735002] Stack : 80546d42 00000049 00000000 803f0000 82f116a4 803e6da3 80372ae0 00000577
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.735002] 80543fac 00000000 00000004 81cb0438 00000000 800594cc 8037d094 803e0000
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.735002] 00000000 00000000 8037b4a0 82f0f8d4 00000000 800573d0 80546d42 00000072
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.735002] 803e5e50 801bdc00 00000000 00000000 00000000 00000000 00000000 00000000
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.735002] 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.735002] ...
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.771513] Call Trace:
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.774086] [<80024f84>] show_stack+0×54/0×88 Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.778616] [<80032f00>] warn_slowpath_common+0xa0/0xd0
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.784025] [<80032fb8>] warn_slowpath_null+0×18/0×24 Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.789498] [<82c262e4>] ieee80211_rx_napi+0×240/0x97c [mac80211]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.796088] [<832c7260>] ath_rx_tasklet+0xc24/0xc88 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.801901] [<832c733c>] ath_stoprecv+0×78/0xf34 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.807424] [<832c3230>] ath9k_deinit_device+0x6d0/0×944 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.813664] [<832c503c>] ath9k_calculate_summary_state+0×500/0×600 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.820820]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.822353] —[ end trace 0902623f520cb0d3 ]— Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.827454] ————[ cut here ]———— Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.832505] WARNING: CPU: 0 PID: 1399 at backports-2017-10-06/net/mac80211/rx.c:629 ieee80211_rx_napi+0×240/0x97c [mac80211]()
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.844268] Modules linked in: ath9k ath9k_htc ath9k_common pppoe ppp_async option cdc_mbim ath9k_hw ath usb_wwan rndis_host qmi_wwan pppox ppp_generic nf_conntrack_ipv6 mac80211 iptable_nat ipt_REJECT ipt_MASQUERADE huawei_cdc_ncm cfg80211 cdc_subset cdc_ncm cdc_ether cdc_eem xt_time xt_tcpudp xt_tcpmss xt_statistic xt_state xt_recent xt_nat xt_multiport xt_mark xt_mac xt_limit xt_length xt_hl xt_helper xt_ecn xt_dscp xt_conntrack xt_connmark xt_connlimit xt_cTue Oct 24 13:08:04 2017 kern.warn kernel: [19935.987502] CPU: 0 PID: 1399 Comm: wpa_supplicant Tainted: G W 4.4.93 #0
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.995596] Stack : 80546d42 00000049 00000000 803f0000 82f116a4 803e6da3 80372ae0 00000577
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.995596] 80543fac 00000000 00000004 82ea0388 00000000 800594cc 8037d094 803e0000
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.995596] 00000000 00000000 8037b4a0 82f0f8d4 00000000 800573d0 80546d42 00000072
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.995596] 803e5e50 801bdc00 00000000 00000000 00000000 00000000 00000000 00000000
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.995596] 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19935.995596] ...
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.032096] Call Trace:
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.034672] [<80024f84>] show_stack+0×54/0×88 Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.039202] [<80032f00>] warn_slowpath_common+0xa0/0xd0
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.044605] [<80032fb8>] warn_slowpath_null+0×18/0×24 Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.050060] [<82c262e4>] ieee80211_rx_napi+0×240/0x97c [mac80211]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.056609] [<832c7260>] ath_rx_tasklet+0xc24/0xc88 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.062421] [<832c733c>] ath_stoprecv+0×78/0xf34 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.067946] [<832c3230>] ath9k_deinit_device+0x6d0/0×944 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.074183] [<832c503c>] ath9k_calculate_summary_state+0×500/0×600 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.081379]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.082854] —[ end trace 0902623f520cb0d4 ]— Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.088001] ————[ cut here ]———— Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.093055] WARNING: CPU: 0 PID: 1399 at backports-2017-10-06/net/mac80211/rx.c:629 ieee80211_rx_napi+0×240/0x97c [mac80211]()
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.104833] Modules linked in: ath9k ath9k_htc ath9k_common pppoe ppp_async option cdc_mbim ath9k_hw ath usb_wwan rndis_host qmi_wwan pppox ppp_generic nf_conntrack_ipv6 mac80211 iptable_nat ipt_REJECT ipt_MASQUERADE huawei_cdc_ncm cfg80211 cdc_subset cdc_ncm cdc_ether cdc_eem xt_time xt_tcpudp xt_tcpmss xt_statistic xt_state xt_recent xt_nat xt_multiport xt_mark xt_mac xt_limit xt_length xt_hl xt_helper xt_ecn xt_dscp xt_conntrack xt_connmark xt_connlimit xt_cTue Oct 24 13:08:04 2017 kern.warn kernel: [19936.248068] CPU: 0 PID: 1399 Comm: wpa_supplicant Tainted: G W 4.4.93 #0
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.256152] Stack : 80546d42 00000049 00000000 803f0000 82f116a4 803e6da3 80372ae0 00000577
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.256152] 80543fac 00000000 00000004 81f19178 00000000 800594cc 8037d094 803e0000
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.256152] 00000000 00000000 8037b4a0 82f0f8d4 00000000 800573d0 80546d42 00000072
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.256152] 803e5e50 801bdc00 00000000 00000000 00000000 00000000 00000000 00000000
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.256152] 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.256152] ...
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.292662] Call Trace:
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.295236] [<80024f84>] show_stack+0×54/0×88 Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.299769] [<80032f00>] warn_slowpath_common+0xa0/0xd0
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.305173] [<80032fb8>] warn_slowpath_null+0×18/0×24 Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.310640] [<82c262e4>] ieee80211_rx_napi+0×240/0x97c [mac80211]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.317193] [<832c7260>] ath_rx_tasklet+0xc24/0xc88 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.323006] [<832c733c>] ath_stoprecv+0×78/0xf34 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.328528] [<832c3230>] ath9k_deinit_device+0x6d0/0×944 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.334767] [<832c503c>] ath9k_calculate_summary_state+0×500/0×600 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.341917]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.343392] —[ end trace 0902623f520cb0d5 ]— Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.348255] ————[ cut here ]———— Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.353264] WARNING: CPU: 0 PID: 1399 at backports-2017-10-06/net/mac80211/rx.c:629 ieee80211_rx_napi+0×240/0x97c [mac80211]()
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.365024] Modules linked in: ath9k ath9k_htc ath9k_common pppoe ppp_async option cdc_mbim ath9k_hw ath usb_wwan rndis_host qmi_wwan pppox ppp_generic nf_conntrack_ipv6 mac80211 iptable_nat ipt_REJECT ipt_MASQUERADE huawei_cdc_ncm cfg80211 cdc_subset cdc_ncm cdc_ether cdc_eem xt_time xt_tcpudp xt_tcpmss xt_statistic xt_state xt_recent xt_nat xt_multiport xt_mark xt_mac xt_limit xt_length xt_hl xt_helper xt_ecn xt_dscp xt_conntrack xt_connmark xt_connlimit xt_cTue Oct 24 13:08:04 2017 kern.warn kernel: [19936.508257] CPU: 0 PID: 1399 Comm: wpa_supplicant Tainted: G W 4.4.93 #0
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.516351] Stack : 80546d42 00000049 00000000 803f0000 82f116a4 803e6da3 80372ae0 00000577
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.516351] 80543fac 00000000 00000004 81f19388 00000000 800594cc 8037d094 803e0000
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.516351] 00000000 00000000 8037b4a0 82f0f8d4 00000000 800573d0 80546d42 00000072
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.516351] 803e5e50 801bdc00 00000000 00000000 00000000 00000000 00000000 00000000
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.516351] 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.516351] ...
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.552851] Call Trace:
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.555426] [<80024f84>] show_stack+0×54/0×88 Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.559954] [<80032f00>] warn_slowpath_common+0xa0/0xd0
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.565385] [<80032fb8>] warn_slowpath_null+0×18/0×24 Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.570846] [<82c262e4>] ieee80211_rx_napi+0×240/0x97c [mac80211]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.577439] [<832c7260>] ath_rx_tasklet+0xc24/0xc88 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.583234] [<832c733c>] ath_stoprecv+0×78/0xf34 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.588753] [<832c3230>] ath9k_deinit_device+0x6d0/0×944 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.594994] [<832c503c>] ath9k_calculate_summary_state+0×500/0×600 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.602141]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.603617] —[ end trace 0902623f520cb0d6 ]— Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.608659] ————[ cut here ]———— Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.613702] WARNING: CPU: 0 PID: 1399 at backports-2017-10-06/net/mac80211/rx.c:629 ieee80211_rx_napi+0×240/0x97c [mac80211]()
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.625478] Modules linked in: ath9k ath9k_htc ath9k_common pppoe ppp_async option cdc_mbim ath9k_hw ath usb_wwan rndis_host qmi_wwan pppox ppp_generic nf_conntrack_ipv6 mac80211 iptable_nat ipt_REJECT ipt_MASQUERADE huawei_cdc_ncm cfg80211 cdc_subset cdc_ncm cdc_ether cdc_eem xt_time xt_tcpudp xt_tcpmss xt_statistic xt_state xt_recent xt_nat xt_multiport xt_mark xt_mac xt_limit xt_length xt_hl xt_helper xt_ecn xt_dscp xt_conntrack xt_connmark xt_connlimit xt_cTue Oct 24 13:08:04 2017 kern.warn kernel: [19936.768715] CPU: 0 PID: 1399 Comm: wpa_supplicant Tainted: G W 4.4.93 #0
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.776800] Stack : 80546d42 00000049 00000000 803f0000 82f116a4 803e6da3 80372ae0 00000577
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.776800] 80543fac 00000000 00000004 82ea09b8 00000000 800594cc 8037d094 803e0000
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.776800] 00000000 00000000 8037b4a0 82f0f8d4 00000000 800573d0 80546d42 00000072
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.776800] 803e5e50 801bdc00 00000000 00000000 00000000 00000000 00000000 00000000
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.776800] 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.776800] ...
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.813310] Call Trace:
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.815844] [<80024f84>] show_stack+0×54/0×88 Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.820406] [<80032f00>] warn_slowpath_common+0xa0/0xd0
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.825814] [<80032fb8>] warn_slowpath_null+0×18/0×24 Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.831286] [<82c262e4>] ieee80211_rx_napi+0×240/0x97c [mac80211]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.837839] [<832c7260>] ath_rx_tasklet+0xc24/0xc88 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.843652] [<832c733c>] ath_stoprecv+0×78/0xf34 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.849166] [<832c3230>] ath9k_deinit_device+0x6d0/0×944 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.855406] [<832c503c>] ath9k_calculate_summary_state+0×500/0×600 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.862554]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.864030] —[ end trace 0902623f520cb0d7 ]— Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.869073] ————[ cut here ]———— Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.874115] WARNING: CPU: 0 PID: 1399 at backports-2017-10-06/net/mac80211/rx.c:629 ieee80211_rx_napi+0×240/0x97c [mac80211]()
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19936.885876] Modules linked in: ath9k ath9k_htc ath9k_common pppoe ppp_async option cdc_mbim ath9k_hw ath usb_wwan rndis_host qmi_wwan pppox ppp_generic nf_conntrack_ipv6 mac80211 iptable_nat ipt_REJECT ipt_MASQUERADE huawei_cdc_ncm cfg80211 cdc_subset cdc_ncm cdc_ether cdc_eem xt_time xt_tcpudp xt_tcpmss xt_statistic xt_state xt_recent xt_nat xt_multiport xt_mark xt_mac xt_limit xt_length xt_hl xt_helper xt_ecn xt_dscp xt_conntrack xt_connmark xt_connlimit xt_cTue Oct 24 13:08:04 2017 kern.warn kernel: [19937.029111] CPU: 0 PID: 1399 Comm: wpa_supplicant Tainted: G W 4.4.93 #0
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19937.037203] Stack : 80546d42 00000049 00000000 803f0000 82f116a4 803e6da3 80372ae0 00000577
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19937.037203] 80543fac 00000000 00000004 81f19908 00000000 800594cc 8037d094 803e0000
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19937.037203] 00000000 00000000 8037b4a0 82f0f8d4 00000000 800573d0 80546d42 00000072
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19937.037203] 803e5e50 801bdc00 00000000 00000000 00000000 00000000 00000000 00000000
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19937.037203] 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19937.037203] ...
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19937.073706] Call Trace:
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19937.076235] [<80024f84>] show_stack+0×54/0×88 Tue Oct 24 13:08:04 2017 kern.warn kernel: [19937.080803] [<80032f00>] warn_slowpath_common+0xa0/0xd0
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19937.086208] [<80032fb8>] warn_slowpath_null+0×18/0×24 Tue Oct 24 13:08:04 2017 kern.warn kernel: [19937.091662] [<82c262e4>] ieee80211_rx_napi+0×240/0x97c [mac80211]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19937.098218] [<832c7260>] ath_rx_tasklet+0xc24/0xc88 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19937.104028] [<832c733c>] ath_stoprecv+0×78/0xf34 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19937.109546] [<832c3230>] ath9k_deinit_device+0x6d0/0×944 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19937.115783] [<832c503c>] ath9k_calculate_summary_state+0×500/0×600 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19937.122932]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19937.124408] —[ end trace 0902623f520cb0d8 ]— Tue Oct 24 13:08:04 2017 kern.warn kernel: [19937.129917] ————[ cut here ]———— Tue Oct 24 13:08:04 2017 kern.warn kernel: [19937.134978] WARNING: CPU: 0 PID: 1399 at backports-2017-10-06/net/mac80211/rx.c:629 ieee80211_rx_napi+0×240/0x97c [mac80211]()
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19937.146753] Modules linked in: ath9k ath9k_htc ath9k_common pppoe ppp_async option cdc_mbim ath9k_hw ath usb_wwan rndis_host qmi_wwan pppox ppp_generic nf_conntrack_ipv6 mac80211 iptable_nat ipt_REJECT ipt_MASQUERADE huawei_cdc_ncm cfg80211 cdc_subset cdc_ncm cdc_ether cdc_eem xt_time xt_tcpudp xt_tcpmss xt_statistic xt_state xt_recent xt_nat xt_multiport xt_mark xt_mac xt_limit xt_length xt_hl xt_helper xt_ecn xt_dscp xt_conntrack xt_connmark xt_connlimit xt_cTue Oct 24 13:08:04 2017 kern.warn kernel: [19937.289992] CPU: 0 PID: 1399 Comm: wpa_supplicant Tainted: G W 4.4.93 #0
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19937.298075] Stack : 80546d42 00000049 00000000 803f0000 82f116a4 803e6da3 80372ae0 00000577
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19937.298075] 80543fac 00000000 00000004 82e2f858 00000000 800594cc 8037d094 803e0000
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19937.298075] 00000000 00000000 8037b4a0 82f0f8d4 00000000 800573d0 80546d42 00000072
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19937.298075] 803e5e50 801bdc00 00000000 00000000 00000000 00000000 00000000 00000000
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19937.298075] 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19937.298075] ...
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19937.334586] Call Trace:
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19937.337114] [<80024f84>] show_stack+0×54/0×88 Tue Oct 24 13:08:04 2017 kern.warn kernel: [19937.341682] [<80032f00>] warn_slowpath_common+0xa0/0xd0
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19937.347086] [<80032fb8>] warn_slowpath_null+0×18/0×24 Tue Oct 24 13:08:04 2017 kern.warn kernel: [19937.352552] [<82c262e4>] ieee80211_rx_napi+0×240/0x97c [mac80211]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19937.359107] [<832c7260>] ath_rx_tasklet+0xc24/0xc88 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19937.364916] [<832c733c>] ath_stoprecv+0×78/0xf34 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19937.370434] [<832c3230>] ath9k_deinit_device+0x6d0/0×944 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19937.376670] [<832c503c>] ath9k_calculate_summary_state+0×500/0×600 [ath9k]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19937.383819]
Tue Oct 24 13:08:04 2017 kern.warn kernel: [19937.385297] —[ end trace 0902623f520cb0d9 ]— Tue Oct 24 13:08:04 2017 daemon.info odhcpd[914]: Using a RA lifetime of 0 seconds on br-lan
Tue Oct 24 13:08:04 2017 daemon.notice hostapd: nl80211: nl80211_recv_beacons→nl_recvmsgs failed: -5
Tue Oct 24 13:10:24 2017 daemon.info hostapd: wlan0-1: STA f0:25:b7:b2:fe:ea IEEE 802.11: authenticated
Tue Oct 24 13:10:24 2017 daemon.info hostapd: wlan0-1: STA f0:25:b7:b2:fe:ea IEEE 802.11: associated (aid 1)
Tue Oct 24 13:10:24 2017 daemon.notice hostapd: wlan0-1: AP-STA-CONNECTED f0:25:b7:b2:fe:ea
Tue Oct 24 13:10:24 2017 daemon.info hostapd: wlan0-1: STA f0:25:b7:b2:fe:ea RADIUS: starting accounting session 747735F6C298AD3B
Tue Oct 24 13:10:24 2017 daemon.info hostapd: wlan0-1: STA f0:25:b7:b2:fe:ea WPA: pairwise key handshake completed (RSN)
Tue Oct 24 13:10:24 2017 daemon.info dnsmasq-dhcp[2988]: DHCPDISCOVER(br-lan) f0:25:b7:b2:fe:ea

 


18.11.20214141KernelBug ReportVery LowLowWifi unstable Kernel warning in mac80211/rate.copenwrt-21.02Unconfirmed Task Description

Wifi unstable Kernel warning in mac80211/rate.c

Is this related to https://patchwork.kernel.org/project/linux-wireless/patch/20180117101405.16700-1-nbd@nbd.name/

Name the tree/revision/version = 21.02.1 and 21.02.2
Name the affected device = WDR4900 4 units all the same
What does it do that it should not do / what does it not do that it should do = Wifi becomes unstable fails and restarts with error shown
Steps to reproduce = leave it on for a couple of days
What you have already done to workaround/fix the problem = Revert to v19

————[ cut here ]———— [723741.978905] WARNING: CPU: 0 PID: 0 at backports-5.10.68-1/net/mac80211/rate.c:677 0xc9636ea0 [mac80211@880b69f1+0xa2660]
[723741.989848] Modules linked in: tun ath9k ath9k_common xt_connlimit pppoe ppp_async nf_conncount iptable_nat ath9k_hw ath xt_state xt_nat xt_helper xt_conntrack xt_connmark xt_connbytes xt_REDIRECT xt_MASQUERADE xt_FLOWOFFLOAD xt_CT wireguard pppox ppp_generic nf_nat nf_flow_table_hw nf_flow_table nf_conntrack_netlink nf_conntrack mac80211 libchacha20poly1305 libblake2s ipt_REJECT cfg80211 xt_time xt_tcpudp xt_tcpmss xt_statistic xt_recent xt_multiport xt_mark xt_mac xt_limit xt_length xt_hl xt_ecn xt_dscp xt_comment xt_TCPMSS xt_LOG xt_HL xt_DSCP xt_CLASSIFY slhc sch_cake nf_reject_ipv4 nf_log_ipv4 nf_defrag_ipv6 nf_defrag_ipv4 libpoly1305 libcurve25519_generic libchacha libblake2s_generic iptable_raw iptable_mangle iptable_filter ipt_ECN ip_tables crc_ccitt compat sch_tbf sch_ingress sch_htb sch_hfsc em_u32 cls_u32 cls_tcindex cls_route cls_matchall cls_fw cls_flow cls_basic act_skbedit act_mirred act_gact xt_set ip_set_list_set ip_set_hash_netportnet ip_set_hash_netport
[723741.989980] ip_set_hash_netnet ip_set_hash_netiface ip_set_hash_net ip_set_hash_mac ip_set_hash_ipportnet ip_set_hash_ipportip ip_set_hash_ipport ip_set_hash_ipmark ip_set_hash_ip ip_set_bitmap_port ip_set_bitmap_ipmac ip_set_bitmap_ip ip_set nfnetlink nf_log_ipv6 nf_log_common ip6table_mangle ip6table_filter ip6_tables ip6t_REJECT x_tables nf_reject_ipv6 ifb ip6_udp_tunnel udp_tunnel kpp gpio_keys leds_gpio fsl_mph_dr_of ehci_platform ehci_fsl ehci_hcd button_hotplug input_core usbcore usb_common
[723742.120347] CPU: 0 PID: 0 Comm: swapper Not tainted 5.4.154 #0
[723742.126256] NIP: c9636ea0 LR: c9594104 CTR: c006d108
[723742.131385] REGS: c7ff5ca8 TRAP: 0700 Not tainted (5.4.154)
[723742.137292] MSR: 00029000 <CE,EE,ME> CR: 48048882 XER: 00000000
[723742.143555]
[723742.143555] GPR00: 00000000 c7ff5d60 c068ba40 00000100 ffffffff 000000c7 00000001 00000001
[723742.143555] GPR08: 0000000a c448ae58 000007c6 c47583e0 88044482 00000000 c068fcac c0690000
[723742.143555] GPR16: 00200002 00000000 c06b0000 c05b1b04 00000009 00000000 fffff000 00000001
[723742.143555] GPR24: c3914cf8 00000000 c4480130 c4a3b708 c3914cf8 00000004 c448ae58 c47583c0
[723742.178843] Call Trace:
[723742.181368] [c7ff5d60] [c7ff5d64] 0xc7ff5d64 (unreliable)
[723742.186847] [c7ff5dd0] [c95940c4] 0xc95940c4 [ath9k@814d09d6+0x1f4f8]
[723742.193368] [c7ff5e10] [c958b980] 0xc958b980 [ath9k@814d09d6+0x1f4f8]
[723742.199890] [c7ff5e50] [c96498fc] 0xc96498fc [mac80211@880b69f1+0xa2660]
[723742.206671] [c7ff5e90] [c9649ae0] 0xc9649ae0 [mac80211@880b69f1+0xa2660]
[723742.213453] [c7ff5eb0] [c96518e4] 0xc96518e4 [mac80211@880b69f1+0xa2660]
[723742.220235] [c7ff5f10] [c96535bc] 0xc96535bc [mac80211@880b69f1+0xa2660]
[723742.227013] [c7ff5f60] [c002e6e0] 0xc002e6e0
[723742.231361] [c7ff5f90] [c05a9d3c] 0xc05a9d3c
[723742.235709] [c7ff5ff0] [c000d294] 0xc000d294
[723742.240058] [c06afe88] [c00057b8] 0xc00057b8
[723742.244405] [c06afea8] [c000f4ac] 0xc000f4ac
[723742.248754] — interrupt: 501 at 0xc00084e8
[723742.248754] LR = 0xc00084e8
[723742.256312] [c06aff70] [c0054c00] 0xc0054c00 (unreliable)
[723742.261790] [c06aff80] [c0052c6c] 0xc0052c6c
[723742.266138] [c06affa0] [c0052de4] 0xc0052de4
[723742.270485] [c06affb0] [c0660ae4] 0xc0660ae4
[723742.274833] [c06afff0] [c000038c] 0xc000038c
[723742.279178] Instruction dump:
[723742.282227] 40820010 891f002d 71080040 40820054 7f9d3800 40bdfe44 39290003 4bfffde4
[723742.290061] 54c6073e 2b86000a 38c00001 7cc0371e <0f060000> 7f9d3800 40bdfe20 39290003
[723742.298068] —[ end trace 2b9045ebeb5ab14c ]—

 


29.04.20213760Base systemBug ReportVery LowCriticalWifi to WAN traffic causes eth0 to crash with a NETDEV ...openwrt-21.02Unconfirmed Task Description

I have been testing OpenWRT 21.02-RC1 stock released firmware image on the Newifi-D2 target (MT7621 based).

Sporadically while using the router, i experience the WAN interface crashing with NETDEV WATCHDOG errors.

I am using the released image for OpenWrt 21.02-rc1 for the Newifi-D2 target
I have also experienced this fault with a custom router build based on MT7621 for a different target, the fault appears general to MT7621 not this target.

I have loaded 19.07.7 stock firmware on this same hardware and the fault does not occur in that firmware version. A colleague has replicated this fault in 21.02-RC1 with the same type of target (physically different unit), but in a different environment with no shared network resources.

Other than setting up the wifi ssid and password and enabling the 5ghz radio, the network settings are stock.

I have worked out a 90% reliable test case to reproduce the fault:

Have a client device connected to the router on WiFi 5ghz
And a local Iperf3 server running on the wan side of the wired interface.

On the server run:

iperf3 -s

Note the servers IP address

On the client run:

iperf3 -c <serverIP> -P 50

Notes:
Iperf3 server needs to be local on a 1gbps wired link. With an internet based Iperf3 server (or one with a slower connection) the error is much harder to trigger, it will happen but its much more random.
The number of connections does not need to be 50, however, the lower the number of connections the less reliable the error triggers.
The WiFi client should be getting about 300-400mbps throughput over the wifi link when its working correctly.

On most runs, the iperf3 performance will drop to 0mbps, logread on the router then reveals:

Thu Apr 29 03:58:44 2021 kern.warn kernel: [  578.065748] ------------[ cut here ]------------
Thu Apr 29 03:58:44 2021 kern.warn kernel: [  578.070403] WARNING: CPU: 1 PID: 0 at net/sched/sch_generic.c:448 0x8047e780
Thu Apr 29 03:58:44 2021 kern.info kernel: [  578.077443] NETDEV WATCHDOG: eth0 (mtk_soc_eth): transmit queue 0 timed out
Thu Apr 29 03:58:44 2021 kern.warn kernel: [  578.084412] Modules linked in: pppoe ppp_async iptable_nat xt_state xt_nat xt_conntrack xt_REDIRECT xt_MASQUERADE xt_FLOWOFFLOAD xt_CT pppox ppp_generic nf_nat nf_flow_table_hw nf_flow_table nf_conntrack_rtcache nf_conntrack mt76x2e mt76x2_common mt76x02_lib mt7603e mt76 mac80211 ipt_REJECT cfg80211 xt_time xt_tcpudp xt_multiport xt_mark xt_mac xt_limit xt_comment xt_TCPMSS xt_LOG slhc nf_reject_ipv4 nf_log_ipv4 nf_defrag_ipv6 nf_defrag_ipv4 iptable_mangle iptable_filter ip_tables crc_ccitt compat ledtrig_usbport nf_log_ipv6 nf_log_common ip6table_mangle ip6table_filter ip6_tables ip6t_REJECT x_tables nf_reject_ipv6 leds_gpio xhci_plat_hcd xhci_pci xhci_mtk xhci_hcd gpio_button_hotplug usbcore nls_base usb_common
Thu Apr 29 03:58:44 2021 kern.warn kernel: [  578.147503] CPU: 1 PID: 0 Comm: swapper/1 Not tainted 5.4.111 #0
Thu Apr 29 03:58:44 2021 kern.warn kernel: [  578.153490] Stack : 00000000 80840000 ffffffff 8007d6e0 00000000 00000000 00000000 00000000
Thu Apr 29 03:58:44 2021 kern.warn kernel: [  578.161831]         00000000 00000000 00000000 00000000 00000000 00000001 8fc0fd50 8ba64c1c
Thu Apr 29 03:58:44 2021 kern.warn kernel: [  578.170163]         8fc0fde8 00000000 00000000 00000000 00000038 805e1804 342e3520 3131312e
Thu Apr 29 03:58:44 2021 kern.warn kernel: [  578.178486]         00000000 0000001c 00000000 0002402f 00000000 8fc0fd30 00000000 8047e780
Thu Apr 29 03:58:44 2021 kern.warn kernel: [  578.186808]         00000009 00000001 00200000 00000122 00000003 80359e2c 00000004 80810004
Thu Apr 29 03:58:44 2021 kern.warn kernel: [  578.195132]         ...
Thu Apr 29 03:58:44 2021 kern.warn kernel: [  578.197567] Call Trace:
Thu Apr 29 03:58:44 2021 kern.warn kernel: [  578.197583] [<8007d6e0>] 0x8007d6e0
Thu Apr 29 03:58:44 2021 kern.warn kernel: [  578.203512] [<805e1804>] 0x805e1804
Thu Apr 29 03:58:44 2021 kern.warn kernel: [  578.206990] [<8047e780>] 0x8047e780
Thu Apr 29 03:58:44 2021 kern.warn kernel: [  578.210464] [<80359e2c>] 0x80359e2c
Thu Apr 29 03:58:44 2021 kern.warn kernel: [  578.213941] [<8000b05c>] 0x8000b05c
Thu Apr 29 03:58:44 2021 kern.warn kernel: [  578.217409] [<8000b064>] 0x8000b064
Thu Apr 29 03:58:44 2021 kern.warn kernel: [  578.220879] [<805c6f9c>] 0x805c6f9c
Thu Apr 29 03:58:44 2021 kern.warn kernel: [  578.224351] [<8007d8ac>] 0x8007d8ac
Thu Apr 29 03:58:44 2021 kern.warn kernel: [  578.227829] [<8002bfe8>] 0x8002bfe8
Thu Apr 29 03:58:44 2021 kern.warn kernel: [  578.231302] [<8047e780>] 0x8047e780
Thu Apr 29 03:58:44 2021 kern.warn kernel: [  578.234775] [<8002c0c0>] 0x8002c0c0
Thu Apr 29 03:58:44 2021 kern.warn kernel: [  578.238257] [<8047e780>] 0x8047e780
Thu Apr 29 03:58:44 2021 kern.warn kernel: [  578.241731] [<800a9018>] 0x800a9018
Thu Apr 29 03:58:44 2021 kern.warn kernel: [  578.245212] [<8047e484>] 0x8047e484
Thu Apr 29 03:58:44 2021 kern.warn kernel: [  578.248688] [<800965d4>] 0x800965d4
Thu Apr 29 03:58:44 2021 kern.warn kernel: [  578.252161] [<8009681c>] 0x8009681c
Thu Apr 29 03:58:44 2021 kern.warn kernel: [  578.255640] [<805e7d1c>] 0x805e7d1c
Thu Apr 29 03:58:44 2021 kern.warn kernel: [  578.259116] [<80030768>] 0x80030768
Thu Apr 29 03:58:44 2021 kern.warn kernel: [  578.262588] [<802f8404>] 0x802f8404
Thu Apr 29 03:58:44 2021 kern.warn kernel: [  578.266064] [<80006c28>] 0x80006c28
Thu Apr 29 03:58:44 2021 kern.warn kernel: [  578.269533]
Thu Apr 29 03:58:44 2021 kern.warn kernel: [  578.271153] ---[ end trace eabfb050c5985bce ]---
Thu Apr 29 03:58:44 2021 kern.err kernel: [  578.275799] mtk_soc_eth 1e100000.ethernet eth0: transmit timed out
Thu Apr 29 03:58:44 2021 kern.info kernel: [  578.282602] mtk_soc_eth 1e100000.ethernet eth0: Link is Down
Thu Apr 29 03:58:44 2021 kern.info kernel: [  578.318310] mtk_soc_eth 1e100000.ethernet eth0: configuring for fixed/rgmii link mode
Thu Apr 29 03:58:44 2021 kern.info kernel: [  578.326251] mtk_soc_eth 1e100000.ethernet eth0: Link is Up - 1Gbps/Full - flow control rx/tx

This only occurs on the first instance of the error, the error will repeatedly occur but the only evidence in the logs after the first error is:

Thu Apr 29 04:33:36 2021 kern.err kernel: [ 2670.043971] mtk_soc_eth 1e100000.ethernet eth0: transmit timed out
Thu Apr 29 04:33:36 2021 kern.info kernel: [ 2670.050555] mtk_soc_eth 1e100000.ethernet eth0: Link is Down
Thu Apr 29 04:33:36 2021 kern.info kernel: [ 2670.084619] mtk_soc_eth 1e100000.ethernet eth0: configuring for fixed/rgmii link mode
Thu Apr 29 04:33:36 2021 kern.info kernel: [ 2670.092556] mtk_soc_eth 1e100000.ethernet eth0: Link is Up - 1Gbps/Full - flow control rx/tx
24.07.20213947KernelBug ReportVery LowCriticalWifi STA that loses AP signal takes down the whole rout...openwrt-21.02Unconfirmed Task Description

Initially reported on forum: https://forum.openwrt.org/t/wifi-client-disconnecting-takes-the-whole-wifi-ap-down-on-21-02-snapshot-how-to-debug/102094/8

Device: Asus RT-N56U
Branch: openwrt-21.02, initial report commit 60fad8f (v21.02.0-rc3-74-g60fad8f82b)

Observation: when a wifi client disconnects that appears to see the AP with low signal strength, the whole AP goes down. Verified with airmon/tcpdump that AP beacons stop. Reboot of the router also observed when log_level set to 2 or lower.

Bisecting, commit https://git.openwrt.org/?p=openwrt/openwrt.git;a=commit;h=a078037ace50 (v21.02.0-rc3-35-ga078037ace) seems to be the issue:

    mac80211: improve rate control performance

    Call rate control handler after intermediate queueuing
    Includes follow-up fixes

Test case:

1. Connect to AP
2. Move far away or shield mobile so the AP signal drops significantly as seen by mobile
3. Viewing the wifi networks of the mobile (android), if when signal drops below some threshold:
4.1 AP disappears from list: FAIL [the router also reboots]
4.2 AP moves from “Connected” to “Saved”: PASS

I did not have these issues at all in May 2021 using the dev snapshot. I updated to the July 2021 dev snapshot, observed the issue, then built openwrt-21.02 and still observed the issue.

11.12.20203512Base systemBug ReportVery LowLowwifi sta cannot re-connect if upstream wifi change pass...TrunkUnconfirmed Task Description

mt76x8

first I change password in upstream wifi (ssid=X-WRT_9B84)
and my mt76x8 device lost wifi connection
then I change the password back again
expecting the mt76x8 re-connect to upstream wifi
but not

the mt76x8 logread -f:

Fri Dec 11 19:22:40 2020 kern.info kernel: [92023.412533] wlan0: deauthenticated from xx:xx:xx:e1:9b:86 (Reason: 3=DEAUTH_LEAVING)
Fri Dec 11 19:22:40 2020 daemon.notice netifd: Network device ‘wlan0’ link is down
Fri Dec 11 19:22:40 2020 daemon.notice netifd: Interface ‘wwan’ has link connectivity loss
Fri Dec 11 19:22:40 2020 daemon.notice wpa_supplicant[10521]: wlan0: CTRL-EVENT-DISCONNECTED bssid=xx:xx:xx:e1:9b:86 reason=3
Fri Dec 11 19:22:40 2020 daemon.notice netifd: wwan (11438): udhcpc: received SIGTERM
Fri Dec 11 19:22:40 2020 daemon.notice netifd: wwan (11438): udhcpc: unicasting a release of 192.168.15.145 to 192.168.15.1
Fri Dec 11 19:22:40 2020 daemon.notice netifd: wwan (11438): udhcpc: sending release
Fri Dec 11 19:22:40 2020 daemon.notice netifd: wwan (11438): udhcpc: entering released state
Fri Dec 11 19:22:40 2020 daemon.notice netifd: wwan (11438): Command failed: Permission denied
Fri Dec 11 19:22:40 2020 daemon.notice netifd: Interface ‘wwan’ is now down
Fri Dec 11 19:22:40 2020 daemon.debug dnsmasq[11344]: stopped listening on wlan0(#20): 192.168.15.145 port 53
Fri Dec 11 19:22:40 2020 daemon.notice netifd: Interface ‘wwan’ is disabled
Fri Dec 11 19:22:40 2020 daemon.notice netifd: Interface ‘wwan’ is enabled
Fri Dec 11 19:22:40 2020 daemon.info dnsmasq[11344]: reading /tmp/resolv.conf.d/resolv.conf.auto
Fri Dec 11 19:22:40 2020 daemon.info dnsmasq[11344]: using only locally-known addresses for domain test
Fri Dec 11 19:22:40 2020 daemon.info dnsmasq[11344]: using only locally-known addresses for domain onion
Fri Dec 11 19:22:40 2020 daemon.info dnsmasq[11344]: using only locally-known addresses for domain localhost
Fri Dec 11 19:22:40 2020 daemon.info dnsmasq[11344]: using only locally-known addresses for domain local
Fri Dec 11 19:22:40 2020 daemon.info dnsmasq[11344]: using only locally-known addresses for domain invalid
Fri Dec 11 19:22:40 2020 daemon.info dnsmasq[11344]: using only locally-known addresses for domain bind
Fri Dec 11 19:22:40 2020 daemon.info dnsmasq[11344]: using only locally-known addresses for domain lan
Fri Dec 11 19:22:40 2020 daemon.info dnsmasq[11344]: using nameserver fe80::2efd:a1ff:fe03:9d91%eth0.1#53
Fri Dec 11 19:22:40 2020 daemon.info dnsmasq[11344]: using nameserver 192.168.16.1#53
Fri Dec 11 19:22:41 2020 daemon.notice netifd: Network device ‘wlan0-1’ link is down
Fri Dec 11 19:22:41 2020 daemon.notice netifd: Interface ‘lanap’ has link connectivity loss
Fri Dec 11 19:22:46 2020 daemon.notice netifd: Network device ‘wlan0-1’ link is up
Fri Dec 11 19:22:46 2020 daemon.notice netifd: Interface ‘lanap’ has link connectivity
Fri Dec 11 19:24:25 2020 daemon.notice wpa_supplicant[10521]: wlan0: SME: Trying to authenticate with xx:xx:xx:e1:9b:86 (SSID=’X-WRT_9B84’ freq=2462 MHz)
Fri Dec 11 19:24:25 2020 daemon.notice wpa_supplicant[10521]: wlan0: SME: Authentication request to the driver failed
Fri Dec 11 19:24:25 2020 kern.info kernel: [92127.874903] wlan0: authenticate with xx:xx:xx:e1:9b:86
Fri Dec 11 19:24:25 2020 daemon.notice netifd: Network device ‘wlan0-1’ link is down
Fri Dec 11 19:24:25 2020 daemon.notice netifd: Interface ‘lanap’ has link connectivity loss
Fri Dec 11 19:24:26 2020 daemon.notice wpa_supplicant[10521]: wlan0: SME: Trying to authenticate with xx:xx:xx:e1:9b:86 (SSID=’X-WRT_9B84’ freq=2462 MHz)
Fri Dec 11 19:24:26 2020 kern.info kernel: [92129.339747] wlan0: authenticate with xx:xx:xx:e1:9b:86
Fri Dec 11 19:24:26 2020 kern.info kernel: [92129.369148] wlan0: send auth to xx:xx:xx:e1:9b:86 (try 1/3)
Fri Dec 11 19:24:26 2020 daemon.notice wpa_supplicant[10521]: wlan0: Trying to associate with xx:xx:xx:e1:9b:86 (SSID=’X-WRT_9B84’ freq=2462 MHz)
Fri Dec 11 19:24:26 2020 kern.info kernel: [92129.387006] wlan0: authenticated
Fri Dec 11 19:24:26 2020 kern.info kernel: [92129.397573] wlan0: associate with xx:xx:xx:e1:9b:86 (try 1/3)
Fri Dec 11 19:24:26 2020 kern.info kernel: [92129.417213] wlan0: RX AssocResp from xx:xx:xx:e1:9b:86 (capab=0×431 status=0 aid=1)
Fri Dec 11 19:24:26 2020 kern.info kernel: [92129.432615] wlan0: associated
Fri Dec 11 19:24:26 2020 daemon.notice netifd: Network device ‘wlan0’ link is up
Fri Dec 11 19:24:26 2020 daemon.notice netifd: Interface ‘wwan’ has link connectivity
Fri Dec 11 19:24:26 2020 daemon.notice netifd: Interface ‘wwan’ is setting up now
Fri Dec 11 19:24:26 2020 daemon.notice wpa_supplicant[10521]: wlan0: Associated with xx:xx:xx:e1:9b:86
Fri Dec 11 19:24:26 2020 daemon.notice wpa_supplicant[10521]: wlan0: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0
Fri Dec 11 19:24:26 2020 daemon.notice netifd: wwan (11770): udhcpc: started, v1.31.1
Fri Dec 11 19:24:26 2020 daemon.notice netifd: wwan (11770): udhcpc: sending discover
Fri Dec 11 19:24:29 2020 daemon.notice netifd: wwan (11770): udhcpc: sending discover
Fri Dec 11 19:24:30 2020 daemon.notice netifd: Network device ‘wlan0’ link is down
Fri Dec 11 19:24:30 2020 daemon.notice netifd: Interface ‘wwan’ has link connectivity loss
Fri Dec 11 19:24:30 2020 kern.info kernel: [92133.436716] wlan0: deauthenticated from xx:xx:xx:e1:9b:86 (Reason: 15=4WAY_HANDSHAKE_TIMEOUT)
Fri Dec 11 19:24:30 2020 daemon.notice wpa_supplicant[10521]: wlan0: CTRL-EVENT-DISCONNECTED bssid=xx:xx:xx:e1:9b:86 reason=15
Fri Dec 11 19:24:30 2020 daemon.notice wpa_supplicant[10521]: wlan0: WPA: 4-Way Handshake failed - pre-shared key may be incorrect
Fri Dec 11 19:24:30 2020 daemon.notice wpa_supplicant[10521]: wlan0: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid=”X-WRT_9B84” auth_failures=1 duration=10 reason=WRONG_KEY
Fri Dec 11 19:24:30 2020 daemon.notice netifd: wwan (11770): udhcpc: received SIGTERM
Fri Dec 11 19:24:30 2020 daemon.notice netifd: wwan (11770): udhcpc: entering released state
Fri Dec 11 19:24:30 2020 daemon.notice netifd: wwan (11770): Command failed: Permission denied
Fri Dec 11 19:24:30 2020 daemon.notice netifd: Interface ‘wwan’ is now down
Fri Dec 11 19:24:30 2020 daemon.notice netifd: Interface ‘wwan’ is disabled
Fri Dec 11 19:24:30 2020 daemon.notice netifd: Interface ‘wwan’ is enabled
Fri Dec 11 19:24:34 2020 daemon.notice netifd: Network device ‘wlan0-1’ link is up
Fri Dec 11 19:24:34 2020 daemon.notice netifd: Interface ‘lanap’ has link connectivity
Fri Dec 11 19:24:41 2020 daemon.notice wpa_supplicant[10521]: wlan0: CTRL-EVENT-SSID-REENABLED id=0 ssid=”X-WRT_9B84” Fri Dec 11 19:24:41 2020 daemon.notice wpa_supplicant[10521]: wlan0: SME: Trying to authenticate with xx:xx:xx:e1:9b:86 (SSID=’X-WRT_9B84’ freq=2462 MHz)
Fri Dec 11 19:24:41 2020 daemon.notice wpa_supplicant[10521]: wlan0: SME: Authentication request to the driver failed
Fri Dec 11 19:24:41 2020 kern.info kernel: [92144.477289] wlan0: authenticate with xx:xx:xx:e1:9b:86
Fri Dec 11 19:24:41 2020 daemon.notice wpa_supplicant[10521]: wlan0: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid=”X-WRT_9B84” auth_failures=2 duration=20 reason=CONN_FAILED
Fri Dec 11 19:24:41 2020 daemon.notice netifd: Network device ‘wlan0-1’ link is down
Fri Dec 11 19:24:41 2020 daemon.notice netifd: Interface ‘lanap’ has link connectivity loss
Fri Dec 11 19:24:46 2020 daemon.notice netifd: Network device ‘wlan0-1’ link is up
Fri Dec 11 19:24:46 2020 daemon.notice netifd: Interface ‘lanap’ has link connectivity
Fri Dec 11 19:25:02 2020 daemon.notice wpa_supplicant[10521]: wlan0: CTRL-EVENT-SSID-REENABLED id=0 ssid=”X-WRT_9B84” Fri Dec 11 19:25:02 2020 daemon.notice wpa_supplicant[10521]: wlan0: SME: Trying to authenticate with xx:xx:xx:e1:9b:86 (SSID=’X-WRT_9B84’ freq=2462 MHz)
Fri Dec 11 19:25:02 2020 daemon.notice wpa_supplicant[10521]: wlan0: SME: Authentication request to the driver failed
Fri Dec 11 19:25:02 2020 daemon.notice wpa_supplicant[10521]: wlan0: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid=”X-WRT_9B84” auth_failures=3 duration=30 reason=CONN_FAILED
Fri Dec 11 19:25:02 2020 kern.info kernel: [92165.400213] wlan0: authenticate with xx:xx:xx:e1:9b:86
Fri Dec 11 19:25:02 2020 daemon.notice netifd: Network device ‘wlan0-1’ link is down
Fri Dec 11 19:25:02 2020 daemon.notice netifd: Interface ‘lanap’ has link connectivity loss
Fri Dec 11 19:25:04 2020 daemon.notice netifd: Network device ‘wlan0-1’ link is up
Fri Dec 11 19:25:04 2020 daemon.notice netifd: Interface ‘lanap’ has link connectivity

06.12.20171209Base systemBug ReportVery LowMediumWiFi random disconnection on WRT3200ACMTrunkUnconfirmed Task Description

Router: Linksys WRT3200ACM

LEDE: Powered by LuCI lede-17.01 branch (git-17.290.79498-d3f0685) / LEDE Reboot 17.01.4 r3560-79f57e422d

Kernel: 4.4.92

Forum thread: https://forum.openwrt.org/viewtopic.php?pid=369295#p369295

mwlwifi version: kmod-mwlwifi - 4.4.92+10.3.4.0.git-2017-06-06-1

Wireless radio0 is working perfectly fine but not on radio1 or radio2. There’s random disconnection, can happen 3 times a day or once per 3 day. Only solution is to reboot the router. See the forum thread for more information.

17.09.20203345Base systemBug ReportVery LowCriticalWifi off TrunkUnconfirmed Task Description

Supply the following if possible:
- Device problem occurs on TP-Link TL-WR842N v5.
- OpenWrt/LEDE 19.07.04 with last updating.
- Just use wifi on the device. It have random wifi off about 1 min.
Log:
https://pastebin.com/c64H5kCR

13.02.20181356Base systemBug ReportVery LowLowWiFi Monitor interface is created on wrong channelTrunkUnconfirmed Task Description

- Device problem occurs on: PC-Engines APU3
- Software versions of OpenWrt/LEDE release: LEDE 17.01.4

Just created a monitor interface with an WLE200NX:

config wifi-device 'radio0'
        option type 'mac80211'
        option channel '5'
        option hwmode '11g'
        option path 'pci0000:00/0000:00:02.5/0000:04:00.0'
        option htmode 'HT40'
        option disabled '0'

config wifi-iface
        option mode 'monitor'
        option device 'radio0'
        option ifname 'mon0'

And restarted the device. It was expected that the monitor interface is now in HT40 mode (able to receive on HT40) and on channel 5. But in reality, the device was now on channel 1 and used a 20MHz (non-HT) channel setting:

root@LEDE:/# iw dev
phy#0
        Interface mon0
                ifindex 7
                wdev 0x2
                addr 00:11:22:33:44:55
                type monitor
                channel 1 (2412 MHz), width: 20 MHz (no HT), center1: 2412 MHz
                txpower 20.00 dBm
18.12.20192687Base systemBug ReportVery LowVery LowWiFi LED does not dynamically track state of radio on Z...openwrt-19.07Unconfirmed Task Description

Supply the following if possible:
- Device problem occurs on
- Software versions of OpenWrt/LEDE release, packages, etc.
- Steps to reproduce

 

Occurs on ZBT-WE3526 (16M) an MT76 unit with 512MB Ram

Stock 19.07, but has been this way since 18.06.xx

Steps to reproduce:
Log into to LuCi and disable a wifi radio, LED remains on.

reboot, radiox LED is now off, so LED is only set at boot

Log back into luci, turn radio on, radio becomes operational (STAs can connect) but LED remains off.

Desired behavior: LED tracks state of radio without requiring a reboot.

21.02.20192137Base systemBug ReportVery LowLowwifi isolate clients not working on several routersAllUnconfirmed Task Description

Routers and versions: wireless.isolate NOT working: TP Link WR841n v13
Version: OpenWrt SNAPSHOT, r9278-39273b8 (from roughly Feb 8)

wireless.isolate NOT working: TP Link TL-WDR3600 v1
Version: OpenWrt 18.06.02
Note: Only the 2GHz radio was enabled

Steps to reproduce: Reset router to default settings
Create wifi network
Restart the router
Connect two devices using wifi to the router
SSh from one device to the other =⇒ (This step incorrectly works!)

wireless.default_radio0=wifi-iface
wireless.default_radio0.device='radio0'
wireless.default_radio0.network='lan'
wireless.default_radio0.mode='ap'
wireless.default_radio0.isolate='1'
wireless.default_radio0.encryption='psk2+ccmp'
wireless.default_radio0.key='xxxxyyyyyyyy'
wireless.default_radio0.ssid='ssssssid'

Note that wireless.isolate DOES test as working on TP Link C7 v2. The ssh fails in the reproduction steps above.

11.12.20203513KernelBug ReportVery LowMediumWifi disconnects on LinkSys WRT3200ACMTrunkUnconfirmed Task Description

Having issues where Wifi clients lose connectivity after a while.
Might be related to activity and load, but this is reproducible in a few
minutes when doing web browsing with a Android phone (Android 10).
Turning wifi off/on the phone clears the issue.
Also happens with Linux laptop (Ubuntu) and other devices.

The problem started several months ago (after upgrade to 19.07.4).
Went back to 19.07.3 and still have the problem.

There is no indication of any problem in the kernel log.

Hardware:
Linksys WRT3200ACM
ARMv7 Processor rev 1 (v7l)

Software:
OpenWrt 19.07.3 r11063-85e04e9f46 / LuCI openwrt-19.07 branch git-20.136.49537-fb2f363

23.11.20192625Base systemBug ReportVery LowLowWiFi clients are isolated on WRT1900acs v2 running 19.0...TrunkUnconfirmed Task Description

I did an upgrade on a WRT1900acs v2 router (my backup router) that was running 18.06.4 (I think) via LuCI using the image “openwrt-19.07.0-rc1-mvebu-cortexa9-linksys_wrt1900acs-squashfs-sysupgrade.bin” keeping the old configuration. Everything seemed good except the clients could not connect or ping each other. The router could reach/ping the clients. This was the case whether or not “Isolate Clients” is set in the LuCI Wireless → Edit → Advanced Settings.

I noticed that if I connect an ethernet wire to one of the clients (a Raspberry Pi) and hook it to the router that I could connect/ping the Pi using either the IP associated with the ethernet connection or the IP associated with the WiFi connection from another client. When I disconnect the ethernet on the Pi I can no longer connect to the Pi’s wireless IP
address.

I decided to reinstall 19.07.0-rc1 to see where the isolated client behavior starts. After I reinstalled 19.07.0-rc1 I restored the configuration using LuCI System → Backup / Flash Firmware → Restore Backup. After it rebooted it was working, clients were not isolated. I installed a few packages that I wanted, here’s the list:

ca-bundle_20190110-1_all.ipk
ca-certificates_20190110-1_all.ipk
kmod-tun_4.14.151-1_arm_cortex-a9_vfpv3.ipk
liblzo2_2.10-2_arm_cortex-a9_vfpv3.ipk
libmbedtls12_2.16.3-1_arm_cortex-a9_vfpv3.ipk
libopenssl1.1_1.1.1d-2_arm_cortex-a9_vfpv3.ipk
libustream-mbedtls20150806_2019-11-05-c9b66682-2_arm_cortex-a9_vfpv3.ipk
openvpn-mbedtls_2.4.7-2_arm_cortex-a9_vfpv3.ipk

Everything still working. I wanted WPA3 so I removed wpad-basic and installed

wpad-openssl_2019-08-08-ca8c2bd2-1_arm_cortex-a9_vfpv3.ipk

Everything still working. I changed the 5 Ghz wifi from WPA2-SPK to WPA3-SAE. Everything still working. I changed the 2.4 Ghz wifi from WPA2-SPK to WPA2-SPK/WPA3-SAE mixed. This is when it stopped working. I don’t know if this last step actually caused the problem since setting both wifi networks back to WPA2-SPK and rebooting (and unplugging for 5 minutes) does not fix the problem, clients are still isolated. Pretty much all clients are on the 2.4 Ghz network.

Here are a couple bits of diagnostic which may or may not be helpful:

————→ when everything is working (clients not isolated):

# cat /sys/devices/virtual/net/eth0.1/brport/hairpin_mode
0

# cat /sys/devices/virtual/net/eth0.1/brport/isolated
0

# cat /var/run/hostapd-phy0.conf
driver=nl80211
logger_syslog=127
logger_syslog_level=2
logger_stdout=127
logger_stdout_level=2
country_code=US
ieee80211d=1
ieee80211h=1
hw_mode=a
beacon_int=100
channel=36

tx_queue_data2_burst=2.0
ieee80211n=1
ht_coex=0
ht_capab=[HT40+][LDPC][SHORT-GI-20][SHORT-GI-40][DSSS_CCK-40]
vht_oper_chwidth=1
vht_oper_centr_freq_seg0_idx=42
ieee80211ac=1
vht_capab=[RXLDPC][SHORT-GI-80][SU-BEAMFORMER][SU-BEAMFORMEE][RX-ANTENNA-PATTERN][TX-ANTENNA-PATTERN][RX-STBC-1][MAX-A-MPDU-LEN-EXP7]

interface=wlan0
ctrl_interface=/var/run/hostapd
ap_isolate=1
bss_load_update_period=60
chan_util_avg_period=600
disassoc_low_ack=1
preamble=1
wmm_enabled=1
ignore_broadcast_ssid=0
uapsd_advertisement_enabled=1
utf8_ssid=1
multi_ap=0
wpa_passphrase=XXXXXXXXXX
auth_algs=1
wpa=2
wpa_pairwise=CCMP
ssid=folly_5g
bridge=br-lan
wpa_disable_eapol_key_retries=0
wpa_key_mgmt=WPA-PSK
okc=0
disable_pmksa_caching=1
bssid=62:38:e0:12:78:f3

# cat /var/run/hostapd-phy1.conf
driver=nl80211
logger_syslog=127
logger_syslog_level=2
logger_stdout=127
logger_stdout_level=2
country_code=US
ieee80211d=1
hw_mode=g
beacon_int=100
channel=7

ieee80211n=1
ht_coex=0
ht_capab=[LDPC][SHORT-GI-20][SHORT-GI-40][DSSS_CCK-40]

interface=wlan1
ctrl_interface=/var/run/hostapd
ap_isolate=1
bss_load_update_period=60
chan_util_avg_period=600
disassoc_low_ack=1
preamble=1
wmm_enabled=1
ignore_broadcast_ssid=0
uapsd_advertisement_enabled=1
utf8_ssid=1
multi_ap=0
wpa_passphrase=XXXXXXXXXX
auth_algs=1
wpa=2
wpa_pairwise=CCMP
ssid=folly
bridge=br-lan
wpa_disable_eapol_key_retries=0
wpa_key_mgmt=WPA-PSK
okc=0
disable_pmksa_caching=1
bssid=62:38:e0:12:78:f2

————→ when it’s not working (clients isolated)

# cat /sys/devices/virtual/net/eth0.1/brport/hairpin_mode
0

# cat /sys/devices/virtual/net/eth0.1/brport/isolated
0

# cat /var/run/hostapd-phy0.conf
driver=nl80211
logger_syslog=127
logger_syslog_level=2
logger_stdout=127
logger_stdout_level=2
country_code=US
ieee80211d=1
ieee80211h=1
hw_mode=a
beacon_int=100
channel=36

tx_queue_data2_burst=2.0
ieee80211n=1
ht_coex=0
ht_capab=[HT40+][LDPC][SHORT-GI-20][SHORT-GI-40][DSSS_CCK-40]
vht_oper_chwidth=1
vht_oper_centr_freq_seg0_idx=42
ieee80211ac=1
vht_capab=[RXLDPC][SHORT-GI-80][SU-BEAMFORMER][SU-BEAMFORMEE][RX-ANTENNA-PATTERN
][TX-ANTENNA-PATTERN][RX-STBC-1][MAX-A-MPDU-LEN-EXP7]

interface=wlan0
ctrl_interface=/var/run/hostapd
ap_isolate=1
bss_load_update_period=60
chan_util_avg_period=600
disassoc_low_ack=1
preamble=1
wmm_enabled=1
ignore_broadcast_ssid=0
uapsd_advertisement_enabled=1
utf8_ssid=1
multi_ap=0
sae_require_mfp=1
wpa_passphrase=XXXXXXXXXX
auth_algs=1
wpa=2
wpa_pairwise=CCMP
ssid=folly_5g
bridge=br-lan
wpa_disable_eapol_key_retries=0
wpa_key_mgmt=SAE
okc=1
ieee80211w=2
group_mgmt_cipher=AES-128-CMAC
bssid=62:38:e0:12:78:f3

# cat /var/run/hostapd-phy1.conf
driver=nl80211
logger_syslog=127
logger_syslog_level=2
logger_stdout=127
logger_stdout_level=2
country_code=US
ieee80211d=1
hw_mode=g
beacon_int=100
channel=7

ieee80211n=1
ht_coex=0
ht_capab=[LDPC][SHORT-GI-20][SHORT-GI-40][DSSS_CCK-40]

interface=wlan1
ctrl_interface=/var/run/hostapd
ap_isolate=1
bss_load_update_period=60
chan_util_avg_period=600
disassoc_low_ack=1
preamble=1
wmm_enabled=1
ignore_broadcast_ssid=0
uapsd_advertisement_enabled=1
utf8_ssid=1
multi_ap=0
wpa_passphrase=XXXXXXXXXX
auth_algs=1
wpa=2
wpa_pairwise=CCMP
ssid=folly
bridge=br-lan
wpa_disable_eapol_key_retries=0
wpa_key_mgmt=WPA-PSK WPA-PSK-SHA256
okc=0
disable_pmksa_caching=1
ieee80211w=1
group_mgmt_cipher=AES-128-CMAC
bssid=62:38:e0:12:78:f2

11.02.2017499Base systemBug ReportVery LowLowWiFi client mode leaves router inaccessible if upstream...TrunkUnconfirmed Task Description

This bug was originally reported to the OpenWrt team and there is a discussion of it in their mailing list. Luiz Angelo Daros de Luca suggested reporting here (and switching to LEDE, which I will do).

