Received: by 2002:a05:6358:11c7:b0:104:8066:f915 with SMTP id i7csp3036866rwl; Thu, 13 Apr 2023 14:55:57 -0700 (PDT) X-Google-Smtp-Source: AKy350Zx8qf8l3NYZzBcnPXcY5Nnp2U8DcxJpLwC56sXSLjOCazh8UXHKEewSA2khV5KCxVvWidk X-Received: by 2002:a05:6a00:2183:b0:62b:47fc:a970 with SMTP id h3-20020a056a00218300b0062b47fca970mr4937623pfi.9.1681422956963; Thu, 13 Apr 2023 14:55:56 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1681422956; cv=none; d=google.com; s=arc-20160816; b=k1/6EKEt8c67wb/Z0rK5eV8X0dX9HU9WmioBfV0ZmKGE5rC3zEyPDF6fHwmbipT7Ce B/WCTltm9RGWWfDzqGaQ+n8SQj25xpm+B3ZM/oQ8cagA0xWLg/00oOKgk3q6URZhImzW yI5hM3UjzfEB9rCuJOaLbUCzlaXtWJonYsFsm+f2Buk2Gx+gwAfVdjRFCz9GSkT0VPV/ 4UoyeRMMFFFF+VZgsVIP9kdyhMlVZTR2OJGlFcTZn8/OEJnRWy9W1QMklOzOhyGlvAA4 GIIlTwo2AUmrH5bEo+4iy6Pi2xCKCJMr9C2vobvC/sa92YuCN03SP88dRzw2ISr4xE3Y AWQw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=JracBgEmfmTbSAt2eLnphphD6TvUF4us3O3mQkYErP4=; b=tjaCJhrZoIxWgOb+c4N5ZYzVmv6CJIq9IvyLNAxvjYXHLxgrwo9zWfu8ejYo4HsNjH 4O58JYliavS4l6I+pCXei4mePAq/AIjt2AAb175gSPuhYWJfGx7zimsVZ1w0mKiwywdT K1nLXJzgM8chO9U0j4Cr2HoF6nlpQ1aR1HZW2EfYpnSUE9wu+AeOzVNTJ+wp/aK7Cyg2 8v+Lfr8/t+qHNcaflCrA1I74aJNlbabebdOiFJXmYdzQhhZpMOqA042On5l1pMMwTtpD Jp5qQ8XBx+CFNXrfGbljwK/zkFS9X3bn9mrsUO+0iJ7BvKvZvfcE/ZtvoFR6/y7wbGCT CpZw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@quicinc.com header.s=qcppdkim1 header.b=MnETVmIp; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=quicinc.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id x7-20020aa79a47000000b0062e024b49c2si2575889pfj.152.2023.04.13.14.55.48; Thu, 13 Apr 2023 14:55:56 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@quicinc.com header.s=qcppdkim1 header.b=MnETVmIp; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=quicinc.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230200AbjDMVwX (ORCPT + 61 others); Thu, 13 Apr 2023 17:52:23 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:59622 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229671AbjDMVwT (ORCPT ); Thu, 13 Apr 2023 17:52:19 -0400 Received: from mx0b-0031df01.pphosted.com (mx0b-0031df01.pphosted.com [205.220.180.131]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 001CC40EE for ; Thu, 13 Apr 2023 14:52:17 -0700 (PDT) Received: from pps.filterd (m0279869.ppops.net [127.0.0.1]) by mx0a-0031df01.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 33DLonWl019481; Thu, 13 Apr 2023 21:52:09 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=quicinc.com; h=from : to : cc : subject : date : message-id : mime-version : content-transfer-encoding : content-type; s=qcppdkim1; bh=JracBgEmfmTbSAt2eLnphphD6TvUF4us3O3mQkYErP4=; b=MnETVmIpMXawDEEKbZ3AVP5rkuS3i8p3yh89QEmsib9CeeJNjfExlagwqHyrkeW3MYaC VjFfqJcOntWBdfzlVq1CGgEqYr4muwJ4CmAGr5mz4zZbwh/il4+JsBD7fWN360Oti2Ao UxGhYBUJkWE+dJkwLVjFhrd4/YSPCkjpwhXAqnYO04CBNvw4QzXGyHBdS1JN5Yask7wD 1uXNY6mACrOw5mbCCEfJBykVFB/ZL8r5gqXUur7La8NushX2srXQiwZ7ErKuwT6c6p4/ 5cfJfwh0o3JbfmaZC2OI234vP38MOyzIm2j1+8BTZuHsWsUrYb1dJhRN+zUO8kLyTX9Y Dg== Received: from nalasppmta03.qualcomm.com (Global_NAT1.qualcomm.com [129.46.96.20]) by mx0a-0031df01.pphosted.com (PPS) with ESMTPS id 3px5pkth5d-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 13 Apr 2023 21:52:09 +0000 Received: from nalasex01b.na.qualcomm.com (nalasex01b.na.qualcomm.com [10.47.209.197]) by NALASPPMTA03.qualcomm.com (8.17.1.5/8.17.1.5) with ESMTPS id 33DLq81W006706 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 13 Apr 2023 21:52:08 GMT Received: from alokad-linux.qualcomm.com (10.80.80.8) by nalasex01b.na.qualcomm.com (10.47.209.197) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.42; Thu, 13 Apr 2023 14:52:07 -0700 From: Aloka Dixit To: , CC: Aloka Dixit Subject: [PATCH v3 00/11] wifi: ath12k: (v3) EHT support Date: Thu, 13 Apr 2023 14:51:45 -0700 Message-ID: <20230413215156.2649-1-quic_alokad@quicinc.com> X-Mailer: git-send-email 2.39.0 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Content-Type: text/plain X-Originating-IP: [10.80.80.8] X-ClientProxiedBy: nasanex01b.na.qualcomm.com (10.46.141.250) To nalasex01b.na.qualcomm.com (10.47.209.197) X-QCInternal: smtphost X-Proofpoint-Virus-Version: vendor=nai engine=6200 definitions=5800 signatures=585085 X-Proofpoint-ORIG-GUID: lEw8M5iVf7ApQUXVEgXT8Cpj_E97UeLM X-Proofpoint-GUID: lEw8M5iVf7ApQUXVEgXT8Cpj_E97UeLM X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.254,Aquarius:18.0.942,Hydra:6.0.573,FMLib:17.11.170.22 definitions=2023-04-13_16,2023-04-13_01,2023-02-09_01 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 phishscore=0 adultscore=0 malwarescore=0 impostorscore=0 mlxscore=0 suspectscore=0 lowpriorityscore=0 clxscore=1015 mlxlogscore=999 bulkscore=0 priorityscore=1501 spamscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2303200000 definitions=main-2304130194 X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,SPF_HELO_NONE,SPF_PASS, URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org Add driver support to bring AP up in EHT mode, configure a preamble puncturing bitmap and associate with an EHT client. v3: Modified patches 6 and 9 to fix some issues, changelog included in the respective patches. v2: This version modifies only few commit descriptions, changelog included in the respective patches. Following list gives the details for each patch. 1-4: Propagation of EHT capabilities from target to userspace. Patches 1, 2 refactor the existing code to make EHT additions easier. 5: Addition of EHT phy modes. 6-9: EHT related additions in peer association. 10: Process the new WMI service ready ext2 event. 11: Preamble puncturing support. Aloka Dixit (9): wifi: ath12k: rename HE capabilities setup/copy functions wifi: ath12k: move HE capabilities processing to a new function wifi: ath12k: process EHT capabilities wifi: ath12k: propagate EHT capabilities to userspace wifi: ath12k: prepare EHT peer assoc parameters wifi: ath12k: add WMI support for EHT peer wifi: ath12k: peer assoc for 320 MHz wifi: ath12k: parse WMI service ready ext2 event wifi: ath12k: configure puncturing bitmap Muna Sinada (1): wifi: ath12k: add EHT PHY modes Pradeep Kumar Chitrapu (1): wifi: ath12k: add MLO header in peer association drivers/net/wireless/ath/ath12k/core.h | 9 + drivers/net/wireless/ath/ath12k/mac.c | 555 ++++++++++++++++++++----- drivers/net/wireless/ath/ath12k/mac.h | 2 +- drivers/net/wireless/ath/ath12k/wmi.c | 218 +++++++++- drivers/net/wireless/ath/ath12k/wmi.h | 116 +++++- 5 files changed, 790 insertions(+), 110 deletions(-) base-commit: 177555b57ca0a0519c12a2bdb64309ddbb363e11 -- 2.39.0