2011-07-06 12:06:39 +03:00
|
|
|
--- a/drivers/net/wireless/ath/ath9k/recv.c
|
|
|
|
+++ b/drivers/net/wireless/ath/ath9k/recv.c
|
2011-07-09 06:33:59 +03:00
|
|
|
@@ -814,16 +814,19 @@ static bool ath9k_rx_accept(struct ath_c
|
2011-07-06 12:06:39 +03:00
|
|
|
struct ath_rx_status *rx_stats,
|
|
|
|
bool *decrypt_error)
|
|
|
|
{
|
|
|
|
-#define is_mc_or_valid_tkip_keyix ((is_mc || \
|
|
|
|
- (rx_stats->rs_keyix != ATH9K_RXKEYIX_INVALID && \
|
|
|
|
- test_bit(rx_stats->rs_keyix, common->tkip_keymap))))
|
|
|
|
-
|
2011-07-09 06:33:59 +03:00
|
|
|
+ bool is_mc, is_valid_tkip, strip_mic, mic_error = false;
|
2011-07-06 12:06:39 +03:00
|
|
|
struct ath_hw *ah = common->ah;
|
|
|
|
__le16 fc;
|
|
|
|
u8 rx_status_len = ah->caps.rx_status_len;
|
|
|
|
|
|
|
|
fc = hdr->frame_control;
|
|
|
|
|
|
|
|
+ is_mc = !!is_multicast_ether_addr(hdr->addr1);
|
|
|
|
+ is_valid_tkip = rx_stats->rs_keyix != ATH9K_RXKEYIX_INVALID &&
|
|
|
|
+ test_bit(rx_stats->rs_keyix, common->tkip_keymap);
|
2011-07-09 06:33:59 +03:00
|
|
|
+ strip_mic = is_valid_tkip && !(rx_stats->rs_status &
|
|
|
|
+ (ATH9K_RXERR_DECRYPT | ATH9K_RXERR_CRC | ATH9K_RXERR_MIC));
|
2011-07-06 12:06:39 +03:00
|
|
|
+
|
|
|
|
if (!rx_stats->rs_datalen)
|
|
|
|
return false;
|
|
|
|
/*
|
2011-07-09 06:33:59 +03:00
|
|
|
@@ -850,25 +853,9 @@ static bool ath9k_rx_accept(struct ath_c
|
|
|
|
if (rx_stats->rs_status & ATH9K_RXERR_PHY)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
- if (rx_stats->rs_status & ATH9K_RXERR_DECRYPT) {
|
|
|
|
+ if (rx_stats->rs_status & ATH9K_RXERR_DECRYPT)
|
2011-07-06 12:06:39 +03:00
|
|
|
*decrypt_error = true;
|
2011-07-09 06:33:59 +03:00
|
|
|
- } else if (rx_stats->rs_status & ATH9K_RXERR_MIC) {
|
2011-07-06 12:06:39 +03:00
|
|
|
- bool is_mc;
|
2011-07-09 06:33:59 +03:00
|
|
|
- /*
|
|
|
|
- * The MIC error bit is only valid if the frame
|
|
|
|
- * is not a control frame or fragment, and it was
|
2011-07-06 12:06:39 +03:00
|
|
|
- * decrypted using a valid TKIP key.
|
2011-07-09 06:33:59 +03:00
|
|
|
- */
|
2011-07-06 12:06:39 +03:00
|
|
|
- is_mc = !!is_multicast_ether_addr(hdr->addr1);
|
2011-07-09 06:33:59 +03:00
|
|
|
|
|
|
|
- if (!ieee80211_is_ctl(fc) &&
|
|
|
|
- !ieee80211_has_morefrags(fc) &&
|
|
|
|
- !(le16_to_cpu(hdr->seq_ctrl) & IEEE80211_SCTL_FRAG) &&
|
2011-07-06 12:06:39 +03:00
|
|
|
- is_mc_or_valid_tkip_keyix)
|
|
|
|
- rxs->flag |= RX_FLAG_MMIC_ERROR;
|
2011-07-09 06:33:59 +03:00
|
|
|
- else
|
|
|
|
- rx_stats->rs_status &= ~ATH9K_RXERR_MIC;
|
|
|
|
- }
|
|
|
|
/*
|
|
|
|
* Reject error frames with the exception of
|
|
|
|
* decryption and MIC failures. For monitor mode,
|
|
|
|
@@ -886,6 +873,18 @@ static bool ath9k_rx_accept(struct ath_c
|
2011-07-06 12:06:39 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
+
|
|
|
|
+ /*
|
|
|
|
+ * For unicast frames the MIC error bit can have false positives,
|
|
|
|
+ * so all MIC error reports need to be validated in software.
|
|
|
|
+ * False negatives are not common, so skip software verification
|
|
|
|
+ * if the hardware considers the MIC valid.
|
|
|
|
+ */
|
2011-07-09 06:33:59 +03:00
|
|
|
+ if (strip_mic)
|
2011-07-06 12:06:39 +03:00
|
|
|
+ rxs->flag |= RX_FLAG_MMIC_STRIPPED;
|
2011-07-09 06:33:59 +03:00
|
|
|
+ else if (is_mc && mic_error)
|
2011-07-06 12:06:39 +03:00
|
|
|
+ rxs->flag |= RX_FLAG_MMIC_ERROR;
|
2011-07-09 06:33:59 +03:00
|
|
|
+
|
2011-07-06 12:06:39 +03:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2011-07-12 06:24:53 +03:00
|
|
|
@@ -1940,6 +1939,9 @@ int ath_rx_tasklet(struct ath_softc *sc,
|
|
|
|
sc->rx.rxotherant = 0;
|
|
|
|
}
|
2011-07-09 06:33:59 +03:00
|
|
|
|
|
|
|
+ if (rxs->flag & RX_FLAG_MMIC_STRIPPED)
|
|
|
|
+ skb_trim(skb, skb->len - 8);
|
|
|
|
+
|
2011-07-12 06:24:53 +03:00
|
|
|
spin_lock_irqsave(&sc->sc_pm_lock, flags);
|
|
|
|
|
|
|
|
if ((sc->ps_flags & (PS_WAIT_FOR_BEACON |
|