I have a TP-Link TL-MR3020 v1.9 with Chaos Calmer 15.05.01. I’m using it to provide a WiFi access point to my phone/tablet while I travel, and it’s acting as a WiFi client for the various hostels I visit.

If you configure it as a wifi client with a wwan interface using the LuCI scan/join wizard, and then you configure a wifi access point on the same radio, the router works as expected and when you connect to the router’s AP, you get Internet via the client connection.

However, if you move out of range of the network the router is a client of, or if it goes down, when you power off the OpenWrt router and power back on, the access point won’t come up.

The AP will only come up if the client network you configured is also working; so you have no way to connect to the router over wifi, and no way to reconfigure the router, if that client network is down or out of range.

This is a particular problem for a travel router because it will often move it out of range of the original upstream network, and you may only have a wifi-capable device with which to reconfigure it.

The Ethernet port on the router does remain active, so I can tell it does actually boot. It’s just the radio that doesn’t come up. I managed to get back in range of a network once, and the router worked as expected.

It doesn’t matter whether the AP or client connection are configured first or second on the radio interface, and, unticking “bring up on boot” for the wwan interface has no effect on the behaviour.

Steps to reproduce: Connect the router to a wifi network as a client using the Join wizard. Add a wifi master-mode access point on the same radio interface. Verify you can access the Internet by joining the router’s new master AP. Reboot the router with the original network it was a client of turned off. Notice the router’s AP you configured never comes up.

Expected behaviour: The master access point of the router should always come up, regardless of the availability of the client network.

The OpenWRT team will not fix it, but had some explanation as to why it is happening. IMO, it’s still a very frustrating bug and most users would expect the behaviour I did.

18.07.20203236Base systemBug ReportVery LowLowWiFi button not properly workingTrunkUnconfirmed Task Description

Supply the following if possible:
- Device problem occurs on - all devices supporting WiFi on/off button

- Software versions of OpenWrt/LEDE release, packages, etc.- current trunk and earlier(rfkill git code is 4 years old)

- Steps to reproduce - press WiFI button to enable(works), press it again to disable WiFI - does not work./etc/config/wireless gets properly updates to disable the wifi but the final wifi up command is no ot allowing the real disable.

 

There is a Bug in WiFI button handling script, the proposed fix is below:

https://github.com/openwrt/openwrt/blob/master/package/base-files/files/etc/rc.button/rfkill

Line 30:
wifi up
has to be only:
wifi

23.06.20213898Base systemBug ReportVery LowHighWifi APs are disable when encryption is switched on.TrunkUnconfirmed Task Description

Supply the following if possible:
- Device problem occurs on XRX200 - BT Home Hub 5a
- Software versions of OpenWrt/LEDE release, packages, etc. Trunk since 10 days or so.
- Steps to reproduce, Make clean, select BTHH5a as target, make standard build, flash it, wifi APs work without encryption, enable encryption and the APs become disabled (see log below)
, host
I tried combinations of WPAD, WPA-supplicant, hostapd, wolfssl, openssl all with the same problem, encrypted APs fail.
Note using the original Ath10k driver, rather than the CT driver, will bring up the 5GHz AP with encryption enabled.

root@OpenWrt:~# uname -a
Linux OpenWrt 5.4.124 #0 SMP Wed Jun 23 06:22:19 2021 mips GNU/Linux
root@OpenWrt:~# cat /etc/config/wireless

config wifi-device ‘radio0’

option type 'mac80211'
option path 'pci0000:01/0000:01:00.0/0000:02:00.0'
option channel '36'
option band '5g'
option htmode 'VHT80'
option disabled '0'
option cell_density '0'

config wifi-iface ‘default_radio0’

option device 'radio0'
option network 'lan'
option mode 'ap'
option ssid 'OpenWRT'
option encryption 'none'

config wifi-device ‘radio1’

option type 'mac80211'
option path 'pci0000:00/0000:00:0e.0'
option channel '1'
option band '2g'
option htmode 'HT20'
option disabled '0'
option cell_density '0'

config wifi-iface ‘default_radio1’

option device 'radio1'
option network 'lan'
option mode 'ap'
option ssid 'OpenWRT'
option encryption 'none'

root@OpenWrt:~# wifi up
root@OpenWrt:~# logread |grep wlan
Wed Jun 23 06:37:03 2021 daemon.notice hostapd: Configuration file: /var/run/hostapd-phy1.conf (phy wlan1) –> new PHY
Wed Jun 23 06:37:03 2021 kern.info kernel: [ 897.769503] br-lan: port 2(wlan1) entered blocking state
Wed Jun 23 06:37:03 2021 kern.info kernel: [ 897.773559] br-lan: port 2(wlan1) entered disabled state
Wed Jun 23 06:37:03 2021 kern.info kernel: [ 897.779392] device wlan1 entered promiscuous mode
Wed Jun 23 06:37:03 2021 kern.info kernel: [ 897.817116] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready
Wed Jun 23 06:37:03 2021 kern.info kernel: [ 897.822637] br-lan: port 2(wlan1) entered blocking state
Wed Jun 23 06:37:03 2021 kern.info kernel: [ 897.827390] br-lan: port 2(wlan1) entered forwarding state
Wed Jun 23 06:37:03 2021 daemon.notice hostapd: wlan1: interface state UNINITIALIZED→ENABLED
Wed Jun 23 06:37:03 2021 daemon.notice hostapd: wlan1: AP-ENABLED
Wed Jun 23 06:37:03 2021 daemon.notice hostapd: Configuration file: /var/run/hostapd-phy0.conf (phy wlan0) –> new PHY
Wed Jun 23 06:37:04 2021 kern.info kernel: [ 898.993296] br-lan: port 3(wlan0) entered blocking state
Wed Jun 23 06:37:04 2021 kern.info kernel: [ 898.997157] br-lan: port 3(wlan0) entered disabled state
Wed Jun 23 06:37:04 2021 daemon.notice hostapd: wlan0: interface state UNINITIALIZED→HT_SCAN
Wed Jun 23 06:37:04 2021 kern.info kernel: [ 899.003263] device wlan0 entered promiscuous mode
Wed Jun 23 06:37:04 2021 daemon.notice netifd: Network device ‘wlan1’ link is up
Wed Jun 23 06:37:08 2021 kern.info kernel: [ 902.676578] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
Wed Jun 23 06:37:08 2021 kern.info kernel: [ 902.681875] br-lan: port 3(wlan0) entered blocking state
Wed Jun 23 06:37:08 2021 kern.info kernel: [ 902.686952] br-lan: port 3(wlan0) entered forwarding state
Wed Jun 23 06:37:08 2021 daemon.notice netifd: Network device ‘wlan0’ link is up
Wed Jun 23 06:37:08 2021 daemon.notice hostapd: wlan0: interface state HT_SCAN→ENABLED
Wed Jun 23 06:37:08 2021 daemon.notice hostapd: wlan0: AP-ENABLED
root@OpenWrt:~# vi /etc/config/wireless
root@OpenWrt:~# cat /etc/config/wireless

config wifi-device ‘radio0’

option type 'mac80211'
option path 'pci0000:01/0000:01:00.0/0000:02:00.0'
option channel '36'
option band '5g'
option htmode 'VHT80'
option disabled '0'
option cell_density '0'

config wifi-iface ‘default_radio0’

option device 'radio0'
option network 'lan'
option mode 'ap'
option ssid 'MyAP-5GHZ'
option encryption 'psk2'
option key 'qwert12345'

config wifi-device ‘radio1’

option type 'mac80211'
option path 'pci0000:00/0000:00:0e.0'
option channel '1'
option band '2g'
option htmode 'HT20'
option disabled '0'
option cell_density '0'

config wifi-iface ‘default_radio1’

option device 'radio1'
option network 'lan'
option mode 'ap'
option ssid 'MyAP-2.4GHz'
option encryption 'psk2'
option key 'qwert12345'

root@OpenWrt:~# wifi down
root@OpenWrt:~# wifi up
root@OpenWrt:~# logread |grep wlan
.....
Wed Jun 23 06:40:49 2021 daemon.notice hostapd: Configuration file: /var/run/hostapd-phy1.conf (phy wlan1) –> new PHY
Wed Jun 23 06:40:49 2021 kern.info kernel: [ 1123.556186] br-lan: port 2(wlan1) entered blocking state
Wed Jun 23 06:40:49 2021 kern.info kernel: [ 1123.560122] br-lan: port 2(wlan1) entered disabled state
Wed Jun 23 06:40:49 2021 kern.info kernel: [ 1123.566404] device wlan1 entered promiscuous mode
Wed Jun 23 06:40:49 2021 kern.info kernel: [ 1123.772553] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready
Wed Jun 23 06:40:49 2021 kern.info kernel: [ 1123.777787] br-lan: port 2(wlan1) entered blocking state
Wed Jun 23 06:40:49 2021 kern.info kernel: [ 1123.782898] br-lan: port 2(wlan1) entered forwarding state
Wed Jun 23 06:40:49 2021 daemon.notice hostapd: Configuration file: /var/run/hostapd-phy0.conf (phy wlan0) –> new PHY
Wed Jun 23 06:40:50 2021 kern.info kernel: [ 1124.995987] br-lan: port 3(wlan0) entered blocking state
Wed Jun 23 06:40:50 2021 kern.info kernel: [ 1124.999851] br-lan: port 3(wlan0) entered disabled state
Wed Jun 23 06:40:50 2021 kern.info kernel: [ 1125.005954] device wlan0 entered promiscuous mode
Wed Jun 23 06:40:50 2021 daemon.notice hostapd: wlan0: interface state UNINITIALIZED→HT_SCAN
Wed Jun 23 06:40:50 2021 daemon.notice hostapd: wlan1: interface state UNINITIALIZED→DISABLED
Wed Jun 23 06:40:50 2021 daemon.notice hostapd: wlan1: AP-DISABLED
Wed Jun 23 06:40:50 2021 daemon.err hostapd: wlan1: Unable to setup interface.
Wed Jun 23 06:40:50 2021 daemon.notice hostapd: nl80211: deinit ifname=wlan1 disabled_11b_rates=0
Wed Jun 23 06:40:50 2021 kern.info kernel: [ 1125.021045] device wlan1 left promiscuous mode
Wed Jun 23 06:40:50 2021 kern.info kernel: [ 1125.024384] br-lan: port 2(wlan1) entered disabled state
Wed Jun 23 06:40:50 2021 daemon.notice hostapd: wlan1: CTRL-EVENT-TERMINATING
Wed Jun 23 06:40:50 2021 daemon.err hostapd: hostapd_free_hapd_data: Interface wlan1 wasn’t started
Wed Jun 23 06:41:04 2021 daemon.notice hostapd: Configuration file: /var/run/hostapd-phy0.conf (phy wlan0) –> new PHY
Wed Jun 23 06:41:04 2021 kern.info kernel: [ 1138.536784] br-lan: port 3(wlan0) entered disabled state
Wed Jun 23 06:41:08 2021 daemon.notice hostapd: wlan0: interface state UNINITIALIZED→HT_SCAN
Wed Jun 23 06:41:12 2021 kern.info kernel: [ 1146.527964] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
Wed Jun 23 06:41:12 2021 kern.info kernel: [ 1146.533315] br-lan: port 3(wlan0) entered blocking state
Wed Jun 23 06:41:12 2021 kern.info kernel: [ 1146.538175] br-lan: port 3(wlan0) entered forwarding state
Wed Jun 23 06:41:12 2021 daemon.notice netifd: Network device ‘wlan0’ link is up
Wed Jun 23 06:41:12 2021 daemon.notice hostapd: wlan0: interface state HT_SCAN→DISABLED
Wed Jun 23 06:41:12 2021 daemon.notice hostapd: wlan0: AP-DISABLED

25.02.20202856Base systemBug ReportVery LowHighWifi "dies" (hostapd drops all clients) on some ar71xx ...openwrt-19.07New Task Description

This issue is very strange, i don’t even know if it’s just faulty hardware but i have it happening on multiple devices now

Most affected hardware

  • Nanobridge M5 , in this case transmitting enough data can trigger it almost instantly
  • TL-WR841ND , in this case i had it happen like 3-4 times a year
  • CPE 210 v3 , in this case it happens like each week

For the last one, which is running 19.07 i found on the system log

Tue Feb 25 07:38:58 2020 daemon.notice hostapd: wlan0: AP-STA-DISCONNECTED [redacted mac1]
Tue Feb 25 07:38:58 2020 daemon.info hostapd: wlan0: STA [redacted mac1] IEEE 802.11: disassociated due to inactivity
Tue Feb 25 07:38:59 2020 daemon.info hostapd: wlan0: STA [redacted mac1] IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Tue Feb 25 07:41:32 2020 daemon.notice hostapd: wlan0: AP-STA-DISCONNECTED [redacted mac2]
Tue Feb 25 07:41:32 2020 daemon.info hostapd: wlan0: STA [redacted mac2] IEEE 802.11: disassociated due to inactivity
Tue Feb 25 07:41:33 2020 daemon.info hostapd: wlan0: STA [redacted mac2] IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Tue Feb 25 07:42:49 2020 daemon.notice hostapd: wlan0: AP-STA-POLL-OK [redacted mac3]
Tue Feb 25 07:49:55 2020 daemon.notice hostapd: wlan0: AP-STA-POLL-OK [redacted mac3]
Tue Feb 25 07:55:02 2020 daemon.notice hostapd: wlan0: AP-STA-POLL-OK [redacted mac3]
Tue Feb 25 08:00:15 2020 daemon.notice hostapd: wlan0: AP-STA-POLL-OK [redacted mac3]
Tue Feb 25 08:05:25 2020 daemon.notice hostapd: wlan0: AP-STA-POLL-OK [redacted mac3]
Tue Feb 25 08:10:44 2020 daemon.notice hostapd: wlan0: AP-STA-POLL-OK [redacted mac3]
Tue Feb 25 08:16:00 2020 daemon.notice hostapd: wlan0: AP-STA-POLL-OK [redacted mac3]
02.05.20203061Base systemBug ReportVery LowLowWi-Fi: Cannot set country code on AVM FRITZ 1750ETrunkUnconfirmed Task Description

It is not possible to set the country code on both 2.4 and 5 GHz.

 

Device: AVM FRITZ!WLAN REPEATER 1750E (target ath79 generic)
Software version: OpenWrt SNAPSHOT r13136-ad27c133eb
Steps to reproduce:

Console:
Execute iw reg set DE and then iw reg get, and see how “global” sets to “DE” but phy#1 and phy#0 remain on “US”.

LuCI:
Sign in to LuCI, go to Network>Wireless (click Edit and then the “Advanced” tab) try to change the country code on either Wi-Fi device/frequency to “DE” and see how it resets to “driver default” after apply, which seems to be “US”.

02.05.20203062Base systemBug ReportVery LowLowWi-Fi 5GHz: Cannot use some channels on AVM FRITZ 1750ETrunkUnconfirmed Task Description

It is not possible to use some channels with OpenWrt on this particular device, which are known to work with the stock firmware.

Device: AVM FRITZ!WLAN REPEATER 1750E (target ath79 generic)
Software version: OpenWrt SNAPSHOT r13136-ad27c133eb
Steps to reproduce:

Try to set the 5GHz Wi-Fi channel to 100 (some others affected as well), and see how transmit power falls to 0 dBm and Wi-Fi does not seem to work.

Possibly related issue: https://bugs.openwrt.org/index.php?do=details&task_id=3061

31.08.20181827Base systemBug ReportVery LowHighwhy has uci no package which depends on?AllUnconfirmed Task Description

Hi,
today I did a bad thing, which only could happen, because uci have no package which depends on: I uninstalled which my currently developed clean script uci package and after reboot the router doesnt came up again :D

But why is this main package no refereed anywhere?

Regards,
Thomas

30.05.20181569Base systemBug ReportVery LowLowWhy comment out firewall rules when we can disable them...TrunkUnconfirmed Task Description

Supply the following if possible:
- Device problem occurs on

1U Xeon D-1518 server

- Software versions of OpenWrt/LEDE release, packages, etc.

x86_64, master, r5968, firewall

- Steps to reproduce

Looking at /etc/config/firewall I see:

# port redirect of remapped ssh port (22001) on wan
#config redirect
#      option src              wan
#      option src_dport        22001
#      option dest             lan
#      option dest_port        22
#      option proto            tcp

but would like to see:

# port redirect of remapped ssh port (22001) on wan
config redirect
      option src              wan
      option src_dport        22001
      option dest             lan
      option dest_port        22
      option proto            tcp
      option enabled          false

instead. Note the “option enabled false” line.

22.05.20203114Base systemBug ReportVery LowMediumWhen using CLIENT+AP with 5GHZ on same radio, AP doesn'...openwrt-19.07Unconfirmed Task Description

Workaround is to set the channel on the AP to an arbitrary channel other than ‘auto’. It’s still auto since it has to be the same channel as the client uses, but at least now it shows up.
Verified the issue on 19.07.3 with both Xiaomi MIR3G and Netgear WNDR3700v5, both MT7621 based.

 


12.09.20192492ToolchainBuild FailureVery LowMediumWhen building an image from an imagebuilder the build f...TrunkUnconfirmed Task Description

When building an image (from git commit 81764319637f408623ed9f4bae3f0d149b010f07) from already built imagebuilder for ar71xx target, the build fails at the end (after “Finalizing root filesystem”) because of missing ‘mips-openwrt-linux-musl’. I searched the original build directory in openwrt tree and this lib seems to be to find (among others) in:

./staging_dir/toolchain-mips_24kc_gcc-8.3.0_musl/mips-openwrt-linux-musl

but for some reason is not saved into the imagebuilder image.

This is the message from the end of imagebuilder build.

Finalizing root filesystem...
...
Enabling urandom_seed
Enabling urngd
/home/risa/openwrt/openwrt-imagebuilder-ar71xx-generic.Linux-x86_64/staging_dir/host/bin/find: '/home/risa/openwrt/openwrt-imagebuilder-ar71xx-generic.Linux-x86_64/staging_dir/target-mips_24kc_musl/root-ar71xx': No such file or directory
/home/risa/openwrt/openwrt-imagebuilder-ar71xx-generic.Linux-x86_64/staging_dir/host/bin/find: '/home/risa/openwrt/openwrt-imagebuilder-ar71xx-generic.Linux-x86_64/staging_dir/target-mips_24kc_musl/root-ar71xx': No such file or directory
Traceback (most recent call last):
  File "/home/risa/openwrt/openwrt-imagebuilder-ar71xx-generic.Linux-x86_64/staging_dir/host/bin/mklibs", line 426, in <module>
    inode = os.stat(prog)[ST_INO]
FileNotFoundError: [Errno 2] No such file or directory: 'mips-openwrt-linux-musl'
make[2]: *** [Makefile:163: prepare_rootfs] Error 1
make[1]: *** [Makefile:119: _call_image] Error 2
make: *** [Makefile:197: image] Error 2
10.07.20213925Base systemBug ReportVery LowCriticalwgt634u: jffs2 Filesystem overwrites the bootloader par...openwrt-19.07Unconfirmed Task Description

Supply the following if possible:
- Device problem occurs on WGT643u
- Software versions of OpenWrt/LEDE OpenWrt 19.07
Steps to reproduce:
- after fresh install I installed some bigger packages then the system hangs
- a reboot with power off/on not working
- The serial/UART/Terminal of the box shows the bootloader stops because the param partition at the end of the flash was overwritten and the checksum was wrong

It seems the partition size of the jffs2 partition is wrong.

Linux side:
root@OpenWrt:/# cat /proc/partitions
major minor #blocks name

                                                                              
31        0        640 mtdblock0                                              
31        1       7424 mtdblock1                                              
31        2          2 mtdblock2                                              
31        3       1324 mtdblock3                                              
31        4       6097 mtdblock4                                              
31        5       3456 mtdblock5                                              
31        6        128 mtdblock6 -->param partition

root@OpenWrt:/# cat /proc/mtd
dev: size erasesize name
mtd0: 000a0000 00020000 “boot”
mtd1: 00740000 00020000 “firmware”
mtd2: 00000928 00000928 “loader”
mtd3: 0014b2bc 00020000 “linux”
mtd4: 005f4400 00020000 “rootfs”
mtd5: 00360000 00020000 “rootfs_data”
mtd6: 00020000 00020000 “nvram” –>bootloader param partition == 131072 bytes (Bootloader says 8KB...)

root@OpenWrt:/# mount
/dev/root on /rom type squashfs (ro,relatime)
proc on /proc type proc (rw,nosuid,nodev,noexec,noatime)
sysfs on /sys type sysfs (rw,nosuid,nodev,noexec,noatime)
tmpfs on /tmp type tmpfs (rw,nosuid,nodev,noatime)
tmpfs on /tmp/root type tmpfs (rw,noatime,mode=755)
overlayfs:/tmp/root on / type overlay (rw,noatime,lowerdir=/,upperdir=/tmp/root/upper,workdir=/tmp/root/wo)
tmpfs on /dev type tmpfs (rw,nosuid,relatime,size=512k,mode=755)
devpts on /dev/pts type devpts (rw,nosuid,noexec,relatime,mode=600,ptmxmode=000)
debugfs on /sys/kernel/debug type debugfs (rw,noatime)

UART/Terminal shows after boot:
[ 127.964107] jffs2: jffs2_scan_eraseblock(): Magic bitmask 0×1985 not found at 0×00000000: 0x0c3b instead
[ 128.053636] jffs2: jffs2_scan_eraseblock(): Magic bitmask 0×1985 not found at 0×00000004: 0x58cd instead
[ 128.063208] jffs2: jffs2_scan_eraseblock(): Magic bitmask 0×1985 not found at 0×00000008: 0x54cc instead
[ 128.193636] jffs2: jffs2_scan_eraseblock(): Magic bitmask 0×1985 not found at 0x0000000c: 0×6859 instead
[ 128.203202] jffs2: jffs2_scan_eraseblock(): Magic bitmask 0×1985 not found at 0×00000010: 0x916a instead
[ 128.283363] jffs2: jffs2_scan_eraseblock(): Magic bitmask 0×1985 not found at 0×00000014: 0x9d93 instead
[ 128.303639] jffs2: jffs2_scan_eraseblock(): Magic bitmask 0×1985 not found at 0×00000018: 0x6b25 instead
[ 128.313209] jffs2: jffs2_scan_eraseblock(): Magic bitmask 0×1985 not found at 0x0000001c: 0x54bb instead
[ 128.413768] jffs2: jffs2_scan_eraseblock(): Magic bitmask 0×1985 not found at 0×00000020: 0xeacc instead
[ 128.423620] jffs2: jffs2_scan_eraseblock(): Magic bitmask 0×1985 not found at 0×00000024: 0x8dc5 instead
[ 128.433144] jffs2: Further such events for this erase block will not be printed
[ 128.829317] jffs2: Empty flash at 0×00010004 ends at 0×00011000
[ 128.884133] jffs2: Empty flash at 0×00011004 ends at 0×00012000
[ 128.891154] jffs2: Empty flash at 0×00012004 ends at 0×00014000
[ 128.999749] jffs2_scan_eraseblock(): End of filesystem marker found at 0×20000
[ 129.133686] jffs2: Cowardly refusing to erase blocks on filesystem with no valid JFFS2 nodes
[ 129.142209] jffs2: empty_blocks 26, bad_blocks 0, c→nr_blocks 27

                                            

root@OpenWrt:/# reboot
root@OpenWrt:/# ^C

See on the UART/Terminal while power on and press CTRL-C long:

                                                                              

CFE version 1.0.34 for BCM95365R (32bit,SP,LE)
Build Date: Tue Feb 24 03:21:41 CST 2004 (root@jackylinux)
Copyright (C) 2000,2001,2002 Broadcom Corporation.

                                                                              

Add MAC client version(DNI).
Initializing Arena.
Initializing Devices.
et0: Broadcom BCM47xx 10/100 Mbps Ethernet Controller
CPU type 0×29007: 200MHz
Total memory: 0×2000000 bytes (32MB)

                                                                              

Total memory used by CFE: 0x81BB1280 - 0×82000000 (4517248)
Initialized Data: 0x81BB1280 - 0x81BB3E90 (11280)
BSS Area: 0x81BB3E90 - 0x81BB45D0 (1856)
Local Heap: 0x81BB45D0 - 0x81FB45D0 (4194304)
Stack Area: 0x81FB45D0 - 0x81FB65D0 (8192)
Text (code) segment: 0x81FB65E0 - 0x81FFFFB0 (301520)
Boot area (physical): 0x01B70000 - 0x01BB0000
Relocation Factor: I:E23B65E0 - D:01BB0280

                                                                              

configure vlans
*
* VLAN Driver initial
***
Process LAN port(2-5) vlan Architecture...
SUCCESS: trying to create VLAN 0 for switch
SUCCESS: trying to add LAN port

                                                                              

Process WAN port(2-5) vlan Architecture...
SUCCESS: trying to create VLAN 0 for switch
SUCCESS: trying to add WAN port
SUCCESS: enable ports success
configure vlans...done
Automatic startup canceled via Ctrl-C

                           

CFE> show devices
Device Name Description
——————- ———————————————————
uart0 NS16550 UART at 0×18000300
uart1 NS16550 UART at 0×18000400
flash0.boot New CFI flash at 1C000000 offset 00000000 size 384KB
flash0.config New CFI flash at 1C000000 offset 00060000 size 128KB
flash0.os New CFI flash at 1C000000 offset 00080000 size 7672KB
flash0.nvram New CFI flash at 1C000000 offset 007FE000 size 8KB —–>param partition for bootloader

please fix the jffs2 partition size!

21.03.2017649Base systemBug ReportVery LowLowWDS not working on ath9k-htc TrunkUnconfirmed Task Description

Supply the following if possible:
- Device problem occurs on: Any device with an wifi USB adapter with the chipset AR9271 (TPLink WN722N in my case).
- Software versions of LEDE release, packages, etc: Latest trunk LEDE versions.
- Steps to reproduce

 

Configure the USB AR9271 adapter as WDS AP, try to associate any other router as WDS Client (in my case the WDS Client is a TPLink WR741ND router, also compiled with latest trunk).
They both associate correctly, but there is no connection between them.

