<feed xmlns='http://www.w3.org/2005/Atom'>
<title>kernel/linux.git/drivers/net/wireless, branch v4.4.171</title>
<subtitle>Linux kernel stable tree (mirror)</subtitle>
<id>https://git.radix-linux.su/kernel/linux.git/atom?h=v4.4.171</id>
<link rel='self' href='https://git.radix-linux.su/kernel/linux.git/atom?h=v4.4.171'/>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/'/>
<updated>2019-01-13T09:05:33+00:00</updated>
<entry>
<title>b43: Fix error in cordic routine</title>
<updated>2019-01-13T09:05:33+00:00</updated>
<author>
<name>Larry Finger</name>
<email>Larry.Finger@lwfinger.net</email>
</author>
<published>2018-11-19T18:01:24+00:00</published>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/commit/?id=c820ac339c98aa27dd63758de3cd0b33feb97513'/>
<id>urn:sha1:c820ac339c98aa27dd63758de3cd0b33feb97513</id>
<content type='text'>
commit 8ea3819c0bbef57a51d8abe579e211033e861677 upstream.

The cordic routine for calculating sines and cosines that was added in
commit 6f98e62a9f1b ("b43: update cordic code to match current specs")
contains an error whereby a quantity declared u32 can in fact go negative.

This problem was detected by Priit Laes who is switching b43 to use the
routine in the library functions of the kernel.

Fixes: 986504540306 ("b43: make cordic common (LP-PHY and N-PHY need it)")
Reported-by: Priit Laes &lt;plaes@plaes.org&gt;
Cc: Rafał Miłecki &lt;zajec5@gmail.com&gt;
Cc: Stable &lt;stable@vger.kernel.org&gt; # 2.6.34
Signed-off-by: Larry Finger &lt;Larry.Finger@lwfinger.net&gt;
Signed-off-by: Priit Laes &lt;plaes@plaes.org&gt;
Signed-off-by: Kalle Valo &lt;kvalo@codeaurora.org&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

</content>
</entry>
<entry>
<title>mac80211_hwsim: fix module init error paths for netlink</title>
<updated>2018-12-21T13:09:51+00:00</updated>
<author>
<name>Alexey Khoroshilov</name>
<email>khoroshilov@ispras.ru</email>
</author>
<published>2018-10-05T20:22:06+00:00</published>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/commit/?id=a33ba2d2aa7e28be3773e0787ddcdbb754717449'/>
<id>urn:sha1:a33ba2d2aa7e28be3773e0787ddcdbb754717449</id>
<content type='text'>
[ Upstream commit 05cc09de4c017663a217630682041066f2f9a5cd ]

There is no unregister netlink notifier and family on error paths
in init_mac80211_hwsim(). Also there is an error path where
hwsim_class is not destroyed.

Found by Linux Driver Verification project (linuxtesting.org).

Signed-off-by: Alexey Khoroshilov &lt;khoroshilov@ispras.ru&gt;
Fixes: 62759361eb49 ("mac80211-hwsim: Provide multicast event for HWSIM_CMD_NEW_RADIO")
Signed-off-by: Johannes Berg &lt;johannes.berg@intel.com&gt;
Signed-off-by: Sasha Levin &lt;sashal@kernel.org&gt;
</content>
</entry>
<entry>
<title>wil6210: missing length check in wmi_set_ie</title>
<updated>2018-12-17T20:55:15+00:00</updated>
<author>
<name>Lior David</name>
<email>qca_liord@qca.qualcomm.com</email>
</author>
<published>2017-11-14T13:25:39+00:00</published>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/commit/?id=e47b9b2b005ab8b1b83bc0ac4aa2803cba57182a'/>
<id>urn:sha1:e47b9b2b005ab8b1b83bc0ac4aa2803cba57182a</id>
<content type='text'>
commit b5a8ffcae4103a9d823ea3aa3a761f65779fbe2a upstream.

Add a length check in wmi_set_ie to detect unsigned integer
overflow.

Signed-off-by: Lior David &lt;qca_liord@qca.qualcomm.com&gt;
Signed-off-by: Maya Erez &lt;qca_merez@qca.qualcomm.com&gt;
Signed-off-by: Kalle Valo &lt;kvalo@qca.qualcomm.com&gt;
Signed-off-by: Ben Hutchings &lt;ben.hutchings@codethink.co.uk&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;
</content>
</entry>
<entry>
<title>mac80211_hwsim: Timer should be initialized before device registered</title>
<updated>2018-12-13T08:21:37+00:00</updated>
<author>
<name>Vasyl Vavrychuk</name>
<email>vasyl.vavrychuk@globallogic.com</email>
</author>
<published>2018-10-17T22:02:12+00:00</published>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/commit/?id=71a8069fb10d0a022b79caed32f7e19858fc5d0f'/>
<id>urn:sha1:71a8069fb10d0a022b79caed32f7e19858fc5d0f</id>
<content type='text'>
commit a1881c9b8a1edef0a5ae1d5c1b61406fe3402114 upstream.

Otherwise if network manager starts configuring Wi-Fi interface
immidiatelly after getting notification of its creation, we will get
NULL pointer dereference:

  BUG: unable to handle kernel NULL pointer dereference at           (null)
  IP: [&lt;ffffffff95ae94c8&gt;] hrtimer_active+0x28/0x50
  ...
  Call Trace:
   [&lt;ffffffff95ae9997&gt;] ? hrtimer_try_to_cancel+0x27/0x110
   [&lt;ffffffff95ae9a95&gt;] ? hrtimer_cancel+0x15/0x20
   [&lt;ffffffffc0803bf0&gt;] ? mac80211_hwsim_config+0x140/0x1c0 [mac80211_hwsim]

Cc: stable@vger.kernel.org
Signed-off-by: Vasyl Vavrychuk &lt;vasyl.vavrychuk@globallogic.com&gt;
Signed-off-by: Johannes Berg &lt;johannes.berg@intel.com&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

</content>
</entry>
<entry>
<title>Revert "wlcore: Add missing PM call for wlcore_cmd_wait_for_event_or_timeout()"</title>
<updated>2018-12-13T08:21:26+00:00</updated>
<author>
<name>Sasha Levin</name>
<email>sashal@kernel.org</email>
</author>
<published>2018-12-02T15:03:24+00:00</published>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/commit/?id=494fedded2d6404d69c4cf00591b003c06c7afaa'/>
<id>urn:sha1:494fedded2d6404d69c4cf00591b003c06c7afaa</id>
<content type='text'>
This reverts commit 3fdd34643ffc378b5924941fad40352c04610294 which was
upstream commit 4ec7cece87b3ed21ffcd407c62fb2f151a366bc1.

From Dietmar May's report on the stable mailing list
(https://www.spinics.net/lists/stable/msg272201.html):

&gt; I've run into some problems which appear due to (a) recent patch(es) on
&gt; the wlcore wifi driver.
&gt;
&gt; 4.4.160 - commit 3fdd34643ffc378b5924941fad40352c04610294
&gt; 4.9.131 - commit afeeecc764436f31d4447575bb9007732333818c
&gt;
&gt; Earlier versions (4.9.130 and 4.4.159 - tested back to 4.4.49) do not
&gt; exhibit this problem. It is still present in 4.9.141.
&gt;
&gt; master as of 4.20.0-rc4 does not exhibit this problem.
&gt;
&gt; Basically, during client association when in AP mode (running hostapd),
&gt; handshake may or may not complete following a noticeable delay. If
&gt; successful, then the driver fails consistently in warn_slowpath_null
&gt; during disassociation. If unsuccessful, the wifi client attempts multiple
&gt; times, sometimes failing repeatedly. I've had clients unable to connect
&gt; for 3-5 minutes during testing, with the syslog filled with dozens of
&gt; backtraces. syslog details are below.
&gt;
&gt; I'm working on an embedded device with a TI 3352 ARM processor and a
&gt; murata wl1271 module in sdio mode. We're running a fully patched ubuntu
&gt; 18.04 ARM build, with a kernel built from kernel.org's stable/linux repo &lt;https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-4.9.y&amp;id=afeeecc764436f31d4447575bb9007732333818c&gt;.
&gt; Relevant parts of the kernel config are included below.
&gt;
&gt; The commit message states:
&gt;
&gt; &gt; /I've only seen this few times with the runtime PM patches enabled so
&gt; &gt; this one is probably not needed before that. This seems to work
&gt; &gt; currently based on the current PM implementation timer. Let's apply
&gt; &gt; this separately though in case others are hitting this issue./
&gt; We're not doing anything explicit with power management. The device is an
&gt; IoT edge gateway with battery backup, normally running on wall power. The
&gt; battery is currently used solely to shut down the system cleanly to avoid
&gt; filesystem corruption.
&gt;
&gt; The device tree is configured to keep power in suspend; but the device
&gt; should never suspend, so in our case, there is no need to call
&gt; wl1271_ps_elp_wakeup() or wl1271_ps_elp_sleep(), as occurs in the patch.

Signed-off-by: Sasha Levin &lt;sashal@kernel.org&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;
</content>
</entry>
<entry>
<title>iwlwifi: mvm: fix regulatory domain update when the firmware starts</title>
<updated>2018-12-01T08:46:40+00:00</updated>
<author>
<name>Emmanuel Grumbach</name>
<email>emmanuel.grumbach@intel.com</email>
</author>
<published>2018-10-03T08:16:54+00:00</published>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/commit/?id=26350f8993680c9ed6e3007b7422aa6955856c40'/>
<id>urn:sha1:26350f8993680c9ed6e3007b7422aa6955856c40</id>
<content type='text'>
commit 82715ac71e6b94a2c2136e31f3a8e6748e33aa8c upstream.

When the firmware starts, it doesn't have any regulatory
information, hence it uses the world wide limitations. The
driver can feed the firmware with previous knowledge that
was kept in the driver, but the firmware may still not
update its internal tables.

This happens when we start a BSS interface, and then the
firmware can change the regulatory tables based on our
location and it'll use more lenient, location specific
rules. Then, if the firmware is shut down (when the
interface is brought down), and then an AP interface is
created, the firmware will forget the country specific
rules.

The host will think that we are in a certain country that
may allow channels and will try to teach the firmware about
our location, but the firmware may still not allow to drop
the world wide limitations and apply country specific rules
because it was just re-started.

In this case, the firmware will reply with MCC_RESP_ILLEGAL
to the MCC_UPDATE_CMD. In that case, iwlwifi needs to let
the upper layers (cfg80211 / hostapd) know that the channel
list they know about has been updated.

This fixes https://bugzilla.kernel.org/show_bug.cgi?id=201105

Cc: stable@vger.kernel.org
Signed-off-by: Emmanuel Grumbach &lt;emmanuel.grumbach@intel.com&gt;
Signed-off-by: Luca Coelho &lt;luciano.coelho@intel.com&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;


</content>
</entry>
<entry>
<title>mwifiex: fix p2p device doesn't find in scan problem</title>
<updated>2018-12-01T08:46:40+00:00</updated>
<author>
<name>Karthik D A</name>
<email>karthida@marvell.com</email>
</author>
<published>2016-09-28T12:48:28+00:00</published>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/commit/?id=65c2ca730e2eed519853fcc8746b8a863eb7e1bc'/>
<id>urn:sha1:65c2ca730e2eed519853fcc8746b8a863eb7e1bc</id>
<content type='text'>
commit 3d8bd85c2c9e47ed2c82348aa5b6029ed48376ae upstream.

Marvell p2p device disappears from the list of p2p peers on the other
p2p device after disconnection.

It happens due to a bug in driver. When interface is changed from p2p
to station, certain variables(bss_type, bss_role etc.) aren't correctly
updated. This patch corrects them to fix the issue.

Signed-off-by: Karthik D A &lt;karthida@marvell.com&gt;
Signed-off-by: Amitkumar Karwar &lt;akarwar@marvell.com&gt;
Signed-off-by: Kalle Valo &lt;kvalo@codeaurora.org&gt;
[AmitP: Refactored to fix driver file path in linux-4.4.y]
Signed-off-by: Amit Pundir &lt;amit.pundir@linaro.org&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

</content>
</entry>
<entry>
<title>mwifiex: Fix NULL pointer dereference in skb_dequeue()</title>
<updated>2018-12-01T08:46:40+00:00</updated>
<author>
<name>Amitkumar Karwar</name>
<email>akarwar@marvell.com</email>
</author>
<published>2016-09-28T12:48:23+00:00</published>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/commit/?id=e431c00b52af6449c5e84451437b74326ba21e6d'/>
<id>urn:sha1:e431c00b52af6449c5e84451437b74326ba21e6d</id>
<content type='text'>
commit c44c040300d7afd79294710313a4989683e2afb1 upstream.

At couple of places in cleanup path, we are just going through the
skb queue and freeing them without unlinking. This leads to a crash
when other thread tries to do skb_dequeue() and use already freed node.

The problem is freed by unlinking skb before freeing it.

Signed-off-by: Amitkumar Karwar &lt;akarwar@marvell.com&gt;
Signed-off-by: Kalle Valo &lt;kvalo@codeaurora.org&gt;
[AmitP: Refactored to fix driver file path in linux-4.4.y]
Signed-off-by: Amit Pundir &lt;amit.pundir@linaro.org&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

</content>
</entry>
<entry>
<title>cw1200: Don't leak memory if krealloc failes</title>
<updated>2018-12-01T08:46:40+00:00</updated>
<author>
<name>Johannes Thumshirn</name>
<email>jthumshirn@suse.de</email>
</author>
<published>2016-09-30T12:39:17+00:00</published>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/commit/?id=63238079b4800af2d650ebbc0a215fb2a0b004e4'/>
<id>urn:sha1:63238079b4800af2d650ebbc0a215fb2a0b004e4</id>
<content type='text'>
commit 9afdd6128c39f42398041bb2e017d8df0dcebcd1 upstream.

The call to krealloc() in wsm_buf_reserve() directly assigns the newly
returned memory to buf-&gt;begin. This is all fine except when krealloc()
failes we loose the ability to free the old memory pointed to by
buf-&gt;begin. If we just create a temporary variable to assign memory to
and assign the memory to it we can mitigate the memory leak.

Signed-off-by: Johannes Thumshirn &lt;jthumshirn@suse.de&gt;
Cc: Johannes Berg &lt;johannes@sipsolutions.net&gt;
Signed-off-by: Kalle Valo &lt;kvalo@codeaurora.org&gt;
Signed-off-by: Amit Pundir &lt;amit.pundir@linaro.org&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

</content>
</entry>
<entry>
<title>ath10k: fix kernel panic due to race in accessing arvif list</title>
<updated>2018-12-01T08:46:36+00:00</updated>
<author>
<name>Vasanthakumar Thiagarajan</name>
<email>vthiagar@qti.qualcomm.com</email>
</author>
<published>2016-10-10T14:21:18+00:00</published>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/commit/?id=2ca8b2a88e7f222a5f2db30778eb99c113fc697a'/>
<id>urn:sha1:2ca8b2a88e7f222a5f2db30778eb99c113fc697a</id>
<content type='text'>
commit ebaa4b1620bf69f2bc43cb45ea85fbafdaec23c3 upstream.

arvifs list is traversed within data_lock spin_lock in tasklet
context to fill channel information from the corresponding vif.
This means any access to arvifs list for add/del operations
should also be protected with the same spin_lock to avoid the
race. Fix this by performing list add/del on arvfis within the
data_lock. This could fix kernel panic something like the below.

 LR is at ath10k_htt_rx_pktlog_completion_handler+0x100/0xb6c [ath10k_core]
 PC is at ath10k_htt_rx_pktlog_completion_handler+0x1c0/0xb6c [ath10k_core]
 Internal error: Oops: 17 [#1] PREEMPT SMP ARM
 [&lt;bf4857f4&gt;] (ath10k_htt_rx_pktlog_completion_handler+0x2f4/0xb6c [ath10k_core])
 [&lt;bf487540&gt;] (ath10k_htt_txrx_compl_task+0x8b4/0x1188 [ath10k_core])
 [&lt;c00312d4&gt;] (tasklet_action+0x8c/0xec)
 [&lt;c00309a8&gt;] (__do_softirq+0xdc/0x208)
 [&lt;c0030d6c&gt;] (irq_exit+0x84/0xe0)
 [&lt;c005db04&gt;] (__handle_domain_irq+0x80/0xa0)
 [&lt;c00085c4&gt;] (gic_handle_irq+0x38/0x5c)
 [&lt;c0009640&gt;] (__irq_svc+0x40/0x74)

(gdb) list *(ath10k_htt_rx_pktlog_completion_handler+0x1c0)
0x136c0 is in ath10k_htt_rx_h_channel (drivers/net/wireless/ath/ath10k/htt_rx.c:769)
764		struct cfg80211_chan_def def;
765
766		lockdep_assert_held(&amp;ar-&gt;data_lock);
767
768		list_for_each_entry(arvif, &amp;ar-&gt;arvifs, list) {
769			if (arvif-&gt;vdev_id == vdev_id &amp;&amp;
770			    ath10k_mac_vif_chan(arvif-&gt;vif, &amp;def) == 0)
771				return def.chan;
772		}
773

Signed-off-by: Vasanthakumar Thiagarajan &lt;vthiagar@qti.qualcomm.com&gt;
Signed-off-by: Kalle Valo &lt;kvalo@qca.qualcomm.com&gt;
Signed-off-by: Amit Pundir &lt;amit.pundir@linaro.org&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

</content>
</entry>
</feed>
