Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp17521983rwd; Tue, 27 Jun 2023 04:21:06 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ665ZMIigrXqMdB4iACQJqn/Z37BDgztWHQIZtdtNduv4nxSSYqrrKvn646ZWZrZdDP1c5t X-Received: by 2002:a05:6a20:1611:b0:126:43f7:e270 with SMTP id l17-20020a056a20161100b0012643f7e270mr12766723pzj.59.1687864866641; Tue, 27 Jun 2023 04:21:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1687864866; cv=none; d=google.com; s=arc-20160816; b=A7CQoZcqtcUTZqYGZFo5KOl8CKfw348kGvzsVhXVPylK0LYHSzTbzvgi79AcsOHEIn AetQgSCh67KCHbp4i0gggDl1PFXUo2qr0ouRINc7gvSMOmCtcTpf94nJg3oJMXxuGCiN qjXYntQ2lWUg8p3CWbYxRhsnJzu1NSLNGSdLsyDiYEjzStVfhrTzPgnV1FSSEKQpg+dJ hmCldksvPTK8Vz0E2FtuL7/Gx56ikKg7aa0dvrAmvZigFtEEJHuqqDxPU1uEOwDAP6Kx Sk5CRdpWH+4aUYUUpCE/iPH5snm5QYEUaJzu6reR0K7cBgDy7mJOmn2CWSLywjTdnDP6 mnOQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to :content-language:references:cc:to:from:subject:user-agent :mime-version:date:message-id:dkim-signature; bh=lxZNVrCQko/pPbslGW3XRv9jq/ybp0nX5Ov9qGTlKXo=; fh=0sqWHaNNlfsGkoTjsUfFKoaOlKXCXPsG/6TEmtmfYjs=; b=SjiAUJ9Oowha+Q5nfFWqIL6ayP/zol9VPVyLQENfwOd81Ohs+j4phByfuwxEb73dSV 3NVQu6V5WUwD3DoYDeC7TvQhIzWrbae6XZZEfdvZIOIVyAxCjAMDZtO9SWBK3AeEZcD5 cdzsa/JWULoqstEGsfDc5IXrCdM9tLwraMh1ruLaPUmwX61OwDcbN4rhWs32WfmKU/5q WjHgGBa02yLzcU8wy0GM6SVM0RA+MR6LM2xzsrs6MiA2pH75PzGda2ncvWO7cDuYAI3/ XB2xeBI5FAqhFxGrXJ8PeuntTpSZKrhdRLsrsPJoLKLZVw0s1eG8Wr3vKN0nqOdxSCSR jbeA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@quicinc.com header.s=qcppdkim1 header.b=l2hJIo0s; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=quicinc.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id x4-20020a1709029a4400b001b809828a8fsi3356668plv.366.2023.06.27.04.20.56; Tue, 27 Jun 2023 04:21:06 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@quicinc.com header.s=qcppdkim1 header.b=l2hJIo0s; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=quicinc.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230217AbjF0LCl (ORCPT + 58 others); Tue, 27 Jun 2023 07:02:41 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:59984 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229667AbjF0LCj (ORCPT ); Tue, 27 Jun 2023 07:02:39 -0400 Received: from mx0b-0031df01.pphosted.com (mx0b-0031df01.pphosted.com [205.220.180.131]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 8E6BB1BE8 for ; Tue, 27 Jun 2023 04:02:38 -0700 (PDT) Received: from pps.filterd (m0279870.ppops.net [127.0.0.1]) by mx0a-0031df01.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 35R7O7pL002471; Tue, 27 Jun 2023 11:02:24 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=quicinc.com; h=message-id : date : mime-version : subject : from : to : cc : references : in-reply-to : content-type : content-transfer-encoding; s=qcppdkim1; bh=lxZNVrCQko/pPbslGW3XRv9jq/ybp0nX5Ov9qGTlKXo=; b=l2hJIo0ssksDL4ORMapCdmOo8R6czbRmbKKxJiNfnf/ZZWZhj3BRqbTfSUPCZVx/mXaU QItisxy1A8Ml6aVD1XyKrRtz4cEKWMkPRMrjUNIJB1X4R0C+JmYSF0i8OxEum0Q/D8L2 v7SWS1tQmF46WfHCZgmeWgkP23imO5wmmwCbCgVOuWdtpiaS5fOOTSzs3h9IdTJBIlYM QYXbKdFHvn8POp1crXJrp69RcXlT8Se4Xsxa96ADn8jQaCx15lw8XX7SNh6byYJ0Me2f qLhZxs5sKiUEViVZWdpyFKmNqNTw1dwgbMj1aGmDuI3hdCB1xUHanjeKmB9F3HqbnNS9 uQ== Received: from nalasppmta03.qualcomm.com (Global_NAT1.qualcomm.com [129.46.96.20]) by mx0a-0031df01.pphosted.com (PPS) with ESMTPS id 3rfcvtt54s-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Tue, 27 Jun 2023 11:02:24 +0000 Received: from nalasex01a.na.qualcomm.com (nalasex01a.na.qualcomm.com [10.47.209.196]) by NALASPPMTA03.qualcomm.com (8.17.1.5/8.17.1.5) with ESMTPS id 35RB2NpQ026940 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Tue, 27 Jun 2023 11:02:23 GMT Received: from [10.231.195.204] (10.80.80.8) by nalasex01a.na.qualcomm.com (10.47.209.196) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.42; Tue, 27 Jun 2023 04:02:22 -0700 Message-ID: Date: Tue, 27 Jun 2023 19:02:19 +0800 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:102.0) Gecko/20100101 Thunderbird/102.12.0 Subject: Re: [PATCH 10/27] wifi: mac80211: isolate driver from inactive links From: Wen Gong To: Johannes Berg , CC: References: <20220902141259.377789-1-johannes@sipsolutions.net> <20220902161143.5ce3dad3be7c.I92e9f7a6c120cd4a3631baf486ad8b6aafcd796f@changeid> <5d82e564-86bf-c26b-077a-d0bc14e2d3c3@quicinc.com> <74f3eb848326607b15336c31a02bdd861ccafb47.camel@sipsolutions.net> <113761966918b2f390d3c9304307b42a0b4a829b.camel@sipsolutions.net> <76863dec-1b2f-b933-7c5e-21c732de4bc6@quicinc.com> <2cc79101249548f2a92c14af6aff6121143907d6.camel@sipsolutions.net> <1c26c205-0240-7670-117d-02a7af068724@quicinc.com> <6f8db032286923845202c7d658f1d39db79a758c.camel@sipsolutions.net> Content-Language: en-US In-Reply-To: Content-Type: text/plain; charset="UTF-8"; format=flowed Content-Transfer-Encoding: 8bit X-Originating-IP: [10.80.80.8] X-ClientProxiedBy: nasanex01a.na.qualcomm.com (10.52.223.231) To nalasex01a.na.qualcomm.com (10.47.209.196) X-QCInternal: smtphost X-Proofpoint-Virus-Version: vendor=nai engine=6200 definitions=5800 signatures=585085 X-Proofpoint-ORIG-GUID: nUqDT7WgT1mN-v9CdmXlBKsik5v8wf-d X-Proofpoint-GUID: nUqDT7WgT1mN-v9CdmXlBKsik5v8wf-d X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.254,Aquarius:18.0.957,Hydra:6.0.591,FMLib:17.11.176.26 definitions=2023-06-27_06,2023-06-27_01,2023-05-22_02 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 impostorscore=0 bulkscore=0 adultscore=0 suspectscore=0 spamscore=0 lowpriorityscore=0 clxscore=1011 malwarescore=0 priorityscore=1501 mlxscore=0 mlxlogscore=851 phishscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2305260000 definitions=main-2306270100 X-Spam-Status: No, score=-2.2 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,NICE_REPLY_A,SPF_HELO_NONE, SPF_PASS,T_SCC_BODY_TEXT_LINE,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org On 6/21/2023 3:55 PM, Wen Gong wrote: > On 6/15/2023 3:56 PM, Johannes Berg wrote: >> On Thu, 2023-06-15 at 10:26 +0800, Wen Gong wrote: >>> On 6/15/2023 2:32 AM, Johannes Berg wrote: >>>> On Wed, 2023-05-24 at 15:41 +0800, Wen Gong wrote: >>>>> May I add a new ops in struct ieee80211_ops? like this: >>>>> >>>>> u16 active_links(struct ieee80211_hw *hw, struct ieee80211_vif >>>>> vif, u16 >>>>> new_links)" >>>>> >>>>> then ieee80211_set_vif_links_bitmaps() call the ops to get the >>>>> links for >>>>> station and set the sdata->vif.active_links with the return value >>>>> from >>>>> lower driver, >>>>> it means lower driver will dynamic select the links count at this >>>>> moment. >>>>> >>>>> If lower driver not register ops active_links, then keep current >>>>> logic. >>>>> >>>> I guess you can can send patches for whatever you want :) >>>> >>>> But I have no idea what you're trying to do? Why would you need to >>>> have >>>> a callback? >>> Currently driver could use ieee80211_set_active_links_async() to active >>> links after connection completed. >> Right. >> >>> But I would like to allow driver to select active links in a early >>> time, >>> it will be more convenient for driver. >> How so? All you have to do is look for the connection becoming >> authorized (e.g. sta state for the AP moving to authorized) and then >> selecting the links you want. We've already been working on that, it's >> really easy? > It is more complex for ath12k drivers. >> >> On the flip-side, it would be highly inconvenient for mac80211 to try to >> enable more links *during* the association process, and actually it's >> not even allowed by spec until the 4-way-HS finishes. So the earliest >> possible time is pretty much when you can just do it in the driver as I >> just described. >> >>>> Was this for link selection in the driver? We should have a patch >>>> somewhere that adds a BSS_CHANGE flag for when the valid links change, >>>> so the driver can select others. >>>> >>>> johannes >>> Yes, it is for link selection in driver at a early time before >>> connection completed. >> This is not really allowed ... At least not without also finding ways to >> really transmit the 802.1X and 4-way-HS only on the right link, etc. > Yes, I also found this in section "2.7.6.1 General"  of IEEE P802.11be: > "For MLO, if RSNA has not been established, each message of the 4-way > handshake shall be sent on > the same link used by the latest exchange of successful > (Re)Association Request/Response frames." > > For ath12k drivers, only the primary link(the link used by the latest > exchange of successful (Re)Association > Request/Response frames) is active before key installed, so the 802.1X > and 4-way-HS will always sent on > the primary link, so it will meet the rule above of section "2.7.6.1 > General". > > It means: lower driver will ensure the rule when it implmented the > active_links callback such as ath12k. Johannes, do you have more comments for my answer above????? >>> Could you tell detail about how the BSS_CHANGE flag works????? >> The work isn't complete yet, but basically it just calls the callback >> whenever the valid_links changed, say by link-reconfiguration. >> >> johannes