Search Linux Wireless

Re: Concurrent AP and STA mode issues with power mgt on BCM43438

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 17-05-16 02:56, Barry Reinhold wrote:
> 
> Hi,
> 
> [This is a follow on to the thread entitled Limit rate of BCM34348 on Raspberry PI-3 via brcmfmac, but since our understanding of the issue has changed we are starting a new thread.]
> 
> We have been attempting to get a Raspberry PI-3 (RPI3) to operate concurrently  as both a STA and an AP. When we associate a Nexus-6  with the RPI3's AP ing the Nexus-6 from the RPI3 we see no ping loss. We then connect the RPI3 as a station with a Cisco Linksys E1200. As soon as we do this the over 90% of the ping messages are dropped between the RPI3 and the Nexus-6.  If we then kill the wpa_supplicant on the RPI-3, the pings again operate with loss.

How did you setup STA and AP, ie. what commands/tools did you use?

> In debugging this problem we see:
> 1. The Nexus-6 lose it association with the RPI3. This generally recovers and does not seem to be the cause of the delay/loss of the pings.
> 2. A tcpdump taken on the RPI3 will shows the expected number of ICMP echo requests, but will not show the expected number of ICMP echo responses.
> 3. When captured "in the air" from a third device using a WiFi adapter (Aircrack-ng using monitor mode) we do not see the expected number of ICMP echo requests. A trace is attached.
> 
> We noticed that not all devices when acting as clients of the RPI3's AP had this problem. After some investigation we discovered that if we disabled wifi power management on these devices that we not see the loss of the pings.
> 
> We then disabled (Blacklisted the brcmfmac) and added an external dongle (TP-LINK TL-WN722N) and repeated the tests. When this dongle was used we did not see the associated packet loss on the RPI3's AP.

So TP-LINK dongle is inserted on RPi3 and acting as AP and STA same as
the bcm43438.

> Throughout the testing all communications have been in channel 1 to ensure that the AP and the STA can work together and Bluetooth was disabled.

So both Cisco AP and RPi3 AP beacons are seen on channel 1? I am asking
because the attached capture only shows 1 beacon from RPi3. Could you
also run the test without WPA. The data packets in the capture are
encrypted hence no ICMP messages are shown.

Regards,
Arend

> At this point we are a bit lost as what to do next. We need a solution that does not require us to configure the client device which is being used to connect to the AP. We are also not able to use an external Wifi dongle.
> 
> We would appreciate guidance in terms of what we could try, as well as insight into the nature of the issue.
> 
> Below are some configuration details:
> 
> 
> Components in the test system:
> 
> 1. Cisco Linksys E1200 which is connected to the ethernet and provides the AP to which the RPI-3 connects
> 2. A RPI-3 (Raspian 8.0, with Kernel 4.4.10-v7+, brcfmac 7.45.41.23 firmware 01-cc4eda9c)
> 3. A Google Nexus-6 running Android 6.0.1, and JuiceSSH 2.1.2
> 
> Configuration of the RPI3:
> 
> cat /etc/os-release 
> PRETTY_NAME="Raspbian GNU/Linux 8 (jessie)"
> NAME="Raspbian GNU/Linux"
> VERSION_ID="8"
> VERSION="8 (jessie)"
> ID=raspbian
> ID_LIKE=debian
> HOME_URL="http://www.raspbian.org/";
> SUPPORT_URL="http://www.raspbian.org/RaspbianForums";
> BUG_REPORT_URL="http://www.raspbian.org/RaspbianBugs";
> root@raspberrypi:/home/pi# uname -a
> Linux raspberrypi 4.4.10-v7+ #885 SMP Fri May 13 15:44:27 BST 2016 armv7l GNU/Linux
> 
> host apd configuration
> root@raspberrypi:/home/pi# cat /etc/hostapd/hostapd.conf 
> ctrl_interface=/var/run/hostapd
> interface=uap0
> ssid=Health@Home Hub b827ebeb46b2
> hw_mode=g
> channel=1
> auth_algs=1
> wpa=2
> wpa_passphrase=juniperbranch
> wpa_key_mgmt=WPA-PSK
> wpa_pairwise=TKIP
> rsn_pairwise=CCMP
> 
> wpa_supplicant configuration:
> root@raspberrypi:/home/pi# cat cisco.wpa 
> network={
> 	ssid="CISCO-Linksys-E1200"
> 	#psk="---------?"
> 	psk=2e06fdb031cfc0e0c58e56d61657bd9a7912769e1d7a6bead31f0db99455c071
> }
> 
> startup log:
> root@raspberrypi:/home/pi# May 16 22:02:58 raspberrypi hostapd[512]: uap0: STA 00:21:6a:67:b1:9a IEEE 802.11: associated
> May 16 22:02:58 raspberrypi hostapd[512]: uap0: STA 00:21:6a:67:b1:9a RADIUS: starting accounting session 573A40EE-00000000
> May 16 22:02:58 raspberrypi hostapd[512]: uap0: STA 00:21:6a:67:b1:9a WPA: pairwise key handshake completed (RSN)
> May 16 22:03:01 raspberrypi dnsmasq-dhcp[446]: DHCPDISCOVER(uap0) 00:21:6a:67:b1:9a
> May 16 22:03:01 raspberrypi dnsmasq-dhcp[446]: DHCPOFFER(uap0) 192.168.2.78 00:21:6a:67:b1:9a
> May 16 22:03:01 raspberrypi dnsmasq-dhcp[446]: DHCPREQUEST(uap0) 192.168.2.78 00:21:6a:67:b1:9a
> May 16 22:03:01 raspberrypi dnsmasq-dhcp[446]: DHCPACK(uap0) 192.168.2.78 00:21:6a:67:b1:9a
> £
> root@raspberrypi:/home/pi# May 16 22:05:59 raspberrypi hostapd[512]: uap0: STA 9c:d9:17:6b:5e:20 IEEE 802.11: associated
> May 16 22:05:59 raspberrypi hostapd[512]: uap0: STA 9c:d9:17:6b:5e:20 RADIUS: starting accounting session 573A40EE-00000001
> May 16 22:05:59 raspberrypi hostapd[512]: uap0: STA 9c:d9:17:6b:5e:20 WPA: pairwise key handshake completed (RSN)
> May 16 22:06:02 raspberrypi dnsmasq-dhcp[446]: DHCPDISCOVER(uap0) 9c:d9:17:6b:5e:20
> May 16 22:06:02 raspberrypi dnsmasq-dhcp[446]: DHCPOFFER(uap0) 192.168.2.52 9c:d9:17:6b:5e:20
> May 16 22:06:02 raspberrypi dnsmasq-dhcp[446]: DHCPREQUEST(uap0) 192.168.2.52 9c:d9:17:6b:5e:20
> May 16 22:06:02 raspberrypi dnsmasq-dhcp[446]: DHCPACK(uap0) 192.168.2.52 9c:d9:17:6b:5e:20 android-72ac23268335f965
> wpa_supplicant -i wlan0 -c cisco.wpa -d -t
> 1463436647.471216: wpa_supplicant v2.3
> 1463436647.478375: random: Trying to read entropy from /dev/random
> 1463436647.478484: Successfully initialized wpa_supplicant
> 1463436647.478524: Initializing interface 'wlan0' conf 'cisco.wpa' driver 'default' ctrl_interface 'N/A' bridge 'N/A'
> 1463436647.478590: Configuration file 'cisco.wpa' -> '/home/pi/cisco.wpa'
> 1463436647.478724: Reading configuration file '/home/pi/cisco.wpa'
> 1463436647.478921: Priority group 0
> 1463436647.478946:    id=0 ssid='CISCO-Linksys-E1200'
> 1463436647.486093: rfkill: initial event: idx=0 type=1 op=0 soft=0 hard=0
> 1463436647.486139: rfkill: initial event: idx=1 type=2 op=0 soft=0 hard=0
> 1463436647.490290: nl80211: Using driver-based roaming
> 1463436647.490322: nl80211: TDLS supported
> 1463436647.490367: nl80211: Supported cipher 00-0f-ac:1
> 1463436647.490393: nl80211: Supported cipher 00-0f-ac:5
> 1463436647.490414: nl80211: Supported cipher 00-0f-ac:2
> 1463436647.490435: nl80211: Supported cipher 00-0f-ac:4
> 1463436647.490455: nl80211: Supported cipher 00-0f-ac:6
> 1463436647.490579: nl80211: Using driver-based off-channel TX
> 1463436647.490638: nl80211: Supported vendor command: vendor_id=0x1018 subcmd=1
> 1463436647.490687: nl80211: Use separate P2P group interface (driver advertised support)
> 1463436647.490709: nl80211: Enable multi-channel concurrent (driver advertised support)
> 1463436647.490730: nl80211: interface wlan0 in phy phy0
> 1463436647.491199: nl80211: Set mode ifindex 3 iftype 2 (STATION)
> 1463436647.491304: nl80211: Subscribe to mgmt frames with non-AP handle 0x564c5c08
> 1463436647.491347: nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x564c5c08 match=040a
> 1463436647.491427: nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x564c5c08 match=040b
> 1463436647.491503: nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x564c5c08 match=040c
> 1463436647.491578: nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x564c5c08 match=040d
> 1463436647.491651: nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x564c5c08 match=090a
> 1463436647.491725: nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x564c5c08 match=090b
> 1463436647.491799: nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x564c5c08 match=090c
> 1463436647.491872: nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x564c5c08 match=090d
> 1463436647.491951: nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x564c5c08 match=0409506f9a09
> 1463436647.492030: nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x564c5c08 match=7f506f9a09
> 1463436647.492234: nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x564c5c08 match=0801
> 1463436647.492313: nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x564c5c08 match=040e
> 1463436647.492403: nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x564c5c08 match=06
> 1463436647.492478: nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x564c5c08 match=0a07
> 1463436647.492552: nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x564c5c08 match=0a11
> 1463436647.493066: netlink: Operstate: ifindex=3 linkmode=1 (userspace-control), operstate=5 (IF_OPER_DORMANT)
> 1463436647.493610: nl80211: driver param='(null)'
> 1463436647.493644: Add interface wlan0 to a new radio phy0
> 1463436647.494422: nl80211: Regulatory information - country=00
> 1463436647.494458: nl80211: 2402-2472 @ 40 MHz 20 mBm
> 1463436647.494489: nl80211: 2457-2482 @ 40 MHz 20 mBm (no IR)
> 1463436647.494518: nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR)
> 1463436647.494547: nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR)
> 1463436647.494574: nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR)
> 1463436647.494602: nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR)
> 1463436647.494631: nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR)
> 1463436647.494658: nl80211: 57240-63720 @ 2160 MHz 0 mBm
> 1463436647.494737: nl80211: Added 802.11b mode based on 802.11g information
> 1463436647.494763: nl80211: Do not indicate P2P_DEVICE support (p2p_device=1 driver param not specified)
> 1463436647.602146: wlan0: Own MAC address: b8:27:eb:eb:46:b2
> 1463436647.602230: wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
> 1463436647.602367: wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
> 1463436647.602421: wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
> 1463436647.602473: wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
> 1463436647.602524: wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0
> 1463436647.602575: wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0
> 1463436647.602617: wlan0: RSN: flushing PMKID list in the driver
> 1463436647.602629: nl80211: Flush PMKIDs
> 1463436647.672105: TDLS: TDLS operation supported by driver
> 1463436647.672126: TDLS: Driver uses internal link setup
> 1463436647.672261: wlan0: WPS: UUID based on MAC address: f2d05241-a083-5270-873a-ee5fec1c466e
> 1463436647.679074: EAPOL: SUPP_PAE entering state DISCONNECTED
> 1463436647.679100: EAPOL: Supplicant port status: Unauthorized
> 1463436647.679111: nl80211: Skip set_supp_port(unauthorized) while not associated
> 1463436647.679123: EAPOL: KEY_RX entering state NO_KEY_RECEIVE
> 1463436647.679134: EAPOL: SUPP_BE entering state INITIALIZE
> 1463436647.679145: EAP: EAP entering state DISABLED
> 1463436647.679286: P2P: Add operating class 81
> 1463436647.679303: P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
> 1463436647.680368: P2P: Own listen channel: 81:11
> 1463436647.681256: P2P: Random operating channel: 81:6
> 1463436647.682278: P2P: initialized
> 1463436647.682306: P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11
> 1463436647.682320: P2P: cli_channels:
> 1463436647.682362: wlan0: Added interface wlan0
> 1463436647.682380: wlan0: State: DISCONNECTED -> DISCONNECTED
> 1463436647.682392: nl80211: Set wlan0 operstate 0->0 (DORMANT)
> 1463436647.682405: netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
> 1463436647.682490: random: Got 20/20 bytes from /dev/random
> 1463436647.682550: RTM_NEWLINK: ifi_index=3 ifname=wlan0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP])
> 1463436647.706342: wlan0: Starting delayed sched scan
> 1463436647.706369: wlan0: Use normal scan instead of sched_scan for initial scans (normal_scans=0)
> 1463436647.706387: wlan0: Setting scan request: 0.000000 sec
> 1463436647.706423: wlan0: State: DISCONNECTED -> SCANNING
> 1463436647.706443: wlan0: Starting AP scan for wildcard SSID
> 1463436647.706455: WPS: Building WPS IE for Probe Request
> 1463436647.706468: WPS:  * Version (hardcoded 0x10)
> 1463436647.706478: WPS:  * Request Type
> 1463436647.706487: WPS:  * Config Methods (2148)
> 1463436647.706497: WPS:  * UUID-E
> 1463436647.706506: WPS:  * Primary Device Type
> 1463436647.706515: WPS:  * RF Bands (1)
> 1463436647.706525: WPS:  * Association State
> 1463436647.706534: WPS:  * Configuration Error (0)
> 1463436647.706543: WPS:  * Device Password ID (0)
> 1463436647.706555: WPS:  * Manufacturer
> 1463436647.706563: WPS:  * Model Name
> 1463436647.706573: WPS:  * Model Number
> 1463436647.706581: WPS:  * Device Name
> 1463436647.706592: WPS:  * Version2 (0x20)
> 1463436647.706610: P2P: * P2P IE header
> 1463436647.706619: P2P: * Capability dev=25 group=00
> 1463436647.706630: P2P: * Listen Channel: Regulatory Class 81 Channel 11
> 1463436647.706649: wlan0: Add radio work 'scan'@0x564d5290
> 1463436647.706663: wlan0: First radio work item in the queue - schedule start immediately
> 1463436647.706692: wlan0: Starting radio work 'scan'@0x564d5290 after 0.000024 second wait
> 1463436647.706707: wlan0: nl80211: scan request
> 1463436647.711431: Scan requested (ret=0) - scan timeout 10 seconds
> 1463436647.711482: nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlan0
> 1463436647.711502: wlan0: nl80211: Scan trigger
> 1463436647.711539: wlan0: Event SCAN_STARTED (49) received
> 1463436647.711557: wlan0: Own scan request started a scan in 0.000099 seconds
> 1463436648.389070: nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlan0
> 1463436648.389120: wlan0: nl80211: New scan results available
> 1463436648.389138: nl80211: Scan probed for SSID ''
> 1463436648.389158: nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
> 1463436648.389175: wlan0: Event SCAN_RESULTS (3) received
> 1463436648.389191: wlan0: Scan completed in 0.677635 seconds
> 1463436648.389491: nl80211: Received scan results (18 BSSes)
> 1463436648.389587: wlan0: BSS: Start scan result update 1
> 1463436648.389614: wlan0: BSS: Add new id 0 BSSID 58:6d:8f:b3:b8:23 SSID 'CISCO-Linksys-E1200'
> 1463436648.389640: wlan0: BSS: Add new id 1 BSSID 60:02:92:cd:d9:30 SSID 'LNIWireless'
> 1463436648.389662: wlan0: BSS: Add new id 2 BSSID d8:97:ba:28:a2:40 SSID 'HOME-30CB-2.4'
> 1463436648.389685: wlan0: BSS: Add new id 3 BSSID 74:85:2a:db:22:68 SSID 'ThreeOhZoo-2.4'
> 1463436648.389706: wlan0: BSS: Add new id 4 BSSID d8:97:ba:28:a2:41 SSID ''
> 1463436648.389726: wlan0: BSS: Add new id 5 BSSID 6c:b0:ce:9f:d7:df SSID 'NETGEAR61'
> 1463436648.389748: wlan0: BSS: Add new id 6 BSSID 44:94:fc:80:40:73 SSID 'NETGEAR92'
> 1463436648.389768: wlan0: BSS: Add new id 7 BSSID 02:ac:e0:e8:11:20 SSID ''
> 1463436648.389789: wlan0: BSS: Add new id 8 BSSID 00:ac:e0:e8:11:20 SSID 'HOME-1122'
> 1463436648.389809: wlan0: BSS: Add new id 9 BSSID 5e:8f:e0:93:fb:ba SSID ''
> 1463436648.389830: wlan0: BSS: Add new id 10 BSSID 00:23:97:1c:51:3d SSID '09FX01020604'
> 1463436648.389852: wlan0: BSS: Add new id 11 BSSID 58:6d:8f:b3:b8:24 SSID 'CISCO-Linksys-E1200-guest'
> 1463436648.389874: wlan0: BSS: Add new id 12 BSSID 60:02:92:cd:d9:32 SSID 'xfinitywifi'
> 1463436648.389895: wlan0: BSS: Add new id 13 BSSID d8:97:ba:28:a2:42 SSID 'xfinitywifi'
> 1463436648.389917: wlan0: BSS: Add new id 14 BSSID 74:85:2a:db:22:6a SSID 'xfinitywifi'
> 1463436648.389939: wlan0: BSS: Add new id 15 BSSID 48:0f:cf:fa:ec:54 SSID 'HP-Print-54-Officejet Pro 8610'
> 1463436648.389961: wlan0: BSS: Add new id 16 BSSID 06:ac:e0:e8:11:20 SSID 'xfinitywifi'
> 1463436648.389983: wlan0: BSS: Add new id 17 BSSID e6:89:2c:fd:11:00 SSID 'xfinitywifi'
> 1463436648.389999: BSS: last_scan_res_used=18/32
> 1463436648.390027: wlan0: New scan results available (own=1 ext=0)
> 1463436648.390091: WPS: AP 58:6d:8f:b3:b8:23 type 0 added
> 1463436648.390108: WPS: AP 60:02:92:cd:d9:30 type 0 added
> 1463436648.390125: WPS: AP d8:97:ba:28:a2:40 type 0 added
> 1463436648.390141: WPS: AP 74:85:2a:db:22:68 type 0 added
> 1463436648.390157: WPS: AP 6c:b0:ce:9f:d7:df type 0 added
> 1463436648.390174: WPS: AP 44:94:fc:80:40:73 type 0 added
> 1463436648.390190: WPS: AP 00:ac:e0:e8:11:20 type 0 added
> 1463436648.390206: WPS: AP[0] 58:6d:8f:b3:b8:23 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
> 1463436648.390221: WPS: AP[1] 60:02:92:cd:d9:30 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
> 1463436648.390236: WPS: AP[2] d8:97:ba:28:a2:40 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
> 1463436648.390250: WPS: AP[3] 74:85:2a:db:22:68 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
> 1463436648.390265: WPS: AP[4] 6c:b0:ce:9f:d7:df type=0 tries=0 last_attempt=-1 sec ago blacklist=0
> 1463436648.390279: WPS: AP[5] 44:94:fc:80:40:73 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
> 1463436648.390294: WPS: AP[6] 00:ac:e0:e8:11:20 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
> 1463436648.390320: wlan0: Radio work 'scan'@0x564d5290 done in 0.683629 seconds
> 1463436648.390362: wlan0: Selecting BSS from priority group 0
> 1463436648.390390: wlan0: 0: 58:6d:8f:b3:b8:23 ssid='CISCO-Linksys-E1200' wpa_ie_len=28 rsn_ie_len=24 caps=0x411 level=-46 wps
> 1463436648.390411: wlan0:    selected based on RSN IE
> 1463436648.390432: wlan0:    selected BSS 58:6d:8f:b3:b8:23 ssid='CISCO-Linksys-E1200'
> 1463436648.390483: wlan0: Considering connect request: reassociate: 0  selected: 58:6d:8f:b3:b8:23  bssid: 00:00:00:00:00:00  pending: 00:00:00:00:00:00  wpa_state: SCANNING  ssid=0x564c5548  current_ssid=(nil)
> 1463436648.390506: wlan0: Request association with 58:6d:8f:b3:b8:23
> 1463436648.390519: WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=21): 00 13 43 49 53 43 4f 2d 4c 69 6e 6b 73 79 73 2d 45 31 32 30 30
> 1463436648.390549: WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=3): 03 01 01
> 1463436648.390562: WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=3): 2a 01 00
> 1463436648.390575: WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=3): 2f 01 00
> 1463436648.390589: WPA: RSN IE in EAPOL-Key - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 0c 00
> 1463436648.390624: WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=24): 3d 16 01 08 11 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 1463436648.390656: WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=16): 4a 0e 14 00 0a 00 2c 01 c8 00 14 00 05 00 19 00
> 1463436648.390683: WPA: WPA IE in EAPOL-Key - hexdump(len=30): dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 0c 00
> 1463436648.390721: WPA: WMM Parameter Element - hexdump(len=24): 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
> 1463436648.390752: TDLS: TDLS is allowed in the target BSS
> 1463436648.390768: wlan0: Add radio work 'connect'@0x564d5290
> 1463436648.390782: wlan0: First radio work item in the queue - schedule start immediately
> 1463436648.390822: wlan0: Starting radio work 'connect'@0x564d5290 after 0.000036 second wait
> 1463436648.390839: wlan0: Trying to associate with SSID 'CISCO-Linksys-E1200'
> 1463436648.390853: wlan0: Cancelling scan request
> 1463436648.390865: wlan0: WPA: clearing own WPA/RSN IE
> 1463436648.390878: wlan0: Automatic auth_alg selection: 0x1
> 1463436648.390888: RSN: PMKSA cache search - network_ctx=0x564c5548 try_opportunistic=0
> 1463436648.390900: RSN: Search for BSSID 58:6d:8f:b3:b8:23
> 1463436648.390912: RSN: No PMKSA cache entry found
> 1463436648.390925: wlan0: RSN: using IEEE 802.11i/D9.0
> 1463436648.390940: wlan0: WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2
> 1463436648.390954: wlan0: WPA: Selected mgmt group cipher 32
> 1463436648.390965: WPA: set AP WPA IE - hexdump(len=30): dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 0c 00
> 1463436648.391004: WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 0c 00
> 1463436648.391042: wlan0: WPA: using GTK TKIP
> 1463436648.391055: wlan0: WPA: using PTK CCMP
> 1463436648.391066: wlan0: WPA: using KEY_MGMT WPA-PSK
> 1463436648.391079: wlan0: WPA: not using MGMT group cipher
> 1463436648.391091: WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
> 1463436648.391134: wlan0: State: SCANNING -> ASSOCIATING
> 1463436648.391145: nl80211: Set wlan0 operstate 0->0 (DORMANT)
> 1463436648.391158: netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
> 1463436648.391191: wlan0: set_disable_max_amsdu: -1
> 1463436648.391204: wlan0: set_ampdu_factor: -1
> 1463436648.391216: wlan0: set_ampdu_density: -1
> 1463436648.391228: wlan0: set_disable_ht40: 0
> 1463436648.391241: wlan0: set_disable_sgi: 0
> 1463436648.391252: wlan0: set_disable_ldpc: 0
> 1463436648.391263: nl80211: Set mode ifindex 3 iftype 2 (STATION)
> 1463436648.391303: nl80211: Unsubscribe mgmt frames handle 0xdec4d481 (mode change)
> 1463436648.391431: nl80211: Subscribe to mgmt frames with non-AP handle 0x564c5c08
> 1463436648.391453: nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x564c5c08 match=040a
> 1463436648.391496: nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x564c5c08 match=040b
> 1463436648.391537: nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x564c5c08 match=040c
> 1463436648.391576: nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x564c5c08 match=040d
> 1463436648.391615: nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x564c5c08 match=090a
> 1463436648.391656: nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x564c5c08 match=090b
> 1463436648.391696: nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x564c5c08 match=090c
> 1463436648.391734: nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x564c5c08 match=090d
> 1463436648.391775: nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x564c5c08 match=0409506f9a09
> 1463436648.391815: nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x564c5c08 match=7f506f9a09
> 1463436648.391855: nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x564c5c08 match=0801
> 1463436648.391895: nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x564c5c08 match=040e
> 1463436648.391933: nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x564c5c08 match=06
> 1463436648.391971: nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x564c5c08 match=0a07
> 1463436648.392012: nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x564c5c08 match=0a11
> 1463436648.392122: nl80211: Connect (ifindex=3)
> 1463436648.392136:   * bssid_hint=58:6d:8f:b3:b8:23
> 1463436648.392149:   * freq_hint=2412
> 1463436648.392160:   * SSID - hexdump_ascii(len=19):
>      43 49 53 43 4f 2d 4c 69 6e 6b 73 79 73 2d 45 31   CISCO-Linksys-E1
>      32 30 30                                          200             
> 1463436648.392213:   * IEs - hexdump(len=28): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 7f 04 00 00 0a 02
> 1463436648.392250:   * WPA Versions 0x2
> 1463436648.392260:   * pairwise=0xfac04
> 1463436648.392269:   * group=0xfac02
> 1463436648.392279:   * akm=0xfac02
> 1463436648.392289:   * htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 1463436648.392336:   * htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 1463436648.392378:   * vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
> 1463436648.392401:   * vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
> 1463436648.392423:   * Auth Type 0
> 1463436648.396283: nl80211: Connect request send successfully
> 1463436648.396306: wlan0: Setting authentication timeout: 10 sec 0 usec
> 1463436648.396333: EAPOL: External notification - EAP success=0
> 1463436648.396351: EAPOL: External notification - EAP fail=0
> 1463436648.396362: EAPOL: External notification - portControl=Auto
> 1463436648.396386: RTM_NEWLINK: ifi_index=3 ifname=wlan0 wext ifi_family=0 ifi_flags=0x1003 ([UP])
> 1463436648.679477: EAPOL: disable timer tick
> 1463436649.109776: wlan0: RX EAPOL from 58:6d:8f:b3:b8:23
> 1463436649.109822: wlan0: Not associated - Delay processing of received EAPOL frame (state=ASSOCIATING bssid=00:00:00:00:00:00)
> 1463436649.206958: RTM_NEWLINK: ifi_index=3 ifname=wlan0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> 1463436649.209634: nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlan0
> 1463436649.209678: nl80211: Connect event
> 1463436649.209837: nl80211: Associated on 2412 MHz
> 1463436649.209849: nl80211: Associated with 58:6d:8f:b3:b8:23
> 1463436649.209915: nl80211: Operating frequency for the associated BSS from scan results: 2412 MHz
> 1463436649.209935: wlan0: Event ASSOC (0) received
> 1463436649.209947: wlan0: Association info event
> 1463436649.209956: req_ies - hexdump(len=151): 00 13 43 49 53 43 4f 2d 4c 69 6e 6b 73 79 73 2d 45 31 32 30 30 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 21 02 03 15 24 02 01 0b 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 2d 1a 21 00 1f ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 21 00 1f ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 09 00 10 18 02 00 10 00 00 00 dd 07 00 50 f2 02 00 01 00 00 00 00 00
> 1463436649.210104: resp_ies - hexdump(len=130): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a fc 18 1b ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 01 08 15 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 01 01 4a 0e 14 00 0a 00 2c 01 c8 00 14 00 05 00 19 00 dd 09 00 10 18 02 00 f0 04 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 00 00 00 00 00 00
> 1463436649.210232: WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=24): 3d 16 01 08 15 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 1463436649.210264: WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=16): 4a 0e 14 00 0a 00 2c 01 c8 00 14 00 05 00 19 00
> 1463436649.210288: WPA: WMM Parameter Element - hexdump(len=24): 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
> 1463436649.210319: WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=2): 00 00
> 1463436649.210330: WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=2): 00 00
> 1463436649.210341: WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=2): 00 00
> 1463436649.210358: wlan0: freq=2412 MHz
> 1463436649.210366: WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
> 1463436649.210403: FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
> 1463436649.210418: wlan0: State: ASSOCIATING -> ASSOCIATED
> 1463436649.210428: nl80211: Set wlan0 operstate 0->0 (DORMANT)
> 1463436649.210452: netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
> 1463436649.210491: wlan0: Associated to a new BSS: BSSID=58:6d:8f:b3:b8:23
> 1463436649.210509: WPA: set AP WPA IE - hexdump(len=30): dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 0c 00
> 1463436649.210547: WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 0c 00
> 1463436649.210596: wlan0: Associated with 58:6d:8f:b3:b8:23
> 1463436649.210607: wlan0: WPA: Association event - clear replay counter
> 1463436649.210618: wlan0: WPA: Clear old PTK
> 1463436649.210627: TDLS: Remove peers on association
> 1463436649.210636: EAPOL: External notification - portEnabled=0
> 1463436649.210652: EAPOL: External notification - portValid=0
> 1463436649.210661: EAPOL: External notification - EAP success=0
> 1463436649.210669: EAPOL: External notification - portEnabled=1
> 1463436649.210678: EAPOL: SUPP_PAE entering state CONNECTING
> 1463436649.210686: EAPOL: enable timer tick
> 1463436649.210695: EAPOL: SUPP_BE entering state IDLE
> 1463436649.210709: wlan0: Setting authentication timeout: 10 sec 0 usec
> 1463436649.210723: wlan0: Cancelling scan request
> 1463436649.210939: RTM_NEWLINK: ifi_index=3 ifname=wlan0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> 1463436649.211025: RTM_NEWLINK: ifi_index=3 ifname=wlan0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> 1463436649.211056: RTM_NEWLINK: ifi_index=3 ifname=wlan0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> 1463436650.098273: wlan0: RX EAPOL from 58:6d:8f:b3:b8:23
> 1463436650.098335: wlan0: Setting authentication timeout: 10 sec 0 usec
> 1463436650.098380: wlan0: IEEE 802.1X RX: version=2 type=3 length=117
> 1463436650.098407: wlan0:   EAPOL-Key type=2
> 1463436650.098442: wlan0:   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
> 1463436650.098467: wlan0:   key_length=16 key_data_length=22
> 1463436650.098484:   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
> 1463436650.098517:   key_nonce - hexdump(len=32): ce 97 b7 53 b5 61 0b 2b 21 76 55 16 91 28 33 23 ed cc fe 84 7e 01 2a 21 a9 22 fb e8 85 a7 c9 9b
> 1463436650.098607:   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 1463436650.098653:   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
> 1463436650.098684:   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
> 1463436650.098729:   key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 1463436650.098798: wlan0: State: ASSOCIATED -> 4WAY_HANDSHAKE
> 1463436650.098837: wlan0: WPA: RX message 1 of 4-Way Handshake from 58:6d:8f:b3:b8:23 (ver=2)
> 1463436650.098859: RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 c2 8d 52 51 c1 dd c2 2b 53 02 7a 7a 9e 74 77 e5
> 1463436650.098918: WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 c2 8d 52 51 c1 dd c2 2b 53 02 7a 7a 9e 74 77 e5
> 1463436650.098975: RSN: PMKID from Authenticator - hexdump(len=16): c2 8d 52 51 c1 dd c2 2b 53 02 7a 7a 9e 74 77 e5
> 1463436650.099025: wlan0: RSN: no matching PMKID found
> 1463436650.101071: WPA: Renewed SNonce - hexdump(len=32): 92 89 a8 f2 e7 75 4d 31 2e dc 86 98 3f d6 5d d3 ab be 42 7d 29 45 de 98 67 03 1c c5 73 48 7a d3
> 1463436650.101218: WPA: PTK derivation - A1=b8:27:eb:eb:46:b2 A2=58:6d:8f:b3:b8:23
> 1463436650.101247: WPA: Nonce1 - hexdump(len=32): 92 89 a8 f2 e7 75 4d 31 2e dc 86 98 3f d6 5d d3 ab be 42 7d 29 45 de 98 67 03 1c c5 73 48 7a d3
> 1463436650.101320: WPA: Nonce2 - hexdump(len=32): ce 97 b7 53 b5 61 0b 2b 21 76 55 16 91 28 33 23 ed cc fe 84 7e 01 2a 21 a9 22 fb e8 85 a7 c9 9b
> 1463436650.101393: WPA: PMK - hexdump(len=32): [REMOVED]
> 1463436650.101410: WPA: PTK - hexdump(len=48): [REMOVED]
> 1463436650.101428: WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
> 1463436650.101488: WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
> 1463436650.101525: wlan0: WPA: Sending EAPOL-Key 2/4
> 1463436650.101566: WPA: KCK - hexdump(len=16): [REMOVED]
> 1463436650.101584: WPA: Derived Key MIC - hexdump(len=16): 47 c2 9d 30 c4 f6 0f 11 5f e8 97 54 72 12 b3 62
> 1463436650.133710: wlan0: RX EAPOL from 58:6d:8f:b3:b8:23
> 1463436650.133789: wlan0: IEEE 802.1X RX: version=2 type=3 length=175
> 1463436650.133820: wlan0:   EAPOL-Key type=2
> 1463436650.133858: wlan0:   key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
> 1463436650.133885: wlan0:   key_length=16 key_data_length=80
> 1463436650.133901:   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
> 1463436650.133934:   key_nonce - hexdump(len=32): ce 97 b7 53 b5 61 0b 2b 21 76 55 16 91 28 33 23 ed cc fe 84 7e 01 2a 21 a9 22 fb e8 85 a7 c9 9b
> 1463436650.134006:   key_iv - hexdump(len=16): ed cc fe 84 7e 01 2a 21 a9 22 fb e8 85 a7 c9 9c
> 1463436650.134049:   key_rsc - hexdump(len=8): fb 0a 00 00 00 00 00 00
> 1463436650.134079:   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
> 1463436650.134110:   key_mic - hexdump(len=16): 82 c3 ca ff 55 95 17 a4 9b cc ed b9 4a 3c 82 4e
> 1463436650.134197: RSN: encrypted key data - hexdump(len=80): 2b f1 3e 38 9a db d5 95 ad 72 01 7f 20 4b a3 d5 fd b1 79 39 5e ed db 5f e4 25 72 d0 dc 84 4f 49 08 8a 8d 1b f7 ec c1 14 1d 53 ea ac 44 78 c7 23 3a 74 53 be 68 30 be 21 b0 d4 f4 0e b3 87 b0 a9 29 73 a3 f9 11 33 19 da 3f 30 32 cf 9d 42 c5 fa
> 1463436650.134522: WPA: decrypted EAPOL-Key key data - hexdump(len=72): [REMOVED]
> 1463436650.134554: wlan0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
> 1463436650.134612: wlan0: WPA: RX message 3 of 4-Way Handshake from 58:6d:8f:b3:b8:23 (ver=2)
> 1463436650.134632: WPA: IE KeyData - hexdump(len=72): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 0c 00 dd 26 00 0f ac 01 01 00 fe 53 ed 3d d3 ea ad 63 08 87 a2 80 3b 69 0f 47 ca 90 5d f4 e3 17 4d c5 b2 25 05 b8 81 2c b5 03 dd 00 00 00 00 00
> 1463436650.134801: WPA: RSN IE in EAPOL-Key - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 0c 00
> 1463436650.134869: WPA: GTK in EAPOL-Key - hexdump(len=40): [REMOVED]
> 1463436650.134898: wlan0: WPA: Sending EAPOL-Key 4/4
> 1463436650.134938: WPA: KCK - hexdump(len=16): [REMOVED]
> 1463436650.134957: WPA: Derived Key MIC - hexdump(len=16): 97 60 a8 59 27 89 c4 7d da a9 37 cf 04 8e 7b 95
> 1463436650.135034: wlan0: WPA: Installing PTK to the driver
> 1463436650.135134: wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=3 addr=0x564c5e38 key_idx=0 set_tx=1 seq_len=6 key_len=16
> 1463436650.135187: nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
> 1463436650.135210: nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00
> 1463436650.135239:    addr=58:6d:8f:b3:b8:23
> 1463436650.136838: EAPOL: External notification - portValid=1
> 1463436650.136915: wlan0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
> 1463436650.136973: RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED]
> 1463436650.137030: WPA: Group Key - hexdump(len=32): [REMOVED]
> 1463436650.137094: wlan0: WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32)
> 1463436650.137145: WPA: RSC - hexdump(len=6): fb 0a 00 00 00 00
> 1463436650.137255: wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=2 addr=0x54bf3cc8 key_idx=1 set_tx=0 seq_len=6 key_len=32
> 1463436650.137332: nl80211: KEY_DATA - hexdump(len=32): [REMOVED]
> 1463436650.137388: nl80211: KEY_SEQ - hexdump(len=6): fb 0a 00 00 00 00
> 1463436650.137450:    broadcast key
> 1463436650.139490: wlan0: WPA: Key negotiation completed with 58:6d:8f:b3:b8:23 [PTK=CCMP GTK=TKIP]
> 1463436650.139557: wlan0: Cancelling authentication timeout
> 1463436650.139618: wlan0: State: GROUP_HANDSHAKE -> COMPLETED
> 1463436650.139687: wlan0: Radio work 'connect'@0x564d5290 done in 1.748856 seconds
> 1463436650.139760: wlan0: CTRL-EVENT-CONNECTED - Connection to 58:6d:8f:b3:b8:23 completed [id=0 id_str=]
> 1463436650.139814: nl80211: Set wlan0 operstate 0->1 (UP)
> 1463436650.139868: netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=6 (IF_OPER_UP)
> 1463436650.140165: EAPOL: External notification - portValid=1
> 1463436650.140228: EAPOL: External notification - EAP success=1
> 1463436650.140281: EAPOL: SUPP_PAE entering state AUTHENTICATING
> 1463436650.140331: EAPOL: SUPP_BE entering state SUCCESS
> 1463436650.140380: EAP: EAP entering state DISABLED
> 1463436650.140427: EAPOL: SUPP_PAE entering state AUTHENTICATED
> 1463436650.140475: EAPOL: Supplicant port status: Authorized
> 1463436650.140525: nl80211: Set supplicant port authorized for 58:6d:8f:b3:b8:23
> 1463436650.143065: EAPOL: SUPP_BE entering state IDLE
> 1463436650.143162: EAPOL authentication completed - result=SUCCESS
> 1463436650.143433: RTM_NEWLINK: ifi_index=3 ifname=wlan0 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
> May 16 22:10:50 raspberrypi systemd-networkd[411]: wlan0           : gained carrier
> 1463436651.210914: EAPOL: startWhen --> 0
> 1463436651.210951: EAPOL: disable timer tick
> May 16 22:10:52 raspberrypi systemd-networkd[411]: wlan0           : DHCPv4 address 192.168.1.102/24 via 192.168.1.1
> May 16 22:10:52 raspberrypi systemd-networkd[411]: wlan0           : link configured
> 
> 
> Barry Reinhold
> 
>       
> 
--
To unsubscribe from this list: send the line "unsubscribe linux-wireless" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html



[Index of Archives]     [Linux Host AP]     [ATH6KL]     [Linux Wireless Personal Area Network]     [Linux Bluetooth]     [Linux Netdev]     [Kernel Newbies]     [Linux Kernel]     [IDE]     [Git]     [Netfilter]     [Bugtraq]     [Yosemite Hiking]     [MIPS Linux]     [ARM Linux]     [Linux RAID]

  Powered by Linux