Received: by 2002:a25:ca44:0:0:0:0:0 with SMTP id a65csp1977313ybg; Thu, 30 Jul 2020 07:28:49 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxzipjhDQsyl7Ac9MKZELgjDHRrNABKCu8WTpaMhSwbB0mhNNJgTDpbhVHI/qTVLutlhW50 X-Received: by 2002:a17:906:32ce:: with SMTP id k14mr2987419ejk.412.1596119328995; Thu, 30 Jul 2020 07:28:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1596119328; cv=none; d=google.com; s=arc-20160816; b=uq30Qchp7g561xqc3MTg2qS5CANTlKYWRkuJ8Gs4xACbz6+4zuuKyhkQo0Fu1Ie8Se 4p/c4DCUdu2We22RWFQGyCFJDR1Vm/k7OaBeIqcRi0YLp8efar8ArPQLHaqsaXGSnxBn hBKSJLmSNXhixoaezswqybxT2hVc3p5LO/iwRkzRvYviVObLjTyZWGcw/OVzijNqRTtA TlUTGMQleXmi3VV2KNc2kUna5aDXvJYelZAr11N3TOKNsOdd4CnLB3HvYz4OI5mE7EGo PkHVIDeMvnvLjpd2y04DVCUG4VPIW7aDMH+/V996hH3bfKYUeV11KpHsrv3pZfrIxq7x M0Vg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:date:cc:to:from:subject :message-id; bh=r57HycD6ANQcj/9q8//CWs3dxQtxb4GnF96HjaVTDkE=; b=MF1KyJ/8FRpNuPXnX0m7UNIJ+Y961fPMGB3YzD5Rg40l2aDKxn7v73aLyu6IPXEpjl i7r3JRqSeAdY4AFgAdfkCkNx9SKbfHnYVFHt8fszFAdPI69TkookG2ThVdfGmDJHnpQv JyA1UCwttnNSuBBX3AtznRcRstg8rycNfcUyvPp+wcVXVzCeonZbReP1qcxCzdTAJflU AweXhQEEzh2Ehoj/2Va/+cdbN+N1h5aeFc9Rx2y74NDyX656mMqn79t9SETmb4LFBAOZ hHfr22gkWsONlDvJJmkTdV9FecTShDvp1TdKZPbNa1v7iOuHz1yvB3qf2SGdf/CaXv6Z lNdA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id l22si3185872ejg.450.2020.07.30.07.28.25; Thu, 30 Jul 2020 07:28:48 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726794AbgG3O2R (ORCPT + 99 others); Thu, 30 Jul 2020 10:28:17 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55074 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726275AbgG3O2R (ORCPT ); Thu, 30 Jul 2020 10:28:17 -0400 Received: from sipsolutions.net (s3.sipsolutions.net [IPv6:2a01:4f8:191:4433::2]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id DB49AC061574 for ; Thu, 30 Jul 2020 07:28:16 -0700 (PDT) Received: by sipsolutions.net with esmtpsa (TLS1.3:ECDHE_SECP256R1__RSA_PSS_RSAE_SHA256__AES_256_GCM:256) (Exim 4.93) (envelope-from ) id 1k19XZ-00DZv8-7x; Thu, 30 Jul 2020 16:28:13 +0200 Message-ID: <903ec27f7423574f644312c701ed45fdafdb7ca6.camel@sipsolutions.net> Subject: Re: [PATCH] mac80211: Send deauth to STA's upon AP stop From: Johannes Berg To: Shay Bar , Ben Greear Cc: "linux-wireless@vger.kernel.org" Date: Thu, 30 Jul 2020 16:28:12 +0200 In-Reply-To: References: <20200618093609.16514-1-shay.bar@celeno.com> <2a7b33ace030fdeda96e60b2abd6c70a11f426e0.camel@sipsolutions.net> <54236bdd708c53ec2f2a776bb3badcd77c7fecc6.camel@sipsolutions.net> <6da8757ac90a4d34ed1bdc7c84b40aac06c01af9.camel@sipsolutions.net> <2a607392179a76f0f6fc3cef2e6e141f25dc0254.camel@sipsolutions.net> <90ea9478-a42e-be89-0ee1-9e05c2ef8cc9@celeno.com> <5bee074dbf19ab71e3cdc90769dbec0c8ada5274.camel@sipsolutions.net> Content-Type: text/plain; charset="UTF-8" User-Agent: Evolution 3.36.4 (3.36.4-1.fc32) MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-wireless-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org On Thu, 2020-07-30 at 14:23 +0000, Shay Bar wrote: > On 30/07/2020 17:00, Johannes Berg wrote: > > External Email > > > > > > On Thu, 2020-06-25 at 13:29 +0300, Shay Bar wrote: > > > On 25/06/2020 12:51, Johannes Berg wrote: > > > > External Email > > > > > > > > > > > > On Sun, 2020-06-21 at 10:12 +0000, Shay Bar wrote: > > > > > Hi Johannes and Ben, > > > > > > > > > > To conclude this thread, hostapd doesn’t send any deauth/disassoc > > > > > upon AP stop (when hostapd is killed _or_ when "ifconfig down" the > > > > > AP interface). > > > > Right. I'm sort of suggesting you just shouldn't be doing this, and it > > > > doesn't seem like most people actually do, otherwise we'd have seen this > > > > issue before? > > > > > > > I shouldn't kill hostapd? Isn't this a very basic action? > > > What is the alternative for stopping the AP? > > I guess I would say to use hostapd_cli first to "disable" the > > interfaces? > > Indeed, using hostapd_cli "DISABLE" will call > hostapd_flush_old_stations() that will send broadcast deauth. Ah. > The problem is (mentioned before) that some stations (e.g. Samsung S8) > ignore this broadcast (while it will not ignore unicast > deauth/disassoc). Right, you mentioned that. I guess you could work around by disabling all stations separately, but ... not really a great solution either. Perhaps we should fix that at the hostapd level? Not really sure how much trouble we should go to for bad stations though. I mean, it's not like they should be ignoring that. Maybe they just miss it due to super aggressive powersave, and we should send it a few times? johannes