From patchwork Wed Nov 25 23:03:48 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Rui Salvaterra X-Patchwork-Id: 1406316 X-Patchwork-Delegate: hauke@hauke-m.de Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=lists.openwrt.org (client-ip=2001:8b0:10b:1231::1; helo=merlin.infradead.org; envelope-from=openwrt-devel-bounces+incoming=patchwork.ozlabs.org@lists.openwrt.org; receiver=) Authentication-Results: ozlabs.org; dmarc=fail (p=none dis=none) header.from=gmail.com Authentication-Results: ozlabs.org; dkim=pass (2048-bit key; secure) header.d=lists.infradead.org header.i=@lists.infradead.org header.a=rsa-sha256 header.s=merlin.20170209 header.b=Sz/z9432; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=gmail.com header.i=@gmail.com header.a=rsa-sha256 header.s=20161025 header.b=BpYVQUj5; dkim-atps=neutral Received: from merlin.infradead.org (merlin.infradead.org [IPv6:2001:8b0:10b:1231::1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 4ChGgl4L4Cz9s1l for ; Thu, 26 Nov 2020 10:05:07 +1100 (AEDT) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=merlin.20170209; h=Sender:Content-Transfer-Encoding: Content-Type:Cc:List-Subscribe:List-Help:List-Post:List-Archive: List-Unsubscribe:List-Id:MIME-Version:Message-Id:Date:Subject:To:From: Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From:Resent-Sender :Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References:List-Owner; bh=mhb4kDbVAXBXoUC2nM/p+wUaR/mwFOk/EUhCwkotUYg=; b=Sz/z9432Zz1BuI60ZhxkAwKCan R9rz0V3Ey9H/0i8OuiBvdbGLM+UQERzz/frlexSLkNThTMEFCOo1y6Ixy2yuM4Fqr5QqknA7X5flK LZ+pDb8/Hekemd0zNl26hccfTSdYg2y1eQpCZ/y3fNHwGwnyfthGqrRENdva82FCZhsUEJT11otQq 0xxAEehjbJ1+mNTG4WDfDkw8YbXXQ3B2DHLJ3cVfNXeXeG7RBCArRyqmFWkk3bhB171XK6FV/3PXV 90xSAwsqq3Voc9LIJOvFh0rUrPa4T7mCmJz2lT/gU2BJZZxZyOEGb12vf6a9QXUzcv5SLkQ72RK8C FvrBIjRQ==; Received: from localhost ([::1] helo=merlin.infradead.org) by merlin.infradead.org with esmtp (Exim 4.92.3 #3 (Red Hat Linux)) id 1ki3pN-0007sD-78; Wed, 25 Nov 2020 23:03:57 +0000 Received: from mail-qt1-x841.google.com ([2607:f8b0:4864:20::841]) by merlin.infradead.org with esmtps (Exim 4.92.3 #3 (Red Hat Linux)) id 1ki3pL-0007rd-Fk for openwrt-devel@lists.openwrt.org; Wed, 25 Nov 2020 23:03:56 +0000 Received: by mail-qt1-x841.google.com with SMTP id m65so2836995qte.11 for ; Wed, 25 Nov 2020 15:03:55 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=GDXlRXW3RIT0P6cp2rRmpnr3AEo4ET5KW1nelylEr8A=; b=BpYVQUj5xePRoHmWIakMQcfuRfqx6u5tlevkm2s9HBQ6suiLIPjWBLPyXe0OnPTZfN xCStFh9S7SNkQ83ILJXUkcC0YuSb3PJGs8kgWTiRUJi84HqlBPj7KXcbImsy9Z9eSxov nR76Y241JPAWmf0VLhNjqa3aDFgXP5msFk97kN+EyZzrcPktkU//b+Uzt9qUg/Pya8i6 V9Oe1q7osMmhlPe2aIqNvQ7CvB+sFP+FyRx6cqe9FOziCAwLJvyQlTj0Z2hRdVHO+U+V DPRZlASHz2nur7crGCYjVXS/OKV3BDvLWre6aIQJhzWYV5QmPqVQRiJ4bmfgBU3FbMBr z3sw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=GDXlRXW3RIT0P6cp2rRmpnr3AEo4ET5KW1nelylEr8A=; b=BE9vvRODJ/k1iq9ukiOLrb5zrh3IDxRDi5/WzkwajcfxPisWUNgjil+uhAwyE5laFk SagYIKfTm7Vrxubm6MMrq8/eChWf2VSWi8MUbBDYShdkyWBhuRsZRQaBTwZdwDFxkqqY 5dKTlc0+OGxgGwbRw63ZvBGjVfE07Cjz2GcR+D2irJfTQoODiQBSiwF0LapZO8c8bhot EPPv3QhWgejDBVBvMMS+qzDLFC63EvM3pBG2cndHVO9TCc0sBCe0MNTm3dB6ddNVyI44 dFX1Act8hhYLknSQhliLxYmK6OoJgQNjl7CicZI74U8xEVQnE6NqbSNE1dj5bYWpYsFe Qk3g== X-Gm-Message-State: AOAM5326v+kRDOxlAsdedp7bvt+1cXyXofaGJmul9fbFmePKWi9iqHDc i4mkrOmiOuZRzcYwMwvRYbTWaMhz0Uwh X-Google-Smtp-Source: ABdhPJxPuz7sY9AKaN1IfUk/8UZRMDazpZeXecNOMY2w9DY5L+jvd2+aczCSW/k8MhK0SCaGLiwIaQ== X-Received: by 2002:aed:3668:: with SMTP id e95mr311417qtb.69.1606345433499; Wed, 25 Nov 2020 15:03:53 -0800 (PST) Received: from presler.lan (a109-49-14-36.cpe.netcabo.pt. [109.49.14.36]) by smtp.gmail.com with ESMTPSA id w9sm801759qti.45.2020.11.25.15.03.52 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 25 Nov 2020 15:03:53 -0800 (PST) From: Rui Salvaterra To: openwrt-devel@lists.openwrt.org Subject: [PATCH] hostapd: enable airtime policy for the -basic variants Date: Wed, 25 Nov 2020 23:03:48 +0000 Message-Id: <20201125230348.536613-1-rsalvaterra@gmail.com> X-Mailer: git-send-email 2.29.2 MIME-Version: 1.0 X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20201125_180355_538018_DCF42463 X-CRM114-Status: GOOD ( 11.28 ) X-Spam-Score: -0.2 (/) X-Spam-Report: SpamAssassin version 3.4.4 on merlin.infradead.org summary: Content analysis details: (-0.2 points) pts rule name description ---- ---------------------- -------------------------------------------------- -0.0 RCVD_IN_DNSWL_NONE RBL: Sender listed at https://www.dnswl.org/, no trust [2607:f8b0:4864:20:0:0:0:841 listed in] [list.dnswl.org] -0.0 SPF_PASS SPF: sender matches SPF record 0.0 FREEMAIL_FROM Sender email is commonly abused enduser mail provider [rsalvaterra[at]gmail.com] 0.0 SPF_HELO_NONE SPF: HELO does not publish an SPF Record -0.1 DKIM_VALID Message has at least one valid DKIM or DK signature -0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from author's domain 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid -0.1 DKIM_VALID_EF Message has a valid DKIM or DK signature from envelope-from domain X-BeenThere: openwrt-devel@lists.openwrt.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: OpenWrt Development List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: daniel@makrotopia.org, Rui Salvaterra Sender: "openwrt-devel" Errors-To: openwrt-devel-bounces+incoming=patchwork.ozlabs.org@lists.openwrt.org Airtime policy configuration is extremely useful in multiple BSS scenarios. Since nowadays most people configure both private and guest networks (at least), it makes sense to enable it by default, except for the most limited of the variants. Size of the hostapd-basic-openssl binary (mipsel 24Kc -O2): 543944 bytes (airtime policy disabled) 548040 bytes (airtime policy enabled) Signed-off-by: Rui Salvaterra Acked-by: Daniel Golle --- The -mesh variants are basically -full with extra mesh functionality, so they already have airtime policy enabled by default. package/network/services/hostapd/files/hostapd-basic.config | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/package/network/services/hostapd/files/hostapd-basic.config b/package/network/services/hostapd/files/hostapd-basic.config index 947e2fa200..33c38192b1 100644 --- a/package/network/services/hostapd/files/hostapd-basic.config +++ b/package/network/services/hostapd/files/hostapd-basic.config @@ -384,7 +384,7 @@ CONFIG_TLS=internal #CONFIG_OWE=y # Airtime policy support -#CONFIG_AIRTIME_POLICY=y +CONFIG_AIRTIME_POLICY=y # Override default value for the wpa_disable_eapol_key_retries configuration # parameter. See that parameter in hostapd.conf for more details.