Xiaomi AX3600: ath11k driver crash ath11k hal rx sw mon ring_buf_paddr_get

Hi,

I'm on official snapshot of 2023-02-02. radio0 (QCA), radio2 (2.4 GHz IPQ) still work after the crash. radio1 doesn't work anymore until I reboot the device. I had no luck issuing "rmmod ath11k; modprobe ath11k; wifi up" to revive it without a reboot.

Here's the log. radio1 (AX) crashed at 09:27.
I've made a watchdog script to help me out with auto-reboot-on-error. ( Link: https://github.com/Catfriend1/openwrt-presence/blob/master/scripts/ath11k-watchdog/ath11k-watchdog.sh )


Fri Feb  3 08:06:05 2023 daemon.info hostapd: phy0-ap0: STA aa:aa:aa:aa:aa:aa WPA: group key handshake completed (RSN)
Fri Feb  3 09:27:30 2023 daemon.notice hostapd: phy1-ap0: DFS-RADAR-DETECTED freq=5500 ht_enabled=0 chan_offset=0 chan_width=5 cf1=5570 cf2=0
Fri Feb  3 09:27:30 2023 daemon.notice hostapd: dfs_downgrade_bandwidth: no DFS channels left, waiting for NOP to finish
Fri Feb  3 09:27:30 2023 daemon.notice hostapd: phy1-ap0: AP-DISABLED
Fri Feb  3 09:27:30 2023 daemon.notice wpa_supplicant[2074]: phy1-mesh0: DFS-RADAR-DETECTED freq=5500 ht_enabled=0 chan_offset=0 chan_width=5 cf1=5570 cf2=0
Fri Feb  3 09:27:30 2023 daemon.notice wpa_supplicant[2074]: phy1-mesh0: DFS-NEW-CHANNEL freq=5260 chan=52 sec_chan=1
Fri Feb  3 09:27:30 2023 daemon.warn wpa_supplicant[2074]: DFS failed to schedule CSA (-22) - trying fallback
Fri Feb  3 09:27:30 2023 daemon.notice hostapd: nl80211: deinit ifname=phy1-ap0 disabled_11b_rates=0
Fri Feb  3 09:27:30 2023 kern.info kernel: [91302.025793] device phy1-ap0 left promiscuous mode
Fri Feb  3 09:27:30 2023 kern.info kernel: [91302.025959] br-vl177: port 6(phy1-ap0) entered disabled state
Fri Feb  3 09:27:30 2023 daemon.notice netifd: Network device 'phy1-ap0' link is down
Fri Feb  3 09:27:30 2023 kern.warn kernel: [91302.109179] ------------[ cut here ]------------
Fri Feb  3 09:27:30 2023 kern.warn kernel: [91302.109218] WARNING: CPU: 0 PID: 0 at ath11k_hal_rx_sw_mon_ring_buf_paddr_get+0x4628/0x49f0 [ath11k]
Fri Feb  3 09:27:30 2023 kern.warn kernel: [91302.112875] Modules linked in: pppoe ppp_async nft_fib_inet nf_flow_table_ipv6 nf_flow_table_ipv4 nf_flow_table_inet batman_adv ath11k_ahb ath11k ath10k_pci ath10k_core ath pppox ppp_generic nft_reject_ipv6 nft_reject_ipv4 nft_reject_inet nft_reject nft_redir nft_quota nft_objref nft_numgen nft_nat nft_masq nft_log nft_limit nft_hash nft_flow_offload nft_fib_ipv6 nft_fib_ipv4 nft_fib nft_ct nft_counter nft_chain_nat nf_tables nf_nat nf_flow_table nf_conntrack mac80211 cfg80211 slhc qrtr_smd qrtr qmi_helpers ns nfnetlink nf_reject_ipv6 nf_reject_ipv4 nf_log_syslog nf_defrag_ipv6 nf_defrag_ipv4 libcrc32c hwmon crc_ccitt compat seqiv jitterentropy_rng drbg michael_mic hmac cmac leds_gpio xhci_plat_hcd xhci_pci xhci_hcd dwc3 dwc3_qcom qca_nss_dp qca_ssdk gpio_button_hotplug crc32c_generic
Fri Feb  3 09:27:30 2023 kern.warn kernel: [91302.168932] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.15.90 #0
Fri Feb  3 09:27:30 2023 kern.warn kernel: [91302.191167] Hardware name: Xiaomi AX3600 (DT)
Fri Feb  3 09:27:30 2023 kern.warn kernel: [91302.197415] pstate: 00400005 (nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
Fri Feb  3 09:27:30 2023 kern.warn kernel: [91302.201672] pc : ath11k_hal_rx_sw_mon_ring_buf_paddr_get+0x4628/0x49f0 [ath11k]
Fri Feb  3 09:27:30 2023 kern.warn kernel: [91302.208444] lr : ath11k_hal_rx_sw_mon_ring_buf_paddr_get+0x2bd8/0x49f0 [ath11k]
Fri Feb  3 09:27:30 2023 kern.warn kernel: [91302.215735] sp : ffffffc008003c20
Fri Feb  3 09:27:30 2023 kern.warn kernel: [91302.223018] x29: ffffffc008003c20 x28: 0000000000000030 x27: ffffffc008bd8010
Fri Feb  3 09:27:30 2023 kern.warn kernel: [91302.226499] x26: 0000000000000038 x25: 00000000000001d0 x24: ffffff80192e0380
Fri Feb  3 09:27:30 2023 kern.warn kernel: [91302.233616] x23: 0000000000000000 x22: 0000000000000003 x21: ffffff8005e22020
Fri Feb  3 09:27:30 2023 kern.warn kernel: [91302.240735] x20: ffffff8004640000 x19: ffffff8009138300 x18: 0000000000000000
Fri Feb  3 09:27:30 2023 kern.warn kernel: [91302.247853] x17: ffffffc017476000 x16: ffffffc008004000 x15: 0000000000004000
Fri Feb  3 09:27:30 2023 kern.warn kernel: [91302.254970] x14: 0000000000000147 x13: 0000000000000001 x12: 0000000000000001
Fri Feb  3 09:27:30 2023 kern.warn kernel: [91302.262089] x11: 0000000000000001 x10: 0000000000000890 x9 : 0000000000000000
Fri Feb  3 09:27:30 2023 kern.warn kernel: [91302.269207] x8 : ffffff8004862000 x7 : 0000000000000028 x6 : 0000000000000004
Fri Feb  3 09:27:30 2023 kern.warn kernel: [91302.276325] x5 : 00000000000011ae x4 : 0000000000000002 x3 : ffffff8004640000
Fri Feb  3 09:27:30 2023 kern.warn kernel: [91302.283444] x2 : 0000000000000001 x1 : 0000000000000006 x0 : ffffff8005e22020
Fri Feb  3 09:27:30 2023 kern.warn kernel: [91302.290562] Call trace:
Fri Feb  3 09:27:30 2023 kern.warn kernel: [91302.297671]  ath11k_hal_rx_sw_mon_ring_buf_paddr_get+0x4628/0x49f0 [ath11k]
Fri Feb  3 09:27:30 2023 kern.warn kernel: [91302.299935]  ath11k_htc_rx_completion_handler+0x464/0x610 [ath11k]
Fri Feb  3 09:27:30 2023 kern.warn kernel: [91302.306878]  ath11k_ce_per_engine_service+0x2e0/0x3f0 [ath11k]
Fri Feb  3 09:27:30 2023 kern.warn kernel: [91302.313127]  0xffffffc000b37c30
Fri Feb  3 09:27:30 2023 kern.warn kernel: [91302.318939]  tasklet_action_common.constprop.0+0x144/0x180
Fri Feb  3 09:27:30 2023 kern.warn kernel: [91302.321982]  tasklet_action+0x28/0x34
Fri Feb  3 09:27:30 2023 kern.warn kernel: [91302.327534]  _stext+0x10c/0x28c
Fri Feb  3 09:27:30 2023 kern.warn kernel: [91302.331265]  irq_exit+0xbc/0x100
Fri Feb  3 09:27:30 2023 kern.warn kernel: [91302.334216]  handle_domain_irq+0x64/0x90
Fri Feb  3 09:27:30 2023 kern.warn kernel: [91302.337690]  gic_handle_irq+0x74/0xa0
Fri Feb  3 09:27:30 2023 kern.warn kernel: [91302.341595]  call_on_irq_stack+0x28/0x54
Fri Feb  3 09:27:30 2023 kern.warn kernel: [91302.345156]  do_interrupt_handler+0x54/0x60
Fri Feb  3 09:27:30 2023 kern.warn kernel: [91302.349149]  el1_interrupt+0x30/0x50
Fri Feb  3 09:27:30 2023 kern.warn kernel: [91302.353055]  el1h_64_irq_handler+0x18/0x24
Fri Feb  3 09:27:30 2023 kern.warn kernel: [91302.356874]  el1h_64_irq+0x78/0x7c
Fri Feb  3 09:27:30 2023 kern.warn kernel: [91302.360778]  arch_cpu_idle+0x18/0x2c
Fri Feb  3 09:27:30 2023 kern.warn kernel: [91302.364165]  default_idle_call+0x20/0x70
Fri Feb  3 09:27:30 2023 kern.warn kernel: [91302.367899]  do_idle+0x214/0x240
Fri Feb  3 09:27:30 2023 kern.warn kernel: [91302.371803]  cpu_startup_entry+0x28/0x60
Fri Feb  3 09:27:30 2023 kern.warn kernel: [91302.375016]  rest_init+0xc8/0xe0
Fri Feb  3 09:27:30 2023 kern.warn kernel: [91302.378922]  arch_call_rest_init+0x10/0x1c
Fri Feb  3 09:27:30 2023 kern.warn kernel: [91302.382134]  start_kernel+0x6a8/0x6cc
Fri Feb  3 09:27:30 2023 kern.warn kernel: [91302.386040]  __primary_switched+0xa0/0xa8
Fri Feb  3 09:27:30 2023 kern.warn kernel: [91302.389774] ---[ end trace 353f3c65c9a03fdc ]---
Fri Feb  3 09:27:30 2023 kern.warn kernel: [91302.393870] ath11k c000000.wifi: vdev start resp error status 3 (dfs violation)
Fri Feb  3 09:27:30 2023 kern.warn kernel: [91302.398532] ath11k c000000.wifi: failed to synchronize setup for vdev 2 restart: -22
Fri Feb  3 09:27:30 2023 kern.warn kernel: [91302.405501] ath11k c000000.wifi: failed to restart vdev 2: -22
Fri Feb  3 09:27:31 2023 daemon.notice hostapd: phy1-ap0: interface state ENABLED->DISABLED
Fri Feb  3 09:27:31 2023 daemon.notice wpa_supplicant[2074]: phy1-mesh0: leaving mesh
Fri Feb  3 09:27:36 2023 daemon.notice netifd: Network device 'phy1-mesh0' link is down
Fri Feb  3 09:27:36 2023 daemon.notice netifd: Interface 'nwi_mesh0' has link connectivity loss
Fri Feb  3 09:27:36 2023 daemon.notice wpa_supplicant[2074]: phy1-mesh0: interface state ENABLED->COUNTRY_UPDATE
Fri Feb  3 09:27:36 2023 daemon.notice wpa_supplicant[2074]: phy1-mesh0: interface state COUNTRY_UPDATE->DFS
Fri Feb  3 09:27:36 2023 daemon.notice wpa_supplicant[2074]: phy1-mesh0: DFS-CAC-START freq=5260 chan=52 sec_chan=1, width=1, seg0=58, seg1=0, cac_time=60s
Fri Feb  3 09:27:36 2023 kern.warn kernel: [91307.706731] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Fri Feb  3 09:27:36 2023 daemon.notice wpa_supplicant[2074]: phy1-mesh0: new peer notification for aa:aa:aa:aa:aa:aa
Fri Feb  3 09:27:36 2023 kern.info kernel: [91307.731728] batman_adv: bat0: Interface deactivated: phy1-mesh0
Fri Feb  3 09:27:36 2023 kern.info kernel: [91307.731774] batman_adv: bat0: Removing interface: phy1-mesh0
Fri Feb  3 09:27:36 2023 daemon.notice netifd: Interface 'nwi_mesh0' is now down
Fri Feb  3 09:27:36 2023 daemon.notice netifd: Interface 'nwi_mesh0' is disabled
Fri Feb  3 09:27:36 2023 daemon.notice netifd: Interface 'nwi_mesh0' is enabled
Fri Feb  3 09:27:36 2023 kern.info kernel: [91307.742788] br-vl177: port 6(phy1-ap0) entered blocking state
Fri Feb  3 09:27:36 2023 kern.info kernel: [91307.742840] br-vl177: port 6(phy1-ap0) entered disabled state
Fri Feb  3 09:27:36 2023 daemon.notice hostapd: phy1-ap0: interface state DISABLED->COUNTRY_UPDATE
Fri Feb  3 09:27:36 2023 daemon.err hostapd: could not get valid channel
Fri Feb  3 09:27:36 2023 daemon.notice hostapd: phy1-ap0: interface state COUNTRY_UPDATE->DFS
Fri Feb  3 09:27:36 2023 kern.info kernel: [91307.748479] device phy1-ap0 entered promiscuous mode
Fri Feb  3 09:27:36 2023 daemon.warn netifd: Wireless device 'radio1' setup failed, retry=3
Fri Feb  3 09:27:36 2023 daemon.notice hostapd: Remove interface 'phy1-ap0'
Fri Feb  3 09:27:36 2023 daemon.notice hostapd: phy1-ap0: interface state DFS->DISABLED
Fri Feb  3 09:27:36 2023 daemon.notice hostapd: phy1-ap0: AP-DISABLED
Fri Feb  3 09:27:36 2023 daemon.notice hostapd: phy1-ap0: CTRL-EVENT-TERMINATING
Fri Feb  3 09:27:36 2023 daemon.err hostapd: rmdir[ctrl_interface=/var/run/hostapd]: Permission denied
Fri Feb  3 09:27:36 2023 daemon.err hostapd: hostapd_free_hapd_data: Interface phy1-ap0 wasn't started
Fri Feb  3 09:27:36 2023 daemon.notice hostapd: nl80211: deinit ifname=phy1-ap0 disabled_11b_rates=0
Fri Feb  3 09:27:36 2023 kern.info kernel: [91308.470747] device phy1-ap0 left promiscuous mode
Fri Feb  3 09:27:36 2023 kern.info kernel: [91308.470889] br-vl177: port 6(phy1-ap0) entered disabled state
Fri Feb  3 09:27:37 2023 daemon.notice netifd: radio1 (19800): Command failed: Not found
Fri Feb  3 09:27:37 2023 daemon.notice wpa_supplicant[19821]: supp-global-ctrl-iface-init(/var/run/wpa_supplicant/global) (will try fixup): bind(PF_UNIX): Address in use
Fri Feb  3 09:27:37 2023 daemon.notice wpa_supplicant[19821]: Successfully initialized wpa_supplicant
Fri Feb  3 09:27:37 2023 kern.warn kernel: [91308.817754] ------------[ cut here ]------------
Fri Feb  3 09:27:37 2023 kern.warn kernel: [91308.817797] WARNING: CPU: 2 PID: 19819 at ieee80211_del_virtual_monitor+0x190/0xb0c [mac80211]
Fri Feb  3 09:27:37 2023 kern.warn kernel: [91308.821454] Modules linked in: pppoe ppp_async nft_fib_inet nf_flow_table_ipv6 nf_flow_table_ipv4 nf_flow_table_inet batman_adv ath11k_ahb ath11k ath10k_pci ath10k_core ath pppox ppp_generic nft_reject_ipv6 nft_reject_ipv4 nft_reject_inet nft_reject nft_redir nft_quota nft_objref nft_numgen nft_nat nft_masq nft_log nft_limit nft_hash nft_flow_offload nft_fib_ipv6 nft_fib_ipv4 nft_fib nft_ct nft_counter nft_chain_nat nf_tables nf_nat nf_flow_table nf_conntrack mac80211 cfg80211 slhc qrtr_smd qrtr qmi_helpers ns nfnetlink nf_reject_ipv6 nf_reject_ipv4 nf_log_syslog nf_defrag_ipv6 nf_defrag_ipv4 libcrc32c hwmon crc_ccitt compat seqiv jitterentropy_rng drbg michael_mic hmac cmac leds_gpio xhci_plat_hcd xhci_pci xhci_hcd dwc3 dwc3_qcom qca_nss_dp qca_ssdk gpio_button_hotplug crc32c_generic
Fri Feb  3 09:27:37 2023 kern.warn kernel: [91308.876992] CPU: 2 PID: 19819 Comm: ip Tainted: G        W         5.15.90 #0
Fri Feb  3 09:27:37 2023 kern.warn kernel: [91308.899228] Hardware name: Xiaomi AX3600 (DT)
Fri Feb  3 09:27:37 2023 kern.warn kernel: [91308.906515] pstate: 20400005 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
Fri Feb  3 09:27:37 2023 kern.warn kernel: [91308.910859] pc : ieee80211_del_virtual_monitor+0x190/0xb0c [mac80211]
Fri Feb  3 09:27:37 2023 kern.warn kernel: [91308.917630] lr : ieee80211_del_virtual_monitor+0x180/0xb0c [mac80211]
Fri Feb  3 09:27:37 2023 kern.warn kernel: [91308.924226] sp : ffffffc0095bba50
Fri Feb  3 09:27:37 2023 kern.warn kernel: [91308.930644] x29: ffffffc0095bba50 x28: 0000000000000001 x27: 0000000000000000
Fri Feb  3 09:27:37 2023 kern.warn kernel: [91308.933951] x26: 0000000000401002 x25: ffffff8009ae7c10 x24: ffffff8010d14900
Fri Feb  3 09:27:37 2023 kern.warn kernel: [91308.941068] x23: 0000000000001003 x22: 0000000000000001 x21: ffffffc000ac36e0
Fri Feb  3 09:27:37 2023 kern.warn kernel: [91308.948187] x20: ffffff8005e20880 x19: ffffff8010d14000 x18: 0000000000000000
Fri Feb  3 09:27:37 2023 kern.warn kernel: [91308.955305] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
Fri Feb  3 09:27:37 2023 kern.warn kernel: [91308.962422] x14: 00000000000002fb x13: 0000000000000000 x12: 0000000000004400
Fri Feb  3 09:27:37 2023 kern.warn kernel: [91308.969540] x11: ffffff8002b47d14 x10: ffffff8002b47d00 x9 : 00000000000000bc
Fri Feb  3 09:27:37 2023 kern.warn kernel: [91308.976658] x8 : 0000000000000001 x7 : 0000000000000011 x6 : ffffff8002baa800
Fri Feb  3 09:27:37 2023 kern.warn kernel: [91308.983776] x5 : 0000000000000011 x4 : 0000000000000000 x3 : ffffff8002f0de00
Fri Feb  3 09:27:37 2023 kern.warn kernel: [91308.990895] x2 : 0000000000000000 x1 : 0000000000000007 x0 : 0000000000000001
Fri Feb  3 09:27:37 2023 kern.warn kernel: [91308.998014] Call trace:
Fri Feb  3 09:27:37 2023 kern.warn kernel: [91309.005122]  ieee80211_del_virtual_monitor+0x190/0xb0c [mac80211]
Fri Feb  3 09:27:37 2023 kern.warn kernel: [91309.007386]  ieee80211_del_virtual_monitor+0x9dc/0xb0c [mac80211]
Fri Feb  3 09:27:37 2023 kern.warn kernel: [91309.013635]  __dev_close_many+0xa8/0x11c
Fri Feb  3 09:27:37 2023 kern.warn kernel: [91309.019707]  __dev_change_flags+0x124/0x194
Fri Feb  3 09:27:37 2023 kern.warn kernel: [91309.023700]  dev_change_flags+0x24/0x6c
Fri Feb  3 09:27:37 2023 kern.warn kernel: [91309.027606]  devinet_ioctl+0x398/0x69c
Fri Feb  3 09:27:37 2023 kern.warn kernel: [91309.031425]  inet_ioctl+0x250/0x260
Fri Feb  3 09:27:37 2023 kern.warn kernel: [91309.035246]  sock_ioctl+0x240/0x49c
Fri Feb  3 09:27:37 2023 kern.warn kernel: [91309.038629]  __arm64_sys_ioctl+0x598/0x108c
Fri Feb  3 09:27:37 2023 kern.warn kernel: [91309.042104]  invoke_syscall.constprop.0+0x5c/0x104
Fri Feb  3 09:27:37 2023 kern.warn kernel: [91309.046273]  do_el0_svc+0x6c/0x15c
Fri Feb  3 09:27:37 2023 kern.warn kernel: [91309.051129]  el0_svc+0x18/0x54
Fri Feb  3 09:27:37 2023 kern.warn kernel: [91309.054516]  el0t_64_sync_handler+0xe8/0x114
Fri Feb  3 09:27:37 2023 kern.warn kernel: [91309.057555]  el0t_64_sync+0x184/0x188
Fri Feb  3 09:27:37 2023 kern.warn kernel: [91309.061981] ---[ end trace 353f3c65c9a03fdd ]---
Fri Feb  3 09:27:42 2023 kern.warn kernel: [91314.106750] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Fri Feb  3 09:27:42 2023 daemon.notice netifd: Interface 'nwi_mesh0' is disabled
Fri Feb  3 09:27:42 2023 daemon.notice netifd: Wireless device 'radio1' is now down
Fri Feb  3 09:27:43 2023 daemon.notice hostapd: Configuration file: /var/run/hostapd-phy1.conf (phy phy1-ap0) --> new PHY
Fri Feb  3 09:27:43 2023 kern.info kernel: [91314.754127] br-vl177: port 6(phy1-ap0) entered blocking state
Fri Feb  3 09:27:43 2023 kern.info kernel: [91314.754176] br-vl177: port 6(phy1-ap0) entered disabled state
Fri Feb  3 09:27:43 2023 daemon.notice hostapd: phy1-ap0: interface state UNINITIALIZED->COUNTRY_UPDATE
Fri Feb  3 09:27:43 2023 daemon.err hostapd: could not get valid channel
Fri Feb  3 09:27:43 2023 daemon.notice hostapd: phy1-ap0: interface state COUNTRY_UPDATE->DFS
Fri Feb  3 09:27:43 2023 kern.info kernel: [91314.759251] device phy1-ap0 entered promiscuous mode
Fri Feb  3 09:27:44 2023 daemon.notice netifd: radio1 (19979): command failed: Link has been severed (-67)
Fri Feb  3 09:27:44 2023 daemon.notice netifd: radio1 (19979): command failed: Link has been severed (-67)
Fri Feb  3 09:27:44 2023 daemon.notice netifd: Wireless device 'radio1' is now up
Fri Feb  3 09:27:44 2023 daemon.notice netifd: Interface 'nwi_mesh0' is enabled
Fri Feb  3 09:27:47 2023 daemon.notice wpa_supplicant[19821]: phy1-mesh0: interface state UNINITIALIZED->COUNTRY_UPDATE
Fri Feb  3 09:27:47 2023 daemon.notice wpa_supplicant[19821]: phy1-mesh0: interface state COUNTRY_UPDATE->DFS
Fri Feb  3 09:27:47 2023 daemon.notice wpa_supplicant[19821]: phy1-mesh0: DFS-CAC-START freq=5260 chan=52 sec_chan=1, width=1, seg0=58, seg1=0, cac_time=60s
Fri Feb  3 09:28:53 2023 daemon.notice wpa_supplicant[19821]: phy1-mesh0: DFS-CAC-COMPLETED success=1 freq=5260 ht_enabled=0 chan_offset=0 chan_width=3 cf1=5290 cf2=0
Fri Feb  3 09:28:53 2023 daemon.notice wpa_supplicant[19821]: phy1-mesh0: interface state DFS->ENABLED
Fri Feb  3 09:28:53 2023 daemon.notice wpa_supplicant[19821]: phy1-mesh0: AP-ENABLED
Fri Feb  3 09:28:53 2023 kern.warn kernel: [91384.746786] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Fri Feb  3 09:28:53 2023 daemon.notice wpa_supplicant[19821]: phy1-mesh0: joining mesh MESHSSID
Fri Feb  3 09:28:53 2023 daemon.notice wpa_supplicant[19821]: phy1-mesh0: CTRL-EVENT-CONNECTED - Connection to 00:00:00:00:00:00 completed [id=0 id_str=]
Fri Feb  3 09:28:53 2023 daemon.notice netifd: Network device 'phy1-mesh0' link is up
Fri Feb  3 09:28:53 2023 daemon.notice netifd: Interface 'nwi_mesh0' has link connectivity
Fri Feb  3 09:28:53 2023 daemon.notice netifd: Interface 'nwi_mesh0' is setting up now
Fri Feb  3 09:28:53 2023 daemon.notice wpa_supplicant[19821]: phy1-mesh0: MESH-GROUP-STARTED ssid="MESHSSID" id=0
Fri Feb  3 09:28:53 2023 kern.info kernel: [91384.847204] batman_adv: bat0: Adding interface: phy1-mesh0
Fri Feb  3 09:28:53 2023 kern.info kernel: [91384.847301] batman_adv: bat0: Interface activated: phy1-mesh0
Fri Feb  3 09:28:53 2023 daemon.notice netifd: Interface 'nwi_mesh0' is now up
Fri Feb  3 09:32:11 2023 daemon.notice hostapd: phy2-ap0: AP-STA-POLL-OK aa:aa:aa:aa:aa:aa
(...)
Fri Feb  3 09:48:10 2023 daemon.notice hostapd: phy2-ap0: EAPOL-4WAY-HS-COMPLETED aa:aa:aa:aa:aa:aa
Fri Feb  3 09:49:07 2023 daemon.notice hostapd: phy2-ap0: AP-STA-DISCONNECTED aa:aa:aa:aa:aa:aa
Fri Feb  3 09:49:10 2023 kern.info kernel: [92602.028076] nss-dp 3a001400.dp3 lan1: PHY Link up speed: 1000
Fri Feb  3 09:49:10 2023 kern.info kernel: [92602.028165] br-vl177: port 1(lan1) entered blocking state
Fri Feb  3 09:49:10 2023 kern.info kernel: [92602.032819] br-vl177: port 1(lan1) entered forwarding state
Fri Feb  3 09:49:10 2023 daemon.notice netifd: Network device 'lan1' link is up
Fri Feb  3 09:49:10 2023 daemon.info hostapd: phy2-ap0: STA aa:aa:aa:aa:aa:aa IEEE 802.11: authenticated
Fri Feb  3 09:49:10 2023 daemon.info hostapd: phy2-ap0: STA aa:aa:aa:aa:aa:aa IEEE 802.11: associated (aid 1)
Fri Feb  3 09:49:10 2023 daemon.notice hostapd: phy2-ap0: AP-STA-CONNECTED aa:aa:aa:aa:aa:aa auth_alg=open
Fri Feb  3 09:49:10 2023 daemon.info hostapd: phy2-ap0: STA aa:aa:aa:aa:aa:aa RADIUS: starting accounting session aa:aa:aa:aa:aa:aa
Fri Feb  3 09:49:10 2023 daemon.info hostapd: phy2-ap0: STA aa:aa:aa:aa:aa:aa WPA: pairwise key handshake completed (RSN)
Fri Feb  3 09:49:10 2023 daemon.notice hostapd: phy2-ap0: EAPOL-4WAY-HS-COMPLETED aa:aa:aa:aa:aa:aa
Fri Feb  3 09:49:28 2023 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED aa:aa:aa:aa:aa:aa


Kind regards,
Catfriend1

2 Likes

Firmware: OpenWrt SNAPSHOT r22475-936df715de / LuCI Master git-23.074.82619-6ad6a24

I suspect this started with "wifi reload".

My log is full of:

Mon Apr  3 10:58:47 2023 kern.warn kernel: [42706.273690] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 10:58:52 2023 daemon.info hostapd: phy1-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: authenticated
Mon Apr  3 10:58:52 2023 kern.warn kernel: [42711.393706] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 10:58:57 2023 daemon.notice hostapd: nl80211: wpa_driver_nl80211_event_receive->nl_recvmsgs failed: -5
Mon Apr  3 10:58:57 2023 kern.warn kernel: [42716.513694] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 10:59:02 2023 daemon.info hostapd: phy2-ap0: STA aa:bb:cc:dd:ee:ff IEEE 802.11: authenticated
Mon Apr  3 10:59:02 2023 kern.warn kernel: [42721.633691] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 10:59:08 2023 kern.warn kernel: [42726.753695] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 10:59:13 2023 daemon.info hostapd: phy1-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: authenticated
Mon Apr  3 10:59:13 2023 kern.warn kernel: [42731.873698] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 10:59:18 2023 daemon.notice hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: did not acknowledge authentication response
Mon Apr  3 10:59:18 2023 daemon.info hostapd: phy2-ap0: STA aa:bb:cc:dd:ee:ff IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Mon Apr  3 10:59:18 2023 kern.warn kernel: [42736.993698] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 10:59:23 2023 kern.warn kernel: [42742.113718] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 10:59:28 2023 daemon.notice hostapd: phy1-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: did not acknowledge authentication response
Mon Apr  3 10:59:28 2023 daemon.notice hostapd: phy1-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: did not acknowledge authentication response
Mon Apr  3 10:59:28 2023 kern.warn kernel: [42747.233714] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 10:59:33 2023 daemon.notice hostapd: phy1-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: did not acknowledge authentication response
Mon Apr  3 10:59:33 2023 kern.warn kernel: [42752.353726] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 10:59:38 2023 daemon.info hostapd: phy1-ap0: STA aa:bb:cc:dd:ee:ff IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Mon Apr  3 10:59:38 2023 kern.warn kernel: [42757.473716] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 9
Mon Apr  3 10:59:43 2023 kern.warn kernel: [42762.593714] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 9
Mon Apr  3 10:59:48 2023 daemon.notice hostapd: phy1-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: did not acknowledge authentication response
Mon Apr  3 10:59:48 2023 kern.warn kernel: [42767.713719] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 10:59:54 2023 daemon.info hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Mon Apr  3 10:59:54 2023 kern.warn kernel: [42772.833730] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 10:59:59 2023 daemon.notice hostapd: phy1-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: did not acknowledge authentication response
Mon Apr  3 10:59:59 2023 daemon.info hostapd: phy1-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Mon Apr  3 10:59:59 2023 kern.warn kernel: [42777.953730] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:00:04 2023 kern.warn kernel: [42783.073731] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:00:09 2023 kern.warn kernel: [42788.193732] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:00:14 2023 kern.warn kernel: [42793.313737] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:00:19 2023 kern.warn kernel: [42798.433737] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:00:24 2023 kern.warn kernel: [42803.553741] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:00:29 2023 kern.warn kernel: [42808.673756] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:00:35 2023 daemon.notice hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: did not acknowledge authentication response
Mon Apr  3 11:00:35 2023 kern.warn kernel: [42813.793759] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:00:40 2023 daemon.notice hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: did not acknowledge authentication response
Mon Apr  3 11:00:40 2023 kern.warn kernel: [42818.913764] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:00:45 2023 kern.warn kernel: [42824.033771] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:00:50 2023 kern.warn kernel: [42829.153761] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:00:55 2023 kern.warn kernel: [42834.273763] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:01:00 2023 daemon.info hostapd: phy2-ap0: STA aa:bb:cc:dd:ee:ff IEEE 802.11: authenticated
Mon Apr  3 11:01:00 2023 kern.warn kernel: [42839.393802] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:01:05 2023 daemon.notice hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: did not acknowledge authentication response
Mon Apr  3 11:01:05 2023 daemon.notice hostapd: handle_assoc_cb: STA aa:bb:cc:dd:ee:ff not found
Mon Apr  3 11:01:05 2023 kern.warn kernel: [42844.513802] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:01:10 2023 kern.warn kernel: [42849.633773] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:01:15 2023 daemon.notice hostapd: handle_assoc_cb: STA aa:bb:cc:dd:ee:ff not found
Mon Apr  3 11:01:16 2023 kern.warn kernel: [42854.753791] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:01:21 2023 daemon.notice hostapd: nl80211: wpa_driver_nl80211_event_receive->nl_recvmsgs failed: -5
Mon Apr  3 11:01:21 2023 daemon.notice hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: did not acknowledge authentication response
Mon Apr  3 11:01:21 2023 daemon.info hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: authenticated
Mon Apr  3 11:01:21 2023 kern.warn kernel: [42859.873793] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:01:26 2023 daemon.notice hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: did not acknowledge authentication response
Mon Apr  3 11:01:26 2023 daemon.info hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: authenticated
Mon Apr  3 11:01:26 2023 kern.warn kernel: [42864.993783] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:01:31 2023 kern.warn kernel: [42870.113790] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:01:36 2023 daemon.info hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: authenticated
Mon Apr  3 11:01:36 2023 daemon.info hostapd: phy2-ap0: STA aa:bb:cc:dd:ee:ff IEEE 802.11: authenticated
Mon Apr  3 11:01:36 2023 kern.warn kernel: [42875.233789] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:01:41 2023 kern.warn kernel: [42880.353794] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:01:46 2023 daemon.info hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: authenticated
Mon Apr  3 11:01:46 2023 daemon.notice hostapd: phy2-ap0: STA aa:bb:cc:dd:ee:ff IEEE 802.11: did not acknowledge authentication response
Mon Apr  3 11:01:46 2023 kern.warn kernel: [42885.473820] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:01:51 2023 daemon.info hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: authenticated
Mon Apr  3 11:01:51 2023 kern.warn kernel: [42890.593806] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:01:56 2023 daemon.notice hostapd: handle_assoc_cb: STA aa:bb:cc:dd:ee:ff not found
Mon Apr  3 11:01:56 2023 kern.warn kernel: [42895.713810] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:02:02 2023 daemon.info hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: authenticated
Mon Apr  3 11:02:02 2023 daemon.info hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: authenticated
Mon Apr  3 11:02:02 2023 kern.warn kernel: [42900.833812] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:02:07 2023 daemon.info hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: authenticated
Mon Apr  3 11:02:07 2023 daemon.info hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: authenticated
Mon Apr  3 11:02:07 2023 kern.warn kernel: [42905.953822] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:02:12 2023 kern.warn kernel: [42911.073812] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:02:17 2023 daemon.notice hostapd: handle_assoc_cb: STA aa:bb:cc:dd:ee:ff not found
Mon Apr  3 11:02:17 2023 kern.warn kernel: [42916.193817] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:02:22 2023 daemon.info hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: authenticated
Mon Apr  3 11:02:22 2023 kern.warn kernel: [42921.313822] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:02:27 2023 kern.warn kernel: [42926.433820] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:02:32 2023 daemon.info hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: authenticated
Mon Apr  3 11:02:32 2023 kern.warn kernel: [42931.553827] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:02:37 2023 kern.warn kernel: [42936.673834] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:02:43 2023 daemon.notice hostapd: nl80211: nl80211_recv_beacons->nl_recvmsgs failed: -5
Mon Apr  3 11:02:43 2023 kern.warn kernel: [42941.793840] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:02:48 2023 daemon.info hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: authenticated
Mon Apr  3 11:02:48 2023 daemon.info hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: authenticated
Mon Apr  3 11:02:48 2023 daemon.info hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: authenticated
Mon Apr  3 11:02:48 2023 kern.warn kernel: [42946.913845] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:02:53 2023 daemon.info hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: authenticated
Mon Apr  3 11:02:53 2023 kern.warn kernel: [42952.033854] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:02:58 2023 daemon.info hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: authenticated
Mon Apr  3 11:02:58 2023 daemon.info hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: authenticated
Mon Apr  3 11:02:58 2023 daemon.info hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: authenticated
Mon Apr  3 11:02:58 2023 kern.warn kernel: [42957.153843] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:03:03 2023 daemon.notice hostapd: nl80211: nl80211_recv_beacons->nl_recvmsgs failed: -5
Mon Apr  3 11:03:03 2023 kern.warn kernel: [42962.273854] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:03:08 2023 kern.warn kernel: [42967.393851] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:03:13 2023 kern.warn kernel: [42972.513866] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:03:18 2023 daemon.notice hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: did not acknowledge authentication response
Mon Apr  3 11:03:18 2023 daemon.info hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: authenticated
Mon Apr  3 11:03:18 2023 daemon.info hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: authenticated
Mon Apr  3 11:03:18 2023 daemon.info hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: authenticated
Mon Apr  3 11:03:18 2023 daemon.notice hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: did not acknowledge authentication response
Mon Apr  3 11:03:18 2023 daemon.info hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: authenticated
Mon Apr  3 11:03:18 2023 daemon.notice hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: did not acknowledge authentication response
Mon Apr  3 11:03:18 2023 kern.warn kernel: [42977.633870] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:03:23 2023 daemon.info hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: authenticated
Mon Apr  3 11:03:24 2023 kern.warn kernel: [42982.753860] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:03:29 2023 kern.warn kernel: [42987.873867] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:03:34 2023 daemon.info hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: authenticated
Mon Apr  3 11:03:34 2023 daemon.info hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: authenticated
Mon Apr  3 11:03:34 2023 kern.warn kernel: [42992.993882] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:03:39 2023 kern.warn kernel: [42998.113884] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:03:44 2023 daemon.info hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: authenticated
Mon Apr  3 11:03:44 2023 daemon.info hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: authenticated
Mon Apr  3 11:03:44 2023 kern.warn kernel: [43003.233874] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:03:49 2023 kern.warn kernel: [43008.353879] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:03:54 2023 daemon.info hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: authenticated
Mon Apr  3 11:03:54 2023 kern.warn kernel: [43013.473889] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:03:59 2023 kern.warn kernel: [43018.593900] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:04:04 2023 daemon.info hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: authenticated
Mon Apr  3 11:04:04 2023 kern.warn kernel: [43023.713890] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:04:10 2023 kern.warn kernel: [43028.833896] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:04:15 2023 daemon.notice hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: did not acknowledge authentication response
Mon Apr  3 11:04:15 2023 kern.warn kernel: [43033.953904] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:04:20 2023 daemon.notice hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: did not acknowledge authentication response
Mon Apr  3 11:04:20 2023 kern.warn kernel: [43039.073918] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:04:25 2023 kern.warn kernel: [43044.193910] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:04:30 2023 kern.warn kernel: [43049.313901] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:04:35 2023 kern.warn kernel: [43054.433912] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:04:40 2023 daemon.notice hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: did not acknowledge authentication response
Mon Apr  3 11:04:40 2023 daemon.notice hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: did not acknowledge authentication response
Mon Apr  3 11:04:40 2023 kern.warn kernel: [43059.553916] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:04:45 2023 daemon.notice hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: did not acknowledge authentication response
Mon Apr  3 11:04:45 2023 daemon.notice hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: did not acknowledge authentication response
Mon Apr  3 11:04:45 2023 kern.warn kernel: [43064.673920] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:04:51 2023 daemon.notice hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: did not acknowledge authentication response
Mon Apr  3 11:04:51 2023 daemon.notice hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: did not acknowledge authentication response
Mon Apr  3 11:04:51 2023 daemon.notice hostapd: handle_assoc_cb: STA aa:bb:cc:dd:ee:ff not found
Mon Apr  3 11:04:51 2023 kern.warn kernel: [43069.803917] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:04:56 2023 daemon.notice hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: did not acknowledge authentication response
Mon Apr  3 11:04:56 2023 kern.warn kernel: [43074.913922] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:05:01 2023 kern.warn kernel: [43080.033928] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:05:06 2023 daemon.notice hostapd: handle_assoc_cb: STA aa:bb:cc:dd:ee:ff not found
Mon Apr  3 11:05:06 2023 daemon.info hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Mon Apr  3 11:05:06 2023 kern.warn kernel: [43085.153938] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:05:11 2023 kern.warn kernel: [43090.273933] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:05:16 2023 kern.warn kernel: [43095.394012] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:05:21 2023 kern.warn kernel: [43100.513949] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:05:26 2023 daemon.notice hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: did not acknowledge authentication response
Mon Apr  3 11:05:26 2023 daemon.notice hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: did not acknowledge authentication response
Mon Apr  3 11:05:26 2023 daemon.notice hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: did not acknowledge authentication response
Mon Apr  3 11:05:26 2023 kern.warn kernel: [43105.633939] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:05:31 2023 daemon.notice hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: did not acknowledge authentication response
Mon Apr  3 11:05:32 2023 kern.warn kernel: [43110.753947] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:05:37 2023 daemon.notice hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: did not acknowledge authentication response
Mon Apr  3 11:05:37 2023 kern.warn kernel: [43115.873954] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:05:42 2023 daemon.notice hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: did not acknowledge authentication response
Mon Apr  3 11:05:42 2023 daemon.info hostapd: phy1-ap0: STA aa:bb:cc:dd:ee:ff IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Mon Apr  3 11:05:42 2023 kern.warn kernel: [43120.913956] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:05:47 2023 kern.warn kernel: [43126.033962] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 9
Mon Apr  3 11:05:52 2023 kern.warn kernel: [43131.153968] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:05:57 2023 daemon.info hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Mon Apr  3 11:05:57 2023 kern.warn kernel: [43136.273978] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:06:02 2023 daemon.notice hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: did not acknowledge authentication response
Mon Apr  3 11:06:02 2023 kern.warn kernel: [43141.393969] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:06:07 2023 daemon.notice hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: did not acknowledge authentication response
Mon Apr  3 11:06:07 2023 daemon.notice hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: did not acknowledge authentication response
Mon Apr  3 11:06:07 2023 kern.warn kernel: [43146.514060] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:06:12 2023 kern.warn kernel: [43151.633973] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:06:17 2023 daemon.notice hostapd: handle_assoc_cb: STA aa:bb:cc:dd:ee:ff not found
Mon Apr  3 11:06:18 2023 kern.warn kernel: [43156.753981] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:06:23 2023 kern.warn kernel: [43161.873981] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:06:28 2023 daemon.notice hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: did not acknowledge authentication response
Mon Apr  3 11:06:28 2023 kern.warn kernel: [43166.993985] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Mon Apr  3 11:06:33 2023 kern.warn kernel: [43172.113993] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2

Hello. I have same snapshot and have same crash.
Does it help if you change 160hz to 80hz back?
Update to r22489-3c3614cec4 doesn't help. Still got same issues.

No, as I'm currently using HE80 (MHz) .

On what version this crash doesn't occur ?

I have the same issue :confused:

I don't know, hopefully someone can solve it :slight_smile:

Flash back to OpenWrt SNAPSHOT r22446 - last snapshot without issue

1 Like

How to grab the xiaomi_ax3600-squashfs-sysupgrade.bin

Could you provide the commit ID ?

Sorry, I have old sysupgrade file, and just flash it

If you have it running, you can get the full revison ID from terminal or luci. Also, maybe you can provide that file? I am happy to try things out :slight_smile:

Same request

Hm, I wonder if the given revision can actually be better - it is

./scripts/getver.sh r22446
1c552eb44ddba4d8630eb3453b4f6dd8ef83b13a

from 29th of march this year.
The only commits related to AX3200:
https://git.openwrt.org/?p=openwrt/openwrt.git;a=commit;h=da4f7e51f3451ae5be509ae8bafaec20c6d3c01a (160 MHz fix)
https://git.openwrt.org/?p=openwrt/openwrt.git;a=commit;h=ec8c837eabec8fa0d6b013d3b766d1a0f4612ecb (Kernel update)

Sure. Here you go https://drive.google.com/file/d/1y24r7b3dHqkcuRG_HIgbzQsovdPgOta0/view?usp=share_link

OpenWrt SNAPSHOT r22446-1c552eb44d

4 Likes

Currently, I have no errors in the syslog like above since upgrading to:
OpenWrt SNAPSHOT r22489

Are you sure?
When I try OpenWrt SNAPSHOT r22489 I have a lot "failed to flush transmit queue" issues

Same issue on r22496 too

i'm on two ax3600 on version r22497 and get those errors:

ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 1

but no crashes until today.

r22502 I still get those pending packets ath11k kern.warn. But very rare occurence and no service interruption observed.

That transmit queue flush is actually a bug in ath11k that is made visible by some vulnerability fixes in mac80211.

I removed two patches in there to make it again vulnerable to CVE-2022-47522. You can download the version from yesterday with wifi firmware 2.9 here:

(that being Openwrt snapshot c3cb2d48da781f4e254ef526e1b44ae5a68248d7 with removal of:
delete mode 100644 package/kernel/mac80211/patches/subsys/331-wifi-mac80211-flush-queues-on-STA-removal.patch
delete mode 100644 package/kernel/mac80211/patches/subsys/333-wifi-mac80211-add-flush_sta-method.patch

including luci, openvpn, sqm, luci statistics, dashboard (ugly...) and wireguard.)

I had good experience so far, but I don't use any features and don't have much load right now.

1 Like