Felix Fietkau wrote: > ath9k's tx handling code contains a special case for PAE frames, which > looks like it was intended to be improving reliability by excluding > them from aggregates. > What it actually did is the opposite: By assigning a faulty sequence > number, yet still keeping it as a qos-frame, it caused bogus packet > reordering, which broke WPA rekeying. > The special case handling is completely unnecessary, so this patch > removes it. Sending PAE frames as part of an aggregate broke crypto with several APs. Assigning the correct seq. number should work, no ? Something like the patch below. Can you check if it fixes your issue ? Though, removing the seq. number mess in the driver would be great. :D diff --git a/drivers/net/wireless/ath/ath9k/xmit.c b/drivers/net/wireless/ath/ath9k/xmit.c index a6893cf..cb6d982 100644 --- a/drivers/net/wireless/ath/ath9k/xmit.c +++ b/drivers/net/wireless/ath/ath9k/xmit.c @@ -1610,7 +1610,7 @@ static int ath_tx_setup_buffer(struct ieee80211_hw *hw, struct ath_buf *bf, bf->bf_frmlen -= padsize; } - if (conf_is_ht(&hw->conf) && !is_pae(skb)) + if (conf_is_ht(&hw->conf)) bf->bf_state.bf_type |= BUF_HT; bf->bf_flags = setup_tx_flags(sc, skb, txctl->txq); @@ -1696,7 +1696,7 @@ static void ath_tx_start_dma(struct ath_softc *sc, struct ath_buf *bf, goto tx_done; } - if (tx_info->flags & IEEE80211_TX_CTL_AMPDU) { + if ((tx_info->flags & IEEE80211_TX_CTL_AMPDU) && !is_pae(skb)) { /* * Try aggregation if it's a unicast data frame * and the destination is HT capable. -- To unsubscribe from this list: send the line "unsubscribe linux-wireless" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html