Commit Graph

9269 Commits

Author SHA1 Message Date
Jeff Johnson
38c1c7df49 qcacld-3.0: Fix typo "fuction"
Replace typo "fuction" with correct spelling "function".

Change-Id: Ie34a95eddeaa4f8410dea87fb226e16d2ab96a6a
CRs-Fixed: 2238297
2018-05-12 04:28:59 -07:00
Jeff Johnson
60ed45a086 qcacld-3.0: Fix typo "paramters"
Replace typo "paramters" with correct spelling "parameters".

Change-Id: I13d41a0092666bc89743b9beb03e0253e6b613fc
CRs-Fixed: 2238297
2018-05-12 04:28:56 -07:00
Jeff Johnson
fa7d9601ef qcacld-3.0: Fix typo "seperate"
Replace typo "seperate" with correct spelling "separate".

Change-Id: Ic2e69d5a15366c0c2fe57d2f378cac0e11228f8e
CRs-Fixed: 2238297
2018-05-12 04:28:53 -07:00
Jeff Johnson
dd2f1fc72e qcacld-3.0: Fix typo "adapater"
Replace typo "adapater" with correct spelling "adapter".

Change-Id: Ifde6c8e45d6e7e5d644982273928b84b067b0792
CRs-Fixed: 2238297
2018-05-12 04:28:49 -07:00
Jeff Johnson
9020f0c390 qcacld-3.0: Fix typo "mangement"
Replace typo "mangement" with the correct spelling "management".

Change-Id: Ie9c993096ec9bc774a59caee0f3730b7be2b1372
CRs-Fixed: 2238297
2018-05-12 04:28:46 -07:00
nshrivas
164093fd46 Release 5.2.0.77J
Release 5.2.0.77J

Change-Id: I04499273530a8ef1bd7d70b95cb60ee5cea72326
CRs-Fixed: 774533
2018-05-12 01:25:40 -07:00
Dustin Brown
237baeebc1 qcacld-3.0: Return success in wlan_hdd_cfg80211_register_frames
Currently wlan_hdd_cfg80211_register_frames falls through to error
handling at the end of the success path. Return success instead.

Change-Id: I28eda918d3d5858cc42ef3958abe918b9ed788e9
CRs-Fixed: 2240003
2018-05-12 01:25:39 -07:00
Alok Kumar
19707a8b2f qcacld-3.0: Fix null pointer dereference in htt_t2h_lp_msg_handler
Apparently netbufs_ring is initialized only when reordering is not fully
offloaded. When a message of type HTT_T2H_MSG_TYPE_RX_OFFLOAD_DELIVER_IND
is sent, the driver does not check if reordering is offloaded.

Add a check, if reordering is offloaded, when a message of type
HTT_T2H_MSG_TYPE_RX_OFFLOAD_DELIVER_IND is sent.

Change-Id: I303b52182d97aa8185c23ccd99c37a97fb75a3d2
CRs-Fixed: 2213216
2018-05-12 01:25:35 -07:00
nshrivas
569a6e10f9 Release 5.2.0.77I
Release 5.2.0.77I

Change-Id: I79e7df034560521f325cafb7df4ae0d0df163d01
CRs-Fixed: 774533
2018-05-11 23:56:56 -07:00
gaurank kathpalia
f29064edac qcacld-3.0: Remove cds_pkt_free in assoc request api
In the API lim_send_assoc_req_mgmt_frame, the host
allocates memory for the assoc request packet
taking all inputs of payload and the mac header
size etc, and in case the mem allocation fails
it clears away the memory allocated to the packet
with cds packet free, which was not even allocated

Fix is to remove the packet free in case of memory not
allocated

Change-Id: I3fb75b1947dfe039605c42aa19c2d0bacc7bf55d
CRs-Fixed: 2216741
2018-05-11 23:56:55 -07:00
Himanshu Agarwal
5597208ded qcacld-3.0: Stop opportunistic timer while starting new SAP
If DBS opportunistic timer is still running while starting new SAP on
some DFS channel when STA is already present on some 2.4Ghz channel,
wrong hw mode will be set when timer expires as concurrency will only
be updated when VDEV_UP happens which will happen after at least 60
seconds in case of DFS channel. So, while starting SAP, hw mode was set
to DBS mode but on DBS opportunistic timer expiration, as VDEV_UP doesn't
happen yet, concurrency has not been updated till now causing hw mode to
reset to SINGLE_MAC resulting in DFS MCC which is not allowed.

Stop DBS opportunistic timer if running while starting new SAP to avoid
hw mode reset.

Change-Id: I9cef0ab5f6208e1822aff4a68c442d61a3f8a20e
CRs-Fixed: 2222386
2018-05-11 23:56:51 -07:00
nshrivas
ebde99fe87 Release 5.2.0.77H
Release 5.2.0.77H

Change-Id: I1cd5bee4907c75509d55e38612573357005ae203
CRs-Fixed: 774533
2018-05-11 22:40:02 -07:00
Sourav Mohapatra
cf632579b1 qcacld-3.0: Use new API for fetching wmi_handle
Use get_wmi_unified_hdl_from_psoc instead of GET_WMI_HDL_FROM_PSOC due
to incompatible return types.

Solve renaming dependencies with common side changes.

Change-Id: Ie84641327d64876877c7d26b63d632c79770a88c
CRs-Fixed: 2203055
2018-05-11 22:40:02 -07:00
Ryan Hsu
0e878fa952 qcacld-3.0: sanity check the cds_cfg before accessing
cds_get_ini_config() might return NULL for cds_cfg, add sanity check
before accessing it.

Change-Id: I0b9c13a75fb33931d0a098a69572b6cae2ac8621
CRs-fixed: 2232370
2018-05-11 22:39:59 -07:00
nshrivas
1c5582ed1e Release 5.2.0.77G
Release 5.2.0.77G

Change-Id: I7d458eae6a676dc0271b250392a4216d452f6eff
CRs-Fixed: 774533
2018-05-11 21:12:32 -07:00
Pragaspathi Thilagaraj
06219bfc33 qcacld-3.0: Fix integer truncation in convert_wsc_opaque
In the function convert_wsc_opaque, driver does copy of the
new parameters present in the additional IEs of the upstream
assoc request frame. While copy of the IE length pOld->length to
curAddIELen, possible integer truncation could occur, as the
curAddIELen is of the type uint8_t whereas pOld->length is of
type uint16_t.

Change the data type of curAddIELen to uint16_t. Make changes in
convert_p2p_opaque and convert_wfd_opaque as well.

Change-Id: Ic26660fca4a02a265bfc9553b066c7ee42f1d1f4
CRs-Fixed: 2231770
2018-05-11 21:12:31 -07:00
Ryan Hsu
da74332d4b qcacld-3.0: rearrange to avoid use-after-free of the skb
The skb buffer is freed after the ealier sanity and then pass along
to connectivity stats tracking. Rearragne the stats tracking into the
scope of the skb sanity to assure the skb poitner is valid before
accessing it and set to NULL after free to make sure it is cleared.

Change-Id: I08106bced48fa8f23955fd261c679a5362ddd7a6
CRs-fixed: 2232362
2018-05-11 21:12:28 -07:00
nshrivas
a4bda4fdd8 Release 5.2.0.77F
Release 5.2.0.77F

Change-Id: Ib0e644bdb10e49d906dd15f4a35c1754d9072846
CRs-Fixed: 774533
2018-05-11 16:17:59 -07:00
Arif Hussain
fe3de0de42 qcacld-3.0: Refactor lim_is_pkt_candidate_for_drop()
refactor lim_is_pkt_candidate_for_drop function to
include logic IBSS mode.

Change-Id: I3446e8f4d373e8f88d56d010a48a70cecf4b3062
CRs-Fixed: 2232890
2018-05-11 16:17:58 -07:00
Kiran Kumar Lokere
015f77fbbb qcacld-3.0: Set AMSDU size when AMPDU is disabled
Send unit test command to set AMSDU size to FW when
AMPDU is disabled

Change-Id: I6695a5527d89fbe131036ffa4f7a4c476994dea7
CRs-Fixed: 2221912
2018-05-11 16:17:52 -07:00
nshrivas
d15b6c2883 Release 5.2.0.77E
Release 5.2.0.77E

Change-Id: Ib4cad9087caa33fd55916d8ff4f3c30f223566e3
CRs-Fixed: 774533
2018-05-11 13:22:49 -07:00
Rajeev Kumar
3505ae54e0 qcacld-3.0: Clean up wlan wake lock during module exit
WLAN wake lock is created during module init but if probe
did not come from platform driver because of Q6 root/user
pd not coming up then during driver unload WLAN wake lock
is not destroyed which is leading to kernel panic because
WLAN driver is unloaded without cleaning up the wake up
source. Add fix to make sure to do hdd_deinit, pld_deinit
dispatcher_deinit and wlan wake up source deinit even if
hdd context is null because if probe did not happen from
platfrom driver then hdd_ctx will be null.

Change-Id: I213bded171b1c69da3332e84ebb0f7cbd940ef44
CRs-Fixed: 2240186
2018-05-10 18:44:45 -07:00
nshrivas
cbe80f4367 Release 5.2.0.77D
Release 5.2.0.77D

Change-Id: I80b39d94dc954422368e2446bbf9212273039ca8
CRs-Fixed: 774533
2018-05-09 22:53:39 -07:00
Sourav Mohapatra
1046049f6c qcacld-3.0: Initialize variable to prevent potential information leak
In the function drv_cmd_set_mc_rate, the variable targetRate, used to
store the value parsed from the command from user space, is not
initialized. The variable is assigned value inside a kernel API
kstrtouint that converts the string to an unsigned int. In a certain
case if the kernel API fails, it returns an error code without assigning
any value to the passed parameter. In this scenario, the variable
targetRate, still uninitialized is passed on to function
wlan_hdd_set_mc_rate where it is logged using hdd_debug. As the flow
goes on, it is then again logged using WMA_LOGE(). This might lead to
potential information leak.

Initialize the variable to zero to prevent the mentioned scenario.

Change-Id: Ideec0b1930e994f19ae8a669cd2963db4016eae1
CRs-Fixed: 2226172
2018-05-09 22:53:39 -07:00
Sourav Mohapatra
debfc5a964 qcacld-3.0: Check buff len alloc in __iw_set_packet_filter_params
In __iw_set_packet_filter_params(), a user controlled length value,
priv_data.length, is used to allocated a buffer. This buffer is then
cast to a struct pointer of struct pkt_filter_cfg type without ensuring
the buffer is large enough to hold the struct. This can lead to a buffer
overread if the user supplied size is smaller than the actual size of the
struct.

Add a sanity check on priv_data.length to ensure that the size is large
enough to hold the struct.

Change-Id: I227856484d4bd7a9b0a16a42e26febbc799f80b5
CRs-Fixed: 2228725
2018-05-09 22:53:36 -07:00
nshrivas
351a989b06 Release 5.2.0.77C
Release 5.2.0.77C

Change-Id: Ic6b5eb94a55d380b42b7be963508f06d7d82c50d
CRs-Fixed: 774533
2018-05-09 20:22:51 -07:00
Himanshu Agarwal
1230ee0ddd qcacld-3.0: Enable fw_crash_timeout
Presently, fw_crash_timeout is disabled as a result of which if
timeout happens for any VDEV related WMI command and device goes
in bad state, no assert or recovery is getting triggered. Due to
this, device crashes at some later point of time at some random
location making debugging difficult.

Enable fw_crash_timeout and trigger recovery if recovery is enabled
otherwise assert.

Change-Id: I9e9e51cba8086bd181be28884c490f0bd77663a8
CRs-Fixed: 2229101
2018-05-09 20:22:51 -07:00
nshrivas
39b22c8810 Release 5.2.0.77B
Release 5.2.0.77B

Change-Id: Ieaec9f0a601ceded100a7e2326224d809453b43b
CRs-Fixed: 774533
2018-05-09 17:36:16 -07:00
Jeff Johnson
5e492b4cb8 qcacld-3.0: Fix typo "deafult"
Replace typo "deafult" with the correct spelling "default"

Change-Id: Ieee2917cf1a094468249424dd6558acdefd237a3
CRs-Fixed: 2237730
2018-05-09 17:36:16 -07:00
Vignesh Viswanathan
69a76a9f4e qcacld-3.0: Add sanity check variable_data len in update_fils_data
In function update_fils_data, fils_indication->num_variable_data
is the actual length of the data present in the array variable_data.
While accessing variable_data array to copy cache identifier, HESSID
and realm identifiers, the length of the array is not checked and
could lead to OOB access.

Add check to validate remaining data length in variable_data array
before accessing it to copy various fields.

Change-Id: Ifc1f5d55964bcd7fdcc2676ea9c2afede0fe6803
CRs-Fixed: 2231767
2018-05-09 17:36:13 -07:00
nshrivas
e5d8787b0a Release 5.2.0.77A
Release 5.2.0.77A

Change-Id: I339818db2580cffee8848072249a98bea6adf269
CRs-Fixed: 774533
2018-05-09 16:31:24 -07:00
Jeff Johnson
9421434405 qcacld-3.0: Remove obsolete P2P macros
As a result of P2P componentization a variety of P2P-related macros
are no longer used, so remove them.

Change-Id: I693c4f11575968ce0aae9f3ecac9e008b0dbf5b9
CRs-Fixed: 2237726
2018-05-09 16:31:24 -07:00
Jeff Johnson
118a4a05af qcacld-3.0: Fix typo "capabilites"
Replace typo "capabilites" with correct spelling "capabilities".

Change-Id: I1c84c401fd732227d63a159bea7f7f3cefacf153
CRs-Fixed: 2237725
2018-05-09 16:31:19 -07:00
Jeff Johnson
5ead5ab10f qcacld-3.0: Fix typos "sucess" and "sucessful"
Replace typos "sucess" and "sucessful" with correct spellings
"success" and "successful"

Change-Id: I30746cbab4533da9b052261fa9bb87214188138b
CRs-Fixed: 2237724
2018-05-09 16:31:15 -07:00
Jeff Johnson
ff4b683dee qcacld-3.0: Fix typo "comming"
Replace typo "comming" with correct spelling "coming"

Change-Id: I9e6927cbbca82280edc459c445c2831dd8d79ce9
CRs-Fixed: 2237727
2018-05-09 16:31:11 -07:00
nshrivas
723a4c1566 Release 5.2.0.77
Release 5.2.0.77

Change-Id: Ie3125bfe6e9634ae3c1b7a6bd9df599de7c530e2
CRs-Fixed: 774533
2018-05-09 15:19:59 -07:00
Jeff Johnson
48a281a9d6 qcacld-3.0: Fix typo "accross"
Replace typo "accross" with correct spelling "across"

Change-Id: Id3a895e5dada1ff352a5ca52a80accd2c1615a71
CRs-Fixed: 2237728
2018-05-09 15:19:58 -07:00
Jeff Johnson
2cc31fdbad qcacld-3.0: Fix typo "choosen"
Replace typo "choosen" with correct spelling "chosen"

Change-Id: I58fc894783093f3d68f3b576906695a9ce201adf
CRs-Fixed: 2237731
2018-05-09 15:19:55 -07:00
Jeff Johnson
389e16bd34 qcacld-3.0: Rename fConnected
The Linux Coding Style frowns upon mixed-case names and so-called
Hungarian notation, so rename fConnected to align with the Coding
Style.

Change-Id: I5987e3c31aed44448a1f1843d8931daa7dfeb0fe
CRs-Fixed: 2237723
2018-05-09 15:19:51 -07:00
Jeff Johnson
e4c11db22a qcacld-3.0: Fix camelCase in tsap_Config_t
Rename typedef tsap_Config_t and the underlying struct sap_Config to
align with the Linux coding standard.

Change-Id: I6e8f8b5ab9555c7781f1acf12a0475902866300c
CRs-Fixed: 2237721
2018-05-09 15:19:47 -07:00
Jeff Johnson
acad838608 qcacld-3.0: Remove obsolete SAP ioctl structs
The following structs are obsolete so remove them:
- struct sQcSapreq_wpaie
- struct sQcSapreq_wscie

Change-Id: Ie9fdba59cf31e9a2c5e468183c1328aee439709a
CRs-Fixed: 2237720
2018-05-09 15:19:43 -07:00
nshrivas
edf7269a88 Release 5.2.0.76Z
Release 5.2.0.76Z

Change-Id: I64cc682422ab715985698bde3e3c2bda87a7843e
CRs-Fixed: 774533
2018-05-09 08:39:20 -07:00
Visweswara Tanuku
e6b0da58ec qcacld-3.0: RSN IE Update in case of BSS already started
qcacld-2.0 to qcacld-3.0 propagation

Beacon does not show RSN IE after disabling/enabling SAP, hence
stations does not connect back while trying to associate in WPA.

While re-enable SAP from the hostapd_cli, the start_bss is called
twice, first from wps_init which does not populate RSNIE and secondly,
through bss_setup which has RSNIE but getting ignored as the BSS is
already started.

Added the RSN IE in case of BSS already started

Change-Id: I2a67156e66e255e7c007a5925cd81b859009114e
CRs-Fixed: 2144429
2018-05-09 08:39:19 -07:00
nshrivas
b7dac3c947 Release 5.2.0.76Y
Release 5.2.0.76Y

Change-Id: Ib149fff9605831bafae0db4d0741f6db44b1c638
CRs-Fixed: 774533
2018-05-09 06:19:18 -07:00
Abhinav Kumar
ac12c76ea3 qcacld-3.0: Add comment between cases in switch statement
Add /* fallthrough */ comment in __lim_process_sme_deauth_req
as per linux checkpatch script while processing deauth req for
limSmeState 'eLIM_SME_LINK_EST_STATE'.

Change-Id: I38e0520aaec96e2ba35c916b39e79724c453632f
CRs-Fixed: 2233183
2018-05-09 06:19:17 -07:00
nshrivas
8c1cf5cca5 Release 5.2.0.76X
Release 5.2.0.76X

Change-Id: If694408cff7d63f4591718988ea9d0b5f316ca2d
CRs-Fixed: 774533
2018-05-09 01:44:33 -07:00
Vignesh Viswanathan
ad47f0a2a8 qcacld-3.0: Modify callers of ObjMgr APIs to include pdev_id
wlan_objmgr_get_vdev_by_macaddr_from_psoc and wlan_objmgr_get_peer
API's definitions have been changed to include pdev_id as an
argument.

Modify the callers of these APIs to include pdev_id as argument.

Change-Id: I3d0de6a0bc1dfefbe1b3cad51ec23f703baaf3ad
CRs-Fixed: 2210728
2018-05-09 01:44:33 -07:00
nshrivas
3f553c4267 Release 5.2.0.76W
Release 5.2.0.76W

Change-Id: I2584123117390b95729d26c3726ad370114c82e7
CRs-Fixed: 774533
2018-05-08 21:33:22 -07:00
Rajeev Kumar Sirasanagandla
e5582aa7ef qcacld-3.0: Avoid NULL pointer exception in (re)assoc event
In hdd_send_association_event() and hdd_send_re_assoc_event(), there is
no check of pBssDesc against NULL which can lead to NULL pointer exception.
Circumvent this issue by adding NULL check.

Change-Id: Ic3a0142b4ea3f058e8d3993fb491d418ddb8f70d
CRs-Fixed: 2232721
2018-05-08 21:33:21 -07:00
nshrivas
1c887e18aa Release 5.2.0.76V
Release 5.2.0.76V

Change-Id: Iced9a47bae8a40ab20a49ec299fab08e11261a2d
CRs-Fixed: 774533
2018-05-08 13:47:27 -07:00