Received: by 2002:a05:6a10:a852:0:0:0:0 with SMTP id d18csp624701pxy; Wed, 5 May 2021 09:47:29 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyHh39Qg04zCRIAfMw9vALW2a2LRU0obUAlzjIyIEVexInzqLvgWb6xSd7loR7JIW/COfaZ X-Received: by 2002:a63:570b:: with SMTP id l11mr29148401pgb.193.1620233249087; Wed, 05 May 2021 09:47:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1620233249; cv=none; d=google.com; s=arc-20160816; b=Nj1pvvypPmkLTC4H+fS0T0bAqMO/tNt82WU3Ij4jUX/zHQIuYQAsQZj57Qm2cOCYl4 WaGMyE1RUPw2C0rxkbxMNyJp7jNt7FrFKeFw0FtVwTfd3S4+sxMwgGgurM+KW3Ahfs5x PuDJH8A4GFI4/kUPHFEQ1K1HnV1nCLHKl2z1W/Fxe69sDWkjMvXbOIFvFq/iOIBLR8qb pquelRcyiXCwsjGuORD6a/o2ApBBplAZUm80G6YDTuOkcQ4G6GX6I4FdJKKaJfmpv9FR AHQpwELMqYHiXkTduHSgpOaS5BJzNdGwXa3YVHoSUMWC2frZ7pI7Ifw8e65QTYfWk0rI 7cqg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=6K/BewMVh8+Bov8x5KovPWe2q2DDgpE3mrXcI7CCMZM=; b=AIbt2khZvrknEXkC1U3UA6xI1s5OCcpoFrqoSxqIP8Sm9H7QgoLgMV0H6DRy2CAQrb ZdMiyFR6rwdafib3Bv3jkMNzLHvoNu8m++/QYPOmRfQGeLzbeZmIvVLrpOgHvtiJI6p6 7XarNt9Pioxc7YMOGUiW5iwrHy2RrK6I4zYpKOd+E4z6e97j6KQdxflWHkOGjBkyi4/x VVM0ng1kem66H2gxHGEZ51SHFhkaFD3bRQJSYbK2dO/CTr0tg/neLEiXUAjwqDA2NLOO fzWXmYLOqmb4jedBYJmR76dGTjybitq3ZIYJVyjAfePRw+MIvJuRzmxXK9iPY7DB/lc0 mPeg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=t2SRv6zq; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id 37si6828576pgt.527.2021.05.05.09.47.16; Wed, 05 May 2021 09:47:29 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=t2SRv6zq; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236166AbhEEQri (ORCPT + 99 others); Wed, 5 May 2021 12:47:38 -0400 Received: from mail.kernel.org ([198.145.29.99]:50936 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235713AbhEEQow (ORCPT ); Wed, 5 May 2021 12:44:52 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id B45BF6142D; Wed, 5 May 2021 16:35:29 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1620232530; bh=IPp4mfL+XvNC0dERM3oeP/v+YbaufMNi1bDToE++chk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=t2SRv6zqImbPwY6NnWiKxMUvQp7iBp7zuNepg/nMRODq0ZjY8yMAWC1xpN6Vy0m3N HAu9foF9HYHsnQg+7p9xdhMui+hLaqtUgxBGUyWqOBEhSz04AaOXrlmqQ1fB1K7YMW 2sVUbDJc2Gee28vXQmX9iY3L+r+KYRPAbpa4RmdkSmhsRPjxvyFHKUIa1qPb+sCtZ+ bNwpTly0IB6+MlUY0A/eO4Q7qNvVJI+J2ntlDfihdgw5oqa+n3Ziwsashtv1yOQ+3m eTPk8P5FigBgcn1AiayHskRHez2MrKAzKdqX/dEVnX1tUNNi7q7V3Ixv1CHnIOTn69 Qt43Z0bt8YtXg== From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: David Bauer , Felix Fietkau , Sasha Levin , linux-wireless@vger.kernel.org, netdev@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-mediatek@lists.infradead.org Subject: [PATCH AUTOSEL 5.11 053/104] mt76: mt76x0: disable GTK offloading Date: Wed, 5 May 2021 12:33:22 -0400 Message-Id: <20210505163413.3461611-53-sashal@kernel.org> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20210505163413.3461611-1-sashal@kernel.org> References: <20210505163413.3461611-1-sashal@kernel.org> MIME-Version: 1.0 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org From: David Bauer [ Upstream commit 4b36cc6b390f18dbc59a45fb4141f90d7dfe2b23 ] When operating two VAP on a MT7610 with encryption (PSK2, SAE, OWE), only the first one to be created will transmit properly encrypteded frames. All subsequently created VAPs will sent out frames with the payload left unencrypted, breaking multicast traffic (ICMP6 NDP) and potentially disclosing information to a third party. Disable GTK offloading and encrypt these frames in software to circumvent this issue. THis only seems to be necessary on MT7610 chips, as MT7612 is not affected from our testing. Signed-off-by: David Bauer Signed-off-by: Felix Fietkau Signed-off-by: Sasha Levin --- drivers/net/wireless/mediatek/mt76/mt76x02_util.c | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/drivers/net/wireless/mediatek/mt76/mt76x02_util.c b/drivers/net/wireless/mediatek/mt76/mt76x02_util.c index 7ac20d3c16d7..aaa597b941cd 100644 --- a/drivers/net/wireless/mediatek/mt76/mt76x02_util.c +++ b/drivers/net/wireless/mediatek/mt76/mt76x02_util.c @@ -447,6 +447,10 @@ int mt76x02_set_key(struct ieee80211_hw *hw, enum set_key_cmd cmd, !(key->flags & IEEE80211_KEY_FLAG_PAIRWISE)) return -EOPNOTSUPP; + /* MT76x0 GTK offloading does not work with more than one VIF */ + if (is_mt76x0(dev) && !(key->flags & IEEE80211_KEY_FLAG_PAIRWISE)) + return -EOPNOTSUPP; + msta = sta ? (struct mt76x02_sta *)sta->drv_priv : NULL; wcid = msta ? &msta->wcid : &mvif->group_wcid; -- 2.30.2