Network manager connecting timeout 45 sec after suspend:
[Sat Aug 29 18:12:30 2020] PM: suspend exit
[Sat Aug 29 18:13:45 2020] wlp1s0: authenticate with 6c:3b:6b:07:33:8c
[Sat Aug 29 18:13:45 2020] wlp1s0: send auth to 6c:3b:6b:07:33:8c (try 1/3)
[Sat Aug 29 18:13:45 2020] wlp1s0: authenticated
Where i can this configured?
This behaviour likely depends on your specific wifi hardware/driver. Share the relevant details…
/usr/sbin/hwinfo --wlan
/usr/sbin/hwinfo --wlan
08: PCI 100.0: 0282 WLAN controller
[Created at pci.386]
Unique ID: yWPJ.D6QMyC7dbb5
Parent ID: z8Q3.ev38QzU_9c9
SysFS ID: /devices/pci0000:00/0000:00:1c.0/0000:01:00.0
SysFS BusID: 0000:01:00.0
Hardware Class: network
Model: "Qualcomm Atheros QCA6174 802.11ac Wireless Network Adapter"
Vendor: pci 0x168c "Qualcomm Atheros"
Device: pci 0x003e "QCA6174 802.11ac Wireless Network Adapter"
SubVendor: pci 0x1028 "Dell"
SubDevice: pci 0x0310
Revision: 0x32
Driver: "ath10k_pci"
Driver Modules: "ath10k_pci"
Device File: wlp1s0
Features: WLAN
Memory Range: 0xe1000000-0xe11fffff (rw,non-prefetchable)
IRQ: 129 (no events)
HW Address: 90:cd:b6:47:b9:9f
Permanent HW Address: 90:cd:b6:47:b9:9f
Link detected: yes
WLAN channels: 1 2 3 4 5 6 7 8 9 10 11 12 13 36 40 44 48 52 56 60 64 100 104 108 112 116 120 124 128 132 136 140
WLAN frequencies: 2.412 2.417 2.422 2.427 2.432 2.437 2.442 2.447 2.452 2.457 2.462 2.467 2.472 5.18 5.2 5.22 5.24 5.26 5.28 5.3 5.32 5.5 5.52 5.54 5.56 5.58 5.6 5.62 5.64 5.66 5.68 5.7
WLAN encryption modes: WEP40 WEP104 TKIP CCMP
WLAN authentication modes: open sharedkey wpa-psk wpa-eap
Module Alias: "pci:v0000168Cd0000003Esv00001028sd00000310bc02sc80i00"
Driver Info #0:
Driver Status: ath10k_pci is active
Driver Activation Cmd: "modprobe ath10k_pci"
Config Status: cfg=no, avail=yes, need=no, active=unknown
Attached to: #3 (PCI bridge)
FWIW, I’ve seen similar reported for hardware supported by this driver. For example…
https://askubuntu.com/questions/1180962/wifi-disables-after-suspending
The second answer suggests implementing a script (for openSUSE located in /usr/lib/systemd/system-sleep/) which gets executed prior to sleep and again while waking. If manually unloading and reloading the wifi driver (via modprobe command) helps get the wireless connection restarted in a timely fashion after resuming, then this may do the trick to automate that for you. YMMV.
Further reference:
https://www.freedesktop.org/software/systemd/man/systemd-suspend.service.html
No, same…
Script working:
journalctl | grep ath10k-reset 130 ↵
Aug 30 14:00:42 suse root[3572]: /usr/lib/systemd/system-sleep/ath10k-reset case= pre ]
Aug 30 14:00:55 suse root[3665]: /usr/lib/systemd/system-sleep/ath10k-reset case= post ]
Aug 30 14:00:55 suse root[3670]: /usr/lib/systemd/system-sleep/ath10k-reset restart_wifi BEGIN
Aug 30 14:00:56 suse root[3711]: /usr/lib/systemd/system-sleep/ath10k-reset restart_wifi END
…but connection timeout present…
[Sun Aug 30 14:00:42 2020] done.
[Sun Aug 30 14:00:42 2020] PM: suspend exit
[Sun Aug 30 14:00:43 2020] cfg80211: Loading compiled-in X.509 certificates for regulatory database
[Sun Aug 30 14:00:43 2020] cfg80211: Loaded X.509 cert 'sforshee: 00b28ddf47aef9cea7'
[Sun Aug 30 14:00:43 2020] ath10k_pci 0000:01:00.0: pci irq msi oper_irq_mode 2 irq_mode 0 reset_mode 0
[Sun Aug 30 14:00:43 2020] ath10k_pci 0000:01:00.0: qca6174 hw3.2 target 0x05030000 chip_id 0x00340aff sub 1028:0310
[Sun Aug 30 14:00:43 2020] ath10k_pci 0000:01:00.0: kconfig debug 0 debugfs 0 tracing 0 dfs 0 testmode 0
[Sun Aug 30 14:00:43 2020] ath10k_pci 0000:01:00.0: firmware ver WLAN.RM.4.4.1-00140-QCARMSWPZ-1 api 6 features wowlan,ignore-otp,mfp crc32 29eb8ca1
[Sun Aug 30 14:00:43 2020] ath10k_pci 0000:01:00.0: board_file api 2 bmi_id N/A crc32 4ac0889b
[Sun Aug 30 14:00:43 2020] ath10k_pci 0000:01:00.0: htt-ver 3.60 wmi-op 4 htt-op 3 cal otp max-sta 32 raw 0 hwcrypto 1
[Sun Aug 30 14:00:44 2020] ath: EEPROM regdomain: 0x6c
[Sun Aug 30 14:00:44 2020] ath: EEPROM indicates we should expect a direct regpair map
[Sun Aug 30 14:00:44 2020] ath: Country alpha2 being used: 00
[Sun Aug 30 14:00:44 2020] ath: Regpair used: 0x6c
[Sun Aug 30 14:00:44 2020] ath10k_pci 0000:01:00.0 wlp1s0: renamed from wlan0
[Sun Aug 30 14:02:03 2020] wlp1s0: authenticate with 6c:3b:6b:07:33:8c
[Sun Aug 30 14:02:03 2020] wlp1s0: send auth to 6c:3b:6b:07:33:8c (try 1/3)
[Sun Aug 30 14:02:03 2020] wlp1s0: authenticated
I can only suggest a bug report (numerous similar accounts online if you care to search).