Linux on Apple ARM platform development
 help / color / mirror / Atom feed
From: Arend van Spriel <arend.vanspriel@broadcom.com>
To: Hector Martin <marcan@marcan.st>, Kalle Valo <kvalo@kernel.org>,
	Linus Torvalds <torvalds@linux-foundation.org>
Cc: Daniel Berlin <dberlin@dberlin.org>,
	Arend van Spriel <aspriel@gmail.com>,
	Franky Lin <franky.lin@broadcom.com>,
	Hante Meuleman <hante.meuleman@broadcom.com>,
	SHA-cyfmac-dev-list@infineon.com, asahi@lists.linux.dev,
	brcm80211-dev-list.pdl@broadcom.com,
	linux-kernel@vger.kernel.org, linux-wireless@vger.kernel.org,
	David Airlie <airlied@redhat.com>,
	Daniel Vetter <daniel@ffwll.ch>
Subject: Re: [PATCH] wifi: brcmfmac: cfg80211: Use WSEC to set SAE password
Date: Wed, 20 Dec 2023 20:36:26 +0100	[thread overview]
Message-ID: <bdb078c0-2f45-485a-86a0-bb7d0b5e3516@broadcom.com> (raw)
In-Reply-To: <4c89b71e-8667-40fe-add0-205748de51ef@marcan.st>

[-- Attachment #1: Type: text/plain, Size: 5029 bytes --]

On 12/20/2023 7:14 PM, Hector Martin wrote:
> 
> 
> On 2023/12/20 19:20, Kalle Valo wrote:
>> Linus Torvalds <torvalds@linux-foundation.org> writes:
>>
>>>> Just recently a patch was posted to remove the Infineon list from
>>>> MAINTAINERS because that company cares so little they have literally
>>>> stopped accepting emails from us. Meanwhile they are telling their
>>>> customers that they do not recommend upstream brcmfmac and they should
>>>> use their downstream driver [1].
>>>
>>> Unquestionably broadcom is not helping maintain things, and I think it
>>> should matter.
>>>
>>> As Hector says, they point to their random driver dumps on their site
>>> that you can't even download unless you are a "Broadcom community
>>> member" or whatever, and hey - any company that works that way should
>>> be seen as pretty much hostile to any actual maintenance and proper
>>> development.
>>
>> Sadly this is the normal in the wireless world. All vendors focus on the
>> latest generation, currently it's Wi-Fi 7, and lose interest on older
>> generations. And vendors lose focus on the upstream drivers even faster,
>> usually after a customer project ends.
>>
>> So in practise what we try to do is keep the drivers working somehow on
>> our own, even after the vendors are long gone. If we would deliberately
>> allow breaking drivers because vendor/corporations don't support us, I
>> suspect we would have sevaral broken drivers in upstream.
>>
>>> If Daniel and Hector are responsive to actual problem reports for the
>>> changes they cause, I do think that should count a lot.
>>
>> Sure, but they could also respect to the review comments. I find Arend's
>> proposal is reasonable and that's what I would implement in v2. We
>> (linux-wireless) make abstractions to workaround firmware problems or
>> interface conflicts all the time, just look at ath10k for example. I
>> would not be surprised if we need to add even more abstractions to
>> brcmfmac in the future. And Arend is the expert here, he has best
>> knowledge of Broadcom devices and I trust him.
>>
>> Has anyone even investigated what it would need to implement Arend's
>> proposal? At least I don't see any indication of that.
> 
> Of course we can implement it (and we will as we actually got a report
> of this patch breaking Cypress now, finally).
> 
> The question was never whether it could be done, we're already doing a
> bunch of abstractions to deal with just the Broadcom-only side of things
> too. The point I was trying to make is that we need to *know* what
> firmware abstractions we need and *why* they are needed. We can't just
> say, for every change, "well, nobody knows if the existing code works or
> not, so let's just add an abstraction just in case the change breaks
> something". As far as anyone involved in the discussions until now could
> tell, this code was just something some Cypress person dumped upstream,
> and nobody involved was being responsive to any of our inquiries, so
> there was no way to be certain it worked at all, whether it was
> supported in public firmware, or anything else.
> 
> *Now* that we know the existing code is actually functional and not just
> dead/broken, and that the WSEC approach is conversely not functional on
> the Cypress firmwares, it makes sense to introduce an abstraction.

Just a quick look in the git history could have told you that it was not 
just dumped upstream and at least one person was using it and extended 
it for 802.11r support (fast-roaming):


author	Paweł Drewniak <czajernia@gmail.com>	2021-08-24 23:13:30 +0100
committer	Kalle Valo <kvalo@codeaurora.org>	2021-08-29 11:33:07 +0300
commit	4b51de063d5310f1fb297388b7955926e63e45c9 (patch)
tree	ba2ccb5cbd055d482a8daa263f5e53531c07667f 
/drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c
parent	81f9ebd43659320a88cae8ed5124c50b4d47ab66 (diff)
download	wireless-4b51de063d5310f1fb297388b7955926e63e45c9.tar.gz
brcmfmac: Add WPA3 Personal with FT to supported cipher suites
This allows the driver to connect to BSSIDs supporting SAE with 802.11r.
Tested on Raspberry Pi 4 Model B (STA) and UniFi 6LR/OpenWRT 21.02.0-rc2.
AP was set to 'sae-mixed' (WPA2/3 Personal).

Signed-off-by: Paweł Drewniak <czajernia@gmail.com>
Signed-off-by: Kalle Valo <kvalo@codeaurora.org>
Link: https://lore.kernel.org/r/20210824221330.3847139-1-czajernia@gmail.com

> Here's an example of the case where an abstraction was *not* needed: I
> switched over WPA PSK configuration from hex-encoded to binary. That was
> needed to make more recent Apple firmwares work. My evidence at the time
> that that change *was* at least fairly backwards compatible was that the
> OpenBSD driver had been doing it that way all along. Had we introduced
> an abstraction/conditional for that case "just in case", it would have
> generated superfluous technical debt for no reason.

Fully agreeing here and you already given the argument for that in the 
commit message. Hence there was no discussion whatsoever about that.

Regards,
Arend

[-- Attachment #2: S/MIME Cryptographic Signature --]
[-- Type: application/pkcs7-signature, Size: 4219 bytes --]

  reply	other threads:[~2023-12-20 19:36 UTC|newest]

Thread overview: 35+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2023-11-07  6:05 [PATCH] wifi: brcmfmac: cfg80211: Use WSEC to set SAE password Hector Martin
2023-11-08 11:12 ` Neal Gompa
2023-12-17 11:25 ` Kalle Valo
2023-12-19  8:52   ` Arend Van Spriel
2023-12-19  8:57     ` Kalle Valo
2023-12-19 11:01     ` Hector Martin
2023-12-19 13:46       ` Arend van Spriel
2023-12-19 14:26         ` Julian Calaby
2023-12-21 20:39           ` Marcel Holtmann
2023-12-22  0:03             ` Neal Gompa
2023-12-22  6:16               ` Marcel Holtmann
2023-12-24  9:03               ` Arend van Spriel
     [not found]         ` <CAF4BwTXNtu30DAgBXo4auDaDK0iWc9Ch8f=EH+facQ-_F-oMUQ@mail.gmail.com>
2023-12-19 14:42           ` Kalle Valo
2023-12-20  0:06             ` Hector Martin
2023-12-20  1:44               ` Linus Torvalds
2023-12-20  4:16                 ` Hector Martin
2023-12-20 11:05                   ` Bagas Sanjaya
2023-12-20 10:20                 ` Kalle Valo
2023-12-20 15:55                   ` Kalle Valo
2023-12-20 16:42                     ` Eric Curtin
2023-12-20 18:14                   ` Hector Martin
2023-12-20 19:36                     ` Arend van Spriel [this message]
2023-12-21  0:49                       ` Hector Martin
2023-12-21  9:57                         ` Arend van Spriel
2023-12-22  5:10                           ` Hector Martin
2023-12-22 12:25                             ` Eric Curtin
2024-01-07  9:51                             ` Arend van Spriel
2023-12-20 11:32                 ` Eric Curtin
2023-12-20 10:16 ` Paul Fertser
2023-12-20 18:02   ` Hector Martin
2023-12-23 10:28     ` Testing bits/080-wifi on BCM4345/6 (was: Re: [PATCH] wifi: brcmfmac: cfg80211: Use WSEC to set SAE password) Paul Fertser
     [not found]       ` <CAF4BwTXJWYGT+8jp9dzxmSN7wbk7xZuy4tNSQDhxJ66UzhhgWw@mail.gmail.com>
2023-12-23 15:28         ` Paul Fertser
     [not found]           ` <CAF4BwTXm62PxBTM2bNX2MkTF4XUypNJAMpxMFaQ3LP5MHrfBZA@mail.gmail.com>
2023-12-24 19:29             ` Testing bits/080-wifi on BCM4345/6 Paul Fertser
     [not found]               ` <CAF4BwTWpVRZJxQnsqKgvNxvruAnN7C=zH23bSvvJOikg5YiMsg@mail.gmail.com>
2023-12-25  2:24                 ` Daniel Berlin
2024-01-27 14:40       ` SAE AP on BCM4345/6 (was: Re: Testing bits/080-wifi on BCM4345/6) Paul Fertser

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=bdb078c0-2f45-485a-86a0-bb7d0b5e3516@broadcom.com \
    --to=arend.vanspriel@broadcom.com \
    --cc=SHA-cyfmac-dev-list@infineon.com \
    --cc=airlied@redhat.com \
    --cc=asahi@lists.linux.dev \
    --cc=aspriel@gmail.com \
    --cc=brcm80211-dev-list.pdl@broadcom.com \
    --cc=daniel@ffwll.ch \
    --cc=dberlin@dberlin.org \
    --cc=franky.lin@broadcom.com \
    --cc=hante.meuleman@broadcom.com \
    --cc=kvalo@kernel.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=linux-wireless@vger.kernel.org \
    --cc=marcan@marcan.st \
    --cc=torvalds@linux-foundation.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox