Skip to content
Permalink
Ryder-Lee/mt76…
Switch branches/tags

Commits on Jul 14, 2021

  1. mt76: mt7915: remove mt7915_sta_stats

    mt7915_sta_stats is no longer needed after tx rate reworking.
    
    Signed-off-by: Ryder Lee <ryder.lee@mediatek.com>
    ryderlee1110 authored and intel-lab-lkp committed Jul 14, 2021
  2. mt76: mt7915: report tx rate directly from tx status

    Report tx rate from tx status packets instead of receving periodic mcu
    event. This improves flexibility, accuracy and AQL performance, and
    simplifies code flow for better readability.
    
    Signed-off-by: Ryder Lee <ryder.lee@mediatek.com>
    ryderlee1110 authored and intel-lab-lkp committed Jul 14, 2021
  3. mt76 mt7915: take RCU read lock when calling ieee80211_bss_get_elem()

    As ieee80211_bss_get_elem() derefences an RCU to return ssid_ie, both
    the call to this function and any operation on this variable need
    protection by the RCU read lock.
    
    Signed-off-by: Ryder Lee <ryder.lee@mediatek.com>
    ryderlee1110 authored and intel-lab-lkp committed Jul 14, 2021

Commits on Jun 24, 2021

  1. iwlwifi: acpi: remove unused function iwl_acpi_eval_dsm_func()

    Stephen reported a warning:
    
    drivers/net/wireless/intel/iwlwifi/fw/acpi.c:720:12: warning: 'iwl_acpi_eval_dsm_func' defined but not used [-Wunused-function]
    
    The warning is correct and the function is not used anywhere, so let's
    just remove it.
    
    Reported-by: Stephen Rothwell <sfr@canb.auug.org.au>
    Fixes: 7119f02 ("iwlwifi: mvm: support BIOS enable/disable for 11ax in Russia")
    Signed-off-by: Kalle Valo <kvalo@codeaurora.org>
    Acked-by: Luca Coelho <luciano.coelho@intel.com>
    Signed-off-by: Kalle Valo <kvalo@codeaurora.org>
    Link: https://lore.kernel.org/r/20210624052918.4946-1-kvalo@codeaurora.org
    Kalle Valo committed Jun 24, 2021
  2. rtw88: fix c2h memory leak

    Fix erroneous code that leads to unreferenced objects. During H2C
    operations, some functions returned without freeing the memory that only
    the function have access to. Release these objects when they're no longer
    needed to avoid potentially memory leaks.
    
    Signed-off-by: Po-Hao Huang <phhuang@realtek.com>
    Signed-off-by: Ping-Ke Shih <pkshih@realtek.com>
    Signed-off-by: Kalle Valo <kvalo@codeaurora.org>
    Link: https://lore.kernel.org/r/20210624023459.10294-1-pkshih@realtek.com
    Po-Hao Huang authored and Kalle Valo committed Jun 24, 2021
  3. brcmfmac: support parse country code map from DT

    With any regulatory domain requests coming from either user space or
    802.11 IE (Information Element), the country is coded in ISO3166
    standard.  It needs to be translated to firmware country code and
    revision with the mapping info in settings->country_codes table.
    Support populate country_codes table by parsing the mapping from DT.
    
    The BRCMF_BUSTYPE_SDIO bus_type check gets separated from general DT
    validation, so that country code can be handled as general part rather
    than SDIO bus specific one.
    
    Signed-off-by: Shawn Guo <shawn.guo@linaro.org>
    Reviewed-by: Arend van Spriel <arend.vanspriel@broadcom.com>
    Signed-off-by: Kalle Valo <kvalo@codeaurora.org>
    Link: https://lore.kernel.org/r/20210417075428.2671-1-shawn.guo@linaro.org
    shawnguo2 authored and Kalle Valo committed Jun 24, 2021

Commits on Jun 23, 2021

  1. Merge tag 'iwlwifi-next-for-kalle-2021-06-22' of git://git.kernel.org…

    …/pub/scm/linux/kernel/git/iwlwifi/iwlwifi-next
    
    iwlwifi patches for v5.14
    
    * Some robustness improvements in the PCI code;
    * Remove some duplicate and unused declarations;
    * Improve PNVM load robustness by increasing the timeout a bit;
    * Support for a new HW;
    * Suport for BIOS control of 11ax enablement in Russia;
    * Support UNII4 enablement from BIOS;
    * Support LMR feedback;
    * Fix in TWT;
    * Some fixes in IML (image loader) DMA handling;
    * Fixes in WoWLAN;
    * Updates in the WoWLAN FW commands;
    * Add one new device to the PCI ID lists;
    * Support reading PNVM from a UEFI variable;
    * Bump the supported FW API version;
    * Some other small fixes, clean-ups and improvements.
    
    # gpg: Signature made Tue 22 Jun 2021 05:19:19 PM EEST
    # gpg:                using RSA key 1772CD7E06F604F5A6EBCB26A1479CA21A3CC5FA
    # gpg: Good signature from "Luciano Roth Coelho (Luca) <luca@coelho.fi>" [full]
    # gpg:                 aka "Luciano Roth Coelho (Intel) <luciano.coelho@intel.com>" [full]
    Kalle Valo committed Jun 23, 2021
  2. brcmfmac: Silence error messages about unsupported firmware features

    KMSG is flooded with error messages about unsupported firmware
    features of BCM4329 chip. The GET_ASSOCLIST error became especially
    noisy with a newer NetworkManager version of Ubuntu 21.04. Turn the
    noisy error messages into info messages and print them out only once.
    
    Signed-off-by: Dmitry Osipenko <digetx@gmail.com>
    Signed-off-by: Kalle Valo <kvalo@codeaurora.org>
    Link: https://lore.kernel.org/r/20210511211549.30571-2-digetx@gmail.com
    digetx authored and Kalle Valo committed Jun 23, 2021
  3. cfg80211: Add wiphy_info_once()

    Add wiphy_info_once() helper that prints info message only once.
    
    Signed-off-by: Dmitry Osipenko <digetx@gmail.com>
    Acked-by: Johannes Berg <johannes@sipsolutions.net>
    Signed-off-by: Kalle Valo <kvalo@codeaurora.org>
    Link: https://lore.kernel.org/r/20210511211549.30571-1-digetx@gmail.com
    digetx authored and Kalle Valo committed Jun 23, 2021
  4. Merge ath-next from git://git.kernel.org/pub/scm/linux/kernel/git/kva…

    …lo/ath.git
    
    ath.git patches for v5.14. Major changes:
    
    ath11k
    
    * enable support for QCN9074 PCI devices
    Kalle Valo committed Jun 23, 2021

Commits on Jun 22, 2021

  1. wcn36xx: Avoid memset() beyond end of struct field

    In preparation for FORTIFY_SOURCE performing compile-time and run-time
    field bounds checking for memset(), avoid intentionally writing across
    neighboring array fields.
    
    Instead of writing past the end of the header to reach the rest of
    the body, replace the redundant function with existing macro to wipe
    struct contents and set field values. Additionally adjusts macro to add
    missing parens.
    
    Signed-off-by: Kees Cook <keescook@chromium.org>
    Signed-off-by: Kalle Valo <kvalo@codeaurora.org>
    Link: https://lore.kernel.org/r/20210617171058.3410494-1-keescook@chromium.org
    kees authored and Kalle Valo committed Jun 22, 2021
  2. ath11k: Avoid memcpy() over-reading of he_cap

    In preparation for FORTIFY_SOURCE performing compile-time and run-time
    field bounds checking for memcpy(), memmove(), and memset(), avoid
    intentionally writing across neighboring array fields.
    
    Since peer_he_cap_{mac,phy}info and he_cap_elem.{mac,phy}_cap_info are not
    the same sizes, memcpy() was reading beyond field boundaries. Instead,
    correctly cap the copy length and pad out any difference in size
    (peer_he_cap_macinfo is 8 bytes whereas mac_cap_info is 6, and
    peer_he_cap_phyinfo is 12 bytes whereas phy_cap_info is 11).
    
    Signed-off-by: Kees Cook <keescook@chromium.org>
    Signed-off-by: Kalle Valo <kvalo@codeaurora.org>
    Link: https://lore.kernel.org/r/20210616195410.1232119-1-keescook@chromium.org
    kees authored and Kalle Valo committed Jun 22, 2021
  3. mt7601u: add USB device ID for some versions of XiaoDu WiFi Dongle.

    USB device ID of some versions of XiaoDu WiFi Dongle is 2955:1003
    instead of 2955:1001. Both are the same mt7601u hardware.
    
    Signed-off-by: Wei Mingzhi <whistler@member.fsf.org>
    Acked-by: Jakub Kicinski <kubakici@wp.pl>
    Signed-off-by: Kalle Valo <kvalo@codeaurora.org>
    Link: https://lore.kernel.org/r/20210618160840.305024-1-whistler@member.fsf.org
    weimzh authored and Kalle Valo committed Jun 22, 2021
  4. mwifiex: Avoid memset() over-write of WEP key_material

    In preparation for FORTIFY_SOURCE performing compile-time and run-time
    field bounds checking for memset(), avoid intentionally writing across
    neighboring array fields.
    
    When preparing to call mwifiex_set_keyparamset_wep(), key_material is
    treated very differently from its structure layout (which has only a
    single struct mwifiex_ie_type_key_param_set). Instead, add a new type to
    the union so memset() can correctly reason about the size of the
    structure.
    
    Note that the union ("params", 196 bytes) containing key_material was
    not large enough to hold the target of this memset(): sizeof(struct
    mwifiex_ie_type_key_param_set) == 60, NUM_WEP_KEYS = 4, so 240
    bytes, or 44 bytes past the end of "params". The good news is that
    it appears that the command buffer, as allocated, is 2048 bytes
    (MWIFIEX_SIZE_OF_CMD_BUFFER), so no neighboring memory appears to be
    getting clobbered.
    
    Signed-off-by: Kees Cook <keescook@chromium.org>
    Reviewed-by: Brian Norris <briannorris@chromium.org>
    Signed-off-by: Kalle Valo <kvalo@codeaurora.org>
    Link: https://lore.kernel.org/r/20210617171522.3410951-1-keescook@chromium.org
    kees authored and Kalle Valo committed Jun 22, 2021
  5. rtlwifi: rtl8192de: Fully initialize curvecount_val

    In preparation for FORTIFY_SOURCE performing compile-time and run-time
    field bounds checking for memcpy(), memmove(), and memset(), avoid
    intentionally writing across neighboring array fields.
    
    The size argument to memset() is bytes, but the array element size
    of curvecount_val is u32, so "CV_CURVE_CNT * 2" was only 1/4th of the
    contents of curvecount_val. Adjust memset() to wipe full buffer size.
    
    Signed-off-by: Kees Cook <keescook@chromium.org>
    Reviewed-by: Larry Finger <Larry.Finger@lwfinger.net>
    Signed-off-by: Kalle Valo <kvalo@codeaurora.org>
    Link: https://lore.kernel.org/r/20210617171317.3410722-1-keescook@chromium.org
    kees authored and Kalle Valo committed Jun 22, 2021
  6. mwl8k: Avoid memcpy() over-reading of mcs.rx_mask

    In preparation for FORTIFY_SOURCE performing compile-time and run-time
    field bounds checking for memcpy(), memmove(), and memset(), avoid
    intentionally reading across neighboring array fields. Use the
    sub-structure address directly.
    
    Signed-off-by: Kees Cook <keescook@chromium.org>
    Signed-off-by: Kalle Valo <kvalo@codeaurora.org>
    Link: https://lore.kernel.org/r/20210617041431.2168953-1-keescook@chromium.org
    kees authored and Kalle Valo committed Jun 22, 2021
  7. orinoco: Avoid field-overflowing memcpy()

    In preparation for FORTIFY_SOURCE performing compile-time and run-time
    field bounds checking for memcpy(), memmove(), and memset(), avoid
    intentionally writing across neighboring array fields.
    
    Validate the expected key size and introduce a wrapping structure
    to use as the multi-field memcpy() destination so that overflows
    can be correctly detected.
    
    Signed-off-by: Kees Cook <keescook@chromium.org>
    Signed-off-by: Kalle Valo <kvalo@codeaurora.org>
    Link: https://lore.kernel.org/r/20210616203952.1248910-1-keescook@chromium.org
    kees authored and Kalle Valo committed Jun 22, 2021
  8. rtw88: coex: remove unnecessary variable and label

    In some funciton, the variable ret just used as return value,and
    out label just return ret,so ret and out label are unnecessary,
    we should delete these and use return true/false to replace.
    
    Signed-off-by: wengjianfeng <wengjianfeng@yulong.com>
    Signed-off-by: Kalle Valo <kvalo@codeaurora.org>
    Link: https://lore.kernel.org/r/20210520005545.31272-1-samirweng1979@163.com
    wengjianfeng authored and Kalle Valo committed Jun 22, 2021
  9. rtw88: add quirks to disable pci capabilities

    8821CE with ASPM cannot work properly on Protempo Ltd L116HTN6SPW. Add a
    quirk to disable the cap.
    
    The reporter describes the symptom is that this module (driver) causes
    frequent freezes, randomly but usually within a few minutes of running
    (thus very soon after boot): screen display remains frozen, no response
    to either keyboard or mouse input. All I can do is to hold the power
    button to power off, then reboot.
    
    Reported-by: Paul Szabo <psz2036@gmail.com>
    Signed-off-by: Ping-Ke Shih <pkshih@realtek.com>
    Signed-off-by: Kalle Valo <kvalo@codeaurora.org>
    Link: https://lore.kernel.org/r/20210607012254.6306-1-pkshih@realtek.com
    Ping-Ke Shih authored and Kalle Valo committed Jun 22, 2021
  10. rtw88: refine unwanted h2c command

    Don't send beacon filter h2c when there is no valid context.
    Return early instead of printing out warning messages, so others
    won't get confused.
    
    Signed-off-by: Po-Hao Huang <phhuang@realtek.com>
    Signed-off-by: Ping-Ke Shih <pkshih@realtek.com>
    Signed-off-by: Kalle Valo <kvalo@codeaurora.org>
    Link: https://lore.kernel.org/r/20210528032901.12927-3-pkshih@realtek.com
    Po-Hao Huang authored and Kalle Valo committed Jun 22, 2021
  11. rtw88: dump FW crash via devcoredump

    Use device coredump framework instead of print_hex_dump to support
    FW crash dump. Pass data to the framework if preparing and dumping
    are successful. The framework will take the ownership of the data.
    The data will be freed after the framework determines its lifetime
    is over. A new coredump will not work if the previous one still
    exists.
    
    Signed-off-by: Zong-Zhe Yang <kevin_yang@realtek.com>
    Signed-off-by: Ping-Ke Shih <pkshih@realtek.com>
    Signed-off-by: Kalle Valo <kvalo@codeaurora.org>
    Link: https://lore.kernel.org/r/20210528032901.12927-2-pkshih@realtek.com
    Zong-Zhe Yang authored and Kalle Valo committed Jun 22, 2021
  12. rtw88: notify fw when driver in scan-period to avoid potential problem

    It is found that driver scan could be affected by dynamic mechanism
    of firmware, so we notify firmware to stop it in the scan period.
    Another, firmware will detect the background noise and report to
    driver for further use.
    
    Signed-off-by: Chin-Yen Lee <timlee@realtek.com>
    Signed-off-by: Ping-Ke Shih <pkshih@realtek.com>
    Signed-off-by: Kalle Valo <kvalo@codeaurora.org>
    Link: https://lore.kernel.org/r/20210514075517.14216-3-pkshih@realtek.com
    Chin-Yen Lee authored and Kalle Valo committed Jun 22, 2021
  13. rtw88: add rtw_fw_feature_check api

    add api to check if a certain feature is supported.
    
    Signed-off-by: Chin-Yen Lee <timlee@realtek.com>
    Signed-off-by: Ping-Ke Shih <pkshih@realtek.com>
    Signed-off-by: Kalle Valo <kvalo@codeaurora.org>
    Link: https://lore.kernel.org/r/20210514075517.14216-2-pkshih@realtek.com
    Chin-Yen Lee authored and Kalle Valo committed Jun 22, 2021
  14. rtw88: 8822c: update RF parameter tables to v62

    Update RTL8822C devices' RF tables to v62.
    This fixes higher than expected spur in 2400 MHz under CCK mask.
    
    Signed-off-by: Po-Hao Huang <phhuang@realtek.com>
    Signed-off-by: Ping-Ke Shih <pkshih@realtek.com>
    Signed-off-by: Kalle Valo <kvalo@codeaurora.org>
    Link: https://lore.kernel.org/r/20210506083643.18317-1-pkshih@realtek.com
    Po-Hao Huang authored and Kalle Valo committed Jun 22, 2021
  15. rtw88: Remove duplicate include of coex.h

    In commit fb8517f ("rtw88: 8822c: add CFO tracking"),
    "coex.h" was added here which caused the duplicate include.
    Remove the later duplicate include.
    
    Signed-off-by: Wan Jiabing <wanjiabing@vivo.com>
    Signed-off-by: Kalle Valo <kvalo@codeaurora.org>
    Link: https://lore.kernel.org/r/20210430024951.33406-1-wanjiabing@vivo.com
    Wan Jiabing authored and Kalle Valo committed Jun 22, 2021
  16. rtw88: 8822c: fix lc calibration timing

    Before this patch, we use value from 2 seconds ago to decide
    whether we should do lc calibration.
    Although this don't happen frequently, fix flow to the way it should be.
    
    Fixes: 7ae7784 ("rtw88: 8822c: add LC calibration for RTL8822C")
    Signed-off-by: Po-Hao Huang <phhuang@realtek.com>
    Signed-off-by: Ping-Ke Shih <pkshih@realtek.com>
    Signed-off-by: Kalle Valo <kvalo@codeaurora.org>
    Link: https://lore.kernel.org/r/20210426013252.5665-3-pkshih@realtek.com
    Po-Hao Huang authored and Kalle Valo committed Jun 22, 2021
  17. rtw88: add path diversity

    This feature chooses to transmit with antenna that has better signal
    strength periodically under 1ss rate.
    
    It can benefit connection quality in the following cases:
    1. User is far away from the AP.
    2. The far-field pattern of the antenna showed significant signal
    strength difference.
    
    Signed-off-by: Po-Hao Huang <phhuang@realtek.com>
    Signed-off-by: Ping-Ke Shih <pkshih@realtek.com>
    Signed-off-by: Kalle Valo <kvalo@codeaurora.org>
    Link: https://lore.kernel.org/r/20210426013252.5665-2-pkshih@realtek.com
    Po-Hao Huang authored and Kalle Valo committed Jun 22, 2021
  18. rtw88: add beacon filter support

    Adding this supports beacon filter and CQM.
    Let firmware perform connection quality monitor and beacon processing.
    This make host CPU wakeup less under power save mode.
    To make mechanisms work as usual, fw will notify driver events such as
    signal change and beacon loss.
    
    This feature needs firmware 9.9.8 or newer to support it, and driver is
    compatible with older firmware.
    
    Signed-off-by: Po-Hao Huang <phhuang@realtek.com>
    Signed-off-by: Ping-Ke Shih <pkshih@realtek.com>
    Signed-off-by: Kalle Valo <kvalo@codeaurora.org>
    Link: https://lore.kernel.org/r/20210426013252.5665-1-pkshih@realtek.com
    Po-Hao Huang authored and Kalle Valo committed Jun 22, 2021
  19. iwlwifi: bump FW API to 64 for AX devices

    Start supporting API version 64 for AX devices.
    
    Signed-off-by: Luca Coelho <luciano.coelho@intel.com>
    Link: https://lore.kernel.org/r/iwlwifi.20210621103449.8144a5b7d9a7.Ibf77fd7daa7d22f7c46d1c4a572ab9441a761299@changeid
    Signed-off-by: Luca Coelho <luciano.coelho@intel.com>
    lucacoelho committed Jun 22, 2021
  20. iwlwifi: fw: dump TCM error table if present

    If the TCM is present in the hardware (as advertised in the firmware
    file TLV data), dump its error log table during firmware error dumps.
    
    Signed-off-by: Johannes Berg <johannes.berg@intel.com>
    Signed-off-by: Luca Coelho <luciano.coelho@intel.com>
    Link: https://lore.kernel.org/r/iwlwifi.20210621103449.2d2149f6654f.Id831f8fbca59900ba7efc623ffca0ca938b664d3@changeid
    Signed-off-by: Luca Coelho <luciano.coelho@intel.com>
    jmberg-intel authored and lucacoelho committed Jun 22, 2021
  21. iwlwifi: add 9560 killer device

    add new killer devices configurations.
    
    Signed-off-by: ybaruch <yaara.baruch@intel.com>
    Signed-off-by: Luca Coelho <luciano.coelho@intel.com>
    Link: https://lore.kernel.org/r/iwlwifi.20210621103449.4179f7191531.I3d5ed6b2b39fcd42863a679e21bda23a6c14253e@changeid
    Signed-off-by: Luca Coelho <luciano.coelho@intel.com>
    ybaruch authored and lucacoelho committed Jun 22, 2021
  22. iwlwifi: move error dump to fw utils

    Conceptually, this belongs more into the firmware utils
    rather than the mvm opmode, so move the collection and
    output there.
    
    Note that this slightly changes the format of the Status
    line.
    
    Signed-off-by: Johannes Berg <johannes.berg@intel.com>
    Signed-off-by: Luca Coelho <luciano.coelho@intel.com>
    Link: https://lore.kernel.org/r/iwlwifi.20210621103449.b82b60d81346.Ide3b688107f6a59c7fc7eb1d8f2002b0a5c1f2d2@changeid
    Signed-off-by: Luca Coelho <luciano.coelho@intel.com>
    jmberg-intel authored and lucacoelho committed Jun 22, 2021
  23. iwlwifi: support loading the reduced power table from UEFI

    This new feature allows OEMs to set a special reduced power table in a
    UEFI variable, which we use to tell the firmware to change the TX
    power tables.
    
    Read the variable and store it in a dram block to pass it to the
    firmware.  We do this as part of the PNVM loading flow.
    
    Signed-off-by: Luca Coelho <luciano.coelho@intel.com>
    Link: https://lore.kernel.org/r/iwlwifi.20210621103449.259a33ba5074.I2e0bb142d2a9c412547cba89b62dd077b328fdc4@changeid
    Signed-off-by: Luca Coelho <luciano.coelho@intel.com>
    lucacoelho committed Jun 22, 2021
  24. iwlwifi: move UEFI code to a separate file

    We are going to read more variables from UEFI, so it's cleaner to have
    all the code that handles UEFI variables in a separate file.
    
    Signed-off-by: Luca Coelho <luciano.coelho@intel.com>
    Link: https://lore.kernel.org/r/iwlwifi.20210621103449.c705ac86f2e9.Ia7421c17fe52929e4098b4f0cf070809ed3ef906@changeid
    Signed-off-by: Luca Coelho <luciano.coelho@intel.com>
    lucacoelho committed Jun 22, 2021
  25. iwlwifi: mvm: introduce iwl_wowlan_get_status_cmd

    We need to pass the station id to teach the firmware on which
    station id we want to get the status.
    
    Signed-off-by: Emmanuel Grumbach <emmanuel.grumbach@intel.com>
    Signed-off-by: Luca Coelho <luciano.coelho@intel.com>
    Link: https://lore.kernel.org/r/iwlwifi.20210621103449.45218d913d07.I61a086936508230d86b454636945ceb0b9ea09fd@changeid
    Signed-off-by: Luca Coelho <luciano.coelho@intel.com>
    egrumbach authored and lucacoelho committed Jun 22, 2021
Older