From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-5.6 required=3.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,FREEMAIL_FORGED_FROMDOMAIN,FREEMAIL_FROM, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,MENTIONS_GIT_HOSTING, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 4F50AC31E57 for ; Mon, 17 Jun 2019 11:32:20 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 22D902087F for ; Mon, 17 Jun 2019 11:32:20 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="crErvUYy" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727955AbfFQLcT (ORCPT ); Mon, 17 Jun 2019 07:32:19 -0400 Received: from mail-ot1-f66.google.com ([209.85.210.66]:42421 "EHLO mail-ot1-f66.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725681AbfFQLcT (ORCPT ); Mon, 17 Jun 2019 07:32:19 -0400 Received: by mail-ot1-f66.google.com with SMTP id l15so8903232otn.9 for ; Mon, 17 Jun 2019 04:32:18 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=bFeLNRz90DozmUEBqcuHoNO0gJ8aYft6A7ssbyU+2Ns=; b=crErvUYy+5U2jXXUkAPg2JiPmtCnGo5XO+8bgyT3vDmcxQrwB995MHArXO05jKc0M6 LXnPthe9U3aN05IJkucpZoyMHpYFLo+Y2DbTojcUYYzrlmFTl45adhbst+iOodk15DXX bZ9PPlMaU7MNBFUctmZ7qcn67jm5rRHGcqaD4sHdvf9BgYqyzuBjxuba8H8/t0Qqlh0i l0AHUnAHOU9XUyOb/52pDo3+dZKNl814pTvtPJYQdVkU/EK/1NG/16QB5ROxAtN1LFcR /j8A4GVtCEvPsF6jjU+V/vqTRiVoyx54wPprqJKETn3xYdbMcD46PmSeKRMZiIcBpbps NowA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=bFeLNRz90DozmUEBqcuHoNO0gJ8aYft6A7ssbyU+2Ns=; b=uOqZybKQ5V1MUmKWoIdEAmZKGb5zmvz70X4IO3e8/31kD/ha7iuHE/8xlVrxya8JLE 1tkklUKCVUGl3KcgG3t/dcMcIjFhoxWP82euVauSSdDnkmOzld74pEtONC7Im7uSwTsp LN2kmbcTxURFiqZFIp3PRIQeEHgU/kcofamkBavAccZ+AzrALotuYCSnZqV0qcoPbk0I 79q2kmanyrRsSZiOLphoIvfVccN0DGw2EC/FziyylqEkfG+HJSDAfbN6O+htA6pSxRIg kID01bVePdxXALchn/g8r2WaaPuQ56TkNsgW3ckuaXh/VK/jMu1YTy4dphMqSExIEgl+ TeLg== X-Gm-Message-State: APjAAAVRQno3d8Hu92g/siUgmMz7JXiRhu1Pe0XsZtR8Nd+tiOO3q0fo wMDm+XFRhsr4DntLnXHakkavrYLn/ZSTZ01M3Hg= X-Google-Smtp-Source: APXvYqzHJPlN6vcmLC4BhL9wSpZF6995J/G8/LQZXHvZLNccR5hVqHikEHUSWp7S1IBLn+rIvRp0pbUlAM1Egog4Jvk= X-Received: by 2002:a05:6830:1681:: with SMTP id k1mr35982840otr.256.1560771138563; Mon, 17 Jun 2019 04:32:18 -0700 (PDT) MIME-Version: 1.0 Received: by 2002:a05:6830:2015:0:0:0:0 with HTTP; Mon, 17 Jun 2019 04:32:17 -0700 (PDT) In-Reply-To: <20190617093658.46591254@mir> References: <1557307533-5795-1-git-send-email-mpubbise@codeaurora.org> <20190617070747.562b9388@mir> <20190617093658.46591254@mir> From: Tom Psyborg Date: Mon, 17 Jun 2019 13:32:17 +0200 Message-ID: Subject: Re: [PATCH v3] {nl,mac}80211: allow 4addr AP operation on crypto controlled devices To: Stefan Lippers-Hollmann Cc: Johannes Berg , Manikanta Pubbisetty , linux-wireless@vger.kernel.org Content-Type: text/plain; charset="UTF-8" Sender: linux-wireless-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org Hi Checked out r10011 from openwrt git on May, 15; built images and flashed devices; tried to set up WDS (AP) + WDS (Client); got this in logs: https://forum.openwrt.org/t/ath10k-wds-support-missing/30346/15?u=psyborg Saw this patch in my inbox and checked openwrt sources, to find out there was v1 used: https://git.openwrt.org/?p=openwrt/openwrt.git;a=blob;f=package/kernel/mac80211/patches/subsys/390-nl-mac-80211-allow-4addr-AP-operation-on-crypto-cont.patch Reverted v1 of the patch and patched manually to v3 (double checked), did not help. Found patch that fixes problem and applied; https://github.com/openwrt/openwrt/pull/2048 Now I got this in logs: https://forum.openwrt.org/t/wds-client-wont-stay-connected-prev-auth-not-valid-using-recent-snapshot-builds/38194/20?u=psyborg Reverted again v3 of this patch to v1, and the connection worked as expected. v4.19.32 is current in openwrt master, and testing against ath9k devices may not reveal exact issue. notice in one of my posts on forums that i was able to bridge it with archer c7 running tp-link fw without any of these patches