diff options
author | Brian Norris <briannorris@chromium.org> | 2019-07-26 15:47:58 -0700 |
---|---|---|
committer | Johannes Berg <johannes.berg@intel.com> | 2019-07-29 16:19:44 +0200 |
commit | 05aaa5c97dce4c10a9e7eae2f1569a684e0c5ced (patch) | |
tree | 7428cd9f8d5d1f7d6df83e358c5acce6fe371f13 /net/mac80211/agg-tx.c | |
parent | e6f4051123fd33901e9655a675b22aefcdc5d277 (diff) | |
download | blackbird-op-linux-05aaa5c97dce4c10a9e7eae2f1569a684e0c5ced.tar.gz blackbird-op-linux-05aaa5c97dce4c10a9e7eae2f1569a684e0c5ced.zip |
mac80211: don't WARN on short WMM parameters from AP
In a very similar spirit to commit c470bdc1aaf3 ("mac80211: don't WARN
on bad WMM parameters from buggy APs"), an AP may not transmit a
fully-formed WMM IE. For example, it may miss or repeat an Access
Category. The above loop won't catch that and will instead leave one of
the four ACs zeroed out. This triggers the following warning in
drv_conf_tx()
wlan0: invalid CW_min/CW_max: 0/0
and it may leave one of the hardware queues unconfigured. If we detect
such a case, let's just print a warning and fall back to the defaults.
Tested with a hacked version of hostapd, intentionally corrupting the
IEs in hostapd_eid_wmm().
Cc: stable@vger.kernel.org
Signed-off-by: Brian Norris <briannorris@chromium.org>
Link: https://lore.kernel.org/r/20190726224758.210953-1-briannorris@chromium.org
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
Diffstat (limited to 'net/mac80211/agg-tx.c')
0 files changed, 0 insertions, 0 deletions