Modify

Opened 6 years ago

Closed 6 years ago

Last modified 4 years ago

#10998 closed defect (fixed)

hostapd in trunk doesn't work on startup, works fine after kill/restart

Reported by: roysjosh@… Owned by: developers
Priority: normal Milestone: Barrier Breaker 14.07
Component: packages Version: Trunk
Keywords: Cc:

Description

trunk/r30577, WRT160N v1.1 (bcm47xx)

# lspci
00:00.0 Class 0600: 14e4:4704
00:01.0 Class 0280: 14e4:4321

None of my 5 wireless devices are able to connect to the AP after it reboots. I have to logon thru a wired connection, kill hostapd, and start it by hand. After that wireless works quite well. I have log_level 0 in /etc/config/wireless which seems to be the highest level?

config 'wifi-device' 'radio0'
	option 'type' 'mac80211'
	option 'macaddr' '00:88:88:88:00:2a'
	option 'hwmode' '11g'
	option 'channel' '6'
	option 'txpower' '14'
	option 'country' 'US'
	option 'log_level' '0'

config 'wifi-iface'
	option 'device' 'radio0'
	option 'network' 'lan'
	option 'mode' 'ap'
	option 'ssid' 'Spartans'
	option 'encryption' 'psk2+ccmp'
	option 'key' ...

There is nothing (useful) in logread though, just a message every 10 minutes:

Feb 19 09:56:36 OpenWrt daemon.debug hostapd: wlan0: WPA rekeying GTK
Feb 19 09:56:36 OpenWrt kern.debug kernel: [33101.692000] b43-phy0 debug: Disabling hardware based encryption for keyidx: 1, mac: ff:ff:ff:ff:ff:ff
Feb 19 09:56:36 OpenWrt kern.debug kernel: [33101.704000] b43-phy0 debug: Using hardware based encryption for keyidx: 1, mac: ff:ff:ff:ff:ff:ff

A kill -1 can't fix wireless, it needs to be completely killed. Interestingly, this is printed in logread after I kill hostapd:

Feb 19 10:00:05 OpenWrt kern.info kernel: [33310.204000] device wlan0 left promiscuous mode
Feb 19 10:00:05 OpenWrt kern.info kernel: [33310.208000] br-lan: port 2(wlan0) entering forwarding state
Feb 19 10:00:05 OpenWrt kern.debug kernel: [33310.484000] b43-phy0 debug: Disabling hardware based encryption for keyidx: 1, mac: ff:ff:ff:ff:ff:ff
Feb 19 10:00:05 OpenWrt kern.debug kernel: [33310.492000] b43-phy0 debug: Removing Interface type 3
Feb 19 10:00:05 OpenWrt kern.debug kernel: [33310.504000] b43-phy0 debug: Wireless interface stopped
Feb 19 10:00:05 OpenWrt kern.debug kernel: [33310.508000] b43-phy0 debug: DMA-64 rx_ring: Used slots 9/64, Failed frames 0/0 = 0.0%, Average tries 0.00
Feb 19 10:00:05 OpenWrt kern.debug kernel: [33310.520000] b43-phy0 debug: DMA-64 tx_ring_AC_BK: Used slots 0/256, Failed frames 0/0 = 0.0%, Average tries 0.00
Feb 19 10:00:05 OpenWrt kern.debug kernel: [33310.540000] b43-phy0 debug: DMA-64 tx_ring_AC_BE: Used slots 0/256, Failed frames 0/0 = 0.0%, Average tries 0.00
Feb 19 10:00:05 OpenWrt kern.debug kernel: [33310.568000] b43-phy0 debug: DMA-64 tx_ring_AC_VI: Used slots 0/256, Failed frames 0/0 = 0.0%, Average tries 0.00
Feb 19 10:00:05 OpenWrt kern.debug kernel: [33310.592000] b43-phy0 debug: DMA-64 tx_ring_AC_VO: Used slots 12/256, Failed frames 32753/32760 = 99.9%, Average tries 3.99
Feb 19 10:00:05 OpenWrt kern.debug kernel: [33310.624000] b43-phy0 debug: DMA-64 tx_ring_mcast: Used slots 0/256, Failed frames 0/0 = 0.0%, Average tries 0.00

I can connect immediately after starting hostapd back up:

Feb 19 10:02:10 OpenWrt daemon.debug hostapd: wlan0: STA 12:34:56:78:90:ab IEEE 802.11: authentication OK (open system)
Feb 19 10:02:10 OpenWrt daemon.debug hostapd: wlan0: STA 12:34:56:78:90:ab MLME: MLME-AUTHENTICATE.indication(12:34:56:78:90:ab, OPEN_SYSTEM)
Feb 19 10:02:10 OpenWrt daemon.debug hostapd: wlan0: STA 12:34:56:78:90:ab MLME: MLME-DELETEKEYS.request(12:34:56:78:90:ab)
Feb 19 10:02:10 OpenWrt daemon.info hostapd: wlan0: STA 12:34:56:78:90:ab IEEE 802.11: authenticated
Feb 19 10:02:10 OpenWrt daemon.debug hostapd: wlan0: STA 12:34:56:78:90:ab IEEE 802.11: association OK (aid 1)
Feb 19 10:02:10 OpenWrt daemon.info hostapd: wlan0: STA 12:34:56:78:90:ab IEEE 802.11: associated (aid 1)
Feb 19 10:02:10 OpenWrt daemon.debug hostapd: wlan0: STA 12:34:56:78:90:ab MLME: MLME-ASSOCIATE.indication(12:34:56:78:90:ab)
Feb 19 10:02:10 OpenWrt daemon.debug hostapd: wlan0: STA 12:34:56:78:90:ab MLME: MLME-DELETEKEYS.request(12:34:56:78:90:ab)
Feb 19 10:02:10 OpenWrt daemon.debug hostapd: wlan0: STA 12:34:56:78:90:ab WPA: event 1 notification
Feb 19 10:02:10 OpenWrt daemon.debug hostapd: wlan0: STA 12:34:56:78:90:ab WPA: start authentication
Feb 19 10:02:10 OpenWrt daemon.debug hostapd: wlan0: STA 12:34:56:78:90:ab IEEE 802.1X: unauthorizing port
Feb 19 10:02:10 OpenWrt daemon.debug hostapd: wlan0: STA 12:34:56:78:90:ab WPA: sending 1/4 msg of 4-Way Handshake
Feb 19 10:02:10 OpenWrt kern.debug kernel: [33434.956000] b43-phy0 debug: Disabling hardware based encryption for keyidx: 1, mac: ff:ff:ff:ff:ff:ff
Feb 19 10:02:10 OpenWrt kern.debug kernel: [33434.964000] b43-phy0 debug: Using hardware based encryption for keyidx: 1, mac: ff:ff:ff:ff:ff:ff
Feb 19 10:02:10 OpenWrt daemon.debug hostapd: wlan0: STA 12:34:56:78:90:ab WPA: received EAPOL-Key frame (2/4 Pairwise)
Feb 19 10:02:10 OpenWrt daemon.debug hostapd: wlan0: STA 12:34:56:78:90:ab WPA: sending 3/4 msg of 4-Way Handshake
Feb 19 10:02:10 OpenWrt daemon.debug hostapd: wlan0: STA 12:34:56:78:90:ab WPA: received EAPOL-Key frame (4/4 Pairwise)
Feb 19 10:02:10 OpenWrt daemon.debug hostapd: wlan0: STA 12:34:56:78:90:ab IEEE 802.1X: authorizing port
Feb 19 10:02:10 OpenWrt daemon.info hostapd: wlan0: STA 12:34:56:78:90:ab WPA: pairwise key handshake completed (RSN)
Feb 19 10:02:10 OpenWrt kern.debug kernel: [33435.012000] b43-phy0 debug: Using hardware based encryption for keyidx: 0, mac: 12:34:56:78:90:ab
Feb 19 10:02:10 OpenWrt daemon.info dnsmasq-dhcp[2270]: DHCPREQUEST(br-lan) 192.168.7.225 12:34:56:78:90:ab 
Feb 19 10:02:10 OpenWrt daemon.info dnsmasq-dhcp[2270]: DHCPACK(br-lan) 192.168.7.225 12:34:56:78:90:ab laptop

Attachments (0)

Change History (3)

comment:1 Changed 6 years ago by c.bauer@…

Same here on a DIR-300 B1 with newest trunk from today "20.04.2012"
Chipset is a Ralink i think.
Wheres the Bug in there??
The fix from Ticket 11290 works but is not a solution i can live with!
If i restart Wifi from Luci-WebIf i need to kill and restart hostapd again,
in order to get a working wifi...

comment:2 Changed 6 years ago by nbd

  • Resolution set to fixed
  • Status changed from new to closed

should be fixed with the switch to netifd

comment:3 Changed 4 years ago by jow

  • Milestone changed from Attitude Adjustment 12.09 to Barrier Breaker 14.07

Milestone Attitude Adjustment 12.09 deleted

Add Comment

Modify Ticket

Action
as closed .
The resolution will be deleted. Next status will be 'reopened'.
Author


E-mail address and user name can be saved in the Preferences.

 
Note: See TracTickets for help on using tickets.