After an evaluation, GNOME has moved from Bugzilla to GitLab. Learn more about GitLab.
No new issues can be reported in GNOME Bugzilla anymore.
To report an issue in a GNOME project, go to GNOME GitLab.
Do not go to GNOME Gitlab for: Bluefish, Doxygen, GnuCash, GStreamer, java-gnome, LDTP, NetworkManager, Tomboy.
Bug 515848 - 0.7 not working with linux 2.6.24
0.7 not working with linux 2.6.24
Status: RESOLVED FIXED
Product: NetworkManager
Classification: Platform
Component: general
git master
Other Linux
: Normal major
: ---
Assigned To: Dan Williams
Dan Williams
Depends on:
Blocks:
 
 
Reported: 2008-02-11 19:26 UTC by Alban Browaeys
Modified: 2008-02-12 14:03 UTC
See Also:
GNOME target: ---
GNOME version: ---


Attachments
Fixes latest wpa_supplicant (0.6.2) dbus handlers. used by NM 0.7 . (1.06 KB, patch)
2008-02-12 14:02 UTC, Alban Browaeys
none Details | Review

Description Alban Browaeys 2008-02-11 19:26:12 UTC
Network manager is unusable here for wifi network access. The item of
the list of access point names are made of garbage characters and
clicking on them try to set the essid to this garbage value.
I also have : 
NetworkManager: <debug> [1202745653.483173] wpa_parse_wpa_ie_wpa():
wpa_parse_wpa_ie_wpa: malformed ie or unknown version
errors. It comes from hdr->elem_id == WPA_GENERIC_INFO_ELEM .



I use ipw2200 driver but it has near to no change
http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.24.y.git;a=history;f=drivers/net/wireless/ipw2200.c;h=003f73f89efa66bda431e3322b1b2b35eb5dbf7e;hb=c78cb439103bf7deba5feb64921398d0ff93179a . Downgrading the kernel to 2.6.23 fixes the issue.
So I believe the issue arise from a higher level layer of the kernel
stack ... and well try to fix it in network manager itself An example of
wpa_supplicant dbus session looks fine to me :

$ dbus-send --system --print-reply --type=method_call
--dest=fi.epitest.hostap.WPASupplicant /fi/epitest/hostap/WPASupplicant
fi.epitest.hostap.WPASupplicant.getInterface string:"eth1"
method return sender=:1.231 -> dest=:1.238 reply_serial=2
   object path "/fi/epitest/hostap/WPASupplicant/Interfaces/0"

$ dbus-send --system --print-reply --type=method_call
--dest=fi.epitest.hostap.WPASupplicant /fi/epitest/hostap/WPASupplicant/Interfaces/0 fi.epitest.hostap.WPASupplicant.Interface.scan
method return sender=:1.231 -> dest=:1.247 reply_serial=2
   uint32 1


$ dbus-send --system --print-reply --type=method_call
--dest=fi.epitest.hostap.WPASupplicant /fi/epitest/hostap/WPASupplicant/Interfaces/0 fi.epitest.hostap.WPASupplicant.Interface.scanResults
method return sender=:1.272 -> dest=:1.276 reply_serial=2
   array [
      object path
"/fi/epitest/hostap/WPASupplicant/Interfaces/0/BSSIDs/6aa2f0cac3d7"
      object path
"/fi/epitest/hostap/WPASupplicant/Interfaces/0/BSSIDs/6aa2f0cac3d5"
      object path
"/fi/epitest/hostap/WPASupplicant/Interfaces/0/BSSIDs/6aa2f0cac3d6"
      object path
"/fi/epitest/hostap/WPASupplicant/Interfaces/0/BSSIDs/6aa2f0cac3d4"
      object path
"/fi/epitest/hostap/WPASupplicant/Interfaces/0/BSSIDs/baf2da12db51"
      object path
"/fi/epitest/hostap/WPASupplicant/Interfaces/0/BSSIDs/baf2da12db52"
      object path
"/fi/epitest/hostap/WPASupplicant/Interfaces/0/BSSIDs/baf2da12db53"
      object path
"/fi/epitest/hostap/WPASupplicant/Interfaces/0/BSSIDs/f6cd2eb9c22b"
      object path
"/fi/epitest/hostap/WPASupplicant/Interfaces/0/BSSIDs/f6cd2eb9c228"
      object path
"/fi/epitest/hostap/WPASupplicant/Interfaces/0/BSSIDs/f6cd2eb9c229"
      object path
"/fi/epitest/hostap/WPASupplicant/Interfaces/0/BSSIDs/f6cd2eb9c22a"
      object path
"/fi/epitest/hostap/WPASupplicant/Interfaces/0/BSSIDs/3af317cb8783"
      object path
"/fi/epitest/hostap/WPASupplicant/Interfaces/0/BSSIDs/00195be175b0"
      object path
"/fi/epitest/hostap/WPASupplicant/Interfaces/0/BSSIDs/001a6bc19357"
      object path
"/fi/epitest/hostap/WPASupplicant/Interfaces/0/BSSIDs/001733735f09"
      object path
"/fi/epitest/hostap/WPASupplicant/Interfaces/0/BSSIDs/000fb5cf9162"
      object path
"/fi/epitest/hostap/WPASupplicant/Interfaces/0/BSSIDs/001638278b69"
      object path
"/fi/epitest/hostap/WPASupplicant/Interfaces/0/BSSIDs/baf2da12db50"
      object path
"/fi/epitest/hostap/WPASupplicant/Interfaces/0/BSSIDs/001638f3d9c9"
      object path
"/fi/epitest/hostap/WPASupplicant/Interfaces/0/BSSIDs/001a6b0edad6"
      object path
"/fi/epitest/hostap/WPASupplicant/Interfaces/0/BSSIDs/001641cf4b7f"
      object path
"/fi/epitest/hostap/WPASupplicant/Interfaces/0/BSSIDs/3af317cb8780"
      object path
"/fi/epitest/hostap/WPASupplicant/Interfaces/0/BSSIDs/001a6bc27142"
      object path
"/fi/epitest/hostap/WPASupplicant/Interfaces/0/BSSIDs/0011f51da90c"
      object path
"/fi/epitest/hostap/WPASupplicant/Interfaces/0/BSSIDs/001733735f10"
   ]

$ dbus-send --system --print-reply --type=method_call
--dest=fi.epitest.hostap.WPASupplicant /fi/epitest/hostap/WPASupplicant/Interfaces/0/BSSIDs/6aa2f0cac3d4 fi.epitest.hostap.WPASupplicant.BSSID.properties string:"6aa2f0cac3d4"
method return sender=:1.290 -> dest=:1.293 reply_serial=2
   array [
      dict entry(
         string "bssid"
         variant             array [
               byte 106
               byte 162
               byte 240
               byte 202
               byte 195
               byte 212
            ]
      )
      dict entry(
         string "ssid"
         variant             array [
               byte 154
               byte 174
               byte 10
               byte 8
               byte 112
               byte 174
            ]
      )
      dict entry(
         string "wpaie"
         variant             array [
               byte 163
               byte 174
               byte 10
               byte 8
               byte 112
               byte 174
               byte 10
               byte 8
               byte 19
               byte 114
               byte 11
               byte 8
               byte 112
               byte 202
               byte 10
               byte 8
               byte 152
               byte 132
               byte 164
               byte 191
               byte 230
               byte 69
               byte 7
               byte 8
               byte 200
               byte 173
               byte 10
               byte 8
            ]
      )
      dict entry(
         string "frequency"
         variant             int32 2417
      )
      dict entry(
         string "capabilities"
         variant             uint16 17
      )
      dict entry(
         string "quality"
         variant             int32 59
      )
      dict entry(
         string "noise"
         variant             int32 0
      )
      dict entry(
         string "level"
         variant             int32 203
      )
      dict entry(
         string "maxrate"
         variant             int32 128
      )
   ]

Any hint or confirmation about this issue ?
Regards
Alban

PS: sorry not to use the ML but I am spam filtered from it . Every emails I sent went to /dev/null as far as I can tell.
Comment 1 Dan Williams 2008-02-11 19:40:14 UTC
What wireless hardware and driver are you using?
Comment 2 Alban Browaeys 2008-02-11 21:37:45 UTC
ipw2200 driver on :
  *-network:1
       description: Wireless interface
       product: PRO/Wireless 2200BG Network Connection
       vendor: Intel Corporation
       physical id: 2
       bus info: pci@0000:06:02.0
       logical name: eth1
       version: 05
       serial: [REMOVED]
       width: 32 bits
       clock: 33MHz
       capabilities: bus_master cap_list ethernet physical wireless
       configuration: broadcast=yes driver=ipw2200 driverversion=1.2.2kmprq firmware=ABG:9.0.2.6 (Mar 22 2005) ip=[REMOVED] latency=32 maxlatency=24 mingnt=3 module=ipw2200 multicast=yes wireless=IEEE 802.11g

as I told in the bug report there where no changes (except comments fixes or such in the driver : 
http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.24.y.git;a=commitdiff;h=61c93f4eb45493f203d6bad24156599668be614f

Regards
Alban
Comment 3 Alban Browaeys 2008-02-12 14:01:50 UTC
The issue was in wpa_supplicant dbus handlers . Attached is a patch.
I was wrong the kernel has nothing to do about it . I messed up my downgrade tests.
Hope the patch will be of use here . I ll try to submit it upstream too (if the spam filters enable me to do so ...).

Best regards
Alban
Comment 4 Alban Browaeys 2008-02-12 14:02:54 UTC
Created attachment 105050 [details] [review]
Fixes latest wpa_supplicant (0.6.2) dbus handlers. used by NM 0.7 .