Open AloisKlingler opened 5 years ago
Does this warning occur imediately after connecting to wifi? Except of this warning, are there any consequences to the wifi connection? Could you describe the access points (hardware)?
hello,
no, it does not immediately after connecting to wifi. I could not see any time dependency yet. The wifi connection to the device is sometimes very laggy. I could not narrow down yet if the trace is anyhow correlated to the connection issue. it recovers the connection to a stable state without rebooting. Neither the RPI, nor any of the access points change position.
I have two Zyxel NWA1123-ACv2 (2.4Ghz and 5GHz):
Channel:9
Frequency:2.452 GHz (Channel 9)
Quality=50/70 Signal level=-60 dBm
Encryption key:on
ESSID:""
Bit Rates:1 Mb/s; 2 Mb/s; 5.5 Mb/s; 11 Mb/s; 6 Mb/s
9 Mb/s; 12 Mb/s; 18 Mb/s
Bit Rates:24 Mb/s; 36 Mb/s; 48 Mb/s; 54 Mb/s
Mode:Master
Extra:tsf=0000000000000000
Extra: Last beacon: 50ms ago
IE: Unknown: 0000
IE: Unknown: 010882848B960C121824
IE: Unknown: 030109
IE: Unknown: 050400010000
IE: Unknown: 0706434820010D14
IE: Unknown: 2A0102
IE: Unknown: 32043048606C
IE: Unknown: 2D1AAD0103FFFF0000000000000000000001000000000406E6A70C00
IE: Unknown: 3D1609000500000000000000000000000000000000000000
IE: Unknown: 4A0E14000A002C01C800140005001900
IE: Unknown: 7F080100000000000040
IE: Unknown: DD180050F2020101000003A4000027A4000042435E0062322F00
IE: Unknown: DD0900037F01010000FF7F
IE: IEEE 802.11i/WPA2 Version 1
Group Cipher : CCMP
Pairwise Ciphers (1) : CCMP
Authentication Suites (1) : PSK
IE: WPA Version 1
Group Cipher : CCMP
Pairwise Ciphers (1) : CCMP
Authentication Suites (1) : PSK
Cell 04 - Address: 62:F4:97:F9:00:F5
Channel:9
Frequency:2.452 GHz (Channel 9)
Quality=50/70 Signal level=-60 dBm
Encryption key:on
ESSID:""
Bit Rates:1 Mb/s; 2 Mb/s; 5.5 Mb/s; 11 Mb/s; 6 Mb/s
9 Mb/s; 12 Mb/s; 18 Mb/s
Bit Rates:24 Mb/s; 36 Mb/s; 48 Mb/s; 54 Mb/s
Mode:Master
Extra:tsf=0000000000000000
Extra: Last beacon: 50ms ago
IE: Unknown: 0000
IE: Unknown: 010882848B960C121824
IE: Unknown: 030109
IE: Unknown: 050400010000
IE: Unknown: 0706434820010D14
IE: Unknown: 2A0102
IE: Unknown: 32043048606C
IE: Unknown: 2D1AAD0103FFFF0000000000000000000001000000000406E6A70C00
IE: Unknown: 3D1609000500000000000000000000000000000000000000
IE: Unknown: 4A0E14000A002C01C800140005001900
IE: Unknown: 7F080100000000000040
IE: Unknown: DD180050F2020101000003A4000027A4000042435E0062322F00
IE: Unknown: DD0900037F01010000FF7F
IE: IEEE 802.11i/WPA2 Version 1
Group Cipher : CCMP
Pairwise Ciphers (1) : CCMP
Authentication Suites (1) : PSK
IE: WPA Version 1
Group Cipher : CCMP
Pairwise Ciphers (1) : CCMP
Authentication Suites (1) : PSK
Cell 05 - Address: 62:F4:97:F9:00:F5
Channel:9
Frequency:2.452 GHz (Channel 9)
Quality=52/70 Signal level=-58 dBm
Encryption key:on
ESSID:"KlinglAIRDMZ"
Bit Rates:1 Mb/s; 2 Mb/s; 5.5 Mb/s; 11 Mb/s; 6 Mb/s
9 Mb/s; 12 Mb/s; 18 Mb/s
Bit Rates:24 Mb/s; 36 Mb/s; 48 Mb/s; 54 Mb/s
Mode:Master
Extra:tsf=0000000000000000
Extra: Last beacon: 1414360ms ago
IE: Unknown: 000C4B6C696E676C414952444D5A
IE: Unknown: 010882848B960C121824
IE: Unknown: 030109
IE: Unknown: 0706434820010D14
IE: Unknown: 2A0102
IE: Unknown: 32043048606C
IE: Unknown: 2D1AAD0103FFFF0000000000000000000001000000000406E6A70C00
IE: Unknown: 3D1609000500000000000000000000000000000000000000
IE: Unknown: 4A0E14000A002C01C800140005001900
IE: Unknown: 7F080100000000000040
IE: Unknown: DD180050F2020101000003A4000027A4000042435E0062322F00
IE: Unknown: DD0900037F01010000FF7F
IE: IEEE 802.11i/WPA2 Version 1
Group Cipher : CCMP
Pairwise Ciphers (1) : CCMP
Authentication Suites (1) : PSK
IE: WPA Version 1
Group Cipher : CCMP
Pairwise Ciphers (1) : CCMP
Authentication Suites (1) : PSK
Channel:1
Frequency:2.412 GHz (Channel 1)
Quality=26/70 Signal level=-84 dBm
Encryption key:on
ESSID:""
Bit Rates:1 Mb/s; 2 Mb/s; 5.5 Mb/s; 11 Mb/s; 6 Mb/s
9 Mb/s; 12 Mb/s; 18 Mb/s
Bit Rates:24 Mb/s; 36 Mb/s; 48 Mb/s; 54 Mb/s
Mode:Master
Extra:tsf=0000000000000000
Extra: Last beacon: 50ms ago
IE: Unknown: 0000
IE: Unknown: 010882848B960C121824
IE: Unknown: 030101
IE: Unknown: 050400010000
IE: Unknown: 0706434820010D14
IE: Unknown: 2A0100
IE: Unknown: 32043048606C
IE: Unknown: 2D1AAD0103FFFF0000000000000000000001000000000406E6A70C00
IE: Unknown: 3D1601080400000000000000000000000000000000000000
IE: Unknown: 4A0E14000A002C01C800140005001900
IE: Unknown: 7F080100000000000040
IE: Unknown: DD180050F2020101000003A4000027A4000042435E0062322F00
IE: Unknown: DD0900037F01010000FF7F
IE: IEEE 802.11i/WPA2 Version 1
Group Cipher : TKIP
Pairwise Ciphers (2) : CCMP TKIP
Authentication Suites (1) : PSK
IE: WPA Version 1
Group Cipher : TKIP
Pairwise Ciphers (2) : CCMP TKIP
Authentication Suites (1) : PSK
and one linux.based hostapd with Atheros AR5416 (AR5008) 2.5GHz only:
Channel:2
Frequency:2.417 GHz (Channel 2)
Quality=32/70 Signal level=-78 dBm
Encryption key:on
ESSID:"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
Bit Rates:1 Mb/s; 2 Mb/s; 5.5 Mb/s; 11 Mb/s; 6 Mb/s
9 Mb/s; 12 Mb/s; 18 Mb/s
Bit Rates:24 Mb/s; 36 Mb/s; 48 Mb/s; 54 Mb/s
Mode:Master
Extra:tsf=0000000000000000
Extra: Last beacon: 40ms ago
IE: Unknown: 000C000000000000000000000000
IE: Unknown: 010882848B960C121824
IE: Unknown: 030102
IE: Unknown: 050401020000
IE: Unknown: 2A0104
IE: Unknown: 32043048606C
IE: IEEE 802.11i/WPA2 Version 1
Group Cipher : TKIP
Pairwise Ciphers (2) : CCMP TKIP
Authentication Suites (1) : PSK
IE: WPA Version 1
Group Cipher : TKIP
Pairwise Ciphers (2) : CCMP TKIP
Authentication Suites (1) : PSK
IE: Unknown: 2D1A4E101BFFFF000000000000000000000100000000000000000000
IE: Unknown: 3D1602001700000000000000000000000000000000000000
IE: Unknown: 7F080000000200000040
IE: Unknown: DD180050F2020101000003A4000027A4000042435E0062322F00
Could you please rearrange all your outputs, because they are hard to read. What connection issue? You provided a kernel trace, but never mentioned a explicit connection issue. Does the connection issue occur before the trace or at the same time?
I am sorry I saw the misarranged code blocks but tought it's a browser issue on my side. :-) I edited them so they look readable now.
As I am not sure that my connectivity issue is related to the traces I did not mention it on starting the issue.
