[FS#3684] iPhone regularly takes down wifi for all clients

OpenWrt Bugs openwrt-bugs at lists.openwrt.org
Mon Mar 15 17:05:30 GMT 2021


THIS IS AN AUTOMATED MESSAGE, DO NOT REPLY.

A new Flyspray task has been opened.  Details are below. 

User who did this - roysjosh (roysjosh) 

Attached to Project - OpenWrt/LEDE Project
Summary - iPhone regularly takes down wifi for all clients
Task Type - Bug Report
Category - Base system
Status - Unconfirmed
Assigned To - 
Operating System - All
Severity - Low
Priority - Very Low
Reported Version - Trunk
Due in Version - Undecided
Due Date - Undecided
Details - I have two APs: ASUS RT-ACRH13 and Linksys EA8300. They are both running OpenWrt 21.02-SNAPSHOT r15879-3b6c93298c. Over the past week, the wifi has gone down regularly for all clients. A network restart or reboot brings wifi back. I have started capturing the system log and I noticed that the random MAC used by my work iPhone (e2:41:65:b2:93:16) is the last client that hostapd logs before things go bad. I have disabled wifi on the iPhone and am now monitoring to see if the problem persists.

RT-ACRH13

Fri Mar 12 21:31:37 2021 daemon.notice hostapd: wlan0: AP-STA-POSSIBLE-PSK-MISMATCH e2:41:65:b2:93:16
Fri Mar 12 21:31:38 2021 kern.warn kernel: [188414.593384] ath10k_ahb a800000.wifi: could not get mac80211 beacon, vdev_id: 0 addr: 70:4d:7b:XX:XX:XX
Fri Mar 12 21:31:38 2021 daemon.notice netifd: Network device 'wlan1' link is down
Fri Mar 12 21:31:38 2021 kern.info kernel: [188414.597425] br-lan: port 3(wlan1) entered disabled state
Fri Mar 12 21:31:38 2021 kern.warn kernel: [188414.695768] ath10k_ahb a800000.wifi: could not get mac80211 beacon, vdev_id: 0 addr: 70:4d:7b:XX:XX:XX
Fri Mar 12 21:31:38 2021 kern.info kernel: [188414.708986] ath10k_ahb a800000.wifi: mac flush null vif, drop 0 queues 0xffff
Fri Mar 12 21:31:38 2021 kern.info kernel: [188414.840904] ath10k_ahb a000000.wifi: mac flush null vif, drop 0 queues 0xffff
Fri Mar 12 21:31:38 2021 daemon.notice netifd: radio0 (8663): Command failed: Not found
Fri Mar 12 21:31:38 2021 daemon.notice netifd: radio1 (8664): Command failed: Not found
Fri Mar 12 21:31:38 2021 kern.warn kernel: [188415.073934] ath10k_ahb a000000.wifi: peer-unmap-event: unknown peer id 0
Fri Mar 12 21:31:38 2021 kern.warn kernel: [188415.074039] ath10k_ahb a000000.wifi: peer-unmap-event: unknown peer id 0
Fri Mar 12 21:31:38 2021 daemon.notice netifd: Network device 'wlan0' link is down
Fri Mar 12 21:31:38 2021 kern.info kernel: [188415.083250] br-lan: port 2(wlan0) entered disabled state
Fri Mar 12 21:31:38 2021 kern.warn kernel: [188415.090999] ath10k_ahb a800000.wifi: peer-unmap-event: unknown peer id 0
Fri Mar 12 21:31:38 2021 kern.warn kernel: [188415.091991] ath10k_ahb a800000.wifi: peer-unmap-event: unknown peer id 0
Fri Mar 12 21:31:38 2021 kern.info kernel: [188415.102021] br-lan: port 3(wlan1) entered disabled state
Fri Mar 12 21:31:38 2021 daemon.debug dnsmasq[970]: stopped listening on wlan1(#27): fe80::724d:7bff:feXX:XXXX%wlan1 port 53
Fri Mar 12 21:31:38 2021 daemon.debug dnsmasq[970]: stopped listening on wlan0(#26): fe80::724d:7bff:feXX:XXXX%wlan0 port 53
Fri Mar 12 21:31:38 2021 kern.info kernel: [188415.173683] device wlan0 left promiscuous mode
Fri Mar 12 21:31:38 2021 kern.info kernel: [188415.173981] br-lan: port 2(wlan0) entered disabled state
Fri Mar 12 21:31:39 2021 kern.info kernel: [188415.354206] device wlan1 left promiscuous mode
Fri Mar 12 21:31:39 2021 kern.info kernel: [188415.354496] br-lan: port 3(wlan1) entered disabled state


EA8300

Sat Mar 13 17:35:55 2021 daemon.err hostapd: nl80211: kernel reports: key addition failed
Sat Mar 13 17:35:55 2021 daemon.notice hostapd: wlan2: STA-OPMODE-N_SS-CHANGED e2:41:65:b2:93:16 2
Sat Mar 13 17:35:55 2021 daemon.info hostapd: wlan2: STA e2:41:65:b2:93:16 IEEE 802.11: associated (aid 6)
Sat Mar 13 17:35:55 2021 daemon.notice hostapd: wlan2: AP-STA-CONNECTED e2:41:65:b2:93:16
Sat Mar 13 17:35:55 2021 daemon.notice hostapd: wlan1: Prune association for e2:41:65:b2:93:16
Sat Mar 13 17:35:55 2021 daemon.notice hostapd: wlan1: AP-STA-DISCONNECTED e2:41:65:b2:93:16
Sat Mar 13 17:36:01 2021 daemon.err hostapd: nl80211: kernel reports: key addition failed
Sat Mar 13 17:36:01 2021 daemon.info hostapd: wlan1: STA e2:41:65:b2:93:16 IEEE 802.11: associated (aid 2)
Sat Mar 13 17:36:01 2021 daemon.notice hostapd: wlan1: AP-STA-CONNECTED e2:41:65:b2:93:16
Sat Mar 13 17:36:01 2021 daemon.notice hostapd: wlan2: Prune association for e2:41:65:b2:93:16
Sat Mar 13 17:36:01 2021 daemon.notice hostapd: wlan2: AP-STA-DISCONNECTED e2:41:65:b2:93:16
Sat Mar 13 17:36:31 2021 daemon.info hostapd: wlan2: STA e2:41:65:b2:93:16 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Sat Mar 13 17:45:36 2021 daemon.info hostapd: wlan2: STA e2:41:65:b2:93:16 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Sat Mar 13 17:46:49 2021 daemon.info hostapd: wlan2: STA e2:41:65:b2:93:16 IEEE 802.11: authenticated
Sat Mar 13 17:46:49 2021 daemon.notice hostapd: wlan2: STA-OPMODE-N_SS-CHANGED e2:41:65:b2:93:16 2
Sat Mar 13 17:46:49 2021 daemon.info hostapd: wlan2: STA e2:41:65:b2:93:16 IEEE 802.11: associated (aid 6)
Sat Mar 13 17:46:49 2021 daemon.notice hostapd: wlan1: Prune association for e2:41:65:b2:93:16
Sat Mar 13 17:46:49 2021 daemon.notice hostapd: wlan1: AP-STA-DISCONNECTED e2:41:65:b2:93:16
Sat Mar 13 17:46:58 2021 daemon.info hostapd: wlan2: STA e2:41:65:b2:93:16 IEEE 802.11: deauthenticated due to local deauth request
Sat Mar 13 17:47:19 2021 daemon.info hostapd: wlan1: STA e2:41:65:b2:93:16 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Sat Mar 13 17:48:03 2021 daemon.info hostapd: wlan2: STA e2:41:65:b2:93:16 IEEE 802.11: authenticated
Sat Mar 13 17:48:03 2021 daemon.notice hostapd: wlan2: STA-OPMODE-N_SS-CHANGED e2:41:65:b2:93:16 2
Sat Mar 13 17:48:03 2021 daemon.info hostapd: wlan2: STA e2:41:65:b2:93:16 IEEE 802.11: associated (aid 6)
Sat Mar 13 17:48:03 2021 daemon.notice hostapd: wlan2: AP-STA-POSSIBLE-PSK-MISMATCH e2:41:65:b2:93:16
Sat Mar 13 17:48:04 2021 kern.info kernel: [72106.874123] br-lan: port 4(wlan1) entered disabled state
Sat Mar 13 17:48:04 2021 daemon.notice netifd: Network device 'wlan1' link is down
Sat Mar 13 17:48:04 2021 kern.warn kernel: [72106.912253] ath10k_ahb a000000.wifi: could not get mac80211 beacon, vdev_id: 0 addr: 58:ef:68:XX:XX:XX
