368 Commits

Author SHA1 Message Date
coolsnowwolf
2513ccaf94 mac80211: NSS classify tx support 2021-07-09 17:39:01 +08:00
coolsnowwolf
4790aa244b mac80211: add tasklet_kill step during NSS interface take down 2021-07-08 12:57:11 +08:00
coolsnowwolf
e82fddcf0e mac80211: add support for NSS firmware 2021-07-08 12:27:04 +08:00
Tianling Shen
0f29dec405
Revert "ath11k: fixes a memory leak as the MHI controller was allocated but never freed" (#7286)
This makes memory leak more seriously.

This reverts commit 48a880a19079af7e4f071820e447514d6079d381.

Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2021-07-06 06:27:21 +00:00
coolsnowwolf
6675de3732 Revert "ath11k: fix for peer memory corruption"
This reverts commit 83b29e014f063d23bd6859a37ce4ff424a080ab8.
2021-07-06 14:26:13 +08:00
coolsnowwolf
6ad4588a9b ath11k: allow vht on 2.4g 2021-07-06 00:08:31 +08:00
coolsnowwolf
83b29e014f ath11k: fix for peer memory corruption 2021-07-06 00:07:39 +08:00
coolsnowwolf
6967bf73f0 ipq807x: ax6/ax3600 use 512M RAM profile 2021-07-06 00:06:32 +08:00
coolsnowwolf
48a880a190 ath11k: fixes a memory leak as the MHI controller was allocated but never freed 2021-07-05 18:01:22 +08:00
Beginner
12a44d5e54
mac80211: backport fix for nl80211 control port tx (fixes FS#3857) (#7241)
Signed-off-by: Felix Fietkau <nbd@nbd.name>

Co-authored-by: Felix Fietkau <nbd@nbd.name>
2021-07-01 05:27:14 +00:00
coolsnowwolf
a9b30b2b2d ipsec: disable ESP offload 2021-06-30 22:02:26 +08:00
coolsnowwolf
a7e39ff214 x86: gen EFI image only by default 2021-06-30 17:30:55 +08:00
Beginner
ced4dc7500
mac80211: fix a regression in starting aggregation sessions on mesh interfaces (#7226)
Signed-off-by: Felix Fietkau <nbd@nbd.name>

Co-authored-by: Felix Fietkau <nbd@nbd.name>
2021-06-30 01:01:01 +08:00
coolsnowwolf
87d72cae64 mac80211: remove ath11k nss code temporality 2021-06-29 22:24:20 +08:00
coolsnowwolf
892b521774 mac80211: grace code 2021-06-29 17:09:06 +08:00
coolsnowwolf
9faf3ea90d mac80211: add ipq807x dep for ath11k nss 2021-06-29 16:19:40 +08:00
coolsnowwolf
9be314ba8f mac80211: add ath11k nss dependence 2021-06-29 14:07:54 +08:00
coolsnowwolf
37efc3f069 ath11k: Update tx descriptor search index properly 2021-06-29 12:03:04 +08:00
coolsnowwolf
9e2257c44a ath11k: add hw nss ax wifi offload support 2021-06-29 11:47:43 +08:00
coolsnowwolf
aa3cc2ddfa ath11k: add decap offload support 2021-06-29 11:42:28 +08:00
Bob Cantor
5df9eeddbf mac80211: print an error if wifi teardown fails
drv_mac80211_teardown fails silently if the device to be torn down is
not defined.  This commit prints an error message.

branches affected: trunk, 21.02

Signed-off-by: Bob Cantor <coxede6557@w3boats.com>
2021-06-29 11:17:01 +08:00
Bob Cantor
00be744e8f mac80211: always call wireless_set_data (FS#3784)
When wifi is turned off, drv_mac80211_teardown sometimes fails (silently)
because the device to be torn down is not defined.

This situation arises if drv_mac80211_setup was called twice when
wifi was turned on.

This commit ensures that the device to be torn down is always defined
in drv_mac80211_teardown.

Steps to reproduce:

1) Use /sbin/wifi to turn on wifi.
   uci set wireless.@wifi-iface[0].disabled=0
   uci set wireless.@wifi-device[0].disabled=0
   uci commit
   wifi

2) Use /sbin/wifi to turn off wifi.
   uci set wireless.@wifi-device[0].disabled=1
   uci commit
   wifi

3) Observe that wifi is still up.

branches affected: trunk, 21.02

Signed-off-by: Bob Cantor <coxede6557@w3boats.com>
2021-06-29 11:16:40 +08:00
Bob Cantor
9cdb2a6cd3 mac80211: fix no_reload logic (FS#3902)
If drv_mac80211_setup is called twice with the same wifi configuration,
then the second call returns early with error HOSTAPD_START_FAILED.
(wifi works nevertheless, despite the fact that setup is incomplete.  But
"ubus call network.wireless status" erroneously reports that radio0 is down.)

The relevant part of drv_mac80211_setup is,

if [ "$no_reload" != "0" ]; then
        add_ap=1
        ubus wait_for hostapd
        local hostapd_res="$(ubus call hostapd config_add "{\"iface\":\"$primary_ap\", \"config\":\"${hostapd_conf_file}\"}")"
        ret="$?"
        [ "$ret" != 0 -o -z "$hostapd_res" ] && {
                wireless_setup_failed HOSTAPD_START_FAILED
                return
        }
        wireless_add_process "$(jsonfilter -s "$hostapd_res" -l 1 -e @.pid)" "/usr/sbin/hostapd" 1 1
fi

This commit sets no_reload = 0 during the second call of drv_mac80211_setup.

It is perhaps worth providing a way to reproduce the situation
where drv_mac80211_setup is called twice.

When /sbin/wifi is used to turn on wifi,
   uci set wireless.@wifi-iface[0].disabled=0
   uci set wireless.@wifi-device[0].disabled=0
   uci commit
   wifi

/sbin/wifi makes the following ubus calls,
   ubus call network reload
   ubus call network.wireless down
   ubus call network.wireless up

The first and third ubus calls both call drv_mac80211_setup,
while the second ubus call triggers wireless_device_setup_cancel.
So the call sequence becomes,

   drv_mac80211_setup
   wireless_device_setup_cancel
   drv_mac80211_setup

In contrast, when LuCI is used to turn on wifi only a single call
is made to drv_mac80211_setup.

branches affected: trunk, 21.02

Signed-off-by: Bob Cantor <coxede6557@w3boats.com>
2021-06-29 11:16:16 +08:00
AmadeusGhost
41ba774971
ath10k: re-added 256qam support (#7200)
* mac80211: allow VHT on 2.4GHz

Allow VHT rate on 2.4GHz in order to use 256-QAM

Signed-off-by: DENG Qingfang <dengqf6@mail2.sysu.edu.cn>

* ath10k: allow VHT on 2.4GHz

Signed-off-by: DENG Qingfang <dengqf6@mail2.sysu.edu.cn>

* hostapd: add vendor_vht option

hostapd has vendor_vht option to enable VHT (256-QAM) on 2.4GHz
Add this option to hostapd.sh so users can enable it via uci

Signed-off-by: DENG Qingfang <dengqf6@mail2.sysu.edu.cn>

* mac80211: ath.mk: typo fixes

Co-authored-by: DENG Qingfang <dengqf6@mail2.sysu.edu.cn>
2021-06-27 17:47:04 +08:00
coolsnowwolf
5e0c803478 mac80211: enable ATH10K THERMAL 2021-06-27 01:17:59 +08:00
coolsnowwolf
37e0686458 ipq807x: add ath11k wireless 2021-06-24 12:26:35 +08:00
coolsnowwolf
b3908e3b65 mac80211: add ath11k support 2021-06-24 12:20:23 +08:00
coolsnowwolf
eac26cc353 ipq807x: add Redmi AX6, Xiaomi AX9000 support 2021-06-24 12:16:06 +08:00
Felix Fietkau
4b93d4f442 mac80211: fix an issue with wds links on 802.11ax devices
Signed-off-by: Felix Fietkau <nbd@nbd.name>
2021-06-19 19:46:31 +08:00
Beginner
9a2df98c56
mac80211: sync upstream (#7077)
* mac80211: remove patches stripping down crypto support

Use of WPA3 and things like FILS is getting much more common, and platforms
that can't affort the extra kilobytes for this code are fading away.
Let's not hold back modern authentication methods any longer

Signed-off-by: Felix Fietkau <nbd@nbd.name>

* kernel: make cryptoapi support needed by mac80211 built-in

This reduces the flash space impact, since built-in code is much smaller
than a bunch of kernel modules on squashfs

Signed-off-by: Felix Fietkau <nbd@nbd.name>

* mac80211: remove extra patch accidentally added during rebase

Signed-off-by: Felix Fietkau <nbd@nbd.name>

Co-authored-by: Felix Fietkau <nbd@nbd.name>
2021-06-19 12:44:24 +08:00
Beginner
5a80754f03
mac80211: system hang caused by deferring calls into minstrel to dequeue (#7057)
Move the aggregation check to mac80211

Signed-off-by: Felix Fietkau <nbd@nbd.name>

Co-authored-by: Felix Fietkau <nbd@nbd.name>
2021-06-18 10:12:55 +08:00
Felix Fietkau
a4e2bd54c6 mac80211: fix minstrel sample time check
We need to skip sampling if the next sample time is after jiffies, not before.
This patch fixes an issue where in some cases only very little sampling (or none
at all) is performed, leading to really bad data rates

Signed-off-by: Felix Fietkau <nbd@nbd.name>
2021-06-17 20:16:52 +08:00
Felix Fietkau
f89a6ad13d mac80211: select iwinfo
Since iwinfo is now used in the core scripts, it needs to be present on the system

Signed-off-by: Felix Fietkau <nbd@nbd.name>
2021-06-17 20:16:31 +08:00
Felix Fietkau
f58e450837 mac80211: fix processing HE capabilities (FS#3871)
Use the right argument to fix setting unsupported capabilities to 0

Signed-off-by: Felix Fietkau <nbd@nbd.name>
2021-06-17 20:15:56 +08:00
lean
58973c3e8c linux: enable default automatic CT helper 2021-06-17 15:25:45 +08:00
Hugo Yuan
931947d20a
Set WiFi country to US by default (#6999) 2021-06-15 23:06:55 +08:00
lean
a3f1e837fd x64: fix grub2 booting 2021-06-15 17:58:07 +08:00
lean
9d8a34c9ab ipq807x: add Xiaomi AX3600 and ath11k support 2021-06-14 20:08:28 +08:00
lean
7a50383ab6 add kernel 5.10 support and sync with upstream 2021-06-14 18:30:08 +08:00
Beginner
ff49c6e8aa
mac80211: fix ATH_REG_DYNAMIC_USER_REG_HINTS (#6878)
ATH_REG_DYNAMIC_USER_REG_HINTS is currently not being set as mac80211
tries to set it as m which is not possible as its boolean only.

Since its used alongside user regulatory, move it to USER_REGD.

This is required for ath11k to accept regulatory changes, otherwise
it wont accept any changes and will simply force US.

Signed-off-by: Robert Marko <robimarko@gmail.com>

Co-authored-by: Robert Marko <robimarko@gmail.com>
2021-05-25 22:06:59 +08:00
Beginner
5402ff8230
mac80211: backport upstream fixes for FragAttacks (#6854)
From the patch series description:

Several security issues in the 802.11 implementations were found by
Mathy Vanhoef (New York University Abu Dhabi), who has published all
the details at

	https://papers.mathyvanhoef.com/usenix2021.pdf

Specifically, the following CVEs were assigned:

 * CVE-2020-24586 - Fragmentation cache not cleared on reconnection
 * CVE-2020-24587 - Reassembling fragments encrypted under different
                    keys
 * CVE-2020-24588 - Accepting non-SPP A-MSDU frames, which leads to
                    payload being parsed as an L2 frame under an
                    A-MSDU bit toggling attack
 * CVE-2020-26139 - Forwarding EAPOL from unauthenticated sender
 * CVE-2020-26140 - Accepting plaintext data frames in protected
                    networks
 * CVE-2020-26141 - Not verifying TKIP MIC of fragmented frames
 * CVE-2020-26142 - Processing fragmented frames as full frames
 * CVE-2020-26143 - Accepting fragmented plaintext frames in
                    protected networks
 * CVE-2020-26144 - Always accepting unencrypted A-MSDU frames that
                    start with RFC1042 header with EAPOL ethertype
 * CVE-2020-26145 - Accepting plaintext broadcast fragments as full
                    frames
 * CVE-2020-26146 - Reassembling encrypted fragments with non-consecutive
                    packet numbers
 * CVE-2020-26147 - Reassembling mixed encrypted/plaintext fragments

In general, the scope of these attacks is that they may allow an
attacker to
 * inject L2 frames that they can more or less control (depending on the
   vulnerability and attack method) into an otherwise protected network;
 * exfiltrate (some) network data under certain conditions, this is
   specific to the fragmentation issues.

A subset of these issues is known to apply to the Linux IEEE 802.11
implementation (mac80211). Where it is affected, the attached patches
fix the issues, even if not all of them reference the exact CVE IDs.

In addition, driver and/or firmware updates may be necessary, as well
as potentially more fixes to mac80211, depending on how drivers are
using it.

Specifically, for Intel devices, firmware needs to be updated to the
most recently released versions (which was done without any reference
to the security issues) to address some of the vulnerabilities.

To have a single set of patches, I'm also including patches for the
ath10k and ath11k drivers here.

We currently don't have information about how other drivers are, if
at all, affected.

Signed-off-by: Felix Fietkau <nbd@nbd.name>

Co-authored-by: Felix Fietkau <nbd@nbd.name>
2021-05-20 12:11:42 +08:00
AmadeusGhost
535b525566
kernel: Adapt renamed can-dev.ko (#6695)
The can-dev.ko kernel module was moved in kernel 5.4.110 and 5.10.28.

Fixes: 5dcbd82 ("kernel: bump 5.4 to 5.4.110")
Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
[Also compatible with kernel 4.x]
Signed-off-by: AmadeusGhost <amadeus@jmu.edu.cn>

Co-authored-by: Hauke Mehrtens <hauke@hauke-m.de>
2021-04-16 21:40:32 +08:00
536wfr
f225e953fc
mwlwifi: add PKG_FLAGS:=nonshared (#6600)
This should fix the problem of mwlwifi-firmware-* not being found
when using the ImageBuilder.

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
(cherry picked from commit 9b3aaf1)
Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2021-03-25 23:52:46 +08:00
AmadeusGhost
29cba8c5c1
bcm27xx: sync upstream source code (#6435) 2021-02-25 15:44:46 +08:00
AmadeusGhost
c83233b052
kernel: bump 5.4 to 5.4.91 (#6225) 2021-01-21 20:51:19 +08:00
AmadeusGhost
69f46989e2
mac80211: update to 5.8.18-1 (#6200)
ath10k-ct-firmware: update to 2020-11-08
ath10k-ct: update to 2020-12-24
mt76: update to 2020-12-18
wireless-regdb: update to version 2020.11.20
2021-01-18 13:06:03 +08:00
woOzZ1
81a53ead53
Update sysctl-br-netfilter.conf (#6133) 2020-12-29 22:28:04 +08:00
AmadeusGhost
7dcc873eca
kernel: bump 5.4 to 5.4.85 (#6105) 2020-12-28 14:24:26 +08:00
AmadeusGhost
995724bffb
kernel: bump 5.4 to 5.4.83 (#6040) 2020-12-17 23:29:07 +08:00
AmadeusGhost
0456744e39
mac80211: sync upstream source code (#5860)
[mac80211]
  08a42ef mac80211: fix memory leak on filtered powersave frames
  daeda8a mac80211: pass phy name to hostapd_set_bss_options
  7ca9b82 mac80211: Fix wpa_supplicant config removal ubus call
  bf3158b mac80211: backport the new tasklet API
  0bb5d39 mac80211: add minstrel fixes that fix mt76 issues in legacy mode

[ath10k]
  c3b2efa linux-firmware: ath10k: add board firmware packages
  655091e ath10k-ct-firmware: switch to linux-firmware board binaries
  61e381d ath10k-firmware: remove unused package
2020-12-02 12:24:26 +08:00