* duplicate authentications / excessive missing ACKs / deauth due to inactivity timer @ 2019-12-01 16:30 Justin Capella 2019-12-01 17:01 ` Adrian Chadd 0 siblings, 1 reply; 6+ messages in thread From: Justin Capella @ 2019-12-01 16:30 UTC (permalink / raw) To: ath10k Frequent deauth/disconnections of clients more recently, My interpretation of the logs makes me think perhaps the clients are authenticating multiple times, and there may be some inactive/unused sessions that cause a timeout because of this. I can enable more verbose/debug output and provide packet captures, debugfs tracepoints... anything that might help. Highlights: Dec 01 05:50:41 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 IEEE 802.11: associated (aid 6) Dec 01 05:50:41 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 IEEE 802.11: authenticated Dec 01 05:50:41 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 IEEE 802.11: associated (aid 6) Dec 01 05:50:41 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 IEEE 802.11: authenticated Dec 01 04:57:57 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE) Dec 01 04:57:57 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE) Dec 01 04:57:27 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 IEEE 802.11: disconnected due to excessive missing ACKs [user@ap ~]$ pacman -Q linux-lts linux-firmware linux-lts 4.19.84-1 linux-firmware 20190923.417a9c6-1 [user@ap ~]$ dmesg | grep ath10 [ 7.214732] ath10k_pci 0000:01:00.0: pci irq msi oper_irq_mode 2 irq_mode 0 reset_mode 0 [ 7.485097] ath10k_pci 0000:01:00.0: qca988x hw2.0 target 0x4100016c chip_id 0x043202ff sub 0000:0000 [ 7.485103] ath10k_pci 0000:01:00.0: kconfig debug 1 debugfs 1 tracing 1 dfs 0 testmode 0 [ 7.485461] ath10k_pci 0000:01:00.0: firmware ver 10.2.4-1.0-00045 api 5 features no-p2p,raw-mode,mfp,allows-mesh-bcast crc32 ccbd5104 [ 7.528393] ath10k_pci 0000:01:00.0: board_file api 1 bmi_id N/A crc32 bebc7c08 [ 8.948544] ath10k_pci 0000:01:00.0: htt-ver 2.1 wmi-op 5 htt-op 2 cal otp max-sta 128 raw 0 hwcrypto 1 [ 9.101248] ath10k_pci 0000:01:00.0 wlp1s0: renamed from wlan0 [ 12.610504] ath10k_pci 0000:01:00.0: pdev param 0 not supported by firmware [ 17.516191] ath10k_pci 0000:01:00.0: pdev param 0 not supported by firmware [user@ap ~]$ modinfo ath10k_pci filename: /lib/modules/4.19.84-1-lts/kernel/drivers/net/wireless/ath/ath10k/ath10k_pci.ko.xz firmware: ath10k/QCA9377/hw1.0/board.bin firmware: ath10k/QCA9377/hw1.0/firmware-5.bin firmware: ath10k/QCA9377/hw1.0/firmware-6.bin firmware: ath10k/QCA6174/hw3.0/board-2.bin firmware: ath10k/QCA6174/hw3.0/board.bin firmware: ath10k/QCA6174/hw3.0/firmware-6.bin firmware: ath10k/QCA6174/hw3.0/firmware-5.bin firmware: ath10k/QCA6174/hw3.0/firmware-4.bin firmware: ath10k/QCA6174/hw2.1/board-2.bin firmware: ath10k/QCA6174/hw2.1/board.bin firmware: ath10k/QCA6174/hw2.1/firmware-5.bin firmware: ath10k/QCA6174/hw2.1/firmware-4.bin firmware: ath10k/QCA9887/hw1.0/board-2.bin firmware: ath10k/QCA9887/hw1.0/board.bin firmware: ath10k/QCA9887/hw1.0/firmware-5.bin firmware: ath10k/QCA988X/hw2.0/board-2.bin firmware: ath10k/QCA988X/hw2.0/board.bin firmware: ath10k/QCA988X/hw2.0/firmware-5.bin firmware: ath10k/QCA988X/hw2.0/firmware-4.bin firmware: ath10k/QCA988X/hw2.0/firmware-3.bin firmware: ath10k/QCA988X/hw2.0/firmware-2.bin license: Dual BSD/GPL description: Driver support for Qualcomm Atheros 802.11ac WLAN PCIe/AHB devices author: Qualcomm Atheros srcversion: 9FE0E3C9ABD99335286A872 alias: pci:v0000168Cd00000050sv*sd*bc*sc*i* alias: pci:v0000168Cd00000042sv*sd*bc*sc*i* alias: pci:v0000168Cd00000046sv*sd*bc*sc*i* alias: pci:v0000168Cd00000056sv*sd*bc*sc*i* alias: pci:v0000168Cd00000040sv*sd*bc*sc*i* alias: pci:v0000168Cd0000003Esv*sd*bc*sc*i* alias: pci:v0000168Cd00000041sv*sd*bc*sc*i* alias: pci:v0000168Cd0000003Csv*sd*bc*sc*i* alias: pci:v00000777d000011ACsv*sd*bc*sc*i* alias: of:N*T*Cqcom,ipq4019-wifiC* alias: of:N*T*Cqcom,ipq4019-wifi