Modify

Opened 4 years ago

Closed 4 years ago

Last modified 4 years ago

#15464 closed defect (fixed)

WR1043ND wifi stops working, ssid stays up

Reported by: anonymous Owned by: developers
Priority: normal Milestone: Chaos Calmer 15.05
Component: packages Version: Trunk
Keywords: Cc:

Description

Since updating to r40004 the wifi on my WR1043ND randomly stops working after a couple of hours. Also on r40372. The ssid stays up tho, but connecting to it fails. Reboot or wifi command from ethernet fixes it, but only for a couple hours. Makes OpenWRT unusable for now :(

Attachments (8)

logs.zip (19.8 KB) - added by anonymous 4 years ago.
logs2.zip (10.2 KB) - added by anonymous 4 years ago.
logs3.zip (11.4 KB) - added by anonymous 4 years ago.
r40995 logs.zip (11.2 KB) - added by anonymous 4 years ago.
r41022_wifi_logs.zip (26.0 KB) - added by anonymous 4 years ago.
r41135_wifi_logs.zip (10.4 KB) - added by anonymous 4 years ago.
r41181_wifi_logs.zip (11.1 KB) - added by anonymous 4 years ago.
r41584 logs.zip (10.9 KB) - added by anonymous 4 years ago.

Download all attachments as: .zip

Change History (89)

comment:1 Changed 4 years ago by nbd

what was the version that you updated from?

comment:2 Changed 4 years ago by anonymous

I can remember exactly, something pre-39500.

I also found three possible duplicates of this bug: #15320, #15352 and #15407

comment:3 Changed 4 years ago by anonymous

can > can't :(

comment:4 Changed 4 years ago by Damian Kaczkowski <damian.kaczkowski+openwrt@…>

I have experienced the same bug here: https://dev.openwrt.org/ticket/15352#comment:4

comment:5 Changed 4 years ago by nbd

Please try copying http://nbd.name/950-test.patch to package/kernel/mac80211/patches (package/mac80211/patches on AA) and see if it helps.

comment:6 Changed 4 years ago by mbielowicz@…

I confirm, BB r40372 at 1043ND v2.1 has the same issue (random wifi hangups, reboot of the router helps)

comment:7 follow-up: Changed 4 years ago by mbielowicz@…

i'm testing r40392 with 950-test.patch included, wifi seems to be more stable and it freezes less frequently but it sometimes loses power for 1-2 sec. (wifi analyzer shows sudden, deep signal drop, after 1-2sec. it backs to normal level).

comment:8 in reply to: ↑ 7 Changed 4 years ago by anonymous

Replying to mbielowicz@…:

i'm testing r40392 with 950-test.patch included, wifi seems to be more stable and it freezes less frequently but it sometimes loses power for 1-2 sec. (wifi analyzer shows sudden, deep signal drop, after 1-2sec. it backs to normal level).

What is sometimes? How often does this happen? Does it disconnect clients when doing this? :)

I will test the patch on my two WR1043NDs tonight.

comment:9 Changed 4 years ago by mbielowicz@…

When i've been using firmware without 950-test.patch, I've noticed three "types" of signal anomaly:
A) Signal's power decline without disconnecting clients (-10dBm ~ -15dBm drop), SSID is visible, drop duration: 1-2sec.
B) Signal vanishing - signal disappears completely and clients are disconnected, SSID becomes
invisible, after 10-20sec. signal/SSID is back and clients can connect again.
C) Signal cease - signal disappears completely and does not come back again till router reboot.

With the patch anomaly C is gone, A and B occur less frequently than before applying the patch.

Generally 950-test.patch improved wifi stability a lot, all I can say is that wifi drops far less frequently.
When it drops? It's hard to say. One day wifi works 8-12h without disconnecting and other day it can drop connections 2x within 30min time. Router's load is rather small (1-3 clients , www/ftp)

comment:10 Changed 4 years ago by nbd

The patch has been committed. Here's another one that might improve things further, please test: http://nbd.name/950-test2.patch

comment:11 Changed 4 years ago by anonymous

I found that 950-test.patch does NOT fix this particular issue. Here's a log of r40420 with it applied.

Interesting note: we see 2 successful group key handshake events, at 22:13:19 and 22:23:19, but then there SHOULD be one at 22:33:19, which is not happening. Then 8 seconds later, the clients are deauthenticated and can't reconnect.

...
Wed Apr  9 22:13:19 2014 daemon.info hostapd: wlan0: STA 00:26:5e:xx:xx:xx WPA: group key handshake completed (RSN)
Wed Apr  9 22:13:19 2014 daemon.info hostapd: wlan0: STA 58:b0:35:xx:xx:xx WPA: group key handshake completed (RSN)
Wed Apr  9 22:13:19 2014 daemon.info hostapd: wlan0: STA 04:1e:64:xx:xx:xx WPA: group key handshake completed (RSN)
Wed Apr  9 22:23:19 2014 daemon.info hostapd: wlan0: STA 00:26:5e:xx:xx:xx WPA: group key handshake completed (RSN)
Wed Apr  9 22:23:19 2014 daemon.info hostapd: wlan0: STA 58:b0:35:xx:xx:xx WPA: group key handshake completed (RSN)
Wed Apr  9 22:23:19 2014 daemon.info hostapd: wlan0: STA 04:1e:64:xx:xx:xx WPA: group key handshake completed (RSN)
Wed Apr  9 22:33:27 2014 daemon.info hostapd: wlan0: STA 04:1e:64:xx:xx:xx IEEE 802.11: deauthenticated due to local deauth request
Wed Apr  9 22:33:27 2014 daemon.info hostapd: wlan0: STA 58:b0:35:xx:xx:xx IEEE 802.11: deauthenticated due to local deauth request
Wed Apr  9 22:33:27 2014 daemon.info hostapd: wlan0: STA 00:26:5e:xx:xx:xx IEEE 802.11: deauthenticated due to local deauth request
Wed Apr  9 23:40:53 2014 authpriv.info dropbear[1933]: Child connection from 192.168.1.64:52142
...

comment:12 Changed 4 years ago by anonymous

I have been testing r40438 with 950-test2.patch, but alas, after almost 20 hours (which is longer than before) the wifi hangs again.

Log looks a bit different, with deauthenticated due to inactivity instead of deauthenticated due to local deauth request

Verbose log (log_level=0) is below, which also shows that my conclusion in the previous comment is incorrect. GTK rekeying is still happening every 10 minutes, but as there are no clients, this doesn't show up on the default loglevel.

Is there any more information I can gather to help fix this issue?

...
Thu Apr 10 20:25:59 2014 daemon.debug hostapd: wlan0: WPA rekeying GTK
Thu Apr 10 20:25:59 2014 daemon.debug hostapd: wlan0: STA 58:b0:35:70:xx:xx WPA: sending 1/2 msg of Group Key Handshake
Thu Apr 10 20:25:59 2014 daemon.debug hostapd: wlan0: STA 14:10:9f:d2:xx:xx WPA: sending 1/2 msg of Group Key Handshake
Thu Apr 10 20:25:59 2014 daemon.debug hostapd: wlan0: STA 04:1e:64:6e:xx:xx WPA: sending 1/2 msg of Group Key Handshake
Thu Apr 10 20:25:59 2014 daemon.debug hostapd: wlan0: STA 58:b0:35:70:xx:xx WPA: received EAPOL-Key frame (2/2 Group)
Thu Apr 10 20:25:59 2014 daemon.info hostapd: wlan0: STA 58:b0:35:70:xx:xx WPA: group key handshake completed (RSN)
Thu Apr 10 20:25:59 2014 daemon.debug hostapd: wlan0: STA 14:10:9f:d2:xx:xx WPA: received EAPOL-Key frame (2/2 Group)
Thu Apr 10 20:25:59 2014 daemon.info hostapd: wlan0: STA 14:10:9f:d2:xx:xx WPA: group key handshake completed (RSN)
Thu Apr 10 20:26:00 2014 daemon.debug hostapd: wlan0: STA 04:1e:64:6e:xx:xx WPA: received EAPOL-Key frame (2/2 Group)
Thu Apr 10 20:26:00 2014 daemon.info hostapd: wlan0: STA 04:1e:64:6e:xx:xx WPA: group key handshake completed (RSN)
Thu Apr 10 20:35:59 2014 daemon.debug hostapd: wlan0: WPA rekeying GTK
Thu Apr 10 20:35:59 2014 daemon.debug hostapd: wlan0: STA 58:b0:35:70:xx:xx WPA: sending 1/2 msg of Group Key Handshake
Thu Apr 10 20:35:59 2014 daemon.debug hostapd: wlan0: STA 14:10:9f:d2:xx:xx WPA: sending 1/2 msg of Group Key Handshake
Thu Apr 10 20:35:59 2014 daemon.debug hostapd: wlan0: STA 04:1e:64:6e:xx:xx WPA: sending 1/2 msg of Group Key Handshake
Thu Apr 10 20:35:59 2014 daemon.debug hostapd: wlan0: STA 14:10:9f:d2:xx:xx WPA: received EAPOL-Key frame (2/2 Group)
Thu Apr 10 20:35:59 2014 daemon.info hostapd: wlan0: STA 14:10:9f:d2:xx:xx WPA: group key handshake completed (RSN)
Thu Apr 10 20:35:59 2014 daemon.debug hostapd: wlan0: STA 04:1e:64:6e:xx:xx WPA: received EAPOL-Key frame (2/2 Group)
Thu Apr 10 20:35:59 2014 daemon.info hostapd: wlan0: STA 04:1e:64:6e:xx:xx WPA: group key handshake completed (RSN)
Thu Apr 10 20:35:59 2014 daemon.debug hostapd: wlan0: STA 58:b0:35:70:xx:xx WPA: received EAPOL-Key frame (2/2 Group)
Thu Apr 10 20:35:59 2014 daemon.info hostapd: wlan0: STA 58:b0:35:70:xx:xx WPA: group key handshake completed (RSN)
Thu Apr 10 20:42:57 2014 daemon.info hostapd: wlan0: STA 04:1e:64:6e:xx:xx IEEE 802.11: disassociated due to inactivity
Thu Apr 10 20:42:57 2014 daemon.debug hostapd: wlan0: STA 04:1e:64:6e:xx:xx MLME: MLME-DISASSOCIATE.indication(04:1e:64:6e:xx:xx, 4)
Thu Apr 10 20:42:57 2014 daemon.debug hostapd: wlan0: STA 04:1e:64:6e:xx:xx MLME: MLME-DELETEKEYS.request(04:1e:64:6e:xx:xx)
Thu Apr 10 20:42:58 2014 daemon.info hostapd: wlan0: STA 04:1e:64:6e:xx:xx IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Thu Apr 10 20:42:58 2014 daemon.debug hostapd: wlan0: STA 04:1e:64:6e:xx:xx MLME: MLME-DEAUTHENTICATE.indication(04:1e:64:6e:xx:xx, 2)
Thu Apr 10 20:42:58 2014 daemon.debug hostapd: wlan0: STA 04:1e:64:6e:xx:xx MLME: MLME-DELETEKEYS.request(04:1e:64:6e:xx:xx)
Thu Apr 10 20:43:29 2014 daemon.info hostapd: wlan0: STA 14:10:9f:d2:xx:xx IEEE 802.11: disassociated due to inactivity
Thu Apr 10 20:43:29 2014 daemon.debug hostapd: wlan0: STA 14:10:9f:d2:xx:xx MLME: MLME-DISASSOCIATE.indication(14:10:9f:d2:xx:xx, 4)
Thu Apr 10 20:43:29 2014 daemon.debug hostapd: wlan0: STA 14:10:9f:d2:xx:xx MLME: MLME-DELETEKEYS.request(14:10:9f:d2:xx:xx)
Thu Apr 10 20:43:30 2014 daemon.info hostapd: wlan0: STA 14:10:9f:d2:xx:xx IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Thu Apr 10 20:43:30 2014 daemon.debug hostapd: wlan0: STA 14:10:9f:d2:xx:xx MLME: MLME-DEAUTHENTICATE.indication(14:10:9f:d2:xx:xx, 2)
Thu Apr 10 20:43:30 2014 daemon.debug hostapd: wlan0: STA 14:10:9f:d2:xx:xx MLME: MLME-DELETEKEYS.request(14:10:9f:d2:xx:xx)
Thu Apr 10 20:43:49 2014 daemon.info hostapd: wlan0: STA 58:b0:35:70:xx:xx IEEE 802.11: disassociated due to inactivity
Thu Apr 10 20:43:49 2014 daemon.debug hostapd: wlan0: STA 58:b0:35:70:xx:xx MLME: MLME-DISASSOCIATE.indication(58:b0:35:70:xx:xx, 4)
Thu Apr 10 20:43:49 2014 daemon.debug hostapd: wlan0: STA 58:b0:35:70:xx:xx MLME: MLME-DELETEKEYS.request(58:b0:35:70:xx:xx)
Thu Apr 10 20:43:50 2014 daemon.info hostapd: wlan0: STA 58:b0:35:70:xx:xx IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Thu Apr 10 20:43:50 2014 daemon.debug hostapd: wlan0: STA 58:b0:35:70:xx:xx MLME: MLME-DEAUTHENTICATE.indication(58:b0:35:70:xx:xx, 2)
Thu Apr 10 20:43:50 2014 daemon.debug hostapd: wlan0: STA 58:b0:35:70:xx:xx MLME: MLME-DELETEKEYS.request(58:b0:35:70:xx:xx)
Thu Apr 10 20:45:59 2014 daemon.debug hostapd: wlan0: WPA rekeying GTK
Thu Apr 10 20:55:59 2014 daemon.debug hostapd: wlan0: WPA rekeying GTK
Thu Apr 10 21:05:59 2014 daemon.debug hostapd: wlan0: WPA rekeying GTK
...

comment:13 Changed 4 years ago by anonymous

Today I had 3 more cases of the wifi borking out like this. Still on r40438 with 950-test2.patch.

Again, if there is more I can do to get better info or logging or stats, please let me know.

