Return-path: Received: from sabertooth01.qualcomm.com ([65.197.215.72]:9395 "EHLO sabertooth01.qualcomm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750865AbbDQGiE (ORCPT ); Fri, 17 Apr 2015 02:38:04 -0400 From: Kalle Valo To: Michal Kazior CC: , Subject: Re: [PATCH 0/4] ath10k: ibss crypto fixes References: <1428672203-8604-1-git-send-email-michal.kazior@tieto.com> Date: Fri, 17 Apr 2015 09:37:51 +0300 In-Reply-To: <1428672203-8604-1-git-send-email-michal.kazior@tieto.com> (Michal Kazior's message of "Fri, 10 Apr 2015 13:23:19 +0000") Message-ID: <87iocv45vk.fsf@kamboji.qca.qualcomm.com> (sfid-20150417_083808_148303_3CE469DA) MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Sender: linux-wireless-owner@vger.kernel.org List-ID: Michal Kazior writes: > I've mainly tested this on kvalo/pending branch. > Currently master branch contains 0f611d28fc2e > ("mac80211: count interfaces correctly for > combination checks") which breaks IBSS in > wpa_supplicant due to P2P Device and interface > combinations. This has been pointed out in the > following thread: > > [1]: http://thread.gmane.org/gmane.linux.kernel.wireless.general/135570/focus=136643 > > If someone's interested in running ath10k IBSS > make sure to use kernel prior to 4.0, revert the > mentioned mac80211 patch or apply wpa_supplicant > workaround patch from [1]. > > > Janusz Dziedzic (1): > ath10k: enable ibss-rsn > > Michal Kazior (3): > ath10k: don't use reassoc flag > ath10k: fix multiple key static wep with ibss > ath10k: set def key idx for ibss Thanks, all four patches applied. -- Kalle Valo