Updated M76 drivers cause boot loop on Archer C6 v3 and other MT devices

I just tested a new build I did today from master (r17748-ade56b8d9e Oct 12th 2021) with the updated M76 drivers.

I use to do my custom builds to use as an access point (basically I remove dnsmasq, firewall and some other things not needed in an access point).

I've been using this build on an Archer C6 v3.2 this way for quite some time.

I just did a new build build today to test the updated m76 driver, and there is a serious defect now.

After a clean install, as soon as I enable de 5Ghz radio the router crashes and reboot, and remain in this boot loop forever. Well, technically is not a boot loop since it is booting OK, but as soon as it tries to enable de 5Ghz radio it reboots again.

I then entered in failsafe mode, but dmesg is not saved from previous boot and logread is not available (and anyway no error would be shown since wifi is disabled in failsafe mode). Therefore I cannot find any error message about this issue.

If anyone has a suggestion how to capture additional errors in this situation just let me know .

For now I am reverting back to my previous build (SNAPSHOT r17729-b5893a4128 Oct 10th, 2021), and hopefully this issue should be fixed.

OK, I left "logread -f" running when I enabled the 5Ghz radio. Follow the logread messages logged right after I enabled 5GHz radio. After the last message the device rebooted itself:

Tue Oct 12 20:05:03 2021 kern.warn kernel: [  410.821560] netlink: 'iw': attribute type 302 has an invalid length.
Tue Oct 12 20:05:04 2021 daemon.notice hostapd: Configuration file: /var/run/hostapd-phy1.conf (phy wlan1) --> new PHY
Tue Oct 12 20:05:04 2021 kern.info kernel: [  411.289459] br-lan: port 6(wlan1) entered blocking state
Tue Oct 12 20:05:04 2021 kern.info kernel: [  411.294822] br-lan: port 6(wlan1) entered disabled state
Tue Oct 12 20:05:04 2021 kern.info kernel: [  411.300630] device wlan1 entered promiscuous mode
Tue Oct 12 20:05:04 2021 daemon.notice hostapd: Frequency 5660 (primary) not allowed for AP mode, flags: 0xf00797b NO-IR RADAR
Tue Oct 12 20:05:04 2021 daemon.err hostapd: Primary frequency not allowed
Tue Oct 12 20:05:04 2021 daemon.warn hostapd: wlan1: IEEE 802.11 Configured channel (132) or frequency (5660) (secondary_channel=1) not found from the channel list of the current mode (2) IEEE 802.11a
Tue Oct 12 20:05:04 2021 daemon.warn hostapd: wlan1: IEEE 802.11 Hardware does not support configured channel
Tue Oct 12 20:05:04 2021 daemon.err hostapd: Could not select hw_mode and channel. (-3)
Tue Oct 12 20:05:04 2021 daemon.notice hostapd: wlan1: interface state UNINITIALIZED->DISABLED
Tue Oct 12 20:05:04 2021 daemon.notice hostapd: wlan1: AP-DISABLED
Tue Oct 12 20:05:04 2021 daemon.err hostapd: wlan1: Unable to setup interface.
Tue Oct 12 20:05:04 2021 daemon.notice hostapd: nl80211: deinit ifname=wlan1 disabled_11b_rates=0
Tue Oct 12 20:05:04 2021 kern.info kernel: [  411.310532] device wlan1 left promiscuous mode
Tue Oct 12 20:05:04 2021 kern.info kernel: [  411.315329] br-lan: port 6(wlan1) entered disabled state

So far I was using a DFS channel on the Archer C6 v3.2 without any problem. I've noticed the error message "daemon.err hostapd: Could not select hw_mode and channel. (-3)" and now I am wondering that something changed that broke the usage of DFS channels on this device.

I will try using a non-DFS channel to see if it keeps rebooting.