The wifi connection to the device is sometimes very laggy. I can see with tcpdump a lot of retransmissons, duplicate packets, but I could not find a causing part yet. The result is, e.g., I cannot connect to ssh during this period. If I get a shell, the MOTD does not come through, the connection does not response any more. "dmesg" output looks like I am connected over a serial cable and stalls erratic. pinging the box works (with normal wifi-latency), with small and with large packets, the whole time flawless. The connection state recovers stable connection without rebooting, during the unstable connection there are not occuring traces during the issue. That's why I am not sure if the laggy connection is related to the traces.
The device is headless and the connectivity issue happens irregularly, sometimes it needs days to occur, sometimes it is occuring several times a day. I have not found a workaround yet. Rebooting does not help if the connection is laggy (so after the reboot it is still laggy - also without traces).
Thanks. :-)
Alois
nobody? :-(
I've seen the same backtrace, & long after the device has come up. It did not break network connectivity.
[162216.813332] ------------[ cut here ]------------
[162216.813505] WARNING: CPU: 3 PID: 7156 at net/wireless/sme.c:945 cfg80211_roamed+0x224/0x238 [cfg80211]
[162216.813511] Modules linked in: bnep hci_uart btbcm serdev bluetooth ecdh_generic joydev brcmfmac brcmutil hid_microsoft sha256_generic cfg80211 bcm2835_v4l2(C) bcm2835_codec(C) v4l2_mem2mem bcm2835_mmal_vchiq(C) videobuf2_dma_contig v4l2_common rfkill videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 videobuf2_common raspberrypi_hwmon snd_bcm2835(C) hwmon snd_pcm videodev snd_timer media snd vc_sm_cma(C) evdev fixed uio_pdrv_genirq uio ip_tables x_tables ipv6
[162216.813636] CPU: 3 PID: 7156 Comm: kworker/3:2 Tainted: G C 4.19.66-v7+ #1253
[162216.813638] Hardware name: BCM2835
[162216.813742] Workqueue: events brcmf_fweh_event_worker [brcmfmac]
[162216.813767] [<80111f38>] (unwind_backtrace) from [<8010d4b0>] (show_stack+0x20/0x24)
[162216.813778] [<8010d4b0>] (show_stack) from [<808191e0>] (dump_stack+0xd4/0x118)
[162216.813791] [<808191e0>] (dump_stack) from [<801209c8>] (__warn+0x104/0x11c)
[162216.813799] [<801209c8>] (__warn) from [<80120b18>] (warn_slowpath_null+0x50/0x58)
[162216.813927] [<80120b18>] (warn_slowpath_null) from [<7f38edec>] (cfg80211_roamed+0x224/0x238 [cfg80211])
[162216.814127] [<7f38edec>] (cfg80211_roamed [cfg80211]) from [<7f558cb8>] (brcmf_notify_roaming_status+0x1b0/0x240 [brcmfmac])
[162216.814289] [<7f558cb8>] (brcmf_notify_roaming_status [brcmfmac]) from [<7f5629a4>] (brcmf_fweh_call_event_handler+0x48/0x88 [brcmfmac])
[162216.814447] [<7f5629a4>] (brcmf_fweh_call_event_handler [brcmfmac]) from [<7f562c08>] (brcmf_fweh_event_worker+0x224/0x49c [brcmfmac])
[162216.814534] [<7f562c08>] (brcmf_fweh_event_worker [brcmfmac]) from [<8013bf0c>] (process_one_work+0x170/0x458)
[162216.814544] [<8013bf0c>] (process_one_work) from [<8013c250>] (worker_thread+0x5c/0x5a4)
[162216.814553] [<8013c250>] (worker_thread) from [<8014253c>] (kthread+0x138/0x168)
[162216.814562] [<8014253c>] (kthread) from [<801010ac>] (ret_from_fork+0x14/0x28)
[162216.814566] Exception stack(0xb63f1fb0 to 0xb63f1ff8)
[162216.814571] 1fa0: 00000000 00000000 00000000 00000000
[162216.814577] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[162216.814582] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[162216.814669] ---[ end trace afc3e43e83209e2a ]---
It's specifically in this code:
if (!info->bss) {
info->bss = cfg80211_get_bss(wdev->wiphy, info->channel,
info->bssid, wdev->ssid,
wdev->ssid_len,
wdev->conn_bss_type,
IEEE80211_PRIVACY_ANY);
}
if (WARN_ON(!info->bss))
return;
That's the easy bit - now work out why it's happening, and how to prevent it.
