New issue
Advanced search Search tips
Note: Color blocks (like or ) mean that a user may not be available. Tooltip shows the reason.

Issue 828485 link

Starred by 1 user

Issue metadata

Status: Fixed
Owner:
Last visit > 30 days ago
Closed: Sep 25
Cc:
Components:
EstimatedDays: ----
NextAction: ----
OS: Chrome
Pri: 1
Type: Bug



Sign in to add a comment

Tracking bug for cfg80211 backport patches for ETSI compliance

Project Member Reported by kirtika@chromium.org, Apr 3 2018

Issue description

See internal b/76133001.
That bug tracks getting in the patches for ETSI compliance. This bug tracks the dependencies that are not related to ETSI compliance /regulatory but need to be pulled in to cleanly cherry-pick and build.



 
Cc: briannorris@chromium.org
Components: OS>Systems>Network
Owner: kirtika@chromium.org
Project Member

Comment 2 by bugdroid1@chromium.org, Apr 3 2018

Labels: merge-merged-chromeos-4.4
The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/278c6b901e2cf8b95cfbdc5b67b8adef67e1ab82

commit 278c6b901e2cf8b95cfbdc5b67b8adef67e1ab82
Author: Michal Sojka <sojkam1@fel.cvut.cz>
Date: Tue Apr 03 23:12:34 2018

UPSTREAM: cfg80211: Remove unused cfg80211_can_use_iftype_chan()

Last caller of this function was removed in 3.17 in commit
97dc94f1d933c9df2c0b327066ea130c0e92083f.

Signed-off-by: Michal Sojka <sojkam1@fel.cvut.cz>
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
(cherry picked from commit c781944b71f87aa4d30eaaafb4e7573ce94bdcfd)

BUG= chromium:828485 
TEST=build 4.4 kernel on eve and kevin

Change-Id: Icf6b921c67c8a934b6b2ca5746d85dc279db3dbf
Reviewed-on: https://chromium-review.googlesource.com/990795
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Kirtika Ruchandani <kirtika@chromium.org>

[modify] https://crrev.com/278c6b901e2cf8b95cfbdc5b67b8adef67e1ab82/net/wireless/util.c
[modify] https://crrev.com/278c6b901e2cf8b95cfbdc5b67b8adef67e1ab82/net/wireless/core.h

Project Member

Comment 3 by bugdroid1@chromium.org, Apr 3 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/0c7b49dd59ec6a1ceec05643970a875fe5de23f2

commit 0c7b49dd59ec6a1ceec05643970a875fe5de23f2
Author: Johannes Berg <johannes.berg@intel.com>
Date: Tue Apr 03 23:12:36 2018

UPSTREAM: cfg80211: make wdev_list accessible to drivers

There's no harm in having drivers read the list, since they can
use RCU protection or RTNL locking; allow this to not require
each and every driver to also implement its own bookkeeping.

Signed-off-by: Johannes Berg <johannes.berg@intel.com>
(cherry picked from commit 53873f134d285191ef6435882d55837093a36c53)

BUG= chromium:828485 
TEST=Build 4.4 kernel on eve and kevin

Change-Id: I4e1ac133063c4285e121d6be178c670f3e19c372
Reviewed-on: https://chromium-review.googlesource.com/990796
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Kirtika Ruchandani <kirtika@chromium.org>

[modify] https://crrev.com/0c7b49dd59ec6a1ceec05643970a875fe5de23f2/net/wireless/reg.c
[modify] https://crrev.com/0c7b49dd59ec6a1ceec05643970a875fe5de23f2/net/wireless/sysfs.c
[modify] https://crrev.com/0c7b49dd59ec6a1ceec05643970a875fe5de23f2/net/wireless/core.h
[modify] https://crrev.com/0c7b49dd59ec6a1ceec05643970a875fe5de23f2/net/wireless/util.c
[modify] https://crrev.com/0c7b49dd59ec6a1ceec05643970a875fe5de23f2/net/wireless/sme.c
[modify] https://crrev.com/0c7b49dd59ec6a1ceec05643970a875fe5de23f2/net/wireless/core.c
[modify] https://crrev.com/0c7b49dd59ec6a1ceec05643970a875fe5de23f2/net/wireless/nl80211.c
[modify] https://crrev.com/0c7b49dd59ec6a1ceec05643970a875fe5de23f2/include/net/cfg80211.h
[modify] https://crrev.com/0c7b49dd59ec6a1ceec05643970a875fe5de23f2/net/wireless/chan.c

Project Member

Comment 4 by bugdroid1@chromium.org, Apr 6 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/1f6d3c08013f117aff970ecd32bb9a8c871afd72

commit 1f6d3c08013f117aff970ecd32bb9a8c871afd72
Author: Lior David <liord@codeaurora.org>
Date: Fri Apr 06 05:11:57 2018

UPSTREAM: cfg80211: basic support for PBSS network type

PBSS (Personal Basic Service Set) is a new BSS type for DMG
networks. It is similar to infrastructure BSS, having an AP-like
entity called PCP (PBSS Control Point), but it has few differences.
PBSS support is mandatory for 11ad devices.

Add support for PBSS by introducing a new PBSS flag attribute.
The PBSS flag is used in the START_AP command to request starting
a PCP instead of an AP, and in the CONNECT command to request
connecting to a PCP instead of an AP.

Signed-off-by: Lior David <liord@codeaurora.org>
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
(cherry picked from commit 34d505193bd10668acf1caba02d2f66bddc23fea)

BUG= chromium:828485 
TEST=trybot on eve

Change-Id: Ib4308117df15da5e3eb8f4aa73b78b182c244773
Reviewed-on: https://chromium-review.googlesource.com/989123
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Brian Norris <briannorris@chromium.org>

[modify] https://crrev.com/1f6d3c08013f117aff970ecd32bb9a8c871afd72/drivers/net/wireless/ath/wil6210/cfg80211.c
[modify] https://crrev.com/1f6d3c08013f117aff970ecd32bb9a8c871afd72/include/uapi/linux/nl80211.h
[modify] https://crrev.com/1f6d3c08013f117aff970ecd32bb9a8c871afd72/net/wireless/nl80211.c
[modify] https://crrev.com/1f6d3c08013f117aff970ecd32bb9a8c871afd72/include/net/cfg80211.h
[modify] https://crrev.com/1f6d3c08013f117aff970ecd32bb9a8c871afd72/net/wireless/sme.c

Project Member

Comment 5 by bugdroid1@chromium.org, Apr 6 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/35c765052d5ac5bad546974b6e9370e1cfe04a1e

commit 35c765052d5ac5bad546974b6e9370e1cfe04a1e
Author: Beni Lev <beni.lev@intel.com>
Date: Fri Apr 06 05:12:01 2018

UPSTREAM: cfg80211: Add global RRM capability

Today, the supplicant will add the RRM capabilities
Information Element in the association request only if
Quiet period is supported (NL80211_FEATURE_QUIET).

Quiet is one of many RRM features, and there are other RRM
features that are not related to Quiet (e.g. neighbor
report). Therefore, requiring Quiet to enable RRM is too
restrictive.
Some of the features, like neighbor report, can be
supported by user space without any help from the kernel.
Hence adding the RRM capabilities IE to association request
should be the sole user space's decision.
Removing the RRM dependency on Quiet in the driver solves
this problem, but using an old driver with a user space
tool that would not require Quiet feature would be
problematic: the user space would add NL80211_ATTR_USE_RRM
in the association request even if the kernel doesn't
advertize NL80211_FEATURE_QUIET and the association would
be denied by the kernel.

This solution adds a global RRM capability, that tells user
space that it can request RRM capabilities IE publishment
without any specific feature support in the kernel.

Signed-off-by: Beni Lev <beni.lev@intel.com>
Signed-off-by: Emmanuel Grumbach <emmanuel.grumbach@intel.com>
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
(cherry picked from commit 0c9ca11b1ae8eb16c1b6bbae91991392d2321372)

BUG= chromium:828485 
TEST=trybot on Eve

Change-Id: Ifc785fde3747162b74c79effcf9e54e3411921d9
Reviewed-on: https://chromium-review.googlesource.com/989124
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Brian Norris <briannorris@chromium.org>

[modify] https://crrev.com/35c765052d5ac5bad546974b6e9370e1cfe04a1e/include/uapi/linux/nl80211.h
[modify] https://crrev.com/35c765052d5ac5bad546974b6e9370e1cfe04a1e/net/wireless/nl80211.c

Project Member

Comment 6 by bugdroid1@chromium.org, Apr 6 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/f83bb0cbd76b2357f52715efa7af9bc9982cd338

commit f83bb0cbd76b2357f52715efa7af9bc9982cd338
Author: Johannes Berg <johannes.berg@intel.com>
Date: Fri Apr 06 05:11:55 2018

UPSTREAM: wireless: move IEEE80211_NUM_ACS to ieee80211.h

This constant isn't really specific to mac80211, so move it
"up" a level to ieee80211.h

Signed-off-by: Johannes Berg <johannes.berg@intel.com>
(cherry picked from commit 3db5e3e707ebb9ab0ce3a2dcd924ed2ea525d770)

BUG= chromium:828485 
TEST=build on eve and kevin

Change-Id: Ic070ad89f38ab2d2aa381e4e4669255fd1040f7c
Reviewed-on: https://chromium-review.googlesource.com/991254
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Brian Norris <briannorris@chromium.org>

[modify] https://crrev.com/f83bb0cbd76b2357f52715efa7af9bc9982cd338/include/linux/ieee80211.h
[modify] https://crrev.com/f83bb0cbd76b2357f52715efa7af9bc9982cd338/include/net/mac80211.h

Project Member

Comment 7 by bugdroid1@chromium.org, Apr 6 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/54780623376116343200fa1aae0573d67729a4be

commit 54780623376116343200fa1aae0573d67729a4be
Author: Purushottam Kushwaha <pkushwah@qti.qualcomm.com>
Date: Fri Apr 06 05:11:59 2018

BACKPORT: nl80211: Move ACL parsing later to avoid a possible memory leak

No support for pbss results in a memory leak for the acl_data
(if parse_acl_data succeeds). Fix this by moving the ACL parsing later.

Cc: stable@vger.kernel.org
Fixes: 34d505193bd10 ("cfg80211: basic support for PBSS network type")
Signed-off-by: Purushottam Kushwaha <pkushwah@qti.qualcomm.com>
Signed-off-by: Johannes Berg <johannes@sipsolutions.net>
(cherry picked from commit 6e8ef842223b90a33efd570128bb566a9ae6f5ad)

Conflicts:
	net/wireless/nl80211.c

kirtika@: Conflict due to renaming IEEE80211_BAND_60GHZ ->
NL80211_BAND_60GHZ

BUG= chromium:828485 
TEST=build on eve

Change-Id: Id8d647cf5057fcab02df8e904ae22bfac4ffdd31
Reviewed-on: https://chromium-review.googlesource.com/992855
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Brian Norris <briannorris@chromium.org>

[modify] https://crrev.com/54780623376116343200fa1aae0573d67729a4be/net/wireless/nl80211.c

Project Member

Comment 8 by bugdroid1@chromium.org, Apr 11 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/92f0822fde96f7e241703e37c777878c999b6a28

commit 92f0822fde96f7e241703e37c777878c999b6a28
Author: Johannes Berg <johannes.berg@intel.com>
Date: Wed Apr 11 11:38:04 2018

UPSTREAM: cfg80211: replace ieee80211_ie_split() with an inline

The function is a very simple wrapper around another one,
just adds a few default parameters, so replace it with a
static inline instead of using EXPORT_SYMBOL, reducing
the module size slightly.

Signed-off-by: Johannes Berg <johannes.berg@intel.com>
(cherry picked from commit 0483eeac59876ac37d4edbabd48727a468416d5b)

BUG= chromium:828485 
TEST=build on eve and kevin

Change-Id: I1fc30fa570028857e2ecff72bb7bd69e009be29d
Reviewed-on: https://chromium-review.googlesource.com/1004121
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Brian Norris <briannorris@chromium.org>

[modify] https://crrev.com/92f0822fde96f7e241703e37c777878c999b6a28/net/wireless/util.c
[modify] https://crrev.com/92f0822fde96f7e241703e37c777878c999b6a28/include/net/cfg80211.h

Project Member

Comment 9 by bugdroid1@chromium.org, Apr 11 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/278a5de3cad08830dbfd6946ec0000c8485ead09

commit 278a5de3cad08830dbfd6946ec0000c8485ead09
Author: Ilan Peer <ilan.peer@intel.com>
Date: Wed Apr 11 11:38:06 2018

UPSTREAM: cfg80211: Add missing tracing to cfg80211

Add missing tracing for:

1. start_radar_detection()
2. set_mcast_rates()
3. set_coalesce()

Signed-off-by: Ilan Peer <ilan.peer@intel.com>
Signed-off-by: Emmanuel Grumbach <emmanuel.grumbach@intel.com>
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
(cherry picked from commit a1056b1baaa887de52a76a5fcf5aeb4327c96c8a)

BUG= chromium:828485 
TEST=build on eve and kevin

Change-Id: Ic23e25d3987bca53a382761a6a0e865f9d7ac64d
Reviewed-on: https://chromium-review.googlesource.com/1004122
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Brian Norris <briannorris@chromium.org>

[modify] https://crrev.com/278a5de3cad08830dbfd6946ec0000c8485ead09/net/wireless/trace.h
[modify] https://crrev.com/278a5de3cad08830dbfd6946ec0000c8485ead09/net/wireless/rdev-ops.h
[modify] https://crrev.com/278a5de3cad08830dbfd6946ec0000c8485ead09/net/wireless/nl80211.c

Project Member

Comment 10 by bugdroid1@chromium.org, Apr 11 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/82e3f998ae01ac52357dd39e23a84bb196f5bf7e

commit 82e3f998ae01ac52357dd39e23a84bb196f5bf7e
Author: Vidyullatha Kanchanapally <vkanchan@qti.qualcomm.com>
Date: Wed Apr 11 11:38:08 2018

UPSTREAM: cfg80211: Add support for aborting an ongoing scan

Implement new functionality for aborting an ongoing scan.

Add NL80211_CMD_ABORT_SCAN to the nl80211 interface. After
aborting the scan, driver shall provide the scan status by
calling cfg80211_scan_done().

Reviewed-by: Jouni Malinen <jouni@qca.qualcomm.com>
Signed-off-by: Vidyullatha Kanchanapally <vkanchan@qti.qualcomm.com>
Signed-off-by: Sunil Dutt <usdutt@qti.qualcomm.com>
[change command to take wdev instead of netdev so that it
 can be used on p2p-device scans]
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
(cherry picked from commit 91d3ab46730379e89e1e908c6f62fbcadb3d8f08)

BUG= chromium:828485 
TEST=build on eve and kevin

Change-Id: I1a2da24ac6ed34eb729dc26a94d458edefd300a9
Reviewed-on: https://chromium-review.googlesource.com/1004123
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Brian Norris <briannorris@chromium.org>

[modify] https://crrev.com/82e3f998ae01ac52357dd39e23a84bb196f5bf7e/net/wireless/trace.h
[modify] https://crrev.com/82e3f998ae01ac52357dd39e23a84bb196f5bf7e/net/wireless/rdev-ops.h
[modify] https://crrev.com/82e3f998ae01ac52357dd39e23a84bb196f5bf7e/include/uapi/linux/nl80211.h
[modify] https://crrev.com/82e3f998ae01ac52357dd39e23a84bb196f5bf7e/net/wireless/nl80211.c
[modify] https://crrev.com/82e3f998ae01ac52357dd39e23a84bb196f5bf7e/include/net/cfg80211.h

Project Member

Comment 11 by bugdroid1@chromium.org, Apr 11 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/f3c90392139abb81b490dafb52a6e2bb81d7ca2f

commit f3c90392139abb81b490dafb52a6e2bb81d7ca2f
Author: Ola Olsson <ola1olsson@gmail.com>
Date: Wed Apr 11 11:38:14 2018

UPSTREAM: nl80211: Zero out the connection keys memory when freeing them.

The connection keys are zeroed out in all other cases except this
one. Let's fix the last one as well.

Signed-off-by: Ola Olsson <ola.olsson@sonymobile.com>
Reviewed-by: Julian Calaby <julian.calaby@gmail.com>
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
(cherry picked from commit 5e950a78bf5b18ded277a27aed0bcdbe7c1b868a)

BUG= chromium:828485 
TEST=build on eve and kevin

Change-Id: Iccc78abd15b77e374e9ef9f9482665f4c8787adb
Reviewed-on: https://chromium-review.googlesource.com/1004124
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Brian Norris <briannorris@chromium.org>

[modify] https://crrev.com/f3c90392139abb81b490dafb52a6e2bb81d7ca2f/net/wireless/nl80211.c

Project Member

Comment 12 by bugdroid1@chromium.org, Apr 11 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/61a8611b76102c7b39c90b712edf89c340860ac1

commit 61a8611b76102c7b39c90b712edf89c340860ac1
Author: Eric Dumazet <edumazet@google.com>
Date: Wed Apr 11 11:38:18 2018

UPSTREAM: net: add netif_tx_napi_add()

netif_tx_napi_add() is a variant of netif_napi_add()

It should be used by drivers that use a napi structure
to exclusively poll TX.

We do not want to add this kind of napi in napi_hash[] in following
patches, adding generic busy polling to all NAPI drivers.

Signed-off-by: Eric Dumazet <edumazet@google.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
(cherry picked from commit d64b5e85bfe2fe4c790abcbd16d9ae32391ddd7e)

BUG= chromium:828485 
TEST=build on eve and kevin

Change-Id: I24e2a6ae995694fee8c8f79fda99bbd39adda771
Reviewed-on: https://chromium-review.googlesource.com/1004129
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Brian Norris <briannorris@chromium.org>

[modify] https://crrev.com/61a8611b76102c7b39c90b712edf89c340860ac1/drivers/net/ethernet/freescale/fs_enet/fs_enet-main.c
[modify] https://crrev.com/61a8611b76102c7b39c90b712edf89c340860ac1/include/linux/netdevice.h
[modify] https://crrev.com/61a8611b76102c7b39c90b712edf89c340860ac1/drivers/net/ethernet/broadcom/genet/bcmgenet.c
[modify] https://crrev.com/61a8611b76102c7b39c90b712edf89c340860ac1/drivers/net/ethernet/qlogic/qlcnic/qlcnic_io.c
[modify] https://crrev.com/61a8611b76102c7b39c90b712edf89c340860ac1/net/core/dev.c
[modify] https://crrev.com/61a8611b76102c7b39c90b712edf89c340860ac1/drivers/net/ethernet/ti/cpsw.c
[modify] https://crrev.com/61a8611b76102c7b39c90b712edf89c340860ac1/drivers/net/ethernet/ti/netcp_core.c
[modify] https://crrev.com/61a8611b76102c7b39c90b712edf89c340860ac1/drivers/net/ethernet/freescale/gianfar.c
[modify] https://crrev.com/61a8611b76102c7b39c90b712edf89c340860ac1/drivers/net/ethernet/broadcom/bcmsysport.c
[modify] https://crrev.com/61a8611b76102c7b39c90b712edf89c340860ac1/drivers/net/ethernet/rocker/rocker.c
[modify] https://crrev.com/61a8611b76102c7b39c90b712edf89c340860ac1/drivers/net/wireless/ath/wil6210/netdev.c
[modify] https://crrev.com/61a8611b76102c7b39c90b712edf89c340860ac1/drivers/net/ethernet/mellanox/mlx4/en_cq.c

Project Member

Comment 13 by bugdroid1@chromium.org, Apr 11 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/4e4b3127abbd7874ec466747ddc28c8cd716731c

commit 4e4b3127abbd7874ec466747ddc28c8cd716731c
Author: Al Viro <viro@zeniv.linux.org.uk>
Date: Wed Apr 11 11:38:21 2018

UPSTREAM: convert a bunch of open-coded instances of memdup_user_nul()

A _lot_ of ->write() instances were open-coding it; some are
converted to memdup_user_nul(), a lot more remain...

Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
(cherry picked from commit 16e5c1fc36040e592128a164499bc25eb138a80f)

BUG= chromium:828485 
TEST=build on eve and kevin

Change-Id: Ib0cccd2ec055054c815f34ec8cce0bddffa2963a
Reviewed-on: https://chromium-review.googlesource.com/1004130
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Brian Norris <briannorris@chromium.org>

[modify] https://crrev.com/4e4b3127abbd7874ec466747ddc28c8cd716731c/security/tomoyo/securityfs_if.c
[modify] https://crrev.com/4e4b3127abbd7874ec466747ddc28c8cd716731c/security/smack/smackfs.c
[modify] https://crrev.com/4e4b3127abbd7874ec466747ddc28c8cd716731c/drivers/sbus/char/openprom.c
[modify] https://crrev.com/4e4b3127abbd7874ec466747ddc28c8cd716731c/lib/dynamic_debug.c
[modify] https://crrev.com/4e4b3127abbd7874ec466747ddc28c8cd716731c/drivers/s390/char/vmcp.c
[modify] https://crrev.com/4e4b3127abbd7874ec466747ddc28c8cd716731c/fs/dlm/user.c
[modify] https://crrev.com/4e4b3127abbd7874ec466747ddc28c8cd716731c/arch/xtensa/platforms/iss/simdisk.c
[modify] https://crrev.com/4e4b3127abbd7874ec466747ddc28c8cd716731c/net/rxrpc/ar-key.c
[modify] https://crrev.com/4e4b3127abbd7874ec466747ddc28c8cd716731c/fs/afs/proc.c
[modify] https://crrev.com/4e4b3127abbd7874ec466747ddc28c8cd716731c/fs/cachefiles/daemon.c
[modify] https://crrev.com/4e4b3127abbd7874ec466747ddc28c8cd716731c/kernel/trace/blktrace.c
[modify] https://crrev.com/4e4b3127abbd7874ec466747ddc28c8cd716731c/drivers/net/wireless/ath/wil6210/debugfs.c

Project Member

Comment 14 by bugdroid1@chromium.org, Apr 11 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/81ac840e1b946dcd4757ec2a48b0c67a949dffbb

commit 81ac840e1b946dcd4757ec2a48b0c67a949dffbb
Author: Johannes Berg <johannes.berg@intel.com>
Date: Wed Apr 11 11:38:23 2018

UPSTREAM: mac80211: fix mgmt-tx abort cookie and leak

If a mgmt-tx operation is aborted before it runs, the wrong
cookie is reported back to userspace, and the ack_skb gets
leaked since the frame is freed directly instead of freeing
it using ieee80211_free_txskb(). Fix that.

Fixes: 3b79af973cf4 ("mac80211: stop using pointers as userspace cookies")
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
(cherry picked from commit e673a65952b4ab045a3e3eb200fdf408004fb4fd)

BUG= chromium:828485 
TEST=build on eve and kevin

Change-Id: Ic9579ae2c2ae424169d061674bcf62c53b1a3f08
Reviewed-on: https://chromium-review.googlesource.com/1004252
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Brian Norris <briannorris@chromium.org>

[modify] https://crrev.com/81ac840e1b946dcd4757ec2a48b0c67a949dffbb/net/mac80211/offchannel.c

Project Member

Comment 15 by bugdroid1@chromium.org, Apr 11 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/3d0b566cc854e9be8865d3215b463c299c9b29b4

commit 3d0b566cc854e9be8865d3215b463c299c9b29b4
Author: Johannes Berg <johannes.berg@intel.com>
Date: Wed Apr 11 11:38:27 2018

UPSTREAM: mac80211: move off-channel/mgmt-tx code to offchannel.c

This is quite a bit of code that logically depends here since
it has to deal with all the remain-on-channel logic.

Signed-off-by: Johannes Berg <johannes.berg@intel.com>
(cherry picked from commit a2fcfccbad43e413de7e7ac39879ba91548f06c1)

BUG= chromium:828485 
TEST=build on eve and kevin

Change-Id: I0e97148636d36ea6fdac799b7aeafa6f58ea31ba
Signed-off-by: Brian Norris <briannorris@chromium.org>
Reviewed-on: https://chromium-review.googlesource.com/1004253
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>

[modify] https://crrev.com/3d0b566cc854e9be8865d3215b463c299c9b29b4/net/mac80211/ieee80211_i.h
[modify] https://crrev.com/3d0b566cc854e9be8865d3215b463c299c9b29b4/net/mac80211/cfg.c
[modify] https://crrev.com/3d0b566cc854e9be8865d3215b463c299c9b29b4/net/mac80211/offchannel.c

Project Member

Comment 16 by bugdroid1@chromium.org, Apr 11 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/95c87dd66a4b7ec394dce99269742253aca0e1c7

commit 95c87dd66a4b7ec394dce99269742253aca0e1c7
Author: Arend van Spriel <arend@broadcom.com>
Date: Wed Apr 11 11:38:29 2018

UPSTREAM: brcmfmac: no interface combination check for single interface

The interface combinations are intended for use-case in which the driver
handles multiple interface concurrently. This means that the combinations
do not need to be checked when there is only a single interface active.

Reviewed-by: Hante Meuleman <meuleman@broadcom.com>
Reviewed-by: Pieter-Paul Giesberts <pieterpg@broadcom.com>
Signed-off-by: Arend van Spriel <arend@broadcom.com>
Signed-off-by: Kalle Valo <kvalo@codeaurora.org>
(cherry picked from commit 353c46ac9e530f511fba9387e1e63226eb168e63)

BUG= chromium:828485 
TEST=build on eve and kevin

Change-Id: Icfe53c920cfbcff115071a196282ae50e82eeb3f
Reviewed-on: https://chromium-review.googlesource.com/1004262
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Brian Norris <briannorris@chromium.org>

[modify] https://crrev.com/95c87dd66a4b7ec394dce99269742253aca0e1c7/drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c

Project Member

Comment 17 by bugdroid1@chromium.org, Apr 11 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/ccd50d5d3616368e2bd368ed6157a42fe2f61a05

commit ccd50d5d3616368e2bd368ed6157a42fe2f61a05
Author: Johannes Berg <johannes.berg@intel.com>
Date: Wed Apr 11 11:38:25 2018

UPSTREAM: mac80211: properly free skb when r-o-c for TX fails

When freeing the TX skb for an off-channel TX, use the correct
API to also free the ACK skb that might have been allocated.

Signed-off-by: Johannes Berg <johannes.berg@intel.com>
(cherry picked from commit 86c7ec9eb154020797c39e1cc7dafa92da02f603)

BUG= chromium:828485 
TEST=build

Change-Id: Id947e582085e4ed91ab200ec535522ef4346e0ad
Signed-off-by: Brian Norris <briannorris@chromium.org>
Reviewed-on: https://chromium-review.googlesource.com/1005364
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>

[modify] https://crrev.com/ccd50d5d3616368e2bd368ed6157a42fe2f61a05/net/mac80211/cfg.c

Project Member

Comment 18 by bugdroid1@chromium.org, Apr 11 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/f21b0b2643bc181614ca5b8ab4d3c0e6cb56017d

commit f21b0b2643bc181614ca5b8ab4d3c0e6cb56017d
Author: Johannes Berg <johannes.berg@intel.com>
Date: Wed Apr 11 11:38:12 2018

UPSTREAM: cfg80211: handle add_station auth/assoc flag quirks

When a new station is added to AP/GO interfaces the default behaviour
is for it to be added authenticated and associated, due to backwards
compatibility. To prevent that, the driver must be able to do that
(setting the NL80211_FEATURE_FULL_AP_CLIENT_STATE feature flag) and
userspace must set the flag mask to auth|assoc and clear the set.

Handle this quirk in the API entirely in nl80211, and always push the
full flags to the drivers. NL80211_FEATURE_FULL_AP_CLIENT_STATE is
still required for userspace to be allowed to set the mask including
those bits, but after checking that add both flags to the mask and
set in case userspace didn't set them otherwise.

This obsoletes the mac80211 code handling this difference, no other
driver is currently using these flags.

Signed-off-by: Johannes Berg <johannes.berg@intel.com>
(cherry picked from commit bda95eb1d1581cfd79e9717ebda4b7ccd2265351)

BUG= chromium:828485 
TEST=trybot on eve

Change-Id: I55e70f5f20ab394237425a335cdd6fa4fabbe2a2
Reviewed-on: https://chromium-review.googlesource.com/989126
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Brian Norris <briannorris@chromium.org>

[modify] https://crrev.com/f21b0b2643bc181614ca5b8ab4d3c0e6cb56017d/net/mac80211/cfg.c
[modify] https://crrev.com/f21b0b2643bc181614ca5b8ab4d3c0e6cb56017d/net/wireless/nl80211.c

Project Member

Comment 19 by bugdroid1@chromium.org, Apr 11 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/77ef008da956220d6456baee0ed2587afc035266

commit 77ef008da956220d6456baee0ed2587afc035266
Author: Ayala Beker <ayala.beker@intel.com>
Date: Wed Apr 11 11:38:10 2018

UPSTREAM: cfg80211: use NL80211_ATTR_STA_AID in nl82011_set_station

Fix nl80211_set_station() to use the value of NL80211_ATTR_STA_AID
attribute instead of NL80211_ATTR_PEER_AID attribute.

Signed-off-by: Ayala Beker <ayala.beker@intel.com>
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
(cherry picked from commit a9bc31e418733e4c476f4322c90b7c09aab31002)

BUG= chromium:828485 
TEST=trybot on Eve

Change-Id: I594f4e257c1af38c7f3370ec7f4e7dbd064af899
Reviewed-on: https://chromium-review.googlesource.com/989127
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Brian Norris <briannorris@chromium.org>

[modify] https://crrev.com/77ef008da956220d6456baee0ed2587afc035266/net/wireless/nl80211.c

Project Member

Comment 20 by bugdroid1@chromium.org, Apr 11 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/b556135136177d9f21e85c709681c8f385e037a9

commit b556135136177d9f21e85c709681c8f385e037a9
Author: Michal Sojka <sojkam1@fel.cvut.cz>
Date: Wed Apr 11 11:38:16 2018

UPSTREAM: cfg80211: reg: Remove unused function parameter

Signed-off-by: Michal Sojka <sojkam1@fel.cvut.cz>
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
(cherry picked from commit 491728746b500b22f384cb1d0aba76f7c55a9269)

BUG= chromium:828485 
TEST=Build 4.4 kernel on eve and kevin

Change-Id: Iac6c7b0f9bb73e029415b77bb16014e03503d9d9
Reviewed-on: https://chromium-review.googlesource.com/990797
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Brian Norris <briannorris@chromium.org>

[modify] https://crrev.com/b556135136177d9f21e85c709681c8f385e037a9/net/wireless/reg.c

Project Member

Comment 21 by bugdroid1@chromium.org, Apr 11 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/c59ca9ad255e5861fe765059338049d57bd953d7

commit c59ca9ad255e5861fe765059338049d57bd953d7
Author: Sara Sharon <sara.sharon@intel.com>
Date: Wed Apr 11 11:38:31 2018

UPSTREAM: mac80211: process and save VHT MU-MIMO group frame

The Group ID Management frame is an Action frame of
category VHT. It is transmitted by the AP to assign
or change the user position of a STA for one or more
group IDs.
Process and save the group membership data. Notify
underlying driver of changes.

Signed-off-by: Sara Sharon <sara.sharon@intel.com>
Signed-off-by: Emmanuel Grumbach <emmanuel.grumbach@intel.com>
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
(cherry picked from commit 23a1f8d44c0bca48f04fc2a2f1edafd826ce6133)

BUG= chromium:828485 
TEST=build on eve

Change-Id: If17758351dd921abe29c0702edbf980605017b94
Reviewed-on: https://chromium-review.googlesource.com/993767
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Brian Norris <briannorris@chromium.org>

[modify] https://crrev.com/c59ca9ad255e5861fe765059338049d57bd953d7/net/mac80211/iface.c
[modify] https://crrev.com/c59ca9ad255e5861fe765059338049d57bd953d7/net/mac80211/util.c
[modify] https://crrev.com/c59ca9ad255e5861fe765059338049d57bd953d7/include/linux/ieee80211.h
[modify] https://crrev.com/c59ca9ad255e5861fe765059338049d57bd953d7/net/mac80211/rx.c
[modify] https://crrev.com/c59ca9ad255e5861fe765059338049d57bd953d7/net/mac80211/vht.c
[modify] https://crrev.com/c59ca9ad255e5861fe765059338049d57bd953d7/include/net/mac80211.h
[modify] https://crrev.com/c59ca9ad255e5861fe765059338049d57bd953d7/net/mac80211/mlme.c
[modify] https://crrev.com/c59ca9ad255e5861fe765059338049d57bd953d7/net/mac80211/ieee80211_i.h

Project Member

Comment 22 by bugdroid1@chromium.org, Apr 11 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/d199909475b03ef9b3065703085751917be18f60

commit d199909475b03ef9b3065703085751917be18f60
Author: Johannes Berg <johannes.berg@intel.com>
Date: Wed Apr 11 11:38:35 2018

UPSTREAM: mac80211: refactor HT/VHT to chandef code

The station MLME and IBSS/mesh ones use entirely different
code for interpreting HT and VHT operation elements. Change
the code that interprets them a bit - it now modifies an
existing chandef - and use it also in the MLME code.

Signed-off-by: Johannes Berg <johannes.berg@intel.com>
(cherry picked from commit 8ac3c70419176b0fbc4aeae30de661f690b2e3ae)

BUG= chromium:828485 
TEST=None

Change-Id: I80e33aa07a99f9bdf2d872e63980e981415edc7a
Reviewed-on: https://chromium-review.googlesource.com/993768
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Brian Norris <briannorris@chromium.org>

[modify] https://crrev.com/d199909475b03ef9b3065703085751917be18f60/net/mac80211/util.c
[modify] https://crrev.com/d199909475b03ef9b3065703085751917be18f60/net/mac80211/mlme.c
[modify] https://crrev.com/d199909475b03ef9b3065703085751917be18f60/net/mac80211/ieee80211_i.h
[modify] https://crrev.com/d199909475b03ef9b3065703085751917be18f60/net/mac80211/ibss.c
[modify] https://crrev.com/d199909475b03ef9b3065703085751917be18f60/net/mac80211/mesh.c

Project Member

Comment 23 by bugdroid1@chromium.org, Apr 11 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/1d6c9562a5d173a76669fab8ea51f0ccfefb0a46

commit 1d6c9562a5d173a76669fab8ea51f0ccfefb0a46
Author: Sara Sharon <sara.sharon@intel.com>
Date: Wed Apr 11 11:38:38 2018

UPSTREAM: mac80211: provide interface to driver to set VHT MU-MIMO data

Provide an interface to the lower level driver to set the VHT
MU-MIMO data. This is needed for example when there is an update
of the group data during low power state, where the management
frame will not be passed to the host at all.

