OpenWrt Forum Archive

Topic: Router Unresponsive

The content of this topic has been archived on 30 Mar 2018. There are no obvious gaps in this topic, but there may still be some posts missing at the end.

I have this issue where at random moments the router becomes unresponsive and the internet connection stops working. This time I happened to be watching the Luci page, because I was testing sqm-scripts under heavy torrent load. So what happened? I was downloading a few torrents at high speeds (40+ Mb/s). There were around ~1500 open connections according to Luci's overview and the average 1-minute load spiked to 1.5+. Of course, under such a high load this was to be expected, but even with the high load my internet stayed very responsive and was happy overall with sqm-scripts' performance. The average load then settled at around ~0.50.

Then the torrent finished, the connections dropped back down to 200-300 open connections, the load was < 0.1 and everything looked perfect. Then a few minutes later, the problem started. My laptop disconnected from the wifi, and trying to manually reconnect failed. My and my girlfriend's phone were both still connected to the wifi, but trying to open internet pages was impossible. Trying to reach the router via its webinterface was also not working.

As usual when this problem crops up, 5-10 minutes later the connection starts working again. I immediately logged back in. The number of open connections looked fine at ~200. The 20-minute load was fine at around ~0.1, so I doesn't look like the processor was clogged. I'm using the wr1043nd with Chaos Calmer.

I'm not sure if it's related, but I installed this router in place of the one provided by the ISP, because that one was also randomly locking up or performing very poorly at times. If these incidents are related, it might be that some device on the network is misbehaving and causing problems. The issue is that I live in a student house and I share the connection with 5 other residents, so I'm unable to thoroughly test this hypothesis.

I'm not very familiar with Linux logs, but immediately after logging in on the webinterface of the router, I captured both the system and kernel log. The issue started around ~15-10 minutes before capturing these logs. Could someone with more experience than me look through these logs to see if they show anything out of the ordinary? Thank you very much in advance!


KernelLog wrote:

[    0.000000] Linux version 3.18.20 (buildbot@builder1) (gcc version 4.8.3 (OpenWrt/Linaro GCC 4.8-2014.04 r46450) ) #1 Fri Sep 4 21:55:57 CEST 2015
[    0.000000] MyLoader: sysp=e19624a7, boardp=ee8721a4, parts=64c787b7
[    0.000000] bootconsole [early0] enabled
[    0.000000] CPU0 revision is: 00019750 (MIPS 74Kc)
[    0.000000] SoC: Qualcomm Atheros QCA9558 ver 1 rev 0
[    0.000000] Determined physical RAM map:
[    0.000000]  memory: 04000000 @ 00000000 (usable)
[    0.000000] Initrd not found or empty - disabling initrd
[    0.000000] Zone ranges:
[    0.000000]   Normal   [mem 0x00000000-0x03ffffff]
[    0.000000] Movable zone start for each node
[    0.000000] Early memory node ranges
[    0.000000]   node   0: [mem 0x00000000-0x03ffffff]
[    0.000000] Initmem setup node 0 [mem 0x00000000-0x03ffffff]
[    0.000000] On node 0 totalpages: 16384
[    0.000000] free_area_init_node: node 0, pgdat 8034e2b0, node_mem_map 81000000
[    0.000000]   Normal zone: 128 pages used for memmap
[    0.000000]   Normal zone: 0 pages reserved
[    0.000000]   Normal zone: 16384 pages, LIFO batch:3
[    0.000000] Primary instruction cache 64kB, VIPT, 4-way, linesize 32 bytes.
[    0.000000] Primary data cache 32kB, 4-way, VIPT, cache aliases, linesize 32 bytes
[    0.000000] pcpu-alloc: s0 r0 d32768 u32768 alloc=1*32768
[    0.000000] pcpu-alloc: [0] 0
[    0.000000] Built 1 zonelists in Zone order, mobility grouping on.  Total pages: 16256
[    0.000000] Kernel command line:  board=TL-WR1043ND-v2 console=ttyS0,115200 rootfstype=squashfs,jffs2 noinitrd
[    0.000000] PID hash table entries: 256 (order: -2, 1024 bytes)
[    0.000000] Dentry cache hash table entries: 8192 (order: 3, 32768 bytes)
[    0.000000] Inode-cache hash table entries: 4096 (order: 2, 16384 bytes)
[    0.000000] Writing ErrCtl register=00000000
[    0.000000] Readback ErrCtl register=00000000
[    0.000000] Memory: 61004K/65536K available (2621K kernel code, 129K rwdata, 344K rodata, 224K init, 194K bss, 4532K reserved)
[    0.000000] SLUB: HWalign=32, Order=0-3, MinObjects=0, CPUs=1, Nodes=1
[    0.000000] NR_IRQS:51
[    0.000000] Clocks: CPU:720.000MHz, DDR:600.000MHz, AHB:200.000MHz, Ref:40.000MHz
[    0.000000] Calibrating delay loop... 358.80 BogoMIPS (lpj=1794048)
[    0.060000] pid_max: default: 32768 minimum: 301
[    0.060000] Mount-cache hash table entries: 1024 (order: 0, 4096 bytes)
[    0.070000] Mountpoint-cache hash table entries: 1024 (order: 0, 4096 bytes)
[    0.070000] NET: Registered protocol family 16
[    0.080000] MIPS: machine is TP-LINK TL-WR1043ND v2
[    0.520000] Switched to clocksource MIPS
[    0.530000] NET: Registered protocol family 2
[    0.530000] TCP established hash table entries: 1024 (order: 0, 4096 bytes)
[    0.530000] TCP bind hash table entries: 1024 (order: 0, 4096 bytes)
[    0.540000] TCP: Hash tables configured (established 1024 bind 1024)
[    0.540000] TCP: reno registered
[    0.550000] UDP hash table entries: 256 (order: 0, 4096 bytes)
[    0.550000] UDP-Lite hash table entries: 256 (order: 0, 4096 bytes)
[    0.560000] NET: Registered protocol family 1
[    0.560000] PCI: CLS 0 bytes, default 32
[    0.560000] futex hash table entries: 256 (order: -1, 3072 bytes)
[    0.580000] squashfs: version 4.0 (2009/01/31) Phillip Lougher
[    0.580000] jffs2: version 2.2 (NAND) (SUMMARY) (LZMA) (RTIME) (CMODE_PRIORITY) (c) 2001-2006 Red Hat, Inc.
[    0.590000] msgmni has been set to 119
[    0.590000] io scheduler noop registered
[    0.600000] io scheduler deadline registered (default)
[    0.600000] Serial: 8250/16550 driver, 16 ports, IRQ sharing enabled
[    0.610000] console [ttyS0] disabled
[    0.640000] serial8250.0: ttyS0 at MMIO 0x18020000 (irq = 11, base_baud = 2500000) is a 16550A
[    0.640000] console [ttyS0] enabled
[    0.650000] bootconsole [early0] disabled
[    0.660000] m25p80 spi0.0: found s25fl064k, expected m25p80
[    0.670000] m25p80 spi0.0: s25fl064k (8192 Kbytes)
[    0.680000] 5 tp-link partitions found on MTD device spi0.0
[    0.680000] Creating 5 MTD partitions on "spi0.0":
[    0.690000] 0x000000000000-0x000000020000 : "u-boot"
[    0.690000] 0x000000020000-0x00000012c508 : "kernel"
[    0.700000] 0x00000012c508-0x0000007f0000 : "rootfs"
[    0.700000] mtd: device 2 (rootfs) set to be root filesystem
[    0.720000] 1 squashfs-split partitions found on MTD device rootfs
[    0.720000] 0x000000360000-0x0000007f0000 : "rootfs_data"
[    0.730000] 0x0000007f0000-0x000000800000 : "art"
[    0.730000] 0x000000020000-0x0000007f0000 : "firmware"
[    0.750000] switch0: Atheros AR8327 rev. 4 switch registered on ag71xx-mdio.0
[    0.840000] libphy: ag71xx_mdio: probed
[    1.440000] ag71xx ag71xx.0: connected to PHY at ag71xx-mdio.0:00 [uid=004dd034, driver=Atheros AR8216/AR8236/AR8316]
[    1.450000] eth0: Atheros AG71xx at 0xb9000000, irq 4, mode:RGMII
[    2.040000] eth1: Atheros AG71xx at 0xba000000, irq 5, mode:SGMII
[    2.040000] TCP: cubic registered
[    2.050000] NET: Registered protocol family 17
[    2.050000] bridge: automatic filtering via arp/ip/ip6tables has been deprecated. Update your scripts to load br_netfilter if you need this.
[    2.060000] Bridge firewalling registered
[    2.070000] 8021q: 802.1Q VLAN Support v1.8
[    2.080000] VFS: Mounted root (squashfs filesystem) readonly on device 31:2.
[    2.090000] Freeing unused kernel memory: 224K (80368000 - 803a0000)
[    3.160000] init: Console is alive
[    3.160000] init: - watchdog -
[    4.370000] usbcore: registered new interface driver usbfs
[    4.370000] usbcore: registered new interface driver hub
[    4.380000] usbcore: registered new device driver usb
[    4.390000] ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver
[    4.400000] ehci-platform: EHCI generic platform driver
[    4.400000] ehci-platform ehci-platform.0: EHCI Host Controller
[    4.410000] ehci-platform ehci-platform.0: new USB bus registered, assigned bus number 1
[    4.420000] ehci-platform ehci-platform.0: TX-TX IDP fix enabled
[    4.420000] ehci-platform ehci-platform.0: irq 48, io mem 0x1b000000
[    4.450000] ehci-platform ehci-platform.0: USB 2.0 started, EHCI 1.00
[    4.450000] hub 1-0:1.0: USB hub found
[    4.460000] hub 1-0:1.0: 1 port detected
[    4.460000] ehci-platform ehci-platform.1: EHCI Host Controller
[    4.470000] ehci-platform ehci-platform.1: new USB bus registered, assigned bus number 2
[    4.480000] ehci-platform ehci-platform.1: TX-TX IDP fix enabled
[    4.480000] ehci-platform ehci-platform.1: irq 49, io mem 0x1b400000
[    4.510000] ehci-platform ehci-platform.1: USB 2.0 started, EHCI 1.00
[    4.510000] hub 2-0:1.0: USB hub found
[    4.520000] hub 2-0:1.0: 1 port detected
[    5.170000] init: - preinit -
[    5.690000] eth1: link up (1000Mbps/Full duplex)
[    5.710000] random: procd urandom read with 9 bits of entropy available
[    9.010000] jffs2: notice: (390) jffs2_build_xattr_subsystem: complete building xattr subsystem, 0 of xdatum (0 unchecked, 0 orphan) and 0 of xref (0 dead, 0 orphan) found.
[    9.030000] mount_root: switching to jffs2 overlay
[    9.070000] eth1: link down
[    9.080000] procd: - early -
[    9.080000] procd: - watchdog -
[    9.700000] procd: - ubus -
[   10.710000] procd: - init -
[   11.340000] NET: Registered protocol family 10
[   11.350000] ip6_tables: (C) 2000-2006 Netfilter Core Team
[   11.360000] Loading modules backported from Linux version master-2015-03-09-0-g141f155
[   11.370000] Backport generated by backports.git backports-20150129-0-gdd4a670
[   11.380000] ip_tables: (C) 2000-2006 Netfilter Core Team
[   11.390000] nf_conntrack version 0.5.0 (956 buckets, 3824 max)
[   11.430000] xt_time: kernel timezone is -0000
[   11.450000] cfg80211: Calling CRDA to update world regulatory domain
[   11.450000] cfg80211: World regulatory domain updated:
[   11.460000] cfg80211:  DFS Master region: unset
[   11.460000] cfg80211:   (start_freq - end_freq @ bandwidth), (max_antenna_gain, max_eirp), (dfs_cac_time)
[   11.470000] cfg80211:   (2402000 KHz - 2472000 KHz @ 40000 KHz), (N/A, 2000 mBm), (N/A)
[   11.480000] cfg80211:   (2457000 KHz - 2482000 KHz @ 40000 KHz), (N/A, 2000 mBm), (N/A)
[   11.490000] cfg80211:   (2474000 KHz - 2494000 KHz @ 20000 KHz), (N/A, 2000 mBm), (N/A)
[   11.500000] cfg80211:   (5170000 KHz - 5250000 KHz @ 80000 KHz), (N/A, 2000 mBm), (N/A)
[   11.510000] cfg80211:   (5250000 KHz - 5330000 KHz @ 80000 KHz, 160000 KHz AUTO), (N/A, 2000 mBm), (0 s)
[   11.520000] cfg80211:   (5490000 KHz - 5730000 KHz @ 160000 KHz), (N/A, 2000 mBm), (0 s)
[   11.520000] cfg80211:   (5735000 KHz - 5835000 KHz @ 80000 KHz), (N/A, 2000 mBm), (N/A)
[   11.530000] cfg80211:   (57240000 KHz - 63720000 KHz @ 2160000 KHz), (N/A, 0 mBm), (N/A)
[   11.600000] PPP generic driver version 2.4.2
[   11.610000] NET: Registered protocol family 24
[   11.650000] ath: EEPROM regdomain: 0x0
[   11.650000] ath: EEPROM indicates default country code should be used
[   11.650000] ath: doing EEPROM country->regdmn map search
[   11.650000] ath: country maps to regdmn code: 0x3a
[   11.650000] ath: Country alpha2 being used: US
[   11.650000] ath: Regpair used: 0x3a
[   11.660000] ieee80211 phy0: Selected rate control algorithm 'minstrel_ht'
[   11.660000] ieee80211 phy0: Atheros AR9550 Rev:0 mem=0xb8100000, irq=47
[   11.680000] cfg80211: Calling CRDA for country: US
[   11.680000] cfg80211: Regulatory domain changed to country: US
[   11.690000] cfg80211:  DFS Master region: FCC
[   11.690000] cfg80211:   (start_freq - end_freq @ bandwidth), (max_antenna_gain, max_eirp), (dfs_cac_time)
[   11.700000] cfg80211:   (2402000 KHz - 2472000 KHz @ 40000 KHz), (N/A, 3000 mBm), (N/A)
[   11.710000] cfg80211:   (5170000 KHz - 5250000 KHz @ 80000 KHz, 160000 KHz AUTO), (N/A, 1700 mBm), (N/A)
[   11.720000] cfg80211:   (5250000 KHz - 5330000 KHz @ 80000 KHz, 160000 KHz AUTO), (N/A, 2300 mBm), (0 s)
[   11.730000] cfg80211:   (5735000 KHz - 5835000 KHz @ 80000 KHz), (N/A, 3000 mBm), (N/A)
[   11.740000] cfg80211:   (57240000 KHz - 63720000 KHz @ 2160000 KHz), (N/A, 4000 mBm), (N/A)
[   18.680000] eth1: link up (1000Mbps/Full duplex)
[   18.690000] device eth1 entered promiscuous mode
[   18.690000] IPv6: ADDRCONF(NETDEV_UP): br-lan: link is not ready
[   18.710000] IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready
[   19.200000] cfg80211: Calling CRDA for country: BO
[   19.200000] cfg80211: Regulatory domain changed to country: BO
[   19.210000] cfg80211:  DFS Master region: JP
[   19.210000] cfg80211:   (start_freq - end_freq @ bandwidth), (max_antenna_gain, max_eirp), (dfs_cac_time)
[   19.220000] cfg80211:   (2402000 KHz - 2482000 KHz @ 40000 KHz), (N/A, 2000 mBm), (N/A)
[   19.230000] cfg80211:   (5250000 KHz - 5330000 KHz @ 80000 KHz), (N/A, 3000 mBm), (0 s)
[   19.240000] cfg80211:   (5735000 KHz - 5835000 KHz @ 80000 KHz), (N/A, 3000 mBm), (N/A)
[   19.670000] br-lan: port 1(eth1) entered forwarding state
[   19.670000] br-lan: port 1(eth1) entered forwarding state
[   19.760000] IPv6: ADDRCONF(NETDEV_CHANGE): br-lan: link becomes ready
[   19.760000] eth0: link up (1000Mbps/Full duplex)
[   19.780000] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
[   20.820000] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready
[   20.830000] device wlan0 entered promiscuous mode
[   20.830000] br-lan: port 2(wlan0) entered forwarding state
[   20.840000] br-lan: port 2(wlan0) entered forwarding state
[   20.860000] br-lan: port 2(wlan0) entered disabled state
[   21.160000] br-lan: port 2(wlan0) entered forwarding state
[   21.170000] br-lan: port 2(wlan0) entered forwarding state
[   21.170000] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
[   21.670000] br-lan: port 1(eth1) entered forwarding state
[   21.860000] Atheros AR8216/AR8236/AR8316 ag71xx-mdio.0:00: Port 5 is up
[   23.170000] br-lan: port 2(wlan0) entered forwarding state
[   35.440000] random: nonblocking pool is initialized
[ 1951.030000] nf_conntrack: automatic helper assignment is deprecated and it will be removed soon. Use the iptables CT target to attach helpers instead.
[1315471.190000] device wlan0 left promiscuous mode
[1315471.190000] br-lan: port 2(wlan0) entered disabled state
[1315472.440000] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready
[1315472.480000] device wlan0 entered promiscuous mode
[1315473.960000] br-lan: port 2(wlan0) entered forwarding state
[1315473.970000] br-lan: port 2(wlan0) entered forwarding state
[1315473.970000] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
[1315475.970000] br-lan: port 2(wlan0) entered forwarding state
[1385163.020000] device wlan0 left promiscuous mode
[1385163.020000] br-lan: port 2(wlan0) entered disabled state
[1385164.070000] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready
[1385164.110000] device wlan0 entered promiscuous mode
[1385165.180000] br-lan: port 2(wlan0) entered forwarding state
[1385165.180000] br-lan: port 2(wlan0) entered forwarding state
[1385165.190000] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
[1385167.180000] br-lan: port 2(wlan0) entered forwarding state
[1462512.160000] u32 classifier
[1462512.160000]     input device check on
[1462512.170000]     Actions configured
[1462512.190000] Mirror/redirect action on
[1462512.970000] netem: version 1.3
[1685658.860000] ath: phy0: Unable to reset channel, reset status -5

SystemLog wrote:

Mon Feb 15 09:10:29 2016 daemon.info hostapd: wlan0: STA c0:bd:d1:d4:2c:26 WPA: group key handshake completed (RSN)
Mon Feb 15 09:10:29 2016 daemon.info hostapd: wlan0: STA 2c:8a:72:b4:cd:1b WPA: group key handshake completed (RSN)
Mon Feb 15 09:10:29 2016 daemon.info hostapd: wlan0: STA d4:f4:6f:96:cd:32 WPA: group key handshake completed (RSN)
Mon Feb 15 09:11:00 2016 daemon.info hostapd: wlan0: STA a4:c3:61:6e:85:5e IEEE 802.11: authenticated
Mon Feb 15 09:11:01 2016 daemon.info hostapd: wlan0: STA a4:c3:61:6e:85:5e IEEE 802.11: authenticated
Mon Feb 15 09:11:01 2016 daemon.info hostapd: wlan0: STA a4:c3:61:6e:85:5e IEEE 802.11: associated (aid 11)
Mon Feb 15 09:11:01 2016 daemon.info hostapd: wlan0: STA a4:c3:61:6e:85:5e WPA: pairwise key handshake completed (RSN)
Mon Feb 15 09:11:09 2016 daemon.info dnsmasq-dhcp[1185]: DHCPDISCOVER(br-lan) a4:c3:61:6e:85:5e
Mon Feb 15 09:11:09 2016 daemon.info dnsmasq-dhcp[1185]: DHCPOFFER(br-lan) 192.168.1.245 a4:c3:61:6e:85:5e
Mon Feb 15 09:11:10 2016 daemon.info dnsmasq-dhcp[1185]: DHCPREQUEST(br-lan) 192.168.1.245 a4:c3:61:6e:85:5e
Mon Feb 15 09:11:10 2016 daemon.info dnsmasq-dhcp[1185]: DHCPACK(br-lan) 192.168.1.245 a4:c3:61:6e:85:5e Malvas-iPhone
Mon Feb 15 09:20:28 2016 daemon.info hostapd: wlan0: STA 80:a5:89:11:6c:01 WPA: group key handshake completed (RSN)
Mon Feb 15 09:20:28 2016 daemon.info hostapd: wlan0: STA b4:ae:2b:08:db:b1 WPA: group key handshake completed (RSN)
Mon Feb 15 09:20:28 2016 daemon.info hostapd: wlan0: STA 54:60:09:29:92:f8 WPA: group key handshake completed (RSN)
Mon Feb 15 09:20:28 2016 daemon.info hostapd: wlan0: STA 54:60:09:0b:b2:84 WPA: group key handshake completed (RSN)
Mon Feb 15 09:20:28 2016 daemon.info hostapd: wlan0: STA 34:68:95:1d:66:2c WPA: group key handshake completed (RSN)
Mon Feb 15 09:20:28 2016 daemon.info hostapd: wlan0: STA 2c:8a:72:b4:cd:1b WPA: group key handshake completed (RSN)
Mon Feb 15 09:20:28 2016 daemon.info hostapd: wlan0: STA 20:78:f0:f2:66:38 WPA: group key handshake completed (RSN)
Mon Feb 15 09:20:28 2016 daemon.info hostapd: wlan0: STA d4:f4:6f:96:cd:32 WPA: group key handshake completed (RSN)
Mon Feb 15 09:20:28 2016 daemon.info hostapd: wlan0: STA 90:b9:31:ee:fa:2d WPA: group key handshake completed (RSN)
Mon Feb 15 09:20:29 2016 daemon.info hostapd: wlan0: STA 38:94:96:98:36:4f WPA: group key handshake completed (RSN)
Mon Feb 15 09:20:29 2016 daemon.info hostapd: wlan0: STA c0:bd:d1:d4:2c:26 WPA: group key handshake completed (RSN)
Mon Feb 15 09:20:37 2016 daemon.info hostapd: wlan0: STA a4:c3:61:6e:85:5e IEEE 802.11: deauthenticated due to local deauth request
Mon Feb 15 09:27:16 2016 daemon.info dnsmasq-dhcp[1185]: DHCPREQUEST(br-lan) 192.168.1.141 b4:ae:2b:08:db:b1
Mon Feb 15 09:27:16 2016 daemon.info dnsmasq-dhcp[1185]: DHCPACK(br-lan) 192.168.1.141 b4:ae:2b:08:db:b1 XboxOne
Mon Feb 15 09:27:17 2016 daemon.warn odhcpd[831]: DHCPV6 CONFIRM IA_NA from 000100011b9650e7b4ae2b08dbaf on br-lan: not on-link fdb1:6f8a:b227::45b/128
Mon Feb 15 09:27:17 2016 daemon.warn odhcpd[831]: DHCPV6 SOLICIT IA_NA from 000100011b9650e7b4ae2b08dbaf on br-lan: ok fdb1:6f8a:b227::45b/128
Mon Feb 15 09:27:17 2016 daemon.info dnsmasq[1185]: read /etc/hosts - 1 addresses
Mon Feb 15 09:27:17 2016 daemon.info dnsmasq[1185]: read /tmp/hosts/odhcpd - 4 addresses
Mon Feb 15 09:27:17 2016 daemon.info dnsmasq[1185]: read /tmp/hosts/dhcp - 1 addresses
Mon Feb 15 09:27:17 2016 daemon.info dnsmasq-dhcp[1185]: read /etc/ethers - 0 addresses
Mon Feb 15 09:27:18 2016 daemon.warn odhcpd[831]: DHCPV6 REQUEST IA_NA from 000100011b9650e7b4ae2b08dbaf on br-lan: ok fdb1:6f8a:b227::45b/128
Mon Feb 15 09:27:18 2016 daemon.info dnsmasq[1185]: read /etc/hosts - 1 addresses
Mon Feb 15 09:27:18 2016 daemon.info dnsmasq[1185]: read /tmp/hosts/odhcpd - 5 addresses
Mon Feb 15 09:27:18 2016 daemon.info dnsmasq[1185]: read /tmp/hosts/dhcp - 1 addresses
Mon Feb 15 09:27:18 2016 daemon.info dnsmasq-dhcp[1185]: read /etc/ethers - 0 addresses
Mon Feb 15 09:30:28 2016 daemon.info hostapd: wlan0: STA 54:60:09:29:92:f8 WPA: group key handshake completed (RSN)
Mon Feb 15 09:30:28 2016 daemon.info hostapd: wlan0: STA 80:a5:89:11:6c:01 WPA: group key handshake completed (RSN)
Mon Feb 15 09:30:28 2016 daemon.info hostapd: wlan0: STA b4:ae:2b:08:db:b1 WPA: group key handshake completed (RSN)
Mon Feb 15 09:30:28 2016 daemon.info hostapd: wlan0: STA 54:60:09:0b:b2:84 WPA: group key handshake completed (RSN)
Mon Feb 15 09:30:28 2016 daemon.info hostapd: wlan0: STA 34:68:95:1d:66:2c WPA: group key handshake completed (RSN)
Mon Feb 15 09:30:28 2016 daemon.info hostapd: wlan0: STA 2c:8a:72:b4:cd:1b WPA: group key handshake completed (RSN)
Mon Feb 15 09:30:28 2016 daemon.info hostapd: wlan0: STA 90:b9:31:ee:fa:2d WPA: group key handshake completed (RSN)
Mon Feb 15 09:30:28 2016 daemon.info hostapd: wlan0: STA 38:94:96:98:36:4f WPA: group key handshake completed (RSN)
Mon Feb 15 09:30:29 2016 daemon.info hostapd: wlan0: STA d4:f4:6f:96:cd:32 WPA: group key handshake completed (RSN)
Mon Feb 15 09:30:29 2016 daemon.info hostapd: wlan0: STA 20:78:f0:f2:66:38 WPA: group key handshake completed (RSN)
Mon Feb 15 09:30:29 2016 daemon.info hostapd: wlan0: STA c0:bd:d1:d4:2c:26 WPA: group key handshake completed (RSN)
Mon Feb 15 09:32:07 2016 daemon.info hostapd: wlan0: STA 80:a5:89:11:6c:01 IEEE 802.11: disconnected due to excessive missing ACKs
Mon Feb 15 09:32:37 2016 daemon.info hostapd: wlan0: STA 80:a5:89:11:6c:01 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Mon Feb 15 09:35:59 2016 daemon.info hostapd: wlan0: STA d4:f4:6f:96:cd:32 IEEE 802.11: disassociated due to inactivity
Mon Feb 15 09:36:00 2016 daemon.info hostapd: wlan0: STA d4:f4:6f:96:cd:32 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Mon Feb 15 09:36:04 2016 daemon.info hostapd: wlan0: STA 90:b9:31:ee:fa:2d IEEE 802.11: disassociated due to inactivity
Mon Feb 15 09:36:05 2016 daemon.info hostapd: wlan0: STA 90:b9:31:ee:fa:2d IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Mon Feb 15 09:36:23 2016 daemon.info hostapd: wlan0: STA b4:ae:2b:08:db:b1 IEEE 802.11: disassociated due to inactivity
Mon Feb 15 09:36:24 2016 daemon.info hostapd: wlan0: STA b4:ae:2b:08:db:b1 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Mon Feb 15 09:36:59 2016 daemon.info hostapd: wlan0: STA 34:68:95:1d:66:2c IEEE 802.11: disassociated due to inactivity
Mon Feb 15 09:37:00 2016 daemon.info hostapd: wlan0: STA 34:68:95:1d:66:2c IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Mon Feb 15 09:37:04 2016 daemon.info hostapd: wlan0: STA 54:60:09:0b:b2:84 IEEE 802.11: disassociated due to inactivity
Mon Feb 15 09:37:05 2016 daemon.info hostapd: wlan0: STA 54:60:09:0b:b2:84 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Mon Feb 15 09:37:11 2016 daemon.info hostapd: wlan0: STA c0:bd:d1:d4:2c:26 IEEE 802.11: disassociated due to inactivity
Mon Feb 15 09:37:12 2016 daemon.info hostapd: wlan0: STA c0:bd:d1:d4:2c:26 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Mon Feb 15 09:37:14 2016 daemon.info hostapd: wlan0: STA 20:78:f0:f2:66:38 IEEE 802.11: disassociated due to inactivity
Mon Feb 15 09:37:15 2016 daemon.info hostapd: wlan0: STA 20:78:f0:f2:66:38 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Mon Feb 15 09:37:16 2016 daemon.info hostapd: wlan0: STA 2c:8a:72:b4:cd:1b IEEE 802.11: disassociated due to inactivity
Mon Feb 15 09:37:17 2016 daemon.info hostapd: wlan0: STA 2c:8a:72:b4:cd:1b IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Mon Feb 15 09:37:18 2016 daemon.info hostapd: wlan0: STA 38:94:96:98:36:4f IEEE 802.11: disassociated due to inactivity
Mon Feb 15 09:37:19 2016 daemon.info hostapd: wlan0: STA 54:60:09:29:92:f8 IEEE 802.11: disassociated due to inactivity
Mon Feb 15 09:37:19 2016 daemon.info hostapd: wlan0: STA 38:94:96:98:36:4f IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Mon Feb 15 09:37:20 2016 daemon.info hostapd: wlan0: STA 54:60:09:29:92:f8 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Mon Feb 15 09:52:09 2016 daemon.info hostapd: wlan0: STA 2c:8a:72:b4:cd:1b IEEE 802.11: authenticated
Mon Feb 15 09:52:09 2016 daemon.info hostapd: wlan0: STA 2c:8a:72:b4:cd:1b IEEE 802.11: associated (aid 1)
Mon Feb 15 09:52:09 2016 daemon.info hostapd: wlan0: STA 2c:8a:72:b4:cd:1b WPA: pairwise key handshake completed (RSN)
Mon Feb 15 09:52:09 2016 daemon.info dnsmasq-dhcp[1185]: DHCPREQUEST(br-lan) 192.168.1.162 2c:8a:72:b4:cd:1b
Mon Feb 15 09:52:09 2016 daemon.info dnsmasq-dhcp[1185]: DHCPACK(br-lan) 192.168.1.162 2c:8a:72:b4:cd:1b android-b29f91249cccb560
Mon Feb 15 09:52:11 2016 daemon.info hostapd: wlan0: STA d4:f4:6f:96:cd:32 IEEE 802.11: authenticated
Mon Feb 15 09:52:11 2016 daemon.info hostapd: wlan0: STA d4:f4:6f:96:cd:32 IEEE 802.11: associated (aid 2)
Mon Feb 15 09:52:11 2016 daemon.info hostapd: wlan0: STA d4:f4:6f:96:cd:32 WPA: pairwise key handshake completed (RSN)
Mon Feb 15 09:52:11 2016 daemon.info dnsmasq-dhcp[1185]: DHCPREQUEST(br-lan) 192.168.1.225 d4:f4:6f:96:cd:32
Mon Feb 15 09:52:11 2016 daemon.info dnsmasq-dhcp[1185]: DHCPACK(br-lan) 192.168.1.225 d4:f4:6f:96:cd:32 iPhone-van-Luuk
Mon Feb 15 09:52:14 2016 daemon.info hostapd: wlan0: STA 34:68:95:1d:66:2c IEEE 802.11: authenticated
Mon Feb 15 09:52:14 2016 daemon.info hostapd: wlan0: STA 34:68:95:1d:66:2c IEEE 802.11: associated (aid 3)
Mon Feb 15 09:52:14 2016 daemon.info hostapd: wlan0: STA 34:68:95:1d:66:2c WPA: pairwise key handshake completed (RSN)
Mon Feb 15 09:52:22 2016 daemon.info hostapd: wlan0: STA 54:60:09:29:92:f8 IEEE 802.11: authenticated
Mon Feb 15 09:52:22 2016 daemon.info hostapd: wlan0: STA 54:60:09:29:92:f8 IEEE 802.11: associated (aid 4)
Mon Feb 15 09:52:22 2016 daemon.info hostapd: wlan0: STA 54:60:09:29:92:f8 WPA: pairwise key handshake completed (RSN)
Mon Feb 15 09:52:22 2016 daemon.info dnsmasq-dhcp[1185]: DHCPREQUEST(br-lan) 192.168.1.165 54:60:09:29:92:f8
Mon Feb 15 09:52:22 2016 daemon.info dnsmasq-dhcp[1185]: DHCPACK(br-lan) 192.168.1.165 54:60:09:29:92:f8 Chromecast
Mon Feb 15 09:52:24 2016 daemon.info hostapd: wlan0: STA 90:b9:31:ee:fa:2d IEEE 802.11: authenticated
Mon Feb 15 09:52:24 2016 daemon.info hostapd: wlan0: STA 90:b9:31:ee:fa:2d IEEE 802.11: associated (aid 5)
Mon Feb 15 09:52:24 2016 daemon.info hostapd: wlan0: STA 90:b9:31:ee:fa:2d WPA: pairwise key handshake completed (RSN)
Mon Feb 15 09:52:24 2016 daemon.info dnsmasq-dhcp[1185]: DHCPREQUEST(br-lan) 192.168.1.186 90:b9:31:ee:fa:2d
Mon Feb 15 09:52:24 2016 daemon.info dnsmasq-dhcp[1185]: DHCPACK(br-lan) 192.168.1.186 90:b9:31:ee:fa:2d iPad-van-Luuk
Mon Feb 15 09:52:24 2016 daemon.info dnsmasq-dhcp[1185]: DHCPREQUEST(br-lan) 192.168.1.175 34:68:95:1d:66:2c
Mon Feb 15 09:52:24 2016 daemon.info dnsmasq-dhcp[1185]: DHCPACK(br-lan) 192.168.1.175 34:68:95:1d:66:2c BRW3468951D662C
Mon Feb 15 09:52:24 2016 daemon.info hostapd: wlan0: STA 54:60:09:0b:b2:84 IEEE 802.11: authenticated
Mon Feb 15 09:52:24 2016 daemon.info hostapd: wlan0: STA 54:60:09:0b:b2:84 IEEE 802.11: associated (aid 6)
Mon Feb 15 09:52:24 2016 daemon.info hostapd: wlan0: STA 54:60:09:0b:b2:84 WPA: pairwise key handshake completed (RSN)
Mon Feb 15 09:52:25 2016 daemon.info dnsmasq-dhcp[1185]: DHCPREQUEST(br-lan) 192.168.1.178 54:60:09:0b:b2:84
Mon Feb 15 09:52:25 2016 daemon.info dnsmasq-dhcp[1185]: DHCPACK(br-lan) 192.168.1.178 54:60:09:0b:b2:84 Chromecast
Mon Feb 15 09:52:26 2016 daemon.info dnsmasq-dhcp[1185]: DHCPREQUEST(br-lan) 192.168.1.165 54:60:09:29:92:f8
Mon Feb 15 09:52:26 2016 daemon.info dnsmasq-dhcp[1185]: DHCPACK(br-lan) 192.168.1.165 54:60:09:29:92:f8 Chromecast
Mon Feb 15 09:52:27 2016 daemon.info dnsmasq-dhcp[1185]: DHCPREQUEST(br-lan) 192.168.1.175 34:68:95:1d:66:2c
Mon Feb 15 09:52:27 2016 daemon.info dnsmasq-dhcp[1185]: DHCPACK(br-lan) 192.168.1.175 34:68:95:1d:66:2c BRW3468951D662C
Mon Feb 15 09:52:35 2016 daemon.info hostapd: wlan0: STA 38:94:96:98:36:4f IEEE 802.11: authenticated
Mon Feb 15 09:52:35 2016 daemon.info hostapd: wlan0: STA 38:94:96:98:36:4f IEEE 802.11: associated (aid 7)
Mon Feb 15 09:52:35 2016 daemon.info hostapd: wlan0: STA 38:94:96:98:36:4f WPA: pairwise key handshake completed (RSN)
Mon Feb 15 09:52:36 2016 daemon.info dnsmasq-dhcp[1185]: DHCPREQUEST(br-lan) 192.168.1.121 38:94:96:98:36:4f
Mon Feb 15 09:52:36 2016 daemon.info dnsmasq-dhcp[1185]: DHCPACK(br-lan) 192.168.1.121 38:94:96:98:36:4f android-5c2aa16aa158300d
Mon Feb 15 09:52:50 2016 daemon.info hostapd: wlan0: STA b4:ae:2b:08:db:b1 IEEE 802.11: authenticated
Mon Feb 15 09:52:50 2016 daemon.info hostapd: wlan0: STA b4:ae:2b:08:db:b1 IEEE 802.11: associated (aid 8)
Mon Feb 15 09:52:51 2016 daemon.info hostapd: wlan0: STA b4:ae:2b:08:db:b1 WPA: pairwise key handshake completed (RSN)
Mon Feb 15 09:52:51 2016 daemon.info dnsmasq-dhcp[1185]: DHCPREQUEST(br-lan) 192.168.1.141 b4:ae:2b:08:db:b1
Mon Feb 15 09:52:51 2016 daemon.info dnsmasq-dhcp[1185]: DHCPACK(br-lan) 192.168.1.141 b4:ae:2b:08:db:b1 XboxOne
Mon Feb 15 09:52:51 2016 daemon.warn odhcpd[831]: DHCPV6 SOLICIT IA_NA from 000100011b9650e7b4ae2b08dbaf on br-lan: ok fdb1:6f8a:b227::45b/128
Mon Feb 15 09:52:51 2016 daemon.info dnsmasq[1185]: read /etc/hosts - 1 addresses
Mon Feb 15 09:52:51 2016 daemon.info dnsmasq[1185]: read /tmp/hosts/odhcpd - 4 addresses
Mon Feb 15 09:52:51 2016 daemon.info dnsmasq[1185]: read /tmp/hosts/dhcp - 1 addresses
Mon Feb 15 09:52:51 2016 daemon.info dnsmasq-dhcp[1185]: read /etc/ethers - 0 addresses
Mon Feb 15 09:52:51 2016 daemon.info dnsmasq-dhcp[1185]: DHCPREQUEST(br-lan) 192.168.1.141 b4:ae:2b:08:db:b1
Mon Feb 15 09:52:51 2016 daemon.info dnsmasq-dhcp[1185]: DHCPACK(br-lan) 192.168.1.141 b4:ae:2b:08:db:b1 XboxOne
Mon Feb 15 09:52:51 2016 daemon.warn odhcpd[831]: DHCPV6 SOLICIT IA_NA from 000100011b9650e7b4ae2b08dbaf on br-lan: ok fdb1:6f8a:b227::45b/128
Mon Feb 15 09:52:52 2016 daemon.warn odhcpd[831]: DHCPV6 REQUEST IA_NA from 000100011b9650e7b4ae2b08dbaf on br-lan: ok fdb1:6f8a:b227::45b/128
Mon Feb 15 09:52:52 2016 daemon.info dnsmasq[1185]: read /etc/hosts - 1 addresses
Mon Feb 15 09:52:52 2016 daemon.info dnsmasq[1185]: read /tmp/hosts/odhcpd - 5 addresses
Mon Feb 15 09:52:52 2016 daemon.info dnsmasq[1185]: read /tmp/hosts/dhcp - 1 addresses
Mon Feb 15 09:52:52 2016 daemon.info dnsmasq-dhcp[1185]: read /etc/ethers - 0 addresses
Mon Feb 15 09:53:48 2016 daemon.notice hostapd: wlan0: STA 64:76:ba:79:d9:5a IEEE 802.11: did not acknowledge authentication response
Mon Feb 15 09:53:48 2016 daemon.notice hostapd: wlan0: STA 64:76:ba:79:d9:5a IEEE 802.11: did not acknowledge authentication response
Mon Feb 15 09:53:48 2016 daemon.info hostapd: wlan0: STA 64:76:ba:79:d9:5a IEEE 802.11: authenticated
Mon Feb 15 09:53:48 2016 daemon.info hostapd: wlan0: STA 64:76:ba:79:d9:5a IEEE 802.11: associated (aid 9)
Mon Feb 15 09:53:48 2016 daemon.info hostapd: wlan0: STA 64:76:ba:79:d9:5a IEEE 802.11: authenticated
Mon Feb 15 09:53:48 2016 daemon.info hostapd: wlan0: STA 64:76:ba:79:d9:5a IEEE 802.11: associated (aid 9)
Mon Feb 15 09:53:48 2016 daemon.info hostapd: wlan0: STA 64:76:ba:79:d9:5a WPA: pairwise key handshake completed (RSN)
Mon Feb 15 09:53:51 2016 daemon.info dnsmasq-dhcp[1185]: DHCPDISCOVER(br-lan) 64:76:ba:79:d9:5a
Mon Feb 15 09:53:51 2016 daemon.info dnsmasq-dhcp[1185]: DHCPOFFER(br-lan) 192.168.1.135 64:76:ba:79:d9:5a
Mon Feb 15 09:53:51 2016 daemon.info dnsmasq-dhcp[1185]: DHCPDISCOVER(br-lan) 64:76:ba:79:d9:5a
Mon Feb 15 09:53:51 2016 daemon.info dnsmasq-dhcp[1185]: DHCPOFFER(br-lan) 192.168.1.135 64:76:ba:79:d9:5a
Mon Feb 15 09:53:52 2016 daemon.info dnsmasq-dhcp[1185]: DHCPREQUEST(br-lan) 192.168.1.135 64:76:ba:79:d9:5a
Mon Feb 15 09:53:52 2016 daemon.warn dnsmasq-dhcp[1185]: Ignoring domain Koenders for DHCP host name R
Mon Feb 15 09:53:52 2016 daemon.info dnsmasq-dhcp[1185]: DHCPACK(br-lan) 192.168.1.135 64:76:ba:79:d9:5a R
Mon Feb 15 09:54:22 2016 daemon.info hostapd: wlan0: STA c0:bd:d1:d4:2c:26 IEEE 802.11: authenticated
Mon Feb 15 09:54:22 2016 daemon.info hostapd: wlan0: STA c0:bd:d1:d4:2c:26 IEEE 802.11: associated (aid 10)
Mon Feb 15 09:54:22 2016 daemon.info hostapd: wlan0: STA c0:bd:d1:d4:2c:26 WPA: pairwise key handshake completed (RSN)
Mon Feb 15 09:54:23 2016 daemon.info dnsmasq-dhcp[1185]: DHCPREQUEST(br-lan) 192.168.1.129 c0:bd:d1:d4:2c:26
Mon Feb 15 09:54:23 2016 daemon.info dnsmasq-dhcp[1185]: DHCPACK(br-lan) 192.168.1.129 c0:bd:d1:d4:2c:26 android-4fbbdabcb90836b3
Mon Feb 15 09:54:48 2016 daemon.info hostapd: wlan0: STA 80:a5:89:11:6c:01 IEEE 802.11: authenticated
Mon Feb 15 09:54:48 2016 daemon.info hostapd: wlan0: STA 80:a5:89:11:6c:01 IEEE 802.11: associated (aid 11)
Mon Feb 15 09:54:49 2016 daemon.info hostapd: wlan0: STA 80:a5:89:11:6c:01 WPA: pairwise key handshake completed (RSN)
Mon Feb 15 09:54:49 2016 daemon.info dnsmasq-dhcp[1185]: DHCPREQUEST(br-lan) 192.168.1.108 80:a5:89:11:6c:01
Mon Feb 15 09:54:49 2016 daemon.info dnsmasq-dhcp[1185]: DHCPACK(br-lan) 192.168.1.108 80:a5:89:11:6c:01 Jaap-Laptop
Mon Feb 15 09:54:49 2016 daemon.warn odhcpd[831]: DHCPV6 SOLICIT IA_NA from 000100011de950e21cb72c5e0796 on br-lan: ok fdb1:6f8a:b227::f99/128
Mon Feb 15 09:54:49 2016 daemon.info dnsmasq[1185]: read /etc/hosts - 1 addresses
Mon Feb 15 09:54:49 2016 daemon.info dnsmasq[1185]: read /tmp/hosts/odhcpd - 4 addresses
Mon Feb 15 09:54:49 2016 daemon.info dnsmasq[1185]: read /tmp/hosts/dhcp - 1 addresses
Mon Feb 15 09:54:49 2016 daemon.info dnsmasq-dhcp[1185]: read /etc/ethers - 0 addresses
Mon Feb 15 09:54:50 2016 daemon.warn odhcpd[831]: DHCPV6 REQUEST IA_NA from 000100011de950e21cb72c5e0796 on br-lan: ok fdb1:6f8a:b227::f99/128
Mon Feb 15 09:54:50 2016 daemon.info dnsmasq[1185]: read /etc/hosts - 1 addresses
Mon Feb 15 09:54:50 2016 daemon.info dnsmasq[1185]: read /tmp/hosts/odhcpd - 5 addresses
Mon Feb 15 09:54:50 2016 daemon.info dnsmasq[1185]: read /tmp/hosts/dhcp - 1 addresses
Mon Feb 15 09:54:50 2016 daemon.info dnsmasq-dhcp[1185]: read /etc/ethers - 0 addresses

In case it is important, this is what the command "cat /sys/kernel/debug/ieee80211/phy0/ath9k/reset" outputs:

Reset wrote:

    Baseband Hang:  1
Baseband Watchdog: 2199
   Fatal HW Error:  0
      TX HW error:  0
Transmit timeout:  0
     TX Path Hang: 12
      PLL RX Hang:  0
         MAC Hang:  0
     Stuck Beacon: 341
        MCI Reset:  0
Calibration error: 13
Tx DMA stop error: 300
Rx DMA stop error:  0

Another strange symptom. Although it did not lock up this time, I noticed the internet slowed down. I checked the router and noticed a very high load average of 1.86 as can be seen below. There are no processes that are clogging the cpu, as can be seen from the 68% idle percentage. What is causing this?


Top wrote:

Mem: 28812K used, 32416K free, 1272K shrd, 2216K buff, 10296K cached
CPU:   9% usr   3% sys   0% nic  68% idle   0% io   0% irq  18% sirq
Load average: 1.86 0.88 0.37 1/36 17660
  PID  PPID USER     STAT   VSZ %VSZ %CPU COMMAND
   71     2 root     SW       0   0%   1% [kworker/0:1]
25505     1 root     R     1676   3%   0% /usr/sbin/hostapd -P /var/run/wifi-ph
    3     2 root     SW       0   0%   0% [ksoftirqd/0]
  901     1 root     S     1572   3%   0% /usr/sbin/uhttpd -f -h /www -r OpenWr
17570   862 root     S     1220   2%   0% /usr/sbin/dropbear -F -P /var/run/dro
  480     1 root     S      892   1%   0% /sbin/ubusd
  807     1 root     S     1568   3%   0% /sbin/netifd
  773     1 root     S     1532   3%   0% /sbin/rpcd
    1     0 root     S     1408   2%   0% /sbin/procd
  929     1 root     S     1364   2%   0% /usr/sbin/ntpd -n -S /usr/sbin/ntpd-h
17600 17585 root     R     1364   2%   0% top
17585 17570 root     S     1364   2%   0% -ash
1050   807 root     S     1360   2%   0% udhcpc -p /var/run/udhcpc-eth0.pid -s
  831     1 root     S     1160   2%   0% /usr/sbin/odhcpd
  862     1 root     S     1152   2%   0% /usr/sbin/dropbear -F -P /var/run/dro
1741     1 root     S     1120   2%   0% /usr/sbin/miniupnpd -f /var/etc/miniu
  764     1 root     S     1044   2%   0% /sbin/logd -S 16
1185     1 nobody   S      980   2%   0% /usr/sbin/dnsmasq -C /var/etc/dnsmasq
1052   807 root     S      800   1%   0% odhcp6c -s /lib/netifd/dhcpv6.script
  481     1 root     S      772   1%   0% /sbin/askfirst /bin/ash --login

stangri wrote:

Are you aware of/have you tried this: https://forum.openwrt.org/viewtopic.php … 38#p270338 ?

Thanks for your suggestion! Unfortunately, I meant I was using torrents on my Laptop to stress the connection and the sqm-scripts. So there was no transmission running on the router. Sorry for the confusion!

Bump smile

During lockup are you able to ping router via ethernet cable ?
If pings are passing then what happens when  you telnet to port 22 to the router ?
Connection established ?
Can you see SSH strings ?

If cpu is fully loaded in kernel mode then all user processes including hostapd hang because default kernel is non-preemptible. On some systems it also causes reboot by watchdog timer

Thank you for your suggestions smile

bolvan wrote:

During lockup are you able to ping router via ethernet cable ?
If pings are passing then what happens when  you telnet to port 22 to the router ?
Connection established ?
Can you see SSH strings ?

I have no devices hooked up via an ethernet cable, so I have not checked this yet. Next time I run into this issue I will hook up my laptop and check these points.

bolvan wrote:

If cpu is fully loaded in kernel mode then all user processes including hostapd hang because default kernel is non-preemptible. On some systems it also causes reboot by watchdog timer

So what is causing this CPU load in kernel mode? Is there anything I can do to uncover this the next time the average load spikes?

Bump.

Mushoz wrote:

So what is causing this CPU load in kernel mode? Is there anything I can do to uncover this the next time the average load spikes?

Almost all network processing - routing, NAT, iptables, shaping is done in kernel, mostly in sirq handlers.
User mode processing is  SSH, DNS, DHCP, wireless AP (hostapd).
Thats why I asked you to plug ethernet cable. Wifi AP will die if kernel is loaded fully.
Ethernet will not die. Connection will be accepted to already listening socket but wont progress further.
You won't see SSH strings. That proves that kernel is fully loaded.
Or see them after long delay. That proves that kernel is almost fully loaded.
If you see SSH strings it means ssh is working and usermode also is working.

Kernel mode overloading is common problem for many firmwares not just openwrt

(Last edited by bolvan on 17 Feb 2016, 09:42)

bolvan wrote:
Mushoz wrote:

So what is causing this CPU load in kernel mode? Is there anything I can do to uncover this the next time the average load spikes?

Almost all network processing - routing, NAT, iptables, shaping is done in kernel, mostly in sirq handlers.
User mode processing is  SSH, DNS, DHCP, wireless AP (hostapd).
Thats why I asked you to plug ethernet cable. Wifi AP will die if kernel is loaded fully.
Ethernet will not die. Connection will be accepted to already listening socket but wont progress further.
You won't see SSH strings. That proves that kernel is fully loaded.
Or see them after long delay. That proves that kernel is almost fully loaded.
If you see SSH strings it means ssh is working and usermode also is working.

Kernel mode overloading is common problem for many firmwares not just openwrt

Thank you very much for your very clear explanation smile I will monitor my router's behavior and hopefully gather some data on the issue with your method. The issue crops up randomly, so I'm not sure how long before I'm able to catch it acting strangely. I'll post back as soon as possible. Thanks again! smile

I just ran into the problem again this morning. My phone was still connected to wifi again, but unable to access the internet or the router page. My notebook wasn't able to connect to the wifi at all. I immediately hooked up my laptop to the router and tried to ping it. I received <1ms responses. I then telnetted into the router at 192.168.1.1:22 and saw the ssh strings.

I then ssh'd into the router and ran the top command to see what the 20 minute average cpu load was, which was just 0.05. So that looked fine as well. While I was snooping around for clues with my laptop, I repeatedly tried to reload pages on my phone to verify that on the wifi side of things, it was still acting up.

Then to verify my hypothesis that these issues are wifi related, I ran the 'wifi' command to restart the wifi interface. Wifi automatically disconnected from my phone and within a second it reconnected again. Pages loaded up fine from that point on and the issue was resolved.

How do I continue to debug this issue to see what is causing it? And more importantly, is there anything I can do to try to fix it?

Bump.

Bump smile!

Bump smile

I ran into the exact same problem twice today. Wifi became unresponsive for my phone, my laptop's wifi disconnected and was unable to reconnect. Ethernet connections to the router were fine and very fast as usual. The 'wifi' command was able to fix the problem instantly in both cases.

What is causing these wifi lockups? And how can I prevent them from happening in the future?

Mushoz wrote:

What is causing these wifi lockups? And how can I prevent them from happening in the future?

Most likely driver glitches.
I googled for "Unable to reset channel" and found some threads related to another linux distributions.
I'd upgrade to the latest trunk just to check if its fixed in the latest kernel

bolvan wrote:
Mushoz wrote:

What is causing these wifi lockups? And how can I prevent them from happening in the future?

Most likely driver glitches.
I googled for "Unable to reset channel" and found some threads related to another linux distributions.
I'd upgrade to the latest trunk just to check if its fixed in the latest kernel

Bummer. I'll look into the latest trunk. Hopefully this will stability the wifi connection. Thanks again for all the help you have provided me smile

The latest trunk unfortunately didn't fix the issue. I've just opened a ticket about the issue. I'm hoping it can be resolved smile Here's a link to the ticket for those interested: https://dev.openwrt.org/ticket/22008

did you fixed this ?ticket 15407 said disable ani can solve this.but  also other said this doesn't work. 

also:you can try 11g only or disable uapsd?  maybe this 11n problem

(Last edited by fenggui321 on 15 Jul 2017, 07:59)

The discussion might have continued from here.