raspberrypi / linux

Kernel source tree for Raspberry Pi-provided kernel builds. Issues unrelated to the linux kernel should be posted on the community forum at https://forums.raspberrypi.com/
Other
11.22k stars 5.02k forks source link

[Pi 4] Other machines cannot connect to wireless AP when ieee80211w=1 #3619

Open hvenev opened 4 years ago

hvenev commented 4 years ago

Is this the right place for my bug report? It might be related to brcmfmac firmware. I am using the firmware from https://github.com/RPi-Distro/firmware-nonfree

Describe the bug It looks like brcmfmac does not support ieee80211w/MFP in AP mode. Clients are unable to connect to the network because the RSN IE message during handshake is different from the one in the beacon frame.

Disabling ieee80211w fixes the issue.

If I run the same hostapd.conf on my laptop (iwlwifi/iwlmvm), my phone connects to it just fine.

To reproduce hostapd.conf:

ctrl_interface=/var/run/hostapd
ctrl_interface_group=wheel

driver=nl80211

macaddr_acl=0
wmm_enabled=1
country_code=BG
ignore_broadcast_ssid=0
hw_mode=g
ieee80211n=1
ieee80211w=1
ieee80211d=1
channel=6

interface=wlan0

ssid=REDACTED
wpa=2
wpa_key_mgmt=WPA-PSK
rsn_pairwise=CCMP
wpa_passphrase=REDACTED

Expected behaviour Clients can connect to the network.

Actual behaviour Clients cannot connect to the network.

System Device: Raspberry Pi 4 Model B Rev 1.2 Kernel: rpi-5.6.y from 5377449ffb6ffe9ebfee939d52b2611130fbb836 Firwmare version: May 11 2020 18:59:41, 21bfdeee3a6ea823e2113b983390acd1eec8edfb (clean) (release) (start) OS: Fedora 32 aarch64 hostapd: hostapd-2.9-3.fc32.aarch64

Logs No errors appear on the Pi.

Here is what happens on my laptop when it tries to connect:

wpa_supplicant: wlan: SME: Trying to authenticate with dc:a6:32:87:2a:8d (SSID='REDACTED' freq=2437 MHz)
kernel: wlan: authenticate with dc:a6:32:87:2a:8d
kernel: wlan: send auth to dc:a6:32:87:2a:8d (try 1/3)
wpa_supplicant: wlan: Trying to associate with dc:a6:32:87:2a:8d (SSID='REDACTED' freq=2437 MHz)
kernel: wlan: authenticated
kernel: wlan: associate with dc:a6:32:87:2a:8d (try 1/3)
kernel: wlan: RX AssocResp from dc:a6:32:87:2a:8d (capab=0x411 status=0 aid=1)
wpa_supplicant: wlan: Associated with dc:a6:32:87:2a:8d
wpa_supplicant: wlan: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0
kernel: wlan: associated
wpa_supplicant: wlan: WPA: IE in 3/4 msg does not match with IE in Beacon/ProbeResp (src=dc:a6:32:87:2a:8d)
wpa_supplicant: WPA: RSN IE in Beacon/ProbeResp - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
wpa_supplicant: WPA: RSN IE in 3/4 msg - hexdump(len=26): 30 18 01 00 00 0f ac 04 01 00 00 0f ac 04 02 00 00 0f ac 02 00 0f ac 08 0c 00
kernel: wlan: deauthenticating from dc:a6:32:87:2a:8d by local choice (Reason: 17=IE_DIFFERENT)
wpa_supplicant: wlan: CTRL-EVENT-DISCONNECTED bssid=dc:a6:32:87:2a:8d reason=17 locally_generated=1
vducong commented 4 years ago

Thank you for reply. I follow the README of Cypress's patch:

### Using Linux Stable v5.4.18
#1. Download Linux stable kernel source
    wget https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/snapshot/linux-5.4.18.tar.gz
    tar zxvf linux-5.4.18.tar.gz
#2. In Linux root folder, untar/apply cypress patches with below bash commands
    cd linux-5.4.18
    tar zxvf cypress-patch*.tar.gz
    for i in cypress-patch/*.patch; do patch -p1 < $i; done
#3. Set kernel .config and enable below options, then compile kernel image
#      CONFIG_BRCMUTIL=y
#      CONFIG_BRCMFMAC=y
#      CONFIG_BRCMFMAC_SDIO=y
#      CONFIG_BRCMFMAC_PROTO_BCDC=y
#      CONFIG_BRCMFMAC_PCIE=y
#      CONFIG_BRCMFMAC_PROTO_MSGBUF=y
#4. (optional) Backup original firmware files
    cp /lib/firmware/cypress /lib/firmware/cypress-bak -r   # I failed here
#5. Update firmware files in /lib/firmware/cypress
    tar zxvf cypress-firmware*.tar.gz
    cp firmware/* /lib/firmware/cypress   # I failed here
#6. Boot the system with the new kernel image

Actually, I even don't have /lib/firmware. Just not sure, is this situation all the same with everyone? Or may any wrong installation has been done?

Update 1: So, I have successfully installed the kernel, patches, and hostap from Cypress, also copied/renamed the brcmfmac43455-sdio.txt as your above recommendation. However, my wlan0 suddenly went away!!! There is nothing from iwconfig, ifconfig, rfkill. Still looking for a solution but I think I have to install a fresh OS and do everything from scratch @@

Update 2: Has anyone set up as the above README 100%? When I tried to set CONFIG_BRCMUTIL=y and CONFIG_BRCMFMAC=y, these configurations CONFIG_CFG80211 and CONFIG_RFKILL also needed to be changed to be =y. I also don't know what to do with devicetree and cirrent file. Could anyone please help, what should I do now?

nicklowe commented 4 years ago

Please may we get 802.11w and SAE both working 'out of the box' in Raspberry Pi OS?

MASHtm commented 3 years ago

It would be great if at least WPA2 still works if WPA2/WPA3 is active on AP. This doesn't work as long as Raspi fails with optional 11w.

jottr commented 3 years ago

@pelwell - what is the road to getting these included in the firmware package?

IMHO, 802.11w is an important security feature.

So, what is required to get this working out of the box? What's the process?

Tehvan commented 3 years ago

If this isn't going to be patched there needs to be a note in the wpa_supplicant config file. I was running WPA2 and WPA3 in mixed mode on OpenWRT and my PI 4B was not able to connect. I had to change it to WPA2 only and then disable 802.11w for the PI to connect.

jorgejones7711 commented 3 years ago

I also cannot connect to a wpa3-sae network with a rpi 4. All of my other devices can. Raspberry Pi is falling behind it seems.

jaccc commented 3 years ago

It seems kernel 5.10 should support WPA3

brcmfmac: support SAE authentication offload in AP mode https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v5.10.40&id=d5f59c964e15e9e2cffaf8b0e9034616568717f9

mweinelt commented 3 years ago

Linux rpi 5.13.8 #1-NixOS SMP Wed Aug 4 10:47:57 UTC 2021 aarch64 GNU/Linux

[ 15.464751] brcmfmac: brcmf_fw_alloc_request: using brcm/brcmfmac43455-sdio for chip BCM4345/6 [ 15.470890] brcmfmac: brcmf_c_preinit_dcmds: Firmware: BCM4345/6 wl0: Jan 4 2021 19:56:29 version 7.45.229 (617f1f5 CY) FWID 01-2dbd9d2e

Unable to connect to my SAE home network. IWD just replies with "Operation unsupported" for SAE/MFP networks.

jottr commented 3 years ago

There is an interesting pointer in an issue that references this one: https://github.com/raspberrypi/linux/issues/4093#issuecomment-855412224

According to @graysky2 it seems that connecting via iwd to WPA3 networks works.

Kiina commented 3 years ago

Can't confirm that iwd works. Neither for pure WPA3 nor for WPA2/3 mixed mode. I get either Operation unsupported or Operation failed. Kernel 5.10.63-v7+

k-tatgenhorst commented 2 years ago

This issue was opened in May of 2020 and my current up to date R-Pi 4 is unable to connect to 802.11w networks. This is a standard network type in response to a real world problem (deauth attacks), is there an an ETA for resolution?

Thank you

pelwell commented 2 years ago

There is an open issue with Infineon about this. Although the firmware's build information appears to show support for Management Frame Protection (the more descriptive name for the feature known as 802.11w), when the brcmfmac driver queries the firmware's capabilities it claims not to support it.

jottr commented 2 years ago

@pelwell would you mind linking to the respective issue?
I couldn't find a public issue tracker but a community forum at Infineon. A quick Google search didn't turn up the relevant issue though.

pelwell commented 2 years ago

That's because it isn't public.

nicklowe commented 2 years ago

Any update on this?

andiradulescu commented 2 years ago

I managed to connect to a OpenWRT router with WPA2-PSK/WPA3-SAE Mixed Mode using iwd. Without any changes to firmware/kernel/wpasupplicant/etc.

  1. Install iwd and enable the service
    sudo apt install iwd
    sudo systemctl enable iwd
  2. Remove wpasupplicant completely - tried only disabling the service but wlan0 didn't get an IP
    sudo apt-get remove --auto-remove wpasupplicant
  3. Connect to your wifi with iwd - replace SSID with your SSID e.g. OpenWrt
    iwctl station wlan0 connect "SSID"
  4. Check if wlan0 is now connected and you have an IP
    iwctl station wlan0 show
    iwconfig
    ifconfig wlan0
  5. Finally reboot to see that everything works even after reboot
    sudo reboot

These are my model & kernel versions:

# cat /proc/cpuinfo | grep Model
Model       : Raspberry Pi 3 Model B Plus Rev 1.3
# uname -a
Linux raspberrypi 5.15.32-v8+ #1538 SMP PREEMPT Thu Mar 31 19:40:39 BST 2022 aarch64 GNU/Linux
pelwell commented 2 years ago

I think the 5.15 kernel is a significant element in your configuration. Infineon came back to me with a patch for 5.3, which is so old the patch no longer applies. The reason is doesn't apply is that the upstream brcmfmac code has been reorganised in a way that fixes the problem.

taylorkline commented 2 years ago

No issue on my end:

/etc/wpa_supplicant/wpa_supplicant.conf:

update_config=1

network={
 ssid="ssid"
 key_mgmt=WPA-PSK-SHA256
 psk=psk
 ieee80211w=2
}
kelnos commented 2 years ago

I hope this isn't too off topic, but this isn't working for me on a Pi 3 running Raspberry Pi OS bullseye, 32bit userland with a 64bit kernel (5.15.32-v8+). I switched my APs (OpenWRT 21.02 on Ubiquiti AP-AC PRO) to WPA2/WPA3 mixed-mode, and the Pi 3 suddenly failed to connect anymore. I reverted the change to the APs and it reconnected fine.

Tehvan commented 2 years ago

I've confirmed a Raspberry Pi 3 Model B Plus Rev 1.3 running OctoPi RC2 (headless Bullseye) connects to an OpenWRT (21.02.3) WiFi access point set to WPA2-EAP with 802.11w required. It was also able to connect running Ubuntu 22.04, however it would seemly randomly (30min-24hr) drop the connection until reboot (also happens on Bullseye, probably a rekey issue). As others mentioned, I'm guessing the 802.11w issue is a Kernel issue that was fixed a while ago (but not backported . . .) and is just now making it into mainline OS releases. The rekeying problem should probably be treated as a separate issue.

WPA/WPA2 secured

network={ ssid="XXX" proto=RSN key_mgmt=WPA-EAP-SHA256 eap=PEAP pairwise=CCMP auth_alg=OPEN ieee80211w=2 identity="xxxxx" password="XxXxXxXxX" phase1="peaplabel=0" phase2="auth=MSCHAPV2" priority=1 }

cestnickell commented 1 year ago

Hi, I notice the last post here was back in August - have things moved on since then or is this still an unresolved issue? I am experiencing the problem as described by previous posts.

pelwell commented 1 year ago

WPA3 support requires changes to the brcmfmac driver. Overwriting >500 source files in our kernel tree with versions modified by Infineon/Cypress, then patching them up to reapply our changes, was never something we were going to do. We are optimistic that they may switch to a more user-friendly way of sharing changes, at which point we will reconsider the matter.

jottr commented 1 year ago

@pelwell Out of curiosity, why was this problematic wifi chipset chosen in the first place?
Why are you hopeful that Infeneon/Cypress may "switch to a more user-friendly way of sharing changes"?
Are core developers already in contact with them?

pelwell commented 1 year ago

Questions about commercial arrangements will not be answered here.

MASHtm commented 1 year ago

So, this means that Raspberry 3 and 4 does not and will not support WPA3 and/or WPA2/WPA3 mixed mode with RasPi OS due to broken 802.11w support. Even if set to optional. Only to sum things up and end the 2+ years waiting.

pelwell commented 1 year ago

does not

Correct.

and will not

Incorrect. The necessary brcmfmac patches could be upstreamed, or made available in a sensible form, at which point we would include them.

antonsviridenko commented 1 year ago

I'm trying to run WPA3-only access point on Raspberry Pi 4 and having some issues.

I used the latest release of Cypress driver/patchset/firmware from https://community.infineon.com/t5/Wi-Fi-Bluetooth-for-Linux/Cypress-Linux-WiFi-Driver-Release-FMAC-2022-09-09/td-p/370346

and followed all instructions, applied kernel patches on a branch 5.10.y of raspberry kernel, had to manually resolve patch conflicts and edit some source files, built the kernel, modules, installed the firmware, copied nvram file from /lib/firmware/brcm/brcmfmac43455-sdio.txt to /lib/firmware/cypress/cyfmac43455-sdio.txt

patched hostapd and wpa_supplicant per cypress instructions.

According to @cybern0id -s comment in this thread, https://github.com/raspberrypi/linux/issues/3619#issuecomment-652181010 AP mode should work with WPA3, but instead I see this network listed as 'WEP' in all client devices.

hostapd.conf:

interface=wlan0
ssid=wpa3test
hw_mode=g
channel=11

driver=nl80211

ctrl_interface=/var/run/hostapd
ctrl_interface_group=netdev

macaddr_acl=0
wmm_enabled=1
ignore_broadcast_ssid=0

ieee80211n=1
ieee80211w=2
ieee80211d=1
ieee80211ac=1

auth_algs=1

wpa=2
wpa_key_mgmt=SAE
rsn_pairwise=CCMP
sae_password=saepassword
sae_require_mfp=1

I tried to use Raspberry Pi 3 as a testing client for WPA3 mode, used the same patched kernel build and patched wpa_supplicant with following configuration:

network={
    disabled=0
    ssid="wpa3test"
    proto=RSN
    key_mgmt=SAE
    sae_password="saepassword"
    ieee80211w=2
}
xx:xx:xx:xx:xx:xx       2462    -53     [WEP][ESS]      wpa3test

Any ideas how to debug/investigate?

antonsviridenko commented 1 year ago

Debug output of patched hostapd:

sudo /home/pi/hostap/hostapd/hostapd  -P /run/hostapd.pid -B /etc/hostapd/hostapd.conf -dd
random: Trying to read entropy from /dev/random
Configuration file: /etc/hostapd/hostapd.conf
ctrl_interface_group=108 (from group name 'netdev')
nl80211: Using driver-based roaming
nl80211: TDLS supported
nl80211: Supported cipher 00-0f-ac:1
nl80211: Supported cipher 00-0f-ac:5
nl80211: Supported cipher 00-0f-ac:2
nl80211: Supported cipher 00-0f-ac:4
nl80211: Supported cipher 00-0f-ac:10
nl80211: Supported cipher 00-0f-ac:8
nl80211: Supported cipher 00-0f-ac:9
nl80211: Supported cipher 00-0f-ac:6
nl80211: Supported cipher 00-0f-ac:13
nl80211: Supported cipher 00-0f-ac:11
nl80211: Supported cipher 00-0f-ac:12
nl80211: Using driver-based off-channel TX
nl80211: Supported vendor command: vendor_id=0x1018 subcmd=1
nl80211: Supported vendor command: vendor_id=0x1018 subcmd=2
nl80211: Supported vendor event: vendor_id=0x1018 subcmd=0
nl80211: Use separate P2P group interface (driver advertised support)
nl80211: Enable multi-channel concurrent (driver advertised support)
nl80211: use P2P_DEVICE support
nl80211: key_mgmt=0xf0f enc=0xfef auth=0x7 flags=0x2000000380cfacc rrm_flags=0x0 probe_resp_offloads=0x0 max_stations=0 max_remain_on_chan=5000 max_scan_ssids=10
nl80211: interface wlan0 in phy phy0
nl80211: Set mode ifindex 3 iftype 3 (AP)
nl80211: Setup AP(wlan0) - device_ap_sme=1 use_monitor=0
nl80211: Subscribe to mgmt frames with AP handle 0x5588b4d170 (device SME)
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x5588b4d170 match=04 multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=1): 04
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x5588b4d170 match=0501 multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=2): 05 01
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x5588b4d170 match=0503 multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=2): 05 03
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x5588b4d170 match=0504 multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=2): 05 04
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x5588b4d170 match=06 multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=1): 06
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x5588b4d170 match=08 multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=1): 08
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x5588b4d170 match=09 multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=1): 09
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x5588b4d170 match=0a multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=1): 0a
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x5588b4d170 match=11 multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=1): 11
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x5588b4d170 match=7f multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=1): 7f
nl80211: Failed to subscribe for mgmt frames from SME driver - trying to run without it
nl80211: Enable Probe Request reporting nl_preq=0x5588b4d170
nl80211: Register frame type=0x40 (WLAN_FC_STYPE_PROBE_REQ) nl_handle=0x5588b4d170 match= multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=64): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=0): [NULL]
nl80211: Failed to enable Probe Request frame reporting in AP mode
rfkill: initial event: idx=0 type=1 op=0 soft=0 hard=0
nl80211: Add own interface ifindex 3 (ifidx_reason -1)
nl80211: if_indices[16]: 3(-1)
phy: phy0
BSS count 1, BSSID mask 00:00:00:00:00:00 (0 bits)
Using existing control interface directory.

nl80211: 2402-2482 @ 40 MHz 20 mBm
nl80211: 5170-5250 @ 80 MHz 18 mBm
nl80211: 5250-5330 @ 80 MHz 18 mBm (DFS)
nl80211: 57000-66000 @ 2160 MHz 40 mBm
nl80211: Added 802.11b mode based on 802.11g information
nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
nl80211: Mode IEEE 802.11a: 5180 5200 5220 5240 5745 5765 5785 5805 5825
nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
Allowed channel: mode=1 chan=1 freq=2412 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=2 freq=2417 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=3 freq=2422 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=4 freq=2427 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=5 freq=2432 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=6 freq=2437 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=7 freq=2442 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=8 freq=2447 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=9 freq=2452 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=10 freq=2457 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=11 freq=2462 MHz max_tx_power=20 dBm
Allowed channel: mode=2 chan=36 freq=5180 MHz max_tx_power=18 dBm
Allowed channel: mode=2 chan=40 freq=5200 MHz max_tx_power=18 dBm
Allowed channel: mode=2 chan=44 freq=5220 MHz max_tx_power=18 dBm
Allowed channel: mode=2 chan=48 freq=5240 MHz max_tx_power=18 dBm
Allowed channel: mode=2 chan=149 freq=5745 MHz max_tx_power=0 dBm
Allowed channel: mode=2 chan=153 freq=5765 MHz max_tx_power=0 dBm
Allowed channel: mode=2 chan=157 freq=5785 MHz max_tx_power=0 dBm
Allowed channel: mode=2 chan=161 freq=5805 MHz max_tx_power=0 dBm
Allowed channel: mode=2 chan=165 freq=5825 MHz max_tx_power=0 dBm
Allowed channel: mode=0 chan=1 freq=2412 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=2 freq=2417 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=3 freq=2422 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=4 freq=2427 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=5 freq=2432 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=6 freq=2437 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=7 freq=2442 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=8 freq=2447 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=9 freq=2452 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=10 freq=2457 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=11 freq=2462 MHz max_tx_power=20 dBm
hw vht capab: 0x0, conf vht capab: 0x0
Completing interface initialization
Mode: IEEE 802.11g  Channel: 11  Frequency: 2462 MHz
hostapd_handle_dfs_offload: iface->cac_started: 0
hostapd_handle_dfs_offload: freq 2462 MHz does not require DFS. Continue channel/AP setup
Proceed with AP/channel setup
nl80211: Set freq 2462 (ht_enabled=1, vht_enabled=1, he_enabled=0, bandwidth=20 MHz, cf1=2462 MHz, cf2=0 MHz)
  * freq=2462
  * he_enabled=0
  * vht_enabled=1
  * ht_enabled=1
  * bandwidth=20
  * channel_width=1
  * center_freq1=2462
  * center_freq2=0
RATE[0] rate=10 flags=0x1
RATE[1] rate=20 flags=0x1
RATE[2] rate=55 flags=0x1
RATE[3] rate=110 flags=0x1
RATE[4] rate=60 flags=0x0
RATE[5] rate=90 flags=0x0
RATE[6] rate=120 flags=0x0
RATE[7] rate=180 flags=0x0
RATE[8] rate=240 flags=0x0
RATE[9] rate=360 flags=0x0
RATE[10] rate=480 flags=0x0
RATE[11] rate=540 flags=0x0
hostapd_setup_bss(hapd=0x5588b4b370 (wlan0), first=1)
nl80211: flush -> DEL_STATION wlan0 (all)
nl80211: Station flush failed: ret=-14 (Bad address)
Using interface wlan0 with hwaddr dc:a6:32:a3:b2:7e and ssid "wpa3test"
random: Got 20/20 random bytes
Get randomness: len=32 entropy=0
GMK - hexdump(len=32): [REMOVED]
Get randomness: len=32 entropy=0
Key Counter - hexdump(len=32): [REMOVED]
WPA: Delay group state machine start until Beacon frames have been configured
nl80211: Set beacon (beacon_set=0)
nl80211: Beacon head - hexdump(len=59): 80 00 00 00 ff ff ff ff ff ff dc a6 32 a3 b2 7e dc a6 32 a3 b2 7e 00 00 00 00 00 00 00 00 00 00 64 00 11 04 00 08 77 70 61 33 74 65 73 74 01 08 82 84 8b 96 0c 12 18 24 03 01 0b
nl80211: Beacon tail - hexdump(len=142): 07 06 47 45 20 01 0b 14 2a 01 04 32 04 30 48 60 6c 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 08 cc 00 2d 1a 0c 00 1f ff 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 bf 0c 00 00 00 00 ff ff 00 00 ff ff 00 00 c0 05 00 00 00 fc ff c3 02 00 28 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
nl80211: ifindex=3
nl80211: beacon_int=100
nl80211: beacon_rate=0
nl80211: rate_type=0
nl80211: dtim_period=2
nl80211: ssid=wpa3test
  * beacon_int=100
  * dtim_period=2
nl80211: hidden SSID not in use
nl80211: privacy=2
nl80211: auth_algs=0x1
nl80211: wpa_version=0x2
nl80211: key_mgmt_suites=0x400
nl80211: pairwise_ciphers=0x10
nl80211: group_cipher=0x10
nl802111: sae_pwe=0
wlan0: Deauthenticate all stations at BSS start
nl80211: sta_remove -> DEL_STATION wlan0 ff:ff:ff:ff:ff:ff --> 0 (Success)
WPA: Start group state machine to set initial keys
WPA: group state machine entering state GTK_INIT (VLAN-ID 0)
Get randomness: len=16 entropy=0
GTK - hexdump(len=16): [REMOVED]
Get randomness: len=16 entropy=0
IGTK - hexdump(len=16): [REMOVED]
WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0)
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=3 addr=0x557df33280 key_idx=1 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
   broadcast key
nl80211: NL80211_CMD_SET_KEY - default key
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=4 addr=0x557df33280 key_idx=4 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
   broadcast key
nl80211: NL80211_CMD_SET_KEY - default key
nl80211: Set wlan0 operstate 0->1 (UP)
netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=6 (IF_OPER_UP)
nl80211: TX queue param set: queue=0 aifs=1 cw_min=3 cw_max=7 burst_time=15 --> res=-95
Failed to set TX queue parameters for queue 0.
nl80211: TX queue param set: queue=1 aifs=1 cw_min=7 cw_max=15 burst_time=30 --> res=-95
Failed to set TX queue parameters for queue 1.
nl80211: TX queue param set: queue=2 aifs=3 cw_min=15 cw_max=63 burst_time=0 --> res=-95
Failed to set TX queue parameters for queue 2.
nl80211: TX queue param set: queue=3 aifs=7 cw_min=15 cw_max=1023 burst_time=0 --> res=-95
Failed to set TX queue parameters for queue 3.
wlan0: interface state COUNTRY_UPDATE->ENABLED
wlan0: AP-ENABLED 
wlan0: Setup of interface done.
ctrl_iface not configured!
antonsviridenko commented 1 year ago

sudo iw phy phy0 info

Wiphy phy0
        wiphy index: 0
        max # scan SSIDs: 10
        max scan IEs length: 2048 bytes
        max # sched scan SSIDs: 16
        max # match sets: 16
        Retry short limit: 7
        Retry long limit: 4
        Coverage class: 0 (up to 0m)
        Device supports roaming.
        Device supports T-DLS.
        Supported Ciphers:
                * WEP40 (00-0f-ac:1)
                * WEP104 (00-0f-ac:5)
                * TKIP (00-0f-ac:2)
                * CCMP-128 (00-0f-ac:4)
                * CCMP-256 (00-0f-ac:10)
                * GCMP-128 (00-0f-ac:8)
                * GCMP-256 (00-0f-ac:9)
                * CMAC (00-0f-ac:6)
                * CMAC-256 (00-0f-ac:13)
                * GMAC-128 (00-0f-ac:11)
                * GMAC-256 (00-0f-ac:12)
        Available Antennas: TX 0 RX 0
        Supported interface modes:
                 * IBSS
                 * managed
                 * AP
                 * P2P-client
                 * P2P-GO
                 * P2P-device
        Band 1:
                Capabilities: 0x1062
                        HT20/HT40
                        Static SM Power Save
                        RX HT20 SGI
                        RX HT40 SGI
                        No RX STBC
                        Max AMSDU length: 3839 bytes
                        DSSS/CCK HT40
                Maximum RX AMPDU length 65535 bytes (exponent: 0x003)
                Minimum RX AMPDU time spacing: 16 usec (0x07)
                HT TX/RX MCS rate indexes supported: 0-7
                Bitrates (non-HT):
                        * 1.0 Mbps
                        * 2.0 Mbps (short preamble supported)
                        * 5.5 Mbps (short preamble supported)
                        * 11.0 Mbps (short preamble supported)
                        * 6.0 Mbps
                        * 9.0 Mbps
                        * 12.0 Mbps
                        * 18.0 Mbps
                        * 24.0 Mbps
                        * 36.0 Mbps
                        * 48.0 Mbps
                        * 54.0 Mbps
                Frequencies:
                        * 2412 MHz [1] (20.0 dBm)
                        * 2417 MHz [2] (20.0 dBm)
                        * 2422 MHz [3] (20.0 dBm)
                        * 2427 MHz [4] (20.0 dBm)
                        * 2432 MHz [5] (20.0 dBm)
                        * 2437 MHz [6] (20.0 dBm)
                        * 2442 MHz [7] (20.0 dBm)
                        * 2447 MHz [8] (20.0 dBm)
                        * 2452 MHz [9] (20.0 dBm)
                        * 2457 MHz [10] (20.0 dBm)
                        * 2462 MHz [11] (20.0 dBm)
        Band 2:
                Capabilities: 0x1062
                        HT20/HT40
                        Static SM Power Save
                        RX HT20 SGI
                        RX HT40 SGI
                        No RX STBC
                        Max AMSDU length: 3839 bytes
                        DSSS/CCK HT40
                Maximum RX AMPDU length 65535 bytes (exponent: 0x003)
                Minimum RX AMPDU time spacing: 16 usec (0x07)
                HT TX/RX MCS rate indexes supported: 0-7
                VHT Capabilities (0x00001020):
                        Max MPDU length: 3895
                        Supported Channel Width: neither 160 nor 80+80
                        short GI (80 MHz)
                        SU Beamformee
                VHT RX MCS set:
                        1 streams: MCS 0-9
                        2 streams: not supported
                        3 streams: not supported
                        4 streams: not supported
                        5 streams: not supported
                        6 streams: not supported
                        7 streams: not supported
                        8 streams: not supported
                VHT RX highest supported: 0 Mbps
                VHT TX MCS set:
                        1 streams: MCS 0-9
                        2 streams: not supported
                        3 streams: not supported
                        4 streams: not supported
                        5 streams: not supported
                        6 streams: not supported
                        7 streams: not supported
                        8 streams: not supported
                VHT TX highest supported: 0 Mbps
                Bitrates (non-HT):
                        * 6.0 Mbps
                        * 9.0 Mbps
                        * 12.0 Mbps
                        * 18.0 Mbps
                        * 24.0 Mbps
                        * 36.0 Mbps
                        * 48.0 Mbps
                        * 54.0 Mbps
                Frequencies:
                        * 5180 MHz [36] (18.0 dBm)
                        * 5200 MHz [40] (18.0 dBm)
                        * 5220 MHz [44] (18.0 dBm)
                        * 5240 MHz [48] (18.0 dBm)
                        * 5745 MHz [149] (20.0 dBm)
                        * 5765 MHz [153] (20.0 dBm)
                        * 5785 MHz [157] (20.0 dBm)
                        * 5805 MHz [161] (20.0 dBm)
                        * 5825 MHz [165] (20.0 dBm)
        Supported commands:
                 * new_interface
                 * set_interface
                 * new_key
                 * start_ap
                 * set_bss
                 * join_ibss
                 * set_pmksa
                 * del_pmksa
                 * flush_pmksa
                 * remain_on_channel
                 * frame
                 * set_wiphy_netns
                 * set_channel
                 * tdls_oper
                 * start_sched_scan
                 * start_p2p_device
                 * connect
                 * disconnect
                 * crit_protocol_start
                 * crit_protocol_stop
                 * update_connect_params
        WoWLAN support:
                 * wake up on disconnect
                 * wake up on magic packet
                 * wake up on pattern match, up to 16 patterns of 1-128 bytes,
                   maximum packet offset 1500 bytes
        software interface modes (can always be added):
        valid interface combinations:
                 * #{ managed } <= 2, #{ P2P-device } <= 1, #{ P2P-client, P2P-GO } <= 1,
                   total <= 3, #channels <= 2
                 * #{ managed } <= 1, #{ AP } <= 1, #{ P2P-client } <= 1, #{ P2P-device } <= 1,
                   total <= 4, #channels <= 1
        Device supports scan flush.
        Device supports randomizing MAC-addr in sched scans.
        max # scan plans: 1
        max scan plan interval: 508
        max scan plan iterations: 0
        Supported TX frame types:
                 * managed: 0x00 0x10 0x20 0x30 0x40 0x50 0x60 0x70 0x80 0x90 0xa0 0xb0 0xc0 0xd0 0xe0 0xf0
                 * AP: 0x00 0x10 0x20 0x30 0x40 0x50 0x60 0x70 0x80 0x90 0xa0 0xb0 0xc0 0xd0 0xe0 0xf0
                 * P2P-client: 0x00 0x10 0x20 0x30 0x40 0x50 0x60 0x70 0x80 0x90 0xa0 0xb0 0xc0 0xd0 0xe0 0xf0
                 * P2P-GO: 0x00 0x10 0x20 0x30 0x40 0x50 0x60 0x70 0x80 0x90 0xa0 0xb0 0xc0 0xd0 0xe0 0xf0
                 * P2P-device: 0x00 0x10 0x20 0x30 0x40 0x50 0x60 0x70 0x80 0x90 0xa0 0xb0 0xc0 0xd0 0xe0 0xf0
        Supported RX frame types:
                 * managed: 0x40 0xb0 0xd0
                 * AP: 0x00 0x20 0x40 0xa0 0xb0 0xc0 0xd0
                 * P2P-client: 0x40 0xd0
                 * P2P-GO: 0x00 0x20 0x40 0xa0 0xb0 0xc0 0xd0
                 * P2P-device: 0x40 0xd0
        Supported extended features:
                * [ CQM_RSSI_LIST ]: multiple CQM_RSSI_THOLD records
                * [ 4WAY_HANDSHAKE_STA_PSK ]: 4-way handshake with PSK in station mode
                * [ 4WAY_HANDSHAKE_STA_1X ]: 4-way handshake with 802.1X in station mode
                * [ DFS_OFFLOAD ]: DFS offload
                * [ 4WAY_HANDSHAKE_AP_PSK ]: AP mode PSK offload support
cybern0id commented 1 year ago

I'd help if I could (and had time) but unfortunately the SSD with all my custom builds on it failed, so I've lost all my build scripts and patches. Also, I was using a different kernel branch; 5.4.x not 5.10.x and I suspect that there will have been changes to 802.11x between those branches which may affect results.

antonsviridenko commented 1 year ago

So I tried the latest release of the driver https://community.infineon.com/t5/Wi-Fi-Bluetooth-for-Linux/Cypress-Linux-WiFi-Driver-Release-FMAC-2022-12-23/td-p/389610 based on a kernel version 5.15.58 and patched in the same way, solved some patching conflicts, now I am able to create WPA3 network on a Raspberry Pi 4 and other client devices can see it as a WPA3, but clients fail to connect.

I tried to post report about this issue in Infineon community forum but it was removed as a spam 🤡 https://community.infineon.com/t5/Wi-Fi-Bluetooth-for-Linux/bd-p/WiFiBluetoothLinux?type=discussions so reposting it here:

I'm trying to run a wi-fi access point in WPA3 mode on a Raspberry Pi 4 which has the BCM4345 chip.

I've downloaded the latest driver release v5.15.58-2022_1223 from 2022-12-23

and patched everything according to provided instructions.

Raspberry is unable to run vanilla upstream kernel, so I had to apply kernel patches to the 5.15.y branch of a raspberry fork of the Linux kernel. Some patching conflicts were present and I had to fix them manually.

 uname -a
Linux raspberrypi 5.15.84-v8+ #1 SMP PREEMPT Thu Jan 12 20:39:06 +04 2023 aarch64 GNU/Linux
brcmfmac: brcmf_c_preinit_dcmds: Firmware: BCM4345/6 wl0: Sep  4 2022 21:48:18 version 7.45.251 (16ca9cf CY) FWID 01-774406d9

I'm running two Raspberry Pi 4 boards in testing setup, one as an AP and the second as a client. Both have the same patched kernel, firmware from the driver release and patched hostapd/wpa_supplicant.

Client is unable to authenticate to the WPA3 wireless network.

hostapd.conf:

country_code=GE
interface=wlan0
ssid=wpa3test_pi4
hw_mode=g
channel=11

driver=nl80211

ctrl_interface=/var/run/hostapd
ctrl_interface_group=netdev

macaddr_acl=0
wmm_enabled=1
ignore_broadcast_ssid=0
ieee80211n=1
ieee80211w=2
ieee80211d=1
ieee80211ac=1

auth_algs=1

wpa=2
wpa_key_mgmt=SAE
rsn_pairwise=CCMP
wpa_passphrase=saepassword
sae_password=saepassword
sae_require_mfp=1

wpa_supplicant.conf on a client side:

network={
    ssid="wpa3test_pi4"
    key_mgmt=SAE
    proto=RSN
    sae_password="saepassword"
    ieee80211w=2
}

hostapd output with debugging enabled:

