Your message dated Fri, 21 Feb 2014 01:18:49 +0000 with message-id <[email protected]> and subject line Bug#737109: fixed in wpa 1.1-1 has caused the Debian Bug report #737109, regarding hostapd: Bridged interface dropped from bridge to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [email protected] immediately.) -- 737109: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737109 Debian Bug Tracking System Contact [email protected] with problems
--- Begin Message ---Package: hostapd Version: 1:1.0-3+b1 Severity: normal Tags: patch Dear Maintainer, I am using hostapd in a bridged wlan/eth setup. The wifi card is 00:08.0 Ethernet controller: Atheros Communications Inc. AR5212/AR5213 Wireless Network Adapter (rev 01) Hostapd config: interface=wlan0 bridge=br0 driver=nl80211 logger_syslog=-1 logger_syslog_level=1 logger_stdout=-1 logger_stdout_level=2 dump_file=/tmp/hostapd.dump ctrl_interface=/var/run/hostapd ctrl_interface_group=0 ssid=XXXX hw_mode=g channel=5 beacon_int=100 dtim_period=2 max_num_sta=255 rts_threshold=2347 fragm_threshold=2346 macaddr_acl=0 auth_algs=1 ignore_broadcast_ssid=0 wme_enabled=1 wme_ac_bk_cwmin=4 wme_ac_bk_cwmax=10 wme_ac_bk_aifs=7 wme_ac_bk_txop_limit=0 wme_ac_bk_acm=0 wme_ac_be_aifs=3 wme_ac_be_cwmin=4 wme_ac_be_cwmax=10 wme_ac_be_txop_limit=0 wme_ac_be_acm=0 wme_ac_vi_aifs=2 wme_ac_vi_cwmin=3 wme_ac_vi_cwmax=4 wme_ac_vi_txop_limit=94 wme_ac_vi_acm=0 wme_ac_vo_aifs=2 wme_ac_vo_cwmin=2 wme_ac_vo_cwmax=3 wme_ac_vo_txop_limit=47 wme_ac_vo_acm=0 ap_max_inactivity=300 eapol_key_index_workaround=0 eap_server=0 own_ip_addr=127.0.0.1 wpa=3 wpa_passphrase=XXXXXX wpa_key_mgmt=WPA-PSK wpa_pairwise=TKIP rsn_pairwise=CCMP When using hostapd/stable, clients using the wlan are sometimes suddenly unable to communicate through the bridge and wlan0 is no longer present in the output of brctl show br0. At the same time syslog shows: /var/log/syslog.2.gz:Jan 19 11:31:07 titan kernel: device wlan0.sta1 entered promiscuous mode /var/log/syslog.2.gz:Jan 19 11:31:07 titan kernel: br0: port 3(wlan0.sta1) entering forwarding state /var/log/syslog.2.gz:Jan 19 11:31:07 titan kernel: br0: port 3(wlan0.sta1) entering forwarding state /var/log/syslog.2.gz:Jan 19 11:31:11 titan ntpd[3468]: Listen normally on 19 wlan0.sta1 fe80::20f:3dff:feaa:96f0 UDP 123 /var/log/syslog.2.gz:Jan 19 11:31:18 titan kernel: wlan0.sta1: no IPv6 routers present /var/log/syslog.2.gz:Jan 19 11:31:22 titan kernel: br0: port 3(wlan0.sta1) entering forwarding state /var/log/syslog.2.gz:Jan 19 11:31:22 titan kernel: device wlan0.sta1 left promiscuous mode /var/log/syslog.2.gz:Jan 19 11:31:22 titan kernel: br0: port 3(wlan0.sta1) entering disabled state /var/log/syslog.2.gz:Jan 19 11:31:24 titan ntpd[3468]: Deleting interface #19 wlan0.sta1, fe80::20f:3dff:feaa:96f0#123, interface stats: received=0, sent=0, dropped=0, active_time=13 secs Wireless traffic across the bridge can be restored by adding wlan0 back to the bridge with brctl addif br0 wlan0 There is a similar ticket in the OpenWRT lists at https://dev.openwrt.org/ticket/9257 Their fix is https://dev.openwrt.org/changeset/26724 I have rebuilt hostapd with an updated version of the same patch and it also seems to fix the problem for me. Perhaps you would consider including it? My patch below. The only change I made to the OpenWRT version was to reflect the move of drv->ioctl_sock to drv->global->ioctl_sock and to refresh the line numbers. Best wishes Mark Description: Port of patch from OpenWRT (https://dev.openwrt.org/browser/trunk/package/hostapd/patches/730-fix_wds_bridge_handling.patch?rev=26724) to fix Bridge on wireless AP loses wlan0 when WDS station disassociates Author: Mark Hindley <[email protected]> --- a/src/drivers/driver_nl80211.c +++ b/src/drivers/driver_nl80211.c @@ -6528,6 +6528,9 @@ linux_set_iface_flags(drv->global->ioctl_sock, name, 1); return i802_set_sta_vlan(priv, addr, name, 0); } else { + if (bridge_ifname) + linux_br_del_if(drv->global->ioctl_sock, bridge_ifname, name); + i802_set_sta_vlan(priv, addr, bss->ifname, 0); return wpa_driver_nl80211_if_remove(priv, WPA_IF_AP_VLAN, name); @@ -6887,14 +6890,14 @@ return -1; #ifdef HOSTAPD - if (bss->added_if_into_bridge) { + if (type == WPA_IF_AP_BSS && bss->added_if_into_bridge) { if (linux_br_del_if(drv->global->ioctl_sock, bss->brname, bss->ifname) < 0) wpa_printf(MSG_INFO, "nl80211: Failed to remove " "interface %s from bridge %s: %s", bss->ifname, bss->brname, strerror(errno)); } - if (bss->added_bridge) { + if (type == WPA_IF_AP_BSS && bss->added_bridge) { if (linux_br_del(drv->global->ioctl_sock, bss->brname) < 0) wpa_printf(MSG_INFO, "nl80211: Failed to remove " "bridge %s: %s", -- System Information: Debian Release: 7.3 APT prefers stable APT policy: (900, 'stable'), (400, 'testing') Architecture: i386 (i586) Kernel: Linux 2.6.35.4-mk6 (PREEMPT) Locale: LANG=en_GB, LC_CTYPE=en_GB (charmap=ISO-8859-1) Shell: /bin/sh linked to /bin/dash Versions of packages hostapd depends on: ii initscripts 2.88dsf-41+deb7u1 ii libc6 2.13-38 ii libnl-3-200 3.2.7-4 ii libnl-genl-3-200 3.2.7-4 ii libssl1.0.0 1.0.1e-2+deb7u3 ii lsb-base 4.1+Debian8+deb7u1 hostapd recommends no packages. hostapd suggests no packages. -- Configuration Files: /etc/hostapd/hostapd.conf changed -- no debconf information
--- End Message ---
--- Begin Message ---Source: wpa Source-Version: 1.1-1 We believe that the bug you reported is fixed in the latest version of wpa, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [email protected], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Stefan Lippers-Hollmann <[email protected]> (supplier of updated wpa package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [email protected]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Format: 1.8 Date: Fri, 21 Feb 2014 01:07:28 +0100 Source: wpa Binary: hostapd wpagui wpasupplicant wpasupplicant-udeb Architecture: source amd64 Version: 1.1-1 Distribution: unstable Urgency: medium Maintainer: Debian wpasupplicant Maintainers <[email protected]> Changed-By: Stefan Lippers-Hollmann <[email protected]> Description: hostapd - user space IEEE 802.11 AP and IEEE 802.1X/WPA/WPA2/EAP Authentica wpagui - graphical user interface for wpa_supplicant wpasupplicant - client support for WPA and WPA2 (IEEE 802.11i) wpasupplicant-udeb - Client support for WPA and WPA2 (IEEE 802.11i) (udeb) Closes: 678147 685685 690536 711063 725865 728092 734422 737109 737465 Changes: wpa (1.1-1) unstable; urgency=medium . * New upstream release: - drop 11_wpa_gui_ftbfs_gcc_4_7, applied upstream. - drop EAP-TLS-server_fix-TLS-Message-length-validation, applied upstream. - fixes: - EAP access point constantly roaming with proactive key caching (Closes: #711063). * enable IBSS RSN, thanks to Nicolas Cavallari <[email protected]> (Closes: #678147). * enable simple AP support for wpasupplicant, thanks to Patrik Flykt <[email protected]> (Closes: #690536). * use the readline6, wpa_cli doesn't link to openssl. * link with --as-needed. * compress binaries with xz. * debian/get-orig-source: switch to xz compressed upstream tarballs. * debian/get-orig-source: adapt for the post 1.x upstream branch. * debian/get-orig-source: support named snapshots, see debian/README.source for detailed syntax and semantics. * debian/README.source: explain fetching git snapshots by specifying their git hash. * debian/README.source: update to match current reality and apply grammar fixes. * debian/README.source: drop trailing whitespace. * fix hardening flags, thanks a lot to Florent Daigniere <[email protected]> (Closes: #725865). * debian/control: fold dependencies. * bump standards version to 3.9.5, no changes necessary. * reflect reality and adapt the maintainer mail address not to claim representing Ubuntu. * drop wheezy-specific comments in the configuration files. * glob 'wpa-password' as well and hide its debugging output, this hopefully closes: #728092. * enable EAP-FAST, openssl in Debian is now new enough (Closes: #685685). * update to new alioth URIs (vcs-field-not-canonical). * add Keywords entry for desktop files (desktop-entry-lacks-keywords-entry). * functions.sh: s/particuarly/particularly/, thanks to Vincent Lefevre <[email protected]> (Closes: #734422). * fix FTBS using gcc-4.8 by linking with -ldl on kfreebsd-any; the udeb packages don't provide EAP support and are therefore unaffected. This is already accounted for by the upstream Makefile, however wrongly depending on !CONFIG_DRIVER_BSD, while it is actually depending on the target libc rather than the kernel (Closes: #737465). Thanks to Cyril Brulebois <[email protected]> and Steven Chamberlain <[email protected]>. * import "hostapd: Fix WDS VLAN bridge handling" by Felix Fietkau <[email protected]> from upstream, thanks to Mark Hindley <[email protected]> (Closes: #737109). * drop build-conflicts with libqt3-dev as the package is no longer available >= lenny, thanks to Michael Biebl <[email protected]>. * drop pre-dependency on dpkg (>= 1.15.6~), data.tar.xz-member-without-dpkg- pre-depends is no longer a problem after Ubuntu lucid is EOL. Thanks to Michael Biebl for noticing. * drop build-dependency on libdbus-glib-1-dev, it is no longer required for dbus-binding-tool, thanks to Michael Biebl. * allow parallel building. * fix spelling s/algorith/algorithm/. * add lintian overrides for false positive spelling complaints. Checksums-Sha1: 097dc4139d098af5bc65f6a8140c59576e52d6a7 2370 wpa_1.1-1.dsc 37607bf2574c586eac9dfa59f33c47a082f9c4e9 1377520 wpa_1.1.orig.tar.xz 3f1b9762030aa6fc15bf6e622916c3b93d612531 73836 wpa_1.1-1.debian.tar.xz 190c0758901b80ec79992f76e3ccea1f3e1334a9 416942 hostapd_1.1-1_amd64.deb e7cde11e25acaeec07d2040d9d65b1bff4369a13 331770 wpagui_1.1-1_amd64.deb 27f1559ce06095ef91a46947c8e42fd8b3d0c34f 704466 wpasupplicant_1.1-1_amd64.deb 2283844b8b5a7b742dd155522069a75f174505df 157368 wpasupplicant-udeb_1.1-1_amd64.udeb Checksums-Sha256: e814e09174bbdc595818f2553928ab18a8a1e2c0d94b427ca70f6c8420a270d2 2370 wpa_1.1-1.dsc 01c842c26ec94aae45c26e0755a34d5bb629505610119f63ce971c8dc390ea09 1377520 wpa_1.1.orig.tar.xz df917c6ab87d8829f0d0c4683c6390508ac725bc19721de37357f1557bf65528 73836 wpa_1.1-1.debian.tar.xz 3e10c602801a947c69ac5f742af50fbcaec934b859cc900a24ac7797daf5a5c3 416942 hostapd_1.1-1_amd64.deb 3ad6abf7e8f49c1c673bcb95d630b9fc01e2ca954b78a54b6b9d4ef610c8759c 331770 wpagui_1.1-1_amd64.deb 2582d4894b38dbef1a2eed0c8ee7808aaf884f2d88b2faca454b547280306c6d 704466 wpasupplicant_1.1-1_amd64.deb 91350fa6983ff889e1562da6ee885d29db8549def93d614276497bf7e433c2c2 157368 wpasupplicant-udeb_1.1-1_amd64.udeb Files: f6e33f14afb223ec763aba04d68f3b2b 2370 net optional wpa_1.1-1.dsc adda2fa2716964dd5769592d79101fc8 1377520 net optional wpa_1.1.orig.tar.xz 792146a582108e7f5c31390eecd53141 73836 net optional wpa_1.1-1.debian.tar.xz 7bb1155d3c135bc0235ac9dde5848d66 416942 net optional hostapd_1.1-1_amd64.deb ac2a81b2cf7f272c6e51fa8fa5295659 331770 net optional wpagui_1.1-1_amd64.deb a15c6543dbdfdac870d1a346fa4d970b 704466 net optional wpasupplicant_1.1-1_amd64.deb 20510f6a4372ad5d34e2d47b8aaa1420 157368 debian-installer standard wpasupplicant-udeb_1.1-1_amd64.udeb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCAAGBQJTBqYKAAoJEGrh3w1gjyLcvk4P/1Tvg8v64FPj6pQ2SCy5etMz Wetxdafgdt5XSfeFzj2KJOdnSkCEl6e8EvjR9SH8HAP6UAC9pcM5V5PdepucqoaM qO4fu7lLmV8hwqQ1FukwmFrIiwcpJlp0oedw2YuAbrOCBIH/2omK53Ufx6fOIdTS TMnhbdq8Tu68LybXAMYU+yZxD7AhxQPBp182SfGKqT2BuNdE37npnGA6v6tup/kk rL0lqunNiGlM7qcskOQTsS0O+mL2ghra8dc50kKu0M7nUSYFh+eZ0vH72GlPFy27 GgLtks8BCZtZQLdNf++gWKfukdKXWfznd65wb6tzDKWq1ucbtuDZU9m4loTqDtcC RABORlFWvehdartLUbve2UlzzHPeexRBSq9Z9E9aEl5c5as+BAy8agECsHZiVRV3 d+fgI8f3pNPJGjpf9GtTyttrP0spryDQmT+BvJJDu+ljmd52Xpw9Wsd4dJHh2CwY HUGXHouMblqGsyGOeREJ22twnsqzhSDRFE9ZUDcGpFJePMOs/GeywSAGcqRBr7Po 7fQ3BEdKnHuFxWW5Vjdo8bhBJoi2tgqo+DOMzg2Hp7PBbkiVmy8XkH7rY0rqs9j/ qIOd/pKwfaNUhSRCT28jDQX0InxntUyv5z026nPQAWwoEpRFzEKOeXalVBRu8T59 NoWxBU7g/PJj+bNxi4W+ =5n4F -----END PGP SIGNATURE-----
--- End Message ---

