ipq40xx: invalid VHT TX rate code 0xff. Is that right?
siwind opened this issue · comments
My router is ipq40xx/ipq4019 platform with openwrt latest master branch.
root@OpenWrt:~# opkg list | grep ath10k
ath10k-board-qca4019 - 20210511-1
ath10k-firmware-qca4019-ct - 2020-11-08-1
kmod-ath10k-ct - 5.4.152+2021-09-22-e6a7d5b5-5
root@OpenWrt:~# cat /etc/openwrt_release
DISTRIB_ID='OpenWrt'
DISTRIB_RELEASE='SNAPSHOT'
DISTRIB_REVISION='r18110+57-fb073aaebd'
DISTRIB_TARGET='ipq40xx/generic'
DISTRIB_ARCH='arm_cortex-a7_neon-vfpv4'
DISTRIB_DESCRIPTION='OpenWrt SNAPSHOT r18110+57-fb073aaebd'
DISTRIB_TAINTS='no-all busybox'
root@OpenWrt:~# uname -a
Linux OpenWrt 5.4.152 #0 SMP Mon Oct 11 16:20:53 2021 armv7l GNU/Linux
Following is the "dmesg log":
[ 61.406933] ath10k_ahb a000000.wifi: qca4019 hw1.0 target 0x01000000 chip_id 0x003b00ff sub 0000:0000
[ 61.406983] ath10k_ahb a000000.wifi: kconfig debug 0 debugfs 1 tracing 0 dfs 1 testmode 0
[ 61.418874] ath10k_ahb a000000.wifi: firmware ver 10.4b-ct-4019-fW-13-5ae337bb1 api 5 features mfp,peer-flow-ctrl,txstatus-noack,wmi-10.x-CT,ratemask-CT,regdump-CT,txrate-CT,flush-all-CT,pingpong-CT,ch-regs-CT,nop-CT,set-special-CT,tx-rc-CT,cust-stats-CT,txrate2-CT,beacon-cb-CT,wmi-block-ack-CT,wmi-bcn-rc-CT crc32 6b2b5c5b
[ 61.471125] ath10k_ahb a000000.wifi: board_file api 2 bmi_id 0:16 crc32 6ce1f887
[ 62.759355] ath10k_ahb a000000.wifi: 10.4 wmi init: vdevs: 16 peers: 48 tid: 96
[ 62.759400] ath10k_ahb a000000.wifi: msdu-desc: 2500 skid: 32
[ 62.795425] ath10k_ahb a000000.wifi: wmi print 'P 48/48 V 16 K 144 PH 176 T 186 msdu-desc: 2500 sw-crypt: 0 ct-sta: 0'
[ 62.796416] ath10k_ahb a000000.wifi: wmi print 'free: 53252 iram: 13432 sram: 35752'
[ 62.957770] ath10k_ahb a000000.wifi: htt-ver 2.2 wmi-op 6 htt-op 4 cal pre-cal-file max-sta 32 raw 0 hwcrypto 1
[ 63.076376] ath: EEPROM regdomain sanitized
[ 63.076405] ath: EEPROM regdomain: 0x64
[ 63.076418] ath: EEPROM indicates we should expect a direct regpair map
[ 63.076455] ath: Country alpha2 being used: 00
[ 63.076468] ath: Regpair used: 0x64
[ 63.875881] ath10k_ahb a800000.wifi: qca4019 hw1.0 target 0x01000000 chip_id 0x003b00ff sub 0000:0000
[ 63.875929] ath10k_ahb a800000.wifi: kconfig debug 0 debugfs 1 tracing 0 dfs 1 testmode 0
[ 63.896554] ath10k_ahb a800000.wifi: firmware ver 10.4b-ct-4019-fW-13-5ae337bb1 api 5 features mfp,peer-flow-ctrl,txstatus-noack,wmi-10.x-CT,ratemask-CT,regdump-CT,txrate-CT,flush-all-CT,pingpong-CT,ch-regs-CT,nop-CT,set-special-CT,tx-rc-CT,cust-stats-CT,txrate2-CT,beacon-cb-CT,wmi-block-ack-CT,wmi-bcn-rc-CT crc32 6b2b5c5b
[ 63.943048] ath10k_ahb a800000.wifi: board_file api 2 bmi_id 0:17 crc32 6ce1f887
[ 65.232218] ath10k_ahb a800000.wifi: 10.4 wmi init: vdevs: 16 peers: 48 tid: 96
[ 65.232270] ath10k_ahb a800000.wifi: msdu-desc: 2500 skid: 32
[ 65.268029] ath10k_ahb a800000.wifi: wmi print 'P 48/48 V 16 K 144 PH 176 T 186 msdu-desc: 2500 sw-crypt: 0 ct-sta: 0'
[ 65.269017] ath10k_ahb a800000.wifi: wmi print 'free: 53252 iram: 13432 sram: 35752'
[ 65.394240] ath10k_ahb a800000.wifi: htt-ver 2.2 wmi-op 6 htt-op 4 cal pre-cal-file max-sta 32 raw 0 hwcrypto 1
[ 65.539944] ath: EEPROM regdomain sanitized
[ 65.539958] ath: EEPROM regdomain: 0x64
[ 65.539963] ath: EEPROM indicates we should expect a direct regpair map
[ 65.539974] ath: Country alpha2 being used: 00
[ 65.539978] ath: Regpair used: 0x64
[ 65.547107] kmodloader: done loading kernel modules from /etc/modules.d/*
[ 76.724600] device eth0 entered promiscuous mode
[ 76.725239] br-lan: port 1(eth0.1) entered blocking state
[ 76.728306] br-lan: port 1(eth0.1) entered disabled state
[ 76.734208] device eth0.1 entered promiscuous mode
[ 76.742686] br-lan: port 1(eth0.1) entered blocking state
[ 76.743685] br-lan: port 1(eth0.1) entered forwarding state
[ 77.444499] pppoe-wan: renamed from ppp0
[ 77.644057] ath: EEPROM regdomain: 0x8024
[ 77.644069] ath: EEPROM indicates we should expect a country code
[ 77.644113] ath: doing EEPROM country->regdmn map search
[ 77.644127] ath: country maps to regdmn code: 0x3b
[ 77.644133] ath: Country alpha2 being used: AU
[ 77.644154] ath: Regpair used: 0x3b
[ 77.644160] ath: regdomain 0x8024 dynamically updated by user
[ 77.644189] ath: EEPROM regdomain: 0x8024
[ 77.644215] ath: EEPROM indicates we should expect a country code
[ 77.644220] ath: doing EEPROM country->regdmn map search
[ 77.644224] ath: country maps to regdmn code: 0x3b
[ 77.644229] ath: Country alpha2 being used: AU
[ 77.644233] ath: Regpair used: 0x3b
[ 77.644238] ath: regdomain 0x8024 dynamically updated by user
[ 77.750465] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
[ 77.751402] IPv6: ADDRCONF(NETDEV_CHANGE): br-lan: link becomes ready
[ 77.783144] netlink: 'iw': attribute type 302 has an invalid length.
[ 79.900033] ath10k_ahb a800000.wifi: 10.4 wmi init: vdevs: 16 peers: 48 tid: 96
[ 79.900081] ath10k_ahb a800000.wifi: msdu-desc: 2500 skid: 32
[ 79.935879] ath10k_ahb a800000.wifi: wmi print 'P 48/48 V 16 K 144 PH 176 T 186 msdu-desc: 2500 sw-crypt: 0 ct-sta: 0'
[ 79.937472] ath10k_ahb a800000.wifi: wmi print 'free: 53252 iram: 13432 sram: 35752'
[ 80.221444] ath10k_ahb a800000.wifi: rts threshold -1
[ 80.221830] ath10k_ahb a800000.wifi: Firmware lacks feature flag indicating a retry limit of > 2 is OK, requested limit: 4
[ 80.244224] netlink: 'iw': attribute type 302 has an invalid length.
[ 80.252043] br-lan: port 2(wlan1) entered blocking state
[ 80.252079] br-lan: port 2(wlan1) entered disabled state
[ 80.256842] device wlan1 entered promiscuous mode
[ 80.425085] ath10k_ahb a800000.wifi: NOTE: Firmware DBGLOG output disabled in debug_mask: 0x10000000
[ 80.985968] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready
[ 80.988198] br-lan: port 2(wlan1) entered blocking state
[ 80.992187] br-lan: port 2(wlan1) entered forwarding state
[ 82.601269] ath10k_ahb a000000.wifi: 10.4 wmi init: vdevs: 16 peers: 48 tid: 96
[ 82.601315] ath10k_ahb a000000.wifi: msdu-desc: 2500 skid: 32
[ 82.636895] ath10k_ahb a000000.wifi: wmi print 'P 48/48 V 16 K 144 PH 176 T 186 msdu-desc: 2500 sw-crypt: 0 ct-sta: 0'
[ 82.639376] ath10k_ahb a000000.wifi: wmi print 'free: 53252 iram: 13432 sram: 35752'
[ 82.979248] ath10k_ahb a000000.wifi: rts threshold -1
[ 82.981161] ath10k_ahb a000000.wifi: Firmware lacks feature flag indicating a retry limit of > 2 is OK, requested limit: 4
[ 82.992736] br-lan: port 3(wlan0) entered blocking state
[ 82.994348] br-lan: port 3(wlan0) entered disabled state
[ 83.000413] device wlan0 entered promiscuous mode
[ 95.590891] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
[ 95.593445] br-lan: port 3(wlan0) entered blocking state
[ 95.597629] br-lan: port 3(wlan0) entered forwarding state
[ 127.141647] ath10k_ahb a800000.wifi: Invalid VHT mcs 15 peer stats
[ 264.508749] ath10k_ahb a800000.wifi: htt tx: fixing invalid VHT TX rate code 0xff
[10643.295362] ath10k_ahb a000000.wifi: wmi: fixing invalid VHT TX rate code 0xff