linux/drivers/net/wireless
Pravas Kumar Panda fe0ebb5160 ath11k: Adding proper validation before accessing tx_stats
Before dumping tx_stats proper validation was not been taken care of.
Due to which we were encountering null pointer dereference(kernel panic).
This scenario will arise when a station is getting disconnected and
we are changing the STA state by ath11k_mac_op_sta_state and assigning
tx_stats as NULL and after this the mac80211 will destroy the
debugfs entry from where we are trying to read the stats.

If anyone tries to dump tx_stats for that STA in between setting
tx_stats to NULL and debugfs file removal without checking the NULL
value it will run into a NULL pointer exception.

Proceeding with the analysis of "ARM Kernel Panic".
The APSS crash happened due to OOPS on CPU 3.
Crash Signature : Unable to handle kernel NULL pointer dereference at
virtual address 00000360
During the crash,
PC points to "ath11k_debug_htt_stats_init+0x16ac/0x1acc [ath11k]"
LR points to "ath11k_debug_htt_stats_init+0x1688/0x1acc [ath11k]".
The Backtrace obtained is as follows:
[<ffffffbffcfd8590>] ath11k_debug_htt_stats_init+0x16ac/0x1acc [ath11k]
[<ffffffc000156320>] do_loop_readv_writev+0x60/0xa4
[<ffffffc000156a5c>] do_readv_writev+0xd8/0x19c
[<ffffffc000156b54>] vfs_readv+0x34/0x48
[<ffffffc00017d6f4>] default_file_splice_read+0x1a8/0x2e4
[<ffffffc00017c56c>] do_splice_to+0x78/0x98
[<ffffffc00017c63c>] splice_direct_to_actor+0xb0/0x1a4
[<ffffffc00017c7b4>] do_splice_direct+0x84/0xa8
[<ffffffc000156f40>] do_sendfile+0x160/0x2a4
[<ffffffc000157980>] SyS_sendfile64+0xb4/0xc8

Signed-off-by: Pravas Kumar Panda <kumarpan@codeaurora.org>
Signed-off-by: Kalle Valo <kvalo@codeaurora.org>
2020-03-18 13:52:42 +02:00
..
admtek
ath ath11k: Adding proper validation before accessing tx_stats 2020-03-18 13:52:42 +02:00
atmel at76c50x-usb: fix endpoint debug message 2019-12-18 21:06:02 +02:00
broadcom b43legacy: Use scnprintf() for avoiding potential buffer overflow 2020-03-12 15:43:39 +02:00
cisco proc: convert everything to "struct proc_ops" 2020-02-04 03:05:26 +00:00
intel ipw2x00: Use scnprintf() for avoiding potential buffer overflow 2020-03-12 15:43:40 +02:00
intersil prism54: Use scnprintf() for avoiding potential buffer overflow 2020-03-12 15:43:41 +02:00
marvell libertas: Use new structure for SPI transfer delays 2020-03-12 15:42:39 +02:00
mediatek mt76: Introduce mt76_mcu data structure 2020-02-14 10:17:46 +01:00
quantenna qtnfmac: add interface combination check for repeater mode 2020-03-12 15:38:59 +02:00
ralink rt2x00usb: Fix a warning message in 'rt2x00usb_watchdog_tx_dma()' 2019-12-18 20:58:48 +02:00
realtek rtw88: remove unused member of struct rtw_hal 2020-03-12 15:39:41 +02:00
rsi rsi: fix null pointer dereference during rsi_shutdown() 2020-02-12 18:19:14 +02:00
st cw1200: use true,false for bool variable 2020-01-26 17:40:43 +02:00
ti wl1251: remove ti,power-gpio for SDIO mode 2020-02-12 18:15:53 +02:00
zydas wireless-drivers-next patches for v5.6 2019-12-20 21:55:00 -08:00
Kconfig
mac80211_hwsim.c mac80211_hwsim: enable Beacon protection 2020-02-24 10:40:00 +01:00
mac80211_hwsim.h
Makefile
ray_cs.c proc: convert everything to "struct proc_ops" 2020-02-04 03:05:26 +00:00
ray_cs.h
rayctl.h
rndis_wlan.c
virt_wifi.c
wl3501.h
wl3501_cs.c