Hi Adrian, sure - here's the bug report on kernel.org: https://bugzilla.kernel.org/show_bug.cgi?id=188201
Regards, Timo Adrian Chadd schrieb am 18.11.2016 22:22: > hiya! > > Can you file a kernel.org bug mentioning this? > > thanks! > > > -a > > > On 18 November 2016 at 01:30, Timo Sigurdsson > <public_tim...@silentcreek.de> wrote: >> Hi again, >> >> in the meantime, I have some more information to add to the issue mentioned >> in >> my email quoted further down below. >> >> Ben Greear approached me off-list and suggested to try the Candela Tech >> ath10k >> driver and firmware and see if the issue occurs with that as well. So, for >> the >> last 3 weeks I've been testing the CT driver and firmware and I can happily >> report that the issue with the driver crashing after a while when a Nexus 5X >> device is connected is not occuring with the current BETA 18 >> firmware-2-ct-full-community.bin. So, this really seems like a regression in >> the official API level 5 ath10k firmware blobs. >> >> The CT firmware is not perfect either, since it seems to suffer from a >> different >> bug that has been resolved in the official firmwares, and that is that after >> a >> reboot of my TP-Link Archer C7 v2, the ath10k driver won't load. Only after a >> hard reset or "cold boot" it will come up. That's an issue I had with older >> official firmwares as well, but it has been resolved with the recent API >> level >> 5 firmwares. >> >> Nevertheless, for the time being, I will stick to the CT firmware because I >> can >> work around the reboot issue and having the 5GHz wifi working for my Nexus 5X >> clients is more important. >> >> Over the next weeks, I will test different combinations of ath10k(-ct) driver >> and firmware to see if there's a combination that resolves all issues. This >> morning I flashed a LEDE build with the official ath10k driver and the CT >> firmware binary. >> >> But of course, if someone has more suggestions on what I could try or what >> information I could collect to help resolve the issue related to the Nexus 5X >> clients in the official firmware binaries, I think that would be beneficial >> for a larger audience. >> >> Regards, >> >> Timo >> >> P.S.: Please include my email address in any reply, since I'm not subscribed >> to the mailing list. Thank you. >> >> >> Timo Sigurdsson schrieb am 29.10.2016 22:19: >> >>> Hi everybody, >>> >>> I have a TP-Link Archer C7 v2 running a fairly recent build of LEDE (r1952, >>> Linux 4.4.26, compat-wireless-2016-10-08). It all works well except for the >>> fact that when I connect a Nexus 5X device to the 5GHz radio, the kernel or >>> ath10k driver will crash after a while. 5Ghz wifi will be dead after that >>> until I reboot the system. >>> >>> This issue has been reported before [1] and it also has been declared as >>> solved with newer firmwares [2] (but reopened by other users). However, even >>> with the latest firmware 10.2.4.70.58 from Kalle Valo's Github repository >>> the >>> issue is far from resolved. I have tried many different firmware revisions >>> over the time (more recently 10.2.4.70.56 and 10.2.4.70.54), and I can could >>> only find that the issue sometimes takes longer to trigger with some >>> firmwares >>> (which might just be random), but it would always occur at some point with >>> API >>> level 5 firmwares. With API level 2 firmwares (which I testesd when I was >>> still using OpenWrt 15.05) I never saw these crashes, but the Nexus 5X had >>> other connectivity issues with these older firmwares that made this >>> combination no fun to use either. But this shows that the firmware itself >>> makes the difference here. >>> >>> I actually have two Nexus 5X on my network (my wife's and my own). I can >>> trigger the crash with either one of them. And if both Nexus 5X are >>> connected >>> to the 5Ghz radio, then the issue triggers much faster (can be as low as 15 >>> minutes). My workaround is to let the Nexus 5X devices only connect to the >>> 2.4GHz radio. This way, the device can runs for weeks without any issue or >>> crash, but of course I would prefer the actual bug being fixed rather than >>> to >>> circumvent it. >>> >>> I'm appending a syslog from my