[FS#3486] WARNING: ath10k-4.19/htt_rx.c:1206 0xbf3b1be0 [ath10k_core at bf394000+0x57000], 2.4GHz no longer works

OpenWrt Bugs openwrt-bugs at lists.openwrt.org
Thu Dec 3 14:13:15 EST 2020


THIS IS AN AUTOMATED MESSAGE, DO NOT REPLY.

A new Flyspray task has been opened.  Details are below. 

User who did this - Victor Sergienko (singalen) 

Attached to Project - OpenWrt/LEDE Project
Summary - WARNING: ath10k-4.19/htt_rx.c:1206 0xbf3b1be0 [ath10k_core at bf394000+0x57000], 2.4GHz no longer works
Task Type - Bug Report
Category - Kernel
Status - Unconfirmed
Assigned To - 
Operating System - All
Severity - Low
Priority - Very Low
Reported Version - openwrt-19.07
Due in Version - Undecided
Due Date - Undecided
Details - Supply the following if possible:
 - Device problem occurs on: Netgear R7800

 - Software versions of OpenWrt/LEDE release, packages, etc:
cat /etc/*-release
NAME="OpenWrt"
VERSION="19.07.3"
ID="openwrt"
ID_LIKE="lede openwrt"
PRETTY_NAME="OpenWrt 19.07.3"
VERSION_ID="19.07.3"
HOME_URL="https://openwrt.org/"
BUG_URL="https://bugs.openwrt.org/"
SUPPORT_URL="https://forum.openwrt.org/"
BUILD_ID="r11063-85e04e9f46"
OPENWRT_BOARD="ipq806x/generic"
OPENWRT_ARCH="arm_cortex-a15_neon-vfpv4"
OPENWRT_TAINTS=""
OPENWRT_DEVICE_MANUFACTURER="OpenWrt"
OPENWRT_DEVICE_MANUFACTURER_URL="https://openwrt.org/"
OPENWRT_DEVICE_PRODUCT="Generic"
OPENWRT_DEVICE_REVISION="v0"
OPENWRT_RELEASE="OpenWrt 19.07.3 r11063-85e04e9f46"

 - Steps to reproduce:
Cannot, sorry. It happened in the night, after a few months of uptime. I can only analyze it post factum.

I have this in the dmesg log:

[ 4778.037462] ath10k_pci 0001:01:00.0: Invalid VHT mcs 15 peer stats
[25912.740536] conntrack: generic helper won't handle protocol 47. Please consider loading the specific helper module.
[63498.886948] ath10k_pci 0001:01:00.0: Invalid peer id 13 or peer stats buffer, peer:   (null)  sta:   (null)
[290864.886375] ------------[ cut here ]------------
[290864.886409] WARNING: CPU: 0 PID: 0 at /builder/shared-workdir/build/build_dir/target-arm_cortex-a15+neon-vfpv4_musl_eabi/linux-ipq806x_generic/ath10k-ct-regular/ath10k-ct-2019-09-09-5e8cd86f/ath10k-4.19/htt_rx.c:1206 0xbf3b1be0 [ath10k_core at bf394000+0x57000]
[290864.890588] Modules linked in: pppoe ppp_async ath10k_pci ath10k_core ath pppox ppp_generic nf_conntrack_ipv6 mac80211 iptable_nat ipt_REJECT ipt_MASQUERADE cfg80211 xt_time xt_tcpudp xt_tcpmss xt_statistic xt_state xt_recent xt_nat xt_multiport xt_mark xt_mac xt_limit xt_length xt_hl xt_helper xt_ecn xt_dscp xt_conntrack xt_connmark xt_connlimit xt_connbytes xt_comment xt_TCPMSS xt_REDIRECT xt_LOG xt_HL xt_FLOWOFFLOAD xt_DSCP xt_CT xt_CLASSIFY slhc nf_reject_ipv4 nf_nat_redirect nf_nat_masquerade_ipv4 nf_conntrack_ipv4 nf_nat_ipv4 nf_nat nf_log_ipv4 nf_flow_table_hw nf_flow_table nf_defrag_ipv6 nf_defrag_ipv4 nf_conntrack_rtcache iptable_raw iptable_mangle iptable_filter ipt_ECN ip_tables crc_ccitt compat sch_cake nf_conntrack sch_tbf sch_ingress sch_htb sch_hfsc em_u32 cls_u32 cls_tcindex cls_route
[290864.961841]  cls_matchall cls_fw cls_flow cls_basic act_skbedit act_mirred ledtrig_usbport nf_log_ipv6 nf_log_common ip6table_mangle ip6table_filter ip6_tables ip6t_REJECT x_tables nf_reject_ipv6 ifb tun leds_gpio xhci_plat_hcd xhci_pci xhci_hcd dwc3 dwc3_of_simple ohci_platform ohci_hcd phy_qcom_dwc3 ahci ehci_platform sd_mod ahci_platform libahci_platform libahci libata scsi_mod ehci_hcd gpio_button_hotplug
[290864.998007] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 4.14.180 #0
[290865.020175] Hardware name: Generic DT based system
[290865.026256] Function entered at [] from []
[290865.031028] Function entered at [] from []
[290865.036931] Function entered at [] from []
[290865.042834] Function entered at [] from []
[290865.048734] Function entered at [] from []
[290865.054681] Function entered at [] from []
[290865.060543] Function entered at [] from []
[290865.066444] Function entered at [] from []
[290865.072359] Function entered at [] from []
[290865.078250] Function entered at [] from []
[290865.084152] Function entered at [] from []
[290865.090055] Function entered at [] from []
[290865.095959] Function entered at [] from []
[290865.101859] Function entered at [] from []
[290865.107763] Exception stack(0xc0a01f48 to 0xc0a01f90)
[290865.113675] 1f40:                   00000001 00000000 00000000 c0315100 ffffe000 c0a03cb8
[290865.118894] 1f60: c0a03c6c 00000000 00000000 c092ea28 00000000 00000000 c0a01f90 c0a01f98
[290865.127132] 1f80: c030854c c0308550 60000013 ffffffff
[290865.135368] Function entered at [] from []
[290865.140489] Function entered at [] from []
[290865.146306] Function entered at [] from []
[290865.152206] Function entered at [] from []
[290865.158207] ---[ end trace e3efdf73eb89c8f9 ]---
[2515308.545406] ath10k_pci 0001:01:00.0: failed to increase tx pending count: -16, dropping

...then the last line repeats about a hundred times.

Clients cannot connect to 2.4GHz network.

# iwinfo
wlan0     ESSID: "redacted5"
          Access Point: DC:EF:09:DE:BD:B2
          Mode: Master  Channel: 36 (5.180 GHz)
          Tx-Power: 23 dBm  Link Quality: 52/70
          Signal: -58 dBm  Noise: -108 dBm
          Bit Rate: 753.4 MBit/s
          Encryption: WPA2 PSK (CCMP)
          Type: nl80211  HW Mode(s): 802.11nac
          Hardware: 168C:0046 168C:CAFE [Qualcomm Atheros QCA9984]
          TX power offset: none
          Frequency offset: none
          Supports VAPs: yes  PHY name: phy0

wlan1     ESSID: "redacted24"
          Access Point: DC:EF:09:DE:BD:B3
          Mode: Master  Channel: 11 (2.462 GHz)
          Tx-Power: 30 dBm  Link Quality: unknown/70
          Signal: unknown  Noise: -101 dBm
          Bit Rate: unknown
          Encryption: mixed WPA/WPA2 PSK (CCMP)
          Type: nl80211  HW Mode(s): 802.11bgn
          Hardware: 168C:0046 168C:CAFE [Qualcomm Atheros QCA9984]
          TX power offset: none
          Frequency offset: none
          Supports VAPs: yes  PHY name: phy1



More information can be found at the following URL:
https://bugs.openwrt.org/index.php?do=details&task_id=3486

You are receiving this message because you have requested it from the Flyspray bugtracking system.  If you did not expect this message or don't want to receive mails in future, you can change your notification settings at the URL shown above.



More information about the openwrt-bugs mailing list