Wlan0 interface keeps stopping after awhile in OpenSuse15.4

Please forgive me for any errors I make, I don’t grok how to use this web interface for posting messages and am finding it terribly confusing.

Ever since I upgraded my ASUS laptop to OpenSuSE 15.4 I am having troubles keeping my wlan0 wireless interface up an running. ifdown wlan0 followed by an ifup wlan0 does not restart the interface nor does a systemctl restart network. It doesn’t really feel like a hardware failure is occurring because rebooting my laptop always restores the wlan0 interface and everything runs OK for awhile.

The only thing I see of interest in the messages log file is the following, but I don’t know how to grok it. Any kind guru around who can help me figure out how to debug and figure out what is going on with my poor laptop’s wifi (wlan0) interface? Thanks in advance for all suggestions…

Marc…

From messages -

2023-07-03T19:00:48.262195-07:00 marcslaptop kernel: [ 5745.488862][T16845] Hardware name: ASUSTeK COMPUTER INC. G752VS/G752VS, BIOS G752VS.306 10/19/2016
2023-07-03T19:00:48.262196-07:00 marcslaptop kernel: [ 5745.488863][T16845] Workqueue: events_freezable ieee80211_restart_work [mac80211]
2023-07-03T19:00:48.262196-07:00 marcslaptop kernel: [ 5745.488885][T16845] RIP: 0010:ieee80211_reconfig+0x1ff/0x15c0 [mac80211]
2023-07-03T19:00:48.262196-07:00 marcslaptop kernel: [ 5745.488919][T16845] Code: 44 24 07 00 c6 83 74 06 00 00 00 48 89 df e8 b8 36 fc ff 85 c0 41 89 c7 0f 84 14 02 00 00 48 c7 c7 00 94 61 c1 e8 41 e7 4e c7 <0f> 0b 48 89 df e8 87 ce ff ff eb 97 c6 83 75 06 00 00 00 48 8d ab
2023-07-03T19:00:48.262197-07:00 marcslaptop kernel: [ 5745.488920][T16845] RSP: 0018:ffffab5fc606fe00 EFLAGS: 00010286
2023-07-03T19:00:48.262197-07:00 marcslaptop kernel: [ 5745.488922][T16845] RAX: 0000000000000000 RBX: ffff90a1095e0840 RCX: 0000000000000027
2023-07-03T19:00:48.262197-07:00 marcslaptop kernel: [ 5745.488923][T16845] RDX: 0000000000000000 RSI: 00000000ffffbfff RDI: ffff90a8a6562948
2023-07-03T19:00:48.262198-07:00 marcslaptop kernel: [ 5745.488924][T16845] RBP: ffff90a1095e1ee0 R08: 0000000000000000 R09: 0000000000000001
2023-07-03T19:00:48.262198-07:00 marcslaptop kernel: [ 5745.488925][T16845] R10: ffff90a4c3030090 R11: ffffab5fc606fc18 R12: ffff90a1095e1a70
2023-07-03T19:00:48.262199-07:00 marcslaptop kernel: [ 5745.488926][T16845] R13: ffff90a1095e0840 R14: ffff90a8a6578c05 R15: 00000000fffffffb
2023-07-03T19:00:48.262199-07:00 marcslaptop kernel: [ 5745.488927][T16845] FS: 0000000000000000(0000) GS:ffff90a8a6540000(0000) knlGS:0000000000000000
2023-07-03T19:00:48.262199-07:00 marcslaptop kernel: [ 5745.488928][T16845] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
2023-07-03T19:00:48.262200-07:00 marcslaptop kernel: [ 5745.488929][T16845] CR2: 00007f98a34c1000 CR3: 000000034ce10006 CR4: 00000000003706e0
2023-07-03T19:00:48.262200-07:00 marcslaptop kernel: [ 5745.488930][T16845] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
2023-07-03T19:00:48.262200-07:00 marcslaptop kernel: [ 5745.488937][T16845] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
2023-07-03T19:00:48.262201-07:00 marcslaptop kernel: [ 5745.488938][T16845] Call Trace:
2023-07-03T19:00:48.262201-07:00 marcslaptop kernel: [ 5745.488940][T16845]
2023-07-03T19:00:48.262201-07:00 marcslaptop kernel: [ 5745.488942][T16845] ? try_to_del_timer_sync+0x4d/0x80
2023-07-03T19:00:48.262202-07:00 marcslaptop kernel: [ 5745.488946][T16845] ieee80211_restart_work+0xfc/0x150 [mac80211 bc8f5468ac3a5051fa74c5206700ce9c0b11f30a]
2023-07-03T19:00:48.262202-07:00 marcslaptop kernel: [ 5745.488968][T16845] process_one_work+0x264/0x440
2023-07-03T19:00:48.262203-07:00 marcslaptop kernel: [ 5745.488971][T16845] worker_thread+0x2d/0x3c0
2023-07-03T19:00:48.262203-07:00 marcslaptop kernel: [ 5745.488979][T16845] ? process_one_work+0x440/0x440
2023-07-03T19:00:48.262203-07:00 marcslaptop kernel: [ 5745.488980][T16845] kthread+0x154/0x180
2023-07-03T19:00:48.262204-07:00 marcslaptop kernel: [ 5745.488983][T16845] ? set_kthread_struct+0x50/0x50
2023-07-03T19:00:48.262204-07:00 marcslaptop kernel: [ 5745.488985][T16845] ret_from_fork+0x1f/0x30
2023-07-03T19:00:48.262205-07:00 marcslaptop kernel: [ 5745.488990][T16845]
2023-07-03T19:00:48.262205-07:00 marcslaptop kernel: [ 5745.488990][T16845] —[ end trace 59ab78df2270a0f8 ]—
2023-07-03T19:00:48.262205-07:00 marcslaptop kernel: [ 5745.489001][T16845] ------------[ cut here ]------------
2023-07-03T19:00:48.262206-07:00 marcslaptop kernel: [ 5745.489001][T16845] p2p-dev-wlan0: Failed check-sdata-in-driver check, flags: 0x0
2023-07-03T19:00:48.262206-07:00 marcslaptop kernel: [ 5745.489018][T16845] WARNING: CPU: 5 PID: 16845 at …/net/mac80211/driver-ops.c:97 drv_remove_interface+0x104/0x120 [mac80211]

Rebooting resets hardware to known good state. It may be hardware, it may be firmware or it may be driver. You did not describe your hardware and messages are from generic layer, so hard to guess.

Thanks Arvidjaar, here is what YaST hwinfo tells me about the wlan0 device, hths… Let me know what commands to execute or where to get any additional info that would be useful. Marc

  P: /devices/pci0000:00/0000:00:1c.0/0000:02:00.0/net/wlan0
  L: 0
  E: DEVPATH=/devices/pci0000:00/0000:00:1c.0/0000:02:00.0/net/wlan0
  E: SUBSYSTEM=net
  E: DEVTYPE=wlan
  E: INTERFACE=wlan0
  E: IFINDEX=3
  E: USEC_INITIALIZED=10072502
  E: ID_NET_NAMING_SCHEME=sle15-sp4
  E: ID_NET_NAME_MAC=wlxe4a7a04683e0
  E: ID_OUI_FROM_DATABASE=Intel Corporate
  E: ID_NET_NAME_PATH=wlp2s0
  E: ID_BUS=pci
  E: ID_VENDOR_ID=0x8086
  E: ID_MODEL_ID=0x24f3
  E: ID_PCI_CLASS_FROM_DATABASE=Network controller
  E: ID_PCI_SUBCLASS_FROM_DATABASE=Network controller
  E: ID_VENDOR_FROM_DATABASE=Intel Corporation
  E: ID_MODEL_FROM_DATABASE=Wireless 8260 (Dual Band Wireless-AC 8260)
  E: ID_MM_CANDIDATE=1
  E: ID_PATH=pci-0000:02:00.0
  E: ID_PATH_TAG=pci-0000_02_00_0
  E: ID_NET_DRIVER=iwlwifi
  E: ID_NET_LINK_FILE=/usr/lib/systemd/network/99-default.link
  E: ID_NET_NAME=wlan0
  E: SYSTEMD_ALIAS=/sys/subsystem/net/devices/wlan0
  E: TAGS=:systemd:
  E: CURRENT_TAGS=:systemd:

78: None 00.0: 1070a WLAN
  [Created at net.126]
  Unique ID: AYEt.QXn1l67RSa1
  Parent ID: y9sn.r3IVNFo7763
  SysFS ID: /class/net/wlan0
  SysFS Device Link: /devices/pci0000:00/0000:00:1c.0/0000:02:00.0
  Hardware Class: network interface
  Model: "WLAN network interface"
  Driver: "iwlwifi"
  Driver Modules: "iwlwifi"
  Device File: wlan0
  HW Address: e4:a7:a0:46:83:e0
  Permanent HW Address: e4:a7:a0:46:83:e0
  Link detected: yes
  Config Status: cfg=no, avail=yes, need=no, active=unknown
  Attached to: #23 (WLAN controller)

@MarcChamberlin:

We need more information related to the actual status of the WLAN interface:

First, from the systemd Journal:

# journalctl -b 0 --no-hostname --output=short-monotonic | grep -iE 'network|login|wlan'

Please don’t post everything that’ll provide – only the following:

[   38.437372] systemd[1]: Reached target Login Prompts.
 .
 .
[   71.236954] sddm[1533]: Message received from greeter: Login
[   71.311846] sddm-greeter[1778]: Message received from daemon: LoginSucceeded
[   71.326857] NetworkManager[1308]: <info>  [1688658333.2229] policy: auto-activating connection 'xxx' (69e1c00d-889e-4922-a588-79673386c02a)
[   71.327482] NetworkManager[1308]: <info>  [1688658333.2238] device (wlan0): Activation: starting connection 'xxx' (69e1c00d-889e-4922-a588-79673386c02a)
[   71.327631] NetworkManager[1308]: <info>  [1688658333.2240] device (wlan0): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'managed')
[   71.327763] NetworkManager[1308]: <info>  [1688658333.2245] manager: NetworkManager state is now CONNECTING
[   71.336067] systemd-logind[1385]: New session 3 of user xxx.

After that, you should see that, the interface disconnects with the reason “state change: config → need-auth (reason ‘none’, sys-iface-state: ‘managed’)” because secrets are needed but, shortly afterwards it should connect properly once the secrets have been read from a Password Wallet – at least that’s the case for KDE Plasma …


Then, some more information is needed about the WLAN interface status:

  • Please install the package “iw” if, it hasn’t already been installed.

Then, we need:

 # ip -statistics link
 # ip -details link
 # iw list
 # iw features

Do you want me to provide this information after the wlan0 interface stops? It has been behaving itself for awhile now, but I will gather and post the info if and when it next fails…
Man I hate intermittent problems!

Marc...

Yes, please – having to wait isn’t an issue.

  • And yes, intermittent system failures are, quite frankly, a pain in the posterior … :sunglasses:

Those of us who’ve learnt our computing by repairing customer systems on site, can write thousands of pages detailing the root causes of intermittent system failures …

Hi dcurtisfra, my wlan0 interface did die again today, so I have captured the info that you thought would be helpful. This web interface I am using for this news group doesn’t seem to allow attachment of files, so I am just going to do a copy/paste here. Sorry it is going to be a rather long post!!!

journalctl -b 0 --no-hostname --output=short-monotonic | grep -iE ‘network|login|wlan’

[ 54.386070] systemd[1]: Reached target Login Prompts.
[ 54.429203] sddm[2011]: Logind interface found
[ 58.198548] systemd-logind[1874]: New session 1 of user sddm.
[ 59.336171] kernel: Lockdown: systemd-logind: hibernation is restricted; see man kernel_lockdown.7
[ 59.352199] kernel: Lockdown: systemd-logind: hibernation is restricted; see man kernel_lockdown.7
[ 59.352358] kernel: Lockdown: systemd-logind: hibernation is restricted; see man kernel_lockdown.7
[ 59.368203] kernel: Lockdown: systemd-logind: hibernation is restricted; see man kernel_lockdown.7
[ 59.368294] kernel: Lockdown: systemd-logind: hibernation is restricted; see man kernel_lockdown.7
[ 60.333713] kernel: Lockdown: systemd-logind: hibernation is restricted; see man kernel_lockdown.7
[ 60.366675] kernel: Lockdown: systemd-logind: hibernation is restricted; see man kernel_lockdown.7
[ 60.366781] kernel: Lockdown: systemd-logind: hibernation is restricted; see man kernel_lockdown.7
[ 60.387359] kernel: Lockdown: systemd-logind: hibernation is restricted; see man kernel_lockdown.7
[ 60.387454] kernel: Lockdown: systemd-logind: hibernation is restricted; see man kernel_lockdown.7
[ 71.256535] sddm[2011]: Message received from greeter: Login
[ 71.401385] sddm-greeter[2063]: Message received from daemon: LoginSucceeded
[ 71.447176] systemd-logind[1874]: New session 3 of user marc.
[ 71.553702] systemd-logind[1874]: Session 1 logged out. Waiting for processes to exit.
[ 71.557451] systemd-logind[1874]: Removed session 1.
[ 80.571739] ksmserver[2437]: Qt: Session management error: networkIdsList argument is NULL
[ 83.382515] kernel: Lockdown: systemd-logind: hibernation is restricted; see man kernel_lockdown.7
[ 83.444335] kernel: Lockdown: systemd-logind: hibernation is restricted; see man kernel_lockdown.7
[ 83.444471] kernel: Lockdown: systemd-logind: hibernation is restricted; see man kernel_lockdown.7
[ 83.517144] kernel: Lockdown: systemd-logind: hibernation is restricted; see man kernel_lockdown.7
[ 83.517349] kernel: Lockdown: systemd-logind: hibernation is restricted; see man kernel_lockdown.7
[ 83.603094] kernel: Lockdown: systemd-logind: hibernation is restricted; see man kernel_lockdown.7
[ 83.603226] kernel: Lockdown: systemd-logind: hibernation is restricted; see man kernel_lockdown.7
[ 83.603359] kernel: Lockdown: systemd-logind: hibernation is restricted; see man kernel_lockdown.7
[ 84.775996] kernel: Lockdown: systemd-logind: hibernation is restricted; see man kernel_lockdown.7
[ 84.830406] kernel: Lockdown: systemd-logind: hibernation is restricted; see man kernel_lockdown.7
[ 84.830528] kernel: Lockdown: systemd-logind: hibernation is restricted; see man kernel_lockdown.7
[ 84.875544] kernel: Lockdown: systemd-logind: hibernation is restricted; see man kernel_lockdown.7
[ 84.875639] kernel: Lockdown: systemd-logind: hibernation is restricted; see man kernel_lockdown.7
[ 106.834537] kioslave5[3460]: Qt: Session management error: networkIdsList argument is NULL
[ 260.000556] boinc[1822]: 09-Jul-2023 09:02:01 [—] Resuming network activity
[ 1944.194253] run-crons[10005]: knockd@wlan0 wlan0 was already running!!!
[ 5548.589538] run-crons[16701]: knockd@wlan0 wlan0 was already running!!!
[ 7228.658233] wickedd-dhcp4[1153]: wlan0: Committed DHCPv4 lease with address 192.168.10.10 (lease time 14400, renew in 7200 sec, rebind in 12600 sec)
[ 7228.783543] wickedd[1164]: route ipv4 0.0.0.0/0 via 192.168.10.100 dev wlan0#3 type unicast table main scope universe protocol dhcp covered by a ipv4:dhcp lease
[ 7228.786286] wickedd[1164]: route ipv4 10.10.10.0/24 via 192.168.10.20 dev wlan0#3 type unicast table main scope universe protocol dhcp covered by a ipv4:dhcp lease
[ 7228.786763] wickedd[1164]: route ipv4 192.168.10.0/25 dev wlan0#3 type unicast table main scope link protocol kernel pref-src 192.168.10.10 covered by a ipv4:dhcp lease
[ 7228.787172] wickedd[1164]: route ipv4 192.168.10.128/25 via 192.168.10.200 dev wlan0#3 type unicast table main scope universe protocol dhcp covered by a ipv4:dhcp lease
[ 9147.850751] run-crons[22915]: knockd@wlan0 wlan0 was already running!!!
[12742.427109] run-crons[29267]: knockd@wlan0 wlan0 was already running!!!
[14428.730529] wickedd-dhcp4[1153]: wlan0: Committed DHCPv4 lease with address 192.168.10.10 (lease time 14400, renew in 7200 sec, rebind in 12600 sec)
[14428.838620] wickedd[1164]: route ipv4 0.0.0.0/0 via 192.168.10.100 dev wlan0#3 type unicast table main scope universe protocol dhcp covered by a ipv4:dhcp lease
[14428.838929] wickedd[1164]: route ipv4 10.10.10.0/24 via 192.168.10.20 dev wlan0#3 type unicast table main scope universe protocol dhcp covered by a ipv4:dhcp lease
[14428.838983] wickedd[1164]: route ipv4 192.168.10.0/25 dev wlan0#3 type unicast table main scope link protocol kernel pref-src 192.168.10.10 covered by a ipv4:dhcp lease
[14428.839032] wickedd[1164]: route ipv4 192.168.10.128/25 via 192.168.10.200 dev wlan0#3 type unicast table main scope universe protocol dhcp covered by a ipv4:dhcp lease
[16344.230016] run-crons[3635]: knockd@wlan0 wlan0 was already running!!!
[19943.918714] run-crons[11872]: knockd@wlan0 wlan0 was already running!!!
[21628.810517] wickedd-dhcp4[1153]: wlan0: Committed DHCPv4 lease with address 192.168.10.10 (lease time 14400, renew in 7200 sec, rebind in 12600 sec)
[21628.898590] wickedd[1164]: route ipv4 0.0.0.0/0 via 192.168.10.100 dev wlan0#3 type unicast table main scope universe protocol dhcp covered by a ipv4:dhcp lease
[21628.898863] wickedd[1164]: route ipv4 10.10.10.0/24 via 192.168.10.20 dev wlan0#3 type unicast table main scope universe protocol dhcp covered by a ipv4:dhcp lease
[21628.898931] wickedd[1164]: route ipv4 192.168.10.0/25 dev wlan0#3 type unicast table main scope link protocol kernel pref-src 192.168.10.10 covered by a ipv4:dhcp lease
[21628.898996] wickedd[1164]: route ipv4 192.168.10.128/25 via 192.168.10.200 dev wlan0#3 type unicast table main scope universe protocol dhcp covered by a ipv4:dhcp lease
[23544.526862] run-crons[18100]: knockd@wlan0 wlan0 was already running!!!
[27143.718263] run-crons[24109]: knockd@wlan0 wlan0 was already running!!!
[28828.890546] wickedd-dhcp4[1153]: wlan0: Committed DHCPv4 lease with address 192.168.10.10 (lease time 14400, renew in 7200 sec, rebind in 12600 sec)
[28828.999175] wickedd[1164]: route ipv4 0.0.0.0/0 via 192.168.10.100 dev wlan0#3 type unicast table main scope universe protocol dhcp covered by a ipv4:dhcp lease
[28829.001386] wickedd[1164]: route ipv4 10.10.10.0/24 via 192.168.10.20 dev wlan0#3 type unicast table main scope universe protocol dhcp covered by a ipv4:dhcp lease
[28829.001823] wickedd[1164]: route ipv4 192.168.10.0/25 dev wlan0#3 type unicast table main scope link protocol kernel pref-src 192.168.10.10 covered by a ipv4:dhcp lease
[28829.002249] wickedd[1164]: route ipv4 192.168.10.128/25 via 192.168.10.200 dev wlan0#3 type unicast table main scope universe protocol dhcp covered by a ipv4:dhcp lease
[30743.301470] run-crons[30033]: knockd@wlan0 wlan0 was already running!!!
[34343.297310] run-crons[5013]: knockd@wlan0 wlan0 was already running!!!
[36028.954493] wickedd-dhcp4[1153]: wlan0: Committed DHCPv4 lease with address 192.168.10.10 (lease time 14400, renew in 7200 sec, rebind in 12600 sec)
[36029.026573] wickedd[1164]: route ipv4 0.0.0.0/0 via 192.168.10.100 dev wlan0#3 type unicast table main scope universe protocol dhcp covered by a ipv4:dhcp lease
[36029.026876] wickedd[1164]: route ipv4 10.10.10.0/24 via 192.168.10.20 dev wlan0#3 type unicast table main scope universe protocol dhcp covered by a ipv4:dhcp lease
[36029.026940] wickedd[1164]: route ipv4 192.168.10.0/25 dev wlan0#3 type unicast table main scope link protocol kernel pref-src 192.168.10.10 covered by a ipv4:dhcp lease
[36029.026995] wickedd[1164]: route ipv4 192.168.10.128/25 via 192.168.10.200 dev wlan0#3 type unicast table main scope universe protocol dhcp covered by a ipv4:dhcp lease
[37944.277825] run-crons[12098]: knockd@wlan0 wlan0 was already running!!!
[41543.445210] run-crons[18096]: knockd@wlan0 wlan0 was already running!!!
[43228.994490] wickedd-dhcp4[1153]: wlan0: Committed DHCPv4 lease with address 192.168.10.10 (lease time 14400, renew in 7200 sec, rebind in 12600 sec)
[43229.062583] wickedd[1164]: route ipv4 0.0.0.0/0 via 192.168.10.100 dev wlan0#3 type unicast table main scope universe protocol dhcp covered by a ipv4:dhcp lease
[43229.062890] wickedd[1164]: route ipv4 10.10.10.0/24 via 192.168.10.20 dev wlan0#3 type unicast table main scope universe protocol dhcp covered by a ipv4:dhcp lease
[43229.062959] wickedd[1164]: route ipv4 192.168.10.0/25 dev wlan0#3 type unicast table main scope link protocol kernel pref-src 192.168.10.10 covered by a ipv4:dhcp lease
[43229.063018] wickedd[1164]: route ipv4 192.168.10.128/25 via 192.168.10.200 dev wlan0#3 type unicast table main scope universe protocol dhcp covered by a ipv4:dhcp lease
[45142.891575] run-crons[23849]: knockd@wlan0 wlan0 was already running!!!
[46946.858700] run-crons[29220]: FULL SOURCE PATH - /etc/knockd_wlan0.conf
[46946.858751] run-crons[29220]: FULL BACKUP PATH - /srv/knockd/etc_15.4/knockd_wlan0.conf.backup
[46946.866665] run-crons[29220]: Entering into /srv/network
[48743.395115] run-crons[32583]: knockd@wlan0 wlan0 was already running!!!
[50429.062539] wickedd-dhcp4[1153]: wlan0: Committed DHCPv4 lease with address 192.168.10.10 (lease time 14400, renew in 7200 sec, rebind in 12600 sec)
[50429.194622] wickedd[1164]: route ipv4 0.0.0.0/0 via 192.168.10.100 dev wlan0#3 type unicast table main scope universe protocol dhcp covered by a ipv4:dhcp lease
[50429.195066] wickedd[1164]: route ipv4 10.10.10.0/24 via 192.168.10.20 dev wlan0#3 type unicast table main scope universe protocol dhcp covered by a ipv4:dhcp lease
[50429.195144] wickedd[1164]: route ipv4 192.168.10.0/25 dev wlan0#3 type unicast table main scope link protocol kernel pref-src 192.168.10.10 covered by a ipv4:dhcp lease
[50429.195216] wickedd[1164]: route ipv4 192.168.10.128/25 via 192.168.10.200 dev wlan0#3 type unicast table main scope universe protocol dhcp covered by a ipv4:dhcp lease
[52343.419538] run-crons[8652]: knockd@wlan0 wlan0 was already running!!!
[55942.951370] run-crons[15075]: knockd@wlan0 wlan0 was already running!!!
[57629.126527] wickedd-dhcp4[1153]: wlan0: Committed DHCPv4 lease with address 192.168.10.10 (lease time 14400, renew in 7200 sec, rebind in 12600 sec)
[57629.186599] wickedd[1164]: route ipv4 0.0.0.0/0 via 192.168.10.100 dev wlan0#3 type unicast table main scope universe protocol dhcp covered by a ipv4:dhcp lease
[57629.186872] wickedd[1164]: route ipv4 10.10.10.0/24 via 192.168.10.20 dev wlan0#3 type unicast table main scope universe protocol dhcp covered by a ipv4:dhcp lease
[57629.186932] wickedd[1164]: route ipv4 192.168.10.0/25 dev wlan0#3 type unicast table main scope link protocol kernel pref-src 192.168.10.10 covered by a ipv4:dhcp lease
[57629.186986] wickedd[1164]: route ipv4 192.168.10.128/25 via 192.168.10.200 dev wlan0#3 type unicast table main scope universe protocol dhcp covered by a ipv4:dhcp lease
[59543.682955] run-crons[21565]: knockd@wlan0 wlan0 was already running!!!
[63143.538406] run-crons[27641]: knockd@wlan0 wlan0 was already running!!!
[64829.186540] wickedd-dhcp4[1153]: wlan0: Committed DHCPv4 lease with address 192.168.10.10 (lease time 14400, renew in 7200 sec, rebind in 12600 sec)
[64829.274650] wickedd[1164]: route ipv4 0.0.0.0/0 via 192.168.10.100 dev wlan0#3 type unicast table main scope universe protocol dhcp covered by a ipv4:dhcp lease
[64829.274955] wickedd[1164]: route ipv4 10.10.10.0/24 via 192.168.10.20 dev wlan0#3 type unicast table main scope universe protocol dhcp covered by a ipv4:dhcp lease
[64829.275005] wickedd[1164]: route ipv4 192.168.10.0/25 dev wlan0#3 type unicast table main scope link protocol kernel pref-src 192.168.10.10 covered by a ipv4:dhcp lease
[64829.275058] wickedd[1164]: route ipv4 192.168.10.128/25 via 192.168.10.200 dev wlan0#3 type unicast table main scope universe protocol dhcp covered by a ipv4:dhcp lease
[66743.634364] run-crons[2133]: knockd@wlan0 wlan0 was already running!!!
[70343.447360] run-crons[10351]: knockd@wlan0 wlan0 was already running!!!
[72029.298531] wickedd-dhcp4[1153]: wlan0: Committed DHCPv4 lease with address 192.168.10.10 (lease time 14400, renew in 7200 sec, rebind in 12600 sec)
[72029.354591] wickedd[1164]: route ipv4 0.0.0.0/0 via 192.168.10.100 dev wlan0#3 type unicast table main scope universe protocol dhcp covered by a ipv4:dhcp lease
[72029.355081] wickedd[1164]: route ipv4 10.10.10.0/24 via 192.168.10.20 dev wlan0#3 type unicast table main scope universe protocol dhcp covered by a ipv4:dhcp lease
[72029.355176] wickedd[1164]: route ipv4 192.168.10.0/25 dev wlan0#3 type unicast table main scope link protocol kernel pref-src 192.168.10.10 covered by a ipv4:dhcp lease
[72029.355268] wickedd[1164]: route ipv4 192.168.10.128/25 via 192.168.10.200 dev wlan0#3 type unicast table main scope universe protocol dhcp covered by a ipv4:dhcp lease
[73943.246486] run-crons[16758]: knockd@wlan0 wlan0 was already running!!!
[77542.845146] run-crons[23338]: knockd@wlan0 wlan0 was already running!!!
[79229.346459] wickedd-dhcp4[1153]: wlan0: Committed DHCPv4 lease with address 192.168.10.10 (lease time 14400, renew in 7200 sec, rebind in 12600 sec)
[79229.426645] wickedd[1164]: route ipv4 0.0.0.0/0 via 192.168.10.100 dev wlan0#3 type unicast table main scope universe protocol dhcp covered by a ipv4:dhcp lease
[79229.426994] wickedd[1164]: route ipv4 10.10.10.0/24 via 192.168.10.20 dev wlan0#3 type unicast table main scope universe protocol dhcp covered by a ipv4:dhcp lease
[79229.427044] wickedd[1164]: route ipv4 192.168.10.0/25 dev wlan0#3 type unicast table main scope link protocol kernel pref-src 192.168.10.10 covered by a ipv4:dhcp lease
[79229.427086] wickedd[1164]: route ipv4 192.168.10.128/25 via 192.168.10.200 dev wlan0#3 type unicast table main scope universe protocol dhcp covered by a ipv4:dhcp lease
[81143.619923] run-crons[29634]: knockd@wlan0 wlan0 was already running!!!
[84743.173738] run-crons[3929]: knockd@wlan0 wlan0 was already running!!!
[86429.398567] wickedd-dhcp4[1153]: wlan0: Committed DHCPv4 lease with address 192.168.10.10 (lease time 14400, renew in 7200 sec, rebind in 12600 sec)
