Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp259131ybp; Thu, 3 Oct 2019 13:09:44 -0700 (PDT) X-Google-Smtp-Source: APXvYqzogNLdXzyGi9PN1RurF4wisxcGVAptWeaFQxSqVI4Ij0lUgMxHyPbnzDrPJYGlve1bgnlC X-Received: by 2002:a17:906:409b:: with SMTP id u27mr9333248ejj.295.1570133384519; Thu, 03 Oct 2019 13:09:44 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570133384; cv=none; d=google.com; s=arc-20160816; b=a5sAdCCKz0Jf4kIfo5TRMXaUVwTBQ1e0keOXgAvZju7blkhB2dtmzhfISWYgYAoi3Q 1IKB2Y/95Zd3hFVHGAiAEmb99X24lkvzS2L6m3QF0G2SMjvrcrCuuNyTllAFDSyYbFKF ZOFDyCzYYqN0hgPZ9g6AHOfHE2WI8smaHpnXzj5GoEUQsat0rvRImDX/HFqTv8t9QumB I4BvngHoXcRuBuEBTWulPr4ffregGGQRjcgy7Hj3bhiP8nQHlkATXX4MY7q+TerVI70Z TaK1mEY6SssHtAeHBtv5koXOUnOS2CPNEDSnh/yiYS4X4v6mA9Opc2dpAQtaHrlpjihs lzsA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=H1uOlVkR35CR+c0isJ6+A1+cWE6sKMAVDUgh7ba97p4=; b=HTy1/bW0p+qm/EA2LClRq61ACcaU7QyryQGRTcsp7y05PZoe4ENYqVLuoZhOGoo5wF LCP8befLUdM+GiBrUbtYXLBX+P4X3pumsV/G1d1qP2Zc861dZCNGaoNdH0B0JCvYreOZ SV9VTRaKj9GBrUhTaIBbitijpPnGO/T1kXuQvbAGjKqcUY5skK6LYL2CLL8GTfyD3LfY DKld8MtT0khta5HUzyu6oSYtsJF6mUM2wgzPJxAVtCb4CjQ2OT2RaoH1IwHEXE8M+u2V ySaa84iqqilR5BJsfs7nEyoGa7H5XALaVBzrE3W1y1XHNcPLrJiVf66CcU/uPTjC6AVD H5ag== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-wireless-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z33si2410158edz.314.2019.10.03.13.09.07; Thu, 03 Oct 2019 13:09:44 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-wireless-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-wireless-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732416AbfJCUIZ (ORCPT + 99 others); Thu, 3 Oct 2019 16:08:25 -0400 Received: from mx1.redhat.com ([209.132.183.28]:48030 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729586AbfJCUIZ (ORCPT ); Thu, 3 Oct 2019 16:08:25 -0400 Received: from smtp.corp.redhat.com (int-mx08.intmail.prod.int.phx2.redhat.com [10.5.11.23]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 3BC3C30BBE87; Thu, 3 Oct 2019 20:08:25 +0000 (UTC) Received: from shalem.localdomain.com (ovpn-116-108.ams2.redhat.com [10.36.116.108]) by smtp.corp.redhat.com (Postfix) with ESMTP id 67FD319C69; Thu, 3 Oct 2019 20:08:23 +0000 (UTC) From: Hans de Goede To: Arend van Spriel , Franky Lin , Hante Meuleman , Kalle Valo , Chi-Hsien Lin , Wright Feng Cc: Hans de Goede , linux-wireless@vger.kernel.org, brcm80211-dev-list.pdl@broadcom.com Subject: [PATCH 5.4 regression fix] brcmfmac: Fix brcmf_cfg80211_get_channel returning uninitialized fields Date: Thu, 3 Oct 2019 22:08:21 +0200 Message-Id: <20191003200821.819594-1-hdegoede@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 2.84 on 10.5.11.23 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.49]); Thu, 03 Oct 2019 20:08:25 +0000 (UTC) Sender: linux-wireless-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org With the new edmg support struct cfg80211_chan_def has been extended with a number of new members. brcmf_cfg80211_get_channel() was not setting (clearing) these causing the cfg80211_edmg_chandef_valid() check in cfg80211_chandef_valid() to fail. Triggering a WARN_ON and, worse, causing brcmfmac based wifi cards to not work. This commit fixes this by clearing the entire passed struct to 0 before setting the members used by the brcmfmac code. This solution also makes sure that this problem will not repeat itself in the future if further members are added to the struct. Signed-off-by: Hans de Goede --- drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c b/drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c index e3ebb7abbdae..480c05f66ebd 100644 --- a/drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c +++ b/drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c @@ -5041,10 +5041,10 @@ static int brcmf_cfg80211_get_channel(struct wiphy *wiphy, } freq = ieee80211_channel_to_frequency(ch.control_ch_num, band); + memset(chandef, 0, sizeof(*chandef)); chandef->chan = ieee80211_get_channel(wiphy, freq); chandef->width = width; chandef->center_freq1 = ieee80211_channel_to_frequency(ch.chnum, band); - chandef->center_freq2 = 0; return 0; } -- 2.23.0