Received: by 2002:a25:ca44:0:0:0:0:0 with SMTP id a65csp1952920ybg; Thu, 30 Jul 2020 07:01:05 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxXhX1iiK/SPE5W+xTcS7h7+Q6uu42e4Z+p9t66XQsc+jB3bgvYT5Jrtd2Gq0KOmR4Yngmy X-Received: by 2002:a05:6402:1755:: with SMTP id v21mr1658706edx.117.1596117664909; Thu, 30 Jul 2020 07:01:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1596117664; cv=none; d=google.com; s=arc-20160816; b=Bd8wAKYgN9EOGxDP4P5XM1z6MtXuCGAA3fsOvO4VkkWTBU9Ec1RNWiX6Q03PQKg9vk 6myMV+4NoQ63pM8+P9ajT0Gin6ueNSuMBCofqDGB+zb55DK2OVmDVyPfin8thGz3hVTg /aeaaVvp0aKuUxyhg67bncRFdqoGmVCaHJiSGQD1489k/vfMUmgdciaq/1lVrHXyP6eZ qMvvIHIS5WJMyXdjUFMlbqNI2cKxR2OoG8bYXpCqs930FaAYEDaSBsbvOPpqGQQsONOs pOGwlD3kO+LQTewQZ8OVHyhDlSWr2oVmYuBsnJ0qZArg6kWGO+Fg93XBcnCPgsPYunnV /HVA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:date:cc:to:from:subject :message-id; bh=zImuEnw8hWm8K6gwtxwU1pcvSrp472mebn2pT9DQYeM=; b=ChvxsPEVWdLwDwVXXlT8APSg5TTO9mZnV92WZ6M2KM/Dt4n6zpB7Dsq25kHm3ryGWv 9p2O49c+JaOzOnGFPPUCkvUq7YOWRsLYOhT0oe3pOQT/s1IfjjBE3Lp1OhMXod1gX4kg DOEE3VZQLKZYzQppRkRDQHFU3cB7bwOyITPc2duOyghNWt01YyGmp48xyTU7zuvLsJH6 MBxd70A2wOY2SSzQhL7OA2Sq+ptqD/ocvYgNXUGdlcnX6Q/JDSXVuj8lvwOgumIHRr31 Wnc+SJ9Zt7S8M8IoxezmteTRR2+dIgf3VROUl0sdCX6fQZ1M0r5bwvQqZaOFZl7wXImK 91TQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id qw24si3266333ejb.416.2020.07.30.07.00.40; Thu, 30 Jul 2020 07:01:04 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728293AbgG3OA1 (ORCPT + 99 others); Thu, 30 Jul 2020 10:00:27 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:50772 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726275AbgG3OA1 (ORCPT ); Thu, 30 Jul 2020 10:00:27 -0400 Received: from sipsolutions.net (s3.sipsolutions.net [IPv6:2a01:4f8:191:4433::2]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 33BDDC061574 for ; Thu, 30 Jul 2020 07:00:27 -0700 (PDT) Received: by sipsolutions.net with esmtpsa (TLS1.3:ECDHE_SECP256R1__RSA_PSS_RSAE_SHA256__AES_256_GCM:256) (Exim 4.93) (envelope-from ) id 1k196Y-00DZ2W-E2; Thu, 30 Jul 2020 16:00:18 +0200 Message-ID: <5bee074dbf19ab71e3cdc90769dbec0c8ada5274.camel@sipsolutions.net> Subject: Re: [PATCH] mac80211: Send deauth to STA's upon AP stop From: Johannes Berg To: Shay Bar , Ben Greear Cc: "linux-wireless@vger.kernel.org" Date: Thu, 30 Jul 2020 16:00:17 +0200 In-Reply-To: <90ea9478-a42e-be89-0ee1-9e05c2ef8cc9@celeno.com> References: <20200618093609.16514-1-shay.bar@celeno.com> <2a7b33ace030fdeda96e60b2abd6c70a11f426e0.camel@sipsolutions.net> <54236bdd708c53ec2f2a776bb3badcd77c7fecc6.camel@sipsolutions.net> <6da8757ac90a4d34ed1bdc7c84b40aac06c01af9.camel@sipsolutions.net> <2a607392179a76f0f6fc3cef2e6e141f25dc0254.camel@sipsolutions.net> <90ea9478-a42e-be89-0ee1-9e05c2ef8cc9@celeno.com> Content-Type: text/plain; charset="UTF-8" User-Agent: Evolution 3.36.4 (3.36.4-1.fc32) MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-wireless-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org On Thu, 2020-06-25 at 13:29 +0300, Shay Bar wrote: > On 25/06/2020 12:51, Johannes Berg wrote: > > External Email > > > > > > On Sun, 2020-06-21 at 10:12 +0000, Shay Bar wrote: > > > Hi Johannes and Ben, > > > > > > To conclude this thread, hostapd doesn’t send any deauth/disassoc > > > upon AP stop (when hostapd is killed _or_ when "ifconfig down" the > > > AP interface). > > > > Right. I'm sort of suggesting you just shouldn't be doing this, and it > > doesn't seem like most people actually do, otherwise we'd have seen this > > issue before? > > > I shouldn't kill hostapd? Isn't this a very basic action? > What is the alternative for stopping the AP? I guess I would say to use hostapd_cli first to "disable" the interfaces? johannes