Received: by 2002:a05:7412:8d09:b0:fa:4c10:6cad with SMTP id bj9csp56785rdb; Mon, 15 Jan 2024 12:00:40 -0800 (PST) X-Google-Smtp-Source: AGHT+IHHahAUFlIzeX6Uel5r/VNotqyoPX90kp5KHhAYMUDjWirXCHkWN3GYcnXWjJaWGgS2uGpB X-Received: by 2002:a81:b603:0:b0:5f6:e9bc:7191 with SMTP id u3-20020a81b603000000b005f6e9bc7191mr4152812ywh.51.1705348840375; Mon, 15 Jan 2024 12:00:40 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1705348840; cv=none; d=google.com; s=arc-20160816; b=rA6WV8AqabE0stwcsmeCSWiAY2gVmgN157jzIG1r7I7NJ0HDkDMdksg5ISkVoC4ni2 nSV854k2Bm+0Qs8qO8wfkPHbv0F3B6IHrb1wAoAcZrNGOhRCyJayEGSyuMVH6D4g9jtX D+xQ1oRHtzk+HvsF8Ak18/sMoK86yGW+UAtC0JBv6FFmNUH4ZK++QDYGzoZGCjtzgsoT QsDxeSZv+RMalOUhnki2tr6Wq4QgFXzapbJxxte3Le8d0pL6A+/30vat1gZHrRH+MIwt gFFHO75f4CRKJoXU9KLdBFD0TN79N0rticukOWLEZh6Ylx/4deTsijt/UizM2YNpVNje 0loA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=mime-version:list-unsubscribe:list-subscribe:list-id:precedence :user-agent:content-transfer-encoding:references:in-reply-to:date:to :from:subject:message-id:dkim-signature; bh=CRFKM3mqGAyECZMl3VOp9tD4rz9UsD6jBBbM8HZGeCo=; fh=DRtogZ8TdKrk/o1Kt6VZTLe+i8rqynqTlC8RDQyPdlo=; b=SKU3au3+B5BLacHiw09FWcuqnMVkLLvEz9RMEdxOFIprYNVXXscX2pggfofbnMfIGc Yw9GDIYcNxjkiU/ueOtGBv7wXPJUEM8WNDNIsV3uHPeSlm4Qer8qKmYFnsKzmopoAUVh CtRRzIQJ6JAQEopA+1l5TcBN+g11SQArHUEqytLeLIO6HGPNP7zP+045S0CL54XhKtQE zj+omssW2xI4r1Qzk/nZyIN5JPnc7RoQ0CTO0/WiqpZ8MKPqORb0lg3usBTZiDJuliPz MQjinovwg+EeBgN8eH1VWNPlv7VbwsSH2YO06nJwrZ38fiPngHqb4fqK2M8yixAIOigk KdsQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@sipsolutions.net header.s=mail header.b=NlnYItp0; spf=pass (google.com: domain of linux-wireless+bounces-1943-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-wireless+bounces-1943-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=REJECT dis=NONE) header.from=sipsolutions.net Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [147.75.199.223]) by mx.google.com with ESMTPS id l15-20020a0cac0f000000b006805f622be4si1420992qvb.102.2024.01.15.12.00.40 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 15 Jan 2024 12:00:40 -0800 (PST) Received-SPF: pass (google.com: domain of linux-wireless+bounces-1943-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) client-ip=147.75.199.223; Authentication-Results: mx.google.com; dkim=pass header.i=@sipsolutions.net header.s=mail header.b=NlnYItp0; spf=pass (google.com: domain of linux-wireless+bounces-1943-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-wireless+bounces-1943-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=REJECT dis=NONE) header.from=sipsolutions.net Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id 12E4B1C2148F for ; Mon, 15 Jan 2024 20:00:40 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id ADB8F18E25; Mon, 15 Jan 2024 20:00:37 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=sipsolutions.net header.i=@sipsolutions.net header.b="NlnYItp0" X-Original-To: linux-wireless@vger.kernel.org Received: from sipsolutions.net (s3.sipsolutions.net [168.119.38.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 459F918E20; Mon, 15 Jan 2024 20:00:33 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=sipsolutions.net Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=sipsolutions.net DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=sipsolutions.net; s=mail; h=MIME-Version:Content-Transfer-Encoding: Content-Type:References:In-Reply-To:Date:To:From:Subject:Message-ID:Sender: Reply-To:Cc:Content-ID:Content-Description:Resent-Date:Resent-From:Resent-To: Resent-Cc:Resent-Message-ID; bh=CRFKM3mqGAyECZMl3VOp9tD4rz9UsD6jBBbM8HZGeCo=; t=1705348834; x=1706558434; b=NlnYItp0QYFifMRCAJqA0hl3YFYH/i4FY3fiQDEnE2iNmGA XSz5NXcH6rr93u0sBKmMlysLo8bsi343qvg2hD+BpvkCx7g9sNZh6FIyzduG9ja9nwefCuFjOUdle hkFJP2RB0om1eHFTPbNztjTDxDw5rFREBE6cfvB0/iEAPsM595Ha5mjizhyFpKOelJCXR5dyDhRfD 2QeIDGdoOcDMW15tlTru3XqHLIFFe16hHIiMmq9Vsz3OHMm8P1+6zcaYFsAZPYcPJ74dF5j3/omSV bjueHTaEyKw5ICOQL3gEBu0GB0HFYoG5j4RCREJQrYh363F1c4EnRnowamxaLnFg==; Received: by sipsolutions.net with esmtpsa (TLS1.3:ECDHE_X25519__RSA_PSS_RSAE_SHA256__AES_256_GCM:256) (Exim 4.97) (envelope-from ) id 1rPT8I-00000003kqH-2U5O; Mon, 15 Jan 2024 21:00:30 +0100 Message-ID: Subject: Re: [REGRESSION] 6.7 broke wifi "AP is in CSA process, reject auth" From: Johannes Berg To: coldolt , ayala.beker@intel.com, linux-wireless@vger.kernel.org, regressions@lists.linux.dev Date: Mon, 15 Jan 2024 21:00:29 +0100 In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable User-Agent: Evolution 3.50.3 (3.50.3-1.fc39) Precedence: bulk X-Mailing-List: linux-wireless@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-malware-bazaar: not-scanned On Mon, 2024-01-15 at 16:39 +0200, coldolt wrote: > I'm on Arch linux, updated the kernel from 6.6.10 -> 6.7. >=20 > Now it doesn't connect to my 5GHz wifi, to 2.4GHz it still connects. > Also the earlier kernel version still works. Output from "sudo dmesg | > grep -i wlp2s0": >=20 > > [ 6.049600] iwlwifi 0000:02:00.0 wlp2s0: renamed from wlan0 > > [ 131.095861] wlp2s0: AP is in CSA process, reject auth > > [ 132.143170] wlp2s0: AP is in CSA process, reject auth > > [ 133.599906] wlp2s0: AP is in CSA process, reject auth > > [ 135.549325] wlp2s0: AP is in CSA process, reject auth > > [ 145.510438] wlp2s0: AP is in CSA process, reject auth >=20 > I notice that the commit c09c4f31998bac, which was added to kernel > 6.7, introduced rejecting a connection with that error message "AP is > in CSA process, reject auth". >=20 > My guess is that commit is the cause of the regression. I guess? But that was quite intentional - we don't handle connecting well while the AP is switching channels. This really shouldn't persist for longer than a few seconds though, even the 15 seconds sounds pretty excessive. Could you show the output of $ sudo iw wlp2s0 scan -u for this AP? johannes