Xiaomi AX3600 radio1 AX WiFi crash after DFS-RADAR-DETECTED

Hi,

I got this in my log since I switched from HE80 to HE160 mode. I suspect it has something to do with the change because it worked without hiccups 9 days uptime before.

The problem with radio1 down startet at 11:09. Seems like the driver wanted to switch from the configured channel 52 to channel 116? Ending up in ' Wed Mar 22 11:09:11 2023 daemon.err hostapd: could not get valid channel '

Wed Mar 22 07:46:03 2023 daemon.notice netifd: Network device 'lan1' link is up
Wed Mar 22 11:09:04 2023 daemon.notice wpa_supplicant[2062]: phy1-mesh0: DFS-RADAR-DETECTED freq=5260 ht_enabled=0 chan_offset=0 chan_width=5 cf1=5250 cf2=0
Wed Mar 22 11:09:05 2023 daemon.notice hostapd: phy1-ap0: DFS-RADAR-DETECTED freq=5260 ht_enabled=0 chan_offset=0 chan_width=5 cf1=5250 cf2=0
Wed Mar 22 11:09:05 2023 daemon.warn hostapd: Can't set DFS state for freq 5180 MHz
Wed Mar 22 11:09:05 2023 daemon.warn hostapd: Can't set DFS state for freq 5200 MHz
Wed Mar 22 11:09:05 2023 daemon.warn hostapd: Can't set DFS state for freq 5220 MHz
Wed Mar 22 11:09:05 2023 daemon.warn hostapd: Can't set DFS state for freq 5240 MHz
Wed Mar 22 11:09:05 2023 daemon.notice hostapd: dfs_downgrade_bandwidth: no DFS channels left, waiting for NOP to finish
Wed Mar 22 11:09:05 2023 daemon.notice hostapd: phy1-ap0: AP-DISABLED
Wed Mar 22 11:09:05 2023 daemon.notice hostapd: phy1-ap1: AP-STA-DISCONNECTED aa:bb:cc:dd:ee:ff
Wed Mar 22 11:09:05 2023 daemon.notice hostapd: phy1-ap1: AP-STA-DISCONNECTED aa:bb:cc:dd:ee:ff
Wed Mar 22 11:09:05 2023 daemon.notice hostapd: phy1-ap1: AP-STA-DISCONNECTED aa:bb:cc:dd:ee:ff
Wed Mar 22 11:09:05 2023 daemon.err hostapd: 20/40 MHz: center segment 0 (=50) and center freq 1 (=5270) not in sync
Wed Mar 22 11:09:05 2023 daemon.warn wpa_supplicant[2062]: Can't set DFS state for freq 5180 MHz
Wed Mar 22 11:09:05 2023 daemon.warn wpa_supplicant[2062]: Can't set DFS state for freq 5200 MHz
Wed Mar 22 11:09:05 2023 daemon.warn wpa_supplicant[2062]: Can't set DFS state for freq 5220 MHz
Wed Mar 22 11:09:05 2023 daemon.warn wpa_supplicant[2062]: Can't set DFS state for freq 5240 MHz
Wed Mar 22 11:09:05 2023 daemon.notice wpa_supplicant[2062]: phy1-mesh0: DFS-NEW-CHANNEL freq=5580 chan=116 sec_chan=1
Wed Mar 22 11:09:05 2023 daemon.warn wpa_supplicant[2062]: DFS failed to schedule CSA (-22) - trying fallback
Wed Mar 22 11:09:05 2023 kern.warn kernel: [81107.486620] ath11k c000000.wifi: No VIF found for vdev 4
Wed Mar 22 11:09:05 2023 kern.warn kernel: [81107.486670] ath11k c000000.wifi: invalid vdev id 4 in bcn_tx_status
Wed Mar 22 11:09:05 2023 daemon.notice netifd: Network device 'phy1-ap1' link is down
Wed Mar 22 11:09:05 2023 kern.info kernel: [81107.560481] br-vl78: port 4(phy1-ap1) entered disabled state
Wed Mar 22 11:09:05 2023 kern.info kernel: [81107.599210] device phy1-ap1 left promiscuous mode
Wed Mar 22 11:09:05 2023 kern.info kernel: [81107.599259] br-vl78: port 4(phy1-ap1) entered disabled state
Wed Mar 22 11:09:05 2023 daemon.notice hostapd: nl80211: Failed to remove interface phy1-ap1 from bridge br-vl78: No such device
Wed Mar 22 11:09:05 2023 daemon.notice hostapd: nl80211: deinit ifname=phy1-ap0 disabled_11b_rates=0
Wed Mar 22 11:09:05 2023 kern.info kernel: [81107.751676] device phy1-ap0 left promiscuous mode
Wed Mar 22 11:09:05 2023 kern.info kernel: [81107.751844] br-vl177: port 5(phy1-ap0) entered disabled state
Wed Mar 22 11:09:05 2023 kern.warn kernel: [81107.811311] ------------[ cut here ]------------
Wed Mar 22 11:09:05 2023 kern.warn kernel: [81107.811348] WARNING: CPU: 0 PID: 0 at ath11k_hal_rx_sw_mon_ring_buf_paddr_get+0x4628/0x49f0 [ath11k]
