Tracking bug for cfg80211 backport patches for ETSI compliance |
||||
Issue descriptionSee internal b/76133001. That bug tracks getting in the patches for ETSI compliance. This bug tracks the dependencies that are not related to ETSI compliance /regulatory but need to be pulled in to cleanly cherry-pick and build.
,
Apr 3 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/278c6b901e2cf8b95cfbdc5b67b8adef67e1ab82 commit 278c6b901e2cf8b95cfbdc5b67b8adef67e1ab82 Author: Michal Sojka <sojkam1@fel.cvut.cz> Date: Tue Apr 03 23:12:34 2018 UPSTREAM: cfg80211: Remove unused cfg80211_can_use_iftype_chan() Last caller of this function was removed in 3.17 in commit 97dc94f1d933c9df2c0b327066ea130c0e92083f. Signed-off-by: Michal Sojka <sojkam1@fel.cvut.cz> Signed-off-by: Johannes Berg <johannes.berg@intel.com> (cherry picked from commit c781944b71f87aa4d30eaaafb4e7573ce94bdcfd) BUG= chromium:828485 TEST=build 4.4 kernel on eve and kevin Change-Id: Icf6b921c67c8a934b6b2ca5746d85dc279db3dbf Reviewed-on: https://chromium-review.googlesource.com/990795 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Kirtika Ruchandani <kirtika@chromium.org> [modify] https://crrev.com/278c6b901e2cf8b95cfbdc5b67b8adef67e1ab82/net/wireless/util.c [modify] https://crrev.com/278c6b901e2cf8b95cfbdc5b67b8adef67e1ab82/net/wireless/core.h
,
Apr 3 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/0c7b49dd59ec6a1ceec05643970a875fe5de23f2 commit 0c7b49dd59ec6a1ceec05643970a875fe5de23f2 Author: Johannes Berg <johannes.berg@intel.com> Date: Tue Apr 03 23:12:36 2018 UPSTREAM: cfg80211: make wdev_list accessible to drivers There's no harm in having drivers read the list, since they can use RCU protection or RTNL locking; allow this to not require each and every driver to also implement its own bookkeeping. Signed-off-by: Johannes Berg <johannes.berg@intel.com> (cherry picked from commit 53873f134d285191ef6435882d55837093a36c53) BUG= chromium:828485 TEST=Build 4.4 kernel on eve and kevin Change-Id: I4e1ac133063c4285e121d6be178c670f3e19c372 Reviewed-on: https://chromium-review.googlesource.com/990796 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Kirtika Ruchandani <kirtika@chromium.org> [modify] https://crrev.com/0c7b49dd59ec6a1ceec05643970a875fe5de23f2/net/wireless/reg.c [modify] https://crrev.com/0c7b49dd59ec6a1ceec05643970a875fe5de23f2/net/wireless/sysfs.c [modify] https://crrev.com/0c7b49dd59ec6a1ceec05643970a875fe5de23f2/net/wireless/core.h [modify] https://crrev.com/0c7b49dd59ec6a1ceec05643970a875fe5de23f2/net/wireless/util.c [modify] https://crrev.com/0c7b49dd59ec6a1ceec05643970a875fe5de23f2/net/wireless/sme.c [modify] https://crrev.com/0c7b49dd59ec6a1ceec05643970a875fe5de23f2/net/wireless/core.c [modify] https://crrev.com/0c7b49dd59ec6a1ceec05643970a875fe5de23f2/net/wireless/nl80211.c [modify] https://crrev.com/0c7b49dd59ec6a1ceec05643970a875fe5de23f2/include/net/cfg80211.h [modify] https://crrev.com/0c7b49dd59ec6a1ceec05643970a875fe5de23f2/net/wireless/chan.c
,
Apr 6 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/1f6d3c08013f117aff970ecd32bb9a8c871afd72 commit 1f6d3c08013f117aff970ecd32bb9a8c871afd72 Author: Lior David <liord@codeaurora.org> Date: Fri Apr 06 05:11:57 2018 UPSTREAM: cfg80211: basic support for PBSS network type PBSS (Personal Basic Service Set) is a new BSS type for DMG networks. It is similar to infrastructure BSS, having an AP-like entity called PCP (PBSS Control Point), but it has few differences. PBSS support is mandatory for 11ad devices. Add support for PBSS by introducing a new PBSS flag attribute. The PBSS flag is used in the START_AP command to request starting a PCP instead of an AP, and in the CONNECT command to request connecting to a PCP instead of an AP. Signed-off-by: Lior David <liord@codeaurora.org> Signed-off-by: Johannes Berg <johannes.berg@intel.com> (cherry picked from commit 34d505193bd10668acf1caba02d2f66bddc23fea) BUG= chromium:828485 TEST=trybot on eve Change-Id: Ib4308117df15da5e3eb8f4aa73b78b182c244773 Reviewed-on: https://chromium-review.googlesource.com/989123 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Brian Norris <briannorris@chromium.org> [modify] https://crrev.com/1f6d3c08013f117aff970ecd32bb9a8c871afd72/drivers/net/wireless/ath/wil6210/cfg80211.c [modify] https://crrev.com/1f6d3c08013f117aff970ecd32bb9a8c871afd72/include/uapi/linux/nl80211.h [modify] https://crrev.com/1f6d3c08013f117aff970ecd32bb9a8c871afd72/net/wireless/nl80211.c [modify] https://crrev.com/1f6d3c08013f117aff970ecd32bb9a8c871afd72/include/net/cfg80211.h [modify] https://crrev.com/1f6d3c08013f117aff970ecd32bb9a8c871afd72/net/wireless/sme.c
,
Apr 6 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/35c765052d5ac5bad546974b6e9370e1cfe04a1e commit 35c765052d5ac5bad546974b6e9370e1cfe04a1e Author: Beni Lev <beni.lev@intel.com> Date: Fri Apr 06 05:12:01 2018 UPSTREAM: cfg80211: Add global RRM capability Today, the supplicant will add the RRM capabilities Information Element in the association request only if Quiet period is supported (NL80211_FEATURE_QUIET). Quiet is one of many RRM features, and there are other RRM features that are not related to Quiet (e.g. neighbor report). Therefore, requiring Quiet to enable RRM is too restrictive. Some of the features, like neighbor report, can be supported by user space without any help from the kernel. Hence adding the RRM capabilities IE to association request should be the sole user space's decision. Removing the RRM dependency on Quiet in the driver solves this problem, but using an old driver with a user space tool that would not require Quiet feature would be problematic: the user space would add NL80211_ATTR_USE_RRM in the association request even if the kernel doesn't advertize NL80211_FEATURE_QUIET and the association would be denied by the kernel. This solution adds a global RRM capability, that tells user space that it can request RRM capabilities IE publishment without any specific feature support in the kernel. Signed-off-by: Beni Lev <beni.lev@intel.com> Signed-off-by: Emmanuel Grumbach <emmanuel.grumbach@intel.com> Signed-off-by: Johannes Berg <johannes.berg@intel.com> (cherry picked from commit 0c9ca11b1ae8eb16c1b6bbae91991392d2321372) BUG= chromium:828485 TEST=trybot on Eve Change-Id: Ifc785fde3747162b74c79effcf9e54e3411921d9 Reviewed-on: https://chromium-review.googlesource.com/989124 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Brian Norris <briannorris@chromium.org> [modify] https://crrev.com/35c765052d5ac5bad546974b6e9370e1cfe04a1e/include/uapi/linux/nl80211.h [modify] https://crrev.com/35c765052d5ac5bad546974b6e9370e1cfe04a1e/net/wireless/nl80211.c
,
Apr 6 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/f83bb0cbd76b2357f52715efa7af9bc9982cd338 commit f83bb0cbd76b2357f52715efa7af9bc9982cd338 Author: Johannes Berg <johannes.berg@intel.com> Date: Fri Apr 06 05:11:55 2018 UPSTREAM: wireless: move IEEE80211_NUM_ACS to ieee80211.h This constant isn't really specific to mac80211, so move it "up" a level to ieee80211.h Signed-off-by: Johannes Berg <johannes.berg@intel.com> (cherry picked from commit 3db5e3e707ebb9ab0ce3a2dcd924ed2ea525d770) BUG= chromium:828485 TEST=build on eve and kevin Change-Id: Ic070ad89f38ab2d2aa381e4e4669255fd1040f7c Reviewed-on: https://chromium-review.googlesource.com/991254 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Brian Norris <briannorris@chromium.org> [modify] https://crrev.com/f83bb0cbd76b2357f52715efa7af9bc9982cd338/include/linux/ieee80211.h [modify] https://crrev.com/f83bb0cbd76b2357f52715efa7af9bc9982cd338/include/net/mac80211.h
,
Apr 6 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/54780623376116343200fa1aae0573d67729a4be commit 54780623376116343200fa1aae0573d67729a4be Author: Purushottam Kushwaha <pkushwah@qti.qualcomm.com> Date: Fri Apr 06 05:11:59 2018 BACKPORT: nl80211: Move ACL parsing later to avoid a possible memory leak No support for pbss results in a memory leak for the acl_data (if parse_acl_data succeeds). Fix this by moving the ACL parsing later. Cc: stable@vger.kernel.org Fixes: 34d505193bd10 ("cfg80211: basic support for PBSS network type") Signed-off-by: Purushottam Kushwaha <pkushwah@qti.qualcomm.com> Signed-off-by: Johannes Berg <johannes@sipsolutions.net> (cherry picked from commit 6e8ef842223b90a33efd570128bb566a9ae6f5ad) Conflicts: net/wireless/nl80211.c kirtika@: Conflict due to renaming IEEE80211_BAND_60GHZ -> NL80211_BAND_60GHZ BUG= chromium:828485 TEST=build on eve Change-Id: Id8d647cf5057fcab02df8e904ae22bfac4ffdd31 Reviewed-on: https://chromium-review.googlesource.com/992855 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Brian Norris <briannorris@chromium.org> [modify] https://crrev.com/54780623376116343200fa1aae0573d67729a4be/net/wireless/nl80211.c
,
Apr 11 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/92f0822fde96f7e241703e37c777878c999b6a28 commit 92f0822fde96f7e241703e37c777878c999b6a28 Author: Johannes Berg <johannes.berg@intel.com> Date: Wed Apr 11 11:38:04 2018 UPSTREAM: cfg80211: replace ieee80211_ie_split() with an inline The function is a very simple wrapper around another one, just adds a few default parameters, so replace it with a static inline instead of using EXPORT_SYMBOL, reducing the module size slightly. Signed-off-by: Johannes Berg <johannes.berg@intel.com> (cherry picked from commit 0483eeac59876ac37d4edbabd48727a468416d5b) BUG= chromium:828485 TEST=build on eve and kevin Change-Id: I1fc30fa570028857e2ecff72bb7bd69e009be29d Reviewed-on: https://chromium-review.googlesource.com/1004121 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Brian Norris <briannorris@chromium.org> [modify] https://crrev.com/92f0822fde96f7e241703e37c777878c999b6a28/net/wireless/util.c [modify] https://crrev.com/92f0822fde96f7e241703e37c777878c999b6a28/include/net/cfg80211.h
,
Apr 11 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/278a5de3cad08830dbfd6946ec0000c8485ead09 commit 278a5de3cad08830dbfd6946ec0000c8485ead09 Author: Ilan Peer <ilan.peer@intel.com> Date: Wed Apr 11 11:38:06 2018 UPSTREAM: cfg80211: Add missing tracing to cfg80211 Add missing tracing for: 1. start_radar_detection() 2. set_mcast_rates() 3. set_coalesce() Signed-off-by: Ilan Peer <ilan.peer@intel.com> Signed-off-by: Emmanuel Grumbach <emmanuel.grumbach@intel.com> Signed-off-by: Johannes Berg <johannes.berg@intel.com> (cherry picked from commit a1056b1baaa887de52a76a5fcf5aeb4327c96c8a) BUG= chromium:828485 TEST=build on eve and kevin Change-Id: Ic23e25d3987bca53a382761a6a0e865f9d7ac64d Reviewed-on: https://chromium-review.googlesource.com/1004122 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Brian Norris <briannorris@chromium.org> [modify] https://crrev.com/278a5de3cad08830dbfd6946ec0000c8485ead09/net/wireless/trace.h [modify] https://crrev.com/278a5de3cad08830dbfd6946ec0000c8485ead09/net/wireless/rdev-ops.h [modify] https://crrev.com/278a5de3cad08830dbfd6946ec0000c8485ead09/net/wireless/nl80211.c
,
Apr 11 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/82e3f998ae01ac52357dd39e23a84bb196f5bf7e commit 82e3f998ae01ac52357dd39e23a84bb196f5bf7e Author: Vidyullatha Kanchanapally <vkanchan@qti.qualcomm.com> Date: Wed Apr 11 11:38:08 2018 UPSTREAM: cfg80211: Add support for aborting an ongoing scan Implement new functionality for aborting an ongoing scan. Add NL80211_CMD_ABORT_SCAN to the nl80211 interface. After aborting the scan, driver shall provide the scan status by calling cfg80211_scan_done(). Reviewed-by: Jouni Malinen <jouni@qca.qualcomm.com> Signed-off-by: Vidyullatha Kanchanapally <vkanchan@qti.qualcomm.com> Signed-off-by: Sunil Dutt <usdutt@qti.qualcomm.com> [change command to take wdev instead of netdev so that it can be used on p2p-device scans] Signed-off-by: Johannes Berg <johannes.berg@intel.com> (cherry picked from commit 91d3ab46730379e89e1e908c6f62fbcadb3d8f08) BUG= chromium:828485 TEST=build on eve and kevin Change-Id: I1a2da24ac6ed34eb729dc26a94d458edefd300a9 Reviewed-on: https://chromium-review.googlesource.com/1004123 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Brian Norris <briannorris@chromium.org> [modify] https://crrev.com/82e3f998ae01ac52357dd39e23a84bb196f5bf7e/net/wireless/trace.h [modify] https://crrev.com/82e3f998ae01ac52357dd39e23a84bb196f5bf7e/net/wireless/rdev-ops.h [modify] https://crrev.com/82e3f998ae01ac52357dd39e23a84bb196f5bf7e/include/uapi/linux/nl80211.h [modify] https://crrev.com/82e3f998ae01ac52357dd39e23a84bb196f5bf7e/net/wireless/nl80211.c [modify] https://crrev.com/82e3f998ae01ac52357dd39e23a84bb196f5bf7e/include/net/cfg80211.h
,
Apr 11 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/f3c90392139abb81b490dafb52a6e2bb81d7ca2f commit f3c90392139abb81b490dafb52a6e2bb81d7ca2f Author: Ola Olsson <ola1olsson@gmail.com> Date: Wed Apr 11 11:38:14 2018 UPSTREAM: nl80211: Zero out the connection keys memory when freeing them. The connection keys are zeroed out in all other cases except this one. Let's fix the last one as well. Signed-off-by: Ola Olsson <ola.olsson@sonymobile.com> Reviewed-by: Julian Calaby <julian.calaby@gmail.com> Signed-off-by: Johannes Berg <johannes.berg@intel.com> (cherry picked from commit 5e950a78bf5b18ded277a27aed0bcdbe7c1b868a) BUG= chromium:828485 TEST=build on eve and kevin Change-Id: Iccc78abd15b77e374e9ef9f9482665f4c8787adb Reviewed-on: https://chromium-review.googlesource.com/1004124 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Brian Norris <briannorris@chromium.org> [modify] https://crrev.com/f3c90392139abb81b490dafb52a6e2bb81d7ca2f/net/wireless/nl80211.c
,
Apr 11 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/61a8611b76102c7b39c90b712edf89c340860ac1 commit 61a8611b76102c7b39c90b712edf89c340860ac1 Author: Eric Dumazet <edumazet@google.com> Date: Wed Apr 11 11:38:18 2018 UPSTREAM: net: add netif_tx_napi_add() netif_tx_napi_add() is a variant of netif_napi_add() It should be used by drivers that use a napi structure to exclusively poll TX. We do not want to add this kind of napi in napi_hash[] in following patches, adding generic busy polling to all NAPI drivers. Signed-off-by: Eric Dumazet <edumazet@google.com> Signed-off-by: David S. Miller <davem@davemloft.net> (cherry picked from commit d64b5e85bfe2fe4c790abcbd16d9ae32391ddd7e) BUG= chromium:828485 TEST=build on eve and kevin Change-Id: I24e2a6ae995694fee8c8f79fda99bbd39adda771 Reviewed-on: https://chromium-review.googlesource.com/1004129 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Brian Norris <briannorris@chromium.org> [modify] https://crrev.com/61a8611b76102c7b39c90b712edf89c340860ac1/drivers/net/ethernet/freescale/fs_enet/fs_enet-main.c [modify] https://crrev.com/61a8611b76102c7b39c90b712edf89c340860ac1/include/linux/netdevice.h [modify] https://crrev.com/61a8611b76102c7b39c90b712edf89c340860ac1/drivers/net/ethernet/broadcom/genet/bcmgenet.c [modify] https://crrev.com/61a8611b76102c7b39c90b712edf89c340860ac1/drivers/net/ethernet/qlogic/qlcnic/qlcnic_io.c [modify] https://crrev.com/61a8611b76102c7b39c90b712edf89c340860ac1/net/core/dev.c [modify] https://crrev.com/61a8611b76102c7b39c90b712edf89c340860ac1/drivers/net/ethernet/ti/cpsw.c [modify] https://crrev.com/61a8611b76102c7b39c90b712edf89c340860ac1/drivers/net/ethernet/ti/netcp_core.c [modify] https://crrev.com/61a8611b76102c7b39c90b712edf89c340860ac1/drivers/net/ethernet/freescale/gianfar.c [modify] https://crrev.com/61a8611b76102c7b39c90b712edf89c340860ac1/drivers/net/ethernet/broadcom/bcmsysport.c [modify] https://crrev.com/61a8611b76102c7b39c90b712edf89c340860ac1/drivers/net/ethernet/rocker/rocker.c [modify] https://crrev.com/61a8611b76102c7b39c90b712edf89c340860ac1/drivers/net/wireless/ath/wil6210/netdev.c [modify] https://crrev.com/61a8611b76102c7b39c90b712edf89c340860ac1/drivers/net/ethernet/mellanox/mlx4/en_cq.c
,
Apr 11 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/4e4b3127abbd7874ec466747ddc28c8cd716731c commit 4e4b3127abbd7874ec466747ddc28c8cd716731c Author: Al Viro <viro@zeniv.linux.org.uk> Date: Wed Apr 11 11:38:21 2018 UPSTREAM: convert a bunch of open-coded instances of memdup_user_nul() A _lot_ of ->write() instances were open-coding it; some are converted to memdup_user_nul(), a lot more remain... Signed-off-by: Al Viro <viro@zeniv.linux.org.uk> (cherry picked from commit 16e5c1fc36040e592128a164499bc25eb138a80f) BUG= chromium:828485 TEST=build on eve and kevin Change-Id: Ib0cccd2ec055054c815f34ec8cce0bddffa2963a Reviewed-on: https://chromium-review.googlesource.com/1004130 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Brian Norris <briannorris@chromium.org> [modify] https://crrev.com/4e4b3127abbd7874ec466747ddc28c8cd716731c/security/tomoyo/securityfs_if.c [modify] https://crrev.com/4e4b3127abbd7874ec466747ddc28c8cd716731c/security/smack/smackfs.c [modify] https://crrev.com/4e4b3127abbd7874ec466747ddc28c8cd716731c/drivers/sbus/char/openprom.c [modify] https://crrev.com/4e4b3127abbd7874ec466747ddc28c8cd716731c/lib/dynamic_debug.c [modify] https://crrev.com/4e4b3127abbd7874ec466747ddc28c8cd716731c/drivers/s390/char/vmcp.c [modify] https://crrev.com/4e4b3127abbd7874ec466747ddc28c8cd716731c/fs/dlm/user.c [modify] https://crrev.com/4e4b3127abbd7874ec466747ddc28c8cd716731c/arch/xtensa/platforms/iss/simdisk.c [modify] https://crrev.com/4e4b3127abbd7874ec466747ddc28c8cd716731c/net/rxrpc/ar-key.c [modify] https://crrev.com/4e4b3127abbd7874ec466747ddc28c8cd716731c/fs/afs/proc.c [modify] https://crrev.com/4e4b3127abbd7874ec466747ddc28c8cd716731c/fs/cachefiles/daemon.c [modify] https://crrev.com/4e4b3127abbd7874ec466747ddc28c8cd716731c/kernel/trace/blktrace.c [modify] https://crrev.com/4e4b3127abbd7874ec466747ddc28c8cd716731c/drivers/net/wireless/ath/wil6210/debugfs.c
,
Apr 11 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/81ac840e1b946dcd4757ec2a48b0c67a949dffbb commit 81ac840e1b946dcd4757ec2a48b0c67a949dffbb Author: Johannes Berg <johannes.berg@intel.com> Date: Wed Apr 11 11:38:23 2018 UPSTREAM: mac80211: fix mgmt-tx abort cookie and leak If a mgmt-tx operation is aborted before it runs, the wrong cookie is reported back to userspace, and the ack_skb gets leaked since the frame is freed directly instead of freeing it using ieee80211_free_txskb(). Fix that. Fixes: 3b79af973cf4 ("mac80211: stop using pointers as userspace cookies") Signed-off-by: Johannes Berg <johannes.berg@intel.com> (cherry picked from commit e673a65952b4ab045a3e3eb200fdf408004fb4fd) BUG= chromium:828485 TEST=build on eve and kevin Change-Id: Ic9579ae2c2ae424169d061674bcf62c53b1a3f08 Reviewed-on: https://chromium-review.googlesource.com/1004252 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Brian Norris <briannorris@chromium.org> [modify] https://crrev.com/81ac840e1b946dcd4757ec2a48b0c67a949dffbb/net/mac80211/offchannel.c
,
Apr 11 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/3d0b566cc854e9be8865d3215b463c299c9b29b4 commit 3d0b566cc854e9be8865d3215b463c299c9b29b4 Author: Johannes Berg <johannes.berg@intel.com> Date: Wed Apr 11 11:38:27 2018 UPSTREAM: mac80211: move off-channel/mgmt-tx code to offchannel.c This is quite a bit of code that logically depends here since it has to deal with all the remain-on-channel logic. Signed-off-by: Johannes Berg <johannes.berg@intel.com> (cherry picked from commit a2fcfccbad43e413de7e7ac39879ba91548f06c1) BUG= chromium:828485 TEST=build on eve and kevin Change-Id: I0e97148636d36ea6fdac799b7aeafa6f58ea31ba Signed-off-by: Brian Norris <briannorris@chromium.org> Reviewed-on: https://chromium-review.googlesource.com/1004253 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> [modify] https://crrev.com/3d0b566cc854e9be8865d3215b463c299c9b29b4/net/mac80211/ieee80211_i.h [modify] https://crrev.com/3d0b566cc854e9be8865d3215b463c299c9b29b4/net/mac80211/cfg.c [modify] https://crrev.com/3d0b566cc854e9be8865d3215b463c299c9b29b4/net/mac80211/offchannel.c
,
Apr 11 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/95c87dd66a4b7ec394dce99269742253aca0e1c7 commit 95c87dd66a4b7ec394dce99269742253aca0e1c7 Author: Arend van Spriel <arend@broadcom.com> Date: Wed Apr 11 11:38:29 2018 UPSTREAM: brcmfmac: no interface combination check for single interface The interface combinations are intended for use-case in which the driver handles multiple interface concurrently. This means that the combinations do not need to be checked when there is only a single interface active. Reviewed-by: Hante Meuleman <meuleman@broadcom.com> Reviewed-by: Pieter-Paul Giesberts <pieterpg@broadcom.com> Signed-off-by: Arend van Spriel <arend@broadcom.com> Signed-off-by: Kalle Valo <kvalo@codeaurora.org> (cherry picked from commit 353c46ac9e530f511fba9387e1e63226eb168e63) BUG= chromium:828485 TEST=build on eve and kevin Change-Id: Icfe53c920cfbcff115071a196282ae50e82eeb3f Reviewed-on: https://chromium-review.googlesource.com/1004262 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Brian Norris <briannorris@chromium.org> [modify] https://crrev.com/95c87dd66a4b7ec394dce99269742253aca0e1c7/drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c
,
Apr 11 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/ccd50d5d3616368e2bd368ed6157a42fe2f61a05 commit ccd50d5d3616368e2bd368ed6157a42fe2f61a05 Author: Johannes Berg <johannes.berg@intel.com> Date: Wed Apr 11 11:38:25 2018 UPSTREAM: mac80211: properly free skb when r-o-c for TX fails When freeing the TX skb for an off-channel TX, use the correct API to also free the ACK skb that might have been allocated. Signed-off-by: Johannes Berg <johannes.berg@intel.com> (cherry picked from commit 86c7ec9eb154020797c39e1cc7dafa92da02f603) BUG= chromium:828485 TEST=build Change-Id: Id947e582085e4ed91ab200ec535522ef4346e0ad Signed-off-by: Brian Norris <briannorris@chromium.org> Reviewed-on: https://chromium-review.googlesource.com/1005364 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> [modify] https://crrev.com/ccd50d5d3616368e2bd368ed6157a42fe2f61a05/net/mac80211/cfg.c
,
Apr 11 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/f21b0b2643bc181614ca5b8ab4d3c0e6cb56017d commit f21b0b2643bc181614ca5b8ab4d3c0e6cb56017d Author: Johannes Berg <johannes.berg@intel.com> Date: Wed Apr 11 11:38:12 2018 UPSTREAM: cfg80211: handle add_station auth/assoc flag quirks When a new station is added to AP/GO interfaces the default behaviour is for it to be added authenticated and associated, due to backwards compatibility. To prevent that, the driver must be able to do that (setting the NL80211_FEATURE_FULL_AP_CLIENT_STATE feature flag) and userspace must set the flag mask to auth|assoc and clear the set. Handle this quirk in the API entirely in nl80211, and always push the full flags to the drivers. NL80211_FEATURE_FULL_AP_CLIENT_STATE is still required for userspace to be allowed to set the mask including those bits, but after checking that add both flags to the mask and set in case userspace didn't set them otherwise. This obsoletes the mac80211 code handling this difference, no other driver is currently using these flags. Signed-off-by: Johannes Berg <johannes.berg@intel.com> (cherry picked from commit bda95eb1d1581cfd79e9717ebda4b7ccd2265351) BUG= chromium:828485 TEST=trybot on eve Change-Id: I55e70f5f20ab394237425a335cdd6fa4fabbe2a2 Reviewed-on: https://chromium-review.googlesource.com/989126 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Brian Norris <briannorris@chromium.org> [modify] https://crrev.com/f21b0b2643bc181614ca5b8ab4d3c0e6cb56017d/net/mac80211/cfg.c [modify] https://crrev.com/f21b0b2643bc181614ca5b8ab4d3c0e6cb56017d/net/wireless/nl80211.c
,
Apr 11 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/77ef008da956220d6456baee0ed2587afc035266 commit 77ef008da956220d6456baee0ed2587afc035266 Author: Ayala Beker <ayala.beker@intel.com> Date: Wed Apr 11 11:38:10 2018 UPSTREAM: cfg80211: use NL80211_ATTR_STA_AID in nl82011_set_station Fix nl80211_set_station() to use the value of NL80211_ATTR_STA_AID attribute instead of NL80211_ATTR_PEER_AID attribute. Signed-off-by: Ayala Beker <ayala.beker@intel.com> Signed-off-by: Johannes Berg <johannes.berg@intel.com> (cherry picked from commit a9bc31e418733e4c476f4322c90b7c09aab31002) BUG= chromium:828485 TEST=trybot on Eve Change-Id: I594f4e257c1af38c7f3370ec7f4e7dbd064af899 Reviewed-on: https://chromium-review.googlesource.com/989127 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Brian Norris <briannorris@chromium.org> [modify] https://crrev.com/77ef008da956220d6456baee0ed2587afc035266/net/wireless/nl80211.c
,
Apr 11 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/b556135136177d9f21e85c709681c8f385e037a9 commit b556135136177d9f21e85c709681c8f385e037a9 Author: Michal Sojka <sojkam1@fel.cvut.cz> Date: Wed Apr 11 11:38:16 2018 UPSTREAM: cfg80211: reg: Remove unused function parameter Signed-off-by: Michal Sojka <sojkam1@fel.cvut.cz> Signed-off-by: Johannes Berg <johannes.berg@intel.com> (cherry picked from commit 491728746b500b22f384cb1d0aba76f7c55a9269) BUG= chromium:828485 TEST=Build 4.4 kernel on eve and kevin Change-Id: Iac6c7b0f9bb73e029415b77bb16014e03503d9d9 Reviewed-on: https://chromium-review.googlesource.com/990797 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Brian Norris <briannorris@chromium.org> [modify] https://crrev.com/b556135136177d9f21e85c709681c8f385e037a9/net/wireless/reg.c
,
Apr 11 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/c59ca9ad255e5861fe765059338049d57bd953d7 commit c59ca9ad255e5861fe765059338049d57bd953d7 Author: Sara Sharon <sara.sharon@intel.com> Date: Wed Apr 11 11:38:31 2018 UPSTREAM: mac80211: process and save VHT MU-MIMO group frame The Group ID Management frame is an Action frame of category VHT. It is transmitted by the AP to assign or change the user position of a STA for one or more group IDs. Process and save the group membership data. Notify underlying driver of changes. Signed-off-by: Sara Sharon <sara.sharon@intel.com> Signed-off-by: Emmanuel Grumbach <emmanuel.grumbach@intel.com> Signed-off-by: Johannes Berg <johannes.berg@intel.com> (cherry picked from commit 23a1f8d44c0bca48f04fc2a2f1edafd826ce6133) BUG= chromium:828485 TEST=build on eve Change-Id: If17758351dd921abe29c0702edbf980605017b94 Reviewed-on: https://chromium-review.googlesource.com/993767 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Brian Norris <briannorris@chromium.org> [modify] https://crrev.com/c59ca9ad255e5861fe765059338049d57bd953d7/net/mac80211/iface.c [modify] https://crrev.com/c59ca9ad255e5861fe765059338049d57bd953d7/net/mac80211/util.c [modify] https://crrev.com/c59ca9ad255e5861fe765059338049d57bd953d7/include/linux/ieee80211.h [modify] https://crrev.com/c59ca9ad255e5861fe765059338049d57bd953d7/net/mac80211/rx.c [modify] https://crrev.com/c59ca9ad255e5861fe765059338049d57bd953d7/net/mac80211/vht.c [modify] https://crrev.com/c59ca9ad255e5861fe765059338049d57bd953d7/include/net/mac80211.h [modify] https://crrev.com/c59ca9ad255e5861fe765059338049d57bd953d7/net/mac80211/mlme.c [modify] https://crrev.com/c59ca9ad255e5861fe765059338049d57bd953d7/net/mac80211/ieee80211_i.h
,
Apr 11 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/d199909475b03ef9b3065703085751917be18f60 commit d199909475b03ef9b3065703085751917be18f60 Author: Johannes Berg <johannes.berg@intel.com> Date: Wed Apr 11 11:38:35 2018 UPSTREAM: mac80211: refactor HT/VHT to chandef code The station MLME and IBSS/mesh ones use entirely different code for interpreting HT and VHT operation elements. Change the code that interprets them a bit - it now modifies an existing chandef - and use it also in the MLME code. Signed-off-by: Johannes Berg <johannes.berg@intel.com> (cherry picked from commit 8ac3c70419176b0fbc4aeae30de661f690b2e3ae) BUG= chromium:828485 TEST=None Change-Id: I80e33aa07a99f9bdf2d872e63980e981415edc7a Reviewed-on: https://chromium-review.googlesource.com/993768 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Brian Norris <briannorris@chromium.org> [modify] https://crrev.com/d199909475b03ef9b3065703085751917be18f60/net/mac80211/util.c [modify] https://crrev.com/d199909475b03ef9b3065703085751917be18f60/net/mac80211/mlme.c [modify] https://crrev.com/d199909475b03ef9b3065703085751917be18f60/net/mac80211/ieee80211_i.h [modify] https://crrev.com/d199909475b03ef9b3065703085751917be18f60/net/mac80211/ibss.c [modify] https://crrev.com/d199909475b03ef9b3065703085751917be18f60/net/mac80211/mesh.c
,
Apr 11 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/1d6c9562a5d173a76669fab8ea51f0ccfefb0a46 commit 1d6c9562a5d173a76669fab8ea51f0ccfefb0a46 Author: Sara Sharon <sara.sharon@intel.com> Date: Wed Apr 11 11:38:38 2018 UPSTREAM: mac80211: provide interface to driver to set VHT MU-MIMO data Provide an interface to the lower level driver to set the VHT MU-MIMO data. This is needed for example when there is an update of the group data during low power state, where the management frame will not be passed to the host at all. Signed-off-by: Sara Sharon <sara.sharon@intel.com> Signed-off-by: Emmanuel Grumbach <emmanuel.grumbach@intel.com> Signed-off-by: Johannes Berg <johannes.berg@intel.com> (cherry picked from commit 65554d07adfc22bb9e14f6df8c609a646f869a74) BUG= chromium:828485 TEST=None Change-Id: I83db02c520722ea6e1c80909468d200c2170395e Reviewed-on: https://chromium-review.googlesource.com/993769 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Brian Norris <briannorris@chromium.org> [modify] https://crrev.com/1d6c9562a5d173a76669fab8ea51f0ccfefb0a46/net/mac80211/vht.c [modify] https://crrev.com/1d6c9562a5d173a76669fab8ea51f0ccfefb0a46/include/net/mac80211.h
