Received: by 2002:a05:6a11:4021:0:0:0:0 with SMTP id ky33csp1284685pxb; Fri, 24 Sep 2021 00:37:58 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwW++jADqthy2MvTnhgjXKwmPuIIt4bmkGvF6yk4c0tAmLTqgh4wKlX/U0OUbG8ssJgq8Nm X-Received: by 2002:a17:906:7a09:: with SMTP id d9mr9791116ejo.116.1632469078387; Fri, 24 Sep 2021 00:37:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1632469078; cv=none; d=google.com; s=arc-20160816; b=iMzk1cFRN7b9eplRBAAcNjQ1tODRzpJqAs6sB3J0bMj5fovYs3szCZMuNtrfzGQ5QV e0I5RdayzvypgXa7Sq0KIkT8lmgpTxYZ+24oMWmTy2cEYCFl87JPnuBb0YVQqlz56chc JqMLKns7edXdZwN7kyLmJRSM8DEu4x/xO1Ed199qa2+s/sWOvv6BhsnqU2Cz9tmJkpAo FupH8+qW7mNcxMhXj+JInmV1TVXa8nylYTmCNtS8zBF99zuiTnJckGOmfwU0PtL4+jV2 CuM8bUQFqO9PUuNQKJIcXVZY6DlwSqP5VNLktJE8vJ1KZ/4b+mYfSLBGL6aet0j/I4FB fE5g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:message-id:references:in-reply-to :subject:cc:to:from:date:content-transfer-encoding:mime-version :sender:dkim-signature; bh=q3sgHaNoeo9y/c2zl8fCMwgMb5gjvNFL7fPrugk3DZA=; b=NEa6W+DlkZioFOuQUeftrZtb78GY9QL6wrKSId3BQYr0292HDEwyYHV2Gcv2vedbXZ C0iSZ/HnYxw/1M93Fd+YxNs6qz8XuNIXyNawrc9tIBu/GUCNJZkrmcTcqXSTT5DJh/fB aCJucx2OMQ5Av3N1kyM+6718qSkhTu6J12IUKb9fO571eIj1lzw8cwHXKAQdf2HZdgC7 T/j+hAmxa4mQNkiaJafCFOwNNtz//CYClFGWLWApKHZYt5YcuU6WWIk/Fn1LV+4Gy5ue vzyfS4D9x1wwa+w7RWhIY6QNscdD+EmJ1iZdO71Y7Y52AUqA8GNdhqoQM5kgL6xavXOY 7jmQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@mg.codeaurora.org header.s=smtp header.b=MMNC00l7; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id w10si5633152ejv.782.2021.09.24.00.37.38; Fri, 24 Sep 2021 00:37:58 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@mg.codeaurora.org header.s=smtp header.b=MMNC00l7; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S244405AbhIXHin (ORCPT + 78 others); Fri, 24 Sep 2021 03:38:43 -0400 Received: from m43-7.mailgun.net ([69.72.43.7]:63472 "EHLO m43-7.mailgun.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S244394AbhIXHim (ORCPT ); Fri, 24 Sep 2021 03:38:42 -0400 DKIM-Signature: a=rsa-sha256; v=1; c=relaxed/relaxed; d=mg.codeaurora.org; q=dns/txt; s=smtp; t=1632469029; h=Message-ID: References: In-Reply-To: Subject: Cc: To: From: Date: Content-Transfer-Encoding: Content-Type: MIME-Version: Sender; bh=q3sgHaNoeo9y/c2zl8fCMwgMb5gjvNFL7fPrugk3DZA=; b=MMNC00l7rXKB1KOCKdV1SevpNk9X5IyvbeQCp4UHoBO73b6LvypwFOiIIff2QYJrS6PzXKgD 2xH8B2NbIjfnnQ6iZvKdWQ32HlSdRItpR8E3UgYfovrGyR7UAdLQhyCskbs81MMAj0UZwdEC W6yp0kHtKZI61GEG7CGfm4ZVoGA= X-Mailgun-Sending-Ip: 69.72.43.7 X-Mailgun-Sid: WyI3YTAwOSIsICJsaW51eC13aXJlbGVzc0B2Z2VyLmtlcm5lbC5vcmciLCAiYmU5ZTRhIl0= Received: from smtp.codeaurora.org (ec2-35-166-182-171.us-west-2.compute.amazonaws.com [35.166.182.171]) by smtp-out-n06.prod.us-east-1.postgun.com with SMTP id 614d801eec62f57c9a55994f (version=TLS1.2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256); Fri, 24 Sep 2021 07:37:02 GMT Sender: youghand=codeaurora.org@mg.codeaurora.org Received: by smtp.codeaurora.org (Postfix, from userid 1001) id 76A82C43616; Fri, 24 Sep 2021 07:37:01 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-caf-mail-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.9 required=2.0 tests=ALL_TRUSTED,BAYES_00 autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.codeaurora.org (localhost.localdomain [127.0.0.1]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) (Authenticated sender: youghand) by smtp.codeaurora.org (Postfix) with ESMTPSA id 4A507C4338F; Fri, 24 Sep 2021 07:37:00 +0000 (UTC) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit Date: Fri, 24 Sep 2021 13:07:00 +0530 From: Youghandhar Chintala To: Johannes Berg Cc: Abhishek Kumar , Felix Fietkau , "David S. Miller" , Jakub Kicinski , linux-wireless , netdev , LKML , Douglas Anderson , Brian Norris , Rakesh Pillai , Manikanta Pubbisetty Subject: Re: [PATCH 2/3] mac80211: Add support to trigger sta disconnect on hardware restart In-Reply-To: References: <20201215172352.5311-1-youghand@codeaurora.org> (sfid-20210205_225202_513086_43C9BBC9) Message-ID: <66ba0f836dba111b8c7692f78da3f079@codeaurora.org> X-Sender: youghand@codeaurora.org User-Agent: Roundcube Webmail/1.3.9 Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org Hi Johannes and felix, We have tested with DELBA experiment during post SSR, DUT packet seq number and tx pn is resetting to 0 as expected but AP(Netgear R8000) is not honoring the tx pn from DUT. Whereas when we tested with DELBA experiment by making Linux android device as SAP and DUT as STA with which we don’t see any issue. Ping got resumed post SSR without disconnect. Please find below logs collected during my test for reference. 192.168.0.15(AtherosC_12:af:af) ===> DUT IP and MAC 192.168.0.55(Netgear_d2:93:3d) ===> AP IP and MAC No. Time Source Destination Protocol Channel Sequence number Protected flag Block Ack Starting Sequence Control (SSC) CCMP Ext. Initialization Vector Action code TID Info 474 22.186433 192.168.0.15 192.168.0.55 ICMP 44 37 Data is protected 0x000000000026 0 Echo (ping) request id=0x0d00, seq=256/1, ttl=64 (reply in 480) No. Time Source Destination Protocol Channel Sequence number Protected flag Block Ack Starting Sequence Control (SSC) CCMP Ext. Initialization Vector Action code TID Info 480 22.188371 192.168.0.55 192.168.0.15 ICMP 44 5 Data is protected 0x000000000011 6 Echo (ping) reply id=0x0d00, seq=256/1, ttl=64 (request in 474) No. Time Source Destination Protocol Channel Sequence number Protected flag Block Ack Starting Sequence Control (SSC) CCMP Ext. Initialization Vector Action code TID Info 483 22.246335 192.168.0.15 192.168.0.55 ICMP 44 38 Data is protected 0x000000000027 0 Echo (ping) request id=0x1258, seq=11/2816, ttl=64 (reply in 489) No. Time Source Destination Protocol Channel Sequence number Protected flag Block Ack Starting Sequence Control (SSC) CCMP Ext. Initialization Vector Action code TID Info 489 22.248127 192.168.0.55 192.168.0.15 ICMP 44 13 Data is protected 0x000000000012 0 Echo (ping) reply id=0x1258, seq=11/2816, ttl=64 (request in 483) The above pings(with TID 0) are before SSR. As soon as DUT recovers after SSR, DUT is sending DELBAs to AP. No. Time Source Destination Protocol Channel Sequence number Protected flag Block Ack Starting Sequence Control (SSC) CCMP Ext. Initialization Vector Action code TID Info 546 26.129127 AtherosC_12:af:af Netgear_d2:93:3d 802.11 44 4 Data is not protected Delete Block Ack 0x0 Action, SN=4, FN=0, Flags=........C No. Time Source Destination Protocol Channel Sequence number Protected flag Block Ack Starting Sequence Control (SSC) CCMP Ext. Initialization Vector Action code TID Info 548 26.129977 AtherosC_12:af:af Netgear_d2:93:3d 802.11 44 5 Data is not protected Delete Block Ack 0x6 Action, SN=5, FN=0, Flags=........C After SSR, we started ping traffic with TID 7 and 0. ping is successful for TID 7 and failed for TID 0. For TID 0, ping requests tx PN is reset to 0 but it seems AP is not reset its PN hence we see this ping failure for TID 0. Whereas TID 7 ping success because we started it after SSR. No. Time Source Destination Protocol Channel Sequence number Protected flag Block Ack Starting Sequence Control (SSC) CCMP Ext. Initialization Vector Action code TID Info 557 26.355256 192.168.0.15 192.168.0.55 ICMP 44 0 Data is protected 0x000000000001 0 Echo (ping) request id=0x1258, seq=15/3840, ttl=64 (no response found!) No. Time Source Destination Protocol Channel Sequence number Protected flag Block Ack Starting Sequence Control (SSC) CCMP Ext. Initialization Vector Action code TID Info 571 27.376895 192.168.0.15 192.168.0.55 ICMP 44 1 Data is protected 0x000000000002 0 Echo (ping) request id=0x1258, seq=16/4096, ttl=64 (no response found!) No. Time Source Destination Protocol Channel Sequence number Protected flag Block Ack Starting Sequence Control (SSC) CCMP Ext. Initialization Vector Action code TID Info 588 28.400946 192.168.0.15 192.168.0.55 ICMP 44 2 Data is protected 0x000000000003 0 Echo (ping) request id=0x1258, seq=17/4352, ttl=64 (no response found!) No. Time Source Destination Protocol Channel Sequence number Protected flag Block Ack Starting Sequence Control (SSC) CCMP Ext. Initialization Vector Action code TID Info 600 29.424881 192.168.0.15 192.168.0.55 ICMP 44 3 Data is protected 0x000000000004 0 Echo (ping) request id=0x1258, seq=18/4608, ttl=64 (no response found!) Below ping packets are with TID 7 No. Time Source Destination Protocol Channel Sequence number Protected flag Block Ack Starting Sequence Control (SSC) CCMP Ext. Initialization Vector Action code TID Info 622 30.898249 192.168.0.15 192.168.0.55 ICMP 44 0 Data is protected 0x000000000006 7 Echo (ping) request id=0x1276, seq=1/256, ttl=64 (reply in 626) No. Time Source Destination Protocol Channel Sequence number Protected flag Block Ack Starting Sequence Control (SSC) CCMP Ext. Initialization Vector Action code TID Info 626 30.900015 192.168.0.55 192.168.0.15 ICMP 44 0 Data is protected 0x000000000013 7 Echo (ping) reply id=0x1276, seq=1/256, ttl=64 (request in 622) No. Time Source Destination Protocol Channel Sequence number Protected flag Block Ack Starting Sequence Control (SSC) CCMP Ext. Initialization Vector Action code TID Info 644 31.897456 192.168.0.15 192.168.0.55 ICMP 44 1 Data is protected 0x000000000008 7 Echo (ping) request id=0x1276, seq=2/512, ttl=64 (reply in 648) No. Time Source Destination Protocol Channel Sequence number Protected flag Block Ack Starting Sequence Control (SSC) CCMP Ext. Initialization Vector Action code TID Info 648 31.899266 192.168.0.55 192.168.0.15 ICMP 44 1 Data is protected 0x000000000014 7 Echo (ping) reply id=0x1276, seq=2/512, ttl=64 (request in 644) Regards, Youghandhar On 2021-02-12 14:07, Johannes Berg wrote: > On Fri, 2021-02-05 at 13:51 -0800, Abhishek Kumar wrote: >> Since using DELBA frame to APs to re-establish BA session has a >> dependency on APs and also some APs may not honor the DELBA frame. > > > That's completely out of spec ... Can you say which AP this was? > > You could also try sending a BAR that updates the SN. > > johannes Regards, Youghandhar -- QUALCOMM INDIA, on behalf of Qualcomm Innovation Center, Inc. is a member of Code Aurora Forum, hosted by The Linux Foundation