TP> We recently applied TP> https://github.com/cozybit/authsae/commit/0e5c65c3f773db820d6cee7b365cd4a70181c72d which may fix your issue. All, I just find that the patch above introduce a segmentation fault. Below is the patch content. Look at line 970, "cand->state" would dereference a NULL pointer because the "if" statement makes sure "cand" is NULL. if ((cand = find_peer(mgmt->sa, 0)) == NULL) { 968 - sae_debug(AMPE_DEBUG_FSM, "Mesh plink: plink open from unauthed peer\n"); 967 + /* "1" here means only get peers in SAE_ACCEPTED */ 968 + if ((cand = find_peer(mgmt->sa, 1)) == NULL) { 969 + sae_debug(AMPE_DEBUG_FSM, "Mesh plink: plink open from unauthed peer "MACSTR" state=%d\n", 970 + MAC2STR(mgmt->sa), cand->state); 969 971 return 0; 970 972 } -- To unsubscribe from this list: send the line "unsubscribe linux-wireless" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html