提交图

8667 次代码提交

作者 SHA1 备注 提交日期
snandini
181f5b0a10 Release 5.2.0.59Z
Release 5.2.0.59Z

Change-Id: Icfa29740732c8270f8c0afa6da8fc0e48fe91e6a
CRs-Fixed: 774533
2018-01-03 14:16:53 -08:00
Kiran Kumar Lokere
471274844d qcacld-3.0: Check the channel width value in CSA processing
Check the channel width value in CSA IE before we process the
channel switch so that if the AP sends the wrong channel width in
CSA driver can process with correct configuration

Change-Id: Ib14a0146502b0f731f319ac1fe6657a389388cec
CRs-Fixed: 2162235
2018-01-03 14:16:52 -08:00
snandini
ab5eef1aee Release 5.2.0.59Y
Release 5.2.0.59Y

Change-Id: I1c859890b775def51c385d59476edda92f73d5c2
CRs-Fixed: 774533
2018-01-03 13:22:58 -08:00
Himanshu Agarwal
fc4dab9c75 qcacld-3.0: Do recovery/assert on vdev delete/start if bss started
In wma_vdev_detach(), ignore vdev delete request at present if it is
received before VDEV_STOP and VDEV_DOWN which results in fw assert on
VDEV_START as no VDEV_DELETE is present before VDEV_START on the same vdev.

Do cds recovery or assert on vdev deletion or on vdev start if BSS
is already in started state and no VDEV_STOP is queued in the queue.

Change-Id: I273e6240840e7a0a54c2d7ad3de12c8a30d42a18
CRs-Fixed: 2164701
2018-01-03 13:22:58 -08:00
Himanshu Agarwal
a79c676daf qcacld-3.0: Add sanity check for rxNss value
Add sanity check for rxNss value in lim_set_nss_change()
as rxNss cannot be zero.

Change-Id: Ie8043d41413a26469539a1f370ff4bca09870b61
CRs-Fixed: 2157501
2018-01-03 13:22:56 -08:00
Yeshwanth Sriram Guntuka
72a2fb2513 Revert "qcacld-3.0: Save previous auth algo in pe session"
This reverts commit 7cf307e148
as the check to drop auth frame if previous sequence number
and auth algo match with current sequence number and auth
algo returns true instead of false in a correct scenario.

Change-Id: I8dee272f535acaadb9dfff69ee9ce68ddea4eec1
CRs-Fixed: 2166125
2018-01-03 13:22:53 -08:00
snandini
6f680870f0 Release 5.2.0.59X
Release 5.2.0.59X

Change-Id: I4b1d0ab3e5b1c505bd8b2baa637336e8c1628e64
CRs-Fixed: 774533
2018-01-03 12:31:08 -08:00
Vignesh Viswanathan
fa90d6210f qcacld-3.0: Remove add PMKSA cache logic from connect path
Currently host is adding PMKSA cache on bssid from connect request
if PMKID is present in the RSNIE. This may cause duplicate
entry of PMKSA since supplicant may add the same PMKSA on basis of
SSID + cache identifier. This also cause different caches present
in driver and supplicant.
Setting PMKSA in connect request is not needed since supplicant
will always set/delete PMKSA cache using seperate kernel APIs.

Add changes to remove set PMKSA logic during connect path and
increased PMKSA cache path logging.

Change-Id: I7aa13daa59c4221380daebab3bee49de5d681d6b
CRs-Fixed: 2054351
2018-01-03 12:31:08 -08:00
Varun Reddy Yeturu
ab628711da qcacld-3.0: Check for valid FILS info before referencing
Check if the FILS info is populated before deferencing
the value for the same.

Change-Id: Iabc7d11c4033c92a4047d29da915415cf5ca1167
CRs-Fixed: 2162242
2018-01-03 12:31:04 -08:00
Kiran Kumar Lokere
ee2bbf2946 qcacld-3.0: Fix the channel BW capability in HE caps
Fix channel bandwidth capability advertisement in HE caps

Change-Id: I3dc9a390e806725c45a7919e7a62fefaa073399b
CRs-Fixed: 2160791
2018-01-03 12:31:01 -08:00
snandini
a1aa96c98a Release 5.2.0.59W
Release 5.2.0.59W

Change-Id: I51dcc05615eb205298225880f0eed3d92f9fc916
CRs-Fixed: 774533
2018-01-02 15:37:36 -08:00
Kapil Gupta
2a0781fb4c qcacld-3.0: Remove excessive logging for FILS based connection
Currently host driver is dumping all the connection related
info for FILS connection.

Add changes to remove excessive logging for FILS connection

Change-Id: Ib23a90672413e00c06ae61f01fbbb0fb51edda56
CRs-Fixed: 2077465
2018-01-02 15:37:35 -08:00
snandini
f3f65873ab Release 5.2.0.59V
Release 5.2.0.59V

Change-Id: Ib56b621a0a667e51fe54d309eb71099361792277
CRs-Fixed: 774533
2018-01-02 07:26:38 -08:00
wadesong
c46581bc1c qcacld-3.0: Fix an ACS hw mode mapping discrepancy
When ACS is started, acs_cfg.hw_mode in AP context will
be set after mapping from values defined in enum
qca_wlan_vendor_acs_hw_mode to values defined in enum
eCsrPhyMode, but when ACS scan fails due to some reason,
such as scan timeout, the code in function
sap_select_default_oper_chan is still using values
defined in enum qca_wlan_vendor_acs_hw_mode to setup
the default channel.

Change the code in function sap_select_default_oper_chan
to use the values defined in enum eCsrPhyMode when
setting up the default channel.

Change-Id: Ic0d43c43bf9b9a9a36c290d2754c30ebb40bb0e3
CRs-Fixed: 2163658
2018-01-02 07:26:38 -08:00
snandini
b2503551ac Release 5.2.0.59U
Release 5.2.0.59U

Change-Id: I80748c06b091075f7ac315f10c7275595f50e990
CRs-Fixed: 774533
2017-12-29 06:17:01 -08:00
Yeshwanth Sriram Guntuka
7cf307e148 qcacld-3.0: Save previous auth algo in pe session
DUT retries auth with open system if shared key
authentication is not supported by AP. If auth
response from AP for open system auth has same
sequence number as that of shared key response,
host drops the frame.

Fix is to drop the auth frame only if previous
sequence number and auth algo match with current
sequence number and auth algo.

Change-Id: Ia02408d72371dfb91a7cae190ae9399cdf2e2e8b
CRs-Fixed: 2163231
2017-12-29 06:17:00 -08:00
snandini
92dff40b76 Release 5.2.0.59T
Release 5.2.0.59T

Change-Id: I12c7da84ecbc22f811d05020dca2b961b1a1f3f2
CRs-Fixed: 774533
2017-12-29 05:28:42 -08:00
Himanshu Agarwal
ff399e36cb qcacld-3.0: Calculate buf_len properly for extscan hotlist event buffer
Calculate buf_len properly for extscan hotlist event buffer in
wma_extscan_hotlist_match_event_handler()

Change-Id: I923f0d86d83902539a7d3a7b8ea8322dcb83ba00
CRs-Fixed: 2161977
2017-12-29 05:28:40 -08:00
Ganesh Kondabattini
b6fdb6311f qcacld-3.0: Increase the max beacon count value to 10
Modify the upper limit of beacon count to 10.

CRs-Fixed: 2165013
Change-Id: Id6e6fb7eb2435f91e8052b6e8af10435dc25a2d2
2017-12-29 05:28:34 -08:00
Sandeep Puligilla
00d2a1f2c6 qcacld-3.0: Add HDD support to spectral scan
Add HDD support to spectral scan vendor commands

Change-Id: Ie58fabfca07077fd1b886eeb63c1a9361030035f
CRs-Fixed: 2165256
2017-12-29 05:28:28 -08:00
snandini
29751c6b69 Release 5.2.0.59S
Release 5.2.0.59S

Change-Id: I6c002b2e444d366474004b31500c650377aeaed8
CRs-Fixed: 774533
2017-12-28 21:26:32 -08:00
Vignesh Viswanathan
9dd88d39b7 qcacld-3.0: Determine transition status for BSS transition candidates
Determine bss transition status for preferrable candidates provided
by userspace based on the transition reason, rssi of connected and
candidate bssids and other parameters like whether transitiong to the
candidate will result in sub-optimal scenario. The transition status
is either accept or a reason for reject.

Change-Id: Ib83c81909f4d8e31b4125309b8ac392a26a0d6bf
CRs-Fixed: 2007107
2017-12-28 21:26:31 -08:00
snandini
b399834d69 Release 5.2.0.59R
Release 5.2.0.59R

Change-Id: Id7b118b71aaf99623855e205a26341f6d9e1d964
CRs-Fixed: 774533
2017-12-28 15:25:55 -08:00
Rajeev Kumar
6d0b2eaaf0 qcacld-3.0: Rate limit error logs in data path
Rate limit error logs in data path to avoid watch dog bark.

Change-Id: Id20f6224928c6b5e27a04daa6b9a10084ad122b9
CRs-Fixed: 2162954
2017-12-28 11:59:44 -08:00
snandini
63e72af541 Release 5.2.0.59Q
Release 5.2.0.59Q

Change-Id: I74d26e81a21794f9e7581362f697709f3d419313
CRs-Fixed: 774533
2017-12-28 05:06:53 -08:00
Jiachao Wu
d58cfc9eee qcacld-3.0: Check NULL pointer of roam_profile
__wlan_hdd_cfg80211_get_key was invoked when unloading driver.
SAP ctx had been freed at this time.wlan_sap_get_roam_profile will
return NULL.
Check NULL pointer before use roam_profile.

Change-Id: If1f11f0fb7027a6af4e3242fe9af722740d32850
CRs-Fixed: 2162395
2017-12-28 05:06:52 -08:00
Himanshu Agarwal
61990374c0 qcacld-3.0: Add data_len check to avoid OOB access
Add data_len check in wma_stats_ext_event_handler()
to avoid OOB access.

Change-Id: I756ec66fee1cf937f144441a051e973cd561909d
CRs-Fixed: 2160395
2017-12-28 05:06:50 -08:00
snandini
55424ec371 Release 5.2.0.59P
Release 5.2.0.59P

Change-Id: I83d76f13884f55c199acdc7e8ece9c116f3be41d
CRs-Fixed: 774533
2017-12-28 04:27:42 -08:00
Himanshu Agarwal
822187985e qcacld-3.0: Add num_debug_register check to avoid OOB access
Add num_debug_register check in
wma_unified_power_debug_stats_event_handler() to avoid OOB access.

Change-Id: Iae206bc467a940a8fbc1128bff498af958df1c04
CRs-Fixed: 2160403
2017-12-28 04:27:41 -08:00
Himanshu Agarwal
55e1621dd2 qcacld-3.0: Add data_len check to avoid OOB access
Add data_len check in wma_nan_rsp_event_handler()
to avoid OOB access.

Change-Id: Iff42da84567381a4b64bc07e69ff1a0cd4b5a543
CRs-Fixed: 2160375
2017-12-28 04:27:39 -08:00
snandini
a1ebf33bbb Release 5.2.0.59O
Release 5.2.0.59O

Change-Id: If873a066d582d7804f5285cc930ee263a6ae78d8
CRs-Fixed: 774533
2017-12-28 03:38:25 -08:00
Tiger Yu
6a10e3e173 qcacld-3.0: Fix potential buffer overwrite in the htt_t2h_lp_msg_handler
qcacld-2.0 to qcacld-3.0 propagation

Check for the validity of tx_desc_id when received the htt message of
HTT_T2H_MSG_TYPE_MGMT_TX_COMPL_IND from firmware to ensure the buffer
overwrite does not happen.

Change-Id: I0afc781b7fff303525352b817e7eb60b8b05e4d3
CRs-Fixed: 2164705
2017-12-28 03:38:24 -08:00
Himanshu Agarwal
1b34c1f30f qcacld-3.0: Add num_peer check to avoid OOB access
Add num_peer check in wma_ibss_peer_info_event_handler()
to avoid OOB access.

Change-Id: Id798a2143b201e60fbcc4a3881c1cda3e3376eca
CRs-Fixed: 2160461
2017-12-28 03:38:21 -08:00
Hanumanth Reddy Pothula
07e5f99716 qcacld-3.0: Remove FW memory dump feature
qcacld-2.0 to qcacld-3.0 propagation

FW memory dump feature is no longer used. Hence remove FW memory
dump feature code changes.

Change-Id: Ida655f83630c369df746e7c0c9d61a8fee2932a2
CRs-Fixed: 2140261
2017-12-28 11:54:10 +05:30
snandini
daf47342e0 Release 5.2.0.59N
Release 5.2.0.59N

Change-Id: I399dfbac843e1d69130b6cac99bbbe79ae411782
CRs-Fixed: 774533
2017-12-26 17:26:58 -08:00
Sandeep Puligilla
342d2a6bfc qcacld-3.0: Kbuild changes to enable spectral scan
Add Kbuild changes to build the spectral scan files

Change-Id: Ieeccb322a34ca27642016fec3dc0d7232c7dcf59
CRs-Fixed: 2163445
2017-12-26 17:26:57 -08:00
snandini
f37ce13c6c Release 5.2.0.59M
Release 5.2.0.59M

Change-Id: I29df3be2b462a61b4a9567ae3b95178f89dd2b4f
CRs-Fixed: 774533
2017-12-25 23:26:38 -08:00
Dustin Brown
36e24e273b qcacld-3.0: close all adapters before module stop
Adapter resources are not being released until after stop modules. This
leads to resource leaks on PCIe targets. Move the call to close adapters
to before stop modules.

Change-Id: I18ceba26bb6aab634da91a14cc6890a7b7bd836f
CRs-Fixed: 2162868
2017-12-25 23:26:38 -08:00
Kabilan Kannan
75bd4b3310 qcacld-3.0: Rate limit TX data transmit error in HDD
TX data transmit error is flooding out the logging
system.
Rate limit the TX transmit error to avoid
log buffer overrun.

Change-Id: Ie6f857378f1d8d2ee07ba0d6e10639f6f5dcbd1c
CRs-Fixed: 2160835
2017-12-25 23:26:34 -08:00
Vignesh Viswanathan
bdfbaa9cbf qcacld-3.0: Fix buffer overwrite in lim_send_probe_rsp_template_to_hal
In function lim_send_probe_rsp_template_to_hal, memset is done for the
allocated packet for length nBytes which is calculated as size of payload +
MAC header + addn_ielen.
However, the buffer used psessionEntry->pSchProbeRspTemplate is allocated
for length 512 (SCH_MAX_PROBE_RESP_SIZE) only as part of create session.
This leads to a potential overflow of the memory if nBytes calculated is
greater than 512 leading to kernel panic while freeing the memory in
delete session.

Add sanity check to make sure we do not exceed the SCH_MAX_PROBE_RESP_SIZE
before doing a memset on the buffer.

Change-Id: I4657d34a429b1f0c11ac8ca24869727c222669b8
CRs-Fixed: 2160086
2017-12-25 23:26:31 -08:00
snandini
e6bce00c2c Release 5.2.0.59L
Release 5.2.0.59L

Change-Id: Ie3eb7e2b1ac9f163ebb5993a26b060e07eb5af52
CRs-Fixed: 774533
2017-12-25 21:26:13 -08:00
Ashish Kumar Dhanotiya
d2b9064557 qcacld-3.0: Buffer overwrite in vendor scan request on n_ssid
In function __wlan_hdd_cfg80211_vendor_scan, when SCAN_SSIDS
and QCA_WLAN_VENDOR_ATTR_SCAN_FREQUENCIES are parsed, if the
number of SSIDs or number of channels are more then 255 in
netlink message, n_ssid and n_channels will get overflow
because n_ssid and n_channels are of type uint8_t.

Add a check to validate the max number of SCAN_SSIDs against
MAX_SCAN_SSID and max number of channels against MAX_CHANNEL.

Change-Id: Ib31dcc912fee8639e26d836d2fc5a32bf81fb43d
CRs-Fixed: 2153343
2017-12-25 21:26:13 -08:00
Dustin Brown
26b3d04130 qcacld-3.0: Fix runtime leak compilation issue
HDD calls several qdf_debug_domain APIs when that feature is not
enabled. Add conditional compilation to avoid these calls when runtime
leak detection is not enabled.

Change-Id: I78775c240b5352ed63f2e15f16e25159bbde5666
CRs-Fixed: 2162989
2017-12-25 21:26:10 -08:00
snandini
9355430d8e Release 5.2.0.59K
Release 5.2.0.59K

Change-Id: I9497b81f0c16909f5f01ce8052d32811a3824c91
CRs-Fixed: 774533
2017-12-25 19:26:03 -08:00
Paul Zhang
fb02f45704 qcacld-3.0: Register hdd_netdev_notifier properly
The statement register_netdevice_notifier(&hdd_netdev_notifier)
is replaced by hdd_register_notifiers(hdd_ctx) mistakenly when
propagating from 3.1 to 3.2.

Change-Id: Iddcc2b0375c0e81b944def117b40ea3015f91e4b
CRs-Fixed: 2163113
2017-12-25 19:26:02 -08:00
snandini
64206612cb Release 5.2.0.59J
Release 5.2.0.59J

Change-Id: I56bc7e2d3f87f91c1b8a29971a6a496414c4e380
CRs-Fixed: 774533
2017-12-25 13:26:02 -08:00
Vignesh Viswanathan
59bf3d4bf0 qcacld-3.0: Fix potential OOB read in lim_parse_kde_elements
In function lim_parse_kde_elements, while parsing the KDE list from
the assoc response frame, elem_len is obtained from the frame buffer.
elem_len is then used to find the matching OUI for KDE OUI type and
then to calculate data_len based on the offset for the GTK/IGTK data
types.

If the value in elem_len field in the frame is less than the Data
Offset (which includes the OUI and data type) or the GTK/IGTK offset
then a OOB read would occur.

Add checks to validate the elem_len with Data offset and then with
the GTK/IGTK offset based on the data type.

Change-Id: I8ae31c6d6c28e88ad9bda757b3f1ff2585f8a553
CRs-Fixed: 2161920
2017-12-25 13:26:01 -08:00
snandini
9c8e7e6222 Release 5.2.0.59I
Release 5.2.0.59I

Change-Id: I2055927fba7705f2a909b6e874ed82de8bedd28b
CRs-Fixed: 774533
2017-12-22 19:26:33 -08:00
wadesong
db4d958ba4 qcacld-3.0: Refine peer object cleanup sequence
When a peer object is to be removed in WLAN HDD object manager
code, it should be logically deleted first before it's ref
count is decreased and the peer object is freed, or there will
be a potential race condition, in which a freed peer object
buffer will be accessed.

Change-Id: Ib3179e8207d1e9bbaa9c2b8450a8016e23cfc3f3
CRs-Fixed: 2161627
2017-12-22 19:26:32 -08:00
Poddar, Siddarth
3f97e3dca7 qcacld-3.0: Check for peer delete in progress before assigning to temp var
With the existing implementation of TAILQ_FOREACH_REVERSE
in ol_txrx_remove_peers_for_vdev() function, host traverses
the list, stores the peer in the var, releases the lock and
later temp var is getting deleted as part of peer unmap and
host end up in accessing the stale peer entry.

To avoid this, host should check the peer delete in progress
first before assigning it to the temp var.

Change-Id: I5b9a401ae062efc6d2fbe608b25424a27c9d9f94
CRs-Fixed: 2159446
2017-12-22 19:26:30 -08:00