<feed xmlns='http://www.w3.org/2005/Atom'>
<title>user/sven/linux.git/net/mac80211, branch v3.8</title>
<subtitle>Linux Kernel
</subtitle>
<id>https://git.stealer.net/cgit.cgi/user/sven/linux.git/atom?h=v3.8</id>
<link rel='self' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/atom?h=v3.8'/>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/'/>
<updated>2013-02-11T10:12:26Z</updated>
<entry>
<title>mac80211: fix channel selection bug</title>
<updated>2013-02-11T10:12:26Z</updated>
<author>
<name>Johannes Berg</name>
<email>johannes.berg@intel.com</email>
</author>
<published>2013-02-09T20:46:34Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=3d9646d0abd02c552f6f15c302b31aa321c2fa8b'/>
<id>urn:sha1:3d9646d0abd02c552f6f15c302b31aa321c2fa8b</id>
<content type='text'>
When trying to connect to an AP that advertises HT but not
VHT, the mac80211 code erroneously uses the configuration
from the AP as is instead of checking it against regulatory
and local capabilities. This can lead to using an invalid
or even inexistent channel (like 11/HT40+).

Additionally, the return flags from downgrading must be
ORed together, to collect them from all of the downgrades.
Also clarify the message.

Signed-off-by: Johannes Berg &lt;johannes.berg@intel.com&gt;
</content>
</entry>
<entry>
<title>mac80211: fix managed mode channel context use</title>
<updated>2013-02-07T19:56:01Z</updated>
<author>
<name>Johannes Berg</name>
<email>johannes.berg@intel.com</email>
</author>
<published>2013-02-07T19:54:51Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=d601cd8d950c85032cefdcda162b8cd2cda363bb'/>
<id>urn:sha1:d601cd8d950c85032cefdcda162b8cd2cda363bb</id>
<content type='text'>
My commit f2d9d270c15ae0139b54a7e7466d738327e97e03
("mac80211: support VHT association") introduced a
very stupid bug: the loop to downgrade the channel
width never attempted to actually use it again so
it would downgrade all the way to 20_NOHT. Fix it.

Signed-off-by: Johannes Berg &lt;johannes.berg@intel.com&gt;
</content>
</entry>
<entry>
<title>mac80211: fix error in sizeof() usage</title>
<updated>2013-02-06T16:31:55Z</updated>
<author>
<name>Cong Ding</name>
<email>dinggnu@gmail.com</email>
</author>
<published>2013-02-06T16:23:45Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=9887dbf5b2163bcf69cd4456c21352e9a81c6003'/>
<id>urn:sha1:9887dbf5b2163bcf69cd4456c21352e9a81c6003</id>
<content type='text'>
Using 'sizeof' on array given as function argument returns
size of a pointer rather than the size of array.

Cc: stable@vger.kernel.org
Signed-off-by: Cong Ding &lt;dinggnu@gmail.com&gt;
Signed-off-by: Johannes Berg &lt;johannes.berg@intel.com&gt;
</content>
</entry>
<entry>
<title>mac80211: add encrypt headroom to PERR frames</title>
<updated>2013-01-16T22:24:51Z</updated>
<author>
<name>Bob Copeland</name>
<email>me@bobcopeland.com</email>
</author>
<published>2013-01-09T17:34:56Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=8680451f38a64bd270233b3c0eeb7c45f2b5efe3'/>
<id>urn:sha1:8680451f38a64bd270233b3c0eeb7c45f2b5efe3</id>
<content type='text'>
Mesh PERR action frames are robust and thus may be encrypted, so add
proper head/tailroom to allow this.  Fixes this warning when operating
a Mesh STA on ath5k:

WARNING: at net/mac80211/wpa.c:427 ccmp_encrypt_skb.isra.5+0x7b/0x1a0 [mac80211]()
Call Trace:
 [&lt;c011c5e7&gt;] warn_slowpath_common+0x63/0x78
 [&lt;c011c60b&gt;] warn_slowpath_null+0xf/0x13
 [&lt;e090621d&gt;] ccmp_encrypt_skb.isra.5+0x7b/0x1a0 [mac80211]
 [&lt;e090685c&gt;] ieee80211_crypto_ccmp_encrypt+0x1f/0x37 [mac80211]
 [&lt;e0917113&gt;] invoke_tx_handlers+0xcad/0x10bd [mac80211]
 [&lt;e0917665&gt;] ieee80211_tx+0x87/0xb3 [mac80211]
 [&lt;e0918932&gt;] ieee80211_tx_pending+0xcc/0x170 [mac80211]
 [&lt;c0121c43&gt;] tasklet_action+0x3e/0x65

Signed-off-by: Bob Copeland &lt;me@bobcopeland.com&gt;
Signed-off-by: Johannes Berg &lt;johannes.berg@intel.com&gt;
</content>
</entry>
<entry>
<title>mac80211: set NEED_TXPROCESSING for PERR frames</title>
<updated>2013-01-16T22:22:21Z</updated>
<author>
<name>Bob Copeland</name>
<email>me@bobcopeland.com</email>
</author>
<published>2013-01-09T17:34:55Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=9cbbffe2ded494429b0d005a51a88242bd9b3095'/>
<id>urn:sha1:9cbbffe2ded494429b0d005a51a88242bd9b3095</id>
<content type='text'>
A user reported warnings in ath5k due to transmitting frames with no
rates set up.  The frames were Mesh PERR frames, and some debugging
showed an empty control block with just the vif pointer:

&gt;  [  562.522682] XXX txinfo: 00000000: 00 00 00 00 00 00 00 00 00 00 00
&gt;  00 00 00 00 00  ................
&gt;  [  562.522688] XXX txinfo: 00000010: 00 00 00 00 00 00 00 00 54 b8 f2
&gt;  db 00 00 00 00  ........T.......
&gt;  [  562.522693] XXX txinfo: 00000020: 00 00 00 00 00 00 00 00 00 00 00
&gt;  00 00 00 00 00  ................

Set the IEEE80211_TX_INTFL_NEED_TXPROCESSING flag to ensure that
rate control gets run before the frame is sent.

Signed-off-by: Bob Copeland &lt;me@bobcopeland.com&gt;
Signed-off-by: Johannes Berg &lt;johannes.berg@intel.com&gt;
</content>
</entry>
<entry>
<title>mac80211: fix monitor mode injection</title>
<updated>2013-01-16T14:09:31Z</updated>
<author>
<name>Felix Fietkau</name>
<email>nbd@openwrt.org</email>
</author>
<published>2013-01-13T22:10:26Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=b4a7ff75ba3545b061d4fe63f0bb9136ccfe8b19'/>
<id>urn:sha1:b4a7ff75ba3545b061d4fe63f0bb9136ccfe8b19</id>
<content type='text'>
Channel contexts are not always used with monitor interfaces. If no channel
context is set, use the oper channel, otherwise tx fails.

Signed-off-by: Felix Fietkau &lt;nbd@openwrt.org&gt;
[check local-&gt;use_chanctx]
Signed-off-by: Johannes Berg &lt;johannes.berg@intel.com&gt;
</content>
</entry>
<entry>
<title>mac80211: synchronize scan off/on-channel and PS states</title>
<updated>2013-01-16T14:06:18Z</updated>
<author>
<name>Stanislaw Gruszka</name>
<email>sgruszka@redhat.com</email>
</author>
<published>2012-12-20T13:41:18Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=aacde9ee45225f7e0b90960f479aef83c66bfdc0'/>
<id>urn:sha1:aacde9ee45225f7e0b90960f479aef83c66bfdc0</id>
<content type='text'>
Since:

commit b23b025fe246f3acc2988eb6d400df34c27cb8ae
Author: Ben Greear &lt;greearb@candelatech.com&gt;
Date:   Fri Feb 4 11:54:17 2011 -0800

    mac80211: Optimize scans on current operating channel.

we do not disable PS while going back to operational channel (on
ieee80211_scan_state_suspend) and deffer that until scan finish.
But since we are allowed to send frames, we can send a frame to AP
without PM bit set, so disable PS on AP side. Then when we switch
to off-channel (in ieee80211_scan_state_resume) we do not enable PS.
Hence we are off-channel with PS disabled, frames are not buffered
by AP.

To fix remove offchannel_ps_disable argument and always enable PS when
going off-channel and disable it when going on-channel, like it was
before.

Cc: stable@vger.kernel.org # 2.6.39+
Signed-off-by: Stanislaw Gruszka &lt;sgruszka@redhat.com&gt;
Tested-by: Seth Forshee &lt;seth.forshee@canonical.com&gt;
Signed-off-by: Johannes Berg &lt;johannes.berg@intel.com&gt;
</content>
</entry>
<entry>
<title>mac80211: fix FT roaming</title>
<updated>2013-01-16T14:03:37Z</updated>
<author>
<name>Johannes Berg</name>
<email>johannes.berg@intel.com</email>
</author>
<published>2013-01-11T13:34:25Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=1626e0fa740dec8665a973cf2349405cdfeb46dc'/>
<id>urn:sha1:1626e0fa740dec8665a973cf2349405cdfeb46dc</id>
<content type='text'>
During FT roaming, wpa_supplicant attempts to set the
key before association. This used to be rejected, but
as a side effect of my commit 66e67e418908442389d3a9e
("mac80211: redesign auth/assoc") the key was accepted
causing hardware crypto to not be used for it as the
station isn't added to the driver yet.

It would be possible to accept the key and then add it
to the driver when the station has been added. However,
this may run into issues with drivers using the state-
based station adding if they accept the key only after
association like it used to be.

For now, revert to the behaviour from before the auth
and assoc change.

Cc: stable@vger.kernel.org
Reported-by: Cédric Debarge &lt;cedric.debarge@acksys.fr&gt;
Tested-by: Cédric Debarge &lt;cedric.debarge@acksys.fr&gt;
Signed-off-by: Johannes Berg &lt;johannes.berg@intel.com&gt;
</content>
</entry>
<entry>
<title>mac80211: fix maximum MTU</title>
<updated>2013-01-03T12:00:01Z</updated>
<author>
<name>Chaitanya</name>
<email>chaitanyatk@posedge.com</email>
</author>
<published>2012-12-21T11:45:17Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=09b1426e7fcec510aba55a761da5004e47a11ce3'/>
<id>urn:sha1:09b1426e7fcec510aba55a761da5004e47a11ce3</id>
<content type='text'>
The maximum MTU shouldn't take the headers into account,
the maximum MSDU size is exactly the maximum MTU.

Signed-off-by: T Krishna Chaitanya &lt;chaitanyatk@posedge.com&gt;
Signed-off-by: Johannes Berg &lt;johannes.berg@intel.com&gt;
</content>
</entry>
<entry>
<title>mac80211: fix dtim_period in hidden SSID AP association</title>
<updated>2013-01-03T12:00:00Z</updated>
<author>
<name>Johannes Berg</name>
<email>johannes.berg@intel.com</email>
</author>
<published>2012-12-10T14:38:14Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=826262c3d23743cb032a9e1a65a0f9be75091a5e'/>
<id>urn:sha1:826262c3d23743cb032a9e1a65a0f9be75091a5e</id>
<content type='text'>
When AP's SSID is hidden the BSS can appear several times in
cfg80211's BSS list: once with a zero-length SSID that comes
from the beacon, and once for each SSID from probe reponses.

Since the mac80211 stores its data in ieee80211_bss which
is embedded into cfg80211_bss, mac80211's data will be
duplicated too.

This becomes a problem when a driver needs the dtim_period
since this data exists only in the beacon's instance in
cfg80211 bss table which isn't the instance that is used
when associating.

Remove the DTIM period from the BSS table and track it
explicitly to avoid this problem.

Cc: stable@vger.kernel.org
Tested-by: Efi Tubul &lt;efi.tubul@intel.com&gt;
Signed-off-by: Emmanuel Grumbach &lt;emmanuel.grumbach@intel.com&gt;
Signed-off-by: Johannes Berg &lt;johannes.berg@intel.com&gt;
</content>
</entry>
</feed>
