Hi Mohammed, sorry for the late reply, but I was on a business trip last week.
The log I had attached is all I got from this crash. I have no experience with kernel debugging, but I assume some info might be missing because the kernel was not compiled with debug information. So, I will have to provoke another crash with a different firmware image that has more debugging options enabled. It might take a few days, until the error occurs again, but I'll try to gather more information and post it. Regards, Timo Mohammed Shafi Shajakhan schrieb am 21.11.2016 13:47: > Hi Timo, > > sorry had I missed the exact kernel crash call trace ? > I could see only the warnings, can you please post the call > trace of the kernel crash please ? > > regards, > shafi > > On Sun, Nov 20, 2016 at 02:35:27AM +0100, Timo Sigurdsson wrote: >> Hi Adrian, >> >> sure - here's the bug report on kernel.org: >> https://bugzilla.kernel.org/show_bug.cgi?id=188201 >> >> Regards, >> >> Timo >> >> >> Adrian Chadd schrieb am 18.11.2016 22:22: >> >> > hiya! >> > >> > Can you file a kernel.org bug mentioning this? >> > >> > thanks! >> > >> > >> > -a >> > >> > >> > On 18 November 2016 at 01:30, Timo Sigurdsson >> > <public_tim...@silentcreek.de> wrote: >> >> Hi again, >> >> >> >> in the meantime, I have some more information to add to the issue >> >> mentioned >> in >> >> my email quoted further down below. >> >> >> >> Ben Greear approached me off-list and suggested to try the Candela Tech >> ath10k >> >> driver and firmware and see if the issue occurs with that as well. So, for >> the >> >> last 3 weeks I've been testing the CT driver and firmware and I can >> >> happily >> >> report that the issue with the driver crashing after a while when a Nexus >> 5X >> >> device is connected is not occuring with the current BETA 18 >> >> firmware-2-ct-full-community.bin. So, this really seems like a regression >> in >> >> the official API level 5 ath10k firmware blobs. >> >> >> >> The CT firmware is not perfect either, since it seems to suffer from a >> >> different >> >> bug that has been resolved in the official firmwares, and that is that >> after a >> >> reboot of my TP-Link Archer C7 v2, the ath10k driver won't load. Only >> >> after >> a >> >> hard reset or "cold boot" it will come up. That's an issue I had with >> >> older >> >> official firmwares as well, but it has been resolved with the recent API >> level >> >> 5 firmwares. >> >> >> >> Nevertheless, for the time being, I will stick to the CT firmware because >> >> I >> >> can >> >> work around the reboot issue and having the 5GHz wifi working for my Nexus >> 5X >> >> clients is more important. >> >> >> >> Over the next weeks, I will test different combinations of ath10k(-ct) >> driver >> >> and firmware to see if there's a combination that resolves all issues. >> >> This >> >> morning I flashed a LEDE build with the official ath10k driver and the CT >> >> firmware binary. >> >> >> >> But of course, if someone has more suggestions on what I could try or what >> >> information I could collect to help resolve the issue related to the Nexus >> 5X >> >> clients in the official firmware binaries, I think that would be >> >> beneficial >> >> for a larger audience. >> >> >> >> Regards, >> >> >> >> Timo >> >> >> >> P.S.: Please include my email address in any reply, since I'm not >> subscribed >> >> to the mailing list. Thank you. >> >> >> >> >> >> Timo Sigurdsson schrieb am 29.10.2016 22:19: >> >> >> >>> Hi everybody, >> >>> >> >>> I have a TP-Link Archer C7 v2 running a fairly recent build of LEDE >> (r1952, >> >>> Linux 4.4.26, compat-wireless-2016-10-08). It all works well except for >> the >> >>> fact that when I connect a Nexus 5X device to the 5GHz radio, the kernel >> or >> >>> ath10k driver will crash after a while. 5Ghz wifi will be dead after that >> >>> until I reboot the system. >> >>> >> >>> This issue has been reported before [1] and it also has been declared as >> >>> solved with newer firmwares [2] (but reopened by other users). However, >> even >> >>> with the latest firmware 10.2.4.70.58 from Kalle Valo's Github repository >> the >> >>> issue is far from resolved. I have tried many different firmware >> >>> revisions >> >>> over the time (more recently 10.2.4.70.56 and 10.2.4.70.54), and I can >> could >> >>> only find that the issue sometimes takes longer to trigger with some >> >>> firmwares >> >>> (which might just be random), but it would always occur at some point >> >>> with >> >>> API >> >>> level 5 firmwares. With API level 2 firmwares (which I testesd when I was >> >>> still using OpenWrt 15.05) I never saw these crashes, but the Nexus 5X >> >>> had >> >>> other connectivity issues with these older firmwares that made this >> >>> combination no fun to use either. But this shows that the firmware itself >> >>> makes the difference here. >> >>> >> >>> I actually have two Nexus 5X on my network (my wife's and my own). I can >> >>> trigger the crash with either one of them. And if both Nexus 5X are >> connected >> >>> to the 5Ghz radio, then the issue triggers much faster (can be as low as >> 15 >> >>> minutes). My workaround is to let the Nexus 5X devices only connect to >> >>> the >> >>> 2.4GHz radio. This way, the device can runs for weeks without any issue >> >>> or >> >>> crash, but of course I would prefer the actual bug being fixed rather >> >>> than >> to >> >>> circumvent it. >> >>> >> >>> I'm appending a syslog from my access point with a crash happening while >> one >> >>> Nexus 5X was connected to the 5GHz radio starting from the time the >> >>> system >> >>> booted. I randomized the MAC addresses. but left the first two characters >> >>> unique so different clients can be distinguished. >> >>> >> >>> If there is more info I could collect to help identify the cause of this >> >>> issue, please let me know (and possibly how to do that as well). >> >>> >> >>> Thank you and regards, >> >>> >> >>> Timo >> >>> >> >>> [1] http://lists.infradead.org/pipermail/ath10k/2015-November/006413.html >> >>> [2] https://dev.openwrt.org/ticket/20854 >> >>> >> >>> And here's the log: >> >>> Fri Oct 28 02:01:35 2016 kern.notice kernel: [ 0.000000] Linux version >> >>> 4.4.26 (user@buildsystem) (gcc version 5.4.0 (LEDE GCC 5.4.0 r1952) ) #0 >> Fri >> >>> Oct 21 15:52:28 2016 >> >>> [...] >> >>> Fri Oct 28 02:01:35 2016 kern.info kernel: [ 9.468751] Loading modules >> >>> backported from Linux version wt-2016-10-03-1-g6fcb1a6 >> >>> Fri Oct 28 02:01:35 2016 kern.info kernel: [ 9.476481] Backport >> generated >> >>> by >> >>> backports.git backports-20160324-9-g0e38f5c >> >>> Fri Oct 28 02:01:35 2016 kern.warn kernel: [ 9.576570] PCI: Enabling >> >>> device >> >>> 0000:01:00.0 (0000 -> 0002) >> >>> Fri Oct 28 02:01:35 2016 kern.info kernel: [ 9.582475] ath10k_pci >> >>> 0000:01:00.0: pci irq legacy oper_irq_mode 1 irq_mode 0 reset_mode 0 >> >>> Fri Oct 28 02:01:35 2016 kern.warn kernel: [ 10.087609] ath10k_pci >> >>> 0000:01:00.0: Direct firmware load