Tried channel 36. Now at least the kernel errors appeared before the device self rebooted and entered in an infinite reboot state. Definitively the mt76 drivers update comnpletly broke the 5Ghz radio no this device (mt7613).... :frowning_face:

ue Oct 12 20:20:26 2021 kern.warn kernel: [  325.625614] netlink: 'iw': attribute type 302 has an invalid length.
Tue Oct 12 20:20:26 2021 daemon.notice hostapd: Configuration file: /var/run/hostapd-phy1.conf (phy wlan1) --> new PHY
Tue Oct 12 20:20:26 2021 kern.info kernel: [  326.119268] br-lan: port 5(wlan1) entered blocking state
Tue Oct 12 20:20:26 2021 kern.info kernel: [  326.124657] br-lan: port 5(wlan1) entered disabled state
Tue Oct 12 20:20:26 2021 kern.info kernel: [  326.130544] device wlan1 entered promiscuous mode
Tue Oct 12 20:20:26 2021 daemon.notice hostapd: wlan1: interface state UNINITIALIZED->COUNTRY_UPDATE
Tue Oct 12 20:20:26 2021 daemon.notice hostapd: wlan1: interface state COUNTRY_UPDATE->HT_SCAN
Tue Oct 12 20:20:27 2021 kern.alert kernel: [  326.670265] CPU 3 Unable to handle kernel paging request at virtual address 00000000, epc == 86f619b0, ra == 86f61be8
Tue Oct 12 20:20:27 2021 kern.warn kernel: [  326.680874] Oops[#1]:
Tue Oct 12 20:20:27 2021 kern.warn kernel: [  326.683142] CPU: 3 PID: 1366 Comm: hostapd Not tainted 5.4.152 #0
Tue Oct 12 20:20:27 2021 kern.warn kernel: [  326.689202] $ 0   : 00000000 00000001 00000038 00000001
Tue Oct 12 20:20:27 2021 kern.warn kernel: [  326.694405] $ 4   : 00000018 00000001 00000000 00000000
Tue Oct 12 20:20:27 2021 kern.warn kernel: [  326.699606] $ 8   : 87f5e880 00000000 00000000 00000000
Tue Oct 12 20:20:27 2021 kern.warn kernel: [  326.704808] $12   : 00000000 00000008 00000001 000040c8
Tue Oct 12 20:20:27 2021 kern.warn kernel: [  326.710010] $16   : 00000000 00000001 869c6050 869c6068
Tue Oct 12 20:20:27 2021 kern.warn kernel: [  326.715212] $20   : 869c5f80 8746310c 000003e8 0000145a
Tue Oct 12 20:20:27 2021 kern.warn kernel: [  326.720413] $24   : 00000002 869e14a4
Tue Oct 12 20:20:27 2021 kern.warn kernel: [  326.725615] $28   : 8647a000 8647b7e8 00000000 86f61be8
Tue Oct 12 20:20:27 2021 kern.warn kernel: [  326.730818] Hi    : ccccc547
Tue Oct 12 20:20:27 2021 kern.warn kernel: [  326.733680] Lo    : 66666485
Tue Oct 12 20:20:27 2021 kern.warn kernel: [  326.736565] epc   : 86f619b0 mt76_connac_mcu_set_rate_txpower+0x150/0x204 [mt76_connac_lib]
Tue Oct 12 20:20:27 2021 kern.warn kernel: [  326.744880] ra    : 86f61be8 mt76_connac_mcu_uni_add_bss+0x184/0x644 [mt76_connac_lib]

Just tried again, without changing the country code this time, same problem. At least for now I am giving up on the updated drivers and rolling back to a previous build. Hopefully this issue will be fixed soon on master.

root@OpenWrt:~# logread -f
Tue Oct 12 20:30:55 2021 user.info : luci: accepted login on /admin/network/wireless for root from 192.168.1.120
Tue Oct 12 20:31:13 2021 kern.warn kernel: [   47.970884] netlink: 'iw': attribute type 302 has an invalid length.
Tue Oct 12 20:31:13 2021 daemon.notice hostapd: Configuration file: /var/run/hostapd-phy1.conf (phy wlan1) --> new PHY
Tue Oct 12 20:31:13 2021 kern.info kernel: [   48.463184] br-lan: port 5(wlan1) entered blocking state
Tue Oct 12 20:31:13 2021 kern.info kernel: [   48.468578] br-lan: port 5(wlan1) entered disabled state
Tue Oct 12 20:31:13 2021 kern.info kernel: [   48.474556] device wlan1 entered promiscuous mode
Tue Oct 12 20:31:13 2021 daemon.notice hostapd: wlan1: interface state UNINITIALIZED->HT_SCAN
Tue Oct 12 20:31:14 2021 kern.alert kernel: [   49.011585] CPU 0 Unable to handle kernel paging request at virtual address 00000000, epc == 86f119b0, ra == 86f11be8

Crash log you provided is a bit confusing, because it is a null pointer reference:

mt76_connac_mcu_set_rate_txpower

could only crash if phy is null. I wonder if chip is being recognised incorrectly as DBDC or something other, hard to guess. Could you provide output of iw phy command and /etc/config/wireless

Try latest snapshot build, this commit have fixed

Still having the same problem with r17750-213ce1d837

1 Like

OpenWrt SNAPSHOT r17753-48e209e5c5
had same issue....device boot looped the moment i turned on 5Ghz radio

1 Like

Also problem with OpenWrt SNAPSHOT r17757 on 5Ghz radio -> Client WDS

failed to insert STA entry for AP ( error -22 )

iw: attrubute type 302 has an invalide length

1 Like

I just tested today's snapshot build (r17758-b118efa0d2) and the issue still remains. Right after enabling the 5Ghz radio device starts boot looping.

@nbd, would it be possible to revert the m76 drivers update?

Below are the outputs from iw phy and /etc/config/wireless. Notice that these are default configurations right after a clean install.

Thanks!

iw phy

root@OpenWrt:~# iw phy
Wiphy phy1
        wiphy index: 1
        max # scan SSIDs: 4
        max scan IEs length: 543 bytes
        max # sched scan SSIDs: 10
        max # match sets: 16
        Retry short limit: 7
        Retry long limit: 4
        Coverage class: 0 (up to 0m)
        Device supports AP-side u-APSD.
        Device supports T-DLS.
        Available Antennas: TX 0x3 RX 0x3
        Configured Antennas: TX 0x3 RX 0x3
        Supported interface modes:
                 * IBSS
                 * managed
                 * AP
                 * AP/VLAN
                 * monitor
                 * mesh point
                 * P2P-client
                 * P2P-GO
        Band 2:
                Capabilities: 0x1ff
                        RX LDPC
                        HT20/HT40
                        SM Power Save disabled
                        RX Greenfield
                        RX HT20 SGI
                        RX HT40 SGI
                        TX STBC
                        RX STBC 1-stream
                        Max AMSDU length: 3839 bytes
                        No DSSS/CCK HT40
                Maximum RX AMPDU length 65535 bytes (exponent: 0x003)
                Minimum RX AMPDU time spacing: No restriction (0x00)
                HT TX/RX MCS rate indexes supported: 0-15
                VHT Capabilities (0x338001f8):
                        Max MPDU length: 3895
                        Supported Channel Width: 160 MHz, 80+80 MHz
                        RX LDPC
                        short GI (80 MHz)
                        short GI (160/80+80 MHz)
                        TX STBC
                        RX antenna pattern consistency
                        TX antenna pattern consistency
                VHT RX MCS set:
                        1 streams: MCS 0-9
                        2 streams: MCS 0-9
                        3 streams: not supported
                        4 streams: not supported
                        5 streams: not supported
                        6 streams: not supported
                        7 streams: not supported
                        8 streams: not supported
                VHT RX highest supported: 0 Mbps
                VHT TX MCS set:
                        1 streams: MCS 0-9
                        2 streams: MCS 0-9
                        3 streams: not supported
                        4 streams: not supported
                        5 streams: not supported
                        6 streams: not supported
                        7 streams: not supported
                        8 streams: not supported
                VHT TX highest supported: 0 Mbps
                Frequencies:
                        * 5180 MHz [36] (20.0 dBm)
                        * 5200 MHz [40] (20.0 dBm)
                        * 5220 MHz [44] (20.0 dBm)
                        * 5240 MHz [48] (20.0 dBm)
                        * 5260 MHz [52] (20.0 dBm) (no IR, radar detection)
                        * 5280 MHz [56] (20.0 dBm) (no IR, radar detection)
                        * 5300 MHz [60] (20.0 dBm) (no IR, radar detection)
                        * 5320 MHz [64] (20.0 dBm) (no IR, radar detection)
                        * 5500 MHz [100] (20.0 dBm) (no IR, radar detection)
                        * 5520 MHz [104] (20.0 dBm) (no IR, radar detection)
                        * 5540 MHz [108] (20.0 dBm) (no IR, radar detection)
                        * 5560 MHz [112] (20.0 dBm) (no IR, radar detection)
                        * 5580 MHz [116] (20.0 dBm) (no IR, radar detection)
                        * 5600 MHz [120] (20.0 dBm) (no IR, radar detection)
                        * 5620 MHz [124] (20.0 dBm) (no IR, radar detection)
                        * 5640 MHz [128] (20.0 dBm) (no IR, radar detection)
                        * 5660 MHz [132] (20.0 dBm) (no IR, radar detection)
                        * 5680 MHz [136] (20.0 dBm) (no IR, radar detection)
                        * 5700 MHz [140] (20.0 dBm) (no IR, radar detection)
                        * 5720 MHz [144] (20.0 dBm) (no IR, radar detection)
                        * 5745 MHz [149] (20.0 dBm) (no IR)
                        * 5765 MHz [153] (20.0 dBm) (no IR)
                        * 5785 MHz [157] (20.0 dBm) (no IR)
                        * 5805 MHz [161] (20.0 dBm) (no IR)
                        * 5825 MHz [165] (20.0 dBm) (no IR)
                        * 5845 MHz [169] (disabled)
                        * 5865 MHz [173] (disabled)
        valid interface combinations:
                 * #{ IBSS } <= 1, #{ managed, AP, mesh point, P2P-client, P2P-GO } <= 16,
                   total <= 16, #channels <= 1, STA/AP BI must match
        HT Capability overrides:
                 * MCS: ff ff ff ff ff ff ff ff ff ff
                 * maximum A-MSDU length
                 * supported channel width
                 * short GI for 40 MHz
                 * max A-MPDU length exponent
                 * min MPDU start spacing
        max # scan plans: 1
        max scan plan interval: 65535
        max scan plan iterations: 0
        Supported extended features:
                * [ VHT_IBSS ]: VHT-IBSS
                * [ RRM ]: RRM
                * [ SET_SCAN_DWELL ]: scan dwell setting
                * [ FILS_STA ]: STA FILS (Fast Initial Link Setup)
                * [ CQM_RSSI_LIST ]: multiple CQM_RSSI_THOLD records
                * [ CONTROL_PORT_OVER_NL80211 ]: control port over nl80211
                * [ TXQS ]: FQ-CoDel-enabled intermediate TXQs
                * [ AIRTIME_FAIRNESS ]: airtime fairness scheduling
                * [ AQL ]: Airtime Queue Limits (AQL)
                * [ CONTROL_PORT_NO_PREAUTH ]: disable pre-auth over nl80211 control port support
                * [ DEL_IBSS_STA ]: deletion of IBSS station support
                * [ SCAN_FREQ_KHZ ]: scan on kHz frequency support
                * [ CONTROL_PORT_OVER_NL80211_TX_STATUS ]: tx status for nl80211 control port support
Wiphy phy0
        wiphy index: 0
        max # scan SSIDs: 4
        max scan IEs length: 2257 bytes
        max # sched scan SSIDs: 0
        max # match sets: 0
        Retry short limit: 7
        Retry long limit: 4
        Coverage class: 0 (up to 0m)
        Device supports AP-side u-APSD.
        Device supports T-DLS.
        Available Antennas: TX 0x3 RX 0x3
        Configured Antennas: TX 0x3 RX 0x3
        Supported interface modes:
                 * IBSS
                 * managed
                 * AP
                 * AP/VLAN
                 * monitor
                 * mesh point
                 * P2P-client
                 * P2P-GO
        Band 1:
                Capabilities: 0x1fe
                        HT20/HT40
                        SM Power Save disabled
                        RX Greenfield
                        RX HT20 SGI
                        RX HT40 SGI
                        TX STBC
                        RX STBC 1-stream
                        Max AMSDU length: 3839 bytes
                        No DSSS/CCK HT40
                Maximum RX AMPDU length 65535 bytes (exponent: 0x003)
                Minimum RX AMPDU time spacing: No restriction (0x00)
                HT TX/RX MCS rate indexes supported: 0-15
                Frequencies:
                        * 2412 MHz [1] (20.0 dBm)
                        * 2417 MHz [2] (20.0 dBm)
                        * 2422 MHz [3] (20.0 dBm)
                        * 2427 MHz [4] (20.0 dBm)
                        * 2432 MHz [5] (20.0 dBm)
                        * 2437 MHz [6] (20.0 dBm)
                        * 2442 MHz [7] (20.0 dBm)
                        * 2447 MHz [8] (20.0 dBm)
                        * 2452 MHz [9] (20.0 dBm)
                        * 2457 MHz [10] (20.0 dBm)
                        * 2462 MHz [11] (20.0 dBm)
                        * 2467 MHz [12] (20.0 dBm) (no IR)
                        * 2472 MHz [13] (20.0 dBm) (no IR)
                        * 2484 MHz [14] (20.0 dBm) (no IR)
        valid interface combinations:
                 * #{ IBSS } <= 1, #{ managed, AP, mesh point, P2P-client, P2P-GO } <= 4,
                   total <= 4, #channels <= 1, STA/AP BI must match
        HT Capability overrides:
                 * MCS: ff ff ff ff ff ff ff ff ff ff
                 * maximum A-MSDU length
                 * supported channel width
                 * short GI for 40 MHz
                 * max A-MPDU length exponent
                 * min MPDU start spacing
        max # scan plans: 1
        max scan plan interval: -1
        max scan plan iterations: 0
        Supported extended features:
                * [ RRM ]: RRM
                * [ FILS_STA ]: STA FILS (Fast Initial Link Setup)
                * [ CQM_RSSI_LIST ]: multiple CQM_RSSI_THOLD records
                * [ CONTROL_PORT_OVER_NL80211 ]: control port over nl80211
                * [ TXQS ]: FQ-CoDel-enabled intermediate TXQs
                * [ AIRTIME_FAIRNESS ]: airtime fairness scheduling
                * [ AQL ]: Airtime Queue Limits (AQL)
                * [ SCAN_RANDOM_SN ]: use random sequence numbers in scans
                * [ SCAN_MIN_PREQ_CONTENT ]: use probe request with only rate IEs in scans
                * [ CONTROL_PORT_NO_PREAUTH ]: disable pre-auth over nl80211 control port support
                * [ DEL_IBSS_STA ]: deletion of IBSS station support
                * [ SCAN_FREQ_KHZ ]: scan on kHz frequency support
                * [ CONTROL_PORT_OVER_NL80211_TX_STATUS ]: tx status for nl80211 control port support
root@OpenWrt:~#

