Re: [PATCH v2 2/2] Use control port over nl80211 also for rx path

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Am 05.01.20 um 22:06 schrieb Markus Theil:
I didn't fully understand what the changes were doing with nl_event and
why the changes looked so inconsistent on using
send_and_recv_msgs_event() vs. send_and_recv_msmgs(). I tried to fix
those, but that did not remove the issues (but probably fixed some other
cases that I did not hit yet due to those other problems preventing full
testing). Anyway, the change itself did allow a simple test sequence
like the ap_wpa2_psk test case to complete full connection on both the
AP and station side using the nl80211 control port, so most of the
functionality is working, but something is just messing up what happens
for following operations.

I also tried the series with the tests and it broke the very first..
Not finished looking into that when I had to stop for today at least but it looks like the patch series is breaking deauthentication for wpa_supplicant or at least for the test ap_mixed_security.

It seems to generate invalid deauthentication requests and I assume it's also not deleting the STA from the kernel. Nl80211 then balks when asked to associate again when already having an association... at least that is assumption I was planning to verify tomorrow.

(I checked the pcapng file from the test, try the filter
"(wlan.fc.type_subtype == 0x000c) || (frame.cap_len == 48))" and compare it to a working testrun.)

Alexander

_______________________________________________
Hostap mailing list
Hostap@xxxxxxxxxxxxxxxxxxx
http://lists.infradead.org/mailman/listinfo/hostap



[Index of Archives]     [Linux Wireless]     [Linux Kernel]     [ATH6KL]     [Linux Bluetooth]     [Linux Netdev]     [Kernel Newbies]     [IDE]     [Security]     [Git]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Linux ATA RAID]     [Samba]     [Device Mapper]

  Powered by Linux