[FS#4036] Lenovo Newifi D1, cannot form a mesh over 2.4Ghz radio over channel 11, other channels work fine

OpenWrt Bugs openwrt-bugs at lists.openwrt.org
Mon Sep 13 18:24:10 PDT 2021


THIS IS AN AUTOMATED MESSAGE, DO NOT REPLY.

A new Flyspray task has been opened.  Details are below. 

User who did this - freezeheat (FreezeHeat) 

Attached to Project - OpenWrt/LEDE Project
Summary - Lenovo Newifi D1, cannot form a mesh over 2.4Ghz radio over channel 11, other channels work fine
Task Type - Bug Report
Category - Base system
Status - Unconfirmed
Assigned To - 
Operating System - All
Severity - Medium
Priority - Very Low
Reported Version - openwrt-21.02
Due in Version - Undecided
Due Date - Undecided
Details - - Problem:
It's not possible to form a mesh using the 11th channel of the 2.4Ghz radio using the Lenovo Newifi D1, even though 'iw dev' shows it should, the entire troubleshooting was documented over at: https://forum.openwrt.org/t/mesh-network-configuration-mesh-fails-batman/105260

- Device: Lenovo Newifi_D1
- Version: 21.02.0
- Packages:

base-files - 1432-r16279-5cc0535800
batctl-default - 2021.1-1
block-mount - 2021-01-04-c53b1882-1
busybox - 1.33.1-6
ca-bundle - 20210119-1
cgi-io - 2020-10-27-ab4c3471-19
dnsmasq - 2.85-8
dropbear - 2020.81-2
firewall - 2021-03-23-61db17ed-1
fstools - 2021-01-04-c53b1882-1
fwtool - 2019-11-12-8f7fe925-1
getrandom - 2020-10-25-9ef88681-2
hostapd-common - 2020-06-08-5a8b3662-35
iftop - 2018-10-03-77901c8c-2
ip6tables - 1.8.7-1
iptables - 1.8.7-1
irqbalance - 1.8.0-1
iw - 5.9-8fab0c9e-1
iwinfo - 2021-04-30-c45f0b58-2.1
jshn - 2021-05-16-b14c4688-2
jsonfilter - 2018-02-04-c7e938d6-1
kernel - 5.4.143-1-69ffa419aded4c8e863b9a419c27d933
kmod-batman-adv - 5.4.143+2021.1-4
kmod-cfg80211 - 5.4.143+5.10.42-1-1
kmod-crypto-acompress - 5.4.143-1
kmod-crypto-crc32 - 5.4.143-1
kmod-crypto-crc32c - 5.4.143-1
kmod-crypto-hash - 5.4.143-1
kmod-fs-ext4 - 5.4.143-1
kmod-fs-f2fs - 5.4.143-1
kmod-fs-vfat - 5.4.143-1
kmod-gpio-button-hotplug - 5.4.143-3
kmod-ip6tables - 5.4.143-1
kmod-ipt-conntrack - 5.4.143-1
kmod-ipt-core - 5.4.143-1
kmod-ipt-nat - 5.4.143-1
kmod-ipt-offload - 5.4.143-1
kmod-leds-gpio - 5.4.143-1
kmod-lib-crc-ccitt - 5.4.143-1
kmod-lib-crc16 - 5.4.143-1
kmod-lib-crc32c - 5.4.143-1
kmod-lib-lzo - 5.4.143-1
kmod-mac80211 - 5.4.143+5.10.42-1-1
kmod-mmc - 5.4.143-1
kmod-mt76-core - 5.4.143+2021-06-06-22b69033-4
kmod-mt7603 - 5.4.143+2021-06-06-22b69033-4
kmod-mt76x02-common - 5.4.143+2021-06-06-22b69033-4
kmod-mt76x2 - 5.4.143+2021-06-06-22b69033-4
kmod-mt76x2-common - 5.4.143+2021-06-06-22b69033-4
kmod-nf-conntrack - 5.4.143-1
kmod-nf-conntrack6 - 5.4.143-1
kmod-nf-flow - 5.4.143-1
kmod-nf-ipt - 5.4.143-1
kmod-nf-ipt6 - 5.4.143-1
kmod-nf-nat - 5.4.143-1
kmod-nf-reject - 5.4.143-1
kmod-nf-reject6 - 5.4.143-1
kmod-nls-base - 5.4.143-1
kmod-nls-cp437 - 5.4.143-1
kmod-nls-iso8859-1 - 5.4.143-1
kmod-nls-utf8 - 5.4.143-1
kmod-ppp - 5.4.143-1
kmod-pppoe - 5.4.143-1
kmod-pppox - 5.4.143-1
kmod-scsi-core - 5.4.143-1
kmod-sdhci - 5.4.143-1
kmod-sdhci-mt7620 - 5.4.143-1
kmod-slhc - 5.4.143-1
kmod-usb-core - 5.4.143-1
kmod-usb-ehci - 5.4.143-1
kmod-usb-ledtrig-usbport - 5.4.143-1
kmod-usb-storage - 5.4.143-1
kmod-usb-storage-uas - 5.4.143-1
kmod-usb2 - 5.4.143-1
kmod-zram - 5.4.143-1
libblobmsg-json20210516 - 2021-05-16-b14c4688-2
libc - 1.1.24-3
libgcc1 - 10.2.0-3
libip4tc2 - 1.8.7-1
libip6tc2 - 1.8.7-1
libiwinfo-data - 2021-04-30-c45f0b58-2.1
libiwinfo-lua - 2021-04-30-c45f0b58-2.1
libiwinfo20210430 - 2021-04-30-c45f0b58-2.1
libjson-c5 - 0.15-2
libjson-script20210516 - 2021-05-16-b14c4688-2
liblua5.1.5 - 5.1.5-9
liblucihttp-lua - 2021-06-11-3dc89af4-1
liblucihttp0 - 2021-06-11-3dc89af4-1
libncurses6 - 6.2-1
libnl-tiny1 - 2020-08-05-c291088f-2
libpcap1 - 1.9.1-3
libpthread - 1.1.24-3
librt - 1.1.24-3
libubox20210516 - 2021-05-16-b14c4688-2
libubus-lua - 2021-06-30-4fc532c8-2
libubus20210630 - 2021-06-30-4fc532c8-2
libuci20130104 - 2020-10-06-52bbc99f-5
libuclient20201210 - 2021-05-14-6a6011df-1
libustream-wolfssl20201210 - 2020-12-10-68d09243-1
libwolfssl4.7.0.66253b90 - 4.7.0-stable-2
libxtables12 - 1.8.7-1
logd - 2020-10-25-9ef88681-2
lua - 5.1.5-9
luci - git-20.074.84698-ead5e81
luci-app-firewall - git-21.244.20922-3b3c2e5
luci-app-opkg - git-21.079.58598-6639e31
luci-base - git-21.231.26241-422c175
luci-lib-base - git-20.232.39649-1f6dc29
luci-lib-ip - git-20.250.76529-62505bd
luci-lib-jsonc - git-19.317.29469-8da8f38
luci-lib-nixio - git-20.234.06894-c4a4e43
luci-mod-admin-full - git-19.253.48496-3f93650
luci-mod-network - git-21.243.25235-d9a228e
luci-mod-status - git-21.188.55036-eafe171
luci-mod-system - git-21.230.63964-c3580ee
luci-proto-ipv6 - git-21.148.49484-14511e5
luci-proto-ppp - git-21.163.64918-6c6559a
luci-ssl - git-20.244.36115-e10f954
luci-theme-bootstrap - git-21.164.71418-bd36169
mtd - 26
netifd - 2021-07-26-440eb064-1
odhcp6c - 2021-01-09-53f07e90-16
odhcpd-ipv6only - 2021-07-18-bc9d317f-3
openwrt-keyring - 2021-02-20-49283916-2
opkg - 2021-06-13-1bf042dd-1
ppp - 2.4.8.git-2020-10-03-3
ppp-mod-pppoe - 2.4.8.git-2020-10-03-3
procd - 2021-02-23-37eed131-1
px5g-wolfssl - 3
rpcd - 2021-03-11-ccb75178-1
rpcd-mod-file - 2021-03-11-ccb75178-1
rpcd-mod-iwinfo - 2021-03-11-ccb75178-1
rpcd-mod-luci - 20210614
rpcd-mod-rrdns - 20170710
terminfo - 6.2-1
ubi-utils - 2.1.2-1
ubox - 2020-10-25-9ef88681-2
ubus - 2021-06-30-4fc532c8-2
ubusd - 2021-06-30-4fc532c8-2
uci - 2020-10-06-52bbc99f-5
uclient-fetch - 2021-05-14-6a6011df-1
uhttpd - 2021-03-21-15346de8-1
uhttpd-mod-ubus - 2021-03-21-15346de8-1
urandom-seed - 3
urngd - 2020-01-21-c7f7b6b6-1
usign - 2020-05-23-f1f65026-1
wireless-regdb - 2021.04.21-1
wpad-wolfssl - 2020-06-08-5a8b3662-35
zram-swap - 8


- Steps to reproduce
1. Change WiFi 2.4Ghz radio channel to 11
2. Try to form a mesh with another device (R6220 was tested with it) using 2.4Ghz radio
3. 2.4Ghz mesh point interface will fail to join the mesh and "ip link" shows said interface isn't up.
4. Using a different channel (1 and 6 were tested) resolved the problem.

NOTE: I changed country codes from 00 to IN(which has no DFS and no limits) and to US, no changes.

- Logs:
Newifi D1 system log:

Wed Sep  8 14:28:44 2021 daemon.err wpa_supplicant[3766]: wlan0-1: Could not join mesh
Wed Sep  8 14:28:44 2021 daemon.notice wpa_supplicant[3766]: nl80211: deinit ifname=wlan0 disabled_11b_rates=0
Wed Sep  8 14:28:44 2021 kern.info kernel: [ 1519.626597] br-lan: port 5(wlan0) entered disabled state
Wed Sep  8 14:28:44 2021 kern.info kernel: [ 1519.655136] device wlan0 left promiscuous mode
Wed Sep  8 14:28:44 2021 kern.info kernel: [ 1519.659660] br-lan: port 5(wlan0) entered disabled state
Wed Sep  8 14:28:44 2021 daemon.notice wpa_supplicant[3766]: nl80211: deinit ifname=wlan0-1 disabled_11b_rates=0
Wed Sep  8 14:28:44 2021 kern.info kernel: [ 1519.812995] br-lan: port 6(wlan0-1) entered disabled state
Wed Sep  8 14:28:45 2021 kern.info kernel: [ 1520.867562] br-lan: port 6(wlan0-1) entered disabled state
Wed Sep  8 14:28:45 2021 kern.info kernel: [ 1520.903187] device wlan0-1 left promiscuous mode
Wed Sep  8 14:28:45 2021 kern.info kernel: [ 1520.907901] br-lan: port 6(wlan0-1) entered disabled state
Wed Sep  8 14:28:47 2021 daemon.notice netifd: radio0 (8260): command failed: Link has been severed (-67)
Wed Sep  8 14:28:47 2021 daemon.notice netifd: radio0 (8260): command failed: Link has been severed (-67)
Wed Sep  8 14:28:47 2021 kern.info kernel: [ 1522.390393] br-lan: port 5(wlan0) entered blocking state
Wed Sep  8 14:28:47 2021 kern.info kernel: [ 1522.395991] br-lan: port 5(wlan0) entered disabled state
Wed Sep  8 14:28:47 2021 kern.info kernel: [ 1522.402587] device wlan0 entered promiscuous mode
Wed Sep  8 14:28:47 2021 kern.info kernel: [ 1522.413285] br-lan: port 6(wlan0-1) entered blocking state
Wed Sep  8 14:28:47 2021 kern.info kernel: [ 1522.418904] br-lan: port 6(wlan0-1) entered disabled state
Wed Sep  8 14:28:47 2021 kern.info kernel: [ 1522.425376] device wlan0-1 entered promiscuous mode
Wed Sep  8 14:28:48 2021 daemon.notice wpa_supplicant[3766]: wlan0-1: leaving mesh
Wed Sep  8 14:28:48 2021 kern.info kernel: [ 1523.095183] br-lan: port 6(wlan0-1) entered disabled state
Wed Sep  8 14:28:49 2021 daemon.notice wpa_supplicant[3766]: nl80211: Failed to set interface into station mode
Wed Sep  8 14:28:49 2021 daemon.err wpa_supplicant[3766]: wlan0-1: mesh leave error=-134


Kernel log:

[ 1378.973986] device wlan0 left promiscuous mode
[ 1378.978502] br-lan: port 5(wlan0) entered disabled state
[ 1380.402899] br-lan: port 5(wlan0) entered blocking state
[ 1380.408339] br-lan: port 5(wlan0) entered disabled state
[ 1380.414510] device wlan0 entered promiscuous mode
[ 1380.424809] br-lan: port 6(wlan0-1) entered blocking state
[ 1380.430417] br-lan: port 6(wlan0-1) entered disabled state


More information can be found at the following URL:
https://bugs.openwrt.org/index.php?do=details&task_id=4036

You are receiving this message because you have requested it from the Flyspray bugtracking system.  If you did not expect this message or don't want to receive mails in future, you can change your notification settings at the URL shown above.



More information about the openwrt-bugs mailing list