[PATCH] Revert "wpa_supplicant: Send EAPOL frames over nl80211 where available"

Fabio Estevam festevam at gmail.com
Wed Jul 26 11:41:54 PDT 2023


Hi Ben,

On Wed, Jul 26, 2023 at 2:16 PM Ben Greear <greearb at candelatech.com> wrote:

> At one time, ath10k firmware had some weird logic related to trying to coordinate
> 4-way handshake with setting keys.  I'm not sure that was ever changed in upstream
> firmware, so possibly you are hitting that bug/race.

I only have access to the QCA9377 firmware from the upstream
linux-firmware repo:

ath10k_sdio mmc1:0001:1: qca9377 hw1.1 sdio target 0x05020001 chip_id
0x00000000 sub 0000:0000
ath10k_sdio mmc1:0001:1: kconfig debug 0 debugfs 0 tracing 0 dfs 0 testmode 0
ath10k_sdio mmc1:0001:1: firmware ver WLAN.TF.1.1.1-00061-QCATFSWPZ-1
api 5 features ignore-otp crc32 7746e551
ath10k_sdio mmc1:0001:1: failed to fetch board data for
bus=sdio,vendor=0271,device=0701,subsystem-vendor=0000,subsystem-device=0000
from ath10k/QCA9377/hw1.0/board-2.bin
ath10k_sdio mmc1:0001:1: board_file api 1 bmi_id N/A crc32 544289f7
ath10k_sdio mmc1:0001:1: htt-ver 3.32 wmi-op 4 htt-op 3 cal otp
max-sta 32 raw 0 hwcrypto 1

> We use recent supplicant and ath10k and do not notice any problems, but we also use
> our modified ath10k firmware that changes how the 4-way and key-setting is handled,
> as well as plenty of patches to ath10k driver that may or may not have some affect
> on this path.
>
> We also run with this supplicant patch, among a pile of others, possibly one of these makes
> a difference:
>
> https://github.com/greearb/hostap-ct/commit/c614b56d0c9073b27f2d1dfdfd014a068ab2c65f

Tried this specific patch, but it did not help. Still get the 'wlan0:
Unknown event 37' message and authentication fails.

Thanks,

Fabio Estevam



More information about the Hostap mailing list