* [PATCH] wifi: mac80211: fix monitor mode frame capture for real chanctx drivers
@ 2026-03-08 16:45 傅继晗
2026-03-09 6:53 ` Johannes Berg
0 siblings, 1 reply; 21+ messages in thread
From: 傅继晗 @ 2026-03-08 16:45 UTC (permalink / raw)
To: johannes; +Cc: linux-wireless, linux-kernel, stable, 傅继晗
Commit 0a44dfc07074 ("wifi: mac80211: simplify non-chanctx drivers")
removed the fallback path in ieee80211_monitor_start_xmit() for when
the monitor interface has no channel context assigned. This broke frame
capture and injection for drivers that implement real channel context
ops (as opposed to the ieee80211_emulate_* helpers), such as the mt76
family, when a monitor interface runs alongside another interface
(e.g. managed mode).
In that scenario the (virtual) monitor sdata does not get a chanctx of
its own, even though there is an active one from the other interface.
Before the simplification the code fell back to local->_oper_chandef;
after it, the code goes straight to fail_rcu and silently drops every
injected frame.
Commit d594cc6f2c58 ("wifi: mac80211: restore non-chanctx injection
behaviour") restored the fallback for drivers using emulate_chanctx,
but explicitly left real chanctx drivers unfixed.
Fix this by falling back to the first entry in local->chanctx_list
when the monitor vif has no chanctx and the driver uses real channel
contexts. This is analogous to how ieee80211_hw_conf_chan() already
uses the same pattern.
Tested on MT7921AU (mt76) USB adapter:
- v6.13: managed + monitor coexistence restored (0 -> 37 frames/5s)
- v6.19: managed + monitor coexistence restored (0 -> 39 frames/5s)
- v7.0-rc2: managed + monitor coexistence restored (0 -> 33 frames/5s)
Cc: stable@vger.kernel.org
Fixes: 0a44dfc07074 ("wifi: mac80211: simplify non-chanctx drivers")
Link: https://github.com/morrownr/USB-WiFi/issues/682
Signed-off-by: 傅继晗 <fjhhz1997@gmail.com>
---
net/mac80211/tx.c | 24 ++++++++++++++++++++----
1 file changed, 20 insertions(+), 4 deletions(-)
diff --git a/net/mac80211/tx.c b/net/mac80211/tx.c
index 8cdbd41..56eaf9a 100644
--- a/net/mac80211/tx.c
+++ b/net/mac80211/tx.c
@@ -2396,12 +2396,28 @@ netdev_tx_t ieee80211_monitor_start_xmit(struct sk_buff *skb,
rcu_dereference(tmp_sdata->vif.bss_conf.chanctx_conf);
}
- if (chanctx_conf)
+ if (chanctx_conf) {
chandef = &chanctx_conf->def;
- else if (local->emulate_chanctx)
+ } else if (local->emulate_chanctx) {
chandef = &local->hw.conf.chandef;
- else
- goto fail_rcu;
+ } else {
+ /*
+ * For real chanctx drivers (e.g. mt76), the monitor
+ * interface may not have a chanctx assigned when running
+ * concurrently with another interface. Fall back to any
+ * active chanctx so that injection can still work on the
+ * operating channel.
+ */
+ struct ieee80211_chanctx *ctx;
+
+ ctx = list_first_entry_or_null(&local->chanctx_list,
+ struct ieee80211_chanctx,
+ list);
+ if (ctx)
+ chandef = &ctx->conf.def;
+ else
+ goto fail_rcu;
+ }
/*
* If driver/HW supports IEEE80211_CHAN_CAN_MONITOR we still
--
2.43.0
^ permalink raw reply related [flat|nested] 21+ messages in thread* Re: [PATCH] wifi: mac80211: fix monitor mode frame capture for real chanctx drivers 2026-03-08 16:45 [PATCH] wifi: mac80211: fix monitor mode frame capture for real chanctx drivers 傅继晗 @ 2026-03-09 6:53 ` Johannes Berg 2026-03-09 10:45 ` 傅继晗 0 siblings, 1 reply; 21+ messages in thread From: Johannes Berg @ 2026-03-09 6:53 UTC (permalink / raw) To: 傅继晗 Cc: linux-wireless, linux-kernel, stable, Óscar Alfonso Díaz On Sun, 2026-03-08 at 16:45 +0000, 傅继晗 wrote: > Commit 0a44dfc07074 ("wifi: mac80211: simplify non-chanctx drivers") > removed the fallback path in ieee80211_monitor_start_xmit() for when > the monitor interface has no channel context assigned. This broke frame > capture and injection for drivers that implement real channel context > ops (as opposed to the ieee80211_emulate_* helpers), such as the mt76 > family, when a monitor interface runs alongside another interface > (e.g. managed mode). It actually broke the others too, as you note later. > In that scenario the (virtual) monitor sdata does not get a chanctx of > its own, even though there is an active one from the other interface. > Before the simplification the code fell back to local->_oper_chandef; > after it, the code goes straight to fail_rcu and silently drops every > injected frame. > > Commit d594cc6f2c58 ("wifi: mac80211: restore non-chanctx injection > behaviour") restored the fallback for drivers using emulate_chanctx, > but explicitly left real chanctx drivers unfixed. > > Fix this by falling back to the first entry in local->chanctx_list > when the monitor vif has no chanctx and the driver uses real channel > contexts. This is analogous to how ieee80211_hw_conf_chan() already > uses the same pattern. I did have pretty much the same attempt at a fix: https://lore.kernel.org/linux-wireless/20251216111909.25076-2-johannes@sipsolutions.net/ but it was reported to cause crashes on certain devices, so we didn't think it was very safe at the time. Is that no longer an issue? johannes ^ permalink raw reply [flat|nested] 21+ messages in thread
* Re: [PATCH] wifi: mac80211: fix monitor mode frame capture for real chanctx drivers 2026-03-09 6:53 ` Johannes Berg @ 2026-03-09 10:45 ` 傅继晗 2026-03-16 10:38 ` Johannes Berg 0 siblings, 1 reply; 21+ messages in thread From: 傅继晗 @ 2026-03-09 10:45 UTC (permalink / raw) To: johannes Cc: linux-wireless, linux-kernel, stable, oscar.alfonso.diaz, 傅继晗 On Sun, 2026-03-08 at 16:45 +0000, 傅继晗 wrote: > Fix this by falling back to the first entry in local->chanctx_list > when the monitor vif has no chanctx and the driver uses real channel > contexts. This is analogous to how ieee80211_hw_conf_chan() already > uses the same pattern. On Mon, 2026-03-09, Johannes Berg wrote: > I did have pretty much the same attempt at a fix: > https://lore.kernel.org/linux-wireless/20251216111909.25076-2-johannes@sipsolutions.net/ > > but it was reported to cause crashes on certain devices, so we didn't > think it was very safe at the time. > > Is that no longer an issue? Hi Johannes, Thanks for the quick review and for pointing me to your earlier v2 patch. I see the key difference between our approaches: your v2 iterates the chanctx_list and only proceeds when there is exactly one entry (going to fail_rcu if more than one exists), while mine blindly takes the first entry via list_first_entry_or_null(). Your approach is clearly safer -- in a multi-chanctx scenario, there is no way to know which channel the user intends to inject on, so refusing is the correct behaviour. I have tested my patch on an MT7921AU (mt76, USB) adapter across v6.13, v6.19, and v7.0-rc2 with managed + monitor coexistence, and have not observed any crashes. However, my testing was limited to a single-chanctx scenario (one managed interface + one monitor interface), so it does not rule out crashes in multi-chanctx configurations. Could you share some details about the crashes that were reported with your v2? For example, which devices/drivers were affected and what the crash signature looked like? That would help me understand whether the issue was specific to multi-chanctx usage or something more fundamental with accessing the chanctx_list in this code path. If you agree, I would like to send a v2 that combines both approaches: use list_first_entry_or_null() for simplicity, but add a list_is_singular() guard so we only proceed when there is exactly one chanctx -- matching the safety constraint from your v2: --- a/net/mac80211/tx.c +++ b/net/mac80211/tx.c @@ -2399,10 +2399,24 @@ - if (chanctx_conf) + if (chanctx_conf) { chandef = &chanctx_conf->def; - else if (local->emulate_chanctx) + } else if (local->emulate_chanctx) { chandef = &local->hw.conf.chandef; - else - goto fail_rcu; + } else { + struct ieee80211_chanctx *ctx; + + ctx = list_first_entry_or_null(&local->chanctx_list, + struct ieee80211_chanctx, + list); + if (ctx && list_is_singular(&local->chanctx_list)) + chandef = &ctx->conf.def; + else + goto fail_rcu; + } This avoids the ambiguity of picking an arbitrary chanctx in multi-chanctx scenarios while still fixing the common single-chanctx case (e.g. one managed + one monitor interface). Alternatively, if you would prefer to revive your own patch, I am happy to help test it on mt76 hardware. Thanks, Jihan ^ permalink raw reply [flat|nested] 21+ messages in thread
* Re: [PATCH] wifi: mac80211: fix monitor mode frame capture for real chanctx drivers 2026-03-09 10:45 ` 傅继晗 @ 2026-03-16 10:38 ` Johannes Berg [not found] ` <CA+bbHrX+xby2_drzo0457raoz-kgQ6eTCCHU91pR5BkvzMiq_A@mail.gmail.com> 0 siblings, 1 reply; 21+ messages in thread From: Johannes Berg @ 2026-03-16 10:38 UTC (permalink / raw) To: 傅继晗 Cc: linux-wireless, linux-kernel, stable, oscar.alfonso.diaz On Mon, 2026-03-09 at 10:45 +0000, 傅继晗 wrote: > > I see the key difference between our approaches: your v2 iterates > the chanctx_list and only proceeds when there is exactly one entry > (going to fail_rcu if more than one exists), while mine blindly takes > the first entry via list_first_entry_or_null(). Your approach is > clearly safer -- in a multi-chanctx scenario, there is no way to know > which channel the user intends to inject on, so refusing is the > correct behaviour. Oh, right, I hadn't even realised that at first. > I have tested my patch on an MT7921AU (mt76, USB) adapter across > v6.13, v6.19, and v7.0-rc2 with managed + monitor coexistence, and > have not observed any crashes. However, my testing was limited to a > single-chanctx scenario (one managed interface + one monitor > interface), so it does not rule out crashes in multi-chanctx > configurations. Maybe Óscar can comment on which device/version he tested and got the crash with? I just would like to avoid having crashes because of this, but generally think that - perhaps optionally - we could have code like this, since people _do_ want injection to work. > Could you share some details about the crashes that were reported > with your v2? For example, which devices/drivers were affected and > what the crash signature looked like? That would help me understand > whether the issue was specific to multi-chanctx usage or something > more fundamental with accessing the chanctx_list in this code path. No, it was specific to some driver implementation, but I don't have any more information now. > If you agree, I would like to send a v2 that combines both approaches: > use list_first_entry_or_null() for simplicity, but add a > list_is_singular() guard so we only proceed when there is exactly one > chanctx -- matching the safety constraint from your v2: > > --- a/net/mac80211/tx.c > +++ b/net/mac80211/tx.c > @@ -2399,10 +2399,24 @@ > - if (chanctx_conf) > + if (chanctx_conf) { > chandef = &chanctx_conf->def; > - else if (local->emulate_chanctx) > + } else if (local->emulate_chanctx) { > chandef = &local->hw.conf.chandef; > - else > - goto fail_rcu; > + } else { > + struct ieee80211_chanctx *ctx; > + > + ctx = list_first_entry_or_null(&local->chanctx_list, > + struct ieee80211_chanctx, > + list); > + if (ctx && list_is_singular(&local->chanctx_list)) > + chandef = &ctx->conf.def; > + else > + goto fail_rcu; > + } > > This avoids the ambiguity of picking an arbitrary chanctx in > multi-chanctx scenarios while still fixing the common single-chanctx > case (e.g. one managed + one monitor interface). Seems reasonable, I think we could even drop the "if (emulate) part (since in that case the list should always be singular). Just like I said above - would like to understand the issue that had appeared with it. johannes ^ permalink raw reply [flat|nested] 21+ messages in thread
[parent not found: <CA+bbHrX+xby2_drzo0457raoz-kgQ6eTCCHU91pR5BkvzMiq_A@mail.gmail.com>]
* Re: [PATCH] wifi: mac80211: fix monitor mode frame capture for real chanctx drivers [not found] ` <CA+bbHrX+xby2_drzo0457raoz-kgQ6eTCCHU91pR5BkvzMiq_A@mail.gmail.com> @ 2026-03-19 11:40 ` Óscar Alfonso Díaz 2026-03-25 0:15 ` 傅继晗 0 siblings, 1 reply; 21+ messages in thread From: Óscar Alfonso Díaz @ 2026-03-19 11:40 UTC (permalink / raw) To: Johannes Berg Cc: 傅继晗, linux-wireless, linux-kernel, stable Hi, I've sent earlier an email to show on screenshots the results of my testing but it was rejected as the email distribution lists just support plaintext emails. So I'm sending it again this time explaining the results without the visual proof. I was testing this patch using Mediatek MT7921U chipset: https://lore.kernel.org/linux-wireless/20260308164510.5927-1-fjhhz1997@gmail.com/raw It didn't work properly. The test consisted in split the Mediatek adapter into two adapters (enabling VIF), and then try injection using a test aireplay command: iw phy phy3 interface add mon0 type monitor ip link set mon0 up aireplay-ng -9 Apart of that test, I also tested it creating an Evil Twin attack using VIF feature and trying DoS at the same time as creating an AP. On Mediatek, with the patched kernel, the test resulted in a totally hang of the Kali VM Let me know if I can help further or test another patch. Thanks and regards. -- Oscar OpenPGP Key: DA9C60E9 || https://pgp.mit.edu/pks/lookup?op=get&search=0x79B17260DA9C60E9 4F74 B302 354D 817D DE38 0A43 79B1 7260 DA9C 60E9 -- El jue, 19 mar 2026 a las 12:30, Óscar Alfonso Díaz (<oscar.alfonso.diaz@gmail.com>) escribió: > > Hello, I was testing this patch using Mediatek MT7921U chipset: > > https://lore.kernel.org/linux-wireless/20260308164510.5927-1-fjhhz1997@gmail.com/raw > > It didn't work properly: > > > > As you know, expected result is like this: > > > > Note the difference from the first screenshot, kernel is custom compiled 6.18.12 and the second one is the default kali linux 6.18.12 (6.18.12+kali-amd64) and using a non-Mediatek chipset to show that how it should be when it works correctly. > > Apart of the test of the screenshots, I also tested it creating an Evil Twin attack using VIF feature and trying DoS at the same time as creating an AP. On Mediatek, with the patched kernel, the test resulted in a totally hang of the Kali VM > > Let me know if I can help further or test another patch. > > Thanks and regards. > -- > Oscar > > OpenPGP Key: DA9C60E9 || https://pgp.mit.edu/pks/lookup?op=get&search=0x79B17260DA9C60E9 > 4F74 B302 354D 817D DE38 0A43 79B1 7260 DA9C 60E9 > -- > > > El lun, 16 mar 2026 a las 11:38, Johannes Berg (<johannes@sipsolutions.net>) escribió: >> >> On Mon, 2026-03-09 at 10:45 +0000, 傅继晗 wrote: >> > >> > I see the key difference between our approaches: your v2 iterates >> > the chanctx_list and only proceeds when there is exactly one entry >> > (going to fail_rcu if more than one exists), while mine blindly takes >> > the first entry via list_first_entry_or_null(). Your approach is >> > clearly safer -- in a multi-chanctx scenario, there is no way to know >> > which channel the user intends to inject on, so refusing is the >> > correct behaviour. >> >> Oh, right, I hadn't even realised that at first. >> >> > I have tested my patch on an MT7921AU (mt76, USB) adapter across >> > v6.13, v6.19, and v7.0-rc2 with managed + monitor coexistence, and >> > have not observed any crashes. However, my testing was limited to a >> > single-chanctx scenario (one managed interface + one monitor >> > interface), so it does not rule out crashes in multi-chanctx >> > configurations. >> >> Maybe Óscar can comment on which device/version he tested and got the >> crash with? I just would like to avoid having crashes because of this, >> but generally think that - perhaps optionally - we could have code like >> this, since people _do_ want injection to work. >> >> > Could you share some details about the crashes that were reported >> > with your v2? For example, which devices/drivers were affected and >> > what the crash signature looked like? That would help me understand >> > whether the issue was specific to multi-chanctx usage or something >> > more fundamental with accessing the chanctx_list in this code path. >> >> No, it was specific to some driver implementation, but I don't have any >> more information now. >> >> > If you agree, I would like to send a v2 that combines both approaches: >> > use list_first_entry_or_null() for simplicity, but add a >> > list_is_singular() guard so we only proceed when there is exactly one >> > chanctx -- matching the safety constraint from your v2: >> > >> > --- a/net/mac80211/tx.c >> > +++ b/net/mac80211/tx.c >> > @@ -2399,10 +2399,24 @@ >> > - if (chanctx_conf) >> > + if (chanctx_conf) { >> > chandef = &chanctx_conf->def; >> > - else if (local->emulate_chanctx) >> > + } else if (local->emulate_chanctx) { >> > chandef = &local->hw.conf.chandef; >> > - else >> > - goto fail_rcu; >> > + } else { >> > + struct ieee80211_chanctx *ctx; >> > + >> > + ctx = list_first_entry_or_null(&local->chanctx_list, >> > + struct ieee80211_chanctx, >> > + list); >> > + if (ctx && list_is_singular(&local->chanctx_list)) >> > + chandef = &ctx->conf.def; >> > + else >> > + goto fail_rcu; >> > + } >> > >> > This avoids the ambiguity of picking an arbitrary chanctx in >> > multi-chanctx scenarios while still fixing the common single-chanctx >> > case (e.g. one managed + one monitor interface). >> >> Seems reasonable, I think we could even drop the "if (emulate) part >> (since in that case the list should always be singular). Just like I >> said above - would like to understand the issue that had appeared with >> it. >> >> johannes ^ permalink raw reply [flat|nested] 21+ messages in thread
* Re: [PATCH] wifi: mac80211: fix monitor mode frame capture for real chanctx drivers 2026-03-19 11:40 ` Óscar Alfonso Díaz @ 2026-03-25 0:15 ` 傅继晗 2026-03-25 10:59 ` Óscar Alfonso Díaz 0 siblings, 1 reply; 21+ messages in thread From: 傅继晗 @ 2026-03-25 0:15 UTC (permalink / raw) To: oscar.alfonso.diaz Cc: 傅继晗, johannes, linux-wireless, linux-kernel, stable Hi Oscar, Thank you for testing the v1 patch and reporting the VM hang -- your report was critical in identifying the root cause. Lucid-Duck did extensive debugging and reproduction work on this. The full discussion is here: https://github.com/morrownr/USB-WiFi/issues/682#issuecomment-4120751621 Root cause of the crash: The v1 patch falls back to list_first_entry_or_null(&local->chanctx_list) when the monitor vif has no chanctx. In your Evil Twin + DoS scenario, the AP and monitor interfaces created multiple channel contexts. The fallback blindly grabbed whichever chanctx was first on the list -- which could be the AP's chanctx that the firmware wasn't expecting monitor traffic on. Injecting frames on a chanctx where mt7921_mcu_config_sniffer() was never called is the likely trigger for the hard hang. The v2 patch adds a list_is_singular() guard: injection only proceeds when there is exactly one chanctx (unambiguous), and is refused when multiple chanctxs exist. This covers the common single-channel AP + monitor case while preventing the dangerous multi-chanctx path that caused your crash. Lucid-Duck tested v2 extensively on kernel 6.19.8 with the MT7921AU (ALFA AWUS036AXML) -- single-channel AP + monitor + injection, multi-chanctx via P2P-GO, heavy load injection floods (50k fps, 1.8M packets) -- all stable with zero crashes or kernel warnings. The v2 diff against net/mac80211/tx.c: chanctx_conf = rcu_dereference(sdata->vif.bss_conf.chanctx_conf); - if (chanctx_conf) + if (chanctx_conf) { chandef = &chanctx_conf->def; - else if (local->emulate_chanctx) + } else if (local->emulate_chanctx) { chandef = &local->hw.conf.chandef; - else - goto fail_rcu; + } else { + struct ieee80211_chanctx *ctx; + + ctx = list_first_entry_or_null(&local->chanctx_list, + struct ieee80211_chanctx, + list); + if (ctx && list_is_singular(&local->chanctx_list)) + chandef = &ctx->conf.def; + else + goto fail_rcu; + } If you have time, could you re-test with this v2 patch in your original Evil Twin + DoS setup? That would help confirm the fix before I send v2 to the list. Thanks again for your help! Best regards, 傅继晗 ^ permalink raw reply [flat|nested] 21+ messages in thread
* Re: [PATCH] wifi: mac80211: fix monitor mode frame capture for real chanctx drivers 2026-03-25 0:15 ` 傅继晗 @ 2026-03-25 10:59 ` Óscar Alfonso Díaz 2026-03-26 1:37 ` [PATCH v2] wifi: mac80211: fix the issue of NULL pointer access when deleting the virtual interface 傅继晗 0 siblings, 1 reply; 21+ messages in thread From: Óscar Alfonso Díaz @ 2026-03-25 10:59 UTC (permalink / raw) To: 傅继晗; +Cc: johannes, linux-wireless, linux-kernel, stable Hello everybody. I've tested this patch and I'm sorry to say this... but, bad news. Same behaviour. I mean, as soon as the DoS window appears during the evil twin attack, the VM is completely frozen. I put the full report including screenshots on the github thread: https://github.com/morrownr/USB-WiFi/issues/682 If you are interested in reproducing what I do, it is pretty simple. You just need linux, one wireless adapter using an affected by the bug Mediatek chipset (in my case chipset is MT7921U, also tested on MT7921AUN), a wireless network and a client connected (your mobile phone is enough). Use the airgeddon tool and launch the most simple evil twin attack over it: git clone https://github.com/v1s1t0r1sh3r3/airgeddon cd airgeddon bash airgeddon.sh Navigate through menus selecting the Mediatek adapter, then evil twin menu (option 7) and then scan for your target network (option 4). After selecting it, Just launch the "Evil Twin attack just AP" (option 5) and wait until all the 4 windows of the attack appear, then check if your client (mobile phone) is disconnected from the network. That's it. In my case, just 3 windows opened... the first one is the Fake AP, the second is a DHCP server, the third one is the DoS window, and as I said, as soon as it appears, everything hangs... so no time for the 4th window to be opened (the control window). Kind regards. -- Oscar OpenPGP Key: DA9C60E9 || https://pgp.mit.edu/pks/lookup?op=get&search=0x79B17260DA9C60E9 4F74 B302 354D 817D DE38 0A43 79B1 7260 DA9C 60E9 -- El mié, 25 mar 2026 a las 1:15, 傅继晗 (<fjhhz1997@gmail.com>) escribió: > > Hi Oscar, > > Thank you for testing the v1 patch and reporting the VM hang -- your > report was critical in identifying the root cause. > > Lucid-Duck did extensive debugging and reproduction work on this. > The full discussion is here: > https://github.com/morrownr/USB-WiFi/issues/682#issuecomment-4120751621 > > Root cause of the crash: > > The v1 patch falls back to list_first_entry_or_null(&local->chanctx_list) > when the monitor vif has no chanctx. In your Evil Twin + DoS scenario, > the AP and monitor interfaces created multiple channel contexts. The > fallback blindly grabbed whichever chanctx was first on the list -- > which could be the AP's chanctx that the firmware wasn't expecting > monitor traffic on. Injecting frames on a chanctx where > mt7921_mcu_config_sniffer() was never called is the likely trigger > for the hard hang. > > The v2 patch adds a list_is_singular() guard: injection only proceeds > when there is exactly one chanctx (unambiguous), and is refused when > multiple chanctxs exist. This covers the common single-channel AP + > monitor case while preventing the dangerous multi-chanctx path that > caused your crash. > > Lucid-Duck tested v2 extensively on kernel 6.19.8 with the MT7921AU > (ALFA AWUS036AXML) -- single-channel AP + monitor + injection, > multi-chanctx via P2P-GO, heavy load injection floods (50k fps, > 1.8M packets) -- all stable with zero crashes or kernel warnings. > > The v2 diff against net/mac80211/tx.c: > > chanctx_conf = rcu_dereference(sdata->vif.bss_conf.chanctx_conf); > - if (chanctx_conf) > + if (chanctx_conf) { > chandef = &chanctx_conf->def; > - else if (local->emulate_chanctx) > + } else if (local->emulate_chanctx) { > chandef = &local->hw.conf.chandef; > - else > - goto fail_rcu; > + } else { > + struct ieee80211_chanctx *ctx; > + > + ctx = list_first_entry_or_null(&local->chanctx_list, > + struct ieee80211_chanctx, > + list); > + if (ctx && list_is_singular(&local->chanctx_list)) > + chandef = &ctx->conf.def; > + else > + goto fail_rcu; > + } > > If you have time, could you re-test with this v2 patch in your > original Evil Twin + DoS setup? That would help confirm the fix > before I send v2 to the list. > > Thanks again for your help! > > Best regards, > 傅继晗 ^ permalink raw reply [flat|nested] 21+ messages in thread
* Re: [PATCH v2] wifi: mac80211: fix the issue of NULL pointer access when deleting the virtual interface 2026-03-25 10:59 ` Óscar Alfonso Díaz @ 2026-03-26 1:37 ` 傅继晗 2026-03-26 12:16 ` Óscar Alfonso Díaz 0 siblings, 1 reply; 21+ messages in thread From: 傅继晗 @ 2026-03-26 1:37 UTC (permalink / raw) To: oscar.alfonso.diaz Cc: fjhhz1997, johannes, linux-kernel, linux-wireless, stable Hi Óscar, Lucid-Duck spent some time trying to reproduce your crash and wasn't able to trigger it. Here's a summary of what was tested: - Kali 2025.4 (kernel 6.18.12+kali-amd64) VM on QEMU/KVM, with my v2 patch applied - MT7921AU USB adapter, passthrough to VM - Full airgeddon evil twin flow: monitor VIF + hostapd AP + continuous deauth via aireplay-ng - Also tested on bare metal Fedora 6.19.8 with the same adapter All tests were stable -- no crash, no dmesg errors, load stayed low. The deauth frames were confirmed sending for 30+ seconds under the v2 patch without issues. The one variable that couldn't be matched was the VM hypervisor. Lucid-Duck used QEMU/KVM, which handles USB passthrough at the kernel level (xHCI). If you're using VirtualBox or VMware, the USB passthrough path is quite different (userspace proxy), and that could potentially explain a total VM freeze that isn't a kernel panic. Could you please reply to Lucid-Duck directly on GitHub with the following information? Here's the link: https://github.com/morrownr/USB-WiFi/issues/682#issuecomment-4129198757 1. Which hypervisor are you using? (VirtualBox, VMware, QEMU/KVM, etc.) 2. Your exact USB adapter model and ID? (0e8d:7961 covers several MT7921 variants) 3. If possible, try SSHing into the VM from the host while the display is frozen -- if SSH still works, the issue is at the hypervisor/display level, not the kernel. Thanks, 傅继晗 ^ permalink raw reply [flat|nested] 21+ messages in thread
* Re: [PATCH v2] wifi: mac80211: fix the issue of NULL pointer access when deleting the virtual interface 2026-03-26 1:37 ` [PATCH v2] wifi: mac80211: fix the issue of NULL pointer access when deleting the virtual interface 傅继晗 @ 2026-03-26 12:16 ` Óscar Alfonso Díaz 2026-03-29 21:55 ` Óscar Alfonso Díaz 0 siblings, 1 reply; 21+ messages in thread From: Óscar Alfonso Díaz @ 2026-03-26 12:16 UTC (permalink / raw) To: 傅继晗; +Cc: johannes, linux-kernel, linux-wireless, stable Hi, in response to the three points: 1. VMware 2. This is the output of the lsusb command: "Bus 004 Device 002: ID 0e8d:7961 MediaTek Inc. Wireless_Device". The adapter is very cheap, it’s a Fenvi AX1800 (MT7921U), this one: https://s.click.aliexpress.com/e/_okxhxNl . But as I said, the bug also happens when using the Alfa AWUS036AXML (MT7921AUN). 3. I’m not sure about this right now. I’d say everything dies. I’ll test that to see if SSH is still available (I don’t think so, but I’m not 100% sure at the moment). Give me a few days. I’ll test this again over the weekend. I’ll also run a test on bare metal (not in a VM). That said, like me, many people use VMs for pentesting. So even if it works on bare metal, which I’ll test this weekend, I think it would still be worth investigating whether it can be fixed for VMs, since many people, myself included, use them for work. If it works with other WiFi adapters, it would be a big drawback if it didn’t work with MediaTek adapters. I’ll also reply with a similar message in the thread. Thanks and regards. -- Oscar OpenPGP Key: DA9C60E9 || https://pgp.mit.edu/pks/lookup?op=get&search=0x79B17260DA9C60E9 4F74 B302 354D 817D DE38 0A43 79B1 7260 DA9C 60E9 -- El jue, 26 mar 2026 a las 2:37, 傅继晗 (<fjhhz1997@gmail.com>) escribió: > > Hi Óscar, > > Lucid-Duck spent some time trying to reproduce your crash and wasn't able > to trigger it. Here's a summary of what was tested: > > - Kali 2025.4 (kernel 6.18.12+kali-amd64) VM on QEMU/KVM, with my v2 > patch applied > - MT7921AU USB adapter, passthrough to VM > - Full airgeddon evil twin flow: monitor VIF + hostapd AP + continuous > deauth via aireplay-ng > - Also tested on bare metal Fedora 6.19.8 with the same adapter > > All tests were stable -- no crash, no dmesg errors, load stayed low. The > deauth frames were confirmed sending for 30+ seconds under the v2 patch > without issues. > > The one variable that couldn't be matched was the VM hypervisor. > Lucid-Duck used QEMU/KVM, which handles USB passthrough at the kernel > level (xHCI). If you're using VirtualBox or VMware, the USB passthrough > path is quite different (userspace proxy), and that could potentially > explain a total VM freeze that isn't a kernel panic. > > Could you please reply to Lucid-Duck directly on GitHub with the > following information? Here's the link: > https://github.com/morrownr/USB-WiFi/issues/682#issuecomment-4129198757 > > 1. Which hypervisor are you using? (VirtualBox, VMware, QEMU/KVM, etc.) > 2. Your exact USB adapter model and ID? (0e8d:7961 covers several > MT7921 variants) > 3. If possible, try SSHing into the VM from the host while the display > is frozen -- if SSH still works, the issue is at the hypervisor/display > level, not the kernel. > > Thanks, > 傅继晗 ^ permalink raw reply [flat|nested] 21+ messages in thread
