Received: by 2002:a05:6358:45e:b0:b5:b6eb:e1f9 with SMTP id 30csp183548rwe; Fri, 26 Aug 2022 03:11:23 -0700 (PDT) X-Google-Smtp-Source: AA6agR4dCj/3gRf3x790RPikAsZQYNxmcswzy+w0L3K/OueKv3RucjRIs9B++FrYDEFQNpqPEY93 X-Received: by 2002:a17:907:2bf7:b0:730:996d:5e8d with SMTP id gv55-20020a1709072bf700b00730996d5e8dmr5130768ejc.382.1661508682949; Fri, 26 Aug 2022 03:11:22 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1661508682; cv=none; d=google.com; s=arc-20160816; b=WMOah0ualZ53rV5yZsEKiqSSOgeeV43h3mkUPOFqdSD75GRHkQTEfXlsRm7uHGuYiT AtqVtH8wOZbkEncze+F3VkZtnYGiEzRbjG+QMu1q7PJiwSa6z7rfWwwUTfEb0pB27SE5 PluqlSVkQosfPvjPS8GghmIB+QUty9nROydW4xYeodp1ixISCMEnoyvi76NrONALwRQf EstHcnoHjeynD2BqqhwEajBMSCEbQ6eGio4e/qcdEt/B9syhxx83iiNwifUG1FgeL4vs w2A8EXnFL+e0G+SloBUcn5/H6cXQKAOTI2jI840I8O0GDtg4PLKnx9YHWHig+cPrx404 cCcA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:user-agent :content-transfer-encoding:references:in-reply-to:date:cc:to:from :subject:message-id:dkim-signature; bh=PDuvFPTo8HiHHGWKwAUaiAGHb7eN4Oeuhh0ZRdSICKs=; b=DMgS24q+6e60YUxJsbFLM7pyq8b86zxmh0E5Pv8EIebsQ9Q1AFdr9C1leRLm2vs0KV l9QZe5JGoHq9z0PyPONpyEwgEvCWzu0icOe6mXUdqsARNrA+fvsFYRAS7eOWH3N0s5Wq GX7Dth0xlSSAEHla/xS8P6SKsjGv5JKLVZEwGnv65VhfSp+V/sVDIIZou3hLMOjGAQDK Mao0xBWzaprLaEdzPPtDDV+1nmCaT+EH2tglgCLJQGzJ1EdXi4hLnC0LLENjQ4USp0pG juJi6X+YfRI36S/EiAYnJ9w6TRh2MeqaEaaIFretVfbRv/KBCpoTTsznfhBAuo6FtEOR fPfA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@sipsolutions.net header.s=mail header.b=gYDsdPA8; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=NONE sp=REJECT dis=NONE) header.from=sipsolutions.net Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id jg41-20020a170907972900b0073d886f0d46si1252957ejc.243.2022.08.26.03.11.05; Fri, 26 Aug 2022 03:11:22 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@sipsolutions.net header.s=mail header.b=gYDsdPA8; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=NONE sp=REJECT dis=NONE) header.from=sipsolutions.net Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1343723AbiHZKIW (ORCPT + 64 others); Fri, 26 Aug 2022 06:08:22 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:33054 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S241826AbiHZKIF (ORCPT ); Fri, 26 Aug 2022 06:08:05 -0400 Received: from sipsolutions.net (s3.sipsolutions.net [IPv6:2a01:4f8:191:4433::2]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 5F9F3DB067 for ; Fri, 26 Aug 2022 03:07:11 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=sipsolutions.net; s=mail; h=MIME-Version:Content-Transfer-Encoding: Content-Type:References:In-Reply-To:Date:Cc:To:From:Subject:Message-ID:Sender :Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From:Resent-To: Resent-Cc:Resent-Message-ID; bh=PDuvFPTo8HiHHGWKwAUaiAGHb7eN4Oeuhh0ZRdSICKs=; t=1661508432; x=1662718032; b=gYDsdPA89kCSD47JDydjrWg2lXxSuZTL44798DzQO2s7yJk p3hBz8c1FdhKuZfRXIjBiR/VyEP07gu5mmAqcvd2L/BSjpQeWlQGekhBcWUrVeXkrUli+GrlMiWkr z/C1M0RtpspTValfJI+bXoyw60RdElW2f8sBoGKcK8BQu6KETaPNhikWy9NAcljJ15dyjVDGFvTho Qyz9u/7hrVE3cj81xaKDLxquUMxtqTgxqiRw0ttZFVxBcsbz0ok9G/PPB0VjcVgPFxt6CIHOMy82Q zrkZ9SjGADj0dGAQ5KnOSiI1Nd0uWHQlAkyYcibsAh2sPlzHkoUp575gxoFYYseg==; Received: by sipsolutions.net with esmtpsa (TLS1.3:ECDHE_X25519__RSA_PSS_RSAE_SHA256__AES_256_GCM:256) (Exim 4.96) (envelope-from ) id 1oRWF3-000C6V-22; Fri, 26 Aug 2022 12:07:09 +0200 Message-ID: Subject: Re: [PATCH 1/1] cfg80211: Update Transition Disable policy during port authorization From: Johannes Berg To: Vinayak Yadawad Cc: linux-wireless@vger.kernel.org, jithu.jance@broadcom.com Date: Fri, 26 Aug 2022 12:07:08 +0200 In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable User-Agent: Evolution 3.44.4 (3.44.4-1.fc36) MIME-Version: 1.0 X-malware-bazaar: not-scanned X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,SPF_HELO_PASS,SPF_PASS, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org > In case of 4way handshake offload, transition disable policy > updated by the AP during EAPOL 3/4 is not updated to the cfg80211 > layer. This results in mismatch between transition disable policy > between the upper layer and the driver I find this a bit confusingly worded - cfg80211 doesn't care, so it doesn't need to be updated _in_ cfg80211. "To" cfg80211 sounds a bit weird. Maybe just phrase that in terms of userspace? > +++ b/include/net/cfg80211.h > @@ -7669,7 +7669,7 @@ void cfg80211_roamed(struct net_device *dev, struct= cfg80211_roam_info *info, > * indicate the 802.11 association. > */ > void cfg80211_port_authorized(struct net_device *dev, const u8 *bssid, > - gfp_t gfp); > + const u8 td_bitmap, gfp_t gfp); Missing docs. Also missing the corresponding driver update, even if it should just pass 0 for now in this patch to not have a lot of new driver logic here? Or maybe it should be valid to pass -1 (i.e. make it a s16) to avoid passing it to userspace when the driver doesn't know? Also no point in marking the parameter const. =20 >=20 > +++ b/include/uapi/linux/nl80211.h > @@ -3268,6 +3268,7 @@ enum nl80211_attrs { > =20 > NL80211_ATTR_TX_HW_TIMESTAMP, > NL80211_ATTR_RX_HW_TIMESTAMP, > + NL80211_ATTR_TD_BITMAP, Also missing docs. > void nl80211_send_port_authorized(struct cfg80211_registered_device *rde= v, > - struct net_device *netdev, const u8 *bssid) > + struct net_device *netdev, const u8 *bssid, > + const u8 td_bitmap) same here about const > if (nla_put_u32(msg, NL80211_ATTR_WIPHY, rdev->wiphy_idx) || > nla_put_u32(msg, NL80211_ATTR_IFINDEX, netdev->ifindex) || > - nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, bssid)) > + nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, bssid) || > + nla_put_u8(msg, NL80211_ATTR_TD_BITMAP, td_bitmap)) and yeah maybe here check for <0 or something if it should sometimes result in a missing attribute? johannes