Message ID | 20220603164559.27769-1-ansuelsmth@gmail.com (mailing list archive) |
---|---|
State | Accepted |
Commit | d673cb6fe6c03b2be157cc6c5db40481828d282d |
Delegated to: | Kalle Valo |
Headers | show |
Series | [RFC] ath11k: fix peer addition/deletion error on sta band migration | expand |
Christian 'Ansuel' Marangi <ansuelsmth@gmail.com> writes: > This patch try to fix the following error. > > Wed Jun 1 22:19:30 2022 kern.warn kernel: [ 119.561227] ath11k c000000.wifi: peer already added vdev id 0 req, vdev id 1 present > Wed Jun 1 22:19:30 2022 kern.warn kernel: [ 119.561282] ath11k c000000.wifi: Failed to add peer: 28:c2:1f:xx:xx:xx for VDEV: 0 > Wed Jun 1 22:19:30 2022 kern.warn kernel: [ 119.568053] ath11k c000000.wifi: Failed to add station: 28:c2:1f:xx:xx:xx for VDEV: 0 > Wed Jun 1 22:19:31 2022 daemon.notice hostapd: wlan2: STA 28:c2:1f:xx:xx:xx IEEE 802.11: Could not add STA to kernel driver > Wed Jun 1 22:19:31 2022 daemon.notice hostapd: wlan2: STA 28:c2:1f:xx:xx:xx IEEE 802.11: did not acknowledge authentication response > Wed Jun 1 22:19:31 2022 daemon.notice hostapd: wlan1: AP-STA-DISCONNECTED 28:c2:1f:xx:xx:xx > Wed Jun 1 22:19:31 2022 daemon.info hostapd: wlan1: STA 28:c2:1f:xx:xx:xx IEEE 802.11: disassociated due to inactivity > Wed Jun 1 22:19:32 2022 daemon.info hostapd: wlan1: STA 28:c2:1f:xx:xx:xx IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE) > > To repro this: > - Have 2 Wifi with the same bssid and pass on different band (2.4 and > 5GHz) > - Enable 802.11r Fast Transaction with same mobility domain > - FT Protocol: FT over the Air >>From a openwrt system issue the command (with the correct mac) > ubus call hostapd.wlan1 wnm_disassoc_imminent '{"addr":"28:C2:1F:xx:xx:xx"}' > Notice the log printing the errors. > > The cause of this error has been investigated and we found that this is > related to the WiFi Fast Transaction feature. We observed that this is > triggered when the router tells the device to change band. In this case > the device first auth to the other band and then the disconnect path > from the prev band is triggered. > This is problematic with the current rhash implementation since the > addrs is used as key and the logic of "adding first, delete later" > conflicts with the rhash logic. > In fact peer addition will fail since the peer is already added and with > that fixed a peer deletion will cause unitended effect by removing the > peer just added. > > Current solution to this is to add additional logic to the peer delete, > make sure we are deleting the correct peer taken from the rhash > table (and fallback to the peer list) and for the peer add logic delete > the peer entry for the rhash list before adding the new one (counting as > an error only when a peer with the same vlan_id is asked to be added). > > With this change, a sta can correctly transition from 2.4GHz and 5GHZ > with no drop and no error are printed. > > Tested-on: IPQ8074 hw2.0 AHB WLAN.HK.2.5.0.1-01208-QCAHKSWPL_SILICONZ-1 > > Fixes: 7b0c70d92a43 ("ath11k: Add peer rhash table support") > Signed-off-by: Christian 'Ansuel' Marangi <ansuelsmth@gmail.com> > --- > > Some additional comments external to this patch. > I tried to find different way to fix this... > One of them would be mod the logic of the rhash and using as a key both > the vlan_id and the addr but this is problematic for the function > where ath11k_peer_find_by_addr is used as vlan_id is not always available. > > I honestly think a correct solution would be have a rhash list per vdev_id > or per mac_id but again this is problematic for some function that just handles > data and have only the addr as a way to identify the peer. > > So unless some change are done to the firmware to provide the vlan_id in the > msdu data this to me seems to be the only solution to