access point with a crash happening while one >>> Nexus 5X was connected to the 5GHz radio starting from the time the system >>> booted. I randomized the MAC addresses. but left the first two characters >>> unique so different clients can be distinguished. >>> >>> If there is more info I could collect to help identify the cause of this >>> issue, please let me know (and possibly how to do that as well). >>> >>> Thank you and regards, >>> >>> Timo >>> >>> [1] http://lists.infradead.org/pipermail/ath10k/2015-November/006413.html >>> [2] https://dev.openwrt.org/ticket/20854 >>> >>> And here's the log: >>> Fri Oct 28 02:01:35 2016 kern.notice kernel: [ 0.000000] Linux version >>> 4.4.26 (user@buildsystem) (gcc version 5.4.0 (LEDE GCC 5.4.0 r1952) ) #0 Fri >>> Oct 21 15:52:28 2016 >>> [...] >>> Fri Oct 28 02:01:35 2016 kern.info kernel: [ 9.468751] Loading modules >>> backported from Linux version wt-2016-10-03-1-g6fcb1a6 >>> Fri Oct 28 02:01:35 2016 kern.info kernel: [ 9.476481] Backport generated >>> by >>> backports.git backports-20160324-9-g0e38f5c >>> Fri Oct 28 02:01:35 2016 kern.warn kernel: [ 9.576570] PCI: Enabling >>> device >>> 0000:01:00.0 (0000 -> 0002) >>> Fri Oct 28 02:01:35 2016 kern.info kernel: [ 9.582475] ath10k_pci >>> 0000:01:00.0: pci irq legacy oper_irq_mode 1 irq_mode 0 reset_mode 0 >>> Fri Oct 28 02:01:35 2016 kern.warn kernel: [ 10.087609] ath10k_pci >>> 0000:01:00.0: Direct firmware load for ath10k/pre-cal-pci-0000:01:00.0.bin >>> failed with error -2 >>> Fri Oct 28 02:01:35 2016 kern.warn kernel: [ 10.098492] ath10k_pci >>> 0000:01:00.0: Falling back to user helper >>> Fri Oct 28 02:01:35 2016 kern.err kernel: [ 10.176500] firmware >>> ath10k!pre-cal-pci-0000:01:00.0.bin: firmware_loading_store: map pages >>> failed >>> Fri Oct 28 02:01:35 2016 kern.info kernel: [ 10.677026] ath10k_pci >>> 0000:01:00.0: qca988x hw2.0 target 0x4100016c chip_id 0x043202ff sub >>> 0000:0000 >>> Fri Oct 28 02:01:35 2016 kern.info kernel: [ 10.686424] ath10k_pci >>> 0000:01:00.0: kconfig debug 0 debugfs 1 tracing 0 dfs 1 testmode 1 >>> Fri Oct 28 02:01:35 2016 kern.info kernel: [ 10.699498] ath10k_pci >>> 0000:01:00.0: firmware ver 10.2.4.70.58 api 5 features no-p2p,raw-mode,mfp >>> crc32 e1af076f >>> Fri Oct 28 02:01:35 2016 kern.warn kernel: [ 10.709932] ath10k_pci >>> 0000:01:00.0: Direct firmware load for ath10k/QCA988X/hw2.0/board-2.bin >>> failed >>> with error -2 >>> Fri Oct 28 02:01:35 2016 kern.warn kernel: [ 10.720531] ath10k_pci >>> 0000:01:00.0: Falling back to user helper >>> Fri Oct 28 02:01:35 2016 kern.err kernel: [ 10.798719] firmware >>> ath10k!QCA988X!hw2.0!board-2.bin: firmware_loading_store: map pages failed >>> Fri Oct 28 02:01:35 2016 kern.info kernel: [ 10.823845] ath10k_pci >>> 0000:01:00.0: board_file api 1 bmi_id N/A crc32 bebc7c08 >>> Fri Oct 28 02:01:35 2016 kern.info kernel: [ 11.954723] ath10k_pci >>> 0000:01:00.0: htt-ver 2.1 wmi-op 5 htt-op 2 cal file max-sta 128 raw 0 >>> hwcrypto >>> 1 >>> [...] >>> // Evertyhing runs fine for a bit more than a day, but then this happens ... >>> // >>> // Note: The ath10k radio in question is wlan0 // >>> Sat Oct 29 10:38:21 2016 daemon.info hostapd: wlan1: STA 9c:12:34:56:78:9a >>> IEEE >>> 802.11: disassociated >>> Sat Oct 29 10:38:22 2016 daemon.info hostapd: wlan1: STA 9c:12:34:56:78:9a >>> IEEE >>> 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE) >>> Sat Oct 29 10:42:57 2016 daemon.info hostapd: wlan1: STA 00:12:34:56:78:9a >>> WPA: >>> group key handshake completed (RSN) >>> Sat Oct 29 10:42:57 2016 daemon.info hostapd: wlan0: STA a0:12:34:56:78:9a >>> WPA: >>> group key handshake completed (RSN) >>> Sat Oct 29 10:42:57 2016 daemon.info hostapd: wlan0: STA 70:12:34:56:78:9a >>> WPA: >>> group key handshake completed (RSN) >>> Sat Oct 29 10:43:05 2016 kern.warn kernel: [117635.147861] ath10k_pci >>> 0000:01:00.0: failed to delete peer 7f:12:34:56:78:9a for vdev 0: -145 >>> Sat Oct 29 10:43:05 2016 kern.warn kernel: [117635.156679] ath10k_pci >>> 0000:01:00.0: found sta peer 7f:12:34:56:78:9a (ptr 86ebf200 id 62) entry on >>> vdev 0 after it was supposedly removed >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.169489] ------------[ cut >>> here ]------------ >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.174314] WARNING: CPU: 0 >>> PID: >>> 1885 at compat-wireless-2016-10-08/net/mac80211/sta_info.c:964 0x875870a4 >>> [mac80211@87580000+0x5f500]() >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.186854] Modules linked >>> in: >>> pppoe ppp_async iptable_nat ath9k pppox ppp_generic nf_nat_ipv4 >>> nf_conntrack_ipv6 nf_conntrack_ipv4 ipt_REJECT ipt_MASQUERADE ax88179_178a >>> ath9k_common xt_time xt_tcpudp xt_tcpmss xt_statistic xt_state xt_recent >>> xt_nat >>> xt_multiport xt_mark xt_mac xt_limit xt_length xt_id xt_hl xt_helper xt_ecn >>> xt_dscp xt_conntrack xt_connmark xt_connlimit xt_connbytes xt_comment >>> xt_TCPMSS >>> xt_REDIRECT xt_LOG xt_HL xt_DSCP xt_CT xt_CLASSIFY usbnet Sat Oct 29 >>> 10:43:06 >>> 2016 kern.warn kernel: [117635.294282] CPU: 0 PID: 1885 Comm: hostapd Not >>> tainted 4.4.26 #0 >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.300471] Stack : 8036cff4 >>> 00000000 00000001 803c0000 00000000 00000000 00000000 00000000 >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.300471] 00000000 >>> 00000000 >>> 00000000 00000000 00000000 00000000 00000000 00000000 >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.300471] 00000000 >>> 00000000 >>> 00000000 00000000 00000000 00000000 00000000 00000000 >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.300471] 00000000 >>> 00000000 >>> 00000000 00000000 00000000 00000000 00000000 00000000 >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.300471] 00000000 >>> 00000000 >>> 00000000 00000000 00000000 00000000 00000000 00000000 >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.300471] ... >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.336918] Call >>> Trace:[<800716f0>] 0x800716f0 >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.341551] [<800716f0>] >>> 0x800716f0 >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.345176] [<8008144c>] >>> 0x8008144c >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.348832] [<875870a4>] >>> 0x875870a4 [mac80211@87580000+0x5f500] >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.354943] [<80081504>] >>> 0x80081504 >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.358611] [<875870a4>] >>> 0x875870a4 [mac80211@87580000+0x5f500] >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.364742] [<87587188>] >>> 0x87587188 [mac80211@87580000+0x5f500] >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.370861] [<875849b4>] >>> 0x875849b4 [mac80211@87580000+0x5f500] >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.376951] [<80115770>] >>> 0x80115770 >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.380613] [<87587238>] >>> 0x87587238 [mac80211@87580000+0x5f500] >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.386727] [<874cc114>] >>> 0x874cc114 [cfg80211@874c0000+0x35b60] >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.392854] [<80293074>] >>> 0x80293074 >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.396485] [<80291900>] >>> 0x80291900 >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.400176] [<80292df8>] >>> 0x80292df8 >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.403801] [<80292238>] >>> 0x80292238 >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.407439] [<80292de0>] >>> 0x80292de0 >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.411079] [<80257794>] >>> 0x80257794 >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.414711] [<80291aa0>] >>> 0x80291aa0 >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.418345] [<80256c90>] >>> 0x80256c90 >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.421991] [<80292004>] >>> 0x80292004 >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.425616] [<801b5304>] >>> 0x801b5304 >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.429260] [<8025b478>] >>> 0x8025b478 >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.432902] [<8024d0e4>] >>> 0x8024d0e4 >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.436540] [<8024e4f8>] >>> 0x8024e4f8 >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.440195] [<801b5304>] >>> 0x801b5304 >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.443835] [<8027e338>] >>> 