0
renard

Orange Pi Prime 5.60 hostapd (Operation not permitted.)

Recommended Posts

After update to Armbian 5.60 (Debian 9) hostapd became unable to start.
```
# /usr/sbin/hostapd -B -P /run/hostapd.pid  /etc/hostapd/hostapd.conf.orig -dd
random: Trying to read entropy from /dev/random
Configuration file: /etc/hostapd/hostapd.conf.orig
ctrl_interface_group=0
nl80211: Supported cipher 00-0f-ac:1
nl80211: Supported cipher 00-0f-ac:5
nl80211: Supported cipher 00-0f-ac:2
nl80211: Supported cipher 00-0f-ac:4
nl80211: Supported cipher 00-0f-ac:6
nl80211: Using driver-based off-channel TX
nl80211: interface wlan0 in phy phy0
nl80211: Set mode ifindex 3 iftype 3 (AP)
nl80211: Failed to set interface 3 to mode 3: -1 (Operation not permitted)
nl80211: Try mode change after setting interface down
nl80211: Set mode ifindex 3 iftype 3 (AP)
nl80211: Failed to set interface 3 to mode 3: -1 (Operation not permitted)
Could not set interface wlan0 flags (UP): Operation not permitted
nl80211: Failed to set interface up after switching mode
nl80211: Interface mode change to 3 from 0 failed
nl80211: Could not configure driver mode
nl80211: deinit ifname=wlan0 disabled_11b_rates=0
nl80211: Remove monitor interface: refcount=0
netlink: Operstate: ifindex=3 linkmode=0 (kernel-control), operstate=6 (IF_OPER_UP)
nl80211: Set mode ifindex 3 iftype 2 (STATION)
nl80211 driver initialization failed.
hostapd_interface_deinit_free(0xaaaac3834970)
hostapd_interface_deinit_free: num_bss=1 conf->num_bss=1
hostapd_interface_deinit(0xaaaac3834970)
wlan0: interface state UNINITIALIZED->DISABLED
hostapd_bss_deinit: deinit bss wlan0
wlan0: AP-DISABLED 
hostapd_cleanup(hapd=0xaaaac3835c20 (wlan0))
hostapd_free_hapd_data: Interface wlan0 wasn't started
hostapd_interface_deinit_free: driver=(nil) drv_priv=(nil) -> hapd_deinit
hostapd_interface_free(0xaaaac3834970)
hostapd_interface_free: free hapd 0xaaaac3835c20
hostapd_cleanup_iface(0xaaaac3834970)
hostapd_cleanup_iface_partial(0xaaaac3834970)
hostapd_cleanup_iface: free iface=0xaaaac3834970
```
```
# cat /etc/armbian-release 
# PLEASE DO NOT EDIT THIS FILE
BOARD=orangepiprime
BOARD_NAME="Orange Pi Prime"
BOARDFAMILY=sun50iw2
VERSION=5.60
LINUXFAMILY=sunxi64
BRANCH=next
ARCH=arm64
IMAGE_TYPE=stable
BOARD_TYPE=conf
INITRD_ARCH=arm64
KERNEL_IMAGE_TYPE=Image
# cat /etc/debian_version 
9.5
# uname -a
Linux mxopipr01 4.14.70-sunxi64 #274 SMP Wed Sep 19 12:09:30 CEST 2018 aarch64 GNU/Linux
```

```
# whoami 
root
# iwconfig wlan0 mode master
Error for wireless request "Set Mode" (8B06) :
    SET failed on device wlan0 ; Operation not permitted.
```

```

# iw list
Wiphy phy0
    max # scan SSIDs: 9
    max scan IEs length: 2304 bytes
    max # sched scan SSIDs: 0
    max # match sets: 0
    max # scan plans: 1
    max scan plan interval: -1
    max scan plan iterations: 0
    Retry short limit: 7
    Retry long limit: 4
    Coverage class: 0 (up to 0m)
    Supported Ciphers:
        * WEP40 (00-0f-ac:1)
        * WEP104 (00-0f-ac:5)
        * TKIP (00-0f-ac:2)
        * CCMP-128 (00-0f-ac:4)
        * CMAC (00-0f-ac:6)
    Available Antennas: TX 0 RX 0
    Supported interface modes:
         * IBSS
         * managed
         * AP
         * monitor
    Band 1:
        Bitrates (non-HT):
            * 1.0 Mbps
            * 2.0 Mbps
            * 5.5 Mbps
            * 11.0 Mbps
            * 6.0 Mbps
            * 9.0 Mbps
            * 12.0 Mbps
            * 18.0 Mbps
            * 24.0 Mbps
            * 36.0 Mbps
            * 48.0 Mbps
            * 54.0 Mbps
        Frequencies:
            * 2412 MHz [1] (20.0 dBm)
            * 2417 MHz [2] (20.0 dBm)
            * 2422 MHz [3] (20.0 dBm)
            * 2427 MHz [4] (20.0 dBm)
            * 2432 MHz [5] (20.0 dBm)
            * 2437 MHz [6] (20.0 dBm)
            * 2442 MHz [7] (20.0 dBm)
            * 2447 MHz [8] (20.0 dBm)
            * 2452 MHz [9] (20.0 dBm)
            * 2457 MHz [10] (20.0 dBm)
            * 2462 MHz [11] (20.0 dBm)
            * 2467 MHz [12] (20.0 dBm) (no IR)
            * 2472 MHz [13] (20.0 dBm) (no IR)
            * 2484 MHz [14] (20.0 dBm) (no IR)
    Supported commands:
         * new_interface
         * set_interface
         * new_key
         * start_ap
         * new_station
         * set_bss
         * join_ibss
         * set_pmksa
         * del_pmksa
         * flush_pmksa
         * frame
         * set_channel
         * connect
         * disconnect
    Supported TX frame types:
         * IBSS: 0x00 0x10 0x20 0x30 0x40 0x50 0x60 0x70 0x80 0x90 0xa0 0xb0 0xc0 0xd0 0xe0 0xf0
         * managed: 0x00 0x10 0x20 0x30 0x40 0x50 0x60 0x70 0x80 0x90 0xa0 0xb0 0xc0 0xd0 0xe0 0xf0
         * AP: 0x00 0x10 0x20 0x30 0x40 0x50 0x60 0x70 0x80 0x90 0xa0 0xb0 0xc0 0xd0 0xe0 0xf0
         * AP/VLAN: 0x00 0x10 0x20 0x30 0x40 0x50 0x60 0x70 0x80 0x90 0xa0 0xb0 0xc0 0xd0 0xe0 0xf0
         * P2P-client: 0x00 0x10 0x20 0x30 0x40 0x50 0x60 0x70 0x80 0x90 0xa0 0xb0 0xc0 0xd0 0xe0 0xf0
         * P2P-GO: 0x00 0x10 0x20 0x30 0x40 0x50 0x60 0x70 0x80 0x90 0xa0 0xb0 0xc0 0xd0 0xe0 0xf0
    Supported RX frame types:
         * IBSS: 0xd0
         * managed: 0x40 0xd0
         * AP: 0x00 0x20 0x40 0xa0 0xb0 0xc0 0xd0
         * AP/VLAN: 0x00 0x20 0x40 0xa0 0xb0 0xc0 0xd0
         * P2P-client: 0x40 0xd0
         * P2P-GO: 0x00 0x20 0x40 0xa0 0xb0 0xc0 0xd0
    WoWLAN support:
         * wake up on anything (device continues operating normally)
    software interface modes (can always be added):
         * monitor
    interface combinations are not supported
    Device supports scan flush.

```

Also have lots of this logs
```
# dmesg -T | tail -n 3
[Fri Oct 26 14:47:45 2018] rtl8723bs: acquire FW from file:rtlwifi/rtl8723bs_nic.bin
[Fri Oct 26 14:47:45 2018] rtl8723bs: acquire FW from file:rtlwifi/rtl8723bs_nic.bin
[Fri Oct 26 14:47:46 2018] rtl8723bs: acquire FW from file:rtlwifi/rtl8723bs_nic.bin

# ll /lib/firmware/rtlwifi/
total 856
drwxrwxr-x  2 root root   4096 Oct 25 17:47 ./
drwxrwxr-x 19 root root   4096 Oct 25 17:47 ../
-rw-rw-r--  1 root root  11216 Sep 19 08:07 rtl8188efw.bin
-rw-rw-r--  1 root root  13904 Sep 19 08:07 rtl8188eufw.bin
-rw-rw-r--  1 root root  16192 Sep 19 08:07 rtl8192cfw.bin
-rw-rw-r--  1 root root  14818 Sep 19 08:07 rtl8192cfwU.bin
-rw-rw-r--  1 root root  16332 Sep 19 08:07 rtl8192cfwU_B.bin
-rw-rw-r--  1 root root  16014 Sep 19 08:07 rtl8192cufw.bin
-rw-rw-r--  1 root root  16116 Sep 19 08:07 rtl8192cufw_A.bin
-rw-rw-r--  1 root root  16096 Sep 19 08:07 rtl8192cufw_B.bin
-rw-rw-r--  1 root root  16116 Sep 19 08:07 rtl8192cufw_TMSC.bin
-rw-rw-r--  1 root root  31376 Sep 19 08:07 rtl8192defw.bin
-rw-rw-r--  1 root root  31818 Sep 19 08:07 rtl8192eefw.bin
-rw-rw-r--  1 root root  25264 Sep 19 08:07 rtl8192eu_ap_wowlan.bin
-rw-rw-r--  1 root root  31818 Sep 19 08:07 rtl8192eu_nic.bin
-rw-rw-r--  1 root root  25878 Sep 19 08:07 rtl8192eu_wowlan.bin
-rw-rw-r--  1 root root  80208 Sep 19 08:07 rtl8192sefw.bin
-rw-rw-r--  1 root root 122328 Sep 19 08:07 rtl8712u.bin
-rw-rw-r--  1 root root  22172 Sep 19 08:07 rtl8723aufw_A.bin
-rw-rw-r--  1 root root  24118 Sep 19 08:07 rtl8723aufw_B.bin
-rw-rw-r--  1 root root  19200 Sep 19 08:07 rtl8723aufw_B_NoBT.bin
-rw-rw-r--  1 root root  30746 Sep 19 08:07 rtl8723befw.bin
-rw-rw-r--  1 root root  20886 Sep 19 08:07 rtl8723bs_ap_wowlan.bin
-rw-rw-r--  1 root root  32108 Sep 19 08:07 rtl8723bs_nic.bin
-rw-rw-r--  1 root root  26398 Sep 19 08:07 rtl8723bs_wowlan.bin
-rw-rw-r--  1 root root  20886 Sep 19 08:07 rtl8723bu_ap_wowlan.bin
-rw-rw-r--  1 root root  32108 Sep 19 08:07 rtl8723bu_nic.bin
-rw-rw-r--  1 root root  26398 Sep 19 08:07 rtl8723bu_wowlan.bin
-rw-rw-r--  1 root root  11662 Sep 19 08:07 rtl8723fw.bin
-rw-rw-r--  1 root root  22996 Sep 19 08:07 rtl8723fw_B.bin
-rw-rw-r--  1 root root  28984 Sep 19 08:07 rtl8821aefw.bin
-rw-rw-r--  1 root root  19858 Sep 19 08:07 rtl8821aefw_wowlan.bin
```
No ideas yet. Thanks in advance!

Share this post


Link to post
Share on other sites

I did a quick test to confirm there is nothing wrong on our side.
 

1. Download latest Debian Stretch, setup AP within armbian-config, test AP with a phone, ...

2. Upgrade to latest Nightly packages and test AP. Working fine.

If you use some manual operations, you have to know exactly what you are doing. 

Logs: http://ix.io/1q6A

Share this post


Link to post
Share on other sites

Hm...  Just flashed fresh clean armbian 5.59 into sd with default configuration. 
It worked there.
Then rebooted to my old sd with 5.60, and it magically started working in 5.60 with my old configuration. Yet I am 100% sure that I made several reboots with 5.60 already without any changes before. 
Maybe some hardware issue (or firmware "loading" issue).
As we see below it is only one attempt to "acquire FW from file:rtlwifi/rtl8723bs_nic.bin" as opposed to lots of them before.
Thanks for your attempts to help, and sorry for your time for checking.
```
# dmesg -T | grep -i rtl8723bs 
[Tue Oct 30 13:01:27 2018] RTL8723BS: module init start
[Tue Oct 30 13:01:27 2018] RTL8723BS: rtl8723bs v4.3.5.5_12290.20140916_BTCOEX20140507-4E40
[Tue Oct 30 13:01:27 2018] RTL8723BS: rtl8723bs BT-Coex version = BTCOEX20140507-4E40
[Tue Oct 30 13:01:27 2018] RTL8723BS: rtw_ndev_init(wlan0)
[Tue Oct 30 13:01:27 2018] RTL8723BS: module init ret =0
[Tue Oct 30 13:01:34 2018] rtl8723bs: acquire FW from file:rtlwifi/rtl8723bs_nic.bin
[Tue Oct 30 13:01:38 2018] RTL8723BS: rtw_cmd_thread(wlan0) pcmd->sctx
[Tue Oct 30 13:01:38 2018] RTL8723BS: assoc success
[Tue Oct 30 13:01:38 2018] RTL8723BS: set group key camid:1, addr:00:00:00:00:00:00, kid:1, type:AES
[Tue Oct 30 13:01:41 2018] RTL8723BS: set group key camid:1, addr:00:00:00:00:00:00, kid:1, type:AES
[Tue Oct 30 13:01:41 2018] RTL8723BS: send eapol packet
[Tue Oct 30 13:01:41 2018] RTL8723BS: send eapol packet
[Tue Oct 30 13:01:41 2018] RTL8723BS: set pairwise key camid:4, addr:3c:05:18:8c:eb:03, kid:0, type:AES
[Tue Oct 30 13:02:00 2018] RTL8723BS: send eapol packet
[Tue Oct 30 13:02:00 2018] RTL8723BS: send eapol packet
[Tue Oct 30 13:02:00 2018] RTL8723BS: set pairwise key camid:5, addr:58:c5:cb:1e:f3:a3, kid:0, type:AES
[Tue Oct 30 13:11:38 2018] RTL8723BS: send eapol packet
[Tue Oct 30 13:11:38 2018] RTL8723BS: send eapol packet
[Tue Oct 30 13:11:38 2018] RTL8723BS: set group key camid:2, addr:00:00:00:00:00:00, kid:2, type:AES
```
 

Share this post


Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Restore formatting

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
0