diff options
author | Avraham Stern <avraham.stern@intel.com> | 2017-01-09 15:39:15 +0200 |
---|---|---|
committer | Luca Coelho <luciano.coelho@intel.com> | 2017-02-08 17:54:22 +0200 |
commit | b45242c99f503d0a526c2b1f647ad562f9cf9dd5 (patch) | |
tree | f0a9bb1739241b5a4240c55579357f2098ee8717 /tools/testing/selftests/static_keys | |
parent | 2b18824a5d1eae58946e3c8a60d48f0b1ff32265 (diff) |
iwlwifi: mvm: Fix CSA received immediately after association
The session protection set for association is only removed when
BSS_CHANGED_BEACON_INFO is set and BSS_CHANGED_ASSOC is not set.
However, mac80211 may set both on association (in case a beacon was
already received). In this case, mac80211 will not set
BSS_CHANGED_BEACON_INFO on the next beacons because it has already
notified the beacon change, so the session protection is never removed
(until the session protection ends).
When a CSA is received within this time, the station will fail to
folllow the channel switch because it cannot schedule the time event.
Fix this by removing the session protection when
BSS_CHANGED_BEACON_INFO and BSS_CHANGED_ASSOC are both set.
Signed-off-by: Avraham Stern <avraham.stern@intel.com>
Signed-off-by: Luca Coelho <luciano.coelho@intel.com>
Diffstat (limited to 'tools/testing/selftests/static_keys')
0 files changed, 0 insertions, 0 deletions