Received: by 2002:a25:ef43:0:0:0:0:0 with SMTP id w3csp489815ybm; Fri, 29 May 2020 05:14:41 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwHvS7ZH+eXm/5WyQ7h4WpAGhFKSsFIGYLIC9k69hyRwTU8PP1WWbyEx/uo4db1UOKicz8V X-Received: by 2002:a17:906:8608:: with SMTP id o8mr7035695ejx.274.1590754481083; Fri, 29 May 2020 05:14:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1590754481; cv=none; d=google.com; s=arc-20160816; b=sYgtY1z02w40IBRYk8L2GTmO9nxb0TSHD7XQCECLcp009R2gWr/Of40eiZMa1qWXWk R00ntLOawh16PeI6QR+JvM76NU68ZVYqxTVA1XjEG2qf2K1Tn8k0jx9o6XWrNgzPSoFu dhX0dUd0jdBV4hpuAfvhK0Otj29qGtOzQZZarYz/FAPr0MvoIfHvYcluaAzydShHXUIj VFYpQxjf226yy0VmLx3X2IHduPYRgqpK+FQ2GL7KIX/kG4O4X3HxrbaWPtL40vRNVN8X wFZU371+/PDXaZaDLI6OxrYeweFJeEfsaaVkE3nwjzXxylURaggyVdnz1qNxMUZWjPCa yc3g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:date:cc:to:from:subject :message-id; bh=0zXrZpZnGujA+hocAZ7j5bZvcqEUMhq/ijLVHNUQokA=; b=mSQAcbR3I/zRzYiiPm0Jo21DgktSVH/zF86iL2OU+4Lg1SdzxmW1uIdBAo1zJm98Xe DHfD1Aoeg8x9msQdpcAbQaPZ+Eq3kSppM+LPJvAT72PHB8lhDyEpxbt39I1GUjwCTKM3 QOOaxXCsiBvMURIYLZN2sEQYUsmw1e42pHSMk0NCBhoTE1mYL/Iz/ClENodsVhfQOzRw Fv7TApj8CHKvqOSUk58PQkWTHVAd9HIaVjkHvwyjaf/msuLqMPhatzim3IPrpnyeqbPS WES4ToByXTHFxo3bWAcLbFRm58w49Mfar1ebS4TBZVyGdzeaYiDJzgg2GsQTn6YW1YlT 53TA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id bs15si4410900edb.308.2020.05.29.05.14.16; Fri, 29 May 2020 05:14:41 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727058AbgE2MKx (ORCPT + 99 others); Fri, 29 May 2020 08:10:53 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:47128 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725865AbgE2MKx (ORCPT ); Fri, 29 May 2020 08:10:53 -0400 Received: from sipsolutions.net (s3.sipsolutions.net [IPv6:2a01:4f8:191:4433::2]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 2E976C03E969 for ; Fri, 29 May 2020 05:10:53 -0700 (PDT) Received: by sipsolutions.net with esmtpsa (TLS1.3:ECDHE_SECP256R1__RSA_PSS_RSAE_SHA256__AES_256_GCM:256) (Exim 4.93) (envelope-from ) id 1jedqa-005Usw-Hu; Fri, 29 May 2020 14:10:48 +0200 Message-ID: Subject: Re: [PATCH 1/2] mac80211: enable TKIP when using encapsulation offloading From: Johannes Berg To: Sathishkumar Muruganandam Cc: ath11k@lists.infradead.org, linux-wireless@vger.kernel.org Date: Fri, 29 May 2020 14:10:47 +0200 In-Reply-To: <7fb606edf1e5c7ab5b1446d637768ee7@codeaurora.org> References: <1587720951-9222-1-git-send-email-murugana@codeaurora.org> <1587720951-9222-2-git-send-email-murugana@codeaurora.org> (sfid-20200424_113624_468114_4CC488DE) <7fb606edf1e5c7ab5b1446d637768ee7@codeaurora.org> Content-Type: text/plain; charset="UTF-8" User-Agent: Evolution 3.36.2 (3.36.2-1.fc32) MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Sender: linux-wireless-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org On Fri, 2020-05-29 at 17:38 +0530, Sathishkumar Muruganandam wrote: > > I don't think it can. It doesn't have all the necessary information to > > call cfg80211_michael_mic_failure(), as far as I can tell. > > Ath11k HW has capability of reporting TKIP MIC error when hw encap is > enabled as well, so TKIP encryption shall be enabled. Maybe so. But it cannot tell wpa_supplicant about MIC errors, and so that cannot do countermeasures, so something isn't right. > Shall we have a ieee80211_hw_flags for the driver to advertise TKIP MIC > error reporting capability when hw encap is enabled ? > TKIP bring-up will be disabled for the drivers which doesn't have the > capability. That would be better, since for TKIP it's actually more tricky and requires more work. But mostly I was thinking that you should make it possible for ath11k to actually report the MIC errors up to userspace. Right now I don't think it can, because it doesn't have the netdev pointer? johannes