P2P: Error in find phase

Masashi Honma honma
Mon Nov 22 00:48:12 PST 2010


Hello.

I have tried to boot P2P client with below config file

-------
ctrl_interface=/var/run/wpa_supplicant
ap_scan=1
device_name=p2ptest2
device_type=1-0050F204-1
-------

and these commands.

# ./wpa_supplicant -i wlan0 -D nl80211 -c /home/honma/p2p.conf -dd
# ./wpa_cli -i wlan0 p2p_find

But it looks like failed to initiate listen mode.
This is a debug log.

-------
wpa_supplicant v0.8.x
Initializing interface 'wlan0' conf '/home/honma/p2p.conf' driver 'nl80211' ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/home/honma/p2p.conf' -> '/home/honma/p2p.conf'
Reading configuration file '/home/honma/p2p.conf'
ctrl_interface='/var/run/wpa_supplicant'
ap_scan=1
device_name='p2ptest2'
device_type='1-0050F204-1'
rfkill: initial event: idx=0 type=1 op=0 soft=0 hard=0
netlink: Operstate: linkmode=1, operstate=5
Own MAC address: 00:0a:79:6b:65:2e
wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=0x80dcf8b key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=0x80dcf8b key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=0x80dcf8b key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=0x80dcf8b key_idx=3 set_tx=0 seq_len=0 key_len=0
RSN: flushing PMKID list in the driver
State: DISCONNECTED -> INACTIVE
WPS: UUID based on MAC address - hexdump(len=16): 90 af d5 06 b4 dc 54 85 8c 7d 05 2e 0f 36 15 fb
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: Supplicant port status: Unauthorized
EAPOL: Supplicant port status: Unauthorized
P2P: Own listen channel: 6
P2P: Random operating channel: 81:1
nl80211: Regulatory information - country=00
nl80211: 2402-2472 @ 40 MHz
nl80211: 2457-2482 @ 20 MHz
nl80211: 2474-2494 @ 20 MHz
nl80211: 5170-5250 @ 40 MHz
nl80211: 5735-5835 @ 40 MHz
nl80211: Added 802.11b mode based on 802.11g information
P2P: Add operating class 81
P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
Added interface wlan0
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Event 5 received on interface wlan0
EAPOL: disable timer tick
EAPOL: Supplicant port status: Unauthorized
RX ctrl_iface - hexdump_ascii(len=8):
     50 32 50 5f 46 49 4e 44                           P2P_FIND        
P2P: Starting find (type=0)
P2P: Clear timeout (state=IDLE)
P2P: State IDLE -> SEARCH
WPS: Building WPS IE for Probe Request
WPS:  * Version (hardcoded 0x10)
WPS:  * Request Type
WPS:  * Config Methods (10c)
WPS:  * UUID-E
WPS:  * Primary Device Type
WPS:  * RF Bands (3)
WPS:  * Association State
WPS:  * Configuration Error (0)
WPS:  * Device Password ID (0)
WPS:  * Device Name
P2P: * P2P IE header
P2P: * Capability dev=23 group=00
P2P: * Listen Channel: Regulatory Class 81 Channel 6
nl80211: Scan SSID - hexdump_ascii(len=7):
     44 49 52 45 43 54 2d                              DIRECT-         
nl80211: Scan extra IEs - hexdump_ascii(len=108):
     dd 57 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 01   _W_P___J____:___
     10 08 00 02 01 0c 10 47 00 10 90 af d5 06 b4 dc   _______G________
     54 85 8c 7d 05 2e 0f 36 15 fb 10 54 00 08 00 01   T__}_._6___T____
     00 50 f2 04 00 01 10 3c 00 01 03 10 02 00 02 00   _P_____<________
     00 10 09 00 02 00 00 10 12 00 02 00 00 10 11 00   ________________
     08 70 32 70 74 65 73 74 32 dd 11 50 6f 9a 09 02   _p2ptest2__Po___
     02 00 23 00 06 05 00 58 58 04 51 06               __#____XX_Q_    
Scan requested (ret=0) - scan timeout 10 seconds
P2P: Running p2p_scan
nl80211: Event message available
nl80211: Scan trigger
nl80211: Event message available
nl80211: New scan results available
Event 3 received on interface wlan0
Received scan results (2 BSSes)
BSS: Start scan result update 1
BSS: Add new id 0 BSSID 00:22:43:4c:10:fa SSID 'DIRECT-nF'
BSS: Add new id 1 BSSID 00:24:a5:cf:a5:24 SSID '0024A5CFA524'
P2P: Scan results received (2 BSS)
P2P: Parsing WPS IE
P2P: Config Methods (WPS): 0x108
P2P: Primary Device Type (WPS): 1-0050F204-1
P2P: Parsing P2P IE
P2P: Attribute 2 length 2
P2P: * Device Capability 21 Group Capability 09
P2P: Attribute 13 length 29
P2P: * Device Info: addr 00:22:43:4c:10:fa primary device type 1-0050F204-1 device name 'p2ptest1' config methods 0x188
P2P: Attribute 14 length 0
P2P: * Group Info
P2P: Peer found with Listen frequency 2412 MHz
P2P-DEVICE-FOUND 00:22:43:4c:10:fa p2p_dev_addr=00:22:43:4c:10:fa pri_dev_type=1-0050F204-1 name='p2ptest1' config_methods=0x188 dev_capab=0x21 group_capab=0x9
P2P: Parsing WPS IE
P2P: Ignore scan data without P2P Device Info or P2P Device Id
P2P: State SEARCH -> SEARCH
P2P: Starting short listen state (state=SEARCH)
WPS:  * Version (hardcoded 0x10)
P2P: WPS IE Device Password ID: 0
P2P: * P2P IE header
P2P: * Capability dev=23 group=00
P2P: * Device Info
nl80211: Register frame command failed (type=64): ret=-22 (Invalid argument)
nl80211: Register frame match - hexdump(len=0): [NULL]
P2P: Failed to request the driver to report received Probe Request frames
P2P: Failed to start listen mode
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Event 5 received on interface wlan0
RX ctrl_iface - hexdump_ascii(len=9):
     54 45 52 4d 49 4e 41 54 45                        TERMINATE       
P2P: Clear timeout (state=SEARCH)
P2P: State SEARCH -> IDLE
Removing interface wlan0
No keys have been configured - skip key clearing
State: INACTIVE -> DISCONNECTED
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
No keys have been configured - skip key clearing
BSS: Remove id 0 BSSID 00:22:43:4c:10:fa SSID 'DIRECT-nF'
BSS: Remove id 1 BSSID 00:24:a5:cf:a5:24 SSID '0024A5CFA524'
Cancelling scan request
Cancelling authentication timeout
netlink: Operstate: linkmode=0, operstate=6
-------

It looks wpa_driver_nl80211_probe_req_report() function failed to register probe request frame. Is there any fault in my config file or something ?

Regards,
Masashi Honma.



More information about the Hostap mailing list