Commit 5da13f40 authored by Cy Schubert's avatar Cy Schubert
Browse files

security/wpa_supplicant-devel: Reapply c586ac04

Reapply "Fix 100% CPU when USB wlan NIC removed."

hostapd calls pcap_next(3) to read the next packet off the wlan interface.
pcap_next() returns a pointer to the packet header but does not indicate
success or failure. Unfortunately this results in an infinite loop (100%
CPU) when the wlan device disappears, i.e. when a USB wlan device is
manually removed or a USB error results in the device removal. However
pcap_next_ex(3) does return success or failure. To resolve this we use
pcap_next_ex(), forcing hostapd to exit when the error is encountered.

An error message is printed to syslog or stderr when debugging (-d flag)
is enabled. Unfortunately wpa_printf() only works when debugging is enabled.

PR:             253608, 273696
Obtained from:	src 6e5d01124fd4
Reported by:    Damjan Jovanovic <damjan.jov@gmail.com>,
                bz (privately)
MFH:		2023Q3
parent 1da2ce68
Loading
Loading
Loading
Loading
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment