Ack! This site is moving to tomhorsley.com since Comcast's efforts to improve their world's worst customer service ranking apparently include terminating web hosting for their existing customers.

RTL8192cu AP mode in linux

  • Day 1 (Windows yes, Linux no)
  • Day 2 (Found linux wireless site)
  • Day 3 (Partial success)
  • Success (with new ralink dongle)

First day - bleak output.

This page does not yet report success, it is merely about my hunt for success (eventually I did have success, but not with the original 8192 dongle).

I bought one of these wireless USB dongles because it was really cheap, and the reviews reported success using it as an access point (but they only mentioned windows, not linux, so it was a gamble).

I tried it out on a Windows XP box, and it worked great there, both to connect to an access point and as an access point when switched to AP mode using the realtek software. The windows driver name was RTL8192cu, which was a pretty good hint about the chipset.

The question was then, can I make it work on my Fedora 14 linux box?

Plugging it in to a unmodified Fedora 14, shows the answer is at least "Not right out of the box." There does not appear to be any driver for the device in fedora yet.

If I go to the Realtek home page and search for RTL8192cu, I can read about it here, and follow the link to the downloads page for it, where I find the RTL8192CU_linux_v2.0.1502.20110402.zip file link in the section of downloads for that chipset.

In a different goose chase, I found the hostapd home page URL in the rpm info for the hostapd rpm I installed on my system. Going there and reading up on hostapd (which appears to be the linux way of running an access point unless maybe it is obsolete which, also with linux, is always possible but a google for alternatives didn't turn up any pointers).

Visiting that site, points me at mac80211, which appears to be the common interface everything is supposed to use to talk access point to lower level drivers (or something like that, I got lost a while back).

Anyway, visitng one more link takes me to the list of drivers and their capabilities, and the row in that table for r8192cu says that the driver supports the config capability, but ominously has question marks in other columns for AP mode operation.

I think the realtek driver I found above is the same as the driver this table is talking about (but I'm really unsure about that). I did find some driver source for r8192cu from a repo being prepared for centos 6, and looking at that source, it certainly appeared to have originated from the same realtek source code.

Anyway, using this driver, and the NetworkManager app from a gnome session on fedora 14, I was indeed able to connect to my access point, so the driver works great for normal NIC-like usage, and at least the question marks in the table leave some hope :-).

So I proceeded to try and configure hostapd, putting some mysterious gibberish I found on the web in /etc/hostapd/hostapd.conf

When I try hostapd it doesn't work at all, but I eventually figure out I need to first run:

modprobe mac80211

It still doesn't work for not very well explained reasons, so I compile the latest stable hostapd-0.7.3 from the tarball and run it. It still doesn't work, but I get more detailed gibberish.

And that's it. I have exhausted all my know-how, so it looks bleak at the moment. The source code for the driver is full of references to AP mode, so it looks like it tries to support it. In case it is useful for anyone, here is the dmesg output

Day two - the hints start coming in

Obviously it was time to hit the mailing lists, and this thread in the linux wireless mailing list got me making lots of progress. In particular the pointer to the compat-wireless source code worked wonders.

It was not trivial, but I got it to compile on my Fedora 14 box. I had to back out the changes in the latest snapshot (2011-05-05 at the time I grabbed it) that called kfree_rcu and replace the calls with the older code that would compile with the fedora kernel headers (which do not define that routine). I also had to find and remove the vzalloc implementation in the compat-2.6.37.c source file since the fedora kernel already exports that symbol (a back ported patch in fedora perhaps?). Here is the patch that makes this build for me on fedora 14.

Anyway, after building and installing (and rebooting for good measure) all this stuff. I can plug in the dongle and see lots more output from hostapd, and even connect my phone briefly (but then it gets disconnected). So it is definitely looking like this may work someday, but isn't quite there yet (it might even work now if I knew exactly what to try, I suspect trying it without encryption might function better).

Day three - limited success

I decided to get as much junk out of the way as possible, and produced this minimal config file from web searches and random guessing :-). This brings up the access point with absolutely no security, and it connects to my bridge br0 that I already use for virtual machine networking. My netgear DD-WRT router is already setup to assign IP addresses via DHCP on that subnet.

When I plug in the dongle and start hostapd pointing to the minimal config, my phone can indeed connect and even gets assigned an IP, but about every 10 or 15 seconds it disconnects and reconnects. While it is connected though, I can go into the browser and access web pages, and it seems to function well for those few seconds. When I look at /var/log/messages I see lots of repeated messages at the same frequency the phone is connecting and disconnecting.

I also see similar looking repeated messages in the hostapd debug output.

A new dongle and complete success!

The still experimental driver for my original dongle resulted in all the effort you see above, but in this thread in the Fedora users mailing list someone mentioned that the Belkin F5D7050 could operate as an access point in existing fedora versions, so I ordered one to give it a whirl.

There were plenty of scathing reviews on the amazon site, and I've never found Belkin products to be very reliable, but in this case, it worked like a charm! I can plug it in, and run my ap-up script, and my desktop becomes an access point. When I no longer need it, I can run the ap-down script and reverse the effects of the up script.

Those scripts start and stop various services which need to be configured. The /etc/hostapd/hostapd.conf file is used to run the access point with WPA2 security and disables the SSID broadcast so some random member of the IT department won't happen to notice it in a casual scan :-). This config uses channel 11 because I downloaded the OM Simple Wifi Scanner app for my android phone and used it to determine which channel numbers were already in use for visible access points in the area. Channel 11 was far away from all of them, so I picked it.

For hostapd to be able to assign IP addresses to devices that connect to my desktop, I needed to run a small private network from my desktop and provide a dhcp server to assign IP addresses. The dhcpd server uses the /etc/dhcp/dhcpd.conf file and assigns addresses in the private subnet 192.168.9.0/24 (9 picked pretty much at random). The router spec in the config uses 192.168.9.1, which is the IP the ifconfig command in the ap-up script gives to the wlan0 interface which is the usb dongle (wlan0 was the name assigned by fedora when I first plugged it in).

For it to actually function as a router, I need to enable IP forwarding, which I do in the /etc/sysctl.conf file. (Maybe I should turn this on and off in the ap-up and ap-down scripts, but it doesn't seem to hurt anything to leave it on all the time.)

Finally, for the connected devices to get to any machine other than my desktop, I need to run a NAT firewall on the system. If you normally run other firewall rules as well, this might get tricky, but I normally have no firewall, so I just configured NAT in /etc/sysconfig/iptables and turn the iptables service on and off in the up and down scripts to enable or disable NAT.

Final set of working config files

ap-up script to start access point

#!/bin/sh
#
# Run as root - brings up the access point
#
ifconfig wlan0 netmask 255.255.255.0 192.168.9.1
service iptables start
service dhcpd start
service hostapd start

ap-down script to stop access point

#!/bin/sh
#
# Run as root - brings down the access point
#
service hostapd stop
service dhcpd stop
service iptables stop

Working /etc/hostapd/hostapd.conf file

ctrl_interface=/var/run/hostapd
ctrl_interface_group=root
macaddr_acl=0
auth_algs=1
ignore_broadcast_ssid=1
wpa=2
wpa_key_mgmt=WPA-PSK
wpa_pairwise=TKIP
rsn_pairwise=CCMP
wpa_passphrase=YourPassphraseHere
driver=nl80211
interface=wlan0
bridge=br0
driver=nl80211
hw_mode=g
channel=11
ssid=YourSSIDHere

Working /etc/dhcp/dhcpd.conf file

option domain-name-servers YourDNSIPAddrHere;
option routers 192.168.9.1;
default-lease-time 86400;
ignore client-updates;
subnet 192.168.9.0 netmask 255.255.255.0 {
   range 192.168.9.2 192.168.9.254;
   default-lease-time 86400;
   max-lease-time 86400;
}

Lines from /etc/sysctl.conf for forwarding

# Controls IP packet forwarding
net.ipv4.ip_forward = 1

/etc/sysconfig/iptables for NAT

# Generated by iptables-save v1.4.9 on Fri May 20 09:58:26 2011
*nat
:PREROUTING ACCEPT [34:2176]
:OUTPUT ACCEPT [55:4168]
:POSTROUTING ACCEPT [55:4168]
-A POSTROUTING -o eth0 -j MASQUERADE 
COMMIT
# Completed on Fri May 20 09:58:26 2011
# Generated by iptables-save v1.4.9 on Fri May 20 09:58:26 2011
*filter
:INPUT ACCEPT [392008:153506294]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [364620:51248845]
COMMIT
# Completed on Fri May 20 09:58:26 2011

Various other logs and config files

/etc/hostapd/hostapd.conf

ctrl_interface=/var/run/hostapd
ctrl_interface_group=hostapd
macaddr_acl=0
auth_algs=1
ignore_broadcast_ssid=0
wpa=2
wpa_key_mgmt=WPA-PSK
wpa_pairwise=TKIP
rsn_pairwise=CCMP
wpa_passphrase=NotReallyMyPassphrase
driver=nl80211
interface=wlan0
bridge=br0
driver=nl80211
hw_mode=g
channel=1
ssid=NotReallyMySsid

first hostapd attempt

Configuration file: /etc/hostapd/hostapd.conf
ctrl_interface_group=501 (from group name 'hostapd')
nl80211: Register Action command failed: ret=-19 (No such device)
nl80211: Register Action match - hexdump(len=1): 06
nl80211: Failed to register Action frame processing - ignore for now
nl80211: Add own interface ifindex 3
nl80211: Add own interface ifindex 5
nl80211: Failed to set interface 5 to mode 3: -19 (No such device)
nl80211: Failed to set interface 5 to mode 3: -19 (No such device)
nl80211: Interface mode change to 3 from 0 failed
nl80211: Failed to set interface wlan0 into AP mode
nl80211 driver initialization failed.
rmdir[ctrl_interface]: No such file or directory
ELOOP: remaining socket: sock=4 eloop_data=0x13230d0 user_data=0x1324a90 handler=0x42b060
ELOOP: remaining socket: sock=6 eloop_data=0x1326fd0 user_data=(nil) handler=0x4341f0

dmesg output

[ 3235.329672] cfg80211: Calling CRDA to update world regulatory domain
[ 3235.372709] cfg80211: World regulatory domain updated:
[ 3235.372712]     (start_freq - end_freq @ bandwidth), (max_antenna_gain, max_eirp)
[ 3235.372715]     (2402000 KHz - 2472000 KHz @ 40000 KHz), (300 mBi, 2000 mBm)
[ 3235.372718]     (2457000 KHz - 2482000 KHz @ 20000 KHz), (300 mBi, 2000 mBm)
[ 3235.372721]     (2474000 KHz - 2494000 KHz @ 20000 KHz), (300 mBi, 2000 mBm)
[ 3235.372724]     (5170000 KHz - 5250000 KHz @ 40000 KHz), (300 mBi, 2000 mBm)
[ 3235.372727]     (5735000 KHz - 5835000 KHz @ 40000 KHz), (300 mBi, 2000 mBm)
[ 3250.865055] usb 2-5: new high speed USB device using ehci_hcd and address 6
[ 3250.980772] usb 2-5: New USB device found, idVendor=0bda, idProduct=8176
[ 3250.980776] usb 2-5: New USB device strings: Mfr=1, Product=2, SerialNumber=3
[ 3250.980780] usb 2-5: Product: 802.11n WLAN Adapter
[ 3250.980782] usb 2-5: Manufacturer: Realtek
[ 3250.980784] usb 2-5: SerialNumber: 00e04c000001
[ 3251.292441] rtw driver version=v2.0.1324.20110126
[ 3251.292488] register rtl8192_netdev_ops to netdev_ops
[ 3251.292490] 
[ 3251.292491] 8192_usb_endpoint_descriptor(0):
[ 3251.292492] bLength=7
[ 3251.292493] bDescriptorType=5
[ 3251.292494] bEndpointAddress=81
[ 3251.292495] wMaxPacketSize=200
[ 3251.292496] bInterval=0
[ 3251.292497] 
[ 3251.292498] 8192_usb_endpoint_descriptor(1):
[ 3251.292499] bLength=7
[ 3251.292500] bDescriptorType=5
[ 3251.292501] bEndpointAddress=2
[ 3251.292502] wMaxPacketSize=200
[ 3251.292503] bInterval=0
[ 3251.292504] 
[ 3251.292504] 8192_usb_endpoint_descriptor(2):
[ 3251.292506] bLength=7
[ 3251.292507] bDescriptorType=5
[ 3251.292508] bEndpointAddress=3
[ 3251.292509] wMaxPacketSize=200
[ 3251.292510] bInterval=0
[ 3251.292511] 
[ 3251.292511] 8192_usb_endpoint_descriptor(3):
[ 3251.292512] bLength=7
[ 3251.292513] bDescriptorType=5
[ 3251.292514] bEndpointAddress=84
[ 3251.292515] wMaxPacketSize=40
[ 3251.292516] bInterval=1
[ 3251.292518] nr_endpoint=4, in_num=2, out_num=2
[ 3251.292518] 
[ 3251.292519] 8192cu: USB_SPEED_HIGH
[ 3251.292655] Chip Version ID: VERSION_NORMAL_TSMC_CHIP_88C.
[ 3251.293344] EEPROM type is E-FUSE
[ 3251.293347] ====> ReadAdapterInfo8192C
[ 3251.293402] Boot from EFUSE, Autoload Success !
[ 3251.298661] rtw_efuse_get_max_phy_size...eeprompriv.efuse_phy_max_size(504)
[ 3251.694183] EEPROMVID = 0x0bda
[ 3251.694185] EEPROMPID = 0x8176
[ 3251.694187] EEPROMCustomerID : 0x00
[ 3251.694189] EEPROMSubCustomerID: 0x00
[ 3251.694190] RT_CustomerID: 0x00
[ 3251.694193] RT_ChannelPlan: 0x02
[ 3251.694194] _ReadBoardType(0)
[ 3251.694196] ### AntDivCfg(0)
[ 3251.694198] BT Coexistance = disable
[ 3251.694200] _ReadHWPDSelection...bHWPwrPindetect(0)-bHWPowerdown(0) ,bSupportRemoteWakeup(0)
[ 3251.694203] ### PS params=>  power_mgnt(0),usbss_enable(0) ###
[ 3251.694205] _InitAdapterVariablesByPROM(): REPLACEMENT = 0
[ 3251.694207] <==== ReadAdapterInfo8192C
[ 3251.694213] MAC Address from efuse= 00:a1:b0:30:25:06
[ 3251.694493] usbcore: registered new interface driver rtw_usb_drv
[ 3280.674194] +8192cu_drv - drv_open, bup=0
[ 3280.749707]  ===> FirmwareDownload91C() fw:Rtl819XFwImageArray_TSMC
[ 3280.749715] fw_ver=v60, fw_subver=0, sig=0x88c0
[ 3280.784954] fw download ok!
[ 3280.784957] Set RF Chip ID to RF_6052 and RF type to 1T1R.
[ 3280.784959] rf_chip=0x4, rf_type=0x3
[ 3281.133722] IQK:Start!!!
[ 3281.144597] Path A IQK Success!!
[ 3281.152225] Path A IQK Success!!
[ 3281.156850] IQK: final_candidate is 0
[ 3281.156854] IQK: RegE94=102 RegE9C=13 RegEA4=fe RegEAC=0 RegEB4=0 RegEBC=0 RegEC4=0 RegECC=0
[ 3281.156855]  Path A IQ Calibration Success !
[ 3281.265733] MAC Address from REG = 0-a1-b0-30-25-6
[ 3281.266607] pdmpriv->TxPowerTrackControl = 1
[ 3281.266982] MAC Address = 0-a1-b0-30-25-6
[ 3281.270864] -871x_drv - drv_open, bup=1
[ 3281.272813] ADDRCONF(NETDEV_UP): wlan0: link is not ready

Patch for building on f14

--- compat-wireless-2011-05-05/compat/compat-2.6.37.c   2011-05-05 15:04:45.000000000 -0400
+++ compat-wireless-2011-05-05/compat/compat-2.6.37.c   2011-05-06 17:21:09.000000000 -0400
@@ -334,24 +334,4 @@
 }
 EXPORT_SYMBOL(compat_led_classdev_unregister);
 