Signed-off-by: Sara Sharon <sara.sharon@intel.com>
Signed-off-by: Emmanuel Grumbach <emmanuel.grumbach@intel.com>
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
(cherry picked from commit 65554d07adfc22bb9e14f6df8c609a646f869a74)

BUG= chromium:828485 
TEST=None

Change-Id: I83db02c520722ea6e1c80909468d200c2170395e
Reviewed-on: https://chromium-review.googlesource.com/993769
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Brian Norris <briannorris@chromium.org>

[modify] https://crrev.com/1d6c9562a5d173a76669fab8ea51f0ccfefb0a46/net/mac80211/vht.c
[modify] https://crrev.com/1d6c9562a5d173a76669fab8ea51f0ccfefb0a46/include/net/mac80211.h

Project Member

Comment 24 by bugdroid1@chromium.org, Apr 11 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/b201a241a8b35b3056f21425fed179ce27cd8a7e

commit b201a241a8b35b3056f21425fed179ce27cd8a7e
Author: Sara Sharon <sara.sharon@intel.com>
Date: Wed Apr 11 11:38:40 2018

UPSTREAM: mac80211: move MU_MIMO_OWNER flag to ieee80211_vif

Drivers may need to track which vif is using VHT MU-MIMO.
Move the flag indicationg the ownership of MU_MIMO to
ieee80211_vif.

Signed-off-by: Sara Sharon <sara.sharon@intel.com>
Signed-off-by: Emmanuel Grumbach <emmanuel.grumbach@intel.com>
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
(cherry picked from commit b5a33d52595f0cb153f09bf45a5dcd66a7418dbb)

BUG= chromium:828485 
TEST=None

Change-Id: Id742a91933c44366f1575525edbca686fdf7965a
Reviewed-on: https://chromium-review.googlesource.com/993770
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Brian Norris <briannorris@chromium.org>

[modify] https://crrev.com/b201a241a8b35b3056f21425fed179ce27cd8a7e/net/mac80211/util.c
[modify] https://crrev.com/b201a241a8b35b3056f21425fed179ce27cd8a7e/net/mac80211/mlme.c
[modify] https://crrev.com/b201a241a8b35b3056f21425fed179ce27cd8a7e/net/mac80211/ieee80211_i.h
[modify] https://crrev.com/b201a241a8b35b3056f21425fed179ce27cd8a7e/net/mac80211/vht.c
[modify] https://crrev.com/b201a241a8b35b3056f21425fed179ce27cd8a7e/include/net/mac80211.h

Project Member

Comment 25 by bugdroid1@chromium.org, Apr 11 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/3870cad52ced17b869b0af616aa733c6ac354397

commit 3870cad52ced17b869b0af616aa733c6ac354397
Author: Eric Dumazet <edumazet@google.com>
Date: Wed Apr 11 11:38:42 2018

UPSTREAM: net/rtnetlink: add IFLA_GSO_MAX_SEGS and IFLA_GSO_MAX_SIZE attributes

It can be useful to report dev->gso_max_segs and dev->gso_max_size
so that "ip -d link" can display them to help debugging.

For the moment, these attributes are read-only.

Signed-off-by: Eric Dumazet <edumazet@google.com>
Cc: Petri Gynther <pgynther@google.com>
Cc: Stephen Hemminger <stephen@networkplumber.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
(cherry picked from commit c70ce028e834f8e51306217dbdbd441d851c64d3)

BUG= chromium:828485 
TEST=None

Change-Id: I76e4260f833bb729858aed8f2f50e7f2b5aebfc0
Reviewed-on: https://chromium-review.googlesource.com/994703
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Brian Norris <briannorris@chromium.org>

[modify] https://crrev.com/3870cad52ced17b869b0af616aa733c6ac354397/net/core/rtnetlink.c
[modify] https://crrev.com/3870cad52ced17b869b0af616aa733c6ac354397/include/uapi/linux/if_link.h

Project Member

Comment 26 by bugdroid1@chromium.org, Apr 11 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/336ca4fde4ff0e06a01e6f73070b1d7a1c718699

commit 336ca4fde4ff0e06a01e6f73070b1d7a1c718699
Author: Sara Sharon <sara.sharon@intel.com>
Date: Wed Apr 11 11:38:33 2018

UPSTREAM: mac80211: fix VHT MU-MIMO frame processing

The source and destintation addresses in the memcpy arguments
are flipped. Fix that.

Fixes: 23a1f8d44c0b("mac80211: process and save VHT MU-MIMO group frame")
Signed-off-by: Sara Sharon <sara.sharon@intel.com>
Signed-off-by: Emmanuel Grumbach <emmanuel.grumbach@intel.com>
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
(cherry picked from commit 0241fa19ef4021c3db6f70b8f08d69f9e21cc043)

BUG= chromium:828485 
TEST=build on eve and kevin

Change-Id: I917a59f2766aec364d0fbd87845b2891e4cd3cb5
Reviewed-on: https://chromium-review.googlesource.com/997030
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Brian Norris <briannorris@chromium.org>

[modify] https://crrev.com/336ca4fde4ff0e06a01e6f73070b1d7a1c718699/net/mac80211/vht.c

Project Member

Comment 27 by bugdroid1@chromium.org, Apr 12 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/eaf319bc673af8ac961e7c7566d398bd17386bb7

commit eaf319bc673af8ac961e7c7566d398bd17386bb7
Author: Mohammed Shafi Shajakhan <mohammed@qti.qualcomm.com>
Date: Thu Apr 12 01:06:38 2018

UPSTREAM: cfg80211/nl80211: Add support for NL80211_STA_INFO_RX_DURATION

Add support for the a station statistics netlink attribute:
NL80211_STA_INFO_RX_DURATION.

If present, this attribute contains the aggregate PPDU duration (in
microseconds) for all the frames from the peer. This is useful to
help understand the total time spent transmitting to us by all of
the connected peers.

Signed-off-by: Mohammed Shafi Shajakhan <mohammed@qti.qualcomm.com>
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
(cherry picked from commit 739960f128e5a1f251659a4430a8898087701099)

BUG= chromium:828485 
TEST=build on eve and kevin

Change-Id: I4d9e3176863b6719f4bbd86d5b10045350134ee9
Reviewed-on: https://chromium-review.googlesource.com/1004125
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Brian Norris <briannorris@chromium.org>

[modify] https://crrev.com/eaf319bc673af8ac961e7c7566d398bd17386bb7/include/uapi/linux/nl80211.h
[modify] https://crrev.com/eaf319bc673af8ac961e7c7566d398bd17386bb7/net/wireless/nl80211.c
[modify] https://crrev.com/eaf319bc673af8ac961e7c7566d398bd17386bb7/include/net/cfg80211.h

Project Member

Comment 28 by bugdroid1@chromium.org, Apr 12 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/a5edf349aea287e75f4d45215833220bbe5986d1

commit a5edf349aea287e75f4d45215833220bbe5986d1
Author: Johannes Berg <johannes.berg@intel.com>
Date: Thu Apr 12 01:06:40 2018

UPSTREAM: nl80211: use nla_put_u64_64bit() for the remaining u64 attributes

Nicolas converted most users, but didn't realize some were generated
by macros. Convert those over as well.

Signed-off-by: Johannes Berg <johannes.berg@intel.com>
Acked-by: Nicolas Dichtel <nicolas.dichtel@6wind.com>
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
(cherry picked from commit d686b920abb7136e0575ec974cd5a24f51a7a549)

BUG= chromium:828485 
TEST=build on eve and kevin

Change-Id: Ie7cc54f817add351e76c59e118c685c5070c4625
Reviewed-on: https://chromium-review.googlesource.com/1004126
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Brian Norris <briannorris@chromium.org>

[modify] https://crrev.com/a5edf349aea287e75f4d45215833220bbe5986d1/include/uapi/linux/nl80211.h
[modify] https://crrev.com/a5edf349aea287e75f4d45215833220bbe5986d1/net/wireless/nl80211.c

Project Member

Comment 29 by bugdroid1@chromium.org, Apr 12 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/86adff6bf02a9d6216be45b1fbc18f0f47aa6267

commit 86adff6bf02a9d6216be45b1fbc18f0f47aa6267
Author: Vladimir Kondratiev <qca_vkondrat@qca.qualcomm.com>
Date: Thu Apr 12 01:06:52 2018

BACKPORT: wil6210: Bring up to speed for beacon report scanning

This is a squashed commit of 45 commits in ath/wil6210 to bring the
driver up-to-speed to pick up commit 1d76250bd34a ("nl80211: support beacon report scanning")
required by chromium:828485.

Below is a shortlog of all patches picked up.

Dan Carpenter (1):
      wil6210: fix a warning message condition

Dedy Lansky (1):
      wil6210: p2p initial support

Hamad Kadmany (3):
      wil6210: fix kernel OOPS when stopping interface during Rx traffic
      wil6210: TX vring optimization
      wil6210: Set permanent MAC address to wiphy

Lior David (15):
      wil6210: support for platform specific crash recovery
      wil6210: fix privacy flag calculation in change_beacon
      wil6210: use extra IEs from probe response
      wil6210: add support for discovery mode during scan
      wil6210: switch to generated wmi.h
      wil6210: basic PBSS/PCP support
      wil6210: P2P_DEVICE virtual interface support
      wil6210: fix race conditions in p2p listen and search
      wil6210: clean ioctl debug message
      wil6210: fix no_fw_recovery mode with change_virtual_intf
      wil6210: pass is_go flag to firmware
      wil6210: add oob_mode module parameter
      wil6210: allow empty WMI commands in debugfs wmi_send
      wil6210: support regular scan on P2P_DEVICE interface
      wil6210: abort P2P search when stopping P2P device

Maya Erez (22):
      wil6210: prevent external wmi commands during suspend flow
      wil6210: handle tx completions only if vring tx data is enabled
      wil6210: find TX vring only if vring_tx_data is enabled
      wil6210: handle multiple connect/disconnect events
      wil6210: prevent access to vring_tx_data lock during its init
      wil6210: protect synchronous wmi commands handling
      wil6210: remove BACK RX and TX workers
      wil6210: AP: prevent connecting to already connected station
      wil6210: add support for platform specific notification events
      wil6210: add function name to wil log macros
      wil6210: change RX_HTRSH interrupt print level to debug
      wil6210: print debug message when transmitting while disconnected
      wil6210: unmask RX_HTRSH interrupt only when connected
      wil6210: prevent deep sleep of 60G device in critical paths
      wil6210: add support for device led configuration
      wil6210: fix race conditions between TX send and completion
      wil6210: guarantee safe access to rx descriptors shared memory
      wil6210: protect wil_vring_fini_tx in parallel to tx completions
      wil6210: fix dma mapping error cleanup in __wil_tx_vring_tso
      wil6210: add pm_notify handling
      wil6210: align wil log functions to wil_dbg_ratelimited implementation
      wil6210: fix chan check in wil_p2p_listen

Vladimir Kondratiev (3):
      wil6210: hold wil->mutex while managing vrings
      wil6210: wait for disconnect completion
      wil6210: replay attack detection

BUG= chromium:828485 
TEST=build on eve and kevin

Change-Id: Ifd5f3ade32973280540cd4e318c2682c6bdc4d58
Reviewed-on: https://chromium-review.googlesource.com/1004127
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Kirtika Ruchandani <kirtika@chromium.org>

[modify] https://crrev.com/86adff6bf02a9d6216be45b1fbc18f0f47aa6267/drivers/net/wireless/ath/wil6210/wil_crash_dump.c
[modify] https://crrev.com/86adff6bf02a9d6216be45b1fbc18f0f47aa6267/drivers/net/wireless/ath/wil6210/cfg80211.c
[modify] https://crrev.com/86adff6bf02a9d6216be45b1fbc18f0f47aa6267/drivers/net/wireless/ath/wil6210/txrx.h
[modify] https://crrev.com/86adff6bf02a9d6216be45b1fbc18f0f47aa6267/drivers/net/wireless/ath/wil6210/debug.c
[modify] https://crrev.com/86adff6bf02a9d6216be45b1fbc18f0f47aa6267/drivers/net/wireless/ath/wil6210/pm.c
[modify] https://crrev.com/86adff6bf02a9d6216be45b1fbc18f0f47aa6267/drivers/net/wireless/ath/wil6210/ioctl.c
[modify] https://crrev.com/86adff6bf02a9d6216be45b1fbc18f0f47aa6267/drivers/net/wireless/ath/wil6210/pcie_bus.c
[modify] https://crrev.com/86adff6bf02a9d6216be45b1fbc18f0f47aa6267/drivers/net/wireless/ath/wil6210/txrx.c
[modify] https://crrev.com/86adff6bf02a9d6216be45b1fbc18f0f47aa6267/drivers/net/wireless/ath/wil6210/main.c
[modify] https://crrev.com/86adff6bf02a9d6216be45b1fbc18f0f47aa6267/drivers/net/wireless/ath/wil6210/wil_platform.h
[modify] https://crrev.com/86adff6bf02a9d6216be45b1fbc18f0f47aa6267/drivers/net/wireless/ath/wil6210/rx_reorder.c
[modify] https://crrev.com/86adff6bf02a9d6216be45b1fbc18f0f47aa6267/drivers/net/wireless/ath/wil6210/wil6210.h
[modify] https://crrev.com/86adff6bf02a9d6216be45b1fbc18f0f47aa6267/drivers/net/wireless/ath/wil6210/wmi.h
[add] https://crrev.com/86adff6bf02a9d6216be45b1fbc18f0f47aa6267/drivers/net/wireless/ath/wil6210/p2p.c
[modify] https://crrev.com/86adff6bf02a9d6216be45b1fbc18f0f47aa6267/drivers/net/wireless/ath/wil6210/netdev.c
[modify] https://crrev.com/86adff6bf02a9d6216be45b1fbc18f0f47aa6267/drivers/net/wireless/ath/wil6210/Makefile
[modify] https://crrev.com/86adff6bf02a9d6216be45b1fbc18f0f47aa6267/drivers/net/wireless/ath/wil6210/wmi.c
[modify] https://crrev.com/86adff6bf02a9d6216be45b1fbc18f0f47aa6267/drivers/net/wireless/ath/wil6210/interrupt.c
[modify] https://crrev.com/86adff6bf02a9d6216be45b1fbc18f0f47aa6267/drivers/net/wireless/ath/wil6210/debugfs.c
[modify] https://crrev.com/86adff6bf02a9d6216be45b1fbc18f0f47aa6267/drivers/net/wireless/ath/wil6210/trace.h
[modify] https://crrev.com/86adff6bf02a9d6216be45b1fbc18f0f47aa6267/drivers/net/wireless/ath/wil6210/wil_platform.c

Project Member

Comment 30 by bugdroid1@chromium.org, Apr 12 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/50354c36818bebcb19aad3704312ce27cffc879d

commit 50354c36818bebcb19aad3704312ce27cffc879d
Author: Avraham Stern <avraham.stern@intel.com>
Date: Thu Apr 12 01:06:55 2018

BACKPORT: nl80211: support beacon report scanning

Beacon report radio measurement requires reporting observed BSSs
on the channels specified in the beacon request. If the measurement
mode is set to passive or active, it requires actually performing a
scan (passive or active, accordingly), and reporting the time that
the scan was started and the time each beacon/probe was received
(both in terms of TSF of the BSS of the requesting AP). If the
request mode is table, this information is optional.
In addition, the radio measurement request specifies the channel
dwell time for the measurement.

In order to use scan for beacon report when the mode is active or
passive, add a parameter to scan request that specifies the
channel dwell time, and add scan start time and beacon received time
to scan results information.

Supporting beacon report is required for Multi Band Operation (MBO).

Signed-off-by: Assaf Krauss <assaf.krauss@intel.com>
Signed-off-by: David Spinadel <david.spinadel@intel.com>
Signed-off-by: Avraham Stern <avraham.stern@intel.com>
Signed-off-by: Luca Coelho <luciano.coelho@intel.com>
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
(cherry picked from commit 1d76250bd34af86c6498fc51e50cab3bfbbeceaa)

 Conflicts:
	drivers/net/wireless/marvell/mwifiex/cmdevt.c
	drivers/staging/wilc1000/wilc_wfi_cfgoperations.c
        (manual addition) drivers/net/wireless/ar10k/mac80211/scan.c

kirtika@: Manual wiggling to populate struct cfg80211_scan_info
before a cfg80211_scan_done calls in both these drivers, without
changing anything else.

