Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp2326259imm; Mon, 28 May 2018 06:07:24 -0700 (PDT) X-Google-Smtp-Source: AB8JxZrXpMV7Z8UNs+LIwrDeyLnVcnbjkqiVH77rX2ub+tGinByv7XF3K9Fpj9vTpJKElwYwjMae X-Received: by 2002:a62:d97:: with SMTP id 23-v6mr13530515pfn.231.1527512843955; Mon, 28 May 2018 06:07:23 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1527512843; cv=none; d=google.com; s=arc-20160816; b=ElmfKqdSGSDaurGZHrL1qB5OOHsVydER3Gy4f7T4a6r7rlnQQycimPXROuIp3vjifI 720Nk08NpDeYOyCSHWc4VAmyEKSYRbXmELpjhTFTpJIYjNWm3aaR8wsKhJ37hQQEcpuR UwU35UHR3Dh9+594aftlzThtgvBvDN1EGiTmorVke9Z/Vj1VOLOhb48O8S+BUSS+NRBD VaORH5v8HaZD9uvwlx4op2Hp7ec5n8a+/KYfyM+mxdRKVtpc5zWkeHJU02DTRGIbfgFl fRhzRgQzvf8wJ8njOKM3YlNRbFG2yg/de23B04gIUAbhQL9Lh38I+niVu718TYuBGt6v WZNg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from:dkim-signature :arc-authentication-results; bh=PqD3TmROKC1JcJfyy5mdMAr8mdWhOhZrEsEGLy0rCAs=; b=v03Dz+jGMG6ZyA0t/7hCpbJN5WODOATEvX5KQ26bA2fc/T7I1TlcGq6u7+pSn6curb GwCErTsjveNWAAOBSpU6Rl8ipP5gLaVeIQ5b8/xRzx0VpT0Nweqg+v+GFvkkRAFyRLL4 EYMLtJTrjean4bH5NQjuvt9Pp2IIwjLVg9WFLrxQA1tu2ICHQZjM5XpCHm1r89a1YByS CFsGXYaflU/XAyaKiADYLzTAFCerLDYv2Uc0em92Gx3Pk4URN9TtpINyHTUSDsxTtBsR EudHdP0h+k6R+eAty/gCQoBE1Al+IUoUcJFhpam8QCkdA6TShwwukMqEJihgB0kumc/f l/QA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=KbOH2c2c; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r7-v6si3016773pgq.675.2018.05.28.06.07.08; Mon, 28 May 2018 06:07:23 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=KbOH2c2c; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1165162AbeE1NFJ (ORCPT + 99 others); Mon, 28 May 2018 09:05:09 -0400 Received: from mail.kernel.org ([198.145.29.99]:41960 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1164014AbeE1Kwm (ORCPT ); Mon, 28 May 2018 06:52:42 -0400 Received: from localhost (LFbn-1-12247-202.w90-92.abo.wanadoo.fr [90.92.61.202]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id E5EBC204EE; Mon, 28 May 2018 10:52:40 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1527504761; bh=dVNbXnraasIeetw6mgHMbd4OY2HDlze9fZkQzssxc28=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=KbOH2c2cwhLIKlISYC3BC3+2A2+huD2GzGIaJWx7Tb01ZFmtRni+NAIv3Ib9MwbNJ EOzUiT+2Y0aftSbgRB6kphmW3m4XZz/QmXqXlHErBXUT2Rio4VTPLgxxAQJ4TVg0dW Rx/SmoQuGflNb6HqBuq6lIqcIqB1Zg4Y1Zb6dmv0= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Beni Lev , Luca Coelho , Sasha Levin Subject: [PATCH 4.14 255/496] iwlwifi: mvm: Correctly set IGTK for AP Date: Mon, 28 May 2018 12:00:40 +0200 Message-Id: <20180528100330.628939274@linuxfoundation.org> X-Mailer: git-send-email 2.17.0 In-Reply-To: <20180528100319.498712256@linuxfoundation.org> References: <20180528100319.498712256@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ From: Beni Lev [ Upstream commit e829b17caf96c2da34620e335fb777592990906c ] Currently when an IGTK is set for an AP, it is set as a regular key. Since the cipher is set to CMAC, the STA_KEY_FLG_EXT flag is added to the host command, which causes assert 0x253D on NICs that do not support this. Fixes: 85aeb58cec1a ("iwlwifi: mvm: Enable security on new TX API") Signed-off-by: Beni Lev Signed-off-by: Luca Coelho Signed-off-by: Sasha Levin Signed-off-by: Greg Kroah-Hartman --- drivers/net/wireless/intel/iwlwifi/mvm/sta.c | 21 ++++++++++++--------- 1 file changed, 12 insertions(+), 9 deletions(-) --- a/drivers/net/wireless/intel/iwlwifi/mvm/sta.c +++ b/drivers/net/wireless/intel/iwlwifi/mvm/sta.c @@ -3182,17 +3182,9 @@ int iwl_mvm_set_sta_key(struct iwl_mvm * } sta_id = mvm_sta->sta_id; - if (keyconf->cipher == WLAN_CIPHER_SUITE_AES_CMAC || - keyconf->cipher == WLAN_CIPHER_SUITE_BIP_GMAC_128 || - keyconf->cipher == WLAN_CIPHER_SUITE_BIP_GMAC_256) { - ret = iwl_mvm_send_sta_igtk(mvm, keyconf, sta_id, - false); - goto end; - } - /* * It is possible that the 'sta' parameter is NULL, and thus - * there is a need to retrieve the sta from the local station + * there is a need to retrieve the sta from the local station * table. */ if (!sta) { @@ -3207,6 +3199,17 @@ int iwl_mvm_set_sta_key(struct iwl_mvm * if (WARN_ON_ONCE(iwl_mvm_sta_from_mac80211(sta)->vif != vif)) return -EINVAL; + } else { + struct iwl_mvm_vif *mvmvif = iwl_mvm_vif_from_mac80211(vif); + + sta_id = mvmvif->mcast_sta.sta_id; + } + + if (keyconf->cipher == WLAN_CIPHER_SUITE_AES_CMAC || + keyconf->cipher == WLAN_CIPHER_SUITE_BIP_GMAC_128 || + keyconf->cipher == WLAN_CIPHER_SUITE_BIP_GMAC_256) { + ret = iwl_mvm_send_sta_igtk(mvm, keyconf, sta_id, false); + goto end; } /* If the key_offset is not pre-assigned, we need to find a