Johannes Berg wrote:
Hmm.
Not really very helpful. Do you have the WEP key that was in use at that
time?
no .. (have not stored it somewhere)
Also, did the message actually occur during this dump?
Yes and not only once ;)
Is there any way to get the FCS of packets up to mac80211 from the
iwlwifi drivers, or is it already snipped off by the firmware?
Maybe you have a separate device you could capture traffic with?
Preferably not iwlwifi, it seems to have trouble in monitor mode, at
least my iwl4965 doesn't really seem to see traffic in foreign BSSes.
Unfortunately no. I remember you sending a patch "adding proper monitor
mode to iwl4965" .. has this ever been ported to iwl3945 ?
Could you amend the failing printk to something like:
DECLARE_MAC_BUF(mac1);
DECLARE_MAC_BUF(mac2);
[...]
printk(KERN_DEBUG "WEP decrypt failed (ICV, A1=%s, A2=%s, seq=%x, wepidx=%d\n",
print_mac(mac1, hdr->addr1), print_mac(mac2, hdr->addr2),
le16_to_cpu(hdr->seq_ctrl), keyidx)
Then start a packet capture and wait until the message occurs. Once it
does, quickly run "iwlist key" as root to know what keys are currently
in use and send me both the keys and the failing packet.
Can do this (next week)
Also, please see if maybe the printk is correlated (in time) with
rekeying, the wpa_supplicant output (maybe with -dd) should tell you.
I cannot say for sure now but last time I looked at the wpa_supplicant
-ddd output while this was happening nothing was printed at all. But I
will do this again and let you know.
thx
-
To unsubscribe from this list: send the line "unsubscribe linux-wireless" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html