OpenWrt Forum Archive

Topic: hostapd causes kernel panic, reboot - Current SVN wgt634u madwifi-ng

The content of this topic has been archived on 22 Mar 2018. There are no obvious gaps in this topic, but there may still be some posts missing at the end.

Hi All,
I've built and installed KAMIKAZE for wgt634u and it boots fine. Basic wireless (no crypt) seems to work. I wish to configure as an WPA AP. When I run hostapd the kernel oops and the router reboots.
Before I submit a bug report, I'd like to know, does anyone have a working WPA setup on wgt634u? Is anyone running madwifi-ng and hostapd with success?

Thanks,
Dave

Here is my kernel panic log:

root@OpenWrt:/etc# hostapd -d /etc/hostapd.conf
Configuration file: /etc/hostapd.conf
Configure bridge br0 for EAPOL traffic.
br0: port 2(ath0) entering disabled state
Using interface ath0 with hwaddr 00:0f:b5:0e:0b:eb and ssid 'foobar'
madwifi_configure_wpa: group keyData bus error, epc == c00eb990, ra == c00e7dcc
Oops[#1]:
Cpu 0
$ 0   : 00000000 1000dc00 c0128000 00008000
$ 4   : 81ec8000 00000006 81ec8830 81ec82b0
$ 8   : 000000c0 81fa4000 81fa5000 81330000
$12   : 81326000 00000200 00000100 81327000
$16   : 81eca870 81ec8000 81ec8000 81388000
$20   : 00000000 81388f18 8138916c 00008914
$24   : 00000000 c00c00c0
$28   : 81334000 81335cb0 81ec8830 c00e7dcc
Hi    : 000003d9
Lo    : 99952600
epc   : c00eb990     Tainted: P
ra    : c00e7dcc Status: 1000dc03    KERNEL EXL IE
Cause : 0000801c
PrId  : 00029007
Modules linked in: snd_pcm_oss snd_mixer_oss snd_usb_audio snd_hwdep snd_usb_lib snd_rawmidi snd_pcm snd_timer snd snd_page_eProcess hostapd (pid: 2154, threadinfo=81334000, task=812a37f0)
Stack : 00008be0 00000000 1000dc00 81335d20 00000000 81ec8000 81ec8000 c00e7dcc
        8005a784 81335d20 c00c5c94 00000003 80001fd4 8000a8f4 00000000 00000000
        00000000 00000001 00000000 00000000 00000000 00000000 00000000 81388260
        81ec8000 81388000 00000000 81388f18 80260000 00008914 7f917cb8 c0092de8
        00000003 00000006 00000057 00000000 81335d48 00000003 81c22260 81388260
        ...
Call Trace: [<c00e7dcc>]  [<8005a784>]  [<c00c5c94>]  [<80001fd4>]  [<8000a8f4>]  [<c0092de8>]  [<801564e0>]  [<c00c5d34>]

Code: 8e420014  34038000  00431021 <8c431930> 30628000  5440003b  8e222ba4  00032642  000315c2
cipher=1
madwifi_configure_wpa: pairwise key ciphers=0xa
madwifi_configure_wpa: key management algorithms=0x2
madwifi_configure_wpa: rsn capabilities=0x0
madwifi_configure_wpa: enable WPA= 0x1
Data bus error, epc == c013d1ac, ra == c01ee198
Oops[#2]:
Cpu 0
$ 0   : 00000000 1000dc00 c0138000 00030000
$ 4   : 81990800 81d5be60 80262dd4 81d5bf30
$ 8   : cd567380 0000003d 7fd18d90 0000005e
$12   : 00000020 0000000a fffffc00 0000003c
$16   : 819908c8 81990800 81d5be60 00000000
$20   : 1000dc01 00000001 100d0000 00000003
$24   : 00000000 c01ee150
$28   : 81d5a000 81d5be20 00407e00 c01ee198
Hi    : 00000003
Lo    : 00000009
epc   : c013d1ac     Tainted: P
ra    : c01ee198 Status: 1000dc02    KERNEL EXL
Cause : 0000001c
PrId  : 00029007
Modules linked in: snd_pcm_oss snd_mixer_oss snd_usb_audio snd_hwdep snd_usb_lib snd_rawmidi snd_pcm snd_timer snd snd_page_eProcess syslogd (pid: 670, threadinfo=81d5a000, task=81d58be8)
Stack : 81d5be28 00000400 81d5be28 81d5be28 00000100 81990800 802626e4 81d5be98
        80220000 0000000c c01ee198 00000000 80260000 80260000 80260000 80260000
        81d5bf30 00000007 00000100 c01ee2c4 802626e4 81d5be98 800365a4 7fffffff
        8022062c 00000000 00000000 00000007 81d5bf30 0000000c 81d5be98 81d5be98
        00000008 80262470 0000000a 80260000 00480000 80031c4c 00480000 0000000c
        ...
Call Trace: [<c01ee198>]  [<c01ee2c4>]  [<800365a4>]  [<80031c4c>]  [<80031d30>]  [<8000a8f4>]  [<80001e4c>]  [<80001fd4>]

Code: 00000000  8e020000  3c030003 <8c420050> 00431024  10400004  00000000  24130001  0804f473
Kernel panic - not syncing: Aiee, killing interrupt handler!
<0>Rebooting in 3 seconds..Please stand by while rebooting the system...

ok,
I've noticed this has been reported previously and marked fixed (Ticket #247).
It is definitely broken for me though sad
I have confirmed that both madwifi and hostapd are building correctly including the patches intended to address this issue. I have also build the latest sources (with and without the patches applied) including hostapd v0.4.8 v0.5.1 and madwifi r1451-20060212. These all cause a panic in the same way.

Any ideas?

Also on a WGT634U, Though I am not running Hostapd, just connecting in Managed mode.  This occurs almost always within 5 minutes:

ath_pci: 0.9.4.5 (svn 1451)
PCI: Enabling device 0000:01:01.0 (0000 -> 0002)
PCI: Fixing up device 0000:01:01.0
Data bus error, epc == c00d380c, ra == c00d3824
Oops[#1]:
Cpu 0
$ 0   : 00000000 10009c00 c012600c 00000000
$ 4   : ffffffff 0000600c 00000003 00000002
$ 8   : 81c40000 00000002 803c1b40 803c1b38
$12   : 00000000 8105dc10 ffffffff 00000000
$16   : 00000020 c00d32a4 00000002 00000003
$20   : 0000600c 81c40000 803c1bd8 80220000
$24   : 00000010 800fcc80
$28   : 803c0000 803c1b10 803e4000 c00d3824
Hi    : 000003d9
Lo    : 99952600
epc   : c00d380c     Tainted: P
ra    : c00d3824 Status: 10009c03    KERNEL EXL IE
Cause : 0000001c
PrId  : 00029007
Modules linked in: ath_pci ath_rate_sample ath_hal wlan switch_robo switch_core
Process insmod (pid: 385, threadinfo=803c0000, task=803bebe8)
Stack : 10009c03 000003d9 99952600 c00e9644 81c40000 803c1b78 000083c5 81c40000
        81c40000 c00e52e0 c00e5324 00009820 f75b0900 02020200 55555555 aaaaaaaa
        00000042 00000340 c00e42fc c00e3f64 80260000 8134df80 00000400 800b8abc
        803c1bd8 00000008 10000000 803c1c18 800323a4 810a9000 803e4260 c0120000
        40000000 c009e9d8 80220000 c00d372c 0000000c 803c1bd0 00000001 8004e6b8
        ...
Call Trace: [<c00e9644>]  [<c00e52e0>]  [<c00e5324>]  [<c00e42fc>]  [<c00e3f64>]  [<800b8abc>]  [<800

Code: 245132a4  8ea20014  00541021 <8c430000> 02631824  10720008  24020001  0220f809  2404000a

Usually after this happens it does not cause a lock up or reboot, just the Atheros going down.  Sometimes though, especially after a "soft" reboot, the Router will get stuck in a reboot loop with no error messages whatsoever:

...
wlan: 0.8.4.2 (svn 1451)
ath_hal: module license 'Proprietary' taints kernel.
ath_hal: 0.9.16.16 (AR5210, AR5211, AR5212, RF5111, RF5112, RF2413, RF5413)
ath_rate_sample: 1.2 (svn 1451)
ath_pci: 0.9.4.5 (svn 1451)
PCI: Enabling device 0000:01:01.0 (0000 -> 0002)
PCI: Fixing up device 0000:01:01.0


CFE version 1.0.34 for BCM95365R (32bit,SP,LE)
Build Date: Tue Feb 24 03:21:41 CST 2004 (root@jackylinux)
Copyright (C) 2000,2001,2002 Broadcom Corporation.

Add MAC client version(DNI).
Initializing Arena.
Initializing Devices.
et0: Broadcom BCM47xx 10/100 Mbps Ethernet Controller
CPU type 0x29007: 200MHz
Total memory: 0x2000000 bytes (32MB)                                                                  
...

