Endless loop with 'wpa_cli -g /var/run/wpa_supplicant_if_wiphy0'
Ben Greear
greearb at candelatech.com
Wed Jun 7 11:32:57 PDT 2017
While trying to figure out how to get wpa-cli related events, I notice
that if I start wpa_cli like this:
[root at lf0350-7220 lanforge]# wpa_cli -g /var/run/wpa_supplicant_if_wiphy0
wpa_cli v2.7-devel-hostap_2_3-5027-gd3f2ce9+
Copyright (c) 2004-2017, Jouni Malinen <j at w1.fi> and contributors
This software may be distributed under the terms of the BSD license.
See README for more details.
^C
Then, the supplicant logs spam endlessly:
1496860152.726163: CTRL-DEBUG: global_ctrl_sock-sendto: sock=5 sndbuf=212992 outq=0 send_len=16
1496860152.726277: RX global ctrl_iface - hexdump_ascii(len=24):
53 54 41 2d 4e 45 58 54 20 55 4e 4b 4e 4f 57 4e STA-NEXT UNKNOWN
20 43 4f 4d 4d 41 4e 44 COMMAND
1496860152.726349: CTRL-DEBUG: global_ctrl_sock-sendto: sock=5 sndbuf=212992 outq=0 send_len=16
1496860152.726555: RX global ctrl_iface - hexdump_ascii(len=24):
53 54 41 2d 4e 45 58 54 20 55 4e 4b 4e 4f 57 4e STA-NEXT UNKNOWN
20 43 4f 4d 4d 41 4e 44 COMMAND
1496860152.726627: CTRL-DEBUG: global_ctrl_sock-sendto: sock=5 sndbuf=212992 outq=0 send_len=16
1496860152.726786: RX global ctrl_iface - hexdump_ascii(len=24):
53 54 41 2d 4e 45 58 54 20 55 4e 4b 4e 4f 57 4e STA-NEXT UNKNOWN
20 43 4f 4d 4d 41 4e 44 COMMAND
1496860152.726863: CTRL-DEBUG: global_ctrl_sock-sendto: sock=5 sndbuf=212992 outq=0 send_len=16
1496860152.727062: RX global ctrl_iface - hexdump_ascii(len=24):
53 54 41 2d 4e 45 58 54 20 55 4e 4b 4e 4f 57 4e STA-NEXT UNKNOWN
20 43 4f 4d 4d 41 4e 44 COMMAND
....
I saw a LEDE patch that appeared to try to hack around this or a similar issue, but I guess
that never made it upstream.
http://lists.infradead.org/pipermail/lede-dev/2017-April/007002.html
Any suggestions for the proper way to fix this?
Thanks,
Ben
--
Ben Greear <greearb at candelatech.com>
Candela Technologies Inc http://www.candelatech.com
More information about the Hostap
mailing list