1 /*
2  * Copyright (c) 2004-2011 Atheros Communications Inc.
3  *
4  * Permission to use, copy, modify, and/or distribute this software for any
5  * purpose with or without fee is hereby granted, provided that the above
6  * copyright notice and this permission notice appear in all copies.
7  *
8  * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
9  * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
10  * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
11  * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
12  * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
13  * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
14  * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
15  */
16 
17 #include "core.h"
18 #include "hif-ops.h"
19 #include "cfg80211.h"
20 #include "target.h"
21 #include "debug.h"
22 
23 struct ath6kl_sta *ath6kl_find_sta(struct ath6kl_vif *vif, u8 *node_addr)
24 {
25 	struct ath6kl *ar = vif->ar;
26 	struct ath6kl_sta *conn = NULL;
27 	u8 i, max_conn;
28 
29 	max_conn = (vif->nw_type == AP_NETWORK) ? AP_MAX_NUM_STA : 0;
30 
31 	for (i = 0; i < max_conn; i++) {
32 		if (memcmp(node_addr, ar->sta_list[i].mac, ETH_ALEN) == 0) {
33 			conn = &ar->sta_list[i];
34 			break;
35 		}
36 	}
37 
38 	return conn;
39 }
40 
41 struct ath6kl_sta *ath6kl_find_sta_by_aid(struct ath6kl *ar, u8 aid)
42 {
43 	struct ath6kl_sta *conn = NULL;
44 	u8 ctr;
45 
46 	for (ctr = 0; ctr < AP_MAX_NUM_STA; ctr++) {
47 		if (ar->sta_list[ctr].aid == aid) {
48 			conn = &ar->sta_list[ctr];
49 			break;
50 		}
51 	}
52 	return conn;
53 }
54 
55 static void ath6kl_add_new_sta(struct ath6kl *ar, u8 *mac, u16 aid, u8 *wpaie,
56 			u8 ielen, u8 keymgmt, u8 ucipher, u8 auth)
57 {
58 	struct ath6kl_sta *sta;
59 	u8 free_slot;
60 
61 	free_slot = aid - 1;
62 
63 	sta = &ar->sta_list[free_slot];
64 	memcpy(sta->mac, mac, ETH_ALEN);
65 	if (ielen <= ATH6KL_MAX_IE)
66 		memcpy(sta->wpa_ie, wpaie, ielen);
67 	sta->aid = aid;
68 	sta->keymgmt = keymgmt;
69 	sta->ucipher = ucipher;
70 	sta->auth = auth;
71 
72 	ar->sta_list_index = ar->sta_list_index | (1 << free_slot);
73 	ar->ap_stats.sta[free_slot].aid = cpu_to_le32(aid);
74 }
75 
76 static void ath6kl_sta_cleanup(struct ath6kl *ar, u8 i)
77 {
78 	struct ath6kl_sta *sta = &ar->sta_list[i];
79 
80 	/* empty the queued pkts in the PS queue if any */
81 	spin_lock_bh(&sta->psq_lock);
82 	skb_queue_purge(&sta->psq);
83 	spin_unlock_bh(&sta->psq_lock);
84 
85 	memset(&ar->ap_stats.sta[sta->aid - 1], 0,
86 	       sizeof(struct wmi_per_sta_stat));
87 	memset(sta->mac, 0, ETH_ALEN);
88 	memset(sta->wpa_ie, 0, ATH6KL_MAX_IE);
89 	sta->aid = 0;
90 	sta->sta_flags = 0;
91 
92 	ar->sta_list_index = ar->sta_list_index & ~(1 << i);
93 
94 }
95 
96 static u8 ath6kl_remove_sta(struct ath6kl *ar, u8 *mac, u16 reason)
97 {
98 	u8 i, removed = 0;
99 
100 	if (is_zero_ether_addr(mac))
101 		return removed;
102 
103 	if (is_broadcast_ether_addr(mac)) {
104 		ath6kl_dbg(ATH6KL_DBG_TRC, "deleting all station\n");
105 
106 		for (i = 0; i < AP_MAX_NUM_STA; i++) {
107 			if (!is_zero_ether_addr(ar->sta_list[i].mac)) {
108 				ath6kl_sta_cleanup(ar, i);
109 				removed = 1;
110 			}
111 		}
112 	} else {
113 		for (i = 0; i < AP_MAX_NUM_STA; i++) {
114 			if (memcmp(ar->sta_list[i].mac, mac, ETH_ALEN) == 0) {
115 				ath6kl_dbg(ATH6KL_DBG_TRC,
116 					   "deleting station %pM aid=%d reason=%d\n",
117 					   mac, ar->sta_list[i].aid, reason);
118 				ath6kl_sta_cleanup(ar, i);
119 				removed = 1;
120 				break;
121 			}
122 		}
123 	}
124 
125 	return removed;
126 }
127 
128 enum htc_endpoint_id ath6kl_ac2_endpoint_id(void *devt, u8 ac)
129 {
130 	struct ath6kl *ar = devt;
131 	return ar->ac2ep_map[ac];
132 }
133 
134 struct ath6kl_cookie *ath6kl_alloc_cookie(struct ath6kl *ar)
135 {
136 	struct ath6kl_cookie *cookie;
137 
138 	cookie = ar->cookie_list;
139 	if (cookie != NULL) {
140 		ar->cookie_list = cookie->arc_list_next;
141 		ar->cookie_count--;
142 	}
143 
144 	return cookie;
145 }
146 
147 void ath6kl_cookie_init(struct ath6kl *ar)
148 {
149 	u32 i;
150 
151 	ar->cookie_list = NULL;
152 	ar->cookie_count = 0;
153 
154 	memset(ar->cookie_mem, 0, sizeof(ar->cookie_mem));
155 
156 	for (i = 0; i < MAX_COOKIE_NUM; i++)
157 		ath6kl_free_cookie(ar, &ar->cookie_mem[i]);
158 }
159 
160 void ath6kl_cookie_cleanup(struct ath6kl *ar)
161 {
162 	ar->cookie_list = NULL;
163 	ar->cookie_count = 0;
164 }
165 
166 void ath6kl_free_cookie(struct ath6kl *ar, struct ath6kl_cookie *cookie)
167 {
168 	/* Insert first */
169 
170 	if (!ar || !cookie)
171 		return;
172 
173 	cookie->arc_list_next = ar->cookie_list;
174 	ar->cookie_list = cookie;
175 	ar->cookie_count++;
176 }
177 
178 /*
179  * Read from the hardware through its diagnostic window. No cooperation
180  * from the firmware is required for this.
181  */
182 int ath6kl_diag_read32(struct ath6kl *ar, u32 address, u32 *value)
183 {
184 	int ret;
185 
186 	ret = ath6kl_hif_diag_read32(ar, address, value);
187 	if (ret) {
188 		ath6kl_warn("failed to read32 through diagnose window: %d\n",
189 			    ret);
190 		return ret;
191 	}
192 
193 	return 0;
194 }
195 
196 /*
197  * Write to the ATH6KL through its diagnostic window. No cooperation from
198  * the Target is required for this.
199  */
200 int ath6kl_diag_write32(struct ath6kl *ar, u32 address, __le32 value)
201 {
202 	int ret;
203 
204 	ret = ath6kl_hif_diag_write32(ar, address, value);
205 
206 	if (ret) {
207 		ath6kl_err("failed to write 0x%x during diagnose window to 0x%d\n",
208 			   address, value);
209 		return ret;
210 	}
211 
212 	return 0;
213 }
214 
215 int ath6kl_diag_read(struct ath6kl *ar, u32 address, void *data, u32 length)
216 {
217 	u32 count, *buf = data;
218 	int ret;
219 
220 	if (WARN_ON(length % 4))
221 		return -EINVAL;
222 
223 	for (count = 0; count < length / 4; count++, address += 4) {
224 		ret = ath6kl_diag_read32(ar, address, &buf[count]);
225 		if (ret)
226 			return ret;
227 	}
228 
229 	return 0;
230 }
231 
232 int ath6kl_diag_write(struct ath6kl *ar, u32 address, void *data, u32 length)
233 {
234 	u32 count;
235 	__le32 *buf = data;
236 	int ret;
237 
238 	if (WARN_ON(length % 4))
239 		return -EINVAL;
240 
241 	for (count = 0; count < length / 4; count++, address += 4) {
242 		ret = ath6kl_diag_write32(ar, address, buf[count]);
243 		if (ret)
244 			return ret;
245 	}
246 
247 	return 0;
248 }
249 
250 int ath6kl_read_fwlogs(struct ath6kl *ar)
251 {
252 	struct ath6kl_dbglog_hdr debug_hdr;
253 	struct ath6kl_dbglog_buf debug_buf;
254 	u32 address, length, dropped, firstbuf, debug_hdr_addr;
255 	int ret = 0, loop;
256 	u8 *buf;
257 
258 	buf = kmalloc(ATH6KL_FWLOG_PAYLOAD_SIZE, GFP_KERNEL);
259 	if (!buf)
260 		return -ENOMEM;
261 
262 	address = TARG_VTOP(ar->target_type,
263 			    ath6kl_get_hi_item_addr(ar,
264 						    HI_ITEM(hi_dbglog_hdr)));
265 
266 	ret = ath6kl_diag_read32(ar, address, &debug_hdr_addr);
267 	if (ret)
268 		goto out;
269 
270 	/* Get the contents of the ring buffer */
271 	if (debug_hdr_addr == 0) {
272 		ath6kl_warn("Invalid address for debug_hdr_addr\n");
273 		ret = -EINVAL;
274 		goto out;
275 	}
276 
277 	address = TARG_VTOP(ar->target_type, debug_hdr_addr);
278 	ath6kl_diag_read(ar, address, &debug_hdr, sizeof(debug_hdr));
279 
280 	address = TARG_VTOP(ar->target_type,
281 			    le32_to_cpu(debug_hdr.dbuf_addr));
282 	firstbuf = address;
283 	dropped = le32_to_cpu(debug_hdr.dropped);
284 	ath6kl_diag_read(ar, address, &debug_buf, sizeof(debug_buf));
285 
286 	loop = 100;
287 
288 	do {
289 		address = TARG_VTOP(ar->target_type,
290 				    le32_to_cpu(debug_buf.buffer_addr));
291 		length = le32_to_cpu(debug_buf.length);
292 
293 		if (length != 0 && (le32_to_cpu(debug_buf.length) <=
294 				    le32_to_cpu(debug_buf.bufsize))) {
295 			length = ALIGN(length, 4);
296 
297 			ret = ath6kl_diag_read(ar, address,
298 					       buf, length);
299 			if (ret)
300 				goto out;
301 
302 			ath6kl_debug_fwlog_event(ar, buf, length);
303 		}
304 
305 		address = TARG_VTOP(ar->target_type,
306 				    le32_to_cpu(debug_buf.next));
307 		ath6kl_diag_read(ar, address, &debug_buf, sizeof(debug_buf));
308 		if (ret)
309 			goto out;
310 
311 		loop--;
312 
313 		if (WARN_ON(loop == 0)) {
314 			ret = -ETIMEDOUT;
315 			goto out;
316 		}
317 	} while (address != firstbuf);
318 
319 out:
320 	kfree(buf);
321 
322 	return ret;
323 }
324 
325 /* FIXME: move to a better place, target.h? */
326 #define AR6003_RESET_CONTROL_ADDRESS 0x00004000
327 #define AR6004_RESET_CONTROL_ADDRESS 0x00004000
328 
329 void ath6kl_reset_device(struct ath6kl *ar, u32 target_type,
330 			 bool wait_fot_compltn, bool cold_reset)
331 {
332 	int status = 0;
333 	u32 address;
334 	__le32 data;
335 
336 	if (target_type != TARGET_TYPE_AR6003 &&
337 		target_type != TARGET_TYPE_AR6004)
338 		return;
339 
340 	data = cold_reset ? cpu_to_le32(RESET_CONTROL_COLD_RST) :
341 			    cpu_to_le32(RESET_CONTROL_MBOX_RST);
342 
343 	switch (target_type) {
344 	case TARGET_TYPE_AR6003:
345 		address = AR6003_RESET_CONTROL_ADDRESS;
346 		break;
347 	case TARGET_TYPE_AR6004:
348 		address = AR6004_RESET_CONTROL_ADDRESS;
349 		break;
350 	default:
351 		address = AR6003_RESET_CONTROL_ADDRESS;
352 		break;
353 	}
354 
355 	status = ath6kl_diag_write32(ar, address, data);
356 
357 	if (status)
358 		ath6kl_err("failed to reset target\n");
359 }
360 
361 static void ath6kl_install_static_wep_keys(struct ath6kl_vif *vif)
362 {
363 	u8 index;
364 	u8 keyusage;
365 
366 	for (index = WMI_MIN_KEY_INDEX; index <= WMI_MAX_KEY_INDEX; index++) {
367 		if (vif->wep_key_list[index].key_len) {
368 			keyusage = GROUP_USAGE;
369 			if (index == vif->def_txkey_index)
370 				keyusage |= TX_USAGE;
371 
372 			ath6kl_wmi_addkey_cmd(vif->ar->wmi, vif->fw_vif_idx,
373 					      index,
374 					      WEP_CRYPT,
375 					      keyusage,
376 					      vif->wep_key_list[index].key_len,
377 					      NULL, 0,
378 					      vif->wep_key_list[index].key,
379 					      KEY_OP_INIT_VAL, NULL,
380 					      NO_SYNC_WMIFLAG);
381 		}
382 	}
383 }
384 
385 void ath6kl_connect_ap_mode_bss(struct ath6kl_vif *vif, u16 channel)
386 {
387 	struct ath6kl *ar = vif->ar;
388 	struct ath6kl_req_key *ik;
389 	int res;
390 	u8 key_rsc[ATH6KL_KEY_SEQ_LEN];
391 
392 	ik = &ar->ap_mode_bkey;
393 
394 	ath6kl_dbg(ATH6KL_DBG_WLAN_CFG, "AP mode started on %u MHz\n", channel);
395 
396 	switch (vif->auth_mode) {
397 	case NONE_AUTH:
398 		if (vif->prwise_crypto == WEP_CRYPT)
399 			ath6kl_install_static_wep_keys(vif);
400 		break;
401 	case WPA_PSK_AUTH:
402 	case WPA2_PSK_AUTH:
403 	case (WPA_PSK_AUTH | WPA2_PSK_AUTH):
404 		if (!ik->valid)
405 			break;
406 
407 		ath6kl_dbg(ATH6KL_DBG_WLAN_CFG, "Delayed addkey for "
408 			   "the initial group key for AP mode\n");
409 		memset(key_rsc, 0, sizeof(key_rsc));
410 		res = ath6kl_wmi_addkey_cmd(
411 			ar->wmi, vif->fw_vif_idx, ik->key_index, ik->key_type,
412 			GROUP_USAGE, ik->key_len, key_rsc, ATH6KL_KEY_SEQ_LEN,
413 			ik->key,
414 			KEY_OP_INIT_VAL, NULL, SYNC_BOTH_WMIFLAG);
415 		if (res) {
416 			ath6kl_dbg(ATH6KL_DBG_WLAN_CFG, "Delayed "
417 				   "addkey failed: %d\n", res);
418 		}
419 		break;
420 	}
421 
422 	ath6kl_wmi_bssfilter_cmd(ar->wmi, vif->fw_vif_idx, NONE_BSS_FILTER, 0);
423 	set_bit(CONNECTED, &vif->flags);
424 	netif_carrier_on(vif->ndev);
425 }
426 
427 void ath6kl_connect_ap_mode_sta(struct ath6kl_vif *vif, u16 aid, u8 *mac_addr,
428 				u8 keymgmt, u8 ucipher, u8 auth,
429 				u8 assoc_req_len, u8 *assoc_info)
430 {
431 	struct ath6kl *ar = vif->ar;
432 	u8 *ies = NULL, *wpa_ie = NULL, *pos;
433 	size_t ies_len = 0;
434 	struct station_info sinfo;
435 
436 	ath6kl_dbg(ATH6KL_DBG_TRC, "new station %pM aid=%d\n", mac_addr, aid);
437 
438 	if (assoc_req_len > sizeof(struct ieee80211_hdr_3addr)) {
439 		struct ieee80211_mgmt *mgmt =
440 			(struct ieee80211_mgmt *) assoc_info;
441 		if (ieee80211_is_assoc_req(mgmt->frame_control) &&
442 		    assoc_req_len >= sizeof(struct ieee80211_hdr_3addr) +
443 		    sizeof(mgmt->u.assoc_req)) {
444 			ies = mgmt->u.assoc_req.variable;
445 			ies_len = assoc_info + assoc_req_len - ies;
446 		} else if (ieee80211_is_reassoc_req(mgmt->frame_control) &&
447 			   assoc_req_len >= sizeof(struct ieee80211_hdr_3addr)
448 			   + sizeof(mgmt->u.reassoc_req)) {
449 			ies = mgmt->u.reassoc_req.variable;
450 			ies_len = assoc_info + assoc_req_len - ies;
451 		}
452 	}
453 
454 	pos = ies;
455 	while (pos && pos + 1 < ies + ies_len) {
456 		if (pos + 2 + pos[1] > ies + ies_len)
457 			break;
458 		if (pos[0] == WLAN_EID_RSN)
459 			wpa_ie = pos; /* RSN IE */
460 		else if (pos[0] == WLAN_EID_VENDOR_SPECIFIC &&
461 			 pos[1] >= 4 &&
462 			 pos[2] == 0x00 && pos[3] == 0x50 && pos[4] == 0xf2) {
463 			if (pos[5] == 0x01)
464 				wpa_ie = pos; /* WPA IE */
465 			else if (pos[5] == 0x04) {
466 				wpa_ie = pos; /* WPS IE */
467 				break; /* overrides WPA/RSN IE */
468 			}
469 		} else if (pos[0] == 0x44 && wpa_ie == NULL) {
470 			/*
471 			 * Note: WAPI Parameter Set IE re-uses Element ID that
472 			 * was officially allocated for BSS AC Access Delay. As
473 			 * such, we need to be a bit more careful on when
474 			 * parsing the frame. However, BSS AC Access Delay
475 			 * element is not supposed to be included in
476 			 * (Re)Association Request frames, so this should not
477 			 * cause problems.
478 			 */
479 			wpa_ie = pos; /* WAPI IE */
480 			break;
481 		}
482 		pos += 2 + pos[1];
483 	}
484 
485 	ath6kl_add_new_sta(ar, mac_addr, aid, wpa_ie,
486 			   wpa_ie ? 2 + wpa_ie[1] : 0,
487 			   keymgmt, ucipher, auth);
488 
489 	/* send event to application */
490 	memset(&sinfo, 0, sizeof(sinfo));
491 
492 	/* TODO: sinfo.generation */
493 
494 	sinfo.assoc_req_ies = ies;
495 	sinfo.assoc_req_ies_len = ies_len;
496 	sinfo.filled |= STATION_INFO_ASSOC_REQ_IES;
497 
498 	cfg80211_new_sta(vif->ndev, mac_addr, &sinfo, GFP_KERNEL);
499 
500 	netif_wake_queue(vif->ndev);
501 }
502 
503 void disconnect_timer_handler(unsigned long ptr)
504 {
505 	struct net_device *dev = (struct net_device *)ptr;
506 	struct ath6kl_vif *vif = netdev_priv(dev);
507 
508 	ath6kl_init_profile_info(vif);
509 	ath6kl_disconnect(vif);
510 }
511 
512 void ath6kl_disconnect(struct ath6kl_vif *vif)
513 {
514 	if (test_bit(CONNECTED, &vif->flags) ||
515 	    test_bit(CONNECT_PEND, &vif->flags)) {
516 		ath6kl_wmi_disconnect_cmd(vif->ar->wmi, vif->fw_vif_idx);
517 		/*
518 		 * Disconnect command is issued, clear the connect pending
519 		 * flag. The connected flag will be cleared in
520 		 * disconnect event notification.
521 		 */
522 		clear_bit(CONNECT_PEND, &vif->flags);
523 	}
524 }
525 
526 /* WMI Event handlers */
527 
528 void ath6kl_ready_event(void *devt, u8 *datap, u32 sw_ver, u32 abi_ver)
529 {
530 	struct ath6kl *ar = devt;
531 
532 	memcpy(ar->mac_addr, datap, ETH_ALEN);
533 	ath6kl_dbg(ATH6KL_DBG_TRC, "%s: mac addr = %pM\n",
534 		   __func__, ar->mac_addr);
535 
536 	ar->version.wlan_ver = sw_ver;
537 	ar->version.abi_ver = abi_ver;
538 
539 	snprintf(ar->wiphy->fw_version,
540 		 sizeof(ar->wiphy->fw_version),
541 		 "%u.%u.%u.%u",
542 		 (ar->version.wlan_ver & 0xf0000000) >> 28,
543 		 (ar->version.wlan_ver & 0x0f000000) >> 24,
544 		 (ar->version.wlan_ver & 0x00ff0000) >> 16,
545 		 (ar->version.wlan_ver & 0x0000ffff));
546 
547 	/* indicate to the waiting thread that the ready event was received */
548 	set_bit(WMI_READY, &ar->flag);
549 	wake_up(&ar->event_wq);
550 }
551 
552 void ath6kl_scan_complete_evt(struct ath6kl_vif *vif, int status)
553 {
554 	struct ath6kl *ar = vif->ar;
555 	bool aborted = false;
556 
557 	if (status != WMI_SCAN_STATUS_SUCCESS)
558 		aborted = true;
559 
560 	ath6kl_cfg80211_scan_complete_event(vif, aborted);
561 
562 	if (!ar->usr_bss_filter) {
563 		clear_bit(CLEAR_BSSFILTER_ON_BEACON, &vif->flags);
564 		ath6kl_wmi_bssfilter_cmd(ar->wmi, vif->fw_vif_idx,
565 					 NONE_BSS_FILTER, 0);
566 	}
567 
568 	ath6kl_dbg(ATH6KL_DBG_WLAN_CFG, "scan complete: %d\n", status);
569 }
570 
571 void ath6kl_connect_event(struct ath6kl_vif *vif, u16 channel, u8 *bssid,
572 			  u16 listen_int, u16 beacon_int,
573 			  enum network_type net_type, u8 beacon_ie_len,
574 			  u8 assoc_req_len, u8 assoc_resp_len,
575 			  u8 *assoc_info)
576 {
577 	struct ath6kl *ar = vif->ar;
578 
579 	ath6kl_cfg80211_connect_event(vif, channel, bssid,
580 				      listen_int, beacon_int,
581 				      net_type, beacon_ie_len,
582 				      assoc_req_len, assoc_resp_len,
583 				      assoc_info);
584 
585 	memcpy(vif->bssid, bssid, sizeof(vif->bssid));
586 	vif->bss_ch = channel;
587 
588 	if ((vif->nw_type == INFRA_NETWORK))
589 		ath6kl_wmi_listeninterval_cmd(ar->wmi, vif->fw_vif_idx,
590 					      ar->listen_intvl_t,
591 					      ar->listen_intvl_b);
592 
593 	netif_wake_queue(vif->ndev);
594 
595 	/* Update connect & link status atomically */
596 	spin_lock_bh(&vif->if_lock);
597 	set_bit(CONNECTED, &vif->flags);
598 	clear_bit(CONNECT_PEND, &vif->flags);
599 	netif_carrier_on(vif->ndev);
600 	spin_unlock_bh(&vif->if_lock);
601 
602 	aggr_reset_state(vif->aggr_cntxt);
603 	vif->reconnect_flag = 0;
604 
605 	if ((vif->nw_type == ADHOC_NETWORK) && ar->ibss_ps_enable) {
606 		memset(ar->node_map, 0, sizeof(ar->node_map));
607 		ar->node_num = 0;
608 		ar->next_ep_id = ENDPOINT_2;
609 	}
610 
611 	if (!ar->usr_bss_filter) {
612 		set_bit(CLEAR_BSSFILTER_ON_BEACON, &vif->flags);
613 		ath6kl_wmi_bssfilter_cmd(ar->wmi, vif->fw_vif_idx,
614 					 CURRENT_BSS_FILTER, 0);
615 	}
616 }
617 
618 void ath6kl_tkip_micerr_event(struct ath6kl_vif *vif, u8 keyid, bool ismcast)
619 {
620 	struct ath6kl_sta *sta;
621 	struct ath6kl *ar = vif->ar;
622 	u8 tsc[6];
623 
624 	/*
625 	 * For AP case, keyid will have aid of STA which sent pkt with
626 	 * MIC error. Use this aid to get MAC & send it to hostapd.
627 	 */
628 	if (vif->nw_type == AP_NETWORK) {
629 		sta = ath6kl_find_sta_by_aid(ar, (keyid >> 2));
630 		if (!sta)
631 			return;
632 
633 		ath6kl_dbg(ATH6KL_DBG_TRC,
634 			   "ap tkip mic error received from aid=%d\n", keyid);
635 
636 		memset(tsc, 0, sizeof(tsc)); /* FIX: get correct TSC */
637 		cfg80211_michael_mic_failure(vif->ndev, sta->mac,
638 					     NL80211_KEYTYPE_PAIRWISE, keyid,
639 					     tsc, GFP_KERNEL);
640 	} else
641 		ath6kl_cfg80211_tkip_micerr_event(vif, keyid, ismcast);
642 
643 }
644 
645 static void ath6kl_update_target_stats(struct ath6kl_vif *vif, u8 *ptr, u32 len)
646 {
647 	struct wmi_target_stats *tgt_stats =
648 		(struct wmi_target_stats *) ptr;
649 	struct ath6kl *ar = vif->ar;
650 	struct target_stats *stats = &vif->target_stats;
651 	struct tkip_ccmp_stats *ccmp_stats;
652 	u8 ac;
653 
654 	if (len < sizeof(*tgt_stats))
655 		return;
656 
657 	ath6kl_dbg(ATH6KL_DBG_TRC, "updating target stats\n");
658 
659 	stats->tx_pkt += le32_to_cpu(tgt_stats->stats.tx.pkt);
660 	stats->tx_byte += le32_to_cpu(tgt_stats->stats.tx.byte);
661 	stats->tx_ucast_pkt += le32_to_cpu(tgt_stats->stats.tx.ucast_pkt);
662 	stats->tx_ucast_byte += le32_to_cpu(tgt_stats->stats.tx.ucast_byte);
663 	stats->tx_mcast_pkt += le32_to_cpu(tgt_stats->stats.tx.mcast_pkt);
664 	stats->tx_mcast_byte += le32_to_cpu(tgt_stats->stats.tx.mcast_byte);
665 	stats->tx_bcast_pkt  += le32_to_cpu(tgt_stats->stats.tx.bcast_pkt);
666 	stats->tx_bcast_byte += le32_to_cpu(tgt_stats->stats.tx.bcast_byte);
667 	stats->tx_rts_success_cnt +=
668 		le32_to_cpu(tgt_stats->stats.tx.rts_success_cnt);
669 
670 	for (ac = 0; ac < WMM_NUM_AC; ac++)
671 		stats->tx_pkt_per_ac[ac] +=
672 			le32_to_cpu(tgt_stats->stats.tx.pkt_per_ac[ac]);
673 
674 	stats->tx_err += le32_to_cpu(tgt_stats->stats.tx.err);
675 	stats->tx_fail_cnt += le32_to_cpu(tgt_stats->stats.tx.fail_cnt);
676 	stats->tx_retry_cnt += le32_to_cpu(tgt_stats->stats.tx.retry_cnt);
677 	stats->tx_mult_retry_cnt +=
678 		le32_to_cpu(tgt_stats->stats.tx.mult_retry_cnt);
679 	stats->tx_rts_fail_cnt +=
680 		le32_to_cpu(tgt_stats->stats.tx.rts_fail_cnt);
681 	stats->tx_ucast_rate =
682 	    ath6kl_wmi_get_rate(a_sle32_to_cpu(tgt_stats->stats.tx.ucast_rate));
683 
684 	stats->rx_pkt += le32_to_cpu(tgt_stats->stats.rx.pkt);
685 	stats->rx_byte += le32_to_cpu(tgt_stats->stats.rx.byte);
686 	stats->rx_ucast_pkt += le32_to_cpu(tgt_stats->stats.rx.ucast_pkt);
687 	stats->rx_ucast_byte += le32_to_cpu(tgt_stats->stats.rx.ucast_byte);
688 	stats->rx_mcast_pkt += le32_to_cpu(tgt_stats->stats.rx.mcast_pkt);
689 	stats->rx_mcast_byte += le32_to_cpu(tgt_stats->stats.rx.mcast_byte);
690 	stats->rx_bcast_pkt += le32_to_cpu(tgt_stats->stats.rx.bcast_pkt);
691 	stats->rx_bcast_byte += le32_to_cpu(tgt_stats->stats.rx.bcast_byte);
692 	stats->rx_frgment_pkt += le32_to_cpu(tgt_stats->stats.rx.frgment_pkt);
693 	stats->rx_err += le32_to_cpu(tgt_stats->stats.rx.err);
694 	stats->rx_crc_err += le32_to_cpu(tgt_stats->stats.rx.crc_err);
695 	stats->rx_key_cache_miss +=
696 		le32_to_cpu(tgt_stats->stats.rx.key_cache_miss);
697 	stats->rx_decrypt_err += le32_to_cpu(tgt_stats->stats.rx.decrypt_err);
698 	stats->rx_dupl_frame += le32_to_cpu(tgt_stats->stats.rx.dupl_frame);
699 	stats->rx_ucast_rate =
