* [question, bug] regularly disconnecting wifi on RB1 and RB2 boards, ath10
@ 2025-06-26 14:48 ` Alexey Klimov
2025-06-26 15:02 ` Jeff Johnson
2025-06-26 23:09 ` Bryan O'Donoghue
0 siblings, 2 replies; 8+ messages in thread
From: Alexey Klimov @ 2025-06-26 14:48 UTC (permalink / raw)
To: jjohnson, ath10k; +Cc: linux-wireless, jeff.johnson, linux-arm-msm
Hi all,
After a long time of testing it seems the problem narrows down to qrb2210 rb1
and qrb4210 rb2 boards.
After booting, the board connects to the wifi network and after around ~5-10
minutes it loses the connection (nothing in dmesg). A simple ping of another
machine on the local network doesn't work. After, I guess, around 5000
seconds the GROUP_KEY_HANDSHAKE_TIMEOUT message is printked:
[ 5064.093748] wlan0: deauthenticated from 8c:58:72:d4:d1:8d (Reason: 16=GROUP_KEY_HANDSHAKE_TIMEOUT)
[ 5067.083790] wlan0: authenticate with 8c:58:72:d4:d1:8d (local address=82:95:77:b1:05:a5)
[ 5067.091971] wlan0: send auth to 8c:58:72:d4:d1:8d (try 1/3)
[ 5067.100192] wlan0: authenticated
[ 5067.104734] wlan0: associate with 8c:58:72:d4:d1:8d (try 1/3)
[ 5067.113230] wlan0: RX AssocResp from 8c:58:72:d4:d1:8d (capab=0x11 status=0 aid=2)
[ 5067.193624] wlan0: associated
and after that wireless connection works for ~5-10 minutes and then the cycle
repeats. The longer log with more info and some info with firmware versions,
ids, etc is at the end of this email [1]. Simple wlan0 down and wlan0 up fixes
things for a few minutes.
iw wlan0 link reports the following when wireless network is working:
root@rb1:~# iw wlan0 link
Connected to 8c:58:72:d4:d1:8d (on wlan0)
SSID: void
freq: 5300
RX: 45802 bytes (424 packets)
TX: 71260 bytes (125 packets)
signal: -66 dBm
rx bitrate: 433.3 MBit/s VHT-MCS 9 80MHz short GI VHT-NSS 1
bss flags: short-slot-time
dtim period: 1
beacon int: 100
and this when wireless connection doesn't work:
Connected to 8c:58:72:d4:d1:8d (on wlan0)
SSID: void
freq: 5300
RX: 850615 bytes (9623 packets)
TX: 20372 bytes (247 packets)
signal: -61 dBm
rx bitrate: 6.0 MBit/s
bss flags: short-slot-time
dtim period: 1
beacon int: 100
This was tested with three different routers and different wifi networks.
Other devices here do not exhibit this behaviour.
Any hints on how to debug this? Any debug switches I can toggle to debug this?
I am happy to provide more info or test changes/patches if any.
Thanks in advance.
Best regards,
Alexey
[1]:
[ 7.758934] ath10k_snoc c800000.wifi: qmi chip_id 0x120 chip_family 0x4007 board_id 0xff soc_id 0x40670000
[ 7.769740] ath10k_snoc c800000.wifi: qmi fw_version 0x337703a3 fw_build_timestamp 2023-10-14 01:26 fw_build_id QC_IMAGE_VERSION_STRING=WLAN.HL.3.3.7.c2-00931-QCAHLSWMTPLZ-1
[ 11.086123] ath10k_snoc c800000.wifi: wcn3990 hw1.0 target 0x00000008 chip_id 0x00000000 sub 0000:0000
[ 11.095622] ath10k_snoc c800000.wifi: kconfig debug 0 debugfs 0 tracing 0 dfs 0 testmode 0
[ 11.103998] ath10k_snoc c800000.wifi: firmware ver api 5 features wowlan,mgmt-tx-by-reference,non-bmi,single-chan-info-per-channel crc32 a79c5b24
[ 11.144810] ath10k_snoc c800000.wifi: htt-ver 3.128 wmi-op 4 htt-op 3 cal file max-sta 32 raw 0 hwcrypto 1
[ 11.230894] ath10k_snoc c800000.wifi: invalid MAC address; choosing random
[ 11.238128] ath: EEPROM regdomain: 0x0
[ 11.242060] ath: EEPROM indicates default country code should be used
[ 11.248582] ath: doing EEPROM country->regdmn map search
[ 11.253950] ath: country maps to regdmn code: 0x3a
[ 11.258805] ath: Country alpha2 being used: US
[ 11.263466] ath: Regpair used: 0x3a
[ 15.355756] wlan0: authenticate with 8c:58:72:d4:d1:8d (local address=82:95:77:b1:05:a5)
[ 15.363942] wlan0: send auth to 8c:58:72:d4:d1:8d (try 1/3)
[ 15.372142] wlan0: authenticated
[ 15.377928] wlan0: associate with 8c:58:72:d4:d1:8d (try 1/3)
[ 15.386338] wlan0: RX AssocResp from 8c:58:72:d4:d1:8d (capab=0x11 status=0 aid=2)
[ 15.466514] wlan0: associated
[ 23.167251] systemd-journald[195]: Oldest entry in /var/log/journal/ec3e0078e5e0499bac67949f3edf3fcf/system.journal is older than the configured file retention duration (1month), suggesting rotation.
[ 23.185186] systemd-journald[195]: /var/log/journal/ec3e0078e5e0499bac67949f3edf3fcf/system.journal: Journal header limits reached or header out-of-date, rotating.
