Return-path: Received: from mail-gy0-f174.google.com ([209.85.160.174]:57654 "EHLO mail-gy0-f174.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754205Ab2BXPni convert rfc822-to-8bit (ORCPT ); Fri, 24 Feb 2012 10:43:38 -0500 Received: by ghrr11 with SMTP id r11so1173955ghr.19 for ; Fri, 24 Feb 2012 07:43:37 -0800 (PST) MIME-Version: 1.0 In-Reply-To: <1330097788.3426.29.camel@jlt3.sipsolutions.net> References: <20120224033729.9256A205A0@glenhelen.mtv.corp.google.com> <1330068877.3426.6.camel@jlt3.sipsolutions.net> <1330093741.3426.19.camel@jlt3.sipsolutions.net> <1330097788.3426.29.camel@jlt3.sipsolutions.net> Date: Fri, 24 Feb 2012 07:43:37 -0800 Message-ID: (sfid-20120224_164342_531883_A61A429B) Subject: Re: [RFC] mac80211: Filter duplicate IE ids From: Paul Stewart To: Johannes Berg Cc: linux-wireless@vger.kernel.org Content-Type: text/plain; charset=ISO-8859-1 Sender: linux-wireless-owner@vger.kernel.org List-ID: On Fri, Feb 24, 2012 at 7:36 AM, Johannes Berg wrote: > On Fri, 2012-02-24 at 07:25 -0800, Paul Stewart wrote: > >> >> > I suppose better to accept such service degradation than not connect, >> >> > but I wonder if we should log a warning when we actually try to use such >> >> > an AP? >> >> >> >> Let me know where you'd like it. >> > >> > How about having a flag in the BSS struct (ieee80211_bss) and printing a >> > message when we use that BSS struct for assoc? E.g. in >> > ieee80211_mgd_assoc()? I'm not sure I fully understand where this >> > actually has any effect. >> >> How do we clear this flag? ?Let's say we got one corrupted beacon and >> from then on, everything was ducky. ?We set the flag flag on the >> corrupted beacon. ?Do we clear it on an unblemished probe response? >> Are these really two flags, since beacons and probe responses >> sometimes have different subsets of info, or does a valid probe >> response clear both flags? > > Huh, good questions. Which info do we end up using? Just the one that > was not corrupted? I think we always use the last IEs, no? > > Hmm. You said in the bug that supported rates were really only affected, > and this caused an issue with the supported rates that we send, because > we restrict ourselves to the rates the AP advertises (due to other buggy > APs ...) > > Maybe then it doesn't matter all that much. > > OTOH, why should we ever reset the flag? If my over-the-air captures are any indication, with some probability you will receive a corrupted beacon from time to time -- perhaps not due to a broken AP, but just from it being corrupted over the air. FCS could catch that most times, but perhaps sometimes not. If you carry that flag along with you as long as the BSS exists (as long as the AP is in view) despite tens or hundreds of intact receptions afterwards, the importance of the error message diminishes. > Eventually the BSS entry will > be deleted anyway? And if we keep reconnecting to it, maybe there's some > other bug? > > I'm not really sure -- open to suggestions. I just think that in order > to actually notice such things in the future we should print something > so we don't get confused. Let me cook something up, see what you think. > > johannes >