-/**
- *     vzalloc - allocate virtually contiguous memory with zero fill
- *     @size:  allocation size
- *     Allocate enough pages to cover @size from the page level
- *     allocator and map them into contiguous kernel virtual space.
- *     The memory allocated is set to zero.
- *
- *     For tight control over page level allocator and protection flags
- *     use __vmalloc() instead.
- */
-void *vzalloc(unsigned long size)
-{
-       void *buf;
-       buf = vmalloc(size);
-       if (buf)
-               memset(buf, 0, size);
-       return buf;
-}
-EXPORT_SYMBOL(vzalloc);
-
 #endif
--- compat-wireless-2011-05-05/net/mac80211/agg-tx.c    2011-05-05 15:04:45.000000000 -0400
+++ compat-wireless-2011-05-05/net/mac80211/agg-tx.c    2011-05-06 17:21:59.000000000 -0400
@@ -136,6 +136,14 @@
        ieee80211_tx_skb(sdata, skb);
 }
 
+static void kfree_tid_tx(struct rcu_head *rcu_head)
+{
+       struct tid_ampdu_tx *tid_tx =
+           container_of(rcu_head, struct tid_ampdu_tx, rcu_head);
+
+       kfree(tid_tx);
+}
+
 int ___ieee80211_stop_tx_ba_session(struct sta_info *sta, u16 tid,
                                    enum ieee80211_back_parties initiator,
                                    bool tx)
@@ -155,7 +163,7 @@
                /* not even started yet! */
                rcu_assign_pointer(sta->ampdu_mlme.tid_tx[tid], NULL);
                spin_unlock_bh(&sta->lock);
-               kfree_rcu(tid_tx, rcu_head);
+               call_rcu(&tid_tx->rcu_head, kfree_tid_tx);
                return 0;
        }
 
@@ -314,7 +322,7 @@
                spin_unlock_bh(&sta->lock);
 
                ieee80211_wake_queue_agg(local, tid);
-               kfree_rcu(tid_tx, rcu_head);
+               call_rcu(&tid_tx->rcu_head, kfree_tid_tx);
                return;
        }
 
@@ -693,7 +701,7 @@
 
        ieee80211_agg_splice_finish(local, tid);
 
-       kfree_rcu(tid_tx, rcu_head);
+       call_rcu(&tid_tx->rcu_head, kfree_tid_tx);
 
  unlock_sta:
        spin_unlock_bh(&sta->lock);
--- compat-wireless-2011-05-05/net/mac80211/work.c      2011-05-05 15:04:45.000000000 -0400
+++ compat-wireless-2011-05-05/net/mac80211/work.c      2011-05-06 17:21:44.000000000 -0400
@@ -65,9 +65,17 @@
                mod_timer(&local->work_timer, timeout);
 }
 
+static void work_free_rcu(struct rcu_head *head)
+{
+       struct ieee80211_work *wk =
+               container_of(head, struct ieee80211_work, rcu_head);
+
+       kfree(wk);
+}
+
 void free_work(struct ieee80211_work *wk)
 {
-       kfree_rcu(wk, rcu_head);
+       call_rcu(&wk->rcu_head, work_free_rcu);
 }
 
 static int ieee80211_compatible_rates(const u8 *supp_rates, int supp_rates_len,

Better hostapd output

Configuration file: /etc/hostapd/hostapd.conf
ctrl_interface_group=0 (from group name 'root')
nl80211: Add own interface ifindex 3
nl80211: New interface mon.wlan0 created: ifindex=6
nl80211: Add own interface ifindex 6
nl80211: Add own interface ifindex 7
nl80211: Adding interface wlan0 into bridge br0
BSS count 1, BSSID mask 00:00:00:00:00:00 (0 bits)
nl80211: Added 802.11b mode based on 802.11g information
Allowed channel: mode=1 chan=1 freq=2412 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=2 freq=2417 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=3 freq=2422 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=4 freq=2427 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=5 freq=2432 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=6 freq=2437 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=7 freq=2442 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=8 freq=2447 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=9 freq=2452 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=10 freq=2457 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=11 freq=2462 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=1 freq=2412 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=2 freq=2417 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=3 freq=2422 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=4 freq=2427 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=5 freq=2432 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=6 freq=2437 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=7 freq=2442 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=8 freq=2447 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=9 freq=2452 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=10 freq=2457 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=11 freq=2462 MHz max_tx_power=20 dBm
RATE[0] rate=10 flags=0x1
RATE[1] rate=20 flags=0x1
RATE[2] rate=55 flags=0x1
RATE[3] rate=110 flags=0x1
RATE[4] rate=60 flags=0x0
RATE[5] rate=90 flags=0x0
RATE[6] rate=120 flags=0x0
RATE[7] rate=180 flags=0x0
RATE[8] rate=240 flags=0x0
RATE[9] rate=360 flags=0x0
RATE[10] rate=480 flags=0x0
RATE[11] rate=540 flags=0x0
Completing interface initialization
Mode: IEEE 802.11g  Channel: 1  Frequency: 2412 MHz
Flushing old station entries
Deauthenticate all stations
wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=0 set_tx=1 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
Using interface wlan0 with hwaddr 00:a1:b0:30:25:06 and ssid 'Sparrow'
Deriving WPA PSK based on passphrase
SSID - hexdump_ascii(len=7):
     53 70 61 72 72 6f 77                              Sparrow         
PSK (ASCII passphrase) - hexdump_ascii(len=14): [REMOVED]
PSK (from passphrase) - hexdump(len=32): [REMOVED]
WPA: group state machine entering state GTK_INIT (VLAN-ID 0)
GMK - hexdump(len=32): [REMOVED]
GTK - hexdump(len=16): [REMOVED]
WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0)
wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=(nil) key_idx=1 set_tx=1 seq_len=0 key_len=16
nl80211: Set beacon (beacon_set=0)
wlan0: Setup of interface done.
RTM_NEWLINK: operstate=0 ifi_flags=0x1002 ()
RTM_NEWLINK, IFLA_IFNAME: Interface 'mon.wlan0' added
Unknown event 5
RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'mon.wlan0' added
Unknown event 5
RTM_NEWLINK: operstate=0 ifi_flags=0x1002 ()
RTM_NEWLINK, IFLA_IFNAME: Interface 'br0' added
Unknown event 5
RTM_NEWLINK: operstate=0 ifi_flags=0x1002 ()
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Unknown event 5
nl80211: Add ifindex 7 for bridge br0
nl80211: Add own interface ifindex 7
RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Unknown event 5
RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Unknown event 5
nl80211: Add ifindex 7 for bridge br0
nl80211: Add own interface ifindex 7

