General OpenWrt support for Xiaomi AX3600 (Part 2)

I had already been on single partition, I flashed Robi's latest pre-release. Now I cannot get into the recovery mode. As I mentioned before, no blinking yellow led but constant.

Has anyone tried installing wireguard / openvpn / tailscale on the official snapshot?

Those are pure software features, opkg and go.

(usual restrictions of snapshot builds apply)

if you are using it as dumb AP, then first delete wan & wan.6 in Network > Interfaces. After that go to Network > Interfaces > devices, hit configure br-lan, choose wan in bridge ports along with lan1, lan2, lan3. Save, Save & Apply. This would convert your "wan" port into a "lan port" since dumb AP setup doesn't require a wan port.

In addition, you can go to System > Startup > Stop & Disable dnsmasq & firewall services. If you want to disable IPv6, disable odhcpd too! This ensures your primary router acts as the only DHCP Server and there is no filtering required since everything is within the LAN.

This should get you going. I have configured Static Address for Interfaces >> LAN. (should be from same IP range as your primary router with Default Gateway set to your Primary Router)

Are there any restrictions that you are aware of for this particular official snapshot? Didn't see anything on the limitations page.

If you are someone like me who experienced slowness in WAN speed after switching to openwrt, try the following:

Network > Firewall > General Settings > Routing/NAT Offloading > Enable Software Flow Offloading (Default is Disable Hardware Flow Offloading>

Network > Interfaces > Global Network Options > Enable Packet Steering

Save & Apply

System > Reboot

I haven't tried SQM yet, but I was able to get full speed of my Internet circuit after this change.

OK, some problems persist. Is this still the same firmware side problem? It didn't happen to me on the old build for a long time:

[153439.141418] ath11k_warn: 108 callbacks suppressed
[153439.141439] ath11k c000000.wifi: failed to send WMI_PDEV_BSS_CHAN_INFO_REQUEST cmd
[153439.145127] ath11k c000000.wifi: failed to send pdev bss chan info request
[153439.153014] ath11k c000000.wifi: failed to send WMI_PDEV_SET_PARAM cmd
[153439.159624] ath11k c000000.wifi: Failed to set beacon mode for VDEV: 0
[153439.166283] ath11k c000000.wifi: failed to send WMI_BCN_TMPL_CMDID
[153439.172838] ath11k c000000.wifi: failed to submit beacon template command: -108
[153439.179068] ath11k c000000.wifi: failed to update bcn template: -108
[153439.186729] ath11k c000000.wifi: failed to send WMI_VDEV_SET_PARAM_CMDID
[153439.193069] ath11k c000000.wifi: failed to set BA BUFFER SIZE 256 for vdev: 0
[153439.199822] ath11k c000000.wifi: failed to send WMI_VDEV_SET_PARAM_CMDID

I want to use both: dump AP with same IP form my Home Router (private WLAN connceted to Network WAN)
and as a router with an form the main router different IP net (guest WLN connceted to Network LAN). The WLAN connceted to LAN interface works, the wlan connceted to WAN interface hast the probem that cleint do not get an IP form Main Router.

I've got an error when attempting to attended-sysupgrade and build an image:

Error building the firmware image
Server response: Error: Impossible package selection

Please report the error message and request
Request Data:

{
    "url": "https://sysupgrade.openwrt.org",
    "revision": "r21856-afcf1a4de4",
    "advanced_mode": "0",
    "branch": "SNAPSHOT",
    "efi": null,
    "request_hash": "391829d90bdb979b246effc25509c0fe",
    "profile": "xiaomi,ax3600",
    "target": "ipq807x/generic",
    "version": "SNAPSHOT",
    "packages": [
        "ath10k-firmware-qca9887-ct",
        "ath11k-firmware-ipq8074",
        "base-files",
        "bash",
        "batctl-full",
        "busybox",
        "ca-bundle",
        "curl",
        "dnsmasq",
        "dropbear",
        "firewall4",
        "fstools",
        "fwtool",
        "getrandom",
        "hostapd-common",
        "htop",
        "ipq-wifi-xiaomi_ax3600",
        "iw",
        "iwinfo",
        "jansson",
        "jshn",
        "jsonfilter",
        "kernel",
        "kmod-ath",
        "kmod-ath10k-ct-smallbuffers",
        "kmod-ath11k",
        "kmod-ath11k-ahb",
        "kmod-batman-adv",
        "kmod-cfg80211",
        "kmod-crypto-acompress",
        "kmod-crypto-aead",
        "kmod-crypto-ccm",
        "kmod-crypto-cmac",
        "kmod-crypto-crc32c",
        "kmod-crypto-ctr",
        "kmod-crypto-gcm",
        "kmod-crypto-gf128",
        "kmod-crypto-ghash",
        "kmod-crypto-hash",
        "kmod-crypto-hmac",
        "kmod-crypto-manager",
        "kmod-crypto-michael-mic",
        "kmod-crypto-null",
        "kmod-crypto-rng",
        "kmod-crypto-seqiv",
        "kmod-crypto-sha256",
        "kmod-gpio-button-hotplug",
        "kmod-hwmon-core",
        "kmod-leds-gpio",
        "kmod-lib-crc-ccitt",
        "kmod-lib-crc32c",
        "kmod-lib-lzo",
        "kmod-mac80211",
        "kmod-nf-conntrack",
        "kmod-nf-conntrack6",
        "kmod-nf-flow",
        "kmod-nf-log",
        "kmod-nf-log6",
        "kmod-nf-nat",
        "kmod-nf-reject",
        "kmod-nf-reject6",
        "kmod-nfnetlink",
        "kmod-nft-core",
        "kmod-nft-fib",
        "kmod-nft-nat",
        "kmod-nft-offload",
        "kmod-nls-base",
        "kmod-ppp",
        "kmod-pppoe",
        "kmod-pppox",
        "kmod-qca-nss-dp",
        "kmod-qca-ssdk",
        "kmod-qrtr",
        "kmod-qrtr-smd",
        "kmod-slhc",
        "kmod-thermal",
        "kmod-usb-core",
        "kmod-usb-dwc3",
        "kmod-usb-dwc3-qcom",
        "kmod-usb-xhci-hcd",
        "kmod-usb3",
        "libblobmsg-json",
        "libiwinfo",
        "libiwinfo-data",
        "libjson-c",
        "libjson-script",
        "libmnl",
        "libnftnl",
        "libnl-tiny",
        "libubox",
        "libubus",
        "libuci",
        "libuclient",
        "libucode",
        "libustream-wolfssl",
        "libwolfsslcpu-crypto",
        "lighttpd",
        "lighttpd-mod-cgi",
        "logrotate",
        "lua",
        "luafilesystem",
        "luci",
        "luci-proto-relay",
        "mailsend",
        "mtd",
        "netifd",
        "nftables-json",
        "odhcp6c",
        "odhcpd-ipv6only",
        "openwrt-keyring",
        "opkg",
        "php8",
        "php8-cgi",
        "ppp",
        "ppp-mod-pppoe",
        "procd",
        "procd-seccomp",
        "procd-ujail",
        "relayd",
        "snmpd",
        "syslog-ng",
        "tcpdump",
        "terminfo",
        "ubi-utils",
        "uboot-envtools",
        "ubox",
        "ubus",
        "ubusd",
        "uci",
        "uclient-fetch",
        "ucode",
        "ucode-mod-fs",
        "ucode-mod-ubus",
        "ucode-mod-uci",
        "urandom-seed",
        "urngd",
        "usign",
        "vsftpd",
        "wireless-regdb",
        "wpad-basic-wolfssl"
    ],
    "diff_packages": true,
    "filesystem": "squashfs",
    "client": "luci/undefined"
}
STDERR:
Package list missing or not up-to-date, generating it.

Building package index...
Downloading https://downloads.openwrt.org/snapshots/targets/ipq807x/generic/packages/Packages.gz
Updated list of available packages in /home/aparcar/asu/worker1/cache/SNAPSHOT/ipq807x/generic/build_dir/target-aarch64_cortex-a53_musl/root-ipq807x/../../../../../../../../../../../home/aparcar/asu/worker1/cache/SNAPSHOT/ipq807x/generic/dl/openwrt_core
Downloading https://downloads.openwrt.org/snapshots/targets/ipq807x/generic/packages/Packages.sig
Signature check passed.
Downloading https://downloads.openwrt.org/snapshots/packages/aarch64_cortex-a53/base/Packages.gz
Updated list of available packages in /home/aparcar/asu/worker1/cache/SNAPSHOT/ipq807x/generic/build_dir/target-aarch64_cortex-a53_musl/root-ipq807x/../../../../../../../../../../../home/aparcar/asu/worker1/cache/SNAPSHOT/ipq807x/generic/dl/openwrt_base
Downloading https://downloads.openwrt.org/snapshots/packages/aarch64_cortex-a53/base/Packages.sig
Signature check passed.
Downloading https://downloads.openwrt.org/snapshots/targets/ipq807x/generic/kmods/5.15.89-1-03ad7937b05d057fe30d4ef41e77ee0c/Packages.gz
Updated list of available packages in /home/aparcar/asu/worker1/cache/SNAPSHOT/ipq807x/generic/build_dir/target-aarch64_cortex-a53_musl/root-ipq807x/../../../../../../../../../../../home/aparcar/asu/worker1/cache/SNAPSHOT/ipq807x/generic/dl/openwrt_kmods
Downloading https://downloads.openwrt.org/snapshots/targets/ipq807x/generic/kmods/5.15.89-1-03ad7937b05d057fe30d4ef41e77ee0c/Packages.sig
Signature check passed.
Downloading https://downloads.openwrt.org/snapshots/packages/aarch64_cortex-a53/luci/Packages.gz
Updated list of available packages in /home/aparcar/asu/worker1/cache/SNAPSHOT/ipq807x/generic/build_dir/target-aarch64_cortex-a53_musl/root-ipq807x/../../../../../../../../../../../home/aparcar/asu/worker1/cache/SNAPSHOT/ipq807x/generic/dl/openwrt_luci
Downloading https://downloads.openwrt.org/snapshots/packages/aarch64_cortex-a53/luci/Packages.sig
Signature check passed.
Downloading https://downloads.openwrt.org/snapshots/packages/aarch64_cortex-a53/packages/Packages.gz
Updated list of available packages in /home/aparcar/asu/worker1/cache/SNAPSHOT/ipq807x/generic/build_dir/target-aarch64_cortex-a53_musl/root-ipq807x/../../../../../../../../../../../home/aparcar/asu/worker1/cache/SNAPSHOT/ipq807x/generic/dl/openwrt_packages
Downloading https://downloads.openwrt.org/snapshots/packages/aarch64_cortex-a53/packages/Packages.sig
Signature check passed.
Downloading https://downloads.openwrt.org/snapshots/packages/aarch64_cortex-a53/routing/Packages.gz
Updated list of available packages in /home/aparcar/asu/worker1/cache/SNAPSHOT/ipq807x/generic/build_dir/target-aarch64_cortex-a53_musl/root-ipq807x/../../../../../../../../../../../home/aparcar/asu/worker1/cache/SNAPSHOT/ipq807x/generic/dl/openwrt_routing
Downloading https://downloads.openwrt.org/snapshots/packages/aarch64_cortex-a53/routing/Packages.sig
Signature check passed.
Downloading https://downloads.openwrt.org/snapshots/packages/aarch64_cortex-a53/telephony/Packages.gz
Updated list of available packages in /home/aparcar/asu/worker1/cache/SNAPSHOT/ipq807x/generic/build_dir/target-aarch64_cortex-a53_musl/root-ipq807x/../../../../../../../../../../../home/aparcar/asu/worker1/cache/SNAPSHOT/ipq807x/generic/dl/openwrt_telephony
Downloading https://downloads.openwrt.org/snapshots/packages/aarch64_cortex-a53/telephony/Packages.sig
Signature check passed.
Downloading file:packages/Packages
Updated list of available packages in /home/aparcar/asu/worker1/cache/SNAPSHOT/ipq807x/generic/build_dir/target-aarch64_cortex-a53_musl/root-ipq807x/../../../../../../../../../../../home/aparcar/asu/worker1/cache/SNAPSHOT/ipq807x/generic/dl/imagebuilder
Downloading file:packages/Packages.sig
Signature check failed.
Remove wrong Signature file.
[libwolfsslcpu-crypto] Checking for Arm v8-A Cryptographic Extension support: ...[offline]... OK
[libwolfsslcpu-crypto] Checking for Arm v8-A Cryptographic Extension support: ...[offline]... OK
Collected errors:
 * check_data_file_clashes: Package libwolfsslcpu-crypto5.5.4.e624513f wants to install file /home/aparcar/asu/worker1/cache/SNAPSHOT/ipq807x/generic/build_dir/target-aarch64_cortex-a53_musl/root-ipq807x/usr/lib/libwolfssl.so.5.5.4.e624513f
	But that file is already provided by package  * libwolfssl5.5.4.e624513f
 * opkg_install_cmd: Cannot install package libwolfsslcpu-crypto.
 * check_data_file_clashes: Package libwolfsslcpu-crypto5.5.4.e624513f wants to install file /home/aparcar/asu/worker1/cache/SNAPSHOT/ipq807x/generic/build_dir/target-aarch64_cortex-a53_musl/root-ipq807x/usr/lib/libwolfssl.so.5.5.4.e624513f
	But that file is already provided by package  * libwolfssl5.5.4.e624513f
 * opkg_install_cmd: Cannot install package libwolfsslcpu-crypto.
make[2]: *** [Makefile:185: package_install] Error 255
make[1]: *** [Makefile:150: _call_manifest] Error 2
make: *** [Makefile:269: manifest] Error 2

OPKG:

opkg update
opkg install luci
#
opkg remove wpad-basic-wolfssl
opkg install wpad-mesh-wolfssl
#
opkg install relayd luci-proto-relay
opkg install batctl-full kmod-batman-adv luci-proto-batman-adv
opkg install lighttpd lighttpd-mod-cgi php8 php8-cgi
opkg install vsftpd
opkg remove logd
opkg install syslog-ng logrotate snmpd
opkg install bash curl htop logrotate lua luafilesystem luci mailsend terminfo tcpdump

How can I make the AP automatically reboot when log shows (result of ath11k crash):

Mon Jan 23 14:34:55 2023 kern.warn kernel: [45080.586173] ath11k_warn: 51 callbacks suppressed
Mon Jan 23 14:34:55 2023 kern.warn kernel: [45080.586193] ath11k c000000.wifi: failed to send WMI_PDEV_BSS_CHAN_INFO_REQUEST cmd
Mon Jan 23 14:34:55 2023 kern.warn kernel: [45080.589883] ath11k c000000.wifi: failed to send pdev bss chan info request
Mon Jan 23 14:34:55 2023 kern.warn kernel: [45080.597549] ath11k c000000.wifi: failed to send WMI_PDEV_SET_PARAM cmd
Mon Jan 23 14:34:55 2023 kern.warn kernel: [45080.604141] ath11k c000000.wifi: Failed to set beacon mode for VDEV: 0
Mon Jan 23 14:34:55 2023 kern.warn kernel: [45080.610644] ath11k c000000.wifi: failed to send WMI_BCN_TMPL_CMDID
Mon Jan 23 14:34:55 2023 kern.warn kernel: [45080.617155] ath11k c000000.wifi: failed to submit beacon template command: -108
Mon Jan 23 14:34:55 2023 kern.warn kernel: [45080.623319] ath11k c000000.wifi: failed to update bcn template: -108
Mon Jan 23 14:34:55 2023 kern.warn kernel: [45080.630509] ath11k c000000.wifi: failed to send WMI_VDEV_SET_PARAM_CMDID
Mon Jan 23 14:34:55 2023 kern.warn kernel: [45080.637129] ath11k c000000.wifi: failed to set BA BUFFER SIZE 256 for vdev: 0
Mon Jan 23 14:34:55 2023 kern.warn kernel: [45080.643804] ath11k c000000.wifi: failed to send WMI_VDEV_SET_PARAM_CMDID
Mon Jan 23 14:34:57 2023 daemon.err uhttpd[1872]: [info] luci: accepted login on / for root from 192.168.1.8
Mon Jan 23 14:35:01 2023 kern.warn kernel: [45086.654910] ath11k_warn: 263 callbacks suppressed
Mon Jan 23 14:35:01 2023 kern.warn kernel: [45086.654931] ath11k c000000.wifi: failed to send WMI_PDEV_BSS_CHAN_INFO_REQUEST cmd
Mon Jan 23 14:35:01 2023 kern.warn kernel: [45086.658620] ath11k c000000.wifi: failed to send pdev bss chan info request
Mon Jan 23 14:35:01 2023 kern.warn kernel: [45086.666392] ath11k c000000.wifi: failed to send WMI_PDEV_SET_PARAM cmd
Mon Jan 23 14:35:01 2023 kern.warn kernel: [45086.672944] ath11k c000000.wifi: Failed to set beacon mode for VDEV: 0
Mon Jan 23 14:35:01 2023 kern.warn kernel: [45086.679496] ath11k c000000.wifi: failed to send WMI_BCN_TMPL_CMDID
Mon Jan 23 14:35:01 2023 kern.warn kernel: [45086.685977] ath11k c000000.wifi: failed to submit beacon template command: -108
Mon Jan 23 14:35:01 2023 kern.warn kernel: [45086.692125] ath11k c000000.wifi: failed to update bcn template: -108
Mon Jan 23 14:35:01 2023 kern.warn kernel: [45086.699357] ath11k c000000.wifi: failed to send WMI_VDEV_SET_PARAM_CMDID
Mon Jan 23 14:35:01 2023 kern.warn kernel: [45086.705957] ath11k c000000.wifi: failed to set BA BUFFER SIZE 256 for vdev: 0
Mon Jan 23 14:35:01 2023 kern.warn kernel: [45086.712613] ath11k c000000.wifi: failed to send WMI_VDEV_SET_PARAM_CMDID
Mon Jan 23 14:35:07 2023 kern.warn kernel: [45092.721632] ath11k_warn: 157 callbacks suppressed
Mon Jan 23 14:35:07 2023 kern.warn kernel: [45092.721654] ath11k c000000.wifi: failed to send WMI_PDEV_BSS_CHAN_INFO_REQUEST cmd
Mon Jan 23 14:35:07 2023 kern.warn kernel: [45092.725378] ath11k c000000.wifi: failed to send pdev bss chan info request
Mon Jan 23 14:35:07 2023 kern.warn kernel: [45092.733092] ath11k c000000.wifi: failed to send WMI_PDEV_SET_PARAM cmd
Mon Jan 23 14:35:07 2023 kern.warn kernel: [45092.739693] ath11k c000000.wifi: Failed to set beacon mode for VDEV: 0
Mon Jan 23 14:35:07 2023 kern.warn kernel: [45092.746211] ath11k c000000.wifi: failed to send WMI_BCN_TMPL_CMDID
Mon Jan 23 14:35:07 2023 kern.warn kernel: [45092.752685] ath11k c000000.wifi: failed to submit beacon template command: -108
Mon Jan 23 14:35:07 2023 kern.warn kernel: [45092.758870] ath11k c000000.wifi: failed to update bcn template: -108
Mon Jan 23 14:35:07 2023 kern.warn kernel: [45092.766072] ath11k c000000.wifi: failed to send WMI_VDEV_SET_PARAM_CMDID
Mon Jan 23 14:35:07 2023 kern.warn kernel: [45092.772650] ath11k c000000.wifi: failed to set BA BUFFER SIZE 256 for vdev: 0
Mon Jan 23 14:35:07 2023 kern.warn kernel: [45092.779365] ath11k c000000.wifi: failed to send WMI_VDEV_SET_PARAM_CMDID
Mon Jan 23 14:35:13 2023 kern.warn kernel: [45098.790349] ath11k_warn: 157 callbacks suppressed
Mon Jan 23 14:35:13 2023 kern.warn kernel: [45098.790370] ath11k c000000.wifi: failed to send WMI_PDEV_BSS_CHAN_INFO_REQUEST cmd
Mon Jan 23 14:35:13 2023 kern.warn kernel: [45098.794092] ath11k c000000.wifi: failed to send pdev bss chan info request
Mon Jan 23 14:35:13 2023 kern.warn kernel: [45098.801832] ath11k c000000.wifi: failed to send WMI_PDEV_SET_PARAM cmd
Mon Jan 23 14:35:13 2023 kern.warn kernel: [45098.808409] ath11k c000000.wifi: Failed to set beacon mode for VDEV: 0
Mon Jan 23 14:35:13 2023 kern.warn kernel: [45098.814921] ath11k c000000.wifi: failed to send WMI_BCN_TMPL_CMDID
Mon Jan 23 14:35:13 2023 kern.warn kernel: [45098.821401] ath11k c000000.wifi: failed to submit beacon template command: -108
Mon Jan 23 14:35:13 2023 kern.warn kernel: [45098.827587] ath11k c000000.wifi: failed to update bcn template: -108
Mon Jan 23 14:35:13 2023 kern.warn kernel: [45098.834786] ath11k c000000.wifi: failed to send WMI_VDEV_SET_PARAM_CMDID
Mon Jan 23 14:35:13 2023 kern.warn kernel: [45098.841366] ath11k c000000.wifi: failed to set BA BUFFER SIZE 256 for vdev: 0
Mon Jan 23 14:35:13 2023 kern.warn kernel: [45098.848082] ath11k c000000.wifi: failed to send WMI_VDEV_SET_PARAM_CMDID
Mon Jan 23 14:35:18 2023 kern.warn kernel: [45104.280947] ath11k_warn: 157 callbacks suppressed
Mon Jan 23 14:35:18 2023 kern.warn kernel: [45104.280968] ath11k c000000.wifi: failed to send WMI_PDEV_BSS_CHAN_INFO_REQUEST cmd
Mon Jan 23 14:35:18 2023 kern.warn kernel: [45104.284717] ath11k c000000.wifi: failed to send pdev bss chan info request
Mon Jan 23 14:35:18 2023 kern.warn kernel: [45104.292714] ath11k c000000.wifi: failed to send WMI_REQUEST_STATS cmd
Mon Jan 23 14:35:18 2023 kern.warn kernel: [45104.299013] ath11k c000000.wifi: could not request fw stats (-108)
Mon Jan 23 14:35:18 2023 kern.warn kernel: [45104.305508] ath11k c000000.wifi: failed to request fw pdev stats: -108
Mon Jan 23 14:35:18 2023 kern.warn kernel: [45104.312262] ath11k c000000.wifi: failed to send WMI_REQUEST_STATS cmd
Mon Jan 23 14:35:18 2023 kern.warn kernel: [45104.318114] ath11k c000000.wifi: could not request fw stats (-108)
Mon Jan 23 14:35:18 2023 kern.warn kernel: [45104.324597] ath11k c000000.wifi: failed to request fw pdev stats: -108
Mon Jan 23 14:35:18 2023 kern.warn kernel: [45104.331980] ath11k c000000.wifi: failed to send WMI_REQUEST_STATS cmd
Mon Jan 23 14:35:18 2023 kern.warn kernel: [45104.337205] ath11k c000000.wifi: could not request fw stats (-108)
Mon Jan 23 14:35:23 2023 kern.warn kernel: [45109.319737] ath11k_warn: 157 callbacks suppressed
Mon Jan 23 14:35:23 2023 kern.warn kernel: [45109.319757] ath11k c000000.wifi: failed to send WMI_PDEV_BSS_CHAN_INFO_REQUEST cmd
Mon Jan 23 14:35:23 2023 kern.warn kernel: [45109.323448] ath11k c000000.wifi: failed to send pdev bss chan info request
Mon Jan 23 14:35:23 2023 kern.warn kernel: [45109.331542] ath11k c000000.wifi: failed to send WMI_REQUEST_STATS cmd
Mon Jan 23 14:35:23 2023 kern.warn kernel: [45109.337801] ath11k c000000.wifi: could not request fw stats (-108)
Mon Jan 23 14:35:23 2023 kern.warn kernel: [45109.344292] ath11k c000000.wifi: failed to request fw pdev stats: -108
Mon Jan 23 14:35:23 2023 kern.warn kernel: [45109.351080] ath11k c000000.wifi: failed to send WMI_REQUEST_STATS cmd
Mon Jan 23 14:35:23 2023 kern.warn kernel: [45109.356904] ath11k c000000.wifi: could not request fw stats (-108)
Mon Jan 23 14:35:23 2023 kern.warn kernel: [45109.363373] ath11k c000000.wifi: failed to request fw pdev stats: -108
Mon Jan 23 14:35:23 2023 kern.warn kernel: [45109.370811] ath11k c000000.wifi: failed to send WMI_REQUEST_STATS cmd
Mon Jan 23 14:35:23 2023 kern.warn kernel: [45109.375999] ath11k c000000.wifi: could not request fw stats (-108)
Mon Jan 23 14:35:28 2023 kern.warn kernel: [45114.353105] ath11k_warn: 157 callbacks suppressed
Mon Jan 23 14:35:28 2023 kern.warn kernel: [45114.353127] ath11k c000000.wifi: failed to send WMI_PDEV_BSS_CHAN_INFO_REQUEST cmd
Mon Jan 23 14:35:28 2023 kern.warn kernel: [45114.356871] ath11k c000000.wifi: failed to send pdev bss chan info request
Mon Jan 23 14:35:28 2023 kern.warn kernel: [45114.364912] ath11k c000000.wifi: failed to send WMI_REQUEST_STATS cmd
Mon Jan 23 14:35:28 2023 kern.warn kernel: [45114.371139] ath11k c000000.wifi: could not request fw stats (-108)
Mon Jan 23 14:35:28 2023 kern.warn kernel: [45114.377669] ath11k c000000.wifi: failed to request fw pdev stats: -108
Mon Jan 23 14:35:29 2023 kern.warn kernel: [45114.384429] ath11k c000000.wifi: failed to send WMI_REQUEST_STATS cmd
Mon Jan 23 14:35:29 2023 kern.warn kernel: [45114.390235] ath11k c000000.wifi: could not request fw stats (-108)
Mon Jan 23 14:35:29 2023 kern.warn kernel: [45114.396767] ath11k c000000.wifi: failed to request fw pdev stats: -108
Mon Jan 23 14:35:29 2023 kern.warn kernel: [45114.404173] ath11k c000000.wifi: failed to send WMI_REQUEST_STATS cmd
Mon Jan 23 14:35:29 2023 kern.warn kernel: [45114.409332] ath11k c000000.wifi: could not request fw stats (-108)
Mon Jan 23 14:35:34 2023 kern.warn kernel: [45119.397660] ath11k_warn: 157 callbacks suppressed
Mon Jan 23 14:35:34 2023 kern.warn kernel: [45119.397681] ath11k c000000.wifi: failed to send WMI_PDEV_BSS_CHAN_INFO_REQUEST cmd
Mon Jan 23 14:35:34 2023 kern.warn kernel: [45119.401370] ath11k c000000.wifi: failed to send pdev bss chan info request
Mon Jan 23 14:35:34 2023 kern.warn kernel: [45119.409463] ath11k c000000.wifi: failed to send WMI_REQUEST_STATS cmd
Mon Jan 23 14:35:34 2023 kern.warn kernel: [45119.415738] ath11k c000000.wifi: could not request fw stats (-108)
Mon Jan 23 14:35:34 2023 kern.warn kernel: [45119.422200] ath11k c000000.wifi: failed to request fw pdev stats: -108
Mon Jan 23 14:35:34 2023 kern.warn kernel: [45119.429029] ath11k c000000.wifi: failed to send WMI_REQUEST_STATS cmd
Mon Jan 23 14:35:34 2023 kern.warn kernel: [45119.434829] ath11k c000000.wifi: could not request fw stats (-108)
Mon Jan 23 14:35:34 2023 kern.warn kernel: [45119.441297] ath11k c000000.wifi: failed to request fw pdev stats: -108
Mon Jan 23 14:35:34 2023 kern.warn kernel: [45119.448730] ath11k c000000.wifi: failed to send WMI_REQUEST_STATS cmd
Mon Jan 23 14:35:34 2023 kern.warn kernel: [45119.453911] ath11k c000000.wifi: could not request fw stats (-108)
Mon Jan 23 14:35:39 2023 kern.warn kernel: [45124.429918] ath11k_warn: 157 callbacks suppressed
Mon Jan 23 14:35:39 2023 kern.warn kernel: [45124.429939] ath11k c000000.wifi: failed to send WMI_PDEV_BSS_CHAN_INFO_REQUEST cmd
Mon Jan 23 14:35:39 2023 kern.warn kernel: [45124.433691] ath11k c000000.wifi: failed to send pdev bss chan info request
Mon Jan 23 14:35:39 2023 kern.warn kernel: [45124.441694] ath11k c000000.wifi: failed to send WMI_REQUEST_STATS cmd
Mon Jan 23 14:35:39 2023 kern.warn kernel: [45124.447983] ath11k c000000.wifi: could not request fw stats (-108)
Mon Jan 23 14:35:39 2023 kern.warn kernel: [45124.454474] ath11k c000000.wifi: failed to request fw pdev stats: -108
Mon Jan 23 14:35:39 2023 kern.warn kernel: [45124.461245] ath11k c000000.wifi: failed to send WMI_REQUEST_STATS cmd
Mon Jan 23 14:35:39 2023 kern.warn kernel: [45124.467086] ath11k c000000.wifi: could not request fw stats (-108)
Mon Jan 23 14:35:39 2023 kern.warn kernel: [45124.473555] ath11k c000000.wifi: failed to request fw pdev stats: -108
Mon Jan 23 14:35:39 2023 kern.warn kernel: [45124.481003] ath11k c000000.wifi: failed to send WMI_REQUEST_STATS cmd
Mon Jan 23 14:35:39 2023 kern.warn kernel: [45124.486168] ath11k c000000.wifi: could not request fw stats (-108)

This error is already known see General OpenWrt support for Xiaomi AX3600 (Part 2) - #12 by rmandrad

or in the Part 1 thread;

You could switch from wolfssl to openssl lib to work around this issue.

1 Like

I'm now trying to configure 802.11s mesh using batman-adv. I did this before on another model (TP Link Archer C7v5). But on AX3600 with most recent snapshot of OpenWrt I get this logread error output: What can I do about this?

Mon Jan 23 16:46:54 2023 daemon.notice netifd: Wireless device 'radio2' is now down
Mon Jan 23 16:46:54 2023 daemon.notice netifd: radio1 (3775): Command failed: ubus call wpa_supplicant config_remove {"iface":"phy1-mesh0"} (Invalid argument)
Mon Jan 23 16:46:54 2023 daemon.notice netifd: radio1 (3775): Usage: ubus [<options>] <command> [arguments...]
Mon Jan 23 16:46:54 2023 daemon.notice netifd: radio1 (3775): Options:
Mon Jan 23 16:46:54 2023 daemon.notice netifd: radio1 (3775):  -s <socket>:             Set the unix domain socket to connect to
Mon Jan 23 16:46:54 2023 daemon.notice netifd: radio1 (3775):  -t <timeout>:            Set the timeout (in seconds) for a command to complete
Mon Jan 23 16:46:54 2023 daemon.notice netifd: radio1 (3775):  -S:                      Use simplified output (for scripts)
Mon Jan 23 16:46:54 2023 daemon.notice netifd: radio1 (3775):  -v:                      More verbose output
Mon Jan 23 16:46:54 2023 daemon.notice netifd: radio1 (3775):  -m <type>:               (for monitor): include a specific message type
Mon Jan 23 16:46:54 2023 daemon.notice netifd: radio1 (3775):                   (can be used more than once)
Mon Jan 23 16:46:54 2023 daemon.notice netifd: radio1 (3775):  -M <r|t>         (for monitor): only capture received or transmitted traffic
Mon Jan 23 16:46:54 2023 daemon.notice netifd: radio1 (3775):
Mon Jan 23 16:46:54 2023 daemon.notice netifd: radio1 (3775):  - list [<path>]                  List objects
Mon Jan 23 16:46:54 2023 daemon.notice netifd: radio1 (3775):  - call <path> <method> [<message>]       Call an object method
Mon Jan 23 16:46:54 2023 daemon.notice netifd: radio1 (3775):  - subscribe <path> [<path>...]   Subscribe to object(s) notifications
Mon Jan 23 16:46:54 2023 daemon.notice netifd: radio1 (3775):  - listen [<path>...]                     Listen for events
Mon Jan 23 16:46:54 2023 daemon.notice netifd: radio1 (3775):  - send <type> [<message>]                Send an event
Mon Jan 23 16:46:54 2023 daemon.notice netifd: radio1 (3775):  - wait_for <object> [<object>...]        Wait for multiple objects to appear on ubus
Mon Jan 23 16:46:54 2023 daemon.notice netifd: radio1 (3775):  - monitor                                Monitor ubus traffic
Mon Jan 23 16:46:54 2023 daemon.notice netifd: radio1 (3775):
Mon Jan 23 16:46:54 2023 daemon.notice netifd: Wireless device 'radio0' is now down
Mon Jan 23 16:46:54 2023 daemon.notice netifd: Interface 'nwi_mesh0' is disabled
Mon Jan 23 16:46:54 2023 daemon.notice netifd: Wireless device 'radio2' is now up
Mon Jan 23 16:46:54 2023 daemon.notice netifd: Wireless device 'radio0' is now up
Mon Jan 23 16:46:54 2023 daemon.notice netifd: Wireless device 'radio1' is now down
Mon Jan 23 16:46:54 2023 daemon.err wpa_supplicant[1971]: Line 8: too large mode (value=5 max_value=4)
Mon Jan 23 16:46:54 2023 daemon.err wpa_supplicant[1971]: Line 8: failed to parse mode '5'.
Mon Jan 23 16:46:54 2023 daemon.err wpa_supplicant[1971]: Line 9: unknown network field 'mesh_fwding'.
Mon Jan 23 16:46:54 2023 daemon.err wpa_supplicant[1971]: Line 10: unknown network field 'mesh_rssi_threshold'.
Mon Jan 23 16:46:54 2023 daemon.err wpa_supplicant[1971]: Line 17: failed to parse network block.
Mon Jan 23 16:46:54 2023 daemon.err wpa_supplicant[1971]: Failed to read or parse configuration '/var/run/wpa_supplicant-phy1-mesh0.conf'.
Mon Jan 23 16:46:54 2023 daemon.notice wpa_supplicant[1971]: : CTRL-EVENT-DSCP-POLICY clear_all
Mon Jan 23 16:46:54 2023 daemon.notice netifd: radio1 (3894): Command failed: ubus call wpa_supplicant config_add {             "driver": "nl80211", "ctrl": "/var/run/wpa_supplicant",                 "iface": "phy1-mesh0", "config": "/var/run/wpa_supplicant-phy1-mesh0.conf"                                                 } (Invalid argument)
Mon Jan 23 16:46:54 2023 daemon.notice netifd: radio1 (3894): Usage: ubus [<options>] <command> [arguments...]
Mon Jan 23 16:46:54 2023 daemon.notice netifd: radio1 (3894): Options:
Mon Jan 23 16:46:54 2023 daemon.notice netifd: radio1 (3894):  -s <socket>:             Set the unix domain socket to connect to
Mon Jan 23 16:46:54 2023 daemon.notice netifd: radio1 (3894):  -t <timeout>:            Set the timeout (in seconds) for a command to complete
Mon Jan 23 16:46:54 2023 daemon.notice netifd: radio1 (3894):  -S:                      Use simplified output (for scripts)
Mon Jan 23 16:46:54 2023 daemon.notice netifd: radio1 (3894):  -v:                      More verbose output
Mon Jan 23 16:46:54 2023 daemon.notice netifd: radio1 (3894):  -m <type>:               (for monitor): include a specific message type
Mon Jan 23 16:46:54 2023 daemon.notice netifd: radio1 (3894):                   (can be used more than once)
Mon Jan 23 16:46:54 2023 daemon.notice netifd: radio1 (3894):  -M <r|t>         (for monitor): only capture received or transmitted traffic
Mon Jan 23 16:46:54 2023 daemon.notice netifd: radio1 (3894):
Mon Jan 23 16:46:54 2023 daemon.notice netifd: radio1 (3894): Commands:
Mon Jan 23 16:46:54 2023 daemon.notice netifd: radio1 (3894):  - list [<path>]                  List objects
Mon Jan 23 16:46:54 2023 daemon.notice netifd: radio1 (3894):  - call <path> <method> [<message>]       Call an object method
Mon Jan 23 16:46:54 2023 daemon.notice netifd: radio1 (3894):  - subscribe <path> [<path>...]   Subscribe to object(s) notifications
Mon Jan 23 16:46:54 2023 daemon.notice netifd: radio1 (3894):  - listen [<path>...]                     Listen for events
Mon Jan 23 16:46:54 2023 daemon.notice netifd: radio1 (3894):  - send <type> [<message>]                Send an event
Mon Jan 23 16:46:54 2023 daemon.notice netifd: radio1 (3894):  - wait_for <object> [<object>...]        Wait for multiple objects to appear on ubus
Mon Jan 23 16:46:54 2023 daemon.notice netifd: radio1 (3894):  - monitor                                Monitor ubus traffic
Mon Jan 23 16:46:54 2023 daemon.notice netifd: radio1 (3894):
Mon Jan 23 16:46:54 2023 daemon.notice netifd: radio1 (3894): Interface 0 setup failed: WPA_SUPPLICANT_FAILED
Mon Jan 23 16:46:54 2023 daemon.notice netifd: radio1 (3894): Failed to parse json data: unexpected end of data
Mon Jan 23 16:46:54 2023 daemon.notice netifd: radio1 (3894): WARNING (wireless_add_process): executable path /usr/sbin/wpad does not match process  path (/proc/exe)
Mon Jan 23 16:46:55 2023 daemon.notice netifd: radio1 (3894): Command failed: ubus call network.wireless notify { "command": 2, "device": "radio1", "data": { "pid": 0, "exe": "\/usr\/sbin\/wpad", "required": true, "keep": true } } (Invalid argument)
Mon Jan 23 16:46:55 2023 daemon.notice netifd: radio1 (3894): Usage: ubus [<options>] <command> [arguments...]
Mon Jan 23 16:46:55 2023 daemon.notice netifd: radio1 (3894): Options:
Mon Jan 23 16:46:55 2023 daemon.notice netifd: radio1 (3894):  -s <socket>:             Set the unix domain socket to connect to
Mon Jan 23 16:46:55 2023 daemon.notice netifd: radio1 (3894):  -t <timeout>:            Set the timeout (in seconds) for a command to complete
Mon Jan 23 16:46:55 2023 daemon.notice netifd: radio1 (3894):  -S:                      Use simplified output (for scripts)
Mon Jan 23 16:46:55 2023 daemon.notice netifd: radio1 (3894):  -v:                      More verbose output
Mon Jan 23 16:46:55 2023 daemon.notice netifd: radio1 (3894):  -m <type>:               (for monitor): include a specific message type
Mon Jan 23 16:46:55 2023 daemon.notice netifd: radio1 (3894):                   (can be used more than once)
Mon Jan 23 16:46:55 2023 daemon.notice netifd: radio1 (3894):  -M <r|t>         (for monitor): only capture received or transmitted traffic
Mon Jan 23 16:46:55 2023 daemon.notice netifd: radio1 (3894):
Mon Jan 23 16:46:55 2023 daemon.notice netifd: radio1 (3894): Commands:
Mon Jan 23 16:46:55 2023 daemon.notice netifd: radio1 (3894):  - list [<path>]                  List objects
Mon Jan 23 16:46:55 2023 daemon.notice netifd: radio1 (3894):  - call <path> <method> [<message>]       Call an object method
Mon Jan 23 16:46:55 2023 daemon.notice netifd: radio1 (3894):  - subscribe <path> [<path>...]   Subscribe to object(s) notifications
Mon Jan 23 16:46:55 2023 daemon.notice netifd: radio1 (3894):  - listen [<path>...]                     Listen for events
Mon Jan 23 16:46:55 2023 daemon.notice netifd: radio1 (3894):  - send <type> [<message>]                Send an event
Mon Jan 23 16:46:55 2023 daemon.notice netifd: radio1 (3894):  - wait_for <object> [<object>...]        Wait for multiple objects to appear on ubus
Mon Jan 23 16:46:55 2023 daemon.notice netifd: radio1 (3894):  - monitor                                Monitor ubus traffic
Mon Jan 23 16:46:55 2023 daemon.notice netifd: radio1 (3894):
Mon Jan 23 16:46:55 2023 daemon.notice netifd: radio1 (3894): command failed: Link has been severed (-67)
Mon Jan 23 16:46:55 2023 daemon.notice netifd: radio1 (3894): command failed: Link has been severed (-67)
Mon Jan 23 16:46:55 2023 daemon.notice netifd: Wireless device 'radio1' is now up
Mon Jan 23 16:46:55 2023 daemon.notice netifd: Interface 'nwi_mesh0' is enabled

Here are my configs:

/etc/config/network

...
config interface 'bat0'
	option proto 'batadv'
	option routing_algo 'BATMAN_IV'
	option aggregation '1'
	option ap_isolation '0'
	option bonding '0'
	option fragmentation '1'
	option gw_mode 'off'
	option log_level '0'
	option orig_interval '10000'
	option bridge_loop_avoidance '1'
	option distributed_arp_table '1'
	option multicast_mode '1'
	option network_coding '0'
	option hop_penalty '30'
	option isolation_mark '0x00000000/0x00000000'

config interface 'nwi_mesh0'
	option mtu '1532'
	option proto 'batadv_hardif'
	option master 'bat0'
...

/etc/config/wireless

...

config wifi-device 'radio1'
	option type 'mac80211'
	option path 'platform/soc/c000000.wifi'
	option channel '36'
	option band '5g'
	option htmode 'HE160'
	option cell_density '0'
	option country 'DE'
	option noscan '1'
	option disabled '0'
...
config wifi-iface 'wifinet0'
	option device 'radio1'
	option disabled '0'
	option short_preamble '0'
	option mode 'mesh'
	option network 'nwi_mesh0'
	option mesh_id 'meshSsid'
	option encryption 'sae'
	option key 'meshPsk'
	option disassoc_low_ack '1'
	option dtim_period '1'
	option short_preamble '1'
#	option mesh_fwding '0'
#	option mesh_rssi_threshold '0'

Possible solution:

opkg remove wpad-basic-wolfssl
opkg install wpad-mesh-wolfssl

But still errors in the log:

Mon Jan 23 17:03:54 2023 daemon.err wpa_supplicant[1971]: could not get valid channel
Mon Jan 23 17:03:54 2023 daemon.notice wpa_supplicant[1971]: phy1-mesh0: interface state UNINITIALIZED->DFS
Mon Jan 23 17:10:02 2023 daemon.notice wpa_supplicant[1971]: phy1-mesh0: MESH-GROUP-REMOVED phy1-mesh0
Mon Jan 23 17:10:02 2023 daemon.notice wpa_supplicant[1971]: phy1-mesh0: leaving mesh
Mon Jan 23 17:10:02 2023 daemon.notice wpa_supplicant[1971]: phy1-mesh0: interface state DFS->DISABLED
Mon Jan 23 17:10:02 2023 daemon.notice wpa_supplicant[1971]: phy1-mesh0: AP-DISABLED
Mon Jan 23 17:10:02 2023 daemon.err wpa_supplicant[1971]: hostapd_free_hapd_data: Interface phy1-mesh0 wasn't started
Mon Jan 23 17:10:02 2023 daemon.err wpa_supplicant[1971]: phy1-mesh0: mesh leave error=-107
Mon Jan 23 17:10:02 2023 daemon.notice netifd: Wireless device 'radio2' is now down
Mon Jan 23 17:10:02 2023 daemon.notice wpa_supplicant[1971]: phy1-mesh0: CTRL-EVENT-DSCP-POLICY clear_all
Mon Jan 23 17:10:02 2023 daemon.notice netifd: Wireless device 'radio0' is now down
Mon Jan 23 17:10:03 2023 daemon.notice wpa_supplicant[1971]: phy1-mesh0: CTRL-EVENT-DSCP-POLICY clear_all
Mon Jan 23 17:10:03 2023 daemon.notice wpa_supplicant[1971]: nl80211: deinit ifname=phy1-mesh0 disabled_11b_rates=0
Mon Jan 23 17:10:03 2023 daemon.err wpa_supplicant[1971]: rmdir[ctrl_interface=/var/run/wpa_supplicant]: Permission denied
Mon Jan 23 17:10:03 2023 daemon.notice netifd: Interface 'nwi_mesh0' is disabled
Mon Jan 23 17:10:03 2023 daemon.notice netifd: Wireless device 'radio0' is now up
Mon Jan 23 17:10:03 2023 daemon.notice netifd: Wireless device 'radio2' is now up
Mon Jan 23 17:10:03 2023 daemon.notice netifd: Wireless device 'radio1' is now down
Mon Jan 23 17:10:03 2023 daemon.notice netifd: radio1 (4647): command failed: Link has been severed (-67)
Mon Jan 23 17:10:03 2023 daemon.notice netifd: radio1 (4647): command failed: Link has been severed (-67)
Mon Jan 23 17:10:03 2023 daemon.notice netifd: Wireless device 'radio1' is now up
Mon Jan 23 17:10:03 2023 daemon.notice netifd: Interface 'nwi_mesh0' is enabled
Mon Jan 23 17:10:06 2023 daemon.err wpa_supplicant[1971]: could not get valid channel


The problem seems to be when the AX radio1 is configured to "HE160". If I switch to "HE80" my mesh comes up. Can anyone explain why HE160 doesn't work?

Switched to SNAPSHOT on my second AX3600 today coming from some version from Novemver.
Interestingly I also suffered from soft brick. Did not have the same issue for my main AX3600, where I switched to new rootfs already in the beginning of January.

Also what I noticed that in LUCI it shows Encryption: None, even though encryption is working.

That encryption info is a bug, its been already fixed in master but buildbots still need to get to it

1 Like

Until a real solution comes along, you could consider a hamfisted approach like this:

#!/usr/bin/env sh

failString="auth" && \
failCommand="echo 'hello';" && \
failMaxNum=8 && \
numFails=0 && \
IFS=$'\n'&& \
logread -f | while read line; do \
  #echo $line && \
  echo $line | grep -q "$failString";
  if [[ $? -eq 0 ]]; then \
    numFails=$((numFails+1));
  fi;
  if [[ $numFails -gt $failMaxNum ]]; then \
    sh -c $failCommand;
  fi;
done

You'd have to replace "failString" with something sane, obviously, like "could not request fw stats (-108)" if that happens to indicate the failure you want to reboot on.

If the AP quits working after the first failure you might not want to wait for 8 fails, like my example does with its "failMaxNum". On the other hand you might want to set it higher.

Same for "failCommand", "echo 'hello'" is just for testing, maybe reboot:wink:

Make sure it works first, keeping the "failCommand" from the example and running the script from a terminal and in the foreground, to see if it says "hello" when you would like it to reboot instead of actually doing the deed right away.

I don't have these problems on my AX3600s, so I couldn't test it myself.

EDIT: I forgot something that might be important: If try to copy some of that code on a Windows machine, it could not work, unless your editor is set to use UNIX style newlines. I think Windows still uses "\r\n" for newlines instead of just "\n". In this case code execution will fail after you transfer it to a UNIX like machine, because the backslashes ("\") I used to keep the script halfway readable will only affect the "\r" and not the "\n" after that.

2 Likes

Is there any recommended steps to upgrade while they fix fr libwolffsslcpu-crypto bug?

Which opkg commands do I need to switch over? Will this be officially fixed in the snapshot master so that it includes openssl? Or will ImageBuilder be fixed? Is that expected to happen?

I've got those packages installed, available:

# opkg list-installed | grep ssl
libopenssl1.1 - 1.1.1s-1
libustream-wolfssl20201210 - 2022-12-08-9217ab46-2
libwolfsslcpu-crypto5.5.4.e624513f - 5.5.4-stable-1
wpad-mesh-wolfssl - 2022-07-29-b704dc72-17.2

# opkg list | grep openssl
libopenssl1.1 - 1.1.1s-1

1- Make a script to install luci and your packages (example: /root/installpkgs.sh) with:

opkg update
opkg install luci
opkg install <pkg1>
opkg install <pkg2>

2- Add it to luci->backup/flash->configuration tab, so it can survive sysupgrade.

3- Stop WPAD and sysupgrade with luci->backup/flash->flash image.
(or use ssh)

4- ssh to the router and run your scritp to intall luci and other pkgs
(reboot if required)

3 Likes

With opkg alone you can't easily switch, as libustream-* is the library for downloading via https the packages and removing it will result in a non working opkg (i didn't try to do any forcing on any commands).

I don't know how this will be resolved, but there is already a bug-ticket https://github.com/openwrt/openwrt/issues/11839 and a patch which should resolve the problem with the libwolfsslcpu-crypto package on imagebuilder level. The AX3600 is not the only device which could be affected.

To switch to openssl completely, you need to use the imagebuilder/asu/luci-app-attendetsysupgrade and remove following:

libwolfsslcpu-crypto
wpad-mesh-wolfssl
libustream-wolfssl

and instead add

libustream-openssl
wpad-mesh-openssl

the rest should be done by imagebuilder/asu/luci-app-attendendsysupgrade.
After that, you should be able to use attendendsysupgrade without errors (but loose the hardware crypto features of wolfssl).

1 Like