On Sat, 2009-09-05 at 05:08 +0300, Maxim Levitsky wrote: > 1 - when connecting again to the access point (same or another), > wpa_supplicant does the following: > > deassoc > auth > assoc > > So it assumes that deassoc command disconnects completely, but it not > longer true. > Yet, I have tried to make its dissassoc function do both, but it failed. > I used following patch: > > > diff --git a/wpa_supplicant/wpa_supplicant.c b/wpa_supplicant/wpa_supplicant.c > index c68dd82..50afeeb 100644 > --- a/wpa_supplicant/wpa_supplicant.c > +++ b/wpa_supplicant/wpa_supplicant.c > @@ -1278,8 +1278,10 @@ void wpa_supplicant_disassociate(struct wpa_supplicant *wpa_s, > if (!is_zero_ether_addr(wpa_s->bssid)) { > if (wpa_s->drv_flags & WPA_DRIVER_FLAGS_USER_SPACE_MLME) > ieee80211_sta_disassociate(wpa_s, reason_code); > - else > + else { > wpa_drv_disassociate(wpa_s, wpa_s->bssid, reason_code); > + wpa_drv_deauthenticate(wpa_s, wpa_s->bssid, reason_code); > + } > addr = wpa_s->bssid; > } > wpa_clear_keys(wpa_s, addr); Right, this is a known problem. I still think it should be handled in wpa_s, but I'm not sure whether that patch should have worked or not. > EAPOL: startWhen --> 0 > EAPOL: disable timer tick > wpa_driver_nl80211_disassociate > wpa_driver_nl80211_deauthenticate > nl80211: MLME command failed: ret=-67 (Link has been severed) Ok so it was called, but got -ENOLINK? That's rather odd. But I suspect that it had already internally cleared the BSSID, so that it was asking to deauth from 00:...:00 -- could you check that? > 2 - independent of the above, the ieee80211_set_disassoc > doesn't work right if deauth==false. > > > If it is, then a work item is added to station work thread, and it is > never removed: > > } else { > struct ieee80211_mgd_work *wk = ifmgd->old_associate_work; > > wk->state = IEEE80211_MGD_STATE_IDLE; > list_add(&wk->list, &ifmgd->work_list); > } > > > iee80211_sta_work just ignores the IEEE80211_MGD_STATE_IDLE, thus it > work item remains forever. > > This breaks scanning, since __ieee80211_start_scan will refuses to run > until, ifmgd->work_list is empty. That's intentional, that work item represents the authentication state we still have -- the required cleanup should be done by cfg80211 or wpa_supplicant. Can you try to figure out what the parameters are that wpa_drv_deauthenticate() is sending to the kernel, and why it's getting -ENOLINK? johannes
Attachment:
signature.asc
Description: This is a digitally signed message part