depends: ath10k_core retpoline: Y intree: Y name: ath10k_pci vermagic: 4.19.84-1-lts SMP mod_unload sig_id: PKCS#7 signer: Build time autogenerated kernel key sig_key: 51:6C:FF:48:E2:26:98:CC:24:DB:B4:41:9B:12:81:B3:7C:BC:86:FD sig_hashalgo: sha512 signature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parm: irq_mode:0: auto, 1: legacy, 2: msi (default: 0) (uint) parm: reset_mode:0: auto, 1: warm only (default: 0) (uint) [user@ap ~]$ journalctl -b -0 -u hostapd@wlp1s0 -r | sed -r -e 's/([a-f0-9]{2}):([a-f0-9]{2}:){4,}/\1:XX:XX:XX:XX:/gi' -e 's/internet/ssid/g' -e 's/([A-F0-9]{2})[A-F0-9]{14}/\1XXXXXXXXXXX/g' -e 's/ ap hostapd/ hostname hostapd/g' -e 's/wlp1s0/wlan0/g' | grep "Dec 01" Dec 01 11:51:59 hostname hostapd[322]: wlan0: STA 48:XX:XX:XX:XX:23 WPA: pairwise key handshake completed (RSN) Dec 01 11:51:59 hostname hostapd[322]: wlan0: STA 48:XX:XX:XX:XX:23 RADIUS: starting accounting session 39XXXXXXXXXXX Dec 01 11:51:59 hostname hostapd[322]: wlan0: STA 48:XX:XX:XX:XX:23 WPA: pairwise key handshake completed (RSN) Dec 01 11:51:59 hostname hostapd[322]: wlan0: STA 48:XX:XX:XX:XX:23 RADIUS: starting accounting session 39XXXXXXXXXXX Dec 01 11:51:59 hostname hostapd[322]: wlan0: AP-STA-CONNECTED 48:XX:XX:XX:XX:23 Dec 01 11:51:58 hostname hostapd[322]: wlan0: STA 48:XX:XX:XX:XX:23 IEEE 802.11: associated (aid 5) Dec 01 11:51:58 hostname hostapd[322]: wlan0: STA 48:XX:XX:XX:XX:23 IEEE 802.11: authenticated Dec 01 11:51:58 hostname hostapd[322]: wlan0: STA 48:XX:XX:XX:XX:23 IEEE 802.11: associated (aid 5) Dec 01 11:51:58 hostname hostapd[322]: wlan0: STA 48:XX:XX:XX:XX:23 IEEE 802.11: authenticated Dec 01 11:51:37 hostname hostapd[322]: wlan0: AP-STA-DISCONNECTED 48:XX:XX:XX:XX:23 Dec 01 05:50:41 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 WPA: pairwise key handshake completed (RSN) Dec 01 05:50:41 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 RADIUS: starting accounting session 8AXXXXXXXXXXX Dec 01 05:50:41 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 WPA: pairwise key handshake completed (RSN) Dec 01 05:50:41 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 RADIUS: starting accounting session 8AXXXXXXXXXXX Dec 01 05:50:41 hostname hostapd[322]: wlan0: AP-STA-CONNECTED 10:XX:XX:XX:XX:30 Dec 01 05:50:41 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 IEEE 802.11: associated (aid 6) Dec 01 05:50:41 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 IEEE 802.11: authenticated Dec 01 05:50:41 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 IEEE 802.11: associated (aid 6) Dec 01 05:50:41 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 IEEE 802.11: authenticated Dec 01 04:57:57 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE) Dec 01 04:57:57 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE) Dec 01 04:57:27 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 IEEE 802.11: disconnected due to excessive missing ACKs Dec 01 04:57:27 hostname hostapd[322]: wlan0: AP-STA-DISCONNECTED 10:XX:XX:XX:XX:30 Dec 01 04:57:27 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 IEEE 802.11: disconnected due to excessive missing ACKs Dec 01 04:34:50 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 WPA: pairwise key handshake completed (RSN) Dec 01 04:34:50 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 RADIUS: starting accounting session 1CXXXXXXXXXXX Dec 01 04:34:50 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 WPA: pairwise key handshake completed (RSN) Dec 01 04:34:50 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 RADIUS: starting accounting session 1CXXXXXXXXXXX Dec 01 04:34:50 hostname hostapd[322]: wlan0: AP-STA-CONNECTED 10:XX:XX:XX:XX:30 Dec 01 04:34:50 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 IEEE 802.11: associated (aid 6) Dec 01 04:34:50 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 IEEE 802.11: authenticated Dec 01 04:34:50 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 IEEE 802.11: associated (aid 6) Dec 01 04:34:50 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 IEEE 802.11: authenticated Dec 01 04:21:01 hostname hostapd[322]: wlan0: AP-STA-DISCONNECTED 10:XX:XX:XX:XX:30 Dec 01 04:19:55 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 WPA: pairwise key handshake completed (RSN) Dec 01 04:19:55 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 RADIUS: starting accounting session F8XXXXXXXXXXX Dec 01 04:19:55 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 WPA: pairwise key handshake completed (RSN) Dec 01 04:19:55 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 RADIUS: starting accounting session F8XXXXXXXXXXX Dec 01 04:19:55 hostname hostapd[322]: wlan0: AP-STA-CONNECTED 10:XX:XX:XX:XX:30 Dec 01 04:19:55 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 IEEE 802.11: associated (aid 6) Dec 01 04:19:55 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 IEEE 802.11: associated (aid 6) Dec 01 04:19:55 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 IEEE 802.11: authenticated Dec 01 04:19:55 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 IEEE 802.11: authenticated Dec 01 04:19:52 hostname hostapd[322]: wlan0: AP-STA-DISCONNECTED 10:XX:XX:XX:XX:30 Dec 01 03:30:20 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 WPA: pairwise key handshake completed (RSN) Dec 01 03:30:20 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 RADIUS: starting accounting session 8EXXXXXXXXXXX Dec 01 03:30:20 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 WPA: pairwise key handshake completed (RSN) Dec 01 03:30:20 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 RADIUS: starting accounting session 8EXXXXXXXXXXX Dec 01 03:30:20 hostname hostapd[322]: wlan0: AP-STA-CONNECTED 10:XX:XX:XX:XX:30 Dec 01 03:30:20 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 IEEE 802.11: associated (aid 6) Dec 01 03:30:20 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 IEEE 802.11: associated (aid 6) Dec 01 03:30:20 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 IEEE 802.11: authenticated Dec 01 03:30:20 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 IEEE 802.11: authenticated Dec 01 03:29:57 hostname hostapd[322]: wlan0: AP-STA-DISCONNECTED 10:XX:XX:XX:XX:30 Dec 01 02:53:18 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 WPA: pairwise key handshake completed (RSN) Dec 01 02:53:18 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 RADIUS: starting accounting session 88XXXXXXXXXXX Dec 01 02:53:18 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 WPA: pairwise key handshake completed (RSN) Dec 01 02:53:18 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 RADIUS: starting accounting session 88XXXXXXXXXXX Dec 01 02:53:18 hostname hostapd[322]: wlan0: AP-STA-CONNECTED 10:XX:XX:XX:XX:30 Dec 01 02:53:17 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 IEEE 802.11: associated (aid 6) Dec 01 02:53:17 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 IEEE 802.11: authenticated Dec 01 02:53:17 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 IEEE 802.11: associated (aid 6) Dec 01 02:53:17 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 IEEE 802.11: authenticated Dec 01 02:52:55 hostname hostapd[322]: wlan0: AP-STA-DISCONNECTED 10:XX:XX:XX:XX:30 Dec 01 01:15:22 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 WPA: pairwise key handshake completed (RSN) Dec 01 01:15:22 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 RADIUS: starting accounting session 93XXXXXXXXXXX Dec 01 01:15:22 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 WPA: pairwise key handshake completed (RSN) Dec 01 01:15:22 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 RADIUS: starting accounting session 93XXXXXXXXXXX Dec 01 01:15:22 hostname hostapd[322]: wlan0: AP-STA-CONNECTED 10:XX:XX:XX:XX:30 Dec 01 01:15:22 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 IEEE 802.11: associated (aid 6) Dec 01 01:15:22 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 IEEE 802.11: authenticated Dec 01 01:15:22 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 IEEE 802.11: associated (aid 6) Dec 01 01:15:22 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 IEEE 802.11: authenticated Dec 01 00:14:34 hostname hostapd[322]: wlan0: AP-STA-DISCONNECTED 10:XX:XX:XX:XX:30 Dec 01 00:04:59 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 WPA: pairwise key handshake completed (RSN) Dec 01 00:04:59 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 RADIUS: starting accounting session 25XXXXXXXXXXX Dec 01 00:04:59 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 WPA: pairwise key handshake completed (RSN) Dec 01 00:04:59 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 RADIUS: starting accounting session 25XXXXXXXXXXX Dec 01 00:04:59 hostname hostapd[322]: wlan0: AP-STA-CONNECTED 10:XX:XX:XX:XX:30 Dec 01 00:04:59 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 IEEE 802.11: associated (aid 6) Dec 01 00:04:59 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 IEEE 802.11: associated (aid 6) Dec 01 00:04:59 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 IEEE 802.11: authenticated Dec 01 00:04:59 hostname hostapd[322]: wlan0: STA 10:XX:XX:XX:XX:30 IEEE 802.11: authenticated Dec 01 00:04:58 hostname hostapd[322]: wlan0: AP-STA-DISCONNECTED 10:XX:XX:XX:XX:30 A particularly noise event: Nov 27 22:22:36 hostname hostapd[322]: wlan0: STA 18:XX:XX:XX:XX:be WPA: pairwise key handshake completed (RSN) Nov 27 22:22:36 hostname hostapd[322]: wlan0: STA 18:XX:XX:XX:XX:be RADIUS: starting accounting session 0BXXXXXXXXXXX Nov 27 22:22:36 hostname hostapd[322]: wlan0: STA 18:XX:XX:XX:XX:be WPA: pairwise key handshake completed (RSN) Nov 27 22:22:36 hostname hostapd[322]: wlan0: STA 18:XX:XX:XX:XX:be RADIUS: starting accounting session 0BXXXXXXXXXXX Nov 27 22:22:36 hostname hostapd[322]: wlan0: AP-STA-CONNECTED 18:XX:XX:XX:XX:be Nov 27 22:22:35 hostname hostapd[322]: wlan0: STA 18:XX:XX:XX:XX:be IEEE 802.11: associated (aid 2) Nov 27 22:22:35 hostname hostapd[322]: wlan0: STA 18:XX:XX:XX:XX:be IEEE 802.11: associated (aid 2) Nov 27 22:22:35 hostname hostapd[322]: wlan0: STA 18:XX:XX:XX:XX:be IEEE 802.11: authenticated Nov 27 22:22:35 hostname hostapd[322]: wlan0: STA 18:XX:XX:XX:XX:be IEEE 802.11: authenticated Nov 27 22:22:35 hostname hostapd[322]: wlan0: STA 18:XX:XX:XX:XX:be IEEE 802.11: did not acknowledge authentication response Nov 27 22:22:35 hostname hostapd[322]: wlan0: STA 18:XX:XX:XX:XX:be IEEE 802.11: did not acknowledge authentication response Nov 27 22:22:35 hostname hostapd[322]: wlan0: STA 18:XX:XX:XX:XX:be IEEE 802.11: did not acknowledge authentication response Nov 27 22:22:35 hostname hostapd[322]: wlan0: STA 18:XX:XX:XX:XX:be IEEE 802.11: did not acknowledge authentication response Nov 27 22:22:35 hostname hostapd[322]: wlan0: STA 18:XX:XX:XX:XX:be IEEE 802.11: did not acknowledge authentication response Nov 27 22:22:35 hostname hostapd[322]: wlan0: STA 18:XX:XX:XX:XX:be IEEE 802.11: did not acknowledge authentication response Nov 27 22:22:25 hostname hostapd[322]: wlan0: STA 18:XX:XX:XX:XX:be IEEE 802.11: did not acknowledge authentication response Nov 27 22:22:25 hostname hostapd[322]: wlan0: STA 18:XX:XX:XX:XX:be IEEE 802.11: did not acknowledge authentication response Nov 27 22:22:25 hostname hostapd[322]: wlan0: STA 18:XX:XX:XX:XX:be IEEE 802.11: did not acknowledge authentication response Nov 27 22:22:25 hostname hostapd[322]: wlan0: STA 18:XX:XX:XX:XX:be IEEE 802.11: did not acknowledge authentication response Nov 27 22:22:25 hostname hostapd[322]: wlan0: STA 18:XX:XX:XX:XX:be IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE) Nov 27 22:22:25 hostname hostapd[322]: wlan0: STA 18:XX:XX:XX:XX:be IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE) Nov 27 22:22:24 hostname hostapd[322]: wlan0: STA 18:XX:XX:XX:XX:be IEEE 802.11: did not acknowledge authentication response Nov 27 22:22:24 hostname hostapd[322]: wlan0: STA 18:XX:XX:XX:XX:be IEEE 802.11: did not acknowledge authentication response Nov 27 22:22:24 hostname hostapd[322]: wlan0: STA 18:XX:XX:XX:XX:be IEEE 802.11: did not acknowledge authentication response Nov 27 22:22:24 hostname hostapd[322]: wlan0: STA 18:XX:XX:XX:XX:be IEEE 802.11: did not acknowledge authentication response Nov 27 22:22:24 hostname hostapd[322]: wlan0: STA 18:XX:XX:XX:XX:be IEEE 802.11: did not acknowledge authentication response Nov 27 22:22:24 hostname hostapd[322]: wlan0: STA 18:XX:XX:XX:XX:be IEEE 802.11: did not acknowledge authentication response Nov 27 22:22:24 hostname hostapd[322]: wlan0: STA 18:XX:XX:XX:XX:be IEEE 802.11: did not acknowledge authentication response Nov 27 22:22:24 hostname hostapd[322]: wlan0: STA 18:XX:XX:XX:XX:be IEEE 802.11: did not acknowledge authentication response Nov 27 22:22:24 hostname hostapd[322]: wlan0: STA 18:XX:XX:XX:XX:be IEEE 802.11: did not acknowledge authentication response Nov 27 22:22:24 hostname hostapd[322]: wlan0: STA 18:XX:XX:XX:XX:be IEEE 802.11: did not acknowledge authentication response Nov 27 22:22:24 hostname hostapd[322]: wlan0: STA 18:XX:XX:XX:XX:be IEEE 802.11: did not acknowledge authentication response Nov 27 22:22:24 hostname hostapd[322]: wlan0: STA 18:XX:XX:XX:XX:be IEEE 802.11: did not acknowledge authentication response Nov 27 22:22:20 hostname hostapd[322]: wlan0: STA 18:XX:XX:XX:XX:be IEEE 802.11: did not acknowledge authentication response Nov 27 22:22:20 hostname hostapd[322]: wlan0: STA 18:XX:XX:XX:XX:be IEEE 802.11: did not acknowledge authentication response Nov 27 22:22:20 hostname hostapd[322]: wlan0: STA 18:XX:XX:XX:XX:be IEEE 802.11: authenticated Nov 27 22:22:20 hostname hostapd[322]: wlan0: STA 18:XX:XX:XX:XX:be IEEE 802.11: authenticated Nov 27 22:22:20 hostname hostapd[322]: wlan0: STA 18:XX:XX:XX:XX:be IEEE 802.11: authenticated Nov 27 22:22:20 hostname hostapd[322]: wlan0: STA 18:XX:XX:XX:XX:be IEEE 802.11: authenticated Nov 27 22:22:20 hostname hostapd[322]: wlan0: STA 18:XX:XX:XX:XX:be IEEE 802.11: did not acknowledge authentication response Nov 27 22:22:20 hostname hostapd[322]: wlan0: STA 18:XX:XX:XX:XX:be IEEE 802.11: did not acknowledge authentication response Nov 27 22:22:20 hostname hostapd[322]: wlan0: STA 18:XX:XX:XX:XX:be IEEE 802.11: did not acknowledge authentication response Nov 27 22:22:20 hostname hostapd[322]: wlan0: STA 18:XX:XX:XX:XX:be IEEE 802.11: did not acknowledge authentication response Nov 27 22:22:19 hostname hostapd[322]: wlan0: STA 18:XX:XX:XX:XX:be IEEE 802.11: did not acknowledge authentication response Nov 27 22:22:19 hostname hostapd[322]: wlan0: STA 18:XX:XX:XX:XX:be IEEE 802.11: did not acknowledge authentication response Nov 27 22:22:19 hostname hostapd[322]: wlan0: STA 18:XX:XX:XX:XX:be IEEE 802.11: did not acknowledge authentication response Nov 27 22:22:19 hostname hostapd[322]: wlan0: STA 18:XX:XX:XX:XX:be IEEE 802.11: did not acknowledge authentication response Nov 27 22:22:19 hostname hostapd[322]: wlan0: STA 18:XX:XX:XX:XX:be IEEE 802.11: did not acknowledge authentication response Nov 27 22:22:19 hostname hostapd[322]: wlan0: STA 18:XX:XX:XX:XX:be IEEE 802.11: did not acknowledge authentication response Nov 27 22:22:15 hostname hostapd[322]: wlan0: STA 18:XX:XX:XX:XX:be IEEE 802.11: did not acknowledge authentication response Nov 27 22:22:15 hostname hostapd[322]: wlan0: STA 18:XX:XX:XX:XX:be IEEE 802.11: did not acknowledge authentication response Nov 27 22:22:15 hostname hostapd[322]: wlan0: STA 18:XX:XX:XX:XX:be IEEE 802.11: did not acknowledge authentication response Nov 27 22:22:15 hostname hostapd[322]: wlan0: STA 18:XX:XX:XX:XX:be IEEE 802.11: did not acknowledge authentication response Nov 27 22:22:15 hostname hostapd[322]: wlan0: STA 18:XX:XX:XX:XX:be IEEE 802.11: did not acknowledge authentication response Nov 27 22:22:15 hostname hostapd[322]: wlan0: STA 18:XX:XX:XX:XX:be IEEE 802.11: did not acknowledge authentication response Nov 27 22:22:15 hostname hostapd[322]: wlan0: STA 18:XX:XX:XX:XX:be IEEE 802.11: did not acknowledge authentication response Nov 27 22:22:15 hostname hostapd[322]: wlan0: STA 18:XX:XX:XX:XX:be IEEE 802.11: did not acknowledge authentication response Nov 27 22:22:15 hostname hostapd[322]: wlan0: STA 18:XX:XX:XX:XX:be IEEE 802.11: did not acknowledge authentication response Nov 27 22:22:15 hostname hostapd[322]: wlan0: STA 18:XX:XX:XX:XX:be IEEE 802.11: did not acknowledge authentication response Nov 27 22:22:15 hostname hostapd[322]: wlan0: STA 18:XX:XX:XX:XX:be IEEE 802.11: authenticated Nov 27 22:22:15 hostname hostapd[322]: wlan0: STA 18:XX:XX:XX:XX:be IEEE 802.11: authenticated Nov 27 22:22:14 hostname hostapd[322]: wlan0: STA 18:XX:XX:XX:XX:be IEEE 802.11: did not acknowledge authentication response Nov 27 22:22:14 hostname hostapd[322]: wlan0: STA 18:XX:XX:XX:XX:be IEEE 802.11: did not acknowledge authentication response Nov 27 22:22:14 hostname hostapd[322]: wlan0: STA 18:XX:XX:XX:XX:be IEEE 802.11: authenticated Nov 27 22:22:14 hostname hostapd[322]: wlan0: STA 18:XX:XX:XX:XX:be IEEE 802.11: authenticated Nov 27 22:22:14 hostname hostapd[322]: wlan0: AP-STA-DISCONNECTED 18:XX:XX:XX:XX:be _______________________________________________ ath10k mailing list ath10k@lists.infradead.org http://lists.infradead.org/mailman/listinfo/ath10k ^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: duplicate authentications / excessive missing ACKs / deauth due to inactivity timer 2019-12-01 16:30 duplicate authentications / excessive missing ACKs / deauth due to inactivity timer Justin Capella @ 2019-12-01 17:01 ` Adrian Chadd 2019-12-01 17:18 ` Justin Capella 0 siblings, 1 reply; 6+ messages in thread From: Adrian Chadd @ 2019-12-01 17:01 UTC (permalink / raw) To: Justin Capella; +Cc: ath10k Are these er, apple devices? -adrian _______________________________________________ ath10k mailing list ath10k@lists.infradead.org http://lists.infradead.org/mailman/listinfo/ath10k ^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: duplicate authentications / excessive missing ACKs / deauth due to inactivity timer 2019-12-01 17:01 ` Adrian Chadd @ 2019-12-01 17:18 ` Justin Capella 2019-12-01 17:21 ` Adrian Chadd 0 siblings, 1 reply; 6+ messages in thread From: Justin Capella @ 2019-12-01 17:18 UTC (permalink / raw) To: Adrian Chadd; +Cc: ath10k No Apply devices--- Android (BRCM?), and Linux iwlwifi. I guess I could have left the OUI's in the MACs.... But it is a recent regression and multiple clients (all my devices) seem to be impacted. On Sun, Dec 1, 2019 at 9:01 AM Adrian Chadd <adrian@freebsd.org> wrote: > > Are these er, apple devices? > > > > -adrian _______________________________________________ ath10k mailing list ath10k@lists.infradead.org http://lists.infradead.org/mailman/listinfo/ath10k ^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: duplicate authentications / excessive missing ACKs / deauth due to inactivity timer 2019-12-01 17:18 ` Justin Capella @ 2019-12-01 17:21 ` Adrian Chadd 2019-12-01 18:53 ` Justin Capella [not found] ` <CAMrEMU-v9GDt_=MMgxsxqk0zw33Bzf0AY5G4XHmv6d3ecV_zPA@mail.gmail.com> 0 siblings, 2 replies; 6+ messages in thread From: Adrian Chadd @ 2019-12-01 17:21 UTC (permalink / raw) To: Justin Capella; +Cc: ath10k It'd be good to at least post the client devices, with the kernel/firmware versions if you know them. That way people can check for regressions. -a _______________________________________________ ath10k mailing list ath10k@lists.infradead.org http://lists.infradead.org/mailman/listinfo/ath10k ^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: duplicate authentications / excessive missing ACKs / deauth due to inactivity timer 2019-12-01 17:21 ` Adrian Chadd @ 2019-12-01 18:53 ` Justin Capella [not found] ` <CAMrEMU-v9GDt_=MMgxsxqk0zw33Bzf0AY5G4XHmv6d3ecV_zPA@mail.gmail.com> 1 sibling, 0 replies; 6+ messages in thread From: Justin Capella @ 2019-12-01 18:53 UTC (permalink / raw) To: Adrian Chadd; +Cc: ath10k Just to note, some of the devices have not been updated, the AP however has been, kernel upgrade coincides with start of issue. Name : linux-lts Install Date : Sat Nov 16 12:58:43 2019 Name : linux-firmware Install Date : Thu Oct 17 05:27:14 2019 Name : hostapd Install Date : Thu Sep 19 17:51:31 2019 Name : wpa_supplicant Install Date : Tue Sep 3 07:06:51 2019 The linux package is built from: https://git.archlinux.org/svntogit/packages.git/tree/trunk/PKGBUILD?h=packages/linux-lts&id=6d82129ac6719690fa5c0fd09d1ddb1883c292cf Link to the 4.19.84 ath10k drivers tree: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/log/drivers/net/wireless/ath/ath10k?h=v4.19.84 Happy to provide any info but I'm sure this is an issue on the AP side (where the ATH10k is the base station) I'll enable debug logging, and see if upgrading/downgrading kernel makes a difference, if there is any sort of tracepoints anyone is aware of I can enable those Client devices: *Pixel 2 XL cell phone: Snapdragon X16 LTE modem: mobile connectivity with LTE download speeds up to 1 Gbps, multi-gigabit 802.11ad, and integrated 2x2 802.11ac Wi-Fi with MU-MIMO *Intel AC 9560 *Samsung TV... Unsure of wifi chipset Station 84:d6:d0:xx:xx:fa (on wlp1s0) inactive time: 1310 ms rx bytes: 81380769 rx packets: 522284 tx bytes: 745819867 tx packets: 685665 tx retries: 0 tx failed: 0 rx drop misc: 64 signal: -54 [-60, -56, -62] dBm signal avg: -59 [-64, -62, -66] dBm tx bitrate: 468.0 MBit/s VHT-MCS 5 80MHz VHT-NSS 2 rx bitrate: 6.0 MBit/s rx duration: 40567184 us last ack signal:-95 dBm authorized: yes authenticated: yes associated: yes preamble: long WMM/WME: yes MFP: no TDLS peer: no DTIM period: 2 beacon interval:100 short slot time:yes connected time: 1220604 seconds Station 64:16:66:xx:xx:c6 (on wlp1s0) inactive time: 8530 ms rx bytes: 13854367 rx packets: 134992 tx bytes: 11651515 tx packets: 38495 tx retries: 0 tx failed: 15 rx drop misc: 110 signal: -60 [-71, -68, -61] dBm signal avg: -59 [-71, -67, -60] dBm tx bitrate: 72.2 MBit/s MCS 7 short GI rx bitrate: 6.0 MBit/s rx duration: 13006672 us last ack signal:-95 dBm authorized: yes authenticated: yes associated: yes preamble: long WMM/WME: yes MFP: no TDLS peer: no DTIM period: 2 beacon interval:100 short slot time:yes connected time: 522598 seconds Station 18:b4:30:xx:xx:be (on wlp1s0) < "Nest" inactive time: 8530 ms rx bytes: 8920217 rx packets: 85624 tx bytes: 7452573 tx packets: 24475 tx retries: 0 tx failed: 29 rx drop misc: 1686 signal: -76 [-85, -85, -77] dBm signal avg: -75 [-83, -83, -76] dBm tx bitrate: 39.0 MBit/s MCS 4 rx bitrate: 6.0 MBit/s rx duration: 9793456 us last ack signal:-95 dBm authorized: yes authenticated: yes associated: yes preamble: long WMM/WME: yes MFP: no TDLS peer: no DTIM period: 2 beacon interval:100 short slot time:yes connected time: 332504 seconds Station 54:bd:79:xx:xx:9a (on wlp1s0) inactive time: 22850 ms rx bytes: 715096377 rx packets: 7165084 tx bytes: 40932559821 tx packets: 27114376 tx retries: 0 tx failed: 8764 rx drop misc: 58230 signal: -71 [-78, -77, -75] dBm signal avg: -71 [-77, -77, -74] dBm tx bitrate: 117.0 MBit/s VHT-MCS 3 80MHz VHT-NSS 1 rx bitrate: 6.0 MBit/s rx duration: 224061996 us last ack signal:-95 dBm authorized: yes authenticated: yes associated: yes preamble: long WMM/WME: yes MFP: no TDLS peer: no DTIM period: 2 beacon interval:100 short slot time:yes connected time: 80393 seconds Station 10:f1:f2:xx:xx:30 (on wlp1s0) < Android inactive time: 42780 ms rx bytes: 24355519 rx packets: 138402 tx bytes: 112776405 tx packets: 136049 tx retries: 0 tx failed: 163 rx drop misc: 6487 signal: -64 [-77, -75, -64] dBm signal avg: -64 [-72, -70, -67] dBm tx bitrate: 175.6 MBit/s VHT-MCS 2 80MHz VHT-NSS 2 rx bitrate: 6.0 MBit/s rx duration: 11787408 us last ack signal:-95 dBm authorized: yes authenticated: yes associated: yes preamble: long WMM/WME: yes MFP: no TDLS peer: no DTIM period: 2 beacon interval:100 short slot time:yes connected time: 46408 seconds Station 48:d6:d5:xx:xx:23 (on wlp1s0) inactive time: 7940 ms rx bytes: 2867427 rx packets: 19173 tx bytes: 3553640 tx packets: 13790 tx retries: 0 tx failed: 4 rx drop misc: 0 signal: -48 [-52, -50, -61] dBm signal avg: -47 [-50, -49, -59] dBm tx bitrate: 325.0 MBit/s VHT-MCS 7 80MHz short GI VHT-NSS 1 rx bitrate: 433.3 MBit/s VHT-MCS 9 80MHz short GI VHT-NSS 1 rx duration: 1589600 us last ack signal:-95 dBm authorized: yes authenticated: yes associated: yes preamble: long WMM/WME: yes MFP: no TDLS peer: no DTIM period: 2 beacon interval:100 short slot time:yes connected time: 24731 seconds On Sun, Dec 1, 2019 at 9:21 AM Adrian Chadd <adrian@freebsd.org> wrote: > > It'd be good to at least post the client devices, with the > kernel/firmware versions if you know them. That way people can check > for regressions. > > > -a _______________________________________________ ath10k mailing list ath10k@lists.infradead.org http://lists.infradead.org/mailman/listinfo/ath10k ^ permalink raw reply [flat|nested] 6+ messages in thread
[parent not found: <CAMrEMU-v9GDt_=MMgxsxqk0zw33Bzf0AY5G4XHmv6d3ecV_zPA@mail.gmail.com>]
* Fwd: duplicate authentications / excessive missing ACKs / deauth due to inactivity timer [not found] ` <CAMrEMU-v9GDt_=MMgxsxqk0zw33Bzf0AY5G4XHmv6d3ecV_zPA@mail.gmail.com> @ 2019-12-02 3:59 ` Justin Capella 0 siblings, 0 replies; 6+ messages in thread From: Justin Capella @ 2019-12-02 3:59 UTC (permalink / raw) To: ath10k Sorry newb move--- forgot to include the list ---------- Forwarded message --------- From: Justin Capella <justincapella@gmail.com> Date: Sun, Dec 1, 2019 at 7:58 PM Subject: Re: duplicate authentications / excessive missing ACKs / deauth due to inactivity timer To: Adrian Chadd <adrian@freebsd.org> http://ix.io/23lo Included iw phy / iw dev in this paste. The multiple print's of the associations/starting sessions makes me feel like the packets are being processed multiple times. I'd like to bring attention to this commit https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/drivers/net/wireless/ath/ath10k?h=v4.19.84&id=a4bf4fecff16f30814922679a131331f2c3aabf8 I notice that the check here is different logic, using BITS_PER_TYPE in other places I see comparisons against ATH10K_MAX_NUM_PEER_IDS, is this correct? My thought was if maybe I have many clients (11?) that maybe this prevents the removal of the peer... but I admit to not understanding all the nuances of the 80211 stack yet. Would a inline/utility type function to centralize these sorts of checks be worthwhile? On Sun, Dec 1, 2019 at 9:21 AM Adrian Chadd <adrian@freebsd.org> wrote: > > It'd be good to at least post the client devices, with the > kernel/firmware versions if you know them. That way people can check > for regressions. > > > -a _______________________________________________ ath10k mailing list ath10k@lists.infradead.org http://lists.infradead.org/mailman/listinfo/ath10k ^ permalink raw reply [flat|nested] 6+ messages in thread
end of thread, other threads:[~2019-12-02 4:00 UTC | newest] Thread overview: 6+ messages (download: mbox.gz / follow: Atom feed) -- links below jump to the message on this page -- 2019-12-01 16:30 duplicate authentications / excessive missing ACKs / deauth due to inactivity timer Justin Capella 2019-12-01 17:01 ` Adrian Chadd 2019-12-01 17:18 ` Justin Capella 2019-12-01 17:21 ` Adrian Chadd 2019-12-01 18:53 ` Justin Capella [not found] ` <CAMrEMU-v9GDt_=MMgxsxqk0zw33Bzf0AY5G4XHmv6d3ecV_zPA@mail.gmail.com> 2019-12-02 3:59 ` Fwd: " Justin Capella
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.