diff options
author | Johannes Berg <johannes.berg@intel.com> | 2023-12-06 22:37:57 +0100 |
---|---|---|
committer | Johannes Berg <johannes.berg@intel.com> | 2023-12-12 09:19:55 +0100 |
commit | 98fb9b9680c9f3895ced02d6a73e27f5d7b5892b (patch) | |
tree | 3208396c7a605291f4eb4ea061ec097d2b9e5a46 /fs/coda/Kconfig | |
parent | 91fdb30ddfdb651509914d3ed0a0302712540fed (diff) | |
download | linux-stable-98fb9b9680c9f3895ced02d6a73e27f5d7b5892b.tar.gz linux-stable-98fb9b9680c9f3895ced02d6a73e27f5d7b5892b.tar.bz2 linux-stable-98fb9b9680c9f3895ced02d6a73e27f5d7b5892b.zip |
wifi: ieee80211: don't require protected vendor action frames
For vendor action frames, whether a protected one should be
used or not is clearly up to the individual vendor and frame,
so even though a protected dual is defined, it may not get
used. Thus, don't require protection for vendor action frames
when they're used in a connection.
Since we obviously don't process frames unknown to the kernel
in the kernel, it may makes sense to invert this list to have
all the ones the kernel processes and knows to be requiring
protection, but that'd be a different change.
Fixes: 91535613b609 ("wifi: mac80211: don't drop all unprotected public action frames")
Reported-by: Jouni Malinen <j@w1.fi>
Link: https://msgid.link/20231206223801.f6a2cf4e67ec.Ifa6acc774bd67801d3dafb405278f297683187aa@changeid
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
Diffstat (limited to 'fs/coda/Kconfig')
0 files changed, 0 insertions, 0 deletions