Here is a hostapd log on the WDS AP:

Mon Mar 20 14:05:00 2017 daemon.notice hostapd: wlan1: interface state ENABLED->DISABLED
Mon Mar 20 14:05:00 2017 daemon.notice hostapd: wlan1: AP-STA-DISCONNECTED 94:0c:6d:b0:f4:ac
Mon Mar 20 14:05:00 2017 daemon.notice hostapd: wlan1: AP-DISABLED
Mon Mar 20 14:05:00 2017 daemon.notice hostapd: wlan1: CTRL-EVENT-TERMINATING
Mon Mar 20 14:05:00 2017 daemon.notice hostapd: nl80211: deinit ifname=wlan1 disabled_11b_rates=0
Mon Mar 20 14:05:01 2017 daemon.err hostapd: Configuration file: /var/run/hostapd-phy1.conf
Mon Mar 20 14:05:02 2017 daemon.notice hostapd: wlan1: interface state UNINITIALIZED->COUNTRY_UPDATE
Mon Mar 20 14:05:02 2017 daemon.err hostapd: Using interface wlan1 with hwaddr e8:de:27:a4:58:21 and ssid "EB1DJ"
Mon Mar 20 14:05:02 2017 daemon.notice hostapd: wlan1: interface state COUNTRY_UPDATE->ENABLED
Mon Mar 20 14:05:02 2017 daemon.notice hostapd: wlan1: AP-ENABLED
Mon Mar 20 14:05:03 2017 daemon.debug hostapd: wlan1: STA 94:0c:6d:b0:f4:ac IEEE 802.11: authentication OK (open system)
Mon Mar 20 14:05:03 2017 daemon.debug hostapd: wlan1: STA 94:0c:6d:b0:f4:ac MLME: MLME-AUTHENTICATE.indication(94:0c:6d:b0:f4:ac, OPEN_SYSTEM)
Mon Mar 20 14:05:03 2017 daemon.debug hostapd: wlan1: STA 94:0c:6d:b0:f4:ac MLME: MLME-DELETEKEYS.request(94:0c:6d:b0:f4:ac)
Mon Mar 20 14:05:03 2017 daemon.info hostapd: wlan1: STA 94:0c:6d:b0:f4:ac IEEE 802.11: authenticated
Mon Mar 20 14:05:03 2017 daemon.debug hostapd: wlan1: STA 94:0c:6d:b0:f4:ac IEEE 802.11: association OK (aid 1)
Mon Mar 20 14:05:03 2017 daemon.info hostapd: wlan1: STA 94:0c:6d:b0:f4:ac IEEE 802.11: associated (aid 1)
Mon Mar 20 14:05:03 2017 daemon.debug hostapd: wlan1: STA 94:0c:6d:b0:f4:ac MLME: MLME-ASSOCIATE.indication(94:0c:6d:b0:f4:ac)
Mon Mar 20 14:05:03 2017 daemon.debug hostapd: wlan1: STA 94:0c:6d:b0:f4:ac MLME: MLME-DELETEKEYS.request(94:0c:6d:b0:f4:ac)
Mon Mar 20 14:05:03 2017 daemon.debug hostapd: wlan1: STA 94:0c:6d:b0:f4:ac IEEE 802.11: binding station to interface 'wlan1'
Mon Mar 20 14:05:03 2017 daemon.debug hostapd: wlan1: STA 94:0c:6d:b0:f4:ac WPA: event 1 notification
Mon Mar 20 14:05:03 2017 daemon.debug hostapd: wlan1: STA 94:0c:6d:b0:f4:ac WPA: start authentication
Mon Mar 20 14:05:03 2017 daemon.debug hostapd: wlan1: STA 94:0c:6d:b0:f4:ac IEEE 802.1X: unauthorizing port
Mon Mar 20 14:05:03 2017 daemon.debug hostapd: wlan1: STA 94:0c:6d:b0:f4:ac WPA: sending 1/4 msg of 4-Way Handshake
Mon Mar 20 14:05:03 2017 daemon.debug hostapd: wlan1: STA 94:0c:6d:b0:f4:ac WPA: EAPOL-Key timeout
Mon Mar 20 14:05:03 2017 daemon.debug hostapd: wlan1: STA 94:0c:6d:b0:f4:ac WPA: sending 1/4 msg of 4-Way Handshake
Mon Mar 20 14:05:03 2017 daemon.debug hostapd: wlan1: STA 94:0c:6d:b0:f4:ac WPA: received EAPOL-Key frame (2/4 Pairwise)
Mon Mar 20 14:05:03 2017 daemon.debug hostapd: wlan1: STA 94:0c:6d:b0:f4:ac WPA: sending 3/4 msg of 4-Way Handshake
Mon Mar 20 14:05:03 2017 daemon.err hostapd: nl80211: EAPOL TX: No message of desired type
Mon Mar 20 14:05:03 2017 daemon.debug hostapd: wlan1: STA 94:0c:6d:b0:f4:ac WPA: ignore retransmitted EAPOL-Key 2/4 Pairwise - SNonce did not change
Mon Mar 20 14:05:03 2017 daemon.debug hostapd: wlan1: STA 94:0c:6d:b0:f4:ac WPA: EAPOL-Key timeout
Mon Mar 20 14:05:03 2017 daemon.debug hostapd: wlan1: STA 94:0c:6d:b0:f4:ac WPA: sending 3/4 msg of 4-Way Handshake
Mon Mar 20 14:05:03 2017 daemon.debug hostapd: wlan1: STA 94:0c:6d:b0:f4:ac WPA: received EAPOL-Key frame (4/4 Pairwise)
Mon Mar 20 14:05:03 2017 daemon.notice hostapd: wlan1: AP-STA-CONNECTED 94:0c:6d:b0:f4:ac
Mon Mar 20 14:05:03 2017 daemon.debug hostapd: wlan1: STA 94:0c:6d:b0:f4:ac IEEE 802.1X: authorizing port
Mon Mar 20 14:05:03 2017 daemon.info hostapd: wlan1: STA 94:0c:6d:b0:f4:ac RADIUS: starting accounting session 7797AE68AEE646F3
Mon Mar 20 14:05:03 2017 daemon.info hostapd: wlan1: STA 94:0c:6d:b0:f4:ac WPA: pairwise key handshake completed (RSN)
Tue Mar 21 09:58:59 2017 daemon.debug hostapd: wlan1: STA 94:0c:6d:b0:f4:ac IEEE 802.11: authentication OK (open system)
Tue Mar 21 09:58:59 2017 daemon.debug hostapd: wlan1: STA 94:0c:6d:b0:f4:ac WPA: event 0 notification
Tue Mar 21 09:58:59 2017 daemon.debug hostapd: wlan1: STA 94:0c:6d:b0:f4:ac MLME: MLME-AUTHENTICATE.indication(94:0c:6d:b0:f4:ac, OPEN_SYSTEM)
Tue Mar 21 09:58:59 2017 daemon.debug hostapd: wlan1: STA 94:0c:6d:b0:f4:ac MLME: MLME-DELETEKEYS.request(94:0c:6d:b0:f4:ac)
Tue Mar 21 09:58:59 2017 daemon.info hostapd: wlan1: STA 94:0c:6d:b0:f4:ac IEEE 802.11: authenticated
Tue Mar 21 09:58:59 2017 daemon.debug hostapd: wlan1: STA 94:0c:6d:b0:f4:ac IEEE 802.11: association OK (aid 1)
Tue Mar 21 09:58:59 2017 daemon.info hostapd: wlan1: STA 94:0c:6d:b0:f4:ac IEEE 802.11: associated (aid 1)

I think the error Mon Mar 20 14:05:03 2017 daemon.err hostapd: nl80211: EAPOL TX: No message of desired type has something to do with WDS not working?.

If there is any other info, tests etc you require feel free to ask.

05.02.20192101Base systemBug ReportVery LowHighWDS bridge and PPPoE MTU problemAllUnconfirmed Task Description

Device: Netgear R7800
This issue is not present with original Netgear firmware and is not present with LEDE 17 (older kernel).

Preface:
I have very strange issue with interfaces MTU and it looks to be introduced with newer kernel (4.14).

My network is attached as a png:
1. my ISP uses VDSL, i just have a PPPoE (MTU=1492) on the ethernet interface through the ISP modem
2. all other internal clients and routers interfaces have MTU=1500

Ping from R7800 to 1.1.1.1 with 2000 packet size and fragmentation allowed = success
Ping from ArcherC7v2 to R7800 with 2000 packet size and fragmentation allowed = success
Ping from PC1 to R7800 with 2000 packet size and fragmentation allowed = success
Ping from PC2 to R7800 with 2000 packet size and fragmentation allowed = success
Ping from PC1 to 1.1.1.1 with 2000 packet size and fragmentation allowed = failure
Ping from PC2 to 1.1.1.1 with 2000 packet size and fragmentation allowed = success

Now the fun part:
Ping from PC1 to 1.1.1.1 with 1473 packet size and fragmentation allowed = failure
Ping from PC1 to 1.1.1.1 with 1472 packet size (1492-20) and fragmentation allowed = success

It seems a WDS (4addr) problem combined with PPPoE being at MTU=1492 at this point, but:
Ping from ArcherC7v2 to 1.1.1.1 with 2000 packet size and fragmentation allowed = success

I’ve messed up with MTU on all the interfaces, the only thing that fix the issue is setting the br-lan interface of the R7800 to MTU=1491, as soon as the bridge has MTU>1491 the pings fail.

R7800 network config

config switch
        option name 'switch0'
        option reset '1'
        option enable_vlan '1'

config switch_vlan
        option device 'switch0'
        option vlan '1'
        option ports '1 2 3 4 6t'

config switch_vlan
        option device 'switch0'
        option vlan '2'
        option ports '5 0t'

config interface 'lan'
        option type 'bridge'
        option proto 'static'
        option ipaddr '192.168.1.1'
        option netmask '255.255.255.0'
        option ip6assign '60'
        option stp '1'
        option mtu '1500'
        option ifname 'eth1.1'

config interface 'TIM_FTTC'
        option proto 'pppoe'
        option ifname 'eth0.2'
        option username '***'
        option password '***'
        option ipv6 'auto'
        option metric '1'
        option peerdns '0'
        option keepalive '5 6'

R7800 wireless config

config wifi-device 'radio0'
        option type 'mac80211'
        option hwmode '11a'
        option path 'soc/1b500000.pci/pci0000:00/0000:00:00.0/0000:01:00.0'
        option htmode 'VHT80'
        option channel '136'
        option txpower '23'
        option country 'US'
        option legacy_rates '0'
        option noscan '1'

config wifi-iface 'default_radio0'
        option device 'radio0'
        option mode 'ap'
        option ssid '***'
        option encryption 'psk2+ccmp'
        option key '***'
        option wps_pushbutton '0'
        option network 'lan'
        option wds '1'

ArcherC7v2 network config

config switch
        option name 'switch0'
        option reset '1'
        option enable_vlan '1'

config switch_vlan
        option device 'switch0'
        option vlan '1'
        option ports '1 2 3 4 6t'

config switch_vlan
        option device 'switch0'
        option vlan '2'
        option ports '5 0t'

config interface 'lan'
        option type 'bridge'
        option proto 'static'
        option ipaddr '192.168.1.2'
        option netmask '255.255.255.0'
        option stp '1'
        option mtu '1500'
        option ifname 'eth1.1'

ArcherC7v2 wireless config

config wifi-device 'radio0'
        option type 'mac80211'
        option channel '36'
        option hwmode '11a'
        option path 'pci0000:01/0000:01:00.0'
        option htmode 'VHT80'
        option txpower '23'
        option country 'US'
        option legacy_rates '0'
        option noscan '1'

config wifi-iface 'default_radio0'
        option device 'radio0'
        option mode 'sta'
        option wds '1'
        option ssid '***'
        option encryption 'psk2+ccmp'
        option key '***'
        option wps_pushbutton '0'
        option network 'lan'

WAN zone on firewall on R7800 has

option mtu_fix '1'
25.07.20192407Base systemBug ReportVery LowLowwdr3600 5ghz wireless keeps cutting outTrunkUnconfirmed Task Description

Supply the following if possible:

- Device problem occurs on
TL WDR3600 v1

- Software versions of OpenWrt/LEDE release, packages, etc.
Powered by LuCI Master (git-19.204.23774-bd44189) / OpenWrt SNAPSHOT r10574-273b803623 (also tried with 18.06.01 & 02 & 04)
Atheros AR9580

- Steps to reproduce

 

Set up Wireless 5g to Canada, N mode, auto channel, auto power, 20 Mhz width.

wireless wlan1 will not associate.

root@OpenWrt:~# iwinfo wlan1 info
wlan1 ESSID: “Wrigley5”

        Access Point: E8:DE:27:FF:9F:99
        Mode: Master  Channel: 149 (5.745 GHz)
        Tx-Power: 19 dBm  Link Quality: unknown/70
        Signal: unknown  Noise: -95 dBm
        Bit Rate: unknown
        Encryption: WPA2 PSK (CCMP)
        Type: nl80211  HW Mode(s): 802.11an
        Hardware: 168C:0033 168C:A120 [Atheros AR9580]
        TX power offset: none
        Frequency offset: none
        Supports VAPs: yes  PHY name: phy1
06.10.20214065Base systemBug ReportVery LowHighWD mynet n750 experiences wifi hw failure with default ...AllUnconfirmed Task Description

Devince: WD mynet n750

SW versions: All openwrt builds (latest tried: OpenWrt 21.02.0-rc4, r16256-2d5ee43dc6)

Severity: High, due to difficulty to diagnose (took months of experimentation), and catastrophic outcome for most users (deeming router broken and throwing it away). Moreover the fix should take a few minutes (see below).

Summary: Default Wifi TX strength of 20dbm or higher causes wifi failures within a few weeks. Default value should be changed to 19dbm.

Description: This has been verified on 3 WD mynet n750 routers. The WD mynet n600 series does not exhibit this problem.

Default setting of WiFi TX power 20dbm on World setting and especially 22db setting on USA setting make the WiFi hardware in these routers unstable. They fail within a timeframe of 1 to 14 days.

Symptom of failure is that while WiFi connection to the router is stable it does not send any traffic to the device. Recovery can be done via power cycling the router or running “wifi off && wifi on” via SSH. This failure appears to be isolated to WiFi hardware as RJ45 connections to the router continue to operate without any issues.

Fix: Set default value of OpenWRT for these routers to 19dbm TX power. Most will never play with this setting and wont know to change it, instead when their wifi fails they will throw away the router as broken. Seeing how most wifi cliets transmit in 14-16dbm range this change should not make any difference on wifi range/strength. So this change should only improve stability and has no downsides.

08.07.20213921Base systemBug ReportVery LowHighWAVLINK WL-WN577A2 (Maginon WLR-755AC) still crashes un...openwrt-21.02Unconfirmed Task Description

Device problem occurs on: WAVLINK WL-WN577A2 / Maginon WL-755 / Winstars WS-WN577A2 / Winstars WS-WN566A2 (MT7628AN)

Software versions of OpenWrt/LEDE release, packages, etc.:
all released till now! (testet lately with 20.01-rc3-snapshot again)

Problem:

The WLR755AC-Device regulary crashes under high load (LAN → WLAN) when using OpenWRT (latest 20.01-rc3 snapshot).
Using the stock firmware the issue does not occur.

With normal or low load the device works relieable and stable.

But when put under high load like playing a fullhd video, copying a lot of data and iperf simultaneously over WLAN the device will crash after a while.
The surface of the case will get palpable warm.

As there are only (too) very few venting holes on the downside of the device I assumed this could be the cause for the crash. It is not I proofed:

I opened the case (two screws on the bottom and four plastic clamps, two on very long side, sits very tight but can be removed without breaking the brackets if you work carful) and tried again with the case open:

Too put load on the device I copied a 3GB directory with mp3 files and startet iperf:

Device crashed after a few minutes, wlan does not come up again. Had to hard-reset (powercycle).

Active cooling:

Put a big office-fan right in front of the opened device:

Same result, device crashed after a few minutes but wlan came back by itself this time.

So the issue is NOT related to overheating but to some bug relatet to OpenWRT.

# iperf -c 192.168.200.14 -i 5 -t300
[  3] 215.0-220.0 sec  34.2 MBytes  57.5 Mbits/sec
[  3] 220.0-225.0 sec  34.2 MBytes  57.5 Mbits/sec
[  3] 225.0-230.0 sec  28.0 MBytes  46.9 Mbits/sec
[  3] 230.0-235.0 sec  1.12 MBytes  1.88 Mbits/sec
[  3] 235.0-240.0 sec  0.00 Bytes  0.00 bits/sec
[  3] 240.0-245.0 sec  0.00 Bytes  0.00 bits/sec
[  3] 245.0-250.0 sec  0.00 Bytes  0.00 bits/sec
15.05.20213812Base systemBug ReportVery LowMediumWAVLINK WL-WN570HA1 low txpower activate amplifier v...AllUnconfirmed Task Description

Device : WAVLINK WL-WN570HA1

Firmwareversion : all (19.07.7)

At this moment it is impossible to use the full txpower of the WN570HA1 on both bands (2,4Ghz and 5Ghz).
Possible txpower at the moment:
2,4 Ghz —>24dbm (should have at least 27dbm)
5 Ghz —> 11 dbm or 13 dbm (can`t remember right now)

Is it possible, that the device uses an external amplifier which has to be activated via gpio settings?

Referring to this post for the Asus Lyra 2200, could some sort of same method activate the amp in the WN570HA1 ?
https://forum.openwrt.org/t/asus-map-ac2200-low-transmit-receive-signal-5ghz/69005

I hope that one or two replies from more experienced users/programmers could lead us in the right direction.
Thanks in advance.


19.09.20214045Base systemBug ReportVery LowLowwarning: ieee80211_ibss_leave on MT7603eTrunkUnconfirmed Task Description

TP-Link Archer C6U v1 with r17531+27-f413e4835e
This happens sometimes, wifi still works.

[ 4448.062956] ------------[ cut here ]------------
[ 4448.067748] WARNING: CPU: 3 PID: 4256 at backports-5.10.42-1/net/mac80211/ibss.c:1088 ieee80211_s1g_sta_rate_init+0x20a0/0x20e0 [mac80211]
[ 4448.080220] Modules linked in: xt_connlimit nf_conncount iptable_nat xt_state xt_nat xt_helper xt_conntrack xt_connmark xt_connbytes xt_REDIRECT xt_NETMAP xt_MASQUERADE xt_FLOWOFFLOAD xt_CT nf_nat nf_flow_table_hw nf_flow_table nf_conntrack mt7615e mt7615_common mt7603e mt76_connac_lib mt76 mac80211 ipt_REJECT cfg80211 xt_time xt_tcpudp xt_tcpmss xt_statistic xt_recent xt_multiport xt_mark xt_mac xt_limit xt_length xt_hl xt_ecn xt_dscp xt_comment xt_TCPMSS xt_LOG xt_HL xt_DSCP xt_CLASSIFY ums_usbat ums_sddr55 ums_sddr09 ums_karma ums_jumpshot ums_isd200 ums_freecom ums_datafab ums_cypress ums_alauda nf_reject_ipv4 nf_log_ipv4 nf_defrag_ipv6 nf_defrag_ipv4 macvlan iptable_raw iptable_mangle iptable_filter ipt_ECN ip_tables hwmon compat sch_sfq sch_red sch_prio sch_pie sch_multiq sch_gred sch_fq sch_dsmark sch_codel em_text em_nbyte em_meta em_cmp act_simple act_police act_pedit act_ipt act_csum libcrc32c sch_tbf sch_ingress sch_htb sch_hfsc em_u32 cls_u32 cls_tcindex cls_route cls_matchall
[ 4448.080490]  cls_fw cls_flow cls_basic act_skbedit act_mirred act_gact ledtrig_usbport nf_log_ipv6 nf_log_common ip6table_mangle ip6table_filter ip6_tables ip6t_REJECT x_tables nf_reject_ipv6 nls_utf8 sha256_generic libsha256 seqiv jitterentropy_rng drbg hmac ghash_generic gf128mul gcm ctr cmac ccm zram zsmalloc usb_storage leds_gpio xhci_plat_hcd xhci_pci xhci_mtk xhci_hcd scsi_mod gpio_button_hotplug mbcache usbcore nls_base usb_common crc32c_generic [last unloaded: sd_mod]
[ 4448.210065] CPU: 3 PID: 4256 Comm: kworker/u8:0 Not tainted 5.4.145 #0
[ 4448.216732] Workqueue: phy0 ieee80211_ibss_leave [mac80211]
[ 4448.222293] Stack : 80695174 86aa7a54 80710000 806a53e0 80760000 872ccf00 863180e0 00000009
[ 4448.230615]         8707f528 863dcc20 8554b050 8007c1c4 00000003 00000001 86aa7a10 24130241
[ 4448.238936]         00000000 00000000 00000000 00000000 0000005d 00000189 7362695f 656c5f73
[ 4448.247257]         00000000 86aa7921 ffffffff ffffffff 00000000 00000001 00000000 863180e0
[ 4448.255582]         00000009 8707f528 863dcc20 8554b050 00000002 80392ac0 0000000c 808b000c
[ 4448.263908]         ...
[ 4448.266344] Call Trace:
[ 4448.268805] [<8000b48c>] show_stack+0x30/0x100
[ 4448.273238] [<805eb018>] dump_stack+0x9c/0xc8
[ 4448.277593] [<8002b9f8>] __warn+0xcc/0x118
[ 4448.281670] [<8002baa0>] warn_slowpath_fmt+0x5c/0xac
[ 4448.286748] [<863180e0>] ieee80211_s1g_sta_rate_init+0x20a0/0x20e0 [mac80211]
[ 4448.294066] ---[ end trace e40068322c652878 ]---

relevant wifi config:

wireless.radio0=wifi-device  
wireless.radio0.type='mac80211'
wireless.radio0.country='US' 
wireless.radio0.frag='off'   
wireless.radio0.path='1e140000.pcie/pci0000:00/0000:00:00.0/0000:01:00.0'
wireless.radio0.band='2g'
wireless.radio0.htmode='HT20'
wireless.radio0.chanbw='20'  
wireless.radio0.channel='5'  
wireless.radio0.distance='100'
wireless.radio0.beacon_int='250'
wireless.radio0.txpower='20'

wireless.@wifi-iface[0]=wifi-iface
wireless.@wifi-iface[0].device='radio0'
wireless.@wifi-iface[0].network='wlanadhoc'
wireless.@wifi-iface[0].mode='adhoc'
wireless.@wifi-iface[0].mcast_rate='6000'
wireless.@wifi-iface[0].bssid='02:ca:ff:ee:ba:be'
wireless.@wifi-iface[0].macaddr='3c:84:6a:8c:75:79'
wireless.@wifi-iface[0].ssid='ffintern.2GHz'

wireless.@wifi-iface[1]=wifi-iface
wireless.@wifi-iface[1].device='radio0'
wireless.@wifi-iface[1].network='wlan'
wireless.@wifi-iface[1].encryption='none'
wireless.@wifi-iface[1].mode='ap'
wireless.@wifi-iface[1].max_inactivity='15'
wireless.@wifi-iface[1].ssid='weimar.freifunk.net'
wireless.@wifi-iface[1].macaddr='3e:84:6a:8c:75:79'
wireless.@wifi-iface[1].disassoc_low_ack='1'
22.03.20213700KernelBug ReportVery LowMediumWARNING: CPU: 0 PID: 840 at backports-5.10.16-1/net/mac...TrunkUnconfirmed Task Description

Supply the following if possible:
- newifiD2
- gcc version 8.4.0 (OpenWrt GCC 8.4.0 r15880-8d8125a43b
[16571.958211] ————[ cut here ]———— [16571.962917] WARNING: CPU: 0 PID: 840 at backports-5.10.16-1/net/mac80211/tx.c:955 ieee80211_proberesp_get+0x9dc/0xa28 [mac80211]
[16571.974474] Modules linked in: xt_connlimit pppoe ppp_async nf_conncount iptable_nat xt_state xt_nat xt_helper xt_conntrack xt_connmark xt_connbytes xt_REDIRECT xt_MASQUERADE xt_FLOWOFFLOAD xt_CT pppox ppp_generic nf_nat nf_flow_table_hw nf_flow_table nf_conntrack_rtcache nf_conntrack_netlink nf_conntrack mt76x2e mt76x2_common mt76x02_lib mt7603e mt76 mac80211 ipt_REJECT cfg80211 xt_time xt_tcpudp xt_tcpmss xt_statistic xt_recent xt_multiport xt_mark xt_mac xt_limit xt_length xt_hl xt_ecn xt_dscp xt_comment xt_TCPMSS xt_LOG xt_HL xt_DSCP xt_CLASSIFY slhc nf_reject_ipv4 nf_log_ipv4 nf_defrag_ipv6 nf_defrag_ipv4 iptable_raw iptable_mangle iptable_filter ipt_ECN ip_tables crc_ccitt compat ledtrig_usbport xt_set ip_set_list_set ip_set_hash_netportnet ip_set_hash_netport ip_set_hash_netnet ip_set_hash_netiface ip_set_hash_net ip_set_hash_mac ip_set_hash_ipportnet ip_set_hash_ipportip ip_set_hash_ipport ip_set_hash_ipmark ip_set_hash_ip ip_set_bitmap_port ip_set_bitmap_ipmac ip_set_bitmap_ip
[16571.974728] ip_set nfnetlink nf_log_ipv6 nf_log_common ip6table_mangle ip6table_filter ip6_tables ip6t_REJECT x_tables nf_reject_ipv6 leds_gpio xhci_plat_hcd xhci_pci xhci_mtk xhci_hcd gpio_button_hotplug usbcore nls_base usb_common
[16572.082502] CPU: 0 PID: 840 Comm: mt76-tx phy1 Tainted: G W 5.4.106 #0
[16572.090296] Stack : 8e89bda4 8007d508 806a0000 806a4994 80710000 806a495c 806a3ab0 8e89bc1c
[16572.098631] 80840000 8ff379c4 806eed03 80638c50 00000000 00000001 8e89bbc0 9e4229cd
[16572.106965] 00000000 00000000 80880000 00000000 30232036 000003bb 20202020 2e352020
[16572.115298] 00000000 00000338 00000000 00014246 00000000 80710000 00000000 8ef35b90
[16572.123631] 00000009 0000001b 8e89bda8 8edf8c20 00000000 80342e8c 00000000 80840000
[16572.131964] ...
[16572.134402] Call Trace:
[16572.136863] [<8000b64c>] show_stack+0×30/0×100 [16572.141298] [<8057dd80>] dump_stack+0xa4/0xdc
[16572.145653] [<8002bfe8>] warn+0xc0/0x10c
[16572.149738] [<8002c090>] warn_slowpath_fmt+0x5c/0xac
[16572.154807] [<8ef35b90>] ieee80211_proberesp_get+0x9dc/0xa28 [mac80211]
[16572.161622] —[ end trace 79d7d105bb818706 ]— [16572.667050] ————[ cut here ]———— [16572.671880] WARNING: CPU: 0 PID: 840 at backports-5.10.16-1/net/mac80211/tx.c:955 ieee80211_proberesp_get+0x9dc/0xa28 [mac80211]
[16572.683450] Modules linked in: xt_connlimit pppoe ppp_async nf_conncount iptable_nat xt_state xt_nat xt_helper xt_conntrack xt_connmark xt_connbytes xt_REDIRECT xt_MASQUERADE xt_FLOWOFFLOAD xt_CT pppox ppp_generic nf_nat nf_flow_table_hw nf_flow_table nf_conntrack_rtcache nf_conntrack_netlink nf_conntrack mt76x2e mt76x2_common mt76x02_lib mt7603e mt76 mac80211 ipt_REJECT cfg80211 xt_time xt_tcpudp xt_tcpmss xt_statistic xt_recent xt_multiport xt_mark xt_mac xt_limit xt_length xt_hl xt_ecn xt_dscp xt_comment xt_TCPMSS xt_LOG xt_HL xt_DSCP xt_CLASSIFY slhc nf_reject_ipv4 nf_log_ipv4 nf_defrag_ipv6 nf_defrag_ipv4 iptable_raw iptable_mangle iptable_filter ipt_ECN ip_tables crc_ccitt compat ledtrig_usbport xt_set ip_set_list_set ip_set_hash_netportnet ip_set_hash_netport ip_set_hash_netnet ip_set_hash_netiface ip_set_hash_net ip_set_hash_mac ip_set_hash_ipportnet ip_set_hash_ipportip ip_set_hash_ipport ip_set_hash_ipmark ip_set_hash_ip ip_set_bitmap_port ip_set_bitmap_ipmac ip_set_bitmap_ip
[16572.683640] ip_set nfnetlink nf_log_ipv6 nf_log_common ip6table_mangle ip6table_filter ip6_tables ip6t_REJECT x_tables nf_reject_ipv6 leds_gpio xhci_plat_hcd xhci_pci xhci_mtk xhci_hcd gpio_button_hotplug usbcore nls_base usb_common
[16572.791477] CPU: 0 PID: 840 Comm: mt76-tx phy1 Tainted: G W 5.4.106 #0
[16572.799273] Stack : 8e89bda4 8007d508 806a0000 806a4994 80710000 806a495c 806a3ab0 8e89bc1c
[16572.807610] 80840000 8ff379c4 806eed03 80638c50 00000000 00000001 8e89bbc0 9e4229cd
[16572.815944] 00000000 00000000 80880000 00000000 30232036 000003cd 20202020 2e352020
[16572.824277] 00000000 00000338 00000000 000c13b5 00000000 80710000 00000000 8ef35b90
[16572.832608] 00000009 0000001b 8e89bda8 8edf8c20 00000000 80342e8c 00000000 80840000
[16572.840941] ...
[16572.843380] Call Trace:
[16572.845850] [<8000b64c>] show_stack+0×30/0×100 [16572.850290] [<8057dd80>] dump_stack+0xa4/0xdc
[16572.854651] [<8002bfe8>]
warn+0xc0/0x10c
[16572.858737] [<8002c090>] warn_slowpath_fmt+0x5c/0xac
[16572.863851] [<8ef35b90>] ieee80211_proberesp_get+0x9dc/0xa28 [mac80211]
[16572.870681] —[ end trace 79d7d105bb818707 ]— [16572.875324] ————[ cut here ]———— [16572.880024] WARNING: CPU: 0 PID: 840 at backports-5.10.16-1/net/mac80211/tx.c:955 ieee80211_proberesp_get+0x9dc/0xa28 [mac80211]
[16572.891588] Modules linked in: xt_connlimit pppoe ppp_async nf_conncount iptable_nat xt_state xt_nat xt_helper xt_conntrack xt_connmark xt_connbytes xt_REDIRECT xt_MASQUERADE xt_FLOWOFFLOAD xt_CT pppox ppp_generic nf_nat nf_flow_table_hw nf_flow_table nf_conntrack_rtcache nf_conntrack_netlink nf_conntrack mt76x2e mt76x2_common mt76x02_lib mt7603e mt76 mac80211 ipt_REJECT cfg80211 xt_time xt_tcpudp xt_tcpmss xt_statistic xt_recent xt_multiport xt_mark xt_mac xt_limit xt_length xt_hl xt_ecn xt_dscp xt_comment xt_TCPMSS xt_LOG xt_HL xt_DSCP xt_CLASSIFY slhc nf_reject_ipv4 nf_log_ipv4 nf_defrag_ipv6 nf_defrag_ipv4 iptable_raw iptable_mangle iptable_filter ipt_ECN ip_tables crc_ccitt compat ledtrig_usbport xt_set ip_set_list_set ip_set_hash_netportnet ip_set_hash_netport ip_set_hash_netnet ip_set_hash_netiface ip_set_hash_net ip_set_hash_mac ip_set_hash_ipportnet ip_set_hash_ipportip ip_set_hash_ipport ip_set_hash_ipmark ip_set_hash_ip ip_set_bitmap_port ip_set_bitmap_ipmac ip_set_bitmap_ip
[16572.891843] ip_set nfnetlink nf_log_ipv6 nf_log_common ip6table_mangle ip6table_filter ip6_tables ip6t_REJECT x_tables nf_reject_ipv6 leds_gpio xhci_plat_hcd xhci_pci xhci_mtk xhci_hcd gpio_button_hotplug usbcore nls_base usb_common
[16572.999618] CPU: 0 PID: 840 Comm: mt76-tx phy1 Tainted: G W 5.4.106 #0
[16573.007411] Stack : 8e89bda4 8007d508 806a0000 806a4994 80710000 806a495c 806a3ab0 8e89bc1c
[16573.015747] 80840000 8ff379c4 806eed03 80638c50 00000000 00000001 8e89bbc0 9e4229cd
[16573.024081] 00000000 00000000 80880000 00000000 30232036 000003df 20202020 2e352020
[16573.032414] 00000000 00000338 00000000 000f40c2 00000000 80710000 00000000 8ef35b90
[16573.040746] 00000009 0000001b 8e89bda8 8edf8c20 00000000 80342e8c 00000000 80840000
[16573.049078] ...
[16573.051517] Call Trace:
[16573.053979] [<8000b64c>] show_stack+0×30/0×100 [16573.058416] [<8057dd80>] dump_stack+0xa4/0xdc
[16573.062770] [<8002bfe8>] __warn+0xc0/0x10c
[16573.066856] [<8002c090>] warn_slowpath_fmt+0x5c/0xac
[16573.071928] [<8ef35b90>] ieee80211_proberesp_get+0x9dc/0xa28 [mac80211]
[16573.078762] —[ end trace 79d7d105bb818708 ]— [16573.083406] ————[ cut here ]————


27.05.20203130KernelBug ReportVery LowMediumWARNING: CPU: 0 PID: 2865 at net/core/flow_dissector.c:...TrunkUnconfirmed Task Description

Supply the following if possible:
- Device problem occurs on

Linksys EA8500

- Software versions of OpenWrt/LEDE release, packages, etc.

OpenWrt SNAPSHOT r13373-e8fbb98c6d

- Steps to reproduce

Run dmesg and look for this exception stack. The system appears to run normally after boot.

[ 43.556644] ————[ cut here ]———— [ 43.556725] WARNING: CPU: 0 PID: 2865 at net/core/flow_dissector.c:942 skb_flow_dissect+0×448/0x156c
[ 43.560479] Modules linked in: ath10k_pci ath10k_core ath mac80211 iptable_nat ipt_REJECT cfg80211 xt_time xt_tcpudp xt_tcpmss xt_statistic xt_state xt_recent xt_policy xt_nat xt_multiport xt_mark xt_mac xt_limit xt_length xt_hl xt_helper xt_esp xt_ecn xt_dscp xt_conntrack xt_connmark xt_connlimit xt_connbytes xt_comment xt_TCPMSS xt_REDIRECT xt_MASQUERADE xt_LOG xt_HL xt_FLOWOFFLOAD xt_DSCP xt_CT xt_CLASSIFY nf_reject_ipv4 nf_nat nf_log_ipv4 nf_flow_table_hw nf_flow_table nf_conntrack_rtcache nf_conntrack_netlink nf_conncount iptable_raw iptable_mangle iptable_filter ipt_ah ipt_ECN ip_tables compat br_netfilter fuse act_connmark nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 sch_tbf sch_ingress sch_htb sch_hfsc em_u32 cls_u32 cls_tcindex cls_route cls_matchall cls_fw cls_flow cls_basic act_skbedit act_mirred ledtrig_usbport ledtrig_heartbeat xt_set ip_set_list_set ip_set_hash_netportnet ip_set_hash_netport ip_set_hash_netnet ip_set_hash_netiface ip_set_hash_net ip_set_hash_mac
[ 43.560909] ip_set_hash_ipportnet ip_set_hash_ipportip ip_set_hash_ipport ip_set_hash_ipmark ip_set_hash_ip ip_set_bitmap_port ip_set_bitmap_ipmac ip_set_bitmap_ip ip_set nfnetlink nf_log_ipv6 nf_log_common ip6table_mangle ip6table_filter ip6_tables ip6t_REJECT x_tables nf_reject_ipv6 ifb ipcomp6 xfrm6_tunnel esp6 ah6 xfrm4_tunnel ipcomp esp4 ah4 tunnel6 tunnel4 tun xfrm_user xfrm_ipcomp af_key xfrm_algo vfat fat ntfs nls_utf8 nls_iso8859_1 nls_cp437 sha1_generic md5 echainiv des_generic libdes cbc authenc usb_storage leds_gpio xhci_plat_hcd xhci_pci xhci_hcd dwc3 dwc3_qcom ohci_platform ohci_hcd phy_qcom_dwc3 ahci fsl_mph_dr_of ehci_platform ehci_fsl sd_mod ahci_platform libahci_platform libahci libata scsi_mod ehci_hcd gpio_button_hotplug ext4 mbcache jbd2 exfat(C) crc32c_generic
[ 43.702907] CPU: 0 PID: 2865 Comm: charon Tainted: G C 5.4.42 #0
[ 43.725016] Hardware name: Generic DT based system
[ 43.732162] [<c030f954>] (unwind_backtrace) from [<c030b96c>] (show_stack+0×14/0×20)
[ 43.737012] [<c030b96c>] (show_stack) from [<c08c61e0>] (dump_stack+0×94/0xa8)
[ 43.744922] [<c08c61e0>] (dump_stack) from [<c031e7c0>] (
warn+0xb4/0xd0)
[ 43.751944] [<c031e7c0>] (warn) from [<c031e82c>] (warn_slowpath_fmt+0×50/0×90)
[ 43.758805] [<c031e82c>] (warn_slowpath_fmt) from [<c075aa10>] (
skb_flow_dissect+0×448/0x156c)
[ 43.766357] [<c075aa10>] (skb_flow_dissect) from [<c075bfd0>] (skb_get_hash_perturb+0x6c/0x1ac)
[ 43.775380] [<c075bfd0>] (skb_get_hash_perturb) from [<bf63dc80>] (ieee80211_reserve_tid+0xb50/0xf74 [mac80211])
[ 43.784311] [<bf63dc80>] (ieee80211_reserve_tid [mac80211]) from [<bf642154>] (ieee80211_tx_prepare_skb+0x23c/0×294 [mac80211])
[ 43.794456] [<bf642154>] (ieee80211_tx_prepare_skb [mac80211]) from [<bf643e6c>] (ieee80211_tx_pending+0xc4/0×294 [mac80211])
[ 43.805544] [<bf643e6c>] (ieee80211_tx_pending [mac80211]) from [<c0322740>] (tasklet_action_common.constprop.3+0×74/0x10c)
[ 43.816879] [<c0322740>] (tasklet_action_common.constprop.3) from [<c0302298>] (
do_softirq+0×130/0x2d4)
[ 43.827812] [<c0302298>] (do_softirq) from [<c0322948>] (do_softirq.part.2+0×48/0×58)
[ 43.837524] [<c0322948>] (do_softirq.part.2) from [<c0322a30>] (
local_bh_enable_ip+0xd8/0xe8)
[ 43.845354] [<c0322a30>] (__local_bh_enable_ip) from [<c08974e4>] (packet_poll+0×84/0×118)
[ 43.854038] [<c08974e4>] (packet_poll) from [<c0740fcc>] (sock_poll+0×98/0xc0)
[ 43.862370] [<c0740fcc>] (sock_poll) from [<c04647b0>] (do_sys_poll+0x2f0/0×558)
[ 43.869576] [<c04647b0>] (do_sys_poll) from [<c046552c>] (sys_poll+0×24/0×120)
[ 43.877118] [<c046552c>] (sys_poll) from [<c0301000>] (ret_fast_syscall+0×0/0×54)
[ 43.884136] Exception stack(0xd8fabfa8 to 0xd8fabff0)
[ 43.891708] bfa0: 00000000 00000000 b6920c40 00000006 ffffffff 00000000
[ 43.896756] bfc0: 00000000 00000000 012b4470 000000a8 b6920ce8 b6f3a8a4 b6920c40 b6920cbc
[ 43.904896] bfe0: b6920c00 b6920bf0 b6f8d5cc b6f8caa4
[ 43.913185] —[ end trace 36ce985abed2ad7b ]—


03.12.20203486KernelBug ReportVery LowLowWARNING: ath10k-4.19/htt_rx.c:1206 0xbf3b1be0 [ath10k_c...openwrt-19.07Unconfirmed Task Description

Supply the following if possible:
- Device problem occurs on: Netgear R7800

- Software versions of OpenWrt/LEDE release, packages, etc:
cat /etc/*-release
NAME=”OpenWrt” VERSION=”19.07.3” ID=”openwrt” ID_LIKE=”lede openwrt” PRETTY_NAME=”OpenWrt 19.07.3” VERSION_ID=”19.07.3” HOME_URL=”https://openwrt.org/” BUG_URL=”https://bugs.openwrt.org/” SUPPORT_URL=”https://forum.openwrt.org/” BUILD_ID=”r11063-85e04e9f46” OPENWRT_BOARD=”ipq806x/generic” OPENWRT_ARCH=”arm_cortex-a15_neon-vfpv4” OPENWRT_TAINTS=”” OPENWRT_DEVICE_MANUFACTURER=”OpenWrt” OPENWRT_DEVICE_MANUFACTURER_URL=”https://openwrt.org/” OPENWRT_DEVICE_PRODUCT=”Generic” OPENWRT_DEVICE_REVISION=”v0” OPENWRT_RELEASE=”OpenWrt 19.07.3 r11063-85e04e9f46”

- Steps to reproduce:
Cannot, sorry. It happened in the night, after a few months of uptime. I can only analyze it post factum.

I have this in the dmesg log:

[ 4778.037462] ath10k_pci 0001:01:00.0: Invalid VHT mcs 15 peer stats
[25912.740536] conntrack: generic helper won’t handle protocol 47. Please consider loading the specific helper module.
[63498.886948] ath10k_pci 0001:01:00.0: Invalid peer id 13 or peer stats buffer, peer: (null) sta: (null)
[290864.886375] ————[ cut here ]———— [290864.886409] WARNING: CPU: 0 PID: 0 at /builder/shared-workdir/build/build_dir/target-arm_cortex-a15+neon-vfpv4_musl_eabi/linux-ipq806x_generic/ath10k-ct-regular/ath10k-ct-2019-09-09-5e8cd86f/ath10k-4.19/htt_rx.c:1206 0xbf3b1be0 [ath10k_core@bf394000+0×57000]
[290864.890588] Modules linked in: pppoe ppp_async ath10k_pci ath10k_core ath pppox ppp_generic nf_conntrack_ipv6 mac80211 iptable_nat ipt_REJECT ipt_MASQUERADE cfg80211 xt_time xt_tcpudp xt_tcpmss xt_statistic xt_state xt_recent xt_nat xt_multiport xt_mark xt_mac xt_limit xt_length xt_hl xt_helper xt_ecn xt_dscp xt_conntrack xt_connmark xt_connlimit xt_connbytes xt_comment xt_TCPMSS xt_REDIRECT xt_LOG xt_HL xt_FLOWOFFLOAD xt_DSCP xt_CT xt_CLASSIFY slhc nf_reject_ipv4 nf_nat_redirect nf_nat_masquerade_ipv4 nf_conntrack_ipv4 nf_nat_ipv4 nf_nat nf_log_ipv4 nf_flow_table_hw nf_flow_table nf_defrag_ipv6 nf_defrag_ipv4 nf_conntrack_rtcache iptable_raw iptable_mangle iptable_filter ipt_ECN ip_tables crc_ccitt compat sch_cake nf_conntrack sch_tbf sch_ingress sch_htb sch_hfsc em_u32 cls_u32 cls_tcindex cls_route
[290864.961841] cls_matchall cls_fw cls_flow cls_basic act_skbedit act_mirred ledtrig_usbport nf_log_ipv6 nf_log_common ip6table_mangle ip6table_filter ip6_tables ip6t_REJECT x_tables nf_reject_ipv6 ifb tun leds_gpio xhci_plat_hcd xhci_pci xhci_hcd dwc3 dwc3_of_simple ohci_platform ohci_hcd phy_qcom_dwc3 ahci ehci_platform sd_mod ahci_platform libahci_platform libahci libata scsi_mod ehci_hcd gpio_button_hotplug
[290864.998007] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 4.14.180 #0
[290865.020175] Hardware name: Generic DT based system
[290865.026256] Function entered at [<c030f1c4>] from [<c030b390>]
[290865.031028] Function entered at [<c030b390>] from [<c07c09c4>]
[290865.036931] Function entered at [<c07c09c4>] from [<c031f878>]
[290865.042834] Function entered at [<c031f878>] from [<c031f964>]
[290865.048734] Function entered at [<c031f964>] from [<bf3b1be0>]
[290865.054681] Function entered at [<bf3b1be0>] from [<bf3b31e0>]
[290865.060543] Function entered at [<bf3b31e0>] from [<bf3b39d0>]
[290865.066444] Function entered at [<bf3b39d0>] from [<bf3ef758>]
[290865.072359] Function entered at [<bf3ef758>] from [<c06a9798>]
[290865.078250] Function entered at [<c06a9798>] from [<c03015c8>]
[290865.084152] Function entered at [<c03015c8>] from [<c0323e2c>]
[290865.090055] Function entered at [<c0323e2c>] from [<c03629d8>]
[290865.095959] Function entered at [<c03629d8>] from [<c0301488>]
[290865.101859] Function entered at [<c0301488>] from [<c030bf8c>]
[290865.107763] Exception stack(0xc0a01f48 to 0xc0a01f90)
[290865.113675] 1f40: 00000001 00000000 00000000 c0315100 ffffe000 c0a03cb8
[290865.118894] 1f60: c0a03c6c 00000000 00000000 c092ea28 00000000 00000000 c0a01f90 c0a01f98
[290865.127132] 1f80: c030854c c0308550 60000013 ffffffff
[290865.135368] Function entered at [<c030bf8c>] from [<c0308550>]
[290865.140489] Function entered at [<c0308550>] from [<c0358828>]
[290865.146306] Function entered at [<c0358828>] from [<c0358b70>]
[290865.152206] Function entered at [<c0358b70>] from [<c0900c54>]
[290865.158207] —[ end trace e3efdf73eb89c8f9 ]— [2515308.545406] ath10k_pci 0001:01:00.0: failed to increase tx pending count: -16, dropping

...then the last line repeats about a hundred times.

Clients cannot connect to 2.4GHz network.

# iwinfo
wlan0 ESSID: “redacted5”

        Access Point: DC:EF:09:DE:BD:B2
        Mode: Master  Channel: 36 (5.180 GHz)
        Tx-Power: 23 dBm  Link Quality: 52/70
        Signal: -58 dBm  Noise: -108 dBm
        Bit Rate: 753.4 MBit/s
        Encryption: WPA2 PSK (CCMP)
        Type: nl80211  HW Mode(s): 802.11nac
        Hardware: 168C:0046 168C:CAFE [Qualcomm Atheros QCA9984]
        TX power offset: none
        Frequency offset: none
        Supports VAPs: yes  PHY name: phy0

wlan1 ESSID: “redacted24”

        Access Point: DC:EF:09:DE:BD:B3
        Mode: Master  Channel: 11 (2.462 GHz)
        Tx-Power: 30 dBm  Link Quality: unknown/70
        Signal: unknown  Noise: -101 dBm
        Bit Rate: unknown
        Encryption: mixed WPA/WPA2 PSK (CCMP)
        Type: nl80211  HW Mode(s): 802.11bgn
        Hardware: 168C:0046 168C:CAFE [Qualcomm Atheros QCA9984]
        TX power offset: none
        Frequency offset: none
        Supports VAPs: yes  PHY name: phy1
20.04.20203023Base systemBug ReportVery LowMediumWarning CPUopenwrt-19.07Unconfirmed Task Description

Device: Mikrotik RB750Gr3
Software: OpenWrt 19.07.2 (with no default package updates yet)
Installed Packages: installed_packages.txt (attached)
How to reproduce: Unknown
Consequence: None. The device continues to operate normally.

I have removed personal information and some garbage from the log files.

Compass.

31.01.20202789KernelBug ReportVery LowLowWAN-LAN leakage during boot on Asus RT-N11PAllUnconfirmed Task Description

On Asus RT-N11P (MT7620N) not work properly DHCP. Zero-day bug. Affected all firmwares from 18.06.0 to 19.07.1. No additional packages used.

Steps to reproduce:

1: Reboot router when any OS fully loaded.
2: After reboot router give through DHCP internal ip my ISP.
3: No internet connection.

If restart OS network, router give normal ip. But if again reboot router then the problem is repeated. Its a bug MT7620N but official router firmware have solution to bypass it and DHCP gives normal ip.
For now, to bypass the bug, I use manual entry in OS network settings:

Addres 192.168.1.127
Netmask 255.255.255.0
Gateway 192.168.1.1
DNS 192.168.1.1

04.08.20203271Base systemBug ReportVery LowLowWAN-eth1 restarts constantly and stops completely after...TrunkUnconfirmed Task Description

I have a TP-link Archer C60 v1 that has a serious problem of constant disconnections every few minutes (approx 4 to 1 hour). It seems to be random, or something I’m not seeing.

Device info.

Report in the OpenWrt forum here and here.

The problem happens with official or own compilations.

