Received: by 2002:a05:7412:2a91:b0:fc:a2b0:25d7 with SMTP id u17csp607447rdh; Wed, 14 Feb 2024 06:34:59 -0800 (PST) X-Forwarded-Encrypted: i=3; AJvYcCUapc3aFpCbrhgCCi7zP0C8Mxi5UFXfAi0Ttw3lfof/sXk249yIh7pA3aWqLYSaPO9ko/vin/bMkTE35arF42fuYt3rvtEahLHOEDbbBw== X-Google-Smtp-Source: AGHT+IExVc9DMHusV+ivG9tTOiJyM3U9kt8MFkf2c/bxUdW7fC7QoBj1fM4zF6W0iIUvcqmaF/zt X-Received: by 2002:a17:906:d8a6:b0:a3c:cebc:9e0e with SMTP id qc6-20020a170906d8a600b00a3ccebc9e0emr1967918ejb.66.1707921299269; Wed, 14 Feb 2024 06:34:59 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1707921299; cv=pass; d=google.com; s=arc-20160816; b=rmlUvja7vNJjdhE+vipiX8EBA9yKD7RB7QVa5ySWHxm8GeLv99Sf6vpI7xqbwWGMPW HWt/EZhL5ext4FM74+hWOQ07wQsz56VY3mZqqGW2uJs8yprf/KqUrt/IAjWLgAU+o6aN JMVFvlRfyclcpDn0L09qVibJnldtK9Ky0ZVW7lb/Im8idzBOfd53ckFRBEPsZcW+8ySV QvE7Nf4yR5lKsKbtDSZc/uepHEmdQuxdM2sdb4XPYLRxGDYpetCswevnuZ8nMK7R9EIm wVDiZIg//Nc+h/0FAD/WNHP0kRjCBUwCc5ll7TNL9N/AXzVVyMVRV/iTTbPOvqcNSz+i Td3A== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=mime-version:list-unsubscribe:list-subscribe:list-id:precedence :user-agent:content-transfer-encoding:references:in-reply-to:date:to :from:subject:message-id:dkim-signature; bh=y7D0ZCQM39P9yAtVSGieH7wkwCxdhwDLnwLqRoN3MC0=; fh=UC+I1ZYy1kXlSHHcTMgoExJ+66gBXVvzYBkAUBz9LyA=; b=pf2AgC5i575ZEsJMiETR53w960yq5kCCSp5QUDxDmNQppHoPoO4VHb1qPgj+KFPwEr 5WF+wnc9Z2oh3lxKkC5ybS94O3dEx5t1X5bYebRl9C0sJ1Cme6iheIwLm8ccgsjyxMN4 /RI91bxxbU+rwJwhzfQDxDhhaLL6kApFSH+ndguQuspSWNqAb0hgNPgsF3vsmmsYLZcJ yDyL0oNhvAoO7KxX8ELlwEXFy05+ikNd72X+9Fx7S/tQ8LxaJ6dPO690RGiii8OZ22ov roI7fLNAWP0XCq++qVCdogNmc3L9QHEZghC/vo1L9rUuK1Jxnift3zwFfL65rXUWhUec RryQ==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@sipsolutions.net header.s=mail header.b=aEwF6wr7; arc=pass (i=1 spf=pass spfdomain=sipsolutions.net dkim=pass dkdomain=sipsolutions.net dmarc=pass fromdomain=sipsolutions.net); spf=pass (google.com: domain of linux-wireless+bounces-3588-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-wireless+bounces-3588-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=REJECT dis=NONE) header.from=sipsolutions.net X-Forwarded-Encrypted: i=2; AJvYcCXe5hVlYrUWusBlKkZGo59Com1S8N/88h4zkiLUJt/4FRYDXAh9HZvXb9b5snSaSJ1mYnsyDCUipoP6Hm6VioWlNTxpmuVE9nfYDpIKLQ== Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [2604:1380:4601:e00::3]) by mx.google.com with ESMTPS id la7-20020a170906ad8700b00a3d4994cae6si616196ejb.680.2024.02.14.06.34.59 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 14 Feb 2024 06:34:59 -0800 (PST) Received-SPF: pass (google.com: domain of linux-wireless+bounces-3588-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) client-ip=2604:1380:4601:e00::3; Authentication-Results: mx.google.com; dkim=pass header.i=@sipsolutions.net header.s=mail header.b=aEwF6wr7; arc=pass (i=1 spf=pass spfdomain=sipsolutions.net dkim=pass dkdomain=sipsolutions.net dmarc=pass fromdomain=sipsolutions.net); spf=pass (google.com: domain of linux-wireless+bounces-3588-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-wireless+bounces-3588-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=REJECT dis=NONE) header.from=sipsolutions.net Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id 0B3691F241B6 for ; Wed, 14 Feb 2024 14:34:59 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 8AFA458210; Wed, 14 Feb 2024 14:34:45 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=sipsolutions.net header.i=@sipsolutions.net header.b="aEwF6wr7" X-Original-To: linux-wireless@vger.kernel.org Received: from sipsolutions.net (s3.sipsolutions.net [168.119.38.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 09A2D43157 for ; Wed, 14 Feb 2024 14:34:42 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=168.119.38.16 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1707921285; cv=none; b=Jv7CvJOMiviFTuaIlcASUYimU4CYtc+YwIARMvLrGLXH1D1NtB9yY3SwaH/ywFCVH5UyIZqRX3qWNT56W2Jw1Fn+JbwH7fGGdkr5DWu/F1PjhJ2/fmwCZh5n5TfAmAb61hUojmLWXajnWReA1qhwSnISN3str9zPeHoCZGpLDT0= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1707921285; c=relaxed/simple; bh=tsYInJ51PUy2CmJYVm5/6JM1F+CAabp08OzRmn7ZP+g=; h=Message-ID:Subject:From:To:Date:In-Reply-To:References: Content-Type:MIME-Version; b=HB0Cr3he1JEKOacO4fciW2NErgTMFXn5EGagkcQHUJNy0uYzY7A4MOxpMswbdiAm1sCl1PPnARsEU/gIo8gvDqsL4zpkafexMGSodg8W2jgTOvSisF9L5pF3LeDsZF4O8zDQ2uj+KzpbGQ0HPLxjfyGd9M0meoGCHC+a2KUFRJI= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=sipsolutions.net; spf=pass smtp.mailfrom=sipsolutions.net; dkim=pass (2048-bit key) header.d=sipsolutions.net header.i=@sipsolutions.net header.b=aEwF6wr7; arc=none smtp.client-ip=168.119.38.16 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=sipsolutions.net Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=sipsolutions.net DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=sipsolutions.net; s=mail; h=MIME-Version:Content-Transfer-Encoding: Content-Type:References:In-Reply-To:Date:To:From:Subject:Message-ID:Sender: Reply-To:Cc:Content-ID:Content-Description:Resent-Date:Resent-From:Resent-To: Resent-Cc:Resent-Message-ID; bh=y7D0ZCQM39P9yAtVSGieH7wkwCxdhwDLnwLqRoN3MC0=; t=1707921283; x=1709130883; b=aEwF6wr7h6q1kIGAqigGYbUedKFxiJc5becN/Uj4lYvp8XY uMLjCzF7Qoz2QjO76Lu9y3FMePmdoxa5RSfAgFznPbhuaH4pYeHL4SG5hNPV2Pov8tBY+1zO7av/0 VBj4PcMjjjhI3UyboA0UY/hRLXCo7EiVAKtk4EQywFZ4LDcMJF/y0P6Hjbr0d+i5tB04MvQUq8HFe FxDBr8p62uvHirDPjbjFp8zr4mNQzLSvvPxZUQNMXW12BSxGoi/+BGitOa8Tn6a+54f4RZKND6lsP QbMJhHjiN/cgpf5WVURmK+WQujYu7w8KXIplZCHvu2P51+Sni8i309gd2MWNOwRQ==; Received: by sipsolutions.net with esmtpsa (TLS1.3:ECDHE_X25519__RSA_PSS_RSAE_SHA256__AES_256_GCM:256) (Exim 4.97) (envelope-from ) id 1raGLQ-00000009AEG-1Bc6; Wed, 14 Feb 2024 15:34:40 +0100 Message-ID: <311c594bddde32bacd45acbfa6f40fa7670e51c6.camel@sipsolutions.net> Subject: Re: brcmfmac AP mode From: Johannes Berg To: James Prestwood , KeithG , linux-wireless@vger.kernel.org Date: Wed, 14 Feb 2024 15:34:39 +0100 In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable User-Agent: Evolution 3.50.3 (3.50.3-1.fc39) Precedence: bulk X-Mailing-List: linux-wireless@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-malware-bazaar: not-scanned I have no experience with brcmfmac, but ... >=20 > I was helping Keith out here and wanted to provide a bit more=20 > information. I found there were a few differences between IWD and=20 > wpa_supplicant related to scanning which may aid in figuring out why=20 > brcmfmac is behaving this way: >=20 > =C2=A0- IWD scans using the wdev ID where wpa_supplicant uses ifindex. N= ot=20 > sure if this has anything to do with the difference behavior. This is not even visible to the driver, it's entirely resolved in nl80211, so no impact here. > =C2=A0- Passive scans (which IWD prefers) seem to exacerbate the behavio= r.=20 > Simple testing using "wpa_cli scan" showed wpa_supplicant was only using= =20 > active scans. I also tested with iw and saw repeatable disconnects when= =20 > passive scanning. Disconnects while using active scans (using iw) were= =20 > much less frequent. This makes sense, especially if it's __ap rather than __p2p_go type, since it *has* to be off the channel for some time -- especially for passive scans it has to be off-channel for more than a typical interval to even do scanning correctly. > =C2=A0- Scanning with IWD, wpa_supplicant, or iw, passive or active, alw= ays=20 > resulted in beacon loss for clients connected to the AP. This was 100%= =20 > guaranteed. The clients just could recover when active scans were used= =20 > over passive. But either way this does not seem like normal behavior,=20 > the AP interface should still be beaconing on its active channel during= =20 > a scan right? That's "normal" in the sense that you have to be off the channel for scanning, and if you're off the channel you can't transmit beacons on it? For P2P GO rather than AP it should publish NoA descriptors in the beacon to let clients know there won't be a beacon. Now it's perhaps possible to time - especially active - scanning so you can still beacon somewhat and inbetween, but I suppose the firmware doesn't do that here. In fact even outside of the beaconing, APs aren't expected to be off- channel, clients can send data to them after all. Again P2P GO solves that with NoA, but the spec itself has no good way to solve this and I'm not even sure it would even want to. In any case, you could argue that starting AP and client and then scanning is pretty much _asking_ for trouble. > If this isn't possible or can't be done reliably then=20 > should the interface combinations be changed to disallow concurrent sta= =20 > + AP mode interfaces? Maybe it could restrict it to P2P GO instead of AP? But then people will anyway just notice that they can use P2P GO and connect arbitrary clients to it (not just P2P client), then those clients won't honour the NoA because they're not P2P, and then you're back to the exact same situation... johannes