Hmm. Not really very helpful. Do you have the WEP key that was in use at that time? Also, did the message actually occur during this dump? Is there any way to get the FCS of packets up to mac80211 from the iwlwifi drivers, or is it already snipped off by the firmware? Maybe you have a separate device you could capture traffic with? Preferably not iwlwifi, it seems to have trouble in monitor mode, at least my iwl4965 doesn't really seem to see traffic in foreign BSSes. Could you amend the failing printk to something like: DECLARE_MAC_BUF(mac1); DECLARE_MAC_BUF(mac2); [...] printk(KERN_DEBUG "WEP decrypt failed (ICV, A1=%s, A2=%s, seq=%x, wepidx=%d\n", print_mac(mac1, hdr->addr1), print_mac(mac2, hdr->addr2), le16_to_cpu(hdr->seq_ctrl), keyidx) Then start a packet capture and wait until the message occurs. Once it does, quickly run "iwlist key" as root to know what keys are currently in use and send me both the keys and the failing packet. Also, please see if maybe the printk is correlated (in time) with rekeying, the wpa_supplicant output (maybe with -dd) should tell you. johannes
Attachment:
signature.asc
Description: This is a digitally signed message part