Return-path: Received: from s3.sipsolutions.net ([144.76.63.242]:60924 "EHLO sipsolutions.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750851AbdJ0Npt (ORCPT ); Fri, 27 Oct 2017 09:45:49 -0400 Message-ID: <1509111947.2283.0.camel@sipsolutions.net> (sfid-20171027_154623_672002_EBD82B98) Subject: Re: wil6210: disallow changing RSN in beacon change From: Johannes Berg To: Kalle Valo Cc: linux-wireless@vger.kernel.org, Maya Erez Date: Fri, 27 Oct 2017 15:45:47 +0200 In-Reply-To: References: <20171017194253.10212-1-johannes@sipsolutions.net> Content-Type: text/plain; charset="UTF-8" Mime-Version: 1.0 Sender: linux-wireless-owner@vger.kernel.org List-ID: On Fri, 2017-10-27 at 15:42 +0200, Kalle Valo wrote: > Johannes Berg wrote: > > > This is a code path that will never really get hit anyway, since > > it's nonsense to change the beacon of an existing BSS to suddenly > > include or no longer include the RSN IE. Reject this instead of > > having the dead code, and get rid of accessing wdev->ssid/_len by > > way of that. > > > > Signed-off-by: Johannes Berg > > Signed-off-by: Kalle Valo > > What's the conclusion, should I take this patch or drop it? Drop, at least for now. I need to look into this and probably do things in cfg80211. johannes