Bug 216513 - ath11k: IPQ8074: interface down times out with 'failed to flush transmit queue'
Summary: ath11k: IPQ8074: interface down times out with 'failed to flush transmit queue'
Status: NEW
Alias: None
Product: Drivers
Classification: Unclassified
Component: network-wireless (show other bugs)
Hardware: ARM Linux
: P3 high
Assignee: drivers_network-wireless@kernel-bugs.osdl.org
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2022-09-22 08:53 UTC by Robert Marko
Modified: 2025-01-31 05:34 UTC (History)
11 users (show)

See Also:
Kernel Version: 5.15.68
Subsystem:
Regression: No
Bisected commit-id:


Attachments

Description Robert Marko 2022-09-22 08:53:36 UTC
Hi,

I am one of the guys trying to bring modern Qualcomm IPQ807x SoC-s and ath11k support to OpenWrt, however, we are still having issues with ath11k.

Namely, there is an issue that after radio being up for a while trying to stop it for example doing an upgrade will take a long of time until it times out with:


root@OpenWrt:/# service wpad stop
[52465.206256] device wlan0 left promiscuous mode
[52465.206376] br-lan: port 6(wlan0) entered disabled state
root@OpenWrt:/# [52465.379202] device wlan1 left promiscuous mode
[52465.379319] br-lan: port 7(wlan1) entered disabled state
[52470.506522] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 1

This is an issue as it breaks every upgrade mechanism due to sometimes 20 or so second timeout it takes.
This is just one example of the issue, sometimes it times out twice, etc.
It seems to be happening only after the radio has been up for some time and devices have roamed from and to it.

Note that despite kernel version being 5.15.68, we have backported all of the ath11k changes up to Revert "ath11k: add support for hardware rfkill for
 QCA6390" from your ath-next.

Regards,
Robert
Comment 1 Robert Marko 2022-09-22 10:29:36 UTC
I forgot to state that this is on IPQ8074, and FW WLAN.HK.2.5.0.1-01208-QCAHKSWPL_SILICONZ-1 as anything newer is crashing the remoteproc for us
Comment 2 Joachim Banzhaf 2022-09-22 10:55:42 UTC
This is a common issue, also on older kernels. My version currently is 5.15.58 and I see this all the time on my devices.

[113346.372617] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 329
[113346.586626] ath10k_pci 0000:01:00.0: could not get mac80211 beacon, vdev_id: 0 addr: 28:d1:27:4e:56:75
[113346.634517] ath10k_pci 0000:01:00.0: mac flush null vif, drop 0 queues 0xffff
[113346.754534] br-lan: port 6(wlan0) entered disabled state
[113351.652600] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 21
[113351.703231] br-lan: port 7(wlan1) entered disabled state
[113351.743035] device wlan0 left promiscuous mode
[113351.743087] br-lan: port 6(wlan0) entered disabled state
[113351.843405] device wlan1 left promiscuous mode
[113351.843459] br-lan: port 7(wlan1) entered disabled state
Comment 3 Tiago Peralta 2022-09-30 18:12:50 UTC
Running 5.15.69, exactly same issue

root@Vision:~# uname -a
Linux Vision 5.15.69 #0 SMP Wed Sep 28 09:58:38 2022 aarch64 GNU/Linux
root@Vision:~#

[42095.697467] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 7
[42096.283197] br-lan: port 5(wlan1) entered blocking state
[42096.283226] br-lan: port 5(wlan1) entered disabled state
[42096.283513] device wlan1 entered promiscuous mode
[42096.283627] br-lan: port 5(wlan1) entered blocking state
[42096.283638] br-lan: port 5(wlan1) entered forwarding state
[42096.807893] br-lan: port 5(wlan1) entered disabled state
[42097.265277] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready
[42097.265462] br-lan: port 5(wlan1) entered blocking state
[42097.265475] br-lan: port 5(wlan1) entered forwarding state
[43732.668008] device wlan1 left promiscuous mode
[43732.668162] br-lan: port 5(wlan1) entered disabled state
[43737.779516] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 7
[43738.367215] br-lan: port 5(wlan1) entered blocking state
[43738.367241] br-lan: port 5(wlan1) entered disabled state
[43738.367488] device wlan1 entered promiscuous mode
[43738.367580] br-lan: port 5(wlan1) entered blocking state
[43738.367590] br-lan: port 5(wlan1) entered forwarding state
[43738.879785] br-lan: port 5(wlan1) entered disabled state
[43739.336850] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready
[43739.337032] br-lan: port 5(wlan1) entered blocking state
[43739.337048] br-lan: port 5(wlan1) entered forwarding state
[44288.666161] device wlan1 left promiscuous mode
[44288.666320] br-lan: port 5(wlan1) entered disabled state
[44293.780294] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 7

Can easily replicate this on a network with some traffic.