root@archer_c60:~# dmesg
[    0.000000] Linux version 5.4.52 (franco@ubuntu) (gcc version 8.4.0 (OpenWrt GCC 8.4.0 r14025-009e62c92c)) #0 Mon Aug 3 21:34:34 2020
[    0.000000] printk: bootconsole [early0] enabled
[    0.000000] CPU0 revision is: 00019750 (MIPS 74Kc)
[    0.000000] MIPS: machine is TP-Link Archer C60 v1
[    0.000000] SoC: Qualcomm Atheros QCA956X ver 1 rev 0
[    0.000000] Initrd not found or empty - disabling initrd
[    0.000000] Primary instruction cache 64kB, VIPT, 4-way, linesize 32 bytes.
[    0.000000] Primary data cache 32kB, 4-way, VIPT, cache aliases, linesize 32 bytes
[    0.000000] Zone ranges:
[    0.000000]   Normal   [mem 0x0000000000000000-0x0000000003ffffff]
[    0.000000] Movable zone start for each node
[    0.000000] Early memory node ranges
[    0.000000]   node   0: [mem 0x0000000000000000-0x0000000003ffffff]
[    0.000000] Initmem setup node 0 [mem 0x0000000000000000-0x0000000003ffffff]
[    0.000000] On node 0 totalpages: 16384
[    0.000000]   Normal zone: 144 pages used for memmap
[    0.000000]   Normal zone: 0 pages reserved
[    0.000000]   Normal zone: 16384 pages, LIFO batch:3
[    0.000000] pcpu-alloc: s0 r0 d32768 u32768 alloc=1*32768
[    0.000000] pcpu-alloc: [0] 0 
[    0.000000] Built 1 zonelists, mobility grouping on.  Total pages: 16240
[    0.000000] Kernel command line: console=ttyS0,115200n8 rootfstype=squashfs,jffs2
[    0.000000] Dentry cache hash table entries: 8192 (order: 3, 32768 bytes, linear)
[    0.000000] Inode-cache hash table entries: 4096 (order: 2, 16384 bytes, linear)
[    0.000000] Writing ErrCtl register=00000000
[    0.000000] Readback ErrCtl register=00000000
[    0.000000] mem auto-init: stack:off, heap alloc:off, heap free:off
[    0.000000] Memory: 57348K/65536K available (4786K kernel code, 186K rwdata, 1112K rodata, 1204K init, 196K bss, 8188K reserved, 0K cma-reserved)
[    0.000000] SLUB: HWalign=32, Order=0-3, MinObjects=0, CPUs=1, Nodes=1
[    0.000000] NR_IRQS: 51
[    0.000000] random: get_random_bytes called from start_kernel+0x32c/0x518 with crng_init=0
[    0.000000] CPU clock: 775.000 MHz
[    0.000000] clocksource: MIPS: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 4932285024 ns
[    0.000006] sched_clock: 32 bits at 387MHz, resolution 2ns, wraps every 5541893118ns
[    0.008216] Calibrating delay loop... 385.02 BogoMIPS (lpj=770048)
[    0.046713] pid_max: default: 32768 minimum: 301
[    0.051703] Mount-cache hash table entries: 1024 (order: 0, 4096 bytes, linear)
[    0.059420] Mountpoint-cache hash table entries: 1024 (order: 0, 4096 bytes, linear)
[    0.071423] clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 7645041785100000 ns
[    0.081738] futex hash table entries: 256 (order: -1, 3072 bytes, linear)
[    0.089029] pinctrl core: initialized pinctrl subsystem
[    0.095494] NET: Registered protocol family 16
[    0.129728] clocksource: Switched to clocksource MIPS
[    0.136186] NET: Registered protocol family 2
[    0.141534] tcp_listen_portaddr_hash hash table entries: 512 (order: 0, 4096 bytes, linear)
[    0.150415] TCP established hash table entries: 1024 (order: 0, 4096 bytes, linear)
[    0.158508] TCP bind hash table entries: 1024 (order: 0, 4096 bytes, linear)
[    0.165952] TCP: Hash tables configured (established 1024 bind 1024)
[    0.172784] UDP hash table entries: 256 (order: 0, 4096 bytes, linear)
[    0.179723] UDP-Lite hash table entries: 256 (order: 0, 4096 bytes, linear)
[    0.187384] NET: Registered protocol family 1
[    0.192033] PCI: CLS 0 bytes, default 32
[    0.199601] workingset: timestamp_bits=14 max_order=14 bucket_order=0
[    0.212506] squashfs: version 4.0 (2009/01/31) Phillip Lougher
[    0.218699] jffs2: version 2.2 (NAND) (SUMMARY) (LZMA) (RTIME) (CMODE_PRIORITY) (c) 2001-2006 Red Hat, Inc.
[    0.242820] pinctrl-single 1804002c.pinmux: 544 pins, size 68
[    0.249924] Serial: 8250/16550 driver, 1 ports, IRQ sharing disabled
[    0.257292] printk: console [ttyS0] disabled
[    0.261885] 18020000.uart: ttyS0 at MMIO 0x18020000 (irq = 9, base_baud = 1562500) is a 16550A
[    0.270991] printk: console [ttyS0] enabled
[    0.280058] printk: bootconsole [early0] disabled
[    0.299004] spi-nor spi0.0: gd25q64 (8192 Kbytes)
[    0.303934] 5 fixed-partitions partitions found on MTD device spi0.0
[    0.310502] Creating 5 MTD partitions on "spi0.0":
[    0.315464] 0x000000000000-0x000000010000 : "u-boot"
[    0.321473] 0x000000010000-0x000000020000 : "mac"
[    0.327179] 0x000000020000-0x0000007e0000 : "firmware"
[    0.336503] 2 uimage-fw partitions found on MTD device firmware
[    0.342670] Creating 2 MTD partitions on "firmware":
[    0.347820] 0x000000000000-0x0000001e8769 : "kernel"
[    0.353783] 0x0000001e8769-0x0000007c0000 : "rootfs"
[    0.359694] mtd: device 4 (rootfs) set to be root filesystem
[    0.367266] 1 squashfs-split partitions found on MTD device rootfs
[    0.373704] 0x000000720000-0x0000007c0000 : "rootfs_data"
[    0.380120] 0x0000007e0000-0x0000007f0000 : "tplink"
[    0.386169] 0x0000007f0000-0x000000800000 : "art"
[    0.393638] libphy: Fixed MDIO Bus: probed
[    0.730817] ag71xx 19000000.eth: Could not connect to PHY device. Deferring probe.
[    1.133724] random: fast init done
[    1.370090] libphy: ag71xx_mdio: probed
[    1.374808] libphy: ar8xxx-mdio: probed
[    1.383022] switch0: Atheros AR8229 rev. 1 switch registered on mdio.0
[    1.443277] ag71xx 1a000000.eth: connected to PHY at fixed-0:00 [uid=00000000, driver=Generic PHY]
[    1.453133] eth0: Atheros AG71xx at 0xba000000, irq 5, mode: gmii
[    1.459652] i2c /dev entries driver
[    1.465629] NET: Registered protocol family 10
[    1.475565] Segment Routing with IPv6
[    1.479506] NET: Registered protocol family 17
[    1.484184] 8021q: 802.1Q VLAN Support v1.8
[    1.489239] PCI host bridge /ahb/pcie-controller@18250000 ranges:
[    1.495606]  MEM 0x0000000012000000..0x0000000013ffffff
[    1.501011]   IO 0x0000000000000000..0x0000000000000000
[    1.506568] PCI host bridge to bus 0000:00
[    1.510837] pci_bus 0000:00: root bus resource [mem 0x12000000-0x13ffffff]
[    1.517948] pci_bus 0000:00: root bus resource [io  0x0000]
[    1.523714] pci_bus 0000:00: root bus resource [??? 0x00000000 flags 0x0]
[    1.530731] pci_bus 0000:00: No busn resource found for root bus, will use [bus 00-ff]
[    1.538945] pci 0000:00:00.0: [168c:0056] type 00 class 0x028000
[    1.545205] pci 0000:00:00.0: reg 0x10: [mem 0x00000000-0x001fffff 64bit]
[    1.552347] pci 0000:00:00.0: PME# supported from D0 D3hot
[    1.558929] pci_bus 0000:00: busn_res: [bus 00-ff] end is updated to 00
[    1.565815] pci 0000:00:00.0: BAR 0: assigned [mem 0x12000000-0x121fffff 64bit]
[    1.893261] ag71xx 19000000.eth: connected to PHY at mdio.0:1f:04 [uid=004dd042, driver=Generic PHY]
[    1.903527] eth1: Atheros AG71xx at 0xb9000000, irq 4, mode: mii
[    1.916678] VFS: Mounted root (squashfs filesystem) readonly on device 31:4.
[    1.930630] Freeing unused kernel memory: 1204K
[    1.935329] This architecture does not have kernel memory protection.
[    1.941979] Run /sbin/init as init process
[    2.603251] init: Console is alive
[    2.607070] init: - watchdog -
[    3.857698] kmodloader: loading kernel modules from /etc/modules-boot.d/*
[    3.901414] kmodloader: done loading kernel modules from /etc/modules-boot.d/*
[    3.919321] init: - preinit -
[    4.761647] random: jshn: uninitialized urandom read (4 bytes read)
[    4.866893] random: jshn: uninitialized urandom read (4 bytes read)
[    5.008869] random: jshn: uninitialized urandom read (4 bytes read)
[    5.761280] eth0: link up (1000Mbps/Full duplex)
[    5.769806] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
[    5.781838] IPv6: ADDRCONF(NETDEV_CHANGE): eth0.1: link becomes ready
[    5.821133] urandom_read: 4 callbacks suppressed
[    5.821140] random: procd: uninitialized urandom read (4 bytes read)
[   10.086330] jffs2: notice: (527) jffs2_build_xattr_subsystem: complete building xattr subsystem, 21 of xdatum (9 unchecked, 1 orphan) and 32 of xref (1 dead, 0 orphan) found.
[   10.104253] mount_root: switching to jffs2 overlay
[   10.139301] overlayfs: upper fs does not support tmpfile.
[   10.151067] urandom-seed: Seeding with /etc/urandom.seed
[   10.238894] eth0: link down
[   10.259802] procd: - early -
[   10.262927] procd: - watchdog -
[   10.866830] procd: - watchdog -
[   10.870377] procd: - ubus -
[   10.915048] random: ubusd: uninitialized urandom read (4 bytes read)
[   10.924763] random: ubusd: uninitialized urandom read (4 bytes read)
[   10.932683] procd: - init -
[   11.661864] kmodloader: loading kernel modules from /etc/modules.d/*
[   11.758839] sit: IPv6, IPv4 and MPLS over IPv4 tunneling driver
[   11.875205] Mirror/redirect action on
[   11.900395] u32 classifier
[   11.903248]     input device check on
[   11.907032]     Actions configured
[   11.942370] Loading modules backported from Linux version v5.8-rc2-0-g48778464bb7d
[   11.950239] Backport generated by backports.git v5.8-rc2-1-0-g7a69429b
[   12.015183] wireguard: WireGuard 1.0.20200729 loaded. See www.wireguard.com for information.
[   12.023954] wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved.
[   12.125541] urngd: v1.0.2 started.
[   12.154690] xt_time: kernel timezone is -0000
[   12.432978] ath10k 5.4 driver, optimized for CT firmware, probing pci device: 0x56.
[   12.441047] ath10k_mac_create, priv_size: 804  hw: (ptrval)  hw->priv: (ptrval)
[   12.454450] random: crng init done
[   12.470492] ath10k_pci 0000:00:00.0: enabling device (0000 -> 0002)
[   12.477291] ath10k_pci 0000:00:00.0: pci irq legacy oper_irq_mode 1 irq_mode 0 reset_mode 0
[   14.858841] ath10k_pci 0000:00:00.0: qca9888 hw2.0 target 0x01000000 chip_id 0x00000000 sub 0000:0000
[   14.868416] ath10k_pci 0000:00:00.0: kconfig debug 0 debugfs 1 tracing 0 dfs 1 testmode 0
[   14.888430] ath10k_pci 0000:00:00.0: firmware ver 10.4b-ct-9888-fW-013-d81f62d97 api 5 features mfp,peer-flow-ctrl,txstatus-noack,wmi-10.x-CT,ratemask-CT,regdump-CT,txrate-CT,flush-all-CT,pingpong-CT,ch-regs-CT,nop-CT,set-special-CT,tx-rc-CT,cust-stats-CT,txrate2-CT,beacon-cb-CT,wmi-block-ack-CT,wmi-bcn-rc-CT crc32 937128b4
[   15.223010] ath10k_pci 0000:00:00.0: failed to fetch board data for bus=pci,bmi-chip-id=0,bmi-board-id=20 from ath10k/QCA9888/hw2.0/board-2.bin
[   15.237129] ath10k_pci 0000:00:00.0: board_file api 1 bmi_id 0:20 crc32 8971a1b4
[   17.273475] ath10k_pci 0000:00:00.0: unsupported HTC service id: 1536
[   17.283350] ath10k_pci 0000:00:00.0: 10.4 wmi init: vdevs: 16  peers: 48  tid: 96
[   17.291138] ath10k_pci 0000:00:00.0: msdu-desc: 2500  skid: 32
[   17.321246] ath10k_pci 0000:00:00.0: wmi print 'P 48/48 V 16 K 144 PH 176 T 186  msdu-desc: 2500  sw-crypt: 0 ct-sta: 0'
[   17.332536] ath10k_pci 0000:00:00.0: wmi print 'free: 114524 iram: 12628 sram: 29508'
[   17.566737] ath10k_pci 0000:00:00.0: htt-ver 2.2 wmi-op 6 htt-op 4 cal pre-cal-file max-sta 32 raw 0 hwcrypto 1
[   17.648824] ath: EEPROM regdomain sanitized
[   17.648834] ath: EEPROM regdomain: 0x64
[   17.648837] ath: EEPROM indicates we should expect a direct regpair map
[   17.648854] ath: Country alpha2 being used: 00
[   17.648857] ath: Regpair used: 0x64
[   17.732561] ath: EEPROM regdomain sanitized
[   17.732571] ath: EEPROM regdomain: 0x64
[   17.732574] ath: EEPROM indicates we should expect a direct regpair map
[   17.732593] ath: Country alpha2 being used: 00
[   17.732596] ath: Regpair used: 0x64
[   17.744788] ieee80211 phy1: Selected rate control algorithm 'minstrel_ht'
[   17.746726] ieee80211 phy1: Atheros AR9561 Rev:0 mem=0xb8100000, irq=2
[   17.784311] kmodloader: done loading kernel modules from /etc/modules.d/*
[   29.726074] eth0: link up (1000Mbps/Full duplex)
[   29.744030] br-lan: port 1(eth0.1) entered blocking state
[   29.749664] br-lan: port 1(eth0.1) entered disabled state
[   29.755551] device eth0.1 entered promiscuous mode
[   29.760547] device eth0 entered promiscuous mode
[   29.773858] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
[   29.845863] br-lan: port 1(eth0.1) entered blocking state
[   29.851467] br-lan: port 1(eth0.1) entered forwarding state
[   30.753814] IPv6: ADDRCONF(NETDEV_CHANGE): br-lan: link becomes ready
[   32.003594] eth1: link up (100Mbps/Full duplex)
[   32.028748] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[   32.790926] ath: EEPROM regdomain: 0x8020
[   32.795121] ath: EEPROM indicates we should expect a country code
[   32.801425] ath: doing EEPROM country->regdmn map search
[   32.806913] ath: country maps to regdmn code: 0x3b
[   32.811867] ath: Country alpha2 being used: AR
[   32.816462] ath: Regpair used: 0x3b
[   32.820066] ath: regdomain 0x8020 dynamically updated by user
[   32.826071] ath: EEPROM regdomain: 0x8020
[   32.830223] ath: EEPROM indicates we should expect a country code
[   32.836514] ath: doing EEPROM country->regdmn map search
[   32.841998] ath: country maps to regdmn code: 0x3b
[   32.846944] ath: Country alpha2 being used: AR
[   32.851530] ath: Regpair used: 0x3b
[   32.855135] ath: regdomain 0x8020 dynamically updated by user
[   35.621539] br-lan: port 2(2G_ap) entered blocking state
[   35.627088] br-lan: port 2(2G_ap) entered disabled state
[   35.632889] device 2G_ap entered promiscuous mode
[   36.767071] IPv6: ADDRCONF(NETDEV_CHANGE): 2G_ap: link becomes ready
[   36.773915] br-lan: port 2(2G_ap) entered blocking state
[   36.779457] br-lan: port 2(2G_ap) entered forwarding state
[   39.593566] ath10k_pci 0000:00:00.0: unsupported HTC service id: 1536
[   39.600391] ath10k_pci 0000:00:00.0: 10.4 wmi init: vdevs: 16  peers: 48  tid: 96
[   39.608239] ath10k_pci 0000:00:00.0: msdu-desc: 2500  skid: 32
[   39.638423] ath10k_pci 0000:00:00.0: wmi print 'P 48/48 V 16 K 144 PH 176 T 186  msdu-desc: 2500  sw-crypt: 0 ct-sta: 0'
[   39.649793] ath10k_pci 0000:00:00.0: wmi print 'free: 114524 iram: 12628 sram: 29508'
[   39.962495] ath10k_pci 0000:00:00.0: Firmware lacks feature flag indicating a retry limit of > 2 is OK, requested limit: 4
[   40.056094] br-lan: port 3(5G_ap) entered blocking state
[   40.061668] br-lan: port 3(5G_ap) entered disabled state
[   40.067470] device 5G_ap entered promiscuous mode
[   40.592976] ath10k_pci 0000:00:00.0: NOTE:  Firmware DBGLOG output disabled in debug_mask: 0x10000000
[   42.454916] IPv6: ADDRCONF(NETDEV_CHANGE): 5G_ap: link becomes ready
[   42.461871] br-lan: port 3(5G_ap) entered blocking state
[   42.467408] br-lan: port 3(5G_ap) entered forwarding state
[   71.382406] ath10k_pci 0000:00:00.0: Invalid VHT mcs 15 peer stats
[  341.666028] eth1: link down
[  344.483336] eth1: link up (100Mbps/Full duplex)
[  344.491658] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[  578.229353] ath10k_pci 0000:00:00.0: htt tx: fixing invalid VHT TX rate code 0xff
[  592.368021] eth1: link down
[  594.703887] eth1: link up (100Mbps/Full duplex)
[  594.714352] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[  731.949888] eth1: link down
[  734.221962] eth1: link up (100Mbps/Full duplex)
[  734.227213] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[  820.236857] eth1: link down
[  822.605965] eth1: link up (100Mbps/Full duplex)
[  822.610905] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[  826.702190] eth1: link down
[  829.102014] eth1: link up (100Mbps/Full duplex)
[  829.107387] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[ 1649.347796] eth1: link down
[ 1651.621462] eth1: link up (100Mbps/Full duplex)
[ 1651.626465] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[ 1841.056988] eth1: link down
[ 1843.456817] eth1: link up (100Mbps/Full duplex)
[ 1843.461740] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[ 2180.413149] eth1: link down
[ 2182.718570] eth1: link up (100Mbps/Full duplex)
[ 2182.724457] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[ 2198.078586] eth1: link down
[ 2200.350082] eth1: link up (100Mbps/Full duplex)
[ 2200.355326] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[ 2767.640586] eth1: link down
[ 2769.913486] eth1: link up (100Mbps/Full duplex)
[ 2769.918880] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[ 3632.176061] eth1: link down
[ 3634.929548] eth1: link up (100Mbps/Full duplex)
[ 3634.947194] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[ 4204.358095] eth1: link down
[ 4206.821967] eth1: link up (100Mbps/Full duplex)
[ 4206.826885] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[ 4285.669868] eth1: link down
[ 4288.549039] eth1: link up (100Mbps/Full duplex)
[ 4288.553962] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[ 4437.028463] eth1: link down
[ 4439.299787] eth1: link up (100Mbps/Full duplex)
[ 4439.305020] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[ 5146.874710] eth1: link down
[ 5149.368670] eth1: link up (100Mbps/Full duplex)
[ 5149.374116] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[ 5381.813951] eth1: link down
[ 5384.055038] eth1: link up (100Mbps/Full duplex)
[ 5384.059934] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[ 5642.100393] eth1: link down
[ 5644.373038] eth1: link up (100Mbps/Full duplex)
[ 5644.378482] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[ 7494.721193] eth1: link down
[ 7497.344721] eth1: link up (100Mbps/Full duplex)
[ 7497.349853] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[ 7498.367589] eth1: link down
[ 7501.023786] eth1: link up (100Mbps/Full duplex)
[ 7501.033810] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[ 7768.284460] eth1: link down
[ 7770.555910] eth1: link up (100Mbps/Full duplex)
[ 7770.560802] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[ 8019.384339] eth1: link down
[ 8021.625385] eth1: link up (100Mbps/Full duplex)
[ 8021.630736] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[ 8403.572058] eth1: link down
[ 8405.813090] eth1: link up (100Mbps/Full duplex)
[ 8405.818007] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[ 8527.667165] eth1: link down
[ 8529.907650] eth1: link up (100Mbps/Full duplex)
[ 8529.914523] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[ 8880.112215] eth1: link down
[ 8882.383496] eth1: link up (100Mbps/Full duplex)
[ 8882.388796] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[ 9199.819312] eth1: link down
[ 9202.091975] eth1: link up (100Mbps/Full duplex)
[ 9202.096881] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[ 9356.713628] eth1: link down
[ 9358.954413] eth1: link up (100Mbps/Full duplex)
[ 9358.959717] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[ 9633.414597] eth1: link down
[ 9635.687330] eth1: link up (100Mbps/Full duplex)
[ 9635.692245] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[ 9684.873413] eth1: link down
[ 9687.110800] eth1: link up (100Mbps/Full duplex)
[ 9687.116036] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[10674.234523] eth1: link down
[10676.505354] eth1: link up (100Mbps/Full duplex)
[10676.510427] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[10983.699927] eth1: link down
[10985.941798] eth1: link up (100Mbps/Full duplex)
[10985.946692] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[11115.987273] eth1: link down
[11118.227019] eth1: link up (100Mbps/Full duplex)
[11118.231935] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[11258.511665] eth1: link down
[11260.752903] eth1: link up (100Mbps/Full duplex)
[11260.757818] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[12051.270601] eth1: link down
[12053.542580] eth1: link up (100Mbps/Full duplex)
[12053.547634] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[12224.548043] eth1: link down
[12226.820838] eth1: link up (100Mbps/Full duplex)
[12226.826133] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[13093.116349] eth1: link down
[13095.388099] eth1: link up (100Mbps/Full duplex)
[13095.393036] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[13237.723403] eth1: link down
[13239.994531] eth1: link up (100Mbps/Full duplex)
[13239.999449] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[13480.631361] eth1: link down
[13482.903933] eth1: link up (100Mbps/Full duplex)
[13482.908827] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[14079.986670] eth1: link down
[14082.865153] eth1: link up (100Mbps/Full duplex)
[14082.875799] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[14136.142960] eth1: link down
[14138.480152] eth1: link up (100Mbps/Full duplex)
[14138.485048] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[14326.892801] eth1: link down
[14329.165044] eth1: link up (100Mbps/Full duplex)
[14329.170437] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[15205.698224] eth1: link down
[15208.034072] eth1: link up (100Mbps/Full duplex)
[15208.038993] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[16868.939213] eth1: link down
[16871.691530] eth1: link up (100Mbps/Full duplex)
[16871.696502] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[17219.845264] eth1: link down
[17222.085945] eth1: link up (100Mbps/Full duplex)
[17222.091188] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[17266.116135] eth1: link down
[17268.358170] eth1: link up (100Mbps/Full duplex)
[17268.363287] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[18608.757159] eth1: link down
[18610.998442] eth1: link up (100Mbps/Full duplex)
[18611.003804] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[18764.595469] eth1: link down
[18766.836763] eth1: link up (100Mbps/Full duplex)
[18766.841656] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[20083.683566] eth1: link down
[20085.924491] eth1: link up (100Mbps/Full duplex)
[20085.929635] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[20258.977467] eth1: link down
[20261.250149] eth1: link up (100Mbps/Full duplex)
[20261.255096] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[20799.867102] eth1: link down
[20800.905538] eth1: link up (100Mbps/Full duplex)
[20801.403850] eth1: link down
[20803.739123] eth1: link up (100Mbps/Full duplex)
[20803.744597] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[20860.057661] eth1: link down
[20862.298378] eth1: link up (100Mbps/Full duplex)
[20862.303274] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[21054.806768] eth1: link down
[21057.335858] eth1: link up (100Mbps/Full duplex)
[21057.340763] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[21401.394255] eth1: link down
[21403.667456] eth1: link up (100Mbps/Full duplex)
[21403.673375] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[21526.544502] eth1: link down
[21528.785624] eth1: link up (100Mbps/Full duplex)
[21528.790873] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[22750.558286] eth1: link down
[22752.991528] eth1: link up (100Mbps/Full duplex)
[22752.996798] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[23049.946588] eth1: link down
[23052.667230] eth1: link up (100Mbps/Full duplex)
[23052.672628] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[23937.424784] eth1: link down
[23939.918740] eth1: link up (100Mbps/Full duplex)
[23939.923699] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[24151.883187] eth1: link down
[24154.155689] eth1: link up (100Mbps/Full duplex)
[24154.160921] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[24189.994240] eth1: link down
[24192.267137] eth1: link up (100Mbps/Full duplex)
[24192.272514] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[24815.876173] eth1: link down
[24818.146255] eth1: link up (100Mbps/Full duplex)
[24818.151147] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[24919.520764] eth1: link down
[24921.760804] eth1: link up (100Mbps/Full duplex)
[24921.765696] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[25562.774798] eth1: link down
[25565.047734] eth1: link up (100Mbps/Full duplex)
[25565.053118] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[25785.204201] eth1: link down
[25787.476678] eth1: link up (100Mbps/Full duplex)
[25787.481822] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[26773.733380] eth1: link down
[26776.714562] eth1: link up (100Mbps/Full duplex)
[26776.730903] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[26790.085415] eth1: link down
[26792.678448] eth1: link up (100Mbps/Full duplex)
[26792.697842] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[27487.164577] eth1: link down
[27489.660947] eth1: link up (100Mbps/Full duplex)
[27489.668112] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[28290.895944] eth1: link down
[28293.425287] eth1: link up (100Mbps/Full duplex)
[28293.437604] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[28658.059181] eth1: link down
[28660.812898] eth1: link up (100Mbps/Full duplex)
[28660.826712] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[28743.785857] eth1: link down
[28746.187045] eth1: link up (100Mbps/Full duplex)
[28746.191940] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[28782.025579] eth1: link down
[28784.266545] eth1: link up (100Mbps/Full duplex)
[28784.271471] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[30246.613459] eth1: link down
[30249.014683] eth1: link up (100Mbps/Full duplex)
[30249.019603] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[32144.537910] eth1: link down
[32147.131202] eth1: link up (100Mbps/Full duplex)
[32147.149670] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[38872.203135] eth1: link down
[38873.247956] eth1: link up (100Mbps/Full duplex)
[38873.695232] eth1: link down
[38876.139641] eth1: link up (100Mbps/Full duplex)
[38876.144565] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[39186.470864] eth1: link down
[39189.224149] eth1: link up (100Mbps/Full duplex)
[39189.238760] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[40019.293485] eth1: link down
[40022.302813] eth1: link up (100Mbps/Full duplex)
[40022.317265] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[41084.176732] eth1: link down
[41087.250081] eth1: link up (100Mbps/Full duplex)
[41087.260597] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[43065.688340] eth1: link down
[43066.762455] eth1: link up (100Mbps/Full duplex)
[43066.780405] eth1: link down
[43068.953581] eth1: link up (100Mbps/Full duplex)
[43068.964050] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[45176.735987] eth1: link down
[45177.813318] eth1: link up (100Mbps/Full duplex)
[45177.929459] eth1: link down
[45180.003569] eth1: link up (100Mbps/Full duplex)
[45180.015357] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[47273.319242] eth1: link down
[47275.708534] eth1: link up (100Mbps/Full duplex)
[47275.718181] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[47301.574020] eth1: link down
[47304.040059] eth1: link up (100Mbps/Full duplex)
[47304.045503] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[47480.355611] eth1: link down
[47481.427781] eth1: link up (100Mbps/Full duplex)
[47481.447013] eth1: link down
[47483.556901] eth1: link up (100Mbps/Full duplex)
[47483.567363] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[53730.071248] eth1: link down
[53731.096636] eth1: link up (100Mbps/Full duplex)
[53732.239828] eth1: link down
[53734.649205] eth1: link up (100Mbps/Full duplex)
[53734.654139] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[54051.443072] ath10k_pci 0000:00:00.0: Cannot communicate with firmware, previous wmi cmds: 36967:13437256 36967:13437239 36965:13436981 40859:13436981, jiffies: 13438016, attempting to fake crash and restart firmware, dev-flags: 0x42
[54051.464514] ath10k_pci 0000:00:00.0: failed to send wmi nop: -143
[54051.470856] ath10k_pci 0000:00:00.0: could not request stats (type -268435456 ret -143 specifier 1)
[54051.589474] ath10k_pci 0000:00:00.0: firmware crashed! (guid n/a)
[54051.595832] ath10k_pci 0000:00:00.0: qca9888 hw2.0 target 0x01000000 chip_id 0x00000000 sub 0000:0000
[54051.605430] ath10k_pci 0000:00:00.0: kconfig debug 0 debugfs 1 tracing 0 dfs 1 testmode 0
[54051.625558] ath10k_pci 0000:00:00.0: firmware ver 10.4b-ct-9888-fW-013-d81f62d97 api 5 features mfp,peer-flow-ctrl,txstatus-noack,wmi-10.x-CT,ratemask-CT,regdump-CT,txrate-CT,flush-all-CT,pingpong-CT,ch-regs-CT,nop-CT,set-special-CT,tx-rc-CT,cust-stats-CT,txrate2-CT,beacon-cb-CT,wmi-block-ack-CT,wmi-bcn-rc-CT crc32 937128b4
[54051.655549] ath10k_pci 0000:00:00.0: board_file api 1 bmi_id 0:20 crc32 8971a1b4
[54051.663289] ath10k_pci 0000:00:00.0: htt-ver 2.2 wmi-op 6 htt-op 4 cal pre-cal-file max-sta 32 raw 0 hwcrypto 1
[54051.684158] ath10k_pci 0000:00:00.0: failed to get memcpy hi address for firmware address 4: -16
[54051.693254] ath10k_pci 0000:00:00.0: failed to read firmware dump area: -16
[54051.700454] ath10k_pci 0000:00:00.0: in crash-regs-harder
[54052.859201] ath10k_pci 0000:00:00.0: in crash-regs-harder, firmware did not provide indicator: 0x2
[54052.868542] ath10k_pci 0000:00:00.0: Copy Engine register dump:
[54052.874710] ath10k_pci 0000:00:00.0: [00]: 0x0004a000   5   5   3   3
[54052.881383] ath10k_pci 0000:00:00.0: [01]: 0x0004a400  21  21  91  92
[54052.888060] ath10k_pci 0000:00:00.0: [02]: 0x0004a800  63  63  62  63
[54052.894737] ath10k_pci 0000:00:00.0: [03]: 0x0004ac00  20  16  20  16
[54052.901405] ath10k_pci 0000:00:00.0: [04]: 0x0004b000 4791 4791  57  17
[54052.908248] ath10k_pci 0000:00:00.0: [05]: 0x0004b400  19  19  50  51
[54052.914919] ath10k_pci 0000:00:00.0: [06]: 0x0004b800  25  25  25  25
[54052.921580] ath10k_pci 0000:00:00.0: [07]: 0x0004bc00   0   1   0   1
[54052.928247] ath10k_pci 0000:00:00.0: [08]: 0x0004c000   0   0 127   0
[54052.934918] ath10k_pci 0000:00:00.0: [09]: 0x0004c400   0   0   0   0
[54052.941579] ath10k_pci 0000:00:00.0: [10]: 0x0004c800   0   0   0   0
[54052.948244] ath10k_pci 0000:00:00.0: [11]: 0x0004cc00   0   0   0   0
[54052.955045] ath10k_pci 0000:00:00.0: failed to get memcpy hi address for firmware address 8: -28
[54052.964224] ath10k_pci 0000:00:00.0: failed to dump debug log area: -28
[54054.231779] ath10k_pci 0000:00:00.0: failed to send pdev bss chan info request: -143
[54054.283727] ath10k_pci 0000:00:00.0: failed to set beacon mode for vdev 0: -143
[54054.291449] ath10k_pci 0000:00:00.0: failed to set dtim period for vdev 0: -143
[54054.299559] ath10k_pci 0000:00:00.0: failed to recalculate rts/cts prot for vdev 0: -143
[54054.308003] ath10k_pci 0000:00:00.0: failed to set cts protection for vdev 0: -143
[54054.315853] ath10k_pci 0000:00:00.0: failed to set preamble for vdev 0: -143
[54054.323152] ath10k_pci 0000:00:00.0: failed to set mgmt tx rate -143
[54057.534308] ath10k_pci 0000:00:00.0: removing peer, cleanup-all, deleting: peer e80ddcc2 vdev: 0 addr: 50:c7:bf:75:81:af 
[54057.545794] ath10k_pci 0000:00:00.0: failed to read hi_board_data address: -28
[54057.710699] ieee80211 phy0: Hardware restart was requested
[54059.808138] ath10k_pci 0000:00:00.0: unsupported HTC service id: 1536
[54059.815390] ath10k_pci 0000:00:00.0: 10.4 wmi init: vdevs: 16  peers: 48  tid: 96
[54059.823264] ath10k_pci 0000:00:00.0: msdu-desc: 2500  skid: 32
[54059.853446] ath10k_pci 0000:00:00.0: wmi print 'P 48/48 V 16 K 144 PH 176 T 186  msdu-desc: 2500  sw-crypt: 0 ct-sta: 0'
[54059.864797] ath10k_pci 0000:00:00.0: wmi print 'free: 114524 iram: 12628 sram: 29508'
[54060.177482] ath10k_pci 0000:00:00.0: Firmware lacks feature flag indicating a retry limit of > 2 is OK, requested limit: 4
[54060.387955] ath10k_pci 0000:00:00.0: device successfully recovered
[56380.150084] eth1: link down
[56382.455362] eth1: link up (100Mbps/Full duplex)
[56382.460915] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[57573.479020] eth1: link down
[57575.848305] eth1: link up (100Mbps/Full duplex)
[57575.857942] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[62279.278882] eth1: link down
[62282.093972] eth1: link up (100Mbps/Full duplex)
[62282.106792] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[62566.921643] eth1: link down
[62569.642374] eth1: link up (100Mbps/Full duplex)
[62569.647702] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[64258.228833] eth1: link down
[64260.469184] eth1: link up (100Mbps/Full duplex)
[64260.475349] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[64432.498472] eth1: link down
[64434.770921] eth1: link up (100Mbps/Full duplex)
[64434.776356] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[64681.582940] eth1: link down
[64683.855712] eth1: link up (100Mbps/Full duplex)
[64683.860607] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[67376.940335] eth1: link down
[67379.277635] eth1: link up (100Mbps/Full duplex)
[67379.294109] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[68199.649623] eth1: link down
[68201.958955] eth1: link up (100Mbps/Full duplex)
[68201.969490] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[68440.734545] eth1: link down
[68443.103654] eth1: link up (100Mbps/Full duplex)
[68443.110942] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[68926.670978] eth1: link down
[68928.765150] eth1: link up (100Mbps/Full duplex)
[68928.783506] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[69076.342428] eth1: link down
[69078.711358] eth1: link up (100Mbps/Full duplex)
[69078.716498] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[69122.741131] eth1: link down
[69125.815266] eth1: link up (100Mbps/Full duplex)
[69125.822898] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[69135.124950] eth1: link down
[69137.334553] eth1: link up (100Mbps/Full duplex)
[69137.340172] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[69379.154014] eth1: link down
[69381.426908] eth1: link up (100Mbps/Full duplex)
[69381.432153] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
root@archer_c60:~# logread | grep udhcpc
Tue Aug  4 14:00:10 2020 daemon.notice netifd: wan (11433): udhcpc: received SIGTERM
Tue Aug  4 14:00:10 2020 daemon.notice netifd: wan (11433): udhcpc: unicasting a release of 190.244.135.61 to 172.20.2.226
Tue Aug  4 14:00:10 2020 daemon.notice netifd: wan (11433): udhcpc: sending release
Tue Aug  4 14:00:10 2020 daemon.notice netifd: wan (11433): udhcpc: entering released state
Tue Aug  4 14:00:12 2020 daemon.notice netifd: wan (12732): udhcpc: started, v1.31.1
Tue Aug  4 14:00:12 2020 daemon.notice netifd: wan (12732): udhcpc: sending discover
Tue Aug  4 14:00:15 2020 daemon.notice netifd: wan (12732): udhcpc: sending discover
Tue Aug  4 14:00:15 2020 daemon.notice netifd: wan (12732): udhcpc: sending select for 190.244.135.61
Tue Aug  4 14:00:15 2020 daemon.notice netifd: wan (12732): udhcpc: lease of 190.244.135.61 obtained, lease time 11197
Tue Aug  4 14:04:19 2020 daemon.notice netifd: wan (12732): udhcpc: received SIGTERM
Tue Aug  4 14:04:19 2020 daemon.notice netifd: wan (12732): udhcpc: unicasting a release of 190.244.135.61 to 172.20.2.226
Tue Aug  4 14:04:19 2020 daemon.notice netifd: wan (12732): udhcpc: sending release
Tue Aug  4 14:04:19 2020 daemon.notice netifd: wan (12732): udhcpc: entering released state
Tue Aug  4 14:04:21 2020 daemon.notice netifd: wan (13989): udhcpc: started, v1.31.1
Tue Aug  4 14:04:21 2020 daemon.notice netifd: wan (13989): udhcpc: sending discover
Tue Aug  4 14:04:21 2020 daemon.notice netifd: wan (13989): udhcpc: sending select for 190.244.135.61
Tue Aug  4 14:04:21 2020 daemon.notice netifd: wan (13989): udhcpc: lease of 190.244.135.61 obtained, lease time 10951
Tue Aug  4 14:49:14 2020 daemon.notice netifd: wan (13989): udhcpc: received SIGTERM
Tue Aug  4 14:49:14 2020 daemon.notice netifd: wan (13989): udhcpc: unicasting a release of 190.244.135.61 to 172.20.2.226
Tue Aug  4 14:49:14 2020 daemon.notice netifd: wan (13989): udhcpc: sending release
Tue Aug  4 14:49:14 2020 daemon.notice netifd: wan (13989): udhcpc: entering released state
Tue Aug  4 14:49:17 2020 daemon.notice netifd: wan (15789): udhcpc: started, v1.31.1
Tue Aug  4 14:49:17 2020 daemon.notice netifd: wan (15789): udhcpc: sending discover
Tue Aug  4 14:49:17 2020 daemon.notice netifd: wan (15789): udhcpc: sending select for 190.244.135.61
Tue Aug  4 14:49:17 2020 daemon.notice netifd: wan (15789): udhcpc: lease of 190.244.135.61 obtained, lease time 19655
Tue Aug  4 15:02:57 2020 daemon.notice netifd: wan (15789): udhcpc: received SIGTERM
Tue Aug  4 15:02:57 2020 daemon.notice netifd: wan (15789): udhcpc: unicasting a release of 190.244.135.61 to 172.20.2.226
Tue Aug  4 15:02:57 2020 daemon.notice netifd: wan (15789): udhcpc: sending release
Tue Aug  4 15:02:57 2020 daemon.notice netifd: wan (15789): udhcpc: entering released state
Tue Aug  4 15:03:00 2020 daemon.notice netifd: wan (17240): udhcpc: started, v1.31.1
Tue Aug  4 15:03:00 2020 daemon.notice netifd: wan (17240): udhcpc: sending discover
Tue Aug  4 15:03:00 2020 daemon.notice netifd: wan (17240): udhcpc: sending select for 190.244.135.61
Tue Aug  4 15:03:00 2020 daemon.notice netifd: wan (17240): udhcpc: lease of 190.244.135.61 obtained, lease time 18833
Tue Aug  4 15:06:58 2020 daemon.notice netifd: wan (17240): udhcpc: received SIGTERM
Tue Aug  4 15:06:58 2020 daemon.notice netifd: wan (17240): udhcpc: unicasting a release of 190.244.135.61 to 172.20.2.226
Tue Aug  4 15:06:58 2020 daemon.notice netifd: wan (17240): udhcpc: sending release
Tue Aug  4 15:06:58 2020 daemon.notice netifd: wan (17240): udhcpc: entering released state
Tue Aug  4 15:07:01 2020 daemon.notice netifd: wan (18540): udhcpc: started, v1.31.1
Tue Aug  4 15:07:01 2020 daemon.notice netifd: wan (18540): udhcpc: sending discover
Tue Aug  4 15:07:01 2020 daemon.notice netifd: wan (18540): udhcpc: sending select for 190.244.135.61
Tue Aug  4 15:07:01 2020 daemon.notice netifd: wan (18540): udhcpc: lease of 190.244.135.61 obtained, lease time 18592
Tue Aug  4 15:15:04 2020 daemon.notice netifd: wan (18540): udhcpc: received SIGTERM
Tue Aug  4 15:15:04 2020 daemon.notice netifd: wan (18540): udhcpc: unicasting a release of 190.244.135.61 to 172.20.2.226
Tue Aug  4 15:15:04 2020 daemon.notice netifd: wan (18540): udhcpc: sending release
Tue Aug  4 15:15:04 2020 daemon.notice netifd: wan (18540): udhcpc: entering released state
Tue Aug  4 15:15:07 2020 daemon.notice netifd: wan (20037): udhcpc: started, v1.31.1
Tue Aug  4 15:15:07 2020 daemon.notice netifd: wan (20037): udhcpc: sending discover
Tue Aug  4 15:15:10 2020 daemon.notice netifd: wan (20037): udhcpc: sending discover
Tue Aug  4 15:15:10 2020 daemon.notice netifd: wan (20037): udhcpc: sending select for 190.244.135.61
Tue Aug  4 15:15:10 2020 daemon.notice netifd: wan (20037): udhcpc: lease of 190.244.135.61 obtained, lease time 600
Tue Aug  4 15:17:34 2020 daemon.notice netifd: wan (20037): udhcpc: received SIGTERM
Tue Aug  4 15:17:34 2020 daemon.notice netifd: wan (20037): udhcpc: unicasting a release of 190.244.135.61 to 172.20.2.226
Tue Aug  4 15:17:34 2020 daemon.notice netifd: wan (20037): udhcpc: sending release
Tue Aug  4 15:17:34 2020 daemon.notice netifd: wan (20037): udhcpc: entering released state
Tue Aug  4 15:17:36 2020 daemon.notice netifd: wan (21065): udhcpc: started, v1.31.1
Tue Aug  4 15:17:36 2020 daemon.notice netifd: wan (21065): udhcpc: sending discover
Tue Aug  4 15:17:37 2020 daemon.notice netifd: wan (21065): udhcpc: sending select for 190.244.135.61
Tue Aug  4 15:17:37 2020 daemon.notice netifd: wan (21065): udhcpc: lease of 190.244.135.61 obtained, lease time 453
Tue Aug  4 15:18:21 2020 daemon.notice netifd: wan (21065): udhcpc: received SIGTERM
Tue Aug  4 15:18:21 2020 daemon.notice netifd: wan (21065): udhcpc: unicasting a release of 190.244.135.61 to 172.20.2.226
Tue Aug  4 15:18:21 2020 daemon.notice netifd: wan (21065): udhcpc: sending release
Tue Aug  4 15:18:21 2020 daemon.notice netifd: wan (21065): udhcpc: entering released state
Tue Aug  4 15:18:23 2020 daemon.notice netifd: wan (21840): udhcpc: started, v1.31.1
Tue Aug  4 15:18:23 2020 daemon.notice netifd: wan (21840): udhcpc: sending discover
Tue Aug  4 15:18:23 2020 daemon.notice netifd: wan (21840): udhcpc: sending select for 190.244.135.61
Tue Aug  4 15:18:23 2020 daemon.notice netifd: wan (21840): udhcpc: lease of 190.244.135.61 obtained, lease time 406
Tue Aug  4 15:18:33 2020 daemon.notice netifd: wan (21840): udhcpc: received SIGTERM
Tue Aug  4 15:18:33 2020 daemon.notice netifd: wan (21840): udhcpc: unicasting a release of 190.244.135.61 to 172.20.2.226
Tue Aug  4 15:18:33 2020 daemon.notice netifd: wan (21840): udhcpc: sending release
Tue Aug  4 15:18:33 2020 daemon.notice netifd: wan (21840): udhcpc: entering released state
Tue Aug  4 15:18:35 2020 daemon.notice netifd: wan (22614): udhcpc: started, v1.31.1
Tue Aug  4 15:18:35 2020 daemon.notice netifd: wan (22614): udhcpc: sending discover
Tue Aug  4 15:18:35 2020 daemon.notice netifd: wan (22614): udhcpc: sending select for 190.244.135.61
Tue Aug  4 15:18:35 2020 daemon.notice netifd: wan (22614): udhcpc: lease of 190.244.135.61 obtained, lease time 395
Tue Aug  4 15:21:52 2020 daemon.notice netifd: wan (22614): udhcpc: sending renew to 172.20.2.226
Tue Aug  4 15:21:52 2020 daemon.notice netifd: wan (22614): udhcpc: lease of 190.244.135.61 obtained, lease time 21600
Tue Aug  4 15:22:37 2020 daemon.notice netifd: wan (22614): udhcpc: received SIGTERM
Tue Aug  4 15:22:37 2020 daemon.notice netifd: wan (22614): udhcpc: unicasting a release of 190.244.135.61 to 172.20.2.226
Tue Aug  4 15:22:37 2020 daemon.notice netifd: wan (22614): udhcpc: sending release
Tue Aug  4 15:22:37 2020 daemon.notice netifd: wan (22614): udhcpc: entering released state
Tue Aug  4 15:22:39 2020 daemon.notice netifd: wan (23460): udhcpc: started, v1.31.1
Tue Aug  4 15:22:39 2020 daemon.notice netifd: wan (23460): udhcpc: sending discover
Tue Aug  4 15:22:39 2020 daemon.notice netifd: wan (23460): udhcpc: sending select for 190.244.135.61
Tue Aug  4 15:22:39 2020 daemon.notice netifd: wan (23460): udhcpc: lease of 190.244.135.61 obtained, lease time 21553
root@archer_c60:~# opkg list-installed
6to4 - 13
ath10k-firmware-qca9888-ct - 2020-04-24-2
base-files - 225-r14025-009e62c92c
busybox - 1.31.1-1
cgi-io - 19
ddns-scripts - 2.7.8-21
dnsmasq - 2.82-3
dropbear - 2020.80-1
firewall - 2020-07-25-e9b90dfa-1
fstools - 2020-06-17-d34ea8eb-1
fwtool - 2019-11-12-8f7fe925-1
getrandom - 2019-12-31-0e34af14-4
hostapd-common - 2020-06-08-5a8b3662-3
htop - 2.2.0-3
ip-tiny - 5.7.0-2
ip6tables - 1.8.4-1
iperf3 - 3.7-1
iptables - 1.8.4-1
iptables-mod-conntrack-extra - 1.8.4-1
iptables-mod-ipopt - 1.8.4-1
iw - 5.4-1
iwinfo - 2020-06-03-2faa20e5-1
jshn - 2020-07-11-f4e9bf73-1
jsonfilter - 2018-02-04-c7e938d6-1
kernel - 5.4.52-1-a3b0c799c80449fa80b53cf0e54c74e1
kmod-ath - 5.4.52+5.8-rc2-1-1
kmod-ath10k-ct-smallbuffers - 5.4.52+2020-06-30-edfbf916-1
kmod-ath9k - 5.4.52+5.8-rc2-1-1
kmod-ath9k-common - 5.4.52+5.8-rc2-1-1
kmod-cfg80211 - 5.4.52+5.8-rc2-1-1
kmod-gpio-button-hotplug - 5.4.52-3
kmod-hwmon-core - 5.4.52-1
kmod-ifb - 5.4.52-1
kmod-ip6tables - 5.4.52-1
kmod-ipt-conntrack - 5.4.52-1
kmod-ipt-conntrack-extra - 5.4.52-1
kmod-ipt-core - 5.4.52-1
kmod-ipt-ipopt - 5.4.52-1
kmod-ipt-nat - 5.4.52-1
kmod-ipt-offload - 5.4.52-1
kmod-ipt-raw - 5.4.52-1
kmod-iptunnel - 5.4.52-1
kmod-iptunnel4 - 5.4.52-1
kmod-ledtrig-default-on - 5.4.52-1
kmod-ledtrig-heartbeat - 5.4.52-1
kmod-ledtrig-netdev - 5.4.52-1
kmod-ledtrig-timer - 5.4.52-1
kmod-mac80211 - 5.4.52+5.8-rc2-1-1
kmod-nf-conntrack - 5.4.52-1
kmod-nf-conntrack6 - 5.4.52-1
kmod-nf-flow - 5.4.52-1
kmod-nf-ipt - 5.4.52-1
kmod-nf-ipt6 - 5.4.52-1
kmod-nf-nat - 5.4.52-1
kmod-nf-reject - 5.4.52-1
kmod-nf-reject6 - 5.4.52-1
kmod-sched-cake - 5.4.52-1
kmod-sched-cake-virtual - 5.4.52+2020-07-24-48979385-1
kmod-sched-core - 5.4.52-1
kmod-sit - 5.4.52-1
kmod-udptunnel4 - 5.4.52-1
kmod-udptunnel6 - 5.4.52-1
kmod-wireguard - 5.4.52+1.0.20200729-1
libblobmsg-json - 2020-07-11-f4e9bf73-1
libc - 1.1.24-2
libelf1 - 0.179-1
libgcc1 - 8.4.0-2
libip4tc2 - 1.8.4-1
libip6tc2 - 1.8.4-1
libiwinfo-lua - 2020-06-03-2faa20e5-1
libiwinfo20200105 - 2020-06-03-2faa20e5-1
libjson-c5 - 0.14-1
libjson-script - 2020-07-11-f4e9bf73-1
liblua5.1.5 - 5.1.5-7
liblucihttp-lua - 2019-07-05-a34a17d5-1
liblucihttp0 - 2019-07-05-a34a17d5-1
libmbedtls12 - 2.16.6-1
libncurses6 - 6.2-1
libnl-tiny - 2019-10-29-0219008c-1
libopenssl1.1 - 1.1.1g-1
libpcre - 8.44-2
libpthread - 1.1.24-2
librt - 1.1.24-2
libubox20191228 - 2020-07-11-f4e9bf73-1
libubus-lua - 2020-02-05-171469e3-1
libubus20191227 - 2020-02-05-171469e3-1
libuci20130104 - 2020-04-24-ec8d3233-3
libuclient20160123 - 2020-06-17-c6609861-1
libustream-mbedtls20200215 - 2020-03-13-5e1bc342-1
libxtables12 - 1.8.4-1
logd - 2019-12-31-0e34af14-4
lua - 5.1.5-7
luci - git-20.216.62430-9acc7d8
luci-app-ddns - git-20.216.62430-9acc7d8
luci-app-firewall - git-20.216.62430-9acc7d8
luci-app-opkg - git-20.216.62430-9acc7d8
luci-app-sqm - 1.4.0
luci-app-wireguard - git-20.216.62430-9acc7d8
luci-base - git-20.216.62430-9acc7d8
luci-compat - git-20.216.62430-9acc7d8
luci-i18n-base-en - git-20.216.62430-9acc7d8
luci-i18n-base-es - git-20.216.62430-9acc7d8
luci-i18n-ddns-en - git-20.216.62430-9acc7d8
luci-i18n-ddns-es - git-20.216.62430-9acc7d8
luci-i18n-firewall-en - git-20.216.62430-9acc7d8
luci-i18n-firewall-es - git-20.216.62430-9acc7d8
luci-i18n-opkg-en - git-20.216.62430-9acc7d8
luci-i18n-opkg-es - git-20.216.62430-9acc7d8
luci-i18n-sqm-en - git-20.216.62430-9acc7d8
luci-i18n-sqm-es - git-20.216.62430-9acc7d8
luci-i18n-wireguard-en - git-20.216.62430-9acc7d8
luci-i18n-wireguard-es - git-20.216.62430-9acc7d8
luci-lib-base - git-20.216.62430-9acc7d8
luci-lib-ip - git-20.216.62430-9acc7d8
luci-lib-ipkg - git-20.216.62430-9acc7d8
luci-lib-jsonc - git-20.216.62430-9acc7d8
luci-lib-nixio - git-20.216.62430-9acc7d8
luci-mod-admin-full - git-20.216.62430-9acc7d8
luci-mod-network - git-20.216.62430-9acc7d8
luci-mod-status - git-20.216.62430-9acc7d8
luci-mod-system - git-20.216.62430-9acc7d8
luci-proto-ipv6 - git-20.216.62430-9acc7d8
luci-proto-ppp - git-20.216.62430-9acc7d8
luci-proto-wireguard - git-20.216.62430-9acc7d8
luci-ssl - git-20.216.62430-9acc7d8
luci-theme-argon - 2.2.1
luci-theme-bootstrap - git-20.216.62430-9acc7d8
luci-theme-openwrt-2020 - git-20.216.62430-9acc7d8
mtd - 25
nano - 5.0-1
netifd - 2020-06-06-51e9fb81-1
odhcp6c - 2020-03-28-f575351c-16
odhcpd - 2020-06-21-5da52992-4
openwrt-keyring - 2019-07-25-8080ef34-1
opkg - 2020-05-07-f2166a89-1
procd - 2020-07-30-2ae5cbcf-1
px5g-mbedtls - 9
rpcd - 2020-05-26-078bb57e-1
rpcd-mod-file - 2020-05-26-078bb57e-1
rpcd-mod-iwinfo - 2020-05-26-078bb57e-1
rpcd-mod-luci - 20191114
rpcd-mod-rrdns - 20170710
sqm-scripts - 1.4.0-8
swconfig - 12
tc - 5.7.0-2
terminfo - 6.2-1
uboot-envtools - 2020.04-1
ubox - 2019-12-31-0e34af14-4
ubus - 2020-02-05-171469e3-1
ubusd - 2020-02-05-171469e3-1
uci - 2020-04-24-ec8d3233-3
uclient-fetch - 2020-06-17-c6609861-1
uhttpd - 2020-06-03-939c281c-1
uhttpd-mod-ubus - 2020-06-03-939c281c-1
urandom-seed - 2
urngd - 2020-01-21-c7f7b6b6-1
usign - 2020-05-23-f1f65026-1
wget - 1.20.3-4
wireguard-tools - 1.0.20200513-1
wireless-regdb - 2020.04.29-1
wpad-basic - 2020-06-08-5a8b3662-3
zlib - 1.2.11-3

