Received: by 2002:a25:d7c1:0:0:0:0:0 with SMTP id o184csp4238591ybg; Tue, 29 Oct 2019 04:18:58 -0700 (PDT) X-Google-Smtp-Source: APXvYqyg3BdbYpQ1upfi6AIEGn0t897+HOHw8RLWNpPdlWTn3HxnADWPZYdYKTFxmv0/Bu1KvDnb X-Received: by 2002:a50:ac3c:: with SMTP id v57mr24433941edc.300.1572347938658; Tue, 29 Oct 2019 04:18:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1572347938; cv=none; d=google.com; s=arc-20160816; b=FqRhY2pkxBpRznI227lxkZPoL0+8GuBhAYdwLjXfmqzQSvFyXk8SlYkxA175M+ca8+ OVWcFG1WZuNB7SwYBzXolmgVJjqqWEBFeh1hyge5Md7Aic1R7ypGfSO0zW+/dYtsqe8b LDBsPgvK5Oj7wtYC4Q/WWuoDFw+alKOd04JAeTELCFq39TYRHOzAazsx6Qnaf8GWPAaw Y9wQPGov0HWyz+6+hvwgfijzmRQZQ/THxZw//zVDcjT1Jkfs/I52ZncCVodSHfCj9G6T MukN0LpeKWbVjstl2q9iDyb+oz9I1U62te2DVSBBLW8C6UfBhhRhS2s3x/u/82mjIFVi 1SNw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:in-reply-to:date:references:subject:cc:to:from :dkim-signature:dkim-filter; bh=k5T289OuUG6VXWcIiryuoMqmX23h/XJduJPMuCqgoOg=; b=yjblxSeqgmwQRILaH9Ft/LjTKAb0hHgxwK/Eag98YmCR4ggAny3AgopjJRMGiVfunR XrVlm9RT2A0G5CHk/qng4dXx/iAAKCQxTAaK5f1TM3S9yPqGqtH8onDMHUYcjIu8uLXQ WIzptlbzpYF7UP65xN3N2zOWhG9qChAatyaungynhC0fN4bw3q0B35731fifKFMqHcDB TsZ1edFZMJRDPC5p+Iv9hAl3XpVHXo+FhkFK4aG8LBOcgRluDL4Iglc4BD4VQKDnjfWh p+FQ3GrZzjBA12sE/pzp+NDUGGEiaWLmLIi+edMCa1s59V+XlOu7l1nqLAyXz9/9IGQj WxAg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@piap.pl header.s=mail header.b=KZ14oEaC; spf=pass (google.com: best guess record for domain of linux-wireless-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=piap.pl Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z16si8181236edd.314.2019.10.29.04.18.30; Tue, 29 Oct 2019 04:18:58 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-wireless-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@piap.pl header.s=mail header.b=KZ14oEaC; spf=pass (google.com: best guess record for domain of linux-wireless-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=piap.pl Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730952AbfJ2Kvn (ORCPT + 99 others); Tue, 29 Oct 2019 06:51:43 -0400 Received: from ni.piap.pl ([195.187.100.5]:47280 "EHLO ni.piap.pl" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726175AbfJ2Kvn (ORCPT ); Tue, 29 Oct 2019 06:51:43 -0400 Received: from t19.piap.pl (OSB1819.piap.pl [10.0.9.19]) (using TLSv1.2 with cipher AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ni.piap.pl (Postfix) with ESMTPSA id CA06E4435C4; Tue, 29 Oct 2019 11:51:40 +0100 (CET) DKIM-Filter: OpenDKIM Filter v2.11.0 ni.piap.pl CA06E4435C4 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=piap.pl; s=mail; t=1572346301; bh=k5T289OuUG6VXWcIiryuoMqmX23h/XJduJPMuCqgoOg=; h=From:To:Cc:Subject:References:Date:In-Reply-To:From; b=KZ14oEaCQzQoroOWAQHrUaDc1v7cetvPs+6k+L+Z5bv3NE0kS334kY5zO01YjYgvf L+nOcLqWocanrPNwzJp2x8D4mHfWLJ/8AdV/n0P3U1Y7XPk0x+kUucW2E0jIgN4A8C llNJLqB9f4pJF1nEgII9vfQMtQo4a4Yl98Op4rP8= From: khalasa@piap.pl (Krzysztof =?utf-8?Q?Ha=C5=82asa?=) To: Johannes Berg Cc: "David S. Miller" , linux-wireless@vger.kernel.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v2] 802.11n IBSS: wlan0 stops receiving packets due to aggregation after sender reboot References: <4725dcbd6297c74bf949671e7ad48eeeb0ceb0d0.camel@sipsolutions.net> Date: Tue, 29 Oct 2019 11:51:40 +0100 In-Reply-To: <4725dcbd6297c74bf949671e7ad48eeeb0ceb0d0.camel@sipsolutions.net> (Johannes Berg's message of "Tue, 29 Oct 2019 10:07:30 +0100") Message-ID: MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable X-KLMS-Rule-ID: 4 X-KLMS-Message-Action: skipped X-KLMS-AntiSpam-Status: not scanned, whitelist X-KLMS-AntiPhishing: not scanned, whitelist X-KLMS-AntiVirus: Kaspersky Security 8.0 for Linux Mail Server, version 8.0.1.721, not scanned, whitelist Sender: linux-wireless-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org Johannes Berg writes: >> The problem I can see is that the dialog_tokens are 8-bit, way too small >> to eliminate conflicts. > > Well, they're also per station, we could just randomize the start and > then we'd delete the old session and start a new one, on the receiver. > > So that would improve robustness somewhat (down to a 1/256 chance to hit > this problem). That was what I meant. Still, 1/256 seems hardly acceptable to me - unless there is some work around (a short timeout or something similar). Remember that when it doesn't work, it doesn't work - it won't recover until the sequence catches up, which may mean basically forever. Or, maybe the remote station can request de-aggregation first, so the subsequent aggregation request is always treated as new? Alternatively, perhaps the remote can signal that it's a new request and not merely an existing session? > That's the situation though - the local station needs to know that it > has in fact *not* seen the same instance of the station, but that the > station has reset and needs to be removed & re-added. Precisely. And it seems to me that the first time the local station learns of this is when a new, regular, non-aggregated packet arrives. Or, when a new aggregation request arrives. --=20 Krzysztof Halasa =C5=81UKASIEWICZ Research Network Industrial Research Institute for Automation and Measurements PIAP Al. Jerozolimskie 202, 02-486 Warsaw, Poland