Sat Mar 13 17:48:04 2021 kern.info kernel: [72106.933538] ath10k_ahb a000000.wifi: mac flush null vif, drop 0 queues 0xffff
Sat Mar 13 17:48:04 2021 kern.warn kernel: [72106.986914] ath10k_ahb a800000.wifi: could not get mac80211 beacon, vdev_id: 0 addr: 58:ef:68:XX:XX:XX
Sat Mar 13 17:48:04 2021 kern.info kernel: [72106.996480] ath10k_pci 0000:01:00.0: mac flush null vif, drop 0 queues 0xffff
Sat Mar 13 17:48:04 2021 kern.info kernel: [72107.000694] ath10k_ahb a800000.wifi: mac flush null vif, drop 0 queues 0xffff
Sat Mar 13 17:48:05 2021 daemon.notice netifd: radio0 (5235): Command failed: Not found
Sat Mar 13 17:48:05 2021 daemon.notice netifd: radio1 (5236): Command failed: Not found
Sat Mar 13 17:48:05 2021 daemon.notice netifd: radio2 (5237): Command failed: Not found
Sat Mar 13 17:48:05 2021 kern.warn kernel: [72107.622822] ath10k_ahb a000000.wifi: peer-unmap-event: unknown peer id 0
Sat Mar 13 17:48:05 2021 kern.warn kernel: [72107.622928] ath10k_ahb a000000.wifi: peer-unmap-event: unknown peer id 0
Sat Mar 13 17:48:05 2021 kern.info kernel: [72107.635916] br-lan: port 4(wlan1) entered disabled state
Sat Mar 13 17:48:05 2021 kern.warn kernel: [72107.640482] ath10k_ahb a800000.wifi: peer-unmap-event: unknown peer id 0
Sat Mar 13 17:48:05 2021 kern.warn kernel: [72107.640688] ath10k_ahb a800000.wifi: peer-unmap-event: unknown peer id 0
Sat Mar 13 17:48:05 2021 daemon.notice netifd: Network device 'wlan2' link is down
Sat Mar 13 17:48:05 2021 kern.info kernel: [72107.654594] br-lan: port 3(wlan2) entered disabled state
Sat Mar 13 17:48:05 2021 kern.warn kernel: [72107.659629] ath10k_pci 0000:01:00.0: peer-unmap-event: unknown peer id 0
Sat Mar 13 17:48:05 2021 kern.warn kernel: [72107.659672] ath10k_pci 0000:01:00.0: peer-unmap-event: unknown peer id 0
Sat Mar 13 17:48:05 2021 daemon.notice netifd: Network device 'wlan0' link is down
Sat Mar 13 17:48:05 2021 kern.info kernel: [72107.763341] br-lan: port 2(wlan0) entered disabled state
Sat Mar 13 17:48:05 2021 kern.info kernel: [72107.814720] device wlan1 left promiscuous mode
Sat Mar 13 17:48:05 2021 kern.info kernel: [72107.815010] br-lan: port 4(wlan1) entered disabled state
Sat Mar 13 17:48:05 2021 kern.info kernel: [72107.989304] device wlan2 left promiscuous mode
Sat Mar 13 17:48:05 2021 kern.info kernel: [72107.989350] br-lan: port 3(wlan2) entered disabled state
Sat Mar 13 17:48:06 2021 kern.info kernel: [72108.184159] device wlan0 left promiscuous mode
Sat Mar 13 17:48:06 2021 kern.info kernel: [72108.184445] br-lan: port 2(wlan0) entered disabled state
Sat Mar 13 17:48:06 2021 daemon.debug dnsmasq[880]: stopped listening on wlan2(#19): fe80::5aef:68ff:feXX:XXXX port 53
Sat Mar 13 17:48:06 2021 daemon.debug dnsmasq[880]: stopped listening on wlan1(#20): fe80::5aef:68ff:feXX:XXXX port 53
Sat Mar 13 17:48:06 2021 daemon.debug dnsmasq[880]: stopped listening on wlan0(#18): fe80::58ef:68ff:feXX:XXXX port 53


EA8300

Mon Mar 15 11:45:55 2021 daemon.notice hostapd: wlan1: STA e2:41:65:b2:93:16 IEEE 802.11: did not acknowledge authentication response
Mon Mar 15 11:50:55 2021 daemon.info hostapd: wlan1: STA e2:41:65:b2:93:16 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Mon Mar 15 11:51:17 2021 daemon.info hostapd: wlan1: STA e2:41:65:b2:93:16 IEEE 802.11: authenticated
Mon Mar 15 11:51:17 2021 daemon.info hostapd: wlan1: STA e2:41:65:b2:93:16 IEEE 802.11: associated (aid 5)
Mon Mar 15 11:51:17 2021 daemon.notice hostapd: wlan0: Prune association for e2:41:65:b2:93:16
Mon Mar 15 11:51:17 2021 daemon.notice hostapd: wlan0: AP-STA-DISCONNECTED e2:41:65:b2:93:16
Mon Mar 15 11:51:23 2021 daemon.info hostapd: wlan0: STA e2:41:65:b2:93:16 IEEE 802.11: authenticated
Mon Mar 15 11:51:23 2021 daemon.info hostapd: wlan0: STA e2:41:65:b2:93:16 IEEE 802.11: associated (aid 5)
Mon Mar 15 11:51:23 2021 daemon.notice hostapd: wlan0: AP-STA-POSSIBLE-PSK-MISMATCH e2:41:65:b2:93:16
Mon Mar 15 11:51:25 2021 daemon.notice netifd: Network device 'wlan0' link is down
Mon Mar 15 11:51:25 2021 kern.info kernel: [147350.898385] br-lan: port 4(wlan0) entered disabled state
Mon Mar 15 11:51:25 2021 kern.info kernel: [147350.961869] ath10k_pci 0000:01:00.0: mac flush null vif, drop 0 queues 0xffff
Mon Mar 15 11:51:25 2021 kern.warn kernel: [147351.052484] ath10k_ahb a000000.wifi: could not get mac80211 beacon, vdev_id: 0 addr: 58:ef:68:XX:XX:XX
Mon Mar 15 11:51:25 2021 kern.info kernel: [147351.056808] ath10k_ahb a000000.wifi: mac flush null vif, drop 0 queues 0xffff
Mon Mar 15 11:51:25 2021 kern.warn kernel: [147351.224554] ath10k_ahb a800000.wifi: could not get mac80211 beacon, vdev_id: 0 addr: 58:ef:68:XX:XX:XX
Mon Mar 15 11:51:25 2021 kern.info kernel: [147351.263288] ath10k_ahb a800000.wifi: mac flush null vif, drop 0 queues 0xffff
Mon Mar 15 11:51:25 2021 daemon.notice netifd: radio1 (6268): Command failed: Not found
Mon Mar 15 11:51:25 2021 daemon.notice netifd: radio0 (6269): Command failed: Not found
Mon Mar 15 11:51:25 2021 kern.warn kernel: [147351.589027] ath10k_ahb a800000.wifi: peer-unmap-event: unknown peer id 0
Mon Mar 15 11:51:25 2021 kern.warn kernel: [147351.589150] ath10k_ahb a800000.wifi: peer-unmap-event: unknown peer id 0
Mon Mar 15 11:51:25 2021 daemon.notice netifd: radio2 (6270): Command failed: Not found
Mon Mar 15 11:51:25 2021 daemon.notice netifd: Network device 'wlan2' link is down
Mon Mar 15 11:51:25 2021 kern.info kernel: [147351.624521] br-lan: port 3(wlan2) entered disabled state
Mon Mar 15 11:51:25 2021 kern.warn kernel: [147351.631381] ath10k_ahb a000000.wifi: peer-unmap-event: unknown peer id 0
Mon Mar 15 11:51:25 2021 kern.warn kernel: [147351.631479] ath10k_ahb a000000.wifi: peer-unmap-event: unknown peer id 0
Mon Mar 15 11:51:25 2021 daemon.notice netifd: Network device 'wlan1' link is down
Mon Mar 15 11:51:25 2021 kern.info kernel: [147351.679190] br-lan: port 2(wlan1) entered disabled state
Mon Mar 15 11:51:25 2021 kern.warn kernel: [147351.686048] ath10k_pci 0000:01:00.0: peer-unmap-event: unknown peer id 0
Mon Mar 15 11:51:25 2021 kern.warn kernel: [147351.686183] ath10k_pci 0000:01:00.0: peer-unmap-event: unknown peer id 0
Mon Mar 15 11:51:25 2021 daemon.debug dnsmasq[882]: stopped listening on wlan0(#19): fe80::58ef:68ff:feXX:XXXX%wlan0 port 53
Mon Mar 15 11:51:25 2021 daemon.debug dnsmasq[882]: stopped listening on wlan1(#18): fe80::5aef:68ff:feXX:XXXX%wlan1 port 53
Mon Mar 15 11:51:25 2021 daemon.debug dnsmasq[882]: stopped listening on wlan2(#17): fe80::5aef:68ff:feXX:XXXX%wlan2 port 53
Mon Mar 15 11:51:25 2021 kern.info kernel: [147351.791859] br-lan: port 4(wlan0) entered disabled state
Mon Mar 15 11:51:25 2021 kern.info kernel: [147351.841987] device wlan2 left promiscuous mode
Mon Mar 15 11:51:25 2021 kern.info kernel: [147351.842276] br-lan: port 3(wlan2) entered disabled state
Mon Mar 15 11:51:26 2021 kern.info kernel: [147352.017865] device wlan1 left promiscuous mode
Mon Mar 15 11:51:26 2021 kern.info kernel: [147352.017914] br-lan: port 2(wlan1) entered disabled state
Mon Mar 15 11:51:26 2021 kern.info kernel: [147352.162021] device wlan0 left promiscuous mode
Mon Mar 15 11:51:26 2021 kern.info kernel: [147352.162311] br-lan: port 4(wlan0) entered disabled state


/etc/config/wireless for both

config wifi-device 'radioX'
    option type 'mac80211'
    option hwmode '...' # e.g. 11a
    option path '...'
    option htmode '...' # e.g. VHT80
    option channel '...' # e.g. 149
    option country 'US'
    option txpower '...' # e.g. 23
    option cell_density '0'

config wifi-iface 'default_radioX'
    option device 'radioX'
    option network 'lan'
    option mode 'ap'
    option key 'XXX'
    option ieee80211r '1'
    option ft_psk_generate_local '1'
    option ssid 'XXX'
    option encryption 'psk2+ccmp'
    option ieee80211w '1'
    # https://forum.openwrt.org/t/802-11r-broken-in-recent-master-nl80211-attr-sta-vlan-errors/88888/3
    option ft_over_ds '0'


More information can be found at the following URL:
https://bugs.openwrt.org/index.php?do=details&task_id=3684

You are receiving this message because you have requested it from the Flyspray bugtracking system.  If you did not expect this message or don't want to receive mails in future, you can change your notification settings at the URL shown above.



More information about the openwrt-bugs mailing list