Supply the following if possible:
- Device problem occurs on
- Software versions of OpenWrt/LEDE release, packages, etc.
- Steps to reproduce

 


09.03.2017612Base systemBug ReportVery LowHighWAN to LAN leakage on MT7620 devicesTrunkUnconfirmed Task Description

I am currently testing two MT7620 devices - the ZBT WE826 and the Sanlinking D240. During the first seconds of the boot, I see that packets leak between the WAN and LAN ports. Typically, this results in clients receiving a DHCP reply from my upstream router, rendering the clients without connectivity when the switch is properly initialized. I have also tested with the default firmware and do not see this behavior. Also, if I stop the devices in the bootloader, then packets do not leak until I resume boot again.

In order to try to solve this bug, I have tried to port some (at least to me) missing steps from the bootloader switch code and to the mt7620 switch driver in LEDE. This did not have an effect, at least not on the packet leak. A work-around I have found is to update u-boot and remove the input delay, so that the device will boot immediately. However, this is quite cumbersome to install and not very reliable. I suspect my luck with this work-around is more due to the timing of the DHCP clients in Ubuntu and Windows 10.

Does anyone have any idea as to what could be wrong and where to start looking?

Thanks in advance for any help.

 


30.07.20213957Base systemBug ReportVery LowCriticalWAN port broken on WNDR3800openwrt-21.02Unconfirmed Task Description

Supply the following if possible:
- Netgear WNDR3800-1CHNAS
- OpenWrt 21.02-SNAPSHOT r16247-60fad8f82b
- Steps to reproduce:

  • Flash from stock to OpenWRT 19.07.x ATH79
  • Flash from 19.07.x to OpenWRT 21.02-SNAPSHOT
  • Reset to factory in GUI
  • WAN never comes up, it never leaves “UP BROADCAST MULTICAST” according to ifconfig.
  • WAN port is always flapping, nothing is logged on kernel/system logs.

The hardware was checked before flashing, in OEM firmware WAN is working.

As shown below one of the ports has a blank uid value (full zeros).

(Attached is a full copy of kernel log.

[ 1.192635] ag71xx 19000000.eth: connected to PHY at fixed-0:00 [uid=00000000, driver=Generic PHY]
[ 1.202218] eth0: Atheros AG71xx at 0xb9000000, irq 4, mode: rgmii
[ 1.524463] ag71xx 1a000000.eth: connected to PHY at rtl8366s:04 [uid=001cc960, driver=Generic PHY]
[ 1.534115] eth1: Atheros AG71xx at 0xba000000, irq 5, mode: rgmii

29.04.20213762Base systemBug ReportVery LowCriticalWAN performance regression on MT7621 21.02-rc1 vs 19.07...TrunkUnconfirmed Task Description

There is an issue with Wan throughput on the MT7621 and OpenWrt 21.02-rc1 vs 19.07.7

The test setup is an Iperf3 server running locally on the wan side of the router (A NeWifi-D2) and running Iperf3 as client on the router. This is stock firmware with no changes to the network settings from stock.

19.07.7 - TX = 531Mbps RX = 629Mbps
21.02-Rc1 - TX = 792Mbps Rx = 523Mbps

So while it appears TX has improved, RX is suffering and it is noticeable with non synthetic transfers.

Noticably the RX test on 21.02-RC1 is reporting rampant Retransmits by the Iperf server. These are not present in 19.07.7 in either direction, OR in 21.02-RC1 when the router is sending, only when its receiving. I also ran mpstat with an interval of 3 seconds to see processor load during the test. In the result sets below, iperf3 test was started during interval 3.

The command line on the router is
TX =

iperf3 -c <server ip> -P 2

RX =

iperf3 -c <server ip> -P 2 -R

19.07.7 - TX

iperf3 -c 192.168.69.102 -P 2
Connecting to host 192.168.69.102, port 5201
[  5] local 192.168.69.127 port 50742 connected to 192.168.69.102 port 5201
[  7] local 192.168.69.127 port 50744 connected to 192.168.69.102 port 5201
[ ID] Interval           Transfer     Bitrate         Retr  Cwnd
[  5]   0.00-1.04   sec  28.7 MBytes   231 Mbits/sec    0    130 KBytes       
[  7]   0.00-1.04   sec  28.7 MBytes   231 Mbits/sec    0    123 KBytes       
[SUM]   0.00-1.04   sec  57.3 MBytes   462 Mbits/sec    0             
- - - - - - - - - - - - - - - - - - - - - - - - -
[  5]   1.04-2.00   sec  28.8 MBytes   251 Mbits/sec    0    130 KBytes       
[  7]   1.04-2.00   sec  28.8 MBytes   251 Mbits/sec    0    130 KBytes       
[SUM]   1.04-2.00   sec  57.5 MBytes   502 Mbits/sec    0             
- - - - - - - - - - - - - - - - - - - - - - - - -
[  5]   2.00-3.01   sec  30.0 MBytes   251 Mbits/sec    0    130 KBytes       
[  7]   2.00-3.01   sec  30.0 MBytes   251 Mbits/sec    0    140 KBytes       
[SUM]   2.00-3.01   sec  60.0 MBytes   502 Mbits/sec    0             
- - - - - - - - - - - - - - - - - - - - - - - - -
[  5]   3.01-4.00   sec  30.0 MBytes   252 Mbits/sec    0    130 KBytes       
[  7]   3.01-4.00   sec  30.0 MBytes   252 Mbits/sec    0    140 KBytes       
[SUM]   3.01-4.00   sec  60.0 MBytes   505 Mbits/sec    0             
- - - - - - - - - - - - - - - - - - - - - - - - -
[  5]   4.00-5.03   sec  31.2 MBytes   256 Mbits/sec    0    130 KBytes       
[  7]   4.00-5.03   sec  31.2 MBytes   256 Mbits/sec    0    140 KBytes       
[SUM]   4.00-5.03   sec  62.5 MBytes   511 Mbits/sec    0             
- - - - - - - - - - - - - - - - - - - - - - - - -
[  5]   5.03-6.01   sec  30.0 MBytes   257 Mbits/sec    0    130 KBytes       
[  7]   5.03-6.01   sec  30.0 MBytes   257 Mbits/sec    0    140 KBytes       
[SUM]   5.03-6.01   sec  60.0 MBytes   513 Mbits/sec    0             
- - - - - - - - - - - - - - - - - - - - - - - - -
[  5]   6.01-7.02   sec  31.2 MBytes   258 Mbits/sec    0    130 KBytes       
[  7]   6.01-7.02   sec  31.2 MBytes   258 Mbits/sec    0    140 KBytes       
[SUM]   6.01-7.02   sec  62.5 MBytes   517 Mbits/sec    0             
- - - - - - - - - - - - - - - - - - - - - - - - -
[  5]   7.02-8.01   sec  35.0 MBytes   298 Mbits/sec    0    130 KBytes       
[  7]   7.02-8.01   sec  35.0 MBytes   298 Mbits/sec    0    140 KBytes       
[SUM]   7.02-8.01   sec  70.0 MBytes   595 Mbits/sec    0             
- - - - - - - - - - - - - - - - - - - - - - - - -
[  5]   8.01-9.01   sec  36.2 MBytes   305 Mbits/sec    0    139 KBytes       
[  7]   8.01-9.01   sec  36.2 MBytes   305 Mbits/sec    0    140 KBytes       
[SUM]   8.01-9.01   sec  72.5 MBytes   611 Mbits/sec    0             
- - - - - - - - - - - - - - - - - - - - - - - - -
[  5]   9.01-10.03  sec  37.5 MBytes   306 Mbits/sec    0    139 KBytes       
[  7]   9.01-10.03  sec  37.5 MBytes   306 Mbits/sec    0    140 KBytes       
[SUM]   9.01-10.03  sec  75.0 MBytes   612 Mbits/sec    0             
- - - - - - - - - - - - - - - - - - - - - - - - -
[ ID] Interval           Transfer     Bitrate         Retr
[  5]   0.00-10.03  sec   319 MBytes   266 Mbits/sec    0             sender
[  5]   0.00-10.07  sec   319 MBytes   265 Mbits/sec                  receiver
[  7]   0.00-10.03  sec   319 MBytes   266 Mbits/sec    0             sender
[  7]   0.00-10.07  sec   319 MBytes   265 Mbits/sec                  receiver
[SUM]   0.00-10.03  sec   637 MBytes   533 Mbits/sec    0             sender
[SUM]   0.00-10.07  sec   637 MBytes   531 Mbits/sec                  receiver

iperf Done.


# mpstat 3 10
Linux 4.14.221 (OpenWrt) 	04/29/21 	_mips_	(4 CPU)

05:45:14     CPU    %usr   %nice    %sys %iowait    %irq   %soft  %steal  %guest  %gnice   %idle
05:45:17     all    0.00    0.00    0.00    0.00    0.00    0.00    0.00    0.00    0.00  100.00
05:45:20     all    0.66    0.00    0.17    0.00    0.00    0.00    0.00    0.00    0.00   99.17
05:45:23     all    0.08    0.00   18.11    0.00    0.00   10.38    0.00    0.00    0.00   71.43
05:45:26     all    1.16    0.00   22.92    0.00    0.00   13.62    0.00    0.00    0.00   62.29
05:45:29     all    0.33    0.00   24.50    0.00    0.00   14.62    0.00    0.00    0.00   60.55
05:45:32     all    0.58    0.00   14.04    0.00    0.00   10.38    0.00    0.00    0.00   75.00
05:45:35     all    0.00    0.00    0.00    0.00    0.00    0.00    0.00    0.00    0.00  100.00
05:45:38     all    0.50    0.00    0.33    0.00    0.00    0.00    0.00    0.00    0.00   99.17

19.07.7 - RX (Server Iperf3 Stats)

Accepted connection from 192.168.69.127, port 50746
[  5] local 192.168.69.102 port 5201 connected to 192.168.69.127 port 50748
[  8] local 192.168.69.102 port 5201 connected to 192.168.69.127 port 50750
[ ID] Interval           Transfer     Bitrate         Retr  Cwnd
[  5]   0.00-1.00   sec  38.9 MBytes   326 Mbits/sec    0    334 KBytes       
[  8]   0.00-1.00   sec  36.5 MBytes   306 Mbits/sec    0    266 KBytes       
[SUM]   0.00-1.00   sec  75.4 MBytes   633 Mbits/sec    0             
- - - - - - - - - - - - - - - - - - - - - - - - -
[  5]   1.00-2.00   sec  37.5 MBytes   314 Mbits/sec    0    334 KBytes       
[  8]   1.00-2.00   sec  37.9 MBytes   318 Mbits/sec    0    266 KBytes       
[SUM]   1.00-2.00   sec  75.4 MBytes   632 Mbits/sec    0             
- - - - - - - - - - - - - - - - - - - - - - - - -
[  5]   2.00-3.00   sec  37.4 MBytes   314 Mbits/sec    0    334 KBytes       
[  8]   2.00-3.00   sec  37.0 MBytes   310 Mbits/sec    0    266 KBytes       
[SUM]   2.00-3.00   sec  74.4 MBytes   624 Mbits/sec    0             
- - - - - - - - - - - - - - - - - - - - - - - - -
[  5]   3.00-4.00   sec  37.5 MBytes   314 Mbits/sec    0    334 KBytes       
[  8]   3.00-4.00   sec  37.5 MBytes   315 Mbits/sec    0    266 KBytes       
[SUM]   3.00-4.00   sec  75.0 MBytes   629 Mbits/sec    0             
- - - - - - - - - - - - - - - - - - - - - - - - -
[  5]   4.00-5.00   sec  37.5 MBytes   315 Mbits/sec    0    334 KBytes       
[  8]   4.00-5.00   sec  37.7 MBytes   316 Mbits/sec    0    266 KBytes       
[SUM]   4.00-5.00   sec  75.3 MBytes   631 Mbits/sec    0             
- - - - - - - - - - - - - - - - - - - - - - - - -
[  5]   5.00-6.00   sec  37.5 MBytes   314 Mbits/sec    0    334 KBytes       
[  8]   5.00-6.00   sec  37.5 MBytes   315 Mbits/sec    0    266 KBytes       
[SUM]   5.00-6.00   sec  75.0 MBytes   629 Mbits/sec    0             
- - - - - - - - - - - - - - - - - - - - - - - - -
[  5]   6.00-7.00   sec  37.2 MBytes   312 Mbits/sec    0    430 KBytes       
[  8]   6.00-7.00   sec  36.4 MBytes   305 Mbits/sec    0    322 KBytes       
[SUM]   6.00-7.00   sec  73.5 MBytes   617 Mbits/sec    0             
- - - - - - - - - - - - - - - - - - - - - - - - -
[  5]   7.00-8.00   sec  38.3 MBytes   321 Mbits/sec    0    430 KBytes       
[  8]   7.00-8.00   sec  37.9 MBytes   318 Mbits/sec    0    322 KBytes       
[SUM]   7.00-8.00   sec  76.2 MBytes   639 Mbits/sec    0             
- - - - - - - - - - - - - - - - - - - - - - - - -
[  5]   8.00-9.00   sec  37.1 MBytes   311 Mbits/sec    0    430 KBytes       
[  8]   8.00-9.00   sec  37.0 MBytes   311 Mbits/sec    0    322 KBytes       
[SUM]   8.00-9.00   sec  74.1 MBytes   622 Mbits/sec    0             
- - - - - - - - - - - - - - - - - - - - - - - - -
[  5]   9.00-10.00  sec  37.8 MBytes   317 Mbits/sec    0    430 KBytes       
[  8]   9.00-10.00  sec  37.8 MBytes   317 Mbits/sec    0    322 KBytes       
[SUM]   9.00-10.00  sec  75.7 MBytes   635 Mbits/sec    0             
- - - - - - - - - - - - - - - - - - - - - - - - -
[  5]  10.00-10.04  sec   954 KBytes   214 Mbits/sec    0    430 KBytes       
[  8]  10.00-10.04  sec  1.55 MBytes   356 Mbits/sec    0    322 KBytes       
[SUM]  10.00-10.04  sec  2.49 MBytes   570 Mbits/sec    0             
- - - - - - - - - - - - - - - - - - - - - - - - -
[ ID] Interval           Transfer     Bitrate         Retr
[  5]   0.00-10.04  sec   378 MBytes   316 Mbits/sec    0             sender
[  8]   0.00-10.04  sec   375 MBytes   313 Mbits/sec    0             sender
[SUM]   0.00-10.04  sec   752 MBytes   629 Mbits/sec    0             sender

# mpstat 3 10 
Linux 4.14.221 (OpenWrt) 	04/29/21 	_mips_	(4 CPU)

05:46:28     CPU    %usr   %nice    %sys %iowait    %irq   %soft  %steal  %guest  %gnice   %idle
05:46:31     all    0.00    0.00    0.00    0.00    0.00    0.00    0.00    0.00    0.00  100.00
05:46:34     all    0.58    0.00    0.33    0.00    0.00    0.00    0.00    0.00    0.00   99.09
05:46:37     all    0.42    0.00   13.95    0.00    0.00   14.37    0.00    0.00    0.00   71.26
05:46:40     all    0.58    0.00   14.37    0.00    0.00   27.57    0.00    0.00    0.00   57.48
05:46:43     all    1.00    0.00   17.77    0.00    0.00   26.58    0.00    0.00    0.00   54.65
05:46:46     all    0.33    0.00   12.46    0.00    0.00   15.20    0.00    0.00    0.00   72.01
05:46:49     all    0.50    0.00    0.33    0.00    0.00    0.00    0.00    0.00    0.00   99.17
05:46:52     all    0.00    0.00    0.00    0.00    0.00    0.17    0.00    0.00    0.00   99.83

21.02-RC1 - TX

# iperf3 -c 192.168.69.102 -P 2
Connecting to host 192.168.69.102, port 5201
[  5] local 192.168.69.128 port 54862 connected to 192.168.69.102 port 5201
[  7] local 192.168.69.128 port 54864 connected to 192.168.69.102 port 5201
[ ID] Interval           Transfer     Bitrate         Retr  Cwnd
[  5]   0.00-1.02   sec  48.7 MBytes   400 Mbits/sec    0    134 KBytes       
[  7]   0.00-1.02   sec  48.6 MBytes   400 Mbits/sec    0    134 KBytes       
[SUM]   0.00-1.02   sec  97.3 MBytes   799 Mbits/sec    0             
- - - - - - - - - - - - - - - - - - - - - - - - -
[  5]   1.02-2.02   sec  47.5 MBytes   401 Mbits/sec    0    134 KBytes       
[  7]   1.02-2.02   sec  47.5 MBytes   401 Mbits/sec    0    146 KBytes       
[SUM]   1.02-2.02   sec  95.0 MBytes   801 Mbits/sec    0             
- - - - - - - - - - - - - - - - - - - - - - - - -
[  5]   2.02-3.01   sec  47.5 MBytes   399 Mbits/sec    0    134 KBytes       
[  7]   2.02-3.01   sec  47.5 MBytes   399 Mbits/sec    0    146 KBytes       
[SUM]   2.02-3.01   sec  95.0 MBytes   799 Mbits/sec    0             
- - - - - - - - - - - - - - - - - - - - - - - - -
[  5]   3.01-4.03   sec  46.8 MBytes   388 Mbits/sec    0    214 KBytes       
[  7]   3.01-4.03   sec  45.7 MBytes   379 Mbits/sec    0    164 KBytes       
[SUM]   3.01-4.03   sec  92.5 MBytes   767 Mbits/sec    0             
- - - - - - - - - - - - - - - - - - - - - - - - -
[  5]   4.03-5.01   sec  46.2 MBytes   396 Mbits/sec    0    214 KBytes       
[  7]   4.03-5.01   sec  46.2 MBytes   396 Mbits/sec    0    164 KBytes       
[SUM]   4.03-5.01   sec  92.5 MBytes   792 Mbits/sec    0             
- - - - - - - - - - - - - - - - - - - - - - - - -
[  5]   5.01-6.01   sec  47.5 MBytes   397 Mbits/sec    0    214 KBytes       
[  7]   5.01-6.01   sec  47.5 MBytes   397 Mbits/sec    0    164 KBytes       
[SUM]   5.01-6.01   sec  95.0 MBytes   794 Mbits/sec    0             
- - - - - - - - - - - - - - - - - - - - - - - - -
[  5]   6.01-7.01   sec  47.5 MBytes   398 Mbits/sec    0    214 KBytes       
[  7]   6.01-7.01   sec  47.5 MBytes   398 Mbits/sec    0    164 KBytes       
[SUM]   6.01-7.01   sec  95.0 MBytes   796 Mbits/sec    0             
- - - - - - - - - - - - - - - - - - - - - - - - -
[  5]   7.01-8.01   sec  47.5 MBytes   397 Mbits/sec    0    226 KBytes       
[  7]   7.01-8.01   sec  47.5 MBytes   397 Mbits/sec    0    174 KBytes       
[SUM]   7.01-8.01   sec  95.0 MBytes   795 Mbits/sec    0             
- - - - - - - - - - - - - - - - - - - - - - - - -
[  5]   8.01-9.02   sec  47.5 MBytes   396 Mbits/sec    0    226 KBytes       
[  7]   8.01-9.02   sec  47.5 MBytes   396 Mbits/sec    0    180 KBytes       
[SUM]   8.01-9.02   sec  95.0 MBytes   792 Mbits/sec    0             
- - - - - - - - - - - - - - - - - - - - - - - - -
[  5]   9.02-10.00  sec  46.2 MBytes   395 Mbits/sec    0    226 KBytes       
[  7]   9.02-10.00  sec  46.2 MBytes   395 Mbits/sec    0    180 KBytes       
[SUM]   9.02-10.00  sec  92.5 MBytes   790 Mbits/sec    0             
- - - - - - - - - - - - - - - - - - - - - - - - -
[ ID] Interval           Transfer     Bitrate         Retr
[  5]   0.00-10.00  sec   473 MBytes   397 Mbits/sec    0             sender
[  5]   0.00-10.01  sec   473 MBytes   396 Mbits/sec                  receiver
[  7]   0.00-10.00  sec   472 MBytes   396 Mbits/sec    0             sender
[  7]   0.00-10.01  sec   472 MBytes   396 Mbits/sec                  receiver
[SUM]   0.00-10.00  sec   945 MBytes   792 Mbits/sec    0             sender
[SUM]   0.00-10.01  sec   945 MBytes   792 Mbits/sec                  receiver

iperf Done.

# mpstat 3 10
Linux 5.4.111 (OpenWrt) 	04/29/21 	_mips_	(4 CPU)

06:14:41     CPU    %usr   %nice    %sys %iowait    %irq   %soft  %steal  %guest  %gnice   %idle
06:14:44     all    0.75    0.00    0.25    0.00    0.00    0.00    0.00    0.00    0.00   99.00
06:14:47     all    0.00    0.00    0.00    0.00    0.00    0.08    0.00    0.00    0.00   99.92
06:14:50     all    0.08    0.00   16.97    0.00    0.00   10.40    0.00    0.00    0.00   72.55
06:14:53     all    1.33    0.00   25.48    0.00    0.00   15.24    0.00    0.00    0.00   57.95
06:14:56     all    0.17    0.00   25.02    0.00    0.00   15.21    0.00    0.00    0.00   59.60
06:14:59     all    0.58    0.00   17.00    0.00    0.00    9.83    0.00    0.00    0.00   72.58
06:15:02     all    0.00    0.00    0.00    0.00    0.00    0.00    0.00    0.00    0.00  100.00
06:15:05     all    0.83    0.00    0.25    0.00    0.00    0.00    0.00    0.00    0.00   98.92

21.02-RC1 - RX (Server Iperf3 stats)

Accepted connection from 192.168.69.128, port 54872
[  5] local 192.168.69.102 port 5201 connected to 192.168.69.128 port 54874
[  8] local 192.168.69.102 port 5201 connected to 192.168.69.128 port 54876
[ ID] Interval           Transfer     Bitrate         Retr  Cwnd
[  5]   0.00-1.00   sec  28.7 MBytes   241 Mbits/sec   20    342 KBytes       
[  8]   0.00-1.00   sec  34.5 MBytes   290 Mbits/sec    1    443 KBytes       
[SUM]   0.00-1.00   sec  63.3 MBytes   531 Mbits/sec   21             
- - - - - - - - - - - - - - - - - - - - - - - - -
[  5]   1.00-2.00   sec  28.8 MBytes   241 Mbits/sec    0    403 KBytes       
[  8]   1.00-2.00   sec  31.3 MBytes   262 Mbits/sec    4    362 KBytes       
[SUM]   1.00-2.00   sec  60.0 MBytes   504 Mbits/sec    4             
- - - - - - - - - - - - - - - - - - - - - - - - -
[  5]   2.00-3.00   sec  27.8 MBytes   234 Mbits/sec    7    339 KBytes       
[  8]   2.00-3.00   sec  35.5 MBytes   298 Mbits/sec    0    428 KBytes       
[SUM]   2.00-3.00   sec  63.4 MBytes   532 Mbits/sec    7             
- - - - - - - - - - - - - - - - - - - - - - - - -
[  5]   3.00-4.00   sec  27.9 MBytes   234 Mbits/sec    2    291 KBytes       
[  8]   3.00-4.00   sec  35.2 MBytes   296 Mbits/sec   17    356 KBytes       
[SUM]   3.00-4.00   sec  63.1 MBytes   530 Mbits/sec   19             
- - - - - - - - - - - - - - - - - - - - - - - - -
[  5]   4.00-5.00   sec  27.8 MBytes   234 Mbits/sec    0    356 KBytes       
[  8]   4.00-5.00   sec  34.4 MBytes   289 Mbits/sec    0    424 KBytes       
[SUM]   4.00-5.00   sec  62.3 MBytes   522 Mbits/sec    0             
- - - - - - - - - - - - - - - - - - - - - - - - -
[  5]   5.00-6.00   sec  25.2 MBytes   212 Mbits/sec    1    297 KBytes       
[  8]   5.00-6.00   sec  37.7 MBytes   316 Mbits/sec    0    486 KBytes       
[SUM]   5.00-6.00   sec  62.9 MBytes   528 Mbits/sec    1             
- - - - - - - - - - - - - - - - - - - - - - - - -
[  5]   6.00-7.00   sec  26.1 MBytes   219 Mbits/sec    0    359 KBytes       
[  8]   6.00-7.00   sec  36.5 MBytes   307 Mbits/sec    7    395 KBytes       
[SUM]   6.00-7.00   sec  62.6 MBytes   525 Mbits/sec    7             
- - - - - - - - - - - - - - - - - - - - - - - - -
[  5]   7.00-8.00   sec  30.7 MBytes   258 Mbits/sec    0    420 KBytes       
[  8]   7.00-8.00   sec  30.0 MBytes   252 Mbits/sec    4    321 KBytes       
[SUM]   7.00-8.00   sec  60.7 MBytes   509 Mbits/sec    4             
- - - - - - - - - - - - - - - - - - - - - - - - -
[  5]   8.00-9.00   sec  33.9 MBytes   284 Mbits/sec   10    232 KBytes       
[  8]   8.00-9.00   sec  27.7 MBytes   232 Mbits/sec    0    383 KBytes       
[SUM]   8.00-9.00   sec  61.5 MBytes   516 Mbits/sec   10             
- - - - - - - - - - - - - - - - - - - - - - - - -
[  5]   9.00-10.00  sec  25.4 MBytes   213 Mbits/sec    0    303 KBytes       
[  8]   9.00-10.00  sec  38.7 MBytes   324 Mbits/sec    0    451 KBytes       
[SUM]   9.00-10.00  sec  64.0 MBytes   537 Mbits/sec    0             
- - - - - - - - - - - - - - - - - - - - - - - - -
[ ID] Interval           Transfer     Bitrate         Retr
[  5]   0.00-10.01  sec   282 MBytes   237 Mbits/sec   40             sender
[  8]   0.00-10.01  sec   342 MBytes   286 Mbits/sec   33             sender
[SUM]   0.00-10.01  sec   624 MBytes   523 Mbits/sec   73             sender

# mpstat 3 10
Linux 5.4.111 (OpenWrt) 	04/29/21 	_mips_	(4 CPU)

06:17:59     CPU    %usr   %nice    %sys %iowait    %irq   %soft  %steal  %guest  %gnice   %idle
06:18:02     all    0.00    0.00    0.00    0.00    0.00    0.17    0.00    0.00    0.00   99.83
06:18:05     all    0.00    0.00    0.00    0.00    0.00    0.00    0.00    0.00    0.00  100.00
06:18:08     all    1.33    0.00   16.81    0.00    0.00   31.86    0.00    0.00    0.00   50.00
06:18:11     all    0.83    0.00   22.55    0.00    0.00   44.43    0.00    0.00    0.00   32.20
06:18:14     all    1.66    0.00   23.13    0.00    0.00   43.68    0.00    0.00    0.00   31.53
06:18:17     all    0.50    0.00   12.51    0.00    0.00   24.85    0.00    0.00    0.00   62.14
06:18:20     all    0.67    0.00    0.17    0.00    0.00    0.08    0.00    0.00    0.00   99.09
06:18:23     all    0.00    0.00    0.00    0.00    0.00    0.00    0.00    0.00    0.00  100.00
07.10.20181883Base systemBug ReportVery LowHighWAN interface VLAN not working on AVM FRITZ!Box 4040TrunkUnconfirmed Task Description

WAN interface of AVM FRITZ!Box 4040 is on eth1. To gain internet connectivity the ISP requires VLAN tagging with ID 7. But while I can send packets through interface eth1, I cannot through eth1.7.

Affected device: https://openwrt.org/toh/hwdata/avm/avm_fritz_box_4040 Affected versions: All I have tested, that is: 18.06.1 and the snapshot available today.

I haven’t seen any disturbing firewall rules and it still doesn’t work after flushing iptables completely.

Steps to reproduce:

- flash OpenWrt 18.06.1 to FRITZ!Box 4040
- change WAN ifname to eth1.7
- connect WAN port to laptop or monitoring device with Wireshark or similar
- send something via eth1.7, e.g. ping, but dhcp or pppd are sending stuff anyway

What happens:

Monitoring device does not see pings, dhcp, pppoe or other packets that go through eth1.7. It received when sending via eth1 directly (untagged). When sniffing via tcpdump on the router, it looks like the packets are send, but they are actually not going over the wire.

What should happen:

VLAN tagged packets are send properly (so PPPoE discovery succeeds in the end).

It was advised to open this bug report in the following forum thread. There is also some more information including configuration dumps. https://forum.openwrt.org/t/vlan-configuration-for-telekom/21841

09.08.20203280Base systemBug ReportVery LowCriticalWan interface and sometimes lan interfaces randomly go ...TrunkUnconfirmed Task Description

- Versions where bug is present: OpenWRT snapshots, tested with r13938 and r18039.

- Affected device: D-Link DIR-878 and likely others from its family.

- What does it do and shouldn’t do: the ethernet interfaces randomly get switched on/off, dropping the link and resetting the connection. Troubleshooting has already been thoroughly conducted to rule out other causes, see below. This is critical severity because makes OpenWRT unusable in these devices.

- Steps to reproduce:
– flash the snapshot image on a D-Link DIR-878;
– configure the WAN (tested with PPPoE and DHCP protocols) and LAN interfaces (tested with Static and DHCP protocols) - using all interfaces will increase the likelihood that at least one of them will present the behaviour;
– wait an indefinite but reasonable (< 2h for all instances so far) amount of time;
– the interface will randomly be put down and then up a couple seconds later, and it will be randomly looping up/down states at random amounts of time.

- Troubleshooting already conducted: full and detailed troubleshooting history is present at this forum thread. Please let me know if I can provide further information.

- Additional info: some people are having WiFi issues with MT7621 family devices that might be related to this one if they share a common cause, such as a possible race condition in the drivers;

18.08.20181794Base systemBug ReportVery LowLowW8970 - ADSL stops working after some timeTrunkUnconfirmed Task Description

Hi,

I have installed Openwrt 18.06.0 on my TD-W8970 device.
There is a problem that randomly, after average 2-5 days pppoe wan connection just stops working.

DSL is synchronized:
Annex: A
Line Mode: G.992.5 (ADSL2+)
Line State: UP [0×801: showtime_tc_sync]
(...)
Power Management Mode: L0 - Synchronized

No “leave showtime” message, kernel log is clean, system log is full of pppd restarting messages. Pppd keeps restarting and timeouts.

The only solution is to reboot machine, it always helps. How to debug and diagnose the problem?

30.08.20203311Base systemBug ReportVery LowLowvlan(NETWORK -> SWITCH) menu missing on luci -> mt7621(...TrunkUnconfirmed Task Description

vlan menu missing on luci → mt7621(ZBT3526) - trunk

that was on 2020-01 working ?
why is it now gone ?
also in /etc/config, there are no entries for vlan

i compared to the old version from 20020-01 ..

and there is 1 file missing: (or more ?)
# cat /lib/network/switch.sh

#!/bin/sh
# Copyright (C) 2009 OpenWrt.org

setup_switch_dev() {

      local name
      config_get name "$1" name
      name="${name:-$1}"
      [ -d "/sys/class/net/$name" ] && ip link set dev "$name" up
      swconfig dev "$name" load network

}

setup_switch() {

      config_load network
      config_foreach setup_switch_dev switch

}

 


14.10.2016227Base systemBug ReportMediumHighVLAN support mismatch between preinit and default netwo...TrunkResearching Task Description

PPPoE is broken on WRT1900ACS

Upgraded from Lede r578 to latest Lede r1814 and PPPOE doesn’t work anymore altough the pppd version and PPPoE version are the same:
- Linksys WRT1900ACS
- LEDE reboot r1814

pppd debug log:

Plugin rp-pppoe.so loaded.
RP-PPPoE plugin version 3.8p compiled against pppd 2.4.7
Send PPPOE Discovery V1T1 PADI session 0×0 length 4
dst ff:ff:ff:ff:ff:ff src c2:56:27:ca:d7:d4
[service-name]
Send PPPOE Discovery V1T1 PADI session 0×0 length 4
dst ff:ff:ff:ff:ff:ff src c2:56:27:ca:d7:d4
[service-name]
Send PPPOE Discovery V1T1 PADI session 0×0 length 4
dst ff:ff:ff:ff:ff:ff src c2:56:27:ca:d7:d4
[service-name]
Timeout waiting for PADO packets
Unable to complete PPPoE Discovery
Plugin rp-pppoe.so loaded.
RP-PPPoE plugin version 3.8p compiled against pppd 2.4.7
Send PPPOE Discovery V1T1 PADI session 0×0 length 4
dst ff:ff:ff:ff:ff:ff src c2:56:27:ca:d7:d4
[service-name]
Send PPPOE Discovery V1T1 PADI session 0×0 length 4
dst ff:ff:ff:ff:ff:ff src c2:56:27:ca:d7:d4
[service-name]
Send PPPOE Discovery V1T1 PADI session 0×0 length 4
dst ff:ff:ff:ff:ff:ff src c2:56:27:ca:d7:d4
[service-name]

While on the same hardware running LEDE r578, the PPPoE module works as expected:

Plugin rp-pppoe.so loaded.
RP-PPPoE plugin version 3.8p compiled against pppd 2.4.7
Send PPPOE Discovery V1T1 PADI session 0×0 length 4
dst ff:ff:ff:ff:ff:ff src c2:56:27:ca:d7:d4
[service-name]
Recv PPPOE Discovery V1T1 PADO session 0×0 length 40
dst c2:56:27:ca:d7:d4 src a0:f3:e4:34:d8:21
[service-name] [AC-name acc-aln1.hac] [AC-cookie 75 58 37 a5 ba 3c e4 a5 2a 61 bb 23 92 5c 1b dc]
Send PPPOE Discovery V1T1 PADR session 0×0 length 24
dst a0:f3:e4:34:d8:21 src c2:56:27:ca:d7:d4
[service-name] [AC-cookie 75 58 37 a5 ba 3c e4 a5 2a 61 bb 23 92 5c 1b dc]
Recv PPPOE Discovery V1T1 PADS session 0x30b length 4
dst c2:56:27:ca:d7:d4 src a0:f3:e4:34:d8:21
[service-name]
PADS: Service-Name: ‘’ PPP session is 779
Connected to a0:f3:e4:34:d8:21 via interface eth0
using channel 2
Using interface pppoe-wan
Connect: pppoe-wan ←→ eth0
sent [LCP ConfReq id=0×1 <mru 1492> <magic 0xc6952556>]
rcvd [LCP ConfReq id=0×66 <mru 1492> <auth chap MD5> <magic 0x4cc73648>]
sent [LCP ConfAck id=0×66 <mru 1492> <auth chap MD5> <magic 0x4cc73648>]
rcvd [LCP ConfAck id=0×1 <mru 1492> <magic 0xc6952556>]
sent [LCP EchoReq id=0×0 magic=0xc6952556]
rcvd [CHAP Challenge id=0×1 <7131a44524d1de8f1cd1061cac6d8c071d8bfe7351bc4ea7bd08f56684428475f229ba177a192696ebab32>, name = “acc-aln1.hac”]
sent [CHAP Response id=0×1 <4bb1a418b298790b128ad4d7ef3109ad>, name = “bthomehub@btbroadband.com”]
rcvd [LCP EchoRep id=0×0 magic=0x4cc73648]
rcvd [CHAP Success id=0×1 “CHAP authentication success”]
CHAP authentication succeeded: CHAP authentication success
CHAP authentication succeeded
peer from calling number A0:F3:E4:34:D8:21 authorized
sent [IPCP ConfReq id=0×1 <addr 0.0.0.0> <ms-dns1 0.0.0.0> <ms-dns2 0.0.0.0>]
sent [IPV6CP ConfReq id=0×1 <addr fe80::c595:37d1:3987:1929>]
rcvd [IPV6CP ConfReq id=0x7b <addr fe80::0221:05ff:feb4:8824>]
sent [IPV6CP ConfAck id=0x7b <addr fe80::0221:05ff:feb4:8824>]
rcvd [IPCP ConfReq id=0×38 <addr 172.16.12.12>]
sent [IPCP ConfAck id=0×38 <addr 172.16.12.12>]
rcvd [IPCP ConfNak id=0×1 <addr 81.146.2.155> <ms-dns1 81.139.57.100> <ms-dns2 81.139.56.100>]
sent [IPCP ConfReq id=0×2 <addr 81.146.2.155> <ms-dns1 81.139.57.100> <ms-dns2 81.139.56.100>]
rcvd [IPV6CP ConfAck id=0×1 <addr fe80::c595:37d1:3987:1929>]
local LL address fe80::c595:37d1:3987:1929
remote LL address fe80::0221:05ff:feb4:8824
Script /lib/netifd/ppp-up started (pid 2646)
rcvd [IPCP ConfAck id=0×2 <addr 81.146.2.155> <ms-dns1 81.139.57.100> <ms-dns2 81.139.56.100>]
local IP address 81.146.2.155
remote IP address 172.16.12.12
primary DNS address 81.139.57.100
secondary DNS address 81.139.56.100
ppp.log
secondary DNS address 81.139.56.100
Script /lib/netifd/ppp-up started (pid 2653)
Script /lib/netifd/ppp-up finished (pid 2646), status = 0×9 Script /lib/netifd/ppp-up finished (pid 2653), status = 0×9

Showing tasks 51 - 100 of 1430 Page 2 of 29 - 1 - 2 - 3 - 4 - 5 - Last >>

Available keyboard shortcuts

Tasklist

Task Details

Task Editing