path: root/src/drivers/linux_ioctl.c
diff options
authorJouni Malinen <j@w1.fi>2011-10-28 18:08:15 (GMT)
committerJouni Malinen <j@w1.fi>2011-10-28 18:08:15 (GMT)
commit59d249255c5ea484ac2050f19ecbe84a7d9323f0 (patch)
treeb64f887be96a00c0a45419ff2e0a402516405847 /src/drivers/linux_ioctl.c
parentd28b43f66f91c28c9fdefdfc17f006a418462bc4 (diff)
nl80211: Ignore netlink interface down if interface is up
The netlink event processing is delayed since they are only returned after control returns to eloop. This can result in netlink down events being processed at a point when the interface has is actually still there (the first event on new interface is down) and that can result in odd behavior especially when the resulting interface-disabled event is delivered to AP mode interface with wpa_supplicant. Work around this by filtering netlink down events if the matching interface is up at the time the netlink event is processed. This fixes an issue brought up by commit 36d84860bbe09641f782fcc21b09e5a6952b4629.
Diffstat (limited to 'src/drivers/linux_ioctl.c')
1 files changed, 22 insertions, 0 deletions
diff --git a/src/drivers/linux_ioctl.c b/src/drivers/linux_ioctl.c
index 3f7ee29..d7501cf 100644
--- a/src/drivers/linux_ioctl.c
+++ b/src/drivers/linux_ioctl.c
@@ -60,6 +60,28 @@ int linux_set_iface_flags(int sock, const char *ifname, int dev_up)
+int linux_iface_up(int sock, const char *ifname)
+ struct ifreq ifr;
+ int ret;
+ if (sock < 0)
+ return -1;
+ os_memset(&ifr, 0, sizeof(ifr));
+ os_strlcpy(ifr.ifr_name, ifname, IFNAMSIZ);
+ if (ioctl(sock, SIOCGIFFLAGS, &ifr) != 0) {
+ ret = errno ? -errno : -999;
+ wpa_printf(MSG_ERROR, "Could not read interface %s flags: %s",
+ ifname, strerror(errno));
+ return ret;
+ }
+ return !!(ifr.ifr_flags & IFF_UP);
int linux_get_ifhwaddr(int sock, const char *ifname, u8 *addr)
struct ifreq ifr;