On Mon, Jan 14, 2019 at 04:06:40PM -0800, Abc Abc wrote: > I am working with hostapd version "v2.7-devel". Could you please check whether you can reproduce this with the releases v2.7? "v2.7-devel" was the temporary version string during a long period and it is difficult to know what the exact snapshot is here. > While doing fast BSS transition of iphone SE, using "FT_over_DS", > target AP hostapd crashes. Would you be able to run hostapd under valgrind or at least get a backtrace from the coredump for that crash? > Connect AP hostapd is running properly. > > Logs of connect AP and Target AP are attached. Could you please provide hostapd configuration files from the APs (with private key information, if any, masked out)? > From debugging, it appears target AP couldn't send "sequence request". > This sequence request is relatively new exchange compared to 2.1v. > > ---- on target AP --- > wpa_ft_pull_pmk_r1() > wpa_ft_rrb_seq_req() > wpa_ft_rrb_build(key, key_len, NULL, NULL, seq_req_auth, NULL, That does not match the current hostap.git snapshot of v2.7 release. It would be better to debug this type of issues with the current version. > ---------------- target AP (07)------------ > madwifi_hostapd_add_sta_node: auth_alg=2 Where does this madwifi_hostapd_add_sta_node come from? The madwifi driver interface was dropped from hostapd in 2014 and the madwifi project itself did the last release in early 2008.. -- Jouni Malinen PGP id EFC895FA _______________________________________________ Hostap mailing list Hostap@xxxxxxxxxxxxxxxxxxx http://lists.infradead.org/mailman/listinfo/hostap