/etc/config/wireless

root@OpenWrt:~# cat /etc/config/wireless

config wifi-device 'radio0'
        option type 'mac80211'
        option path '1e140000.pcie/pci0000:00/0000:00:00.0/0000:01:00.0'
        option channel '1'
        option band '2g'
        option htmode 'HT20'
        option disabled '1'

config wifi-iface 'default_radio0'
        option device 'radio0'
        option network 'lan'
        option mode 'ap'
        option ssid 'OpenWrt'
        option encryption 'none'

config wifi-device 'radio1'
        option type 'mac80211'
        option path '1e140000.pcie/pci0000:00/0000:00:01.0/0000:02:00.0'
        option channel '36'
        option band '5g'
        option htmode 'VHT80'
        option disabled '1'

config wifi-iface 'default_radio1'
        option device 'radio1'
        option network 'lan'
        option mode 'ap'
        option ssid 'OpenWrt'
        option encryption 'none'

root@OpenWrt:~#

Crash report right after enabling 5Ghz radio:

root@OpenWrt:~# logread -f
Sat Oct 16 10:26:07 2021 kern.warn kernel: [  788.538469] netlink: 'iw': attribute type 302 has an invalid length.
Sat Oct 16 10:26:07 2021 daemon.notice hostapd: Configuration file: /var/run/hostapd-phy1.conf (phy wlan1) --> new PHY
Sat Oct 16 10:26:07 2021 kern.info kernel: [  788.988580] br-lan: port 5(wlan1) entered blocking state
Sat Oct 16 10:26:07 2021 kern.info kernel: [  788.994029] br-lan: port 5(wlan1) entered disabled state
Sat Oct 16 10:26:07 2021 kern.info kernel: [  788.999965] device wlan1 entered promiscuous mode
Sat Oct 16 10:26:07 2021 daemon.notice hostapd: wlan1: interface state UNINITIALIZED->HT_SCAN
Sat Oct 16 10:26:08 2021 kern.alert kernel: [  789.402910] CPU 1 Unable to handle kernel paging request at virtual address 00000000, epc == 864599b0, ra == 86459be8
Sat Oct 16 10:26:08 2021 kern.warn kernel: [  789.413524] Oops[#1]:
Sat Oct 16 10:26:08 2021 kern.warn kernel: [  789.415789] CPU: 1 PID: 1490 Comm: hostapd Not tainted 5.4.152 #0
Sat Oct 16 10:26:08 2021 kern.warn kernel: [  789.421847] $ 0   : 00000000 00000001 00000038 00000001
Sat Oct 16 10:26:08 2021 kern.warn kernel: [  789.427053] $ 4   : 00000018 00000001 00000000 00000000
Sat Oct 16 10:26:08 2021 kern.warn kernel: [  789.432259] $ 8   : 8718c080 00000000 00000000 00000000
Sat Oct 16 10:26:08 2021 kern.warn kernel: [  789.437462] $12   : 00000000 001a3ff9 00000001 0000845c
Sat Oct 16 10:26:08 2021 kern.warn kernel: [  789.442664] $16   : 00000000 00000001 86fb2050 86fb2068
Sat Oct 16 10:26:08 2021 kern.warn kernel: [  789.447866] $20   : 86fb1f80 8659f12c 000003e8 0000145a
Sat Oct 16 10:26:08 2021 kern.warn kernel: [  789.453069] $24   : 00000000 865a14a4
Sat Oct 16 10:26:08 2021 kern.warn kernel: [  789.458272] $28   : 86fbc000 86fbd7e8 00000000 86459be8
Sat Oct 16 10:26:08 2021 kern.warn kernel: [  789.463475] Hi    : ccccc547
Sat Oct 16 10:26:08 2021 kern.warn kernel: [  789.466336] Lo    : 66666485
Sat Oct 16 10:26:08 2021 kern.warn kernel: [  789.469221] epc   : 864599b0 mt76_connac_mcu_set_rate_txpower+0x150/0x204 [mt76_connac_lib]
Sat Oct 16 10:26:08 2021 kern.warn kernel: [  789.477536] ra    : 86459be8 mt76_connac_mcu_uni_add_bss+0x184/0x644 [mt76_connac_lib]
Sat Oct 16 10:26:08 2021 kern.warn kernel: [  789.485412] Status: 11007c03      KERNEL EXL IE
Sat Oct 16 10:26:08 2021 kern.warn kernel: [  789.489577] Cause : 40800008 (ExcCode 02)
Sat Oct 16 10:26:08 2021 kern.warn kernel: [  789.493563] BadVA : 00000000
Sat Oct 16 10:26:08 2021 kern.warn kernel: [  789.496427] PrId  : 0001992f (MIPS 1004Kc)
Sat Oct 16 10:26:08 2021 kern.warn kernel: [  789.500496] Modules linked in: pppoe ppp_async iptable_nat xt_state xt_nat xt_conntrack xt_REDIRECT xt_MASQUERADE xt_FLOWOFFLOAD xt_CT pppox ppp_generic nf_nat nf_flow_table_hw nf_flow_table nf_conntrack mt7615e mt7615_common mt7603e mt76_connac_lib mt76 mac80211 ipt_REJECT cfg80211 xt_time xt_tcpudp xt_multiport xt_mark xt_mac xt_limit xt_comment xt_TCPMSS xt_LOG slhc nf_reject_ipv4 nf_log_ipv4 nf_defrag_ipv6 nf_defrag_ipv4 iptable_mangle iptable_filter ip_tables hwmon crc_ccitt compat nf_log_ipv6 nf_log_common ip6table_mangle ip6table_filter ip6_tables ip6t_REJECT x_tables nf_reject_ipv6 sha256_generic libsha256 seqiv jitterentropy_rng drbg hmac ghash_generic gf128mul gcm ctr cmac ccm leds_gpio gpio_button_hotplug
Sat Oct 16 10:26:08 2021 kern.warn kernel: [  789.563725] Process hostapd (pid: 1490, threadinfo=1e6a8220, task=6185c4bd, tls=77e36dcc)
Sat Oct 16 10:26:08 2021 kern.warn kernel: [  789.571858] Stack : 86fbd834 00000810 00000000 86fb0c20 86fb0c20 8659ee68 86fb1f80 00000001
Sat Oct 16 10:26:08 2021 kern.warn kernel: [  789.580178]         00000001 86459be8 87d43500 87d43500 86fb1c00 86549294 00000000 00000000
Sat Oct 16 10:26:08 2021 kern.warn kernel: [  789.588499]         00000000 00000000 00100002 00512a24 04010302 00000100 00000003 0000145a
Sat Oct 16 10:26:08 2021 kern.warn kernel: [  789.596821]         00000000 00000000 00000000 00000000 86fb1c00 00000000 00200000 00000001
Sat Oct 16 10:26:08 2021 kern.warn kernel: [  789.605142]         00000000 00000000 00000000 00640000 00003802 00000000 0008000f 00000001
Sat Oct 16 10:26:08 2021 kern.warn kernel: [  789.613462]         ...
Sat Oct 16 10:26:08 2021 kern.warn kernel: [  789.615899] Call Trace:
Sat Oct 16 10:26:08 2021 kern.warn kernel: [  789.618338] [<864599b0>] mt76_connac_mcu_set_rate_txpower+0x150/0x204 [mt76_connac_lib]

Same problem in 5GHz with Tenbay T-MB5EU-V01

in 2.4Ghz run fine

1 Like

The error netlink: 'iw': attribute type 302 has an invalid length existed in previous builds (before m76 driver update). While it seems to indicate something is not right, Wi-Fi is reasonably stable and 5Ghz is working OK despite of these errors (before the M76 driver update).

Yes Wifi run without problem but i have an error in 5GHz:

master <-> slave in 2.4 Ghz fine

master <-> slave in 5Ghz error
In console : wlan1: failed to insert STA entry for the AP (error -22)

I can use without problem with CUDY-X6 in master & TenBay in client

Does it work if you remove the kmod-mt7663-firmware-sta package from your device?

1 Like

This works I just tried it out with release 17758. Does removing that package take away any functions required for mesh or batman?

Off-topic question: Can mesh or batman (wifi) be done with mediatek and atheros routers? I tried some guides but couldn't ping from a bridge node to the gateway, vice versa works with 2 atheros routers. I haven't tried with this mediatek router. Thanks for helping me out with my device.

As soon as I removed kmod-mt7663-firmware-sta package and enabled the 5Ghz radio the problem happened again.

However, right after the reboot now the 5Ghz radio is coming online without problems!

So for now the workaround seems to be indeed removing this package before enabling the 5Ghz radio.

Thank you! :smiley:

1 Like

Removing the sta firmware does not take away any functionality. This firmware is completely unsuitable for AP/mesh functionality, and I have no idea why it was ever included in the default package set.
Just to clarify, the ap firmware can also handle sta mode just fine

2 Likes

Would you mind telling me why a mesh between ipq40xx / ath79 is not achievable when paired with mt7621 routers? Is it a bug? or is it not meant to happen as they are incompatible? Thanks again.