version 5.7 hostapd caused deauth error on madwifi driver and crashed with Oops
hong zhang
henryzhang
Mon Mar 26 14:03:04 PDT 2007
List,
"hostapd ap_conf -dd" returns deauth error and crashed on madwifi driver 9.3.
No crash with ap_conf when some items are commented out see following but still has deauth error. Uncomment any item in the ap-conf will crash. Following has ap_conf and oops.
*************ap_conf************************
interface=ath0
driver=madwifi
logger_syslog=-1
logger_syslog_level=2
logger_stdout=-1
logger_stdout_level=2
#debug=0
#dump_file=/tmp/hostapd.dump
ctrl_interface=/var/run/hostapd
ctrl_interface_group=0
#ssid=wpa
#macaddr_acl=0
#auth_algs=3
#eap_server=0
#wpa=3
#wpa_passphrase=meshsales
#wpa_key_mgmt=WPA-PSK
#wpa_pairwise=TKIP CCMP
****** Oops msg if any commented item is uncommented ****************
# hostapd ap_wpa.conf -dd
Configuration file: ap_wpa.conf
ctrl_interface_group=0
madwifi_set_iface_flags: dev_up=0
madwifi_set_privacy: enabled=0
BSS count 1, BSSID mask ff:ff:ff:ff:ff:ff (0 bits)
SIOCGIWRANGE: WE(compiled)=19 WE(source)=13 enc_capa=0xf
ath0: IEEE 802.11 Fetching hardware channel/rate support not supported.
Flushing old station entries
madwifi_sta_deauth: addr=ff:ff:ff:ff:ff:ff reason_code=3
ioctl[IEEE80211_IOCTL_SETMLME]: Invalid argument
madwifi_sta_deauth: Failed to deauth STA (addr ff:ff:ff:ff:ff:ff reason 3)
Could not connect to kernel driver.
Deauthenticate all stations
madwifi_del_key: addr=00:00:00:00:00:00 key_idx=0
madwifi_del_key: addr=00:00:00:00:00:00 key_idx=1
madwifi_del_key: addr=00:00:00:00:00:00 key_idx=2
madwifi_del_key: addr=00:00:00:00:00:00 key_idx=3
Using interface ath0 with hwaddr 00:0b:6b:57:ad:75 and ssid 'wpa'
SSID - hexdump_ascii(len=3):
77 70 61 wpa
PSK (ASCII passphrase) - hexdump_ascii(len=9):
6d 65 73 68 73 61 6c 65 73 meshsales
PSK (from passphrase) - hexdump(len=32): 3c 77 89 46 88 7d e9 16 34 fe 10 19 c6 1f 2b be 2c ed 0madwifi_set_ieee8021x: enabled=1
madwifi_configure_wpa: group key cipher=1
madwifi_cBad mode in data abort handler detected: mode IRQ_32
Internal error: Oops - bad mode: 0 [#1]
Modules linked in: wlan_ccmp wlan_acl wlan_tkip wlan_xauth wlan_wep mport if_child ath_pci wlaneCPU: 0
PC is at 0xffff0204
LR is at zz002db51c+0x44/0x3c8 [ath_hal]
pc : [<ffff0204>] lr : [<bf0f3018>] Tainted: P
sp : c3a43d10 ip : c3a43d58 fp : c3a43d78
r10: c0378000 r9 : 00000006 r8 : c03ce000
r7 : 00000000 r6 : c0378000 r5 : c0378000 r4 : c037a688
r3 : c58a0000 r2 : c0378000 r1 : 00009930 r0 : c0378000
Flags: nzCv IRQs off FIQs on Mode IRQ_32 Segment user
Control: 39FF Table: 03CD8000 DAC: 00000015
Process hostapd (pid: 844, stack limit = 0xc3a42194)
Stack: (0xc3a43d10 to 0xc3a44000)
3d00: c0378000 00009930 c0378000 c58a0000
3d20: c037a688 c0378000 c0378000 00000000 c03ce000 00000006 c0378000 c3a43d78
3d40: c3a43d58 c3a43d10 bf0f3018 ffff0204 20000092 ffffffff 00200000 c0378000
3d60: c03cf188 00000000 c03ce000 c3a43dd0 c3a43d7c bf0ef350 bf0f2fe0 c0378000
3d80: c3a43da0 00200000 00000000 01000000 00000000 c037871c 00000000 00018000
3da0: 00000000 c31b1420 c03ce260 c03cf188 c0378000 c03cef2c c03ce000 00000000
3dc0: 00000f2a c3a43e08 c3a43dd4 bf11d994 bf0ef12c c3a43ddc c3a43de4 c002d4b0
3de0: c03ce000 00000000 c03a8260 c03ce000 00000000 00008914 c3a43eb4 c3a43e20
3e00: c3a43e0c c017bdd4 bf11d8b0 c03a8000 c03ce260 c3a43e44 c3a43e24 bf0bd8c8
3e20: c017bd44 c03a8000 00000000 00001002 00000000 ffffff9d c3a43e54 c3a43e48
3e40: bf0bd8fc bf0bd7a8 c3a43e6c c3a43e58 c017bdd4 bf0bd8f4 c03a8000 00001003
3e60: c3a43e8c c3a43e70 c017d7e8 c017bd44 00000000 be962d6c 00000000 c3a42000
3e80: c3a43efc c3a43e90 c01bec60 c017d790 00000014 00000000 00000000 c03a8000
3ea0: 00000000 10030000 00000000 00000000 00000000 61746830 00000000 00000000
3ec0: 00000000 10030000 00000000 00000000 00000000 00008914 be962d6c ffffffe7
3ee0: be962d6c c0021e64 c3a42000 00058770 c3a43f14 c3a43f00 c01c1084 c01be988
3f00: be962d6c 00008914 c3a43f38 c3a43f18 c0171fdc c01c0efc be962d6c be962d6c
3f20: ffffffe7 00008914 c0021e64 c3a43f58 c3a43f3c c008bbd0 c0171f24 c3bed6e0
3f40: be962d6c 00000003 00000000 c3a43f80 c3a43f5c c008bd60 c008bb68 c3a43f74
3f60: 00000000 fffffff7 be962d6c 00008914 c3bed6e0 c3a43fa4 c3a43f84 c008bf48
3f80: c008bcf8 00000000 be962d6c 00059b00 00000001 00000036 00000000 c3a43fa8
3fa0: c0021ce0 c008bf10 be962d6c 00059b00 00000003 00008914 be962d6c 00001003
3fc0: be962d6c 00059b00 00000001 000593e0 000587f8 00000000 00058770 00000000
3fe0: 00057a7c be962d6c 00032ee4 40212104 20000010 00000003 cc33cc33 cc33cc33
Backtrace:
[<bf0f2fd4>] (zz002db51c+0x0/0x3c8 [ath_hal]) from [<bf0ef350>] (zz0002dbd2+0x230/0xf90 [ath_ha) r8 = C03CE000 r7 = 00000000 r6 = C03CF188 r5 = C0378000
r4 = 00200000
[<bf0ef120>] (zz0002dbd2+0x0/0xf90 [ath_hal]) from [<bf11d994>] (ath_init+0xf0/0x27c [ath_pci])
[<bf11d8a4>] (ath_init+0x0/0x27c [ath_pci]) from [<c017bdd4>] (dev_open+0x9c/0xcc)
[<c017bd38>] (dev_open+0x0/0xcc) from [<bf0bd8c8>] (ieee80211_init+0x12c/0x14c [wlan])
r5 = C03CE260 r4 = C03A8000
[<bf0bd79c>] (ieee80211_init+0x0/0x14c [wlan]) from [<bf0bd8fc>] (ieee80211_open+0x14/0x18 [wla) r8 = FFFFFF9D r7 = 00000000 r6 = 00001002 r5 = 00000000
r4 = C03A8000
[<bf0bd8e8>] (ieee80211_open+0x0/0x18 [wlan]) from [<c017bdd4>] (dev_open+0x9c/0xcc)
[<c017bd38>] (dev_open+0x0/0xcc) from [<c017d7e8>] (dev_change_flags+0x64/0x13c)
r5 = 00001003 r4 = C03A8000
[<c017d784>] (dev_change_flags+0x0/0x13c) from [<c01bec60>] (devinet_ioctl+0x2e4/0x628)
r7 = C3A42000 r6 = 00000000 r5 = BE962D6C r4 = 00000000
[<c01be97c>] (devinet_ioctl+0x0/0x628) from [<c01c1084>] (inet_ioctl+0x194/0x1e4)
[<c01c0ef0>] (inet_ioctl+0x0/0x1e4) from [<c0171fdc>] (sock_ioctl+0xc4/0x2bc)
r5 = 00008914 r4 = BE962D6C
[<c0171f18>] (sock_ioctl+0x0/0x2bc) from [<c008bbd0>] (do_ioctl+0x74/0x8c)
r8 = C0021E64 r7 = 00008914 r6 = FFFFFFE7 r5 = BE962D6C
r4 = BE962D6C
[<c008bb5c>] (do_ioctl+0x0/0x8c) from [<c008bd60>] (vfs_ioctl+0x74/0x218)
r7 = 00000000 r6 = 00000003 r5 = BE962D6C r4 = C3BED6E0
[<c008bcec>] (vfs_ioctl+0x0/0x218) from [<c008bf48>] (sys_ioctl+0x44/0x68)
r7 = C3BED6E0 r6 = 00008914 r5 = BE962D6C r4 = FFFFFFF7
[<c008bf04>] (sys_ioctl+0x0/0x68) from [<c0021ce0>] (ret_fast_syscall+0x0/0x2c)
r7 = 00000036 r6 = 00000001 r5 = 00059B00 r4 = BE962D6C
Code: 00000000 00000000 00000000 e24ee004 (e88d4001)
onfigure_wpa: pairwise key ciphers=0xa
madwifi_configure_wpa: key management algorithms=0x2
madwifi_configure_wpa: rsn capabilities=0x0
madwifi_configure_wpa: enable WPA=0x3
madwifi_set_privacy: enabled=0
WPA: group state machine entering state GTK_INIT (VLAN-ID 0)
GMK - hexdump(len=32): [REMOVED]
GTK - hexdump(len=32): [REMOVED]
WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0)
madwifi_set_key: alg=TKIP addr=00:00:00:00:00:00 key_idx=1
madwifi_set_privacy: enabled=1
madwifi_set_iface_flags: dev_up=1
Segmentation fault
----henry
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.shmoo.com/pipermail/hostap/attachments/20070326/2e9815d2/attachment.htm
More information about the Hostap
mailing list