I’m running a network of Beaglebones (mostly BBGW) connected to an Eero mesh network. I’m getting consistent problems with several random boards losing their WiFi connections throughout the day. The error is always the same, and they don’t reconnect after the error:
wlan0: disassociated from [MAC address] (Reason: 34=DISASSOC_LOW_ACK)
No other devices on my network are affected by this. Any ideas/suggestions?
As best as I can tell Eero offers no such setting. It does seem to be a problem only with the Beaglebones though. I wonder if there’s a setting in Debian that would help with this, but so far I haven’t found one.
I found the solution. For anyone who has this same issue: upgrading connman solves the problem. A connection dropped with a DISASSOC_LOW_ACK error isn’t reestablished by connman v1.36, but is by v1.41.
This problem has reappeared with iwd on BBGW. In addition to the DISASSOC_LOW_ACK error, I’m also getting the following driver crash:
[Wed Dec 4 16:11:28 2024] ------------[ cut here ]------------
[Wed Dec 4 16:11:28 2024] WARNING: CPU: 0 PID: 415 at net/wireless/sme.c:533 cfg80211_connect+0x5e4/0x784 [cfg80211]
[Wed Dec 4 16:11:28 2024] Modules linked in: rpcsec_gss_krb5 bnep hci_uart btqca btrtl btbcm btintel wl18xx wlcore mac80211 libarc4 uio_pruss pm33xx pvrsrvkm(O) snd_usb_audio snd_hwdep snd_usbmidi_lib snd_rawmidi snd_seq_device wlcore_sdio mc wkup_m3_ipc cpufreq_dt evdev bluetooth ccm algif_aead aes_arm_bs crypto_simd cryptd uio_pdrv_genirq uio cfg80211 binfmt_misc pkcs8_key_parser snd_aloop snd_pcm snd_timer snd soundcore dm_mod
[Wed Dec 4 16:11:28 2024] CPU: 0 PID: 415 Comm: iwd Tainted: G O 5.10.168-ti-r79 #1bookworm
[Wed Dec 4 16:11:28 2024] Hardware name: Generic AM33XX (Flattened Device Tree)
[Wed Dec 4 16:11:28 2024] Backtrace:
[Wed Dec 4 16:11:28 2024] [] (dump_backtrace) from [] (show_stack+0x20/0x24)
[Wed Dec 4 16:11:28 2024] r7:00000215 r6:00070013 r5:00000000 r4:c15dae28
[Wed Dec 4 16:11:28 2024] [] (show_stack) from [] (dump_stack+0x90/0xa4)
[Wed Dec 4 16:11:28 2024] [] (dump_stack) from [] (__warn+0x98/0x138)
[Wed Dec 4 16:11:28 2024] r7:00000215 r6:00000009 r5:bf0ac48c r4:bf0dda6c
[Wed Dec 4 16:11:28 2024] [] (__warn) from [] (warn_slowpath_fmt+0x70/0xe4)
[Wed Dec 4 16:11:28 2024] r7:00000009 r6:00000215 r5:bf0dda6c r4:00000000
[Wed Dec 4 16:11:28 2024] [] (warn_slowpath_fmt) from [] (cfg80211_connect+0x5e4/0x784 [cfg80211])
[Wed Dec 4 16:11:28 2024] r8:00000000 r7:c365864c r6:00000000 r5:c3658608 r4:ffffff8d
[Wed Dec 4 16:11:28 2024] [] (cfg80211_connect [cfg80211]) from [] (nl80211_connect+0x4e4/0x63c [cfg80211])
[Wed Dec 4 16:11:28 2024] r10:c1612540 r9:c366dd90 r8:00000000 r7:c3658000 r6:00000000 r5:ca93c000
[Wed Dec 4 16:11:28 2024] r4:c366dd34
[Wed Dec 4 16:11:28 2024] [] (nl80211_connect [cfg80211]) from [] (genl_rcv_msg+0x170/0x378)
[Wed Dec 4 16:11:28 2024] r8:bf08b338 r7:cabcf800 r6:c33eacc0 r5:bf0e42e4 r4:00000000
[Wed Dec 4 16:11:28 2024] [] (genl_rcv_msg) from [] (netlink_rcv_skb+0xc8/0x12c)
[Wed Dec 4 16:11:28 2024] r10:00000000 r9:c3647984 r8:c1612540 r7:000000a8 r6:c1a8f200 r5:c0ddaf1c
[Wed Dec 4 16:11:28 2024] r4:c33eacc0
[Wed Dec 4 16:11:28 2024] [] (netlink_rcv_skb) from [] (genl_rcv+0x34/0x44)
[Wed Dec 4 16:11:28 2024] r7:c33eacc0 r6:c1a86d80 r5:c161a5c0 r4:c33eacc0
[Wed Dec 4 16:11:28 2024] [] (genl_rcv) from [] (netlink_unicast+0x1a4/0x29c)
[Wed Dec 4 16:11:28 2024] r5:000000a8 r4:c1aa6000
[Wed Dec 4 16:11:28 2024] [] (netlink_unicast) from [] (netlink_sendmsg+0x218/0x490)
[Wed Dec 4 16:11:28 2024] r9:00000000 r8:c3647800 r7:000000a8 r6:c33eacc0 r5:c366deb8 r4:c1a8f200
[Wed Dec 4 16:11:28 2024] [] (netlink_sendmsg) from [] (sock_sendmsg+0x44/0x54)
[Wed Dec 4 16:11:28 2024] r10:00000121 r9:c366c000 r8:c01002c4 r7:00000040 r6:00000000 r5:c4a77400
[Wed Dec 4 16:11:28 2024] r4:c366deb8
[Wed Dec 4 16:11:28 2024] [] (sock_sendmsg) from [] (__sys_sendto+0xd4/0x11c)
[Wed Dec 4 16:11:28 2024] r5:c4a77400 r4:00000000
[Wed Dec 4 16:11:28 2024] [] (__sys_sendto) from [] (sys_send+0x28/0x30)
[Wed Dec 4 16:11:28 2024] r7:00000121 r6:00000001 r5:01168fb8 r4:b6eee318
[Wed Dec 4 16:11:28 2024] [] (sys_send) from [] (__sys_trace_return+0x0/0x1c)
[Wed Dec 4 16:11:28 2024] Exception stack(0xc366dfa8 to 0xc366dff0)
[Wed Dec 4 16:11:28 2024] dfa0: b6eee318 01168fb8 00000004 0117b3b8 000000a8 00000000
[Wed Dec 4 16:11:28 2024] dfc0: b6eee318 01168fb8 00000001 00000121 0055afa4 00550948 00000000 00556f1c
[Wed Dec 4 16:11:28 2024] dfe0: 00000121 be985a08 b6e93e45 b6dfc656
[Wed Dec 4 16:11:28 2024] —[ end trace 5c0c088a15400c80 ]—
In addition, the iwd log shows the following:
Received error during CMD_TRIGGER_SCAN: Invalid argument (22)
Typically when this happens I have to reboot the board to get everything working again.
Have there been any wl18xx driver updates that make progress towards fixing this? If not, what’s a good way to completely reset the networking driver short of rebooting the board?