On 31/05/2019, Manikanta Pubbisetty <mpubbise@xxxxxxxxxxxxxx> wrote: > > On 5/14/2019 2:08 PM, Johannes Berg wrote: >> On Wed, 2019-05-08 at 14:55 +0530, Manikanta Pubbisetty wrote: >>> +++ b/net/mac80211/util.c >>> @@ -3795,7 +3795,9 @@ int ieee80211_check_combinations(struct >>> ieee80211_sub_if_data *sdata, >>> } >>> >>> /* Always allow software iftypes */ >>> - if (local->hw.wiphy->software_iftypes & BIT(iftype)) { >>> + if (local->hw.wiphy->software_iftypes & BIT(iftype) || >>> + (iftype == NL80211_IFTYPE_AP_VLAN && >>> + local->hw.wiphy->flags & WIPHY_FLAG_4ADDR_AP)) { >>> if (radar_detect) >>> return -EINVAL; >> Shouldn't this check if 4addr is actually enabled too, like here: > > > Sure Johannes, I'll look into it. > > >>> case NETDEV_PRE_UP: >>> - if (!(wdev->wiphy->interface_modes & BIT(wdev->iftype))) >>> + if (!(wdev->wiphy->interface_modes & BIT(wdev->iftype)) && >>> + !(wdev->iftype == NL80211_IFTYPE_AP_VLAN && >>> + rdev->wiphy.flags & WIPHY_FLAG_4ADDR_AP && >>> + wdev->use_4addr)) >>> return notifier_from_errno(-EOPNOTSUPP); >> ? >> Or is there some reason it doesn't matter? >> >>> @@ -3439,6 +3438,11 @@ static int nl80211_new_interface(struct sk_buff >>> *skb, struct genl_info *info) >>> return err; >>> } >>> >>> + if (!(rdev->wiphy.interface_modes & (1 << type)) && >>> + !(type == NL80211_IFTYPE_AP_VLAN && params.use_4addr && >>> + rdev->wiphy.flags & WIPHY_FLAG_4ADDR_AP)) >>> + return -EOPNOTSUPP; >>> + >> I also wonder if we shouldn't go "all in" and actually make the check >> something like >> >> check_interface_allowed(iftype, 4addr): >> if (iftype == AP_VLAN && 4addr) >> return wiphy.flags & WIPHY_FLAG_4ADDR_AP; >> >> else return wiphy.interface_modes & BIT(iftype); >> >> i.e. make it "you must have WIPHY_FLAG_4ADDR_AP to use 4-addr AP_VLAN >> interfaces", rather than "also allow it in this case". >> >> That would seem like the clearer semantics to me? > > > Yeah, it can be better; I'll check if this is feasible. > > > Thanks, > > Manikanta > > Hi Applying this patch instead of v1 broke WDS operation between two Litebeam AC Gen2 devices: Thu Jun 6 19:38:43 2019 kern.info kernel: [ 625.840896] device wlan0.sta1 left promiscuous mode Thu Jun 6 19:38:43 2019 kern.info kernel: [ 625.846146] br-lan: port 3(wlan0.sta1) entered disabled state Thu Jun 6 19:38:43 2019 kern.warn kernel: [ 625.854349] ------------[ cut here ]------------ Thu Jun 6 19:38:43 2019 kern.warn kernel: [ 625.859253] WARNING: CPU: 0 PID: 1417 at backports-4.19.32-1/net/mac80211/key.c:907 ieee80211_free_keys+0x170/0x228 [mac80211] Thu Jun 6 19:38:43 2019 kern.warn kernel: [ 625.870871] Modules linked in: ath9k ath9k_common pppoe ppp_async ath9k_hw ath10k_pci ath10k_core ath pppox ppp_generic mac80211 iptable_nat iptable_mangle iptable_filter ipt_REJECT ipt_MASQUERADE ip_tables cfg80211 xt_time xt_tcpudp xt_state xt_nat xt_multiport xt_mark xt_mac xt_limit xt_conntrack xt_comment xt_TCPMSS xt_REDIRECT xt_LOG xt_FLOWOFFLOAD x_tables thermal_sys slhc nf_reject_ipv4 nf_nat_redirect nf_nat_masquerade_ipv4 nf_conntrack_ipv4 nf_nat_ipv4 nf_nat nf_log_ipv4 nf_log_common nf_flow_table_hw nf_flow_table nf_defrag_ipv4 nf_conntrack_rtcache nf_conntrack hwmon crc_ccitt compat ehci_platform ehci_hcd gpio_button_hotplug usbcore nls_base usb_common Thu Jun 6 19:38:43 2019 kern.warn kernel: [ 625.930674] CPU: 0 PID: 1417 Comm: hostapd Not tainted 4.14.118 #0 Thu Jun 6 19:38:43 2019 kern.warn kernel: [ 625.936958] Stack : 804d0000 80489150 00000000 00000000 80460fc0 82e79a9c 82e9d35c 804b1307 Thu Jun 6 19:38:43 2019 kern.warn kernel: [ 625.945494] 8045d190 00000589 80603670 0000038b 804838a0 00000001 82e79a50 688195c4 Thu Jun 6 19:38:43 2019 kern.warn kernel: [ 625.954197] 00000000 00000000 80600000 00003dd0 00000000 00000000 00000008 00000000 Thu Jun 6 19:38:43 2019 kern.warn kernel: [ 625.962745] 000000c8 d9e4e916 000000c7 00000000 80000000 00000000 83266130 83234cfc Thu Jun 6 19:38:43 2019 kern.warn kernel: [ 625.971247] 00000009 0000038b 804838a0 00000100 00000001 8026bd44 00000000 80600000 Thu Jun 6 19:38:43 2019 kern.warn kernel: [ 625.979754] ... Thu Jun 6 19:38:43 2019 kern.warn kernel: [ 625.982249] Call Trace: Thu Jun 6 19:38:43 2019 kern.warn kernel: [ 625.984764] [<8006a9ec>] show_stack+0x58/0x100 Thu Jun 6 19:38:43 2019 kern.warn kernel: [ 625.989305] [<80085080>] __warn+0xe4/0x118 Thu Jun 6 19:38:43 2019 kern.warn kernel: [ 625.993492] [<80085144>] warn_slowpath_null+0x1c/0x28 Thu Jun 6 19:38:43 2019 kern.warn kernel: [ 625.998793] [<83234cfc>] ieee80211_free_keys+0x170/0x228 [mac80211] Thu Jun 6 19:38:43 2019 kern.warn kernel: [ 626.005308] [<8321611c>] ieee80211_ibss_leave+0xa70/0x1940 [mac80211] Thu Jun 6 19:38:43 2019 kern.warn kernel: [ 626.011970] [<802f4998>] rollback_registered_many+0x2dc/0x414 Thu Jun 6 19:38:43 2019 kern.warn kernel: [ 626.017813] [<802f60b0>] unregister_netdevice_queue+0x94/0xec Thu Jun 6 19:38:43 2019 kern.warn kernel: [ 626.023762] [<8321fd8c>] ieee80211_nan_func_match+0x2894/0x29a0 [mac80211] Thu Jun 6 19:38:43 2019 kern.warn kernel: [ 626.030795] ---[ end trace 5309fee2cf0ee39d ]--- Thu Jun 6 19:38:43 2019 daemon.notice hostapd: wlan0: WDS-STA-INTERFACE-REMOVED ifname=wlan0.sta1 sta_addr=18:e8:29:30:9b:2c Thu Jun 6 19:38:48 2019 daemon.info hostapd: wlan0: STA 18:e8:29:30:9b:2c IEEE 802.11: authenticated Thu Jun 6 19:38:48 2019 daemon.info hostapd: wlan0: STA 18:e8:29:30:9b:2c IEEE 802.11: associated (aid 1) Thu Jun 6 19:38:48 2019 kern.info kernel: [ 631.114522] br-lan: port 3(wlan0.sta1) entered blocking state Thu Jun 6 19:38:48 2019 kern.info kernel: [ 631.120364] br-lan: port 3(wlan0.sta1) entered disabled state Thu Jun 6 19:38:48 2019 kern.info kernel: [ 631.126603] device wlan0.sta1 entered promiscuous mode Thu Jun 6 19:38:48 2019 daemon.notice hostapd: wlan0: WDS-STA-INTERFACE-ADDED ifname=wlan0.sta1 sta_addr=18:e8:29:30:9b:2c Thu Jun 6 19:38:48 2019 daemon.err hostapd: Could not set interface wlan0.sta1 flags (UP): Invalid argument Thu Jun 6 19:38:48 2019 daemon.err hostapd: nl80211: Failed to set WDS STA interface wlan0.sta1 up Thu Jun 6 19:38:48 2019 daemon.err hostapd: nl80211: NL80211_ATTR_STA_VLAN (addr=18:e8:29:30:9b:2c ifname=wlan0.sta1 vlan_id=0) failed: -127 (Network is down) Thu Jun 6 19:38:48 2019 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 18:e8:29:30:9b:2c Thu Jun 6 19:38:48 2019 daemon.info hostapd: wlan0: STA 18:e8:29:30:9b:2c WPA: pairwise key handshake completed (RSN) Reverting v1 of the patch restored connection. Regards, Tom