Received: by 2002:a05:7412:3b8b:b0:fc:a2b0:25d7 with SMTP id nd11csp2989962rdb; Tue, 13 Feb 2024 03:45:42 -0800 (PST) X-Forwarded-Encrypted: i=3; AJvYcCVsM94MkOmDTh2WcRs6BqFW8/gbpWB9EpVANf19S8O3BJNK/0hy/DYNcmTjg9hdu2vmATqI4C5nsZ7gDLZNjtRCdhxaOwr/j8EiKatDmg== X-Google-Smtp-Source: AGHT+IG0UokmNxawTAh/ENrljhXATqlkFKLyU1wekBhKg5hcBBxs8BDK52tN2+Ner9NSpzlZuzc4 X-Received: by 2002:a05:622a:291:b0:42c:7a89:7e4d with SMTP id z17-20020a05622a029100b0042c7a897e4dmr7459887qtw.45.1707824741978; Tue, 13 Feb 2024 03:45:41 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1707824741; cv=pass; d=google.com; s=arc-20160816; b=nQ+lZbjH5q+qUuB97epvR20zTgy7HSiHcnHwxLVom+ZZr93qCu04OHGymcP6PnPoIA qzv4Jk1RjB6pb2HLOQjjciCQ+kKo6/Q/GO6dpZHdXCxAYrleOaGXz3J/FIVadd/M9CO5 Q6XBYr/cteFeNd6P6bTl2LCNMMWrQR882tfwYOcr4sLS0ViLsCLbXj4819nEnVdtS+d7 NntIDCI7RTo+O7ndFqHNO2q+qfSRRBYSPi/qle4i+Hzz0vkH0yQAy/XJZyn4U4g9eaIr z4zbLqqoEU71A4a+VeubnvdIiMO7CZMAMRCOHdzX08RSntsjhiFF/U5G7rJN7Wm1F7bA mAzQ== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=mime-version:list-unsubscribe:list-subscribe:list-id:precedence :user-agent:content-transfer-encoding:references:in-reply-to:date:cc :to:from:subject:message-id:dkim-signature; bh=nUCaYtxHdFB7BsZxrrtCEekTv3bK5CO8RmQpic8P8KA=; fh=mD3LUWqq3AeIeDrW0PEv+O8jBirBoX3bPDsMWo8Ge8o=; b=KjXW0tkXlH1zHM3Ab/TGg9nKwHmUNHr381SaMby6DAo+2MdQsCls5Btj4jU2yhvakK AOJ5fatN5d8SQ5MXXYvUz5GYBIU8bJhzBn01h3un6VZN4+tip0WEtHYY1IG/pJWJs2Wz SswmbgBi3lpB2c0xFHZEig9h7szOWiup2uK5SFvIExYqpXpVQRI13FlcDyY5cL3t041h vcWDlglmYFgms/1fmu8k50z8CUtHU2naZxpyfvYdkP3PFObZSxAnlXGUcozTomdDmI0g qtzCRZaxc/A6fIeZrQ7mhomfQpCouIfbYcfrSohGvYncqSB5lFRmBPqUf8OQ+O6ZML2+ Vf6A==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@sipsolutions.net header.s=mail header.b="GWAL/zXk"; arc=pass (i=1 spf=pass spfdomain=sipsolutions.net dkim=pass dkdomain=sipsolutions.net dmarc=pass fromdomain=sipsolutions.net); spf=pass (google.com: domain of linux-wireless+bounces-3527-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-wireless+bounces-3527-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=REJECT dis=NONE) header.from=sipsolutions.net X-Forwarded-Encrypted: i=2; AJvYcCVX8BS7zZPEOIVYzjFtfDWDAAhSqzIsHhkuGcMqFXCJ9Em3gLqHnLYCTw6OSeQxx1pJ35APcHeWu1HfaKswC/KyohqpsD7GvORoTqV2Bw== Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [147.75.199.223]) by mx.google.com with ESMTPS id w19-20020a05620a445300b00787188f78afsi2019263qkp.383.2024.02.13.03.45.41 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 13 Feb 2024 03:45:41 -0800 (PST) Received-SPF: pass (google.com: domain of linux-wireless+bounces-3527-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) client-ip=147.75.199.223; Authentication-Results: mx.google.com; dkim=pass header.i=@sipsolutions.net header.s=mail header.b="GWAL/zXk"; arc=pass (i=1 spf=pass spfdomain=sipsolutions.net dkim=pass dkdomain=sipsolutions.net dmarc=pass fromdomain=sipsolutions.net); spf=pass (google.com: domain of linux-wireless+bounces-3527-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-wireless+bounces-3527-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=REJECT dis=NONE) header.from=sipsolutions.net Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id 5DD591C225D8 for ; Tue, 13 Feb 2024 11:45:41 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id F358C376FA; Tue, 13 Feb 2024 11:45:35 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=sipsolutions.net header.i=@sipsolutions.net header.b="GWAL/zXk" X-Original-To: linux-wireless@vger.kernel.org Received: from sipsolutions.net (s3.sipsolutions.net [168.119.38.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id E637138DD5; Tue, 13 Feb 2024 11:45:33 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=168.119.38.16 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1707824735; cv=none; b=Wk5DJqZvh0+kioKDkheQ6fESHGzzKU+ymkhpqL3Nr3x97FGWauicOVfRoA2VsCFg39c90YQ/bTG5jmDKLK7W5ZrLfR/ObbqOt+HiRu0BDE/JtobRZ+/ABCA9eq4eL/5NEM14ut0wUbPKpO2ppnD8Yah9ulMsusHFf5aEEbX9R2Y= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1707824735; c=relaxed/simple; bh=nUCaYtxHdFB7BsZxrrtCEekTv3bK5CO8RmQpic8P8KA=; h=Message-ID:Subject:From:To:Cc:Date:In-Reply-To:References: Content-Type:MIME-Version; b=ZICm0lltNWPQ2cvjaCEJi8h+m8YjfyVS2nG/SqdEpGysH/4wYaoh+XfE8RI+jXfoQQ16ZESo2ScUNkmM/CVmow+bxppCYBV/y1Q65fxZ75h10th2hbJEoZ+RpeiMLKfex4YZ35yck8BPtMYuRvAXydo4BWiJBx9QEPPxP/x2eMg= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=sipsolutions.net; spf=pass smtp.mailfrom=sipsolutions.net; dkim=pass (2048-bit key) header.d=sipsolutions.net header.i=@sipsolutions.net header.b=GWAL/zXk; arc=none smtp.client-ip=168.119.38.16 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=sipsolutions.net Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=sipsolutions.net DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=sipsolutions.net; s=mail; h=MIME-Version:Content-Transfer-Encoding: Content-Type:References:In-Reply-To:Date:Cc:To:From:Subject:Message-ID:Sender :Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From:Resent-To: Resent-Cc:Resent-Message-ID; bh=nUCaYtxHdFB7BsZxrrtCEekTv3bK5CO8RmQpic8P8KA=; t=1707824734; x=1709034334; b=GWAL/zXkPsF3SOP/4W8VKXIda7+9YkAZ+GTwrpxTH1Yz/KE 9MJCnqrvL5qg8IMUJJQO2CbaLcrdJy6lVA6yMRB3FZ0ggBcKW6u28t5nezar9i8h5fU0chQzRZSbY 24g9OOpy6MXCO7/7SbIf9VjMWnC6VxiJK068KnpytViNGeK39MRCf+vsT7yBNLWuzOs4lrvSKhl2t qw9nix6W3o7bfc5dpfl4bI4VLxjhWLi3+D6XK3zQ9fLcU6zUgA6MgNwcgXcFFuuhC4jSY0+ApMJor ArcmHP6KNG/UO86OW/+Rej06/My3ly2uaqMCiMjKKw0h1+sXwP3JA1q8FX5rDRGA==; Received: by sipsolutions.net with esmtpsa (TLS1.3:ECDHE_X25519__RSA_PSS_RSAE_SHA256__AES_256_GCM:256) (Exim 4.97) (envelope-from ) id 1rZrEB-00000007en6-2Lnp; Tue, 13 Feb 2024 12:45:31 +0100 Message-ID: <0cb1d7ef63ad1ea1ff4109d85a6bcdcaca16f1c8.camel@sipsolutions.net> Subject: Re: [PATCH 1/1] wifi: nl80211: Add support for plumbing SAE groups to driver From: Johannes Berg To: Arend van Spriel , Kalle Valo , Vinayak Yadawad Cc: linux-wireless@vger.kernel.org, jithu.jance@broadcom.com, netdev@vger.kernel.org, Jakub Kicinski Date: Tue, 13 Feb 2024 12:45:30 +0100 In-Reply-To: References: <309965e8ef4d220053ca7e6bd34393f892ea1bb8.1707486287.git.vinayak.yadawad@broadcom.com> <87mss6f8jh.fsf@kernel.org> <2c38eaed47808a076b6986412f92bb955b0599c3.camel@sipsolutions.net> Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable User-Agent: Evolution 3.50.3 (3.50.3-1.fc39) Precedence: bulk X-Mailing-List: linux-wireless@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-malware-bazaar: not-scanned On Tue, 2024-02-13 at 12:13 +0100, Arend van Spriel wrote: >=20 > I recall the rule was that nl80211 API changes=20 > should also have at least one driver implementing it. Guess we let that= =20 > slip a couple of times. I fully agree enforcing this.=C2=A0 Well, enforcing it strictly never really worked all that well in practice, since you don't necessarily want to have a complex driver implementation while hashing out the API, and the API fundamentally has to come first. So in a sense it comes down to trust, and that people will actually follow up with implementations. And yeah, plans can change and you end up not really supporting everything that was defined ... that's life, I guess. But the mode here seems to be that there's not even any _intent_ to do that? I guess we could hash out the API, review the patches, and then _not_ apply them until a driver is ready? So the first round of reviews would still come with API only, but once that settles we don't actually merge it immediately, unlike normally where we merge a patch we've reviewed? And then if whoever did it lost interest, we already have a reviewed version for anyone else who might need it? > FWIW I am actually=20 > planning on submitting brcmfmac patches to support=20 > NL80211_CMD_EXTERNAL_AUTH. Cool :) johannes