Wed Mar 22 11:09:05 2023 kern.warn kernel: [81107.815006] Modules linked in: pppoe ppp_async nft_fib_inet nf_flow_table_ipv6 nf_flow_table_ipv4 nf_flow_table_inet batman_adv ath11k_ahb ath11k ath10k_pci ath10k_core ath pppox ppp_generic nft_reject_ipv6 nft_reject_ipv4 nft_reject_inet nft_reject nft_redir nft_quota nft_objref nft_numgen nft_nat nft_masq nft_log nft_limit nft_hash nft_flow_offload nft_fib_ipv6 nft_fib_ipv4 nft_fib nft_ct nft_counter nft_chain_nat nf_tables nf_nat nf_flow_table nf_conntrack mac80211 iptable_mangle iptable_filter ipt_REJECT ipt_ECN ip_tables cfg80211 xt_time xt_tcpudp xt_tcpmss xt_statistic xt_multiport xt_mark xt_mac xt_limit xt_length xt_hl xt_ecn xt_dscp xt_comment xt_TCPMSS xt_LOG xt_HL xt_DSCP xt_CLASSIFY x_tables slhc sch_cake qrtr_smd qrtr qmi_helpers ns nfnetlink nf_reject_ipv6 nf_reject_ipv4 nf_log_syslog nf_defrag_ipv6 nf_defrag_ipv4 libcrc32c crc_ccitt compat sch_tbf sch_ingress sch_htb sch_hfsc em_u32 cls_u32 cls_route cls_matchall cls_fw cls_flow cls_basic act_skbedit act_mirred act_gact
Wed Mar 22 11:09:05 2023 kern.warn kernel: [81107.815285]  ifb tun seqiv jitterentropy_rng drbg michael_mic hmac cmac leds_gpio xhci_plat_hcd xhci_pci xhci_hcd dwc3 dwc3_qcom qca_nss_dp qca_ssdk gpio_button_hotplug aquantia hwmon crc32c_generic
Wed Mar 22 11:09:05 2023 kern.warn kernel: [81107.911032] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.15.102 #0
Wed Mar 22 11:09:05 2023 kern.warn kernel: [81107.928714] Hardware name: Xiaomi AX3600 (DT)
Wed Mar 22 11:09:05 2023 kern.warn kernel: [81107.934875] pstate: 00400005 (nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
Wed Mar 22 11:09:05 2023 kern.warn kernel: [81107.939220] pc : ath11k_hal_rx_sw_mon_ring_buf_paddr_get+0x4628/0x49f0 [ath11k]
Wed Mar 22 11:09:05 2023 kern.warn kernel: [81107.945990] lr : ath11k_hal_rx_sw_mon_ring_buf_paddr_get+0x2bd8/0x49f0 [ath11k]
Wed Mar 22 11:09:05 2023 kern.warn kernel: [81107.953283] sp : ffffffc008003c20
Wed Mar 22 11:09:05 2023 kern.warn kernel: [81107.960566] x29: ffffffc008003c20 x28: 0000000000000030 x27: ffffffc008be6810
Wed Mar 22 11:09:05 2023 kern.warn kernel: [81107.964047] x26: 0000000000000038 x25: 000000000000017f x24: ffffff801d1a50c0
Wed Mar 22 11:09:05 2023 kern.warn kernel: [81107.971165] x23: 0000000000000000 x22: 0000000000000003 x21: ffffff800627a020
Wed Mar 22 11:09:05 2023 kern.warn kernel: [81107.978282] x20: ffffff80046a0000 x19: ffffff80166ac900 x18: 0000000000000000
Wed Mar 22 11:09:05 2023 kern.warn kernel: [81107.985400] x17: ffffffc017466000 x16: ffffffc008004000 x15: 0000000000004000
Wed Mar 22 11:09:05 2023 kern.warn kernel: [81107.992519] x14: 00000000000000f0 x13: 0000000000000001 x12: 0000000000000000
Wed Mar 22 11:09:05 2023 kern.warn kernel: [81107.999637] x11: 0000000000000001 x10: ffffff80046a1d88 x9 : 0000000000000000
Wed Mar 22 11:09:05 2023 kern.warn kernel: [81108.006755] x8 : ffffff80165e2000 x7 : 0000000000000028 x6 : 0000000000000004
Wed Mar 22 11:09:05 2023 kern.warn kernel: [81108.013874] x5 : 00000000000011ae x4 : 0000000000000002 x3 : ffffff80046a0000
Wed Mar 22 11:09:05 2023 kern.warn kernel: [81108.020991] x2 : 0000000000000001 x1 : 0000000000000005 x0 : ffffff800627a020
Wed Mar 22 11:09:05 2023 kern.warn kernel: [81108.028109] Call trace:
Wed Mar 22 11:09:05 2023 kern.warn kernel: [81108.035219]  ath11k_hal_rx_sw_mon_ring_buf_paddr_get+0x4628/0x49f0 [ath11k]
Wed Mar 22 11:09:05 2023 kern.warn kernel: [81108.037483]  ath11k_htc_rx_completion_handler+0x464/0x610 [ath11k]
Wed Mar 22 11:09:05 2023 kern.warn kernel: [81108.044427]  ath11k_ce_per_engine_service+0x2e0/0x3f0 [ath11k]
Wed Mar 22 11:09:05 2023 kern.warn kernel: [81108.050676]  0xffffffc000cb5c74
Wed Mar 22 11:09:05 2023 kern.warn kernel: [81108.056485]  tasklet_action_common.constprop.0+0x144/0x180
Wed Mar 22 11:09:05 2023 kern.warn kernel: [81108.059529]  tasklet_action+0x28/0x34
Wed Mar 22 11:09:05 2023 kern.warn kernel: [81108.065081]  _stext+0x10c/0x28c
Wed Mar 22 11:09:05 2023 kern.warn kernel: [81108.068812]  irq_exit+0xbc/0x100
Wed Mar 22 11:09:05 2023 kern.warn kernel: [81108.071764]  handle_domain_irq+0x64/0x90
Wed Mar 22 11:09:05 2023 kern.warn kernel: [81108.075238]  gic_handle_irq+0x74/0xa0
Wed Mar 22 11:09:05 2023 kern.warn kernel: [81108.079144]  call_on_irq_stack+0x28/0x54
Wed Mar 22 11:09:05 2023 kern.warn kernel: [81108.082703]  do_interrupt_handler+0x54/0x60
Wed Mar 22 11:09:05 2023 kern.warn kernel: [81108.086697]  el1_interrupt+0x30/0x50
Wed Mar 22 11:09:05 2023 kern.warn kernel: [81108.090602]  el1h_64_irq_handler+0x18/0x24
Wed Mar 22 11:09:05 2023 kern.warn kernel: [81108.094422]  el1h_64_irq+0x78/0x7c
Wed Mar 22 11:09:05 2023 kern.warn kernel: [81108.098328]  arch_cpu_idle+0x18/0x2c
Wed Mar 22 11:09:05 2023 kern.warn kernel: [81108.101713]  default_idle_call+0x20/0x70
Wed Mar 22 11:09:05 2023 kern.warn kernel: [81108.105445]  do_idle+0x214/0x240
Wed Mar 22 11:09:05 2023 kern.warn kernel: [81108.109351]  cpu_startup_entry+0x24/0x60
Wed Mar 22 11:09:05 2023 kern.warn kernel: [81108.112564]  rest_init+0xc8/0xe0
Wed Mar 22 11:09:05 2023 kern.warn kernel: [81108.116469]  arch_call_rest_init+0x10/0x1c
Wed Mar 22 11:09:05 2023 kern.warn kernel: [81108.119682]  start_kernel+0x6a8/0x6cc
Wed Mar 22 11:09:05 2023 kern.warn kernel: [81108.123588]  __primary_switched+0xa0/0xa8
Wed Mar 22 11:09:05 2023 kern.warn kernel: [81108.127322] ---[ end trace 058bf8cac5397317 ]---
Wed Mar 22 11:09:05 2023 kern.warn kernel: [81108.131428] ath11k c000000.wifi: vdev start resp error status 3 (dfs violation)
Wed Mar 22 11:09:05 2023 kern.warn kernel: [81108.136051] ath11k c000000.wifi: failed to synchronize setup for vdev 2 restart: -22
Wed Mar 22 11:09:05 2023 kern.warn kernel: [81108.143230] ath11k c000000.wifi: failed to restart vdev 2: -22
Wed Mar 22 11:09:05 2023 daemon.notice wpa_supplicant[2062]: phy1-mesh0: leaving mesh
Wed Mar 22 11:09:05 2023 daemon.notice netifd: Network device 'phy1-ap0' link is down
Wed Mar 22 11:09:05 2023 daemon.notice hostapd: phy1-ap0: interface state ENABLED->DISABLED
Wed Mar 22 11:09:10 2023 daemon.notice netifd: Network device 'phy1-mesh0' link is down
Wed Mar 22 11:09:10 2023 daemon.notice netifd: Interface 'nwi_mesh0' has link connectivity loss
Wed Mar 22 11:09:10 2023 daemon.notice wpa_supplicant[2062]: phy1-mesh0: interface state ENABLED->COUNTRY_UPDATE
Wed Mar 22 11:09:10 2023 daemon.notice wpa_supplicant[2062]: phy1-mesh0: interface state COUNTRY_UPDATE->DFS
Wed Mar 22 11:09:10 2023 daemon.notice wpa_supplicant[2062]: phy1-mesh0: DFS-CAC-START freq=5580 chan=116 sec_chan=1, width=1, seg0=122, seg1=0, cac_time=600s
Wed Mar 22 11:09:10 2023 kern.warn kernel: [81113.308738] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 15
Wed Mar 22 11:09:10 2023 daemon.notice wpa_supplicant[2062]: phy1-mesh0: new peer notification for aa:bb:cc:dd:ee:ff
Wed Mar 22 11:09:11 2023 kern.info kernel: [81113.340327] br-vl177: port 5(phy1-ap0) entered blocking state
Wed Mar 22 11:09:11 2023 kern.info kernel: [81113.340381] br-vl177: port 5(phy1-ap0) entered disabled state
Wed Mar 22 11:09:11 2023 kern.info kernel: [81113.345453] device phy1-ap0 entered promiscuous mode
Wed Mar 22 11:09:11 2023 daemon.notice hostapd: phy1-ap0: interface state DISABLED->COUNTRY_UPDATE
Wed Mar 22 11:09:11 2023 daemon.err hostapd: could not get valid channel
Wed Mar 22 11:09:11 2023 daemon.notice hostapd: phy1-ap0: interface state COUNTRY_UPDATE->DFS
Wed Mar 22 11:09:11 2023 kern.info kernel: [81113.380925] batman_adv: bat0: Interface deactivated: phy1-mesh0
Wed Mar 22 11:09:11 2023 kern.info kernel: [81113.380973] batman_adv: bat0: Removing interface: phy1-mesh0
Wed Mar 22 11:09:11 2023 daemon.notice netifd: Interface 'nwi_mesh0' is now down
Wed Mar 22 11:09:11 2023 daemon.notice netifd: Interface 'nwi_mesh0' is disabled
Wed Mar 22 11:09:11 2023 daemon.notice netifd: Interface 'nwi_mesh0' is enabled
Wed Mar 22 11:09:11 2023 daemon.warn netifd: Wireless device 'radio1' setup failed, retry=3
Wed Mar 22 11:09:11 2023 daemon.notice hostapd: Remove interface 'phy1-ap0'
Wed Mar 22 11:09:11 2023 daemon.notice hostapd: phy1-ap0: interface state DFS->DISABLED
Wed Mar 22 11:09:11 2023 daemon.notice hostapd: phy1-ap1: AP-DISABLED
Wed Mar 22 11:09:11 2023 daemon.notice hostapd: phy1-ap1: CTRL-EVENT-TERMINATING
Wed Mar 22 11:09:11 2023 daemon.err hostapd: rmdir[ctrl_interface=/var/run/hostapd]: Permission denied
Wed Mar 22 11:09:11 2023 daemon.err hostapd: hostapd_free_hapd_data: Interface phy1-ap1 wasn't started
Wed Mar 22 11:09:11 2023 daemon.notice hostapd: phy1-ap0: AP-DISABLED
Wed Mar 22 11:09:11 2023 daemon.notice hostapd: phy1-ap0: CTRL-EVENT-TERMINATING
Wed Mar 22 11:09:11 2023 daemon.err hostapd: rmdir[ctrl_interface=/var/run/hostapd]: Permission denied
Wed Mar 22 11:09:11 2023 daemon.err hostapd: hostapd_free_hapd_data: Interface phy1-ap0 wasn't started
Wed Mar 22 11:09:11 2023 daemon.notice hostapd: nl80211: deinit ifname=phy1-ap0 disabled_11b_rates=0
Wed Mar 22 11:09:11 2023 kern.info kernel: [81113.804488] device phy1-ap0 left promiscuous mode
Wed Mar 22 11:09:11 2023 kern.info kernel: [81113.804637] br-vl177: port 5(phy1-ap0) entered disabled state
Wed Mar 22 11:09:11 2023 daemon.notice netifd: radio1 (32243): Command failed: Not found
Wed Mar 22 11:09:12 2023 kern.warn kernel: [81114.089805] ------------[ cut here ]------------
Wed Mar 22 11:09:12 2023 kern.warn kernel: [81114.089849] WARNING: CPU: 3 PID: 32279 at ieee80211_del_virtual_monitor+0x190/0xb00 [mac80211]
Wed Mar 22 11:09:12 2023 kern.warn kernel: [81114.093505] Modules linked in: pppoe ppp_async nft_fib_inet nf_flow_table_ipv6 nf_flow_table_ipv4 nf_flow_table_inet batman_adv ath11k_ahb ath11k ath10k_pci ath10k_core ath pppox ppp_generic nft_reject_ipv6 nft_reject_ipv4 nft_reject_inet nft_reject nft_redir nft_quota nft_objref nft_numgen nft_nat nft_masq nft_log nft_limit nft_hash nft_flow_offload nft_fib_ipv6 nft_fib_ipv4 nft_fib nft_ct nft_counter nft_chain_nat nf_tables nf_nat nf_flow_table nf_conntrack mac80211 iptable_mangle iptable_filter ipt_REJECT ipt_ECN ip_tables cfg80211 xt_time xt_tcpudp xt_tcpmss xt_statistic xt_multiport xt_mark xt_mac xt_limit xt_length xt_hl xt_ecn xt_dscp xt_comment xt_TCPMSS xt_LOG xt_HL xt_DSCP xt_CLASSIFY x_tables slhc sch_cake qrtr_smd qrtr qmi_helpers ns nfnetlink nf_reject_ipv6 nf_reject_ipv4 nf_log_syslog nf_defrag_ipv6 nf_defrag_ipv4 libcrc32c crc_ccitt compat sch_tbf sch_ingress sch_htb sch_hfsc em_u32 cls_u32 cls_route cls_matchall cls_fw cls_flow cls_basic act_skbedit act_mirred act_gact
Wed Mar 22 11:09:12 2023 kern.warn kernel: [81114.093771]  ifb tun seqiv jitterentropy_rng drbg michael_mic hmac cmac leds_gpio xhci_plat_hcd xhci_pci xhci_hcd dwc3 dwc3_qcom qca_nss_dp qca_ssdk gpio_button_hotplug aquantia hwmon crc32c_generic
Wed Mar 22 11:09:12 2023 kern.warn kernel: [81114.189012] CPU: 3 PID: 32279 Comm: ip Tainted: G        W         5.15.102 #0
Wed Mar 22 11:09:12 2023 kern.warn kernel: [81114.206696] Hardware name: Xiaomi AX3600 (DT)
Wed Mar 22 11:09:12 2023 kern.warn kernel: [81114.213896] pstate: 20400005 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
Wed Mar 22 11:09:12 2023 kern.warn kernel: [81114.218327] pc : ieee80211_del_virtual_monitor+0x190/0xb00 [mac80211]
Wed Mar 22 11:09:12 2023 kern.warn kernel: [81114.225097] lr : ieee80211_del_virtual_monitor+0x180/0xb00 [mac80211]
Wed Mar 22 11:09:12 2023 kern.warn kernel: [81114.231694] sp : ffffffc009633a50
Wed Mar 22 11:09:12 2023 kern.warn kernel: [81114.238112] x29: ffffffc009633a50 x28: 0000000000000001 x27: 0000000000000000
Wed Mar 22 11:09:12 2023 kern.warn kernel: [81114.241417] x26: 0000000000401002 x25: ffffff8010d49c10 x24: ffffff8009b88900
Wed Mar 22 11:09:12 2023 kern.warn kernel: [81114.248535] x23: 0000000000001003 x22: 0000000000000001 x21: ffffffc000c40780
Wed Mar 22 11:09:12 2023 kern.warn kernel: [81114.255654] x20: ffffff8006278880 x19: ffffff8009b88000 x18: 0000000000000000
Wed Mar 22 11:09:12 2023 kern.warn kernel: [81114.262773] x17: 0000000000000000 x16: 0000000000000000 x15: 0000007fd0a35358
Wed Mar 22 11:09:12 2023 kern.warn kernel: [81114.269890] x14: 000000000000012b x13: 0000000000000000 x12: 0000000000000000
Wed Mar 22 11:09:12 2023 kern.warn kernel: [81114.277009] x11: 0000000000000002 x10: 0000000000000890 x9 : ffffffc0096337e0
Wed Mar 22 11:09:12 2023 kern.warn kernel: [81114.284127] x8 : ffffff8007ad5b30 x7 : 0000000000000176 x6 : 0000000000000176
Wed Mar 22 11:09:12 2023 kern.warn kernel: [81114.291244] x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffffff8007ad5240
Wed Mar 22 11:09:12 2023 kern.warn kernel: [81114.298361] x2 : 0000000000000000 x1 : 0000000000000007 x0 : 0000000000000001
Wed Mar 22 11:09:12 2023 kern.warn kernel: [81114.305481] Call trace:
Wed Mar 22 11:09:12 2023 kern.warn kernel: [81114.312590]  ieee80211_del_virtual_monitor+0x190/0xb00 [mac80211]
Wed Mar 22 11:09:12 2023 kern.warn kernel: [81114.314854]  ieee80211_del_virtual_monitor+0x9d0/0xb00 [mac80211]
Wed Mar 22 11:09:12 2023 kern.warn kernel: [81114.321104]  __dev_close_many+0xa8/0x11c
Wed Mar 22 11:09:12 2023 kern.warn kernel: [81114.327175]  __dev_change_flags+0x124/0x194
Wed Mar 22 11:09:12 2023 kern.warn kernel: [81114.331169]  dev_change_flags+0x24/0x6c
Wed Mar 22 11:09:12 2023 kern.warn kernel: [81114.335074]  devinet_ioctl+0x398/0x69c
Wed Mar 22 11:09:12 2023 kern.warn kernel: [81114.338894]  inet_ioctl+0x250/0x260
Wed Mar 22 11:09:12 2023 kern.warn kernel: [81114.342713]  sock_ioctl+0x240/0x49c
Wed Mar 22 11:09:12 2023 kern.warn kernel: [81114.346097]  __arm64_sys_ioctl+0x598/0x108c
Wed Mar 22 11:09:12 2023 kern.warn kernel: [81114.349572]  invoke_syscall.constprop.0+0x5c/0x104
Wed Mar 22 11:09:12 2023 kern.warn kernel: [81114.353739]  do_el0_svc+0x6c/0x15c
Wed Mar 22 11:09:12 2023 kern.warn kernel: [81114.358598]  el0_svc+0x18/0x54
Wed Mar 22 11:09:12 2023 kern.warn kernel: [81114.361982]  el0t_64_sync_handler+0xe8/0x114
Wed Mar 22 11:09:12 2023 kern.warn kernel: [81114.365023]  el0t_64_sync+0x184/0x188
Wed Mar 22 11:09:12 2023 kern.warn kernel: [81114.369449] ---[ end trace 058bf8cac5397318 ]---
Wed Mar 22 11:09:12 2023 daemon.notice wpa_supplicant[32282]: supp-global-ctrl-iface-init(/var/run/wpa_supplicant/global) (will try fixup): bind(PF_UNIX): Address in use
Wed Mar 22 11:09:12 2023 daemon.notice wpa_supplicant[32282]: Successfully initialized wpa_supplicant
Wed Mar 22 11:09:17 2023 kern.warn kernel: [81119.388727] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 15
Wed Mar 22 11:09:17 2023 daemon.notice netifd: Interface 'nwi_mesh0' is disabled
Wed Mar 22 11:09:17 2023 daemon.notice netifd: Wireless device 'radio1' is now down
Wed Mar 22 11:09:18 2023 daemon.notice hostapd: Configuration file: /var/run/hostapd-phy1.conf (phy phy1-ap0) --> new PHY
Wed Mar 22 11:09:18 2023 kern.info kernel: [81120.494902] br-vl177: port 5(phy1-ap0) entered blocking state
Wed Mar 22 11:09:18 2023 kern.info kernel: [81120.494954] br-vl177: port 5(phy1-ap0) entered disabled state
Wed Mar 22 11:09:18 2023 kern.info kernel: [81120.500072] device phy1-ap0 entered promiscuous mode
Wed Mar 22 11:09:18 2023 kern.info kernel: [81120.505504] br-vl177: port 5(phy1-ap0) entered blocking state
Wed Mar 22 11:09:18 2023 kern.info kernel: [81120.510446] br-vl177: port 5(phy1-ap0) entered forwarding state
Wed Mar 22 11:09:18 2023 daemon.notice hostapd: phy1-ap0: interface state UNINITIALIZED->COUNTRY_UPDATE
Wed Mar 22 11:09:18 2023 kern.info kernel: [81120.516441] br-vl177: port 5(phy1-ap0) entered disabled state
Wed Mar 22 11:09:18 2023 daemon.err hostapd: could not get valid channel
Wed Mar 22 11:09:18 2023 daemon.notice hostapd: phy1-ap0: interface state COUNTRY_UPDATE->DFS
Wed Mar 22 11:09:19 2023 daemon.notice netifd: radio1 (32406): command failed: Link has been severed (-67)
Wed Mar 22 11:09:19 2023 daemon.notice netifd: radio1 (32406): command failed: Link has been severed (-67)
Wed Mar 22 11:09:19 2023 daemon.notice netifd: Wireless device 'radio1' is now up
Wed Mar 22 11:09:19 2023 daemon.notice netifd: Interface 'nwi_mesh0' is enabled
Wed Mar 22 11:09:22 2023 daemon.notice wpa_supplicant[32282]: phy1-mesh0: interface state UNINITIALIZED->COUNTRY_UPDATE
Wed Mar 22 11:09:22 2023 daemon.notice wpa_supplicant[32282]: phy1-mesh0: interface state COUNTRY_UPDATE->DFS
Wed Mar 22 11:09:22 2023 daemon.notice wpa_supplicant[32282]: phy1-mesh0: DFS-CAC-START freq=5580 chan=116 sec_chan=1, width=1, seg0=122, seg1=0, cac_time=600s
Wed Mar 22 11:10:11 2023 daemon.info hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: authenticated
Wed Mar 22 11:10:11 2023 daemon.info hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: associated (aid 5)
Wed Mar 22 11:10:11 2023 daemon.notice hostapd: phy2-ap1: AP-STA-CONNECTED aa:bb:cc:dd:ee:ff auth_alg=open
Wed Mar 22 11:10:11 2023 daemon.info hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff RADIUS: starting accounting session 7D63850E42C3D037
Wed Mar 22 11:10:11 2023 daemon.info hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff WPA: pairwise key handshake completed (RSN)
Wed Mar 22 11:10:11 2023 daemon.notice hostapd: phy2-ap1: EAPOL-4WAY-HS-COMPLETED aa:bb:cc:dd:ee:ff
Wed Mar 22 11:19:31 2023 daemon.notice wpa_supplicant[32282]: phy1-mesh0: DFS-CAC-COMPLETED success=1 freq=5580 ht_enabled=0 chan_offset=0 chan_width=3 cf1=5610 cf2=0
Wed Mar 22 11:19:31 2023 daemon.notice wpa_supplicant[32282]: phy1-mesh0: interface state DFS->ENABLED
Wed Mar 22 11:19:31 2023 daemon.notice wpa_supplicant[32282]: phy1-mesh0: AP-ENABLED
Wed Mar 22 11:19:31 2023 kern.warn kernel: [81733.548941] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 15
Wed Mar 22 11:19:31 2023 daemon.notice wpa_supplicant[32282]: phy1-mesh0: joining mesh MESH
Wed Mar 22 11:19:31 2023 daemon.notice wpa_supplicant[32282]: phy1-mesh0: CTRL-EVENT-CONNECTED - Connection to aa:bb:cc:dd:ee:ff completed [id=0 id_str=]
Wed Mar 22 11:19:31 2023 daemon.notice netifd: Network device 'phy1-mesh0' link is up
Wed Mar 22 11:19:31 2023 daemon.notice netifd: Interface 'nwi_mesh0' has link connectivity
Wed Mar 22 11:19:31 2023 daemon.notice netifd: Interface 'nwi_mesh0' is setting up now
Wed Mar 22 11:19:31 2023 daemon.notice wpa_supplicant[32282]: phy1-mesh0: MESH-GROUP-STARTED ssid="MESH" id=0
Wed Mar 22 11:19:31 2023 kern.info kernel: [81733.638883] batman_adv: bat0: Adding interface: phy1-mesh0
Wed Mar 22 11:19:31 2023 kern.info kernel: [81733.639028] batman_adv: bat0: Interface activated: phy1-mesh0
Wed Mar 22 11:19:31 2023 daemon.notice netifd: Interface 'nwi_mesh0' is now up
Wed Mar 22 11:25:05 2023 daemon.info hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: authenticated
Wed Mar 22 11:25:05 2023 daemon.info hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: associated (aid 6)
Wed Mar 22 11:25:05 2023 daemon.notice hostapd: phy2-ap1: AP-STA-CONNECTED aa:bb:cc:dd:ee:ff auth_alg=open
Wed Mar 22 11:25:05 2023 daemon.info hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff RADIUS: starting accounting session AEDF7F77D2C9F498
Wed Mar 22 11:25:05 2023 daemon.info hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff WPA: pairwise key handshake completed (RSN)
Wed Mar 22 11:25:05 2023 daemon.notice hostapd: phy2-ap1: EAPOL-4WAY-HS-COMPLETED aa:bb:cc:dd:ee:ff
Wed Mar 22 11:25:14 2023 daemon.info hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: authenticated
Wed Mar 22 11:25:14 2023 daemon.info hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: associated (aid 7)
Wed Mar 22 11:25:14 2023 daemon.notice hostapd: phy2-ap1: AP-STA-CONNECTED aa:bb:cc:dd:ee:ff auth_alg=open
Wed Mar 22 11:25:14 2023 daemon.info hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff RADIUS: starting accounting session CDC95165F3768ADC
Wed Mar 22 11:25:14 2023 daemon.info hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff WPA: pairwise key handshake completed (RSN)
Wed Mar 22 11:25:14 2023 daemon.notice hostapd: phy2-ap1: EAPOL-4WAY-HS-COMPLETED aa:bb:cc:dd:ee:ff
Wed Mar 22 11:25:26 2023 daemon.info hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: authenticated
Wed Mar 22 11:25:26 2023 daemon.info hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: associated (aid 8)
Wed Mar 22 11:25:26 2023 daemon.notice hostapd: phy2-ap1: AP-STA-CONNECTED aa:bb:cc:dd:ee:ff auth_alg=open
Wed Mar 22 11:25:26 2023 daemon.info hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff RADIUS: starting accounting session 546DF490DF860A38
Wed Mar 22 11:25:26 2023 daemon.info hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff WPA: pairwise key handshake completed (RSN)
Wed Mar 22 11:25:26 2023 daemon.notice hostapd: phy2-ap1: EAPOL-4WAY-HS-COMPLETED aa:bb:cc:dd:ee:ff
Wed Mar 22 11:28:58 2023 daemon.info hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: authenticated
Wed Mar 22 11:28:58 2023 daemon.info hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff IEEE 802.11: associated (aid 9)
Wed Mar 22 11:28:58 2023 daemon.notice hostapd: phy2-ap1: AP-STA-CONNECTED aa:bb:cc:dd:ee:ff auth_alg=open
Wed Mar 22 11:28:58 2023 daemon.info hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff RADIUS: starting accounting session 596DFB29AD9D116F
Wed Mar 22 11:28:58 2023 daemon.info hostapd: phy2-ap1: STA aa:bb:cc:dd:ee:ff WPA: pairwise key handshake completed (RSN)
Wed Mar 22 11:28:58 2023 daemon.notice hostapd: phy2-ap1: EAPOL-4WAY-HS-COMPLETED aa:bb:cc:dd:ee:ff
Wed Mar 22 11:39:14 2023 daemon.notice wpa_supplicant[32282]: phy1-mesh0: DFS-NOP-FINISHED freq=5260 ht_enabled=0 chan_offset=0 chan_width=0 cf1=5260 cf2=0
Wed Mar 22 11:39:14 2023 daemon.notice hostapd: phy1-ap0: DFS-NOP-FINISHED freq=5260 ht_enabled=0 chan_offset=0 chan_width=0 cf1=5260 cf2=0
Wed Mar 22 11:39:14 2023 daemon.err hostapd: could not get valid channel
Wed Mar 22 11:39:14 2023 daemon.notice hostapd: phy1-ap0: interface state DFS->DFS
Wed Mar 22 11:39:14 2023 daemon.notice wpa_supplicant[32282]: phy1-mesh0: DFS-NOP-FINISHED freq=5280 ht_enabled=0 chan_offset=0 chan_width=0 cf1=5280 cf2=0
Wed Mar 22 11:39:14 2023 daemon.notice hostapd: phy1-ap0: DFS-NOP-FINISHED freq=5280 ht_enabled=0 chan_offset=0 chan_width=0 cf1=5280 cf2=0
Wed Mar 22 11:39:14 2023 daemon.err hostapd: could not get valid channel
Wed Mar 22 11:39:14 2023 daemon.notice hostapd: phy1-ap0: interface state DFS->DFS
Wed Mar 22 11:39:14 2023 daemon.notice wpa_supplicant[32282]: phy1-mesh0: DFS-NOP-FINISHED freq=5300 ht_enabled=0 chan_offset=0 chan_width=0 cf1=5300 cf2=0
Wed Mar 22 11:39:14 2023 daemon.notice hostapd: phy1-ap0: DFS-NOP-FINISHED freq=5300 ht_enabled=0 chan_offset=0 chan_width=0 cf1=5300 cf2=0
Wed Mar 22 11:39:14 2023 daemon.err hostapd: could not get valid channel
Wed Mar 22 11:39:14 2023 daemon.notice hostapd: phy1-ap0: interface state DFS->DFS
Wed Mar 22 11:39:14 2023 daemon.notice wpa_supplicant[32282]: phy1-mesh0: DFS-NOP-FINISHED freq=5320 ht_enabled=0 chan_offset=0 chan_width=0 cf1=5320 cf2=0
Wed Mar 22 11:39:14 2023 daemon.notice hostapd: phy1-ap0: DFS-NOP-FINISHED freq=5320 ht_enabled=0 chan_offset=0 chan_width=0 cf1=5320 cf2=0
Wed Mar 22 11:39:14 2023 daemon.notice hostapd: phy1-ap0: interface state DFS->DFS
Wed Mar 22 11:39:14 2023 daemon.notice hostapd: phy1-ap0: DFS-CAC-START freq=5260 chan=52 sec_chan=1, width=2, seg0=50, seg1=0, cac_time=60s
Wed Mar 22 11:39:14 2023 daemon.err hostapd: DFS start_dfs_cac() failed, -1

I've now tried to do

service wpad restart

guessed out of the blue, but it didn't help. One more "possible bug" appeared in the log:

Wed Mar 22 11:47:05 2023 daemon.notice netifd: radio1 (3168): Command failed: ubus call wpa_supplicant config_remove {"iface":"phy1-mesh0"} (Invalid argument)
Wed Mar 22 11:47:05 2023 daemon.notice netifd: radio1 (3168): Usage: ubus [<options>] <command> [arguments...]
Wed Mar 22 11:47:05 2023 daemon.notice netifd: radio1 (3168): Options:
Wed Mar 22 11:47:05 2023 daemon.notice netifd: radio1 (3168):  -s <socket>:             Set the unix domain socket to connect to
Wed Mar 22 11:47:05 2023 daemon.notice netifd: radio1 (3168):  -t <timeout>:            Set the timeout (in seconds) for a command to complete
Wed Mar 22 11:47:05 2023 daemon.notice netifd: radio1 (3168):  -S:                      Use simplified output (for scripts)
Wed Mar 22 11:47:05 2023 daemon.notice netifd: radio1 (3168):  -v:                      More verbose output
Wed Mar 22 11:47:05 2023 daemon.notice netifd: radio1 (3168):  -m <type>:               (for monitor): include a specific message type
Wed Mar 22 11:47:05 2023 daemon.notice netifd: radio1 (3168):                   (can be used more than once)
Wed Mar 22 11:47:05 2023 daemon.notice netifd: radio1 (3168):  -M <r|t>         (for monitor): only capture received or transmitted traffic
Wed Mar 22 11:47:05 2023 daemon.notice netifd: radio1 (3168):
Wed Mar 22 11:47:05 2023 daemon.notice netifd: radio1 (3168): Commands:
Wed Mar 22 11:47:05 2023 daemon.notice netifd: radio1 (3168):  - list [<path>]                  List objects
Wed Mar 22 11:47:05 2023 daemon.notice netifd: radio1 (3168):  - call <path> <method> [<message>]       Call an object method
Wed Mar 22 11:47:05 2023 daemon.notice netifd: radio1 (3168):  - subscribe <path> [<path>...]   Subscribe to object(s) notifications
Wed Mar 22 11:47:05 2023 daemon.notice netifd: radio1 (3168):  - listen [<path>...]                     Listen for events
Wed Mar 22 11:47:05 2023 daemon.notice netifd: radio1 (3168):  - send <type> [<message>]                Send an event
Wed Mar 22 11:47:05 2023 daemon.notice netifd: radio1 (3168):  - wait_for <object> [<object>...]        Wait for multiple objects to appear on ubus
Wed Mar 22 11:47:05 2023 daemon.notice netifd: radio1 (3168):  - monitor                                Monitor ubus traffic
Wed Mar 22 11:47:05 2023 daemon.notice netifd: radio1 (3168):

Is there any command to reset the "ath11k" kernel module without reboot?

For stability I've put the following watchcat script. It checks for availability of the mesh partner which is reachable via AX radio1, if it is unavailable I know it's due to DFS-RADAR-DETECTION and the ath11k driver crash. So watchcat runs a script which inspect the logread output and if it finds the line "DFS-RADAR-DETECTION" it reboots the device to restore normal functionality.

/etc/config/watchcat


config watchcat
	option period '90s'
	option mode 'run_script'
	option pinghosts 'MESH_PARTNER_IP'
	option script '/root/watchcat.user.sh'
	option addressfamily 'ipv4'
	option pingperiod '60s'
	option pingsize 'standard'

/root/watchcat.user.sh

#!/bin/sh
logread | grep "DFS-RADAR-DETECTED" && reboot
exit 0

Btw, I'm getting a lot of those lines after fresh booting the device:

Wed Mar 22 12:08:23 2023 daemon.err hostapd: nl80211: kernel reports: integer out of range

I don't know which of the three radio devices cause it. (radio0 is unused).