Age | Commit message (Collapse) | Author |
|
|
|
While creating nl messge with the help of
WifiVendorCommand.create(), there is a log to dump the data
being sent. This log is getting printed for most of the wifihal
messages.
But actual data gets filled in the nl message later. So don't
dump if the buffer is empty.
BUG: 28825972
Change-Id: Ifac90b092e63fc5456f13e9f94ed0143b008b5ec
|
|
The nl library maintains one local port pool for nl sockets, one
port is occupied when new nl socket is allocated and it needs to
released, otherwise the nl socket allocation will fail since no
local port can be used in nl socket allocation.
Wifi hal sets own local port for nl socket directly without
calling api and causes leak.
BUG: 30350620
Change-Id: I4bb1fd2c352c73cc246a2ba7f837e395f022651f
|
|
There is a possiblility while handling the wlan driver event
in the handleEvent of the RssiMonitor, the RssiMonitor stop
is also triggered. The stop monitor cleans RssiMonitor command
instance. In this case the handleEvent will crash as the object
is already deleted. To avoid this scenario moving the handler
creation under hal_info and adding checks to ensure that handler
is enabled/disabled prior to starting and stopping the monitor
command.
BUG: 29936203
Change-Id: Id0ab73313a03510f0b15b101e381112c4ace4aef
|
|
Fix CLANG warnings.
Change-Id: If07194f34abc44e1e58e8b38af59ec705a62ce55
CRs-Fixed: 1015162
Bug: 28825972
|
|
As part of timestamp synchronization firmware events, logs and F3
message formats have changed which would result in change in
processing of the same. This commit will address the change in
Wifi-Hal catering to the new format, at the same time maintaining
backward compatibility.
At least FW 4.3-00089 is required for working.
BUG: 29762703
|
|
am: 301f662f9d
Change-Id: Ife186fef4cfbf473456291f592e9172ce0fd2ed8
|
|
In QCA_NL80211_VENDOR_SUBCMD_LL_STATS_TYPE_PEERS event, dynamic
memory is allocated for pIfaceStat pointer. So, Free this
pointer in error conditions to avoid possible memory leakage.
Free memory allocated for tx_time_per_levels stats in
radio_stats.
Change-Id: I9af543e980af4eee400a9127449430f4b32a2fb4
BUG: 29247588
|
|
Update to AU_LINUX_ANDROID_LA.HB.1.3.9.06.00.01.213.187
wlan_hal:
895f88d Wifi-HAL: Increase the channel print buffer size to 256
120bfdb Wifi-HAL: RTT API Enhancement
fe22a17 Merge commit '5c1f1176572dc7d9bd24d96b91290d784f2c2f37' into LA.HB.1.3.9
5c1f117 Wifi-HAL: Include missing changes from AOSP code
252f45d Merge "Wifi-HAL: Create a local copy of qca-vendor.h"
Change-Id: Ib71ace2ec59d33f2c0965212a886a3524c40bd2c
|
|
driver/firmware can return invalid gscan_capabilities in some
cases and they can cause potential issues in framework.
max_scan_buckets is such gscan capability parameter which is
used by framework to allocate memory for the bucket configuration.
To avoid such issues, return failure to the
API wifi_get_gscan_capabilities() if max_scan_buckets is 0 or
failed to receive capabilities from driver.
Bug: 28530708
|
|
By default, ALOGV messages do not make it in the build. For
the Wifi HAL, however, we'd like the ability to dynamically
enable VERBOSE logging.
Update the makefile, so that ALOGV messages are compiled
into the library, on userdebug builds.
BUG=27857554
TEST=manual
Manual test:
$ lunch aosp_bullhead-userdebug && m -j64
$ strings out/target/product/bullhead/system/lib/libwifi-service.so \
| grep 'Initiialized diag sock'
-> match
$ strings out/target/product/bullhead/system/lib64/libwifi-service.so \
| grep 'Initiialized diag sock'
-> match
$ lunch aosp_bullhead-user
$ strings out/target/product/bullhead/system/lib/libwifi-service.so \
| grep 'Initiialized diag sock'
-> NO match
$ strings out/target/product/bullhead/system/lib64/libwifi-service.so \
| grep 'Initiialized diag sock'
-> NO match
Change-Id: Id592de85f6270f2392a4244cb27fe29ed23542f2
|
|
Add support to collect radio transmit per power levels in
msecs accrued over time.
BUG:27227497
Change-Id: Idb00c58540bb8f75040f358072541d2989072162
|
|
When printing logs that depend on values in a list,
concatenate the list items into a string. Then print
the string as a single log message.
Originally part of
https://partner-android-review.googlesource.com/#/c/558740
BUG=27779612
TEST=compile
Change-Id: I9402ff6f156193fc9c1c4086c617f1770332a2d0
|
|
1) demote some log messages from ALOGE/ALOGD to ALOGV
2) print those messages with a single logging call,
instead of multiple calls.
Originally part of
https://partner-android-review.googlesource.com/#/c/558740
BUG=27698661
TEST=compile
Change-Id: Ib374f86efe97fd3a4c7140893d9a731721aa3fa3
|
|
Originally part of
https://partner-android-review.googlesource.com/#/c/558740
BUG=28174258
TEST=compile
Change-Id: I14e986349aeaa04e17afea2644dde43471ec98b0
|
|
Originally part of
https://partner-android-review.googlesource.com/#/c/558740
BUG=28174258
TEST=compile
Change-Id: I28886969bad633c481e6ecd47bfa66f5201d7d83
|
|
Originally part of
https://partner-android-review.googlesource.com/#/c/558740
BUG=28174258
TEST=compile
Change-Id: I85b6afa15e6839738d7ec0e20c0425aecfc99147
|
|
Originally part of
https://partner-android-review.googlesource.com/#/c/558740
BUG=28174258
TEST=compile
Change-Id: I4261156fba894ed20626ac670b8f90353d47048b
|
|
Originally part of
https://partner-android-review.googlesource.com/#/c/558740
BUG=28174258
TEST=compile
Change-Id: I0ec26dcf0cffeb7c8d90461dfcddbc419cfaef99
|
|
Originally part of
https://partner-android-review.googlesource.com/#/c/558740
BUG=27698661
TEST=compile
Change-Id: I2feb5f0f336338ab127e179b8ea32acf5f94f2c4
|
|
Originally part of
https://partner-android-review.googlesource.com/#/c/558740
BUG=27698661
TEST=compile
Change-Id: Ibfa3245bb91b8138d41566f2e8f7060423c07a40
|
|
Originally part of
https://partner-android-review.googlesource.com/#/c/558740
BUG=27698661
TEST=compile
Change-Id: I97aa34497cfc749190f459c7e8bc6d5f6c93b98b
|
|
Originally part of
https://partner-android-review.googlesource.com/#/c/558740
BUG=27698661
TEST=compile
Change-Id: I7264dd7a0095c24bf1f183c9f929bb79ef095703
|
|
Originally part of
https://partner-android-review.googlesource.com/#/c/558740
BUG=27698661
TEST=compile
Change-Id: I04a6dd680b23322a5382ff144d6ea533f37be2f8
|
|
Originally part of
https://partner-android-review.googlesource.com/#/c/558740
BUG=27698661
TEST=compile
Change-Id: I82f404d731ce618d469b941e28445d94feb19b07
|
|
Originally part of
https://partner-android-review.googlesource.com/#/c/558740
BUG=27698661
TEST=compile
Change-Id: Ia3ae5296ac890d8ce87ed374a5060512b27b789f
|
|
Originally part of
https://partner-android-review.googlesource.com/#/c/558740
BUG=27698661
TEST=compile
Change-Id: I76caca25ed835c10bb94444b2928bf48f6861131
|
|
Originally part of
https://partner-android-review.googlesource.com/#/c/558740
BUG=27698661
TEST=compile
Change-Id: I420cdcf8c279de4dd85d74b4bdec98e4f2082694
|
|
Originally part of
https://partner-android-review.googlesource.com/#/c/558740
BUG=27698661
TEST=compile
Change-Id: I4b94a1e8e0d155fb78e128e9ffe29b050fba9ecc
|
|
Originally part of
https://partner-android-review.googlesource.com/#/c/558740
BUG=27698661
TEST=compile
Change-Id: I10c66782f1dea5e17722c1c4f3958fcd7250fb01
|
|
Originally part of
https://partner-android-review.googlesource.com/#/c/558740
BUG=27698661
TEST=compile
Change-Id: I6c8d3e09eedd9675439d6a5a5ad17eabc16416db
|
|
Originally part of
https://partner-android-review.googlesource.com/#/c/558740
BUG=27698661
BUG=27835354
TEST=compile
Change-Id: I4bc744370131af1058cbbb634f92579ed1b8283f
|
|
|
|
Wifihal collects packet fate stats to a local buffer and the stats
will be copied to the buffers provided by framework in get() APIs.
Protect reads and writes to this buffer with a mutex to avoid
read from get() while write is going on in the event context.
BUG: 27799235
|
|
|
|
RTT API's are modified to allow responder to indicate the RTT
preamble which can be advertised in BLE Beacon. So, modify
RTT HAL to comply with new API.
BUG: 28071418
Change-Id: I04062e9c603c0f00cc90880f0d6a040b1fe8abe5
|
|
DRIVER STOP command needs to be sent to driver before
bringing the interface down. This is done to address
a bug where driver is de-registering n/w iface as
it can't distinguish between wifi off and DRIVER STOP.
BUG: 27576943
Change-Id: I9885b7858f7ee0dff3d5dcc4c64360147dfd8d9f
|
|
into nyc-dev
|
|
In parse_{tx/rx}_pkt_fate_stats(), driver_timestamp_usec and
firmware_timestamp_usec are u32 fields, whereas driver_ts is a
u32 field and fw_ts is a u16 field. Hence, external type casting
is not required here.
BUG=27579488
|
|
Change-Id: Ic5c79807e6bfd0e507ad9a7f1a14f73a16acb50c
|
|
|
|
New vendor specific wifi configuration have been introduced for
addressing few additional wifi configuration. Adding enums related
to those so that vendor_definitions.h is in sync with the enum
values used by the driver.
|
|
Driver swaps the wmsg length based on endianness for
ANI_NL_MSG_PUMAC messages. So, use ntohs() to get correct length
of wmsg. The reason this swap is done in Wi-Fi HAL is to co work
with the already existing tools that already does the same while
operating with the host driver.
|
|
Wifihal allocates memory for a frame when it receives the
corresponding stat. It gets freed when wifihal receives first
packet of the next connection instance. Framework can query
for the same any number of times. So, wifihal should maintain
the current stats till it gets next connection instance stats.
So, do not free it in get() APIs.
Correct memcpy() length for management frames from
MAX_FRAME_LEN_ETHERNET to MAX_FRAME_LEN_80211_MGMT.
BUG: 27502434
Change-Id: I0b5756e1a916f95290c85e90a5ae42c7fcd62d18
|
|
In requestResponse(), nl message is getting freed after receiving
a response for the nl message, and wifi_hal is trying to fill the same
message again in wifi_set_packet_filter() for next fragment of
data. This is causing an invalid memory access. To avoid this,
destroy the object after sending each fragment to driver and
allocate a fresh object which in turn creates nl message and
initializes it.
BUG: 27595799
Change-Id: I654203a55206a5efe820146bde43c20b76b55880
|
|
Will land more targeted CLs, with more detail about what's being fixed.
This reverts commit c193fd5cb051a566bd1a0e9fd565504cab46ff23.
Change-Id: I95d4856ffa69c575790927a6cc90e6c246a39e67
|
|
Fix multiple issues
1) Extract wmsg length from nlmsg_hdr with ntohs()
2) Do not free local frame_content in get()
3) Avoid illegal memory access in wifi_set_packet_filter fn
4) Updating new enums related to WIFI Configuration
BUG: 27502434
BUG: 27595799
Change-Id: I369a6b278f3e587f07d3a57be97b61eda658104d
|
|
Change-Id: I77104c5183d4c83c5aa8cadaad83cdd2eb35cc7f
|
|
To avoid illegal memory access, if received message is shortened,
add a length check before proceeding to parse data.
Change-Id: Idf6e24af086abd4521eb4f95b0967b582001a951
CRs-Fixed: 970669
|
|
Introduce new QCA specific wifi configuration attribute under
QCA_NL80211_VENDOR_SUBCMD_SET_WIFI_CONFIGURATION, to allow dynamic
changing of Fine Time Measurement capability at runtime.
Also adding one minor change to resolve internal CLANG error seen.
Change-Id: Iff1476ece72e1b88a7cf65560e10e74157d8057c
|