Unknown Broadcom information element ignored (type=52 len=26)

   >> These Broadcom messages repeat a lot, so I'm only
      leaving in a few examples <<

Unknown Broadcom information element ignored (type=52 len=26)

Unknown Broadcom information element ignored (type=52 len=26)

unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 60:a1:0a:c7:af:01 sent probe request for broadcast SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 60:a1:0a:c7:af:01 sent probe request for broadcast SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 60:a1:0a:c7:af:01 sent probe request for broadcast SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 60:a1:0a:c7:af:01 sent probe request for broadcast SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 60:a1:0a:c7:af:01 sent probe request for broadcast SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 60:a1:0a:c7:af:01 sent probe request for broadcast SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 60:a1:0a:c7:af:01 sent probe request for our SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 60:a1:0a:c7:af:01 sent probe request for our SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 60:a1:0a:c7:af:01 sent probe request for our SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 60:a1:0a:c7:af:01 sent probe request for our SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 60:a1:0a:c7:af:01 sent probe request for our SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 60:a1:0a:c7:af:01 sent probe request for our SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 60:a1:0a:c7:af:01 sent probe request for our SSID
mgmt::proberesp cb
mgmt::auth
authentication: STA=60:a1:0a:c7:af:01 auth_alg=0 auth_transaction=1 status_code=0 wep=0
  New STA
wlan0: STA 60:a1:0a:c7:af:01 IEEE 802.11: authentication OK (open system)
wlan0: STA 60:a1:0a:c7:af:01 MLME: MLME-AUTHENTICATE.indication(60:a1:0a:c7:af:01, OPEN_SYSTEM)
wlan0: STA 60:a1:0a:c7:af:01 MLME: MLME-DELETEKEYS.request(60:a1:0a:c7:af:01)
authentication reply: STA=60:a1:0a:c7:af:01 auth_alg=0 auth_transaction=2 resp=0 (IE len=0)
mgmt::auth cb
wlan0: STA 60:a1:0a:c7:af:01 IEEE 802.11: authenticated
mgmt::assoc_req
association request: STA=60:a1:0a:c7:af:01 capab_info=0x431 listen_interval=10
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
  new AID 1
wlan0: STA 60:a1:0a:c7:af:01 IEEE 802.11: association OK (aid 1)
mgmt::assoc_resp cb
wlan0: STA 60:a1:0a:c7:af:01 IEEE 802.11: associated (aid 1)
wlan0: STA 60:a1:0a:c7:af:01 MLME: MLME-ASSOCIATE.indication(60:a1:0a:c7:af:01)
wlan0: STA 60:a1:0a:c7:af:01 MLME: MLME-DELETEKEYS.request(60:a1:0a:c7:af:01)
wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=0x1438300 key_idx=0 set_tx=1 seq_len=0 key_len=0
   addr=60:a1:0a:c7:af:01
wlan0: STA 60:a1:0a:c7:af:01 WPA: event 1 notification
wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=0x1438300 key_idx=0 set_tx=1 seq_len=0 key_len=0
   addr=60:a1:0a:c7:af:01
wlan0: STA 60:a1:0a:c7:af:01 WPA: start authentication
WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=0x1438300 key_idx=0 set_tx=1 seq_len=0 key_len=0
   addr=60:a1:0a:c7:af:01
wlan0: STA 60:a1:0a:c7:af:01 IEEE 802.1X: unauthorizing port
WPA: 60:a1:0a:c7:af:01 WPA_PTK_GROUP entering state IDLE
WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state AUTHENTICATION
WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state AUTHENTICATION2
WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state INITPSK
WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state PTKSTART
wlan0: STA 60:a1:0a:c7:af:01 WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 keyidx=0 encr=0)
nl80211: Event message available
nl80211: Ignored unknown event (cmd=19)
IEEE 802.1X: 60:a1:0a:c7:af:01 TX status - version=2 type=3 length=95 - ack=1
wlan0: STA 60:a1:0a:c7:af:01 WPA: EAPOL-Key timeout
WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state PTKSTART
wlan0: STA 60:a1:0a:c7:af:01 WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 keyidx=0 encr=0)
IEEE 802.1X: 60:a1:0a:c7:af:01 TX status - version=2 type=3 length=95 - ack=1
wlan0: STA 60:a1:0a:c7:af:01 WPA: EAPOL-Key timeout
WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state PTKSTART
wlan0: STA 60:a1:0a:c7:af:01 WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 keyidx=0 encr=0)
IEEE 802.1X: 60:a1:0a:c7:af:01 TX status - version=2 type=3 length=95 - ack=1
wlan0: STA 60:a1:0a:c7:af:01 WPA: EAPOL-Key timeout
WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state PTKSTART
wlan0: STA 60:a1:0a:c7:af:01 WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 keyidx=0 encr=0)
IEEE 802.1X: 60:a1:0a:c7:af:01 TX status - version=2 type=3 length=95 - ack=1
wlan0: STA 60:a1:0a:c7:af:01 WPA: EAPOL-Key timeout
WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state PTKSTART
WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state DISCONNECT
hostapd_wpa_auth_disconnect: WPA authenticator requests disconnect: STA 60:a1:0a:c7:af:01 reason 2
WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state DISCONNECTED
WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=0x1438300 key_idx=0 set_tx=1 seq_len=0 key_len=0
   addr=60:a1:0a:c7:af:01
wlan0: STA 60:a1:0a:c7:af:01 IEEE 802.1X: unauthorizing port
wlan0: STA 60:a1:0a:c7:af:01 IEEE 802.11: deauthenticated due to local deauth request
nl80211: Event message available
nl80211: Ignored unknown event (cmd=20)
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 60:a1:0a:c7:af:01 sent probe request for broadcast SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 60:a1:0a:c7:af:01 sent probe request for broadcast SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 60:a1:0a:c7:af:01 sent probe request for broadcast SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 60:a1:0a:c7:af:01 sent probe request for broadcast SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 60:a1:0a:c7:af:01 sent probe request for broadcast SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 60:a1:0a:c7:af:01 sent probe request for broadcast SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 60:a1:0a:c7:af:01 sent probe request for broadcast SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 60:a1:0a:c7:af:01 sent probe request for broadcast SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 60:a1:0a:c7:af:01 sent probe request for broadcast SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 60:a1:0a:c7:af:01 sent probe request for broadcast SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 60:a1:0a:c7:af:01 sent probe request for broadcast SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 60:a1:0a:c7:af:01 sent probe request for our SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 60:a1:0a:c7:af:01 sent probe request for our SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 60:a1:0a:c7:af:01 sent probe request for our SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 60:a1:0a:c7:af:01 sent probe request for our SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 60:a1:0a:c7:af:01 sent probe request for our SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 60:a1:0a:c7:af:01 sent probe request for our SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 60:a1:0a:c7:af:01 sent probe request for our SSID
mgmt::proberesp cb
mgmt::auth
authentication: STA=60:a1:0a:c7:af:01 auth_alg=0 auth_transaction=1 status_code=0 wep=0
  New STA
wlan0: STA 60:a1:0a:c7:af:01 IEEE 802.11: authentication OK (open system)
wlan0: STA 60:a1:0a:c7:af:01 MLME: MLME-AUTHENTICATE.indication(60:a1:0a:c7:af:01, OPEN_SYSTEM)
wlan0: STA 60:a1:0a:c7:af:01 MLME: MLME-DELETEKEYS.request(60:a1:0a:c7:af:01)
authentication reply: STA=60:a1:0a:c7:af:01 auth_alg=0 auth_transaction=2 resp=0 (IE len=0)
mgmt::auth cb
wlan0: STA 60:a1:0a:c7:af:01 IEEE 802.11: authenticated
mgmt::assoc_req
association request: STA=60:a1:0a:c7:af:01 capab_info=0x431 listen_interval=10
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
  new AID 1
wlan0: STA 60:a1:0a:c7:af:01 IEEE 802.11: association OK (aid 1)
mgmt::assoc_resp cb
wlan0: STA 60:a1:0a:c7:af:01 IEEE 802.11: associated (aid 1)
wlan0: STA 60:a1:0a:c7:af:01 MLME: MLME-ASSOCIATE.indication(60:a1:0a:c7:af:01)
wlan0: STA 60:a1:0a:c7:af:01 MLME: MLME-DELETEKEYS.request(60:a1:0a:c7:af:01)
wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=0x1438150 key_idx=0 set_tx=1 seq_len=0 key_len=0
   addr=60:a1:0a:c7:af:01
wlan0: STA 60:a1:0a:c7:af:01 WPA: event 1 notification
wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=0x1438150 key_idx=0 set_tx=1 seq_len=0 key_len=0
   addr=60:a1:0a:c7:af:01
wlan0: STA 60:a1:0a:c7:af:01 WPA: start authentication
WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=0x1438150 key_idx=0 set_tx=1 seq_len=0 key_len=0
   addr=60:a1:0a:c7:af:01
wlan0: STA 60:a1:0a:c7:af:01 IEEE 802.1X: unauthorizing port
WPA: 60:a1:0a:c7:af:01 WPA_PTK_GROUP entering state IDLE
WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state AUTHENTICATION
WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state AUTHENTICATION2
WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state INITPSK
WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state PTKSTART
wlan0: STA 60:a1:0a:c7:af:01 WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 keyidx=0 encr=0)
nl80211: Event message available
nl80211: Ignored unknown event (cmd=19)
IEEE 802.1X: 60:a1:0a:c7:af:01 TX status - version=2 type=3 length=95 - ack=1
wlan0: STA 60:a1:0a:c7:af:01 WPA: EAPOL-Key timeout
WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state PTKSTART
wlan0: STA 60:a1:0a:c7:af:01 WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 keyidx=0 encr=0)
IEEE 802.1X: 60:a1:0a:c7:af:01 TX status - version=2 type=3 length=95 - ack=1
wlan0: STA 60:a1:0a:c7:af:01 WPA: EAPOL-Key timeout
WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state PTKSTART
wlan0: STA 60:a1:0a:c7:af:01 WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 keyidx=0 encr=0)
IEEE 802.1X: 60:a1:0a:c7:af:01 TX status - version=2 type=3 length=95 - ack=1
wlan0: STA 60:a1:0a:c7:af:01 WPA: EAPOL-Key timeout
WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state PTKSTART
wlan0: STA 60:a1:0a:c7:af:01 WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 keyidx=0 encr=0)
IEEE 802.1X: 60:a1:0a:c7:af:01 TX status - version=2 type=3 length=95 - ack=1
wlan0: STA 60:a1:0a:c7:af:01 WPA: EAPOL-Key timeout
WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state PTKSTART
WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state DISCONNECT
hostapd_wpa_auth_disconnect: WPA authenticator requests disconnect: STA 60:a1:0a:c7:af:01 reason 2
WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state DISCONNECTED
WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=0x1438150 key_idx=0 set_tx=1 seq_len=0 key_len=0
   addr=60:a1:0a:c7:af:01
wlan0: STA 60:a1:0a:c7:af:01 IEEE 802.1X: unauthorizing port
wlan0: STA 60:a1:0a:c7:af:01 IEEE 802.11: deauthenticated due to local deauth request
nl80211: Event message available
nl80211: Ignored unknown event (cmd=20)
STA c4:17:fe:81:01:fa sent probe request for broadcast SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 60:a1:0a:c7:af:01 sent probe request for our SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 60:a1:0a:c7:af:01 sent probe request for our SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 60:a1:0a:c7:af:01 sent probe request for our SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 60:a1:0a:c7:af:01 sent probe request for our SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 60:a1:0a:c7:af:01 sent probe request for our SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 60:a1:0a:c7:af:01 sent probe request for our SSID
mgmt::proberesp cb
mgmt::auth
authentication: STA=60:a1:0a:c7:af:01 auth_alg=0 auth_transaction=1 status_code=0 wep=0
  New STA
wlan0: STA 60:a1:0a:c7:af:01 IEEE 802.11: authentication OK (open system)
wlan0: STA 60:a1:0a:c7:af:01 MLME: MLME-AUTHENTICATE.indication(60:a1:0a:c7:af:01, OPEN_SYSTEM)
wlan0: STA 60:a1:0a:c7:af:01 MLME: MLME-DELETEKEYS.request(60:a1:0a:c7:af:01)
authentication reply: STA=60:a1:0a:c7:af:01 auth_alg=0 auth_transaction=2 resp=0 (IE len=0)
mgmt::auth cb
wlan0: STA 60:a1:0a:c7:af:01 IEEE 802.11: authenticated
mgmt::reassoc_req
reassociation request: STA=60:a1:0a:c7:af:01 capab_info=0x431 listen_interval=10 current_ap=00:a1:b0:30:25:06
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
  new AID 1
wlan0: STA 60:a1:0a:c7:af:01 IEEE 802.11: association OK (aid 1)
mgmt::reassoc_resp cb
wlan0: STA 60:a1:0a:c7:af:01 IEEE 802.11: associated (aid 1)
wlan0: STA 60:a1:0a:c7:af:01 MLME: MLME-REASSOCIATE.indication(60:a1:0a:c7:af:01)
wlan0: STA 60:a1:0a:c7:af:01 MLME: MLME-DELETEKEYS.request(60:a1:0a:c7:af:01)
wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=0x1438150 key_idx=0 set_tx=1 seq_len=0 key_len=0
   addr=60:a1:0a:c7:af:01
wlan0: STA 60:a1:0a:c7:af:01 WPA: event 1 notification
wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=0x1438150 key_idx=0 set_tx=1 seq_len=0 key_len=0
   addr=60:a1:0a:c7:af:01
wlan0: STA 60:a1:0a:c7:af:01 WPA: start authentication
WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=0x1438150 key_idx=0 set_tx=1 seq_len=0 key_len=0
   addr=60:a1:0a:c7:af:01
wlan0: STA 60:a1:0a:c7:af:01 IEEE 802.1X: unauthorizing port
WPA: 60:a1:0a:c7:af:01 WPA_PTK_GROUP entering state IDLE
WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state AUTHENTICATION
WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state AUTHENTICATION2
WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state INITPSK
WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state PTKSTART
wlan0: STA 60:a1:0a:c7:af:01 WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 keyidx=0 encr=0)
nl80211: Event message available
nl80211: Ignored unknown event (cmd=19)
IEEE 802.1X: 60:a1:0a:c7:af:01 TX status - version=2 type=3 length=95 - ack=1
wlan0: STA 60:a1:0a:c7:af:01 WPA: EAPOL-Key timeout
WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state PTKSTART
wlan0: STA 60:a1:0a:c7:af:01 WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 keyidx=0 encr=0)
IEEE 802.1X: 60:a1:0a:c7:af:01 TX status - version=2 type=3 length=95 - ack=1
wlan0: STA 60:a1:0a:c7:af:01 WPA: EAPOL-Key timeout
WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state PTKSTART
wlan0: STA 60:a1:0a:c7:af:01 WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 keyidx=0 encr=0)
IEEE 802.1X: 60:a1:0a:c7:af:01 TX status - version=2 type=3 length=95 - ack=1
STA c4:17:fe:81:01:fa sent probe request for broadcast SSID
mgmt::proberesp cb
STA c4:17:fe:81:01:fa sent probe request for broadcast SSID
mgmt::proberesp cb
wlan0: STA 60:a1:0a:c7:af:01 WPA: EAPOL-Key timeout
WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state PTKSTART
wlan0: STA 60:a1:0a:c7:af:01 WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 keyidx=0 encr=0)
IEEE 802.1X: 60:a1:0a:c7:af:01 TX status - version=2 type=3 length=95 - ack=1
wlan0: STA 60:a1:0a:c7:af:01 WPA: EAPOL-Key timeout
WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state PTKSTART
WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state DISCONNECT
hostapd_wpa_auth_disconnect: WPA authenticator requests disconnect: STA 60:a1:0a:c7:af:01 reason 2
WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state DISCONNECTED
WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=0x1438150 key_idx=0 set_tx=1 seq_len=0 key_len=0
   addr=60:a1:0a:c7:af:01
wlan0: STA 60:a1:0a:c7:af:01 IEEE 802.1X: unauthorizing port
wlan0: STA 60:a1:0a:c7:af:01 IEEE 802.11: deauthenticated due to local deauth request
nl80211: Event message available
nl80211: Ignored unknown event (cmd=20)
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 60:a1:0a:c7:af:01 sent probe request for broadcast SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 60:a1:0a:c7:af:01 sent probe request for broadcast SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 60:a1:0a:c7:af:01 sent probe request for broadcast SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 60:a1:0a:c7:af:01 sent probe request for broadcast SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 60:a1:0a:c7:af:01 sent probe request for broadcast SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 60:a1:0a:c7:af:01 sent probe request for broadcast SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
Signal 2 received - terminating
Flushing old station entries
Deauthenticate all stations
nl80211: Remove interface ifindex=6
netlink: Operstate: linkmode=0, operstate=6

Minimal hostapd config file

interface=wlan0
driver=nl80211
ssid=zootest
channel=1
bridge=br0

/var/log/messages

May  7 15:19:07 zooty hostapd: wlan0: STA 60:a1:0a:c7:af:01 IEEE 802.11: authenticated
May  7 15:19:07 zooty hostapd: wlan0: STA 60:a1:0a:c7:af:01 IEEE 802.11: associated (aid 1)
May  7 15:19:07 zooty hostapd: wlan0: STA 60:a1:0a:c7:af:01 RADIUS: starting accounting session 4DC599F5-0000001B
May  7 15:19:17 zooty hostapd: wlan0: STA 60:a1:0a:c7:af:01 IEEE 802.11: authenticated
May  7 15:19:17 zooty hostapd: wlan0: STA 60:a1:0a:c7:af:01 IEEE 802.11: associated (aid 1)
May  7 15:19:17 zooty hostapd: wlan0: STA 60:a1:0a:c7:af:01 RADIUS: starting accounting session 4DC599F5-0000001C
May  7 15:19:26 zooty hostapd: wlan0: STA 60:a1:0a:c7:af:01 IEEE 802.11: authenticated
May  7 15:19:26 zooty hostapd: wlan0: STA 60:a1:0a:c7:af:01 IEEE 802.11: associated (aid 1)
May  7 15:19:26 zooty hostapd: wlan0: STA 60:a1:0a:c7:af:01 RADIUS: starting accounting session 4DC599F5-0000001D

Hostapd output

STA 60:a1:0a:c7:af:01 sent probe request for our SSID
mgmt::proberesp cb
mgmt::auth
authentication: STA=60:a1:0a:c7:af:01 auth_alg=0 auth_transaction=1 status_code=0 wep=0
wlan0: STA 60:a1:0a:c7:af:01 IEEE 802.11: authentication OK (open system)
wlan0: STA 60:a1:0a:c7:af:01 MLME: MLME-AUTHENTICATE.indication(60:a1:0a:c7:af:01, OPEN_SYSTEM)
wlan0: STA 60:a1:0a:c7:af:01 MLME: MLME-DELETEKEYS.request(60:a1:0a:c7:af:01)
authentication reply: STA=60:a1:0a:c7:af:01 auth_alg=0 auth_transaction=2 resp=0 (IE len=0)
mgmt::auth cb
wlan0: STA 60:a1:0a:c7:af:01 IEEE 802.11: authenticated
mgmt::assoc_req
association request: STA=60:a1:0a:c7:af:01 capab_info=0x21 listen_interval=10
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
  old AID 1
wlan0: STA 60:a1:0a:c7:af:01 IEEE 802.11: association OK (aid 1)
mgmt::assoc_resp cb
wlan0: STA 60:a1:0a:c7:af:01 IEEE 802.11: associated (aid 1)
AP-STA-CONNECTED 60:a1:0a:c7:af:01
wlan0: STA 60:a1:0a:c7:af:01 MLME: MLME-ASSOCIATE.indication(60:a1:0a:c7:af:01)
wlan0: STA 60:a1:0a:c7:af:01 MLME: MLME-DELETEKEYS.request(60:a1:0a:c7:af:01)
wlan0: STA 60:a1:0a:c7:af:01 RADIUS: starting accounting session 4DC599F5-0000001D
nl80211: Event message available
nl80211: Ignored unknown event (cmd=20)
nl80211: Event message available
nl80211: Ignored unknown event (cmd=19)
STA 78:e4:00:11:96:fd sent probe request for broadcast SSID
Page last modified Fri May 20 19:26:37 2011