* [Fwd: Re: Trouble Associating with ath5k on AR5212]
@ 2009-04-03 11:46 Will Keaney
0 siblings, 0 replies; 9+ messages in thread
From: Will Keaney @ 2009-04-03 11:46 UTC (permalink / raw)
To: Linux Wireless
[-- Attachment #1: Type: text/plain, Size: 1128 bytes --]
Forwarding back to the list, as I was silly and sent as HTML originally...
-------- Original Message --------
Bob Copeland wrote:
> On Thu, Apr 2, 2009 at 10:12 AM, Will Keaney <keaneyw@gmail.com> wrote:
>
>> Hello,
>> I have been following the wireless-testing branch for a few months,
>> hoping with each revision that my Atheros card would finally work
>> properly with ath5k. �So far, I've been able to scan for and see nearby
>> networks, but I haven't been able to associate to them.
>>
>
> Does limiting wpa_supplicant to only scan the 2 GHz channels help?
>
> e.g. setting "scan_freq=2412 2437 2462" in your wpa_supplicant.conf
> scans 1 6 and 11.
>
Thanks for the suggestion. It appears that my installed version of
wpa_supplicant does not support the scan_freq parameter. A google
search found precisely one example of it being used, in a sample
wpa_supplicant.conf in the epitest git repo.
For what it's worth, I have also tried using iwconfig to associate to
the neighbor's network under ath5k without success. So I don't think
it's related to wpa_supplicant's scanning algorithm.
Will Keaney
[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 271 bytes --]
^ permalink raw reply [flat|nested] 9+ messages in thread
* [Fwd: Re: Trouble Associating with ath5k on AR5212]
@ 2009-04-03 11:47 Will Keaney
0 siblings, 0 replies; 9+ messages in thread
From: Will Keaney @ 2009-04-03 11:47 UTC (permalink / raw)
To: Linux Wireless
[-- Attachment #1: Type: text/plain, Size: 1479 bytes --]
Forwarding back to the list, as I was silly and sent as HTML originally...
-------- Original Message --------
Bob Copeland wrote:
> On Thu, Apr 02, 2009 at 09:20:05PM -0400, Will Keaney wrote:
>
>> For what it's worth, I have also tried using iwconfig to associate to
>> the neighbor's network under ath5k without success. So I don't think
>> it's related to wpa_supplicant's scanning algorithm.
>>
>
> Well it's a long shot but I thought I'd mention it because I had
> very similar results due to long scans, where wpa_supplicant would
> time out and fail associations.
>
> Try 'dmesg -n 7', then capture the output of dmesg while trying to
> associate, that should show the reason (CONFIG_PRINTK_TIME=y is helpful
> too).
>
dmesg shows this:
[38645.639170] ath5k 0000:03:00.0: PCI INT A -> GSI 17 (level, low) ->
IRQ 17
[38645.639199] ath5k 0000:03:00.0: setting latency timer to 64
[38645.639342] ath5k 0000:03:00.0: registered as 'phy5'
[38645.872038] phy5: Selected rate control algorithm 'minstrel'
[38645.882037] Registered led device: ath5k-phy5::rx
[38645.882090] Registered led device: ath5k-phy5::tx
[38645.882097] ath5k phy5: Atheros AR5414 chip found (MAC: 0xa3, PHY: 0x61)
[38646.133614] ADDRCONF(NETDEV_UP): wlan0: link is not ready
[38667.211026] ath5k phy5: noise floor calibration timeout (5785MHz)
I think the key there is the last line. There is no further output in
dmesg, regardless of what I do in wpa_supplicant.
Thanks,
Will Keaney
[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 271 bytes --]
^ permalink raw reply [flat|nested] 9+ messages in thread
* [Fwd: Re: Trouble Associating with ath5k on AR5212]
@ 2009-04-08 13:38 Will Keaney
2009-04-08 14:58 ` Bob Copeland
0 siblings, 1 reply; 9+ messages in thread
From: Will Keaney @ 2009-04-08 13:38 UTC (permalink / raw)
To: Linux Wireless
[-- Attachment #1.1: Type: text/plain, Size: 882 bytes --]
Looks like thunderbird chose to send as HTML again...
-------- Original Message --------
Bob Copeland wrote:
> On Mon, Apr 06, 2009 at 10:02:45PM -0400, Will Keaney wrote:
>
>> As before, I didn't see any additional dmesg output from athk, even with
>> 'dmesg -n7'.
>>
>
> Hmm, you should be seeing association requests in any case. How are
> you starting the wireless network? Can you try setting the -dd option
> to wpa_supplicant?
>
I'm starting it by modprobing ath5k or ath_pci, depending on what needs
to be tested. udev calls Gentoo's init script for the interface that's
created, which starts wpa_supplicant. I can add debugging flags as well.
When testing with the guest wireless at work today, I got the attached
error in dmesg. I only got it once, and haven't been able to reproduce
it, but thought it might be of interest.
Will
[-- Attachment #1.2: error.txt --]
[-- Type: text/plain, Size: 2376 bytes --]
[ 6260.056196] ------------[ cut here ]------------
[ 6260.056206] WARNING: at drivers/net/wireless/ath5k/base.c:1099 ath5k_tasklet_
rx+0x380/0x516 [ath5k]()
[ 6260.056213] Hardware name: 6459CTO
[ 6260.056218] invalid hw_rix: 1a
[ 6260.056222] Modules linked in: ath5k bnep rfcomm l2cap bluetooth bridge stp l
lc nvidia(P) cpufreq_ondemand oss_usb oss_hdaudio osscore fuse cpufreq_conservat
ive acpi_cpufreq freq_table i2c_i801 i2c_core video output rtc thermal e1000e pc
spkr processor button battery ac evdev [last unloaded: wlan]
[ 6260.056297] Pid: 0, comm: swapper Tainted: P 2.6.29-wl-dirty #10
[ 6260.056303] Call Trace:
[ 6260.056308] <IRQ> [<ffffffff8023aaa3>] warn_slowpath+0xd3/0x10f
[ 6260.056334] [<ffffffff804191d7>] ? synaptics_process_byte+0x6e3/0x700
[ 6260.056344] [<ffffffff804feb4f>] ? _spin_lock_irqsave+0x18/0x34
[ 6260.056352] [<ffffffff804fed34>] ? _spin_unlock_irqrestore+0x12/0x2b
[ 6260.056362] [<ffffffff8033d0e3>] ? map_single+0x186/0x207
[ 6260.056371] [<ffffffff8033ca25>] ? swiotlb_virt_to_bus+0x1f/0x23
[ 6260.056382] [<ffffffff802228ea>] ? swiotlb_map_single_phys+0x0/0x18
[ 6260.056390] [<ffffffff804feb4f>] ? _spin_lock_irqsave+0x18/0x34
[ 6260.056398] [<ffffffff804fed34>] ? _spin_unlock_irqrestore+0x12/0x2b
[ 6260.056406] [<ffffffff8033ce09>] ? unmap_single+0xd8/0xe1
[ 6260.056415] [<ffffffff8033cf46>] ? swiotlb_unmap_single_attrs+0x56/0x5f
[ 6260.056434] [<ffffffffa096e49a>] ath5k_tasklet_rx+0x380/0x516 [ath5k]
[ 6260.056444] [<ffffffff8023f4b9>] tasklet_action+0xbc/0x126
[ 6260.056452] [<ffffffff8023fe11>] __do_softirq+0x60/0x10b
[ 6260.056461] [<ffffffff8020d1ec>] call_softirq+0x1c/0x28
[ 6260.056469] [<ffffffff8020e77c>] do_softirq+0x34/0x76
[ 6260.056477] [<ffffffff8023fb44>] irq_exit+0x36/0x7e
[ 6260.056484] [<ffffffff8020e9fb>] do_IRQ+0xda/0x10b
[ 6260.056492] [<ffffffff8020ca93>] ret_from_intr+0x0/0xa
[ 6260.056497] <EOI> [<ffffffffa00215f3>] ? acpi_idle_enter_bm+0x2ec/0x372 [pr
ocessor]
[ 6260.056531] [<ffffffffa00215e9>] ? acpi_idle_enter_bm+0x2e2/0x372 [processor
]
[ 6260.056541] [<ffffffff80257759>] ? tick_nohz_get_sleep_length+0x1a/0x31
[ 6260.056551] [<ffffffff8041f9d0>] ? cpuidle_idle_call+0x99/0xd1
[ 6260.056559] [<ffffffff8020b214>] ? cpu_idle+0x4f/0xa7
[ 6260.056568] [<ffffffff804ede71>] ? rest_init+0x75/0x77
[ 6260.056575] ---[ end trace e77764ee08516feb ]---
[-- Attachment #1.3: signature.asc --]
[-- Type: application/pgp-signature, Size: 262 bytes --]
[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 261 bytes --]
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [Fwd: Re: Trouble Associating with ath5k on AR5212]
2009-04-08 13:38 Will Keaney
@ 2009-04-08 14:58 ` Bob Copeland
2009-04-08 15:44 ` Will Keaney
0 siblings, 1 reply; 9+ messages in thread
From: Bob Copeland @ 2009-04-08 14:58 UTC (permalink / raw)
To: Will Keaney; +Cc: Linux Wireless
On Wed, Apr 8, 2009 at 9:38 AM, Will Keaney <keaneyw@gmail.com> wrote:
>> Hmm, you should be seeing association requests in any case. =A0How a=
re
>> you starting the wireless network? =A0Can you try setting the -dd op=
tion
>> to wpa_supplicant?
>>
> I'm starting it by modprobing ath5k or ath_pci, depending on what nee=
ds
> to be tested. =A0udev calls Gentoo's init script for the interface th=
at's
> created, which starts wpa_supplicant. =A0I can add debugging flags as=
well.
Ok, please do and post the log.
> When testing with the guest wireless at work today, I got the attache=
d
> error in dmesg. =A0I only got it once, and haven't been able to repro=
duce
> it, but thought it might be of interest.
Very much so, thanks for the report (probably has no bearing on your ca=
se,
but this is the first example since we added more debugging).
> [ 6260.056213] Hardware name: 6459CTO
> [ 6260.056218] invalid hw_rix: 1a
0x1a is ATH5K_RATE_CODE_2M, certainly a valid rate for 2 GHz.. somethin=
g's
broken. This is pretty rare though so I think it is some sort of race
condition when switching over to 5 GHz.
--=20
Bob Copeland %% www.bobcopeland.com
--
To unsubscribe from this list: send the line "unsubscribe linux-wireles=
s" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [Fwd: Re: Trouble Associating with ath5k on AR5212]
2009-04-08 14:58 ` Bob Copeland
@ 2009-04-08 15:44 ` Will Keaney
2009-04-08 16:20 ` Bob Copeland
0 siblings, 1 reply; 9+ messages in thread
From: Will Keaney @ 2009-04-08 15:44 UTC (permalink / raw)
To: Bob Copeland; +Cc: Linux Wireless
[-- Attachment #1.1: Type: text/plain, Size: 1982 bytes --]
Bob Copeland wrote:
> On Wed, Apr 8, 2009 at 9:38 AM, Will Keaney <keaneyw@gmail.com> wrote:
>
>>> Hmm, you should be seeing association requests in any case. �How are
>>> you starting the wireless network? �Can you try setting the -dd option
>>> to wpa_supplicant?
>>>
>>>
>> I'm starting it by modprobing ath5k or ath_pci, depending on what needs
>> to be tested. �udev calls Gentoo's init script for the interface that's
>> created, which starts wpa_supplicant. �I can add debugging flags as well.
>>
>
> Ok, please do and post the log.
>
Attached.
For this log, I started from a fresh boot, set 'dmesg -n7', and ran "#
modprobe ath5k && sleep 10 && /etc/init.d/net.wlan0 stop &&
wpa_supplicant -c /etc/wpa_supplicant/wpa_supplicant.conf -Dwext -dd
-iwlan0 | tee /home/uberpinguin/wpa_supplicant.log".
dmesg stops showing any output from ath5k and wpa_supplicant fairly
quickly, even though I ran wpa_supplicant for a couple of minutes and
ran a number of scans and reconnects.
I also have to manually set the reg domain to US every time I load the
ath5k module. I tried configuring wpa_supplicant.conf to do this
itself, but that doesn't seem to work. It would be nice to have a
module parameter for setting this at load time.
>> When testing with the guest wireless at work today, I got the attached
>> error in dmesg. �I only got it once, and haven't been able to reproduce
>> it, but thought it might be of interest.
>>
>
> Very much so, thanks for the report (probably has no bearing on your case,
> but this is the first example since we added more debugging).
>
>
>> [ 6260.056213] Hardware name: 6459CTO
>> [ 6260.056218] invalid hw_rix: 1a
>>
>
> 0x1a is ATH5K_RATE_CODE_2M, certainly a valid rate for 2 GHz.. something's
> broken. This is pretty rare though so I think it is some sort of race
> condition when switching over to 5 GHz.
>
Hmm ok. Thanks for the info.
Will
[-- Attachment #1.2: ath5k.dmesg --]
[-- Type: text/plain, Size: 1581 bytes --]
[ 466.900216] ath5k 0000:03:00.0: PCI INT A -> GSI 17 (level, low) -> IRQ 17
[ 466.900242] ath5k 0000:03:00.0: setting latency timer to 64
[ 466.900364] ath5k 0000:03:00.0: registered as 'phy0'
[ 467.129046] phy0: Selected rate control algorithm 'minstrel'
[ 467.133893] Registered led device: ath5k-phy0::rx
[ 467.133914] Registered led device: ath5k-phy0::tx
[ 467.133917] ath5k phy0: Atheros AR5414 chip found (MAC: 0xa3, PHY: 0x61)
[ 467.322144] ADDRCONF(NETDEV_UP): wlan0: link is not ready
[ 477.588134] wlan0: deauthenticating by local choice (reason=3)
[ 477.832258] Bridge firewalling registered
[ 478.129168] wlan0: direct probe to AP 00:19:e1:11:bd:40 try 1
[ 478.129681] ADDRCONF(NETDEV_UP): wlan0: link is not ready
[ 478.328128] wlan0: direct probe to AP 00:19:e1:11:bd:40 try 2
[ 478.528578] wlan0: direct probe to AP 00:19:e1:11:bd:40 try 3
[ 478.728114] wlan0: direct probe to AP 00:19:e1:11:bd:40 timed out
[ 560.722684] cfg80211: Calling CRDA for country: US
[ 560.799487] cfg80211: Regulatory domain changed to country: US
[ 560.799496] (start_freq - end_freq @ bandwidth), (max_antenna_gain, max_eirp)
[ 560.799503] (2402000 KHz - 2472000 KHz @ 40000 KHz), (300 mBi, 2700 mBm)
[ 560.799510] (5170000 KHz - 5250000 KHz @ 40000 KHz), (300 mBi, 1700 mBm)
[ 560.799516] (5250000 KHz - 5330000 KHz @ 40000 KHz), (300 mBi, 2000 mBm)
[ 560.799522] (5490000 KHz - 5710000 KHz @ 40000 KHz), (300 mBi, 2000 mBm)
[ 560.799528] (5735000 KHz - 5835000 KHz @ 40000 KHz), (300 mBi, 3000 mBm)
[ 640.277653] ath5k 0000:03:00.0: PCI INT A disabled
[-- Attachment #1.3: wpa_supplicant.log --]
[-- Type: text/plain, Size: 52919 bytes --]
Initializing interface 'wlan0' conf '/etc/wpa_supplicant/wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/etc/wpa_supplicant/wpa_supplicant.conf' -> '/etc/wpa_supplicant/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant/wpa_supplicant.conf'
ctrl_interface='/var/run/wpa_supplicant'
ctrl_interface_group='wheel'
eapol_version=2
ap_scan=2
update_config=1
country='US'
Line: 8 - start of a new network block
ssid - hexdump_ascii(len=12):
3c 48 61 7c 5c 2f 7c 33 6c 65 30 4e <Ha|\/|3le0N
scan_ssid=1 (0x1)
BSSID - hexdump(len=6): 00 15 6d 63 e7 8b
proto: 0x2
key_mgmt: 0x1
pairwise: 0x10
group: 0x10
auth_alg: 0x1
eap methods - hexdump(len=16): 00 00 00 00 15 00 00 00 00 00 00 00 00 00 00 00
identity - hexdump_ascii(len=11):
[REMOVED]
password - hexdump_ascii(len=21): [REMOVED]
ca_cert - hexdump_ascii(len=26):
[REMOVED]
ca_cert2 - hexdump_ascii(len=26):
[REMOVED]
phase2 - hexdump_ascii(len=12):
61 75 74 68 65 61 70 3d 54 54 4c 53 autheap=TTLS
proactive_key_caching=1 (0x1)
disabled=1 (0x1)
Line: 27 - start of a new network block
ssid - hexdump_ascii(len=8):
57 41 50 31 57 45 53 54 WAP1WEST
key_mgmt: 0x4
wep_key0 - hexdump(len=13): [REMOVED]
disabled=1 (0x1)
Line: 34 - start of a new network block
ssid - hexdump_ascii(len=8):
57 41 50 31 45 41 53 54 WAP1EAST
key_mgmt: 0x4
wep_key0 - hexdump(len=13): [REMOVED]
disabled=1 (0x1)
Line: 41 - start of a new network block
ssid - hexdump_ascii(len=7):
57 4c 41 4e 2d 50 53 WLAN-PS
key_mgmt: 0x4
wep_key0 - hexdump(len=13): [REMOVED]
disabled=1 (0x1)
Line: 48 - start of a new network block
ssid - hexdump_ascii(len=6):
53 75 70 65 72 38 Super8
key_mgmt: 0x4
disabled=1 (0x1)
Line: 54 - start of a new network block
ssid - hexdump_ascii(len=10):
63 68 6d 63 2d 67 75 65 73 74 chmc-guest
key_mgmt: 0x4
disabled=1 (0x1)
Line: 60 - start of a new network block
ssid - hexdump_ascii(len=9):
69 67 61 6f 66 66 69 63 65 igaoffice
key_mgmt: 0x4
disabled=1 (0x1)
Line: 66 - start of a new network block
ssid - hexdump_ascii(len=9):
37 35 30 34 20 34 31 32 34 7504 4124
key_mgmt: 0x4
disabled=1 (0x1)
Line: 72 - start of a new network block
ssid - hexdump_ascii(len=20):
46 72 65 65 20 49 6e 74 65 72 6e 65 74 20 41 63 Free Internet Ac
63 65 73 73 cess
key_mgmt: 0x4
disabled=1 (0x1)
Line: 78 - start of a new network block
ssid - hexdump_ascii(len=7):
68 68 6f 6e 6f 72 73 hhonors
key_mgmt: 0x4
disabled=1 (0x1)
Line: 84 - start of a new network block
ssid - hexdump_ascii(len=16):
46 72 65 65 20 50 75 62 6c 69 63 20 57 69 46 69 Free Public WiFi
key_mgmt: 0x4
disabled=1 (0x1)
Line: 90 - start of a new network block
ssid - hexdump_ascii(len=2):
68 70 hp
key_mgmt: 0x4
disabled=1 (0x1)
Line: 96 - start of a new network block
ssid - hexdump_ascii(len=12):
53 6b 79 48 69 67 68 53 70 65 65 64 SkyHighSpeed
key_mgmt: 0x4
disabled=1 (0x1)
Line: 102 - start of a new network block
ssid - hexdump_ascii(len=16):
42 61 79 6d 6f 6e 74 20 47 20 52 6f 75 74 65 72 Baymont G Router
key_mgmt: 0x4
disabled=1 (0x1)
Line: 108 - start of a new network block
ssid - hexdump_ascii(len=13):
42 61 79 6d 6f 6e 74 20 4c 6f 62 62 79 Baymont Lobby
key_mgmt: 0x4
disabled=1 (0x1)
Line: 114 - start of a new network block
ssid - hexdump_ascii(len=10):
53 41 44 4d 53 54 57 41 50 30 SADMSTWAP0
PSK - hexdump(len=32): [REMOVED]
proto: 0x1
key_mgmt: 0x2
pairwise: 0x8
group: 0xe
disabled=1 (0x1)
Line: 124 - start of a new network block
ssid - hexdump_ascii(len=12):
46 6f 78 78 20 2d 20 44 61 6e 69 73 Foxx - Danis
PSK - hexdump(len=32): [REMOVED]
proto: 0x1
key_mgmt: 0x4
pairwise: 0x8
group: 0xe
wep_key0 - hexdump(len=13): [REMOVED]
disabled=1 (0x1)
Line: 135 - start of a new network block
ssid - hexdump_ascii(len=10):
4c 4c 53 44 2d 47 75 65 73 74 LLSD-Guest
key_mgmt: 0x4
disabled=1 (0x1)
Line: 141 - start of a new network block
ssid - hexdump_ascii(len=7):
6c 69 6e 6b 73 79 73 linksys
key_mgmt: 0x4
Line: 146 - start of a new network block
ssid - hexdump_ascii(len=7):
4c 69 6c 79 70 61 64 Lilypad
key_mgmt: 0x4
disabled=1 (0x1)
Line: 152 - start of a new network block
ssid - hexdump_ascii(len=9):
73 67 70 72 69 76 61 74 65 sgprivate
PSK (ASCII passphrase) - hexdump_ascii(len=16): [REMOVED]
proto: 0x1
key_mgmt: 0x2
pairwise: 0x10
disabled=1 (0x1)
PSK (from passphrase) - hexdump(len=32): [REMOVED]
Line: 161 - start of a new network block
ssid - hexdump_ascii(len=6):
73 74 65 76 65 73 steves
key_mgmt: 0x4
disabled=1 (0x1)
Line: 167 - start of a new network block
ssid - hexdump_ascii(len=7):
6c 69 6e 6b 73 79 73 linksys
key_mgmt: 0x4
disabled=1 (0x1)
Line: 173 - start of a new network block
ssid - hexdump_ascii(len=5):
64 6c 69 6e 6b dlink
key_mgmt: 0x4
disabled=1 (0x1)
Line: 179 - start of a new network block
ssid - hexdump_ascii(len=6):
43 48 32 30 30 35 CH2005
key_mgmt: 0x4
disabled=1 (0x1)
Line: 185 - start of a new network block
ssid - hexdump_ascii(len=5):
47 52 55 4c 45 GRULE
key_mgmt: 0x4
disabled=1 (0x1)
Line: 191 - start of a new network block
ssid - hexdump_ascii(len=25):
42 65 6c 6b 69 6e 5f 47 5f 50 6c 75 73 5f 4d 49 Belkin_G_Plus_MI
4d 4f 5f 33 38 33 43 30 44 MO_383C0D
key_mgmt: 0x4
disabled=1 (0x1)
Line: 197 - start of a new network block
ssid - hexdump_ascii(len=5):
64 6c 69 6e 6b dlink
key_mgmt: 0x4
disabled=1 (0x1)
id_str - hexdump_ascii(len=0):
Line: 204 - start of a new network block
ssid - hexdump_ascii(len=7):
64 65 66 61 75 6c 74 default
key_mgmt: 0x4
disabled=1 (0x1)
id_str - hexdump_ascii(len=0):
Line: 211 - start of a new network block
ssid - hexdump_ascii(len=7):
44 61 72 72 65 6c 6c Darrell
key_mgmt: 0x4
disabled=1 (0x1)
id_str - hexdump_ascii(len=0):
Line: 218 - start of a new network block
ssid - hexdump_ascii(len=5):
52 75 66 75 73 Rufus
key_mgmt: 0x4
disabled=1 (0x1)
Line: 224 - start of a new network block
ssid - hexdump_ascii(len=14):
53 74 61 70 6c 65 73 48 6f 74 73 70 6f 74 StaplesHotspot
key_mgmt: 0x4
disabled=1 (0x1)
Line: 230 - start of a new network block
ssid - hexdump_ascii(len=12):
30 38 46 58 30 32 30 34 32 38 33 38 08FX02042838
key_mgmt: 0x4
disabled=1 (0x1)
Line: 236 - start of a new network block
ssid - hexdump_ascii(len=9):
49 73 72 61 65 6c 73 6f 6e Israelson
key_mgmt: 0x4
disabled=1 (0x1)
Line: 242 - start of a new network block
ssid - hexdump_ascii(len=7):
6c 69 6e 6b 73 79 73 linksys
key_mgmt: 0x4
Priority group 0
id=0 ssid='<Ha|\/|3le0N'
id=1 ssid='WAP1WEST'
id=2 ssid='WAP1EAST'
id=3 ssid='WLAN-PS'
id=4 ssid='Super8'
id=5 ssid='chmc-guest'
id=6 ssid='igaoffice'
id=7 ssid='7504 4124'
id=8 ssid='Free Internet Access'
id=9 ssid='hhonors'
id=10 ssid='Free Public WiFi'
id=11 ssid='hp'
id=12 ssid='SkyHighSpeed'
id=13 ssid='Baymont G Router'
id=14 ssid='Baymont Lobby'
id=15 ssid='SADMSTWAP0'
id=16 ssid='Foxx - Danis'
id=17 ssid='LLSD-Guest'
id=18 ssid='linksys'
id=19 ssid='Lilypad'
id=20 ssid='sgprivate'
id=21 ssid='steves'
id=22 ssid='linksys'
id=23 ssid='dlink'
id=24 ssid='CH2005'
id=25 ssid='GRULE'
id=26 ssid='Belkin_G_Plus_MIMO_383C0D'
id=27 ssid='dlink'
id=28 ssid='default'
id=29 ssid='Darrell'
id=30 ssid='Rufus'
id=31 ssid='StaplesHotspot'
id=32 ssid='08FX02042838'
id=33 ssid='Israelson'
id=34 ssid='linksys'
Initializing interface (2) 'wlan0'
Interface wlan0 set UP - waiting a second for the driver to complete initialization
SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf
capabilities: key_mgmt 0xf enc 0xf flags 0x0
WEXT: Operstate: linkmode=1, operstate=5
Own MAC address: 00:1e:4c:a2:a8:c6
wpa_driver_wext_set_wpa
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
wpa_driver_wext_set_drop_unencrypted
RSN: flushing PMKID list in the driver
Setting scan request: 0 sec 100000 usec
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
ctrl_interface_group=10 (from group name 'wheel')
Added interface wlan0
Ignore event for foreign ifindex 5
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b15 len=24
Wireless event: new AP: 00:00:00:00:00:00
Added BSSID 00:00:00:00:00:00 into blacklist
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
Driver did not support SIOCSIWENCODEEXT
State: DISCONNECTED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b06 len=12
State: DISCONNECTED -> SCANNING
Trying to associate with SSID 'linksys'
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: clearing AP WPA IE
WPA: clearing AP RSN IE
WPA: clearing own WPA/RSN IE
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
wpa_driver_wext_set_psk
Setting authentication timeout: 60 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=ForceAuthorized
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b06 len=12
EAPOL: disable timer tick
CTRL_IFACE monitor attached - hexdump(len=21): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 34 33 37 37 2d 32 00
RX ctrl_iface - hexdump_ascii(len=10):
49 4e 54 45 52 46 41 43 45 53 INTERFACES
RX ctrl_iface - hexdump_ascii(len=18):
47 45 54 5f 43 41 50 41 42 49 4c 49 54 59 20 65 GET_CAPABILITY e
61 70 ap
CTRL_IFACE: GET_CAPABILITY 'eap'
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS
RX ctrl_iface - hexdump_ascii(len=13):
4c 49 53 54 5f 4e 45 54 57 4f 52 4b 53 LIST_NETWORKS
RX ctrl_iface - hexdump_ascii(len=23):
47 45 54 5f 4e 45 54 57 4f 52 4b 20 31 38 20 64 GET_NETWORK 18 d
69 73 61 62 6c 65 64 isabled
CTRL_IFACE: GET_NETWORK id=18 name='disabled'
RX ctrl_iface - hexdump_ascii(len=23):
47 45 54 5f 4e 45 54 57 4f 52 4b 20 31 38 20 64 GET_NETWORK 18 d
69 73 61 62 6c 65 64 isabled
CTRL_IFACE: GET_NETWORK id=18 name='disabled'
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=5):
42 53 53 20 30 BSS 0
Scan results did not fit - trying larger buffer (8192 bytes)
Scan results did not fit - trying larger buffer (16384 bytes)
Scan results did not fit - trying larger buffer (32768 bytes)
Received 31058 bytes of scan results (62 BSSes)
RX ctrl_iface - hexdump_ascii(len=5):
42 53 53 20 31 BSS 1
RX ctrl_iface - hexdump_ascii(len=5):
42 53 53 20 32 BSS 2
RX ctrl_iface - hexdump_ascii(len=5):
42 53 53 20 33 BSS 3
RX ctrl_iface - hexdump_ascii(len=5):
42 53 53 20 34 BSS 4
RX ctrl_iface - hexdump_ascii(len=5):
42 53 53 20 35 BSS 5
RX ctrl_iface - hexdump_ascii(len=5):
42 53 53 20 36 BSS 6
RX ctrl_iface - hexdump_ascii(len=5):
42 53 53 20 37 BSS 7
RX ctrl_iface - hexdump_ascii(len=5):
42 53 53 20 38 BSS 8
RX ctrl_iface - hexdump_ascii(len=5):
42 53 53 20 39 BSS 9
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 31 30 BSS 10
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 31 31 BSS 11
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 31 32 BSS 12
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 31 33 BSS 13
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 31 34 BSS 14
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 31 35 BSS 15
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 31 36 BSS 16
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 31 37 BSS 17
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 31 38 BSS 18
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 31 39 BSS 19
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 32 30 BSS 20
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 32 31 BSS 21
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 32 32 BSS 22
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 32 33 BSS 23
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 32 34 BSS 24
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 32 35 BSS 25
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 32 36 BSS 26
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 32 37 BSS 27
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 32 38 BSS 28
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 32 39 BSS 29
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 33 30 BSS 30
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 33 31 BSS 31
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 33 32 BSS 32
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 33 33 BSS 33
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 33 34 BSS 34
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 33 35 BSS 35
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 33 36 BSS 36
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 33 37 BSS 37
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 33 38 BSS 38
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 33 39 BSS 39
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 34 30 BSS 40
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 34 31 BSS 41
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 34 32 BSS 42
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 34 33 BSS 43
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 34 34 BSS 44
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 34 35 BSS 45
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 34 36 BSS 46
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 34 37 BSS 47
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 34 38 BSS 48
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 34 39 BSS 49
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 35 30 BSS 50
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 35 31 BSS 51
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 35 32 BSS 52
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 35 33 BSS 53
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 35 34 BSS 54
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 35 35 BSS 55
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 35 36 BSS 56
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 35 37 BSS 57
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 35 38 BSS 58
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 35 39 BSS 59
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 36 30 BSS 60
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 36 31 BSS 61
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 36 32 BSS 62
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=16):
53 45 4c 45 43 54 5f 4e 45 54 57 4f 52 4b 20 35 SELECT_NETWORK 5
CTRL_IFACE: SELECT_NETWORK id=5
No keys have been configured - skip key clearing
State: ASSOCIATING -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
Setting scan request: 0 sec 0 usec
State: DISCONNECTED -> SCANNING
wpa_supplicant_scan: Reached end of scan list - go back to beginning
Setting scan request: 0 sec 0 usec
Trying to associate with SSID 'chmc-guest'
CTRL_IFACE monitor send - hexdump(len=21): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 34 33 37 37 2d 32 00
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: clearing AP WPA IE
WPA: clearing AP RSN IE
WPA: clearing own WPA/RSN IE
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
wpa_driver_wext_set_psk
Setting authentication timeout: 60 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=ForceAuthorized
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b06 len=12
RX ctrl_iface - hexdump_ascii(len=23):
47 45 54 5f 4e 45 54 57 4f 52 4b 20 31 38 20 64 GET_NETWORK 18 d
69 73 61 62 6c 65 64 isabled
CTRL_IFACE: GET_NETWORK id=18 name='disabled'
RX ctrl_iface - hexdump_ascii(len=23):
47 45 54 5f 4e 45 54 57 4f 52 4b 20 31 38 20 64 GET_NETWORK 18 d
69 73 61 62 6c 65 64 isabled
CTRL_IFACE: GET_NETWORK id=18 name='disabled'
RX ctrl_iface - hexdump_ascii(len=13):
4c 49 53 54 5f 4e 45 54 57 4f 52 4b 53 LIST_NETWORKS
RX ctrl_iface - hexdump_ascii(len=23):
47 45 54 5f 4e 45 54 57 4f 52 4b 20 31 38 20 64 GET_NETWORK 18 d
69 73 61 62 6c 65 64 isabled
CTRL_IFACE: GET_NETWORK id=18 name='disabled'
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS
RX ctrl_iface - hexdump_ascii(len=23):
47 45 54 5f 4e 45 54 57 4f 52 4b 20 31 38 20 64 GET_NETWORK 18 d
69 73 61 62 6c 65 64 isabled
CTRL_IFACE: GET_NETWORK id=18 name='disabled'
RX ctrl_iface - hexdump_ascii(len=13):
4c 49 53 54 5f 4e 45 54 57 4f 52 4b 53 LIST_NETWORKS
RX ctrl_iface - hexdump_ascii(len=23):
47 45 54 5f 4e 45 54 57 4f 52 4b 20 31 38 20 64 GET_NETWORK 18 d
69 73 61 62 6c 65 64 isabled
CTRL_IFACE: GET_NETWORK id=18 name='disabled'
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
Authentication with 00:00:00:00:00:00 timed out.
CTRL_IFACE monitor send - hexdump(len=21): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 34 33 37 37 2d 32 00
BSSID 00:00:00:00:00:00 blacklist count incremented to 2
No keys have been configured - skip key clearing
State: ASSOCIATING -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
Setting scan request: 0 sec 0 usec
State: DISCONNECTED -> SCANNING
wpa_supplicant_scan: Reached end of scan list - go back to beginning
Setting scan request: 0 sec 0 usec
Trying to associate with SSID 'chmc-guest'
CTRL_IFACE monitor send - hexdump(len=21): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 34 33 37 37 2d 32 00
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: clearing AP WPA IE
WPA: clearing AP RSN IE
WPA: clearing own WPA/RSN IE
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
wpa_driver_wext_set_psk
Setting authentication timeout: 60 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=ForceAuthorized
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b06 len=12
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS
RX ctrl_iface - hexdump_ascii(len=23):
47 45 54 5f 4e 45 54 57 4f 52 4b 20 31 38 20 64 GET_NETWORK 18 d
69 73 61 62 6c 65 64 isabled
CTRL_IFACE: GET_NETWORK id=18 name='disabled'
RX ctrl_iface - hexdump_ascii(len=13):
4c 49 53 54 5f 4e 45 54 57 4f 52 4b 53 LIST_NETWORKS
RX ctrl_iface - hexdump_ascii(len=23):
47 45 54 5f 4e 45 54 57 4f 52 4b 20 31 38 20 64 GET_NETWORK 18 d
69 73 61 62 6c 65 64 isabled
CTRL_IFACE: GET_NETWORK id=18 name='disabled'
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
53 43 41 4e SCAN
Setting scan request: 0 sec 0 usec
Starting AP scan (broadcast SSID)
Scan requested (ret=-1) - scan timeout 5 seconds
Failed to initiate AP scan.
Setting scan request: 10 sec 0 usec
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
Scan timeout - try to get results
Scan results did not fit - trying larger buffer (8192 bytes)
Scan results did not fit - trying larger buffer (16384 bytes)
Scan results did not fit - trying larger buffer (32768 bytes)
Scan results did not fit - trying larger buffer (65535 bytes)
Received 38480 bytes of scan results (77 BSSes)
CTRL-EVENT-SCAN-RESULTS
CTRL_IFACE monitor send - hexdump(len=21): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 34 33 37 37 2d 32 00
RX ctrl_iface - hexdump_ascii(len=5):
42 53 53 20 30 BSS 0
RX ctrl_iface - hexdump_ascii(len=5):
42 53 53 20 31 BSS 1
RX ctrl_iface - hexdump_ascii(len=5):
42 53 53 20 32 BSS 2
RX ctrl_iface - hexdump_ascii(len=5):
42 53 53 20 33 BSS 3
RX ctrl_iface - hexdump_ascii(len=5):
42 53 53 20 34 BSS 4
RX ctrl_iface - hexdump_ascii(len=5):
42 53 53 20 35 BSS 5
RX ctrl_iface - hexdump_ascii(len=5):
42 53 53 20 36 BSS 6
RX ctrl_iface - hexdump_ascii(len=5):
42 53 53 20 37 BSS 7
RX ctrl_iface - hexdump_ascii(len=5):
42 53 53 20 38 BSS 8
RX ctrl_iface - hexdump_ascii(len=5):
42 53 53 20 39 BSS 9
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 31 30 BSS 10
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 31 31 BSS 11
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 31 32 BSS 12
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 31 33 BSS 13
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 31 34 BSS 14
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 31 35 BSS 15
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 31 36 BSS 16
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 31 37 BSS 17
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 31 38 BSS 18
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 31 39 BSS 19
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 32 30 BSS 20
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 32 31 BSS 21
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 32 32 BSS 22
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 32 33 BSS 23
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 32 34 BSS 24
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 32 35 BSS 25
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 32 36 BSS 26
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 32 37 BSS 27
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 32 38 BSS 28
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 32 39 BSS 29
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 33 30 BSS 30
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 33 31 BSS 31
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 33 32 BSS 32
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 33 33 BSS 33
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 33 34 BSS 34
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 33 35 BSS 35
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 33 36 BSS 36
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 33 37 BSS 37
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 33 38 BSS 38
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 33 39 BSS 39
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 34 30 BSS 40
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 34 31 BSS 41
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 34 32 BSS 42
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 34 33 BSS 43
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 34 34 BSS 44
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 34 35 BSS 45
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 34 36 BSS 46
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 34 37 BSS 47
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 34 38 BSS 48
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 34 39 BSS 49
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 35 30 BSS 50
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 35 31 BSS 51
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 35 32 BSS 52
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 35 33 BSS 53
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 35 34 BSS 54
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 35 35 BSS 55
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 35 36 BSS 56
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 35 37 BSS 57
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 35 38 BSS 58
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 35 39 BSS 59
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 36 30 BSS 60
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 36 31 BSS 61
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 36 32 BSS 62
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 36 33 BSS 63
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 36 34 BSS 64
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 36 35 BSS 65
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 36 36 BSS 66
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 36 37 BSS 67
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 36 38 BSS 68
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 36 39 BSS 69
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 37 30 BSS 70
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 37 31 BSS 71
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 37 32 BSS 72
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 37 33 BSS 73
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 37 34 BSS 74
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 37 35 BSS 75
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 37 36 BSS 76
RX ctrl_iface - hexdump_ascii(len=6):
42 53 53 20 37 37 BSS 77
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS
RX ctrl_iface - hexdump_ascii(len=23):
47 45 54 5f 4e 45 54 57 4f 52 4b 20 31 38 20 64 GET_NETWORK 18 d
69 73 61 62 6c 65 64 isabled
CTRL_IFACE: GET_NETWORK id=18 name='disabled'
RX ctrl_iface - hexdump_ascii(len=13):
4c 49 53 54 5f 4e 45 54 57 4f 52 4b 53 LIST_NETWORKS
RX ctrl_iface - hexdump_ascii(len=23):
47 45 54 5f 4e 45 54 57 4f 52 4b 20 31 38 20 64 GET_NETWORK 18 d
69 73 61 62 6c 65 64 isabled
CTRL_IFACE: GET_NETWORK id=18 name='disabled'
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
Trying to associate with SSID 'chmc-guest'
CTRL_IFACE monitor send - hexdump(len=21): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 34 33 37 37 2d 32 00
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: clearing AP WPA IE
WPA: clearing AP RSN IE
WPA: clearing own WPA/RSN IE
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: ASSOCIATING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
wpa_driver_wext_set_psk
Setting authentication timeout: 60 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=ForceAuthorized
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b06 len=12
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS
RX ctrl_iface - hexdump_ascii(len=23):
47 45 54 5f 4e 45 54 57 4f 52 4b 20 31 38 20 64 GET_NETWORK 18 d
69 73 61 62 6c 65 64 isabled
CTRL_IFACE: GET_NETWORK id=18 name='disabled'
RX ctrl_iface - hexdump_ascii(len=13):
4c 49 53 54 5f 4e 45 54 57 4f 52 4b 53 LIST_NETWORKS
RX ctrl_iface - hexdump_ascii(len=23):
47 45 54 5f 4e 45 54 57 4f 52 4b 20 31 38 20 64 GET_NETWORK 18 d
69 73 61 62 6c 65 64 isabled
CTRL_IFACE: GET_NETWORK id=18 name='disabled'
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
53 43 41 4e SCAN
Setting scan request: 0 sec 0 usec
Starting AP scan (broadcast SSID)
Scan requested (ret=0) - scan timeout 5 seconds
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
Scan timeout - try to get results
Failed to get scan results
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b19 len=16
Scan results did not fit - trying larger buffer (8192 bytes)
Received 6433 bytes of scan results (13 BSSes)
CTRL-EVENT-SCAN-RESULTS
CTRL_IFACE monitor send - hexdump(len=21): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 34 33 37 37 2d 32 00
RX ctrl_iface - hexdump_ascii(len=5):
42 53 53 20 30 BSS 0
RX ctrl_iface - hexdump_ascii(len=5):
42 53 53 20 31 BSS 1
RX ctrl_iface - hexdump_ascii(len=5):
42 53 53 20 32 BSS 2
RX ctrl_iface - hexdump_ascii(len=5):
42 53 53 20 33 BSS 3
RX ctrl_iface - hexdump_ascii(len=5):
42 53 53 20 34 BSS 4
RX ctrl_iface - hexdump_as
[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 261 bytes --]
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [Fwd: Re: Trouble Associating with ath5k on AR5212]
2009-04-08 15:44 ` Will Keaney
@ 2009-04-08 16:20 ` Bob Copeland
2009-04-08 16:27 ` Will Keaney
0 siblings, 1 reply; 9+ messages in thread
From: Bob Copeland @ 2009-04-08 16:20 UTC (permalink / raw)
To: Will Keaney; +Cc: Linux Wireless
On Wed, Apr 8, 2009 at 11:44 AM, Will Keaney <keaneyw@gmail.com> wrote:
> Attached.
Great, thanks for the logs! I'll look them over when I get a chance.
> I also have to manually set the reg domain to US every time I load th=
e
> ath5k module. =A0I tried configuring wpa_supplicant.conf to do this
> itself, but that doesn't seem to work. =A0It would be nice to have a
> module parameter for setting this at load time.
I may be wrong but I think that only works in wpa_supplicant if you
use -Dnl80211 (instead of -Dwext).
=46WIW in the default world roaming domain you can still connect to mos=
t
APs. Besides iw/wpa_supplicant, pending patches to ath5k will set the
default regdomain automatically based on the value stored in the eeprom=
=2E
--=20
Bob Copeland %% www.bobcopeland.com
--
To unsubscribe from this list: send the line "unsubscribe linux-wireles=
s" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [Fwd: Re: Trouble Associating with ath5k on AR5212]
2009-04-08 16:20 ` Bob Copeland
@ 2009-04-08 16:27 ` Will Keaney
2009-04-08 17:43 ` Will Keaney
0 siblings, 1 reply; 9+ messages in thread
From: Will Keaney @ 2009-04-08 16:27 UTC (permalink / raw)
To: Bob Copeland; +Cc: Linux Wireless
[-- Attachment #1: Type: text/plain, Size: 885 bytes --]
Bob Copeland wrote:
>> I also have to manually set the reg domain to US every time I load the
>> ath5k module. �I tried configuring wpa_supplicant.conf to do this
>> itself, but that doesn't seem to work. �It would be nice to have a
>> module parameter for setting this at load time.
>>
>
> I may be wrong but I think that only works in wpa_supplicant if you
> use -Dnl80211 (instead of -Dwext).
>
> FWIW in the default world roaming domain you can still connect to most
> APs. Besides iw/wpa_supplicant, pending patches to ath5k will set the
> default regdomain automatically based on the value stored in the eeprom.
>
Ahh, interesting. I didn't see nl80211 documented in the wpa_supplicant
example configs or man page. I'll give that a shot.
I seem to get much better scanning results with the region set properly,
than on the world roaming domain.
[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 261 bytes --]
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [Fwd: Re: Trouble Associating with ath5k on AR5212]
2009-04-08 16:27 ` Will Keaney
@ 2009-04-08 17:43 ` Will Keaney
2009-04-17 20:02 ` Will Keaney
0 siblings, 1 reply; 9+ messages in thread
From: Will Keaney @ 2009-04-08 17:43 UTC (permalink / raw)
To: Bob Copeland; +Cc: Linux Wireless
[-- Attachment #1: Type: text/plain, Size: 1983 bytes --]
Will Keaney wrote:
> Bob Copeland wrote:
>
>>> I also have to manually set the reg domain to US every time I load the
>>> ath5k module. �I tried configuring wpa_supplicant.conf to do this
>>> itself, but that doesn't seem to work. �It would be nice to have a
>>> module parameter for setting this at load time.
>>>
>>>
>> I may be wrong but I think that only works in wpa_supplicant if you
>> use -Dnl80211 (instead of -Dwext).
>>
>> FWIW in the default world roaming domain you can still connect to most
>> APs. Besides iw/wpa_supplicant, pending patches to ath5k will set the
>> default regdomain automatically based on the value stored in the eeprom.
>>
>>
> Ahh, interesting. I didn't see nl80211 documented in the wpa_supplicant
> example configs or man page. I'll give that a shot.
> I seem to get much better scanning results with the region set properly,
> than on the world roaming domain.
>
I don't know if it's relevant or not, but when using -Dnl80211 I see a
bit of odd behavior:
- wpa_supplicant is able to set the region automatically. Yay!
- scanning produces quite an extensive list of APs, but most of them
don't have SSIDs listed. This isn't in itself too strange, since I know
that there are 2 networks nearby each with several repeaters that do not
broadcast SSID. However, one of them (chmc_guest) is identified in the
scanning output when using -Dwext.
- All of the networks show a signal strength of 0. -Dwext shows varying
signal strengths for each network. Considering that I am unable to
associate with any of them, I have to wonder which driver is producing
spurious output.
I would also like to note that the maximum Tx Power of the card is
significantly different between madwifi and ath5k. In madwifi, it maxes
at 17dBm; in ath5k, it maxes at 27dBm. I don't know if it actually is
using these values, or if one or both drivers are reporting Tx power
incorrectly.
Will
[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 261 bytes --]
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [Fwd: Re: Trouble Associating with ath5k on AR5212]
2009-04-08 17:43 ` Will Keaney
@ 2009-04-17 20:02 ` Will Keaney
0 siblings, 0 replies; 9+ messages in thread
From: Will Keaney @ 2009-04-17 20:02 UTC (permalink / raw)
To: Linux Wireless
[-- Attachment #1: Type: text/plain, Size: 2231 bytes --]
Will Keaney wrote:
> Will Keaney wrote:
>
>> Bob Copeland wrote:
>>
>>
>>>> I also have to manually set the reg domain to US every time I load the
>>>> ath5k module. �I tried configuring wpa_supplicant.conf to do this
>>>> itself, but that doesn't seem to work. �It would be nice to have a
>>>> module parameter for setting this at load time.
>>>>
>>>>
>>>>
>>> I may be wrong but I think that only works in wpa_supplicant if you
>>> use -Dnl80211 (instead of -Dwext).
>>>
>>> FWIW in the default world roaming domain you can still connect to most
>>> APs. Besides iw/wpa_supplicant, pending patches to ath5k will set the
>>> default regdomain automatically based on the value stored in the eeprom.
>>>
>>>
>>>
>> Ahh, interesting. I didn't see nl80211 documented in the wpa_supplicant
>> example configs or man page. I'll give that a shot.
>> I seem to get much better scanning results with the region set properly,
>> than on the world roaming domain.
>>
>>
> I don't know if it's relevant or not, but when using -Dnl80211 I see a
> bit of odd behavior:
> - wpa_supplicant is able to set the region automatically. Yay!
> - scanning produces quite an extensive list of APs, but most of them
> don't have SSIDs listed. This isn't in itself too strange, since I know
> that there are 2 networks nearby each with several repeaters that do not
> broadcast SSID. However, one of them (chmc_guest) is identified in the
> scanning output when using -Dwext.
> - All of the networks show a signal strength of 0. -Dwext shows varying
> signal strengths for each network. Considering that I am unable to
> associate with any of them, I have to wonder which driver is producing
> spurious output.
>
> I would also like to note that the maximum Tx Power of the card is
> significantly different between madwifi and ath5k. In madwifi, it maxes
> at 17dBm; in ath5k, it maxes at 27dBm. I don't know if it actually is
> using these values, or if one or both drivers are reporting Tx power
> incorrectly.
>
> Will
>
Is there any other information or testing I can provide to assist with
diagnosing/resolving this?
Will
[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 261 bytes --]
^ permalink raw reply [flat|nested] 9+ messages in thread
end of thread, other threads:[~2009-04-17 20:02 UTC | newest]
Thread overview: 9+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2009-04-03 11:47 [Fwd: Re: Trouble Associating with ath5k on AR5212] Will Keaney
-- strict thread matches above, loose matches on Subject: below --
2009-04-08 13:38 Will Keaney
2009-04-08 14:58 ` Bob Copeland
2009-04-08 15:44 ` Will Keaney
2009-04-08 16:20 ` Bob Copeland
2009-04-08 16:27 ` Will Keaney
2009-04-08 17:43 ` Will Keaney
2009-04-17 20:02 ` Will Keaney
2009-04-03 11:46 Will Keaney
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).