Gráfico de commits

8158 Commits

Autor SHA1 Mensagem Data
snandini
126c307eb0 Release 5.2.0.55D
Release 5.2.0.55D

Change-Id: I733472511df19257396002826fb2ac1ee956f64d
CRs-Fixed: 774533
2017-11-23 11:22:13 -08:00
Ganesh Kondabattini
4a7f5b9d9d qcacld-3.0: Allow SAP to come up on DFS channel in SCC mode
Allow SAP to come up on DFS channel in STA+SAP concurrency mode
only when g_sta_sap_scc_on_dfs_chan enabled in ini file and also
disable chan_switch_hostapd_rate_enabled when force SCC is enabled.

CRs-Fixed: 2133958
Change-Id: Id1333a49d0538eb4ccfaf3c8498e9ca06671de02
2017-11-23 11:22:12 -08:00
snandini
d402202fb8 Release 5.2.0.55C
Release 5.2.0.55C

Change-Id: I116e685cd23e47afe39009947a0973d0626cfd06
CRs-Fixed: 774533
2017-11-23 07:20:45 -08:00
Hanumanth Reddy Pothula
74a97d4ada qcacld-3.0: Handle SAP turn-off gracefully during SSR
There is a possibility of user to turn-off SAP while SSR is
in progress, leading framework to show SAP as turn-off though
SAP is still beaconning, after succsessful SSR.
Changes are done to make sure driver and framework are in sync.

Change-Id: Ic3cd1eebb23482e9cebf04683533face178698b4
CRs-Fixed: 2137646
2017-11-23 07:20:44 -08:00
snandini
41ed422ead Release 5.2.0.55B
Release 5.2.0.55B

Change-Id: I37113dd3ac38369dc969ddde394ea7f917d5ec31
CRs-Fixed: 774533
2017-11-22 19:21:26 -08:00
Dustin Brown
21a761d385 qcacld-3.0: Enable qdf_debug_domain support
Enable the new resource tracking debug domain feature in the Kbuild.

Change-Id: Icc1170f5a7a4c643289917ce9cf13fe5332cabf5
CRs-Fixed: 2144303
2017-11-22 19:21:26 -08:00
snandini
322e2d158c Release 5.2.0.55A
Release 5.2.0.55A

Change-Id: I7f70fce2c6da28f709b308da9d487cd172bb1a16
CRs-Fixed: 774533
2017-11-22 17:41:26 -08:00
Krunal Soni
b51eec7368 qcacld-3.0: (Part-3) Refactor open and close session logic in HDD module
Current open and close session APIs mainly defined in HDD, SME, and SAP
modules are not proper. They require some design changes to maintain the
consistency.

In order to achieve the goal of making symmetrical design for open
and close session logic, refactor existing API in HDD module.

CRs-Fixed: 2147971
Change-Id: Icdf8b0f99bc9fb828f7c68a32e5d25652baa8a17
2017-11-22 17:41:26 -08:00
Krunal Soni
b5d18ae94b qcacld-3.0: (Part-2) Refactor open and close session logic in SAP module
Current open and close session APIs mainly defined in HDD, SME, and SAP
modules are not proper. They require some design changes to maintain the
consistency.

In order to achieve the goal of making symmetrical design for open and
close session logic, refactor existing API in SAP module.

CRs-Fixed: 2147969
Change-Id: Iccc5ddd2b14ec2b27e6746a211edd10ec06ad434
2017-11-22 17:41:23 -08:00
Krunal Soni
8d184fa082 qcacld-3.0: (Part-1) Refactor open & close session logic in SME module
Current open and close session APIs mainly defined in HDD, SME, and SAP
modules are not proper. They require some design changes to maintain the
consistency.

In order to achieve the goal of making symmetrical design for open and
close session logic, refactor existing API in SME module which could
serve as stepping stone for SAP module and HDD module changes.

CRs-Fixed: 2147968
Change-Id: If39d191084a9f3f58b88f36d71cf42878a43b484
2017-11-22 17:41:20 -08:00
Krunal Soni
5943765644 qcacld-3.0: Rename few SAP APIs & introduce the new wrapper APIs
wlansap_open(), wlansap_close(), wlansap_start(), and wlansap_stop()
APIs are not doing what their names' suggest. Rename these APIs such
a way that they reflect the true meaning of it.

Introduce two new APIs to create and destroy the sap context.

CRs-Fixed: 2147974
Change-Id: Ie0475df480d1b19e796ddf3b639de3078a5a61a0
2017-11-22 17:41:17 -08:00
snandini
29a6c24adf Release 5.2.0.55
Release 5.2.0.55

Change-Id: I4d4d91d054bb765f6b69d122f7acd33032550cbc
CRs-Fixed: 774533
2017-11-22 15:21:41 -08:00
Orhan K AKYILDIZ
983e3d14fe qcacld-3.0: Sanity check on tx len before sending
Check length of the data passed in the hw tx desc and
assert it is not zero-length.
This will make it then easy to debug it on host side.

Change-Id: I7d77ac5ee6f5a4992c4a91b9d5661d207732862f
CRs-Fixed: 2136638
2017-11-22 15:21:40 -08:00
snandini
959fee9459 Release 5.2.0.54Z
Release 5.2.0.54Z

Change-Id: I59a6b07b2ac326e431d8e304d46b1ef56233aa44
CRs-Fixed: 774533
2017-11-22 05:40:57 -08:00
Jiachao Wu
0db14ff877 qcacld-3.0: Fix a memory leak in mac
Memory will leak when pe_handle_mgmt_frame receive data frame
and FEATURE_WLAN_ESE undefine.

Change-Id: I2b3165d7209931e8de5049cd69bf3a3bb48dafd6
CRs-Fixed: 2147025
2017-11-22 05:40:56 -08:00
snandini
1e59f7b167 Release 5.2.0.54Y
Release 5.2.0.54Y

Change-Id: I8d5f38c11bc161eceb3b13503bb6d8a7f662677c
CRs-Fixed: 774533
2017-11-22 01:53:16 -08:00
Mohit Khanna
4bfe97fab9 qcacld-3.0: remove tcp_adv_win_scale setting from lro init
Currently during lro enablement (hdd_lro_enable), we reset tcp delack by
sending a message to cnss-daemon (hdd_reset_tcp_delack). This function
is also resetting tcp_adv_win_scale param. This ignores the ini param
gTcpAdvWinScaleEnable.
If gTcpAdvWinScaleEnable is set to "0", the WLAN driver should not
manipulte tcp_adv_win_scale system parameter.
Remove tcp_adv_win_scale manipulation from hdd_reset_tcp_delack
function.

CRs-Fixed: 2034097
Change-Id: I98769273059a8b874845a98873d9d4fcab52ad79
2017-11-22 01:53:16 -08:00
Tushnim Bhattacharyya
eab33ddd6f qcacld-3.0: Make the set HW mode & NSS update independent of each other
Typically set hw mode & Nss update happens at the same time. Since the
order of these 2 actions may not be same always, make them independent
of each other.

Change-Id: I652ad08e16680991535e0f064c7b5996f4f58792
CRs-Fixed: 2145006
2017-11-22 01:53:13 -08:00
snandini
49e1f3dc53 Release 5.2.0.54X
Release 5.2.0.54X

Change-Id: I77dceb31952e7361f21199e5d7f41749d4d611f3
CRs-Fixed: 774533
2017-11-21 13:41:15 -08:00
Abhinav Kumar
37ad327fd2 qcacld-3.0: Fix 11d scan timer initialization issue
In csr_issue_11d_scan API, driver initializes the timer of "scan_11d_cmd"
with "scan_cmd" timer param instead of "scan_11d_cmd" timer. So when this
timer is stopped/started timer API throws an error as its uninitialized
timer for 11d scan command.

Fix is to pass correct parameter scan_11d_cmd->u.scanCmd.csr_scan_timer
in function csr_issue_11d_scan in order to initialize timer for 11d scan.

Change-Id: I848c70eae45890dfc7b3b327cf649e0eac41d982
CRs-Fixed: 2143243
2017-11-21 13:41:14 -08:00
snandini
69ac861690 Release 5.2.0.54W
Release 5.2.0.54W

Change-Id: I762ada173ab716efef9378a616eea904b4296247
CRs-Fixed: 774533
2017-11-21 05:22:09 -08:00
Tiger Yu
086b6995fe qcacld-3.0: Fix target_type is incorrect in the hdd_context
The target_type is incorrect in the hdd_context.
Call hdd_wlan_update_target_info after calling bmi_download_firmware,
which will get target_info from the target.

Change-Id: I0fa9834f4adb1fccfbb0d450e2026188bc2be942
CRs-Fixed: 2146174
2017-11-21 05:22:08 -08:00
snandini
20b9a0fd4d Release 5.2.0.54V
Release 5.2.0.54V

Change-Id: I06f64335ca2fb5460eeb8b21a7bcd0d58c76e419
CRs-Fixed: 774533
2017-11-21 02:17:05 -08:00
Kabilan Kannan
62d962f25c qcacld-3.0: Fix memory leak in SME beacon report request
In sme_rrm_process_beacon_report_req_ind() function
Memory is not freed for error condition, and it
causes leak in the system
Release the memory for all error
conditions.

Change-Id: Ie4447a8f347e2feeb91155cd36872c6a69307db3
CRs-fixed: 2144032
2017-11-21 02:17:05 -08:00
snandini
32a6755b87 Release 5.2.0.54U
Release 5.2.0.54U

Change-Id: I629430b0c17db3197b1a0134c00504673b5871e2
CRs-Fixed: 774533
2017-11-20 23:23:35 -08:00
Krunal Soni
a59e8a4174 qcacld-3.0: Create PMF timer when PEER associates in PMF mode
Current driver is creating PMF timer for all non-pmf as well as
PMF PEERs which is un-necessary.

Create PMF timer for each PEER when PEER associates in 80211W-PMF
mode.

CRs-Fixed: 2145687
Change-Id: I698de22a075f3307253db811b7ae616ebe48c127
2017-11-20 23:23:35 -08:00
snandini
bf9663e76c Release 5.2.0.54T
Release 5.2.0.54T

Change-Id: Iadc85817bfd5e212dc4f63568b9dc6c1333d9b4f
CRs-Fixed: 774533
2017-11-20 19:35:37 -08:00
Sourav Mohapatra
57006c767a qcacld-3.0: Add support for concurrent STA using ini param
Enable support for concurrent STA interface to be open during startup
using the ini param gEnableConcurrentSTA

Change-Id: Iede1f8673fb682753e31ed8f376453692938e4ba
2017-11-20 19:35:37 -08:00
snandini
05ebf8916c Release 5.2.0.54S
Release 5.2.0.54S

Change-Id: I399990f237ef70c93162f0cc16a22acdc0dbb2b7
CRs-Fixed: 774533
2017-11-20 18:01:57 -08:00
hqu
92ee8cac8d qcacld-3.0: Add SKB to internal tracking table in ipa i2w path
When define MEMORY_DEBUG macro for debugging memory issue,
even in normal case it still will report double free for ipa
i2w SKB.

Fix is to add ipa i2w SKB to internal tracking table.

Change-Id: I27b0afc79e8c39c99a73ec9a65a348ebf85960b6
CRs-Fixed: 2145344
2017-11-20 18:01:56 -08:00
snandini
783e40e8dc Release 5.2.0.54R
Release 5.2.0.54R

Change-Id: I3e5fa01bdd8c7a7048cf05213c9850aa7e26209a
CRs-Fixed: 774533
2017-11-20 17:22:08 -08:00
Kabilan Kannan
3eeefea161 qcacld-3.0: Add TDLS user command getTDLSPeers
Add TDLS user command getTDLSPeers for TDLS
functional verification

Change-Id: I6e3891a0971109a10c5d01735f351ea8aaa55abf
CRs-Fixed: 2144996
2017-11-20 17:22:07 -08:00
snandini
10d8a75078 Release 5.2.0.54Q
Release 5.2.0.54Q

Change-Id: I8626cb1e3ae27769dd6d0ec870d36d31ec3cf2ab
CRs-Fixed: 774533
2017-11-20 15:21:10 -08:00
Kabilan Kannan
6edafeb0c3 qcacld-3.0: Free user defined WOWL patterns
User defined wowl patterns are not freed in all
of the driver unload paths, and it causes
leaks in the system.
Free user defined wowl patterns in all the driver
unload paths.

Change-Id: I7b980a6392badb3d28f2c665a96108beb71f02d5
CRs-Fixed: 2144562
2017-11-20 15:21:10 -08:00
Rajeev Kumar
0f22d9370e qcacld-3.0: Avoid heap overflow during cfg80211 vendor scan request
WLAN driver's vendor scan request handler function declares ie_len
as uint8_t whereas kernel's cfg80211_scan_request ie_len is declared
as size_t. This type mismatch for ie_len leads to WLAN driver allocating
less memory on heap because of implicit integer overflow when kernel's
ie_len(declared as size_t) is bigger than hex 0xFF and when scan request
data is copied it overflows the allocated heap memory.

In WLAN driver's vendor scan request handler declare ie_len and len also
of type size_t such that always correct size heap memory is allocated and
there is no heap overflow during memory copy.

Change-Id: I240113d34c561c7155303b0b8b253c0cbaf7724b
CRs-Fixed: 2145573
2017-11-20 15:21:07 -08:00
snandini
0d0d61edd4 Release 5.2.0.54P
Release 5.2.0.54P

Change-Id: Ic3da92b386b414cab4ba7395eb1c3f1b5085041e
CRs-Fixed: 774533
2017-11-20 04:07:27 -08:00
anisha agarwal
188d2549d8 qcacld-3.0: Rename target sdxhedgehog to sdx20
Replace target name sdxhedgehog with sdx20 to maintain
consistency with other components on the same platform.

Change-Id: I257c082c9427f5fb7d699d11924b6bdc1b59f661
CRs-Fixed: 2023531
2017-11-20 04:07:26 -08:00
snandini
f38eca519b Release 5.2.0.54O
Release 5.2.0.54O

Change-Id: I6a4f085dcf966e30ea649e7e0d343ca70eb57a54
CRs-Fixed: 774533
2017-11-19 23:51:54 -08:00
Jiachao Wu
1b00ecb608 qcacld-3.0: kernel printing warning logs
Kernel print warning message: Division by zero in kernel
When gBusBandwidthComputeInterval > 1000,
thresh_time_limit will be set to 0.

Change-Id: Ibb1f87815e194cd74886d3731f6d6a0fee6a6732
CRs-Fixed: 2070938
2017-11-19 23:51:54 -08:00
snandini
a543ec673b Release 5.2.0.54N
Release 5.2.0.54N

Change-Id: Ifec30459aa2a627a684566fe4dcac18a142df48e
CRs-Fixed: 774533
2017-11-17 15:21:35 -08:00
Krunal Soni
c68ee30dc9 qcacld-3.0: Make __hdd_stop(STA) & __hdd_hostapd_stop(SAP) symmetrical
As part of Ib22dfa375217a48448c5a7872a9a2ed154dd862f, reviewer has
provided comments to make __hdd_stop and __hdd_hostapd_stop symmetrical
to avoid any logical issue.

Along with above point, fix hdd_init_ap_mode to check event_flags
instead of sap context to find out if session is already opened and
initialized.

Change-Id: I49788157a95940dfd5ec396baf40db7e3df21359
CRs-Fixed: 2136351
2017-11-17 15:21:34 -08:00
snandini
7498515be3 Release 5.2.0.54M
Release 5.2.0.54M

Change-Id: Ic58b2904f96d78835ca7fe76a04fcf01c951b712
CRs-Fixed: 774533
2017-11-16 13:21:16 -08:00
Paul Zhang
84fa938931 qcacld-3.0: Remove purge_sme_cmd_list API & reset scan ops in SSR case
wlan_serialization_remove_all_cmd_from_queue() is getting called
two times which causes reference count to be decreased two times.
1) 1st time from sme_stop() -> purge_sme_cmd_list()
   -> wlan_serialization_remove_all_cmd_from_queue()
2) 2nd time from wlan_serialization_vdev_obj_destroy_notification()
   -> serialization_purge_cmd_list()
   -> wlan_serialization_remove_all_cmd_from_queue()

1st path has been there for quite a long time as per the old serialization
design but with new serialization design, it won't be required.

Change-Id: Ia8bd91c665340e7f7628ad73af64fa0044b45dde
CRs-Fixed: 2134851
2017-11-16 13:21:15 -08:00
snandini
10265806e6 Release 5.2.0.54L
Release 5.2.0.54L

Change-Id: Ia3c618efaf8796a6ac03c052fe6ec65e16c403c6
CRs-Fixed: 774533
2017-11-16 11:40:28 -08:00
Nachiket Kukade
1be92caa6c qcacld-3.0: Corrections in buffer length checks in set_fils_config
In wlan_hdd_cfg80211_set_fils_config, incoming fils configs
are copied into local buffers. Buffer allocations happen with
internal length definitions, while lengths are checked against
definitions from WMI API's. This may cause a buffer overwrite
for fils erp realm buffer.

Use the same definitions for length checks that are used for
allocations.

Change-Id: Ie26bb1fdec9b12b429cb74dd290c155deb6c32f8
CRs-Fixed: 2137834
2017-11-16 11:40:27 -08:00
Dustin Brown
1fe30a8ff3 qcacld-3.0: Close small interface idle race window
There is an interface idle work that stops the driver module in cases of
adapter inactivity. This work grabs the iface_change_lock, which is also
grabbed before synchronously cancelling the interface idle work. This can
cause a deadlock situation where cancelling the work never finishes,
because the caller holds the lock the work needs in order to complete.
Hoist the calls to cancel the work out of locked regions to avoid the
potential deadlock situation.

Change-Id: Ie421e69e2026ad1de626daba1f72d002d9751013
CRs-Fixed: 2120671
2017-11-16 11:40:24 -08:00
Dustin Brown
6f42792885 qcacld-3.0: Use delayed work instead of qdf_mc_timer for iface change
Currently, the interface idle (aka interface change) timeout uses a
qdf_mc_timer. This dependency on the MC thread means the MC thread
cannot be shutdown as part of the interface idle timeout work. This
wastes resources, and leads to the init/deinit paths to be out of sync
with respect to starting and stopping the MC thread. To address these
issues, use a delayed work to schedule the interface idle work instead
of a qdf_mc_timer.

Change-Id: I7570081112fa236a15d823e2a3857d252567f041
CRs-Fixed: 2112696
2017-11-16 11:40:22 -08:00
Nachiket Kukade
6549937aa7 qcacld-3.0: Prevent NULL pointer dereference on sap_adapter
In hdd_stop_sap_due_to_invalid_channel, sap_adapter is derived using
container_of operation on work structure. It is dereferenced to print
the sessiond id immediately followed by a NULL check.

Move debug print after the NULL check.

Change-Id: Ib22aaeba6d312621e66496fcd646319331305cd2
CRs-Fixed: 2137807
2017-11-16 11:40:19 -08:00
snandini
ae978de0fe Release 5.2.0.54K
Release 5.2.0.54K

Change-Id: Ieeccfbd2229026c667c508c4726e9e6d1b631181
CRs-Fixed: 774533
2017-11-16 07:22:00 -08:00
Vignesh Viswanathan
5b86f13ad9 qcacld-3.0: Fix buffer overwrite in wma_unified_debug_print_event_handler
In function wma_unified_debug_print_event_handler, datalen is
received from the FW and is used to mem copy data buffer from
FW into the local array dbgbuf. Since dbgbuf is a local array
of size 500 bytes, if datalen is greater than 500, buffer
overwrite occurs during memcpy.

Add sanity check to limit datalen to 500 bytes if value received
is greater than 500 bytes.

Change-Id: Id63b5106bc7a3d3836d17ae47d019bc8a71c928e
CRs-Fixed: 2134801
2017-11-16 07:22:00 -08:00