Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp2286316pxb; Fri, 5 Feb 2021 13:54:25 -0800 (PST) X-Google-Smtp-Source: ABdhPJwIqqSzrkRoU6vFgk6otfELoQ7wk0/u7InYz7HgcZ0VP0XJDVBrT7mna56znPqUeuVKos4D X-Received: by 2002:a17:906:ca04:: with SMTP id jt4mr6059557ejb.548.1612562064869; Fri, 05 Feb 2021 13:54:24 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1612562064; cv=none; d=google.com; s=arc-20160816; b=G77mXBYNTJ784lFL+7VO5weTxwrQQV4uuxuz9n8UDGzJUZFnobtU4v6riSWUAKMBEl zCUSxHBmSaYIWvxNQFD4Kwtsl79yLYc7TNhPwnzxKmEmvpa8IhzXx1Kj1HqsDFpB+YBr qQT4K/uvO7na42PQRoJkk2m+rvibNGNsb3PiTS8gjFx1bLBh0J4eSRc73CAeKvQidZdA NckxxC3sIpHDUmOwf3/85MSEXYG6j1ygfrogV3zz9TDbKz950IQ+1XJ4R7ffFFWAh1AL EvZ+guiaWc4cYnAAVv5lx/VRKygXNkTb7Y6+ev0IAwOefVNR/WnZoia0un/ojInIb5em z9lA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:cc:to:subject :message-id:date:from:in-reply-to:references:mime-version :dkim-signature; bh=hbrb/uI0k3ZNQuj2wdQIApcZWfCHPVlwvdeH8dEraSY=; b=Us0GDv+nIuaRpbyUq8e1nIeBryQVb49+0yppcCf8CPraobp+yMBZRp5CJWOhj+xJP3 XE2MD1SH/TYXMigbJx/uoFPWv6O16o14Tqs0Vzq0wZHYfiPW6GsegWSQngyufi2O7D/q /0TZ63VeH9Ztrc8wgj8yyMy9SvktmCiLliqPzbi8Gg6J/YC4999JXSpFxDR/CftHqX+E yDI/73v3I0Cr4xLmGOHdkEk3bnyzWfLImUGe6aPKBoG5vhs0x9AGfPRr/7B+BEpr+TON 69o42t1AlGWvFMAtF23jHtVjo37TI2NsYa3c+SXZV1Val8Epye3T2qBngiOvbvjrrljl ShsA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=kwrr3ILL; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id y26si1362833ejb.235.2021.02.05.13.53.58; Fri, 05 Feb 2021 13:54:24 -0800 (PST) Received-SPF: pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=kwrr3ILL; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232825AbhBEVwx (ORCPT + 99 others); Fri, 5 Feb 2021 16:52:53 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:60982 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232008AbhBEVwl (ORCPT ); Fri, 5 Feb 2021 16:52:41 -0500 Received: from mail-io1-xd2a.google.com (mail-io1-xd2a.google.com [IPv6:2607:f8b0:4864:20::d2a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 815B9C0613D6 for ; Fri, 5 Feb 2021 13:52:01 -0800 (PST) Received: by mail-io1-xd2a.google.com with SMTP id f6so8736668ioz.5 for ; Fri, 05 Feb 2021 13:52:01 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=hbrb/uI0k3ZNQuj2wdQIApcZWfCHPVlwvdeH8dEraSY=; b=kwrr3ILLVbxuNn95GOVOzUFj/I8VbmFN7DHQIjWHdZ4hzEzqzgLDBrHY6JAB6GK4rj e9NBMfC+5XT+VMc3rHcgzSGPUBjZpe9BfKeQtVfxnQx7JCw3LkFBRSVq3WlAAEaSLcyd S/vGxA2CQGbb9/zj3fT0EvapZyFTHavASX7aM= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=hbrb/uI0k3ZNQuj2wdQIApcZWfCHPVlwvdeH8dEraSY=; b=rMz1t9TqvGkTn/nQLCc/Rhek1o+j3SkNOOFWJ0a/y9ImWygBBtwvlGFs0s7391UvjU kW8d4ldMnshxjNlUipXYaFUg8mPli9lwwm1FhY+JwmVq1ZLA/8fj+qqCNaSeL4JGyCaA h2iEUMKolZzZBouuzuEYxSMtuaeaLew90/xH6F0r3w6u1AMURJbpRuLJVb1N4oXh8zn2 d1Lq3BnCJz+Umm+xhQksJMwDFcMkeA59cCCFiW/+jkWQ9QV+TzxngZg7btWw8KGbAuLK Ygu213NzNvW9BgjP+iQa+vxR44TW8TP+2UZlizxRvehrZ3l1wD1T8FRh72iDUuf6UIgf 6urQ== X-Gm-Message-State: AOAM530iMujWlGjvlbtQyahgxCoKXbeNlwdBGPULBXr8+++JYsuQeAjQ ge8ZRW6x/q2vDFincVxI1gcay8ESf0Dqrh7jGEFWQA== X-Received: by 2002:a6b:7e41:: with SMTP id k1mr5944734ioq.81.1612561920905; Fri, 05 Feb 2021 13:52:00 -0800 (PST) MIME-Version: 1.0 References: <20201215172352.5311-1-youghand@codeaurora.org> In-Reply-To: From: Abhishek Kumar Date: Fri, 5 Feb 2021 13:51:49 -0800 Message-ID: Subject: Re: [PATCH 2/3] mac80211: Add support to trigger sta disconnect on hardware restart To: Youghandhar Chintala Cc: Felix Fietkau , Johannes Berg , "David S. Miller" , Jakub Kicinski , linux-wireless , netdev , LKML , Douglas Anderson , Brian Norris , Rakesh Pillai Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org Since using DELBA frame to APs to re-establish BA session has a dependency on APs and also some APs may not honour the DELBA frame. I am fine with having the disconnect/reconnect solution. The change looks good to me. Reviewed-by: Abhishek Kumar Thanks Abhishek On Thu, Jan 28, 2021 at 12:08 AM wrote: > > On 2020-12-15 23:10, Felix Fietkau wrote: > > On 2020-12-15 18:23, Youghandhar Chintala wrote: > >> Currently in case of target hardware restart, we just reconfig and > >> re-enable the security keys and enable the network queues to start > >> data traffic back from where it was interrupted. > >> > >> Many ath10k wifi chipsets have sequence numbers for the data > >> packets assigned by firmware and the mac sequence number will > >> restart from zero after target hardware restart leading to mismatch > >> in the sequence number expected by the remote peer vs the sequence > >> number of the frame sent by the target firmware. > >> > >> This mismatch in sequence number will cause out-of-order packets > >> on the remote peer and all the frames sent by the device are dropped > >> until we reach the sequence number which was sent before we restarted > >> the target hardware > >> > >> In order to fix this, we trigger a sta disconnect, for the targets > >> which expose this corresponding wiphy flag, in case of target hw > >> restart. After this there will be a fresh connection and thereby > >> avoiding the dropping of frames by remote peer. > >> > >> The right fix would be to pull the entire data path into the host > >> which is not feasible or would need lots of complex changes and > >> will still be inefficient. > > How about simply tracking which tids have aggregation enabled and send > > DELBA frames for those after the restart? > > It would mean less disruption for affected stations and less ugly hacks > > in the stack for unreliable hardware. > > > > - Felix > > Hi Felix, > > We did try to send an ADDBA frame to the AP once the SSR happened. The > AP ack=E2=80=99ed the frame and the new BA session with renewed sequence = number > was established. But still, the AP did not respond to the ping requests > with the new sequence number. It did not respond until one of the two > happened. > 1. The sequence number was more than the sequence number that DUT ha= d > used before SSR happened > 2. DUT disconnected and then reconnected. > The other option is to send a DELBA frame to the AP and make the AP also > force to establish the BA session from its side. This we feel can have > some interoperability issues as some of the AP=E2=80=99s may not honour t= he > DELBA frame and will continue to use the earlier BA session that it had > established. Given that re-negotiating the BA session is prone to IOT > issues, we feel that it would be good to go with the > Disconnect/Reconnect solution which is foolproof and will work in all > scenarios. > > Regards, > Youghandhar