for >> >>> ath10k/pre-cal-pci-0000:01:00.0.bin >> >>> failed with error -2 >> >>> Fri Oct 28 02:01:35 2016 kern.warn kernel: [ 10.098492] ath10k_pci >> >>> 0000:01:00.0: Falling back to user helper >> >>> Fri Oct 28 02:01:35 2016 kern.err kernel: [ 10.176500] firmware >> >>> ath10k!pre-cal-pci-0000:01:00.0.bin: firmware_loading_store: map pages >> failed >> >>> Fri Oct 28 02:01:35 2016 kern.info kernel: [ 10.677026] ath10k_pci >> >>> 0000:01:00.0: qca988x hw2.0 target 0x4100016c chip_id 0x043202ff sub >> >>> 0000:0000 >> >>> Fri Oct 28 02:01:35 2016 kern.info kernel: [ 10.686424] ath10k_pci >> >>> 0000:01:00.0: kconfig debug 0 debugfs 1 tracing 0 dfs 1 testmode 1 >> >>> Fri Oct 28 02:01:35 2016 kern.info kernel: [ 10.699498] ath10k_pci >> >>> 0000:01:00.0: firmware ver 10.2.4.70.58 api 5 features >> >>> no-p2p,raw-mode,mfp >> >>> crc32 e1af076f >> >>> Fri Oct 28 02:01:35 2016 kern.warn kernel: [ 10.709932] ath10k_pci >> >>> 0000:01:00.0: Direct firmware load for ath10k/QCA988X/hw2.0/board-2.bin >> >>> failed >> >>> with error -2 >> >>> Fri Oct 28 02:01:35 2016 kern.warn kernel: [ 10.720531] ath10k_pci >> >>> 0000:01:00.0: Falling back to user helper >> >>> Fri Oct 28 02:01:35 2016 kern.err kernel: [ 10.798719] firmware >> >>> ath10k!QCA988X!hw2.0!board-2.bin: firmware_loading_store: map pages >> >>> failed >> >>> Fri Oct 28 02:01:35 2016 kern.info kernel: [ 10.823845] ath10k_pci >> >>> 0000:01:00.0: board_file api 1 bmi_id N/A crc32 bebc7c08 >> >>> Fri Oct 28 02:01:35 2016 kern.info kernel: [ 11.954723] ath10k_pci >> >>> 0000:01:00.0: htt-ver 2.1 wmi-op 5 htt-op 2 cal file max-sta 128 raw 0 >> >>> hwcrypto >> >>> 1 >> >>> [...] >> >>> // Evertyhing runs fine for a bit more than a day, but then this happens >> ... >> >>> // >> >>> // Note: The ath10k radio in question is wlan0 // >> >>> Sat Oct 29 10:38:21 2016 daemon.info hostapd: wlan1: STA >> >>> 9c:12:34:56:78:9a >> >>> IEEE >> >>> 802.11: disassociated >> >>> Sat Oct 29 10:38:22 2016 daemon.info hostapd: wlan1: STA >> >>> 9c:12:34:56:78:9a >> >>> IEEE >> >>> 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE) >> >>> Sat Oct 29 10:42:57 2016 daemon.info hostapd: wlan1: STA >> >>> 00:12:34:56:78:9a >> >>> WPA: >> >>> group key handshake completed (RSN) >> >>> Sat Oct 29 10:42:57 2016 daemon.info hostapd: wlan0: STA >> >>> a0:12:34:56:78:9a >> >>> WPA: >> >>> group key handshake completed (RSN) >> >>> Sat Oct 29 10:42:57 2016 daemon.info hostapd: wlan0: STA >> >>> 70:12:34:56:78:9a >> >>> WPA: >> >>> group key handshake completed (RSN) >> >>> Sat Oct 29 10:43:05 2016 kern.warn kernel: [117635.147861] ath10k_pci >> >>> 0000:01:00.0: failed to delete peer 7f:12:34:56:78:9a for vdev 0: -145 >> >>> Sat Oct 29 10:43:05 2016 kern.warn kernel: [117635.156679] ath10k_pci >> >>> 0000:01:00.0: found sta peer 7f:12:34:56:78:9a (ptr 86ebf200 id 62) entry >> on >> >>> vdev 0 after it was supposedly removed >> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.169489] ------------[ >> cut >> >>> here ]------------ >> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.174314] WARNING: CPU: >> >>> 0 >> >>> PID: >> >>> 1885 at compat-wireless-2016-10-08/net/mac80211/sta_info.c:964 0x875870a4 >> >>> [mac80211@87580000+0x5f500]() >> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.186854] Modules linked >> in: >> >>> pppoe ppp_async iptable_nat ath9k pppox ppp_generic nf_nat_ipv4 >> >>> nf_conntrack_ipv6 nf_conntrack_ipv4 ipt_REJECT ipt_MASQUERADE >> >>> ax88179_178a >> >>> ath9k_common xt_time xt_tcpudp xt_tcpmss xt_statistic xt_state xt_recent >> >>> xt_nat >> >>> xt_multiport xt_mark xt_mac xt_limit xt_length xt_id xt_hl xt_helper >> xt_ecn >> >>> xt_dscp xt_conntrack xt_connmark xt_connlimit xt_connbytes xt_comment >> >>> xt_TCPMSS >> >>> xt_REDIRECT xt_LOG xt_HL xt_DSCP xt_CT xt_CLASSIFY usbnet Sat Oct 29 >> 10:43:06 >> >>> 2016 kern.warn kernel: [117635.294282] CPU: 0 PID: 1885 Comm: hostapd Not >> >>> tainted 4.4.26 #0 >> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.300471] Stack : >> 8036cff4 >> >>> 00000000 00000001 803c0000 00000000 00000000 00000000 00000000 >> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.300471] 00000000 >> >>> 00000000 >> >>> 00000000 00000000 00000000 00000000 00000000 00000000 >> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.300471] 00000000 >> >>> 00000000 >> >>> 00000000 00000000 00000000 00000000 00000000 00000000 >> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.300471] 00000000 >> >>> 00000000 >> >>> 00000000 00000000 00000000 00000000 00000000 00000000 >> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.300471] 00000000 >> >>> 00000000 >> >>> 00000000 00000000 00000000 00000000 00000000 00000000 >> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.300471] ... >> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.336918] Call >> >>> Trace:[<800716f0>] 0x800716f0 >> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.341551] [<800716f0>] >> >>> 0x800716f0 >> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.345176] [<8008144c>] >> >>> 0x8008144c >> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.348832] [<875870a4>] >> >>> 0x875870a4 [mac80211@87580000+0x5f500] >> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.354943] [<80081504>] >> >>> 0x80081504 >> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.358611] [<875870a4>] >> >>> 0x875870a4 [mac80211@87580000+0x5f500] >> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.364742] [<87587188>] >> >>> 0x87587188 [mac80211@87580000+0x5f500] >> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.370861] [<875849b4>] >> >>> 0x875849b4 [mac80211@87580000+0x5f500] >> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.376951] [<80115770>] >> >>> 0x80115770 >> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.380613] [<87587238>] >> >>> 0x87587238 [mac80211@87580000+0x5f500] >> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.386727] [<874cc114>] >> >>> 0x874cc114 [cfg80211@874c0000+0x35b60] >> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.392854] [<80293074>] >> >>> 0x80293074 >> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.396485] [<80291900>] >> >>> 0x80291900 >> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.400176] [<80292df8>] >> >>> 0x80292df8 >> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.403801] [<80292238>] >> >>> 0x80292238 >> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.407439] [<80292de0>] >> >>> 0x80292de0 >> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.411079] [<80257794>] >> >>> 0x80257794 >> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.414711] [<80291aa0>] >> >>> 0x80291aa0 >> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.418345] [<80256c90>] >> >>> 0x80256c90 >> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.421991] [<80292004>] >> >>> 0x80292004 >> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.425616] [<801b5304>] >> >>> 0x801b5304 >> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.429260] [<8025b478>] >> >>> 0x8025b478 >> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.432902] [<8024d0e4>] >> >>> 0x8024d0e4 >> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.436540] [<8024e4f8>] >> >>> 0x8024e4f8 >> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.440195] [<801b5304>] >> >>> 0x801b5304 >> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.443835] [<8027e338>] >> >>> 0x8027e338 >> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.447464] [<802e8244>] >> >>> 0x802e8244 >> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.451136] [<8011aa58>] >> >>> 0x8011aa58 >> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.454762] [<8011ae3c>] >> >>> 0x8011ae3c >> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.458402] [<8011acd4>] >> >>> 0x8011acd4 >> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.462057] [<80117a10>] >> >>> 0x80117a10 >> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.465700] [<8024f424>] >> >>> 0x8024f424 >> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.469344] [<800b1dd0>] >> >>> 0x800b1dd0 >> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.472986] [<8006295c>] >> >>> 0x8006295c >> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.476615] >> >>> Sat Oct 29 10:43:06 2016 kern.warn kernel: [117635.478223] ---[ end trace >> >>> 2c07f06df2595aa5 ]--- >> >>> Sat Oct 29 10:43:06 2016 daemon.info hostapd: wlan0: STA >> >>> 7f:12:34:56:78:9a >> >>> IEEE >> >>> 802.11: deauthenticated due to local deauth request >> >>> Sat Oct 29 10:43:15 2016 daemon.info hostapd: wlan1: STA >> >>> 70:12:34:56:78:9a >> >>> IEEE >> >>> 802.11: authenticated >> >>> Sat Oct 29 10:43:15 2016 daemon.info hostapd: wlan1: STA >> >>> 70:12:34:56:78:9a >> >>> IEEE >> >>> 802.11: associated (aid 2) >> >>> Sat Oct 29 10:43:15 2016 daemon.info hostapd: wlan1: STA >> >>> 70:12:34:56:78:9a >> >>> RADIUS: starting accounting session D1227001A194DA09 >> >>> Sat Oct 29 10:43:15 2016 daemon.info hostapd: wlan1: STA >> >>> 70:12:34:56:78:9a >> >>> WPA: >> >>> pairwise key handshake completed (RSN) >> >>> Sat Oct 29 10:43:31 2016 daemon.info hostapd: wlan1: STA >> >>> a0:12:34:56:78:9a >> >>> IEEE >> >>> 802.11: authenticated >> >>> Sat Oct 29 10:43:31 2016 daemon.info hostapd: wlan1: STA >> >>> a0:12:34:56:78:9a >> >>> IEEE >> >>> 802.11: associated (aid 3) >> >>> Sat Oct 29 10:43:31 2016 daemon.info hostapd: wlan1: STA >> >>> a0:12:34:56:78:9a >> >>> RADIUS: starting accounting session 92084E55AFE512B3 >> >>> Sat Oct 29 10:43:31 2016 daemon.info hostapd: wlan1: STA >> >>> a0:12:34:56:78:9a >> >>> WPA: >> >>> pairwise key handshake completed (RSN) >> >>> Sat Oct 29 10:48:02 2016 daemon.info hostapd: wlan0: STA >> >>> a0:12:34:56:78:9a >> >>> IEEE >> >>> 802.11: disassociated due to inactivity >> >>> Sat Oct 29 10:48:05 2016 kern.warn kernel: [117935.165013] ath10k_pci >> >>> 0000:01:00.0: failed to install key for vdev 0 peer a0:12:34:56:78:9a: >> -145 >> >>> Sat Oct 29 10:48:05 2016 kern.err kernel: [117935.174193] wlan0: failed >> >>> to >> >>> remove key (0, a0:12:34:56:78:9a) from hardware (-145) >> >>> Sat Oct 29 10:48:05 2016 daemon.info hostapd: wlan0: STA >> >>> 70:12:34:56:78:9a >> >>> IEEE >> >>> 802.11: disassociated due to inactivity >> >>> Sat Oct 29 10:48:08 2016 kern.warn kernel: [117938.174996] ath10k_pci >> >>> 0000:01:00.0: failed to install key for vdev 0 peer 70:12:34:56:78:9a: >> >>> -11 >> >>> Sat Oct 29 10:48:08 2016 kern.err kernel: [117938.184092] wlan0: failed >> >>> to >> >>> remove key (0, 70:12:34:56:78:9a) from hardware (-11) >> >>> Sat Oct 29 10:48:08 2016 daemon.info hostapd: wlan0: STA >> >>> a0:12:34:56:78:9a >> >>> IEEE >> >>> 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE) >> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.193251] ath10k_pci >> >>> 0000:01:00.0: cipher 0 is not supported >> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.199320] ath10k_pci >> >>> 0000:01:00.0: failed to remove peer wep key 0: -122 >> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.206409] ath10k_pci >> >>> 0000:01:00.0: failed to clear all peer wep keys for vdev 0: -122 >> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.214621] ath10k_pci >> >>> 0000:01:00.0: failed to disassociate station: a0:12:34:56:78:9a vdev 0: >> -122 >> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.223892] ------------[ >> cut >> >>> here ]------------ >> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.228706] WARNING: CPU: >> >>> 0 >> >>> PID: >> >>> 1885 at compat-wireless-2016-10-08/net/mac80211/sta_info.c:956 0x87587050 >> >>> [mac80211@87580000+0x5f500]() >> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.241226] Modules linked >> in: >> >>> pppoe ppp_async iptable_nat ath9k pppox ppp_generic nf_nat_ipv4 >> >>> nf_conntrack_ipv6 nf_conntrack_ipv4 ipt_REJECT ipt_MASQUERADE >> >>> ax88179_178a >> >>> ath9k_common xt_time xt_tcpudp xt_tcpmss xt_statistic xt_state xt_recent >> >>> xt_nat >> >>> xt_multiport xt_mark xt_mac xt_limit xt_length xt_id xt_hl xt_helper >> xt_ecn >> >>> xt_dscp xt_conntrack xt_connmark xt_connlimit xt_connbytes xt_comment >> >>> xt_TCPMSS >> >>> xt_REDIRECT xt_LOG xt_HL xt_DSCP xt_CT xt_CLASSIFY usbnet Sat Oct 29 >> 10:48:09 >> >>> 2016 kern.warn kernel: [117938.348645] CPU: 0 PID: 1885 Comm: hostapd >> >>> Tainted: >> >>> G W 4.4.26 #0 >> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.356067] Stack : >> 8036cff4 >> >>> 00000000 00000001 803c0000 00000000 00000000 00000000 00000000 >> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.356067] 00000000 >> >>> 00000000 >> >>> 00000000 00000000 00000000 00000000 00000000 00000000 >> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.356067] 00000000 >> >>> 00000000 >> >>> 00000000 00000000 00000000 00000000 00000000 00000000 >> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.356067] 00000000 >> >>> 00000000 >> >>> 00000000 00000000 00000000 00000000 00000000 00000000 >> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.356067] 00000000 >> >>> 00000000 >> >>> 00000000 00000000 00000000 00000000 00000000 00000000 >> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.356067] ... >> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.392511] Call >> >>> Trace:[<800716f0>] 0x800716f0 >> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.397147] [<800716f0>] >> >>> 0x800716f0 >> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.400770] [<8008144c>] >> >>> 0x8008144c >> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.404414] [<87587050>] >> >>> 0x87587050 [mac80211@87580000+0x5f500] >> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.410531] [<80081504>] >> >>> 0x80081504 >> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.414184] [<87587050>] >> >>> 0x87587050 [mac80211@87580000+0x5f500] >> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.420297] [<8759cb40>] >> >>> 0x8759cb40 [mac80211@87580000+0x5f500] >> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.426431] [<87587188>] >> >>> 0x87587188 [mac80211@87580000+0x5f500] >> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.432531] [<875849b4>] >> >>> 0x875849b4 [mac80211@87580000+0x5f500] >> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.438629] [<801018e4>] >> >>> 0x801018e4 >> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.442276] [<87587238>] >> >>> 0x87587238 [mac80211@87580000+0x5f500] >> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.448406] [<874cc114>] >> >>> 0x874cc114 [cfg80211@874c0000+0x35b60] >> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.454516] [<80293074>] >> >>> 0x80293074 >> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.458147] [<80291900>] >> >>> 0x80291900 >> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.461822] [<80292df8>] >> >>> 0x80292df8 >> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.465461] [<80292238>] >> >>> 0x80292238 >> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.469092] [<800a15d0>] >> >>> 0x800a15d0 >> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.472726] [<80292de0>] >> >>> 0x80292de0 >> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.476371] [<80257794>] >> >>> 0x80257794 >> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.480002] [<80291aa0>] >> >>> 0x80291aa0 >> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.483630] [<80256c90>] >> >>> 0x80256c90 >> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.487280] [<80292004>] >> >>> 0x80292004 >> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.490908] [<801b5304>] >> >>> 0x801b5304 >> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.494541] [<8025b478>] >> >>> 0x8025b478 >> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.498198] [<8024d0e4>] >> >>> 0x8024d0e4 >> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.501840] [<8024e4f8>] >> >>> 0x8024e4f8 >> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.505492] [<8027e338>] >> >>> 0x8027e338 >> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.509121] [<802e8244>] >> >>> 0x802e8244 >> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.512780] [<8011aa58>] >> >>> 0x8011aa58 >> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.516413] [<8011ae3c>] >> >>> 0x8011ae3c >> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.520043] [<8011acd4>] >> >>> 0x8011acd4 >> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.523697] [<80117a10>] >> >>> 0x80117a10 >> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.527352] [<8024f424>] >> >>> 0x8024f424 >> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.530981] [<801059e8>] >> >>> 0x801059e8 >> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.534625] [<8006295c>] >> >>> 0x8006295c >> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.538265] >> >>> Sat Oct 29 10:48:09 2016 kern.warn kernel: [117938.539870] ---[ end trace >> >>> 2c07f06df2595aa6 ]--- >> >>> Sat Oct 29 10:48:12 2016 kern.warn kernel: [117941.534956] ath10k_pci >> >>> 0000:01:00.0: failed to delete peer a0:12:34:56:78:9a for vdev 0: -11 >> >>> Sat Oct 29 10:48:12 2016 kern.warn kernel: [117941.543716] ath10k_pci >> >>> 0000:01:00.0: found sta peer a0:12:34:56:78:9a (ptr 86ebf400 id 196) >> >>> entry >> on >> >>> vdev 0 after it was supposedly removed >> >>> Sat Oct 29 10:48:12 2016 daemon.info hostapd: wlan0: STA >> >>> 70:12:34:56:78:9a >> >>> IEEE >> >>> 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE) >> >>> Sat Oct 29 10:48:12 2016 kern.warn kernel: [117941.558962] ath10k_pci >> >>> 0000:01:00.0: cipher 0 is not supported >> >>> Sat Oct 29 10:48:12 2016 kern.warn kernel: [117941.565049] ath10k_pci >> >>> 0000:01:00.0: failed to remove peer wep key 0: -122 >> >>> Sat Oct 29 10:48:15 2016 kern.warn kernel: [117944.564917] ath10k_warn: 2 >> >>> callbacks suppressed >> >>> Sat Oct 29 10:48:15 2016 kern.warn kernel: [117944.569617] ath10k_pci >> >>> 0000:01:00.0: failed to delete peer 70:12:34:56:78:9a for vdev 0: -11 >> >>> Sat Oct 29 10:48:15 2016 kern.warn kernel: [117944.578309] ath10k_pci >> >>> 0000:01:00.0: found sta peer 70:12:34:56:78:9a (ptr 86320c00 id 251) >> >>> entry >> on >> >>> vdev 0 after it was supposedly removed >> >>> Sat Oct 29 10:48:18 2016 kern.warn kernel: [117947.584908] ath10k_pci >> >>> 0000:01:00.0: failed to set beacon mode for vdev 0: -11 >> >>> Sat Oct 29 10:48:21 2016 kern.warn kernel: [117950.584876] ath10k_pci >> >>> 0000:01:00.0: failed to set dtim period for vdev 0: -11 >> >>> Sat Oct 29 10:48:24 2016 kern.warn kernel: [117953.594843] ath10k_pci >> >>> 0000:01:00.0: failed to recalculate rts/cts prot for vdev 0: -11 >> >>> Sat Oct 29 10:48:27 2016 kern.warn kernel: [117956.594833] ath10k_pci >> >>> 0000:01:00.0: failed to set protection mode 0 on vdev 0: -11 >> >>> Sat Oct 29 10:48:30 2016 kern.warn kernel: [117959.594805] ath10k_pci >> >>> 0000:01:00.0: failed to set preamble for vdev 0: -11 >> >>> Sat Oct 29 10:52:57 2016 daemon.info hostapd: wlan1: STA >> >>> 00:12:34:56:78:9a >> >>> WPA: >> >>> group key handshake completed (RSN) >> >>> Sat Oct 29 10:52:57 2016 daemon.info hostapd: wlan1: STA >> >>> a0:12:34:56:78:9a >> >>> WPA: >> >>> group key handshake completed (RSN) >> >>> Sat Oct 29 10:53:00 2016 kern.warn kernel: [118229.632250] ath10k_pci >> >>> 0000:01:00.0: failed to install key for vdev 0 peer 30:12:34:56:78:9a: >> >>> -11 >> >>> Sat Oct 29 10:53:00 2016 kern.err kernel: [118229.641421] wlan0: failed >> >>> to >> >>> remove key (2, ff:ff:ff:ff:ff:ff) from hardware (-11) >> >>> Sat Oct 29 10:53:03 2016 kern.warn kernel: [118232.642204] ath10k_pci >> >>> 0000:01:00.0: failed to install key for vdev 0 peer 30:12:34:56:78:9a: >> >>> -11 >> >>> Sat Oct 29 10:53:03 2016 kern.err kernel: [118232.651309] wlan0: failed >> >>> to >> >>> set >> >>> key (2, ff:ff:ff:ff:ff:ff) to hardware (-11) >> >>> Sat Oct 29 10:53:08 2016 daemon.info hostapd: wlan1: STA >> >>> 70:12:34:56:78:9a >> >>> IEEE >> >>> 802.11: deauthenticated due to local deauth request >> >>> Sat Oct 29 10:53:11 2016 daemon.info hostapd: wlan1: STA >> >>> 70:12:34:56:78:9a >> >>> IEEE >> >>> 802.11: authenticated >> >>> Sat Oct 29 10:53:11 2016 daemon.info hostapd: wlan1: STA >> >>> 70:12:34:56:78:9a >> >>> IEEE >> >>> 802.11: associated (aid 2) >> >>> Sat Oct 29 10:53:11 2016 daemon.info hostapd: wlan1: STA >> >>> 70:12:34:56:78:9a >> >>> RADIUS: starting accounting session 56977F3FD253EA9C >> >>> Sat Oct 29 10:53:11 2016 daemon.info hostapd: wlan1: STA >> >>> 70:12:34:56:78:9a >> >>> WPA: >> >>> pairwise key handshake completed (RSN) >> >>> >> >> >> >> >> >> _______________________________________________ >> >> ath10k mailing list >> >> ath...@lists.infradead.org >> >> http://lists.infradead.org/mailman/listinfo/ath10k >> > >> >> >> _______________________________________________ >> ath10k mailing list >> ath...@lists.infradead.org >> http://lists.infradead.org/mailman/listinfo/ath10k > _______________________________________________ Lede-dev mailing list Lede-dev@lists.infradead.org http://lists.infradead.org/mailman/listinfo/lede-dev