If I take the WiFi down, (ifconfig ath0 down) this coredump never happens, but as soon as I bring it back up I get it almost always:

root@OpenWrt:/# ifconfig ath0 up
Data bus error, epc == c00eba18, ra == c00e7f08
Oops[#1]:
Cpu 0
$ 0   : 00000000 10009c00 c0128000 00008000
$ 4   : 81c28000 00000001 81c286b0 81c282b0
$ 8   : 000000c0 81d1d000 81d1e000 81d1f000
$12   : 81c5d000 00705aac 00000001 81cc9000
$16   : 81c2a888 81c28000 81c28000 80360000
$20   : 00000000 80360f18 8036116c 00008914
$24   : 00000000 c00c0188
$28   : 81c16000 81c17cb0 81c286b0 c00e7f08
Hi    : 000003d9
Lo    : 99952600
epc   : c00eba18     Tainted: P
ra    : c00e7f08 Status: 10009c03    KERNEL EXL IE
Cause : 0000001c
PrId  : 00029007
Modules linked in: wlan_scan_sta wlan_wep ath_pci ath_rate_sample ath_hal wlan switch_robo switch_core
Process ifconfig (pid: 698, threadinfo=81c16000, task=8036e7f0)
Stack : 2ac26f34 803c5c7c 8024b060 0027968b 00000000 81c28000 81c28000 c00e7f08
        00000000 8005a7d4 81c17cd8 81c17cd8 81006d60 80000000 00000000 00000000
        00000000 00000001 00000000 00000000 80260000 80260000 00000000 80360260
        81c28000 80360000 00000000 80360f18 80260000 00008914 7fd36c68 c0093c18
        8022062c 00000001 00000000 00000000 81c17d48 7fd36ec4 81c17d48 81c17d48
        ...
Call Trace: [<c00e7f08>]  [<8005a7d4>]  [<c0093c18>]  [<80156620>]  [<c00c0230>]  [<80156620>]  [<8000
1e4c>]  [<80050ce0>]  [<80158574>]  [<80001fd4>]  [<801aeb70>]  [<801ae9e0>]  [<801b0514>]  [<801b05ec
>]  [<80149b9c>]  [<80149b9c>]  [<801b0514>]  [<800fc500>]  [<80093100>]  [<80093460>]  [<8014a314>]
[<800934d8>]  [<80012720>]  [<80012720>]

Code: 8e420014  34038000  00431021 <8c431930> 30628000  5440003b  8e222bbc  00032642  000315c2
Segmentation fault

Hope this helps!

-Phil

Hi,

This is still a problem in build r3382 using hostapd - 0.5.1-1 and kmod-madwifi - 2.6.15.6+r1456. I've raised ticket #379 so that it can be fixed.

Cheers,
Hovis

root@OpenWrt:/# hostapd /etc/hostapd.conf
Configuration file: /etc/hostapd.conf
madwifi_set_iface_flags: dev_up=0
br0: port 2(ath0) entering disabled state

Using interface ath0 with hwaddr 00:00:ba:dc:0d:Data bus error, epc == c00eba18, ra == c00e7f08

Oops[#1]:

Cpu 0

$ 0   : 00000000 10009c00 c0128000 00008000

$ 4   : 81c20000 00000006 81c202f0 81c202b0

$ 8   : 000000c0 81dcc000 81224000 813fc000

$12   : 81db7000 00000200 00000100 81c9a000

$16   : 81c22888 81c20000 81c20000 813e8000

$20   : 00000000 813e8f18 813e916c 00008914

$24   : 00000000 c00c0188                 

$28   : 81562000 81563cb0 81c202f0 c00e7f08

Hi    : 000003d9

Lo    : 99952600

epc   : c00eba18     Tainted: P     

ra    : c00e7f08 Status: 10009c03    KERNEL EXL IE

Cause : 0000001c

PrId  : 00029007

Modules linked in: snd_pcm_oss snd_mixer_oss snd_usb_audio snd_hwdep snd_usb_lib snd_rawmidi snd_pcm snd_timer snd snd_page_alloc ehci_hcd uhci_hcd usb_storage sd_mod scsi_mod usbcore soundcore vfat fat nfs lockd sunrpc ext3 jbd ext2 nls_utf8 nls_iso8859_15 nls_iso8859_1 nls_cp850 nls_cp437 nls_base wlan_scan_sta wlan_scan_ap wlan_xauth wlan_wep wlan_tkip wlan_ccmp wlan_acl ath_pci ath_rate_sample ath_hal wlan switch_robo switch_core

Process hostapd (pid: 1402, threadinfo=81562000, task=8036abe8)

Stack : 00000000 813e8f18 80260000 00008914 00000000 81c20000 81c20000 c00e7f08

        00000000 8005a804 7f9dbc20 8014f818 10009c03 00000001 00000000 00000000

        00000000 00000002 00000000 00000000 812b9320 812b9320 00000000 813e8260

        81c20000 813e8000 00000000 813e8f18 80260000 00008914 7f9dbc20 c0093c20

        80001fd4 00000006 81052000 00000000 81563d48 00000000 00000000 7f9dbc00

        ...

Call Trace: [<c00e7f08>]  [<8005a804>]  [<8014f818>]  [<c0093c20>]  [<80001fd4>]  [<80156780>]  [<c00c0230>]  [<c00c602c>]  [<c00c60cc>]  [<80156780>]  [<801586d4>]  [<801aece0>]  [<801aeb50>]  [<801b075c>]  [<80111b4c>]  [<80149c4c>]  [<801123d0>]  [<80112324>]  [<80093130>]  [<80093490>]  [<800770d8>]  [<80031d60>]  [<80093508>]  [<80030fb0>]  [<80001e4c>]  [<80012720>]  [<80012720>]


Code: 8e420014  34038000  00431021 <8c431930> 30628000  5440003b  8e222bbc  00032642  000315c2

ed and ssid 'prive'
madwifi_set_ieee8021x: enabled=1
madwifi_configure_wpa: group key cipher=1
madwifi_configure_wpa: pairwise key ciphers=0xa
madwifi_configure_wpa: key management algorithms=0x2
madwifi_configure_wpa: rsn capabilities=0x0
madwifi_configure_wpa: enable WPA= 0x3
madwifi_set_iface_flags: dev_up=1
Segmentation fault
root@OpenWrt:/# Data bus error, epc == c01c41a0, ra == c02241a8

Oops[#2]:

Cpu 0

$ 0   : 00000000 10009c00 c0172020 00000000

$ 4   : 813fd100 8021de10 c0172020 00000000

$ 8   : 00000002 10009c01 813fd0c8 00000001

$12   : 00000000 00000001 80220000 ffffffd5

$16   : 00000100 813fd000 802626e4 8021de48

$20   : 80220000 80300000 00000010 00001000

$24   : 00000000 c0224160                 

$28   : 8021c000 8021ddf8 00000010 c02241a8

Hi    : 000003d0

Lo    : db47d9c0

epc   : c01c41a0     Tainted: P     

ra    : c02241a8 Status: 10009c02    KERNEL EXL

Cause : 0000001c

PrId  : 00029007

Modules linked in: snd_pcm_oss snd_mixer_oss snd_usb_audio snd_hwdep snd_usb_lib snd_rawmidi snd_pcm snd_timer snd snd_page_alloc ehci_hcd uhci_hcd usb_storage sd_mod scsi_mod usbcore soundcore vfat fat nfs lockd sunrpc ext3 jbd ext2 nls_utf8 nls_iso8859_15 nls_iso8859_1 nls_cp850 nls_cp437 nls_base wlan_scan_sta wlan_scan_ap wlan_xauth wlan_wep wlan_tkip wlan_ccmp wlan_acl ath_pci ath_rate_sample ath_hal wlan switch_robo switch_core

Process swapper (pid: 0, threadinfo=8021c000, task=8021e000)

Stack : b0bfb305 00000000 80260000 80260000 80260000 80260000 8021de00 00000007

        00000100 c02242d4 802626e4 8021de48 80036614 80036614 8022062c 00000000

        00000000 00000007 8021dee0 80300000 8021de48 8021de48 00000000 80262470

        0000000a 80260000 00000002 80031c7c 00000002 80300000 00000010 00001000

        10009c00 8021dee0 00000002 00000001 80031d60 00000590 00008000 8021dee0

        ...

Call Trace: [<c02242d4>]  [<80036614>]  [<80036614>]  [<80031c7c>]  [<80031d60>]  [<8000a914>]  [<8000b060>]  [<80001e4c>]  [<80001fd4>]  [<8015343c>]  [<8000ab10>]  [<8000aae4>]  [<80232774>]  [<80232758>]  [<8023212c>]


Code: 8d420004  00071880  00433021 <8cc30044> 30622000  10400007  30620002  10400020  006f1024

Kernel panic - not syncing: Aiee, killing interrupt handler!

<0>Rebooting in 3 seconds..Please stand by while rebooting the system...

Hi,

I've seen this error too with build 3345 on a wgt634u. It can be reproduced just by takeing the interface up and down several times.

ifconfig ath0 up
ifconfig ath0 down
ifconfig ath0 up
ifconfig ath0 down
ifconfig ath0 up
ifconfig ath0 down

hostapd works for me most of the time when it is started immediately after booting. If I start it after editing a file with vi it usually produces a kernel oops. This looks to me like there is some problem with uninitalized memory somewhere during the configuration of the madwifi drivers. When the initialization succeeds the box works stable for hours even with WPA.

