Modify

Opened 6 years ago

Closed 6 years ago

Last modified 4 years ago

#10311 closed defect (fixed)

Stability issues with TP-Link 841ND and wireless

Reported by: Petr Titera <p.titera@…> Owned by: developers
Priority: normal Milestone: Barrier Breaker 14.07
Component: packages Version: Trunk
Keywords: Cc:

Description

With r28663 I see again problesm with stability of wireless. My log is filled with:

Oct 29 17:20:38 firewall hostapd: wlan0: STA 06:25:d3:6a:53:da IEEE 802.11: did not acknowledge authentication response
Oct 29 17:20:39 firewall hostapd: wlan0: STA 06:25:d3:6a:53:da IEEE 802.11: authenticated
Oct 29 17:20:39 firewall hostapd: wlan0: STA 06:25:d3:6a:53:da IEEE 802.11: associated (aid 1)
Oct 29 17:20:41 firewall hostapd: wlan0: STA 06:25:d3:6a:53:da IEEE 802.11: authenticated
Oct 29 17:20:41 firewall hostapd: wlan0: STA 06:25:d3:6a:53:da IEEE 802.11: associated (aid 1)
Oct 29 17:20:42 firewall hostapd: wlan0: STA 06:25:d3:6a:53:da IEEE 802.11: deauthenticated due to local deauth request
Oct 29 17:20:49 firewall hostapd: wlan0: STA 06:25:d3:6a:53:da IEEE 802.11: authenticated
Oct 29 17:20:52 firewall hostapd: wlan0: STA 06:25:d3:6a:53:da IEEE 802.11: did not acknowledge authentication response
Oct 29 17:20:53 firewall hostapd: wlan0: STA 06:25:d3:6a:53:da IEEE 802.11: did not acknowledge authentication response
Oct 29 17:20:54 firewall hostapd: wlan0: STA 06:25:d3:6a:53:da IEEE 802.11: did not acknowledge authentication response
Oct 29 17:20:55 firewall hostapd: wlan0: STA 06:25:d3:6a:53:da IEEE 802.11: did not acknowledge authentication response
Oct 29 17:21:01 firewall hostapd: wlan0: STA 06:25:d3:6a:53:da IEEE 802.11: did not acknowledge authentication response
Oct 29 17:21:02 firewall hostapd: wlan0: STA 06:25:d3:6a:53:da IEEE 802.11: did not acknowledge authentication response
Oct 29 17:21:03 firewall hostapd: wlan0: STA 06:25:d3:6a:53:da IEEE 802.11: did not acknowledge authentication response
Oct 29 17:22:07 firewall hostapd: wlan0: STA 06:25:d3:6a:53:da IEEE 802.11: did not acknowledge authentication response
Oct 29 17:22:08 firewall hostapd: wlan0: STA 06:25:d3:6a:53:da IEEE 802.11: authenticated
Oct 29 17:23:12 firewall hostapd: wlan0: STA 06:25:d3:6a:53:da IEEE 802.11: did not acknowledge authentication response
Oct 29 17:23:12 firewall hostapd: wlan0: STA 06:25:d3:6a:53:da IEEE 802.11: authenticated
Oct 29 17:23:12 firewall hostapd: wlan0: STA 06:25:d3:6a:53:da IEEE 802.11: associated (aid 1)
Oct 29 17:23:15 firewall hostapd: wlan0: STA 06:25:d3:6a:53:da IEEE 802.11: deauthenticated due to local deauth request
Oct 29 17:23:17 firewall hostapd: wlan0: STA 06:25:d3:6a:53:da IEEE 802.11: did not acknowledge authentication response
Oct 29 17:23:18 firewall hostapd: wlan0: STA 06:25:d3:6a:53:da IEEE 802.11: authenticated
Oct 29 17:23:22 firewall hostapd: wlan0: STA 06:25:d3:6a:53:da IEEE 802.11: did not acknowledge authentication response
Oct 29 17:23:23 firewall hostapd: wlan0: STA 06:25:d3:6a:53:da IEEE 802.11: did not acknowledge authentication response
Oct 29 17:23:24 firewall hostapd: wlan0: STA 06:25:d3:6a:53:da IEEE 802.11: authenticated
Oct 29 17:24:26 firewall hostapd: wlan0: STA 06:25:d3:6a:53:da IEEE 802.11: authenticated

and wireless is mostly non working. I read several reports of similar errors each was closed but the bug still persist. Problem appears not only with 802.11n but even with 802.11g. CLient is another Atheros based wireless card. Is there something I can do?

Petr

Attachments (0)

Change History (11)

comment:1 Changed 6 years ago by Petr Titera <p.titera@…>

Hello,

today I've tried to debug this a little. It seems to me that router is deauthenticating clienst because of timeouts in EAPOL handshake.

mgmt::auth
authentication: STA=06:25:d3:6a:53:da auth_alg=0 auth_transaction=1 status_code=0 wep=0
wlan0: STA 06:25:d3:6a:53:da IEEE 802.11: authentication OK (open system)
wlan0: STA 06:25:d3:6a:53:da WPA: event 0 notification
wpa_driver_nl80211_set_key: ifindex=15 alg=0 addr=0x6d3f80 key_idx=0 set_tx=1 seq_len=0 key_len=0
   addr=06:25:d3:6a:53:da
wlan0: STA 06:25:d3:6a:53:da MLME: MLME-AUTHENTICATE.indication(06:25:d3:6a:53:da, OPEN_SYSTEM)
wlan0: STA 06:25:d3:6a:53:da MLME: MLME-DELETEKEYS.request(06:25:d3:6a:53:da)
wpa_driver_nl80211_set_key: ifindex=15 alg=0 addr=0x6d3f80 key_idx=0 set_tx=1 seq_len=0 key_len=0
   addr=06:25:d3:6a:53:da
authentication reply: STA=06:25:d3:6a:53:da auth_alg=0 auth_transaction=2 resp=0 (IE len=0)
Add randomness: count=4788 entropy=1001
mgmt::auth cb
wlan0: STA 06:25:d3:6a:53:da IEEE 802.11: authenticated
mgmt::auth
authentication: STA=06:25:d3:6a:53:da auth_alg=0 auth_transaction=1 status_code=0 wep=0
wlan0: STA 06:25:d3:6a:53:da IEEE 802.11: authentication OK (open system)
wlan0: STA 06:25:d3:6a:53:da WPA: event 0 notification
wpa_driver_nl80211_set_key: ifindex=15 alg=0 addr=0x6d3f80 key_idx=0 set_tx=1 seq_len=0 key_len=0
   addr=06:25:d3:6a:53:da
wlan0: STA 06:25:d3:6a:53:da MLME: MLME-AUTHENTICATE.indication(06:25:d3:6a:53:da, OPEN_SYSTEM)
wlan0: STA 06:25:d3:6a:53:da MLME: MLME-DELETEKEYS.request(06:25:d3:6a:53:da)
wpa_driver_nl80211_set_key: ifindex=15 alg=0 addr=0x6d3f80 key_idx=0 set_tx=1 seq_len=0 key_len=0
   addr=06:25:d3:6a:53:da
authentication reply: STA=06:25:d3:6a:53:da auth_alg=0 auth_transaction=2 resp=0 (IE len=0)
Add randomness: count=4789 entropy=1001
mgmt::auth cb
wlan0: STA 06:25:d3:6a:53:da IEEE 802.11: authenticated
mgmt::auth
authentication: STA=06:25:d3:6a:53:da auth_alg=0 auth_transaction=1 status_code=0 wep=0
wlan0: STA 06:25:d3:6a:53:da IEEE 802.11: authentication OK (open system)
wlan0: STA 06:25:d3:6a:53:da WPA: event 0 notification
wpa_driver_nl80211_set_key: ifindex=15 alg=0 addr=0x6d3f80 key_idx=0 set_tx=1 seq_len=0 key_len=0
   addr=06:25:d3:6a:53:da
wlan0: STA 06:25:d3:6a:53:da MLME: MLME-AUTHENTICATE.indication(06:25:d3:6a:53:da, OPEN_SYSTEM)
wlan0: STA 06:25:d3:6a:53:da MLME: MLME-DELETEKEYS.request(06:25:d3:6a:53:da)
wpa_driver_nl80211_set_key: ifindex=15 alg=0 addr=0x6d3f80 key_idx=0 set_tx=1 seq_len=0 key_len=0
   addr=06:25:d3:6a:53:da
authentication reply: STA=06:25:d3:6a:53:da auth_alg=0 auth_transaction=2 resp=0 (IE len=0)
Add randomness: count=4790 entropy=1001
mgmt::auth cb
wlan0: STA 06:25:d3:6a:53:da IEEE 802.11: authenticated
mgmt::auth
authentication: STA=06:25:d3:6a:53:da auth_alg=0 auth_transaction=1 status_code=0 wep=0
wlan0: STA 06:25:d3:6a:53:da IEEE 802.11: authentication OK (open system)
wlan0: STA 06:25:d3:6a:53:da WPA: event 0 notification
wpa_driver_nl80211_set_key: ifindex=15 alg=0 addr=0x6d3f80 key_idx=0 set_tx=1 seq_len=0 key_len=0
   addr=06:25:d3:6a:53:da
wlan0: STA 06:25:d3:6a:53:da MLME: MLME-AUTHENTICATE.indication(06:25:d3:6a:53:da, OPEN_SYSTEM)
wlan0: STA 06:25:d3:6a:53:da MLME: MLME-DELETEKEYS.request(06:25:d3:6a:53:da)
wpa_driver_nl80211_set_key: ifindex=15 alg=0 addr=0x6d3f80 key_idx=0 set_tx=1 seq_len=0 key_len=0
   addr=06:25:d3:6a:53:da
authentication reply: STA=06:25:d3:6a:53:da auth_alg=0 auth_transaction=2 resp=0 (IE len=0)
Add randomness: count=4791 entropy=1001
mgmt::auth cb
wlan0: STA 06:25:d3:6a:53:da IEEE 802.11: authenticated
Add randomness: count=4792 entropy=1001
Add randomness: count=4793 entropy=1001
Add randomness: count=4794 entropy=1001
Add randomness: count=4795 entropy=1001
Add randomness: count=4796 entropy=1001
Add randomness: count=4797 entropy=1001
Add randomness: count=4798 entropy=1001
Add randomness: count=4799 entropy=1001
Add randomness: count=4800 entropy=1001
mgmt::auth
authentication: STA=06:25:d3:6a:53:da auth_alg=0 auth_transaction=1 status_code=0 wep=0
wlan0: STA 06:25:d3:6a:53:da IEEE 802.11: authentication OK (open system)
wlan0: STA 06:25:d3:6a:53:da WPA: event 0 notification
wpa_driver_nl80211_set_key: ifindex=15 alg=0 addr=0x6d3f80 key_idx=0 set_tx=1 seq_len=0 key_len=0
   addr=06:25:d3:6a:53:da
wlan0: STA 06:25:d3:6a:53:da MLME: MLME-AUTHENTICATE.indication(06:25:d3:6a:53:da, OPEN_SYSTEM)
wlan0: STA 06:25:d3:6a:53:da MLME: MLME-DELETEKEYS.request(06:25:d3:6a:53:da)
wpa_driver_nl80211_set_key: ifindex=15 alg=0 addr=0x6d3f80 key_idx=0 set_tx=1 seq_len=0 key_len=0
   addr=06:25:d3:6a:53:da
authentication reply: STA=06:25:d3:6a:53:da auth_alg=0 auth_transaction=2 resp=0 (IE len=0)
Add randomness: count=4801 entropy=1001
mgmt::auth cb
wlan0: STA 06:25:d3:6a:53:da IEEE 802.11: authenticated
Add randomness: count=4802 entropy=1001
Add randomness: count=4803 entropy=1001
Add randomness: count=4804 entropy=1001
Add randomness: count=4805 entropy=1001
Add randomness: count=4806 entropy=1001
Add randomness: count=4807 entropy=1001
Add randomness: count=4808 entropy=1001
Add randomness: count=4809 entropy=1001
Add randomness: count=4810 entropy=1001
Add randomness: count=4811 entropy=1001
Add randomness: count=4812 entropy=1001
Add randomness: count=4813 entropy=1001
Add randomness: count=4814 entropy=1001
Add randomness: count=4815 entropy=1001
mgmt::auth
authentication: STA=06:25:d3:6a:53:da auth_alg=0 auth_transaction=1 status_code=0 wep=0
wlan0: STA 06:25:d3:6a:53:da IEEE 802.11: authentication OK (open system)
wlan0: STA 06:25:d3:6a:53:da WPA: event 0 notification
wpa_driver_nl80211_set_key: ifindex=15 alg=0 addr=0x6d3f80 key_idx=0 set_tx=1 seq_len=0 key_len=0
   addr=06:25:d3:6a:53:da
wlan0: STA 06:25:d3:6a:53:da MLME: MLME-AUTHENTICATE.indication(06:25:d3:6a:53:da, OPEN_SYSTEM)
wlan0: STA 06:25:d3:6a:53:da MLME: MLME-DELETEKEYS.request(06:25:d3:6a:53:da)
wpa_driver_nl80211_set_key: ifindex=15 alg=0 addr=0x6d3f80 key_idx=0 set_tx=1 seq_len=0 key_len=0
   addr=06:25:d3:6a:53:da
authentication reply: STA=06:25:d3:6a:53:da auth_alg=0 auth_transaction=2 resp=0 (IE len=0)
Add randomness: count=4816 entropy=1001
mgmt::auth cb
wlan0: STA 06:25:d3:6a:53:da IEEE 802.11: authenticated
mgmt::auth
authentication: STA=06:25:d3:6a:53:da auth_alg=0 auth_transaction=1 status_code=0 wep=0
wlan0: STA 06:25:d3:6a:53:da IEEE 802.11: authentication OK (open system)
wlan0: STA 06:25:d3:6a:53:da WPA: event 0 notification
wpa_driver_nl80211_set_key: ifindex=15 alg=0 addr=0x6d3f80 key_idx=0 set_tx=1 seq_len=0 key_len=0
   addr=06:25:d3:6a:53:da
wlan0: STA 06:25:d3:6a:53:da MLME: MLME-AUTHENTICATE.indication(06:25:d3:6a:53:da, OPEN_SYSTEM)
wlan0: STA 06:25:d3:6a:53:da MLME: MLME-DELETEKEYS.request(06:25:d3:6a:53:da)
wpa_driver_nl80211_set_key: ifindex=15 alg=0 addr=0x6d3f80 key_idx=0 set_tx=1 seq_len=0 key_len=0
   addr=06:25:d3:6a:53:da
authentication reply: STA=06:25:d3:6a:53:da auth_alg=0 auth_transaction=2 resp=0 (IE len=0)
Add randomness: count=4817 entropy=1001
mgmt::auth cb
wlan0: STA 06:25:d3:6a:53:da IEEE 802.11: authenticated
mgmt::auth
authentication: STA=06:25:d3:6a:53:da auth_alg=0 auth_transaction=1 status_code=0 wep=0
wlan0: STA 06:25:d3:6a:53:da IEEE 802.11: authentication OK (open system)
wlan0: STA 06:25:d3:6a:53:da WPA: event 0 notification
wpa_driver_nl80211_set_key: ifindex=15 alg=0 addr=0x6d3f80 key_idx=0 set_tx=1 seq_len=0 key_len=0
   addr=06:25:d3:6a:53:da
wlan0: STA 06:25:d3:6a:53:da MLME: MLME-AUTHENTICATE.indication(06:25:d3:6a:53:da, OPEN_SYSTEM)
wlan0: STA 06:25:d3:6a:53:da MLME: MLME-DELETEKEYS.request(06:25:d3:6a:53:da)
wpa_driver_nl80211_set_key: ifindex=15 alg=0 addr=0x6d3f80 key_idx=0 set_tx=1 seq_len=0 key_len=0
   addr=06:25:d3:6a:53:da
authentication reply: STA=06:25:d3:6a:53:da auth_alg=0 auth_transaction=2 resp=0 (IE len=0)
Add randomness: count=4818 entropy=1001
mgmt::auth cb
wlan0: STA 06:25:d3:6a:53:da IEEE 802.11: authenticated
mgmt::assoc_req
association request: STA=06:25:d3:6a:53:da capab_info=0x431 listen_interval=1
WMM IE - hexdump(len=7): 00 50 f2 02 00 01 00
Validating WMM IE: OUI 00:50:f2  OUI type 2  OUI sub-type 0  version 1  QoS info 0x0
  old AID 1
wlan0: STA 06:25:d3:6a:53:da IEEE 802.11: association OK (aid 1)
Add randomness: count=4819 entropy=1001
mgmt::assoc_resp cb
wlan0: STA 06:25:d3:6a:53:da IEEE 802.11: associated (aid 1)
wlan0: STA 06:25:d3:6a:53:da MLME: MLME-ASSOCIATE.indication(06:25:d3:6a:53:da)
wlan0: STA 06:25:d3:6a:53:da MLME: MLME-DELETEKEYS.request(06:25:d3:6a:53:da)
wpa_driver_nl80211_set_key: ifindex=15 alg=0 addr=0x6d3f80 key_idx=0 set_tx=1 seq_len=0 key_len=0
   addr=06:25:d3:6a:53:da
wlan0: STA 06:25:d3:6a:53:da WPA: event 1 notification
wpa_driver_nl80211_set_key: ifindex=15 alg=0 addr=0x6d3f80 key_idx=0 set_tx=1 seq_len=0 key_len=0
   addr=06:25:d3:6a:53:da
IEEE 802.1X: Ignore STA - 802.1X not enabled or forced for WPS
wlan0: STA 06:25:d3:6a:53:da WPA: event 4 notification
wpa_driver_nl80211_set_key: ifindex=15 alg=0 addr=0x6d3f80 key_idx=0 set_tx=1 seq_len=0 key_len=0
   addr=06:25:d3:6a:53:da
WPA: 06:25:d3:6a:53:da WPA_PTK entering state AUTHENTICATION2
WPA: Assign ANonce - hexdump(len=32): 13 9e da 5e 0c 1c 87 57 22 81 5f 87 6d 14 0d 05 1b ff f8 74 19 ac 2e 27 d5 40 16 9e 4c 01 b6 cb
WPA: 06:25:d3:6a:53:da WPA_PTK entering state INITPSK
WPA: 06:25:d3:6a:53:da WPA_PTK entering state PTKSTART
wlan0: STA 06:25:d3:6a:53:da WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 keyidx=0 encr=0)
WPA: Use EAPOL-Key timeout of 100 ms (retry counter 1)
nl80211: Event message available
nl80211: Delete station 06:25:d3:6a:53:da
nl80211: Event message available
nl80211: New station 06:25:d3:6a:53:da
wlan0: STA 06:25:d3:6a:53:da WPA: EAPOL-Key timeout
WPA: 06:25:d3:6a:53:da WPA_PTK entering state PTKSTART
wlan0: STA 06:25:d3:6a:53:da WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 keyidx=0 encr=0)
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 2)
mgmt::assoc_req
association request: STA=06:25:d3:6a:53:da capab_info=0x431 listen_interval=1
WMM IE - hexdump(len=7): 00 50 f2 02 00 01 00
Validating WMM IE: OUI 00:50:f2  OUI type 2  OUI sub-type 0  version 1  QoS info 0x0
  old AID 1
wlan0: STA 06:25:d3:6a:53:da IEEE 802.11: association OK (aid 1)
Add randomness: count=4820 entropy=1001
mgmt::assoc_resp cb
wlan0: STA 06:25:d3:6a:53:da IEEE 802.11: associated (aid 1)
wlan0: STA 06:25:d3:6a:53:da MLME: MLME-ASSOCIATE.indication(06:25:d3:6a:53:da)
wlan0: STA 06:25:d3:6a:53:da MLME: MLME-DELETEKEYS.request(06:25:d3:6a:53:da)
wpa_driver_nl80211_set_key: ifindex=15 alg=0 addr=0x6d3f80 key_idx=0 set_tx=1 seq_len=0 key_len=0
   addr=06:25:d3:6a:53:da
wlan0: STA 06:25:d3:6a:53:da WPA: event 1 notification
wpa_driver_nl80211_set_key: ifindex=15 alg=0 addr=0x6d3f80 key_idx=0 set_tx=1 seq_len=0 key_len=0
   addr=06:25:d3:6a:53:da
IEEE 802.1X: Ignore STA - 802.1X not enabled or forced for WPS
wlan0: STA 06:25:d3:6a:53:da WPA: event 4 notification
wpa_driver_nl80211_set_key: ifindex=15 alg=0 addr=0x6d3f80 key_idx=0 set_tx=1 seq_len=0 key_len=0
   addr=06:25:d3:6a:53:da
WPA: 06:25:d3:6a:53:da WPA_PTK entering state AUTHENTICATION2
WPA: Assign ANonce - hexdump(len=32): 13 9e da 5e 0c 1c 87 57 22 81 5f 87 6d 14 0d 05 1b ff f8 74 19 ac 2e 27 d5 40 16 9e 4c 01 b6 cc
WPA: 06:25:d3:6a:53:da WPA_PTK entering state INITPSK
WPA: 06:25:d3:6a:53:da WPA_PTK entering state PTKSTART
wlan0: STA 06:25:d3:6a:53:da WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 keyidx=0 encr=0)
WPA: Use EAPOL-Key timeout of 100 ms (retry counter 1)
nl80211: Event message available
nl80211: Delete station 06:25:d3:6a:53:da
nl80211: Event message available
nl80211: New station 06:25:d3:6a:53:da
wlan0: STA 06:25:d3:6a:53:da WPA: EAPOL-Key timeout
WPA: 06:25:d3:6a:53:da WPA_PTK entering state PTKSTART
wlan0: STA 06:25:d3:6a:53:da WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 keyidx=0 encr=0)
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 2)
wlan0: STA 06:25:d3:6a:53:da WPA: EAPOL-Key timeout
WPA: 06:25:d3:6a:53:da WPA_PTK entering state PTKSTART
wlan0: STA 06:25:d3:6a:53:da WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 keyidx=0 encr=0)
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 3)
wlan0: STA 06:25:d3:6a:53:da WPA: EAPOL-Key timeout
WPA: 06:25:d3:6a:53:da WPA_PTK entering state PTKSTART
wlan0: STA 06:25:d3:6a:53:da WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 keyidx=0 encr=0)
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 4)
wlan0: STA 06:25:d3:6a:53:da WPA: EAPOL-Key timeout
WPA: 06:25:d3:6a:53:da WPA_PTK entering state PTKSTART
wlan0: STA 06:25:d3:6a:53:da WPA: PTKSTART: Retry limit 4 reached
WPA: 06:25:d3:6a:53:da WPA_PTK entering state DISCONNECT
hostapd_wpa_auth_disconnect: WPA authenticator requests disconnect: STA 06:25:d3:6a:53:da reason 2
WPA: 06:25:d3:6a:53:da WPA_PTK entering state DISCONNECTED
WPA: 06:25:d3:6a:53:da WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=15 alg=0 addr=0x6d3f80 key_idx=0 set_tx=1 seq_len=0 key_len=0
   addr=06:25:d3:6a:53:da
wlan0: STA 06:25:d3:6a:53:da IEEE 802.1X: unauthorizing port
wlan0: STA 06:25:d3:6a:53:da IEEE 802.11: deauthenticated due to local deauth request
nl80211: Event message available
nl80211: Delete station 06:25:d3:6a:53:da
Add randomness: count=4821 entropy=1001
Add randomness: count=4822 entropy=1001
Add randomness: count=4823 entropy=1001
Add randomness: count=4824 entropy=1001

wireless was unused during this time as I'm forced to use cable.

Petr

comment:2 Changed 6 years ago by nbd

how is it with r28772 or newer?

comment:3 Changed 6 years ago by anonymous

It definitely seems to be more stable than before. I had some problems with one of my card, but it might be because of that specific card (cheap USB dongle). Integrated Intel one works. I will test with Atheros later

comment:4 Changed 6 years ago by Petr Titera <p.titera@…>

Hello,

I was too quick with my opinions. r28772 is quite stable with my integrated Intel 3945ABG card, but is very unstable with Atheros AR928X.

With unstable I mean that ssh connections are timing out, I cannot load pages etc. Until I disconnect from wireless network and connect again. May be that my problems with that USB dongle were same.

Is there any way how to increase debug level so you would have more informations? I cannot run hostapd always in console.

This is what I see in my log now:

Nov  7 21:03:18 firewall kernel: ath: Failed to stop TX DMA, queues=0x004!
Nov  7 21:03:22 firewall kernel: ath: Failed to stop TX DMA, queues=0x004!
Nov  7 21:03:22 firewall kernel: ath: Failed to stop TX DMA, queues=0x004!
Nov  7 21:03:23 firewall kernel: ath: Failed to stop TX DMA, queues=0x004!
Nov  7 21:03:23 firewall kernel: ath: Failed to stop TX DMA, queues=0x005!
Nov  7 21:03:23 firewall kernel: ath: Failed to stop TX DMA, queues=0x004!
Nov  7 21:03:24 firewall kernel: ath: Failed to stop TX DMA, queues=0x004!
Nov  7 21:03:26 firewall kernel: ath: Failed to stop TX DMA, queues=0x004!
Nov  7 21:03:26 firewall kernel: ath: Failed to stop TX DMA, queues=0x004!
Nov  7 21:03:27 firewall kernel: ath: Failed to stop TX DMA, queues=0x005!
Nov  7 21:03:27 firewall kernel: ath: Failed to stop TX DMA, queues=0x004!
Nov  7 21:03:28 firewall kernel: ath: Failed to stop TX DMA, queues=0x004!
Nov  7 21:03:28 firewall kernel: ath: Failed to stop TX DMA, queues=0x004!
Nov  7 21:03:29 firewall kernel: ath: Failed to stop TX DMA, queues=0x004!
Nov  7 21:03:29 firewall kernel: ath: Failed to stop TX DMA, queues=0x004!
Nov  7 21:03:30 firewall kernel: ath: Failed to stop TX DMA, queues=0x005!
Nov  7 21:03:30 firewall hostapd: wlan0: STA 06:25:d3:6a:53:da IEEE 802.11: authenticated
Nov  7 21:03:30 firewall kernel: ath: Failed to stop TX DMA, queues=0x004!
Nov  7 21:03:31 firewall kernel: ath: Failed to stop TX DMA, queues=0x004!
Nov  7 21:03:32 firewall kernel: ath: Failed to stop TX DMA, queues=0x004!
Nov  7 21:03:32 firewall kernel: ath: Failed to stop TX DMA, queues=0x004!
Nov  7 21:03:33 firewall kernel: ath: Failed to stop TX DMA, queues=0x004!
Nov  7 21:03:33 firewall kernel: ath: Failed to stop TX DMA, queues=0x004!
Nov  7 21:03:33 firewall hostapd: wlan0: STA 06:25:d3:6a:53:da IEEE 802.11: authenticated
Nov  7 21:03:34 firewall kernel: ath: Failed to stop TX DMA, queues=0x004!
Nov  7 21:03:34 firewall kernel: ath: Failed to stop TX DMA, queues=0x004!
Nov  7 21:03:34 firewall hostapd: wlan0: STA 06:25:d3:6a:53:da IEEE 802.11: authenticated
Nov  7 21:03:34 firewall hostapd: wlan0: STA 06:25:d3:6a:53:da IEEE 802.11: associated (aid 1)
Nov  7 21:03:35 firewall hostapd: wlan0: STA 06:25:d3:6a:53:da IEEE 802.11: associated (aid 1)
Nov  7 21:03:41 firewall hostapd: wlan0: STA 06:25:d3:6a:53:da IEEE 802.11: deauthenticated due to local deauth request
Nov  7 21:05:42 firewall hostapd: wlan0: STA 06:25:d3:6a:53:da IEEE 802.11: authenticated
Nov  7 21:05:42 firewall hostapd: wlan0: STA 06:25:d3:6a:53:da IEEE 802.11: associated (aid 1)

Again same kind of errors everybody else seems to see on ar71xx boards.

Petr


comment:5 Changed 6 years ago by nbd

please show me the output of cat /sys/kernel/debug/ieee80211/phy0/ath9k/wiphy

comment:6 Changed 6 years ago by Petr Titera <p.titera@…>

Here you are,

as they are now. Router was NOT restarted after I've send you the log yesterday. Problem is that it seems to me that this counters are not updated. Should I send you an other files?

root@OpenWrt:/sys# cat  /sys/kernel/debug/ieee80211/phy0/ath9k/wiphy
phy0 (chan=11  center-freq: 2462 MHz  channel-type: 2 (ht40-))
addr: 54:e6:fc:a0:08:86
addrmask: ff:ff:ff:ff:ff:ff
rfilt: 0x4497 UCAST MCAST BCAST BEACON PROBEREQ COMP_BAR PSPOLL

Reset causes:
  baseband hang: 0
  baseband watchdog: 0
  fatal hardware error interrupt: 0
  tx hardware error: 0
  tx path hang: 0
  pll rx hang: 0

root@OpenWrt:/sys/kernel/debug/ieee80211/phy0/ath9k# cat recv
           CRC ERR :      24802
   DECRYPT CRC ERR :          2
           PHY ERR :          2
           MIC ERR :          1
 PRE-DELIM CRC ERR :          1
POST-DELIM CRC ERR :          4
  DECRYPT BUSY ERR :          0
          UNDERRUN :          0
            TIMING :          0
            PARITY :          0
              RATE :          0
            LENGTH :          1
             RADAR :          0
           SERVICE :          0
               TOR :          0
       OFDM-TIMING :          0
OFDM-SIGNAL-PARITY :          0
         OFDM-RATE :          0
       OFDM-LENGTH :          0
   OFDM-POWER-DROP :          0
      OFDM-SERVICE :          0
      OFDM-RESTART :          0
   FALSE-RADAR-EXT :          0
        CCK-TIMING :          0
    CCK-HEADER-CRC :          0
          CCK-RATE :          0
       CCK-SERVICE :          0
       CCK-RESTART :          0
        CCK-LENGTH :          1
    CCK-POWER-DROP :          0
            HT-CRC :          0
         HT-LENGTH :          0
           HT-RATE :          0
       RX-Pkts-All :     386347
      RX-Bytes-All :   59285595

root@OpenWrt:/sys/kernel/debug/ieee80211/phy0/ath9k# cat xmit
Num-Tx-Queues: 10  tx-queues-setup: 0x10f poll-work-seen: 216223
                            BE         BK        VI        VO

MPDUs Queued:           349276          0         0      5850
MPDUs Completed:        349127          0         0      5418
MPDUs XRetried:            149          0         0       432
Aggregates:              28087          0         0         0
AMPDUs Queued HW:        41436          0         0         0
AMPDUs Queued SW:        60817          0         0         0
AMPDUs Completed:       100826          0         0         0
AMPDUs Retried:          16553          0         0         0
AMPDUs XRetried:          1201          0         0         0
FIFO Underrun:               0          0         0         0
TXOP Exceeded:               0          0         0         0
TXTIMER Expiry:              0          0         0         0
DESC CFG Error:              0          0         0         0
DATA Underrun:               0          0         0         0
DELIM Underrun:              0          0         0         0
TX-Pkts-All:            451303          0         0      5850
TX-Bytes-All:        495236387          0         0    794158
hw-put-tx-buf:            2023          0         0       786
hw-tx-start:            436194          0         0      5850
hw-tx-proc-desc:        433738          0         0      5529
txq-memory-address:   80c7a0c0   80c7a130  80c7a050  80c79fe0
axq-qnum:                    2          3         1         0
axq-depth:                   0          0         0         0
axq-ampdu_depth:             0          0         0         0
axq-stopped                  0          0         0         0
tx-in-progress               0          0         0         0
pending-frames               0          0         0         0
txq_headidx:                 0          0         0         0
txq_tailidx:                 0          0         0         0
axq_q empty:                   1          1         1         1
axq_acq empty:                 1          1         1         1
txq_fifo[0] empty:             1          1         1         1
txq_fifo[1] empty:             1          1         1         1
txq_fifo[2] empty:             1          1         1         1
txq_fifo[3] empty:             1          1         1         1
txq_fifo[4] empty:             1          1         1         1
txq_fifo[5] empty:             1          1         1         1
txq_fifo[6] empty:             1          1         1         1
txq_fifo[7] empty:             1          1         1         1

comment:7 Changed 6 years ago by Petr Titera <p.titera@…>

By the way. I've noticed that when I'm using my 802.11n cars I see DHCP request after each group key handshake:

Nov  8 19:40:32 firewall hostapd: wlan0: STA 06:25:d3:6a:53:da IEEE 802.11: authenticated
Nov  8 19:40:32 firewall hostapd: wlan0: STA 06:25:d3:6a:53:da IEEE 802.11: associated (aid 1)
Nov  8 19:40:32 firewall hostapd: wlan0: STA 06:25:d3:6a:53:da WPA: pairwise key handshake completed (WPA)
Nov  8 19:40:32 firewall hostapd: wlan0: STA 06:25:d3:6a:53:da WPA: group key handshake completed (WPA)
Nov  8 19:40:32 firewall dnsmasq-dhcp[1593]: DHCPREQUEST(br-lan) 192.168.3.124 06:25:d3:6a:53:da
Nov  8 19:40:32 firewall dnsmasq-dhcp[1593]: DHCPACK(br-lan) 192.168.3.124 06:25:d3:6a:53:da mikronevskij
Nov  8 19:41:19 firewall hostapd: wlan0: STA 06:25:d3:6a:53:da IEEE 802.11: authenticated
Nov  8 19:41:19 firewall hostapd: wlan0: STA 06:25:d3:6a:53:da IEEE 802.11: associated (aid 1)
Nov  8 19:41:19 firewall hostapd: wlan0: STA 06:25:d3:6a:53:da WPA: pairwise key handshake completed (WPA)
Nov  8 19:41:19 firewall hostapd: wlan0: STA 06:25:d3:6a:53:da WPA: group key handshake completed (WPA)
Nov  8 19:41:19 firewall dnsmasq-dhcp[1593]: DHCPREQUEST(br-lan) 192.168.3.124 06:25:d3:6a:53:da
Nov  8 19:41:19 firewall dnsmasq-dhcp[1593]: DHCPACK(br-lan) 192.168.3.124 06:25:d3:6a:53:da mikronevskij
Nov  8 19:41:54 firewall hostapd: wlan0: STA 06:25:d3:6a:53:da IEEE 802.11: authenticated
Nov  8 19:41:54 firewall hostapd: wlan0: STA 06:25:d3:6a:53:da IEEE 802.11: associated (aid 1)
Nov  8 19:41:54 firewall hostapd: wlan0: STA 06:25:d3:6a:53:da WPA: pairwise key handshake completed (WPA)
Nov  8 19:41:54 firewall hostapd: wlan0: STA 06:25:d3:6a:53:da WPA: group key handshake completed (WPA)
Nov  8 19:41:54 firewall dnsmasq-dhcp[1593]: DHCPREQUEST(br-lan) 192.168.3.124 06:25:d3:6a:53:da
Nov  8 19:41:54 firewall dnsmasq-dhcp[1593]: DHCPACK(br-lan) 192.168.3.124 06:25:d3:6a:53:da mikronevskij
Nov  8 19:41:59 firewall dnsmasq-dhcp[1593]: DHCPREQUEST(br-lan) 192.168.3.124 06:25:d3:6a:53:da
Nov  8 19:41:59 firewall dnsmasq-dhcp[1593]: DHCPACK(br-lan) 192.168.3.124 06:25:d3:6a:53:da mikronevskij

I did not notice this behaviour when using 802.11g card:

Nov  6 14:25:06 firewall hostapd: wlan0: STA 00:13:02:27:76:bf IEEE 802.11: authenticated
Nov  6 14:25:06 firewall hostapd: wlan0: STA 00:13:02:27:76:bf IEEE 802.11: associated (aid 1)
Nov  6 14:25:06 firewall hostapd: wlan0: STA 00:13:02:27:76:bf WPA: pairwise key handshake completed (WPA)
Nov  6 14:25:06 firewall hostapd: wlan0: STA 00:13:02:27:76:bf WPA: group key handshake completed (WPA)
Nov  6 14:34:17 firewall hostapd: wlan0: STA 00:13:02:27:76:bf WPA: group key handshake completed (WPA)
Nov  6 14:44:17 firewall hostapd: wlan0: STA 00:13:02:27:76:bf WPA: group key handshake completed (WPA)
Nov  6 14:54:17 firewall hostapd: wlan0: STA 00:13:02:27:76:bf WPA: group key handshake completed (WPA)
Nov  6 15:04:17 firewall hostapd: wlan0: STA 00:13:02:27:76:bf WPA: group key handshake completed (WPA)
Nov  6 15:14:17 firewall hostapd: wlan0: STA 00:13:02:27:76:bf WPA: group key handshake completed (WPA)
Nov  6 15:24:17 firewall hostapd: wlan0: STA 00:13:02:27:76:bf WPA: group key handshake completed (WPA)
Nov  6 15:34:17 firewall hostapd: wlan0: STA 00:13:02:27:76:bf WPA: group key handshake completed (WPA)
Nov  6 15:35:39 firewall hostapd: wlan0: STA 00:13:02:27:76:bf IEEE 802.11: authenticated
Nov  6 15:35:39 firewall hostapd: wlan0: STA 00:13:02:27:76:bf IEEE 802.11: associated (aid 1)
Nov  6 15:35:39 firewall hostapd: wlan0: STA 00:13:02:27:76:bf WPA: pairwise key handshake completed (WPA)
Nov  6 15:35:39 firewall hostapd: wlan0: STA 00:13:02:27:76:bf WPA: group key handshake completed (WPA)
Nov  6 15:44:17 firewall hostapd: wlan0: STA 00:13:02:27:76:bf WPA: group key handshake completed (WPA)
Nov  6 15:48:41 firewall hostapd: wlan0: STA 00:13:02:27:76:bf IEEE 802.11: authenticated
Nov  6 15:48:41 firewall hostapd: wlan0: STA 00:13:02:27:76:bf IEEE 802.11: associated (aid 1)
Nov  6 15:48:41 firewall hostapd: wlan0: STA 00:13:02:27:76:bf WPA: pairwise key handshake completed (WPA)
Nov  6 15:48:41 firewall hostapd: wlan0: STA 00:13:02:27:76:bf WPA: group key handshake completed (WPA)
Nov  6 15:54:17 firewall hostapd: wlan0: STA 00:13:02:27:76:bf WPA: group key handshake completed (WPA)
Nov  6 16:04:17 firewall hostapd: wlan0: STA 00:13:02:27:76:bf WPA: group key handshake completed (WPA)
Nov  6 16:14:17 firewall hostapd: wlan0: STA 00:13:02:27:76:bf WPA: group key handshake completed (WPA)
Nov  6 16:24:17 firewall hostapd: wlan0: STA 00:13:02:27:76:bf WPA: group key handshake completed (WPA)
Nov  6 16:34:17 firewall hostapd: wlan0: STA 00:13:02:27:76:bf WPA: group key handshake completed (WPA)
Nov  6 16:34:43 firewall dnsmasq-dhcp[1593]: DHCPREQUEST(br-lan) 192.168.3.125 00:13:02:27:76:bf
Nov  6 16:34:43 firewall dnsmasq-dhcp[1593]: DHCPACK(br-lan) 192.168.3.125 00:13:02:27:76:bf prospekt
Nov  6 16:34:43 firewall dnsmasq-dhcp[1593]: Ignoring domain Whitesoft.Local for DHCP host name prospekt
Nov  6 16:44:17 firewall hostapd: wlan0: STA 00:13:02:27:76:bf WPA: group key handshake completed (WPA)
Nov  6 16:54:17 firewall hostapd: wlan0: STA 00:13:02:27:76:bf WPA: group key handshake completed (WPA)
Nov  6 17:04:17 firewall hostapd: wlan0: STA 00:13:02:27:76:bf WPA: group key handshake completed (WPA)

By the way. Why is group key handshake done each +/- 10 seconds for 802.11n connections and each 10 minutes for 802.11g connections?

Petr

comment:8 Changed 6 years ago by Petr Titera <p.titera@…>

By the way. It's only my feeling, but stability seems to be greatly improved if I flood ping my client through wifi. Should I test newest trunk? I've noticed that there were some changes concerning powersaving.

Petr

comment:9 Changed 6 years ago by Petr Titera <p.titera@…>

So, unfortunately. Even on r29240 I see this:

Nov 19 11:33:42 firewall kernel: ath: Failed to stop TX DMA, queues=0x004!
Nov 19 11:33:43 firewall kernel: ath: Failed to stop TX DMA, queues=0x004!
Nov 19 11:33:43 firewall kernel: ath: Failed to stop TX DMA, queues=0x004!
Nov 19 11:33:43 firewall kernel: ath: Failed to stop TX DMA, queues=0x004!
Nov 19 11:33:44 firewall kernel: ath: Failed to stop TX DMA, queues=0x004!

Is this sign of an real problem? Or am I chasing some ghosts?

Networking feels better than before. Or at least I was not disconected after first 10 minutes of testing.

Petr

comment:10 Changed 6 years ago by nbd

  • Resolution set to fixed
  • Status changed from new to closed

these messages do not necessarily indicate a visible problem, but should nonetheless get fixed. they're tracked in a separate ticket though.

comment:11 Changed 4 years ago by jow

  • Milestone changed from Attitude Adjustment 12.09 to Barrier Breaker 14.07

Milestone Attitude Adjustment 12.09 deleted

Add Comment

Modify Ticket

Action
as closed .
The resolution will be deleted. Next status will be 'reopened'.
Author


E-mail address and user name can be saved in the Preferences.

 
Note: See TracTickets for help on using tickets.