Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp1513945ybv; Thu, 6 Feb 2020 05:30:31 -0800 (PST) X-Google-Smtp-Source: APXvYqwWtN+RW2pOs8Q5cGdv8Ev5CuwPFWrG9FWjehoTL7XOMlPpitwYQUeOjR9AVTpEWfR3WpW6 X-Received: by 2002:aca:4ece:: with SMTP id c197mr6902213oib.53.1580995831591; Thu, 06 Feb 2020 05:30:31 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1580995831; cv=none; d=google.com; s=arc-20160816; b=Rh/UHA8vmPW59Kw209KY29OOtssDdGWSVHeCKp7W7ZzHGn1WccPSnwnPq9xvyNY96o Bzs/fM0+vtt5gDOCNTkEdyPp04v4Rt/fyitd34ZgMykQgLpY9CXVN8nZoh9gbM7lLMAL kHvO2zOk2dyBWVguJ6I33/SWwl8Td0uf1UYNM3J8sJvOeGUZ71v49GaVvxfPqtjXpzNO ddFxxebQ8vN1drrqVDYTrnmm8Gp86UQFRNbzk8C9dyJtD5ZJBaLa1Asii0pYkAGrGVUv 3+ZvCJHdsa/yE5s2ZfdeJgzpde4WY5zYz8EY/4A/66SdXkIk8POSiSCJi7zx8Nq0yfZ/ Ni2g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=FBF66wR6UKobfI9TZkFd676qIMDdpQWZ2knNJBq3Vh8=; b=vHl7RWTxL/eBbfJlRAJHpOLf1DoUZVNvMPkaMdjwu2MbpXJryunzvaiaXQBgyU3vn1 lZtb8KQjj56cxVt2mBSp6Z4X5UT3yTncvbgxD1yvUSbNfjxNYaD4W+yxe79cliJhG6uE lUeOakcVevVzVVYA5eZIrHhYZRoLBYqvq/jptRInMh/zVDHgbOcDJ3GoT2WDrDoSG2Ic umwhuVuw0V71GbcgKOe2PdUtcUwaF3LuIKAjoA576XRbqTta/y6uLV5kfwzy8UlZs1Ef EHApBVZeyWoAUOWxK+Lwij+IQyHMJ/QRQKy8L0Zwfrkf/TYiCQ+IWrpJNEjle7ntGh3O 1r+w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-wireless-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=monom.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n9si1768710ota.103.2020.02.06.05.30.02; Thu, 06 Feb 2020 05:30:31 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-wireless-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-wireless-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=monom.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727325AbgBFNO6 (ORCPT + 99 others); Thu, 6 Feb 2020 08:14:58 -0500 Received: from mail.monom.org ([188.138.9.77]:53710 "EHLO mail.monom.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726538AbgBFNO6 (ORCPT ); Thu, 6 Feb 2020 08:14:58 -0500 Received: from mail.monom.org (localhost [127.0.0.1]) by filter.mynetwork.local (Postfix) with ESMTP id 9A14E5004AE; Thu, 6 Feb 2020 14:14:55 +0100 (CET) X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on mail.monom.org X-Spam-Level: X-Spam-Status: No, score=-2.5 required=5.0 tests=ALL_TRUSTED,BAYES_00 autolearn=ham autolearn_force=no version=3.4.2 Received: from localhost (b9168f78.cgn.dg-w.de [185.22.143.120]) by mail.monom.org (Postfix) with ESMTPSA id 4ADAC500294; Thu, 6 Feb 2020 14:14:55 +0100 (CET) Date: Thu, 6 Feb 2020 14:14:55 +0100 From: Daniel Wagner To: JH Cc: linux-wireless , connman Subject: Re: Failed to can wifi Invalid Sched_scan parameters Message-ID: <20200206131455.knx2nsitunrfo4nu@beryllium.lan> References: <20200204081435.zhzqtsnrcgkzhpdw@beryllium.lan> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Sender: linux-wireless-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org On Thu, Feb 06, 2020 at 10:08:16PM +1100, JH wrote: > On 2/4/20, Daniel Wagner wrote: > > The 'Invalid Sched_scan parameters' indicates, wpa_supplicant is > > providing the wrong parameters. Best thing is to monitor between > > wpa_supplicant and kernel the netlink messages. iwmon is an excellent > > tool for this. > > Thanks for the tip, I did not realize that connman is actually heavily > relied on wpa_supplicant, if I restarted wpa_supplicant, most of time > it popped up mwifiex_sdio messages, then the WiFi could be up: The good news here: with iwd ConnMan doesn't have to rely on wpa_supplicant anymore. We had to add *a lot* of code to ConnMan because of wpa_supplicant including a lot of work arounds. With iwd we have a clear separation between the domains. So I strongly recommend to look at iwd. > $ systemctl restart wpa_supplicant > [ 371.617417] mwifiex_sdio mmc0:0001:1: info: 2 > [ 371.647545] mwifiex_sdio mmc0:0001:1: info: associated to bssid 34:08:04:12:y > [ 371.726667] IPv6: ADDRCONF(NETDEV_CHANGE): mlan0: link becomes ready > [ 371.772758] mwifiex_sdio mmc0:0001:1: CMD_RESP: cmd 0x23f error, result=0x2 > > But sometime when I restated wpa_supplicant, that message did not > come, the WiFi network was still down. You need to look at what your hardware/firmware, driver and wpa_supplicant is going on. This is something ConnMan can't fix. > How is mwifiex_sdio related to wpa_supplicant? wpa_supplicant steers your WiFi chip. > Why it is nondeterministic, sometime restart wpa_supplicant could > bring mwifiex_sdio and WiFi up, something it couldn't? That is the sad part about WiFi. The quality of the firmware, driver and wpa_supplicant varies a lot. Some combination works great, others are unusable. > I think mwifiex_sdio is the lowest layer to interact to WiFi modem, in > which circumstance it could bring WiFi modem up and in which > circumstance it couldn't? Sure, depending on the quality of the firmware and driver it might be your main problem. Don't get me wrong. I don't say your current setup is not good, but from expierence firmware/drivers and wpa_supplicant tend to be problematic. iwd on the other hand is able to hide most of the nasty stuff for ConnMan and I think in the long run it will be a lot more reliable then wpa_supplicant was. > That is far too unstable, I always thought I could rely on connman for > WiFi connection stability, but it seems that beyond connman capacity, > so what I can do when the WiFi is not up when restart wpa_supplicant > could not fix it? Try iwd. Thanks, Daniel