700 	    ath6kl_wmi_get_rate(a_sle32_to_cpu(tgt_stats->stats.rx.ucast_rate));
701 
702 	ccmp_stats = &tgt_stats->stats.tkip_ccmp_stats;
703 
704 	stats->tkip_local_mic_fail +=
705 		le32_to_cpu(ccmp_stats->tkip_local_mic_fail);
706 	stats->tkip_cnter_measures_invoked +=
707 		le32_to_cpu(ccmp_stats->tkip_cnter_measures_invoked);
708 	stats->tkip_fmt_err += le32_to_cpu(ccmp_stats->tkip_fmt_err);
709 
710 	stats->ccmp_fmt_err += le32_to_cpu(ccmp_stats->ccmp_fmt_err);
711 	stats->ccmp_replays += le32_to_cpu(ccmp_stats->ccmp_replays);
712 
713 	stats->pwr_save_fail_cnt +=
714 		le32_to_cpu(tgt_stats->pm_stats.pwr_save_failure_cnt);
715 	stats->noise_floor_calib =
716 		a_sle32_to_cpu(tgt_stats->noise_floor_calib);
717 
718 	stats->cs_bmiss_cnt +=
719 		le32_to_cpu(tgt_stats->cserv_stats.cs_bmiss_cnt);
720 	stats->cs_low_rssi_cnt +=
721 		le32_to_cpu(tgt_stats->cserv_stats.cs_low_rssi_cnt);
722 	stats->cs_connect_cnt +=
723 		le16_to_cpu(tgt_stats->cserv_stats.cs_connect_cnt);
724 	stats->cs_discon_cnt +=
725 		le16_to_cpu(tgt_stats->cserv_stats.cs_discon_cnt);
726 
727 	stats->cs_ave_beacon_rssi =
728 		a_sle16_to_cpu(tgt_stats->cserv_stats.cs_ave_beacon_rssi);
729 
730 	stats->cs_last_roam_msec =
731 		tgt_stats->cserv_stats.cs_last_roam_msec;
732 	stats->cs_snr = tgt_stats->cserv_stats.cs_snr;
733 	stats->cs_rssi = a_sle16_to_cpu(tgt_stats->cserv_stats.cs_rssi);
734 
735 	stats->lq_val = le32_to_cpu(tgt_stats->lq_val);
736 
737 	stats->wow_pkt_dropped +=
738 		le32_to_cpu(tgt_stats->wow_stats.wow_pkt_dropped);
739 	stats->wow_host_pkt_wakeups +=
740 		tgt_stats->wow_stats.wow_host_pkt_wakeups;
741 	stats->wow_host_evt_wakeups +=
742 		tgt_stats->wow_stats.wow_host_evt_wakeups;
743 	stats->wow_evt_discarded +=
744 		le16_to_cpu(tgt_stats->wow_stats.wow_evt_discarded);
745 
746 	if (test_bit(STATS_UPDATE_PEND, &vif->flags)) {
747 		clear_bit(STATS_UPDATE_PEND, &vif->flags);
748 		wake_up(&ar->event_wq);
749 	}
750 }
751 
752 static void ath6kl_add_le32(__le32 *var, __le32 val)
753 {
754 	*var = cpu_to_le32(le32_to_cpu(*var) + le32_to_cpu(val));
755 }
756 
757 void ath6kl_tgt_stats_event(struct ath6kl_vif *vif, u8 *ptr, u32 len)
758 {
759 	struct wmi_ap_mode_stat *p = (struct wmi_ap_mode_stat *) ptr;
760 	struct ath6kl *ar = vif->ar;
761 	struct wmi_ap_mode_stat *ap = &ar->ap_stats;
762 	struct wmi_per_sta_stat *st_ap, *st_p;
763 	u8 ac;
764 
765 	if (vif->nw_type == AP_NETWORK) {
766 		if (len < sizeof(*p))
767 			return;
768 
769 		for (ac = 0; ac < AP_MAX_NUM_STA; ac++) {
770 			st_ap = &ap->sta[ac];
771 			st_p = &p->sta[ac];
772 
773 			ath6kl_add_le32(&st_ap->tx_bytes, st_p->tx_bytes);
774 			ath6kl_add_le32(&st_ap->tx_pkts, st_p->tx_pkts);
775 			ath6kl_add_le32(&st_ap->tx_error, st_p->tx_error);
776 			ath6kl_add_le32(&st_ap->tx_discard, st_p->tx_discard);
777 			ath6kl_add_le32(&st_ap->rx_bytes, st_p->rx_bytes);
778 			ath6kl_add_le32(&st_ap->rx_pkts, st_p->rx_pkts);
779 			ath6kl_add_le32(&st_ap->rx_error, st_p->rx_error);
780 			ath6kl_add_le32(&st_ap->rx_discard, st_p->rx_discard);
781 		}
782 
783 	} else {
784 		ath6kl_update_target_stats(vif, ptr, len);
785 	}
786 }
787 
788 void ath6kl_wakeup_event(void *dev)
789 {
790 	struct ath6kl *ar = (struct ath6kl *) dev;
791 
792 	wake_up(&ar->event_wq);
793 }
794 
795 void ath6kl_txpwr_rx_evt(void *devt, u8 tx_pwr)
796 {
797 	struct ath6kl *ar = (struct ath6kl *) devt;
798 
799 	ar->tx_pwr = tx_pwr;
800 	wake_up(&ar->event_wq);
801 }
802 
803 void ath6kl_pspoll_event(struct ath6kl_vif *vif, u8 aid)
804 {
805 	struct ath6kl_sta *conn;
806 	struct sk_buff *skb;
807 	bool psq_empty = false;
808 	struct ath6kl *ar = vif->ar;
809 
810 	conn = ath6kl_find_sta_by_aid(ar, aid);
811 
812 	if (!conn)
813 		return;
814 	/*
815 	 * Send out a packet queued on ps queue. When the ps queue
816 	 * becomes empty update the PVB for this station.
817 	 */
818 	spin_lock_bh(&conn->psq_lock);
819 	psq_empty  = skb_queue_empty(&conn->psq);
820 	spin_unlock_bh(&conn->psq_lock);
821 
822 	if (psq_empty)
823 		/* TODO: Send out a NULL data frame */
824 		return;
825 
826 	spin_lock_bh(&conn->psq_lock);
827 	skb = skb_dequeue(&conn->psq);
828 	spin_unlock_bh(&conn->psq_lock);
829 
830 	conn->sta_flags |= STA_PS_POLLED;
831 	ath6kl_data_tx(skb, vif->ndev);
832 	conn->sta_flags &= ~STA_PS_POLLED;
833 
834 	spin_lock_bh(&conn->psq_lock);
835 	psq_empty  = skb_queue_empty(&conn->psq);
836 	spin_unlock_bh(&conn->psq_lock);
837 
838 	if (psq_empty)
839 		ath6kl_wmi_set_pvb_cmd(ar->wmi, vif->fw_vif_idx, conn->aid, 0);
840 }
841 
842 void ath6kl_dtimexpiry_event(struct ath6kl_vif *vif)
843 {
844 	bool mcastq_empty = false;
845 	struct sk_buff *skb;
846 	struct ath6kl *ar = vif->ar;
847 
848 	/*
849 	 * If there are no associated STAs, ignore the DTIM expiry event.
850 	 * There can be potential race conditions where the last associated
851 	 * STA may disconnect & before the host could clear the 'Indicate
852 	 * DTIM' request to the firmware, the firmware would have just
853 	 * indicated a DTIM expiry event. The race is between 'clear DTIM
854 	 * expiry cmd' going from the host to the firmware & the DTIM
855 	 * expiry event happening from the firmware to the host.
856 	 */
857 	if (!ar->sta_list_index)
858 		return;
859 
860 	spin_lock_bh(&ar->mcastpsq_lock);
861 	mcastq_empty = skb_queue_empty(&ar->mcastpsq);
862 	spin_unlock_bh(&ar->mcastpsq_lock);
863 
864 	if (mcastq_empty)
865 		return;
866 
867 	/* set the STA flag to dtim_expired for the frame to go out */
868 	set_bit(DTIM_EXPIRED, &vif->flags);
869 
870 	spin_lock_bh(&ar->mcastpsq_lock);
871 	while ((skb = skb_dequeue(&ar->mcastpsq)) != NULL) {
872 		spin_unlock_bh(&ar->mcastpsq_lock);
873 
874 		ath6kl_data_tx(skb, vif->ndev);
875 
876 		spin_lock_bh(&ar->mcastpsq_lock);
877 	}
878 	spin_unlock_bh(&ar->mcastpsq_lock);
879 
880 	clear_bit(DTIM_EXPIRED, &vif->flags);
881 
882 	/* clear the LSB of the BitMapCtl field of the TIM IE */
883 	ath6kl_wmi_set_pvb_cmd(ar->wmi, vif->fw_vif_idx, MCAST_AID, 0);
884 }
885 
886 void ath6kl_disconnect_event(struct ath6kl_vif *vif, u8 reason, u8 *bssid,
887 			     u8 assoc_resp_len, u8 *assoc_info,
888 			     u16 prot_reason_status)
889 {
890 	struct ath6kl *ar = vif->ar;
891 
892 	if (vif->nw_type == AP_NETWORK) {
893 		if (!ath6kl_remove_sta(ar, bssid, prot_reason_status))
894 			return;
895 
896 		/* if no more associated STAs, empty the mcast PS q */
897 		if (ar->sta_list_index == 0) {
898 			spin_lock_bh(&ar->mcastpsq_lock);
899 			skb_queue_purge(&ar->mcastpsq);
900 			spin_unlock_bh(&ar->mcastpsq_lock);
901 
902 			/* clear the LSB of the TIM IE's BitMapCtl field */
903 			if (test_bit(WMI_READY, &ar->flag))
904 				ath6kl_wmi_set_pvb_cmd(ar->wmi, vif->fw_vif_idx,
905 						       MCAST_AID, 0);
906 		}
907 
908 		if (!is_broadcast_ether_addr(bssid)) {
909 			/* send event to application */
910 			cfg80211_del_sta(vif->ndev, bssid, GFP_KERNEL);
911 		}
912 
913 		if (memcmp(vif->ndev->dev_addr, bssid, ETH_ALEN) == 0) {
914 			memset(vif->wep_key_list, 0, sizeof(vif->wep_key_list));
915 			clear_bit(CONNECTED, &vif->flags);
916 		}
917 		return;
918 	}
919 
920 	ath6kl_cfg80211_disconnect_event(vif, reason, bssid,
921 				       assoc_resp_len, assoc_info,
922 				       prot_reason_status);
923 
924 	aggr_reset_state(vif->aggr_cntxt);
925 
926 	del_timer(&vif->disconnect_timer);
927 
928 	ath6kl_dbg(ATH6KL_DBG_WLAN_CFG, "disconnect reason is %d\n", reason);
929 
930 	/*
931 	 * If the event is due to disconnect cmd from the host, only they
932 	 * the target would stop trying to connect. Under any other
933 	 * condition, target would keep trying to connect.
934 	 */
935 	if (reason == DISCONNECT_CMD) {
936 		if (!ar->usr_bss_filter && test_bit(WMI_READY, &ar->flag))
937 			ath6kl_wmi_bssfilter_cmd(ar->wmi, vif->fw_vif_idx,
938 						 NONE_BSS_FILTER, 0);
939 	} else {
940 		set_bit(CONNECT_PEND, &vif->flags);
941 		if (((reason == ASSOC_FAILED) &&
942 		    (prot_reason_status == 0x11)) ||
943 		    ((reason == ASSOC_FAILED) && (prot_reason_status == 0x0)
944 		     && (vif->reconnect_flag == 1))) {
945 			set_bit(CONNECTED, &vif->flags);
946 			return;
947 		}
948 	}
949 
950 	/* update connect & link status atomically */
951 	spin_lock_bh(&vif->if_lock);
952 	clear_bit(CONNECTED, &vif->flags);
953 	netif_carrier_off(vif->ndev);
954 	spin_unlock_bh(&vif->if_lock);
955 
956 	if ((reason != CSERV_DISCONNECT) || (vif->reconnect_flag != 1))
957 		vif->reconnect_flag = 0;
958 
959 	if (reason != CSERV_DISCONNECT)
960 		ar->user_key_ctrl = 0;
961 
962 	netif_stop_queue(vif->ndev);
963 	memset(vif->bssid, 0, sizeof(vif->bssid));
964 	vif->bss_ch = 0;
965 
966 	ath6kl_tx_data_cleanup(ar);
967 }
968 
969 struct ath6kl_vif *ath6kl_vif_first(struct ath6kl *ar)
970 {
971 	struct ath6kl_vif *vif;
972 
973 	spin_lock_bh(&ar->list_lock);
974 	if (list_empty(&ar->vif_list)) {
975 		spin_unlock_bh(&ar->list_lock);
976 		return NULL;
977 	}
978 
979 	vif = list_first_entry(&ar->vif_list, struct ath6kl_vif, list);
980 
981 	spin_unlock_bh(&ar->list_lock);
982 
983 	return vif;
984 }
985 
986 static int ath6kl_open(struct net_device *dev)
987 {
988 	struct ath6kl_vif *vif = netdev_priv(dev);
989 
990 	set_bit(WLAN_ENABLED, &vif->flags);
991 
992 	if (test_bit(CONNECTED, &vif->flags)) {
993 		netif_carrier_on(dev);
994 		netif_wake_queue(dev);
995 	} else
996 		netif_carrier_off(dev);
997 
998 	return 0;
999 }
1000 
1001 static int ath6kl_close(struct net_device *dev)
1002 {
1003 	struct ath6kl *ar = ath6kl_priv(dev);
1004 	struct ath6kl_vif *vif = netdev_priv(dev);
1005 
1006 	netif_stop_queue(dev);
1007 
1008 	ath6kl_disconnect(vif);
1009 
1010 	if (test_bit(WMI_READY, &ar->flag)) {
1011 		if (ath6kl_wmi_scanparams_cmd(ar->wmi, vif->fw_vif_idx, 0xFFFF,
1012 					      0, 0, 0, 0, 0, 0, 0, 0, 0))
1013 			return -EIO;
1014 
1015 	}
1016 
1017 	ath6kl_cfg80211_scan_complete_event(vif, true);
1018 
1019 	clear_bit(WLAN_ENABLED, &vif->flags);
1020 
1021 	return 0;
1022 }
1023 
1024 static struct net_device_stats *ath6kl_get_stats(struct net_device *dev)
1025 {
1026 	struct ath6kl_vif *vif = netdev_priv(dev);
1027 
1028 	return &vif->net_stats;
1029 }
1030 
1031 static struct net_device_ops ath6kl_netdev_ops = {
1032 	.ndo_open               = ath6kl_open,
1033 	.ndo_stop               = ath6kl_close,
1034 	.ndo_start_xmit         = ath6kl_data_tx,
1035 	.ndo_get_stats          = ath6kl_get_stats,
1036 };
1037 
1038 void init_netdev(struct net_device *dev)
1039 {
1040 	dev->netdev_ops = &ath6kl_netdev_ops;
1041 	dev->destructor = free_netdev;
1042 	dev->watchdog_timeo = ATH6KL_TX_TIMEOUT;
1043 
1044 	dev->needed_headroom = ETH_HLEN;
1045 	dev->needed_headroom += sizeof(struct ath6kl_llc_snap_hdr) +
1046 				sizeof(struct wmi_data_hdr) + HTC_HDR_LENGTH
1047 				+ WMI_MAX_TX_META_SZ + ATH6KL_HTC_ALIGN_BYTES;
1048 
1049 	return;
1050 }
1051