* Re: [PATCH v2] wifi: mac80211: fix the issue of NULL pointer access when deleting the virtual interface 2026-03-26 12:16 ` Óscar Alfonso Díaz @ 2026-03-29 21:55 ` Óscar Alfonso Díaz 2026-04-02 0:06 ` Óscar Alfonso Díaz 0 siblings, 1 reply; 21+ messages in thread From: Óscar Alfonso Díaz @ 2026-03-29 21:55 UTC (permalink / raw) To: 傅继晗; +Cc: johannes, linux-kernel, linux-wireless, stable Please review my latest messages in the GitHub thread. https://github.com/morrownr/USB-WiFi/issues/682 There you’ll even find a link to a video I recorded so you can see that even on bare metal with Kali Linux installed natively, it still doesn’t work. It behaves exactly the same as it does in the VM. Here is the link https://www.dropbox.com/scl/fi/i6h8xbls5xkvae0pitrbg/video_2026-03-29_23-44-36.mp4?rlkey=jm48ly9tjwbhsi4aauml2auh9&dl=1 Regards. -- Oscar OpenPGP Key: DA9C60E9 || https://pgp.mit.edu/pks/lookup?op=get&search=0x79B17260DA9C60E9 4F74 B302 354D 817D DE38 0A43 79B1 7260 DA9C 60E9 -- El jue, 26 mar 2026 a las 13:16, Óscar Alfonso Díaz (<oscar.alfonso.diaz@gmail.com>) escribió: > > Hi, in response to the three points: > > 1. VMware > > 2. This is the output of the lsusb command: "Bus 004 Device 002: ID > 0e8d:7961 MediaTek Inc. Wireless_Device". The adapter is very cheap, > it’s a Fenvi AX1800 (MT7921U), this one: > https://s.click.aliexpress.com/e/_okxhxNl . But as I said, the bug > also happens when using the Alfa AWUS036AXML (MT7921AUN). > > 3. I’m not sure about this right now. I’d say everything dies. I’ll > test that to see if SSH is still available (I don’t think so, but I’m > not 100% sure at the moment). > > Give me a few days. I’ll test this again over the weekend. I’ll also > run a test on bare metal (not in a VM). That said, like me, many > people use VMs for pentesting. So even if it works on bare metal, > which I’ll test this weekend, I think it would still be worth > investigating whether it can be fixed for VMs, since many people, > myself included, use them for work. If it works with other WiFi > adapters, it would be a big drawback if it didn’t work with MediaTek > adapters. > > I’ll also reply with a similar message in the thread. > > Thanks and regards. > -- > Oscar > > OpenPGP Key: DA9C60E9 || > https://pgp.mit.edu/pks/lookup?op=get&search=0x79B17260DA9C60E9 > 4F74 B302 354D 817D DE38 0A43 79B1 7260 DA9C 60E9 > -- > > El jue, 26 mar 2026 a las 2:37, 傅继晗 (<fjhhz1997@gmail.com>) escribió: > > > > Hi Óscar, > > > > Lucid-Duck spent some time trying to reproduce your crash and wasn't able > > to trigger it. Here's a summary of what was tested: > > > > - Kali 2025.4 (kernel 6.18.12+kali-amd64) VM on QEMU/KVM, with my v2 > > patch applied > > - MT7921AU USB adapter, passthrough to VM > > - Full airgeddon evil twin flow: monitor VIF + hostapd AP + continuous > > deauth via aireplay-ng > > - Also tested on bare metal Fedora 6.19.8 with the same adapter > > > > All tests were stable -- no crash, no dmesg errors, load stayed low. The > > deauth frames were confirmed sending for 30+ seconds under the v2 patch > > without issues. > > > > The one variable that couldn't be matched was the VM hypervisor. > > Lucid-Duck used QEMU/KVM, which handles USB passthrough at the kernel > > level (xHCI). If you're using VirtualBox or VMware, the USB passthrough > > path is quite different (userspace proxy), and that could potentially > > explain a total VM freeze that isn't a kernel panic. > > > > Could you please reply to Lucid-Duck directly on GitHub with the > > following information? Here's the link: > > https://github.com/morrownr/USB-WiFi/issues/682#issuecomment-4129198757 > > > > 1. Which hypervisor are you using? (VirtualBox, VMware, QEMU/KVM, etc.) > > 2. Your exact USB adapter model and ID? (0e8d:7961 covers several > > MT7921 variants) > > 3. If possible, try SSHing into the VM from the host while the display > > is frozen -- if SSH still works, the issue is at the hypervisor/display > > level, not the kernel. > > > > Thanks, > > 傅继晗 ^ permalink raw reply [flat|nested] 21+ messages in thread
* Re: [PATCH v2] wifi: mac80211: fix the issue of NULL pointer access when deleting the virtual interface 2026-03-29 21:55 ` Óscar Alfonso Díaz @ 2026-04-02 0:06 ` Óscar Alfonso Díaz 2026-04-21 8:50 ` Óscar Alfonso Díaz 0 siblings, 1 reply; 21+ messages in thread From: Óscar Alfonso Díaz @ 2026-04-02 0:06 UTC (permalink / raw) To: 傅继晗; +Cc: johannes, linux-kernel, linux-wireless, stable Hello everyone, a member of the airgeddon team made a kernel modification that seems to work. I’ve tested it on VMware and also on bare metal with a 7.0.0-rc5 kernel, using both a Fenvi AX1800 (MT7921U) and an Alfa AWUS036AXML (MT7921AUN), and it appears to work well. Deauthentication during VIF operation (evil twin attack) is now working for MediaTek. Everything is documented at this comment in the GitHub thread (https://github.com/morrownr/USB-WiFi/issues/682#issuecomment-4167080451), including the patch used. A patch that is modifying these three files (tx.c, chan.c and ieee80211_i.h). Take a look at it on the Github thread please. Regards. -- Oscar OpenPGP Key: DA9C60E9 || https://pgp.mit.edu/pks/lookup?op=get&search=0x79B17260DA9C60E9 4F74 B302 354D 817D DE38 0A43 79B1 7260 DA9C 60E9 -- El dom, 29 mar 2026 a las 23:55, Óscar Alfonso Díaz (<oscar.alfonso.diaz@gmail.com>) escribió: > > Please review my latest messages in the GitHub thread. > https://github.com/morrownr/USB-WiFi/issues/682 > > There you’ll even find a link to a video I recorded so you can see > that even on bare metal with Kali Linux installed natively, it still > doesn’t work. It behaves exactly the same as it does in the VM. > > Here is the link > https://www.dropbox.com/scl/fi/i6h8xbls5xkvae0pitrbg/video_2026-03-29_23-44-36.mp4?rlkey=jm48ly9tjwbhsi4aauml2auh9&dl=1 > > Regards. > -- > Oscar > > OpenPGP Key: DA9C60E9 || > https://pgp.mit.edu/pks/lookup?op=get&search=0x79B17260DA9C60E9 > 4F74 B302 354D 817D DE38 0A43 79B1 7260 DA9C 60E9 > -- > > El jue, 26 mar 2026 a las 13:16, Óscar Alfonso Díaz > (<oscar.alfonso.diaz@gmail.com>) escribió: > > > > Hi, in response to the three points: > > > > 1. VMware > > > > 2. This is the output of the lsusb command: "Bus 004 Device 002: ID > > 0e8d:7961 MediaTek Inc. Wireless_Device". The adapter is very cheap, > > it’s a Fenvi AX1800 (MT7921U), this one: > > https://s.click.aliexpress.com/e/_okxhxNl . But as I said, the bug > > also happens when using the Alfa AWUS036AXML (MT7921AUN). > > > > 3. I’m not sure about this right now. I’d say everything dies. I’ll > > test that to see if SSH is still available (I don’t think so, but I’m > > not 100% sure at the moment). > > > > Give me a few days. I’ll test this again over the weekend. I’ll also > > run a test on bare metal (not in a VM). That said, like me, many > > people use VMs for pentesting. So even if it works on bare metal, > > which I’ll test this weekend, I think it would still be worth > > investigating whether it can be fixed for VMs, since many people, > > myself included, use them for work. If it works with other WiFi > > adapters, it would be a big drawback if it didn’t work with MediaTek > > adapters. > > > > I’ll also reply with a similar message in the thread. > > > > Thanks and regards. > > -- > > Oscar > > > > OpenPGP Key: DA9C60E9 || > > https://pgp.mit.edu/pks/lookup?op=get&search=0x79B17260DA9C60E9 > > 4F74 B302 354D 817D DE38 0A43 79B1 7260 DA9C 60E9 > > -- > > > > El jue, 26 mar 2026 a las 2:37, 傅继晗 (<fjhhz1997@gmail.com>) escribió: > > > > > > Hi Óscar, > > > > > > Lucid-Duck spent some time trying to reproduce your crash and wasn't able > > > to trigger it. Here's a summary of what was tested: > > > > > > - Kali 2025.4 (kernel 6.18.12+kali-amd64) VM on QEMU/KVM, with my v2 > > > patch applied > > > - MT7921AU USB adapter, passthrough to VM > > > - Full airgeddon evil twin flow: monitor VIF + hostapd AP + continuous > > > deauth via aireplay-ng > > > - Also tested on bare metal Fedora 6.19.8 with the same adapter > > > > > > All tests were stable -- no crash, no dmesg errors, load stayed low. The > > > deauth frames were confirmed sending for 30+ seconds under the v2 patch > > > without issues. > > > > > > The one variable that couldn't be matched was the VM hypervisor. > > > Lucid-Duck used QEMU/KVM, which handles USB passthrough at the kernel > > > level (xHCI). If you're using VirtualBox or VMware, the USB passthrough > > > path is quite different (userspace proxy), and that could potentially > > > explain a total VM freeze that isn't a kernel panic. > > > > > > Could you please reply to Lucid-Duck directly on GitHub with the > > > following information? Here's the link: > > > https://github.com/morrownr/USB-WiFi/issues/682#issuecomment-4129198757 > > > > > > 1. Which hypervisor are you using? (VirtualBox, VMware, QEMU/KVM, etc.) > > > 2. Your exact USB adapter model and ID? (0e8d:7961 covers several > > > MT7921 variants) > > > 3. If possible, try SSHing into the VM from the host while the display > > > is frozen -- if SSH still works, the issue is at the hypervisor/display > > > level, not the kernel. > > > > > > Thanks, > > > 傅继晗 ^ permalink raw reply [flat|nested] 21+ messages in thread
* Re: [PATCH v2] wifi: mac80211: fix the issue of NULL pointer access when deleting the virtual interface 2026-04-02 0:06 ` Óscar Alfonso Díaz @ 2026-04-21 8:50 ` Óscar Alfonso Díaz 2026-04-24 12:08 ` [PATCH] wifi: mac80211: restore monitor injection when coexisting with another VIF Brite 0 siblings, 1 reply; 21+ messages in thread From: Óscar Alfonso Díaz @ 2026-04-21 8:50 UTC (permalink / raw) To: 傅继晗, brite.airgeddon Cc: johannes, linux-kernel, linux-wireless, stable Hello, I would like to copy Brite from the airgeddon team, who has come up with a solution. I will include him in the email, and he will send you a patch for you to review. This patch has been refined after a lot of work and no longer has any “side effects”. At least, we have not detected anything unusual, and it has been tested extensively with many different chipsets. In any case, it’s best if he replies to the email himself to explain it and propose the patch. Thanks and regards. -- Oscar OpenPGP Key: DA9C60E9 || https://pgp.mit.edu/pks/lookup?op=get&search=0x79B17260DA9C60E9 4F74 B302 354D 817D DE38 0A43 79B1 7260 DA9C 60E9 -- El jue, 2 abr 2026 a las 2:06, Óscar Alfonso Díaz (<oscar.alfonso.diaz@gmail.com>) escribió: > > Hello everyone, a member of the airgeddon team made a kernel > modification that seems to work. I’ve tested it on VMware and also on > bare metal with a 7.0.0-rc5 kernel, using both a Fenvi AX1800 > (MT7921U) and an Alfa AWUS036AXML (MT7921AUN), and it appears to work > well. Deauthentication during VIF operation (evil twin attack) is now > working for MediaTek. > > Everything is documented at this comment in the GitHub thread > (https://github.com/morrownr/USB-WiFi/issues/682#issuecomment-4167080451), > including the patch used. A patch that is modifying these three files > (tx.c, chan.c and ieee80211_i.h). Take a look at it on the Github > thread please. > > Regards. > -- > Oscar > > OpenPGP Key: DA9C60E9 || > https://pgp.mit.edu/pks/lookup?op=get&search=0x79B17260DA9C60E9 > 4F74 B302 354D 817D DE38 0A43 79B1 7260 DA9C 60E9 > -- > > El dom, 29 mar 2026 a las 23:55, Óscar Alfonso Díaz > (<oscar.alfonso.diaz@gmail.com>) escribió: > > > > Please review my latest messages in the GitHub thread. > > https://github.com/morrownr/USB-WiFi/issues/682 > > > > There you’ll even find a link to a video I recorded so you can see > > that even on bare metal with Kali Linux installed natively, it still > > doesn’t work. It behaves exactly the same as it does in the VM. > > > > Here is the link > > https://www.dropbox.com/scl/fi/i6h8xbls5xkvae0pitrbg/video_2026-03-29_23-44-36.mp4?rlkey=jm48ly9tjwbhsi4aauml2auh9&dl=1 > > > > Regards. > > -- > > Oscar > > > > OpenPGP Key: DA9C60E9 || > > https://pgp.mit.edu/pks/lookup?op=get&search=0x79B17260DA9C60E9 > > 4F74 B302 354D 817D DE38 0A43 79B1 7260 DA9C 60E9 > > -- > > > > El jue, 26 mar 2026 a las 13:16, Óscar Alfonso Díaz > > (<oscar.alfonso.diaz@gmail.com>) escribió: > > > > > > Hi, in response to the three points: > > > > > > 1. VMware > > > > > > 2. This is the output of the lsusb command: "Bus 004 Device 002: ID > > > 0e8d:7961 MediaTek Inc. Wireless_Device". The adapter is very cheap, > > > it’s a Fenvi AX1800 (MT7921U), this one: > > > https://s.click.aliexpress.com/e/_okxhxNl . But as I said, the bug > > > also happens when using the Alfa AWUS036AXML (MT7921AUN). > > > > > > 3. I’m not sure about this right now. I’d say everything dies. I’ll > > > test that to see if SSH is still available (I don’t think so, but I’m > > > not 100% sure at the moment). > > > > > > Give me a few days. I’ll test this again over the weekend. I’ll also > > > run a test on bare metal (not in a VM). That said, like me, many > > > people use VMs for pentesting. So even if it works on bare metal, > > > which I’ll test this weekend, I think it would still be worth > > > investigating whether it can be fixed for VMs, since many people, > > > myself included, use them for work. If it works with other WiFi > > > adapters, it would be a big drawback if it didn’t work with MediaTek > > > adapters. > > > > > > I’ll also reply with a similar message in the thread. > > > > > > Thanks and regards. > > > -- > > > Oscar > > > > > > OpenPGP Key: DA9C60E9 || > > > https://pgp.mit.edu/pks/lookup?op=get&search=0x79B17260DA9C60E9 > > > 4F74 B302 354D 817D DE38 0A43 79B1 7260 DA9C 60E9 > > > -- > > > > > > El jue, 26 mar 2026 a las 2:37, 傅继晗 (<fjhhz1997@gmail.com>) escribió: > > > > > > > > Hi Óscar, > > > > > > > > Lucid-Duck spent some time trying to reproduce your crash and wasn't able > > > > to trigger it. Here's a summary of what was tested: > > > > > > > > - Kali 2025.4 (kernel 6.18.12+kali-amd64) VM on QEMU/KVM, with my v2 > > > > patch applied > > > > - MT7921AU USB adapter, passthrough to VM > > > > - Full airgeddon evil twin flow: monitor VIF + hostapd AP + continuous > > > > deauth via aireplay-ng > > > > - Also tested on bare metal Fedora 6.19.8 with the same adapter > > > > > > > > All tests were stable -- no crash, no dmesg errors, load stayed low. The > > > > deauth frames were confirmed sending for 30+ seconds under the v2 patch > > > > without issues. > > > > > > > > The one variable that couldn't be matched was the VM hypervisor. > > > > Lucid-Duck used QEMU/KVM, which handles USB passthrough at the kernel > > > > level (xHCI). If you're using VirtualBox or VMware, the USB passthrough > > > > path is quite different (userspace proxy), and that could potentially > > > > explain a total VM freeze that isn't a kernel panic. > > > > > > > > Could you please reply to Lucid-Duck directly on GitHub with the > > > > following information? Here's the link: > > > > https://github.com/morrownr/USB-WiFi/issues/682#issuecomment-4129198757 > > > > > > > > 1. Which hypervisor are you using? (VirtualBox, VMware, QEMU/KVM, etc.) > > > > 2. Your exact USB adapter model and ID? (0e8d:7961 covers several > > > > MT7921 variants) > > > > 3. If possible, try SSHing into the VM from the host while the display > > > > is frozen -- if SSH still works, the issue is at the hypervisor/display > > > > level, not the kernel. > > > > > > > > Thanks, > > > > 傅继晗 ^ permalink raw reply [flat|nested] 21+ messages in thread
* [PATCH] wifi: mac80211: restore monitor injection when coexisting with another VIF 2026-04-21 8:50 ` Óscar Alfonso Díaz @ 2026-04-24 12:08 ` Brite 2026-04-24 12:17 ` Greg KH ` (2 more replies) 0 siblings, 3 replies; 21+ messages in thread From: Brite @ 2026-04-24 12:08 UTC (permalink / raw) To: Johannes Berg Cc: linux-wireless, linux-kernel, stable, fjhhz1997, oscar.alfonso.diaz, Brite Monitor-mode packet injection is broken on drivers that implement real channel context ops (mt76 and others) when the monitor interface runs alongside another interface (typically AP). The monitor VIF never gets a chanctx of its own in this case, so ieee80211_monitor_start_xmit() finds vif.bss_conf.chanctx_conf == NULL and takes the fail_rcu path, silently dropping the skb. In practice this breaks tooling like mdk4 and aireplay-ng on mt76 hardware, including airgeddon's evil-twin deauth flow, which runs hostapd on an AP VIF and injects deauth frames from a coexisting monitor VIF. Earlier attempts on this thread addressed the same bug but had side effects - notably full VM freezes during the airgeddon evil-twin flow, reported by Óscar in the thread. This patch takes a different approach and has not exhibited those side effects across the tested configurations. Fix in two independent pieces: 1) Snapshot-based fallback. Maintain an RCU-published snapshot, local->sole_chandef, of the single active cfg80211_chan_def when exactly one non-transitional chanctx exists on the device, and NULL otherwise (MCC, mid-swap, idle, allocation failure). The snapshot is refreshed from four chanctx call sites (new/free/assign/change) under wiphy->mtx, and consumed lock-free by ieee80211_monitor_start_xmit() under rcu_read_lock(). The wrapper struct carries an rcu_head so stale snapshots retire via kfree_rcu(). Fail-closed on ambiguous channel state rather than injecting on a guess. This restores AP+monitor coexistence injection on 2.4 GHz. 2) Surrogate sdata for the regulatory check on 5 GHz. Once the snapshot supplies a chandef, sdata is still the monitor interface (injection tools usually spoof the source MAC so the earlier addr2 match does not reassign sdata). On 5 GHz channels cfg80211_reg_can_beacon() then rejects the frame because NL80211_IFTYPE_MONITOR cannot satisfy the regulatory requirements for that band. In the coexistence scenario there is already a non-monitor VIF on the same channel that is authorised to operate there; locate a running non-monitor sdata with a matching chandef (cfg80211_chandef_identical: band, width, both center freqs) and use it for the regulatory check. An AP sdata satisfies the check, so the frame goes out on the correct channel instead of being dropped. If no such sdata exists the monitor interface is left in place and the existing code paths apply. Tested on mt7921u (mt76) usb with mdk4 and aireplay-ng deauth on 2.4 GHz and 5 GHz while co-running an AP on the same channel. Tested on 6.18.12, 6.19.12 and 7.0.0-rc5 Cc: stable@vger.kernel.org Fixes: 0a44dfc07074 ("wifi: mac80211: simplify non-chanctx drivers") Reported-by: Óscar Alfonso Díaz <oscar.alfonso.diaz@gmail.com> Closes: https://bugzilla.kernel.org/show_bug.cgi?id=218763 Link: https://github.com/morrownr/USB-WiFi/issues/682 Signed-off-by: Brite <brite.airgeddon@gmail.com> --- net/mac80211/chan.c | 75 ++++++++++++++++++++++++++++++++++++++ net/mac80211/ieee80211_i.h | 17 +++++++++ net/mac80211/main.c | 7 ++++ net/mac80211/tx.c | 69 +++++++++++++++++++++++++++++++++-- 4 files changed, 165 insertions(+), 3 deletions(-) diff --git a/net/mac80211/chan.c b/net/mac80211/chan.c index 05f45e66999b..9efab86f57d0 100644 --- a/net/mac80211/chan.c +++ b/net/mac80211/chan.c @@ -12,6 +12,61 @@ #include "driver-ops.h" #include "rate.h" +/** + * ieee80211_update_sole_chandef - refresh the sole-chanctx snapshot + * @local: the mac80211 device + * + * Walk chanctx_list. If exactly one non-transitional, valid chanctx + * is present, kmalloc a snapshot of its chandef and RCU-publish it on + * local->sole_chandef. If zero or more than one chanctx are active, + * publish NULL (fail-closed; injection disabled for MCC or idle). + * + * The prior snapshot is freed via kfree_rcu after all RCU readers that + * hold a reference to it complete. + * + * Context: Must be called with wiphy->mtx held. + * Always process context - GFP_KERNEL is safe and appropriate. + */ +void ieee80211_update_sole_chandef(struct ieee80211_local *local) +{ + struct ieee80211_chanctx *ctx, *found = NULL; + struct ieee80211_sole_chandef *snap = NULL; + struct ieee80211_sole_chandef *old; + + lockdep_assert_wiphy(local->hw.wiphy); + + list_for_each_entry(ctx, &local->chanctx_list, list) { + /* + * REPLACES_OTHER: this entry is the incoming side of a + * swap; the outgoing context is still live. Skip it to + * avoid counting a context that is not yet active. + */ + if (ctx->replace_state == IEEE80211_CHANCTX_REPLACES_OTHER) + continue; + if (!cfg80211_chandef_valid(&ctx->conf.def)) + continue; + + if (found) { + /* MCC or unexpected multi-channel state. */ + found = NULL; + break; + } + found = ctx; + } + + if (found) { + snap = kmalloc(sizeof(*snap), GFP_KERNEL); + if (snap) + snap->def = found->conf.def; + /* alloc failure -> snap == NULL -> publish NULL below */ + } + + old = rcu_replace_pointer(local->sole_chandef, snap, + lockdep_is_held(&local->hw.wiphy->mtx)); + if (old) + kfree_rcu(old, rcu_head); +} + struct ieee80211_chanctx_user_iter { struct ieee80211_chan_req *chanreq; struct ieee80211_sub_if_data *sdata; @@ -729,6 +784,9 @@ static void ieee80211_change_chanctx(struct ieee80211_local *local, const struct ieee80211_chan_req *chanreq) { _ieee80211_change_chanctx(local, ctx, old_ctx, chanreq, NULL); + + /* Hook 4/4: channel parameters changed; refresh snapshot */ + ieee80211_update_sole_chandef(local); } /* Note: if successful, the returned chanctx is reserved for the link */ @@ -902,6 +960,13 @@ ieee80211_new_chanctx(struct ieee80211_local *local, WARN_ON_ONCE(err && !local->in_reconfig); list_add_rcu(&ctx->list, &local->chanctx_list); + /* + * Hook 1/4: new context is now on the list. + * Publish a fresh snapshot so monitor injection can use this + * channel immediately. + */ + ieee80211_update_sole_chandef(local); + return ctx; } @@ -928,6 +993,13 @@ static void ieee80211_free_chanctx(struct ieee80211_local *local, WARN_ON_ONCE(ieee80211_chanctx_refcount(local, ctx) != 0); list_del_rcu(&ctx->list); + /* + * Hook 2/4: context is now off the list. + * Republish so that a context removed during AP teardown is no + * longer visible to the monitor injection fallback. + */ + ieee80211_update_sole_chandef(local); + ieee80211_del_chanctx(local, ctx, skip_idle_recalc); kfree_rcu(ctx, rcu_head); } @@ -1061,6 +1133,9 @@ static int ieee80211_assign_link_chanctx(struct ieee80211_link_data *link, ieee80211_recalc_chanctx_min_def(local, new_ctx); } + /* Hook 3/4: VIF assigned or unassigned; refresh snapshot */ + ieee80211_update_sole_chandef(local); + if (conf) { new_idle = false; } else { diff --git a/net/mac80211/ieee80211_i.h b/net/mac80211/ieee80211_i.h index e60b814dd89e..14c412a18868 100644 --- a/net/mac80211/ieee80211_i.h +++ b/net/mac80211/ieee80211_i.h @@ -40,6 +40,22 @@ extern const struct cfg80211_ops mac80211_config_ops; struct ieee80211_local; struct ieee80211_mesh_fast_tx; +/** + * struct ieee80211_sole_chandef - kfree_rcu-capable chandef snapshot + * + * cfg80211_chan_def has no embedded rcu_head so it cannot be freed + * with kfree_rcu() directly. This wrapper adds one. + * + * @rcu_head: for kfree_rcu() deferred freeing + * @def: point-in-time copy of the active cfg80211_chan_def + */ +struct ieee80211_sole_chandef { + struct rcu_head rcu_head; + struct cfg80211_chan_def def; +}; + +/* Defined in chan.c */ +void ieee80211_update_sole_chandef(struct ieee80211_local *local); /* Maximum number of broadcast/multicast frames to buffer when some of the * associated stations are using power saving. */ @@ -1586,6 +1602,7 @@ struct ieee80211_local { /* channel contexts */ struct list_head chanctx_list; + struct ieee80211_sole_chandef __rcu *sole_chandef; #ifdef CONFIG_MAC80211_LEDS struct led_trigger tx_led, rx_led, assoc_led, radio_led; diff --git a/net/mac80211/main.c b/net/mac80211/main.c index 616f86b1a7e4..387ed2786b32 100644 --- a/net/mac80211/main.c +++ b/net/mac80211/main.c @@ -1745,6 +1745,13 @@ void ieee80211_free_hw(struct ieee80211_hw *hw) kfree(local->hw.wiphy->bands[band]); } + /* + * All interfaces are gone by this point, so every chanctx has been + * freed and ieee80211_update_sole_chandef() has already published + * NULL. Assert the invariant. + */ + WARN_ON_ONCE(rcu_access_pointer(local->sole_chandef)); + wiphy_free(local->hw.wiphy); } EXPORT_SYMBOL(ieee80211_free_hw); diff --git a/net/mac80211/tx.c b/net/mac80211/tx.c index b90c0537d0c5..54d06cfb670c 100644 --- a/net/mac80211/tx.c +++ b/net/mac80211/tx.c @@ -2398,10 +2398,73 @@ netdev_tx_t ieee80211_monitor_start_xmit(struct sk_buff *skb, rcu_dereference(tmp_sdata->vif.bss_conf.chanctx_conf); } - if (chanctx_conf) + if (chanctx_conf) { chandef = &chanctx_conf->def; - else - goto fail_rcu; + } else { + /* + * Real-chanctx drivers (e.g. mt76) do not assign a chanctx to + * the monitor VIF, so vif.bss_conf.chanctx_conf is NULL here. + * Fall back to the sole_chandef snapshot maintained by + * ieee80211_update_sole_chandef(). NULL means MCC or no active + * channel - drop the frame. + * + * The snapshot is valid for this whole function: it is freed + * via kfree_rcu() after a full grace period, and we are inside + * rcu_read_lock() throughout. + */ + struct ieee80211_sole_chandef *sole = + rcu_dereference(local->sole_chandef); + chandef = sole ? &sole->def : NULL; + if (!chandef) + goto fail_rcu; + } + + /* + * If sdata is still the monitor interface, addr2 did not match any + * local non-monitor interface - the normal case for injection tools + * (mdk4, aireplay-ng) that spoof the source MAC. + * + * On 5 GHz, cfg80211_reg_can_beacon() below commonly rejects + * NL80211_IFTYPE_MONITOR because a monitor interface cannot + * satisfy the regulatory requirements for the band (NO_IR on + * many channels; radar-detection responsibility on DFS channels). + * Pick a running non-monitor sdata operating on the same channel + * (identical band, width and both center frequencies) and use + * that for the check: an AP sdata is already authorised for the + * channel, so the check passes and the frame goes out on the + * correct channel instead of being dropped. + * + * If no such sdata exists, leave sdata as the monitor interface and + * let the existing code paths handle the MONITOR case (CHAN_CAN_MONITOR + * branch, or fail_rcu if regulatory does not permit). + */ + if (sdata->vif.type == NL80211_IFTYPE_MONITOR) { + struct ieee80211_sub_if_data *picked = NULL; + + list_for_each_entry_rcu(tmp_sdata, &local->interfaces, list) { + struct ieee80211_chanctx_conf *tx_conf; + + if (!ieee80211_sdata_running(tmp_sdata)) + continue; + if (tmp_sdata->vif.type == NL80211_IFTYPE_MONITOR || + tmp_sdata->vif.type == NL80211_IFTYPE_AP_VLAN) + continue; + + tx_conf = rcu_dereference(tmp_sdata->vif.bss_conf.chanctx_conf); + + if (!tx_conf) + continue; + + if (!cfg80211_chandef_identical(&tx_conf->def, chandef)) + continue; + + picked = tmp_sdata; + break; + } + + if (picked) + sdata = picked; + } /* * If driver/HW supports IEEE80211_CHAN_CAN_MONITOR we still -- 2.53.0 ^ permalink raw reply related [flat|nested] 21+ messages in thread
* Re: [PATCH] wifi: mac80211: restore monitor injection when coexisting with another VIF 2026-04-24 12:08 ` [PATCH] wifi: mac80211: restore monitor injection when coexisting with another VIF Brite @ 2026-04-24 12:17 ` Greg KH 2026-04-24 13:55 ` Johannes Berg 2026-04-25 1:47 ` Lachlan Hodges 2 siblings, 0 replies; 21+ messages in thread From: Greg KH @ 2026-04-24 12:17 UTC (permalink / raw) To: Brite Cc: Johannes Berg, linux-wireless, linux-kernel, stable, fjhhz1997, oscar.alfonso.diaz On Sat, Apr 25, 2026 at 12:08:07AM +1200, Brite wrote: > Monitor-mode packet injection is broken on drivers that implement > real channel context ops (mt76 and others) when the > monitor interface runs alongside another interface (typically AP). > The monitor VIF never gets a chanctx of its own in this case, so > ieee80211_monitor_start_xmit() finds vif.bss_conf.chanctx_conf == > NULL and takes the fail_rcu path, silently dropping the skb. In > practice this breaks tooling like mdk4 and aireplay-ng on mt76 > hardware, including airgeddon's evil-twin deauth flow, which runs > hostapd on an AP VIF and injects deauth frames from a coexisting > monitor VIF. Hi, This is the friendly patch-bot of Greg Kroah-Hartman. You have sent him a patch that has triggered this response. He used to manually respond to these common problems, but in order to save his sanity (he kept writing the same thing over and over, yet to different people), I was created. Hopefully you will not take offence and will fix the problem in your patch and resubmit it so that it can be accepted into the Linux kernel tree. You are receiving this message because of the following common error(s) as indicated below: - It looks like you did not use your "real" name for the patch on either the Signed-off-by: line, or the From: line (both of which have to match). Please read the kernel file, Documentation/process/submitting-patches.rst for how to do this correctly. If you wish to discuss this problem further, or you have questions about how to resolve this issue, please feel free to respond to this email and Greg will reply once he has dug out from the pending patches received from other developers. thanks, greg k-h's patch email bot ^ permalink raw reply [flat|nested] 21+ messages in thread
* Re: [PATCH] wifi: mac80211: restore monitor injection when coexisting with another VIF 2026-04-24 12:08 ` [PATCH] wifi: mac80211: restore monitor injection when coexisting with another VIF Brite 2026-04-24 12:17 ` Greg KH @ 2026-04-24 13:55 ` Johannes Berg 2026-04-24 14:17 ` Óscar Alfonso Díaz ` (2 more replies) 2026-04-25 1:47 ` Lachlan Hodges 2 siblings, 3 replies; 21+ messages in thread From: Johannes Berg @ 2026-04-24 13:55 UTC (permalink / raw) To: Brite; +Cc: linux-wireless, linux-kernel, stable, fjhhz1997, oscar.alfonso.diaz On Sat, 2026-04-25 at 00:08 +1200, Brite wrote: > > Earlier attempts on this thread addressed the same bug but had side > effects - notably full VM freezes during the airgeddon evil-twin flow, > reported by Óscar in the thread. This patch takes a different approach > and has not exhibited those side effects across the tested configurations. > I don't believe that all this complexity is necessary, and the code changes have are fairly clearly LLM-created w/o such disclosures. Dropping. johannes ^ permalink raw reply [flat|nested] 21+ messages in thread
* Re: [PATCH] wifi: mac80211: restore monitor injection when coexisting with another VIF 2026-04-24 13:55 ` Johannes Berg @ 2026-04-24 14:17 ` Óscar Alfonso Díaz 2026-04-24 17:22 ` Brite 2026-04-25 0:34 ` Brite 2 siblings, 0 replies; 21+ messages in thread From: Óscar Alfonso Díaz @ 2026-04-24 14:17 UTC (permalink / raw) To: Johannes Berg; +Cc: Brite, linux-wireless, linux-kernel, stable, fjhhz1997 Dropping? Do you mean it will not be taken into consideration? I tested this patch thoroughly, and it works very well. I am well aware that kernel developers are reluctant to accept anything created by AI or LLMs, of course. But please, I think you should review the approach and perhaps use the idea to implement it in the way you think is most appropriate. Brite has put a lot of effort and time into this, and both he and I have spent a great deal of time testing everything. It has been tested as he describes on kernel 7.0 and on the backported versions. Side effects have been addressed, and everything is finally working well. All we ask is that it be taken into consideration for adding a solution upstream. I already have a .deb package that works for me on the Linux distribution I use, but it would be wonderful to provide a fix to the whole community so it works for everyone. Please, I kindly ask that you take some time to review it. Thanks so much, as always. Kind regards. -- Oscar OpenPGP Key: DA9C60E9 || https://pgp.mit.edu/pks/lookup?op=get&search=0x79B17260DA9C60E9 4F74 B302 354D 817D DE38 0A43 79B1 7260 DA9C 60E9 -- El vie, 24 abr 2026 a las 15:55, Johannes Berg (<johannes@sipsolutions.net>) escribió: > > On Sat, 2026-04-25 at 00:08 +1200, Brite wrote: > > > > Earlier attempts on this thread addressed the same bug but had side > > effects - notably full VM freezes during the airgeddon evil-twin flow, > > reported by Óscar in the thread. This patch takes a different approach > > and has not exhibited those side effects across the tested configurations. > > > > I don't believe that all this complexity is necessary, and the code > changes have are fairly clearly LLM-created w/o such disclosures. > Dropping. > > johannes ^ permalink raw reply [flat|nested] 21+ messages in thread
* Re: [PATCH] wifi: mac80211: restore monitor injection when coexisting with another VIF 2026-04-24 13:55 ` Johannes Berg 2026-04-24 14:17 ` Óscar Alfonso Díaz @ 2026-04-24 17:22 ` Brite 2026-04-25 0:34 ` Brite 2 siblings, 0 replies; 21+ messages in thread From: Brite @ 2026-04-24 17:22 UTC (permalink / raw) To: Johannes Berg Cc: linux-wireless, linux-kernel, stable, fjhhz1997, oscar.alfonso.diaz On April 25, 2026 1:55:46 AM GMT+12:00, Johannes Berg <johannes@sipsolutions.net> wrote: > >I don't believe that all this complexity is necessary, and the code >changes have are fairly clearly LLM-created w/o such disclosures. >Dropping. > Are you saying that the patch itself is created by llm? If yes, is that even possible? I do accept that yourself or experienced devs could come up with the simplest of a solution. My initial patch was spread across 6 or 7 files with a lot of debug lines added to find out the location of vm freeze. It has taken a lot of time to narrow it down to this patch. It's totally ok if you're dropping this but if you could at least see what this code does and do a proper minimal fix yourself, that would help out a lot of people in the community. The only time I used the help of ai and google was during the initial stage trying to understand the different variables, structures, pointers etc. After that it was just me adding a lot of debug lines to all suspected functions but the vm froze even before anything got printed in dmesg. Then i added delay between the debugs and was finally able to see where the freeze happened. This might be totally unnecessary for an experienced dev like you but since I'm new, I found this the easiest way to get to the root of the issue. I also took help from ai and google to help me prepare the patch file in the required format to be sent. I don't understand why you think the whole patch is generated by llm. I wonder if it was that easy to be done. ^ permalink raw reply [flat|nested] 21+ messages in thread
* Re: [PATCH] wifi: mac80211: restore monitor injection when coexisting with another VIF 2026-04-24 13:55 ` Johannes Berg 2026-04-24 14:17 ` Óscar Alfonso Díaz 2026-04-24 17:22 ` Brite @ 2026-04-25 0:34 ` Brite 2 siblings, 0 replies; 21+ messages in thread From: Brite @ 2026-04-25 0:34 UTC (permalink / raw) To: Johannes Berg Cc: linux-wireless, linux-kernel, stable, fjhhz1997, oscar.alfonso.diaz On April 25, 2026 1:55:46 AM GMT+12:00, Johannes Berg <johannes@sipsolutions.net> wrote: >I don't believe that all this complexity is necessary, and the code >changes have are fairly clearly LLM-created w/o such disclosures. >Dropping. > If it helps in any way - just tested your v2 patch which causes VM freeze but adding the 5ghz surrogate patch solves the freeze and also the issue with 5ghz deauth in ap/monitor mode coexistence. Tested working on 2.4/5ghz standalone and 2.4/5ghz ap/coexistence mode using ath9k_htc and mt7921u. Also tested side by side ap/deauth coexistence mode running evil twin attack using airgeddon multi instance mode including channel change monitor and no issues at all. Brite ^ permalink raw reply [flat|nested] 21+ messages in thread
* Re: [PATCH] wifi: mac80211: restore monitor injection when coexisting with another VIF 2026-04-24 12:08 ` [PATCH] wifi: mac80211: restore monitor injection when coexisting with another VIF Brite 2026-04-24 12:17 ` Greg KH 2026-04-24 13:55 ` Johannes Berg @ 2026-04-25 1:47 ` Lachlan Hodges 2026-04-25 2:43 ` Brite 2 siblings, 1 reply; 21+ messages in thread From: Lachlan Hodges @ 2026-04-25 1:47 UTC (permalink / raw) To: Brite Cc: Johannes Berg, linux-wireless, linux-kernel, stable, fjhhz1997, oscar.alfonso.diaz Hi, I will leave implementation discussion to Johannes, but I have some generic feedback; > + * Context: Must be called with wiphy->mtx held. > + * Always process context - GFP_KERNEL is safe and appropriate. This comment seems redundant given the lockdep assert? > + */ > +void ieee80211_update_sole_chandef(struct ieee80211_local *local) > +{ > + struct ieee80211_chanctx *ctx, *found = NULL; > + struct ieee80211_sole_chandef *snap = NULL; > + struct ieee80211_sole_chandef *old; Don't align the local names i.e struct ieee80211_chanctx *ctx, *found = NULL; struct ieee80211_sole_chandef *snap = NULL; ... > + if (found) { > + snap = kmalloc(sizeof(*snap), GFP_KERNEL); > + if (snap) > + snap->def = found->conf.def; > + /* alloc failure -> snap == NULL -> publish NULL below */ Same here - this comment adds no value > struct ieee80211_chanctx_user_iter { > struct ieee80211_chan_req *chanreq; > struct ieee80211_sub_if_data *sdata; > @@ -729,6 +784,9 @@ static void ieee80211_change_chanctx(struct ieee80211_local *local, > const struct ieee80211_chan_req *chanreq) > { > _ieee80211_change_chanctx(local, ctx, old_ctx, chanreq, NULL); > + > + /* Hook 4/4: channel parameters changed; refresh snapshot */ > + ieee80211_update_sole_chandef(local); Without the context of this patch, there is no way to understand what this is doing (same with 3/4). The comment doesn't help and the general idea of a "sole chandef" seems strange. hw.conf.chandef is also a sole chandef? > +/* Defined in chan.c */ > +void ieee80211_update_sole_chandef(struct ieee80211_local *local); Another comment not needed > + /* > + * All interfaces are gone by this point, so every chanctx has been > + * freed and ieee80211_update_sole_chandef() has already published > + * NULL. Assert the invariant. > + */ > + WARN_ON_ONCE(rcu_access_pointer(local->sole_chandef)); Seems unnecessary? > - if (chanctx_conf) > + if (chanctx_conf) { > chandef = &chanctx_conf->def; > - else > - goto fail_rcu; > + } else { > + /* > + * Real-chanctx drivers (e.g. mt76) do not assign a chanctx to > + * the monitor VIF, so vif.bss_conf.chanctx_conf is NULL here. > + * Fall back to the sole_chandef snapshot maintained by > + * ieee80211_update_sole_chandef(). NULL means MCC or no active > + * channel - drop the frame. > + * > + * The snapshot is valid for this whole function: it is freed > + * via kfree_rcu() after a full grace period, and we are inside > + * rcu_read_lock() throughout. > + */ is the bottom half of this comment really needed? > + struct ieee80211_sole_chandef *sole = > + rcu_dereference(local->sole_chandef); > + chandef = sole ? &sole->def : NULL; nit: space after local declaration > + list_for_each_entry_rcu(tmp_sdata, &local->interfaces, list) { > + struct ieee80211_chanctx_conf *tx_conf; > + > + if (!ieee80211_sdata_running(tmp_sdata)) > + continue; > + if (tmp_sdata->vif.type == NL80211_IFTYPE_MONITOR || > + tmp_sdata->vif.type == NL80211_IFTYPE_AP_VLAN) > + continue; > + > + tx_conf = rcu_dereference(tmp_sdata->vif.bss_conf.chanctx_conf); > + nit: remove this space after tx_conf = .. lachlan ^ permalink raw reply [flat|nested] 21+ messages in thread
* Re: [PATCH] wifi: mac80211: restore monitor injection when coexisting with another VIF 2026-04-25 1:47 ` Lachlan Hodges @ 2026-04-25 2:43 ` Brite 2026-04-26 9:25 ` Óscar Alfonso Díaz 0 siblings, 1 reply; 21+ messages in thread From: Brite @ 2026-04-25 2:43 UTC (permalink / raw) To: Lachlan Hodges Cc: Johannes Berg, linux-wireless, linux-kernel, stable, fjhhz1997, oscar.alfonso.diaz On April 25, 2026 1:47:28 PM GMT+12:00, Lachlan Hodges <lachlan.hodges@morsemicro.com> wrote: >Hi, > >I will leave implementation discussion to Johannes, but I have some >generic feedback; > Thanks for the feedback and now i know why the code was flagged as llm created. My approach to finding the vm freeze issue followed by the 5ghz deauth not working, was done using debug prints everywhere possible, with added delays between function calls(the delay was added because the vm froze otherwise, without any dmesg logs). Since I didn't have the proper knowledge, the fixes i tried initially (spread across 6 or 7 files) led to other issues, intermittent failures etc. Everything was done inside a kali VM with no comments, full of messy code, not using git commits to revert etc. i had to start from scratch but then i added comments alongside. Even though the initial patch fixed every issue, being too invasive, I tried to trim down as much as I could which landed the sole chandef and then the 5ghz patch. I didn't pay attention to improving the comments when removing code sections. I also had very limited time to spare for this and my intention as I said in the airgeddon discord channel was to send a cleaned up code to the kernel devs so that they could get a hint at what the issue is and come up with a proper fix. The commit message is what i summed up from doing all my research and testing. I didn't know the format to submit a patch, so i used information from AI, Google, previous threads/replies etc here to submit an email. I didn't check if AI changed any comments. As I mentioned earlier, a community had been waiting for so long to have this issue fixed. My sole intention was to find anything that helps with resolving this. I've also packaged 6.18, 6.19 and 7.0 with the patch and uploaded it for the users now but as Oscar said the proper way would be a fix in the upstream and backporting it. If v2 patch by Johannes(no need for sole_chandef) + 5ghz patch from me fixes the whole issue(I've tested this today) please look into improving it and providing a fix. Thanks ^ permalink raw reply [flat|nested] 21+ messages in thread
* Re: [PATCH] wifi: mac80211: restore monitor injection when coexisting with another VIF 2026-04-25 2:43 ` Brite @ 2026-04-26 9:25 ` Óscar Alfonso Díaz 0 siblings, 0 replies; 21+ messages in thread From: Óscar Alfonso Díaz @ 2026-04-26 9:25 UTC (permalink / raw) To: Brite Cc: Lachlan Hodges, Johannes Berg, linux-wireless, linux-kernel, stable, fjhhz1997 Hello. I've tested as well the johannes v2 patch + the 5ghz fix and it works very well. I've tested normal DoS, 5ghz DoS and VIF+DoS using a MediaTek chipset and also a Ralink chipset. Everything worked like a charm. I must say this patch is pretty simple... just modifying one file (tx.c) and it is a minimum change (not done by LLM). I think this is the best approach. What do you think Johannes? Regards. -- Oscar OpenPGP Key: DA9C60E9 || https://pgp.mit.edu/pks/lookup?op=get&search=0x79B17260DA9C60E9 4F74 B302 354D 817D DE38 0A43 79B1 7260 DA9C 60E9 -- El sáb, 25 abr 2026 a las 4:43, Brite (<brite.airgeddon@gmail.com>) escribió: > > > > On April 25, 2026 1:47:28 PM GMT+12:00, Lachlan Hodges <lachlan.hodges@morsemicro.com> wrote: > >Hi, > > > >I will leave implementation discussion to Johannes, but I have some > >generic feedback; > > > Thanks for the feedback and now i know why the code was flagged as llm created. My approach to finding the vm freeze issue followed by the 5ghz deauth not working, was done using debug prints everywhere possible, with added delays between function calls(the delay was added because the vm froze otherwise, without any dmesg logs). Since I didn't have the proper knowledge, the fixes i tried initially (spread across 6 or 7 files) led to other issues, intermittent failures etc. Everything was done inside a kali VM with no comments, full of messy code, not using git commits to revert etc. i had to start from scratch but then i added comments alongside. Even though the initial patch fixed every issue, being too invasive, I tried to trim down as much as I could which landed the sole chandef and then the 5ghz patch. I didn't pay attention to improving the comments when removing code sections. I also had very limited time to spare for this and my intention as I said in the airgeddon discord channel was to send a cleaned up code to the kernel devs so that they could get a hint at what the issue is and come up with a proper fix. The commit message is what i summed up from doing all my research and testing. I didn't know the format to submit a patch, so i used information from AI, Google, previous threads/replies etc here to submit an email. I didn't check if AI changed any comments. > As I mentioned earlier, a community had been waiting for so long to have this issue fixed. My sole intention was to find anything that helps with resolving this. I've also packaged 6.18, 6.19 and 7.0 with the patch and uploaded it for the users now but as Oscar said the proper way would be a fix in the upstream and backporting it. > If v2 patch by Johannes(no need for sole_chandef) + 5ghz patch from me fixes the whole issue(I've tested this today) please look into improving it and providing a fix. > Thanks ^ permalink raw reply [flat|nested] 21+ messages in thread
end of thread, other threads:[~2026-04-26 9:25 UTC | newest]
Thread overview: 21+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2026-03-08 16:45 [PATCH] wifi: mac80211: fix monitor mode frame capture for real chanctx drivers 傅继晗
2026-03-09 6:53 ` Johannes Berg
2026-03-09 10:45 ` 傅继晗
2026-03-16 10:38 ` Johannes Berg
[not found] ` <CA+bbHrX+xby2_drzo0457raoz-kgQ6eTCCHU91pR5BkvzMiq_A@mail.gmail.com>
2026-03-19 11:40 ` Óscar Alfonso Díaz
2026-03-25 0:15 ` 傅继晗
2026-03-25 10:59 ` Óscar Alfonso Díaz
2026-03-26 1:37 ` [PATCH v2] wifi: mac80211: fix the issue of NULL pointer access when deleting the virtual interface 傅继晗
2026-03-26 12:16 ` Óscar Alfonso Díaz
2026-03-29 21:55 ` Óscar Alfonso Díaz
2026-04-02 0:06 ` Óscar Alfonso Díaz
2026-04-21 8:50 ` Óscar Alfonso Díaz
2026-04-24 12:08 ` [PATCH] wifi: mac80211: restore monitor injection when coexisting with another VIF Brite
2026-04-24 12:17 ` Greg KH
2026-04-24 13:55 ` Johannes Berg
2026-04-24 14:17 ` Óscar Alfonso Díaz
2026-04-24 17:22 ` Brite
2026-04-25 0:34 ` Brite
2026-04-25 1:47 ` Lachlan Hodges
2026-04-25 2:43 ` Brite
2026-04-26 9:25 ` Óscar Alfonso Díaz
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox