Received: by 2002:a25:d7c1:0:0:0:0:0 with SMTP id o184csp4173741ybg; Tue, 29 Oct 2019 03:18:14 -0700 (PDT) X-Google-Smtp-Source: APXvYqwOuS3d/jbfGRUWKU8SZhOJ+AXriyjGvzSZ1lDdnWsvZkStlkydWqxGa7QjE13cLcP3UOud X-Received: by 2002:aa7:d805:: with SMTP id v5mr24970485edq.297.1572344294007; Tue, 29 Oct 2019 03:18:14 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1572344293; cv=none; d=google.com; s=arc-20160816; b=D864EEFmYxxadhjOq19dp++mhVCM6LAsfiUpSFKyyNcy/v3nlm2MkXFgWjRYhW44WQ 9QZ26nPtuh570mjftMN3vSRJBIBeC2UK8UAlrF5S9yvxxdaN7wQYAc1RZeRZ0huBkrW8 UszDWmKJF/mQC/C5bJejxkhxKPsF3XTieCYOuc14aF4SEogqrDDAGY59LId8vcISQV4w wCKGycsNmKnR3iwtcZ/Fk5LY6BOHAMRGmouFpxWJq81fuJ8S/r5C36ZGMOGG9YaQoUEb MDRYwNgT75nzALCKixvt3hQ979sL/tH03+dJ8useuv3XKv05a44slw/29CxQM/CvuJui ZJAQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:date:cc:to:from:subject :message-id; bh=NFF2BkfE11YqpvUN9baHfNi/nbmKaIfPu10hSBF4iz0=; b=d2to9grPLw0TOLtpxjanHyYaZFKhk7wvtChrNjmeBkHrTzpz8lS3wNFREKvhjnxjMY aUFtnhBKJRB5vBYpj/cQ08nrEh0rWQLldIBHxO2z88DKHeg8BIC1Kqyj5zIQi9sbXL11 vjuzu+fG8GpbuHRdiJ5T0nRWqG8cm8MKBMKQ9XTPmLAmheisoq2ojzm0hl8VK2puLWCg rbRzkMN960tHp3yYqlpx6KFousO3aGwp2hSs1nLQjmC3QEK6lgbl80ApbOvrXUD89kOr Bmk7Hd+e8Rb/THjHRRD90nZ6W4Hc8fk6aAJ9En2RjjLWcxP+pzLeMOtr6NMS3DOxnoO1 BLHg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-wireless-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j12si7571179ejv.275.2019.10.29.03.17.48; Tue, 29 Oct 2019 03:18:13 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-wireless-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-wireless-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730075AbfJ2JHk (ORCPT + 99 others); Tue, 29 Oct 2019 05:07:40 -0400 Received: from s3.sipsolutions.net ([144.76.43.62]:60514 "EHLO sipsolutions.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727082AbfJ2JHk (ORCPT ); Tue, 29 Oct 2019 05:07:40 -0400 Received: by sipsolutions.net with esmtpsa (TLS1.3:ECDHE_SECP256R1__RSA_PSS_RSAE_SHA256__AES_256_GCM:256) (Exim 4.92.2) (envelope-from ) id 1iPNTP-0004OR-Op; Tue, 29 Oct 2019 10:07:31 +0100 Message-ID: <4725dcbd6297c74bf949671e7ad48eeeb0ceb0d0.camel@sipsolutions.net> Subject: Re: [PATCH v2] 802.11n IBSS: wlan0 stops receiving packets due to aggregation after sender reboot From: Johannes Berg To: Krzysztof =?UTF-8?Q?Ha=C5=82asa?= Cc: "David S. Miller" , linux-wireless@vger.kernel.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org Date: Tue, 29 Oct 2019 10:07:30 +0100 In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" User-Agent: Evolution 3.30.5 (3.30.5-1.fc29) MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-wireless-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org On Tue, 2019-10-29 at 09:54 +0100, Krzysztof HaƂasa wrote: > The problem I can see is that the dialog_tokens are 8-bit, way too small > to eliminate conflicts. Well, they're also per station, we could just randomize the start and then we'd delete the old session and start a new one, on the receiver. So that would improve robustness somewhat (down to a 1/256 chance to hit this problem). > > Really what I think probably happened is that one of your stations lost > > the connection to the other, and didn't tell it about it in any way - so > > the other kept all the status alive. > > You must have missed my previous mail - I simply rebooted that station, > and alternatively rmmoded/modprobed ath9k. But the problem originated in > a station going out of and back in range, in fact. I was on vacation, so yeah, quite possible I missed it. Sounds like we need not just 4b08d1b6a994 ("mac80211: IBSS: send deauth when expiring inactive STAs") but also send a deauth when we disconnect. Surprising we don't do that, actually. > > I suspect to make all this work well we need to not only have the fixes > > I made recently to actually send and parse deauth frames, but also to > > even send an auth and reset the state when we receive that, so if we > > move out of range and even the deauth frame is lost, we can still reset > > properly. > > That's one thing. The other is a station trying ADDBA for the first time > after boot (while the local station has seen it before that reboot). That's the situation though - the local station needs to know that it has in fact *not* seen the same instance of the station, but that the station has reset and needs to be removed & re-added. > I guess we need to identify "new connection" reliably. Otherwise, > the new connections are treated as old ones and it doesn't work. Right. But we can implement the (optional) authentication (which you actually already get when you implement [encrypted] IBSS with wpa_s), and reset the station state when we get an authentication frame. johannes