On Fri, Jul 21, 2023 at 8:13 PM Fabio Estevam <festevam@xxxxxxxxx> wrote: > > On Fri, Jul 21, 2023 at 11:11 AM Fabio Estevam <festevam@xxxxxxxxx> wrote: > > > > On Fri, Jul 21, 2023 at 9:37 AM Fabio Estevam <festevam@xxxxxxxxx> wrote: > > > > > Today I tried it again against top of head: > > > 96deacf5d71022b263a27113de52c1f13efdd6ec > > > and Wifi is functional on QCA9377! > > > > Sorry, the revert patch got applied by mistake and that's why it worked. > > > > I rebuilt a clean tree with no patch applied, hostap sha is > > 96deacf5d71022b263a27113de52c1f13efdd6ec. > > > > The error still happens: > > > > # wpa_supplicant -iwlan0 -c /etc/wpa.conf & > > # Successfully initialized wpa_supplicant > > wlan0: SME: Trying to authenticat[ 54.014745] wlan0: authenticate > > with xx:xx:xx:xx:xx:xx > > e with xx:xx:xx:xx:xx:xx (SSID='FABIOHOUSE' freq=2412 MHz) > > [ 54.026846] wlan0: 80 MHz not supported, disabling VHT > > [ 54.076840] wlan0: send auth to xx:xx:xx:xx:xx:xx (try 1/3) > > [ 54.090265] wlan0: authenticated > > wlan0: Trying to associate with xx:xx:xx:xx:xx:xx (SSID='FABIOHO[ > > 54.100333] wlan0: associate with xx:xx:xx:xx:xx:xx (try 1/3) > > USE' freq=2412 MHz) > > [ 54.120615] wlan0: RX AssocResp from xx:xx:xx:xx:xx:xx (capab=0x411 > > status=0 aid=4) > > [ 54.155201] wlan0: associated > > wlan0: Associated with xx:xx:xx:xx:xx:xx > > wlan0: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0 > > wlan0: Unknown event 37 > > Here is log of wpa_supplicant -dd. > > If you have any debug patch, I would be glad to test it. I will try and repro locally by mimicing ath11k in hwsim first before attempting to fix. > # wpa_supplicant -dd -iwlan0 -c /etc/wpa.conf & > # wpa_supplicant v2.11-devel > random: Trying to read entropy from /dev/random > Successfully initialized wpa_supplicant > Initializing interface 'wlan0' conf '/etc/wpa.conf' driver 'default' > ctrl_interface 'N/A' bridge 'N/A' > Configuration file '/etc/wpa.conf' -> '/etc/wpa.conf' > Reading configuration file '/etc/wpa.conf' > Line: 1 - start of a new network block > ssid - hexdump_ascii(len=10): > 46 41 42 49 4f 48 4f 55 53 45 FABIOHOUSE > PSK - hexdump(len=32): [REMOVED] > Priority group 0 > id=0 ssid='FABIOHOUSE' > nl80211: TDLS supported > nl80211: TDLS external setup > nl80211: Supported cipher 00-0f-ac:1 > nl80211: Supported cipher 00-0f-ac:5 > nl80211: Supported cipher 00-0f-ac:2 > nl80211: Supported cipher 00-0f-ac:4 > nl80211: Supported cipher 00-0f-ac:6 > nl80211: Supported cipher 00-0f-ac:13 > nl80211: Supported cipher 00-0f-ac:11 > nl80211: Supported cipher 00-0f-ac:12 > nl80211: Supports Probe Response offload in AP mode > nl80211: Using driver-based off-channel TX > nl80211: Driver-advertised extended capabilities (default) - > hexdump(len=8): 04 00 00 00 00 00 00 40 > nl80211: Driver-advertised extended capabilities mask (default) - > hexdump(len=8): 04 00 00 00 00 00 00 40 > nl80211: Use separate P2P group interface (driver advertised support) > nl80211: Enable multi-channel concurrent (driver advertised support) > nl80211: use P2P_DEVICE support > nl80211: key_mgmt=0x1fd0f enc=0xf0f auth=0x7 flags=0x4000530fb7bfbe0 > rrm_flags=0x30 probe_resp_offloads=0x7 max_stations=32 > max_remain_on_chan=5000 max_scan_ssids=16 > nl80211: interface wlan0 in phy phy0 > nl80211: Set mode ifindex 6 iftype 2 (STATION) > nl80211: Subscribe to mgmt frames with non-AP handle 0x23a53d0 > nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) > nl_handle=0x23a53d0 match=0801 multicast=0 > nl80211: kernel reports: Match already configured > nl80211: Register frame command failed (type=208): ret=-114 (Operation > already in progress) > nl80211: Register frame match - hexdump(len=2): 08 01 > nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) > nl_handle=0x23a53d0 match=040e multicast=0 > nl80211: kernel reports: Match already configured > nl80211: Register frame command failed (type=208): ret=-114 (Operation > already in progress) > nl80211: Register frame match - hexdump(len=2): 04 0e > nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) > nl_handle=0x23a53d0 match=06 multicast=0 > nl80211: kernel reports: Match already configured > nl80211: Register frame command failed (type=208): ret=-114 (Operation > already in progress) > nl80211: Register frame match - hexdump(len=1): 06 > nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) > nl_handle=0x23a53d0 match=0a07 multicast=0 > nl80211: kernel reports: Match already configured > nl80211: Register frame command failed (type=208): ret=-114 (Operation > already in progress) > nl80211: Register frame match - hexdump(len=2): 0a 07 > nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) > nl_handle=0x23a53d0 match=0a11 multicast=0 > nl80211: kernel reports: Match already configured > nl80211: Register frame command failed (type=208): ret=-114 (Operation > already in progress) > nl80211: Register frame match - hexdump(len=2): 0a 11 > nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) > nl_handle=0x23a53d0 match=1101 multicast=0 > nl80211: kernel reports: Match already configured > nl80211: Register frame command failed (type=208): ret=-114 (Operation > already in progress) > nl80211: Register frame match - hexdump(len=2): 11 01 > nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) > nl_handle=0x23a53d0 match=1102 multicast=0 > nl80211: kernel reports: Match already configured > nl80211: Register frame command failed (type=208): ret=-114 (Operation > already in progress) > nl80211: Register frame match - hexdump(len=2): 11 02 > nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) > nl_handle=0x23a53d0 match=0505 multicast=0 > nl80211: kernel reports: Match already configured > nl80211: Register frame command failed (type=208): ret=-114 (Operation > already in progress) > nl80211: Register frame match - hexdump(len=2): 05 05 > nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) > nl_handle=0x23a53d0 match=0500 multicast=0 > nl80211: kernel reports: Match already configured > nl80211: Register frame command failed (type=208): ret=-114 (Operation > already in progress) > nl80211: Register frame match - hexdump(len=2): 05 00 > nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) > nl_handle=0x23a53d0 match=1301 multicast=0 > nl80211: kernel reports: Match already configured > nl80211: Register frame command failed (type=208): ret=-114 (Operation > already in progress) > nl80211: Register frame match - hexdump(len=2): 13 01 > nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) > nl_handle=0x23a53d0 match=1305 multicast=0 > nl80211: kernel reports: Match already configured > nl80211: Register frame command failed (type=208): ret=-114 (Operation > already in progress) > nl80211: Register frame match - hexdump(len=2): 13 05 > nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) > nl_handle=0x23a53d0 match=7e506f9a1a multicast=0 > nl80211: kernel reports: Match already configured > nl80211: Register frame command failed (type=208): ret=-114 (Operation > already in progress) > nl80211: Register frame match - hexdump(len=5): 7e 50 6f 9a 1a > nl80211: Failed to register Action frame processing - ignore for now > rfkill: initial event: idx=0 type=1 op=0 soft=0 hard=0 > netlink: Operstate: ifindex=6 linkmode=1 (userspace-control), > operstate=5 (IF_OPER_DORMANT) > Add interface wlan0 to a new radio phy0 > nl80211: Regulatory information - country=00 > nl80211: 2402-2472 @ 40 MHz 20 mBm > nl80211: 2457-2482 @ 20 MHz 20 mBm (no IR) > nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR) > nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR) > nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR) > nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR) > nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR) > nl80211: 57240-63720 @ 2160 MHz 0 mBm > nl80211: Added 802.11b mode based on 802.11g information > nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 > 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[DISABLED] > nl80211: Mode IEEE 802.11a: 5180[NO_IR] 5200[NO_IR] 5220[NO_IR] > 5240[NO_IR] 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] > 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR] > 5540[NO_IR][RADAR] 5560[NO_IR][RADAR] 5580[NO_IR][RADAR] > 5600[NO_IR][RADAR] 5620[NO_IR][RADAR] 5640[NO_IR][RADAR] > 5660[NO_IR][RADAR] 5680[NO_IR][RADAR] 5700[NO_IR][RADAR] 5720[NO_IR] > 5745[NO_IR] 5765[NO_IR] 5785[NO_IR] 5805[NO_IR] 5825[NO_IR] > 5845[NO_IR] 5865[DISABLED] > nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 > 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[DISABLED] > wlan0: Own MAC address: 00:1f:7b:31:04:a0 > wpa_driver_nl80211_set_key: ifindex=6 (wlan0) alg=0 addr=(nil) > key_idx=0 set_tx=0 seq_len=0 key_len=0 key_flag=0x10 link_id=-1 > nl80211: DEL_KEY > broadcast key > wpa_driver_nl80211_set_key: ifindex=6 (wlan0) alg=0 addr=(nil) > key_idx=1 set_tx=0 seq_len=0 key_len=0 key_flag=0x10 link_id=-1 > nl80211: DEL_KEY > broadcast key > wpa_driver_nl80211_set_key: ifindex=6 (wlan0) alg=0 addr=(nil) > key_idx=2 set_tx=0 seq_len=0 key_len=0 key_flag=0x10 link_id=-1 > nl80211: DEL_KEY > broadcast key > wpa_driver_nl80211_set_key: ifindex=6 (wlan0) alg=0 addr=(nil) > key_idx=3 set_tx=0 seq_len=0 key_len=0 key_flag=0x10 link_id=-1 > nl80211: DEL_KEY > broadcast key > wpa_driver_nl80211_set_key: ifindex=6 (wlan0) alg=0 addr=(nil) > key_idx=4 set_tx=0 seq_len=0 key_len=0 key_flag=0x10 link_id=-1 > nl80211: DEL_KEY > broadcast key > wpa_driver_nl80211_set_key: ifindex=6 (wlan0) alg=0 addr=(nil) > key_idx=5 set_tx=0 seq_len=0 key_len=0 key_flag=0x10 link_id=-1 > nl80211: DEL_KEY > broadcast key > wlan0: RSN: flushing PMKID list in the driver > nl80211: Flush PMKIDs > wlan0: Setting scan request: 0.100000 sec > TDLS: TDLS operation supported by driver > TDLS: Driver uses external link setup > TDLS: Driver does not support TDLS channel switching > wlan0: Added interface wlan0 > wlan0: State: DISCONNECTED -> DISCONNECTED > nl80211: Set wlan0 operstate 0->0 (DORMANT) > netlink: Operstate: ifindex=6 linkmode=-1 (no change), operstate=5 > (IF_OPER_DORMANT) > nl80211: Skip set_supp_port(unauthorized) while not associated > random: Got 20/20 bytes from /dev/random > wlan0: State: DISCONNECTED -> SCANNING > wlan0: Starting AP scan for wildcard SSID > wlan0: Add radio work 'scan'@0x23a3fd8 > wlan0: First radio work item in the queue - schedule start immediately > wlan0: Starting radio work 'scan'@0x23a3fd8 after 0.000219 second wait > wlan0: nl80211: scan request > nl80211: Scan SSID > nl80211: Scan co-located APs on 6 GHz > nl80211: Scan extra IEs - hexdump(len=13): 7f 0b 04 00 00 00 00 00 40 > 40 00 00 20 > Scan requested (ret=0) - scan timeout 10 seconds > nl80211: Event message available > nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlan0 > wlan0: nl80211: Scan trigger > wlan0: Event SCAN_STARTED (47) received > wlan0: Own scan request started a scan in 0.000675 seconds > nl80211: Event message available > nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlan0 > wlan0: nl80211: New scan results available > nl80211: Scan probed for SSID '' > nl[ 591.384490] wlan0: authenticate with xx:xx:xx:xx:xx:xx > 80211: Scan included frequencies:[ 591.392674] wlan0: 80 MHz not > supported, disabling VHT > 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 5180 > 5200 5220 5240 5260 5280 5300 5320 5500 5520 5540 5560 5580 5600 5620 > 5640 5660 5680 5700 5720 5745 5765 5785 5805 5825 5845 > wlan0: Event SCAN_RESULTS (3) received > wlan0: Scan completed in 4.858982 seconds > nl80211: Received scan results (2 BSSes) > wlan0: BSS: Start scan result update 1 > wlan0: BSS: Add new id 0 BSSID xx:xx:xx:xx:xx:xx SSID 'FABIOHOUSE' freq 2412 > wlan0: BSS: Add new id 1 BS[ 591.439095] wlan0: send auth to > xx:xx:xx:xx:xx:xx (try 1/3) > SID 74:3a:ef:af:a7:6b SSID 'FABIOHOUSE_5G' freq 5660 > BSS: last_scan_res_used=2/32 > wlan0: New sc[ 591.452923] wlan0: authenticated > an results available (own=1 ext=0) > wlan0: Radio work 'scan'@0x23a3fd8 done in 4.875944 seconds > wlan0: radio_work_free('scan'@0x23a3fd8): num_active_works --> 0 > wlan0: Selecting BSS from priority group 0 > wlan0: 0: xx:xx:xx:xx:xx:xx ssid='FABIOHOUSE' wpa_ie_len=0 > rsn_ie_len=20 caps=0x411 level=-70 freq=2412 wps > wlan0: selected based on RSN IE > wlan0: selected BSS xx:xx:xx:xx:xx:xx ssid='FABIOHOUSE' > wlan0: Considering connect request: reassociate: 0 selected: > xx:xx:xx:xx:xx:xx bssid: 00:00:00:00:00:00 pending: > 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x23a2ac8 > current_ssid=(nil) > wlan0: Request association with xx:xx:xx:xx:xx:xx > TDLS: TDLS is allowed in the target BSS > TDLS: TDLS channel switch allowed in the target BSS > wlan0: No ongoing scan/p2p-scan found to abort > wlan0: Add radio work 'sme-connect'@0x23ad6f8 > wlan0: First radio work item in the queue - schedule start immediately > wlan0: Starting radio work 'sme-connect'@0x23ad6f8 after 0.000244 second wait > wlan0: WPA: clearing own WPA/RSN IE > wlan0: RSN: clearing own RSNXE > wlan0: Automatic auth_alg selection: 0x1 > wlan0: RSN: using IEEE 802.11i/D9.0 > wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2 > wlan0: WPA: Selected mgmt group cipher 32 > wlan0: WPA: clearing AP WPA IE > WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 > 0f ac 04 01 00 00 0f ac 02 0c 00 > wlan0: WPA: clearing AP RSNXE > wlan0: WPA: AP group 0x10 network profile group 0x18; available group 0x10 > wlan0: WPA: using GTK CCMP > wlan0: WPA: AP pairwise 0x10 network profile pairwise 0x18; available > pairwise 0x10 > wlan0: WPA: using PTK CCMP > wlan0: WPA: AP key_mgmt 0x2 network profile key_mgmt 0x3; available key_mgmt 0x2 > wlan0: WPA: using KEY_MGMT WPA-PSK > wlan0: WPA: AP mgmt_group_cipher 0x20 network profile > mgmt_group_cipher 0x0; available mgmt_group_cipher 0x0 > wlan0: WPA: not using MGMT group cipher > WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 > 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 > RSN: Set own RSNXE default - hexdump(len=0): > PSK (set in config) - hexdump(len=32): [REMOVED] > WPA: Set PMK based on external data - hexdump(len=32): [REMOVED] > RRM: Determining whether RRM can be used - device support: 0x30 > RRM: No RRM in network > Added supported operating classes IE - hexdump(len=22): 3b 14 51 51 53 > 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f 80 81 82 > wlan0: Cancelling scan request > wlan0: SME: Trying to authenticate with xx:xx:xx:xx:xx:xx > (SSID='FABIOHOUSE' freq=2412 MHz) > wlan0: State: SCANNING -> AUTHENTICATING > nl80211: Authenticate (ifindex=6) > * bssid=xx:xx:xx:xx:xx:xx > * freq=2412 > * SSID=FABIOHOUSE > * IEs - hexdump(len=0): [NULL] > * Auth Type 0 > nl80211: Authentication request send successfully > RTM_NEWLINK: ifi_index=6 ifname=wlan0 wext ifi_family=0 ifi_flags=0x1003 ([UP]) > nl80211: Event message available > nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlan0 > nl80211: New station xx:xx:xx:xx:xx:xx > nl80211: Event message available > nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlan0 > nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on > wlan0(00:1f:7b:31:04:a0) A1=00:1f:7b:31:04:a0 A2=xx:xx:xx:xx:xx:xx on > link_id=-1 > nl80211: MLME event frame - hexdump(len=41): b0 00 3a 01 00 1f 7b 31 > 04 a0 74 3a ef af a7 6a 74 3a ef af a7 6a 40 2d 00 00 02 00 00 00 dd > 09 00 10 18 02 03 00 1c 00 00 > nl80211: Authenticate event > wlan0: Event AUTH (10) received > wlan0: SME: Authentication response: peer=xx:xx:xx:xx:xx:xx > auth_type=0 auth_transaction=2 status_code=0 > SME: Authentication response IEs - hexdump(len=11): dd 09 00 10 18 02 > 03 00 1c 00 00 > SME: Association Request IEs - hexdump(len=57): 30 14 01 00 00 0f ac > 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 7f 0b 04 00 00 00 00 00 > 40 40 00 00 20 3b 14 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e > 7f 80 81 82 > wlan0: Trying to associate with xx:xx:xx:xx:xx:xx (SSID='FABIOHO[ > 591.799664] wlan0: 80 MHz not supported, disabling VHT > USE' freq=2412 MHz) > wlan0: State: AUTHENTICATING -> ASSOCIATING > nl80211: Set wlan0 operstate 0->0 (DORMANT) > netlink: Operstate: ifindex=6 linkmode=-1 (no change), operstate=5 > (IF_OPER_DORMANT) > nl80211: Skip set_supp_port(unauthorized) while not associated > WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 > 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 > wlan0: RSN: clearing own RSNXE > nl80211: Associate (ifindex=6) > * bssid=xx:xx:xx:xx:xx:xx > * freq=2412 > * SSID=FABIOHOUSE > [ 591.848580] wlan0: associate with xx:xx:xx:xx:xx:xx (try 1/3) > * IEs - hexdump(len=57): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 > 01 00 00 0f ac 02 0c 00 7f 0b 04 00 00 00 00 00 40 40 00 00 20 3b 14 > 51 51 53 54 73 74 75 [ 591.867519] wlan0: RX AssocResp from > xx:xx:xx:xx:xx:xx (capab=0x411 status=0 aid=4) > 76 77 78 79 7a 7b 7c 7d 7e 7f 80 81 82 > * WPA Versions 0x2 > * pairwise=0xfac04 > * group=0xfac04 > * akm[0]=0xfac02 > nl80211: Association request send successfully > nl80211: Event message available > nl80211: Drv Event 20 (NL80211_CMD_DEL_STATIO[ 591.897633] wlan0: associated > N) received for wlan0 > nl80211: Delete station xx:xx:xx:xx:xx:xx This is peculiar, not sure why DEL_STA is being triggered. > nl80211: Event message available > nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlan0 > nl80211: New station xx:xx:xx:xx:xx:xx > nl80211: Event message available > nl80211: BSS Event 129 (NL80211_CMD_CONTROL_PORT_FRAME) received for wlan0 > wlan0: Event EAPOL_RX (23) received > wlan0: RX EAPOL from xx:xx:xx:xx:xx:xx (encrypted=0) This is always received before the CMD_ASSOCIATE, though WPA supplicant seems to handle it, but I suspect some kind of race here. > RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 > 00 00 00 9e 4b 0f 0b 7d 47 f7 f5 16 b6 07 30 2e ac 5b f6 b2 a0 87 7d > fb 94 c1 96 d4 07 b2 71 41 a6 a9 17 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 fe > e1 4a 3c f8 09 e0 2e 78 f3 58 1c 07 73 b3 0a > wlan0: Not associated - Delay processing of received EAPOL frame > (state=ASSOCIATING connected_addr=00:00:00:00:00:00) > RTM_NEWLINK: ifi_index=6 ifname=wlan0 operstate=5 linkmode=1 > ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) > nl80211: Event message available > nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlan0 > nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on > wlan0(00:1f:7b:31:04:a0) A1=00:1f:7b:31:04:a0 A2=xx:xx:xx:xx:xx:xx on > link_id=-1 > nl80211: MLME event frame - hexdump(len=171): 10 00 3a 01 00 1f 7b 31 > 04 a0 74 3a ef af a7 6a 74 3a ef af a7 6a 90 2d 11 04 00 00 04 c0 01 > 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a ad 01 17 ff 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 01 > 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 > 04 00 08 00 00 00 00 40 dd 18 00 50 f2 04 10 4a 00 01 10 10 3b 00 01 > 03 10 49 00 06 00 37 2a 00 01 20 dd 09 00 10 18 02 03 00 1c 00 00 dd > 18 00 50 f2 02 01 01 88 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 > 2f 00 > nl80211: Associate event > wlan0: CTRL-EVENT-DISCONNECTED bssid=xx:xx:xx:xx:xx:xx reason=3 > locally_generated=1 > BSSID xx:xx:xx:xx:xx:xx ignore list count incremented to 5, ignoring > for 600 seconds > wlan0: CTRL-EVENT-DSCP-POLICY clear_all > wlan0: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0 > nl80211: Associated on 2412 MHz > nl80211: Associated with xx:xx:xx:xx:xx:xx > nl80211: Set drv->ssid based on scan res info to 'FABIOHOUSE' > wlan0: Event ASSOC (0) received > wlan0: Association info event > req_ies - hexdump(len=122): 00 0a 46 41 42 49 4f 48 4f 55 53 45 01 08 > 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c 30 14 01 00 00 0f ac 04 01 > 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 2d 1a 6f 19 1b ff 00 00 00 00 > 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 7f 0b 04 00 00 > 00 00 00 40 40 00 00 20 3b 14 51 51 53 54 73 74 75 76 77 78 79 7a 7b > 7c 7d 7e 7f 80 81 82 dd 07 00 50 f2 02 00 01 00 > resp_ies - hexdump(len=141): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 > 18 60 2d 1a ad 01 17 ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 3d 16 01 00 04 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 7f 08 04 00 08 00 00 00 00 40 dd 18 00 50 f2 > 04 10 4a 00 01 10 10 3b 00 01 03 10 49 00 06 00 37 2a 00 01 20 dd 09 > 00 10 18 02 03 00 1c 00 00 dd 18 00 50 f2 02 01 01 88 00 03 a4 00 00 > 27 a4 00 00 42 43 5e 00 62 32 2f 00 > wlan0: freq=2412 MHz > WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 > 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 > wlan0: RSN: clearing own RSNXE > wlan0: State: ASSOCIATING -> ASSOCIATED > nl80211: Set wlan0 operstate 0->0 (DORMANT) > netlink: Operstate: ifindex=6 linkmode=-1 (no change), operstate=5 > (IF_OPER_DORMANT) > nl80211: Set supplicant port unauthorized for xx:xx:xx:xx:xx:xx > wlan0: Associated to a new BSS: BSSID=xx:xx:xx:xx:xx:xx > wlan0: Associated with xx:xx:xx:xx:xx:xx > wlan0: WPA: Association event - clear replay counter > wlan0: WPA: Clear old PTK > TDLS: Remove peers on association > wlan0: Setting authentication timeout: 10 sec 0 usec > wlan0: Cancelling scan request > wlan0: Process pending EAPOL frame that was received just before > association notification > wlan0: RX EAPOL from xx:xx:xx:xx:xx:xx (encrypted=0) > RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 > 00 00 00 9e 4b 0f 0b 7d 47 f7 f5 16 b6 07 30 2e ac 5b f6 b2 a0 87 7d > fb 94 c1 96 d4 07 b2 71 41 a6 a9 17 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 fe > e1 4a 3c f8 09 e0 2e 78 f3 58 1c 07 73 b3 0a > wlan0: Setting authentication timeout: 10 sec 0 usec > wlan0: IEEE 802.1X RX: version=2 type=3 length=117 > WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 > 00 00 00 00 00 00 9e 4b 0f 0b 7d 47 f7 f5 16 b6 07 30 2e ac 5b f6 b2 > a0 87 7d fb 94 c1 96 d4 07 b2 71 41 a6 a9 17 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f > ac 04 fe e1 4a 3c f8 09 e0 2e 78 f3 58 1c 07 73 b3 0a > wlan0: EAPOL-Key type=2 > wlan0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) > wlan0: key_length=16 key_data_length=22 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_nonce - hexdump(len=32): 9e 4b 0f 0b 7d 47 f7 f5 16 b6 07 30 2e > ac 5b f6 b2 a0 87 7d fb 94 c1 96 d4 07 b2 71 41 a6 a9 17 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > wlan0: WPA: RX message 1 of 4-Way Handshake from xx:xx:xx:xx:xx:xx (ver=2) > RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 fe e1 4a 3c > f8 09 e0 2e 78 f3 58 1c 07 73 b3 0a > WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 fe e1 4a > 3c f8 09 e0 2e 78 f3 58 1c 07 73 b3 0a > RSN: PMKID from Authenticator - hexdump(len=16): fe e1 4a 3c f8 09 e0 > 2e 78 f3 58 1c 07 73 b3 0a > wlan0: RSN: no matching PMKID found > wlan0: State: ASSOCIATED -> 4WAY_HANDSHAKE > Get randomness: len=32 entropy=3 > WPA: Renewed SNonce - hexdump(len=32): 06 d0 6b ac 57 7d 60 94 c0 bc > b8 d8 26 20 6a 1f 26 3e 0a 42 5f c5 8a bb b5 14 4a d1 8a 61 9b 5c > WPA: PTK derivation using PRF(SHA1) > WPA: PTK derivation - A1=00:1f:7b:31:04:a0 A2=xx:xx:xx:xx:xx:xx > WPA: Nonce1 - hexdump(len=32): 06 d0 6b ac 57 7d 60 94 c0 bc b8 d8 26 > 20 6a 1f 26 3e 0a 42 5f c5 8a bb b5 14 4a d1 8a 61 9b 5c > WPA: Nonce2 - hexdump(len=32): 9e 4b 0f 0b 7d 47 f7 f5 16 b6 07 30 2e > ac 5b f6 b2 a0 87 7d fb 94 c1 96 d4 07 b2 71 41 a6 a9 17 > WPA: PMK - hexdump(len=32): [REMOVED] > WPA: PTK - hexdump(len=48): [REMOVED] > WPA: KCK - hexdump(len=16): [REMOVED] > WPA: KEK - hexdump(len=16): [REMOVED] > WPA: TK - hexdump(len=16): [REMOVED] > WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 > 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 > WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 00 > wlan0: WPA: Sending EAPOL-Key 2/4 > WPA: Send EAPOL-Key frame to xx:xx:xx:xx:xx:xx ver=2 mic_len=16 key_mgmt=0x2 > WPA: EAPOL-Key MIC using HMAC-SHA1 > WPA: KCK - hexdump(len=16): [REMOVED] > WPA: Derived Key MIC - hexdump(len=16): ac 73 0a 8b 1b 3c 82 ac 95 40 > 84 fb 0b 8e 8c 2e > WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 > 00 00 00 00 00 00 06 d0 6b ac 57 7d 60 94 c0 bc b8 d8 26 20 6a 1f 26 > 3e 0a 42 5f c5 8a bb b5 14 4a d1 8a 61 9b 5c 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > 00 ac 73 0a 8b 1b 3c 82 ac 95 40 84 fb 0b 8e 8c 2e 00 16 30 14 01 00 > 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 > nl80211: Send over control port dest=xx:xx:xx:xx:xx:xx proto=0x888e > len=121 no_encrypt=1 > wlan0: Unknown event 37 > nl80211: tx_control_port cookie=0x19 > WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0 > WMM AC: U-APSD queues=0x0 > WMM AC: Valid WMM association, WMM AC is enabled > wlan0: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0 > RTM_NEWLINK: ifi_index=6 ifname=wlan0 wext ifi_family=0 > ifi_flags=0x11003 ([UP][LOWER_UP]) > RTM_NEWLINK: ifi_index=6 ifname=wlan0 wext ifi_family=0 > ifi_flags=0x11003 ([UP][LOWER_UP]) > RTM_NEWLINK: ifi_index=6 ifname=wlan0 wext ifi_family=0 > ifi_flags=0x11003 ([UP][LOWER_UP]) > nl80211: Event message available > nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlan0 > nl80211: Ignore connect event (cmd=46) when using userspace SME > nl80211: Event message available > nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlan0 > wlan0: nl80211: Scan trigger > wlan0: Event SCAN_STARTED (47) received > wlan0: External program started a scan > nl80211: Event message available > nl80211: Drv Event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS) > received for wlan0 > nl80211: Control port TX status (ack=1), cookie=25 > wlan0: Event EAPOL_TX_STATUS (37) received > wlan0: Unknown event 37 > nl80211: Event message available > nl80211: BSS Event 129 (NL80211_CMD_CONTROL_PORT_FRAME) received for wlan0 > wlan0: Event EAPOL_RX (23) received > wlan0: RX EAPOL from xx:xx:xx:xx:xx:xx (encrypted=0) > RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 > 00 00 01 9e 4b 0f 0b 7d 47 f7 f5 16 b6 07 30 2e ac 5b f6 b2 a0 87 7d > fb 94 c1 96 d4 07 b2 71 41 a6 a9 17 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 fe > e1 4a 3c f8 09 e0 2e 78 f3 58 1c 07 73 b3 0a > wlan0: IEEE 802.1X RX: version=2 type=3 length=117 > WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 > 00 00 00 00 00 01 9e 4b 0f 0b 7d 47 f7 f5 16 b6 07 30 2e ac 5b f6 b2 > a0 87 7d fb 94 c1 96 d4 07 b2 71 41 a6 a9 17 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f > ac 04 fe e1 4a 3c f8 09 e0 2e 78 f3 58 1c 07 73 b3 0a > wlan0: EAPOL-Key type=2 > wlan0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) > wlan0: key_length=16 key_data_length=22 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 > key_nonce - hexdump(len=32): 9e 4b 0f 0b 7d 47 f7 f5 16 b6 07 30 2e > ac 5b f6 b2 a0 87 7d fb 94 c1 96 d4 07 b2 71 41 a6 a9 17 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > wlan0: WPA: RX message 1 of 4-Way Handshake from xx:xx:xx:xx:xx:xx (ver=2) > RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 fe e1 4a 3c > f8 09 e0 2e 78 f3 58 1c 07 73 b3 0a > WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 fe e1 4a > 3c f8 09 e0 2e 78 f3 58 1c 07 73 b3 0a > RSN: PMKID from Authenticator - hexdump(len=16): fe e1 4a 3c f8 09 e0 > 2e 78 f3 58 1c 07 73 b3 0a > wlan0: RSN: no matching PMKID found > wlan0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE > WPA: PTK derivation using PRF(SHA1) > WPA: PTK derivation - A1=00:1f:7b:31:04:a0 A2=xx:xx:xx:xx:xx:xx > WPA: Nonce1 - hexdump(len=32): 06 d0 6b ac 57 7d 60 94 c0 bc b8 d8 26 > 20 6a 1f 26 3e 0a 42 5f c5 8a bb b5 14 4a d1 8a 61 9b 5c > WPA: Nonce2 - hexdump(len=32): 9e 4b 0f 0b 7d 47 f7 f5 16 b6 07 30 2e > ac 5b f6 b2 a0 87 7d fb 94 c1 96 d4 07 b2 71 41 a6 a9 17 > WPA: PMK - hexdump(len=32): [REMOVED] > WPA: PTK - hexdump(len=48): [REMOVED] > WPA: KCK - hexdump(len=16): [REMOVED] > WPA: KEK - hexdump(len=16): [REMOVED] > WPA: TK - hexdump(len=16): [REMOVED] > WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 > 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 > WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01 > wlan0: WPA: Sending EAPOL-Key 2/4 > WPA: Send EAPOL-Key frame to xx:xx:xx:xx:xx:xx ver=2 mic_len=16 key_mgmt=0x2 > WPA: EAPOL-Key MIC using HMAC-SHA1 > WPA: KCK - hexdump(len=16): [REMOVED] > WPA: Derived Key MIC - hexdump(len=16): 9e ef 58 f5 9a 29 2e 81 a7 d8 > 86 08 3e f5 8d c8 > WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 > 00 00 00 00 00 01 06 d0 6b ac 57 7d 60 94 c0 bc b8 d8 26 20 6a 1f 26 > 3e 0a 42 5f c5 8a bb b5 14 4a d1 8a 61 9b 5c 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > 00 9e ef 58 f5 9a 29 2e 81 a7 d8 86 08 3e f5 8d c8 00 16 30 14 01 00 > 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 > nl80211: Send over control port dest=xx:xx:xx:xx:xx:xx proto=0x888e > len=121 no_encrypt=1 > wlan0: Unknown event 37 > nl80211: tx_control_port cookie=0x1a > nl80211: Event message available > nl80211: Drv Event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS) > received for wlan0 > nl80211: Control port TX status (ack=1), cookie=26 > wlan0: Event EAPOL_TX_STATUS (37) received > wlan0: Unknown event 37 > nl80211: Event message available > nl80211: BSS Event 129 (NL80211_CMD_CONTROL_PORT_FRAME) received for wlan0 > wlan0: Event EAPOL_RX (23) received > wlan0: RX EAPOL from xx:xx:xx:xx:xx:xx (encrypted=0) > RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 > 00 00 02 9e 4b 0f 0b 7d 47 f7 f5 16 b6 07 30 2e ac 5b f6 b2 a0 87 7d > fb 94 c1 96 d4 07 b2 71 41 a6 a9 17 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 fe > e1 4a 3c f8 09 e0 2e 78 f3 58 1c 07 73 b3 0a > wlan0: IEEE 802.1X RX: version=2 type=3 length=117 > WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 > 00 00 00 00 00 02 9e 4b 0f 0b 7d 47 f7 f5 16 b6 07 30 2e ac 5b f6 b2 > a0 87 7d fb 94 c1 96 d4 07 b2 71 41 a6 a9 17 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f > ac 04 fe e1 4a 3c f8 09 e0 2e 78 f3 58 1c 07 73 b3 0a > wlan0: EAPOL-Key type=2 > wlan0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) > wlan0: key_length=16 key_data_length=22 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 > key_nonce - hexdump(len=32): 9e 4b 0f 0b 7d 47 f7 f5 16 b6 07 30 2e > ac 5b f6 b2 a0 87 7d fb 94 c1 96 d4 07 b2 71 41 a6 a9 17 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > wlan0: WPA: RX message 1 of 4-Way Handshake from xx:xx:xx:xx:xx:xx (ver=2) > RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 fe e1 4a 3c > f8 09 e0 2e 78 f3 58 1c 07 73 b3 0a > WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 fe e1 4a > 3c f8 09 e0 2e 78 f3 58 1c 07 73 b3 0a > RSN: PMKID from Authenticator - hexdump(len=16): fe e1 4a 3c f8 09 e0 > 2e 78 f3 58 1c 07 73 b3 0a > wlan0: RSN: no matching PMKID found > wlan0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE > WPA: PTK derivation using PRF(SHA1) > WPA: PTK derivation - A1=00:1f:7b:31:04:a0 A2=xx:xx:xx:xx:xx:xx > WPA: Nonce1 - hexdump(len=32): 06 d0 6b ac 57 7d 60 94 c0 bc b8 d8 26 > 20 6a 1f 26 3e 0a 42 5f c5 8a bb b5 14 4a d1 8a 61 9b 5c > WPA: Nonce2 - hexdump(len=32): 9e 4b 0f 0b 7d 47 f7 f5 16 b6 07 30 2e > ac 5b f6 b2 a0 87 7d fb 94 c1 96 d4 07 b2 71 41 a6 a9 17 > WPA: PMK - hexdump(len=32): [REMOVED] > WPA: PTK - hexdump(len=48): [REMOVED] > WPA: KCK - hexdump(len=16): [REMOVED] > WPA: KEK - hexdump(len=16): [REMOVED] > WPA: TK - hexdump(len=16): [REMOVED] > WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 > 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 > WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02 > wlan0: WPA: Sending EAPOL-Key 2/4 > WPA: Send EAPOL-Key frame to xx:xx:xx:xx:xx:xx ver=2 mic_len=16 key_mgmt=0x2 > WPA: EAPOL-Key MIC using HMAC-SHA1 > WPA: KCK - hexdump(len=16): [REMOVED] > WPA: Derived Key MIC - hexdump(len=16): 3a f3 f5 5e b9 b9 6e b7 c4 a3 > 73 12 bf b0 3b 4f > WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 > 00 00 00 00 00 02 06 d0 6b ac 57 7d 60 94 c0 bc b8 d8 26 20 6a 1f 26 > 3e 0a 42 5f c5 8a bb b5 14 4a d1 8a 61 9b 5c 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > 00 3a f3 f5 5e b9 b9 6e b7 c4 a3 73 12 bf b0 3b 4f 00 16 30 14 01 00 > 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 > nl80211: Send over control port dest=xx:xx:xx:xx:xx:xx proto=0x888e > len=121 no_encrypt=1 > wlan0: Unknown event 37 > nl80211: tx_control_port cookie=0x1b > nl80211: Event message available > nl80211: Drv Event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS) > received for wlan0 > nl80211: Control port TX status (ack=1), cookie=27 > wlan0: Event EAPOL_TX_STATUS (37) received > wlan0: Unknown event 37 > nl80211: Event message available > nl80211: BSS Event 129 (NL80211_CMD_CONTROL_PORT_FRAME) received for wlan0 > wlan0: Event EAPOL_RX (23) received > wlan0: RX EAPOL from xx:xx:xx:xx:xx:xx (encrypted=0) > RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 > 00 00 03 9e 4b 0f 0b 7d 47 f7 f5 16 b6 07 30 2e ac 5b f6 b2 a0 87 7d > fb 94 c1 96 d4 07 b2 71 41 a6 a9 17 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 fe > e1 4a 3c f8 09 e0 2e 78 f3 58 1c 07 73 b3 0a > wlan0: IEEE 802.1X RX: version=2 type=3 length=117 > WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 > 00 00 00 00 00 03 9e 4b 0f 0b 7d 47 f7 f5 16 b6 07 30 2e ac 5b f6 b2 > a0 87 7d fb 94 c1 96 d4 07 b2 71 41 a6 a9 17 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f > ac 04 fe e1 4a 3c f8 09 e0 2e 78 f3 58 1c 07 73 b3 0a > wlan0: EAPOL-Key type=2 > wlan0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) > wlan0: key_length=16 key_data_length=22 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03 > key_nonce - hexdump(len=32): 9e 4b 0f 0b 7d 47 f7 f5 16 b6 07 30 2e > ac 5b f6 b2 a0 87 7d fb 94 c1 96 d4 07 b2 71 41 a6 a9 17 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > wlan0: WPA: RX message 1 of 4-Way Handshake from xx:xx:xx:xx:xx:xx (ver=2) > RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 fe e1 4a 3c > f8 09 e0 2e 78 f3 58 1c 07 73 b3 0a > WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 fe e1 4a > 3c f8 09 e0 2e 78 f3 58 1c 07 73 b3 0a > RSN: PMKID from Authenticator - hexdump(len=16): fe e1 4a 3c f8 09 e0 > 2e 78 f3 58 1c 07 73 b3 0a > wlan0: RSN: no matching PMKID found > wlan0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE > WPA: PTK derivation using PRF(SHA1) > WPA: PTK derivation - A1=00:1f:7b:31:04:a0 A2=xx:xx:xx:xx:xx:xx > WPA: Nonce1 - hexdump(len=32): 06 d0 6b ac 57 7d 60 94 c0 bc b8 d8 26 > 20 6a 1f 26 3e 0a 42 5f c5 8a bb b5 14 4a d1 8a 61 9b 5c > WPA: Nonce2 - hexdump(len=32): 9e 4b 0f 0b 7d 47 f7 f5 16 b6 07 30 2e > ac 5b f6 b2 a0 87 7d fb 94 c1 96 d4 07 b2 71 41 a6 a9 17 > WPA: PMK - hexdump(len=32): [REMOVED] > WPA: PTK - hexdump(len=48): [REMOVED] > WPA: KCK - hexdump(len=16): [REMOVED] > WPA: KEK - hexdump(len=16): [REMOVED] > WPA: TK - hexdump(len=16): [REMOVED] > WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 > 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 > WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 03 > wlan0: WPA: Sending EAPOL-Key 2/4 > WPA: Send EAPOL-Key frame to xx:xx:xx:xx:xx:xx ver=2 mic_len=16 key_mgmt=0x2 > WPA: EAPOL-Key MIC using HMAC-SHA1 > WPA: KCK - hexdump(len=16): [REMOVED] > WPA: Derived Key MIC - hexdump(len=16): 3c 9a b2 5e cf 8b 18 2f b0 4a > 57 bc 45 e1 db 79 > WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 > 00 00 00 00 00 03 06 d0 6b ac 57 7d 60 94 c0 bc b8 d8 26 20 6a 1f 26 > 3e 0a 42 5f c5 8a bb b5 14 4a d1 8a 61 9b 5c 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > 00 3c 9a b2 5e cf 8b 18 2f b0 4a 57 bc 45 e1 db 79 00 16 30 14 01 00 > 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 > nl80211: Send over control port dest=xx:xx:xx:xx:xx:xx proto=0x888e > len=121 no_encrypt=1 > wlan0: Unknown event 37 > nl80211: tx_control_port cookie=0x1c > nl80211: Event message available > nl80211: Drv Event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS) > received for wlan0 > nl80211: Control port TX status (ack=1), cookie=28 > wlan0: Event EAPOL_TX_STATUS (37) received > wlan0: Unknown event 37 > nl80211: Event message available > nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlan0 > wlan0: nl80211: New scan results available > nl80211: Scan probed for SSID '' > nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 > 2447 2452 2457 2462 2467 2472 5180 5200 5220 5240 5260 5280 5300 5320 > 5500 5520 5540 5560 5580 5600 5620 5640 5660 5680 5700 5720 5745 5765 > 5785 5805 5825 5845 > wlan0: Event SCAN_RESULTS (3) received > nl80211: Received scan results (2 BSSes) > nl80211: Scan results indicate BSS status with xx:xx:xx:xx:xx:xx as associated > wlan0: BSS: Start scan result update 2 > BSS: last_scan_res_used=2/32 > wlan0: New scan results available (own=0 ext=1) > wlan0: Do not use results from externally requested scan operation for > network selection > RTM_NEWLINK: ifi_index=6 ifname=wlan0 wext ifi_family=0 > ifi_flags=0x11003 ([UP][LOWER_UP]) > wlan0: Authentication with 74:3a:[ 602.250924] wlan0: > deauthenticating from xx:xx:xx:xx:xx:xx by local choice (Reason: > 3=DEAUTH_LEAVING) > ef:af:a7:6a timed out. > Added BSSID xx:xx:xx:xx:xx:xx into ignore list, ignoring for 10 seconds > TDLS: Remove peers on disassociation > wlan0: WPA: Clear old PMK and PTK > wlan0: Request to deauthenticate - bssid=xx:xx:xx:xx:xx:xx > pending_bssid=00:00:00:00:00:00 reason=3 (DEAUTH_LEAVING) > state=4WAY_HANDSHAKE > TDLS: Tear down peers > wpa_driver_nl80211_deauthenticate(addr=xx:xx:xx:xx:xx:xx reason_code=3) > wlan0: Event DEAUTH (11) received > wlan0: Deauthentication notification > wlan0: * reason 3 (DEAUTH_LEAVING) locally_generated=1 > Deauthentication frame IE(s) - hexdump(len=0): [NULL] > wlan0: CTRL-EVENT-DISCONNECTED bssid=xx:xx:xx:xx:xx:xx reason=3 > locally_generated=1 > wlan0: WPA: 4-Way Handshake failed - pre-shared key may be incorrect > wlan0: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="FABIOHOUSE" > auth_failures=1 duration=10 reason=WRONG_KEY > wlan0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=7) > wlan0: Setting scan request: 0.100000 sec > wlan0: Radio work 'sme-connect'@0x23ad6f8 done in 10.999229 seconds > wlan0: radio_work_free('sme-connect'@0x23ad6f8): num_active_works --> 0 > BSSID xx:xx:xx:xx:xx:xx ignore list count incremented to 2, ignoring > for 10 seconds > wlan0: Consecutive connection failures: 1 --> request scan in 100 ms > wlan0: Ignore new scan request for 0.100000 sec since an earlier > request is scheduled to trigger sooner > TDLS: Remove peers on disassociation > wlan0: WPA: Clear old PMK and PTK > wlan0: Disconnect event - remove keys > wlan0: State: 4WAY_HANDSHAKE -> DISCONNECTED > nl80211: Set wlan0 operstate 0->0 (DORMANT) > netlink: Operstate: ifindex=6 linkmode=-1 (no change), operstate=5 > (IF_OPER_DORMANT) > nl80211: Skip set_supp_port(unauthorized) while not associated > WMM AC: WMM AC is disabled > wlan0: State: DISCONNECTED -> DISCONNECTED > nl80211: Set wlan0 operstate 0->0 (DORMANT) > netlink: Operstate: ifindex=6 linkmode=-1 (no change), operstate=5 > (IF_OPER_DORMANT) > nl80211: Skip set_supp_port(unauthorized) while not associated > QM: Clear all active DSCP policies > wlan0: CTRL-EVENT-DSCP-POLICY clear_all > wlan0: Ignore new scan request for 1.000000 sec since an earlier > request is scheduled to trigger sooner > RTM_NEWLINK: ifi_index=6 ifname=wlan0 operstate=2 linkmode=1 > ifi_family=0 ifi_flags=0x1003 ([UP]) > nl80211: Event message available > nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan0 > nl80211: Delete station xx:xx:xx:xx:xx:xx > nl80211: Event message available > nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlan0 > nl80211: MLME event 39 (NL80211_CMD_DEAUTHENTICATE) on > wlan0(00:1f:7b:31:04:a0) A1=xx:xx:xx:xx:xx:xx A2=00:1f:7b:31:04:a0 on > link_id=-1 > nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 74 3a ef af > a7 6a 00 1f 7b 31 04 a0 74 3a ef af a7 6a 00 00 03 00 > nl80211: Deauthenticate event > nl80211: Ignore deauth event triggered due to own deauth request > nl80211: Event message available > nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlan0 > nl80211: Ignore disconnect event when using userspace SME > wlan0: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD > RTM_NEWLINK: ifi_index=6 ifname=wlan0 wext ifi_family=0 ifi_flags=0x1003 ([UP]) > nl80211: Event message available > nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlan0 > nl80211: Regulatory domain change > * initiator=0 > * type=1 > wlan0: Event CHANNEL_LIST_CHANGED (27) received > wlan0: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD > wlan0: Updating hw mode > nl80211: Regulatory information - country=00 > nl80211: 2402-2472 @ 40 MHz 20 mBm > nl80211: 2457-2482 @ 20 MHz 20 mBm (no IR) > nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR) > nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR) > nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR) > nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR) > nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR) > nl80211: 57240-63720 @ 2160 MHz 0 mBm > nl80211: Added 802.11b mode based on 802.11g information > nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 > 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[DISABLED] > nl80211: Mode IEEE 802.11a: 5180[NO_IR] 5200[NO_IR] 5220[NO_IR] > 5240[NO_IR] 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] > 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR] > 5540[NO_IR][RADAR] 5560[NO_IR][RADAR] 5580[NO_IR][RADAR] > 5600[NO_IR][RADAR] 5620[NO_IR][RADAR] 5640[NO_IR][RADAR] > 5660[NO_IR][RADAR] 5680[NO_IR][RADAR] 5700[NO_IR][RADAR] 5720[NO_IR] > 5745[NO_IR] 5765[NO_IR] 5785[NO_IR] 5805[NO_IR] 5825[NO_IR] > 5845[NO_IR] 5865[DISABLED] > nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 > 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[DISABLED] > wlan0: State: DISCONNECTED -> SCANNING > wlan0: Starting AP scan for wildcard SSID > wlan0: Add radio work 'scan'@0x23c3d70 > wlan0: First radio work item in the queue - schedule start immediately > wlan0: Starting radio work 'scan'@0x23c3d70 after 0.000212 second wait > wlan0: nl80211: scan request > nl80211: Scan SSID > nl80211: Scan co-located APs on 6 GHz > nl80211: Scan extra IEs - hexdump(len=13): 7f 0b 04 00 00 00 00 00 40 > 40 00 00 20 > Scan requested (ret=0) - scan timeout 30 seconds > nl80211: Event message available > nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlan0 > wlan0: nl80211: Scan trigger > wlan0: Event SCAN_STARTED (47) received > wlan0: Own scan request started a scan in 0.001161 seconds _______________________________________________ Hostap mailing list Hostap@xxxxxxxxxxxxxxxxxxx http://lists.infradead.org/mailman/listinfo/hostap