mirror of
https://github.com/openwrt/openwrt.git
synced 2024-12-22 23:12:32 +00:00
bf6f7cf29b
The removed patches were applied upstream. Remove the 300-mac80211-optimize-skb-resizing.patch. This patch was not applied upstream, but it conflicts with upstream changes and needs bigger changes. It was applied with Felix to remove this patch for now. It should be reworked and then send upstream later. Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
26 lines
1020 B
Diff
26 lines
1020 B
Diff
From: Felix Fietkau <nbd@nbd.name>
|
|
Date: Fri, 18 Dec 2020 20:08:06 +0100
|
|
Subject: [PATCH] mac80211: do not drop tx nulldata packets on encrypted links
|
|
|
|
ieee80211_tx_h_select_key drops any non-mgmt packets without a key when
|
|
encryption is used. This is wrong for nulldata packets that can't be
|
|
encrypted and are sent out for probing clients and indicating 4-address
|
|
mode.
|
|
|
|
Reported-by: Sebastian Gottschall <s.gottschall@dd-wrt.com>
|
|
Fixes: a0761a301746 ("mac80211: drop data frames without key on encrypted links")
|
|
Signed-off-by: Felix Fietkau <nbd@nbd.name>
|
|
---
|
|
|
|
--- a/net/mac80211/tx.c
|
|
+++ b/net/mac80211/tx.c
|
|
@@ -658,7 +658,7 @@ ieee80211_tx_h_select_key(struct ieee802
|
|
if (!skip_hw && tx->key &&
|
|
tx->key->flags & KEY_FLAG_UPLOADED_TO_HARDWARE)
|
|
info->control.hw_key = &tx->key->conf;
|
|
- } else if (!ieee80211_is_mgmt(hdr->frame_control) && tx->sta &&
|
|
+ } else if (ieee80211_is_data_present(hdr->frame_control) && tx->sta &&
|
|
test_sta_flag(tx->sta, WLAN_STA_USES_ENCRYPTION)) {
|
|
return TX_DROP;
|
|
}
|