random: Trying to read entropy from /dev/random
Configuration file: /etc/hostapd/hostapd.conf
ctrl_interface_group=108 (from group name 'netdev')
nl80211: Using driver-based roaming
nl80211: Supported cipher 00-0f-ac:1
nl80211: Supported cipher 00-0f-ac:5
nl80211: Supported cipher 00-0f-ac:2
nl80211: Supported cipher 00-0f-ac:4
nl80211: Supported cipher 00-0f-ac:10
nl80211: Supported cipher 00-0f-ac:8
nl80211: Supported cipher 00-0f-ac:9
nl80211: Supported cipher 00-0f-ac:6
nl80211: Supported cipher 00-0f-ac:13
nl80211: Supported cipher 00-0f-ac:11
nl80211: Supported cipher 00-0f-ac:12
nl80211: Using driver-based off-channel TX
nl80211: Supported vendor command: vendor_id=0x1018 subcmd=1
nl80211: Supported vendor command: vendor_id=0x1018 subcmd=2
nl80211: Supported vendor command: vendor_id=0x319 subcmd=1
nl80211: Supported vendor command: vendor_id=0x319 subcmd=6
nl80211: Supported vendor command: vendor_id=0x319 subcmd=11
nl80211: Supported vendor command: vendor_id=0x319 subcmd=12
nl80211: Supported vendor command: vendor_id=0x319 subcmd=13
nl80211: Supported vendor command: vendor_id=0x319 subcmd=14
nl80211: Supported vendor command: vendor_id=0x319 subcmd=15
nl80211: Supported vendor command: vendor_id=0x319 subcmd=16
nl80211: Supported vendor command: vendor_id=0x319 subcmd=17
nl80211: Supported vendor event: vendor_id=0x1018 subcmd=0
nl80211: Use separate P2P group interface (driver advertised support)
nl80211: Enable multi-channel concurrent (driver advertised support)
nl80211: use P2P_DEVICE support
nl80211: key_mgmt=0xf0f enc=0xfef auth=0x7 flags=0x3a04fac4 rrm_flags=0x0 probe_resp_offloads=0x0 max_stations=0 max_remain_on_chan=5000 max_scan_ssids=10
nl80211: interface wlan0 in phy phy0
nl80211: Set mode ifindex 3 iftype 3 (AP)
nl80211: Setup AP(wlan0) - device_ap_sme=1 use_monitor=0
nl80211: Subscribe to mgmt frames with AP handle 0x5582bfa170 (device SME)
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x5582bfa170 match=04 multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=1): 04
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x5582bfa170 match=0501 multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=2): 05 01
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x5582bfa170 match=0503 multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=2): 05 03
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x5582bfa170 match=0504 multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=2): 05 04
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x5582bfa170 match=06 multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=1): 06
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x5582bfa170 match=08 multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=1): 08
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x5582bfa170 match=09 multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=1): 09
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x5582bfa170 match=0a multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=1): 0a
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x5582bfa170 match=11 multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=1): 11
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x5582bfa170 match=7f multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=1): 7f
nl80211: Failed to subscribe for mgmt frames from SME driver - trying to run without it
nl80211: Enable Probe Request reporting nl_preq=0x5582bfa170
nl80211: Register frame type=0x40 (WLAN_FC_STYPE_PROBE_REQ) nl_handle=0x5582bfa170 match= multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=64): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=0): [NULL]
nl80211: Failed to enable Probe Request frame reporting in AP mode
rfkill: initial event: idx=0 type=1 op=0 soft=0 hard=0
nl80211: Add own interface ifindex 3 (ifidx_reason -1)
nl80211: if_indices[16]: 3(-1)
phy: phy0
BSS count 1, BSSID mask 00:00:00:00:00:00 (0 bits)
Using existing control interface directory.
ctrl_iface bind(PF_UNIX) failed: Address already in use
ctrl_iface exists and seems to be in use - cannot override it
Delete '/var/run/hostapd/wlan0' manually if it is not used anymore
Failed to setup control interface for wlan0
wlan0: Unable to setup interface.
hostapd_interface_deinit_free(0x5582bf6e80)
hostapd_interface_deinit_free: num_bss=1 conf->num_bss=1
hostapd_interface_deinit(0x5582bf6e80)
wlan0: interface state UNINITIALIZED->DISABLED
hostapd_bss_deinit: deinit bss wlan0
wlan0: Deauthenticate all stations
nl80211: sta_remove -> DEL_STATION wlan0 ff:ff:ff:ff:ff:ff --> 0 (Success)
wlan0: AP-DISABLED 
hostapd_cleanup(hapd=0x5582bf8350 (wlan0))
wlan0: CTRL-EVENT-TERMINATING 
hostapd_free_hapd_data: Interface wlan0 wasn't started
hostapd_interface_deinit_free: driver=0x55773e97f8 drv_priv=0x5582bfbbc0 -> hapd_deinit
nl80211: deinit ifname=wlan0 disabled_11b_rates=0
nl80211: Remove monitor interface: refcount=0
nl80211: Remove beacon (ifindex=3)
netlink: Operstate: ifindex=3 linkmode=0 (kernel-control), operstate=6 (IF_OPER_UP)
hostapd_interface_free(0x5582bf6e80)
hostapd_interface_free: free hapd 0x5582bf8350
hostapd_cleanup_iface(0x5582bf6e80)
hostapd_cleanup_iface_partial(0x5582bf6e80)
hostapd_cleanup_iface: free iface=0x5582bf6e80
pi@raspberrypi:~ $ sudo rm /var/run/hostapd/wlan0 
pi@raspberrypi:~ $ sudo hostap/hostapd/hostapd -dd /etc/hostapd/hostapd.conf
random: Trying to read entropy from /dev/random
Configuration file: /etc/hostapd/hostapd.conf
ctrl_interface_group=108 (from group name 'netdev')
nl80211: Using driver-based roaming
nl80211: Supported cipher 00-0f-ac:1
nl80211: Supported cipher 00-0f-ac:5
nl80211: Supported cipher 00-0f-ac:2
nl80211: Supported cipher 00-0f-ac:4
nl80211: Supported cipher 00-0f-ac:10
nl80211: Supported cipher 00-0f-ac:8
nl80211: Supported cipher 00-0f-ac:9
nl80211: Supported cipher 00-0f-ac:6
nl80211: Supported cipher 00-0f-ac:13
nl80211: Supported cipher 00-0f-ac:11
nl80211: Supported cipher 00-0f-ac:12
nl80211: Using driver-based off-channel TX
nl80211: Supported vendor command: vendor_id=0x1018 subcmd=1
nl80211: Supported vendor command: vendor_id=0x1018 subcmd=2
nl80211: Supported vendor command: vendor_id=0x319 subcmd=1
nl80211: Supported vendor command: vendor_id=0x319 subcmd=6
nl80211: Supported vendor command: vendor_id=0x319 subcmd=11
nl80211: Supported vendor command: vendor_id=0x319 subcmd=12
nl80211: Supported vendor command: vendor_id=0x319 subcmd=13
nl80211: Supported vendor command: vendor_id=0x319 subcmd=14
nl80211: Supported vendor command: vendor_id=0x319 subcmd=15
nl80211: Supported vendor command: vendor_id=0x319 subcmd=16
nl80211: Supported vendor command: vendor_id=0x319 subcmd=17
nl80211: Supported vendor event: vendor_id=0x1018 subcmd=0
nl80211: Use separate P2P group interface (driver advertised support)
nl80211: Enable multi-channel concurrent (driver advertised support)
nl80211: use P2P_DEVICE support
nl80211: key_mgmt=0xf0f enc=0xfef auth=0x7 flags=0x3a04fac4 rrm_flags=0x0 probe_resp_offloads=0x0 max_stations=0 max_remain_on_chan=5000 max_scan_ssids=10
nl80211: interface wlan0 in phy phy0
nl80211: Set mode ifindex 3 iftype 3 (AP)
nl80211: Setup AP(wlan0) - device_ap_sme=1 use_monitor=0
nl80211: Subscribe to mgmt frames with AP handle 0x55918d9170 (device SME)
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55918d9170 match=04 multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=1): 04
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55918d9170 match=0501 multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=2): 05 01
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55918d9170 match=0503 multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=2): 05 03
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55918d9170 match=0504 multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=2): 05 04
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55918d9170 match=06 multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=1): 06
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55918d9170 match=08 multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=1): 08
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55918d9170 match=09 multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=1): 09
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55918d9170 match=0a multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=1): 0a
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55918d9170 match=11 multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=1): 11
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55918d9170 match=7f multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=1): 7f
nl80211: Failed to subscribe for mgmt frames from SME driver - trying to run without it
nl80211: Enable Probe Request reporting nl_preq=0x55918d9170
nl80211: Register frame type=0x40 (WLAN_FC_STYPE_PROBE_REQ) nl_handle=0x55918d9170 match= multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=64): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=0): [NULL]
nl80211: Failed to enable Probe Request frame reporting in AP mode
rfkill: initial event: idx=0 type=1 op=0 soft=0 hard=0
nl80211: Add own interface ifindex 3 (ifidx_reason -1)
nl80211: if_indices[16]: 3(-1)
phy: phy0
BSS count 1, BSSID mask 00:00:00:00:00:00 (0 bits)
Using existing control interface directory.
wlan0: interface state UNINITIALIZED->COUNTRY_UPDATE
Previous country code GE, new country code GE 
nl80211: Regulatory information - country=GE (DFS-ETSI)
nl80211: 2402-2482 @ 40 MHz 20 mBm
nl80211: 5170-5250 @ 80 MHz 18 mBm
nl80211: 5250-5330 @ 80 MHz 18 mBm (DFS)
nl80211: 57000-66000 @ 2160 MHz 40 mBm
nl80211: Added 802.11b mode based on 802.11g information
nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
nl80211: Mode IEEE 802.11a: 5180 5200 5220 5240 5745[DISABLED] 5765[DISABLED] 5785[DISABLED] 5805[DISABLED] 5825[DISABLED]
nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
Allowed channel: mode=1 chan=1 freq=2412 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=2 freq=2417 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=3 freq=2422 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=4 freq=2427 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=5 freq=2432 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=6 freq=2437 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=7 freq=2442 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=8 freq=2447 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=9 freq=2452 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=10 freq=2457 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=11 freq=2462 MHz max_tx_power=20 dBm
Allowed channel: mode=2 chan=36 freq=5180 MHz max_tx_power=18 dBm
Allowed channel: mode=2 chan=40 freq=5200 MHz max_tx_power=18 dBm
Allowed channel: mode=2 chan=44 freq=5220 MHz max_tx_power=18 dBm
Allowed channel: mode=2 chan=48 freq=5240 MHz max_tx_power=18 dBm
Allowed channel: mode=0 chan=1 freq=2412 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=2 freq=2417 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=3 freq=2422 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=4 freq=2427 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=5 freq=2432 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=6 freq=2437 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=7 freq=2442 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=8 freq=2447 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=9 freq=2452 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=10 freq=2457 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=11 freq=2462 MHz max_tx_power=20 dBm
hw vht capab: 0x0, conf vht capab: 0x0
Completing interface initialization
Mode: IEEE 802.11g  Channel: 11  Frequency: 2462 MHz
hostapd_handle_dfs_offload: iface->cac_started: 0
hostapd_handle_dfs_offload: freq 2462 MHz does not require DFS. Continue channel/AP setup
Proceed with AP/channel setup
nl80211: Set freq 2462 (ht_enabled=1, vht_enabled=1, he_enabled=0, bandwidth=20 MHz, cf1=2462 MHz, cf2=0 MHz)
  * freq=2462
  * he_enabled=0
  * vht_enabled=1
  * ht_enabled=1
  * bandwidth=20
  * channel_width=1
  * center_freq1=2462
  * center_freq2=0
RATE[0] rate=10 flags=0x1
RATE[1] rate=20 flags=0x1
RATE[2] rate=55 flags=0x1
RATE[3] rate=110 flags=0x1
RATE[4] rate=60 flags=0x0
RATE[5] rate=90 flags=0x0
RATE[6] rate=120 flags=0x0
RATE[7] rate=180 flags=0x0
RATE[8] rate=240 flags=0x0
RATE[9] rate=360 flags=0x0
RATE[10] rate=480 flags=0x0
RATE[11] rate=540 flags=0x0
hostapd_setup_bss(hapd=0x55918d7350 (wlan0), first=1)
nl80211: flush -> DEL_STATION wlan0 (all)
nl80211: Station flush failed: ret=-14 (Bad address)
Using interface wlan0 with hwaddr dc:a6:32:e5:a1:03 and ssid "wpa3test_pi4"
Deriving WPA PSK based on passphrase
SSID - hexdump_ascii(len=12):
     77 70 61 33 74 65 73 74 5f 70 69 34               wpa3test_pi4    
PSK (ASCII passphrase) - hexdump_ascii(len=11): [REMOVED]
PSK (from passphrase) - hexdump(len=32): [REMOVED]
random: Got 20/20 random bytes
Get randomness: len=32 entropy=0
GMK - hexdump(len=32): [REMOVED]
Get randomness: len=32 entropy=0
Key Counter - hexdump(len=32): [REMOVED]
WPA: Delay group state machine start until Beacon frames have been configured
nl80211: Set beacon (beacon_set=0)
nl80211: Beacon head - hexdump(len=63): 80 00 00 00 ff ff ff ff ff ff dc a6 32 e5 a1 03 dc a6 32 e5 a1 03 00 00 00 00 00 00 00 00 00 00 64 00 11 04 00 0c 77 70 61 33 74 65 73 74 5f 70 69 34 01 08 82 84 8b 96 0c 12 18 24 03 01 0b
nl80211: Beacon tail - hexdump(len=142): 07 06 47 45 20 01 0b 14 2a 01 04 32 04 30 48 60 6c 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 08 cc 00 2d 1a 0c 00 1f ff 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 bf 0c 00 00 00 00 ff ff 00 00 ff ff 00 00 c0 05 00 00 00 fc ff c3 02 00 28 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
nl80211: ifindex=3
nl80211: beacon_int=100
nl80211: beacon_rate=0
nl80211: rate_type=0
nl80211: dtim_period=2
nl80211: ssid=wpa3test_pi4
  * beacon_int=100
  * dtim_period=2
nl80211: hidden SSID not in use
nl80211: privacy=2
nl80211: auth_algs=0x1
nl80211: wpa_version=0x2
nl80211: key_mgmt_suites=0x400
nl80211: pairwise_ciphers=0x10
nl80211: group_cipher=0x10
nl802111: sae_pwe=0
wlan0: Deauthenticate all stations at BSS start
nl80211: sta_remove -> DEL_STATION wlan0 ff:ff:ff:ff:ff:ff --> 0 (Success)
WPA: Start group state machine to set initial keys
WPA: group state machine entering state GTK_INIT (VLAN-ID 0)
Get randomness: len=16 entropy=0
GTK - hexdump(len=16): [REMOVED]
Get randomness: len=16 entropy=0
IGTK - hexdump(len=16): [REMOVED]
WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0)
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=3 addr=0x556cbe32a0 key_idx=1 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
   broadcast key
nl80211: NL80211_CMD_SET_KEY - default key
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=4 addr=0x556cbe32a0 key_idx=4 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
   broadcast key
nl80211: NL80211_CMD_SET_KEY - default key
nl80211: Set wlan0 operstate 0->1 (UP)
netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=6 (IF_OPER_UP)
nl80211: TX queue param set: queue=0 aifs=1 cw_min=3 cw_max=7 burst_time=15 --> res=-95
Failed to set TX queue parameters for queue 0.
nl80211: TX queue param set: queue=1 aifs=1 cw_min=7 cw_max=15 burst_time=30 --> res=-95
Failed to set TX queue parameters for queue 1.
nl80211: TX queue param set: queue=2 aifs=3 cw_min=15 cw_max=63 burst_time=0 --> res=-95
Failed to set TX queue parameters for queue 2.
nl80211: TX queue param set: queue=3 aifs=7 cw_min=15 cw_max=1023 burst_time=0 --> res=-95
Failed to set TX queue parameters for queue 3.
wlan0: interface state COUNTRY_UPDATE->ENABLED
wlan0: AP-ENABLED 
wlan0: Setup of interface done.
ctrl_iface not configured!
RTM_NEWLINK: ifi_index=3 ifname=wlan0 operstate=6 linkmode=0 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK: ifi_index=3 ifname=wlan0 operstate=6 linkmode=0 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
nl80211: Event message available
nl80211: Drv Event 60 (NL80211_CMD_FRAME_TX_STATUS) received for wlan0
nl80211: MLME event 60 (NL80211_CMD_FRAME_TX_STATUS) on wlan0(dc:a6:32:e5:a1:03) A1=dc:a6:32:a3:b2:7e A2=dc:a6:32:e5:a1:03
nl80211: MLME event frame - hexdump(len=128): b0 00 00 00 dc a6 32 a3 b2 7e dc a6 32 e5 a1 03 dc a6 32 e5 a1 03 00 00 03 00 01 00 00 00 13 00 f7 a0 98 80 a3 9b 47 8b e8 0f ff b1 30 2f a7 a1 97 cc a3 f4 a1 cf 16 eb 99 65 f1 fe 00 0b ac 65 73 96 96 e1 59 20 89 44 f2 e0 62 68 27 a3 f8 13 0a 76 95 1c 82 2a 9e 06 d7 1a ff e8 9f 83 e6 bc df c8 2a 75 4b d5 01 7d 7a d8 7c c7 5a ba af cc 99 6b 13 d5 f6 4d 5d 60 6d f3 8a 63 b8 cb 88 c6
nl80211: Frame TX status event A1=dc:a6:32:a3:b2:7e stype=11 cookie=0x0 ack=1
wlan0: Event TX_STATUS (16) received
mgmt::auth cb
handle_auth_cb: STA dc:a6:32:a3:b2:7e not found
nl80211: Event message available
nl80211: Drv Event 60 (NL80211_CMD_FRAME_TX_STATUS) received for wlan0
nl80211: MLME event 60 (NL80211_CMD_FRAME_TX_STATUS) on wlan0(dc:a6:32:e5:a1:03) A1=dc:a6:32:a3:b2:7e A2=dc:a6:32:e5:a1:03
nl80211: MLME event frame - hexdump(len=64): b0 00 00 00 dc a6 32 a3 b2 7e dc a6 32 e5 a1 03 dc a6 32 e5 a1 03 00 00 03 00 02 00 00 00 01 00 78 28 31 b1 9d dc b1 a6 9f 51 82 11 7c e6 6c 8c bf 0f 4d 3c a9 f4 1f f0 8a f9 27 5a a2 b2 b5 7e
nl80211: Frame TX status event A1=dc:a6:32:a3:b2:7e stype=11 cookie=0x0 ack=1
wlan0: Event TX_STATUS (16) received
mgmt::auth cb
handle_auth_cb: STA dc:a6:32:a3:b2:7e not found
nl80211: Event message available
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlan0
nl80211: New station dc:a6:32:a3:b2:7e
nl80211: Assoc Req IEs - hexdump(len=159): 00 0c 77 70 61 33 74 65 73 74 5f 70 69 34 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 21 02 03 14 24 02 01 0d 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 08 c0 00 00 00 00 0f ac 06 2d 1a 21 00 17 ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 01 00 08 00 00 00 00 40 f4 01 20 dd 1e 00 90 4c 33 21 00 17 ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 09 00 10 18 02 00 00 10 00 00 dd 07 00 50 f2 02 00 01 00
wlan0: Event ASSOC (0) received
wlan0: STA dc:a6:32:a3:b2:7e IEEE 802.11: associated
STA included RSN IE in (Re)AssocReq
  New STA
ap_sta_add: register ap_handle_timer timeout for dc:a6:32:a3:b2:7e (300 seconds - ap_max_inactivity)
nl80211: Set STA flags - ifname=wlan0 addr=dc:a6:32:a3:b2:7e total_flags=0x68 flags_or=0x8 flags_and=0xfffffff9 authorized=0
wlan0: STA dc:a6:32:a3:b2:7e WPA: event 1 notification
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x55918e5aa0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=dc:a6:32:a3:b2:7e
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
IEEE 802.1X: Ignore STA - 802.1X not enabled or forced for WPS
wlan0: STA dc:a6:32:a3:b2:7e WPA: start authentication
WPA: dc:a6:32:a3:b2:7e WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x55918e5aa0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=dc:a6:32:a3:b2:7e
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Set STA flags - ifname=wlan0 addr=dc:a6:32:a3:b2:7e total_flags=0x68 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan0: STA dc:a6:32:a3:b2:7e IEEE 802.1X: unauthorizing port
WPA: dc:a6:32:a3:b2:7e WPA_PTK_GROUP entering state IDLE
WPA: dc:a6:32:a3:b2:7e WPA_PTK entering state AUTHENTICATION
WPA: dc:a6:32:a3:b2:7e WPA_PTK entering state AUTHENTICATION2
WPA: Re-initialize GMK/Counter on first station
Get randomness: len=32 entropy=1
GMK - hexdump(len=32): [REMOVED]
Get randomness: len=32 entropy=0
Key Counter - hexdump(len=32): [REMOVED]
Get randomness: len=16 entropy=0
GTK - hexdump(len=16): [REMOVED]
Get randomness: len=16 entropy=0
IGTK - hexdump(len=16): [REMOVED]
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=3 addr=0x556cbe32a0 key_idx=1 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
   broadcast key
nl80211: NL80211_CMD_SET_KEY - default key
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=4 addr=0x556cbe32a0 key_idx=4 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
   broadcast key
nl80211: NL80211_CMD_SET_KEY - default key
Get randomness: len=32 entropy=0
WPA: Assign ANonce - hexdump(len=32): 48 31 37 11 2d 7e 80 a3 71 16 7d c6 e7 4a e5 a9 50 ba 19 0f d4 cb bd 57 7c 8b 4b 20 75 64 36 e4
WPA: dc:a6:32:a3:b2:7e WPA_PTK entering state INITPSK
No PSK for STA trying to use SAE with PMKSA caching
No PSK for STA trying to use SAE with PMKSA caching
wlan0: STA dc:a6:32:a3:b2:7e WPA: no PSK configured for the STA
WPA: dc:a6:32:a3:b2:7e WPA_PTK entering state DISCONNECT
wpa_sta_disconnect STA dc:a6:32:a3:b2:7e (reason 2)
hostapd_wpa_auth_disconnect: WPA authenticator requests disconnect: STA dc:a6:32:a3:b2:7e reason 2
wlan0: ap_sta_disconnect addr dc:a6:32:a3:b2:7e reason=2
nl80211: sta_remove -> DEL_STATION wlan0 dc:a6:32:a3:b2:7e --> 0 (Success)
nl80211: Set STA flags - ifname=wlan0 addr=dc:a6:32:a3:b2:7e total_flags=0x8 flags_or=0x8 flags_and=0xfffffff9 authorized=0
wlan0: STA dc:a6:32:a3:b2:7e WPA: event 3 notification
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x55918e5aa0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=dc:a6:32:a3:b2:7e
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
wlan0: ap_sta_disconnect: reschedule ap_handle_timer timeout for dc:a6:32:a3:b2:7e (5 seconds - AP_MAX_INACTIVITY_AFTER_DEAUTH)
WPA: dc:a6:32:a3:b2:7e WPA_PTK entering state DISCONNECTED
WPA: dc:a6:32:a3:b2:7e WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x55918e5aa0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=dc:a6:32:a3:b2:7e
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Set STA flags - ifname=wlan0 addr=dc:a6:32:a3:b2:7e total_flags=0x8 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan0: STA dc:a6:32:a3:b2:7e IEEE 802.1X: unauthorizing port
wlan0: hostapd_new_assoc_sta: reschedule ap_handle_timer timeout for dc:a6:32:a3:b2:7e (300 seconds - ap_max_inactivity)
wlan0: Deauthentication callback for STA dc:a6:32:a3:b2:7e
wlan0: Removing STA dc:a6:32:a3:b2:7e from kernel driver
nl80211: sta_remove -> DEL_STATION wlan0 dc:a6:32:a3:b2:7e --> 0 (Success)
wlan0: STA dc:a6:32:a3:b2:7e MLME: MLME-DEAUTHENTICATE.indication(dc:a6:32:a3:b2:7e, 2)
wlan0: STA dc:a6:32:a3:b2:7e MLME: MLME-DELETEKEYS.request(dc:a6:32:a3:b2:7e)
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x55918e5aa0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=dc:a6:32:a3:b2:7e
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Event message available
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan0
nl80211: Delete station dc:a6:32:a3:b2:7e
wlan0: Event DISASSOC (1) received
wlan0: STA dc:a6:32:a3:b2:7e IEEE 802.11: disassociated
nl80211: Set STA flags - ifname=wlan0 addr=dc:a6:32:a3:b2:7e total_flags=0x8 flags_or=0x8 flags_and=0xfffffff9 authorized=0
wlan0: STA dc:a6:32:a3:b2:7e WPA: event 2 notification
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x55918e5aa0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=dc:a6:32:a3:b2:7e
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
WPA: dc:a6:32:a3:b2:7e WPA_PTK entering state DISCONNECTED
WPA: dc:a6:32:a3:b2:7e WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x55918e5aa0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=dc:a6:32:a3:b2:7e
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Set STA flags - ifname=wlan0 addr=dc:a6:32:a3:b2:7e total_flags=0x8 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan0: STA dc:a6:32:a3:b2:7e IEEE 802.1X: unauthorizing port
nl80211: Set STA flags - ifname=wlan0 addr=dc:a6:32:a3:b2:7e total_flags=0x8 flags_or=0x8 flags_and=0xfffffff9 authorized=0
nl80211: sta_remove -> DEL_STATION wlan0 dc:a6:32:a3:b2:7e --> 0 (Success)
hostapd_ht_operation_update current operation mode=0x0
hostapd_ht_operation_update new operation mode=0x0 changes=0
ap_free_sta: cancel ap_handle_timer for dc:a6:32:a3:b2:7e

dmesg on the AP has these error messages related to brcmfmac:

[  404.451184] ieee80211 phy0: brcmf_cfg80211_mgmt_tx: TX Auth frame operation is failed: status=8)
[  404.451328] ieee80211 phy0: brcmf_cfg80211_del_station: SCB_DEAUTHENTICATE_FOR_REASON failed -110
[  422.883159] ieee80211 phy0: brcmf_cfg80211_mgmt_tx: TX Auth frame operation is failed: status=8)
[  423.299243] brcmfmac: brcmf_cfg80211_stop_ap: bss_enable config failed -110
[  423.302631] ieee80211 phy0: brcmf_cfg80211_stop_ap: SET SSID error (-512)
[  423.302692] ieee80211 phy0: brcmf_proto_bcdc_query_dcmd: brcmf_proto_bcdc_msg failed w/status -110
[  423.302709] brcmfmac: brcmf_cfg80211_stop_ap: wl apsta failed (-110)
[  423.302749] ieee80211 phy0: brcmf_cfg80211_stop_ap: BRCMF_C_DOWN error -110
[  423.302965] ieee80211 phy0: brcmf_cfg80211_stop_ap: Set AP mode error -512
[  423.303022] ieee80211 phy0: brcmf_cfg80211_stop_ap: BRCMF_C_UP error -110
[  423.303069] ieee80211 phy0: brcmf_set_mpc: fail to set mpc
[  423.304598] brcmfmac: brcmf_sdio_read_control: last control frame is being processed.
[  423.304774] brcmfmac: brcmf_sdio_read_control: last control frame is being processed.
[ 1199.075192] ieee80211 phy0: brcmf_cfg80211_mgmt_tx: TX Auth frame operation is failed: status=8)

client side dmesg:

[  509.970317] ieee80211 phy0: brcmf_cfg80211_external_auth: External authentication failed: status=1
[  509.986259] ieee80211 phy0: brcmf_cfg80211_external_auth: External authentication failed: status=1
[  513.762040] ieee80211 phy0: brcmf_notify_ext_auth_request: Ext Auth request to supplicant failed (-22)
[  513.762074] ieee80211 phy0: brcmf_fweh_event_worker: event handler failed (187)
[  519.983653] ieee80211 phy0: brcmf_notify_ext_auth_request: Ext Auth request to supplicant failed (-22)
[  519.983690] ieee80211 phy0: brcmf_fweh_event_worker: event handler failed (187)
[ 7175.975251] ieee80211 phy0: brcmf_cfg80211_external_auth: External authentication failed: status=1
[ 7175.990947] ieee80211 phy0: brcmf_cfg80211_external_auth: External authentication failed: status=1
antonsviridenko commented 1 year ago

I guess this part of the hostapd output may indicate the possible place where things go wrong

nl80211: set_key failed; err=-22 Invalid argument
lategoodbye commented 1 year ago

Raspberry is unable to run vanilla upstream kernel, so I had to apply kernel patches to the 5.15.y branch of a raspberry fork of the Linux kernel. Some patching conflicts were present and I had to fix them manually.

@antonsviridenko This is definitely not true. All Raspberry Pi can run a mainline kernel. There are just a few limitations regarding media support and hw acceleration, but that's not relevant for Wifi support.

antonsviridenko commented 1 year ago

@lategoodbye hmm, interesting, that's unexpected news for me, going to try vanilla kernel, thank you

lategoodbye commented 1 year ago

In my opinion providing some patches for a specific LTS to gain WPA3 support is a little bit pointless. This should be integrated by the vendor in the mainline kernel.

@antonsviridenko Maybe this is helpful https://gist.github.com/lategoodbye/c7317a42bf7f9c07f5a91baed8c68f75

antonsviridenko commented 1 year ago

I tried with Linux Stable v5.15.58 exactly the same version recommended in driver README, got same results, looks like this driver does not work as expected.

Successfully initialized wpa_supplicant
nl80211: kernel reports: Registration to specific type not supported
wlan0: Trying to associate with SSID 'wpa3test_pi4'
wlan0: PMKSA-CACHE-ADDED dc:a6:32:e5:a1:03 0
wlan0: CTRL-EVENT-ASSOC-REJECT bssid=dc:a6:32:e5:a1:03 status_code=16
wlan0: PMKSA-CACHE-REMOVED dc:a6:32:e5:a1:03 0
wlan0: Trying to associate with SSID 'wpa3test_pi4'
wlan0: CTRL-EVENT-ASSOC-REJECT bssid=00:00:00:00:00:00 status_code=16
wlan0: Trying to associate with SSID 'wpa3test_pi4'
wlan0: Authentication with dc:a6:32:e5:a1:03 timed out.
wlan0: CTRL-EVENT-DISCONNECTED bssid=dc:a6:32:e5:a1:03 reason=3 locally_generated=1
nl80211: Event message available
nl80211: Drv Event 60 (NL80211_CMD_FRAME_TX_STATUS) received for wlan0
nl80211: MLME event 60 (NL80211_CMD_FRAME_TX_STATUS) on wlan0(dc:a6:32:e5:a1:03) A1=dc:a6:32:a3:b2:7e A2=dc:a6:32:e5:a1:03
nl80211: MLME event frame - hexdump(len=128): b0 00 00 00 dc a6 32 a3 b2 7e dc a6 32 e5 a1 03 dc a6 32 e5 a1 03 00 00 03 00 01 00 00 00 13 00 1a 68 c1 54 d3 58 06 6b c3 53 7d 32 3a cd b1 64 28 ff a4 8e 8e 82 96 02 d1 a2 78 42 d7 f6 a4 ee 5e 84 52 02 96 fe 39 68 a4 7e cd 99 26 80 4a 3c 47 5c 7b 27 79 65 e1 58 81 e8 e2 09 4e 91 3c cd 97 40 2f eb 35 83 9c 3c 2d cb ef ff f8 30 ed cb 68 af 97 1c 5f c5 dc 6e 21 57 60 2f 71 d2 0b 2d
nl80211: Frame TX status event A1=dc:a6:32:a3:b2:7e stype=11 cookie=0x0 ack=1
wlan0: Event TX_STATUS (16) received
mgmt::auth cb
handle_auth_cb: STA dc:a6:32:a3:b2:7e not found
nl80211: Event message available
nl80211: Drv Event 60 (NL80211_CMD_FRAME_TX_STATUS) received for wlan0
nl80211: MLME event 60 (NL80211_CMD_FRAME_TX_STATUS) on wlan0(dc:a6:32:e5:a1:03) A1=dc:a6:32:a3:b2:7e A2=dc:a6:32:e5:a1:03
nl80211: MLME event frame - hexdump(len=64): b0 00 00 00 dc a6 32 a3 b2 7e dc a6 32 e5 a1 03 dc a6 32 e5 a1 03 00 00 03 00 02 00 00 00 01 00 3b ec 50 2d 60 35 c6 b2 bc 8b ae 91 ac 6a 8f 5a 46 ec c7 2a dc b5 1c 13 78 6a 93 64 08 d7 b2 14
nl80211: Frame TX status event A1=dc:a6:32:a3:b2:7e stype=11 cookie=0x0 ack=1
wlan0: Event TX_STATUS (16) received
mgmt::auth cb
handle_auth_cb: STA dc:a6:32:a3:b2:7e not found
nl80211: Event message available
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlan0
nl80211: New station dc:a6:32:a3:b2:7e
nl80211: Assoc Req IEs - hexdump(len=159): 00 0c 77 70 61 33 74 65 73 74 5f 70 69 34 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 21 02 03 14 24 02 01 0b 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 08 c0 00 00 00 00 0f ac 06 2d 1a 21 00 17 ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 01 00 08 00 00 00 00 40 f4 01 20 dd 1e 00 90 4c 33 21 00 17 ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 09 00 10 18 02 00 00 10 00 00 dd 07 00 50 f2 02 00 01 00
wlan0: Event ASSOC (0) received
wlan0: STA dc:a6:32:a3:b2:7e IEEE 802.11: associated
STA included RSN IE in (Re)AssocReq
  New STA
ap_sta_add: register ap_handle_timer timeout for dc:a6:32:a3:b2:7e (300 seconds - ap_max_inactivity)
nl80211: Set STA flags - ifname=wlan0 addr=dc:a6:32:a3:b2:7e total_flags=0x68 flags_or=0x8 flags_and=0xfffffff9 authorized=0
wlan0: STA dc:a6:32:a3:b2:7e WPA: event 1 notification
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0xaaaad0a9baa0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=dc:a6:32:a3:b2:7e
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
IEEE 802.1X: Ignore STA - 802.1X not enabled or forced for WPS
wlan0: STA dc:a6:32:a3:b2:7e WPA: start authentication
WPA: dc:a6:32:a3:b2:7e WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0xaaaad0a9baa0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=dc:a6:32:a3:b2:7e
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Set STA flags - ifname=wlan0 addr=dc:a6:32:a3:b2:7e total_flags=0x68 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan0: STA dc:a6:32:a3:b2:7e IEEE 802.1X: unauthorizing port
WPA: dc:a6:32:a3:b2:7e WPA_PTK_GROUP entering state IDLE
WPA: dc:a6:32:a3:b2:7e WPA_PTK entering state AUTHENTICATION
WPA: dc:a6:32:a3:b2:7e WPA_PTK entering state AUTHENTICATION2
WPA: Re-initialize GMK/Counter on first station
Get randomness: len=32 entropy=1
GMK - hexdump(len=32): [REMOVED]
Get randomness: len=32 entropy=0
Key Counter - hexdump(len=32): [REMOVED]
Get randomness: len=16 entropy=0
GTK - hexdump(len=16): [REMOVED]
Get randomness: len=16 entropy=0
IGTK - hexdump(len=16): [REMOVED]
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=3 addr=0xaaaab44432a0 key_idx=1 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
   broadcast key
nl80211: NL80211_CMD_SET_KEY - default key
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=4 addr=0xaaaab44432a0 key_idx=4 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
   broadcast key
nl80211: NL80211_CMD_SET_KEY - default key
Get randomness: len=32 entropy=0
WPA: Assign ANonce - hexdump(len=32): 16 ca 62 21 e1 75 b7 1c 19 52 b6 85 93 f9 0f 70 fc 39 d4 80 6a bd 7b 16 c3 e0 a0 09 58 85 1c 56
WPA: dc:a6:32:a3:b2:7e WPA_PTK entering state INITPSK
No PSK for STA trying to use SAE with PMKSA caching
No PSK for STA trying to use SAE with PMKSA caching
wlan0: STA dc:a6:32:a3:b2:7e WPA: no PSK configured for the STA
WPA: dc:a6:32:a3:b2:7e WPA_PTK entering state DISCONNECT
wpa_sta_disconnect STA dc:a6:32:a3:b2:7e (reason 2)
hostapd_wpa_auth_disconnect: WPA authenticator requests disconnect: STA dc:a6:32:a3:b2:7e reason 2
wlan0: ap_sta_disconnect addr dc:a6:32:a3:b2:7e reason=2
nl80211: sta_remove -> DEL_STATION wlan0 dc:a6:32:a3:b2:7e --> 0 (Success)
nl80211: Set STA flags - ifname=wlan0 addr=dc:a6:32:a3:b2:7e total_flags=0x8 flags_or=0x8 flags_and=0xfffffff9 authorized=0
wlan0: STA dc:a6:32:a3:b2:7e WPA: event 3 notification
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0xaaaad0a9baa0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=dc:a6:32:a3:b2:7e
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
wlan0: ap_sta_disconnect: reschedule ap_handle_timer timeout for dc:a6:32:a3:b2:7e (5 seconds - AP_MAX_INACTIVITY_AFTER_DEAUTH)
WPA: dc:a6:32:a3:b2:7e WPA_PTK entering state DISCONNECTED
WPA: dc:a6:32:a3:b2:7e WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0xaaaad0a9baa0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=dc:a6:32:a3:b2:7e
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Set STA flags - ifname=wlan0 addr=dc:a6:32:a3:b2:7e total_flags=0x8 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan0: STA dc:a6:32:a3:b2:7e IEEE 802.1X: unauthorizing port
wlan0: hostapd_new_assoc_sta: reschedule ap_handle_timer timeout for dc:a6:32:a3:b2:7e (300 seconds - ap_max_inactivity)
wlan0: Deauthentication callback for STA dc:a6:32:a3:b2:7e
wlan0: Removing STA dc:a6:32:a3:b2:7e from kernel driver
nl80211: sta_remove -> DEL_STATION wlan0 dc:a6:32:a3:b2:7e --> 0 (Success)
wlan0: STA dc:a6:32:a3:b2:7e MLME: MLME-DEAUTHENTICATE.indication(dc:a6:32:a3:b2:7e, 2)
wlan0: STA dc:a6:32:a3:b2:7e MLME: MLME-DELETEKEYS.request(dc:a6:32:a3:b2:7e)
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0xaaaad0a9baa0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=dc:a6:32:a3:b2:7e
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Event message available
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan0
nl80211: Delete station dc:a6:32:a3:b2:7e
wlan0: Event DISASSOC (1) received
wlan0: STA dc:a6:32:a3:b2:7e IEEE 802.11: disassociated
nl80211: Set STA flags - ifname=wlan0 addr=dc:a6:32:a3:b2:7e total_flags=0x8 flags_or=0x8 flags_and=0xfffffff9 authorized=0
wlan0: STA dc:a6:32:a3:b2:7e WPA: event 2 notification
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0xaaaad0a9baa0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=dc:a6:32:a3:b2:7e
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
WPA: dc:a6:32:a3:b2:7e WPA_PTK entering state DISCONNECTED
WPA: dc:a6:32:a3:b2:7e WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0xaaaad0a9baa0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=dc:a6:32:a3:b2:7e
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Set STA flags - ifname=wlan0 addr=dc:a6:32:a3:b2:7e total_flags=0x8 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan0: STA dc:a6:32:a3:b2:7e IEEE 802.1X: unauthorizing port
nl80211: Set STA flags - ifname=wlan0 addr=dc:a6:32:a3:b2:7e total_flags=0x8 flags_or=0x8 flags_and=0xfffffff9 authorized=0
nl80211: sta_remove -> DEL_STATION wlan0 dc:a6:32:a3:b2:7e --> 0 (Success)
hostapd_ht_operation_update current operation mode=0x0
hostapd_ht_operation_update new operation mode=0x0 changes=0
ap_free_sta: cancel ap_handle_timer for dc:a6:32:a3:b2:7e
nl80211: Event message available
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan0
nl80211: Delete station dc:a6:32:a3:b2:7e
wlan0: Event DISASSOC (1) received
wlan0: STA dc:a6:32:a3:b2:7e IEEE 802.11: disassociated
Disassociation notification for unknown STA dc:a6:32:a3:b2:7e
nl80211: Event message available
nl80211: Drv Event 60 (NL80211_CMD_FRAME_TX_STATUS) received for wlan0
nl80211: MLME event 60 (NL80211_CMD_FRAME_TX_STATUS) on wlan0(dc:a6:32:e5:a1:03) A1=dc:a6:32:a3:b2:7e A2=dc:a6:32:e5:a1:03
nl80211: MLME event frame - hexdump(len=128): b0 00 00 00 dc a6 32 a3 b2 7e dc a6 32 e5 a1 03 dc a6 32 e5 a1 03 00 00 03 00 01 00 00 00 13 00 d9 8f 71 b3 33 54 e0 4a b5 bd 76 74 71 7a e6 d1 e7 4b 81 a6 80 e1 fe e0 e7 2d 83 9b 40 58 de 5e e0 5c 1f 25 03 66 03 68 47 ff 7f bb b7 c5 b8 2c d7 43 2a ee 12 00 12 e3 89 97 c4 d2 89 c4 dc 88 5a 6d b7 17 62 e9 3c 1f 65 4f c5 ee 18 11 4a 75 68 23 be d1 63 f4 81 1a 3d c5 2c 5a b1 16 67 b3
nl80211: Frame TX status event A1=dc:a6:32:a3:b2:7e stype=11 cookie=0x0 ack=1
wlan0: Event TX_STATUS (16) received
mgmt::auth cb
handle_auth_cb: STA dc:a6:32:a3:b2:7e not found
nl80211: Event message available
nl80211: Drv Event 60 (NL80211_CMD_FRAME_TX_STATUS) received for wlan0
nl80211: MLME event 60 (NL80211_CMD_FRAME_TX_STATUS) on wlan0(dc:a6:32:e5:a1:03) A1=dc:a6:32:a3:b2:7e A2=dc:a6:32:e5:a1:03
nl80211: MLME event frame - hexdump(len=64): b0 00 00 00 dc a6 32 a3 b2 7e dc a6 32 e5 a1 03 dc a6 32 e5 a1 03 00 00 03 00 02 00 00 00 01 00 91 d0 19 90 d6 6c 1d 65 25 89 bb be 63 7b 6e 7c 59 f2 15 40 85 f6 39 4f 39 d1 fc 16 83 22 5f 56
nl80211: Frame TX status event A1=dc:a6:32:a3:b2:7e stype=11 cookie=0x0 ack=1
wlan0: Event TX_STATUS (16) received
mgmt::auth cb
lategoodbye commented 1 year ago

@antonsviridenko Could you please list which components you replaced with the Cypress ones on the Raspberry Pi?

antonsviridenko commented 1 year ago