* Troubleshooting mwl8k driver issue
@ 2016-06-04 3:54 David Gilman
2016-06-06 6:51 ` Lennert Buytenhek
0 siblings, 1 reply; 9+ messages in thread
From: David Gilman @ 2016-06-04 3:54 UTC (permalink / raw)
To: buytenh; +Cc: linux-wireless
Lennert, I am a user of your mwl8k driver through the OpenWRT
distribution. When working with certain WiFi devices I get errors in
the kernel logs and network connectivity errors on the wireless device.
The dmesg logs look like this:
[539374.394607] ieee80211 phy1: Added a new stream for (BSSID MAC) 0
[539374.394650] ieee80211 phy1: Started stream for (BSSID MAC) 0
[539374.394732] ieee80211 phy1: tx rings drained
[539374.401372] ieee80211 phy1: Created a BA stream for (BSSID MAC) : tid 0
`iw event -t' logs (it looks like OpenWRT is patching the heck out of this
tool):
1465008930.594531: wlan1 (phy #1): unknown event 60
1465008930.652119: wlan1 (phy #1): unknown event 60
1465008930.653494: wlan1 (phy #1): unknown event 60
1465008930.655582: wlan1: new station (BSSID MAC)
There are a number of other users who are also experiencing the same
issue on the OpenWRT bug tracker:
https://dev.openwrt.org/ticket/21284
As I noted in the bug the driver works with some of my wireless devices
and not others which suggests that something subtle is up with some
driver in this picture.
I don't have a whole lot of experience with kernel development (pretty
much none actually) and I know absolutely nothing about how these WiFi
devices work. However I am willing to work with you or anyone else on
the linux-wireless list (which I have CCd) to help troubleshoot this
issue. I am using OpenWRT on this router and I can get a build
environment set up for debug kernel builds with their toolchain. I'm
running a pretty recent kernel (4.4.7) but git log suggests this driver
hasn't been touched in a while.
--
David Gilman :DG<
http://gilslotd.com
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: Troubleshooting mwl8k driver issue
2016-06-04 3:54 Troubleshooting mwl8k driver issue David Gilman
@ 2016-06-06 6:51 ` Lennert Buytenhek
2016-06-10 4:02 ` David Gilman
0 siblings, 1 reply; 9+ messages in thread
From: Lennert Buytenhek @ 2016-06-06 6:51 UTC (permalink / raw)
To: David Gilman; +Cc: linux-wireless, Yogesh Ashok Powar, Nishant Sarmukadam
On Fri, Jun 03, 2016 at 10:54:52PM -0500, David Gilman wrote:
> Lennert, I am a user of your mwl8k driver through the OpenWRT
> distribution. When working with certain WiFi devices I get errors in
> the kernel logs and network connectivity errors on the wireless device.
> The dmesg logs look like this:
>
> [539374.394607] ieee80211 phy1: Added a new stream for (BSSID MAC) 0
> [539374.394650] ieee80211 phy1: Started stream for (BSSID MAC) 0
> [539374.394732] ieee80211 phy1: tx rings drained
> [539374.401372] ieee80211 phy1: Created a BA stream for (BSSID MAC) : tid 0
These are not (necessarily) errors, just debug messages
> There are a number of other users who are also experiencing the same
> issue on the OpenWRT bug tracker:
>
> https://dev.openwrt.org/ticket/21284
There's a bunch of bad-looking stuff in the posted dmesgs, such as:
[ 10.983657] pci 0000:00:01.0: enabling device (0140 -> 0142)
[ 11.972069] ieee80211 phy0: Command RF_ANTENNA error 0x2
[ 11.977455] ieee80211 phy0: failed to set # of RX antennas
[ 11.993318] ieee80211 phy0: Command RF_ANTENNA error 0x2
[ 11.998713] ieee80211 phy0: failed to set # of TX antennas
[ 12.004243] ieee80211 phy0: 88w8366 v48, c8d719177244, STA firmware 4.1.0.3
And:
[ 22.517451] 0000:02:00.0: unable to load firmware helper image
[ 22.523399] ieee80211 phy1: Cannot start firmware
[ 22.528230] ieee80211 phy1: Trying to reload the firmware again
[ 23.016669] ieee80211 phy1: 88w8366 v7, c8d719177246, AP firmware 5.2.8.17
> As I noted in the bug the driver works with some of my wireless devices
> and not others which suggests that something subtle is up with some
> driver in this picture.
Is the behavior consistent per device across boots? I.e. does device
X always work on every boot while device Y never works at all?
> I don't have a whole lot of experience with kernel development (pretty
> much none actually) and I know absolutely nothing about how these WiFi
> devices work. However I am willing to work with you or anyone else on
> the linux-wireless list (which I have CCd) to help troubleshoot this
> issue. I am using OpenWRT on this router and I can get a build
> environment set up for debug kernel builds with their toolchain. I'm
> running a pretty recent kernel (4.4.7) but git log suggests this driver
> hasn't been touched in a while.
For starters, could you post lspci -n output?
Also, do you see the same behavior with older kernels, or have you
only tried 4.4?
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: Troubleshooting mwl8k driver issue
2016-06-06 6:51 ` Lennert Buytenhek
@ 2016-06-10 4:02 ` David Gilman
2016-06-17 19:43 ` David Gilman
0 siblings, 1 reply; 9+ messages in thread
From: David Gilman @ 2016-06-10 4:02 UTC (permalink / raw)
To: Lennert Buytenhek; +Cc: linux-wireless, Yogesh Ashok Powar, Nishant Sarmukadam
[-- Attachment #1: Type: text/plain, Size: 1659 bytes --]
On Mon, Jun 06, 2016 at 09:51:46AM +0300, Lennert Buytenhek wrote:
> There's a bunch of bad-looking stuff in the posted dmesgs, such as:
>
> [ 10.983657] pci 0000:00:01.0: enabling device (0140 -> 0142)
> [ 11.972069] ieee80211 phy0: Command RF_ANTENNA error 0x2
> [ 11.977455] ieee80211 phy0: failed to set # of RX antennas
> [ 11.993318] ieee80211 phy0: Command RF_ANTENNA error 0x2
> [ 11.998713] ieee80211 phy0: failed to set # of TX antennas
> [ 12.004243] ieee80211 phy0: 88w8366 v48, c8d719177244, STA firmware 4.1.0.3
>
> And:
>
> [ 22.517451] 0000:02:00.0: unable to load firmware helper image
> [ 22.523399] ieee80211 phy1: Cannot start firmware
> [ 22.528230] ieee80211 phy1: Trying to reload the firmware again
> [ 23.016669] ieee80211 phy1: 88w8366 v7, c8d719177246, AP firmware 5.2.8.17
I've attached my startup dmesg output, I am seeing some of those messages.
> Is the behavior consistent per device across boots? I.e. does device
> X always work on every boot while device Y never works at all?
Yes.
> For starters, could you post lspci -n output?
00:01.0 0604: 11ab:6282 (rev 01)
00:02.0 0604: 11ab:6282 (rev 01)
01:00.0 0200: 11ab:2a41
02:00.0 0200: 11ab:2a42
> Also, do you see the same behavior with older kernels, or have you
> only tried 4.4?
I saw it on kernel 3.18 as well.
As an aside I semi-bricked my router and I'm currently unable to flash
new images - unfortunate, as I prepped an OpenWRT build with debug
logging. I feel committed to seeing this through though so I have
another device ordered but I will be unable to test new builds until it
gets here in a week or so.
--
David Gilman :DG<
http://gilslotd.com
[-- Attachment #2: openwrt_old_syslog --]
[-- Type: text/plain, Size: 14688 bytes --]
[ 0.000000] Booting Linux on physical CPU 0x0
[ 0.000000] Linux version 4.4.7 (openwrt@0e997fc2ad25) (gcc version 5.3.0 (OpenWrt GCC 5.3.0 r49377) ) #1 Sun May 22 08:20:37 UTC 2016
[ 0.000000] CPU: Feroceon 88FR131 [56251311] revision 1 (ARMv5TE), cr=0005397f
[ 0.000000] CPU: VIVT data cache, VIVT instruction cache
[ 0.000000] Machine model: Linksys EA3500
[ 0.000000] Memory policy: Data cache writeback
[ 0.000000] On node 0 totalpages: 16384
[ 0.000000] free_area_init_node: node 0, pgdat c057d838, node_mem_map c3f7a000
[ 0.000000] Normal zone: 128 pages used for memmap
[ 0.000000] Normal zone: 0 pages reserved
[ 0.000000] Normal zone: 16384 pages, LIFO batch:3
[ 0.000000] pcpu-alloc: s0 r0 d32768 u32768 alloc=1*32768
[ 0.000000] pcpu-alloc: [0] 0
[ 0.000000] Built 1 zonelists in Zone order, mobility grouping on. Total pages: 16256
[ 0.000000] Kernel command line: console=ttyS0,115200 mtdparts=nand_mtd:512k(uboot)ro,16k@512k(u_env),16k@528k(s_env),20m@2m(kernel),20m@2m(rootfs)fs,20m@22m(alt_kernel),20m@22m(alt_rootfs)fs,22m@42m(syscfg) root=/dev/mtdblock6 ro rootfstype=jffs2 serial_number=12C10606503967 uuid=9E782CBBA2A839EF4B650308C7E22720 hw_version=RGWM-C5_0GA device_mac=C0:56:27:BA:65:BD factory_date=2015/06/24 wps_pin=74717897
[ 0.000000] PID hash table entries: 256 (order: -2, 1024 bytes)
[ 0.000000] Dentry cache hash table entries: 8192 (order: 3, 32768 bytes)
[ 0.000000] Inode-cache hash table entries: 4096 (order: 2, 16384 bytes)
[ 0.000000] Memory: 58956K/65536K available (3946K kernel code, 135K rwdata, 1444K rodata, 168K init, 197K bss, 6580K reserved, 0K cma-reserved)
[ 0.000000] Virtual kernel memory layout:
[ 0.000000] vector : 0xffff0000 - 0xffff1000 ( 4 kB)
[ 0.000000] fixmap : 0xffc00000 - 0xfff00000 (3072 kB)
[ 0.000000] vmalloc : 0xc4800000 - 0xff800000 ( 944 MB)
[ 0.000000] lowmem : 0xc0000000 - 0xc4000000 ( 64 MB)
[ 0.000000] modules : 0xbf000000 - 0xc0000000 ( 16 MB)
[ 0.000000] .text : 0xc0008000 - 0xc054bdc4 (5392 kB)
[ 0.000000] .init : 0xc054c000 - 0xc0576000 ( 168 kB)
[ 0.000000] .data : 0xc0576000 - 0xc0597fac ( 136 kB)
[ 0.000000] .bss : 0xc0597fac - 0xc05c959c ( 198 kB)
[ 0.000000] SLUB: HWalign=32, Order=0-3, MinObjects=0, CPUs=1, Nodes=1
[ 0.000000] NR_IRQS:16 nr_irqs:16 16
[ 0.000000] clocksource: orion_clocksource: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 9556302233 ns
[ 0.000010] sched_clock: 32 bits at 200MHz, resolution 5ns, wraps every 10737418237ns
[ 0.000098] Calibrating delay loop... 795.44 BogoMIPS (lpj=3977216)
[ 0.040090] pid_max: default: 32768 minimum: 301
[ 0.040217] Mount-cache hash table entries: 1024 (order: 0, 4096 bytes)
[ 0.040238] Mountpoint-cache hash table entries: 1024 (order: 0, 4096 bytes)
[ 0.040825] CPU: Testing write buffer coherency: ok
[ 0.041209] Setting up static identity map for 0x81e0 - 0x821c
[ 0.041558] mvebu-soc-id: MVEBU SoC ID=0x6282, Rev=0x1
[ 0.047290] clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604462750000 ns
[ 0.047429] pinctrl core: initialized pinctrl subsystem
[ 0.048746] NET: Registered protocol family 16
[ 0.049248] DMA: preallocated 256 KiB pool for atomic coherent allocations
[ 0.052997] cpuidle: using governor ladder
[ 0.053554] Feroceon L2: Enabling L2
[ 0.053603] Feroceon L2: Cache support initialised.
[ 0.053930] [Firmware Info]: /ocp@f1000000/ethernet-controller@72000/ethernet0-port@0: local-mac-address is not set
[ 0.054055] [Firmware Info]: /ocp@f1000000/ethernet-controller@76000/ethernet1-port@0: local-mac-address is not set
[ 0.073095] SCSI subsystem initialized
[ 0.073496] usbcore: registered new interface driver usbfs
[ 0.073600] usbcore: registered new interface driver hub
[ 0.073684] usbcore: registered new device driver usb
[ 0.074967] clocksource: Switched to clocksource orion_clocksource
[ 0.076190] NET: Registered protocol family 2
[ 0.076972] TCP established hash table entries: 1024 (order: 0, 4096 bytes)
[ 0.077005] TCP bind hash table entries: 1024 (order: 0, 4096 bytes)
[ 0.077031] TCP: Hash tables configured (established 1024 bind 1024)
[ 0.077095] UDP hash table entries: 256 (order: 0, 4096 bytes)
[ 0.077123] UDP-Lite hash table entries: 256 (order: 0, 4096 bytes)
[ 0.077312] NET: Registered protocol family 1
[ 0.077382] PCI: CLS 0 bytes, default 32
[ 0.078487] futex hash table entries: 256 (order: -1, 3072 bytes)
[ 0.097671] squashfs: version 4.0 (2009/01/31) Phillip Lougher
[ 0.097699] jffs2: version 2.2 (NAND) (SUMMARY) (LZMA) (RTIME) (CMODE_PRIORITY) (c) 2001-2006 Red Hat, Inc.
[ 0.100705] io scheduler noop registered
[ 0.100728] io scheduler deadline registered (default)
[ 0.102290] kirkwood-pinctrl f1010000.pin-controller: registered pinctrl driver
[ 0.103060] irq: Cannot allocate irq_descs @ IRQ31, assuming pre-allocated
[ 0.103525] irq: Cannot allocate irq_descs @ IRQ63, assuming pre-allocated
[ 0.104357] mvebu-pcie mbus:pcie-controller: PCI host bridge to bus 0000:00
[ 0.104381] pci_bus 0000:00: root bus resource [io 0x1000-0xfffff]
[ 0.104398] pci_bus 0000:00: root bus resource [mem 0xe0000000-0xefffffff]
[ 0.104414] pci_bus 0000:00: root bus resource [bus 00-ff]
[ 0.104456] pci 0000:00:01.0: [11ab:6282] type 01 class 0x060400
[ 0.104772] pci 0000:00:02.0: [11ab:6282] type 01 class 0x060400
[ 0.105145] PCI: bus0: Fast back to back transfers disabled
[ 0.105166] pci 0000:00:01.0: bridge configuration invalid ([bus 00-00]), reconfiguring
[ 0.105186] pci 0000:00:02.0: bridge configuration invalid ([bus 00-00]), reconfiguring
[ 0.105374] pci 0000:01:00.0: [11ab:2a41] type 00 class 0x020000
[ 0.105438] pci 0000:01:00.0: reg 0x10: [mem 0x90000000-0x9000ffff 64bit]
[ 0.105469] pci 0000:01:00.0: reg 0x18: [mem 0x90010000-0x9001ffff 64bit]
[ 0.105811] PCI: bus1: Fast back to back transfers disabled
[ 0.105833] pci_bus 0000:01: busn_res: [bus 01-ff] end is updated to 01
[ 0.106020] pci 0000:02:00.0: [11ab:2a42] type 00 class 0x020000
[ 0.106082] pci 0000:02:00.0: reg 0x10: [mem 0x98000000-0x9800ffff 64bit]
[ 0.106114] pci 0000:02:00.0: reg 0x18: [mem 0x98010000-0x9801ffff 64bit]
[ 0.106445] PCI: bus2: Fast back to back transfers disabled
[ 0.106466] pci_bus 0000:02: busn_res: [bus 02-ff] end is updated to 02
[ 0.106602] pci 0000:00:01.0: BAR 8: assigned [mem 0xe0000000-0xe00fffff]
[ 0.106625] pci 0000:00:02.0: BAR 8: assigned [mem 0xe0100000-0xe01fffff]
[ 0.106648] pci 0000:01:00.0: BAR 0: assigned [mem 0xe0000000-0xe000ffff 64bit]
[ 0.106678] pci 0000:01:00.0: BAR 2: assigned [mem 0xe0010000-0xe001ffff 64bit]
[ 0.106702] pci 0000:00:01.0: PCI bridge to [bus 01]
[ 0.106722] pci 0000:00:01.0: bridge window [mem 0xe0000000-0xe00fffff]
[ 0.106747] pci 0000:02:00.0: BAR 0: assigned [mem 0xe0100000-0xe010ffff 64bit]
[ 0.106775] pci 0000:02:00.0: BAR 2: assigned [mem 0xe0110000-0xe011ffff 64bit]
[ 0.106800] pci 0000:00:02.0: PCI bridge to [bus 02]
[ 0.106817] pci 0000:00:02.0: bridge window [mem 0xe0100000-0xe01fffff]
[ 0.147001] Serial: 8250/16550 driver, 16 ports, IRQ sharing enabled
[ 0.150640] console [ttyS0] disabled
[ 0.150731] f1012000.serial: ttyS0 at MMIO 0xf1012000 (irq = 25, base_baud = 12500000) is a 16550A
[ 0.762159] console [ttyS0] enabled
[ 0.767145] nand: device found, Manufacturer ID: 0xad, Chip ID: 0x76
[ 0.773529] nand: Hynix NAND 64MiB 3,3V 8-bit
[ 0.777947] nand: 64 MiB, SLC, erase size: 16 KiB, page size: 512, OOB size: 16
[ 0.785326] Scanning device for bad blocks
[ 0.915084] Bad eraseblock 1168 at 0x000001240000
[ 1.164093] Bad eraseblock 3441 at 0x0000035c4000
[ 1.239152] mtd: bad character after partition (f)
[ 1.244000] 8 ofpart partitions found on MTD device orion_nand
[ 1.249880] Creating 8 MTD partitions on "orion_nand":
[ 1.255062] 0x000000000000-0x000000080000 : "u-boot"
[ 1.262008] 0x000000080000-0x000000084000 : "u_env"
[ 1.268337] 0x000000084000-0x000000088000 : "s_env"
[ 1.274598] 0x000000200000-0x000001600000 : "kernel1"
[ 1.281554] 0x000000490000-0x000001600000 : "rootfs1"
[ 1.288467] 0x000001600000-0x000002a00000 : "kernel2"
[ 1.295447] 0x000001890000-0x000002a00000 : "ubi"
[ 1.302004] 0x000002a00000-0x000004000000 : "syscfg"
[ 1.309560] libphy: orion_mdio_bus: probed
[ 1.313873] mv643xx_eth: MV-643xx 10/100/1000 ethernet driver version 1.4
[ 1.322361] mv643xx_eth_port mv643xx_eth_port.0 eth0: port 0 with MAC address c0:56:27:ba:65:bd
[ 1.331884] mv643xx_eth_port mv643xx_eth_port.1 eth1: port 0 with MAC address c0:56:27:ba:65:be
[ 1.340715] ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver
[ 1.347299] ehci-pci: EHCI PCI platform driver
[ 1.351849] ehci-platform: EHCI generic platform driver
[ 1.357313] ehci-orion: EHCI orion driver
[ 1.361533] orion-ehci f1050000.ehci: EHCI Host Controller
[ 1.367109] orion-ehci f1050000.ehci: new USB bus registered, assigned bus number 1
[ 1.374953] orion-ehci f1050000.ehci: irq 29, io mem 0xf1050000
[ 1.394997] orion-ehci f1050000.ehci: USB 2.0 started, EHCI 1.00
[ 1.401886] hub 1-0:1.0: USB hub found
[ 1.405920] hub 1-0:1.0: 1 port detected
[ 1.410415] usbcore: registered new interface driver usb-storage
[ 1.418717] NET: Registered protocol family 10
[ 1.426472] NET: Registered protocol family 17
[ 1.431008] bridge: automatic filtering via arp/ip/ip6tables has been deprecated. Update your scripts to load br_netfilter if you need this.
[ 1.443749] Bridge firewalling registered
[ 1.447806] 8021q: 802.1Q VLAN Support v1.8
[ 1.454576] UBI: auto-attach mtd6
[ 1.457781] ubi0: attaching mtd6
[ 1.578240] ubi0: scanning is finished
[ 1.591512] ubi0: attached mtd6 (name "ubi", size 17 MiB)
[ 1.596983] ubi0: PEB size: 16384 bytes (16 KiB), LEB size: 15872 bytes
[ 1.603632] ubi0: min./max. I/O unit sizes: 512/512, sub-page size 256
[ 1.610208] ubi0: VID header offset: 256 (aligned 256), data offset: 512
[ 1.616955] ubi0: good PEBs: 1116, bad PEBs: 0, corrupted PEBs: 0
[ 1.623076] ubi0: user volume: 2, internal volumes: 1, max. volumes count: 92
[ 1.630264] ubi0: max/mean erase counter: 2/0, WL threshold: 4096, image sequence number: 2053880514
[ 1.639452] ubi0: available PEBs: 0, total reserved PEBs: 1116, PEBs reserved for bad PEB handling: 80
[ 1.649195] ubi0: background thread "ubi_bgt0d" started, PID 880
[ 1.656139] block ubiblock0_0: created from ubi0:0(rootfs)
[ 1.661654] ubiblock: device ubiblock0_0 (rootfs) set to be root filesystem
[ 1.669439] mvsw61xx 10.mvsw61xx: Found MV88E6171 at f1072004.mdio-bu:10
[ 1.676204] mvsw61xx 10.mvsw61xx: Using indirect addressing
[ 1.681900] hctosys: unable to open rtc device (rtc0)
[ 1.694636] VFS: Mounted root (squashfs filesystem) readonly on device 254:0.
[ 1.702360] Freeing unused kernel memory: 168K (c054c000 - c0576000)
[ 2.416624] init: Console is alive
[ 2.969528] libata version 3.00 loaded.
[ 2.983121] init: - preinit -
[ 3.314782] random: procd urandom read with 5 bits of entropy available
[ 6.456509] UBIFS (ubi0:1): background thread "ubifs_bgt0_1" started, PID 929
[ 6.463948] UBIFS (ubi0:1): recovery needed
[ 6.509029] UBIFS (ubi0:1): recovery completed
[ 6.513588] UBIFS (ubi0:1): UBIFS: mounted UBI device 0, volume 1, name "rootfs_data"
[ 6.521490] UBIFS (ubi0:1): LEB size: 15872 bytes (15 KiB), min./max. I/O unit sizes: 512 bytes/512 bytes
[ 6.531126] UBIFS (ubi0:1): FS size: 14173696 bytes (13 MiB, 893 LEBs), journal size 714240 bytes (0 MiB, 45 LEBs)
[ 6.541540] UBIFS (ubi0:1): reserved for root: 669457 bytes (653 KiB)
[ 6.548034] UBIFS (ubi0:1): media format: w4/r0 (latest is w4/r0), UUID 831EA53C-3EEC-4791-BDCA-04C694EC5AA7, small LPT model
[ 6.563711] mount_root: switching to jffs2 overlay
[ 6.580781] procd: - early -
[ 7.627223] procd: - ubus -
[ 7.682974] procd: - init -
[ 8.324371] ip6_tables: (C) 2000-2006 Netfilter Core Team
[ 8.338027] i2c /dev entries driver
[ 8.346003] Loading modules backported from Linux version v4.4-rc5-1913-gc8fdf68
[ 8.353441] Backport generated by backports.git backports-20151218-0-g2f58d9d
[ 8.364437] ip_tables: (C) 2000-2006 Netfilter Core Team
[ 8.377523] nf_conntrack version 0.5.0 (923 buckets, 3692 max)
[ 8.415845] xt_time: kernel timezone is -0000
[ 8.458365] Marvell TOPDOG(R) 802.11 Wireless Network Driver version 0.13
[ 8.465264] pci 0000:00:01.0: enabling device (0140 -> 0142)
[ 9.183654] ieee80211 phy0: Command RF_ANTENNA error 0x2
[ 9.189039] ieee80211 phy0: failed to set # of RX antennas
[ 9.194586] ieee80211 phy0: Command RF_ANTENNA error 0x2
[ 9.199953] ieee80211 phy0: failed to set # of TX antennas
[ 9.205494] ieee80211 phy0: 88w8366 v48, c05627ba65bf, STA firmware 4.1.0.3
[ 9.216323] pci 0000:00:02.0: enabling device (0140 -> 0142)
[ 9.954864] ieee80211 phy1: Command RF_ANTENNA error 0x2
[ 9.960242] ieee80211 phy1: failed to set # of RX antennas
[ 9.965807] ieee80211 phy1: Command RF_ANTENNA error 0x2
[ 9.971148] ieee80211 phy1: failed to set # of TX antennas
[ 9.976695] ieee80211 phy1: 88w8366 v48, c05627ba65c1, STA firmware 4.1.0.3
[ 9.993947] PPP generic driver version 2.4.2
[ 10.012124] NET: Registered protocol family 24
[ 16.026656] mv643xx_eth_port mv643xx_eth_port.0 eth0: link up, 1000 Mb/s, full duplex, flow control disabled
[ 16.050211] device eth0 entered promiscuous mode
[ 16.060715] IPv6: ADDRCONF(NETDEV_UP): br-lan: link is not ready
[ 16.108612] mv643xx_eth_port mv643xx_eth_port.1 eth1: link up, 1000 Mb/s, full duplex, flow control disabled
[ 17.025074] br-lan: port 1(eth0) entered forwarding state
[ 17.030568] br-lan: port 1(eth0) entered forwarding state
[ 17.056687] IPv6: ADDRCONF(NETDEV_CHANGE): br-lan: link becomes ready
[ 18.216444] ieee80211 phy1: 88w8366 v7, c05627ba65c1, AP firmware 5.2.8.17
[ 18.270954] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready
[ 18.281775] device wlan1 entered promiscuous mode
[ 19.024987] br-lan: port 1(eth0) entered forwarding state
[ 21.288103] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready
[ 21.294651] br-lan: port 2(wlan1) entered forwarding state
[ 21.300270] br-lan: port 2(wlan1) entered forwarding state
[ 23.294989] br-lan: port 2(wlan1) entered forwarding state
[ 36.623165] random: nonblocking pool is initialized
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: Troubleshooting mwl8k driver issue
2016-06-10 4:02 ` David Gilman
@ 2016-06-17 19:43 ` David Gilman
2016-06-18 8:48 ` Lennert Buytenhek
0 siblings, 1 reply; 9+ messages in thread
From: David Gilman @ 2016-06-17 19:43 UTC (permalink / raw)
To: Lennert Buytenhek; +Cc: linux-wireless, Yogesh Ashok Powar, Nishant Sarmukadam
On Thu, Jun 09, 2016 at 11:02:47PM -0500, David Gilman wrote:
> As an aside I semi-bricked my router and I'm currently unable to flash
> new images
I've got my hardware and toolchain back up and running. Here's the
output from the unpatched `iw event -t':
1466191960.919661: wlan1: del station fc:c2:de:ac:b1:72
1466191966.842698: wlan1 (phy #1): mgmt TX status (cookie 2b): acked
1466192016.283846: wlan1 (phy #1): mgmt TX status (cookie 2c): acked
1466192016.284036: wlan1 (phy #1): mgmt TX status (cookie 2d): acked
1466192016.285194: wlan1 (phy #1): mgmt TX status (cookie 2e): acked
1466192016.313091: wlan1 (phy #1): mgmt TX status (cookie 2f): acked
1466192016.369315: wlan1 (phy #1): mgmt TX status (cookie 30): acked
1466192016.390064: wlan1 (phy #1): mgmt TX status (cookie 31): acked
1466192016.392064: wlan1: new station fc:c2:de:ac:b1:72
And the corresponding syslog output:
Fri Jun 17 19:32:40 2016 kern.debug kernel: [ 3027.270339] ieee80211 phy1: Deleted BA stream index 0
Fri Jun 17 19:32:40 2016 kern.debug kernel: [ 3027.270367] ieee80211 phy1: Remove stream for fc:c2:de:ac:b1:72 0
Fri Jun 17 19:32:43 2016 daemon.info hostapd: wlan1: STA fc:c2:de:ac:b1:72 IEEE 802.11: deauthenticated due to local deauth request
Fri Jun 17 19:33:36 2016 daemon.info hostapd: wlan1: STA fc:c2:de:ac:b1:72 IEEE 802.11: authenticated
Fri Jun 17 19:33:36 2016 daemon.info hostapd: wlan1: STA fc:c2:de:ac:b1:72 IEEE 802.11: associated (aid 1)
Fri Jun 17 19:33:36 2016 daemon.info hostapd: wlan1: STA fc:c2:de:ac:b1:72 WPA: pairwise key handshake completed (RSN)
Fri Jun 17 19:33:37 2016 daemon.info dnsmasq-dhcp[2668]: DHCPREQUEST(br-lan) 192.168.1.138 fc:c2:de:ac:b1:72
Fri Jun 17 19:33:37 2016 daemon.info dnsmasq-dhcp[2668]: DHCPACK(br-lan) 192.168.1.138 fc:c2:de:ac:b1:72 android-63ebbc936f7b53af
So where to go from here?
--
David Gilman :DG<
http://gilslotd.com
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: Troubleshooting mwl8k driver issue
2016-06-17 19:43 ` David Gilman
@ 2016-06-18 8:48 ` Lennert Buytenhek
2016-06-21 0:36 ` David Gilman
0 siblings, 1 reply; 9+ messages in thread
From: Lennert Buytenhek @ 2016-06-18 8:48 UTC (permalink / raw)
To: David Gilman; +Cc: linux-wireless, Yogesh Ashok Powar, Nishant Sarmukadam
On Fri, Jun 17, 2016 at 02:43:03PM -0500, David Gilman wrote:
> > As an aside I semi-bricked my router and I'm currently unable to flash
> > new images
>
> I've got my hardware and toolchain back up and running. Here's the
> output from the unpatched `iw event -t':
>
> 1466191960.919661: wlan1: del station fc:c2:de:ac:b1:72
> 1466191966.842698: wlan1 (phy #1): mgmt TX status (cookie 2b): acked
> 1466192016.283846: wlan1 (phy #1): mgmt TX status (cookie 2c): acked
> 1466192016.284036: wlan1 (phy #1): mgmt TX status (cookie 2d): acked
> 1466192016.285194: wlan1 (phy #1): mgmt TX status (cookie 2e): acked
> 1466192016.313091: wlan1 (phy #1): mgmt TX status (cookie 2f): acked
> 1466192016.369315: wlan1 (phy #1): mgmt TX status (cookie 30): acked
> 1466192016.390064: wlan1 (phy #1): mgmt TX status (cookie 31): acked
> 1466192016.392064: wlan1: new station fc:c2:de:ac:b1:72
>
> And the corresponding syslog output:
>
> Fri Jun 17 19:32:40 2016 kern.debug kernel: [ 3027.270339] ieee80211 phy1: Deleted BA stream index 0
> Fri Jun 17 19:32:40 2016 kern.debug kernel: [ 3027.270367] ieee80211 phy1: Remove stream for fc:c2:de:ac:b1:72 0
> Fri Jun 17 19:32:43 2016 daemon.info hostapd: wlan1: STA fc:c2:de:ac:b1:72 IEEE 802.11: deauthenticated due to local deauth request
> Fri Jun 17 19:33:36 2016 daemon.info hostapd: wlan1: STA fc:c2:de:ac:b1:72 IEEE 802.11: authenticated
> Fri Jun 17 19:33:36 2016 daemon.info hostapd: wlan1: STA fc:c2:de:ac:b1:72 IEEE 802.11: associated (aid 1)
> Fri Jun 17 19:33:36 2016 daemon.info hostapd: wlan1: STA fc:c2:de:ac:b1:72 WPA: pairwise key handshake completed (RSN)
> Fri Jun 17 19:33:37 2016 daemon.info dnsmasq-dhcp[2668]: DHCPREQUEST(br-lan) 192.168.1.138 fc:c2:de:ac:b1:72
> Fri Jun 17 19:33:37 2016 daemon.info dnsmasq-dhcp[2668]: DHCPACK(br-lan) 192.168.1.138 fc:c2:de:ac:b1:72 android-63ebbc936f7b53af
>
> So where to go from here?
Nothing in here seems particularly bad. So whatever the problem is,
I don't think it can be diagnosed from these messages alone.
I went back to the email thread, and it seems that the problem is that
you're trying to run the card in AP mode but no traffic is making it
through? Is AP association working at all, or is that failing too?
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: Troubleshooting mwl8k driver issue
2016-06-18 8:48 ` Lennert Buytenhek
@ 2016-06-21 0:36 ` David Gilman
2016-06-21 8:01 ` Lennert Buytenhek
0 siblings, 1 reply; 9+ messages in thread
From: David Gilman @ 2016-06-21 0:36 UTC (permalink / raw)
To: Lennert Buytenhek; +Cc: linux-wireless, Yogesh Ashok Powar, Nishant Sarmukadam
On Sat, Jun 18, 2016 at 11:48:28AM +0300, Lennert Buytenhek wrote:
> Nothing in here seems particularly bad. So whatever the problem is,
> I don't think it can be diagnosed from these messages alone.
>
> I went back to the email thread, and it seems that the problem is that
> you're trying to run the card in AP mode but no traffic is making it
> through? Is AP association working at all, or is that failing too?
The mwl8k is in AP mode and it gets associated just fine. It'll work
for five or so minutes and then you'll get the disconnect and the log
messages in the earlier emails. And it only happens with one of my
wireless devices - the other one will browse all day with a stable
connection to the mwl8k router.
Back in the OpenWRT issue a few more people have stuck their heads in
to say they're also seeing the same issue.
https://dev.openwrt.org/ticket/21284
--
David Gilman :DG<
http://gilslotd.com
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: Troubleshooting mwl8k driver issue
2016-06-21 0:36 ` David Gilman
@ 2016-06-21 8:01 ` Lennert Buytenhek
2016-07-03 6:13 ` David Gilman
0 siblings, 1 reply; 9+ messages in thread
From: Lennert Buytenhek @ 2016-06-21 8:01 UTC (permalink / raw)
To: David Gilman; +Cc: linux-wireless, Yogesh Ashok Powar, Nishant Sarmukadam
On Mon, Jun 20, 2016 at 07:36:30PM -0500, David Gilman wrote:
> > Nothing in here seems particularly bad. So whatever the problem is,
> > I don't think it can be diagnosed from these messages alone.
> >
> > I went back to the email thread, and it seems that the problem is that
> > you're trying to run the card in AP mode but no traffic is making it
> > through? Is AP association working at all, or is that failing too?
>
> The mwl8k is in AP mode and it gets associated just fine. It'll work
> for five or so minutes and then you'll get the disconnect and the log
> messages in the earlier emails. And it only happens with one of my
> wireless devices - the other one will browse all day with a stable
> connection to the mwl8k router.
>
> Back in the OpenWRT issue a few more people have stuck their heads in
> to say they're also seeing the same issue.
>
> https://dev.openwrt.org/ticket/21284
The only thing the log tells me is that this disconnect happens
voluntarily, so I see nothing wrong from just those log messages.
Can you run a sniffer to see what happens on the air when this
disconnect occurs, or increase hostapd verbosity/debugging somehow?
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: Troubleshooting mwl8k driver issue
2016-06-21 8:01 ` Lennert Buytenhek
@ 2016-07-03 6:13 ` David Gilman
0 siblings, 0 replies; 9+ messages in thread
From: David Gilman @ 2016-07-03 6:13 UTC (permalink / raw)
To: Lennert Buytenhek; +Cc: linux-wireless, Yogesh Ashok Powar, Nishant Sarmukadam
[-- Attachment #1: Type: text/plain, Size: 945 bytes --]
> The only thing the log tells me is that this disconnect happens
> voluntarily, so I see nothing wrong from just those log messages.
> Can you run a sniffer to see what happens on the air when this
> disconnect occurs, or increase hostapd verbosity/debugging somehow?
I've given hostapd logging a shot. The first 3 logs attached
(hostapd_debug-hostap_debug3) are syslogs with logging all the way up.
The last one is hostapd being run with the -dd flag.
All three of the events have slightly different logs but they're all
related to that WPA rekeying event. This is a shot in the dark here,
but given that they look to be related to late or missing responses to
the rekeying maybe it's the wireless device being slow, or just slow
enough to not be able to keep up with the AP? I could build a hostapd
with the timeout increased but I don't know if that's a good idea or the
right approach here.
