• Willkommen im Linux Club - dem deutschsprachigen Supportforum für GNU/Linux. Registriere dich kostenlos, um alle Inhalte zu sehen und Fragen zu stellen.

Gelöst Kubuntu 22.04 WLAN unterbricht des öfteren

lewendi

Advanced Hacker
Servus zusammen,

ich habe das Problem, dass mein WLAN im 2,4 sowie auch im 5 GHZ Bereich unterbricht. Es hilt auch kein warten, dass es sich wieder einloggt.Nur ein Neustart, dann geht es wieder -auf unbestimmte Zeit.
Hier ist mal die Ausgabe von sudo dmesg -T


Code:
[Di Jan  3 13:53:58 2023] audit: type=1107 audit(1672750438.524:92): pid=906 uid=102 auid=4294967295 ses=4294967295 subj=unconfined msg='apparmor="DENIED" operation="dbus_signal"  bus="system" path="/com/redhat/PrinterSpooler" interface="com.redhat.PrinterSpooler" member="QueueChanged" mask="send" name="org.freedesktop.DBus" pid=2241 label="snap.cups.cupsd" peer_pid=1524 peer_label="unconfined"
                           exe="/usr/bin/dbus-daemon" sauid=102 hostname=? addr=? terminal=?'
[Di Jan  3 13:53:58 2023] audit: type=1107 audit(1672750438.524:93): pid=906 uid=102 auid=4294967295 ses=4294967295 subj=unconfined msg='apparmor="DENIED" operation="dbus_signal"  bus="system" path="/com/redhat/PrinterSpooler" interface="com.redhat.PrinterSpooler" member="QueueChanged" mask="send" name="org.freedesktop.DBus" pid=2241 label="snap.cups.cupsd" peer_pid=1524 peer_label="unconfined"
                           exe="/usr/bin/dbus-daemon" sauid=102 hostname=? addr=? terminal=?'
[Di Jan  3 13:53:58 2023] audit: type=1107 audit(1672750438.528:94): pid=906 uid=102 auid=4294967295 ses=4294967295 subj=unconfined msg='apparmor="DENIED" operation="dbus_signal"  bus="system" path="/com/redhat/PrinterSpooler" interface="com.redhat.PrinterSpooler" member="QueueChanged" mask="send" name="org.freedesktop.DBus" pid=2241 label="snap.cups.cupsd" peer_pid=1524 peer_label="unconfined"
                           exe="/usr/bin/dbus-daemon" sauid=102 hostname=? addr=? terminal=?'
[Di Jan  3 13:54:00 2023] wlp1s0: authenticate with 44:4e:6d:9f:8d:38
[Di Jan  3 13:54:00 2023] wlp1s0: send auth to 44:4e:6d:9f:8d:38 (try 1/3)
[Di Jan  3 13:54:01 2023] wlp1s0: send auth to 44:4e:6d:9f:8d:38 (try 2/3)
[Di Jan  3 13:54:02 2023] wlp1s0: authenticate with 44:4e:6d:9f:8d:38
[Di Jan  3 13:54:02 2023] wlp1s0: send auth to 44:4e:6d:9f:8d:38 (try 1/3)
[Di Jan  3 13:54:02 2023] wlp1s0: authenticated
[Di Jan  3 13:54:02 2023] wlp1s0: associate with 44:4e:6d:9f:8d:38 (try 1/3)
[Di Jan  3 13:54:02 2023] wlp1s0: RX AssocResp from 44:4e:6d:9f:8d:38 (capab=0x1511 status=0 aid=1)
[Di Jan  3 13:54:02 2023] wlp1s0: associated
[Di Jan  3 13:54:02 2023] ath: EEPROM regdomain: 0x8114
[Di Jan  3 13:54:02 2023] ath: EEPROM indicates we should expect a country code
[Di Jan  3 13:54:02 2023] ath: doing EEPROM country->regdmn map search
[Di Jan  3 13:54:02 2023] ath: country maps to regdmn code: 0x37
[Di Jan  3 13:54:02 2023] ath: Country alpha2 being used: DE
[Di Jan  3 13:54:02 2023] ath: Regpair used: 0x37
[Di Jan  3 13:54:02 2023] ath: regdomain 0x8114 dynamically updated by country element
[Di Jan  3 13:54:03 2023] wlp1s0: Limiting TX power to 20 (23 - 3) dBm as advertised by 44:4e:6d:9f:8d:38
[Di Jan  3 13:54:03 2023] IPv6: ADDRCONF(NETDEV_CHANGE): wlp1s0: link becomes ready
[Di Jan  3 13:54:05 2023] audit: type=1107 audit(1672750445.244:95): pid=906 uid=102 auid=4294967295 ses=4294967295 subj=unconfined msg='apparmor="DENIED" operation="dbus_signal"  bus="system" path="/com/redhat/PrinterSpooler" interface="com.redhat.PrinterSpooler" member="QueueChanged" mask="send" name="org.freedesktop.DBus" pid=2241 label="snap.cups.cupsd" peer_pid=1524 peer_label="unconfined"
