1. 23 9月, 2014 10 次提交
  2. 18 9月, 2014 5 次提交
  3. 12 9月, 2014 2 次提交
  4. 10 9月, 2014 1 次提交
  5. 02 9月, 2014 1 次提交
  6. 27 8月, 2014 1 次提交
  7. 25 8月, 2014 1 次提交
  8. 12 8月, 2014 3 次提交
  9. 04 8月, 2014 1 次提交
    • S
      ath10k: add spectral scan feature · 855aed12
      Simon Wunderlich 提交于
      Adds the spectral scan feature for ath10k. The spectral scan is triggered by
      configuring a mode through a debugfs control file. Samples can be gathered via
      another relay debugfs file.
      
      Essentially, to try it out:
      
      ip link set dev wlan0 up
      echo background > /sys/kernel/debug/ieee80211/phy0/ath10k/spectral_scan_ctl
      echo trigger > /sys/kernel/debug/ieee80211/phy0/ath10k/spectral_scan_ctl
      iw dev wlan0 scan
      echo disable > /sys/kernel/debug/ieee80211/phy0/ath10k/spectral_scan_ctl
      cat /sys/kernel/debug/ieee80211/phy0/ath10k/spectral_scan0 > samples
      
      This feature is still experimental. Based on the original RFC patch of
      Sven Eckelmann.
      Signed-off-by: NSimon Wunderlich <sw@simonwunderlich.de>
      Signed-off-by: NMathias Kretschmer <mathias.kretschmer@fokus.fraunhofer.de>
      Signed-off-by: NKalle Valo <kvalo@qca.qualcomm.com>
      855aed12
  10. 29 7月, 2014 1 次提交
  11. 22 7月, 2014 1 次提交
  12. 03 6月, 2014 1 次提交
  13. 23 5月, 2014 1 次提交
  14. 16 5月, 2014 1 次提交
    • M
      ath10k: fix pmf for action frames · eeab266c
      Marek Kwaczynski 提交于
      Fix sending and receiveing protected managment frames.
      Lack of protected flag for received protected action frames
      causes report these frames as unprotected robust action frames.
      If the driver in AP mode sent frame with protected flag and
      CCMP header using IEEE80211_KEY_FLAG_SW_MGMT_TX flag,
      the FW encrypted frames once again. From user side all
      received SA Query Requests and Responses were skipped and
      all protected action frames were sent as malformed packets.
      Signed-off-by: NMarek Kwaczynski <marek.kwaczynski@tieto.com>
      Signed-off-by: NKalle Valo <kvalo@qca.qualcomm.com>
      eeab266c
  15. 24 4月, 2014 2 次提交
  16. 08 4月, 2014 1 次提交
  17. 24 3月, 2014 1 次提交
  18. 11 3月, 2014 1 次提交
  19. 07 3月, 2014 1 次提交
  20. 28 2月, 2014 1 次提交
  21. 13 2月, 2014 2 次提交
  22. 30 1月, 2014 1 次提交
    • M
      ath10k: configure access category for arp · ab6258ed
      Marek Puzyniak 提交于
      ARP frames exchange does not work properly for UAPSD enabled AP.
      ARP requests which arrives with access category 0 are processed
      by network stack and send back with access category 0. FW changes
      access category to 6. This is causing problems when UAPSD associated
      STA is sleeping after has sent ARP request. Configure ARP access
      category in FW to best effort (0) solves this problem. ARP frames
      will be send with access category 0.
      
      Simplify arp ac override functionality by removing redundant entry in
      pdev param maping table. There should be only one entry in pdev param
      map but enum has different name for different FW.
      
      kvalo: change the warning message
      Signed-off-by: NMarek Puzyniak <marek.puzyniak@tieto.com>
      Signed-off-by: NKalle Valo <kvalo@qca.qualcomm.com>
      ab6258ed