Status Update
Comments
ch...@google.com <ch...@google.com> #2
Chrome Diagnostics Report of following results:
The DNS diagnostic test in Chrome Diagnostics Report is known to have some issues in some configuration. Internal bug id is
Here the diagnostic failure could indicate a real problem. Jason, Jie, what m126 bugs could this report be a duplicate of ?
ri...@gmail.com <ri...@gmail.com> #3
what m126 bugs could this report be a duplicate of ?
Not anything off the top of my head now (maybe Jason knows other). Since the device is not enterprise-enrolled according to the information in #1, I assume it should not hit the diagnostic DNS issue in
But I assume the reporter also encountered the issue of "no connection to gateway" in the diagnostic app, which is partially fixed on M128 in
Re #1,
Thanks for reporting the issue and sorry for the late reply here. A few questions to help us understanding the issue bettter:
- Are you still experiencing this issue? If so, could you file a feedback report (alt-shift-i, and put "
" in the textbox so that we can search for it easily) when you are seeing it again?b/360530624 - Does it only happen on a certain WiFi network? If it's the case, do you by chance have other devices (not Chromebook) to see if they work on the same network?
Thanks!
ba...@gmail.com <ba...@gmail.com> #4
This might be a dup of the internal bug of
As Jie mentioned, if this is still reproducible, a feedback report would help debug the issue further. Thank you!
le...@gmail.com <le...@gmail.com> #5
am...@gmail.com <am...@gmail.com> #6
Bugjuggler: wait 8w -> hugobenichi
sc...@gmail.com <sc...@gmail.com> #7
ka...@gmail.com <ka...@gmail.com> #8
It is still happening, so I will report the next instance with the requested text. It doesn't happen on a specific network, but all networks I am connecting to. It's not repeatable on other non ChromeOS devices in at least two of those, but is repeatable on the exact same device of another owner. I can ask them to also report with the reference number if that is helpful. Let me know if I can provide any additional information or troubleshooting.
I am out of the office for a few days this weekend, but should be able to repeat issue by eod Monday.
ak...@gmail.com <ak...@gmail.com> #9
zu...@gmail.com <zu...@gmail.com> #10
I looked at 2 reports, in both case we see that the WiFi network service state is eventually changed to "failure".
Rerouting to WiFi component to take an initial look if this is a WiFi issue.
ve...@gmail.com <ve...@gmail.com> #12
The client device disconnected from wifi_psk_6 due to "no remaining endpoints", and disconnected from wifi_psk_8 due to reconnect timeout. The connection to wifi_psk_36 was unstable, link monitor failure occurred and PREV_AUTH_NOT_VALID
error observed during reconnection.
my...@googlemail.com <my...@googlemail.com> #13
<tirage> Kevin to take a look, figure out if it is L2 or L3 issue.
bo...@gmail.com <bo...@gmail.com> #14
There are no issues seen on the firewall or with any other models of Chromebook at this same time. I also notice that instead of do53 query to DNS 9.9.9.9 its says Do53 query to (IPv4: 1) and (IPv4: 2) and fails.
Hope this is maybe related. Otherwise I can file my own report.
my...@googlemail.com <my...@googlemail.com> #15
vc...@gmail.com <vc...@gmail.com> #16
mo...@gmail.com <mo...@gmail.com> #17
I do not believe that this is an L2 layer issue. Indeed we see the Wi-Fi state reach "Failure" in all three feedback reports, but I believe that all three are explained by intended behavior. In
In the other two reports, we see a pattern where the device suspends, resumes, then fails to reconnect to the AP is was connected to prior to the resume. This could be explained by the user closing their device, traveling out of range of their AP, then re-opening their device. (
So, I believe the Wi-Fi failures are reflective of expected device behavior in response to user activity. I do believe there is some indication of L3 layer issues though. For example in
Handing this back to the networking team to take a look.
av...@gmail.com <av...@gmail.com> #18
I do believe there is some indication of L3 layer issues though. For example in
http://listnr/product/208/report/92051793504 where we see repeated dnsproxyd errors while we are in the "online" state.
As discussed many times internally, dns failures happen both because of link issues and L3 issues and therefore dns failures can't be used to rule out link issues. Actually dns health checks and dns queries are the first thing expected to fail when the link fails as a packet transport.
je...@gmail.com <je...@gmail.com> #19
la...@gmail.com <la...@gmail.com> #20
Thanks all for the investigation and #19 for providing more information.
I took a quick pass at the 3 reports in #11, the DNS failures always came together with the NUD_FAILED
logs, which means that the gateway was not reachable on L2. This usually means something went wrong on the network side (i.e., due to some reason the device did not get the ARP responses), but the weird thing is that, if I read the logs correctly, these 3 feedback reports are from 3 different networks, and the NUD_FAILED
is shown on all the 3 networks...
Questions to the user:
- Were you using the device at the same physical location to connect to these networks? (just want to rule out some random effect from the physical environment...)
- If it's possible, could you try connecting the device to the same router(s) with Ethernet cable to see if it works? (this could help us understand if the issue is at the network layer or the wifi layer).
Questions to the wifi team:
- In this case, will it be helpful to do some OTA packet capture?
Thanks!
la...@gmail.com <la...@gmail.com> #21
Thanks for all of y'all's help!
av...@gmail.com <av...@gmail.com> #22
Re #21,
Do you want me to submit feedback reports while I am connected? Or only if the issue arises?
Only if the issue arises is fine. Thanks!
Re #14 and #15,
Sorry for the late reply -- I checked the two logs and they showed the same pattern -- there were a lot of NUD_FAILED
in the logs. Not sure if the root cause is the same with #1 . Would you mind also filing a feedback report (alt-shift-i, and put "
cr...@gmail.com <cr...@gmail.com> #23
remotely through the admin console when I notice the behaviour through our
Meraki wifi system. It has these couple options I can select when
collecting logs. Can I do it this way? or another way remotely. Hopefully
this picture comes through.
[image: image.png]
On Tue, Nov 5, 2024 at 8:43 PM <buganizer-system@google.com> wrote:
--
Erik Jeffery
Brown Deer School District
--
Confidentiality Notice: This e-mail message, including any
attachments,
is for the sole use of the intended recipient(s) and may contain
confidential and privileged information. Any unauthorized review, use,
disclosure or distribution is prohibited. If you are not the intended
recipient, please contact the sender by reply e-mail and destroy all copies
of
the original message.
dr...@gmail.com <dr...@gmail.com> #24
Would you like me to only gather logs on devices already updated to 130 that have this issue or do you want logs from 129 devices as well?
mm...@gmail.com <mm...@gmail.com> #25
I think this issue seems to be mostly taken care of with 130, but still seems to occur sporadically.
All of our clients are remote, so the best I can do is collect system logs through the admin console.
Here is a netlog.txt from a OS130 client that has this issue occur at 2024-11-12R13:44:49. Also, you can see this issue occurring for a much longer duration at timestamp - 2024-11-1120:37:50 There is no indication on the firewall that this client had any issues through us.
I have the entire support bundle if uploading that would provide more information.
Please let me know what I can do to help.
kr...@gmail.com <kr...@gmail.com> #26
Re #23 ~ #25:
Thanks for the additional information (and sorry for the late reply).
Hopefully this picture comes through.
Unfortunately we can only see a [image: image.png]
:)
I'll defer to Kevin to check if there are any other logs we can collect for better debugging. (Logs in #25 still shows the NUD_FAILED issue)
lb...@gmail.com <lb...@gmail.com> #27
The computer was restarted at around 18:47 and you can see it connect right away.
Also, if you would rather have me create my own issue I can.
he...@gmail.com <he...@gmail.com> #28
I am going to upload one more netlog. This user is on Chrome OS 130 and is experiencing the issue multiple times of the day in multiple classrooms. It can be seen at timestamp 2024-11-18T17:40:58.026051Z
I have a log packet from the computer - Google Admin Console if needed/
Thanks
he...@gmail.com <he...@gmail.com> #29
Thank you for all of the logs, this is very helpful in working towards a diagnosis. Here's what I've got so far:
We see a repeated pattern of failed authentication attempts in all of your recent log submissions. We attempt to authenticate, and a couple seconds later the attempt times out, seemingly without any response from the AP:
2024-11-12T18:43:53.297881Z DEBUG wpa_supplicant[784]: nl80211: Authentication request send successfully
2024-11-12T18:43:53.298209Z DEBUG wpa_supplicant[784]: nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlan0
2024-11-12T18:43:53.298233Z DEBUG wpa_supplicant[784]: nl80211: New station ea:9e:38:7f:e0:10
2024-11-12T18:43:53.311360Z INFO shill[1162]: INFO shill: [wifi.cc(2659)] WiFi wlan0 StateChanged inactive -> authenticating
2024-11-12T18:43:53.333510Z INFO patchpaneld[1974]: INFO patchpaneld: [shill_client.cc(262)] Service /service/1 was not connected
2024-11-12T18:43:53.338577Z INFO patchpaneld[1974]: INFO patchpaneld: [shill_client.cc(262)] Service /service/1 was not connected
2024-11-12T18:43:56.017781Z DEBUG wpa_supplicant[784]: nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan0
2024-11-12T18:43:56.017823Z DEBUG wpa_supplicant[784]: nl80211: Delete station ea:9e:38:7f:e0:10
2024-11-12T18:43:58.299255Z DEBUG wpa_supplicant[784]: wlan0: SME: Authentication timeout
One possibility is that the auth request was malformed in some way such that the AP didn't recognize it. Perhaps the device tried do authenticate using an unsupported method. Looking at the authentication request details, nothing stands out as erroneous. Another possibility is that the AP did send an authentication response, but that was somehow ignored by the device.
2024-11-19T14:02:00.401322Z DEBUG wpa_supplicant[800]: wlan0: Starting radio work 'sme-connect'@0x580617abf0 after 0.040791 second wait
2024-11-19T14:02:00.401402Z DEBUG wpa_supplicant[800]: wlan0: WPA: clearing own WPA/RSN IE
2024-11-19T14:02:00.401423Z DEBUG wpa_supplicant[800]: wlan0: RSN: clearing own RSNXE
2024-11-19T14:02:00.401481Z DEBUG wpa_supplicant[800]: wlan0: Automatic auth_alg selection: 0x1
2024-11-19T14:02:00.401510Z DEBUG wpa_supplicant[800]: wlan0: SAE enabled, but target BSS does not advertise SAE AKM for RSN
2024-11-19T14:02:00.401533Z DEBUG wpa_supplicant[800]: RSN: PMKSA cache search - network_ctx=0x5806180fb0 try_opportunistic=0 akmp=0x0
2024-11-19T14:02:00.401548Z DEBUG wpa_supplicant[800]: RSN: Search for BSSID (MAC OUI=ea:9e:38 IFACE=8)
2024-11-19T14:02:00.401563Z DEBUG wpa_supplicant[800]: RSN: No PMKSA cache entry found
2024-11-19T14:02:00.401583Z DEBUG wpa_supplicant[800]: wlan0: RSN: using IEEE 802.11i/D9.0
2024-11-19T14:02:00.401604Z DEBUG wpa_supplicant[800]: wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
2024-11-19T14:02:00.401622Z DEBUG wpa_supplicant[800]: wlan0: WPA: Selected mgmt group cipher 32
2024-11-19T14:02:00.401642Z DEBUG wpa_supplicant[800]: wlan0: WPA: clearing AP WPA IE
2024-11-19T14:02:00.401670Z DEBUG wpa_supplicant[800]: WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
2024-11-19T14:02:00.401687Z DEBUG wpa_supplicant[800]: wlan0: WPA: clearing AP RSNXE
2024-11-19T14:02:00.401707Z DEBUG wpa_supplicant[800]: wlan0: WPA: AP group 0x10 network profile group 0x358 driver supported ciphers 0x381e; available group 0x10
2024-11-19T14:02:00.401726Z DEBUG wpa_supplicant[800]: wlan0: WPA: using GTK CCMP
2024-11-19T14:02:00.401747Z DEBUG wpa_supplicant[800]: wlan0: WPA: AP pairwise 0x10 network profile pairwise 0x358 driver supported ciphers 0x381e; available pairwise 0x10
2024-11-19T14:02:00.401766Z DEBUG wpa_supplicant[800]: wlan0: WPA: using PTK CCMP
2024-11-19T14:02:00.401786Z DEBUG wpa_supplicant[800]: wlan0: WPA: AP key_mgmt 0x2 network profile key_mgmt 0xc000d42; available key_mgmt 0x2
2024-11-19T14:02:00.401804Z DEBUG wpa_supplicant[800]: wlan0: WPA: using KEY_MGMT WPA-PSK
2024-11-19T14:02:00.401825Z DEBUG wpa_supplicant[800]: wlan0: WPA: AP mgmt_group_cipher 0x20 network profile mgmt_group_cipher 0x0; available mgmt_group_cipher 0x0
2024-11-19T14:02:00.401844Z DEBUG wpa_supplicant[800]: wlan0: WPA: not using MGMT group cipher
2024-11-19T14:02:00.401874Z DEBUG wpa_supplicant[800]: WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00
2024-11-19T14:02:00.401889Z DEBUG wpa_supplicant[800]: RSN: Set own RSNXE default - hexdump(len=0):
2024-11-19T14:02:00.401903Z DEBUG wpa_supplicant[800]: WPA: Set PMK based on external data - hexdump(len=32): [REMOVED]
2024-11-19T14:02:00.401951Z DEBUG wpa_supplicant[800]: RRM: Determining whether RRM can be used - device support: 0x30
2024-11-19T14:02:00.401966Z DEBUG wpa_supplicant[800]: RRM: Adding RRM IE to Association Request
2024-11-19T14:02:00.402027Z DEBUG wpa_supplicant[800]: Added supported operating classes IE - hexdump(len=24): 3b 16 79 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f 80 81 00 82 80
2024-11-19T14:02:00.402050Z DEBUG wpa_supplicant[800]: EAPOL: External notification - EAP success=0
2024-11-19T14:02:00.402070Z DEBUG wpa_supplicant[800]: EAPOL: External notification - EAP fail=0
2024-11-19T14:02:00.402084Z DEBUG wpa_supplicant[800]: EAPOL: External notification - portControl=Auto
2024-11-19T14:02:00.402101Z DEBUG wpa_supplicant[800]: wlan0: Cancelling scan request
2024-11-19T14:02:00.402170Z NOTICE wpa_supplicant[800]: SME: Trying to authenticate with (MAC OUI=ea:9e:38 IFACE=8) (SSID='(SSID: 1)' freq=5680 MHz)
2024-11-19T14:02:00.402194Z DEBUG wpa_supplicant[800]: EAPOL: External notification - portValid=0
2024-11-19T14:02:00.402213Z DEBUG wpa_supplicant[800]: wlan0: State: SCANNING -> AUTHENTICATING
2024-11-19T14:02:00.402253Z DEBUG wpa_supplicant[800]: wlan0: Determining shared radio frequencies (max len 2)
2024-11-19T14:02:00.402276Z DEBUG wpa_supplicant[800]: wlan0: Shared frequencies (len=0): completed iteration
2024-11-19T14:02:00.402301Z DEBUG wpa_supplicant[800]: P2P: Add operating class 81
2024-11-19T14:02:00.402321Z DEBUG wpa_supplicant[800]: P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
2024-11-19T14:02:00.402335Z DEBUG wpa_supplicant[800]: P2P: Add operating class 115
2024-11-19T14:02:00.402350Z DEBUG wpa_supplicant[800]: P2P: Channels - hexdump(len=4): 24 28 2c 30
2024-11-19T14:02:00.402363Z DEBUG wpa_supplicant[800]: P2P: Add operating class 116
2024-11-19T14:02:00.402378Z DEBUG wpa_supplicant[800]: P2P: Channels - hexdump(len=2): 24 2c
2024-11-19T14:02:00.402391Z DEBUG wpa_supplicant[800]: P2P: Add operating class 117
2024-11-19T14:02:00.402405Z DEBUG wpa_supplicant[800]: P2P: Channels - hexdump(len=2): 28 30
2024-11-19T14:02:00.402420Z DEBUG wpa_supplicant[800]: P2P: Add operating class 124
2024-11-19T14:02:00.402457Z DEBUG wpa_supplicant[800]: P2P: Channels - hexdump(len=4): 95 99 9d a1
2024-11-19T14:02:00.402471Z DEBUG wpa_supplicant[800]: P2P: Add operating class 125
2024-11-19T14:02:00.402488Z DEBUG wpa_supplicant[800]: P2P: Channels - hexdump(len=5): 95 99 9d a1 a5
2024-11-19T14:02:00.402502Z DEBUG wpa_supplicant[800]: P2P: Add operating class 126
2024-11-19T14:02:00.402516Z DEBUG wpa_supplicant[800]: P2P: Channels - hexdump(len=2): 95 9d
2024-11-19T14:02:00.402529Z DEBUG wpa_supplicant[800]: P2P: Add operating class 127
2024-11-19T14:02:00.402544Z DEBUG wpa_supplicant[800]: P2P: Channels - hexdump(len=2): 99 a1
2024-11-19T14:02:00.402558Z DEBUG wpa_supplicant[800]: P2P: Add operating class 128
2024-11-19T14:02:00.402584Z DEBUG wpa_supplicant[800]: P2P: Channels - hexdump(len=8): 24 28 2c 30 95 99 9d a1
2024-11-19T14:02:00.402611Z DEBUG wpa_supplicant[800]: P2P: Add operating class 130
2024-11-19T14:02:00.402632Z DEBUG wpa_supplicant[800]: P2P: Channels - hexdump(len=9): 24 28 2c 30 95 99 9d a1 a5
2024-11-19T14:02:00.402649Z DEBUG wpa_supplicant[800]: P2P: Update channel list
2024-11-19T14:02:00.402697Z DEBUG wpa_supplicant[800]: P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,161,165 126:149,157 127:153,161 128:36,40,44,48,149,153,157,161 130:36,40,44,48,149,153,157,161,165
2024-11-19T14:02:00.402716Z DEBUG wpa_supplicant[800]: P2P: cli_channels:
2024-11-19T14:02:00.402749Z DEBUG wpa_supplicant[800]: nl80211: Authenticate (ifindex=2)
2024-11-19T14:02:00.402844Z DEBUG wpa_supplicant[800]: * bssid=(MAC OUI=ea:9e:38 IFACE=8)
2024-11-19T14:02:00.402859Z DEBUG wpa_supplicant[800]: * freq=5680
2024-11-19T14:02:00.402900Z DEBUG wpa_supplicant[800]: * SSID=649433bbcd6b
2024-11-19T14:02:00.402914Z DEBUG wpa_supplicant[800]: * IEs - hexdump(len=0): [NULL]
2024-11-19T14:02:00.402927Z DEBUG wpa_supplicant[800]: * Auth Type 0
Another possibility is that the AP did send an authentication response, but that was somehow ignored by the device. Unfortunately, none of these possibilities are observable in the limited logs that we have. Really, we're going to need additional information to actually make a diagnosis, since there isn't anything conclusive in the device logs.
ejeffery, if you're able to provide some additional diagnostics, it could go a long way to helping understand the behavior. Here are some things that would help me debug, listed in order of usefulness. I understand that you might not be able to complete some or all of these steps, but anything you can provide could be useful.
-
An OTA packet capture on the AP's operating frequency, showing a reproduction of the event. This is definitely an advanced step that requires additional hardware so no worries if this isn't viable, but it's certainly the most useful option.
-
Logs from the AP that you're trying to connect to. This could potentially inform me of misalignment between the Chromebook and AP.
-
A full feedback report from the Chromebook, gathered using Alt-Shift-I immediately after a failure. Feedback reports contain additional logs and information that isn't available in the net logs.
If you're able to complete items 1 or 2, it would still be really helpful if you could provide an accompanying feedback report that lines up with the packet capture or AP logs.
Let me know if you're able to provide any of this additional information. Thanks again for working with us to help diagnose this issue.
Best, Kevin
se...@gmail.com <se...@gmail.com> #30
1. I can try to do this. It would be like a monitor mode capture? I can try but most of the time it isn't necessarily happening when I am around. I just hear about it later with the time stamps.
2. One of the problems here is that we use Meraki APs. Don't have a lot in logging capabilities. I can attach some screenshots of dashboards here if you want.
3. Is there any specific logs you need. I usually do not get to see the user in person and must rely on log gathering from the admin console, but I can get a support bundle from there and upload any logs you may need if you want. That is where I got the netlog.txt from.
Thanks very much for helping me with this.
wx...@gmail.com <wx...@gmail.com> #31
Does this help at all?
sr...@gmail.com <sr...@gmail.com> #32
ro...@gmail.com <ro...@gmail.com> #33
lb...@gmail.com <lb...@gmail.com> #34
da...@misena.edu.co <da...@misena.edu.co> #35
bs...@gmail.com <bs...@gmail.com> #36
> com.android.ide.common.process.ProcessException: org.gradle.process.internal.ExecException: Process 'command 'C:\Program Files\java\jdk1.7.0_79\bin\java.exe'' finished with non-zero exit value 1
after follow #7 it again shows one error.plz anybody help me to clear.
lb...@gmail.com <lb...@gmail.com> #37
[Deleted User] <[Deleted User]> #38
You're a life saver. Tnx! Couldn't get my app working in no way, till I read your comment and updated my other module to v23 as well :s
Then ran into to same issue as #36 bsharmil...@gmail.com
but then adding " multiDexEnabled true" to my defaultConfig allowed me to run the project
cv...@gmail.com <cv...@gmail.com>
jw...@gmail.com <jw...@gmail.com> #39
og...@gmail.com <og...@gmail.com> #40
I need to keep my build for Sdk version 21, so changing to v23 is not possible.
I got the solution after following
Remove the support library v23 folder, then make a build.
The error shown that Google Play services v8.4.0 requires support library v7:23.
Replace this:
compile 'com.google.android.gms:play-services:+'
With this:
compile 'com.google.android.gms:play-services:8.3.0'
Then clean project, and it works!
The reason is using compile 'com.google.android.gms:play-services:+'
will make Android Studio uses the latest (8.4.0 as of today).
DO NOT DO THIS.
se...@gmail.com <se...@gmail.com> #41
th...@gmail.com <th...@gmail.com> #42
However, the version of play-services is 9.0.2 today.
And 8.3.0 can not support some libraries recently added to Google, such as Firebase in my case.
I've tried method of
Anyway, this bug still exists.
ka...@gmail.com <ka...@gmail.com> #43
sm...@gmail.com <sm...@gmail.com> #44
sr...@gmail.com <sr...@gmail.com> #45
Create a new styles.xml file under v23 folder with the following and you are done!
<resources>
<style name="Base.TextAppearance.AppCompat.Widget.Button.Inverse">
<item name="android:textColor">#000000</item>
</style>
<style name="Base.Widget.AppCompat.Button.Colored">
<item name="android:textColor">#000000</item>
</style>
</resources>
Description
I am developing with SDK 19, but got below error and in MainActivity.java show "R" as error.
/Users/aravind/AndroidStudioProjects/Email01/app/build/intermediates/exploded-aar/com.android.support/appcompat-v7/23.0.0/res/values-v23/values-v23.xml
Error:(2) Error retrieving parent for item: No resource found that matches the given name 'android:TextAppearance.Material.Widget.Button.Inverse'.
Error:(2) Error retrieving parent for item: No resource found that matches the given name 'android:Widget.Material.Button.Colored'.
Error:Execution failed for task ':app:processDebugResources'.
> com.android.ide.common.process.ProcessException: org.gradle.process.internal.ExecException: Process 'command '/Users/aravind/android/Android-SDK/sdk/build-tools/22.0.1/aapt'' finished with non-zero exit value 1