From nobody Wed Feb 14 19:50:24 2024 X-Original-To: wireless@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4TZphK0zNxz52gwN for ; Wed, 14 Feb 2024 19:50:25 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4TZphJ2Gh8z4lWK for ; Wed, 14 Feb 2024 19:50:24 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1707940224; a=rsa-sha256; cv=none; b=VoRz7bIemYYHRwIv6RAoGCa45j3a3FyJOYMiEV6QQ0P0+5OhY1glOCOr46tH0BsdGoqDT2 Vn71vfBuhBjfZXG59jEFHRiGAMHSlLyD+lyM2L8SAPHWiobXp2OYtbLNrVh/K9L3Eyjzma 5axrzuk6VWEedMSunnX2Qh6BBgYMhQMLSxEknTZdPIwcPyOxcHhhKTO+QffTmbit9rW+O9 lPyr5YNEHJRM198SsOusI/S/hsanVmThK9DHfY/IS+toxFEtRfKLrKkS2jCyWfGrqpz68R m3C01huBeONGOklITROh3WsVigfMbJZwJ2DUFs3ADKgOKvLQ7Yvp04+8TtiSOQ== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1707940224; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=+4SpMtngYAUzoHcHugo0VUVAzowq8iq8yc8PKmyLxmE=; b=N8LQ3x6J99fUrHRQc8qgopPdTfBt4EOHJkD9/sDVu3eIIx6i2J60ElTJ12HxmxuMX8ScGo +pkavPxuleQdXaHB6Xlql7E2aoI6LH5lMt7mSm5uLL983yoCytQTYh0Zj7lhOo5KdbkJkf y4QD52LeVZT0puv3qZ20DYXYM6VaJ2HgCwbcaQxO7qQLJ3/wEfsDmdUv8SVoKvDIZS5Sdx eqjoE2Yax3C+lIZk9RXFVmrPWMJ/3E1uZZIpM8SC+rkuBXTfekXZ07gdFsNqeG7iHQASTQ xv7rSO1HOla6/4xgEJ0e1ajDURptmbWxlMYglbBocicQpk0fsKSraalc8FeX2w== Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4TZphJ1NWWz1BFh for ; Wed, 14 Feb 2024 19:50:24 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 41EJoOl0045490 for ; Wed, 14 Feb 2024 19:50:24 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from bugzilla@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 41EJoOWp045489 for wireless@FreeBSD.org; Wed, 14 Feb 2024 19:50:24 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: bugzilla set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: wireless@FreeBSD.org Subject: [Bug 271979] bsdinstall(8): iwlwifi(4): system crash when authenticating for Wi-Fi: panic: lkpi_sta_auth_to_scan: lsta 0x... state not NONE: 0, nstate 1 arg 1 Date: Wed, 14 Feb 2024 19:50:24 +0000 X-Bugzilla-Reason: CC X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: CURRENT X-Bugzilla-Keywords: crash, install, needs-qa X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: commit-hook@FreeBSD.org X-Bugzilla-Status: In Progress X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: bz@FreeBSD.org X-Bugzilla-Flags: mfc-stable14? mfc-stable13? X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Discussions List-Archive: https://lists.freebsd.org/archives/freebsd-wireless List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-wireless@freebsd.org X-BeenThere: freebsd-wireless@freebsd.org MIME-Version: 1.0 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D271979 --- Comment #38 from commit-hook@FreeBSD.org --- A commit in branch main references this bug: URL: https://cgit.FreeBSD.org/src/commit/?id=3D2ac8a2189ac6707f48f77ef2e36baf696= a0d2f40 commit 2ac8a2189ac6707f48f77ef2e36baf696a0d2f40 Author: Bjoern A. Zeeb AuthorDate: 2024-02-03 16:33:56 +0000 Commit: Bjoern A. Zeeb CommitDate: 2024-02-14 19:47:53 +0000 LinuxKPI: 802.11: band-aid for invalid state changes after (*iv_update_= bss) With firmware based solutions we cannot just jump from an active session to a new iv_bss node without tearing down state for the old and bringing up the new node. This likely used to work on softmac based cards/drive= rs where one could essentially set the state and fire at will. We track (*iv_update_bss) calls from net80211 and set a local flag that we are out of synch and do not allow any further operations up the state machine until we hit INIT or SCAN. That means someone will take the st= ate down, clean up firmware state and then we can join again and build up state. Apparently this problem has been "known" for a while as native iwm(4) a= nd others have similar workarounds (though less strict) and can be equally pestered into bad states. For LinuxKPI all the KASSERTs just massively brought this problem out. The solution will be some rewrites in net802= 11. Until then, try to keep us more stable at least and not die on second join1() calls triggered by service netif start wlan0 and similar. PR: 271979, 271988, 275255, 263613, 274003 Sponsored by: The FreeBSD Foundation (2023, partial) MFC after: 3 days Reviewed by: cc Differential Revision: https://reviews.freebsd.org/D43725 sys/compat/linuxkpi/common/src/linux_80211.c | 309 +++++++++++++++++++----= ---- sys/compat/linuxkpi/common/src/linux_80211.h | 2 + 2 files changed, 216 insertions(+), 95 deletions(-) --=20 You are receiving this mail because: You are on the CC list for the bug.=