Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Kobo Forma: initial scan fails #14

Open
hrdl-github opened this issue Dec 5, 2024 · 13 comments
Open

Kobo Forma: initial scan fails #14

hrdl-github opened this issue Dec 5, 2024 · 13 comments

Comments

@hrdl-github
Copy link

#13 / 0d5c8ee don't work on my Kobo Forma as intended (koreader/koreader#12848). Instead of SCANNING my wpa_state seems to be INACTIVE when scanning. The initial connection usually takes around 20 seconds, as described in #12.

@NiLuJe
Copy link
Member

NiLuJe commented Dec 5, 2024

On which FW version?

With an AP saved in Nickel?

With an AP saved in KOReader?

In range of said AP?

@hrdl-github
Copy link
Author

FW versions: 4.38.23171, probably also 4.32.19501. The APs are only saved in KOReader, not Nickel. In range of APs, the first scan is empty with said commit.

@hrdl-github
Copy link
Author

The same happens on a second Kobo Forma that runs fw 4.33.19759, KOReader 2024.11. wpa_supplicant -v prints wpa_supplicant v2.9-hostap_2_9-11-g77a773710+ on all devices, independently of whether they are affected or not.

@NiLuJe
Copy link
Member

NiLuJe commented Dec 5, 2024

I assume things get better if you actually get Nickel to save the AP?

@hrdl-github
Copy link
Author

Excellent guess -- you're right, adding a network to nickel causes the status to become SCANNING. This seems to be only relevant for my Formas.

@hrdl-github
Copy link
Author

I can look into what's going wrong this weekend, i.e. which type of scan is being used and what is happening to the initial scan, which shouldn't be affected by the absence of configured networks.

wpa_supplicant -dd didn't yield anything useful, so I suspect that one was compiled with CONFIG_NO_STDOUT_DEBUG. Any chance you have a suitable wpa_supplicant binary?

@NiLuJe
Copy link
Member

NiLuJe commented Dec 6, 2024 via email

@hrdl-github
Copy link
Author

-dd works just fine; I just hadn't checked logread. On my Forma the first one or two scans fail with EAGAIN (first column is the seconds part of the event's timestamp):

27 wpa_supplicant[5662]: CTRL_IFACE monitor attached /tmp/lj-wpaclient-5616\x00
27 wpa_supplicant[5662]: CTRL-DEBUG: ctrl_sock-sendto: sock=8 sndbuf=163840 outq=0 send_len=3
27 wpa_supplicant[5662]: eth0: Control interface command 'SCAN'
27 wpa_supplicant[5662]: eth0: Setting scan request: 0.000000 sec
27 wpa_supplicant[5662]: CTRL-DEBUG: ctrl_sock-sendto: sock=8 sndbuf=163840 outq=0 send_len=3
27 wpa_supplicant[5662]: eth0: State: DISCONNECTED -> SCANNING
27 wpa_supplicant[5662]: eth0: Starting AP scan for wildcard SSID
27 wpa_supplicant[5662]: eth0: Add radio work 'scan'@0x1221830
27 wpa_supplicant[5662]: eth0: First radio work item in the queue - schedule start immediately
27 wpa_supplicant[5662]: eth0: Starting radio work 'scan'@0x1221830 after 0.000067 second wait
27 wpa_supplicant[5662]: Scan requested (ret=0) - scan timeout 10 seconds
27 wpa_supplicant[5662]: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
27 wpa_supplicant[5662]: RTM_NEWLINK, IFLA_IFNAME: Interface 'eth0' added
27 wpa_supplicant[5662]: WEXT: if_removed already cleared - ignore event
27 wpa_supplicant[5662]: Wireless event: cmd=0x8b19 len=8
27 wpa_supplicant[5662]: eth0: Event SCAN_RESULTS (3) received
27 wpa_supplicant[5662]: ioctl[SIOCGIWSCAN]: Resource temporarily unavailable
27 wpa_supplicant[5662]: eth0: Failed to get scan results
27 wpa_supplicant[5662]: eth0: Failed to get scan results - try scanning again
27 wpa_supplicant[5662]: eth0: Short-circuit new scan request since there are no enabled networks
27 wpa_supplicant[5662]: eth0: State: SCANNING -> INACTIVE

After 1-2 attempts SCAN_RESULTS just works with a Scan results did not fit - trying larger buffer (8192 bytes) note. Nickel does not attempt to scan again and processes a second SCAN_RESULTS event instead:

53 wpa_supplicant[7248]: CTRL_IFACE monitor attached /tmp/dhcpcd-dbus-wpa-7224.1\x00
53 wpa_supplicant[7248]: CTRL-DEBUG: ctrl_sock-sendto: sock=8 sndbuf=163840 outq=0 send_len=3
53 dhcpcd-dbus: connected to wpa_supplicant on interface eth0
53 dhcpcd-dbus: scan results on interface eth0
53 wpa_supplicant[7248]: CTRL-DEBUG: ctrl_sock-sendto: sock=8 sndbuf=163840 outq=0 send_len=0
53 wpa_supplicant[7248]: eth0: Control interface command 'SCAN'
53 wpa_supplicant[7248]: eth0: Setting scan request: 0.000000 sec
53 wpa_supplicant[7248]: CTRL-DEBUG: ctrl_sock-sendto: sock=8 sndbuf=163840 outq=0 send_len=3
53 wpa_supplicant[7248]: eth0: State: DISCONNECTED -> SCANNING
53 wpa_supplicant[7248]: eth0: Starting AP scan for wildcard SSID
53 wpa_supplicant[7248]: eth0: Add radio work 'scan'@0x118c830
53 wpa_supplicant[7248]: eth0: First radio work item in the queue - schedule start immediately
53 wpa_supplicant[7248]: eth0: Starting radio work 'scan'@0x118c830 after 0.000071 second wait
53 wpa_supplicant[7248]: Scan requested (ret=0) - scan timeout 10 seconds
53 wpa_supplicant[7248]: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
53 wpa_supplicant[7248]: RTM_NEWLINK, IFLA_IFNAME: Interface 'eth0' added
53 wpa_supplicant[7248]: WEXT: if_removed already cleared - ignore event
53 wpa_supplicant[7248]: Wireless event: cmd=0x8b19 len=8
53 wpa_supplicant[7248]: eth0: Event SCAN_RESULTS (3) received
53 wpa_supplicant[7248]: ioctl[SIOCGIWSCAN]: Resource temporarily unavailable
53 wpa_supplicant[7248]: eth0: Failed to get scan results
53 wpa_supplicant[7248]: eth0: Failed to get scan results - try scanning again
53 wpa_supplicant[7248]: eth0: Short-circuit new scan request since there are no enabled networks
53 wpa_supplicant[7248]: eth0: State: SCANNING -> INACTIVE
53 wpa_supplicant[7248]: eth0: Radio work 'scan'@0x118c830 done in 0.002150 seconds
53 wpa_supplicant[7248]: eth0: radio_work_free('scan'@0x118c830): num_active_works --> 0
54 wpa_supplicant[7248]: EAPOL: disable timer tick
54 wpa_supplicant[7248]: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
54 wpa_supplicant[7248]: RTM_NEWLINK, IFLA_IFNAME: Interface 'eth0' added
54 wpa_supplicant[7248]: WEXT: if_removed already cleared - ignore event
54 wpa_supplicant[7248]: Wireless event: cmd=0x8b15 len=20
54 wpa_supplicant[7248]: Wireless event: new AP: 00:00:00:00:00:00
54 wpa_supplicant[7248]: eth0: Event DISASSOC (1) received
54 wpa_supplicant[7248]: eth0: Disassociation notification
54 wpa_supplicant[7248]: eth0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=2)
54 wpa_supplicant[7248]: eth0: Do not request new immediate scan
54 wpa_supplicant[7248]: eth0: WPA: Clear old PMK and PTK
54 wpa_supplicant[7248]: eth0: Disconnect event - remove keys
54 wpa_supplicant[7248]: eth0: State: INACTIVE -> DISCONNECTED
54 wpa_supplicant[7248]: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
54 wpa_supplicant[7248]: netlink: Operstate: ifindex=28 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
54 wpa_supplicant[7248]: EAPOL: External notification - portEnabled=0
54 wpa_supplicant[7248]: EAPOL: External notification - portValid=0
54 wpa_supplicant[7248]: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
54 wpa_supplicant[7248]: RTM_NEWLINK, IFLA_IFNAME: Interface 'eth0' added
54 wpa_supplicant[7248]: WEXT: if_removed already cleared - ignore event
54 wpa_supplicant[7248]: Wireless event: cmd=0x8b19 len=8
54 wpa_supplicant[7248]: eth0: Event SCAN_RESULTS (3) received
54 wpa_supplicant[7248]: Scan results did not fit - trying larger buffer (8192 bytes)

Some ideas:

  • Test this somewhere with fewer access points: check if this is caused by a long (19-23) list of results
  • Try a different rtl8192 driver / firmware: may be overkill
  • Add a quirk that introduces a short wait after starting a scan
  • Add a quirk that removes 0d5c8ee or at least delays it by a few seconds

Workarounds:

  1. Add a non-existent access point to the configuration file to prevent nickel from accessing the internet
  2. Use a custom wpa_supplicant.conf that is not used by nickel for the same purpose

Do you have any preference or thoughts on this?

@NiLuJe
Copy link
Member

NiLuJe commented Dec 6, 2024

Huh. The whole point of #13 was exactly to handle that initial INACTIVE state when there aren't any APs configured, so I'm curious where the heuristic is falling on its ass here...

(i.e., uncomment the two "For debugging purposes" print calls, and perhaps add another one that does something along the lines of print(status and status.wpa_state or nil) next to the last one).

Either something's wonky in the current heuristic, or we just need to be more aggressive with that check (as discussed in the PR).

@hrdl-github
Copy link
Author

Something like this:

SCAN reply:     OK
done=nil, found_result=nil, incoming=false
getStatus reply line:   wpa_state=INACTIVE

When it succeeds I get some events and incoming is true. Sometimes I do see the status to switch to SCANNING at the second attempt, but not always.

@hrdl-github
Copy link
Author

Another suggestions: how about creating an additional koreader_wpa_supplicant.conf derived from settings/network.lua and launching wpa_supplicant with an additional argument -I koreader_wpa_supplicant.conf? Scanning / connection may need to be tweaked or made conditional in that case

@NiLuJe
Copy link
Member

NiLuJe commented Dec 8, 2024

Something like this:

SCAN reply:     OK
done=nil, found_result=nil, incoming=false
getStatus reply line:   wpa_state=INACTIVE

Well, that should return early, that was the whole point of #13 o_O.

how about

Too platform-specific ;).

@hrdl-github
Copy link
Author

I don't even need to submit a SCAN command. After starting wpa_supplicant there are some state changes (DISCONNECTED -> INACTIVE -> DISCONNECTED -> DISCONNECTED), before a SCAN_RESULTS event is received a second later. I don't know if it's wext or the rtl8192 driver that cause this behaviour or how other drivers behave. Full output of wpa_supplicant:

Dec 15 15:56:39 wpa_supplicant[2120]: wpa_supplicant v2.9-hostap_2_9-11-g77a773710+
Dec 15 15:56:39 wpa_supplicant[2120]: random: Trying to read entropy from /dev/random
Dec 15 15:56:39 wpa_supplicant[2120]: Successfully initialized wpa_supplicant
Dec 15 15:56:39 wpa_supplicant[2120]: Initializing interface 'eth0' conf '/etc/wpa_supplicant/wpa_supplicant.conf' driver 'wext' ctrl_interface '/var/run/wpa_supplicant' bridge 'N/A'
Dec 15 15:56:39 wpa_supplicant[2120]: Configuration file '/etc/wpa_supplicant/wpa_supplicant.conf' -> '/etc/wpa_supplicant/wpa_supplicant.conf'
Dec 15 15:56:39 wpa_supplicant[2120]: Reading configuration file '/etc/wpa_supplicant/wpa_supplicant.conf'
Dec 15 15:56:39 wpa_supplicant[2120]: ctrl_interface='/var/run/wpa_supplicant'
Dec 15 15:56:39 wpa_supplicant[2120]: update_config=1
Dec 15 15:56:39 wpa_supplicant[2120]: rfkill: Cannot get wiphy information
Dec 15 15:56:39 wpa_supplicant[2120]: WEXT: RFKILL status not available
Dec 15 15:56:39 wpa_supplicant[2120]: SIOCGIWRANGE: WE(compiled)=22 WE(source)=16 enc_capa=0xf
Dec 15 15:56:39 wpa_supplicant[2120]:   capabilities: key_mgmt 0xf enc 0x1f flags 0x0
Dec 15 15:56:39 wpa_supplicant[2120]: ioctl[SIOCSIWAP]: Operation not permitted
Dec 15 15:56:39 wpa_supplicant[2120]: WEXT: Failed to clear BSSID selection on disconnect
Dec 15 15:56:39 wpa_supplicant[2120]: WEXT: Driver: rtl8192es
Dec 15 15:56:39 wpa_supplicant[2120]: netlink: Operstate: ifindex=5 linkmode=1 (userspace-control), operstate=5 (IF_OPER_DORMANT)
Dec 15 15:56:39 wpa_supplicant[2120]: Add interface eth0 to a new radio N/A
Dec 15 15:56:39 wpa_supplicant[2120]: eth0: Own MAC address: CENSORED
Dec 15 15:56:39 wpa_supplicant[2120]: wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
Dec 15 15:56:39 wpa_supplicant[2120]: wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
Dec 15 15:56:39 wpa_supplicant[2120]: wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
Dec 15 15:56:39 wpa_supplicant[2120]: wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
Dec 15 15:56:39 wpa_supplicant[2120]: wpa_driver_wext_set_key: alg=0 key_idx=4 set_tx=0 seq_len=0 key_len=0
Dec 15 15:56:39 wpa_supplicant[2120]: ioctl[SIOCSIWENCODEEXT]: Invalid argument
Dec 15 15:56:39 wpa_supplicant[2120]: Driver did not support SIOCSIWENCODEEXT
Dec 15 15:56:39 wpa_supplicant[2120]: wpa_driver_wext_set_key: alg=0 key_idx=5 set_tx=0 seq_len=0 key_len=0
Dec 15 15:56:39 wpa_supplicant[2120]: ioctl[SIOCSIWENCODEEXT]: Invalid argument
Dec 15 15:56:39 wpa_supplicant[2120]: Driver did not support SIOCSIWENCODEEXT
Dec 15 15:56:39 wpa_supplicant[2120]: wpa_driver_wext_set_countermeasures
Dec 15 15:56:39 wpa_supplicant[2120]: eth0: RSN: flushing PMKID list in the driver
Dec 15 15:56:39 wpa_supplicant[2120]: eth0: State: DISCONNECTED -> INACTIVE
Dec 15 15:56:39 wpa_supplicant[2120]: eth0: WPS: UUID based on MAC address: 110e0f10-a3de-5dfe-84d1-fe3ed4a086e5
Dec 15 15:56:39 wpa_supplicant[2120]: EAPOL: SUPP_PAE entering state DISCONNECTED
Dec 15 15:56:39 wpa_supplicant[2120]: EAPOL: Supplicant port status: Unauthorized
Dec 15 15:56:39 wpa_supplicant[2120]: EAPOL: KEY_RX entering state NO_KEY_RECEIVE
Dec 15 15:56:39 wpa_supplicant[2120]: EAPOL: SUPP_BE entering state INITIALIZE
Dec 15 15:56:39 wpa_supplicant[2120]: EAP: EAP entering state DISABLED
Dec 15 15:56:39 wpa_supplicant[2120]: eth0: Added interface eth0
Dec 15 15:56:39 wpa_supplicant[2120]: eth0: State: INACTIVE -> DISCONNECTED
Dec 15 15:56:39 wpa_supplicant[2120]: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
Dec 15 15:56:39 wpa_supplicant[2120]: netlink: Operstate: ifindex=5 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
Dec 15 15:56:39 wpa_supplicant[2120]: Daemonize..
Dec 15 15:56:39 wpa_supplicant[2121]: random: Got 20/20 bytes from /dev/random
Dec 15 15:56:39 wpa_supplicant[2121]: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Dec 15 15:56:39 wpa_supplicant[2121]: RTM_NEWLINK, IFLA_IFNAME: Interface 'eth0' added
Dec 15 15:56:39 wpa_supplicant[2121]: WEXT: if_removed already cleared - ignore event
Dec 15 15:56:39 wpa_supplicant[2121]: Wireless event: cmd=0x8b06 len=8
Dec 15 15:56:39 wpa_supplicant[2121]: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Dec 15 15:56:39 wpa_supplicant[2121]: RTM_NEWLINK, IFLA_IFNAME: Interface 'eth0' added
Dec 15 15:56:39 wpa_supplicant[2121]: WEXT: if_removed already cleared - ignore event
Dec 15 15:56:39 wpa_supplicant[2121]: Wireless event: cmd=0x8b1a len=40
Dec 15 15:56:39 wpa_supplicant[2121]: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Dec 15 15:56:39 wpa_supplicant[2121]: RTM_NEWLINK, IFLA_IFNAME: Interface 'eth0' added
Dec 15 15:56:39 wpa_supplicant[2121]: WEXT: if_removed already cleared - ignore event
Dec 15 15:56:39 wpa_supplicant[2121]: CTRL_IFACE monitor attached /tmp/lj-wpaclient-1895\x00
Dec 15 15:56:39 wpa_supplicant[2121]: CTRL-DEBUG: ctrl_sock-sendto: sock=8 sndbuf=163840 outq=0 send_len=3
Dec 15 15:56:39 wpa_supplicant[2121]: EAPOL: EAP Session-Id not available
Dec 15 15:56:39 wpa_supplicant[2121]: CTRL-DEBUG: ctrl_sock-sendto: sock=8 sndbuf=163840 outq=0 send_len=91
Dec 15 15:56:39 wpa_supplicant[2121]: EAPOL: EAP Session-Id not available
Dec 15 15:56:39 wpa_supplicant[2121]: CTRL-DEBUG: ctrl_sock-sendto: sock=8 sndbuf=163840 outq=0 send_len=91
Dec 15 15:56:39 wpa_supplicant[2121]: EAPOL: EAP Session-Id not available
Dec 15 15:56:39 wpa_supplicant[2121]: CTRL-DEBUG: ctrl_sock-sendto: sock=8 sndbuf=163840 outq=0 send_len=91
Dec 15 15:56:39 wpa_supplicant[2121]: EAPOL: EAP Session-Id not available
Dec 15 15:56:39 wpa_supplicant[2121]: CTRL-DEBUG: ctrl_sock-sendto: sock=8 sndbuf=163840 outq=0 send_len=91
Dec 15 15:56:39 wpa_supplicant[2121]: EAPOL: EAP Session-Id not available
Dec 15 15:56:39 wpa_supplicant[2121]: CTRL-DEBUG: ctrl_sock-sendto: sock=8 sndbuf=163840 outq=0 send_len=91
Dec 15 15:56:39 wpa_supplicant[2121]: EAPOL: EAP Session-Id not available
Dec 15 15:56:39 wpa_supplicant[2121]: CTRL-DEBUG: ctrl_sock-sendto: sock=8 sndbuf=163840 outq=0 send_len=91
Dec 15 15:56:39 wpa_supplicant[2121]: EAPOL: EAP Session-Id not available
Dec 15 15:56:39 wpa_supplicant[2121]: CTRL-DEBUG: ctrl_sock-sendto: sock=8 sndbuf=163840 outq=0 send_len=91
Dec 15 15:56:40 wpa_supplicant[2121]: EAPOL: EAP Session-Id not available
Dec 15 15:56:40 wpa_supplicant[2121]: CTRL-DEBUG: ctrl_sock-sendto: sock=8 sndbuf=163840 outq=0 send_len=91
Dec 15 15:56:40 wpa_supplicant[2121]: EAPOL: EAP Session-Id not available
Dec 15 15:56:40 wpa_supplicant[2121]: CTRL-DEBUG: ctrl_sock-sendto: sock=8 sndbuf=163840 outq=0 send_len=91
Dec 15 15:56:40 wpa_supplicant[2121]: EAPOL: EAP Session-Id not available
Dec 15 15:56:40 wpa_supplicant[2121]: CTRL-DEBUG: ctrl_sock-sendto: sock=8 sndbuf=163840 outq=0 send_len=91
Dec 15 15:56:40 wpa_supplicant[2121]: EAPOL: disable timer tick
Dec 15 15:56:40 wpa_supplicant[2121]: EAPOL: EAP Session-Id not available
Dec 15 15:56:40 wpa_supplicant[2121]: CTRL-DEBUG: ctrl_sock-sendto: sock=8 sndbuf=163840 outq=0 send_len=91
Dec 15 15:56:40 wpa_supplicant[2121]: EAPOL: EAP Session-Id not available
Dec 15 15:56:40 wpa_supplicant[2121]: CTRL-DEBUG: ctrl_sock-sendto: sock=8 sndbuf=163840 outq=0 send_len=91
Dec 15 15:56:40 wpa_supplicant[2121]: EAPOL: EAP Session-Id not available
Dec 15 15:56:40 wpa_supplicant[2121]: CTRL-DEBUG: ctrl_sock-sendto: sock=8 sndbuf=163840 outq=0 send_len=91
Dec 15 15:56:40 wpa_supplicant[2121]: EAPOL: EAP Session-Id not available
Dec 15 15:56:40 wpa_supplicant[2121]: CTRL-DEBUG: ctrl_sock-sendto: sock=8 sndbuf=163840 outq=0 send_len=91
Dec 15 15:56:40 wpa_supplicant[2121]: EAPOL: EAP Session-Id not available
Dec 15 15:56:40 wpa_supplicant[2121]: CTRL-DEBUG: ctrl_sock-sendto: sock=8 sndbuf=163840 outq=0 send_len=91
Dec 15 15:56:40 wpa_supplicant[2121]: EAPOL: EAP Session-Id not available
Dec 15 15:56:40 wpa_supplicant[2121]: CTRL-DEBUG: ctrl_sock-sendto: sock=8 sndbuf=163840 outq=0 send_len=91
Dec 15 15:56:40 wpa_supplicant[2121]: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Dec 15 15:56:40 wpa_supplicant[2121]: RTM_NEWLINK, IFLA_IFNAME: Interface 'eth0' added
Dec 15 15:56:40 wpa_supplicant[2121]: WEXT: if_removed already cleared - ignore event
Dec 15 15:56:40 wpa_supplicant[2121]: Wireless event: cmd=0x8b15 len=20
Dec 15 15:56:40 wpa_supplicant[2121]: Wireless event: new AP: 00:00:00:00:00:00
Dec 15 15:56:40 wpa_supplicant[2121]: eth0: Event DISASSOC (1) received
Dec 15 15:56:40 wpa_supplicant[2121]: eth0: Disassociation notification
Dec 15 15:56:40 wpa_supplicant[2121]: eth0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=0)
Dec 15 15:56:40 wpa_supplicant[2121]: eth0: Do not request new immediate scan
Dec 15 15:56:40 wpa_supplicant[2121]: eth0: WPA: Clear old PMK and PTK
Dec 15 15:56:40 wpa_supplicant[2121]: eth0: Disconnect event - remove keys
Dec 15 15:56:40 wpa_supplicant[2121]: eth0: State: DISCONNECTED -> DISCONNECTED
Dec 15 15:56:40 wpa_supplicant[2121]: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
Dec 15 15:56:40 wpa_supplicant[2121]: netlink: Operstate: ifindex=5 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
Dec 15 15:56:40 wpa_supplicant[2121]: EAPOL: External notification - portEnabled=0
Dec 15 15:56:40 wpa_supplicant[2121]: EAPOL: External notification - portValid=0
Dec 15 15:56:40 wpa_supplicant[2121]: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Dec 15 15:56:40 wpa_supplicant[2121]: RTM_NEWLINK, IFLA_IFNAME: Interface 'eth0' added
Dec 15 15:56:40 wpa_supplicant[2121]: WEXT: if_removed already cleared - ignore event
Dec 15 15:56:40 wpa_supplicant[2121]: Wireless event: cmd=0x8b19 len=8
Dec 15 15:56:40 wpa_supplicant[2121]: eth0: Event SCAN_RESULTS (3) received
Dec 15 15:56:40 wpa_supplicant[2121]: Scan results did not fit - trying larger buffer (8192 bytes)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants