Open hvenev opened 4 years ago
Thank you for reply. I follow the README of Cypress's patch:
### Using Linux Stable v5.4.18
#1. Download Linux stable kernel source
wget https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/snapshot/linux-5.4.18.tar.gz
tar zxvf linux-5.4.18.tar.gz
#2. In Linux root folder, untar/apply cypress patches with below bash commands
cd linux-5.4.18
tar zxvf cypress-patch*.tar.gz
for i in cypress-patch/*.patch; do patch -p1 < $i; done
#3. Set kernel .config and enable below options, then compile kernel image
# CONFIG_BRCMUTIL=y
# CONFIG_BRCMFMAC=y
# CONFIG_BRCMFMAC_SDIO=y
# CONFIG_BRCMFMAC_PROTO_BCDC=y
# CONFIG_BRCMFMAC_PCIE=y
# CONFIG_BRCMFMAC_PROTO_MSGBUF=y
#4. (optional) Backup original firmware files
cp /lib/firmware/cypress /lib/firmware/cypress-bak -r # I failed here
#5. Update firmware files in /lib/firmware/cypress
tar zxvf cypress-firmware*.tar.gz
cp firmware/* /lib/firmware/cypress # I failed here
#6. Boot the system with the new kernel image
Actually, I even don't have /lib/firmware
. Just not sure, is this situation all the same with everyone? Or may any wrong installation has been done?
Update 1: So, I have successfully installed the kernel, patches, and hostap from Cypress, also copied/renamed the brcmfmac43455-sdio.txt as your above recommendation. However, my wlan0 suddenly went away!!! There is nothing from iwconfig, ifconfig, rfkill. Still looking for a solution but I think I have to install a fresh OS and do everything from scratch @@
Update 2: Has anyone set up as the above README 100%? When I tried to set CONFIG_BRCMUTIL=y and CONFIG_BRCMFMAC=y, these configurations CONFIG_CFG80211 and CONFIG_RFKILL also needed to be changed to be =y. I also don't know what to do with devicetree and cirrent file. Could anyone please help, what should I do now?
Please may we get 802.11w and SAE both working 'out of the box' in Raspberry Pi OS?
It would be great if at least WPA2 still works if WPA2/WPA3 is active on AP. This doesn't work as long as Raspi fails with optional 11w.
@pelwell - what is the road to getting these included in the firmware package?
IMHO, 802.11w
is an important security feature.
So, what is required to get this working out of the box? What's the process?
If this isn't going to be patched there needs to be a note in the wpa_supplicant config file. I was running WPA2 and WPA3 in mixed mode on OpenWRT and my PI 4B was not able to connect. I had to change it to WPA2 only and then disable 802.11w for the PI to connect.
I also cannot connect to a wpa3-sae network with a rpi 4. All of my other devices can. Raspberry Pi is falling behind it seems.
It seems kernel 5.10 should support WPA3
brcmfmac: support SAE authentication offload in AP mode https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v5.10.40&id=d5f59c964e15e9e2cffaf8b0e9034616568717f9
Linux rpi 5.13.8 #1-NixOS SMP Wed Aug 4 10:47:57 UTC 2021 aarch64 GNU/Linux
[ 15.464751] brcmfmac: brcmf_fw_alloc_request: using brcm/brcmfmac43455-sdio for chip BCM4345/6 [ 15.470890] brcmfmac: brcmf_c_preinit_dcmds: Firmware: BCM4345/6 wl0: Jan 4 2021 19:56:29 version 7.45.229 (617f1f5 CY) FWID 01-2dbd9d2e
Unable to connect to my SAE home network. IWD just replies with "Operation unsupported" for SAE/MFP networks.
There is an interesting pointer in an issue that references this one: https://github.com/raspberrypi/linux/issues/4093#issuecomment-855412224
According to @graysky2 it seems that connecting via iwd
to WPA3
networks works.
Can't confirm that iwd works. Neither for pure WPA3 nor for WPA2/3 mixed mode. I get either Operation unsupported
or Operation failed
. Kernel 5.10.63-v7+
This issue was opened in May of 2020 and my current up to date R-Pi 4 is unable to connect to 802.11w networks. This is a standard network type in response to a real world problem (deauth attacks), is there an an ETA for resolution?
Thank you
There is an open issue with Infineon about this. Although the firmware's build information appears to show support for Management Frame Protection (the more descriptive name for the feature known as 802.11w), when the brcmfmac driver queries the firmware's capabilities it claims not to support it.
@pelwell would you mind linking to the respective issue?
I couldn't find a public issue tracker but a community forum at Infineon.
A quick Google search didn't turn up the relevant issue though.
That's because it isn't public.
Any update on this?
I managed to connect to a OpenWRT router with WPA2-PSK/WPA3-SAE Mixed Mode
using iwd
. Without any changes to firmware/kernel/wpasupplicant/etc.
iwd
and enable the service
sudo apt install iwd
sudo systemctl enable iwd
wpasupplicant
completely - tried only disabling the service but wlan0 didn't get an IP
sudo apt-get remove --auto-remove wpasupplicant
OpenWrt
iwctl station wlan0 connect "SSID"
iwctl station wlan0 show
iwconfig
ifconfig wlan0
sudo reboot
These are my model & kernel versions:
# cat /proc/cpuinfo | grep Model
Model : Raspberry Pi 3 Model B Plus Rev 1.3
# uname -a
Linux raspberrypi 5.15.32-v8+ #1538 SMP PREEMPT Thu Mar 31 19:40:39 BST 2022 aarch64 GNU/Linux
I think the 5.15 kernel is a significant element in your configuration. Infineon came back to me with a patch for 5.3, which is so old the patch no longer applies. The reason is doesn't apply is that the upstream brcmfmac code has been reorganised in a way that fixes the problem.
No issue on my end:
/etc/wpa_supplicant/wpa_supplicant.conf
:
update_config=1
network={
ssid="ssid"
key_mgmt=WPA-PSK-SHA256
psk=psk
ieee80211w=2
}
I hope this isn't too off topic, but this isn't working for me on a Pi 3 running Raspberry Pi OS bullseye, 32bit userland with a 64bit kernel (5.15.32-v8+). I switched my APs (OpenWRT 21.02 on Ubiquiti AP-AC PRO) to WPA2/WPA3 mixed-mode, and the Pi 3 suddenly failed to connect anymore. I reverted the change to the APs and it reconnected fine.
I've confirmed a Raspberry Pi 3 Model B Plus Rev 1.3 running OctoPi RC2 (headless Bullseye) connects to an OpenWRT (21.02.3) WiFi access point set to WPA2-EAP with 802.11w required. It was also able to connect running Ubuntu 22.04, however it would seemly randomly (30min-24hr) drop the connection until reboot (also happens on Bullseye, probably a rekey issue). As others mentioned, I'm guessing the 802.11w issue is a Kernel issue that was fixed a while ago (but not backported . . .) and is just now making it into mainline OS releases. The rekeying problem should probably be treated as a separate issue.
network={ ssid="XXX" proto=RSN key_mgmt=WPA-EAP-SHA256 eap=PEAP pairwise=CCMP auth_alg=OPEN ieee80211w=2 identity="xxxxx" password="XxXxXxXxX" phase1="peaplabel=0" phase2="auth=MSCHAPV2" priority=1 }
Hi, I notice the last post here was back in August - have things moved on since then or is this still an unresolved issue? I am experiencing the problem as described by previous posts.
WPA3 support requires changes to the brcmfmac driver. Overwriting >500 source files in our kernel tree with versions modified by Infineon/Cypress, then patching them up to reapply our changes, was never something we were going to do. We are optimistic that they may switch to a more user-friendly way of sharing changes, at which point we will reconsider the matter.
@pelwell Out of curiosity, why was this problematic wifi chipset chosen in the first place?
Why are you hopeful that Infeneon/Cypress may "switch to a more user-friendly way of sharing changes"?
Are core developers already in contact with them?
Questions about commercial arrangements will not be answered here.
So, this means that Raspberry 3 and 4 does not and will not support WPA3 and/or WPA2/WPA3 mixed mode with RasPi OS due to broken 802.11w support. Even if set to optional. Only to sum things up and end the 2+ years waiting.
does not
Correct.
and will not
Incorrect. The necessary brcmfmac patches could be upstreamed, or made available in a sensible form, at which point we would include them.
I'm trying to run WPA3-only access point on Raspberry Pi 4 and having some issues.
I used the latest release of Cypress driver/patchset/firmware from https://community.infineon.com/t5/Wi-Fi-Bluetooth-for-Linux/Cypress-Linux-WiFi-Driver-Release-FMAC-2022-09-09/td-p/370346
and followed all instructions,
applied kernel patches on a branch 5.10.y
of raspberry kernel,
had to manually resolve patch conflicts and edit some source files,
built the kernel, modules, installed the firmware,
copied nvram file from /lib/firmware/brcm/brcmfmac43455-sdio.txt
to
/lib/firmware/cypress/cyfmac43455-sdio.txt
patched hostapd and wpa_supplicant per cypress instructions.
According to @cybern0id -s comment in this thread, https://github.com/raspberrypi/linux/issues/3619#issuecomment-652181010 AP mode should work with WPA3, but instead I see this network listed as 'WEP' in all client devices.
hostapd.conf:
interface=wlan0
ssid=wpa3test
hw_mode=g
channel=11
driver=nl80211
ctrl_interface=/var/run/hostapd
ctrl_interface_group=netdev
macaddr_acl=0
wmm_enabled=1
ignore_broadcast_ssid=0
ieee80211n=1
ieee80211w=2
ieee80211d=1
ieee80211ac=1
auth_algs=1
wpa=2
wpa_key_mgmt=SAE
rsn_pairwise=CCMP
sae_password=saepassword
sae_require_mfp=1
I tried to use Raspberry Pi 3 as a testing client for WPA3 mode, used the same patched kernel build and patched wpa_supplicant with following configuration:
network={
disabled=0
ssid="wpa3test"
proto=RSN
key_mgmt=SAE
sae_password="saepassword"
ieee80211w=2
}
xx:xx:xx:xx:xx:xx 2462 -53 [WEP][ESS] wpa3test
Any ideas how to debug/investigate?
Debug output of patched hostapd:
sudo /home/pi/hostap/hostapd/hostapd -P /run/hostapd.pid -B /etc/hostapd/hostapd.conf -dd
random: Trying to read entropy from /dev/random
Configuration file: /etc/hostapd/hostapd.conf
ctrl_interface_group=108 (from group name 'netdev')
nl80211: Using driver-based roaming
nl80211: TDLS supported
nl80211: Supported cipher 00-0f-ac:1
nl80211: Supported cipher 00-0f-ac:5
nl80211: Supported cipher 00-0f-ac:2
nl80211: Supported cipher 00-0f-ac:4
nl80211: Supported cipher 00-0f-ac:10
nl80211: Supported cipher 00-0f-ac:8
nl80211: Supported cipher 00-0f-ac:9
nl80211: Supported cipher 00-0f-ac:6
nl80211: Supported cipher 00-0f-ac:13
nl80211: Supported cipher 00-0f-ac:11
nl80211: Supported cipher 00-0f-ac:12
nl80211: Using driver-based off-channel TX
nl80211: Supported vendor command: vendor_id=0x1018 subcmd=1
nl80211: Supported vendor command: vendor_id=0x1018 subcmd=2
nl80211: Supported vendor event: vendor_id=0x1018 subcmd=0
nl80211: Use separate P2P group interface (driver advertised support)
nl80211: Enable multi-channel concurrent (driver advertised support)
nl80211: use P2P_DEVICE support
nl80211: key_mgmt=0xf0f enc=0xfef auth=0x7 flags=0x2000000380cfacc rrm_flags=0x0 probe_resp_offloads=0x0 max_stations=0 max_remain_on_chan=5000 max_scan_ssids=10
nl80211: interface wlan0 in phy phy0
nl80211: Set mode ifindex 3 iftype 3 (AP)
nl80211: Setup AP(wlan0) - device_ap_sme=1 use_monitor=0
nl80211: Subscribe to mgmt frames with AP handle 0x5588b4d170 (device SME)
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x5588b4d170 match=04 multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=1): 04
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x5588b4d170 match=0501 multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=2): 05 01
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x5588b4d170 match=0503 multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=2): 05 03
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x5588b4d170 match=0504 multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=2): 05 04
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x5588b4d170 match=06 multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=1): 06
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x5588b4d170 match=08 multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=1): 08
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x5588b4d170 match=09 multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=1): 09
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x5588b4d170 match=0a multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=1): 0a
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x5588b4d170 match=11 multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=1): 11
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x5588b4d170 match=7f multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=1): 7f
nl80211: Failed to subscribe for mgmt frames from SME driver - trying to run without it
nl80211: Enable Probe Request reporting nl_preq=0x5588b4d170
nl80211: Register frame type=0x40 (WLAN_FC_STYPE_PROBE_REQ) nl_handle=0x5588b4d170 match= multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=64): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=0): [NULL]
nl80211: Failed to enable Probe Request frame reporting in AP mode
rfkill: initial event: idx=0 type=1 op=0 soft=0 hard=0
nl80211: Add own interface ifindex 3 (ifidx_reason -1)
nl80211: if_indices[16]: 3(-1)
phy: phy0
BSS count 1, BSSID mask 00:00:00:00:00:00 (0 bits)
Using existing control interface directory.
nl80211: 2402-2482 @ 40 MHz 20 mBm
nl80211: 5170-5250 @ 80 MHz 18 mBm
nl80211: 5250-5330 @ 80 MHz 18 mBm (DFS)
nl80211: 57000-66000 @ 2160 MHz 40 mBm
nl80211: Added 802.11b mode based on 802.11g information
nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
nl80211: Mode IEEE 802.11a: 5180 5200 5220 5240 5745 5765 5785 5805 5825
nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
Allowed channel: mode=1 chan=1 freq=2412 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=2 freq=2417 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=3 freq=2422 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=4 freq=2427 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=5 freq=2432 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=6 freq=2437 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=7 freq=2442 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=8 freq=2447 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=9 freq=2452 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=10 freq=2457 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=11 freq=2462 MHz max_tx_power=20 dBm
Allowed channel: mode=2 chan=36 freq=5180 MHz max_tx_power=18 dBm
Allowed channel: mode=2 chan=40 freq=5200 MHz max_tx_power=18 dBm
Allowed channel: mode=2 chan=44 freq=5220 MHz max_tx_power=18 dBm
Allowed channel: mode=2 chan=48 freq=5240 MHz max_tx_power=18 dBm
Allowed channel: mode=2 chan=149 freq=5745 MHz max_tx_power=0 dBm
Allowed channel: mode=2 chan=153 freq=5765 MHz max_tx_power=0 dBm
Allowed channel: mode=2 chan=157 freq=5785 MHz max_tx_power=0 dBm
Allowed channel: mode=2 chan=161 freq=5805 MHz max_tx_power=0 dBm
Allowed channel: mode=2 chan=165 freq=5825 MHz max_tx_power=0 dBm
Allowed channel: mode=0 chan=1 freq=2412 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=2 freq=2417 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=3 freq=2422 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=4 freq=2427 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=5 freq=2432 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=6 freq=2437 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=7 freq=2442 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=8 freq=2447 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=9 freq=2452 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=10 freq=2457 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=11 freq=2462 MHz max_tx_power=20 dBm
hw vht capab: 0x0, conf vht capab: 0x0
Completing interface initialization
Mode: IEEE 802.11g Channel: 11 Frequency: 2462 MHz
hostapd_handle_dfs_offload: iface->cac_started: 0
hostapd_handle_dfs_offload: freq 2462 MHz does not require DFS. Continue channel/AP setup
Proceed with AP/channel setup
nl80211: Set freq 2462 (ht_enabled=1, vht_enabled=1, he_enabled=0, bandwidth=20 MHz, cf1=2462 MHz, cf2=0 MHz)
* freq=2462
* he_enabled=0
* vht_enabled=1
* ht_enabled=1
* bandwidth=20
* channel_width=1
* center_freq1=2462
* center_freq2=0
RATE[0] rate=10 flags=0x1
RATE[1] rate=20 flags=0x1
RATE[2] rate=55 flags=0x1
RATE[3] rate=110 flags=0x1
RATE[4] rate=60 flags=0x0
RATE[5] rate=90 flags=0x0
RATE[6] rate=120 flags=0x0
RATE[7] rate=180 flags=0x0
RATE[8] rate=240 flags=0x0
RATE[9] rate=360 flags=0x0
RATE[10] rate=480 flags=0x0
RATE[11] rate=540 flags=0x0
hostapd_setup_bss(hapd=0x5588b4b370 (wlan0), first=1)
nl80211: flush -> DEL_STATION wlan0 (all)
nl80211: Station flush failed: ret=-14 (Bad address)
Using interface wlan0 with hwaddr dc:a6:32:a3:b2:7e and ssid "wpa3test"
random: Got 20/20 random bytes
Get randomness: len=32 entropy=0
GMK - hexdump(len=32): [REMOVED]
Get randomness: len=32 entropy=0
Key Counter - hexdump(len=32): [REMOVED]
WPA: Delay group state machine start until Beacon frames have been configured
nl80211: Set beacon (beacon_set=0)
nl80211: Beacon head - hexdump(len=59): 80 00 00 00 ff ff ff ff ff ff dc a6 32 a3 b2 7e dc a6 32 a3 b2 7e 00 00 00 00 00 00 00 00 00 00 64 00 11 04 00 08 77 70 61 33 74 65 73 74 01 08 82 84 8b 96 0c 12 18 24 03 01 0b
nl80211: Beacon tail - hexdump(len=142): 07 06 47 45 20 01 0b 14 2a 01 04 32 04 30 48 60 6c 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 08 cc 00 2d 1a 0c 00 1f ff 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 bf 0c 00 00 00 00 ff ff 00 00 ff ff 00 00 c0 05 00 00 00 fc ff c3 02 00 28 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
nl80211: ifindex=3
nl80211: beacon_int=100
nl80211: beacon_rate=0
nl80211: rate_type=0
nl80211: dtim_period=2
nl80211: ssid=wpa3test
* beacon_int=100
* dtim_period=2
nl80211: hidden SSID not in use
nl80211: privacy=2
nl80211: auth_algs=0x1
nl80211: wpa_version=0x2
nl80211: key_mgmt_suites=0x400
nl80211: pairwise_ciphers=0x10
nl80211: group_cipher=0x10
nl802111: sae_pwe=0
wlan0: Deauthenticate all stations at BSS start
nl80211: sta_remove -> DEL_STATION wlan0 ff:ff:ff:ff:ff:ff --> 0 (Success)
WPA: Start group state machine to set initial keys
WPA: group state machine entering state GTK_INIT (VLAN-ID 0)
Get randomness: len=16 entropy=0
GTK - hexdump(len=16): [REMOVED]
Get randomness: len=16 entropy=0
IGTK - hexdump(len=16): [REMOVED]
WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0)
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=3 addr=0x557df33280 key_idx=1 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
broadcast key
nl80211: NL80211_CMD_SET_KEY - default key
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=4 addr=0x557df33280 key_idx=4 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
broadcast key
nl80211: NL80211_CMD_SET_KEY - default key
nl80211: Set wlan0 operstate 0->1 (UP)
netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=6 (IF_OPER_UP)
nl80211: TX queue param set: queue=0 aifs=1 cw_min=3 cw_max=7 burst_time=15 --> res=-95
Failed to set TX queue parameters for queue 0.
