lede/package/kernel/mac80211/patches/ath9k/356-Revert-ath9k-interpret-requested-txpower-in-EIRP-dom.patch

37 lines
1.2 KiB
Diff
Raw Normal View History

2017-09-06 19:19:45 +08:00
From: Felix Fietkau <nbd@nbd.name>
Date: Sat, 14 May 2016 14:51:02 +0200
Subject: [PATCH] Revert "ath9k: interpret requested txpower in EIRP
domain"
This reverts commit 71f5137bf010c6faffab50c0ec15374c59c4a411.
---
--- a/drivers/net/wireless/ath/ath9k/hw.c
+++ b/drivers/net/wireless/ath/ath9k/hw.c
mac80211: sync upstream (#7932) * mac80211: fix HT40 mode for 6G band The channel offset used for VHT segment calculation was missing for HT Signed-off-by: Felix Fietkau <nbd@nbd.name> * mac80211: refresh patch Signed-off-by: Felix Fietkau <nbd@nbd.name> * mac80211: add missing change for encap offload on devices with sw rate control Signed-off-by: Felix Fietkau <nbd@nbd.name> * ath9k: owl-loader: remove obsolete AR71XX patch this is no longer necessary as the AR71XX target was superseded by ath79. Signed-off-by: Christian Lamparter <chunkeey@gmail.com> * mac80211: revert faulty change that was breaking broadcast tx Fixes: 0f6887972adc ("mac80211: add missing change for encap offload on devices with sw rate control") Signed-off-by: Felix Fietkau <nbd@nbd.name> * mac80211: Update to backports-5.10.68 Refresh all patches. The removed patches were integrated upstream. This contains fixes for CVE-2020-3702 1. These patches (ath, ath9k, mac80211) were included in kernel versions since 4.14.245 and 4.19.205. They fix security vulnerability CVE-2020-3702 [1] similar to KrØØk, which was found by ESET [2]. Thank you Josef Schlehofer for reporting this problem. [1] https://nvd.nist.gov/vuln/detail/CVE-2020-3702 [2] https://www.welivesecurity.com/2020/08/06/beyond-kr00k-even-more-wifi-chips-vulnerable-eavesdropping/ Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de> * mac80211: backport support for BSS color changes This is needed for an upcoming mt76 update Signed-off-by: Felix Fietkau <nbd@nbd.name> Co-authored-by: Felix Fietkau <nbd@nbd.name> Co-authored-by: Christian Lamparter <chunkeey@gmail.com> Co-authored-by: Hauke Mehrtens <hauke@hauke-m.de>
2021-09-29 21:41:27 +08:00
@@ -2979,7 +2979,8 @@ void ath9k_hw_apply_txpower(struct ath_h
2017-09-06 19:19:45 +08:00
{
struct ath_regulatory *reg = ath9k_hw_regulatory(ah);
struct ieee80211_channel *channel;
- int chan_pwr, new_pwr;
+ int chan_pwr, new_pwr, max_gain;
+ int ant_gain, ant_reduction = 0;
u16 ctl = NO_CTL;
2017-09-06 19:19:45 +08:00
if (!chan)
mac80211: sync upstream (#7932) * mac80211: fix HT40 mode for 6G band The channel offset used for VHT segment calculation was missing for HT Signed-off-by: Felix Fietkau <nbd@nbd.name> * mac80211: refresh patch Signed-off-by: Felix Fietkau <nbd@nbd.name> * mac80211: add missing change for encap offload on devices with sw rate control Signed-off-by: Felix Fietkau <nbd@nbd.name> * ath9k: owl-loader: remove obsolete AR71XX patch this is no longer necessary as the AR71XX target was superseded by ath79. Signed-off-by: Christian Lamparter <chunkeey@gmail.com> * mac80211: revert faulty change that was breaking broadcast tx Fixes: 0f6887972adc ("mac80211: add missing change for encap offload on devices with sw rate control") Signed-off-by: Felix Fietkau <nbd@nbd.name> * mac80211: Update to backports-5.10.68 Refresh all patches. The removed patches were integrated upstream. This contains fixes for CVE-2020-3702 1. These patches (ath, ath9k, mac80211) were included in kernel versions since 4.14.245 and 4.19.205. They fix security vulnerability CVE-2020-3702 [1] similar to KrØØk, which was found by ESET [2]. Thank you Josef Schlehofer for reporting this problem. [1] https://nvd.nist.gov/vuln/detail/CVE-2020-3702 [2] https://www.welivesecurity.com/2020/08/06/beyond-kr00k-even-more-wifi-chips-vulnerable-eavesdropping/ Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de> * mac80211: backport support for BSS color changes This is needed for an upcoming mt76 update Signed-off-by: Felix Fietkau <nbd@nbd.name> Co-authored-by: Felix Fietkau <nbd@nbd.name> Co-authored-by: Christian Lamparter <chunkeey@gmail.com> Co-authored-by: Hauke Mehrtens <hauke@hauke-m.de>
2021-09-29 21:41:27 +08:00
@@ -2991,9 +2992,14 @@ void ath9k_hw_apply_txpower(struct ath_h
2017-09-06 19:19:45 +08:00
channel = chan->chan;
2020-07-02 23:30:56 +08:00
chan_pwr = min_t(int, channel->max_power * 2, MAX_COMBINED_POWER);
2017-09-06 19:19:45 +08:00
new_pwr = min_t(int, chan_pwr, reg->power_limit);
+ max_gain = chan_pwr - new_pwr + channel->max_antenna_gain * 2;
+
+ ant_gain = get_antenna_gain(ah, chan);
+ if (ant_gain > max_gain)
+ ant_reduction = ant_gain - max_gain;
ah->eep_ops->set_txpower(ah, chan, ctl,
2017-09-06 19:19:45 +08:00
- get_antenna_gain(ah, chan), new_pwr, test);
+ ant_reduction, new_pwr, test);
}
void ath9k_hw_set_txpowerlimit(struct ath_hw *ah, u32 limit, bool test)