]> git.ipfire.org Git - thirdparty/hostap.git/commit
l2_packet: Fix bridge workaround for repeater configuration
authorSergey Matyukevich <sergey.matyukevich.os@quantenna.com>
Wed, 16 Oct 2019 10:44:49 +0000 (10:44 +0000)
committerJouni Malinen <j@w1.fi>
Tue, 24 Dec 2019 19:16:23 +0000 (21:16 +0200)
commit3626e72c8dc1925920130851aa14d285dca66248
tree9dbae2cccd5339b41b1b70094443c06abcd0cd10
parent9f47fdb6c366c2403461baa62fb5743ee4b8566a
l2_packet: Fix bridge workaround for repeater configuration

In repeater configuration, both AP and STA wireless interfaces may be
included into the same bridge. In this case the following race condition
may occur: wpa_supplicant and hostapd are started, then hostapd clients
are connected before wpa_supplicant connects to remote AP. EAPOL packets
between hostapd and its clients are detected by wpa_supplicant on bridge
interface, prematurely disabling the workaround.

One possible option to fix this issue is to check EAPOL destination MAC
in wpa_supplicant and disable workaround only if EAPOL packet on bridge
interface is indeed intended for wpa_supplicant.

Signed-off-by: Sergey Matyukevich <sergey.matyukevich.os@quantenna.com>
src/l2_packet/l2_packet_linux.c