Received: by 2002:a05:7412:d008:b0:f9:6acb:47ec with SMTP id bd8csp209593rdb; Tue, 19 Dec 2023 14:14:20 -0800 (PST) X-Google-Smtp-Source: AGHT+IEI1pZCE6YIePsW5QuZ2fsnW0XhwZd+vR7CZkM/JR91O3uYa443/Zc9+FKlt1qrAEak179z X-Received: by 2002:a17:903:98c:b0:1d3:e786:ab05 with SMTP id mb12-20020a170903098c00b001d3e786ab05mr1039243plb.39.1703024059637; Tue, 19 Dec 2023 14:14:19 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1703024059; cv=none; d=google.com; s=arc-20160816; b=F/mboXF7hNiw49P1W82oxJ+jHIcAGRew7A2HdgBLBGY5GzBCSw/pqTuVg92W6bXOjE /3GpLgDCmNfQhaBCirxsUEHBPYlUhTCIY9He0IgDsHCDlLm2VGjTbraJX+VBOIWxy0/c pfZ2xO149dNGw+DNuEUWRbNN397E0c0j2wU3TRcuiiI1UTH4eQ34vC9Wl/UbzenfOcx5 ejDIU7AhtInEeMl/tmoNuCEsSYwRsKByLtIxUgido0jklYaMhaORn/Wo1bHL3IqdlZI0 SvlZjkm0KXutau7wdunGmujX4ZfvJ7qR43GDk9TuO53uX+vM0xLq9fCxNS0fw/bJILJQ G1yA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=mime-version:list-unsubscribe:list-subscribe:list-id:precedence :user-agent:content-transfer-encoding:references:in-reply-to:date:cc :to:from:subject:message-id:dkim-signature; bh=KvqbJmEecayc4q9h0P5KQCSdNriwdR3kO53xk7xMmvM=; fh=HFk/Oya3M8oy7yb36zCI1m146U985IKpw3/Jtc4uAEY=; b=EqTkFkO1t8bcLR/UBE4eOOvIFqI5S9u5yegLBIy5ULiROjpcNBcufbaJHgCtGs1FOU YV+5urkeYr/I12aFkWlcr6tG0o/AGWEmuwNqdPCtyVmSxqhYfluvkOmMDtMvoPC7pOpr st/K1eYuCuIhYc3JBzeAt6cefzuqhbUl8p2ln7PLMtTzcMoiewMiNp/iAweXgIYdIeK1 5FqnjAM6E/xkp63iXNr0KKJpyCJVJPUyHkgRX8Njqo3JlNu/c3D5ldcvOxmYuQhRuqv7 ZK2zTMeKAhSyhVKNH//r0VgSLuhuIH/CUApGaOKK87DW7rx6FVxsAtlAYwDDnj4mdL3a uGjw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@sipsolutions.net header.s=mail header.b=XSP25rpi; spf=pass (google.com: domain of linux-wireless+bounces-1044-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-wireless+bounces-1044-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=REJECT dis=NONE) header.from=sipsolutions.net Return-Path: Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [139.178.88.99]) by mx.google.com with ESMTPS id a12-20020a170902b58c00b001d34aab195bsi11873997pls.40.2023.12.19.14.14.19 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 19 Dec 2023 14:14:19 -0800 (PST) Received-SPF: pass (google.com: domain of linux-wireless+bounces-1044-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) client-ip=139.178.88.99; Authentication-Results: mx.google.com; dkim=pass header.i=@sipsolutions.net header.s=mail header.b=XSP25rpi; spf=pass (google.com: domain of linux-wireless+bounces-1044-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-wireless+bounces-1044-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=REJECT dis=NONE) header.from=sipsolutions.net Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id ED9EB286C98 for ; Tue, 19 Dec 2023 22:14:09 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id ADA573D0BC; Tue, 19 Dec 2023 22:05:47 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=sipsolutions.net header.i=@sipsolutions.net header.b="XSP25rpi" X-Original-To: linux-wireless@vger.kernel.org Received: from sipsolutions.net (s3.sipsolutions.net [168.119.38.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id E09483D0B1 for ; Tue, 19 Dec 2023 22:05:44 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=sipsolutions.net Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=sipsolutions.net DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=sipsolutions.net; s=mail; h=MIME-Version:Content-Transfer-Encoding: Content-Type:References:In-Reply-To:Date:Cc:To:From:Subject:Message-ID:Sender :Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From:Resent-To: Resent-Cc:Resent-Message-ID; bh=KvqbJmEecayc4q9h0P5KQCSdNriwdR3kO53xk7xMmvM=; t=1703023544; x=1704233144; b=XSP25rpiJU1mD3RZY9ldwSmPJyXN30pfXZ1dZuPutFMDMf0 1CVq5n370TQvbZ9T7flNpYgZQTmxjXSuAD9udPlOQzN/0ZC3IOpOWRAdRsWdPyhZfvEcGPNNZc6/T ut/gVZRqUNsbWCfcM4+1kAqCWU6N7DsD3HcEbdL8JJZ5iBZer6PqgvFVDYp3M1VAeyugko9da1odd UCIw68joBNouWp8rFtDjuDoITwKwWQVm3Cq+C7GJGNIEa1I6q/302jQBKyDDGn83zhmpXiM9pcrSg 1WrrbE3ydhNZAyhzO/8mdDB+xJPeJYehfGK6BJjHKL/dRle+GXnAiu6/jAMEBdbw==; Received: by sipsolutions.net with esmtpsa (TLS1.3:ECDHE_X25519__RSA_PSS_RSAE_SHA256__AES_256_GCM:256) (Exim 4.97) (envelope-from ) id 1rFiDW-00000000Lyo-27wX; Tue, 19 Dec 2023 23:05:34 +0100 Message-ID: Subject: Re: [PATCH v2 01/13] wifi: cfg80211: reg: Support P2P operation on DFS channels From: Johannes Berg To: Jeff Johnson , Miri Korenblit Cc: linux-wireless@vger.kernel.org, Andrei Otcheretianski , Gregory Greenman Date: Tue, 19 Dec 2023 23:05:33 +0100 In-Reply-To: <45a96faa-013f-4c2c-95ba-191709324607@quicinc.com> References: <20231220133549.bdfb8a9c7c54.I973563562969a27fea8ec5685b96a3a47afe142f@changeid> <45a96faa-013f-4c2c-95ba-191709324607@quicinc.com> Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable User-Agent: Evolution 3.50.2 (3.50.2-1.fc39) Precedence: bulk X-Mailing-List: linux-wireless@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-malware-bazaar: not-scanned On Tue, 2023-12-19 at 14:03 -0800, Jeff Johnson wrote: > On 12/20/2023 3:41 AM, Miri Korenblit wrote: > > From: Andrei Otcheretianski > >=20 > > FCC-594280 D01 Section B.3 allows peer-to-peer and ad hoc devices to > > operate on DFS channels while they operate under the control of a > > concurrent DFS master. For example, it is possible to have a P2P GO on = a > > DFS channel as long as BSS connection is active on the same channel. > > Allow such operation by adding additional regulatory flags to indicate > > DFS concurrent channels and capable devices. Add the required > > relaxations in DFS regulatory checks. > >=20 > > Signed-off-by: Andrei Otcheretianski > > Reviewed-by: Gregory Greenman > > Signed-off-by: Miri Korenblit >=20 > Curious if there will be a companion change to wireless-regdb.git to > allow this flag to be set in db.txt? >=20 > Looks like we haven't been very good about adding support for new > nl80211_reg_rule_flags to dbparse.py. >=20 Yeah, we really haven't, and it seems that nobody really cares any more, since all the new devices have self-managed regulatory? Certainly that's true for our device, so even if we were to add a flag and all to everything related to the regdb, it'd have no effect for Intel NICs. So the interest is pretty low ... johannes