summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAge
...
| * | | | qcacld-2.0: Add boundary check for setMonChan commandNirav Shah2017-11-13
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Add channel and bandwidth validation check for setMonChan iwpriv command. Change-Id: I1be22799a46e3ec30cfe384563ecb8a5404d9f6a CRs-Fixed: 2139911
| * | | | Release 4.0.11.211Csnandini2017-11-12
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Release 4.0.11.211C Change-Id: I0259f6a73812692209f490c7e2fce3c2a46d28c6 CRs-Fixed: 774533
| * | | | qcacld-2.0: Fix build errorLiangwei Dong2017-11-12
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Fix build error due to miss the "}". Change-Id: Id8eb8fe92e2faf36d40b97d863698bb15510e790 CRs-Fixed: 2141540
| * | | | Release 4.0.11.211Bsnandini2017-11-10
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Release 4.0.11.211B Change-Id: I55f9f5ec678b6cc13dea8fb60a22b2a2ed7f0a65 CRs-Fixed: 774533
| * | | | qcacld-2.0: Avoid access NULL pointer after checkWill Huang2017-11-10
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | After checking NULL pointer compl_state, host would trigger SSR, and should break out gently to avoid de-reference NULL pointer again. Change-Id: I5aefe3e2d02a6690d96fbfed895196c28e3ad23f CRs-Fixed: 2140768
| * | | | qcacld-2.0: Add 11p channels of 5MHz bandwidthFerry Zhou2017-11-10
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | As 802.11p-2010 spec required, add 11p channels of 5MHz bandwidth. Refer to Table J.1 & J.2 in 802.11p-2010 spec for details. Change-Id: I3291586d60d8944030502e18cb8ff933a9795438 CRs-Fixed: 2101407
| * | | | qcacld-2.0: Route IP datagrams only through 11p SCHFerry Zhou2017-11-10
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | IEEE 1609.4-2016 5.3.4 mandates that IP datagrams can transmit only through 11p Service Channel (SCH) and can't goes through Control Channel (CCH). If SCH not exists, then drop the IP datagram. Change-Id: Ib38c10f55918d67ef3184cec0aa9b829721bd132 CRs-Fixed: 2133889
| * | | | qcacld-2.0: Check for buffer overflow in event handlerAbhinav Kumar2017-11-10
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Check for buffer overflow in wma_log_supported_evt_handler. Change-Id: Ib4850ce1a7abb77025a0dc8a3cc9776f6550eb9e CRs-Fixed: 2125948
| * | | | qcacld-2.0: update MUBeamformee capability from FWhoubao2017-11-10
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | update MUBeamformee capability from FW Change-Id: I871b8e786665abbdad54ba661e0eb7eb8a0f6412 CRs-Fixed: 2129426
| * | | | Release 4.0.11.211Asnandini2017-11-08
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Release 4.0.11.211A Change-Id: Ib3a5c49651ef80d4ddd3e0f23bf1eef26fea0ad2 CRs-Fixed: 774533
| * | | | qcacld-2.0: Add macro UINT32_MAX in wma_ocb.cgaurank kathpalia2017-11-08
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | UINT32_MAX macro is used in comparing no. of channels list coming from firmware and checking that to avoid integer overflow. Change-Id: If9c79b01fd731bfeb3c525ccee8c27425f488955 CRs-Fixed: 2140053
| * | | | qcacld-2.0: Add PCI device id for NaplesSubrat Dash2017-11-08
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Add device id of Naples PCIe board to the device id table. CRs-Fixed: 2139356 Change-Id: I492744665399261a7cd804f485b8ffd4a4cd8715
| * | | | Release 4.0.11.211snandini2017-11-07
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Release 4.0.11.211 Change-Id: I69919c2e84aa8c111a7b874b3cb288b6aa94516d CRs-Fixed: 774533
| * | | | qcacld-2.0: Remove redundant mgmt frame session id assignmentlifeng2017-11-07
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Hit one crash in p2p provision, once remain on channel timeout, it may indicate false p2p action confirmation if pending action frame, however, it still try to send p2p action confirmation depending on tx ack status in datapath. The fix is to remove redundant mgmt frame session id assignment after queuing p2p action frame in datapath. CRs-Fixed: 2111318 Change-Id: Idb1775f5d2b2b4e3825d78dd870c8f7d287f492d
| * | | | Release 4.0.11.210Zsnandini2017-11-07
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Release 4.0.11.210Z Change-Id: Ifcc085bfd65899796d517b6b04c060df6d854958 CRs-Fixed: 774533
| * | | | qcacld-2.0: Check the length of IE's before appendingBala Venkatesh2017-11-07
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Check the length of the IE's before appending them and storing them in the session in lim_process_update_add_ies. Change-Id: I70d26638a58998c82a8810d7c2181d1f24c56e19 CRs-Fixed: 2116592
| * | | | Release 4.0.11.210Ysnandini2017-11-07
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Release 4.0.11.210Y Change-Id: I499bb5e3182bc96613b8c9a83e36292d47c61184 CRs-Fixed: 774533
| * | | | qcacld-2.0: Fix memory leak for SDIO RX path in the HIF layerTiger Yu2017-11-07
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | There is a memory leak if fail to process the rx packet header in the HIF layer. Add sanity checking to free all resources if failure hit. Change-Id: Ifa443dcec0a31ae39356ac1ddf7cfe652d8968ce CRs-Fixed: 2137727
| * | | | Release 4.0.11.210Xsnandini2017-11-06
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Release 4.0.11.210X Change-Id: Ie3e17d7a9ff966a85598111bebea5def3fbde55e CRs-Fixed: 774533
| * | | | qcacld-2.0: Check ie_len against 255 in function get_container_ies_lenVignesh Viswanathan2017-11-06
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | qcacld3.0 to qcacld-2.0 propagation. In function get_container_ies_len, output parameter pnConsumed is uint8_t and poses a risk of integer overflow. Check value against 255 before assigning to output parameter. Change-Id: I6e02037952ced13de45a6c030cc5a1e85070f5cd CRs-Fixed: 2116546
| * | | | Release 4.0.11.210Wsnandini2017-11-06
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Release 4.0.11.210W Change-Id: Idf6d8296f1b86624bb6e25360516809290415463 CRs-Fixed: 774533
| * | | | qcacld-2.0: Collecting FW coredump for ROME/NAPLES PCIeDash Subrat2017-11-06
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Adding support for collecting FW coredump for PCIe based devices. Change-Id: I5ad78fcc3f8cda7da22adac482e1fa049b649649 CRs-Fixed: 2127387
| * | | | Release 4.0.11.210Vsnandini2017-11-06
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Release 4.0.11.210V Change-Id: I09772b101b37894be33656dc81215bf940a0d123 CRs-Fixed: 774533
| * | | | qcacld-2.0: Fix buffer overwrite in wma_unified_debug_print_event_handlerVignesh Viswanathan2017-11-06
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | In function wma_unified_debug_print_event_handler, datalen is received from the FW and is used to mem copy data buffer from FW into the local array dbgbuf. Since dbgbuf is a local array of size 500 bytes, if datalen is greater than 500, buffer overwrite occurs during memcpy. Add sanity check to limit datalen to 500 bytes if value received is greater than 500 bytes. Change-Id: Id63b5106bc7a3d3836d17ae47d019bc8a71c928e CRs-Fixed: 2114208
| * | | | Release 4.0.11.210Usnandini2017-11-05
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Release 4.0.11.210U Change-Id: Ib983755845ab35c5c4cbe2bcf48c4bf82fd6ed4d CRs-Fixed: 774533
| * | | | qcacld-2.0: Fix int overflow in wma_unified_link_peer_stats_event_handlerVignesh Viswanathan2017-11-05
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Currently in wma_unified_link_peer_stats_event_handler, the check to validate if peer_stats->num_rates is less than WMA_SVC_MSG_MAX_SIZE is done only for the first member of the peer_stats array. This can lead to integer overflow as num_rates is calculated as sum of peer_stats->num_rates for each of the peer_stats in the array. Add code changes to loop and calculate total_num_rates for all the peer_stats and then validate total_num_rates with WMA_SVC_MSG_MAX_SIZE. Change-Id: Ic934934a990bd55fce70a0eaffa2812bc34b0ddd CRs-Fixed: 2116684
| * | | | qcacld-2.0: Check for buffer overflow for diag messagesAbhinav Kumar2017-11-05
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Check for buffer overflow from diag messages. Change-Id: I9618a7b581739602efeacefe1844fd4243b55d53 CRs-Fixed: 2125961
| * | | | qcacld-2.0: Fix buffer overwrite in wma_extscan_rsp_handlergaurank kathpalia2017-11-05
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | In function "wma_extscan_start_stop_event_handler", variable "event" is coming from the FW, whose content is copied to variable "buf".Variable "vdev_id" equals to "event->vdev_id". "vdev_id" is a uint8_t value, with no limit check, so a buffer overwrite is possible. Add sanity check for vdev-id to avoid buffer overwrite Change-Id: I4af62b6061d2524a2fc67cf0ddb49d3d310db916 CRs-Fixed: 2115207
| * | | | Release 4.0.11.210Tsnandini2017-11-05
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Release 4.0.11.210T Change-Id: Ia69f362fb3fd358ac3057075b8989e0965cb5f50 CRs-Fixed: 774533
| * | | | qcacld-2.0: Fix Int overflow in wma_radio_chan_stats_event_handlergaurank kathpalia2017-11-05
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Currently, value of fix_param->num_chans is received from FW If the value of variable fix_param->num_chans is very large, then the derived length of data in the event can be overflowed. Add sanity check for fix_param->num_chans to avoid overflow Change-Id: Iac59550b9ecdd6833d0ad262b51e56b6532941c5 CRs-Fixed: 2114396
| * | | | qcacld-2.0: Fix Integer overflow in wma_tbttoffset_update_event_handler()Abhinav Kumar2017-11-05
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Currently, value of param_buf->num_tbttoffset_list is received from FW is used to allocate the memory for local buffer to store tbtt offset list If the value of param_buf->num_tbttoffset_list is very large then during memory allocation input argument can be overflowed.As a result of this integer overflow, a heap overwrite can occur during memory copy. Add sanity check to make sure param_buf->num_tbttoffset_list is not exceed the maximum limit. Change-Id: I23528830ddb0f43c777e6124919cc35fe9a523d5 CRs-Fixed: 2114336
| * | | | Release 4.0.11.210Ssnandini2017-11-05
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Release 4.0.11.210S Change-Id: I7c18cefd84716a90335f53b2192aedc15c820e3b CRs-Fixed: 774533
| * | | | qcacld-2.0: Add sanity check for vdev_id in wma_wow_wakeup_host_eventBala Venkatesh2017-11-05
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Currently wake_info->vdev_id, recevied from the FW, is directly used to refer to wma->interfaces without validating if the vdev_id is valid. Add sanity check to make sure vdev_id is less than max_bssid before using it. Change-Id: I66be7d15f370d0204e25c3d0ea60c0c9f5912005 CRs-Fixed: 2114363
| * | | | Release 4.0.11.210Rsnandini2017-11-05
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Release 4.0.11.210R Change-Id: If38be7f32f9bf1fb44d20fe9e0c1bb3ac2d17fa1 CRs-Fixed: 774533
| * | | | qcacld-2.0: Fix buffer overwrite in wma_sap_ofl_add_sta_handlerAbhinav Kumar2017-11-05
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Currently, sta_add_event->data_len received from FW is used to copy data from buf_ptr to add_sta_req, which is allocated only for fixed size of sap_offload_add_sta_req structure. If data_len received from FW is greater than size of sap_offload_add_sta_req structure, buffer overwrite will occur. Add sanity check to make sure sta_add_event->data_len is not greater than MAX_CONNECT_REQ_LENGTH. Change-Id: Ie9e414c9f39bd01ecdca70fbb7d5438ac2e09fa1 CRs-Fixed: 2115221
| * | | | qcacld-2.0: Add checks for security vulnerabilityAbhinav Kumar2017-11-05
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Add checks to extscan and ocb FW message handlers. Change-Id: I1ff5b1f8722545de4cc4f10d23ff9b914ae3428c CRs-Fixed: 2125950
| * | | | qcacld-2.0: Fix buffer overwrite in wma_pdev_div_info_evt_handler()Abhinav Kumar2017-11-05
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Currently, event->num_chains_valid received from FW is used to check upper bound of chain rssi array which is allocated only for fixed size of chain_rssi_result structure. If event->num_chains_valid received from FW is greater than size of chain_rssi_result structure, buffer overwrite will occur. Add sanity check to make sure event->num_chains_valid is not greater than CHAIN_MAX_NUM. Change-Id: I25296cb122b40bd03fab663ce48104ccab6827a3 CRs-Fixed: 2113385
| * | | | qcacld-2.0: Do proper cleanup in case of sme opensession timed outAnuj Khera2017-11-05
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | When SME Open ssesion is failed due to timed out, the opened session is not closed causing the max interfaces limit to reach and crashing the driver. Call sme_CloseSession in case of failure due to timeout. Change-Id: I9ccb02b10b15aae9a30b27c9d94d1ca03ad104f9 CRs-Fixed: 2122442
| * | | | Release 4.0.11.210Qsnandini2017-11-05
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Release 4.0.11.210Q Change-Id: I5b93d767e6b972ac0fb0cf48979f9208b3db3a4a CRs-Fixed: 774533
| * | | | qcacld-2.0: Check vdev_id against wma->max_bssidBala Venkatesh2017-11-05
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Check vdev_id against wma->max_bssid in wma_mcc_vdev_tx_pause_evt_handler to avoid bufer overflow. Change-Id: Ie47a0ed2f7f27f13a01e1b2cb365fae66b41b1df CRs-Fixed: 2119404
| * | | | qcacld-2.0: Fix the size of array ch_list in sme_set_plm_requestBala Venkatesh2017-11-05
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Currently the size of array ch_list in sme_set_plm_request is defined as WNI_CFG_VALID_CHANNEL_LIST and this is incorrect. This is just an index to the corresponding CFG item. Fix the size to WNI_CFG_VALID_CHANNEL_LIST_LEN which is the maximum size that can be passed from the source buffer. Change-Id: I90086f2c73ee09cfc9d63a327b464f4017f5b37f CRs-Fixed: 2119733
| * | | | qcacld-2.0: Check for valid vdev ID in SWBA event handlerBala Venkatesh2017-11-05
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | After deriving the vdev_id from the vdev map in wma_beacon_swba_handler check for the validity of the vdev_id Change-Id: Ifc4577d8a00f447e2bcfa4e01fce5ac2dbe96a4d CRs-Fixed: 2115134
| * | | | qcacld-2.0: Fix memory leak for RX path of SDIO WLANchenguo2017-11-05
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | There is a memory leak for RX path of SDIO WLAN if skb allocation fails. Add condition check and free all resources for scenario. Change-Id: Ic4a58d3d4e93f1d6d57bfb045dfdeb131b24f72a CRs-Fixed: 2128051
| * | | | Release 4.0.11.210Psnandini2017-11-05
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Release 4.0.11.210P Change-Id: I5c7a84f3f7c82c311a2a17286a859c2ec8ae9e3d CRs-Fixed: 774533
| * | | | qcacld-2.0: Add sanity check to limit mgmt frames data lengaurank kathpalia2017-11-05
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Currently the mpdu_data_len in Rx pkt meta is not checked for upper bound in wma_form_rx_packet. Add sanity check to drop the packet if mpdu_data_len is greater than 2000 bytes. Also add upper bound check for frame_len in lim_process_auth_frame function. Change-Id: I387615127ab98ef43baa6f2570b0433af39a016e CRs-Fixed: 2133040
| * | | | Release 4.0.11.210Osnandini2017-11-02
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Release 4.0.11.210O Change-Id: Ib7e088a25d5fe3cb550e29fee5d85cc54cf02fdc CRs-Fixed: 774533
| * | | | qcacld-2.0: Remove FW memory dump featureHanumanth Reddy Pothula2017-11-02
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | FW memory dump feature is no longer used. Hence remove FW memory dump feature code changes. Change-Id: Ida655f83630c369df746e7c0c9d61a8fee2932a2 CRs-Fixed: 2120605
| * | | | qcacld-2.0: Fix to propagate key-receiver-sequence-counter to WMAJingxiang Ge2017-11-02
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | propagation from qcacld-3.0 to qcacld-2.0 SME module propagates KeyRSC to MAC/PE module but MAC/PE doesn't pass this counter to WMA and due to which WMA is not able pass to next module. Add a fix to propagate KeyRSC field from MAC to WMA module and further down in stack. Change-Id: I157a44610e184b5e10d838fbc5d6b810e3efd6db CRs-Fixed: 2133114
| * | | | qcacld-2.0: Propagate key sequence counter to SMEJingxiang Ge2017-11-02
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | propagation from qcacld-3.0 to qcacld-2.0 Currently the key sequence counter received from userspace is not propagated to SME, so add logic to propagate it. Change-Id: I5371700003744eb967c578c44e4d130628efcdc8 CRs-Fixed: 2133033
| * | | | qcacld-2.0: Check for the max number of P2P NOA descriptorsAbhinav Kumar2017-10-31
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Check for the maximum number of P2P NOA descriptors in wma_send_bcn_buf_ll. Change-Id: If7e5b3c53309412dc7d3cd748c2f5581898fbbfe CRs-Fixed: 2135600