[PATCH] l2_packet: fix eloop leak when using l2_packet_none
Jouni Malinen
j
Mon Apr 14 13:09:48 PDT 2014
On Mon, Apr 14, 2014 at 01:48:42PM +0200, Maxime Bizon wrote:
> if you don't have CONFIG_L2_PACKET=y, it happens to use l2_packet_none
> implementation automatically
>
> I don't have CONFIG_RSN_PREAUTH so it is not selected automatically
>
> the code looked more to me like a "do nothing" layer instead of a
> reference implementation
Ah, I see. Somehow I did not even remember this being a possibility
anymore since l2_packet is used in number of places and wpa_supplicant
uses l2_packet_linux.c by default. Anyway, I see now that this is not
the case for hostapd.
> I've not tested this, but since my eloop patch was applied (assert(fd !=
> -1)), usage of l2_packet_none should not be possible anymore.
>
> maybe we should leave l2_packet_none as-is or rename it and use empty
> static inline functions when we don't need it ?
It's fine to just skip the eloop_register_read_sock() call while leaving
the example there. I'll fix this.
--
Jouni Malinen PGP id EFC895FA
More information about the Hostap
mailing list