mirror of
				git://git.openwrt.org/openwrt/openwrt.git
				synced 2025-10-30 13:34:27 -04:00 
			
		
		
		
	This brings many changes, including fixes for a couple of memory leaks, and improved interoperability with 802.11r. There are also many changes related to 802.11be, which is not enabled at this time. Fixed upstream: - 022-hostapd-fix-use-of-uninitialized-stack-variables.patch - 180-driver_nl80211-fix-setting-QoS-map-on-secondary-BSSs.patch - 993-2023-10-28-ACS-Fix-typo-in-bw_40-frequency-array.patch Switch PKG_SOURCE_URL to https, since http is not currently working. Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com> Tested-by: Ilya Katsnelson <me@0upti.me> Tested by: Andrew Sim <andrewsimz@gmail.com>
		
			
				
	
	
		
			35 lines
		
	
	
		
			1.2 KiB
		
	
	
	
		
			Diff
		
	
	
	
	
	
			
		
		
	
	
			35 lines
		
	
	
		
			1.2 KiB
		
	
	
	
		
			Diff
		
	
	
	
	
	
| From: Felix Fietkau <nbd@nbd.name>
 | |
| Date: Mon, 18 Feb 2019 12:57:11 +0100
 | |
| Subject: [PATCH] mesh: allow processing authentication frames in blocked state
 | |
| 
 | |
| If authentication fails repeatedly e.g. because of a weak signal, the link
 | |
| can end up in blocked state. If one of the nodes tries to establish a link
 | |
| again before it is unblocked on the other side, it will block the link to
 | |
| that other side. The same happens on the other side when it unblocks the
 | |
| link. In that scenario, the link never recovers on its own.
 | |
| 
 | |
| To fix this, allow restarting authentication even if the link is in blocked
 | |
| state, but don't initiate the attempt until the blocked period is over.
 | |
| 
 | |
| Signed-off-by: Felix Fietkau <nbd@nbd.name>
 | |
| ---
 | |
| 
 | |
| --- a/src/ap/ieee802_11.c
 | |
| +++ b/src/ap/ieee802_11.c
 | |
| @@ -3032,15 +3032,6 @@ static void handle_auth(struct hostapd_d
 | |
|  				       seq_ctrl);
 | |
|  			return;
 | |
|  		}
 | |
| -#ifdef CONFIG_MESH
 | |
| -		if ((hapd->conf->mesh & MESH_ENABLED) &&
 | |
| -		    sta->plink_state == PLINK_BLOCKED) {
 | |
| -			wpa_printf(MSG_DEBUG, "Mesh peer " MACSTR
 | |
| -				   " is blocked - drop Authentication frame",
 | |
| -				   MAC2STR(sa));
 | |
| -			return;
 | |
| -		}
 | |
| -#endif /* CONFIG_MESH */
 | |
|  #ifdef CONFIG_PASN
 | |
|  		if (auth_alg == WLAN_AUTH_PASN &&
 | |
|  		    (sta->flags & WLAN_STA_ASSOC)) {
 |