RE: [OpenWrt-Devel] ATH10K VLAN firmware issue

2017-02-22 Thread voncken
Thanks for your answer, 

How I can know when this issue will be fixed in ath10k firmware
mainline?
Do you know if Qualcomm publish a release note for this firmware?

> -Message d'origine-
> De : linux-wireless-ow...@vger.kernel.org [mailto:linux-wireless-
> ow...@vger.kernel.org] De la part de Valo, Kalle
> Envoyé : mardi 21 février 2017 14:19
> À : voncken
> Cc : 'OpenWrt Development List'; 'linux-wireless';
> ath...@lists.infradead.org
> Objet : Re: [OpenWrt-Devel] ATH10K VLAN firmware issue
> 
> voncken <cedric.vonc...@acksys.fr> writes:
> 
> > Do you know if the firmware team planned to fix the VLAN issue on
> > ath10k firmware?
> 
> I reported it forward only this week.
> 
> --
> Kalle Valo



RE: [OpenWrt-Devel] ATH10K VLAN firmware issue

2017-02-21 Thread voncken
Kalle, 

Do you know if the firmware team planned to fix the VLAN issue on ath10k
firmware?

Thanks for your help.

Cedric.
> -Message d'origine-
> De : linux-wireless-ow...@vger.kernel.org [mailto:linux-wireless-
> ow...@vger.kernel.org] De la part de Valo, Kalle
> Envoyé : mardi 15 novembre 2016 14:44
> À : Bruno Antunes
> Cc : OpenWrt Development List; linux-wireless; voncken;
> ath...@lists.infradead.org
> Objet : Re: [OpenWrt-Devel] ATH10K VLAN firmware issue
> 
> Bruno Antunes <baantu...@gmail.com> writes:
> 
> > On 7 November 2016 at 18:06, Valo, Kalle <kv...@qca.qualcomm.com>
> wrote:
> >> Bruno Antunes <baantu...@gmail.com> writes:
> >>
> >>> On 4 November 2016 at 21:17, Valo, Kalle <kv...@qca.qualcomm.com>
> wrote:
> >>>
> >>>> Can someone file a bug to bugzilla about this so that all the info
> >>>> is properly stored? The more comprehensive the report is the
> better.
> >>>>
> >>>> https://bugzilla.kernel.org/
> >>>
> >>> I will file a bug report.
> >>
> >> Thanks, it's good to store all in one place so that it's easier to
> >> find the relevant info.
> >
> > Just file the bug with the ID 187241 - VLAN support in ATH10k Feel
> > free to ask for adicional info. I did not mention any names in the
> bug
> > report fell free to take credit if wanted.
> 
> Thanks. I'll report it to the firmware team, let's see what happens. If
> there's more information which might help to fix this feel free to
> update that to the bug report.
> 
> https://bugzilla.kernel.org/show_bug.cgi?id=187241
> 
> --
> Kalle Valo



Atheros ETSI DFS pattern

2016-11-30 Thread voncken
In the file drivers/net/wireless/ath/dfs_pattern_detector.c we can found the
ETSI pattern definition.

In this definition we can found 7 patterns (0 to 6).

The ETSI standard EN 301893 Annex D only specifies 6 patterns. Only the
pattern 1 to 6 defined in the ath dfs pattern match with the ETSI standard.

Why the pattern 0 is defined?

Is it possible to remove this pattern and keep compliant with the ETSI
standard?

Thanks for your help.

Cedric.



RE: [OpenWrt-Devel] ATH10K VLAN firmware issue

2016-11-15 Thread voncken
Hi Ben, 

Do you plan to release a candelatech firmware with this fix?

Regards.

Cedric Voncken.
> -Message d'origine-
> De : linux-wireless-ow...@vger.kernel.org [mailto:linux-wireless-
> ow...@vger.kernel.org] De la part de Ben Greear
> Envoyé : samedi 5 novembre 2016 15:35
> À : Sebastian Gottschall; yu-chieh kung; Bruno Antunes
> Cc : Mauro Mozzarelli; linux-wireless@vger.kernel.org; OpenWrt
> Development List; ath...@lists.infradead.org
> Objet : Re: [OpenWrt-Devel] ATH10K VLAN firmware issue
> 
> Looks to me like 10.4 defaults to the right value, but possibly there
> are other issues with it.  I tested my CT 10.4 and it worked OK with
> vlans for me.
> 
> Thanks,
> Ben
> 
> On 11/05/2016 01:05 AM, Sebastian Gottschall wrote:
> > would be good if qca can fix this bug finally in all available
> > firmwares. its a very annoying issue since a long time
> >
> > Sebastian
> >
> >
> > Am 04.11.2016 um 23:23 schrieb Ben Greear:
> >> The bug appears that vlan-tx-stripping is unconditionally enabled in
> >> at least my firmware.  I have re-compiled w/out that flag set, and
> it
> >> appears to work for me.
> >>
> >> Please download this firmware, rename it firmware-2.bin, make sure
> >> you remove/rename any firmware-5.bin (etc) so mine will load, and
> see if that fixes your problem.
> >>
> >> Please note that it is very likely you will have to use same MAC
> >> address for the VLAN devices that the underlying station uses in
> order for this to work.
> >>
> >> https://www.candelatech.com/downloads/tmp/firmware-2-full-
> community.b
> >> in
> >>
> >>
> >> Thanks,
> >> Ben
> >>
> >>
> >> On 11/04/2016 02:50 PM, Ben Greear wrote:
> >>> I can reproduce this in my CT firmware. I'll see if I can fix it,
> >>> but for stock firmware, it might be that changing the driver to use
> >>> Ethernet packet type of native-wifi would make .1q vlans work.
> >>>
> >>> Thanks,
> >>> Ben
> >>>
> >>> On 11/04/2016 10:28 AM, yu-chieh kung wrote:
> >>>> I met the same problem before,
> >>>> if i modify the 1q header to other value (0xaa00) before go into
> firmware.
> >>>> I can capture the packet in the air I think the vlan packet is
> >>>> dropped in firmware.
> >>>>
> >>>> 2016-11-04 22:41 GMT+08:00 Bruno Antunes <baantu...@gmail.com>:
> >>>>> On 4 November 2016 at 14:18, Mauro Mozzarelli
> <open...@ezplanet.net> wrote:
> >>>>>> Since the capability is implemented in software you might be
> >>>>>> testing the limit of your router's CPU i/o speed.
> >>>>>
> >>>>> By loading the module in rawmode?
> >>>>>
> >>>>> The AP is an APU and Sta is an APU2.
> >>>>>
> >>>>>>
> >>>>>>
> >>>>>>
> >>>>>> On 04/11/16 14:13, Bruno Antunes wrote:
> >>>>>>>
> >>>>>>> Hi all,
> >>>>>>>
> >>>>>>> Old thread but I think the issue is still present.
> >>>>>>>
> >>>>>>> I'm running a setup with VLANs with WDS and ath10k cards.
> >>>>>>>
> >>>>>>> To make it work both cards must be loaded in rawmode, AP and
> >>>>>>> Sta, and with no security.
> >>>>>>>
> >>>>>>> I'm using a OpenWrt trunk r49941 and the most recent firmware,
> >>>>>>> 10.2.4.70.58, from Kalle ath10k firmware tree.
> >>>>>>>
> >>>>>>> Although it works the throughput is very bad.
> >>>>>>> Are there any alternatives to improve the throughput.
> >>>>>>>
> >>>>>>> Best Regards,
> >>>>>>> Bruno
> >>>>>>>
> >>>>>>> On 9 December 2015 at 17:24, voncken <cedric.vonc...@acksys.fr>
> wrote:
> >>>>>>>>
> >>>>>>>>
> >>>>>>>>> -Message d'origine-
> >>>>>>>>> De : Ben Greear [mailto:gree...@candelatech.com] Envoyé :
> >>>>>>>>> mercredi 9 décembre 2015 16:34 À : Cedric VONCKEN;

RE: Mac80211 : Wpa rekeying issue

2015-12-31 Thread voncken
Hi, 

I'm not a WPA expert and security expert, 

Could you explain why the patch sent by Alexander Wetzel break the security 
properties of this code?

The Alexander's patch is in attachment.

Thanks for your help.

> -Message d'origine-
> De : linux-wireless-ow...@vger.kernel.org [mailto:linux-wireless-
> ow...@vger.kernel.org] De la part de voncken
> Envoyé : mardi 29 décembre 2015 16:24
> À : 'Emmanuel Grumbach'
> Cc : 'linux-wireless'; 'Johannes Berg'
> Objet : RE: Mac80211 : Wpa rekeying issue
> 
>   > -Message d'origine-
> > De : Emmanuel Grumbach [mailto:egrumb...@gmail.com] Envoyé : mardi 29
> > décembre 2015 15:20 À : Cedric VONCKEN Cc : linux-wireless Objet : Re:
> > Mac80211 : Wpa rekeying issue
> >
> > On Tue, Dec 29, 2015 at 3:01 PM, Cedric VONCKEN
> > <cedric.vonc...@acksys.fr>
> > wrote:
> > > Hi,
> > >
> > > My test plateform is:
> > > 2 equipements
> > > Both equipment used compat version 2015-07-21 from openwrt.
> > > Both equipment used security WPA2
> > >
> > > The equipment #1 is an AP.
> > > The Group rekey interval is set to 3601s
> > > The Pair rekey interval set to 50s (I reduced this value to
> > > show the issue often)
> > > The Master rekey interval is set to 86400 s.
> > >
> > > The equipment #2 is a sta+wds
> > >
> > > I used a 5GHz channel to have a free channel (without other AP) I
> > > connected a computer on each equipment.
> > >
> > > To reproduce the issue:
> > > I ran iperf udp@50Mbps from computer connected to the AP to
> > > the computer connected to the sta. After several WPA2 rekeying,
> > > iperf server side didn't received any frame.
> > >
> > > I investigated in the driver. All packets are dropped in sta side,
> > > because the function ieee80211_crypto_ccmp_decrypt return
> > > Rx_DROP_UNUSABLE. This function return this code because the test
> > > if(memcmp(pn,key->u.ccmp.rx_pn[queue],IEEE8021_CCMP_PN_LEN) <=0)
> > > return true.
> > >
> > > Have you any idea to fix this issue?
> > >
> >
> > I don't remember exactly what we had, but you may look at
> > http://permalink.gmane.org/gmane.linux.kernel.wireless.general/137742
> 
> Thanks for the link, I think I'm in the same situation.
> 
> How can I fix this issue?
> 
> Because the patch sent by Alexander Wetzel was rejected by Johannes (for
> security reason), and if I disable the hw crypto I will have performance
> issue.
> 
> 
> --
> To unsubscribe from this list: send the line "unsubscribe linux-wireless"
> in the body of a message to majord...@vger.kernel.org More majordomo info
> at  http://vger.kernel.org/majordomo-info.html


fix1.patch
Description: Binary data


RE: Mac80211 : Wpa rekeying issue

2015-12-31 Thread voncken
> >
> > Hi,
> >
> > I'm not a WPA expert and security expert,
> >
> > Could you explain why the patch sent by Alexander Wetzel break the
> security properties of this code?
> >
> > The Alexander's patch is in attachment.
> >
> > Thanks for your help.
> 
> It simply disables the replay attack detection :) You could receive the
> same (encrypted) packet twice and not throw away the second one.
> The author of the patch never said that this patch is a "fix", it is rather
> a debug step to understand what happens.
> 
> PTK rekeying is a problem from the spec point of view. In Intel, we did
> inquiries and in the end we understood that what we should really do
> whenever we get to a situation where we need to rekey the PTK is to
> disconnect and reconnect. Only weird configuration allow to change the PTK
> more frequently than after X packet (don't remember what X is bu something
> like 2^32 which is big enough to hold the connection for days...).
> 
> IIRC, Intel devices don't have problems in Tx while we rekey because we
> give the key material along with the packet itself, so that we can't get to
> a situation where we have old PN and new key. The Atheros devices separate
> the key material and the Tx packet (which is a perfectly valid design
> decision), but this introduce the possibility to use the old PN with a new
> key meaning that the recipient could decrypt the packet after the new key
> has been installed, but it would also update the PN to be high and discard
> all the next packets that will come with a new (low) PN.
> So essentially, this is a bug in the TX'ing side. Fixing it requires to hit
> the performance which is not something people are willing to do, when the
> bug is really in the spec.
> That's what I remember, but I may be wrong.
> 
Thanks for your answer.
Do you know if we can have the same issue with ATH10K chipset?


--
To unsubscribe from this list: send the line "unsubscribe linux-wireless" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


RE: Mac80211 : Wpa rekeying issue

2015-12-29 Thread voncken
> -Message d'origine-
> De : Emmanuel Grumbach [mailto:egrumb...@gmail.com]
> Envoyé : mardi 29 décembre 2015 15:20
> À : Cedric VONCKEN
> Cc : linux-wireless
> Objet : Re: Mac80211 : Wpa rekeying issue
> 
> On Tue, Dec 29, 2015 at 3:01 PM, Cedric VONCKEN <cedric.vonc...@acksys.fr>
> wrote:
> > Hi,
> >
> > My test plateform is:
> > 2 equipements
> > Both equipment used compat version 2015-07-21 from openwrt.
> > Both equipment used security WPA2
> >
> > The equipment #1 is an AP.
> > The Group rekey interval is set to 3601s
> > The Pair rekey interval set to 50s (I reduced this value to
> > show the issue often)
> > The Master rekey interval is set to 86400 s.
> >
> > The equipment #2 is a sta+wds
> >
> > I used a 5GHz channel to have a free channel (without other AP) I
> > connected a computer on each equipment.
> >
> > To reproduce the issue:
> > I ran iperf udp@50Mbps from computer connected to the AP to
> > the computer connected to the sta. After several WPA2 rekeying, iperf
> > server side didn't received any frame.
> >
> > I investigated in the driver. All packets are dropped in sta side,
> > because the function ieee80211_crypto_ccmp_decrypt return
> > Rx_DROP_UNUSABLE. This function return this code because the test
> > if(memcmp(pn,key->u.ccmp.rx_pn[queue],IEEE8021_CCMP_PN_LEN) <=0)
> > return true.
> >
> > Have you any idea to fix this issue?
> >
> 
> I don't remember exactly what we had, but you may look at
> http://permalink.gmane.org/gmane.linux.kernel.wireless.general/137742

Thanks for the link, I think I'm in the same situation.

How can I fix this issue?

Because the patch sent by Alexander Wetzel was rejected by Johannes (for 
security reason), and if I disable the hw crypto I will have performance issue.


--
To unsubscribe from this list: send the line "unsubscribe linux-wireless" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Mac80211 driver crash in monitor mode

2015-12-10 Thread Cedric VONCKEN
Hi, 

I'm using mac80211/ATH9K driver in monitor mode to inject some packets.

With the latest driver version my packet injector software generated a
kernel panic.

The reason of this crash is:
In mac80211/tx.c, function __ieee80211_tx:

case NL80211_IFTYPE_MONITOR:
if (sdata->u.mntr_flags & MONITOR_FLAG_ACTIVE) {
vif = >vif;
break;
}
sdata = rcu_dereference(local->monitor_sdata);
if (sdata) {
vif = >vif;
info->hw_queue =

vif->hw_queue[skb_get_queue_mapping(skb)];
} else if (ieee80211_hw_check(>hw,
QUEUE_CONTROL)) {
ieee80211_purge_tx_queue(>hw, skbs);
return true;
} else
vif = NULL;
break; 

If I don't enable the MONITOR_FLAG_ACTIVE I'm going to the line vif =
null, this function will continue and will call ieee80211_tx_frags and
this function will call ieee80211_drv_tx.

In ieee80211_drv_tx function:
 
if (pubsta) {
u8 tid = skb->priority & IEEE80211_QOS_CTL_TID_MASK;

txq = pubsta->txq[tid];
} else if (vif) {
txq = vif->txq;
} 

In my case pubsta == null so I'm going to else statement. The line
vif->txq generate kernel pannic because the VIF pointer have been
initialized to null in __ieee80211_tx function.

Do you have any suggestion to fix this crash?

Cedric Voncken.
--
To unsubscribe from this list: send the line "unsubscribe linux-wireless" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


RE: ATH10K VLAN firmware issue

2015-12-09 Thread voncken


> -Message d'origine-
> De : Ben Greear [mailto:gree...@candelatech.com]
> Envoyé : mercredi 9 décembre 2015 16:34
> À : Cedric VONCKEN; ath...@lists.infradead.org; linux-wireless
> Objet : Re: ATH10K VLAN firmware issue
> 
> This only happens when you use STA  + WDS, or is .1q broken for you in
> other cases as well?

No, this issue occurs in all modes (STA, STA + WDS, AP).

Thanks

Cedric.

> 
> Thanks,
> Ben
> 
> On 12/08/2015 06:29 AM, Cedric VONCKEN wrote:
> > I'm testing to transmit frame with 802.1q tag (VLAN).
> >
> > My client is set in STA + WDS and the netdev is bridged with eth0.
> > I have a computer with vlan configuration set connected to the STA
> > eth0.
> >
> > If I try to transmit frames with 802.1q tag, the frames are not
sent.
> > I checked with wireless sniffer, and I don't see the frame with VLAN
> > tag (the frames without VLAN tag are sent).
> >
> > I tested with firmware 10.2.4.70.14-2 from kale github,
> > 10.1.467-ct-com-full-015 from candelatech and 10.2.4.70-2 from
> > openwrt, and in all cases I have the same issue.
> >
> > Thanks for your help.
> >
> >
> > --
> > To unsubscribe from this list: send the line "unsubscribe
> > linux-wireless" in the body of a message to majord...@vger.kernel.org
> > More majordomo info at  http://vger.kernel.org/majordomo-info.html
> >
> 
> --
> Ben Greear <gree...@candelatech.com>
> Candela Technologies Inc  http://www.candelatech.com

--
To unsubscribe from this list: send the line "unsubscribe linux-wireless" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


ATH10K VLAN firmware issue

2015-12-08 Thread Cedric VONCKEN
I'm testing to transmit frame with 802.1q tag (VLAN).

My client is set in STA + WDS and the netdev is bridged with
eth0.
I have a computer with vlan configuration set connected to the
STA eth0.

If I try to transmit frames with 802.1q tag, the frames are not
sent.
I checked with wireless sniffer, and I don't see the frame with
VLAN tag (the frames without VLAN tag are sent).

I tested with firmware 10.2.4.70.14-2 from kale github,
10.1.467-ct-com-full-015 from candelatech and 10.2.4.70-2 from openwrt,
and in all cases I have the same issue.

Thanks for your help.


--
To unsubscribe from this list: send the line "unsubscribe linux-wireless" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


RE: ATH10 firmware question

2015-11-25 Thread voncken
Hi, 

Thanks for your answer.

> >>>
> >>>  Hi,
> >>>
> >>>  I have a simple test platform.
> >>>  One PC connected to an equipment. This equipment is set in
> >>> AP mode.
> >>>  Another PC connected to another equipment. This equipment
> >>> is set in STA + WDS mode.
> >>>
> >>>  Both equipment use the same openwrt Firmware (compat
> >>> 2015-07-21), I only changed the ath10k firmware (in
> >>> /lib/firmware/ath10k/...).
> >>>  Both equipment has the same hardware.
> >>>  I used a clear channel, and VHT80.
> >>>  The radio was connected with a coaxial cable and I placed
> >>> 40 dBm attenuation per Rf chain.
> >>>  I used the WLN350NX radio card from compex.
> >>>
> >>>  First test : ATH10K firmware 10.2.4.70-2 on both equipment
> >>>  An iperf from PC connected to the AP to the PC
> >>> connected to the STA give 919 Mbps.
> >>>  An iperf from PC connected to the STA to the PC
> >>> connected to the AP give 500 Mbps.
> >>>
> >>>  Second test : ATHK firmware 10.2.4.70.10-2 on both equipment
> >>>  An iperf from PC connected to the AP to the PC
> >>> connected to the STA give 921 Mbps.
> >>>  An iperf from PC connected to the STA to the PC
> >>> connected to the AP give 441 Mbps.
> >>>
> >>>  If I cross the computer I have the same result. I did
> >>> several time these test and I always have the same result.
> >>
> >>
> >> We see similar.  One thing we notice is that if you actually try to
> >> send less throughput, then you get better overall throughput.
> >>
> >> In other words, trying to send 1Gbps UDP frames will give you more
> >> poor throughput than trying to send 650Mbps (in the upload direction).
> >>
> >> I thought it might be a poor interaction regarding backoff in the
> >> ath10k driver/firmware (see the congestion bins in firmware for why
> >> this is the case), but even fixing that in firmware didn't improve
> >> the situation in my testing.
> >
> > If CPU is the bottleneck on DUT than overcommiting the UDP traffic at
> > the source may lead the ethernet driver to waste CPU cycles on the
> > DUT.
> 
> You are correct about the overcommit in general, but our systems are quite
> overpowered.
> 
> We are testing with 3.5Ghz E5 quad-core systems...it is not just a CPU
> usage issue.  And, exact same hardware runs great (close to 900Mbps) in AP
> download mode.
>
In my case I'm testing with mips 64 dual core at 1.2 GHz. The CPU load is 
around 50% during my test. I'm agree with Ben, the issue is not in CPU.

I tried this morning with different firmware version. I only change the ath10K 
firmware in client side and I only test the client Tx performance.

Test with firmware 999.999.0.636
Unfortunately this firmware does not support the WDS mode, I need to update my 
setting. With this firmware I have a better performance, I can reach 700 Mbps. 

Test with firmware 10.1.467-ct-15 from candelatech (full community version)
I tested in WDS setting and the same setting of previous firmware to be sure 
the setting have no impact on the performance. In both case I can reach around 
650 Mbps.
I tested with beta-16 firmware from candelatech, but I have a similar 
performance.

Thanks
Cedric.

--
To unsubscribe from this list: send the line "unsubscribe linux-wireless" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


ATH10 firmware question

2015-11-24 Thread Cedric VONCKEN
Hi, 

I have a simple test platform. 
One PC connected to an equipment. This equipment is set in AP
mode.
Another PC connected to another equipment. This equipment is set
in STA + WDS mode.

Both equipment use the same openwrt Firmware (compat
2015-07-21), I only changed the ath10k firmware (in
/lib/firmware/ath10k/...).
Both equipment has the same hardware.
I used a clear channel, and VHT80.
The radio was connected with a coaxial cable and I placed 40 dBm
attenuation per Rf chain.
I used the WLN350NX radio card from compex.

First test : ATH10K firmware 10.2.4.70-2 on both equipment
An iperf from PC connected to the AP to the PC connected
to the STA give 919 Mbps.
An iperf from PC connected to the STA to the PC
connected to the AP give 500 Mbps.

Second test : ATHK firmware 10.2.4.70.10-2 on both equipment
An iperf from PC connected to the AP to the PC connected
to the STA give 921 Mbps.
An iperf from PC connected to the STA to the PC
connected to the AP give 441 Mbps.

If I cross the computer I have the same result. I did several
time these test and I always have the same result.

Is it the expected result?
What is the recommanded firmware version for each mode?

Thanks for your help.

Cedric Voncken.







--
To unsubscribe from this list: send the line "unsubscribe linux-wireless" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Ath10K issue

2015-09-09 Thread Cedric VONCKEN
I'm using compat-wireless 2015-03-09 from openwrt.

At the power up, these equipments worked in AP mode and several sta can 
do an association.
Randomly it is not possible to make association to several AP.

If I look the log file I see cyclically these error messages.
Wed Sep  9 10:29:49 2015 kern.warn kernel: [17654.116104] ath10k_warn: 186 
callbacks suppressed
Wed Sep  9 10:29:49 2015 kern.warn kernel: [17654.133185] ath10k_pci 
0001:02:00.0: SWBA overrun on vdev 3, skipped old beacon
Wed Sep  9 10:29:49 2015 kern.warn kernel: [17654.153058] ath10k_pci 
0001:02:00.0: SWBA overrun on vdev 0, skipped old beacon
Wed Sep  9 10:29:49 2015 kern.warn kernel: [17654.157255] ath10k_pci 
0001:02:00.0: reached WMI management transmit queue limit
Wed Sep  9 10:29:49 2015 kern.warn kernel: [17654.157260] ath10k_pci 
0001:02:00.0: failed to transmit packet, dropping: -16
Wed Sep  9 10:29:49 2015 kern.warn kernel: [17654.212297] ath10k_pci 
0001:02:00.0: SWBA overrun on vdev 2, skipped old beacon
Wed Sep  9 10:29:49 2015 kern.warn kernel: [17654.232087] ath10k_pci 
0001:02:00.0: SWBA overrun on vdev 3, skipped old beacon
Wed Sep  9 10:29:49 2015 kern.warn kernel: [17654.252874] ath10k_pci 
0001:02:00.0: SWBA overrun on vdev 0, skipped old beacon
Wed Sep  9 10:29:49 2015 kern.warn kernel: [17654.286774] ath10k_pci 
0001:02:00.0: SWBA overrun on vdev 2, skipped old beacon
Wed Sep  9 10:29:49 2015 kern.warn kernel: [17654.320914] ath10k_pci 
0001:02:00.0: SWBA overrun on vdev 3, skipped old beacon
Wed Sep  9 10:29:49 2015 kern.warn kernel: [17654.355043] ath10k_pci 
0001:02:00.0: SWBA overrun on vdev 0, skipped old beacon
Wed Sep  9 10:29:54 2015 kern.warn kernel: [17659.167694] ath10k_warn: 193 
callbacks suppressed
Wed Sep  9 10:29:54 2015 kern.warn kernel: [17659.184778] ath10k_pci 
0001:02:00.0: SWBA overrun on vdev 0, skipped old beacon
Wed Sep  9 10:29:54 2015 kern.warn kernel: [17659.204514] ath10k_pci 
0001:02:00.0: SWBA overrun on vdev 2, skipped old beacon
Wed Sep  9 10:29:54 2015 kern.warn kernel: [17659.225098] ath10k_pci 
0001:02:00.0: reached WMI management transmit queue limit
Wed Sep  9 10:29:54 2015 kern.warn kernel: [17659.235968] ath10k_pci 
0001:02:00.0: SWBA overrun on vdev 3, skipped old beacon
Wed Sep  9 10:29:54 2015 kern.warn kernel: [17659.264524] ath10k_pci 
0001:02:00.0: failed to transmit packet, dropping: -16
Wed Sep  9 10:29:54 2015 kern.warn kernel: [17659.270094] ath10k_pci 
0001:02:00.0: SWBA overrun on vdev 0, skipped old beacon
Wed Sep  9 10:29:54 2015 kern.warn kernel: [17659.303945] ath10k_pci 
0001:02:00.0: failed to transmit management frame via WMI: -11
Wed Sep  9 10:29:54 2015 kern.warn kernel: [17659.304408] ath10k_pci 
0001:02:00.0: reached WMI management transmit queue limit
Wed Sep  9 10:29:54 2015 kern.warn kernel: [17659.304414] ath10k_pci 
0001:02:00.0: failed to transmit packet, dropping: -16
Wed Sep  9 10:29:54 2015 kern.warn kernel: [17659.363876] ath10k_pci 
0001:02:00.0: SWBA overrun on vdev 2, skipped old beacon
Wed Sep  9 10:29:59 2015 kern.warn kernel: [17664.219316] ath10k_warn: 208 
callbacks suppressed

To reestablish my access point I need to restart the Wifi (wifi up in 
openwrt).

Have you any idea of this issue?

Regards.

Cédric Voncken.
--
To unsubscribe from this list: send the line "unsubscribe linux-wireless" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


RE: ATH10K and VLAN : Frame with VLAN tag are not sent

2015-06-05 Thread voncken
  The WDS client mode seems to work with ATH10k, and I have the
 same problem without it.
  My problem is not in the AP-VLAN feature. I didn't use the
 encryption in my test. The frames with vlan tag are not sent by ath10k
 wireless card, in Sta mode, AP mode, Sta + wds mode.
 
  My PC1 sends a frame to PC2 with or without VLAN tag.
  If the tag is present the frame is not sent.
  If the tag is not present the frame is sent.
 
  In my test, the frame with VLAN tag should be sent through
 ATH10K.
 
  I enable the debug in ATH10k driver. The frame with the vlan
 tag is sent to the wireless radio card.
  I check the frame dump from ath10k_htt_tx function but I didn't
 see any error in frame format.
 
  I paste the dump below (the frame it is an arp frame in the
 vlan 6).
  ath10k_pci :01:00.0: htt tx flags0 37 flags1 3072 len 70 id 0
  frags_paddr 06a54000, msdu_paddr 0c158c66 vdev 0 tid 16 freq 0
  ath10k_pci :01:00.0: htt tx msdu: : 88 03 00 00 04 f0 21
  0e 38 e1 04 f0 21 18 03 a0 ath10k_pci :01:00.0: htt tx msdu:
  0010: ff ff ff ff ff ff a 00 09 90 00 4a 97 aa aa ath10k_pci
  :01:00.0: htt tx msdu: 0020: 03 00 00 00 81 00 00 06 08 06 00
  01 08 00 06 04 ath10k_pci :01:00.0: htt tx msdu: 0030: 00 01
  00 09 90 00 4a 97 c0 a8 06 fd 00 00 00 00 ath10k_pci :01:00.0: htt
  tx msdu: 0040: 00 00 c0 a8 06 01
 
 Oh. So you actually refer to the dot1q VLAN tagging. I haven't tested
 this but I would expect this to work.
I'm agree with you it should work, but not :-(
 
 
  Moreover, for each frame sent the Tx status from the cards will
 increment the failed_count counter, but I didn't know what went wrong.
 
 Perhaps htt tx msdu was completed with failure status code. You didn't
 provide enough logs so I'm just guessing.
I didn't have more log on this point, I'm trying the ath10k debug, the ath10 
ftrace. If you know how I can have more log on the failure, I will send these 
logs.

 
 
  Any idea ?
 
 I see no reason why this should fail. The dot1q encapsulation shouldn't
 influence how firmware behaves.. but maybe I'm wrong.
 
 It's still unclear to me what your topology looks like. Perhaps you're
 having problem with environmental configuration itself? Did you try other
 Wi-Fi device (e.g. ath9k) instead of ath10k?
Yes I tested with ath9k wireless card, the same configuration works.

I did an interesting test. With ostinato software I generate an ICMP frame 
without vlan tag. I changed the ethertype in the frame.
I tried with the ethertype 0x800 (IP), 0x801, 0x8892 (PROFINET), 0x8100 
(dot1q), 0x0600. All frames are sent except when the ethertype is set to 
0x8100. It seems the firmware do not accept the ethertype 0x8100.  

 
 
 Michał

--
To unsubscribe from this list: send the line unsubscribe linux-wireless in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


RE: ATH10K and VLAN : Frame with VLAN tag are not sent

2015-06-05 Thread voncken
The WDS client mode seems to work with ATH10k, and I have the same 
problem without it.
My problem is not in the AP-VLAN feature. I didn't use the encryption 
in my test. The frames with vlan tag are not sent by ath10k wireless card, in 
Sta mode, AP mode, Sta + wds mode.

My PC1 sends a frame to PC2 with or without VLAN tag.
If the tag is present the frame is not sent. 
If the tag is not present the frame is sent. 

In my test, the frame with VLAN tag should be sent through ATH10K.

I enable the debug in ATH10k driver. The frame with the vlan tag is 
sent to the wireless radio card.
I check the frame dump from ath10k_htt_tx function but I didn't see any 
error in frame format.

I paste the dump below (the frame it is an arp frame in the vlan 6).
ath10k_pci :01:00.0: htt tx flags0 37 flags1 3072 len 70 id 0 frags_paddr 
06a54000, msdu_paddr 0c158c66 vdev 0 tid 16 freq 0
ath10k_pci :01:00.0: htt tx msdu: : 88 03 00 00 04 f0 21 0e 38 e1 
04 f0 21 18 03 a0   
ath10k_pci :01:00.0: htt tx msdu: 0010: ff ff ff ff ff ff a 00 09 90 00 
4a 97 aa aa  
ath10k_pci :01:00.0: htt tx msdu: 0020: 03 00 00 00 81 00 00 06 08 06 
00 01 08 00 06 04  
ath10k_pci :01:00.0: htt tx msdu: 0030: 00 01 00 09 90 00 4a 97 c0 a8 
06 fd 00 00 00 00  
ath10k_pci :01:00.0: htt tx msdu: 0040: 00 00 c0 a8 06 01

Moreover, for each frame sent the Tx status from the cards will 
increment the failed_count counter, but I didn't know what went wrong.

Any idea ?

Regards.

Cedric.
 -Message d'origine-
 De : Michal Kazior [mailto:michal.kaz...@tieto.com]
 Envoyé : vendredi 5 juin 2015 07:42
 À : Cedric VONCKEN
 Cc : linux-wireless
 Objet : Re: ATH10K and VLAN
 
 On 3 June 2015 at 16:46, Cedric VONCKEN cedric.vonc...@acksys.fr wrote:
  I'm testing to send a VLAN frame through ATH10K device.
  I'm using compat wireless 2015-03-09 from openWRT. The ATH10K
  firmware used is 10.2.4.45
 
  My test platform is:
  Pc1 : IP 10.101.4.3 (without VLAN)
  VLAN 1 : IP 192.168.5.1
 
  Equipment in AP mode. The netdev is bridged with eth0
 
  Equipment in client mode with WDS mode enables. The
 client is connected to the AP. The netdev is bridged with eth0.
  AP and client use ATH10K wireless card.
 
  PC2: IP 10.101.4.4 (without VLAN)
  VLAN 1 : IP 192.168.5.2
 
  The PC1 is connected to the equipment in AP mode and
 the PC2 is connected to the equipment in client mode.
 
 
  I can ping from PC1 to PC2 without vlan (ping 10.101.4.4).
  I cannot ping from PC1 to PC2 with VLAN.
  With tcpdump I checked the vlan frame is sent to the netdev but
 this frame is not send to the air.
 
  Is it possible to send a VLAN frame through ATH10K? If no, is
 it a driver limitation or firmware limitation?
 
 I'm not sure if IFTYPE_WDS works with ath10k but IFTYPE_AP_VLAN works
 fine for me on latest github.com/kvalo/ath master branch. Can you test if
 it works with no encryption, please?
 
 
 Michał

--
To unsubscribe from this list: send the line unsubscribe linux-wireless in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


RE: ATH10K and VLAN : Frame with VLAN tag are not sent

2015-06-05 Thread voncken
 De : linux-wireless-ow...@vger.kernel.org [mailto:linux-wireless-
 ow...@vger.kernel.org] De la part de Michal Kazior
 Envoyé : vendredi 5 juin 2015 11:46
 À : voncken
 Cc : linux-wireless; ath...@lists.infradead.org
 Objet : Re: ATH10K and VLAN : Frame with VLAN tag are not sent
 
 [...]
  I see no reason why this should fail. The dot1q encapsulation
  shouldn't influence how firmware behaves.. but maybe I'm wrong.
 
  It's still unclear to me what your topology looks like. Perhaps
  you're having problem with environmental configuration itself? Did
  you try other Wi-Fi device (e.g. ath9k) instead of ath10k?
  Yes I tested with ath9k wireless card, the same configuration works.
 
  I did an interesting test. With ostinato software I generate an ICMP
 frame without vlan tag. I changed the ethertype in the frame.
  I tried with the ethertype 0x800 (IP), 0x801, 0x8892 (PROFINET), 0x8100
 (dot1q), 0x0600. All frames are sent except when the ethertype is set to
 0x8100. It seems the firmware do not accept the ethertype 0x8100.
 
 Interesting. This may suggest firmware actually doesn't handle dot1q VLAN
 tagging properly in NWifi Tx encap mode. Can you try changing it to 802.3
 encap and re-test, please?
 
 --- a/drivers/net/wireless/ath/ath10k/mac.c
 +++ b/drivers/net/wireless/ath/ath10k/mac.c
 @@ -3172,7 +3172,7 @@ ath10k_tx_h_get_txmode(struct ath10k *ar, struct
 ieee80211_vif *vif,
 if (ieee80211_is_data_present(fc)  sta  sta-tdls)
 return ATH10K_HW_TXRX_ETHERNET;
 
 -   return ATH10K_HW_TXRX_NATIVE_WIFI;
 +   return ATH10K_HW_TXRX_ETHERNET;
  }
 
 Note: Your backports may not have the necessary code.. In which case
 it'll be difficult to do this the easy way. If that's the case I suggest
 you get latest backports or generate them yourself from the latest
 kvalo/ath master.
I will try to change my backport. But it is not easy, because I need to use a 
cross-compiler. From openwrt website I can download a backport 2015-05-08. I 
will try to integrate it.

Do you know how I can generate a tar file for openwrt from kale git hub?
Cedric

 
 
 Michał
 --
 To unsubscribe from this list: send the line unsubscribe linux-wireless
 in the body of a message to majord...@vger.kernel.org More majordomo info
 at  http://vger.kernel.org/majordomo-info.html

--
To unsubscribe from this list: send the line unsubscribe linux-wireless in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


RE: ATH10K and VLAN : Frame with VLAN tag are not sent

2015-06-05 Thread voncken
  
   I did an interesting test. With ostinato software I generate an
   ICMP
  frame without vlan tag. I changed the ethertype in the frame.
   I tried with the ethertype 0x800 (IP), 0x801, 0x8892 (PROFINET),
   0x8100
  (dot1q), 0x0600. All frames are sent except when the ethertype is
  set to 0x8100. It seems the firmware do not accept the ethertype
 0x8100.
 
  Interesting. This may suggest firmware actually doesn't handle dot1q
  VLAN tagging properly in NWifi Tx encap mode. Can you try changing
  it to 802.3 encap and re-test, please?
 
  --- a/drivers/net/wireless/ath/ath10k/mac.c
  +++ b/drivers/net/wireless/ath/ath10k/mac.c
  @@ -3172,7 +3172,7 @@ ath10k_tx_h_get_txmode(struct ath10k *ar,
  struct ieee80211_vif *vif,
  if (ieee80211_is_data_present(fc)  sta  sta-tdls)
  return ATH10K_HW_TXRX_ETHERNET;
 
  -   return ATH10K_HW_TXRX_NATIVE_WIFI;
  +   return ATH10K_HW_TXRX_ETHERNET;
   }
 
  Note: Your backports may not have the necessary code.. In which case
  it'll be difficult to do this the easy way. If that's the case I
  suggest you get latest backports or generate them yourself from the
  latest kvalo/ath master.
  I will try to change my backport. But it is not easy, because I need
 to use a cross-compiler. From openwrt website I can download a backport
 2015-05-08. I will try to integrate it.
 
  Do you know how I can generate a tar file for openwrt from kale git
 hub?
 
  That's non-trivial as far as I understand. You could try generating a
  quilt patch in openwrt to update ath10k. Either some sort of manual
  cherry-picking of the txmode patch for ath10k or create a partial diff
  (e.g. only drivers/net/wireless/ath/ath10k) between openwrt backports
  and kvalo/ath generated backports.
 
 I've managed to reproduce your problem in my setup.
 
 With NWifi Txed frames with dot1Q VLAN tagging aren't even sent OTA and
 are reported as not acked by firmware.
 
 When I changed the Tx encap mode to 802.3 (ethernet) I can see frames OTA
 but they are corrupted 3addr frames with invalid SA/DA addresses.
 I'm guessing this is because firmware expects explicit
 WMI_PEER_ADD_WDS_ENTRY_CMDID to be issued when trying too use 802.3 Tx
 encap with 4addr frames.
 

Thanks for these informations, but where I need to set the flag 
WMI_PEER_ADD_WDS_ENTRY_CMDID?
The backport 2015-05-08 should support your modification. I'm trying du compile 
it.

 
 Michał

--
To unsubscribe from this list: send the line unsubscribe linux-wireless in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


RE: ATH10K and VLAN : Frame with VLAN tag are not sent

2015-06-05 Thread voncken
  [...]
   I see no reason why this should fail. The dot1q encapsulation
   shouldn't influence how firmware behaves.. but maybe I'm wrong.
  
   It's still unclear to me what your topology looks like. Perhaps
   you're having problem with environmental configuration itself?
   Did you try other Wi-Fi device (e.g. ath9k) instead of ath10k?
   Yes I tested with ath9k wireless card, the same configuration
 works.
  
   I did an interesting test. With ostinato software I generate an
   ICMP
  frame without vlan tag. I changed the ethertype in the frame.
   I tried with the ethertype 0x800 (IP), 0x801, 0x8892 (PROFINET),
   0x8100
  (dot1q), 0x0600. All frames are sent except when the ethertype is
  set to 0x8100. It seems the firmware do not accept the ethertype
 0x8100.
 
  Interesting. This may suggest firmware actually doesn't handle dot1q
  VLAN tagging properly in NWifi Tx encap mode. Can you try changing
  it to 802.3 encap and re-test, please?
 
  --- a/drivers/net/wireless/ath/ath10k/mac.c
  +++ b/drivers/net/wireless/ath/ath10k/mac.c
  @@ -3172,7 +3172,7 @@ ath10k_tx_h_get_txmode(struct ath10k *ar,
  struct ieee80211_vif *vif,
  if (ieee80211_is_data_present(fc)  sta  sta-tdls)
  return ATH10K_HW_TXRX_ETHERNET;
 
  -   return ATH10K_HW_TXRX_NATIVE_WIFI;
  +   return ATH10K_HW_TXRX_ETHERNET;
   }
 
  Note: Your backports may not have the necessary code.. In which case
  it'll be difficult to do this the easy way. If that's the case I
  suggest you get latest backports or generate them yourself from the
  latest kvalo/ath master.
  I will try to change my backport. But it is not easy, because I need
 to use a cross-compiler. From openwrt website I can download a backport
 2015-05-08. I will try to integrate it.
 
  Do you know how I can generate a tar file for openwrt from kale git
 hub?
 
  That's non-trivial as far as I understand. You could try generating a
  quilt patch in openwrt to update ath10k. Either some sort of manual
  cherry-picking of the txmode patch for ath10k or create a partial diff
  (e.g. only drivers/net/wireless/ath/ath10k) between openwrt backports
  and kvalo/ath generated backports.
 
 I've managed to reproduce your problem in my setup.
 
 With NWifi Txed frames with dot1Q VLAN tagging aren't even sent OTA and
 are reported as not acked by firmware.
 
 When I changed the Tx encap mode to 802.3 (ethernet) I can see frames OTA
 but they are corrupted 3addr frames with invalid SA/DA addresses.
 I'm guessing this is because firmware expects explicit
 WMI_PEER_ADD_WDS_ENTRY_CMDID to be issued when trying too use 802.3 Tx
 encap with 4addr frames.
 
In my compat, I intagrated the function ath10k_tx_h_get_txmode (I don't not if 
it is sufficient). The frame seems be formwarded (in wireshark I can see an 
encapsuled Ethernet frame). I will work to find where I need to add the flag 
WMI_PEER_ADD_WDS_ENTRY_CMDID.

Cedric.

--
To unsubscribe from this list: send the line unsubscribe linux-wireless in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


ATH10K and VLAN

2015-06-03 Thread Cedric VONCKEN
I'm testing to send a VLAN frame through ATH10K device.
I'm using compat wireless 2015-03-09 from openWRT. The ATH10K firmware 
used is 10.2.4.45

My test platform is:
Pc1 : IP 10.101.4.3 (without VLAN)
VLAN 1 : IP 192.168.5.1

Equipment in AP mode. The netdev is bridged with eth0

Equipment in client mode with WDS mode enables. The client is 
connected to the AP. The netdev is bridged with eth0.
AP and client use ATH10K wireless card.

PC2: IP 10.101.4.4 (without VLAN)
VLAN 1 : IP 192.168.5.2

The PC1 is connected to the equipment in AP mode and the PC2 is 
connected to the equipment in client mode.


I can ping from PC1 to PC2 without vlan (ping 10.101.4.4).
I cannot ping from PC1 to PC2 with VLAN.
With tcpdump I checked the vlan frame is sent to the netdev but this 
frame is not send to the air.

Is it possible to send a VLAN frame through ATH10K? If no, is it a 
driver limitation or firmware limitation?

Thanks for your help.

Cédric.



--
To unsubscribe from this list: send the line unsubscribe linux-wireless in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[mac80211]synchronize_net call in ieee_tx_ba_session_handle_start

2015-03-26 Thread Cedric VONCKEN
The synchronize_net called in function ieee_tx_ba_session_handle_start
generate a jiter after the association. I can observe a long period
(100ms or more) where no data are sent because mac80211 is blocked in
synchronize_net.

My product has several network interface and processor with 4 cores.

If I understood correctly, in case we use the ath9k driver, the function
drv_ampdu_action will call the ath_tx_aggr_start and this function will
flush the tx pending packet and return the next sequence number. So in
this case it is not necessary to call this function.

Is it possible to remove this function, or I need to consider another
case?

Thanks for your help.

Cedric Voncken.

--
To unsubscribe from this list: send the line unsubscribe linux-wireless in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


RE: ath10k: What will happens when radar is detected ?

2015-03-24 Thread voncken


 -Message d'origine-
 De : Michal Kazior [mailto:michal.kaz...@tieto.com]
 Envoyé : mardi 24 mars 2015 07:56
 À : Cedric VONCKEN
 Cc : linux-wireless
 Objet : Re: ath10k: What will happens when radar is detected ?
 
 On 23 March 2015 at 16:16, Cedric VONCKEN cedric.vonc...@acksys.fr
 wrote:
  In 802.11ac standard, it is possible to dynamically reduce the channel
  width used.
  My question is:
  If I use a channel with 80 or 40 MHz width, what will happen
  if I detect radar?
  The ath10k card/driver reduces automatically the
  channel width.
 
 Currently entire chandef occupied will be marked as unavailable and AP
 will stop/switch to a different non-overlapping chandef via CSA.
Thanks for your answer.
 
 I guess it should be possible to implement what you suggest, i.e.
 change only chandef width when radar is narrow and located at a suitable
 part of the chandef. This would require hw to be capable of detecting
 radar center freq and width accurately. I'm not sure if QCA988X is
 capable of that although firmware interface seems to be able to carry
 this kind of information already.
 
 I wonder why would you want this behaviour in the first place?
 Wouldn't this actually end up with having less bandwidth and lower
 throughput (which is already penalized when radar detection is active)?
In an industrial environment we prefer to reduce the throughput but keep the 
link without gap. I think it can be a parameter in AP software for example.

Cédric

--
To unsubscribe from this list: send the line unsubscribe linux-wireless in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


ath10k: What will happens when radar is detected ?

2015-03-23 Thread Cedric VONCKEN
In 802.11ac standard, it is possible to dynamically reduce the channel
width used.
My question is:
If I use a channel with 80 or 40 MHz width, what will happen if
I detect radar? 
The ath10k card/driver reduces automatically the channel
width.

Cedric Voncken.
--
To unsubscribe from this list: send the line unsubscribe linux-wireless in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


RE: ARP dropped during WPA handshake

2015-03-17 Thread voncken


   During the initial WPA handshake the connection is not fully set up,
   and so no general traffic can (nor should) pass between the STA and AP.
   That includes ARP and any L2/L3+ protocols, except for EAP and wifi
   management packets.
  
   The interface itself must be IFF_UP before it can pass traffic,
   including the WPA handshake traffic.  IFF_UP only means that the
   interface can be configured at the L2 level and the hardware is
   active, it does *not* mean the interface can pass traffic.
  
   Whatever is causing the ARPs shouldn't be doing that yet, and should
   be fixed to use the interface's operstate or IFF_LOWER_UP instead
   of IFF_UP.  Only when the supplicant changes the interface's
   operstate to IF_OPER_UP is the interface *actually* ready to pass
 traffic.  IFF_UP is not sufficient.
  
 
  Thanks for your reply.
 
  It seems wpa_supplicant set the operstate to IF_OPER_DORMANT when he
 received the ASSOCIATED Event from the driver (through netlink). And set the
 operstate to IF_OPER_UP in case of wpa handshake success.
 
  Is it normal the local ip stack send arp when netdev it is on
 IF_OPER_DORMANT state?
 
 I'm not sure the kernel stack cares much as long as the device is up.
 It is requesting the ARP because some application is attempting to
 communicate with that IP address.  That application should probably be
 waiting until the interface is actually ready to communicate, which means
 IF_OPER_UP.
 
 But if this is the first WPA handshake with the AP during the initial
 connection, the wifi device shouldn't even have an IP address yet, so nothing
 should be doing ARP on the interface yet.  Perhaps whatever is assigning the
 IP address to the interface is doing it too early, before the interface is
 IF_OPER_UP?
 
It is not the initial connection. My sta is connected on AP1 and the 
communication is established (in my test the communication it is iperf from STA 
to computer behind the APs). 

I looking for a solution to enable the communication for wpa_supplicant, but 
block the L3 communication while the WPA handshake is not finished.

Have you any idea?

Cedric.


--
To unsubscribe from this list: send the line unsubscribe linux-wireless in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


RE: ARP dropped during WPA handshake

2015-03-13 Thread voncken
 
 
 On 03/13/2015 12:36 PM, Cedric VONCKEN wrote:
  My test plateforme is very simple, One sta (with openwrt), one AP and
  a computer connected to the AP.
  I launch iperf on the sta and power up the AP.
 
  With wireshark I can observe 1 s delay between the frame EAPOL 4/4 and
  the arp request sent by the sta. I can observe the delay only if my
  sta uses architecture with more 1 cpu.
 
  When the sta received the Authentication response, mac80211 sets the
  iface on UP state. This state allows wpa_supplicant to send the EAPOL
  frame for WPA handshake but other frames are dropped.
 
  If an arp request is sent by the local ip stack during the WPA
  handshake this arp will be dropped and we need to wait the end of arp
  timeout (1 s).
 
  Have you any suggestion / pointer to fix this issue?
 
 
 I had a situation where ARP requests were sent and responses were replied,
 but the requester did not accept the responses and therefore was
continuously
 sending request. However, this was in an IBSS and WPA encryption, which is
 not really supported if I understand well. RSN worked like a charm,
though.
 The issue was related to the type of encryption. This could also be an
issue
 in your case, however, AP is well supported, so hard to tell. I'm not
really
 a security expert.
 
 My point being, you will get better and faster support if you could
specify
 which encryption protocol you use, the specific parameters, etc.
 
 br,
 Wim.
 

My platform is very simple. I use 2 equipment. Both equipment are based on
mips64 processor, use ATH9K driver and openwrt.
One equipment is configured in AP mode with WPA2-PSK, another equipment is
configured in station mode. 
I can access to the sta through ssh. 

Below, a tcpdump capture from sta.
17:43:12.964096 EAPOL key (3) v2, len 95
17:43:12.998439 EAPOL key (3) v1, len 117
17:43:13.062409 ARP, Request who-has 10.32.61.100 tell 10.32.0.1, length 28
17:43:13.079989 EAPOL key (3) v2, len 151
17:43:13.082764 EAPOL key (3) v1, len 95
17:43:14.062381 ARP, Request who-has 10.32.61.100 tell 10.32.0.1, length 28
17:43:14.127101 ARP, Reply 10.32.61.100 is-at b8:88:e3:45:1d:c6 (oui
Unknown), length 46
17:43:14.127123 IP 10.69.1.201.41690  10.32.61.100.5001: UDP, length 1470
17:43:14.127136 IP 10.69.1.201.41690  10.32.61.100.5001: UDP, length 1470

You can see the ARP request during the WPA Handshake.

Any suggestion will be appreciate.

Cedric.
 
  Thanks for your help.
 
  Cedric Voncken
 
 
  --
  To unsubscribe from this list: send the line unsubscribe
  linux-wireless in the body of a message to majord...@vger.kernel.org
  More majordomo info at  http://vger.kernel.org/majordomo-info.html

--
To unsubscribe from this list: send the line unsubscribe linux-wireless in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


ARP dropped during WPA handshake

2015-03-13 Thread Cedric VONCKEN
My test plateforme is very simple, One sta (with openwrt), one AP and a
computer connected to the AP.
I launch iperf on the sta and power up the AP.

With wireshark I can observe 1 s delay between the frame EAPOL 4/4 and
the arp request sent by the sta. I can observe the delay only if my sta
uses architecture with more 1 cpu.

When the sta received the Authentication response, mac80211 sets the
iface on UP state. This state allows wpa_supplicant to send the EAPOL
frame for WPA handshake but other frames are dropped.

If an arp request is sent by the local ip stack during the WPA handshake
this arp will be dropped and we need to wait the end of arp timeout (1
s).

Have you any suggestion / pointer to fix this issue?

Thanks for your help.

Cedric Voncken

--
To unsubscribe from this list: send the line unsubscribe linux-wireless in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


RE: ARP dropped during WPA handshake

2015-03-13 Thread voncken
  Below, a tcpdump capture from sta.
  17:43:12.964096 EAPOL key (3) v2, len 95
  17:43:12.998439 EAPOL key (3) v1, len 117
  17:43:13.062409 ARP, Request who-has 10.32.61.100 tell 10.32.0.1,
  length 28
  17:43:13.079989 EAPOL key (3) v2, len 151
  17:43:13.082764 EAPOL key (3) v1, len 95
  17:43:14.062381 ARP, Request who-has 10.32.61.100 tell 10.32.0.1,
  length 28
  17:43:14.127101 ARP, Reply 10.32.61.100 is-at b8:88:e3:45:1d:c6 (oui
  Unknown), length 46
  17:43:14.127123 IP 10.69.1.201.41690  10.32.61.100.5001: UDP, length
  1470
  17:43:14.127136 IP 10.69.1.201.41690  10.32.61.100.5001: UDP, length
  1470
 
  You can see the ARP request during the WPA Handshake.
 
 During the initial WPA handshake the connection is not fully set up, and so
 no general traffic can (nor should) pass between the STA and AP.
 That includes ARP and any L2/L3+ protocols, except for EAP and wifi
 management packets.
 
 The interface itself must be IFF_UP before it can pass traffic, including the
 WPA handshake traffic.  IFF_UP only means that the interface can be
 configured at the L2 level and the hardware is active, it does *not* mean the
 interface can pass traffic.
 
 Whatever is causing the ARPs shouldn't be doing that yet, and should be fixed
 to use the interface's operstate or IFF_LOWER_UP instead of IFF_UP.  Only
 when the supplicant changes the interface's operstate to IF_OPER_UP is the
 interface *actually* ready to pass traffic.  IFF_UP is not sufficient.
 

Thanks for your reply. 

It seems wpa_supplicant set the operstate to IF_OPER_DORMANT when he received 
the ASSOCIATED Event from the driver (through netlink). And set the operstate 
to IF_OPER_UP in case of wpa handshake success.

Is it normal the local ip stack send arp when netdev it is on IF_OPER_DORMANT 
state?


 
 
  Any suggestion will be appreciate.
 
  Cedric.
  
Thanks for your help.
   
Cedric Voncken
   
   
--
To unsubscribe from this list: send the line unsubscribe
linux-wireless in the body of a message to
majord...@vger.kernel.org More majordomo info at
http://vger.kernel.org/majordomo-info.html
 
  --
  To unsubscribe from this list: send the line unsubscribe
  linux-wireless in the body of a message to majord...@vger.kernel.org
  More majordomo info at  http://vger.kernel.org/majordomo-info.html
 


--
To unsubscribe from this list: send the line unsubscribe linux-wireless in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Question : WMM queue management in AP role

2014-11-25 Thread Cedric VONCKEN
Hi all,

The AP role can manage several sta.
In case of WMM, each sta have a separate queue or all sta use the same
queue? 

Where can I found any information on the WMM queue management in linux
wireless?

I'm using ath9k driver.

Cedric Voncken

--
To unsubscribe from this list: send the line unsubscribe linux-wireless in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


RE: ath10k firmware crash

2014-10-15 Thread voncken
  I did some tests with a linksys WRT1900AC and I have ~950 mbps OTA easily.
 
 You mean ath10k (STA) VS WRT1900AC get up ~950mbps?
 If so, could you say what's the HW, FW version you use?
 
My test platform is one WRT1900AC set in bridge mode with a computer.

If I use the WRT1900AC in AP mode with another computer, I have 950 mbps
If I use the cavium octon III dev plateform + ath10k driver in AP mode, I have 
around 700 mbps

I'm using the latest compat wireless (2014-09-26) from openwrt.
The wireless card is the WLE900VX from compex or DAXA-O1 from Unex.

The WRT1900AC have mimo 4x4 with 3 streams, and my wireless card have mimo 3x3 
with 3 streams. Maybe that explains the difference.

Cedric Voncken.
 --
 Bartosz
 --
 To unsubscribe from this list: send the line unsubscribe linux-wireless in
 the body of a message to majord...@vger.kernel.org More majordomo info at
 http://vger.kernel.org/majordomo-info.html

--
To unsubscribe from this list: send the line unsubscribe linux-wireless in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


RE: ath10k firmware crash

2014-10-13 Thread voncken


 
 Are you perhaps trying to run STA with 4addr bridging? If so then make sure
 you use recent ath10k as this was known to be a problem.
 
We tested without the 4addr bridging, that works fine but we can't add the 
interface in bridge :-(

Have you a benchmark reference with ATH10K ? at this time we can send around 
700 Mbit/s, is it the maximum or we can expected better ?
 
 Michał

Thanks

Cedric Voncken

--
To unsubscribe from this list: send the line unsubscribe linux-wireless in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


RE: ath10k firmware crash

2014-10-13 Thread voncken
  I'm using the compat wireless from Openwrt.
  Compat wireless version 2014-05-22, but we updated the
  firmware with the latest version provided by openwrt (commit number
  38eeda3ae6f90fde5546bdd48ee4ff3090f238c0 from
  kernel.org/pub/scm/linux/kernel/git/firmare/linux-firmware)
 
 The fix for 4addr STA bridging is in the driver, not the firmware.
 
 The compat version you're using doesn't contain the required fix. I'm pretty
 sure openwrt compat 2014-09-26 contains it.
 
Ok, I will test with this version. Thanks for your help.
 
 Michał



--
To unsubscribe from this list: send the line unsubscribe linux-wireless in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


RE: ath10k firmware crash

2014-10-13 Thread voncken
 
   Are you perhaps trying to run STA with 4addr bridging? If so then
   make sure you use recent ath10k as this was known to be a problem.
  
   Yes I'm testing with 4 addr bridging because I need to bridge this
  interface. I' ll try without this option.
   I'm testing with commit number
   38eeda3ae6f90fde5546bdd48ee4ff3090f238c0
  from kernel.org/pub/scm/linux/kernel/git/firmare/linux-firmware. It
  is the latest version in openwrt.
  
   Can you also provide ath10k traces or debug logs, please?
  
   I'll send a trace.
 
  I'm using the compat wireless from Openwrt.
  Compat wireless version 2014-05-22, but we updated the
  firmware with the latest version provided by openwrt (commit number
  38eeda3ae6f90fde5546bdd48ee4ff3090f238c0 from
  kernel.org/pub/scm/linux/kernel/git/firmare/linux-firmware)
 
 The fix for 4addr STA bridging is in the driver, not the firmware.
 
 The compat version you're using doesn't contain the required fix. I'm pretty
 sure openwrt compat 2014-09-26 contains it.
It fix my issue. Thanks for your help.

Cedric Voncken
 
 
 Michał
 --
 To unsubscribe from this list: send the line unsubscribe linux-wireless in
 the body of a message to majord...@vger.kernel.org More majordomo info at
 http://vger.kernel.org/majordomo-info.html

--
To unsubscribe from this list: send the line unsubscribe linux-wireless in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


ath10k firmware crash

2014-10-10 Thread Cedric VONCKEN
Hi all, 

I'm trying to use ath10k in client mode and AP mode with 2 wireless 
cards (Ap on one card and client on another card).
The AP mode work, but the client mode always crash. Please find below 
the ath10k crash information

[   79.131301] ath10k: hardware name qca988x hw2.0 version 0x4100016c
[   79.149420] ath10k: firmware version: 999.999.0.636
[   79.167248] ath10k: target register Dump Location: 0x0040AC14
[   79.185939] ath10k: target Register Dump
[   79.201804] ath10k: [00]: 0x4100016C 0x 0x009C4521 0x
[   79.220184] ath10k: [04]: 0x009C4521 0x00060330 0x0019 0x00955A00
[   79.238566] ath10k: [08]: 0xD0CE 0x 0x0040CC94 0x0020
[   79.256945] ath10k: [12]: 0x 0x 0x00958360 0x0095836B
[   79.275327] ath10k: [16]: 0x809A0978 0x0040AD94 0x00439304 0x0040D074
[   79.293706] ath10k: [20]: 0x 0x 0x0041EFB8 0x
[   79.312086] ath10k: [24]: 0x809A0978 0x0040AD94 0x00439304 0x0343389A
[   79.330466] ath10k: [28]: 0x809AD1A2 0x0040ADE4 0x00439304 0x0043F68C
[   79.348845] ath10k: [32]: 0x809B01DA 0x 0x00410110 0x0041937C
[   79.367224] ath10k: [36]: 0x 0x 0x 0x
[   79.385604] ath10k: [40]: 0x 0x 0x0071 0x00412700
[   79.403984] ath10k: [44]: 0x00439BB8 0x 0x 0x0040
[   79.422364] ath10k: [48]: 0x809AE0B4 0x0040AE04 0x0040 0x0043F68C
[   79.440744] ath10k: [52]: 0x0001 0x 0x004231F0 0x0040
[   79.459124] ath10k: [56]: 0x809AE17E 0x0040AE44 0x0040FE6C 0x0040D310

I'm using openwrt, and I have the same problem with/without 
configuration option Firmware optimized for sta operation.

Is it possible to use at the same time on 2 different cards the AP mode 
and client mode?

Cedric Voncken 

--
To unsubscribe from this list: send the line unsubscribe linux-wireless in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


ath9k: DFS pattern detector and ETSI EN 301 893 V1.7.1

2014-09-26 Thread Cedric VONCKEN
Hi, 

I will test my equipment with the ETSI standard EN 301 893
1.7.1.

I looked the DFS pattern detector set in ath9k driver and the
comment specifies it compliant with the ETSI standard in V1.5.1.

If I correctly understood the ath9k source code and the ETSI EN
301 893 standard, the table D.3 and D.4 in Annexes D of ETSI standard it
uses to fill the ETSI_radar_ref_types_v15 structure.

The difference between these tables in EN 301 893 v1.5.1 and EN
301 893 v1.7.1 is only the minimal pulse width (from 0.8 to 0.5). This
value is set to 0 in many structure fields.

Could you confirm the ETSI ath9k pattern detector is compatible
with the ETSI EN 301 893 v1.7.1 standard?

If it is right, I will send a patch to precise that in ath9k
comment.

Thanks for your help.

Cedric Voncken

--
To unsubscribe from this list: send the line unsubscribe linux-wireless in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html