Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp3466609rwb; Tue, 8 Nov 2022 05:03:19 -0800 (PST) X-Google-Smtp-Source: AMsMyM7eCnZ/nMl2JIYXK/6p5FSrdHjCg53LFL+cmuFiDRdpVkX2SC6fpyo3ol1fWoVDBXH1hdxi X-Received: by 2002:a17:902:e883:b0:187:27a7:c8a3 with SMTP id w3-20020a170902e88300b0018727a7c8a3mr43604710plg.32.1667912599083; Tue, 08 Nov 2022 05:03:19 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1667912599; cv=none; d=google.com; s=arc-20160816; b=qw8IYUiVCAONBtEqua7HB0thzRXaVPIROAZz5Q39CQWXA6arSUfiV9vU/nhb6Yb7og GRw9YEJw/PmJdGj2Ni5nUIvhYKLV569DpEHUfiq+gSkWrxbu3ORK1hGf5Zqt0/usBHaO 1IkBfrbbc3v+s4jxTTywIFnY8zQUsM2Y+or+iCsQHBn4dCWVXhUij1uWZx9/S6OjGgqp OaLpVEg6DpVoneWPJ5o00iM96oxxZGZpR1Ofx5j81uLKNracqac1DRfNSDaO40Wbf97q 6n4egKCCyWoavEPHA2oFeXt6hh4gF9BjrlIMVPGKSw7YzRFwY7ydJlKKStMZiy2fhIrU fZJg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language:cc:to :subject:from:user-agent:mime-version:date:message-id; bh=zLQ89eD1OFzqUsJX52etORO5Akk+t4n3Ib1BRDxF0d4=; b=KIVaLINb9mwB00RJsdMxn2Mwpr8SqkMOPDfQiOe/87/fc8OLozRaHOKlepodJv5YXK cGoFhWBBbvwOjA/D91Tqc8EcAhJihF49MzsTc73vWEu6vj+uyX4O/iF+o27TJqLvsy1+ Wwb94TdYiXgGdIPbV4MjID9C0tyanepG+tjwkGCpjS3SdoJI3ipNDtjnNj1I6iWffYys MAZrEII1oAOZbu8KAztpOddNkxCdc9Od2LTpi/ZUfi49zN5GrM7l6E5Hep8Wl7mDzoeV jk0MiQFqz6hg7LfSf7ZxUdsXCtFdC2Kgye0afdytWKm9dVUqdqnd35k3FTiJouAIQOSH armg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id lr2-20020a17090b4b8200b00200b5c30f73si17341871pjb.106.2022.11.08.05.02.59; Tue, 08 Nov 2022 05:03:18 -0800 (PST) Received-SPF: pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233803AbiKHMto (ORCPT + 67 others); Tue, 8 Nov 2022 07:49:44 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:36720 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233683AbiKHMtn (ORCPT ); Tue, 8 Nov 2022 07:49:43 -0500 Received: from mx1.molgen.mpg.de (mx3.molgen.mpg.de [141.14.17.11]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 56879C54 for ; Tue, 8 Nov 2022 04:49:41 -0800 (PST) Received: from [141.14.220.45] (g45.guest.molgen.mpg.de [141.14.220.45]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) (Authenticated sender: pmenzel) by mx.molgen.mpg.de (Postfix) with ESMTPSA id 5828961EA1929; Tue, 8 Nov 2022 13:49:38 +0100 (CET) Message-ID: Date: Tue, 8 Nov 2022 13:49:38 +0100 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.4.1 From: Paul Menzel Subject: rtlwifi: RTL8188EE: Unable to connect to Wifi network To: Ping-Ke Shih Cc: linux-wireless@vger.kernel.org, it+linux-wireless@molgen.mpg.de Content-Language: en-US Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org Dear Linux folks, Using Debian sid/unstable with Linux 6.1-rc3 [1] on an Intel Haswell Haier laptop with a RTL8188EE, I am unable to connect to a wireless network. $ sudo lspci -k -s 08:00.0 08:00.0 Network controller: Realtek Semiconductor Co., Ltd. RTL8188EE Wireless Network Adapter (rev 01) Subsystem: AzureWave RTL8188EE Wireless Network Adapter Kernel driver in use: rtl8188ee Kernel modules: rtl8188ee ``` [ 262.822320] wlp8s0: authenticate with 6c:f3:7f:10:ae:12 [ 262.822341] wlp8s0: 80 MHz not supported, disabling VHT [ 262.832384] wlp8s0: send auth to 6c:f3:7f:10:ae:12 (try 1/3) [ 262.835124] wlp8s0: authenticated [ 262.839046] wlp8s0: associate with 6c:f3:7f:10:ae:12 (try 1/3) [ 262.850099] wlp8s0: RX AssocResp from 6c:f3:7f:10:ae:12 (capab=0x421 status=0 aid=1) [ 262.850331] wlp8s0: associated [ 262.850925] IPv6: ADDRCONF(NETDEV_CHANGE): wlp8s0: link becomes ready […] [ 307.618423] wlp8s0: deauthenticating from 6c:f3:7f:10:ae:12 by local choice (Reason: 3=DEAUTH_LEAVING) ``` wpa_supplicant 2:2.10-9+b2 logs: ``` Nov 08 13:29:35 brecht wpa_supplicant[612]: wlp8s0: SME: Trying to authenticate with 6c:f3:7f:10:ae:12 (SSID='MPI Guest' freq=2437 MHz) Nov 08 13:29:35 brecht wpa_supplicant[612]: wlp8s0: Trying to associate with 6c:f3:7f:10:ae:12 (SSID='MPI Guest' freq=2437 MHz) Nov 08 13:29:35 brecht wpa_supplicant[612]: wlp8s0: Associated with 6c:f3:7f:10:ae:12 Nov 08 13:29:35 brecht wpa_supplicant[612]: wlp8s0: CTRL-EVENT-CONNECTED - Connection to 6c:f3:7f:10:ae:12 completed [id=0 id_str=] Nov 08 13:29:35 brecht wpa_supplicant[612]: bgscan simple: Failed to enable signal strength monitoring Nov 08 13:29:35 brecht wpa_supplicant[612]: wlp8s0: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0 Nov 08 13:30:20 brecht wpa_supplicant[612]: wlp8s0: CTRL-EVENT-DISCONNECTED bssid=6c:f3:7f:10:ae:12 reason=3 locally_generated=1 ``` With more debugging verbosity (`-d`) it shows: ``` […] Nov 08 13:42:13 brecht wpa_supplicant[3547]: wlp8s0: State: ASSOCIATED -> COMPLETED Nov 08 13:42:13 brecht wpa_supplicant[3547]: wlp8s0: Radio work 'sme-connect'@0x556b491b5a80 done in 0.026679 seconds Nov 08 13:42:13 brecht wpa_supplicant[3547]: wlp8s0: radio_work_free('sme-connect'@0x556b491b5a80): num_active_works --> 0 Nov 08 13:42:13 brecht wpa_supplicant[3547]: wlp8s0: CTRL-EVENT-CONNECTED - Connection to 6c:f3:7f:10:ae:12 completed [id=0 id_str=] Nov 08 13:42:13 brecht wpa_supplicant[3547]: nl80211: Set wlp8s0 operstate 0->1 (UP) Nov 08 13:42:13 brecht wpa_supplicant[3547]: netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=6 (IF_OPER_UP) Nov 08 13:42:13 brecht wpa_supplicant[3547]: bgscan simple: Signal strength threshold -70 Short bgscan interval 30 Long bgscan interval 86400 Nov 08 13:42:13 brecht wpa_supplicant[3547]: nl80211: Signal monitor threshold=-70 hysteresis=4 Nov 08 13:42:13 brecht wpa_supplicant[3547]: bgscan simple: Failed to enable signal strength monitoring Nov 08 13:42:13 brecht wpa_supplicant[3547]: bgscan simple: Init scan interval: 86400 Nov 08 13:42:13 brecht wpa_supplicant[3547]: bgscan: Initialized module 'simple' with parameters '30:-70:86400' Nov 08 13:42:13 brecht wpa_supplicant[3547]: nl80211: Received scan results (19 BSSes) Nov 08 13:42:13 brecht wpa_supplicant[3547]: nl80211: Scan results indicate BSS status with 6c:f3:7f:10:ae:12 as associated Nov 08 13:42:13 brecht wpa_supplicant[3547]: wlp8s0: BSS: Start scan result update 5 Nov 08 13:42:13 brecht wpa_supplicant[3547]: bgscan simple: scan result notification Nov 08 13:42:13 brecht wpa_supplicant[3547]: wlp8s0: Determining shared radio frequencies (max len 1) Nov 08 13:42:13 brecht wpa_supplicant[3547]: wlp8s0: Shared frequencies (len=1): completed iteration Nov 08 13:42:13 brecht wpa_supplicant[3547]: wlp8s0: freq[0]: 2437, flags=0x1 Nov 08 13:42:13 brecht wpa_supplicant[3547]: P2P: Add operating class 81 Nov 08 13:42:13 brecht wpa_supplicant[3547]: P2P: Channels - hexdump(len=13): 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d Nov 08 13:42:13 brecht wpa_supplicant[3547]: P2P: Update channel list Nov 08 13:42:13 brecht wpa_supplicant[3547]: P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11,12,13 Nov 08 13:42:13 brecht wpa_supplicant[3547]: P2P: cli_channels: Nov 08 13:42:13 brecht wpa_supplicant[3547]: wlp8s0: Cancelling scan request Nov 08 13:42:13 brecht wpa_supplicant[3547]: WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0 Nov 08 13:42:13 brecht wpa_supplicant[3547]: WMM AC: U-APSD queues=0x0 Nov 08 13:42:13 brecht wpa_supplicant[3547]: WMM AC: Valid WMM association, WMM AC is enabled Nov 08 13:42:13 brecht wpa_supplicant[3547]: wlp8s0: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0 Nov 08 13:42:13 brecht wpa_supplicant[3547]: RTM_NEWLINK: ifi_index=3 ifname=wlp8s0 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) Nov 08 13:42:13 brecht wpa_supplicant[3547]: nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp8s0 Nov 08 13:42:13 brecht wpa_supplicant[3547]: nl80211: Ignore connect event (cmd=46) when using userspace SME Nov 08 13:42:58 brecht wpa_supplicant[3547]: nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp8s0 Nov 08 13:42:58 brecht wpa_supplicant[3547]: nl80211: Delete station 6c:f3:7f:10:ae:12 Nov 08 13:42:58 brecht wpa_supplicant[3547]: nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp8s0 Nov 08 13:42:58 brecht wpa_supplicant[3547]: nl80211: Deauthenticate event Nov 08 13:42:58 brecht wpa_supplicant[3547]: wlp8s0: Event DEAUTH (11) received Nov 08 13:42:58 brecht wpa_supplicant[3547]: wlp8s0: Deauthentication notification Nov 08 13:42:58 brecht wpa_supplicant[3547]: wlp8s0: * reason 3 (DEAUTH_LEAVING) locally_generated=1 Nov 08 13:42:58 brecht wpa_supplicant[3547]: wlp8s0: * address 6c:f3:7f:10:ae:12 Nov 08 13:42:58 brecht wpa_supplicant[3547]: Deauthentication frame IE(s) - hexdump(len=0): [NULL] Nov 08 13:42:58 brecht wpa_supplicant[3547]: wlp8s0: CTRL-EVENT-DISCONNECTED bssid=6c:f3:7f:10:ae:12 reason=3 locally_generated=1 ``` It’d be really great to get WLAN working on the device. Kind regards, Paul [1]: https://packages.debian.org/experimental/linux-image-6.1.0-0-amd64