nl80211: TX queue param set: queue=1 aifs=1 cw_min=7 cw_max=15 burst_time=30 --> res=-95
Failed to set TX queue parameters for queue 1.
nl80211: TX queue param set: queue=2 aifs=3 cw_min=15 cw_max=63 burst_time=0 --> res=-95
Failed to set TX queue parameters for queue 2.
nl80211: TX queue param set: queue=3 aifs=7 cw_min=15 cw_max=1023 burst_time=0 --> res=-95
Failed to set TX queue parameters for queue 3.
wlan0: interface state COUNTRY_UPDATE->ENABLED
wlan0: AP-ENABLED
wlan0: Setup of interface done.
ctrl_iface not configured!
sudo iw phy phy0 info
Wiphy phy0
wiphy index: 0
max # scan SSIDs: 10
max scan IEs length: 2048 bytes
max # sched scan SSIDs: 16
max # match sets: 16
Retry short limit: 7
Retry long limit: 4
Coverage class: 0 (up to 0m)
Device supports roaming.
Device supports T-DLS.
Supported Ciphers:
* WEP40 (00-0f-ac:1)
* WEP104 (00-0f-ac:5)
* TKIP (00-0f-ac:2)
* CCMP-128 (00-0f-ac:4)
* CCMP-256 (00-0f-ac:10)
* GCMP-128 (00-0f-ac:8)
* GCMP-256 (00-0f-ac:9)
* CMAC (00-0f-ac:6)
* CMAC-256 (00-0f-ac:13)
* GMAC-128 (00-0f-ac:11)
* GMAC-256 (00-0f-ac:12)
Available Antennas: TX 0 RX 0
Supported interface modes:
* IBSS
* managed
* AP
* P2P-client
* P2P-GO
* P2P-device
Band 1:
Capabilities: 0x1062
HT20/HT40
Static SM Power Save
RX HT20 SGI
RX HT40 SGI
No RX STBC
Max AMSDU length: 3839 bytes
DSSS/CCK HT40
Maximum RX AMPDU length 65535 bytes (exponent: 0x003)
Minimum RX AMPDU time spacing: 16 usec (0x07)
HT TX/RX MCS rate indexes supported: 0-7
Bitrates (non-HT):
* 1.0 Mbps
* 2.0 Mbps (short preamble supported)
* 5.5 Mbps (short preamble supported)
* 11.0 Mbps (short preamble supported)
* 6.0 Mbps
* 9.0 Mbps
* 12.0 Mbps
* 18.0 Mbps
* 24.0 Mbps
* 36.0 Mbps
* 48.0 Mbps
* 54.0 Mbps
Frequencies:
* 2412 MHz [1] (20.0 dBm)
* 2417 MHz [2] (20.0 dBm)
* 2422 MHz [3] (20.0 dBm)
* 2427 MHz [4] (20.0 dBm)
* 2432 MHz [5] (20.0 dBm)
* 2437 MHz [6] (20.0 dBm)
* 2442 MHz [7] (20.0 dBm)
* 2447 MHz [8] (20.0 dBm)
* 2452 MHz [9] (20.0 dBm)
* 2457 MHz [10] (20.0 dBm)
* 2462 MHz [11] (20.0 dBm)
Band 2:
Capabilities: 0x1062
HT20/HT40
Static SM Power Save
RX HT20 SGI
RX HT40 SGI
No RX STBC
Max AMSDU length: 3839 bytes
DSSS/CCK HT40
Maximum RX AMPDU length 65535 bytes (exponent: 0x003)
Minimum RX AMPDU time spacing: 16 usec (0x07)
HT TX/RX MCS rate indexes supported: 0-7
VHT Capabilities (0x00001020):
Max MPDU length: 3895
Supported Channel Width: neither 160 nor 80+80
short GI (80 MHz)
SU Beamformee
VHT RX MCS set:
1 streams: MCS 0-9
2 streams: not supported
3 streams: not supported
4 streams: not supported
5 streams: not supported
6 streams: not supported
7 streams: not supported
8 streams: not supported
VHT RX highest supported: 0 Mbps
VHT TX MCS set:
1 streams: MCS 0-9
2 streams: not supported
3 streams: not supported
4 streams: not supported
5 streams: not supported
6 streams: not supported
7 streams: not supported
8 streams: not supported
VHT TX highest supported: 0 Mbps
Bitrates (non-HT):
* 6.0 Mbps
* 9.0 Mbps
* 12.0 Mbps
* 18.0 Mbps
* 24.0 Mbps
* 36.0 Mbps
* 48.0 Mbps
* 54.0 Mbps
Frequencies:
* 5180 MHz [36] (18.0 dBm)
* 5200 MHz [40] (18.0 dBm)
* 5220 MHz [44] (18.0 dBm)
* 5240 MHz [48] (18.0 dBm)
* 5745 MHz [149] (20.0 dBm)
* 5765 MHz [153] (20.0 dBm)
* 5785 MHz [157] (20.0 dBm)
* 5805 MHz [161] (20.0 dBm)
* 5825 MHz [165] (20.0 dBm)
Supported commands:
* new_interface
* set_interface
* new_key
* start_ap
* set_bss
* join_ibss
* set_pmksa
* del_pmksa
* flush_pmksa
* remain_on_channel
* frame
* set_wiphy_netns
* set_channel
* tdls_oper
* start_sched_scan
* start_p2p_device
* connect
* disconnect
* crit_protocol_start
* crit_protocol_stop
* update_connect_params
WoWLAN support:
* wake up on disconnect
* wake up on magic packet
* wake up on pattern match, up to 16 patterns of 1-128 bytes,
maximum packet offset 1500 bytes
software interface modes (can always be added):
valid interface combinations:
* #{ managed } <= 2, #{ P2P-device } <= 1, #{ P2P-client, P2P-GO } <= 1,
total <= 3, #channels <= 2
* #{ managed } <= 1, #{ AP } <= 1, #{ P2P-client } <= 1, #{ P2P-device } <= 1,
total <= 4, #channels <= 1
Device supports scan flush.
Device supports randomizing MAC-addr in sched scans.
max # scan plans: 1
max scan plan interval: 508
max scan plan iterations: 0
Supported TX frame types:
* managed: 0x00 0x10 0x20 0x30 0x40 0x50 0x60 0x70 0x80 0x90 0xa0 0xb0 0xc0 0xd0 0xe0 0xf0
* AP: 0x00 0x10 0x20 0x30 0x40 0x50 0x60 0x70 0x80 0x90 0xa0 0xb0 0xc0 0xd0 0xe0 0xf0
* P2P-client: 0x00 0x10 0x20 0x30 0x40 0x50 0x60 0x70 0x80 0x90 0xa0 0xb0 0xc0 0xd0 0xe0 0xf0
* P2P-GO: 0x00 0x10 0x20 0x30 0x40 0x50 0x60 0x70 0x80 0x90 0xa0 0xb0 0xc0 0xd0 0xe0 0xf0
* P2P-device: 0x00 0x10 0x20 0x30 0x40 0x50 0x60 0x70 0x80 0x90 0xa0 0xb0 0xc0 0xd0 0xe0 0xf0
Supported RX frame types:
* managed: 0x40 0xb0 0xd0
* AP: 0x00 0x20 0x40 0xa0 0xb0 0xc0 0xd0
* P2P-client: 0x40 0xd0
* P2P-GO: 0x00 0x20 0x40 0xa0 0xb0 0xc0 0xd0
* P2P-device: 0x40 0xd0
Supported extended features:
* [ CQM_RSSI_LIST ]: multiple CQM_RSSI_THOLD records
* [ 4WAY_HANDSHAKE_STA_PSK ]: 4-way handshake with PSK in station mode
* [ 4WAY_HANDSHAKE_STA_1X ]: 4-way handshake with 802.1X in station mode
* [ DFS_OFFLOAD ]: DFS offload
* [ 4WAY_HANDSHAKE_AP_PSK ]: AP mode PSK offload support
I'd help if I could (and had time) but unfortunately the SSD with all my custom builds on it failed, so I've lost all my build scripts and patches. Also, I was using a different kernel branch; 5.4.x not 5.10.x and I suspect that there will have been changes to 802.11x between those branches which may affect results.
So I tried the latest release of the driver https://community.infineon.com/t5/Wi-Fi-Bluetooth-for-Linux/Cypress-Linux-WiFi-Driver-Release-FMAC-2022-12-23/td-p/389610 based on a kernel version 5.15.58 and patched in the same way, solved some patching conflicts, now I am able to create WPA3 network on a Raspberry Pi 4 and other client devices can see it as a WPA3, but clients fail to connect.
I tried to post report about this issue in Infineon community forum but it was removed as a spam 🤡 https://community.infineon.com/t5/Wi-Fi-Bluetooth-for-Linux/bd-p/WiFiBluetoothLinux?type=discussions so reposting it here:
I'm trying to run a wi-fi access point in WPA3 mode on a Raspberry Pi 4 which has the BCM4345 chip.
I've downloaded the latest driver release v5.15.58-2022_1223 from 2022-12-23
and patched everything according to provided instructions.
Raspberry is unable to run vanilla upstream kernel, so I had to apply kernel patches to the 5.15.y branch of a raspberry fork of the Linux kernel. Some patching conflicts were present and I had to fix them manually.
uname -a
Linux raspberrypi 5.15.84-v8+ #1 SMP PREEMPT Thu Jan 12 20:39:06 +04 2023 aarch64 GNU/Linux
brcmfmac: brcmf_c_preinit_dcmds: Firmware: BCM4345/6 wl0: Sep 4 2022 21:48:18 version 7.45.251 (16ca9cf CY) FWID 01-774406d9
I'm running two Raspberry Pi 4 boards in testing setup, one as an AP and the second as a client. Both have the same patched kernel, firmware from the driver release and patched hostapd/wpa_supplicant.
Client is unable to authenticate to the WPA3 wireless network.
hostapd.conf:
country_code=GE
interface=wlan0
ssid=wpa3test_pi4
hw_mode=g
channel=11
driver=nl80211
ctrl_interface=/var/run/hostapd
ctrl_interface_group=netdev
macaddr_acl=0
wmm_enabled=1
ignore_broadcast_ssid=0
ieee80211n=1
ieee80211w=2
ieee80211d=1
ieee80211ac=1
auth_algs=1
wpa=2
wpa_key_mgmt=SAE
rsn_pairwise=CCMP
wpa_passphrase=saepassword
sae_password=saepassword
sae_require_mfp=1
wpa_supplicant.conf on a client side:
network={
ssid="wpa3test_pi4"
key_mgmt=SAE
proto=RSN
sae_password="saepassword"
ieee80211w=2
}
hostapd output with debugging enabled:
random: Trying to read entropy from /dev/random
Configuration file: /etc/hostapd/hostapd.conf
ctrl_interface_group=108 (from group name 'netdev')
nl80211: Using driver-based roaming
nl80211: Supported cipher 00-0f-ac:1
nl80211: Supported cipher 00-0f-ac:5
nl80211: Supported cipher 00-0f-ac:2
nl80211: Supported cipher 00-0f-ac:4
nl80211: Supported cipher 00-0f-ac:10
nl80211: Supported cipher 00-0f-ac:8
nl80211: Supported cipher 00-0f-ac:9
nl80211: Supported cipher 00-0f-ac:6
nl80211: Supported cipher 00-0f-ac:13
nl80211: Supported cipher 00-0f-ac:11
nl80211: Supported cipher 00-0f-ac:12
nl80211: Using driver-based off-channel TX
nl80211: Supported vendor command: vendor_id=0x1018 subcmd=1
nl80211: Supported vendor command: vendor_id=0x1018 subcmd=2
nl80211: Supported vendor command: vendor_id=0x319 subcmd=1
nl80211: Supported vendor command: vendor_id=0x319 subcmd=6
nl80211: Supported vendor command: vendor_id=0x319 subcmd=11
nl80211: Supported vendor command: vendor_id=0x319 subcmd=12
nl80211: Supported vendor command: vendor_id=0x319 subcmd=13
nl80211: Supported vendor command: vendor_id=0x319 subcmd=14
nl80211: Supported vendor command: vendor_id=0x319 subcmd=15
nl80211: Supported vendor command: vendor_id=0x319 subcmd=16
nl80211: Supported vendor command: vendor_id=0x319 subcmd=17
nl80211: Supported vendor event: vendor_id=0x1018 subcmd=0
nl80211: Use separate P2P group interface (driver advertised support)
nl80211: Enable multi-channel concurrent (driver advertised support)
nl80211: use P2P_DEVICE support
nl80211: key_mgmt=0xf0f enc=0xfef auth=0x7 flags=0x3a04fac4 rrm_flags=0x0 probe_resp_offloads=0x0 max_stations=0 max_remain_on_chan=5000 max_scan_ssids=10
nl80211: interface wlan0 in phy phy0
nl80211: Set mode ifindex 3 iftype 3 (AP)
nl80211: Setup AP(wlan0) - device_ap_sme=1 use_monitor=0
nl80211: Subscribe to mgmt frames with AP handle 0x5582bfa170 (device SME)
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x5582bfa170 match=04 multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=1): 04
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x5582bfa170 match=0501 multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=2): 05 01
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x5582bfa170 match=0503 multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=2): 05 03
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x5582bfa170 match=0504 multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=2): 05 04
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x5582bfa170 match=06 multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=1): 06
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x5582bfa170 match=08 multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=1): 08
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x5582bfa170 match=09 multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=1): 09
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x5582bfa170 match=0a multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=1): 0a
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x5582bfa170 match=11 multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=1): 11
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x5582bfa170 match=7f multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=1): 7f
nl80211: Failed to subscribe for mgmt frames from SME driver - trying to run without it
nl80211: Enable Probe Request reporting nl_preq=0x5582bfa170
nl80211: Register frame type=0x40 (WLAN_FC_STYPE_PROBE_REQ) nl_handle=0x5582bfa170 match= multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=64): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=0): [NULL]
nl80211: Failed to enable Probe Request frame reporting in AP mode
rfkill: initial event: idx=0 type=1 op=0 soft=0 hard=0
nl80211: Add own interface ifindex 3 (ifidx_reason -1)
nl80211: if_indices[16]: 3(-1)
phy: phy0
BSS count 1, BSSID mask 00:00:00:00:00:00 (0 bits)
Using existing control interface directory.
ctrl_iface bind(PF_UNIX) failed: Address already in use
ctrl_iface exists and seems to be in use - cannot override it
Delete '/var/run/hostapd/wlan0' manually if it is not used anymore
Failed to setup control interface for wlan0
wlan0: Unable to setup interface.
hostapd_interface_deinit_free(0x5582bf6e80)
hostapd_interface_deinit_free: num_bss=1 conf->num_bss=1
hostapd_interface_deinit(0x5582bf6e80)
wlan0: interface state UNINITIALIZED->DISABLED
hostapd_bss_deinit: deinit bss wlan0
wlan0: Deauthenticate all stations
nl80211: sta_remove -> DEL_STATION wlan0 ff:ff:ff:ff:ff:ff --> 0 (Success)
wlan0: AP-DISABLED
hostapd_cleanup(hapd=0x5582bf8350 (wlan0))
wlan0: CTRL-EVENT-TERMINATING
hostapd_free_hapd_data: Interface wlan0 wasn't started
hostapd_interface_deinit_free: driver=0x55773e97f8 drv_priv=0x5582bfbbc0 -> hapd_deinit
nl80211: deinit ifname=wlan0 disabled_11b_rates=0
nl80211: Remove monitor interface: refcount=0
nl80211: Remove beacon (ifindex=3)
netlink: Operstate: ifindex=3 linkmode=0 (kernel-control), operstate=6 (IF_OPER_UP)
hostapd_interface_free(0x5582bf6e80)
hostapd_interface_free: free hapd 0x5582bf8350
hostapd_cleanup_iface(0x5582bf6e80)
hostapd_cleanup_iface_partial(0x5582bf6e80)
hostapd_cleanup_iface: free iface=0x5582bf6e80
pi@raspberrypi:~ $ sudo rm /var/run/hostapd/wlan0
pi@raspberrypi:~ $ sudo hostap/hostapd/hostapd -dd /etc/hostapd/hostapd.conf
random: Trying to read entropy from /dev/random
Configuration file: /etc/hostapd/hostapd.conf
ctrl_interface_group=108 (from group name 'netdev')
nl80211: Using driver-based roaming
nl80211: Supported cipher 00-0f-ac:1
nl80211: Supported cipher 00-0f-ac:5
nl80211: Supported cipher 00-0f-ac:2
nl80211: Supported cipher 00-0f-ac:4
nl80211: Supported cipher 00-0f-ac:10
nl80211: Supported cipher 00-0f-ac:8
nl80211: Supported cipher 00-0f-ac:9
nl80211: Supported cipher 00-0f-ac:6
nl80211: Supported cipher 00-0f-ac:13
nl80211: Supported cipher 00-0f-ac:11
nl80211: Supported cipher 00-0f-ac:12
nl80211: Using driver-based off-channel TX
nl80211: Supported vendor command: vendor_id=0x1018 subcmd=1
nl80211: Supported vendor command: vendor_id=0x1018 subcmd=2
nl80211: Supported vendor command: vendor_id=0x319 subcmd=1
nl80211: Supported vendor command: vendor_id=0x319 subcmd=6
nl80211: Supported vendor command: vendor_id=0x319 subcmd=11
nl80211: Supported vendor command: vendor_id=0x319 subcmd=12
nl80211: Supported vendor command: vendor_id=0x319 subcmd=13
nl80211: Supported vendor command: vendor_id=0x319 subcmd=14
nl80211: Supported vendor command: vendor_id=0x319 subcmd=15
nl80211: Supported vendor command: vendor_id=0x319 subcmd=16
nl80211: Supported vendor command: vendor_id=0x319 subcmd=17
nl80211: Supported vendor event: vendor_id=0x1018 subcmd=0
nl80211: Use separate P2P group interface (driver advertised support)
nl80211: Enable multi-channel concurrent (driver advertised support)
nl80211: use P2P_DEVICE support
nl80211: key_mgmt=0xf0f enc=0xfef auth=0x7 flags=0x3a04fac4 rrm_flags=0x0 probe_resp_offloads=0x0 max_stations=0 max_remain_on_chan=5000 max_scan_ssids=10
nl80211: interface wlan0 in phy phy0
nl80211: Set mode ifindex 3 iftype 3 (AP)
nl80211: Setup AP(wlan0) - device_ap_sme=1 use_monitor=0
nl80211: Subscribe to mgmt frames with AP handle 0x55918d9170 (device SME)
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55918d9170 match=04 multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=1): 04
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55918d9170 match=0501 multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=2): 05 01
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55918d9170 match=0503 multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=2): 05 03
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55918d9170 match=0504 multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=2): 05 04
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55918d9170 match=06 multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=1): 06
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55918d9170 match=08 multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=1): 08
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55918d9170 match=09 multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=1): 09
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55918d9170 match=0a multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=1): 0a
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55918d9170 match=11 multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=1): 11
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55918d9170 match=7f multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=1): 7f
nl80211: Failed to subscribe for mgmt frames from SME driver - trying to run without it
nl80211: Enable Probe Request reporting nl_preq=0x55918d9170
nl80211: Register frame type=0x40 (WLAN_FC_STYPE_PROBE_REQ) nl_handle=0x55918d9170 match= multicast=0
nl80211: kernel reports: Match already configured
nl80211: Register frame command failed (type=64): ret=-114 (Operation already in progress)
nl80211: Register frame match - hexdump(len=0): [NULL]
nl80211: Failed to enable Probe Request frame reporting in AP mode
rfkill: initial event: idx=0 type=1 op=0 soft=0 hard=0
nl80211: Add own interface ifindex 3 (ifidx_reason -1)
nl80211: if_indices[16]: 3(-1)
phy: phy0
BSS count 1, BSSID mask 00:00:00:00:00:00 (0 bits)
Using existing control interface directory.
wlan0: interface state UNINITIALIZED->COUNTRY_UPDATE
Previous country code GE, new country code GE
nl80211: Regulatory information - country=GE (DFS-ETSI)
nl80211: 2402-2482 @ 40 MHz 20 mBm
nl80211: 5170-5250 @ 80 MHz 18 mBm
nl80211: 5250-5330 @ 80 MHz 18 mBm (DFS)
nl80211: 57000-66000 @ 2160 MHz 40 mBm
nl80211: Added 802.11b mode based on 802.11g information
nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
nl80211: Mode IEEE 802.11a: 5180 5200 5220 5240 5745[DISABLED] 5765[DISABLED] 5785[DISABLED] 5805[DISABLED] 5825[DISABLED]
nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
Allowed channel: mode=1 chan=1 freq=2412 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=2 freq=2417 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=3 freq=2422 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=4 freq=2427 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=5 freq=2432 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=6 freq=2437 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=7 freq=2442 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=8 freq=2447 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=9 freq=2452 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=10 freq=2457 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=11 freq=2462 MHz max_tx_power=20 dBm
Allowed channel: mode=2 chan=36 freq=5180 MHz max_tx_power=18 dBm
Allowed channel: mode=2 chan=40 freq=5200 MHz max_tx_power=18 dBm
Allowed channel: mode=2 chan=44 freq=5220 MHz max_tx_power=18 dBm
Allowed channel: mode=2 chan=48 freq=5240 MHz max_tx_power=18 dBm
Allowed channel: mode=0 chan=1 freq=2412 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=2 freq=2417 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=3 freq=2422 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=4 freq=2427 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=5 freq=2432 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=6 freq=2437 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=7 freq=2442 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=8 freq=2447 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=9 freq=2452 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=10 freq=2457 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=11 freq=2462 MHz max_tx_power=20 dBm
hw vht capab: 0x0, conf vht capab: 0x0
Completing interface initialization
Mode: IEEE 802.11g Channel: 11 Frequency: 2462 MHz
hostapd_handle_dfs_offload: iface->cac_started: 0
hostapd_handle_dfs_offload: freq 2462 MHz does not require DFS. Continue channel/AP setup
Proceed with AP/channel setup
nl80211: Set freq 2462 (ht_enabled=1, vht_enabled=1, he_enabled=0, bandwidth=20 MHz, cf1=2462 MHz, cf2=0 MHz)
* freq=2462
* he_enabled=0
* vht_enabled=1
* ht_enabled=1
* bandwidth=20
* channel_width=1
* center_freq1=2462
* center_freq2=0
RATE[0] rate=10 flags=0x1
RATE[1] rate=20 flags=0x1
RATE[2] rate=55 flags=0x1
RATE[3] rate=110 flags=0x1
RATE[4] rate=60 flags=0x0
RATE[5] rate=90 flags=0x0
RATE[6] rate=120 flags=0x0
RATE[7] rate=180 flags=0x0
RATE[8] rate=240 flags=0x0
RATE[9] rate=360 flags=0x0
RATE[10] rate=480 flags=0x0
RATE[11] rate=540 flags=0x0
hostapd_setup_bss(hapd=0x55918d7350 (wlan0), first=1)
nl80211: flush -> DEL_STATION wlan0 (all)
nl80211: Station flush failed: ret=-14 (Bad address)
Using interface wlan0 with hwaddr dc:a6:32:e5:a1:03 and ssid "wpa3test_pi4"
Deriving WPA PSK based on passphrase
SSID - hexdump_ascii(len=12):
77 70 61 33 74 65 73 74 5f 70 69 34 wpa3test_pi4
PSK (ASCII passphrase) - hexdump_ascii(len=11): [REMOVED]
PSK (from passphrase) - hexdump(len=32): [REMOVED]
random: Got 20/20 random bytes
Get randomness: len=32 entropy=0
GMK - hexdump(len=32): [REMOVED]
Get randomness: len=32 entropy=0
Key Counter - hexdump(len=32): [REMOVED]
WPA: Delay group state machine start until Beacon frames have been configured
nl80211: Set beacon (beacon_set=0)
nl80211: Beacon head - hexdump(len=63): 80 00 00 00 ff ff ff ff ff ff dc a6 32 e5 a1 03 dc a6 32 e5 a1 03 00 00 00 00 00 00 00 00 00 00 64 00 11 04 00 0c 77 70 61 33 74 65 73 74 5f 70 69 34 01 08 82 84 8b 96 0c 12 18 24 03 01 0b
nl80211: Beacon tail - hexdump(len=142): 07 06 47 45 20 01 0b 14 2a 01 04 32 04 30 48 60 6c 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 08 cc 00 2d 1a 0c 00 1f ff 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 bf 0c 00 00 00 00 ff ff 00 00 ff ff 00 00 c0 05 00 00 00 fc ff c3 02 00 28 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
nl80211: ifindex=3
nl80211: beacon_int=100
nl80211: beacon_rate=0
nl80211: rate_type=0
nl80211: dtim_period=2
nl80211: ssid=wpa3test_pi4
* beacon_int=100
* dtim_period=2
nl80211: hidden SSID not in use
nl80211: privacy=2
nl80211: auth_algs=0x1
nl80211: wpa_version=0x2
nl80211: key_mgmt_suites=0x400
nl80211: pairwise_ciphers=0x10
nl80211: group_cipher=0x10
nl802111: sae_pwe=0
wlan0: Deauthenticate all stations at BSS start
nl80211: sta_remove -> DEL_STATION wlan0 ff:ff:ff:ff:ff:ff --> 0 (Success)
WPA: Start group state machine to set initial keys
WPA: group state machine entering state GTK_INIT (VLAN-ID 0)
Get randomness: len=16 entropy=0
GTK - hexdump(len=16): [REMOVED]
Get randomness: len=16 entropy=0
IGTK - hexdump(len=16): [REMOVED]
WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0)
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=3 addr=0x556cbe32a0 key_idx=1 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
broadcast key
nl80211: NL80211_CMD_SET_KEY - default key
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=4 addr=0x556cbe32a0 key_idx=4 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
broadcast key
nl80211: NL80211_CMD_SET_KEY - default key
nl80211: Set wlan0 operstate 0->1 (UP)
netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=6 (IF_OPER_UP)
nl80211: TX queue param set: queue=0 aifs=1 cw_min=3 cw_max=7 burst_time=15 --> res=-95
Failed to set TX queue parameters for queue 0.
nl80211: TX queue param set: queue=1 aifs=1 cw_min=7 cw_max=15 burst_time=30 --> res=-95
Failed to set TX queue parameters for queue 1.
nl80211: TX queue param set: queue=2 aifs=3 cw_min=15 cw_max=63 burst_time=0 --> res=-95
Failed to set TX queue parameters for queue 2.
nl80211: TX queue param set: queue=3 aifs=7 cw_min=15 cw_max=1023 burst_time=0 --> res=-95
Failed to set TX queue parameters for queue 3.
wlan0: interface state COUNTRY_UPDATE->ENABLED
wlan0: AP-ENABLED
wlan0: Setup of interface done.
ctrl_iface not configured!
RTM_NEWLINK: ifi_index=3 ifname=wlan0 operstate=6 linkmode=0 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK: ifi_index=3 ifname=wlan0 operstate=6 linkmode=0 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
nl80211: Event message available
nl80211: Drv Event 60 (NL80211_CMD_FRAME_TX_STATUS) received for wlan0
nl80211: MLME event 60 (NL80211_CMD_FRAME_TX_STATUS) on wlan0(dc:a6:32:e5:a1:03) A1=dc:a6:32:a3:b2:7e A2=dc:a6:32:e5:a1:03
nl80211: MLME event frame - hexdump(len=128): b0 00 00 00 dc a6 32 a3 b2 7e dc a6 32 e5 a1 03 dc a6 32 e5 a1 03 00 00 03 00 01 00 00 00 13 00 f7 a0 98 80 a3 9b 47 8b e8 0f ff b1 30 2f a7 a1 97 cc a3 f4 a1 cf 16 eb 99 65 f1 fe 00 0b ac 65 73 96 96 e1 59 20 89 44 f2 e0 62 68 27 a3 f8 13 0a 76 95 1c 82 2a 9e 06 d7 1a ff e8 9f 83 e6 bc df c8 2a 75 4b d5 01 7d 7a d8 7c c7 5a ba af cc 99 6b 13 d5 f6 4d 5d 60 6d f3 8a 63 b8 cb 88 c6
nl80211: Frame TX status event A1=dc:a6:32:a3:b2:7e stype=11 cookie=0x0 ack=1
wlan0: Event TX_STATUS (16) received
mgmt::auth cb
handle_auth_cb: STA dc:a6:32:a3:b2:7e not found
nl80211: Event message available
nl80211: Drv Event 60 (NL80211_CMD_FRAME_TX_STATUS) received for wlan0
nl80211: MLME event 60 (NL80211_CMD_FRAME_TX_STATUS) on wlan0(dc:a6:32:e5:a1:03) A1=dc:a6:32:a3:b2:7e A2=dc:a6:32:e5:a1:03
nl80211: MLME event frame - hexdump(len=64): b0 00 00 00 dc a6 32 a3 b2 7e dc a6 32 e5 a1 03 dc a6 32 e5 a1 03 00 00 03 00 02 00 00 00 01 00 78 28 31 b1 9d dc b1 a6 9f 51 82 11 7c e6 6c 8c bf 0f 4d 3c a9 f4 1f f0 8a f9 27 5a a2 b2 b5 7e
nl80211: Frame TX status event A1=dc:a6:32:a3:b2:7e stype=11 cookie=0x0 ack=1
wlan0: Event TX_STATUS (16) received
mgmt::auth cb
handle_auth_cb: STA dc:a6:32:a3:b2:7e not found
nl80211: Event message available
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlan0
nl80211: New station dc:a6:32:a3:b2:7e
nl80211: Assoc Req IEs - hexdump(len=159): 00 0c 77 70 61 33 74 65 73 74 5f 70 69 34 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 21 02 03 14 24 02 01 0d 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 08 c0 00 00 00 00 0f ac 06 2d 1a 21 00 17 ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 01 00 08 00 00 00 00 40 f4 01 20 dd 1e 00 90 4c 33 21 00 17 ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 09 00 10 18 02 00 00 10 00 00 dd 07 00 50 f2 02 00 01 00
wlan0: Event ASSOC (0) received
wlan0: STA dc:a6:32:a3:b2:7e IEEE 802.11: associated
STA included RSN IE in (Re)AssocReq
New STA
ap_sta_add: register ap_handle_timer timeout for dc:a6:32:a3:b2:7e (300 seconds - ap_max_inactivity)
nl80211: Set STA flags - ifname=wlan0 addr=dc:a6:32:a3:b2:7e total_flags=0x68 flags_or=0x8 flags_and=0xfffffff9 authorized=0
wlan0: STA dc:a6:32:a3:b2:7e WPA: event 1 notification
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x55918e5aa0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
addr=dc:a6:32:a3:b2:7e
pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
IEEE 802.1X: Ignore STA - 802.1X not enabled or forced for WPS
wlan0: STA dc:a6:32:a3:b2:7e WPA: start authentication
WPA: dc:a6:32:a3:b2:7e WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x55918e5aa0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
addr=dc:a6:32:a3:b2:7e
pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Set STA flags - ifname=wlan0 addr=dc:a6:32:a3:b2:7e total_flags=0x68 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan0: STA dc:a6:32:a3:b2:7e IEEE 802.1X: unauthorizing port
WPA: dc:a6:32:a3:b2:7e WPA_PTK_GROUP entering state IDLE
WPA: dc:a6:32:a3:b2:7e WPA_PTK entering state AUTHENTICATION
WPA: dc:a6:32:a3:b2:7e WPA_PTK entering state AUTHENTICATION2
WPA: Re-initialize GMK/Counter on first station
Get randomness: len=32 entropy=1
GMK - hexdump(len=32): [REMOVED]
Get randomness: len=32 entropy=0
Key Counter - hexdump(len=32): [REMOVED]
Get randomness: len=16 entropy=0
GTK - hexdump(len=16): [REMOVED]
Get randomness: len=16 entropy=0
IGTK - hexdump(len=16): [REMOVED]
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=3 addr=0x556cbe32a0 key_idx=1 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
broadcast key
nl80211: NL80211_CMD_SET_KEY - default key
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=4 addr=0x556cbe32a0 key_idx=4 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
broadcast key
nl80211: NL80211_CMD_SET_KEY - default key
Get randomness: len=32 entropy=0
WPA: Assign ANonce - hexdump(len=32): 48 31 37 11 2d 7e 80 a3 71 16 7d c6 e7 4a e5 a9 50 ba 19 0f d4 cb bd 57 7c 8b 4b 20 75 64 36 e4
WPA: dc:a6:32:a3:b2:7e WPA_PTK entering state INITPSK
No PSK for STA trying to use SAE with PMKSA caching
No PSK for STA trying to use SAE with PMKSA caching
wlan0: STA dc:a6:32:a3:b2:7e WPA: no PSK configured for the STA
WPA: dc:a6:32:a3:b2:7e WPA_PTK entering state DISCONNECT
wpa_sta_disconnect STA dc:a6:32:a3:b2:7e (reason 2)
hostapd_wpa_auth_disconnect: WPA authenticator requests disconnect: STA dc:a6:32:a3:b2:7e reason 2
wlan0: ap_sta_disconnect addr dc:a6:32:a3:b2:7e reason=2
nl80211: sta_remove -> DEL_STATION wlan0 dc:a6:32:a3:b2:7e --> 0 (Success)
nl80211: Set STA flags - ifname=wlan0 addr=dc:a6:32:a3:b2:7e total_flags=0x8 flags_or=0x8 flags_and=0xfffffff9 authorized=0
wlan0: STA dc:a6:32:a3:b2:7e WPA: event 3 notification
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x55918e5aa0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
addr=dc:a6:32:a3:b2:7e
pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
wlan0: ap_sta_disconnect: reschedule ap_handle_timer timeout for dc:a6:32:a3:b2:7e (5 seconds - AP_MAX_INACTIVITY_AFTER_DEAUTH)
WPA: dc:a6:32:a3:b2:7e WPA_PTK entering state DISCONNECTED
WPA: dc:a6:32:a3:b2:7e WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x55918e5aa0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
addr=dc:a6:32:a3:b2:7e
pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Set STA flags - ifname=wlan0 addr=dc:a6:32:a3:b2:7e total_flags=0x8 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan0: STA dc:a6:32:a3:b2:7e IEEE 802.1X: unauthorizing port
wlan0: hostapd_new_assoc_sta: reschedule ap_handle_timer timeout for dc:a6:32:a3:b2:7e (300 seconds - ap_max_inactivity)
wlan0: Deauthentication callback for STA dc:a6:32:a3:b2:7e
wlan0: Removing STA dc:a6:32:a3:b2:7e from kernel driver
nl80211: sta_remove -> DEL_STATION wlan0 dc:a6:32:a3:b2:7e --> 0 (Success)
wlan0: STA dc:a6:32:a3:b2:7e MLME: MLME-DEAUTHENTICATE.indication(dc:a6:32:a3:b2:7e, 2)
wlan0: STA dc:a6:32:a3:b2:7e MLME: MLME-DELETEKEYS.request(dc:a6:32:a3:b2:7e)
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x55918e5aa0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
addr=dc:a6:32:a3:b2:7e
pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Event message available
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan0
nl80211: Delete station dc:a6:32:a3:b2:7e
wlan0: Event DISASSOC (1) received
wlan0: STA dc:a6:32:a3:b2:7e IEEE 802.11: disassociated
nl80211: Set STA flags - ifname=wlan0 addr=dc:a6:32:a3:b2:7e total_flags=0x8 flags_or=0x8 flags_and=0xfffffff9 authorized=0
wlan0: STA dc:a6:32:a3:b2:7e WPA: event 2 notification
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x55918e5aa0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
addr=dc:a6:32:a3:b2:7e
pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
WPA: dc:a6:32:a3:b2:7e WPA_PTK entering state DISCONNECTED
WPA: dc:a6:32:a3:b2:7e WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x55918e5aa0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
addr=dc:a6:32:a3:b2:7e
pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Set STA flags - ifname=wlan0 addr=dc:a6:32:a3:b2:7e total_flags=0x8 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan0: STA dc:a6:32:a3:b2:7e IEEE 802.1X: unauthorizing port
nl80211: Set STA flags - ifname=wlan0 addr=dc:a6:32:a3:b2:7e total_flags=0x8 flags_or=0x8 flags_and=0xfffffff9 authorized=0
nl80211: sta_remove -> DEL_STATION wlan0 dc:a6:32:a3:b2:7e --> 0 (Success)
hostapd_ht_operation_update current operation mode=0x0
hostapd_ht_operation_update new operation mode=0x0 changes=0
ap_free_sta: cancel ap_handle_timer for dc:a6:32:a3:b2:7e
dmesg on the AP has these error messages related to brcmfmac:
[ 404.451184] ieee80211 phy0: brcmf_cfg80211_mgmt_tx: TX Auth frame operation is failed: status=8)
[ 404.451328] ieee80211 phy0: brcmf_cfg80211_del_station: SCB_DEAUTHENTICATE_FOR_REASON failed -110
[ 422.883159] ieee80211 phy0: brcmf_cfg80211_mgmt_tx: TX Auth frame operation is failed: status=8)
[ 423.299243] brcmfmac: brcmf_cfg80211_stop_ap: bss_enable config failed -110
[ 423.302631] ieee80211 phy0: brcmf_cfg80211_stop_ap: SET SSID error (-512)
[ 423.302692] ieee80211 phy0: brcmf_proto_bcdc_query_dcmd: brcmf_proto_bcdc_msg failed w/status -110
[ 423.302709] brcmfmac: brcmf_cfg80211_stop_ap: wl apsta failed (-110)
[ 423.302749] ieee80211 phy0: brcmf_cfg80211_stop_ap: BRCMF_C_DOWN error -110
[ 423.302965] ieee80211 phy0: brcmf_cfg80211_stop_ap: Set AP mode error -512
[ 423.303022] ieee80211 phy0: brcmf_cfg80211_stop_ap: BRCMF_C_UP error -110
[ 423.303069] ieee80211 phy0: brcmf_set_mpc: fail to set mpc
[ 423.304598] brcmfmac: brcmf_sdio_read_control: last control frame is being processed.
