Hi Ishraq, On Tue, Nov 14, 2017 at 9:24 PM, Ishraq Ibne Ashraf <ishraq.i.ashraf@xxxxxxxxx> wrote: > Hi, > > In our system we use the hostapd release version 2.6 from, > https://w1.fi/cgit/hostap/snapshot/hostap_2_6.tar.bz2. > Everything works fine with the kernel and rtl8188eu driver from sunxi-next > branch with repo state, 3c2993b8c6143d8a5793746a54eba8f86f95240f (Linux > 4.12-rc4). > But doesn't work with repo state, 569dbb88e80deb68974ef6fdd6a13edb9d686261 > (Linux 4.13). > > Both the hostapd configuration and the debug output from hostapd are > attached with this post. > > When the problem occurs hostapd outputs, ioctl[RTL_IOCTL_HOSTAPD]: Operation > not supported. > Maybe there was some changes in the IOCTL interface of the driver/kernel? > > Any help is appreciated. This list is about Allwinner SoCs and the boards they are on, your question appears to be WiFi related, so you'll be more likely to get a useful answer on the linux-wireless list, which I've added to CC. Thanks, -- Julian Calaby Email: julian.calaby@xxxxxxxxx Profile: http://www.google.com/profiles/julian.calaby/
# AP netdevice name (without 'ap' postfix, i.e., wlan0 uses wlan0ap for # management frames with the Host AP driver); wlan0 with many nl80211 drivers. interface=wlx40a5efd82c16 # Hostapd driver to use to manage the interface. # Note: This option is only valid for newer hostapd version. # For older version this parameter is not defined. driver=rtl871xdrv # SSID to be used in IEEE 802.11 management frames. ssid=RED Brick 4.13 KRACK FIX # Channel number (IEEE 802.11) # (default: 0, i.e., not set) # Please note that some drivers do not use this value from hostapd and the # channel will need to be configured separately with iwconfig. # # If CONFIG_ACS build option is enabled, the channel can be selected # automatically at run time by setting channel=acs_survey or channel=0, both of # which will enable the ACS survey based algorithm. channel=8 # Station MAC address -based authentication # Please note that this kind of access control requires a driver that uses # hostapd to take care of management frame processing and as such, this can be # used with driver=hostap or driver=nl80211, but not with driver=atheros. # 0 = accept unless in deny list # 1 = deny unless in accept list # 2 = use external RADIUS server (accept/deny lists are searched first) macaddr_acl=0 # IEEE 802.11 specifies two authentication algorithms. hostapd can be # configured to allow both of these or only one. Open system authentication # should be used with IEEE 802.1X. # Bit fields of allowed authentication algorithms: # bit 0 = Open System Authentication # bit 1 = Shared Key Authentication (requires WEP) auth_algs=1 # Send empty SSID in beacons and ignore probe request frames that do not # specify full SSID, i.e., require stations to know SSID. # default: disabled (0) # 1 = send empty (length=0) SSID in beacon and ignore probe request for # broadcast SSID # 2 = clear SSID (ASCII 0), but keep the original length (this may be required # with some clients that do not support empty SSID) and ignore probe # requests for broadcast SSID ignore_broadcast_ssid=0 # Enable WPA. Setting this variable configures the AP to require WPA (either # WPA-PSK or WPA-RADIUS/EAP based on other configuration). For WPA-PSK, either # wpa_psk or wpa_passphrase must be set and wpa_key_mgmt must include WPA-PSK. # Instead of wpa_psk / wpa_passphrase, wpa_psk_radius might suffice. # For WPA-RADIUS/EAP, ieee8021x must be set (but without dynamic WEP keys), # RADIUS authentication server must be configured, and WPA-EAP must be included # in wpa_key_mgmt. # This field is a bit field that can be used to enable WPA (IEEE 802.11i/D3.0) # and/or WPA2 (full IEEE 802.11i/RSN): # bit0 = WPA # bit1 = IEEE 802.11i/RSN (WPA2) (dot11RSNAEnabled) wpa=2 # WPA pre-shared keys for WPA-PSK. This can be either entered as a 256-bit # secret in hex format (64 hex digits), wpa_psk, or as an ASCII passphrase # (8..63 characters) that will be converted to PSK. This conversion uses SSID # so the PSK changes when ASCII passphrase is used and the SSID is changed. # wpa_psk (dot11RSNAConfigPSKValue) # wpa_passphrase (dot11RSNAConfigPSKPassPhrase) wpa_passphrase=red-brick42 # Set of accepted key management algorithms (WPA-PSK, WPA-EAP, or both). The # entries are separated with a space. WPA-PSK-SHA256 and WPA-EAP-SHA256 can be # added to enable SHA256-based stronger algorithms. # (dot11RSNAConfigAuthenticationSuitesTable) wpa_key_mgmt=WPA-PSK # Set of accepted cipher suites (encryption algorithms) for pairwise keys # (unicast packets). This is a space separated list of algorithms: # CCMP = AES in Counter mode with CBC-MAC [RFC 3610, IEEE 802.11i/D7.0] # TKIP = Temporal Key Integrity Protocol [IEEE 802.11i/D7.0] # Group cipher suite (encryption algorithm for broadcast and multicast frames) # is automatically selected based on this configuration. If only CCMP is # allowed as the pairwise cipher, group cipher will also be CCMP. Otherwise, # TKIP will be used as the group cipher. # (dot11RSNAConfigPairwiseCiphersTable) # Pairwise cipher for WPA (v1) (default: TKIP) wpa_pairwise=TKIP # If Windows clients are going to be connecting, you should leave CMP # encryption out of the wpa_pairwise option, as some windows drivers # have problems with systems that enable it. # Pairwise cipher for RSN/WPA2 (default: use wpa_pairwise value) rsn_pairwise=CCMP # ieee80211n: Whether IEEE 802.11n (HT) is enabled # 0 = disabled (default) # 1 = enabled # Note: You will also need to enable WMM for full HT functionality. # This option is only valid for older hostapd version. ieee80211n=1 # Operation mode (a = IEEE 802.11a, b = IEEE 802.11b, g = IEEE 802.11g, # ad = IEEE 802.11ad (60 GHz); a/g options are used with IEEE 802.11n, too, to # specify band) # Default: IEEE 802.11b hw_mode=g
random: Trying to read entropy from /dev/random Configuration file: /etc/hostapd/hostapd.conf drv->ifindex=4 l2_sock_recv==l2_sock_xmit=0x0x529888 BSS count 1, BSSID mask 00:00:00:00:00:00 (0 bits) Allowed channel: mode=1 chan=1 freq=2412 MHz max_tx_power=0 dBm Allowed channel: mode=1 chan=2 freq=2417 MHz max_tx_power=0 dBm Allowed channel: mode=1 chan=3 freq=2422 MHz max_tx_power=0 dBm Allowed channel: mode=1 chan=4 freq=2427 MHz max_tx_power=0 dBm Allowed channel: mode=1 chan=5 freq=2432 MHz max_tx_power=0 dBm Allowed channel: mode=1 chan=6 freq=2437 MHz max_tx_power=0 dBm Allowed channel: mode=1 chan=7 freq=2442 MHz max_tx_power=0 dBm Allowed channel: mode=1 chan=8 freq=2447 MHz max_tx_power=0 dBm Allowed channel: mode=1 chan=9 freq=2452 MHz max_tx_power=0 dBm Allowed channel: mode=1 chan=10 freq=2457 MHz max_tx_power=0 dBm Allowed channel: mode=1 chan=11 freq=2462 MHz max_tx_power=0 dBm Allowed channel: mode=1 chan=12 freq=2467 MHz max_tx_power=0 dBm Allowed channel: mode=1 chan=13 freq=2472 MHz max_tx_power=0 dBm Allowed channel: mode=0 chan=1 freq=2412 MHz max_tx_power=0 dBm Allowed channel: mode=0 chan=2 freq=2417 MHz max_tx_power=0 dBm Allowed channel: mode=0 chan=3 freq=2422 MHz max_tx_power=0 dBm Allowed channel: mode=0 chan=4 freq=2427 MHz max_tx_power=0 dBm Allowed channel: mode=0 chan=5 freq=2432 MHz max_tx_power=0 dBm Allowed channel: mode=0 chan=6 freq=2437 MHz max_tx_power=0 dBm Allowed channel: mode=0 chan=7 freq=2442 MHz max_tx_power=0 dBm Allowed channel: mode=0 chan=8 freq=2447 MHz max_tx_power=0 dBm Allowed channel: mode=0 chan=9 freq=2452 MHz max_tx_power=0 dBm Allowed channel: mode=0 chan=10 freq=2457 MHz max_tx_power=0 dBm Allowed channel: mode=0 chan=11 freq=2462 MHz max_tx_power=0 dBm Allowed channel: mode=2 chan=36 freq=5180 MHz max_tx_power=0 dBm Allowed channel: mode=2 chan=40 freq=5200 MHz max_tx_power=0 dBm Allowed channel: mode=2 chan=44 freq=5220 MHz max_tx_power=0 dBm Allowed channel: mode=2 chan=48 freq=5240 MHz max_tx_power=0 dBm Allowed channel: mode=2 chan=52 freq=5260 MHz max_tx_power=0 dBm Allowed channel: mode=2 chan=56 freq=5280 MHz max_tx_power=0 dBm Allowed channel: mode=2 chan=60 freq=5300 MHz max_tx_power=0 dBm Allowed channel: mode=2 chan=64 freq=5320 MHz max_tx_power=0 dBm Allowed channel: mode=2 chan=100 freq=5500 MHz max_tx_power=0 dBm Allowed channel: mode=2 chan=104 freq=5520 MHz max_tx_power=0 dBm Allowed channel: mode=2 chan=108 freq=5540 MHz max_tx_power=0 dBm Allowed channel: mode=2 chan=112 freq=5560 MHz max_tx_power=0 dBm Allowed channel: mode=2 chan=116 freq=5580 MHz max_tx_power=0 dBm Allowed channel: mode=2 chan=120 freq=5600 MHz max_tx_power=0 dBm Allowed channel: mode=2 chan=124 freq=5620 MHz max_tx_power=0 dBm Allowed channel: mode=2 chan=128 freq=5640 MHz max_tx_power=0 dBm Allowed channel: mode=2 chan=132 freq=5660 MHz max_tx_power=0 dBm Allowed channel: mode=2 chan=136 freq=5680 MHz max_tx_power=0 dBm Allowed channel: mode=2 chan=140 freq=5700 MHz max_tx_power=0 dBm Allowed channel: mode=2 chan=149 freq=5745 MHz max_tx_power=0 dBm Allowed channel: mode=2 chan=153 freq=5765 MHz max_tx_power=0 dBm Allowed channel: mode=2 chan=157 freq=5785 MHz max_tx_power=0 dBm Allowed channel: mode=2 chan=161 freq=5805 MHz max_tx_power=0 dBm Allowed channel: mode=2 chan=165 freq=5825 MHz max_tx_power=0 dBm hw vht capab: 0x0, conf vht capab: 0x0 Completing interface initialization Mode: IEEE 802.11g Channel: 4 Frequency: 2427 MHz DFS 0 channels required radar detection RATE[0] rate=10 flags=0x1 RATE[1] rate=20 flags=0x1 RATE[2] rate=55 flags=0x1 RATE[3] rate=110 flags=0x1 RATE[4] rate=60 flags=0x0 RATE[5] rate=90 flags=0x0 RATE[6] rate=120 flags=0x0 RATE[7] rate=180 flags=0x0 RATE[8] rate=240 flags=0x0 RATE[9] rate=360 flags=0x0 RATE[10] rate=480 flags=0x0 RATE[11] rate=540 flags=0x0 hostapd_setup_bss(hapd=0x529e98 (wlx40a5efd82c16), first=1) wlx40a5efd82c16: Flushing old station entries ioctl[RTL_IOCTL_HOSTAPD]: Operation not supported wlx40a5efd82c16: Could not connect to kernel driver wlx40a5efd82c16: Deauthenticate all stations +rtl871x_sta_deauth_ops, ff:ff:ff:ff:ff:ff is deauth, reason=2 rtl871x_set_key_ops ioctl[RTL_IOCTL_HOSTAPD]: Operation not supported Failed to set encryption. Failed to clear default encryption keys (ifname=wlx40a5efd82c16 keyidx=0) rtl871x_set_key_ops ioctl[RTL_IOCTL_HOSTAPD]: Operation not supported Failed to set encryption. Failed to clear default encryption keys (ifname=wlx40a5efd82c16 keyidx=1) rtl871x_set_key_ops ioctl[RTL_IOCTL_HOSTAPD]: Operation not supported Failed to set encryption. Failed to clear default encryption keys (ifname=wlx40a5efd82c16 keyidx=2) rtl871x_set_key_ops ioctl[RTL_IOCTL_HOSTAPD]: Operation not supported Failed to set encryption. Failed to clear default encryption keys (ifname=wlx40a5efd82c16 keyidx=3) Using interface wlx40a5efd82c16 with hwaddr 40:a5:ef:d8:2c:16 and ssid "RED Brick 110 KRACK FIX" Deriving WPA PSK based on passphrase SSID - hexdump_ascii(len=23): 52 45 44 20 42 72 69 63 6b 20 31 31 30 20 4b 52 RED Brick 110 KR 41 43 4b 20 46 49 58 ACK FIX PSK (ASCII passphrase) - hexdump_ascii(len=11): [REMOVED] PSK (from passphrase) - hexdump(len=32): [REMOVED] random: Got 20/20 bytes from /dev/random Get randomness: len=32 entropy=0 GMK - hexdump(len=32): [REMOVED] Get randomness: len=32 entropy=0 Key Counter - hexdump(len=32): [REMOVED] WPA: Delay group state machine start until Beacon frames have been configured rtl871x_set_beacon_ops rtl871x_set_hidden_ssid_ops ioctl[RTL_IOCTL_HOSTAPD]: Operation not supported ioctl[RTL_IOCTL_HOSTAPD]: Operation not supported Failed to set beacon parameters wlx40a5efd82c16: Flushing old station entries ioctl[RTL_IOCTL_HOSTAPD]: Operation not supported wlx40a5efd82c16: Could not connect to kernel driver wlx40a5efd82c16: Deauthenticate all stations +rtl871x_sta_deauth_ops, ff:ff:ff:ff:ff:ff is deauth, reason=3 rtl871x_set_key_ops ioctl[RTL_IOCTL_HOSTAPD]: Operation not supported Failed to set encryption. Failed to clear default encryption keys (ifname=wlx40a5efd82c16 keyidx=0) rtl871x_set_key_ops ioctl[RTL_IOCTL_HOSTAPD]: Operation not supported Failed to set encryption. Failed to clear default encryption keys (ifname=wlx40a5efd82c16 keyidx=1) rtl871x_set_key_ops ioctl[RTL_IOCTL_HOSTAPD]: Operation not supported Failed to set encryption. Failed to clear default encryption keys (ifname=wlx40a5efd82c16 keyidx=2) rtl871x_set_key_ops ioctl[RTL_IOCTL_HOSTAPD]: Operation not supported Failed to set encryption. Failed to clear default encryption keys (ifname=wlx40a5efd82c16 keyidx=3) hostapd_free_hapd_data(wlx40a5efd82c16) Interface initialization failed wlx40a5efd82c16: interface state UNINITIALIZED->DISABLED wlx40a5efd82c16: AP-DISABLED wlx40a5efd82c16: Unable to setup interface. hostapd_interface_deinit_free(0x5292e0) hostapd_interface_deinit_free: num_bss=1 conf->num_bss=1 hostapd_interface_deinit(0x5292e0) wlx40a5efd82c16: interface state DISABLED->DISABLED hostapd_bss_deinit: deinit bss wlx40a5efd82c16 wlx40a5efd82c16: Flushing old station entries ioctl[RTL_IOCTL_HOSTAPD]: Operation not supported wlx40a5efd82c16: Could not connect to kernel driver wlx40a5efd82c16: Deauthenticate all stations +rtl871x_sta_deauth_ops, ff:ff:ff:ff:ff:ff is deauth, reason=3 rtl871x_set_key_ops ioctl[RTL_IOCTL_HOSTAPD]: Operation not supported Failed to set encryption. Failed to clear default encryption keys (ifname=wlx40a5efd82c16 keyidx=0) rtl871x_set_key_ops ioctl[RTL_IOCTL_HOSTAPD]: Operation not supported Failed to set encryption. Failed to clear default encryption keys (ifname=wlx40a5efd82c16 keyidx=1) rtl871x_set_key_ops ioctl[RTL_IOCTL_HOSTAPD]: Operation not supported Failed to set encryption. Failed to clear default encryption keys (ifname=wlx40a5efd82c16 keyidx=2) rtl871x_set_key_ops ioctl[RTL_IOCTL_HOSTAPD]: Operation not supported Failed to set encryption. Failed to clear default encryption keys (ifname=wlx40a5efd82c16 keyidx=3) wlx40a5efd82c16: AP-DISABLED hostapd_cleanup(hapd=0x529e98 (wlx40a5efd82c16)) hostapd_free_hapd_data: Interface wlx40a5efd82c16 wasn't started hostapd_interface_deinit_free: driver=0x5268ac drv_priv=0x5297f8 -> hapd_deinit hostapd_interface_free(0x5292e0) hostapd_interface_free: free hapd 0x529e98 hostapd_cleanup_iface(0x5292e0) hostapd_cleanup_iface_partial(0x5292e0) hostapd_cleanup_iface: free iface=0x5292e0 ELOOP: remaining socket: sock=6 eloop_data=0x529930 user_data=(nil) handler=0x4def35