Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp2694994ybi; Mon, 17 Jun 2019 09:04:33 -0700 (PDT) X-Google-Smtp-Source: APXvYqycOALBcCYb8qpiMpl9+K6oIstrVDkdwYQc0jiJd1UEQc7BKwye6cu65Kr+byzrQcLY5DSm X-Received: by 2002:a63:6f8d:: with SMTP id k135mr50179117pgc.118.1560787473634; Mon, 17 Jun 2019 09:04:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1560787473; cv=none; d=google.com; s=arc-20160816; b=Nhuud+YbXUYnKIWvd+6ltpT3KG4173kRC3IAoMtvnbQ9Y/6BOIm6Uz//KY/m6k7LfE DQWpXNA3Z8a+xDh39OrfCm0Hn/3U5zo1FYaPuHd56bY03AsdiU+YkPCeV7mrReb2u9x3 DWaG7sjttmfPD3yL9VMFcfGhO9O9mace7/B9ytIoXqoSrOBQ6IHgxX6lBaJ70NVn1HMa Kk2TAFt684/RijhHWIPK9/IkgxpPklqSrR8O7DPzJsnRp6PFcifQzJV1n4xAH6HQOxx9 xV2LjWgdbD6tS6T72gjtpzxNy1ox/NP3M5JyD3vwLqWGamkcMF0YZDyDJzwX8GAmz+e2 Lvqw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:organization:from:references:cc:to:subject :dkim-signature:dkim-filter; bh=6yuXzFNeQ7DD7LSDvxZGTxX+XK+97VbzDUsRjNSe9Zg=; b=CZzZDYOpvMLSrEsT3XEY1476dSViOrqWRs574jaHVWf1Raht7fhoADRJxpUaB0Xwr4 +SBubSrXFRuBAI18IbWgK44HGX3uyFHHfC61TmFLfiANU5hzIMQpoL9fcgsfCNKQnVGp bKN26eXXbgsC6LSkfG/O9UAD37OyUOQEpejaek1I1m3vMVc3qDXf0rEhGiK8kMkvytry rw8xw7MULayl/4vYhPAFQblBBqjfmPAYyMAuOWVaaazvRhv0HNjatyjvaBHqW1uhYPnd 0EPGwD+o9ltNZ5Hl1u7UO43ohKHhJJICqxrGbay3kWyPiAS+HTW1qacXYkwKjoSk2Pjk PPGg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@candelatech.com header.s=default header.b="rfDc/qpV"; spf=pass (google.com: best guess record for domain of linux-wireless-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=candelatech.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m26si10647859pgv.388.2019.06.17.09.04.08; Mon, 17 Jun 2019 09:04:33 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-wireless-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@candelatech.com header.s=default header.b="rfDc/qpV"; spf=pass (google.com: best guess record for domain of linux-wireless-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=candelatech.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726974AbfFQQDr (ORCPT + 99 others); Mon, 17 Jun 2019 12:03:47 -0400 Received: from mail2.candelatech.com ([208.74.158.173]:49560 "EHLO mail3.candelatech.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726961AbfFQQDr (ORCPT ); Mon, 17 Jun 2019 12:03:47 -0400 Received: from [192.168.100.195] (50-251-239-81-static.hfc.comcastbusiness.net [50.251.239.81]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail3.candelatech.com (Postfix) with ESMTPSA id 934D3137560; Mon, 17 Jun 2019 09:03:41 -0700 (PDT) DKIM-Filter: OpenDKIM Filter v2.11.0 mail3.candelatech.com 934D3137560 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=candelatech.com; s=default; t=1560787426; bh=qihpQ4YKC1KRJjLDZybHBWXT8408PGMnM4qg5Rm7KFA=; h=Subject:To:Cc:References:From:Date:In-Reply-To:From; b=rfDc/qpVAlPnKwIZc1ZWo9TY/Op2f2us3q7+pIKREi7w3andOvWefCRLNTTtEhjaE 0pGlm+pVSEiUTIPVZ/28S3z0fSWrrXYw0GeXCi6NwdHMuSiId7UlyBtZprJgT01Kw0 kcv5oUkw4ucKhfTLrCbRh7nFbH1WrRGohXI77Z1c= Subject: Re: [PATCH] ath10k: add mic bytes for pmf management packet To: Wen Gong , ath10k@lists.infradead.org Cc: linux-wireless@vger.kernel.org References: <1560757079-19266-1-git-send-email-wgong@codeaurora.org> From: Ben Greear Organization: Candela Technologies Message-ID: <136d04d4-671b-8dde-2abd-63070b07bd26@candelatech.com> Date: Mon, 17 Jun 2019 09:03:41 -0700 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.4.0 MIME-Version: 1.0 In-Reply-To: <1560757079-19266-1-git-send-email-wgong@codeaurora.org> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-wireless-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org On 6/17/19 12:37 AM, Wen Gong wrote: > For PMF case, the action,deauth,disassoc management need to encrypt > by hardware, it need to reserve 8 bytes for encryption, otherwise > the packet will be sent out with error format, then PMF case will > fail. > > After add the 8 bytes, it will pass the PMF case. > > Tested with QCA6174 SDIO with firmware > WLAN.RMH.4.4.1-00005-QCARMSWP-1. > > Signed-off-by: Wen Gong > --- > drivers/net/wireless/ath/ath10k/htt_tx.c | 8 ++++++++ > 1 file changed, 8 insertions(+) > > diff --git a/drivers/net/wireless/ath/ath10k/htt_tx.c b/drivers/net/wireless/ath/ath10k/htt_tx.c > index d8e9cc0..7bef9d9 100644 > --- a/drivers/net/wireless/ath/ath10k/htt_tx.c > +++ b/drivers/net/wireless/ath/ath10k/htt_tx.c > @@ -1236,6 +1236,7 @@ static int ath10k_htt_tx_hl(struct ath10k_htt *htt, enum ath10k_hw_txrx_mode txm > struct ath10k *ar = htt->ar; > int res, data_len; > struct htt_cmd_hdr *cmd_hdr; > + struct ieee80211_hdr *hdr = (struct ieee80211_hdr *)msdu->data; > struct htt_data_tx_desc *tx_desc; > struct ath10k_skb_cb *skb_cb = ATH10K_SKB_CB(msdu); > struct sk_buff *tmp_skb; > @@ -1245,6 +1246,13 @@ static int ath10k_htt_tx_hl(struct ath10k_htt *htt, enum ath10k_hw_txrx_mode txm > u8 flags0 = 0; > u16 flags1 = 0; > > + if ((ieee80211_is_action(hdr->frame_control) || > + ieee80211_is_deauth(hdr->frame_control) || > + ieee80211_is_disassoc(hdr->frame_control)) && > + ieee80211_has_protected(hdr->frame_control)) { > + skb_put(msdu, IEEE80211_CCMP_MIC_LEN); > + } I was looking at mac80211 code recently, and it seems some action frames are NOT supposed to be protected. I added my own helper method to my local ath10k. Maybe you want to use this? /* Copied from ieee80211_is_robust_mgmt_frame, but disable the check for has_protected * since we do tx hw crypt, and it won't actually be encrypted even when this flag is * set. */ bool ieee80211_is_robust_mgmt_frame_tx(struct ieee80211_hdr *hdr) { if (ieee80211_is_disassoc(hdr->frame_control) || ieee80211_is_deauth(hdr->frame_control)) return true; if (ieee80211_is_action(hdr->frame_control)) { u8 *category; /* * Action frames, excluding Public Action frames, are Robust * Management Frames. However, if we are looking at a Protected * frame, skip the check since the data may be encrypted and * the frame has already been found to be a Robust Management * Frame (by the other end). */ /* if (ieee80211_has_protected(hdr->frame_control)) return true; */ category = ((u8 *) hdr) + 24; return *category != WLAN_CATEGORY_PUBLIC && *category != WLAN_CATEGORY_HT && *category != WLAN_CATEGORY_WNM_UNPROTECTED && *category != WLAN_CATEGORY_SELF_PROTECTED && *category != WLAN_CATEGORY_UNPROT_DMG && *category != WLAN_CATEGORY_VHT && *category != WLAN_CATEGORY_VENDOR_SPECIFIC; } return false; } Thanks, Ben > + > data_len = msdu->len; > > switch (txmode) { > -- Ben Greear Candela Technologies Inc http://www.candelatech.com