To Peter,

See link for information on how to perform a git bisect :
<https://www.kernel.org/pub/software/scm/git/docs/git-bisect.html>

From,
Mark

On Tue, 2013-06-18 at 21:52 +0200, Peter Vágner wrote:
> Hello,
> I am afraid I don't know how to do this.
> Do I have to recompile the whole kernel testing each commit or should I 
> just recompile the driver or even track firmware changes?
> 
> Can you please point me to somewhere where I can read on how to proceed?
> 
> Greetings
> 
> Peter
> 
> 
> On 18.06.2013 21:41, Oleksij Rempel wrote:
> > Hi Peter,
> >
> > if it is regression, can you please do git bisect to find commit 
> > affecting your connection. It can be outside of ath9k_htc source.
> >
> > Am 18.06.2013 20:20, schrieb Peter Vágner:
> >> Hello,
> >> I do also have similar device and am facing a strange problem with it.
> >> After booting up the machine I am unable to connect to certain wireless
> >> AP. That is an old Owislink WL5460 router set up in 2.4B+G mode with WPA
> >> encryption.
> >> After connecting to another AP e.g. non encrypted AP made up of my
> >> Android phone or even encrypted AP created on an iphone I can then
> >> connect to the problematic AP.
> >> I am on arch linux currently with kernel 3.9.6. The issue started
> >> happening as I have updated my kernel to 3.9.1. Previously everything
> >> has been working fine wor me.
> >>
> >> Here are some more details
> >>
> >> $ lsusb | grep Ather
> >> Bus 002 Device 005: ID 0cf3:9271 Atheros Communications, Inc. AR9271
> >> 802.11n
> >>
> >> $ iw dev wlp0s26u1u6 get power_save
> >> Power save: off
> >>
> >>
> >> $ dmesg | grep 00:4f:62:05:df:2d
> >> [   23.237360] wlp0s26u1u6: authenticate with 00:4f:62:05:df:2d
> >> [   23.331989] wlp0s26u1u6: send auth to 00:4f:62:05:df:2d (try 1/3)
> >> [   26.376049] wlp0s26u1u6: send auth to 00:4f:62:05:df:2d (try 2/3)
> >> [   28.335490] wlp0s26u1u6: deauthenticating from 00:4f:62:05:df:2d by
> >> local choice (reason=3)
> >> --- snip ---
> >> This is repeating over and over again until I connect to something else.
> >> And then the final successfull connection to this AP looks like...
> >> [  252.381096] wlp0s26u1u6: authenticate with 00:4f:62:05:df:2d
> >> [  252.520920] wlp0s26u1u6: send auth to 00:4f:62:05:df:2d (try 1/3)
> >> [  252.524098] wlp0s26u1u6: associate with 00:4f:62:05:df:2d (try 1/3)
> >> [  252.538293] wlp0s26u1u6: RX AssocResp from 00:4f:62:05:df:2d
> >> (capab=0x411 status=0 aid=3)
> >>
> >> $ dmesg | grep ath9k_htc
> >> [    7.353707] usb 2-1.6: ath9k_htc: Firmware htc_9271.fw requested
> >> [    7.353772] usbcore: registered new interface driver ath9k_htc
> >> [    7.829552] usb 2-1.6: ath9k_htc: Transferred FW: htc_9271.fw, size:
> >> 51272
> >> [    8.064565] ath9k_htc 2-1.6:1.0: ath9k_htc: HTC initialized with 33
> >> credits
> >> [    8.255145] ath9k_htc 2-1.6:1.0: ath9k_htc: FW Version: 1.3
> >> [  252.522905] ath9k_htc 2-1.6:1.0 wlp0s26u1u6: disabling HT as WMM/QoS
> >> is not supported by the AP
> >> [  252.522908] ath9k_htc 2-1.6:1.0 wlp0s26u1u6: disabling VHT as WMM/QoS
> >> is not supported by the AP
> >>
> >> $ sudo iw dev wlp0s26u1u6 scan dump
> >> BSS 00:4f:62:05:df:2d(on wlp0s26u1u6) -- associated
> >>      TSF: 254735798022 usec (2d, 22:45:35)
> >>      freq: 2412
> >>      beacon interval: 100 TUs
> >>      capability: ESS Privacy ShortSlotTime (0x0411)
> >>      signal: -61.00 dBm
> >>      last seen: 103493 ms ago
> >>      Information elements from Probe Response frame:
> >>      SSID: predok
> >>      Supported rates: 1.0* 2.0* 5.5* 11.0* 6.0 9.0 12.0 18.0
> >>      DS Parameter set: channel 1
> >>      ERP: <no flags>
> >>      Extended supported rates: 24.0 36.0 48.0 54.0
> >>      WPA:     * Version: 1
> >>           * Group cipher: TKIP
> >>           * Pairwise ciphers: TKIP
> >>           * Authentication suites: PSK
> >>      RSN:     * Version: 1
> >>           * Group cipher: TKIP
> >>           * Pairwise ciphers: CCMP
> >>           * Authentication suites: PSK
> >>           * Capabilities: (0x0000)
> >>
> >> $ sudo iw dev wlp0s26u1u6 scan dump
> >> [sudo] password for peto:
> >> BSS 00:4f:62:05:df:2d(on wlp0s26u1u6)
> >>      TSF: 255417536590 usec (2d, 22:56:57)
> >>      freq: 2412
> >>      beacon interval: 100 TUs
> >>      capability: ESS Privacy ShortSlotTime (0x0411)
> >>      signal: -59.00 dBm
> >>      last seen: 386 ms ago
> >>      Information elements from Probe Response frame:
> >>      SSID: predok
> >>      Supported rates: 1.0* 2.0* 5.5* 11.0* 6.0 9.0 12.0 18.0
> >>      DS Parameter set: channel 1
> >>      ERP: <no flags>
> >>      Extended supported rates: 24.0 36.0 48.0 54.0
> >>      WPA:     * Version: 1
> >>           * Group cipher: TKIP
> >>           * Pairwise ciphers: TKIP
> >>           * Authentication suites: PSK
> >>      RSN:     * Version: 1
> >>           * Group cipher: TKIP
> >>           * Pairwise ciphers: CCMP
> >>           * Authentication suites: PSK
> >>           * Capabilities: (0x0000)
> >>
> >>
> >>
> >> Thanks and greetings
> >
> >
> 

-- 
Mark E. Lee <m...@markelee.com>

Attachment: signature.asc
Description: This is a digitally signed message part

_______________________________________________
ath9k-devel mailing list
ath9k-devel@lists.ath9k.org
https://lists.ath9k.org/mailman/listinfo/ath9k-devel

Reply via email to