[PATCH] Revert "wpa_supplicant: Send EAPOL frames over nl80211 where available"

Krishna Chaitanya chaitanya.mgit at gmail.com
Wed Jul 19 10:08:08 PDT 2023


On Wed, Jul 19, 2023 at 10:29 PM Fabio Estevam <festevam at gmail.com> wrote:
>
> Hi Krishna,
>
> On Wed, Jul 19, 2023 at 1:50 PM Krishna Chaitanya
> <chaitanya.mgit at gmail.com> wrote:
>
> > Looking at https://unix.stackexchange.com/a/542952 doesn't look like a WPA
> > supplicant issue, can you please try without the patch and with the
> > steps given in the answer?
>
> Not sure why you state this is not a wpa_supplicant issue. I ran a
> long bisect and found a commit that caused regression.
>
> After reverting such a commit, the Wifi connection works again.
I am not saying it isn't, just based on a quick search it looked unlikely.
I had worked on the patch with Brendan, so, it could just be that not
using NL80211
for EAPoL might just be masking the issue somehow.
>
> Also, there are lots of replies in that thread, not sure which is one
> you want me to test.
The link points to a specific answer. Copying the commands that worked
for the OP below:

nmcli con delete <SSID>
nmcli dev wifi connect <SSID> password <password>

Basically, it says, if the network was added with open security and
then updated to security,
then the network manager might not have updated it causing the issue,
though if that was the case
I am not sure how reverting this patch might have helped. Anyways,
good to give it a try.



More information about the Hostap mailing list