#19316: ath10k_pci 0000:01:00.0: failed to process fft report: -22
----------------------+------------------------
  Reporter:  kevindb  |      Owner:  developers
      Type:  defect   |     Status:  new
  Priority:  normal   |  Milestone:
 Component:  kernel   |    Version:  Trunk
Resolution:           |   Keywords:  ath10k fft
----------------------+------------------------

Comment (by el_goretto):

 Additionnal info to the previous comment (that was mine): it is not
 related to scan operations.


 After several days on channel 48 (no DFS required), I had no {{{failed to
 process fft report: -22}}} log entry and the channel was stable.
 I changed the channel yesterday (first line of the following log entries)
 to auto (which resulted in channel 116 being selected when {{{wlan0: link
 becomes ready}}} shows up) and the issue happened again (wlan0 is the
 ath10k interface):

 {{{
 Wed Apr  1 23:03:32 2015 kern.info kernel: [354367.090000] device wlan0
 left promiscuous mode
 Wed Apr  1 23:03:32 2015 kern.info kernel: [354367.100000] br-lan: port
 2(wlan0) entered disabled state
 Wed Apr  1 23:03:32 2015 daemon.notice netifd: Network device 'wlan0' link
 is down
 Wed Apr  1 23:03:33 2015 kern.warn kernel: [354368.440000] ath10k_pci
 0000:01:00.0: otp stream is empty, using board.bin contents
 Wed Apr  1 23:03:35 2015 kern.info kernel: [354369.550000] IPv6:
 ADDRCONF(NETDEV_UP): wlan0: link is not ready
 Wed Apr  1 23:03:35 2015 kern.info kernel: [354369.570000] device wlan0
 entered promiscuous mode
 Wed Apr  1 23:03:37 2015 daemon.info hostapd: wlan1: STA d8:50:e6:81:42:6b
 IEEE 802.11: authenticated
 Wed Apr  1 23:03:37 2015 daemon.info hostapd: wlan1: STA d8:50:e6:81:42:6b
 IEEE 802.11: associated (aid 1)
 Wed Apr  1 23:03:37 2015 daemon.info hostapd: wlan1: STA d8:50:e6:81:42:6b
 RADIUS: starting accounting session 5516F506-00000007
 Wed Apr  1 23:03:37 2015 daemon.info hostapd: wlan1: STA d8:50:e6:81:42:6b
 WPA: pairwise key handshake completed (RSN)
 Wed Apr  1 23:04:57 2015 kern.info kernel: [354451.690000] br-lan: port
 2(wlan0) entered forwarding state
 Wed Apr  1 23:04:57 2015 kern.info kernel: [354451.700000] br-lan: port
 2(wlan0) entered forwarding state
 Wed Apr  1 23:04:57 2015 kern.info kernel: [354451.710000] IPv6:
 ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
 Wed Apr  1 23:04:57 2015 daemon.notice netifd: Network device 'wlan0' link
 is up
 Wed Apr  1 23:04:59 2015 kern.info kernel: [354453.700000] br-lan: port
 2(wlan0) entered forwarding state
 Wed Apr  1 23:06:15 2015 daemon.info hostapd: wlan1: STA d8:50:e6:81:42:6b
 IEEE 802.11: disassociated
 Wed Apr  1 23:06:16 2015 daemon.info hostapd: wlan1: STA d8:50:e6:81:42:6b
 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
 Wed Apr  1 23:06:21 2015 daemon.info hostapd: wlan0: STA d8:50:e6:81:42:6b
 IEEE 802.11: authenticated
 Wed Apr  1 23:06:21 2015 daemon.info hostapd: wlan0: STA d8:50:e6:81:42:6b
 IEEE 802.11: associated (aid 1)
 Wed Apr  1 23:06:21 2015 daemon.info hostapd: wlan0: STA d8:50:e6:81:42:6b
 RADIUS: starting accounting session 551C5D78-00000000
 Wed Apr  1 23:06:21 2015 daemon.info hostapd: wlan0: STA d8:50:e6:81:42:6b
 WPA: pairwise key handshake completed (RSN)
 Wed Apr  1 23:14:56 2015 daemon.info hostapd: wlan0: STA d8:50:e6:81:42:6b
 WPA: group key handshake completed (RSN)
 Wed Apr  1 23:24:56 2015 daemon.info hostapd: wlan0: STA d8:50:e6:81:42:6b
 WPA: group key handshake completed (RSN)
 Wed Apr  1 23:34:56 2015 daemon.info hostapd: wlan0: STA d8:50:e6:81:42:6b
 WPA: group key handshake completed (RSN)
 Wed Apr  1 23:36:17 2015 daemon.info hostapd: wlan0: STA d8:50:e6:81:42:6b
 IEEE 802.11: disassociated
 Wed Apr  1 23:36:18 2015 daemon.info hostapd: wlan0: STA d8:50:e6:81:42:6b
 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
 Thu Apr  2 08:54:58 2015 daemon.info hostapd: wlan1: STA d8:50:e6:81:42:6b
 IEEE 802.11: authenticated
 Thu Apr  2 08:54:58 2015 daemon.info hostapd: wlan1: STA d8:50:e6:81:42:6b
 IEEE 802.11: associated (aid 1)
 Thu Apr  2 08:54:58 2015 daemon.info hostapd: wlan1: STA d8:50:e6:81:42:6b
 RADIUS: starting accounting session 5516F506-00000008
 Thu Apr  2 08:54:58 2015 daemon.info hostapd: wlan1: STA d8:50:e6:81:42:6b
 WPA: pairwise key handshake completed (RSN)
 Thu Apr  2 08:56:32 2015 daemon.info hostapd: wlan1: STA d8:50:e6:81:42:6b
 IEEE 802.11: disassociated
 Thu Apr  2 08:56:33 2015 daemon.info hostapd: wlan1: STA d8:50:e6:81:42:6b
 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
 Thu Apr  2 08:56:41 2015 daemon.info hostapd: wlan0: STA d8:50:e6:81:42:6b
 IEEE 802.11: authenticated
 Thu Apr  2 08:56:41 2015 daemon.info hostapd: wlan0: STA d8:50:e6:81:42:6b
 IEEE 802.11: associated (aid 1)
 Thu Apr  2 08:56:41 2015 daemon.info hostapd: wlan0: STA d8:50:e6:81:42:6b
 RADIUS: starting accounting session 551C5D78-00000001
 Thu Apr  2 08:56:41 2015 daemon.info hostapd: wlan0: STA d8:50:e6:81:42:6b
 WPA: pairwise key handshake completed (RSN)
 Thu Apr  2 08:58:27 2015 kern.warn kernel: [390062.430000] ath10k_pci
 0000:01:00.0: failed to process fft report: -22
 Thu Apr  2 08:58:28 2015 kern.warn kernel: [390062.700000] ath10k_pci
 0000:01:00.0: failed to process fft report: -22
 Thu Apr  2 08:58:28 2015 kern.warn kernel: [390062.870000] ath10k_pci
 0000:01:00.0: failed to process fft report: -22
 Thu Apr  2 08:58:28 2015 kern.warn kernel: [390063.180000] ath10k_pci
 0000:01:00.0: failed to process fft report: -22
 Thu Apr  2 08:58:29 2015 kern.warn kernel: [390063.690000] ath10k_pci
 0000:01:00.0: failed to process fft report: -22
 Thu Apr  2 08:58:29 2015 kern.warn kernel: [390064.200000] ath10k_pci
 0000:01:00.0: failed to process fft report: -22
 Thu Apr  2 08:58:30 2015 kern.warn kernel: [390064.590000] ath10k_pci
 0000:01:00.0: failed to process fft report: -22
 Thu Apr  2 08:58:30 2015 kern.warn kernel: [390065.140000] ath10k_pci
 0000:01:00.0: failed to process fft report: -22
 Thu Apr  2 08:58:30 2015 kern.warn kernel: [390065.390000] ath10k_pci
 0000:01:00.0: failed to process fft report: -22
 Thu Apr  2 08:58:31 2015 kern.warn kernel: [390065.540000] ath10k_pci
 0000:01:00.0: failed to process fft report: -22
 Thu Apr  2 09:04:56 2015 daemon.info hostapd: wlan0: STA d8:50:e6:81:42:6b
 WPA: group key handshake completed (RSN)
 Thu Apr  2 09:11:27 2015 kern.warn kernel: [390841.520000] ath10k_warn: 9
 callbacks suppressed
 Thu Apr  2 09:11:27 2015 kern.warn kernel: [390841.530000] ath10k_pci
 0000:01:00.0: failed to process fft report: -22
 Thu Apr  2 09:11:43 2015 kern.warn kernel: [390857.570000] ath10k_pci
 0000:01:00.0: failed to process fft report: -22
 Thu Apr  2 09:14:56 2015 daemon.info hostapd: wlan0: STA d8:50:e6:81:42:6b
 WPA: group key handshake completed (RSN)
 Thu Apr  2 09:18:44 2015 kern.warn kernel: [391278.640000] ath10k_pci
 0000:01:00.0: failed to process fft report: -22
 Thu Apr  2 09:20:52 2015 kern.warn kernel: [391407.190000] ath10k_pci
 0000:01:00.0: failed to process fft report: -22
 Thu Apr  2 09:21:14 2015 kern.warn kernel: [391429.300000] ath10k_pci
 0000:01:00.0: failed to process fft report: -22
 Thu Apr  2 09:24:56 2015 daemon.info hostapd: wlan0: STA d8:50:e6:81:42:6b
 WPA: group key handshake completed (RSN)
 Thu Apr  2 09:34:56 2015 daemon.info hostapd: wlan0: STA d8:50:e6:81:42:6b
 WPA: group key handshake completed (RSN)
 Thu Apr  2 09:40:58 2015 daemon.info hostapd: wlan0: IEEE 802.11 driver
 had channel switch: freq=5180, ht=1, offset=1, width=3, cf1=5210, cf2=0
 }}}
 After this last line, the channel was set to 36 but I still could initiate
 a scan operation.

--
Ticket URL: <https://dev.openwrt.org/ticket/19316#comment:2>
OpenWrt <http://openwrt.org>
Opensource Wireless Router Technology
_______________________________________________
openwrt-tickets mailing list
[email protected]
https://lists.openwrt.org/cgi-bin/mailman/listinfo/openwrt-tickets

Reply via email to