,
Apr 11 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/b201a241a8b35b3056f21425fed179ce27cd8a7e commit b201a241a8b35b3056f21425fed179ce27cd8a7e Author: Sara Sharon <sara.sharon@intel.com> Date: Wed Apr 11 11:38:40 2018 UPSTREAM: mac80211: move MU_MIMO_OWNER flag to ieee80211_vif Drivers may need to track which vif is using VHT MU-MIMO. Move the flag indicationg the ownership of MU_MIMO to ieee80211_vif. Signed-off-by: Sara Sharon <sara.sharon@intel.com> Signed-off-by: Emmanuel Grumbach <emmanuel.grumbach@intel.com> Signed-off-by: Johannes Berg <johannes.berg@intel.com> (cherry picked from commit b5a33d52595f0cb153f09bf45a5dcd66a7418dbb) BUG= chromium:828485 TEST=None Change-Id: Id742a91933c44366f1575525edbca686fdf7965a Reviewed-on: https://chromium-review.googlesource.com/993770 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Brian Norris <briannorris@chromium.org> [modify] https://crrev.com/b201a241a8b35b3056f21425fed179ce27cd8a7e/net/mac80211/util.c [modify] https://crrev.com/b201a241a8b35b3056f21425fed179ce27cd8a7e/net/mac80211/mlme.c [modify] https://crrev.com/b201a241a8b35b3056f21425fed179ce27cd8a7e/net/mac80211/ieee80211_i.h [modify] https://crrev.com/b201a241a8b35b3056f21425fed179ce27cd8a7e/net/mac80211/vht.c [modify] https://crrev.com/b201a241a8b35b3056f21425fed179ce27cd8a7e/include/net/mac80211.h
,
Apr 11 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/3870cad52ced17b869b0af616aa733c6ac354397 commit 3870cad52ced17b869b0af616aa733c6ac354397 Author: Eric Dumazet <edumazet@google.com> Date: Wed Apr 11 11:38:42 2018 UPSTREAM: net/rtnetlink: add IFLA_GSO_MAX_SEGS and IFLA_GSO_MAX_SIZE attributes It can be useful to report dev->gso_max_segs and dev->gso_max_size so that "ip -d link" can display them to help debugging. For the moment, these attributes are read-only. Signed-off-by: Eric Dumazet <edumazet@google.com> Cc: Petri Gynther <pgynther@google.com> Cc: Stephen Hemminger <stephen@networkplumber.org> Signed-off-by: David S. Miller <davem@davemloft.net> (cherry picked from commit c70ce028e834f8e51306217dbdbd441d851c64d3) BUG= chromium:828485 TEST=None Change-Id: I76e4260f833bb729858aed8f2f50e7f2b5aebfc0 Reviewed-on: https://chromium-review.googlesource.com/994703 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Brian Norris <briannorris@chromium.org> [modify] https://crrev.com/3870cad52ced17b869b0af616aa733c6ac354397/net/core/rtnetlink.c [modify] https://crrev.com/3870cad52ced17b869b0af616aa733c6ac354397/include/uapi/linux/if_link.h
,
Apr 11 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/336ca4fde4ff0e06a01e6f73070b1d7a1c718699 commit 336ca4fde4ff0e06a01e6f73070b1d7a1c718699 Author: Sara Sharon <sara.sharon@intel.com> Date: Wed Apr 11 11:38:33 2018 UPSTREAM: mac80211: fix VHT MU-MIMO frame processing The source and destintation addresses in the memcpy arguments are flipped. Fix that. Fixes: 23a1f8d44c0b("mac80211: process and save VHT MU-MIMO group frame") Signed-off-by: Sara Sharon <sara.sharon@intel.com> Signed-off-by: Emmanuel Grumbach <emmanuel.grumbach@intel.com> Signed-off-by: Johannes Berg <johannes.berg@intel.com> (cherry picked from commit 0241fa19ef4021c3db6f70b8f08d69f9e21cc043) BUG= chromium:828485 TEST=build on eve and kevin Change-Id: I917a59f2766aec364d0fbd87845b2891e4cd3cb5 Reviewed-on: https://chromium-review.googlesource.com/997030 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Brian Norris <briannorris@chromium.org> [modify] https://crrev.com/336ca4fde4ff0e06a01e6f73070b1d7a1c718699/net/mac80211/vht.c
,
Apr 12 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/eaf319bc673af8ac961e7c7566d398bd17386bb7 commit eaf319bc673af8ac961e7c7566d398bd17386bb7 Author: Mohammed Shafi Shajakhan <mohammed@qti.qualcomm.com> Date: Thu Apr 12 01:06:38 2018 UPSTREAM: cfg80211/nl80211: Add support for NL80211_STA_INFO_RX_DURATION Add support for the a station statistics netlink attribute: NL80211_STA_INFO_RX_DURATION. If present, this attribute contains the aggregate PPDU duration (in microseconds) for all the frames from the peer. This is useful to help understand the total time spent transmitting to us by all of the connected peers. Signed-off-by: Mohammed Shafi Shajakhan <mohammed@qti.qualcomm.com> Signed-off-by: Johannes Berg <johannes.berg@intel.com> (cherry picked from commit 739960f128e5a1f251659a4430a8898087701099) BUG= chromium:828485 TEST=build on eve and kevin Change-Id: I4d9e3176863b6719f4bbd86d5b10045350134ee9 Reviewed-on: https://chromium-review.googlesource.com/1004125 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Brian Norris <briannorris@chromium.org> [modify] https://crrev.com/eaf319bc673af8ac961e7c7566d398bd17386bb7/include/uapi/linux/nl80211.h [modify] https://crrev.com/eaf319bc673af8ac961e7c7566d398bd17386bb7/net/wireless/nl80211.c [modify] https://crrev.com/eaf319bc673af8ac961e7c7566d398bd17386bb7/include/net/cfg80211.h
,
Apr 12 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/a5edf349aea287e75f4d45215833220bbe5986d1 commit a5edf349aea287e75f4d45215833220bbe5986d1 Author: Johannes Berg <johannes.berg@intel.com> Date: Thu Apr 12 01:06:40 2018 UPSTREAM: nl80211: use nla_put_u64_64bit() for the remaining u64 attributes Nicolas converted most users, but didn't realize some were generated by macros. Convert those over as well. Signed-off-by: Johannes Berg <johannes.berg@intel.com> Acked-by: Nicolas Dichtel <nicolas.dichtel@6wind.com> Signed-off-by: Johannes Berg <johannes.berg@intel.com> (cherry picked from commit d686b920abb7136e0575ec974cd5a24f51a7a549) BUG= chromium:828485 TEST=build on eve and kevin Change-Id: Ie7cc54f817add351e76c59e118c685c5070c4625 Reviewed-on: https://chromium-review.googlesource.com/1004126 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Brian Norris <briannorris@chromium.org> [modify] https://crrev.com/a5edf349aea287e75f4d45215833220bbe5986d1/include/uapi/linux/nl80211.h [modify] https://crrev.com/a5edf349aea287e75f4d45215833220bbe5986d1/net/wireless/nl80211.c
,
Apr 12 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/86adff6bf02a9d6216be45b1fbc18f0f47aa6267 commit 86adff6bf02a9d6216be45b1fbc18f0f47aa6267 Author: Vladimir Kondratiev <qca_vkondrat@qca.qualcomm.com> Date: Thu Apr 12 01:06:52 2018 BACKPORT: wil6210: Bring up to speed for beacon report scanning This is a squashed commit of 45 commits in ath/wil6210 to bring the driver up-to-speed to pick up commit 1d76250bd34a ("nl80211: support beacon report scanning") required by chromium:828485. Below is a shortlog of all patches picked up. Dan Carpenter (1): wil6210: fix a warning message condition Dedy Lansky (1): wil6210: p2p initial support Hamad Kadmany (3): wil6210: fix kernel OOPS when stopping interface during Rx traffic wil6210: TX vring optimization wil6210: Set permanent MAC address to wiphy Lior David (15): wil6210: support for platform specific crash recovery wil6210: fix privacy flag calculation in change_beacon wil6210: use extra IEs from probe response wil6210: add support for discovery mode during scan wil6210: switch to generated wmi.h wil6210: basic PBSS/PCP support wil6210: P2P_DEVICE virtual interface support wil6210: fix race conditions in p2p listen and search wil6210: clean ioctl debug message wil6210: fix no_fw_recovery mode with change_virtual_intf wil6210: pass is_go flag to firmware wil6210: add oob_mode module parameter wil6210: allow empty WMI commands in debugfs wmi_send wil6210: support regular scan on P2P_DEVICE interface wil6210: abort P2P search when stopping P2P device Maya Erez (22): wil6210: prevent external wmi commands during suspend flow wil6210: handle tx completions only if vring tx data is enabled wil6210: find TX vring only if vring_tx_data is enabled wil6210: handle multiple connect/disconnect events wil6210: prevent access to vring_tx_data lock during its init wil6210: protect synchronous wmi commands handling wil6210: remove BACK RX and TX workers wil6210: AP: prevent connecting to already connected station wil6210: add support for platform specific notification events wil6210: add function name to wil log macros wil6210: change RX_HTRSH interrupt print level to debug wil6210: print debug message when transmitting while disconnected wil6210: unmask RX_HTRSH interrupt only when connected wil6210: prevent deep sleep of 60G device in critical paths wil6210: add support for device led configuration wil6210: fix race conditions between TX send and completion wil6210: guarantee safe access to rx descriptors shared memory wil6210: protect wil_vring_fini_tx in parallel to tx completions wil6210: fix dma mapping error cleanup in __wil_tx_vring_tso wil6210: add pm_notify handling wil6210: align wil log functions to wil_dbg_ratelimited implementation wil6210: fix chan check in wil_p2p_listen Vladimir Kondratiev (3): wil6210: hold wil->mutex while managing vrings wil6210: wait for disconnect completion wil6210: replay attack detection BUG= chromium:828485 TEST=build on eve and kevin Change-Id: Ifd5f3ade32973280540cd4e318c2682c6bdc4d58 Reviewed-on: https://chromium-review.googlesource.com/1004127 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Kirtika Ruchandani <kirtika@chromium.org> [modify] https://crrev.com/86adff6bf02a9d6216be45b1fbc18f0f47aa6267/drivers/net/wireless/ath/wil6210/wil_crash_dump.c [modify] https://crrev.com/86adff6bf02a9d6216be45b1fbc18f0f47aa6267/drivers/net/wireless/ath/wil6210/cfg80211.c [modify] https://crrev.com/86adff6bf02a9d6216be45b1fbc18f0f47aa6267/drivers/net/wireless/ath/wil6210/txrx.h [modify] https://crrev.com/86adff6bf02a9d6216be45b1fbc18f0f47aa6267/drivers/net/wireless/ath/wil6210/debug.c [modify] https://crrev.com/86adff6bf02a9d6216be45b1fbc18f0f47aa6267/drivers/net/wireless/ath/wil6210/pm.c [modify] https://crrev.com/86adff6bf02a9d6216be45b1fbc18f0f47aa6267/drivers/net/wireless/ath/wil6210/ioctl.c [modify] https://crrev.com/86adff6bf02a9d6216be45b1fbc18f0f47aa6267/drivers/net/wireless/ath/wil6210/pcie_bus.c [modify] https://crrev.com/86adff6bf02a9d6216be45b1fbc18f0f47aa6267/drivers/net/wireless/ath/wil6210/txrx.c [modify] https://crrev.com/86adff6bf02a9d6216be45b1fbc18f0f47aa6267/drivers/net/wireless/ath/wil6210/main.c [modify] https://crrev.com/86adff6bf02a9d6216be45b1fbc18f0f47aa6267/drivers/net/wireless/ath/wil6210/wil_platform.h [modify] https://crrev.com/86adff6bf02a9d6216be45b1fbc18f0f47aa6267/drivers/net/wireless/ath/wil6210/rx_reorder.c [modify] https://crrev.com/86adff6bf02a9d6216be45b1fbc18f0f47aa6267/drivers/net/wireless/ath/wil6210/wil6210.h [modify] https://crrev.com/86adff6bf02a9d6216be45b1fbc18f0f47aa6267/drivers/net/wireless/ath/wil6210/wmi.h [add] https://crrev.com/86adff6bf02a9d6216be45b1fbc18f0f47aa6267/drivers/net/wireless/ath/wil6210/p2p.c [modify] https://crrev.com/86adff6bf02a9d6216be45b1fbc18f0f47aa6267/drivers/net/wireless/ath/wil6210/netdev.c [modify] https://crrev.com/86adff6bf02a9d6216be45b1fbc18f0f47aa6267/drivers/net/wireless/ath/wil6210/Makefile [modify] https://crrev.com/86adff6bf02a9d6216be45b1fbc18f0f47aa6267/drivers/net/wireless/ath/wil6210/wmi.c [modify] https://crrev.com/86adff6bf02a9d6216be45b1fbc18f0f47aa6267/drivers/net/wireless/ath/wil6210/interrupt.c [modify] https://crrev.com/86adff6bf02a9d6216be45b1fbc18f0f47aa6267/drivers/net/wireless/ath/wil6210/debugfs.c [modify] https://crrev.com/86adff6bf02a9d6216be45b1fbc18f0f47aa6267/drivers/net/wireless/ath/wil6210/trace.h [modify] https://crrev.com/86adff6bf02a9d6216be45b1fbc18f0f47aa6267/drivers/net/wireless/ath/wil6210/wil_platform.c
,
Apr 12 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/50354c36818bebcb19aad3704312ce27cffc879d commit 50354c36818bebcb19aad3704312ce27cffc879d Author: Avraham Stern <avraham.stern@intel.com> Date: Thu Apr 12 01:06:55 2018 BACKPORT: nl80211: support beacon report scanning Beacon report radio measurement requires reporting observed BSSs on the channels specified in the beacon request. If the measurement mode is set to passive or active, it requires actually performing a scan (passive or active, accordingly), and reporting the time that the scan was started and the time each beacon/probe was received (both in terms of TSF of the BSS of the requesting AP). If the request mode is table, this information is optional. In addition, the radio measurement request specifies the channel dwell time for the measurement. In order to use scan for beacon report when the mode is active or passive, add a parameter to scan request that specifies the channel dwell time, and add scan start time and beacon received time to scan results information. Supporting beacon report is required for Multi Band Operation (MBO). Signed-off-by: Assaf Krauss <assaf.krauss@intel.com> Signed-off-by: David Spinadel <david.spinadel@intel.com> Signed-off-by: Avraham Stern <avraham.stern@intel.com> Signed-off-by: Luca Coelho <luciano.coelho@intel.com> Signed-off-by: Johannes Berg <johannes.berg@intel.com> (cherry picked from commit 1d76250bd34af86c6498fc51e50cab3bfbbeceaa) Conflicts: drivers/net/wireless/marvell/mwifiex/cmdevt.c drivers/staging/wilc1000/wilc_wfi_cfgoperations.c (manual addition) drivers/net/wireless/ar10k/mac80211/scan.c kirtika@: Manual wiggling to populate struct cfg80211_scan_info before a cfg80211_scan_done calls in both these drivers, without changing anything else. BUG= chromium:828485 TEST=build on eve and kevin Change-Id: I0f4f8f4bf3e4fca5c4c81ed6ff862bc6a835a477 Reviewed-on: https://chromium-review.googlesource.com/1004128 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Kirtika Ruchandani <kirtika@chromium.org> [modify] https://crrev.com/50354c36818bebcb19aad3704312ce27cffc879d/include/uapi/linux/nl80211.h [modify] https://crrev.com/50354c36818bebcb19aad3704312ce27cffc879d/drivers/net/wireless/ath/wil6210/p2p.c [modify] https://crrev.com/50354c36818bebcb19aad3704312ce27cffc879d/drivers/net/wireless/marvell/mwifiex/scan.c [modify] https://crrev.com/50354c36818bebcb19aad3704312ce27cffc879d/drivers/net/wireless/marvell/libertas/cfg.c [modify] https://crrev.com/50354c36818bebcb19aad3704312ce27cffc879d/net/wireless/nl80211.c [modify] https://crrev.com/50354c36818bebcb19aad3704312ce27cffc879d/drivers/staging/rtl8723au/os_dep/ioctl_cfg80211.c [modify] https://crrev.com/50354c36818bebcb19aad3704312ce27cffc879d/drivers/net/wireless/ath/wil6210/wmi.c [modify] https://crrev.com/50354c36818bebcb19aad3704312ce27cffc879d/drivers/staging/wilc1000/wilc_wfi_cfgoperations.c [modify] https://crrev.com/50354c36818bebcb19aad3704312ce27cffc879d/drivers/staging/wlan-ng/cfg80211.c [modify] https://crrev.com/50354c36818bebcb19aad3704312ce27cffc879d/drivers/net/wireless/ath/wil6210/main.c [modify] https://crrev.com/50354c36818bebcb19aad3704312ce27cffc879d/drivers/net/wireless/ath/ath6kl/cfg80211.c [modify] https://crrev.com/50354c36818bebcb19aad3704312ce27cffc879d/drivers/net/wireless/rndis_wlan.c [modify] https://crrev.com/50354c36818bebcb19aad3704312ce27cffc879d/net/mac80211/scan.c [modify] https://crrev.com/50354c36818bebcb19aad3704312ce27cffc879d/net/wireless/scan.c [modify] https://crrev.com/50354c36818bebcb19aad3704312ce27cffc879d/drivers/net/wireless/intersil/orinoco/scan.c [modify] https://crrev.com/50354c36818bebcb19aad3704312ce27cffc879d/net/wireless/trace.h [modify] https://crrev.com/50354c36818bebcb19aad3704312ce27cffc879d/include/net/cfg80211.h [modify] https://crrev.com/50354c36818bebcb19aad3704312ce27cffc879d/drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c [modify] https://crrev.com/50354c36818bebcb19aad3704312ce27cffc879d/drivers/net/wireless/marvell/mwifiex/main.c [modify] https://crrev.com/50354c36818bebcb19aad3704312ce27cffc879d/drivers/net/wireless/ath/wil6210/cfg80211.c [modify] https://crrev.com/50354c36818bebcb19aad3704312ce27cffc879d/drivers/net/wireless/ar10k/mac80211/scan.c [modify] https://crrev.com/50354c36818bebcb19aad3704312ce27cffc879d/net/wireless/core.h [modify] https://crrev.com/50354c36818bebcb19aad3704312ce27cffc879d/net/wireless/core.c
,
Apr 12 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/3be6e88d185f38fbbdd08bd367782b31db9610cb commit 3be6e88d185f38fbbdd08bd367782b31db9610cb Author: Masashi Honma <masashi.honma@gmail.com> Date: Thu Apr 12 01:07:09 2018 UPSTREAM: cfg80211: Add mesh peer AID setting API Previously, mesh power management functionality works only with kernel MPM. Because user space MPM did not report mesh peer AID to kernel, the kernel could not identify the bit in TIM element. So this patch adds mesh peer AID setting API. Signed-off-by: Masashi Honma <masashi.honma@gmail.com> Signed-off-by: Johannes Berg <johannes.berg@intel.com> (cherry picked from commit 7d27a0ba7adc8ef30c2aae7592fce4c162aee4df) BUG= chromium:828485 TEST=build on eve and kevin Change-Id: I176d5faef29f0933efc82e7657a6fb34b9a5c561 Reviewed-on: https://chromium-review.googlesource.com/1004131 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Brian Norris <briannorris@chromium.org> [modify] https://crrev.com/3be6e88d185f38fbbdd08bd367782b31db9610cb/include/uapi/linux/nl80211.h [modify] https://crrev.com/3be6e88d185f38fbbdd08bd367782b31db9610cb/net/mac80211/cfg.c [modify] https://crrev.com/3be6e88d185f38fbbdd08bd367782b31db9610cb/net/wireless/nl80211.c [modify] https://crrev.com/3be6e88d185f38fbbdd08bd367782b31db9610cb/include/net/cfg80211.h
,
Apr 12 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/dbd0e371d760ca1d1a4d9847bfc059d68275c98f commit dbd0e371d760ca1d1a4d9847bfc059d68275c98f Author: Ayala Beker <ayala.beker@intel.com> Date: Thu Apr 12 01:07:11 2018 UPSTREAM: cfg80211: add start / stop NAN commands This allows user space to start/stop NAN interface. A NAN interface is like P2P device in a few aspects: it doesn't have a netdev associated to it. Add the new interface type and prevent operations that can't be executed on NAN interface like scan. Define several attributes that may be configured by user space when starting NAN functionality (master preference and dual band operation) Signed-off-by: Andrei Otcheretianski <andrei.otcheretianski@intel.com> Signed-off-by: Emmanuel Grumbach <emmanuel.grumbach@intel.com> Signed-off-by: Luca Coelho <luciano.coelho@intel.com> Signed-off-by: Johannes Berg <johannes.berg@intel.com> (cherry picked from commit cb3b7d87652aeb37cfb5295a6157a3280dae10cb) CQ-DEPEND=CL:1004269 BUG= chromium:828485 TEST=build on eve and kevin Change-Id: I940361c6eca818bfc9c62220137bf6659cf00061 Reviewed-on: https://chromium-review.googlesource.com/1004254 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Kirtika Ruchandani <kirtika@chromium.org> [modify] https://crrev.com/dbd0e371d760ca1d1a4d9847bfc059d68275c98f/net/wireless/mlme.c [modify] https://crrev.com/dbd0e371d760ca1d1a4d9847bfc059d68275c98f/include/uapi/linux/nl80211.h [modify] https://crrev.com/dbd0e371d760ca1d1a4d9847bfc059d68275c98f/net/mac80211/iface.c [modify] https://crrev.com/dbd0e371d760ca1d1a4d9847bfc059d68275c98f/net/wireless/core.h [modify] https://crrev.com/dbd0e371d760ca1d1a4d9847bfc059d68275c98f/net/mac80211/util.c [modify] https://crrev.com/dbd0e371d760ca1d1a4d9847bfc059d68275c98f/net/wireless/util.c [modify] https://crrev.com/dbd0e371d760ca1d1a4d9847bfc059d68275c98f/net/mac80211/offchannel.c [modify] https://crrev.com/dbd0e371d760ca1d1a4d9847bfc059d68275c98f/net/wireless/core.c [modify] https://crrev.com/dbd0e371d760ca1d1a4d9847bfc059d68275c98f/net/mac80211/rx.c [modify] https://crrev.com/dbd0e371d760ca1d1a4d9847bfc059d68275c98f/net/wireless/rdev-ops.h [modify] https://crrev.com/dbd0e371d760ca1d1a4d9847bfc059d68275c98f/net/mac80211/cfg.c [modify] https://crrev.com/dbd0e371d760ca1d1a4d9847bfc059d68275c98f/net/wireless/nl80211.c [modify] https://crrev.com/dbd0e371d760ca1d1a4d9847bfc059d68275c98f/include/net/cfg80211.h [modify] https://crrev.com/dbd0e371d760ca1d1a4d9847bfc059d68275c98f/net/wireless/trace.h [modify] https://crrev.com/dbd0e371d760ca1d1a4d9847bfc059d68275c98f/net/wireless/chan.c [modify] https://crrev.com/dbd0e371d760ca1d1a4d9847bfc059d68275c98f/net/mac80211/chan.c
,
Apr 12 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/48516c81d89802000705b04563613c35b6afba1f commit 48516c81d89802000705b04563613c35b6afba1f Author: Ayala Beker <ayala.beker@intel.com> Date: Thu Apr 12 01:07:15 2018 UPSTREAM: cfg80211: add add_nan_func / del_nan_func A NAN function can be either publish, subscribe or follow up. Make all the necessary verifications and just pass the request to the driver. Allow the user space application that starts NAN to forbid any other socket to add or remove functions. Signed-off-by: Andrei Otcheretianski <andrei.otcheretianski@intel.com> Signed-off-by: Emmanuel Grumbach <emmanuel.grumbach@intel.com> Signed-off-by: Ayala Beker <ayala.beker@intel.com> Signed-off-by: Luca Coelho <luciano.coelho@intel.com> Signed-off-by: Johannes Berg <johannes.berg@intel.com> (cherry picked from commit a442b761b24b6886f9a4e2ff5f8cb4824c96526b) BUG= chromium:828485 TEST=build on eve and kevin Change-Id: I07ba0af71a3fe0dbec9f6d2bd29c9d5f98900172 Reviewed-on: https://chromium-review.googlesource.com/1004255 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Kirtika Ruchandani <kirtika@chromium.org> [modify] https://crrev.com/48516c81d89802000705b04563613c35b6afba1f/include/uapi/linux/nl80211.h [modify] https://crrev.com/48516c81d89802000705b04563613c35b6afba1f/net/wireless/util.c [modify] https://crrev.com/48516c81d89802000705b04563613c35b6afba1f/net/wireless/core.c [modify] https://crrev.com/48516c81d89802000705b04563613c35b6afba1f/net/wireless/rdev-ops.h [modify] https://crrev.com/48516c81d89802000705b04563613c35b6afba1f/net/wireless/nl80211.c [modify] https://crrev.com/48516c81d89802000705b04563613c35b6afba1f/include/net/cfg80211.h [modify] https://crrev.com/48516c81d89802000705b04563613c35b6afba1f/net/wireless/trace.h
,
Apr 12 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/7bfb96eb0c8b829231505a1242d0ba864b407d76 commit 7bfb96eb0c8b829231505a1242d0ba864b407d76 Author: Ayala Beker <ayala.beker@intel.com> Date: Thu Apr 12 01:07:18 2018 UPSTREAM: cfg80211: allow the user space to change current NAN configuration Some NAN configuration paramaters may change during the operation of the NAN device. For example, a user may want to update master preference value when the device gets plugged/unplugged to the power. Add API that allows to do so. Signed-off-by: Andrei Otcheretianski <andrei.otcheretianski@intel.com> Signed-off-by: Emmanuel Grumbach <emmanuel.grumbach@intel.com> Signed-off-by: Luca Coelho <luciano.coelho@intel.com> Signed-off-by: Johannes Berg <johannes.berg@intel.com> (cherry picked from commit a5a9dcf291e1e541243878eed2d73a74006fa1f1) BUG= chromium:828485 TEST=build on eve and kevin Change-Id: I2fc3b42a03336495462ec0f1a90fce197708a7e0 Reviewed-on: https://chromium-review.googlesource.com/1004256 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Kirtika Ruchandani <kirtika@chromium.org> [modify] https://crrev.com/7bfb96eb0c8b829231505a1242d0ba864b407d76/net/wireless/trace.h [modify] https://crrev.com/7bfb96eb0c8b829231505a1242d0ba864b407d76/net/wireless/rdev-ops.h [modify] https://crrev.com/7bfb96eb0c8b829231505a1242d0ba864b407d76/include/uapi/linux/nl80211.h [modify] https://crrev.com/7bfb96eb0c8b829231505a1242d0ba864b407d76/net/wireless/nl80211.c [modify] https://crrev.com/7bfb96eb0c8b829231505a1242d0ba864b407d76/include/net/cfg80211.h
,
Apr 12 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/28ca26664687616b8cd133968c0570e2a45d9816 commit 28ca26664687616b8cd133968c0570e2a45d9816 Author: Ayala Beker <ayala.beker@intel.com> Date: Thu Apr 12 01:07:20 2018 UPSTREAM: cfg80211: provide a function to report a match for NAN Provide a function the driver can call to report a match. This will send the event to the user space. If the NAN instance is tied to the owner, the notifications will be sent to the socket that started the NAN interface only. Signed-off-by: Andrei Otcheretianski <andrei.otcheretianski@intel.com> Signed-off-by: Emmanuel Grumbach <emmanuel.grumbach@intel.com> Signed-off-by: Luca Coelho <luciano.coelho@intel.com> Signed-off-by: Johannes Berg <johannes.berg@intel.com> (cherry picked from commit 50bcd31d9992e99c231820f5276e70346cbfbc51) BUG= chromium:828485 TEST=build on eve and kevin Change-Id: I4ecc284e54986d7a7a344c7012166e3bdffea46f Reviewed-on: https://chromium-review.googlesource.com/1004257 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Kirtika Ruchandani <kirtika@chromium.org> [modify] https://crrev.com/28ca26664687616b8cd133968c0570e2a45d9816/include/uapi/linux/nl80211.h [modify] https://crrev.com/28ca26664687616b8cd133968c0570e2a45d9816/net/wireless/nl80211.c [modify] https://crrev.com/28ca26664687616b8cd133968c0570e2a45d9816/include/net/cfg80211.h
,
Apr 12 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/7a9f67e55d01bb6bc17054efe04441a89b0bd056 commit 7a9f67e55d01bb6bc17054efe04441a89b0bd056 Author: Ayala Beker <ayala.beker@intel.com> Date: Thu Apr 12 01:07:22 2018 UPSTREAM: cfg80211: Provide an API to report NAN function termination Provide a function that reports NAN DE function termination. The function may be terminated due to one of the following reasons: user request, ttl expiration or failure. If the NAN instance is tied to the owner, the notification will be sent to the socket that started the NAN interface only Signed-off-by: Andrei Otcheretianski <andrei.otcheretianski@intel.com> Signed-off-by: Emmanuel Grumbach <emmanuel.grumbach@intel.com> Signed-off-by: Luca Coelho <luciano.coelho@intel.com> Signed-off-by: Johannes Berg <johannes.berg@intel.com> (cherry picked from commit 368e5a7b4ecb71b3d347799cb9351b0dce5dec70) BUG= chromium:828485 TEST=build on eve and kevin Change-Id: Ibcec3fa86f2c573f8f007a4f2bab828ea3a82561 Reviewed-on: https://chromium-review.googlesource.com/1004258 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Kirtika Ruchandani <kirtika@chromium.org> [modify] https://crrev.com/7a9f67e55d01bb6bc17054efe04441a89b0bd056/include/uapi/linux/nl80211.h [modify] https://crrev.com/7a9f67e55d01bb6bc17054efe04441a89b0bd056/net/wireless/nl80211.c [modify] https://crrev.com/7a9f67e55d01bb6bc17054efe04441a89b0bd056/include/net/cfg80211.h
,
Apr 12 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/31f246ded9d2471c864477115907d12443ba637f commit 31f246ded9d2471c864477115907d12443ba637f Author: Denis Kenzior <denkenz@gmail.com> Date: Thu Apr 12 01:07:25 2018 UPSTREAM: cfg80211: always notify userspace of new wireless netdevs This change alters the semantics of NL80211_CMD_NEW_INTERFACE events by always sending this event whenever a new net_device object associated with a wdev is registered. Prior to this change, this event was only sent as a result of NL80211_CMD_NEW_INTERFACE command sent from userspace. This allows userspace to reliably detect new wireless interfaces (e.g. due to hardware hot-plug events, etc). For wdevs created without an associated net_device object (e.g. NL80211_IFTYPE_P2P_DEVICE), the NL80211_CMD_NEW_INTERFACE event is still generated inside the relevant nl80211 command handler. Signed-off-by: Denis Kenzior <denkenz@gmail.com> Signed-off-by: Johannes Berg <johannes.berg@intel.com> (cherry picked from commit 896ff0635a312022c91e2bef30c80abc27af62e8) BUG= chromium:828485 TEST=build on eve and kevin Change-Id: Ie089ab2e448c89a13a97d75af9d291ce38db869b Reviewed-on: https://chromium-review.googlesource.com/1004259 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Brian Norris <briannorris@chromium.org> [modify] https://crrev.com/31f246ded9d2471c864477115907d12443ba637f/net/wireless/nl80211.c [modify] https://crrev.com/31f246ded9d2471c864477115907d12443ba637f/net/wireless/core.c [modify] https://crrev.com/31f246ded9d2471c864477115907d12443ba637f/net/wireless/nl80211.h
,
Apr 12 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/ca160627afeff2db15aea397bda0ac4a139132db commit ca160627afeff2db15aea397bda0ac4a139132db Author: Denis Kenzior <denkenz@gmail.com> Date: Thu Apr 12 01:07:27 2018 UPSTREAM: cfg80211: always notify userspace when wireless netdev is removed This change alters the semantics of NL80211_CMD_DEL_INTERFACE events by always sending this event whenever a net_device object associated with a wdev is destroyed. Prior to this change, this event was only emitted as a result of NL80211_CMD_DEL_INTERFACE command sent from userspace. This allows userspace to reliably detect when wireless interfaces have been removed, e.g. due to USB removal events, etc. For wireless device objects without an associated net_device (e.g. NL80211_IFTYPE_P2P_DEVICE), the NL80211_CMD_DEL_INTERFACE event is now generated inside cfg80211_unregister_wdev. Signed-off-by: Denis Kenzior <denkenz@gmail.com> Signed-off-by: Johannes Berg <johannes.berg@intel.com> (cherry picked from commit 7f8ed01ea5d4d9d4acc3bb046de1fc84ac83a5e2) BUG= chromium:828485 TEST=build on eve and kevin Change-Id: I47f6df4c03839c9a87e61523e0e7a81fe99fbb8b Reviewed-on: https://chromium-review.googlesource.com/1004260 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Brian Norris <briannorris@chromium.org> [modify] https://crrev.com/ca160627afeff2db15aea397bda0ac4a139132db/net/wireless/nl80211.c [modify] https://crrev.com/ca160627afeff2db15aea397bda0ac4a139132db/net/wireless/core.c
,
Apr 12 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/c6c911f96ee97523538675f7c02a6db088ca33bd commit c6c911f96ee97523538675f7c02a6db088ca33bd Author: Purushottam Kushwaha <pkushwah@qti.qualcomm.com> Date: Thu Apr 12 01:07:30 2018 UPSTREAM: cfg80211: identically validate beacon interval for AP/MESH/IBSS Beacon interval interface combinations validation was missing for MESH/IBSS join, add those. Johannes: also move the beacon interval check disallowing really tiny and really big intervals into the common function, which adds it for AP mode. Signed-off-by: Purushottam Kushwaha <pkushwah@qti.qualcomm.com> Signed-off-by: Johannes Berg <johannes.berg@intel.com> (cherry picked from commit 12d20fc9186a742d40e824f575df5aa62be31d69) BUG= chromium:828485 TEST=build on eve and kevin Change-Id: Id2f46ad28bbd1e71dda32b87457e8ea5e2dd74e9 Reviewed-on: https://chromium-review.googlesource.com/1004261 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Brian Norris <briannorris@chromium.org> [modify] https://crrev.com/c6c911f96ee97523538675f7c02a6db088ca33bd/net/wireless/util.c [modify] https://crrev.com/c6c911f96ee97523538675f7c02a6db088ca33bd/net/wireless/nl80211.c
,
Apr 12 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/fd7748fa595ec2fc2b15c66b95341ab66fdc8c7e commit fd7748fa595ec2fc2b15c66b95341ab66fdc8c7e Author: Purushottam Kushwaha <pkushwah@qti.qualcomm.com> Date: Thu Apr 12 01:07:32 2018 UPSTREAM: cfg80211: pass struct to interface combination check/iter Move the growing parameter list to a structure for the interface combination check and iteration functions in cfg80211 and mac80211 to make the code easier to understand. Signed-off-by: Purushottam Kushwaha <pkushwah@qti.qualcomm.com> [edit commit message] Signed-off-by: Johannes Berg <johannes.berg@intel.com> (cherry picked from commit e227300c8395dffaa7614ce7c7666a82180ebc60) CQ-DEPEND=CL:1004270 BUG= chromium:828485 TEST=build on eve and kevin Change-Id: Iea4c8b07e4fd7cf42d15e3e42eafccb37f82f619 Reviewed-on: https://chromium-review.googlesource.com/1004263 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Kirtika Ruchandani <kirtika@chromium.org> [modify] https://crrev.com/fd7748fa595ec2fc2b15c66b95341ab66fdc8c7e/net/mac80211/util.c [modify] https://crrev.com/fd7748fa595ec2fc2b15c66b95341ab66fdc8c7e/net/wireless/util.c [modify] https://crrev.com/fd7748fa595ec2fc2b15c66b95341ab66fdc8c7e/include/net/cfg80211.h [modify] https://crrev.com/fd7748fa595ec2fc2b15c66b95341ab66fdc8c7e/drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c
,
Apr 12 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/dc5e11b2ac390ac54d6319aadfeedea1aaf5909a commit dc5e11b2ac390ac54d6319aadfeedea1aaf5909a Author: Purushottam Kushwaha <pkushwah@qti.qualcomm.com> Date: Thu Apr 12 01:07:37 2018 UPSTREAM: cfg80211: support virtual interfaces with different beacon intervals This commit provides a mechanism for the host drivers to advertise the support for different beacon intervals among the respective interface combinations in a group, through NL80211_IFACE_COMB_BI_MIN_GCD (u32). This value will be compared against GCD of all beaconing interfaces of matching combinations. If the driver doesn't advertise this value, the old behaviour where all beacon intervals must be identical is retained. If it is specified, then any beacon interval for an interface in the interface combination as well as the GCD of all active beacon intervals in the combination must be greater or equal to this value. Signed-off-by: Purushottam Kushwaha <pkushwah@qti.qualcomm.com> [change commit message, some variable names, small other things] Signed-off-by: Johannes Berg <johannes.berg@intel.com> (cherry picked from commit 0c317a02ca982ca093e71bf07cb562265ba40032) BUG= chromium:828485 TEST=build on eve and kevin Change-Id: Ie4cfcf406070622cbb08ff46dd85b4ba75a10f44 Reviewed-on: https://chromium-review.googlesource.com/1004264 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Kirtika Ruchandani <kirtika@chromium.org> [modify] https://crrev.com/dc5e11b2ac390ac54d6319aadfeedea1aaf5909a/net/wireless/util.c [modify] https://crrev.com/dc5e11b2ac390ac54d6319aadfeedea1aaf5909a/include/uapi/linux/nl80211.h [modify] https://crrev.com/dc5e11b2ac390ac54d6319aadfeedea1aaf5909a/net/wireless/nl80211.c [modify] https://crrev.com/dc5e11b2ac390ac54d6319aadfeedea1aaf5909a/include/net/cfg80211.h [modify] https://crrev.com/dc5e11b2ac390ac54d6319aadfeedea1aaf5909a/net/wireless/core.h
,
Apr 12 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/223db3ef1e8397607550ad497991df2a9fb80224 commit 223db3ef1e8397607550ad497991df2a9fb80224 Author: Jouni Malinen <jouni@qca.qualcomm.com> Date: Thu Apr 12 01:07:39 2018 UPSTREAM: cfg80211: Add KEK/nonces for FILS association frames The new nl80211 attributes can be used to provide KEK and nonces to allow the driver to encrypt and decrypt FILS (Re)Association Request/Response frames in station mode. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com> Signed-off-by: Johannes Berg <johannes.berg@intel.com> (cherry picked from commit 348bd456699801920a309c66e382380809fbdf41) BUG= chromium:828485 TEST=build on eve and kevin Change-Id: Icebba34571f9c76365b7574a724ba1111be5a664 Reviewed-on: https://chromium-review.googlesource.com/1004265 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Kirtika Ruchandani <kirtika@chromium.org> [modify] https://crrev.com/223db3ef1e8397607550ad497991df2a9fb80224/include/linux/ieee80211.h [modify] https://crrev.com/223db3ef1e8397607550ad497991df2a9fb80224/include/uapi/linux/nl80211.h [modify] https://crrev.com/223db3ef1e8397607550ad497991df2a9fb80224/net/wireless/nl80211.c [modify] https://crrev.com/223db3ef1e8397607550ad497991df2a9fb80224/include/net/cfg80211.h
,
Apr 12 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/c43a989ba9c70bd44d69e0811074ca3364585568 commit c43a989ba9c70bd44d69e0811074ca3364585568 Author: Michael Braun <michael-dev@fami-braun.de> Date: Thu Apr 12 01:07:41 2018 BACKPORT: cfg80211: configure multicast to unicast for AP interfaces Add the ability to configure if an AP (and associated VLANs) will do multicast-to-unicast conversion for ARP, IPv4 and IPv6 frames (possibly within 802.1Q). If enabled, such frames are to be sent to each station separately, with the DA replaced by their own MAC address rather than the group address. Note that this may break certain expectations of the receiver, such as the ability to drop unicast IP packets received within multicast L2 frames, or the ability to not send ICMP destination unreachable messages for packets received in L2 multicast (which is required, but the receiver can't tell the difference if this new option is enabled.) This also doesn't implement the 802.11 DMS (directed multicast service). Signed-off-by: Michael Braun <michael-dev@fami-braun.de> [fix disabling, add better documentation & commit message] Signed-off-by: Johannes Berg <johannes.berg@intel.com> (cherry picked from commit ce0ce13a1c89ff8b94b7f8fb32eb4c43e111c82e) kirtika@: "Backport" because GENL_UNS_ADMIN_PERM is not supported. Change that to GENL_ADMIN_PERM. Supporting it would require picking commit 5617c6cd6f84 ("nl80211: Allow privileged operations from user namespaces"). BUG= chromium:828485 TEST=build on eve and kevin Change-Id: I3952e5aaa32b467fb8c4ffeeb0cd739617ac20c2 Reviewed-on: https://chromium-review.googlesource.com/1004266 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Kirtika Ruchandani <kirtika@chromium.org> [modify] https://crrev.com/c43a989ba9c70bd44d69e0811074ca3364585568/net/wireless/trace.h [modify] https://crrev.com/c43a989ba9c70bd44d69e0811074ca3364585568/net/wireless/rdev-ops.h [modify] https://crrev.com/c43a989ba9c70bd44d69e0811074ca3364585568/include/uapi/linux/nl80211.h [modify] https://crrev.com/c43a989ba9c70bd44d69e0811074ca3364585568/net/wireless/nl80211.c [modify] https://crrev.com/c43a989ba9c70bd44d69e0811074ca3364585568/include/net/cfg80211.h
,
Apr 12 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/1137a5113013140249ba25ec5b5e0e1777a17b88 commit 1137a5113013140249ba25ec5b5e0e1777a17b88 Author: Vamsi Krishna <vamsin@qti.qualcomm.com> Date: Thu Apr 12 01:07:44 2018 UPSTREAM: nl80211: Use different attrs for BSSID and random MAC addr in scan req NL80211_ATTR_MAC was used to set both the specific BSSID to be scanned and the random MAC address to be used when privacy is enabled. When both the features are enabled, both the BSSID and the local MAC address were getting same value causing Probe Request frames to go with unintended DA. Hence, this has been fixed by using a different NL80211_ATTR_BSSID attribute to set the specific BSSID (which was the more recent addition in cfg80211) for a scan. Backwards compatibility with old userspace software is maintained to some extent by allowing NL80211_ATTR_MAC to be used to set the specific BSSID when scanning without enabling random MAC address use. Scanning with random source MAC address was introduced by commit ad2b26abc157 ("cfg80211: allow drivers to support random MAC addresses for scan") and the issue was introduced with the addition of the second user for the same attribute in commit 818965d39177 ("cfg80211: Allow a scan request for a specific BSSID"). Fixes: 818965d39177 ("cfg80211: Allow a scan request for a specific BSSID") Signed-off-by: Vamsi Krishna <vamsin@qti.qualcomm.com> Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com> Signed-off-by: Johannes Berg <johannes.berg@intel.com> (cherry picked from commit 2fa436b3a2a7009c11a3bc03fe0ff4c26e80fd87) CQ-DEPEND=CL:989125 BUG= chromium:828485 TEST=build on eve and kevin Change-Id: I90496ef966ce0117b403044463870fa1599c5d84 Reviewed-on: https://chromium-review.googlesource.com/1004267 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Kirtika Ruchandani <kirtika@chromium.org> [modify] https://crrev.com/1137a5113013140249ba25ec5b5e0e1777a17b88/include/uapi/linux/nl80211.h [modify] https://crrev.com/1137a5113013140249ba25ec5b5e0e1777a17b88/net/wireless/nl80211.c
,
Apr 12 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/8c5c5a8dbd604231e778b13d79acb950a728d0ad commit 8c5c5a8dbd604231e778b13d79acb950a728d0ad Author: Vasanthakumar Thiagarajan <vthiagar@qti.qualcomm.com> Date: Thu Apr 12 01:07:46 2018 UPSTREAM: cfg80211: Make pre-CAC results valid only for ETSI domain DFS requirement for ETSI domain (section 4.7.1.4 in ETSI EN 301 893 V1.8.1) is the only one which explicitly states that once DFS channel is marked as available afer the CAC, this channel will remain in available state even moving to a different operating channel. But the same is not explicitly stated in FCC DFS requirement. Also, Pre-CAC requriements are not explicitly mentioned in FCC requirement. Current implementation in keeping DFS channel in available state is same as described in ETSI domain. For non-ETSI DFS domain, this patch gives a grace period of 2 seconds since the completion of successful CAC before moving the channel's DFS state to 'usable' from 'available' state. The same grace period is checked against the channel's dfs_state_entered timestamp while deciding if a DFS channel is available for operation. There is a new radar event, NL80211_RADAR_PRE_CAC_EXPIRED, reported when DFS channel is moved from available to usable state after the grace period. Also make sure the DFS channel state is reset to usable once the beaconing operation on that channel is brought down (like stop_ap, leave_ibss and leave_mesh) in non-ETSI domain. Signed-off-by: Vasanthakumar Thiagarajan <vthiagar@qti.qualcomm.com> Signed-off-by: Johannes Berg <johannes.berg@intel.com> (cherry picked from commit b35a51c7dd25a823767969e3089542d7478777e9) BUG= chromium:828485 TEST=build on eve and kevin Change-Id: If9fa97e443a12394395dd3ce8ef6ee1c78cc2d89 Reviewed-on: https://chromium-review.googlesource.com/1004268 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Brian Norris <briannorris@chromium.org> [modify] https://crrev.com/8c5c5a8dbd604231e778b13d79acb950a728d0ad/include/uapi/linux/nl80211.h [modify] https://crrev.com/8c5c5a8dbd604231e778b13d79acb950a728d0ad/net/wireless/core.h [modify] https://crrev.com/8c5c5a8dbd604231e778b13d79acb950a728d0ad/net/wireless/ap.c [modify] https://crrev.com/8c5c5a8dbd604231e778b13d79acb950a728d0ad/net/wireless/mesh.c [modify] https://crrev.com/8c5c5a8dbd604231e778b13d79acb950a728d0ad/net/wireless/mlme.c [modify] https://crrev.com/8c5c5a8dbd604231e778b13d79acb950a728d0ad/net/wireless/reg.c [modify] https://crrev.com/8c5c5a8dbd604231e778b13d79acb950a728d0ad/net/wireless/ibss.c [modify] https://crrev.com/8c5c5a8dbd604231e778b13d79acb950a728d0ad/net/wireless/chan.c [modify] https://crrev.com/8c5c5a8dbd604231e778b13d79acb950a728d0ad/net/wireless/reg.h
,
Apr 12 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/441dec78cb3dfedb77179a7f4eec38b4dd4e17b9 commit 441dec78cb3dfedb77179a7f4eec38b4dd4e17b9 Author: Kirtika Ruchandani <kirtika@google.com> Date: Thu Apr 12 01:07:13 2018 CHROMIUM: ar10k: Add mac80211 support for NL80211_IFTYPE_NAN This is a barebones addition to support enum NL80211_IFTYPE_NAN in ar10k's mac80211. Commit cb3b7d87652a ("cfg80211: add start / stop NAN commands") introduces NL80211_IFTYPE_NAN in nl80211.h's uapi, and I think having -Werror on the 4.4 kernel implies ar10k's mac80211 not handling this enum entry will be a build breaker. This CL takes the mac80211 specific parts of commit cb3b7d87652a and applies them to ar10k's mac80211. CQ-DEPEND=CL:1004254 BUG= chromium:828485 TEST=build on eve and kevin Change-Id: I0462e7cef45b51ae1c8ff31fad2fc3b2abd501ac (cherry picked from commit 47335398e2a05daea51a3554c698d81fdee99f25) Reviewed-on: https://chromium-review.googlesource.com/1004269 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Kirtika Ruchandani <kirtika@chromium.org> [modify] https://crrev.com/441dec78cb3dfedb77179a7f4eec38b4dd4e17b9/drivers/net/wireless/ar10k/mac80211/iface.c [modify] https://crrev.com/441dec78cb3dfedb77179a7f4eec38b4dd4e17b9/drivers/net/wireless/ar10k/mac80211/chan.c [modify] https://crrev.com/441dec78cb3dfedb77179a7f4eec38b4dd4e17b9/drivers/net/wireless/ar10k/mac80211/cfg.c [modify] https://crrev.com/441dec78cb3dfedb77179a7f4eec38b4dd4e17b9/drivers/net/wireless/ar10k/mac80211/offchannel.c [modify] https://crrev.com/441dec78cb3dfedb77179a7f4eec38b4dd4e17b9/drivers/net/wireless/ar10k/mac80211/rx.c [modify] https://crrev.com/441dec78cb3dfedb77179a7f4eec38b4dd4e17b9/drivers/net/wireless/ar10k/mac80211/util.c
,
Apr 12 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/287852198408a1c1125019d340e68685314e3876 commit 287852198408a1c1125019d340e68685314e3876 Author: Purushottam Kushwaha <pkushwah@qti.qualcomm.com> Date: Thu Apr 12 01:07:34 2018 CHROMIUM: ar10k: pass struct to interface combination check/iter Move the growing parameter list to a structure for the interface combination check and iteration functions in cfg80211 and mac80211 to make the code easier to understand. (cherry picked with path changes from commit e227300c8395dffaa7614ce7c7666a82180ebc60 and applied to ar10k's mac80211/util.c) CQ-DEPEND=CL:1004263 BUG= chromium:828485 TEST=build on eve and kevin Change-Id: I10fe28df2ba2009c484c520da1392bfa26480110 Reviewed-on: https://chromium-review.googlesource.com/1004270 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Kirtika Ruchandani <kirtika@chromium.org> [modify] https://crrev.com/287852198408a1c1125019d340e68685314e3876/drivers/net/wireless/ar10k/mac80211/util.c
,
Apr 12 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/ef18a91e5000ef3950dc1ad1c116507ca5eb933c commit ef18a91e5000ef3950dc1ad1c116507ca5eb933c Author: Jouni Malinen <jouni@qca.qualcomm.com> Date: Thu Apr 12 01:06:03 2018 UPSTREAM: cfg80211: Allow reassociation to be requested with internal SME If the user space issues a NL80211_CMD_CONNECT with NL80211_ATTR_PREV_BSSID when there is already a connection, allow this to proceed as a reassociation instead of rejecting the new connect command with EALREADY. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com> [validate prev_bssid] Signed-off-by: Johannes Berg <johannes.berg@intel.com> (cherry picked from commit 4ce2bd9c4c1dfb416206ff1ad5283f6d24af4031) BUG= chromium:828485 TEST=trybot on Eve Change-Id: I563bb75f29c1a050c80df7ac00cd698ca99d8043 Reviewed-on: https://chromium-review.googlesource.com/988688 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Brian Norris <briannorris@chromium.org> [modify] https://crrev.com/ef18a91e5000ef3950dc1ad1c116507ca5eb933c/net/wireless/nl80211.c [modify] https://crrev.com/ef18a91e5000ef3950dc1ad1c116507ca5eb933c/net/wireless/sme.c
,
Apr 12 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/8ce24ba297668d948935ade2d1e88f21e6bc6900 commit 8ce24ba297668d948935ade2d1e88f21e6bc6900 Author: Johannes Berg <johannes.berg@intel.com> Date: Thu Apr 12 01:06:24 2018 UPSTREAM: cfg80211: fix connect/disconnect edge cases If we try to connect while already connected/connecting, but this fails, we set ssid_len=0 but leave current_bss hanging, leading to errors. Check all of this better, first of all ensuring that we can't try to connect to a different SSID while connected/ing; ensure that prev_bssid is set for re-association attempts even in the case of the driver supporting the connect() method, and don't reset ssid_len in the failure cases. While at it, also reset ssid_len while disconnecting unless we were connected and expect a disconnected event, and warn on a successful connection without ssid_len being set. Cc: stable@vger.kernel.org Signed-off-by: Johannes Berg <johannes.berg@intel.com> (cherry picked from commit 51e13359cd5ea34acc62c90627603352956380af) BUG= chromium:828485 TEST=trybot on Eve Change-Id: I7e3ebfdaf6eab076629fefa9d803a7e69117788e Reviewed-on: https://chromium-review.googlesource.com/988689 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Brian Norris <briannorris@chromium.org> [modify] https://crrev.com/8ce24ba297668d948935ade2d1e88f21e6bc6900/net/wireless/sme.c
,
Apr 12 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/2238f2a9e2f04a8697f0eb517b8b7ff944f3fb37 commit 2238f2a9e2f04a8697f0eb517b8b7ff944f3fb37 Author: David Spinadel <david.spinadel@intel.com> Date: Thu Apr 12 01:06:26 2018 UPSTREAM: nl80211: send deauth reason if locally generated Send disconnection reason code to user space even if it's locally generated, since some tests that check reason code may fail because of the current behavior. Signed-off-by: David Spinadel <david.spinadel@intel.com> Signed-off-by: Luca Coelho <luciano.coelho@intel.com> Signed-off-by: Johannes Berg <johannes.berg@intel.com> (cherry picked from commit 86b6c465727cc917ec8367fef29b20ccf8ffa081) BUG= chromium:828485 TEST=trybot on Eve Change-Id: I4ee37fcbfb74630e615f4b6a093b8a58d2ff8e5a Reviewed-on: https://chromium-review.googlesource.com/989019 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Brian Norris <briannorris@chromium.org> [modify] https://crrev.com/2238f2a9e2f04a8697f0eb517b8b7ff944f3fb37/net/wireless/nl80211.c
,
Apr 12 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/6fc9acc6d7bf9de931c5a41568ac0c1506df4696 commit 6fc9acc6d7bf9de931c5a41568ac0c1506df4696 Author: Jouni Malinen <jouni@qca.qualcomm.com> Date: Thu Apr 12 01:05:54 2018 UPSTREAM: cfg80211: Allow a scan request for a specific BSSID This allows scans for a specific BSSID to be optimized by the user space application by requesting the driver to set the Probe Request frame BSSID field (Address 3) to the specified BSSID instead of the wildcard BSSID. This prevents other APs from replying which reduces airtime need and latency in getting the response from the target AP through. This is an optimization and as such, it is acceptable for some of the drivers not to support the mechanism. If not supported, the wildcard BSSID will be used and more responses may be received. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com> Signed-off-by: Johannes Berg <johannes.berg@intel.com> (cherry picked from commit 818965d3917774955fad52f87b59d690d8be9e8b) CQ-DEPEND=CL:1004267 BUG= chromium:828485 TEST=trybot on eve Change-Id: I1b6233639d38f6f0b99e7ae731f13201ac4a2684 Reviewed-on: https://chromium-review.googlesource.com/989125 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Kirtika Ruchandani <kirtika@chromium.org> [modify] https://crrev.com/6fc9acc6d7bf9de931c5a41568ac0c1506df4696/include/uapi/linux/nl80211.h [modify] https://crrev.com/6fc9acc6d7bf9de931c5a41568ac0c1506df4696/net/wireless/nl80211.c [modify] https://crrev.com/6fc9acc6d7bf9de931c5a41568ac0c1506df4696/include/net/cfg80211.h [modify] https://crrev.com/6fc9acc6d7bf9de931c5a41568ac0c1506df4696/net/wireless/scan.c [modify] https://crrev.com/6fc9acc6d7bf9de931c5a41568ac0c1506df4696/net/wireless/sme.c
,
Apr 12 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/7db0c6c7103efa0a97cc9db7741be598f40b9c33 commit 7db0c6c7103efa0a97cc9db7741be598f40b9c33 Author: Arend van Spriel <arend@broadcom.com> Date: Thu Apr 12 01:05:56 2018 BACKPORT: nl80211: add feature for BSS selection support Introducing a new feature that the driver can use to indicate the driver/firmware supports configuration of BSS selection criteria upon CONNECT command. This can be useful when multiple BSS-es are found belonging to the same ESS, ie. Infra-BSS with same SSID. The criteria can then be used to offload selection of a preferred BSS. Reviewed-by: Hante Meuleman <meuleman@broadcom.com> Reviewed-by: Franky (Zhenhui) Lin <frankyl@broadcom.com> Reviewed-by: Pieter-Paul Giesberts <pieterpg@broadcom.com> Reviewed-by: Lei Zhang <leizh@broadcom.com> Signed-off-by: Arend van Spriel <arend@broadcom.com> [move wiphy support check into parse_bss_select()] Signed-off-by: Johannes Berg <johannes.berg@intel.com> (cherry picked from commit 38de03d2a28925b489c11546804e2f5418cc17a4) kirtika@: Fixed a conflict in net/wireless/nl80211.c to preserve contents of commit 6a6c61d8467d ("nl80211: Define policy for packet pattern attributes") BUG= chromium:828485 TEST=None Change-Id: I688e94c95313d90a3f4d271dc52a4c2add0545e1 Reviewed-on: https://chromium-review.googlesource.com/989128 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Brian Norris <briannorris@chromium.org> [modify] https://crrev.com/7db0c6c7103efa0a97cc9db7741be598f40b9c33/net/wireless/nl80211.c [modify] https://crrev.com/7db0c6c7103efa0a97cc9db7741be598f40b9c33/include/uapi/linux/nl80211.h [modify] https://crrev.com/7db0c6c7103efa0a97cc9db7741be598f40b9c33/net/wireless/core.c [modify] https://crrev.com/7db0c6c7103efa0a97cc9db7741be598f40b9c33/include/net/cfg80211.h
,
Apr 12 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/8059af19acf79dd3c184e4be4ad1efbf09a4a1ce commit 8059af19acf79dd3c184e4be4ad1efbf09a4a1ce Author: Jouni Malinen <jouni@qca.qualcomm.com> Date: Thu Apr 12 01:06:01 2018 UPSTREAM: cfg80211: Add option to specify previous BSSID for Connect command This extends NL80211_CMD_CONNECT to allow the NL80211_ATTR_PREV_BSSID attribute to be used similarly to way this was already allowed with NL80211_CMD_ASSOCIATE. This allows user space to request reassociation (instead of association) when already connected to an AP. This provides an option to reassociate within an ESS without having to disconnect and associate with the AP. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com> Signed-off-by: Johannes Berg <johannes.berg@intel.com> (cherry picked from commit ba6fbacf9c073effaedf0c52fe7e52e2baf67725) BUG= chromium:828485 TEST=trybot on Eve Change-Id: I59a75160c18459d90fe37beccb13b630abff2046 Reviewed-on: https://chromium-review.googlesource.com/989129 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Brian Norris <briannorris@chromium.org> [modify] https://crrev.com/8059af19acf79dd3c184e4be4ad1efbf09a4a1ce/net/wireless/trace.h [modify] https://crrev.com/8059af19acf79dd3c184e4be4ad1efbf09a4a1ce/net/wireless/nl80211.c [modify] https://crrev.com/8059af19acf79dd3c184e4be4ad1efbf09a4a1ce/include/net/cfg80211.h
,
Apr 12 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/846fdffe4b9c3f6215a02692a4a87065f7db5089 commit 846fdffe4b9c3f6215a02692a4a87065f7db5089 Author: Aviya Erenfeld <aviya.erenfeld@intel.com> Date: Thu Apr 12 01:06:29 2018 UPSTREAM: mac80211: refactor monitor representation in sdata Insert the u32 monitor flags variable in a new structure that represents a monitor interface. This will allow to add more configuration variables to that structure which will happen in an upcoming change. Signed-off-by: Aviya Erenfeld <aviya.erenfeld@intel.com> Signed-off-by: Luca Coelho <luciano.coelho@intel.com> Signed-off-by: Johannes Berg <johannes.berg@intel.com> (cherry picked from commit d82121845d44334f5ec3c98906d1e4a592350beb) BUG= chromium:828485 TEST=build on eve and kevin Change-Id: I8f79811e01d1923fb32d91c18fe5042511286c68 Reviewed-on: https://chromium-review.googlesource.com/991256 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Brian Norris <briannorris@chromium.org> [modify] https://crrev.com/846fdffe4b9c3f6215a02692a4a87065f7db5089/net/mac80211/status.c [modify] https://crrev.com/846fdffe4b9c3f6215a02692a4a87065f7db5089/net/mac80211/driver-ops.c [modify] https://crrev.com/846fdffe4b9c3f6215a02692a4a87065f7db5089/net/mac80211/iface.c [modify] https://crrev.com/846fdffe4b9c3f6215a02692a4a87065f7db5089/net/mac80211/util.c [modify] https://crrev.com/846fdffe4b9c3f6215a02692a4a87065f7db5089/net/mac80211/rx.c [modify] https://crrev.com/846fdffe4b9c3f6215a02692a4a87065f7db5089/net/mac80211/tx.c [modify] https://crrev.com/846fdffe4b9c3f6215a02692a4a87065f7db5089/net/mac80211/cfg.c [modify] https://crrev.com/846fdffe4b9c3f6215a02692a4a87065f7db5089/net/mac80211/ieee80211_i.h
,
Apr 12 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/7bed982a8f8863efe10082914a5243cbb4c1c1b5 commit 7bed982a8f8863efe10082914a5243cbb4c1c1b5 Author: Aviya Erenfeld <aviya.erenfeld@intel.com> Date: Thu Apr 12 01:06:50 2018 UPSTREAM: mac80211: add support for MU-MIMO air sniffer add support to MU-MIMO air sniffer according groupID: in monitor mode, use a given MU-MIMO groupID to monitor stations that belongs to that group using MU-MIMO. add support for following a station according to its MAC address using VHT MU-MIMO sniffer: the monitors wait until they get an action MU-MIMO notification frame, then parses it in order to find the groupID that corresponds to the given MAC address and monitors packets destined to that groupID using VHT MU-MIMO. Signed-off-by: Aviya Erenfeld <aviya.erenfeld@intel.com> Signed-off-by: Luca Coelho <luciano.coelho@intel.com> Signed-off-by: Johannes Berg <johannes.berg@intel.com> (cherry picked from commit 42bd20d99857e69e368d5421ea402127d5835cd3) BUG= chromium:828485 TEST=build on eve and kevin Change-Id: I0a2c43c711a369f6e0d0004b285d233a950f7937 Reviewed-on: https://chromium-review.googlesource.com/991257 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Brian Norris <briannorris@chromium.org> [modify] https://crrev.com/7bed982a8f8863efe10082914a5243cbb4c1c1b5/net/mac80211/driver-ops.h [modify] https://crrev.com/7bed982a8f8863efe10082914a5243cbb4c1c1b5/net/mac80211/rx.c [modify] https://crrev.com/7bed982a8f8863efe10082914a5243cbb4c1c1b5/net/mac80211/ieee80211_i.h [modify] https://crrev.com/7bed982a8f8863efe10082914a5243cbb4c1c1b5/net/mac80211/cfg.c [modify] https://crrev.com/7bed982a8f8863efe10082914a5243cbb4c1c1b5/net/mac80211/iface.c
,
Apr 12 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/3a26982309bba8eaab9ebd88a14c4a015703ff25 commit 3a26982309bba8eaab9ebd88a14c4a015703ff25 Author: Johannes Berg <johannes.berg@intel.com> Date: Thu Apr 12 01:06:31 2018 BACKPORT: wireless: move IEEE80211_NUM_ACS to ieee80211.h This constant isn't really specific to mac80211, so move it "up" a level to ieee80211.h Signed-off-by: Johannes Berg <johannes.berg@intel.com> (cherry picked from commit 3db5e3e707ebb9ab0ce3a2dcd924ed2ea525d770) [translated to ar10k directories] BUG= chromium:828485 TEST=build on scarlet Change-Id: I22502489234d4a540b3141217d376babc0287326 Signed-off-by: Brian Norris <briannorris@chromium.org> Reviewed-on: https://chromium-review.googlesource.com/991332 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Kirtika Ruchandani <kirtika@chromium.org> [modify] https://crrev.com/3a26982309bba8eaab9ebd88a14c4a015703ff25/drivers/net/wireless/ar10k/hdrs/mac80211.h [modify] https://crrev.com/3a26982309bba8eaab9ebd88a14c4a015703ff25/drivers/net/wireless/ar10k/hdrs/ieee80211.h
,
Apr 12 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/62d3755181e66fb0d04dccdee3b453654f06ed14 commit 62d3755181e66fb0d04dccdee3b453654f06ed14 Author: Ayala Beker <ayala.beker@intel.com> Date: Thu Apr 12 01:05:59 2018 UPSTREAM: cfg80211: allow userspace to specify client P2P PS support Legacy clients don't support P2P power save mechanisms, and thus if a P2P GO has a legacy client connected to it, it has to make some changes in the PS behavior. To handle this, add an attribute to specify whether a station supports P2P PS or not. If the attribute was not specified cfg80211 will assume that station supports it for P2P GO interface, and does NOT support it for AP interface, matching the current assumptions in the code. Signed-off-by: Ayala Beker <ayala.beker@intel.com> Signed-off-by: Emmanuel Grumbach <emmanuel.grumbach@intel.com> Signed-off-by: Johannes Berg <johannes.berg@intel.com> (cherry picked from commit 17b942478643c5a90c06d978479bd326040bfa19) BUG= chromium:828485 TEST=None Change-Id: I27f7eca67ae32c9ff5f79f64bb5c00a59e3e621f Reviewed-on: https://chromium-review.googlesource.com/993771 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Brian Norris <briannorris@chromium.org> [modify] https://crrev.com/62d3755181e66fb0d04dccdee3b453654f06ed14/include/uapi/linux/nl80211.h [modify] https://crrev.com/62d3755181e66fb0d04dccdee3b453654f06ed14/net/wireless/nl80211.c [modify] https://crrev.com/62d3755181e66fb0d04dccdee3b453654f06ed14/include/net/cfg80211.h
,
Apr 12 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/6ae3fa6fba99507fbbd1f2478fa9490f781e194f commit 6ae3fa6fba99507fbbd1f2478fa9490f781e194f Author: Nicolas Dichtel <nicolas.dichtel@6wind.com> Date: Thu Apr 12 01:06:35 2018 UPSTREAM: wireless: use nla_put_u64_64bit() Signed-off-by: Nicolas Dichtel <nicolas.dichtel@6wind.com> Signed-off-by: David S. Miller <davem@davemloft.net> (cherry picked from commit 2dad624e6dd65c6048a9bbe0e16559fce182c87c) BUG= chromium:828485 TEST=None Change-Id: I3bf89c2ae4e5451bef0a110d1a2ade2b22cd9862 Reviewed-on: https://chromium-review.googlesource.com/993852 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Brian Norris <briannorris@chromium.org> [modify] https://crrev.com/6ae3fa6fba99507fbbd1f2478fa9490f781e194f/include/uapi/linux/nl80211.h [modify] https://crrev.com/6ae3fa6fba99507fbbd1f2478fa9490f781e194f/net/wireless/nl80211.c
,
Apr 12 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/c50dde1447484d641fbb2af2c952ccc8269c84be commit c50dde1447484d641fbb2af2c952ccc8269c84be Author: Johannes Berg <johannes.berg@intel.com> Date: Thu Apr 12 01:06:43 2018 UPSTREAM: nl80211: add missing kerneldoc for new *_PAD attributes Nicolas's patch missed this, now generating docbook warnings. Add the missing descriptions to address that. Fixes: 2dad624e6dd6 ("wireless: use nla_put_u64_64bit()") Signed-off-by: Johannes Berg <johannes.berg@intel.com> (cherry picked from commit 9b95fe59b18bcc891a6c60ae11d725c9c679574b) BUG= chromium:828485 TEST=None Change-Id: I2258a816361e867435c378da5c775b0a91ef74f6 Reviewed-on: https://chromium-review.googlesource.com/993853 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Brian Norris <briannorris@chromium.org> [modify] https://crrev.com/c50dde1447484d641fbb2af2c952ccc8269c84be/include/uapi/linux/nl80211.h
,
Apr 12 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/51da96a6b8bdcdbf1561238a78443276e69e7544 commit 51da96a6b8bdcdbf1561238a78443276e69e7544 Author: Kanchanapally, Vidyullatha <vkanchan@qti.qualcomm.com> Date: Thu Apr 12 01:06:45 2018 UPSTREAM: cfg80211: Advertise extended capabilities per interface type to userspace The driver extended capabilities may differ for different interface types which the userspace needs to know (for example the fine timing measurement initiator and responder bits might differ for a station and AP). Add a new nl80211 attribute to provide extended capabilities per interface type to userspace. Signed-off-by: Vidyullatha Kanchanapally <vkanchan@qti.qualcomm.com> Reviewed-by: Jouni Malinen <jouni@qca.qualcomm.com> Signed-off-by: Johannes Berg <johannes.berg@intel.com> (cherry picked from commit 019ae3a918811715192b22c400ac78d54acc26a9) BUG= chromium:828485 TEST=None Change-Id: Iad918d1d4da9d5b404bc1cb1709bc7cfc1cc7edb Reviewed-on: https://chromium-review.googlesource.com/993854 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Brian Norris <briannorris@chromium.org> [modify] https://crrev.com/51da96a6b8bdcdbf1561238a78443276e69e7544/net/wireless/nl80211.c [modify] https://crrev.com/51da96a6b8bdcdbf1561238a78443276e69e7544/include/uapi/linux/nl80211.h [modify] https://crrev.com/51da96a6b8bdcdbf1561238a78443276e69e7544/net/wireless/core.c [modify] https://crrev.com/51da96a6b8bdcdbf1561238a78443276e69e7544/include/net/cfg80211.h
,
Apr 12 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/cba7746c62d4e34c106d8f18c361a210b71f29c6 commit cba7746c62d4e34c106d8f18c361a210b71f29c6 Author: Aviya Erenfeld <aviya.erenfeld@intel.com> Date: Thu Apr 12 01:06:47 2018 UPSTREAM: nl80211: Add API to support VHT MU-MIMO air sniffer add API to support VHT MU-MIMO air sniffer. in MU-MIMO there are parallel frames on the air while the HW has only one RX. add the capability to sniff one of the MU-MIMO parallel frames by giving the sniffer additional information so it'll know which of the parallel frames it shall follow. Add attribute - NL80211_ATTR_MU_MIMO_GROUP_DATA - for getting a MU-MIMO groupID in order to monitor packets from that group using VHT MU-MIMO. And add attribute -NL80211_ATTR_MU_MIMO_FOLLOW_ADDR - for passing MAC address to monitor mode. that option will be used by VHT MU-MIMO air sniffer to follow a station according to it's MAC address using VHT MU-MIMO. Signed-off-by: Aviya Erenfeld <aviya.erenfeld@intel.com> Signed-off-by: Luca Coelho <luciano.coelho@intel.com> Signed-off-by: Johannes Berg <johannes.berg@intel.com> (cherry picked from commit c6e6a0c8be575c830a97b1942dabeab70f423fe0) BUG= chromium:828485 TEST=None Change-Id: If2a3c6092b720867315e94c5cb0bcc350d5907bb Reviewed-on: https://chromium-review.googlesource.com/993855 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Brian Norris <briannorris@chromium.org> [modify] https://crrev.com/cba7746c62d4e34c106d8f18c361a210b71f29c6/include/uapi/linux/nl80211.h [modify] https://crrev.com/cba7746c62d4e34c106d8f18c361a210b71f29c6/net/wireless/nl80211.c [modify] https://crrev.com/cba7746c62d4e34c106d8f18c361a210b71f29c6/include/net/cfg80211.h
,
Apr 12 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/42540b7b71a4a4e45a316a9af2ceee4b67305363 commit 42540b7b71a4a4e45a316a9af2ceee4b67305363 Author: Roopa Prabhu <roopa@cumulusnetworks.com> Date: Thu Apr 12 01:06:05 2018 UPSTREAM: rtnetlink: rtnl_fill_stats: avoid an unnecssary stats copy This patch passes netlink attr data ptr directly to dev_get_stats thus elimiating a stats copy. Suggested-by: David Miller <davem@davemloft.net> Signed-off-by: Roopa Prabhu <roopa@cumulusnetworks.com> Signed-off-by: David S. Miller <davem@davemloft.net> (cherry picked from commit 550bce59baf3f3059cd4ae1e268f08f2d2cb1d5c) BUG= chromium:828485 TEST=None Change-Id: I663b7a32856dae23a5517022c5a41a54b648526f Reviewed-on: https://chromium-review.googlesource.com/994696 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Brian Norris <briannorris@chromium.org> [modify] https://crrev.com/42540b7b71a4a4e45a316a9af2ceee4b67305363/net/core/rtnetlink.c
,
Apr 12 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/7abf5a4b4cf3ffd2c26b27d139aa6acefb341357 commit 7abf5a4b4cf3ffd2c26b27d139aa6acefb341357 Author: Roopa Prabhu <roopa@cumulusnetworks.com> Date: Thu Apr 12 01:06:12 2018 UPSTREAM: rtnetlink: add new RTM_GETSTATS message to dump link stats This patch adds a new RTM_GETSTATS message to query link stats via netlink from the kernel. RTM_NEWLINK also dumps stats today, but RTM_NEWLINK returns a lot more than just stats and is expensive in some cases when frequent polling for stats from userspace is a common operation. RTM_GETSTATS is an attempt to provide a light weight netlink message to explicity query only link stats from the kernel on an interface. The idea is to also keep it extensible so that new kinds of stats can be added to it in the future. This patch adds the following attribute for NETDEV stats: struct nla_policy ifla_stats_policy[IFLA_STATS_MAX + 1] = { [IFLA_STATS_LINK_64] = { .len = sizeof(struct rtnl_link_stats64) }, }; Like any other rtnetlink message, RTM_GETSTATS can be used to get stats of a single interface or all interfaces with NLM_F_DUMP. Future possible new types of stat attributes: link af stats: - IFLA_STATS_LINK_IPV6 (nested. for ipv6 stats) - IFLA_STATS_LINK_MPLS (nested. for mpls/mdev stats) extended stats: - IFLA_STATS_LINK_EXTENDED (nested. extended software netdev stats like bridge, vlan, vxlan etc) - IFLA_STATS_LINK_HW_EXTENDED (nested. extended hardware stats which are available via ethtool today) This patch also declares a filter mask for all stat attributes. User has to provide a mask of stats attributes to query. filter mask can be specified in the new hdr 'struct if_stats_msg' for stats messages. Other important field in the header is the ifindex. This api can also include attributes for global stats (eg tcp) in the future. When global stats are included in a stats msg, the ifindex in the header must be zero. A single stats message cannot contain both global and netdev specific stats. To easily distinguish them, netdev specific stat attributes name are prefixed with IFLA_STATS_LINK_ Without any attributes in the filter_mask, no stats will be returned. This patch has been tested with mofified iproute2 ifstat. Suggested-by: Jamal Hadi Salim <jhs@mojatatu.com> Signed-off-by: Roopa Prabhu <roopa@cumulusnetworks.com> Signed-off-by: David S. Miller <davem@davemloft.net> (cherry picked from commit 10c9ead9f3c6bb24bddc9a96681f7d58e6623966) BUG= chromium:828485 TEST=None Change-Id: I9ef851b9ddbc7b512d751267aefbd248882ec31f Reviewed-on: https://chromium-review.googlesource.com/994697 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Brian Norris <briannorris@chromium.org> [modify] https://crrev.com/7abf5a4b4cf3ffd2c26b27d139aa6acefb341357/security/selinux/nlmsgtab.c [modify] https://crrev.com/7abf5a4b4cf3ffd2c26b27d139aa6acefb341357/include/uapi/linux/rtnetlink.h [modify] https://crrev.com/7abf5a4b4cf3ffd2c26b27d139aa6acefb341357/net/core/rtnetlink.c [modify] https://crrev.com/7abf5a4b4cf3ffd2c26b27d139aa6acefb341357/include/uapi/linux/if_link.h
,
Apr 12 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/dc007dd9a7eb011cc1e84219ff6b6dba235cc76e commit dc007dd9a7eb011cc1e84219ff6b6dba235cc76e Author: Nicolas Dichtel <nicolas.dichtel@6wind.com> Date: Thu Apr 12 01:06:22 2018 UPSTREAM: rtnl: use the new API to align IFLA_STATS* Signed-off-by: Nicolas Dichtel <nicolas.dichtel@6wind.com> Signed-off-by: David S. Miller <davem@davemloft.net> (cherry picked from commit 58414d32a37e4c2f79da91aebc2d2365918a1562) BUG= chromium:828485 TEST=None Change-Id: Id944e09a7e36c1c16c4cd8d67b37d74ce38c7bb1 Reviewed-on: https://chromium-review.googlesource.com/994698 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Brian Norris <briannorris@chromium.org> [modify] https://crrev.com/dc007dd9a7eb011cc1e84219ff6b6dba235cc76e/net/core/rtnetlink.c
,
Apr 12 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/5a4211aad66fe91faf536a05ff15197f9f214d3a commit 5a4211aad66fe91faf536a05ff15197f9f214d3a Author: David S. Miller <davem@davemloft.net> Date: Thu Apr 12 01:06:10 2018 UPSTREAM: net: Add helpers for 64-bit aligning netlink attributes. Suggested-by: Eric Dumazet <eric.dumazet@gmail.com> Suggested-by: Nicolas Dichtel <nicolas.dichtel@6wind.com> Signed-off-by: David S. Miller <davem@davemloft.net> (cherry picked from commit 35c5845957c7982dac1f525ff3412f8acf0a0385) BUG= chromium:828485 TEST=build on eve and kevin Change-Id: I459d16689f8b4b995468cbb50004e660d181f817 Reviewed-on: https://chromium-review.googlesource.com/994699 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Brian Norris <briannorris@chromium.org> [modify] https://crrev.com/5a4211aad66fe91faf536a05ff15197f9f214d3a/net/core/rtnetlink.c [modify] https://crrev.com/5a4211aad66fe91faf536a05ff15197f9f214d3a/include/net/netlink.h
,
Apr 12 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/88b079b866a3628819ca60ddffa8bcea6b4b80b1 commit 88b079b866a3628819ca60ddffa8bcea6b4b80b1 Author: Eric Dumazet <edumazet@google.com> Date: Thu Apr 12 01:06:15 2018 UPSTREAM: net: fix HAVE_EFFICIENT_UNALIGNED_ACCESS typos HAVE_EFFICIENT_UNALIGNED_ACCESS needs CONFIG_ prefix. Also add a comment in nla_align_64bit() explaining we have to add a padding if current skb->data is aligned, as it certainly can be confusing. Fixes: 35c5845957c7 ("net: Add helpers for 64-bit aligning netlink attributes.") Signed-off-by: Eric Dumazet <edumazet@google.com> Signed-off-by: David S. Miller <davem@davemloft.net> (cherry picked from commit cca1d81574d266d4a3aa33f3947297564525e127) BUG= chromium:828485 TEST=None Change-Id: I5705a628a28aeb7ad39aab4c08b3d108bf9dc518 Reviewed-on: https://chromium-review.googlesource.com/994700 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Brian Norris <briannorris@chromium.org> [modify] https://crrev.com/88b079b866a3628819ca60ddffa8bcea6b4b80b1/include/net/netlink.h
,
Apr 12 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/19aaebeaf9fdd9028bc245a675b67b289ca1afab commit 19aaebeaf9fdd9028bc245a675b67b289ca1afab Author: David S. Miller <davem@davemloft.net> Date: Thu Apr 12 01:06:17 2018 UPSTREAM: net: nla_align_64bit() needs to test the right pointer. Netlink messages are appended, one object at a time, to the end of the SKB. Therefore we need to test skb_tail_pointer() not skb->data for alignment. Fixes: 35c5845957c7 ("net: Add helpers for 64-bit aligning netlink attributes.") Signed-off-by: David S. Miller <davem@davemloft.net> (cherry picked from commit e6f268ef3687862b0e9f01f7b3706b54f75b82ab) BUG= chromium:828485 TEST=None Change-Id: I7f4bda2d33640f6d7e50a59a9605fc48a760de7a Reviewed-on: https://chromium-review.googlesource.com/994701 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Brian Norris <briannorris@chromium.org> [modify] https://crrev.com/19aaebeaf9fdd9028bc245a675b67b289ca1afab/include/net/netlink.h
,
Apr 12 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/60ed41902e28ba93e22a6f8ebe452b045991580f commit 60ed41902e28ba93e22a6f8ebe452b045991580f Author: Nicolas Dichtel <nicolas.dichtel@6wind.com> Date: Thu Apr 12 01:06:19 2018 UPSTREAM: libnl: add more helpers to align attributes on 64-bit Signed-off-by: Nicolas Dichtel <nicolas.dichtel@6wind.com> Signed-off-by: David S. Miller <davem@davemloft.net> (cherry picked from commit 089bf1a6a924b97a7e9f920bae6253a8ad581cf3) BUG= chromium:828485 TEST=None Change-Id: I308a6a258de274ebd7a2ef60a2277c93f14166dc Reviewed-on: https://chromium-review.googlesource.com/994702 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Brian Norris <briannorris@chromium.org> [modify] https://crrev.com/60ed41902e28ba93e22a6f8ebe452b045991580f/lib/nlattr.c [modify] https://crrev.com/60ed41902e28ba93e22a6f8ebe452b045991580f/include/net/netlink.h
,
Apr 12 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/a5d3b0b1449e430e58318839bc79662bc78255fa commit a5d3b0b1449e430e58318839bc79662bc78255fa Author: David S. Miller <davem@davemloft.net> Date: Thu Apr 12 01:06:08 2018 UPSTREAM: net: Align IFLA_STATS64 attributes properly on architectures that need it. Since the nlattr header is 4 bytes in size, it can cause the netlink attribute payload to not be 8-byte aligned. This is particularly troublesome for IFLA_STATS64 which contains 64-bit statistic values. Solve this by creating a dummy IFLA_PAD attribute which has a payload which is zero bytes in size. When HAVE_EFFICIENT_UNALIGNED_ACCESS is false, we insert an IFLA_PAD attribute into the netlink response when necessary such that the IFLA_STATS64 payload will be properly aligned. With help and suggestions from Eric Dumazet. Signed-off-by: David S. Miller <davem@davemloft.net> (cherry picked from commit 18402843bf88c2e9674e1a3a05c73b7d9b09ee05) BUG= chromium:828485 TEST=build on eve and kevin Change-Id: I3c162148bd19fca8df9cc2df310584820758b353 Reviewed-on: https://chromium-review.googlesource.com/994704 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Brian Norris <briannorris@chromium.org> [modify] https://crrev.com/a5d3b0b1449e430e58318839bc79662bc78255fa/net/core/rtnetlink.c [modify] https://crrev.com/a5d3b0b1449e430e58318839bc79662bc78255fa/include/uapi/linux/if_link.h
,
Apr 12 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/b2e67d822d8db211b7fe9298b4f8af4513646bce commit b2e67d822d8db211b7fe9298b4f8af4513646bce Author: Kirtika Ruchandani <kirtika@google.com> Date: Thu Apr 12 01:06:57 2018 CHROMIUM: iwl7000: Remove backport definition for nla_put_u64_64bit b:76133001 requires that we pick up a ton of patches in 4.4 as dependencies for the patches to meet ETSI compliance. Among those patches is the backport for nla_put_u64_64bit(). Remove the stub from the iwl-chrome.h backport header. BUG= chromium:828485 , b:76133001 TEST=None Change-Id: Ifcc16c794f9ab6c758f6c35f2f9c10faba330878 Signed-off-by: Kirtika Ruchandani <kirtika@google.com> Reviewed-on: https://chromium-review.googlesource.com/994705 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Brian Norris <briannorris@chromium.org> [modify] https://crrev.com/b2e67d822d8db211b7fe9298b4f8af4513646bce/drivers/net/wireless/iwl7000/hdrs/iwl-chrome.h
,
Apr 12 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/4c50298bc541cad6e3ec2d611af0cd6a94ff10ce commit 4c50298bc541cad6e3ec2d611af0cd6a94ff10ce Author: Johannes Berg <johannes.berg@intel.com> Date: Thu Apr 12 01:06:59 2018 UPSTREAM: cfg80211: don't require RTNL held for regdomain reads The whole code is set up to allow RCU reads of this data, but then uses rtnl_dereference() which requires the RTNL. Convert it to rcu_dereference_rtnl() which makes it require only RCU or the RTNL, to allow RCU-protected reading of the data. Reviewed-by: Coelho, Luciano <luciano.coelho@intel.com> Signed-off-by: Johannes Berg <johannes.berg@intel.com> (cherry picked from commit 5bf16a11ba2940c67d0b3a2154813bb42e8c6281) BUG= chromium:828485 TEST=build on eve and kevin Change-Id: I93b5cd19e8f8849255b30e5601c1574641490981 Reviewed-on: https://chromium-review.googlesource.com/997031 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Brian Norris <briannorris@chromium.org> [modify] https://crrev.com/4c50298bc541cad6e3ec2d611af0cd6a94ff10ce/net/wireless/reg.c
,
Apr 12 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/cc1a6a8bda7027fc8dba5b8909deee10eaca18f2 commit cc1a6a8bda7027fc8dba5b8909deee10eaca18f2 Author: Nicolas Dichtel <nicolas.dichtel@6wind.com> Date: Thu Apr 12 01:07:02 2018 UPSTREAM: libnl: fix help of _64bit functions Fix typo and describe 'padattr'. Fixes: 089bf1a6a924 ("libnl: add more helpers to align attributes on 64-bit") Signed-off-by: Nicolas Dichtel <nicolas.dichtel@6wind.com> Signed-off-by: David S. Miller <davem@davemloft.net> (cherry picked from commit 11a99573079e15f11499ae8d21b07e3e3257fff1) BUG= chromium:828485 TEST=build on eve and kevin Change-Id: I8bf7fe61e689116158bec10c04528dda67f1df46 Reviewed-on: https://chromium-review.googlesource.com/997092 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Brian Norris <briannorris@chromium.org> [modify] https://crrev.com/cc1a6a8bda7027fc8dba5b8909deee10eaca18f2/lib/nlattr.c
,
Apr 12 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/75fd174654082667a7813663497471b055ba5b52 commit 75fd174654082667a7813663497471b055ba5b52 Author: Mathias Krause <minipli@googlemail.com> Date: Thu Apr 12 01:07:04 2018 UPSTREAM: rtnl: stats - add missing netlink message size checks We miss to check if the netlink message is actually big enough to contain a struct if_stats_msg. Add a check to prevent userland from sending us short messages that would make us access memory beyond the end of the message. Fixes: 10c9ead9f3c6 ("rtnetlink: add new RTM_GETSTATS message to dump...") Signed-off-by: Mathias Krause <minipli@googlemail.com> Cc: Roopa Prabhu <roopa@cumulusnetworks.com> Signed-off-by: David S. Miller <davem@davemloft.net> (cherry picked from commit 4775cc1f2d5abca894ac32774eefc22c45347d1c) BUG= chromium:828485 TEST=build on eve and kevin Change-Id: Ib3faa8ebf0845a89bdb2b774260a406d896c8023 Reviewed-on: https://chromium-review.googlesource.com/997093 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Brian Norris <briannorris@chromium.org> [modify] https://crrev.com/75fd174654082667a7813663497471b055ba5b52/net/core/rtnetlink.c
,
Apr 12 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/cbddacbfd0f89cd59e83498ca280f64bb9b13235 commit cbddacbfd0f89cd59e83498ca280f64bb9b13235 Author: Nikolay Aleksandrov <nikolay@cumulusnetworks.com> Date: Thu Apr 12 01:07:06 2018 UPSTREAM: net: rtnetlink: fix info leak in RTM_GETSTATS call When RTM_GETSTATS was added the fields of its header struct were not all initialized when returning the result thus leaking 4 bytes of information to user-space per rtnl_fill_statsinfo call, so initialize them now. Thanks to Alexander Potapenko for the detailed report and bisection. Reported-by: Alexander Potapenko <glider@google.com> Fixes: 10c9ead9f3c6 ("rtnetlink: add new RTM_GETSTATS message to dump link stats") Signed-off-by: Nikolay Aleksandrov <nikolay@cumulusnetworks.com> Acked-by: Roopa Prabhu <roopa@cumulusnetworks.com> Signed-off-by: David S. Miller <davem@davemloft.net> (cherry picked from commit ce024f42c2e28b6bce4ecc1e891b42f57f753892) BUG= chromium:828485 TEST=build on eve and kevin Change-Id: I19a278b2d6025f22ae9609132b2355c943c04d2c Reviewed-on: https://chromium-review.googlesource.com/997094 Commit-Ready: Kirtika Ruchandani <kirtika@chromium.org> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Brian Norris <briannorris@chromium.org> [modify] https://crrev.com/cbddacbfd0f89cd59e83498ca280f64bb9b13235/net/core/rtnetlink.c
,
Apr 13 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/052aebc19427c2551c3ef00c53a9c68fa7150e6e commit 052aebc19427c2551c3ef00c53a9c68fa7150e6e Author: Wei Yongjun <weiyongjun1@huawei.com> Date: Fri Apr 13 03:34:45 2018 UPSTREAM: cfg80211: fix possible memory leak in cfg80211_iter_combinations() 'limits' is malloced in cfg80211_iter_combinations() and should be freed before leaving from the error handling cases, otherwise it will cause memory leak. Fixes: 0c317a02ca98 ("cfg80211: support virtual interfaces with different beacon intervals") Signed-off-by: Wei Yongjun <weiyongjun1@huawei.com> Signed-off-by: Johannes Berg <johannes.berg@intel.com> (cherry picked from commit 320c975f180b19296f0fd6c5bf2144e633aaba5e) BUG= chromium:828485 TEST=build on eve and kevin Change-Id: I52631a879d1cf5b0fd15d063d91fbe97157e73f4 Reviewed-on: https://chromium-review.googlesource.com/1004271 Commit-Ready: ChromeOS CL Exonerator Bot <chromiumos-cl-exonerator@appspot.gserviceaccount.com> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Brian Norris <briannorris@chromium.org> [modify] https://crrev.com/052aebc19427c2551c3ef00c53a9c68fa7150e6e/net/wireless/util.c
,
Apr 13 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/534eccedf06b34d74b999fa86b429e4eb20465cf commit 534eccedf06b34d74b999fa86b429e4eb20465cf Author: Anilkumar Kolli <akolli@codeaurora.org> Date: Fri Apr 13 03:34:49 2018 UPSTREAM: ath10k: advertize beacon_int_min_gcd This patch fixes regression caused by 0c317a02ca98 ("cfg80211: support virtual interfaces with different beacon intervals"), with this change cfg80211 expects the driver to advertize 'beacon_int_min_gcd' to support different beacon intervals in multivap scenario. This support is added for, QCA988X/QCA99X0/QCA9984/QCA4019. Verifed AP + mesh bring up on QCA9984 with beacon interval 100msec and 1000msec respectively. Frimware: firmware-5.bin_10.4-3.5.3-00053 Fixes: 0c317a02ca98 ("cfg80211: support virtual interfaces with different beacon intervals") Signed-off-by: Anilkumar Kolli <akolli@codeaurora.org> Signed-off-by: Kalle Valo <kvalo@codeaurora.org> (cherry picked from commit 8ebee73b574ad3dd1f14d461f65ceaffbd637650) BUG= chromium:828485 TEST=build on eve and kevin Change-Id: I5c60f2fc8d572df216053719b1a904eedc041579 Reviewed-on: https://chromium-review.googlesource.com/1004272 Commit-Ready: ChromeOS CL Exonerator Bot <chromiumos-cl-exonerator@appspot.gserviceaccount.com> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Brian Norris <briannorris@chromium.org> [modify] https://crrev.com/534eccedf06b34d74b999fa86b429e4eb20465cf/drivers/net/wireless/ath/ath10k/mac.c
,
Apr 13 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/1236dbdb658c969ce6fd2d82c432aa4ed84d2ef7 commit 1236dbdb658c969ce6fd2d82c432aa4ed84d2ef7 Author: Srinivas Dasari <dasaris@qti.qualcomm.com> Date: Fri Apr 13 03:34:51 2018 UPSTREAM: cfg80211: Check if NAN service ID is of expected size nla policy checks for only maximum length of the attribute data when the attribute type is NLA_BINARY. If userspace sends less data than specified, cfg80211 may access illegal memory. When type is NLA_UNSPEC, nla policy check ensures that userspace sends minimum specified length number of bytes. Remove type assignment to NLA_BINARY from nla_policy of NL80211_NAN_FUNC_SERVICE_ID to make these NLA_UNSPEC and to make sure minimum NL80211_NAN_FUNC_SERVICE_ID_LEN bytes are received from userspace with NL80211_NAN_FUNC_SERVICE_ID. Fixes: a442b761b24 ("cfg80211: add add_nan_func / del_nan_func") Cc: stable@vger.kernel.org Signed-off-by: Srinivas Dasari <dasaris@qti.qualcomm.com> Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com> Signed-off-by: Johannes Berg <johannes.berg@intel.com> (cherry picked from commit 0a27844ce86d039d74221dd56cd8c0349b146b63) BUG= chromium:828485 TEST=build on eve and kevin Change-Id: I3cb31f656a9534ad44b32b51cbed6e0c271f93fd Reviewed-on: https://chromium-review.googlesource.com/1004273 Commit-Ready: ChromeOS CL Exonerator Bot <chromiumos-cl-exonerator@appspot.gserviceaccount.com> Tested-by: Brian Norris <briannorris@chromium.org> Reviewed-by: Brian Norris <briannorris@chromium.org> [modify] https://crrev.com/1236dbdb658c969ce6fd2d82c432aa4ed84d2ef7/net/wireless/nl80211.c
,
Apr 13 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/39d7aea4056e7aa99467f11ab9fe7a8d1315de4e commit 39d7aea4056e7aa99467f11ab9fe7a8d1315de4e Author: Emmanuel Grumbach <emmanuel.grumbach@intel.com> Date: Fri Apr 13 03:34:36 2018 UPSTREAM: cfg80211: honor NL80211_RRF_NO_HT40{MINUS,PLUS} Honor the NL80211_RRF_NO_HT40{MINUS,PLUS} flags in reg_process_ht_flags_channel. Not doing so leads can lead to a firmware assert in iwlwifi for example. Fixes: b0d7aa59592b ("cfg80211: allow wiphy specific regdomain management") Signed-off-by: Emmanuel Grumbach <emmanuel.grumbach@intel.com> Signed-off-by: Johannes Berg <johannes.berg@intel.com> (cherry picked from commit 4e0854a74f08e6a9d847f2c2cfae7b07c931d125) BUG= chromium:828485 TEST=build on eve and kevin Change-Id: Id5ff1f26a5b5984f4b7dc5e78021a13ceb387598 Reviewed-on: https://chromium-review.googlesource.com/989275 Commit-Ready: ChromeOS CL Exonerator Bot <chromiumos-cl-exonerator@appspot.gserviceaccount.com> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Brian Norris <briannorris@chromium.org> [modify] https://crrev.com/39d7aea4056e7aa99467f11ab9fe7a8d1315de4e/net/wireless/reg.c
,
Apr 13 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/288925877eb25c28177cf0978258abf04ac6a969 commit 288925877eb25c28177cf0978258abf04ac6a969 Author: Kirtika Ruchandani <kirtika@google.com> Date: Fri Apr 13 03:34:34 2018 UPSTREAM: brcmfmac: Fix check for ISO3166 code The commit "regulatory: add NUL to request alpha2" increases the length of alpha2 to 3. This causes a regression on brcmfmac, because brcmf_cfg80211_reg_notifier() expect valid ISO3166 codes in the complete array. So fix this accordingly. Fixes: 657308f73e67 ("regulatory: add NUL to request alpha2") Signed-off-by: Stefan Wahren <stefan.wahren@i2se.com> Acked-by: Franky Lin <franky.lin@broadcom.com> Signed-off-by: Kalle Valo <kvalo@codeaurora.org> (cherry-picked from upstream commit 9b9322db5c5a1917a66c71fe47c3848a9a31227e) BUG= chromium:828485 TEST=build on eve and kevin (smoke-test only, neither runs brcm) Change-Id: Ib3313dc7600bc3eb97ed4a488741bc26f35931ba Reviewed-on: https://chromium-review.googlesource.com/993766 Commit-Ready: ChromeOS CL Exonerator Bot <chromiumos-cl-exonerator@appspot.gserviceaccount.com> Tested-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Brian Norris <briannorris@chromium.org> [modify] https://crrev.com/288925877eb25c28177cf0978258abf04ac6a969/drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c
,
Apr 18 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/2346b536e7673b132df05ed2d94a64a882ba4dfb commit 2346b536e7673b132df05ed2d94a64a882ba4dfb Author: Al Viro <viro@zeniv.linux.org.uk> Date: Wed Apr 18 06:34:43 2018 UPSTREAM: [regression] fix braino in fs/dlm/user.c it's "bugger off if we got ERR_PTR", not the other way round... Signed-off-by: Bob Peterson <rpeterso@redhat.com> Signed-off-by: Al Viro <viro@zeniv.linux.org.uk> BUG= chromium:828485 TEST=Run smatch. Ensure that DLM, especially the affected function, still works Reported by 0day / Dan Carpenter as: smatch warnings: fs/dlm/user.c:524 device_write() warn: passing a valid pointer to 'PTR_ERR' fs/dlm/user.c:526 device_write() error: 'kbuf' dereferencing possible ERR_PTR() Change-Id: Idf471116cd36f99458245888e2a06f8d9e32e93c Signed-off-by: Guenter Roeck <groeck@chromium.org> (cherry picked from commit 117aa41e8020fe493bbb677ebe828c3a4b380185) Reviewed-on: https://chromium-review.googlesource.com/1015411 Reviewed-by: Kirtika Ruchandani <kirtika@chromium.org> Reviewed-by: Brian Norris <briannorris@chromium.org> [modify] https://crrev.com/2346b536e7673b132df05ed2d94a64a882ba4dfb/fs/dlm/user.c
,
Aug 3
This bug has an owner, thus, it's been triaged. Changing status to "assigned".
,
Sep 25
Eve was ETSI compliant by R67 - this bug was just not marked as fixed. See more details on b/38500355 |
||||
►
Sign in to add a comment |
||||
Comment 1 by kirtika@chromium.org
, Apr 3 2018Components: OS>Systems>Network
Owner: kirtika@chromium.org