[ 423.304774] brcmfmac: brcmf_sdio_read_control: last control frame is being processed.
[ 1199.075192] ieee80211 phy0: brcmf_cfg80211_mgmt_tx: TX Auth frame operation is failed: status=8)
client side dmesg:
[ 509.970317] ieee80211 phy0: brcmf_cfg80211_external_auth: External authentication failed: status=1
[ 509.986259] ieee80211 phy0: brcmf_cfg80211_external_auth: External authentication failed: status=1
[ 513.762040] ieee80211 phy0: brcmf_notify_ext_auth_request: Ext Auth request to supplicant failed (-22)
[ 513.762074] ieee80211 phy0: brcmf_fweh_event_worker: event handler failed (187)
[ 519.983653] ieee80211 phy0: brcmf_notify_ext_auth_request: Ext Auth request to supplicant failed (-22)
[ 519.983690] ieee80211 phy0: brcmf_fweh_event_worker: event handler failed (187)
[ 7175.975251] ieee80211 phy0: brcmf_cfg80211_external_auth: External authentication failed: status=1
[ 7175.990947] ieee80211 phy0: brcmf_cfg80211_external_auth: External authentication failed: status=1
I guess this part of the hostapd output may indicate the possible place where things go wrong
nl80211: set_key failed; err=-22 Invalid argument
Raspberry is unable to run vanilla upstream kernel, so I had to apply kernel patches to the 5.15.y branch of a raspberry fork of the Linux kernel. Some patching conflicts were present and I had to fix them manually.
@antonsviridenko This is definitely not true. All Raspberry Pi can run a mainline kernel. There are just a few limitations regarding media support and hw acceleration, but that's not relevant for Wifi support.
@lategoodbye hmm, interesting, that's unexpected news for me, going to try vanilla kernel, thank you
In my opinion providing some patches for a specific LTS to gain WPA3 support is a little bit pointless. This should be integrated by the vendor in the mainline kernel.
@antonsviridenko Maybe this is helpful https://gist.github.com/lategoodbye/c7317a42bf7f9c07f5a91baed8c68f75
I tried with Linux Stable v5.15.58
exactly the same version recommended in driver README, got same results, looks like this driver does not work as expected.
Successfully initialized wpa_supplicant
nl80211: kernel reports: Registration to specific type not supported
wlan0: Trying to associate with SSID 'wpa3test_pi4'
wlan0: PMKSA-CACHE-ADDED dc:a6:32:e5:a1:03 0
wlan0: CTRL-EVENT-ASSOC-REJECT bssid=dc:a6:32:e5:a1:03 status_code=16
wlan0: PMKSA-CACHE-REMOVED dc:a6:32:e5:a1:03 0
wlan0: Trying to associate with SSID 'wpa3test_pi4'
wlan0: CTRL-EVENT-ASSOC-REJECT bssid=00:00:00:00:00:00 status_code=16
wlan0: Trying to associate with SSID 'wpa3test_pi4'
wlan0: Authentication with dc:a6:32:e5:a1:03 timed out.
wlan0: CTRL-EVENT-DISCONNECTED bssid=dc:a6:32:e5:a1:03 reason=3 locally_generated=1
nl80211: Event message available
nl80211: Drv Event 60 (NL80211_CMD_FRAME_TX_STATUS) received for wlan0
nl80211: MLME event 60 (NL80211_CMD_FRAME_TX_STATUS) on wlan0(dc:a6:32:e5:a1:03) A1=dc:a6:32:a3:b2:7e A2=dc:a6:32:e5:a1:03
nl80211: MLME event frame - hexdump(len=128): b0 00 00 00 dc a6 32 a3 b2 7e dc a6 32 e5 a1 03 dc a6 32 e5 a1 03 00 00 03 00 01 00 00 00 13 00 1a 68 c1 54 d3 58 06 6b c3 53 7d 32 3a cd b1 64 28 ff a4 8e 8e 82 96 02 d1 a2 78 42 d7 f6 a4 ee 5e 84 52 02 96 fe 39 68 a4 7e cd 99 26 80 4a 3c 47 5c 7b 27 79 65 e1 58 81 e8 e2 09 4e 91 3c cd 97 40 2f eb 35 83 9c 3c 2d cb ef ff f8 30 ed cb 68 af 97 1c 5f c5 dc 6e 21 57 60 2f 71 d2 0b 2d
nl80211: Frame TX status event A1=dc:a6:32:a3:b2:7e stype=11 cookie=0x0 ack=1
wlan0: Event TX_STATUS (16) received
mgmt::auth cb
handle_auth_cb: STA dc:a6:32:a3:b2:7e not found
nl80211: Event message available
nl80211: Drv Event 60 (NL80211_CMD_FRAME_TX_STATUS) received for wlan0
nl80211: MLME event 60 (NL80211_CMD_FRAME_TX_STATUS) on wlan0(dc:a6:32:e5:a1:03) A1=dc:a6:32:a3:b2:7e A2=dc:a6:32:e5:a1:03
nl80211: MLME event frame - hexdump(len=64): b0 00 00 00 dc a6 32 a3 b2 7e dc a6 32 e5 a1 03 dc a6 32 e5 a1 03 00 00 03 00 02 00 00 00 01 00 3b ec 50 2d 60 35 c6 b2 bc 8b ae 91 ac 6a 8f 5a 46 ec c7 2a dc b5 1c 13 78 6a 93 64 08 d7 b2 14
nl80211: Frame TX status event A1=dc:a6:32:a3:b2:7e stype=11 cookie=0x0 ack=1
wlan0: Event TX_STATUS (16) received
mgmt::auth cb
handle_auth_cb: STA dc:a6:32:a3:b2:7e not found
nl80211: Event message available
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlan0
nl80211: New station dc:a6:32:a3:b2:7e
nl80211: Assoc Req IEs - hexdump(len=159): 00 0c 77 70 61 33 74 65 73 74 5f 70 69 34 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 21 02 03 14 24 02 01 0b 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 08 c0 00 00 00 00 0f ac 06 2d 1a 21 00 17 ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 01 00 08 00 00 00 00 40 f4 01 20 dd 1e 00 90 4c 33 21 00 17 ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 09 00 10 18 02 00 00 10 00 00 dd 07 00 50 f2 02 00 01 00
wlan0: Event ASSOC (0) received
wlan0: STA dc:a6:32:a3:b2:7e IEEE 802.11: associated
STA included RSN IE in (Re)AssocReq
New STA
ap_sta_add: register ap_handle_timer timeout for dc:a6:32:a3:b2:7e (300 seconds - ap_max_inactivity)
nl80211: Set STA flags - ifname=wlan0 addr=dc:a6:32:a3:b2:7e total_flags=0x68 flags_or=0x8 flags_and=0xfffffff9 authorized=0
wlan0: STA dc:a6:32:a3:b2:7e WPA: event 1 notification
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0xaaaad0a9baa0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
addr=dc:a6:32:a3:b2:7e
pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
IEEE 802.1X: Ignore STA - 802.1X not enabled or forced for WPS
wlan0: STA dc:a6:32:a3:b2:7e WPA: start authentication
WPA: dc:a6:32:a3:b2:7e WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0xaaaad0a9baa0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
addr=dc:a6:32:a3:b2:7e
pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Set STA flags - ifname=wlan0 addr=dc:a6:32:a3:b2:7e total_flags=0x68 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan0: STA dc:a6:32:a3:b2:7e IEEE 802.1X: unauthorizing port
WPA: dc:a6:32:a3:b2:7e WPA_PTK_GROUP entering state IDLE
WPA: dc:a6:32:a3:b2:7e WPA_PTK entering state AUTHENTICATION
WPA: dc:a6:32:a3:b2:7e WPA_PTK entering state AUTHENTICATION2
WPA: Re-initialize GMK/Counter on first station
Get randomness: len=32 entropy=1
GMK - hexdump(len=32): [REMOVED]
Get randomness: len=32 entropy=0
Key Counter - hexdump(len=32): [REMOVED]
Get randomness: len=16 entropy=0
GTK - hexdump(len=16): [REMOVED]
Get randomness: len=16 entropy=0
IGTK - hexdump(len=16): [REMOVED]
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=3 addr=0xaaaab44432a0 key_idx=1 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
broadcast key
nl80211: NL80211_CMD_SET_KEY - default key
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=4 addr=0xaaaab44432a0 key_idx=4 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
broadcast key
nl80211: NL80211_CMD_SET_KEY - default key
Get randomness: len=32 entropy=0
WPA: Assign ANonce - hexdump(len=32): 16 ca 62 21 e1 75 b7 1c 19 52 b6 85 93 f9 0f 70 fc 39 d4 80 6a bd 7b 16 c3 e0 a0 09 58 85 1c 56
WPA: dc:a6:32:a3:b2:7e WPA_PTK entering state INITPSK
No PSK for STA trying to use SAE with PMKSA caching
No PSK for STA trying to use SAE with PMKSA caching
wlan0: STA dc:a6:32:a3:b2:7e WPA: no PSK configured for the STA
WPA: dc:a6:32:a3:b2:7e WPA_PTK entering state DISCONNECT
wpa_sta_disconnect STA dc:a6:32:a3:b2:7e (reason 2)
hostapd_wpa_auth_disconnect: WPA authenticator requests disconnect: STA dc:a6:32:a3:b2:7e reason 2
wlan0: ap_sta_disconnect addr dc:a6:32:a3:b2:7e reason=2
nl80211: sta_remove -> DEL_STATION wlan0 dc:a6:32:a3:b2:7e --> 0 (Success)
nl80211: Set STA flags - ifname=wlan0 addr=dc:a6:32:a3:b2:7e total_flags=0x8 flags_or=0x8 flags_and=0xfffffff9 authorized=0
wlan0: STA dc:a6:32:a3:b2:7e WPA: event 3 notification
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0xaaaad0a9baa0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
addr=dc:a6:32:a3:b2:7e
pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
wlan0: ap_sta_disconnect: reschedule ap_handle_timer timeout for dc:a6:32:a3:b2:7e (5 seconds - AP_MAX_INACTIVITY_AFTER_DEAUTH)
WPA: dc:a6:32:a3:b2:7e WPA_PTK entering state DISCONNECTED
WPA: dc:a6:32:a3:b2:7e WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0xaaaad0a9baa0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
addr=dc:a6:32:a3:b2:7e
pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Set STA flags - ifname=wlan0 addr=dc:a6:32:a3:b2:7e total_flags=0x8 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan0: STA dc:a6:32:a3:b2:7e IEEE 802.1X: unauthorizing port
wlan0: hostapd_new_assoc_sta: reschedule ap_handle_timer timeout for dc:a6:32:a3:b2:7e (300 seconds - ap_max_inactivity)
wlan0: Deauthentication callback for STA dc:a6:32:a3:b2:7e
wlan0: Removing STA dc:a6:32:a3:b2:7e from kernel driver
nl80211: sta_remove -> DEL_STATION wlan0 dc:a6:32:a3:b2:7e --> 0 (Success)
wlan0: STA dc:a6:32:a3:b2:7e MLME: MLME-DEAUTHENTICATE.indication(dc:a6:32:a3:b2:7e, 2)
wlan0: STA dc:a6:32:a3:b2:7e MLME: MLME-DELETEKEYS.request(dc:a6:32:a3:b2:7e)
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0xaaaad0a9baa0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
addr=dc:a6:32:a3:b2:7e
pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Event message available
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan0
nl80211: Delete station dc:a6:32:a3:b2:7e
wlan0: Event DISASSOC (1) received
wlan0: STA dc:a6:32:a3:b2:7e IEEE 802.11: disassociated
nl80211: Set STA flags - ifname=wlan0 addr=dc:a6:32:a3:b2:7e total_flags=0x8 flags_or=0x8 flags_and=0xfffffff9 authorized=0
wlan0: STA dc:a6:32:a3:b2:7e WPA: event 2 notification
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0xaaaad0a9baa0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
addr=dc:a6:32:a3:b2:7e
pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
WPA: dc:a6:32:a3:b2:7e WPA_PTK entering state DISCONNECTED
WPA: dc:a6:32:a3:b2:7e WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0xaaaad0a9baa0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
addr=dc:a6:32:a3:b2:7e
pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Set STA flags - ifname=wlan0 addr=dc:a6:32:a3:b2:7e total_flags=0x8 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan0: STA dc:a6:32:a3:b2:7e IEEE 802.1X: unauthorizing port
nl80211: Set STA flags - ifname=wlan0 addr=dc:a6:32:a3:b2:7e total_flags=0x8 flags_or=0x8 flags_and=0xfffffff9 authorized=0
nl80211: sta_remove -> DEL_STATION wlan0 dc:a6:32:a3:b2:7e --> 0 (Success)
hostapd_ht_operation_update current operation mode=0x0
hostapd_ht_operation_update new operation mode=0x0 changes=0
ap_free_sta: cancel ap_handle_timer for dc:a6:32:a3:b2:7e
nl80211: Event message available
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan0
nl80211: Delete station dc:a6:32:a3:b2:7e
wlan0: Event DISASSOC (1) received
wlan0: STA dc:a6:32:a3:b2:7e IEEE 802.11: disassociated
Disassociation notification for unknown STA dc:a6:32:a3:b2:7e
nl80211: Event message available
nl80211: Drv Event 60 (NL80211_CMD_FRAME_TX_STATUS) received for wlan0
nl80211: MLME event 60 (NL80211_CMD_FRAME_TX_STATUS) on wlan0(dc:a6:32:e5:a1:03) A1=dc:a6:32:a3:b2:7e A2=dc:a6:32:e5:a1:03
nl80211: MLME event frame - hexdump(len=128): b0 00 00 00 dc a6 32 a3 b2 7e dc a6 32 e5 a1 03 dc a6 32 e5 a1 03 00 00 03 00 01 00 00 00 13 00 d9 8f 71 b3 33 54 e0 4a b5 bd 76 74 71 7a e6 d1 e7 4b 81 a6 80 e1 fe e0 e7 2d 83 9b 40 58 de 5e e0 5c 1f 25 03 66 03 68 47 ff 7f bb b7 c5 b8 2c d7 43 2a ee 12 00 12 e3 89 97 c4 d2 89 c4 dc 88 5a 6d b7 17 62 e9 3c 1f 65 4f c5 ee 18 11 4a 75 68 23 be d1 63 f4 81 1a 3d c5 2c 5a b1 16 67 b3
nl80211: Frame TX status event A1=dc:a6:32:a3:b2:7e stype=11 cookie=0x0 ack=1
wlan0: Event TX_STATUS (16) received
mgmt::auth cb
handle_auth_cb: STA dc:a6:32:a3:b2:7e not found
nl80211: Event message available
nl80211: Drv Event 60 (NL80211_CMD_FRAME_TX_STATUS) received for wlan0
nl80211: MLME event 60 (NL80211_CMD_FRAME_TX_STATUS) on wlan0(dc:a6:32:e5:a1:03) A1=dc:a6:32:a3:b2:7e A2=dc:a6:32:e5:a1:03
nl80211: MLME event frame - hexdump(len=64): b0 00 00 00 dc a6 32 a3 b2 7e dc a6 32 e5 a1 03 dc a6 32 e5 a1 03 00 00 03 00 02 00 00 00 01 00 91 d0 19 90 d6 6c 1d 65 25 89 bb be 63 7b 6e 7c 59 f2 15 40 85 f6 39 4f 39 d1 fc 16 83 22 5f 56
nl80211: Frame TX status event A1=dc:a6:32:a3:b2:7e stype=11 cookie=0x0 ack=1
wlan0: Event TX_STATUS (16) received
mgmt::auth cb
@antonsviridenko Could you please list which components you replaced with the Cypress ones on the Raspberry Pi?
Is this the right place for my bug report? It might be related to brcmfmac firmware. I am using the firmware from https://github.com/RPi-Distro/firmware-nonfree
Describe the bug It looks like brcmfmac does not support ieee80211w/MFP in AP mode. Clients are unable to connect to the network because the RSN IE message during handshake is different from the one in the beacon frame.
Disabling ieee80211w fixes the issue.
If I run the same hostapd.conf on my laptop (iwlwifi/iwlmvm), my phone connects to it just fine.
To reproduce hostapd.conf:
Expected behaviour Clients can connect to the network.
Actual behaviour Clients cannot connect to the network.
System Device: Raspberry Pi 4 Model B Rev 1.2 Kernel: rpi-5.6.y from 5377449ffb6ffe9ebfee939d52b2611130fbb836 Firwmare version: May 11 2020 18:59:41, 21bfdeee3a6ea823e2113b983390acd1eec8edfb (clean) (release) (start) OS: Fedora 32 aarch64 hostapd: hostapd-2.9-3.fc32.aarch64
Logs No errors appear on the Pi.
Here is what happens on my laptop when it tries to connect: