Commit Graph

10357 Commits

Author SHA1 Message Date
Varun Reddy Yeturu
8e94f725ed qcacld-3.0: Fix mac address check in lim_send_sme_mgmt_frame_ind
Broadcast mac address check is performed on an empty buffer pointer
before it is filled. Use the input frame pointer instead.

CRs-Fixed: 2191063
Change-Id: Ie02dcf05da70d52a0f3532b8d5647a7e8e0bcfe8
2018-05-21 17:45:28 -07:00
nshrivas
9a6afd1a1a Release 5.2.0.79L
Release 5.2.0.79L

Change-Id: I22971ef026221d00d6c12bfbb5599704b40ff4d9
CRs-Fixed: 774533
2018-05-21 10:26:27 -07:00
Tushnim Bhattacharyya
6610ff711f qcacld-3.0: Restrict the force SCC logic for STA+SAP only
Restrict the force SCC logic for STA+SAP only, driver shouldn't
use the force scc logic for STA+P2P GO.

Change-Id: I3e62256bc1d8fd35667e6413219077ddc30f0732
CRs-Fixed: 2243537
2018-05-21 10:26:27 -07:00
Rakshith Suresh Patkar
ee30192439 qcacld-3.0: Fix compilation issue in ol layer
Fix compilation issue seen in ol layer functions
due to mismatch between callback pointer type and
callback function signature.

Change-Id: I46bdf88c0d3e367e15e2a54229b237e2c9416319
CRs-Fixed: 2245498
2018-05-21 10:26:23 -07:00
nshrivas
add17bb45c Release 5.2.0.79K
Release 5.2.0.79K

Change-Id: I41ae1cd2eebeeea30ebc0ddfa1aec184a2264c76
CRs-Fixed: 774533
2018-05-21 08:27:56 -07:00
Himanshu Agarwal
ad4c039d2c qcacld-3.0: Remove force SAP ACS support from driver
Remove force SAP ACS support from driver as it is no longer needed
after hostapd based ACS is enabled permanently from framework.

Change-Id: Ib3b8bac0dcf45562596d89d0aa49e16a03f85499
CRs-Fixed: 2234858
2018-05-21 08:27:56 -07:00
nshrivas
4cef48b3ef Release 5.2.0.79J
Release 5.2.0.79J

Change-Id: I8ff35cf4955b0f402dab12ca2572fe51f94490c2
CRs-Fixed: 774533
2018-05-21 06:05:57 -07:00
Himanshu Agarwal
2785d2459b qcacld-3.0: Process setkey confirmation in sme callback
In a noisy enviornment setkey confirmation in SME queue
is not getting processed due to multiple beacons/probes
getting processed in PE queue which is of higher priority
than SME queue.

Instead of posting a message to SME queue, setkey confirmation
will run to completion using sme callback mechanism.

Change-Id: Ibe536dad13731e7086c5e0a9ed2a19c11f6e9193
CRs-Fixed: 2233210
2018-05-21 06:05:57 -07:00
chenguo
0f3636b99c qcacld-3.0: Enable ATH_TX_PRI_OVERRIDE by default for Lithium
For admission control feature, it is possible that priority of skb
to be overridden by HDD layer because certain AC is in the ACM
state. So need to enable ATH_TX_PRI_OVERRIDE by default.

This change will only take effect for QCA6290.

CRs-Fixed: 2237916
Change-Id: I9fcf75948c1b0eee8b12d5d54ab3dd251fb36409
2018-05-21 06:05:53 -07:00
nshrivas
83a6637820 Release 5.2.0.79I
Release 5.2.0.79I

Change-Id: I65b13bc619a18bd2304ea32c8662d2c06fa21f92
CRs-Fixed: 774533
2018-05-21 03:52:54 -07:00
Sravan Kumar Kairam
dd57ea349e qcacld-3.0: Initialize uninitialized variable
Current code in __hdd_hard_start_xmit function there is a possibility
of one variable uninitialized. Improve the code by initializing the
variable.

Change-Id: Ia2dbed83b35801087b93bbb336d13df95a78a8aa
CRs-Fixed: 2029588
2018-05-21 03:52:53 -07:00
Padma, Santhosh Kumar
4cdbf7d8dc qcacld-3.0: Add QDF_BUG to avoid use after free
There is a chance that cumulative peer_id_ref_cnt of different
peers can exceed peer ref cnt. This can result in use after free
issue during peer unref delete in ol_txrx_peer_remove_obj_map_
entries. Add QDF_BUG to catch such case and avoid access of peer
after delete.

Change-Id: I5a3cecc6a20747fce2fbf36a5ae733c42a3bc88b
CRs-Fixed: 2206589
2018-05-21 03:52:48 -07:00
Kiran Kumar Lokere
0205d84273 qcacld-3.0: Check user config HE caps to update session caps
Check user configuration for HE Tx beamformee and beamformer
while updating the caps into global or session configuration.

Change-Id: Ie355a6f208499dd389117c02b8510094c8fd08fd
CRs-Fixed: 2241779
2018-05-21 03:52:43 -07:00
nshrivas
7ddf7005f8 Release 5.2.0.79H
Release 5.2.0.79H

Change-Id: I4fee96baaf9a1a1fafe3a742c322c61c17238a4c
CRs-Fixed: 774533
2018-05-20 23:25:37 -07:00
Zhu Jianmin
83e8b126e9 qcacld-3.0: Fix memory leak in p2p oper chan change confirm action frame
In lim_oper_chan_change_confirm_tx_complete_cnf, need free frame buf
alloced in lim_p2p_oper_chan_change_confirm_action_frame, or buffer is
leaked.

Change-Id: Ic479427282742fb4fbbe28ab1acdf91e0a511340
CRs-Fixed: 2238603
2018-05-20 23:25:36 -07:00
nshrivas
1fb413e292 Release 5.2.0.79G
Release 5.2.0.79G

Change-Id: I3a4c9297a5ed7cda1d61f37dc1451b95944c9149
CRs-Fixed: 774533
2018-05-20 21:55:45 -07:00
Wen Gong
7952fbd708 qcacld-3.0: Add extscan feature flag
Add config flag to enable / disable extscan feature

Change-Id: Icb5087619964b729041e18127baba1b2796ed911
CRs-Fixed: 2226549
2018-05-20 21:55:45 -07:00
nshrivas
7c92db6da1 Release 5.2.0.79F
Release 5.2.0.79F

Change-Id: I7d8b01823e125611a6ab67ccfdf8121315838137
CRs-Fixed: 774533
2018-05-20 08:15:45 -07:00
Wu Gao
24466e3693 qcacld-3.0: Enable QDF ID allocation API
Enable QDF ID allocation API in Kbuild.

Change-Id: Id43b16175e59f40ad111b03439f34d63ea14c627
CRs-Fixed: 2242753
2018-05-20 08:15:44 -07:00
nshrivas
1e27263c40 Release 5.2.0.79E
Release 5.2.0.79E

Change-Id: I6fac3f325ad09c59002d81aa7f20effd09f6d7e1
CRs-Fixed: 774533
2018-05-19 22:14:31 -07:00
Kiran Kumar Lokere
a48cae1f5f qcacld-3.0: Fix HE Tx beamforming cfg parameter values
HE Tx beamforming config parameter setting fails due to incorrect
value range. Correct the HE Tx beamforming config parameter values

Change-Id: Idb0ada45417467122bd7473cca07d15cf54fd3cc
CRs-Fixed: 2244247
2018-05-19 22:14:30 -07:00
nshrivas
0cf71255e2 Release 5.2.0.79D
Release 5.2.0.79D

Change-Id: Ieea3e5aa7d5201ff5cabbc49dc0ff401a82aa602
CRs-Fixed: 774533
2018-05-19 10:56:46 -07:00
Naveen Rawat
fa2a100bac qcacld-3.0: Add implementation of get_station_stats
Add changes to support get station stats from within cp_stats
component.

Change-Id: Id685e9d94f185ee562f21d12d118e94a737a6a7e
CRs-Fixed: 2210338
2018-05-19 10:56:45 -07:00
nshrivas
306c9f178d Release 5.2.0.79C
Release 5.2.0.79C

Change-Id: If896b55bd349763cac060cc7419d4f0a2d20ae21
CRs-Fixed: 774533
2018-05-18 16:46:51 -07:00
Ashish Kumar Dhanotiya
5e138ea5a2 qcacld-3.0: Avoid NULL check for context in class A stats cb
In hdd_get_class_a_statistics_cb api, context is actually
cookie and it can be NULL if this is the first request. on
class A stats request, when hdd_get_class_a_statistics_cb is
invoked with context as NULL, the NULL check in callback
will not update the latest stats result and will return.

Change-Id: I8c33a0e82d9915a4b3d76e695ceab7ecd9301b89
CRs-Fixed: 2244767
2018-05-18 16:46:51 -07:00
Nachiket Kukade
caa2e84d5e qcacld-3.0: Add a NULL check on channels in IOCTL SETROAMSCANCHANNELS
User sends driver a list of roaming scan channels to set through IOCTL
SETROAMSCANCHANNELS. The parameters include the number of elements in
the array, followed by channel array and then a NULL character. But
when driver loops through the channel array it doesn't have a NULL
check. An erroneous number of elements passed by user may cause buffer
overread.

Add a NULL check on channels passed in IOCTL SETROAMSCANCHANNELS.

Change-Id: I7342aa5cf8e5267b7ed06a4e35b1ed882fb97893
CRs-Fixed: 2227039
2018-05-18 16:46:44 -07:00
Naveen Rawat
ea1564b784 qcacld-3.0: Fix tTxrateinfoflags as per linux coding guidelines
Fix tTxrateinfoflags as per linux coding guidelines, this will later
help move the struct to qcacmn.

Change-Id: I1911d25594aaecc7c166cf36b79111b61e6de457
CRs-Fixed: 2244834
2018-05-18 16:46:40 -07:00
nshrivas
2671c816b1 Release 5.2.0.79B
Release 5.2.0.79B

Change-Id: Ia7b5aa17721bf0da538907de828d1550bd0d23e8
CRs-Fixed: 774533
2018-05-18 12:14:40 -07:00
Nirav Shah
d21a2e3d6c qcacld-3.0: Featurize dp trace
Featurize dp trace to compile out cleanly.

Change-Id: I23b86459af605baa257af4ef62497f010b864215
CRs-Fixed: 2228465
2018-05-18 12:14:39 -07:00
Rajeev Kumar Sirasanagandla
551613d872 qcacld-3.0: Fix event size in GET_WIFI_INFO handler
While processing vendor command QCA_NL80211_VENDOR_SUBCMD_GET_WIFI_INFO,
respective handler wlan_hdd_cfg80211_get_wifi_info() is not allocating
memory for QCA_WLAN_VENDOR_ATTR_WIFI_INFO_RADIO_INDEX in event buffer
and trying to populate radio_index with nla_put_u32(). Buffer-overflow
is avoided with buffer length check in nla api but error is returned.
Return of error for valid user input is incorrect.

To fix this, add size of radio index in event buffer size calculation.

Change-Id: I39973814ae9b10466b9d5e3492a42b745a7f2a5e
CRs-Fixed: 2230298
2018-05-18 12:14:36 -07:00
Nirav Shah
a3cc7195ef qcacld-3.0: Flow control Resize implementation
Flow control resize implementaion as part of
Genoa enhancements to reduce total desc requirement
from 3600 to 2000.

Change-Id: Iee5d3ff08dcea13c11632cd29e6edba0dc3e979f
CRs-Fixed: 2223553
2018-05-18 12:14:33 -07:00
nshrivas
b310fd7942 Release 5.2.0.79A
Release 5.2.0.79A

Change-Id: If80816d97e49b2bd43c3fe739b2baf8dbe7e3a84
CRs-Fixed: 774533
2018-05-18 03:34:40 -07:00
Dustin Brown
e7e71d3fe3 qcacld-3.0: Remove adapter parameter from start modules
hdd_wlan_start_modules() currently takes an adapter parameter in order
to do management frame event deregistration. Instead, do management
frame event deregistration during adapter stop for symmetry with the
event registration. This allows us to remove the adapter parameter
completely from hdd_wlan_start_modules().

Change-Id: Ifb4619c80a129b8ef4e84c597dd98004d5cd713d
CRs-Fixed: 2240850
2018-05-18 03:34:39 -07:00
nshrivas
953aeb2af4 Release 5.2.0.79
Release 5.2.0.79

Change-Id: I374533c16db40cf766be6147389f3c322d6b39f6
CRs-Fixed: 774533
2018-05-18 02:17:05 -07:00
Jeff Johnson
c97816c244 qcacld-3.0: wma: Fix misspellings
Address the following issues in the core/wma folder:
CHECK: 'accomodate' may be misspelled - perhaps 'accommodate'?
CHECK: 'acess' may be misspelled - perhaps 'access'?
CHECK: 'catagory' may be misspelled - perhaps 'category'?
CHECK: 'chnage' may be misspelled - perhaps 'change'?
CHECK: 'defintions' may be misspelled - perhaps 'definitions'?
CHECK: 'Intialize' may be misspelled - perhaps 'Initialize'?
CHECK: 'Intial' may be misspelled - perhaps 'Initial'?
CHECK: 'proces' may be misspelled - perhaps 'process'?
CHECK: 'progess' may be misspelled - perhaps 'progress'?
CHECK: 'refrence' may be misspelled - perhaps 'reference'?
CHECK: 'Relevent' may be misspelled - perhaps 'Relevant'?
CHECK: 'reponse' may be misspelled - perhaps 'response'?

Change-Id: Idc314b5a3a6945211581e2135cfaf9d0d5f69457
CRs-Fixed: 2241946
2018-05-18 02:17:05 -07:00
Jeff Johnson
698eacd7a7 qcacld-3.0: sme: Fix misspellings
Address the following issues in the core/sme folder:
CHECK 'accomodates' may be misspelled - perhaps 'accommodates'?
 (actually accommodated)
CHECK 'acknowledgement' may be misspelled - perhaps 'acknowledgment'?
CHECK 'becasue' may be misspelled - perhaps 'because'?
CHECK 'becuase' may be misspelled - perhaps 'because'?
CHECK 'catagory' may be misspelled - perhaps 'category'?
CHECK 'explictly' may be misspelled - perhaps 'explicitly'?
CHECK 'failue' may be misspelled - perhaps 'failure'?
CHECK 'fucntion' may be misspelled - perhaps 'function'?
CHECK 'infomation' may be misspelled - perhaps 'information'?
CHECK 'inteface' may be misspelled - perhaps 'interface'?
CHECK 'managment' may be misspelled - perhaps 'management'?
CHECK 'messsage' may be misspelled - perhaps 'message'?
CHECK 'Notifed' may be misspelled - perhaps 'Notified'?

As well as the following spotted during code review:
'sucsess' -> 'success'

Change-Id: Ieaa299d4dbc08c07f10aaf9d967336ac7b11d88d
CRs-Fixed: 2241947
2018-05-18 02:17:01 -07:00
Jeff Johnson
536249f659 qcacld-3.0: Rename csr_roam_save_connected_infomation
Rename csr_roam_save_connected_infomation() to fix spelling error:
'infomation' -> 'information'

Change-Id: I24d92a1dec5aba7599e9e764be4933e52c1f1f52
CRs-Fixed: 2241945
2018-05-18 02:16:58 -07:00
Pragaspathi Thilagaraj
1e5420a974 qcacld-3.0: Fix OOB read in iw_hdd_set_var_ints_getnone
From the IOCTL command WE_POLICY_MANAGER_PCL_CMD, we get the cds
concurrency mode as argument and pass it to cds_get_pcl to get
the pcl channel list. This concurrency mode parameter is used as
the array index to retrive the enum cds_pcl_type. If this value
is greater than CDS_MAX_NUM_OF_MODE an OOB read will occur in
iw_hdd_set_var_ints_getnone.

Add check to validate the input cds mode argument against the macro
CDS_MAX_NUM_OF_MODE. Return error if it is violated.

Change-Id: Iaa79d9698e0074a31a9c3f2396bd06d436d1e349
CRs-Fixed: 2216048
2018-05-18 02:16:55 -07:00
nshrivas
328cd32b11 Release 5.2.0.78Z
Release 5.2.0.78Z

Change-Id: I385ee4d95abff3887e0e89e90c9fe2289efa4f21
CRs-Fixed: 774533
2018-05-18 00:00:19 -07:00
Jeff Johnson
c7e4d16ff9 qcacld-3.0: sap: Fix misspellings
Address the following issues in the core/sap folder:
CHECK: 'availabe' may be misspelled - perhaps 'available'?
CHECK: 'defult' may be misspelled - perhaps 'default'?
CHECK: 'fucntion' may be misspelled - perhaps 'function'?
CHECK: 'Funtion' may be misspelled - perhaps 'Function'?
CHECK: 'intial' may be misspelled - perhaps 'initial'?

Change-Id: Id1e696f70d4d3c5ff650a353eb8402216909bc2c
CRs-Fixed: 2241944
2018-05-18 00:00:18 -07:00
Rajeev Kumar Sirasanagandla
0a266177ff qcacld-3.0: Avoid NULL pointer exception in wlan_hdd_allow_sap_add()
When trying to add multiple softap interfaces, sanity checks in
wlan_hdd_allow_sap_add() are trying to access dev in adapter without
NULL check which can lead to NULL pointer exception.

To fix this, add NULL check for dev before access of its attributes.

Change-Id: I57577da1b60443a42e273f87e9f4feac123bc686
CRs-Fixed: 2232394
2018-05-18 00:00:15 -07:00
tinlin
8a44b64ba4 qcacld-3.0: Fix overwrite in wlan_hdd_cfg80211_set_ie
Fix overwrite when handling RSN element and WAPI AKM suite
list in wlan_hdd_cfg80211_set_ie.

Change-Id: I63528da4c2dfafa22f2c6fc73afe52727af02b64
CRs-Fixed: 2228031
2018-05-18 00:00:11 -07:00
nshrivas
8d4ff45fb3 Release 5.2.0.78Y
Release 5.2.0.78Y

Change-Id: Ifb16ca0a99e5e3326398175a520d73e90b8f39a7
CRs-Fixed: 774533
2018-05-17 21:39:03 -07:00
Wen Gong
bf560c80fb qcacld-3.0: Add sap_indicate_radar stub for DFS master disable
Add sap_indicate_radar for enable / disable DFS master feature

Change-Id: I2b65213033fd6065ae8f1a38e927956410678daf
CRs-Fixed: 2243754
2018-05-17 21:39:03 -07:00
Lin Bai
c135114bad qcacld-3.0: Fix potential risk of AMSDU config
Change "qcacld-3.0: Add support to send A-MSDU aggregation type
to firmware" combines the AMSDU/AMPDU configuration path in WMA
layer, which is causing some ampdu parameters be overwritten by
value of amsdu.

Avoid GEN_VDEV_PARAM_AMSDU handler to touch ampdu parameters.

CRs-Fixed: 2243571
Change-Id: I52119f2bbcb306f5fad704e912c4cbb179c6a369
2018-05-17 21:39:00 -07:00
nshrivas
983ab9f9cd Release 5.2.0.78X
Release 5.2.0.78X

Change-Id: Ic2ddd31ed9e4d1e964d469e56e976177a036bdf6
CRs-Fixed: 774533
2018-05-17 18:05:36 -07:00
Kiran Kumar Lokere
bc6fb2f624 qcacld-3.0: Fix the session Nss value when 2x2 is disabled
Set the session Nss value to 1 when the 2x2 configuration is
disabled.

Change-Id: Idabc3fa16cbaa416246fff9efa6b1d114e5ec3fe
CRs-Fixed: 2237662
2018-05-17 18:05:35 -07:00
nshrivas
75bc6e5f4d Release 5.2.0.78W
Release 5.2.0.78W

Change-Id: I029cbc4aea097035cd0e5a46b4b3d8a973454c78
CRs-Fixed: 774533
2018-05-17 16:55:09 -07:00
Kiran Kumar Lokere
30313a3a58 qcacld-3.0: Fix the HE mcs rate in no ack operation
Fix the HE mcs rates when the ack policy is set to no ack to
reduce the tx failures.

Change-Id: Iff923bcb6094d1a75ba1e14ff19897f9ca8c2e0a
CRs-Fixed: 2236565
2018-05-17 16:55:08 -07:00
nshrivas
82bc21d965 Release 5.2.0.78V
Release 5.2.0.78V

Change-Id: I9f70cf0d3fe77e13a4c56df0a589945de7cf8c91
CRs-Fixed: 774533
2018-05-17 15:43:36 -07:00