lp:~kelsey-skunberg/ubuntu/+source/linux/+git/focal

Get this repository:
git clone https://git.launchpad.net/~kelsey-skunberg/ubuntu/+source/linux/+git/focal
Only Kelsey Margarete Skunberg can upload to this repository. If you are Kelsey Margarete Skunberg please log in for upload directions.

Branches

Name Last Modified Last Commit
master-next 2020-06-05 17:41:57 UTC 2020-06-05
UBUNTU: SAUCE: rtw88: fix EAPOL 4-way failure by finish IQK earlier

Author: Ping-Ke Shih
Author Date: 2020-05-29 06:17:58 UTC

UBUNTU: SAUCE: rtw88: fix EAPOL 4-way failure by finish IQK earlier

BugLink: https://bugs.launchpad.net/bugs/1878147

If we connect to an AP with WPA2 security, the IQK and the
EAPOL 4-way handshake may be failed due to overlap, because
driver does IQK right after assoc success.

For 802.11n devices, they used to do IQK in driver that could
requires more than 100ms to finished. During IQK, any TX/RX
events are paused. So, if the EAPOL 4-way started before IQK
is finished, the 1/4 and 2/4 could be dropped, then the AP
will issue deauth with reason IEEE8021X_FAILED (23).

To resolve this, move IQK routine into managed TX prepare,
which is ieee80211_ops::mgd_prepare_tx() called before the
managed frames (auth/assoc) are sent. This can make sure IQK
is done before connection. While scanning, not to do IQK for
each channel because it would take too long.

For 802.11ac devices, they used to do IQK in firmware, and it
takes less time to finish it, so we do not see EAPOL 4-way
failure on them. But, it is still worth to move the IQK to
mgd_prepare_tx().

Fixes: f5df1a8b4376 ("rtw88: 8723d: Add 8723DE to Kconfig and Makefile")
Signed-off-by: Ping-Ke Shih <pkshih@realtek.com>
Signed-off-by: Yan-Hsuan Chuang <yhchuang@realtek.com>
(backported from
https://lore.kernel.org/linux-wireless/20200518081444.7664-4-yhchuang@realtek.com/raw)
Signed-off-by: You-Sheng Yang <vicamo.yang@canonical.com>
Acked-by: Kleber Sacilotto de Souza <kleber.souza@canonical.com>
Acked-by: Sultan Alsawaf <sultan.alsawaf@canonical.com>
Signed-off-by: Kelsey Skunberg <kelsey.skunberg@canonical.com>

11 of 1 result
This repository contains Public information 
Everyone can see this information.