OpenWrt Forum Archive

Topic: Netgear R8000 support?

The content of this topic has been archived between 23 Mar 2018 and 5 May 2018. Unfortunately there are posts – most likely complete pages – missing.

meuleman wrote:

Also: read back in the thread. One of the 5G radios is only for lower frequencies and the other radio is for higher 5G frequencies, don't use them wrongly or they will not be very efficient.

Am having a weird issue with my R8000, I suddenly have extremely slow speed even in Stock OS.

In OpenWRT / LEDE, 5G radios are not turning on. I have done the required NVRAM Reset and all and now in Stock am getting around 18MB/s in 5G where as i used to get around 55+ MB/s.

Would provide the log if needed. Do you think i need to change any values in NVRAM or is there something wrong in Board_Data mtd partition that this problem continues across firmwares ?

PS:- This happened after i flashed tomato to test it out, and when i came back to LEDE my 5G Radio just won't get enabled !

I have an R8000 running the latest "stable" build. I have to say it was REALLY nice to have the vlan tagging work (DDWRT and Tomato don't work on my R7000 or R8000). I have had wireless drop a couple time (all the radios, the network just drops, with DHCP events in the syslog). Has anyone else seen that or found a fix? One time the device needed a reboot to fix it, and the others, it came back after about 45 seconds on it's own.

Try the latest LEDE snapshot, i don't have that problem anymore..

@meuleman :-
This problem is still happening. Am using LEDE version - August -15 2016. I thought this was fixed with increasing the timeout.

