Received: by 2002:a05:7412:d8a:b0:e2:908c:2ebd with SMTP id b10csp263356rdg; Thu, 12 Oct 2023 05:14:11 -0700 (PDT) X-Google-Smtp-Source: AGHT+IFWDTapk+U1BSYPx4TFTs5NSl1HUYxZ1VSu15dL7xS+6YS1Uf3EW0wpJvfiWbabmaeCjdbe X-Received: by 2002:a05:6870:13d6:b0:1e9:c28f:45b9 with SMTP id 22-20020a05687013d600b001e9c28f45b9mr855423oat.19.1697112850870; Thu, 12 Oct 2023 05:14:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1697112850; cv=none; d=google.com; s=arc-20160816; b=lPUjko9Vl8SaoOjjJ9xJSnrG14XzqVTDultQ2VnzLKR27AKTr+5mphJeW/zqaVlIdC nMHjrtn0bfCEz6JaKwrAAGdNB/a0KyPFYSSYDE6xUKAUHTwVcodHb62svoH8ZaM/Ejtc 72EaOI3UQJr037vRKXUvMVwni6xoBcBb52Nkwg6OmYdWFisJIuHpbvJewdUR9soBSWJL 6AX5NeEcbZbvq8/jqsI5WOJzQG56wAQ5/EXv246ehmq86T0OAwxw4pbMTl+7fduYfhGq 4Fa/e0DMZUTyPmEbrkrLJ8HlbaBq+e5Yl08VpfEtm1oOQgUQJKrF90hIxdQ4dGE+RWQ0 zX0g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:user-agent :content-transfer-encoding:references:in-reply-to:date:cc:to:from :subject:message-id:dkim-signature; bh=kM+sSAftxNLB9WT7j/0tw0qtBBVhoBQtkgtn/QAY3Pc=; fh=+WCxzDg5tHXzjX+gKMHLtJs4c7az9gyc7JweyCJJ2e4=; b=WTpnGc9Rt5f7KPc8HytORicwJ9kd8BGbePA4LMAfUC25YTAa962KzREikxtvpZpSyQ TwR5u4n657Qo3Spgl/LiQTF/ui+DFbgOg5A6I2VqV+VoV1PYmdWDTBddDfbGYeU/xJu/ cUC1cnbST04yGw/NsgulIV8k21xGysFj4CkEv/K9SpP9sW4HD5uRV/OulpRgP/2O8yts 1c8+ZxdVeQtyql1E+xo+B5vrF3FE1UQvmQz+o7G+cRPeYAkfogxfGQfzYBIStRioudGQ Mm/2eX+mnEJG1Fh0o5hz7YjEtL8mF95mdA8DyQ0Yw1k+coeEE1v2S5Dq3FROF0b0Fhef jkSg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@sipsolutions.net header.s=mail header.b=gYjcBwul; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::3:5 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=NONE sp=REJECT dis=NONE) header.from=sipsolutions.net Return-Path: Received: from groat.vger.email (groat.vger.email. [2620:137:e000::3:5]) by mx.google.com with ESMTPS id t185-20020a6381c2000000b005774a3b3efdsi2150342pgd.301.2023.10.12.05.14.10 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 12 Oct 2023 05:14:10 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::3:5 as permitted sender) client-ip=2620:137:e000::3:5; Authentication-Results: mx.google.com; dkim=pass header.i=@sipsolutions.net header.s=mail header.b=gYjcBwul; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::3:5 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=NONE sp=REJECT dis=NONE) header.from=sipsolutions.net Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by groat.vger.email (Postfix) with ESMTP id 05C06812A62F; Thu, 12 Oct 2023 05:14:08 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at groat.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1347237AbjJLMNt (ORCPT + 52 others); Thu, 12 Oct 2023 08:13:49 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48804 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1347211AbjJLMNs (ORCPT ); Thu, 12 Oct 2023 08:13:48 -0400 Received: from sipsolutions.net (s3.sipsolutions.net [IPv6:2a01:4f8:242:246e::2]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1F1ECC9 for ; Thu, 12 Oct 2023 05:13:47 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=sipsolutions.net; s=mail; h=MIME-Version:Content-Transfer-Encoding: Content-Type:References:In-Reply-To:Date:Cc:To:From:Subject:Message-ID:Sender :Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From:Resent-To: Resent-Cc:Resent-Message-ID; bh=kM+sSAftxNLB9WT7j/0tw0qtBBVhoBQtkgtn/QAY3Pc=; t=1697112827; x=1698322427; b=gYjcBwulNRLa1XrQ+uUHJ4raHeqmNSfbrL/elFek6ZeQz9l /tWi0ceVYHdTMfVKxM05BQx1bouKW3iTWtqDhO44tnMSCaH5PePJld4ZHyu4edDZo3kcs+klNzTzr jxxOg+c4kL6TjnDVj/UoH0JZhUwrDOu5n39OVqLlQwsw1ye4b72dy0S9PW74o+BF9rMKcSRlnc6+/ IgkQqbDq7f8c/m1MsIZ7ikDtc0a83asZ+uh4RzGs23h2jeq2moZUjA4HnrHBxa7JAJNQfof1pHERQ IoBR7u9GwDBodNygu0k6Fs907we6JzTroGTGbTs2eX3K0jagkp0iCzY5nfS1QvEQ==; Received: by sipsolutions.net with esmtpsa (TLS1.3:ECDHE_X25519__RSA_PSS_RSAE_SHA256__AES_256_GCM:256) (Exim 4.97-RC1) (envelope-from ) id 1qquZU-00000003Jim-1kjc; Thu, 12 Oct 2023 14:13:44 +0200 Message-ID: Subject: Re: [PATCH 2/3] cfg80211: validate RU puncturing bitmap From: Johannes Berg To: Aloka Dixit , linux-wireless@vger.kernel.org Cc: Jeff Johnson Date: Thu, 12 Oct 2023 14:13:43 +0200 In-Reply-To: <9fd4a3097e078c1fe2acd5fbd0c559b0390daa49.camel@sipsolutions.net> References: <20220214223051.3610-1-quic_alokad@quicinc.com> <20220214223051.3610-3-quic_alokad@quicinc.com> <6cf56be5-16d6-2bcd-150f-bf29f98b7f1b@quicinc.com> <58fdd62041c0388740cabea5a421c5417f959124.camel@sipsolutions.net> <9fd4a3097e078c1fe2acd5fbd0c559b0390daa49.camel@sipsolutions.net> Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable User-Agent: Evolution 3.48.4 (3.48.4-1.fc38) MIME-Version: 1.0 X-malware-bazaar: not-scanned X-Spam-Status: No, score=-0.8 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on groat.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (groat.vger.email [0.0.0.0]); Thu, 12 Oct 2023 05:14:08 -0700 (PDT) And another thing - separately because it's not related to puncturing, but in the same thread because it's related to the channel context handling... We also realized that a very similar thing might happen for the OFDMA trigger frame processing. Obviously I don't know if this is hardware or firmware in ath12k, but given the speed this happens at, at least in our device we can't really control it up-front. As a client, you might (for various reasons) connect to an AP with a lower bandwidth than the AP has configured. In this case, OFDMA UL/DL is still mostly mandatory (80 MHz STA in a 160/320 MHz BSS, 160 MHz STA in a 320 MHz BSS). As a result, if you end up being a STA with two EH connections (*), you have to be able to parse the trigger frame / downlink OFDMA RU allocation according to the *AP bandwidth* (**). (*) And expect OFDMA on them, so RU allocations are relative to the AP bandwidth; we're assuming for now that P2P will not use OFDMA. (**) See 36.3.2.7 80 MHz operating non-AP EHT STAs participating in wider bandwidth OFDMA and 36.3.2.8 for 160 MHz. As a result, I'm thinking of adding the OFDMA bandwidth to the chandef, and then treating two different ones as incompatible, though due to (*) we might want driver-local decision on whether OFDMA is possible or not, at least unless you agree that we should ignore it in P2P. For HE, OFDMA exists but you don't participate in wider-than-your-bandwidth OFMDA, so I guess we'd treat it as not relevant there. Then we might end up with a situation where we have two different say 80 MHz channel contexts in mac80211 because one is with a 320 MHz AP and the other with a 160 MHz AP, but that's necessary, I think. Thoughts? johannes