Mesh on ath10k drops all packets

Bob Copeland me at bobcopeland.com
Fri Jan 22 04:51:55 PST 2016


On Fri, Jan 22, 2016 at 12:01:36PM +0100, Jeroen Roovers wrote:
> Maybe related?

Could be.

> On 22 January 2016 at 11:55, Jeroen Roovers <jeroen.roovers at airfi.aero> wrote:
> > wpa_supplicant config looks like this:
> >
> > user_mpm=1
> > update_config=1
> >
> > network={
> >         mode=5
> >         ssid="_"
> >         frequency=2412
> >         proto=RSN
> >         key_mgmt=SAE
> >         pairwise=CCMP
> >         group=CCMP
> >         psk="..."
> > }

What happens with non-secure mesh, i.e.:

user_mpm=1
network={
    mode=5
    ssid="_"
    frequency=2412
    key_mgmt=NONE
}

You don't really need to specify proto, pairwise, and group, by the way.

> > On 22 January 2016 at 11:38, Jeroen Roovers <jeroen.roovers at airfi.aero> wrote:
> >> Jan 22 11:34:21 wim kernel: wlan0: TBTT : max clockdrift=0; too small to adjust
> >> Jan 22 11:34:22 wim kernel: wlan0: STA 40:e2:30:cb:9a:11 : offset was
> >> invalid, t_offset=1712128384
> >> Jan 22 11:34:22 wim kernel: wlan0: TBTT : max clockdrift=0; too small to adjust
> >> Jan 22 11:34:23 wim kernel: wlan0: STA 40:e2:30:cb:9a:11 : is adjusting TBTT
> >> Jan 22 11:34:23 wim kernel: wlan0: TBTT : max clockdrift=0; too small to adjust
> >> Jan 22 11:34:24 wim kernel: wlan0: STA 40:e2:30:cb:9a:11 : offset was
> >> invalid, t_offset=1714176384

All of this is just mesh sync debugging, you actually don't really need
mesh sync unless you are doing power save, collision avoidance, or
controlled channel access, none of which are fully implemented in the
kernel.

-- 
Bob Copeland %% http://bobcopeland.com/



More information about the ath10k mailing list