I tried forwarding the logs to the hostapd list, but apparently the file is too large to be allowed by default. The original message with the attachments can be found here: https://bugs.debian.org/1003907#20 On Tue, 18 Jan 2022, at 11:50, Michael Biebl wrote: > I only saw this reply by accident, as I wasn't CCed. > But I assume this was directed at me. > > CCing the upstream mailing list will probably not work, since I'm not > subscribed. > > Anyway, here is the requested output. > I hope the results are properly anonymized as I didn't check the logs > and I don't want to change my WiFi password :-) > > The package upgrade starts at 11:35 > > I let wpasupplicant/NM try for another 3 mins before I stopped them. > > Regards, > Michael > > On Tue, 18 Jan 2022 09:09:14 +0100 "Andrej Shadura" <andrew@xxxxxxxxxx> > wrote: >> Adding the Debian bug to the loop. >> >> On Tue, 18 Jan 2022, at 03:59, Masashi Honma wrote: >> > To investigate more, could you enable wpa_supplicant debug option and >> > provide the log ? >> > >> > Procedure is like this. >> > >> > 1) Edit /etc/systemd/system/multi-user.target.wants/wpa_supplicant.service to >> > add -dddddddddd option like this. >> > >> > ExecStart=/sbin/wpa_supplicant -u -s -dddddddddd -O /run/wpa_supplicant >> > >> > 2) Reboot wpa_supplicant. >> > $ sudo systemctl daemon-reload >> > >> > 3) Enable NetworkManager logging >> > $ sudo nmcli general logging level DEBUG domains ALL >> > >> > 4) Get logs >> > $ journalctl -u NetworkManager -b >> > >> > If possible, could you provide Wi-Fi capture ? >> > >> > Regards, >> > Masashi Honma. >> >> -- >> Cheers, >> Andrej >> >> > > Attachments: > * wpasupplicant.txt > * NetworkManager.txt > * OpenPGP_signature -- Cheers, Andrej _______________________________________________ Hostap mailing list Hostap@xxxxxxxxxxxxxxxxxxx http://lists.infradead.org/mailman/listinfo/hostap