Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp412908pxu; Thu, 26 Nov 2020 01:44:37 -0800 (PST) X-Google-Smtp-Source: ABdhPJyo/O44zvOmElk4Jdp5/5h3cS7RsJbYcBJSdA/mwMLZxmehfQ+gkeLas++uZCuUO4ztRstl X-Received: by 2002:a17:906:1317:: with SMTP id w23mr1920109ejb.120.1606383877487; Thu, 26 Nov 2020 01:44:37 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1606383877; cv=none; d=google.com; s=arc-20160816; b=uW2vTP1kLJGbef1CHQrm1D/loa2xYfGaw7URyjMTTixREKp9y1BNke4c4Pk76tUS7G 9PB4vTydt8r9a+hnDG9nI/EYqTZJYKk9lMp2bRSqulgvnNB/+ATcATupEIrBjcKg/eDl rkaChKMrkn9FT9lmOz7qYbM7ghh3PBdhUT0TQmLaYiR44q+PpOCgv2vlTt0fifZl19i4 XEghs2V9MpgU7+X+Qdz9PSubF5bbEOu8G9bJkzU0/H7WQczrxj4La8Pdjmxp+PB7lYdy NjHKbtcvfq2rqxcYEuL7Q22YwQbvDrP2jEzbqIyJg39XxnRf1zU7DPecplQnd3PetteR JQfg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:message-id:date:subject:cc:to:from:dmarc-filter :sender:dkim-signature; bh=iU4cGrL0wyqT1L58w05ObFYpTDM5QzwfhxQ4GGiyrsA=; b=a2OOeOLVMRR1rYB9hk1PwAWVvGH/ODwsvHPIySryLVeeE8q5ePPu0V26GSoqdSDEH2 TYq8mG961PGPwMy4rtmaYt+A9EKk8IoGxh6Bdo8N0OkQu7iI+Lef0e2EFjdw2tQgribm ZlHROMX/s8myoA70UZfdH6rMaBmxHKcAzVwGFv6gyUPdUHh/xXWqsgL8nNvnZ5fc9JGH 6JyFUE0qHPjUB9b8TDxSdiQwCk57xHniWERf/c4noVQVdGDP0aEIoogAZKlCVEVx4U09 TXJPExeBJZwPQS0qCXGOQDCIL6YFXlO/DzW/dd4RidyNMJzdllsnex0ODxzRE9c5aVTb MSIA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@mg.codeaurora.org header.s=smtp header.b=i2KqD5yV; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id p1si2719623ejf.418.2020.11.26.01.44.14; Thu, 26 Nov 2020 01:44:37 -0800 (PST) Received-SPF: pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@mg.codeaurora.org header.s=smtp header.b=i2KqD5yV; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731024AbgKZFoU (ORCPT + 99 others); Thu, 26 Nov 2020 00:44:20 -0500 Received: from z5.mailgun.us ([104.130.96.5]:25140 "EHLO z5.mailgun.us" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730615AbgKZFoT (ORCPT ); Thu, 26 Nov 2020 00:44:19 -0500 DKIM-Signature: a=rsa-sha256; v=1; c=relaxed/relaxed; d=mg.codeaurora.org; q=dns/txt; s=smtp; t=1606369459; h=Message-Id: Date: Subject: Cc: To: From: Sender; bh=iU4cGrL0wyqT1L58w05ObFYpTDM5QzwfhxQ4GGiyrsA=; b=i2KqD5yV5HUwOxCYu9/AuajcQi6Ru3DncatyMhf3Ns15GyQvYnQyH+bMcU7sVbw1mQJ1pVp4 0AQH8OZ0YRjoc5BINOl4WVpOdAIXiJUB8FeunwTqiU23BjM/JYJEWIzuJIBcx3SYELbKO7Pp LQAJ+9JIMr09KpxQFAY/d/g1Lrs= X-Mailgun-Sending-Ip: 104.130.96.5 X-Mailgun-Sid: WyI3YTAwOSIsICJsaW51eC13aXJlbGVzc0B2Z2VyLmtlcm5lbC5vcmciLCAiYmU5ZTRhIl0= Received: from smtp.codeaurora.org (ec2-35-166-182-171.us-west-2.compute.amazonaws.com [35.166.182.171]) by smtp-out-n02.prod.us-east-1.postgun.com with SMTP id 5fbf40b29e87e1635268533d (version=TLS1.2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256); Thu, 26 Nov 2020 05:44:18 GMT Sender: seevalam=codeaurora.org@mg.codeaurora.org Received: by smtp.codeaurora.org (Postfix, from userid 1001) id C0C3CC433ED; Thu, 26 Nov 2020 05:44:17 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-caf-mail-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.9 required=2.0 tests=ALL_TRUSTED,BAYES_00,SPF_FAIL, URIBL_BLOCKED autolearn=no autolearn_force=no version=3.4.0 Received: from CHECSTLC0020039-LIN.qualcomm.com (blr-c-bdr-fw-01_GlobalNAT_AllZones-Outside.qualcomm.com [103.229.19.19]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-SHA256 (128/128 bits)) (No client certificate requested) (Authenticated sender: seevalam) by smtp.codeaurora.org (Postfix) with ESMTPSA id B239EC433C6; Thu, 26 Nov 2020 05:44:15 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 smtp.codeaurora.org B239EC433C6 Authentication-Results: aws-us-west-2-caf-mail-1.web.codeaurora.org; dmarc=none (p=none dis=none) header.from=codeaurora.org Authentication-Results: aws-us-west-2-caf-mail-1.web.codeaurora.org; spf=fail smtp.mailfrom=seevalam@codeaurora.org From: Seevalamuthu Mariappan To: ath11k@lists.infradead.org Cc: linux-wireless@vger.kernel.org, Seevalamuthu Mariappan Subject: [PATCH] ath11k: Ignore resetting peer auth flag in peer assoc cmd Date: Thu, 26 Nov 2020 11:13:34 +0530 Message-Id: <1606369414-25211-1-git-send-email-seevalam@codeaurora.org> X-Mailer: git-send-email 2.7.4 Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org Incase of hardware encryption, WMI_PEER_AUTH flag will be set by firmware during install key. Since install key wont be done for software encryption mode, firmware will not set this flag. Due to this, seeing traffic failure in software encryption. Hence, avoid resetting peer auth flag if hardware encryption disabled. Tested-on: IPQ8074 hw2.0 AHB WLAN.HK.2.4.0.1-01421-QCAHKSWPL_SILICONZ-1 Signed-off-by: Seevalamuthu Mariappan --- drivers/net/wireless/ath/ath11k/wmi.c | 10 +++++++--- 1 file changed, 7 insertions(+), 3 deletions(-) diff --git a/drivers/net/wireless/ath/ath11k/wmi.c b/drivers/net/wireless/ath/ath11k/wmi.c index bca66c1..9bd4284 100644 --- a/drivers/net/wireless/ath/ath11k/wmi.c +++ b/drivers/net/wireless/ath/ath11k/wmi.c @@ -1686,7 +1686,8 @@ int ath11k_wmi_vdev_install_key(struct ath11k *ar, static inline void ath11k_wmi_copy_peer_flags(struct wmi_peer_assoc_complete_cmd *cmd, - struct peer_assoc_params *param) + struct peer_assoc_params *param, + bool hw_crypto_disabled) { cmd->peer_flags = 0; @@ -1740,7 +1741,8 @@ ath11k_wmi_copy_peer_flags(struct wmi_peer_assoc_complete_cmd *cmd, cmd->peer_flags |= WMI_PEER_AUTH; if (param->need_ptk_4_way) { cmd->peer_flags |= WMI_PEER_NEED_PTK_4_WAY; - cmd->peer_flags &= ~WMI_PEER_AUTH; + if (!hw_crypto_disabled) + cmd->peer_flags &= ~WMI_PEER_AUTH; } if (param->need_gtk_2_way) cmd->peer_flags |= WMI_PEER_NEED_GTK_2_WAY; @@ -1807,7 +1809,9 @@ int ath11k_wmi_send_peer_assoc_cmd(struct ath11k *ar, cmd->peer_new_assoc = param->peer_new_assoc; cmd->peer_associd = param->peer_associd; - ath11k_wmi_copy_peer_flags(cmd, param); + ath11k_wmi_copy_peer_flags(cmd, param, + test_bit(ATH11K_FLAG_HW_CRYPTO_DISABLED, + &ar->ab->dev_flags)); ether_addr_copy(cmd->peer_macaddr.addr, param->peer_mac); -- 2.7.4