Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp261358ybl; Mon, 2 Dec 2019 10:22:00 -0800 (PST) X-Google-Smtp-Source: APXvYqyH234urUlQ177VZDrsxfJzDRo+mNLolGTz8lyW2xNSoJZw0iZBWCV/5afUD1JR39++EE+a X-Received: by 2002:a05:6402:38c:: with SMTP id o12mr160424edv.273.1575310919926; Mon, 02 Dec 2019 10:21:59 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1575310919; cv=none; d=google.com; s=arc-20160816; b=pX13wHd4+Rs0ho6PDlaezw+fbZ1zpNgfCM1AdnNPz//G5/HzTUSL2L4w5bGMmR+9Q2 qUYr2CPbLXMSs8TZQ00TgD003LeIwtJomK9AkjRpcrWgA/baw3t9tVVGkWOUfWmNZg8J L8csww0i+J5L2cd/M1IykyI8C6zxtftqU9x4WGFOMcUWb87HjAFk/gSyZbROb7QktknO lSyzQhXt2KaQt1MK8y/DlY6GWs/DFXemtSmXrQpgJ5kcUd/FuTgcWwJ3jREjpSMEoGQK vxQ1EkagarbJEmbJNlISIJNwKHNw//3CfIQPdoqiffxk0TMjUGKkp0W4+7p50mA7qFDV 7PbQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:organization:from:references:cc:to:subject :dkim-signature:dkim-filter; bh=Kw3VcEh+SH2Xhg0uVEmyEhlNX8mFLqletzqFUzNsZ0M=; b=OxjYcAiNKhiwVRBE2NtHJdJjjtiU8eOOVcXUiofbPxF+mMptxVEMzGDPZ4wZzf3/V/ IwA6SVghpMrsEeV1cW17uTDUWjZ9KnONEZ1r8sBRZXpCZsrtsUw549mOOKBcIc8yrMhU d1ZS1Mx2r0Roo+j48orziXO6fXs4GHjmvWqPph9uoHdIXHs3dHzYSjZYiqmGih5Uh1mb j1LFcYhoT4EcY8VMF7F3ZB3gF4D0PvPQSpu4LYkzPrRU+aMtFMxicldw8o+bit2AIZgn F+BSKpcUjDNVAKctvXQXY2+lfyAuwOhcz9R5CZ7kjFgWMU5DMXjDLu3BgTSehtf/Unds nhtA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@candelatech.com header.s=default header.b=JAGV8C+R; spf=pass (google.com: best guess record for domain of linux-wireless-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=candelatech.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g12si161407ejp.353.2019.12.02.10.21.22; Mon, 02 Dec 2019 10:21:59 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-wireless-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@candelatech.com header.s=default header.b=JAGV8C+R; spf=pass (google.com: best guess record for domain of linux-wireless-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=candelatech.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727870AbfLBSRc (ORCPT + 99 others); Mon, 2 Dec 2019 13:17:32 -0500 Received: from mail2.candelatech.com ([208.74.158.173]:39014 "EHLO mail3.candelatech.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727721AbfLBSRc (ORCPT ); Mon, 2 Dec 2019 13:17:32 -0500 Received: from [192.168.100.195] (50-251-239-81-static.hfc.comcastbusiness.net [50.251.239.81]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail3.candelatech.com (Postfix) with ESMTPSA id 1544F137531; Mon, 2 Dec 2019 10:17:31 -0800 (PST) DKIM-Filter: OpenDKIM Filter v2.11.0 mail3.candelatech.com 1544F137531 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=candelatech.com; s=default; t=1575310651; bh=/2PhJ5xFWBl4QKp0sJThhBjgqj8x5G6dX5WbrLLGJX0=; h=Subject:To:Cc:References:From:Date:In-Reply-To:From; b=JAGV8C+RWwb5o5IPTnPBPM+9aoTmOfZqCQelhV3/V4iGkHhD55Z+syJ14fM89ZxNV 7GqV228r75AOkhy/jxschYh8L9Y5clW7j8FtAnA4XjPrb8ePP6/vZI+NK39ejudH7/ yVBOE/SvAwdKxwdn1syOVQR1iOjl0+0JS/7yNuPQ= Subject: Re: [PATCH] ath10k: set WMI_PEER_AUTHORIZE after a firmware crash To: Justin Capella , Kalle Valo Cc: Wen Gong , ath10k , linux-wireless@vger.kernel.org References: <0101016eaadee57a-54500c6d-4751-423f-8bab-5acd8fad2175-000000@us-west-2.amazonses.com> <0101016eb61d9520-b0306a23-c9b9-4b57-b708-9f80ac47eef1-000000@us-west-2.amazonses.com> From: Ben Greear Organization: Candela Technologies Message-ID: Date: Mon, 2 Dec 2019 10:17:30 -0800 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.1.1 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-wireless-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org On 12/1/19 8:45 PM, Justin Capella wrote: > Are there security concerns here? Was the peer known to be authorized > beforehand? Would it be better to just trash the peer in the event of > a fw crash? I think you should completely re-associate the peer(s) when firmware crashes. The driver does not cache all possible changes, so it cannot exactly rebuild the config to the previous state. Thanks, Ben > > On Thu, Nov 28, 2019 at 11:46 PM Kalle Valo wrote: >> >> Wen Gong wrote: >> >>> After the firmware crashes ath10k recovers via ieee80211_reconfig(), >>> which eventually leads to firmware configuration and including the >>> encryption keys. However, because there is no new auth/assoc and >>> 4-way-handshake, and firmware set the authorize flag after >>> 4-way-handshake, so the authorize flag in firmware is not set in >>> firmware without 4-way-handshake. This will lead to a failure of data >>> transmission after recovery done when using encrypted connections like >>> WPA-PSK. Set authorize flag after installing keys to firmware will fix >>> the issue. >>> >>> This was noticed by testing firmware crashing using simulate_fw_crash >>> debugfs file. >>> >>> Tested with QCA6174 SDIO with firmware WLAN.RMH.4.4.1-00007-QCARMSWP-1. >>> >>> Signed-off-by: Wen Gong >>> Signed-off-by: Kalle Valo >> >> Patch applied to ath-next branch of ath.git, thanks. >> >> 382e51c139ef ath10k: set WMI_PEER_AUTHORIZE after a firmware crash >> >> -- >> https://patchwork.kernel.org/patch/11263357/ >> >> https://wireless.wiki.kernel.org/en/developers/documentation/submittingpatches >> > -- Ben Greear Candela Technologies Inc http://www.candelatech.com