On Thu, Feb 13, 2014 at 11:01:08AM -0600, Dan Williams wrote: > On Tue, 2014-02-11 at 17:33 +1100, James Cameron wrote: > > G'day, > > > > I'd appreciate a sanity check, as I'm not sure what I am doing. > > > > We saw for years that scan results for an OLPC XO-1 laptop would be > > unreliable in large groups. APs would not be easily found. We > > presumed other causes until recently. > > > > Using monitor mode on another computer, and "iwlist eth0 scan" on the > > XO-1, I found probe responses from an AP, and ACKs from the host to > > the AP, but the output omitted the AP. > > > > Further, the AP would be missing if there was a probe response from > > another XO-1 running mesh, and an ACK from the host to that XO-1. > > > > Enabling debugging, lbs_ret_scan was reporting "scan response: invalid > > IE fmt" because the probe response had a zero length SSID IE. > > > > Is a zero length SSID IE valid? (We can't change the wireless firmware > > at this stage.) > > I think technically a zero-length IE would be valid, but I'm not sure > about a zero-length *SSID* IE. Is that zero length SSID IE coming from > an AP, or from an XO? Both. There's one for every XO-1 in the room seen on monitor, but only the usb8388 device passes it up to the host. The sd8686 device does not. len = 38 00 // start of a bss in scan response bssid = 00 00 00 00 00 00 rssi = 00 tsf = 07 e6 7c 68 77 00 00 00 intvl = 90 01 // 409.6ms beacon interval capa = 00 00 ie = 00 00 // SSID (zero length) ie = 01 04 82 84 8b 96 // supported rates ie = 03 01 01 // channel ie = 32 08 0c 12 18 24 30 48 60 6c ie = dd 0e 00 50 43 04 00 00 00 00 00 04 6d 65 73 68 There's one for some of the hidden APs. Both devices pass it up to the host. For example: len = 6b 00 // start of a bss in scan resp bssid = 2e b0 5d a6 86 ec rssi = 1e tsf = 80 a3 0b 41 05 00 00 00 intvl = 64 00 capa = 11 04 ie = 00 00 // SSID (zero length) ie = 01 08 82 84 8b 96 0c 12 18 24 // supported rates ie = 03 01 06 // channel ie = 05 04 00 02 00 00 ie = 07 06 41 55 20 01 0b 14 // country ... In both monitor mode and scan results, some hidden APs respond to a probe with a zero-length SSID IE, and some do not. Whether they do or not seems to be a characteristic of the AP firmware. > If the scan was a passive scan, then a zero-length SSID IE *would* > be valid, since the passive scans usually just listen for beacons, > and hidden APs wouldn't report a real SSID. So perhaps what's > happening here is if there is a hidden AP, the firmware sometimes > gets the beacon from the AP before the AP responds to the XO's probe > request? I don't think so. I have infrequently seen beacons on monitor in the time between the probe request for the first channel, and the probe request for the second channel, but these don't end up in the scan results. Only the probe responses that the device ACKed end up in the scan results. The tests I've made with kernel are only active scans. Tests made with Open Firmware included both active and passive, and passive scans also included the mesh and hidden APs if a beacon was seen in the scan period. > In any case, I think the patch is OK. Thanks. I shall resubmit with signoff. -- James Cameron http://quozl.linux.org.au/ -- To unsubscribe from this list: send the line "unsubscribe linux-wireless" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html