Bug 744155 - [iwlagn] kernel crash on wifi device
Summary: [iwlagn] kernel crash on wifi device
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Fedora
Classification: Fedora
Component: kernel
Version: 16
Hardware: Unspecified
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
Assignee: Stanislaw Gruszka
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2011-10-07 09:53 UTC by Sergei LITVINENKO
Modified: 2011-10-20 04:02 UTC (History)
9 users (show)

Fixed In Version: kernel-3.1.0-0.rc10.git0.1.fc16
Clone Of:
Environment:
Last Closed: 2011-10-20 04:02:20 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)
Screen after system is crashed (2.88 MB, image/jpeg)
2011-10-07 09:53 UTC, Sergei LITVINENKO
no flags Details
It is serie of screens (rsyslog is disabled) (8.48 MB, application/zip)
2011-10-11 08:41 UTC, Sergei LITVINENKO
no flags Details

Description Sergei LITVINENKO 2011-10-07 09:53:03 UTC
Created attachment 526850 [details]
Screen after system is crashed

Description of problem:
As soon as wifi try to connect to AP, system crash.

Version-Release number of selected component (if applicable):
3.1.0-0.rc8.git0.1.fc16.i686.PAE
wpa_supplicant-0.7.3-11.fc16.i686

How reproducible:
100%

Steps to Reproduce:
1. Prepare wifi connection (WPA2-Personal) in NetworkManager
2. Up connection
3.
  
Actual results:

System crash


Expected results:

System work

Additional info:

HW: HP EliteBook 2540p (WK304EA)

Crash is reproduced by command line:
wpa_supplicant -Dwext -iwlan0 -c/etc/wpa_supplicant/wpa_supplicant.conf

Of cource, WPA2-Personal profile is prepared

[root@ua-dudn00000 ~]# cat /etc/wpa_supplicant/wpa_supplicant.conf
ctrl_interface=/var/run/wpa_supplicant
ctrl_interface_group=wheel


# WPA2-Personal
###############
network={
          ssid="yyyyyyyy"
          #psk="xxxxxxxx"
          sk=xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
          proto=RSN
          key_mgmt=WPA-PSK
          pairwise=CCMP
          group=CCMP
          priority=1
}


[root@ua-dudn00000 ~]# ethtool -i wlan0
driver: iwlagn
version: 3.1.0-0.rc8.git0.1.fc16.i686.PA
firmware-version: 9.221.4.1 build 25532
bus-info: 0000:43:00.0
supports-statistics: no
supports-test: no
supports-eeprom-access: no
supports-register-dump: no


[root@ua-dudn00000 ~]# lspci
00:00.0 Host bridge: Intel Corporation Core Processor DRAM Controller (rev 02)
00:02.0 VGA compatible controller: Intel Corporation Core Processor Integrated Graphics Controller (rev 02)
00:16.0 Communication controller: Intel Corporation 5 Series/3400 Series Chipset HECI Controller (rev 06)
00:16.3 Serial controller: Intel Corporation 5 Series/3400 Series Chipset KT Controller (rev 06)
00:19.0 Ethernet controller: Intel Corporation 82577LM Gigabit Network Connection (rev 05)
00:1a.0 USB Controller: Intel Corporation 5 Series/3400 Series Chipset USB2 Enhanced Host Controller (rev 05)
00:1b.0 Audio device: Intel Corporation 5 Series/3400 Series Chipset High Definition Audio (rev 05)
00:1c.0 PCI bridge: Intel Corporation 5 Series/3400 Series Chipset PCI Express Root Port 1 (rev 05)
00:1c.1 PCI bridge: Intel Corporation 5 Series/3400 Series Chipset PCI Express Root Port 2 (rev 05)
00:1c.3 PCI bridge: Intel Corporation 5 Series/3400 Series Chipset PCI Express Root Port 4 (rev 05)
00:1d.0 USB Controller: Intel Corporation 5 Series/3400 Series Chipset USB2 Enhanced Host Controller (rev 05)
00:1e.0 PCI bridge: Intel Corporation 82801 Mobile PCI Bridge (rev a5)
00:1f.0 ISA bridge: Intel Corporation Mobile 5 Series Chipset LPC Interface Controller (rev 05)
00:1f.2 SATA controller: Intel Corporation 5 Series/3400 Series Chipset 6 port SATA AHCI Controller (rev 05)
00:1f.6 Signal processing controller: Intel Corporation 5 Series/3400 Series Chipset Thermal Subsystem (rev 05)
43:00.0 Network controller: Intel Corporation Centrino Advanced-N 6200 (rev 35)
44:06.0 FireWire (IEEE 1394): Ricoh Co Ltd R5C832 IEEE 1394 Controller (rev 06)
44:06.1 SD Host controller: Ricoh Co Ltd R5C822 SD/SDIO/MMC/MS/MSPro Host Adapter (rev 25)
44:06.2 CardBus bridge: Ricoh Co Ltd RL5c476 II (rev bb)
ff:00.0 Host bridge: Intel Corporation Core Processor QuickPath Architecture Generic Non-core Registers (rev 02)
ff:00.1 Host bridge: Intel Corporation Core Processor QuickPath Architecture System Address Decoder (rev 02)
ff:02.0 Host bridge: Intel Corporation Core Processor QPI Link 0 (rev 02)
ff:02.1 Host bridge: Intel Corporation Core Processor QPI Physical 0 (rev 02)
ff:02.2 Host bridge: Intel Corporation Core Processor Reserved (rev 02)
ff:02.3 Host bridge: Intel Corporation Core Processor Reserved (rev 02)

=======================================================================
1. Under F15 wifi work OK.
2. System do not crash with different wifi device, as exemple with:
Bus 002 Device 003: ID 0b05:1723 ASUSTek Computer, Inc. WL-167G v2 802.11g Adapter [Ralink RT73]

Comment 1 Stanislaw Gruszka 2011-10-08 18:09:53 UTC
Call trace photo does not show functions form iwlagn driver, so it's impossible to tell where the bug is. Could you try kernel-debug and see if it print something different at crash?

Comment 2 Sergei LITVINENKO 2011-10-09 08:39:36 UTC
Also:

[root@ua-dudn00000 wpa_supplicant]# /usr/sbin/wpa_supplicant -c /etc/wpa_supplicant/wpa_supplicant.conf.homedesk -iwlan0 -Dwext -dd
Initializing interface 'wlan0' conf '/etc/wpa_supplicant/wpa_supplicant.conf.homedesk' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/etc/wpa_supplicant/wpa_supplicant.conf.homedesk' -> '/etc/wpa_supplicant/wpa_supplicant.conf.homedesk'
Reading configuration file '/etc/wpa_supplicant/wpa_supplicant.conf.homedesk'
ctrl_interface='/var/run/wpa_supplicant'
ctrl_interface_group='wheel'
Line: 7 - start of a new network block
ssid - hexdump_ascii(len=8):
     68 6f 6d 65 64 65 73 6b                           homedesk        
PSK - hexdump(len=32): [REMOVED]
proto: 0x2
key_mgmt: 0x2
pairwise: 0x10
group: 0x10
priority=1 (0x1)
Priority group 1
   id=0 ssid='homedesk'
WEXT: cfg80211-based driver detected
SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf
  capabilities: key_mgmt 0xf enc 0xf flags 0x0
netlink: Operstate: linkmode=1, operstate=5
Own MAC address: 00:23:14:08:c6:40
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
RSN: flushing PMKID list in the driver
Setting scan request: 0 sec 100000 usec
WPS: UUID based on MAC address - hexdump(len=16): 81 5b 04 05 53 d3 53 e2 8f 2f 89 8a eb 56 fe 13
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: Supplicant port status: Unauthorized
EAPOL: Supplicant port status: Unauthorized
ctrl_interface_group=10 (from group name 'wheel')
Added interface wlan0
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b1a len=8
State: DISCONNECTED -> SCANNING
Starting AP scan for wildcard SSID
Scan requested (ret=0) - scan timeout 5 seconds
EAPOL: disable timer tick
EAPOL: Supplicant port status: Unauthorized
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b19 len=8
Received 1698 bytes of scan results (5 BSSes)
BSS: Start scan result update 1
BSS: Add new id 0 BSSID 00:18:f8:ae:50:a0 SSID 'homedesk'
BSS: Add new id 1 BSSID 00:17:9a:22:f1:26 SSID 'dlinkhome'
BSS: Add new id 2 BSSID 00:24:01:ba:4d:ff SSID 'dlink'
BSS: Add new id 3 BSSID 00:27:19:d5:ee:74 SSID 'benedik'
BSS: Add new id 4 BSSID d8:5d:4c:ee:85:66 SSID 'VLAD'
New scan results available
Selecting BSS from priority group 1
Try to find WPA-enabled AP
0: 00:18:f8:ae:50:a0 ssid='homedesk' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
   selected based on RSN IE
   selected WPA AP 00:18:f8:ae:50:a0 ssid='homedesk'
Trying to associate with 00:18:f8:ae:50:a0 (SSID='homedesk' freq=2412 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
No keys have been configured - skip key clearing
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
wpa_driver_wext_set_drop_unencrypted
wpa_driver_wext_set_psk
Setting authentication timeout: 20 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP fail=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portControl=Auto
EAPOL: Supplicant port status: Unauthorized
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b1a len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b04 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b1a len=16

Message from syslogd@localhost at Oct  9 11:28:00 ...
 kernel:[ 1088.940841] Oops: 0000 [#1] SMP 

Message from syslogd@localhost at Oct  9 11:28:00 ...
 kernel:[ 1088.989521] Process kworker/u:5 (pid: 71, ti=f1b9c000 task=f1a29920 task.ti=f1b9c000)

Message from syslogd@localhost at Oct  9 11:28:00 ...
 kernel:[ 1088.993352] Stack:

Message from syslogd@localhost at Oct  9 11:28:00 ...
 kernel:[ 1089.009070] Call Trace:

Message from syslogd@localhost at Oct  9 11:28:00 ...
 kernel:[ 1089.090207] Code: 24 04 1c f6 c5 f8 8b 55 d4 8b 82 9c 05 00 00 e9 90 fe ff ff 8b 55 d8 8b 02 85 c0 74 1a 83 38 02 75 15 8b 4d d4 8b 51 0c 8b 52 24 <8b> 52 04 85 d2 74 05 e8 52 dd 67 00 83 c4 4c 89 d8 5b 5e 5f 5d 

Message from syslogd@localhost at Oct  9 11:28:00 ...
 kernel:[ 1089.098364] EIP: [<f8c453ba>] iwlagn_commit_rxon+0x772/0x799 [iwlagn] SS:ESP 0068:f1b9dc60

Message from syslogd@localhost at Oct  9 11:28:00 ...
 kernel:[ 1089.102491] CR2: 0000000000000004
RX EAPOL from 00:18:f8:ae:50:a0
RX EAPOL - hexdump(len=99): 01 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 d1 a0 59 41 86 d6 7e a8 03 a6 73 15 55 33 ae 7b b4 77 e9 b8 42 7c 69 c0 d2 b4 f1 73 95 d7 41 0e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Not associated - Delay processing of received EAPOL frame
RX EAPOL from 00:18:f8:ae:50:a0
RX EAPOL - hexdump(len=99): 01 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 d8 00 71 e8 de 39 84 f6 9e ac ce 8b 34 02 5d d3 ef 68 35 cb b2 a6 33 91 e3 38 0c 3c 81 b1 79 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Not associated - Delay processing of received EAPOL frame
RX EAPOL from 00:18:f8:ae:50:a0
RX EAPOL - hexdump(len=99): 01 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 76 a0 65 f5 d7 03 d6 29 94 c7 91 74 a5 22 9d c0 44 d8 71 e1 d7 03 0d af 94 fe 20 4e 3c 6f 23 fa 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Not associated - Delay processing of received EAPOL frame
RX EAPOL from 00:18:f8:ae:50:a0
RX EAPOL - hexdump(len=99): 01 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 04 cc e7 32 d1 5a 47 56 8e 56 53 6b 23 80 8d 20 a6 c9 43 cd eb 93 eb 8a f7 b7 6b b9 2b 57 0d cf af 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Not associated - Delay processing of received EAPOL frame

==================================================================
next terminal screen
==================================================================

[root@ua-dudn00000 log]# 
Message from syslogd@localhost at Oct  9 11:28:00 ...
 kernel:[ 1088.940841] Oops: 0000 [#1] SMP 

Message from syslogd@localhost at Oct  9 11:28:00 ...
 kernel:[ 1088.989521] Process kworker/u:5 (pid: 71, ti=f1b9c000 task=f1a29920 task.ti=f1b9c000)

Message from syslogd@localhost at Oct  9 11:28:00 ...
 kernel:[ 1088.993352] Stack:

Message from syslogd@localhost at Oct  9 11:28:00 ...
 kernel:[ 1089.009070] Call Trace:

Message from syslogd@localhost at Oct  9 11:28:00 ...
 kernel:[ 1089.090207] Code: 24 04 1c f6 c5 f8 8b 55 d4 8b 82 9c 05 00 00 e9 90 fe ff ff 8b 55 d8 8b 02 85 c0 74 1a 83 38 02 75 15 8b 4d d4 8b 51 0c 8b 52 24 <8b> 52 04 85 d2 74 05 e8 52 dd 67 00 83 c4 4c 89 d8 5b 5e 5f 5d 

Message from syslogd@localhost at Oct  9 11:28:00 ...
 kernel:[ 1089.098364] EIP: [<f8c453ba>] iwlagn_commit_rxon+0x772/0x799 [iwlagn] SS:ESP 0068:f1b9dc60

Message from syslogd@localhost at Oct  9 11:28:00 ...
 kernel:[ 1089.102491] CR2: 0000000000000004

Comment 3 Sergei LITVINENKO 2011-10-09 09:05:52 UTC
OK, Debug Kernel...


Last login: Sun Oct  9 11:46:59 2011 from homedesk
[root@ua-dudn00000 ~]# /usr/sbin/wpa_supplicant -c /etc/wpa_supplicant/wpa_supplicant.conf.homedesk -iwlan0 -Dwext -dd
Initializing interface 'wlan0' conf '/etc/wpa_supplicant/wpa_supplicant.conf.homedesk' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/etc/wpa_supplicant/wpa_supplicant.conf.homedesk' -> '/etc/wpa_supplicant/wpa_supplicant.conf.homedesk'
Reading configuration file '/etc/wpa_supplicant/wpa_supplicant.conf.homedesk'
ctrl_interface='/var/run/wpa_supplicant'
ctrl_interface_group='wheel'
Line: 7 - start of a new network block
ssid - hexdump_ascii(len=8):
     68 6f 6d 65 64 65 73 6b                           homedesk        
PSK - hexdump(len=32): [REMOVED]
proto: 0x2
key_mgmt: 0x2
pairwise: 0x10
group: 0x10
priority=1 (0x1)
Priority group 1
   id=0 ssid='homedesk'
WEXT: cfg80211-based driver detected
SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf
  capabilities: key_mgmt 0xf enc 0xf flags 0x0
netlink: Operstate: linkmode=1, operstate=5
Own MAC address: 00:23:14:08:c6:40
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
RSN: flushing PMKID list in the driver
Setting scan request: 0 sec 100000 usec
WPS: UUID based on MAC address - hexdump(len=16): 81 5b 04 05 53 d3 53 e2 8f 2f 89 8a eb 56 fe 13
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: Supplicant port status: Unauthorized
EAPOL: Supplicant port status: Unauthorized
ctrl_interface_group=10 (from group name 'wheel')                                                                                                             
Added interface wlan0                                                                                                                                         
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])                                                                                                              
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added                                                                                                             
Wireless event: cmd=0x8b06 len=8                                                                                                                              
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])                                                                                                              
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added                                                                                                             
Wireless event: cmd=0x8b1a len=8                                                                                                                              
State: DISCONNECTED -> SCANNING                                                                                                                               
Starting AP scan for wildcard SSID                                                                                                                            
Scan requested (ret=0) - scan timeout 5 seconds                                                                                                               
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])                                                                                                              
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added                                                                                                             
Wireless event: cmd=0x8b19 len=8
Received 2792 bytes of scan results (7 BSSes)
BSS: Start scan result update 1
BSS: Add new id 0 BSSID 00:18:f8:ae:50:a0 SSID 'homedesk'
BSS: Add new id 1 BSSID 94:0c:6d:a2:ca:10 SSID 'Mag'
BSS: Add new id 2 BSSID 00:18:e7:fa:ef:ed SSID 'IOE_HOME'
BSS: Add new id 3 BSSID 00:27:19:d5:ee:74 SSID 'benedik'
BSS: Add new id 4 BSSID 00:17:9a:22:f1:26 SSID 'dlinkhome'
BSS: Add new id 5 BSSID d8:5d:4c:ee:85:66 SSID 'VLAD'
BSS: Add new id 6 BSSID 00:21:29:99:6c:02 SSID ''
New scan results available
WPS: attr type=0x104a len=1
WPS: attr type=0x1044 len=1
WPS: attr type=0x104a len=1
WPS: attr type=0x1044 len=1
Selecting BSS from priority group 1
Try to find WPA-enabled AP
0: 00:18:f8:ae:50:a0 ssid='homedesk' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
   selected based on RSN IE
   selected WPA AP 00:18:f8:ae:50:a0 ssid='homedesk'
Trying to associate with 00:18:f8:ae:50:a0 (SSID='homedesk' freq=2412 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
No keys have been configured - skip key clearing
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
wpa_driver_wext_set_drop_unencrypted
wpa_driver_wext_set_psk
Setting authentication timeout: 20 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP fail=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portControl=Auto
EAPOL: Supplicant port status: Unauthorized
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b1a len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b04 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b1a len=16

=============================================================
Fifferent terminal screen
=============================================================

Message from syslogd@localhost at Oct  9 11:47:58 ...
 kernel:[  127.413834] Oops: 0000 [#1] SMP 

Message from syslogd@localhost at Oct  9 11:47:58 ...
 kernel:[  127.416016] Process kworker/u:5 (pid: 72, ti=f63a0000 task=f6394110 task.ti=f63a0000)

Message from syslogd@localhost at Oct  9 11:47:58 ...
 kernel:[  127.416127] Stack:

Message from syslogd@localhost at Oct  9 11:47:58 ...
 kernel:[  127.416677] Call Trace:

Message from syslogd@localhost at Oct  9 11:47:58 ...
 kernel:[  127.457774] Code: 24 04 a0 22 da f8 8b 55 d4 8b 82 4c 06 00 00 e9 90 fe ff ff 8b 55 d8 8b 02 85 c0 74 1a 83 38 02 75 15 8b 4d d4 8b 51 0c 8b 52 24 <8b> 52 04 85 d2 74 05 e8 9c e0 f3 ff 83 c4 4c 89 d8 5b 5e 5f 5d 

Message from syslogd@localhost at Oct  9 11:47:58 ...
 kernel:[  127.465926] EIP: [<f8d83afc>] iwlagn_commit_rxon+0x79b/0x7c2 [iwlagn] SS:ESP 0068:f63a1c1c

Message from syslogd@localhost at Oct  9 11:47:58 ...
 kernel:[  127.469858] CR2: 0000000000000004

Message from syslogd@localhost at Oct  9 11:47:58 ...
 kernel:[  127.486753] Oops: 0000 [#2] SMP 

Message from syslogd@localhost at Oct  9 11:47:58 ...
 kernel:[  127.516438] Process kworker/u:5 (pid: 72, ti=f63a0000 task=f6394110 task.ti=f63a0000)

Message from syslogd@localhost at Oct  9 11:47:58 ...
 kernel:[  127.518410] Stack:

Message from syslogd@localhost at Oct  9 11:47:58 ...
 kernel:[  127.526765] Call Trace:

Message from syslogd@localhost at Oct  9 11:47:58 ...
 kernel:[  127.527053] Code: 85 00 c2 87 c0 89 d8 c1 e6 02 29 f2 e8 fd 17 fe ff 81 4b 0c 00 00 00 04 5b 5e 5d c3 55 89 e5 3e 8d 74 26 00 8b 80 58 02 00 00 5d <8b> 40 fc c3 55 89 e5 3e 8d 74 26 00 31 c0 5d c3 55 89 e5 57 56 

Message from syslogd@localhost at Oct  9 11:47:58 ...
 kernel:[  127.527069] EIP: [<c04664cb>] kthread_data+0xf/0x13 SS:ESP 0068:f63a19e8

Message from syslogd@localhost at Oct  9 11:47:58 ...
 kernel:[  127.527072] CR2: 00000000fffffffc

====


I do not know where Debug kernel save full diagnostic in text form or have I can to save it.

Comment 4 vic 2011-10-10 09:07:31 UTC
Hi!
I have the same problen on netbook Asus EeePC 1005HA (wireless adapter Intel 3150 ABG, iwlagn, i2400).
When i try authenticate on accesspoint D-Link Dir-300 , kernel is crashed.

Comment 5 vic 2011-10-10 09:09:22 UTC
Installed Fedora16 Beta with latest updates.
Fedora-15 works fine.

Comment 6 Stanislaw Gruszka 2011-10-10 15:14:30 UTC
(In reply to comment #3)
> I do not know where Debug kernel save full diagnostic in text form or have I
> can to save it.

If kernel hungs it does not save any text, but you can configure kdump to make memory dump after crash. But perhaps easiest way would be:

1) switch to virtual terminal (Alt+Ctr+F2),
2) disable rsyslogd "/etc/init.d/rsyslogd stop"
3) reproduce problem with wpa_supplicant
4) take a photo,

this should show proper call trace.

Comment 7 Sergei LITVINENKO 2011-10-11 08:41:58 UTC
Created attachment 527391 [details]
It is serie of screens (rsyslog is disabled)

Comment 8 Stanislaw Gruszka 2011-10-12 07:52:15 UTC
Picture 3 is interesting. Other photos seems to show other bug related with cpu_idle().

We have null pointer dereference, priv->cfg->ht_params can be NULL.

(gdb) l *(iwlagn_commit_rxon+0x772)
0x1e416 is in iwlagn_commit_rxon (drivers/net/wireless/iwlwifi/iwl-agn-rxon.c:299).
294			IWL_ERR(priv, "Error sending TX power (%d)\n", ret);
295			return ret;
296		}
297	
298		if ((ctx->vif && ctx->vif->type == NL80211_IFTYPE_STATION) &&
299		    priv->cfg->ht_params->smps_mode)
300			ieee80211_request_smps(ctx->vif,
301					       priv->cfg->ht_params->smps_mode);
302	
303		return 0;

Comment 9 Stanislaw Gruszka 2011-10-12 08:25:53 UTC
Fix was posted:
http://marc.info/?l=linux-wireless&m=131840748927629&w=2

Comment 10 Sergei LITVINENKO 2011-10-12 08:49:14 UTC
>> Fix was posted:


Can anybody provide i686.PAE rpm packet?

Comment 11 Stanislaw Gruszka 2011-10-12 13:07:27 UTC
Here is build:
http://koji.fedoraproject.org/koji/taskinfo?taskID=3425387

Comment 12 Sergei LITVINENKO 2011-10-12 15:57:05 UTC
Patch is used http://marc.info/?l=linux-wireless&m=131840748927629&w=2
for 3.1.0-0.rc9.git0.0.fc16.i686.PAE

Result => SUCCESS, wlan0 is authirized, IP address by DHCP is received.
I think, bug is fixed...

=====================>DETAIL<============================================
[root@ua-dudn00000 ~]# wpa_supplicant -Dwext -iwlan0 -c/etc/wpa_supplicant/wpa_supplicant.conf.homedesk -dd
Initializing interface 'wlan0' conf '/etc/wpa_supplicant/wpa_supplicant.conf.homedesk' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/etc/wpa_supplicant/wpa_supplicant.conf.homedesk' -> '/etc/wpa_supplicant/wpa_supplicant.conf.homedesk'
Reading configuration file '/etc/wpa_supplicant/wpa_supplicant.conf.homedesk'
ctrl_interface='/var/run/wpa_supplicant'
ctrl_interface_group='wheel'
Line: 7 - start of a new network block
ssid - hexdump_ascii(len=8):
     68 6f 6d 65 64 65 73 6b                           homedesk        
PSK - hexdump(len=32): [REMOVED]
proto: 0x2
key_mgmt: 0x2
pairwise: 0x10
group: 0x10
priority=1 (0x1)
Priority group 1
   id=0 ssid='homedesk'
WEXT: cfg80211-based driver detected
SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf
  capabilities: key_mgmt 0xf enc 0xf flags 0x0
netlink: Operstate: linkmode=1, operstate=5
Own MAC address: 00:23:14:08:c6:40
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
RSN: flushing PMKID list in the driver
Setting scan request: 0 sec 100000 usec
WPS: UUID based on MAC address - hexdump(len=16): 81 5b 04 05 53 d3 53 e2 8f 2f 89 8a eb 56 fe 13
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: Supplicant port status: Unauthorized
EAPOL: Supplicant port status: Unauthorized
ctrl_interface_group=10 (from group name 'wheel')
Added interface wlan0
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b1a len=8
State: DISCONNECTED -> SCANNING
Starting AP scan for wildcard SSID
Scan requested (ret=0) - scan timeout 5 seconds
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b19 len=8
Received 2980 bytes of scan results (6 BSSes)
BSS: Start scan result update 1
BSS: Add new id 0 BSSID 00:18:f8:ae:50:a0 SSID 'homedesk'
BSS: Add new id 1 BSSID 94:0c:6d:a2:ca:10 SSID 'Mag'
BSS: Add new id 2 BSSID 1c:af:f7:14:76:1e SSID 'DOM_dom'
BSS: Add new id 3 BSSID 00:18:e7:fa:ef:ed SSID 'IOE_HOME'
BSS: Add new id 4 BSSID b0:48:7a:a2:72:96 SSID 'Vik'
BSS: Add new id 5 BSSID 00:21:29:99:6c:02 SSID ''
New scan results available
WPS: attr type=0x104a len=1
WPS: attr type=0x1044 len=1
WPS: attr type=0x103b len=1
WPS: attr type=0x1047 len=16
WPS: attr type=0x1021 len=7
WPS: attr type=0x1023 len=9
WPS: attr type=0x1024 len=3
WPS: attr type=0x1042 len=3
WPS: attr type=0x1054 len=8
WPS: attr type=0x1011 len=32
WPS: attr type=0x1008 len=2
WPS: attr type=0x103c len=1
WPS: attr type=0x104a len=1
WPS: attr type=0x1044 len=1
WPS: attr type=0x103b len=1
WPS: attr type=0x1047 len=16
WPS: attr type=0x1021 len=7
WPS: attr type=0x1023 len=9
WPS: attr type=0x1024 len=3
WPS: attr type=0x1042 len=3
WPS: attr type=0x1054 len=8
WPS: attr type=0x1011 len=32
WPS: attr type=0x1008 len=2
WPS: attr type=0x103c len=1
Selecting BSS from priority group 1
Try to find WPA-enabled AP
0: 00:18:f8:ae:50:a0 ssid='homedesk' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
   selected based on RSN IE
   selected WPA AP 00:18:f8:ae:50:a0 ssid='homedesk'
Trying to associate with 00:18:f8:ae:50:a0 (SSID='homedesk' freq=2412 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
No keys have been configured - skip key clearing
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
wpa_driver_wext_set_drop_unencrypted
wpa_driver_wext_set_psk
Setting authentication timeout: 20 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP fail=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portControl=Auto
EAPOL: Supplicant port status: Unauthorized
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b1a len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b04 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b1a len=16
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8c08 len=33
AssocResp IE wireless event - hexdump(len=25): 01 04 82 84 8b 96 32 08 8c 12 98 24 b0 48 60 6c dd 07 00 0c 43 01 00 00 00
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:18:f8:ae:50:a0
Association info event
resp_ies - hexdump(len=25): 01 04 82 84 8b 96 32 08 8c 12 98 24 b0 48 60 6c dd 07 00 0c 43 01 00 00 00
State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:18:f8:ae:50:a0
No keys have been configured - skip key clearing
Associated with 00:18:f8:ae:50:a0
WPA: Association event - clear replay counter
WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RX EAPOL from 00:18:f8:ae:50:a0
RX EAPOL - hexdump(len=99): 01 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 33 4a 91 be d9 2a 6a 2d 8d 7b ba 05 9a d7 cd ae 4c 12 0f 0a 23 b8 1e 78 ca 20 fb f5 86 ab f1 c4 ca 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 33
  key_nonce - hexdump(len=32): 4a 91 be d9 2a 6a 2d 8d 7b ba 05 9a d7 cd ae 4c 12 0f 0a 23 b8 1e 78 ca 20 fb f5 86 ab f1 c4 ca
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 33 4a 91 be d9 2a 6a 2d 8d 7b ba 05 9a d7 cd ae 4c 12 0f 0a 23 b8 1e 78 ca 20 fb f5 86 ab f1 c4 ca 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:18:f8:ae:50:a0 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: Renewed SNonce - hexdump(len=32): c1 17 41 ca f5 af 93 b6 b8 16 48 a4 dd 47 0a 8e ee 0e 43 52 ce 9b 04 77 bc 83 d6 49 74 28 2f db
WPA: PTK derivation - A1=00:23:14:08:c6:40 A2=00:18:f8:ae:50:a0
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 33 c1 17 41 ca f5 af 93 b6 b8 16 48 a4 dd 47 0a 8e ee 0e 43 52 ce 9b 04 77 bc 83 d6 49 74 28 2f db 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4f da 4e 99 63 59 97 f9 a5 c7 90 e2 ae 93 20 ae 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 00:18:f8:ae:50:a0
RX EAPOL - hexdump(len=155): 01 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 34 4a 91 be d9 2a 6a 2d 8d 7b ba 05 9a d7 cd ae 4c 12 0f 0a 23 b8 1e 78 ca 20 fb f5 86 ab f1 c4 ca 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 65 86 2c 91 9d 81 ed 8b 04 a3 5e 1f 0d 68 cf e6 00 38 6e 7e b2 5f 4e 79 a5 b6 ec 6f e4 f8 08 74 b4 d8 2c 36 36 67 f0 58 af bb 52 d4 08 dd 25 7c b8 60 a7 d2 8c 0c 0b bb a0 21 e3 98 af 61 b8 01 64 8e f3 44 12 e4 78 b2 bf 1f
IEEE 802.1X RX: version=1 type=3 length=151
  EAPOL-Key type=2
  key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
  key_length=16 key_data_length=56
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 34
  key_nonce - hexdump(len=32): 4a 91 be d9 2a 6a 2d 8d 7b ba 05 9a d7 cd ae 4c 12 0f 0a 23 b8 1e 78 ca 20 fb f5 86 ab f1 c4 ca
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 65 86 2c 91 9d 81 ed 8b 04 a3 5e 1f 0d 68 cf e6
WPA: RX EAPOL-Key - hexdump(len=155): 01 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 34 4a 91 be d9 2a 6a 2d 8d 7b ba 05 9a d7 cd ae 4c 12 0f 0a 23 b8 1e 78 ca 20 fb f5 86 ab f1 c4 ca 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 65 86 2c 91 9d 81 ed 8b 04 a3 5e 1f 0d 68 cf e6 00 38 6e 7e b2 5f 4e 79 a5 b6 ec 6f e4 f8 08 74 b4 d8 2c 36 36 67 f0 58 af bb 52 d4 08 dd 25 7c b8 60 a7 d2 8c 0c 0b bb a0 21 e3 98 af 61 b8 01 64 8e f3 44 12 e4 78 b2 bf 1f
RSN: encrypted key data - hexdump(len=56): 6e 7e b2 5f 4e 79 a5 b6 ec 6f e4 f8 08 74 b4 d8 2c 36 36 67 f0 58 af bb 52 d4 08 dd 25 7c b8 60 a7 d2 8c 0c 0b bb a0 21 e3 98 af 61 b8 01 64 8e f3 44 12 e4 78 b2 bf 1f
WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED]
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:18:f8:ae:50:a0 (ver=2)
WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 16 00 0f ac 01 01 00 4e d1 86 99 4e ac 2e 8d 1c d8 58 65 69 7b 1e 0d 00 00
WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=2): 00 00
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 5e 36 63 0a 10 84 d6 5e c4 1f 2c c1 61 2a a8 ad 00 00
WPA: Installing PTK to the driver.
wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
EAPOL: External notification - portValid=1
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED]
WPA: Group Key - hexdump(len=16): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0 len=16).
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=3 key_idx=1 set_tx=0 seq_len=6 key_len=16
WPA: Key negotiation completed with 00:18:f8:ae:50:a0 [PTK=CCMP GTK=CCMP]
Cancelling authentication timeout
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:18:f8:ae:50:a0 completed (auth) [id=0 id_str=]
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
netlink: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: Supplicant port status: Authorized
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed successfully
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
EAPOL: startWhen --> 0
EAPOL: disable timer tick

Comment 13 Stanislaw Gruszka 2011-10-13 12:35:55 UTC
(In reply to comment #12)
> Patch is used http://marc.info/?l=linux-wireless&m=131840748927629&w=2
> for 3.1.0-0.rc9.git0.0.fc16.i686.PAE
This is not official build, I forgot to mark it so.

Josh, could you apply fix to fedora kernel, bug affect anyone using iwlwifi device that is not 11n capable.

Comment 14 Josh Boyer 2011-10-13 12:49:46 UTC
(In reply to comment #13)
> (In reply to comment #12)
> > Patch is used http://marc.info/?l=linux-wireless&m=131840748927629&w=2
> > for 3.1.0-0.rc9.git0.0.fc16.i686.PAE
> This is not official build, I forgot to mark it so.
> 
> Josh, could you apply fix to fedora kernel, bug affect anyone using iwlwifi
> device that is not 11n capable.

Added to f16 and rawhide.  Will be in the next build.

Comment 15 Sergei LITVINENKO 2011-10-13 17:06:02 UTC
(In reply to comment #13)
>> bug affect anyone using iwlwifi device that is not 11n capable.

FYI: bug is triggered even if 11n is disabled on device by kernel parameter...

Comment 16 Fedora Update System 2011-10-19 14:48:47 UTC
kernel-3.1.0-0.rc10.git0.1.fc16 has been submitted as an update for Fedora 16.
https://admin.fedoraproject.org/updates/kernel-3.1.0-0.rc10.git0.1.fc16

Comment 17 Fedora Update System 2011-10-20 02:23:01 UTC
Package kernel-3.1.0-0.rc10.git0.1.fc16:
* should fix your issue,
* was pushed to the Fedora 16 testing repository,
* should be available at your local mirror within two days.
Update it with:
# su -c 'yum update --enablerepo=updates-testing kernel-3.1.0-0.rc10.git0.1.fc16'
as soon as you are able to, then reboot.
Please go to the following url:
https://admin.fedoraproject.org/updates/FEDORA-2011-14609
then log in and leave karma (feedback).

Comment 18 Fedora Update System 2011-10-20 04:02:20 UTC
kernel-3.1.0-0.rc10.git0.1.fc16 has been pushed to the Fedora 16 stable repository.  If problems still persist, please make note of it in this bug report.


Note You need to log in before you can comment on or make changes to this bug.