Message ID | 20240823174220.498594-1-denkenz@gmail.com (mailing list archive) |
---|---|
Headers | show |
Series | External Auth support | expand |
Denis, On Fri, Aug 23, 2024 at 12:42 PM Denis Kenzior <denkenz@gmail.com> wrote: > > This series implements External Auth support on Full MAC cards that do > not support SAE offload. I have not been able to test this fully since > the brcmfmac firmware on the RPi 5 does not actually work properly. > Maybe some enterprising person can test it on a firmware that does work? > > Denis Kenzior (2): > netdev: external auth support > sae: Allow ability to force Group 19 / Hunt and Peck > > src/netdev.c | 258 +++++++++++++++++++++++++++++++++++++++++----- > src/nl80211util.c | 4 +- > src/sae.c | 20 ++++ > src/sae.h | 3 + > src/wiphy.c | 19 ++-- > 5 files changed, 263 insertions(+), 41 deletions(-) > > -- > 2.45.2 > > I was watching for this. I built iwd from git and tried it on my Pi5. As you said, it did not work: Aug 23 19:24:29 pi5 iwd[16297]: SAE unsupported: brcmfmac needs CMD_EXTERNAL_AUTH for SAE Aug 23 19:24:29 pi5 iwd[16297]: src/wiphy.c:wiphy_select_akm() Can't use SAE, trying WPA2 Aug 23 19:24:32 pi5 iwd[16297]: src/agent.c:agent_disconnect() agent :1.471 disconnected Aug 23 19:24:32 pi5 iwd[16297]: src/agent.c:agent_free() agent free 0x5555946ddaf0 I believe this is the latest firmware from Infineon for the RPi fmac cards: Firmware: BCM4345/6 wl0: Aug 29 2023 01:47:08 version 7.45.265 (28bca26 CY) FWID 01-b677b91b Firmware: BCM43430/1 wl0: Jun 14 2023 07:27:45 version 7.45.96.s1 (gf031a129) FWID 01-70bd2af7 es7 I know there are a number of fmac cards. Does the firmware on these work differently to other brcmfmac cards? Do all of them use CMD_EXTERNAL_AUTH? Keith
Hi Keith, On 8/23/24 7:38 PM, KeithG wrote: > Denis, > > > On Fri, Aug 23, 2024 at 12:42 PM Denis Kenzior <denkenz@gmail.com> wrote: >> >> This series implements External Auth support on Full MAC cards that do >> not support SAE offload. I have not been able to test this fully since >> the brcmfmac firmware on the RPi 5 does not actually work properly. >> Maybe some enterprising person can test it on a firmware that does work? >> >> Denis Kenzior (2): >> netdev: external auth support >> sae: Allow ability to force Group 19 / Hunt and Peck >> >> src/netdev.c | 258 +++++++++++++++++++++++++++++++++++++++++----- >> src/nl80211util.c | 4 +- >> src/sae.c | 20 ++++ >> src/sae.h | 3 + >> src/wiphy.c | 19 ++-- >> 5 files changed, 263 insertions(+), 41 deletions(-) >> >> -- >> 2.45.2 >> >> > I was watching for this. I built iwd from git and tried it on my Pi5. > As you said, it did not work: > > Aug 23 19:24:29 pi5 iwd[16297]: SAE unsupported: brcmfmac needs > CMD_EXTERNAL_AUTH for SAE I don't think you applied the patch correctly. You should see: + /* Case 3 */ + iwd_notice(IWD_NOTICE_CONNECT_INFO, + "FullMAC driver: %s using SAE. Expect EXTERNAL_AUTH", wiphy->driver_str); > Aug 23 19:24:29 pi5 iwd[16297]: src/wiphy.c:wiphy_select_akm() Can't > use SAE, trying WPA2 > Aug 23 19:24:32 pi5 iwd[16297]: src/agent.c:agent_disconnect() agent > :1.471 disconnected > Aug 23 19:24:32 pi5 iwd[16297]: src/agent.c:agent_free() agent free > 0x5555946ddaf0 > > I believe this is the latest firmware from Infineon for the RPi fmac cards: > Firmware: BCM4345/6 wl0: Aug 29 2023 01:47:08 version 7.45.265 > (28bca26 CY) FWID 01-b677b91b > Firmware: BCM43430/1 wl0: Jun 14 2023 07:27:45 version 7.45.96.s1 > (gf031a129) FWID 01-70bd2af7 es7 > > I know there are a number of fmac cards. Does the firmware on these > work differently to other brcmfmac cards? Do all of them use > CMD_EXTERNAL_AUTH? No idea. All other brcmfmac cards used SAE offload. Cypress firmware seems to have gone with EXTERNAL_AUTH. Not sure about other full mac cards. I can see references to EXTERNAL_AUTH in two upstream drivers: [denkenz@archdev linux]$ grep -R "cfg80211_external_auth_request" * drivers/net/wireless/microchip/wilc1000/hif.c: cfg80211_external_auth_request(vif->ndev, &vif->auth, drivers/net/wireless/quantenna/qtnfmac/event.c: ret = cfg80211_external_auth_request(vif->netdev, &auth, GFP_KERNEL); But the hardware seems to be unobtanium. Maybe others can report what other solutions use EXTERNAL_AUTH? Maybe Pinephone? Regards, -Denis
On Fri, Aug 23, 2024 at 10:21 PM Denis Kenzior <denkenz@gmail.com> wrote: > > Hi Keith, > > On 8/23/24 7:38 PM, KeithG wrote: > > Denis, > > > > > > On Fri, Aug 23, 2024 at 12:42 PM Denis Kenzior <denkenz@gmail.com> wrote: > >> > >> This series implements External Auth support on Full MAC cards that do > >> not support SAE offload. I have not been able to test this fully since > >> the brcmfmac firmware on the RPi 5 does not actually work properly. > >> Maybe some enterprising person can test it on a firmware that does work? > >> > >> Denis Kenzior (2): > >> netdev: external auth support > >> sae: Allow ability to force Group 19 / Hunt and Peck > >> > >> src/netdev.c | 258 +++++++++++++++++++++++++++++++++++++++++----- > >> src/nl80211util.c | 4 +- > >> src/sae.c | 20 ++++ > >> src/sae.h | 3 + > >> src/wiphy.c | 19 ++-- > >> 5 files changed, 263 insertions(+), 41 deletions(-) > >> > >> -- > >> 2.45.2 > >> > >> > > I was watching for this. I built iwd from git and tried it on my Pi5. > > As you said, it did not work: > > > > Aug 23 19:24:29 pi5 iwd[16297]: SAE unsupported: brcmfmac needs > > CMD_EXTERNAL_AUTH for SAE > > I don't think you applied the patch correctly. You should see: > > + /* Case 3 */ > + iwd_notice(IWD_NOTICE_CONNECT_INFO, > + "FullMAC driver: %s using SAE. Expect EXTERNAL_AUTH", > wiphy->driver_str); > > > Aug 23 19:24:29 pi5 iwd[16297]: src/wiphy.c:wiphy_select_akm() Can't > > use SAE, trying WPA2 > > Aug 23 19:24:32 pi5 iwd[16297]: src/agent.c:agent_disconnect() agent > > :1.471 disconnected > > Aug 23 19:24:32 pi5 iwd[16297]: src/agent.c:agent_free() agent free > > 0x5555946ddaf0 > > > > I believe this is the latest firmware from Infineon for the RPi fmac cards: > > Firmware: BCM4345/6 wl0: Aug 29 2023 01:47:08 version 7.45.265 > > (28bca26 CY) FWID 01-b677b91b > > Firmware: BCM43430/1 wl0: Jun 14 2023 07:27:45 version 7.45.96.s1 > > (gf031a129) FWID 01-70bd2af7 es7 > > > > I know there are a number of fmac cards. Does the firmware on these > > work differently to other brcmfmac cards? Do all of them use > > CMD_EXTERNAL_AUTH? > > No idea. All other brcmfmac cards used SAE offload. Cypress firmware seems to > have gone with EXTERNAL_AUTH. Not sure about other full mac cards. I can see > references to EXTERNAL_AUTH in two upstream drivers: > > [denkenz@archdev linux]$ grep -R "cfg80211_external_auth_request" * > drivers/net/wireless/microchip/wilc1000/hif.c: > cfg80211_external_auth_request(vif->ndev, &vif->auth, > drivers/net/wireless/quantenna/qtnfmac/event.c: ret = > cfg80211_external_auth_request(vif->netdev, &auth, GFP_KERNEL); > > But the hardware seems to be unobtanium. Maybe others can report what other > solutions use EXTERNAL_AUTH? Maybe Pinephone? > > Regards, > -Denis Denis, Sorry, I mis-read and assumed it was committed to git and not a patch. I created the 2 patches and built it again. iwctl looks like it is trying something: [iwd]# station wlan0 connect deskSAE Type the network passphrase for deskSAE psk. Passphrase: ********* [iwd]# but it never connects. I do notice that connman thinks it is up and assigns a 169.254.x.x address Aug 24 11:18:06 pi5 iwd[28085]: src/wiphy.c:wiphy_select_akm() Network is WPA3-Personal... Aug 24 11:18:06 pi5 iwd[28085]: event: connect-info, FullMAC driver: brcmfmac using SAE. Expect EXTERNAL_AUTH Aug 24 11:18:06 pi5 iwd[28085]: src/network.c:network_generate_sae_pt() Generating PT for Group 19 Aug 24 11:18:06 pi5 iwd[28085]: src/network.c:network_generate_sae_pt() Generating PT for Group 20 Aug 24 11:18:06 pi5 iwd[28085]: src/wiphy.c:wiphy_select_akm() Network is WPA3-Personal... Aug 24 11:18:06 pi5 iwd[28085]: event: connect-info, FullMAC driver: brcmfmac using SAE. Expect EXTERNAL_AUTH Aug 24 11:18:06 pi5 iwd[28085]: src/netdev.c:netdev_cqm_rssi_update() Aug 24 11:18:06 pi5 iwd[28085]: src/wiphy.c:wiphy_radio_work_insert() Inserting work item 4 Aug 24 11:18:06 pi5 iwd[28085]: src/wiphy.c:wiphy_radio_work_next() Starting work item 4 Aug 24 11:18:06 pi5 iwd[28085]: event: connect-info, ssid: deskSAE, bss: d8:3a:dd:60:a3:0c, signal: -63, load: 0/255 Aug 24 11:18:06 pi5 iwd[28085]: event: state, old: autoconnect_full, new: connecting Aug 24 11:18:06 pi5 iwd[28085]: src/scan.c:scan_periodic_stop() Stopping periodic scan for wdev 1 Aug 24 11:18:06 pi5 iwd[28085]: CMD_SET_CQM failed: Operation not supported Aug 24 11:18:06 pi5 connmand[635]: Interface wlan0 [ wifi ] state is configuration Aug 24 11:18:06 pi5 iwd[28085]: src/netdev.c:netdev_unicast_notify() Unicast notification External Auth(127) Aug 24 11:18:06 pi5 iwd[28085]: event: connect-info, External Auth to SSID: deskSAE, bssid: d8:3a:dd:60:a3:0c Aug 24 11:18:06 pi5 iwd[28085]: src/netdev.c:netdev_external_auth_sae_tx_authenticate() Aug 24 11:18:06 pi5 iwd[28085]: src/netdev.c:netdev_mlme_notify() MLME notification Frame TX Status(60) Aug 24 11:18:06 pi5 iwd[28085]: src/netdev.c:netdev_external_auth_sae_tx_authenticate() Aug 24 11:18:06 pi5 iwd[28085]: src/netdev.c:netdev_unicast_notify() Unicast notification Frame(59) Aug 24 11:18:06 pi5 iwd[28085]: src/netdev.c:netdev_mlme_notify() MLME notification Frame TX Status(60) Aug 24 11:18:06 pi5 iwd[28085]: src/netdev.c:netdev_external_auth_sae_tx_associate() Aug 24 11:18:06 pi5 iwd[28085]: src/netdev.c:netdev_unicast_notify() Unicast notification Frame(59) Aug 24 11:18:06 pi5 iwd[28085]: src/netdev.c:netdev_external_auth_cb() Failed to send External Auth: Invalid exchange(52) Aug 24 11:18:06 pi5 kernel: ieee80211 phy0: brcmf_cfg80211_external_auth: auth_status iovar failed: ret=-52 Aug 24 11:18:46 pi5 connmand[635]: Interface wlan0 [ wifi ] state is ready Aug 24 11:18:46 pi5 connmand[635]: wlan0 {add} address 169.254.242.107/16 label wlan0 family 2 Need a log of some sort or is this adequate? Keith
On Sat, Aug 24, 2024 at 11:20 AM KeithG <ys3al35l@gmail.com> wrote: > > On Fri, Aug 23, 2024 at 10:21 PM Denis Kenzior <denkenz@gmail.com> wrote: > > > > Hi Keith, > > > > On 8/23/24 7:38 PM, KeithG wrote: > > > Denis, > > > > > > > > > On Fri, Aug 23, 2024 at 12:42 PM Denis Kenzior <denkenz@gmail.com> wrote: > > >> > > >> This series implements External Auth support on Full MAC cards that do > > >> not support SAE offload. I have not been able to test this fully since > > >> the brcmfmac firmware on the RPi 5 does not actually work properly. > > >> Maybe some enterprising person can test it on a firmware that does work? > > >> > > >> Denis Kenzior (2): > > >> netdev: external auth support > > >> sae: Allow ability to force Group 19 / Hunt and Peck > > >> > > >> src/netdev.c | 258 +++++++++++++++++++++++++++++++++++++++++----- > > >> src/nl80211util.c | 4 +- > > >> src/sae.c | 20 ++++ > > >> src/sae.h | 3 + > > >> src/wiphy.c | 19 ++-- > > >> 5 files changed, 263 insertions(+), 41 deletions(-) > > >> > > >> -- > > >> 2.45.2 > > >> > > >> > > > I was watching for this. I built iwd from git and tried it on my Pi5. > > > As you said, it did not work: > > > > > > Aug 23 19:24:29 pi5 iwd[16297]: SAE unsupported: brcmfmac needs > > > CMD_EXTERNAL_AUTH for SAE > > > > I don't think you applied the patch correctly. You should see: > > > > + /* Case 3 */ > > + iwd_notice(IWD_NOTICE_CONNECT_INFO, > > + "FullMAC driver: %s using SAE. Expect EXTERNAL_AUTH", > > wiphy->driver_str); > > > > > Aug 23 19:24:29 pi5 iwd[16297]: src/wiphy.c:wiphy_select_akm() Can't > > > use SAE, trying WPA2 > > > Aug 23 19:24:32 pi5 iwd[16297]: src/agent.c:agent_disconnect() agent > > > :1.471 disconnected > > > Aug 23 19:24:32 pi5 iwd[16297]: src/agent.c:agent_free() agent free > > > 0x5555946ddaf0 > > > > > > I believe this is the latest firmware from Infineon for the RPi fmac cards: > > > Firmware: BCM4345/6 wl0: Aug 29 2023 01:47:08 version 7.45.265 > > > (28bca26 CY) FWID 01-b677b91b > > > Firmware: BCM43430/1 wl0: Jun 14 2023 07:27:45 version 7.45.96.s1 > > > (gf031a129) FWID 01-70bd2af7 es7 > > > > > > I know there are a number of fmac cards. Does the firmware on these > > > work differently to other brcmfmac cards? Do all of them use > > > CMD_EXTERNAL_AUTH? > > > > No idea. All other brcmfmac cards used SAE offload. Cypress firmware seems to > > have gone with EXTERNAL_AUTH. Not sure about other full mac cards. I can see > > references to EXTERNAL_AUTH in two upstream drivers: > > > > [denkenz@archdev linux]$ grep -R "cfg80211_external_auth_request" * > > drivers/net/wireless/microchip/wilc1000/hif.c: > > cfg80211_external_auth_request(vif->ndev, &vif->auth, > > drivers/net/wireless/quantenna/qtnfmac/event.c: ret = > > cfg80211_external_auth_request(vif->netdev, &auth, GFP_KERNEL); > > > > But the hardware seems to be unobtanium. Maybe others can report what other > > solutions use EXTERNAL_AUTH? Maybe Pinephone? > > > > Regards, > > -Denis > > Denis, > > Sorry, I mis-read and assumed it was committed to git and not a patch. > I created the 2 patches and built it again. > > iwctl looks like it is trying something: > [iwd]# station wlan0 connect deskSAE > Type the network passphrase for deskSAE psk. > Passphrase: ********* > [iwd]# > > but it never connects. I do notice that connman thinks it is up and > assigns a 169.254.x.x address > > Aug 24 11:18:06 pi5 iwd[28085]: src/wiphy.c:wiphy_select_akm() Network > is WPA3-Personal... > Aug 24 11:18:06 pi5 iwd[28085]: event: connect-info, FullMAC driver: > brcmfmac using SAE. Expect EXTERNAL_AUTH > Aug 24 11:18:06 pi5 iwd[28085]: > src/network.c:network_generate_sae_pt() Generating PT for Group 19 > Aug 24 11:18:06 pi5 iwd[28085]: > src/network.c:network_generate_sae_pt() Generating PT for Group 20 > Aug 24 11:18:06 pi5 iwd[28085]: src/wiphy.c:wiphy_select_akm() Network > is WPA3-Personal... > Aug 24 11:18:06 pi5 iwd[28085]: event: connect-info, FullMAC driver: > brcmfmac using SAE. Expect EXTERNAL_AUTH > Aug 24 11:18:06 pi5 iwd[28085]: src/netdev.c:netdev_cqm_rssi_update() > Aug 24 11:18:06 pi5 iwd[28085]: src/wiphy.c:wiphy_radio_work_insert() > Inserting work item 4 > Aug 24 11:18:06 pi5 iwd[28085]: src/wiphy.c:wiphy_radio_work_next() > Starting work item 4 > Aug 24 11:18:06 pi5 iwd[28085]: event: connect-info, ssid: deskSAE, > bss: d8:3a:dd:60:a3:0c, signal: -63, load: 0/255 > Aug 24 11:18:06 pi5 iwd[28085]: event: state, old: autoconnect_full, > new: connecting > Aug 24 11:18:06 pi5 iwd[28085]: src/scan.c:scan_periodic_stop() > Stopping periodic scan for wdev 1 > Aug 24 11:18:06 pi5 iwd[28085]: CMD_SET_CQM failed: Operation not supported > Aug 24 11:18:06 pi5 connmand[635]: Interface wlan0 [ wifi ] state is > configuration > Aug 24 11:18:06 pi5 iwd[28085]: src/netdev.c:netdev_unicast_notify() > Unicast notification External Auth(127) > Aug 24 11:18:06 pi5 iwd[28085]: event: connect-info, External Auth to > SSID: deskSAE, bssid: d8:3a:dd:60:a3:0c > Aug 24 11:18:06 pi5 iwd[28085]: > src/netdev.c:netdev_external_auth_sae_tx_authenticate() > Aug 24 11:18:06 pi5 iwd[28085]: src/netdev.c:netdev_mlme_notify() MLME > notification Frame TX Status(60) > Aug 24 11:18:06 pi5 iwd[28085]: > src/netdev.c:netdev_external_auth_sae_tx_authenticate() > Aug 24 11:18:06 pi5 iwd[28085]: src/netdev.c:netdev_unicast_notify() > Unicast notification Frame(59) > Aug 24 11:18:06 pi5 iwd[28085]: src/netdev.c:netdev_mlme_notify() MLME > notification Frame TX Status(60) > Aug 24 11:18:06 pi5 iwd[28085]: > src/netdev.c:netdev_external_auth_sae_tx_associate() > Aug 24 11:18:06 pi5 iwd[28085]: src/netdev.c:netdev_unicast_notify() > Unicast notification Frame(59) > Aug 24 11:18:06 pi5 iwd[28085]: src/netdev.c:netdev_external_auth_cb() > Failed to send External Auth: Invalid exchange(52) > Aug 24 11:18:06 pi5 kernel: ieee80211 phy0: > brcmf_cfg80211_external_auth: auth_status iovar failed: ret=-52 > Aug 24 11:18:46 pi5 connmand[635]: Interface wlan0 [ wifi ] state is ready > Aug 24 11:18:46 pi5 connmand[635]: wlan0 {add} address > 169.254.242.107/16 label wlan0 family 2 > > > Need a log of some sort or is this adequate? > > Keith I gave it a bit more thought and wondered if NetworkManager could deal with wpa3 and this patched verison of iwd. Also no connection. I first verified that nmcli could connect to the wpa2 ssid then tried this one. from cli: #nmcli --ask dev wifi connect deskSAE Password: ••••••••• Error: Timeout 90 sec expired. Aug 24 18:07:43 pi5 iwd[212556]: event: connect-info, FullMAC driver: brcmfmac using SAE. Expect EXTERNAL_AUTH Aug 24 18:08:17 pi5 sudo[219244]: root : TTY=pts/0 ; PWD=/root ; USER=root ; COMMAND=/usr/bin/nmcli --ask dev wifi connect deskSAE Aug 24 18:08:17 pi5 sudo[219244]: pam_unix(sudo:session): session opened for user root(uid=0) by root(uid=0) Aug 24 18:08:17 pi5 polkitd[212049]: Registered Authentication Agent for unix-process:219250:1397111 (system bus name :1.7111 [nmcli --ask dev wifi connect deskSAE], obje> Aug 24 18:08:23 pi5 NetworkManager[216946]: <info> [1724540903.5369] device (wlan0): Activation: starting connection 'deskSAE' (20e14402-d74a-48d0-a6f9-5c8d0404d21d) Aug 24 18:08:23 pi5 NetworkManager[216946]: <error> [1724540903.5390] audit: failed to open auditd socket: Protocol not supported Aug 24 18:08:23 pi5 NetworkManager[216946]: <info> [1724540903.5391] audit: op="connection-add-activate" uuid="20e14402-d74a-48d0-a6f9-5c8d0404d21d" name="deskSAE" pid=2> Aug 24 18:08:23 pi5 NetworkManager[216946]: <info> [1724540903.5398] device (wlan0): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'managed') Aug 24 18:08:23 pi5 NetworkManager[216946]: <info> [1724540903.5400] device (wlan0): state change: prepare -> config (reason 'none', sys-iface-state: 'managed') Aug 24 18:08:23 pi5 iwd[212556]: event: connect-info, FullMAC driver: brcmfmac using SAE. Expect EXTERNAL_AUTH Aug 24 18:08:23 pi5 iwd[212556]: event: connect-info, FullMAC driver: brcmfmac using SAE. Expect EXTERNAL_AUTH Aug 24 18:08:23 pi5 iwd[212556]: event: connect-info, ssid: deskSAE, bss: d8:3a:dd:60:a3:0c, signal: -57, load: 0/255 Aug 24 18:08:23 pi5 iwd[212556]: event: state, old: autoconnect_full, new: connecting Aug 24 18:08:23 pi5 iwd[212556]: CMD_SET_CQM failed: Operation not supported Aug 24 18:08:23 pi5 NetworkManager[216946]: <info> [1724540903.5434] device (wlan0): new IWD device state is connecting Aug 24 18:08:23 pi5 iwd[212556]: event: connect-info, External Auth to SSID: deskSAE, bssid: d8:3a:dd:60:a3:0c Aug 24 18:08:23 pi5 kernel: ieee80211 phy0: brcmf_cfg80211_external_auth: auth_status iovar failed: ret=-52 Keith
Hi Keith, >> >> iwctl looks like it is trying something: >> [iwd]# station wlan0 connect deskSAE >> Type the network passphrase for deskSAE psk. >> Passphrase: ********* >> [iwd]# >> >> but it never connects. I do notice that connman thinks it is up and >> assigns a 169.254.x.x address >> >> Aug 24 11:18:06 pi5 iwd[28085]: src/wiphy.c:wiphy_select_akm() Network >> is WPA3-Personal... >> Aug 24 11:18:06 pi5 iwd[28085]: event: connect-info, FullMAC driver: >> brcmfmac using SAE. Expect EXTERNAL_AUTH >> Aug 24 11:18:06 pi5 iwd[28085]: >> src/network.c:network_generate_sae_pt() Generating PT for Group 19 >> Aug 24 11:18:06 pi5 iwd[28085]: >> src/network.c:network_generate_sae_pt() Generating PT for Group 20 >> Aug 24 11:18:06 pi5 iwd[28085]: src/wiphy.c:wiphy_select_akm() Network >> is WPA3-Personal... >> Aug 24 11:18:06 pi5 iwd[28085]: event: connect-info, FullMAC driver: >> brcmfmac using SAE. Expect EXTERNAL_AUTH >> Aug 24 11:18:06 pi5 iwd[28085]: src/netdev.c:netdev_cqm_rssi_update() >> Aug 24 11:18:06 pi5 iwd[28085]: src/wiphy.c:wiphy_radio_work_insert() >> Inserting work item 4 >> Aug 24 11:18:06 pi5 iwd[28085]: src/wiphy.c:wiphy_radio_work_next() >> Starting work item 4 >> Aug 24 11:18:06 pi5 iwd[28085]: event: connect-info, ssid: deskSAE, >> bss: d8:3a:dd:60:a3:0c, signal: -63, load: 0/255 >> Aug 24 11:18:06 pi5 iwd[28085]: event: state, old: autoconnect_full, >> new: connecting >> Aug 24 11:18:06 pi5 iwd[28085]: src/scan.c:scan_periodic_stop() >> Stopping periodic scan for wdev 1 >> Aug 24 11:18:06 pi5 iwd[28085]: CMD_SET_CQM failed: Operation not supported >> Aug 24 11:18:06 pi5 connmand[635]: Interface wlan0 [ wifi ] state is >> configuration >> Aug 24 11:18:06 pi5 iwd[28085]: src/netdev.c:netdev_unicast_notify() >> Unicast notification External Auth(127) >> Aug 24 11:18:06 pi5 iwd[28085]: event: connect-info, External Auth to >> SSID: deskSAE, bssid: d8:3a:dd:60:a3:0c >> Aug 24 11:18:06 pi5 iwd[28085]: >> src/netdev.c:netdev_external_auth_sae_tx_authenticate() >> Aug 24 11:18:06 pi5 iwd[28085]: src/netdev.c:netdev_mlme_notify() MLME >> notification Frame TX Status(60) >> Aug 24 11:18:06 pi5 iwd[28085]: >> src/netdev.c:netdev_external_auth_sae_tx_authenticate() >> Aug 24 11:18:06 pi5 iwd[28085]: src/netdev.c:netdev_unicast_notify() >> Unicast notification Frame(59) >> Aug 24 11:18:06 pi5 iwd[28085]: src/netdev.c:netdev_mlme_notify() MLME >> notification Frame TX Status(60) >> Aug 24 11:18:06 pi5 iwd[28085]: >> src/netdev.c:netdev_external_auth_sae_tx_associate() >> Aug 24 11:18:06 pi5 iwd[28085]: src/netdev.c:netdev_unicast_notify() >> Unicast notification Frame(59) >> Aug 24 11:18:06 pi5 iwd[28085]: src/netdev.c:netdev_external_auth_cb() >> Failed to send External Auth: Invalid exchange(52) You're seeing the exact broken behavior I'm seeing. To summarize: - IWD issues CMD_CONNECT - Firmware/Kernel sends CMD_EXTERNAL_AUTH to iwd - IWD performs SAE handshake using CMD_FRAME successfully - IWD sends CMD_EXTERNAL_AUTH with a success status_code to kernel/firmware - Kernel/Firmware rplies with error 52, Invalid Exchange. >> Aug 24 11:18:06 pi5 kernel: ieee80211 phy0: >> brcmf_cfg80211_external_auth: auth_status iovar failed: ret=-52 >> Aug 24 11:18:46 pi5 connmand[635]: Interface wlan0 [ wifi ] state is ready >> Aug 24 11:18:46 pi5 connmand[635]: wlan0 {add} address >> 169.254.242.107/16 label wlan0 family 2 >> >> >> Need a log of some sort or is this adequate? No. We need someone who can tell us how this firmware is supposed to operate. Perhaps Arend can help? Regards, -Denis
On August 26, 2024 5:43:23 PM Denis Kenzior <denkenz@gmail.com> wrote: > Hi Keith, > >>> >>> iwctl looks like it is trying something: >>> [iwd]# station wlan0 connect deskSAE >>> Type the network passphrase for deskSAE psk. >>> Passphrase: ********* >>> [iwd]# >>> >>> but it never connects. I do notice that connman thinks it is up and >>> assigns a 169.254.x.x address >>> >>> Aug 24 11:18:06 pi5 iwd[28085]: src/wiphy.c:wiphy_select_akm() Network >>> is WPA3-Personal... >>> Aug 24 11:18:06 pi5 iwd[28085]: event: connect-info, FullMAC driver: >>> brcmfmac using SAE. Expect EXTERNAL_AUTH >>> Aug 24 11:18:06 pi5 iwd[28085]: >>> src/network.c:network_generate_sae_pt() Generating PT for Group 19 >>> Aug 24 11:18:06 pi5 iwd[28085]: >>> src/network.c:network_generate_sae_pt() Generating PT for Group 20 >>> Aug 24 11:18:06 pi5 iwd[28085]: src/wiphy.c:wiphy_select_akm() Network >>> is WPA3-Personal... >>> Aug 24 11:18:06 pi5 iwd[28085]: event: connect-info, FullMAC driver: >>> brcmfmac using SAE. Expect EXTERNAL_AUTH >>> Aug 24 11:18:06 pi5 iwd[28085]: src/netdev.c:netdev_cqm_rssi_update() >>> Aug 24 11:18:06 pi5 iwd[28085]: src/wiphy.c:wiphy_radio_work_insert() >>> Inserting work item 4 >>> Aug 24 11:18:06 pi5 iwd[28085]: src/wiphy.c:wiphy_radio_work_next() >>> Starting work item 4 >>> Aug 24 11:18:06 pi5 iwd[28085]: event: connect-info, ssid: deskSAE, >>> bss: d8:3a:dd:60:a3:0c, signal: -63, load: 0/255 >>> Aug 24 11:18:06 pi5 iwd[28085]: event: state, old: autoconnect_full, >>> new: connecting >>> Aug 24 11:18:06 pi5 iwd[28085]: src/scan.c:scan_periodic_stop() >>> Stopping periodic scan for wdev 1 >>> Aug 24 11:18:06 pi5 iwd[28085]: CMD_SET_CQM failed: Operation not supported >>> Aug 24 11:18:06 pi5 connmand[635]: Interface wlan0 [ wifi ] state is >>> configuration >>> Aug 24 11:18:06 pi5 iwd[28085]: src/netdev.c:netdev_unicast_notify() >>> Unicast notification External Auth(127) >>> Aug 24 11:18:06 pi5 iwd[28085]: event: connect-info, External Auth to >>> SSID: deskSAE, bssid: d8:3a:dd:60:a3:0c >>> Aug 24 11:18:06 pi5 iwd[28085]: >>> src/netdev.c:netdev_external_auth_sae_tx_authenticate() >>> Aug 24 11:18:06 pi5 iwd[28085]: src/netdev.c:netdev_mlme_notify() MLME >>> notification Frame TX Status(60) >>> Aug 24 11:18:06 pi5 iwd[28085]: >>> src/netdev.c:netdev_external_auth_sae_tx_authenticate() >>> Aug 24 11:18:06 pi5 iwd[28085]: src/netdev.c:netdev_unicast_notify() >>> Unicast notification Frame(59) >>> Aug 24 11:18:06 pi5 iwd[28085]: src/netdev.c:netdev_mlme_notify() MLME >>> notification Frame TX Status(60) >>> Aug 24 11:18:06 pi5 iwd[28085]: >>> src/netdev.c:netdev_external_auth_sae_tx_associate() >>> Aug 24 11:18:06 pi5 iwd[28085]: src/netdev.c:netdev_unicast_notify() >>> Unicast notification Frame(59) >>> Aug 24 11:18:06 pi5 iwd[28085]: src/netdev.c:netdev_external_auth_cb() >>> Failed to send External Auth: Invalid exchange(52) > > You're seeing the exact broken behavior I'm seeing. To summarize: > > - IWD issues CMD_CONNECT > - Firmware/Kernel sends CMD_EXTERNAL_AUTH to iwd > - IWD performs SAE handshake using CMD_FRAME successfully > - IWD sends CMD_EXTERNAL_AUTH with a success status_code to kernel/firmware > - Kernel/Firmware rplies with error 52, Invalid Exchange. > >>> Aug 24 11:18:06 pi5 kernel: ieee80211 phy0: >>> brcmf_cfg80211_external_auth: auth_status iovar failed: ret=-52 >>> Aug 24 11:18:46 pi5 connmand[635]: Interface wlan0 [ wifi ] state is ready >>> Aug 24 11:18:46 pi5 connmand[635]: wlan0 {add} address >>> 169.254.242.107/16 label wlan0 family 2 >>> >>> >>> Need a log of some sort or is this adequate? > > No. We need someone who can tell us how this firmware is supposed to operate. > Perhaps Arend can help? Hi Denis, Perhaps I can. I am working on porting/implementing this for upstream linux. I guess this is running an Infineon downstream kernel, right? If brcmfmac is compiled with CONFIG_BRCMDBG you can load the driver with debug module param, ie.: # modprobe brcmfmac debug=0x5416 That will log some more details. Error -52 is generic code that something went wrong in communication with firmware. The debug level above will among other things show the actual firmware error code. Another interesting thing shown are the firmware capabilities which can also be examined through debugfs. Regards, Arend
On Mon, Aug 26, 2024 at 11:54 AM Arend Van Spriel <arend.vanspriel@broadcom.com> wrote: > > On August 26, 2024 5:43:23 PM Denis Kenzior <denkenz@gmail.com> wrote: > > > Hi Keith, > > > >>> > >>> iwctl looks like it is trying something: > >>> [iwd]# station wlan0 connect deskSAE > >>> Type the network passphrase for deskSAE psk. > >>> Passphrase: ********* > >>> [iwd]# > >>> > >>> but it never connects. I do notice that connman thinks it is up and > >>> assigns a 169.254.x.x address > >>> > >>> Aug 24 11:18:06 pi5 iwd[28085]: src/wiphy.c:wiphy_select_akm() Network > >>> is WPA3-Personal... > >>> Aug 24 11:18:06 pi5 iwd[28085]: event: connect-info, FullMAC driver: > >>> brcmfmac using SAE. Expect EXTERNAL_AUTH > >>> Aug 24 11:18:06 pi5 iwd[28085]: > >>> src/network.c:network_generate_sae_pt() Generating PT for Group 19 > >>> Aug 24 11:18:06 pi5 iwd[28085]: > >>> src/network.c:network_generate_sae_pt() Generating PT for Group 20 > >>> Aug 24 11:18:06 pi5 iwd[28085]: src/wiphy.c:wiphy_select_akm() Network > >>> is WPA3-Personal... > >>> Aug 24 11:18:06 pi5 iwd[28085]: event: connect-info, FullMAC driver: > >>> brcmfmac using SAE. Expect EXTERNAL_AUTH > >>> Aug 24 11:18:06 pi5 iwd[28085]: src/netdev.c:netdev_cqm_rssi_update() > >>> Aug 24 11:18:06 pi5 iwd[28085]: src/wiphy.c:wiphy_radio_work_insert() > >>> Inserting work item 4 > >>> Aug 24 11:18:06 pi5 iwd[28085]: src/wiphy.c:wiphy_radio_work_next() > >>> Starting work item 4 > >>> Aug 24 11:18:06 pi5 iwd[28085]: event: connect-info, ssid: deskSAE, > >>> bss: d8:3a:dd:60:a3:0c, signal: -63, load: 0/255 > >>> Aug 24 11:18:06 pi5 iwd[28085]: event: state, old: autoconnect_full, > >>> new: connecting > >>> Aug 24 11:18:06 pi5 iwd[28085]: src/scan.c:scan_periodic_stop() > >>> Stopping periodic scan for wdev 1 > >>> Aug 24 11:18:06 pi5 iwd[28085]: CMD_SET_CQM failed: Operation not supported > >>> Aug 24 11:18:06 pi5 connmand[635]: Interface wlan0 [ wifi ] state is > >>> configuration > >>> Aug 24 11:18:06 pi5 iwd[28085]: src/netdev.c:netdev_unicast_notify() > >>> Unicast notification External Auth(127) > >>> Aug 24 11:18:06 pi5 iwd[28085]: event: connect-info, External Auth to > >>> SSID: deskSAE, bssid: d8:3a:dd:60:a3:0c > >>> Aug 24 11:18:06 pi5 iwd[28085]: > >>> src/netdev.c:netdev_external_auth_sae_tx_authenticate() > >>> Aug 24 11:18:06 pi5 iwd[28085]: src/netdev.c:netdev_mlme_notify() MLME > >>> notification Frame TX Status(60) > >>> Aug 24 11:18:06 pi5 iwd[28085]: > >>> src/netdev.c:netdev_external_auth_sae_tx_authenticate() > >>> Aug 24 11:18:06 pi5 iwd[28085]: src/netdev.c:netdev_unicast_notify() > >>> Unicast notification Frame(59) > >>> Aug 24 11:18:06 pi5 iwd[28085]: src/netdev.c:netdev_mlme_notify() MLME > >>> notification Frame TX Status(60) > >>> Aug 24 11:18:06 pi5 iwd[28085]: > >>> src/netdev.c:netdev_external_auth_sae_tx_associate() > >>> Aug 24 11:18:06 pi5 iwd[28085]: src/netdev.c:netdev_unicast_notify() > >>> Unicast notification Frame(59) > >>> Aug 24 11:18:06 pi5 iwd[28085]: src/netdev.c:netdev_external_auth_cb() > >>> Failed to send External Auth: Invalid exchange(52) > > > > You're seeing the exact broken behavior I'm seeing. To summarize: > > > > - IWD issues CMD_CONNECT > > - Firmware/Kernel sends CMD_EXTERNAL_AUTH to iwd > > - IWD performs SAE handshake using CMD_FRAME successfully > > - IWD sends CMD_EXTERNAL_AUTH with a success status_code to kernel/firmware > > - Kernel/Firmware rplies with error 52, Invalid Exchange. > > > >>> Aug 24 11:18:06 pi5 kernel: ieee80211 phy0: > >>> brcmf_cfg80211_external_auth: auth_status iovar failed: ret=-52 > >>> Aug 24 11:18:46 pi5 connmand[635]: Interface wlan0 [ wifi ] state is ready > >>> Aug 24 11:18:46 pi5 connmand[635]: wlan0 {add} address > >>> 169.254.242.107/16 label wlan0 family 2 > >>> > >>> > >>> Need a log of some sort or is this adequate? > > > > No. We need someone who can tell us how this firmware is supposed to operate. > > Perhaps Arend can help? > > Hi Denis, > > Perhaps I can. I am working on porting/implementing this for upstream > linux. I guess this is running an Infineon downstream kernel, right? If > brcmfmac is compiled with CONFIG_BRCMDBG you can load the driver with debug > module param, ie.: > > # modprobe brcmfmac debug=0x5416 > > That will log some more details. Error -52 is generic code that something > went wrong in communication with firmware. The debug level above will among > other things show the actual firmware error code. Another interesting thing > shown are the firmware capabilities which can also be examined through debugfs. > > Regards, > Arend > > It appears that this is do-able on the 64 bit RPiOS installed on my Pi5: I loaded the debug parameters and used the latest iwd 2.20 with the 2 SAE patches applied and now get this: first with iwd running: root@pi5(rw):~# nmcli dev wifi list IN-USE BSSID SSID MODE CHAN RATE SIGNAL BARS SECURITY 00:01:02:00:00:03 deskSAE Infra 2 65 Mbit/s 79 ▂▄▆_ WPA2 root@pi5(rw):~# nmcli --ask dev wifi connect deskSAE Password: ••••••••• Error: Timeout 90 sec expired. log with iwd: Sep 02 13:56:18 pi5 NetworkManager[37130]: <info> [1725303378.8140] device (wlan0): Activation: starting connection 'deskSAE' (306466e3-8c0c-4925-920f-3d5d1d24189f) Sep 02 13:56:18 pi5 NetworkManager[37130]: <error> [1725303378.8160] audit: failed to open auditd socket: Protocol not supported Sep 02 13:56:18 pi5 NetworkManager[37130]: <info> [1725303378.8161] audit: op="connection-add-activate" uuid="306466e3-8c0c-4925-920f-3d5d1d24189f" name="deskSAE" pid=37812 uid=0 result="success" Sep 02 13:56:18 pi5 NetworkManager[37130]: <info> [1725303378.8167] device (wlan0): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'managed') Sep 02 13:56:18 pi5 NetworkManager[37130]: <info> [1725303378.8170] device (wlan0): state change: prepare -> config (reason 'none', sys-iface-state: 'managed') Sep 02 13:56:18 pi5 iwd[37306]: event: connect-info, FullMAC driver: brcmfmac using SAE. Expect EXTERNAL_AUTH Sep 02 13:56:18 pi5 iwd[37306]: event: connect-info, FullMAC driver: brcmfmac using SAE. Expect EXTERNAL_AUTH Sep 02 13:56:18 pi5 iwd[37306]: event: connect-info, ssid: deskSAE, bss: d8:3a:dd:60:a3:0c, signal: -55, load: 0/255 Sep 02 13:56:18 pi5 iwd[37306]: event: state, old: autoconnect_full, new: connecting Sep 02 13:56:18 pi5 NetworkManager[37130]: <info> [1725303378.8201] device (wlan0): new IWD device state is connecting Sep 02 13:56:18 pi5 iwd[37306]: CMD_SET_CQM failed: Operation not supported Sep 02 13:56:18 pi5 kernel: brcmfmac: _brcmf_set_multicast_list Enter, bsscfgidx=0 Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_fil_iovar_data_set ifidx=0, name=mcast_list, len=16 Sep 02 13:56:18 pi5 kernel: brcmutil: data Sep 02 13:56:18 pi5 kernel: 00000000: 02 00 00 00 33 33 00 00 00 01 01 00 5e 00 00 01 ....33......^... Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_kso_control Enter: on=1 Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_cfg80211_connect Enter Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on rxctl frame, got 43 expected 43 Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_fil_iovar_data_set ifidx=0, name=allmulti, len=4 Sep 02 13:56:18 pi5 kernel: brcmutil: data Sep 02 13:56:18 pi5 kernel: 00000000: 00 00 00 00 .... Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on rxctl frame, got 29 expected 29 Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_fil_iovar_data_set ifidx=0, name=wpaie, len=22 Sep 02 13:56:18 pi5 kernel: brcmutil: data Sep 02 13:56:18 pi5 kernel: 00000000: 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 0............... Sep 02 13:56:18 pi5 kernel: 00000010: 00 0f ac 08 80 00 ...... Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on rxctl frame, got 44 expected 44 Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_vif_set_mgmt_ie bsscfgidx 0, pktflag : 0x20 Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_fil_cmd_int_set ifidx=0, cmd=10, value=0 Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_cfg80211_connect Applied Vndr IEs for Assoc request Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_cfg80211_connect ie (00000000da8c1efd), ie_len (34) Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on rxctl frame, got 20 expected 20 Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_fil_iovar_data_set ifidx=0, name=arp_ol, len=4 Sep 02 13:56:18 pi5 kernel: brcmutil: data Sep 02 13:56:18 pi5 kernel: 00000000: 09 00 00 00 .... Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on rxctl frame, got 27 expected 27 Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_fil_bsscfg_data_set ifidx=0, bsscfgidx=0, name=wpa_auth, len=4 Sep 02 13:56:18 pi5 kernel: brcmutil: data Sep 02 13:56:18 pi5 kernel: 00000000: 00 00 04 00 .... Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on rxctl frame, got 29 expected 29 Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_fil_bsscfg_data_set ifidx=0, bsscfgidx=0, name=auth, len=4 Sep 02 13:56:18 pi5 kernel: brcmutil: data Sep 02 13:56:18 pi5 kernel: 00000000: 03 00 00 00 .... Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on rxctl frame, got 25 expected 25 Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_fil_bsscfg_data_set ifidx=0, bsscfgidx=0, name=wsec, len=4 Sep 02 13:56:18 pi5 kernel: brcmutil: data Sep 02 13:56:18 pi5 kernel: 00000000: 04 00 00 00 .... Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on rxctl frame, got 25 expected 25 Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on rxctl frame, got 29 expected 29 Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_fil_bsscfg_data_get ifidx=0, bsscfgidx=0, name=wpa_auth, len=4, err=0 Sep 02 13:56:18 pi5 kernel: brcmutil: data Sep 02 13:56:18 pi5 kernel: 00000000: 00 00 04 00 .... Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_fil_bsscfg_data_set ifidx=0, bsscfgidx=0, name=mfp, len=4 Sep 02 13:56:18 pi5 kernel: brcmutil: data Sep 02 13:56:18 pi5 kernel: 00000000: 01 00 00 00 .... Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on rxctl frame, got 24 expected 24 Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_fil_bsscfg_data_set ifidx=0, bsscfgidx=0, name=wpa_auth, len=4 Sep 02 13:56:18 pi5 kernel: brcmutil: data Sep 02 13:56:18 pi5 kernel: 00000000: 00 00 04 00 .... Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on rxctl frame, got 29 expected 29 Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_fil_iovar_data_set ifidx=0, name=arpoe, len=4 Sep 02 13:56:18 pi5 kernel: brcmutil: data Sep 02 13:56:18 pi5 kernel: 00000000: 01 00 00 00 .... Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on rxctl frame, got 26 expected 26 Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_configure_arp_nd_offload successfully configured (1) ARP offload to 0x9 Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_fil_cmd_int_set ifidx=0, cmd=205, value=0 Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on rxctl frame, got 20 expected 20 Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_fil_iovar_data_set ifidx=0, name=join_pref, len=8 Sep 02 13:56:18 pi5 kernel: brcmutil: data Sep 02 13:56:18 pi5 kernel: 00000000: 04 02 08 01 01 02 00 00 ........ Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on rxctl frame, got 34 expected 34 Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_fil_iovar_data_set ifidx=0, name=ndoe, len=4 Sep 02 13:56:18 pi5 kernel: brcmutil: data Sep 02 13:56:18 pi5 kernel: 00000000: 01 00 00 00 .... Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on rxctl frame, got 25 expected 25 Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_configure_arp_nd_offload successfully configured (1) ND offload to 0x9 Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_fil_bsscfg_data_set ifidx=0, bsscfgidx=0, name=join, len=70 Sep 02 13:56:18 pi5 kernel: brcmutil: data Sep 02 13:56:18 pi5 kernel: 00000000: 07 00 00 00 64 65 73 6b 53 41 45 00 00 00 00 00 ....deskSAE..... Sep 02 13:56:18 pi5 kernel: 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Sep 02 13:56:18 pi5 kernel: 00000020: 00 00 00 00 ff 00 00 00 10 00 00 00 40 01 00 00 ............@... Sep 02 13:56:18 pi5 kernel: 00000030: 90 01 00 00 ff ff ff ff d8 3a dd 60 a3 0c 00 00 .........:.`.... Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on rxctl frame, got 91 expected 91 Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_cfg80211_connect Exit Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_kso_control Enter: on=0 Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_kso_control Enter: on=1 Sep 02 13:56:18 pi5 iwd[37306]: event: connect-info, External Auth to SSID: deskSAE, bssid: d8:3a:dd:60:a3:0c Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_rx_event Enter: mmc1:0001:1: rxp=00000000fdc96f1d Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_fweh_event_worker event EXT_AUTH_REQ (187) ifidx 0 bsscfg 0 addr a4:c8:5c:11:2f:b9 Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_fweh_event_worker version 2 flags 0 status 0 reason 0 Sep 02 13:56:18 pi5 kernel: brcmutil: event payload, len=60 Sep 02 13:56:18 pi5 kernel: 00000000: 00 00 d8 3a dd 60 a3 0c 07 00 00 00 64 65 73 6b ...:.`......desk Sep 02 13:56:18 pi5 kernel: 00000010: 53 41 45 00 00 00 00 00 00 00 00 00 24 00 00 00 SAE.........$... Sep 02 13:56:18 pi5 kernel: 00000020: 00 00 00 00 00 00 00 00 e0 86 19 00 7a 35 18 00 ............z5.. Sep 02 13:56:18 pi5 kernel: 00000030: e0 86 19 00 7a 35 18 00 03 00 00 00 ....z5...... Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_notify_ext_auth_request Enter: event EXT_AUTH_REQ (187) received Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_cfg80211_mgmt_tx Enter Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on rxctl frame, got 20 expected 20 Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_fil_cmd_int_get ifidx=0, cmd=29, value=1 Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_cfg80211_mgmt_tx Auth frame, cookie=0, fc=00b0, len=104, channel=12626 Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_fil_bsscfg_data_set ifidx=0, bsscfgidx=0, name=mgmt_frame, len=136 Sep 02 13:56:18 pi5 kernel: brcmutil: data Sep 02 13:56:18 pi5 kernel: 00000000: 00 00 00 00 a0 0f 00 00 68 00 b0 00 52 31 d8 3a ........h...R1.: Sep 02 13:56:18 pi5 kernel: 00000010: dd 60 a3 0c d8 3a dd 60 a3 0c 00 00 00 00 00 00 .`...:.`........ Sep 02 13:56:18 pi5 kernel: 00000020: 03 00 01 00 00 00 13 00 8c 8c d6 84 5b 94 b5 0e ............[... Sep 02 13:56:18 pi5 kernel: 00000030: 51 2b 0d 9d a0 78 14 bb 93 25 de 7e c3 69 32 0e Q+...x...%.~.i2. Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on rxctl frame, got 163 expected 163 Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_rx_event Enter: mmc1:0001:1: rxp=00000000cc427a80 Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_fweh_event_worker event MGMT_FRAME_TXSTATUS (189) ifidx 0 bsscfg 0 addr a1:e5:f5:86:a2:ba Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_fweh_event_worker version 2 flags 0 status 0 reason 0 Sep 02 13:56:18 pi5 kernel: brcmutil: event payload, len=4 Sep 02 13:56:18 pi5 kernel: 00000000: 00 00 00 00 .... Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_notify_mgmt_tx_status Enter: event MGMT_FRAME_TXSTATUS (189), status=0 Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_cfg80211_mgmt_tx TX Auth frame operation is success Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_rx_event Enter: mmc1:0001:1: rxp=00000000cc427a80 Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_fweh_event_worker event EXT_AUTH_FRAME_RX (188) ifidx 0 bsscfg 0 addr d8:3a:dd:60:a3:0c Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_fweh_event_worker version 2 flags 0 status 0 reason 0 Sep 02 13:56:18 pi5 kernel: brcmutil: event payload, len=144 Sep 02 13:56:18 pi5 kernel: 00000000: 00 01 10 01 ff ff ff c9 00 01 46 35 00 01 00 02 ..........F5.... Sep 02 13:56:18 pi5 kernel: 00000010: b0 00 3a 01 d8 3a dd d2 ae 3c d8 3a dd 60 a3 0c ..:..:...<.:.`.. Sep 02 13:56:18 pi5 kernel: 00000020: d8 3a dd 60 a3 0c 20 88 03 00 01 00 00 00 13 00 .:.`.. ......... Sep 02 13:56:18 pi5 kernel: 00000030: d1 ae 95 46 66 ea 04 6f 59 0a 2c 5e d4 e9 d6 2e ...Ff..oY.,^.... Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_notify_auth_frame_rx Enter: event EXT_AUTH_FRAME_RX (188) received Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on rxctl frame, got 22 expected 22 Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_fil_cmd_data Firmware error: BCME_NOTASSOCIATED (-17) Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_fil_cmd_data_get ifidx=0, cmd=23, len=6, err=-52 Sep 02 13:56:18 pi5 kernel: brcmutil: data Sep 02 13:56:18 pi5 kernel: 00000000: 00 00 00 00 00 00 ...... Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_kso_control Enter: on=0 Sep 02 13:57:48 pi5 polkitd[551]: Unregistered Authentication Agent for unix-process:37812:208342 (system bus name :1.1193, object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale en_US.UTF-8) (disconnected from bus) Now trial with wpa_supplicant: root@pi5(rw):~# nmcli --ask dev wifi connect deskSAE Password: ••••••••• Device 'wlan0' successfully activated with '87cd00bc-9664-4827-8a00-d98bcb7b9877'. Log with wpa_supplicant and a connect: Sep 02 14:08:10 pi5 kernel: brcmfmac: brcmf_cfg80211_escan_handler ESCAN Partial result Sep 02 14:08:10 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter Sep 02 14:08:10 pi5 kernel: brcmfmac: brcmf_rx_event Enter: mmc1:0001:1: rxp=0000000039214d1f Sep 02 14:08:10 pi5 kernel: brcmfmac: brcmf_fweh_event_worker event ESCAN_RESULT (69) ifidx 0 bsscfg 0 addr d8:3a:dd:60:a3:0c Sep 02 14:08:10 pi5 kernel: brcmfmac: brcmf_fweh_event_worker version 2 flags 0 status 8 reason 0 Sep 02 14:08:10 pi5 kernel: brcmutil: event payload, len=208 Sep 02 14:08:10 pi5 kernel: 00000000: d0 00 00 00 6d 00 00 00 34 12 01 00 6d 00 00 00 ....m...4...m... Sep 02 14:08:10 pi5 kernel: 00000010: c4 00 00 00 d8 3a dd 60 a3 0c 64 00 11 04 07 64 .....:.`..d....d Sep 02 14:08:10 pi5 kernel: 00000020: 65 73 6b 53 41 45 00 00 00 00 00 00 00 00 00 00 eskSAE.......... Sep 02 14:08:10 pi5 kernel: 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Sep 02 14:08:10 pi5 kernel: brcmfmac: brcmf_cfg80211_escan_handler ESCAN Partial result ... this was what I think was the snippet where it connected with the SSID after NetworkManager was restarted: Sep 02 14:17:14 pi5 wpa_supplicant[43594]: wlan0: Trying to associate with SSID 'deskSAE' Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_cfg80211_connect Enter Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_fil_iovar_data_set ifidx=0, name=wpaie, len=44 Sep 02 14:17:14 pi5 kernel: brcmutil: data Sep 02 14:17:14 pi5 kernel: 00000000: 30 2a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 0*.............. Sep 02 14:17:14 pi5 kernel: 00000010: 00 0f ac 08 c0 00 01 00 c9 b9 cd 8f 08 b5 a5 a0 ................ Sep 02 14:17:14 pi5 kernel: 00000020: b2 c0 3a f3 1e ef d4 12 00 0f ac 06 ..:......... Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on rxctl frame, got 66 expected 66 Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_vif_set_mgmt_ie bsscfgidx 0, pktflag : 0x20 Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_cfg80211_connect Applied Vndr IEs for Assoc request Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_cfg80211_connect ie (00000000c11a8d64), ie_len (79) Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_fil_bsscfg_data_set ifidx=0, bsscfgidx=0, name=wpa_auth, len=4 Sep 02 14:17:14 pi5 kernel: brcmutil: data Sep 02 14:17:14 pi5 kernel: 00000000: 00 00 04 00 .... Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on rxctl frame, got 29 expected 29 Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_fil_bsscfg_data_set ifidx=0, bsscfgidx=0, name=auth, len=4 Sep 02 14:17:14 pi5 kernel: brcmutil: data Sep 02 14:17:14 pi5 kernel: 00000000: 00 00 00 00 .... Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on rxctl frame, got 25 expected 25 Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_fil_bsscfg_data_set ifidx=0, bsscfgidx=0, name=wsec, len=4 Sep 02 14:17:14 pi5 kernel: brcmutil: data Sep 02 14:17:14 pi5 kernel: 00000000: 04 00 00 00 .... Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on rxctl frame, got 25 expected 25 Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on rxctl frame, got 29 expected 29 Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_fil_bsscfg_data_get ifidx=0, bsscfgidx=0, name=wpa_auth, len=4, err=0 Sep 02 14:17:14 pi5 kernel: brcmutil: data Sep 02 14:17:14 pi5 kernel: 00000000: 00 00 04 00 .... Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_fil_bsscfg_data_set ifidx=0, bsscfgidx=0, name=mfp, len=4 Sep 02 14:17:14 pi5 kernel: brcmutil: data Sep 02 14:17:14 pi5 kernel: 00000000: 02 00 00 00 .... Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on rxctl frame, got 24 expected 24 Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_fil_bsscfg_data_set ifidx=0, bsscfgidx=0, name=wpa_auth, len=4 Sep 02 14:17:14 pi5 kernel: brcmutil: data Sep 02 14:17:14 pi5 kernel: 00000000: 00 00 04 00 .... Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on rxctl frame, got 29 expected 29 Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_fil_cmd_int_set ifidx=0, cmd=205, value=0 Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on rxctl frame, got 20 expected 20 Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_fil_iovar_data_set ifidx=0, name=join_pref, len=8 Sep 02 14:17:14 pi5 kernel: brcmutil: data Sep 02 14:17:14 pi5 kernel: 00000000: 04 02 08 01 01 02 00 00 ........ Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on rxctl frame, got 34 expected 34 Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_fil_bsscfg_data_set ifidx=0, bsscfgidx=0, name=join, len=70 Sep 02 14:17:14 pi5 kernel: brcmutil: data Sep 02 14:17:14 pi5 kernel: 00000000: 07 00 00 00 64 65 73 6b 53 41 45 00 00 00 00 00 ....deskSAE..... Sep 02 14:17:14 pi5 kernel: 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Sep 02 14:17:14 pi5 kernel: 00000020: 00 00 00 00 ff 00 00 00 10 00 00 00 40 01 00 00 ............@... Sep 02 14:17:14 pi5 kernel: 00000030: 90 01 00 00 ff ff ff ff d8 3a dd 60 a3 0c 00 00 .........:.`.... Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on rxctl frame, got 91 expected 91 Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_cfg80211_connect Exit Sep 02 14:17:14 pi5 NetworkManager[57939]: <info> [1725304634.0622] device (wlan0): supplicant interface state: scanning -> associating Sep 02 14:17:14 pi5 NetworkManager[57939]: <info> [1725304634.0622] device (p2p-dev-wlan0): supplicant management interface state: scanning -> associating Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_kso_control Enter: on=0 Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_kso_control Enter: on=1 Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_rx_event Enter: mmc1:0001:1: rxp=0000000062bff4bd Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_fweh_event_worker event LINK (16) ifidx 0 bsscfg 0 addr d8:3a:dd:60:a3:0c Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_fweh_event_worker version 2 flags 1 status 0 reason 0 Sep 02 14:17:14 pi5 kernel: brcmutil: event payload, len=22 Sep 02 14:17:14 pi5 kernel: 00000000: 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 0............... Sep 02 14:17:14 pi5 kernel: 00000010: 00 0f ac 08 c0 00 ...... Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_kso_control Enter: on=0 Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_kso_control Enter: on=1 Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_rx_event Enter: mmc1:0001:1: rxp=00000000aafdfb7d Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_fweh_event_worker event SET_SSID (0) ifidx 0 bsscfg 0 addr d8:3a:dd:60:a3:0c Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_fweh_event_worker version 2 flags 0 status 0 reason 0 Sep 02 14:17:14 pi5 kernel: brcmutil: event payload, len=7 Sep 02 14:17:14 pi5 kernel: 00000000: 64 65 73 6b 53 41 45 deskSAE Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_bss_connect_done Enter Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter Sep 02 14:17:14 pi5 wpa_supplicant[43594]: wlan0: Associated with d8:3a:dd:60:a3:0c Sep 02 14:17:14 pi5 wpa_supplicant[43594]: wlan0: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0 Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on rxctl frame, got 539 expected 539 Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_fil_iovar_data_get ifidx=0, name=assoc_info, len=512, err=0 Sep 02 14:17:14 pi5 kernel: brcmutil: data Sep 02 14:17:14 pi5 kernel: 00000000: 66 00 00 00 20 00 00 00 00 00 00 00 31 04 0a 00 f... .......1... Sep 02 14:17:14 pi5 kernel: 00000010: 00 00 00 cc 00 00 11 04 00 00 01 c0 0c 64 00 11 .............d.. Sep 02 14:17:14 pi5 kernel: 00000020: 04 07 64 65 73 6b 53 41 45 00 00 00 00 00 00 00 ..deskSAE....... Sep 02 14:17:14 pi5 kernel: 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on rxctl frame, got 542 expected 542 Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_fil_iovar_data_get ifidx=0, name=assoc_req_ies, len=512, err=0 Sep 02 14:17:14 pi5 kernel: brcmutil: data Sep 02 14:17:14 pi5 kernel: 00000000: 00 07 64 65 73 6b 53 41 45 01 08 82 84 8b 96 24 ..deskSAE......$ Sep 02 14:17:14 pi5 kernel: 00000010: 30 48 6c 32 04 0c 12 18 60 21 02 03 14 24 02 01 0Hl2....`!...$.. Sep 02 14:17:14 pi5 kernel: 00000020: 0b 30 2a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 .0*............. Sep 02 14:17:14 pi5 kernel: 00000030: 00 00 0f ac 08 c0 00 01 00 c9 b9 cd 8f 08 b5 a5 ................ Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on rxctl frame, got 543 expected 543 Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_fil_iovar_data_get ifidx=0, name=assoc_resp_ies, len=512, err=0 Sep 02 14:17:14 pi5 kernel: brcmutil: data Sep 02 14:17:14 pi5 kernel: 00000000: 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c .........$2.0H`l Sep 02 14:17:14 pi5 kernel: 00000010: 7f 08 04 00 00 00 00 00 00 40 82 84 8b 96 24 30 .........@....$0 Sep 02 14:17:14 pi5 kernel: 00000020: 48 6c 32 04 0c 12 18 60 21 02 03 14 24 02 01 0b Hl2....`!...$... Sep 02 14:17:14 pi5 kernel: 00000030: 30 2a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 0*.............. Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on rxctl frame, got 43 expected 43 Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_fil_iovar_data_get ifidx=0, name=wme_ac_sta, len=16, err=0 Sep 02 14:17:14 pi5 kernel: brcmutil: data Sep 02 14:17:14 pi5 kernel: 00000000: 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 ....'...BC^.b2/. Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_update_bss_info Enter Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on rxctl frame, got 2064 expected 2064 Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_fil_cmd_data_get ifidx=0, cmd=136, len=2048, err=0 Sep 02 14:17:14 pi5 kernel: brcmutil: data Sep 02 14:17:14 pi5 kernel: 00000000: cd 00 00 00 6d 00 00 00 cc 00 00 00 d8 3a dd 60 ....m........:.` Sep 02 14:17:14 pi5 kernel: 00000010: a3 0c 64 00 11 04 07 64 65 73 6b 53 41 45 00 00 ..d....deskSAE.. Sep 02 14:17:14 pi5 kernel: 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Sep 02 14:17:14 pi5 kernel: 00000030: 00 00 00 00 00 00 00 00 0c 00 00 00 82 84 8b 0c ................ Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_update_bss_info Exit Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_bss_connect_done Exit Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_net_setcarrier Enter, bsscfgidx=0 carrier=1 Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_txflowblock_if enter: bsscfgidx=0 stop=0x4 reason=4 state=0 Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_txdata Enter: pkt: data 00000000e74f6ccc len 161 Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_txdata deferring pktq len 0 Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_sendfromq Enter Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_txpkt Enter Sep 02 14:17:14 pi5 wpa_supplicant[43594]: wlan0: WPA: Key negotiation completed with d8:3a:dd:60:a3:0c [PTK=CCMP GTK=CCMP] Sep 02 14:17:14 pi5 wpa_supplicant[43594]: wlan0: CTRL-EVENT-CONNECTED - Connection to d8:3a:dd:60:a3:0c completed [id=0 id_str=] Sep 02 14:17:14 pi5 NetworkManager[57939]: <info> [1725304634.2164] device (wlan0): supplicant interface state: associating -> completed Sep 02 14:17:14 pi5 NetworkManager[57939]: <info> [1725304634.2165] device (wlan0): Activation: (wifi) Stage 2 of 5 (Device Configure) successful. Connected to wireless network "deskSAE" Sep 02 14:17:14 pi5 NetworkManager[57939]: <info> [1725304634.2166] device (p2p-dev-wlan0): supplicant management interface state: associating -> completed Sep 02 14:17:14 pi5 NetworkManager[57939]: <info> [1725304634.2167] device (wlan0): state change: config -> ip-config (reason 'none', sys-iface-state: 'managed') Sep 02 14:17:14 pi5 NetworkManager[57939]: <info> [1725304634.2170] dhcp4 (wlan0): activation: beginning transaction (timeout in 45 seconds)
On Mon, Sep 2, 2024 at 2:32 PM KeithG <ys3al35l@gmail.com> wrote: > > On Mon, Aug 26, 2024 at 11:54 AM Arend Van Spriel > <arend.vanspriel@broadcom.com> wrote: > > > > On August 26, 2024 5:43:23 PM Denis Kenzior <denkenz@gmail.com> wrote: > > > > > Hi Keith, > > > > > >>> > > >>> iwctl looks like it is trying something: > > >>> [iwd]# station wlan0 connect deskSAE > > >>> Type the network passphrase for deskSAE psk. > > >>> Passphrase: ********* > > >>> [iwd]# > > >>> > > >>> but it never connects. I do notice that connman thinks it is up and > > >>> assigns a 169.254.x.x address > > >>> > > >>> Aug 24 11:18:06 pi5 iwd[28085]: src/wiphy.c:wiphy_select_akm() Network > > >>> is WPA3-Personal... > > >>> Aug 24 11:18:06 pi5 iwd[28085]: event: connect-info, FullMAC driver: > > >>> brcmfmac using SAE. Expect EXTERNAL_AUTH > > >>> Aug 24 11:18:06 pi5 iwd[28085]: > > >>> src/network.c:network_generate_sae_pt() Generating PT for Group 19 > > >>> Aug 24 11:18:06 pi5 iwd[28085]: > > >>> src/network.c:network_generate_sae_pt() Generating PT for Group 20 > > >>> Aug 24 11:18:06 pi5 iwd[28085]: src/wiphy.c:wiphy_select_akm() Network > > >>> is WPA3-Personal... > > >>> Aug 24 11:18:06 pi5 iwd[28085]: event: connect-info, FullMAC driver: > > >>> brcmfmac using SAE. Expect EXTERNAL_AUTH > > >>> Aug 24 11:18:06 pi5 iwd[28085]: src/netdev.c:netdev_cqm_rssi_update() > > >>> Aug 24 11:18:06 pi5 iwd[28085]: src/wiphy.c:wiphy_radio_work_insert() > > >>> Inserting work item 4 > > >>> Aug 24 11:18:06 pi5 iwd[28085]: src/wiphy.c:wiphy_radio_work_next() > > >>> Starting work item 4 > > >>> Aug 24 11:18:06 pi5 iwd[28085]: event: connect-info, ssid: deskSAE, > > >>> bss: d8:3a:dd:60:a3:0c, signal: -63, load: 0/255 > > >>> Aug 24 11:18:06 pi5 iwd[28085]: event: state, old: autoconnect_full, > > >>> new: connecting > > >>> Aug 24 11:18:06 pi5 iwd[28085]: src/scan.c:scan_periodic_stop() > > >>> Stopping periodic scan for wdev 1 > > >>> Aug 24 11:18:06 pi5 iwd[28085]: CMD_SET_CQM failed: Operation not supported > > >>> Aug 24 11:18:06 pi5 connmand[635]: Interface wlan0 [ wifi ] state is > > >>> configuration > > >>> Aug 24 11:18:06 pi5 iwd[28085]: src/netdev.c:netdev_unicast_notify() > > >>> Unicast notification External Auth(127) > > >>> Aug 24 11:18:06 pi5 iwd[28085]: event: connect-info, External Auth to > > >>> SSID: deskSAE, bssid: d8:3a:dd:60:a3:0c > > >>> Aug 24 11:18:06 pi5 iwd[28085]: > > >>> src/netdev.c:netdev_external_auth_sae_tx_authenticate() > > >>> Aug 24 11:18:06 pi5 iwd[28085]: src/netdev.c:netdev_mlme_notify() MLME > > >>> notification Frame TX Status(60) > > >>> Aug 24 11:18:06 pi5 iwd[28085]: > > >>> src/netdev.c:netdev_external_auth_sae_tx_authenticate() > > >>> Aug 24 11:18:06 pi5 iwd[28085]: src/netdev.c:netdev_unicast_notify() > > >>> Unicast notification Frame(59) > > >>> Aug 24 11:18:06 pi5 iwd[28085]: src/netdev.c:netdev_mlme_notify() MLME > > >>> notification Frame TX Status(60) > > >>> Aug 24 11:18:06 pi5 iwd[28085]: > > >>> src/netdev.c:netdev_external_auth_sae_tx_associate() > > >>> Aug 24 11:18:06 pi5 iwd[28085]: src/netdev.c:netdev_unicast_notify() > > >>> Unicast notification Frame(59) > > >>> Aug 24 11:18:06 pi5 iwd[28085]: src/netdev.c:netdev_external_auth_cb() > > >>> Failed to send External Auth: Invalid exchange(52) > > > > > > You're seeing the exact broken behavior I'm seeing. To summarize: > > > > > > - IWD issues CMD_CONNECT > > > - Firmware/Kernel sends CMD_EXTERNAL_AUTH to iwd > > > - IWD performs SAE handshake using CMD_FRAME successfully > > > - IWD sends CMD_EXTERNAL_AUTH with a success status_code to kernel/firmware > > > - Kernel/Firmware rplies with error 52, Invalid Exchange. > > > > > >>> Aug 24 11:18:06 pi5 kernel: ieee80211 phy0: > > >>> brcmf_cfg80211_external_auth: auth_status iovar failed: ret=-52 > > >>> Aug 24 11:18:46 pi5 connmand[635]: Interface wlan0 [ wifi ] state is ready > > >>> Aug 24 11:18:46 pi5 connmand[635]: wlan0 {add} address > > >>> 169.254.242.107/16 label wlan0 family 2 > > >>> > > >>> > > >>> Need a log of some sort or is this adequate? > > > > > > No. We need someone who can tell us how this firmware is supposed to operate. > > > Perhaps Arend can help? > > > > Hi Denis, > > > > Perhaps I can. I am working on porting/implementing this for upstream > > linux. I guess this is running an Infineon downstream kernel, right? If > > brcmfmac is compiled with CONFIG_BRCMDBG you can load the driver with debug > > module param, ie.: > > > > # modprobe brcmfmac debug=0x5416 > > > > That will log some more details. Error -52 is generic code that something > > went wrong in communication with firmware. The debug level above will among > > other things show the actual firmware error code. Another interesting thing > > shown are the firmware capabilities which can also be examined through debugfs. > > > > Regards, > > Arend > > > > > > It appears that this is do-able on the 64 bit RPiOS installed on my Pi5: > > I loaded the debug parameters and used the latest iwd 2.20 with the 2 > SAE patches applied and now get this: > first with iwd running: > root@pi5(rw):~# nmcli dev wifi list > IN-USE BSSID SSID MODE CHAN RATE SIGNAL > BARS SECURITY > 00:01:02:00:00:03 deskSAE Infra 2 65 Mbit/s 79 > ▂▄▆_ WPA2 > root@pi5(rw):~# nmcli --ask dev wifi connect deskSAE > Password: ••••••••• > Error: Timeout 90 sec expired. > > log with iwd: > Sep 02 13:56:18 pi5 NetworkManager[37130]: <info> [1725303378.8140] > device (wlan0): Activation: starting connection 'deskSAE' > (306466e3-8c0c-4925-920f-3d5d1d24189f) > Sep 02 13:56:18 pi5 NetworkManager[37130]: <error> [1725303378.8160] > audit: failed to open auditd socket: Protocol not supported > Sep 02 13:56:18 pi5 NetworkManager[37130]: <info> [1725303378.8161] > audit: op="connection-add-activate" > uuid="306466e3-8c0c-4925-920f-3d5d1d24189f" name="deskSAE" pid=37812 > uid=0 result="success" > Sep 02 13:56:18 pi5 NetworkManager[37130]: <info> [1725303378.8167] > device (wlan0): state change: disconnected -> prepare (reason 'none', > sys-iface-state: 'managed') > Sep 02 13:56:18 pi5 NetworkManager[37130]: <info> [1725303378.8170] > device (wlan0): state change: prepare -> config (reason 'none', > sys-iface-state: 'managed') > Sep 02 13:56:18 pi5 iwd[37306]: event: connect-info, FullMAC driver: > brcmfmac using SAE. Expect EXTERNAL_AUTH > Sep 02 13:56:18 pi5 iwd[37306]: event: connect-info, FullMAC driver: > brcmfmac using SAE. Expect EXTERNAL_AUTH > Sep 02 13:56:18 pi5 iwd[37306]: event: connect-info, ssid: deskSAE, > bss: d8:3a:dd:60:a3:0c, signal: -55, load: 0/255 > Sep 02 13:56:18 pi5 iwd[37306]: event: state, old: autoconnect_full, > new: connecting > Sep 02 13:56:18 pi5 NetworkManager[37130]: <info> [1725303378.8201] > device (wlan0): new IWD device state is connecting > Sep 02 13:56:18 pi5 iwd[37306]: CMD_SET_CQM failed: Operation not supported > Sep 02 13:56:18 pi5 kernel: brcmfmac: _brcmf_set_multicast_list Enter, > bsscfgidx=0 > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_fil_iovar_data_set > ifidx=0, name=mcast_list, len=16 > Sep 02 13:56:18 pi5 kernel: brcmutil: data > Sep 02 13:56:18 pi5 kernel: 00000000: 02 00 00 00 33 33 00 00 00 01 01 > 00 5e 00 00 01 ....33......^... > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_kso_control Enter: on=1 > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_cfg80211_connect Enter > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on > rxctl frame, got 43 expected 43 > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_fil_iovar_data_set > ifidx=0, name=allmulti, len=4 > Sep 02 13:56:18 pi5 kernel: brcmutil: data > Sep 02 13:56:18 pi5 kernel: 00000000: 00 00 00 00 > .... > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on > rxctl frame, got 29 expected 29 > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_fil_iovar_data_set > ifidx=0, name=wpaie, len=22 > Sep 02 13:56:18 pi5 kernel: brcmutil: data > Sep 02 13:56:18 pi5 kernel: 00000000: 30 14 01 00 00 0f ac 04 01 00 00 > 0f ac 04 01 00 0............... > Sep 02 13:56:18 pi5 kernel: 00000010: 00 0f ac 08 80 00 > ...... > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on > rxctl frame, got 44 expected 44 > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_vif_set_mgmt_ie bsscfgidx > 0, pktflag : 0x20 > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_fil_cmd_int_set ifidx=0, > cmd=10, value=0 > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_cfg80211_connect Applied > Vndr IEs for Assoc request > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_cfg80211_connect ie > (00000000da8c1efd), ie_len (34) > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on > rxctl frame, got 20 expected 20 > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_fil_iovar_data_set > ifidx=0, name=arp_ol, len=4 > Sep 02 13:56:18 pi5 kernel: brcmutil: data > Sep 02 13:56:18 pi5 kernel: 00000000: 09 00 00 00 > .... > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on > rxctl frame, got 27 expected 27 > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_fil_bsscfg_data_set > ifidx=0, bsscfgidx=0, name=wpa_auth, len=4 > Sep 02 13:56:18 pi5 kernel: brcmutil: data > Sep 02 13:56:18 pi5 kernel: 00000000: 00 00 04 00 > .... > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on > rxctl frame, got 29 expected 29 > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_fil_bsscfg_data_set > ifidx=0, bsscfgidx=0, name=auth, len=4 > Sep 02 13:56:18 pi5 kernel: brcmutil: data > Sep 02 13:56:18 pi5 kernel: 00000000: 03 00 00 00 > .... > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on > rxctl frame, got 25 expected 25 > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_fil_bsscfg_data_set > ifidx=0, bsscfgidx=0, name=wsec, len=4 > Sep 02 13:56:18 pi5 kernel: brcmutil: data > Sep 02 13:56:18 pi5 kernel: 00000000: 04 00 00 00 > .... > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on > rxctl frame, got 25 expected 25 > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on > rxctl frame, got 29 expected 29 > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_fil_bsscfg_data_get > ifidx=0, bsscfgidx=0, name=wpa_auth, len=4, err=0 > Sep 02 13:56:18 pi5 kernel: brcmutil: data > Sep 02 13:56:18 pi5 kernel: 00000000: 00 00 04 00 > .... > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_fil_bsscfg_data_set > ifidx=0, bsscfgidx=0, name=mfp, len=4 > Sep 02 13:56:18 pi5 kernel: brcmutil: data > Sep 02 13:56:18 pi5 kernel: 00000000: 01 00 00 00 > .... > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on > rxctl frame, got 24 expected 24 > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_fil_bsscfg_data_set > ifidx=0, bsscfgidx=0, name=wpa_auth, len=4 > Sep 02 13:56:18 pi5 kernel: brcmutil: data > Sep 02 13:56:18 pi5 kernel: 00000000: 00 00 04 00 > .... > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on > rxctl frame, got 29 expected 29 > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_fil_iovar_data_set > ifidx=0, name=arpoe, len=4 > Sep 02 13:56:18 pi5 kernel: brcmutil: data > Sep 02 13:56:18 pi5 kernel: 00000000: 01 00 00 00 > .... > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on > rxctl frame, got 26 expected 26 > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_configure_arp_nd_offload > successfully configured (1) ARP offload to 0x9 > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_fil_cmd_int_set ifidx=0, > cmd=205, value=0 > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on > rxctl frame, got 20 expected 20 > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_fil_iovar_data_set > ifidx=0, name=join_pref, len=8 > Sep 02 13:56:18 pi5 kernel: brcmutil: data > Sep 02 13:56:18 pi5 kernel: 00000000: 04 02 08 01 01 02 00 00 > ........ > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on > rxctl frame, got 34 expected 34 > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_fil_iovar_data_set > ifidx=0, name=ndoe, len=4 > Sep 02 13:56:18 pi5 kernel: brcmutil: data > Sep 02 13:56:18 pi5 kernel: 00000000: 01 00 00 00 > .... > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on > rxctl frame, got 25 expected 25 > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_configure_arp_nd_offload > successfully configured (1) ND offload to 0x9 > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_fil_bsscfg_data_set > ifidx=0, bsscfgidx=0, name=join, len=70 > Sep 02 13:56:18 pi5 kernel: brcmutil: data > Sep 02 13:56:18 pi5 kernel: 00000000: 07 00 00 00 64 65 73 6b 53 41 45 > 00 00 00 00 00 ....deskSAE..... > Sep 02 13:56:18 pi5 kernel: 00000010: 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 ................ > Sep 02 13:56:18 pi5 kernel: 00000020: 00 00 00 00 ff 00 00 00 10 00 00 > 00 40 01 00 00 ............@... > Sep 02 13:56:18 pi5 kernel: 00000030: 90 01 00 00 ff ff ff ff d8 3a dd > 60 a3 0c 00 00 .........:.`.... > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on > rxctl frame, got 91 expected 91 > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_cfg80211_connect Exit > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_kso_control Enter: on=0 > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_kso_control Enter: on=1 > Sep 02 13:56:18 pi5 iwd[37306]: event: connect-info, External Auth to > SSID: deskSAE, bssid: d8:3a:dd:60:a3:0c > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_rx_event Enter: > mmc1:0001:1: rxp=00000000fdc96f1d > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_fweh_event_worker event > EXT_AUTH_REQ (187) ifidx 0 bsscfg 0 addr a4:c8:5c:11:2f:b9 > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_fweh_event_worker > version 2 flags 0 status 0 reason 0 > Sep 02 13:56:18 pi5 kernel: brcmutil: event payload, len=60 > Sep 02 13:56:18 pi5 kernel: 00000000: 00 00 d8 3a dd 60 a3 0c 07 00 00 > 00 64 65 73 6b ...:.`......desk > Sep 02 13:56:18 pi5 kernel: 00000010: 53 41 45 00 00 00 00 00 00 00 00 > 00 24 00 00 00 SAE.........$... > Sep 02 13:56:18 pi5 kernel: 00000020: 00 00 00 00 00 00 00 00 e0 86 19 > 00 7a 35 18 00 ............z5.. > Sep 02 13:56:18 pi5 kernel: 00000030: e0 86 19 00 7a 35 18 00 03 00 00 > 00 ....z5...... > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_notify_ext_auth_request > Enter: event EXT_AUTH_REQ (187) received > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_cfg80211_mgmt_tx Enter > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on > rxctl frame, got 20 expected 20 > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_fil_cmd_int_get ifidx=0, > cmd=29, value=1 > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_cfg80211_mgmt_tx Auth > frame, cookie=0, fc=00b0, len=104, channel=12626 > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_fil_bsscfg_data_set > ifidx=0, bsscfgidx=0, name=mgmt_frame, len=136 > Sep 02 13:56:18 pi5 kernel: brcmutil: data > Sep 02 13:56:18 pi5 kernel: 00000000: 00 00 00 00 a0 0f 00 00 68 00 b0 > 00 52 31 d8 3a ........h...R1.: > Sep 02 13:56:18 pi5 kernel: 00000010: dd 60 a3 0c d8 3a dd 60 a3 0c 00 > 00 00 00 00 00 .`...:.`........ > Sep 02 13:56:18 pi5 kernel: 00000020: 03 00 01 00 00 00 13 00 8c 8c d6 > 84 5b 94 b5 0e ............[... > Sep 02 13:56:18 pi5 kernel: 00000030: 51 2b 0d 9d a0 78 14 bb 93 25 de > 7e c3 69 32 0e Q+...x...%.~.i2. > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on > rxctl frame, got 163 expected 163 > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_rx_event Enter: > mmc1:0001:1: rxp=00000000cc427a80 > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_fweh_event_worker event > MGMT_FRAME_TXSTATUS (189) ifidx 0 bsscfg 0 addr a1:e5:f5:86:a2:ba > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_fweh_event_worker > version 2 flags 0 status 0 reason 0 > Sep 02 13:56:18 pi5 kernel: brcmutil: event payload, len=4 > Sep 02 13:56:18 pi5 kernel: 00000000: 00 00 00 00 > .... > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_notify_mgmt_tx_status > Enter: event MGMT_FRAME_TXSTATUS (189), status=0 > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_cfg80211_mgmt_tx TX Auth > frame operation is success > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_rx_event Enter: > mmc1:0001:1: rxp=00000000cc427a80 > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_fweh_event_worker event > EXT_AUTH_FRAME_RX (188) ifidx 0 bsscfg 0 addr d8:3a:dd:60:a3:0c > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_fweh_event_worker > version 2 flags 0 status 0 reason 0 > Sep 02 13:56:18 pi5 kernel: brcmutil: event payload, len=144 > Sep 02 13:56:18 pi5 kernel: 00000000: 00 01 10 01 ff ff ff c9 00 01 46 > 35 00 01 00 02 ..........F5.... > Sep 02 13:56:18 pi5 kernel: 00000010: b0 00 3a 01 d8 3a dd d2 ae 3c d8 > 3a dd 60 a3 0c ..:..:...<.:.`.. > Sep 02 13:56:18 pi5 kernel: 00000020: d8 3a dd 60 a3 0c 20 88 03 00 01 > 00 00 00 13 00 .:.`.. ......... > Sep 02 13:56:18 pi5 kernel: 00000030: d1 ae 95 46 66 ea 04 6f 59 0a 2c > 5e d4 e9 d6 2e ...Ff..oY.,^.... > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_notify_auth_frame_rx > Enter: event EXT_AUTH_FRAME_RX (188) received > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on > rxctl frame, got 22 expected 22 > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_fil_cmd_data Firmware > error: BCME_NOTASSOCIATED (-17) > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_fil_cmd_data_get ifidx=0, > cmd=23, len=6, err=-52 > Sep 02 13:56:18 pi5 kernel: brcmutil: data > Sep 02 13:56:18 pi5 kernel: 00000000: 00 00 00 00 00 00 > ...... > Sep 02 13:56:18 pi5 kernel: brcmfmac: brcmf_sdio_kso_control Enter: on=0 > Sep 02 13:57:48 pi5 polkitd[551]: Unregistered Authentication Agent > for unix-process:37812:208342 (system bus name :1.1193, object path > /org/freedesktop/PolicyKit1/AuthenticationAgent, locale en_US.UTF-8) > (disconnected from bus) > > Now trial with wpa_supplicant: > root@pi5(rw):~# nmcli --ask dev wifi connect deskSAE > Password: ••••••••• > Device 'wlan0' successfully activated with > '87cd00bc-9664-4827-8a00-d98bcb7b9877'. > > Log with wpa_supplicant and a connect: > Sep 02 14:08:10 pi5 kernel: brcmfmac: brcmf_cfg80211_escan_handler > ESCAN Partial result > Sep 02 14:08:10 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter > Sep 02 14:08:10 pi5 kernel: brcmfmac: brcmf_rx_event Enter: > mmc1:0001:1: rxp=0000000039214d1f > Sep 02 14:08:10 pi5 kernel: brcmfmac: brcmf_fweh_event_worker event > ESCAN_RESULT (69) ifidx 0 bsscfg 0 addr d8:3a:dd:60:a3:0c > Sep 02 14:08:10 pi5 kernel: brcmfmac: brcmf_fweh_event_worker > version 2 flags 0 status 8 reason 0 > Sep 02 14:08:10 pi5 kernel: brcmutil: event payload, len=208 > Sep 02 14:08:10 pi5 kernel: 00000000: d0 00 00 00 6d 00 00 00 34 12 01 > 00 6d 00 00 00 ....m...4...m... > Sep 02 14:08:10 pi5 kernel: 00000010: c4 00 00 00 d8 3a dd 60 a3 0c 64 > 00 11 04 07 64 .....:.`..d....d > Sep 02 14:08:10 pi5 kernel: 00000020: 65 73 6b 53 41 45 00 00 00 00 00 > 00 00 00 00 00 eskSAE.......... > Sep 02 14:08:10 pi5 kernel: 00000030: 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 ................ > Sep 02 14:08:10 pi5 kernel: brcmfmac: brcmf_cfg80211_escan_handler > ESCAN Partial result > ... > this was what I think was the snippet where it connected with the SSID > after NetworkManager was restarted: > > Sep 02 14:17:14 pi5 wpa_supplicant[43594]: wlan0: Trying to associate > with SSID 'deskSAE' > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_cfg80211_connect Enter > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_fil_iovar_data_set > ifidx=0, name=wpaie, len=44 > Sep 02 14:17:14 pi5 kernel: brcmutil: data > Sep 02 14:17:14 pi5 kernel: 00000000: 30 2a 01 00 00 0f ac 04 01 00 00 > 0f ac 04 01 00 0*.............. > Sep 02 14:17:14 pi5 kernel: 00000010: 00 0f ac 08 c0 00 01 00 c9 b9 cd > 8f 08 b5 a5 a0 ................ > Sep 02 14:17:14 pi5 kernel: 00000020: b2 c0 3a f3 1e ef d4 12 00 0f ac > 06 ..:......... > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on > rxctl frame, got 66 expected 66 > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_vif_set_mgmt_ie bsscfgidx > 0, pktflag : 0x20 > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_cfg80211_connect Applied > Vndr IEs for Assoc request > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_cfg80211_connect ie > (00000000c11a8d64), ie_len (79) > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_fil_bsscfg_data_set > ifidx=0, bsscfgidx=0, name=wpa_auth, len=4 > Sep 02 14:17:14 pi5 kernel: brcmutil: data > Sep 02 14:17:14 pi5 kernel: 00000000: 00 00 04 00 > .... > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on > rxctl frame, got 29 expected 29 > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_fil_bsscfg_data_set > ifidx=0, bsscfgidx=0, name=auth, len=4 > Sep 02 14:17:14 pi5 kernel: brcmutil: data > Sep 02 14:17:14 pi5 kernel: 00000000: 00 00 00 00 > .... > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on > rxctl frame, got 25 expected 25 > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_fil_bsscfg_data_set > ifidx=0, bsscfgidx=0, name=wsec, len=4 > Sep 02 14:17:14 pi5 kernel: brcmutil: data > Sep 02 14:17:14 pi5 kernel: 00000000: 04 00 00 00 > .... > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on > rxctl frame, got 25 expected 25 > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on > rxctl frame, got 29 expected 29 > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_fil_bsscfg_data_get > ifidx=0, bsscfgidx=0, name=wpa_auth, len=4, err=0 > Sep 02 14:17:14 pi5 kernel: brcmutil: data > Sep 02 14:17:14 pi5 kernel: 00000000: 00 00 04 00 > .... > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_fil_bsscfg_data_set > ifidx=0, bsscfgidx=0, name=mfp, len=4 > Sep 02 14:17:14 pi5 kernel: brcmutil: data > Sep 02 14:17:14 pi5 kernel: 00000000: 02 00 00 00 > .... > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on > rxctl frame, got 24 expected 24 > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_fil_bsscfg_data_set > ifidx=0, bsscfgidx=0, name=wpa_auth, len=4 > Sep 02 14:17:14 pi5 kernel: brcmutil: data > Sep 02 14:17:14 pi5 kernel: 00000000: 00 00 04 00 > .... > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on > rxctl frame, got 29 expected 29 > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_fil_cmd_int_set ifidx=0, > cmd=205, value=0 > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on > rxctl frame, got 20 expected 20 > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_fil_iovar_data_set > ifidx=0, name=join_pref, len=8 > Sep 02 14:17:14 pi5 kernel: brcmutil: data > Sep 02 14:17:14 pi5 kernel: 00000000: 04 02 08 01 01 02 00 00 > ........ > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on > rxctl frame, got 34 expected 34 > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_fil_bsscfg_data_set > ifidx=0, bsscfgidx=0, name=join, len=70 > Sep 02 14:17:14 pi5 kernel: brcmutil: data > Sep 02 14:17:14 pi5 kernel: 00000000: 07 00 00 00 64 65 73 6b 53 41 45 > 00 00 00 00 00 ....deskSAE..... > Sep 02 14:17:14 pi5 kernel: 00000010: 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 ................ > Sep 02 14:17:14 pi5 kernel: 00000020: 00 00 00 00 ff 00 00 00 10 00 00 > 00 40 01 00 00 ............@... > Sep 02 14:17:14 pi5 kernel: 00000030: 90 01 00 00 ff ff ff ff d8 3a dd > 60 a3 0c 00 00 .........:.`.... > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on > rxctl frame, got 91 expected 91 > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_cfg80211_connect Exit > Sep 02 14:17:14 pi5 NetworkManager[57939]: <info> [1725304634.0622] > device (wlan0): supplicant interface state: scanning -> associating > Sep 02 14:17:14 pi5 NetworkManager[57939]: <info> [1725304634.0622] > device (p2p-dev-wlan0): supplicant management interface state: > scanning -> associating > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_kso_control Enter: on=0 > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_kso_control Enter: on=1 > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_rx_event Enter: > mmc1:0001:1: rxp=0000000062bff4bd > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_fweh_event_worker event > LINK (16) ifidx 0 bsscfg 0 addr d8:3a:dd:60:a3:0c > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_fweh_event_worker > version 2 flags 1 status 0 reason 0 > Sep 02 14:17:14 pi5 kernel: brcmutil: event payload, len=22 > Sep 02 14:17:14 pi5 kernel: 00000000: 30 14 01 00 00 0f ac 04 01 00 00 > 0f ac 04 01 00 0............... > Sep 02 14:17:14 pi5 kernel: 00000010: 00 0f ac 08 c0 00 > ...... > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_kso_control Enter: on=0 > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_kso_control Enter: on=1 > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_rx_event Enter: > mmc1:0001:1: rxp=00000000aafdfb7d > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_fweh_event_worker event > SET_SSID (0) ifidx 0 bsscfg 0 addr d8:3a:dd:60:a3:0c > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_fweh_event_worker > version 2 flags 0 status 0 reason 0 > Sep 02 14:17:14 pi5 kernel: brcmutil: event payload, len=7 > Sep 02 14:17:14 pi5 kernel: 00000000: 64 65 73 6b 53 41 45 > deskSAE > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_bss_connect_done Enter > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter > Sep 02 14:17:14 pi5 wpa_supplicant[43594]: wlan0: Associated with > d8:3a:dd:60:a3:0c > Sep 02 14:17:14 pi5 wpa_supplicant[43594]: wlan0: > CTRL-EVENT-SUBNET-STATUS-UPDATE status=0 > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on > rxctl frame, got 539 expected 539 > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_fil_iovar_data_get > ifidx=0, name=assoc_info, len=512, err=0 > Sep 02 14:17:14 pi5 kernel: brcmutil: data > Sep 02 14:17:14 pi5 kernel: 00000000: 66 00 00 00 20 00 00 00 00 00 00 > 00 31 04 0a 00 f... .......1... > Sep 02 14:17:14 pi5 kernel: 00000010: 00 00 00 cc 00 00 11 04 00 00 01 > c0 0c 64 00 11 .............d.. > Sep 02 14:17:14 pi5 kernel: 00000020: 04 07 64 65 73 6b 53 41 45 00 00 > 00 00 00 00 00 ..deskSAE....... > Sep 02 14:17:14 pi5 kernel: 00000030: 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 ................ > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on > rxctl frame, got 542 expected 542 > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_fil_iovar_data_get > ifidx=0, name=assoc_req_ies, len=512, err=0 > Sep 02 14:17:14 pi5 kernel: brcmutil: data > Sep 02 14:17:14 pi5 kernel: 00000000: 00 07 64 65 73 6b 53 41 45 01 08 > 82 84 8b 96 24 ..deskSAE......$ > Sep 02 14:17:14 pi5 kernel: 00000010: 30 48 6c 32 04 0c 12 18 60 21 02 > 03 14 24 02 01 0Hl2....`!...$.. > Sep 02 14:17:14 pi5 kernel: 00000020: 0b 30 2a 01 00 00 0f ac 04 01 00 > 00 0f ac 04 01 .0*............. > Sep 02 14:17:14 pi5 kernel: 00000030: 00 00 0f ac 08 c0 00 01 00 c9 b9 > cd 8f 08 b5 a5 ................ > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on > rxctl frame, got 543 expected 543 > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_fil_iovar_data_get > ifidx=0, name=assoc_resp_ies, len=512, err=0 > Sep 02 14:17:14 pi5 kernel: brcmutil: data > Sep 02 14:17:14 pi5 kernel: 00000000: 01 08 82 84 8b 96 0c 12 18 24 32 > 04 30 48 60 6c .........$2.0H`l > Sep 02 14:17:14 pi5 kernel: 00000010: 7f 08 04 00 00 00 00 00 00 40 82 > 84 8b 96 24 30 .........@....$0 > Sep 02 14:17:14 pi5 kernel: 00000020: 48 6c 32 04 0c 12 18 60 21 02 03 > 14 24 02 01 0b Hl2....`!...$... > Sep 02 14:17:14 pi5 kernel: 00000030: 30 2a 01 00 00 0f ac 04 01 00 00 > 0f ac 04 01 00 0*.............. > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on > rxctl frame, got 43 expected 43 > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_fil_iovar_data_get > ifidx=0, name=wme_ac_sta, len=16, err=0 > Sep 02 14:17:14 pi5 kernel: brcmutil: data > Sep 02 14:17:14 pi5 kernel: 00000000: 03 a4 00 00 27 a4 00 00 42 43 5e > 00 62 32 2f 00 ....'...BC^.b2/. > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_update_bss_info Enter > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_txctl Enter > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl Enter > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_isr Enter > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_rxctl resumed on > rxctl frame, got 2064 expected 2064 > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_fil_cmd_data_get ifidx=0, > cmd=136, len=2048, err=0 > Sep 02 14:17:14 pi5 kernel: brcmutil: data > Sep 02 14:17:14 pi5 kernel: 00000000: cd 00 00 00 6d 00 00 00 cc 00 00 > 00 d8 3a dd 60 ....m........:.` > Sep 02 14:17:14 pi5 kernel: 00000010: a3 0c 64 00 11 04 07 64 65 73 6b > 53 41 45 00 00 ..d....deskSAE.. > Sep 02 14:17:14 pi5 kernel: 00000020: 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 ................ > Sep 02 14:17:14 pi5 kernel: 00000030: 00 00 00 00 00 00 00 00 0c 00 00 > 00 82 84 8b 0c ................ > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_update_bss_info Exit > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_bss_connect_done Exit > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_net_setcarrier Enter, > bsscfgidx=0 carrier=1 > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_txflowblock_if enter: > bsscfgidx=0 stop=0x4 reason=4 state=0 > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_txdata Enter: > pkt: data 00000000e74f6ccc len 161 > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_bus_txdata deferring pktq len 0 > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_sendfromq Enter > Sep 02 14:17:14 pi5 kernel: brcmfmac: brcmf_sdio_txpkt Enter > Sep 02 14:17:14 pi5 wpa_supplicant[43594]: wlan0: WPA: Key negotiation > completed with d8:3a:dd:60:a3:0c [PTK=CCMP GTK=CCMP] > Sep 02 14:17:14 pi5 wpa_supplicant[43594]: wlan0: CTRL-EVENT-CONNECTED > - Connection to d8:3a:dd:60:a3:0c completed [id=0 id_str=] > Sep 02 14:17:14 pi5 NetworkManager[57939]: <info> [1725304634.2164] > device (wlan0): supplicant interface state: associating -> completed > Sep 02 14:17:14 pi5 NetworkManager[57939]: <info> [1725304634.2165] > device (wlan0): Activation: (wifi) Stage 2 of 5 (Device Configure) > successful. Connected to wireless network "deskSAE" > Sep 02 14:17:14 pi5 NetworkManager[57939]: <info> [1725304634.2166] > device (p2p-dev-wlan0): supplicant management interface state: > associating -> completed > Sep 02 14:17:14 pi5 NetworkManager[57939]: <info> [1725304634.2167] > device (wlan0): state change: config -> ip-config (reason 'none', > sys-iface-state: 'managed') > Sep 02 14:17:14 pi5 NetworkManager[57939]: <info> [1725304634.2170] > dhcp4 (wlan0): activation: beginning transaction (timeout in 45 > seconds) Is more needed? I can collect whatever logs are needed. Keith
Hi, On Fri, Aug 23, 2024 at 12:42 PM Denis Kenzior <denkenz@gmail.com> wrote: > > This series implements External Auth support on Full MAC cards that do > not support SAE offload. I have not been able to test this fully since > the brcmfmac firmware on the RPi 5 does not actually work properly. > Maybe some enterprising person can test it on a firmware that does work? > > Denis Kenzior (2): > netdev: external auth support > sae: Allow ability to force Group 19 / Hunt and Peck > > src/netdev.c | 258 +++++++++++++++++++++++++++++++++++++++++----- > src/nl80211util.c | 4 +- > src/sae.c | 20 ++++ > src/sae.h | 3 + > src/wiphy.c | 19 ++-- > 5 files changed, 263 insertions(+), 41 deletions(-) > > -- > 2.45.2 > I tested this on an RPi5 too, and indeed I am having the same problem as KeithG as well. However I managed to get some debug information from brcmfmac when running wpa_supplicant. Interestingly wpa_supplicant gets the same -52 error as well, which it reports as an authentication timeout. But if I ask it to try again, it will connect successfully, and there is no external auth related log the second time around. So I suspect this is a firmware bug, but it should be relatively easy to workaround I think? Basically we also add a timeout and retry. BTW, with the current version of this patch, if I ask iwd to disconnect after getting the -52 error, iwd segfaults. Regards, Yuxuan Shui
Hi Yuxuan Shui, > > I tested this on an RPi5 too, and indeed I am having the same problem as KeithG > as well. However I managed to get some debug information from brcmfmac when > running wpa_supplicant. Interestingly wpa_supplicant gets the same -52 error as > well, which it reports as an authentication timeout. But if I ask it to try > again, it will connect successfully, and there is no external auth related log > the second time around. Yep. It looks like wpa_s puts the resulting PMKSA into the kernel cache even though the initial connection using external auth fails. I've only seen 2.10 do this, not 2.11. Either way, it is a bug / lucky coincidence. > > So I suspect this is a firmware bug, but it should be relatively easy to > workaround I think? Basically we also add a timeout and retry. It would be far nicer if the brcmfmac firmware + driver combination worked properly :) Regards, -Denis
Hi Keith, > > Just to be sure... Are you saying that both wpa_supplicant and iwd fail the same > way, but wpa_supplicant ignores the failure and still connects? Pretty much. But really more by accident than design. What happens is: 1. wpa_s completes the SAE handshake via external auth 2. It then (without waiting for the connection succeeded event) uploads the resulting PMKSA into the kernel 3. Tells the firmware that the handshake succeeded 4. The firmware nopes out with error -52. 5. wpa_s then times out / fails the current connection attempt 6. Re-tries. On the retry attempt the firmware picks the PMKSA cache entry and uses that, skipping SAE step entirely. Regards, -Denis
On September 22, 2024 5:35:03 AM Denis Kenzior <denkenz@gmail.com> wrote: > Hi Yuxuan Shui, > >> >> I tested this on an RPi5 too, and indeed I am having the same problem as KeithG >> as well. However I managed to get some debug information from brcmfmac when >> running wpa_supplicant. Interestingly wpa_supplicant gets the same -52 error as >> well, which it reports as an authentication timeout. But if I ask it to try >> again, it will connect successfully, and there is no external auth related log >> the second time around. > > Yep. It looks like wpa_s puts the resulting PMKSA into the kernel cache even > though the initial connection using external auth fails. I've only seen > 2.10 do > this, not 2.11. Either way, it is a bug / lucky coincidence. > >> >> So I suspect this is a firmware bug, but it should be relatively easy to >> workaround I think? Basically we also add a timeout and retry. > > It would be far nicer if the brcmfmac firmware + driver combination worked > properly :) Indeed it would. So what's in the mix? What kernel is used? Upstream or RPi kernel? What firmware capabilities are listed in debugfs? Recently I submitted patches upstream to add external auth support. As I ported downstream patch the results you see do not make me optimistic that my patch is ready. Maybe you could help testing it? https://patchwork.kernel.org/project/linux-wireless/list/?series=891248&state=* Regards, Arend
On Sun, Sep 22, 2024 at 1:09 AM Arend Van Spriel <arend.vanspriel@broadcom.com> wrote: > > On September 22, 2024 5:35:03 AM Denis Kenzior <denkenz@gmail.com> wrote: > > > Hi Yuxuan Shui, > > > >> > >> I tested this on an RPi5 too, and indeed I am having the same problem as KeithG > >> as well. However I managed to get some debug information from brcmfmac when > >> running wpa_supplicant. Interestingly wpa_supplicant gets the same -52 error as > >> well, which it reports as an authentication timeout. But if I ask it to try > >> again, it will connect successfully, and there is no external auth related log > >> the second time around. > > > > Yep. It looks like wpa_s puts the resulting PMKSA into the kernel cache even > > though the initial connection using external auth fails. I've only seen > > 2.10 do > > this, not 2.11. Either way, it is a bug / lucky coincidence. > > > >> > >> So I suspect this is a firmware bug, but it should be relatively easy to > >> workaround I think? Basically we also add a timeout and retry. > > > > It would be far nicer if the brcmfmac firmware + driver combination worked > > properly :) > > Indeed it would. So what's in the mix? What kernel is used? Upstream or RPi > kernel? What firmware capabilities are listed in debugfs? > > Recently I submitted patches upstream to add external auth support. As I > ported downstream patch the results you see do not make me optimistic that > my patch is ready. Maybe you could help testing it? > > https://patchwork.kernel.org/project/linux-wireless/list/?series=891248&state=* > > Regards, > Arend > > Arend, I tried to apply the patch set to kernel 6.6.44-v8 and was unable to patch it: $ patch -p1 < RFT-v2-1-3-wifi-brcmfmac-support-per-vendor-cfg80211-callbacks-and-firmware-events.patch patching file drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c Hunk #1 FAILED at 6752. 1 out of 1 hunk FAILED -- saving rejects to file drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c.rej patching file drivers/net/wireless/broadcom/brcm80211/brcmfmac/common.c Hunk #1 succeeded at 524 (offset 33 lines). patching file drivers/net/wireless/broadcom/brcm80211/brcmfmac/core.c Hunk #1 FAILED at 1359. 1 out of 1 hunk FAILED -- saving rejects to file drivers/net/wireless/broadcom/brcm80211/brcmfmac/core.c.rej patching file drivers/net/wireless/broadcom/brcm80211/brcmfmac/fweh.c Hunk #1 succeeded at 74 (offset -1 lines). Hunk #2 succeeded at 336 (offset -70 lines). patching file drivers/net/wireless/broadcom/brcm80211/brcmfmac/fwvid.h Hunk #1 FAILED at 15. Hunk #2 succeeded at 47 with fuzz 1 (offset -9 lines). 1 out of 2 hunks FAILED -- saving rejects to file drivers/net/wireless/broadcom/brcm80211/brcmfmac/fwvid.h.rej I did not try the other patches as this attempt failed. Do I need to use a newer kernel? The latest kernel from RPiOS is 6.6.47. Keith
On September 22, 2024 5:36:53 PM KeithG <ys3al35l@gmail.com> wrote: > On Sun, Sep 22, 2024 at 1:09 AM Arend Van Spriel > <arend.vanspriel@broadcom.com> wrote: >> >> On September 22, 2024 5:35:03 AM Denis Kenzior <denkenz@gmail.com> wrote: >> >>> Hi Yuxuan Shui, >>> >>>> >>>> I tested this on an RPi5 too, and indeed I am having the same problem as KeithG >>>> as well. However I managed to get some debug information from brcmfmac when >>>> running wpa_supplicant. Interestingly wpa_supplicant gets the same -52 error as >>>> well, which it reports as an authentication timeout. But if I ask it to try >>>> again, it will connect successfully, and there is no external auth related log >>>> the second time around. >>> >>> Yep. It looks like wpa_s puts the resulting PMKSA into the kernel cache even >>> though the initial connection using external auth fails. I've only seen >>> 2.10 do >>> this, not 2.11. Either way, it is a bug / lucky coincidence. >>> >>>> >>>> So I suspect this is a firmware bug, but it should be relatively easy to >>>> workaround I think? Basically we also add a timeout and retry. >>> >>> It would be far nicer if the brcmfmac firmware + driver combination worked >>> properly :) >> >> Indeed it would. So what's in the mix? What kernel is used? Upstream or RPi >> kernel? What firmware capabilities are listed in debugfs? >> >> Recently I submitted patches upstream to add external auth support. As I >> ported downstream patch the results you see do not make me optimistic that >> my patch is ready. Maybe you could help testing it? >> >> https://patchwork.kernel.org/project/linux-wireless/list/?series=891248&state=* >> >> Regards, >> Arend > Arend, > > I tried to apply the patch set to kernel 6.6.44-v8 and was unable to patch it: > > $ patch -p1 < > RFT-v2-1-3-wifi-brcmfmac-support-per-vendor-cfg80211-callbacks-and-firmware-events.patch > patching file drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c > Hunk #1 FAILED at 6752. > 1 out of 1 hunk FAILED -- saving rejects to file > drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c.rej > patching file drivers/net/wireless/broadcom/brcm80211/brcmfmac/common.c > Hunk #1 succeeded at 524 (offset 33 lines). > patching file drivers/net/wireless/broadcom/brcm80211/brcmfmac/core.c > Hunk #1 FAILED at 1359. > 1 out of 1 hunk FAILED -- saving rejects to file > drivers/net/wireless/broadcom/brcm80211/brcmfmac/core.c.rej > patching file drivers/net/wireless/broadcom/brcm80211/brcmfmac/fweh.c > Hunk #1 succeeded at 74 (offset -1 lines). > Hunk #2 succeeded at 336 (offset -70 lines). > patching file drivers/net/wireless/broadcom/brcm80211/brcmfmac/fwvid.h > Hunk #1 FAILED at 15. > Hunk #2 succeeded at 47 with fuzz 1 (offset -9 lines). > 1 out of 2 hunks FAILED -- saving rejects to file > drivers/net/wireless/broadcom/brcm80211/brcmfmac/fwvid.h.rej > > I did not try the other patches as this attempt failed. Do I need to > use a newer kernel? The latest kernel from RPiOS is 6.6.47. I did major rework to support multiple vendors with differing firmware APIs. So I can imagine you would need other patches that were submitted earlier. Easiest would be to use the backports project which allows running latest driver like wireless-next on older kernels. I can try. Do you have a URL of the RPiOS kernel repo? Regards, Arend > Keith
On Sun, Sep 22, 2024 at 11:20 AM Arend Van Spriel <arend.vanspriel@broadcom.com> wrote: > > On September 22, 2024 5:36:53 PM KeithG <ys3al35l@gmail.com> wrote: > > > On Sun, Sep 22, 2024 at 1:09 AM Arend Van Spriel > > <arend.vanspriel@broadcom.com> wrote: > >> > >> On September 22, 2024 5:35:03 AM Denis Kenzior <denkenz@gmail.com> wrote: > >> > >>> Hi Yuxuan Shui, > >>> > >>>> > >>>> I tested this on an RPi5 too, and indeed I am having the same problem as KeithG > >>>> as well. However I managed to get some debug information from brcmfmac when > >>>> running wpa_supplicant. Interestingly wpa_supplicant gets the same -52 error as > >>>> well, which it reports as an authentication timeout. But if I ask it to try > >>>> again, it will connect successfully, and there is no external auth related log > >>>> the second time around. > >>> > >>> Yep. It looks like wpa_s puts the resulting PMKSA into the kernel cache even > >>> though the initial connection using external auth fails. I've only seen > >>> 2.10 do > >>> this, not 2.11. Either way, it is a bug / lucky coincidence. > >>> > >>>> > >>>> So I suspect this is a firmware bug, but it should be relatively easy to > >>>> workaround I think? Basically we also add a timeout and retry. > >>> > >>> It would be far nicer if the brcmfmac firmware + driver combination worked > >>> properly :) > >> > >> Indeed it would. So what's in the mix? What kernel is used? Upstream or RPi > >> kernel? What firmware capabilities are listed in debugfs? > >> > >> Recently I submitted patches upstream to add external auth support. As I > >> ported downstream patch the results you see do not make me optimistic that > >> my patch is ready. Maybe you could help testing it? > >> > >> https://patchwork.kernel.org/project/linux-wireless/list/?series=891248&state=* > >> > >> Regards, > >> Arend > > Arend, > > > > I tried to apply the patch set to kernel 6.6.44-v8 and was unable to patch it: > > > > $ patch -p1 < > > RFT-v2-1-3-wifi-brcmfmac-support-per-vendor-cfg80211-callbacks-and-firmware-events.patch > > patching file drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c > > Hunk #1 FAILED at 6752. > > 1 out of 1 hunk FAILED -- saving rejects to file > > drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c.rej > > patching file drivers/net/wireless/broadcom/brcm80211/brcmfmac/common.c > > Hunk #1 succeeded at 524 (offset 33 lines). > > patching file drivers/net/wireless/broadcom/brcm80211/brcmfmac/core.c > > Hunk #1 FAILED at 1359. > > 1 out of 1 hunk FAILED -- saving rejects to file > > drivers/net/wireless/broadcom/brcm80211/brcmfmac/core.c.rej > > patching file drivers/net/wireless/broadcom/brcm80211/brcmfmac/fweh.c > > Hunk #1 succeeded at 74 (offset -1 lines). > > Hunk #2 succeeded at 336 (offset -70 lines). > > patching file drivers/net/wireless/broadcom/brcm80211/brcmfmac/fwvid.h > > Hunk #1 FAILED at 15. > > Hunk #2 succeeded at 47 with fuzz 1 (offset -9 lines). > > 1 out of 2 hunks FAILED -- saving rejects to file > > drivers/net/wireless/broadcom/brcm80211/brcmfmac/fwvid.h.rej > > > > I did not try the other patches as this attempt failed. Do I need to > > use a newer kernel? The latest kernel from RPiOS is 6.6.47. > > I did major rework to support multiple vendors with differing firmware > APIs. So I can imagine you would need other patches that were submitted > earlier. Easiest would be to use the backports project which allows running > latest driver like wireless-next on older kernels. > > I can try. Do you have a URL of the RPiOS kernel repo? > > Regards, > Arend > > Keith > > Arend, It is either here as a git clone: git clone --depth=1 https://github.com/raspberrypi/linux or here as a gzip: https://github.com/raspberrypi/linux/archive/refs/tags/stable_20240529.tar.gz Keith
It appears that this patch series no longer applies to the current git. Is it implemented in iwd or does it need to be refactored to apply to the current repo? Keith On Fri, Aug 23, 2024 at 12:42 PM Denis Kenzior <denkenz@gmail.com> wrote: > > This series implements External Auth support on Full MAC cards that do > not support SAE offload. I have not been able to test this fully since > the brcmfmac firmware on the RPi 5 does not actually work properly. > Maybe some enterprising person can test it on a firmware that does work? > > Denis Kenzior (2): > netdev: external auth support > sae: Allow ability to force Group 19 / Hunt and Peck > > src/netdev.c | 258 +++++++++++++++++++++++++++++++++++++++++----- > src/nl80211util.c | 4 +- > src/sae.c | 20 ++++ > src/sae.h | 3 + > src/wiphy.c | 19 ++-- > 5 files changed, 263 insertions(+), 41 deletions(-) > > -- > 2.45.2 > >
Hi Keith, On 9/22/24 1:56 PM, KeithG wrote: > It appears that this patch series no longer applies to the current > git. Is it implemented in iwd or does it need to be refactored to > apply to the current repo? > I just rebased and resent this series on top of git HEAD. Regards, -Denis
Arend, Is there anything I can help with on this effort to get External Auth working on a kernel that more of us are using? RPiOS is currently at 6.6.51. Keith On Sun, Sep 22, 2024 at 11:29 AM KeithG <ys3al35l@gmail.com> wrote: > > On Sun, Sep 22, 2024 at 11:20 AM Arend Van Spriel > <arend.vanspriel@broadcom.com> wrote: > > > > On September 22, 2024 5:36:53 PM KeithG <ys3al35l@gmail.com> wrote: > > > > > On Sun, Sep 22, 2024 at 1:09 AM Arend Van Spriel > > > <arend.vanspriel@broadcom.com> wrote: > > >> > > >> On September 22, 2024 5:35:03 AM Denis Kenzior <denkenz@gmail.com> wrote: > > >> > > >>> Hi Yuxuan Shui, > > >>> > > >>>> > > >>>> I tested this on an RPi5 too, and indeed I am having the same problem as KeithG > > >>>> as well. However I managed to get some debug information from brcmfmac when > > >>>> running wpa_supplicant. Interestingly wpa_supplicant gets the same -52 error as > > >>>> well, which it reports as an authentication timeout. But if I ask it to try > > >>>> again, it will connect successfully, and there is no external auth related log > > >>>> the second time around. > > >>> > > >>> Yep. It looks like wpa_s puts the resulting PMKSA into the kernel cache even > > >>> though the initial connection using external auth fails. I've only seen > > >>> 2.10 do > > >>> this, not 2.11. Either way, it is a bug / lucky coincidence. > > >>> > > >>>> > > >>>> So I suspect this is a firmware bug, but it should be relatively easy to > > >>>> workaround I think? Basically we also add a timeout and retry. > > >>> > > >>> It would be far nicer if the brcmfmac firmware + driver combination worked > > >>> properly :) > > >> > > >> Indeed it would. So what's in the mix? What kernel is used? Upstream or RPi > > >> kernel? What firmware capabilities are listed in debugfs? > > >> > > >> Recently I submitted patches upstream to add external auth support. As I > > >> ported downstream patch the results you see do not make me optimistic that > > >> my patch is ready. Maybe you could help testing it? > > >> > > >> https://patchwork.kernel.org/project/linux-wireless/list/?series=891248&state=* > > >> > > >> Regards, > > >> Arend > > > Arend, > > > > > > I tried to apply the patch set to kernel 6.6.44-v8 and was unable to patch it: > > > > > > $ patch -p1 < > > > RFT-v2-1-3-wifi-brcmfmac-support-per-vendor-cfg80211-callbacks-and-firmware-events.patch > > > patching file drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c > > > Hunk #1 FAILED at 6752. > > > 1 out of 1 hunk FAILED -- saving rejects to file > > > drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c.rej > > > patching file drivers/net/wireless/broadcom/brcm80211/brcmfmac/common.c > > > Hunk #1 succeeded at 524 (offset 33 lines). > > > patching file drivers/net/wireless/broadcom/brcm80211/brcmfmac/core.c > > > Hunk #1 FAILED at 1359. > > > 1 out of 1 hunk FAILED -- saving rejects to file > > > drivers/net/wireless/broadcom/brcm80211/brcmfmac/core.c.rej > > > patching file drivers/net/wireless/broadcom/brcm80211/brcmfmac/fweh.c > > > Hunk #1 succeeded at 74 (offset -1 lines). > > > Hunk #2 succeeded at 336 (offset -70 lines). > > > patching file drivers/net/wireless/broadcom/brcm80211/brcmfmac/fwvid.h > > > Hunk #1 FAILED at 15. > > > Hunk #2 succeeded at 47 with fuzz 1 (offset -9 lines). > > > 1 out of 2 hunks FAILED -- saving rejects to file > > > drivers/net/wireless/broadcom/brcm80211/brcmfmac/fwvid.h.rej > > > > > > I did not try the other patches as this attempt failed. Do I need to > > > use a newer kernel? The latest kernel from RPiOS is 6.6.47. > > > > I did major rework to support multiple vendors with differing firmware > > APIs. So I can imagine you would need other patches that were submitted > > earlier. Easiest would be to use the backports project which allows running > > latest driver like wireless-next on older kernels. > > > > I can try. Do you have a URL of the RPiOS kernel repo? > > > > Regards, > > Arend > > > Keith > > > > > > Arend, > It is either here as a git clone: > git clone --depth=1 https://github.com/raspberrypi/linux > > or here as a gzip: > https://github.com/raspberrypi/linux/archive/refs/tags/stable_20240529.tar.gz > > Keith