BUG= chromium:828485 
TEST=build on eve and kevin

Change-Id: I0f4f8f4bf3e4fca5c4c81ed6ff862bc6a835a477
Reviewed-on: https://chromium-review.googlesource.com/1004128
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Kirtika Ruchandani <kirtika@chromium.org>

[modify] https://crrev.com/50354c36818bebcb19aad3704312ce27cffc879d/include/uapi/linux/nl80211.h
[modify] https://crrev.com/50354c36818bebcb19aad3704312ce27cffc879d/drivers/net/wireless/ath/wil6210/p2p.c
[modify] https://crrev.com/50354c36818bebcb19aad3704312ce27cffc879d/drivers/net/wireless/marvell/mwifiex/scan.c
[modify] https://crrev.com/50354c36818bebcb19aad3704312ce27cffc879d/drivers/net/wireless/marvell/libertas/cfg.c
[modify] https://crrev.com/50354c36818bebcb19aad3704312ce27cffc879d/net/wireless/nl80211.c
[modify] https://crrev.com/50354c36818bebcb19aad3704312ce27cffc879d/drivers/staging/rtl8723au/os_dep/ioctl_cfg80211.c
[modify] https://crrev.com/50354c36818bebcb19aad3704312ce27cffc879d/drivers/net/wireless/ath/wil6210/wmi.c
[modify] https://crrev.com/50354c36818bebcb19aad3704312ce27cffc879d/drivers/staging/wilc1000/wilc_wfi_cfgoperations.c
[modify] https://crrev.com/50354c36818bebcb19aad3704312ce27cffc879d/drivers/staging/wlan-ng/cfg80211.c
[modify] https://crrev.com/50354c36818bebcb19aad3704312ce27cffc879d/drivers/net/wireless/ath/wil6210/main.c
[modify] https://crrev.com/50354c36818bebcb19aad3704312ce27cffc879d/drivers/net/wireless/ath/ath6kl/cfg80211.c
[modify] https://crrev.com/50354c36818bebcb19aad3704312ce27cffc879d/drivers/net/wireless/rndis_wlan.c
[modify] https://crrev.com/50354c36818bebcb19aad3704312ce27cffc879d/net/mac80211/scan.c
[modify] https://crrev.com/50354c36818bebcb19aad3704312ce27cffc879d/net/wireless/scan.c
[modify] https://crrev.com/50354c36818bebcb19aad3704312ce27cffc879d/drivers/net/wireless/intersil/orinoco/scan.c
[modify] https://crrev.com/50354c36818bebcb19aad3704312ce27cffc879d/net/wireless/trace.h
[modify] https://crrev.com/50354c36818bebcb19aad3704312ce27cffc879d/include/net/cfg80211.h
[modify] https://crrev.com/50354c36818bebcb19aad3704312ce27cffc879d/drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c
[modify] https://crrev.com/50354c36818bebcb19aad3704312ce27cffc879d/drivers/net/wireless/marvell/mwifiex/main.c
[modify] https://crrev.com/50354c36818bebcb19aad3704312ce27cffc879d/drivers/net/wireless/ath/wil6210/cfg80211.c
[modify] https://crrev.com/50354c36818bebcb19aad3704312ce27cffc879d/drivers/net/wireless/ar10k/mac80211/scan.c
[modify] https://crrev.com/50354c36818bebcb19aad3704312ce27cffc879d/net/wireless/core.h
[modify] https://crrev.com/50354c36818bebcb19aad3704312ce27cffc879d/net/wireless/core.c

Project Member

Comment 31 by bugdroid1@chromium.org, Apr 12 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/3be6e88d185f38fbbdd08bd367782b31db9610cb

commit 3be6e88d185f38fbbdd08bd367782b31db9610cb
Author: Masashi Honma <masashi.honma@gmail.com>
Date: Thu Apr 12 01:07:09 2018

UPSTREAM: cfg80211: Add mesh peer AID setting API

Previously, mesh power management functionality works only with kernel
MPM. Because user space MPM did not report mesh peer AID to kernel,
the kernel could not identify the bit in TIM element. So this patch
adds mesh peer AID setting API.

Signed-off-by: Masashi Honma <masashi.honma@gmail.com>
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
(cherry picked from commit 7d27a0ba7adc8ef30c2aae7592fce4c162aee4df)

BUG= chromium:828485 
TEST=build on eve and kevin

Change-Id: I176d5faef29f0933efc82e7657a6fb34b9a5c561
Reviewed-on: https://chromium-review.googlesource.com/1004131
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Brian Norris <briannorris@chromium.org>

[modify] https://crrev.com/3be6e88d185f38fbbdd08bd367782b31db9610cb/include/uapi/linux/nl80211.h
[modify] https://crrev.com/3be6e88d185f38fbbdd08bd367782b31db9610cb/net/mac80211/cfg.c
[modify] https://crrev.com/3be6e88d185f38fbbdd08bd367782b31db9610cb/net/wireless/nl80211.c
[modify] https://crrev.com/3be6e88d185f38fbbdd08bd367782b31db9610cb/include/net/cfg80211.h

Project Member

Comment 32 by bugdroid1@chromium.org, Apr 12 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/dbd0e371d760ca1d1a4d9847bfc059d68275c98f

commit dbd0e371d760ca1d1a4d9847bfc059d68275c98f
Author: Ayala Beker <ayala.beker@intel.com>
Date: Thu Apr 12 01:07:11 2018

UPSTREAM: cfg80211: add start / stop NAN commands

This allows user space to start/stop NAN interface.
A NAN interface is like P2P device in a few aspects: it
doesn't have a netdev associated to it.
Add the new interface type and prevent operations that
can't be executed on NAN interface like scan.

Define several attributes that may be configured by user space
when starting NAN functionality (master preference and dual
band operation)

Signed-off-by: Andrei Otcheretianski <andrei.otcheretianski@intel.com>
Signed-off-by: Emmanuel Grumbach <emmanuel.grumbach@intel.com>
Signed-off-by: Luca Coelho <luciano.coelho@intel.com>
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
(cherry picked from commit cb3b7d87652aeb37cfb5295a6157a3280dae10cb)

CQ-DEPEND=CL:1004269
BUG= chromium:828485 
TEST=build on eve and kevin

Change-Id: I940361c6eca818bfc9c62220137bf6659cf00061
Reviewed-on: https://chromium-review.googlesource.com/1004254
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Kirtika Ruchandani <kirtika@chromium.org>

[modify] https://crrev.com/dbd0e371d760ca1d1a4d9847bfc059d68275c98f/net/wireless/mlme.c
[modify] https://crrev.com/dbd0e371d760ca1d1a4d9847bfc059d68275c98f/include/uapi/linux/nl80211.h
[modify] https://crrev.com/dbd0e371d760ca1d1a4d9847bfc059d68275c98f/net/mac80211/iface.c
[modify] https://crrev.com/dbd0e371d760ca1d1a4d9847bfc059d68275c98f/net/wireless/core.h
[modify] https://crrev.com/dbd0e371d760ca1d1a4d9847bfc059d68275c98f/net/mac80211/util.c
[modify] https://crrev.com/dbd0e371d760ca1d1a4d9847bfc059d68275c98f/net/wireless/util.c
[modify] https://crrev.com/dbd0e371d760ca1d1a4d9847bfc059d68275c98f/net/mac80211/offchannel.c
[modify] https://crrev.com/dbd0e371d760ca1d1a4d9847bfc059d68275c98f/net/wireless/core.c
[modify] https://crrev.com/dbd0e371d760ca1d1a4d9847bfc059d68275c98f/net/mac80211/rx.c
[modify] https://crrev.com/dbd0e371d760ca1d1a4d9847bfc059d68275c98f/net/wireless/rdev-ops.h
[modify] https://crrev.com/dbd0e371d760ca1d1a4d9847bfc059d68275c98f/net/mac80211/cfg.c
[modify] https://crrev.com/dbd0e371d760ca1d1a4d9847bfc059d68275c98f/net/wireless/nl80211.c
[modify] https://crrev.com/dbd0e371d760ca1d1a4d9847bfc059d68275c98f/include/net/cfg80211.h
[modify] https://crrev.com/dbd0e371d760ca1d1a4d9847bfc059d68275c98f/net/wireless/trace.h
[modify] https://crrev.com/dbd0e371d760ca1d1a4d9847bfc059d68275c98f/net/wireless/chan.c
[modify] https://crrev.com/dbd0e371d760ca1d1a4d9847bfc059d68275c98f/net/mac80211/chan.c

Project Member

Comment 33 by bugdroid1@chromium.org, Apr 12 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/48516c81d89802000705b04563613c35b6afba1f

commit 48516c81d89802000705b04563613c35b6afba1f
Author: Ayala Beker <ayala.beker@intel.com>
Date: Thu Apr 12 01:07:15 2018

UPSTREAM: cfg80211: add add_nan_func / del_nan_func

A NAN function can be either publish, subscribe or follow
up. Make all the necessary verifications and just pass the
request to the driver.
Allow the user space application that starts NAN to
forbid any other socket to add or remove functions.

Signed-off-by: Andrei Otcheretianski <andrei.otcheretianski@intel.com>
Signed-off-by: Emmanuel Grumbach <emmanuel.grumbach@intel.com>
Signed-off-by: Ayala Beker <ayala.beker@intel.com>
Signed-off-by: Luca Coelho <luciano.coelho@intel.com>
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
(cherry picked from commit a442b761b24b6886f9a4e2ff5f8cb4824c96526b)

BUG= chromium:828485 
TEST=build on eve and kevin

Change-Id: I07ba0af71a3fe0dbec9f6d2bd29c9d5f98900172
Reviewed-on: https://chromium-review.googlesource.com/1004255
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Kirtika Ruchandani <kirtika@chromium.org>

[modify] https://crrev.com/48516c81d89802000705b04563613c35b6afba1f/include/uapi/linux/nl80211.h
[modify] https://crrev.com/48516c81d89802000705b04563613c35b6afba1f/net/wireless/util.c
[modify] https://crrev.com/48516c81d89802000705b04563613c35b6afba1f/net/wireless/core.c
[modify] https://crrev.com/48516c81d89802000705b04563613c35b6afba1f/net/wireless/rdev-ops.h
[modify] https://crrev.com/48516c81d89802000705b04563613c35b6afba1f/net/wireless/nl80211.c
[modify] https://crrev.com/48516c81d89802000705b04563613c35b6afba1f/include/net/cfg80211.h
[modify] https://crrev.com/48516c81d89802000705b04563613c35b6afba1f/net/wireless/trace.h

Project Member

Comment 34 by bugdroid1@chromium.org, Apr 12 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/7bfb96eb0c8b829231505a1242d0ba864b407d76

commit 7bfb96eb0c8b829231505a1242d0ba864b407d76
Author: Ayala Beker <ayala.beker@intel.com>
Date: Thu Apr 12 01:07:18 2018

UPSTREAM: cfg80211: allow the user space to change current NAN configuration

Some NAN configuration paramaters may change during the operation of
the NAN device. For example, a user may want to update master preference
value when the device gets plugged/unplugged to the power.
Add API that allows to do so.

Signed-off-by: Andrei Otcheretianski <andrei.otcheretianski@intel.com>
Signed-off-by: Emmanuel Grumbach <emmanuel.grumbach@intel.com>
Signed-off-by: Luca Coelho <luciano.coelho@intel.com>
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
(cherry picked from commit a5a9dcf291e1e541243878eed2d73a74006fa1f1)

BUG= chromium:828485 
TEST=build on eve and kevin

Change-Id: I2fc3b42a03336495462ec0f1a90fce197708a7e0
Reviewed-on: https://chromium-review.googlesource.com/1004256
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Kirtika Ruchandani <kirtika@chromium.org>

[modify] https://crrev.com/7bfb96eb0c8b829231505a1242d0ba864b407d76/net/wireless/trace.h
[modify] https://crrev.com/7bfb96eb0c8b829231505a1242d0ba864b407d76/net/wireless/rdev-ops.h
[modify] https://crrev.com/7bfb96eb0c8b829231505a1242d0ba864b407d76/include/uapi/linux/nl80211.h
[modify] https://crrev.com/7bfb96eb0c8b829231505a1242d0ba864b407d76/net/wireless/nl80211.c
[modify] https://crrev.com/7bfb96eb0c8b829231505a1242d0ba864b407d76/include/net/cfg80211.h

Project Member

Comment 35 by bugdroid1@chromium.org, Apr 12 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/28ca26664687616b8cd133968c0570e2a45d9816

commit 28ca26664687616b8cd133968c0570e2a45d9816
Author: Ayala Beker <ayala.beker@intel.com>
Date: Thu Apr 12 01:07:20 2018

UPSTREAM: cfg80211: provide a function to report a match for NAN

Provide a function the driver can call to report a match.
This will send the event to the user space.
If the NAN instance is tied to the owner, the notifications will be
sent to the socket that started the NAN interface only.

Signed-off-by: Andrei Otcheretianski <andrei.otcheretianski@intel.com>
Signed-off-by: Emmanuel Grumbach <emmanuel.grumbach@intel.com>
Signed-off-by: Luca Coelho <luciano.coelho@intel.com>
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
(cherry picked from commit 50bcd31d9992e99c231820f5276e70346cbfbc51)

BUG= chromium:828485 
TEST=build on eve and kevin

Change-Id: I4ecc284e54986d7a7a344c7012166e3bdffea46f
Reviewed-on: https://chromium-review.googlesource.com/1004257
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Kirtika Ruchandani <kirtika@chromium.org>

[modify] https://crrev.com/28ca26664687616b8cd133968c0570e2a45d9816/include/uapi/linux/nl80211.h
[modify] https://crrev.com/28ca26664687616b8cd133968c0570e2a45d9816/net/wireless/nl80211.c
[modify] https://crrev.com/28ca26664687616b8cd133968c0570e2a45d9816/include/net/cfg80211.h

Project Member

Comment 36 by bugdroid1@chromium.org, Apr 12 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/7a9f67e55d01bb6bc17054efe04441a89b0bd056

commit 7a9f67e55d01bb6bc17054efe04441a89b0bd056
Author: Ayala Beker <ayala.beker@intel.com>
Date: Thu Apr 12 01:07:22 2018

UPSTREAM: cfg80211: Provide an API to report NAN function termination

Provide a function that reports NAN DE function termination. The function
may be terminated due to one of the following reasons: user request,
ttl expiration or failure.
If the NAN instance is tied to the owner, the notification will be
sent to the socket that started the NAN interface only

Signed-off-by: Andrei Otcheretianski <andrei.otcheretianski@intel.com>
Signed-off-by: Emmanuel Grumbach <emmanuel.grumbach@intel.com>
Signed-off-by: Luca Coelho <luciano.coelho@intel.com>
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
(cherry picked from commit 368e5a7b4ecb71b3d347799cb9351b0dce5dec70)

BUG= chromium:828485 
TEST=build on eve and kevin

Change-Id: Ibcec3fa86f2c573f8f007a4f2bab828ea3a82561
Reviewed-on: https://chromium-review.googlesource.com/1004258
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Kirtika Ruchandani <kirtika@chromium.org>

[modify] https://crrev.com/7a9f67e55d01bb6bc17054efe04441a89b0bd056/include/uapi/linux/nl80211.h
[modify] https://crrev.com/7a9f67e55d01bb6bc17054efe04441a89b0bd056/net/wireless/nl80211.c
[modify] https://crrev.com/7a9f67e55d01bb6bc17054efe04441a89b0bd056/include/net/cfg80211.h

Project Member

Comment 37 by bugdroid1@chromium.org, Apr 12 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/31f246ded9d2471c864477115907d12443ba637f

commit 31f246ded9d2471c864477115907d12443ba637f
Author: Denis Kenzior <denkenz@gmail.com>
Date: Thu Apr 12 01:07:25 2018

UPSTREAM: cfg80211: always notify userspace of new wireless netdevs

This change alters the semantics of NL80211_CMD_NEW_INTERFACE events
by always sending this event whenever a new net_device object
associated with a wdev is registered.  Prior to this change, this event
was only sent as a result of NL80211_CMD_NEW_INTERFACE command sent
from userspace.  This allows userspace to reliably detect new wireless
interfaces (e.g. due to hardware hot-plug events, etc).

For wdevs created without an associated net_device object (e.g.
NL80211_IFTYPE_P2P_DEVICE), the NL80211_CMD_NEW_INTERFACE event is
still generated inside the relevant nl80211 command handler.

Signed-off-by: Denis Kenzior <denkenz@gmail.com>
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
(cherry picked from commit 896ff0635a312022c91e2bef30c80abc27af62e8)

BUG= chromium:828485 
TEST=build on eve and kevin

Change-Id: Ie089ab2e448c89a13a97d75af9d291ce38db869b
Reviewed-on: https://chromium-review.googlesource.com/1004259
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Brian Norris <briannorris@chromium.org>

[modify] https://crrev.com/31f246ded9d2471c864477115907d12443ba637f/net/wireless/nl80211.c
[modify] https://crrev.com/31f246ded9d2471c864477115907d12443ba637f/net/wireless/core.c
[modify] https://crrev.com/31f246ded9d2471c864477115907d12443ba637f/net/wireless/nl80211.h

Project Member

Comment 38 by bugdroid1@chromium.org, Apr 12 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/ca160627afeff2db15aea397bda0ac4a139132db

commit ca160627afeff2db15aea397bda0ac4a139132db
Author: Denis Kenzior <denkenz@gmail.com>
Date: Thu Apr 12 01:07:27 2018

UPSTREAM: cfg80211: always notify userspace when wireless netdev is removed

This change alters the semantics of NL80211_CMD_DEL_INTERFACE events
by always sending this event whenever a net_device object associated
with a wdev is destroyed.  Prior to this change, this event was only
emitted as a result of NL80211_CMD_DEL_INTERFACE command sent from
userspace.  This allows userspace to reliably detect when wireless
interfaces have been removed, e.g. due to USB removal events, etc.

For wireless device objects without an associated net_device (e.g.
NL80211_IFTYPE_P2P_DEVICE), the NL80211_CMD_DEL_INTERFACE event is
now generated inside cfg80211_unregister_wdev.

Signed-off-by: Denis Kenzior <denkenz@gmail.com>
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
(cherry picked from commit 7f8ed01ea5d4d9d4acc3bb046de1fc84ac83a5e2)

BUG= chromium:828485 
TEST=build on eve and kevin

Change-Id: I47f6df4c03839c9a87e61523e0e7a81fe99fbb8b
Reviewed-on: https://chromium-review.googlesource.com/1004260
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Brian Norris <briannorris@chromium.org>

[modify] https://crrev.com/ca160627afeff2db15aea397bda0ac4a139132db/net/wireless/nl80211.c
[modify] https://crrev.com/ca160627afeff2db15aea397bda0ac4a139132db/net/wireless/core.c

Project Member

Comment 39 by bugdroid1@chromium.org, Apr 12 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/c6c911f96ee97523538675f7c02a6db088ca33bd

commit c6c911f96ee97523538675f7c02a6db088ca33bd
Author: Purushottam Kushwaha <pkushwah@qti.qualcomm.com>
Date: Thu Apr 12 01:07:30 2018

UPSTREAM: cfg80211: identically validate beacon interval for AP/MESH/IBSS

Beacon interval interface combinations validation was missing
for MESH/IBSS join, add those.

Johannes: also move the beacon interval check disallowing really
tiny and really big intervals into the common function, which
adds it for AP mode.

Signed-off-by: Purushottam Kushwaha <pkushwah@qti.qualcomm.com>
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
(cherry picked from commit 12d20fc9186a742d40e824f575df5aa62be31d69)

BUG= chromium:828485 
TEST=build on eve and kevin

Change-Id: Id2f46ad28bbd1e71dda32b87457e8ea5e2dd74e9
Reviewed-on: https://chromium-review.googlesource.com/1004261
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Brian Norris <briannorris@chromium.org>

[modify] https://crrev.com/c6c911f96ee97523538675f7c02a6db088ca33bd/net/wireless/util.c
[modify] https://crrev.com/c6c911f96ee97523538675f7c02a6db088ca33bd/net/wireless/nl80211.c

Project Member

Comment 40 by bugdroid1@chromium.org, Apr 12 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/fd7748fa595ec2fc2b15c66b95341ab66fdc8c7e

commit fd7748fa595ec2fc2b15c66b95341ab66fdc8c7e
Author: Purushottam Kushwaha <pkushwah@qti.qualcomm.com>
Date: Thu Apr 12 01:07:32 2018

UPSTREAM: cfg80211: pass struct to interface combination check/iter

Move the growing parameter list to a structure for the interface
combination check and iteration functions in cfg80211 and mac80211
to make the code easier to understand.

Signed-off-by: Purushottam Kushwaha <pkushwah@qti.qualcomm.com>
[edit commit message]
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
(cherry picked from commit e227300c8395dffaa7614ce7c7666a82180ebc60)

CQ-DEPEND=CL:1004270
BUG= chromium:828485 
TEST=build on eve and kevin

Change-Id: Iea4c8b07e4fd7cf42d15e3e42eafccb37f82f619
Reviewed-on: https://chromium-review.googlesource.com/1004263
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Kirtika Ruchandani <kirtika@chromium.org>

[modify] https://crrev.com/fd7748fa595ec2fc2b15c66b95341ab66fdc8c7e/net/mac80211/util.c
[modify] https://crrev.com/fd7748fa595ec2fc2b15c66b95341ab66fdc8c7e/net/wireless/util.c
[modify] https://crrev.com/fd7748fa595ec2fc2b15c66b95341ab66fdc8c7e/include/net/cfg80211.h
[modify] https://crrev.com/fd7748fa595ec2fc2b15c66b95341ab66fdc8c7e/drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c

Project Member

Comment 41 by bugdroid1@chromium.org, Apr 12 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/dc5e11b2ac390ac54d6319aadfeedea1aaf5909a

commit dc5e11b2ac390ac54d6319aadfeedea1aaf5909a
Author: Purushottam Kushwaha <pkushwah@qti.qualcomm.com>
Date: Thu Apr 12 01:07:37 2018

UPSTREAM: cfg80211: support virtual interfaces with different beacon intervals

This commit provides a mechanism for the host drivers to advertise the
support for different beacon intervals among the respective interface
combinations in a group, through NL80211_IFACE_COMB_BI_MIN_GCD (u32).

This value will be compared against GCD of all beaconing interfaces of
matching combinations.

If the driver doesn't advertise this value, the old behaviour where
all beacon intervals must be identical is retained.

If it is specified, then any beacon interval for an interface in the
interface combination as well as the GCD of all active beacon intervals
in the combination must be greater or equal to this value.

Signed-off-by: Purushottam Kushwaha <pkushwah@qti.qualcomm.com>
[change commit message, some variable names, small other things]
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
(cherry picked from commit 0c317a02ca982ca093e71bf07cb562265ba40032)

BUG= chromium:828485 
TEST=build on eve and kevin

Change-Id: Ie4cfcf406070622cbb08ff46dd85b4ba75a10f44
Reviewed-on: https://chromium-review.googlesource.com/1004264
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Kirtika Ruchandani <kirtika@chromium.org>

[modify] https://crrev.com/dc5e11b2ac390ac54d6319aadfeedea1aaf5909a/net/wireless/util.c
[modify] https://crrev.com/dc5e11b2ac390ac54d6319aadfeedea1aaf5909a/include/uapi/linux/nl80211.h
[modify] https://crrev.com/dc5e11b2ac390ac54d6319aadfeedea1aaf5909a/net/wireless/nl80211.c
[modify] https://crrev.com/dc5e11b2ac390ac54d6319aadfeedea1aaf5909a/include/net/cfg80211.h
[modify] https://crrev.com/dc5e11b2ac390ac54d6319aadfeedea1aaf5909a/net/wireless/core.h

Project Member

Comment 42 by bugdroid1@chromium.org, Apr 12 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/223db3ef1e8397607550ad497991df2a9fb80224

commit 223db3ef1e8397607550ad497991df2a9fb80224
Author: Jouni Malinen <jouni@qca.qualcomm.com>
Date: Thu Apr 12 01:07:39 2018

UPSTREAM: cfg80211: Add KEK/nonces for FILS association frames

The new nl80211 attributes can be used to provide KEK and nonces to
allow the driver to encrypt and decrypt FILS (Re)Association
Request/Response frames in station mode.

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
(cherry picked from commit 348bd456699801920a309c66e382380809fbdf41)

BUG= chromium:828485 
TEST=build on eve and kevin

Change-Id: Icebba34571f9c76365b7574a724ba1111be5a664
Reviewed-on: https://chromium-review.googlesource.com/1004265
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Kirtika Ruchandani <kirtika@chromium.org>

[modify] https://crrev.com/223db3ef1e8397607550ad497991df2a9fb80224/include/linux/ieee80211.h
[modify] https://crrev.com/223db3ef1e8397607550ad497991df2a9fb80224/include/uapi/linux/nl80211.h
[modify] https://crrev.com/223db3ef1e8397607550ad497991df2a9fb80224/net/wireless/nl80211.c
[modify] https://crrev.com/223db3ef1e8397607550ad497991df2a9fb80224/include/net/cfg80211.h

Project Member

Comment 43 by bugdroid1@chromium.org, Apr 12 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/c43a989ba9c70bd44d69e0811074ca3364585568

commit c43a989ba9c70bd44d69e0811074ca3364585568
Author: Michael Braun <michael-dev@fami-braun.de>
Date: Thu Apr 12 01:07:41 2018

BACKPORT: cfg80211: configure multicast to unicast for AP interfaces

Add the ability to configure if an AP (and associated VLANs) will
do multicast-to-unicast conversion for ARP, IPv4 and IPv6 frames
(possibly within 802.1Q). If enabled, such frames are to be sent
to each station separately, with the DA replaced by their own MAC
address rather than the group address.

Note that this may break certain expectations of the receiver,
such as the ability to drop unicast IP packets received within
multicast L2 frames, or the ability to not send ICMP destination
unreachable messages for packets received in L2 multicast (which
is required, but the receiver can't tell the difference if this
new option is enabled.)

This also doesn't implement the 802.11 DMS (directed multicast
service).

Signed-off-by: Michael Braun <michael-dev@fami-braun.de>
[fix disabling, add better documentation & commit message]
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
(cherry picked from commit ce0ce13a1c89ff8b94b7f8fb32eb4c43e111c82e)

kirtika@: "Backport" because GENL_UNS_ADMIN_PERM is not supported.
Change that to GENL_ADMIN_PERM. Supporting it would require picking
commit 5617c6cd6f84 ("nl80211: Allow privileged operations from user namespaces").

BUG= chromium:828485 
TEST=build on eve and kevin

Change-Id: I3952e5aaa32b467fb8c4ffeeb0cd739617ac20c2
Reviewed-on: https://chromium-review.googlesource.com/1004266
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Kirtika Ruchandani <kirtika@chromium.org>

[modify] https://crrev.com/c43a989ba9c70bd44d69e0811074ca3364585568/net/wireless/trace.h
[modify] https://crrev.com/c43a989ba9c70bd44d69e0811074ca3364585568/net/wireless/rdev-ops.h
[modify] https://crrev.com/c43a989ba9c70bd44d69e0811074ca3364585568/include/uapi/linux/nl80211.h
[modify] https://crrev.com/c43a989ba9c70bd44d69e0811074ca3364585568/net/wireless/nl80211.c
[modify] https://crrev.com/c43a989ba9c70bd44d69e0811074ca3364585568/include/net/cfg80211.h

Project Member

Comment 44 by bugdroid1@chromium.org, Apr 12 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/1137a5113013140249ba25ec5b5e0e1777a17b88

commit 1137a5113013140249ba25ec5b5e0e1777a17b88
Author: Vamsi Krishna <vamsin@qti.qualcomm.com>
Date: Thu Apr 12 01:07:44 2018

UPSTREAM: nl80211: Use different attrs for BSSID and random MAC addr in scan req

NL80211_ATTR_MAC was used to set both the specific BSSID to be scanned
and the random MAC address to be used when privacy is enabled. When both
the features are enabled, both the BSSID and the local MAC address were
getting same value causing Probe Request frames to go with unintended
DA. Hence, this has been fixed by using a different NL80211_ATTR_BSSID
attribute to set the specific BSSID (which was the more recent addition
in cfg80211) for a scan.

Backwards compatibility with old userspace software is maintained to
some extent by allowing NL80211_ATTR_MAC to be used to set the specific
BSSID when scanning without enabling random MAC address use.

Scanning with random source MAC address was introduced by commit
ad2b26abc157 ("cfg80211: allow drivers to support random MAC addresses
for scan") and the issue was introduced with the addition of the second
user for the same attribute in commit 818965d39177 ("cfg80211: Allow a
scan request for a specific BSSID").

Fixes: 818965d39177 ("cfg80211: Allow a scan request for a specific BSSID")
Signed-off-by: Vamsi Krishna <vamsin@qti.qualcomm.com>
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
(cherry picked from commit 2fa436b3a2a7009c11a3bc03fe0ff4c26e80fd87)

CQ-DEPEND=CL:989125
BUG= chromium:828485 
TEST=build on eve and kevin

Change-Id: I90496ef966ce0117b403044463870fa1599c5d84
Reviewed-on: https://chromium-review.googlesource.com/1004267
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Kirtika Ruchandani <kirtika@chromium.org>

[modify] https://crrev.com/1137a5113013140249ba25ec5b5e0e1777a17b88/include/uapi/linux/nl80211.h
[modify] https://crrev.com/1137a5113013140249ba25ec5b5e0e1777a17b88/net/wireless/nl80211.c

Project Member

Comment 45 by bugdroid1@chromium.org, Apr 12 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/8c5c5a8dbd604231e778b13d79acb950a728d0ad

commit 8c5c5a8dbd604231e778b13d79acb950a728d0ad
Author: Vasanthakumar Thiagarajan <vthiagar@qti.qualcomm.com>
Date: Thu Apr 12 01:07:46 2018

UPSTREAM: cfg80211: Make pre-CAC results valid only for ETSI domain

DFS requirement for ETSI domain (section 4.7.1.4 in
ETSI EN 301 893 V1.8.1) is the only one which explicitly
states that once DFS channel is marked as available afer
the CAC, this channel will remain in available state even
moving to a different operating channel. But the same is
not explicitly stated in FCC DFS requirement. Also, Pre-CAC
requriements are not explicitly mentioned in FCC requirement.
Current implementation in keeping DFS channel in available
state is same as described in ETSI domain.

For non-ETSI DFS domain, this patch gives a grace period of 2 seconds
since the completion of successful CAC before moving the channel's
DFS state to 'usable' from 'available' state. The same grace period
is checked against the channel's dfs_state_entered timestamp while
deciding if a DFS channel is available for operation. There is a new
radar event, NL80211_RADAR_PRE_CAC_EXPIRED, reported when DFS channel
is moved from available to usable state after the grace period. Also
make sure the DFS channel state is reset to usable once the beaconing
operation on that channel is brought down (like stop_ap, leave_ibss
and leave_mesh) in non-ETSI domain.

Signed-off-by: Vasanthakumar Thiagarajan <vthiagar@qti.qualcomm.com>
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
(cherry picked from commit b35a51c7dd25a823767969e3089542d7478777e9)

BUG= chromium:828485 
TEST=build on eve and kevin

Change-Id: If9fa97e443a12394395dd3ce8ef6ee1c78cc2d89
Reviewed-on: https://chromium-review.googlesource.com/1004268
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Brian Norris <briannorris@chromium.org>

[modify] https://crrev.com/8c5c5a8dbd604231e778b13d79acb950a728d0ad/include/uapi/linux/nl80211.h
[modify] https://crrev.com/8c5c5a8dbd604231e778b13d79acb950a728d0ad/net/wireless/core.h
[modify] https://crrev.com/8c5c5a8dbd604231e778b13d79acb950a728d0ad/net/wireless/ap.c
[modify] https://crrev.com/8c5c5a8dbd604231e778b13d79acb950a728d0ad/net/wireless/mesh.c
[modify] https://crrev.com/8c5c5a8dbd604231e778b13d79acb950a728d0ad/net/wireless/mlme.c
[modify] https://crrev.com/8c5c5a8dbd604231e778b13d79acb950a728d0ad/net/wireless/reg.c
[modify] https://crrev.com/8c5c5a8dbd604231e778b13d79acb950a728d0ad/net/wireless/ibss.c
[modify] https://crrev.com/8c5c5a8dbd604231e778b13d79acb950a728d0ad/net/wireless/chan.c
[modify] https://crrev.com/8c5c5a8dbd604231e778b13d79acb950a728d0ad/net/wireless/reg.h

Project Member

Comment 46 by bugdroid1@chromium.org, Apr 12 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/441dec78cb3dfedb77179a7f4eec38b4dd4e17b9

commit 441dec78cb3dfedb77179a7f4eec38b4dd4e17b9
Author: Kirtika Ruchandani <kirtika@google.com>
Date: Thu Apr 12 01:07:13 2018

CHROMIUM: ar10k: Add mac80211 support for NL80211_IFTYPE_NAN

This is a barebones addition to support enum NL80211_IFTYPE_NAN
in ar10k's mac80211.
Commit cb3b7d87652a ("cfg80211: add start / stop NAN commands")
introduces NL80211_IFTYPE_NAN in nl80211.h's uapi, and I think
having -Werror on the 4.4 kernel implies ar10k's mac80211 not
handling this enum entry will be a build breaker.
This CL takes the mac80211 specific parts of commit cb3b7d87652a
and applies them to ar10k's mac80211.

CQ-DEPEND=CL:1004254
BUG= chromium:828485 
TEST=build on eve and kevin

Change-Id: I0462e7cef45b51ae1c8ff31fad2fc3b2abd501ac
(cherry picked from commit 47335398e2a05daea51a3554c698d81fdee99f25)
Reviewed-on: https://chromium-review.googlesource.com/1004269
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Kirtika Ruchandani <kirtika@chromium.org>

[modify] https://crrev.com/441dec78cb3dfedb77179a7f4eec38b4dd4e17b9/drivers/net/wireless/ar10k/mac80211/iface.c
[modify] https://crrev.com/441dec78cb3dfedb77179a7f4eec38b4dd4e17b9/drivers/net/wireless/ar10k/mac80211/chan.c
[modify] https://crrev.com/441dec78cb3dfedb77179a7f4eec38b4dd4e17b9/drivers/net/wireless/ar10k/mac80211/cfg.c
[modify] https://crrev.com/441dec78cb3dfedb77179a7f4eec38b4dd4e17b9/drivers/net/wireless/ar10k/mac80211/offchannel.c
[modify] https://crrev.com/441dec78cb3dfedb77179a7f4eec38b4dd4e17b9/drivers/net/wireless/ar10k/mac80211/rx.c
[modify] https://crrev.com/441dec78cb3dfedb77179a7f4eec38b4dd4e17b9/drivers/net/wireless/ar10k/mac80211/util.c

Project Member

Comment 47 by bugdroid1@chromium.org, Apr 12 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/287852198408a1c1125019d340e68685314e3876

commit 287852198408a1c1125019d340e68685314e3876
Author: Purushottam Kushwaha <pkushwah@qti.qualcomm.com>
Date: Thu Apr 12 01:07:34 2018

CHROMIUM: ar10k:  pass struct to interface combination check/iter

Move the growing parameter list to a structure for the interface
combination check and iteration functions in cfg80211 and mac80211
to make the code easier to understand.

(cherry picked with path changes from commit e227300c8395dffaa7614ce7c7666a82180ebc60
 and applied to ar10k's mac80211/util.c)

CQ-DEPEND=CL:1004263
BUG= chromium:828485 
TEST=build on eve and kevin

Change-Id: I10fe28df2ba2009c484c520da1392bfa26480110
Reviewed-on: https://chromium-review.googlesource.com/1004270
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Kirtika Ruchandani <kirtika@chromium.org>

[modify] https://crrev.com/287852198408a1c1125019d340e68685314e3876/drivers/net/wireless/ar10k/mac80211/util.c

Project Member

Comment 48 by bugdroid1@chromium.org, Apr 12 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/ef18a91e5000ef3950dc1ad1c116507ca5eb933c

commit ef18a91e5000ef3950dc1ad1c116507ca5eb933c
Author: Jouni Malinen <jouni@qca.qualcomm.com>
Date: Thu Apr 12 01:06:03 2018

UPSTREAM: cfg80211: Allow reassociation to be requested with internal SME

If the user space issues a NL80211_CMD_CONNECT with
NL80211_ATTR_PREV_BSSID when there is already a connection, allow this
to proceed as a reassociation instead of rejecting the new connect
command with EALREADY.

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
[validate prev_bssid]
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
(cherry picked from commit 4ce2bd9c4c1dfb416206ff1ad5283f6d24af4031)

BUG= chromium:828485 
TEST=trybot on Eve

Change-Id: I563bb75f29c1a050c80df7ac00cd698ca99d8043
Reviewed-on: https://chromium-review.googlesource.com/988688
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Brian Norris <briannorris@chromium.org>

[modify] https://crrev.com/ef18a91e5000ef3950dc1ad1c116507ca5eb933c/net/wireless/nl80211.c
[modify] https://crrev.com/ef18a91e5000ef3950dc1ad1c116507ca5eb933c/net/wireless/sme.c

Project Member

Comment 49 by bugdroid1@chromium.org, Apr 12 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/8ce24ba297668d948935ade2d1e88f21e6bc6900

commit 8ce24ba297668d948935ade2d1e88f21e6bc6900
Author: Johannes Berg <johannes.berg@intel.com>
Date: Thu Apr 12 01:06:24 2018

UPSTREAM: cfg80211: fix connect/disconnect edge cases

If we try to connect while already connected/connecting, but
this fails, we set ssid_len=0 but leave current_bss hanging,
leading to errors.

Check all of this better, first of all ensuring that we can't
try to connect to a different SSID while connected/ing; ensure
that prev_bssid is set for re-association attempts even in the
case of the driver supporting the connect() method, and don't
reset ssid_len in the failure cases.

While at it, also reset ssid_len while disconnecting unless we
were connected and expect a disconnected event, and warn on a
successful connection without ssid_len being set.

Cc: stable@vger.kernel.org
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
(cherry picked from commit 51e13359cd5ea34acc62c90627603352956380af)

BUG= chromium:828485 
TEST=trybot on Eve

Change-Id: I7e3ebfdaf6eab076629fefa9d803a7e69117788e
Reviewed-on: https://chromium-review.googlesource.com/988689
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Brian Norris <briannorris@chromium.org>

[modify] https://crrev.com/8ce24ba297668d948935ade2d1e88f21e6bc6900/net/wireless/sme.c

Project Member

Comment 50 by bugdroid1@chromium.org, Apr 12 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/2238f2a9e2f04a8697f0eb517b8b7ff944f3fb37

commit 2238f2a9e2f04a8697f0eb517b8b7ff944f3fb37
Author: David Spinadel <david.spinadel@intel.com>
Date: Thu Apr 12 01:06:26 2018

UPSTREAM: nl80211: send deauth reason if locally generated

Send disconnection reason code to user space even if it's locally
generated, since some tests that check reason code may fail because of
the current behavior.

Signed-off-by: David Spinadel <david.spinadel@intel.com>
Signed-off-by: Luca Coelho <luciano.coelho@intel.com>
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
(cherry picked from commit 86b6c465727cc917ec8367fef29b20ccf8ffa081)

BUG= chromium:828485 
TEST=trybot on Eve

Change-Id: I4ee37fcbfb74630e615f4b6a093b8a58d2ff8e5a
Reviewed-on: https://chromium-review.googlesource.com/989019
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Brian Norris <briannorris@chromium.org>

[modify] https://crrev.com/2238f2a9e2f04a8697f0eb517b8b7ff944f3fb37/net/wireless/nl80211.c

Project Member

Comment 51 by bugdroid1@chromium.org, Apr 12 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/6fc9acc6d7bf9de931c5a41568ac0c1506df4696

commit 6fc9acc6d7bf9de931c5a41568ac0c1506df4696
Author: Jouni Malinen <jouni@qca.qualcomm.com>
Date: Thu Apr 12 01:05:54 2018

UPSTREAM: cfg80211: Allow a scan request for a specific BSSID

This allows scans for a specific BSSID to be optimized by the user space
application by requesting the driver to set the Probe Request frame
BSSID field (Address 3) to the specified BSSID instead of the wildcard
BSSID. This prevents other APs from replying which reduces airtime need
and latency in getting the response from the target AP through.

This is an optimization and as such, it is acceptable for some of the
drivers not to support the mechanism. If not supported, the wildcard
BSSID will be used and more responses may be received.

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
(cherry picked from commit 818965d3917774955fad52f87b59d690d8be9e8b)

CQ-DEPEND=CL:1004267
BUG= chromium:828485 
TEST=trybot on eve

Change-Id: I1b6233639d38f6f0b99e7ae731f13201ac4a2684
Reviewed-on: https://chromium-review.googlesource.com/989125
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Kirtika Ruchandani <kirtika@chromium.org>

[modify] https://crrev.com/6fc9acc6d7bf9de931c5a41568ac0c1506df4696/include/uapi/linux/nl80211.h
[modify] https://crrev.com/6fc9acc6d7bf9de931c5a41568ac0c1506df4696/net/wireless/nl80211.c
[modify] https://crrev.com/6fc9acc6d7bf9de931c5a41568ac0c1506df4696/include/net/cfg80211.h
[modify] https://crrev.com/6fc9acc6d7bf9de931c5a41568ac0c1506df4696/net/wireless/scan.c
[modify] https://crrev.com/6fc9acc6d7bf9de931c5a41568ac0c1506df4696/net/wireless/sme.c

Project Member

Comment 52 by bugdroid1@chromium.org, Apr 12 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/7db0c6c7103efa0a97cc9db7741be598f40b9c33

commit 7db0c6c7103efa0a97cc9db7741be598f40b9c33
Author: Arend van Spriel <arend@broadcom.com>
Date: Thu Apr 12 01:05:56 2018

BACKPORT: nl80211: add feature for BSS selection support

Introducing a new feature that the driver can use to
indicate the driver/firmware supports configuration of BSS
selection criteria upon CONNECT command. This can be useful
when multiple BSS-es are found belonging to the same ESS,
ie. Infra-BSS with same SSID. The criteria can then be used to
offload selection of a preferred BSS.

Reviewed-by: Hante Meuleman <meuleman@broadcom.com>
Reviewed-by: Franky (Zhenhui) Lin <frankyl@broadcom.com>
Reviewed-by: Pieter-Paul Giesberts <pieterpg@broadcom.com>
Reviewed-by: Lei Zhang <leizh@broadcom.com>
Signed-off-by: Arend van Spriel <arend@broadcom.com>
[move wiphy support check into parse_bss_select()]
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
(cherry picked from commit 38de03d2a28925b489c11546804e2f5418cc17a4)

kirtika@: Fixed a conflict in net/wireless/nl80211.c to preserve contents
of commit 6a6c61d8467d ("nl80211: Define policy for packet pattern attributes")

BUG= chromium:828485 
TEST=None

Change-Id: I688e94c95313d90a3f4d271dc52a4c2add0545e1
Reviewed-on: https://chromium-review.googlesource.com/989128
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Brian Norris <briannorris@chromium.org>

[modify] https://crrev.com/7db0c6c7103efa0a97cc9db7741be598f40b9c33/net/wireless/nl80211.c
[modify] https://crrev.com/7db0c6c7103efa0a97cc9db7741be598f40b9c33/include/uapi/linux/nl80211.h
[modify] https://crrev.com/7db0c6c7103efa0a97cc9db7741be598f40b9c33/net/wireless/core.c
[modify] https://crrev.com/7db0c6c7103efa0a97cc9db7741be598f40b9c33/include/net/cfg80211.h

Project Member

Comment 53 by bugdroid1@chromium.org, Apr 12 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/8059af19acf79dd3c184e4be4ad1efbf09a4a1ce

commit 8059af19acf79dd3c184e4be4ad1efbf09a4a1ce
Author: Jouni Malinen <jouni@qca.qualcomm.com>
Date: Thu Apr 12 01:06:01 2018

UPSTREAM: cfg80211: Add option to specify previous BSSID for Connect command

This extends NL80211_CMD_CONNECT to allow the NL80211_ATTR_PREV_BSSID
attribute to be used similarly to way this was already allowed with
NL80211_CMD_ASSOCIATE. This allows user space to request reassociation
(instead of association) when already connected to an AP. This provides
an option to reassociate within an ESS without having to disconnect and
associate with the AP.

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
(cherry picked from commit ba6fbacf9c073effaedf0c52fe7e52e2baf67725)

BUG= chromium:828485 
TEST=trybot on Eve

Change-Id: I59a75160c18459d90fe37beccb13b630abff2046
Reviewed-on: https://chromium-review.googlesource.com/989129
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Brian Norris <briannorris@chromium.org>

[modify] https://crrev.com/8059af19acf79dd3c184e4be4ad1efbf09a4a1ce/net/wireless/trace.h
[modify] https://crrev.com/8059af19acf79dd3c184e4be4ad1efbf09a4a1ce/net/wireless/nl80211.c
[modify] https://crrev.com/8059af19acf79dd3c184e4be4ad1efbf09a4a1ce/include/net/cfg80211.h

Project Member

Comment 54 by bugdroid1@chromium.org, Apr 12 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/846fdffe4b9c3f6215a02692a4a87065f7db5089

commit 846fdffe4b9c3f6215a02692a4a87065f7db5089
Author: Aviya Erenfeld <aviya.erenfeld@intel.com>
Date: Thu Apr 12 01:06:29 2018

UPSTREAM: mac80211: refactor monitor representation in sdata

Insert the u32 monitor flags variable in a new structure
that represents a monitor interface.
This will allow to add more configuration variables to
that structure which will happen in an upcoming change.

Signed-off-by: Aviya Erenfeld <aviya.erenfeld@intel.com>
Signed-off-by: Luca Coelho <luciano.coelho@intel.com>
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
(cherry picked from commit d82121845d44334f5ec3c98906d1e4a592350beb)

BUG= chromium:828485 
TEST=build on eve and kevin

Change-Id: I8f79811e01d1923fb32d91c18fe5042511286c68
Reviewed-on: https://chromium-review.googlesource.com/991256
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Brian Norris <briannorris@chromium.org>

[modify] https://crrev.com/846fdffe4b9c3f6215a02692a4a87065f7db5089/net/mac80211/status.c
[modify] https://crrev.com/846fdffe4b9c3f6215a02692a4a87065f7db5089/net/mac80211/driver-ops.c
[modify] https://crrev.com/846fdffe4b9c3f6215a02692a4a87065f7db5089/net/mac80211/iface.c
[modify] https://crrev.com/846fdffe4b9c3f6215a02692a4a87065f7db5089/net/mac80211/util.c
[modify] https://crrev.com/846fdffe4b9c3f6215a02692a4a87065f7db5089/net/mac80211/rx.c
[modify] https://crrev.com/846fdffe4b9c3f6215a02692a4a87065f7db5089/net/mac80211/tx.c
[modify] https://crrev.com/846fdffe4b9c3f6215a02692a4a87065f7db5089/net/mac80211/cfg.c
[modify] https://crrev.com/846fdffe4b9c3f6215a02692a4a87065f7db5089/net/mac80211/ieee80211_i.h

Project Member

Comment 55 by bugdroid1@chromium.org, Apr 12 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/7bed982a8f8863efe10082914a5243cbb4c1c1b5

commit 7bed982a8f8863efe10082914a5243cbb4c1c1b5
Author: Aviya Erenfeld <aviya.erenfeld@intel.com>
Date: Thu Apr 12 01:06:50 2018

UPSTREAM: mac80211: add support for MU-MIMO air sniffer

add support to MU-MIMO air sniffer according groupID:
in monitor mode, use a given MU-MIMO groupID to monitor stations
that belongs to that group using MU-MIMO.

add support for following a station according to its MAC address
using VHT MU-MIMO sniffer:
the monitors wait until they get an action MU-MIMO notification
frame, then parses it in order to find the groupID that corresponds
to the given MAC address and monitors packets destined to that
groupID using VHT MU-MIMO.

Signed-off-by: Aviya Erenfeld <aviya.erenfeld@intel.com>
Signed-off-by: Luca Coelho <luciano.coelho@intel.com>
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
(cherry picked from commit 42bd20d99857e69e368d5421ea402127d5835cd3)

BUG= chromium:828485 
TEST=build on eve and kevin

Change-Id: I0a2c43c711a369f6e0d0004b285d233a950f7937
Reviewed-on: https://chromium-review.googlesource.com/991257
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Brian Norris <briannorris@chromium.org>

[modify] https://crrev.com/7bed982a8f8863efe10082914a5243cbb4c1c1b5/net/mac80211/driver-ops.h
[modify] https://crrev.com/7bed982a8f8863efe10082914a5243cbb4c1c1b5/net/mac80211/rx.c
[modify] https://crrev.com/7bed982a8f8863efe10082914a5243cbb4c1c1b5/net/mac80211/ieee80211_i.h
[modify] https://crrev.com/7bed982a8f8863efe10082914a5243cbb4c1c1b5/net/mac80211/cfg.c
[modify] https://crrev.com/7bed982a8f8863efe10082914a5243cbb4c1c1b5/net/mac80211/iface.c

Project Member

Comment 56 by bugdroid1@chromium.org, Apr 12 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/3a26982309bba8eaab9ebd88a14c4a015703ff25

commit 3a26982309bba8eaab9ebd88a14c4a015703ff25
Author: Johannes Berg <johannes.berg@intel.com>
Date: Thu Apr 12 01:06:31 2018

BACKPORT: wireless: move IEEE80211_NUM_ACS to ieee80211.h

This constant isn't really specific to mac80211, so move it
"up" a level to ieee80211.h

Signed-off-by: Johannes Berg <johannes.berg@intel.com>
(cherry picked from commit 3db5e3e707ebb9ab0ce3a2dcd924ed2ea525d770)
[translated to ar10k directories]

BUG= chromium:828485 
TEST=build on scarlet

Change-Id: I22502489234d4a540b3141217d376babc0287326
Signed-off-by: Brian Norris <briannorris@chromium.org>
Reviewed-on: https://chromium-review.googlesource.com/991332
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Kirtika Ruchandani <kirtika@chromium.org>

[modify] https://crrev.com/3a26982309bba8eaab9ebd88a14c4a015703ff25/drivers/net/wireless/ar10k/hdrs/mac80211.h
[modify] https://crrev.com/3a26982309bba8eaab9ebd88a14c4a015703ff25/drivers/net/wireless/ar10k/hdrs/ieee80211.h

Project Member

Comment 57 by bugdroid1@chromium.org, Apr 12 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/62d3755181e66fb0d04dccdee3b453654f06ed14

commit 62d3755181e66fb0d04dccdee3b453654f06ed14
Author: Ayala Beker <ayala.beker@intel.com>
Date: Thu Apr 12 01:05:59 2018

UPSTREAM: cfg80211: allow userspace to specify client P2P PS support

Legacy clients don't support P2P power save mechanisms, and thus
if a P2P GO has a legacy client connected to it, it has to make
some changes in the PS behavior.

To handle this, add an attribute to specify whether a station supports
P2P PS or not. If the attribute was not specified cfg80211 will assume
that station supports it for P2P GO interface, and does NOT support it
for AP interface, matching the current assumptions in the code.

Signed-off-by: Ayala Beker <ayala.beker@intel.com>
Signed-off-by: Emmanuel Grumbach <emmanuel.grumbach@intel.com>
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
(cherry picked from commit 17b942478643c5a90c06d978479bd326040bfa19)

BUG= chromium:828485 
TEST=None

Change-Id: I27f7eca67ae32c9ff5f79f64bb5c00a59e3e621f
Reviewed-on: https://chromium-review.googlesource.com/993771
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Brian Norris <briannorris@chromium.org>

[modify] https://crrev.com/62d3755181e66fb0d04dccdee3b453654f06ed14/include/uapi/linux/nl80211.h
[modify] https://crrev.com/62d3755181e66fb0d04dccdee3b453654f06ed14/net/wireless/nl80211.c
[modify] https://crrev.com/62d3755181e66fb0d04dccdee3b453654f06ed14/include/net/cfg80211.h

Project Member

Comment 58 by bugdroid1@chromium.org, Apr 12 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/6ae3fa6fba99507fbbd1f2478fa9490f781e194f

commit 6ae3fa6fba99507fbbd1f2478fa9490f781e194f
Author: Nicolas Dichtel <nicolas.dichtel@6wind.com>
Date: Thu Apr 12 01:06:35 2018

UPSTREAM: wireless: use nla_put_u64_64bit()

Signed-off-by: Nicolas Dichtel <nicolas.dichtel@6wind.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
(cherry picked from commit 2dad624e6dd65c6048a9bbe0e16559fce182c87c)

BUG= chromium:828485 
TEST=None

Change-Id: I3bf89c2ae4e5451bef0a110d1a2ade2b22cd9862
Reviewed-on: https://chromium-review.googlesource.com/993852
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Brian Norris <briannorris@chromium.org>

[modify] https://crrev.com/6ae3fa6fba99507fbbd1f2478fa9490f781e194f/include/uapi/linux/nl80211.h
[modify] https://crrev.com/6ae3fa6fba99507fbbd1f2478fa9490f781e194f/net/wireless/nl80211.c

Project Member

Comment 59 by bugdroid1@chromium.org, Apr 12 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/c50dde1447484d641fbb2af2c952ccc8269c84be

commit c50dde1447484d641fbb2af2c952ccc8269c84be
Author: Johannes Berg <johannes.berg@intel.com>
Date: Thu Apr 12 01:06:43 2018

UPSTREAM: nl80211: add missing kerneldoc for new *_PAD attributes

Nicolas's patch missed this, now generating docbook warnings.
Add the missing descriptions to address that.

Fixes: 2dad624e6dd6 ("wireless: use nla_put_u64_64bit()")
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
(cherry picked from commit 9b95fe59b18bcc891a6c60ae11d725c9c679574b)

BUG= chromium:828485 
TEST=None

Change-Id: I2258a816361e867435c378da5c775b0a91ef74f6
Reviewed-on: https://chromium-review.googlesource.com/993853
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Brian Norris <briannorris@chromium.org>

[modify] https://crrev.com/c50dde1447484d641fbb2af2c952ccc8269c84be/include/uapi/linux/nl80211.h

Project Member

Comment 60 by bugdroid1@chromium.org, Apr 12 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/51da96a6b8bdcdbf1561238a78443276e69e7544

commit 51da96a6b8bdcdbf1561238a78443276e69e7544
Author: Kanchanapally, Vidyullatha <vkanchan@qti.qualcomm.com>
Date: Thu Apr 12 01:06:45 2018

UPSTREAM: cfg80211: Advertise extended capabilities per interface type to userspace

The driver extended capabilities may differ for different
interface types which the userspace needs to know (for
example the fine timing measurement initiator and responder
bits might differ for a station and AP). Add a new nl80211
attribute to provide extended capabilities per interface type
to userspace.

Signed-off-by: Vidyullatha Kanchanapally <vkanchan@qti.qualcomm.com>
Reviewed-by: Jouni Malinen <jouni@qca.qualcomm.com>
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
(cherry picked from commit 019ae3a918811715192b22c400ac78d54acc26a9)

BUG= chromium:828485 
TEST=None

Change-Id: Iad918d1d4da9d5b404bc1cb1709bc7cfc1cc7edb
Reviewed-on: https://chromium-review.googlesource.com/993854
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Brian Norris <briannorris@chromium.org>

[modify] https://crrev.com/51da96a6b8bdcdbf1561238a78443276e69e7544/net/wireless/nl80211.c
[modify] https://crrev.com/51da96a6b8bdcdbf1561238a78443276e69e7544/include/uapi/linux/nl80211.h
[modify] https://crrev.com/51da96a6b8bdcdbf1561238a78443276e69e7544/net/wireless/core.c
[modify] https://crrev.com/51da96a6b8bdcdbf1561238a78443276e69e7544/include/net/cfg80211.h

Project Member

Comment 61 by bugdroid1@chromium.org, Apr 12 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/cba7746c62d4e34c106d8f18c361a210b71f29c6

commit cba7746c62d4e34c106d8f18c361a210b71f29c6
Author: Aviya Erenfeld <aviya.erenfeld@intel.com>
Date: Thu Apr 12 01:06:47 2018

UPSTREAM: nl80211: Add API to support VHT MU-MIMO air sniffer

add API to support VHT MU-MIMO air sniffer.
in MU-MIMO there are parallel frames on the air while the HW
has only one RX.
add the capability to sniff one of the MU-MIMO parallel frames by
giving the sniffer additional information so it'll know which
of the parallel frames it shall follow.

Add attribute - NL80211_ATTR_MU_MIMO_GROUP_DATA - for getting
a MU-MIMO groupID in order to monitor packets from that group
using VHT MU-MIMO.
And add attribute -NL80211_ATTR_MU_MIMO_FOLLOW_ADDR - for passing
MAC address to monitor mode.
that option will be used by VHT MU-MIMO air sniffer to follow a
station according to it's MAC address using VHT MU-MIMO.

Signed-off-by: Aviya Erenfeld <aviya.erenfeld@intel.com>
Signed-off-by: Luca Coelho <luciano.coelho@intel.com>
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
(cherry picked from commit c6e6a0c8be575c830a97b1942dabeab70f423fe0)

BUG= chromium:828485 
TEST=None

Change-Id: If2a3c6092b720867315e94c5cb0bcc350d5907bb
Reviewed-on: https://chromium-review.googlesource.com/993855
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Brian Norris <briannorris@chromium.org>

[modify] https://crrev.com/cba7746c62d4e34c106d8f18c361a210b71f29c6/include/uapi/linux/nl80211.h
[modify] https://crrev.com/cba7746c62d4e34c106d8f18c361a210b71f29c6/net/wireless/nl80211.c
[modify] https://crrev.com/cba7746c62d4e34c106d8f18c361a210b71f29c6/include/net/cfg80211.h

Project Member

Comment 62 by bugdroid1@chromium.org, Apr 12 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/42540b7b71a4a4e45a316a9af2ceee4b67305363

commit 42540b7b71a4a4e45a316a9af2ceee4b67305363
Author: Roopa Prabhu <roopa@cumulusnetworks.com>
Date: Thu Apr 12 01:06:05 2018

UPSTREAM: rtnetlink: rtnl_fill_stats: avoid an unnecssary stats copy

This patch passes netlink attr data ptr directly to dev_get_stats
thus elimiating a stats copy.

Suggested-by: David Miller <davem@davemloft.net>
Signed-off-by: Roopa Prabhu <roopa@cumulusnetworks.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
(cherry picked from commit 550bce59baf3f3059cd4ae1e268f08f2d2cb1d5c)

BUG= chromium:828485 
TEST=None

Change-Id: I663b7a32856dae23a5517022c5a41a54b648526f
Reviewed-on: https://chromium-review.googlesource.com/994696
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Brian Norris <briannorris@chromium.org>

[modify] https://crrev.com/42540b7b71a4a4e45a316a9af2ceee4b67305363/net/core/rtnetlink.c

Project Member

Comment 63 by bugdroid1@chromium.org, Apr 12 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/7abf5a4b4cf3ffd2c26b27d139aa6acefb341357

commit 7abf5a4b4cf3ffd2c26b27d139aa6acefb341357
Author: Roopa Prabhu <roopa@cumulusnetworks.com>
Date: Thu Apr 12 01:06:12 2018

UPSTREAM: rtnetlink: add new RTM_GETSTATS message to dump link stats

This patch adds a new RTM_GETSTATS message to query link stats via netlink
from the kernel. RTM_NEWLINK also dumps stats today, but RTM_NEWLINK
returns a lot more than just stats and is expensive in some cases when
frequent polling for stats from userspace is a common operation.

RTM_GETSTATS is an attempt to provide a light weight netlink message
to explicity query only link stats from the kernel on an interface.
The idea is to also keep it extensible so that new kinds of stats can be
added to it in the future.

This patch adds the following attribute for NETDEV stats:
struct nla_policy ifla_stats_policy[IFLA_STATS_MAX + 1] = {
        [IFLA_STATS_LINK_64]  = { .len = sizeof(struct rtnl_link_stats64) },
};

Like any other rtnetlink message, RTM_GETSTATS can be used to get stats of
a single interface or all interfaces with NLM_F_DUMP.

Future possible new types of stat attributes:
link af stats:
    - IFLA_STATS_LINK_IPV6  (nested. for ipv6 stats)
    - IFLA_STATS_LINK_MPLS  (nested. for mpls/mdev stats)
extended stats:
    - IFLA_STATS_LINK_EXTENDED (nested. extended software netdev stats like bridge,
      vlan, vxlan etc)
    - IFLA_STATS_LINK_HW_EXTENDED (nested. extended hardware stats which are
      available via ethtool today)

This patch also declares a filter mask for all stat attributes.
User has to provide a mask of stats attributes to query. filter mask
can be specified in the new hdr 'struct if_stats_msg' for stats messages.
Other important field in the header is the ifindex.

This api can also include attributes for global stats (eg tcp) in the future.
When global stats are included in a stats msg, the ifindex in the header
must be zero. A single stats message cannot contain both global and
netdev specific stats. To easily distinguish them, netdev specific stat
attributes name are prefixed with IFLA_STATS_LINK_

Without any attributes in the filter_mask, no stats will be returned.

This patch has been tested with mofified iproute2 ifstat.

Suggested-by: Jamal Hadi Salim <jhs@mojatatu.com>
Signed-off-by: Roopa Prabhu <roopa@cumulusnetworks.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
(cherry picked from commit 10c9ead9f3c6bb24bddc9a96681f7d58e6623966)

BUG= chromium:828485 
TEST=None

Change-Id: I9ef851b9ddbc7b512d751267aefbd248882ec31f
Reviewed-on: https://chromium-review.googlesource.com/994697
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Brian Norris <briannorris@chromium.org>

[modify] https://crrev.com/7abf5a4b4cf3ffd2c26b27d139aa6acefb341357/security/selinux/nlmsgtab.c
[modify] https://crrev.com/7abf5a4b4cf3ffd2c26b27d139aa6acefb341357/include/uapi/linux/rtnetlink.h
[modify] https://crrev.com/7abf5a4b4cf3ffd2c26b27d139aa6acefb341357/net/core/rtnetlink.c
[modify] https://crrev.com/7abf5a4b4cf3ffd2c26b27d139aa6acefb341357/include/uapi/linux/if_link.h

Project Member

Comment 64 by bugdroid1@chromium.org, Apr 12 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/dc007dd9a7eb011cc1e84219ff6b6dba235cc76e

commit dc007dd9a7eb011cc1e84219ff6b6dba235cc76e
Author: Nicolas Dichtel <nicolas.dichtel@6wind.com>
Date: Thu Apr 12 01:06:22 2018

UPSTREAM: rtnl: use the new API to align IFLA_STATS*

Signed-off-by: Nicolas Dichtel <nicolas.dichtel@6wind.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
(cherry picked from commit 58414d32a37e4c2f79da91aebc2d2365918a1562)

BUG= chromium:828485 
TEST=None

Change-Id: Id944e09a7e36c1c16c4cd8d67b37d74ce38c7bb1
Reviewed-on: https://chromium-review.googlesource.com/994698
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Brian Norris <briannorris@chromium.org>

[modify] https://crrev.com/dc007dd9a7eb011cc1e84219ff6b6dba235cc76e/net/core/rtnetlink.c

Project Member

Comment 65 by bugdroid1@chromium.org, Apr 12 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/5a4211aad66fe91faf536a05ff15197f9f214d3a

commit 5a4211aad66fe91faf536a05ff15197f9f214d3a
Author: David S. Miller <davem@davemloft.net>
Date: Thu Apr 12 01:06:10 2018

UPSTREAM: net: Add helpers for 64-bit aligning netlink attributes.

Suggested-by: Eric Dumazet <eric.dumazet@gmail.com>
Suggested-by: Nicolas Dichtel <nicolas.dichtel@6wind.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
(cherry picked from commit 35c5845957c7982dac1f525ff3412f8acf0a0385)

BUG= chromium:828485 
TEST=build on eve and kevin

Change-Id: I459d16689f8b4b995468cbb50004e660d181f817
Reviewed-on: https://chromium-review.googlesource.com/994699
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Brian Norris <briannorris@chromium.org>

[modify] https://crrev.com/5a4211aad66fe91faf536a05ff15197f9f214d3a/net/core/rtnetlink.c
[modify] https://crrev.com/5a4211aad66fe91faf536a05ff15197f9f214d3a/include/net/netlink.h

Project Member

Comment 66 by bugdroid1@chromium.org, Apr 12 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/88b079b866a3628819ca60ddffa8bcea6b4b80b1

commit 88b079b866a3628819ca60ddffa8bcea6b4b80b1
Author: Eric Dumazet <edumazet@google.com>
Date: Thu Apr 12 01:06:15 2018

UPSTREAM: net: fix HAVE_EFFICIENT_UNALIGNED_ACCESS typos

HAVE_EFFICIENT_UNALIGNED_ACCESS needs CONFIG_ prefix.

Also add a comment in nla_align_64bit() explaining we have
to add a padding if current skb->data is aligned, as it
certainly can be confusing.

Fixes: 35c5845957c7 ("net: Add helpers for 64-bit aligning netlink attributes.")
Signed-off-by: Eric Dumazet <edumazet@google.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
(cherry picked from commit cca1d81574d266d4a3aa33f3947297564525e127)

BUG= chromium:828485 
TEST=None

Change-Id: I5705a628a28aeb7ad39aab4c08b3d108bf9dc518
Reviewed-on: https://chromium-review.googlesource.com/994700
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Brian Norris <briannorris@chromium.org>

[modify] https://crrev.com/88b079b866a3628819ca60ddffa8bcea6b4b80b1/include/net/netlink.h

Project Member

Comment 67 by bugdroid1@chromium.org, Apr 12 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/19aaebeaf9fdd9028bc245a675b67b289ca1afab

commit 19aaebeaf9fdd9028bc245a675b67b289ca1afab
Author: David S. Miller <davem@davemloft.net>
Date: Thu Apr 12 01:06:17 2018

UPSTREAM: net: nla_align_64bit() needs to test the right pointer.

Netlink messages are appended, one object at a time, to the end of
the SKB.  Therefore we need to test skb_tail_pointer() not skb->data
for alignment.

Fixes: 35c5845957c7 ("net: Add helpers for 64-bit aligning netlink attributes.")
Signed-off-by: David S. Miller <davem@davemloft.net>
(cherry picked from commit e6f268ef3687862b0e9f01f7b3706b54f75b82ab)

BUG= chromium:828485 
TEST=None

Change-Id: I7f4bda2d33640f6d7e50a59a9605fc48a760de7a
Reviewed-on: https://chromium-review.googlesource.com/994701
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Brian Norris <briannorris@chromium.org>

[modify] https://crrev.com/19aaebeaf9fdd9028bc245a675b67b289ca1afab/include/net/netlink.h

Project Member

Comment 68 by bugdroid1@chromium.org, Apr 12 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/60ed41902e28ba93e22a6f8ebe452b045991580f

commit 60ed41902e28ba93e22a6f8ebe452b045991580f
Author: Nicolas Dichtel <nicolas.dichtel@6wind.com>
Date: Thu Apr 12 01:06:19 2018

UPSTREAM: libnl: add more helpers to align attributes on 64-bit

Signed-off-by: Nicolas Dichtel <nicolas.dichtel@6wind.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
(cherry picked from commit 089bf1a6a924b97a7e9f920bae6253a8ad581cf3)

BUG= chromium:828485 
TEST=None

Change-Id: I308a6a258de274ebd7a2ef60a2277c93f14166dc
Reviewed-on: https://chromium-review.googlesource.com/994702
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Brian Norris <briannorris@chromium.org>

[modify] https://crrev.com/60ed41902e28ba93e22a6f8ebe452b045991580f/lib/nlattr.c
[modify] https://crrev.com/60ed41902e28ba93e22a6f8ebe452b045991580f/include/net/netlink.h

Project Member

Comment 69 by bugdroid1@chromium.org, Apr 12 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/a5d3b0b1449e430e58318839bc79662bc78255fa

commit a5d3b0b1449e430e58318839bc79662bc78255fa
Author: David S. Miller <davem@davemloft.net>
Date: Thu Apr 12 01:06:08 2018

UPSTREAM: net: Align IFLA_STATS64 attributes properly on architectures that need it.

Since the nlattr header is 4 bytes in size, it can cause the netlink
attribute payload to not be 8-byte aligned.

This is particularly troublesome for IFLA_STATS64 which contains 64-bit
statistic values.

Solve this by creating a dummy IFLA_PAD attribute which has a payload
which is zero bytes in size.  When HAVE_EFFICIENT_UNALIGNED_ACCESS is
false, we insert an IFLA_PAD attribute into the netlink response when
necessary such that the IFLA_STATS64 payload will be properly aligned.

With help and suggestions from Eric Dumazet.

Signed-off-by: David S. Miller <davem@davemloft.net>
(cherry picked from commit 18402843bf88c2e9674e1a3a05c73b7d9b09ee05)

BUG= chromium:828485 
TEST=build on eve and kevin

Change-Id: I3c162148bd19fca8df9cc2df310584820758b353
Reviewed-on: https://chromium-review.googlesource.com/994704
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Brian Norris <briannorris@chromium.org>

[modify] https://crrev.com/a5d3b0b1449e430e58318839bc79662bc78255fa/net/core/rtnetlink.c
[modify] https://crrev.com/a5d3b0b1449e430e58318839bc79662bc78255fa/include/uapi/linux/if_link.h

Project Member

Comment 70 by bugdroid1@chromium.org, Apr 12 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/b2e67d822d8db211b7fe9298b4f8af4513646bce

commit b2e67d822d8db211b7fe9298b4f8af4513646bce
Author: Kirtika Ruchandani <kirtika@google.com>
Date: Thu Apr 12 01:06:57 2018

CHROMIUM: iwl7000: Remove backport definition for nla_put_u64_64bit

b:76133001 requires that we pick up a ton of patches in 4.4 as
dependencies for the patches to meet ETSI compliance. Among those patches
is the backport for nla_put_u64_64bit(). Remove the stub from the
iwl-chrome.h backport header.

BUG= chromium:828485 , b:76133001
TEST=None

Change-Id: Ifcc16c794f9ab6c758f6c35f2f9c10faba330878
Signed-off-by: Kirtika Ruchandani <kirtika@google.com>
Reviewed-on: https://chromium-review.googlesource.com/994705
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Brian Norris <briannorris@chromium.org>

[modify] https://crrev.com/b2e67d822d8db211b7fe9298b4f8af4513646bce/drivers/net/wireless/iwl7000/hdrs/iwl-chrome.h

Project Member

Comment 71 by bugdroid1@chromium.org, Apr 12 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/4c50298bc541cad6e3ec2d611af0cd6a94ff10ce

commit 4c50298bc541cad6e3ec2d611af0cd6a94ff10ce
Author: Johannes Berg <johannes.berg@intel.com>
Date: Thu Apr 12 01:06:59 2018

UPSTREAM: cfg80211: don't require RTNL held for regdomain reads

The whole code is set up to allow RCU reads of this data, but
then uses rtnl_dereference() which requires the RTNL. Convert
it to rcu_dereference_rtnl() which makes it require only RCU
or the RTNL, to allow RCU-protected reading of the data.

Reviewed-by: Coelho, Luciano <luciano.coelho@intel.com>
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
(cherry picked from commit 5bf16a11ba2940c67d0b3a2154813bb42e8c6281)

BUG= chromium:828485 
TEST=build on eve and kevin

Change-Id: I93b5cd19e8f8849255b30e5601c1574641490981
Reviewed-on: https://chromium-review.googlesource.com/997031
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Brian Norris <briannorris@chromium.org>

[modify] https://crrev.com/4c50298bc541cad6e3ec2d611af0cd6a94ff10ce/net/wireless/reg.c

Project Member

Comment 72 by bugdroid1@chromium.org, Apr 12 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/cc1a6a8bda7027fc8dba5b8909deee10eaca18f2

commit cc1a6a8bda7027fc8dba5b8909deee10eaca18f2
Author: Nicolas Dichtel <nicolas.dichtel@6wind.com>
Date: Thu Apr 12 01:07:02 2018

UPSTREAM: libnl: fix help of _64bit functions

Fix typo and describe 'padattr'.

Fixes: 089bf1a6a924 ("libnl: add more helpers to align attributes on 64-bit")
Signed-off-by: Nicolas Dichtel <nicolas.dichtel@6wind.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
(cherry picked from commit 11a99573079e15f11499ae8d21b07e3e3257fff1)

BUG= chromium:828485 
TEST=build on eve and kevin

Change-Id: I8bf7fe61e689116158bec10c04528dda67f1df46
Reviewed-on: https://chromium-review.googlesource.com/997092
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Brian Norris <briannorris@chromium.org>

[modify] https://crrev.com/cc1a6a8bda7027fc8dba5b8909deee10eaca18f2/lib/nlattr.c

Project Member

Comment 73 by bugdroid1@chromium.org, Apr 12 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/75fd174654082667a7813663497471b055ba5b52

commit 75fd174654082667a7813663497471b055ba5b52
Author: Mathias Krause <minipli@googlemail.com>
Date: Thu Apr 12 01:07:04 2018

UPSTREAM: rtnl: stats - add missing netlink message size checks

We miss to check if the netlink message is actually big enough to contain
a struct if_stats_msg.

Add a check to prevent userland from sending us short messages that would
make us access memory beyond the end of the message.

Fixes: 10c9ead9f3c6 ("rtnetlink: add new RTM_GETSTATS message to dump...")
Signed-off-by: Mathias Krause <minipli@googlemail.com>
Cc: Roopa Prabhu <roopa@cumulusnetworks.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
(cherry picked from commit 4775cc1f2d5abca894ac32774eefc22c45347d1c)

BUG= chromium:828485 
TEST=build on eve and kevin

Change-Id: Ib3faa8ebf0845a89bdb2b774260a406d896c8023
Reviewed-on: https://chromium-review.googlesource.com/997093
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Brian Norris <briannorris@chromium.org>

[modify] https://crrev.com/75fd174654082667a7813663497471b055ba5b52/net/core/rtnetlink.c

Project Member

Comment 74 by bugdroid1@chromium.org, Apr 12 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/cbddacbfd0f89cd59e83498ca280f64bb9b13235

commit cbddacbfd0f89cd59e83498ca280f64bb9b13235
Author: Nikolay Aleksandrov <nikolay@cumulusnetworks.com>
Date: Thu Apr 12 01:07:06 2018

UPSTREAM: net: rtnetlink: fix info leak in RTM_GETSTATS call

When RTM_GETSTATS was added the fields of its header struct were not all
initialized when returning the result thus leaking 4 bytes of information
to user-space per rtnl_fill_statsinfo call, so initialize them now. Thanks
to Alexander Potapenko for the detailed report and bisection.

Reported-by: Alexander Potapenko <glider@google.com>
Fixes: 10c9ead9f3c6 ("rtnetlink: add new RTM_GETSTATS message to dump link stats")
Signed-off-by: Nikolay Aleksandrov <nikolay@cumulusnetworks.com>
Acked-by: Roopa Prabhu <roopa@cumulusnetworks.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
(cherry picked from commit ce024f42c2e28b6bce4ecc1e891b42f57f753892)

BUG= chromium:828485 
TEST=build on eve and kevin

Change-Id: I19a278b2d6025f22ae9609132b2355c943c04d2c
Reviewed-on: https://chromium-review.googlesource.com/997094
Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Brian Norris <briannorris@chromium.org>

[modify] https://crrev.com/cbddacbfd0f89cd59e83498ca280f64bb9b13235/net/core/rtnetlink.c

Project Member

Comment 75 by bugdroid1@chromium.org, Apr 13 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/052aebc19427c2551c3ef00c53a9c68fa7150e6e

commit 052aebc19427c2551c3ef00c53a9c68fa7150e6e
Author: Wei Yongjun <weiyongjun1@huawei.com>
Date: Fri Apr 13 03:34:45 2018

UPSTREAM: cfg80211: fix possible memory leak in cfg80211_iter_combinations()

'limits' is malloced in cfg80211_iter_combinations() and should be freed
before leaving from the error handling cases, otherwise it will cause
memory leak.

Fixes: 0c317a02ca98 ("cfg80211: support virtual interfaces with different beacon intervals")
Signed-off-by: Wei Yongjun <weiyongjun1@huawei.com>
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
(cherry picked from commit 320c975f180b19296f0fd6c5bf2144e633aaba5e)

BUG= chromium:828485 
TEST=build on eve and kevin

Change-Id: I52631a879d1cf5b0fd15d063d91fbe97157e73f4
Reviewed-on: https://chromium-review.googlesource.com/1004271
Commit-Ready: ChromeOS CL Exonerator Bot <chromiumos-cl-exonerator@appspot.gserviceaccount.com>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Brian Norris <briannorris@chromium.org>

[modify] https://crrev.com/052aebc19427c2551c3ef00c53a9c68fa7150e6e/net/wireless/util.c

Project Member

Comment 76 by bugdroid1@chromium.org, Apr 13 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/534eccedf06b34d74b999fa86b429e4eb20465cf

commit 534eccedf06b34d74b999fa86b429e4eb20465cf
Author: Anilkumar Kolli <akolli@codeaurora.org>
Date: Fri Apr 13 03:34:49 2018

UPSTREAM: ath10k: advertize beacon_int_min_gcd

This patch fixes regression caused by 0c317a02ca98
("cfg80211: support virtual interfaces with different beacon intervals"),
with this change cfg80211 expects the driver to advertize
'beacon_int_min_gcd' to support different beacon intervals in multivap
scenario. This support is added for, QCA988X/QCA99X0/QCA9984/QCA4019.

Verifed AP + mesh bring up on QCA9984 with beacon interval 100msec and
1000msec respectively.
Frimware: firmware-5.bin_10.4-3.5.3-00053

Fixes: 0c317a02ca98 ("cfg80211: support virtual interfaces with different beacon intervals")
Signed-off-by: Anilkumar Kolli <akolli@codeaurora.org>
Signed-off-by: Kalle Valo <kvalo@codeaurora.org>
(cherry picked from commit 8ebee73b574ad3dd1f14d461f65ceaffbd637650)

BUG= chromium:828485 
TEST=build on eve and kevin

Change-Id: I5c60f2fc8d572df216053719b1a904eedc041579
Reviewed-on: https://chromium-review.googlesource.com/1004272
Commit-Ready: ChromeOS CL Exonerator Bot <chromiumos-cl-exonerator@appspot.gserviceaccount.com>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Brian Norris <briannorris@chromium.org>

[modify] https://crrev.com/534eccedf06b34d74b999fa86b429e4eb20465cf/drivers/net/wireless/ath/ath10k/mac.c

Project Member

Comment 77 by bugdroid1@chromium.org, Apr 13 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/1236dbdb658c969ce6fd2d82c432aa4ed84d2ef7

commit 1236dbdb658c969ce6fd2d82c432aa4ed84d2ef7
Author: Srinivas Dasari <dasaris@qti.qualcomm.com>
Date: Fri Apr 13 03:34:51 2018

UPSTREAM: cfg80211: Check if NAN service ID is of expected size

nla policy checks for only maximum length of the attribute data when the
attribute type is NLA_BINARY. If userspace sends less data than
specified, cfg80211 may access illegal memory. When type is NLA_UNSPEC,
nla policy check ensures that userspace sends minimum specified length
number of bytes.

Remove type assignment to NLA_BINARY from nla_policy of
NL80211_NAN_FUNC_SERVICE_ID to make these NLA_UNSPEC and to make sure
minimum NL80211_NAN_FUNC_SERVICE_ID_LEN bytes are received from
userspace with NL80211_NAN_FUNC_SERVICE_ID.

Fixes: a442b761b24 ("cfg80211: add add_nan_func / del_nan_func")
Cc: stable@vger.kernel.org
Signed-off-by: Srinivas Dasari <dasaris@qti.qualcomm.com>
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
(cherry picked from commit 0a27844ce86d039d74221dd56cd8c0349b146b63)

BUG= chromium:828485 
TEST=build on eve and kevin

Change-Id: I3cb31f656a9534ad44b32b51cbed6e0c271f93fd
Reviewed-on: https://chromium-review.googlesource.com/1004273
Commit-Ready: ChromeOS CL Exonerator Bot <chromiumos-cl-exonerator@appspot.gserviceaccount.com>
Tested-by: Brian Norris <briannorris@chromium.org>
Reviewed-by: Brian Norris <briannorris@chromium.org>

[modify] https://crrev.com/1236dbdb658c969ce6fd2d82c432aa4ed84d2ef7/net/wireless/nl80211.c

Project Member

Comment 78 by bugdroid1@chromium.org, Apr 13 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/39d7aea4056e7aa99467f11ab9fe7a8d1315de4e

commit 39d7aea4056e7aa99467f11ab9fe7a8d1315de4e
Author: Emmanuel Grumbach <emmanuel.grumbach@intel.com>
Date: Fri Apr 13 03:34:36 2018

UPSTREAM: cfg80211: honor NL80211_RRF_NO_HT40{MINUS,PLUS}

Honor the NL80211_RRF_NO_HT40{MINUS,PLUS} flags in
reg_process_ht_flags_channel. Not doing so leads can lead
to a firmware assert in iwlwifi for example.

Fixes: b0d7aa59592b ("cfg80211: allow wiphy specific regdomain management")
Signed-off-by: Emmanuel Grumbach <emmanuel.grumbach@intel.com>
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
(cherry picked from commit 4e0854a74f08e6a9d847f2c2cfae7b07c931d125)

BUG= chromium:828485 
TEST=build on eve and kevin

Change-Id: Id5ff1f26a5b5984f4b7dc5e78021a13ceb387598
Reviewed-on: https://chromium-review.googlesource.com/989275
Commit-Ready: ChromeOS CL Exonerator Bot <chromiumos-cl-exonerator@appspot.gserviceaccount.com>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Brian Norris <briannorris@chromium.org>

[modify] https://crrev.com/39d7aea4056e7aa99467f11ab9fe7a8d1315de4e/net/wireless/reg.c

Project Member

Comment 79 by bugdroid1@chromium.org, Apr 13 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/288925877eb25c28177cf0978258abf04ac6a969

commit 288925877eb25c28177cf0978258abf04ac6a969
Author: Kirtika Ruchandani <kirtika@google.com>
Date: Fri Apr 13 03:34:34 2018

UPSTREAM: brcmfmac: Fix check for ISO3166 code

The commit "regulatory: add NUL to request alpha2" increases the length of
alpha2 to 3. This causes a regression on brcmfmac, because
brcmf_cfg80211_reg_notifier() expect valid ISO3166 codes in the complete
array. So fix this accordingly.

Fixes: 657308f73e67 ("regulatory: add NUL to request alpha2")
Signed-off-by: Stefan Wahren <stefan.wahren@i2se.com>
Acked-by: Franky Lin <franky.lin@broadcom.com>
Signed-off-by: Kalle Valo <kvalo@codeaurora.org>
(cherry-picked from upstream commit 9b9322db5c5a1917a66c71fe47c3848a9a31227e)

BUG= chromium:828485 
TEST=build on eve and kevin (smoke-test only, neither runs brcm)

Change-Id: Ib3313dc7600bc3eb97ed4a488741bc26f35931ba
Reviewed-on: https://chromium-review.googlesource.com/993766
Commit-Ready: ChromeOS CL Exonerator Bot <chromiumos-cl-exonerator@appspot.gserviceaccount.com>
Tested-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Brian Norris <briannorris@chromium.org>

[modify] https://crrev.com/288925877eb25c28177cf0978258abf04ac6a969/drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c

Project Member

Comment 80 by bugdroid1@chromium.org, Apr 18 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/2346b536e7673b132df05ed2d94a64a882ba4dfb

commit 2346b536e7673b132df05ed2d94a64a882ba4dfb
Author: Al Viro <viro@zeniv.linux.org.uk>
Date: Wed Apr 18 06:34:43 2018

UPSTREAM: [regression] fix braino in fs/dlm/user.c

it's "bugger off if we got ERR_PTR", not the other way round...

Signed-off-by: Bob Peterson <rpeterso@redhat.com>
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>

BUG= chromium:828485 
TEST=Run smatch. Ensure that DLM, especially the affected function, still works

Reported by 0day / Dan Carpenter as:

smatch warnings:
fs/dlm/user.c:524 device_write() warn: passing a valid pointer to 'PTR_ERR'
fs/dlm/user.c:526 device_write() error: 'kbuf' dereferencing possible ERR_PTR()

Change-Id: Idf471116cd36f99458245888e2a06f8d9e32e93c
Signed-off-by: Guenter Roeck <groeck@chromium.org>
(cherry picked from commit 117aa41e8020fe493bbb677ebe828c3a4b380185)
Reviewed-on: https://chromium-review.googlesource.com/1015411
Reviewed-by: Kirtika Ruchandani <kirtika@chromium.org>
Reviewed-by: Brian Norris <briannorris@chromium.org>

[modify] https://crrev.com/2346b536e7673b132df05ed2d94a64a882ba4dfb/fs/dlm/user.c

Status: Assigned (was: Untriaged)
This bug has an owner, thus, it's been triaged. Changing status to "assigned".
Status: Fixed (was: Assigned)
Eve was ETSI compliant by R67 - this bug was just not marked as fixed. 
See more details on b/38500355

Sign in to add a comment