CFT: wpa_supplicant/hostapd 2.5

Nikolay Denev ndenev at gmail.com
Fri Oct 16 18:37:36 UTC 2015


Done :  https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=203827

--Nikolay

On Fri, Oct 16, 2015 at 8:30 PM, Adrian Chadd <adrian.chadd at gmail.com> wrote:
> Hm, please file a bug with this? having hostapd break with
> net.bpf.zerocopy_enable is (a) bad, but (b) very reproducable. :)
>
>
> -a
>
>
> On 16 October 2015 at 11:25, Nikolay Denev <ndenev at gmail.com> wrote:
>> I've noticed hostapd getting stuck in pcap_next() which led me to
>> check some net.bpf sysctls, as I was running with
>> net.bpf.zerocopy_enable=1.
>> When disabled hostapd works again for multiple clients.
>>
>>
>> --Nikolay
>>
>> On Fri, Oct 16, 2015 at 8:20 PM, Nikolay Denev <ndenev at gmail.com> wrote:
>>> I'm not sure yet if this is related but I've just upgraded to latest
>>> 10-stable from svn and I'm also seeing issues.
>>> Running hostapd in foreground like this : /usr/sbin/hostapd -P
>>> /var/run/hostapd.pid -d /etc/hostapd.conf
>>> I see one client connect and then attempts from other clients time out.
>>> When I give hostapd Ctrl-C I see this:
>>>
>>>   wlan0: AP-STA-CONNECTED 00:bb:3a:03:09:32
>>>   wlan0: STA 00:bb:3a:03:09:32 IEEE 802.1X: authorizing port
>>>   wlan0: STA 00:bb:3a:03:09:32 RADIUS: starting accounting session
>>> 56213F3C-00000000
>>>   wlan0: STA 00:bb:3a:03:09:32 WPA: pairwise key handshake completed (RSN)
>>>
>>>
>>>   ^Celoop: could not process SIGINT or SIGTERM in two seconds. Looks like there
>>>   is a bug that ends up in a busy loop that prevents clean shutdown.
>>>   Killing program forcefully.
>>>
>>> --Nikolay
>>>
>>>
>>>
>>> On Fri, Oct 16, 2015 at 6:12 PM, Adrian Chadd <adrian.chadd at gmail.com> wrote:
>>>> Wait, there's a regression with wifi in -HEAD? What's the deal?
>>>>
>>>>
>>>> -a
>>>>
>>>>
>>>> On 16 October 2015 at 02:21, Olivier Cochard-Labbé <olivier at cochard.me> wrote:
>>>>> On Wed, Oct 14, 2015 at 7:00 AM, Rui Paulo <rpaulo at me.com> wrote:
>>>>>
>>>>>> Hi,
>>>>>>
>>>>>> Please download and test the wpa_supplicant/hostapd import patch:
>>>>>>
>>>>>>         http://people.freebsd.org/~rpaulo/patches/wpa-2.5.diff
>>>>>>
>>>>>>
>>>>>>
>>>>> Your patch were ested with success:
>>>>> - hostapd v2.5
>>>>> - Atheros 9280 (ath) in hostapd mode (WPA2-EAP/TLS using a RADIUS)
>>>>> - FreeBSD 11.0-CURRENT r283534
>>>>>
>>>>> (I meet problem with ath in hostap mode on more recent -head: clients
>>>>> can't authenticate, but need time for bisec the exact commit that create
>>>>> this regression)
>>>>>
>>>>> Regards,
>>>>> _______________________________________________
>>>>> freebsd-current at freebsd.org mailing list
>>>>> https://lists.freebsd.org/mailman/listinfo/freebsd-current
>>>>> To unsubscribe, send any mail to "freebsd-current-unsubscribe at freebsd.org"
>>>> _______________________________________________
>>>> freebsd-current at freebsd.org mailing list
>>>> https://lists.freebsd.org/mailman/listinfo/freebsd-current
>>>> To unsubscribe, send any mail to "freebsd-current-unsubscribe at freebsd.org"


More information about the freebsd-current mailing list