All of lore.kernel.org
 help / color / mirror / Atom feed
* Re: [BUG] Kernel crashes with ath10k radio and Nexus 5X clients
@ 2016-11-18  9:30 Timo Sigurdsson
  2016-11-18 21:22 ` Adrian Chadd
  0 siblings, 1 reply; 7+ messages in thread
From: Timo Sigurdsson @ 2016-11-18  9:30 UTC (permalink / raw)
  To: ath10k; +Cc: lede-dev

Hi again,

in the meantime, I have some more information to add to the issue mentioned in
my email quoted further down below.

Ben Greear approached me off-list and suggested to try the Candela Tech ath10k
driver and firmware and see if the issue occurs with that as well. So, for the
last 3 weeks I've been testing the CT driver and firmware and I can happily
report that the issue with the driver crashing after a while when a Nexus 5X
device is connected is not occuring with the current BETA 18
firmware-2-ct-full-community.bin. So, this really seems like a regression in
the official API level 5 ath10k firmware blobs.

The CT firmware is not perfect either, since it seems to suffer from a different
bug that has been resolved in the official firmwares, and that is that after a
reboot of my TP-Link Archer C7 v2, the ath10k driver won't load. Only after a 
hard reset or "cold boot" it will come up. That's an issue I had with older
official firmwares as well, but it has been resolved with the recent API level
5 firmwares.

Nevertheless, for the time being, I will stick to the CT firmware because I can
work around the reboot issue and having the 5GHz wifi working for my Nexus 5X
clients is more important.

Over the next weeks, I will test different combinations of ath10k(-ct) driver
and firmware to see if there's a combination that resolves all issues. This
morning I flashed a LEDE build with the official ath10k driver and the CT
firmware binary.

But of course, if someone has more suggestions on what I could try or what
information I could collect to help resolve the issue related to the Nexus 5X
clients in the official firmware binaries, I think that would be beneficial
for a larger audience.

Regards,

Timo

P.S.: Please include my email address in any reply, since I'm not subscribed
to the mailing list. Thank you.


Timo Sigurdsson schrieb am 29.10.2016 22:19:

> Hi everybody,
> 
> I have a TP-Link Archer C7 v2 running a fairly recent build of LEDE (r1952, 
> Linux 4.4.26, compat-wireless-2016-10-08). It all works well except for the
> fact that when I connect a Nexus 5X device to the 5GHz radio, the kernel or
> ath10k driver will crash after a while. 5Ghz wifi will be dead after that
> until I reboot the system.
> 
> This issue has been reported before [1] and it also has been declared as
> solved with newer firmwares [2] (but reopened by other users). However, even
> with the latest firmware 10.2.4.70.58 from Kalle Valo's Github repository the
> issue is far from resolved. I have tried many different firmware revisions
> over the time (more recently 10.2.4.70.56 and 10.2.4.70.54), and I can could
> only find that the issue sometimes takes longer to trigger with some firmwares
> (which might just be random), but it would always occur at some point with API
> level 5 firmwares. With API level 2 firmwares (which I testesd when I was
> still using OpenWrt 15.05) I never saw these crashes, but the Nexus 5X had
> other connectivity issues with these older firmwares that made this
> combination no fun to use either. But this shows that the firmware itself
> makes the difference here.
> 
> I actually have two Nexus 5X on my network (my wife's and my own). I can
> trigger the crash with either one of them. And if both Nexus 5X are connected
> to the 5Ghz radio, then the issue triggers much faster (can be as low as 15
> minutes). My workaround is to let the Nexus 5X devices only connect to the
> 2.4GHz radio. This way, the device can runs for weeks without any issue or
> crash, but of course I would prefer the actual bug being fixed rather than to
> circumvent it.
> 
> I'm appending a syslog from my access point with a crash happening while one
> Nexus 5X was connected to the 5GHz radio starting from the time the system
> booted. I randomized the MAC addresses. but left the first two characters
> unique so different clients can be distinguished.
> 
> If there is more info I could collect to help identify the cause of this
> issue, please let me know (and possibly how to do that as well).
> 
> Thank you and regards,
> 
> Timo
> 
> [1] http://lists.infradead.org/pipermail/ath10k/2015-November/006413.html
> [2] https://dev.openwrt.org/ticket/20854
> 
> And here's the log:
> Fri Oct 28 02:01:35 2016 kern.notice kernel: [    0.000000] Linux version
> 4.4.26 (user@buildsystem) (gcc version 5.4.0 (LEDE GCC 5.4.0 r1952) ) #0 Fri
> Oct 21 15:52:28 2016
> [...]
> Fri Oct 28 02:01:35 2016 kern.info kernel: [    9.468751] Loading modules
> backported from Linux version wt-2016-10-03-1-g6fcb1a6
> Fri Oct 28 02:01:35 2016 kern.info kernel: [    9.476481] Backport generated by
> backports.git backports-20160324-9-g0e38f5c
> Fri Oct 28 02:01:35 2016 kern.warn kernel: [    9.576570] PCI: Enabling device
> 0000:01:00.0 (0000 -> 0002)
> Fri Oct 28 02:01:35 2016 kern.info kernel: [    9.582475] ath10k_pci
> 0000:01:00.0: pci irq legacy oper_irq_mode 1 irq_mode 0 reset_mode 0
> Fri Oct 28 02:01:35 2016 kern.warn kernel: [   10.087609] ath10k_pci
> 0000:01:00.0: Direct firmware load for ath10k/pre-cal-pci-0000:01:00.0.bin
> failed with error -2
> Fri Oct 28 02:01:35 2016 kern.warn kernel: [   10.098492] ath10k_pci
> 0000:01:00.0: Falling back to user helper
> Fri Oct 28 02:01:35 2016 kern.err kernel: [   10.176500] firmware
> ath10k!pre-cal-pci-0000:01:00.0.bin: firmware_loading_store: map pages failed
> Fri Oct 28 02:01:35 2016 kern.info kernel: [   10.677026] ath10k_pci
> 0000:01:00.0: qca988x hw2.0 target 0x4100016c chip_id 0x043202ff sub 0000:0000
> Fri Oct 28 02:01:35 2016 kern.info kernel: [   10.686424] ath10k_pci
> 0000:01:00.0: kconfig debug 0 debugfs 1 tracing 0 dfs 1 testmode 1
> Fri Oct 28 02:01:35 2016 kern.info kernel: [   10.699498] ath10k_pci
> 0000:01:00.0: firmware ver 10.2.4.70.58 api 5 features no-p2p,raw-mode,mfp
> crc32 e1af076f
> Fri Oct 28 02:01:35 2016 kern.warn kernel: [   10.709932] ath10k_pci
> 0000:01:00.0: Direct firmware load for ath10k/QCA988X/hw2.0/board-2.bin failed
> with error -2
> Fri Oct 28 02:01:35 2016 kern.warn kernel: [   10.720531] ath10k_pci
> 0000:01:00.0: Falling back to user helper
> Fri Oct 28 02:01:35 2016 kern.err kernel: [   10.798719] firmware
> ath10k!QCA988X!hw2.0!board-2.bin: firmware_loading_store: map pages failed
> Fri Oct 28 02:01:35 2016 kern.info kernel: [   10.823845] ath10k_pci
> 0000:01:00.0: board_file api 1 bmi_id N/A crc32 bebc7c08
> Fri Oct 28 02:01:35 2016 kern.info kernel: [   11.954723] ath10k_pci
> 0000:01:00.0: htt-ver 2.1 wmi-op 5 htt-op 2 cal file max-sta 128 raw 0 hwcrypto
> 1
> [...]
> // Evertyhing runs fine for a bit more than a day, but then this happens ... //
> // Note: The ath10k radio in question is wlan0 //
> Sat Oct 29 10:38:21 2016 daemon.info hostapd: wlan1: STA 9c:12:34:56:78:9a IEEE
> 802.11: disassociated
> Sat Oct 29 10:38:22 2016 daemon.info hostapd: wlan1: STA 9c:12:34:56:78:9a IEEE
> 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
> Sat Oct 29 10:42:57 2016 daemon.info hostapd: wlan1: STA 00:12:34:56:78:9a WPA:
> group key handshake completed (RSN)
> Sat Oct 29 10:42:57 2016 daemon.info hostapd: wlan0: STA a0:12:34:56:78:9a WPA:
> group key handshake completed (RSN)
> Sat Oct 29 10:42:57 2016 daemon.info hostapd: wlan0: STA 70:12:34:56:78:9a WPA:
> group key handshake completed (RSN)
> Sat Oct 29 10:43:05 2016 kern.warn kernel: [117635.147861] ath10k_pci
> 0000:01:00.0: failed to delete peer 7f:12:34:56:78:9a for vdev 0: -145
> Sat Oct 29 10:43:05 2016 kern.warn kernel: [117635.156679] ath10k_pci
> 0000:01:00.0: found sta peer 7f:12:34:56:78:9a (ptr 86ebf200 id 62) entry on
> vdev 0 after it was supposedly removed
> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.169489] ------------[ cut
> here ]------------
> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.174314] WARNING: CPU: 0 PID:
> 1885 at compat-wireless-2016-10-08/net/mac80211/sta_info.c:964 0x875870a4
> [mac80211@87580000+0x5f500]()
> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.186854] Modules linked in:
> pppoe ppp_async iptable_nat ath9k pppox ppp_generic nf_nat_ipv4
> nf_conntrack_ipv6 nf_conntrack_ipv4 ipt_REJECT ipt_MASQUERADE ax88179_178a
> ath9k_common xt_time xt_tcpudp xt_tcpmss xt_statistic xt_state xt_recent xt_nat
> xt_multiport xt_mark xt_mac xt_limit xt_length xt_id xt_hl xt_helper xt_ecn
> xt_dscp xt_conntrack xt_connmark xt_connlimit xt_connbytes xt_comment xt_TCPMSS
> xt_REDIRECT xt_LOG xt_HL xt_DSCP xt_CT xt_CLASSIFY usbnet Sat Oct 29 10:43:06
> 2016 kern.warn kernel: [117635.294282] CPU: 0 PID: 1885 Comm: hostapd Not
> tainted 4.4.26 #0
> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.300471] Stack : 8036cff4
> 00000000 00000001 803c0000 00000000 00000000 00000000 00000000
> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.300471] 	  00000000 00000000
> 00000000 00000000 00000000 00000000 00000000 00000000
> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.300471] 	  00000000 00000000
> 00000000 00000000 00000000 00000000 00000000 00000000
> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.300471] 	  00000000 00000000
> 00000000 00000000 00000000 00000000 00000000 00000000
> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.300471] 	  00000000 00000000
> 00000000 00000000 00000000 00000000 00000000 00000000
> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.300471] 	  ...
> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.336918] Call
> Trace:[<800716f0>] 0x800716f0
> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.341551] [<800716f0>]
> 0x800716f0
> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.345176] [<8008144c>]
> 0x8008144c
> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.348832] [<875870a4>]
> 0x875870a4 [mac80211@87580000+0x5f500]
> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.354943] [<80081504>]
> 0x80081504
> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.358611] [<875870a4>]
> 0x875870a4 [mac80211@87580000+0x5f500]
> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.364742] [<87587188>]
> 0x87587188 [mac80211@87580000+0x5f500]
> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.370861] [<875849b4>]
> 0x875849b4 [mac80211@87580000+0x5f500]
> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.376951] [<80115770>]
> 0x80115770
> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.380613] [<87587238>]
> 0x87587238 [mac80211@87580000+0x5f500]
> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.386727] [<874cc114>]
> 0x874cc114 [cfg80211@874c0000+0x35b60]
> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.392854] [<80293074>]
> 0x80293074
> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.396485] [<80291900>]
> 0x80291900
> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.400176] [<80292df8>]
> 0x80292df8
> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.403801] [<80292238>]
> 0x80292238
> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.407439] [<80292de0>]
> 0x80292de0
> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.411079] [<80257794>]
> 0x80257794
> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.414711] [<80291aa0>]
> 0x80291aa0
> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.418345] [<80256c90>]
> 0x80256c90
> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.421991] [<80292004>]
> 0x80292004
> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.425616] [<801b5304>]
> 0x801b5304
> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.429260] [<8025b478>]
> 0x8025b478
> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.432902] [<8024d0e4>]
> 0x8024d0e4
> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.436540] [<8024e4f8>]
> 0x8024e4f8
> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.440195] [<801b5304>]
> 0x801b5304
> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.443835] [<8027e338>]
> 0x8027e338
> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.447464] [<802e8244>]
> 0x802e8244
> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.451136] [<8011aa58>]
> 0x8011aa58
> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.454762] [<8011ae3c>]
> 0x8011ae3c
> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.458402] [<8011acd4>]
> 0x8011acd4
> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.462057] [<80117a10>]
> 0x80117a10
> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.465700] [<8024f424>]
> 0x8024f424
> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.469344] [<800b1dd0>]
> 0x800b1dd0
> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.472986] [<8006295c>]
> 0x8006295c
> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.476615] 
> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.478223] ---[ end trace
> 2c07f06df2595aa5 ]---
> Sat Oct 29 10:43:06 2016 daemon.info hostapd: wlan0: STA 7f:12:34:56:78:9a IEEE
> 802.11: deauthenticated due to local deauth request
> Sat Oct 29 10:43:15 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a IEEE
> 802.11: authenticated
> Sat Oct 29 10:43:15 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a IEEE
> 802.11: associated (aid 2)
> Sat Oct 29 10:43:15 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a
> RADIUS: starting accounting session D1227001A194DA09
> Sat Oct 29 10:43:15 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a WPA:
> pairwise key handshake completed (RSN)
> Sat Oct 29 10:43:31 2016 daemon.info hostapd: wlan1: STA a0:12:34:56:78:9a IEEE
> 802.11: authenticated
> Sat Oct 29 10:43:31 2016 daemon.info hostapd: wlan1: STA a0:12:34:56:78:9a IEEE
> 802.11: associated (aid 3)
> Sat Oct 29 10:43:31 2016 daemon.info hostapd: wlan1: STA a0:12:34:56:78:9a
> RADIUS: starting accounting session 92084E55AFE512B3
> Sat Oct 29 10:43:31 2016 daemon.info hostapd: wlan1: STA a0:12:34:56:78:9a WPA:
> pairwise key handshake completed (RSN)
> Sat Oct 29 10:48:02 2016 daemon.info hostapd: wlan0: STA a0:12:34:56:78:9a IEEE
> 802.11: disassociated due to inactivity
> Sat Oct 29 10:48:05 2016 kern.warn kernel: [117935.165013] ath10k_pci
> 0000:01:00.0: failed to install key for vdev 0 peer a0:12:34:56:78:9a: -145
> Sat Oct 29 10:48:05 2016 kern.err kernel: [117935.174193] wlan0: failed to
> remove key (0, a0:12:34:56:78:9a) from hardware (-145)
> Sat Oct 29 10:48:05 2016 daemon.info hostapd: wlan0: STA 70:12:34:56:78:9a IEEE
> 802.11: disassociated due to inactivity
> Sat Oct 29 10:48:08 2016 kern.warn kernel: [117938.174996] ath10k_pci
> 0000:01:00.0: failed to install key for vdev 0 peer 70:12:34:56:78:9a: -11
> Sat Oct 29 10:48:08 2016 kern.err kernel: [117938.184092] wlan0: failed to
> remove key (0, 70:12:34:56:78:9a) from hardware (-11)
> Sat Oct 29 10:48:08 2016 daemon.info hostapd: wlan0: STA a0:12:34:56:78:9a IEEE
> 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.193251] ath10k_pci
> 0000:01:00.0: cipher 0 is not supported
> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.199320] ath10k_pci
> 0000:01:00.0: failed to remove peer wep key 0: -122
> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.206409] ath10k_pci
> 0000:01:00.0: failed to clear all peer wep keys for vdev 0: -122
> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.214621] ath10k_pci
> 0000:01:00.0: failed to disassociate station: a0:12:34:56:78:9a vdev 0: -122
> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.223892] ------------[ cut
> here ]------------
> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.228706] WARNING: CPU: 0 PID:
> 1885 at compat-wireless-2016-10-08/net/mac80211/sta_info.c:956 0x87587050
> [mac80211@87580000+0x5f500]()
> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.241226] Modules linked in:
> pppoe ppp_async iptable_nat ath9k pppox ppp_generic nf_nat_ipv4
> nf_conntrack_ipv6 nf_conntrack_ipv4 ipt_REJECT ipt_MASQUERADE ax88179_178a
> ath9k_common xt_time xt_tcpudp xt_tcpmss xt_statistic xt_state xt_recent xt_nat
> xt_multiport xt_mark xt_mac xt_limit xt_length xt_id xt_hl xt_helper xt_ecn
> xt_dscp xt_conntrack xt_connmark xt_connlimit xt_connbytes xt_comment xt_TCPMSS
> xt_REDIRECT xt_LOG xt_HL xt_DSCP xt_CT xt_CLASSIFY usbnet Sat Oct 29 10:48:09
> 2016 kern.warn kernel: [117938.348645] CPU: 0 PID: 1885 Comm: hostapd Tainted:
> G        W       4.4.26 #0
> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.356067] Stack : 8036cff4
> 00000000 00000001 803c0000 00000000 00000000 00000000 00000000
> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.356067] 	  00000000 00000000
> 00000000 00000000 00000000 00000000 00000000 00000000
> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.356067] 	  00000000 00000000
> 00000000 00000000 00000000 00000000 00000000 00000000
> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.356067] 	  00000000 00000000
> 00000000 00000000 00000000 00000000 00000000 00000000
> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.356067] 	  00000000 00000000
> 00000000 00000000 00000000 00000000 00000000 00000000
> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.356067] 	  ...
> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.392511] Call
> Trace:[<800716f0>] 0x800716f0
> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.397147] [<800716f0>]
> 0x800716f0
> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.400770] [<8008144c>]
> 0x8008144c
> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.404414] [<87587050>]
> 0x87587050 [mac80211@87580000+0x5f500]
> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.410531] [<80081504>]
> 0x80081504
> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.414184] [<87587050>]
> 0x87587050 [mac80211@87580000+0x5f500]
> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.420297] [<8759cb40>]
> 0x8759cb40 [mac80211@87580000+0x5f500]
> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.426431] [<87587188>]
> 0x87587188 [mac80211@87580000+0x5f500]
> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.432531] [<875849b4>]
> 0x875849b4 [mac80211@87580000+0x5f500]
> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.438629] [<801018e4>]
> 0x801018e4
> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.442276] [<87587238>]
> 0x87587238 [mac80211@87580000+0x5f500]
> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.448406] [<874cc114>]
> 0x874cc114 [cfg80211@874c0000+0x35b60]
> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.454516] [<80293074>]
> 0x80293074
> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.458147] [<80291900>]
> 0x80291900
> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.461822] [<80292df8>]
> 0x80292df8
> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.465461] [<80292238>]
> 0x80292238
> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.469092] [<800a15d0>]
> 0x800a15d0
> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.472726] [<80292de0>]
> 0x80292de0
> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.476371] [<80257794>]
> 0x80257794
> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.480002] [<80291aa0>]
> 0x80291aa0
> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.483630] [<80256c90>]
> 0x80256c90
> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.487280] [<80292004>]
> 0x80292004
> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.490908] [<801b5304>]
> 0x801b5304
> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.494541] [<8025b478>]
> 0x8025b478
> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.498198] [<8024d0e4>]
> 0x8024d0e4
> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.501840] [<8024e4f8>]
> 0x8024e4f8
> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.505492] [<8027e338>]
> 0x8027e338
> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.509121] [<802e8244>]
> 0x802e8244
> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.512780] [<8011aa58>]
> 0x8011aa58
> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.516413] [<8011ae3c>]
> 0x8011ae3c
> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.520043] [<8011acd4>]
> 0x8011acd4
> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.523697] [<80117a10>]
> 0x80117a10
> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.527352] [<8024f424>]
> 0x8024f424
> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.530981] [<801059e8>]
> 0x801059e8
> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.534625] [<8006295c>]
> 0x8006295c
> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.538265] 
> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.539870] ---[ end trace
> 2c07f06df2595aa6 ]---
> Sat Oct 29 10:48:12 2016 kern.warn kernel: [117941.534956] ath10k_pci
> 0000:01:00.0: failed to delete peer a0:12:34:56:78:9a for vdev 0: -11
> Sat Oct 29 10:48:12 2016 kern.warn kernel: [117941.543716] ath10k_pci
> 0000:01:00.0: found sta peer a0:12:34:56:78:9a (ptr 86ebf400 id 196) entry on
> vdev 0 after it was supposedly removed
> Sat Oct 29 10:48:12 2016 daemon.info hostapd: wlan0: STA 70:12:34:56:78:9a IEEE
> 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
> Sat Oct 29 10:48:12 2016 kern.warn kernel: [117941.558962] ath10k_pci
> 0000:01:00.0: cipher 0 is not supported
> Sat Oct 29 10:48:12 2016 kern.warn kernel: [117941.565049] ath10k_pci
> 0000:01:00.0: failed to remove peer wep key 0: -122
> Sat Oct 29 10:48:15 2016 kern.warn kernel: [117944.564917] ath10k_warn: 2
> callbacks suppressed
> Sat Oct 29 10:48:15 2016 kern.warn kernel: [117944.569617] ath10k_pci
> 0000:01:00.0: failed to delete peer 70:12:34:56:78:9a for vdev 0: -11
> Sat Oct 29 10:48:15 2016 kern.warn kernel: [117944.578309] ath10k_pci
> 0000:01:00.0: found sta peer 70:12:34:56:78:9a (ptr 86320c00 id 251) entry on
> vdev 0 after it was supposedly removed
> Sat Oct 29 10:48:18 2016 kern.warn kernel: [117947.584908] ath10k_pci
> 0000:01:00.0: failed to set beacon mode for vdev 0: -11
> Sat Oct 29 10:48:21 2016 kern.warn kernel: [117950.584876] ath10k_pci
> 0000:01:00.0: failed to set dtim period for vdev 0: -11
> Sat Oct 29 10:48:24 2016 kern.warn kernel: [117953.594843] ath10k_pci
> 0000:01:00.0: failed to recalculate rts/cts prot for vdev 0: -11
> Sat Oct 29 10:48:27 2016 kern.warn kernel: [117956.594833] ath10k_pci
> 0000:01:00.0: failed to set protection mode 0 on vdev 0: -11
> Sat Oct 29 10:48:30 2016 kern.warn kernel: [117959.594805] ath10k_pci
> 0000:01:00.0: failed to set preamble for vdev 0: -11
> Sat Oct 29 10:52:57 2016 daemon.info hostapd: wlan1: STA 00:12:34:56:78:9a WPA:
> group key handshake completed (RSN)
> Sat Oct 29 10:52:57 2016 daemon.info hostapd: wlan1: STA a0:12:34:56:78:9a WPA:
> group key handshake completed (RSN)
> Sat Oct 29 10:53:00 2016 kern.warn kernel: [118229.632250] ath10k_pci
> 0000:01:00.0: failed to install key for vdev 0 peer 30:12:34:56:78:9a: -11
> Sat Oct 29 10:53:00 2016 kern.err kernel: [118229.641421] wlan0: failed to
> remove key (2, ff:ff:ff:ff:ff:ff) from hardware (-11)
> Sat Oct 29 10:53:03 2016 kern.warn kernel: [118232.642204] ath10k_pci
> 0000:01:00.0: failed to install key for vdev 0 peer 30:12:34:56:78:9a: -11
> Sat Oct 29 10:53:03 2016 kern.err kernel: [118232.651309] wlan0: failed to set
> key (2, ff:ff:ff:ff:ff:ff) to hardware (-11)
> Sat Oct 29 10:53:08 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a IEEE
> 802.11: deauthenticated due to local deauth request
> Sat Oct 29 10:53:11 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a IEEE
> 802.11: authenticated
> Sat Oct 29 10:53:11 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a IEEE
> 802.11: associated (aid 2)
> Sat Oct 29 10:53:11 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a
> RADIUS: starting accounting session 56977F3FD253EA9C
> Sat Oct 29 10:53:11 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a WPA:
> pairwise key handshake completed (RSN)
> 


_______________________________________________
ath10k mailing list
ath10k@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/ath10k

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [BUG] Kernel crashes with ath10k radio and Nexus 5X clients
  2016-11-18  9:30 [BUG] Kernel crashes with ath10k radio and Nexus 5X clients Timo Sigurdsson
@ 2016-11-18 21:22 ` Adrian Chadd
  2016-11-20  1:35   ` Timo Sigurdsson
  0 siblings, 1 reply; 7+ messages in thread
From: Adrian Chadd @ 2016-11-18 21:22 UTC (permalink / raw)
  To: Timo Sigurdsson; +Cc: lede-dev, ath10k

hiya!

Can you file a kernel.org bug mentioning this?

thanks!


-a


On 18 November 2016 at 01:30, Timo Sigurdsson
<public_timo.s@silentcreek.de> wrote:
> Hi again,
>
> in the meantime, I have some more information to add to the issue mentioned in
> my email quoted further down below.
>
> Ben Greear approached me off-list and suggested to try the Candela Tech ath10k
> driver and firmware and see if the issue occurs with that as well. So, for the
> last 3 weeks I've been testing the CT driver and firmware and I can happily
> report that the issue with the driver crashing after a while when a Nexus 5X
> device is connected is not occuring with the current BETA 18
> firmware-2-ct-full-community.bin. So, this really seems like a regression in
> the official API level 5 ath10k firmware blobs.
>
> The CT firmware is not perfect either, since it seems to suffer from a different
> bug that has been resolved in the official firmwares, and that is that after a
> reboot of my TP-Link Archer C7 v2, the ath10k driver won't load. Only after a
> hard reset or "cold boot" it will come up. That's an issue I had with older
> official firmwares as well, but it has been resolved with the recent API level
> 5 firmwares.
>
> Nevertheless, for the time being, I will stick to the CT firmware because I can
> work around the reboot issue and having the 5GHz wifi working for my Nexus 5X
> clients is more important.
>
> Over the next weeks, I will test different combinations of ath10k(-ct) driver
> and firmware to see if there's a combination that resolves all issues. This
> morning I flashed a LEDE build with the official ath10k driver and the CT
> firmware binary.
>
> But of course, if someone has more suggestions on what I could try or what
> information I could collect to help resolve the issue related to the Nexus 5X
> clients in the official firmware binaries, I think that would be beneficial
> for a larger audience.
>
> Regards,
>
> Timo
>
> P.S.: Please include my email address in any reply, since I'm not subscribed
> to the mailing list. Thank you.
>
>
> Timo Sigurdsson schrieb am 29.10.2016 22:19:
>
>> Hi everybody,
>>
>> I have a TP-Link Archer C7 v2 running a fairly recent build of LEDE (r1952,
>> Linux 4.4.26, compat-wireless-2016-10-08). It all works well except for the
>> fact that when I connect a Nexus 5X device to the 5GHz radio, the kernel or
>> ath10k driver will crash after a while. 5Ghz wifi will be dead after that
>> until I reboot the system.
>>
>> This issue has been reported before [1] and it also has been declared as
>> solved with newer firmwares [2] (but reopened by other users). However, even
>> with the latest firmware 10.2.4.70.58 from Kalle Valo's Github repository the
>> issue is far from resolved. I have tried many different firmware revisions
>> over the time (more recently 10.2.4.70.56 and 10.2.4.70.54), and I can could
>> only find that the issue sometimes takes longer to trigger with some firmwares
>> (which might just be random), but it would always occur at some point with API
>> level 5 firmwares. With API level 2 firmwares (which I testesd when I was
>> still using OpenWrt 15.05) I never saw these crashes, but the Nexus 5X had
>> other connectivity issues with these older firmwares that made this
>> combination no fun to use either. But this shows that the firmware itself
>> makes the difference here.
>>
>> I actually have two Nexus 5X on my network (my wife's and my own). I can
>> trigger the crash with either one of them. And if both Nexus 5X are connected
>> to the 5Ghz radio, then the issue triggers much faster (can be as low as 15
>> minutes). My workaround is to let the Nexus 5X devices only connect to the
>> 2.4GHz radio. This way, the device can runs for weeks without any issue or
>> crash, but of course I would prefer the actual bug being fixed rather than to
>> circumvent it.
>>
>> I'm appending a syslog from my access point with a crash happening while one
>> Nexus 5X was connected to the 5GHz radio starting from the time the system
>> booted. I randomized the MAC addresses. but left the first two characters
>> unique so different clients can be distinguished.
>>
>> If there is more info I could collect to help identify the cause of this
>> issue, please let me know (and possibly how to do that as well).
>>
>> Thank you and regards,
>>
>> Timo
>>
>> [1] http://lists.infradead.org/pipermail/ath10k/2015-November/006413.html
>> [2] https://dev.openwrt.org/ticket/20854
>>
>> And here's the log:
>> Fri Oct 28 02:01:35 2016 kern.notice kernel: [    0.000000] Linux version
>> 4.4.26 (user@buildsystem) (gcc version 5.4.0 (LEDE GCC 5.4.0 r1952) ) #0 Fri
>> Oct 21 15:52:28 2016
>> [...]
>> Fri Oct 28 02:01:35 2016 kern.info kernel: [    9.468751] Loading modules
>> backported from Linux version wt-2016-10-03-1-g6fcb1a6
>> Fri Oct 28 02:01:35 2016 kern.info kernel: [    9.476481] Backport generated by
>> backports.git backports-20160324-9-g0e38f5c
>> Fri Oct 28 02:01:35 2016 kern.warn kernel: [    9.576570] PCI: Enabling device
>> 0000:01:00.0 (0000 -> 0002)
>> Fri Oct 28 02:01:35 2016 kern.info kernel: [    9.582475] ath10k_pci
>> 0000:01:00.0: pci irq legacy oper_irq_mode 1 irq_mode 0 reset_mode 0
>> Fri Oct 28 02:01:35 2016 kern.warn kernel: [   10.087609] ath10k_pci
>> 0000:01:00.0: Direct firmware load for ath10k/pre-cal-pci-0000:01:00.0.bin
>> failed with error -2
>> Fri Oct 28 02:01:35 2016 kern.warn kernel: [   10.098492] ath10k_pci
>> 0000:01:00.0: Falling back to user helper
>> Fri Oct 28 02:01:35 2016 kern.err kernel: [   10.176500] firmware
>> ath10k!pre-cal-pci-0000:01:00.0.bin: firmware_loading_store: map pages failed
>> Fri Oct 28 02:01:35 2016 kern.info kernel: [   10.677026] ath10k_pci
>> 0000:01:00.0: qca988x hw2.0 target 0x4100016c chip_id 0x043202ff sub 0000:0000
>> Fri Oct 28 02:01:35 2016 kern.info kernel: [   10.686424] ath10k_pci
>> 0000:01:00.0: kconfig debug 0 debugfs 1 tracing 0 dfs 1 testmode 1
>> Fri Oct 28 02:01:35 2016 kern.info kernel: [   10.699498] ath10k_pci
>> 0000:01:00.0: firmware ver 10.2.4.70.58 api 5 features no-p2p,raw-mode,mfp
>> crc32 e1af076f
>> Fri Oct 28 02:01:35 2016 kern.warn kernel: [   10.709932] ath10k_pci
>> 0000:01:00.0: Direct firmware load for ath10k/QCA988X/hw2.0/board-2.bin failed
>> with error -2
>> Fri Oct 28 02:01:35 2016 kern.warn kernel: [   10.720531] ath10k_pci
>> 0000:01:00.0: Falling back to user helper
>> Fri Oct 28 02:01:35 2016 kern.err kernel: [   10.798719] firmware
>> ath10k!QCA988X!hw2.0!board-2.bin: firmware_loading_store: map pages failed
>> Fri Oct 28 02:01:35 2016 kern.info kernel: [   10.823845] ath10k_pci
>> 0000:01:00.0: board_file api 1 bmi_id N/A crc32 bebc7c08
>> Fri Oct 28 02:01:35 2016 kern.info kernel: [   11.954723] ath10k_pci
>> 0000:01:00.0: htt-ver 2.1 wmi-op 5 htt-op 2 cal file max-sta 128 raw 0 hwcrypto
>> 1
>> [...]
>> // Evertyhing runs fine for a bit more than a day, but then this happens ... //
>> // Note: The ath10k radio in question is wlan0 //
>> Sat Oct 29 10:38:21 2016 daemon.info hostapd: wlan1: STA 9c:12:34:56:78:9a IEEE
>> 802.11: disassociated
>> Sat Oct 29 10:38:22 2016 daemon.info hostapd: wlan1: STA 9c:12:34:56:78:9a IEEE
>> 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
>> Sat Oct 29 10:42:57 2016 daemon.info hostapd: wlan1: STA 00:12:34:56:78:9a WPA:
>> group key handshake completed (RSN)
>> Sat Oct 29 10:42:57 2016 daemon.info hostapd: wlan0: STA a0:12:34:56:78:9a WPA:
>> group key handshake completed (RSN)
>> Sat Oct 29 10:42:57 2016 daemon.info hostapd: wlan0: STA 70:12:34:56:78:9a WPA:
>> group key handshake completed (RSN)
>> Sat Oct 29 10:43:05 2016 kern.warn kernel: [117635.147861] ath10k_pci
>> 0000:01:00.0: failed to delete peer 7f:12:34:56:78:9a for vdev 0: -145
>> Sat Oct 29 10:43:05 2016 kern.warn kernel: [117635.156679] ath10k_pci
>> 0000:01:00.0: found sta peer 7f:12:34:56:78:9a (ptr 86ebf200 id 62) entry on
>> vdev 0 after it was supposedly removed
>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.169489] ------------[ cut
>> here ]------------
>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.174314] WARNING: CPU: 0 PID:
>> 1885 at compat-wireless-2016-10-08/net/mac80211/sta_info.c:964 0x875870a4
>> [mac80211@87580000+0x5f500]()
>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.186854] Modules linked in:
>> pppoe ppp_async iptable_nat ath9k pppox ppp_generic nf_nat_ipv4
>> nf_conntrack_ipv6 nf_conntrack_ipv4 ipt_REJECT ipt_MASQUERADE ax88179_178a
>> ath9k_common xt_time xt_tcpudp xt_tcpmss xt_statistic xt_state xt_recent xt_nat
>> xt_multiport xt_mark xt_mac xt_limit xt_length xt_id xt_hl xt_helper xt_ecn
>> xt_dscp xt_conntrack xt_connmark xt_connlimit xt_connbytes xt_comment xt_TCPMSS
>> xt_REDIRECT xt_LOG xt_HL xt_DSCP xt_CT xt_CLASSIFY usbnet Sat Oct 29 10:43:06
>> 2016 kern.warn kernel: [117635.294282] CPU: 0 PID: 1885 Comm: hostapd Not
>> tainted 4.4.26 #0
>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.300471] Stack : 8036cff4
>> 00000000 00000001 803c0000 00000000 00000000 00000000 00000000
>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.300471]      00000000 00000000
>> 00000000 00000000 00000000 00000000 00000000 00000000
>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.300471]      00000000 00000000
>> 00000000 00000000 00000000 00000000 00000000 00000000
>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.300471]      00000000 00000000
>> 00000000 00000000 00000000 00000000 00000000 00000000
>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.300471]      00000000 00000000
>> 00000000 00000000 00000000 00000000 00000000 00000000
>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.300471]      ...
>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.336918] Call
>> Trace:[<800716f0>] 0x800716f0
>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.341551] [<800716f0>]
>> 0x800716f0
>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.345176] [<8008144c>]
>> 0x8008144c
>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.348832] [<875870a4>]
>> 0x875870a4 [mac80211@87580000+0x5f500]
>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.354943] [<80081504>]
>> 0x80081504
>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.358611] [<875870a4>]
>> 0x875870a4 [mac80211@87580000+0x5f500]
>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.364742] [<87587188>]
>> 0x87587188 [mac80211@87580000+0x5f500]
>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.370861] [<875849b4>]
>> 0x875849b4 [mac80211@87580000+0x5f500]
>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.376951] [<80115770>]
>> 0x80115770
>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.380613] [<87587238>]
>> 0x87587238 [mac80211@87580000+0x5f500]
>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.386727] [<874cc114>]
>> 0x874cc114 [cfg80211@874c0000+0x35b60]
>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.392854] [<80293074>]
>> 0x80293074
>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.396485] [<80291900>]
>> 0x80291900
>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.400176] [<80292df8>]
>> 0x80292df8
>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.403801] [<80292238>]
>> 0x80292238
>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.407439] [<80292de0>]
>> 0x80292de0
>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.411079] [<80257794>]
>> 0x80257794
>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.414711] [<80291aa0>]
>> 0x80291aa0
>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.418345] [<80256c90>]
>> 0x80256c90
>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.421991] [<80292004>]
>> 0x80292004
>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.425616] [<801b5304>]
>> 0x801b5304
>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.429260] [<8025b478>]
>> 0x8025b478
>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.432902] [<8024d0e4>]
>> 0x8024d0e4
>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.436540] [<8024e4f8>]
>> 0x8024e4f8
>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.440195] [<801b5304>]
>> 0x801b5304
>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.443835] [<8027e338>]
>> 0x8027e338
>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.447464] [<802e8244>]
>> 0x802e8244
>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.451136] [<8011aa58>]
>> 0x8011aa58
>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.454762] [<8011ae3c>]
>> 0x8011ae3c
>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.458402] [<8011acd4>]
>> 0x8011acd4
>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.462057] [<80117a10>]
>> 0x80117a10
>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.465700] [<8024f424>]
>> 0x8024f424
>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.469344] [<800b1dd0>]
>> 0x800b1dd0
>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.472986] [<8006295c>]
>> 0x8006295c
>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.476615]
>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.478223] ---[ end trace
>> 2c07f06df2595aa5 ]---
>> Sat Oct 29 10:43:06 2016 daemon.info hostapd: wlan0: STA 7f:12:34:56:78:9a IEEE
>> 802.11: deauthenticated due to local deauth request
>> Sat Oct 29 10:43:15 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a IEEE
>> 802.11: authenticated
>> Sat Oct 29 10:43:15 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a IEEE
>> 802.11: associated (aid 2)
>> Sat Oct 29 10:43:15 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a
>> RADIUS: starting accounting session D1227001A194DA09
>> Sat Oct 29 10:43:15 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a WPA:
>> pairwise key handshake completed (RSN)
>> Sat Oct 29 10:43:31 2016 daemon.info hostapd: wlan1: STA a0:12:34:56:78:9a IEEE
>> 802.11: authenticated
>> Sat Oct 29 10:43:31 2016 daemon.info hostapd: wlan1: STA a0:12:34:56:78:9a IEEE
>> 802.11: associated (aid 3)
>> Sat Oct 29 10:43:31 2016 daemon.info hostapd: wlan1: STA a0:12:34:56:78:9a
>> RADIUS: starting accounting session 92084E55AFE512B3
>> Sat Oct 29 10:43:31 2016 daemon.info hostapd: wlan1: STA a0:12:34:56:78:9a WPA:
>> pairwise key handshake completed (RSN)
>> Sat Oct 29 10:48:02 2016 daemon.info hostapd: wlan0: STA a0:12:34:56:78:9a IEEE
>> 802.11: disassociated due to inactivity
>> Sat Oct 29 10:48:05 2016 kern.warn kernel: [117935.165013] ath10k_pci
>> 0000:01:00.0: failed to install key for vdev 0 peer a0:12:34:56:78:9a: -145
>> Sat Oct 29 10:48:05 2016 kern.err kernel: [117935.174193] wlan0: failed to
>> remove key (0, a0:12:34:56:78:9a) from hardware (-145)
>> Sat Oct 29 10:48:05 2016 daemon.info hostapd: wlan0: STA 70:12:34:56:78:9a IEEE
>> 802.11: disassociated due to inactivity
>> Sat Oct 29 10:48:08 2016 kern.warn kernel: [117938.174996] ath10k_pci
>> 0000:01:00.0: failed to install key for vdev 0 peer 70:12:34:56:78:9a: -11
>> Sat Oct 29 10:48:08 2016 kern.err kernel: [117938.184092] wlan0: failed to
>> remove key (0, 70:12:34:56:78:9a) from hardware (-11)
>> Sat Oct 29 10:48:08 2016 daemon.info hostapd: wlan0: STA a0:12:34:56:78:9a IEEE
>> 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.193251] ath10k_pci
>> 0000:01:00.0: cipher 0 is not supported
>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.199320] ath10k_pci
>> 0000:01:00.0: failed to remove peer wep key 0: -122
>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.206409] ath10k_pci
>> 0000:01:00.0: failed to clear all peer wep keys for vdev 0: -122
>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.214621] ath10k_pci
>> 0000:01:00.0: failed to disassociate station: a0:12:34:56:78:9a vdev 0: -122
>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.223892] ------------[ cut
>> here ]------------
>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.228706] WARNING: CPU: 0 PID:
>> 1885 at compat-wireless-2016-10-08/net/mac80211/sta_info.c:956 0x87587050
>> [mac80211@87580000+0x5f500]()
>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.241226] Modules linked in:
>> pppoe ppp_async iptable_nat ath9k pppox ppp_generic nf_nat_ipv4
>> nf_conntrack_ipv6 nf_conntrack_ipv4 ipt_REJECT ipt_MASQUERADE ax88179_178a
>> ath9k_common xt_time xt_tcpudp xt_tcpmss xt_statistic xt_state xt_recent xt_nat
>> xt_multiport xt_mark xt_mac xt_limit xt_length xt_id xt_hl xt_helper xt_ecn
>> xt_dscp xt_conntrack xt_connmark xt_connlimit xt_connbytes xt_comment xt_TCPMSS
>> xt_REDIRECT xt_LOG xt_HL xt_DSCP xt_CT xt_CLASSIFY usbnet Sat Oct 29 10:48:09
>> 2016 kern.warn kernel: [117938.348645] CPU: 0 PID: 1885 Comm: hostapd Tainted:
>> G        W       4.4.26 #0
>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.356067] Stack : 8036cff4
>> 00000000 00000001 803c0000 00000000 00000000 00000000 00000000
>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.356067]      00000000 00000000
>> 00000000 00000000 00000000 00000000 00000000 00000000
>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.356067]      00000000 00000000
>> 00000000 00000000 00000000 00000000 00000000 00000000
>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.356067]      00000000 00000000
>> 00000000 00000000 00000000 00000000 00000000 00000000
>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.356067]      00000000 00000000
>> 00000000 00000000 00000000 00000000 00000000 00000000
>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.356067]      ...
>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.392511] Call
>> Trace:[<800716f0>] 0x800716f0
>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.397147] [<800716f0>]
>> 0x800716f0
>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.400770] [<8008144c>]
>> 0x8008144c
>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.404414] [<87587050>]
>> 0x87587050 [mac80211@87580000+0x5f500]
>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.410531] [<80081504>]
>> 0x80081504
>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.414184] [<87587050>]
>> 0x87587050 [mac80211@87580000+0x5f500]
>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.420297] [<8759cb40>]
>> 0x8759cb40 [mac80211@87580000+0x5f500]
>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.426431] [<87587188>]
>> 0x87587188 [mac80211@87580000+0x5f500]
>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.432531] [<875849b4>]
>> 0x875849b4 [mac80211@87580000+0x5f500]
>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.438629] [<801018e4>]
>> 0x801018e4
>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.442276] [<87587238>]
>> 0x87587238 [mac80211@87580000+0x5f500]
>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.448406] [<874cc114>]
>> 0x874cc114 [cfg80211@874c0000+0x35b60]
>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.454516] [<80293074>]
>> 0x80293074
>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.458147] [<80291900>]
>> 0x80291900
>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.461822] [<80292df8>]
>> 0x80292df8
>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.465461] [<80292238>]
>> 0x80292238
>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.469092] [<800a15d0>]
>> 0x800a15d0
>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.472726] [<80292de0>]
>> 0x80292de0
>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.476371] [<80257794>]
>> 0x80257794
>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.480002] [<80291aa0>]
>> 0x80291aa0
>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.483630] [<80256c90>]
>> 0x80256c90
>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.487280] [<80292004>]
>> 0x80292004
>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.490908] [<801b5304>]
>> 0x801b5304
>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.494541] [<8025b478>]
>> 0x8025b478
>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.498198] [<8024d0e4>]
>> 0x8024d0e4
>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.501840] [<8024e4f8>]
>> 0x8024e4f8
>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.505492] [<8027e338>]
>> 0x8027e338
>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.509121] [<802e8244>]
>> 0x802e8244
>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.512780] [<8011aa58>]
>> 0x8011aa58
>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.516413] [<8011ae3c>]
>> 0x8011ae3c
>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.520043] [<8011acd4>]
>> 0x8011acd4
>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.523697] [<80117a10>]
>> 0x80117a10
>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.527352] [<8024f424>]
>> 0x8024f424
>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.530981] [<801059e8>]
>> 0x801059e8
>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.534625] [<8006295c>]
>> 0x8006295c
>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.538265]
>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.539870] ---[ end trace
>> 2c07f06df2595aa6 ]---
>> Sat Oct 29 10:48:12 2016 kern.warn kernel: [117941.534956] ath10k_pci
>> 0000:01:00.0: failed to delete peer a0:12:34:56:78:9a for vdev 0: -11
>> Sat Oct 29 10:48:12 2016 kern.warn kernel: [117941.543716] ath10k_pci
>> 0000:01:00.0: found sta peer a0:12:34:56:78:9a (ptr 86ebf400 id 196) entry on
>> vdev 0 after it was supposedly removed
>> Sat Oct 29 10:48:12 2016 daemon.info hostapd: wlan0: STA 70:12:34:56:78:9a IEEE
>> 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
>> Sat Oct 29 10:48:12 2016 kern.warn kernel: [117941.558962] ath10k_pci
>> 0000:01:00.0: cipher 0 is not supported
>> Sat Oct 29 10:48:12 2016 kern.warn kernel: [117941.565049] ath10k_pci
>> 0000:01:00.0: failed to remove peer wep key 0: -122
>> Sat Oct 29 10:48:15 2016 kern.warn kernel: [117944.564917] ath10k_warn: 2
>> callbacks suppressed
>> Sat Oct 29 10:48:15 2016 kern.warn kernel: [117944.569617] ath10k_pci
>> 0000:01:00.0: failed to delete peer 70:12:34:56:78:9a for vdev 0: -11
>> Sat Oct 29 10:48:15 2016 kern.warn kernel: [117944.578309] ath10k_pci
>> 0000:01:00.0: found sta peer 70:12:34:56:78:9a (ptr 86320c00 id 251) entry on
>> vdev 0 after it was supposedly removed
>> Sat Oct 29 10:48:18 2016 kern.warn kernel: [117947.584908] ath10k_pci
>> 0000:01:00.0: failed to set beacon mode for vdev 0: -11
>> Sat Oct 29 10:48:21 2016 kern.warn kernel: [117950.584876] ath10k_pci
>> 0000:01:00.0: failed to set dtim period for vdev 0: -11
>> Sat Oct 29 10:48:24 2016 kern.warn kernel: [117953.594843] ath10k_pci
>> 0000:01:00.0: failed to recalculate rts/cts prot for vdev 0: -11
>> Sat Oct 29 10:48:27 2016 kern.warn kernel: [117956.594833] ath10k_pci
>> 0000:01:00.0: failed to set protection mode 0 on vdev 0: -11
>> Sat Oct 29 10:48:30 2016 kern.warn kernel: [117959.594805] ath10k_pci
>> 0000:01:00.0: failed to set preamble for vdev 0: -11
>> Sat Oct 29 10:52:57 2016 daemon.info hostapd: wlan1: STA 00:12:34:56:78:9a WPA:
>> group key handshake completed (RSN)
>> Sat Oct 29 10:52:57 2016 daemon.info hostapd: wlan1: STA a0:12:34:56:78:9a WPA:
>> group key handshake completed (RSN)
>> Sat Oct 29 10:53:00 2016 kern.warn kernel: [118229.632250] ath10k_pci
>> 0000:01:00.0: failed to install key for vdev 0 peer 30:12:34:56:78:9a: -11
>> Sat Oct 29 10:53:00 2016 kern.err kernel: [118229.641421] wlan0: failed to
>> remove key (2, ff:ff:ff:ff:ff:ff) from hardware (-11)
>> Sat Oct 29 10:53:03 2016 kern.warn kernel: [118232.642204] ath10k_pci
>> 0000:01:00.0: failed to install key for vdev 0 peer 30:12:34:56:78:9a: -11
>> Sat Oct 29 10:53:03 2016 kern.err kernel: [118232.651309] wlan0: failed to set
>> key (2, ff:ff:ff:ff:ff:ff) to hardware (-11)
>> Sat Oct 29 10:53:08 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a IEEE
>> 802.11: deauthenticated due to local deauth request
>> Sat Oct 29 10:53:11 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a IEEE
>> 802.11: authenticated
>> Sat Oct 29 10:53:11 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a IEEE
>> 802.11: associated (aid 2)
>> Sat Oct 29 10:53:11 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a
>> RADIUS: starting accounting session 56977F3FD253EA9C
>> Sat Oct 29 10:53:11 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a WPA:
>> pairwise key handshake completed (RSN)
>>
>
>
> _______________________________________________
> ath10k mailing list
> ath10k@lists.infradead.org
> http://lists.infradead.org/mailman/listinfo/ath10k

_______________________________________________
ath10k mailing list
ath10k@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/ath10k

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [BUG] Kernel crashes with ath10k radio and Nexus 5X clients
  2016-11-18 21:22 ` Adrian Chadd
@ 2016-11-20  1:35   ` Timo Sigurdsson
  2016-11-21 12:47     ` Mohammed Shafi Shajakhan
  0 siblings, 1 reply; 7+ messages in thread
From: Timo Sigurdsson @ 2016-11-20  1:35 UTC (permalink / raw)
  To: adrian; +Cc: lede-dev, ath10k

Hi Adrian,

sure - here's the bug report on kernel.org:
https://bugzilla.kernel.org/show_bug.cgi?id=188201

Regards,

Timo


Adrian Chadd schrieb am 18.11.2016 22:22:

> hiya!
> 
> Can you file a kernel.org bug mentioning this?
> 
> thanks!
> 
> 
> -a
> 
> 
> On 18 November 2016 at 01:30, Timo Sigurdsson
> <public_timo.s@silentcreek.de> wrote:
>> Hi again,
>>
>> in the meantime, I have some more information to add to the issue mentioned in
>> my email quoted further down below.
>>
>> Ben Greear approached me off-list and suggested to try the Candela Tech ath10k
>> driver and firmware and see if the issue occurs with that as well. So, for the
>> last 3 weeks I've been testing the CT driver and firmware and I can happily
>> report that the issue with the driver crashing after a while when a Nexus 5X
>> device is connected is not occuring with the current BETA 18
>> firmware-2-ct-full-community.bin. So, this really seems like a regression in
>> the official API level 5 ath10k firmware blobs.
>>
>> The CT firmware is not perfect either, since it seems to suffer from a
>> different
>> bug that has been resolved in the official firmwares, and that is that after a
>> reboot of my TP-Link Archer C7 v2, the ath10k driver won't load. Only after a
>> hard reset or "cold boot" it will come up. That's an issue I had with older
>> official firmwares as well, but it has been resolved with the recent API level
>> 5 firmwares.
>>
>> Nevertheless, for the time being, I will stick to the CT firmware because I
>> can
>> work around the reboot issue and having the 5GHz wifi working for my Nexus 5X
>> clients is more important.
>>
>> Over the next weeks, I will test different combinations of ath10k(-ct) driver
>> and firmware to see if there's a combination that resolves all issues. This
>> morning I flashed a LEDE build with the official ath10k driver and the CT
>> firmware binary.
>>
>> But of course, if someone has more suggestions on what I could try or what
>> information I could collect to help resolve the issue related to the Nexus 5X
>> clients in the official firmware binaries, I think that would be beneficial
>> for a larger audience.
>>
>> Regards,
>>
>> Timo
>>
>> P.S.: Please include my email address in any reply, since I'm not subscribed
>> to the mailing list. Thank you.
>>
>>
>> Timo Sigurdsson schrieb am 29.10.2016 22:19:
>>
>>> Hi everybody,
>>>
>>> I have a TP-Link Archer C7 v2 running a fairly recent build of LEDE (r1952,
>>> Linux 4.4.26, compat-wireless-2016-10-08). It all works well except for the
>>> fact that when I connect a Nexus 5X device to the 5GHz radio, the kernel or
>>> ath10k driver will crash after a while. 5Ghz wifi will be dead after that
>>> until I reboot the system.
>>>
>>> This issue has been reported before [1] and it also has been declared as
>>> solved with newer firmwares [2] (but reopened by other users). However, even
>>> with the latest firmware 10.2.4.70.58 from Kalle Valo's Github repository the
>>> issue is far from resolved. I have tried many different firmware revisions
>>> over the time (more recently 10.2.4.70.56 and 10.2.4.70.54), and I can could
>>> only find that the issue sometimes takes longer to trigger with some
>>> firmwares
>>> (which might just be random), but it would always occur at some point with
>>> API
>>> level 5 firmwares. With API level 2 firmwares (which I testesd when I was
>>> still using OpenWrt 15.05) I never saw these crashes, but the Nexus 5X had
>>> other connectivity issues with these older firmwares that made this
>>> combination no fun to use either. But this shows that the firmware itself
>>> makes the difference here.
>>>
>>> I actually have two Nexus 5X on my network (my wife's and my own). I can
>>> trigger the crash with either one of them. And if both Nexus 5X are connected
>>> to the 5Ghz radio, then the issue triggers much faster (can be as low as 15
>>> minutes). My workaround is to let the Nexus 5X devices only connect to the
>>> 2.4GHz radio. This way, the device can runs for weeks without any issue or
>>> crash, but of course I would prefer the actual bug being fixed rather than to
>>> circumvent it.
>>>
>>> I'm appending a syslog from my access point with a crash happening while one
>>> Nexus 5X was connected to the 5GHz radio starting from the time the system
>>> booted. I randomized the MAC addresses. but left the first two characters
>>> unique so different clients can be distinguished.
>>>
>>> If there is more info I could collect to help identify the cause of this
>>> issue, please let me know (and possibly how to do that as well).
>>>
>>> Thank you and regards,
>>>
>>> Timo
>>>
>>> [1] http://lists.infradead.org/pipermail/ath10k/2015-November/006413.html
>>> [2] https://dev.openwrt.org/ticket/20854
>>>
>>> And here's the log:
>>> Fri Oct 28 02:01:35 2016 kern.notice kernel: [    0.000000] Linux version
>>> 4.4.26 (user@buildsystem) (gcc version 5.4.0 (LEDE GCC 5.4.0 r1952) ) #0 Fri
>>> Oct 21 15:52:28 2016
>>> [...]
>>> Fri Oct 28 02:01:35 2016 kern.info kernel: [    9.468751] Loading modules
>>> backported from Linux version wt-2016-10-03-1-g6fcb1a6
>>> Fri Oct 28 02:01:35 2016 kern.info kernel: [    9.476481] Backport generated
>>> by
>>> backports.git backports-20160324-9-g0e38f5c
>>> Fri Oct 28 02:01:35 2016 kern.warn kernel: [    9.576570] PCI: Enabling
>>> device
>>> 0000:01:00.0 (0000 -> 0002)
>>> Fri Oct 28 02:01:35 2016 kern.info kernel: [    9.582475] ath10k_pci
>>> 0000:01:00.0: pci irq legacy oper_irq_mode 1 irq_mode 0 reset_mode 0
>>> Fri Oct 28 02:01:35 2016 kern.warn kernel: [   10.087609] ath10k_pci
>>> 0000:01:00.0: Direct firmware load for ath10k/pre-cal-pci-0000:01:00.0.bin
>>> failed with error -2
>>> Fri Oct 28 02:01:35 2016 kern.warn kernel: [   10.098492] ath10k_pci
>>> 0000:01:00.0: Falling back to user helper
>>> Fri Oct 28 02:01:35 2016 kern.err kernel: [   10.176500] firmware
>>> ath10k!pre-cal-pci-0000:01:00.0.bin: firmware_loading_store: map pages failed
>>> Fri Oct 28 02:01:35 2016 kern.info kernel: [   10.677026] ath10k_pci
>>> 0000:01:00.0: qca988x hw2.0 target 0x4100016c chip_id 0x043202ff sub
>>> 0000:0000
>>> Fri Oct 28 02:01:35 2016 kern.info kernel: [   10.686424] ath10k_pci
>>> 0000:01:00.0: kconfig debug 0 debugfs 1 tracing 0 dfs 1 testmode 1
>>> Fri Oct 28 02:01:35 2016 kern.info kernel: [   10.699498] ath10k_pci
>>> 0000:01:00.0: firmware ver 10.2.4.70.58 api 5 features no-p2p,raw-mode,mfp
>>> crc32 e1af076f
>>> Fri Oct 28 02:01:35 2016 kern.warn kernel: [   10.709932] ath10k_pci
>>> 0000:01:00.0: Direct firmware load for ath10k/QCA988X/hw2.0/board-2.bin
>>> failed
>>> with error -2
>>> Fri Oct 28 02:01:35 2016 kern.warn kernel: [   10.720531] ath10k_pci
>>> 0000:01:00.0: Falling back to user helper
>>> Fri Oct 28 02:01:35 2016 kern.err kernel: [   10.798719] firmware
>>> ath10k!QCA988X!hw2.0!board-2.bin: firmware_loading_store: map pages failed
>>> Fri Oct 28 02:01:35 2016 kern.info kernel: [   10.823845] ath10k_pci
>>> 0000:01:00.0: board_file api 1 bmi_id N/A crc32 bebc7c08
>>> Fri Oct 28 02:01:35 2016 kern.info kernel: [   11.954723] ath10k_pci
>>> 0000:01:00.0: htt-ver 2.1 wmi-op 5 htt-op 2 cal file max-sta 128 raw 0
>>> hwcrypto
>>> 1
>>> [...]
>>> // Evertyhing runs fine for a bit more than a day, but then this happens ...
>>> //
>>> // Note: The ath10k radio in question is wlan0 //
>>> Sat Oct 29 10:38:21 2016 daemon.info hostapd: wlan1: STA 9c:12:34:56:78:9a
>>> IEEE
>>> 802.11: disassociated
>>> Sat Oct 29 10:38:22 2016 daemon.info hostapd: wlan1: STA 9c:12:34:56:78:9a
>>> IEEE
>>> 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
>>> Sat Oct 29 10:42:57 2016 daemon.info hostapd: wlan1: STA 00:12:34:56:78:9a
>>> WPA:
>>> group key handshake completed (RSN)
>>> Sat Oct 29 10:42:57 2016 daemon.info hostapd: wlan0: STA a0:12:34:56:78:9a
>>> WPA:
>>> group key handshake completed (RSN)
>>> Sat Oct 29 10:42:57 2016 daemon.info hostapd: wlan0: STA 70:12:34:56:78:9a
>>> WPA:
>>> group key handshake completed (RSN)
>>> Sat Oct 29 10:43:05 2016 kern.warn kernel: [117635.147861] ath10k_pci
>>> 0000:01:00.0: failed to delete peer 7f:12:34:56:78:9a for vdev 0: -145
>>> Sat Oct 29 10:43:05 2016 kern.warn kernel: [117635.156679] ath10k_pci
>>> 0000:01:00.0: found sta peer 7f:12:34:56:78:9a (ptr 86ebf200 id 62) entry on
>>> vdev 0 after it was supposedly removed
>>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.169489] ------------[ cut
>>> here ]------------
>>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.174314] WARNING: CPU: 0
>>> PID:
>>> 1885 at compat-wireless-2016-10-08/net/mac80211/sta_info.c:964 0x875870a4
>>> [mac80211@87580000+0x5f500]()
>>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.186854] Modules linked in:
>>> pppoe ppp_async iptable_nat ath9k pppox ppp_generic nf_nat_ipv4
>>> nf_conntrack_ipv6 nf_conntrack_ipv4 ipt_REJECT ipt_MASQUERADE ax88179_178a
>>> ath9k_common xt_time xt_tcpudp xt_tcpmss xt_statistic xt_state xt_recent
>>> xt_nat
>>> xt_multiport xt_mark xt_mac xt_limit xt_length xt_id xt_hl xt_helper xt_ecn
>>> xt_dscp xt_conntrack xt_connmark xt_connlimit xt_connbytes xt_comment
>>> xt_TCPMSS
>>> xt_REDIRECT xt_LOG xt_HL xt_DSCP xt_CT xt_CLASSIFY usbnet Sat Oct 29 10:43:06
>>> 2016 kern.warn kernel: [117635.294282] CPU: 0 PID: 1885 Comm: hostapd Not
>>> tainted 4.4.26 #0
>>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.300471] Stack : 8036cff4
>>> 00000000 00000001 803c0000 00000000 00000000 00000000 00000000
>>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.300471]      00000000
>>> 00000000
>>> 00000000 00000000 00000000 00000000 00000000 00000000
>>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.300471]      00000000
>>> 00000000
>>> 00000000 00000000 00000000 00000000 00000000 00000000
>>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.300471]      00000000
>>> 00000000
>>> 00000000 00000000 00000000 00000000 00000000 00000000
>>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.300471]      00000000
>>> 00000000
>>> 00000000 00000000 00000000 00000000 00000000 00000000
>>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.300471]      ...
>>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.336918] Call
>>> Trace:[<800716f0>] 0x800716f0
>>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.341551] [<800716f0>]
>>> 0x800716f0
>>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.345176] [<8008144c>]
>>> 0x8008144c
>>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.348832] [<875870a4>]
>>> 0x875870a4 [mac80211@87580000+0x5f500]
>>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.354943] [<80081504>]
>>> 0x80081504
>>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.358611] [<875870a4>]
>>> 0x875870a4 [mac80211@87580000+0x5f500]
>>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.364742] [<87587188>]
>>> 0x87587188 [mac80211@87580000+0x5f500]
>>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.370861] [<875849b4>]
>>> 0x875849b4 [mac80211@87580000+0x5f500]
>>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.376951] [<80115770>]
>>> 0x80115770
>>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.380613] [<87587238>]
>>> 0x87587238 [mac80211@87580000+0x5f500]
>>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.386727] [<874cc114>]
>>> 0x874cc114 [cfg80211@874c0000+0x35b60]
>>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.392854] [<80293074>]
>>> 0x80293074
>>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.396485] [<80291900>]
>>> 0x80291900
>>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.400176] [<80292df8>]
>>> 0x80292df8
>>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.403801] [<80292238>]
>>> 0x80292238
>>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.407439] [<80292de0>]
>>> 0x80292de0
>>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.411079] [<80257794>]
>>> 0x80257794
>>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.414711] [<80291aa0>]
>>> 0x80291aa0
>>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.418345] [<80256c90>]
>>> 0x80256c90
>>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.421991] [<80292004>]
>>> 0x80292004
>>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.425616] [<801b5304>]
>>> 0x801b5304
>>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.429260] [<8025b478>]
>>> 0x8025b478
>>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.432902] [<8024d0e4>]
>>> 0x8024d0e4
>>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.436540] [<8024e4f8>]
>>> 0x8024e4f8
>>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.440195] [<801b5304>]
>>> 0x801b5304
>>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.443835] [<8027e338>]
>>> 0x8027e338
>>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.447464] [<802e8244>]
>>> 0x802e8244
>>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.451136] [<8011aa58>]
>>> 0x8011aa58
>>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.454762] [<8011ae3c>]
>>> 0x8011ae3c
>>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.458402] [<8011acd4>]
>>> 0x8011acd4
>>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.462057] [<80117a10>]
>>> 0x80117a10
>>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.465700] [<8024f424>]
>>> 0x8024f424
>>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.469344] [<800b1dd0>]
>>> 0x800b1dd0
>>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.472986] [<8006295c>]
>>> 0x8006295c
>>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.476615]
>>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.478223] ---[ end trace
>>> 2c07f06df2595aa5 ]---
>>> Sat Oct 29 10:43:06 2016 daemon.info hostapd: wlan0: STA 7f:12:34:56:78:9a
>>> IEEE
>>> 802.11: deauthenticated due to local deauth request
>>> Sat Oct 29 10:43:15 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a
>>> IEEE
>>> 802.11: authenticated
>>> Sat Oct 29 10:43:15 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a
>>> IEEE
>>> 802.11: associated (aid 2)
>>> Sat Oct 29 10:43:15 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a
>>> RADIUS: starting accounting session D1227001A194DA09
>>> Sat Oct 29 10:43:15 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a
>>> WPA:
>>> pairwise key handshake completed (RSN)
>>> Sat Oct 29 10:43:31 2016 daemon.info hostapd: wlan1: STA a0:12:34:56:78:9a
>>> IEEE
>>> 802.11: authenticated
>>> Sat Oct 29 10:43:31 2016 daemon.info hostapd: wlan1: STA a0:12:34:56:78:9a
>>> IEEE
>>> 802.11: associated (aid 3)
>>> Sat Oct 29 10:43:31 2016 daemon.info hostapd: wlan1: STA a0:12:34:56:78:9a
>>> RADIUS: starting accounting session 92084E55AFE512B3
>>> Sat Oct 29 10:43:31 2016 daemon.info hostapd: wlan1: STA a0:12:34:56:78:9a
>>> WPA:
>>> pairwise key handshake completed (RSN)
>>> Sat Oct 29 10:48:02 2016 daemon.info hostapd: wlan0: STA a0:12:34:56:78:9a
>>> IEEE
>>> 802.11: disassociated due to inactivity
>>> Sat Oct 29 10:48:05 2016 kern.warn kernel: [117935.165013] ath10k_pci
>>> 0000:01:00.0: failed to install key for vdev 0 peer a0:12:34:56:78:9a: -145
>>> Sat Oct 29 10:48:05 2016 kern.err kernel: [117935.174193] wlan0: failed to
>>> remove key (0, a0:12:34:56:78:9a) from hardware (-145)
>>> Sat Oct 29 10:48:05 2016 daemon.info hostapd: wlan0: STA 70:12:34:56:78:9a
>>> IEEE
>>> 802.11: disassociated due to inactivity
>>> Sat Oct 29 10:48:08 2016 kern.warn kernel: [117938.174996] ath10k_pci
>>> 0000:01:00.0: failed to install key for vdev 0 peer 70:12:34:56:78:9a: -11
>>> Sat Oct 29 10:48:08 2016 kern.err kernel: [117938.184092] wlan0: failed to
>>> remove key (0, 70:12:34:56:78:9a) from hardware (-11)
>>> Sat Oct 29 10:48:08 2016 daemon.info hostapd: wlan0: STA a0:12:34:56:78:9a
>>> IEEE
>>> 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
>>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.193251] ath10k_pci
>>> 0000:01:00.0: cipher 0 is not supported
>>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.199320] ath10k_pci
>>> 0000:01:00.0: failed to remove peer wep key 0: -122
>>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.206409] ath10k_pci
>>> 0000:01:00.0: failed to clear all peer wep keys for vdev 0: -122
>>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.214621] ath10k_pci
>>> 0000:01:00.0: failed to disassociate station: a0:12:34:56:78:9a vdev 0: -122
>>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.223892] ------------[ cut
>>> here ]------------
>>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.228706] WARNING: CPU: 0
>>> PID:
>>> 1885 at compat-wireless-2016-10-08/net/mac80211/sta_info.c:956 0x87587050
>>> [mac80211@87580000+0x5f500]()
>>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.241226] Modules linked in:
>>> pppoe ppp_async iptable_nat ath9k pppox ppp_generic nf_nat_ipv4
>>> nf_conntrack_ipv6 nf_conntrack_ipv4 ipt_REJECT ipt_MASQUERADE ax88179_178a
>>> ath9k_common xt_time xt_tcpudp xt_tcpmss xt_statistic xt_state xt_recent
>>> xt_nat
>>> xt_multiport xt_mark xt_mac xt_limit xt_length xt_id xt_hl xt_helper xt_ecn
>>> xt_dscp xt_conntrack xt_connmark xt_connlimit xt_connbytes xt_comment
>>> xt_TCPMSS
>>> xt_REDIRECT xt_LOG xt_HL xt_DSCP xt_CT xt_CLASSIFY usbnet Sat Oct 29 10:48:09
>>> 2016 kern.warn kernel: [117938.348645] CPU: 0 PID: 1885 Comm: hostapd
>>> Tainted:
>>> G        W       4.4.26 #0
>>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.356067] Stack : 8036cff4
>>> 00000000 00000001 803c0000 00000000 00000000 00000000 00000000
>>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.356067]      00000000
>>> 00000000
>>> 00000000 00000000 00000000 00000000 00000000 00000000
>>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.356067]      00000000
>>> 00000000
>>> 00000000 00000000 00000000 00000000 00000000 00000000
>>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.356067]      00000000
>>> 00000000
>>> 00000000 00000000 00000000 00000000 00000000 00000000
>>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.356067]      00000000
>>> 00000000
>>> 00000000 00000000 00000000 00000000 00000000 00000000
>>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.356067]      ...
>>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.392511] Call
>>> Trace:[<800716f0>] 0x800716f0
>>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.397147] [<800716f0>]
>>> 0x800716f0
>>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.400770] [<8008144c>]
>>> 0x8008144c
>>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.404414] [<87587050>]
>>> 0x87587050 [mac80211@87580000+0x5f500]
>>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.410531] [<80081504>]
>>> 0x80081504
>>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.414184] [<87587050>]
>>> 0x87587050 [mac80211@87580000+0x5f500]
>>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.420297] [<8759cb40>]
>>> 0x8759cb40 [mac80211@87580000+0x5f500]
>>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.426431] [<87587188>]
>>> 0x87587188 [mac80211@87580000+0x5f500]
>>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.432531] [<875849b4>]
>>> 0x875849b4 [mac80211@87580000+0x5f500]
>>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.438629] [<801018e4>]
>>> 0x801018e4
>>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.442276] [<87587238>]
>>> 0x87587238 [mac80211@87580000+0x5f500]
>>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.448406] [<874cc114>]
>>> 0x874cc114 [cfg80211@874c0000+0x35b60]
>>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.454516] [<80293074>]
>>> 0x80293074
>>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.458147] [<80291900>]
>>> 0x80291900
>>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.461822] [<80292df8>]
>>> 0x80292df8
>>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.465461] [<80292238>]
>>> 0x80292238
>>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.469092] [<800a15d0>]
>>> 0x800a15d0
>>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.472726] [<80292de0>]
>>> 0x80292de0
>>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.476371] [<80257794>]
>>> 0x80257794
>>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.480002] [<80291aa0>]
>>> 0x80291aa0
>>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.483630] [<80256c90>]
>>> 0x80256c90
>>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.487280] [<80292004>]
>>> 0x80292004
>>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.490908] [<801b5304>]
>>> 0x801b5304
>>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.494541] [<8025b478>]
>>> 0x8025b478
>>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.498198] [<8024d0e4>]
>>> 0x8024d0e4
>>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.501840] [<8024e4f8>]
>>> 0x8024e4f8
>>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.505492] [<8027e338>]
>>> 0x8027e338
>>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.509121] [<802e8244>]
>>> 0x802e8244
>>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.512780] [<8011aa58>]
>>> 0x8011aa58
>>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.516413] [<8011ae3c>]
>>> 0x8011ae3c
>>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.520043] [<8011acd4>]
>>> 0x8011acd4
>>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.523697] [<80117a10>]
>>> 0x80117a10
>>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.527352] [<8024f424>]
>>> 0x8024f424
>>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.530981] [<801059e8>]
>>> 0x801059e8
>>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.534625] [<8006295c>]
>>> 0x8006295c
>>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.538265]
>>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.539870] ---[ end trace
>>> 2c07f06df2595aa6 ]---
>>> Sat Oct 29 10:48:12 2016 kern.warn kernel: [117941.534956] ath10k_pci
>>> 0000:01:00.0: failed to delete peer a0:12:34:56:78:9a for vdev 0: -11
>>> Sat Oct 29 10:48:12 2016 kern.warn kernel: [117941.543716] ath10k_pci
>>> 0000:01:00.0: found sta peer a0:12:34:56:78:9a (ptr 86ebf400 id 196) entry on
>>> vdev 0 after it was supposedly removed
>>> Sat Oct 29 10:48:12 2016 daemon.info hostapd: wlan0: STA 70:12:34:56:78:9a
>>> IEEE
>>> 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
>>> Sat Oct 29 10:48:12 2016 kern.warn kernel: [117941.558962] ath10k_pci
>>> 0000:01:00.0: cipher 0 is not supported
>>> Sat Oct 29 10:48:12 2016 kern.warn kernel: [117941.565049] ath10k_pci
>>> 0000:01:00.0: failed to remove peer wep key 0: -122
>>> Sat Oct 29 10:48:15 2016 kern.warn kernel: [117944.564917] ath10k_warn: 2
>>> callbacks suppressed
>>> Sat Oct 29 10:48:15 2016 kern.warn kernel: [117944.569617] ath10k_pci
>>> 0000:01:00.0: failed to delete peer 70:12:34:56:78:9a for vdev 0: -11
>>> Sat Oct 29 10:48:15 2016 kern.warn kernel: [117944.578309] ath10k_pci
>>> 0000:01:00.0: found sta peer 70:12:34:56:78:9a (ptr 86320c00 id 251) entry on
>>> vdev 0 after it was supposedly removed
>>> Sat Oct 29 10:48:18 2016 kern.warn kernel: [117947.584908] ath10k_pci
>>> 0000:01:00.0: failed to set beacon mode for vdev 0: -11
>>> Sat Oct 29 10:48:21 2016 kern.warn kernel: [117950.584876] ath10k_pci
>>> 0000:01:00.0: failed to set dtim period for vdev 0: -11
>>> Sat Oct 29 10:48:24 2016 kern.warn kernel: [117953.594843] ath10k_pci
>>> 0000:01:00.0: failed to recalculate rts/cts prot for vdev 0: -11
>>> Sat Oct 29 10:48:27 2016 kern.warn kernel: [117956.594833] ath10k_pci
>>> 0000:01:00.0: failed to set protection mode 0 on vdev 0: -11
>>> Sat Oct 29 10:48:30 2016 kern.warn kernel: [117959.594805] ath10k_pci
>>> 0000:01:00.0: failed to set preamble for vdev 0: -11
>>> Sat Oct 29 10:52:57 2016 daemon.info hostapd: wlan1: STA 00:12:34:56:78:9a
>>> WPA:
>>> group key handshake completed (RSN)
>>> Sat Oct 29 10:52:57 2016 daemon.info hostapd: wlan1: STA a0:12:34:56:78:9a
>>> WPA:
>>> group key handshake completed (RSN)
>>> Sat Oct 29 10:53:00 2016 kern.warn kernel: [118229.632250] ath10k_pci
>>> 0000:01:00.0: failed to install key for vdev 0 peer 30:12:34:56:78:9a: -11
>>> Sat Oct 29 10:53:00 2016 kern.err kernel: [118229.641421] wlan0: failed to
>>> remove key (2, ff:ff:ff:ff:ff:ff) from hardware (-11)
>>> Sat Oct 29 10:53:03 2016 kern.warn kernel: [118232.642204] ath10k_pci
>>> 0000:01:00.0: failed to install key for vdev 0 peer 30:12:34:56:78:9a: -11
>>> Sat Oct 29 10:53:03 2016 kern.err kernel: [118232.651309] wlan0: failed to
>>> set
>>> key (2, ff:ff:ff:ff:ff:ff) to hardware (-11)
>>> Sat Oct 29 10:53:08 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a
>>> IEEE
>>> 802.11: deauthenticated due to local deauth request
>>> Sat Oct 29 10:53:11 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a
>>> IEEE
>>> 802.11: authenticated
>>> Sat Oct 29 10:53:11 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a
>>> IEEE
>>> 802.11: associated (aid 2)
>>> Sat Oct 29 10:53:11 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a
>>> RADIUS: starting accounting session 56977F3FD253EA9C
>>> Sat Oct 29 10:53:11 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a
>>> WPA:
>>> pairwise key handshake completed (RSN)
>>>
>>
>>
>> _______________________________________________
>> ath10k mailing list
>> ath10k@lists.infradead.org
>> http://lists.infradead.org/mailman/listinfo/ath10k
> 


_______________________________________________
ath10k mailing list
ath10k@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/ath10k

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [BUG] Kernel crashes with ath10k radio and Nexus 5X clients
  2016-11-20  1:35   ` Timo Sigurdsson
@ 2016-11-21 12:47     ` Mohammed Shafi Shajakhan
  2016-11-28  0:24       ` Timo Sigurdsson
  2016-12-03 11:33       ` Timo Sigurdsson
  0 siblings, 2 replies; 7+ messages in thread
From: Mohammed Shafi Shajakhan @ 2016-11-21 12:47 UTC (permalink / raw)
  To: Timo Sigurdsson; +Cc: adrian, lede-dev, ath10k

Hi Timo,

sorry had I missed the exact kernel crash call trace ?
I could see only the warnings, can you please post the call
trace of the kernel crash please ?

regards,
shafi

On Sun, Nov 20, 2016 at 02:35:27AM +0100, Timo Sigurdsson wrote:
> Hi Adrian,
> 
> sure - here's the bug report on kernel.org:
> https://bugzilla.kernel.org/show_bug.cgi?id=188201
> 
> Regards,
> 
> Timo
> 
> 
> Adrian Chadd schrieb am 18.11.2016 22:22:
> 
> > hiya!
> > 
> > Can you file a kernel.org bug mentioning this?
> > 
> > thanks!
> > 
> > 
> > -a
> > 
> > 
> > On 18 November 2016 at 01:30, Timo Sigurdsson
> > <public_timo.s@silentcreek.de> wrote:
> >> Hi again,
> >>
> >> in the meantime, I have some more information to add to the issue mentioned in
> >> my email quoted further down below.
> >>
> >> Ben Greear approached me off-list and suggested to try the Candela Tech ath10k
> >> driver and firmware and see if the issue occurs with that as well. So, for the
> >> last 3 weeks I've been testing the CT driver and firmware and I can happily
> >> report that the issue with the driver crashing after a while when a Nexus 5X
> >> device is connected is not occuring with the current BETA 18
> >> firmware-2-ct-full-community.bin. So, this really seems like a regression in
> >> the official API level 5 ath10k firmware blobs.
> >>
> >> The CT firmware is not perfect either, since it seems to suffer from a
> >> different
> >> bug that has been resolved in the official firmwares, and that is that after a
> >> reboot of my TP-Link Archer C7 v2, the ath10k driver won't load. Only after a
> >> hard reset or "cold boot" it will come up. That's an issue I had with older
> >> official firmwares as well, but it has been resolved with the recent API level
> >> 5 firmwares.
> >>
> >> Nevertheless, for the time being, I will stick to the CT firmware because I
> >> can
> >> work around the reboot issue and having the 5GHz wifi working for my Nexus 5X
> >> clients is more important.
> >>
> >> Over the next weeks, I will test different combinations of ath10k(-ct) driver
> >> and firmware to see if there's a combination that resolves all issues. This
> >> morning I flashed a LEDE build with the official ath10k driver and the CT
> >> firmware binary.
> >>
> >> But of course, if someone has more suggestions on what I could try or what
> >> information I could collect to help resolve the issue related to the Nexus 5X
> >> clients in the official firmware binaries, I think that would be beneficial
> >> for a larger audience.
> >>
> >> Regards,
> >>
> >> Timo
> >>
> >> P.S.: Please include my email address in any reply, since I'm not subscribed
> >> to the mailing list. Thank you.
> >>
> >>
> >> Timo Sigurdsson schrieb am 29.10.2016 22:19:
> >>
> >>> Hi everybody,
> >>>
> >>> I have a TP-Link Archer C7 v2 running a fairly recent build of LEDE (r1952,
> >>> Linux 4.4.26, compat-wireless-2016-10-08). It all works well except for the
> >>> fact that when I connect a Nexus 5X device to the 5GHz radio, the kernel or
> >>> ath10k driver will crash after a while. 5Ghz wifi will be dead after that
> >>> until I reboot the system.
> >>>
> >>> This issue has been reported before [1] and it also has been declared as
> >>> solved with newer firmwares [2] (but reopened by other users). However, even
> >>> with the latest firmware 10.2.4.70.58 from Kalle Valo's Github repository the
> >>> issue is far from resolved. I have tried many different firmware revisions
> >>> over the time (more recently 10.2.4.70.56 and 10.2.4.70.54), and I can could
> >>> only find that the issue sometimes takes longer to trigger with some
> >>> firmwares
> >>> (which might just be random), but it would always occur at some point with
> >>> API
> >>> level 5 firmwares. With API level 2 firmwares (which I testesd when I was
> >>> still using OpenWrt 15.05) I never saw these crashes, but the Nexus 5X had
> >>> other connectivity issues with these older firmwares that made this
> >>> combination no fun to use either. But this shows that the firmware itself
> >>> makes the difference here.
> >>>
> >>> I actually have two Nexus 5X on my network (my wife's and my own). I can
> >>> trigger the crash with either one of them. And if both Nexus 5X are connected
> >>> to the 5Ghz radio, then the issue triggers much faster (can be as low as 15
> >>> minutes). My workaround is to let the Nexus 5X devices only connect to the
> >>> 2.4GHz radio. This way, the device can runs for weeks without any issue or
> >>> crash, but of course I would prefer the actual bug being fixed rather than to
> >>> circumvent it.
> >>>
> >>> I'm appending a syslog from my access point with a crash happening while one
> >>> Nexus 5X was connected to the 5GHz radio starting from the time the system
> >>> booted. I randomized the MAC addresses. but left the first two characters
> >>> unique so different clients can be distinguished.
> >>>
> >>> If there is more info I could collect to help identify the cause of this
> >>> issue, please let me know (and possibly how to do that as well).
> >>>
> >>> Thank you and regards,
> >>>
> >>> Timo
> >>>
> >>> [1] http://lists.infradead.org/pipermail/ath10k/2015-November/006413.html
> >>> [2] https://dev.openwrt.org/ticket/20854
> >>>
> >>> And here's the log:
> >>> Fri Oct 28 02:01:35 2016 kern.notice kernel: [    0.000000] Linux version
> >>> 4.4.26 (user@buildsystem) (gcc version 5.4.0 (LEDE GCC 5.4.0 r1952) ) #0 Fri
> >>> Oct 21 15:52:28 2016
> >>> [...]
> >>> Fri Oct 28 02:01:35 2016 kern.info kernel: [    9.468751] Loading modules
> >>> backported from Linux version wt-2016-10-03-1-g6fcb1a6
> >>> Fri Oct 28 02:01:35 2016 kern.info kernel: [    9.476481] Backport generated
> >>> by
> >>> backports.git backports-20160324-9-g0e38f5c
> >>> Fri Oct 28 02:01:35 2016 kern.warn kernel: [    9.576570] PCI: Enabling
> >>> device
> >>> 0000:01:00.0 (0000 -> 0002)
> >>> Fri Oct 28 02:01:35 2016 kern.info kernel: [    9.582475] ath10k_pci
> >>> 0000:01:00.0: pci irq legacy oper_irq_mode 1 irq_mode 0 reset_mode 0
> >>> Fri Oct 28 02:01:35 2016 kern.warn kernel: [   10.087609] ath10k_pci
> >>> 0000:01:00.0: Direct firmware load for ath10k/pre-cal-pci-0000:01:00.0.bin
> >>> failed with error -2
> >>> Fri Oct 28 02:01:35 2016 kern.warn kernel: [   10.098492] ath10k_pci
> >>> 0000:01:00.0: Falling back to user helper
> >>> Fri Oct 28 02:01:35 2016 kern.err kernel: [   10.176500] firmware
> >>> ath10k!pre-cal-pci-0000:01:00.0.bin: firmware_loading_store: map pages failed
> >>> Fri Oct 28 02:01:35 2016 kern.info kernel: [   10.677026] ath10k_pci
> >>> 0000:01:00.0: qca988x hw2.0 target 0x4100016c chip_id 0x043202ff sub
> >>> 0000:0000
> >>> Fri Oct 28 02:01:35 2016 kern.info kernel: [   10.686424] ath10k_pci
> >>> 0000:01:00.0: kconfig debug 0 debugfs 1 tracing 0 dfs 1 testmode 1
> >>> Fri Oct 28 02:01:35 2016 kern.info kernel: [   10.699498] ath10k_pci
> >>> 0000:01:00.0: firmware ver 10.2.4.70.58 api 5 features no-p2p,raw-mode,mfp
> >>> crc32 e1af076f
> >>> Fri Oct 28 02:01:35 2016 kern.warn kernel: [   10.709932] ath10k_pci
> >>> 0000:01:00.0: Direct firmware load for ath10k/QCA988X/hw2.0/board-2.bin
> >>> failed
> >>> with error -2
> >>> Fri Oct 28 02:01:35 2016 kern.warn kernel: [   10.720531] ath10k_pci
> >>> 0000:01:00.0: Falling back to user helper
> >>> Fri Oct 28 02:01:35 2016 kern.err kernel: [   10.798719] firmware
> >>> ath10k!QCA988X!hw2.0!board-2.bin: firmware_loading_store: map pages failed
> >>> Fri Oct 28 02:01:35 2016 kern.info kernel: [   10.823845] ath10k_pci
> >>> 0000:01:00.0: board_file api 1 bmi_id N/A crc32 bebc7c08
> >>> Fri Oct 28 02:01:35 2016 kern.info kernel: [   11.954723] ath10k_pci
> >>> 0000:01:00.0: htt-ver 2.1 wmi-op 5 htt-op 2 cal file max-sta 128 raw 0
> >>> hwcrypto
> >>> 1
> >>> [...]
> >>> // Evertyhing runs fine for a bit more than a day, but then this happens ...
> >>> //
> >>> // Note: The ath10k radio in question is wlan0 //
> >>> Sat Oct 29 10:38:21 2016 daemon.info hostapd: wlan1: STA 9c:12:34:56:78:9a
> >>> IEEE
> >>> 802.11: disassociated
> >>> Sat Oct 29 10:38:22 2016 daemon.info hostapd: wlan1: STA 9c:12:34:56:78:9a
> >>> IEEE
> >>> 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
> >>> Sat Oct 29 10:42:57 2016 daemon.info hostapd: wlan1: STA 00:12:34:56:78:9a
> >>> WPA:
> >>> group key handshake completed (RSN)
> >>> Sat Oct 29 10:42:57 2016 daemon.info hostapd: wlan0: STA a0:12:34:56:78:9a
> >>> WPA:
> >>> group key handshake completed (RSN)
> >>> Sat Oct 29 10:42:57 2016 daemon.info hostapd: wlan0: STA 70:12:34:56:78:9a
> >>> WPA:
> >>> group key handshake completed (RSN)
> >>> Sat Oct 29 10:43:05 2016 kern.warn kernel: [117635.147861] ath10k_pci
> >>> 0000:01:00.0: failed to delete peer 7f:12:34:56:78:9a for vdev 0: -145
> >>> Sat Oct 29 10:43:05 2016 kern.warn kernel: [117635.156679] ath10k_pci
> >>> 0000:01:00.0: found sta peer 7f:12:34:56:78:9a (ptr 86ebf200 id 62) entry on
> >>> vdev 0 after it was supposedly removed
> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.169489] ------------[ cut
> >>> here ]------------
> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.174314] WARNING: CPU: 0
> >>> PID:
> >>> 1885 at compat-wireless-2016-10-08/net/mac80211/sta_info.c:964 0x875870a4
> >>> [mac80211@87580000+0x5f500]()
> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.186854] Modules linked in:
> >>> pppoe ppp_async iptable_nat ath9k pppox ppp_generic nf_nat_ipv4
> >>> nf_conntrack_ipv6 nf_conntrack_ipv4 ipt_REJECT ipt_MASQUERADE ax88179_178a
> >>> ath9k_common xt_time xt_tcpudp xt_tcpmss xt_statistic xt_state xt_recent
> >>> xt_nat
> >>> xt_multiport xt_mark xt_mac xt_limit xt_length xt_id xt_hl xt_helper xt_ecn
> >>> xt_dscp xt_conntrack xt_connmark xt_connlimit xt_connbytes xt_comment
> >>> xt_TCPMSS
> >>> xt_REDIRECT xt_LOG xt_HL xt_DSCP xt_CT xt_CLASSIFY usbnet Sat Oct 29 10:43:06
> >>> 2016 kern.warn kernel: [117635.294282] CPU: 0 PID: 1885 Comm: hostapd Not
> >>> tainted 4.4.26 #0
> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.300471] Stack : 8036cff4
> >>> 00000000 00000001 803c0000 00000000 00000000 00000000 00000000
> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.300471]      00000000
> >>> 00000000
> >>> 00000000 00000000 00000000 00000000 00000000 00000000
> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.300471]      00000000
> >>> 00000000
> >>> 00000000 00000000 00000000 00000000 00000000 00000000
> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.300471]      00000000
> >>> 00000000
> >>> 00000000 00000000 00000000 00000000 00000000 00000000
> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.300471]      00000000
> >>> 00000000
> >>> 00000000 00000000 00000000 00000000 00000000 00000000
> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.300471]      ...
> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.336918] Call
> >>> Trace:[<800716f0>] 0x800716f0
> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.341551] [<800716f0>]
> >>> 0x800716f0
> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.345176] [<8008144c>]
> >>> 0x8008144c
> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.348832] [<875870a4>]
> >>> 0x875870a4 [mac80211@87580000+0x5f500]
> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.354943] [<80081504>]
> >>> 0x80081504
> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.358611] [<875870a4>]
> >>> 0x875870a4 [mac80211@87580000+0x5f500]
> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.364742] [<87587188>]
> >>> 0x87587188 [mac80211@87580000+0x5f500]
> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.370861] [<875849b4>]
> >>> 0x875849b4 [mac80211@87580000+0x5f500]
> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.376951] [<80115770>]
> >>> 0x80115770
> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.380613] [<87587238>]
> >>> 0x87587238 [mac80211@87580000+0x5f500]
> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.386727] [<874cc114>]
> >>> 0x874cc114 [cfg80211@874c0000+0x35b60]
> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.392854] [<80293074>]
> >>> 0x80293074
> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.396485] [<80291900>]
> >>> 0x80291900
> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.400176] [<80292df8>]
> >>> 0x80292df8
> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.403801] [<80292238>]
> >>> 0x80292238
> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.407439] [<80292de0>]
> >>> 0x80292de0
> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.411079] [<80257794>]
> >>> 0x80257794
> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.414711] [<80291aa0>]
> >>> 0x80291aa0
> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.418345] [<80256c90>]
> >>> 0x80256c90
> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.421991] [<80292004>]
> >>> 0x80292004
> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.425616] [<801b5304>]
> >>> 0x801b5304
> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.429260] [<8025b478>]
> >>> 0x8025b478
> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.432902] [<8024d0e4>]
> >>> 0x8024d0e4
> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.436540] [<8024e4f8>]
> >>> 0x8024e4f8
> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.440195] [<801b5304>]
> >>> 0x801b5304
> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.443835] [<8027e338>]
> >>> 0x8027e338
> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.447464] [<802e8244>]
> >>> 0x802e8244
> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.451136] [<8011aa58>]
> >>> 0x8011aa58
> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.454762] [<8011ae3c>]
> >>> 0x8011ae3c
> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.458402] [<8011acd4>]
> >>> 0x8011acd4
> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.462057] [<80117a10>]
> >>> 0x80117a10
> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.465700] [<8024f424>]
> >>> 0x8024f424
> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.469344] [<800b1dd0>]
> >>> 0x800b1dd0
> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.472986] [<8006295c>]
> >>> 0x8006295c
> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.476615]
> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.478223] ---[ end trace
> >>> 2c07f06df2595aa5 ]---
> >>> Sat Oct 29 10:43:06 2016 daemon.info hostapd: wlan0: STA 7f:12:34:56:78:9a
> >>> IEEE
> >>> 802.11: deauthenticated due to local deauth request
> >>> Sat Oct 29 10:43:15 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a
> >>> IEEE
> >>> 802.11: authenticated
> >>> Sat Oct 29 10:43:15 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a
> >>> IEEE
> >>> 802.11: associated (aid 2)
> >>> Sat Oct 29 10:43:15 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a
> >>> RADIUS: starting accounting session D1227001A194DA09
> >>> Sat Oct 29 10:43:15 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a
> >>> WPA:
> >>> pairwise key handshake completed (RSN)
> >>> Sat Oct 29 10:43:31 2016 daemon.info hostapd: wlan1: STA a0:12:34:56:78:9a
> >>> IEEE
> >>> 802.11: authenticated
> >>> Sat Oct 29 10:43:31 2016 daemon.info hostapd: wlan1: STA a0:12:34:56:78:9a
> >>> IEEE
> >>> 802.11: associated (aid 3)
> >>> Sat Oct 29 10:43:31 2016 daemon.info hostapd: wlan1: STA a0:12:34:56:78:9a
> >>> RADIUS: starting accounting session 92084E55AFE512B3
> >>> Sat Oct 29 10:43:31 2016 daemon.info hostapd: wlan1: STA a0:12:34:56:78:9a
> >>> WPA:
> >>> pairwise key handshake completed (RSN)
> >>> Sat Oct 29 10:48:02 2016 daemon.info hostapd: wlan0: STA a0:12:34:56:78:9a
> >>> IEEE
> >>> 802.11: disassociated due to inactivity
> >>> Sat Oct 29 10:48:05 2016 kern.warn kernel: [117935.165013] ath10k_pci
> >>> 0000:01:00.0: failed to install key for vdev 0 peer a0:12:34:56:78:9a: -145
> >>> Sat Oct 29 10:48:05 2016 kern.err kernel: [117935.174193] wlan0: failed to
> >>> remove key (0, a0:12:34:56:78:9a) from hardware (-145)
> >>> Sat Oct 29 10:48:05 2016 daemon.info hostapd: wlan0: STA 70:12:34:56:78:9a
> >>> IEEE
> >>> 802.11: disassociated due to inactivity
> >>> Sat Oct 29 10:48:08 2016 kern.warn kernel: [117938.174996] ath10k_pci
> >>> 0000:01:00.0: failed to install key for vdev 0 peer 70:12:34:56:78:9a: -11
> >>> Sat Oct 29 10:48:08 2016 kern.err kernel: [117938.184092] wlan0: failed to
> >>> remove key (0, 70:12:34:56:78:9a) from hardware (-11)
> >>> Sat Oct 29 10:48:08 2016 daemon.info hostapd: wlan0: STA a0:12:34:56:78:9a
> >>> IEEE
> >>> 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.193251] ath10k_pci
> >>> 0000:01:00.0: cipher 0 is not supported
> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.199320] ath10k_pci
> >>> 0000:01:00.0: failed to remove peer wep key 0: -122
> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.206409] ath10k_pci
> >>> 0000:01:00.0: failed to clear all peer wep keys for vdev 0: -122
> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.214621] ath10k_pci
> >>> 0000:01:00.0: failed to disassociate station: a0:12:34:56:78:9a vdev 0: -122
> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.223892] ------------[ cut
> >>> here ]------------
> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.228706] WARNING: CPU: 0
> >>> PID:
> >>> 1885 at compat-wireless-2016-10-08/net/mac80211/sta_info.c:956 0x87587050
> >>> [mac80211@87580000+0x5f500]()
> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.241226] Modules linked in:
> >>> pppoe ppp_async iptable_nat ath9k pppox ppp_generic nf_nat_ipv4
> >>> nf_conntrack_ipv6 nf_conntrack_ipv4 ipt_REJECT ipt_MASQUERADE ax88179_178a
> >>> ath9k_common xt_time xt_tcpudp xt_tcpmss xt_statistic xt_state xt_recent
> >>> xt_nat
> >>> xt_multiport xt_mark xt_mac xt_limit xt_length xt_id xt_hl xt_helper xt_ecn
> >>> xt_dscp xt_conntrack xt_connmark xt_connlimit xt_connbytes xt_comment
> >>> xt_TCPMSS
> >>> xt_REDIRECT xt_LOG xt_HL xt_DSCP xt_CT xt_CLASSIFY usbnet Sat Oct 29 10:48:09
> >>> 2016 kern.warn kernel: [117938.348645] CPU: 0 PID: 1885 Comm: hostapd
> >>> Tainted:
> >>> G        W       4.4.26 #0
> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.356067] Stack : 8036cff4
> >>> 00000000 00000001 803c0000 00000000 00000000 00000000 00000000
> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.356067]      00000000
> >>> 00000000
> >>> 00000000 00000000 00000000 00000000 00000000 00000000
> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.356067]      00000000
> >>> 00000000
> >>> 00000000 00000000 00000000 00000000 00000000 00000000
> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.356067]      00000000
> >>> 00000000
> >>> 00000000 00000000 00000000 00000000 00000000 00000000
> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.356067]      00000000
> >>> 00000000
> >>> 00000000 00000000 00000000 00000000 00000000 00000000
> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.356067]      ...
> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.392511] Call
> >>> Trace:[<800716f0>] 0x800716f0
> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.397147] [<800716f0>]
> >>> 0x800716f0
> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.400770] [<8008144c>]
> >>> 0x8008144c
> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.404414] [<87587050>]
> >>> 0x87587050 [mac80211@87580000+0x5f500]
> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.410531] [<80081504>]
> >>> 0x80081504
> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.414184] [<87587050>]
> >>> 0x87587050 [mac80211@87580000+0x5f500]
> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.420297] [<8759cb40>]
> >>> 0x8759cb40 [mac80211@87580000+0x5f500]
> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.426431] [<87587188>]
> >>> 0x87587188 [mac80211@87580000+0x5f500]
> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.432531] [<875849b4>]
> >>> 0x875849b4 [mac80211@87580000+0x5f500]
> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.438629] [<801018e4>]
> >>> 0x801018e4
> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.442276] [<87587238>]
> >>> 0x87587238 [mac80211@87580000+0x5f500]
> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.448406] [<874cc114>]
> >>> 0x874cc114 [cfg80211@874c0000+0x35b60]
> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.454516] [<80293074>]
> >>> 0x80293074
> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.458147] [<80291900>]
> >>> 0x80291900
> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.461822] [<80292df8>]
> >>> 0x80292df8
> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.465461] [<80292238>]
> >>> 0x80292238
> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.469092] [<800a15d0>]
> >>> 0x800a15d0
> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.472726] [<80292de0>]
> >>> 0x80292de0
> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.476371] [<80257794>]
> >>> 0x80257794
> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.480002] [<80291aa0>]
> >>> 0x80291aa0
> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.483630] [<80256c90>]
> >>> 0x80256c90
> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.487280] [<80292004>]
> >>> 0x80292004
> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.490908] [<801b5304>]
> >>> 0x801b5304
> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.494541] [<8025b478>]
> >>> 0x8025b478
> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.498198] [<8024d0e4>]
> >>> 0x8024d0e4
> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.501840] [<8024e4f8>]
> >>> 0x8024e4f8
> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.505492] [<8027e338>]
> >>> 0x8027e338
> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.509121] [<802e8244>]
> >>> 0x802e8244
> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.512780] [<8011aa58>]
> >>> 0x8011aa58
> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.516413] [<8011ae3c>]
> >>> 0x8011ae3c
> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.520043] [<8011acd4>]
> >>> 0x8011acd4
> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.523697] [<80117a10>]
> >>> 0x80117a10
> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.527352] [<8024f424>]
> >>> 0x8024f424
> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.530981] [<801059e8>]
> >>> 0x801059e8
> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.534625] [<8006295c>]
> >>> 0x8006295c
> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.538265]
> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.539870] ---[ end trace
> >>> 2c07f06df2595aa6 ]---
> >>> Sat Oct 29 10:48:12 2016 kern.warn kernel: [117941.534956] ath10k_pci
> >>> 0000:01:00.0: failed to delete peer a0:12:34:56:78:9a for vdev 0: -11
> >>> Sat Oct 29 10:48:12 2016 kern.warn kernel: [117941.543716] ath10k_pci
> >>> 0000:01:00.0: found sta peer a0:12:34:56:78:9a (ptr 86ebf400 id 196) entry on
> >>> vdev 0 after it was supposedly removed
> >>> Sat Oct 29 10:48:12 2016 daemon.info hostapd: wlan0: STA 70:12:34:56:78:9a
> >>> IEEE
> >>> 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
> >>> Sat Oct 29 10:48:12 2016 kern.warn kernel: [117941.558962] ath10k_pci
> >>> 0000:01:00.0: cipher 0 is not supported
> >>> Sat Oct 29 10:48:12 2016 kern.warn kernel: [117941.565049] ath10k_pci
> >>> 0000:01:00.0: failed to remove peer wep key 0: -122
> >>> Sat Oct 29 10:48:15 2016 kern.warn kernel: [117944.564917] ath10k_warn: 2
> >>> callbacks suppressed
> >>> Sat Oct 29 10:48:15 2016 kern.warn kernel: [117944.569617] ath10k_pci
> >>> 0000:01:00.0: failed to delete peer 70:12:34:56:78:9a for vdev 0: -11
> >>> Sat Oct 29 10:48:15 2016 kern.warn kernel: [117944.578309] ath10k_pci
> >>> 0000:01:00.0: found sta peer 70:12:34:56:78:9a (ptr 86320c00 id 251) entry on
> >>> vdev 0 after it was supposedly removed
> >>> Sat Oct 29 10:48:18 2016 kern.warn kernel: [117947.584908] ath10k_pci
> >>> 0000:01:00.0: failed to set beacon mode for vdev 0: -11
> >>> Sat Oct 29 10:48:21 2016 kern.warn kernel: [117950.584876] ath10k_pci
> >>> 0000:01:00.0: failed to set dtim period for vdev 0: -11
> >>> Sat Oct 29 10:48:24 2016 kern.warn kernel: [117953.594843] ath10k_pci
> >>> 0000:01:00.0: failed to recalculate rts/cts prot for vdev 0: -11
> >>> Sat Oct 29 10:48:27 2016 kern.warn kernel: [117956.594833] ath10k_pci
> >>> 0000:01:00.0: failed to set protection mode 0 on vdev 0: -11
> >>> Sat Oct 29 10:48:30 2016 kern.warn kernel: [117959.594805] ath10k_pci
> >>> 0000:01:00.0: failed to set preamble for vdev 0: -11
> >>> Sat Oct 29 10:52:57 2016 daemon.info hostapd: wlan1: STA 00:12:34:56:78:9a
> >>> WPA:
> >>> group key handshake completed (RSN)
> >>> Sat Oct 29 10:52:57 2016 daemon.info hostapd: wlan1: STA a0:12:34:56:78:9a
> >>> WPA:
> >>> group key handshake completed (RSN)
> >>> Sat Oct 29 10:53:00 2016 kern.warn kernel: [118229.632250] ath10k_pci
> >>> 0000:01:00.0: failed to install key for vdev 0 peer 30:12:34:56:78:9a: -11
> >>> Sat Oct 29 10:53:00 2016 kern.err kernel: [118229.641421] wlan0: failed to
> >>> remove key (2, ff:ff:ff:ff:ff:ff) from hardware (-11)
> >>> Sat Oct 29 10:53:03 2016 kern.warn kernel: [118232.642204] ath10k_pci
> >>> 0000:01:00.0: failed to install key for vdev 0 peer 30:12:34:56:78:9a: -11
> >>> Sat Oct 29 10:53:03 2016 kern.err kernel: [118232.651309] wlan0: failed to
> >>> set
> >>> key (2, ff:ff:ff:ff:ff:ff) to hardware (-11)
> >>> Sat Oct 29 10:53:08 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a
> >>> IEEE
> >>> 802.11: deauthenticated due to local deauth request
> >>> Sat Oct 29 10:53:11 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a
> >>> IEEE
> >>> 802.11: authenticated
> >>> Sat Oct 29 10:53:11 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a
> >>> IEEE
> >>> 802.11: associated (aid 2)
> >>> Sat Oct 29 10:53:11 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a
> >>> RADIUS: starting accounting session 56977F3FD253EA9C
> >>> Sat Oct 29 10:53:11 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a
> >>> WPA:
> >>> pairwise key handshake completed (RSN)
> >>>
> >>
> >>
> >> _______________________________________________
> >> ath10k mailing list
> >> ath10k@lists.infradead.org
> >> http://lists.infradead.org/mailman/listinfo/ath10k
> > 
> 
> 
> _______________________________________________
> ath10k mailing list
> ath10k@lists.infradead.org
> http://lists.infradead.org/mailman/listinfo/ath10k

_______________________________________________
ath10k mailing list
ath10k@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/ath10k

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [BUG] Kernel crashes with ath10k radio and Nexus 5X clients
  2016-11-21 12:47     ` Mohammed Shafi Shajakhan
@ 2016-11-28  0:24       ` Timo Sigurdsson
  2016-12-03 11:33       ` Timo Sigurdsson
  1 sibling, 0 replies; 7+ messages in thread
From: Timo Sigurdsson @ 2016-11-28  0:24 UTC (permalink / raw)
  To: mohammed; +Cc: adrian, lede-dev, ath10k

Hi Mohammed,

sorry for the late reply, but I was on a business trip last week.

The log I had attached is all I got from this crash. I have no experience
with kernel debugging, but I assume some info might be missing because the
kernel was not compiled with debug information. So, I will have to provoke
another crash with a different firmware image that has more debugging
options enabled. It might take a few days, until the error occurs again,
but I'll try to gather more information and post it.

Regards,

Timo


Mohammed Shafi Shajakhan schrieb am 21.11.2016 13:47:

> Hi Timo,
> 
> sorry had I missed the exact kernel crash call trace ?
> I could see only the warnings, can you please post the call
> trace of the kernel crash please ?
> 
> regards,
> shafi
> 
> On Sun, Nov 20, 2016 at 02:35:27AM +0100, Timo Sigurdsson wrote:
>> Hi Adrian,
>> 
>> sure - here's the bug report on kernel.org:
>> https://bugzilla.kernel.org/show_bug.cgi?id=188201
>> 
>> Regards,
>> 
>> Timo
>> 
>> 
>> Adrian Chadd schrieb am 18.11.2016 22:22:
>> 
>> > hiya!
>> > 
>> > Can you file a kernel.org bug mentioning this?
>> > 
>> > thanks!
>> > 
>> > 
>> > -a
>> > 
>> > 
>> > On 18 November 2016 at 01:30, Timo Sigurdsson
>> > <public_timo.s@silentcreek.de> wrote:
>> >> Hi again,
>> >>
>> >> in the meantime, I have some more information to add to the issue mentioned
>> in
>> >> my email quoted further down below.
>> >>
>> >> Ben Greear approached me off-list and suggested to try the Candela Tech
>> ath10k
>> >> driver and firmware and see if the issue occurs with that as well. So, for
>> the
>> >> last 3 weeks I've been testing the CT driver and firmware and I can happily
>> >> report that the issue with the driver crashing after a while when a Nexus
>> 5X
>> >> device is connected is not occuring with the current BETA 18
>> >> firmware-2-ct-full-community.bin. So, this really seems like a regression
>> in
>> >> the official API level 5 ath10k firmware blobs.
>> >>
>> >> The CT firmware is not perfect either, since it seems to suffer from a
>> >> different
>> >> bug that has been resolved in the official firmwares, and that is that
>> after a
>> >> reboot of my TP-Link Archer C7 v2, the ath10k driver won't load. Only after
>> a
>> >> hard reset or "cold boot" it will come up. That's an issue I had with older
>> >> official firmwares as well, but it has been resolved with the recent API
>> level
>> >> 5 firmwares.
>> >>
>> >> Nevertheless, for the time being, I will stick to the CT firmware because I
>> >> can
>> >> work around the reboot issue and having the 5GHz wifi working for my Nexus
>> 5X
>> >> clients is more important.
>> >>
>> >> Over the next weeks, I will test different combinations of ath10k(-ct)
>> driver
>> >> and firmware to see if there's a combination that resolves all issues. This
>> >> morning I flashed a LEDE build with the official ath10k driver and the CT
>> >> firmware binary.
>> >>
>> >> But of course, if someone has more suggestions on what I could try or what
>> >> information I could collect to help resolve the issue related to the Nexus
>> 5X
>> >> clients in the official firmware binaries, I think that would be beneficial
>> >> for a larger audience.
>> >>
>> >> Regards,
>> >>
>> >> Timo
>> >>
>> >> P.S.: Please include my email address in any reply, since I'm not
>> subscribed
>> >> to the mailing list. Thank you.
>> >>
>> >>
>> >> Timo Sigurdsson schrieb am 29.10.2016 22:19:
>> >>
>> >>> Hi everybody,
>> >>>
>> >>> I have a TP-Link Archer C7 v2 running a fairly recent build of LEDE
>> (r1952,
>> >>> Linux 4.4.26, compat-wireless-2016-10-08). It all works well except for
>> the
>> >>> fact that when I connect a Nexus 5X device to the 5GHz radio, the kernel
>> or
>> >>> ath10k driver will crash after a while. 5Ghz wifi will be dead after that
>> >>> until I reboot the system.
>> >>>
>> >>> This issue has been reported before [1] and it also has been declared as
>> >>> solved with newer firmwares [2] (but reopened by other users). However,
>> even
>> >>> with the latest firmware 10.2.4.70.58 from Kalle Valo's Github repository
>> the
>> >>> issue is far from resolved. I have tried many different firmware revisions
>> >>> over the time (more recently 10.2.4.70.56 and 10.2.4.70.54), and I can
>> could
>> >>> only find that the issue sometimes takes longer to trigger with some
>> >>> firmwares
>> >>> (which might just be random), but it would always occur at some point with
>> >>> API
>> >>> level 5 firmwares. With API level 2 firmwares (which I testesd when I was
>> >>> still using OpenWrt 15.05) I never saw these crashes, but the Nexus 5X had
>> >>> other connectivity issues with these older firmwares that made this
>> >>> combination no fun to use either. But this shows that the firmware itself
>> >>> makes the difference here.
>> >>>
>> >>> I actually have two Nexus 5X on my network (my wife's and my own). I can
>> >>> trigger the crash with either one of them. And if both Nexus 5X are
>> connected
>> >>> to the 5Ghz radio, then the issue triggers much faster (can be as low as
>> 15
>> >>> minutes). My workaround is to let the Nexus 5X devices only connect to the
>> >>> 2.4GHz radio. This way, the device can runs for weeks without any issue or
>> >>> crash, but of course I would prefer the actual bug being fixed rather than
>> to
>> >>> circumvent it.
>> >>>
>> >>> I'm appending a syslog from my access point with a crash happening while
>> one
>> >>> Nexus 5X was connected to the 5GHz radio starting from the time the system
>> >>> booted. I randomized the MAC addresses. but left the first two characters
>> >>> unique so different clients can be distinguished.
>> >>>
>> >>> If there is more info I could collect to help identify the cause of this
>> >>> issue, please let me know (and possibly how to do that as well).
>> >>>
>> >>> Thank you and regards,
>> >>>
>> >>> Timo
>> >>>
>> >>> [1] http://lists.infradead.org/pipermail/ath10k/2015-November/006413.html
>> >>> [2] https://dev.openwrt.org/ticket/20854
>> >>>
>> >>> And here's the log:
>> >>> Fri Oct 28 02:01:35 2016 kern.notice kernel: [    0.000000] Linux version
>> >>> 4.4.26 (user@buildsystem) (gcc version 5.4.0 (LEDE GCC 5.4.0 r1952) ) #0
>> Fri
>> >>> Oct 21 15:52:28 2016
>> >>> [...]
>> >>> Fri Oct 28 02:01:35 2016 kern.info kernel: [    9.468751] Loading modules
>> >>> backported from Linux version wt-2016-10-03-1-g6fcb1a6
>> >>> Fri Oct 28 02:01:35 2016 kern.info kernel: [    9.476481] Backport
>> generated
>> >>> by
>> >>> backports.git backports-20160324-9-g0e38f5c
>> >>> Fri Oct 28 02:01:35 2016 kern.warn kernel: [    9.576570] PCI: Enabling
>> >>> device
>> >>> 0000:01:00.0 (0000 -> 0002)
>> >>> Fri Oct 28 02:01:35 2016 kern.info kernel: [    9.582475] ath10k_pci
>> >>> 0000:01:00.0: pci irq legacy oper_irq_mode 1 irq_mode 0 reset_mode 0
>> >>> Fri Oct 28 02:01:35 2016 kern.warn kernel: [   10.087609] ath10k_pci
>> >>> 0000:01:00.0: Direct firmware load for ath10k/pre-cal-pci-0000:01:00.0.bin
>> >>> failed with error -2
>> >>> Fri Oct 28 02:01:35 2016 kern.warn kernel: [   10.098492] ath10k_pci
>> >>> 0000:01:00.0: Falling back to user helper
>> >>> Fri Oct 28 02:01:35 2016 kern.err kernel: [   10.176500] firmware
>> >>> ath10k!pre-cal-pci-0000:01:00.0.bin: firmware_loading_store: map pages
>> failed
>> >>> Fri Oct 28 02:01:35 2016 kern.info kernel: [   10.677026] ath10k_pci
>> >>> 0000:01:00.0: qca988x hw2.0 target 0x4100016c chip_id 0x043202ff sub
>> >>> 0000:0000
>> >>> Fri Oct 28 02:01:35 2016 kern.info kernel: [   10.686424] ath10k_pci
>> >>> 0000:01:00.0: kconfig debug 0 debugfs 1 tracing 0 dfs 1 testmode 1
>> >>> Fri Oct 28 02:01:35 2016 kern.info kernel: [   10.699498] ath10k_pci
>> >>> 0000:01:00.0: firmware ver 10.2.4.70.58 api 5 features no-p2p,raw-mode,mfp
>> >>> crc32 e1af076f
>> >>> Fri Oct 28 02:01:35 2016 kern.warn kernel: [   10.709932] ath10k_pci
>> >>> 0000:01:00.0: Direct firmware load for ath10k/QCA988X/hw2.0/board-2.bin
>> >>> failed
>> >>> with error -2
>> >>> Fri Oct 28 02:01:35 2016 kern.warn kernel: [   10.720531] ath10k_pci
>> >>> 0000:01:00.0: Falling back to user helper
>> >>> Fri Oct 28 02:01:35 2016 kern.err kernel: [   10.798719] firmware
>> >>> ath10k!QCA988X!hw2.0!board-2.bin: firmware_loading_store: map pages failed
>> >>> Fri Oct 28 02:01:35 2016 kern.info kernel: [   10.823845] ath10k_pci
>> >>> 0000:01:00.0: board_file api 1 bmi_id N/A crc32 bebc7c08
>> >>> Fri Oct 28 02:01:35 2016 kern.info kernel: [   11.954723] ath10k_pci
>> >>> 0000:01:00.0: htt-ver 2.1 wmi-op 5 htt-op 2 cal file max-sta 128 raw 0
>> >>> hwcrypto
>> >>> 1
>> >>> [...]
>> >>> // Evertyhing runs fine for a bit more than a day, but then this happens
>> ...
>> >>> //
>> >>> // Note: The ath10k radio in question is wlan0 //
>> >>> Sat Oct 29 10:38:21 2016 daemon.info hostapd: wlan1: STA 9c:12:34:56:78:9a
>> >>> IEEE
>> >>> 802.11: disassociated
>> >>> Sat Oct 29 10:38:22 2016 daemon.info hostapd: wlan1: STA 9c:12:34:56:78:9a
>> >>> IEEE
>> >>> 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
>> >>> Sat Oct 29 10:42:57 2016 daemon.info hostapd: wlan1: STA 00:12:34:56:78:9a
>> >>> WPA:
>> >>> group key handshake completed (RSN)
>> >>> Sat Oct 29 10:42:57 2016 daemon.info hostapd: wlan0: STA a0:12:34:56:78:9a
>> >>> WPA:
>> >>> group key handshake completed (RSN)
>> >>> Sat Oct 29 10:42:57 2016 daemon.info hostapd: wlan0: STA 70:12:34:56:78:9a
>> >>> WPA:
>> >>> group key handshake completed (RSN)
>> >>> Sat Oct 29 10:43:05 2016 kern.warn kernel: [117635.147861] ath10k_pci
>> >>> 0000:01:00.0: failed to delete peer 7f:12:34:56:78:9a for vdev 0: -145
>> >>> Sat Oct 29 10:43:05 2016 kern.warn kernel: [117635.156679] ath10k_pci
>> >>> 0000:01:00.0: found sta peer 7f:12:34:56:78:9a (ptr 86ebf200 id 62) entry
>> on
>> >>> vdev 0 after it was supposedly removed
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.169489] ------------[
>> cut
>> >>> here ]------------
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.174314] WARNING: CPU: 0
>> >>> PID:
>> >>> 1885 at compat-wireless-2016-10-08/net/mac80211/sta_info.c:964 0x875870a4
>> >>> [mac80211@87580000+0x5f500]()
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.186854] Modules linked
>> in:
>> >>> pppoe ppp_async iptable_nat ath9k pppox ppp_generic nf_nat_ipv4
>> >>> nf_conntrack_ipv6 nf_conntrack_ipv4 ipt_REJECT ipt_MASQUERADE ax88179_178a
>> >>> ath9k_common xt_time xt_tcpudp xt_tcpmss xt_statistic xt_state xt_recent
>> >>> xt_nat
>> >>> xt_multiport xt_mark xt_mac xt_limit xt_length xt_id xt_hl xt_helper
>> xt_ecn
>> >>> xt_dscp xt_conntrack xt_connmark xt_connlimit xt_connbytes xt_comment
>> >>> xt_TCPMSS
>> >>> xt_REDIRECT xt_LOG xt_HL xt_DSCP xt_CT xt_CLASSIFY usbnet Sat Oct 29
>> 10:43:06
>> >>> 2016 kern.warn kernel: [117635.294282] CPU: 0 PID: 1885 Comm: hostapd Not
>> >>> tainted 4.4.26 #0
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.300471] Stack :
>> 8036cff4
>> >>> 00000000 00000001 803c0000 00000000 00000000 00000000 00000000
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.300471]      00000000
>> >>> 00000000
>> >>> 00000000 00000000 00000000 00000000 00000000 00000000
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.300471]      00000000
>> >>> 00000000
>> >>> 00000000 00000000 00000000 00000000 00000000 00000000
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.300471]      00000000
>> >>> 00000000
>> >>> 00000000 00000000 00000000 00000000 00000000 00000000
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.300471]      00000000
>> >>> 00000000
>> >>> 00000000 00000000 00000000 00000000 00000000 00000000
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.300471]      ...
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.336918] Call
>> >>> Trace:[<800716f0>] 0x800716f0
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.341551] [<800716f0>]
>> >>> 0x800716f0
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.345176] [<8008144c>]
>> >>> 0x8008144c
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.348832] [<875870a4>]
>> >>> 0x875870a4 [mac80211@87580000+0x5f500]
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.354943] [<80081504>]
>> >>> 0x80081504
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.358611] [<875870a4>]
>> >>> 0x875870a4 [mac80211@87580000+0x5f500]
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.364742] [<87587188>]
>> >>> 0x87587188 [mac80211@87580000+0x5f500]
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.370861] [<875849b4>]
>> >>> 0x875849b4 [mac80211@87580000+0x5f500]
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.376951] [<80115770>]
>> >>> 0x80115770
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.380613] [<87587238>]
>> >>> 0x87587238 [mac80211@87580000+0x5f500]
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.386727] [<874cc114>]
>> >>> 0x874cc114 [cfg80211@874c0000+0x35b60]
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.392854] [<80293074>]
>> >>> 0x80293074
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.396485] [<80291900>]
>> >>> 0x80291900
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.400176] [<80292df8>]
>> >>> 0x80292df8
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.403801] [<80292238>]
>> >>> 0x80292238
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.407439] [<80292de0>]
>> >>> 0x80292de0
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.411079] [<80257794>]
>> >>> 0x80257794
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.414711] [<80291aa0>]
>> >>> 0x80291aa0
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.418345] [<80256c90>]
>> >>> 0x80256c90
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.421991] [<80292004>]
>> >>> 0x80292004
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.425616] [<801b5304>]
>> >>> 0x801b5304
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.429260] [<8025b478>]
>> >>> 0x8025b478
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.432902] [<8024d0e4>]
>> >>> 0x8024d0e4
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.436540] [<8024e4f8>]
>> >>> 0x8024e4f8
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.440195] [<801b5304>]
>> >>> 0x801b5304
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.443835] [<8027e338>]
>> >>> 0x8027e338
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.447464] [<802e8244>]
>> >>> 0x802e8244
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.451136] [<8011aa58>]
>> >>> 0x8011aa58
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.454762] [<8011ae3c>]
>> >>> 0x8011ae3c
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.458402] [<8011acd4>]
>> >>> 0x8011acd4
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.462057] [<80117a10>]
>> >>> 0x80117a10
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.465700] [<8024f424>]
>> >>> 0x8024f424
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.469344] [<800b1dd0>]
>> >>> 0x800b1dd0
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.472986] [<8006295c>]
>> >>> 0x8006295c
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.476615]
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.478223] ---[ end trace
>> >>> 2c07f06df2595aa5 ]---
>> >>> Sat Oct 29 10:43:06 2016 daemon.info hostapd: wlan0: STA 7f:12:34:56:78:9a
>> >>> IEEE
>> >>> 802.11: deauthenticated due to local deauth request
>> >>> Sat Oct 29 10:43:15 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a
>> >>> IEEE
>> >>> 802.11: authenticated
>> >>> Sat Oct 29 10:43:15 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a
>> >>> IEEE
>> >>> 802.11: associated (aid 2)
>> >>> Sat Oct 29 10:43:15 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a
>> >>> RADIUS: starting accounting session D1227001A194DA09
>> >>> Sat Oct 29 10:43:15 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a
>> >>> WPA:
>> >>> pairwise key handshake completed (RSN)
>> >>> Sat Oct 29 10:43:31 2016 daemon.info hostapd: wlan1: STA a0:12:34:56:78:9a
>> >>> IEEE
>> >>> 802.11: authenticated
>> >>> Sat Oct 29 10:43:31 2016 daemon.info hostapd: wlan1: STA a0:12:34:56:78:9a
>> >>> IEEE
>> >>> 802.11: associated (aid 3)
>> >>> Sat Oct 29 10:43:31 2016 daemon.info hostapd: wlan1: STA a0:12:34:56:78:9a
>> >>> RADIUS: starting accounting session 92084E55AFE512B3
>> >>> Sat Oct 29 10:43:31 2016 daemon.info hostapd: wlan1: STA a0:12:34:56:78:9a
>> >>> WPA:
>> >>> pairwise key handshake completed (RSN)
>> >>> Sat Oct 29 10:48:02 2016 daemon.info hostapd: wlan0: STA a0:12:34:56:78:9a
>> >>> IEEE
>> >>> 802.11: disassociated due to inactivity
>> >>> Sat Oct 29 10:48:05 2016 kern.warn kernel: [117935.165013] ath10k_pci
>> >>> 0000:01:00.0: failed to install key for vdev 0 peer a0:12:34:56:78:9a:
>> -145
>> >>> Sat Oct 29 10:48:05 2016 kern.err kernel: [117935.174193] wlan0: failed to
>> >>> remove key (0, a0:12:34:56:78:9a) from hardware (-145)
>> >>> Sat Oct 29 10:48:05 2016 daemon.info hostapd: wlan0: STA 70:12:34:56:78:9a
>> >>> IEEE
>> >>> 802.11: disassociated due to inactivity
>> >>> Sat Oct 29 10:48:08 2016 kern.warn kernel: [117938.174996] ath10k_pci
>> >>> 0000:01:00.0: failed to install key for vdev 0 peer 70:12:34:56:78:9a: -11
>> >>> Sat Oct 29 10:48:08 2016 kern.err kernel: [117938.184092] wlan0: failed to
>> >>> remove key (0, 70:12:34:56:78:9a) from hardware (-11)
>> >>> Sat Oct 29 10:48:08 2016 daemon.info hostapd: wlan0: STA a0:12:34:56:78:9a
>> >>> IEEE
>> >>> 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.193251] ath10k_pci
>> >>> 0000:01:00.0: cipher 0 is not supported
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.199320] ath10k_pci
>> >>> 0000:01:00.0: failed to remove peer wep key 0: -122
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.206409] ath10k_pci
>> >>> 0000:01:00.0: failed to clear all peer wep keys for vdev 0: -122
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.214621] ath10k_pci
>> >>> 0000:01:00.0: failed to disassociate station: a0:12:34:56:78:9a vdev 0:
>> -122
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.223892] ------------[
>> cut
>> >>> here ]------------
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.228706] WARNING: CPU: 0
>> >>> PID:
>> >>> 1885 at compat-wireless-2016-10-08/net/mac80211/sta_info.c:956 0x87587050
>> >>> [mac80211@87580000+0x5f500]()
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.241226] Modules linked
>> in:
>> >>> pppoe ppp_async iptable_nat ath9k pppox ppp_generic nf_nat_ipv4
>> >>> nf_conntrack_ipv6 nf_conntrack_ipv4 ipt_REJECT ipt_MASQUERADE ax88179_178a
>> >>> ath9k_common xt_time xt_tcpudp xt_tcpmss xt_statistic xt_state xt_recent
>> >>> xt_nat
>> >>> xt_multiport xt_mark xt_mac xt_limit xt_length xt_id xt_hl xt_helper
>> xt_ecn
>> >>> xt_dscp xt_conntrack xt_connmark xt_connlimit xt_connbytes xt_comment
>> >>> xt_TCPMSS
>> >>> xt_REDIRECT xt_LOG xt_HL xt_DSCP xt_CT xt_CLASSIFY usbnet Sat Oct 29
>> 10:48:09
>> >>> 2016 kern.warn kernel: [117938.348645] CPU: 0 PID: 1885 Comm: hostapd
>> >>> Tainted:
>> >>> G        W       4.4.26 #0
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.356067] Stack :
>> 8036cff4
>> >>> 00000000 00000001 803c0000 00000000 00000000 00000000 00000000
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.356067]      00000000
>> >>> 00000000
>> >>> 00000000 00000000 00000000 00000000 00000000 00000000
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.356067]      00000000
>> >>> 00000000
>> >>> 00000000 00000000 00000000 00000000 00000000 00000000
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.356067]      00000000
>> >>> 00000000
>> >>> 00000000 00000000 00000000 00000000 00000000 00000000
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.356067]      00000000
>> >>> 00000000
>> >>> 00000000 00000000 00000000 00000000 00000000 00000000
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.356067]      ...
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.392511] Call
>> >>> Trace:[<800716f0>] 0x800716f0
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.397147] [<800716f0>]
>> >>> 0x800716f0
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.400770] [<8008144c>]
>> >>> 0x8008144c
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.404414] [<87587050>]
>> >>> 0x87587050 [mac80211@87580000+0x5f500]
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.410531] [<80081504>]
>> >>> 0x80081504
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.414184] [<87587050>]
>> >>> 0x87587050 [mac80211@87580000+0x5f500]
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.420297] [<8759cb40>]
>> >>> 0x8759cb40 [mac80211@87580000+0x5f500]
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.426431] [<87587188>]
>> >>> 0x87587188 [mac80211@87580000+0x5f500]
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.432531] [<875849b4>]
>> >>> 0x875849b4 [mac80211@87580000+0x5f500]
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.438629] [<801018e4>]
>> >>> 0x801018e4
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.442276] [<87587238>]
>> >>> 0x87587238 [mac80211@87580000+0x5f500]
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.448406] [<874cc114>]
>> >>> 0x874cc114 [cfg80211@874c0000+0x35b60]
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.454516] [<80293074>]
>> >>> 0x80293074
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.458147] [<80291900>]
>> >>> 0x80291900
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.461822] [<80292df8>]
>> >>> 0x80292df8
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.465461] [<80292238>]
>> >>> 0x80292238
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.469092] [<800a15d0>]
>> >>> 0x800a15d0
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.472726] [<80292de0>]
>> >>> 0x80292de0
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.476371] [<80257794>]
>> >>> 0x80257794
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.480002] [<80291aa0>]
>> >>> 0x80291aa0
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.483630] [<80256c90>]
>> >>> 0x80256c90
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.487280] [<80292004>]
>> >>> 0x80292004
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.490908] [<801b5304>]
>> >>> 0x801b5304
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.494541] [<8025b478>]
>> >>> 0x8025b478
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.498198] [<8024d0e4>]
>> >>> 0x8024d0e4
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.501840] [<8024e4f8>]
>> >>> 0x8024e4f8
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.505492] [<8027e338>]
>> >>> 0x8027e338
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.509121] [<802e8244>]
>> >>> 0x802e8244
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.512780] [<8011aa58>]
>> >>> 0x8011aa58
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.516413] [<8011ae3c>]
>> >>> 0x8011ae3c
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.520043] [<8011acd4>]
>> >>> 0x8011acd4
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.523697] [<80117a10>]
>> >>> 0x80117a10
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.527352] [<8024f424>]
>> >>> 0x8024f424
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.530981] [<801059e8>]
>> >>> 0x801059e8
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.534625] [<8006295c>]
>> >>> 0x8006295c
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.538265]
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.539870] ---[ end trace
>> >>> 2c07f06df2595aa6 ]---
>> >>> Sat Oct 29 10:48:12 2016 kern.warn kernel: [117941.534956] ath10k_pci
>> >>> 0000:01:00.0: failed to delete peer a0:12:34:56:78:9a for vdev 0: -11
>> >>> Sat Oct 29 10:48:12 2016 kern.warn kernel: [117941.543716] ath10k_pci
>> >>> 0000:01:00.0: found sta peer a0:12:34:56:78:9a (ptr 86ebf400 id 196) entry
>> on
>> >>> vdev 0 after it was supposedly removed
>> >>> Sat Oct 29 10:48:12 2016 daemon.info hostapd: wlan0: STA 70:12:34:56:78:9a
>> >>> IEEE
>> >>> 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
>> >>> Sat Oct 29 10:48:12 2016 kern.warn kernel: [117941.558962] ath10k_pci
>> >>> 0000:01:00.0: cipher 0 is not supported
>> >>> Sat Oct 29 10:48:12 2016 kern.warn kernel: [117941.565049] ath10k_pci
>> >>> 0000:01:00.0: failed to remove peer wep key 0: -122
>> >>> Sat Oct 29 10:48:15 2016 kern.warn kernel: [117944.564917] ath10k_warn: 2
>> >>> callbacks suppressed
>> >>> Sat Oct 29 10:48:15 2016 kern.warn kernel: [117944.569617] ath10k_pci
>> >>> 0000:01:00.0: failed to delete peer 70:12:34:56:78:9a for vdev 0: -11
>> >>> Sat Oct 29 10:48:15 2016 kern.warn kernel: [117944.578309] ath10k_pci
>> >>> 0000:01:00.0: found sta peer 70:12:34:56:78:9a (ptr 86320c00 id 251) entry
>> on
>> >>> vdev 0 after it was supposedly removed
>> >>> Sat Oct 29 10:48:18 2016 kern.warn kernel: [117947.584908] ath10k_pci
>> >>> 0000:01:00.0: failed to set beacon mode for vdev 0: -11
>> >>> Sat Oct 29 10:48:21 2016 kern.warn kernel: [117950.584876] ath10k_pci
>> >>> 0000:01:00.0: failed to set dtim period for vdev 0: -11
>> >>> Sat Oct 29 10:48:24 2016 kern.warn kernel: [117953.594843] ath10k_pci
>> >>> 0000:01:00.0: failed to recalculate rts/cts prot for vdev 0: -11
>> >>> Sat Oct 29 10:48:27 2016 kern.warn kernel: [117956.594833] ath10k_pci
>> >>> 0000:01:00.0: failed to set protection mode 0 on vdev 0: -11
>> >>> Sat Oct 29 10:48:30 2016 kern.warn kernel: [117959.594805] ath10k_pci
>> >>> 0000:01:00.0: failed to set preamble for vdev 0: -11
>> >>> Sat Oct 29 10:52:57 2016 daemon.info hostapd: wlan1: STA 00:12:34:56:78:9a
>> >>> WPA:
>> >>> group key handshake completed (RSN)
>> >>> Sat Oct 29 10:52:57 2016 daemon.info hostapd: wlan1: STA a0:12:34:56:78:9a
>> >>> WPA:
>> >>> group key handshake completed (RSN)
>> >>> Sat Oct 29 10:53:00 2016 kern.warn kernel: [118229.632250] ath10k_pci
>> >>> 0000:01:00.0: failed to install key for vdev 0 peer 30:12:34:56:78:9a: -11
>> >>> Sat Oct 29 10:53:00 2016 kern.err kernel: [118229.641421] wlan0: failed to
>> >>> remove key (2, ff:ff:ff:ff:ff:ff) from hardware (-11)
>> >>> Sat Oct 29 10:53:03 2016 kern.warn kernel: [118232.642204] ath10k_pci
>> >>> 0000:01:00.0: failed to install key for vdev 0 peer 30:12:34:56:78:9a: -11
>> >>> Sat Oct 29 10:53:03 2016 kern.err kernel: [118232.651309] wlan0: failed to
>> >>> set
>> >>> key (2, ff:ff:ff:ff:ff:ff) to hardware (-11)
>> >>> Sat Oct 29 10:53:08 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a
>> >>> IEEE
>> >>> 802.11: deauthenticated due to local deauth request
>> >>> Sat Oct 29 10:53:11 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a
>> >>> IEEE
>> >>> 802.11: authenticated
>> >>> Sat Oct 29 10:53:11 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a
>> >>> IEEE
>> >>> 802.11: associated (aid 2)
>> >>> Sat Oct 29 10:53:11 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a
>> >>> RADIUS: starting accounting session 56977F3FD253EA9C
>> >>> Sat Oct 29 10:53:11 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a
>> >>> WPA:
>> >>> pairwise key handshake completed (RSN)
>> >>>
>> >>
>> >>
>> >> _______________________________________________
>> >> ath10k mailing list
>> >> ath10k@lists.infradead.org
>> >> http://lists.infradead.org/mailman/listinfo/ath10k
>> > 
>> 
>> 
>> _______________________________________________
>> ath10k mailing list
>> ath10k@lists.infradead.org
>> http://lists.infradead.org/mailman/listinfo/ath10k
> 


_______________________________________________
ath10k mailing list
ath10k@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/ath10k

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [BUG] Kernel crashes with ath10k radio and Nexus 5X clients
  2016-11-21 12:47     ` Mohammed Shafi Shajakhan
  2016-11-28  0:24       ` Timo Sigurdsson
@ 2016-12-03 11:33       ` Timo Sigurdsson
  1 sibling, 0 replies; 7+ messages in thread
From: Timo Sigurdsson @ 2016-12-03 11:33 UTC (permalink / raw)
  To: mohammed; +Cc: adrian, lede-dev, ath10k

Hi Mohammed,

so, I provoked the crash again on a newer build with debugging enabled
(LEDE r2321, Linux 4.4.32, ath10k firmware 10.2.4.70.54).

The relevant dmesg output is pasted below (with mac addresses
pseudo-anonymized). I hope this includes the information you were
looking for. If not, please let me know what other useful information I
can provide. I haven't rebooted the access point yet.

Regards,

Timo

[283232.075393] ath10k_pci 0000:01:00.0: failed to delete peer 78:f8:82:00:00:00 for vdev 0: -145
[283232.084140] ath10k_pci 0000:01:00.0: found sta peer 78:f8:82:00:00:00 (ptr 86df2800 id 62) entry on vdev 0 after it was supposedly removed
[283232.096976] ------------[ cut here ]------------
[283232.101904] WARNING: CPU: 0 PID: 1841 at compat-wireless-2016-10-08/net/mac80211/sta_info.c:964 sta_set_sinfo+0x92c/0x9e0 [mac80211]()
[283232.114279] Modules linked in: pppoe ppp_async iptable_nat ath9k pppox ppp_generic nf_nat_ipv4 nf_conntrack_ipv6 nf_conntrack_ipv4 ipt_REJECT ipt_MASQUERADE ax88179_178a ath9k_common xt_time xt_tcpudp xt_tcpmss xt_statistic xt_state xt_recent xt_nat xt_multiport xt_mark xt_mac xt_limit xt_length xt_id xt_hl xt_helper xt_ecn xt_dscp xt_conntrack xt_connmark xt_connlimit xt_connbytes xt_comment xt_TCPMSS xt_REDIRECT xt_LOG xt_HL xt_DSCP xt_CT xt_CLASSIFY usbnet slhc nf_reject_ipv4 nf_nat_redirect nf_nat_masquerade_ipv4 nf_nat nf_log_ipv4 nf_defrag_ipv6 nf_defrag_ipv4 nf_conntrack_rtcache nf_conntrack iptable_raw iptable_mangle iptable_filter ipt_ECN ip_tables crc_ccitt ath9k_hw em_nbyte sch_tbf sch_pie sch_gred sch_htb sch_teql cls_basic act_ipt sch_red sch_prio em_meta em_text sch_codel sch_sfq act_police sch_dsmark em_cmp sch_fq act_skbedit act_mirred em_u32 cls_u32 cls_tcindex cls_flow cls_route cls_fw sch_hfsc sch_ingress ath10k_pci ath10k_core ath mac80211 cfg80211 compat ledt
 rig_usbport ip6t_REJECT nf_reject_ipv6 nf_log_ipv6 nf_log_common ip6table_raw ip6table_mangle ip6table_filter ip6_tables x_tables ifb ehci_platform ehci_hcd gpio_button_hotplug usbcore nls_base usb_common mii
[283232.221696] CPU: 0 PID: 1841 Comm: hostapd Not tainted 4.4.32 #0
[283232.227884] Stack : 803c74e4 00000000 00000001 80420000 87d65b80 8040ed83 803a8bac 00000731
[283232.227884] 	  8048379c 8740e800 00000000 7782fe94 00000000 800a7238 803ae218 80410000
[283232.227884] 	  00000003 8740e800 803ac624 86e1db2c 00000000 800a51b4 01afb952 00000000
[283232.227884] 	  00000001 801f3200 00000000 00000000 00000000 00000000 00000000 00000000
[283232.227884] 	  00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[283232.227884] 	  ...
[283232.264341] Call Trace:
[283232.266934] [<80071b80>] show_stack+0x50/0x84
[283232.271445] [<80081900>] warn_slowpath_common+0xa0/0xd0
[283232.276847] [<800819b8>] warn_slowpath_null+0x18/0x24
[283232.282164] [<875870a4>] sta_set_sinfo+0x92c/0x9e0 [mac80211]
[283232.288224] [<87587188>] __sta_info_destroy+0x30/0x48 [mac80211]
[283232.294519] [<87587238>] sta_info_destroy_addr_bss+0x38/0x60 [mac80211]
[283232.301475] [<874cc144>] cfg80211_check_station_change+0xed8/0x1390 [cfg80211]
[283232.308942] 
[283232.310543] ---[ end trace 1e173b5175dabd85 ]---
[283547.702654] ath10k_pci 0000:01:00.0: failed to install key for vdev 0 peer a0:02:dc:00:00:00: -145
[283547.711846] wlan0: failed to remove key (0, a0:02:dc:00:00:00) from hardware (-145)
[283547.720952] ath10k_pci 0000:01:00.0: cipher 0 is not supported
[283547.727006] ath10k_pci 0000:01:00.0: failed to remove peer wep key 0: -122
[283547.734106] ath10k_pci 0000:01:00.0: failed to clear all peer wep keys for vdev 0: -122
[283547.742313] ath10k_pci 0000:01:00.0: failed to disassociate station: a0:02:dc:00:00:00 vdev 0: -122
[283547.751590] ------------[ cut here ]------------
[283547.756521] WARNING: CPU: 0 PID: 1841 at compat-wireless-2016-10-08/net/mac80211/sta_info.c:956 sta_set_sinfo+0x8d8/0x9e0 [mac80211]()
[283547.768872] Modules linked in: pppoe ppp_async iptable_nat ath9k pppox ppp_generic nf_nat_ipv4 nf_conntrack_ipv6 nf_conntrack_ipv4 ipt_REJECT ipt_MASQUERADE ax88179_178a ath9k_common xt_time xt_tcpudp xt_tcpmss xt_statistic xt_state xt_recent xt_nat xt_multiport xt_mark xt_mac xt_limit xt_length xt_id xt_hl xt_helper xt_ecn xt_dscp xt_conntrack xt_connmark xt_connlimit xt_connbytes xt_comment xt_TCPMSS xt_REDIRECT xt_LOG xt_HL xt_DSCP xt_CT xt_CLASSIFY usbnet slhc nf_reject_ipv4 nf_nat_redirect nf_nat_masquerade_ipv4 nf_nat nf_log_ipv4 nf_defrag_ipv6 nf_defrag_ipv4 nf_conntrack_rtcache nf_conntrack iptable_raw iptable_mangle iptable_filter ipt_ECN ip_tables crc_ccitt ath9k_hw em_nbyte sch_tbf sch_pie sch_gred sch_htb sch_teql cls_basic act_ipt sch_red sch_prio em_meta em_text sch_codel sch_sfq act_police sch_dsmark em_cmp sch_fq act_skbedit act_mirred em_u32 cls_u32 cls_tcindex cls_flow cls_route cls_fw sch_hfsc sch_ingress ath10k_pci ath10k_core ath mac80211 cfg80211 compat ledt
 rig_usbport ip6t_REJECT nf_reject_ipv6 nf_log_ipv6 nf_log_common ip6table_raw ip6table_mangle ip6table_filter ip6_tables x_tables ifb ehci_platform ehci_hcd gpio_button_hotplug usbcore nls_base usb_common mii
[283547.876293] CPU: 0 PID: 1841 Comm: hostapd Tainted: G        W       4.4.32 #0
[283547.883714] Stack : 803c74e4 00000000 00000001 80420000 87d65b80 8040ed83 803a8bac 00000731
[283547.883714] 	  8048379c 8740e800 00000000 7782fe94 00000000 800a7238 803ae218 80410000
[283547.883714] 	  00000003 8740e800 803ac624 86e1db2c 00000000 800a51b4 00000000 00000000
[283547.883714] 	  8040de90 801f3200 00000000 00000000 00000000 00000000 00000000 00000000
[283547.883714] 	  00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[283547.883714] 	  ...
[283547.920171] Call Trace:
[283547.922762] [<80071b80>] show_stack+0x50/0x84
[283547.927274] [<80081900>] warn_slowpath_common+0xa0/0xd0
[283547.932676] [<800819b8>] warn_slowpath_null+0x18/0x24
[283547.937995] [<87587050>] sta_set_sinfo+0x8d8/0x9e0 [mac80211]
[283547.944054] [<87587188>] __sta_info_destroy+0x30/0x48 [mac80211]
[283547.950349] [<87587238>] sta_info_destroy_addr_bss+0x38/0x60 [mac80211]
[283547.957314] [<874cc144>] cfg80211_check_station_change+0xed8/0x1390 [cfg80211]
[283547.964779] 
[283547.966381] ---[ end trace 1e173b5175dabd86 ]---
[283550.962647] ath10k_pci 0000:01:00.0: failed to delete peer a0:02:dc:00:00:00 for vdev 0: -11
[283550.971316] ath10k_pci 0000:01:00.0: found sta peer a0:02:dc:00:00:00 (ptr 86df6400 id 196) entry on vdev 0 after it was supposedly removed
[283553.982619] ath10k_pci 0000:01:00.0: failed to install key for vdev 0 peer 64:bc:0c:00:00:00: -11
[283553.991720] wlan0: failed to remove key (0, 64:bc:0c:00:00:00) from hardware (-11)
[283554.017647] ath10k_pci 0000:01:00.0: cipher 0 is not supported
[283554.023706] ath10k_pci 0000:01:00.0: failed to remove peer wep key 0: -122
[283554.030778] ath10k_pci 0000:01:00.0: failed to clear all peer wep keys for vdev 0: -122
[283554.039005] ath10k_pci 0000:01:00.0: failed to disassociate station: 64:bc:0c:00:00:00 vdev 0: -122
[283557.042589] ath10k_pci 0000:01:00.0: failed to delete peer 64:bc:0c:00:00:00 for vdev 0: -11
[283557.051248] ath10k_pci 0000:01:00.0: found sta peer 64:bc:0c:00:00:00 (ptr 86e31800 id 43) entry on vdev 0 after it was supposedly removed
[283560.062553] ath10k_pci 0000:01:00.0: failed to set beacon mode for vdev 0: -11
[283563.062522] ath10k_pci 0000:01:00.0: failed to set dtim period for vdev 0: -11
[283566.077407] ath10k_pci 0000:01:00.0: failed to recalculate rts/cts prot for vdev 0: -11
[283569.082474] ath10k_pci 0000:01:00.0: failed to set protection mode 0 on vdev 0: -11
[283572.082447] ath10k_pci 0000:01:00.0: failed to set preamble for vdev 0: -11
[283826.570252] ath10k_pci 0000:01:00.0: failed to install key for vdev 0 peer 30:b5:c2:00:00:00: -11
[283826.579348] wlan0: failed to remove key (1, ff:ff:ff:ff:ff:ff) from hardware (-11)
[283829.580227] ath10k_pci 0000:01:00.0: failed to install key for vdev 0 peer 30:b5:c2:00:00:00: -11
[283829.589379] wlan0: failed to set key (1, ff:ff:ff:ff:ff:ff) to hardware (-11)


Mohammed Shafi Shajakhan schrieb am 21.11.2016 13:47:

> Hi Timo,
> 
> sorry had I missed the exact kernel crash call trace ?
> I could see only the warnings, can you please post the call
> trace of the kernel crash please ?
> 
> regards,
> shafi
> 
> On Sun, Nov 20, 2016 at 02:35:27AM +0100, Timo Sigurdsson wrote:
>> Hi Adrian,
>> 
>> sure - here's the bug report on kernel.org:
>> https://bugzilla.kernel.org/show_bug.cgi?id=188201
>> 
>> Regards,
>> 
>> Timo
>> 
>> 
>> Adrian Chadd schrieb am 18.11.2016 22:22:
>> 
>> > hiya!
>> > 
>> > Can you file a kernel.org bug mentioning this?
>> > 
>> > thanks!
>> > 
>> > 
>> > -a
>> > 
>> > 
>> > On 18 November 2016 at 01:30, Timo Sigurdsson
>> > <public_timo.s@silentcreek.de> wrote:
>> >> Hi again,
>> >>
>> >> in the meantime, I have some more information to add to the issue mentioned
>> in
>> >> my email quoted further down below.
>> >>
>> >> Ben Greear approached me off-list and suggested to try the Candela Tech
>> ath10k
>> >> driver and firmware and see if the issue occurs with that as well. So, for
>> the
>> >> last 3 weeks I've been testing the CT driver and firmware and I can happily
>> >> report that the issue with the driver crashing after a while when a Nexus
>> 5X
>> >> device is connected is not occuring with the current BETA 18
>> >> firmware-2-ct-full-community.bin. So, this really seems like a regression
>> in
>> >> the official API level 5 ath10k firmware blobs.
>> >>
>> >> The CT firmware is not perfect either, since it seems to suffer from a
>> >> different
>> >> bug that has been resolved in the official firmwares, and that is that
>> after a
>> >> reboot of my TP-Link Archer C7 v2, the ath10k driver won't load. Only after
>> a
>> >> hard reset or "cold boot" it will come up. That's an issue I had with older
>> >> official firmwares as well, but it has been resolved with the recent API
>> level
>> >> 5 firmwares.
>> >>
>> >> Nevertheless, for the time being, I will stick to the CT firmware because I
>> >> can
>> >> work around the reboot issue and having the 5GHz wifi working for my Nexus
>> 5X
>> >> clients is more important.
>> >>
>> >> Over the next weeks, I will test different combinations of ath10k(-ct)
>> driver
>> >> and firmware to see if there's a combination that resolves all issues. This
>> >> morning I flashed a LEDE build with the official ath10k driver and the CT
>> >> firmware binary.
>> >>
>> >> But of course, if someone has more suggestions on what I could try or what
>> >> information I could collect to help resolve the issue related to the Nexus
>> 5X
>> >> clients in the official firmware binaries, I think that would be beneficial
>> >> for a larger audience.
>> >>
>> >> Regards,
>> >>
>> >> Timo
>> >>
>> >> P.S.: Please include my email address in any reply, since I'm not
>> subscribed
>> >> to the mailing list. Thank you.
>> >>
>> >>
>> >> Timo Sigurdsson schrieb am 29.10.2016 22:19:
>> >>
>> >>> Hi everybody,
>> >>>
>> >>> I have a TP-Link Archer C7 v2 running a fairly recent build of LEDE
>> (r1952,
>> >>> Linux 4.4.26, compat-wireless-2016-10-08). It all works well except for
>> the
>> >>> fact that when I connect a Nexus 5X device to the 5GHz radio, the kernel
>> or
>> >>> ath10k driver will crash after a while. 5Ghz wifi will be dead after that
>> >>> until I reboot the system.
>> >>>
>> >>> This issue has been reported before [1] and it also has been declared as
>> >>> solved with newer firmwares [2] (but reopened by other users). However,
>> even
>> >>> with the latest firmware 10.2.4.70.58 from Kalle Valo's Github repository
>> the
>> >>> issue is far from resolved. I have tried many different firmware revisions
>> >>> over the time (more recently 10.2.4.70.56 and 10.2.4.70.54), and I can
>> could
>> >>> only find that the issue sometimes takes longer to trigger with some
>> >>> firmwares
>> >>> (which might just be random), but it would always occur at some point with
>> >>> API
>> >>> level 5 firmwares. With API level 2 firmwares (which I testesd when I was
>> >>> still using OpenWrt 15.05) I never saw these crashes, but the Nexus 5X had
>> >>> other connectivity issues with these older firmwares that made this
>> >>> combination no fun to use either. But this shows that the firmware itself
>> >>> makes the difference here.
>> >>>
>> >>> I actually have two Nexus 5X on my network (my wife's and my own). I can
>> >>> trigger the crash with either one of them. And if both Nexus 5X are
>> connected
>> >>> to the 5Ghz radio, then the issue triggers much faster (can be as low as
>> 15
>> >>> minutes). My workaround is to let the Nexus 5X devices only connect to the
>> >>> 2.4GHz radio. This way, the device can runs for weeks without any issue or
>> >>> crash, but of course I would prefer the actual bug being fixed rather than
>> to
>> >>> circumvent it.
>> >>>
>> >>> I'm appending a syslog from my access point with a crash happening while
>> one
>> >>> Nexus 5X was connected to the 5GHz radio starting from the time the system
>> >>> booted. I randomized the MAC addresses. but left the first two characters
>> >>> unique so different clients can be distinguished.
>> >>>
>> >>> If there is more info I could collect to help identify the cause of this
>> >>> issue, please let me know (and possibly how to do that as well).
>> >>>
>> >>> Thank you and regards,
>> >>>
>> >>> Timo
>> >>>
>> >>> [1] http://lists.infradead.org/pipermail/ath10k/2015-November/006413.html
>> >>> [2] https://dev.openwrt.org/ticket/20854
>> >>>
>> >>> And here's the log:
>> >>> Fri Oct 28 02:01:35 2016 kern.notice kernel: [    0.000000] Linux version
>> >>> 4.4.26 (user@buildsystem) (gcc version 5.4.0 (LEDE GCC 5.4.0 r1952) ) #0
>> Fri
>> >>> Oct 21 15:52:28 2016
>> >>> [...]
>> >>> Fri Oct 28 02:01:35 2016 kern.info kernel: [    9.468751] Loading modules
>> >>> backported from Linux version wt-2016-10-03-1-g6fcb1a6
>> >>> Fri Oct 28 02:01:35 2016 kern.info kernel: [    9.476481] Backport
>> generated
>> >>> by
>> >>> backports.git backports-20160324-9-g0e38f5c
>> >>> Fri Oct 28 02:01:35 2016 kern.warn kernel: [    9.576570] PCI: Enabling
>> >>> device
>> >>> 0000:01:00.0 (0000 -> 0002)
>> >>> Fri Oct 28 02:01:35 2016 kern.info kernel: [    9.582475] ath10k_pci
>> >>> 0000:01:00.0: pci irq legacy oper_irq_mode 1 irq_mode 0 reset_mode 0
>> >>> Fri Oct 28 02:01:35 2016 kern.warn kernel: [   10.087609] ath10k_pci
>> >>> 0000:01:00.0: Direct firmware load for ath10k/pre-cal-pci-0000:01:00.0.bin
>> >>> failed with error -2
>> >>> Fri Oct 28 02:01:35 2016 kern.warn kernel: [   10.098492] ath10k_pci
>> >>> 0000:01:00.0: Falling back to user helper
>> >>> Fri Oct 28 02:01:35 2016 kern.err kernel: [   10.176500] firmware
>> >>> ath10k!pre-cal-pci-0000:01:00.0.bin: firmware_loading_store: map pages
>> failed
>> >>> Fri Oct 28 02:01:35 2016 kern.info kernel: [   10.677026] ath10k_pci
>> >>> 0000:01:00.0: qca988x hw2.0 target 0x4100016c chip_id 0x043202ff sub
>> >>> 0000:0000
>> >>> Fri Oct 28 02:01:35 2016 kern.info kernel: [   10.686424] ath10k_pci
>> >>> 0000:01:00.0: kconfig debug 0 debugfs 1 tracing 0 dfs 1 testmode 1
>> >>> Fri Oct 28 02:01:35 2016 kern.info kernel: [   10.699498] ath10k_pci
>> >>> 0000:01:00.0: firmware ver 10.2.4.70.58 api 5 features no-p2p,raw-mode,mfp
>> >>> crc32 e1af076f
>> >>> Fri Oct 28 02:01:35 2016 kern.warn kernel: [   10.709932] ath10k_pci
>> >>> 0000:01:00.0: Direct firmware load for ath10k/QCA988X/hw2.0/board-2.bin
>> >>> failed
>> >>> with error -2
>> >>> Fri Oct 28 02:01:35 2016 kern.warn kernel: [   10.720531] ath10k_pci
>> >>> 0000:01:00.0: Falling back to user helper
>> >>> Fri Oct 28 02:01:35 2016 kern.err kernel: [   10.798719] firmware
>> >>> ath10k!QCA988X!hw2.0!board-2.bin: firmware_loading_store: map pages failed
>> >>> Fri Oct 28 02:01:35 2016 kern.info kernel: [   10.823845] ath10k_pci
>> >>> 0000:01:00.0: board_file api 1 bmi_id N/A crc32 bebc7c08
>> >>> Fri Oct 28 02:01:35 2016 kern.info kernel: [   11.954723] ath10k_pci
>> >>> 0000:01:00.0: htt-ver 2.1 wmi-op 5 htt-op 2 cal file max-sta 128 raw 0
>> >>> hwcrypto
>> >>> 1
>> >>> [...]
>> >>> // Evertyhing runs fine for a bit more than a day, but then this happens
>> ...
>> >>> //
>> >>> // Note: The ath10k radio in question is wlan0 //
>> >>> Sat Oct 29 10:38:21 2016 daemon.info hostapd: wlan1: STA 9c:12:34:56:78:9a
>> >>> IEEE
>> >>> 802.11: disassociated
>> >>> Sat Oct 29 10:38:22 2016 daemon.info hostapd: wlan1: STA 9c:12:34:56:78:9a
>> >>> IEEE
>> >>> 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
>> >>> Sat Oct 29 10:42:57 2016 daemon.info hostapd: wlan1: STA 00:12:34:56:78:9a
>> >>> WPA:
>> >>> group key handshake completed (RSN)
>> >>> Sat Oct 29 10:42:57 2016 daemon.info hostapd: wlan0: STA a0:12:34:56:78:9a
>> >>> WPA:
>> >>> group key handshake completed (RSN)
>> >>> Sat Oct 29 10:42:57 2016 daemon.info hostapd: wlan0: STA 70:12:34:56:78:9a
>> >>> WPA:
>> >>> group key handshake completed (RSN)
>> >>> Sat Oct 29 10:43:05 2016 kern.warn kernel: [117635.147861] ath10k_pci
>> >>> 0000:01:00.0: failed to delete peer 7f:12:34:56:78:9a for vdev 0: -145
>> >>> Sat Oct 29 10:43:05 2016 kern.warn kernel: [117635.156679] ath10k_pci
>> >>> 0000:01:00.0: found sta peer 7f:12:34:56:78:9a (ptr 86ebf200 id 62) entry
>> on
>> >>> vdev 0 after it was supposedly removed
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.169489] ------------[
>> cut
>> >>> here ]------------
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.174314] WARNING: CPU: 0
>> >>> PID:
>> >>> 1885 at compat-wireless-2016-10-08/net/mac80211/sta_info.c:964 0x875870a4
>> >>> [mac80211@87580000+0x5f500]()
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.186854] Modules linked
>> in:
>> >>> pppoe ppp_async iptable_nat ath9k pppox ppp_generic nf_nat_ipv4
>> >>> nf_conntrack_ipv6 nf_conntrack_ipv4 ipt_REJECT ipt_MASQUERADE ax88179_178a
>> >>> ath9k_common xt_time xt_tcpudp xt_tcpmss xt_statistic xt_state xt_recent
>> >>> xt_nat
>> >>> xt_multiport xt_mark xt_mac xt_limit xt_length xt_id xt_hl xt_helper
>> xt_ecn
>> >>> xt_dscp xt_conntrack xt_connmark xt_connlimit xt_connbytes xt_comment
>> >>> xt_TCPMSS
>> >>> xt_REDIRECT xt_LOG xt_HL xt_DSCP xt_CT xt_CLASSIFY usbnet Sat Oct 29
>> 10:43:06
>> >>> 2016 kern.warn kernel: [117635.294282] CPU: 0 PID: 1885 Comm: hostapd Not
>> >>> tainted 4.4.26 #0
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.300471] Stack :
>> 8036cff4
>> >>> 00000000 00000001 803c0000 00000000 00000000 00000000 00000000
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.300471]      00000000
>> >>> 00000000
>> >>> 00000000 00000000 00000000 00000000 00000000 00000000
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.300471]      00000000
>> >>> 00000000
>> >>> 00000000 00000000 00000000 00000000 00000000 00000000
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.300471]      00000000
>> >>> 00000000
>> >>> 00000000 00000000 00000000 00000000 00000000 00000000
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.300471]      00000000
>> >>> 00000000
>> >>> 00000000 00000000 00000000 00000000 00000000 00000000
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.300471]      ...
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.336918] Call
>> >>> Trace:[<800716f0>] 0x800716f0
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.341551] [<800716f0>]
>> >>> 0x800716f0
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.345176] [<8008144c>]
>> >>> 0x8008144c
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.348832] [<875870a4>]
>> >>> 0x875870a4 [mac80211@87580000+0x5f500]
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.354943] [<80081504>]
>> >>> 0x80081504
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.358611] [<875870a4>]
>> >>> 0x875870a4 [mac80211@87580000+0x5f500]
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.364742] [<87587188>]
>> >>> 0x87587188 [mac80211@87580000+0x5f500]
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.370861] [<875849b4>]
>> >>> 0x875849b4 [mac80211@87580000+0x5f500]
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.376951] [<80115770>]
>> >>> 0x80115770
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.380613] [<87587238>]
>> >>> 0x87587238 [mac80211@87580000+0x5f500]
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.386727] [<874cc114>]
>> >>> 0x874cc114 [cfg80211@874c0000+0x35b60]
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.392854] [<80293074>]
>> >>> 0x80293074
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.396485] [<80291900>]
>> >>> 0x80291900
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.400176] [<80292df8>]
>> >>> 0x80292df8
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.403801] [<80292238>]
>> >>> 0x80292238
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.407439] [<80292de0>]
>> >>> 0x80292de0
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.411079] [<80257794>]
>> >>> 0x80257794
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.414711] [<80291aa0>]
>> >>> 0x80291aa0
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.418345] [<80256c90>]
>> >>> 0x80256c90
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.421991] [<80292004>]
>> >>> 0x80292004
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.425616] [<801b5304>]
>> >>> 0x801b5304
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.429260] [<8025b478>]
>> >>> 0x8025b478
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.432902] [<8024d0e4>]
>> >>> 0x8024d0e4
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.436540] [<8024e4f8>]
>> >>> 0x8024e4f8
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.440195] [<801b5304>]
>> >>> 0x801b5304
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.443835] [<8027e338>]
>> >>> 0x8027e338
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.447464] [<802e8244>]
>> >>> 0x802e8244
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.451136] [<8011aa58>]
>> >>> 0x8011aa58
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.454762] [<8011ae3c>]
>> >>> 0x8011ae3c
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.458402] [<8011acd4>]
>> >>> 0x8011acd4
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.462057] [<80117a10>]
>> >>> 0x80117a10
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.465700] [<8024f424>]
>> >>> 0x8024f424
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.469344] [<800b1dd0>]
>> >>> 0x800b1dd0
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.472986] [<8006295c>]
>> >>> 0x8006295c
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.476615]
>> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.478223] ---[ end trace
>> >>> 2c07f06df2595aa5 ]---
>> >>> Sat Oct 29 10:43:06 2016 daemon.info hostapd: wlan0: STA 7f:12:34:56:78:9a
>> >>> IEEE
>> >>> 802.11: deauthenticated due to local deauth request
>> >>> Sat Oct 29 10:43:15 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a
>> >>> IEEE
>> >>> 802.11: authenticated
>> >>> Sat Oct 29 10:43:15 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a
>> >>> IEEE
>> >>> 802.11: associated (aid 2)
>> >>> Sat Oct 29 10:43:15 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a
>> >>> RADIUS: starting accounting session D1227001A194DA09
>> >>> Sat Oct 29 10:43:15 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a
>> >>> WPA:
>> >>> pairwise key handshake completed (RSN)
>> >>> Sat Oct 29 10:43:31 2016 daemon.info hostapd: wlan1: STA a0:12:34:56:78:9a
>> >>> IEEE
>> >>> 802.11: authenticated
>> >>> Sat Oct 29 10:43:31 2016 daemon.info hostapd: wlan1: STA a0:12:34:56:78:9a
>> >>> IEEE
>> >>> 802.11: associated (aid 3)
>> >>> Sat Oct 29 10:43:31 2016 daemon.info hostapd: wlan1: STA a0:12:34:56:78:9a
>> >>> RADIUS: starting accounting session 92084E55AFE512B3
>> >>> Sat Oct 29 10:43:31 2016 daemon.info hostapd: wlan1: STA a0:12:34:56:78:9a
>> >>> WPA:
>> >>> pairwise key handshake completed (RSN)
>> >>> Sat Oct 29 10:48:02 2016 daemon.info hostapd: wlan0: STA a0:12:34:56:78:9a
>> >>> IEEE
>> >>> 802.11: disassociated due to inactivity
>> >>> Sat Oct 29 10:48:05 2016 kern.warn kernel: [117935.165013] ath10k_pci
>> >>> 0000:01:00.0: failed to install key for vdev 0 peer a0:12:34:56:78:9a:
>> -145
>> >>> Sat Oct 29 10:48:05 2016 kern.err kernel: [117935.174193] wlan0: failed to
>> >>> remove key (0, a0:12:34:56:78:9a) from hardware (-145)
>> >>> Sat Oct 29 10:48:05 2016 daemon.info hostapd: wlan0: STA 70:12:34:56:78:9a
>> >>> IEEE
>> >>> 802.11: disassociated due to inactivity
>> >>> Sat Oct 29 10:48:08 2016 kern.warn kernel: [117938.174996] ath10k_pci
>> >>> 0000:01:00.0: failed to install key for vdev 0 peer 70:12:34:56:78:9a: -11
>> >>> Sat Oct 29 10:48:08 2016 kern.err kernel: [117938.184092] wlan0: failed to
>> >>> remove key (0, 70:12:34:56:78:9a) from hardware (-11)
>> >>> Sat Oct 29 10:48:08 2016 daemon.info hostapd: wlan0: STA a0:12:34:56:78:9a
>> >>> IEEE
>> >>> 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.193251] ath10k_pci
>> >>> 0000:01:00.0: cipher 0 is not supported
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.199320] ath10k_pci
>> >>> 0000:01:00.0: failed to remove peer wep key 0: -122
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.206409] ath10k_pci
>> >>> 0000:01:00.0: failed to clear all peer wep keys for vdev 0: -122
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.214621] ath10k_pci
>> >>> 0000:01:00.0: failed to disassociate station: a0:12:34:56:78:9a vdev 0:
>> -122
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.223892] ------------[
>> cut
>> >>> here ]------------
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.228706] WARNING: CPU: 0
>> >>> PID:
>> >>> 1885 at compat-wireless-2016-10-08/net/mac80211/sta_info.c:956 0x87587050
>> >>> [mac80211@87580000+0x5f500]()
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.241226] Modules linked
>> in:
>> >>> pppoe ppp_async iptable_nat ath9k pppox ppp_generic nf_nat_ipv4
>> >>> nf_conntrack_ipv6 nf_conntrack_ipv4 ipt_REJECT ipt_MASQUERADE ax88179_178a
>> >>> ath9k_common xt_time xt_tcpudp xt_tcpmss xt_statistic xt_state xt_recent
>> >>> xt_nat
>> >>> xt_multiport xt_mark xt_mac xt_limit xt_length xt_id xt_hl xt_helper
>> xt_ecn
>> >>> xt_dscp xt_conntrack xt_connmark xt_connlimit xt_connbytes xt_comment
>> >>> xt_TCPMSS
>> >>> xt_REDIRECT xt_LOG xt_HL xt_DSCP xt_CT xt_CLASSIFY usbnet Sat Oct 29
>> 10:48:09
>> >>> 2016 kern.warn kernel: [117938.348645] CPU: 0 PID: 1885 Comm: hostapd
>> >>> Tainted:
>> >>> G        W       4.4.26 #0
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.356067] Stack :
>> 8036cff4
>> >>> 00000000 00000001 803c0000 00000000 00000000 00000000 00000000
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.356067]      00000000
>> >>> 00000000
>> >>> 00000000 00000000 00000000 00000000 00000000 00000000
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.356067]      00000000
>> >>> 00000000
>> >>> 00000000 00000000 00000000 00000000 00000000 00000000
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.356067]      00000000
>> >>> 00000000
>> >>> 00000000 00000000 00000000 00000000 00000000 00000000
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.356067]      00000000
>> >>> 00000000
>> >>> 00000000 00000000 00000000 00000000 00000000 00000000
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.356067]      ...
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.392511] Call
>> >>> Trace:[<800716f0>] 0x800716f0
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.397147] [<800716f0>]
>> >>> 0x800716f0
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.400770] [<8008144c>]
>> >>> 0x8008144c
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.404414] [<87587050>]
>> >>> 0x87587050 [mac80211@87580000+0x5f500]
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.410531] [<80081504>]
>> >>> 0x80081504
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.414184] [<87587050>]
>> >>> 0x87587050 [mac80211@87580000+0x5f500]
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.420297] [<8759cb40>]
>> >>> 0x8759cb40 [mac80211@87580000+0x5f500]
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.426431] [<87587188>]
>> >>> 0x87587188 [mac80211@87580000+0x5f500]
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.432531] [<875849b4>]
>> >>> 0x875849b4 [mac80211@87580000+0x5f500]
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.438629] [<801018e4>]
>> >>> 0x801018e4
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.442276] [<87587238>]
>> >>> 0x87587238 [mac80211@87580000+0x5f500]
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.448406] [<874cc114>]
>> >>> 0x874cc114 [cfg80211@874c0000+0x35b60]
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.454516] [<80293074>]
>> >>> 0x80293074
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.458147] [<80291900>]
>> >>> 0x80291900
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.461822] [<80292df8>]
>> >>> 0x80292df8
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.465461] [<80292238>]
>> >>> 0x80292238
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.469092] [<800a15d0>]
>> >>> 0x800a15d0
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.472726] [<80292de0>]
>> >>> 0x80292de0
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.476371] [<80257794>]
>> >>> 0x80257794
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.480002] [<80291aa0>]
>> >>> 0x80291aa0
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.483630] [<80256c90>]
>> >>> 0x80256c90
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.487280] [<80292004>]
>> >>> 0x80292004
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.490908] [<801b5304>]
>> >>> 0x801b5304
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.494541] [<8025b478>]
>> >>> 0x8025b478
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.498198] [<8024d0e4>]
>> >>> 0x8024d0e4
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.501840] [<8024e4f8>]
>> >>> 0x8024e4f8
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.505492] [<8027e338>]
>> >>> 0x8027e338
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.509121] [<802e8244>]
>> >>> 0x802e8244
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.512780] [<8011aa58>]
>> >>> 0x8011aa58
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.516413] [<8011ae3c>]
>> >>> 0x8011ae3c
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.520043] [<8011acd4>]
>> >>> 0x8011acd4
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.523697] [<80117a10>]
>> >>> 0x80117a10
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.527352] [<8024f424>]
>> >>> 0x8024f424
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.530981] [<801059e8>]
>> >>> 0x801059e8
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.534625] [<8006295c>]
>> >>> 0x8006295c
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.538265]
>> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.539870] ---[ end trace
>> >>> 2c07f06df2595aa6 ]---
>> >>> Sat Oct 29 10:48:12 2016 kern.warn kernel: [117941.534956] ath10k_pci
>> >>> 0000:01:00.0: failed to delete peer a0:12:34:56:78:9a for vdev 0: -11
>> >>> Sat Oct 29 10:48:12 2016 kern.warn kernel: [117941.543716] ath10k_pci
>> >>> 0000:01:00.0: found sta peer a0:12:34:56:78:9a (ptr 86ebf400 id 196) entry
>> on
>> >>> vdev 0 after it was supposedly removed
>> >>> Sat Oct 29 10:48:12 2016 daemon.info hostapd: wlan0: STA 70:12:34:56:78:9a
>> >>> IEEE
>> >>> 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
>> >>> Sat Oct 29 10:48:12 2016 kern.warn kernel: [117941.558962] ath10k_pci
>> >>> 0000:01:00.0: cipher 0 is not supported
>> >>> Sat Oct 29 10:48:12 2016 kern.warn kernel: [117941.565049] ath10k_pci
>> >>> 0000:01:00.0: failed to remove peer wep key 0: -122
>> >>> Sat Oct 29 10:48:15 2016 kern.warn kernel: [117944.564917] ath10k_warn: 2
>> >>> callbacks suppressed
>> >>> Sat Oct 29 10:48:15 2016 kern.warn kernel: [117944.569617] ath10k_pci
>> >>> 0000:01:00.0: failed to delete peer 70:12:34:56:78:9a for vdev 0: -11
>> >>> Sat Oct 29 10:48:15 2016 kern.warn kernel: [117944.578309] ath10k_pci
>> >>> 0000:01:00.0: found sta peer 70:12:34:56:78:9a (ptr 86320c00 id 251) entry
>> on
>> >>> vdev 0 after it was supposedly removed
>> >>> Sat Oct 29 10:48:18 2016 kern.warn kernel: [117947.584908] ath10k_pci
>> >>> 0000:01:00.0: failed to set beacon mode for vdev 0: -11
>> >>> Sat Oct 29 10:48:21 2016 kern.warn kernel: [117950.584876] ath10k_pci
>> >>> 0000:01:00.0: failed to set dtim period for vdev 0: -11
>> >>> Sat Oct 29 10:48:24 2016 kern.warn kernel: [117953.594843] ath10k_pci
>> >>> 0000:01:00.0: failed to recalculate rts/cts prot for vdev 0: -11
>> >>> Sat Oct 29 10:48:27 2016 kern.warn kernel: [117956.594833] ath10k_pci
>> >>> 0000:01:00.0: failed to set protection mode 0 on vdev 0: -11
>> >>> Sat Oct 29 10:48:30 2016 kern.warn kernel: [117959.594805] ath10k_pci
>> >>> 0000:01:00.0: failed to set preamble for vdev 0: -11
>> >>> Sat Oct 29 10:52:57 2016 daemon.info hostapd: wlan1: STA 00:12:34:56:78:9a
>> >>> WPA:
>> >>> group key handshake completed (RSN)
>> >>> Sat Oct 29 10:52:57 2016 daemon.info hostapd: wlan1: STA a0:12:34:56:78:9a
>> >>> WPA:
>> >>> group key handshake completed (RSN)
>> >>> Sat Oct 29 10:53:00 2016 kern.warn kernel: [118229.632250] ath10k_pci
>> >>> 0000:01:00.0: failed to install key for vdev 0 peer 30:12:34:56:78:9a: -11
>> >>> Sat Oct 29 10:53:00 2016 kern.err kernel: [118229.641421] wlan0: failed to
>> >>> remove key (2, ff:ff:ff:ff:ff:ff) from hardware (-11)
>> >>> Sat Oct 29 10:53:03 2016 kern.warn kernel: [118232.642204] ath10k_pci
>> >>> 0000:01:00.0: failed to install key for vdev 0 peer 30:12:34:56:78:9a: -11
>> >>> Sat Oct 29 10:53:03 2016 kern.err kernel: [118232.651309] wlan0: failed to
>> >>> set
>> >>> key (2, ff:ff:ff:ff:ff:ff) to hardware (-11)
>> >>> Sat Oct 29 10:53:08 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a
>> >>> IEEE
>> >>> 802.11: deauthenticated due to local deauth request
>> >>> Sat Oct 29 10:53:11 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a
>> >>> IEEE
>> >>> 802.11: authenticated
>> >>> Sat Oct 29 10:53:11 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a
>> >>> IEEE
>> >>> 802.11: associated (aid 2)
>> >>> Sat Oct 29 10:53:11 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a
>> >>> RADIUS: starting accounting session 56977F3FD253EA9C
>> >>> Sat Oct 29 10:53:11 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a
>> >>> WPA:
>> >>> pairwise key handshake completed (RSN)
>> >>>
>> >>
>> >>
>> >> _______________________________________________
>> >> ath10k mailing list
>> >> ath10k@lists.infradead.org
>> >> http://lists.infradead.org/mailman/listinfo/ath10k
>> > 
>> 
>> 
>> _______________________________________________
>> ath10k mailing list
>> ath10k@lists.infradead.org
>> http://lists.infradead.org/mailman/listinfo/ath10k
> 


_______________________________________________
ath10k mailing list
ath10k@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/ath10k

^ permalink raw reply	[flat|nested] 7+ messages in thread

* [BUG] Kernel crashes with ath10k radio and Nexus 5X clients
@ 2016-10-29 20:19 Timo Sigurdsson
  0 siblings, 0 replies; 7+ messages in thread
From: Timo Sigurdsson @ 2016-10-29 20:19 UTC (permalink / raw)
  To: ath10k; +Cc: lede-dev

Hi everybody,

I have a TP-Link Archer C7 v2 running a fairly recent build of LEDE (r1952, 
Linux 4.4.26, compat-wireless-2016-10-08). It all works well except for the
fact that when I connect a Nexus 5X device to the 5GHz radio, the kernel or
ath10k driver will crash after a while. 5Ghz wifi will be dead after that
until I reboot the system.

This issue has been reported before [1] and it also has been declared as
solved with newer firmwares [2] (but reopened by other users). However, even
with the latest firmware 10.2.4.70.58 from Kalle Valo's Github repository the
issue is far from resolved. I have tried many different firmware revisions
over the time (more recently 10.2.4.70.56 and 10.2.4.70.54), and I can could
only find that the issue sometimes takes longer to trigger with some firmwares
(which might just be random), but it would always occur at some point with API
level 5 firmwares. With API level 2 firmwares (which I testesd when I was
still using OpenWrt 15.05) I never saw these crashes, but the Nexus 5X had
other connectivity issues with these older firmwares that made this
combination no fun to use either. But this shows that the firmware itself
makes the difference here.

I actually have two Nexus 5X on my network (my wife's and my own). I can
trigger the crash with either one of them. And if both Nexus 5X are connected
to the 5Ghz radio, then the issue triggers much faster (can be as low as 15
minutes). My workaround is to let the Nexus 5X devices only connect to the
2.4GHz radio. This way, the device can runs for weeks without any issue or
crash, but of course I would prefer the actual bug being fixed rather than to
circumvent it.

I'm appending a syslog from my access point with a crash happening while one
Nexus 5X was connected to the 5GHz radio starting from the time the system
booted. I randomized the MAC addresses. but left the first two characters
unique so different clients can be distinguished.

If there is more info I could collect to help identify the cause of this
issue, please let me know (and possibly how to do that as well).

Thank you and regards,

Timo

[1] http://lists.infradead.org/pipermail/ath10k/2015-November/006413.html
[2] https://dev.openwrt.org/ticket/20854

And here's the log:
Fri Oct 28 02:01:35 2016 kern.notice kernel: [    0.000000] Linux version 4.4.26 (user@buildsystem) (gcc version 5.4.0 (LEDE GCC 5.4.0 r1952) ) #0 Fri Oct 21 15:52:28 2016
[...]
Fri Oct 28 02:01:35 2016 kern.info kernel: [    9.468751] Loading modules backported from Linux version wt-2016-10-03-1-g6fcb1a6
Fri Oct 28 02:01:35 2016 kern.info kernel: [    9.476481] Backport generated by backports.git backports-20160324-9-g0e38f5c
Fri Oct 28 02:01:35 2016 kern.warn kernel: [    9.576570] PCI: Enabling device 0000:01:00.0 (0000 -> 0002)
Fri Oct 28 02:01:35 2016 kern.info kernel: [    9.582475] ath10k_pci 0000:01:00.0: pci irq legacy oper_irq_mode 1 irq_mode 0 reset_mode 0
Fri Oct 28 02:01:35 2016 kern.warn kernel: [   10.087609] ath10k_pci 0000:01:00.0: Direct firmware load for ath10k/pre-cal-pci-0000:01:00.0.bin failed with error -2
Fri Oct 28 02:01:35 2016 kern.warn kernel: [   10.098492] ath10k_pci 0000:01:00.0: Falling back to user helper
Fri Oct 28 02:01:35 2016 kern.err kernel: [   10.176500] firmware ath10k!pre-cal-pci-0000:01:00.0.bin: firmware_loading_store: map pages failed
Fri Oct 28 02:01:35 2016 kern.info kernel: [   10.677026] ath10k_pci 0000:01:00.0: qca988x hw2.0 target 0x4100016c chip_id 0x043202ff sub 0000:0000
Fri Oct 28 02:01:35 2016 kern.info kernel: [   10.686424] ath10k_pci 0000:01:00.0: kconfig debug 0 debugfs 1 tracing 0 dfs 1 testmode 1
Fri Oct 28 02:01:35 2016 kern.info kernel: [   10.699498] ath10k_pci 0000:01:00.0: firmware ver 10.2.4.70.58 api 5 features no-p2p,raw-mode,mfp crc32 e1af076f
Fri Oct 28 02:01:35 2016 kern.warn kernel: [   10.709932] ath10k_pci 0000:01:00.0: Direct firmware load for ath10k/QCA988X/hw2.0/board-2.bin failed with error -2
Fri Oct 28 02:01:35 2016 kern.warn kernel: [   10.720531] ath10k_pci 0000:01:00.0: Falling back to user helper
Fri Oct 28 02:01:35 2016 kern.err kernel: [   10.798719] firmware ath10k!QCA988X!hw2.0!board-2.bin: firmware_loading_store: map pages failed
Fri Oct 28 02:01:35 2016 kern.info kernel: [   10.823845] ath10k_pci 0000:01:00.0: board_file api 1 bmi_id N/A crc32 bebc7c08
Fri Oct 28 02:01:35 2016 kern.info kernel: [   11.954723] ath10k_pci 0000:01:00.0: htt-ver 2.1 wmi-op 5 htt-op 2 cal file max-sta 128 raw 0 hwcrypto 1
[...]
// Evertyhing runs fine for a bit more than a day, but then this happens ... //
// Note: The ath10k radio in question is wlan0 //
Sat Oct 29 10:38:21 2016 daemon.info hostapd: wlan1: STA 9c:12:34:56:78:9a IEEE 802.11: disassociated
Sat Oct 29 10:38:22 2016 daemon.info hostapd: wlan1: STA 9c:12:34:56:78:9a IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Sat Oct 29 10:42:57 2016 daemon.info hostapd: wlan1: STA 00:12:34:56:78:9a WPA: group key handshake completed (RSN)
Sat Oct 29 10:42:57 2016 daemon.info hostapd: wlan0: STA a0:12:34:56:78:9a WPA: group key handshake completed (RSN)
Sat Oct 29 10:42:57 2016 daemon.info hostapd: wlan0: STA 70:12:34:56:78:9a WPA: group key handshake completed (RSN)
Sat Oct 29 10:43:05 2016 kern.warn kernel: [117635.147861] ath10k_pci 0000:01:00.0: failed to delete peer 7f:12:34:56:78:9a for vdev 0: -145
Sat Oct 29 10:43:05 2016 kern.warn kernel: [117635.156679] ath10k_pci 0000:01:00.0: found sta peer 7f:12:34:56:78:9a (ptr 86ebf200 id 62) entry on vdev 0 after it was supposedly removed
Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.169489] ------------[ cut here ]------------
Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.174314] WARNING: CPU: 0 PID: 1885 at compat-wireless-2016-10-08/net/mac80211/sta_info.c:964 0x875870a4 [mac80211@87580000+0x5f500]()
Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.186854] Modules linked in: pppoe ppp_async iptable_nat ath9k pppox ppp_generic nf_nat_ipv4 nf_conntrack_ipv6 nf_conntrack_ipv4 ipt_REJECT ipt_MASQUERADE ax88179_178a ath9k_common xt_time xt_tcpudp xt_tcpmss xt_statistic xt_state xt_recent xt_nat xt_multiport xt_mark xt_mac xt_limit xt_length xt_id xt_hl xt_helper xt_ecn xt_dscp xt_conntrack xt_connmark xt_connlimit xt_connbytes xt_comment xt_TCPMSS xt_REDIRECT xt_LOG xt_HL xt_DSCP xt_CT xt_CLASSIFY usbnet Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.294282] CPU: 0 PID: 1885 Comm: hostapd Not tainted 4.4.26 #0
Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.300471] Stack : 8036cff4 00000000 00000001 803c0000 00000000 00000000 00000000 00000000
Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.300471] 	  00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.300471] 	  00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.300471] 	  00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.300471] 	  00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.300471] 	  ...
Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.336918] Call Trace:[<800716f0>] 0x800716f0
Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.341551] [<800716f0>] 0x800716f0
Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.345176] [<8008144c>] 0x8008144c
Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.348832] [<875870a4>] 0x875870a4 [mac80211@87580000+0x5f500]
Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.354943] [<80081504>] 0x80081504
Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.358611] [<875870a4>] 0x875870a4 [mac80211@87580000+0x5f500]
Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.364742] [<87587188>] 0x87587188 [mac80211@87580000+0x5f500]
Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.370861] [<875849b4>] 0x875849b4 [mac80211@87580000+0x5f500]
Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.376951] [<80115770>] 0x80115770
Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.380613] [<87587238>] 0x87587238 [mac80211@87580000+0x5f500]
Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.386727] [<874cc114>] 0x874cc114 [cfg80211@874c0000+0x35b60]
Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.392854] [<80293074>] 0x80293074
Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.396485] [<80291900>] 0x80291900
Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.400176] [<80292df8>] 0x80292df8
Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.403801] [<80292238>] 0x80292238
Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.407439] [<80292de0>] 0x80292de0
Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.411079] [<80257794>] 0x80257794
Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.414711] [<80291aa0>] 0x80291aa0
Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.418345] [<80256c90>] 0x80256c90
Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.421991] [<80292004>] 0x80292004
Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.425616] [<801b5304>] 0x801b5304
Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.429260] [<8025b478>] 0x8025b478
Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.432902] [<8024d0e4>] 0x8024d0e4
Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.436540] [<8024e4f8>] 0x8024e4f8
Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.440195] [<801b5304>] 0x801b5304
Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.443835] [<8027e338>] 0x8027e338
Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.447464] [<802e8244>] 0x802e8244
Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.451136] [<8011aa58>] 0x8011aa58
Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.454762] [<8011ae3c>] 0x8011ae3c
Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.458402] [<8011acd4>] 0x8011acd4
Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.462057] [<80117a10>] 0x80117a10
Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.465700] [<8024f424>] 0x8024f424
Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.469344] [<800b1dd0>] 0x800b1dd0
Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.472986] [<8006295c>] 0x8006295c
Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.476615] 
Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.478223] ---[ end trace 2c07f06df2595aa5 ]---
Sat Oct 29 10:43:06 2016 daemon.info hostapd: wlan0: STA 7f:12:34:56:78:9a IEEE 802.11: deauthenticated due to local deauth request
Sat Oct 29 10:43:15 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a IEEE 802.11: authenticated
Sat Oct 29 10:43:15 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a IEEE 802.11: associated (aid 2)
Sat Oct 29 10:43:15 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a RADIUS: starting accounting session D1227001A194DA09
Sat Oct 29 10:43:15 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a WPA: pairwise key handshake completed (RSN)
Sat Oct 29 10:43:31 2016 daemon.info hostapd: wlan1: STA a0:12:34:56:78:9a IEEE 802.11: authenticated
Sat Oct 29 10:43:31 2016 daemon.info hostapd: wlan1: STA a0:12:34:56:78:9a IEEE 802.11: associated (aid 3)
Sat Oct 29 10:43:31 2016 daemon.info hostapd: wlan1: STA a0:12:34:56:78:9a RADIUS: starting accounting session 92084E55AFE512B3
Sat Oct 29 10:43:31 2016 daemon.info hostapd: wlan1: STA a0:12:34:56:78:9a WPA: pairwise key handshake completed (RSN)
Sat Oct 29 10:48:02 2016 daemon.info hostapd: wlan0: STA a0:12:34:56:78:9a IEEE 802.11: disassociated due to inactivity
Sat Oct 29 10:48:05 2016 kern.warn kernel: [117935.165013] ath10k_pci 0000:01:00.0: failed to install key for vdev 0 peer a0:12:34:56:78:9a: -145
Sat Oct 29 10:48:05 2016 kern.err kernel: [117935.174193] wlan0: failed to remove key (0, a0:12:34:56:78:9a) from hardware (-145)
Sat Oct 29 10:48:05 2016 daemon.info hostapd: wlan0: STA 70:12:34:56:78:9a IEEE 802.11: disassociated due to inactivity
Sat Oct 29 10:48:08 2016 kern.warn kernel: [117938.174996] ath10k_pci 0000:01:00.0: failed to install key for vdev 0 peer 70:12:34:56:78:9a: -11
Sat Oct 29 10:48:08 2016 kern.err kernel: [117938.184092] wlan0: failed to remove key (0, 70:12:34:56:78:9a) from hardware (-11)
Sat Oct 29 10:48:08 2016 daemon.info hostapd: wlan0: STA a0:12:34:56:78:9a IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.193251] ath10k_pci 0000:01:00.0: cipher 0 is not supported
Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.199320] ath10k_pci 0000:01:00.0: failed to remove peer wep key 0: -122
Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.206409] ath10k_pci 0000:01:00.0: failed to clear all peer wep keys for vdev 0: -122
Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.214621] ath10k_pci 0000:01:00.0: failed to disassociate station: a0:12:34:56:78:9a vdev 0: -122
Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.223892] ------------[ cut here ]------------
Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.228706] WARNING: CPU: 0 PID: 1885 at compat-wireless-2016-10-08/net/mac80211/sta_info.c:956 0x87587050 [mac80211@87580000+0x5f500]()
Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.241226] Modules linked in: pppoe ppp_async iptable_nat ath9k pppox ppp_generic nf_nat_ipv4 nf_conntrack_ipv6 nf_conntrack_ipv4 ipt_REJECT ipt_MASQUERADE ax88179_178a ath9k_common xt_time xt_tcpudp xt_tcpmss xt_statistic xt_state xt_recent xt_nat xt_multiport xt_mark xt_mac xt_limit xt_length xt_id xt_hl xt_helper xt_ecn xt_dscp xt_conntrack xt_connmark xt_connlimit xt_connbytes xt_comment xt_TCPMSS xt_REDIRECT xt_LOG xt_HL xt_DSCP xt_CT xt_CLASSIFY usbnet Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.348645] CPU: 0 PID: 1885 Comm: hostapd Tainted: G        W       4.4.26 #0
Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.356067] Stack : 8036cff4 00000000 00000001 803c0000 00000000 00000000 00000000 00000000
Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.356067] 	  00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.356067] 	  00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.356067] 	  00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.356067] 	  00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.356067] 	  ...
Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.392511] Call Trace:[<800716f0>] 0x800716f0
Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.397147] [<800716f0>] 0x800716f0
Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.400770] [<8008144c>] 0x8008144c
Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.404414] [<87587050>] 0x87587050 [mac80211@87580000+0x5f500]
Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.410531] [<80081504>] 0x80081504
Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.414184] [<87587050>] 0x87587050 [mac80211@87580000+0x5f500]
Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.420297] [<8759cb40>] 0x8759cb40 [mac80211@87580000+0x5f500]
Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.426431] [<87587188>] 0x87587188 [mac80211@87580000+0x5f500]
Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.432531] [<875849b4>] 0x875849b4 [mac80211@87580000+0x5f500]
Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.438629] [<801018e4>] 0x801018e4
Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.442276] [<87587238>] 0x87587238 [mac80211@87580000+0x5f500]
Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.448406] [<874cc114>] 0x874cc114 [cfg80211@874c0000+0x35b60]
Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.454516] [<80293074>] 0x80293074
Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.458147] [<80291900>] 0x80291900
Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.461822] [<80292df8>] 0x80292df8
Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.465461] [<80292238>] 0x80292238
Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.469092] [<800a15d0>] 0x800a15d0
Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.472726] [<80292de0>] 0x80292de0
Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.476371] [<80257794>] 0x80257794
Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.480002] [<80291aa0>] 0x80291aa0
Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.483630] [<80256c90>] 0x80256c90
Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.487280] [<80292004>] 0x80292004
Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.490908] [<801b5304>] 0x801b5304
Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.494541] [<8025b478>] 0x8025b478
Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.498198] [<8024d0e4>] 0x8024d0e4
Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.501840] [<8024e4f8>] 0x8024e4f8
Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.505492] [<8027e338>] 0x8027e338
Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.509121] [<802e8244>] 0x802e8244
Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.512780] [<8011aa58>] 0x8011aa58
Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.516413] [<8011ae3c>] 0x8011ae3c
Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.520043] [<8011acd4>] 0x8011acd4
Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.523697] [<80117a10>] 0x80117a10
Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.527352] [<8024f424>] 0x8024f424
Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.530981] [<801059e8>] 0x801059e8
Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.534625] [<8006295c>] 0x8006295c
Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.538265] 
Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.539870] ---[ end trace 2c07f06df2595aa6 ]---
Sat Oct 29 10:48:12 2016 kern.warn kernel: [117941.534956] ath10k_pci 0000:01:00.0: failed to delete peer a0:12:34:56:78:9a for vdev 0: -11
Sat Oct 29 10:48:12 2016 kern.warn kernel: [117941.543716] ath10k_pci 0000:01:00.0: found sta peer a0:12:34:56:78:9a (ptr 86ebf400 id 196) entry on vdev 0 after it was supposedly removed
Sat Oct 29 10:48:12 2016 daemon.info hostapd: wlan0: STA 70:12:34:56:78:9a IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Sat Oct 29 10:48:12 2016 kern.warn kernel: [117941.558962] ath10k_pci 0000:01:00.0: cipher 0 is not supported
Sat Oct 29 10:48:12 2016 kern.warn kernel: [117941.565049] ath10k_pci 0000:01:00.0: failed to remove peer wep key 0: -122
Sat Oct 29 10:48:15 2016 kern.warn kernel: [117944.564917] ath10k_warn: 2 callbacks suppressed
Sat Oct 29 10:48:15 2016 kern.warn kernel: [117944.569617] ath10k_pci 0000:01:00.0: failed to delete peer 70:12:34:56:78:9a for vdev 0: -11
Sat Oct 29 10:48:15 2016 kern.warn kernel: [117944.578309] ath10k_pci 0000:01:00.0: found sta peer 70:12:34:56:78:9a (ptr 86320c00 id 251) entry on vdev 0 after it was supposedly removed
Sat Oct 29 10:48:18 2016 kern.warn kernel: [117947.584908] ath10k_pci 0000:01:00.0: failed to set beacon mode for vdev 0: -11
Sat Oct 29 10:48:21 2016 kern.warn kernel: [117950.584876] ath10k_pci 0000:01:00.0: failed to set dtim period for vdev 0: -11
Sat Oct 29 10:48:24 2016 kern.warn kernel: [117953.594843] ath10k_pci 0000:01:00.0: failed to recalculate rts/cts prot for vdev 0: -11
Sat Oct 29 10:48:27 2016 kern.warn kernel: [117956.594833] ath10k_pci 0000:01:00.0: failed to set protection mode 0 on vdev 0: -11
Sat Oct 29 10:48:30 2016 kern.warn kernel: [117959.594805] ath10k_pci 0000:01:00.0: failed to set preamble for vdev 0: -11
Sat Oct 29 10:52:57 2016 daemon.info hostapd: wlan1: STA 00:12:34:56:78:9a WPA: group key handshake completed (RSN)
Sat Oct 29 10:52:57 2016 daemon.info hostapd: wlan1: STA a0:12:34:56:78:9a WPA: group key handshake completed (RSN)
Sat Oct 29 10:53:00 2016 kern.warn kernel: [118229.632250] ath10k_pci 0000:01:00.0: failed to install key for vdev 0 peer 30:12:34:56:78:9a: -11
Sat Oct 29 10:53:00 2016 kern.err kernel: [118229.641421] wlan0: failed to remove key (2, ff:ff:ff:ff:ff:ff) from hardware (-11)
Sat Oct 29 10:53:03 2016 kern.warn kernel: [118232.642204] ath10k_pci 0000:01:00.0: failed to install key for vdev 0 peer 30:12:34:56:78:9a: -11
Sat Oct 29 10:53:03 2016 kern.err kernel: [118232.651309] wlan0: failed to set key (2, ff:ff:ff:ff:ff:ff) to hardware (-11)
Sat Oct 29 10:53:08 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a IEEE 802.11: deauthenticated due to local deauth request
Sat Oct 29 10:53:11 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a IEEE 802.11: authenticated
Sat Oct 29 10:53:11 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a IEEE 802.11: associated (aid 2)
Sat Oct 29 10:53:11 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a RADIUS: starting accounting session 56977F3FD253EA9C
Sat Oct 29 10:53:11 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a WPA: pairwise key handshake completed (RSN)

_______________________________________________
ath10k mailing list
ath10k@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/ath10k

^ permalink raw reply	[flat|nested] 7+ messages in thread

end of thread, other threads:[~2016-12-03 11:33 UTC | newest]

Thread overview: 7+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2016-11-18  9:30 [BUG] Kernel crashes with ath10k radio and Nexus 5X clients Timo Sigurdsson
2016-11-18 21:22 ` Adrian Chadd
2016-11-20  1:35   ` Timo Sigurdsson
2016-11-21 12:47     ` Mohammed Shafi Shajakhan
2016-11-28  0:24       ` Timo Sigurdsson
2016-12-03 11:33       ` Timo Sigurdsson
  -- strict thread matches above, loose matches on Subject: below --
2016-10-29 20:19 Timo Sigurdsson

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.