From patchwork Tue Oct 31 15:19:24 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Kalle Valo X-Patchwork-Id: 832545 X-Patchwork-Delegate: davem@davemloft.net Return-Path: X-Original-To: patchwork-incoming@ozlabs.org Delivered-To: patchwork-incoming@ozlabs.org Authentication-Results: ozlabs.org; spf=none (mailfrom) smtp.mailfrom=vger.kernel.org (client-ip=209.132.180.67; helo=vger.kernel.org; envelope-from=netdev-owner@vger.kernel.org; receiver=) Authentication-Results: ozlabs.org; dkim=pass (1024-bit key; unprotected) header.d=codeaurora.org header.i=@codeaurora.org header.b="VclkUyXs"; dkim=pass (1024-bit key) header.d=codeaurora.org header.i=@codeaurora.org header.b="VclkUyXs"; dkim-atps=neutral Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by ozlabs.org (Postfix) with ESMTP id 3yRFQ70X9Qz9sPs for ; Wed, 1 Nov 2017 02:19:43 +1100 (AEDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753474AbdJaPTb (ORCPT ); Tue, 31 Oct 2017 11:19:31 -0400 Received: from smtp.codeaurora.org ([198.145.29.96]:59802 "EHLO smtp.codeaurora.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753332AbdJaPTa (ORCPT ); Tue, 31 Oct 2017 11:19:30 -0400 Received: by smtp.codeaurora.org (Postfix, from userid 1000) id 937B26070B; Tue, 31 Oct 2017 15:19:29 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=codeaurora.org; s=default; t=1509463169; bh=TXTImZfek1+aHYWLg1WJV2kdr6An2dmGNCHQ+JaZHhU=; h=From:To:Cc:Subject:Date:From; b=VclkUyXsTqNuGzO99QTZhFFyzukuzLnsLdEvQrD8ukedw5zFMDcxKlGsE+IOOgA1D 0zpFZnKRfI0m1d1G7bhZFydcBEcOqLuxpMrtV7g9hjHattEA/k1dg36y8qnuoe+88V rAK8Azk0HkeLwRS42GOgPUSTSYa46TJd8PuP/ZZA= X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on pdx-caf-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.8 required=2.0 tests=ALL_TRUSTED,BAYES_00, DKIM_SIGNED, T_DKIM_INVALID autolearn=no autolearn_force=no version=3.4.0 Received: from potku.adurom.net (a88-114-240-52.elisa-laajakaista.fi [88.114.240.52]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) (Authenticated sender: kvalo@smtp.codeaurora.org) by smtp.codeaurora.org (Postfix) with ESMTPSA id D3597602BC; Tue, 31 Oct 2017 15:19:27 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=codeaurora.org; s=default; t=1509463169; bh=TXTImZfek1+aHYWLg1WJV2kdr6An2dmGNCHQ+JaZHhU=; h=From:To:Cc:Subject:Date:From; b=VclkUyXsTqNuGzO99QTZhFFyzukuzLnsLdEvQrD8ukedw5zFMDcxKlGsE+IOOgA1D 0zpFZnKRfI0m1d1G7bhZFydcBEcOqLuxpMrtV7g9hjHattEA/k1dg36y8qnuoe+88V rAK8Azk0HkeLwRS42GOgPUSTSYa46TJd8PuP/ZZA= DMARC-Filter: OpenDMARC Filter v1.3.2 smtp.codeaurora.org D3597602BC Authentication-Results: pdx-caf-mail.web.codeaurora.org; dmarc=none (p=none dis=none) header.from=codeaurora.org Authentication-Results: pdx-caf-mail.web.codeaurora.org; spf=none smtp.mailfrom=kvalo@codeaurora.org From: Kalle Valo To: David Miller Cc: linux-wireless@vger.kernel.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org Subject: pull-request: wireless-drivers 2017-10-31 Date: Tue, 31 Oct 2017 17:19:24 +0200 Message-ID: <871slj1h1f.fsf@kamboji.qca.qualcomm.com> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/24.5 (gnu/linux) MIME-Version: 1.0 Sender: netdev-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org Hi Dave, here's a pull request to net tree for 4.14. Due to the ath10k security issue I would like to get this to 4.14 still. Please let me know if there are any problems. Kalle The following changes since commit a6127b4440d1f74f26b64006b2f50c9dc6d66efc: Merge tag 'iwlwifi-for-kalle-2017-10-06' of git://git.kernel.org/pub/scm/linux/kernel/git/iwlwifi/iwlwifi-fixes (2017-10-09 17:31:39 +0300) are available in the git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/kvalo/wireless-drivers.git tags/wireless-drivers-for-davem-2017-10-31 for you to fetch changes up to c29f56b9f425c63daa3f3163ee16493b1c67618b: Merge ath-current from ath.git (2017-10-31 16:26:48 +0200) ---------------------------------------------------------------- wireless-drivers fixes for 4.14 The most important here is the security vulnerabitility fix for ath10k. ath10k * fix security vulnerability with missing PN check on certain hardware * revert ath10k napi fix as it caused regressions on QCA6174 wcn36xx * remove unnecessary rcu_read_unlock() from error path ---------------------------------------------------------------- Jia-Ju Bai (1): wcn36xx: Remove unnecessary rcu_read_unlock in wcn36xx_bss_info_changed Kalle Valo (2): Revert "ath10k: fix napi_poll budget overflow" Merge ath-current from ath.git Vasanthakumar Thiagarajan (1): ath10k: rebuild crypto header in rx data frames drivers/net/wireless/ath/ath10k/htt_rx.c | 122 +++++++++++++++++++++++------- drivers/net/wireless/ath/ath10k/rx_desc.h | 3 + drivers/net/wireless/ath/wcn36xx/main.c | 1 - 3 files changed, 98 insertions(+), 28 deletions(-)