greearb / ath10k-ct

Stand-alone ath10k driver based on Candela Technologies Linux kernel.
111 stars 40 forks source link

[OpenWRT] Could not set STA to kernel driver #107

Closed MartB closed 4 years ago

MartB commented 4 years ago

The ath10k-ct driver is currently missing the .sta_add implementation, this is needed to get 802.11r (FT) working as hostapd uses it.

Tue Dec  3 22:51:23 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:ff:ff:ff IEEE 802.11: binding station to interface 'wlan0'
Tue Dec  3 22:51:23 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:ff:ff:ff IEEE 802.11: authentication OK (FT)
Tue Dec  3 22:51:23 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:ff:ff:ff MLME: MLME-AUTHENTICATE.indication(90:2b:d2:ff:ff:ff, FT)
Tue Dec  3 22:51:23 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:ff:ff:ff IEEE 802.11: association OK (aid 1)
Tue Dec  3 22:51:23 2019 daemon.notice hostapd: wlan1: STA 90:2b:d2:ff:ff:ff IEEE 802.11: Could not set STA to kernel driver

for reference see ath9k with exposed support: https://github.com/kvalo/ath10k/blob/master/drivers/net/wireless/ath/ath9k/main.c#L2362

PS: Im new to wireless stuff in the linux kernel so if this report is invalid please tell me where i went wrong please.

Im running openwrt-master branch with this patch series: https://patchwork.ozlabs.org/project/openwrt/list/?series=141862

greearb commented 4 years ago

Can you run hostapd with verbose logging enabled and also attached 'dmesg' output from when this problem happens?

We've tested .11r in AP and STA mode with ath10k-ct and it has worked well, so I'm not sure what problem you are hitting.

Thanks, Ben

-- Ben Greear greearb@candelatech.com Candela Technologies Inc http://www.candelatech.com

MartB commented 4 years ago

@greearb In order to reproduce this i need to walk around the house which is gonna be an issue right now. I will tackle this tomorrow and provide all the output you requested.

Is there any additional step required besides setting the hostapd log_level to 0 for it to output verbose?

Edit: one thing i can answer is that the dmesg output was empty.

Edit2: this seems related https://svn.dd-wrt.com/ticket/6655 + https://forum.openwrt.org/t/rekeying-issue-driver-cant-safely-do-that/49606

Edit3: this seems like something hostapd has to figure out, as both cant be defined together https://github.com/torvalds/linux/blob/386403a115f95997c2715691226e11a7b5cffcfd/net/mac80211/main.c#L521

jeolives commented 4 years ago

Just to clarify, do you have 802.11w enabled at the same time as 802.11r?

Have you also tried testing FT-over-the-Air instead of FT-over-the-DS?

MartB commented 4 years ago

@jeolives 802.11w is enabled as optional, just like in the (dd-wrt) issue i linked, im trying to find a fix for this. Im tried both FTA and FTDS, both result in the same behavior.

Edit: As this is not the drivers fault, i wrote an email to the hostapd mailing list, lets see what they come up with. I would like to leave this open for now until i get some sort of feedback from them on how to handle this.

jeolives commented 4 years ago

There seems to be a few fixes with 802.11r FT + 802.11w PMF that didn't make it into the v2.9 tag...

However, I think it's only for when 802.11w is set to required.

https://w1.fi/cgit/hostap/commit/?id=ded56f2fafb00090118f82a135aa63b393cc66cf https://w1.fi/cgit/hostap/commit/?id=528f263c4a4bc0255a429e502336534b0a52fe35

But you should still wait for Jouni Malinen or someone else for their input.

MartB commented 4 years ago

In case its relevant it happened again, but this time its completely unrelated to 802.11r and ath10k because this happened on an ath9k interface.

Wed Dec  4 16:01:24 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: authentication OK (open system)
Wed Dec  4 16:01:24 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX WPA: event 0 notification
Wed Dec  4 16:01:24 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX MLME: MLME-AUTHENTICATE.indication(90:2b:d2:XX:XX:XX, OPEN_SYSTEM)
Wed Dec  4 16:01:24 2019 daemon.info hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: authenticated
Wed Dec  4 16:01:24 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: association SA Query attempt 1
Wed Dec  4 16:01:24 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: association SA Query attempt 2
Wed Dec  4 16:01:25 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: association SA Query attempt 3
Wed Dec  4 16:01:25 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: association SA Query attempt 4
Wed Dec  4 16:01:25 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: association SA Query attempt 5
Wed Dec  4 16:01:25 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: association SA Query timed out
Wed Dec  4 16:01:25 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: association OK (aid 1)
Wed Dec  4 16:01:25 2019 daemon.notice hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: Could not set STA to kernel driver
Wed Dec  4 16:01:28 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: authentication OK (open system)
Wed Dec  4 16:01:28 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX WPA: event 0 notification
Wed Dec  4 16:01:28 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX MLME: MLME-AUTHENTICATE.indication(90:2b:d2:XX:XX:XX, OPEN_SYSTEM)
Wed Dec  4 16:01:28 2019 daemon.info hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: authenticated
Wed Dec  4 16:01:28 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: association OK (aid 1)
Wed Dec  4 16:01:28 2019 daemon.notice hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: Could not set STA to kernel driver
Wed Dec  4 16:01:28 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: association OK (aid 1)
Wed Dec  4 16:01:28 2019 daemon.notice hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: Could not set STA to kernel driver
Wed Dec  4 16:01:29 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: association OK (aid 1)
Wed Dec  4 16:01:29 2019 daemon.notice hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: Could not set STA to kernel driver
Wed Dec  4 16:01:29 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: association OK (aid 1)
Wed Dec  4 16:01:29 2019 daemon.notice hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: Could not set STA to kernel driver
Wed Dec  4 16:01:29 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: association OK (aid 1)
Wed Dec  4 16:01:29 2019 daemon.notice hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: Could not set STA to kernel driver
Wed Dec  4 16:01:32 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: authentication OK (open system)
Wed Dec  4 16:01:32 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX WPA: event 0 notification
Wed Dec  4 16:01:32 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX MLME: MLME-AUTHENTICATE.indication(90:2b:d2:XX:XX:XX, OPEN_SYSTEM)
Wed Dec  4 16:01:32 2019 daemon.info hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: authenticated
Wed Dec  4 16:01:32 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: association OK (aid 1)
Wed Dec  4 16:01:32 2019 daemon.notice hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: Could not set STA to kernel driver
Wed Dec  4 16:01:32 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: association OK (aid 1)
Wed Dec  4 16:01:32 2019 daemon.notice hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: Could not set STA to kernel driver
Wed Dec  4 16:01:33 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: association OK (aid 1)
Wed Dec  4 16:01:33 2019 daemon.notice hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: Could not set STA to kernel driver
Wed Dec  4 16:01:33 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: association OK (aid 1)
Wed Dec  4 16:01:33 2019 daemon.notice hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: Could not set STA to kernel driver
Wed Dec  4 16:01:33 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: association OK (aid 1)
Wed Dec  4 16:01:33 2019 daemon.notice hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: Could not set STA to kernel driver
Wed Dec  4 16:01:40 2019 daemon.notice hostapd: wlan1: AP-STA-DISCONNECTED 90:2b:d2:XX:XX:XX
Wed Dec  4 16:01:40 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: authentication OK (open system)
Wed Dec  4 16:01:40 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX WPA: event 0 notification
Wed Dec  4 16:01:40 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX MLME: MLME-AUTHENTICATE.indication(90:2b:d2:XX:XX:XX, OPEN_SYSTEM)
Wed Dec  4 16:01:40 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX MLME: MLME-DELETEKEYS.request(90:2b:d2:XX:XX:XX)
Wed Dec  4 16:01:40 2019 daemon.info hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: authenticated
Wed Dec  4 16:01:40 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: association OK (aid 1)
Wed Dec  4 16:01:40 2019 daemon.info hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: associated (aid 1)
Wed Dec  4 16:01:40 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX MLME: MLME-ASSOCIATE.indication(90:2b:d2:XX:XX:XX)
Wed Dec  4 16:01:40 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX MLME: MLME-DELETEKEYS.request(90:2b:d2:XX:XX:XX)
Wed Dec  4 16:01:40 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX WPA: event 1 notification
Wed Dec  4 16:01:40 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX WPA: start authentication
Wed Dec  4 16:01:40 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX WPA: WPA_PTK: sm->Disconnect
Wed Dec  4 16:01:40 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX WPA: event 3 notification
Wed Dec  4 16:01:40 2019 daemon.notice hostapd: wlan1: CTRL-EVENT-EAP-STARTED 90:2b:d2:XX:XX:XX
Wed Dec  4 16:01:40 2019 daemon.notice hostapd: wlan1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=1
Wed Dec  4 16:01:40 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: Sending EAP Packet (identifier 1)
Wed Dec  4 16:01:40 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX MLME: MLME-DEAUTHENTICATE.indication(90:2b:d2:XX:XX:XX, 2)
Wed Dec  4 16:01:40 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX MLME: MLME-DELETEKEYS.request(90:2b:d2:XX:XX:XX)
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: authentication OK (open system)
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX WPA: event 0 notification
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX MLME: MLME-AUTHENTICATE.indication(90:2b:d2:XX:XX:XX, OPEN_SYSTEM)
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX MLME: MLME-DELETEKEYS.request(90:2b:d2:XX:XX:XX)
Wed Dec  4 16:01:45 2019 daemon.info hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: authenticated
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: association OK (aid 1)
Wed Dec  4 16:01:45 2019 daemon.info hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: associated (aid 1)
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX MLME: MLME-ASSOCIATE.indication(90:2b:d2:XX:XX:XX)
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX MLME: MLME-DELETEKEYS.request(90:2b:d2:XX:XX:XX)
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX WPA: event 1 notification
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: unauthorizing port
Wed Dec  4 16:01:45 2019 daemon.notice hostapd: wlan1: CTRL-EVENT-EAP-STARTED 90:2b:d2:XX:XX:XX
Wed Dec  4 16:01:45 2019 daemon.notice hostapd: wlan1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=1
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: Sending EAP Packet (identifier 22)
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: received EAP packet (code=2 id=22 len=17) from STA: EAP Response-Identity (1)
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: STA identity 'radius-identity'
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Sending RADIUS message to authentication server
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Next RADIUS client retransmit in 3 seconds
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Received 80 bytes from RADIUS server
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Received RADIUS message
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: decapsulated EAP packet (code=1 id=23 len=22) from RADIUS server: EAP-Request-MD5 (4)
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: Sending EAP Packet (identifier 23)
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: received EAP packet (code=2 id=23 len=6) from STA: EAP Response-unknown (3)
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Sending RADIUS message to authentication server
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Next RADIUS client retransmit in 3 seconds
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Received 64 bytes from RADIUS server
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Received RADIUS message
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: decapsulated EAP packet (code=1 id=24 len=6) from RADIUS server: EAP-Request-PEAP (25)
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: Sending EAP Packet (identifier 24)
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: received EAP packet (code=2 id=24 len=141) from STA: EAP Response-PEAP (25)
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Sending RADIUS message to authentication server
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Next RADIUS client retransmit in 3 seconds
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Received 1068 bytes from RADIUS server
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Received RADIUS message
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: decapsulated EAP packet (code=1 id=25 len=1004) from RADIUS server: EAP-Request-PEAP (25)
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: Sending EAP Packet (identifier 25)
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: received EAP packet (code=2 id=25 len=6) from STA: EAP Response-PEAP (25)
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Sending RADIUS message to authentication server
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Next RADIUS client retransmit in 3 seconds
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Received 1064 bytes from RADIUS server
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Received RADIUS message
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: decapsulated EAP packet (code=1 id=26 len=1000) from RADIUS server: EAP-Request-PEAP (25)
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: Sending EAP Packet (identifier 26)
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: received EAP packet (code=2 id=26 len=6) from STA: EAP Response-PEAP (25)
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Sending RADIUS message to authentication server
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Next RADIUS client retransmit in 3 seconds
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Received 779 bytes from RADIUS server
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Received RADIUS message
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: decapsulated EAP packet (code=1 id=27 len=717) from RADIUS server: EAP-Request-PEAP (25)
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: Sending EAP Packet (identifier 27)
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: received EAP packet (code=2 id=27 len=136) from STA: EAP Response-PEAP (25)
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Sending RADIUS message to authentication server
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Next RADIUS client retransmit in 3 seconds
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Received 115 bytes from RADIUS server
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Received RADIUS message
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: decapsulated EAP packet (code=1 id=28 len=57) from RADIUS server: EAP-Request-PEAP (25)
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: Sending EAP Packet (identifier 28)
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: received EAP packet (code=2 id=28 len=6) from STA: EAP Response-PEAP (25)
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Sending RADIUS message to authentication server
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Next RADIUS client retransmit in 3 seconds
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Received 98 bytes from RADIUS server
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Received RADIUS message
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: decapsulated EAP packet (code=1 id=29 len=40) from RADIUS server: EAP-Request-PEAP (25)
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: Sending EAP Packet (identifier 29)
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: received EAP packet (code=2 id=29 len=48) from STA: EAP Response-PEAP (25)
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Sending RADIUS message to authentication server
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Next RADIUS client retransmit in 3 seconds
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Received 132 bytes from RADIUS server
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Received RADIUS message
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: decapsulated EAP packet (code=1 id=30 len=74) from RADIUS server: EAP-Request-PEAP (25)
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: Sending EAP Packet (identifier 30)
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: received EAP packet (code=2 id=30 len=102) from STA: EAP Response-PEAP (25)
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Sending RADIUS message to authentication server
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Next RADIUS client retransmit in 3 seconds
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Received 140 bytes from RADIUS server
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Received RADIUS message
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: decapsulated EAP packet (code=1 id=31 len=82) from RADIUS server: EAP-Request-PEAP (25)
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: Sending EAP Packet (identifier 31)
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: received EAP packet (code=2 id=31 len=37) from STA: EAP Response-PEAP (25)
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Sending RADIUS message to authentication server
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Next RADIUS client retransmit in 3 seconds
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Received 104 bytes from RADIUS server
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Received RADIUS message
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: decapsulated EAP packet (code=1 id=32 len=46) from RADIUS server: EAP-Request-PEAP (25)
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: Sending EAP Packet (identifier 32)
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: received EAP packet (code=2 id=32 len=46) from STA: EAP Response-PEAP (25)
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Sending RADIUS message to authentication server
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Next RADIUS client retransmit in 3 seconds
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Received 174 bytes from RADIUS server
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Received RADIUS message
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: binding station to interface 'wlan1'
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: old identity 'radius-identity' updated with User-Name from Access-Accept 'radius-identity'
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: decapsulated EAP packet (code=3 id=32 len=4) from RADIUS server: EAP Success
Wed Dec  4 16:01:45 2019 daemon.notice hostapd: wlan1: CTRL-EVENT-EAP-SUCCESS2 90:2b:d2:XX:XX:XX
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: Sending EAP Packet (identifier 32)
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX WPA: sending 1/4 msg of 4-Way Handshake
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX WPA: received EAPOL-Key frame (2/4 Pairwise)
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX WPA: sending 3/4 msg of 4-Way Handshake
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX WPA: received EAPOL-Key frame (4/4 Pairwise)
Wed Dec  4 16:01:45 2019 daemon.info hostapd: wlan1: STA 90:2b:d2:XX:XX:XX WPA: pairwise key handshake completed (RSN)
Wed Dec  4 16:01:45 2019 daemon.notice hostapd: wlan1: AP-STA-CONNECTED 90:2b:d2:XX:XX:XX
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: authorizing port
Wed Dec  4 16:01:45 2019 daemon.info hostapd: wlan1: STA 90:2b:d2:XX:XX:XX RADIUS: starting accounting session XXXXXXXXXXXXXX
Wed Dec  4 16:01:45 2019 daemon.info hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: authenticated - EAP type: 25 (PEAP)
Wed Dec  4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX WPA: Added PMKSA cache entry (IEEE 802.1X)
greearb commented 4 years ago

If this is not specific to ath10k, please report the bug elsewhere so it has better chance of being fixed.

MartB commented 4 years ago

If this is not specific to ath10k, please report the bug elsewhere so it has better chance of being fixed.

yeah i already wrote to the hostapd mailing list, waiting for the reply will close this for now.