summaryrefslogtreecommitdiff
path: root/tools/perf/scripts/python/call-graph-from-sql.py
diff options
context:
space:
mode:
authorLorenzo Bianconi <lorenzo.bianconi@redhat.com>2018-03-09 12:41:41 +0300
committerKalle Valo <kvalo@codeaurora.org>2018-03-13 19:35:03 +0300
commita9eab62d41646cbf5d8b3408c9d4617bb9678e71 (patch)
tree39eeaef2e951592a6bd3c9062beaa0d41d0abe97 /tools/perf/scripts/python/call-graph-from-sql.py
parent2f04652f891a1911981988f6ce0c8a83098e9002 (diff)
downloadlinux-a9eab62d41646cbf5d8b3408c9d4617bb9678e71.tar.xz
mt7601u: let mac80211 validate rx CCMP PN
Apparently the hardware does not perform CCMP PN validation so let mac80211 take care of possible replay attacks in sw. Moreover indicate ICV and MIC had been stripped setting corresponding bits in ieee80211_rx_status. The fix has been validated using 4.2.1 and 4.1.3 tests from the WiFi Alliance vulnerability detection tool. Fixes: c869f77d6abb ("add mt7601u driver") Acked-by: Jakub Kicinski <kubakici@wp.pl> Tested-by: David Park <david.park@hitemengineering.com> Signed-off-by: Lorenzo Bianconi <lorenzo.bianconi@redhat.com> Signed-off-by: Kalle Valo <kvalo@codeaurora.org>
Diffstat (limited to 'tools/perf/scripts/python/call-graph-from-sql.py')
0 files changed, 0 insertions, 0 deletions