1. 01 Nov, 2017 9 commits
  2. 31 Oct, 2017 5 commits
  3. 30 Oct, 2017 2 commits
    • Kalle Valo's avatar
      Revert "ath10k: fix napi_poll budget overflow" · e48e9c42
      Kalle Valo authored
      Thorsten reported on <fa6e3ee2-91b5-a54b-afe3-87f30aac7a48@leemhuis.info> that
      commit c9353bf4 made ath10k unstable with QCA6174 on his Dell XPS13 (9360)
      with an error message:
      
      ath10k_pci 0000:3a:00.0: failed to extract amsdu: -11
      
      It only seemed to happen with certain APs, not all, but when it happened the
      only way to get ath10k working was to switch the wifi off and on with a hotkey.
      
      As this commit made things even worse (a warning vs breaking the whole
      connection) let's revert the commit for now and while the issue is being fixed.
      
      Link: http://lists.infradead.org/pipermail/ath10k/2017-October/010227.htmlReported-by: default avatarThorsten Leemhuis <linux@leemhuis.info>
      Signed-off-by: default avatarKalle Valo <kvalo@qca.qualcomm.com>
      e48e9c42
    • Vasanthakumar Thiagarajan's avatar
      ath10k: rebuild crypto header in rx data frames · 7eccb738
      Vasanthakumar Thiagarajan authored
      Rx data frames notified through HTT_T2H_MSG_TYPE_RX_IND and
      HTT_T2H_MSG_TYPE_RX_FRAG_IND expect PN/TSC check to be done
      on host (mac80211) rather than firmware. Rebuild cipher header
      in every received data frames (that are notified through those
      HTT interfaces) from the rx_hdr_status tlv available in the
      rx descriptor of the first msdu. Skip setting RX_FLAG_IV_STRIPPED
      flag for the packets which requires mac80211 PN/TSC check support
      and set appropriate RX_FLAG for stripped crypto tail. Hw QCA988X,
      QCA9887, QCA99X0, QCA9984, QCA9888 and QCA4019 currently need the
      rebuilding of cipher header to perform PN/TSC check for replay
      attack.
      
      Please note that removing crypto tail for CCMP-256, GCMP and GCMP-256 ciphers
      in raw mode needs to be fixed. Since Rx with these ciphers in raw
      mode does not work in the current form even without this patch and
      removing crypto tail for these chipers needs clean up, raw mode related
      issues in CCMP-256, GCMP and GCMP-256 can be addressed in follow up
      patches.
      Tested-by: default avatarManikanta Pubbisetty <mpubbise@qti.qualcomm.com>
      Signed-off-by: default avatarVasanthakumar Thiagarajan <vthiagar@qti.qualcomm.com>
      Signed-off-by: default avatarKalle Valo <kvalo@qca.qualcomm.com>
      7eccb738
  4. 29 Oct, 2017 24 commits