Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

ipq40xx: invalid VHT TX rate code 0xff. Is that right? #188

Open
siwind opened this issue Oct 12, 2021 · 0 comments
Open

ipq40xx: invalid VHT TX rate code 0xff. Is that right? #188

siwind opened this issue Oct 12, 2021 · 0 comments

Comments

@siwind
Copy link

siwind commented Oct 12, 2021

My router is ipq40xx/ipq4019 platform with openwrt latest master branch.

root@OpenWrt:~# opkg list | grep ath10k
ath10k-board-qca4019 - 20210511-1
ath10k-firmware-qca4019-ct - 2020-11-08-1
kmod-ath10k-ct - 5.4.152+2021-09-22-e6a7d5b5-5
root@OpenWrt:~# cat /etc/openwrt_release 
DISTRIB_ID='OpenWrt'
DISTRIB_RELEASE='SNAPSHOT'
DISTRIB_REVISION='r18110+57-fb073aaebd'
DISTRIB_TARGET='ipq40xx/generic'
DISTRIB_ARCH='arm_cortex-a7_neon-vfpv4'
DISTRIB_DESCRIPTION='OpenWrt SNAPSHOT r18110+57-fb073aaebd'
DISTRIB_TAINTS='no-all busybox'
root@OpenWrt:~# uname -a
Linux OpenWrt 5.4.152 #0 SMP Mon Oct 11 16:20:53 2021 armv7l GNU/Linux

Following is the "dmesg log":

[   61.406933] ath10k_ahb a000000.wifi: qca4019 hw1.0 target 0x01000000 chip_id 0x003b00ff sub 0000:0000
[   61.406983] ath10k_ahb a000000.wifi: kconfig debug 0 debugfs 1 tracing 0 dfs 1 testmode 0
[   61.418874] ath10k_ahb a000000.wifi: firmware ver 10.4b-ct-4019-fW-13-5ae337bb1 api 5 features mfp,peer-flow-ctrl,txstatus-noack,wmi-10.x-CT,ratemask-CT,regdump-CT,txrate-CT,flush-all-CT,pingpong-CT,ch-regs-CT,nop-CT,set-special-CT,tx-rc-CT,cust-stats-CT,txrate2-CT,beacon-cb-CT,wmi-block-ack-CT,wmi-bcn-rc-CT crc32 6b2b5c5b
[   61.471125] ath10k_ahb a000000.wifi: board_file api 2 bmi_id 0:16 crc32 6ce1f887
[   62.759355] ath10k_ahb a000000.wifi: 10.4 wmi init: vdevs: 16  peers: 48  tid: 96
[   62.759400] ath10k_ahb a000000.wifi: msdu-desc: 2500  skid: 32
[   62.795425] ath10k_ahb a000000.wifi: wmi print 'P 48/48 V 16 K 144 PH 176 T 186  msdu-desc: 2500  sw-crypt: 0 ct-sta: 0'
[   62.796416] ath10k_ahb a000000.wifi: wmi print 'free: 53252 iram: 13432 sram: 35752'
[   62.957770] ath10k_ahb a000000.wifi: htt-ver 2.2 wmi-op 6 htt-op 4 cal pre-cal-file max-sta 32 raw 0 hwcrypto 1
[   63.076376] ath: EEPROM regdomain sanitized
[   63.076405] ath: EEPROM regdomain: 0x64
[   63.076418] ath: EEPROM indicates we should expect a direct regpair map
[   63.076455] ath: Country alpha2 being used: 00
[   63.076468] ath: Regpair used: 0x64
[   63.875881] ath10k_ahb a800000.wifi: qca4019 hw1.0 target 0x01000000 chip_id 0x003b00ff sub 0000:0000
[   63.875929] ath10k_ahb a800000.wifi: kconfig debug 0 debugfs 1 tracing 0 dfs 1 testmode 0
[   63.896554] ath10k_ahb a800000.wifi: firmware ver 10.4b-ct-4019-fW-13-5ae337bb1 api 5 features mfp,peer-flow-ctrl,txstatus-noack,wmi-10.x-CT,ratemask-CT,regdump-CT,txrate-CT,flush-all-CT,pingpong-CT,ch-regs-CT,nop-CT,set-special-CT,tx-rc-CT,cust-stats-CT,txrate2-CT,beacon-cb-CT,wmi-block-ack-CT,wmi-bcn-rc-CT crc32 6b2b5c5b
[   63.943048] ath10k_ahb a800000.wifi: board_file api 2 bmi_id 0:17 crc32 6ce1f887
[   65.232218] ath10k_ahb a800000.wifi: 10.4 wmi init: vdevs: 16  peers: 48  tid: 96
[   65.232270] ath10k_ahb a800000.wifi: msdu-desc: 2500  skid: 32
[   65.268029] ath10k_ahb a800000.wifi: wmi print 'P 48/48 V 16 K 144 PH 176 T 186  msdu-desc: 2500  sw-crypt: 0 ct-sta: 0'
[   65.269017] ath10k_ahb a800000.wifi: wmi print 'free: 53252 iram: 13432 sram: 35752'
[   65.394240] ath10k_ahb a800000.wifi: htt-ver 2.2 wmi-op 6 htt-op 4 cal pre-cal-file max-sta 32 raw 0 hwcrypto 1
[   65.539944] ath: EEPROM regdomain sanitized
[   65.539958] ath: EEPROM regdomain: 0x64
[   65.539963] ath: EEPROM indicates we should expect a direct regpair map
[   65.539974] ath: Country alpha2 being used: 00
[   65.539978] ath: Regpair used: 0x64
[   65.547107] kmodloader: done loading kernel modules from /etc/modules.d/*
[   76.724600] device eth0 entered promiscuous mode
[   76.725239] br-lan: port 1(eth0.1) entered blocking state
[   76.728306] br-lan: port 1(eth0.1) entered disabled state
[   76.734208] device eth0.1 entered promiscuous mode
[   76.742686] br-lan: port 1(eth0.1) entered blocking state
[   76.743685] br-lan: port 1(eth0.1) entered forwarding state
[   77.444499] pppoe-wan: renamed from ppp0
[   77.644057] ath: EEPROM regdomain: 0x8024
[   77.644069] ath: EEPROM indicates we should expect a country code
[   77.644113] ath: doing EEPROM country->regdmn map search
[   77.644127] ath: country maps to regdmn code: 0x3b
[   77.644133] ath: Country alpha2 being used: AU
[   77.644154] ath: Regpair used: 0x3b
[   77.644160] ath: regdomain 0x8024 dynamically updated by user
[   77.644189] ath: EEPROM regdomain: 0x8024
[   77.644215] ath: EEPROM indicates we should expect a country code
[   77.644220] ath: doing EEPROM country->regdmn map search
[   77.644224] ath: country maps to regdmn code: 0x3b
[   77.644229] ath: Country alpha2 being used: AU
[   77.644233] ath: Regpair used: 0x3b
[   77.644238] ath: regdomain 0x8024 dynamically updated by user
[   77.750465] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
[   77.751402] IPv6: ADDRCONF(NETDEV_CHANGE): br-lan: link becomes ready
[   77.783144] netlink: 'iw': attribute type 302 has an invalid length.
[   79.900033] ath10k_ahb a800000.wifi: 10.4 wmi init: vdevs: 16  peers: 48  tid: 96
[   79.900081] ath10k_ahb a800000.wifi: msdu-desc: 2500  skid: 32
[   79.935879] ath10k_ahb a800000.wifi: wmi print 'P 48/48 V 16 K 144 PH 176 T 186  msdu-desc: 2500  sw-crypt: 0 ct-sta: 0'
[   79.937472] ath10k_ahb a800000.wifi: wmi print 'free: 53252 iram: 13432 sram: 35752'
[   80.221444] ath10k_ahb a800000.wifi: rts threshold -1
[   80.221830] ath10k_ahb a800000.wifi: Firmware lacks feature flag indicating a retry limit of > 2 is OK, requested limit: 4
[   80.244224] netlink: 'iw': attribute type 302 has an invalid length.
[   80.252043] br-lan: port 2(wlan1) entered blocking state
[   80.252079] br-lan: port 2(wlan1) entered disabled state
[   80.256842] device wlan1 entered promiscuous mode
[   80.425085] ath10k_ahb a800000.wifi: NOTE:  Firmware DBGLOG output disabled in debug_mask: 0x10000000
[   80.985968] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready
[   80.988198] br-lan: port 2(wlan1) entered blocking state
[   80.992187] br-lan: port 2(wlan1) entered forwarding state
[   82.601269] ath10k_ahb a000000.wifi: 10.4 wmi init: vdevs: 16  peers: 48  tid: 96
[   82.601315] ath10k_ahb a000000.wifi: msdu-desc: 2500  skid: 32
[   82.636895] ath10k_ahb a000000.wifi: wmi print 'P 48/48 V 16 K 144 PH 176 T 186  msdu-desc: 2500  sw-crypt: 0 ct-sta: 0'
[   82.639376] ath10k_ahb a000000.wifi: wmi print 'free: 53252 iram: 13432 sram: 35752'
[   82.979248] ath10k_ahb a000000.wifi: rts threshold -1
[   82.981161] ath10k_ahb a000000.wifi: Firmware lacks feature flag indicating a retry limit of > 2 is OK, requested limit: 4
[   82.992736] br-lan: port 3(wlan0) entered blocking state
[   82.994348] br-lan: port 3(wlan0) entered disabled state
[   83.000413] device wlan0 entered promiscuous mode
[   95.590891] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
[   95.593445] br-lan: port 3(wlan0) entered blocking state
[   95.597629] br-lan: port 3(wlan0) entered forwarding state
[  127.141647] ath10k_ahb a800000.wifi: Invalid VHT mcs 15 peer stats
[  264.508749] ath10k_ahb a800000.wifi: htt tx: fixing invalid VHT TX rate code 0xff
[10643.295362] ath10k_ahb a000000.wifi: wmi: fixing invalid VHT TX rate code 0xff
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant