Received: by 2002:a25:8b12:0:0:0:0:0 with SMTP id i18csp1143495ybl; Wed, 21 Aug 2019 10:46:42 -0700 (PDT) X-Google-Smtp-Source: APXvYqz2nbfzPMNnxOHJe9mEGXzSJk1zHtbcHbSzGSMFGYwiuuGfoUxsEHULj/NAk0yfyLx/RSyl X-Received: by 2002:a17:90a:3847:: with SMTP id l7mr1081275pjf.99.1566409602638; Wed, 21 Aug 2019 10:46:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1566409602; cv=none; d=google.com; s=arc-20160816; b=AeXGq52di+01j9Sf5Z4dc9MS1D3ggu+ctVzou/tbtpE2fmgqT/g8BzYhroff4YNijO N3GFpFGswcVPh+C/zMOtJWxB3gCISq6AxspvLefT8ntpbyNdmn7Rk8KJclC0Zc3VjHVs GC8Q2Kp9sDGEw9lXkBk64kM8lmyW9bF1cP3tmfy/YuXo+gbagV85s5yoFmeV2mjVGVVM 1zsGpAAhOPZJ25bu0ndqpQ5JFztJK36JoFvT0+/ARsBCCIPeUD0FRJpODy1WW3+UIqP/ QDDHctv7npiDxxwBMREJ+OoaxZWPG67/EGE6tfwb9Yvp6CDDpxLxvRps2/OfPVfn1L1I /e9g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:to:references:message-id :content-transfer-encoding:cc:date:in-reply-to:from:subject :mime-version; bh=uyQM8KkOiiauEi0A1Bg4PTWVRDtqMVBDtJKitesVryA=; b=cM6jznAGSnUJSmUbDqt18YcHmoRxBSENlov5a59ZSGoBC+ylwAaRntBwTVw7JVIJoD WvjXYHMR+7ce3OEMGzdNQ+cZcJg0V0p2J8GhteLR5Z1mKu+JrX7CrRF8IRKUcYi1xk0M e3fcWQ4ZCtP9C2497YWo6ruQczsM0VQ3Ne95PQ6svO5RtXgQiq6Qb2Lq/JitTr4RMzuB QSYmLan6oT3mSx6eCdNRQPKyQ0UMrUruQ6GPCpyYCJcAOGZA4kHbPHVdCbl/RgFtRKVS Pq/qeHlMvMs9hnQmE8O2uOHF7uBtlX5iHsomTG4sq7f1RCufqV6k05Dqu1wj03G6fWJ2 f47Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-wireless-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i13si15077661pgf.335.2019.08.21.10.46.27; Wed, 21 Aug 2019 10:46:42 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-wireless-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-wireless-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729627AbfHUQ7d convert rfc822-to-8bit (ORCPT + 99 others); Wed, 21 Aug 2019 12:59:33 -0400 Received: from coyote.holtmann.net ([212.227.132.17]:43766 "EHLO mail.holtmann.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726252AbfHUQ7c (ORCPT ); Wed, 21 Aug 2019 12:59:32 -0400 Received: from marcel-macpro.fritz.box (p4FEFC580.dip0.t-ipconnect.de [79.239.197.128]) by mail.holtmann.org (Postfix) with ESMTPSA id BAD9CCECE5; Wed, 21 Aug 2019 19:08:14 +0200 (CEST) Content-Type: text/plain; charset=us-ascii Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\)) Subject: Re: Flag for detecting 802.11r Fast BSS Transition support From: Marcel Holtmann In-Reply-To: Date: Wed, 21 Aug 2019 18:59:29 +0200 Cc: Johannes Berg , Matthew Wang , linux-wireless , Kirtika Ruchandani , Jouni Malinen Content-Transfer-Encoding: 8BIT Message-Id: References: <20190403210200.GA93453@google.com> <211816ff03cf188d834a21b1fbc98b4f8c5b81f4.camel@sipsolutions.net> <7687225C-D965-479E-BAE8-769B0AEADD76@holtmann.org> <7CCE8D56-9E1A-4E04-9C28-E384C1B2E2EA@holtmann.org> To: Brian Norris X-Mailer: Apple Mail (2.3445.104.11) Sender: linux-wireless-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org Hi Brian, >> And if you have a distribution or an OEM that cares, then that is what is going to happen. > > I can see where you might not be particularly sympathetic to this > concern, but where I re-started this thread, I added in Jouni, due to > his mention of: > > "There are such drivers [supporting FT] especially in number of > Android devices and I'd > rather not break those use cases.." [1] > > That doesn't exactly sound like a case where he's willing to break > compatibility with older kernels in new wpa_supplicant. But maybe I > shouldn't put words in his mouth. (On the other hand, Android systems > are likely to not ever get either kernel *or* wpa_supplicant version > upgrades, so maybe it's not really a problem at all!) > > Anyway, I'll just cook a patch, and then figure out whether/how I can > teach wpa_supplicant to respect it. (Or, continue forking > wpa_supplicant as we have been wont to do...) it would be beneficial for iwd and not just wpa_supplicant. The try-and-error method is not really working for iwd since we are 100% event driven. It is important that we get told what is supported and what not before trying to connect or roam. Regards Marcel