[139186.599970] ------------[ cut here ]------------
[139186.604734] WARNING: CPU: 1 PID: 28285 at compat-wireless-2016-06-20/drivers/net/wireless/broadcom/brcm80211/brcmfmac/core.c:1172 brcmf_netdev_wait_pend8021x+0xbc/0xcc [brcmfmac]()
[139186.620970] Modules linked in: pppoe ppp_async iptable_nat brcmfmac pppox ppp_generic nf_nat_ipv4 nf_conntrack_ipv6 nf_conntrack_ipv4 ipt_REJECT ipt_MASQUERADE cfg80211 xt_time xt_tcpudp xt_state xt_nat xt_multiport xt_mark xt_mac xt_limit xt_id xt_conntrack xt_comment xt_TCPMSS xt_REDIRECT xt_LOG xt_CT slhc nf_reject_ipv4 nf_nat_redirect nf_nat_masquerade_ipv4 nf_nat nf_log_ipv4 nf_defrag_ipv6 nf_defrag_ipv4 nf_conntrack_rtcache nf_conntrack iptable_raw iptable_mangle iptable_filter ip_tables crc_ccitt compat brcmutil ip6t_REJECT nf_reject_ipv6 nf_log_ipv6 nf_log_common ip6table_raw ip6table_mangle ip6table_filter ip6_tables x_tables leds_gpio xhci_plat_hcd xhci_pci xhci_hcd ohci_platform ohci_hcd ehci_platform ehci_hcd gpio_button_hotplug usbcore nls_base usb_common bcma_hcd
[139186.690653] CPU: 1 PID: 28285 Comm: hostapd Not tainted 4.4.15 #0
[139186.696843] Hardware name: BCM5301X
[139186.700420] Backtrace: 
[139186.702985] [<c0017164>] (dump_backtrace) from [<c0017360>] (show_stack+0x18/0x1c)
[139186.710657]  r7:00000494 r6:bf1c2120 r5:60000013 r4:00000000
[139186.716464] [<c0017348>] (show_stack) from [<c017d9a8>] (dump_stack+0x84/0xa4)
[139186.723799] [<c017d924>] (dump_stack) from [<c0021568>] (warn_slowpath_common+0x8c/0xb8)
[139186.731990]  r5:00000009 r4:00000000
[139186.735677] [<c00214dc>] (warn_slowpath_common) from [<c0021638>] (warn_slowpath_null+0x24/0x2c)
[139186.744567]  r8:c7309ca0 r7:c7266d34 r6:c7266c80 r5:c7309b4c r4:00000001
[139186.751438] [<c0021614>] (warn_slowpath_null) from [<bf1b4e74>] (brcmf_netdev_wait_pend8021x+0xbc/0xcc [brcmfmac])
[139186.761923] [<bf1b4db8>] (brcmf_netdev_wait_pend8021x [brcmfmac]) from [<bf1a4a10>] (brcmf_cfg80211_leave_ibss+0xe0/0x2e0 [brcmfmac])
[139186.774030]  r7:c7266c80 r6:c71633c4 r5:c7266c80 r4:c04a63c8
[139186.779841] [<bf1a4970>] (brcmf_cfg80211_leave_ibss [brcmfmac]) from [<bf1a4f00>] (brcmf_cfg80211_add_key+0x268/0x334 [brcmfmac])
[139186.791603]  r6:00000000 r5:00000004 r4:c7163148
[139186.796385] [<bf1a4c98>] (brcmf_cfg80211_add_key [brcmfmac]) from [<bf159b48>] (nl80211_new_key+0xfc/0x128 [cfg80211])
[139186.807193]  r10:00000014 r9:c722b400 r8:c7309ca0 r7:c724e000 r6:c7266800 r5:00000000
[139186.815166]  r4:bf1a4c98
[139186.817829] [<bf159a4c>] (nl80211_new_key [cfg80211]) from [<c0287e3c>] (genl_rcv_msg+0x260/0x2e4)
[139186.826890]  r8:c7a146c0 r7:c61fb014 r6:bf169598 r5:bf17191c r4:00000000
[139186.833739] [<c0287bdc>] (genl_rcv_msg) from [<c028715c>] (netlink_rcv_skb+0x60/0xbc)
[139186.841669]  r10:c7a146c0 r9:00000000 r8:c7309d84 r7:c7b95800 r6:c0287bdc r5:c7a146c0
[139186.849642]  r4:c61fb000
[139186.852278] [<c02870fc>] (netlink_rcv_skb) from [<c0287bc8>] (genl_rcv+0x28/0x3c)
[139186.859860]  r7:c7b95800 r6:c7a146c0 r5:c7a146c0 r4:c04bab78
[139186.865656] [<c0287ba0>] (genl_rcv) from [<c0286b44>] (netlink_unicast+0x138/0x1f4)
[139186.873412]  r5:00000048 r4:c79d0000
[139186.877101] [<c0286a0c>] (netlink_unicast) from [<c0286fc4>] (netlink_sendmsg+0x300/0x320)
[139186.885466]  r9:00000008 r8:00000000 r7:00000048 r6:c7309f4c r5:c7b95800 r4:00000000
[139186.893372] [<c0286cc4>] (netlink_sendmsg) from [<c0245390>] (sock_sendmsg+0x1c/0x2c)
[139186.901299]  r10:00000000 r9:00000000 r8:00000000 r7:c7597380 r6:c7309e64 r5:00000000
[139186.909272]  r4:c7309f4c
[139186.911908] [<c0245374>] (sock_sendmsg) from [<c0245944>] (___sys_sendmsg+0x198/0x228)
[139186.919933] [<c02457ac>] (___sys_sendmsg) from [<c0246798>] (__sys_sendmsg+0x44/0x68)
[139186.927864]  r10:00000000 r9:c7308000 r8:c00098c4 r7:00000128 r6:00000000 r5:be8f8f90
[139186.935837]  r4:c7597380
[139186.938471] [<c0246754>] (__sys_sendmsg) from [<c02467cc>] (SyS_sendmsg+0x10/0x14)
[139186.946143]  r6:b6f5a1c8 r5:00000000 r4:00000000
[139186.950885] [<c02467bc>] (SyS_sendmsg) from [<c0009700>] (ret_fast_syscall+0x0/0x3c)
[139186.958773] ---[ end trace 19a0552144067f4b ]---
[139187.909971] ------------[ cut here ]------------
[139187.914729] WARNING: CPU: 1 PID: 28285 at compat-wireless-2016-06-20/drivers/net/wireless/broadcom/brcm80211/brcmfmac/core.c:1172 brcmf_netdev_wait_pend8021x+0xbc/0xcc [brcmfmac]()
[139187.930954] Modules linked in: pppoe ppp_async iptable_nat brcmfmac pppox ppp_generic nf_nat_ipv4 nf_conntrack_ipv6 nf_conntrack_ipv4 ipt_REJECT ipt_MASQUERADE cfg80211 xt_time xt_tcpudp xt_state xt_nat xt_multiport xt_mark xt_mac xt_limit xt_id xt_conntrack xt_comment xt_TCPMSS xt_REDIRECT xt_LOG xt_CT slhc nf_reject_ipv4 nf_nat_redirect nf_nat_masquerade_ipv4 nf_nat nf_log_ipv4 nf_defrag_ipv6 nf_defrag_ipv4 nf_conntrack_rtcache nf_conntrack iptable_raw iptable_mangle iptable_filter ip_tables crc_ccitt compat brcmutil ip6t_REJECT nf_reject_ipv6 nf_log_ipv6 nf_log_common ip6table_raw ip6table_mangle ip6table_filter ip6_tables x_tables leds_gpio xhci_plat_hcd xhci_pci xhci_hcd ohci_platform ohci_hcd ehci_platform ehci_hcd gpio_button_hotplug usbcore nls_base usb_common bcma_hcd
[139188.000641] CPU: 1 PID: 28285 Comm: hostapd Tainted: G        W       4.4.15 #0
[139188.008049] Hardware name: BCM5301X
[139188.011626] Backtrace: 
[139188.014188] [<c0017164>] (dump_backtrace) from [<c0017360>] (show_stack+0x18/0x1c)
[139188.021862]  r7:00000494 r6:bf1c2120 r5:60000013 r4:00000000
[139188.027668] [<c0017348>] (show_stack) from [<c017d9a8>] (dump_stack+0x84/0xa4)
[139188.034994] [<c017d924>] (dump_stack) from [<c0021568>] (warn_slowpath_common+0x8c/0xb8)
[139188.043187]  r5:00000009 r4:00000000
[139188.046874] [<c00214dc>] (warn_slowpath_common) from [<c0021638>] (warn_slowpath_null+0x24/0x2c)
[139188.055764]  r8:c7a14180 r7:c7266d34 r6:c7266c80 r5:c7309b84 r4:00000001
[139188.062631] [<c0021614>] (warn_slowpath_null) from [<bf1b4e74>] (brcmf_netdev_wait_pend8021x+0xbc/0xcc [brcmfmac])
[139188.073110] [<bf1b4db8>] (brcmf_netdev_wait_pend8021x [brcmfmac]) from [<bf1a4a10>] (brcmf_cfg80211_leave_ibss+0xe0/0x2e0 [brcmfmac])
[139188.085218]  r7:c7266c80 r6:c716327c r5:c7266c80 r4:c04a63c8
[139188.091028] [<bf1a4970>] (brcmf_cfg80211_leave_ibss [brcmfmac]) from [<bf1a4c84>] (brcmf_cfg80211_del_key+0x74/0x88 [brcmfmac])
[139188.102617]  r6:00000000 r5:c7163254 r4:c7163000
[139188.107399] [<bf1a4c10>] (brcmf_cfg80211_del_key [brcmfmac]) from [<bf1598b8>] (nl80211_del_key+0xf4/0x148 [cfg80211])
[139188.118207]  r7:c724e000 r6:c7266800 r5:c700e220 r4:bf1a4c10
[139188.124030] [<bf1597c4>] (nl80211_del_key [cfg80211]) from [<c0287e3c>] (genl_rcv_msg+0x260/0x2e4)
[139188.133090]  r7:c700e214 r6:bf1695ac r5:bf17191c r4:00000000
[139188.138887] [<c0287bdc>] (genl_rcv_msg) from [<c028715c>] (netlink_rcv_skb+0x60/0xbc)
[139188.146816]  r10:c7a14180 r9:00000000 r8:c7309d84 r7:c7b95800 r6:c0287bdc r5:c7a14180
[139188.154789]  r4:c700e200
[139188.157425] [<c02870fc>] (netlink_rcv_skb) from [<c0287bc8>] (genl_rcv+0x28/0x3c)
[139188.165008]  r7:c7b95800 r6:c7a14180 r5:c7a14180 r4:c04bab78
[139188.170803] [<c0287ba0>] (genl_rcv) from [<c0286b44>] (netlink_unicast+0x138/0x1f4)
[139188.178560]  r5:00000030 r4:c79d0000
[139188.182249] [<c0286a0c>] (netlink_unicast) from [<c0286fc4>] (netlink_sendmsg+0x300/0x320)
[139188.190614]  r9:00000008 r8:00000000 r7:00000030 r6:c7309f4c r5:c7b95800 r4:00000000
[139188.198519] [<c0286cc4>] (netlink_sendmsg) from [<c0245390>] (sock_sendmsg+0x1c/0x2c)
[139188.206447]  r10:00000000 r9:00000000 r8:00000000 r7:c7597380 r6:c7309e64 r5:00000000
[139188.214420]  r4:c7309f4c
[139188.217057] [<c0245374>] (sock_sendmsg) from [<c0245944>] (___sys_sendmsg+0x198/0x228)
[139188.225081] [<c02457ac>] (___sys_sendmsg) from [<c0246798>] (__sys_sendmsg+0x44/0x68)
[139188.233012]  r10:00000000 r9:c7308000 r8:c00098c4 r7:00000128 r6:00000000 r5:be8f8f60
[139188.240984]  r4:c7597380
[139188.243618] [<c0246754>] (__sys_sendmsg) from [<c02467cc>] (SyS_sendmsg+0x10/0x14)
[139188.251291]  r6:b6f5a1c8 r5:00000000 r4:00000000
[139188.256032] [<c02467bc>] (SyS_sendmsg) from [<c0009700>] (ret_fast_syscall+0x0/0x3c)
[139188.263924] ---[ end trace 19a0552144067f4c ]---
[185386.559207] ------------[ cut here ]------------
[185386.563965] WARNING: CPU: 1 PID: 28285 at compat-wireless-2016-06-20/drivers/net/wireless/broadcom/brcm80211/brcmfmac/core.c:1172 brcmf_netdev_wait_pend8021x+0xbc/0xcc [brcmfmac]()
[185386.580198] Modules linked in: pppoe ppp_async iptable_nat brcmfmac pppox ppp_generic nf_nat_ipv4 nf_conntrack_ipv6 nf_conntrack_ipv4 ipt_REJECT ipt_MASQUERADE cfg80211 xt_time xt_tcpudp xt_state xt_nat xt_multiport xt_mark xt_mac xt_limit xt_id xt_conntrack xt_comment xt_TCPMSS xt_REDIRECT xt_LOG xt_CT slhc nf_reject_ipv4 nf_nat_redirect nf_nat_masquerade_ipv4 nf_nat nf_log_ipv4 nf_defrag_ipv6 nf_defrag_ipv4 nf_conntrack_rtcache nf_conntrack iptable_raw iptable_mangle iptable_filter ip_tables crc_ccitt compat brcmutil ip6t_REJECT nf_reject_ipv6 nf_log_ipv6 nf_log_common ip6table_raw ip6table_mangle ip6table_filter ip6_tables x_tables leds_gpio xhci_plat_hcd xhci_pci xhci_hcd ohci_platform ohci_hcd ehci_platform ehci_hcd gpio_button_hotplug usbcore nls_base usb_common bcma_hcd
[185386.649885] CPU: 1 PID: 28285 Comm: hostapd Tainted: G        W       4.4.15 #0
[185386.657295] Hardware name: BCM5301X
[185386.660871] Backtrace: 
[185386.663435] [<c0017164>] (dump_backtrace) from [<c0017360>] (show_stack+0x18/0x1c)
[185386.671108]  r7:00000494 r6:bf1c2120 r5:60000013 r4:00000000
[185386.676916] [<c0017348>] (show_stack) from [<c017d9a8>] (dump_stack+0x84/0xa4)
[185386.684249] [<c017d924>] (dump_stack) from [<c0021568>] (warn_slowpath_common+0x8c/0xb8)
[185386.692440]  r5:00000009 r4:00000000
[185386.696128] [<c00214dc>] (warn_slowpath_common) from [<c0021638>] (warn_slowpath_null+0x24/0x2c)
[185386.705018]  r8:c7309ca0 r7:c7266d34 r6:c7266c80 r5:c7309b4c r4:00000001
[185386.711886] [<c0021614>] (warn_slowpath_null) from [<bf1b4e74>] (brcmf_netdev_wait_pend8021x+0xbc/0xcc [brcmfmac])
[185386.722364] [<bf1b4db8>] (brcmf_netdev_wait_pend8021x [brcmfmac]) from [<bf1a4a10>] (brcmf_cfg80211_leave_ibss+0xe0/0x2e0 [brcmfmac])
[185386.734473]  r7:c7266c80 r6:c7163320 r5:c7266c80 r4:c04a63c8
[185386.740283] [<bf1a4970>] (brcmf_cfg80211_leave_ibss [brcmfmac]) from [<bf1a4f00>] (brcmf_cfg80211_add_key+0x268/0x334 [brcmfmac])
[185386.752046]  r6:00000000 r5:00000004 r4:c71630a4
[185386.756827] [<bf1a4c98>] (brcmf_cfg80211_add_key [brcmfmac]) from [<bf159b48>] (nl80211_new_key+0xfc/0x128 [cfg80211])
[185386.767634]  r10:00000014 r9:c722b400 r8:c7309ca0 r7:c724e000 r6:c7266800 r5:00000000
[185386.775608]  r4:bf1a4c98
[185386.778272] [<bf159a4c>] (nl80211_new_key [cfg80211]) from [<c0287e3c>] (genl_rcv_msg+0x260/0x2e4)
[185386.787341]  r8:c650cb40 r7:c61fba14 r6:bf169598 r5:bf17191c r4:00000000
[185386.794190] [<c0287bdc>] (genl_rcv_msg) from [<c028715c>] (netlink_rcv_skb+0x60/0xbc)
[185386.802120]  r10:c650cb40 r9:00000000 r8:c7309d84 r7:c7b95800 r6:c0287bdc r5:c650cb40
[185386.810092]  r4:c61fba00
[185386.812729] [<c02870fc>] (netlink_rcv_skb) from [<c0287bc8>] (genl_rcv+0x28/0x3c)
[185386.820311]  r7:c7b95800 r6:c650cb40 r5:c650cb40 r4:c04bab78
[185386.826107] [<c0287ba0>] (genl_rcv) from [<c0286b44>] (netlink_unicast+0x138/0x1f4)
[185386.833863]  r5:00000048 r4:c79d0000
[185386.837553] [<c0286a0c>] (netlink_unicast) from [<c0286fc4>] (netlink_sendmsg+0x300/0x320)
[185386.845918]  r9:00000008 r8:00000000 r7:00000048 r6:c7309f4c r5:c7b95800 r4:00000000
[185386.853823] [<c0286cc4>] (netlink_sendmsg) from [<c0245390>] (sock_sendmsg+0x1c/0x2c)
[185386.861751]  r10:00000000 r9:00000000 r8:00000000 r7:c7597380 r6:c7309e64 r5:00000000
[185386.869724]  r4:c7309f4c
[185386.872360] [<c0245374>] (sock_sendmsg) from [<c0245944>] (___sys_sendmsg+0x198/0x228)
[185386.880384] [<c02457ac>] (___sys_sendmsg) from [<c0246798>] (__sys_sendmsg+0x44/0x68)
[185386.888316]  r10:00000000 r9:c7308000 r8:c00098c4 r7:00000128 r6:00000000 r5:be8f8f90
[185386.896288]  r4:c7597380
[185386.898922] [<c0246754>] (__sys_sendmsg) from [<c02467cc>] (SyS_sendmsg+0x10/0x14)
[185386.906593]  r6:b6f5a1c8 r5:00000000 r4:00000000
[185386.911337] [<c02467bc>] (SyS_sendmsg) from [<c0009700>] (ret_fast_syscall+0x0/0x3c)
[185386.919226] ---[ end trace 19a0552144067f4d ]---
[186586.559448] ------------[ cut here ]------------
[186586.564210] WARNING: CPU: 1 PID: 28285 at compat-wireless-2016-06-20/drivers/net/wireless/broadcom/brcm80211/brcmfmac/core.c:1172 brcmf_netdev_wait_pend8021x+0xbc/0xcc [brcmfmac]()
[186586.580439] Modules linked in: pppoe ppp_async iptable_nat brcmfmac pppox ppp_generic nf_nat_ipv4 nf_conntrack_ipv6 nf_conntrack_ipv4 ipt_REJECT ipt_MASQUERADE cfg80211 xt_time xt_tcpudp xt_state xt_nat xt_multiport xt_mark xt_mac xt_limit xt_id xt_conntrack xt_comment xt_TCPMSS xt_REDIRECT xt_LOG xt_CT slhc nf_reject_ipv4 nf_nat_redirect nf_nat_masquerade_ipv4 nf_nat nf_log_ipv4 nf_defrag_ipv6 nf_defrag_ipv4 nf_conntrack_rtcache nf_conntrack iptable_raw iptable_mangle iptable_filter ip_tables crc_ccitt compat brcmutil ip6t_REJECT nf_reject_ipv6 nf_log_ipv6 nf_log_common ip6table_raw ip6table_mangle ip6table_filter ip6_tables x_tables leds_gpio xhci_plat_hcd xhci_pci xhci_hcd ohci_platform ohci_hcd ehci_platform ehci_hcd gpio_button_hotplug usbcore nls_base usb_common bcma_hcd
[186586.650103] CPU: 1 PID: 28285 Comm: hostapd Tainted: G        W       4.4.15 #0
[186586.657512] Hardware name: BCM5301X
[186586.661089] Backtrace: 
[186586.663653] [<c0017164>] (dump_backtrace) from [<c0017360>] (show_stack+0x18/0x1c)
[186586.671325]  r7:00000494 r6:bf1c2120 r5:60000013 r4:00000000
[186586.677132] [<c0017348>] (show_stack) from [<c017d9a8>] (dump_stack+0x84/0xa4)
[186586.684467] [<c017d924>] (dump_stack) from [<c0021568>] (warn_slowpath_common+0x8c/0xb8)
[186586.692658]  r5:00000009 r4:00000000
[186586.696345] [<c00214dc>] (warn_slowpath_common) from [<c0021638>] (warn_slowpath_null+0x24/0x2c)
[186586.705235]  r8:c7309ca0 r7:c7266d34 r6:c7266c80 r5:c7309b4c r4:00000001
[186586.712103] [<c0021614>] (warn_slowpath_null) from [<bf1b4e74>] (brcmf_netdev_wait_pend8021x+0xbc/0xcc [brcmfmac])
[186586.722581] [<bf1b4db8>] (brcmf_netdev_wait_pend8021x [brcmfmac]) from [<bf1a4a10>] (brcmf_cfg80211_leave_ibss+0xe0/0x2e0 [brcmfmac])
[186586.734690]  r7:c7266c80 r6:c7163320 r5:c7266c80 r4:c04a63c8
[186586.740500] [<bf1a4970>] (brcmf_cfg80211_leave_ibss [brcmfmac]) from [<bf1a4f00>] (brcmf_cfg80211_add_key+0x268/0x334 [brcmfmac])
[186586.752262]  r6:00000000 r5:00000004 r4:c71630a4
[186586.757045] [<bf1a4c98>] (brcmf_cfg80211_add_key [brcmfmac]) from [<bf159b48>] (nl80211_new_key+0xfc/0x128 [cfg80211])
[186586.767852]  r10:00000014 r9:c722b400 r8:c7309ca0 r7:c724e000 r6:c7266800 r5:00000000
[186586.775825]  r4:bf1a4c98
[186586.778489] [<bf159a4c>] (nl80211_new_key [cfg80211]) from [<c0287e3c>] (genl_rcv_msg+0x260/0x2e4)
[186586.787549]  r8:c6705600 r7:c61fb414 r6:bf169598 r5:bf17191c r4:00000000
[186586.794398] [<c0287bdc>] (genl_rcv_msg) from [<c028715c>] (netlink_rcv_skb+0x60/0xbc)
[186586.802328]  r10:c6705600 r9:00000000 r8:c7309d84 r7:c7b95800 r6:c0287bdc r5:c6705600
[186586.810300]  r4:c61fb400
[186586.812937] [<c02870fc>] (netlink_rcv_skb) from [<c0287bc8>] (genl_rcv+0x28/0x3c)
[186586.820519]  r7:c7b95800 r6:c6705600 r5:c6705600 r4:c04bab78
[186586.826315] [<c0287ba0>] (genl_rcv) from [<c0286b44>] (netlink_unicast+0x138/0x1f4)
[186586.834072]  r5:00000048 r4:c79d0000
[186586.837761] [<c0286a0c>] (netlink_unicast) from [<c0286fc4>] (netlink_sendmsg+0x300/0x320)
[186586.846126]  r9:00000008 r8:00000000 r7:00000048 r6:c7309f4c r5:c7b95800 r4:00000000
[186586.854032] [<c0286cc4>] (netlink_sendmsg) from [<c0245390>] (sock_sendmsg+0x1c/0x2c)
[186586.861967]  r10:00000000 r9:00000000 r8:00000000 r7:c7597380 r6:c7309e64 r5:00000000
[186586.869940]  r4:c7309f4c
[186586.872577] [<c0245374>] (sock_sendmsg) from [<c0245944>] (___sys_sendmsg+0x198/0x228)
[186586.880602] [<c02457ac>] (___sys_sendmsg) from [<c0246798>] (__sys_sendmsg+0x44/0x68)
[186586.888532]  r10:00000000 r9:c7308000 r8:c00098c4 r7:00000128 r6:00000000 r5:be8f8f90
[186586.896506]  r4:c7597380
[186586.899139] [<c0246754>] (__sys_sendmsg) from [<c02467cc>] (SyS_sendmsg+0x10/0x14)
[186586.906811]  r6:b6f5a1c8 r5:00000000 r4:00000000
[186586.911553] [<c02467bc>] (SyS_sendmsg) from [<c0009700>] (ret_fast_syscall+0x0/0x3c)
[186586.919455] ---[ end trace 19a0552144067f4e ]---

