* [PATCH] mac80211: fix SME warning by removing stale BSS upon assoc failure @ 2009-10-14 0:50 Luis R. Rodriguez 2009-10-14 23:28 ` Johannes Berg 0 siblings, 1 reply; 10+ messages in thread From: Luis R. Rodriguez @ 2009-10-14 0:50 UTC (permalink / raw) To: linville; +Cc: linux-wireless, Luis R. Rodriguez, ic.felix, Johannes Berg If you try to authenticate with an AP we will keep track of the AP's BSS and expect to eventually either give up on the AP or complete an association cycle with it. If an AP rejects our association though mac80211 currently insists on telling cfg80211 a BSS authenticated correctly, this is wrong as it leaves a bogus BSS lingering around. When this happens you can get from userspace stale APs as follows: mcgrof@tesla ~ $ iw dev wlan0 link Authenticated with <BSS-MAC-address-01> (on wlan0) Authenticated with <BSS-MAC-address-02> (on wlan0) Not connected. We fix this by telling cfg80211 it needs to deauthenticate from the BSS if an association is rejected by an AP on mac80211. >From the looks of it this was just a typo. This fixes the cfg80211 SME warning for me: http://kerneloops.org/guilty.php?guilty=__cfg80211_disconnected&version=2.6.32-rc&start=2097152&end=2129919&class=warn wlan0: deauthenticating from <BSS-mac-address-03> by local choice (reason=3) ------------[ cut here ]------------ WARNING: at net/wireless/sme.c:620 __cfg80211_disconnected+0x20c/0x220 [cfg80211]() Hardware name: 7660A14 deauth failed: -67 Modules linked in: ath5k mac80211 ath cfg80211 <etc> Pid: 2930, comm: wpa_supplicant Tainted: G W 2.6.32-rc4-wl #12 Call Trace: [<fc0da43c>] ? __cfg80211_disconnected+0x20c/0x220 [cfg80211] [<fc0da43c>] ? __cfg80211_disconnected+0x20c/0x220 [cfg80211] [<c0142cfc>] warn_slowpath_common+0x6c/0xc0 [<fc0da43c>] ? __cfg80211_disconnected+0x20c/0x220 [cfg80211] [<c0142d96>] warn_slowpath_fmt+0x26/0x30 [<fc0da43c>] __cfg80211_disconnected+0x20c/0x220 [cfg80211] [<fc0d7201>] ? nl80211_send_deauth+0x21/0x30 [cfg80211] [<fc0d83c2>] __cfg80211_send_deauth+0x1b2/0x250 [cfg80211] [<c0493d2d>] ? __alloc_skb+0x4d/0x130 [<fc78804a>] ieee80211_send_deauth_disassoc+0x11a/0x170 [mac80211] [<fc789587>] ieee80211_mgd_deauth+0xf7/0x110 [mac80211] [<fc78f396>] ieee80211_deauth+0x16/0x20 [mac80211] [<fc0d7616>] __cfg80211_mlme_deauth+0xd6/0x110 [cfg80211] [<fc0daada>] __cfg80211_disconnect+0x15a/0x1b0 [cfg80211] [<fc0dd5a5>] cfg80211_wext_siwmlme+0x75/0x80 [cfg80211] [<c054ef4c>] ioctl_standard_call+0x16c/0x360 [<c049dd1d>] ? __dev_get_by_name+0x7d/0xa0 [<c049dd1d>] ? __dev_get_by_name+0x7d/0xa0 [<c054ea28>] wext_handle_ioctl+0x188/0x190 [<fc0dd530>] ? cfg80211_wext_siwmlme+0x0/0x80 [cfg80211] [<c049e887>] dev_ioctl+0x467/0x530 [<c048ca50>] ? sock_ioctl+0x0/0x260 [<c048cb3d>] sock_ioctl+0xed/0x260 [<c048ca50>] ? sock_ioctl+0x0/0x260 [<c01fd1e8>] vfs_ioctl+0x28/0x90 [<c01fd39a>] do_vfs_ioctl+0x6a/0x5f0 [<c010a8cc>] ? restore_i387_xstate+0x10c/0x200 [<c02d715f>] ? security_file_permission+0xf/0x20 [<c01ef3c4>] ? rw_verify_area+0x54/0xd0 [<c01efbfd>] ? vfs_read+0x17d/0x190 [<c0102332>] ? restore_sigcontext+0xc2/0xe0 [<c01fd983>] sys_ioctl+0x63/0x70 [<c010301c>] sysenter_do_call+0x12/0x28 ---[ end trace e43f356f9c17e54c ]--- Cc: ic.felix@gmail.com Cc: Johannes Berg <johannes@sipsolutions.net> Signed-off-by: Luis R. Rodriguez <lrodriguez@atheros.com> diff --git a/net/mac80211/mlme.c b/net/mac80211/mlme.c index 33a696f..a884672 100644 --- a/net/mac80211/mlme.c +++ b/net/mac80211/mlme.c @@ -1463,11 +1463,11 @@ ieee80211_rx_mgmt_assoc_resp(struct ieee80211_sub_if_data *sdata, if (status_code != WLAN_STATUS_SUCCESS) { printk(KERN_DEBUG "%s: AP denied association (code=%d)\n", sdata->dev->name, status_code); list_del(&wk->list); kfree(wk); - return RX_MGMT_CFG80211_ASSOC; + return RX_MGMT_CFG80211_DEAUTH; } if ((aid & (BIT(15) | BIT(14))) != (BIT(15) | BIT(14))) printk(KERN_DEBUG "%s: invalid aid value %d; bits 15:14 not " "set\n", sdata->dev->name, aid); -- 1.6.0.4 ^ permalink raw reply related [flat|nested] 10+ messages in thread
* Re: [PATCH] mac80211: fix SME warning by removing stale BSS upon assoc failure 2009-10-14 0:50 [PATCH] mac80211: fix SME warning by removing stale BSS upon assoc failure Luis R. Rodriguez @ 2009-10-14 23:28 ` Johannes Berg 2009-10-14 23:35 ` Luis R. Rodriguez 0 siblings, 1 reply; 10+ messages in thread From: Johannes Berg @ 2009-10-14 23:28 UTC (permalink / raw) To: Luis R. Rodriguez; +Cc: linville, linux-wireless, ic.felix [-- Attachment #1: Type: text/plain, Size: 1029 bytes --] On Tue, 2009-10-13 at 20:50 -0400, Luis R. Rodriguez wrote: > If you try to authenticate with an AP we will keep track of the > AP's BSS and expect to eventually either give up on the AP or complete > an association cycle with it. If an AP rejects our association though > mac80211 currently insists on telling cfg80211 a BSS authenticated > correctly, this is wrong as it leaves a bogus BSS lingering around. But if assoc fails, it _did_ authenticate correctly. > --- a/net/mac80211/mlme.c > +++ b/net/mac80211/mlme.c > @@ -1463,11 +1463,11 @@ ieee80211_rx_mgmt_assoc_resp(struct ieee80211_sub_if_data *sdata, > if (status_code != WLAN_STATUS_SUCCESS) { > printk(KERN_DEBUG "%s: AP denied association (code=%d)\n", > sdata->dev->name, status_code); > list_del(&wk->list); > kfree(wk); > - return RX_MGMT_CFG80211_ASSOC; > + return RX_MGMT_CFG80211_DEAUTH; I'm sure this is correct. Maybe cfg80211 doesn't react properly to getting an assoc frame with non-zero status? johannes [-- Attachment #2: This is a digitally signed message part --] [-- Type: application/pgp-signature, Size: 801 bytes --] ^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [PATCH] mac80211: fix SME warning by removing stale BSS upon assoc failure 2009-10-14 23:28 ` Johannes Berg @ 2009-10-14 23:35 ` Luis R. Rodriguez 2009-10-14 23:38 ` Luis R. Rodriguez 2009-10-16 9:31 ` Johannes Berg 0 siblings, 2 replies; 10+ messages in thread From: Luis R. Rodriguez @ 2009-10-14 23:35 UTC (permalink / raw) To: Johannes Berg Cc: Luis Rodriguez, linville@tuxdriver.com, linux-wireless@vger.kernel.org, ic.felix@gmail.com On Wed, Oct 14, 2009 at 04:28:15PM -0700, Johannes Berg wrote: > On Tue, 2009-10-13 at 20:50 -0400, Luis R. Rodriguez wrote: > > If you try to authenticate with an AP we will keep track of the > > AP's BSS and expect to eventually either give up on the AP or complete > > an association cycle with it. If an AP rejects our association though > > mac80211 currently insists on telling cfg80211 a BSS authenticated > > correctly, this is wrong as it leaves a bogus BSS lingering around. > > But if assoc fails, it _did_ authenticate correctly. Well sure, but why do we want to keep the authentication present if association failed? And as a matter of fact it lingers there forever. Is that desired behaviour? > > --- a/net/mac80211/mlme.c > > +++ b/net/mac80211/mlme.c > > @@ -1463,11 +1463,11 @@ ieee80211_rx_mgmt_assoc_resp(struct ieee80211_sub_if_data *sdata, > > if (status_code != WLAN_STATUS_SUCCESS) { > > printk(KERN_DEBUG "%s: AP denied association (code=%d)\n", > > sdata->dev->name, status_code); > > list_del(&wk->list); > > kfree(wk); > > - return RX_MGMT_CFG80211_ASSOC; > > + return RX_MGMT_CFG80211_DEAUTH; > > I'm sure this is correct. Maybe cfg80211 doesn't react properly to > getting an assoc frame with non-zero status? I see, will have to take a look when I get a chance then, not now though. Luis ^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [PATCH] mac80211: fix SME warning by removing stale BSS upon assoc failure 2009-10-14 23:35 ` Luis R. Rodriguez @ 2009-10-14 23:38 ` Luis R. Rodriguez 2009-10-16 9:31 ` Johannes Berg 1 sibling, 0 replies; 10+ messages in thread From: Luis R. Rodriguez @ 2009-10-14 23:38 UTC (permalink / raw) To: Luis Rodriguez Cc: Johannes Berg, linville@tuxdriver.com, linux-wireless@vger.kernel.org, ic.felix@gmail.com On Wed, Oct 14, 2009 at 04:35:28PM -0700, Luis Rodriguez wrote: > > > --- a/net/mac80211/mlme.c > > > +++ b/net/mac80211/mlme.c > > > @@ -1463,11 +1463,11 @@ ieee80211_rx_mgmt_assoc_resp(struct ieee80211_sub_if_data *sdata, > > > if (status_code != WLAN_STATUS_SUCCESS) { > > > printk(KERN_DEBUG "%s: AP denied association (code=%d)\n", > > > sdata->dev->name, status_code); > > > list_del(&wk->list); > > > kfree(wk); > > > - return RX_MGMT_CFG80211_ASSOC; > > > + return RX_MGMT_CFG80211_DEAUTH; > > > > I'm sure this is correct. Maybe cfg80211 doesn't react properly to > > getting an assoc frame with non-zero status? > > I see, will have to take a look when I get a chance then, not now though. Actually can you elaborate a little on the logic here as to why we want to issue an association command with non-zero status to cfg80211 instead of just knocking off the current authentication and killing the BSS? Luis ^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [PATCH] mac80211: fix SME warning by removing stale BSS upon assoc failure 2009-10-14 23:35 ` Luis R. Rodriguez 2009-10-14 23:38 ` Luis R. Rodriguez @ 2009-10-16 9:31 ` Johannes Berg 2009-10-16 18:20 ` John W. Linville 2009-10-17 9:40 ` Luis R. Rodriguez 1 sibling, 2 replies; 10+ messages in thread From: Johannes Berg @ 2009-10-16 9:31 UTC (permalink / raw) To: Luis R. Rodriguez Cc: Luis Rodriguez, linville@tuxdriver.com, linux-wireless@vger.kernel.org, ic.felix@gmail.com [-- Attachment #1: Type: text/plain, Size: 1494 bytes --] On Wed, 2009-10-14 at 16:35 -0700, Luis R. Rodriguez wrote: > Well sure, but why do we want to keep the authentication present if > association failed? And as a matter of fact it lingers there forever. > Is that desired behaviour? Yes, well, the SME is supposed to clean it up or try the association again (possibly with different parameters in the IEs, e.g. different WPA settings). The cfg80211 SME certainly does so (it deauthenticates). > > > +++ b/net/mac80211/mlme.c > > > @@ -1463,11 +1463,11 @@ ieee80211_rx_mgmt_assoc_resp(struct ieee80211_sub_if_data *sdata, > > > if (status_code != WLAN_STATUS_SUCCESS) { > > > printk(KERN_DEBUG "%s: AP denied association (code=%d)\n", > > > sdata->dev->name, status_code); > > > list_del(&wk->list); > > > kfree(wk); > > > - return RX_MGMT_CFG80211_ASSOC; > > > + return RX_MGMT_CFG80211_DEAUTH; > > > > I'm sure this is correct. Maybe cfg80211 doesn't react properly to > > getting an assoc frame with non-zero status? > > I see, will have to take a look when I get a chance then, not now though. > Actually can you elaborate a little on the logic here as to why > we want to issue an association command with non-zero status to > cfg80211 instead of just knocking off the current authentication > and killing the BSS? Is the above sufficient? Btw, please don't talk about "killing the BSS", you're not talking about a BSS struct but rather one of the mlme work structs. johannes [-- Attachment #2: This is a digitally signed message part --] [-- Type: application/pgp-signature, Size: 801 bytes --] ^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [PATCH] mac80211: fix SME warning by removing stale BSS upon assoc failure 2009-10-16 9:31 ` Johannes Berg @ 2009-10-16 18:20 ` John W. Linville 2009-10-17 0:28 ` Johannes Berg 2009-10-19 16:37 ` ASIC Felix 2009-10-17 9:40 ` Luis R. Rodriguez 1 sibling, 2 replies; 10+ messages in thread From: John W. Linville @ 2009-10-16 18:20 UTC (permalink / raw) To: Johannes Berg Cc: Luis R. Rodriguez, Luis Rodriguez, linux-wireless@vger.kernel.org, ic.felix@gmail.com On Fri, Oct 16, 2009 at 06:31:32PM +0900, Johannes Berg wrote: > On Wed, 2009-10-14 at 16:35 -0700, Luis R. Rodriguez wrote: > > > Well sure, but why do we want to keep the authentication present if > > association failed? And as a matter of fact it lingers there forever. > > Is that desired behaviour? > > Yes, well, the SME is supposed to clean it up or try the association > again (possibly with different parameters in the IEs, e.g. different WPA > settings). The cfg80211 SME certainly does so (it deauthenticates). > > > > > +++ b/net/mac80211/mlme.c > > > > @@ -1463,11 +1463,11 @@ ieee80211_rx_mgmt_assoc_resp(struct ieee80211_sub_if_data *sdata, > > > > if (status_code != WLAN_STATUS_SUCCESS) { > > > > printk(KERN_DEBUG "%s: AP denied association (code=%d)\n", > > > > sdata->dev->name, status_code); > > > > list_del(&wk->list); > > > > kfree(wk); > > > > - return RX_MGMT_CFG80211_ASSOC; > > > > + return RX_MGMT_CFG80211_DEAUTH; > > > > > > I'm sure this is correct. Maybe cfg80211 doesn't react properly to > > > getting an assoc frame with non-zero status? > > > > I see, will have to take a look when I get a chance then, not now though. > > > Actually can you elaborate a little on the logic here as to why > > we want to issue an association command with non-zero status to > > cfg80211 instead of just knocking off the current authentication > > and killing the BSS? > > Is the above sufficient? Btw, please don't talk about "killing the BSS", > you're not talking about a BSS struct but rather one of the mlme work > structs. So, should this patch be dropped? It is currently in w-t... John -- John W. Linville Someday the world will need a hero, and you linville@tuxdriver.com might be all we have. Be ready. ^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [PATCH] mac80211: fix SME warning by removing stale BSS upon assoc failure 2009-10-16 18:20 ` John W. Linville @ 2009-10-17 0:28 ` Johannes Berg 2009-10-17 9:44 ` Luis R. Rodriguez 2009-10-19 16:37 ` ASIC Felix 1 sibling, 1 reply; 10+ messages in thread From: Johannes Berg @ 2009-10-17 0:28 UTC (permalink / raw) To: John W. Linville Cc: Luis R. Rodriguez, Luis Rodriguez, linux-wireless@vger.kernel.org, ic.felix@gmail.com [-- Attachment #1: Type: text/plain, Size: 1828 bytes --] On Fri, 2009-10-16 at 14:20 -0400, John W. Linville wrote: > On Fri, Oct 16, 2009 at 06:31:32PM +0900, Johannes Berg wrote: > > On Wed, 2009-10-14 at 16:35 -0700, Luis R. Rodriguez wrote: > > > > > Well sure, but why do we want to keep the authentication present if > > > association failed? And as a matter of fact it lingers there forever. > > > Is that desired behaviour? > > > > Yes, well, the SME is supposed to clean it up or try the association > > again (possibly with different parameters in the IEs, e.g. different WPA > > settings). The cfg80211 SME certainly does so (it deauthenticates). > > > > > > > +++ b/net/mac80211/mlme.c > > > > > @@ -1463,11 +1463,11 @@ ieee80211_rx_mgmt_assoc_resp(struct ieee80211_sub_if_data *sdata, > > > > > if (status_code != WLAN_STATUS_SUCCESS) { > > > > > printk(KERN_DEBUG "%s: AP denied association (code=%d)\n", > > > > > sdata->dev->name, status_code); > > > > > list_del(&wk->list); > > > > > kfree(wk); > > > > > - return RX_MGMT_CFG80211_ASSOC; > > > > > + return RX_MGMT_CFG80211_DEAUTH; > > > > > > > > I'm sure this is correct. Maybe cfg80211 doesn't react properly to > > > > getting an assoc frame with non-zero status? > > > > > > I see, will have to take a look when I get a chance then, not now though. > > > > > Actually can you elaborate a little on the logic here as to why > > > we want to issue an association command with non-zero status to > > > cfg80211 instead of just knocking off the current authentication > > > and killing the BSS? > > > > Is the above sufficient? Btw, please don't talk about "killing the BSS", > > you're not talking about a BSS struct but rather one of the mlme work > > structs. > > So, should this patch be dropped? It is currently in w-t... Yes. johannes [-- Attachment #2: This is a digitally signed message part --] [-- Type: application/pgp-signature, Size: 801 bytes --] ^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [PATCH] mac80211: fix SME warning by removing stale BSS upon assoc failure 2009-10-17 0:28 ` Johannes Berg @ 2009-10-17 9:44 ` Luis R. Rodriguez 0 siblings, 0 replies; 10+ messages in thread From: Luis R. Rodriguez @ 2009-10-17 9:44 UTC (permalink / raw) To: Johannes Berg Cc: John W. Linville, Luis Rodriguez, linux-wireless@vger.kernel.org, ic.felix@gmail.com On Fri, Oct 16, 2009 at 5:28 PM, Johannes Berg <johannes@sipsolutions.net> wrote: > On Fri, 2009-10-16 at 14:20 -0400, John W. Linville wrote: >> On Fri, Oct 16, 2009 at 06:31:32PM +0900, Johannes Berg wrote: >> > On Wed, 2009-10-14 at 16:35 -0700, Luis R. Rodriguez wrote: >> > >> > > Well sure, but why do we want to keep the authentication present if >> > > association failed? And as a matter of fact it lingers there forever. >> > > Is that desired behaviour? >> > >> > Yes, well, the SME is supposed to clean it up or try the association >> > again (possibly with different parameters in the IEs, e.g. different WPA >> > settings). The cfg80211 SME certainly does so (it deauthenticates). >> > >> > > > > +++ b/net/mac80211/mlme.c >> > > > > @@ -1463,11 +1463,11 @@ ieee80211_rx_mgmt_assoc_resp(struct ieee80211_sub_if_data *sdata, >> > > > > if (status_code != WLAN_STATUS_SUCCESS) { >> > > > > printk(KERN_DEBUG "%s: AP denied association (code=%d)\n", >> > > > > sdata->dev->name, status_code); >> > > > > list_del(&wk->list); >> > > > > kfree(wk); >> > > > > - return RX_MGMT_CFG80211_ASSOC; >> > > > > + return RX_MGMT_CFG80211_DEAUTH; >> > > > >> > > > I'm sure this is correct. Maybe cfg80211 doesn't react properly to >> > > > getting an assoc frame with non-zero status? >> > > >> > > I see, will have to take a look when I get a chance then, not now though. >> > >> > > Actually can you elaborate a little on the logic here as to why >> > > we want to issue an association command with non-zero status to >> > > cfg80211 instead of just knocking off the current authentication >> > > and killing the BSS? >> > >> > Is the above sufficient? Btw, please don't talk about "killing the BSS", >> > you're not talking about a BSS struct but rather one of the mlme work >> > structs. >> >> So, should this patch be dropped? It is currently in w-t... > > Yes. This issue is also present on 2.6.32 I believe, I am curious if we'll come up with something as small as this for a fix there. Luis Luis ^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [PATCH] mac80211: fix SME warning by removing stale BSS upon assoc failure 2009-10-16 18:20 ` John W. Linville 2009-10-17 0:28 ` Johannes Berg @ 2009-10-19 16:37 ` ASIC Felix 1 sibling, 0 replies; 10+ messages in thread From: ASIC Felix @ 2009-10-19 16:37 UTC (permalink / raw) To: John W. Linville Cc: Johannes Berg, Luis R. Rodriguez, Luis Rodriguez, linux-wireless@vger.kernel.org On Fri, 2009-10-16 at 14:20 -0400, John W. Linville wrote: > On Fri, Oct 16, 2009 at 06:31:32PM +0900, Johannes Berg wrote: > > On Wed, 2009-10-14 at 16:35 -0700, Luis R. Rodriguez wrote: > > > > > Well sure, but why do we want to keep the authentication present if > > > association failed? And as a matter of fact it lingers there forever. > > > Is that desired behaviour? > > > > Yes, well, the SME is supposed to clean it up or try the association > > again (possibly with different parameters in the IEs, e.g. different WPA > > settings). The cfg80211 SME certainly does so (it deauthenticates). > > > > > > > +++ b/net/mac80211/mlme.c > > > > > @@ -1463,11 +1463,11 @@ ieee80211_rx_mgmt_assoc_resp(struct ieee80211_sub_if_data *sdata, > > > > > if (status_code != WLAN_STATUS_SUCCESS) { > > > > > printk(KERN_DEBUG "%s: AP denied association (code=%d)\n", > > > > > sdata->dev->name, status_code); > > > > > list_del(&wk->list); > > > > > kfree(wk); > > > > > - return RX_MGMT_CFG80211_ASSOC; > > > > > + return RX_MGMT_CFG80211_DEAUTH; > > > > > > > > I'm sure this is correct. Maybe cfg80211 doesn't react properly to > > > > getting an assoc frame with non-zero status? > > > > > > I see, will have to take a look when I get a chance then, not now though. > > > > > Actually can you elaborate a little on the logic here as to why > > > we want to issue an association command with non-zero status to > > > cfg80211 instead of just knocking off the current authentication > > > and killing the BSS? > > > > Is the above sufficient? Btw, please don't talk about "killing the BSS", > > you're not talking about a BSS struct but rather one of the mlme work > > structs. > > So, should this patch be dropped? It is currently in w-t... I'm still running the first w-t kernel with this fix (master-2009-10-14), and haven't seen the sme warning I had been complaining about for the past months, also: no connection drops. Note I have _not_ run performance tests. So this patch affects the sme issue. You guys will know where the correct place is for fixing it. By the way, (master-2009-10-14) is the best kernel for me since about March/April this year. It looks like we're out of the rough again on ath9k&mac80211. Felix ^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [PATCH] mac80211: fix SME warning by removing stale BSS upon assoc failure 2009-10-16 9:31 ` Johannes Berg 2009-10-16 18:20 ` John W. Linville @ 2009-10-17 9:40 ` Luis R. Rodriguez 1 sibling, 0 replies; 10+ messages in thread From: Luis R. Rodriguez @ 2009-10-17 9:40 UTC (permalink / raw) To: Johannes Berg Cc: Luis Rodriguez, linville@tuxdriver.com, linux-wireless@vger.kernel.org, ic.felix@gmail.com On Fri, Oct 16, 2009 at 2:31 AM, Johannes Berg <johannes@sipsolutions.net> wrote: > On Wed, 2009-10-14 at 16:35 -0700, Luis R. Rodriguez wrote: > >> Well sure, but why do we want to keep the authentication present if >> association failed? And as a matter of fact it lingers there forever. >> Is that desired behaviour? > > Yes, well, the SME is supposed to clean it up or try the association > again (possibly with different parameters in the IEs, e.g. different WPA > settings). The cfg80211 SME certainly does so (it deauthenticates). Ok so that's what's busted then it seems. Luis ^ permalink raw reply [flat|nested] 10+ messages in thread
end of thread, other threads:[~2009-10-19 16:37 UTC | newest] Thread overview: 10+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2009-10-14 0:50 [PATCH] mac80211: fix SME warning by removing stale BSS upon assoc failure Luis R. Rodriguez 2009-10-14 23:28 ` Johannes Berg 2009-10-14 23:35 ` Luis R. Rodriguez 2009-10-14 23:38 ` Luis R. Rodriguez 2009-10-16 9:31 ` Johannes Berg 2009-10-16 18:20 ` John W. Linville 2009-10-17 0:28 ` Johannes Berg 2009-10-17 9:44 ` Luis R. Rodriguez 2009-10-19 16:37 ` ASIC Felix 2009-10-17 9:40 ` Luis R. Rodriguez
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).