You are not logged in.
Hi i've got some problem with my wifi card.
The card is able to scan nearby networks (iwlist scan shows a nice output) however i can't connect my home network (some auth problems not sure though).
The network i'm accessing is passphrasee protected and the connection worked perfectly before upgrade .
Here is wpa_supplicant output:
wpa_supplicant v2.1
Successfully initialized wpa_supplicant
Initializing interface 'wlan0' conf '/home/piotr/wpa_supplicant.conf' driver 'nl80211' ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/home/piotr/wpa_supplicant.conf' -> '/home/piotr/wpa_supplicant.conf'
Reading configuration file '/home/piotr/wpa_supplicant.conf'
ctrl_interface='/var/run/wpa_supplicant'
eapol_version=1
ap_scan=1
fast_reauth=1
Priority group 10
id=0 ssid='NETIASPOT-589D40'
rfkill: initial event: idx=0 type=2 op=0 soft=0 hard=0
rfkill: initial event: idx=1 type=1 op=0 soft=0 hard=0
nl80211: Supported cipher 00-0f-ac:1
nl80211: Supported cipher 00-0f-ac:5
nl80211: Supported cipher 00-0f-ac:2
nl80211: Supported cipher 00-0f-ac:4
nl80211: Using driver-based off-channel TX
nl80211: interface wlan0 in phy phy0
nl80211: Set mode ifindex 3 iftype 2 (STATION)
nl80211: Subscribe to mgmt frames with non-AP handle 0x9d2c640
nl80211: Register frame type=0xd0 nl_handle=0x9d2c640 match=040a
nl80211: Register frame type=0xd0 nl_handle=0x9d2c640 match=040b
nl80211: Register frame type=0xd0 nl_handle=0x9d2c640 match=040c
nl80211: Register frame type=0xd0 nl_handle=0x9d2c640 match=040d
nl80211: Register frame type=0xd0 nl_handle=0x9d2c640 match=090a
nl80211: Register frame type=0xd0 nl_handle=0x9d2c640 match=090b
nl80211: Register frame type=0xd0 nl_handle=0x9d2c640 match=090c
nl80211: Register frame type=0xd0 nl_handle=0x9d2c640 match=090d
nl80211: Register frame type=0xd0 nl_handle=0x9d2c640 match=0409506f9a09
nl80211: Register frame type=0xd0 nl_handle=0x9d2c640 match=7f506f9a09
nl80211: Register frame type=0xd0 nl_handle=0x9d2c640 match=0801
nl80211: Register frame type=0xd0 nl_handle=0x9d2c640 match=06
nl80211: Register frame type=0xd0 nl_handle=0x9d2c640 match=0a07
nl80211: Register frame type=0xd0 nl_handle=0x9d2c640 match=0a11
netlink: Operstate: ifindex=3 linkmode=1 (userspace-control), operstate=5 (IF_OPER_DORMANT)
nl80211: driver param='(null)'
Add interface wlan0 to a new radio phy0
nl80211: Regulatory information - country=00
nl80211: 2402-2472 @ 40 MHz 20 mBm
nl80211: 2457-2482 @ 40 MHz 20 mBm
nl80211: 2474-2494 @ 20 MHz 20 mBm
nl80211: 5170-5250 @ 160 MHz 20 mBm
nl80211: 5250-5330 @ 160 MHz 20 mBm
nl80211: 5490-5730 @ 160 MHz 20 mBm
nl80211: Added 802.11b mode based on 802.11g information
wlan0: Own MAC address: 00:1b:fc:f1:bc:66
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0
wlan0: RSN: flushing PMKID list in the driver
nl80211: Flush PMKIDs
wlan0: Setting scan request: 0.100000 sec
TDLS: TDLS operation not supported by driver
TDLS: Driver uses internal link setup
wlan0: WPS: UUID based on MAC address: 17370903-b38b-5037-8410-7d2b5dda08b6
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
nl80211: Skip set_supp_port(unauthorized) while not associated
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
wlan0: Added interface wlan0
wlan0: State: DISCONNECTED -> DISCONNECTED
nl80211: Set wlan0 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
wlan0: State: DISCONNECTED -> SCANNING
wlan0: Starting AP scan for wildcard SSID
wlan0: Add radio work 'scan'@0x9d3b270
wlan0: First radio work item in the queue - schedule start immediately
wlan0: Starting radio work 'scan'@0x9d3b270 after 0.000021 second wait
wlan0: nl80211: scan request
Scan requested (ret=0) - scan timeout 10 seconds
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlan0
wlan0: nl80211: Scan trigger
wlan0: Event SCAN_STARTED (49) received
wlan0: Own scan request started a scan in 0.000163 seconds
wlan0: CTRL-EVENT-SCAN-STARTED
EAPOL: disable timer tick
RTM_NEWLINK: ifi_index=3 ifname=wlan0 wext ifi_flags=0x1003 ([UP])
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlan0
wlan0: nl80211: New scan results available
nl80211: Scan probed for SSID ''
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 2484
wlan0: Event SCAN_RESULTS (3) received
wlan0: Scan completed in 1.132343 seconds
nl80211: Received scan results (4 BSSes)
wlan0: BSS: Start scan result update 1
wlan0: BSS: Add new id 0 BSSID 00:12:2a:58:9d:48 SSID 'NETIASPOT-589D40'
wlan0: BSS: Add new id 1 BSSID 2c:39:96:11:74:9d SSID 'SAGEM_749C'
wlan0: BSS: Add new id 2 BSSID 00:1e:37:0f:bf:c8 SSID 'neostrada_31da'
wlan0: BSS: Add new id 3 BSSID 00:12:2a:58:9d:4a SSID 'FON_NETIA_FREE_INTERNET'
BSS: last_scan_res_used=4/32
wlan0: New scan results available (own=1 ext=0)
WPS: AP 00:12:2a:58:9d:48 type 0 added
WPS: AP 2c:39:96:11:74:9d type 0 added
WPS: AP[0] 00:12:2a:58:9d:48 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
WPS: AP[1] 2c:39:96:11:74:9d type=0 tries=0 last_attempt=-1 sec ago blacklist=0
wlan0: Radio work 'scan'@0x9d3b270 done in 1.133091 seconds
wlan0: Selecting BSS from priority group 10
wlan0: 0: 00:12:2a:58:9d:48 ssid='NETIASPOT-589D40' wpa_ie_len=26 rsn_ie_len=24 caps=0x431 level=-51 wps
wlan0: selected based on RSN IE
wlan0: selected BSS 00:12:2a:58:9d:48 ssid='NETIASPOT-589D40'
wlan0: Considering connect request: reassociate: 0 selected: 00:12:2a:58:9d:48 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x9d2bf28 current_ssid=(nil)
wlan0: Request association with 00:12:2a:58:9d:48
WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=18): 00 10 4e 45 54 49 41 53 50 4f 54 2d 35 38 39 44 34 30
WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=3): 03 01 0a
WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=6): 05 04 01 03 00 00
WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=8): 07 06 50 4c 20 01 0d 12
WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=3): 20 01 00
WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=3): 2a 01 04
WPA: RSN IE in EAPOL-Key - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00
WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=24): 3d 16 0a 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=3): 48 01 00
WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=16): 4a 0e 14 00 0a 00 2c 01 c8 00 14 00 05 00 10 27
WPA: WPA IE in EAPOL-Key - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02
TDLS: TDLS is allowed in the target BSS
wlan0: Add radio work 'sme-connect'@0x9d3b270
wlan0: First radio work item in the queue - schedule start immediately
wlan0: Starting radio work 'sme-connect'@0x9d3b270 after 0.000034 second wait
wlan0: Automatic auth_alg selection: 0x1
RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0
RSN: Search for BSSID 00:12:2a:58:9d:48
RSN: No PMKSA cache entry found
wlan0: RSN: using IEEE 802.11i/D9.0
wlan0: WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2
wlan0: WPA: Selected mgmt group cipher 32
WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02
WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00
wlan0: WPA: using GTK TKIP
wlan0: WPA: using PTK CCMP
wlan0: WPA: using KEY_MGMT WPA-PSK
wlan0: WPA: not using MGMT group cipher
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
wlan0: Cancelling scan request
wlan0: SME: Trying to authenticate with 00:12:2a:58:9d:48 (SSID='NETIASPOT-589D40' freq=2457 MHz)
wlan0: State: SCANNING -> AUTHENTICATING
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
nl80211: Authenticate (ifindex=3)
* bssid=00:12:2a:58:9d:48
* freq=2457
* SSID - hexdump_ascii(len=16):
4e 45 54 49 41 53 50 4f 54 2d 35 38 39 44 34 30 NETIASPOT-589D40
* IEs - hexdump(len=0): [NULL]
* Auth Type 0
nl80211: Authentication request send successfully
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlan0
nl80211: New station 00:12:2a:58:9d:48
wlan0: SME: Authentication timeout
wpa_driver_nl80211_deauthenticate(addr=00:12:2a:58:9d:48 reason_code=3)
wlan0: Radio work 'sme-connect'@0x9d3b270 done in 5.029460 seconds
Added BSSID 00:12:2a:58:9d:48 into blacklist
wlan0: Blacklist count 1 --> request scan in 100 ms
wlan0: Setting scan request: 0.100000 sec
wlan0: State: AUTHENTICATING -> DISCONNECTED
nl80211: Set wlan0 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan0
nl80211: Delete station 00:12:2a:58:9d:48
nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlan0
nl80211: Deauthenticate event
wlan0: Event DEAUTH (12) received
wlan0: Deauthentication notification
wlan0: * reason 3 (locally generated)
wlan0: * address 00:12:2a:58:9d:48
Deauthentication frame IE(s) - hexdump(len=0): [NULL]
wlan0: Auto connect enabled: try to reconnect (wps=0 wpa_state=0)
wlan0: Do not request new immediate scan
TDLS: Remove peers on disassociation
wlan0: Disconnect event - remove keys
wlan0: State: DISCONNECTED -> DISCONNECTED
nl80211: Set wlan0 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
wlan0: State: DISCONNECTED -> SCANNING
....
the things are repeating
The passphrase is correct. wpa config file has just essid and psk fields set.
I'm using BCM4311, with firmare 666.2 with b43 driver.
Here is lsmod output:
b43 348621 0
bcma 31458 1 b43
mac80211 430821 1 b43
cfg80211 369962 2 b43,mac80211
rng_core 3016 1 b43
ssb 49126 2 b43,b44
pcmcia 41661 2 b43,ssb
led_class 2699 3 b43,sdhci,dell_laptop
mmc_core 91363 4 b43,ssb,sdhci,sdhci_pci
Thanks,
Peter
Last edited by Arsakes (2014-07-08 09:03:21)
Offline
I have had the same problem, after trying about everything I could find on the web I was left with downgrading the kernel
pacman -U /var/cache/pacman/pkg/linux-3.14.6-1-i686.pkg.tar.xz
This worked and my wifi is working again, if anyone has a better solution I would also like to hear it.
The cats have hacked into my network and are taking control!
Offline
I have the same problem. According to the b43 devs it is caused by a regression which they have identified and patched, but it is likely to be kernel 3.15.2 or 3.15.3 before the patch appears in a release. There are two things that can be done for the time being, the first is to downgrade the kernel, as you have, the other (on the devs' suggestion), is to use the old version 4.178.10.4 of the Broadcom firmware. I found the sources online and have adapted Xavion's PKGBUILD from the AUR b43-firmware in the AUR to do that. I have only been using the resulting package ifor a couple of hours, but so far so good. Here it is. Use entirely at your own risk - I am not a developer and this is the first time I have done this. I found that I had to reboot after installing the package to make it work.
# Maintainer: Xavion <Xavion (dot) 0 (at) Gmail (dot) com - Thanks to XAVION>
pkgname=b43-firmware
pkgver=4.178.10.4
pkgrel=1
pkgdesc="Firmware for Broadcom B43 wireless networking chips"
arch=("any")
url="http://linuxwireless.org/en/users/Drivers/b43"
license=("GPL")
depends=("linux>=3.2")
makedepends=("b43-fwcutter>=015")
options=(!emptydirs)
source=(http://mirror2.openwrt.org/sources/broadcom-wl-${pkgver}.tar.bz2)
package() {
cd "${srcdir}"/broadcom-wl-${pkgver}
# Directories
install -d "${pkgdir}"/usr/lib/firmware/
# Application
b43-fwcutter -w "${pkgdir}"/usr/lib/firmware/ linux/wl_apsta.o
# Messages
#msg "You should add 'b43' to the 'MODULES' array of your '/etc/rc.conf' file."
}
sha1sums=('ad5b3170cb9c72636e84392aefcdacf306270938' )
Offline
Thanks for the PKGBUILD! It worked fine for me.
Offline
Also, you can rebuild the kernel package(linux and linux-headers) using the given patch
The problem mentioned by perseus, discussed in the topic Linux 3.15: WLAN regression on WRL54GL/B43
This method is slower and more difficult, but allows you to get the latest working kernel. You do not need to downgrade version of b43-firmware.
To do this you need to put the patch in a file called fix-b43-frequency-detection-bug.patch edit PKGBUILD as described below and rebuild the package.
--- a/drivers/net/wireless/b43/xmit.c
+++ b/drivers/net/wireless/b43/xmit.c
@@ -811,9 +811,13 @@ void b43_rx(struct b43_wldev *dev, struct sk_buff *skb, const void *_rxhdr)
break;
case B43_PHYTYPE_G:
status.band = IEEE80211_BAND_2GHZ;
- /* chanid is the radio channel cookie value as used
- * to tune the radio. */
- status.freq = chanid + 2400;
+ /* Somewhere between 478.104 and 508.1084 firmware for G-PHY
+ * has been modified to be compatible with N-PHY and others.
+ */
+ if (dev->fw.rev >= 508)
+ status.freq = ieee80211_channel_to_frequency(chanid, status.band);
+ else
+ status.freq = chanid + 2400;
break;
case B43_PHYTYPE_N:
case B43_PHYTYPE_LP:
➜ linux diff /var/abs/core/linux/PKGBUILD ~/tmp/linux/PKGBUILD
9c9
< pkgrel=1
---
> pkgrel=2
22a23
> 'fix-b43-frequency-detection-bug.patch'
30c31,32
< '79359454c9d8446eb55add2b1cdbf8332bd67dafb01fefb5b1ca090225f64d18')
---
> '79359454c9d8446eb55add2b1cdbf8332bd67dafb01fefb5b1ca090225f64d18'
> '0debdba07be9061e030a4c6d20bdd42934ada227c168e9a10f1baab1da8e41d9')
52a55,57
> # fix b43 G-PHY frequency
> patch -Np1 -i "${srcdir}/fix-b43-frequency-detection-bug.patch"
>
305c310,311
< '79359454c9d8446eb55add2b1cdbf8332bd67dafb01fefb5b1ca090225f64d18')
---
> '79359454c9d8446eb55add2b1cdbf8332bd67dafb01fefb5b1ca090225f64d18'
> '0debdba07be9061e030a4c6d20bdd42934ada227c168e9a10f1baab1da8e41d9')
Offline
it is likely to be kernel 3.15.2 or 3.15.3 before the patch appears in a release.
Not fixed in 3.15.2, in case anyone's interested.
Last edited by tomk (2014-06-28 08:44:04)
Offline
Finding this thread has saved me from a lot of annoying network troubleshooting tonight. Thanks for all three solutions.
"A problem well stated is a problem half solved." - Charles Franklin Kettering
Offline
It also appears that 3.15.3-1 is not working.
Last edited by 3igHankCh0w (2014-07-04 01:00:14)
The cats have hacked into my network and are taking control!
Offline
The known issues page for the driver says it was fixed in 3.16-rc3.
Offline
Fixed in 3.15.5!
Offline
Am happy to report my BCM4318 is again working with 3.15.5.
Last edited by czubek (2014-07-11 21:18:50)
Offline