[86429.450611] wickedd[1164]: route ipv4 0.0.0.0/0 via 192.168.10.100 dev wlan0#3 type unicast table main scope universe protocol dhcp covered by a ipv4:dhcp lease
[86429.450890] wickedd[1164]: route ipv4 10.10.10.0/24 via 192.168.10.20 dev wlan0#3 type unicast table main scope universe protocol dhcp covered by a ipv4:dhcp lease
[86429.450940] wickedd[1164]: route ipv4 192.168.10.0/25 dev wlan0#3 type unicast table main scope link protocol kernel pref-src 192.168.10.10 covered by a ipv4:dhcp lease
[86429.450985] wickedd[1164]: route ipv4 192.168.10.128/25 via 192.168.10.200 dev wlan0#3 type unicast table main scope universe protocol dhcp covered by a ipv4:dhcp lease
[88342.863008] run-crons[12700]: knockd@wlan0 wlan0 was already running!!!
[91943.345213] run-crons[18537]: knockd@wlan0 wlan0 was already running!!!
[93629.490526] wickedd-dhcp4[1153]: wlan0: Committed DHCPv4 lease with address 192.168.10.10 (lease time 14400, renew in 7200 sec, rebind in 12600 sec)
[93629.626528] wickedd[1164]: route ipv4 0.0.0.0/0 via 192.168.10.100 dev wlan0#3 type unicast table main scope universe protocol dhcp covered by a ipv4:dhcp lease
[93629.626854] wickedd[1164]: route ipv4 10.10.10.0/24 via 192.168.10.20 dev wlan0#3 type unicast table main scope universe protocol dhcp covered by a ipv4:dhcp lease
[93629.626922] wickedd[1164]: route ipv4 192.168.10.0/25 dev wlan0#3 type unicast table main scope link protocol kernel pref-src 192.168.10.10 covered by a ipv4:dhcp lease
[93629.626992] wickedd[1164]: route ipv4 192.168.10.128/25 via 192.168.10.200 dev wlan0#3 type unicast table main scope universe protocol dhcp covered by a ipv4:dhcp lease
[95542.442751] run-crons[25254]: knockd@wlan0 wlan0 was already running!!!
[99142.901720] run-crons[31245]: knockd@wlan0 wlan0 was already running!!!
[100829.582524] wickedd-dhcp4[1153]: wlan0: Committed DHCPv4 lease with address 192.168.10.10 (lease time 14400, renew in 7200 sec, rebind in 12600 sec)
[100829.650568] wickedd[1164]: route ipv4 0.0.0.0/0 via 192.168.10.100 dev wlan0#3 type unicast table main scope universe protocol dhcp covered by a ipv4:dhcp lease
[100829.650951] wickedd[1164]: route ipv4 10.10.10.0/24 via 192.168.10.20 dev wlan0#3 type unicast table main scope universe protocol dhcp covered by a ipv4:dhcp lease
[100829.651022] wickedd[1164]: route ipv4 192.168.10.0/25 dev wlan0#3 type unicast table main scope link protocol kernel pref-src 192.168.10.10 covered by a ipv4:dhcp lease
[100829.651090] wickedd[1164]: route ipv4 192.168.10.128/25 via 192.168.10.200 dev wlan0#3 type unicast table main scope universe protocol dhcp covered by a ipv4:dhcp lease
[102743.183764] run-crons[8871]: knockd@wlan0 wlan0 was already running!!!
[106343.186350] run-crons[17324]: knockd@wlan0 wlan0 was already running!!!
[108029.658485] wickedd-dhcp4[1153]: wlan0: Committed DHCPv4 lease with address 192.168.10.10 (lease time 14400, renew in 7200 sec, rebind in 12600 sec)
[108029.750564] wickedd[1164]: route ipv4 0.0.0.0/0 via 192.168.10.100 dev wlan0#3 type unicast table main scope universe protocol dhcp covered by a ipv4:dhcp lease
[108029.750941] wickedd[1164]: route ipv4 10.10.10.0/24 via 192.168.10.20 dev wlan0#3 type unicast table main scope universe protocol dhcp covered by a ipv4:dhcp lease
[108029.751018] wickedd[1164]: route ipv4 192.168.10.0/25 dev wlan0#3 type unicast table main scope link protocol kernel pref-src 192.168.10.10 covered by a ipv4:dhcp lease
[108029.751090] wickedd[1164]: route ipv4 192.168.10.128/25 via 192.168.10.200 dev wlan0#3 type unicast table main scope universe protocol dhcp covered by a ipv4:dhcp lease
[109942.899202] run-crons[25873]: knockd@wlan0 wlan0 was already running!!!
[113543.242229] run-crons[899]: knockd@wlan0 wlan0 was already running!!!
[115229.742560] wickedd-dhcp4[1153]: wlan0: Committed DHCPv4 lease with address 192.168.10.10 (lease time 14400, renew in 7200 sec, rebind in 12600 sec)
[115229.846628] wickedd[1164]: route ipv4 0.0.0.0/0 via 192.168.10.100 dev wlan0#3 type unicast table main scope universe protocol dhcp covered by a ipv4:dhcp lease
[115229.846957] wickedd[1164]: route ipv4 10.10.10.0/24 via 192.168.10.20 dev wlan0#3 type unicast table main scope universe protocol dhcp covered by a ipv4:dhcp lease
[115229.847044] wickedd[1164]: route ipv4 192.168.10.0/25 dev wlan0#3 type unicast table main scope link protocol kernel pref-src 192.168.10.10 covered by a ipv4:dhcp lease
[115229.847109] wickedd[1164]: route ipv4 192.168.10.128/25 via 192.168.10.200 dev wlan0#3 type unicast table main scope universe protocol dhcp covered by a ipv4:dhcp lease
[115758.441258] kernel: p2p-dev-wlan0: Failed check-sdata-in-driver check, flags: 0x0
[115758.441770] kernel: wlan0: deauthenticating from 98:de:d0:f9:93:c9 by local choice (Reason: 3=DEAUTH_LEAVING)
[115758.441779] kernel: wlan0: Failed check-sdata-in-driver check, flags: 0x0
[115758.442475] kernel: wlan0: Failed check-sdata-in-driver check, flags: 0x0
[115758.443260] kernel: wlan0: Failed check-sdata-in-driver check, flags: 0x0
[115758.443909] kernel: wlan0: Failed check-sdata-in-driver check, flags: 0x0
[115758.444768] kernel: wlan0: HW problem - can not stop rx aggregation for 98:de:d0:f9:93:c9 tid 0
[115758.444770] kernel: wlan0: HW problem - can not stop rx aggregation for 98:de:d0:f9:93:c9 tid 1
[115758.444771] kernel: wlan0: HW problem - can not stop rx aggregation for 98:de:d0:f9:93:c9 tid 2
[115758.444772] kernel: wlan0: HW problem - can not stop rx aggregation for 98:de:d0:f9:93:c9 tid 3
[115758.444773] kernel: wlan0: HW problem - can not stop rx aggregation for 98:de:d0:f9:93:c9 tid 4
[115758.444775] kernel: wlan0: HW problem - can not stop rx aggregation for 98:de:d0:f9:93:c9 tid 5
[115758.445670] kernel: wlan0: Failed check-sdata-in-driver check, flags: 0x0
[115758.446512] kernel: wlan0: Failed check-sdata-in-driver check, flags: 0x0
[115758.448287] kernel: wlan0: Failed check-sdata-in-driver check, flags: 0x0
[115758.449297] kernel: wlan0: failed to remove key (0, 98:de:d0:f9:93:c9) from hardware (-5)
[115758.451239] kernel: wlan0: Failed check-sdata-in-driver check, flags: 0x0
[115758.454612] kernel: wlan0: Failed check-sdata-in-driver check, flags: 0x0
[115758.455672] kernel: wlan0: Failed check-sdata-in-driver check, flags: 0x0
[115758.456841] kernel: wlan0: Failed check-sdata-in-driver check, flags: 0x0
[115758.459405] kernel: wlan0: failed to remove key (1, ff:ff:ff:ff:ff:ff) from hardware (-5)
[115758.459469] kernel: wlan0: failed to remove key (2, ff:ff:ff:ff:ff:ff) from hardware (-5)
[115760.297072] avahi-daemon[998]: Interface wlan0.IPv4 no longer relevant for mDNS.
[115760.297493] avahi-daemon[998]: Leaving mDNS multicast group on interface wlan0.IPv4 with address 192.168.10.10.
[115760.297570] avahi-daemon[998]: Withdrawing address record for 192.168.10.10 on wlan0.
[115801.049230] nmbd[1817]: Packet send failed to 192.168.10.127(137) ERRNO=Network is unreachable
[115903.404611] su[8781]: The gnome keyring socket is not owned with the same credentials as the user login: /run/user/1000/keyring/control
[115903.405161] su[8781]: gkr-pam: couldn’t unlock the login keyring.

marcslaptop:/home/marc/tmp # ip -statistics link
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
RX: bytes packets errors dropped missed mcast
23684962 164017 0 0 0 0
TX: bytes packets errors dropped carrier collsns
23684962 164017 0 0 0 0
2: eth0: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast state DOWN mode DEFAULT group default qlen 1000
link/ether 38:d5:47:31:54:0f brd ff:ff:ff:ff:ff:ff
RX: bytes packets errors dropped missed mcast
0 0 0 0 0 0
TX: bytes packets errors dropped carrier collsns
0 0 0 0 0 0
altname enp3s0
3: wlan0: <BROADCAST,MULTICAST> mtu 1500 qdisc noqueue state DOWN mode DORMANT group default qlen 1000
link/ether e4:a7:a0:46:83:e0 brd ff:ff:ff:ff:ff:ff
RX: bytes packets errors dropped missed mcast
590954927 2553060 0 0 0 0
TX: bytes packets errors dropped carrier collsns
237520111 1688274 0 0 0 0
altname wlp2s0

marcslaptop:/home/marc/tmp # ip -details link
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 promiscuity 0 minmtu 0 maxmtu 0 addrgenmode eui64 numtxqueues 1 numrxqueues 1 gso_max_size 65536 gso_max_segs 65535
2: eth0: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast state DOWN mode DEFAULT group default qlen 1000
link/ether 38:d5:47:31:54:0f brd ff:ff:ff:ff:ff:ff promiscuity 0 minmtu 68 maxmtu 9194 addrgenmode eui64 numtxqueues 1 numrxqueues 1 gso_max_size 64000 gso_max_segs 64 parentbus pci parentdev 0000:03:00.0
altname enp3s0
3: wlan0: <BROADCAST,MULTICAST> mtu 1500 qdisc noqueue state DOWN mode DORMANT group default qlen 1000
link/ether e4:a7:a0:46:83:e0 brd ff:ff:ff:ff:ff:ff promiscuity 0 minmtu 256 maxmtu 2304 addrgenmode eui64numtxqueues 1 numrxqueues 1 gso_max_size 65536 gso_max_segs 65535 parentbus pci parentdev 0000:02:00.0
altname wlp2s0

marcslaptop:/home/marc/tmp # iw list
Wiphy phy0
max # scan SSIDs: 20
max scan IEs length: 422 bytes
max # sched scan SSIDs: 20
max # match sets: 11
Retry short limit: 7
Retry long limit: 4
Coverage class: 0 (up to 0m)
Device supports RSN-IBSS.
Device supports AP-side u-APSD.
Supported Ciphers:

  • WEP40 (00-0f-ac:1)
  • WEP104 (00-0f-ac:5)
  • TKIP (00-0f-ac:2)
  • CCMP-128 (00-0f-ac:4)
  • CMAC (00-0f-ac:6)
    Available Antennas: TX 0x3 RX 0x3
    Configured Antennas: TX 0x3 RX 0x3
    Supported interface modes:
  • IBSS
  • managed
  • AP
  • AP/VLAN
  • monitor
  • P2P-client
  • P2P-GO
  • P2P-device
    Band 1:
    Capabilities: 0x11ef
    RX LDPC
    HT20/HT40
    SM Power Save disabled
    RX HT20 SGI
    RX HT40 SGI
    TX STBC
    RX STBC 1-stream
    Max AMSDU length: 3839 bytes
    DSSS/CCK HT40
    Maximum RX AMPDU length 65535 bytes (exponent: 0x003)
    Minimum RX AMPDU time spacing: 4 usec (0x05)
    HT Max RX data rate: 300 Mbps
    HT TX/RX MCS rate indexes supported: 0-15
    Bitrates (non-HT):
  • 1.0 Mbps
  • 2.0 Mbps (short preamble supported)
  • 5.5 Mbps (short preamble supported)
  • 11.0 Mbps (short preamble supported)
  • 6.0 Mbps
  • 9.0 Mbps
  • 12.0 Mbps
  • 18.0 Mbps
  • 24.0 Mbps
  • 36.0 Mbps
  • 48.0 Mbps
  • 54.0 Mbps
    Frequencies:
  • 2412 MHz [1] (22.0 dBm)
  • 2417 MHz [2] (22.0 dBm)
  • 2422 MHz [3] (22.0 dBm)
  • 2427 MHz [4] (22.0 dBm)
  • 2432 MHz [5] (22.0 dBm)
  • 2437 MHz [6] (22.0 dBm)
  • 2442 MHz [7] (22.0 dBm)
  • 2447 MHz [8] (22.0 dBm)
  • 2452 MHz [9] (22.0 dBm)
  • 2457 MHz [10] (22.0 dBm)
  • 2462 MHz [11] (22.0 dBm)
  • 2467 MHz [12] (22.0 dBm)
  • 2472 MHz [13] (22.0 dBm)
  • 2484 MHz [14] (disabled)
    Band 2:
    Capabilities: 0x11ef
    RX LDPC
    HT20/HT40
    SM Power Save disabled
    RX HT20 SGI
    RX HT40 SGI
    TX STBC
    RX STBC 1-stream
    Max AMSDU length: 3839 bytes
    DSSS/CCK HT40
    Maximum RX AMPDU length 65535 bytes (exponent: 0x003)
    Minimum RX AMPDU time spacing: 4 usec (0x05)
    HT Max RX data rate: 300 Mbps
    HT TX/RX MCS rate indexes supported: 0-15
    VHT Capabilities (0x038071b0):
    Max MPDU length: 3895
    Supported Channel Width: neither 160 nor 80+80
    RX LDPC
    short GI (80 MHz)
    TX STBC
    SU Beamformee
    VHT RX MCS set:
    1 streams: MCS 0-9
    2 streams: MCS 0-9
    3 streams: not supported
    4 streams: not supported
    5 streams: not supported
    6 streams: not supported
    7 streams: not supported
    8 streams: not supported
    VHT RX highest supported: 0 Mbps
    VHT TX MCS set:
    1 streams: MCS 0-9
    2 streams: MCS 0-9
    3 streams: not supported
    4 streams: not supported
    5 streams: not supported
    6 streams: not supported
    7 streams: not supported
    8 streams: not supported
    VHT TX highest supported: 0 Mbps
    Bitrates (non-HT):
  • 6.0 Mbps
  • 9.0 Mbps
  • 12.0 Mbps
  • 18.0 Mbps
  • 24.0 Mbps
  • 36.0 Mbps
  • 48.0 Mbps
  • 54.0 Mbps
    Frequencies:
  • 5180 MHz [36] (22.0 dBm) (no IR)
  • 5200 MHz [40] (22.0 dBm) (no IR)
  • 5220 MHz [44] (22.0 dBm) (no IR)
  • 5240 MHz [48] (22.0 dBm) (no IR)
  • 5260 MHz [52] (22.0 dBm) (no IR, radar detection)
  • 5280 MHz [56] (22.0 dBm) (no IR, radar detection)
  • 5300 MHz [60] (22.0 dBm) (no IR, radar detection)
  • 5320 MHz [64] (22.0 dBm) (no IR, radar detection)
  • 5340 MHz [68] (disabled)
  • 5360 MHz [72] (disabled)
  • 5380 MHz [76] (disabled)
  • 5400 MHz [80] (disabled)
  • 5420 MHz [84] (disabled)
  • 5440 MHz [88] (disabled)
  • 5460 MHz [92] (disabled)
  • 5480 MHz [96] (disabled)
  • 5500 MHz [100] (22.0 dBm) (no IR, radar detection)
  • 5520 MHz [104] (22.0 dBm) (no IR, radar detection)
  • 5540 MHz [108] (22.0 dBm) (no IR, radar detection)
  • 5560 MHz [112] (22.0 dBm) (no IR, radar detection)
  • 5580 MHz [116] (22.0 dBm) (no IR, radar detection)
  • 5600 MHz [120] (22.0 dBm) (no IR, radar detection)
  • 5620 MHz [124] (22.0 dBm) (no IR, radar detection)
  • 5640 MHz [128] (22.0 dBm) (no IR, radar detection)
  • 5660 MHz [132] (22.0 dBm) (no IR, radar detection)
  • 5680 MHz [136] (22.0 dBm) (no IR, radar detection)
  • 5700 MHz [140] (22.0 dBm) (no IR, radar detection)
  • 5720 MHz [144] (22.0 dBm) (no IR, radar detection)
  • 5745 MHz [149] (22.0 dBm) (no IR)
  • 5765 MHz [153] (22.0 dBm) (no IR)
  • 5785 MHz [157] (22.0 dBm) (no IR)
  • 5805 MHz [161] (22.0 dBm) (no IR)
  • 5825 MHz [165] (22.0 dBm) (no IR)
  • 5845 MHz [169] (disabled)
  • 5865 MHz [173] (disabled)
  • 5885 MHz [177] (disabled)
  • 5905 MHz [181] (disabled)
    Supported commands:
  • new_interface
  • set_interface
  • new_key
  • start_ap
  • new_station
  • new_mpath
  • set_mesh_config
  • set_bss
  • authenticate
  • associate
  • deauthenticate
  • disassociate
  • join_ibss
  • join_mesh
  • remain_on_channel
  • set_tx_bitrate_mask
  • frame
  • frame_wait_cancel
  • set_wiphy_netns
  • set_channel
  • start_sched_scan
  • probe_client
  • set_noack_map
  • register_beacons
  • start_p2p_device
  • set_mcast_rate
  • connect
  • disconnect
  • channel_switch
  • set_qos_map
  • add_tx_ts
  • Unknown command (121)
    WoWLAN support:
  • wake up on disconnect
  • wake up on magic packet
  • wake up on pattern match, up to 20 patterns of 16-128 bytes,
    maximum packet offset 0 bytes
  • can do GTK rekeying
  • wake up on GTK rekey failure
  • wake up on EAP identity request
  • wake up on 4-way handshake
  • wake up on rfkill release
  • wake up on network detection, up to 11 match sets
    software interface modes (can always be added):
  • AP/VLAN
  • monitor
    valid interface combinations:
  • #{ managed } <= 1, #{ AP, P2P-client, P2P-GO } <= 1, #{ P2P-device } <= 1,
    total <= 3, #channels <= 2
    HT Capability overrides:
  • MCS: ff ff ff ff ff ff ff ff ff ff
  • maximum A-MSDU length
  • supported channel width
  • short GI for 40 MHz
  • max A-MPDU length exponent
  • min MPDU start spacing
    Device supports TX status socket option.
    Device supports HT-IBSS.
    Device supports SAE with AUTHENTICATE command
    Device supports low priority scan.
    Device supports scan flush.
    Device supports per-vif TX power setting
    P2P GO supports CT window setting
    P2P GO supports opportunistic powersave setting
    Driver supports full state transitions for AP/GO clients
    Driver supports a userspace MPM
    Driver/device bandwidth changes during BSS lifetime (AP/GO mode)
    Device adds DS IE to probe requests
    Device can update TPC Report IE
    Device supports static SMPS
    Device supports dynamic SMPS
    Device supports WMM-AC admission (TSPECs)
    Device supports configuring vdev MAC-addr on create.
    max # scan plans: 2
    max scan plan interval: 65535
    max scan plan iterations: 254
    Supported TX frame types:
  • IBSS: 0x00 0x10 0x20 0x30 0x40 0x50 0x60 0x70 0x80 0x90 0xa0 0xb0 0xc0 0xd0 0xe0 0xf0
  • managed: 0x00 0x10 0x20 0x30 0x40 0x50 0x60 0x70 0x80 0x90 0xa0 0xb0 0xc0 0xd0 0xe0 0xf0
  • AP: 0x00 0x10 0x20 0x30 0x40 0x50 0x60 0x70 0x80 0x90 0xa0 0xb0 0xc0 0xd0 0xe0 0xf0
  • AP/VLAN: 0x00 0x10 0x20 0x30 0x40 0x50 0x60 0x70 0x80 0x90 0xa0 0xb0 0xc0 0xd0 0xe0 0xf0
  • mesh point: 0x00 0x10 0x20 0x30 0x40 0x50 0x60 0x70 0x80 0x90 0xa0 0xb0 0xc0 0xd0 0xe0 0xf0
  • P2P-client: 0x00 0x10 0x20 0x30 0x40 0x50 0x60 0x70 0x80 0x90 0xa0 0xb0 0xc0 0xd0 0xe0 0xf0
  • P2P-GO: 0x00 0x10 0x20 0x30 0x40 0x50 0x60 0x70 0x80 0x90 0xa0 0xb0 0xc0 0xd0 0xe0 0xf0
  • P2P-device: 0x00 0x10 0x20 0x30 0x40 0x50 0x60 0x70 0x80 0x90 0xa0 0xb0 0xc0 0xd0 0xe0 0xf0
    Supported RX frame types:
  • IBSS: 0x40 0xb0 0xc0 0xd0
  • managed: 0x40 0xb0 0xd0
  • AP: 0x00 0x20 0x40 0xa0 0xb0 0xc0 0xd0
  • AP/VLAN: 0x00 0x20 0x40 0xa0 0xb0 0xc0 0xd0
  • mesh point: 0xb0 0xc0 0xd0
  • P2P-client: 0x40 0xd0
  • P2P-GO: 0x00 0x20 0x40 0xa0 0xb0 0xc0 0xd0
  • P2P-device: 0x40 0xd0
    Device supports VHT-IBSS.

marcslaptop:/home/marc/tmp # iw features
nl80211 features: 0x1

  • split wiphy dump

HTHs Marc…

Better using the preformatted format for you log next time, select the text and press the </> button in the top of the editor window. It should the look like this:

[109942.899202] run-crons[25873]: knockd@wlan0 wlan0 was already running!!!
[113543.242229] run-crons[899]: knockd@wlan0 wlan0 was already running!!!
[115229.742560] wickedd-dhcp4[1153]: wlan0: Committed DHCPv4 lease with address 192.168.10.10 (lease time 14400, renew in 7200 sec, rebind in 12600 sec)
[115229.846628] wickedd[1164]: route ipv4 0.0.0.0/0 via 192.168.10.100 dev wlan0#3 type unicast table main scope universe protocol dhcp covered by a ipv4:dhcp lease
[115229.846957] wickedd[1164]: route ipv4 10.10.10.0/24 via 192.168.10.20 dev wlan0#3 type unicast table main scope universe protocol dhcp covered by a ipv4:dhcp lease
[115229.847044] wickedd[1164]: route ipv4 192.168.10.0/25 dev wlan0#3 type unicast table main scope link protocol kernel pref-src 192.168.10.10 covered by a ipv4:dhcp lease
[115229.847109] wickedd[1164]: route ipv4 192.168.10.128/25 via 192.168.10.200 dev wlan0#3 type unicast table main scope universe protocol dhcp covered by a ipv4:dhcp lease
[115758.441258] kernel: p2p-dev-wlan0: Failed check-sdata-in-driver check, flags: 0x0
[115758.441770] kernel: wlan0: deauthenticating from 98:de:d0:f9:93:c9 by local choice (Reason: 3=DEAUTH_LEAVING)
[115758.441779] kernel: wlan0: Failed check-sdata-in-driver check, flags: 0x0
[115758.442475] kernel: wlan0: Failed check-sdata-in-driver check, flags: 0x0
[115758.443260] kernel: wlan0: Failed check-sdata-in-driver check, flags: 0x0
[115758.443909] kernel: wlan0: Failed check-sdata-in-driver check, flags: 0x0
[115758.444768] kernel: wlan0: HW problem - can not stop rx aggregation for 98:de:d0:f9:93:c9 tid 0
[115758.444770] kernel: wlan0: HW problem - can not stop rx aggregation for 98:de:d0:f9:93:c9 tid 1
[115758.444771] kernel: wlan0: HW problem - can not stop rx aggregation for 98:de:d0:f9:93:c9 tid 2
[115758.444772] kernel: wlan0: HW problem - can not stop rx aggregation for 98:de:d0:f9:93:c9 tid 3

Searching for “Failed check-sdata-in-driver check” I think you are lucky that only the wlan connection is lost and there is no crash :wink:

One suggestion I read is to use wifi.powersave = 2

The other question I have is what is this “run-crons” script.

The kernel is saying this is a HW problem, so my question, any option to replace this wlan card?

@MarcChamberlin:

Several points:

my ASUS laptop

You have a Laptop – which means «usually WLAN» and «it moves – it’s carried about» and –

  • You’re using “Wicked” to manage the network connections …

The normal Network Use Case for a Laptop machine is:

[115903.404611] su[8781]: The gnome keyring socket is not owned with the same credentials as the user login: /run/user/1000/keyring/control
[115903.405161] su[8781]: gkr-pam: couldn’t unlock the login keyring.

In addition, please note the following: <https://doc.opensuse.org/documentation/leap/reference/html/book-reference/cha-nm.html#sec-nm-sec-store>


The “The gnome keyring socket is not owned with the same credentials as the user login” error is being logged in the systemd Journal because, you’re not using NetworkManager to connect to the network.

Basically, you’re fighting against the GNOME Desktop and, the WLAN credentials storage mechanism …

Good Morning Dcurtisfra and all you other Leap 15.4ers… I am not sure how you grokked that I am using Gnome desktop, but actually I am using the KDE/Plasma desktop on all my systems.

Anywise I am going to follow your advice and try using the NetworkManager instead of Wicked to see if that will cure the problem I am having with wlan0 drops. I will let you all know if I continue to have problems of course, but if I do, I am going to suspect a hardware failure is going on, even though a reboot seems to cure whatever ails my wlan0 interface…

Thanks again for your comments and taking the time to reply to me, much appreciate it! Marc…

Because of these entries in your systemd Journal:

[115903.404611] su[8781]: The gnome keyring socket is not owned with the same credentials as the user login: /run/user/1000/keyring/control
[115903.405161] su[8781]: gkr-pam: couldn’t unlock the login keyring.

A GNOME Keyring is a GNOME Keyring is a GNOME Keyring …

  • KDE Plasma uses KWallet …

Please note the ArchWiki guide to automatically unlocking KWallet on (KDE Plasma) login –
<https://wiki.archlinux.org/title/KDE_Wallet#Unlock_KDE_Wallet_automatically_on_login>

@MarcChamberlin:

Is it possible that, for whatever reason, you’ve installed the “gnome-keyring” package?

Hello OpenSuSE & Dcurtisfra, Dunno what happened but I seem to have lost my last response and somehow it never got posted. (why do I hate webmail so much?) Anywise, Dcurtisfra, yes I do have the “gnome-keyring” package installed, Skype is dependent on it…

I have pretty much come to the conclusion that the wifi failure is probably due to hardware failure. It is part of the motherboard on my laptop so there is no way to fix it directly. To work around it, I decided to purchase a WiFi USB dongle which came with a driver package. I ran make and make install then tried to use modprobe to install the driver module into the kernel. And ran into my next snag, it would not install it -

> su root
> password
> modprobe -r 88x2bu
> modprobe 88x2bu
modprobe: ERROR: could not insert '88x2bu': Key was rejected by service

Google research tells me this is caused by using an unsigned driver which is incompatible with my OpenSuSE 15.4 system because OpenSuSE requires the BIOS to run in Secured Boot mode. I tried turning off the Secured Boot mode in the BIOS but that makes OpenSuSE completely unbootable and the system will not even reach the GRUB menu.

A suggestion I came across, for the Ubuntu folks was to use the command - mokutil --disable-validation and then enter an 8 bit password. This I did and then I was told to expect a request from the UEFI which will ask if you want to change security settings. This I never saw…

So now my question becomes what is the OpenSuse way of installing an unsigned driver? Can it be done or do I need to buy a different dongle. If the later, this is a bit of information that is never supplied on websites selling such products so how do I know what dongle will work with OpenSuSE?

As in any other distribution that enforces module signature verification under Secure Boot you cannot install unsigned driver unless you also disable Secure Boot. Either using mokutil or in your BIOS Setup menu.

What makes you think the driver you are installing is unsigned? May be it is signed by different key and you simply need to enable verification by enrolling corresponding certificate with mokutil.

Then you did something different. Like forcing your BIOS into legacy BIOS mode instead of UEFI (which will of course disable Secure Boot as a side effect).

Did you try to reboot?

Please put in your USB Stick and post:
lsusb
To see the ID and maybe you do not need to compile the driver by yourself because it is in the Kernel or there is an kmp in the Hardware Repo.
Because these drivers are signed by openSUSE.

Which manufacturer?
Which chip set?


Never, ever, believe that, you’ll have to compile and build the driver for that device.

  • First, plug it in.
  • Second, check which WiFi semiconductor device is present in the device.
  • Third, load the appropriate (signed) driver included with the openSUSE distribution by means of “modprobe”.
  • Fourth, use it.

If you assume that, a suitable (signed) driver is not included in the openSUSE distribution then, you’ll be faced with building the driver yourself from code obtained from wherever and, signing the built object with the openSUSE keys – instructions are available in the openSUSE Wiki and the Open Build Service …

Thanks Sauerland for your reply/suggestion, I will start with you first since yours is the easiest to answer…

> lsusb
Bus 002 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
Bus 001 Device 006: ID 8087:0a2b Intel Corp. Bluetooth wireless interface
Bus 001 Device 005: ID 0b05:1837 ASUSTek Computer, Inc. ROG MacroKey
Bus 001 Device 004: ID 0bda:b812 Realtek Semiconductor Corp. RTL88x2bu [AC1200 Techkey]
Bus 001 Device 003: ID 0bda:57fa Realtek Semiconductor Corp. USB2.0 HD UVC WebCam
Bus 001 Device 002: ID 046d:c52b Logitech, Inc. Unifying Receiver
Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub

As you can see, the Realtek RTL88x2bu wireless dongle is recognized.

HTHs, Marc

It’s in the Hardware repository: <https://software.opensuse.org/download.html?project=hardware&package=rtl88x2bu>

<https://software.opensuse.org/package/rtl88x2bu>

You are on Leap 15.4 and that ships no driver per default.

You can us the hardware Repo:
zypper ar -f https://download.opensuse.org/repositories/hardware/15.4/ hardware

and can choose between:
1.:
rtl88x2bu and the kmp rtl88x2bu-kmp-default

or

2.:
rtw88-kmp-default

But not both at same time.

Both uses the openSUSE MOK key

Because of what I read doing some Google research and reading articles such as this one -

I don’t grok you on this, how would I know? I don’t see anything about certificates or keys in the documentation provided by the vender “Cudy”. I read about signing drivers on the github website I referenced earlier but I fear my ability to grok it failed. I have not done much in the area of signing drivers or setting up certificates so this is getting above my pay grade!

OK, I will take another look at the BIOS setup menu and see if I figure it out. Dunno, I am no expert on UEFI or Secure Boot either, so I mostly try and make “educated” guesses about what I am suppose to do.

Of course! Many times in fact…

Thanks again for your thoughts Arvidjaar, I am struggling and doing the best I can to understand and follow yours and other’s advice/suggestions. So please bare with me as I flounder around in these waters…

Marc…