Seeing same issues here with RPi zero-w
[115122.460692] brcmfmac: brcmf_update_bss_info: wl dtim_assoc failed (-52)
[115122.461148] ------------[ cut here ]------------
[115122.462374] WARNING: CPU: 0 PID: 22850 at net/wireless/sme.c:752 cfg80211_connect_result+0x388/0x400 [cfg80211]
[115122.462389] Modules linked in: bnep hci_uart btbcm serdev bluetooth ecdh_generic 8021q garp stp llc brcmfmac brcmutil sha256_generic cfg80211 rfkill raspberrypi_hwmon hwmon snd_bcm2835(C) snd_pcm snd_timer bcm2835_codec(C) bcm2835_v4l2(C) v4l2_mem2mem snd v4l2_common bcm2835_mmal_vchiq(C) videobuf2_vmalloc videobuf2_dma_contig videobuf2_memops i2c_bcm2835 videobuf2_v4l2 videobuf2_common videodev media vc_sm_cma(C) uio_pdrv_genirq uio fixed i2c_dev ip_tables x_tables ipv6
[115122.462604] CPU: 0 PID: 22850 Comm: kworker/u2:2 Tainted: G C 4.19.66+ #1253
[115122.462612] Hardware name: BCM2835
[115122.463674] Workqueue: cfg80211 cfg80211_event_work [cfg80211]
[115122.463928] [
is there a way to limit BSSIDs allowed to connect to?
Also having this, with rpi4 running @sakaki- genpi64 https://github.com/sakaki-/gentoo-on-rpi-64bit
[Fri Nov 1 17:08:24 2019] ------------[ cut here ]------------
[Fri Nov 1 17:08:24 2019] WARNING: CPU: 0 PID: 30449 at net/wireless/sme.c:945 cfg80211_roamed+0x1f8/0x6b0 [cfg80211]
[Fri Nov 1 17:08:24 2019] Modules linked in: rfcomm lz4 lz4_compress aes_neon_bs aes_neon_blk crypto_simd cryptd aes_arm64 algif_skcipher af_alg hci_uart btbcm serdev 8021q
garp stp llc ipv6 bnep bluetooth ecdh_generic brcmfmac brcmutil vc4 sha256_generic drm_kms_helper cfg80211 cec snd_soc_core bcm2835_codec(C) bcm2835_v4l2(C) rfkill v4l2_mem2m
em snd_compress v3d snd_pcm_dmaengine bcm2835_mmal_vchiq(C) v4l2_common syscopyarea videobuf2_dma_contig videobuf2_vmalloc sysfillrect snd_bcm2835(C) gpu_sched sysimgblt vide
obuf2_memops fb_sys_fops drm videobuf2_v4l2 snd_pcm spidev videobuf2_common drm_panel_orientation_quirks snd_timer videodev snd raspberrypi_hwmon media hwmon rpivid_mem vc_sm
_cma(C) spi_bcm2835 uio_pdrv_genirq uio fixed
[Fri Nov 1 17:08:24 2019] CPU: 0 PID: 30449 Comm: kworker/0:2 Tainted: G WC 4.19.80-v8-3492a1b00349-p4-bis+ #2
[Fri Nov 1 17:08:24 2019] Hardware name: Raspberry Pi 4 Model B Rev 1.1 (DT)
[Fri Nov 1 17:08:24 2019] Workqueue: events brcmf_fil_bsscfg_int_get [brcmfmac]
[Fri Nov 1 17:08:24 2019] pstate: 40000005 (nZcv daif -PAN -UAO)
[Fri Nov 1 17:08:24 2019] pc : cfg80211_roamed+0x1f8/0x6b0 [cfg80211]
[Fri Nov 1 17:08:24 2019] lr : cfg80211_roamed+0x1f8/0x6b0 [cfg80211]
[Fri Nov 1 17:08:24 2019] sp : ffffff8012abbb90
[Fri Nov 1 17:08:24 2019] x29: ffffff8012abbb90 x28: ffffffc0f25942e0
[Fri Nov 1 17:08:24 2019] x27: ffffff80010eb620 x26: ffffffc0f1211380
[Fri Nov 1 17:08:24 2019] x25: 0000000000000000 x24: ffffffc0f1473000
[Fri Nov 1 17:08:24 2019] x23: ffffffc0f25942e0 x22: 00000000006000c0
[Fri Nov 1 17:08:24 2019] x21: ffffffc0f1474008 x20: ffffffc0f1473000
[Fri Nov 1 17:08:24 2019] x19: ffffff8012abbc40 x18: 0000000000000000
[Fri Nov 1 17:08:24 2019] x17: 0000000000000000 x16: 0000000000000000
[Fri Nov 1 17:08:24 2019] x15: 000000006e68ef58 x14: 0000000000000000
[Fri Nov 1 17:08:24 2019] x13: 0000000000000000 x12: ffffff8008f25000
[Fri Nov 1 17:08:24 2019] x11: ffffff8008e1f000 x10: ffffff8008f250e0
[Fri Nov 1 17:08:24 2019] x9 : 0000000000000000 x8 : 0000000000000001
[Fri Nov 1 17:08:24 2019] x7 : ffffff8008f25000 x6 : ffffffc0fbf640a0
[Fri Nov 1 17:08:24 2019] x5 : ffffffc0fbf640a0 x4 : 00000040f3180000
[Fri Nov 1 17:08:24 2019] x3 : 0000000000000002 x2 : 1ff7cf7fcd6c2700
[Fri Nov 1 17:08:24 2019] x1 : 0000000000000000 x0 : 0000000000000024
[Fri Nov 1 17:08:24 2019] Call trace:
[Fri Nov 1 17:08:24 2019] cfg80211_roamed+0x1f8/0x6b0 [cfg80211]
[Fri Nov 1 17:08:24 2019] 0xffffff80010c6498
[Fri Nov 1 17:08:24 2019] 0xffffff80010c671c
[Fri Nov 1 17:08:24 2019] brcmf_fil_bsscfg_int_get+0xdc/0x5d0 [brcmfmac]
[Fri Nov 1 17:08:24 2019] brcmf_fil_bsscfg_int_get+0x314/0x5d0 [brcmfmac]
[Fri Nov 1 17:08:24 2019] process_one_work+0x1ec/0x460
[Fri Nov 1 17:08:24 2019] worker_thread+0x48/0x430
[Fri Nov 1 17:08:24 2019] kthread+0x12c/0x130
[Fri Nov 1 17:08:24 2019] ret_from_fork+0x10/0x1c
[Fri Nov 1 17:08:24 2019] ---[ end trace f04a3f647b7b1ce5 ]---
Same here, regular PC
------------[ cut here ]------------
[896485.070193] WARNING: CPU: 3 PID: 9915 at /build/linux-ZcR2Eb/linux-4.15.0/net/wireless/sme.c:946 cfg80211_roamed+0x149/0x170 [cfg80211]
[896485.070195] Modules linked in: wl(POE) nls_iso8859_1 uas usb_storage xt_conntrack ipt_MASQUERADE nf_nat_masquerade_ipv4 nf_conntrack_netlink nfnetlink xfrm_user xfrm_algo xt_addrtype iptable_filter iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack br_netfilter bridge stp llc usb_serial_simple usbserial ufs qnx4 hfsplus hfs minix ntfs msdos jfs xfs ccm pci_stub vboxpci(OE) vboxnetadp(OE) vboxnetflt(OE) vboxdrv(OE) aufs overlay binfmt_misc intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp snd_hda_codec_hdmi kvm_intel kvm irqbypass crct10dif_pclmul crc32_pclmul ghash_clmulni_intel pcbc uvcvideo(OE) videobuf2_vmalloc videobuf2_memops aesni_intel videobuf2_v4l2 aes_x86_64 crypto_simd glue_helper videobuf2_core joydev cryptd input_leds snd_hda_codec_realtek snd_hda_codec_generic
[896485.070239] intel_cstate videodev(OE) arc4 snd_usb_audio cdc_mbim snd_hda_intel media snd_usbmidi_lib cdc_wdm intel_rapl_perf snd_hda_codec cordic brcmutil cdc_ncm snd_hda_core usbnet cdc_acm snd_hwdep snd_pcm mac80211 snd_seq_midi i915 snd_seq_midi_event cfg80211 snd_rawmidi drm_kms_helper snd_seq snd_seq_device drm i2c_algo_bit snd_timer fb_sys_fops snd syscopyarea sysfillrect sysimgblt soundcore lpc_ich video shpchp acpi_pad mac_hid sch_fq_codel parport_pc ppdev sunrpc lp parport ip_tables x_tables autofs4 btrfs zstd_compress raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear hid_generic usbhid hid ahci r8169 libahci mii [last unloaded: bcma]
[896485.070292] CPU: 3 PID: 9915 Comm: wl_event_handle Tainted: P W OE 4.15.0-91-generic #92-Ubuntu
[896485.070294] Hardware name: To be filled by O.E.M. To be filled by O.E.M./CRESCENTBAY, BIOS 5.6.5 01/29/2015
[896485.070325] RIP: 0010:cfg80211_roamed+0x149/0x170 [cfg80211]
[896485.070327] RSP: 0018:ffffb19f418ebe20 EFLAGS: 00010282
[896485.070330] RAX: 0000000000000024 RBX: 00000000014000c0 RCX: 0000000000000006
[896485.070333] RDX: 0000000000000000 RSI: ffff9cc29f396498 RDI: ffff9cc29f396490
[896485.070335] RBP: ffffb19f418ebe48 R08: 0000000000002736 R09: 0000000000000004
[896485.070337] R10: ffff9cc284f0df7a R11: 0000000000000001 R12: ffffb19f418ebe60
[896485.070339] R13: ffff9cc15be97400 R14: ffff9cc284f0d2e0 R15: dead000000000100
[896485.070342] FS: 0000000000000000(0000) GS:ffff9cc29f380000(0000) knlGS:0000000000000000
[896485.070344] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[896485.070347] CR2: 00002da5080ea000 CR3: 00000000ade0a004 CR4: 00000000001606e0
[896485.070349] Call Trace:
[896485.070445] wl_notify_roaming_status+0x103/0x180 [wl]
[896485.070514] wl_event_handler+0x7a/0x1f0 [wl]
[896485.070520] kthread+0x121/0x140
[896485.070581] ? wl_notify_scan_status+0x330/0x330 [wl]
[896485.070585] ? kthread_create_worker_on_cpu+0x70/0x70
[896485.070593] ret_from_fork+0x35/0x40
[896485.070595] Code: 8d a8 00 00 00 4c 89 f7 48 8b 36 e8 e2 a3 fd ff 48 85 c0 49 89 44 24 08 5a 0f 85 f9 fe ff ff 48 c7 c7 d0 00 7c c0 e8 27 99 95 e7 <0f> 0b eb ae 49 8b 74 24 08 49 8b 7d 00 e8 65 a6 fd ff 48 8d 65
[896485.070632] ---[ end trace 88b8b14167a21e09 ]---
Hi there,
the "roaming" oops seems to be still present. I get the oops regularly on Zero W and also Zero 2W with different kernels up to 6.6.16. The trace looks like the same started from Alois. In most cases the device keeps reachable, but sometimes ... I also noticed, that after an oops the value-line "wlan0:" in /proc/net/wireless disappears. We are using a D-Link wifi network (DWC 2000 + 20x DWL2600AP).
Jan 05 14:27:18 rpz2 kernel: ------------[ cut here ]------------
Jan 05 14:27:18 rpz2 kernel: WARNING: CPU: 0 PID: 11794 at net/wireless/sme.c:1181 cfg80211_roamed+0x3a8/0x408 [cfg80211]
Jan 05 14:27:18 rpz2 kernel: Modules linked in: nf_tables nfnetlink dm_mod tcp_diag inet_diag spidev brcmfmac brcmutil sha256_generic libsha256 cfg80211 8>
Jan 05 14:27:18 rpz2 kernel: CPU: 0 PID: 11794 Comm: kworker/0:4 Tainted: G W 6.1.66+ #1707
Jan 05 14:27:18 rpz2 kernel: Hardware name: BCM2835
Jan 05 14:27:18 rpz2 kernel: Workqueue: events brcmf_fweh_event_worker [brcmfmac]
Jan 05 14:27:18 rpz2 kernel: unwind_backtrace from show_stack+0x18/0x1c
Jan 05 14:27:18 rpz2 kernel: show_stack from dump_stack_lvl+0x34/0x58
Jan 05 14:27:18 rpz2 kernel: dump_stack_lvl from __warn+0x7c/0xf8
Jan 05 14:27:18 rpz2 kernel: __warn from warn_slowpath_fmt+0x60/0xcc
Jan 05 14:27:18 rpz2 kernel: warn_slowpath_fmt from cfg80211_roamed+0x3a8/0x408 [cfg80211]
Jan 05 14:27:18 rpz2 kernel: cfg80211_roamed [cfg80211] from brcmf_bss_roaming_done+0x160/0x234 [brcmfmac]
Jan 05 14:27:18 rpz2 kernel: brcmf_bss_roaming_done [brcmfmac] from brcmf_notify_roaming_status+0x40/0x64 [brcmfmac]
Jan 05 14:27:18 rpz2 kernel: brcmf_notify_roaming_status [brcmfmac] from brcmf_fweh_event_worker+0x280/0x570 [brcmfmac]
Jan 05 14:27:18 rpz2 kernel: brcmf_fweh_event_worker [brcmfmac] from process_one_work+0x204/0x488
Jan 05 14:27:18 rpz2 kernel: process_one_work from worker_thread+0x34/0x53c
Jan 05 14:27:18 rpz2 kernel: worker_thread from kthread+0xc0/0xe4
Jan 05 14:27:18 rpz2 kernel: kthread from ret_from_fork+0x14/0x30
Jan 05 14:27:18 rpz2 kernel: Exception stack(0xe0c21fb0 to 0xe0c21ff8)
Jan 05 14:27:18 rpz2 kernel: 1fa0: 00000000 00000000 00000000 00000000
Jan 05 14:27:18 rpz2 kernel: 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Jan 05 14:27:18 rpz2 kernel: 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Jan 05 14:27:18 rpz2 kernel: ---[ end trace 0000000000000000 ]---
@Broezel Can you please provide more information about the roaming setup:
@Broezel Can you please provide more information about the roaming setup:
* What type of Wifi roaming does the D-Link wifi network use (ESSID like Alois)?
Cell 01 - Address: 6C:19:8F:7D:9F:D5 Channel:1 Frequency:2.412 GHz (Channel 1) Quality=36/70 Signal level=-74 dBm Encryption key:on ESSID:"*********" Bit Rates:5.5 Mb/s; 11 Mb/s; 12 Mb/s; 18 Mb/s; 24 Mb/s 36 Mb/s; 48 Mb/s; 54 Mb/s Bit Rates:6 Mb/s; 9 Mb/s Mode:Master Extra:tsf=0000000000000000 Extra: Last beacon: 85246890ms ago IE: Unknown: 0009766F736C616D697363 IE: Unknown: 01088B9618243048606C IE: Unknown: 030101 IE: Unknown: 0706444520010D14 IE: Unknown: 2A0100 IE: Unknown: 2F0100 IE: IEEE 802.11i/WPA2 Version 1 Group Cipher : TKIP Pairwise Ciphers (2) : CCMP TKIP Authentication Suites (1) : PSK IE: Unknown: 32020C12 IE: Unknown: 2D1A7C181FFFFF000000000000000000000000000000000000000000 IE: Unknown: 3D1601080000000000000000000000000000000000000000 IE: Unknown: 4A0E14000A002C01C800140005001900 IE: Unknown: 7F0101 IE: Unknown: DD090010180200000C0000 IE: WPA Version 1 Group Cipher : TKIP Pairwise Ciphers (2) : CCMP TKIP Authentication Suites (1) : PSK IE: Unknown: DD180050F2020101800003A4000027A4000042435E0062322F00 IE: Unknown: DD0A0002BC016C198F7D9FC0
>
> * How long does it take after boot to trigger this warning?
>
This varies between a few hours and several days. Yesterday evening i've just added "brcmfmac.debug=0x100000"
to the command line and made a reboot. Currently no messages so far.
>
> * Is the Raspberry Pi in the range of two roaming APs?
>
Yes.
> * Do you use wpa_supplicant and is there a specific setting?
>
Here are our settings:
ctrl_interface=DIR=/var/run/wpa_supplicant GROUP=netdev update_config=1 country=DE network={ key_mgmt=WPA-PSK ssid="****" psk=**** proto=RSN pairwise=TKIP group=TKIP scan_ssid=1 }
... with "brcmfmac.debug=0x100000":
[85929.249372] ------------[ cut here ]------------
[85929.249418] WARNING: CPU: 0 PID: 13250 at net/wireless/sme.c:1181 cfg80211_roamed+0x3a8/0x408 [cfg80211]
[85929.252915] Modules linked in: nf_tables nfnetlink dm_mod tcp_diag inet_diag spidev brcmfmac brcmutil sha256_generic libsha256 zram zsmalloc 8021q garp stp llc cfg80211 rfkill raspberrypi_hwmon i2c_bcm2835 spi_bcm2835 fixed uio_pdrv_genirq uio fuse ip_tables x_tables
[85929.253233] CPU: 0 PID: 13250 Comm: kworker/0:1 Not tainted 6.1.21+ #1642
[85929.253269] Hardware name: BCM2835
[85929.253287] Workqueue: events brcmf_fweh_event_worker [brcmfmac]
[85929.254018] unwind_backtrace from show_stack+0x18/0x1c
[85929.254076] show_stack from dump_stack_lvl+0x34/0x58
[85929.254120] dump_stack_lvl from __warn+0x7c/0xf8
[85929.254168] __warn from warn_slowpath_fmt+0x60/0xcc
[85929.254219] warn_slowpath_fmt from cfg80211_roamed+0x3a8/0x408 [cfg80211]
[85929.257671] cfg80211_roamed [cfg80211] from brcmf_bss_roaming_done+0x15c/0x230 [brcmfmac]
[85929.261971] brcmf_bss_roaming_done [brcmfmac] from brcmf_notify_roaming_status+0x40/0x64 [brcmfmac]
[85929.263024] brcmf_notify_roaming_status [brcmfmac] from brcmf_fweh_event_worker+0x280/0x570 [brcmfmac]
[85929.264067] brcmf_fweh_event_worker [brcmfmac] from process_one_work+0x204/0x48c
[85929.264656] process_one_work from worker_thread+0x34/0x53c
[85929.264702] worker_thread from kthread+0xc0/0xe4
[85929.264748] kthread from ret_from_fork+0x14/0x34
[85929.264779] Exception stack(0xe18f5fb0 to 0xe18f5ff8)
[85929.264804] 5fa0: 00000000 00000000 00000000 00000000
[85929.264828] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[85929.264850] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[85929.265033] ---[ end trace 0000000000000000 ]---
brcmfmac.debug=0x100000
enables the printing of messages from the firmware to the kernel log; you should look for lines beginning brcmfmac: CONSOLE:
. It won't change the contents of the WARNING dumps.
I had the same on a Raspberry Pi Zero 2 W. The Raspberry Pi had lost its IP address and with that also internet connectivity, and showed the dmesg warning as above. "sme.c:1181 cfg80211_roamed..."
sudo ifconfig wlan0 down sudo ifconfig wlan0 up
brought the IP address and internet connectivity back without a reboot or any other command. This is for a device that is running headless and should stay up without intervention for years, so while this maybe helps for debugging, it is not a solution for me yet.
Same Warning on my Raspbery Pi
[19171.499565] WARNING: CPU: 3 PID: 1123 at net/wireless/sme.c:1181 cfg80211_roamed+0x380/0x3d4 [cfg80211]
[19171.500198] Modules linked in: brcmfmac brcmutil sha256_generic cfg80211 bcm2835_codec(C) raspberrypi_hwmon v4l2_mem2mem bcm2835_v4l2(C) bcm2835_isp(C) videobuf2_vmalloc bcm2835_mmal_vchiq(C) videobuf2_dma_contig videobuf2_memops videobuf2_v4l2 videobuf2_common videodev rfkill i2c_bcm2835 bonding snd_bcm2835(C) mc vc_sm_cma(C) fuse ip_tables x_tables ipv6 overlay vc4 snd_soc_hdmi_codec snd_soc_core snd_compress snd_pcm_dmaengine snd_pcm snd_timer snd drm_display_helper drm_dma_helper drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops drm drm_panel_orientation_quirks backlight cec uio_pdrv_genirq uio fixed
[19171.500564] CPU: 3 PID: 1123 Comm: kworker/3:2 Tainted: G WC 6.1.21-v7+ #1642
[19171.500584] Hardware name: BCM2835
[19171.500597] Workqueue: events brcmf_fweh_event_worker [brcmfmac]
[19171.500961] unwind_backtrace from show_stack+0x18/0x1c
[19171.501001] show_stack from dump_stack_lvl+0x68/0x8c
[19171.501028] dump_stack_lvl from __warn+0x84/0x124
[19171.501054] __warn from warn_slowpath_fmt+0xac/0x170
[19171.501080] warn_slowpath_fmt from cfg80211_roamed+0x380/0x3d4 [cfg80211]
[19171.501597] cfg80211_roamed [cfg80211] from brcmf_bss_roaming_done+0x168/0x214 [brcmfmac]
[19171.502396] brcmf_bss_roaming_done [brcmfmac] from brcmf_notify_roaming_status+0x40/0x64 [brcmfmac]
[19171.503020] brcmf_notify_roaming_status [brcmfmac] from brcmf_fweh_event_worker+0x22c/0x4f0 [brcmfmac]
[19171.503646] brcmf_fweh_event_worker [brcmfmac] from process_one_work+0x244/0x508
[19171.503975] process_one_work from worker_thread+0x48/0x558
[19171.504007] worker_thread from kthread+0xe4/0x100
[19171.504036] kthread from ret_from_fork+0x14/0x34
[19171.504058] Exception stack(0xb88f9fb0 to 0xb88f9ff8)
[19171.504074] 9fa0: 00000000 00000000 00000000 00000000
[19171.504090] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[19171.504106] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[19171.504227] ---[ end trace 0000000000000000 ]---
I guess this happens caused by wifi roaming. I do not use ad-hoc mode, but have different APs with the same SSID running, at least two of them are reachable by this raspberry pi w zero.
wpa_supplicant.conf:
the traces look always the same:
Best regards Alois