--
David Gilman :DG<
http://gilslotd.com
[-- Attachment #2: hostapd_debug --]
[-- Type: text/plain, Size: 3960 bytes --]
Mon Jun 27 02:14:05 2016 daemon.debug hostapd: wlan1: WPA rekeying GTK
Mon Jun 27 02:14:05 2016 daemon.debug hostapd: wlan1: STA (bad phone) WPA: sending 1/2 msg of Group Key Handshake
Mon Jun 27 02:14:06 2016 daemon.debug hostapd: wlan1: STA (bad phone) WPA: EAPOL-Key timeout
Mon Jun 27 02:14:06 2016 daemon.debug hostapd: wlan1: STA (bad phone) WPA: sending 1/2 msg of Group Key Handshake
Mon Jun 27 02:14:07 2016 daemon.debug hostapd: wlan1: STA (bad phone) WPA: EAPOL-Key timeout
Mon Jun 27 02:14:07 2016 daemon.debug hostapd: wlan1: STA (bad phone) WPA: sending 1/2 msg of Group Key Handshake
Mon Jun 27 02:14:08 2016 daemon.debug hostapd: wlan1: STA (bad phone) WPA: EAPOL-Key timeout
Mon Jun 27 02:14:08 2016 daemon.debug hostapd: wlan1: STA (bad phone) WPA: sending 1/2 msg of Group Key Handshake
Mon Jun 27 02:14:09 2016 daemon.debug hostapd: wlan1: STA (bad phone) WPA: EAPOL-Key timeout
Mon Jun 27 02:14:09 2016 daemon.debug hostapd: wlan1: STA (bad phone) WPA: WPA_PTK: sm->Disconnect
Mon Jun 27 02:14:09 2016 daemon.debug hostapd: wlan1: STA (bad phone) WPA: event 3 notification
Mon Jun 27 02:14:09 2016 daemon.debug hostapd: wlan1: STA (bad phone) IEEE 802.1X: unauthorizing port
Mon Jun 27 02:14:11 2016 daemon.debug hostapd: wlan1: STA (bad phone) MLME: MLME-DEAUTHENTICATE.indication((bad phone), 2)
Mon Jun 27 02:14:11 2016 daemon.debug hostapd: wlan1: STA (bad phone) MLME: MLME-DELETEKEYS.request((bad phone))
Mon Jun 27 02:14:11 2016 kern.debug kernel: [ 1952.642536] ieee80211 phy1: Deleted BA stream index 0
Mon Jun 27 02:14:11 2016 kern.debug kernel: [ 1952.642565] ieee80211 phy1: Remove stream for (bad phone) 0
Mon Jun 27 02:14:14 2016 daemon.info hostapd: wlan1: STA (bad phone) IEEE 802.11: deauthenticated due to local deauth request
Mon Jun 27 02:14:29 2016 daemon.debug hostapd: wlan1: STA (bad phone) IEEE 802.11: authentication OK (open system)
Mon Jun 27 02:14:29 2016 daemon.debug hostapd: wlan1: STA (bad phone) MLME: MLME-AUTHENTICATE.indication((bad phone), OPEN_SYSTEM)
Mon Jun 27 02:14:29 2016 daemon.debug hostapd: wlan1: STA (bad phone) MLME: MLME-DELETEKEYS.request((bad phone))
Mon Jun 27 02:14:29 2016 daemon.info hostapd: wlan1: STA (bad phone) IEEE 802.11: authenticated
Mon Jun 27 02:14:29 2016 daemon.debug hostapd: wlan1: STA (bad phone) IEEE 802.11: association OK (aid 1)
Mon Jun 27 02:14:29 2016 daemon.info hostapd: wlan1: STA (bad phone) IEEE 802.11: associated (aid 1)
Mon Jun 27 02:14:29 2016 daemon.debug hostapd: wlan1: STA (bad phone) MLME: MLME-ASSOCIATE.indication((bad phone))
Mon Jun 27 02:14:29 2016 daemon.debug hostapd: wlan1: STA (bad phone) MLME: MLME-DELETEKEYS.request((bad phone))
Mon Jun 27 02:14:29 2016 daemon.debug hostapd: wlan1: STA (bad phone) IEEE 802.11: binding station to interface 'wlan1'
Mon Jun 27 02:14:29 2016 daemon.debug hostapd: wlan1: STA (bad phone) WPA: event 1 notification
Mon Jun 27 02:14:29 2016 daemon.debug hostapd: wlan1: STA (bad phone) WPA: start authentication
Mon Jun 27 02:14:29 2016 daemon.debug hostapd: wlan1: STA (bad phone) IEEE 802.1X: unauthorizing port
Mon Jun 27 02:14:29 2016 daemon.debug hostapd: wlan1: STA (bad phone) WPA: sending 1/4 msg of 4-Way Handshake
Mon Jun 27 02:14:29 2016 daemon.debug hostapd: wlan1: STA (bad phone) WPA: received EAPOL-Key frame (2/4 Pairwise)
Mon Jun 27 02:14:29 2016 daemon.debug hostapd: wlan1: STA (bad phone) WPA: sending 3/4 msg of 4-Way Handshake
Mon Jun 27 02:14:29 2016 daemon.debug hostapd: wlan1: STA (bad phone) WPA: received EAPOL-Key frame (4/4 Pairwise)
Mon Jun 27 02:14:29 2016 daemon.debug hostapd: wlan1: STA (bad phone) IEEE 802.1X: authorizing port
Mon Jun 27 02:14:29 2016 daemon.info hostapd: wlan1: STA (bad phone) WPA: pairwise key handshake completed (RSN)
Mon Jun 27 02:14:30 2016 daemon.info dnsmasq-dhcp[2989]: DHCPREQUEST(br-lan) 192.168.1.138 (bad phone)
Mon Jun 27 02:14:30 2016 daemon.info dnsmasq-dhcp[2989]: DHCPACK(br-lan) 192.168.1.138 (bad phone) android-63ebbc936f7b53af
[-- Attachment #3: hostapd_debug2 --]
[-- Type: text/plain, Size: 749 bytes --]
Mon Jun 27 02:24:05 2016 daemon.debug hostapd: wlan1: WPA rekeying GTK
Mon Jun 27 02:24:05 2016 daemon.debug hostapd: wlan1: STA (bad phone) WPA: sending 1/2 msg of Group Key Handshake
Mon Jun 27 02:24:06 2016 daemon.debug hostapd: wlan1: STA (bad phone) WPA: EAPOL-Key timeout
Mon Jun 27 02:24:06 2016 daemon.debug hostapd: wlan1: STA (bad phone) WPA: sending 1/2 msg of Group Key Handshake
Mon Jun 27 02:24:06 2016 daemon.debug hostapd: wlan1: STA (bad phone) WPA: received EAPOL-Key frame (2/2 Group)
Mon Jun 27 02:24:06 2016 daemon.info hostapd: wlan1: STA (bad phone) WPA: group key handshake completed (RSN)
Mon Jun 27 02:24:06 2016 daemon.debug hostapd: wlan1: STA (bad phone) WPA: received EAPOL-Key 2/2 Group with unexpected replay counter
[-- Attachment #4: hostapd_debug3 --]
[-- Type: text/plain, Size: 1453 bytes --]
Mon Jun 27 02:37:44 2016 kern.notice kernel: [ 3365.611014] ieee80211 phy1: tx rings drained
Mon Jun 27 02:37:44 2016 kern.debug kernel: [ 3365.615496] ieee80211 phy1: Deleted BA stream index 0
Mon Jun 27 02:37:44 2016 kern.debug kernel: [ 3365.615518] ieee80211 phy1: Remove stream for (bad phone) 0
Mon Jun 27 02:37:44 2016 kern.debug kernel: [ 3365.979922] ieee80211 phy1: Added a new stream for (bad phone) 0
Mon Jun 27 02:37:44 2016 kern.debug kernel: [ 3365.979965] ieee80211 phy1: Started stream for (bad phone) 0
Mon Jun 27 02:37:44 2016 kern.notice kernel: [ 3365.980066] ieee80211 phy1: tx rings drained
Mon Jun 27 02:37:44 2016 kern.err kernel: [ 3365.985827] ieee80211 phy1: Command BASTREAM error 0x1
Mon Jun 27 02:37:45 2016 kern.err kernel: [ 3366.992421] ieee80211 phy1: Command BASTREAM error 0x1
Mon Jun 27 02:37:46 2016 kern.err kernel: [ 3368.002391] ieee80211 phy1: Command BASTREAM error 0x1
Mon Jun 27 02:37:48 2016 kern.debug kernel: [ 3370.012306] ieee80211 phy1: Remove stream for (bad phone) 0
Mon Jun 27 02:37:53 2016 kern.debug kernel: [ 3374.452437] ieee80211 phy1: Added a new stream for (bad phone) 0
Mon Jun 27 02:37:53 2016 kern.debug kernel: [ 3374.452482] ieee80211 phy1: Started stream for (bad phone) 0
Mon Jun 27 02:37:53 2016 kern.notice kernel: [ 3374.452898] ieee80211 phy1: tx rings drained
Mon Jun 27 02:37:53 2016 kern.debug kernel: [ 3374.461251] ieee80211 phy1: Created a BA stream for (bad phone) : tid 0
[-- Attachment #5: hostapd_debug4 --]
[-- Type: text/plain, Size: 34811 bytes --]
wlan1: WPA rekeying GTK
WPA: group state machine entering state SETKEYS (VLAN-ID 0)
GTK - hexdump(len=16): [REMOVED]
WPA: (good laptop) WPA_PTK_GROUP entering state REKEYNEGOTIATING
wlan1: STA (good laptop) WPA: sending 1/2 msg of Group Key Handshake
WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=0 pairwise=0 kde_len=24 keyidx=2 encr=1)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 03
Plaintext EAPOL-Key Key Data - hexdump(len=32): [REMOVED]
WPA: Use EAPOL-Key timeout of 500 ms (retry counter 1)
WPA: (bad phone) WPA_PTK_GROUP entering state REKEYNEGOTIATING
wlan1: STA (bad phone) WPA: sending 1/2 msg of Group Key Handshake
WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=0 pairwise=0 kde_len=24 keyidx=2 encr=1)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 03
Plaintext EAPOL-Key Key Data - hexdump(len=32): [REMOVED]
WPA: Use EAPOL-Key timeout of 500 ms (retry counter 1)
wpa_group_setkeys: GKeyDoneStations=2
wlan1: Event EAPOL_TX_STATUS (38) received
IEEE 802.1X: (good laptop) TX status - version=2 type=3 length=127 - ack=1
WPA: EAPOL-Key TX status for STA (good laptop) ack=1
wlan1: Event EAPOL_RX (24) received
IEEE 802.1X: 99 bytes from (good laptop)
IEEE 802.1X: version=1 type=3 length=95
WPA: Received EAPOL-Key from (good laptop) key_info=0x302 type=2 key_data_length=0
WPA: Received Key Nonce - hexdump(len=32): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 03
wlan1: STA (good laptop) WPA: received EAPOL-Key frame (2/2 Group)
WPA: (good laptop) WPA_PTK_GROUP entering state REKEYESTABLISHED
wlan1: STA (good laptop) WPA: group key handshake completed (RSN)
WPA: (good laptop) WPA_PTK_GROUP entering state IDLE
wlan1: STA (bad phone) WPA: EAPOL-Key timeout
WPA: (bad phone) WPA_PTK_GROUP entering state REKEYNEGOTIATING
wlan1: STA (bad phone) WPA: sending 1/2 msg of Group Key Handshake
WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=0 pairwise=0 kde_len=24 keyidx=2 encr=1)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 04
Plaintext EAPOL-Key Key Data - hexdump(len=32): [REMOVED]
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 2)
wlan1: STA (bad phone) WPA: EAPOL-Key timeout
WPA: (bad phone) WPA_PTK_GROUP entering state REKEYNEGOTIATING
wlan1: STA (bad phone) WPA: sending 1/2 msg of Group Key Handshake
WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=0 pairwise=0 kde_len=24 keyidx=2 encr=1)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 05
Plaintext EAPOL-Key Key Data - hexdump(len=32): [REMOVED]
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 3)
wlan1: STA (bad phone) WPA: EAPOL-Key timeout
WPA: (bad phone) WPA_PTK_GROUP entering state REKEYNEGOTIATING
wlan1: STA (bad phone) WPA: sending 1/2 msg of Group Key Handshake
WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=0 pairwise=0 kde_len=24 keyidx=2 encr=1)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 06
Plaintext EAPOL-Key Key Data - hexdump(len=32): [REMOVED]
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 4)
wlan1: STA (bad phone) WPA: EAPOL-Key timeout
WPA: (bad phone) WPA_PTK_GROUP entering state REKEYNEGOTIATING
WPA: (bad phone) WPA_PTK_GROUP entering state KEYERROR
WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0)
wpa_driver_nl80211_set_key: ifindex=17 (wlan1) alg=3 addr=0x88628 key_idx=2 set_tx=1 seq_len=0 key_len=16
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
broadcast key
wlan1: STA (bad phone) WPA: WPA_PTK: sm->Disconnect
WPA: (bad phone) WPA_PTK entering state DISCONNECT
wpa_sta_disconnect STA (bad phone)
hostapd_wpa_auth_disconnect: WPA authenticator requests disconnect: STA (bad phone) reason 2
wlan1: ap_sta_disconnect addr (bad phone) reason=2
nl80211: send_mlme - da= (bad phone) noack=0 freq=0 no_cck=0 offchanok=0 wait_time=0 fc=0xc0 (WLAN_FC_STYPE_DEAUTH) nlmode=3
nl80211: send_mlme -> send_frame
nl80211: send_frame - Use bss->freq=5240
nl80211: send_frame -> send_frame_cmd
nl80211: CMD_FRAME freq=5240 wait=0 no_cck=0 no_ack=0 offchanok=0
CMD_FRAME - hexdump(len=26): c0 00 00 00 fc c2 de ac b1 72 94 10 3e 8f d2 db 94 10 3e 8f d2 db 00 00 02 00
nl80211: Frame TX command accepted; cookie 0x129c
nl80211: Drop oldest pending send action cookie 0x0
wlan1: AP-STA-DISCONNECTED (bad phone)
wlan1: STA (bad phone) WPA: event 3 notification
wpa_driver_nl80211_set_key: ifindex=17 (wlan1) alg=0 addr=0xb6e853d8 key_idx=0 set_tx=1 seq_len=0 key_len=0
addr=(bad phone)
wlan1: ap_sta_disconnect: reschedule ap_handle_timer timeout for (bad phone) (5 seconds - AP_MAX_INACTIVITY_AFTER_DEAUTH)
WPA: (bad phone) WPA_PTK_GROUP entering state IDLE
WPA: (bad phone) WPA_PTK entering state DISCONNECTED
WPA: (bad phone) WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=17 (wlan1) alg=0 addr=0xb6e853d8 key_idx=0 set_tx=1 seq_len=0 key_len=0
addr=(bad phone)
nl80211: Set STA flags - ifname=wlan1 addr=(bad phone) total_flags=0x2 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan1: STA (bad phone) IEEE 802.1X: unauthorizing port
wlan1: Deauthentication callback for STA (bad phone)
wlan1: Removing STA (bad phone) from kernel driver
nl80211: sta_remove -> DEL_STATION wlan1 (bad phone) --> 0 (No error information)
wlan1: STA (bad phone) MLME: MLME-DEAUTHENTICATE.indication((bad phone), 2)
wlan1: STA (bad phone) MLME: MLME-DELETEKEYS.request((bad phone))
wpa_driver_nl80211_set_key: ifindex=17 (wlan1) alg=0 addr=0xb6e853d8 key_idx=0 set_tx=1 seq_len=0 key_len=0
addr=(bad phone)
nl80211: Event message available
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan1
nl80211: Delete station (bad phone)
nl80211: Event message available
nl80211: BSS Event 83 (NL80211_CMD_UNEXPECTED_FRAME) received for wlan1
wlan1: Event RX_FROM_UNKNOWN (18) received
Data/PS-poll frame from not associated STA (bad phone)
Association Response to the STA has already been sent, but no TX status yet known - ignore Class 3 frame issue with (bad phone)
wlan1: ap_handle_timer: (bad phone) flags=0x40008a00 timeout_next=3
wlan1: STA (bad phone) IEEE 802.11: deauthenticated due to local deauth request
nl80211: sta_remove -> DEL_STATION wlan1 (bad phone) --> -2 (No such file or directory)
hostapd_ht_operation_update current operation mode=0x4
hostapd_ht_operation_update new operation mode=0x4 changes=0
ap_free_sta: cancel ap_handle_timer for (bad phone)
nl80211: Event message available
nl80211: BSS Event 83 (NL80211_CMD_UNEXPECTED_FRAME) received for wlan1
wlan1: Event RX_FROM_UNKNOWN (18) received
Data/PS-poll frame from not associated STA (bad phone)
nl80211: send_mlme - da= (bad phone) noack=0 freq=0 no_cck=0 offchanok=0 wait_time=0 fc=0xc0 (WLAN_FC_STYPE_DEAUTH) nlmode=3
nl80211: send_mlme -> send_frame
nl80211: send_frame - Use bss->freq=5240
nl80211: send_frame -> send_frame_cmd
nl80211: CMD_FRAME freq=5240 wait=0 no_cck=0 no_ack=0 offchanok=0
CMD_FRAME - hexdump(len=26): c0 00 00 00 fc c2 de ac b1 72 94 10 3e 8f d2 db 94 10 3e 8f d2 db 00 00 07 00
nl80211: Frame TX command accepted; cookie 0x129d
nl80211: Drop oldest pending send action cookie 0x0
nl80211: Event message available
nl80211: Drv Event 60 (NL80211_CMD_FRAME_TX_STATUS) received for wlan1
nl80211: MLME event 60 (NL80211_CMD_FRAME_TX_STATUS) on wlan1((AP)) A1=(bad phone) A2=(AP)
nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 fc c2 de ac b1 72 94 10 3e 8f d2 db 94 10 3e 8f d2 db 00 00 07 00
nl80211: Frame TX status event
wlan1: Event TX_STATUS (17) received
mgmt::deauth cb
handle_deauth_cb: STA (bad phone) not found
nl80211: Event message available
nl80211: BSS Event 83 (NL80211_CMD_UNEXPECTED_FRAME) received for wlan1
wlan1: Event RX_FROM_UNKNOWN (18) received
Data/PS-poll frame from not associated STA (bad phone)
nl80211: send_mlme - da= (bad phone) noack=0 freq=0 no_cck=0 offchanok=0 wait_time=0 fc=0xc0 (WLAN_FC_STYPE_DEAUTH) nlmode=3
nl80211: send_mlme -> send_frame
nl80211: send_frame - Use bss->freq=5240
nl80211: send_frame -> send_frame_cmd
nl80211: CMD_FRAME freq=5240 wait=0 no_cck=0 no_ack=0 offchanok=0
CMD_FRAME - hexdump(len=26): c0 00 00 00 fc c2 de ac b1 72 94 10 3e 8f d2 db 94 10 3e 8f d2 db 00 00 07 00
nl80211: Frame TX command accepted; cookie 0x129e
nl80211: Drop oldest pending send action cookie 0x0
nl80211: Event message available
nl80211: Drv Event 60 (NL80211_CMD_FRAME_TX_STATUS) received for wlan1
nl80211: MLME event 60 (NL80211_CMD_FRAME_TX_STATUS) on wlan1((AP)) A1=(bad phone) A2=(AP)
nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 fc c2 de ac b1 72 94 10 3e 8f d2 db 94 10 3e 8f d2 db 00 00 07 00
nl80211: Frame TX status event
wlan1: Event TX_STATUS (17) received
mgmt::deauth cb
handle_deauth_cb: STA (bad phone) not found
nl80211: Event message available
nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wlan1
nl80211: MLME event 59 (NL80211_CMD_FRAME) on wlan1((AP)) A1=ff:ff:ff:ff:ff:ff A2=(bad phone)
nl80211: MLME event frame - hexdump(len=128): 40 00 00 00 ff ff ff ff ff ff fc c2 de ac b1 72 ff ff ff ff ff ff 40 d7 00 0e 67 69 6c 6d 61 6e 20 6f 70 65 6e 77 72 74 01 08 0c 12 18 24 30 48 60 6c 2d 1a 6f 00 17 ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 06 00 00 08 80 01 40 bf 0c 32 58 81 0f fa ff 00 00 fa ff 00 00 dd 05 00 90 4c 04 07 dd 08 00 50 f2 08 00 11 00 00 dd 09 00 10 18 02 00 00 10 00 00
nl80211: Frame event
nl80211: RX frame sa=(bad phone) freq=5240 ssi_signal=-61 fc=0x40 seq_ctrl=0xd740 stype=4 (WLAN_FC_STYPE_PROBE_REQ) len=128
nl80211: send_mlme - da= (bad phone) noack=0 freq=0 no_cck=0 offchanok=0 wait_time=0 fc=0x50 (WLAN_FC_STYPE_PROBE_RESP) nlmode=3
nl80211: send_mlme -> send_frame
nl80211: send_frame - Use bss->freq=5240
nl80211: send_frame -> send_frame_cmd
nl80211: CMD_FRAME freq=5240 wait=0 no_cck=0 no_ack=0 offchanok=0
CMD_FRAME - hexdump(len=183): 50 00 00 00 fc c2 de ac b1 72 94 10 3e 8f d2 db 94 10 3e 8f d2 db 00 00 00 00 00 00 00 00 00 00 64 00 11 00 00 0e 67 69 6c 6d 61 6e 20 6f 70 65 6e 77 72 74 01 08 8c 12 98 24 b0 48 60 6c 03 01 30 07 06 30 30 20 24 04 14 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 2d 1a ec 0b 03 ff ff ff 00 01 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 30 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 00 00 00 00 00 00 00 40 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
nl80211: Frame TX command accepted; cookie 0x129f
nl80211: Drop oldest pending send action cookie 0x0
nl80211: Event message available
nl80211: Drv Event 60 (NL80211_CMD_FRAME_TX_STATUS) received for wlan1
nl80211: MLME event 60 (NL80211_CMD_FRAME_TX_STATUS) on wlan1((AP)) A1=(bad phone) A2=(AP)
nl80211: MLME event frame - hexdump(len=183): 50 00 00 00 fc c2 de ac b1 72 94 10 3e 8f d2 db 94 10 3e 8f d2 db 00 00 00 00 00 00 00 00 00 00 64 00 11 00 00 0e 67 69 6c 6d 61 6e 20 6f 70 65 6e 77 72 74 01 08 8c 12 98 24 b0 48 60 6c 03 01 30 07 06 30 30 20 24 04 14 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 2d 1a ec 0b 03 ff ff ff 00 01 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 30 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 00 00 00 00 00 00 00 40 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
nl80211: Frame TX status event
wlan1: Event TX_STATUS (17) received
nl80211: Event message available
nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wlan1
nl80211: MLME event 59 (NL80211_CMD_FRAME) on wlan1((AP)) A1=(AP) A2=(bad phone)
nl80211: MLME event frame - hexdump(len=26): c0 00 3c 00 94 10 3e 8f d2 db fc c2 de ac b1 72 94 10 3e 8f d2 db 50 d7 06 00
nl80211: Frame event
nl80211: RX frame sa=(bad phone) freq=5240 ssi_signal=-62 fc=0xc0 seq_ctrl=0xd750 stype=12 (WLAN_FC_STYPE_DEAUTH) len=26
wlan1: Event RX_MGMT (19) received
wlan1: mgmt::deauth
wlan1: deauthentication: STA=(bad phone) reason_code=6
wlan1: Station (bad phone) trying to deauthenticate, but it is not authenticated
nl80211: Event message available
nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wlan1
nl80211: MLME event 59 (NL80211_CMD_FRAME) on wlan1((AP)) A1=ff:ff:ff:ff:ff:ff A2=(bad phone)
nl80211: MLME event frame - hexdump(len=128): 40 00 00 00 ff ff ff ff ff ff fc c2 de ac b1 72 ff ff ff ff ff ff 60 d7 00 0e 67 69 6c 6d 61 6e 20 6f 70 65 6e 77 72 74 01 08 0c 12 18 24 30 48 60 6c 2d 1a 6f 00 17 ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 06 00 00 08 80 01 40 bf 0c 32 58 81 0f fa ff 00 00 fa ff 00 00 dd 05 00 90 4c 04 07 dd 08 00 50 f2 08 00 11 00 00 dd 09 00 10 18 02 00 00 10 00 00
nl80211: Frame event
nl80211: RX frame sa=(bad phone) freq=5240 ssi_signal=-61 fc=0x40 seq_ctrl=0xd760 stype=4 (WLAN_FC_STYPE_PROBE_REQ) len=128
nl80211: send_mlme - da= (bad phone) noack=0 freq=0 no_cck=0 offchanok=0 wait_time=0 fc=0x50 (WLAN_FC_STYPE_PROBE_RESP) nlmode=3
nl80211: send_mlme -> send_frame
nl80211: send_frame - Use bss->freq=5240
nl80211: send_frame -> send_frame_cmd
nl80211: CMD_FRAME freq=5240 wait=0 no_cck=0 no_ack=0 offchanok=0
CMD_FRAME - hexdump(len=183): 50 00 00 00 fc c2 de ac b1 72 94 10 3e 8f d2 db 94 10 3e 8f d2 db 00 00 00 00 00 00 00 00 00 00 64 00 11 00 00 0e 67 69 6c 6d 61 6e 20 6f 70 65 6e 77 72 74 01 08 8c 12 98 24 b0 48 60 6c 03 01 30 07 06 30 30 20 24 04 14 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 2d 1a ec 0b 03 ff ff ff 00 01 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 30 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 00 00 00 00 00 00 00 40 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
nl80211: Frame TX command accepted; cookie 0x12a0
nl80211: Drop oldest pending send action cookie 0x0
nl80211: Event message available
nl80211: Drv Event 60 (NL80211_CMD_FRAME_TX_STATUS) received for wlan1
nl80211: MLME event 60 (NL80211_CMD_FRAME_TX_STATUS) on wlan1((AP)) A1=(bad phone) A2=(AP)
nl80211: MLME event frame - hexdump(len=183): 50 00 00 00 fc c2 de ac b1 72 94 10 3e 8f d2 db 94 10 3e 8f d2 db 00 00 00 00 00 00 00 00 00 00 64 00 11 00 00 0e 67 69 6c 6d 61 6e 20 6f 70 65 6e 77 72 74 01 08 8c 12 98 24 b0 48 60 6c 03 01 30 07 06 30 30 20 24 04 14 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 2d 1a ec 0b 03 ff ff ff 00 01 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 30 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 00 00 00 00 00 00 00 40 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
nl80211: Frame TX status event
wlan1: Event TX_STATUS (17) received
nl80211: Event message available
nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wlan1
nl80211: MLME event 59 (NL80211_CMD_FRAME) on wlan1((AP)) A1=(AP) A2=(bad phone)
nl80211: MLME event frame - hexdump(len=41): b0 00 3c 00 94 10 3e 8f d2 db fc c2 de ac b1 72 94 10 3e 8f d2 db 70 d7 00 00 01 00 00 00 dd 09 00 10 18 02 00 00 10 00 00
nl80211: Frame event
nl80211: RX frame sa=(bad phone) freq=5240 ssi_signal=-61 fc=0xb0 seq_ctrl=0xd770 stype=11 (WLAN_FC_STYPE_AUTH) len=41
wlan1: Event RX_MGMT (19) received
mgmt::auth
authentication: STA=(bad phone) auth_alg=0 auth_transaction=1 status_code=0 wep=0 seq_ctrl=0xd770
New STA
ap_sta_add: register ap_handle_timer timeout for (bad phone) (300 seconds - ap_max_inactivity)
wlan1: STA (bad phone) IEEE 802.11: authentication OK (open system)
wlan1: STA (bad phone) MLME: MLME-AUTHENTICATE.indication((bad phone), OPEN_SYSTEM)
wlan1: STA (bad phone) MLME: MLME-DELETEKEYS.request((bad phone))
authentication reply: STA=(bad phone) auth_alg=0 auth_transaction=2 resp=0 (IE len=0)
nl80211: send_mlme - da= (bad phone) noack=0 freq=0 no_cck=0 offchanok=0 wait_time=0 fc=0xb0 (WLAN_FC_STYPE_AUTH) nlmode=3
nl80211: send_mlme -> send_frame
nl80211: send_frame - Use bss->freq=5240
nl80211: send_frame -> send_frame_cmd
nl80211: CMD_FRAME freq=5240 wait=0 no_cck=0 no_ack=0 offchanok=0
CMD_FRAME - hexdump(len=30): b0 00 00 00 fc c2 de ac b1 72 94 10 3e 8f d2 db 94 10 3e 8f d2 db 00 00 00 00 02 00 00 00
nl80211: Frame TX command accepted; cookie 0x12a1
nl80211: Drop oldest pending send action cookie 0x0
nl80211: Event message available
nl80211: Drv Event 60 (NL80211_CMD_FRAME_TX_STATUS) received for wlan1
nl80211: MLME event 60 (NL80211_CMD_FRAME_TX_STATUS) on wlan1((AP)) A1=(bad phone) A2=(AP)
nl80211: MLME event frame - hexdump(len=30): b0 00 00 00 fc c2 de ac b1 72 94 10 3e 8f d2 db 94 10 3e 8f d2 db 00 00 00 00 02 00 00 00
nl80211: Frame TX status event
wlan1: Event TX_STATUS (17) received
mgmt::auth cb
wlan1: STA (bad phone) IEEE 802.11: authenticated
nl80211: Event message available
nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wlan1
nl80211: MLME event 59 (NL80211_CMD_FRAME) on wlan1((AP)) A1=(AP) A2=(bad phone)
nl80211: MLME event frame - hexdump(len=148): 00 00 3c 00 94 10 3e 8f d2 db fc c2 de ac b1 72 94 10 3e 8f d2 db 80 d7 11 00 0a 00 00 0e 67 69 6c 6d 61 6e 20 6f 70 65 6e 77 72 74 01 08 8c 12 98 24 b0 48 60 6c 21 02 09 12 24 0a 24 04 34 04 64 0c 95 04 a5 01 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 2d 1a 6f 00 17 ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 06 00 00 08 80 01 40 dd 09 00 10 18 02 00 00 10 00 00 dd 07 00 50 f2 02 00 01 00
nl80211: Frame event
nl80211: RX frame sa=(bad phone) freq=5240 ssi_signal=-62 fc=0x0 seq_ctrl=0xd780 stype=0 (WLAN_FC_STYPE_ASSOC_REQ) len=148
wlan1: Event RX_MGMT (19) received
mgmt::assoc_req
association request: STA=(bad phone) capab_info=0x11 listen_interval=10 seq_ctrl=0xd780
WMM IE - hexdump(len=7): 00 50 f2 02 00 01 00
Validating WMM IE: OUI 00:50:f2 OUI type 2 OUI sub-type 0 version 1 QoS info 0x0
new AID 1
HT: STA (bad phone) HT Capabilities Info: 0x006f
update_sta_ht STA (bad phone) - no greenfield, num of non-gf stations 2
hostapd_ht_operation_update current operation mode=0x4
hostapd_ht_operation_update new operation mode=0x4 changes=0
wlan1: STA (bad phone) IEEE 802.11: association OK (aid 1)
nl80211: send_mlme - da= (bad phone) noack=0 freq=0 no_cck=0 offchanok=0 wait_time=0 fc=0x10 (WLAN_FC_STYPE_ASSOC_RESP) nlmode=3
nl80211: send_mlme -> send_frame
nl80211: send_frame - Use bss->freq=5240
nl80211: send_frame -> send_frame_cmd
nl80211: CMD_FRAME freq=5240 wait=0 no_cck=0 no_ack=0 offchanok=0
CMD_FRAME - hexdump(len=128): 10 00 00 00 fc c2 de ac b1 72 94 10 3e 8f d2 db 94 10 3e 8f d2 db 00 00 11 00 00 00 01 c0 01 08 8c 12 98 24 b0 48 60 6c 2d 1a ec 0b 03 ff ff ff 00 01 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 30 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 00 00 00 00 00 00 00 40 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
nl80211: Frame TX command accepted; cookie 0x12a2
nl80211: Drop oldest pending send action cookie 0x0
nl80211: Event message available
nl80211: Drv Event 60 (NL80211_CMD_FRAME_TX_STATUS) received for wlan1
nl80211: MLME event 60 (NL80211_CMD_FRAME_TX_STATUS) on wlan1((AP)) A1=(bad phone) A2=(AP)
nl80211: MLME event frame - hexdump(len=128): 10 00 00 00 fc c2 de ac b1 72 94 10 3e 8f d2 db 94 10 3e 8f d2 db 00 00 11 00 00 00 01 c0 01 08 8c 12 98 24 b0 48 60 6c 2d 1a ec 0b 03 ff ff ff 00 01 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 30 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 00 00 00 00 00 00 00 40 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
nl80211: Frame TX status event
wlan1: Event TX_STATUS (17) received
mgmt::assoc_resp cb
wlan1: STA (bad phone) IEEE 802.11: associated (aid 1)
wlan1: STA (bad phone) MLME: MLME-ASSOCIATE.indication((bad phone))
wlan1: STA (bad phone) MLME: MLME-DELETEKEYS.request((bad phone))
wpa_driver_nl80211_set_key: ifindex=17 (wlan1) alg=0 addr=0xb6eb4578 key_idx=0 set_tx=1 seq_len=0 key_len=0
addr=(bad phone)
nl80211: sta_remove -> DEL_STATION wlan1 (bad phone) --> -2 (No such file or directory)
nl80211: Add STA (bad phone)
* supported rates - hexdump(len=8): 8c 12 98 24 b0 48 60 6c
* capability=0x11
* ht_capabilities - hexdump(len=26): 6c 00 17 ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
* aid=1
* listen_interval=10
* flags set=0x8 mask=0x8
* qosinfo=0x0
wlan1: STA (bad phone) IEEE 802.11: binding station to interface 'wlan1'
nl80211: wlan1[17]: set_sta_vlan((bad phone), ifname=wlan1[17], vlan_id=0)
nl80211: Set STA flags - ifname=wlan1 addr=(bad phone) total_flags=0x2 flags_or=0x2 flags_and=0xfffffff3 authorized=0
wlan1: STA (bad phone) WPA: event 1 notification
wpa_driver_nl80211_set_key: ifindex=17 (wlan1) alg=0 addr=0xb6eb4578 key_idx=0 set_tx=1 seq_len=0 key_len=0
addr=(bad phone)
IEEE 802.1X: Ignore STA - 802.1X not enabled or forced for WPS
wlan1: STA (bad phone) WPA: start authentication
WPA: (bad phone) WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=17 (wlan1) alg=0 addr=0xb6eb4578 key_idx=0 set_tx=1 seq_len=0 key_len=0
addr=(bad phone)
nl80211: Set STA flags - ifname=wlan1 addr=(bad phone) total_flags=0x2 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan1: STA (bad phone) IEEE 802.1X: unauthorizing port
WPA: (bad phone) WPA_PTK_GROUP entering state IDLE
WPA: (bad phone) WPA_PTK entering state AUTHENTICATION
WPA: (bad phone) WPA_PTK entering state AUTHENTICATION2
WPA: Assign ANonce - hexdump(len=32): 53 5b 47 31 3f 5c 8d 8b 0a 50 96 ea f7 6f 5b 5a f7 14 c9 b9 1b fb 43 33 e2 e8 45 8f ba c1 12 62
WPA: (bad phone) WPA_PTK entering state INITPSK
Searching a PSK for (bad phone) prev_psk=0
Searching a PSK for (bad phone) prev_psk=0
WPA: (bad phone) WPA_PTK entering state PTKSTART
wlan1: STA (bad phone) WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=1 kde_len=0 keyidx=0 encr=0)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
WPA: Use EAPOL-Key timeout of 100 ms (retry counter 1)
wlan1: hostapd_new_assoc_sta: reschedule ap_handle_timer timeout for (bad phone) (300 seconds - ap_max_inactivity)
nl80211: Event message available
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlan1
nl80211: New station (bad phone)
wlan1: Event EAPOL_TX_STATUS (38) received
IEEE 802.1X: (bad phone) TX status - version=2 type=3 length=95 - ack=1
WPA: EAPOL-Key TX status for STA (bad phone) ack=1
WPA: Increase initial EAPOL-Key 1/4 timeout by 1000 ms because of acknowledged frame
wlan1: Event EAPOL_RX (24) received
IEEE 802.1X: 121 bytes from (bad phone)
IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from (bad phone) key_info=0x10a type=2 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): 6f 41 14 04 3c 80 eb 35 ae b7 69 e7 80 7d ed b8 4e 83 e3 7e 7c 8e e7 84 1d 45 10 84 fc 48 b8 7b
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
wlan1: STA (bad phone) WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: (bad phone) WPA_PTK entering state PTKCALCNEGOTIATING
Searching a PSK for (bad phone) prev_psk=0
WPA: PTK derivation - A1=(AP) A2=(bad phone)
WPA: Nonce1 - hexdump(len=32): 53 5b 47 31 3f 5c 8d 8b 0a 50 96 ea f7 6f 5b 5a f7 14 c9 b9 1b fb 43 33 e2 e8 45 8f ba c1 12 62
WPA: Nonce2 - hexdump(len=32): 6f 41 14 04 3c 80 eb 35 ae b7 69 e7 80 7d ed b8 4e 83 e3 7e 7c 8e e7 84 1d 45 10 84 fc 48 b8 7b
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: KEK - hexdump(len=16): [REMOVED]
WPA: TK - hexdump(len=16): [REMOVED]
WPA: (bad phone) WPA_PTK entering state PTKCALCNEGOTIATING2
WPA: (bad phone) WPA_PTK entering state PTKINITNEGOTIATING
wlan1: STA (bad phone) WPA: sending 3/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=1 kde_len=46 keyidx=2 encr=1)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
Plaintext EAPOL-Key Key Data - hexdump(len=56): [REMOVED]
WPA: Use EAPOL-Key timeout of 100 ms (retry counter 1)
wlan1: Event EAPOL_TX_STATUS (38) received
IEEE 802.1X: (bad phone) TX status - version=2 type=3 length=151 - ack=1
WPA: EAPOL-Key TX status for STA (bad phone) ack=1
wlan1: Event EAPOL_RX (24) received
IEEE 802.1X: 99 bytes from (bad phone)
IEEE 802.1X: version=1 type=3 length=95
WPA: Received EAPOL-Key from (bad phone) key_info=0x30a type=2 key_data_length=0
WPA: Received Key Nonce - hexdump(len=32): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
wlan1: STA (bad phone) WPA: received EAPOL-Key frame (4/4 Pairwise)
WPA: (bad phone) WPA_PTK entering state PTKINITDONE
wpa_driver_nl80211_set_key: ifindex=17 (wlan1) alg=3 addr=0xb6eb4578 key_idx=0 set_tx=1 seq_len=0 key_len=16
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
addr=(bad phone)
wlan1: AP-STA-CONNECTED (bad phone)
nl80211: Set STA flags - ifname=wlan1 addr=(bad phone) total_flags=0x3 flags_or=0x1 flags_and=0xffffffff authorized=1
wlan1: STA (bad phone) IEEE 802.1X: authorizing port
wlan1: STA (bad phone) WPA: pairwise key handshake completed (RSN)
nl80211: Event message available
nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wlan1
nl80211: MLME event 59 (NL80211_CMD_FRAME) on wlan1((AP)) A1=ff:ff:ff:ff:ff:ff A2=(bad phone)
nl80211: MLME event frame - hexdump(len=114): 40 00 00 00 ff ff ff ff ff ff fc c2 de ac b1 72 ff ff ff ff ff ff 60 da 00 00 01 08 0c 12 18 24 30 48 60 6c 2d 1a 6f 00 17 ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 06 00 00 08 80 01 40 bf 0c 32 58 81 0f fa ff 00 00 fa ff 00 00 dd 05 00 90 4c 04 07 dd 08 00 50 f2 08 00 11 00 fc dd 09 00 10 18 02 00 00 10 00 00
nl80211: Frame event
nl80211: RX frame sa=(bad phone) freq=5240 ssi_signal=-59 fc=0x40 seq_ctrl=0xda60 stype=4 (WLAN_FC_STYPE_PROBE_REQ) len=114
nl80211: send_mlme - da= (bad phone) noack=1 freq=0 no_cck=0 offchanok=0 wait_time=0 fc=0x50 (WLAN_FC_STYPE_PROBE_RESP) nlmode=3
nl80211: send_mlme -> send_frame
nl80211: send_frame - Use bss->freq=5240
nl80211: send_frame -> send_frame_cmd
nl80211: CMD_FRAME freq=5240 wait=0 no_cck=0 no_ack=1 offchanok=0
CMD_FRAME - hexdump(len=183): 50 00 00 00 fc c2 de ac b1 72 94 10 3e 8f d2 db 94 10 3e 8f d2 db 00 00 00 00 00 00 00 00 00 00 64 00 11 00 00 0e 67 69 6c 6d 61 6e 20 6f 70 65 6e 77 72 74 01 08 8c 12 98 24 b0 48 60 6c 03 01 30 07 06 30 30 20 24 04 14 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 2d 1a ec 0b 03 ff ff ff 00 01 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 30 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 00 00 00 00 00 00 00 40 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
nl80211: Frame TX command accepted (no ACK); cookie 0x0
nl80211: Drop oldest pending send action cookie 0x0
nl80211: Event message available
nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wlan1
nl80211: MLME event 59 (NL80211_CMD_FRAME) on wlan1((AP)) A1=ff:ff:ff:ff:ff:ff A2=(bad phone)
nl80211: MLME event frame - hexdump(len=114): 40 00 00 00 ff ff ff ff ff ff fc c2 de ac b1 72 ff ff ff ff ff ff 70 da 00 00 01 08 0c 12 18 24 30 48 60 6c 2d 1a 6f 00 17 ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 06 00 00 08 80 01 40 bf 0c 32 58 81 0f fa ff 00 00 fa ff 00 00 dd 05 00 90 4c 04 07 dd 08 00 50 f2 08 00 11 00 fc dd 09 00 10 18 02 00 00 10 00 00
nl80211: Frame event
nl80211: RX frame sa=(bad phone) freq=5240 ssi_signal=-60 fc=0x40 seq_ctrl=0xda70 stype=4 (WLAN_FC_STYPE_PROBE_REQ) len=114
nl80211: send_mlme - da= (bad phone) noack=1 freq=0 no_cck=0 offchanok=0 wait_time=0 fc=0x50 (WLAN_FC_STYPE_PROBE_RESP) nlmode=3
nl80211: send_mlme -> send_frame
nl80211: send_frame - Use bss->freq=5240
nl80211: send_frame -> send_frame_cmd
nl80211: CMD_FRAME freq=5240 wait=0 no_cck=0 no_ack=1 offchanok=0
CMD_FRAME - hexdump(len=183): 50 00 00 00 fc c2 de ac b1 72 94 10 3e 8f d2 db 94 10 3e 8f d2 db 00 00 00 00 00 00 00 00 00 00 64 00 11 00 00 0e 67 69 6c 6d 61 6e 20 6f 70 65 6e 77 72 74 01 08 8c 12 98 24 b0 48 60 6c 03 01 30 07 06 30 30 20 24 04 14 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 2d 1a ec 0b 03 ff ff ff 00 01 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 30 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 00 00 00 00 00 00 00 40 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
nl80211: Frame TX command accepted (no ACK); cookie 0x0
nl80211: Drop oldest pending send action cookie 0x0
nl80211: Event message available
nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wlan1
nl80211: MLME event 59 (NL80211_CMD_FRAME) on wlan1((AP)) A1=ff:ff:ff:ff:ff:ff A2=34:23:ba:7b:aa:15
nl80211: MLME event frame - hexdump(len=110): 40 00 00 00 ff ff ff ff ff ff 34 23 ba 7b aa 15 ff ff ff ff ff ff c0 01 00 00 01 08 0c 12 18 24 30 48 60 6c 2d 1a 62 00 1a ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 01 30 dd 09 00 10 18 02 00 00 00 00 00 dd 1e 00 90 4c 33 62 00 1a ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
nl80211: Frame event
nl80211: RX frame sa=34:23:ba:7b:aa:15 freq=5240 ssi_signal=-73 fc=0x40 seq_ctrl=0x1c0 stype=4 (WLAN_FC_STYPE_PROBE_REQ) len=110
nl80211: send_mlme - da= 34:23:ba:7b:aa:15 noack=1 freq=0 no_cck=0 offchanok=0 wait_time=0 fc=0x50 (WLAN_FC_STYPE_PROBE_RESP) nlmode=3
nl80211: send_mlme -> send_frame
nl80211: send_frame - Use bss->freq=5240
nl80211: send_frame -> send_frame_cmd
nl80211: CMD_FRAME freq=5240 wait=0 no_cck=0 no_ack=1 offchanok=0
CMD_FRAME - hexdump(len=183): 50 00 00 00 34 23 ba 7b aa 15 94 10 3e 8f d2 db 94 10 3e 8f d2 db 00 00 00 00 00 00 00 00 00 00 64 00 11 00 00 0e 67 69 6c 6d 61 6e 20 6f 70 65 6e 77 72 74 01 08 8c 12 98 24 b0 48 60 6c 03 01 30 07 06 30 30 20 24 04 14 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 2d 1a ec 0b 03 ff ff ff 00 01 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 30 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 00 00 00 00 00 00 00 40 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
nl80211: Frame TX command accepted (no ACK); cookie 0x0
nl80211: Drop oldest pending send action cookie 0x0
nl80211: Event message available
nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wlan1
nl80211: MLME event 59 (NL80211_CMD_FRAME) on wlan1((AP)) A1=ff:ff:ff:ff:ff:ff A2=34:23:ba:7b:aa:15
nl80211: MLME event frame - hexdump(len=110): 40 00 00 00 ff ff ff ff ff ff 34 23 ba 7b aa 15 ff ff ff ff ff ff d0 01 00 00 01 08 0c 12 18 24 30 48 60 6c 2d 1a 62 00 1a ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 01 30 dd 09 00 10 18 02 00 00 00 00 00 dd 1e 00 90 4c 33 62 00 1a ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
nl80211: Frame event
nl80211: RX frame sa=34:23:ba:7b:aa:15 freq=5240 ssi_signal=-67 fc=0x40 seq_ctrl=0x1d0 stype=4 (WLAN_FC_STYPE_PROBE_REQ) len=110
nl80211: send_mlme - da= 34:23:ba:7b:aa:15 noack=1 freq=0 no_cck=0 offchanok=0 wait_time=0 fc=0x50 (WLAN_FC_STYPE_PROBE_RESP) nlmode=3
nl80211: send_mlme -> send_frame
nl80211: send_frame - Use bss->freq=5240
nl80211: send_frame -> send_frame_cmd
nl80211: CMD_FRAME freq=5240 wait=0 no_cck=0 no_ack=1 offchanok=0
CMD_FRAME - hexdump(len=183): 50 00 00 00 34 23 ba 7b aa 15 94 10 3e 8f d2 db 94 10 3e 8f d2 db 00 00 00 00 00 00 00 00 00 00 64 00 11 00 00 0e 67 69 6c 6d 61 6e 20 6f 70 65 6e 77 72 74 01 08 8c 12 98 24 b0 48 60 6c 03 01 30 07 06 30 30 20 24 04 14 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 2d 1a ec 0b 03 ff ff ff 00 01 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 30 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 00 00 00 00 00 00 00 40 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
nl80211: Frame TX command accepted (no ACK); cookie 0x0
nl80211: Drop oldest pending send action cookie 0x0
nl80211: Event message available
nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wlan1
nl80211: MLME event 59 (NL80211_CMD_FRAME) on wlan1((AP)) A1=ff:ff:ff:ff:ff:ff A2=a4:77:33:7b:21:e8
nl80211: MLME event frame - hexdump(len=106): 40 00 00 00 ff ff ff ff ff ff a4 77 33 7b 21 e8 ff ff ff ff ff ff 70 92 00 0c 4e 45 54 47 45 41 52 38 30 2d 35 47 01 08 02 04 0b 0c 12 16 18 24 2d 1a 62 00 03 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 08 e0 e1 09 00 32 04 30 48 60 6c 7f 08 00 00 00 00 00 00 00 40 bf 0c 30 70 c0 33 fc ff 24 01 fc ff 24 01
nl80211: Frame event
nl80211: RX frame sa=a4:77:33:7b:21:e8 freq=5240 ssi_signal=-57 fc=0x40 seq_ctrl=0x9270 stype=4 (WLAN_FC_STYPE_PROBE_REQ) len=106
nl80211: Event message available
nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wlan1
nl80211: MLME event 59 (NL80211_CMD_FRAME) on wlan1((AP)) A1=ff:ff:ff:ff:ff:ff A2=a4:77:33:7b:21:e8
nl80211: MLME event frame - hexdump(len=106): 40 00 00 00 ff ff ff ff ff ff a4 77 33 7b 21 e8 ff ff ff ff ff ff 80 92 00 0c 4e 45 54 47 45 41 52 38 30 2d 35 47 01 08 02 04 0b 0c 12 16 18 24 2d 1a 62 00 03 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 08 e0 e1 09 00 32 04 30 48 60 6c 7f 08 00 00 00 00 00 00 00 40 bf 0c 30 70 c0 33 fc ff 24 01 fc ff 24 01
nl80211: Frame event
nl80211: RX frame sa=a4:77:33:7b:21:e8 freq=5240 ssi_signal=-57 fc=0x40 seq_ctrl=0x9280 stype=4 (WLAN_FC_STYPE_PROBE_REQ) len=106
nl80211: Event message available
nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wlan1
nl80211: MLME event 59 (NL80211_CMD_FRAME) on wlan1((AP)) A1=ff:ff:ff:ff:ff:ff A2=a4:77:33:7b:21:e8
nl80211: MLME event frame - hexdump(len=106): 40 00 00 00 ff ff ff ff ff ff a4 77 33 7b 21 e8 ff ff ff ff ff ff 90 92 00 0c 4e 45 54 47 45 41 52 38 30 2d 35 47 01 08 02 04 0b 0c 12 16 18 24 2d 1a 62 00 03 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 08 e0 e1 09 00 32 04 30 48 60 6c 7f 08 00 00 00 00 00 00 00 40 bf 0c 30 70 c0 33 fc ff 24 01 fc ff 24 01
nl80211: Frame event
nl80211: RX frame sa=a4:77:33:7b:21:e8 freq=5240 ssi_signal=-57 fc=0x40 seq_ctrl=0x9290 stype=4 (WLAN_FC_STYPE_PROBE_REQ) len=106
nl80211: Event message available
nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wlan1
nl80211: MLME event 59 (NL80211_CMD_FRAME) on wlan1((AP)) A1=ff:ff:ff:ff:ff:ff A2=a4:77:33:7b:21:e8
nl80211: MLME event frame - hexdump(len=106): 40 00 00 00 ff ff ff ff ff ff a4 77 33 7b 21 e8 ff ff ff ff ff ff a0 92 00 0c 4e 45 54 47 45 41 52 38 30 2d 35 47 01 08 02 04 0b 0c 12 16 18 24 2d 1a 62 00 03 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 08 e0 e1 09 00 32 04 30 48 60 6c 7f 08 00 00 00 00 00 00 00 40 bf 0c 30 70 c0 33 fc ff 24 01 fc ff 24 01
nl80211: Frame event
nl80211: RX frame sa=a4:77:33:7b:21:e8 freq=5240 ssi_signal=-57 fc=0x40 seq_ctrl=0x92a0 stype=4 (WLAN_FC_STYPE_PROBE_REQ) len=106
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: Troubleshooting mwl8k driver issue
@ 2017-05-06 7:21 Menion
0 siblings, 0 replies; 9+ messages in thread
From: Menion @ 2017-05-06 7:21 UTC (permalink / raw)
To: dgilman, buytenh; +Cc: linux-wireless
Hello Lennert and David
Sorry for jumping and recalling directly your conversation, but this
already contains a lot of relevant information.
I am an user of two Linksys EA4500 running mwl8k driver on Marvell
88W8366 v48 bot 2.4 and 5.0 Ghz radio.
I run LEDE 17.01.1
I have always hit the problem you were discussing, which is become now
so worse that the AP is almost unusable. The affected clients are two
android devices (6.1 and 7.0) and iPhone 7.
However together with the below disconnect issue, there is something
else that may be connected to this problem that happens 100% of the
time with all the devices you may try:
The 5Ghz radio cannot authenticate in EAP (PEAP+mschapv2) mode.
The 2.4Ghz radio of mwl8k and other atheros router I have works
perfectly, so the freeradius I use (tried both 2.2 and 3.0) is ok.
According to the logs, it seems that for some reason the radio cannoct
complete the certificates handshake:
Wed May 3 21:17:26 2017 : Debug: Going to the next request
Wed May 3 21:17:26 2017 : Debug: Waking up in 4.9 seconds.
Wed May 3 21:17:31 2017 : Info: Cleaning up request 34 ID 41 with timestamp +574
Wed May 3 21:17:31 2017 : Info: Cleaning up request 35 ID 42 with timestamp +574
Wed May 3 21:17:31 2017 : Info: Cleaning up request 36 ID 43 with timestamp +574
Wed May 3 21:17:31 2017 : Debug: WARNING:
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
Wed May 3 21:17:31 2017 : Debug: WARNING: !! EAP session for state
0xd1f19d03d34c849e did not finish!
Wed May 3 21:17:31 2017 : Debug: WARNING: !! Please read
http://wiki.freeradius.org/guide/Certificate_Compatibility
Wed May 3 21:17:31 2017 : Debug: WARNING:
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
Wed May 3 21:17:31 2017 : Info: Ready to process requests.
In WPA2-PSK mode the disconnection show exactly the same logs David
already provided.
It is like that the physical layer is not stable enough which cause
critical fault in EAP mode and the rekey issue in PSK mode, or
something like this.
Also, something happened during the transition between snapshot and
17.01 LEDE build, because with snapshot builds from November 2016 the
stability was much better, I got disconnection every 30min or even
more, now I cannot last more than 2/3 minutes.
I am here to provide logs, but if you still have some mwl8k device,
the EAP issue can probably be a good starting point for the
investigation.
Bye
> The only thing the log tells me is that this disconnect happens
> voluntarily, so I see nothing wrong from just those log messages.
> Can you run a sniffer to see what happens on the air when this
> disconnect occurs, or increase hostapd verbosity/debugging somehow?
I've given hostapd logging a shot. The first 3 logs attached
(hostapd_debug-hostap_debug3) are syslogs with logging all the way up.
The last one is hostapd being run with the -dd flag.
All three of the events have slightly different logs but they're all
related to that WPA rekeying event. This is a shot in the dark here,
but given that they look to be related to late or missing responses to
the rekeying maybe it's the wireless device being slow, or just slow
enough to not be able to keep up with the AP? I could build a hostapd
with the timeout increased but I don't know if that's a good idea or the
right approach here.
--
David Gilman :DG<
http://gilslotd.com
--6TrnltStXW4iwmi0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: attachment; filename=hostapd_debug
Mon Jun 27 02:14:05 2016 daemon.debug hostapd: wlan1: WPA rekeying GTK
Mon Jun 27 02:14:05 2016 daemon.debug hostapd: wlan1: STA (bad phone)
WPA: sending 1/2 msg of Group Key Handshake
Mon Jun 27 02:14:06 2016 daemon.debug hostapd: wlan1: STA (bad phone)
WPA: EAPOL-Key timeout
Mon Jun 27 02:14:06 2016 daemon.debug hostapd: wlan1: STA (bad phone)
WPA: sending 1/2 msg of Group Key Handshake
Mon Jun 27 02:14:07 2016 daemon.debug hostapd: wlan1: STA (bad phone)
WPA: EAPOL-Key timeout
Mon Jun 27 02:14:07 2016 daemon.debug hostapd: wlan1: STA (bad phone)
WPA: sending 1/2 msg of Group Key Handshake
Mon Jun 27 02:14:08 2016 daemon.debug hostapd: wlan1: STA (bad phone)
WPA: EAPOL-Key timeout
Mon Jun 27 02:14:08 2016 daemon.debug hostapd: wlan1: STA (bad phone)
WPA: sending 1/2 msg of Group Key Handshake
Mon Jun 27 02:14:09 2016 daemon.debug hostapd: wlan1: STA (bad phone)
WPA: EAPOL-Key timeout
Mon Jun 27 02:14:09 2016 daemon.debug hostapd: wlan1: STA (bad phone)
WPA: WPA_PTK: sm->Disconnect
Mon Jun 27 02:14:09 2016 daemon.debug hostapd: wlan1: STA (bad phone)
WPA: event 3 notification
Mon Jun 27 02:14:09 2016 daemon.debug hostapd: wlan1: STA (bad phone)
IEEE 802.1X: unauthorizing port
Mon Jun 27 02:14:11 2016 daemon.debug hostapd: wlan1: STA (bad phone)
MLME: MLME-DEAUTHENTICATE.indication((bad phone), 2)
Mon Jun 27 02:14:11 2016 daemon.debug hostapd: wlan1: STA (bad phone)
MLME: MLME-DELETEKEYS.request((bad phone))
Mon Jun 27 02:14:11 2016 kern.debug kernel: [ 1952.642536] ieee80211
phy1: Deleted BA stream index 0
Mon Jun 27 02:14:11 2016 kern.debug kernel: [ 1952.642565] ieee80211
phy1: Remove stream for (bad phone) 0
Mon Jun 27 02:14:14 2016 daemon.info hostapd: wlan1: STA (bad phone)
IEEE 802.11: deauthenticated due to local deauth request
Mon Jun 27 02:14:29 2016 daemon.debug hostapd: wlan1: STA (bad phone)
IEEE 802.11: authentication OK (open system)
Mon Jun 27 02:14:29 2016 daemon.debug hostapd: wlan1: STA (bad phone)
MLME: MLME-AUTHENTICATE.indication((bad phone), OPEN_SYSTEM)
Mon Jun 27 02:14:29 2016 daemon.debug hostapd: wlan1: STA (bad phone)
MLME: MLME-DELETEKEYS.request((bad phone))
Mon Jun 27 02:14:29 2016 daemon.info hostapd: wlan1: STA (bad phone)
IEEE 802.11: authenticated
Mon Jun 27 02:14:29 2016 daemon.debug hostapd: wlan1: STA (bad phone)
IEEE 802.11: association OK (aid 1)
Mon Jun 27 02:14:29 2016 daemon.info hostapd: wlan1: STA (bad phone)
IEEE 802.11: associated (aid 1)
Mon Jun 27 02:14:29 2016 daemon.debug hostapd: wlan1: STA (bad phone)
MLME: MLME-ASSOCIATE.indication((bad phone))
Mon Jun 27 02:14:29 2016 daemon.debug hostapd: wlan1: STA (bad phone)
MLME: MLME-DELETEKEYS.request((bad phone))
Mon Jun 27 02:14:29 2016 daemon.debug hostapd: wlan1: STA (bad phone)
IEEE 802.11: binding station to interface 'wlan1'
Mon Jun 27 02:14:29 2016 daemon.debug hostapd: wlan1: STA (bad phone)
WPA: event 1 notification
Mon Jun 27 02:14:29 2016 daemon.debug hostapd: wlan1: STA (bad phone)
WPA: start authentication
Mon Jun 27 02:14:29 2016 daemon.debug hostapd: wlan1: STA (bad phone)
IEEE 802.1X: unauthorizing port
Mon Jun 27 02:14:29 2016 daemon.debug hostapd: wlan1: STA (bad phone)
WPA: sending 1/4 msg of 4-Way Handshake
Mon Jun 27 02:14:29 2016 daemon.debug hostapd: wlan1: STA (bad phone)
WPA: received EAPOL-Key frame (2/4 Pairwise)
Mon Jun 27 02:14:29 2016 daemon.debug hostapd: wlan1: STA (bad phone)
WPA: sending 3/4 msg of 4-Way Handshake
Mon Jun 27 02:14:29 2016 daemon.debug hostapd: wlan1: STA (bad phone)
WPA: received EAPOL-Key frame (4/4 Pairwise)
Mon Jun 27 02:14:29 2016 daemon.debug hostapd: wlan1: STA (bad phone)
IEEE 802.1X: authorizing port
Mon Jun 27 02:14:29 2016 daemon.info hostapd: wlan1: STA (bad phone)
WPA: pairwise key handshake completed (RSN)
Mon Jun 27 02:14:30 2016 daemon.info dnsmasq-dhcp[2989]:
DHCPREQUEST(br-lan) 192.168.1.138 (bad phone)
Mon Jun 27 02:14:30 2016 daemon.info dnsmasq-dhcp[2989]:
DHCPACK(br-lan) 192.168.1.138 (bad phone) android-63ebbc936f7b53af
--6TrnltStXW4iwmi0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: attachment; filename=hostapd_debug2
Mon Jun 27 02:24:05 2016 daemon.debug hostapd: wlan1: WPA rekeying GTK
Mon Jun 27 02:24:05 2016 daemon.debug hostapd: wlan1: STA (bad phone)
WPA: sending 1/2 msg of Group Key Handshake
Mon Jun 27 02:24:06 2016 daemon.debug hostapd: wlan1: STA (bad phone)
WPA: EAPOL-Key timeout
Mon Jun 27 02:24:06 2016 daemon.debug hostapd: wlan1: STA (bad phone)
WPA: sending 1/2 msg of Group Key Handshake
Mon Jun 27 02:24:06 2016 daemon.debug hostapd: wlan1: STA (bad phone)
WPA: received EAPOL-Key frame (2/2 Group)
Mon Jun 27 02:24:06 2016 daemon.info hostapd: wlan1: STA (bad phone)
WPA: group key handshake completed (RSN)
Mon Jun 27 02:24:06 2016 daemon.debug hostapd: wlan1: STA (bad phone)
WPA: received EAPOL-Key 2/2 Group with unexpected replay counter
--6TrnltStXW4iwmi0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: attachment; filename=hostapd_debug3
Mon Jun 27 02:37:44 2016 kern.notice kernel: [ 3365.611014] ieee80211
phy1: tx rings drained
Mon Jun 27 02:37:44 2016 kern.debug kernel: [ 3365.615496] ieee80211
phy1: Deleted BA stream index 0
Mon Jun 27 02:37:44 2016 kern.debug kernel: [ 3365.615518] ieee80211
phy1: Remove stream for (bad phone) 0
Mon Jun 27 02:37:44 2016 kern.debug kernel: [ 3365.979922] ieee80211
phy1: Added a new stream for (bad phone) 0
Mon Jun 27 02:37:44 2016 kern.debug kernel: [ 3365.979965] ieee80211
phy1: Started stream for (bad phone) 0
Mon Jun 27 02:37:44 2016 kern.notice kernel: [ 3365.980066] ieee80211
phy1: tx rings drained
Mon Jun 27 02:37:44 2016 kern.err kernel: [ 3365.985827] ieee80211
phy1: Command BASTREAM error 0x1
Mon Jun 27 02:37:45 2016 kern.err kernel: [ 3366.992421] ieee80211
phy1: Command BASTREAM error 0x1
Mon Jun 27 02:37:46 2016 kern.err kernel: [ 3368.002391] ieee80211
phy1: Command BASTREAM error 0x1
Mon Jun 27 02:37:48 2016 kern.debug kernel: [ 3370.012306] ieee80211
phy1: Remove stream for (bad phone) 0
Mon Jun 27 02:37:53 2016 kern.debug kernel: [ 3374.452437] ieee80211
phy1: Added a new stream for (bad phone) 0
Mon Jun 27 02:37:53 2016 kern.debug kernel: [ 3374.452482] ieee80211
phy1: Started stream for (bad phone) 0
Mon Jun 27 02:37:53 2016 kern.notice kernel: [ 3374.452898] ieee80211
phy1: tx rings drained
Mon Jun 27 02:37:53 2016 kern.debug kernel: [ 3374.461251] ieee80211
phy1: Created a BA stream for (bad phone) : tid 0
--6TrnltStXW4iwmi0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: attachment; filename=hostapd_debug4
wlan1: WPA rekeying GTK
WPA: group state machine entering state SETKEYS (VLAN-ID 0)
GTK - hexdump(len=16): [REMOVED]
WPA: (good laptop) WPA_PTK_GROUP entering state REKEYNEGOTIATING
wlan1: STA (good laptop) WPA: sending 1/2 msg of Group Key Handshake
WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=0 pairwise=0
kde_len=24 keyidx=2 encr=1)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 03
Plaintext EAPOL-Key Key Data - hexdump(len=32): [REMOVED]
WPA: Use EAPOL-Key timeout of 500 ms (retry counter 1)
WPA: (bad phone) WPA_PTK_GROUP entering state REKEYNEGOTIATING
wlan1: STA (bad phone) WPA: sending 1/2 msg of Group Key Handshake
WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=0 pairwise=0
kde_len=24 keyidx=2 encr=1)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 03
Plaintext EAPOL-Key Key Data - hexdump(len=32): [REMOVED]
WPA: Use EAPOL-Key timeout of 500 ms (retry counter 1)
wpa_group_setkeys: GKeyDoneStations=2
wlan1: Event EAPOL_TX_STATUS (38) received
IEEE 802.1X: (good laptop) TX status - version=2 type=3 length=127 - ack=1
WPA: EAPOL-Key TX status for STA (good laptop) ack=1
wlan1: Event EAPOL_RX (24) received
IEEE 802.1X: 99 bytes from (good laptop)
IEEE 802.1X: version=1 type=3 length=95
WPA: Received EAPOL-Key from (good laptop) key_info=0x302 type=2
key_data_length=0
WPA: Received Key Nonce - hexdump(len=32): 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 03
wlan1: STA (good laptop) WPA: received EAPOL-Key frame (2/2 Group)
WPA: (good laptop) WPA_PTK_GROUP entering state REKEYESTABLISHED
wlan1: STA (good laptop) WPA: group key handshake completed (RSN)
WPA: (good laptop) WPA_PTK_GROUP entering state IDLE
wlan1: STA (bad phone) WPA: EAPOL-Key timeout
WPA: (bad phone) WPA_PTK_GROUP entering state REKEYNEGOTIATING
wlan1: STA (bad phone) WPA: sending 1/2 msg of Group Key Handshake
WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=0 pairwise=0
kde_len=24 keyidx=2 encr=1)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 04
Plaintext EAPOL-Key Key Data - hexdump(len=32): [REMOVED]
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 2)
wlan1: STA (bad phone) WPA: EAPOL-Key timeout
WPA: (bad phone) WPA_PTK_GROUP entering state REKEYNEGOTIATING
wlan1: STA (bad phone) WPA: sending 1/2 msg of Group Key Handshake
WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=0 pairwise=0
kde_len=24 keyidx=2 encr=1)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 05
Plaintext EAPOL-Key Key Data - hexdump(len=32): [REMOVED]
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 3)
wlan1: STA (bad phone) WPA: EAPOL-Key timeout
WPA: (bad phone) WPA_PTK_GROUP entering state REKEYNEGOTIATING
wlan1: STA (bad phone) WPA: sending 1/2 msg of Group Key Handshake
WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=0 pairwise=0
kde_len=24 keyidx=2 encr=1)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 06
Plaintext EAPOL-Key Key Data - hexdump(len=32): [REMOVED]
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 4)
wlan1: STA (bad phone) WPA: EAPOL-Key timeout
WPA: (bad phone) WPA_PTK_GROUP entering state REKEYNEGOTIATING
WPA: (bad phone) WPA_PTK_GROUP entering state KEYERROR
WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0)
wpa_driver_nl80211_set_key: ifindex=17 (wlan1) alg=3 addr=0x88628
key_idx=2 set_tx=1 seq_len=0 key_len=16
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
broadcast key
wlan1: STA (bad phone) WPA: WPA_PTK: sm->Disconnect
WPA: (bad phone) WPA_PTK entering state DISCONNECT
wpa_sta_disconnect STA (bad phone)
hostapd_wpa_auth_disconnect: WPA authenticator requests disconnect:
STA (bad phone) reason 2
wlan1: ap_sta_disconnect addr (bad phone) reason=2
nl80211: send_mlme - da= (bad phone) noack=0 freq=0 no_cck=0
offchanok=0 wait_time=0 fc=0xc0 (WLAN_FC_STYPE_DEAUTH) nlmode=3
nl80211: send_mlme -> send_frame
nl80211: send_frame - Use bss->freq=5240
nl80211: send_frame -> send_frame_cmd
nl80211: CMD_FRAME freq=5240 wait=0 no_cck=0 no_ack=0 offchanok=0
CMD_FRAME - hexdump(len=26): c0 00 00 00 fc c2 de ac b1 72 94 10 3e 8f
d2 db 94 10 3e 8f d2 db 00 00 02 00
nl80211: Frame TX command accepted; cookie 0x129c
nl80211: Drop oldest pending send action cookie 0x0
wlan1: AP-STA-DISCONNECTED (bad phone)
wlan1: STA (bad phone) WPA: event 3 notification
wpa_driver_nl80211_set_key: ifindex=17 (wlan1) alg=0 addr=0xb6e853d8
key_idx=0 set_tx=1 seq_len=0 key_len=0
addr=(bad phone)
wlan1: ap_sta_disconnect: reschedule ap_handle_timer timeout for (bad
phone) (5 seconds - AP_MAX_INACTIVITY_AFTER_DEAUTH)
WPA: (bad phone) WPA_PTK_GROUP entering state IDLE
WPA: (bad phone) WPA_PTK entering state DISCONNECTED
WPA: (bad phone) WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=17 (wlan1) alg=0 addr=0xb6e853d8
key_idx=0 set_tx=1 seq_len=0 key_len=0
addr=(bad phone)
nl80211: Set STA flags - ifname=wlan1 addr=(bad phone) total_flags=0x2
flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan1: STA (bad phone) IEEE 802.1X: unauthorizing port
wlan1: Deauthentication callback for STA (bad phone)
wlan1: Removing STA (bad phone) from kernel driver
nl80211: sta_remove -> DEL_STATION wlan1 (bad phone) --> 0 (No error
information)
wlan1: STA (bad phone) MLME: MLME-DEAUTHENTICATE.indication((bad phone), 2)
wlan1: STA (bad phone) MLME: MLME-DELETEKEYS.request((bad phone))
wpa_driver_nl80211_set_key: ifindex=17 (wlan1) alg=0 addr=0xb6e853d8
key_idx=0 set_tx=1 seq_len=0 key_len=0
addr=(bad phone)
nl80211: Event message available
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan1
nl80211: Delete station (bad phone)
nl80211: Event message available
nl80211: BSS Event 83 (NL80211_CMD_UNEXPECTED_FRAME) received for wlan1
wlan1: Event RX_FROM_UNKNOWN (18) received
Data/PS-poll frame from not associated STA (bad phone)
Association Response to the STA has already been sent, but no TX
status yet known - ignore Class 3 frame issue with (bad phone)
wlan1: ap_handle_timer: (bad phone) flags=0x40008a00 timeout_next=3
wlan1: STA (bad phone) IEEE 802.11: deauthenticated due to local deauth request
nl80211: sta_remove -> DEL_STATION wlan1 (bad phone) --> -2 (No such
file or directory)
hostapd_ht_operation_update current operation mode=0x4
hostapd_ht_operation_update new operation mode=0x4 changes=0
ap_free_sta: cancel ap_handle_timer for (bad phone)
nl80211: Event message available
nl80211: BSS Event 83 (NL80211_CMD_UNEXPECTED_FRAME) received for wlan1
wlan1: Event RX_FROM_UNKNOWN (18) received
Data/PS-poll frame from not associated STA (bad phone)
nl80211: send_mlme - da= (bad phone) noack=0 freq=0 no_cck=0
offchanok=0 wait_time=0 fc=0xc0 (WLAN_FC_STYPE_DEAUTH) nlmode=3
nl80211: send_mlme -> send_frame
nl80211: send_frame - Use bss->freq=5240
nl80211: send_frame -> send_frame_cmd
nl80211: CMD_FRAME freq=5240 wait=0 no_cck=0 no_ack=0 offchanok=0
CMD_FRAME - hexdump(len=26): c0 00 00 00 fc c2 de ac b1 72 94 10 3e 8f
d2 db 94 10 3e 8f d2 db 00 00 07 00
nl80211: Frame TX command accepted; cookie 0x129d
nl80211: Drop oldest pending send action cookie 0x0
nl80211: Event message available
nl80211: Drv Event 60 (NL80211_CMD_FRAME_TX_STATUS) received for wlan1
nl80211: MLME event 60 (NL80211_CMD_FRAME_TX_STATUS) on wlan1((AP))
A1=(bad phone) A2=(AP)
nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 fc c2 de ac
b1 72 94 10 3e 8f d2 db 94 10 3e 8f d2 db 00 00 07 00
nl80211: Frame TX status event
wlan1: Event TX_STATUS (17) received
mgmt::deauth cb
handle_deauth_cb: STA (bad phone) not found
nl80211: Event message available
nl80211: BSS Event 83 (NL80211_CMD_UNEXPECTED_FRAME) received for wlan1
wlan1: Event RX_FROM_UNKNOWN (18) received
Data/PS-poll frame from not associated STA (bad phone)
nl80211: send_mlme - da= (bad phone) noack=0 freq=0 no_cck=0
offchanok=0 wait_time=0 fc=0xc0 (WLAN_FC_STYPE_DEAUTH) nlmode=3
nl80211: send_mlme -> send_frame
nl80211: send_frame - Use bss->freq=5240
nl80211: send_frame -> send_frame_cmd
nl80211: CMD_FRAME freq=5240 wait=0 no_cck=0 no_ack=0 offchanok=0
CMD_FRAME - hexdump(len=26): c0 00 00 00 fc c2 de ac b1 72 94 10 3e 8f
d2 db 94 10 3e 8f d2 db 00 00 07 00
nl80211: Frame TX command accepted; cookie 0x129e
nl80211: Drop oldest pending send action cookie 0x0
nl80211: Event message available
nl80211: Drv Event 60 (NL80211_CMD_FRAME_TX_STATUS) received for wlan1
nl80211: MLME event 60 (NL80211_CMD_FRAME_TX_STATUS) on wlan1((AP))
A1=(bad phone) A2=(AP)
nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 fc c2 de ac
b1 72 94 10 3e 8f d2 db 94 10 3e 8f d2 db 00 00 07 00
nl80211: Frame TX status event
wlan1: Event TX_STATUS (17) received
mgmt::deauth cb
handle_deauth_cb: STA (bad phone) not found
nl80211: Event message available
nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wlan1
nl80211: MLME event 59 (NL80211_CMD_FRAME) on wlan1((AP))
A1=ff:ff:ff:ff:ff:ff A2=(bad phone)
nl80211: MLME event frame - hexdump(len=128): 40 00 00 00 ff ff ff ff
ff ff fc c2 de ac b1 72 ff ff ff ff ff ff 40 d7 00 0e 67 69 6c 6d 61
6e 20 6f 70 65 6e 77 72 74 01 08 0c 12 18 24 30 48 60 6c 2d 1a 6f 00
17 ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 7f 06 00 00 08 80 01 40 bf 0c 32 58 81 0f fa ff 00 00 fa ff 00 00
dd 05 00 90 4c 04 07 dd 08 00 50 f2 08 00 11 00 00 dd 09 00 10 18 02
00 00 10 00 00
nl80211: Frame event
nl80211: RX frame sa=(bad phone) freq=5240 ssi_signal=-61 fc=0x40
seq_ctrl=0xd740 stype=4 (WLAN_FC_STYPE_PROBE_REQ) len=128
nl80211: send_mlme - da= (bad phone) noack=0 freq=0 no_cck=0
offchanok=0 wait_time=0 fc=0x50 (WLAN_FC_STYPE_PROBE_RESP) nlmode=3
nl80211: send_mlme -> send_frame
nl80211: send_frame - Use bss->freq=5240
nl80211: send_frame -> send_frame_cmd
nl80211: CMD_FRAME freq=5240 wait=0 no_cck=0 no_ack=0 offchanok=0
CMD_FRAME - hexdump(len=183): 50 00 00 00 fc c2 de ac b1 72 94 10 3e
8f d2 db 94 10 3e 8f d2 db 00 00 00 00 00 00 00 00 00 00 64 00 11 00
00 0e 67 69 6c 6d 61 6e 20 6f 70 65 6e 77 72 74 01 08 8c 12 98 24 b0
48 60 6c 03 01 30 07 06 30 30 20 24 04 14 30 14 01 00 00 0f ac 04 01
00 00 0f ac 04 01 00 00 0f ac 02 0c 00 2d 1a ec 0b 03 ff ff ff 00 01
00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 30 00 04
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 00 00
00 00 00 00 00 40 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00
00 42 43 5e 00 62 32 2f 00
nl80211: Frame TX command accepted; cookie 0x129f
nl80211: Drop oldest pending send action cookie 0x0
nl80211: Event message available
nl80211: Drv Event 60 (NL80211_CMD_FRAME_TX_STATUS) received for wlan1
nl80211: MLME event 60 (NL80211_CMD_FRAME_TX_STATUS) on wlan1((AP))
A1=(bad phone) A2=(AP)
nl80211: MLME event frame - hexdump(len=183): 50 00 00 00 fc c2 de ac
b1 72 94 10 3e 8f d2 db 94 10 3e 8f d2 db 00 00 00 00 00 00 00 00 00
00 64 00 11 00 00 0e 67 69 6c 6d 61 6e 20 6f 70 65 6e 77 72 74 01 08
8c 12 98 24 b0 48 60 6c 03 01 30 07 06 30 30 20 24 04 14 30 14 01 00
00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 2d 1a ec 0b 03
ff ff ff 00 01 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00
3d 16 30 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 7f 08 00 00 00 00 00 00 00 40 dd 18 00 50 f2 02 01 01 00 00 03 a4
00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
nl80211: Frame TX status event
wlan1: Event TX_STATUS (17) received
nl80211: Event message available
nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wlan1
nl80211: MLME event 59 (NL80211_CMD_FRAME) on wlan1((AP)) A1=(AP) A2=(bad phone)
nl80211: MLME event frame - hexdump(len=26): c0 00 3c 00 94 10 3e 8f
d2 db fc c2 de ac b1 72 94 10 3e 8f d2 db 50 d7 06 00
nl80211: Frame event
nl80211: RX frame sa=(bad phone) freq=5240 ssi_signal=-62 fc=0xc0
seq_ctrl=0xd750 stype=12 (WLAN_FC_STYPE_DEAUTH) len=26
wlan1: Event RX_MGMT (19) received
wlan1: mgmt::deauth
wlan1: deauthentication: STA=(bad phone) reason_code=6
wlan1: Station (bad phone) trying to deauthenticate, but it is not authenticated
nl80211: Event message available
nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wlan1
nl80211: MLME event 59 (NL80211_CMD_FRAME) on wlan1((AP))
A1=ff:ff:ff:ff:ff:ff A2=(bad phone)
nl80211: MLME event frame - hexdump(len=128): 40 00 00 00 ff ff ff ff
ff ff fc c2 de ac b1 72 ff ff ff ff ff ff 60 d7 00 0e 67 69 6c 6d 61
6e 20 6f 70 65 6e 77 72 74 01 08 0c 12 18 24 30 48 60 6c 2d 1a 6f 00
17 ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 7f 06 00 00 08 80 01 40 bf 0c 32 58 81 0f fa ff 00 00 fa ff 00 00
dd 05 00 90 4c 04 07 dd 08 00 50 f2 08 00 11 00 00 dd 09 00 10 18 02
00 00 10 00 00
nl80211: Frame event
nl80211: RX frame sa=(bad phone) freq=5240 ssi_signal=-61 fc=0x40
seq_ctrl=0xd760 stype=4 (WLAN_FC_STYPE_PROBE_REQ) len=128
nl80211: send_mlme - da= (bad phone) noack=0 freq=0 no_cck=0
offchanok=0 wait_time=0 fc=0x50 (WLAN_FC_STYPE_PROBE_RESP) nlmode=3
nl80211: send_mlme -> send_frame
nl80211: send_frame - Use bss->freq=5240
nl80211: send_frame -> send_frame_cmd
nl80211: CMD_FRAME freq=5240 wait=0 no_cck=0 no_ack=0 offchanok=0
CMD_FRAME - hexdump(len=183): 50 00 00 00 fc c2 de ac b1 72 94 10 3e
8f d2 db 94 10 3e 8f d2 db 00 00 00 00 00 00 00 00 00 00 64 00 11 00
00 0e 67 69 6c 6d 61 6e 20 6f 70 65 6e 77 72 74 01 08 8c 12 98 24 b0
48 60 6c 03 01 30 07 06 30 30 20 24 04 14 30 14 01 00 00 0f ac 04 01
00 00 0f ac 04 01 00 00 0f ac 02 0c 00 2d 1a ec 0b 03 ff ff ff 00 01
00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 30 00 04
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 00 00
00 00 00 00 00 40 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00
00 42 43 5e 00 62 32 2f 00
nl80211: Frame TX command accepted; cookie 0x12a0
nl80211: Drop oldest pending send action cookie 0x0
nl80211: Event message available
nl80211: Drv Event 60 (NL80211_CMD_FRAME_TX_STATUS) received for wlan1
nl80211: MLME event 60 (NL80211_CMD_FRAME_TX_STATUS) on wlan1((AP))
A1=(bad phone) A2=(AP)
nl80211: MLME event frame - hexdump(len=183): 50 00 00 00 fc c2 de ac
b1 72 94 10 3e 8f d2 db 94 10 3e 8f d2 db 00 00 00 00 00 00 00 00 00
00 64 00 11 00 00 0e 67 69 6c 6d 61 6e 20 6f 70 65 6e 77 72 74 01 08
8c 12 98 24 b0 48 60 6c 03 01 30 07 06 30 30 20 24 04 14 30 14 01 00
00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 2d 1a ec 0b 03
ff ff ff 00 01 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00
3d 16 30 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 7f 08 00 00 00 00 00 00 00 40 dd 18 00 50 f2 02 01 01 00 00 03 a4
00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
nl80211: Frame TX status event
wlan1: Event TX_STATUS (17) received
nl80211: Event message available
nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wlan1
nl80211: MLME event 59 (NL80211_CMD_FRAME) on wlan1((AP)) A1=(AP) A2=(bad phone)
nl80211: MLME event frame - hexdump(len=41): b0 00 3c 00 94 10 3e 8f
d2 db fc c2 de ac b1 72 94 10 3e 8f d2 db 70 d7 00 00 01 00 00 00 dd
09 00 10 18 02 00 00 10 00 00
nl80211: Frame event
nl80211: RX frame sa=(bad phone) freq=5240 ssi_signal=-61 fc=0xb0
seq_ctrl=0xd770 stype=11 (WLAN_FC_STYPE_AUTH) len=41
wlan1: Event RX_MGMT (19) received
mgmt::auth
authentication: STA=(bad phone) auth_alg=0 auth_transaction=1
status_code=0 wep=0 seq_ctrl=0xd770
New STA
ap_sta_add: register ap_handle_timer timeout for (bad phone) (300
seconds - ap_max_inactivity)
wlan1: STA (bad phone) IEEE 802.11: authentication OK (open system)
wlan1: STA (bad phone) MLME: MLME-AUTHENTICATE.indication((bad phone),
OPEN_SYSTEM)
wlan1: STA (bad phone) MLME: MLME-DELETEKEYS.request((bad phone))
authentication reply: STA=(bad phone) auth_alg=0 auth_transaction=2
resp=0 (IE len=0)
nl80211: send_mlme - da= (bad phone) noack=0 freq=0 no_cck=0
offchanok=0 wait_time=0 fc=0xb0 (WLAN_FC_STYPE_AUTH) nlmode=3
nl80211: send_mlme -> send_frame
nl80211: send_frame - Use bss->freq=5240
nl80211: send_frame -> send_frame_cmd
nl80211: CMD_FRAME freq=5240 wait=0 no_cck=0 no_ack=0 offchanok=0
CMD_FRAME - hexdump(len=30): b0 00 00 00 fc c2 de ac b1 72 94 10 3e 8f
d2 db 94 10 3e 8f d2 db 00 00 00 00 02 00 00 00
nl80211: Frame TX command accepted; cookie 0x12a1
nl80211: Drop oldest pending send action cookie 0x0
nl80211: Event message available
nl80211: Drv Event 60 (NL80211_CMD_FRAME_TX_STATUS) received for wlan1
nl80211: MLME event 60 (NL80211_CMD_FRAME_TX_STATUS) on wlan1((AP))
A1=(bad phone) A2=(AP)
nl80211: MLME event frame - hexdump(len=30): b0 00 00 00 fc c2 de ac
b1 72 94 10 3e 8f d2 db 94 10 3e 8f d2 db 00 00 00 00 02 00 00 00
nl80211: Frame TX status event
wlan1: Event TX_STATUS (17) received
mgmt::auth cb
wlan1: STA (bad phone) IEEE 802.11: authenticated
nl80211: Event message available
nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wlan1
nl80211: MLME event 59 (NL80211_CMD_FRAME) on wlan1((AP)) A1=(AP) A2=(bad phone)
nl80211: MLME event frame - hexdump(len=148): 00 00 3c 00 94 10 3e 8f
d2 db fc c2 de ac b1 72 94 10 3e 8f d2 db 80 d7 11 00 0a 00 00 0e 67
69 6c 6d 61 6e 20 6f 70 65 6e 77 72 74 01 08 8c 12 98 24 b0 48 60 6c
21 02 09 12 24 0a 24 04 34 04 64 0c 95 04 a5 01 30 14 01 00 00 0f ac
04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 2d 1a 6f 00 17 ff ff 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 06 00
00 08 80 01 40 dd 09 00 10 18 02 00 00 10 00 00 dd 07 00 50 f2 02 00
01 00
nl80211: Frame event
nl80211: RX frame sa=(bad phone) freq=5240 ssi_signal=-62 fc=0x0
seq_ctrl=0xd780 stype=0 (WLAN_FC_STYPE_ASSOC_REQ) len=148
wlan1: Event RX_MGMT (19) received
mgmt::assoc_req
association request: STA=(bad phone) capab_info=0x11
listen_interval=10 seq_ctrl=0xd780
WMM IE - hexdump(len=7): 00 50 f2 02 00 01 00
Validating WMM IE: OUI 00:50:f2 OUI type 2 OUI sub-type 0 version 1
QoS info 0x0
new AID 1
HT: STA (bad phone) HT Capabilities Info: 0x006f
update_sta_ht STA (bad phone) - no greenfield, num of non-gf stations 2
hostapd_ht_operation_update current operation mode=0x4
hostapd_ht_operation_update new operation mode=0x4 changes=0
wlan1: STA (bad phone) IEEE 802.11: association OK (aid 1)
nl80211: send_mlme - da= (bad phone) noack=0 freq=0 no_cck=0
offchanok=0 wait_time=0 fc=0x10 (WLAN_FC_STYPE_ASSOC_RESP) nlmode=3
nl80211: send_mlme -> send_frame
nl80211: send_frame - Use bss->freq=5240
nl80211: send_frame -> send_frame_cmd
nl80211: CMD_FRAME freq=5240 wait=0 no_cck=0 no_ack=0 offchanok=0
CMD_FRAME - hexdump(len=128): 10 00 00 00 fc c2 de ac b1 72 94 10 3e
8f d2 db 94 10 3e 8f d2 db 00 00 11 00 00 00 01 c0 01 08 8c 12 98 24
b0 48 60 6c 2d 1a ec 0b 03 ff ff ff 00 01 00 00 00 00 00 00 00 01 00
00 00 00 00 00 00 00 00 00 3d 16 30 00 04 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 7f 08 00 00 00 00 00 00 00 40 dd 18 00
50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
nl80211: Frame TX command accepted; cookie 0x12a2
nl80211: Drop oldest pending send action cookie 0x0
nl80211: Event message available
nl80211: Drv Event 60 (NL80211_CMD_FRAME_TX_STATUS) received for wlan1
nl80211: MLME event 60 (NL80211_CMD_FRAME_TX_STATUS) on wlan1((AP))
A1=(bad phone) A2=(AP)
nl80211: MLME event frame - hexdump(len=128): 10 00 00 00 fc c2 de ac
b1 72 94 10 3e 8f d2 db 94 10 3e 8f d2 db 00 00 11 00 00 00 01 c0 01
08 8c 12 98 24 b0 48 60 6c 2d 1a ec 0b 03 ff ff ff 00 01 00 00 00 00
00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 30 00 04 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 00 00 00 00 00 00
00 40 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e
00 62 32 2f 00
nl80211: Frame TX status event
wlan1: Event TX_STATUS (17) received
mgmt::assoc_resp cb
wlan1: STA (bad phone) IEEE 802.11: associated (aid 1)
wlan1: STA (bad phone) MLME: MLME-ASSOCIATE.indication((bad phone))
wlan1: STA (bad phone) MLME: MLME-DELETEKEYS.request((bad phone))
wpa_driver_nl80211_set_key: ifindex=17 (wlan1) alg=0 addr=0xb6eb4578
key_idx=0 set_tx=1 seq_len=0 key_len=0
addr=(bad phone)
nl80211: sta_remove -> DEL_STATION wlan1 (bad phone) --> -2 (No such
file or directory)
nl80211: Add STA (bad phone)
* supported rates - hexdump(len=8): 8c 12 98 24 b0 48 60 6c
* capability=0x11
* ht_capabilities - hexdump(len=26): 6c 00 17 ff ff 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
* aid=1
* listen_interval=10
* flags set=0x8 mask=0x8
* qosinfo=0x0
wlan1: STA (bad phone) IEEE 802.11: binding station to interface 'wlan1'
nl80211: wlan1[17]: set_sta_vlan((bad phone), ifname=wlan1[17], vlan_id=0)
nl80211: Set STA flags - ifname=wlan1 addr=(bad phone) total_flags=0x2
flags_or=0x2 flags_and=0xfffffff3 authorized=0
wlan1: STA (bad phone) WPA: event 1 notification
wpa_driver_nl80211_set_key: ifindex=17 (wlan1) alg=0 addr=0xb6eb4578
key_idx=0 set_tx=1 seq_len=0 key_len=0
addr=(bad phone)
IEEE 802.1X: Ignore STA - 802.1X not enabled or forced for WPS
wlan1: STA (bad phone) WPA: start authentication
WPA: (bad phone) WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=17 (wlan1) alg=0 addr=0xb6eb4578
key_idx=0 set_tx=1 seq_len=0 key_len=0
addr=(bad phone)
nl80211: Set STA flags - ifname=wlan1 addr=(bad phone) total_flags=0x2
flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan1: STA (bad phone) IEEE 802.1X: unauthorizing port
WPA: (bad phone) WPA_PTK_GROUP entering state IDLE
WPA: (bad phone) WPA_PTK entering state AUTHENTICATION
WPA: (bad phone) WPA_PTK entering state AUTHENTICATION2
WPA: Assign ANonce - hexdump(len=32): 53 5b 47 31 3f 5c 8d 8b 0a 50 96
ea f7 6f 5b 5a f7 14 c9 b9 1b fb 43 33 e2 e8 45 8f ba c1 12 62
WPA: (bad phone) WPA_PTK entering state INITPSK
Searching a PSK for (bad phone) prev_psk=0
Searching a PSK for (bad phone) prev_psk=0
WPA: (bad phone) WPA_PTK entering state PTKSTART
wlan1: STA (bad phone) WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=1
kde_len=0 keyidx=0 encr=0)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
WPA: Use EAPOL-Key timeout of 100 ms (retry counter 1)
wlan1: hostapd_new_assoc_sta: reschedule ap_handle_timer timeout for
(bad phone) (300 seconds - ap_max_inactivity)
nl80211: Event message available
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlan1
nl80211: New station (bad phone)
wlan1: Event EAPOL_TX_STATUS (38) received
IEEE 802.1X: (bad phone) TX status - version=2 type=3 length=95 - ack=1
WPA: EAPOL-Key TX status for STA (bad phone) ack=1
WPA: Increase initial EAPOL-Key 1/4 timeout by 1000 ms because of
acknowledged frame
wlan1: Event EAPOL_RX (24) received
IEEE 802.1X: 121 bytes from (bad phone)
IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from (bad phone) key_info=0x10a type=2
key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): 6f 41 14 04 3c 80 eb 35 ae
b7 69 e7 80 7d ed b8 4e 83 e3 7e 7c 8e e7 84 1d 45 10 84 fc 48 b8 7b
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
wlan1: STA (bad phone) WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: (bad phone) WPA_PTK entering state PTKCALCNEGOTIATING
Searching a PSK for (bad phone) prev_psk=0
WPA: PTK derivation - A1=(AP) A2=(bad phone)
WPA: Nonce1 - hexdump(len=32): 53 5b 47 31 3f 5c 8d 8b 0a 50 96 ea f7
6f 5b 5a f7 14 c9 b9 1b fb 43 33 e2 e8 45 8f ba c1 12 62
WPA: Nonce2 - hexdump(len=32): 6f 41 14 04 3c 80 eb 35 ae b7 69 e7 80
7d ed b8 4e 83 e3 7e 7c 8e e7 84 1d 45 10 84 fc 48 b8 7b
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: KEK - hexdump(len=16): [REMOVED]
WPA: TK - hexdump(len=16): [REMOVED]
WPA: (bad phone) WPA_PTK entering state PTKCALCNEGOTIATING2
WPA: (bad phone) WPA_PTK entering state PTKINITNEGOTIATING
wlan1: STA (bad phone) WPA: sending 3/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=1
kde_len=46 keyidx=2 encr=1)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
Plaintext EAPOL-Key Key Data - hexdump(len=56): [REMOVED]
WPA: Use EAPOL-Key timeout of 100 ms (retry counter 1)
wlan1: Event EAPOL_TX_STATUS (38) received
IEEE 802.1X: (bad phone) TX status - version=2 type=3 length=151 - ack=1
WPA: EAPOL-Key TX status for STA (bad phone) ack=1
wlan1: Event EAPOL_RX (24) received
IEEE 802.1X: 99 bytes from (bad phone)
IEEE 802.1X: version=1 type=3 length=95
WPA: Received EAPOL-Key from (bad phone) key_info=0x30a type=2 key_data_length=0
WPA: Received Key Nonce - hexdump(len=32): 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
wlan1: STA (bad phone) WPA: received EAPOL-Key frame (4/4 Pairwise)
WPA: (bad phone) WPA_PTK entering state PTKINITDONE
wpa_driver_nl80211_set_key: ifindex=17 (wlan1) alg=3 addr=0xb6eb4578
key_idx=0 set_tx=1 seq_len=0 key_len=16
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
addr=(bad phone)
wlan1: AP-STA-CONNECTED (bad phone)
nl80211: Set STA flags - ifname=wlan1 addr=(bad phone) total_flags=0x3
flags_or=0x1 flags_and=0xffffffff authorized=1
wlan1: STA (bad phone) IEEE 802.1X: authorizing port
wlan1: STA (bad phone) WPA: pairwise key handshake completed (RSN)
nl80211: Event message available
nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wlan1
nl80211: MLME event 59 (NL80211_CMD_FRAME) on wlan1((AP))
A1=ff:ff:ff:ff:ff:ff A2=(bad phone)
nl80211: MLME event frame - hexdump(len=114): 40 00 00 00 ff ff ff ff
ff ff fc c2 de ac b1 72 ff ff ff ff ff ff 60 da 00 00 01 08 0c 12 18
24 30 48 60 6c 2d 1a 6f 00 17 ff ff 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 7f 06 00 00 08 80 01 40 bf 0c 32 58 81
0f fa ff 00 00 fa ff 00 00 dd 05 00 90 4c 04 07 dd 08 00 50 f2 08 00
11 00 fc dd 09 00 10 18 02 00 00 10 00 00
nl80211: Frame event
nl80211: RX frame sa=(bad phone) freq=5240 ssi_signal=-59 fc=0x40
seq_ctrl=0xda60 stype=4 (WLAN_FC_STYPE_PROBE_REQ) len=114
nl80211: send_mlme - da= (bad phone) noack=1 freq=0 no_cck=0
offchanok=0 wait_time=0 fc=0x50 (WLAN_FC_STYPE_PROBE_RESP) nlmode=3
nl80211: send_mlme -> send_frame
nl80211: send_frame - Use bss->freq=5240
nl80211: send_frame -> send_frame_cmd
nl80211: CMD_FRAME freq=5240 wait=0 no_cck=0 no_ack=1 offchanok=0
CMD_FRAME - hexdump(len=183): 50 00 00 00 fc c2 de ac b1 72 94 10 3e
8f d2 db 94 10 3e 8f d2 db 00 00 00 00 00 00 00 00 00 00 64 00 11 00
00 0e 67 69 6c 6d 61 6e 20 6f 70 65 6e 77 72 74 01 08 8c 12 98 24 b0
48 60 6c 03 01 30 07 06 30 30 20 24 04 14 30 14 01 00 00 0f ac 04 01
00 00 0f ac 04 01 00 00 0f ac 02 0c 00 2d 1a ec 0b 03 ff ff ff 00 01
00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 30 00 04
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 00 00
00 00 00 00 00 40 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00
00 42 43 5e 00 62 32 2f 00
nl80211: Frame TX command accepted (no ACK); cookie 0x0
nl80211: Drop oldest pending send action cookie 0x0
nl80211: Event message available
nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wlan1
nl80211: MLME event 59 (NL80211_CMD_FRAME) on wlan1((AP))
A1=ff:ff:ff:ff:ff:ff A2=(bad phone)
nl80211: MLME event frame - hexdump(len=114): 40 00 00 00 ff ff ff ff
ff ff fc c2 de ac b1 72 ff ff ff ff ff ff 70 da 00 00 01 08 0c 12 18
24 30 48 60 6c 2d 1a 6f 00 17 ff ff 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 7f 06 00 00 08 80 01 40 bf 0c 32 58 81
0f fa ff 00 00 fa ff 00 00 dd 05 00 90 4c 04 07 dd 08 00 50 f2 08 00
11 00 fc dd 09 00 10 18 02 00 00 10 00 00
nl80211: Frame event
nl80211: RX frame sa=(bad phone) freq=5240 ssi_signal=-60 fc=0x40
seq_ctrl=0xda70 stype=4 (WLAN_FC_STYPE_PROBE_REQ) len=114
nl80211: send_mlme - da= (bad phone) noack=1 freq=0 no_cck=0
offchanok=0 wait_time=0 fc=0x50 (WLAN_FC_STYPE_PROBE_RESP) nlmode=3
nl80211: send_mlme -> send_frame
nl80211: send_frame - Use bss->freq=5240
nl80211: send_frame -> send_frame_cmd
nl80211: CMD_FRAME freq=5240 wait=0 no_cck=0 no_ack=1 offchanok=0
CMD_FRAME - hexdump(len=183): 50 00 00 00 fc c2 de ac b1 72 94 10 3e
8f d2 db 94 10 3e 8f d2 db 00 00 00 00 00 00 00 00 00 00 64 00 11 00
00 0e 67 69 6c 6d 61 6e 20 6f 70 65 6e 77 72 74 01 08 8c 12 98 24 b0
48 60 6c 03 01 30 07 06 30 30 20 24 04 14 30 14 01 00 00 0f ac 04 01
00 00 0f ac 04 01 00 00 0f ac 02 0c 00 2d 1a ec 0b 03 ff ff ff 00 01
00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 30 00 04
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 00 00
00 00 00 00 00 40 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00
00 42 43 5e 00 62 32 2f 00
nl80211: Frame TX command accepted (no ACK); cookie 0x0
nl80211: Drop oldest pending send action cookie 0x0
nl80211: Event message available
nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wlan1
nl80211: MLME event 59 (NL80211_CMD_FRAME) on wlan1((AP))
A1=ff:ff:ff:ff:ff:ff A2=34:23:ba:7b:aa:15
nl80211: MLME event frame - hexdump(len=110): 40 00 00 00 ff ff ff ff
ff ff 34 23 ba 7b aa 15 ff ff ff ff ff ff c0 01 00 00 01 08 0c 12 18
24 30 48 60 6c 2d 1a 62 00 1a ff 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 03 01 30 dd 09 00 10 18 02 00 00 00 00
00 dd 1e 00 90 4c 33 62 00 1a ff 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00
nl80211: Frame event
nl80211: RX frame sa=34:23:ba:7b:aa:15 freq=5240 ssi_signal=-73
fc=0x40 seq_ctrl=0x1c0 stype=4 (WLAN_FC_STYPE_PROBE_REQ) len=110
nl80211: send_mlme - da= 34:23:ba:7b:aa:15 noack=1 freq=0 no_cck=0
offchanok=0 wait_time=0 fc=0x50 (WLAN_FC_STYPE_PROBE_RESP) nlmode=3
nl80211: send_mlme -> send_frame
nl80211: send_frame - Use bss->freq=5240
nl80211: send_frame -> send_frame_cmd
nl80211: CMD_FRAME freq=5240 wait=0 no_cck=0 no_ack=1 offchanok=0
CMD_FRAME - hexdump(len=183): 50 00 00 00 34 23 ba 7b aa 15 94 10 3e
8f d2 db 94 10 3e 8f d2 db 00 00 00 00 00 00 00 00 00 00 64 00 11 00
00 0e 67 69 6c 6d 61 6e 20 6f 70 65 6e 77 72 74 01 08 8c 12 98 24 b0
48 60 6c 03 01 30 07 06 30 30 20 24 04 14 30 14 01 00 00 0f ac 04 01
00 00 0f ac 04 01 00 00 0f ac 02 0c 00 2d 1a ec 0b 03 ff ff ff 00 01
00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 30 00 04
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 00 00
00 00 00 00 00 40 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00
00 42 43 5e 00 62 32 2f 00
nl80211: Frame TX command accepted (no ACK); cookie 0x0
nl80211: Drop oldest pending send action cookie 0x0
nl80211: Event message available
nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wlan1
nl80211: MLME event 59 (NL80211_CMD_FRAME) on wlan1((AP))
A1=ff:ff:ff:ff:ff:ff A2=34:23:ba:7b:aa:15
nl80211: MLME event frame - hexdump(len=110): 40 00 00 00 ff ff ff ff
ff ff 34 23 ba 7b aa 15 ff ff ff ff ff ff d0 01 00 00 01 08 0c 12 18
24 30 48 60 6c 2d 1a 62 00 1a ff 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 03 01 30 dd 09 00 10 18 02 00 00 00 00
00 dd 1e 00 90 4c 33 62 00 1a ff 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00
nl80211: Frame event
nl80211: RX frame sa=34:23:ba:7b:aa:15 freq=5240 ssi_signal=-67
fc=0x40 seq_ctrl=0x1d0 stype=4 (WLAN_FC_STYPE_PROBE_REQ) len=110
nl80211: send_mlme - da= 34:23:ba:7b:aa:15 noack=1 freq=0 no_cck=0
offchanok=0 wait_time=0 fc=0x50 (WLAN_FC_STYPE_PROBE_RESP) nlmode=3
nl80211: send_mlme -> send_frame
nl80211: send_frame - Use bss->freq=5240
nl80211: send_frame -> send_frame_cmd
nl80211: CMD_FRAME freq=5240 wait=0 no_cck=0 no_ack=1 offchanok=0
CMD_FRAME - hexdump(len=183): 50 00 00 00 34 23 ba 7b aa 15 94 10 3e
8f d2 db 94 10 3e 8f d2 db 00 00 00 00 00 00 00 00 00 00 64 00 11 00
00 0e 67 69 6c 6d 61 6e 20 6f 70 65 6e 77 72 74 01 08 8c 12 98 24 b0
48 60 6c 03 01 30 07 06 30 30 20 24 04 14 30 14 01 00 00 0f ac 04 01
00 00 0f ac 04 01 00 00 0f ac 02 0c 00 2d 1a ec 0b 03 ff ff ff 00 01
00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 30 00 04
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 00 00
00 00 00 00 00 40 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00
00 42 43 5e 00 62 32 2f 00
nl80211: Frame TX command accepted (no ACK); cookie 0x0
nl80211: Drop oldest pending send action cookie 0x0
nl80211: Event message available
nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wlan1
nl80211: MLME event 59 (NL80211_CMD_FRAME) on wlan1((AP))
A1=ff:ff:ff:ff:ff:ff A2=a4:77:33:7b:21:e8
nl80211: MLME event frame - hexdump(len=106): 40 00 00 00 ff ff ff ff
ff ff a4 77 33 7b 21 e8 ff ff ff ff ff ff 70 92 00 0c 4e 45 54 47 45
41 52 38 30 2d 35 47 01 08 02 04 0b 0c 12 16 18 24 2d 1a 62 00 03 00
00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 08 e0 e1 09 00 32
04 30 48 60 6c 7f 08 00 00 00 00 00 00 00 40 bf 0c 30 70 c0 33 fc ff
24 01 fc ff 24 01
nl80211: Frame event
nl80211: RX frame sa=a4:77:33:7b:21:e8 freq=5240 ssi_signal=-57
fc=0x40 seq_ctrl=0x9270 stype=4 (WLAN_FC_STYPE_PROBE_REQ) len=106
nl80211: Event message available
nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wlan1
nl80211: MLME event 59 (NL80211_CMD_FRAME) on wlan1((AP))
A1=ff:ff:ff:ff:ff:ff A2=a4:77:33:7b:21:e8
nl80211: MLME event frame - hexdump(len=106): 40 00 00 00 ff ff ff ff
ff ff a4 77 33 7b 21 e8 ff ff ff ff ff ff 80 92 00 0c 4e 45 54 47 45
41 52 38 30 2d 35 47 01 08 02 04 0b 0c 12 16 18 24 2d 1a 62 00 03 00
00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 08 e0 e1 09 00 32
04 30 48 60 6c 7f 08 00 00 00 00 00 00 00 40 bf 0c 30 70 c0 33 fc ff
24 01 fc ff 24 01
nl80211: Frame event
nl80211: RX frame sa=a4:77:33:7b:21:e8 freq=5240 ssi_signal=-57
fc=0x40 seq_ctrl=0x9280 stype=4 (WLAN_FC_STYPE_PROBE_REQ) len=106
nl80211: Event message available
nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wlan1
nl80211: MLME event 59 (NL80211_CMD_FRAME) on wlan1((AP))
A1=ff:ff:ff:ff:ff:ff A2=a4:77:33:7b:21:e8
nl80211: MLME event frame - hexdump(len=106): 40 00 00 00 ff ff ff ff
ff ff a4 77 33 7b 21 e8 ff ff ff ff ff ff 90 92 00 0c 4e 45 54 47 45
41 52 38 30 2d 35 47 01 08 02 04 0b 0c 12 16 18 24 2d 1a 62 00 03 00
00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 08 e0 e1 09 00 32
04 30 48 60 6c 7f 08 00 00 00 00 00 00 00 40 bf 0c 30 70 c0 33 fc ff
24 01 fc ff 24 01
nl80211: Frame event
nl80211: RX frame sa=a4:77:33:7b:21:e8 freq=5240 ssi_signal=-57
fc=0x40 seq_ctrl=0x9290 stype=4 (WLAN_FC_STYPE_PROBE_REQ) len=106
nl80211: Event message available
nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wlan1
nl80211: MLME event 59 (NL80211_CMD_FRAME) on wlan1((AP))
A1=ff:ff:ff:ff:ff:ff A2=a4:77:33:7b:21:e8
nl80211: MLME event frame - hexdump(len=106): 40 00 00 00 ff ff ff ff
ff ff a4 77 33 7b 21 e8 ff ff ff ff ff ff a0 92 00 0c 4e 45 54 47 45
41 52 38 30 2d 35 47 01 08 02 04 0b 0c 12 16 18 24 2d 1a 62 00 03 00
00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 08 e0 e1 09 00 32
04 30 48 60 6c 7f 08 00 00 00 00 00 00 00 40 bf 0c 30 70 c0 33 fc ff
24 01 fc ff 24 01
nl80211: Frame event
nl80211: RX frame sa=a4:77:33:7b:21:e8 freq=5240 ssi_signal=-57
fc=0x40 seq_ctrl=0x92a0 stype=4 (WLAN_FC_STYPE_PROBE_REQ) len=106
--6TrnltStXW4iwmi0--
^ permalink raw reply [flat|nested] 9+ messages in thread
end of thread, other threads:[~2017-05-06 7:21 UTC | newest]
Thread overview: 9+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2016-06-04 3:54 Troubleshooting mwl8k driver issue David Gilman
2016-06-06 6:51 ` Lennert Buytenhek
2016-06-10 4:02 ` David Gilman
2016-06-17 19:43 ` David Gilman
2016-06-18 8:48 ` Lennert Buytenhek
2016-06-21 0:36 ` David Gilman
2016-06-21 8:01 ` Lennert Buytenhek
2016-07-03 6:13 ` David Gilman
-- strict thread matches above, loose matches on Subject: below --
2017-05-06 7:21 Menion
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).