Also there seems to be some kind of memory leak, I need to reboot the router every day, sometimes twice to prevent oom
Comment 4 Kalle Valo 2023-03-08 08:51:43 UTC
Is this still happening?
Comment 5 Robert Marko 2023-03-08 09:55:33 UTC
Yes, this is still present
Comment 6 Christian Marangi (Ansuel) 2023-03-21 13:37:55 UTC
Kalle if you want some additional info (since I tried for days to bisect this)

To me it seems some packet are getting lost on the track... I got a good way to repro this but doesn't work 100% of the times.

From what I notice the real problem is not in the failed to flush... but something more dramatic and problematic.

In theory this latent bug on the long run may cause OOM and memory leak and at the very end fw crashing, but this would take month.

To me it really seems a fw problem so we can't really do anything in the driver side.

The bug is that packet set in the tx data ring in some very specific case are not transmitted to the tx completion ring.

This cause packet in the idr list to never be freed.

When the tx flush function is called, num_tx_pending never goes to 0 (as the packets are lost way before and the entire logic of 'free the packet that still needs to be handled' fail) and the function tiemouts.

As you can see the number are not so big, 7... 15...worst result we had was 300 but also that is not a big number (considering the amount of packet are handled)
(but still this is problematic for many reason, one of all... In the worst condition the idr is filled and nothing is transmitted)


I did multiple test...
1. Reduce ring to 1 (my theory was a locking problem and some idr were freed with a different index)
2. Disable the peer migration patch (the bug was already there before)
3. Use the debug reg to force the use of specific ring (theory fw has some problem internally in using the wrong ring out of some packet corruption?)

Nothing manage to solve this.


To repro is quite simple:
1. Create an AP
2. Connect a client to it
3. Disconnect the client
4. repeat untile the packet gets stuck


I really think this can be tracked and solved only on your side since debug mask and checking dumping the ring are needed to understand wth happen when the packet gets stuck and doesn't go to the completion ring.
Comment 7 Maharaja Kennadyrajan 2023-05-10 06:53:42 UTC
Hi @Robert,

Are you seeing this issue with latest TOT with master branch with latest firmware revision 2.7.0.1?

If the issue is seen with latest TOT, can you enable the debug_mask with 0x201A (/sys/module/ath11k/parameters/debug_mask) during the issue time and share the logs.
Comment 8 Selu 2024-08-25 07:26:46 UTC
Hi,

with a Dynalink DL-WRX36 router running kernel 5.15.162 on OpenWrt 23.05.4 using firmware version 

fw_version 0x290604a5 fw_build_timestamp 2023-10-12 02:06 fw_build_id WLAN.HK.2.9.0.1-01977-QCAHKSWPL_SILICONZ-1

Still getting the errors:

[Fri Aug 16 18:02:27 2024] 0x00000db00000-0x00000e400000 : "0:wififw"
[Fri Aug 16 18:02:27 2024] 0x000007100000-0x000007a00000 : "0:wififw_1"
[Fri Aug 16 18:02:34 2024] ath11k c000000.wifi: ipq8074 hw2.0
[Fri Aug 16 18:02:34 2024] ath11k c000000.wifi: FW memory mode: 0
[Fri Aug 16 18:02:35 2024] ath11k c000000.wifi: qmi ignore invalid mem req type 3
[Fri Aug 16 18:02:35 2024] ath11k c000000.wifi: chip_id 0x0 chip_family 0x0 board_id 0xff soc_id 0xffffffff
[Fri Aug 16 18:02:35 2024] ath11k c000000.wifi: fw_version 0x290604a5 fw_build_timestamp 2023-10-12 02:06 fw_build_id WLAN.HK.2.9.0.1-01977-QCAHKSWPL_SILICONZ-1
[Fri Aug 16 18:02:35 2024] ath11k c000000.wifi: htt event 48 not handled
[Sat Aug 17 12:34:03 2024] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 1
[Mon Aug 19 06:10:27 2024] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 1
[Mon Aug 19 07:35:50 2024] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 5
[Mon Aug 19 07:45:52 2024] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 1
[Mon Aug 19 09:54:17 2024] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 1
[Mon Aug 19 13:58:51 2024] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 3
[Mon Aug 19 21:53:16 2024] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 1
[Mon Aug 19 23:37:32 2024] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 3
[Tue Aug 20 00:23:17 2024] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 4
[Tue Aug 20 16:57:37 2024] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 1
[Fri Aug 23 15:09:37 2024] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 1
[Sat Aug 24 11:08:01 2024] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 1
[Sat Aug 24 13:53:32 2024] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
[Sat Aug 24 15:29:27 2024] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 1
[Sat Aug 24 22:54:22 2024] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 3


And more important losing the mDNS, DHCP, DNS packets for some hours.

I tried setting the mask:

root@openwrt:~# cat /sys/module/ath11k/parameters/debug_mask
8218

But nothing else is displayed.

Regards,

JL
Comment 9 George M 2025-01-31 05:29:27 UTC
Hi,

Has this been resolved? I'm also seeing this on IPQ5018 wifi. I've tested multiple FW versions, the most stable being WLAN.HK.2.7.0.1-01744-QCAHKSWPL_SILICONZ-1.

[36126.313005] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 1
[128678.553300] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 1

On the same IPQ5018 boards, I also see this happening with QCN9024 wifi with FW version WLAN.HK.2.9.0.1-02146-QCAHKSWPL_SILICONZ-1

[38325.353010] ath11k_pci 0001:01:00.0: failed to flush transmit queue, data pkts pending 1
[39568.232973] ath11k_pci 0001:01:00.0: failed to flush transmit queue, data pkts pending 4

eventually, the FW crashes, this could take days to weeks or even over a month.

I do notice that I observe this more frequently with Intel AX201 clients.

BR,
George
Comment 10 George M 2025-01-31 05:34:26 UTC
Not 100% sure it is the same issue, but I've also see this occur:

[130907.016759] qcom-q6-mpd cd00000.remoteproc: fatal error received: err_smem_ver.2.1:
[130907.016759] QC Image Version : QC_IMAGE_VERSION_STRING=WLAN.HK.2.7.0.1-01744-QCAHKSWPL_SILICONZ-1
[130907.016759] Image Variant : IMAGE_VARIANT_STRING=5018.wlanfw2.map_spr_spr_evalQ
[130907.016759] ar_wal_peer.c:2899 Assertion is_graceful_to_handle failed param0 :zero,param1 :zero,param2 :zero
[130907.016759] Thread ID : 0x00000053 Thread name : WLAN RT0 Process ID : 0x00000001 Process name :wlan0
[130907.016759]
[130907.016759] Registers:
[130907.016759] SP : 0x4c536530
[130907.016759] FP : 0x4c536648
[130907.016759] PC : 0xb023e830
[130907.016759] SSR : 0x00000000
[130907.016759] BADVA : 0x00000000
[130907.016759] LR : 0xb009f228
[130907.016759]
[130907.016759] StackDump
[130907.016759] from:0x4c536530
[130907.016759] to: 0x00000000:
[130907.016759]
[130907.071405] remoteproc remoteproc0: crash detected in cd00000.remoteproc: type fatal error
[130907.092904] remoteproc remoteproc0: handling crash #1 in cd00000.remoteproc
[130907.100427] remoteproc remoteproc0: recovering cd00000.remoteproc
[130907.117147] remoteproc remoteproc0: stopped remote processor cd00000.remoteproc
[130907.199765] ath11k c000000.wifi: failed to find peer 3c:e9:f7:53:84:f5 on vdev 2 after creation
[130907.199847] ath11k c000000.wifi: failed to find peer vdev_id 2 addr 3c:e9:f7:53:84:f5 in delete
[130907.208051] ath11k c000000.wifi: failed peer 3c:e9:f7:53:84:f5 delete vdev_id 2 fallback ret -22
[130907.216496] ath11k c000000.wifi: Failed to add peer: 3c:e9:f7:53:84:f5 for VDEV: 2
[130907.225236] ath11k c000000.wifi: Failed to add station: 3c:e9:f7:53:84:f5 for VDEV: 2
[130907.233715] remoteproc remoteproc0: remote processor cd00000.remoteproc is now up
[130907.247626] ath11k c000000.wifi: failed to submit WMI_PEER_CREATE cmd
[130907.248195] ath11k c000000.wifi: failed to send peer create vdev_id 2 ret -108
[130907.254769] ath11k c000000.wifi: Failed to add peer: 3c:e9:f7:53:84:f5 for VDEV: 2
[130907.261907] ath11k c000000.wifi: Failed to add station: 3c:e9:f7:53:84:f5 for VDEV: 2
[130907.317934] ath11k c000000.wifi: failed to submit WMI_PEER_CREATE cmd
[130907.318047] ath11k c000000.wifi: failed to send peer create vdev_id 2 ret -108
[130907.323651] ath11k c000000.wifi: Failed to add peer: 3c:e9:f7:53:84:f5 for VDEV: 2
[130907.365313] phy0-ap0: HW problem - can not stop rx aggregation for 3c:e9:f7:53:84:f5 tid 0
[130907.423396] ------------[ cut here ]------------
[130907.423441] WARNING: CPU: 0 PID: 1425 at backports-6.12.6/net/mac80211/sta_info.c:1466 sta_set_sinfo+0xc30/0xc54 [mac80211]
[130907.427098] Modules linked in: pppoe ppp_async nft_fib_inet nf_flow_table_inet batman_adv(O) ath11k_pci(O) ath11k_ahb(O) ath11k(O) wireguard pppox ppp_generic nft_reject_ipv6 nft_reject_ipv4 nft_reject_inet nft_reject nft_redir nft_quota nft_numgen nft_nat nft_masq nft_log nft_limit nft_hash nft_flow_offload nft_fib_ipv6 nft_fib_ipv4 nft_fib nft_ct nft_chain_nat nf_tables nf_nat nf_flow_table nf_conntrack mac80211(O) libchacha20poly1305 chacha_neon cfg80211(O) slhc qrtr_smd qrtr_mhi qrtr qmi_helpers(O) poly1305_neon nfnetlink nf_reject_ipv6 nf_reject_ipv4 nf_log_syslog nf_defrag_ipv6 nf_defrag_ipv4 mhi mdio_netlink(O) libcurve25519_generic libcrc32c libchacha hwmon crc_ccitt compat(O) ip6_udp_tunnel udp_tunnel sha512_generic sha512_arm64 seqiv sha3_generic jitterentropy_rng drbg michael_mic hmac geniv cmac leds_gpio xhci_plat_hcd xhci_pci xhci_hcd dwc3 dwc3_qcom qca_nss_dp(O) qca_ssdk(O) gpio_button_hotplug(O) ext4 mbcache jbd2 crc32c_generic
[130907.499566] CPU: 0 PID: 1425 Comm: hostapd Tainted: G           O       6.6.74 #0
[130907.521796] Hardware name: Linksys SPNMX56 (DT)
[130907.529260] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[130907.534035] pc : sta_set_sinfo+0xc30/0xc54 [mac80211]
[130907.541064] lr : sta_set_sinfo+0xc2c/0xc54 [mac80211]
[130907.546013] sp : ffffffc082bcb850
[130907.551131] x29: ffffffc082bcb850 x28: ffffff8000dae000 x27: ffffffc082bcbdc8
[130907.554520] x26: 0000000000000004 x25: ffffffc079042000 x24: ffffffc080d2fa00
[130907.561726] x23: ffffff8005a65b00 x22: ffffff8011144900 x21: ffffff80051c08c0
[130907.568930] x20: 0000000000000001 x19: ffffff80192dc000 x18: 0000000000000211
[130907.576135] x17: 3a37663a39653a63 x16: 3320726f66206e6f x15: 00d32962cf5b1438
[130907.583339] x14: 00d40352b13b19f0 x13: 0000000000000369 x12: 0000000000000002
[130907.590544] x11: ffffffc079278260 x10: ffffffc082bcb730 x9 : ffffffc082bcb750
[130907.597750] x8 : 0000000000000024 x7 : ffffff8017a48000 x6 : 0000000000008e18
[130907.604954] x5 : ffffffbf9f3c8000 x4 : 0000000000000000 x3 : ffffff8000dae000
[130907.612159] x2 : 0000000000000000 x1 : ffffff8000dae000 x0 : 00000000ffffff94
[130907.619365] Call trace:
[130907.626566]  sta_set_sinfo+0xc30/0xc54 [mac80211]
[130907.629259]  sta_info_destroy_addr_bss+0x34/0x48 [mac80211]
[130907.633860]  ieee80211_obss_color_collision_notify+0x15c4/0x1bf8 [mac80211]
[130907.639679]  cfg80211_check_station_change+0x15b8/0x2a04 [cfg80211]
[130907.646709]  genl_family_rcv_msg_doit+0xac/0x114
[130907.653042]  genl_rcv_msg+0x1b4/0x24c
[130907.657642]  netlink_rcv_skb+0x60/0x130
[130907.661288]  genl_rcv+0x38/0x50
[130907.665368]  netlink_unicast+0x1e8/0x2d4
[130907.668579]  netlink_sendmsg+0x19c/0x3d4
[130907.672485]  ____sys_sendmsg+0x1cc/0x27c
[130907.676479]  ___sys_sendmsg+0x80/0xc8
[130907.680472]  __sys_sendmsg+0x48/0xa8
[130907.684118]  __arm64_sys_sendmsg+0x24/0x30
[130907.687850]  invoke_syscall.constprop.0+0x5c/0x108
[130907.691844]  do_el0_svc+0x40/0xc8
[130907.696703]  el0_svc+0x28/0x9c
[130907.700175]  el0t_64_sync_handler+0x120/0x12c
[130907.703215]  el0t_64_sync+0x178/0x17c
[130907.707732] ---[ end trace 0000000000000000 ]---
[130914.553256] ath11k_warn: 87 callbacks suppressed
[130914.553301] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
[130914.568184] ath11k c000000.wifi: failed to send WMI_PDEV_BSS_CHAN_INFO_REQUEST cmd
[130914.568258] ath11k c000000.wifi: failed to send pdev bss chan info request
[130914.575223] ath11k c000000.wifi: failed to send WMI_PDEV_SET_PARAM cmd
[130914.581626] ath11k c000000.wifi: Failed to set beacon mode for VDEV: 0
[130914.588361] ath11k c000000.wifi: failed to send WMI_BCN_TMPL_CMDID
[130914.594876] ath11k c000000.wifi: failed to submit beacon template command: -108
[130914.601066] ath11k c000000.wifi: failed to update bcn template: -108
[130914.608755] ath11k c000000.wifi: failed to send WMI_VDEV_SET_PARAM_CMDID
[130914.615079] ath11k c000000.wifi: failed to set BA BUFFER SIZE 256 for vdev: 0
[130916.557420] phy0-ap0: HW problem - can not stop rx aggregation for 5c:22:da:30:9f:90 tid 0
[130916.557478] phy0-ap0: HW problem - can not stop rx aggregation for 5c:22:da:30:9f:90 tid 3
[130916.564876] phy0-ap0: HW problem - can not stop rx aggregation for 5c:22:da:30:9f:90 tid 7
[130916.613252] phy0-ap0: failed to remove key (0, 5c:22:da:30:9f:90) from hardware (-108)
[130916.613528] ------------[ cut here ]------------
[130916.620076] WARNING: CPU: 0 PID: 1425 at backports-6.12.6/net/mac80211/sta_info.c:1458 sta_set_sinfo+0xc08/0xc54 [mac80211]
[130916.624945] Modules linked in: pppoe ppp_async nft_fib_inet nf_flow_table_inet batman_adv(O) ath11k_pci(O) ath11k_ahb(O) ath11k(O) wireguard pppox ppp_generic nft_reject_ipv6 nft_reject_ipv4 nft_reject_inet nft_reject nft_redir nft_quota nft_numgen nft_nat nft_masq nft_log nft_limit nft_hash nft_flow_offload nft_fib_ipv6 nft_fib_ipv4 nft_fib nft_ct nft_chain_nat nf_tables nf_nat nf_flow_table nf_conntrack mac80211(O) libchacha20poly1305 chacha_neon cfg80211(O) slhc qrtr_smd qrtr_mhi qrtr qmi_helpers(O) poly1305_neon nfnetlink nf_reject_ipv6 nf_reject_ipv4 nf_log_syslog nf_defrag_ipv6 nf_defrag_ipv4 mhi mdio_netlink(O) libcurve25519_generic libcrc32c libchacha hwmon crc_ccitt compat(O) ip6_udp_tunnel udp_tunnel sha512_generic sha512_arm64 seqiv sha3_generic jitterentropy_rng drbg michael_mic hmac geniv cmac leds_gpio xhci_plat_hcd xhci_pci xhci_hcd dwc3 dwc3_qcom qca_nss_dp(O) qca_ssdk(O) gpio_button_hotplug(O) ext4 mbcache jbd2 crc32c_generic
[130916.697416] CPU: 0 PID: 1425 Comm: hostapd Tainted: G        W  O       6.6.74 #0
[130916.719643] Hardware name: Linksys SPNMX56 (DT)
[130916.727107] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[130916.731882] pc : sta_set_sinfo+0xc08/0xc54 [mac80211]
[130916.738913] lr : sta_set_sinfo+0xb60/0xc54 [mac80211]
[130916.743860] sp : ffffffc082bcb850
[130916.748979] x29: ffffffc082bcb850 x28: ffffff8000dae000 x27: ffffffc082bcbdc8
[130916.752368] x26: 0000000000000004 x25: ffffffc079042000 x24: ffffffc080d2fa00
[130916.759574] x23: ffffff80072abb00 x22: ffffff8011144900 x21: ffffff80051c08c0
[130916.766779] x20: 0000000000000001 x19: ffffff8016d8b000 x18: 0000000000000248
[130916.773984] x17: 7764726168206d6f x16: 7266202930393a66 x15: ffffffc080c2bdf0
[130916.781187] x14: 00000000000006d8 x13: 0000000000000248 x12: 00000000ffffffea
[130916.788392] x11: ffffffc079278398 x10: ffffffc082bcb700 x9 : ffffffc082bcb720
[130916.795598] x8 : 00000000ffffffd0 x7 : 0000000016161f41 x6 : 0000000000000000
[130916.802802] x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffffff8000dae000
[130916.810008] x2 : 0000000000000000 x1 : ffffff8000dae000 x0 : 00000000ffffff94
[130916.817214] Call trace:
[130916.824414]  sta_set_sinfo+0xc08/0xc54 [mac80211]
[130916.827107]  sta_info_destroy_addr_bss+0x34/0x48 [mac80211]
[130916.831708]  ieee80211_obss_color_collision_notify+0x15c4/0x1bf8 [mac80211]
[130916.837525]  cfg80211_check_station_change+0x15b8/0x2a04 [cfg80211]
[130916.844556]  genl_family_rcv_msg_doit+0xac/0x114
[130916.850891]  genl_rcv_msg+0x1b4/0x24c
[130916.855490]  netlink_rcv_skb+0x60/0x130
[130916.859135]  genl_rcv+0x38/0x50
[130916.863214]  netlink_unicast+0x1e8/0x2d4
[130916.866427]  netlink_sendmsg+0x19c/0x3d4
[130916.870334]  ____sys_sendmsg+0x1cc/0x27c
[130916.874326]  ___sys_sendmsg+0x80/0xc8
[130916.878319]  __sys_sendmsg+0x48/0xa8
[130916.881965]  __arm64_sys_sendmsg+0x24/0x30
[130916.885699]  invoke_syscall.constprop.0+0x5c/0x108
[130916.889692]  do_el0_svc+0x40/0xc8
[130916.894551]  el0_svc+0x28/0x9c
[130916.898023]  el0t_64_sync_handler+0x120/0x12c
[130916.901063]  el0t_64_sync+0x178/0x17c
[130916.905578] ---[ end trace 0000000000000000 ]---
[130916.912502] ------------[ cut here ]------------
[130916.914089] WARNING: CPU: 0 PID: 1425 at backports-6.12.6/net/mac80211/sta_info.c:427 sta_info_free+0xa8/0x120 [mac80211]
[130916.918781] Modules linked in: pppoe ppp_async nft_fib_inet nf_flow_table_inet batman_adv(O) ath11k_pci(O) ath11k_ahb(O) ath11k(O) wireguard pppox ppp_generic nft_reject_ipv6 nft_reject_ipv4 nft_reject_inet nft_reject nft_redir nft_quota nft_numgen nft_nat nft_masq nft_log nft_limit nft_hash nft_flow_offload nft_fib_ipv6 nft_fib_ipv4 nft_fib nft_ct nft_chain_nat nf_tables nf_nat nf_flow_table nf_conntrack mac80211(O) libchacha20poly1305 chacha_neon cfg80211(O) slhc qrtr_smd qrtr_mhi qrtr qmi_helpers(O) poly1305_neon nfnetlink nf_reject_ipv6 nf_reject_ipv4 nf_log_syslog nf_defrag_ipv6 nf_defrag_ipv4 mhi mdio_netlink(O) libcurve25519_generic libcrc32c libchacha hwmon crc_ccitt compat(O) ip6_udp_tunnel udp_tunnel sha512_generic sha512_arm64 seqiv sha3_generic jitterentropy_rng drbg michael_mic hmac geniv cmac leds_gpio xhci_plat_hcd xhci_pci xhci_hcd dwc3 dwc3_qcom qca_nss_dp(O) qca_ssdk(O) gpio_button_hotplug(O) ext4 mbcache jbd2 crc32c_generic
[130916.991077] CPU: 0 PID: 1425 Comm: hostapd Tainted: G        W  O       6.6.74 #0
[130917.013308] Hardware name: Linksys SPNMX56 (DT)
[130917.020770] pstate: 20400005 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[130917.025545] pc : sta_info_free+0xa8/0x120 [mac80211]
[130917.032576] lr : sta_info_free+0x38/0x120 [mac80211]
[130917.037523] sp : ffffffc082bcb830
[130917.042555] x29: ffffffc082bcb830 x28: ffffff8000dae000 x27: ffffffc082bcbdc8
[130917.045858] x26: 0000000000000004 x25: ffffffc079042000 x24: ffffffc080d2fa00
[130917.053063] x23: ffffff80072abb00 x22: ffffff8011144900 x21: ffffff80051c08c0
[130917.060267] x20: ffffff8016d8b000 x19: 000000000000000f x18: 0cea122a0dac8927
[130917.067473] x17: 000000000b9f76c0 x16: 0675091506d65a47 x15: 00028d0b569ae824
[130917.074678] x14: ffffffc080d2fa68 x13: 0000000000000289 x12: 0000000000000002
[130917.081882] x11: 0000000000000000 x10: 0000000000000400 x9 : 0000015bbf99a684
[130917.089087] x8 : 0000000000000800 x7 : ffffff8016d8bc1a x6 : ffffffc080c1da98
[130917.096292] x5 : ffffffc080b00400 x4 : 0000000000000000 x3 : 0000000000000000
[130917.103496] x2 : 0000000000000000 x1 : 0000000000000003 x0 : 0000000004100193
[130917.110704] Call trace:
[130917.117902]  sta_info_free+0xa8/0x120 [mac80211]
[130917.120595]  sta_set_sinfo+0xbf4/0xc54 [mac80211]
[130917.125198]  sta_info_destroy_addr_bss+0x34/0x48 [mac80211]
[130917.129884]  ieee80211_obss_color_collision_notify+0x15c4/0x1bf8 [mac80211]
[130917.135703]  cfg80211_check_station_change+0x15b8/0x2a04 [cfg80211]
[130917.142733]  genl_family_rcv_msg_doit+0xac/0x114
[130917.149067]  genl_rcv_msg+0x1b4/0x24c
[130917.153666]  netlink_rcv_skb+0x60/0x130
[130917.157312]  genl_rcv+0x38/0x50
[130917.161391]  netlink_unicast+0x1e8/0x2d4
[130917.164605]  netlink_sendmsg+0x19c/0x3d4
[130917.168510]  ____sys_sendmsg+0x1cc/0x27c
[130917.172504]  ___sys_sendmsg+0x80/0xc8
[130917.176496]  __sys_sendmsg+0x48/0xa8
[130917.180142]  __arm64_sys_sendmsg+0x24/0x30
[130917.183875]  invoke_syscall.constprop.0+0x5c/0x108
[130917.187869]  do_el0_svc+0x40/0xc8
[130917.192728]  el0_svc+0x28/0x9c
[130917.196201]  el0t_64_sync_handler+0x120/0x12c
[130917.199239]  el0t_64_sync+0x178/0x17c
[130917.203754] ---[ end trace 0000000000000000 ]---
[130917.216591] ------------[ cut here ]------------
[130917.216635] sta_info_move_state() returned -2
[130917.225312] WARNING: CPU: 0 PID: 1425 at backports-6.12.6/net/mac80211/sta_info.c:430 sta_info_free+0x118/0x120 [mac80211]
[130917.225473] Modules linked in: pppoe ppp_async nft_fib_inet nf_flow_table_inet batman_adv(O) ath11k_pci(O) ath11k_ahb(O) ath11k(O) wireguard pppox ppp_generic nft_reject_ipv6 nft_reject_ipv4 nft_reject_inet nft_reject nft_redir nft_quota nft_numgen nft_nat nft_masq nft_log nft_limit nft_hash nft_flow_offload nft_fib_ipv6 nft_fib_ipv4 nft_fib nft_ct nft_chain_nat nf_tables nf_nat nf_flow_table nf_conntrack mac80211(O) libchacha20poly1305 chacha_neon cfg80211(O) slhc qrtr_smd qrtr_mhi qrtr qmi_helpers(O) poly1305_neon nfnetlink nf_reject_ipv6 nf_reject_ipv4 nf_log_syslog nf_defrag_ipv6 nf_defrag_ipv4 mhi mdio_netlink(O) libcurve25519_generic libcrc32c libchacha hwmon crc_ccitt compat(O) ip6_udp_tunnel udp_tunnel sha512_generic sha512_arm64 seqiv sha3_generic jitterentropy_rng drbg michael_mic hmac geniv cmac leds_gpio xhci_plat_hcd xhci_pci xhci_hcd dwc3 dwc3_qcom qca_nss_dp(O) qca_ssdk(O) gpio_button_hotplug(O) ext4 mbcache jbd2 crc32c_generic
[130917.297100] CPU: 0 PID: 1425 Comm: hostapd Tainted: G        W  O       6.6.74 #0
[130917.319331] Hardware name: Linksys SPNMX56 (DT)
[130917.326796] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[130917.331569] pc : sta_info_free+0x118/0x120 [mac80211]
[130917.338599] lr : sta_info_free+0x118/0x120 [mac80211]
[130917.343547] sp : ffffffc082bcb830
[130917.348665] x29: ffffffc082bcb830 x28: ffffff8000dae000 x27: ffffffc082bcbdc8
[130917.352055] x26: 0000000000000004 x25: ffffffc079042000 x24: ffffffc080d2fa00
[130917.359260] x23: ffffff80072abb00 x22: ffffff8011144900 x21: ffffff80051c08c0
[130917.366465] x20: ffffff8016d8b000 x19: 000000000000000f x18: 000000000000029b
[130917.373670] x17: 0003aaaa0028c512 x16: 1e004a008f70001a x15: ffffffc080c2bdf0
[130917.380875] x14: 00000000000007d1 x13: 000000000000029b x12: 00000000ffffffea
[130917.388080] x11: 00000000ffffefff x10: ffffffc080c83df0 x9 : ffffffc080c2bd98
[130917.395284] x8 : 0000000000017fe8 x7 : c0000000ffffefff x6 : 0000000000000001
[130917.402490] x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000
[130917.409694] x2 : ffffff801fec0490 x1 : ffffffbf9f3c8000 x0 : 0000000000000021
[130917.416900] Call trace:
[130917.424101]  sta_info_free+0x118/0x120 [mac80211]
[130917.426794]  sta_set_sinfo+0xbf4/0xc54 [mac80211]
[130917.431393]  sta_info_destroy_addr_bss+0x34/0x48 [mac80211]
[130917.436169]  ieee80211_obss_color_collision_notify+0x15c4/0x1bf8 [mac80211]
[130917.441987]  cfg80211_check_station_change+0x15b8/0x2a04 [cfg80211]
[130917.449017]  genl_family_rcv_msg_doit+0xac/0x114
[130917.455351]  genl_rcv_msg+0x1b4/0x24c
[130917.459950]  netlink_rcv_skb+0x60/0x130
[130917.463597]  genl_rcv+0x38/0x50
[130917.467675]  netlink_unicast+0x1e8/0x2d4
[130917.470889]  netlink_sendmsg+0x19c/0x3d4
[130917.474794]  ____sys_sendmsg+0x1cc/0x27c
[130917.478788]  ___sys_sendmsg+0x80/0xc8
[130917.482781]  __sys_sendmsg+0x48/0xa8
[130917.486426]  __arm64_sys_sendmsg+0x24/0x30
[130917.490159]  invoke_syscall.constprop.0+0x5c/0x108
[130917.494153]  do_el0_svc+0x40/0xc8
[130917.499012]  el0_svc+0x28/0x9c
[130917.502484]  el0t_64_sync_handler+0x120/0x12c
[130917.505524]  el0t_64_sync+0x178/0x17c
[130917.510039] ---[ end trace 0000000000000000 ]---
[130920.622258] ath11k_warn: 73 callbacks suppressed
[130920.622296] ath11k c000000.wifi: failed to send WMI_PDEV_BSS_CHAN_INFO_REQUEST cmd
[130920.626098] ath11k c000000.wifi: failed to send pdev bss chan info request
[130920.634077] ath11k c000000.wifi: failed to send WMI_PDEV_SET_PARAM cmd
[130920.640397] ath11k c000000.wifi: Failed to set beacon mode for VDEV: 0
[130920.647101] ath11k c000000.wifi: failed to send WMI_BCN_TMPL_CMDID
[130920.653656] ath11k c000000.wifi: failed to submit beacon template command: -108
[130920.659840] ath11k c000000.wifi: failed to update bcn template: -108
[130920.667537] ath11k c000000.wifi: failed to send WMI_VDEV_SET_PARAM_CMDID
[130920.673859] ath11k c000000.wifi: failed to set BA BUFFER SIZE 256 for vdev: 0
[130920.680590] ath11k c000000.wifi: failed to send WMI_VDEV_SET_PARAM_CMDID
[130926.688243] ath11k_warn: 53 callbacks suppressed

Note You need to log in before you can comment on or make changes to this bug.