On Sun, 2013-02-17 at 00:31 -0600, Larry Finger wrote: > Jouni and Johannes, > > A recent pull of the wireless-testing tree caused my wireless to break. The > wireless devices can authenticate and associate as follows: > > wlan0: authenticate with c0:3f:0e:be:2b:44 > wlan0: capabilities/regulatory prevented using AP HT/VHT configuration, downgraded > wlan0: send auth to c0:3f:0e:be:2b:44 (try 1/3) > wlan0: authenticated > wlan0: associate with c0:3f:0e:be:2b:44 (try 1/3) > wlan0: RX AssocResp from c0:3f:0e:be:2b:44 (capab=0x411 status=0 aid=3) > wlan0: associated > IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready > wlan0: dropped frame to c0:3f:0e:be:2b:44 (unauthorized port) > b43-phy0 debug: Using hardware based encryption for keyidx: 0, mac: > c0:3f:0e:be:2b:44 > b43-phy0 debug: Using hardware based encryption for keyidx: 1, mac: > ff:ff:ff:ff:ff:ff > wlan0: dropped frame to c0:3f:0e:be:2b:44 (unauthorized port) > wlan0: dropped frame to c0:3f:0e:be:2b:44 (unauthorized port) Yeah, it's obvious that this would happen for drivers not supporting TDLS -- will send a patch. johannes -- To unsubscribe from this list: send the line "unsubscribe linux-wireless" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html