...
Fri Apr 11 23:32:33 2014 daemon.debug hostapd: wlan0: WPA rekeying GTK
Fri Apr 11 23:32:33 2014 daemon.debug hostapd: wlan0: STA 1c:4b:d6:34:xx:xx WPA: sending 1/2 msg of Group Key Handshake
Fri Apr 11 23:32:33 2014 daemon.debug hostapd: wlan0: STA 58:b0:35:70:xx:xx WPA: sending 1/2 msg of Group Key Handshake
Fri Apr 11 23:32:33 2014 daemon.debug hostapd: wlan0: STA 1c:4b:d6:34:xx:xx WPA: received EAPOL-Key frame (2/2 Group)
Fri Apr 11 23:32:33 2014 daemon.info hostapd: wlan0: STA 1c:4b:d6:34:xx:xx WPA: group key handshake completed (RSN)
Fri Apr 11 23:32:33 2014 daemon.debug hostapd: wlan0: STA 58:b0:35:70:xx:xx WPA: received EAPOL-Key frame (2/2 Group)
Fri Apr 11 23:32:33 2014 daemon.info hostapd: wlan0: STA 58:b0:35:70:xx:xx WPA: group key handshake completed (RSN)
Fri Apr 11 23:40:34 2014 daemon.info hostapd: wlan0: STA 58:b0:35:70:xx:xx IEEE 802.11: disconnected due to excessive missing ACKs
Fri Apr 11 23:40:34 2014 daemon.debug hostapd: wlan0: STA 58:b0:35:70:xx:xx MLME: MLME-DISASSOCIATE.indication(58:b0:35:70:xx:xx, 34)
Fri Apr 11 23:40:34 2014 daemon.debug hostapd: wlan0: STA 58:b0:35:70:xx:xx MLME: MLME-DELETEKEYS.request(58:b0:35:70:xx:xx)
Fri Apr 11 23:41:04 2014 daemon.info hostapd: wlan0: STA 58:b0:35:70:xx:xx IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Fri Apr 11 23:41:04 2014 daemon.debug hostapd: wlan0: STA 58:b0:35:70:xx:xx MLME: MLME-DEAUTHENTICATE.indication(58:b0:35:70:xx:xx, 2)
Fri Apr 11 23:41:04 2014 daemon.debug hostapd: wlan0: STA 58:b0:35:70:xx:xx MLME: MLME-DELETEKEYS.request(58:b0:35:70:xx:xx)
Fri Apr 11 23:42:33 2014 daemon.debug hostapd: wlan0: WPA rekeying GTK
Fri Apr 11 23:42:33 2014 daemon.debug hostapd: wlan0: STA 1c:4b:d6:34:xx:xx WPA: sending 1/2 msg of Group Key Handshake
Fri Apr 11 23:42:33 2014 daemon.debug hostapd: wlan0: STA 1c:4b:d6:34:xx:xx IEEE 802.1X: did not Ack EAPOL-Key frame (unicast index=5)
Fri Apr 11 23:42:33 2014 daemon.debug hostapd: wlan0: STA 1c:4b:d6:34:xx:xx WPA: EAPOL-Key timeout
Fri Apr 11 23:42:33 2014 daemon.debug hostapd: wlan0: STA 1c:4b:d6:34:xx:xx WPA: sending 1/2 msg of Group Key Handshake
Fri Apr 11 23:42:33 2014 daemon.debug hostapd: wlan0: STA 1c:4b:d6:34:xx:xx IEEE 802.1X: did not Ack EAPOL-Key frame (unicast index=5)
Fri Apr 11 23:42:34 2014 daemon.debug hostapd: wlan0: STA 1c:4b:d6:34:xx:xx WPA: EAPOL-Key timeout
Fri Apr 11 23:42:34 2014 daemon.debug hostapd: wlan0: STA 1c:4b:d6:34:xx:xx WPA: sending 1/2 msg of Group Key Handshake
Fri Apr 11 23:42:34 2014 daemon.debug hostapd: wlan0: STA 1c:4b:d6:34:xx:xx IEEE 802.1X: did not Ack EAPOL-Key frame (unicast index=5)
Fri Apr 11 23:42:35 2014 daemon.debug hostapd: wlan0: STA 1c:4b:d6:34:xx:xx WPA: EAPOL-Key timeout
Fri Apr 11 23:42:35 2014 daemon.debug hostapd: wlan0: STA 1c:4b:d6:34:xx:xx WPA: sending 1/2 msg of Group Key Handshake
Fri Apr 11 23:42:35 2014 daemon.debug hostapd: wlan0: STA 1c:4b:d6:34:xx:xx IEEE 802.1X: did not Ack EAPOL-Key frame (unicast index=5)
Fri Apr 11 23:42:36 2014 daemon.debug hostapd: wlan0: STA 1c:4b:d6:34:xx:xx WPA: EAPOL-Key timeout
Fri Apr 11 23:42:36 2014 daemon.debug hostapd: wlan0: STA 1c:4b:d6:34:xx:xx WPA: WPA_PTK: sm->Disconnect
Fri Apr 11 23:42:36 2014 daemon.debug hostapd: wlan0: STA 1c:4b:d6:34:xx:xx WPA: event 3 notification
Fri Apr 11 23:42:36 2014 daemon.debug hostapd: wlan0: STA 1c:4b:d6:34:xx:xx IEEE 802.1X: unauthorizing port
Fri Apr 11 23:42:36 2014 daemon.debug hostapd: wlan0: STA 1c:4b:d6:34:xx:xx MLME: MLME-DEAUTHENTICATE.indication(1c:4b:d6:34:xx:xx, 2)
Fri Apr 11 23:42:36 2014 daemon.debug hostapd: wlan0: STA 1c:4b:d6:34:xx:xx MLME: MLME-DELETEKEYS.request(1c:4b:d6:34:xx:xx)
Fri Apr 11 23:42:41 2014 daemon.info hostapd: wlan0: STA 1c:4b:d6:34:xx:xx IEEE 802.11: deauthenticated due to local deauth request
Fri Apr 11 23:52:33 2014 daemon.debug hostapd: wlan0: WPA rekeying GTK
Sat Apr 12 00:02:33 2014 daemon.debug hostapd: wlan0: WPA rekeying GTK
Sat Apr 12 00:12:33 2014 daemon.debug hostapd: wlan0: WPA rekeying GTK
...
...
Sat Apr 12 16:44:52 2014 daemon.debug hostapd: wlan0: WPA rekeying GTK
Sat Apr 12 16:44:52 2014 daemon.debug hostapd: wlan0: STA 14:10:9f:d2:xx:xx WPA: sending 1/2 msg of Group Key Handshake
Sat Apr 12 16:44:52 2014 daemon.debug hostapd: wlan0: STA 58:b0:35:70:xx:xx WPA: sending 1/2 msg of Group Key Handshake
Sat Apr 12 16:44:52 2014 daemon.debug hostapd: wlan0: STA e4:ce:8f:68:xx:xx WPA: sending 1/2 msg of Group Key Handshake
Sat Apr 12 16:44:52 2014 daemon.debug hostapd: wlan0: STA 04:f7:e4:72:xx:xx WPA: sending 1/2 msg of Group Key Handshake
Sat Apr 12 16:44:52 2014 daemon.debug hostapd: wlan0: STA 04:1e:64:6e:xx:xx WPA: sending 1/2 msg of Group Key Handshake
Sat Apr 12 16:44:52 2014 daemon.debug hostapd: wlan0: STA 58:b0:35:70:xx:xx WPA: received EAPOL-Key frame (2/2 Group)
Sat Apr 12 16:44:52 2014 daemon.info hostapd: wlan0: STA 58:b0:35:70:xx:xx WPA: group key handshake completed (RSN)
Sat Apr 12 16:44:52 2014 daemon.debug hostapd: wlan0: STA 04:1e:64:6e:xx:xx WPA: received EAPOL-Key frame (2/2 Group)
Sat Apr 12 16:44:52 2014 daemon.info hostapd: wlan0: STA 04:1e:64:6e:xx:xx WPA: group key handshake completed (RSN)
Sat Apr 12 16:44:52 2014 daemon.debug hostapd: wlan0: STA 14:10:9f:d2:xx:xx WPA: received EAPOL-Key frame (2/2 Group)
Sat Apr 12 16:44:52 2014 daemon.info hostapd: wlan0: STA 14:10:9f:d2:xx:xx WPA: group key handshake completed (RSN)
Sat Apr 12 16:44:52 2014 daemon.debug hostapd: wlan0: STA e4:ce:8f:68:xx:xx WPA: received EAPOL-Key frame (2/2 Group)
Sat Apr 12 16:44:52 2014 daemon.info hostapd: wlan0: STA e4:ce:8f:68:xx:xx WPA: group key handshake completed (RSN)
Sat Apr 12 16:44:52 2014 daemon.debug hostapd: wlan0: STA 04:f7:e4:72:xx:xx WPA: received EAPOL-Key frame (2/2 Group)
Sat Apr 12 16:44:52 2014 daemon.info hostapd: wlan0: STA 04:f7:e4:72:xx:xx WPA: group key handshake completed (RSN)
Sat Apr 12 16:53:33 2014 daemon.info hostapd: wlan0: STA 58:b0:35:70:xx:xx IEEE 802.11: disconnected due to excessive missing ACKs
Sat Apr 12 16:53:33 2014 daemon.debug hostapd: wlan0: STA 58:b0:35:70:xx:xx MLME: MLME-DISASSOCIATE.indication(58:b0:35:70:xx:xx, 34)
Sat Apr 12 16:53:33 2014 daemon.debug hostapd: wlan0: STA 58:b0:35:70:xx:xx MLME: MLME-DELETEKEYS.request(58:b0:35:70:xx:xx)
Sat Apr 12 16:53:40 2014 daemon.info hostapd: wlan0: STA e4:ce:8f:68:xx:xx IEEE 802.11: disconnected due to excessive missing ACKs
Sat Apr 12 16:53:40 2014 daemon.debug hostapd: wlan0: STA e4:ce:8f:68:xx:xx MLME: MLME-DISASSOCIATE.indication(e4:ce:8f:68:xx:xx, 34)
Sat Apr 12 16:53:40 2014 daemon.debug hostapd: wlan0: STA e4:ce:8f:68:xx:xx MLME: MLME-DELETEKEYS.request(e4:ce:8f:68:xx:xx)
Sat Apr 12 16:53:48 2014 daemon.info hostapd: wlan0: STA 14:10:9f:d2:xx:xx IEEE 802.11: disconnected due to excessive missing ACKs
Sat Apr 12 16:53:48 2014 daemon.debug hostapd: wlan0: STA 14:10:9f:d2:xx:xx MLME: MLME-DISASSOCIATE.indication(14:10:9f:d2:xx:xx, 34)
Sat Apr 12 16:53:48 2014 daemon.debug hostapd: wlan0: STA 14:10:9f:d2:xx:xx MLME: MLME-DELETEKEYS.request(14:10:9f:d2:xx:xx)
Sat Apr 12 16:54:03 2014 daemon.info hostapd: wlan0: STA 58:b0:35:70:xx:xx IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Sat Apr 12 16:54:03 2014 daemon.debug hostapd: wlan0: STA 58:b0:35:70:xx:xx MLME: MLME-DEAUTHENTICATE.indication(58:b0:35:70:xx:xx, 2)
Sat Apr 12 16:54:03 2014 daemon.debug hostapd: wlan0: STA 58:b0:35:70:xx:xx MLME: MLME-DELETEKEYS.request(58:b0:35:70:xx:xx)
Sat Apr 12 16:54:10 2014 daemon.info hostapd: wlan0: STA e4:ce:8f:68:xx:xx IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Sat Apr 12 16:54:10 2014 daemon.debug hostapd: wlan0: STA e4:ce:8f:68:xx:xx MLME: MLME-DEAUTHENTICATE.indication(e4:ce:8f:68:xx:xx, 2)
Sat Apr 12 16:54:10 2014 daemon.debug hostapd: wlan0: STA e4:ce:8f:68:xx:xx MLME: MLME-DELETEKEYS.request(e4:ce:8f:68:xx:xx)
Sat Apr 12 16:54:18 2014 daemon.info hostapd: wlan0: STA 14:10:9f:d2:xx:xx IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Sat Apr 12 16:54:18 2014 daemon.debug hostapd: wlan0: STA 14:10:9f:d2:xx:xx MLME: MLME-DEAUTHENTICATE.indication(14:10:9f:d2:xx:xx, 2)
Sat Apr 12 16:54:18 2014 daemon.debug hostapd: wlan0: STA 14:10:9f:d2:xx:xx MLME: MLME-DELETEKEYS.request(14:10:9f:d2:xx:xx)
Sat Apr 12 16:54:52 2014 daemon.debug hostapd: wlan0: WPA rekeying GTK
Sat Apr 12 16:54:52 2014 daemon.debug hostapd: wlan0: STA 04:f7:e4:72:xx:xx WPA: sending 1/2 msg of Group Key Handshake
Sat Apr 12 16:54:52 2014 daemon.debug hostapd: wlan0: STA 04:1e:64:6e:xx:xx WPA: sending 1/2 msg of Group Key Handshake
Sat Apr 12 16:54:52 2014 daemon.debug hostapd: wlan0: STA 04:f7:e4:72:xx:xx WPA: EAPOL-Key timeout
Sat Apr 12 16:54:52 2014 daemon.debug hostapd: wlan0: STA 04:f7:e4:72:xx:xx WPA: sending 1/2 msg of Group Key Handshake
Sat Apr 12 16:54:52 2014 daemon.debug hostapd: wlan0: STA 04:1e:64:6e:xx:xx WPA: EAPOL-Key timeout
Sat Apr 12 16:54:52 2014 daemon.debug hostapd: wlan0: STA 04:1e:64:6e:xx:xx WPA: sending 1/2 msg of Group Key Handshake
Sat Apr 12 16:54:53 2014 daemon.debug hostapd: wlan0: STA 04:f7:e4:72:xx:xx WPA: EAPOL-Key timeout
Sat Apr 12 16:54:53 2014 daemon.debug hostapd: wlan0: STA 04:f7:e4:72:xx:xx WPA: sending 1/2 msg of Group Key Handshake
Sat Apr 12 16:54:53 2014 daemon.debug hostapd: wlan0: STA 04:1e:64:6e:xx:xx WPA: EAPOL-Key timeout
Sat Apr 12 16:54:53 2014 daemon.debug hostapd: wlan0: STA 04:1e:64:6e:xx:xx WPA: sending 1/2 msg of Group Key Handshake
Sat Apr 12 16:54:54 2014 daemon.debug hostapd: wlan0: STA 04:f7:e4:72:xx:xx WPA: EAPOL-Key timeout
Sat Apr 12 16:54:54 2014 daemon.debug hostapd: wlan0: STA 04:f7:e4:72:xx:xx WPA: sending 1/2 msg of Group Key Handshake
Sat Apr 12 16:54:54 2014 daemon.debug hostapd: wlan0: STA 04:1e:64:6e:xx:xx WPA: EAPOL-Key timeout
Sat Apr 12 16:54:54 2014 daemon.debug hostapd: wlan0: STA 04:1e:64:6e:xx:xx WPA: sending 1/2 msg of Group Key Handshake
Sat Apr 12 16:54:55 2014 daemon.debug hostapd: wlan0: STA 04:f7:e4:72:xx:xx WPA: EAPOL-Key timeout
Sat Apr 12 16:54:55 2014 daemon.debug hostapd: wlan0: STA 04:f7:e4:72:xx:xx WPA: WPA_PTK: sm->Disconnect
Sat Apr 12 16:54:55 2014 daemon.debug hostapd: wlan0: STA 04:f7:e4:72:xx:xx WPA: event 3 notification
Sat Apr 12 16:54:55 2014 daemon.debug hostapd: wlan0: STA 04:f7:e4:72:xx:xx IEEE 802.1X: unauthorizing port
Sat Apr 12 16:54:55 2014 daemon.debug hostapd: wlan0: STA 04:1e:64:6e:xx:xx WPA: EAPOL-Key timeout
Sat Apr 12 16:54:55 2014 daemon.debug hostapd: wlan0: STA 04:1e:64:6e:xx:xx WPA: WPA_PTK: sm->Disconnect
Sat Apr 12 16:54:55 2014 daemon.debug hostapd: wlan0: STA 04:1e:64:6e:xx:xx WPA: event 3 notification
Sat Apr 12 16:54:55 2014 daemon.debug hostapd: wlan0: STA 04:1e:64:6e:xx:xx IEEE 802.1X: unauthorizing port
Sat Apr 12 16:54:57 2014 daemon.debug hostapd: wlan0: STA 04:f7:e4:72:xx:xx MLME: MLME-DEAUTHENTICATE.indication(04:f7:e4:72:xx:xx, 2)
Sat Apr 12 16:54:57 2014 daemon.debug hostapd: wlan0: STA 04:f7:e4:72:xx:xx MLME: MLME-DELETEKEYS.request(04:f7:e4:72:xx:xx)
Sat Apr 12 16:54:57 2014 daemon.debug hostapd: wlan0: STA 04:1e:64:6e:xx:xx MLME: MLME-DEAUTHENTICATE.indication(04:1e:64:6e:xx:xx, 2)
Sat Apr 12 16:54:57 2014 daemon.debug hostapd: wlan0: STA 04:1e:64:6e:xx:xx MLME: MLME-DELETEKEYS.request(04:1e:64:6e:xx:xx)
Sat Apr 12 16:54:57 2014 daemon.debug hostapd: wlan0: STA 04:f7:e4:72:xx:xx MLME: MLME-DEAUTHENTICATE.indication(04:f7:e4:72:xx:xx, 2)
Sat Apr 12 16:54:57 2014 daemon.debug hostapd: wlan0: STA 04:f7:e4:72:xx:xx MLME: MLME-DELETEKEYS.request(04:f7:e4:72:xx:xx)
Sat Apr 12 16:54:57 2014 daemon.debug hostapd: wlan0: STA 04:1e:64:6e:xx:xx MLME: MLME-DEAUTHENTICATE.indication(04:1e:64:6e:xx:xx, 2)
Sat Apr 12 16:54:57 2014 daemon.debug hostapd: wlan0: STA 04:1e:64:6e:xx:xx MLME: MLME-DELETEKEYS.request(04:1e:64:6e:xx:xx)
Sat Apr 12 16:55:00 2014 daemon.info hostapd: wlan0: STA 04:f7:e4:72:xx:xx IEEE 802.11: deauthenticated due to local deauth request
Sat Apr 12 16:55:00 2014 daemon.info hostapd: wlan0: STA 04:1e:64:6e:xx:xx IEEE 802.11: deauthenticated due to local deauth request
Sat Apr 12 17:04:52 2014 daemon.debug hostapd: wlan0: WPA rekeying GTK
Sat Apr 12 17:14:52 2014 daemon.debug hostapd: wlan0: WPA rekeying GTK
Sat Apr 12 17:24:52 2014 daemon.debug hostapd: wlan0: WPA rekeying GTK
...
...
Sat Apr 12 19:58:57 2014 daemon.debug hostapd: wlan0: WPA rekeying GTK
Sat Apr 12 19:58:57 2014 daemon.debug hostapd: wlan0: STA 04:f7:e4:72:xx:xx WPA: sending 1/2 msg of Group Key Handshake
Sat Apr 12 19:58:57 2014 daemon.debug hostapd: wlan0: STA 58:b0:35:70:xx:xx WPA: sending 1/2 msg of Group Key Handshake
Sat Apr 12 19:58:57 2014 daemon.debug hostapd: wlan0: STA e4:ce:8f:68:xx:xx WPA: sending 1/2 msg of Group Key Handshake
Sat Apr 12 19:58:57 2014 daemon.debug hostapd: wlan0: STA 04:1e:64:6e:xx:xx WPA: sending 1/2 msg of Group Key Handshake
Sat Apr 12 19:58:57 2014 daemon.debug hostapd: wlan0: STA 04:f7:e4:72:xx:xx WPA: EAPOL-Key timeout
Sat Apr 12 19:58:57 2014 daemon.debug hostapd: wlan0: STA 04:f7:e4:72:xx:xx WPA: sending 1/2 msg of Group Key Handshake
Sat Apr 12 19:58:57 2014 daemon.debug hostapd: wlan0: STA 58:b0:35:70:xx:xx WPA: EAPOL-Key timeout
Sat Apr 12 19:58:57 2014 daemon.debug hostapd: wlan0: STA 58:b0:35:70:xx:xx WPA: sending 1/2 msg of Group Key Handshake
Sat Apr 12 19:58:57 2014 daemon.debug hostapd: wlan0: STA e4:ce:8f:68:xx:xx WPA: EAPOL-Key timeout
Sat Apr 12 19:58:57 2014 daemon.debug hostapd: wlan0: STA e4:ce:8f:68:xx:xx WPA: sending 1/2 msg of Group Key Handshake
Sat Apr 12 19:58:57 2014 daemon.debug hostapd: wlan0: STA 04:1e:64:6e:xx:xx WPA: EAPOL-Key timeout
Sat Apr 12 19:58:57 2014 daemon.debug hostapd: wlan0: STA 04:1e:64:6e:xx:xx WPA: sending 1/2 msg of Group Key Handshake
Sat Apr 12 19:58:58 2014 daemon.debug hostapd: wlan0: STA 04:f7:e4:72:xx:xx WPA: EAPOL-Key timeout
Sat Apr 12 19:58:58 2014 daemon.debug hostapd: wlan0: STA 04:f7:e4:72:xx:xx WPA: sending 1/2 msg of Group Key Handshake
Sat Apr 12 19:58:58 2014 daemon.debug hostapd: wlan0: STA 58:b0:35:70:xx:xx WPA: EAPOL-Key timeout
Sat Apr 12 19:58:58 2014 daemon.debug hostapd: wlan0: STA 58:b0:35:70:xx:xx WPA: sending 1/2 msg of Group Key Handshake
Sat Apr 12 19:58:58 2014 daemon.debug hostapd: wlan0: STA e4:ce:8f:68:xx:xx WPA: EAPOL-Key timeout
Sat Apr 12 19:58:58 2014 daemon.debug hostapd: wlan0: STA e4:ce:8f:68:xx:xx WPA: sending 1/2 msg of Group Key Handshake
Sat Apr 12 19:58:58 2014 daemon.debug hostapd: wlan0: STA 04:1e:64:6e:xx:xx WPA: EAPOL-Key timeout
Sat Apr 12 19:58:58 2014 daemon.debug hostapd: wlan0: STA 04:1e:64:6e:xx:xx WPA: sending 1/2 msg of Group Key Handshake
Sat Apr 12 19:58:59 2014 daemon.debug hostapd: wlan0: STA 04:f7:e4:72:xx:xx WPA: EAPOL-Key timeout
Sat Apr 12 19:58:59 2014 daemon.debug hostapd: wlan0: STA 04:f7:e4:72:xx:xx WPA: sending 1/2 msg of Group Key Handshake
Sat Apr 12 19:58:59 2014 daemon.debug hostapd: wlan0: STA 58:b0:35:70:xx:xx WPA: EAPOL-Key timeout
Sat Apr 12 19:58:59 2014 daemon.debug hostapd: wlan0: STA 58:b0:35:70:xx:xx WPA: sending 1/2 msg of Group Key Handshake
Sat Apr 12 19:58:59 2014 daemon.debug hostapd: wlan0: STA e4:ce:8f:68:xx:xx WPA: EAPOL-Key timeout
Sat Apr 12 19:58:59 2014 daemon.debug hostapd: wlan0: STA e4:ce:8f:68:xx:xx WPA: sending 1/2 msg of Group Key Handshake
Sat Apr 12 19:58:59 2014 daemon.debug hostapd: wlan0: STA 04:1e:64:6e:xx:xx WPA: EAPOL-Key timeout
Sat Apr 12 19:58:59 2014 daemon.debug hostapd: wlan0: STA 04:1e:64:6e:xx:xx WPA: sending 1/2 msg of Group Key Handshake
Sat Apr 12 19:59:00 2014 daemon.debug hostapd: wlan0: STA 04:f7:e4:72:xx:xx WPA: EAPOL-Key timeout
Sat Apr 12 19:59:00 2014 daemon.debug hostapd: wlan0: STA 04:f7:e4:72:xx:xx WPA: WPA_PTK: sm->Disconnect
Sat Apr 12 19:59:00 2014 daemon.debug hostapd: wlan0: STA 04:f7:e4:72:xx:xx WPA: event 3 notification
Sat Apr 12 19:59:00 2014 daemon.debug hostapd: wlan0: STA 04:f7:e4:72:xx:xx IEEE 802.1X: unauthorizing port
Sat Apr 12 19:59:00 2014 daemon.debug hostapd: wlan0: STA 58:b0:35:70:xx:xx WPA: EAPOL-Key timeout
Sat Apr 12 19:59:00 2014 daemon.debug hostapd: wlan0: STA 58:b0:35:70:xx:xx WPA: WPA_PTK: sm->Disconnect
Sat Apr 12 19:59:00 2014 daemon.debug hostapd: wlan0: STA 58:b0:35:70:xx:xx WPA: event 3 notification
Sat Apr 12 19:59:00 2014 daemon.debug hostapd: wlan0: STA 58:b0:35:70:xx:xx IEEE 802.1X: unauthorizing port
Sat Apr 12 19:59:00 2014 daemon.debug hostapd: wlan0: STA e4:ce:8f:68:xx:xx WPA: EAPOL-Key timeout
Sat Apr 12 19:59:00 2014 daemon.debug hostapd: wlan0: STA e4:ce:8f:68:xx:xx WPA: WPA_PTK: sm->Disconnect
Sat Apr 12 19:59:00 2014 daemon.debug hostapd: wlan0: STA e4:ce:8f:68:xx:xx WPA: event 3 notification
Sat Apr 12 19:59:00 2014 daemon.debug hostapd: wlan0: STA e4:ce:8f:68:xx:xx IEEE 802.1X: unauthorizing port
Sat Apr 12 19:59:00 2014 daemon.debug hostapd: wlan0: STA 04:1e:64:6e:xx:xx WPA: EAPOL-Key timeout
Sat Apr 12 19:59:00 2014 daemon.debug hostapd: wlan0: STA 04:1e:64:6e:xx:xx WPA: WPA_PTK: sm->Disconnect
Sat Apr 12 19:59:00 2014 daemon.debug hostapd: wlan0: STA 04:1e:64:6e:xx:xx WPA: event 3 notification
Sat Apr 12 19:59:00 2014 daemon.debug hostapd: wlan0: STA 04:1e:64:6e:xx:xx IEEE 802.1X: unauthorizing port
Sat Apr 12 19:59:02 2014 daemon.debug hostapd: wlan0: STA 04:f7:e4:72:xx:xx MLME: MLME-DEAUTHENTICATE.indication(04:f7:e4:72:xx:xx, 2)
Sat Apr 12 19:59:02 2014 daemon.debug hostapd: wlan0: STA 04:f7:e4:72:xx:xx MLME: MLME-DELETEKEYS.request(04:f7:e4:72:xx:xx)
Sat Apr 12 19:59:02 2014 daemon.debug hostapd: wlan0: STA 58:b0:35:70:xx:xx MLME: MLME-DEAUTHENTICATE.indication(58:b0:35:70:xx:xx, 2)
Sat Apr 12 19:59:02 2014 daemon.debug hostapd: wlan0: STA 58:b0:35:70:xx:xx MLME: MLME-DELETEKEYS.request(58:b0:35:70:xx:xx)
Sat Apr 12 19:59:02 2014 daemon.debug hostapd: wlan0: STA 04:f7:e4:72:xx:xx MLME: MLME-DEAUTHENTICATE.indication(04:f7:e4:72:xx:xx, 2)
Sat Apr 12 19:59:02 2014 daemon.debug hostapd: wlan0: STA 04:f7:e4:72:xx:xx MLME: MLME-DELETEKEYS.request(04:f7:e4:72:xx:xx)
Sat Apr 12 19:59:02 2014 daemon.debug hostapd: wlan0: STA e4:ce:8f:68:xx:xx MLME: MLME-DEAUTHENTICATE.indication(e4:ce:8f:68:xx:xx, 2)
Sat Apr 12 19:59:02 2014 daemon.debug hostapd: wlan0: STA e4:ce:8f:68:xx:xx MLME: MLME-DELETEKEYS.request(e4:ce:8f:68:xx:xx)
Sat Apr 12 19:59:02 2014 daemon.debug hostapd: wlan0: STA 58:b0:35:70:xx:xx MLME: MLME-DEAUTHENTICATE.indication(58:b0:35:70:xx:xx, 2)
Sat Apr 12 19:59:02 2014 daemon.debug hostapd: wlan0: STA 58:b0:35:70:xx:xx MLME: MLME-DELETEKEYS.request(58:b0:35:70:xx:xx)
Sat Apr 12 19:59:02 2014 daemon.debug hostapd: wlan0: STA 04:1e:64:6e:xx:xx MLME: MLME-DEAUTHENTICATE.indication(04:1e:64:6e:xx:xx, 2)
Sat Apr 12 19:59:02 2014 daemon.debug hostapd: wlan0: STA 04:1e:64:6e:xx:xx MLME: MLME-DELETEKEYS.request(04:1e:64:6e:xx:xx)
Sat Apr 12 19:59:02 2014 daemon.debug hostapd: wlan0: STA e4:ce:8f:68:xx:xx MLME: MLME-DEAUTHENTICATE.indication(e4:ce:8f:68:xx:xx, 2)
Sat Apr 12 19:59:02 2014 daemon.debug hostapd: wlan0: STA e4:ce:8f:68:xx:xx MLME: MLME-DELETEKEYS.request(e4:ce:8f:68:xx:xx)
Sat Apr 12 19:59:02 2014 daemon.debug hostapd: wlan0: STA 04:1e:64:6e:xx:xx MLME: MLME-DEAUTHENTICATE.indication(04:1e:64:6e:xx:xx, 2)
Sat Apr 12 19:59:02 2014 daemon.debug hostapd: wlan0: STA 04:1e:64:6e:xx:xx MLME: MLME-DELETEKEYS.request(04:1e:64:6e:xx:xx)
Sat Apr 12 19:59:05 2014 daemon.info hostapd: wlan0: STA 04:f7:e4:72:xx:xx IEEE 802.11: deauthenticated due to local deauth request
Sat Apr 12 19:59:05 2014 daemon.info hostapd: wlan0: STA 58:b0:35:70:xx:xx IEEE 802.11: deauthenticated due to local deauth request
Sat Apr 12 19:59:05 2014 daemon.info hostapd: wlan0: STA e4:ce:8f:68:xx:xx IEEE 802.11: deauthenticated due to local deauth request
Sat Apr 12 19:59:05 2014 daemon.info hostapd: wlan0: STA 04:1e:64:6e:xx:xx IEEE 802.11: deauthenticated due to local deauth request
Sat Apr 12 20:08:57 2014 daemon.debug hostapd: wlan0: WPA rekeying GTK
Sat Apr 12 20:18:57 2014 daemon.debug hostapd: wlan0: WPA rekeying GTK
Sat Apr 12 20:28:57 2014 daemon.debug hostapd: wlan0: WPA rekeying GTK
...

comment:14 Changed 4 years ago by anonymous

I have reverted this TR1043ND to r39450 for now. 38 hours of stable wifi and going. Haven't seen that yet in any say r40000+ build.

It does have the occasional failed to stop RX/TX DMA stuff messages though. I'm posting those here because maybe the fixes for this in the newer builds are the cause of the wifi hanging?

...
[59628.810000] ath: phy0: DMA failed to stop in 10 ms AR_CR=0x00000024 AR_DIAG_SW=0x42000020 DMADBG_7=0x000286c0
[59628.820000] ath: phy0: Could not stop RX, we could be confusing the DMA engine when we start RX up
[110533.180000] ath: phy0: DMA failed to stop in 10 ms AR_CR=0x00000024 AR_DIAG_SW=0x42000020 DMADBG_7=0x000286c0
[110533.190000] ath: phy0: Could not stop RX, we could be confusing the DMA engine when we start RX up
[125528.580000] ath: phy0: Failed to stop TX DMA, queues=0x00c!
[126398.140000] ath: phy0: Failed to stop TX DMA, queues=0x00c!

comment:15 Changed 4 years ago by anonymous

i confirm having the same issue on the 1043ND. going to build r39450 for now and keep an eye on this ticket

comment:16 Changed 4 years ago by anonymous

Please fix this! Wifi isn't functional anymore after half an hour uptime (r40561).
I guess the TL-WR1043ND went from the best OpenWRT router to the worst!

comment:17 Changed 4 years ago by anonymous

I have some routers (842nd, WDR3600, 1043nd v2) running AA/trunk > r39585 and wifi is barely usable with recent releases. Sadly I had to switch to Asus and Tomato because of Openwrt's unstable wifi. Please fix this or revert wifi drivers/subsystem to usable state (last stable/usable release was r39585).

comment:18 Changed 4 years ago by k.schasfoort@…

Same problem here on the 1.10 version. WiFi not connectible after a few hours (I guess around 2 or 3). No interesting things in the system/kernel log.

The same build by me (r40567) still works fine on a V2 of the 1043ND after 12 hours.

comment:19 follow-up: Changed 4 years ago by nbd

please try copying http://nbd.name/950-test3.patch to package/kernel/mac80211/patches, rebuild and test again.

comment:20 in reply to: ↑ 19 Changed 4 years ago by anonymous

Replying to nbd:

please try copying http://nbd.name/950-test3.patch to package/kernel/mac80211/patches, rebuild and test again.

Is 950-test2.patch committed?

comment:21 Changed 4 years ago by nbd

No, after re-reading it I came to the conclusion that it's wrong. test3 is a better approach for AR913x

comment:22 Changed 4 years ago by NeoRaider

We see the same bug on many different systems, like WR841v8 and WR842v1, so doesn't seem to be AR913x-specific (or the mac80211 backport has caused multiple new bugs...)

comment:23 Changed 4 years ago by nbd

How do you know it's the same bug?

comment:24 Changed 4 years ago by HeJ

It's exactly the same symptoms: SSID is still broadcasted but gets unusable.

A possible workaround would be to reboot the router if we detect the situation but as of now the situation cannot be detected properly (iw dev wlan0 station dump can be empty if there are no clients, too).

comment:25 Changed 4 years ago by nbd

Same surface symptoms does not mean it's the same bug. One issue that I've been tracking that leads to these symptoms on AR913x is definitely chip specific (and there are some extra symptoms that so far haven't been observed on other chips).
Other issues leading to these symptoms may very well have a completely different cause.

Since this ticket has WR1043ND in the title, I'd like to keep bug related discussions on topic and limited to AR913x. There are other similar tickets where you can discuss other chips/devices.
Mashing together different bugs with the same symptoms does not lead to a better understanding of the causes.

comment:26 Changed 4 years ago by anonymous

I'm testing r40572 with 950-test3.patch on wr1043nd v2 (HT40) and after 3 hours i must say that wifi is more responsive/brisk than without the patch, of course more time is needed to check stability but it is good way to go. Thank you nbd.

comment:27 Changed 4 years ago by anonymous

r40576 :

STA 00:21:29:6d:f0:c6 IEEE 802.11: disassociated due to inactivity
Mon Apr 28 12:55:11 2014 daemon.info hostapd: wlan0: STA 00:21:29:6d:f0:c6 IEEE 802.11: disconnected due to excessive missing ACKs
Mon Apr 28 12:55:41 2014 daemon.info hostapd: wlan0: STA 00:21:29:6d:f0:c6 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)

To fix I need to reboot or Network - > Wifi -> Scan.

comment:28 Changed 4 years ago by anonymous

add to upper comment:
i installed wireless-tools and 6 hours above my ap works fine.

comment:29 Changed 4 years ago by anonymous

I also have the wifi hang on r40576, so the fix in r40573 is not the definite solution for this issue. However it only took place after an uptime of 10+ hours, so that's good. Wil try r40586 now.

...
Mon Apr 28 22:21:39 2014 daemon.debug hostapd: wlan0: WPA rekeying GTK
Mon Apr 28 22:21:39 2014 daemon.debug hostapd: wlan0: STA 7c:11:be:xx:xx:xx WPA: sending 1/2 msg of Group Key Handshake
Mon Apr 28 22:21:39 2014 daemon.debug hostapd: wlan0: STA 04:f7:e4:xx:xx:xx WPA: sending 1/2 msg of Group Key Handshake
Mon Apr 28 22:21:40 2014 daemon.debug hostapd: wlan0: STA 7c:11:be:xx:xx:xx WPA: received EAPOL-Key frame (2/2 Group)
Mon Apr 28 22:21:40 2014 daemon.info hostapd: wlan0: STA 7c:11:be:xx:xx:xx WPA: group key handshake completed (RSN)
Mon Apr 28 22:21:40 2014 daemon.debug hostapd: wlan0: STA 04:f7:e4:xx:xx:xx WPA: EAPOL-Key timeout
Mon Apr 28 22:21:40 2014 daemon.debug hostapd: wlan0: STA 04:f7:e4:xx:xx:xx WPA: sending 1/2 msg of Group Key Handshake
Mon Apr 28 22:21:40 2014 daemon.debug hostapd: wlan0: STA 04:f7:e4:xx:xx:xx WPA: received EAPOL-Key frame (2/2 Group)
Mon Apr 28 22:21:40 2014 daemon.info hostapd: wlan0: STA 04:f7:e4:xx:xx:xx WPA: group key handshake completed (RSN)
Mon Apr 28 22:21:40 2014 daemon.debug hostapd: wlan0: STA 04:f7:e4:xx:xx:xx WPA: received EAPOL-Key 2/2 Group with unexpected replay counter
Mon Apr 28 22:31:39 2014 daemon.debug hostapd: wlan0: WPA rekeying GTK
Mon Apr 28 22:31:39 2014 daemon.debug hostapd: wlan0: STA 7c:11:be:xx:xx:xx WPA: sending 1/2 msg of Group Key Handshake
Mon Apr 28 22:31:39 2014 daemon.debug hostapd: wlan0: STA 04:f7:e4:xx:xx:xx WPA: sending 1/2 msg of Group Key Handshake
Mon Apr 28 22:31:40 2014 daemon.debug hostapd: wlan0: STA 04:f7:e4:xx:xx:xx WPA: received EAPOL-Key frame (2/2 Group)
Mon Apr 28 22:31:40 2014 daemon.info hostapd: wlan0: STA 04:f7:e4:xx:xx:xx WPA: group key handshake completed (RSN)
Mon Apr 28 22:31:40 2014 daemon.debug hostapd: wlan0: STA 04:f7:e4:xx:xx:xx IEEE 802.1X: did not Ack EAPOL-Key frame (broadcast index=101)
Mon Apr 28 22:31:40 2014 daemon.debug hostapd: wlan0: STA 7c:11:be:xx:xx:xx WPA: received EAPOL-Key frame (2/2 Group)
Mon Apr 28 22:31:40 2014 daemon.info hostapd: wlan0: STA 7c:11:be:xx:xx:xx WPA: group key handshake completed (RSN)
Mon Apr 28 22:31:40 2014 daemon.debug hostapd: wlan0: STA 7c:11:be:xx:xx:xx IEEE 802.1X: did not Ack EAPOL-Key frame (broadcast index=101)
Mon Apr 28 22:39:44 2014 daemon.info hostapd: wlan0: STA 04:f7:e4:xx:xx:xx IEEE 802.11: disassociated due to inactivity
Mon Apr 28 22:39:44 2014 daemon.debug hostapd: wlan0: STA 04:f7:e4:xx:xx:xx MLME: MLME-DISASSOCIATE.indication(04:f7:e4:xx:xx:xx, 4)
Mon Apr 28 22:39:44 2014 daemon.debug hostapd: wlan0: STA 04:f7:e4:xx:xx:xx MLME: MLME-DELETEKEYS.request(04:f7:e4:xx:xx:xx)
Mon Apr 28 22:39:45 2014 daemon.info hostapd: wlan0: STA 04:f7:e4:xx:xx:xx IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Mon Apr 28 22:39:45 2014 daemon.debug hostapd: wlan0: STA 04:f7:e4:xx:xx:xx MLME: MLME-DEAUTHENTICATE.indication(04:f7:e4:xx:xx:xx, 2)
Mon Apr 28 22:39:45 2014 daemon.debug hostapd: wlan0: STA 04:f7:e4:xx:xx:xx MLME: MLME-DELETEKEYS.request(04:f7:e4:xx:xx:xx)
Mon Apr 28 22:39:48 2014 daemon.info hostapd: wlan0: STA 7c:11:be:xx:xx:xx IEEE 802.11: disassociated due to inactivity
Mon Apr 28 22:39:48 2014 daemon.debug hostapd: wlan0: STA 7c:11:be:xx:xx:xx MLME: MLME-DISASSOCIATE.indication(7c:11:be:xx:xx:xx, 4)
Mon Apr 28 22:39:48 2014 daemon.debug hostapd: wlan0: STA 7c:11:be:xx:xx:xx MLME: MLME-DELETEKEYS.request(7c:11:be:xx:xx:xx)
Mon Apr 28 22:39:49 2014 daemon.info hostapd: wlan0: STA 7c:11:be:xx:xx:xx IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Mon Apr 28 22:39:49 2014 daemon.debug hostapd: wlan0: STA 7c:11:be:xx:xx:xx MLME: MLME-DEAUTHENTICATE.indication(7c:11:be:xx:xx:xx, 2)
Mon Apr 28 22:39:49 2014 daemon.debug hostapd: wlan0: STA 7c:11:be:xx:xx:xx MLME: MLME-DELETEKEYS.request(7c:11:be:xx:xx:xx)
Mon Apr 28 22:41:39 2014 daemon.debug hostapd: wlan0: WPA rekeying GTK

comment:30 Changed 4 years ago by NeoRaider

The patch doesn't seem to have helped for me either. With r40587, my TL-WR1043NDv1's WLAN died after less than two hours in a very busy batman-adv mesh.

comment:31 Changed 4 years ago by anonymous

I have observed that with r40xxx releases wifi coverage is smaller whan with releases before r395xx - I have 1043ND v2 as an AP (63mW, HT40) and two PCs, each with TL-WN722N usb wlan nic. Placement of AP, its TX power and placement of PCs didn't change, PCs used to see wifi network, now PCs are unable to find wireless network unless I stretch the usb cable to move TL-WN722N towards AP.

comment:32 Changed 4 years ago by anonymous

Again the same problem, on r40593, after 2 hours. Seems like the recent ath9k work by nbd (many thanks for that!) is not directly addressing this issue.

For what it's worth, some notes and observations (maybe the knowledgable devs can extract something useful from this):
I have two TL-WR1043NDv1's with quite overlapping coverage serving around 12 STAs on average between them. Apart from different wifi channels and static IP addresses, all settings are the same including SSID, and configured as pure APs, no routing, nothing.
When one of them has the wifi hang and kicks it's STAs, most of them associate with the other AP even thought the SSID of the hanged one stays up. Quite convenient fallback.
One of the APs has the hang more often than the other. It sees a bit more STAs and traffic, and is usually serving the only 802.11g device left in the network.

I'm also dumping the log here out of habit, but I'm not sure if it is actually useful for closing in on this bug. Devs please let us know if there are better ways for us to help with debug data, and if the logreads are just noise.

(Also, "Failed to stop TX DMA" at top of log extract. Haven't seen that in a long time. Other AP shows one occurrence too)

...
Wed Apr 30 10:44:52 2014 kern.err kernel: [ 6295.710000] ath: phy0: Failed to stop TX DMA, queues=0x004!
Wed Apr 30 10:50:15 2014 daemon.debug hostapd: wlan0: WPA rekeying GTK
Wed Apr 30 10:50:15 2014 daemon.debug hostapd: wlan0: STA 0c:8b:fd:xx:xx:xx WPA: sending 1/2 msg of Group Key Handshake
Wed Apr 30 10:50:15 2014 daemon.debug hostapd: wlan0: STA 08:7a:4c:xx:xx:xx WPA: sending 1/2 msg of Group Key Handshake
Wed Apr 30 10:50:15 2014 daemon.debug hostapd: wlan0: STA 58:b0:35:xx:xx:xx WPA: sending 1/2 msg of Group Key Handshake
Wed Apr 30 10:50:15 2014 daemon.debug hostapd: wlan0: STA 4c:b1:99:xx:xx:xx WPA: sending 1/2 msg of Group Key Handshake
Wed Apr 30 10:50:15 2014 daemon.debug hostapd: wlan0: STA 0c:8b:fd:xx:xx:xx WPA: received EAPOL-Key frame (2/2 Group)
Wed Apr 30 10:50:15 2014 daemon.info hostapd: wlan0: STA 0c:8b:fd:xx:xx:xx WPA: group key handshake completed (RSN)
Wed Apr 30 10:50:15 2014 daemon.debug hostapd: wlan0: STA 4c:b1:99:xx:xx:xx WPA: received EAPOL-Key frame (2/2 Group)
Wed Apr 30 10:50:15 2014 daemon.info hostapd: wlan0: STA 4c:b1:99:xx:xx:xx WPA: group key handshake completed (RSN)
Wed Apr 30 10:50:15 2014 daemon.debug hostapd: wlan0: STA 58:b0:35:xx:xx:xx WPA: received EAPOL-Key frame (2/2 Group)
Wed Apr 30 10:50:15 2014 daemon.info hostapd: wlan0: STA 58:b0:35:xx:xx:xx WPA: group key handshake completed (RSN)
Wed Apr 30 10:50:16 2014 daemon.debug hostapd: wlan0: STA 08:7a:4c:xx:xx:xx WPA: EAPOL-Key timeout
Wed Apr 30 10:50:16 2014 daemon.debug hostapd: wlan0: STA 08:7a:4c:xx:xx:xx WPA: sending 1/2 msg of Group Key Handshake
Wed Apr 30 10:50:16 2014 daemon.debug hostapd: wlan0: STA 08:7a:4c:xx:xx:xx WPA: received EAPOL-Key frame (2/2 Group)
Wed Apr 30 10:50:16 2014 daemon.info hostapd: wlan0: STA 08:7a:4c:xx:xx:xx WPA: group key handshake completed (RSN)
Wed Apr 30 10:50:16 2014 daemon.debug hostapd: wlan0: STA 08:7a:4c:xx:xx:xx WPA: received EAPOL-Key 2/2 Group with unexpected replay counter
Wed Apr 30 10:55:42 2014 daemon.info hostapd: wlan0: STA 0c:8b:fd:xx:xx:xx IEEE 802.11: disconnected due to excessive missing ACKs
Wed Apr 30 10:55:42 2014 daemon.debug hostapd: wlan0: STA 0c:8b:fd:xx:xx:xx MLME: MLME-DISASSOCIATE.indication(0c:8b:fd:xx:xx:xx, 34)
Wed Apr 30 10:55:42 2014 daemon.debug hostapd: wlan0: STA 0c:8b:fd:xx:xx:xx MLME: MLME-DELETEKEYS.request(0c:8b:fd:xx:xx:xx)
Wed Apr 30 10:56:12 2014 daemon.info hostapd: wlan0: STA 0c:8b:fd:xx:xx:xx IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Wed Apr 30 10:56:12 2014 daemon.debug hostapd: wlan0: STA 0c:8b:fd:xx:xx:xx MLME: MLME-DEAUTHENTICATE.indication(0c:8b:fd:xx:xx:xx, 2)
Wed Apr 30 10:56:12 2014 daemon.debug hostapd: wlan0: STA 0c:8b:fd:xx:xx:xx MLME: MLME-DELETEKEYS.request(0c:8b:fd:xx:xx:xx)
Wed Apr 30 11:00:15 2014 daemon.debug hostapd: wlan0: WPA rekeying GTK
Wed Apr 30 11:00:15 2014 daemon.debug hostapd: wlan0: STA 08:7a:4c:xx:xx:xx WPA: sending 1/2 msg of Group Key Handshake
Wed Apr 30 11:00:15 2014 daemon.debug hostapd: wlan0: STA 58:b0:35:xx:xx:xx WPA: sending 1/2 msg of Group Key Handshake
Wed Apr 30 11:00:15 2014 daemon.debug hostapd: wlan0: STA 4c:b1:99:xx:xx:xx WPA: sending 1/2 msg of Group Key Handshake
Wed Apr 30 11:00:16 2014 daemon.debug hostapd: wlan0: STA 08:7a:4c:xx:xx:xx WPA: EAPOL-Key timeout
Wed Apr 30 11:00:16 2014 daemon.debug hostapd: wlan0: STA 08:7a:4c:xx:xx:xx WPA: sending 1/2 msg of Group Key Handshake
Wed Apr 30 11:00:16 2014 daemon.debug hostapd: wlan0: STA 58:b0:35:xx:xx:xx WPA: EAPOL-Key timeout
Wed Apr 30 11:00:16 2014 daemon.debug hostapd: wlan0: STA 58:b0:35:xx:xx:xx WPA: sending 1/2 msg of Group Key Handshake
Wed Apr 30 11:00:16 2014 daemon.debug hostapd: wlan0: STA 4c:b1:99:xx:xx:xx WPA: EAPOL-Key timeout
Wed Apr 30 11:00:16 2014 daemon.debug hostapd: wlan0: STA 4c:b1:99:xx:xx:xx WPA: sending 1/2 msg of Group Key Handshake
Wed Apr 30 11:00:17 2014 daemon.debug hostapd: wlan0: STA 08:7a:4c:xx:xx:xx WPA: EAPOL-Key timeout
Wed Apr 30 11:00:17 2014 daemon.debug hostapd: wlan0: STA 08:7a:4c:xx:xx:xx WPA: sending 1/2 msg of Group Key Handshake
Wed Apr 30 11:00:17 2014 daemon.debug hostapd: wlan0: STA 58:b0:35:xx:xx:xx WPA: EAPOL-Key timeout
Wed Apr 30 11:00:17 2014 daemon.debug hostapd: wlan0: STA 58:b0:35:xx:xx:xx WPA: sending 1/2 msg of Group Key Handshake
Wed Apr 30 11:00:17 2014 daemon.debug hostapd: wlan0: STA 4c:b1:99:xx:xx:xx WPA: EAPOL-Key timeout
Wed Apr 30 11:00:17 2014 daemon.debug hostapd: wlan0: STA 4c:b1:99:xx:xx:xx WPA: sending 1/2 msg of Group Key Handshake
Wed Apr 30 11:00:18 2014 daemon.debug hostapd: wlan0: STA 08:7a:4c:xx:xx:xx WPA: EAPOL-Key timeout
Wed Apr 30 11:00:18 2014 daemon.debug hostapd: wlan0: STA 08:7a:4c:xx:xx:xx WPA: sending 1/2 msg of Group Key Handshake
Wed Apr 30 11:00:18 2014 daemon.debug hostapd: wlan0: STA 58:b0:35:xx:xx:xx WPA: EAPOL-Key timeout
Wed Apr 30 11:00:18 2014 daemon.debug hostapd: wlan0: STA 58:b0:35:xx:xx:xx WPA: sending 1/2 msg of Group Key Handshake
Wed Apr 30 11:00:18 2014 daemon.debug hostapd: wlan0: STA 4c:b1:99:xx:xx:xx WPA: EAPOL-Key timeout
Wed Apr 30 11:00:18 2014 daemon.debug hostapd: wlan0: STA 4c:b1:99:xx:xx:xx WPA: sending 1/2 msg of Group Key Handshake
Wed Apr 30 11:00:19 2014 daemon.debug hostapd: wlan0: STA 08:7a:4c:xx:xx:xx WPA: EAPOL-Key timeout
Wed Apr 30 11:00:19 2014 daemon.debug hostapd: wlan0: STA 08:7a:4c:xx:xx:xx WPA: WPA_PTK: sm->Disconnect
Wed Apr 30 11:00:19 2014 daemon.debug hostapd: wlan0: STA 08:7a:4c:xx:xx:xx WPA: event 3 notification
Wed Apr 30 11:00:19 2014 daemon.debug hostapd: wlan0: STA 08:7a:4c:xx:xx:xx IEEE 802.1X: unauthorizing port
Wed Apr 30 11:00:19 2014 daemon.debug hostapd: wlan0: STA 58:b0:35:xx:xx:xx WPA: EAPOL-Key timeout
Wed Apr 30 11:00:19 2014 daemon.debug hostapd: wlan0: STA 58:b0:35:xx:xx:xx WPA: WPA_PTK: sm->Disconnect
Wed Apr 30 11:00:19 2014 daemon.debug hostapd: wlan0: STA 58:b0:35:xx:xx:xx WPA: event 3 notification
Wed Apr 30 11:00:19 2014 daemon.debug hostapd: wlan0: STA 58:b0:35:xx:xx:xx IEEE 802.1X: unauthorizing port
Wed Apr 30 11:00:19 2014 daemon.debug hostapd: wlan0: STA 4c:b1:99:xx:xx:xx WPA: EAPOL-Key timeout
Wed Apr 30 11:00:19 2014 daemon.debug hostapd: wlan0: STA 4c:b1:99:xx:xx:xx WPA: WPA_PTK: sm->Disconnect
Wed Apr 30 11:00:19 2014 daemon.debug hostapd: wlan0: STA 4c:b1:99:xx:xx:xx WPA: event 3 notification
Wed Apr 30 11:00:19 2014 daemon.debug hostapd: wlan0: STA 4c:b1:99:xx:xx:xx IEEE 802.1X: unauthorizing port
Wed Apr 30 11:00:21 2014 daemon.debug hostapd: wlan0: STA 08:7a:4c:xx:xx:xx MLME: MLME-DEAUTHENTICATE.indication(08:7a:4c:xx:xx:xx, 2)
Wed Apr 30 11:00:21 2014 daemon.debug hostapd: wlan0: STA 08:7a:4c:xx:xx:xx MLME: MLME-DELETEKEYS.request(08:7a:4c:xx:xx:xx)
Wed Apr 30 11:00:21 2014 daemon.debug hostapd: wlan0: STA 58:b0:35:xx:xx:xx MLME: MLME-DEAUTHENTICATE.indication(58:b0:35:xx:xx:xx, 2)
Wed Apr 30 11:00:21 2014 daemon.debug hostapd: wlan0: STA 58:b0:35:xx:xx:xx MLME: MLME-DELETEKEYS.request(58:b0:35:xx:xx:xx)
Wed Apr 30 11:00:21 2014 daemon.debug hostapd: wlan0: STA 08:7a:4c:xx:xx:xx MLME: MLME-DEAUTHENTICATE.indication(08:7a:4c:xx:xx:xx, 2)
Wed Apr 30 11:00:21 2014 daemon.debug hostapd: wlan0: STA 08:7a:4c:xx:xx:xx MLME: MLME-DELETEKEYS.request(08:7a:4c:xx:xx:xx)
Wed Apr 30 11:00:21 2014 daemon.debug hostapd: wlan0: STA 4c:b1:99:xx:xx:xx MLME: MLME-DEAUTHENTICATE.indication(4c:b1:99:xx:xx:xx, 2)
Wed Apr 30 11:00:21 2014 daemon.debug hostapd: wlan0: STA 4c:b1:99:xx:xx:xx MLME: MLME-DELETEKEYS.request(4c:b1:99:xx:xx:xx)
Wed Apr 30 11:00:21 2014 daemon.debug hostapd: wlan0: STA 58:b0:35:xx:xx:xx MLME: MLME-DEAUTHENTICATE.indication(58:b0:35:xx:xx:xx, 2)
Wed Apr 30 11:00:21 2014 daemon.debug hostapd: wlan0: STA 58:b0:35:xx:xx:xx MLME: MLME-DELETEKEYS.request(58:b0:35:xx:xx:xx)
Wed Apr 30 11:00:21 2014 daemon.debug hostapd: wlan0: STA 4c:b1:99:xx:xx:xx MLME: MLME-DEAUTHENTICATE.indication(4c:b1:99:xx:xx:xx, 2)
Wed Apr 30 11:00:21 2014 daemon.debug hostapd: wlan0: STA 4c:b1:99:xx:xx:xx MLME: MLME-DELETEKEYS.request(4c:b1:99:xx:xx:xx)
Wed Apr 30 11:00:24 2014 daemon.info hostapd: wlan0: STA 08:7a:4c:xx:xx:xx IEEE 802.11: deauthenticated due to local deauth request
Wed Apr 30 11:00:24 2014 daemon.info hostapd: wlan0: STA 58:b0:35:xx:xx:xx IEEE 802.11: deauthenticated due to local deauth request
Wed Apr 30 11:00:24 2014 daemon.info hostapd: wlan0: STA 4c:b1:99:xx:xx:xx IEEE 802.11: deauthenticated due to local deauth request
Wed Apr 30 11:10:15 2014 daemon.debug hostapd: wlan0: WPA rekeying GTK
Wed Apr 30 11:20:15 2014 daemon.debug hostapd: wlan0: WPA rekeying GTK
Wed Apr 30 11:30:15 2014 daemon.debug hostapd: wlan0: WPA rekeying GTK
...

comment:33 Changed 4 years ago by NeoRaider

Any news about this issue?

comment:34 Changed 4 years ago by anonymous

The issue is still there:(
AP:
WR-1043ND-v2
OpenWRT BB r40746
AP mode
HT40
WAN => PPPoE = 10Mbps

I test AP "stability" on netbook (distance 10m, two walls, wifi signal level ~ -80dbm).
I try to download 500MB file (http://noc.gts.pl/500mb.gts) with wget. At the begining i have download speed ~1,1Mbps, it is max of my WAN so no problems. But after 60MB have been downloaded wifi hangs up/disappears. Such freeze occurs everytime when i start downloading some large file >100MB and wifi signal on client is weak (~ -80dbm).

The stange thing is when distance to AP is smaller (signal level ~ -60,-70dbm) download speed fluctuates +-10% but no hangup occurs.

When I change AP to tplink WDR3600 or WR842nd with AA r39585 (the same wifi config), signal is also weak on the client in the same place but no hangups/freezes.

comment:35 follow-up: Changed 4 years ago by anonymous

WiFi freeze
https://vimeo.com/home/myvideos

Sorry about the upside down:)

comment:36 in reply to: ↑ 35 Changed 4 years ago by anonymous

Replying to anonymous:

WiFi freeze
https://vimeo.com/home/myvideos

Sorry about the upside down:)

Correct link:
https://vimeo.com/94752399

comment:37 Changed 4 years ago by nbd

please try r40780

comment:38 Changed 4 years ago by NeoRaider

Hmm, now my 1043v1's wifi survived for about 72 hours with r40804, but eventually, it died.

comment:39 Changed 4 years ago by nbd

any specific symptoms when it died? messages in the log, beacons stopping, etc?

comment:40 Changed 4 years ago by anonymous

r40804, i got
daemon.info hostapd: wlan0: STA 00:21:29:6d:f0:c6 IEEE 802.11: disconnected due to excessive missing ACKs

comment:41 Changed 4 years ago by nbd

and anything else? because this message alone is not an indication of wifi dying.

btw. r40834 makes client disconnection due to excessive missing ACK a lot more unlikely.

comment:42 Changed 4 years ago by NeoRaider

I found the following messages in the log, but it appears like it occured several hours before the WLAN actually died:

[176162.780000] ath: phy0: DMA failed to stop in 10 ms AR_CR=0x00000024 AR_DIAG_SW=0x42000020 DMADBG_7=0x00028cc0
[176162.790000] ath: phy0: Could not stop RX, we could be confusing the DMA engine when we start RX up

Beacons are still continuing in the broken state.

Apart from that, tons of "ath: phy0: Failed to stop TX DMA, queues=0x004!" and "net_ratelimit: * callbacks suppressed"...

I also found a page allocation failure in the log, but that seems unrelated, as it only seemed to affect a userspace process.

comment:43 Changed 4 years ago by HM

TP 901ND v2 (chip: AR9132 rev 2). Flashed to r40831 this afternoon and it just fell over, same as always. Had Bittorrent running, which is almost guaranteed to cause failure. Nothing in kernel log for me.

comment:44 Changed 4 years ago by HM

(I can still in via SSH on the WAN when this happens).

comment:45 Changed 4 years ago by anonymous

r40842@TL-1043ND v2 (AP mode, HT-40) wifi dyied after 195MB has been transfered, ssid is visible but clients are unable to connect to AP.

Screenshoot: http://fotoo.pl/show.php?img=804918_openwrt.png.html

comment:46 Changed 4 years ago by HM

Confirm still present at r40842 on 901ND v2.

Built and flashed last night, woke up this morning to find all devices (phones, windows PC, Linux laptop) had been booted but had reconnected after a number of hours (hard to say how long, judging by number of notifications in KDE... several). Nothing in kernel log. Refreshed a few web pages and then it fell over again. Sometimes it seems to recover on its own but bandwidth and latency is always severely crippled until you reboot.

comment:47 Changed 4 years ago by anonymous

TPLink WR941ND v3 - r40820, it is enough to run command wifi from console, you don't have to reboot completely. It is a bit faster fix.

comment:48 Changed 4 years ago by anonymous

wr1043nd v2, during transfer of big file, but with strong signal, ~1 meters away from the router. I fixed that with wifi command executed from lan.

wr1043nd v2 logread:

root@wr1043nd:~# logread
Tue May 27 18:34:18 2014 daemon.info dnsmasq-dhcp[1255]: DHCPOFFER(br-lan) 196.168.1.161 00:21:5d:xx:xx:xx
Tue May 27 18:34:23 2014 daemon.info dnsmasq-dhcp[1255]: DHCPDISCOVER(br-lan) 00:21:5d:xx:xx:xx
Tue May 27 18:34:23 2014 daemon.info dnsmasq-dhcp[1255]: DHCPOFFER(br-lan) 196.168.1.161 00:21:5d:xx:xx:xx
Tue May 27 18:34:31 2014 daemon.info dnsmasq-dhcp[1255]: DHCPDISCOVER(br-lan) 00:1e:ec:xx:xx:xx
Tue May 27 18:34:31 2014 daemon.info dnsmasq-dhcp[1255]: DHCPOFFER(br-lan) 196.168.1.128 00:1e:ec:xx:xx:xx
Tue May 27 18:34:31 2014 daemon.info dnsmasq-dhcp[1255]: DHCPREQUEST(br-lan) 196.168.1.128 00:1e:ec:xx:xx:xx
Tue May 27 18:34:31 2014 daemon.info dnsmasq-dhcp[1255]: DHCPACK(br-lan) 196.168.1.128 00:1e:ec:xx:xx:xx PC
Tue May 27 18:34:32 2014 daemon.info dnsmasq-dhcp[1255]: DHCPDISCOVER(br-lan) 00:21:5d:xx:xx:xx
Tue May 27 18:34:32 2014 daemon.info dnsmasq-dhcp[1255]: DHCPOFFER(br-lan) 196.168.1.161 00:21:5d:xx:xx:xx
Tue May 27 18:34:32 2014 daemon.info dnsmasq-dhcp[1255]: DHCPREQUEST(br-lan) 196.168.1.161 00:21:5d:xx:xx:xx
Tue May 27 18:34:32 2014 daemon.info dnsmasq-dhcp[1255]: DHCPACK(br-lan) 196.168.1.161 00:21:5d:xx:xx:xx PC
Tue May 27 18:34:34 2014 daemon.info dnsmasq-dhcp[1255]: DHCPINFORM(br-lan) 196.168.1.128 00:1e:ec:xx:xx:xx
Tue May 27 18:34:34 2014 daemon.info dnsmasq-dhcp[1255]: DHCPACK(br-lan) 196.168.1.128 00:1e:ec:xx:xx:xx PC
Tue May 27 18:34:38 2014 daemon.info dnsmasq-dhcp[1255]: DHCPINFORM(br-lan) 196.168.1.161 00:21:5d:xx:xx:xx
Tue May 27 18:34:38 2014 daemon.info dnsmasq-dhcp[1255]: DHCPACK(br-lan) 196.168.1.161 00:21:5d:xx:xx:xx PC
Tue May 27 18:34:41 2014 daemon.info dnsmasq-dhcp[1255]: DHCPINFORM(br-lan) 196.168.1.161 00:21:5d:xx:xx:xx
Tue May 27 18:34:41 2014 daemon.info dnsmasq-dhcp[1255]: DHCPACK(br-lan) 196.168.1.161 00:21:5d:xx:xx:xx PC
Tue May 27 18:35:04 2014 daemon.info n2n[1038]: Registering with supernode
Tue May 27 18:35:05 2014 authpriv.info dropbear[1722]: Child connection from 196.168.1.128:2330
Tue May 27 18:35:11 2014 authpriv.notice dropbear[1722]: Password auth succeeded for 'root' from 196.168.1.128:2330
Tue May 27 18:35:27 2014 daemon.info hostapd: wlan0: STA 00:21:5d:xx:xx:xx WPA: group key handshake completed (WPA)
Tue May 27 18:35:31 2014 daemon.info hostapd: wlan0: STA 54:e6:fc:xx:xx:xx IEEE 802.11: authenticated
Tue May 27 18:35:31 2014 daemon.info hostapd: wlan0: STA 54:e6:fc:xx:xx:xx IEEE 802.11: associated (aid 1)
Tue May 27 18:35:36 2014 daemon.info hostapd: wlan0: STA 54:e6:fc:xx:xx:xx IEEE 802.11: authenticated
Tue May 27 18:35:36 2014 daemon.info hostapd: wlan0: STA 54:e6:fc:xx:xx:xx IEEE 802.11: authenticated
Tue May 27 18:35:36 2014 daemon.info hostapd: wlan0: STA 54:e6:fc:xx:xx:xx IEEE 802.11: associated (aid 1)
Tue May 27 18:35:41 2014 daemon.info hostapd: wlan0: STA 54:e6:fc:xx:xx:xx IEEE 802.11: authenticated
Tue May 27 18:35:41 2014 daemon.info hostapd: wlan0: STA 54:e6:fc:xx:xx:xx IEEE 802.11: associated (aid 1)
Tue May 27 18:35:49 2014 daemon.info hostapd: wlan0: STA 54:e6:fc:xx:xx:xx IEEE 802.11: deauthenticated due to local deauth request
Tue May 27 18:35:49 2014 kern.info kernel: [29441.880000] device wlan0.sta1 left promiscuous mode
Tue May 27 18:35:49 2014 kern.info kernel: [29441.890000] br-lan: port 3(wlan0.sta1) entered disabled state
Tue May 27 18:35:55 2014 daemon.info hostapd: wlan0: STA 54:e6:fc:xx:xx:xx IEEE 802.11: authenticated
Tue May 27 18:35:55 2014 daemon.info hostapd: wlan0: STA 54:e6:fc:xx:xx:xx IEEE 802.11: associated (aid 1)
Tue May 27 18:35:55 2014 kern.info kernel: [29448.130000] device wlan0.sta1 entered promiscuous mode
Tue May 27 18:35:55 2014 kern.info kernel: [29448.140000] br-lan: port 3(wlan0.sta1) entered forwarding state
Tue May 27 18:35:55 2014 kern.info kernel: [29448.150000] br-lan: port 3(wlan0.sta1) entered forwarding state
Tue May 27 18:35:57 2014 kern.info kernel: [29450.150000] br-lan: port 3(wlan0.sta1) entered forwarding state
Tue May 27 18:36:03 2014 daemon.info hostapd: wlan0: STA 54:e6:fc:xx:xx:xx IEEE 802.11: deauthenticated due to local deauth request
Tue May 27 18:36:03 2014 kern.info kernel: [29456.270000] device wlan0.sta1 left promiscuous mode
Tue May 27 18:36:03 2014 kern.info kernel: [29456.270000] br-lan: port 3(wlan0.sta1) entered disabled state
Tue May 27 18:36:04 2014 daemon.info n2n[1038]: Registering with supernode
Tue May 27 18:36:13 2014 daemon.info dnsmasq-dhcp[1255]: DHCPINFORM(br-lan) 196.168.1.128 00:1e:ec:xx:xx:xx
Tue May 27 18:36:13 2014 daemon.info dnsmasq-dhcp[1255]: DHCPACK(br-lan) 196.168.1.128 00:1e:ec:xx:xx:xx PC
Tue May 27 18:36:13 2014 daemon.info dnsmasq-dhcp[1255]: DHCPINFORM(br-lan) 196.168.1.161 00:21:5d:xx:xx:xx
Tue May 27 18:36:13 2014 daemon.info dnsmasq-dhcp[1255]: DHCPACK(br-lan) 196.168.1.161 00:21:5d:xx:xx:xx PC
Tue May 27 18:36:16 2014 daemon.info dnsmasq-dhcp[1255]: DHCPINFORM(br-lan) 196.168.1.161 00:21:5d:xx:xx:xx
Tue May 27 18:36:16 2014 daemon.info dnsmasq-dhcp[1255]: DHCPACK(br-lan) 196.168.1.161 00:21:5d:xx:xx:xx PC
Tue May 27 18:36:18 2014 daemon.info hostapd: wlan0: STA 54:e6:fc:xx:xx:xx IEEE 802.11: authenticated
Tue May 27 18:36:18 2014 daemon.info hostapd: wlan0: STA 54:e6:fc:xx:xx:xx IEEE 802.11: associated (aid 1)
Tue May 27 18:36:18 2014 kern.info kernel: [29471.100000] device wlan0.sta1 entered promiscuous mode
Tue May 27 18:36:18 2014 kern.info kernel: [29471.110000] br-lan: port 3(wlan0.sta1) entered forwarding state
Tue May 27 18:36:18 2014 kern.info kernel: [29471.120000] br-lan: port 3(wlan0.sta1) entered forwarding state
Tue May 27 18:36:20 2014 kern.info kernel: [29473.120000] br-lan: port 3(wlan0.sta1) entered forwarding state
Tue May 27 18:36:26 2014 daemon.info hostapd: wlan0: STA 54:e6:fc:xx:xx:xx IEEE 802.11: deauthenticated due to local deauth request
Tue May 27 18:36:26 2014 kern.info kernel: [29479.240000] device wlan0.sta1 left promiscuous mode
Tue May 27 18:36:26 2014 kern.info kernel: [29479.240000] br-lan: port 3(wlan0.sta1) entered disabled state
Tue May 27 18:36:41 2014 daemon.info hostapd: wlan0: STA 54:e6:fc:xx:xx:xx IEEE 802.11: authenticated
Tue May 27 18:36:41 2014 daemon.info hostapd: wlan0: STA 54:e6:fc:xx:xx:xx IEEE 802.11: associated (aid 1)
Tue May 27 18:36:41 2014 kern.info kernel: [29494.060000] device wlan0.sta1 entered promiscuous mode
Tue May 27 18:36:41 2014 kern.info kernel: [29494.070000] br-lan: port 3(wlan0.sta1) entered forwarding state
Tue May 27 18:36:41 2014 kern.info kernel: [29494.080000] br-lan: port 3(wlan0.sta1) entered forwarding state
Tue May 27 18:36:43 2014 kern.info kernel: [29496.080000] br-lan: port 3(wlan0.sta1) entered forwarding state
Tue May 27 18:36:50 2014 daemon.info hostapd: wlan0: STA 54:e6:fc:xx:xx:xx IEEE 802.11: deauthenticated due to local deauth request
Tue May 27 18:36:50 2014 kern.info kernel: [29503.040000] device wlan0.sta1 left promiscuous mode
Tue May 27 18:36:50 2014 kern.info kernel: [29503.050000] br-lan: port 3(wlan0.sta1) entered disabled state
Tue May 27 18:36:54 2014 daemon.info dnsmasq-dhcp[1255]: DHCPREQUEST(br-lan) 196.168.1.150 b8:74:24:xx:xx:xx
Tue May 27 18:36:54 2014 daemon.info dnsmasq-dhcp[1255]: DHCPACK(br-lan) 196.168.1.150 b8:74:24:xx:xx:xx Vitocom
Tue May 27 18:37:04 2014 daemon.info n2n[1038]: Registering with supernode
Tue May 27 18:37:15 2014 daemon.info hostapd: wlan0: STA 54:e6:fc:xx:xx:xx IEEE 802.11: authenticated
Tue May 27 18:37:15 2014 daemon.info hostapd: wlan0: STA 54:e6:fc:xx:xx:xx IEEE 802.11: associated (aid 1)
Tue May 27 18:37:15 2014 kern.info kernel: [29528.620000] device wlan0.sta1 entered promiscuous mode
Tue May 27 18:37:15 2014 kern.info kernel: [29528.630000] br-lan: port 3(wlan0.sta1) entered forwarding state
Tue May 27 18:37:15 2014 kern.info kernel: [29528.640000] br-lan: port 3(wlan0.sta1) entered forwarding state
Tue May 27 18:37:17 2014 kern.info kernel: [29530.640000] br-lan: port 3(wlan0.sta1) entered forwarding state
Tue May 27 18:37:24 2014 daemon.info hostapd: wlan0: STA 54:e6:fc:xx:xx:xx IEEE 802.11: deauthenticated due to local deauth request
Tue May 27 18:37:24 2014 kern.info kernel: [29536.760000] device wlan0.sta1 left promiscuous mode
Tue May 27 18:37:24 2014 kern.info kernel: [29536.770000] br-lan: port 3(wlan0.sta1) entered disabled state
Tue May 27 18:37:28 2014 authpriv.info dropbear[1722]: Exit (root): Exited normally
Tue May 27 18:37:31 2014 daemon.info dnsmasq-dhcp[1255]: DHCPINFORM(br-lan) 196.168.1.161 00:21:5d:xx:xx:xx
Tue May 27 18:37:31 2014 daemon.info dnsmasq-dhcp[1255]: DHCPACK(br-lan) 196.168.1.161 00:21:5d:xx:xx:xx PC
Tue May 27 18:37:34 2014 daemon.info dnsmasq-dhcp[1255]: DHCPINFORM(br-lan) 196.168.1.161 00:21:5d:xx:xx:xx
Tue May 27 18:37:34 2014 daemon.info dnsmasq-dhcp[1255]: DHCPACK(br-lan) 196.168.1.161 00:21:5d:xx:xx:xx PC
Tue May 27 18:37:39 2014 daemon.info hostapd: wlan0: STA 00:21:5d:xx:xx:xx IEEE 802.11: authenticated
Tue May 27 18:37:39 2014 daemon.info hostapd: wlan0: STA 00:21:5d:xx:xx:xx IEEE 802.11: associated (aid 1)
Tue May 27 18:37:39 2014 daemon.info hostapd: wlan0: STA 00:21:5d:xx:xx:xx WPA: pairwise key handshake completed (WPA)
Tue May 27 18:37:39 2014 daemon.info hostapd: wlan0: STA 00:21:5d:xx:xx:xx WPA: group key handshake completed (WPA)
Tue May 27 18:37:39 2014 daemon.info dnsmasq-dhcp[1255]: DHCPREQUEST(br-lan) 196.168.1.161 00:21:5d:xx:xx:xx
Tue May 27 18:37:39 2014 daemon.info dnsmasq-dhcp[1255]: DHCPACK(br-lan) 196.168.1.161 00:21:5d:xx:xx:xx PC
Tue May 27 18:37:42 2014 daemon.info dnsmasq-dhcp[1255]: DHCPREQUEST(br-lan) 196.168.1.161 00:21:5d:xx:xx:xx
Tue May 27 18:37:42 2014 daemon.info dnsmasq-dhcp[1255]: DHCPACK(br-lan) 196.168.1.161 00:21:5d:xx:xx:xx PC
Tue May 27 18:37:45 2014 daemon.info dnsmasq-dhcp[1255]: DHCPREQUEST(br-lan) 196.168.1.157 00:17:31:xx:xx:xx
Tue May 27 18:37:45 2014 daemon.info dnsmasq-dhcp[1255]: DHCPACK(br-lan) 196.168.1.157 00:17:31:xx:xx:xx PC1
Tue May 27 18:37:49 2014 daemon.info hostapd: wlan0: STA 54:e6:fc:xx:xx:xx IEEE 802.11: authenticated
Tue May 27 18:37:49 2014 daemon.info hostapd: wlan0: STA 54:e6:fc:xx:xx:xx IEEE 802.11: associated (aid 2)
Tue May 27 18:37:49 2014 kern.info kernel: [29562.330000] device wlan0.sta2 entered promiscuous mode
Tue May 27 18:37:49 2014 kern.info kernel: [29562.330000] br-lan: port 3(wlan0.sta2) entered forwarding state
Tue May 27 18:37:49 2014 kern.info kernel: [29562.340000] br-lan: port 3(wlan0.sta2) entered forwarding state
Tue May 27 18:37:50 2014 daemon.info dnsmasq-dhcp[1255]: DHCPREQUEST(br-lan) 196.168.1.161 00:21:5d:xx:xx:xx
Tue May 27 18:37:50 2014 daemon.info dnsmasq-dhcp[1255]: DHCPACK(br-lan) 196.168.1.161 00:21:5d:xx:xx:xx PC
Tue May 27 18:37:51 2014 kern.info kernel: [29564.340000] br-lan: port 3(wlan0.sta2) entered forwarding state
Tue May 27 18:37:57 2014 daemon.info hostapd: wlan0: STA 54:e6:fc:xx:xx:xx IEEE 802.11: deauthenticated due to local deauth request
Tue May 27 18:37:57 2014 kern.info kernel: [29570.450000] device wlan0.sta2 left promiscuous mode
Tue May 27 18:37:57 2014 kern.info kernel: [29570.460000] br-lan: port 3(wlan0.sta2) entered disabled state
Tue May 27 18:38:04 2014 daemon.info n2n[1038]: Registering with supernode
Tue May 27 18:38:05 2014 daemon.info dnsmasq-dhcp[1255]: DHCPREQUEST(br-lan) 196.168.1.161 00:21:5d:xx:xx:xx
Tue May 27 18:38:05 2014 daemon.info dnsmasq-dhcp[1255]: DHCPACK(br-lan) 196.168.1.161 00:21:5d:xx:xx:xx PC
Tue May 27 18:38:09 2014 daemon.info dnsmasq-dhcp[1255]: DHCPREQUEST(br-lan) 196.168.1.161 00:21:5d:xx:xx:xx
Tue May 27 18:38:09 2014 daemon.info dnsmasq-dhcp[1255]: DHCPACK(br-lan) 196.168.1.161 00:21:5d:xx:xx:xx PC
Tue May 27 18:38:12 2014 daemon.info dnsmasq-dhcp[1255]: DHCPREQUEST(br-lan) 196.168.1.128 00:1e:ec:xx:xx:xx
Tue May 27 18:38:12 2014 daemon.info dnsmasq-dhcp[1255]: DHCPACK(br-lan) 196.168.1.128 00:1e:ec:xx:xx:xx PC
Tue May 27 18:38:15 2014 daemon.info dnsmasq-dhcp[1255]: DHCPINFORM(br-lan) 196.168.1.128 00:1e:ec:xx:xx:xx
Tue May 27 18:38:15 2014 daemon.info dnsmasq-dhcp[1255]: DHCPACK(br-lan) 196.168.1.128 00:1e:ec:xx:xx:xx PC
Tue May 27 18:38:18 2014 daemon.info dnsmasq-dhcp[1255]: DHCPREQUEST(br-lan) 196.168.1.161 00:21:5d:xx:xx:xx
Tue May 27 18:38:18 2014 daemon.info dnsmasq-dhcp[1255]: DHCPACK(br-lan) 196.168.1.161 00:21:5d:xx:xx:xx PC
Tue May 27 18:38:39 2014 daemon.info dnsmasq-dhcp[1255]: DHCPDISCOVER(br-lan) 196.168.1.161 00:21:5d:xx:xx:xx
Tue May 27 18:38:39 2014 daemon.info dnsmasq-dhcp[1255]: DHCPOFFER(br-lan) 196.168.1.161 00:21:5d:xx:xx:xx
Tue May 27 18:38:42 2014 daemon.info dnsmasq-dhcp[1255]: DHCPDISCOVER(br-lan) 196.168.1.161 00:21:5d:xx:xx:xx
Tue May 27 18:38:42 2014 daemon.info dnsmasq-dhcp[1255]: DHCPOFFER(br-lan) 196.168.1.161 00:21:5d:xx:xx:xx
Tue May 27 18:38:47 2014 authpriv.info dropbear[1910]: Child connection from 196.168.1.128:2388
Tue May 27 18:38:50 2014 daemon.info dnsmasq-dhcp[1255]: DHCPDISCOVER(br-lan) 196.168.1.161 00:21:5d:xx:xx:xx
Tue May 27 18:38:50 2014 daemon.info dnsmasq-dhcp[1255]: DHCPOFFER(br-lan) 196.168.1.161 00:21:5d:xx:xx:xx
Tue May 27 18:38:53 2014 authpriv.notice dropbear[1910]: Password auth succeeded for 'root' from 196.168.1.128:2388
Tue May 27 18:38:53 2014 daemon.info hostapd: wlan0: STA 54:e6:fc:xx:xx:xx IEEE 802.11: authenticated
Tue May 27 18:38:53 2014 daemon.info hostapd: wlan0: STA 54:e6:fc:xx:xx:xx IEEE 802.11: associated (aid 2)
Tue May 27 18:38:53 2014 kern.info kernel: [29626.460000] device wlan0.sta2 entered promiscuous mode
Tue May 27 18:38:53 2014 kern.info kernel: [29626.470000] br-lan: port 3(wlan0.sta2) entered forwarding state
Tue May 27 18:38:53 2014 kern.info kernel: [29626.480000] br-lan: port 3(wlan0.sta2) entered forwarding state
Tue May 27 18:38:55 2014 kern.info kernel: [29628.480000] br-lan: port 3(wlan0.sta2) entered forwarding state
Tue May 27 18:39:02 2014 daemon.info hostapd: wlan0: STA 54:e6:fc:xx:xx:xx IEEE 802.11: deauthenticated due to local deauth request
Tue May 27 18:39:02 2014 kern.info kernel: [29635.450000] device wlan0.sta2 left promiscuous mode
Tue May 27 18:39:02 2014 kern.info kernel: [29635.460000] br-lan: port 3(wlan0.sta2) entered disabled state
Tue May 27 18:39:04 2014 daemon.info n2n[1038]: Registering with supernode
Tue May 27 18:39:07 2014 daemon.info dnsmasq-dhcp[1255]: DHCPDISCOVER(br-lan) 196.168.1.161 00:21:5d:xx:xx:xx
Tue May 27 18:39:07 2014 daemon.info dnsmasq-dhcp[1255]: DHCPOFFER(br-lan) 196.168.1.161 00:21:5d:xx:xx:xx
Tue May 27 18:39:39 2014 daemon.info dnsmasq-dhcp[1255]: DHCPDISCOVER(br-lan) 196.168.1.161 00:21:5d:xx:xx:xx
Tue May 27 18:39:39 2014 daemon.info dnsmasq-dhcp[1255]: DHCPOFFER(br-lan) 196.168.1.161 00:21:5d:xx:xx:xx
Tue May 27 18:39:44 2014 daemon.info dnsmasq-dhcp[1255]: DHCPDISCOVER(br-lan) 196.168.1.161 00:21:5d:xx:xx:xx
Tue May 27 18:39:44 2014 daemon.info dnsmasq-dhcp[1255]: DHCPOFFER(br-lan) 196.168.1.161 00:21:5d:xx:xx:xx
Tue May 27 18:39:45 2014 kern.info kernel: [29678.440000] device wlan0 left promiscuous mode
Tue May 27 18:39:45 2014 kern.info kernel: [29678.440000] br-lan: port 2(wlan0) entered disabled state
Tue May 27 18:39:45 2014 daemon.notice netifd: Network device 'wlan0' link is down
Tue May 27 18:39:46 2014 kern.info kernel: [29679.230000] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready
Tue May 27 18:39:46 2014 kern.info kernel: [29679.250000] device wlan0 entered promiscuous mode
Tue May 27 18:39:46 2014 kern.info kernel: [29679.250000] br-lan: port 2(wlan0) entered forwarding state
Tue May 27 18:39:46 2014 kern.info kernel: [29679.260000] br-lan: port 2(wlan0) entered forwarding state
Tue May 27 18:39:46 2014 kern.info kernel: [29679.460000] br-lan: port 2(wlan0) entered disabled state
Tue May 27 18:39:47 2014 kern.info kernel: [29679.820000] br-lan: port 2(wlan0) entered forwarding state
Tue May 27 18:39:47 2014 kern.info kernel: [29679.820000] br-lan: port 2(wlan0) entered forwarding state
Tue May 27 18:39:47 2014 kern.info kernel: [29679.830000] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
Tue May 27 18:39:47 2014 daemon.notice netifd: Network device 'wlan0' link is up
Tue May 27 18:39:48 2014 daemon.info hostapd: wlan0: STA 00:21:5d:xx:xx:xx IEEE 802.11: authenticated
Tue May 27 18:39:48 2014 daemon.info hostapd: wlan0: STA 00:21:5d:xx:xx:xx IEEE 802.11: associated (aid 1)
Tue May 27 18:39:48 2014 daemon.info hostapd: wlan0: STA 00:21:5d:xx:xx:xx WPA: pairwise key handshake completed (WPA)
Tue May 27 18:39:48 2014 daemon.info hostapd: wlan0: STA 00:21:5d:xx:xx:xx WPA: group key handshake completed (WPA)
Tue May 27 18:39:48 2014 daemon.info dnsmasq-dhcp[1255]: DHCPDISCOVER(br-lan) 196.168.1.161 00:21:5d:xx:xx:xx
Tue May 27 18:39:48 2014 daemon.info dnsmasq-dhcp[1255]: DHCPOFFER(br-lan) 196.168.1.161 00:21:5d:xx:xx:xx
Tue May 27 18:39:48 2014 daemon.info dnsmasq-dhcp[1255]: DHCPREQUEST(br-lan) 196.168.1.161 00:21:5d:xx:xx:xx
Tue May 27 18:39:48 2014 daemon.info dnsmasq-dhcp[1255]: DHCPACK(br-lan) 196.168.1.161 00:21:5d:xx:xx:xx PC
Tue May 27 18:39:48 2014 daemon.info dnsmasq-dhcp[1255]: DHCPINFORM(br-lan) 196.168.1.128 00:1e:ec:xx:xx:xx
Tue May 27 18:39:48 2014 daemon.info dnsmasq-dhcp[1255]: DHCPACK(br-lan) 196.168.1.128 00:1e:ec:xx:xx:xx PC
Tue May 27 18:39:49 2014 kern.info kernel: [29681.820000] br-lan: port 2(wlan0) entered forwarding state
Tue May 27 18:39:51 2014 daemon.info dnsmasq-dhcp[1255]: DHCPINFORM(br-lan) 196.168.1.161 00:21:5d:xx:xx:xx
Tue May 27 18:39:51 2014 daemon.info dnsmasq-dhcp[1255]: DHCPACK(br-lan) 196.168.1.161 00:21:5d:xx:xx:xx PC
Tue May 27 18:39:58 2014 daemon.info hostapd: wlan0: STA 54:e6:fc:xx:xx:xx IEEE 802.11: authenticated
Tue May 27 18:39:58 2014 daemon.info hostapd: wlan0: STA 54:e6:fc:xx:xx:xx IEEE 802.11: associated (aid 2)
Tue May 27 18:39:58 2014 kern.info kernel: [29691.450000] device wlan0.sta2 entered promiscuous mode
Tue May 27 18:39:58 2014 kern.info kernel: [29691.470000] br-lan: port 3(wlan0.sta2) entered forwarding state
Tue May 27 18:39:58 2014 kern.info kernel: [29691.470000] br-lan: port 3(wlan0.sta2) entered forwarding state
Tue May 27 18:39:58 2014 daemon.info hostapd: wlan0: STA 54:e6:fc:xx:xx:xx WPA: pairwise key handshake completed (WPA)
Tue May 27 18:39:58 2014 daemon.info hostapd: wlan0: STA 54:e6:fc:xx:xx:xx WPA: group key handshake completed (WPA)
Tue May 27 18:40:00 2014 kern.info kernel: [29693.470000] br-lan: port 3(wlan0.sta2) entered forwarding state

1043 dmesg:

[ 6856.340000] nf_conntrack: automatic helper assignment is deprecated and it will be removed soon. Use the iptables CT target to attach helpers instead.
[29441.880000] device wlan0.sta1 left promiscuous mode
[29441.890000] br-lan: port 3(wlan0.sta1) entered disabled state
[29448.130000] device wlan0.sta1 entered promiscuous mode
[29448.140000] br-lan: port 3(wlan0.sta1) entered forwarding state
[29448.150000] br-lan: port 3(wlan0.sta1) entered forwarding state
[29450.150000] br-lan: port 3(wlan0.sta1) entered forwarding state
[29456.270000] device wlan0.sta1 left promiscuous mode
[29456.270000] br-lan: port 3(wlan0.sta1) entered disabled state
[29471.100000] device wlan0.sta1 entered promiscuous mode
[29471.110000] br-lan: port 3(wlan0.sta1) entered forwarding state
[29471.120000] br-lan: port 3(wlan0.sta1) entered forwarding state
[29473.120000] br-lan: port 3(wlan0.sta1) entered forwarding state
[29479.240000] device wlan0.sta1 left promiscuous mode
[29479.240000] br-lan: port 3(wlan0.sta1) entered disabled state
[29494.060000] device wlan0.sta1 entered promiscuous mode
[29494.070000] br-lan: port 3(wlan0.sta1) entered forwarding state
[29494.080000] br-lan: port 3(wlan0.sta1) entered forwarding state
[29496.080000] br-lan: port 3(wlan0.sta1) entered forwarding state
[29503.040000] device wlan0.sta1 left promiscuous mode
[29503.050000] br-lan: port 3(wlan0.sta1) entered disabled state
[29528.620000] device wlan0.sta1 entered promiscuous mode
[29528.630000] br-lan: port 3(wlan0.sta1) entered forwarding state
[29528.640000] br-lan: port 3(wlan0.sta1) entered forwarding state
[29530.640000] br-lan: port 3(wlan0.sta1) entered forwarding state
[29536.760000] device wlan0.sta1 left promiscuous mode
[29536.770000] br-lan: port 3(wlan0.sta1) entered disabled state
[29562.330000] device wlan0.sta2 entered promiscuous mode
[29562.330000] br-lan: port 3(wlan0.sta2) entered forwarding state
[29562.340000] br-lan: port 3(wlan0.sta2) entered forwarding state
[29564.340000] br-lan: port 3(wlan0.sta2) entered forwarding state
[29570.450000] device wlan0.sta2 left promiscuous mode
[29570.460000] br-lan: port 3(wlan0.sta2) entered disabled state
[29626.460000] device wlan0.sta2 entered promiscuous mode
[29626.470000] br-lan: port 3(wlan0.sta2) entered forwarding state
[29626.480000] br-lan: port 3(wlan0.sta2) entered forwarding state
[29628.480000] br-lan: port 3(wlan0.sta2) entered forwarding state
[29635.450000] device wlan0.sta2 left promiscuous mode
[29635.460000] br-lan: port 3(wlan0.sta2) entered disabled state
[29678.440000] device wlan0 left promiscuous mode
[29678.440000] br-lan: port 2(wlan0) entered disabled state
[29679.230000] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready
[29679.250000] device wlan0 entered promiscuous mode
[29679.250000] br-lan: port 2(wlan0) entered forwarding state
[29679.260000] br-lan: port 2(wlan0) entered forwarding state
[29679.460000] br-lan: port 2(wlan0) entered disabled state
[29679.820000] br-lan: port 2(wlan0) entered forwarding state
[29679.820000] br-lan: port 2(wlan0) entered forwarding state
[29679.830000] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
[29681.820000] br-lan: port 2(wlan0) entered forwarding state
[29691.450000] device wlan0.sta2 entered promiscuous mode
[29691.470000] br-lan: port 3(wlan0.sta2) entered forwarding state
[29691.470000] br-lan: port 3(wlan0.sta2) entered forwarding state
[29693.470000] br-lan: port 3(wlan0.sta2) entered forwarding state

And log from WDS client wr741n:

[31031.790000] wlcli: deauthenticated from f8:d1:11:xx:xx:xx (Reason: 2)
[31031.800000] br-lan: port 4(wlcli) entered disabled state
[31032.710000] wlcli: authenticate with f8:d1:11:xx:xx:xx
[31032.720000] wlcli: send auth to f8:d1:11:xx:xx:xx (try 1/3)
[31032.730000] wlcli: authenticated
[31032.740000] wlcli: associate with f8:d1:11:xx:xx:xx (try 1/3)
[31032.740000] wlcli: RX AssocResp from f8:d1:11:xx:xx:xx (capab=0x431 status=0 aid=1)
[31032.750000] wlcli: associated
[31032.800000] br-lan: port 3(wlap) entered disabled state
[31035.850000] wlcli: deauthenticated from f8:d1:11:xx:xx:xx (Reason: 2)
[31037.160000] wlcli: authenticate with f8:d1:11:xx:xx:xx
[31037.180000] wlcli: send auth to f8:d1:11:xx:xx:xx (try 1/3)
[31037.190000] wlcli: authenticated
[31037.200000] wlcli: associate with f8:d1:11:xx:xx:xx (try 1/3)
[31037.200000] wlcli: RX AssocResp from f8:d1:11:xx:xx:xx (capab=0x431 status=0 aid=1)
[31037.210000] wlcli: associated
[31040.310000] wlcli: deauthenticated from f8:d1:11:xx:xx:xx (Reason: 2)
[31042.120000] wlcli: authenticate with f8:d1:11:xx:xx:xx
[31042.140000] wlcli: send auth to f8:d1:11:xx:xx:xx (try 1/3)
[31042.140000] wlcli: authenticated
[31042.160000] wlcli: associate with f8:d1:11:xx:xx:xx (try 1/3)
[31042.160000] wlcli: RX AssocResp from f8:d1:11:xx:xx:xx (capab=0x431 status=0 aid=1)
[31042.170000] wlcli: associated
[31045.270000] wlcli: deauthenticated from f8:d1:11:xx:xx:xx (Reason: 2)
[31056.450000] wlcli: authenticate with f8:d1:11:xx:xx:xx
[31056.470000] wlcli: send auth to f8:d1:11:xx:xx:xx (try 1/3)
[31056.470000] wlcli: authenticated
[31056.490000] wlcli: associate with f8:d1:11:xx:xx:xx (try 1/3)
[31056.500000] wlcli: RX AssocResp from f8:d1:11:xx:xx:xx (capab=0x431 status=0 aid=1)
[31056.510000] wlcli: associated
[31059.660000] wlcli: deauthenticated from f8:d1:11:xx:xx:xx (Reason: 2)
[31079.420000] wlcli: authenticate with f8:d1:11:xx:xx:xx
[31079.440000] wlcli: send auth to f8:d1:11:xx:xx:xx (try 1/3)
[31079.440000] wlcli: authenticated
[31079.460000] wlcli: associate with f8:d1:11:xx:xx:xx (try 1/3)
[31079.470000] wlcli: RX AssocResp from f8:d1:11:xx:xx:xx (capab=0x431 status=0 aid=1)
[31079.480000] wlcli: associated
[31082.630000] wlcli: deauthenticated from f8:d1:11:xx:xx:xx (Reason: 2)
[31102.380000] wlcli: authenticate with f8:d1:11:xx:xx:xx
[31102.400000] wlcli: send auth to f8:d1:11:xx:xx:xx (try 1/3)
[31102.410000] wlcli: authenticated
[31102.420000] wlcli: associate with f8:d1:11:xx:xx:xx (try 1/3)
[31102.430000] wlcli: RX AssocResp from f8:d1:11:xx:xx:xx (capab=0x431 status=0 aid=1)
[31102.430000] wlcli: associated
[31106.430000] wlcli: deauthenticated from f8:d1:11:xx:xx:xx (Reason: 2)
[31136.940000] wlcli: authenticate with f8:d1:11:xx:xx:xx
[31136.960000] wlcli: send auth to f8:d1:11:xx:xx:xx (try 1/3)
[31136.970000] wlcli: authenticated
[31136.980000] wlcli: associate with f8:d1:11:xx:xx:xx (try 1/3)
[31136.990000] wlcli: RX AssocResp from f8:d1:11:xx:xx:xx (capab=0x431 status=0 aid=1)
[31136.990000] wlcli: associated
[31140.150000] wlcli: deauthenticated from f8:d1:11:xx:xx:xx (Reason: 2)
[31170.650000] wlcli: authenticate with f8:d1:11:xx:xx:xx
[31170.670000] wlcli: send auth to f8:d1:11:xx:xx:xx (try 1/3)
[31170.670000] wlcli: authenticated
[31170.690000] wlcli: associate with f8:d1:11:xx:xx:xx (try 1/3)
[31170.700000] wlcli: RX AssocResp from f8:d1:11:xx:xx:xx (capab=0x431 status=0 aid=2)
[31170.700000] wlcli: associated
[31173.840000] wlcli: deauthenticated from f8:d1:11:xx:xx:xx (Reason: 2)
[31234.800000] wlcli: authenticate with f8:d1:11:xx:xx:xx
[31234.810000] wlcli: send auth to f8:d1:11:xx:xx:xx (try 1/3)
[31234.820000] wlcli: authenticated
[31234.830000] wlcli: associate with f8:d1:11:xx:xx:xx (try 1/3)
[31234.840000] wlcli: RX AssocResp from f8:d1:11:xx:xx:xx (capab=0x431 status=0 aid=2)
[31234.840000] wlcli: associated
[31238.850000] wlcli: deauthenticated from f8:d1:11:xx:xx:xx (Reason: 2)
[31299.770000] wlcli: authenticate with f8:d1:11:xx:xx:xx
[31299.790000] wlcli: send auth to f8:d1:11:xx:xx:xx (try 1/3)
[31299.800000] wlcli: authenticated
[31299.810000] wlcli: associate with f8:d1:11:xx:xx:xx (try 1/3)
[31299.820000] wlcli: RX AssocResp from f8:d1:11:xx:xx:xx (capab=0x431 status=0 aid=2)
[31299.830000] wlcli: associated
[31299.910000] br-lan: port 4(wlcli) entered forwarding state
[31299.920000] br-lan: port 4(wlcli) entered forwarding state
[31300.610000] br-lan: port 3(wlap) entered forwarding state
[31300.610000] br-lan: port 3(wlap) entered forwarding state
[31301.920000] br-lan: port 4(wlcli) entered forwarding state
[31302.610000] br-lan: port 3(wlap) entered forwarding state
[31856.010000] br-lan: port 4(wlcli) entered disabled state
[31857.010000] br-lan: port 3(wlap) entered disabled state
[31898.120000] wlcli: authenticate with f8:d1:11:xx:xx:xx
[31898.140000] wlcli: send auth to f8:d1:11:xx:xx:xx (try 1/3)
[31898.150000] wlcli: authenticated
[31898.160000] wlcli: associate with f8:d1:11:xx:xx:xx (try 1/3)
[31898.160000] wlcli: RX AssocResp from f8:d1:11:xx:xx:xx (capab=0x431 status=0 aid=1)
[31898.170000] wlcli: associated
[31898.210000] br-lan: port 4(wlcli) entered forwarding state
[31898.210000] br-lan: port 4(wlcli) entered forwarding state
[31898.910000] br-lan: port 3(wlap) entered forwarding state
[31898.910000] br-lan: port 3(wlap) entered forwarding state
[31900.210000] br-lan: port 4(wlcli) entered forwarding state
[31900.910000] br-lan: port 3(wlap) entered forwarding state

comment:49 Changed 4 years ago by NeoRaider

The patches last week have definitely improved the situation, but it's still not perfect: my 1043v1 running r40842 seems to survive for more than two days each time now before falling over, while before it would mostly die after about 2 hours. Unfortunately, the last time it died there weren't any interesting log messages at all...

Changed 4 years ago by anonymous

comment:50 Changed 4 years ago by anonymous

r40887 at TL-WR1043ND v2 freezes when downloading files from internet (PPPoE) and signal level between clients and AP is low (~80dBm).
See logs in logs.zip above

Changed 4 years ago by anonymous

comment:51 Changed 4 years ago by anonymous

Another bunch of logs...
logs2.zip above

router: TL-WR1043NDv2
mode: AP
uptime: 10 minutes

09:22:00 => I turned on the router
09:31:33 => SSID disappeared completely, all wifi connections were dropped
09:38:12 => SSID got back and clients could connect again

Changed 4 years ago by anonymous

comment:52 Changed 4 years ago by anonymous

r40891 @ TL-WR1043ND v2

I try to wget some files from internet via wifi.
SSID disappears for 7-10 minutes, clients are disconnected,
after 10 minutes SSID shows up again and connection to AP is possible again.

Logs and configs are in logs3.zip file

Changed 4 years ago by anonymous

comment:53 Changed 4 years ago by anonymous

r40995 @ TL-WR1043ND v2
Wifi freezes during bulk transfers too
but it recovers more quickly than r40891
Logs in <<r40995 logs.zip>>

comment:54 Changed 4 years ago by anonymous

I'm not the ticket creator but I had the same problem with WR1043ND v1 WDS AP 850re WDS Client.
I use a script to log ping dropouts over 30s and recover this wifi crashs. I have no issues since r40982 also with heavy load on the Network.

comment:55 Changed 4 years ago by anonymous

r41022 @ TL-WR1043ND v2
During 500MB download via wifi, transfer freezes 7-10 times but each time signal after few seconds recovers and transfer continues. So it is step forward compared to r40995.

Logs in <<r41022_wifi_logs.zip>>
there are two sets of logs: before 500MB transfer and after the transfer

Changed 4 years ago by anonymous

comment:56 follow-up: Changed 4 years ago by anonymous

Maybe you can try the disable_ani workaround and see if things go better?

echo 1 >/sys/kernel/debug/ieee80211/phy0/ath9k/disable_ani

comment:57 in reply to: ↑ 56 Changed 4 years ago by anonymous

There is no such thing in r40779@TL-WR1043ND v1

ls: /sys/kernel/debug/ieee80211/phy0/ath9k/disable_ani: No such file or directory

maybe

echo 0 > /sys/kernel/debug/ieee80211/phy0/ath9k/ani ?

Replying to anonymous:

Maybe you can try the disable_ani workaround and see if things go better?

echo 1 >/sys/kernel/debug/ieee80211/phy0/ath9k/disable_ani

comment:58 Changed 4 years ago by brith2o

Had this problem with BARRIER BREAKER (Bleeding Edge, r40862)
Buffalo WZR-HP-G300NH (ar71xx)

Same result - SSID still broadcasting but no clients will connect.

Have reverted to AA in the meantime because wifi was unusable otherwise.

The following is captured in the log at the time the issue starts (10:59 pm in this log snippet, when two clients were connected):

5/27/2014 11:39 PM,Debug,192.168.1.1,wlan0: WPA rekeying GTK
5/27/2014 11:29 PM,Debug,192.168.1.1,wlan0: WPA rekeying GTK
5/27/2014 11:19 PM,Debug,192.168.1.1,wlan0: WPA rekeying GTK
5/27/2014 11:09 PM,Debug,192.168.1.1,wlan0: WPA rekeying GTK
5/27/2014 10:59 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 1> IEEE 802.11: deauthenticated due to local deauth request
5/27/2014 10:59 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 1> MLME: MLME-DELETEKEYS.request(<MAC Address 1>)
5/27/2014 10:59 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 1> MLME: MLME-DEAUTHENTICATE.indication(<MAC Address 1>, 2)
5/27/2014 10:59 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 1> MLME: MLME-DELETEKEYS.request(<MAC Address 1>)
5/27/2014 10:59 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 1> MLME: MLME-DEAUTHENTICATE.indication(<MAC Address 1>, 2)
5/27/2014 10:59 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 1> IEEE 802.1X: unauthorizing port
5/27/2014 10:59 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 1> WPA: event 3 notification
5/27/2014 10:59 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 1> WPA: WPA_PTK: sm->Disconnect
5/27/2014 10:59 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 1> WPA: EAPOL-Key timeout
5/27/2014 10:59 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 1> WPA: sending 1/2 msg of Group Key Handshake
5/27/2014 10:59 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 1> WPA: EAPOL-Key timeout
5/27/2014 10:59 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 1> WPA: sending 1/2 msg of Group Key Handshake
5/27/2014 10:59 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 1> WPA: EAPOL-Key timeout
5/27/2014 10:59 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 1> WPA: sending 1/2 msg of Group Key Handshake
5/27/2014 10:59 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 1> WPA: EAPOL-Key timeout
5/27/2014 10:59 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 1> WPA: sending 1/2 msg of Group Key Handshake
5/27/2014 10:59 PM,Debug,192.168.1.1,wlan0: WPA rekeying GTK
5/27/2014 10:56 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 2> MLME: MLME-DELETEKEYS.request(<MAC Address 2>)
5/27/2014 10:56 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 2> MLME: MLME-DEAUTHENTICATE.indication(<MAC Address 2>, 2)
5/27/2014 10:56 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 2> IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
5/27/2014 10:55 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 2> MLME: MLME-DELETEKEYS.request(<MAC Address 2>)
5/27/2014 10:55 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 2> MLME: MLME-DISASSOCIATE.indication(<MAC Address 2>, 34)
5/27/2014 10:55 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 2> IEEE 802.11: disconnected due to excessive missing ACKs
5/27/2014 10:49 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 1> WPA: group key handshake completed (RSN)
5/27/2014 10:49 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 1> WPA: received EAPOL-Key frame (2/2 Group)
5/27/2014 10:49 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 2> WPA: group key handshake completed (RSN)
5/27/2014 10:49 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 2> WPA: received EAPOL-Key frame (2/2 Group)
5/27/2014 10:49 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 2> WPA: sending 1/2 msg of Group Key Handshake
5/27/2014 10:49 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 1> WPA: sending 1/2 msg of Group Key Handshake
5/27/2014 10:49 PM,Debug,192.168.1.1,wlan0: WPA rekeying GTK

If I SSH into the router and issue the command "wifi", things return to normal but not for more than a couple of hours.

comment:59 Changed 4 years ago by nbd

please try r41113

comment:60 Changed 4 years ago by anonymous

r41135 @ TL-WR1043ND v2

After downloading 150MB wirelessly wifi is dead.
Wifi speed falls very often even by 50% from max WAN speed (10mbps) and after few seconds rises again to max WAN speed.

logs in r411135_wifi_logs.zip

Changed 4 years ago by anonymous

comment:61 Changed 4 years ago by anonymous

r41163 @ TL-WR1043ND v2
wifi broke down after transferring about 30MB of data

comment:62 Changed 4 years ago by anonymous

r41181 @ TL-WR1043ND v2

During wireless transfer of big file, wifi speed is dropping frequently by 50% and more (even it stops sometimes), after a few seconds it rises again and so on. At least wifi don't die completely.
logs in r41181_wifi_logs.zip

Changed 4 years ago by anonymous

comment:63 Changed 4 years ago by stefan.joosten+openwrt@…

I can confirm this issue on the 1043NDv1 (rev 1.6 I believe). Started noticing this somewhere in the r40xxx range of BB. I have since reverted to a BB r39789 I had compiled before and have been on that for quite a while now as it is pretty solid for me.
Perhaps this can help in figuring what changed between that and r40xxx when the issue was reported.

comment:64 follow-up: Changed 4 years ago by anonymous

r41163 @ TL-WR1043ND v1

only one crash (check every 15s the wifi) in 24h.
The most stable version I had until now.

comment:65 in reply to: ↑ 64 Changed 4 years ago by anonymous

Replying to anonymous:

r41163 @ TL-WR1043ND v1

only one crash (check every 15s the wifi) in 24h.
The most stable version I had until now.

not so stable after 48h now are 22crashes with r41163

comment:66 Changed 4 years ago by anonymous

r41239 @ TL-WR1043ND v2

Situation is nothing better...
Configuration like in 1043ND v2 logs above.
Everytime, after wireless transfer of ca.15-30MB (no more than a minute after begining of transfer), wifi speed is dropping to zero and wifi hangs.

comment:67 Changed 4 years ago by ShadowCaster

After i did

echo 0 > /sys/kernel/debug/ieee80211/phy0/ath9k/ani

i'm 10 days without a crash of the wifi, OpenWrt Barrier Breaker r40779
I do not know if that helps the devs somehow.

comment:68 Changed 4 years ago by andre@…

same problem on freifunk hamburg firmware, even on latest experimental firmware.
hardware: ubiquiti nanosostation m2

comment:69 Changed 4 years ago by andre@…

ps: latest experimental uses openwrt AA 41182

comment:70 Changed 4 years ago by andre@…

applied tip of ShadowCaster:
echo 0 > /sys/kernel/debug/ieee80211/phy0/ath9k/ani

--> up for 45h now and running... (compared to less than 2h w/o it)

comment:71 Changed 4 years ago by anonymous

Unfortunately disabling ANI didn't work at TL-WR1043ND v2.
Wifi is going down in the same manner after transferring wirelessly ca. 50MB of data.

comment:72 Changed 4 years ago by ashus

TP-Link TL-WR941ND v2 @ r41287 - uptime is now 15 days and this release has not frozen wifi yet. TX and RX has transferred over 5GB on wifi interface.

comment:73 Changed 4 years ago by anonymous

r41584 @ TL-WR1043ND v2 with ANI disabled.
Wifi breaks after transfering ca. 30-50MB of data.

Logs in file r41584 logs.zip

Changed 4 years ago by anonymous

comment:74 Changed 4 years ago by anonymous

Ath9k patch (r41673) didn't fix the issue...
r41683 @ TL-WR1043ND v2 with ANI disabled.
Wifi breaks after transfering 5MB of data!!!

comment:75 Changed 4 years ago by nbd

for TL-WR1043ND v2, please try this patch: http://nbd.name/openwrt-ar955x-test.patch

(needs kernel tree clean)

comment:76 Changed 4 years ago by nbd

r41815 also has an important fix for tx hang issues

comment:77 Changed 4 years ago by Damian Kaczkowski <damian.kaczkowski+openwrt@…>

uptime

 19:29:26 up 1 day,  1:06,  load average: 0.00, 0.01, 0.04

Spotted one error but it looks like it's much better now. Connection is stable so far.

Thu Jul 24 19:08:11 2014 kern.err kernel: [89124.010000] ath: phy0: Failed to stop TX DMA, queues=0x004!

comment:78 Changed 4 years ago by brith2o

The change in r41815 appears to have solved my issue too on Buffalo WZR-HP-G300NH.

comment:79 follow-up: Changed 4 years ago by nbd

  • Resolution set to fixed
  • Status changed from new to closed

thanks for testing.

to the guy with the TL-WR1043ND v2 issues: please test the patch that I posted a few comments earlier, and if it doesn't work, open up a new ticket (it is a completely different chipset after all).

comment:80 in reply to: ↑ 79 Changed 4 years ago by anonymous

Replying to nbd:

thanks for testing.

to the guy with the TL-WR1043ND v2 issues: please test the patch that I posted a few comments earlier, and if it doesn't work, open up a new ticket (it is a completely different chipset after all).

Hi nbd,
My dev skills are very poor:( in which directory i have to put that patch?

comment:81 Changed 4 years ago by nbd

Do this from your openwrt trunk checkout:

patch -p1 < /path/to/file.patch
make target/linux/clean
make

Add Comment

Modify Ticket

Action
as closed .
The resolution will be deleted. Next status will be 'reopened'.
Author


E-mail address and user name can be saved in the Preferences.

 
Note: See TracTickets for help on using tickets.