On Tue, 2013-01-08 at 12:11 +0100, Cedric Debarge wrote: > Hi all, > > I dug a little more on this problem and I found that hardware encryption is disabled after the first roam because ieee80211_key_enable_hw_accel fails on the following test : > if (sta && !sta->uploaded) > goto out_unsupported; > > After the first roam, sta->uploaded is tested before sta_info_move_state sets it to true. > > At the first association/authentication : > 1) sta_info_move_state sets sta->uploaded to true > 2) ieee80211_key_enable_hw_accel test it and find it true --> hardware decoding > > When the station changes from an AP to another : > 1) ieee80211_key_enable_hw_accel test it and find it false --> software decoding > 2) sta_info_move_state sets sta->uploaded to true I cannot reproduce this. Could you obtain tracing information ("trace-cmd record -e cfg80211") on an affected system? Also a wpa_supplicant debug log would be helpful. Or better yet, use a new supplicant with the "-T" parameter -- this will make its debug information go into the cfg80211 tracing that you record as per above. johannes -- To unsubscribe from this list: send the line "unsubscribe linux-wireless" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html