[ 31.750177] l5: disabling
[ 31.753382] l11: disabling
[ 31.756385] l16: disabling
[ 5064.093748] wlan0: deauthenticated from 8c:58:72:d4:d1:8d (Reason: 16=GROUP_KEY_HANDSHAKE_TIMEOUT)
[ 5067.083790] wlan0: authenticate with 8c:58:72:d4:d1:8d (local address=82:95:77:b1:05:a5)
[ 5067.091971] wlan0: send auth to 8c:58:72:d4:d1:8d (try 1/3)
[ 5067.100192] wlan0: authenticated
[ 5067.104734] wlan0: associate with 8c:58:72:d4:d1:8d (try 1/3)
[ 5067.113230] wlan0: RX AssocResp from 8c:58:72:d4:d1:8d (capab=0x11 status=0 aid=2)
[ 5067.193624] wlan0: associated
[10437.346541] wlan0: deauthenticated from 8c:58:72:d4:d1:8d (Reason: 16=GROUP_KEY_HANDSHAKE_TIMEOUT)
[10440.340111] wlan0: authenticate with 8c:58:72:d4:d1:8d (local address=82:95:77:b1:05:a5)
[10440.348408] wlan0: send auth to 8c:58:72:d4:d1:8d (try 1/3)
[10440.356698] wlan0: authenticated
[10440.361077] wlan0: associate with 8c:58:72:d4:d1:8d (try 1/3)
[10440.369516] wlan0: RX AssocResp from 8c:58:72:d4:d1:8d (capab=0x11 status=0 aid=2)
[10440.446661] wlan0: associated
^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [question, bug] regularly disconnecting wifi on RB1 and RB2 boards, ath10
2025-06-26 14:48 ` [question, bug] regularly disconnecting wifi on RB1 and RB2 boards, ath10 Alexey Klimov
@ 2025-06-26 15:02 ` Jeff Johnson
2025-06-26 15:10 ` Alexey Klimov
2025-06-26 23:09 ` Bryan O'Donoghue
1 sibling, 1 reply; 8+ messages in thread
From: Jeff Johnson @ 2025-06-26 15:02 UTC (permalink / raw)
To: Alexey Klimov, jjohnson, ath10k; +Cc: linux-wireless, linux-arm-msm
On 6/26/2025 7:48 AM, Alexey Klimov wrote:
...
> Any hints on how to debug this? Any debug switches I can toggle to debug this?
> I am happy to provide more info or test changes/patches if any.
https://wireless.docs.kernel.org/en/latest/en/users/drivers/ath10k/debug.html
^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [question, bug] regularly disconnecting wifi on RB1 and RB2 boards, ath10
2025-06-26 15:02 ` Jeff Johnson
@ 2025-06-26 15:10 ` Alexey Klimov
0 siblings, 0 replies; 8+ messages in thread
From: Alexey Klimov @ 2025-06-26 15:10 UTC (permalink / raw)
To: Jeff Johnson, jjohnson, ath10k; +Cc: linux-wireless, linux-arm-msm
On Thu Jun 26, 2025 at 4:02 PM BST, Jeff Johnson wrote:
> On 6/26/2025 7:48 AM, Alexey Klimov wrote:
> ...
>> Any hints on how to debug this? Any debug switches I can toggle to debug this?
>> I am happy to provide more info or test changes/patches if any.
>
> https://wireless.docs.kernel.org/en/latest/en/users/drivers/ath10k/debug.html
Thanks! Let me try.
BR,
Alexey
^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [question, bug] regularly disconnecting wifi on RB1 and RB2 boards, ath10
2025-06-26 14:48 ` [question, bug] regularly disconnecting wifi on RB1 and RB2 boards, ath10 Alexey Klimov
2025-06-26 15:02 ` Jeff Johnson
@ 2025-06-26 23:09 ` Bryan O'Donoghue
2025-07-22 15:53 ` Loic Poulain
1 sibling, 1 reply; 8+ messages in thread
From: Bryan O'Donoghue @ 2025-06-26 23:09 UTC (permalink / raw)
To: Alexey Klimov, jjohnson, ath10k
Cc: linux-wireless, jeff.johnson, linux-arm-msm
On 26/06/2025 15:48, Alexey Klimov wrote:
> Hi all,
>
> After a long time of testing it seems the problem narrows down to qrb2210 rb1
> and qrb4210 rb2 boards.
>
> After booting, the board connects to the wifi network and after around ~5-10
> minutes it loses the connection (nothing in dmesg). A simple ping of another
> machine on the local network doesn't work. After, I guess, around 5000
> seconds the GROUP_KEY_HANDSHAKE_TIMEOUT message is printked:
>
> [ 5064.093748] wlan0: deauthenticated from 8c:58:72:d4:d1:8d (Reason: 16=GROUP_KEY_HANDSHAKE_TIMEOUT)
> [ 5067.083790] wlan0: authenticate with 8c:58:72:d4:d1:8d (local address=82:95:77:b1:05:a5)
> [ 5067.091971] wlan0: send auth to 8c:58:72:d4:d1:8d (try 1/3)
> [ 5067.100192] wlan0: authenticated
> [ 5067.104734] wlan0: associate with 8c:58:72:d4:d1:8d (try 1/3)
> [ 5067.113230] wlan0: RX AssocResp from 8c:58:72:d4:d1:8d (capab=0x11 status=0 aid=2)
> [ 5067.193624] wlan0: associated
>
> and after that wireless connection works for ~5-10 minutes and then the cycle
> repeats. The longer log with more info and some info with firmware versions,
> ids, etc is at the end of this email [1]. Simple wlan0 down and wlan0 up fixes
> things for a few minutes.
>
> iw wlan0 link reports the following when wireless network is working:
>
> root@rb1:~# iw wlan0 link
> Connected to 8c:58:72:d4:d1:8d (on wlan0)
> SSID: void
> freq: 5300
> RX: 45802 bytes (424 packets)
> TX: 71260 bytes (125 packets)
> signal: -66 dBm
> rx bitrate: 433.3 MBit/s VHT-MCS 9 80MHz short GI VHT-NSS 1
>
> bss flags: short-slot-time
> dtim period: 1
> beacon int: 100
>
> and this when wireless connection doesn't work:
>
> Connected to 8c:58:72:d4:d1:8d (on wlan0)
> SSID: void
> freq: 5300
> RX: 850615 bytes (9623 packets)
> TX: 20372 bytes (247 packets)
> signal: -61 dBm
> rx bitrate: 6.0 MBit/s
>
> bss flags: short-slot-time
> dtim period: 1
> beacon int: 100
>
> This was tested with three different routers and different wifi networks.
> Other devices here do not exhibit this behaviour.
>
> Any hints on how to debug this? Any debug switches I can toggle to debug this?
> I am happy to provide more info or test changes/patches if any.
>
> Thanks in advance.
> Best regards,
> Alexey
>
> [1]:
>
> [ 7.758934] ath10k_snoc c800000.wifi: qmi chip_id 0x120 chip_family 0x4007 board_id 0xff soc_id 0x40670000
> [ 7.769740] ath10k_snoc c800000.wifi: qmi fw_version 0x337703a3 fw_build_timestamp 2023-10-14 01:26 fw_build_id QC_IMAGE_VERSION_STRING=WLAN.HL.3.3.7.c2-00931-QCAHLSWMTPLZ-1
> [ 11.086123] ath10k_snoc c800000.wifi: wcn3990 hw1.0 target 0x00000008 chip_id 0x00000000 sub 0000:0000
> [ 11.095622] ath10k_snoc c800000.wifi: kconfig debug 0 debugfs 0 tracing 0 dfs 0 testmode 0
> [ 11.103998] ath10k_snoc c800000.wifi: firmware ver api 5 features wowlan,mgmt-tx-by-reference,non-bmi,single-chan-info-per-channel crc32 a79c5b24
> [ 11.144810] ath10k_snoc c800000.wifi: htt-ver 3.128 wmi-op 4 htt-op 3 cal file max-sta 32 raw 0 hwcrypto 1
> [ 11.230894] ath10k_snoc c800000.wifi: invalid MAC address; choosing random
> [ 11.238128] ath: EEPROM regdomain: 0x0
> [ 11.242060] ath: EEPROM indicates default country code should be used
> [ 11.248582] ath: doing EEPROM country->regdmn map search
> [ 11.253950] ath: country maps to regdmn code: 0x3a
> [ 11.258805] ath: Country alpha2 being used: US
> [ 11.263466] ath: Regpair used: 0x3a
> [ 15.355756] wlan0: authenticate with 8c:58:72:d4:d1:8d (local address=82:95:77:b1:05:a5)
> [ 15.363942] wlan0: send auth to 8c:58:72:d4:d1:8d (try 1/3)
> [ 15.372142] wlan0: authenticated
> [ 15.377928] wlan0: associate with 8c:58:72:d4:d1:8d (try 1/3)
> [ 15.386338] wlan0: RX AssocResp from 8c:58:72:d4:d1:8d (capab=0x11 status=0 aid=2)
> [ 15.466514] wlan0: associated
> [ 23.167251] systemd-journald[195]: Oldest entry in /var/log/journal/ec3e0078e5e0499bac67949f3edf3fcf/system.journal is older than the configured file retention duration (1month), suggesting rotation.
> [ 23.185186] systemd-journald[195]: /var/log/journal/ec3e0078e5e0499bac67949f3edf3fcf/system.journal: Journal header limits reached or header out-of-date, rotating.
> [ 31.750177] l5: disabling
> [ 31.753382] l11: disabling
> [ 31.756385] l16: disabling
> [ 5064.093748] wlan0: deauthenticated from 8c:58:72:d4:d1:8d (Reason: 16=GROUP_KEY_HANDSHAKE_TIMEOUT)
So.
I wonder what state the GTK - offload is in here.
WMI_GTK_OFFLOAD_CMDID = WMI_CMD_GRP(WMI_GRP_GTK_OFL),
drivers/net/wireless/ath/ath10k/wmi-tlv.c: cfg->gtk_offload_max_vdev =
__cpu_to_le32(2);
Try toggling that offload off or on and see what happens.
> [ 5067.083790] wlan0: authenticate with 8c:58:72:d4:d1:8d (local address=82:95:77:b1:05:a5)
> [ 5067.091971] wlan0: send auth to 8c:58:72:d4:d1:8d (try 1/3)
> [ 5067.100192] wlan0: authenticated
> [ 5067.104734] wlan0: associate with 8c:58:72:d4:d1:8d (try 1/3)
> [ 5067.113230] wlan0: RX AssocResp from 8c:58:72:d4:d1:8d (capab=0x11 status=0 aid=2)
> [ 5067.193624] wlan0: associated
> [10437.346541] wlan0: deauthenticated from 8c:58:72:d4:d1:8d (Reason: 16=GROUP_KEY_HANDSHAKE_TIMEOUT)
> [10440.340111] wlan0: authenticate with 8c:58:72:d4:d1:8d (local address=82:95:77:b1:05:a5)
> [10440.348408] wlan0: send auth to 8c:58:72:d4:d1:8d (try 1/3)
> [10440.356698] wlan0: authenticated
> [10440.361077] wlan0: associate with 8c:58:72:d4:d1:8d (try 1/3)
> [10440.369516] wlan0: RX AssocResp from 8c:58:72:d4:d1:8d (capab=0x11 status=0 aid=2)
> [10440.446661] wlan0: associated
>
You can put another device on your WiFi network into monitor mode and
sniff what is taking place.
Kali Linux I've used in the past on an RPI for this purpose and it was
very easy todo.
https://cyberlab.pacific.edu/resources/lab-network-wireless-sniffing
Another thing to try is to do this same test on an open - unencrypted link.
If we really suspect firmware here, lets try switching off firmware
offload features one-by-one, starting with GTK offload.
---
bod
^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [question, bug] regularly disconnecting wifi on RB1 and RB2 boards, ath10
2025-06-26 23:09 ` Bryan O'Donoghue
@ 2025-07-22 15:53 ` Loic Poulain
2025-07-23 10:42 ` Loic Poulain
0 siblings, 1 reply; 8+ messages in thread
From: Loic Poulain @ 2025-07-22 15:53 UTC (permalink / raw)
To: Bryan O'Donoghue
Cc: Alexey Klimov, jjohnson, ath10k, linux-wireless, jeff.johnson,
linux-arm-msm
On Fri, Jun 27, 2025 at 1:09 AM Bryan O'Donoghue
<bryan.odonoghue@linaro.org> wrote:
>
> On 26/06/2025 15:48, Alexey Klimov wrote:
> > Hi all,
> >
> > After a long time of testing it seems the problem narrows down to qrb2210 rb1
> > and qrb4210 rb2 boards.
> >
> > After booting, the board connects to the wifi network and after around ~5-10
> > minutes it loses the connection (nothing in dmesg). A simple ping of another
> > machine on the local network doesn't work. After, I guess, around 5000
> > seconds the GROUP_KEY_HANDSHAKE_TIMEOUT message is printked:
> >
> > [ 5064.093748] wlan0: deauthenticated from 8c:58:72:d4:d1:8d (Reason: 16=GROUP_KEY_HANDSHAKE_TIMEOUT)
> > [ 5067.083790] wlan0: authenticate with 8c:58:72:d4:d1:8d (local address=82:95:77:b1:05:a5)
> > [ 5067.091971] wlan0: send auth to 8c:58:72:d4:d1:8d (try 1/3)
> > [ 5067.100192] wlan0: authenticated
> > [ 5067.104734] wlan0: associate with 8c:58:72:d4:d1:8d (try 1/3)
> > [ 5067.113230] wlan0: RX AssocResp from 8c:58:72:d4:d1:8d (capab=0x11 status=0 aid=2)
> > [ 5067.193624] wlan0: associated
> >
> > and after that wireless connection works for ~5-10 minutes and then the cycle
> > repeats. The longer log with more info and some info with firmware versions,
> > ids, etc is at the end of this email [1]. Simple wlan0 down and wlan0 up fixes
> > things for a few minutes.
> >
> > iw wlan0 link reports the following when wireless network is working:
> >
> > root@rb1:~# iw wlan0 link
> > Connected to 8c:58:72:d4:d1:8d (on wlan0)
> > SSID: void
> > freq: 5300
> > RX: 45802 bytes (424 packets)
> > TX: 71260 bytes (125 packets)
> > signal: -66 dBm
> > rx bitrate: 433.3 MBit/s VHT-MCS 9 80MHz short GI VHT-NSS 1
> >
> > bss flags: short-slot-time
> > dtim period: 1
> > beacon int: 100
> >
> > and this when wireless connection doesn't work:
> >
> > Connected to 8c:58:72:d4:d1:8d (on wlan0)
> > SSID: void
> > freq: 5300
> > RX: 850615 bytes (9623 packets)
> > TX: 20372 bytes (247 packets)
> > signal: -61 dBm
> > rx bitrate: 6.0 MBit/s
> >
> > bss flags: short-slot-time
> > dtim period: 1
> > beacon int: 100
> >
> > This was tested with three different routers and different wifi networks.
> > Other devices here do not exhibit this behaviour.
> >
> > Any hints on how to debug this? Any debug switches I can toggle to debug this?
> > I am happy to provide more info or test changes/patches if any.
> >
> > Thanks in advance.
> > Best regards,
> > Alexey
> >
> > [1]:
> >
> > [ 7.758934] ath10k_snoc c800000.wifi: qmi chip_id 0x120 chip_family 0x4007 board_id 0xff soc_id 0x40670000
> > [ 7.769740] ath10k_snoc c800000.wifi: qmi fw_version 0x337703a3 fw_build_timestamp 2023-10-14 01:26 fw_build_id QC_IMAGE_VERSION_STRING=WLAN.HL.3.3.7.c2-00931-QCAHLSWMTPLZ-1
> > [ 11.086123] ath10k_snoc c800000.wifi: wcn3990 hw1.0 target 0x00000008 chip_id 0x00000000 sub 0000:0000
> > [ 11.095622] ath10k_snoc c800000.wifi: kconfig debug 0 debugfs 0 tracing 0 dfs 0 testmode 0
> > [ 11.103998] ath10k_snoc c800000.wifi: firmware ver api 5 features wowlan,mgmt-tx-by-reference,non-bmi,single-chan-info-per-channel crc32 a79c5b24
> > [ 11.144810] ath10k_snoc c800000.wifi: htt-ver 3.128 wmi-op 4 htt-op 3 cal file max-sta 32 raw 0 hwcrypto 1
> > [ 11.230894] ath10k_snoc c800000.wifi: invalid MAC address; choosing random
> > [ 11.238128] ath: EEPROM regdomain: 0x0
> > [ 11.242060] ath: EEPROM indicates default country code should be used
> > [ 11.248582] ath: doing EEPROM country->regdmn map search
> > [ 11.253950] ath: country maps to regdmn code: 0x3a
> > [ 11.258805] ath: Country alpha2 being used: US
> > [ 11.263466] ath: Regpair used: 0x3a
> > [ 15.355756] wlan0: authenticate with 8c:58:72:d4:d1:8d (local address=82:95:77:b1:05:a5)
> > [ 15.363942] wlan0: send auth to 8c:58:72:d4:d1:8d (try 1/3)
> > [ 15.372142] wlan0: authenticated
> > [ 15.377928] wlan0: associate with 8c:58:72:d4:d1:8d (try 1/3)
> > [ 15.386338] wlan0: RX AssocResp from 8c:58:72:d4:d1:8d (capab=0x11 status=0 aid=2)
> > [ 15.466514] wlan0: associated
> > [ 23.167251] systemd-journald[195]: Oldest entry in /var/log/journal/ec3e0078e5e0499bac67949f3edf3fcf/system.journal is older than the configured file retention duration (1month), suggesting rotation.
> > [ 23.185186] systemd-journald[195]: /var/log/journal/ec3e0078e5e0499bac67949f3edf3fcf/system.journal: Journal header limits reached or header out-of-date, rotating.
> > [ 31.750177] l5: disabling
> > [ 31.753382] l11: disabling
> > [ 31.756385] l16: disabling
> > [ 5064.093748] wlan0: deauthenticated from 8c:58:72:d4:d1:8d (Reason: 16=GROUP_KEY_HANDSHAKE_TIMEOUT)
>
> So.
>
> I wonder what state the GTK - offload is in here.
>
> WMI_GTK_OFFLOAD_CMDID = WMI_CMD_GRP(WMI_GRP_GTK_OFL),
>
> drivers/net/wireless/ath/ath10k/wmi-tlv.c: cfg->gtk_offload_max_vdev =
> __cpu_to_le32(2);
>
> Try toggling that offload off or on and see what happens.
>
> > [ 5067.083790] wlan0: authenticate with 8c:58:72:d4:d1:8d (local address=82:95:77:b1:05:a5)
> > [ 5067.091971] wlan0: send auth to 8c:58:72:d4:d1:8d (try 1/3)
> > [ 5067.100192] wlan0: authenticated
> > [ 5067.104734] wlan0: associate with 8c:58:72:d4:d1:8d (try 1/3)
> > [ 5067.113230] wlan0: RX AssocResp from 8c:58:72:d4:d1:8d (capab=0x11 status=0 aid=2)
> > [ 5067.193624] wlan0: associated
> > [10437.346541] wlan0: deauthenticated from 8c:58:72:d4:d1:8d (Reason: 16=GROUP_KEY_HANDSHAKE_TIMEOUT)
> > [10440.340111] wlan0: authenticate with 8c:58:72:d4:d1:8d (local address=82:95:77:b1:05:a5)
> > [10440.348408] wlan0: send auth to 8c:58:72:d4:d1:8d (try 1/3)
> > [10440.356698] wlan0: authenticated
> > [10440.361077] wlan0: associate with 8c:58:72:d4:d1:8d (try 1/3)
> > [10440.369516] wlan0: RX AssocResp from 8c:58:72:d4:d1:8d (capab=0x11 status=0 aid=2)
> > [10440.446661] wlan0: associated
> >
> You can put another device on your WiFi network into monitor mode and
> sniff what is taking place.
>
> Kali Linux I've used in the past on an RPI for this purpose and it was
> very easy todo.
>
> https://cyberlab.pacific.edu/resources/lab-network-wireless-sniffing
>
> Another thing to try is to do this same test on an open - unencrypted link.
>
> If we really suspect firmware here, lets try switching off firmware
> offload features one-by-one, starting with GTK offload.
>
> ---
> bod
>
I configured the GTK rekey interval to one minute and encountered a
similar issue. It appears that something may be going wrong after the
GTK rekeying process completes.
The GTK update is handled entirely by wpa_supplicant (not offloaded),
and while the new key seems to be installed correctly, with frames
still being transmitted and received (from aircap perspective), they
appear to be dropped or mishandled in the RX firmware path.
This suggests there might be an issue with how the new keys are being
applied or interpreted by the firmware. I’ll continue debugging to
pinpoint the root cause.
Regards,
Loic
^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [question, bug] regularly disconnecting wifi on RB1 and RB2 boards, ath10
2025-07-22 15:53 ` Loic Poulain
@ 2025-07-23 10:42 ` Loic Poulain
2025-07-24 14:50 ` Alexey Klimov
0 siblings, 1 reply; 8+ messages in thread
From: Loic Poulain @ 2025-07-23 10:42 UTC (permalink / raw)
To: Alexey Klimov
Cc: jjohnson, Bryan O'Donoghue, ath10k, linux-wireless,
jeff.johnson, linux-arm-msm
Hi Alexey,
On Tue, Jul 22, 2025 at 5:53 PM Loic Poulain
<loic.poulain@oss.qualcomm.com> wrote:
>
> On Fri, Jun 27, 2025 at 1:09 AM Bryan O'Donoghue
> <bryan.odonoghue@linaro.org> wrote:
> >
> > On 26/06/2025 15:48, Alexey Klimov wrote:
> > > Hi all,
> > >
> > > After a long time of testing it seems the problem narrows down to qrb2210 rb1
> > > and qrb4210 rb2 boards.
> > >
> > > After booting, the board connects to the wifi network and after around ~5-10
> > > minutes it loses the connection (nothing in dmesg). A simple ping of another
> > > machine on the local network doesn't work. After, I guess, around 5000
> > > seconds the GROUP_KEY_HANDSHAKE_TIMEOUT message is printked:
> > >
> > > [ 5064.093748] wlan0: deauthenticated from 8c:58:72:d4:d1:8d (Reason: 16=GROUP_KEY_HANDSHAKE_TIMEOUT)
> > > [ 5067.083790] wlan0: authenticate with 8c:58:72:d4:d1:8d (local address=82:95:77:b1:05:a5)
> > > [ 5067.091971] wlan0: send auth to 8c:58:72:d4:d1:8d (try 1/3)
> > > [ 5067.100192] wlan0: authenticated
> > > [ 5067.104734] wlan0: associate with 8c:58:72:d4:d1:8d (try 1/3)
> > > [ 5067.113230] wlan0: RX AssocResp from 8c:58:72:d4:d1:8d (capab=0x11 status=0 aid=2)
> > > [ 5067.193624] wlan0: associated
> > >
> > > and after that wireless connection works for ~5-10 minutes and then the cycle
> > > repeats. The longer log with more info and some info with firmware versions,
> > > ids, etc is at the end of this email [1]. Simple wlan0 down and wlan0 up fixes
> > > things for a few minutes.
> > >
> > > iw wlan0 link reports the following when wireless network is working:
> > >
> > > root@rb1:~# iw wlan0 link
> > > Connected to 8c:58:72:d4:d1:8d (on wlan0)
> > > SSID: void
> > > freq: 5300
> > > RX: 45802 bytes (424 packets)
> > > TX: 71260 bytes (125 packets)
> > > signal: -66 dBm
> > > rx bitrate: 433.3 MBit/s VHT-MCS 9 80MHz short GI VHT-NSS 1
> > >
> > > bss flags: short-slot-time
> > > dtim period: 1
> > > beacon int: 100
> > >
> > > and this when wireless connection doesn't work:
> > >
> > > Connected to 8c:58:72:d4:d1:8d (on wlan0)
> > > SSID: void
> > > freq: 5300
> > > RX: 850615 bytes (9623 packets)
> > > TX: 20372 bytes (247 packets)
> > > signal: -61 dBm
> > > rx bitrate: 6.0 MBit/s
> > >
> > > bss flags: short-slot-time
> > > dtim period: 1
> > > beacon int: 100
> > >
> > > This was tested with three different routers and different wifi networks.
> > > Other devices here do not exhibit this behaviour.
> > >
> > > Any hints on how to debug this? Any debug switches I can toggle to debug this?
> > > I am happy to provide more info or test changes/patches if any.
> > >
> > > Thanks in advance.
> > > Best regards,
> > > Alexey
> > >
> > > [1]:
> > >
> > > [ 7.758934] ath10k_snoc c800000.wifi: qmi chip_id 0x120 chip_family 0x4007 board_id 0xff soc_id 0x40670000
> > > [ 7.769740] ath10k_snoc c800000.wifi: qmi fw_version 0x337703a3 fw_build_timestamp 2023-10-14 01:26 fw_build_id QC_IMAGE_VERSION_STRING=WLAN.HL.3.3.7.c2-00931-QCAHLSWMTPLZ-1
> > > [ 11.086123] ath10k_snoc c800000.wifi: wcn3990 hw1.0 target 0x00000008 chip_id 0x00000000 sub 0000:0000
> > > [ 11.095622] ath10k_snoc c800000.wifi: kconfig debug 0 debugfs 0 tracing 0 dfs 0 testmode 0
> > > [ 11.103998] ath10k_snoc c800000.wifi: firmware ver api 5 features wowlan,mgmt-tx-by-reference,non-bmi,single-chan-info-per-channel crc32 a79c5b24
> > > [ 11.144810] ath10k_snoc c800000.wifi: htt-ver 3.128 wmi-op 4 htt-op 3 cal file max-sta 32 raw 0 hwcrypto 1
> > > [ 11.230894] ath10k_snoc c800000.wifi: invalid MAC address; choosing random
> > > [ 11.238128] ath: EEPROM regdomain: 0x0
> > > [ 11.242060] ath: EEPROM indicates default country code should be used
> > > [ 11.248582] ath: doing EEPROM country->regdmn map search
> > > [ 11.253950] ath: country maps to regdmn code: 0x3a
> > > [ 11.258805] ath: Country alpha2 being used: US
> > > [ 11.263466] ath: Regpair used: 0x3a
> > > [ 15.355756] wlan0: authenticate with 8c:58:72:d4:d1:8d (local address=82:95:77:b1:05:a5)
> > > [ 15.363942] wlan0: send auth to 8c:58:72:d4:d1:8d (try 1/3)
> > > [ 15.372142] wlan0: authenticated
> > > [ 15.377928] wlan0: associate with 8c:58:72:d4:d1:8d (try 1/3)
> > > [ 15.386338] wlan0: RX AssocResp from 8c:58:72:d4:d1:8d (capab=0x11 status=0 aid=2)
> > > [ 15.466514] wlan0: associated
> > > [ 23.167251] systemd-journald[195]: Oldest entry in /var/log/journal/ec3e0078e5e0499bac67949f3edf3fcf/system.journal is older than the configured file retention duration (1month), suggesting rotation.
> > > [ 23.185186] systemd-journald[195]: /var/log/journal/ec3e0078e5e0499bac67949f3edf3fcf/system.journal: Journal header limits reached or header out-of-date, rotating.
> > > [ 31.750177] l5: disabling
> > > [ 31.753382] l11: disabling
> > > [ 31.756385] l16: disabling
> > > [ 5064.093748] wlan0: deauthenticated from 8c:58:72:d4:d1:8d (Reason: 16=GROUP_KEY_HANDSHAKE_TIMEOUT)
> >
> > So.
> >
> > I wonder what state the GTK - offload is in here.
> >
> > WMI_GTK_OFFLOAD_CMDID = WMI_CMD_GRP(WMI_GRP_GTK_OFL),
> >
> > drivers/net/wireless/ath/ath10k/wmi-tlv.c: cfg->gtk_offload_max_vdev =
> > __cpu_to_le32(2);
> >
> > Try toggling that offload off or on and see what happens.
> >
> > > [ 5067.083790] wlan0: authenticate with 8c:58:72:d4:d1:8d (local address=82:95:77:b1:05:a5)
> > > [ 5067.091971] wlan0: send auth to 8c:58:72:d4:d1:8d (try 1/3)
> > > [ 5067.100192] wlan0: authenticated
> > > [ 5067.104734] wlan0: associate with 8c:58:72:d4:d1:8d (try 1/3)
> > > [ 5067.113230] wlan0: RX AssocResp from 8c:58:72:d4:d1:8d (capab=0x11 status=0 aid=2)
> > > [ 5067.193624] wlan0: associated
> > > [10437.346541] wlan0: deauthenticated from 8c:58:72:d4:d1:8d (Reason: 16=GROUP_KEY_HANDSHAKE_TIMEOUT)
> > > [10440.340111] wlan0: authenticate with 8c:58:72:d4:d1:8d (local address=82:95:77:b1:05:a5)
> > > [10440.348408] wlan0: send auth to 8c:58:72:d4:d1:8d (try 1/3)
> > > [10440.356698] wlan0: authenticated
> > > [10440.361077] wlan0: associate with 8c:58:72:d4:d1:8d (try 1/3)
> > > [10440.369516] wlan0: RX AssocResp from 8c:58:72:d4:d1:8d (capab=0x11 status=0 aid=2)
> > > [10440.446661] wlan0: associated
> > >
> > You can put another device on your WiFi network into monitor mode and
> > sniff what is taking place.
> >
> > Kali Linux I've used in the past on an RPI for this purpose and it was
> > very easy todo.
> >
> > https://cyberlab.pacific.edu/resources/lab-network-wireless-sniffing
> >
> > Another thing to try is to do this same test on an open - unencrypted link.
> >
> > If we really suspect firmware here, lets try switching off firmware
> > offload features one-by-one, starting with GTK offload.
> >
> > ---
> > bod
> >
>
> I configured the GTK rekey interval to one minute and encountered a
> similar issue. It appears that something may be going wrong after the
> GTK rekeying process completes.
>
> The GTK update is handled entirely by wpa_supplicant (not offloaded),
> and while the new key seems to be installed correctly, with frames
> still being transmitted and received (from aircap perspective), they
> appear to be dropped or mishandled in the RX firmware path.
>
> This suggests there might be an issue with how the new keys are being
> applied or interpreted by the firmware. I’ll continue debugging to
> pinpoint the root cause.
>
> Regards,
> Loic
Could you check if this change helps:
diff --git a/drivers/net/wireless/ath/ath10k/mac.c
b/drivers/net/wireless/ath/ath10k/mac.c
index c61b95a928da..4fa7dd62aeac 100644
--- a/drivers/net/wireless/ath/ath10k/mac.c
+++ b/drivers/net/wireless/ath/ath10k/mac.c
@@ -288,8 +288,10 @@ static int ath10k_send_key(struct ath10k_vif *arvif,
key->flags |= IEEE80211_KEY_FLAG_GENERATE_IV;
if (cmd == DISABLE_KEY) {
- arg.key_cipher = ar->wmi_key_cipher[WMI_CIPHER_NONE];
- arg.key_data = NULL;
+ /* Not all hardware supports key deletion operations. so we
+ * replace the key with a junk value to invalidate it.
+ */
+ memset(arg.key_data, 0, arg.key_len);
}
Regards,
Loic
^ permalink raw reply related [flat|nested] 8+ messages in thread
* Re: [question, bug] regularly disconnecting wifi on RB1 and RB2 boards, ath10
2025-07-23 10:42 ` Loic Poulain
@ 2025-07-24 14:50 ` Alexey Klimov
2025-07-30 8:45 ` Alexey Klimov
0 siblings, 1 reply; 8+ messages in thread
From: Alexey Klimov @ 2025-07-24 14:50 UTC (permalink / raw)
To: Loic Poulain
Cc: jjohnson, Bryan O'Donoghue, ath10k, linux-wireless,
jeff.johnson, linux-arm-msm
Hi Loic,
On Wed Jul 23, 2025 at 11:42 AM BST, Loic Poulain wrote:
> Hi Alexey,
>
> On Tue, Jul 22, 2025 at 5:53 PM Loic Poulain
> <loic.poulain@oss.qualcomm.com> wrote:
>>
>> On Fri, Jun 27, 2025 at 1:09 AM Bryan O'Donoghue
>> <bryan.odonoghue@linaro.org> wrote:
>> >
>> > On 26/06/2025 15:48, Alexey Klimov wrote:
>> > > Hi all,
>> > >
>> > > After a long time of testing it seems the problem narrows down to qrb2210 rb1
>> > > and qrb4210 rb2 boards.
>> > >
>> > > After booting, the board connects to the wifi network and after around ~5-10
>> > > minutes it loses the connection (nothing in dmesg). A simple ping of another
>> > > machine on the local network doesn't work. After, I guess, around 5000
>> > > seconds the GROUP_KEY_HANDSHAKE_TIMEOUT message is printked:
>> > >
>> > > [ 5064.093748] wlan0: deauthenticated from 8c:58:72:d4:d1:8d (Reason: 16=GROUP_KEY_HANDSHAKE_TIMEOUT)
>> > > [ 5067.083790] wlan0: authenticate with 8c:58:72:d4:d1:8d (local address=82:95:77:b1:05:a5)
>> > > [ 5067.091971] wlan0: send auth to 8c:58:72:d4:d1:8d (try 1/3)
>> > > [ 5067.100192] wlan0: authenticated
>> > > [ 5067.104734] wlan0: associate with 8c:58:72:d4:d1:8d (try 1/3)
>> > > [ 5067.113230] wlan0: RX AssocResp from 8c:58:72:d4:d1:8d (capab=0x11 status=0 aid=2)
>> > > [ 5067.193624] wlan0: associated
>> > >
>> > > and after that wireless connection works for ~5-10 minutes and then the cycle
>> > > repeats. The longer log with more info and some info with firmware versions,
>> > > ids, etc is at the end of this email [1]. Simple wlan0 down and wlan0 up fixes
>> > > things for a few minutes.
>> > >
>> > > iw wlan0 link reports the following when wireless network is working:
>> > >
>> > > root@rb1:~# iw wlan0 link
>> > > Connected to 8c:58:72:d4:d1:8d (on wlan0)
>> > > SSID: void
>> > > freq: 5300
>> > > RX: 45802 bytes (424 packets)
>> > > TX: 71260 bytes (125 packets)
>> > > signal: -66 dBm
>> > > rx bitrate: 433.3 MBit/s VHT-MCS 9 80MHz short GI VHT-NSS 1
>> > >
>> > > bss flags: short-slot-time
>> > > dtim period: 1
>> > > beacon int: 100
>> > >
>> > > and this when wireless connection doesn't work:
>> > >
>> > > Connected to 8c:58:72:d4:d1:8d (on wlan0)
>> > > SSID: void
>> > > freq: 5300
>> > > RX: 850615 bytes (9623 packets)
>> > > TX: 20372 bytes (247 packets)
>> > > signal: -61 dBm
>> > > rx bitrate: 6.0 MBit/s
>> > >
>> > > bss flags: short-slot-time
>> > > dtim period: 1
>> > > beacon int: 100
>> > >
>> > > This was tested with three different routers and different wifi networks.
>> > > Other devices here do not exhibit this behaviour.
>> > >
>> > > Any hints on how to debug this? Any debug switches I can toggle to debug this?
>> > > I am happy to provide more info or test changes/patches if any.
>> > >
>> > > Thanks in advance.
>> > > Best regards,
>> > > Alexey
>> > >
>> > > [1]:
>> > >
>> > > [ 7.758934] ath10k_snoc c800000.wifi: qmi chip_id 0x120 chip_family 0x4007 board_id 0xff soc_id 0x40670000
>> > > [ 7.769740] ath10k_snoc c800000.wifi: qmi fw_version 0x337703a3 fw_build_timestamp 2023-10-14 01:26 fw_build_id QC_IMAGE_VERSION_STRING=WLAN.HL.3.3.7.c2-00931-QCAHLSWMTPLZ-1
>> > > [ 11.086123] ath10k_snoc c800000.wifi: wcn3990 hw1.0 target 0x00000008 chip_id 0x00000000 sub 0000:0000
>> > > [ 11.095622] ath10k_snoc c800000.wifi: kconfig debug 0 debugfs 0 tracing 0 dfs 0 testmode 0
>> > > [ 11.103998] ath10k_snoc c800000.wifi: firmware ver api 5 features wowlan,mgmt-tx-by-reference,non-bmi,single-chan-info-per-channel crc32 a79c5b24
>> > > [ 11.144810] ath10k_snoc c800000.wifi: htt-ver 3.128 wmi-op 4 htt-op 3 cal file max-sta 32 raw 0 hwcrypto 1
>> > > [ 11.230894] ath10k_snoc c800000.wifi: invalid MAC address; choosing random
>> > > [ 11.238128] ath: EEPROM regdomain: 0x0
>> > > [ 11.242060] ath: EEPROM indicates default country code should be used
>> > > [ 11.248582] ath: doing EEPROM country->regdmn map search
>> > > [ 11.253950] ath: country maps to regdmn code: 0x3a
>> > > [ 11.258805] ath: Country alpha2 being used: US
>> > > [ 11.263466] ath: Regpair used: 0x3a
>> > > [ 15.355756] wlan0: authenticate with 8c:58:72:d4:d1:8d (local address=82:95:77:b1:05:a5)
>> > > [ 15.363942] wlan0: send auth to 8c:58:72:d4:d1:8d (try 1/3)
>> > > [ 15.372142] wlan0: authenticated
>> > > [ 15.377928] wlan0: associate with 8c:58:72:d4:d1:8d (try 1/3)
>> > > [ 15.386338] wlan0: RX AssocResp from 8c:58:72:d4:d1:8d (capab=0x11 status=0 aid=2)
>> > > [ 15.466514] wlan0: associated
>> > > [ 23.167251] systemd-journald[195]: Oldest entry in /var/log/journal/ec3e0078e5e0499bac67949f3edf3fcf/system.journal is older than the configured file retention duration (1month), suggesting rotation.
>> > > [ 23.185186] systemd-journald[195]: /var/log/journal/ec3e0078e5e0499bac67949f3edf3fcf/system.journal: Journal header limits reached or header out-of-date, rotating.
>> > > [ 31.750177] l5: disabling
>> > > [ 31.753382] l11: disabling
>> > > [ 31.756385] l16: disabling
>> > > [ 5064.093748] wlan0: deauthenticated from 8c:58:72:d4:d1:8d (Reason: 16=GROUP_KEY_HANDSHAKE_TIMEOUT)
>> >
>> > So.
>> >
>> > I wonder what state the GTK - offload is in here.
>> >
>> > WMI_GTK_OFFLOAD_CMDID = WMI_CMD_GRP(WMI_GRP_GTK_OFL),
>> >
>> > drivers/net/wireless/ath/ath10k/wmi-tlv.c: cfg->gtk_offload_max_vdev =
>> > __cpu_to_le32(2);
>> >
>> > Try toggling that offload off or on and see what happens.
>> >
>> > > [ 5067.083790] wlan0: authenticate with 8c:58:72:d4:d1:8d (local address=82:95:77:b1:05:a5)
>> > > [ 5067.091971] wlan0: send auth to 8c:58:72:d4:d1:8d (try 1/3)
>> > > [ 5067.100192] wlan0: authenticated
>> > > [ 5067.104734] wlan0: associate with 8c:58:72:d4:d1:8d (try 1/3)
>> > > [ 5067.113230] wlan0: RX AssocResp from 8c:58:72:d4:d1:8d (capab=0x11 status=0 aid=2)
>> > > [ 5067.193624] wlan0: associated
>> > > [10437.346541] wlan0: deauthenticated from 8c:58:72:d4:d1:8d (Reason: 16=GROUP_KEY_HANDSHAKE_TIMEOUT)
>> > > [10440.340111] wlan0: authenticate with 8c:58:72:d4:d1:8d (local address=82:95:77:b1:05:a5)
>> > > [10440.348408] wlan0: send auth to 8c:58:72:d4:d1:8d (try 1/3)
>> > > [10440.356698] wlan0: authenticated
>> > > [10440.361077] wlan0: associate with 8c:58:72:d4:d1:8d (try 1/3)
>> > > [10440.369516] wlan0: RX AssocResp from 8c:58:72:d4:d1:8d (capab=0x11 status=0 aid=2)
>> > > [10440.446661] wlan0: associated
>> > >
>> > You can put another device on your WiFi network into monitor mode and
>> > sniff what is taking place.
>> >
>> > Kali Linux I've used in the past on an RPI for this purpose and it was
>> > very easy todo.
>> >
>> > https://cyberlab.pacific.edu/resources/lab-network-wireless-sniffing
>> >
>> > Another thing to try is to do this same test on an open - unencrypted link.
>> >
>> > If we really suspect firmware here, lets try switching off firmware
>> > offload features one-by-one, starting with GTK offload.
>> >
>> > ---
>> > bod
>> >
>>
>> I configured the GTK rekey interval to one minute and encountered a
>> similar issue. It appears that something may be going wrong after the
>> GTK rekeying process completes.
>>
>> The GTK update is handled entirely by wpa_supplicant (not offloaded),
>> and while the new key seems to be installed correctly, with frames
>> still being transmitted and received (from aircap perspective), they
>> appear to be dropped or mishandled in the RX firmware path.
>>
>> This suggests there might be an issue with how the new keys are being
>> applied or interpreted by the firmware. I’ll continue debugging to
>> pinpoint the root cause.
>>
>> Regards,
>> Loic
>
> Could you check if this change helps:
>
> diff --git a/drivers/net/wireless/ath/ath10k/mac.c
> b/drivers/net/wireless/ath/ath10k/mac.c
> index c61b95a928da..4fa7dd62aeac 100644
> --- a/drivers/net/wireless/ath/ath10k/mac.c
> +++ b/drivers/net/wireless/ath/ath10k/mac.c
> @@ -288,8 +288,10 @@ static int ath10k_send_key(struct ath10k_vif *arvif,
> key->flags |= IEEE80211_KEY_FLAG_GENERATE_IV;
>
> if (cmd == DISABLE_KEY) {
> - arg.key_cipher = ar->wmi_key_cipher[WMI_CIPHER_NONE];
> - arg.key_data = NULL;
> + /* Not all hardware supports key deletion operations. so we
> + * replace the key with a junk value to invalidate it.
> + */
> + memset(arg.key_data, 0, arg.key_len);
> }
Thank you. I'll check and respond.
Best regards,
Alexey
^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [question, bug] regularly disconnecting wifi on RB1 and RB2 boards, ath10
2025-07-24 14:50 ` Alexey Klimov
@ 2025-07-30 8:45 ` Alexey Klimov
0 siblings, 0 replies; 8+ messages in thread
From: Alexey Klimov @ 2025-07-30 8:45 UTC (permalink / raw)
To: Loic Poulain
Cc: jjohnson, Bryan O'Donoghue, ath10k, linux-wireless,
jeff.johnson, linux-arm-msm
On Thu Jul 24, 2025 at 3:50 PM BST, Alexey Klimov wrote:
> Hi Loic,
>
> On Wed Jul 23, 2025 at 11:42 AM BST, Loic Poulain wrote:
>> Hi Alexey,
>>
[..]
>> Could you check if this change helps:
>>
>> diff --git a/drivers/net/wireless/ath/ath10k/mac.c
>> b/drivers/net/wireless/ath/ath10k/mac.c
>> index c61b95a928da..4fa7dd62aeac 100644
>> --- a/drivers/net/wireless/ath/ath10k/mac.c
>> +++ b/drivers/net/wireless/ath/ath10k/mac.c
>> @@ -288,8 +288,10 @@ static int ath10k_send_key(struct ath10k_vif *arvif,
>> key->flags |= IEEE80211_KEY_FLAG_GENERATE_IV;
>>
>> if (cmd == DISABLE_KEY) {
>> - arg.key_cipher = ar->wmi_key_cipher[WMI_CIPHER_NONE];
>> - arg.key_data = NULL;
>> + /* Not all hardware supports key deletion operations. so we
>> + * replace the key with a junk value to invalidate it.
>> + */
>> + memset(arg.key_data, 0, arg.key_len);
>> }
So far looks good.
I didn't see any kind of GROUP_KEY_HANDSHAKE_TIMEOUT messages and long wifi
outages leaving the RB1, for instance, overnight.
I do observe some packet loss while pinging the board for a while --
around 0.1..0.6% packet loss but that might be because of my wifi network
and absence of external antenna and it is still much much better than
default behaviour.
Could you please add me to C/c when you're going to send it over?
Thank you for looking into this,
Alexey
^ permalink raw reply [flat|nested] 8+ messages in thread
end of thread, other threads:[~2025-07-30 8:45 UTC | newest]
Thread overview: 8+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
[not found] <Zgp0ym-MGzX2eSZdlkVYbgvjkJ0CzKItjaC5pafzQnj1AOZnVAqvCIZfYoK7nwDhUgOA0U8eNolNtaWXbExOAQ==@protonmail.internalid>
2025-06-26 14:48 ` [question, bug] regularly disconnecting wifi on RB1 and RB2 boards, ath10 Alexey Klimov
2025-06-26 15:02 ` Jeff Johnson
2025-06-26 15:10 ` Alexey Klimov
2025-06-26 23:09 ` Bryan O'Donoghue
2025-07-22 15:53 ` Loic Poulain
2025-07-23 10:42 ` Loic Poulain
2025-07-24 14:50 ` Alexey Klimov
2025-07-30 8:45 ` Alexey Klimov
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox