Good <time of day>,

When testing encrypted mesh functionality under heavy load (maxing out the
channel), there is a strong possibility that unicast key does not get
installed properly into hardware.

This test has been done using OpenWRT trunk @ svn revision r45676
Repros on TP-Link WDR-4300 hardware, specifically 5Ghz phy ( Atheros AR9340
Rev:2 ). It also reproduces on another piece of hardware running earlier
version of OpenWRT ( Atheros AR9280 Rev:2 )

To reproduce, set authsae "lifetime" to a small number of seconds (I've
used 30 seconds) then initiate TCP iperf test across the mesh link. With
iperf in the background, initiate ICMP ping between the two nodes. Observe
pings stop at the rekeying and coming back on the next rekey. Loading ath9k
with "nohwcrypt=1" resolves the issue at cost of greatly reduced throughput.

Instrumented code to print out key being installed at authsae, mac80211,
and ath9k levels show that correct key is passed all the way down to
hardware. Performing REG_READ on the installed key immediately after
REGWRITE_BUFFER_FLUSH in ath_hw_set_keycache_entry() indicates that correct
key is in the key register. Making authsae daemon instal same key again
after waiting for one second reduces the occurrence of the problem, but
does not eliminate it.

I can provide my openwrt build .config, image, and node configuration if
that helps.

P.S. Possibly manifestation of the same problem -
http://lists.shmoo.com/pipermail/hostap/2014-November/031377.html

Thank you all,
Alexis Green
_______________________________________________
ath9k-devel mailing list
[email protected]
https://lists.ath9k.org/mailman/listinfo/ath9k-devel

Reply via email to