(Last edited by adityaxavier on 19 Aug 2016, 07:49)

adityaxavier wrote:

Try the latest LEDE snapshot, i don't have that problem anymore..

@meuleman :-
This problem is still happening. Am using LEDE version - August -15 2016. I thought this was fixed with increasing the timeout.

Well fixed may not be the correct word. The timeout was very low, too low, especially in certain environments. It was increased to 950 (it was 50), check the file core.c (define MAX_WAIT_FOR_8021X_TX, should be line 41 or somewhere around there). What it means is that a connection setup is being performed or a rekey. And in your case it is more likely a rekey, as it appears to happen after 12 hours and 50 minutes and while the EAP frame has to be submitted to client the driver is waiting before it can plumb the key. This waiting uses a timeout (950ms) and in this case the timeout expired. It will most likely result in a situation where client and AP wont have the same keys anymore and eventually the client will disconnect en reconnect. Why the EAP frame did not leave the device within 1 second I do not know. There could be a bug in the driver where we free a frame (due to error of some sort) which was a 1x frame but we have looked for this in the code and thusfar have not been able to identify an issue. 
Can you tell some more about the configuration? Is it PSK or 1x? What type of client is causing this? How many clients do you have (did they get connected at the same time). Is it a busy AP?

Am not sure what 1x is but am using WPA2 PSK.

Am not sure about what type of client is causing this.. But it seems it's my MacBook Pro or my IBM thinkpad, cause I don't see this with 2 iPhones connected.

It's not a busy AP, it's a home router and I have 2 iPhones and 2 said laptops.
I also have an Apple time capsule but it's connected over lan, and two other servers connected over lan.

PS:- Didn't happen today till now. Though am not sure 12:50 mins is over. Have my MacBook Pro Connected right now.

(Last edited by adityaxavier on 19 Aug 2016, 17:36)

Can someone confirm what version is the latest known working build for the R8000? I tried two last night (I had to borrow a friends TTL cable to unbrick after trying one a couple days ago, and I no longer have the cable, but ordered one).

I tried one of Arokh's builds and that didn't work either.

As i said, am personally using LEDE - 15th August build.

You can try the latest LEDE Build, it should work just fine. But i would hold off till you get the USB-TTL cable.

However if you can't wait, stick with OpenWRT 15.05.1.

Another weird thing


[363536.482823] brcmfmac: brcmf_msgbuf_query_dcmd: Timeout on response for query command
[363538.482828] brcmfmac: brcmf_msgbuf_query_dcmd: Timeout on response for query command
[363538.490684] brcmfmac: brcmf_cfg80211_get_station: GET STA INFO failed, -5

This just came in and WiFi stopped working..

adityaxavier wrote:

Another weird thing


[363536.482823] brcmfmac: brcmf_msgbuf_query_dcmd: Timeout on response for query command
[363538.482828] brcmfmac: brcmf_msgbuf_query_dcmd: Timeout on response for query command
[363538.490684] brcmfmac: brcmf_cfg80211_get_station: GET STA INFO failed, -5

This just came in and WiFi stopped working..

Ouch, that is not good. It most likely means that firmware crashed. Could you do the following: After the AP boots, on the console execute the following command:

echo 0x100000 > /sys/module/brcmfmac/parameters/debug

This will hopefully give more info on the crash (if it is a crash, it could also be a problem with pcie communication) once it happens.

At this point I don't have any ideas about the eapol message timeout. Again; it is a warning, so the device should keep running.
FYI: 1x is authentication where you use a server to authenticate the device (and create keys from that). Authentication methods like LEAP, PEAP, etc is what I mean with 1x authentication. WPA-PSK is very common and should in general not be a problem. My concern was that you used perhaps some authentication method which

meuleman wrote:
adityaxavier wrote:

Another weird thing


[363536.482823] brcmfmac: brcmf_msgbuf_query_dcmd: Timeout on response for query command
[363538.482828] brcmfmac: brcmf_msgbuf_query_dcmd: Timeout on response for query command
[363538.490684] brcmfmac: brcmf_cfg80211_get_station: GET STA INFO failed, -5

This just came in and WiFi stopped working..

Ouch, that is not good. It most likely means that firmware crashed. Could you do the following: After the AP boots, on the console execute the following command:

echo 0x100000 > /sys/module/brcmfmac/parameters/debug

This will hopefully give more info on the crash (if it is a crash, it could also be a problem with pcie communication) once it happens.

At this point I don't have any ideas about the eapol message timeout. Again; it is a warning, so the device should keep running.
FYI: 1x is authentication where you use a server to authenticate the device (and create keys from that). Authentication methods like LEAP, PEAP, etc is what I mean with 1x authentication. WPA-PSK is very common and should in general not be a problem. My concern was that you used perhaps some authentication method which

Yeah, i figured it was something to do with Radius and such.

Anyway would execute the command that you have provided, and let you know in case i have another such crash.

Today I brought a r8000,I just found out I can;t use Radius...So sad.

Okay,I have done some tests,only windows can connect to it.But Android,ios,linux are failed.

I just got the logs.

Sun Aug 28 16:54:07 2016 daemon.info hostapd: wlan2: STA 94:fe:22:63:49:10 IEEE 802.11: associated
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: STA 94:fe:22:63:49:10 WPA: event 1 notification
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: STA 94:fe:22:63:49:10 IEEE 802.1X: start authentication
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: STA 94:fe:22:63:49:10 WPA: start authentication
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: STA 94:fe:22:63:49:10 IEEE 802.1X: unauthorizing port
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: STA 94:fe:22:63:49:10 IEEE 802.1X: Sending EAP Packet (identifier 4)
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: STA 94:fe:22:63:49:10 IEEE 802.1X: received EAP packet (code=2 id=4 len=10) from STA: EAP Response-Identity (1)
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: STA 94:fe:22:63:49:10 IEEE 802.1X: STA identity 'Halry'
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: RADIUS Sending RADIUS message to authentication server
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: RADIUS Next RADIUS client retransmit in 3 seconds
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: RADIUS Received 86 bytes from RADIUS server
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: RADIUS Received RADIUS message
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: STA 94:fe:22:63:49:10 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: STA 94:fe:22:63:49:10 IEEE 802.1X: decapsulated EAP packet (code=1 id=5 len=28) from RADIUS server: EAP-Request-unknown (52)
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: STA 94:fe:22:63:49:10 IEEE 802.1X: Sending EAP Packet (identifier 5)
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: STA 94:fe:22:63:49:10 IEEE 802.1X: received EAP packet (code=2 id=5 len=6) from STA: EAP Response-unknown (3)
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: RADIUS Sending RADIUS message to authentication server
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: RADIUS Next RADIUS client retransmit in 3 seconds
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: RADIUS Received 64 bytes from RADIUS server
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: RADIUS Received RADIUS message
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: STA 94:fe:22:63:49:10 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: STA 94:fe:22:63:49:10 IEEE 802.1X: decapsulated EAP packet (code=1 id=6 len=6) from RADIUS server: EAP-Request-PEAP (25)
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: STA 94:fe:22:63:49:10 IEEE 802.1X: Sending EAP Packet (identifier 6)
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: STA 94:fe:22:63:49:10 IEEE 802.1X: received EAP packet (code=2 id=6 len=168) from STA: EAP Response-PEAP (25)
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: RADIUS Sending RADIUS message to authentication server
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: RADIUS Next RADIUS client retransmit in 3 seconds
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: RADIUS Received 1068 bytes from RADIUS server
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: RADIUS Received RADIUS message
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: STA 94:fe:22:63:49:10 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: STA 94:fe:22:63:49:10 IEEE 802.1X: decapsulated EAP packet (code=1 id=7 len=1004) from RADIUS server: EAP-Request-PEAP (25)
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: STA 94:fe:22:63:49:10 IEEE 802.1X: Sending EAP Packet (identifier 7)
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: STA 94:fe:22:63:49:10 IEEE 802.1X: received EAP packet (code=2 id=7 len=6) from STA: EAP Response-PEAP (25)
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: RADIUS Sending RADIUS message to authentication server
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: RADIUS Next RADIUS client retransmit in 3 seconds
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: RADIUS Received 1064 bytes from RADIUS server
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: RADIUS Received RADIUS message
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: STA 94:fe:22:63:49:10 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: STA 94:fe:22:63:49:10 IEEE 802.1X: decapsulated EAP packet (code=1 id=8 len=1000) from RADIUS server: EAP-Request-PEAP (25)
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: STA 94:fe:22:63:49:10 IEEE 802.1X: Sending EAP Packet (identifier 8)
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: STA 94:fe:22:63:49:10 IEEE 802.1X: received EAP packet (code=2 id=8 len=6) from STA: EAP Response-PEAP (25)
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: RADIUS Sending RADIUS message to authentication server
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: RADIUS Next RADIUS client retransmit in 3 seconds
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: RADIUS Received 759 bytes from RADIUS server
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: RADIUS Received RADIUS message
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: STA 94:fe:22:63:49:10 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: STA 94:fe:22:63:49:10 IEEE 802.1X: decapsulated EAP packet (code=1 id=9 len=697) from RADIUS server: EAP-Request-PEAP (25)
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: STA 94:fe:22:63:49:10 IEEE 802.1X: Sending EAP Packet (identifier 9)
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: STA 94:fe:22:63:49:10 IEEE 802.1X: received EAP packet (code=2 id=9 len=136) from STA: EAP Response-PEAP (25)
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: RADIUS Sending RADIUS message to authentication server
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: RADIUS Next RADIUS client retransmit in 3 seconds
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: RADIUS Received 115 bytes from RADIUS server
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: RADIUS Received RADIUS message
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: STA 94:fe:22:63:49:10 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: STA 94:fe:22:63:49:10 IEEE 802.1X: decapsulated EAP packet (code=1 id=10 len=57) from RADIUS server: EAP-Request-PEAP (25)
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: STA 94:fe:22:63:49:10 IEEE 802.1X: Sending EAP Packet (identifier 10)
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: STA 94:fe:22:63:49:10 IEEE 802.1X: received EAP packet (code=2 id=10 len=6) from STA: EAP Response-PEAP (25)
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: RADIUS Sending RADIUS message to authentication server
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: RADIUS Next RADIUS client retransmit in 3 seconds
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: RADIUS Received 98 bytes from RADIUS server
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: RADIUS Received RADIUS message
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: STA 94:fe:22:63:49:10 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: STA 94:fe:22:63:49:10 IEEE 802.1X: decapsulated EAP packet (code=1 id=11 len=40) from RADIUS server: EAP-Request-PEAP (25)
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: STA 94:fe:22:63:49:10 IEEE 802.1X: Sending EAP Packet (identifier 11)
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: STA 94:fe:22:63:49:10 IEEE 802.1X: received EAP packet (code=2 id=11 len=41) from STA: EAP Response-PEAP (25)
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: RADIUS Sending RADIUS message to authentication server
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: RADIUS Next RADIUS client retransmit in 3 seconds
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: RADIUS Received 132 bytes from RADIUS server
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: RADIUS Received RADIUS message
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: STA 94:fe:22:63:49:10 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: STA 94:fe:22:63:49:10 IEEE 802.1X: decapsulated EAP packet (code=1 id=12 len=74) from RADIUS server: EAP-Request-PEAP (25)
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: STA 94:fe:22:63:49:10 IEEE 802.1X: Sending EAP Packet (identifier 12)
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: STA 94:fe:22:63:49:10 IEEE 802.1X: received EAP packet (code=2 id=12 len=95) from STA: EAP Response-PEAP (25)
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: RADIUS Sending RADIUS message to authentication server
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: RADIUS Next RADIUS client retransmit in 3 seconds
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: RADIUS Received 140 bytes from RADIUS server
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: RADIUS Received RADIUS message
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: STA 94:fe:22:63:49:10 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: STA 94:fe:22:63:49:10 IEEE 802.1X: decapsulated EAP packet (code=1 id=13 len=82) from RADIUS server: EAP-Request-PEAP (25)
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: STA 94:fe:22:63:49:10 IEEE 802.1X: Sending EAP Packet (identifier 13)
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: STA 94:fe:22:63:49:10 IEEE 802.1X: received EAP packet (code=2 id=13 len=37) from STA: EAP Response-PEAP (25)
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: RADIUS Sending RADIUS message to authentication server
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: RADIUS Next RADIUS client retransmit in 3 seconds
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: RADIUS Received 104 bytes from RADIUS server
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: RADIUS Received RADIUS message
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: STA 94:fe:22:63:49:10 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.01 sec
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: STA 94:fe:22:63:49:10 IEEE 802.1X: decapsulated EAP packet (code=1 id=14 len=46) from RADIUS server: EAP-Request-PEAP (25)
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: STA 94:fe:22:63:49:10 IEEE 802.1X: Sending EAP Packet (identifier 14)
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: STA 94:fe:22:63:49:10 IEEE 802.1X: received EAP packet (code=2 id=14 len=46) from STA: EAP Response-PEAP (25)
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: RADIUS Sending RADIUS message to authentication server
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: RADIUS Next RADIUS client retransmit in 3 seconds
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: RADIUS Received 167 bytes from RADIUS server
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: RADIUS Received RADIUS message
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: STA 94:fe:22:63:49:10 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: STA 94:fe:22:63:49:10 IEEE 802.1X: old identity 'Halry' updated with User-Name from Access-Accept 'Halry'
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: STA 94:fe:22:63:49:10 IEEE 802.1X: decapsulated EAP packet (code=3 id=14 len=4) from RADIUS server: EAP Success
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: STA 94:fe:22:63:49:10 IEEE 802.1X: Sending EAP Packet (identifier 14)
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: STA 94:fe:22:63:49:10 WPA: sending 1/4 msg of 4-Way Handshake
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: STA 94:fe:22:63:49:10 WPA: received EAPOL-Key frame (2/4 Pairwise)
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: STA 94:fe:22:63:49:10 WPA: sending 3/4 msg of 4-Way Handshake
Sun Aug 28 16:54:07 2016 daemon.info hostapd: wlan2: STA 94:fe:22:63:49:10 IEEE 802.11: disassociated
Sun Aug 28 16:54:07 2016 daemon.debug hostapd: wlan2: STA 94:fe:22:63:49:10 WPA: event 2 notification

Flash the router to 15.05,everything works.Maybe there are some changes bricked the 802.1x?

Edit:Even on 15.05,things still won't work.

(Last edited by Halry on 29 Aug 2016, 12:58)

@Halry :-

Please provide the relevant wifi config. Also is the Radius server in OpenWRT ? or external ?

Got the message again. This time i did the
echo 0x100000 > /sys/module/brcmfmac/parameters/debug

But am not sure if its any different than earlier.


[189021.327917] ------------[ cut here ]------------
[189021.332683] WARNING: CPU: 0 PID: 1313 at compat-wireless-2016-06-20/drivers/net/wireless/broadcom/brcm80211/brcmfmac/core.c:1172 brcmf_netdev_wait_pend8021x+0xbc/0xcc [brcmfmac]()
[189021.348825] Modules linked in: pppoe ppp_async iptable_nat brcmfmac pppox ppp_generic nf_nat_ipv4 nf_conntrack_ipv6 nf_conntrack_ipv4 ipt_REJECT ipt_MASQUERADE cfg80211 xt_time xt_tcpudp xt_state xt_nat xt_multiport xt_mark xt_mac xt_limit xt_id xt_conntrack xt_comment xt_TCPMSS xt_REDIRECT xt_LOG xt_CT slhc nf_reject_ipv4 nf_nat_redirect nf_nat_masquerade_ipv4 nf_nat nf_log_ipv4 nf_defrag_ipv6 nf_defrag_ipv4 nf_conntrack_rtcache nf_conntrack iptable_raw iptable_mangle iptable_filter ip_tables crc_ccitt compat brcmutil ip6t_REJECT nf_reject_ipv6 nf_log_ipv6 nf_log_common ip6table_raw ip6table_mangle ip6table_filter ip6_tables x_tables leds_gpio xhci_plat_hcd xhci_pci xhci_hcd ohci_platform ohci_hcd ehci_platform ehci_hcd gpio_button_hotplug usbcore nls_base usb_common bcma_hcd
[189021.418622] CPU: 0 PID: 1313 Comm: hostapd Not tainted 4.4.19 #0
[189021.424732] Hardware name: BCM5301X
[189021.428309] Backtrace: 
[189021.430874] [<c0017164>] (dump_backtrace) from [<c0017360>] (show_stack+0x18/0x1c)
[189021.438546]  r7:00000494 r6:bf1c2120 r5:60000013 r4:00000000
[189021.444352] [<c0017348>] (show_stack) from [<c017db70>] (dump_stack+0x84/0xa4)
[189021.451687] [<c017daec>] (dump_stack) from [<c0021568>] (warn_slowpath_common+0x8c/0xb8)
[189021.459878]  r5:00000009 r4:00000000
[189021.463565] [<c00214dc>] (warn_slowpath_common) from [<c0021638>] (warn_slowpath_null+0x24/0x2c)
[189021.472455]  r8:c6581ca0 r7:c71aad34 r6:c71aac80 r5:c6581b4c r4:00000001
[189021.479327] [<c0021614>] (warn_slowpath_null) from [<bf1b4e74>] (brcmf_netdev_wait_pend8021x+0xbc/0xcc [brcmfmac])
[189021.489810] [<bf1b4db8>] (brcmf_netdev_wait_pend8021x [brcmfmac]) from [<bf1a4a10>] (brcmf_cfg80211_leave_ibss+0xe0/0x2e0 [brcmfmac])
[189021.501919]  r7:c71aac80 r6:c7a163c4 r5:c71aac80 r4:c04a83c8
[189021.507728] [<bf1a4970>] (brcmf_cfg80211_leave_ibss [brcmfmac]) from [<bf1a4f00>] (brcmf_cfg80211_add_key+0x268/0x334 [brcmfmac])
[189021.519492]  r6:00000000 r5:00000004 r4:c7a16148
[189021.524274] [<bf1a4c98>] (brcmf_cfg80211_add_key [brcmfmac]) from [<bf159b48>] (nl80211_new_key+0xfc/0x128 [cfg80211])
[189021.535081]  r10:00000014 r9:c7207c00 r8:c6581ca0 r7:c724e000 r6:c71aa800 r5:00000000
[189021.543053]  r4:bf1a4c98
[189021.545706] [<bf159a4c>] (nl80211_new_key [cfg80211]) from [<c0288734>] (genl_rcv_msg+0x260/0x2e4)
[189021.554770]  r8:c671c3c0 r7:c66de414 r6:bf169598 r5:bf17191c r4:00000000
[189021.561627] [<c02884d4>] (genl_rcv_msg) from [<c0287a54>] (netlink_rcv_skb+0x60/0xbc)
[189021.569557]  r10:c671c3c0 r9:00000000 r8:c6581d84 r7:c72c4000 r6:c02884d4 r5:c671c3c0
[189021.577530]  r4:c66de400
[189021.580166] [<c02879f4>] (netlink_rcv_skb) from [<c02884c0>] (genl_rcv+0x28/0x3c)
[189021.587748]  r7:c72c4000 r6:c671c3c0 r5:c671c3c0 r4:c04bcb78
[189021.593544] [<c0288498>] (genl_rcv) from [<c028743c>] (netlink_unicast+0x138/0x1f4)
[189021.601301]  r5:00000048 r4:c79da000
[189021.604990] [<c0287304>] (netlink_unicast) from [<c02878bc>] (netlink_sendmsg+0x300/0x320)
[189021.613356]  r9:00000008 r8:00000000 r7:00000048 r6:c6581f4c r5:c72c4000 r4:00000000
[189021.621261] [<c02875bc>] (netlink_sendmsg) from [<c02459e0>] (sock_sendmsg+0x1c/0x2c)
[189021.629197]  r10:00000000 r9:00000000 r8:00000000 r7:c7560900 r6:c6581e64 r5:00000000
[189021.637170]  r4:c6581f4c
[189021.639806] [<c02459c4>] (sock_sendmsg) from [<c0245f94>] (___sys_sendmsg+0x198/0x228)
[189021.647831] [<c0245dfc>] (___sys_sendmsg) from [<c0246de8>] (__sys_sendmsg+0x44/0x68)
[189021.655762]  r10:00000000 r9:c6580000 r8:c00098c4 r7:00000128 r6:00000000 r5:be9c4f90
[189021.663734]  r4:c7560900
[189021.666369] [<c0246da4>] (__sys_sendmsg) from [<c0246e1c>] (SyS_sendmsg+0x10/0x14)
[189021.674040]  r6:b6f3d1c8 r5:00000000 r4:00000000
[189021.678782] [<c0246e0c>] (SyS_sendmsg) from [<c0009700>] (ret_fast_syscall+0x0/0x3c)
[189021.686683] ---[ end trace 15c968006a1f239c ]---
[189022.637915] ------------[ cut here ]------------
[189022.642679] WARNING: CPU: 0 PID: 1313 at compat-wireless-2016-06-20/drivers/net/wireless/broadcom/brcm80211/brcmfmac/core.c:1172 brcmf_netdev_wait_pend8021x+0xbc/0xcc [brcmfmac]()
[189022.658820] Modules linked in: pppoe ppp_async iptable_nat brcmfmac pppox ppp_generic nf_nat_ipv4 nf_conntrack_ipv6 nf_conntrack_ipv4 ipt_REJECT ipt_MASQUERADE cfg80211 xt_time xt_tcpudp xt_state xt_nat xt_multiport xt_mark xt_mac xt_limit xt_id xt_conntrack xt_comment xt_TCPMSS xt_REDIRECT xt_LOG xt_CT slhc nf_reject_ipv4 nf_nat_redirect nf_nat_masquerade_ipv4 nf_nat nf_log_ipv4 nf_defrag_ipv6 nf_defrag_ipv4 nf_conntrack_rtcache nf_conntrack iptable_raw iptable_mangle iptable_filter ip_tables crc_ccitt compat brcmutil ip6t_REJECT nf_reject_ipv6 nf_log_ipv6 nf_log_common ip6table_raw ip6table_mangle ip6table_filter ip6_tables x_tables leds_gpio xhci_plat_hcd xhci_pci xhci_hcd ohci_platform ohci_hcd ehci_platform ehci_hcd gpio_button_hotplug usbcore nls_base usb_common bcma_hcd
[189022.728521] CPU: 0 PID: 1313 Comm: hostapd Tainted: G        W       4.4.19 #0
[189022.735842] Hardware name: BCM5301X
[189022.739419] Backtrace: 
[189022.741982] [<c0017164>] (dump_backtrace) from [<c0017360>] (show_stack+0x18/0x1c)
[189022.749655]  r7:00000494 r6:bf1c2120 r5:60000013 r4:00000000
[189022.755462] [<c0017348>] (show_stack) from [<c017db70>] (dump_stack+0x84/0xa4)
[189022.762797] [<c017daec>] (dump_stack) from [<c0021568>] (warn_slowpath_common+0x8c/0xb8)
[189022.770988]  r5:00000009 r4:00000000
[189022.774676] [<c00214dc>] (warn_slowpath_common) from [<c0021638>] (warn_slowpath_null+0x24/0x2c)
[189022.783566]  r8:c671c000 r7:c71aad34 r6:c71aac80 r5:c6581b84 r4:00000001
[189022.790435] [<c0021614>] (warn_slowpath_null) from [<bf1b4e74>] (brcmf_netdev_wait_pend8021x+0xbc/0xcc [brcmfmac])
[189022.800920] [<bf1b4db8>] (brcmf_netdev_wait_pend8021x [brcmfmac]) from [<bf1a4a10>] (brcmf_cfg80211_leave_ibss+0xe0/0x2e0 [brcmfmac])
[189022.813028]  r7:c71aac80 r6:c7a1627c r5:c71aac80 r4:c04a83c8
[189022.818838] [<bf1a4970>] (brcmf_cfg80211_leave_ibss [brcmfmac]) from [<bf1a4c84>] (brcmf_cfg80211_del_key+0x74/0x88 [brcmfmac])
[189022.830427]  r6:00000000 r5:c7a16254 r4:c7a16000
[189022.835210] [<bf1a4c10>] (brcmf_cfg80211_del_key [brcmfmac]) from [<bf1598b8>] (nl80211_del_key+0xf4/0x148 [cfg80211])
[189022.846016]  r7:c724e000 r6:c71aa800 r5:c66b7820 r4:bf1a4c10
[189022.851828] [<bf1597c4>] (nl80211_del_key [cfg80211]) from [<c0288734>] (genl_rcv_msg+0x260/0x2e4)
[189022.860892]  r7:c66b7814 r6:bf1695ac r5:bf17191c r4:00000000
[189022.866697] [<c02884d4>] (genl_rcv_msg) from [<c0287a54>] (netlink_rcv_skb+0x60/0xbc)
[189022.874626]  r10:c671c000 r9:00000000 r8:c6581d84 r7:c72c4000 r6:c02884d4 r5:c671c000
[189022.882599]  r4:c66b7800
[189022.885235] [<c02879f4>] (netlink_rcv_skb) from [<c02884c0>] (genl_rcv+0x28/0x3c)
[189022.892817]  r7:c72c4000 r6:c671c000 r5:c671c000 r4:c04bcb78
[189022.898613] [<c0288498>] (genl_rcv) from [<c028743c>] (netlink_unicast+0x138/0x1f4)
[189022.906370]  r5:00000030 r4:c79da000
[189022.910060] [<c0287304>] (netlink_unicast) from [<c02878bc>] (netlink_sendmsg+0x300/0x320)
[189022.918424]  r9:00000008 r8:00000000 r7:00000030 r6:c6581f4c r5:c72c4000 r4:00000000
[189022.926331] [<c02875bc>] (netlink_sendmsg) from [<c02459e0>] (sock_sendmsg+0x1c/0x2c)
[189022.934266]  r10:00000000 r9:00000000 r8:00000000 r7:c7560900 r6:c6581e64 r5:00000000
[189022.942239]  r4:c6581f4c
[189022.944876] [<c02459c4>] (sock_sendmsg) from [<c0245f94>] (___sys_sendmsg+0x198/0x228)
[189022.952900] [<c0245dfc>] (___sys_sendmsg) from [<c0246de8>] (__sys_sendmsg+0x44/0x68)
[189022.960831]  r10:00000000 r9:c6580000 r8:c00098c4 r7:00000128 r6:00000000 r5:be9c4f60
[189022.968803]  r4:c7560900
[189022.971438] [<c0246da4>] (__sys_sendmsg) from [<c0246e1c>] (SyS_sendmsg+0x10/0x14)
[189022.979109]  r6:b6f3d1c8 r5:00000000 r4:00000000
[189022.983852] [<c0246e0c>] (SyS_sendmsg) from [<c0009700>] (ret_fast_syscall+0x0/0x3c)
[189022.991734] ---[ end trace 15c968006a1f239d ]---
[224421.304996] ------------[ cut here ]------------
[224421.309755] WARNING: CPU: 0 PID: 1313 at compat-wireless-2016-06-20/drivers/net/wireless/broadcom/brcm80211/brcmfmac/core.c:1172 brcmf_netdev_wait_pend8021x+0xbc/0xcc [brcmfmac]()
[224421.325896] Modules linked in: pppoe ppp_async iptable_nat brcmfmac pppox ppp_generic nf_nat_ipv4 nf_conntrack_ipv6 nf_conntrack_ipv4 ipt_REJECT ipt_MASQUERADE cfg80211 xt_time xt_tcpudp xt_state xt_nat xt_multiport xt_mark xt_mac xt_limit xt_id xt_conntrack xt_comment xt_TCPMSS xt_REDIRECT xt_LOG xt_CT slhc nf_reject_ipv4 nf_nat_redirect nf_nat_masquerade_ipv4 nf_nat nf_log_ipv4 nf_defrag_ipv6 nf_defrag_ipv4 nf_conntrack_rtcache nf_conntrack iptable_raw iptable_mangle iptable_filter ip_tables crc_ccitt compat brcmutil ip6t_REJECT nf_reject_ipv6 nf_log_ipv6 nf_log_common ip6table_raw ip6table_mangle ip6table_filter ip6_tables x_tables leds_gpio xhci_plat_hcd xhci_pci xhci_hcd ohci_platform ohci_hcd ehci_platform ehci_hcd gpio_button_hotplug usbcore nls_base usb_common bcma_hcd
[224421.395587] CPU: 0 PID: 1313 Comm: hostapd Tainted: G        W       4.4.19 #0
[224421.402909] Hardware name: BCM5301X
[224421.406486] Backtrace: 
[224421.409050] [<c0017164>] (dump_backtrace) from [<c0017360>] (show_stack+0x18/0x1c)
[224421.416723]  r7:00000494 r6:bf1c2120 r5:60000013 r4:00000000
[224421.422530] [<c0017348>] (show_stack) from [<c017db70>] (dump_stack+0x84/0xa4)
[224421.429864] [<c017daec>] (dump_stack) from [<c0021568>] (warn_slowpath_common+0x8c/0xb8)
[224421.438055]  r5:00000009 r4:00000000
[224421.441742] [<c00214dc>] (warn_slowpath_common) from [<c0021638>] (warn_slowpath_null+0x24/0x2c)
[224421.450632]  r8:c6581ca0 r7:c71aad34 r6:c71aac80 r5:c6581b4c r4:00000001
[224421.457501] [<c0021614>] (warn_slowpath_null) from [<bf1b4e74>] (brcmf_netdev_wait_pend8021x+0xbc/0xcc [brcmfmac])
[224421.467988] [<bf1b4db8>] (brcmf_netdev_wait_pend8021x [brcmfmac]) from [<bf1a4a10>] (brcmf_cfg80211_leave_ibss+0xe0/0x2e0 [brcmfmac])
[224421.480095]  r7:c71aac80 r6:c7a16320 r5:c71aac80 r4:c04a83c8
[224421.485905] [<bf1a4970>] (brcmf_cfg80211_leave_ibss [brcmfmac]) from [<bf1a4f00>] (brcmf_cfg80211_add_key+0x268/0x334 [brcmfmac])
[224421.497669]  r6:00000000 r5:00000004 r4:c7a160a4
[224421.502451] [<bf1a4c98>] (brcmf_cfg80211_add_key [brcmfmac]) from [<bf159b48>] (nl80211_new_key+0xfc/0x128 [cfg80211])
[224421.513258]  r10:00000014 r9:c7207c00 r8:c6581ca0 r7:c724e000 r6:c71aa800 r5:00000000
[224421.521231]  r4:bf1a4c98
[224421.523882] [<bf159a4c>] (nl80211_new_key [cfg80211]) from [<c0288734>] (genl_rcv_msg+0x260/0x2e4)
[224421.532947]  r8:c7170a80 r7:c66de614 r6:bf169598 r5:bf17191c r4:00000000
[224421.539804] [<c02884d4>] (genl_rcv_msg) from [<c0287a54>] (netlink_rcv_skb+0x60/0xbc)
[224421.547734]  r10:c7170a80 r9:00000000 r8:c6581d84 r7:c72c4000 r6:c02884d4 r5:c7170a80
[224421.555707]  r4:c66de600
[224421.558343] [<c02879f4>] (netlink_rcv_skb) from [<c02884c0>] (genl_rcv+0x28/0x3c)
[224421.565926]  r7:c72c4000 r6:c7170a80 r5:c7170a80 r4:c04bcb78
[224421.571720] [<c0288498>] (genl_rcv) from [<c028743c>] (netlink_unicast+0x138/0x1f4)
[224421.579478]  r5:00000048 r4:c79da000
[224421.583167] [<c0287304>] (netlink_unicast) from [<c02878bc>] (netlink_sendmsg+0x300/0x320)
[224421.591532]  r9:00000008 r8:00000000 r7:00000048 r6:c6581f4c r5:c72c4000 r4:00000000
[224421.599437] [<c02875bc>] (netlink_sendmsg) from [<c02459e0>] (sock_sendmsg+0x1c/0x2c)
[224421.607366]  r10:00000000 r9:00000000 r8:00000000 r7:c7560900 r6:c6581e64 r5:00000000
[224421.615339]  r4:c6581f4c
[224421.617975] [<c02459c4>] (sock_sendmsg) from [<c0245f94>] (___sys_sendmsg+0x198/0x228)
[224421.626000] [<c0245dfc>] (___sys_sendmsg) from [<c0246de8>] (__sys_sendmsg+0x44/0x68)
[224421.633929]  r10:00000000 r9:c6580000 r8:c00098c4 r7:00000128 r6:00000000 r5:be9c4f90
[224421.641903]  r4:c7560900
[224421.644537] [<c0246da4>] (__sys_sendmsg) from [<c0246e1c>] (SyS_sendmsg+0x10/0x14)
[224421.652208]  r6:b6f3d1c8 r5:00000000 r4:00000000
[224421.656950] [<c0246e0c>] (SyS_sendmsg) from [<c0009700>] (ret_fast_syscall+0x0/0x3c)
[224421.664850] ---[ end trace 15c968006a1f239e ]---
[224422.614996] ------------[ cut here ]------------
[224422.619758] WARNING: CPU: 0 PID: 1313 at compat-wireless-2016-06-20/drivers/net/wireless/broadcom/brcm80211/brcmfmac/core.c:1172 brcmf_netdev_wait_pend8021x+0xbc/0xcc [brcmfmac]()
[224422.635932] Modules linked in: pppoe ppp_async iptable_nat brcmfmac pppox ppp_generic nf_nat_ipv4 nf_conntrack_ipv6 nf_conntrack_ipv4 ipt_REJECT ipt_MASQUERADE cfg80211 xt_time xt_tcpudp xt_state xt_nat xt_multiport xt_mark xt_mac xt_limit xt_id xt_conntrack xt_comment xt_TCPMSS xt_REDIRECT xt_LOG xt_CT slhc nf_reject_ipv4 nf_nat_redirect nf_nat_masquerade_ipv4 nf_nat nf_log_ipv4 nf_defrag_ipv6 nf_defrag_ipv4 nf_conntrack_rtcache nf_conntrack iptable_raw iptable_mangle iptable_filter ip_tables crc_ccitt compat brcmutil ip6t_REJECT nf_reject_ipv6 nf_log_ipv6 nf_log_common ip6table_raw ip6table_mangle ip6table_filter ip6_tables x_tables leds_gpio xhci_plat_hcd xhci_pci xhci_hcd ohci_platform ohci_hcd ehci_platform ehci_hcd gpio_button_hotplug usbcore nls_base usb_common bcma_hcd
[224422.705626] CPU: 0 PID: 1313 Comm: hostapd Tainted: G        W       4.4.19 #0
[224422.712948] Hardware name: BCM5301X
[224422.716524] Backtrace: 
[224422.719088] [<c0017164>] (dump_backtrace) from [<c0017360>] (show_stack+0x18/0x1c)
[224422.726761]  r7:00000494 r6:bf1c2120 r5:60000013 r4:00000000
[224422.732568] [<c0017348>] (show_stack) from [<c017db70>] (dump_stack+0x84/0xa4)
[224422.739904] [<c017daec>] (dump_stack) from [<c0021568>] (warn_slowpath_common+0x8c/0xb8)
[224422.748094]  r5:00000009 r4:00000000
[224422.751782] [<c00214dc>] (warn_slowpath_common) from [<c0021638>] (warn_slowpath_null+0x24/0x2c)
[224422.760671]  r8:c651cb40 r7:c71aad34 r6:c71aac80 r5:c6581b84 r4:00000001
[224422.767540] [<c0021614>] (warn_slowpath_null) from [<bf1b4e74>] (brcmf_netdev_wait_pend8021x+0xbc/0xcc [brcmfmac])
[224422.778017] [<bf1b4db8>] (brcmf_netdev_wait_pend8021x [brcmfmac]) from [<bf1a4a10>] (brcmf_cfg80211_leave_ibss+0xe0/0x2e0 [brcmfmac])
[224422.790126]  r7:c71aac80 r6:c7a1627c r5:c71aac80 r4:c04a83c8
[224422.795935] [<bf1a4970>] (brcmf_cfg80211_leave_ibss [brcmfmac]) from [<bf1a4c84>] (brcmf_cfg80211_del_key+0x74/0x88 [brcmfmac])
[224422.807525]  r6:00000000 r5:c7a16254 r4:c7a16000
[224422.812308] [<bf1a4c10>] (brcmf_cfg80211_del_key [brcmfmac]) from [<bf1598b8>] (nl80211_del_key+0xf4/0x148 [cfg80211])
[224422.823114]  r7:c724e000 r6:c71aa800 r5:c66b7620 r4:bf1a4c10
[224422.828926] [<bf1597c4>] (nl80211_del_key [cfg80211]) from [<c0288734>] (genl_rcv_msg+0x260/0x2e4)
[224422.837989]  r7:c66b7614 r6:bf1695ac r5:bf17191c r4:00000000
[224422.843794] [<c02884d4>] (genl_rcv_msg) from [<c0287a54>] (netlink_rcv_skb+0x60/0xbc)
[224422.851724]  r10:c651cb40 r9:00000000 r8:c6581d84 r7:c72c4000 r6:c02884d4 r5:c651cb40
[224422.859696]  r4:c66b7600
[224422.862332] [<c02879f4>] (netlink_rcv_skb) from [<c02884c0>] (genl_rcv+0x28/0x3c)
[224422.869915]  r7:c72c4000 r6:c651cb40 r5:c651cb40 r4:c04bcb78
[224422.875710] [<c0288498>] (genl_rcv) from [<c028743c>] (netlink_unicast+0x138/0x1f4)
[224422.883469]  r5:00000030 r4:c79da000
[224422.887157] [<c0287304>] (netlink_unicast) from [<c02878bc>] (netlink_sendmsg+0x300/0x320)
[224422.895523]  r9:00000008 r8:00000000 r7:00000030 r6:c6581f4c r5:c72c4000 r4:00000000
[224422.903428] [<c02875bc>] (netlink_sendmsg) from [<c02459e0>] (sock_sendmsg+0x1c/0x2c)
[224422.911364]  r10:00000000 r9:00000000 r8:00000000 r7:c7560900 r6:c6581e64 r5:00000000
[224422.919336]  r4:c6581f4c
[224422.921974] [<c02459c4>] (sock_sendmsg) from [<c0245f94>] (___sys_sendmsg+0x198/0x228)
[224422.929998] [<c0245dfc>] (___sys_sendmsg) from [<c0246de8>] (__sys_sendmsg+0x44/0x68)
[224422.937929]  r10:00000000 r9:c6580000 r8:c00098c4 r7:00000128 r6:00000000 r5:be9c4f60
[224422.945902]  r4:c7560900
[224422.948535] [<c0246da4>] (__sys_sendmsg) from [<c0246e1c>] (SyS_sendmsg+0x10/0x14)
[224422.956206]  r6:b6f3d1c8 r5:00000000 r4:00000000
[224422.960950] [<c0246e0c>] (SyS_sendmsg) from [<c0009700>] (ret_fast_syscall+0x0/0x3c)
[224422.968904] ---[ end trace 15c968006a1f239f ]---
[267020.855536] ------------[ cut here ]------------
[267020.860301] WARNING: CPU: 1 PID: 1298 at compat-wireless-2016-06-20/drivers/net/wireless/broadcom/brcm80211/brcmfmac/core.c:1172 brcmf_netdev_wait_pend8021x+0xbc/0xcc [brcmfmac]()
[267020.876442] Modules linked in: pppoe ppp_async iptable_nat brcmfmac pppox ppp_generic nf_nat_ipv4 nf_conntrack_ipv6 nf_conntrack_ipv4 ipt_REJECT ipt_MASQUERADE cfg80211 xt_time xt_tcpudp xt_state xt_nat xt_multiport xt_mark xt_mac xt_limit xt_id xt_conntrack xt_comment xt_TCPMSS xt_REDIRECT xt_LOG xt_CT slhc nf_reject_ipv4 nf_nat_redirect nf_nat_masquerade_ipv4 nf_nat nf_log_ipv4 nf_defrag_ipv6 nf_defrag_ipv4 nf_conntrack_rtcache nf_conntrack iptable_raw iptable_mangle iptable_filter ip_tables crc_ccitt compat brcmutil ip6t_REJECT nf_reject_ipv6 nf_log_ipv6 nf_log_common ip6table_raw ip6table_mangle ip6table_filter ip6_tables x_tables leds_gpio xhci_plat_hcd xhci_pci xhci_hcd ohci_platform ohci_hcd ehci_platform ehci_hcd gpio_button_hotplug usbcore nls_base usb_common bcma_hcd
[267020.946125] CPU: 1 PID: 1298 Comm: hostapd Tainted: G        W       4.4.19 #0
[267020.953447] Hardware name: BCM5301X
[267020.957025] Backtrace: 
[267020.959588] [<c0017164>] (dump_backtrace) from [<c0017360>] (show_stack+0x18/0x1c)
[267020.967260]  r7:00000494 r6:bf1c2120 r5:60000013 r4:00000000
[267020.973067] [<c0017348>] (show_stack) from [<c017db70>] (dump_stack+0x84/0xa4)
[267020.980402] [<c017daec>] (dump_stack) from [<c0021568>] (warn_slowpath_common+0x8c/0xb8)
[267020.988592]  r5:00000009 r4:00000000
[267020.992280] [<c00214dc>] (warn_slowpath_common) from [<c0021638>] (warn_slowpath_null+0x24/0x2c)
[267021.001171]  r8:c72a3ca0 r7:c71acd34 r6:c71acc80 r5:c72a3b4c r4:00000001
[267021.008039] [<c0021614>] (warn_slowpath_null) from [<bf1b4e74>] (brcmf_netdev_wait_pend8021x+0xbc/0xcc [brcmfmac])
[267021.018524] [<bf1b4db8>] (brcmf_netdev_wait_pend8021x [brcmfmac]) from [<bf1a4a10>] (brcmf_cfg80211_leave_ibss+0xe0/0x2e0 [brcmfmac])
[267021.030633]  r7:c71acc80 r6:c7a153c4 r5:c71acc80 r4:c04a83c8
[267021.036444] [<bf1a4970>] (brcmf_cfg80211_leave_ibss [brcmfmac]) from [<bf1a4f00>] (brcmf_cfg80211_add_key+0x268/0x334 [brcmfmac])
[267021.048206]  r6:00000000 r5:00000004 r4:c7a15148
[267021.052989] [<bf1a4c98>] (brcmf_cfg80211_add_key [brcmfmac]) from [<bf159b48>] (nl80211_new_key+0xfc/0x128 [cfg80211])
[267021.063796]  r10:00000014 r9:c7207c00 r8:c72a3ca0 r7:c724a000 r6:c71ac800 r5:00000000
[267021.071768]  r4:bf1a4c98
[267021.074420] [<bf159a4c>] (nl80211_new_key [cfg80211]) from [<c0288734>] (genl_rcv_msg+0x260/0x2e4)
[267021.083484]  r8:c65c5480 r7:c66ffe14 r6:bf169598 r5:bf17191c r4:00000000
[267021.090341] [<c02884d4>] (genl_rcv_msg) from [<c0287a54>] (netlink_rcv_skb+0x60/0xbc)
[267021.098272]  r10:c65c5480 r9:00000000 r8:c72a3d84 r7:c656e400 r6:c02884d4 r5:c65c5480
[267021.106245]  r4:c66ffe00
[267021.108880] [<c02879f4>] (netlink_rcv_skb) from [<c02884c0>] (genl_rcv+0x28/0x3c)
[267021.116464]  r7:c656e400 r6:c65c5480 r5:c65c5480 r4:c04bcb78
[267021.122258] [<c0288498>] (genl_rcv) from [<c028743c>] (netlink_unicast+0x138/0x1f4)
[267021.130016]  r5:00000048 r4:c79da000
[267021.133705] [<c0287304>] (netlink_unicast) from [<c02878bc>] (netlink_sendmsg+0x300/0x320)
[267021.142070]  r9:00000008 r8:00000000 r7:00000048 r6:c72a3f4c r5:c656e400 r4:00000000
[267021.149975] [<c02875bc>] (netlink_sendmsg) from [<c02459e0>] (sock_sendmsg+0x1c/0x2c)
[267021.157913]  r10:00000000 r9:00000000 r8:00000000 r7:c7568780 r6:c72a3e64 r5:00000000
[267021.165885]  r4:c72a3f4c
[267021.168521] [<c02459c4>] (sock_sendmsg) from [<c0245f94>] (___sys_sendmsg+0x198/0x228)
[267021.176546] [<c0245dfc>] (___sys_sendmsg) from [<c0246de8>] (__sys_sendmsg+0x44/0x68)
[267021.184477]  r10:00000000 r9:c72a2000 r8:c00098c4 r7:00000128 r6:00000000 r5:be85ddd0
[267021.192450]  r4:c7568780
[267021.195084] [<c0246da4>] (__sys_sendmsg) from [<c0246e1c>] (SyS_sendmsg+0x10/0x14)
[267021.202755]  r6:b6fc61c8 r5:00000000 r4:00000000
[267021.207498] [<c0246e0c>] (SyS_sendmsg) from [<c0009700>] (ret_fast_syscall+0x0/0x3c)
[267021.215377] ---[ end trace 15c968006a1f23a0 ]---
adityaxavier wrote:

@Halry :-

Please provide the relevant wifi config. Also is the Radius server in OpenWRT ? or external ?

The radius server is external.I have an esxi server for that.

But I had flashed back to stock which provide eap authentication and have better signals.

Here is the config file:

.config wifi-device 'radio0'
option type 'mac80211'
option channel '36'
option hwmode '11a'
option path '18000000.axi/bcma0:7/pci0000:00/0000:00:00.0/0000:01:00.0'
option htmode 'VHT80'

config wifi-iface
option device 'radio0'
option network 'lan'
option mode 'ap'
option ssid 'OpenWrt'
option encryption 'none'
option disabled '1'

config wifi-device 'radio1'
option type 'mac80211'
option channel '11'
option hwmode '11g'
option path '18000000.axi/bcma0:8/pci0001:00/0001:00:00.0/0001:01:00.0/0001:02:01.0/0001:03:00.0'
option htmode 'HT20'
option disabled '1'

config wifi-iface
option device 'radio1'
option network 'lan'
option mode 'ap'
option ssid 'OpenWrt'
option encryption 'none'

config wifi-device 'radio2'
option type 'mac80211'
option hwmode '11a'
option path '18000000.axi/bcma0:8/pci0001:00/0001:00:00.0/0001:01:00.0/0001:02:02.0/0001:04:00.0'
option htmode 'VHT80'
option channel '153'
option txpower '20'
option country '00'

config wifi-iface
option device 'radio2'
option network 'lan'
option mode 'ap'
option ssid '5G-L'
option encryption 'wpa2'
option auth_server '192.168.1.3'
option auth_secret 'NAS'
option nasid '1'`

Can someone do a pull request to LEDE and OpenWRT with the following patch ?

From 9789f1fd1fd1d0551132778414faf8e2254408c1 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Rafa=C5=82=20Mi=C5=82ecki?= <zajec5@gmail.com>
Date: Fri, 30 Oct 2015 15:44:01 +0100
Subject: [PATCH] ARM: BCM5301X: Add missing Netgear R8000 LEDs
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

Add a bunch of LEDs missing for the Netgear R8000: wireless, wps, 5Ghz radio
and USB LEDs.

Signed-off-by: Rafał Miłecki <zajec5@gmail.com>
Signed-off-by: Florian Fainelli <f.fainelli@gmail.com>
---
 arch/arm/boot/dts/bcm4709-netgear-r8000.dts | 42 +++++++++++++++++++++++++++++++++++++++++
 1 file changed, 42 insertions(+)

--- a/arch/arm/boot/dts/bcm4709-netgear-r8000.dts
+++ b/arch/arm/boot/dts/bcm4709-netgear-r8000.dts
@@ -50,6 +50,48 @@
             gpios = <&chipcommon 13 GPIO_ACTIVE_LOW>;
             linux,default-trigger = "default-off";
         };
+
+               wan0 {
+                       label = "bcm53xx:white:wan0";
+                       gpios = <&chipcommon 8 GPIO_ACTIVE_LOW>;
+                       linux,default-trigger = "default-on";
+               };
+
+               wan1 {
+                       label = "bcm53xx:amber:wan1";
+                       gpios = <&chipcommon 9 GPIO_ACTIVE_HIGH>;
+                       linux,default-trigger = "default-off";
+               };
+
+        wireless {
+            label = "bcm53xx:white:wireless";
+            gpios = <&chipcommon 14 GPIO_ACTIVE_HIGH>;
+            linux,default-trigger = "default-off";
+        };
+
+        wps {
+            label = "bcm53xx:white:wps";
+            gpios = <&chipcommon 15 GPIO_ACTIVE_HIGH>;
+            linux,default-trigger = "default-off";
+        };
+
+        5ghz-2 {
+            label = "bcm53xx:white:5ghz-2";
+            gpios = <&chipcommon 16 GPIO_ACTIVE_LOW>;
+            linux,default-trigger = "default-off";
+        };
+
+        usb3 {
+            label = "bcm53xx:white:usb3";
+            gpios = <&chipcommon 17 GPIO_ACTIVE_LOW>;
+            linux,default-trigger = "default-off";
+        };
+
+        usb2 {
+            label = "bcm53xx:white:usb2";
+            gpios = <&chipcommon 18 GPIO_ACTIVE_LOW>;
+            linux,default-trigger = "default-off";
+        };
     };
 
     gpio-keys {

This enables the WAN LED on the router.

adityaxavier wrote:

Can someone do a pull request to LEDE and OpenWRT with the following patch ?

From 9789f1fd1fd1d0551132778414faf8e2254408c1 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Rafa=C5=82=20Mi=C5=82ecki?= <zajec5@gmail.com>
Date: Fri, 30 Oct 2015 15:44:01 +0100
Subject: [PATCH] ARM: BCM5301X: Add missing Netgear R8000 LEDs
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

Add a bunch of LEDs missing for the Netgear R8000: wireless, wps, 5Ghz radio
and USB LEDs.

Signed-off-by: Rafał Miłecki <zajec5@gmail.com>
Signed-off-by: Florian Fainelli <f.fainelli@gmail.com>
---
 arch/arm/boot/dts/bcm4709-netgear-r8000.dts | 42 +++++++++++++++++++++++++++++++++++++++++
 1 file changed, 42 insertions(+)

--- a/arch/arm/boot/dts/bcm4709-netgear-r8000.dts
+++ b/arch/arm/boot/dts/bcm4709-netgear-r8000.dts
@@ -50,6 +50,48 @@
             gpios = <&chipcommon 13 GPIO_ACTIVE_LOW>;
             linux,default-trigger = "default-off";
         };
+
+               wan0 {
+                       label = "bcm53xx:white:wan0";
+                       gpios = <&chipcommon 8 GPIO_ACTIVE_LOW>;
+                       linux,default-trigger = "default-on";
+               };
+
+               wan1 {
+                       label = "bcm53xx:amber:wan1";
+                       gpios = <&chipcommon 9 GPIO_ACTIVE_HIGH>;
+                       linux,default-trigger = "default-off";
+               };
+
+        wireless {
+            label = "bcm53xx:white:wireless";
+            gpios = <&chipcommon 14 GPIO_ACTIVE_HIGH>;
+            linux,default-trigger = "default-off";
+        };
+
+        wps {
+            label = "bcm53xx:white:wps";
+            gpios = <&chipcommon 15 GPIO_ACTIVE_HIGH>;
+            linux,default-trigger = "default-off";
+        };
+
+        5ghz-2 {
+            label = "bcm53xx:white:5ghz-2";
+            gpios = <&chipcommon 16 GPIO_ACTIVE_LOW>;
+            linux,default-trigger = "default-off";
+        };
+
+        usb3 {
+            label = "bcm53xx:white:usb3";
+            gpios = <&chipcommon 17 GPIO_ACTIVE_LOW>;
+            linux,default-trigger = "default-off";
+        };
+
+        usb2 {
+            label = "bcm53xx:white:usb2";
+            gpios = <&chipcommon 18 GPIO_ACTIVE_LOW>;
+            linux,default-trigger = "default-off";
+        };
     };
 
     gpio-keys {

This enables the WAN LED on the router.

What the heck? You picked a patch that was accepted upstream and backported long time ago. You modified it without signing off your changes. You want us to include it ignoring there is already an upstream commit for most of these changes.

Do it a nice way: send a patch for upsteam inclusion and we will backport it happily.

meuleman wrote:
adityaxavier wrote:

Another weird thing


[363536.482823] brcmfmac: brcmf_msgbuf_query_dcmd: Timeout on response for query command
[363538.482828] brcmfmac: brcmf_msgbuf_query_dcmd: Timeout on response for query command
[363538.490684] brcmfmac: brcmf_cfg80211_get_station: GET STA INFO failed, -5

This just came in and WiFi stopped working..

Ouch, that is not good. It most likely means that firmware crashed. Could you do the following: After the AP boots, on the console execute the following command:

echo 0x100000 > /sys/module/brcmfmac/parameters/debug

This will hopefully give more info on the crash (if it is a crash, it could also be a problem with pcie communication) once it happens.

This will require enabling CONFIG_PACKAGE_BRCM80211_DEBUG symbol and (re)compiling.

P.S.
You may also prefer to just do:

echo "brcmfmac debug=0x00100000" > /etc/modules.d/brcmfmac

and reboot the device.
CONSOLE logs will appear in "dmesg" output, if you want them over serial console, remember about "dmesg -n 8".

Zajec wrote:
adityaxavier wrote:

Can someone do a pull request to LEDE and OpenWRT with the following patch ?


This enables the WAN LED on the router.

What the heck? You picked a patch that was accepted upstream and backported long time ago. You modified it without signing off your changes. You want us to include it ignoring there is already an upstream commit for most of these changes.

Do it a nice way: send a patch for upsteam inclusion and we will backport it happily.

LOL, sorry am not that familiar with GIT and patches yet.

I have done a pull request to upstream linux with the patch, please check and let me know if its ok smile, please bear in my mind that i had to go through OpenWRT wiki pages to understand how to even implement and find the missing LED gpios.

Am a Android, PHP, Arduino developer. Have only sparingly dwelled in kernel.

P.S. - I did the pull request to trovalds/linux, am not sure if thats the right place.

(Last edited by adityaxavier on 6 Sep 2016, 10:24)

Zajec wrote:
meuleman wrote:
adityaxavier wrote:

Another weird thing


[363536.482823] brcmfmac: brcmf_msgbuf_query_dcmd: Timeout on response for query command
[363538.482828] brcmfmac: brcmf_msgbuf_query_dcmd: Timeout on response for query command
[363538.490684] brcmfmac: brcmf_cfg80211_get_station: GET STA INFO failed, -5

This just came in and WiFi stopped working..

Ouch, that is not good. It most likely means that firmware crashed. Could you do the following: After the AP boots, on the console execute the following command:

echo 0x100000 > /sys/module/brcmfmac/parameters/debug

This will hopefully give more info on the crash (if it is a crash, it could also be a problem with pcie communication) once it happens.

This will require enabling CONFIG_PACKAGE_BRCM80211_DEBUG symbol and (re)compiling.

P.S.
You may also prefer to just do:

echo "brcmfmac debug=0x00100000" > /etc/modules.d/brcmfmac

and reboot the device.
CONSOLE logs will appear in "dmesg" output, if you want them over serial console, remember about "dmesg -n 8".

Hmm, thats why i have been not finding any difference after executing the previous command. Would try this and let you know. And thanks for helping us out !

meuleman wrote:

Why the EAP frame did not leave the device within 1 second I do not know. There could be a bug in the driver where we free a frame (due to error of some sort) which was a 1x frame but we have looked for this in the code and thusfar have not been able to identify an issue.

meuleman wrote:
adityaxavier wrote:

Another weird thing


[363536.482823] brcmfmac: brcmf_msgbuf_query_dcmd: Timeout on response for query command
[363538.482828] brcmfmac: brcmf_msgbuf_query_dcmd: Timeout on response for query command
[363538.490684] brcmfmac: brcmf_cfg80211_get_station: GET STA INFO failed, -5

This just came in and WiFi stopped working..

Ouch, that is not good. It most likely means that firmware crashed. Could you do the following: After the AP boots, on the console execute the following command:

echo 0x100000 > /sys/module/brcmfmac/parameters/debug

This will hopefully give more info on the crash (if it is a crash, it could also be a problem with pcie communication) once it happens.

At this point I don't have any ideas about the eapol message timeout. Again; it is a warning, so the device should keep running.

I spent some time testing brcmfmac and I got some WARNINGs. Unfortunately I can't reproduce them reliably every day, so it makes debugging quite uncomfortable.

Anyway, from what I saw so far I think there are 2 separated issues:

  1. AMPDU stalls. Sometimes things go wrong in firmware and AMPDU hangs. I reported this problem with more info in the AMPDU stalls with brcmfmac4366b-pcie.bin triggering WARNINGs e-mail thread. The good thing is firmware usually recovers from that. You may lost connection for few seconds, devices may get disconnected, but it should go back to normal on its own.
    Sometimes things may get worse and you may get AMPDU stall after stall, which will make no good.

  2. Missed or lost 802.1x skb. I saw this once only, so it may be more complex to reproduce & debug. For one of submitted 802.1x skbs brcmf_txfinalize was never called (and so atomic_dec(&ifp->pend_8021x_cnt) wasn't as well). This resulted in pend_8021x_cnt being always 1 or more and brcmfmac triggering WARNINGs all the time. If I hit this problem again, my debugging patch I have applied should provide more info.

The Warnings are happening almost on a daily basis for me, and the firmware crash used to happen on a daily basis but currently its working since last 6 days without me restarting it.

[363536.482823] brcmfmac: brcmf_msgbuf_query_dcmd: Timeout on response for query command
[363538.482828] brcmfmac: brcmf_msgbuf_query_dcmd: Timeout on response for query command
[363538.490684] brcmfmac: brcmf_cfg80211_get_station: GET STA INFO failed

When this happens, 2.4GHz Wifi works just fine. Its the 5GHz wifi which is completely conked off.
Power cycling (disabling / enabling) doesn't work either.

If it would help, i would gladly test with your debugging patch.

PS:- Found out that the kernel patch shouldn't be sent over github, rather using git email system which am completely unfamiliar with. Need to read more about it smile

Zajec wrote:

Missed or lost 802.1x skb. I saw this once only, so it may be more complex to reproduce & debug. For one of submitted 802.1x skbs brcmf_txfinalize was never called (and so atomic_dec(&ifp->pend_8021x_cnt) wasn't as well). This resulted in pend_8021x_cnt being always 1 or more and brcmfmac triggering WARNINGs all the time. If I hit this problem again, my debugging patch I have applied should provide more info.

I just hit that problem again, this time with my debugging patch. I reported it on linux-wireless mailing list in the brcmf_txfinalize misses 802.1x packet leading to infinite WARNINGs e-mail thread.