linux-wireless.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Johannes Berg <johannes@sipsolutions.net>
To: Thomas Pedersen <thomas@cozybit.com>
Cc: linux-wireless <linux-wireless@vger.kernel.org>,
	Javier Cardona <javier@cozybit.com>
Subject: Re: [RFC 2/4] mac80211: refactor station state transitions
Date: Wed, 14 Dec 2011 09:22:11 +0100	[thread overview]
Message-ID: <1323850931.3380.4.camel@jlt3.sipsolutions.net> (raw)
In-Reply-To: <CAG6hwVNNg9bVErL-rnjsAPK3ymVfFg=t+ifparDi9xFnUzN_bg@mail.gmail.com> (sfid-20111214_013052_755018_6A862511)

On Tue, 2011-12-13 at 16:29 -0800, Thomas Pedersen wrote:
> On Tue, Dec 13, 2011 at 12:07 PM, Johannes Berg
> <johannes@sipsolutions.net> wrote:
> > From: Johannes Berg <johannes.berg@intel.com>
> >
> > Station entries can have various states, the most
> > important ones being auth, assoc and authorized.
> > This patch prepares us for telling the driver about
> > these states, we don't want to confuse drivers with
> > strange transitions, so with this we enforce that
> > they move in the right order between them (back and
> > forth); some transitions might happen before the
> > driver even knows about the station, but at least
> > runtime transitions will be ordered correctly.
> >
> > As a consequence, IBSS and MESH stations will now
> > have the ASSOC flag set (so they can transition to
> > AUTHORIZED), and we can get rid of a special case
> > in TX processing.
> >
> > TBD: WLAN_STA_TDLS_PEER_AUTH?
> > TBD: secure mesh AUTH transitions?
> 
> This patch makes it impossible to add a new unauthenticated station,
> AFAICT. Maybe this is not even desirable from mac80211's POV? The
> reason the secure mesh daemon adds a new unauthenticated peer is to
> stop NL80211_NEW_PEER_CANDIDATE notifications while userspace is
> handling the authentication process, and we need a station entry for
> ieee80211_mgmt_tx().

Ah, yes. I had to sleep over this -- now I understand why I was
confused. I'll amend the patch series to properly manage more of this in
cfg80211. I have a feeling we should also allow userspace to manage the
ASSOC state, but can we require it from the secure mesh userspace
daemon? It would break backward compatibility if we do ... I'll try to
find a workaround :)

johannes


  reply	other threads:[~2011-12-14  8:22 UTC|newest]

Thread overview: 7+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2011-12-13 20:07 [RFC 0/4] refactor station state management Johannes Berg
2011-12-13 20:07 ` [RFC 1/4] mac80211: use station mutex in configuration Johannes Berg
2011-12-13 20:07 ` [RFC 2/4] mac80211: refactor station state transitions Johannes Berg
2011-12-14  0:29   ` Thomas Pedersen
2011-12-14  8:22     ` Johannes Berg [this message]
2011-12-13 20:07 ` [RFC 3/4] mac80211: unwind station state on destroy Johannes Berg
2011-12-13 20:07 ` [RFC 4/4] mac80211: count authorized stations per BSS Johannes Berg

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=1323850931.3380.4.camel@jlt3.sipsolutions.net \
    --to=johannes@sipsolutions.net \
    --cc=javier@cozybit.com \
    --cc=linux-wireless@vger.kernel.org \
    --cc=thomas@cozybit.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).