correctly handle this case. > > Another solution I tried was to add to the peer some additional info and put > the rhash addition in the peer delete logic by passing the "to-be-added peer" to > the peer to delete but I notice that it's unreliable since it can happent that > the new peer hasn't been mapped at the time the peer delete is called. > > So this is really how to handle the rhash table in this corner case. > Considering how peer are handled in theory it should never happen to have > dangling peer that are not deleted. > > Hoping this is not too much of an hack and we find a good solution for this > problem. First of all, sorry for the delay. I have my usual excuse, too many patches :) I admit that I didn't investigate the patch in detail, but I'm happy to take this. It seems to pass my simple regression tests without issues. Any objections? If I don't hear anything I will apply this in the next few days. Full patch here: https://patchwork.kernel.org/project/linux-wireless/patch/20220603164559.27769-1-ansuelsmth@gmail.com/
On Thu, Sep 22, 2022 at 11:31:14AM +0300, Kalle Valo wrote: > Christian 'Ansuel' Marangi <ansuelsmth@gmail.com> writes: > > > This patch try to fix the following error. > > > > Wed Jun 1 22:19:30 2022 kern.warn kernel: [ 119.561227] ath11k c000000.wifi: peer already added vdev id 0 req, vdev id 1 present > > Wed Jun 1 22:19:30 2022 kern.warn kernel: [ 119.561282] ath11k c000000.wifi: Failed to add peer: 28:c2:1f:xx:xx:xx for VDEV: 0 > > Wed Jun 1 22:19:30 2022 kern.warn kernel: [ 119.568053] ath11k c000000.wifi: Failed to add station: 28:c2:1f:xx:xx:xx for VDEV: 0 > > Wed Jun 1 22:19:31 2022 daemon.notice hostapd: wlan2: STA 28:c2:1f:xx:xx:xx IEEE 802.11: Could not add STA to kernel driver > > Wed Jun 1 22:19:31 2022 daemon.notice hostapd: wlan2: STA 28:c2:1f:xx:xx:xx IEEE 802.11: did not acknowledge authentication response > > Wed Jun 1 22:19:31 2022 daemon.notice hostapd: wlan1: AP-STA-DISCONNECTED 28:c2:1f:xx:xx:xx > > Wed Jun 1 22:19:31 2022 daemon.info hostapd: wlan1: STA 28:c2:1f:xx:xx:xx IEEE 802.11: disassociated due to inactivity > > Wed Jun 1 22:19:32 2022 daemon.info hostapd: wlan1: STA 28:c2:1f:xx:xx:xx IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE) > > > > To repro this: > > - Have 2 Wifi with the same bssid and pass on different band (2.4 and > > 5GHz) > > - Enable 802.11r Fast Transaction with same mobility domain > > - FT Protocol: FT over the Air > >>From a openwrt system issue the command (with the correct mac) > > ubus call hostapd.wlan1 wnm_disassoc_imminent '{"addr":"28:C2:1F:xx:xx:xx"}' > > Notice the log printing the errors. > > > > The cause of this error has been investigated and we found that this is > > related to the WiFi Fast Transaction feature. We observed that this is > > triggered when the router tells the device to change band. In this case > > the device first auth to the other band and then the disconnect path > > from the prev band is triggered. > > This is problematic with the current rhash implementation since the > > addrs is used as key and the logic of "adding first, delete later" > > conflicts with the rhash logic. > > In fact peer addition will fail since the peer is already added and with > > that fixed a peer deletion will cause unitended effect by removing the > > peer just added. > > > > Current solution to this is to add additional logic to the peer delete, > > make sure we are deleting the correct peer taken from the rhash > > table (and fallback to the peer list) and for the peer add logic delete > > the peer entry for the rhash list before adding the new one (counting as > > an error only when a peer with the same vlan_id is asked to be added). > > > > With this change, a sta can correctly transition from 2.4GHz and 5GHZ > > with no drop and no error are printed. > > > > Tested-on: IPQ8074 hw2.0 AHB WLAN.HK.2.5.0.1-01208-QCAHKSWPL_SILICONZ-1 > > > > Fixes: 7b0c70d92a43 ("ath11k: Add peer rhash table support") > > Signed-off-by: Christian 'Ansuel' Marangi <ansuelsmth@gmail.com> > > --- > > > > Some additional comments external to this patch. > > I tried to find different way to fix this... > > One of them would be mod the logic of the rhash and using as a key both > > the vlan_id and the addr but this is problematic for the function > > where ath11k_peer_find_by_addr is used as vlan_id is not always available. > > > > I honestly think a correct solution would be have a rhash list per vdev_id > > or per mac_id but again this is problematic for some function that just handles > > data and have only the addr as a way to identify the peer. > > > > So unless some change are done to the firmware to provide the vlan_id in the > > msdu data this to me seems to be the only solution to correctly handle this case. > > > > Another solution I tried was to add to the peer some additional info and put > > the rhash addition in the peer delete logic by passing the "to-be-added peer" to > > the peer to delete but I notice that it's unreliable since it can happent that > > the new peer hasn't been mapped at the time the peer delete is called. > > > > So this is really how to handle the rhash table in this corner case. > > Considering how peer are handled in theory it should never happen to have > > dangling peer that are not deleted. > > > > Hoping this is not too much of an hack and we find a good solution for this > > problem. > > First of all, sorry for the delay. I have my usual excuse, too many > patches :) > > I admit that I didn't investigate the patch in detail, but I'm happy to > take this. It seems to pass my simple regression tests without issues. > > Any objections? If I don't hear anything I will apply this in the next > few days. Full patch here: > > https://patchwork.kernel.org/project/linux-wireless/patch/20220603164559.27769-1-ansuelsmth@gmail.com/ > Hi, thanks for checking this. We are using this on ipq807x router from month on OpenWRT and seems to work very good, as a side result, it seems this also fixed a strange memory leak. (probably related to peer not getting deleted after some time) (also since it seems you are full of patch I wonder if you can help with a very bad problem we are having. With new firmware version, the firmware crash and this is related 99% to a regression in new firmware related to missing data in the BDF. Some OEM won't ever update the BDF so without an help from the firmware these devices are stuck to an acient and malfunctioning firmware. Sorry for OT but we notice you put 2.7.0.1 on stable and wonder if you could help) (I'm opening a bugzilla about the problem with the firmware dump) > -- > https://patchwork.kernel.org/project/linux-wireless/list/ > > https://wireless.wiki.kernel.org/en/developers/documentation/submittingpatches
Christian 'Ansuel' Marangi <ansuelsmth@gmail.com> wrote: > This patch try to fix the following error. > > Wed Jun 1 22:19:30 2022 kern.warn kernel: [ 119.561227] ath11k c000000.wifi: peer already added vdev id 0 req, vdev id 1 present > Wed Jun 1 22:19:30 2022 kern.warn kernel: [ 119.561282] ath11k c000000.wifi: Failed to add peer: 28:c2:1f:xx:xx:xx for VDEV: 0 > Wed Jun 1 22:19:30 2022 kern.warn kernel: [ 119.568053] ath11k c000000.wifi: Failed to add station: 28:c2:1f:xx:xx:xx for VDEV: 0 > Wed Jun 1 22:19:31 2022 daemon.notice hostapd: wlan2: STA 28:c2:1f:xx:xx:xx IEEE 802.11: Could not add STA to kernel driver > Wed Jun 1 22:19:31 2022 daemon.notice hostapd: wlan2: STA 28:c2:1f:xx:xx:xx IEEE 802.11: did not acknowledge authentication response > Wed Jun 1 22:19:31 2022 daemon.notice hostapd: wlan1: AP-STA-DISCONNECTED 28:c2:1f:xx:xx:xx > Wed Jun 1 22:19:31 2022 daemon.info hostapd: wlan1: STA 28:c2:1f:xx:xx:xx IEEE 802.11: disassociated due to inactivity > Wed Jun 1 22:19:32 2022 daemon.info hostapd: wlan1: STA 28:c2:1f:xx:xx:xx IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE) > > To repro this: > - Have 2 Wifi with the same bssid and pass on different band (2.4 and > 5GHz) > - Enable 802.11r Fast Transaction with same mobility domain > - FT Protocol: FT over the Air > From a openwrt system issue the command (with the correct mac) > ubus call hostapd.wlan1 wnm_disassoc_imminent '{"addr":"28:C2:1F:xx:xx:xx"}' > Notice the log printing the errors. > > The cause of this error has been investigated and we found that this is > related to the WiFi Fast Transaction feature. We observed that this is > triggered when the router tells the device to change band. In this case > the device first auth to the other band and then the disconnect path > from the prev band is triggered. > This is problematic with the current rhash implementation since the > addrs is used as key and the logic of "adding first, delete later" > conflicts with the rhash logic. > In fact peer addition will fail since the peer is already added and with > that fixed a peer deletion will cause unitended effect by removing the > peer just added. > > Current solution to this is to add additional logic to the peer delete, > make sure we are deleting the correct peer taken from the rhash > table (and fallback to the peer list) and for the peer add logic delete > the peer entry for the rhash list before adding the new one (counting as > an error only when a peer with the same vlan_id is asked to be added). > > With this change, a sta can correctly transition from 2.4GHz and 5GHZ > with no drop and no error are printed. > > Tested-on: IPQ8074 hw2.0 AHB WLAN.HK.2.5.0.1-01208-QCAHKSWPL_SILICONZ-1 > > Fixes: 7b0c70d92a43 ("ath11k: Add peer rhash table support") > Signed-off-by: Christian 'Ansuel' Marangi <ansuelsmth@gmail.com> > Signed-off-by: Kalle Valo <quic_kvalo@quicinc.com> Patch applied to ath-next branch of ath.git, thanks. d673cb6fe6c0 wifi: ath11k: fix peer addition/deletion error on sta band migration
Am 03.06.2022 um 18:45 schrieb Christian 'Ansuel' Marangi: > This patch try to fix the following error. > > Wed Jun 1 22:19:30 2022 kern.warn kernel: [ 119.561227] ath11k c000000.wifi: peer already added vdev id 0 req, vdev id 1 present > Wed Jun 1 22:19:30 2022 kern.warn kernel: [ 119.561282] ath11k c000000.wifi: Failed to add peer: 28:c2:1f:xx:xx:xx for VDEV: 0 > Wed Jun 1 22:19:30 2022 kern.warn kernel: [ 119.568053] ath11k c000000.wifi: Failed to add station: 28:c2:1f:xx:xx:xx for VDEV: 0 > Wed Jun 1 22:19:31 2022 daemon.notice hostapd: wlan2: STA 28:c2:1f:xx:xx:xx IEEE 802.11: Could not add STA to kernel driver > Wed Jun 1 22:19:31 2022 daemon.notice hostapd: wlan2: STA 28:c2:1f:xx:xx:xx IEEE 802.11: did not acknowledge authentication response > Wed Jun 1 22:19:31 2022 daemon.notice hostapd: wlan1: AP-STA-DISCONNECTED 28:c2:1f:xx:xx:xx > Wed Jun 1 22:19:31 2022 daemon.info hostapd: wlan1: STA 28:c2:1f:xx:xx:xx IEEE 802.11: disassociated due to inactivity > Wed Jun 1 22:19:32 2022 daemon.info hostapd: wlan1: STA 28:c2:1f:xx:xx:xx IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE) > > To repro this: > - Have 2 Wifi with the same bssid and pass on different band (2.4 and > 5GHz) > - Enable 802.11r Fast Transaction with same mobility domain > - FT Protocol: FT over the Air > From a openwrt system issue the command (with the correct mac) > ubus call hostapd.wlan1 wnm_disassoc_imminent '{"addr":"28:C2:1F:xx:xx:xx"}' > Notice the log printing the errors. > > The cause of this error has been investigated and we found that this is > related to the WiFi Fast Transaction feature. We observed that this is > triggered when the router tells the device to change band. In this case > the device first auth to the other band and then the disconnect path > from the prev band is triggered. > This is problematic with the current rhash implementation since the > addrs is used as key and the logic of "adding first, delete later" > conflicts with the rhash logic. > In fact peer addition will fail since the peer is already added and with > that fixed a peer deletion will cause unitended effect by removing the > peer just added. > > Current solution to this is to add additional logic to the peer delete, > make sure we are deleting the correct peer taken from the rhash > table (and fallback to the peer list) and for the peer add logic delete > the peer entry for the rhash list before adding the new one (counting as > an error only when a peer with the same vlan_id is asked to be added). > > With this change, a sta can correctly transition from 2.4GHz and 5GHZ > with no drop and no error are printed. > > Tested-on: IPQ8074 hw2.0 AHB WLAN.HK.2.5.0.1-01208-QCAHKSWPL_SILICONZ-1 > > Fixes: 7b0c70d92a43 ("ath11k: Add peer rhash table support") > Signed-off-by: Christian 'Ansuel' Marangi <ansuelsmth@gmail.com> > --- > > Some additional comments external to this patch. > I tried to find different way to fix this... > One of them would be mod the logic of the rhash and using as a key both > the vlan_id and the addr but this is problematic for the function > where ath11k_peer_find_by_addr is used as vlan_id is not always available. > > I honestly think a correct solution would be have a rhash list per vdev_id > or per mac_id but again this is problematic for some function that just handles > data and have only the addr as a way to identify the peer. > > So unless some change are done to the firmware to provide the vlan_id in the > msdu data this to me seems to be the only solution to correctly handle this case. > > Another solution I tried was to add to the peer some additional info and put > the rhash addition in the peer delete logic by passing the "to-be-added peer" to > the peer to delete but I notice that it's unreliable since it can happent that > the new peer hasn't been mapped at the time the peer delete is called. > > So this is really how to handle the rhash table in this corner case. > Considering how peer are handled in theory it should never happen to have > dangling peer that are not deleted. > > Hoping this is not too much of an hack and we find a good solution for this > problem. > > drivers/net/wireless/ath/ath11k/peer.c | 30 ++++++++++++++++++++++---- > 1 file changed, 26 insertions(+), 4 deletions(-) > > diff --git a/drivers/net/wireless/ath/ath11k/peer.c b/drivers/net/wireless/ath/ath11k/peer.c > index 9e22aaf34b88..1ae7af02c364 100644 > --- a/drivers/net/wireless/ath/ath11k/peer.c > +++ b/drivers/net/wireless/ath/ath11k/peer.c > @@ -302,6 +302,21 @@ static int __ath11k_peer_delete(struct ath11k *ar, u32 vdev_id, const u8 *addr) > spin_lock_bh(&ab->base_lock); > > peer = ath11k_peer_find_by_addr(ab, addr); > + /* Check if the found peer is what we want to remove. > + * While the sta is transitioning to another band we may > + * have 2 peer with the same addr assigned to different > + * vdev_id. Make sure we are deleting the correct peer. > + */ > + if (peer && peer->vdev_id == vdev_id) > + ath11k_peer_rhash_delete(ab, peer); > + > + /* Fallback to peer list search if the correct peer can't be found. > + * Skip the deletion of the peer from the rhash since it has already > + * been deleted in peer add. > + */ > + if (!peer) > + peer = ath11k_peer_find(ab, vdev_id, addr); > + > if (!peer) { > spin_unlock_bh(&ab->base_lock); > mutex_unlock(&ab->tbl_mtx_lock); > @@ -312,8 +327,6 @@ static int __ath11k_peer_delete(struct ath11k *ar, u32 vdev_id, const u8 *addr) > return -EINVAL; > } > > - ath11k_peer_rhash_delete(ab, peer); > - > spin_unlock_bh(&ab->base_lock); > mutex_unlock(&ab->tbl_mtx_lock); > > @@ -372,8 +385,17 @@ int ath11k_peer_create(struct ath11k *ar, struct ath11k_vif *arvif, > spin_lock_bh(&ar->ab->base_lock); > peer = ath11k_peer_find_by_addr(ar->ab, param->peer_addr); > if (peer) { > - spin_unlock_bh(&ar->ab->base_lock); > - return -EINVAL; > + if (peer->vdev_id == param->vdev_id) { > + spin_unlock_bh(&ar->ab->base_lock); > + return -EINVAL; > + } > + > + /* Assume sta is transitioning to another band. > + * Remove here the peer from rhash. > + */ > + mutex_lock(&ar->ab->tbl_mtx_lock); > + ath11k_peer_rhash_delete(ar->ab, peer); > + mutex_unlock(&ar->ab->tbl_mtx_lock); > } > spin_unlock_bh(&ar->ab->base_lock); > after doing some research for finding a weired ath11k firmware crash i found out that this patch is the source for the problem it seems that in case that multiple bssid's are in use (not for roaming purpose) the wifi crashes on peer delete under some circumstances originally this issue was discovered by another party. so please check the following link for more details and logs https://github.com/openwrt/openwrt/issues/14693 Sebastian
Am 16.07.2024 um 04:49 schrieb Sebastian Gottschall: > I honestly think a correct solution would be have a rhash list per > vdev_id > or per mac_id but again this is problematic for some function that > just handles > data and have only the addr as a way to identify the peer. regarding this comment. i made a patch which exactly does that thing and solves the problem. there are just 2 functions which have the problem. but both can be handled in a easy way. these are wmi events for kick station etc. in such a case i just kick them from all mac's
diff --git a/drivers/net/wireless/ath/ath11k/peer.c b/drivers/net/wireless/ath/ath11k/peer.c index 9e22aaf34b88..1ae7af02c364 100644 --- a/drivers/net/wireless/ath/ath11k/peer.c +++ b/drivers/net/wireless/ath/ath11k/peer.c @@ -302,6 +302,21 @@ static int __ath11k_peer_delete(struct ath11k *ar, u32 vdev_id, const u8 *addr) spin_lock_bh(&ab->base_lock); peer = ath11k_peer_find_by_addr(ab, addr); + /* Check if the found peer is what we want to remove. + * While the sta is transitioning to another band we may + * have 2 peer with the same addr assigned to different + * vdev_id. Make sure we are deleting the correct peer. + */ + if (peer && peer->vdev_id == vdev_id) + ath11k_peer_rhash_delete(ab, peer); + + /* Fallback to peer list search if the correct peer can't be found. + * Skip the deletion of the peer from the rhash since it has already + * been deleted in peer add. + */ + if (!peer) + peer = ath11k_peer_find(ab, vdev_id, addr); + if (!peer) { spin_unlock_bh(&ab->base_lock); mutex_unlock(&ab->tbl_mtx_lock); @@ -312,8 +327,6 @@ static int __ath11k_peer_delete(struct ath11k *ar, u32 vdev_id, const u8 *addr) return -EINVAL; } - ath11k_peer_rhash_delete(ab, peer); - spin_unlock_bh(&ab->base_lock); mutex_unlock(&ab->tbl_mtx_lock); @@ -372,8 +385,17 @@ int ath11k_peer_create(struct ath11k *ar, struct ath11k_vif *arvif, spin_lock_bh(&ar->ab->base_lock); peer = ath11k_peer_find_by_addr(ar->ab, param->peer_addr); if (peer) { - spin_unlock_bh(&ar->ab->base_lock); - return -EINVAL; + if (peer->vdev_id == param->vdev_id) { + spin_unlock_bh(&ar->ab->base_lock); + return -EINVAL; + } + + /* Assume sta is transitioning to another band. + * Remove here the peer from rhash. + */ + mutex_lock(&ar->ab->tbl_mtx_lock); + ath11k_peer_rhash_delete(ar->ab, peer); + mutex_unlock(&ar->ab->tbl_mtx_lock); } spin_unlock_bh(&ar->ab->base_lock);
This patch try to fix the following error. Wed Jun 1 22:19:30 2022 kern.warn kernel: [ 119.561227] ath11k c000000.wifi: peer already added vdev id 0 req, vdev id 1 present Wed Jun 1 22:19:30 2022 kern.warn kernel: [ 119.561282] ath11k c000000.wifi: Failed to add peer: 28:c2:1f:xx:xx:xx for VDEV: 0 Wed Jun 1 22:19:30 2022 kern.warn kernel: [ 119.568053] ath11k c000000.wifi: Failed to add station: 28:c2:1f:xx:xx:xx for VDEV: 0 Wed Jun 1 22:19:31 2022 daemon.notice hostapd: wlan2: STA 28:c2:1f:xx:xx:xx IEEE 802.11: Could not add STA to kernel driver Wed Jun 1 22:19:31 2022 daemon.notice hostapd: wlan2: STA 28:c2:1f:xx:xx:xx IEEE 802.11: did not acknowledge authentication response Wed Jun 1 22:19:31 2022 daemon.notice hostapd: wlan1: AP-STA-DISCONNECTED 28:c2:1f:xx:xx:xx Wed Jun 1 22:19:31 2022 daemon.info hostapd: wlan1: STA 28:c2:1f:xx:xx:xx IEEE 802.11: disassociated due to inactivity Wed Jun 1 22:19:32 2022 daemon.info hostapd: wlan1: STA 28:c2:1f:xx:xx:xx IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE) To repro this: - Have 2 Wifi with the same bssid and pass on different band (2.4 and 5GHz) - Enable 802.11r Fast Transaction with same mobility domain - FT Protocol: FT over the Air From a openwrt system issue the command (with the correct mac) ubus call hostapd.wlan1 wnm_disassoc_imminent '{"addr":"28:C2:1F:xx:xx:xx"}' Notice the log printing the errors. The cause of this error has been investigated and we found that this is related to the WiFi Fast Transaction feature. We observed that this is triggered when the router tells the device to change band. In this case the device first auth to the other band and then the disconnect path from the prev band is triggered. This is problematic with the current rhash implementation since the addrs is used as key and the logic of "adding first, delete later" conflicts with the rhash logic. In fact peer addition will fail since the peer is already added and with that fixed a peer deletion will cause unitended effect by removing the peer just added. Current solution to this is to add additional logic to the peer delete, make sure we are deleting the correct peer taken from the rhash table (and fallback to the peer list) and for the peer add logic delete the peer entry for the rhash list before adding the new one (counting as an error only when a peer with the same vlan_id is asked to be added). With this change, a sta can correctly transition from 2.4GHz and 5GHZ with no drop and no error are printed. Tested-on: IPQ8074 hw2.0 AHB WLAN.HK.2.5.0.1-01208-QCAHKSWPL_SILICONZ-1 Fixes: 7b0c70d92a43 ("ath11k: Add peer rhash table support") Signed-off-by: Christian 'Ansuel' Marangi <ansuelsmth@gmail.com> --- Some additional comments external to this patch. I tried to find different way to fix this... One of them would be mod the logic of the rhash and using as a key both the vlan_id and the addr but this is problematic for the function where ath11k_peer_find_by_addr is used as vlan_id is not always available. I honestly think a correct solution would be have a rhash list per vdev_id or per mac_id but again this is problematic for some function that just handles data and have only the addr as a way to identify the peer. So unless some change are done to the firmware to provide the vlan_id in the msdu data this to me seems to be the only solution to correctly handle this case. Another solution I tried was to add to the peer some additional info and put the rhash addition in the peer delete logic by passing the "to-be-added peer" to the peer to delete but I notice that it's unreliable since it can happent that the new peer hasn't been mapped at the time the peer delete is called. So this is really how to handle the rhash table in this corner case. Considering how peer are handled in theory it should never happen to have dangling peer that are not deleted. Hoping this is not too much of an hack and we find a good solution for this problem. drivers/net/wireless/ath/ath11k/peer.c | 30 ++++++++++++++++++++++---- 1 file changed, 26 insertions(+), 4 deletions(-)