0x8027e338 >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.447464] [<802e8244>] >>> 0x802e8244 >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.451136] [<8011aa58>] >>> 0x8011aa58 >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.454762] [<8011ae3c>] >>> 0x8011ae3c >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.458402] [<8011acd4>] >>> 0x8011acd4 >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.462057] [<80117a10>] >>> 0x80117a10 >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.465700] [<8024f424>] >>> 0x8024f424 >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.469344] [<800b1dd0>] >>> 0x800b1dd0 >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.472986] [<8006295c>] >>> 0x8006295c >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.476615] >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.478223] ---[ end trace >>> 2c07f06df2595aa5 ]--- >>> Sat Oct 29 10:43:06 2016 daemon.info hostapd: wlan0: STA 7f:12:34:56:78:9a >>> IEEE >>> 802.11: deauthenticated due to local deauth request >>> Sat Oct 29 10:43:15 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a >>> IEEE >>> 802.11: authenticated >>> Sat Oct 29 10:43:15 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a >>> IEEE >>> 802.11: associated (aid 2) >>> Sat Oct 29 10:43:15 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a >>> RADIUS: starting accounting session D1227001A194DA09 >>> Sat Oct 29 10:43:15 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a >>> WPA: >>> pairwise key handshake completed (RSN) >>> Sat Oct 29 10:43:31 2016 daemon.info hostapd: wlan1: STA a0:12:34:56:78:9a >>> IEEE >>> 802.11: authenticated >>> Sat Oct 29 10:43:31 2016 daemon.info hostapd: wlan1: STA a0:12:34:56:78:9a >>> IEEE >>> 802.11: associated (aid 3) >>> Sat Oct 29 10:43:31 2016 daemon.info hostapd: wlan1: STA a0:12:34:56:78:9a >>> RADIUS: starting accounting session 92084E55AFE512B3 >>> Sat Oct 29 10:43:31 2016 daemon.info hostapd: wlan1: STA a0:12:34:56:78:9a >>> WPA: >>> pairwise key handshake completed (RSN) >>> Sat Oct 29 10:48:02 2016 daemon.info hostapd: wlan0: STA a0:12:34:56:78:9a >>> IEEE >>> 802.11: disassociated due to inactivity >>> Sat Oct 29 10:48:05 2016 kern.warn kernel: [117935.165013] ath10k_pci >>> 0000:01:00.0: failed to install key for vdev 0 peer a0:12:34:56:78:9a: -145 >>> Sat Oct 29 10:48:05 2016 kern.err kernel: [117935.174193] wlan0: failed to >>> remove key (0, a0:12:34:56:78:9a) from hardware (-145) >>> Sat Oct 29 10:48:05 2016 daemon.info hostapd: wlan0: STA 70:12:34:56:78:9a >>> IEEE >>> 802.11: disassociated due to inactivity >>> Sat Oct 29 10:48:08 2016 kern.warn kernel: [117938.174996] ath10k_pci >>> 0000:01:00.0: failed to install key for vdev 0 peer 70:12:34:56:78:9a: -11 >>> Sat Oct 29 10:48:08 2016 kern.err kernel: [117938.184092] wlan0: failed to >>> remove key (0, 70:12:34:56:78:9a) from hardware (-11) >>> Sat Oct 29 10:48:08 2016 daemon.info hostapd: wlan0: STA a0:12:34:56:78:9a >>> IEEE >>> 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE) >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.193251] ath10k_pci >>> 0000:01:00.0: cipher 0 is not supported >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.199320] ath10k_pci >>> 0000:01:00.0: failed to remove peer wep key 0: -122 >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.206409] ath10k_pci >>> 0000:01:00.0: failed to clear all peer wep keys for vdev 0: -122 >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.214621] ath10k_pci >>> 0000:01:00.0: failed to disassociate station: a0:12:34:56:78:9a vdev 0: -122 >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.223892] ------------[ cut >>> here ]------------ >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.228706] WARNING: CPU: 0 >>> PID: >>> 1885 at compat-wireless-2016-10-08/net/mac80211/sta_info.c:956 0x87587050 >>> [mac80211@87580000+0x5f500]() >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.241226] Modules linked >>> in: >>> pppoe ppp_async iptable_nat ath9k pppox ppp_generic nf_nat_ipv4 >>> nf_conntrack_ipv6 nf_conntrack_ipv4 ipt_REJECT ipt_MASQUERADE ax88179_178a >>> ath9k_common xt_time xt_tcpudp xt_tcpmss xt_statistic xt_state xt_recent >>> xt_nat >>> xt_multiport xt_mark xt_mac xt_limit xt_length xt_id xt_hl xt_helper xt_ecn >>> xt_dscp xt_conntrack xt_connmark xt_connlimit xt_connbytes xt_comment >>> xt_TCPMSS >>> xt_REDIRECT xt_LOG xt_HL xt_DSCP xt_CT xt_CLASSIFY usbnet Sat Oct 29 >>> 10:48:09 >>> 2016 kern.warn kernel: [117938.348645] CPU: 0 PID: 1885 Comm: hostapd >>> Tainted: >>> G W 4.4.26 #0 >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.356067] Stack : 8036cff4 >>> 00000000 00000001 803c0000 00000000 00000000 00000000 00000000 >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.356067] 00000000 >>> 00000000 >>> 00000000 00000000 00000000 00000000 00000000 00000000 >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.356067] 00000000 >>> 00000000 >>> 00000000 00000000 00000000 00000000 00000000 00000000 >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.356067] 00000000 >>> 00000000 >>> 00000000 00000000 00000000 00000000 00000000 00000000 >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.356067] 00000000 >>> 00000000 >>> 00000000 00000000 00000000 00000000 00000000 00000000 >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.356067] ... >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.392511] Call >>> Trace:[<800716f0>] 0x800716f0 >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.397147] [<800716f0>] >>> 0x800716f0 >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.400770] [<8008144c>] >>> 0x8008144c >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.404414] [<87587050>] >>> 0x87587050 [mac80211@87580000+0x5f500] >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.410531] [<80081504>] >>> 0x80081504 >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.414184] [<87587050>] >>> 0x87587050 [mac80211@87580000+0x5f500] >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.420297] [<8759cb40>] >>> 0x8759cb40 [mac80211@87580000+0x5f500] >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.426431] [<87587188>] >>> 0x87587188 [mac80211@87580000+0x5f500] >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.432531] [<875849b4>] >>> 0x875849b4 [mac80211@87580000+0x5f500] >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.438629] [<801018e4>] >>> 0x801018e4 >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.442276] [<87587238>] >>> 0x87587238 [mac80211@87580000+0x5f500] >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.448406] [<874cc114>] >>> 0x874cc114 [cfg80211@874c0000+0x35b60] >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.454516] [<80293074>] >>> 0x80293074 >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.458147] [<80291900>] >>> 0x80291900 >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.461822] [<80292df8>] >>> 0x80292df8 >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.465461] [<80292238>] >>> 0x80292238 >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.469092] [<800a15d0>] >>> 0x800a15d0 >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.472726] [<80292de0>] >>> 0x80292de0 >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.476371] [<80257794>] >>> 0x80257794 >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.480002] [<80291aa0>] >>> 0x80291aa0 >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.483630] [<80256c90>] >>> 0x80256c90 >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.487280] [<80292004>] >>> 0x80292004 >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.490908] [<801b5304>] >>> 0x801b5304 >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.494541] [<8025b478>] >>> 0x8025b478 >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.498198] [<8024d0e4>] >>> 0x8024d0e4 >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.501840] [<8024e4f8>] >>> 0x8024e4f8 >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.505492] [<8027e338>] >>> 0x8027e338 >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.509121] [<802e8244>] >>> 0x802e8244 >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.512780] [<8011aa58>] >>> 0x8011aa58 >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.516413] [<8011ae3c>] >>> 0x8011ae3c >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.520043] [<8011acd4>] >>> 0x8011acd4 >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.523697] [<80117a10>] >>> 0x80117a10 >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.527352] [<8024f424>] >>> 0x8024f424 >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.530981] [<801059e8>] >>> 0x801059e8 >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.534625] [<8006295c>] >>> 0x8006295c >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.538265] >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.539870] ---[ end trace >>> 2c07f06df2595aa6 ]--- >>> Sat Oct 29 10:48:12 2016 kern.warn kernel: [117941.534956] ath10k_pci >>> 0000:01:00.0: failed to delete peer a0:12:34:56:78:9a for vdev 0: -11 >>> Sat Oct 29 10:48:12 2016 kern.warn kernel: [117941.543716] ath10k_pci >>> 0000:01:00.0: found sta peer a0:12:34:56:78:9a (ptr 86ebf400 id 196) entry >>> on >>> vdev 0 after it was supposedly removed >>> Sat Oct 29 10:48:12 2016 daemon.info hostapd: wlan0: STA 70:12:34:56:78:9a >>> IEEE >>> 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE) >>> Sat Oct 29 10:48:12 2016 kern.warn kernel: [117941.558962] ath10k_pci >>> 0000:01:00.0: cipher 0 is not supported >>> Sat Oct 29 10:48:12 2016 kern.warn kernel: [117941.565049] ath10k_pci >>> 0000:01:00.0: failed to remove peer wep key 0: -122 >>> Sat Oct 29 10:48:15 2016 kern.warn kernel: [117944.564917] ath10k_warn: 2 >>> callbacks suppressed >>> Sat Oct 29 10:48:15 2016 kern.warn kernel: [117944.569617] ath10k_pci >>> 0000:01:00.0: failed to delete peer 70:12:34:56:78:9a for vdev 0: -11 >>> Sat Oct 29 10:48:15 2016 kern.warn kernel: [117944.578309] ath10k_pci >>> 0000:01:00.0: found sta peer 70:12:34:56:78:9a (ptr 86320c00 id 251) entry >>> on >>> vdev 0 after it was supposedly removed >>> Sat Oct 29 10:48:18 2016 kern.warn kernel: [117947.584908] ath10k_pci >>> 0000:01:00.0: failed to set beacon mode for vdev 0: -11 >>> Sat Oct 29 10:48:21 2016 kern.warn kernel: [117950.584876] ath10k_pci >>> 0000:01:00.0: failed to set dtim period for vdev 0: -11 >>> Sat Oct 29 10:48:24 2016 kern.warn kernel: [117953.594843] ath10k_pci >>> 0000:01:00.0: failed to recalculate rts/cts prot for vdev 0: -11 >>> Sat Oct 29 10:48:27 2016 kern.warn kernel: [117956.594833] ath10k_pci >>> 0000:01:00.0: failed to set protection mode 0 on vdev 0: -11 >>> Sat Oct 29 10:48:30 2016 kern.warn kernel: [117959.594805] ath10k_pci >>> 0000:01:00.0: failed to set preamble for vdev 0: -11 >>> Sat Oct 29 10:52:57 2016 daemon.info hostapd: wlan1: STA 00:12:34:56:78:9a >>> WPA: >>> group key handshake completed (RSN) >>> Sat Oct 29 10:52:57 2016 daemon.info hostapd: wlan1: STA a0:12:34:56:78:9a >>> WPA: >>> group key handshake completed (RSN) >>> Sat Oct 29 10:53:00 2016 kern.warn kernel: [118229.632250] ath10k_pci >>> 0000:01:00.0: failed to install key for vdev 0 peer 30:12:34:56:78:9a: -11 >>> Sat Oct 29 10:53:00 2016 kern.err kernel: [118229.641421] wlan0: failed to >>> remove key (2, ff:ff:ff:ff:ff:ff) from hardware (-11) >>> Sat Oct 29 10:53:03 2016 kern.warn kernel: [118232.642204] ath10k_pci >>> 0000:01:00.0: failed to install key for vdev 0 peer 30:12:34:56:78:9a: -11 >>> Sat Oct 29 10:53:03 2016 kern.err kernel: [118232.651309] wlan0: failed to >>> set >>> key (2, ff:ff:ff:ff:ff:ff) to hardware (-11) >>> Sat Oct 29 10:53:08 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a >>> IEEE >>> 802.11: deauthenticated due to local deauth request >>> Sat Oct 29 10:53:11 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a >>> IEEE >>> 802.11: authenticated >>> Sat Oct 29 10:53:11 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a >>> IEEE >>> 802.11: associated (aid 2) >>> Sat Oct 29 10:53:11 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a >>> RADIUS: starting accounting session 56977F3FD253EA9C >>> Sat Oct 29 10:53:11 2016 daemon.info hostapd: wlan1: STA 70:12:34:56:78:9a >>> WPA: >>> pairwise key handshake completed (RSN) >>> >> >> >> _______________________________________________ >> ath10k mailing list >> ath...@lists.infradead.org >> http://lists.infradead.org/mailman/listinfo/ath10k > _______________________________________________ Lede-dev mailing list Lede-dev@lists.infradead.org http://lists.infradead.org/mailman/listinfo/lede-dev