                           exe="/usr/bin/dbus-daemon" sauid=102 hostname=? addr=? terminal=?'
[Di Jan  3 13:54:05 2023] audit: type=1107 audit(1672750445.252:96): pid=906 uid=102 auid=4294967295 ses=4294967295 subj=unconfined msg='apparmor="DENIED" operation="dbus_signal"  bus="system" path="/com/redhat/PrinterSpooler" interface="com.redhat.PrinterSpooler" member="QueueChanged" mask="send" name="org.freedesktop.DBus" pid=2241 label="snap.cups.cupsd" peer_pid=1524 peer_label="unconfined"
                           exe="/usr/bin/dbus-daemon" sauid=102 hostname=? addr=? terminal=?'
[Di Jan  3 13:54:05 2023] audit: type=1107 audit(1672750445.268:97): pid=906 uid=102 auid=4294967295 ses=4294967295 subj=unconfined msg='apparmor="DENIED" operation="dbus_signal"  bus="system" path="/com/redhat/PrinterSpooler" interface="com.redhat.PrinterSpooler" member="QueueChanged" mask="send" name="org.freedesktop.DBus" pid=2241 label="snap.cups.cupsd" peer_pid=1524 peer_label="unconfined"
                           exe="/usr/bin/dbus-daemon" sauid=102 hostname=? addr=? terminal=?'
[Di Jan  3 13:54:05 2023] audit: type=1107 audit(1672750445.268:98): pid=906 uid=102 auid=4294967295 ses=4294967295 subj=unconfined msg='apparmor="DENIED" operation="dbus_signal"  bus="system" path="/com/redhat/PrinterSpooler" interface="com.redhat.PrinterSpooler" member="QueueChanged" mask="send" name="org.freedesktop.DBus" pid=2241 label="snap.cups.cupsd" peer_pid=1524 peer_label="unconfined"
                           exe="/usr/bin/dbus-daemon" sauid=102 hostname=? addr=? terminal=?'
[Di Jan  3 13:54:05 2023] audit: type=1107 audit(1672750445.268:99): pid=906 uid=102 auid=4294967295 ses=4294967295 subj=unconfined msg='apparmor="DENIED" operation="dbus_signal"  bus="system" path="/com/redhat/PrinterSpooler" interface="com.redhat.PrinterSpooler" member="QueueChanged" mask="send" name="org.freedesktop.DBus" pid=2241 label="snap.cups.cupsd" peer_pid=1524 peer_label="unconfined"
                           exe="/usr/bin/dbus-daemon" sauid=102 hostname=? addr=? terminal=?'
[Di Jan  3 14:01:04 2023] ath10k_pci 0000:01:00.0: failed to wake target for read32 at 0x0003a028: -110
[Di Jan  3 14:01:08 2023] ath10k_pci 0000:01:00.0: failed to wake target for write32 of 0x000003f7 at 0x0003543c: -110
[Di Jan  3 14:01:09 2023] ath10k_pci 0000:01:00.0: failed to wake target for read32 at 0x0003a028: -110
[Di Jan  3 14:01:16 2023] ath10k_pci 0000:01:00.0: failed to wake target for write32 of 0x000003f9 at 0x0003543c: -110
[Di Jan  3 14:01:21 2023] ath10k_pci 0000:01:00.0: failed to wake target for write32 of 0x000003fb at 0x0003543c: -110
[Di Jan  3 14:01:22 2023] ath10k_pci 0000:01:00.0: failed to wake target for write32 of 0x000003fd at 0x0003543c: -110
[Di Jan  3 14:01:22 2023] ath10k_pci 0000:01:00.0: failed to wake target for write32 of 0x000003ff at 0x0003543c: -110
[Di Jan  3 14:01:23 2023] ath10k_pci 0000:01:00.0: failed to wake target for write32 of 0x00000401 at 0x0003543c: -110
[Di Jan  3 14:01:30 2023] ath10k_pci 0000:01:00.0: failed to wake target for write32 of 0x00000403 at 0x0003543c: -110
[Di Jan  3 14:01:32 2023] ath10k_pci 0000:01:00.0: failed to wake target for write32 of 0x00000405 at 0x0003543c: -110
[Di Jan  3 14:01:33 2023] ath10k_pci 0000:01:00.0: failed to wake target for write32 of 0x00000407 at 0x0003543c: -110
[Di Jan  3 14:01:36 2023] ath10k_pci 0000:01:00.0: failed to wake target for write32 of 0x00000409 at 0x0003543c: -110
[Di Jan  3 14:01:37 2023] ath10k_pci 0000:01:00.0: failed to wake target for write32 of 0x0000040b at 0x0003543c: -110
[Di Jan  3 14:01:38 2023] ath10k_pci 0000:01:00.0: failed to wake target for write32 of 0x0000040d at 0x0003543c: -110
[Di Jan  3 14:01:39 2023] ath10k_pci 0000:01:00.0: failed to wake target for write32 of 0x0000040f at 0x0003543c: -110
[Di Jan  3 14:01:40 2023] ath10k_pci 0000:01:00.0: failed to wake target for write32 of 0x00000411 at 0x0003543c: -110
[Di Jan  3 14:01:41 2023] ath10k_pci 0000:01:00.0: failed to wake target for write32 of 0x00000413 at 0x0003543c: -110
[Di Jan  3 14:01:42 2023] ath10k_pci 0000:01:00.0: failed to wake target for write32 of 0x00000415 at 0x0003543c: -110
[Di Jan  3 14:01:43 2023] ath10k_pci 0000:01:00.0: failed to wake target for write32 of 0x00000417 at 0x0003543c: -110
[Di Jan  3 14:01:44 2023] ath10k_pci 0000:01:00.0: failed to wake target for read32 at 0x0003a028: -110
[Di Jan  3 14:01:44 2023] ath10k_pci 0000:01:00.0: failed to wake target for write32 of 0x00000419 at 0x0003543c: -110
[Di Jan  3 14:01:45 2023] ath10k_pci 0000:01:00.0: failed to wake target for write32 of 0x0000041b at 0x0003543c: -110
[Di Jan  3 14:01:46 2023] ath10k_pci 0000:01:00.0: failed to wake target for write32 of 0x0000041d at 0x0003543c: -110
[Di Jan  3 14:01:47 2023] ath10k_pci 0000:01:00.0: failed to wake target for write32 of 0x0000041f at 0x0003543c: -110
[Di Jan  3 14:01:48 2023] ath10k_pci 0000:01:00.0: failed to wake target for write32 of 0x00000421 at 0x0003543c: -110
[Di Jan  3 14:01:49 2023] ath10k_pci 0000:01:00.0: failed to wake target for write32 of 0x00000423 at 0x0003543c: -110
[Di Jan  3 14:01:50 2023] ath10k_pci 0000:01:00.0: failed to wake target for write32 of 0x00000425 at 0x0003543c: -110
[Di Jan  3 14:01:51 2023] ath10k_pci 0000:01:00.0: failed to wake target for write32 of 0x00000427 at 0x0003543c: -110
[Di Jan  3 14:01:52 2023] ath10k_pci 0000:01:00.0: failed to wake target for write32 of 0x00000429 at 0x0003543c: -110
[Di Jan  3 14:01:53 2023] ath10k_pci 0000:01:00.0: failed to wake target for write32 of 0x0000042b at 0x0003543c: -110
[Di Jan  3 14:01:54 2023] ath10k_pci 0000:01:00.0: failed to wake target for write32 of 0x0000042d at 0x0003543c: -110
[Di Jan  3 14:01:55 2023] ath10k_pci 0000:01:00.0: failed to wake target for write32 of 0x0000042f at 0x0003543c: -110
[Di Jan  3 14:01:56 2023] ath10k_pci 0000:01:00.0: failed to wake target for write32 of 0x00000431 at 0x0003543c: -110

Wie kann ich noch mein WLAN testen/prüfen?

lewendi
 

spoensche

Moderator
Teammitglied
Wenn das WLAN crashed führe mal folgende Befehle aus:

Code:
sudo modprobe -r ath10k_pci && sudo modprobe ath10k_pci
sudo dmesg -T | grep ath10k
 
OP
lewendi

lewendi

Advanced Hacker
Gerade habe ich wieder einen Wlan-Ausfall und habe beide Befehle eingegeben.

Beim ersten Befehl kam nichts.
Der 2. Befehl ist in der TXT Datei
 

Anhänge

  • fehler.txt
    35,6 KB · Aufrufe: 10
OP
lewendi

lewendi

Advanced Hacker
@ spoensche
Danke für den Link.
Da mein Englisch nicht so gut ist (Jahrgang 40) muß ich wohl auf das neue Kubuntu im April warten, in der Hoffnung, dass der Fehler dann behoben ist..
 
OP
lewendi

lewendi

Advanced Hacker
Funktioniert momentan jetzt, nach der Installation von den Aktualisierungen
 
Oben