Jan  1 00:06:10 (none) user.info kernel: br0: port 2(ath0) entering disabled state
Jan  1 00:06:13 (none) user.info kernel: br0: port 2(ath0) entering learning state
Jan  1 00:06:13 (none) user.info kernel: br0: topology change detected, propagating
Jan  1 00:06:13 (none) user.info kernel: br0: port 2(ath0) entering forwarding state
Jan  1 00:06:15 (none) user.info kernel: br0: port 2(ath0) entering disabled state
Jan  1 00:06:16 (none) user.info kernel: br0: port 2(ath0) entering learning state
Jan  1 00:06:16 (none) user.info kernel: br0: topology change detected, propagating
Jan  1 00:06:16 (none) user.info kernel: br0: port 2(ath0) entering forwarding state
Jan  1 00:06:17 (none) user.info kernel: br0: port 2(ath0) entering disabled state
Jan  1 00:06:18 (none) user.alert kernel: Data bus error, epc == c00eba18, ra == c00e7f08
Jan  1 00:06:18 (none) user.warn kernel: Oops[#1]:
Jan  1 00:06:18 (none) user.warn kernel: Cpu 0
Jan  1 00:06:18 (none) user.warn kernel: $ 0   : 00000000 10009c00 c0128000 00008000
Jan  1 00:06:18 (none) user.warn kernel: $ 4   : 81dc0000 00000006 81dc0370 81dc02b0
Jan  1 00:06:18 (none) user.warn kernel: $ 8   : 000000c0 81c4e000 81dbd000 81e5b000
Jan  1 00:06:18 (none) user.warn kernel: $12   : 81c52000 00705aac 00000001 81c4c000
Jan  1 00:06:19 (none) user.warn kernel: $16   : 81dc2888 81dc0000 81dc0000 812ac000
Jan  1 00:06:19 (none) user.warn kernel: $20   : 00000000 812acf18 812ad16c 00008914
Jan  1 00:06:19 (none) user.warn kernel: $24   : 00000000 c00c0188                 
Jan  1 00:06:19 (none) user.warn kernel: $28   : 81286000 81287cb0 81dc0370 c00e7f08
Jan  1 00:06:19 (none) user.warn kernel: Hi    : 000003d9
Jan  1 00:06:19 (none) user.warn kernel: Lo    : 99952600
Jan  1 00:06:19 (none) user.warn kernel: epc   : c00eba18     Tainted: P     
Jan  1 00:06:19 (none) user.warn kernel: ra    : c00e7f08 Status: 10009c03    KERNEL EXL IE
Jan  1 00:06:19 (none) user.warn kernel: Cause : 0000001c
Jan  1 00:06:19 (none) user.warn kernel: PrId  : 00029007
Jan  1 00:06:19 (none) user.warn kernel: Modules linked in: wlan_scan_sta wlan_scan_ap wlan_xauth wlan_wep wlan_tkip wlan_ccmp wlan_acl ath_pci ath_rate_sample ath_hal wlan switch_robo switch_core
Jan  1 00:06:19 (none) user.warn kernel: Process ifconfig (pid: 887, threadinfo=81286000, task=81c3abe8)
Jan  1 00:06:19 (none) user.warn kernel: Stack : 7fc26c78 81287e00 80031d60 00000007 00000000 81dc0000 81dc0000 c00e7f08
Jan  1 00:06:19 (none) user.warn kernel:         00000000 8005a804 0000000a 80260000 811a900c 80031c7c 00000000 00000000
Jan  1 00:06:19 (none) user.warn kernel:         00000000 00000002 00000000 00000000 81287e00 00000000 00000000 812ac260
Jan  1 00:06:19 (none) user.warn kernel:         81dc0000 812ac000 00000000 812acf18 80260000 00008914 7fc26c58 c0093c20
Jan  1 00:06:19 (none) user.warn kernel:         00000000 00000006 81287e00 00000000 81287d48 7fc26c58 00000001 00000000
Jan  1 00:06:19 (none) user.warn kernel:         ...
Jan  1 00:06:19 (none) user.warn kernel: Call Trace: [<80031d60>]  [<c00e7f08>]  [<8005a804>]  [<80031c7c>]  [<c0093c20>]  [<80156780>]  [<c00c0230>]  [<80156780>]  [<800fb43c>]  [<80050d10>]  [<801586d4>]  [<801aed20>]  [<801aeb90>]  [<801b079c>]  [<800992c4>]  [<80149c4c>]  [<800fc5a0>]  [<80093130>]  [<80093490>]  [<8014a3c4>]  [<80093508>]  [<80012720>]  [<80012720>]
Jan  1 00:06:19 (none) user.warn kernel:
Jan  1 00:06:19 (none) user.warn kernel: Code: 8e420014  34038000  00431021 <8c431930> 30628000  5440003b  8e222bbc  00032642  000315c2

Hi,

I've been beating myself up with this problem for a few weeks now with no positive results.

pEEf, Does hostapd run for you now? I have tried three different power supplies and have never noticed a difference with madwifi and/or hostapd.. Nothing else on my wgt causes a panic or seg fault.

yyerrok, Would you care to share your hostapd.conf with us? It seems like you have more luck than most of us.

Thanks.

Hi,

I've tried 3 power supplies. One has 16V open and 14.5V load voltage one with 15 / 14V and another with 11.5 / 9V. It makes no difference. Whit only 8V the box reboots frequently. Since it is quite stable otherwise I don't think this is a hardware problem.

As for hostapd I've disabled WPA-EAP and CCMP and enabled only WPA-PSK/TKIP. The rest is default. Take care with the passphrase if you enter quotes or trailing spaces they will be included.
The most reliably sequence I've found to load the thing is to create the bridge only with the LAN interface.

#### LAN configuration
lan_proto="dhcp"
lan_ifname="br0"
lan_ifnames="vlan0"
lan_ipaddr="192.168.1.1"
# lan_dns="192.168.1.1"
# lan_gateway="192.168.1.1"

Then starting hostapd and adding the WLAN to the bridge.

hostapd -B -dd /etc/hostapd.conf
brctl addif br0 ath0

This is the hostapd.conf:


##### hostapd configuration file ##############################################
# Empty lines and lines starting with # are ignored

# AP netdevice name (without 'ap' prefix, i.e., wlan0 uses wlan0ap for
# management frames)
interface=ath0

# In case of madwifi driver, an additional configuration parameter, bridge,
# must be used to notify hostapd if the interface is included in a bridge. This
# parameter is not used with Host AP driver.
bridge=br0

# Driver interface type (hostap/wired/madwifi; default: hostap)
driver=madwifi

# hostapd event logger configuration
#
# Two output method: syslog and stdout (only usable if not forking to
# background).
#
# Module bitfield (ORed bitfield of modules that will be logged; -1 = all
# modules):
# bit 0 (1) = IEEE 802.11
# bit 1 (2) = IEEE 802.1X
# bit 2 (4) = RADIUS
# bit 3 (8) = WPA
# bit 4 (16) = driver interface
# bit 5 (32) = IAPP
#
# Levels (minimum value for logged events):
#  0 = verbose debugging
#  1 = debugging
#  2 = informational messages
#  3 = notification
#  4 = warning
#
logger_syslog=-1
logger_syslog_level=2
logger_stdout=-1
logger_stdout_level=2

# Debugging: 0 = no, 1 = minimal, 2 = verbose, 3 = msg dumps, 4 = excessive
debug=0

# Dump file for state information (on SIGUSR1)
dump_file=/tmp/hostapd.dump


##### IEEE 802.11 related configuration #######################################

# SSID to be used in IEEE 802.11 management frames
ssid=greg

##### IEEE 802.1X-REV related configuration ###################################

# Require IEEE 802.1X authorization
#ieee8021x=1

# Optional displayable message sent with EAP Request-Identity. The first \0
# in this string will be converted to ASCII-0 (nul). This can be used to
# separate network info (comma separated list of attribute=value pairs); see,
# e.g., draft-adrangi-eap-network-discovery-07.txt.
#eap_message=hello
#eap_message=hello\0networkid=netw,nasid=foo,portid=0,NAIRealms=example.com

# WEP rekeying (disabled if key lengths are not set or are set to 0)
# Key lengths for default/broadcast and individual/unicast keys:
# 5 = 40-bit WEP (also known as 64-bit WEP with 40 secret bits)
# 13 = 104-bit WEP (also known as 128-bit WEP with 104 secret bits)
#wep_key_len_broadcast=5
#wep_key_len_unicast=5
# Rekeying period in seconds. 0 = do not rekey (i.e., set keys only once)
#wep_rekey_period=300

# EAPOL-Key index workaround (set bit7) for WinXP Supplicant (needed only if
# only broadcast keys are used)
eapol_key_index_workaround=0

# EAP reauthentication period in seconds (default: 3600 seconds; 0 = disable
# reauthentication).
#eap_reauth_period=3600


##### Integrated EAP server ###################################################

# Optionally, hostapd can be configured to use an integrated EAP server
# to process EAP authentication locally without need for an external RADIUS
# server. This functionality can be used both as a local authentication server
# for IEEE 802.1X/EAPOL and as a RADIUS server for other devices.

# Use integrated EAP server instead of external RADIUS authentication
# server. This is also needed if hostapd is configured to act as a RADIUS
# authentication server.
eap_server=0

# Path for EAP server user database
#eap_user_file=/etc/hostapd.eap_user

# CA certificate (PEM or DER file) for EAP-TLS/PEAP/TTLS
#ca_cert=/etc/hostapd.ca.pem

# Server certificate (PEM or DER file) for EAP-TLS/PEAP/TTLS
#server_cert=/etc/hostapd.server.pem

# Private key matching with the server certificate for EAP-TLS/PEAP/TTLS
# This may point to the same file as server_cert if both certificate and key
# are included in a single file. PKCS#12 (PFX) file (.p12/.pfx) can also be
# used by commenting out server_cert and specifying the PFX file as the
# private_key.
#private_key=/etc/hostapd.server.prv

# Passphrase for private key
#private_key_passwd=secret passphrase

# Enable CRL verification.
# Note: hostapd does not yet support CRL downloading based on CDP. Thus, a
# valid CRL signed by the CA is required to be included in the ca_cert file.
# This can be done by using PEM format for CA certificate and CRL and
# concatenating these into one file. Whenever CRL changes, hostapd needs to be
# restarted to take the new CRL into use.
# 0 = do not verify CRLs (default)
# 1 = check the CRL of the user certificate
# 2 = check all CRLs in the certificate path
#check_crl=1

# Configuration data for EAP-SIM database/authentication gateway interface.
# This is a text string in implementation specific format. The example
# implementation in eap_sim_db.c uses this as the file name for the GSM
# authentication triplets.
#eap_sim_db=/etc/hostapd.sim_db


##### IEEE 802.11f - Inter-Access Point Protocol (IAPP) #######################

# Interface to be used for IAPP broadcast packets
#iapp_interface=eth0


##### RADIUS client configuration #############################################
# for IEEE 802.1X with external Authentication Server, IEEE 802.11
# authentication with external ACL for MAC addresses, and accounting

# The own IP address of the access point (used as NAS-IP-Address)
own_ip_addr=127.0.0.1

# Optional NAS-Identifier string for RADIUS messages. When used, this should be
# a unique to the NAS within the scope of the RADIUS server. For example, a
# fully qualified domain name can be used here.
#nas_identifier=ap.example.com

# RADIUS authentication server
#auth_server_addr=127.0.0.1
#auth_server_port=1812
#auth_server_shared_secret=secret

# RADIUS accounting server
#acct_server_addr=127.0.0.1
#acct_server_port=1813
#acct_server_shared_secret=secret

# Secondary RADIUS servers; to be used if primary one does not reply to
# RADIUS packets. These are optional and there can be more than one secondary
# server listed.
#auth_server_addr=127.0.0.2
#auth_server_port=1812
#auth_server_shared_secret=secret2
#
#acct_server_addr=127.0.0.2
#acct_server_port=1813
#acct_server_shared_secret=secret2

# Retry interval for trying to return to the primary RADIUS server (in
# seconds). RADIUS client code will automatically try to use the next server
# when the current server is not replying to requests. If this interval is set,
# primary server will be retried after configured amount of time even if the
# currently used secondary server is still working.
#radius_retry_primary_interval=600


# Interim accounting update interval
# If this is set (larger than 0) and acct_server is configured, hostapd will
# send interim accounting updates every N seconds. Note: if set, this overrides
# possible Acct-Interim-Interval attribute in Access-Accept message. Thus, this
# value should not be configured in hostapd.conf, if RADIUS server is used to
# control the interim interval.
# This value should not be less 600 (10 minutes) and must not be less than
# 60 (1 minute).
#radius_acct_interim_interval=600


##### RADIUS authentication server configuration ##############################

# hostapd can be used as a RADIUS authentication server for other hosts. This
# requires that the integrated EAP authenticator is also enabled and both
# authentication services are sharing the same configuration.

# File name of the RADIUS clients configuration for the RADIUS server. If this
# commented out, RADIUS server is disabled.
#radius_server_clients=/etc/hostapd.radius_clients

# The UDP port number for the RADIUS authentication server
#radius_server_auth_port=1812

# Use IPv6 with RADIUS server (IPv4 will also be supported using IPv6 API)
#radius_server_ipv6=1


##### WPA/IEEE 802.11i configuration ##########################################

# Enable WPA. Setting this variable configures the AP to require WPA (either
# WPA-PSK or WPA-RADIUS/EAP based on other configuration). For WPA-PSK, either
# wpa_psk or wpa_passphrase must be set and wpa_key_mgmt must include WPA-PSK.
# For WPA-RADIUS/EAP, ieee8021x must be set (but without dynamic WEP keys),
# RADIUS authentication server must be configured, and WPA-EAP must be included
# in wpa_key_mgmt.
# This field is a bit field that can be used to enable WPA (IEEE 802.11i/D3.0)
# and/or WPA2 (full IEEE 802.11i/RSN):
# bit0 = WPA
# bit1 = IEEE 802.11i/RSN (WPA2) (dot11RSNAEnabled)
wpa=1

# WPA pre-shared keys for WPA-PSK. This can be either entered as a 256-bit
# secret in hex format (64 hex digits), wpa_psk, or as an ASCII passphrase
# (8..63 characters) that will be converted to PSK. This conversion uses SSID
# so the PSK changes when ASCII passphrase is used and the SSID is changed.
# wpa_psk (dot11RSNAConfigPSKValue)
# wpa_passphrase (dot11RSNAConfigPSKPassPhrase)
#wpa_psk=0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef
wpa_passphrase=passwordwithoutquotes

# Optionally, WPA PSKs can be read from a separate text file (containing list
# of (PSK,MAC address) pairs. This allows more than one PSK to be configured.
# Use absolute path name to make sure that the files can be read on SIGHUP
# configuration reloads.
#wpa_psk_file=/etc/hostapd.wpa_psk

# Set of accepted key management algorithms (WPA-PSK, WPA-EAP, or both). The
# entries are separated with a space.
# (dot11RSNAConfigAuthenticationSuitesTable)
wpa_key_mgmt=WPA-PSK
#WPA-EAP

# Set of accepted cipher suites (encryption algorithms) for pairwise keys
# (unicast packets). This is a space separated list of algorithms:
# CCMP = AES in Counter mode with CBC-MAC [RFC 3610, IEEE 802.11i/D7.0]
# TKIP = Temporal Key Integrity Protocol [IEEE 802.11i/D7.0]
# Group cipher suite (encryption algorithm for broadcast and multicast frames)
# is automatically selected based on this configuration. If only CCMP is
# allowed as the pairwise cipher, group cipher will also be CCMP. Otherwise,
# TKIP will be used as the group cipher.
# (dot11RSNAConfigPairwiseCiphersTable)
wpa_pairwise=TKIP
# CCMP

# Time interval for rekeying GTK (broadcast/multicast encryption keys) in
# seconds. (dot11RSNAConfigGroupRekeyTime)
wpa_group_rekey=600

# Rekey GTK when any STA that possesses the current GTK is leaving the BSS.
# (dot11RSNAConfigGroupRekeyStrict)
#wpa_strict_rekey=1

# Time interval for rekeying GMK (master key used internally to generate GTKs
# (in seconds).
wpa_gmk_rekey=86400

# Enable IEEE 802.11i/RSN/WPA2 pre-authentication. This is used to speed up
# roaming be pre-authenticating IEEE 802.1X/EAP part of the full RSN
# authentication and key handshake before actually associating with a new AP.
# (dot11RSNAPreauthenticationEnabled)
#rsn_preauth=1
#
# Space separated list of interfaces from which pre-authentication frames are
# accepted (e.g., 'eth0' or 'eth0 wlan0wds0'. This list should include all
# interface that are used for connections to other APs. This could include
# wired interfaces and WDS links. The normal wireless data interface towards
# associated stations (e.g., wlan0) should not be added, since
# pre-authentication is only used with APs other than the currently associated
# one.
#rsn_preauth_interfaces=eth0

Hi,

I don't think it is hardware in this case either although, I don't deny these boxes may suffer from some power issues.

Looking at the hostapd source code it looks to be a madwifi driver issue. Looking at the madwifi bug tracking (http://madwifi.org/report/1) there are numerous instances of oops's caused by the driver. I think I'd rather try and analyse the oops (although I don't yet know how to do this but have asked the forum) and raise a defect against madwifi as, for me at least, having a access point and not being able to use it as one is a bit of a problem. If anyone knows how to analayse oops's on these boxes please would you respond to my other mail and I'll do my best to get it fixed.

Thanks.

Anyone find a solution to this problem ? Also here crashes and segafault with hostapd! Please help

The discussion might have continued from here.