1 // SPDX-License-Identifier: ISC 2 /* 3 * Copyright (c) 2010 Broadcom Corporation 4 */ 5 6 /* Toplevel file. Relies on dhd_linux.c to send commands to the dongle. */ 7 8 #include <linux/kernel.h> 9 #include <linux/etherdevice.h> 10 #include <linux/module.h> 11 #include <linux/vmalloc.h> 12 #include <net/cfg80211.h> 13 #include <net/netlink.h> 14 #include <uapi/linux/if_arp.h> 15 16 #include <brcmu_utils.h> 17 #include <defs.h> 18 #include <brcmu_wifi.h> 19 #include "core.h" 20 #include "debug.h" 21 #include "tracepoint.h" 22 #include "fwil_types.h" 23 #include "p2p.h" 24 #include "btcoex.h" 25 #include "pno.h" 26 #include "fwsignal.h" 27 #include "cfg80211.h" 28 #include "feature.h" 29 #include "fwil.h" 30 #include "proto.h" 31 #include "vendor.h" 32 #include "bus.h" 33 #include "common.h" 34 35 #define BRCMF_SCAN_IE_LEN_MAX 2048 36 37 #define WPA_OUI "\x00\x50\xF2" /* WPA OUI */ 38 #define WPA_OUI_TYPE 1 39 #define RSN_OUI "\x00\x0F\xAC" /* RSN OUI */ 40 #define WME_OUI_TYPE 2 41 #define WPS_OUI_TYPE 4 42 43 #define VS_IE_FIXED_HDR_LEN 6 44 #define WPA_IE_VERSION_LEN 2 45 #define WPA_IE_MIN_OUI_LEN 4 46 #define WPA_IE_SUITE_COUNT_LEN 2 47 48 #define WPA_CIPHER_NONE 0 /* None */ 49 #define WPA_CIPHER_WEP_40 1 /* WEP (40-bit) */ 50 #define WPA_CIPHER_TKIP 2 /* TKIP: default for WPA */ 51 #define WPA_CIPHER_AES_CCM 4 /* AES (CCM) */ 52 #define WPA_CIPHER_WEP_104 5 /* WEP (104-bit) */ 53 54 #define RSN_AKM_NONE 0 /* None (IBSS) */ 55 #define RSN_AKM_UNSPECIFIED 1 /* Over 802.1x */ 56 #define RSN_AKM_PSK 2 /* Pre-shared Key */ 57 #define RSN_AKM_SHA256_1X 5 /* SHA256, 802.1X */ 58 #define RSN_AKM_SHA256_PSK 6 /* SHA256, Pre-shared Key */ 59 #define RSN_AKM_SAE 8 /* SAE */ 60 #define RSN_CAP_LEN 2 /* Length of RSN capabilities */ 61 #define RSN_CAP_PTK_REPLAY_CNTR_MASK (BIT(2) | BIT(3)) 62 #define RSN_CAP_MFPR_MASK BIT(6) 63 #define RSN_CAP_MFPC_MASK BIT(7) 64 #define RSN_PMKID_COUNT_LEN 2 65 66 #define VNDR_IE_CMD_LEN 4 /* length of the set command 67 * string :"add", "del" (+ NUL) 68 */ 69 #define VNDR_IE_COUNT_OFFSET 4 70 #define VNDR_IE_PKTFLAG_OFFSET 8 71 #define VNDR_IE_VSIE_OFFSET 12 72 #define VNDR_IE_HDR_SIZE 12 73 #define VNDR_IE_PARSE_LIMIT 5 74 75 #define DOT11_MGMT_HDR_LEN 24 /* d11 management header len */ 76 #define DOT11_BCN_PRB_FIXED_LEN 12 /* beacon/probe fixed length */ 77 78 #define BRCMF_SCAN_JOIN_ACTIVE_DWELL_TIME_MS 320 79 #define BRCMF_SCAN_JOIN_PASSIVE_DWELL_TIME_MS 400 80 #define BRCMF_SCAN_JOIN_PROBE_INTERVAL_MS 20 81 82 #define BRCMF_SCAN_CHANNEL_TIME 40 83 #define BRCMF_SCAN_UNASSOC_TIME 40 84 #define BRCMF_SCAN_PASSIVE_TIME 120 85 86 #define BRCMF_ND_INFO_TIMEOUT msecs_to_jiffies(2000) 87 88 #define BRCMF_PS_MAX_TIMEOUT_MS 2000 89 90 #define BRCMF_ASSOC_PARAMS_FIXED_SIZE \ 91 (sizeof(struct brcmf_assoc_params_le) - sizeof(u16)) 92 93 static bool check_vif_up(struct brcmf_cfg80211_vif *vif) 94 { 95 if (!test_bit(BRCMF_VIF_STATUS_READY, &vif->sme_state)) { 96 brcmf_dbg(INFO, "device is not ready : status (%lu)\n", 97 vif->sme_state); 98 return false; 99 } 100 return true; 101 } 102 103 #define RATE_TO_BASE100KBPS(rate) (((rate) * 10) / 2) 104 #define RATETAB_ENT(_rateid, _flags) \ 105 { \ 106 .bitrate = RATE_TO_BASE100KBPS(_rateid), \ 107 .hw_value = (_rateid), \ 108 .flags = (_flags), \ 109 } 110 111 static struct ieee80211_rate __wl_rates[] = { 112 RATETAB_ENT(BRCM_RATE_1M, 0), 113 RATETAB_ENT(BRCM_RATE_2M, IEEE80211_RATE_SHORT_PREAMBLE), 114 RATETAB_ENT(BRCM_RATE_5M5, IEEE80211_RATE_SHORT_PREAMBLE), 115 RATETAB_ENT(BRCM_RATE_11M, IEEE80211_RATE_SHORT_PREAMBLE), 116 RATETAB_ENT(BRCM_RATE_6M, 0), 117 RATETAB_ENT(BRCM_RATE_9M, 0), 118 RATETAB_ENT(BRCM_RATE_12M, 0), 119 RATETAB_ENT(BRCM_RATE_18M, 0), 120 RATETAB_ENT(BRCM_RATE_24M, 0), 121 RATETAB_ENT(BRCM_RATE_36M, 0), 122 RATETAB_ENT(BRCM_RATE_48M, 0), 123 RATETAB_ENT(BRCM_RATE_54M, 0), 124 }; 125 126 #define wl_g_rates (__wl_rates + 0) 127 #define wl_g_rates_size ARRAY_SIZE(__wl_rates) 128 #define wl_a_rates (__wl_rates + 4) 129 #define wl_a_rates_size (wl_g_rates_size - 4) 130 131 #define CHAN2G(_channel, _freq) { \ 132 .band = NL80211_BAND_2GHZ, \ 133 .center_freq = (_freq), \ 134 .hw_value = (_channel), \ 135 .max_antenna_gain = 0, \ 136 .max_power = 30, \ 137 } 138 139 #define CHAN5G(_channel) { \ 140 .band = NL80211_BAND_5GHZ, \ 141 .center_freq = 5000 + (5 * (_channel)), \ 142 .hw_value = (_channel), \ 143 .max_antenna_gain = 0, \ 144 .max_power = 30, \ 145 } 146 147 static struct ieee80211_channel __wl_2ghz_channels[] = { 148 CHAN2G(1, 2412), CHAN2G(2, 2417), CHAN2G(3, 2422), CHAN2G(4, 2427), 149 CHAN2G(5, 2432), CHAN2G(6, 2437), CHAN2G(7, 2442), CHAN2G(8, 2447), 150 CHAN2G(9, 2452), CHAN2G(10, 2457), CHAN2G(11, 2462), CHAN2G(12, 2467), 151 CHAN2G(13, 2472), CHAN2G(14, 2484) 152 }; 153 154 static struct ieee80211_channel __wl_5ghz_channels[] = { 155 CHAN5G(34), CHAN5G(36), CHAN5G(38), CHAN5G(40), CHAN5G(42), 156 CHAN5G(44), CHAN5G(46), CHAN5G(48), CHAN5G(52), CHAN5G(56), 157 CHAN5G(60), CHAN5G(64), CHAN5G(100), CHAN5G(104), CHAN5G(108), 158 CHAN5G(112), CHAN5G(116), CHAN5G(120), CHAN5G(124), CHAN5G(128), 159 CHAN5G(132), CHAN5G(136), CHAN5G(140), CHAN5G(144), CHAN5G(149), 160 CHAN5G(153), CHAN5G(157), CHAN5G(161), CHAN5G(165) 161 }; 162 163 /* Band templates duplicated per wiphy. The channel info 164 * above is added to the band during setup. 165 */ 166 static const struct ieee80211_supported_band __wl_band_2ghz = { 167 .band = NL80211_BAND_2GHZ, 168 .bitrates = wl_g_rates, 169 .n_bitrates = wl_g_rates_size, 170 }; 171 172 static const struct ieee80211_supported_band __wl_band_5ghz = { 173 .band = NL80211_BAND_5GHZ, 174 .bitrates = wl_a_rates, 175 .n_bitrates = wl_a_rates_size, 176 }; 177 178 /* This is to override regulatory domains defined in cfg80211 module (reg.c) 179 * By default world regulatory domain defined in reg.c puts the flags 180 * NL80211_RRF_NO_IR for 5GHz channels (for * 36..48 and 149..165). 181 * With respect to these flags, wpa_supplicant doesn't * start p2p 182 * operations on 5GHz channels. All the changes in world regulatory 183 * domain are to be done here. 184 */ 185 static const struct ieee80211_regdomain brcmf_regdom = { 186 .n_reg_rules = 4, 187 .alpha2 = "99", 188 .reg_rules = { 189 /* IEEE 802.11b/g, channels 1..11 */ 190 REG_RULE(2412-10, 2472+10, 40, 6, 20, 0), 191 /* If any */ 192 /* IEEE 802.11 channel 14 - Only JP enables 193 * this and for 802.11b only 194 */ 195 REG_RULE(2484-10, 2484+10, 20, 6, 20, 0), 196 /* IEEE 802.11a, channel 36..64 */ 197 REG_RULE(5150-10, 5350+10, 160, 6, 20, 0), 198 /* IEEE 802.11a, channel 100..165 */ 199 REG_RULE(5470-10, 5850+10, 160, 6, 20, 0), } 200 }; 201 202 /* Note: brcmf_cipher_suites is an array of int defining which cipher suites 203 * are supported. A pointer to this array and the number of entries is passed 204 * on to upper layers. AES_CMAC defines whether or not the driver supports MFP. 205 * So the cipher suite AES_CMAC has to be the last one in the array, and when 206 * device does not support MFP then the number of suites will be decreased by 1 207 */ 208 static const u32 brcmf_cipher_suites[] = { 209 WLAN_CIPHER_SUITE_WEP40, 210 WLAN_CIPHER_SUITE_WEP104, 211 WLAN_CIPHER_SUITE_TKIP, 212 WLAN_CIPHER_SUITE_CCMP, 213 /* Keep as last entry: */ 214 WLAN_CIPHER_SUITE_AES_CMAC 215 }; 216 217 /* Vendor specific ie. id = 221, oui and type defines exact ie */ 218 struct brcmf_vs_tlv { 219 u8 id; 220 u8 len; 221 u8 oui[3]; 222 u8 oui_type; 223 }; 224 225 struct parsed_vndr_ie_info { 226 u8 *ie_ptr; 227 u32 ie_len; /* total length including id & length field */ 228 struct brcmf_vs_tlv vndrie; 229 }; 230 231 struct parsed_vndr_ies { 232 u32 count; 233 struct parsed_vndr_ie_info ie_info[VNDR_IE_PARSE_LIMIT]; 234 }; 235 236 static u8 nl80211_band_to_fwil(enum nl80211_band band) 237 { 238 switch (band) { 239 case NL80211_BAND_2GHZ: 240 return WLC_BAND_2G; 241 case NL80211_BAND_5GHZ: 242 return WLC_BAND_5G; 243 default: 244 WARN_ON(1); 245 break; 246 } 247 return 0; 248 } 249 250 static u16 chandef_to_chanspec(struct brcmu_d11inf *d11inf, 251 struct cfg80211_chan_def *ch) 252 { 253 struct brcmu_chan ch_inf; 254 s32 primary_offset; 255 256 brcmf_dbg(TRACE, "chandef: control %d center %d width %d\n", 257 ch->chan->center_freq, ch->center_freq1, ch->width); 258 ch_inf.chnum = ieee80211_frequency_to_channel(ch->center_freq1); 259 primary_offset = ch->chan->center_freq - ch->center_freq1; 260 switch (ch->width) { 261 case NL80211_CHAN_WIDTH_20: 262 case NL80211_CHAN_WIDTH_20_NOHT: 263 ch_inf.bw = BRCMU_CHAN_BW_20; 264 WARN_ON(primary_offset != 0); 265 break; 266 case NL80211_CHAN_WIDTH_40: 267 ch_inf.bw = BRCMU_CHAN_BW_40; 268 if (primary_offset > 0) 269 ch_inf.sb = BRCMU_CHAN_SB_U; 270 else 271 ch_inf.sb = BRCMU_CHAN_SB_L; 272 break; 273 case NL80211_CHAN_WIDTH_80: 274 ch_inf.bw = BRCMU_CHAN_BW_80; 275 if (primary_offset == -30) 276 ch_inf.sb = BRCMU_CHAN_SB_LL; 277 else if (primary_offset == -10) 278 ch_inf.sb = BRCMU_CHAN_SB_LU; 279 else if (primary_offset == 10) 280 ch_inf.sb = BRCMU_CHAN_SB_UL; 281 else 282 ch_inf.sb = BRCMU_CHAN_SB_UU; 283 break; 284 case NL80211_CHAN_WIDTH_160: 285 ch_inf.bw = BRCMU_CHAN_BW_160; 286 if (primary_offset == -70) 287 ch_inf.sb = BRCMU_CHAN_SB_LLL; 288 else if (primary_offset == -50) 289 ch_inf.sb = BRCMU_CHAN_SB_LLU; 290 else if (primary_offset == -30) 291 ch_inf.sb = BRCMU_CHAN_SB_LUL; 292 else if (primary_offset == -10) 293 ch_inf.sb = BRCMU_CHAN_SB_LUU; 294 else if (primary_offset == 10) 295 ch_inf.sb = BRCMU_CHAN_SB_ULL; 296 else if (primary_offset == 30) 297 ch_inf.sb = BRCMU_CHAN_SB_ULU; 298 else if (primary_offset == 50) 299 ch_inf.sb = BRCMU_CHAN_SB_UUL; 300 else 301 ch_inf.sb = BRCMU_CHAN_SB_UUU; 302 break; 303 case NL80211_CHAN_WIDTH_80P80: 304 case NL80211_CHAN_WIDTH_5: 305 case NL80211_CHAN_WIDTH_10: 306 default: 307 WARN_ON_ONCE(1); 308 } 309 switch (ch->chan->band) { 310 case NL80211_BAND_2GHZ: 311 ch_inf.band = BRCMU_CHAN_BAND_2G; 312 break; 313 case NL80211_BAND_5GHZ: 314 ch_inf.band = BRCMU_CHAN_BAND_5G; 315 break; 316 case NL80211_BAND_60GHZ: 317 default: 318 WARN_ON_ONCE(1); 319 } 320 d11inf->encchspec(&ch_inf); 321 322 brcmf_dbg(TRACE, "chanspec: 0x%x\n", ch_inf.chspec); 323 return ch_inf.chspec; 324 } 325 326 u16 channel_to_chanspec(struct brcmu_d11inf *d11inf, 327 struct ieee80211_channel *ch) 328 { 329 struct brcmu_chan ch_inf; 330 331 ch_inf.chnum = ieee80211_frequency_to_channel(ch->center_freq); 332 ch_inf.bw = BRCMU_CHAN_BW_20; 333 d11inf->encchspec(&ch_inf); 334 335 return ch_inf.chspec; 336 } 337 338 /* Traverse a string of 1-byte tag/1-byte length/variable-length value 339 * triples, returning a pointer to the substring whose first element 340 * matches tag 341 */ 342 static const struct brcmf_tlv * 343 brcmf_parse_tlvs(const void *buf, int buflen, uint key) 344 { 345 const struct brcmf_tlv *elt = buf; 346 int totlen = buflen; 347 348 /* find tagged parameter */ 349 while (totlen >= TLV_HDR_LEN) { 350 int len = elt->len; 351 352 /* validate remaining totlen */ 353 if ((elt->id == key) && (totlen >= (len + TLV_HDR_LEN))) 354 return elt; 355 356 elt = (struct brcmf_tlv *)((u8 *)elt + (len + TLV_HDR_LEN)); 357 totlen -= (len + TLV_HDR_LEN); 358 } 359 360 return NULL; 361 } 362 363 /* Is any of the tlvs the expected entry? If 364 * not update the tlvs buffer pointer/length. 365 */ 366 static bool 367 brcmf_tlv_has_ie(const u8 *ie, const u8 **tlvs, u32 *tlvs_len, 368 const u8 *oui, u32 oui_len, u8 type) 369 { 370 /* If the contents match the OUI and the type */ 371 if (ie[TLV_LEN_OFF] >= oui_len + 1 && 372 !memcmp(&ie[TLV_BODY_OFF], oui, oui_len) && 373 type == ie[TLV_BODY_OFF + oui_len]) { 374 return true; 375 } 376 377 if (tlvs == NULL) 378 return false; 379 /* point to the next ie */ 380 ie += ie[TLV_LEN_OFF] + TLV_HDR_LEN; 381 /* calculate the length of the rest of the buffer */ 382 *tlvs_len -= (int)(ie - *tlvs); 383 /* update the pointer to the start of the buffer */ 384 *tlvs = ie; 385 386 return false; 387 } 388 389 static struct brcmf_vs_tlv * 390 brcmf_find_wpaie(const u8 *parse, u32 len) 391 { 392 const struct brcmf_tlv *ie; 393 394 while ((ie = brcmf_parse_tlvs(parse, len, WLAN_EID_VENDOR_SPECIFIC))) { 395 if (brcmf_tlv_has_ie((const u8 *)ie, &parse, &len, 396 WPA_OUI, TLV_OUI_LEN, WPA_OUI_TYPE)) 397 return (struct brcmf_vs_tlv *)ie; 398 } 399 return NULL; 400 } 401 402 static struct brcmf_vs_tlv * 403 brcmf_find_wpsie(const u8 *parse, u32 len) 404 { 405 const struct brcmf_tlv *ie; 406 407 while ((ie = brcmf_parse_tlvs(parse, len, WLAN_EID_VENDOR_SPECIFIC))) { 408 if (brcmf_tlv_has_ie((u8 *)ie, &parse, &len, 409 WPA_OUI, TLV_OUI_LEN, WPS_OUI_TYPE)) 410 return (struct brcmf_vs_tlv *)ie; 411 } 412 return NULL; 413 } 414 415 static int brcmf_vif_change_validate(struct brcmf_cfg80211_info *cfg, 416 struct brcmf_cfg80211_vif *vif, 417 enum nl80211_iftype new_type) 418 { 419 struct brcmf_cfg80211_vif *pos; 420 bool check_combos = false; 421 int ret = 0; 422 struct iface_combination_params params = { 423 .num_different_channels = 1, 424 }; 425 426 list_for_each_entry(pos, &cfg->vif_list, list) 427 if (pos == vif) { 428 params.iftype_num[new_type]++; 429 } else { 430 /* concurrent interfaces so need check combinations */ 431 check_combos = true; 432 params.iftype_num[pos->wdev.iftype]++; 433 } 434 435 if (check_combos) 436 ret = cfg80211_check_combinations(cfg->wiphy, ¶ms); 437 438 return ret; 439 } 440 441 static int brcmf_vif_add_validate(struct brcmf_cfg80211_info *cfg, 442 enum nl80211_iftype new_type) 443 { 444 struct brcmf_cfg80211_vif *pos; 445 struct iface_combination_params params = { 446 .num_different_channels = 1, 447 }; 448 449 list_for_each_entry(pos, &cfg->vif_list, list) 450 params.iftype_num[pos->wdev.iftype]++; 451 452 params.iftype_num[new_type]++; 453 return cfg80211_check_combinations(cfg->wiphy, ¶ms); 454 } 455 456 static void convert_key_from_CPU(struct brcmf_wsec_key *key, 457 struct brcmf_wsec_key_le *key_le) 458 { 459 key_le->index = cpu_to_le32(key->index); 460 key_le->len = cpu_to_le32(key->len); 461 key_le->algo = cpu_to_le32(key->algo); 462 key_le->flags = cpu_to_le32(key->flags); 463 key_le->rxiv.hi = cpu_to_le32(key->rxiv.hi); 464 key_le->rxiv.lo = cpu_to_le16(key->rxiv.lo); 465 key_le->iv_initialized = cpu_to_le32(key->iv_initialized); 466 memcpy(key_le->data, key->data, sizeof(key->data)); 467 memcpy(key_le->ea, key->ea, sizeof(key->ea)); 468 } 469 470 static int 471 send_key_to_dongle(struct brcmf_if *ifp, struct brcmf_wsec_key *key) 472 { 473 struct brcmf_pub *drvr = ifp->drvr; 474 int err; 475 struct brcmf_wsec_key_le key_le; 476 477 convert_key_from_CPU(key, &key_le); 478 479 brcmf_netdev_wait_pend8021x(ifp); 480 481 err = brcmf_fil_bsscfg_data_set(ifp, "wsec_key", &key_le, 482 sizeof(key_le)); 483 484 if (err) 485 bphy_err(drvr, "wsec_key error (%d)\n", err); 486 return err; 487 } 488 489 static void 490 brcmf_cfg80211_update_proto_addr_mode(struct wireless_dev *wdev) 491 { 492 struct brcmf_cfg80211_vif *vif; 493 struct brcmf_if *ifp; 494 495 vif = container_of(wdev, struct brcmf_cfg80211_vif, wdev); 496 ifp = vif->ifp; 497 498 if ((wdev->iftype == NL80211_IFTYPE_ADHOC) || 499 (wdev->iftype == NL80211_IFTYPE_AP) || 500 (wdev->iftype == NL80211_IFTYPE_P2P_GO)) 501 brcmf_proto_configure_addr_mode(ifp->drvr, ifp->ifidx, 502 ADDR_DIRECT); 503 else 504 brcmf_proto_configure_addr_mode(ifp->drvr, ifp->ifidx, 505 ADDR_INDIRECT); 506 } 507 508 static int brcmf_get_first_free_bsscfgidx(struct brcmf_pub *drvr) 509 { 510 int bsscfgidx; 511 512 for (bsscfgidx = 0; bsscfgidx < BRCMF_MAX_IFS; bsscfgidx++) { 513 /* bsscfgidx 1 is reserved for legacy P2P */ 514 if (bsscfgidx == 1) 515 continue; 516 if (!drvr->iflist[bsscfgidx]) 517 return bsscfgidx; 518 } 519 520 return -ENOMEM; 521 } 522 523 static int brcmf_cfg80211_request_ap_if(struct brcmf_if *ifp) 524 { 525 struct brcmf_pub *drvr = ifp->drvr; 526 struct brcmf_mbss_ssid_le mbss_ssid_le; 527 int bsscfgidx; 528 int err; 529 530 memset(&mbss_ssid_le, 0, sizeof(mbss_ssid_le)); 531 bsscfgidx = brcmf_get_first_free_bsscfgidx(ifp->drvr); 532 if (bsscfgidx < 0) 533 return bsscfgidx; 534 535 mbss_ssid_le.bsscfgidx = cpu_to_le32(bsscfgidx); 536 mbss_ssid_le.SSID_len = cpu_to_le32(5); 537 sprintf(mbss_ssid_le.SSID, "ssid%d" , bsscfgidx); 538 539 err = brcmf_fil_bsscfg_data_set(ifp, "bsscfg:ssid", &mbss_ssid_le, 540 sizeof(mbss_ssid_le)); 541 if (err < 0) 542 bphy_err(drvr, "setting ssid failed %d\n", err); 543 544 return err; 545 } 546 547 /** 548 * brcmf_ap_add_vif() - create a new AP virtual interface for multiple BSS 549 * 550 * @wiphy: wiphy device of new interface. 551 * @name: name of the new interface. 552 * @params: contains mac address for AP device. 553 */ 554 static 555 struct wireless_dev *brcmf_ap_add_vif(struct wiphy *wiphy, const char *name, 556 struct vif_params *params) 557 { 558 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 559 struct brcmf_if *ifp = netdev_priv(cfg_to_ndev(cfg)); 560 struct brcmf_pub *drvr = cfg->pub; 561 struct brcmf_cfg80211_vif *vif; 562 int err; 563 564 if (brcmf_cfg80211_vif_event_armed(cfg)) 565 return ERR_PTR(-EBUSY); 566 567 brcmf_dbg(INFO, "Adding vif \"%s\"\n", name); 568 569 vif = brcmf_alloc_vif(cfg, NL80211_IFTYPE_AP); 570 if (IS_ERR(vif)) 571 return (struct wireless_dev *)vif; 572 573 brcmf_cfg80211_arm_vif_event(cfg, vif); 574 575 err = brcmf_cfg80211_request_ap_if(ifp); 576 if (err) { 577 brcmf_cfg80211_arm_vif_event(cfg, NULL); 578 goto fail; 579 } 580 581 /* wait for firmware event */ 582 err = brcmf_cfg80211_wait_vif_event(cfg, BRCMF_E_IF_ADD, 583 BRCMF_VIF_EVENT_TIMEOUT); 584 brcmf_cfg80211_arm_vif_event(cfg, NULL); 585 if (!err) { 586 bphy_err(drvr, "timeout occurred\n"); 587 err = -EIO; 588 goto fail; 589 } 590 591 /* interface created in firmware */ 592 ifp = vif->ifp; 593 if (!ifp) { 594 bphy_err(drvr, "no if pointer provided\n"); 595 err = -ENOENT; 596 goto fail; 597 } 598 599 strncpy(ifp->ndev->name, name, sizeof(ifp->ndev->name) - 1); 600 err = brcmf_net_attach(ifp, true); 601 if (err) { 602 bphy_err(drvr, "Registering netdevice failed\n"); 603 free_netdev(ifp->ndev); 604 goto fail; 605 } 606 607 return &ifp->vif->wdev; 608 609 fail: 610 brcmf_free_vif(vif); 611 return ERR_PTR(err); 612 } 613 614 static bool brcmf_is_apmode(struct brcmf_cfg80211_vif *vif) 615 { 616 enum nl80211_iftype iftype; 617 618 iftype = vif->wdev.iftype; 619 return iftype == NL80211_IFTYPE_AP || iftype == NL80211_IFTYPE_P2P_GO; 620 } 621 622 static bool brcmf_is_ibssmode(struct brcmf_cfg80211_vif *vif) 623 { 624 return vif->wdev.iftype == NL80211_IFTYPE_ADHOC; 625 } 626 627 /** 628 * brcmf_mon_add_vif() - create monitor mode virtual interface 629 * 630 * @wiphy: wiphy device of new interface. 631 * @name: name of the new interface. 632 */ 633 static struct wireless_dev *brcmf_mon_add_vif(struct wiphy *wiphy, 634 const char *name) 635 { 636 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 637 struct brcmf_cfg80211_vif *vif; 638 struct net_device *ndev; 639 struct brcmf_if *ifp; 640 int err; 641 642 if (cfg->pub->mon_if) { 643 err = -EEXIST; 644 goto err_out; 645 } 646 647 vif = brcmf_alloc_vif(cfg, NL80211_IFTYPE_MONITOR); 648 if (IS_ERR(vif)) { 649 err = PTR_ERR(vif); 650 goto err_out; 651 } 652 653 ndev = alloc_netdev(sizeof(*ifp), name, NET_NAME_UNKNOWN, ether_setup); 654 if (!ndev) { 655 err = -ENOMEM; 656 goto err_free_vif; 657 } 658 ndev->type = ARPHRD_IEEE80211_RADIOTAP; 659 ndev->ieee80211_ptr = &vif->wdev; 660 ndev->needs_free_netdev = true; 661 ndev->priv_destructor = brcmf_cfg80211_free_netdev; 662 SET_NETDEV_DEV(ndev, wiphy_dev(cfg->wiphy)); 663 664 ifp = netdev_priv(ndev); 665 ifp->vif = vif; 666 ifp->ndev = ndev; 667 ifp->drvr = cfg->pub; 668 669 vif->ifp = ifp; 670 vif->wdev.netdev = ndev; 671 672 err = brcmf_net_mon_attach(ifp); 673 if (err) { 674 brcmf_err("Failed to attach %s device\n", ndev->name); 675 free_netdev(ndev); 676 goto err_free_vif; 677 } 678 679 cfg->pub->mon_if = ifp; 680 681 return &vif->wdev; 682 683 err_free_vif: 684 brcmf_free_vif(vif); 685 err_out: 686 return ERR_PTR(err); 687 } 688 689 static int brcmf_mon_del_vif(struct wiphy *wiphy, struct wireless_dev *wdev) 690 { 691 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 692 struct net_device *ndev = wdev->netdev; 693 694 ndev->netdev_ops->ndo_stop(ndev); 695 696 brcmf_net_detach(ndev, true); 697 698 cfg->pub->mon_if = NULL; 699 700 return 0; 701 } 702 703 static struct wireless_dev *brcmf_cfg80211_add_iface(struct wiphy *wiphy, 704 const char *name, 705 unsigned char name_assign_type, 706 enum nl80211_iftype type, 707 struct vif_params *params) 708 { 709 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 710 struct brcmf_pub *drvr = cfg->pub; 711 struct wireless_dev *wdev; 712 int err; 713 714 brcmf_dbg(TRACE, "enter: %s type %d\n", name, type); 715 err = brcmf_vif_add_validate(wiphy_to_cfg(wiphy), type); 716 if (err) { 717 bphy_err(drvr, "iface validation failed: err=%d\n", err); 718 return ERR_PTR(err); 719 } 720 switch (type) { 721 case NL80211_IFTYPE_ADHOC: 722 case NL80211_IFTYPE_STATION: 723 case NL80211_IFTYPE_AP_VLAN: 724 case NL80211_IFTYPE_WDS: 725 case NL80211_IFTYPE_MESH_POINT: 726 return ERR_PTR(-EOPNOTSUPP); 727 case NL80211_IFTYPE_MONITOR: 728 return brcmf_mon_add_vif(wiphy, name); 729 case NL80211_IFTYPE_AP: 730 wdev = brcmf_ap_add_vif(wiphy, name, params); 731 break; 732 case NL80211_IFTYPE_P2P_CLIENT: 733 case NL80211_IFTYPE_P2P_GO: 734 case NL80211_IFTYPE_P2P_DEVICE: 735 wdev = brcmf_p2p_add_vif(wiphy, name, name_assign_type, type, params); 736 break; 737 case NL80211_IFTYPE_UNSPECIFIED: 738 default: 739 return ERR_PTR(-EINVAL); 740 } 741 742 if (IS_ERR(wdev)) 743 bphy_err(drvr, "add iface %s type %d failed: err=%d\n", name, 744 type, (int)PTR_ERR(wdev)); 745 else 746 brcmf_cfg80211_update_proto_addr_mode(wdev); 747 748 return wdev; 749 } 750 751 static void brcmf_scan_config_mpc(struct brcmf_if *ifp, int mpc) 752 { 753 if (brcmf_feat_is_quirk_enabled(ifp, BRCMF_FEAT_QUIRK_NEED_MPC)) 754 brcmf_set_mpc(ifp, mpc); 755 } 756 757 void brcmf_set_mpc(struct brcmf_if *ifp, int mpc) 758 { 759 struct brcmf_pub *drvr = ifp->drvr; 760 s32 err = 0; 761 762 if (check_vif_up(ifp->vif)) { 763 err = brcmf_fil_iovar_int_set(ifp, "mpc", mpc); 764 if (err) { 765 bphy_err(drvr, "fail to set mpc\n"); 766 return; 767 } 768 brcmf_dbg(INFO, "MPC : %d\n", mpc); 769 } 770 } 771 772 s32 brcmf_notify_escan_complete(struct brcmf_cfg80211_info *cfg, 773 struct brcmf_if *ifp, bool aborted, 774 bool fw_abort) 775 { 776 struct brcmf_pub *drvr = cfg->pub; 777 struct brcmf_scan_params_le params_le; 778 struct cfg80211_scan_request *scan_request; 779 u64 reqid; 780 u32 bucket; 781 s32 err = 0; 782 783 brcmf_dbg(SCAN, "Enter\n"); 784 785 /* clear scan request, because the FW abort can cause a second call */ 786 /* to this functon and might cause a double cfg80211_scan_done */ 787 scan_request = cfg->scan_request; 788 cfg->scan_request = NULL; 789 790 if (timer_pending(&cfg->escan_timeout)) 791 del_timer_sync(&cfg->escan_timeout); 792 793 if (fw_abort) { 794 /* Do a scan abort to stop the driver's scan engine */ 795 brcmf_dbg(SCAN, "ABORT scan in firmware\n"); 796 memset(¶ms_le, 0, sizeof(params_le)); 797 eth_broadcast_addr(params_le.bssid); 798 params_le.bss_type = DOT11_BSSTYPE_ANY; 799 params_le.scan_type = 0; 800 params_le.channel_num = cpu_to_le32(1); 801 params_le.nprobes = cpu_to_le32(1); 802 params_le.active_time = cpu_to_le32(-1); 803 params_le.passive_time = cpu_to_le32(-1); 804 params_le.home_time = cpu_to_le32(-1); 805 /* Scan is aborted by setting channel_list[0] to -1 */ 806 params_le.channel_list[0] = cpu_to_le16(-1); 807 /* E-Scan (or anyother type) can be aborted by SCAN */ 808 err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SCAN, 809 ¶ms_le, sizeof(params_le)); 810 if (err) 811 bphy_err(drvr, "Scan abort failed\n"); 812 } 813 814 brcmf_scan_config_mpc(ifp, 1); 815 816 /* 817 * e-scan can be initiated internally 818 * which takes precedence. 819 */ 820 if (cfg->int_escan_map) { 821 brcmf_dbg(SCAN, "scheduled scan completed (%x)\n", 822 cfg->int_escan_map); 823 while (cfg->int_escan_map) { 824 bucket = __ffs(cfg->int_escan_map); 825 cfg->int_escan_map &= ~BIT(bucket); 826 reqid = brcmf_pno_find_reqid_by_bucket(cfg->pno, 827 bucket); 828 if (!aborted) { 829 brcmf_dbg(SCAN, "report results: reqid=%llu\n", 830 reqid); 831 cfg80211_sched_scan_results(cfg_to_wiphy(cfg), 832 reqid); 833 } 834 } 835 } else if (scan_request) { 836 struct cfg80211_scan_info info = { 837 .aborted = aborted, 838 }; 839 840 brcmf_dbg(SCAN, "ESCAN Completed scan: %s\n", 841 aborted ? "Aborted" : "Done"); 842 cfg80211_scan_done(scan_request, &info); 843 } 844 if (!test_and_clear_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status)) 845 brcmf_dbg(SCAN, "Scan complete, probably P2P scan\n"); 846 847 return err; 848 } 849 850 static int brcmf_cfg80211_del_ap_iface(struct wiphy *wiphy, 851 struct wireless_dev *wdev) 852 { 853 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 854 struct net_device *ndev = wdev->netdev; 855 struct brcmf_if *ifp = netdev_priv(ndev); 856 struct brcmf_pub *drvr = cfg->pub; 857 int ret; 858 int err; 859 860 brcmf_cfg80211_arm_vif_event(cfg, ifp->vif); 861 862 err = brcmf_fil_bsscfg_data_set(ifp, "interface_remove", NULL, 0); 863 if (err) { 864 bphy_err(drvr, "interface_remove failed %d\n", err); 865 goto err_unarm; 866 } 867 868 /* wait for firmware event */ 869 ret = brcmf_cfg80211_wait_vif_event(cfg, BRCMF_E_IF_DEL, 870 BRCMF_VIF_EVENT_TIMEOUT); 871 if (!ret) { 872 bphy_err(drvr, "timeout occurred\n"); 873 err = -EIO; 874 goto err_unarm; 875 } 876 877 brcmf_remove_interface(ifp, true); 878 879 err_unarm: 880 brcmf_cfg80211_arm_vif_event(cfg, NULL); 881 return err; 882 } 883 884 static 885 int brcmf_cfg80211_del_iface(struct wiphy *wiphy, struct wireless_dev *wdev) 886 { 887 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 888 struct net_device *ndev = wdev->netdev; 889 890 if (ndev && ndev == cfg_to_ndev(cfg)) 891 return -ENOTSUPP; 892 893 /* vif event pending in firmware */ 894 if (brcmf_cfg80211_vif_event_armed(cfg)) 895 return -EBUSY; 896 897 if (ndev) { 898 if (test_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status) && 899 cfg->escan_info.ifp == netdev_priv(ndev)) 900 brcmf_notify_escan_complete(cfg, netdev_priv(ndev), 901 true, true); 902 903 brcmf_fil_iovar_int_set(netdev_priv(ndev), "mpc", 1); 904 } 905 906 switch (wdev->iftype) { 907 case NL80211_IFTYPE_ADHOC: 908 case NL80211_IFTYPE_STATION: 909 case NL80211_IFTYPE_AP_VLAN: 910 case NL80211_IFTYPE_WDS: 911 case NL80211_IFTYPE_MESH_POINT: 912 return -EOPNOTSUPP; 913 case NL80211_IFTYPE_MONITOR: 914 return brcmf_mon_del_vif(wiphy, wdev); 915 case NL80211_IFTYPE_AP: 916 return brcmf_cfg80211_del_ap_iface(wiphy, wdev); 917 case NL80211_IFTYPE_P2P_CLIENT: 918 case NL80211_IFTYPE_P2P_GO: 919 case NL80211_IFTYPE_P2P_DEVICE: 920 return brcmf_p2p_del_vif(wiphy, wdev); 921 case NL80211_IFTYPE_UNSPECIFIED: 922 default: 923 return -EINVAL; 924 } 925 return -EOPNOTSUPP; 926 } 927 928 static s32 929 brcmf_cfg80211_change_iface(struct wiphy *wiphy, struct net_device *ndev, 930 enum nl80211_iftype type, 931 struct vif_params *params) 932 { 933 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 934 struct brcmf_if *ifp = netdev_priv(ndev); 935 struct brcmf_cfg80211_vif *vif = ifp->vif; 936 struct brcmf_pub *drvr = cfg->pub; 937 s32 infra = 0; 938 s32 ap = 0; 939 s32 err = 0; 940 941 brcmf_dbg(TRACE, "Enter, bsscfgidx=%d, type=%d\n", ifp->bsscfgidx, 942 type); 943 944 /* WAR: There are a number of p2p interface related problems which 945 * need to be handled initially (before doing the validate). 946 * wpa_supplicant tends to do iface changes on p2p device/client/go 947 * which are not always possible/allowed. However we need to return 948 * OK otherwise the wpa_supplicant wont start. The situation differs 949 * on configuration and setup (p2pon=1 module param). The first check 950 * is to see if the request is a change to station for p2p iface. 951 */ 952 if ((type == NL80211_IFTYPE_STATION) && 953 ((vif->wdev.iftype == NL80211_IFTYPE_P2P_CLIENT) || 954 (vif->wdev.iftype == NL80211_IFTYPE_P2P_GO) || 955 (vif->wdev.iftype == NL80211_IFTYPE_P2P_DEVICE))) { 956 brcmf_dbg(TRACE, "Ignoring cmd for p2p if\n"); 957 /* Now depending on whether module param p2pon=1 was used the 958 * response needs to be either 0 or EOPNOTSUPP. The reason is 959 * that if p2pon=1 is used, but a newer supplicant is used then 960 * we should return an error, as this combination wont work. 961 * In other situations 0 is returned and supplicant will start 962 * normally. It will give a trace in cfg80211, but it is the 963 * only way to get it working. Unfortunately this will result 964 * in situation where we wont support new supplicant in 965 * combination with module param p2pon=1, but that is the way 966 * it is. If the user tries this then unloading of driver might 967 * fail/lock. 968 */ 969 if (cfg->p2p.p2pdev_dynamically) 970 return -EOPNOTSUPP; 971 else 972 return 0; 973 } 974 err = brcmf_vif_change_validate(wiphy_to_cfg(wiphy), vif, type); 975 if (err) { 976 bphy_err(drvr, "iface validation failed: err=%d\n", err); 977 return err; 978 } 979 switch (type) { 980 case NL80211_IFTYPE_MONITOR: 981 case NL80211_IFTYPE_WDS: 982 bphy_err(drvr, "type (%d) : currently we do not support this type\n", 983 type); 984 return -EOPNOTSUPP; 985 case NL80211_IFTYPE_ADHOC: 986 infra = 0; 987 break; 988 case NL80211_IFTYPE_STATION: 989 infra = 1; 990 break; 991 case NL80211_IFTYPE_AP: 992 case NL80211_IFTYPE_P2P_GO: 993 ap = 1; 994 break; 995 default: 996 err = -EINVAL; 997 goto done; 998 } 999 1000 if (ap) { 1001 if (type == NL80211_IFTYPE_P2P_GO) { 1002 brcmf_dbg(INFO, "IF Type = P2P GO\n"); 1003 err = brcmf_p2p_ifchange(cfg, BRCMF_FIL_P2P_IF_GO); 1004 } 1005 if (!err) { 1006 brcmf_dbg(INFO, "IF Type = AP\n"); 1007 } 1008 } else { 1009 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_INFRA, infra); 1010 if (err) { 1011 bphy_err(drvr, "WLC_SET_INFRA error (%d)\n", err); 1012 err = -EAGAIN; 1013 goto done; 1014 } 1015 brcmf_dbg(INFO, "IF Type = %s\n", brcmf_is_ibssmode(vif) ? 1016 "Adhoc" : "Infra"); 1017 } 1018 ndev->ieee80211_ptr->iftype = type; 1019 1020 brcmf_cfg80211_update_proto_addr_mode(&vif->wdev); 1021 1022 done: 1023 brcmf_dbg(TRACE, "Exit\n"); 1024 1025 return err; 1026 } 1027 1028 static void brcmf_escan_prep(struct brcmf_cfg80211_info *cfg, 1029 struct brcmf_scan_params_le *params_le, 1030 struct cfg80211_scan_request *request) 1031 { 1032 u32 n_ssids; 1033 u32 n_channels; 1034 s32 i; 1035 s32 offset; 1036 u16 chanspec; 1037 char *ptr; 1038 struct brcmf_ssid_le ssid_le; 1039 1040 eth_broadcast_addr(params_le->bssid); 1041 params_le->bss_type = DOT11_BSSTYPE_ANY; 1042 params_le->scan_type = BRCMF_SCANTYPE_ACTIVE; 1043 params_le->channel_num = 0; 1044 params_le->nprobes = cpu_to_le32(-1); 1045 params_le->active_time = cpu_to_le32(-1); 1046 params_le->passive_time = cpu_to_le32(-1); 1047 params_le->home_time = cpu_to_le32(-1); 1048 memset(¶ms_le->ssid_le, 0, sizeof(params_le->ssid_le)); 1049 1050 n_ssids = request->n_ssids; 1051 n_channels = request->n_channels; 1052 1053 /* Copy channel array if applicable */ 1054 brcmf_dbg(SCAN, "### List of channelspecs to scan ### %d\n", 1055 n_channels); 1056 if (n_channels > 0) { 1057 for (i = 0; i < n_channels; i++) { 1058 chanspec = channel_to_chanspec(&cfg->d11inf, 1059 request->channels[i]); 1060 brcmf_dbg(SCAN, "Chan : %d, Channel spec: %x\n", 1061 request->channels[i]->hw_value, chanspec); 1062 params_le->channel_list[i] = cpu_to_le16(chanspec); 1063 } 1064 } else { 1065 brcmf_dbg(SCAN, "Scanning all channels\n"); 1066 } 1067 /* Copy ssid array if applicable */ 1068 brcmf_dbg(SCAN, "### List of SSIDs to scan ### %d\n", n_ssids); 1069 if (n_ssids > 0) { 1070 offset = offsetof(struct brcmf_scan_params_le, channel_list) + 1071 n_channels * sizeof(u16); 1072 offset = roundup(offset, sizeof(u32)); 1073 ptr = (char *)params_le + offset; 1074 for (i = 0; i < n_ssids; i++) { 1075 memset(&ssid_le, 0, sizeof(ssid_le)); 1076 ssid_le.SSID_len = 1077 cpu_to_le32(request->ssids[i].ssid_len); 1078 memcpy(ssid_le.SSID, request->ssids[i].ssid, 1079 request->ssids[i].ssid_len); 1080 if (!ssid_le.SSID_len) 1081 brcmf_dbg(SCAN, "%d: Broadcast scan\n", i); 1082 else 1083 brcmf_dbg(SCAN, "%d: scan for %.32s size=%d\n", 1084 i, ssid_le.SSID, ssid_le.SSID_len); 1085 memcpy(ptr, &ssid_le, sizeof(ssid_le)); 1086 ptr += sizeof(ssid_le); 1087 } 1088 } else { 1089 brcmf_dbg(SCAN, "Performing passive scan\n"); 1090 params_le->scan_type = BRCMF_SCANTYPE_PASSIVE; 1091 } 1092 /* Adding mask to channel numbers */ 1093 params_le->channel_num = 1094 cpu_to_le32((n_ssids << BRCMF_SCAN_PARAMS_NSSID_SHIFT) | 1095 (n_channels & BRCMF_SCAN_PARAMS_COUNT_MASK)); 1096 } 1097 1098 static s32 1099 brcmf_run_escan(struct brcmf_cfg80211_info *cfg, struct brcmf_if *ifp, 1100 struct cfg80211_scan_request *request) 1101 { 1102 struct brcmf_pub *drvr = cfg->pub; 1103 s32 params_size = BRCMF_SCAN_PARAMS_FIXED_SIZE + 1104 offsetof(struct brcmf_escan_params_le, params_le); 1105 struct brcmf_escan_params_le *params; 1106 s32 err = 0; 1107 1108 brcmf_dbg(SCAN, "E-SCAN START\n"); 1109 1110 if (request != NULL) { 1111 /* Allocate space for populating ssids in struct */ 1112 params_size += sizeof(u32) * ((request->n_channels + 1) / 2); 1113 1114 /* Allocate space for populating ssids in struct */ 1115 params_size += sizeof(struct brcmf_ssid_le) * request->n_ssids; 1116 } 1117 1118 params = kzalloc(params_size, GFP_KERNEL); 1119 if (!params) { 1120 err = -ENOMEM; 1121 goto exit; 1122 } 1123 BUG_ON(params_size + sizeof("escan") >= BRCMF_DCMD_MEDLEN); 1124 brcmf_escan_prep(cfg, ¶ms->params_le, request); 1125 params->version = cpu_to_le32(BRCMF_ESCAN_REQ_VERSION); 1126 params->action = cpu_to_le16(WL_ESCAN_ACTION_START); 1127 params->sync_id = cpu_to_le16(0x1234); 1128 1129 err = brcmf_fil_iovar_data_set(ifp, "escan", params, params_size); 1130 if (err) { 1131 if (err == -EBUSY) 1132 brcmf_dbg(INFO, "system busy : escan canceled\n"); 1133 else 1134 bphy_err(drvr, "error (%d)\n", err); 1135 } 1136 1137 kfree(params); 1138 exit: 1139 return err; 1140 } 1141 1142 static s32 1143 brcmf_do_escan(struct brcmf_if *ifp, struct cfg80211_scan_request *request) 1144 { 1145 struct brcmf_cfg80211_info *cfg = ifp->drvr->config; 1146 s32 err; 1147 struct brcmf_scan_results *results; 1148 struct escan_info *escan = &cfg->escan_info; 1149 1150 brcmf_dbg(SCAN, "Enter\n"); 1151 escan->ifp = ifp; 1152 escan->wiphy = cfg->wiphy; 1153 escan->escan_state = WL_ESCAN_STATE_SCANNING; 1154 1155 brcmf_scan_config_mpc(ifp, 0); 1156 results = (struct brcmf_scan_results *)cfg->escan_info.escan_buf; 1157 results->version = 0; 1158 results->count = 0; 1159 results->buflen = WL_ESCAN_RESULTS_FIXED_SIZE; 1160 1161 err = escan->run(cfg, ifp, request); 1162 if (err) 1163 brcmf_scan_config_mpc(ifp, 1); 1164 return err; 1165 } 1166 1167 static s32 1168 brcmf_cfg80211_scan(struct wiphy *wiphy, struct cfg80211_scan_request *request) 1169 { 1170 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 1171 struct brcmf_pub *drvr = cfg->pub; 1172 struct brcmf_cfg80211_vif *vif; 1173 s32 err = 0; 1174 1175 brcmf_dbg(TRACE, "Enter\n"); 1176 vif = container_of(request->wdev, struct brcmf_cfg80211_vif, wdev); 1177 if (!check_vif_up(vif)) 1178 return -EIO; 1179 1180 if (test_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status)) { 1181 bphy_err(drvr, "Scanning already: status (%lu)\n", 1182 cfg->scan_status); 1183 return -EAGAIN; 1184 } 1185 if (test_bit(BRCMF_SCAN_STATUS_ABORT, &cfg->scan_status)) { 1186 bphy_err(drvr, "Scanning being aborted: status (%lu)\n", 1187 cfg->scan_status); 1188 return -EAGAIN; 1189 } 1190 if (test_bit(BRCMF_SCAN_STATUS_SUPPRESS, &cfg->scan_status)) { 1191 bphy_err(drvr, "Scanning suppressed: status (%lu)\n", 1192 cfg->scan_status); 1193 return -EAGAIN; 1194 } 1195 if (test_bit(BRCMF_VIF_STATUS_CONNECTING, &vif->sme_state)) { 1196 bphy_err(drvr, "Connecting: status (%lu)\n", vif->sme_state); 1197 return -EAGAIN; 1198 } 1199 1200 /* If scan req comes for p2p0, send it over primary I/F */ 1201 if (vif == cfg->p2p.bss_idx[P2PAPI_BSSCFG_DEVICE].vif) 1202 vif = cfg->p2p.bss_idx[P2PAPI_BSSCFG_PRIMARY].vif; 1203 1204 brcmf_dbg(SCAN, "START ESCAN\n"); 1205 1206 cfg->scan_request = request; 1207 set_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status); 1208 1209 cfg->escan_info.run = brcmf_run_escan; 1210 err = brcmf_p2p_scan_prep(wiphy, request, vif); 1211 if (err) 1212 goto scan_out; 1213 1214 err = brcmf_vif_set_mgmt_ie(vif, BRCMF_VNDR_IE_PRBREQ_FLAG, 1215 request->ie, request->ie_len); 1216 if (err) 1217 goto scan_out; 1218 1219 err = brcmf_do_escan(vif->ifp, request); 1220 if (err) 1221 goto scan_out; 1222 1223 /* Arm scan timeout timer */ 1224 mod_timer(&cfg->escan_timeout, 1225 jiffies + msecs_to_jiffies(BRCMF_ESCAN_TIMER_INTERVAL_MS)); 1226 1227 return 0; 1228 1229 scan_out: 1230 bphy_err(drvr, "scan error (%d)\n", err); 1231 clear_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status); 1232 cfg->scan_request = NULL; 1233 return err; 1234 } 1235 1236 static s32 brcmf_set_rts(struct net_device *ndev, u32 rts_threshold) 1237 { 1238 struct brcmf_if *ifp = netdev_priv(ndev); 1239 struct brcmf_pub *drvr = ifp->drvr; 1240 s32 err = 0; 1241 1242 err = brcmf_fil_iovar_int_set(ifp, "rtsthresh", rts_threshold); 1243 if (err) 1244 bphy_err(drvr, "Error (%d)\n", err); 1245 1246 return err; 1247 } 1248 1249 static s32 brcmf_set_frag(struct net_device *ndev, u32 frag_threshold) 1250 { 1251 struct brcmf_if *ifp = netdev_priv(ndev); 1252 struct brcmf_pub *drvr = ifp->drvr; 1253 s32 err = 0; 1254 1255 err = brcmf_fil_iovar_int_set(ifp, "fragthresh", 1256 frag_threshold); 1257 if (err) 1258 bphy_err(drvr, "Error (%d)\n", err); 1259 1260 return err; 1261 } 1262 1263 static s32 brcmf_set_retry(struct net_device *ndev, u32 retry, bool l) 1264 { 1265 struct brcmf_if *ifp = netdev_priv(ndev); 1266 struct brcmf_pub *drvr = ifp->drvr; 1267 s32 err = 0; 1268 u32 cmd = (l ? BRCMF_C_SET_LRL : BRCMF_C_SET_SRL); 1269 1270 err = brcmf_fil_cmd_int_set(ifp, cmd, retry); 1271 if (err) { 1272 bphy_err(drvr, "cmd (%d) , error (%d)\n", cmd, err); 1273 return err; 1274 } 1275 return err; 1276 } 1277 1278 static s32 brcmf_cfg80211_set_wiphy_params(struct wiphy *wiphy, u32 changed) 1279 { 1280 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 1281 struct net_device *ndev = cfg_to_ndev(cfg); 1282 struct brcmf_if *ifp = netdev_priv(ndev); 1283 s32 err = 0; 1284 1285 brcmf_dbg(TRACE, "Enter\n"); 1286 if (!check_vif_up(ifp->vif)) 1287 return -EIO; 1288 1289 if (changed & WIPHY_PARAM_RTS_THRESHOLD && 1290 (cfg->conf->rts_threshold != wiphy->rts_threshold)) { 1291 cfg->conf->rts_threshold = wiphy->rts_threshold; 1292 err = brcmf_set_rts(ndev, cfg->conf->rts_threshold); 1293 if (!err) 1294 goto done; 1295 } 1296 if (changed & WIPHY_PARAM_FRAG_THRESHOLD && 1297 (cfg->conf->frag_threshold != wiphy->frag_threshold)) { 1298 cfg->conf->frag_threshold = wiphy->frag_threshold; 1299 err = brcmf_set_frag(ndev, cfg->conf->frag_threshold); 1300 if (!err) 1301 goto done; 1302 } 1303 if (changed & WIPHY_PARAM_RETRY_LONG 1304 && (cfg->conf->retry_long != wiphy->retry_long)) { 1305 cfg->conf->retry_long = wiphy->retry_long; 1306 err = brcmf_set_retry(ndev, cfg->conf->retry_long, true); 1307 if (!err) 1308 goto done; 1309 } 1310 if (changed & WIPHY_PARAM_RETRY_SHORT 1311 && (cfg->conf->retry_short != wiphy->retry_short)) { 1312 cfg->conf->retry_short = wiphy->retry_short; 1313 err = brcmf_set_retry(ndev, cfg->conf->retry_short, false); 1314 if (!err) 1315 goto done; 1316 } 1317 1318 done: 1319 brcmf_dbg(TRACE, "Exit\n"); 1320 return err; 1321 } 1322 1323 static void brcmf_init_prof(struct brcmf_cfg80211_profile *prof) 1324 { 1325 memset(prof, 0, sizeof(*prof)); 1326 } 1327 1328 static u16 brcmf_map_fw_linkdown_reason(const struct brcmf_event_msg *e) 1329 { 1330 u16 reason; 1331 1332 switch (e->event_code) { 1333 case BRCMF_E_DEAUTH: 1334 case BRCMF_E_DEAUTH_IND: 1335 case BRCMF_E_DISASSOC_IND: 1336 reason = e->reason; 1337 break; 1338 case BRCMF_E_LINK: 1339 default: 1340 reason = 0; 1341 break; 1342 } 1343 return reason; 1344 } 1345 1346 static int brcmf_set_pmk(struct brcmf_if *ifp, const u8 *pmk_data, u16 pmk_len) 1347 { 1348 struct brcmf_pub *drvr = ifp->drvr; 1349 struct brcmf_wsec_pmk_le pmk; 1350 int i, err; 1351 1352 /* convert to firmware key format */ 1353 pmk.key_len = cpu_to_le16(pmk_len << 1); 1354 pmk.flags = cpu_to_le16(BRCMF_WSEC_PASSPHRASE); 1355 for (i = 0; i < pmk_len; i++) 1356 snprintf(&pmk.key[2 * i], 3, "%02x", pmk_data[i]); 1357 1358 /* store psk in firmware */ 1359 err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_WSEC_PMK, 1360 &pmk, sizeof(pmk)); 1361 if (err < 0) 1362 bphy_err(drvr, "failed to change PSK in firmware (len=%u)\n", 1363 pmk_len); 1364 1365 return err; 1366 } 1367 1368 static int brcmf_set_sae_password(struct brcmf_if *ifp, const u8 *pwd_data, 1369 u16 pwd_len) 1370 { 1371 struct brcmf_pub *drvr = ifp->drvr; 1372 struct brcmf_wsec_sae_pwd_le sae_pwd; 1373 int err; 1374 1375 if (pwd_len > BRCMF_WSEC_MAX_SAE_PASSWORD_LEN) { 1376 bphy_err(drvr, "sae_password must be less than %d\n", 1377 BRCMF_WSEC_MAX_SAE_PASSWORD_LEN); 1378 return -EINVAL; 1379 } 1380 1381 sae_pwd.key_len = cpu_to_le16(pwd_len); 1382 memcpy(sae_pwd.key, pwd_data, pwd_len); 1383 1384 err = brcmf_fil_iovar_data_set(ifp, "sae_password", &sae_pwd, 1385 sizeof(sae_pwd)); 1386 if (err < 0) 1387 bphy_err(drvr, "failed to set SAE password in firmware (len=%u)\n", 1388 pwd_len); 1389 1390 return err; 1391 } 1392 1393 static void brcmf_link_down(struct brcmf_cfg80211_vif *vif, u16 reason, 1394 bool locally_generated) 1395 { 1396 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(vif->wdev.wiphy); 1397 struct brcmf_pub *drvr = cfg->pub; 1398 bool bus_up = drvr->bus_if->state == BRCMF_BUS_UP; 1399 s32 err = 0; 1400 1401 brcmf_dbg(TRACE, "Enter\n"); 1402 1403 if (test_and_clear_bit(BRCMF_VIF_STATUS_CONNECTED, &vif->sme_state)) { 1404 if (bus_up) { 1405 brcmf_dbg(INFO, "Call WLC_DISASSOC to stop excess roaming\n"); 1406 err = brcmf_fil_cmd_data_set(vif->ifp, 1407 BRCMF_C_DISASSOC, NULL, 0); 1408 if (err) 1409 bphy_err(drvr, "WLC_DISASSOC failed (%d)\n", 1410 err); 1411 } 1412 1413 if ((vif->wdev.iftype == NL80211_IFTYPE_STATION) || 1414 (vif->wdev.iftype == NL80211_IFTYPE_P2P_CLIENT)) 1415 cfg80211_disconnected(vif->wdev.netdev, reason, NULL, 0, 1416 locally_generated, GFP_KERNEL); 1417 } 1418 clear_bit(BRCMF_VIF_STATUS_CONNECTING, &vif->sme_state); 1419 clear_bit(BRCMF_SCAN_STATUS_SUPPRESS, &cfg->scan_status); 1420 brcmf_btcoex_set_mode(vif, BRCMF_BTCOEX_ENABLED, 0); 1421 if (vif->profile.use_fwsup != BRCMF_PROFILE_FWSUP_NONE) { 1422 if (bus_up) 1423 brcmf_set_pmk(vif->ifp, NULL, 0); 1424 vif->profile.use_fwsup = BRCMF_PROFILE_FWSUP_NONE; 1425 } 1426 brcmf_dbg(TRACE, "Exit\n"); 1427 } 1428 1429 static s32 1430 brcmf_cfg80211_join_ibss(struct wiphy *wiphy, struct net_device *ndev, 1431 struct cfg80211_ibss_params *params) 1432 { 1433 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 1434 struct brcmf_if *ifp = netdev_priv(ndev); 1435 struct brcmf_cfg80211_profile *profile = &ifp->vif->profile; 1436 struct brcmf_pub *drvr = cfg->pub; 1437 struct brcmf_join_params join_params; 1438 size_t join_params_size = 0; 1439 s32 err = 0; 1440 s32 wsec = 0; 1441 s32 bcnprd; 1442 u16 chanspec; 1443 u32 ssid_len; 1444 1445 brcmf_dbg(TRACE, "Enter\n"); 1446 if (!check_vif_up(ifp->vif)) 1447 return -EIO; 1448 1449 if (params->ssid) 1450 brcmf_dbg(CONN, "SSID: %s\n", params->ssid); 1451 else { 1452 brcmf_dbg(CONN, "SSID: NULL, Not supported\n"); 1453 return -EOPNOTSUPP; 1454 } 1455 1456 set_bit(BRCMF_VIF_STATUS_CONNECTING, &ifp->vif->sme_state); 1457 1458 if (params->bssid) 1459 brcmf_dbg(CONN, "BSSID: %pM\n", params->bssid); 1460 else 1461 brcmf_dbg(CONN, "No BSSID specified\n"); 1462 1463 if (params->chandef.chan) 1464 brcmf_dbg(CONN, "channel: %d\n", 1465 params->chandef.chan->center_freq); 1466 else 1467 brcmf_dbg(CONN, "no channel specified\n"); 1468 1469 if (params->channel_fixed) 1470 brcmf_dbg(CONN, "fixed channel required\n"); 1471 else 1472 brcmf_dbg(CONN, "no fixed channel required\n"); 1473 1474 if (params->ie && params->ie_len) 1475 brcmf_dbg(CONN, "ie len: %d\n", params->ie_len); 1476 else 1477 brcmf_dbg(CONN, "no ie specified\n"); 1478 1479 if (params->beacon_interval) 1480 brcmf_dbg(CONN, "beacon interval: %d\n", 1481 params->beacon_interval); 1482 else 1483 brcmf_dbg(CONN, "no beacon interval specified\n"); 1484 1485 if (params->basic_rates) 1486 brcmf_dbg(CONN, "basic rates: %08X\n", params->basic_rates); 1487 else 1488 brcmf_dbg(CONN, "no basic rates specified\n"); 1489 1490 if (params->privacy) 1491 brcmf_dbg(CONN, "privacy required\n"); 1492 else 1493 brcmf_dbg(CONN, "no privacy required\n"); 1494 1495 /* Configure Privacy for starter */ 1496 if (params->privacy) 1497 wsec |= WEP_ENABLED; 1498 1499 err = brcmf_fil_iovar_int_set(ifp, "wsec", wsec); 1500 if (err) { 1501 bphy_err(drvr, "wsec failed (%d)\n", err); 1502 goto done; 1503 } 1504 1505 /* Configure Beacon Interval for starter */ 1506 if (params->beacon_interval) 1507 bcnprd = params->beacon_interval; 1508 else 1509 bcnprd = 100; 1510 1511 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_BCNPRD, bcnprd); 1512 if (err) { 1513 bphy_err(drvr, "WLC_SET_BCNPRD failed (%d)\n", err); 1514 goto done; 1515 } 1516 1517 /* Configure required join parameter */ 1518 memset(&join_params, 0, sizeof(struct brcmf_join_params)); 1519 1520 /* SSID */ 1521 ssid_len = min_t(u32, params->ssid_len, IEEE80211_MAX_SSID_LEN); 1522 memcpy(join_params.ssid_le.SSID, params->ssid, ssid_len); 1523 join_params.ssid_le.SSID_len = cpu_to_le32(ssid_len); 1524 join_params_size = sizeof(join_params.ssid_le); 1525 1526 /* BSSID */ 1527 if (params->bssid) { 1528 memcpy(join_params.params_le.bssid, params->bssid, ETH_ALEN); 1529 join_params_size += BRCMF_ASSOC_PARAMS_FIXED_SIZE; 1530 memcpy(profile->bssid, params->bssid, ETH_ALEN); 1531 } else { 1532 eth_broadcast_addr(join_params.params_le.bssid); 1533 eth_zero_addr(profile->bssid); 1534 } 1535 1536 /* Channel */ 1537 if (params->chandef.chan) { 1538 u32 target_channel; 1539 1540 cfg->channel = 1541 ieee80211_frequency_to_channel( 1542 params->chandef.chan->center_freq); 1543 if (params->channel_fixed) { 1544 /* adding chanspec */ 1545 chanspec = chandef_to_chanspec(&cfg->d11inf, 1546 ¶ms->chandef); 1547 join_params.params_le.chanspec_list[0] = 1548 cpu_to_le16(chanspec); 1549 join_params.params_le.chanspec_num = cpu_to_le32(1); 1550 join_params_size += sizeof(join_params.params_le); 1551 } 1552 1553 /* set channel for starter */ 1554 target_channel = cfg->channel; 1555 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_CHANNEL, 1556 target_channel); 1557 if (err) { 1558 bphy_err(drvr, "WLC_SET_CHANNEL failed (%d)\n", err); 1559 goto done; 1560 } 1561 } else 1562 cfg->channel = 0; 1563 1564 cfg->ibss_starter = false; 1565 1566 1567 err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_SSID, 1568 &join_params, join_params_size); 1569 if (err) { 1570 bphy_err(drvr, "WLC_SET_SSID failed (%d)\n", err); 1571 goto done; 1572 } 1573 1574 done: 1575 if (err) 1576 clear_bit(BRCMF_VIF_STATUS_CONNECTING, &ifp->vif->sme_state); 1577 brcmf_dbg(TRACE, "Exit\n"); 1578 return err; 1579 } 1580 1581 static s32 1582 brcmf_cfg80211_leave_ibss(struct wiphy *wiphy, struct net_device *ndev) 1583 { 1584 struct brcmf_if *ifp = netdev_priv(ndev); 1585 1586 brcmf_dbg(TRACE, "Enter\n"); 1587 if (!check_vif_up(ifp->vif)) { 1588 /* When driver is being unloaded, it can end up here. If an 1589 * error is returned then later on a debug trace in the wireless 1590 * core module will be printed. To avoid this 0 is returned. 1591 */ 1592 return 0; 1593 } 1594 1595 brcmf_link_down(ifp->vif, WLAN_REASON_DEAUTH_LEAVING, true); 1596 brcmf_net_setcarrier(ifp, false); 1597 1598 brcmf_dbg(TRACE, "Exit\n"); 1599 1600 return 0; 1601 } 1602 1603 static s32 brcmf_set_wpa_version(struct net_device *ndev, 1604 struct cfg80211_connect_params *sme) 1605 { 1606 struct brcmf_if *ifp = netdev_priv(ndev); 1607 struct brcmf_cfg80211_profile *profile = ndev_to_prof(ndev); 1608 struct brcmf_pub *drvr = ifp->drvr; 1609 struct brcmf_cfg80211_security *sec; 1610 s32 val = 0; 1611 s32 err = 0; 1612 1613 if (sme->crypto.wpa_versions & NL80211_WPA_VERSION_1) 1614 val = WPA_AUTH_PSK | WPA_AUTH_UNSPECIFIED; 1615 else if (sme->crypto.wpa_versions & NL80211_WPA_VERSION_2) 1616 val = WPA2_AUTH_PSK | WPA2_AUTH_UNSPECIFIED; 1617 else if (sme->crypto.wpa_versions & NL80211_WPA_VERSION_3) 1618 val = WPA3_AUTH_SAE_PSK; 1619 else 1620 val = WPA_AUTH_DISABLED; 1621 brcmf_dbg(CONN, "setting wpa_auth to 0x%0x\n", val); 1622 err = brcmf_fil_bsscfg_int_set(ifp, "wpa_auth", val); 1623 if (err) { 1624 bphy_err(drvr, "set wpa_auth failed (%d)\n", err); 1625 return err; 1626 } 1627 sec = &profile->sec; 1628 sec->wpa_versions = sme->crypto.wpa_versions; 1629 return err; 1630 } 1631 1632 static s32 brcmf_set_auth_type(struct net_device *ndev, 1633 struct cfg80211_connect_params *sme) 1634 { 1635 struct brcmf_if *ifp = netdev_priv(ndev); 1636 struct brcmf_cfg80211_profile *profile = ndev_to_prof(ndev); 1637 struct brcmf_pub *drvr = ifp->drvr; 1638 struct brcmf_cfg80211_security *sec; 1639 s32 val = 0; 1640 s32 err = 0; 1641 1642 switch (sme->auth_type) { 1643 case NL80211_AUTHTYPE_OPEN_SYSTEM: 1644 val = 0; 1645 brcmf_dbg(CONN, "open system\n"); 1646 break; 1647 case NL80211_AUTHTYPE_SHARED_KEY: 1648 val = 1; 1649 brcmf_dbg(CONN, "shared key\n"); 1650 break; 1651 case NL80211_AUTHTYPE_SAE: 1652 val = 3; 1653 brcmf_dbg(CONN, "SAE authentication\n"); 1654 break; 1655 default: 1656 val = 2; 1657 brcmf_dbg(CONN, "automatic, auth type (%d)\n", sme->auth_type); 1658 break; 1659 } 1660 1661 err = brcmf_fil_bsscfg_int_set(ifp, "auth", val); 1662 if (err) { 1663 bphy_err(drvr, "set auth failed (%d)\n", err); 1664 return err; 1665 } 1666 sec = &profile->sec; 1667 sec->auth_type = sme->auth_type; 1668 return err; 1669 } 1670 1671 static s32 1672 brcmf_set_wsec_mode(struct net_device *ndev, 1673 struct cfg80211_connect_params *sme) 1674 { 1675 struct brcmf_if *ifp = netdev_priv(ndev); 1676 struct brcmf_cfg80211_profile *profile = ndev_to_prof(ndev); 1677 struct brcmf_pub *drvr = ifp->drvr; 1678 struct brcmf_cfg80211_security *sec; 1679 s32 pval = 0; 1680 s32 gval = 0; 1681 s32 wsec; 1682 s32 err = 0; 1683 1684 if (sme->crypto.n_ciphers_pairwise) { 1685 switch (sme->crypto.ciphers_pairwise[0]) { 1686 case WLAN_CIPHER_SUITE_WEP40: 1687 case WLAN_CIPHER_SUITE_WEP104: 1688 pval = WEP_ENABLED; 1689 break; 1690 case WLAN_CIPHER_SUITE_TKIP: 1691 pval = TKIP_ENABLED; 1692 break; 1693 case WLAN_CIPHER_SUITE_CCMP: 1694 pval = AES_ENABLED; 1695 break; 1696 case WLAN_CIPHER_SUITE_AES_CMAC: 1697 pval = AES_ENABLED; 1698 break; 1699 default: 1700 bphy_err(drvr, "invalid cipher pairwise (%d)\n", 1701 sme->crypto.ciphers_pairwise[0]); 1702 return -EINVAL; 1703 } 1704 } 1705 if (sme->crypto.cipher_group) { 1706 switch (sme->crypto.cipher_group) { 1707 case WLAN_CIPHER_SUITE_WEP40: 1708 case WLAN_CIPHER_SUITE_WEP104: 1709 gval = WEP_ENABLED; 1710 break; 1711 case WLAN_CIPHER_SUITE_TKIP: 1712 gval = TKIP_ENABLED; 1713 break; 1714 case WLAN_CIPHER_SUITE_CCMP: 1715 gval = AES_ENABLED; 1716 break; 1717 case WLAN_CIPHER_SUITE_AES_CMAC: 1718 gval = AES_ENABLED; 1719 break; 1720 default: 1721 bphy_err(drvr, "invalid cipher group (%d)\n", 1722 sme->crypto.cipher_group); 1723 return -EINVAL; 1724 } 1725 } 1726 1727 brcmf_dbg(CONN, "pval (%d) gval (%d)\n", pval, gval); 1728 /* In case of privacy, but no security and WPS then simulate */ 1729 /* setting AES. WPS-2.0 allows no security */ 1730 if (brcmf_find_wpsie(sme->ie, sme->ie_len) && !pval && !gval && 1731 sme->privacy) 1732 pval = AES_ENABLED; 1733 1734 wsec = pval | gval; 1735 err = brcmf_fil_bsscfg_int_set(ifp, "wsec", wsec); 1736 if (err) { 1737 bphy_err(drvr, "error (%d)\n", err); 1738 return err; 1739 } 1740 1741 sec = &profile->sec; 1742 sec->cipher_pairwise = sme->crypto.ciphers_pairwise[0]; 1743 sec->cipher_group = sme->crypto.cipher_group; 1744 1745 return err; 1746 } 1747 1748 static s32 1749 brcmf_set_key_mgmt(struct net_device *ndev, struct cfg80211_connect_params *sme) 1750 { 1751 struct brcmf_if *ifp = netdev_priv(ndev); 1752 struct brcmf_cfg80211_profile *profile = &ifp->vif->profile; 1753 struct brcmf_pub *drvr = ifp->drvr; 1754 s32 val; 1755 s32 err; 1756 const struct brcmf_tlv *rsn_ie; 1757 const u8 *ie; 1758 u32 ie_len; 1759 u32 offset; 1760 u16 rsn_cap; 1761 u32 mfp; 1762 u16 count; 1763 1764 profile->use_fwsup = BRCMF_PROFILE_FWSUP_NONE; 1765 profile->is_ft = false; 1766 1767 if (!sme->crypto.n_akm_suites) 1768 return 0; 1769 1770 err = brcmf_fil_bsscfg_int_get(netdev_priv(ndev), "wpa_auth", &val); 1771 if (err) { 1772 bphy_err(drvr, "could not get wpa_auth (%d)\n", err); 1773 return err; 1774 } 1775 if (val & (WPA_AUTH_PSK | WPA_AUTH_UNSPECIFIED)) { 1776 switch (sme->crypto.akm_suites[0]) { 1777 case WLAN_AKM_SUITE_8021X: 1778 val = WPA_AUTH_UNSPECIFIED; 1779 if (sme->want_1x) 1780 profile->use_fwsup = BRCMF_PROFILE_FWSUP_1X; 1781 break; 1782 case WLAN_AKM_SUITE_PSK: 1783 val = WPA_AUTH_PSK; 1784 break; 1785 default: 1786 bphy_err(drvr, "invalid cipher group (%d)\n", 1787 sme->crypto.cipher_group); 1788 return -EINVAL; 1789 } 1790 } else if (val & (WPA2_AUTH_PSK | WPA2_AUTH_UNSPECIFIED)) { 1791 switch (sme->crypto.akm_suites[0]) { 1792 case WLAN_AKM_SUITE_8021X: 1793 val = WPA2_AUTH_UNSPECIFIED; 1794 if (sme->want_1x) 1795 profile->use_fwsup = BRCMF_PROFILE_FWSUP_1X; 1796 break; 1797 case WLAN_AKM_SUITE_8021X_SHA256: 1798 val = WPA2_AUTH_1X_SHA256; 1799 if (sme->want_1x) 1800 profile->use_fwsup = BRCMF_PROFILE_FWSUP_1X; 1801 break; 1802 case WLAN_AKM_SUITE_PSK_SHA256: 1803 val = WPA2_AUTH_PSK_SHA256; 1804 break; 1805 case WLAN_AKM_SUITE_PSK: 1806 val = WPA2_AUTH_PSK; 1807 break; 1808 case WLAN_AKM_SUITE_FT_8021X: 1809 val = WPA2_AUTH_UNSPECIFIED | WPA2_AUTH_FT; 1810 profile->is_ft = true; 1811 if (sme->want_1x) 1812 profile->use_fwsup = BRCMF_PROFILE_FWSUP_1X; 1813 break; 1814 case WLAN_AKM_SUITE_FT_PSK: 1815 val = WPA2_AUTH_PSK | WPA2_AUTH_FT; 1816 profile->is_ft = true; 1817 break; 1818 default: 1819 bphy_err(drvr, "invalid cipher group (%d)\n", 1820 sme->crypto.cipher_group); 1821 return -EINVAL; 1822 } 1823 } else if (val & WPA3_AUTH_SAE_PSK) { 1824 switch (sme->crypto.akm_suites[0]) { 1825 case WLAN_AKM_SUITE_SAE: 1826 val = WPA3_AUTH_SAE_PSK; 1827 if (sme->crypto.sae_pwd) { 1828 brcmf_dbg(INFO, "using SAE offload\n"); 1829 profile->use_fwsup = BRCMF_PROFILE_FWSUP_SAE; 1830 } 1831 break; 1832 default: 1833 bphy_err(drvr, "invalid cipher group (%d)\n", 1834 sme->crypto.cipher_group); 1835 return -EINVAL; 1836 } 1837 } 1838 1839 if (profile->use_fwsup == BRCMF_PROFILE_FWSUP_1X) 1840 brcmf_dbg(INFO, "using 1X offload\n"); 1841 1842 if (!brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MFP)) 1843 goto skip_mfp_config; 1844 /* The MFP mode (1 or 2) needs to be determined, parse IEs. The 1845 * IE will not be verified, just a quick search for MFP config 1846 */ 1847 rsn_ie = brcmf_parse_tlvs((const u8 *)sme->ie, sme->ie_len, 1848 WLAN_EID_RSN); 1849 if (!rsn_ie) 1850 goto skip_mfp_config; 1851 ie = (const u8 *)rsn_ie; 1852 ie_len = rsn_ie->len + TLV_HDR_LEN; 1853 /* Skip unicast suite */ 1854 offset = TLV_HDR_LEN + WPA_IE_VERSION_LEN + WPA_IE_MIN_OUI_LEN; 1855 if (offset + WPA_IE_SUITE_COUNT_LEN >= ie_len) 1856 goto skip_mfp_config; 1857 /* Skip multicast suite */ 1858 count = ie[offset] + (ie[offset + 1] << 8); 1859 offset += WPA_IE_SUITE_COUNT_LEN + (count * WPA_IE_MIN_OUI_LEN); 1860 if (offset + WPA_IE_SUITE_COUNT_LEN >= ie_len) 1861 goto skip_mfp_config; 1862 /* Skip auth key management suite(s) */ 1863 count = ie[offset] + (ie[offset + 1] << 8); 1864 offset += WPA_IE_SUITE_COUNT_LEN + (count * WPA_IE_MIN_OUI_LEN); 1865 if (offset + WPA_IE_SUITE_COUNT_LEN > ie_len) 1866 goto skip_mfp_config; 1867 /* Ready to read capabilities */ 1868 mfp = BRCMF_MFP_NONE; 1869 rsn_cap = ie[offset] + (ie[offset + 1] << 8); 1870 if (rsn_cap & RSN_CAP_MFPR_MASK) 1871 mfp = BRCMF_MFP_REQUIRED; 1872 else if (rsn_cap & RSN_CAP_MFPC_MASK) 1873 mfp = BRCMF_MFP_CAPABLE; 1874 brcmf_fil_bsscfg_int_set(netdev_priv(ndev), "mfp", mfp); 1875 1876 skip_mfp_config: 1877 brcmf_dbg(CONN, "setting wpa_auth to %d\n", val); 1878 err = brcmf_fil_bsscfg_int_set(netdev_priv(ndev), "wpa_auth", val); 1879 if (err) { 1880 bphy_err(drvr, "could not set wpa_auth (%d)\n", err); 1881 return err; 1882 } 1883 1884 return err; 1885 } 1886 1887 static s32 1888 brcmf_set_sharedkey(struct net_device *ndev, 1889 struct cfg80211_connect_params *sme) 1890 { 1891 struct brcmf_if *ifp = netdev_priv(ndev); 1892 struct brcmf_pub *drvr = ifp->drvr; 1893 struct brcmf_cfg80211_profile *profile = ndev_to_prof(ndev); 1894 struct brcmf_cfg80211_security *sec; 1895 struct brcmf_wsec_key key; 1896 s32 val; 1897 s32 err = 0; 1898 1899 brcmf_dbg(CONN, "key len (%d)\n", sme->key_len); 1900 1901 if (sme->key_len == 0) 1902 return 0; 1903 1904 sec = &profile->sec; 1905 brcmf_dbg(CONN, "wpa_versions 0x%x cipher_pairwise 0x%x\n", 1906 sec->wpa_versions, sec->cipher_pairwise); 1907 1908 if (sec->wpa_versions & (NL80211_WPA_VERSION_1 | NL80211_WPA_VERSION_2 | 1909 NL80211_WPA_VERSION_3)) 1910 return 0; 1911 1912 if (!(sec->cipher_pairwise & 1913 (WLAN_CIPHER_SUITE_WEP40 | WLAN_CIPHER_SUITE_WEP104))) 1914 return 0; 1915 1916 memset(&key, 0, sizeof(key)); 1917 key.len = (u32) sme->key_len; 1918 key.index = (u32) sme->key_idx; 1919 if (key.len > sizeof(key.data)) { 1920 bphy_err(drvr, "Too long key length (%u)\n", key.len); 1921 return -EINVAL; 1922 } 1923 memcpy(key.data, sme->key, key.len); 1924 key.flags = BRCMF_PRIMARY_KEY; 1925 switch (sec->cipher_pairwise) { 1926 case WLAN_CIPHER_SUITE_WEP40: 1927 key.algo = CRYPTO_ALGO_WEP1; 1928 break; 1929 case WLAN_CIPHER_SUITE_WEP104: 1930 key.algo = CRYPTO_ALGO_WEP128; 1931 break; 1932 default: 1933 bphy_err(drvr, "Invalid algorithm (%d)\n", 1934 sme->crypto.ciphers_pairwise[0]); 1935 return -EINVAL; 1936 } 1937 /* Set the new key/index */ 1938 brcmf_dbg(CONN, "key length (%d) key index (%d) algo (%d)\n", 1939 key.len, key.index, key.algo); 1940 brcmf_dbg(CONN, "key \"%s\"\n", key.data); 1941 err = send_key_to_dongle(ifp, &key); 1942 if (err) 1943 return err; 1944 1945 if (sec->auth_type == NL80211_AUTHTYPE_SHARED_KEY) { 1946 brcmf_dbg(CONN, "set auth_type to shared key\n"); 1947 val = WL_AUTH_SHARED_KEY; /* shared key */ 1948 err = brcmf_fil_bsscfg_int_set(ifp, "auth", val); 1949 if (err) 1950 bphy_err(drvr, "set auth failed (%d)\n", err); 1951 } 1952 return err; 1953 } 1954 1955 static 1956 enum nl80211_auth_type brcmf_war_auth_type(struct brcmf_if *ifp, 1957 enum nl80211_auth_type type) 1958 { 1959 if (type == NL80211_AUTHTYPE_AUTOMATIC && 1960 brcmf_feat_is_quirk_enabled(ifp, BRCMF_FEAT_QUIRK_AUTO_AUTH)) { 1961 brcmf_dbg(CONN, "WAR: use OPEN instead of AUTO\n"); 1962 type = NL80211_AUTHTYPE_OPEN_SYSTEM; 1963 } 1964 return type; 1965 } 1966 1967 static void brcmf_set_join_pref(struct brcmf_if *ifp, 1968 struct cfg80211_bss_selection *bss_select) 1969 { 1970 struct brcmf_pub *drvr = ifp->drvr; 1971 struct brcmf_join_pref_params join_pref_params[2]; 1972 enum nl80211_band band; 1973 int err, i = 0; 1974 1975 join_pref_params[i].len = 2; 1976 join_pref_params[i].rssi_gain = 0; 1977 1978 if (bss_select->behaviour != NL80211_BSS_SELECT_ATTR_BAND_PREF) 1979 brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_ASSOC_PREFER, WLC_BAND_AUTO); 1980 1981 switch (bss_select->behaviour) { 1982 case __NL80211_BSS_SELECT_ATTR_INVALID: 1983 brcmf_c_set_joinpref_default(ifp); 1984 return; 1985 case NL80211_BSS_SELECT_ATTR_BAND_PREF: 1986 join_pref_params[i].type = BRCMF_JOIN_PREF_BAND; 1987 band = bss_select->param.band_pref; 1988 join_pref_params[i].band = nl80211_band_to_fwil(band); 1989 i++; 1990 break; 1991 case NL80211_BSS_SELECT_ATTR_RSSI_ADJUST: 1992 join_pref_params[i].type = BRCMF_JOIN_PREF_RSSI_DELTA; 1993 band = bss_select->param.adjust.band; 1994 join_pref_params[i].band = nl80211_band_to_fwil(band); 1995 join_pref_params[i].rssi_gain = bss_select->param.adjust.delta; 1996 i++; 1997 break; 1998 case NL80211_BSS_SELECT_ATTR_RSSI: 1999 default: 2000 break; 2001 } 2002 join_pref_params[i].type = BRCMF_JOIN_PREF_RSSI; 2003 join_pref_params[i].len = 2; 2004 join_pref_params[i].rssi_gain = 0; 2005 join_pref_params[i].band = 0; 2006 err = brcmf_fil_iovar_data_set(ifp, "join_pref", join_pref_params, 2007 sizeof(join_pref_params)); 2008 if (err) 2009 bphy_err(drvr, "Set join_pref error (%d)\n", err); 2010 } 2011 2012 static s32 2013 brcmf_cfg80211_connect(struct wiphy *wiphy, struct net_device *ndev, 2014 struct cfg80211_connect_params *sme) 2015 { 2016 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 2017 struct brcmf_if *ifp = netdev_priv(ndev); 2018 struct brcmf_cfg80211_profile *profile = &ifp->vif->profile; 2019 struct ieee80211_channel *chan = sme->channel; 2020 struct brcmf_pub *drvr = ifp->drvr; 2021 struct brcmf_join_params join_params; 2022 size_t join_params_size; 2023 const struct brcmf_tlv *rsn_ie; 2024 const struct brcmf_vs_tlv *wpa_ie; 2025 const void *ie; 2026 u32 ie_len; 2027 struct brcmf_ext_join_params_le *ext_join_params; 2028 u16 chanspec; 2029 s32 err = 0; 2030 u32 ssid_len; 2031 2032 brcmf_dbg(TRACE, "Enter\n"); 2033 if (!check_vif_up(ifp->vif)) 2034 return -EIO; 2035 2036 if (!sme->ssid) { 2037 bphy_err(drvr, "Invalid ssid\n"); 2038 return -EOPNOTSUPP; 2039 } 2040 2041 if (ifp->vif == cfg->p2p.bss_idx[P2PAPI_BSSCFG_PRIMARY].vif) { 2042 /* A normal (non P2P) connection request setup. */ 2043 ie = NULL; 2044 ie_len = 0; 2045 /* find the WPA_IE */ 2046 wpa_ie = brcmf_find_wpaie((u8 *)sme->ie, sme->ie_len); 2047 if (wpa_ie) { 2048 ie = wpa_ie; 2049 ie_len = wpa_ie->len + TLV_HDR_LEN; 2050 } else { 2051 /* find the RSN_IE */ 2052 rsn_ie = brcmf_parse_tlvs((const u8 *)sme->ie, 2053 sme->ie_len, 2054 WLAN_EID_RSN); 2055 if (rsn_ie) { 2056 ie = rsn_ie; 2057 ie_len = rsn_ie->len + TLV_HDR_LEN; 2058 } 2059 } 2060 brcmf_fil_iovar_data_set(ifp, "wpaie", ie, ie_len); 2061 } 2062 2063 err = brcmf_vif_set_mgmt_ie(ifp->vif, BRCMF_VNDR_IE_ASSOCREQ_FLAG, 2064 sme->ie, sme->ie_len); 2065 if (err) 2066 bphy_err(drvr, "Set Assoc REQ IE Failed\n"); 2067 else 2068 brcmf_dbg(TRACE, "Applied Vndr IEs for Assoc request\n"); 2069 2070 set_bit(BRCMF_VIF_STATUS_CONNECTING, &ifp->vif->sme_state); 2071 2072 if (chan) { 2073 cfg->channel = 2074 ieee80211_frequency_to_channel(chan->center_freq); 2075 chanspec = channel_to_chanspec(&cfg->d11inf, chan); 2076 brcmf_dbg(CONN, "channel=%d, center_req=%d, chanspec=0x%04x\n", 2077 cfg->channel, chan->center_freq, chanspec); 2078 } else { 2079 cfg->channel = 0; 2080 chanspec = 0; 2081 } 2082 2083 brcmf_dbg(INFO, "ie (%p), ie_len (%zd)\n", sme->ie, sme->ie_len); 2084 2085 err = brcmf_set_wpa_version(ndev, sme); 2086 if (err) { 2087 bphy_err(drvr, "wl_set_wpa_version failed (%d)\n", err); 2088 goto done; 2089 } 2090 2091 sme->auth_type = brcmf_war_auth_type(ifp, sme->auth_type); 2092 err = brcmf_set_auth_type(ndev, sme); 2093 if (err) { 2094 bphy_err(drvr, "wl_set_auth_type failed (%d)\n", err); 2095 goto done; 2096 } 2097 2098 err = brcmf_set_wsec_mode(ndev, sme); 2099 if (err) { 2100 bphy_err(drvr, "wl_set_set_cipher failed (%d)\n", err); 2101 goto done; 2102 } 2103 2104 err = brcmf_set_key_mgmt(ndev, sme); 2105 if (err) { 2106 bphy_err(drvr, "wl_set_key_mgmt failed (%d)\n", err); 2107 goto done; 2108 } 2109 2110 err = brcmf_set_sharedkey(ndev, sme); 2111 if (err) { 2112 bphy_err(drvr, "brcmf_set_sharedkey failed (%d)\n", err); 2113 goto done; 2114 } 2115 2116 if (sme->crypto.psk && 2117 profile->use_fwsup != BRCMF_PROFILE_FWSUP_SAE) { 2118 if (WARN_ON(profile->use_fwsup != BRCMF_PROFILE_FWSUP_NONE)) { 2119 err = -EINVAL; 2120 goto done; 2121 } 2122 brcmf_dbg(INFO, "using PSK offload\n"); 2123 profile->use_fwsup = BRCMF_PROFILE_FWSUP_PSK; 2124 } 2125 2126 if (profile->use_fwsup != BRCMF_PROFILE_FWSUP_NONE) { 2127 /* enable firmware supplicant for this interface */ 2128 err = brcmf_fil_iovar_int_set(ifp, "sup_wpa", 1); 2129 if (err < 0) { 2130 bphy_err(drvr, "failed to enable fw supplicant\n"); 2131 goto done; 2132 } 2133 } 2134 2135 if (profile->use_fwsup == BRCMF_PROFILE_FWSUP_PSK) 2136 err = brcmf_set_pmk(ifp, sme->crypto.psk, 2137 BRCMF_WSEC_MAX_PSK_LEN); 2138 else if (profile->use_fwsup == BRCMF_PROFILE_FWSUP_SAE) { 2139 /* clean up user-space RSNE */ 2140 err = brcmf_fil_iovar_data_set(ifp, "wpaie", NULL, 0); 2141 if (err) { 2142 bphy_err(drvr, "failed to clean up user-space RSNE\n"); 2143 goto done; 2144 } 2145 err = brcmf_set_sae_password(ifp, sme->crypto.sae_pwd, 2146 sme->crypto.sae_pwd_len); 2147 if (!err && sme->crypto.psk) 2148 err = brcmf_set_pmk(ifp, sme->crypto.psk, 2149 BRCMF_WSEC_MAX_PSK_LEN); 2150 } 2151 if (err) 2152 goto done; 2153 2154 /* Join with specific BSSID and cached SSID 2155 * If SSID is zero join based on BSSID only 2156 */ 2157 join_params_size = offsetof(struct brcmf_ext_join_params_le, assoc_le) + 2158 offsetof(struct brcmf_assoc_params_le, chanspec_list); 2159 if (cfg->channel) 2160 join_params_size += sizeof(u16); 2161 ext_join_params = kzalloc(join_params_size, GFP_KERNEL); 2162 if (ext_join_params == NULL) { 2163 err = -ENOMEM; 2164 goto done; 2165 } 2166 ssid_len = min_t(u32, sme->ssid_len, IEEE80211_MAX_SSID_LEN); 2167 ext_join_params->ssid_le.SSID_len = cpu_to_le32(ssid_len); 2168 memcpy(&ext_join_params->ssid_le.SSID, sme->ssid, ssid_len); 2169 if (ssid_len < IEEE80211_MAX_SSID_LEN) 2170 brcmf_dbg(CONN, "SSID \"%s\", len (%d)\n", 2171 ext_join_params->ssid_le.SSID, ssid_len); 2172 2173 /* Set up join scan parameters */ 2174 ext_join_params->scan_le.scan_type = -1; 2175 ext_join_params->scan_le.home_time = cpu_to_le32(-1); 2176 2177 if (sme->bssid) 2178 memcpy(&ext_join_params->assoc_le.bssid, sme->bssid, ETH_ALEN); 2179 else 2180 eth_broadcast_addr(ext_join_params->assoc_le.bssid); 2181 2182 if (cfg->channel) { 2183 ext_join_params->assoc_le.chanspec_num = cpu_to_le32(1); 2184 2185 ext_join_params->assoc_le.chanspec_list[0] = 2186 cpu_to_le16(chanspec); 2187 /* Increase dwell time to receive probe response or detect 2188 * beacon from target AP at a noisy air only during connect 2189 * command. 2190 */ 2191 ext_join_params->scan_le.active_time = 2192 cpu_to_le32(BRCMF_SCAN_JOIN_ACTIVE_DWELL_TIME_MS); 2193 ext_join_params->scan_le.passive_time = 2194 cpu_to_le32(BRCMF_SCAN_JOIN_PASSIVE_DWELL_TIME_MS); 2195 /* To sync with presence period of VSDB GO send probe request 2196 * more frequently. Probe request will be stopped when it gets 2197 * probe response from target AP/GO. 2198 */ 2199 ext_join_params->scan_le.nprobes = 2200 cpu_to_le32(BRCMF_SCAN_JOIN_ACTIVE_DWELL_TIME_MS / 2201 BRCMF_SCAN_JOIN_PROBE_INTERVAL_MS); 2202 } else { 2203 ext_join_params->scan_le.active_time = cpu_to_le32(-1); 2204 ext_join_params->scan_le.passive_time = cpu_to_le32(-1); 2205 ext_join_params->scan_le.nprobes = cpu_to_le32(-1); 2206 } 2207 2208 brcmf_set_join_pref(ifp, &sme->bss_select); 2209 2210 err = brcmf_fil_bsscfg_data_set(ifp, "join", ext_join_params, 2211 join_params_size); 2212 kfree(ext_join_params); 2213 if (!err) 2214 /* This is it. join command worked, we are done */ 2215 goto done; 2216 2217 /* join command failed, fallback to set ssid */ 2218 memset(&join_params, 0, sizeof(join_params)); 2219 join_params_size = sizeof(join_params.ssid_le); 2220 2221 memcpy(&join_params.ssid_le.SSID, sme->ssid, ssid_len); 2222 join_params.ssid_le.SSID_len = cpu_to_le32(ssid_len); 2223 2224 if (sme->bssid) 2225 memcpy(join_params.params_le.bssid, sme->bssid, ETH_ALEN); 2226 else 2227 eth_broadcast_addr(join_params.params_le.bssid); 2228 2229 if (cfg->channel) { 2230 join_params.params_le.chanspec_list[0] = cpu_to_le16(chanspec); 2231 join_params.params_le.chanspec_num = cpu_to_le32(1); 2232 join_params_size += sizeof(join_params.params_le); 2233 } 2234 err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_SSID, 2235 &join_params, join_params_size); 2236 if (err) 2237 bphy_err(drvr, "BRCMF_C_SET_SSID failed (%d)\n", err); 2238 2239 done: 2240 if (err) 2241 clear_bit(BRCMF_VIF_STATUS_CONNECTING, &ifp->vif->sme_state); 2242 brcmf_dbg(TRACE, "Exit\n"); 2243 return err; 2244 } 2245 2246 static s32 2247 brcmf_cfg80211_disconnect(struct wiphy *wiphy, struct net_device *ndev, 2248 u16 reason_code) 2249 { 2250 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 2251 struct brcmf_if *ifp = netdev_priv(ndev); 2252 struct brcmf_cfg80211_profile *profile = &ifp->vif->profile; 2253 struct brcmf_pub *drvr = cfg->pub; 2254 struct brcmf_scb_val_le scbval; 2255 s32 err = 0; 2256 2257 brcmf_dbg(TRACE, "Enter. Reason code = %d\n", reason_code); 2258 if (!check_vif_up(ifp->vif)) 2259 return -EIO; 2260 2261 clear_bit(BRCMF_VIF_STATUS_CONNECTED, &ifp->vif->sme_state); 2262 clear_bit(BRCMF_VIF_STATUS_CONNECTING, &ifp->vif->sme_state); 2263 cfg80211_disconnected(ndev, reason_code, NULL, 0, true, GFP_KERNEL); 2264 2265 memcpy(&scbval.ea, &profile->bssid, ETH_ALEN); 2266 scbval.val = cpu_to_le32(reason_code); 2267 err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_DISASSOC, 2268 &scbval, sizeof(scbval)); 2269 if (err) 2270 bphy_err(drvr, "error (%d)\n", err); 2271 2272 brcmf_dbg(TRACE, "Exit\n"); 2273 return err; 2274 } 2275 2276 static s32 2277 brcmf_cfg80211_set_tx_power(struct wiphy *wiphy, struct wireless_dev *wdev, 2278 enum nl80211_tx_power_setting type, s32 mbm) 2279 { 2280 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 2281 struct net_device *ndev = cfg_to_ndev(cfg); 2282 struct brcmf_if *ifp = netdev_priv(ndev); 2283 struct brcmf_pub *drvr = cfg->pub; 2284 s32 err; 2285 s32 disable; 2286 u32 qdbm = 127; 2287 2288 brcmf_dbg(TRACE, "Enter %d %d\n", type, mbm); 2289 if (!check_vif_up(ifp->vif)) 2290 return -EIO; 2291 2292 switch (type) { 2293 case NL80211_TX_POWER_AUTOMATIC: 2294 break; 2295 case NL80211_TX_POWER_LIMITED: 2296 case NL80211_TX_POWER_FIXED: 2297 if (mbm < 0) { 2298 bphy_err(drvr, "TX_POWER_FIXED - dbm is negative\n"); 2299 err = -EINVAL; 2300 goto done; 2301 } 2302 qdbm = MBM_TO_DBM(4 * mbm); 2303 if (qdbm > 127) 2304 qdbm = 127; 2305 qdbm |= WL_TXPWR_OVERRIDE; 2306 break; 2307 default: 2308 bphy_err(drvr, "Unsupported type %d\n", type); 2309 err = -EINVAL; 2310 goto done; 2311 } 2312 /* Make sure radio is off or on as far as software is concerned */ 2313 disable = WL_RADIO_SW_DISABLE << 16; 2314 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_RADIO, disable); 2315 if (err) 2316 bphy_err(drvr, "WLC_SET_RADIO error (%d)\n", err); 2317 2318 err = brcmf_fil_iovar_int_set(ifp, "qtxpower", qdbm); 2319 if (err) 2320 bphy_err(drvr, "qtxpower error (%d)\n", err); 2321 2322 done: 2323 brcmf_dbg(TRACE, "Exit %d (qdbm)\n", qdbm & ~WL_TXPWR_OVERRIDE); 2324 return err; 2325 } 2326 2327 static s32 2328 brcmf_cfg80211_get_tx_power(struct wiphy *wiphy, struct wireless_dev *wdev, 2329 s32 *dbm) 2330 { 2331 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 2332 struct brcmf_cfg80211_vif *vif = wdev_to_vif(wdev); 2333 struct brcmf_pub *drvr = cfg->pub; 2334 s32 qdbm = 0; 2335 s32 err; 2336 2337 brcmf_dbg(TRACE, "Enter\n"); 2338 if (!check_vif_up(vif)) 2339 return -EIO; 2340 2341 err = brcmf_fil_iovar_int_get(vif->ifp, "qtxpower", &qdbm); 2342 if (err) { 2343 bphy_err(drvr, "error (%d)\n", err); 2344 goto done; 2345 } 2346 *dbm = (qdbm & ~WL_TXPWR_OVERRIDE) / 4; 2347 2348 done: 2349 brcmf_dbg(TRACE, "Exit (0x%x %d)\n", qdbm, *dbm); 2350 return err; 2351 } 2352 2353 static s32 2354 brcmf_cfg80211_config_default_key(struct wiphy *wiphy, struct net_device *ndev, 2355 u8 key_idx, bool unicast, bool multicast) 2356 { 2357 struct brcmf_if *ifp = netdev_priv(ndev); 2358 struct brcmf_pub *drvr = ifp->drvr; 2359 u32 index; 2360 u32 wsec; 2361 s32 err = 0; 2362 2363 brcmf_dbg(TRACE, "Enter\n"); 2364 brcmf_dbg(CONN, "key index (%d)\n", key_idx); 2365 if (!check_vif_up(ifp->vif)) 2366 return -EIO; 2367 2368 err = brcmf_fil_bsscfg_int_get(ifp, "wsec", &wsec); 2369 if (err) { 2370 bphy_err(drvr, "WLC_GET_WSEC error (%d)\n", err); 2371 goto done; 2372 } 2373 2374 if (wsec & WEP_ENABLED) { 2375 /* Just select a new current key */ 2376 index = key_idx; 2377 err = brcmf_fil_cmd_int_set(ifp, 2378 BRCMF_C_SET_KEY_PRIMARY, index); 2379 if (err) 2380 bphy_err(drvr, "error (%d)\n", err); 2381 } 2382 done: 2383 brcmf_dbg(TRACE, "Exit\n"); 2384 return err; 2385 } 2386 2387 static s32 2388 brcmf_cfg80211_del_key(struct wiphy *wiphy, struct net_device *ndev, 2389 u8 key_idx, bool pairwise, const u8 *mac_addr) 2390 { 2391 struct brcmf_if *ifp = netdev_priv(ndev); 2392 struct brcmf_wsec_key *key; 2393 s32 err; 2394 2395 brcmf_dbg(TRACE, "Enter\n"); 2396 brcmf_dbg(CONN, "key index (%d)\n", key_idx); 2397 2398 if (!check_vif_up(ifp->vif)) 2399 return -EIO; 2400 2401 if (key_idx >= BRCMF_MAX_DEFAULT_KEYS) { 2402 /* we ignore this key index in this case */ 2403 return -EINVAL; 2404 } 2405 2406 key = &ifp->vif->profile.key[key_idx]; 2407 2408 if (key->algo == CRYPTO_ALGO_OFF) { 2409 brcmf_dbg(CONN, "Ignore clearing of (never configured) key\n"); 2410 return -EINVAL; 2411 } 2412 2413 memset(key, 0, sizeof(*key)); 2414 key->index = (u32)key_idx; 2415 key->flags = BRCMF_PRIMARY_KEY; 2416 2417 /* Clear the key/index */ 2418 err = send_key_to_dongle(ifp, key); 2419 2420 brcmf_dbg(TRACE, "Exit\n"); 2421 return err; 2422 } 2423 2424 static s32 2425 brcmf_cfg80211_add_key(struct wiphy *wiphy, struct net_device *ndev, 2426 u8 key_idx, bool pairwise, const u8 *mac_addr, 2427 struct key_params *params) 2428 { 2429 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 2430 struct brcmf_if *ifp = netdev_priv(ndev); 2431 struct brcmf_pub *drvr = cfg->pub; 2432 struct brcmf_wsec_key *key; 2433 s32 val; 2434 s32 wsec; 2435 s32 err; 2436 u8 keybuf[8]; 2437 bool ext_key; 2438 2439 brcmf_dbg(TRACE, "Enter\n"); 2440 brcmf_dbg(CONN, "key index (%d)\n", key_idx); 2441 if (!check_vif_up(ifp->vif)) 2442 return -EIO; 2443 2444 if (key_idx >= BRCMF_MAX_DEFAULT_KEYS) { 2445 /* we ignore this key index in this case */ 2446 bphy_err(drvr, "invalid key index (%d)\n", key_idx); 2447 return -EINVAL; 2448 } 2449 2450 if (params->key_len == 0) 2451 return brcmf_cfg80211_del_key(wiphy, ndev, key_idx, pairwise, 2452 mac_addr); 2453 2454 if (params->key_len > sizeof(key->data)) { 2455 bphy_err(drvr, "Too long key length (%u)\n", params->key_len); 2456 return -EINVAL; 2457 } 2458 2459 ext_key = false; 2460 if (mac_addr && (params->cipher != WLAN_CIPHER_SUITE_WEP40) && 2461 (params->cipher != WLAN_CIPHER_SUITE_WEP104)) { 2462 brcmf_dbg(TRACE, "Ext key, mac %pM", mac_addr); 2463 ext_key = true; 2464 } 2465 2466 key = &ifp->vif->profile.key[key_idx]; 2467 memset(key, 0, sizeof(*key)); 2468 if ((ext_key) && (!is_multicast_ether_addr(mac_addr))) 2469 memcpy((char *)&key->ea, (void *)mac_addr, ETH_ALEN); 2470 key->len = params->key_len; 2471 key->index = key_idx; 2472 memcpy(key->data, params->key, key->len); 2473 if (!ext_key) 2474 key->flags = BRCMF_PRIMARY_KEY; 2475 2476 if (params->seq && params->seq_len == 6) { 2477 /* rx iv */ 2478 u8 *ivptr; 2479 2480 ivptr = (u8 *)params->seq; 2481 key->rxiv.hi = (ivptr[5] << 24) | (ivptr[4] << 16) | 2482 (ivptr[3] << 8) | ivptr[2]; 2483 key->rxiv.lo = (ivptr[1] << 8) | ivptr[0]; 2484 key->iv_initialized = true; 2485 } 2486 2487 switch (params->cipher) { 2488 case WLAN_CIPHER_SUITE_WEP40: 2489 key->algo = CRYPTO_ALGO_WEP1; 2490 val = WEP_ENABLED; 2491 brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_WEP40\n"); 2492 break; 2493 case WLAN_CIPHER_SUITE_WEP104: 2494 key->algo = CRYPTO_ALGO_WEP128; 2495 val = WEP_ENABLED; 2496 brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_WEP104\n"); 2497 break; 2498 case WLAN_CIPHER_SUITE_TKIP: 2499 if (!brcmf_is_apmode(ifp->vif)) { 2500 brcmf_dbg(CONN, "Swapping RX/TX MIC key\n"); 2501 memcpy(keybuf, &key->data[24], sizeof(keybuf)); 2502 memcpy(&key->data[24], &key->data[16], sizeof(keybuf)); 2503 memcpy(&key->data[16], keybuf, sizeof(keybuf)); 2504 } 2505 key->algo = CRYPTO_ALGO_TKIP; 2506 val = TKIP_ENABLED; 2507 brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_TKIP\n"); 2508 break; 2509 case WLAN_CIPHER_SUITE_AES_CMAC: 2510 key->algo = CRYPTO_ALGO_AES_CCM; 2511 val = AES_ENABLED; 2512 brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_AES_CMAC\n"); 2513 break; 2514 case WLAN_CIPHER_SUITE_CCMP: 2515 key->algo = CRYPTO_ALGO_AES_CCM; 2516 val = AES_ENABLED; 2517 brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_CCMP\n"); 2518 break; 2519 default: 2520 bphy_err(drvr, "Invalid cipher (0x%x)\n", params->cipher); 2521 err = -EINVAL; 2522 goto done; 2523 } 2524 2525 err = send_key_to_dongle(ifp, key); 2526 if (ext_key || err) 2527 goto done; 2528 2529 err = brcmf_fil_bsscfg_int_get(ifp, "wsec", &wsec); 2530 if (err) { 2531 bphy_err(drvr, "get wsec error (%d)\n", err); 2532 goto done; 2533 } 2534 wsec |= val; 2535 err = brcmf_fil_bsscfg_int_set(ifp, "wsec", wsec); 2536 if (err) { 2537 bphy_err(drvr, "set wsec error (%d)\n", err); 2538 goto done; 2539 } 2540 2541 done: 2542 brcmf_dbg(TRACE, "Exit\n"); 2543 return err; 2544 } 2545 2546 static s32 2547 brcmf_cfg80211_get_key(struct wiphy *wiphy, struct net_device *ndev, u8 key_idx, 2548 bool pairwise, const u8 *mac_addr, void *cookie, 2549 void (*callback)(void *cookie, 2550 struct key_params *params)) 2551 { 2552 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 2553 struct key_params params; 2554 struct brcmf_if *ifp = netdev_priv(ndev); 2555 struct brcmf_cfg80211_profile *profile = &ifp->vif->profile; 2556 struct brcmf_pub *drvr = cfg->pub; 2557 struct brcmf_cfg80211_security *sec; 2558 s32 wsec; 2559 s32 err = 0; 2560 2561 brcmf_dbg(TRACE, "Enter\n"); 2562 brcmf_dbg(CONN, "key index (%d)\n", key_idx); 2563 if (!check_vif_up(ifp->vif)) 2564 return -EIO; 2565 2566 memset(¶ms, 0, sizeof(params)); 2567 2568 err = brcmf_fil_bsscfg_int_get(ifp, "wsec", &wsec); 2569 if (err) { 2570 bphy_err(drvr, "WLC_GET_WSEC error (%d)\n", err); 2571 /* Ignore this error, may happen during DISASSOC */ 2572 err = -EAGAIN; 2573 goto done; 2574 } 2575 if (wsec & WEP_ENABLED) { 2576 sec = &profile->sec; 2577 if (sec->cipher_pairwise & WLAN_CIPHER_SUITE_WEP40) { 2578 params.cipher = WLAN_CIPHER_SUITE_WEP40; 2579 brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_WEP40\n"); 2580 } else if (sec->cipher_pairwise & WLAN_CIPHER_SUITE_WEP104) { 2581 params.cipher = WLAN_CIPHER_SUITE_WEP104; 2582 brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_WEP104\n"); 2583 } 2584 } else if (wsec & TKIP_ENABLED) { 2585 params.cipher = WLAN_CIPHER_SUITE_TKIP; 2586 brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_TKIP\n"); 2587 } else if (wsec & AES_ENABLED) { 2588 params.cipher = WLAN_CIPHER_SUITE_AES_CMAC; 2589 brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_AES_CMAC\n"); 2590 } else { 2591 bphy_err(drvr, "Invalid algo (0x%x)\n", wsec); 2592 err = -EINVAL; 2593 goto done; 2594 } 2595 callback(cookie, ¶ms); 2596 2597 done: 2598 brcmf_dbg(TRACE, "Exit\n"); 2599 return err; 2600 } 2601 2602 static s32 2603 brcmf_cfg80211_config_default_mgmt_key(struct wiphy *wiphy, 2604 struct net_device *ndev, u8 key_idx) 2605 { 2606 struct brcmf_if *ifp = netdev_priv(ndev); 2607 2608 brcmf_dbg(TRACE, "Enter key_idx %d\n", key_idx); 2609 2610 if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MFP)) 2611 return 0; 2612 2613 brcmf_dbg(INFO, "Not supported\n"); 2614 2615 return -EOPNOTSUPP; 2616 } 2617 2618 static void 2619 brcmf_cfg80211_reconfigure_wep(struct brcmf_if *ifp) 2620 { 2621 struct brcmf_pub *drvr = ifp->drvr; 2622 s32 err; 2623 u8 key_idx; 2624 struct brcmf_wsec_key *key; 2625 s32 wsec; 2626 2627 for (key_idx = 0; key_idx < BRCMF_MAX_DEFAULT_KEYS; key_idx++) { 2628 key = &ifp->vif->profile.key[key_idx]; 2629 if ((key->algo == CRYPTO_ALGO_WEP1) || 2630 (key->algo == CRYPTO_ALGO_WEP128)) 2631 break; 2632 } 2633 if (key_idx == BRCMF_MAX_DEFAULT_KEYS) 2634 return; 2635 2636 err = send_key_to_dongle(ifp, key); 2637 if (err) { 2638 bphy_err(drvr, "Setting WEP key failed (%d)\n", err); 2639 return; 2640 } 2641 err = brcmf_fil_bsscfg_int_get(ifp, "wsec", &wsec); 2642 if (err) { 2643 bphy_err(drvr, "get wsec error (%d)\n", err); 2644 return; 2645 } 2646 wsec |= WEP_ENABLED; 2647 err = brcmf_fil_bsscfg_int_set(ifp, "wsec", wsec); 2648 if (err) 2649 bphy_err(drvr, "set wsec error (%d)\n", err); 2650 } 2651 2652 static void brcmf_convert_sta_flags(u32 fw_sta_flags, struct station_info *si) 2653 { 2654 struct nl80211_sta_flag_update *sfu; 2655 2656 brcmf_dbg(TRACE, "flags %08x\n", fw_sta_flags); 2657 si->filled |= BIT_ULL(NL80211_STA_INFO_STA_FLAGS); 2658 sfu = &si->sta_flags; 2659 sfu->mask = BIT(NL80211_STA_FLAG_WME) | 2660 BIT(NL80211_STA_FLAG_AUTHENTICATED) | 2661 BIT(NL80211_STA_FLAG_ASSOCIATED) | 2662 BIT(NL80211_STA_FLAG_AUTHORIZED); 2663 if (fw_sta_flags & BRCMF_STA_WME) 2664 sfu->set |= BIT(NL80211_STA_FLAG_WME); 2665 if (fw_sta_flags & BRCMF_STA_AUTHE) 2666 sfu->set |= BIT(NL80211_STA_FLAG_AUTHENTICATED); 2667 if (fw_sta_flags & BRCMF_STA_ASSOC) 2668 sfu->set |= BIT(NL80211_STA_FLAG_ASSOCIATED); 2669 if (fw_sta_flags & BRCMF_STA_AUTHO) 2670 sfu->set |= BIT(NL80211_STA_FLAG_AUTHORIZED); 2671 } 2672 2673 static void brcmf_fill_bss_param(struct brcmf_if *ifp, struct station_info *si) 2674 { 2675 struct brcmf_pub *drvr = ifp->drvr; 2676 struct { 2677 __le32 len; 2678 struct brcmf_bss_info_le bss_le; 2679 } *buf; 2680 u16 capability; 2681 int err; 2682 2683 buf = kzalloc(WL_BSS_INFO_MAX, GFP_KERNEL); 2684 if (!buf) 2685 return; 2686 2687 buf->len = cpu_to_le32(WL_BSS_INFO_MAX); 2688 err = brcmf_fil_cmd_data_get(ifp, BRCMF_C_GET_BSS_INFO, buf, 2689 WL_BSS_INFO_MAX); 2690 if (err) { 2691 bphy_err(drvr, "Failed to get bss info (%d)\n", err); 2692 goto out_kfree; 2693 } 2694 si->filled |= BIT_ULL(NL80211_STA_INFO_BSS_PARAM); 2695 si->bss_param.beacon_interval = le16_to_cpu(buf->bss_le.beacon_period); 2696 si->bss_param.dtim_period = buf->bss_le.dtim_period; 2697 capability = le16_to_cpu(buf->bss_le.capability); 2698 if (capability & IEEE80211_HT_STBC_PARAM_DUAL_CTS_PROT) 2699 si->bss_param.flags |= BSS_PARAM_FLAGS_CTS_PROT; 2700 if (capability & WLAN_CAPABILITY_SHORT_PREAMBLE) 2701 si->bss_param.flags |= BSS_PARAM_FLAGS_SHORT_PREAMBLE; 2702 if (capability & WLAN_CAPABILITY_SHORT_SLOT_TIME) 2703 si->bss_param.flags |= BSS_PARAM_FLAGS_SHORT_SLOT_TIME; 2704 2705 out_kfree: 2706 kfree(buf); 2707 } 2708 2709 static s32 2710 brcmf_cfg80211_get_station_ibss(struct brcmf_if *ifp, 2711 struct station_info *sinfo) 2712 { 2713 struct brcmf_pub *drvr = ifp->drvr; 2714 struct brcmf_scb_val_le scbval; 2715 struct brcmf_pktcnt_le pktcnt; 2716 s32 err; 2717 u32 rate; 2718 u32 rssi; 2719 2720 /* Get the current tx rate */ 2721 err = brcmf_fil_cmd_int_get(ifp, BRCMF_C_GET_RATE, &rate); 2722 if (err < 0) { 2723 bphy_err(drvr, "BRCMF_C_GET_RATE error (%d)\n", err); 2724 return err; 2725 } 2726 sinfo->filled |= BIT_ULL(NL80211_STA_INFO_TX_BITRATE); 2727 sinfo->txrate.legacy = rate * 5; 2728 2729 memset(&scbval, 0, sizeof(scbval)); 2730 err = brcmf_fil_cmd_data_get(ifp, BRCMF_C_GET_RSSI, &scbval, 2731 sizeof(scbval)); 2732 if (err) { 2733 bphy_err(drvr, "BRCMF_C_GET_RSSI error (%d)\n", err); 2734 return err; 2735 } 2736 rssi = le32_to_cpu(scbval.val); 2737 sinfo->filled |= BIT_ULL(NL80211_STA_INFO_SIGNAL); 2738 sinfo->signal = rssi; 2739 2740 err = brcmf_fil_cmd_data_get(ifp, BRCMF_C_GET_GET_PKTCNTS, &pktcnt, 2741 sizeof(pktcnt)); 2742 if (err) { 2743 bphy_err(drvr, "BRCMF_C_GET_GET_PKTCNTS error (%d)\n", err); 2744 return err; 2745 } 2746 sinfo->filled |= BIT_ULL(NL80211_STA_INFO_RX_PACKETS) | 2747 BIT_ULL(NL80211_STA_INFO_RX_DROP_MISC) | 2748 BIT_ULL(NL80211_STA_INFO_TX_PACKETS) | 2749 BIT_ULL(NL80211_STA_INFO_TX_FAILED); 2750 sinfo->rx_packets = le32_to_cpu(pktcnt.rx_good_pkt); 2751 sinfo->rx_dropped_misc = le32_to_cpu(pktcnt.rx_bad_pkt); 2752 sinfo->tx_packets = le32_to_cpu(pktcnt.tx_good_pkt); 2753 sinfo->tx_failed = le32_to_cpu(pktcnt.tx_bad_pkt); 2754 2755 return 0; 2756 } 2757 2758 static s32 2759 brcmf_cfg80211_get_station(struct wiphy *wiphy, struct net_device *ndev, 2760 const u8 *mac, struct station_info *sinfo) 2761 { 2762 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 2763 struct brcmf_if *ifp = netdev_priv(ndev); 2764 struct brcmf_pub *drvr = cfg->pub; 2765 struct brcmf_scb_val_le scb_val; 2766 s32 err = 0; 2767 struct brcmf_sta_info_le sta_info_le; 2768 u32 sta_flags; 2769 u32 is_tdls_peer; 2770 s32 total_rssi_avg = 0; 2771 s32 total_rssi = 0; 2772 s32 count_rssi = 0; 2773 int rssi; 2774 u32 i; 2775 2776 brcmf_dbg(TRACE, "Enter, MAC %pM\n", mac); 2777 if (!check_vif_up(ifp->vif)) 2778 return -EIO; 2779 2780 if (brcmf_is_ibssmode(ifp->vif)) 2781 return brcmf_cfg80211_get_station_ibss(ifp, sinfo); 2782 2783 memset(&sta_info_le, 0, sizeof(sta_info_le)); 2784 memcpy(&sta_info_le, mac, ETH_ALEN); 2785 err = brcmf_fil_iovar_data_get(ifp, "tdls_sta_info", 2786 &sta_info_le, 2787 sizeof(sta_info_le)); 2788 is_tdls_peer = !err; 2789 if (err) { 2790 err = brcmf_fil_iovar_data_get(ifp, "sta_info", 2791 &sta_info_le, 2792 sizeof(sta_info_le)); 2793 if (err < 0) { 2794 bphy_err(drvr, "GET STA INFO failed, %d\n", err); 2795 goto done; 2796 } 2797 } 2798 brcmf_dbg(TRACE, "version %d\n", le16_to_cpu(sta_info_le.ver)); 2799 sinfo->filled = BIT_ULL(NL80211_STA_INFO_INACTIVE_TIME); 2800 sinfo->inactive_time = le32_to_cpu(sta_info_le.idle) * 1000; 2801 sta_flags = le32_to_cpu(sta_info_le.flags); 2802 brcmf_convert_sta_flags(sta_flags, sinfo); 2803 sinfo->sta_flags.mask |= BIT(NL80211_STA_FLAG_TDLS_PEER); 2804 if (is_tdls_peer) 2805 sinfo->sta_flags.set |= BIT(NL80211_STA_FLAG_TDLS_PEER); 2806 else 2807 sinfo->sta_flags.set &= ~BIT(NL80211_STA_FLAG_TDLS_PEER); 2808 if (sta_flags & BRCMF_STA_ASSOC) { 2809 sinfo->filled |= BIT_ULL(NL80211_STA_INFO_CONNECTED_TIME); 2810 sinfo->connected_time = le32_to_cpu(sta_info_le.in); 2811 brcmf_fill_bss_param(ifp, sinfo); 2812 } 2813 if (sta_flags & BRCMF_STA_SCBSTATS) { 2814 sinfo->filled |= BIT_ULL(NL80211_STA_INFO_TX_FAILED); 2815 sinfo->tx_failed = le32_to_cpu(sta_info_le.tx_failures); 2816 sinfo->filled |= BIT_ULL(NL80211_STA_INFO_TX_PACKETS); 2817 sinfo->tx_packets = le32_to_cpu(sta_info_le.tx_pkts); 2818 sinfo->tx_packets += le32_to_cpu(sta_info_le.tx_mcast_pkts); 2819 sinfo->filled |= BIT_ULL(NL80211_STA_INFO_RX_PACKETS); 2820 sinfo->rx_packets = le32_to_cpu(sta_info_le.rx_ucast_pkts); 2821 sinfo->rx_packets += le32_to_cpu(sta_info_le.rx_mcast_pkts); 2822 if (sinfo->tx_packets) { 2823 sinfo->filled |= BIT_ULL(NL80211_STA_INFO_TX_BITRATE); 2824 sinfo->txrate.legacy = 2825 le32_to_cpu(sta_info_le.tx_rate) / 100; 2826 } 2827 if (sinfo->rx_packets) { 2828 sinfo->filled |= BIT_ULL(NL80211_STA_INFO_RX_BITRATE); 2829 sinfo->rxrate.legacy = 2830 le32_to_cpu(sta_info_le.rx_rate) / 100; 2831 } 2832 if (le16_to_cpu(sta_info_le.ver) >= 4) { 2833 sinfo->filled |= BIT_ULL(NL80211_STA_INFO_TX_BYTES); 2834 sinfo->tx_bytes = le64_to_cpu(sta_info_le.tx_tot_bytes); 2835 sinfo->filled |= BIT_ULL(NL80211_STA_INFO_RX_BYTES); 2836 sinfo->rx_bytes = le64_to_cpu(sta_info_le.rx_tot_bytes); 2837 } 2838 for (i = 0; i < BRCMF_ANT_MAX; i++) { 2839 if (sta_info_le.rssi[i] == 0 || 2840 sta_info_le.rx_lastpkt_rssi[i] == 0) 2841 continue; 2842 sinfo->chains |= BIT(count_rssi); 2843 sinfo->chain_signal[count_rssi] = 2844 sta_info_le.rx_lastpkt_rssi[i]; 2845 sinfo->chain_signal_avg[count_rssi] = 2846 sta_info_le.rssi[i]; 2847 total_rssi += sta_info_le.rx_lastpkt_rssi[i]; 2848 total_rssi_avg += sta_info_le.rssi[i]; 2849 count_rssi++; 2850 } 2851 if (count_rssi) { 2852 sinfo->filled |= BIT_ULL(NL80211_STA_INFO_SIGNAL); 2853 sinfo->filled |= BIT_ULL(NL80211_STA_INFO_SIGNAL_AVG); 2854 sinfo->filled |= BIT_ULL(NL80211_STA_INFO_CHAIN_SIGNAL); 2855 sinfo->filled |= 2856 BIT_ULL(NL80211_STA_INFO_CHAIN_SIGNAL_AVG); 2857 sinfo->signal = total_rssi / count_rssi; 2858 sinfo->signal_avg = total_rssi_avg / count_rssi; 2859 } else if (test_bit(BRCMF_VIF_STATUS_CONNECTED, 2860 &ifp->vif->sme_state)) { 2861 memset(&scb_val, 0, sizeof(scb_val)); 2862 err = brcmf_fil_cmd_data_get(ifp, BRCMF_C_GET_RSSI, 2863 &scb_val, sizeof(scb_val)); 2864 if (err) { 2865 bphy_err(drvr, "Could not get rssi (%d)\n", 2866 err); 2867 goto done; 2868 } else { 2869 rssi = le32_to_cpu(scb_val.val); 2870 sinfo->filled |= BIT_ULL(NL80211_STA_INFO_SIGNAL); 2871 sinfo->signal = rssi; 2872 brcmf_dbg(CONN, "RSSI %d dBm\n", rssi); 2873 } 2874 } 2875 } 2876 done: 2877 brcmf_dbg(TRACE, "Exit\n"); 2878 return err; 2879 } 2880 2881 static int 2882 brcmf_cfg80211_dump_station(struct wiphy *wiphy, struct net_device *ndev, 2883 int idx, u8 *mac, struct station_info *sinfo) 2884 { 2885 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 2886 struct brcmf_if *ifp = netdev_priv(ndev); 2887 struct brcmf_pub *drvr = cfg->pub; 2888 s32 err; 2889 2890 brcmf_dbg(TRACE, "Enter, idx %d\n", idx); 2891 2892 if (idx == 0) { 2893 cfg->assoclist.count = cpu_to_le32(BRCMF_MAX_ASSOCLIST); 2894 err = brcmf_fil_cmd_data_get(ifp, BRCMF_C_GET_ASSOCLIST, 2895 &cfg->assoclist, 2896 sizeof(cfg->assoclist)); 2897 if (err) { 2898 bphy_err(drvr, "BRCMF_C_GET_ASSOCLIST unsupported, err=%d\n", 2899 err); 2900 cfg->assoclist.count = 0; 2901 return -EOPNOTSUPP; 2902 } 2903 } 2904 if (idx < le32_to_cpu(cfg->assoclist.count)) { 2905 memcpy(mac, cfg->assoclist.mac[idx], ETH_ALEN); 2906 return brcmf_cfg80211_get_station(wiphy, ndev, mac, sinfo); 2907 } 2908 return -ENOENT; 2909 } 2910 2911 static s32 2912 brcmf_cfg80211_set_power_mgmt(struct wiphy *wiphy, struct net_device *ndev, 2913 bool enabled, s32 timeout) 2914 { 2915 s32 pm; 2916 s32 err = 0; 2917 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 2918 struct brcmf_if *ifp = netdev_priv(ndev); 2919 struct brcmf_pub *drvr = cfg->pub; 2920 2921 brcmf_dbg(TRACE, "Enter\n"); 2922 2923 /* 2924 * Powersave enable/disable request is coming from the 2925 * cfg80211 even before the interface is up. In that 2926 * scenario, driver will be storing the power save 2927 * preference in cfg struct to apply this to 2928 * FW later while initializing the dongle 2929 */ 2930 cfg->pwr_save = enabled; 2931 if (!check_vif_up(ifp->vif)) { 2932 2933 brcmf_dbg(INFO, "Device is not ready, storing the value in cfg_info struct\n"); 2934 goto done; 2935 } 2936 2937 pm = enabled ? PM_FAST : PM_OFF; 2938 /* Do not enable the power save after assoc if it is a p2p interface */ 2939 if (ifp->vif->wdev.iftype == NL80211_IFTYPE_P2P_CLIENT) { 2940 brcmf_dbg(INFO, "Do not enable power save for P2P clients\n"); 2941 pm = PM_OFF; 2942 } 2943 brcmf_dbg(INFO, "power save %s\n", (pm ? "enabled" : "disabled")); 2944 2945 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_PM, pm); 2946 if (err) { 2947 if (err == -ENODEV) 2948 bphy_err(drvr, "net_device is not ready yet\n"); 2949 else 2950 bphy_err(drvr, "error (%d)\n", err); 2951 } 2952 2953 err = brcmf_fil_iovar_int_set(ifp, "pm2_sleep_ret", 2954 min_t(u32, timeout, BRCMF_PS_MAX_TIMEOUT_MS)); 2955 if (err) 2956 bphy_err(drvr, "Unable to set pm timeout, (%d)\n", err); 2957 2958 done: 2959 brcmf_dbg(TRACE, "Exit\n"); 2960 return err; 2961 } 2962 2963 static s32 brcmf_inform_single_bss(struct brcmf_cfg80211_info *cfg, 2964 struct brcmf_bss_info_le *bi) 2965 { 2966 struct wiphy *wiphy = cfg_to_wiphy(cfg); 2967 struct brcmf_pub *drvr = cfg->pub; 2968 struct cfg80211_bss *bss; 2969 enum nl80211_band band; 2970 struct brcmu_chan ch; 2971 u16 channel; 2972 u32 freq; 2973 u16 notify_capability; 2974 u16 notify_interval; 2975 u8 *notify_ie; 2976 size_t notify_ielen; 2977 struct cfg80211_inform_bss bss_data = {}; 2978 2979 if (le32_to_cpu(bi->length) > WL_BSS_INFO_MAX) { 2980 bphy_err(drvr, "Bss info is larger than buffer. Discarding\n"); 2981 return -EINVAL; 2982 } 2983 2984 if (!bi->ctl_ch) { 2985 ch.chspec = le16_to_cpu(bi->chanspec); 2986 cfg->d11inf.decchspec(&ch); 2987 bi->ctl_ch = ch.control_ch_num; 2988 } 2989 channel = bi->ctl_ch; 2990 2991 if (channel <= CH_MAX_2G_CHANNEL) 2992 band = NL80211_BAND_2GHZ; 2993 else 2994 band = NL80211_BAND_5GHZ; 2995 2996 freq = ieee80211_channel_to_frequency(channel, band); 2997 bss_data.chan = ieee80211_get_channel(wiphy, freq); 2998 bss_data.scan_width = NL80211_BSS_CHAN_WIDTH_20; 2999 bss_data.boottime_ns = ktime_to_ns(ktime_get_boottime()); 3000 3001 notify_capability = le16_to_cpu(bi->capability); 3002 notify_interval = le16_to_cpu(bi->beacon_period); 3003 notify_ie = (u8 *)bi + le16_to_cpu(bi->ie_offset); 3004 notify_ielen = le32_to_cpu(bi->ie_length); 3005 bss_data.signal = (s16)le16_to_cpu(bi->RSSI) * 100; 3006 3007 brcmf_dbg(CONN, "bssid: %pM\n", bi->BSSID); 3008 brcmf_dbg(CONN, "Channel: %d(%d)\n", channel, freq); 3009 brcmf_dbg(CONN, "Capability: %X\n", notify_capability); 3010 brcmf_dbg(CONN, "Beacon interval: %d\n", notify_interval); 3011 brcmf_dbg(CONN, "Signal: %d\n", bss_data.signal); 3012 3013 bss = cfg80211_inform_bss_data(wiphy, &bss_data, 3014 CFG80211_BSS_FTYPE_UNKNOWN, 3015 (const u8 *)bi->BSSID, 3016 0, notify_capability, 3017 notify_interval, notify_ie, 3018 notify_ielen, GFP_KERNEL); 3019 3020 if (!bss) 3021 return -ENOMEM; 3022 3023 cfg80211_put_bss(wiphy, bss); 3024 3025 return 0; 3026 } 3027 3028 static struct brcmf_bss_info_le * 3029 next_bss_le(struct brcmf_scan_results *list, struct brcmf_bss_info_le *bss) 3030 { 3031 if (bss == NULL) 3032 return list->bss_info_le; 3033 return (struct brcmf_bss_info_le *)((unsigned long)bss + 3034 le32_to_cpu(bss->length)); 3035 } 3036 3037 static s32 brcmf_inform_bss(struct brcmf_cfg80211_info *cfg) 3038 { 3039 struct brcmf_pub *drvr = cfg->pub; 3040 struct brcmf_scan_results *bss_list; 3041 struct brcmf_bss_info_le *bi = NULL; /* must be initialized */ 3042 s32 err = 0; 3043 int i; 3044 3045 bss_list = (struct brcmf_scan_results *)cfg->escan_info.escan_buf; 3046 if (bss_list->count != 0 && 3047 bss_list->version != BRCMF_BSS_INFO_VERSION) { 3048 bphy_err(drvr, "Version %d != WL_BSS_INFO_VERSION\n", 3049 bss_list->version); 3050 return -EOPNOTSUPP; 3051 } 3052 brcmf_dbg(SCAN, "scanned AP count (%d)\n", bss_list->count); 3053 for (i = 0; i < bss_list->count; i++) { 3054 bi = next_bss_le(bss_list, bi); 3055 err = brcmf_inform_single_bss(cfg, bi); 3056 if (err) 3057 break; 3058 } 3059 return err; 3060 } 3061 3062 static s32 brcmf_inform_ibss(struct brcmf_cfg80211_info *cfg, 3063 struct net_device *ndev, const u8 *bssid) 3064 { 3065 struct wiphy *wiphy = cfg_to_wiphy(cfg); 3066 struct brcmf_pub *drvr = cfg->pub; 3067 struct ieee80211_channel *notify_channel; 3068 struct brcmf_bss_info_le *bi = NULL; 3069 struct ieee80211_supported_band *band; 3070 struct cfg80211_bss *bss; 3071 struct brcmu_chan ch; 3072 u8 *buf = NULL; 3073 s32 err = 0; 3074 u32 freq; 3075 u16 notify_capability; 3076 u16 notify_interval; 3077 u8 *notify_ie; 3078 size_t notify_ielen; 3079 s32 notify_signal; 3080 3081 brcmf_dbg(TRACE, "Enter\n"); 3082 3083 buf = kzalloc(WL_BSS_INFO_MAX, GFP_KERNEL); 3084 if (buf == NULL) { 3085 err = -ENOMEM; 3086 goto CleanUp; 3087 } 3088 3089 *(__le32 *)buf = cpu_to_le32(WL_BSS_INFO_MAX); 3090 3091 err = brcmf_fil_cmd_data_get(netdev_priv(ndev), BRCMF_C_GET_BSS_INFO, 3092 buf, WL_BSS_INFO_MAX); 3093 if (err) { 3094 bphy_err(drvr, "WLC_GET_BSS_INFO failed: %d\n", err); 3095 goto CleanUp; 3096 } 3097 3098 bi = (struct brcmf_bss_info_le *)(buf + 4); 3099 3100 ch.chspec = le16_to_cpu(bi->chanspec); 3101 cfg->d11inf.decchspec(&ch); 3102 3103 if (ch.band == BRCMU_CHAN_BAND_2G) 3104 band = wiphy->bands[NL80211_BAND_2GHZ]; 3105 else 3106 band = wiphy->bands[NL80211_BAND_5GHZ]; 3107 3108 freq = ieee80211_channel_to_frequency(ch.control_ch_num, band->band); 3109 cfg->channel = freq; 3110 notify_channel = ieee80211_get_channel(wiphy, freq); 3111 3112 notify_capability = le16_to_cpu(bi->capability); 3113 notify_interval = le16_to_cpu(bi->beacon_period); 3114 notify_ie = (u8 *)bi + le16_to_cpu(bi->ie_offset); 3115 notify_ielen = le32_to_cpu(bi->ie_length); 3116 notify_signal = (s16)le16_to_cpu(bi->RSSI) * 100; 3117 3118 brcmf_dbg(CONN, "channel: %d(%d)\n", ch.control_ch_num, freq); 3119 brcmf_dbg(CONN, "capability: %X\n", notify_capability); 3120 brcmf_dbg(CONN, "beacon interval: %d\n", notify_interval); 3121 brcmf_dbg(CONN, "signal: %d\n", notify_signal); 3122 3123 bss = cfg80211_inform_bss(wiphy, notify_channel, 3124 CFG80211_BSS_FTYPE_UNKNOWN, bssid, 0, 3125 notify_capability, notify_interval, 3126 notify_ie, notify_ielen, notify_signal, 3127 GFP_KERNEL); 3128 3129 if (!bss) { 3130 err = -ENOMEM; 3131 goto CleanUp; 3132 } 3133 3134 cfg80211_put_bss(wiphy, bss); 3135 3136 CleanUp: 3137 3138 kfree(buf); 3139 3140 brcmf_dbg(TRACE, "Exit\n"); 3141 3142 return err; 3143 } 3144 3145 static s32 brcmf_update_bss_info(struct brcmf_cfg80211_info *cfg, 3146 struct brcmf_if *ifp) 3147 { 3148 struct brcmf_pub *drvr = cfg->pub; 3149 struct brcmf_bss_info_le *bi; 3150 const struct brcmf_tlv *tim; 3151 size_t ie_len; 3152 u8 *ie; 3153 s32 err = 0; 3154 3155 brcmf_dbg(TRACE, "Enter\n"); 3156 if (brcmf_is_ibssmode(ifp->vif)) 3157 return err; 3158 3159 *(__le32 *)cfg->extra_buf = cpu_to_le32(WL_EXTRA_BUF_MAX); 3160 err = brcmf_fil_cmd_data_get(ifp, BRCMF_C_GET_BSS_INFO, 3161 cfg->extra_buf, WL_EXTRA_BUF_MAX); 3162 if (err) { 3163 bphy_err(drvr, "Could not get bss info %d\n", err); 3164 goto update_bss_info_out; 3165 } 3166 3167 bi = (struct brcmf_bss_info_le *)(cfg->extra_buf + 4); 3168 err = brcmf_inform_single_bss(cfg, bi); 3169 if (err) 3170 goto update_bss_info_out; 3171 3172 ie = ((u8 *)bi) + le16_to_cpu(bi->ie_offset); 3173 ie_len = le32_to_cpu(bi->ie_length); 3174 3175 tim = brcmf_parse_tlvs(ie, ie_len, WLAN_EID_TIM); 3176 if (!tim) { 3177 /* 3178 * active scan was done so we could not get dtim 3179 * information out of probe response. 3180 * so we speficially query dtim information to dongle. 3181 */ 3182 u32 var; 3183 err = brcmf_fil_iovar_int_get(ifp, "dtim_assoc", &var); 3184 if (err) { 3185 bphy_err(drvr, "wl dtim_assoc failed (%d)\n", err); 3186 goto update_bss_info_out; 3187 } 3188 } 3189 3190 update_bss_info_out: 3191 brcmf_dbg(TRACE, "Exit"); 3192 return err; 3193 } 3194 3195 void brcmf_abort_scanning(struct brcmf_cfg80211_info *cfg) 3196 { 3197 struct escan_info *escan = &cfg->escan_info; 3198 3199 set_bit(BRCMF_SCAN_STATUS_ABORT, &cfg->scan_status); 3200 if (cfg->int_escan_map || cfg->scan_request) { 3201 escan->escan_state = WL_ESCAN_STATE_IDLE; 3202 brcmf_notify_escan_complete(cfg, escan->ifp, true, true); 3203 } 3204 clear_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status); 3205 clear_bit(BRCMF_SCAN_STATUS_ABORT, &cfg->scan_status); 3206 } 3207 3208 static void brcmf_cfg80211_escan_timeout_worker(struct work_struct *work) 3209 { 3210 struct brcmf_cfg80211_info *cfg = 3211 container_of(work, struct brcmf_cfg80211_info, 3212 escan_timeout_work); 3213 3214 brcmf_inform_bss(cfg); 3215 brcmf_notify_escan_complete(cfg, cfg->escan_info.ifp, true, true); 3216 } 3217 3218 static void brcmf_escan_timeout(struct timer_list *t) 3219 { 3220 struct brcmf_cfg80211_info *cfg = 3221 from_timer(cfg, t, escan_timeout); 3222 struct brcmf_pub *drvr = cfg->pub; 3223 3224 if (cfg->int_escan_map || cfg->scan_request) { 3225 bphy_err(drvr, "timer expired\n"); 3226 schedule_work(&cfg->escan_timeout_work); 3227 } 3228 } 3229 3230 static s32 3231 brcmf_compare_update_same_bss(struct brcmf_cfg80211_info *cfg, 3232 struct brcmf_bss_info_le *bss, 3233 struct brcmf_bss_info_le *bss_info_le) 3234 { 3235 struct brcmu_chan ch_bss, ch_bss_info_le; 3236 3237 ch_bss.chspec = le16_to_cpu(bss->chanspec); 3238 cfg->d11inf.decchspec(&ch_bss); 3239 ch_bss_info_le.chspec = le16_to_cpu(bss_info_le->chanspec); 3240 cfg->d11inf.decchspec(&ch_bss_info_le); 3241 3242 if (!memcmp(&bss_info_le->BSSID, &bss->BSSID, ETH_ALEN) && 3243 ch_bss.band == ch_bss_info_le.band && 3244 bss_info_le->SSID_len == bss->SSID_len && 3245 !memcmp(bss_info_le->SSID, bss->SSID, bss_info_le->SSID_len)) { 3246 if ((bss->flags & BRCMF_BSS_RSSI_ON_CHANNEL) == 3247 (bss_info_le->flags & BRCMF_BSS_RSSI_ON_CHANNEL)) { 3248 s16 bss_rssi = le16_to_cpu(bss->RSSI); 3249 s16 bss_info_rssi = le16_to_cpu(bss_info_le->RSSI); 3250 3251 /* preserve max RSSI if the measurements are 3252 * both on-channel or both off-channel 3253 */ 3254 if (bss_info_rssi > bss_rssi) 3255 bss->RSSI = bss_info_le->RSSI; 3256 } else if ((bss->flags & BRCMF_BSS_RSSI_ON_CHANNEL) && 3257 (bss_info_le->flags & BRCMF_BSS_RSSI_ON_CHANNEL) == 0) { 3258 /* preserve the on-channel rssi measurement 3259 * if the new measurement is off channel 3260 */ 3261 bss->RSSI = bss_info_le->RSSI; 3262 bss->flags |= BRCMF_BSS_RSSI_ON_CHANNEL; 3263 } 3264 return 1; 3265 } 3266 return 0; 3267 } 3268 3269 static s32 3270 brcmf_cfg80211_escan_handler(struct brcmf_if *ifp, 3271 const struct brcmf_event_msg *e, void *data) 3272 { 3273 struct brcmf_pub *drvr = ifp->drvr; 3274 struct brcmf_cfg80211_info *cfg = drvr->config; 3275 s32 status; 3276 struct brcmf_escan_result_le *escan_result_le; 3277 u32 escan_buflen; 3278 struct brcmf_bss_info_le *bss_info_le; 3279 struct brcmf_bss_info_le *bss = NULL; 3280 u32 bi_length; 3281 struct brcmf_scan_results *list; 3282 u32 i; 3283 bool aborted; 3284 3285 status = e->status; 3286 3287 if (status == BRCMF_E_STATUS_ABORT) 3288 goto exit; 3289 3290 if (!test_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status)) { 3291 bphy_err(drvr, "scan not ready, bsscfgidx=%d\n", 3292 ifp->bsscfgidx); 3293 return -EPERM; 3294 } 3295 3296 if (status == BRCMF_E_STATUS_PARTIAL) { 3297 brcmf_dbg(SCAN, "ESCAN Partial result\n"); 3298 if (e->datalen < sizeof(*escan_result_le)) { 3299 bphy_err(drvr, "invalid event data length\n"); 3300 goto exit; 3301 } 3302 escan_result_le = (struct brcmf_escan_result_le *) data; 3303 if (!escan_result_le) { 3304 bphy_err(drvr, "Invalid escan result (NULL pointer)\n"); 3305 goto exit; 3306 } 3307 escan_buflen = le32_to_cpu(escan_result_le->buflen); 3308 if (escan_buflen > BRCMF_ESCAN_BUF_SIZE || 3309 escan_buflen > e->datalen || 3310 escan_buflen < sizeof(*escan_result_le)) { 3311 bphy_err(drvr, "Invalid escan buffer length: %d\n", 3312 escan_buflen); 3313 goto exit; 3314 } 3315 if (le16_to_cpu(escan_result_le->bss_count) != 1) { 3316 bphy_err(drvr, "Invalid bss_count %d: ignoring\n", 3317 escan_result_le->bss_count); 3318 goto exit; 3319 } 3320 bss_info_le = &escan_result_le->bss_info_le; 3321 3322 if (brcmf_p2p_scan_finding_common_channel(cfg, bss_info_le)) 3323 goto exit; 3324 3325 if (!cfg->int_escan_map && !cfg->scan_request) { 3326 brcmf_dbg(SCAN, "result without cfg80211 request\n"); 3327 goto exit; 3328 } 3329 3330 bi_length = le32_to_cpu(bss_info_le->length); 3331 if (bi_length != escan_buflen - WL_ESCAN_RESULTS_FIXED_SIZE) { 3332 bphy_err(drvr, "Ignoring invalid bss_info length: %d\n", 3333 bi_length); 3334 goto exit; 3335 } 3336 3337 if (!(cfg_to_wiphy(cfg)->interface_modes & 3338 BIT(NL80211_IFTYPE_ADHOC))) { 3339 if (le16_to_cpu(bss_info_le->capability) & 3340 WLAN_CAPABILITY_IBSS) { 3341 bphy_err(drvr, "Ignoring IBSS result\n"); 3342 goto exit; 3343 } 3344 } 3345 3346 list = (struct brcmf_scan_results *) 3347 cfg->escan_info.escan_buf; 3348 if (bi_length > BRCMF_ESCAN_BUF_SIZE - list->buflen) { 3349 bphy_err(drvr, "Buffer is too small: ignoring\n"); 3350 goto exit; 3351 } 3352 3353 for (i = 0; i < list->count; i++) { 3354 bss = bss ? (struct brcmf_bss_info_le *) 3355 ((unsigned char *)bss + 3356 le32_to_cpu(bss->length)) : list->bss_info_le; 3357 if (brcmf_compare_update_same_bss(cfg, bss, 3358 bss_info_le)) 3359 goto exit; 3360 } 3361 memcpy(&cfg->escan_info.escan_buf[list->buflen], bss_info_le, 3362 bi_length); 3363 list->version = le32_to_cpu(bss_info_le->version); 3364 list->buflen += bi_length; 3365 list->count++; 3366 } else { 3367 cfg->escan_info.escan_state = WL_ESCAN_STATE_IDLE; 3368 if (brcmf_p2p_scan_finding_common_channel(cfg, NULL)) 3369 goto exit; 3370 if (cfg->int_escan_map || cfg->scan_request) { 3371 brcmf_inform_bss(cfg); 3372 aborted = status != BRCMF_E_STATUS_SUCCESS; 3373 brcmf_notify_escan_complete(cfg, ifp, aborted, false); 3374 } else 3375 brcmf_dbg(SCAN, "Ignored scan complete result 0x%x\n", 3376 status); 3377 } 3378 exit: 3379 return 0; 3380 } 3381 3382 static void brcmf_init_escan(struct brcmf_cfg80211_info *cfg) 3383 { 3384 brcmf_fweh_register(cfg->pub, BRCMF_E_ESCAN_RESULT, 3385 brcmf_cfg80211_escan_handler); 3386 cfg->escan_info.escan_state = WL_ESCAN_STATE_IDLE; 3387 /* Init scan_timeout timer */ 3388 timer_setup(&cfg->escan_timeout, brcmf_escan_timeout, 0); 3389 INIT_WORK(&cfg->escan_timeout_work, 3390 brcmf_cfg80211_escan_timeout_worker); 3391 } 3392 3393 static struct cfg80211_scan_request * 3394 brcmf_alloc_internal_escan_request(struct wiphy *wiphy, u32 n_netinfo) { 3395 struct cfg80211_scan_request *req; 3396 size_t req_size; 3397 3398 req_size = sizeof(*req) + 3399 n_netinfo * sizeof(req->channels[0]) + 3400 n_netinfo * sizeof(*req->ssids); 3401 3402 req = kzalloc(req_size, GFP_KERNEL); 3403 if (req) { 3404 req->wiphy = wiphy; 3405 req->ssids = (void *)(&req->channels[0]) + 3406 n_netinfo * sizeof(req->channels[0]); 3407 } 3408 return req; 3409 } 3410 3411 static int brcmf_internal_escan_add_info(struct cfg80211_scan_request *req, 3412 u8 *ssid, u8 ssid_len, u8 channel) 3413 { 3414 struct ieee80211_channel *chan; 3415 enum nl80211_band band; 3416 int freq, i; 3417 3418 if (channel <= CH_MAX_2G_CHANNEL) 3419 band = NL80211_BAND_2GHZ; 3420 else 3421 band = NL80211_BAND_5GHZ; 3422 3423 freq = ieee80211_channel_to_frequency(channel, band); 3424 if (!freq) 3425 return -EINVAL; 3426 3427 chan = ieee80211_get_channel(req->wiphy, freq); 3428 if (!chan) 3429 return -EINVAL; 3430 3431 for (i = 0; i < req->n_channels; i++) { 3432 if (req->channels[i] == chan) 3433 break; 3434 } 3435 if (i == req->n_channels) 3436 req->channels[req->n_channels++] = chan; 3437 3438 for (i = 0; i < req->n_ssids; i++) { 3439 if (req->ssids[i].ssid_len == ssid_len && 3440 !memcmp(req->ssids[i].ssid, ssid, ssid_len)) 3441 break; 3442 } 3443 if (i == req->n_ssids) { 3444 memcpy(req->ssids[req->n_ssids].ssid, ssid, ssid_len); 3445 req->ssids[req->n_ssids++].ssid_len = ssid_len; 3446 } 3447 return 0; 3448 } 3449 3450 static int brcmf_start_internal_escan(struct brcmf_if *ifp, u32 fwmap, 3451 struct cfg80211_scan_request *request) 3452 { 3453 struct brcmf_cfg80211_info *cfg = ifp->drvr->config; 3454 int err; 3455 3456 if (test_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status)) { 3457 if (cfg->int_escan_map) 3458 brcmf_dbg(SCAN, "aborting internal scan: map=%u\n", 3459 cfg->int_escan_map); 3460 /* Abort any on-going scan */ 3461 brcmf_abort_scanning(cfg); 3462 } 3463 3464 brcmf_dbg(SCAN, "start internal scan: map=%u\n", fwmap); 3465 set_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status); 3466 cfg->escan_info.run = brcmf_run_escan; 3467 err = brcmf_do_escan(ifp, request); 3468 if (err) { 3469 clear_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status); 3470 return err; 3471 } 3472 cfg->int_escan_map = fwmap; 3473 return 0; 3474 } 3475 3476 static struct brcmf_pno_net_info_le * 3477 brcmf_get_netinfo_array(struct brcmf_pno_scanresults_le *pfn_v1) 3478 { 3479 struct brcmf_pno_scanresults_v2_le *pfn_v2; 3480 struct brcmf_pno_net_info_le *netinfo; 3481 3482 switch (pfn_v1->version) { 3483 default: 3484 WARN_ON(1); 3485 fallthrough; 3486 case cpu_to_le32(1): 3487 netinfo = (struct brcmf_pno_net_info_le *)(pfn_v1 + 1); 3488 break; 3489 case cpu_to_le32(2): 3490 pfn_v2 = (struct brcmf_pno_scanresults_v2_le *)pfn_v1; 3491 netinfo = (struct brcmf_pno_net_info_le *)(pfn_v2 + 1); 3492 break; 3493 } 3494 3495 return netinfo; 3496 } 3497 3498 /* PFN result doesn't have all the info which are required by the supplicant 3499 * (For e.g IEs) Do a target Escan so that sched scan results are reported 3500 * via wl_inform_single_bss in the required format. Escan does require the 3501 * scan request in the form of cfg80211_scan_request. For timebeing, create 3502 * cfg80211_scan_request one out of the received PNO event. 3503 */ 3504 static s32 3505 brcmf_notify_sched_scan_results(struct brcmf_if *ifp, 3506 const struct brcmf_event_msg *e, void *data) 3507 { 3508 struct brcmf_pub *drvr = ifp->drvr; 3509 struct brcmf_cfg80211_info *cfg = drvr->config; 3510 struct brcmf_pno_net_info_le *netinfo, *netinfo_start; 3511 struct cfg80211_scan_request *request = NULL; 3512 struct wiphy *wiphy = cfg_to_wiphy(cfg); 3513 int i, err = 0; 3514 struct brcmf_pno_scanresults_le *pfn_result; 3515 u32 bucket_map; 3516 u32 result_count; 3517 u32 status; 3518 u32 datalen; 3519 3520 brcmf_dbg(SCAN, "Enter\n"); 3521 3522 if (e->datalen < (sizeof(*pfn_result) + sizeof(*netinfo))) { 3523 brcmf_dbg(SCAN, "Event data to small. Ignore\n"); 3524 return 0; 3525 } 3526 3527 if (e->event_code == BRCMF_E_PFN_NET_LOST) { 3528 brcmf_dbg(SCAN, "PFN NET LOST event. Do Nothing\n"); 3529 return 0; 3530 } 3531 3532 pfn_result = (struct brcmf_pno_scanresults_le *)data; 3533 result_count = le32_to_cpu(pfn_result->count); 3534 status = le32_to_cpu(pfn_result->status); 3535 3536 /* PFN event is limited to fit 512 bytes so we may get 3537 * multiple NET_FOUND events. For now place a warning here. 3538 */ 3539 WARN_ON(status != BRCMF_PNO_SCAN_COMPLETE); 3540 brcmf_dbg(SCAN, "PFN NET FOUND event. count: %d\n", result_count); 3541 if (!result_count) { 3542 bphy_err(drvr, "FALSE PNO Event. (pfn_count == 0)\n"); 3543 goto out_err; 3544 } 3545 3546 netinfo_start = brcmf_get_netinfo_array(pfn_result); 3547 datalen = e->datalen - ((void *)netinfo_start - (void *)pfn_result); 3548 if (datalen < result_count * sizeof(*netinfo)) { 3549 bphy_err(drvr, "insufficient event data\n"); 3550 goto out_err; 3551 } 3552 3553 request = brcmf_alloc_internal_escan_request(wiphy, 3554 result_count); 3555 if (!request) { 3556 err = -ENOMEM; 3557 goto out_err; 3558 } 3559 3560 bucket_map = 0; 3561 for (i = 0; i < result_count; i++) { 3562 netinfo = &netinfo_start[i]; 3563 3564 if (netinfo->SSID_len > IEEE80211_MAX_SSID_LEN) 3565 netinfo->SSID_len = IEEE80211_MAX_SSID_LEN; 3566 brcmf_dbg(SCAN, "SSID:%.32s Channel:%d\n", 3567 netinfo->SSID, netinfo->channel); 3568 bucket_map |= brcmf_pno_get_bucket_map(cfg->pno, netinfo); 3569 err = brcmf_internal_escan_add_info(request, 3570 netinfo->SSID, 3571 netinfo->SSID_len, 3572 netinfo->channel); 3573 if (err) 3574 goto out_err; 3575 } 3576 3577 if (!bucket_map) 3578 goto free_req; 3579 3580 err = brcmf_start_internal_escan(ifp, bucket_map, request); 3581 if (!err) 3582 goto free_req; 3583 3584 out_err: 3585 cfg80211_sched_scan_stopped(wiphy, 0); 3586 free_req: 3587 kfree(request); 3588 return err; 3589 } 3590 3591 static int 3592 brcmf_cfg80211_sched_scan_start(struct wiphy *wiphy, 3593 struct net_device *ndev, 3594 struct cfg80211_sched_scan_request *req) 3595 { 3596 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 3597 struct brcmf_if *ifp = netdev_priv(ndev); 3598 struct brcmf_pub *drvr = cfg->pub; 3599 3600 brcmf_dbg(SCAN, "Enter: n_match_sets=%d n_ssids=%d\n", 3601 req->n_match_sets, req->n_ssids); 3602 3603 if (test_bit(BRCMF_SCAN_STATUS_SUPPRESS, &cfg->scan_status)) { 3604 bphy_err(drvr, "Scanning suppressed: status=%lu\n", 3605 cfg->scan_status); 3606 return -EAGAIN; 3607 } 3608 3609 if (req->n_match_sets <= 0) { 3610 brcmf_dbg(SCAN, "invalid number of matchsets specified: %d\n", 3611 req->n_match_sets); 3612 return -EINVAL; 3613 } 3614 3615 return brcmf_pno_start_sched_scan(ifp, req); 3616 } 3617 3618 static int brcmf_cfg80211_sched_scan_stop(struct wiphy *wiphy, 3619 struct net_device *ndev, u64 reqid) 3620 { 3621 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 3622 struct brcmf_if *ifp = netdev_priv(ndev); 3623 3624 brcmf_dbg(SCAN, "enter\n"); 3625 brcmf_pno_stop_sched_scan(ifp, reqid); 3626 if (cfg->int_escan_map) 3627 brcmf_notify_escan_complete(cfg, ifp, true, true); 3628 return 0; 3629 } 3630 3631 static __always_inline void brcmf_delay(u32 ms) 3632 { 3633 if (ms < 1000 / HZ) { 3634 cond_resched(); 3635 mdelay(ms); 3636 } else { 3637 msleep(ms); 3638 } 3639 } 3640 3641 static s32 brcmf_config_wowl_pattern(struct brcmf_if *ifp, u8 cmd[4], 3642 u8 *pattern, u32 patternsize, u8 *mask, 3643 u32 packet_offset) 3644 { 3645 struct brcmf_fil_wowl_pattern_le *filter; 3646 u32 masksize; 3647 u32 patternoffset; 3648 u8 *buf; 3649 u32 bufsize; 3650 s32 ret; 3651 3652 masksize = (patternsize + 7) / 8; 3653 patternoffset = sizeof(*filter) - sizeof(filter->cmd) + masksize; 3654 3655 bufsize = sizeof(*filter) + patternsize + masksize; 3656 buf = kzalloc(bufsize, GFP_KERNEL); 3657 if (!buf) 3658 return -ENOMEM; 3659 filter = (struct brcmf_fil_wowl_pattern_le *)buf; 3660 3661 memcpy(filter->cmd, cmd, 4); 3662 filter->masksize = cpu_to_le32(masksize); 3663 filter->offset = cpu_to_le32(packet_offset); 3664 filter->patternoffset = cpu_to_le32(patternoffset); 3665 filter->patternsize = cpu_to_le32(patternsize); 3666 filter->type = cpu_to_le32(BRCMF_WOWL_PATTERN_TYPE_BITMAP); 3667 3668 if ((mask) && (masksize)) 3669 memcpy(buf + sizeof(*filter), mask, masksize); 3670 if ((pattern) && (patternsize)) 3671 memcpy(buf + sizeof(*filter) + masksize, pattern, patternsize); 3672 3673 ret = brcmf_fil_iovar_data_set(ifp, "wowl_pattern", buf, bufsize); 3674 3675 kfree(buf); 3676 return ret; 3677 } 3678 3679 static s32 3680 brcmf_wowl_nd_results(struct brcmf_if *ifp, const struct brcmf_event_msg *e, 3681 void *data) 3682 { 3683 struct brcmf_pub *drvr = ifp->drvr; 3684 struct brcmf_cfg80211_info *cfg = drvr->config; 3685 struct brcmf_pno_scanresults_le *pfn_result; 3686 struct brcmf_pno_net_info_le *netinfo; 3687 3688 brcmf_dbg(SCAN, "Enter\n"); 3689 3690 if (e->datalen < (sizeof(*pfn_result) + sizeof(*netinfo))) { 3691 brcmf_dbg(SCAN, "Event data to small. Ignore\n"); 3692 return 0; 3693 } 3694 3695 pfn_result = (struct brcmf_pno_scanresults_le *)data; 3696 3697 if (e->event_code == BRCMF_E_PFN_NET_LOST) { 3698 brcmf_dbg(SCAN, "PFN NET LOST event. Ignore\n"); 3699 return 0; 3700 } 3701 3702 if (le32_to_cpu(pfn_result->count) < 1) { 3703 bphy_err(drvr, "Invalid result count, expected 1 (%d)\n", 3704 le32_to_cpu(pfn_result->count)); 3705 return -EINVAL; 3706 } 3707 3708 netinfo = brcmf_get_netinfo_array(pfn_result); 3709 if (netinfo->SSID_len > IEEE80211_MAX_SSID_LEN) 3710 netinfo->SSID_len = IEEE80211_MAX_SSID_LEN; 3711 memcpy(cfg->wowl.nd->ssid.ssid, netinfo->SSID, netinfo->SSID_len); 3712 cfg->wowl.nd->ssid.ssid_len = netinfo->SSID_len; 3713 cfg->wowl.nd->n_channels = 1; 3714 cfg->wowl.nd->channels[0] = 3715 ieee80211_channel_to_frequency(netinfo->channel, 3716 netinfo->channel <= CH_MAX_2G_CHANNEL ? 3717 NL80211_BAND_2GHZ : NL80211_BAND_5GHZ); 3718 cfg->wowl.nd_info->n_matches = 1; 3719 cfg->wowl.nd_info->matches[0] = cfg->wowl.nd; 3720 3721 /* Inform (the resume task) that the net detect information was recvd */ 3722 cfg->wowl.nd_data_completed = true; 3723 wake_up(&cfg->wowl.nd_data_wait); 3724 3725 return 0; 3726 } 3727 3728 #ifdef CONFIG_PM 3729 3730 static void brcmf_report_wowl_wakeind(struct wiphy *wiphy, struct brcmf_if *ifp) 3731 { 3732 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 3733 struct brcmf_pub *drvr = cfg->pub; 3734 struct brcmf_wowl_wakeind_le wake_ind_le; 3735 struct cfg80211_wowlan_wakeup wakeup_data; 3736 struct cfg80211_wowlan_wakeup *wakeup; 3737 u32 wakeind; 3738 s32 err; 3739 int timeout; 3740 3741 err = brcmf_fil_iovar_data_get(ifp, "wowl_wakeind", &wake_ind_le, 3742 sizeof(wake_ind_le)); 3743 if (err) { 3744 bphy_err(drvr, "Get wowl_wakeind failed, err = %d\n", err); 3745 return; 3746 } 3747 3748 wakeind = le32_to_cpu(wake_ind_le.ucode_wakeind); 3749 if (wakeind & (BRCMF_WOWL_MAGIC | BRCMF_WOWL_DIS | BRCMF_WOWL_BCN | 3750 BRCMF_WOWL_RETR | BRCMF_WOWL_NET | 3751 BRCMF_WOWL_PFN_FOUND)) { 3752 wakeup = &wakeup_data; 3753 memset(&wakeup_data, 0, sizeof(wakeup_data)); 3754 wakeup_data.pattern_idx = -1; 3755 3756 if (wakeind & BRCMF_WOWL_MAGIC) { 3757 brcmf_dbg(INFO, "WOWL Wake indicator: BRCMF_WOWL_MAGIC\n"); 3758 wakeup_data.magic_pkt = true; 3759 } 3760 if (wakeind & BRCMF_WOWL_DIS) { 3761 brcmf_dbg(INFO, "WOWL Wake indicator: BRCMF_WOWL_DIS\n"); 3762 wakeup_data.disconnect = true; 3763 } 3764 if (wakeind & BRCMF_WOWL_BCN) { 3765 brcmf_dbg(INFO, "WOWL Wake indicator: BRCMF_WOWL_BCN\n"); 3766 wakeup_data.disconnect = true; 3767 } 3768 if (wakeind & BRCMF_WOWL_RETR) { 3769 brcmf_dbg(INFO, "WOWL Wake indicator: BRCMF_WOWL_RETR\n"); 3770 wakeup_data.disconnect = true; 3771 } 3772 if (wakeind & BRCMF_WOWL_NET) { 3773 brcmf_dbg(INFO, "WOWL Wake indicator: BRCMF_WOWL_NET\n"); 3774 /* For now always map to pattern 0, no API to get 3775 * correct information available at the moment. 3776 */ 3777 wakeup_data.pattern_idx = 0; 3778 } 3779 if (wakeind & BRCMF_WOWL_PFN_FOUND) { 3780 brcmf_dbg(INFO, "WOWL Wake indicator: BRCMF_WOWL_PFN_FOUND\n"); 3781 timeout = wait_event_timeout(cfg->wowl.nd_data_wait, 3782 cfg->wowl.nd_data_completed, 3783 BRCMF_ND_INFO_TIMEOUT); 3784 if (!timeout) 3785 bphy_err(drvr, "No result for wowl net detect\n"); 3786 else 3787 wakeup_data.net_detect = cfg->wowl.nd_info; 3788 } 3789 if (wakeind & BRCMF_WOWL_GTK_FAILURE) { 3790 brcmf_dbg(INFO, "WOWL Wake indicator: BRCMF_WOWL_GTK_FAILURE\n"); 3791 wakeup_data.gtk_rekey_failure = true; 3792 } 3793 } else { 3794 wakeup = NULL; 3795 } 3796 cfg80211_report_wowlan_wakeup(&ifp->vif->wdev, wakeup, GFP_KERNEL); 3797 } 3798 3799 #else 3800 3801 static void brcmf_report_wowl_wakeind(struct wiphy *wiphy, struct brcmf_if *ifp) 3802 { 3803 } 3804 3805 #endif /* CONFIG_PM */ 3806 3807 static s32 brcmf_cfg80211_resume(struct wiphy *wiphy) 3808 { 3809 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 3810 struct net_device *ndev = cfg_to_ndev(cfg); 3811 struct brcmf_if *ifp = netdev_priv(ndev); 3812 3813 brcmf_dbg(TRACE, "Enter\n"); 3814 3815 if (cfg->wowl.active) { 3816 brcmf_report_wowl_wakeind(wiphy, ifp); 3817 brcmf_fil_iovar_int_set(ifp, "wowl_clear", 0); 3818 brcmf_config_wowl_pattern(ifp, "clr", NULL, 0, NULL, 0); 3819 if (!brcmf_feat_is_enabled(ifp, BRCMF_FEAT_WOWL_ARP_ND)) 3820 brcmf_configure_arp_nd_offload(ifp, true); 3821 brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_PM, 3822 cfg->wowl.pre_pmmode); 3823 cfg->wowl.active = false; 3824 if (cfg->wowl.nd_enabled) { 3825 brcmf_cfg80211_sched_scan_stop(cfg->wiphy, ifp->ndev, 0); 3826 brcmf_fweh_unregister(cfg->pub, BRCMF_E_PFN_NET_FOUND); 3827 brcmf_fweh_register(cfg->pub, BRCMF_E_PFN_NET_FOUND, 3828 brcmf_notify_sched_scan_results); 3829 cfg->wowl.nd_enabled = false; 3830 } 3831 } 3832 return 0; 3833 } 3834 3835 static void brcmf_configure_wowl(struct brcmf_cfg80211_info *cfg, 3836 struct brcmf_if *ifp, 3837 struct cfg80211_wowlan *wowl) 3838 { 3839 u32 wowl_config; 3840 struct brcmf_wowl_wakeind_le wowl_wakeind; 3841 u32 i; 3842 3843 brcmf_dbg(TRACE, "Suspend, wowl config.\n"); 3844 3845 if (!brcmf_feat_is_enabled(ifp, BRCMF_FEAT_WOWL_ARP_ND)) 3846 brcmf_configure_arp_nd_offload(ifp, false); 3847 brcmf_fil_cmd_int_get(ifp, BRCMF_C_GET_PM, &cfg->wowl.pre_pmmode); 3848 brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_PM, PM_MAX); 3849 3850 wowl_config = 0; 3851 if (wowl->disconnect) 3852 wowl_config = BRCMF_WOWL_DIS | BRCMF_WOWL_BCN | BRCMF_WOWL_RETR; 3853 if (wowl->magic_pkt) 3854 wowl_config |= BRCMF_WOWL_MAGIC; 3855 if ((wowl->patterns) && (wowl->n_patterns)) { 3856 wowl_config |= BRCMF_WOWL_NET; 3857 for (i = 0; i < wowl->n_patterns; i++) { 3858 brcmf_config_wowl_pattern(ifp, "add", 3859 (u8 *)wowl->patterns[i].pattern, 3860 wowl->patterns[i].pattern_len, 3861 (u8 *)wowl->patterns[i].mask, 3862 wowl->patterns[i].pkt_offset); 3863 } 3864 } 3865 if (wowl->nd_config) { 3866 brcmf_cfg80211_sched_scan_start(cfg->wiphy, ifp->ndev, 3867 wowl->nd_config); 3868 wowl_config |= BRCMF_WOWL_PFN_FOUND; 3869 3870 cfg->wowl.nd_data_completed = false; 3871 cfg->wowl.nd_enabled = true; 3872 /* Now reroute the event for PFN to the wowl function. */ 3873 brcmf_fweh_unregister(cfg->pub, BRCMF_E_PFN_NET_FOUND); 3874 brcmf_fweh_register(cfg->pub, BRCMF_E_PFN_NET_FOUND, 3875 brcmf_wowl_nd_results); 3876 } 3877 if (wowl->gtk_rekey_failure) 3878 wowl_config |= BRCMF_WOWL_GTK_FAILURE; 3879 if (!test_bit(BRCMF_VIF_STATUS_CONNECTED, &ifp->vif->sme_state)) 3880 wowl_config |= BRCMF_WOWL_UNASSOC; 3881 3882 memcpy(&wowl_wakeind, "clear", 6); 3883 brcmf_fil_iovar_data_set(ifp, "wowl_wakeind", &wowl_wakeind, 3884 sizeof(wowl_wakeind)); 3885 brcmf_fil_iovar_int_set(ifp, "wowl", wowl_config); 3886 brcmf_fil_iovar_int_set(ifp, "wowl_activate", 1); 3887 brcmf_bus_wowl_config(cfg->pub->bus_if, true); 3888 cfg->wowl.active = true; 3889 } 3890 3891 static s32 brcmf_cfg80211_suspend(struct wiphy *wiphy, 3892 struct cfg80211_wowlan *wowl) 3893 { 3894 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 3895 struct net_device *ndev = cfg_to_ndev(cfg); 3896 struct brcmf_if *ifp = netdev_priv(ndev); 3897 struct brcmf_cfg80211_vif *vif; 3898 3899 brcmf_dbg(TRACE, "Enter\n"); 3900 3901 /* if the primary net_device is not READY there is nothing 3902 * we can do but pray resume goes smoothly. 3903 */ 3904 if (!check_vif_up(ifp->vif)) 3905 goto exit; 3906 3907 /* Stop scheduled scan */ 3908 if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_PNO)) 3909 brcmf_cfg80211_sched_scan_stop(wiphy, ndev, 0); 3910 3911 /* end any scanning */ 3912 if (test_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status)) 3913 brcmf_abort_scanning(cfg); 3914 3915 if (wowl == NULL) { 3916 brcmf_bus_wowl_config(cfg->pub->bus_if, false); 3917 list_for_each_entry(vif, &cfg->vif_list, list) { 3918 if (!test_bit(BRCMF_VIF_STATUS_READY, &vif->sme_state)) 3919 continue; 3920 /* While going to suspend if associated with AP 3921 * disassociate from AP to save power while system is 3922 * in suspended state 3923 */ 3924 brcmf_link_down(vif, WLAN_REASON_UNSPECIFIED, true); 3925 /* Make sure WPA_Supplicant receives all the event 3926 * generated due to DISASSOC call to the fw to keep 3927 * the state fw and WPA_Supplicant state consistent 3928 */ 3929 brcmf_delay(500); 3930 } 3931 /* Configure MPC */ 3932 brcmf_set_mpc(ifp, 1); 3933 3934 } else { 3935 /* Configure WOWL paramaters */ 3936 brcmf_configure_wowl(cfg, ifp, wowl); 3937 } 3938 3939 exit: 3940 brcmf_dbg(TRACE, "Exit\n"); 3941 /* clear any scanning activity */ 3942 cfg->scan_status = 0; 3943 return 0; 3944 } 3945 3946 static __used s32 3947 brcmf_update_pmklist(struct brcmf_cfg80211_info *cfg, struct brcmf_if *ifp) 3948 { 3949 struct brcmf_pmk_list_le *pmk_list; 3950 int i; 3951 u32 npmk; 3952 s32 err; 3953 3954 pmk_list = &cfg->pmk_list; 3955 npmk = le32_to_cpu(pmk_list->npmk); 3956 3957 brcmf_dbg(CONN, "No of elements %d\n", npmk); 3958 for (i = 0; i < npmk; i++) 3959 brcmf_dbg(CONN, "PMK[%d]: %pM\n", i, &pmk_list->pmk[i].bssid); 3960 3961 err = brcmf_fil_iovar_data_set(ifp, "pmkid_info", pmk_list, 3962 sizeof(*pmk_list)); 3963 3964 return err; 3965 } 3966 3967 static s32 3968 brcmf_cfg80211_set_pmksa(struct wiphy *wiphy, struct net_device *ndev, 3969 struct cfg80211_pmksa *pmksa) 3970 { 3971 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 3972 struct brcmf_if *ifp = netdev_priv(ndev); 3973 struct brcmf_pmksa *pmk = &cfg->pmk_list.pmk[0]; 3974 struct brcmf_pub *drvr = cfg->pub; 3975 s32 err; 3976 u32 npmk, i; 3977 3978 brcmf_dbg(TRACE, "Enter\n"); 3979 if (!check_vif_up(ifp->vif)) 3980 return -EIO; 3981 3982 npmk = le32_to_cpu(cfg->pmk_list.npmk); 3983 for (i = 0; i < npmk; i++) 3984 if (!memcmp(pmksa->bssid, pmk[i].bssid, ETH_ALEN)) 3985 break; 3986 if (i < BRCMF_MAXPMKID) { 3987 memcpy(pmk[i].bssid, pmksa->bssid, ETH_ALEN); 3988 memcpy(pmk[i].pmkid, pmksa->pmkid, WLAN_PMKID_LEN); 3989 if (i == npmk) { 3990 npmk++; 3991 cfg->pmk_list.npmk = cpu_to_le32(npmk); 3992 } 3993 } else { 3994 bphy_err(drvr, "Too many PMKSA entries cached %d\n", npmk); 3995 return -EINVAL; 3996 } 3997 3998 brcmf_dbg(CONN, "set_pmksa - PMK bssid: %pM =\n", pmk[npmk].bssid); 3999 brcmf_dbg(CONN, "%*ph\n", WLAN_PMKID_LEN, pmk[npmk].pmkid); 4000 4001 err = brcmf_update_pmklist(cfg, ifp); 4002 4003 brcmf_dbg(TRACE, "Exit\n"); 4004 return err; 4005 } 4006 4007 static s32 4008 brcmf_cfg80211_del_pmksa(struct wiphy *wiphy, struct net_device *ndev, 4009 struct cfg80211_pmksa *pmksa) 4010 { 4011 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 4012 struct brcmf_if *ifp = netdev_priv(ndev); 4013 struct brcmf_pmksa *pmk = &cfg->pmk_list.pmk[0]; 4014 struct brcmf_pub *drvr = cfg->pub; 4015 s32 err; 4016 u32 npmk, i; 4017 4018 brcmf_dbg(TRACE, "Enter\n"); 4019 if (!check_vif_up(ifp->vif)) 4020 return -EIO; 4021 4022 brcmf_dbg(CONN, "del_pmksa - PMK bssid = %pM\n", pmksa->bssid); 4023 4024 npmk = le32_to_cpu(cfg->pmk_list.npmk); 4025 for (i = 0; i < npmk; i++) 4026 if (!memcmp(pmksa->bssid, pmk[i].bssid, ETH_ALEN)) 4027 break; 4028 4029 if ((npmk > 0) && (i < npmk)) { 4030 for (; i < (npmk - 1); i++) { 4031 memcpy(&pmk[i].bssid, &pmk[i + 1].bssid, ETH_ALEN); 4032 memcpy(&pmk[i].pmkid, &pmk[i + 1].pmkid, 4033 WLAN_PMKID_LEN); 4034 } 4035 memset(&pmk[i], 0, sizeof(*pmk)); 4036 cfg->pmk_list.npmk = cpu_to_le32(npmk - 1); 4037 } else { 4038 bphy_err(drvr, "Cache entry not found\n"); 4039 return -EINVAL; 4040 } 4041 4042 err = brcmf_update_pmklist(cfg, ifp); 4043 4044 brcmf_dbg(TRACE, "Exit\n"); 4045 return err; 4046 4047 } 4048 4049 static s32 4050 brcmf_cfg80211_flush_pmksa(struct wiphy *wiphy, struct net_device *ndev) 4051 { 4052 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 4053 struct brcmf_if *ifp = netdev_priv(ndev); 4054 s32 err; 4055 4056 brcmf_dbg(TRACE, "Enter\n"); 4057 if (!check_vif_up(ifp->vif)) 4058 return -EIO; 4059 4060 memset(&cfg->pmk_list, 0, sizeof(cfg->pmk_list)); 4061 err = brcmf_update_pmklist(cfg, ifp); 4062 4063 brcmf_dbg(TRACE, "Exit\n"); 4064 return err; 4065 4066 } 4067 4068 static s32 brcmf_configure_opensecurity(struct brcmf_if *ifp) 4069 { 4070 struct brcmf_pub *drvr = ifp->drvr; 4071 s32 err; 4072 s32 wpa_val; 4073 4074 /* set auth */ 4075 err = brcmf_fil_bsscfg_int_set(ifp, "auth", 0); 4076 if (err < 0) { 4077 bphy_err(drvr, "auth error %d\n", err); 4078 return err; 4079 } 4080 /* set wsec */ 4081 err = brcmf_fil_bsscfg_int_set(ifp, "wsec", 0); 4082 if (err < 0) { 4083 bphy_err(drvr, "wsec error %d\n", err); 4084 return err; 4085 } 4086 /* set upper-layer auth */ 4087 if (brcmf_is_ibssmode(ifp->vif)) 4088 wpa_val = WPA_AUTH_NONE; 4089 else 4090 wpa_val = WPA_AUTH_DISABLED; 4091 err = brcmf_fil_bsscfg_int_set(ifp, "wpa_auth", wpa_val); 4092 if (err < 0) { 4093 bphy_err(drvr, "wpa_auth error %d\n", err); 4094 return err; 4095 } 4096 4097 return 0; 4098 } 4099 4100 static bool brcmf_valid_wpa_oui(u8 *oui, bool is_rsn_ie) 4101 { 4102 if (is_rsn_ie) 4103 return (memcmp(oui, RSN_OUI, TLV_OUI_LEN) == 0); 4104 4105 return (memcmp(oui, WPA_OUI, TLV_OUI_LEN) == 0); 4106 } 4107 4108 static s32 4109 brcmf_configure_wpaie(struct brcmf_if *ifp, 4110 const struct brcmf_vs_tlv *wpa_ie, 4111 bool is_rsn_ie) 4112 { 4113 struct brcmf_pub *drvr = ifp->drvr; 4114 u32 auth = 0; /* d11 open authentication */ 4115 u16 count; 4116 s32 err = 0; 4117 s32 len; 4118 u32 i; 4119 u32 wsec; 4120 u32 pval = 0; 4121 u32 gval = 0; 4122 u32 wpa_auth = 0; 4123 u32 offset; 4124 u8 *data; 4125 u16 rsn_cap; 4126 u32 wme_bss_disable; 4127 u32 mfp; 4128 4129 brcmf_dbg(TRACE, "Enter\n"); 4130 if (wpa_ie == NULL) 4131 goto exit; 4132 4133 len = wpa_ie->len + TLV_HDR_LEN; 4134 data = (u8 *)wpa_ie; 4135 offset = TLV_HDR_LEN; 4136 if (!is_rsn_ie) 4137 offset += VS_IE_FIXED_HDR_LEN; 4138 else 4139 offset += WPA_IE_VERSION_LEN; 4140 4141 /* check for multicast cipher suite */ 4142 if (offset + WPA_IE_MIN_OUI_LEN > len) { 4143 err = -EINVAL; 4144 bphy_err(drvr, "no multicast cipher suite\n"); 4145 goto exit; 4146 } 4147 4148 if (!brcmf_valid_wpa_oui(&data[offset], is_rsn_ie)) { 4149 err = -EINVAL; 4150 bphy_err(drvr, "ivalid OUI\n"); 4151 goto exit; 4152 } 4153 offset += TLV_OUI_LEN; 4154 4155 /* pick up multicast cipher */ 4156 switch (data[offset]) { 4157 case WPA_CIPHER_NONE: 4158 gval = 0; 4159 break; 4160 case WPA_CIPHER_WEP_40: 4161 case WPA_CIPHER_WEP_104: 4162 gval = WEP_ENABLED; 4163 break; 4164 case WPA_CIPHER_TKIP: 4165 gval = TKIP_ENABLED; 4166 break; 4167 case WPA_CIPHER_AES_CCM: 4168 gval = AES_ENABLED; 4169 break; 4170 default: 4171 err = -EINVAL; 4172 bphy_err(drvr, "Invalid multi cast cipher info\n"); 4173 goto exit; 4174 } 4175 4176 offset++; 4177 /* walk thru unicast cipher list and pick up what we recognize */ 4178 count = data[offset] + (data[offset + 1] << 8); 4179 offset += WPA_IE_SUITE_COUNT_LEN; 4180 /* Check for unicast suite(s) */ 4181 if (offset + (WPA_IE_MIN_OUI_LEN * count) > len) { 4182 err = -EINVAL; 4183 bphy_err(drvr, "no unicast cipher suite\n"); 4184 goto exit; 4185 } 4186 for (i = 0; i < count; i++) { 4187 if (!brcmf_valid_wpa_oui(&data[offset], is_rsn_ie)) { 4188 err = -EINVAL; 4189 bphy_err(drvr, "ivalid OUI\n"); 4190 goto exit; 4191 } 4192 offset += TLV_OUI_LEN; 4193 switch (data[offset]) { 4194 case WPA_CIPHER_NONE: 4195 break; 4196 case WPA_CIPHER_WEP_40: 4197 case WPA_CIPHER_WEP_104: 4198 pval |= WEP_ENABLED; 4199 break; 4200 case WPA_CIPHER_TKIP: 4201 pval |= TKIP_ENABLED; 4202 break; 4203 case WPA_CIPHER_AES_CCM: 4204 pval |= AES_ENABLED; 4205 break; 4206 default: 4207 bphy_err(drvr, "Invalid unicast security info\n"); 4208 } 4209 offset++; 4210 } 4211 /* walk thru auth management suite list and pick up what we recognize */ 4212 count = data[offset] + (data[offset + 1] << 8); 4213 offset += WPA_IE_SUITE_COUNT_LEN; 4214 /* Check for auth key management suite(s) */ 4215 if (offset + (WPA_IE_MIN_OUI_LEN * count) > len) { 4216 err = -EINVAL; 4217 bphy_err(drvr, "no auth key mgmt suite\n"); 4218 goto exit; 4219 } 4220 for (i = 0; i < count; i++) { 4221 if (!brcmf_valid_wpa_oui(&data[offset], is_rsn_ie)) { 4222 err = -EINVAL; 4223 bphy_err(drvr, "ivalid OUI\n"); 4224 goto exit; 4225 } 4226 offset += TLV_OUI_LEN; 4227 switch (data[offset]) { 4228 case RSN_AKM_NONE: 4229 brcmf_dbg(TRACE, "RSN_AKM_NONE\n"); 4230 wpa_auth |= WPA_AUTH_NONE; 4231 break; 4232 case RSN_AKM_UNSPECIFIED: 4233 brcmf_dbg(TRACE, "RSN_AKM_UNSPECIFIED\n"); 4234 is_rsn_ie ? (wpa_auth |= WPA2_AUTH_UNSPECIFIED) : 4235 (wpa_auth |= WPA_AUTH_UNSPECIFIED); 4236 break; 4237 case RSN_AKM_PSK: 4238 brcmf_dbg(TRACE, "RSN_AKM_PSK\n"); 4239 is_rsn_ie ? (wpa_auth |= WPA2_AUTH_PSK) : 4240 (wpa_auth |= WPA_AUTH_PSK); 4241 break; 4242 case RSN_AKM_SHA256_PSK: 4243 brcmf_dbg(TRACE, "RSN_AKM_MFP_PSK\n"); 4244 wpa_auth |= WPA2_AUTH_PSK_SHA256; 4245 break; 4246 case RSN_AKM_SHA256_1X: 4247 brcmf_dbg(TRACE, "RSN_AKM_MFP_1X\n"); 4248 wpa_auth |= WPA2_AUTH_1X_SHA256; 4249 break; 4250 case RSN_AKM_SAE: 4251 brcmf_dbg(TRACE, "RSN_AKM_SAE\n"); 4252 wpa_auth |= WPA3_AUTH_SAE_PSK; 4253 break; 4254 default: 4255 bphy_err(drvr, "Invalid key mgmt info\n"); 4256 } 4257 offset++; 4258 } 4259 4260 mfp = BRCMF_MFP_NONE; 4261 if (is_rsn_ie) { 4262 wme_bss_disable = 1; 4263 if ((offset + RSN_CAP_LEN) <= len) { 4264 rsn_cap = data[offset] + (data[offset + 1] << 8); 4265 if (rsn_cap & RSN_CAP_PTK_REPLAY_CNTR_MASK) 4266 wme_bss_disable = 0; 4267 if (rsn_cap & RSN_CAP_MFPR_MASK) { 4268 brcmf_dbg(TRACE, "MFP Required\n"); 4269 mfp = BRCMF_MFP_REQUIRED; 4270 /* Firmware only supports mfp required in 4271 * combination with WPA2_AUTH_PSK_SHA256, 4272 * WPA2_AUTH_1X_SHA256, or WPA3_AUTH_SAE_PSK. 4273 */ 4274 if (!(wpa_auth & (WPA2_AUTH_PSK_SHA256 | 4275 WPA2_AUTH_1X_SHA256 | 4276 WPA3_AUTH_SAE_PSK))) { 4277 err = -EINVAL; 4278 goto exit; 4279 } 4280 /* Firmware has requirement that WPA2_AUTH_PSK/ 4281 * WPA2_AUTH_UNSPECIFIED be set, if SHA256 OUI 4282 * is to be included in the rsn ie. 4283 */ 4284 if (wpa_auth & WPA2_AUTH_PSK_SHA256) 4285 wpa_auth |= WPA2_AUTH_PSK; 4286 else if (wpa_auth & WPA2_AUTH_1X_SHA256) 4287 wpa_auth |= WPA2_AUTH_UNSPECIFIED; 4288 } else if (rsn_cap & RSN_CAP_MFPC_MASK) { 4289 brcmf_dbg(TRACE, "MFP Capable\n"); 4290 mfp = BRCMF_MFP_CAPABLE; 4291 } 4292 } 4293 offset += RSN_CAP_LEN; 4294 /* set wme_bss_disable to sync RSN Capabilities */ 4295 err = brcmf_fil_bsscfg_int_set(ifp, "wme_bss_disable", 4296 wme_bss_disable); 4297 if (err < 0) { 4298 bphy_err(drvr, "wme_bss_disable error %d\n", err); 4299 goto exit; 4300 } 4301 4302 /* Skip PMKID cnt as it is know to be 0 for AP. */ 4303 offset += RSN_PMKID_COUNT_LEN; 4304 4305 /* See if there is BIP wpa suite left for MFP */ 4306 if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MFP) && 4307 ((offset + WPA_IE_MIN_OUI_LEN) <= len)) { 4308 err = brcmf_fil_bsscfg_data_set(ifp, "bip", 4309 &data[offset], 4310 WPA_IE_MIN_OUI_LEN); 4311 if (err < 0) { 4312 bphy_err(drvr, "bip error %d\n", err); 4313 goto exit; 4314 } 4315 } 4316 } 4317 /* FOR WPS , set SES_OW_ENABLED */ 4318 wsec = (pval | gval | SES_OW_ENABLED); 4319 4320 /* set auth */ 4321 err = brcmf_fil_bsscfg_int_set(ifp, "auth", auth); 4322 if (err < 0) { 4323 bphy_err(drvr, "auth error %d\n", err); 4324 goto exit; 4325 } 4326 /* set wsec */ 4327 err = brcmf_fil_bsscfg_int_set(ifp, "wsec", wsec); 4328 if (err < 0) { 4329 bphy_err(drvr, "wsec error %d\n", err); 4330 goto exit; 4331 } 4332 /* Configure MFP, this needs to go after wsec otherwise the wsec command 4333 * will overwrite the values set by MFP 4334 */ 4335 if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MFP)) { 4336 err = brcmf_fil_bsscfg_int_set(ifp, "mfp", mfp); 4337 if (err < 0) { 4338 bphy_err(drvr, "mfp error %d\n", err); 4339 goto exit; 4340 } 4341 } 4342 /* set upper-layer auth */ 4343 err = brcmf_fil_bsscfg_int_set(ifp, "wpa_auth", wpa_auth); 4344 if (err < 0) { 4345 bphy_err(drvr, "wpa_auth error %d\n", err); 4346 goto exit; 4347 } 4348 4349 exit: 4350 return err; 4351 } 4352 4353 static s32 4354 brcmf_parse_vndr_ies(const u8 *vndr_ie_buf, u32 vndr_ie_len, 4355 struct parsed_vndr_ies *vndr_ies) 4356 { 4357 struct brcmf_vs_tlv *vndrie; 4358 struct brcmf_tlv *ie; 4359 struct parsed_vndr_ie_info *parsed_info; 4360 s32 remaining_len; 4361 4362 remaining_len = (s32)vndr_ie_len; 4363 memset(vndr_ies, 0, sizeof(*vndr_ies)); 4364 4365 ie = (struct brcmf_tlv *)vndr_ie_buf; 4366 while (ie) { 4367 if (ie->id != WLAN_EID_VENDOR_SPECIFIC) 4368 goto next; 4369 vndrie = (struct brcmf_vs_tlv *)ie; 4370 /* len should be bigger than OUI length + one */ 4371 if (vndrie->len < (VS_IE_FIXED_HDR_LEN - TLV_HDR_LEN + 1)) { 4372 brcmf_err("invalid vndr ie. length is too small %d\n", 4373 vndrie->len); 4374 goto next; 4375 } 4376 /* if wpa or wme ie, do not add ie */ 4377 if (!memcmp(vndrie->oui, (u8 *)WPA_OUI, TLV_OUI_LEN) && 4378 ((vndrie->oui_type == WPA_OUI_TYPE) || 4379 (vndrie->oui_type == WME_OUI_TYPE))) { 4380 brcmf_dbg(TRACE, "Found WPA/WME oui. Do not add it\n"); 4381 goto next; 4382 } 4383 4384 parsed_info = &vndr_ies->ie_info[vndr_ies->count]; 4385 4386 /* save vndr ie information */ 4387 parsed_info->ie_ptr = (char *)vndrie; 4388 parsed_info->ie_len = vndrie->len + TLV_HDR_LEN; 4389 memcpy(&parsed_info->vndrie, vndrie, sizeof(*vndrie)); 4390 4391 vndr_ies->count++; 4392 4393 brcmf_dbg(TRACE, "** OUI %3ph, type 0x%02x\n", 4394 parsed_info->vndrie.oui, 4395 parsed_info->vndrie.oui_type); 4396 4397 if (vndr_ies->count >= VNDR_IE_PARSE_LIMIT) 4398 break; 4399 next: 4400 remaining_len -= (ie->len + TLV_HDR_LEN); 4401 if (remaining_len <= TLV_HDR_LEN) 4402 ie = NULL; 4403 else 4404 ie = (struct brcmf_tlv *)(((u8 *)ie) + ie->len + 4405 TLV_HDR_LEN); 4406 } 4407 return 0; 4408 } 4409 4410 static u32 4411 brcmf_vndr_ie(u8 *iebuf, s32 pktflag, u8 *ie_ptr, u32 ie_len, s8 *add_del_cmd) 4412 { 4413 strscpy(iebuf, add_del_cmd, VNDR_IE_CMD_LEN); 4414 4415 put_unaligned_le32(1, &iebuf[VNDR_IE_COUNT_OFFSET]); 4416 4417 put_unaligned_le32(pktflag, &iebuf[VNDR_IE_PKTFLAG_OFFSET]); 4418 4419 memcpy(&iebuf[VNDR_IE_VSIE_OFFSET], ie_ptr, ie_len); 4420 4421 return ie_len + VNDR_IE_HDR_SIZE; 4422 } 4423 4424 s32 brcmf_vif_set_mgmt_ie(struct brcmf_cfg80211_vif *vif, s32 pktflag, 4425 const u8 *vndr_ie_buf, u32 vndr_ie_len) 4426 { 4427 struct brcmf_pub *drvr; 4428 struct brcmf_if *ifp; 4429 struct vif_saved_ie *saved_ie; 4430 s32 err = 0; 4431 u8 *iovar_ie_buf; 4432 u8 *curr_ie_buf; 4433 u8 *mgmt_ie_buf = NULL; 4434 int mgmt_ie_buf_len; 4435 u32 *mgmt_ie_len; 4436 u32 del_add_ie_buf_len = 0; 4437 u32 total_ie_buf_len = 0; 4438 u32 parsed_ie_buf_len = 0; 4439 struct parsed_vndr_ies old_vndr_ies; 4440 struct parsed_vndr_ies new_vndr_ies; 4441 struct parsed_vndr_ie_info *vndrie_info; 4442 s32 i; 4443 u8 *ptr; 4444 int remained_buf_len; 4445 4446 if (!vif) 4447 return -ENODEV; 4448 ifp = vif->ifp; 4449 drvr = ifp->drvr; 4450 saved_ie = &vif->saved_ie; 4451 4452 brcmf_dbg(TRACE, "bsscfgidx %d, pktflag : 0x%02X\n", ifp->bsscfgidx, 4453 pktflag); 4454 iovar_ie_buf = kzalloc(WL_EXTRA_BUF_MAX, GFP_KERNEL); 4455 if (!iovar_ie_buf) 4456 return -ENOMEM; 4457 curr_ie_buf = iovar_ie_buf; 4458 switch (pktflag) { 4459 case BRCMF_VNDR_IE_PRBREQ_FLAG: 4460 mgmt_ie_buf = saved_ie->probe_req_ie; 4461 mgmt_ie_len = &saved_ie->probe_req_ie_len; 4462 mgmt_ie_buf_len = sizeof(saved_ie->probe_req_ie); 4463 break; 4464 case BRCMF_VNDR_IE_PRBRSP_FLAG: 4465 mgmt_ie_buf = saved_ie->probe_res_ie; 4466 mgmt_ie_len = &saved_ie->probe_res_ie_len; 4467 mgmt_ie_buf_len = sizeof(saved_ie->probe_res_ie); 4468 break; 4469 case BRCMF_VNDR_IE_BEACON_FLAG: 4470 mgmt_ie_buf = saved_ie->beacon_ie; 4471 mgmt_ie_len = &saved_ie->beacon_ie_len; 4472 mgmt_ie_buf_len = sizeof(saved_ie->beacon_ie); 4473 break; 4474 case BRCMF_VNDR_IE_ASSOCREQ_FLAG: 4475 mgmt_ie_buf = saved_ie->assoc_req_ie; 4476 mgmt_ie_len = &saved_ie->assoc_req_ie_len; 4477 mgmt_ie_buf_len = sizeof(saved_ie->assoc_req_ie); 4478 break; 4479 case BRCMF_VNDR_IE_ASSOCRSP_FLAG: 4480 mgmt_ie_buf = saved_ie->assoc_res_ie; 4481 mgmt_ie_len = &saved_ie->assoc_res_ie_len; 4482 mgmt_ie_buf_len = sizeof(saved_ie->assoc_res_ie); 4483 break; 4484 default: 4485 err = -EPERM; 4486 bphy_err(drvr, "not suitable type\n"); 4487 goto exit; 4488 } 4489 4490 if (vndr_ie_len > mgmt_ie_buf_len) { 4491 err = -ENOMEM; 4492 bphy_err(drvr, "extra IE size too big\n"); 4493 goto exit; 4494 } 4495 4496 /* parse and save new vndr_ie in curr_ie_buff before comparing it */ 4497 if (vndr_ie_buf && vndr_ie_len && curr_ie_buf) { 4498 ptr = curr_ie_buf; 4499 brcmf_parse_vndr_ies(vndr_ie_buf, vndr_ie_len, &new_vndr_ies); 4500 for (i = 0; i < new_vndr_ies.count; i++) { 4501 vndrie_info = &new_vndr_ies.ie_info[i]; 4502 memcpy(ptr + parsed_ie_buf_len, vndrie_info->ie_ptr, 4503 vndrie_info->ie_len); 4504 parsed_ie_buf_len += vndrie_info->ie_len; 4505 } 4506 } 4507 4508 if (mgmt_ie_buf && *mgmt_ie_len) { 4509 if (parsed_ie_buf_len && (parsed_ie_buf_len == *mgmt_ie_len) && 4510 (memcmp(mgmt_ie_buf, curr_ie_buf, 4511 parsed_ie_buf_len) == 0)) { 4512 brcmf_dbg(TRACE, "Previous mgmt IE equals to current IE\n"); 4513 goto exit; 4514 } 4515 4516 /* parse old vndr_ie */ 4517 brcmf_parse_vndr_ies(mgmt_ie_buf, *mgmt_ie_len, &old_vndr_ies); 4518 4519 /* make a command to delete old ie */ 4520 for (i = 0; i < old_vndr_ies.count; i++) { 4521 vndrie_info = &old_vndr_ies.ie_info[i]; 4522 4523 brcmf_dbg(TRACE, "DEL ID : %d, Len: %d , OUI:%3ph\n", 4524 vndrie_info->vndrie.id, 4525 vndrie_info->vndrie.len, 4526 vndrie_info->vndrie.oui); 4527 4528 del_add_ie_buf_len = brcmf_vndr_ie(curr_ie_buf, pktflag, 4529 vndrie_info->ie_ptr, 4530 vndrie_info->ie_len, 4531 "del"); 4532 curr_ie_buf += del_add_ie_buf_len; 4533 total_ie_buf_len += del_add_ie_buf_len; 4534 } 4535 } 4536 4537 *mgmt_ie_len = 0; 4538 /* Add if there is any extra IE */ 4539 if (mgmt_ie_buf && parsed_ie_buf_len) { 4540 ptr = mgmt_ie_buf; 4541 4542 remained_buf_len = mgmt_ie_buf_len; 4543 4544 /* make a command to add new ie */ 4545 for (i = 0; i < new_vndr_ies.count; i++) { 4546 vndrie_info = &new_vndr_ies.ie_info[i]; 4547 4548 /* verify remained buf size before copy data */ 4549 if (remained_buf_len < (vndrie_info->vndrie.len + 4550 VNDR_IE_VSIE_OFFSET)) { 4551 bphy_err(drvr, "no space in mgmt_ie_buf: len left %d", 4552 remained_buf_len); 4553 break; 4554 } 4555 remained_buf_len -= (vndrie_info->ie_len + 4556 VNDR_IE_VSIE_OFFSET); 4557 4558 brcmf_dbg(TRACE, "ADDED ID : %d, Len: %d, OUI:%3ph\n", 4559 vndrie_info->vndrie.id, 4560 vndrie_info->vndrie.len, 4561 vndrie_info->vndrie.oui); 4562 4563 del_add_ie_buf_len = brcmf_vndr_ie(curr_ie_buf, pktflag, 4564 vndrie_info->ie_ptr, 4565 vndrie_info->ie_len, 4566 "add"); 4567 4568 /* save the parsed IE in wl struct */ 4569 memcpy(ptr + (*mgmt_ie_len), vndrie_info->ie_ptr, 4570 vndrie_info->ie_len); 4571 *mgmt_ie_len += vndrie_info->ie_len; 4572 4573 curr_ie_buf += del_add_ie_buf_len; 4574 total_ie_buf_len += del_add_ie_buf_len; 4575 } 4576 } 4577 if (total_ie_buf_len) { 4578 err = brcmf_fil_bsscfg_data_set(ifp, "vndr_ie", iovar_ie_buf, 4579 total_ie_buf_len); 4580 if (err) 4581 bphy_err(drvr, "vndr ie set error : %d\n", err); 4582 } 4583 4584 exit: 4585 kfree(iovar_ie_buf); 4586 return err; 4587 } 4588 4589 s32 brcmf_vif_clear_mgmt_ies(struct brcmf_cfg80211_vif *vif) 4590 { 4591 s32 pktflags[] = { 4592 BRCMF_VNDR_IE_PRBREQ_FLAG, 4593 BRCMF_VNDR_IE_PRBRSP_FLAG, 4594 BRCMF_VNDR_IE_BEACON_FLAG 4595 }; 4596 int i; 4597 4598 for (i = 0; i < ARRAY_SIZE(pktflags); i++) 4599 brcmf_vif_set_mgmt_ie(vif, pktflags[i], NULL, 0); 4600 4601 memset(&vif->saved_ie, 0, sizeof(vif->saved_ie)); 4602 return 0; 4603 } 4604 4605 static s32 4606 brcmf_config_ap_mgmt_ie(struct brcmf_cfg80211_vif *vif, 4607 struct cfg80211_beacon_data *beacon) 4608 { 4609 struct brcmf_pub *drvr = vif->ifp->drvr; 4610 s32 err; 4611 4612 /* Set Beacon IEs to FW */ 4613 err = brcmf_vif_set_mgmt_ie(vif, BRCMF_VNDR_IE_BEACON_FLAG, 4614 beacon->tail, beacon->tail_len); 4615 if (err) { 4616 bphy_err(drvr, "Set Beacon IE Failed\n"); 4617 return err; 4618 } 4619 brcmf_dbg(TRACE, "Applied Vndr IEs for Beacon\n"); 4620 4621 /* Set Probe Response IEs to FW */ 4622 err = brcmf_vif_set_mgmt_ie(vif, BRCMF_VNDR_IE_PRBRSP_FLAG, 4623 beacon->proberesp_ies, 4624 beacon->proberesp_ies_len); 4625 if (err) 4626 bphy_err(drvr, "Set Probe Resp IE Failed\n"); 4627 else 4628 brcmf_dbg(TRACE, "Applied Vndr IEs for Probe Resp\n"); 4629 4630 /* Set Assoc Response IEs to FW */ 4631 err = brcmf_vif_set_mgmt_ie(vif, BRCMF_VNDR_IE_ASSOCRSP_FLAG, 4632 beacon->assocresp_ies, 4633 beacon->assocresp_ies_len); 4634 if (err) 4635 brcmf_err("Set Assoc Resp IE Failed\n"); 4636 else 4637 brcmf_dbg(TRACE, "Applied Vndr IEs for Assoc Resp\n"); 4638 4639 return err; 4640 } 4641 4642 static s32 4643 brcmf_parse_configure_security(struct brcmf_if *ifp, 4644 struct cfg80211_ap_settings *settings, 4645 enum nl80211_iftype dev_role) 4646 { 4647 const struct brcmf_tlv *rsn_ie; 4648 const struct brcmf_vs_tlv *wpa_ie; 4649 s32 err = 0; 4650 4651 /* find the RSN_IE */ 4652 rsn_ie = brcmf_parse_tlvs((u8 *)settings->beacon.tail, 4653 settings->beacon.tail_len, WLAN_EID_RSN); 4654 4655 /* find the WPA_IE */ 4656 wpa_ie = brcmf_find_wpaie((u8 *)settings->beacon.tail, 4657 settings->beacon.tail_len); 4658 4659 if (wpa_ie || rsn_ie) { 4660 brcmf_dbg(TRACE, "WPA(2) IE is found\n"); 4661 if (wpa_ie) { 4662 /* WPA IE */ 4663 err = brcmf_configure_wpaie(ifp, wpa_ie, false); 4664 if (err < 0) 4665 return err; 4666 } else { 4667 struct brcmf_vs_tlv *tmp_ie; 4668 4669 tmp_ie = (struct brcmf_vs_tlv *)rsn_ie; 4670 4671 /* RSN IE */ 4672 err = brcmf_configure_wpaie(ifp, tmp_ie, true); 4673 if (err < 0) 4674 return err; 4675 } 4676 } else { 4677 brcmf_dbg(TRACE, "No WPA(2) IEs found\n"); 4678 brcmf_configure_opensecurity(ifp); 4679 } 4680 4681 return err; 4682 } 4683 4684 static s32 4685 brcmf_cfg80211_start_ap(struct wiphy *wiphy, struct net_device *ndev, 4686 struct cfg80211_ap_settings *settings) 4687 { 4688 s32 ie_offset; 4689 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 4690 struct brcmf_if *ifp = netdev_priv(ndev); 4691 struct brcmf_pub *drvr = cfg->pub; 4692 struct brcmf_cfg80211_profile *profile = &ifp->vif->profile; 4693 struct cfg80211_crypto_settings *crypto = &settings->crypto; 4694 const struct brcmf_tlv *ssid_ie; 4695 const struct brcmf_tlv *country_ie; 4696 struct brcmf_ssid_le ssid_le; 4697 s32 err = -EPERM; 4698 struct brcmf_join_params join_params; 4699 enum nl80211_iftype dev_role; 4700 struct brcmf_fil_bss_enable_le bss_enable; 4701 u16 chanspec = chandef_to_chanspec(&cfg->d11inf, &settings->chandef); 4702 bool mbss; 4703 int is_11d; 4704 bool supports_11d; 4705 4706 brcmf_dbg(TRACE, "ctrlchn=%d, center=%d, bw=%d, beacon_interval=%d, dtim_period=%d,\n", 4707 settings->chandef.chan->hw_value, 4708 settings->chandef.center_freq1, settings->chandef.width, 4709 settings->beacon_interval, settings->dtim_period); 4710 brcmf_dbg(TRACE, "ssid=%s(%zu), auth_type=%d, inactivity_timeout=%d\n", 4711 settings->ssid, settings->ssid_len, settings->auth_type, 4712 settings->inactivity_timeout); 4713 dev_role = ifp->vif->wdev.iftype; 4714 mbss = ifp->vif->mbss; 4715 4716 /* store current 11d setting */ 4717 if (brcmf_fil_cmd_int_get(ifp, BRCMF_C_GET_REGULATORY, 4718 &ifp->vif->is_11d)) { 4719 is_11d = supports_11d = false; 4720 } else { 4721 country_ie = brcmf_parse_tlvs((u8 *)settings->beacon.tail, 4722 settings->beacon.tail_len, 4723 WLAN_EID_COUNTRY); 4724 is_11d = country_ie ? 1 : 0; 4725 supports_11d = true; 4726 } 4727 4728 memset(&ssid_le, 0, sizeof(ssid_le)); 4729 if (settings->ssid == NULL || settings->ssid_len == 0) { 4730 ie_offset = DOT11_MGMT_HDR_LEN + DOT11_BCN_PRB_FIXED_LEN; 4731 ssid_ie = brcmf_parse_tlvs( 4732 (u8 *)&settings->beacon.head[ie_offset], 4733 settings->beacon.head_len - ie_offset, 4734 WLAN_EID_SSID); 4735 if (!ssid_ie || ssid_ie->len > IEEE80211_MAX_SSID_LEN) 4736 return -EINVAL; 4737 4738 memcpy(ssid_le.SSID, ssid_ie->data, ssid_ie->len); 4739 ssid_le.SSID_len = cpu_to_le32(ssid_ie->len); 4740 brcmf_dbg(TRACE, "SSID is (%s) in Head\n", ssid_le.SSID); 4741 } else { 4742 memcpy(ssid_le.SSID, settings->ssid, settings->ssid_len); 4743 ssid_le.SSID_len = cpu_to_le32((u32)settings->ssid_len); 4744 } 4745 4746 if (!mbss) { 4747 brcmf_set_mpc(ifp, 0); 4748 brcmf_configure_arp_nd_offload(ifp, false); 4749 } 4750 4751 /* Parameters shared by all radio interfaces */ 4752 if (!mbss) { 4753 if ((supports_11d) && (is_11d != ifp->vif->is_11d)) { 4754 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_REGULATORY, 4755 is_11d); 4756 if (err < 0) { 4757 bphy_err(drvr, "Regulatory Set Error, %d\n", 4758 err); 4759 goto exit; 4760 } 4761 } 4762 if (settings->beacon_interval) { 4763 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_BCNPRD, 4764 settings->beacon_interval); 4765 if (err < 0) { 4766 bphy_err(drvr, "Beacon Interval Set Error, %d\n", 4767 err); 4768 goto exit; 4769 } 4770 } 4771 if (settings->dtim_period) { 4772 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_DTIMPRD, 4773 settings->dtim_period); 4774 if (err < 0) { 4775 bphy_err(drvr, "DTIM Interval Set Error, %d\n", 4776 err); 4777 goto exit; 4778 } 4779 } 4780 4781 if ((dev_role == NL80211_IFTYPE_AP) && 4782 ((ifp->ifidx == 0) || 4783 (!brcmf_feat_is_enabled(ifp, BRCMF_FEAT_RSDB) && 4784 !brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MCHAN)))) { 4785 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_DOWN, 1); 4786 if (err < 0) { 4787 bphy_err(drvr, "BRCMF_C_DOWN error %d\n", 4788 err); 4789 goto exit; 4790 } 4791 brcmf_fil_iovar_int_set(ifp, "apsta", 0); 4792 } 4793 4794 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_INFRA, 1); 4795 if (err < 0) { 4796 bphy_err(drvr, "SET INFRA error %d\n", err); 4797 goto exit; 4798 } 4799 } else if (WARN_ON(supports_11d && (is_11d != ifp->vif->is_11d))) { 4800 /* Multiple-BSS should use same 11d configuration */ 4801 err = -EINVAL; 4802 goto exit; 4803 } 4804 4805 /* Interface specific setup */ 4806 if (dev_role == NL80211_IFTYPE_AP) { 4807 if ((brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MBSS)) && (!mbss)) 4808 brcmf_fil_iovar_int_set(ifp, "mbss", 1); 4809 4810 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_AP, 1); 4811 if (err < 0) { 4812 bphy_err(drvr, "setting AP mode failed %d\n", 4813 err); 4814 goto exit; 4815 } 4816 if (!mbss) { 4817 /* Firmware 10.x requires setting channel after enabling 4818 * AP and before bringing interface up. 4819 */ 4820 err = brcmf_fil_iovar_int_set(ifp, "chanspec", chanspec); 4821 if (err < 0) { 4822 bphy_err(drvr, "Set Channel failed: chspec=%d, %d\n", 4823 chanspec, err); 4824 goto exit; 4825 } 4826 } 4827 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_UP, 1); 4828 if (err < 0) { 4829 bphy_err(drvr, "BRCMF_C_UP error (%d)\n", err); 4830 goto exit; 4831 } 4832 4833 if (crypto->psk) { 4834 brcmf_dbg(INFO, "using PSK offload\n"); 4835 profile->use_fwauth |= BIT(BRCMF_PROFILE_FWAUTH_PSK); 4836 err = brcmf_set_pmk(ifp, crypto->psk, 4837 BRCMF_WSEC_MAX_PSK_LEN); 4838 if (err < 0) 4839 goto exit; 4840 } 4841 if (crypto->sae_pwd) { 4842 brcmf_dbg(INFO, "using SAE offload\n"); 4843 profile->use_fwauth |= BIT(BRCMF_PROFILE_FWAUTH_SAE); 4844 err = brcmf_set_sae_password(ifp, crypto->sae_pwd, 4845 crypto->sae_pwd_len); 4846 if (err < 0) 4847 goto exit; 4848 } 4849 if (profile->use_fwauth == 0) 4850 profile->use_fwauth = BIT(BRCMF_PROFILE_FWAUTH_NONE); 4851 4852 err = brcmf_parse_configure_security(ifp, settings, 4853 NL80211_IFTYPE_AP); 4854 if (err < 0) { 4855 bphy_err(drvr, "brcmf_parse_configure_security error\n"); 4856 goto exit; 4857 } 4858 4859 /* On DOWN the firmware removes the WEP keys, reconfigure 4860 * them if they were set. 4861 */ 4862 brcmf_cfg80211_reconfigure_wep(ifp); 4863 4864 memset(&join_params, 0, sizeof(join_params)); 4865 /* join parameters starts with ssid */ 4866 memcpy(&join_params.ssid_le, &ssid_le, sizeof(ssid_le)); 4867 /* create softap */ 4868 err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_SSID, 4869 &join_params, sizeof(join_params)); 4870 if (err < 0) { 4871 bphy_err(drvr, "SET SSID error (%d)\n", err); 4872 goto exit; 4873 } 4874 4875 err = brcmf_fil_iovar_int_set(ifp, "closednet", 4876 settings->hidden_ssid); 4877 if (err) { 4878 bphy_err(drvr, "%s closednet error (%d)\n", 4879 settings->hidden_ssid ? 4880 "enabled" : "disabled", 4881 err); 4882 goto exit; 4883 } 4884 4885 brcmf_dbg(TRACE, "AP mode configuration complete\n"); 4886 } else if (dev_role == NL80211_IFTYPE_P2P_GO) { 4887 err = brcmf_fil_iovar_int_set(ifp, "chanspec", chanspec); 4888 if (err < 0) { 4889 bphy_err(drvr, "Set Channel failed: chspec=%d, %d\n", 4890 chanspec, err); 4891 goto exit; 4892 } 4893 4894 err = brcmf_parse_configure_security(ifp, settings, 4895 NL80211_IFTYPE_P2P_GO); 4896 if (err < 0) { 4897 brcmf_err("brcmf_parse_configure_security error\n"); 4898 goto exit; 4899 } 4900 4901 err = brcmf_fil_bsscfg_data_set(ifp, "ssid", &ssid_le, 4902 sizeof(ssid_le)); 4903 if (err < 0) { 4904 bphy_err(drvr, "setting ssid failed %d\n", err); 4905 goto exit; 4906 } 4907 bss_enable.bsscfgidx = cpu_to_le32(ifp->bsscfgidx); 4908 bss_enable.enable = cpu_to_le32(1); 4909 err = brcmf_fil_iovar_data_set(ifp, "bss", &bss_enable, 4910 sizeof(bss_enable)); 4911 if (err < 0) { 4912 bphy_err(drvr, "bss_enable config failed %d\n", err); 4913 goto exit; 4914 } 4915 4916 brcmf_dbg(TRACE, "GO mode configuration complete\n"); 4917 } else { 4918 WARN_ON(1); 4919 } 4920 4921 brcmf_config_ap_mgmt_ie(ifp->vif, &settings->beacon); 4922 set_bit(BRCMF_VIF_STATUS_AP_CREATED, &ifp->vif->sme_state); 4923 brcmf_net_setcarrier(ifp, true); 4924 4925 exit: 4926 if ((err) && (!mbss)) { 4927 brcmf_set_mpc(ifp, 1); 4928 brcmf_configure_arp_nd_offload(ifp, true); 4929 } 4930 return err; 4931 } 4932 4933 static int brcmf_cfg80211_stop_ap(struct wiphy *wiphy, struct net_device *ndev) 4934 { 4935 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 4936 struct brcmf_if *ifp = netdev_priv(ndev); 4937 struct brcmf_pub *drvr = cfg->pub; 4938 struct brcmf_cfg80211_profile *profile = &ifp->vif->profile; 4939 s32 err; 4940 struct brcmf_fil_bss_enable_le bss_enable; 4941 struct brcmf_join_params join_params; 4942 4943 brcmf_dbg(TRACE, "Enter\n"); 4944 4945 if (ifp->vif->wdev.iftype == NL80211_IFTYPE_AP) { 4946 /* Due to most likely deauths outstanding we sleep */ 4947 /* first to make sure they get processed by fw. */ 4948 msleep(400); 4949 4950 if (profile->use_fwauth != BIT(BRCMF_PROFILE_FWAUTH_NONE)) { 4951 if (profile->use_fwauth & BIT(BRCMF_PROFILE_FWAUTH_PSK)) 4952 brcmf_set_pmk(ifp, NULL, 0); 4953 if (profile->use_fwauth & BIT(BRCMF_PROFILE_FWAUTH_SAE)) 4954 brcmf_set_sae_password(ifp, NULL, 0); 4955 profile->use_fwauth = BIT(BRCMF_PROFILE_FWAUTH_NONE); 4956 } 4957 4958 if (ifp->vif->mbss) { 4959 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_DOWN, 1); 4960 return err; 4961 } 4962 4963 /* First BSS doesn't get a full reset */ 4964 if (ifp->bsscfgidx == 0) 4965 brcmf_fil_iovar_int_set(ifp, "closednet", 0); 4966 4967 memset(&join_params, 0, sizeof(join_params)); 4968 err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_SSID, 4969 &join_params, sizeof(join_params)); 4970 if (err < 0) 4971 bphy_err(drvr, "SET SSID error (%d)\n", err); 4972 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_DOWN, 1); 4973 if (err < 0) 4974 bphy_err(drvr, "BRCMF_C_DOWN error %d\n", err); 4975 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_AP, 0); 4976 if (err < 0) 4977 bphy_err(drvr, "setting AP mode failed %d\n", err); 4978 if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MBSS)) 4979 brcmf_fil_iovar_int_set(ifp, "mbss", 0); 4980 brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_REGULATORY, 4981 ifp->vif->is_11d); 4982 /* Bring device back up so it can be used again */ 4983 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_UP, 1); 4984 if (err < 0) 4985 bphy_err(drvr, "BRCMF_C_UP error %d\n", err); 4986 4987 brcmf_vif_clear_mgmt_ies(ifp->vif); 4988 } else { 4989 bss_enable.bsscfgidx = cpu_to_le32(ifp->bsscfgidx); 4990 bss_enable.enable = cpu_to_le32(0); 4991 err = brcmf_fil_iovar_data_set(ifp, "bss", &bss_enable, 4992 sizeof(bss_enable)); 4993 if (err < 0) 4994 bphy_err(drvr, "bss_enable config failed %d\n", err); 4995 } 4996 brcmf_set_mpc(ifp, 1); 4997 brcmf_configure_arp_nd_offload(ifp, true); 4998 clear_bit(BRCMF_VIF_STATUS_AP_CREATED, &ifp->vif->sme_state); 4999 brcmf_net_setcarrier(ifp, false); 5000 5001 return err; 5002 } 5003 5004 static s32 5005 brcmf_cfg80211_change_beacon(struct wiphy *wiphy, struct net_device *ndev, 5006 struct cfg80211_beacon_data *info) 5007 { 5008 struct brcmf_if *ifp = netdev_priv(ndev); 5009 s32 err; 5010 5011 brcmf_dbg(TRACE, "Enter\n"); 5012 5013 err = brcmf_config_ap_mgmt_ie(ifp->vif, info); 5014 5015 return err; 5016 } 5017 5018 static int 5019 brcmf_cfg80211_del_station(struct wiphy *wiphy, struct net_device *ndev, 5020 struct station_del_parameters *params) 5021 { 5022 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 5023 struct brcmf_pub *drvr = cfg->pub; 5024 struct brcmf_scb_val_le scbval; 5025 struct brcmf_if *ifp = netdev_priv(ndev); 5026 s32 err; 5027 5028 if (!params->mac) 5029 return -EFAULT; 5030 5031 brcmf_dbg(TRACE, "Enter %pM\n", params->mac); 5032 5033 if (ifp->vif == cfg->p2p.bss_idx[P2PAPI_BSSCFG_DEVICE].vif) 5034 ifp = cfg->p2p.bss_idx[P2PAPI_BSSCFG_PRIMARY].vif->ifp; 5035 if (!check_vif_up(ifp->vif)) 5036 return -EIO; 5037 5038 memcpy(&scbval.ea, params->mac, ETH_ALEN); 5039 scbval.val = cpu_to_le32(params->reason_code); 5040 err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SCB_DEAUTHENTICATE_FOR_REASON, 5041 &scbval, sizeof(scbval)); 5042 if (err) 5043 bphy_err(drvr, "SCB_DEAUTHENTICATE_FOR_REASON failed %d\n", 5044 err); 5045 5046 brcmf_dbg(TRACE, "Exit\n"); 5047 return err; 5048 } 5049 5050 static int 5051 brcmf_cfg80211_change_station(struct wiphy *wiphy, struct net_device *ndev, 5052 const u8 *mac, struct station_parameters *params) 5053 { 5054 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 5055 struct brcmf_pub *drvr = cfg->pub; 5056 struct brcmf_if *ifp = netdev_priv(ndev); 5057 s32 err; 5058 5059 brcmf_dbg(TRACE, "Enter, MAC %pM, mask 0x%04x set 0x%04x\n", mac, 5060 params->sta_flags_mask, params->sta_flags_set); 5061 5062 /* Ignore all 00 MAC */ 5063 if (is_zero_ether_addr(mac)) 5064 return 0; 5065 5066 if (!(params->sta_flags_mask & BIT(NL80211_STA_FLAG_AUTHORIZED))) 5067 return 0; 5068 5069 if (params->sta_flags_set & BIT(NL80211_STA_FLAG_AUTHORIZED)) 5070 err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_SCB_AUTHORIZE, 5071 (void *)mac, ETH_ALEN); 5072 else 5073 err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_SCB_DEAUTHORIZE, 5074 (void *)mac, ETH_ALEN); 5075 if (err < 0) 5076 bphy_err(drvr, "Setting SCB (de-)authorize failed, %d\n", err); 5077 5078 return err; 5079 } 5080 5081 static void 5082 brcmf_cfg80211_update_mgmt_frame_registrations(struct wiphy *wiphy, 5083 struct wireless_dev *wdev, 5084 struct mgmt_frame_regs *upd) 5085 { 5086 struct brcmf_cfg80211_vif *vif; 5087 5088 vif = container_of(wdev, struct brcmf_cfg80211_vif, wdev); 5089 5090 vif->mgmt_rx_reg = upd->interface_stypes; 5091 } 5092 5093 5094 static int 5095 brcmf_cfg80211_mgmt_tx(struct wiphy *wiphy, struct wireless_dev *wdev, 5096 struct cfg80211_mgmt_tx_params *params, u64 *cookie) 5097 { 5098 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 5099 struct ieee80211_channel *chan = params->chan; 5100 struct brcmf_pub *drvr = cfg->pub; 5101 const u8 *buf = params->buf; 5102 size_t len = params->len; 5103 const struct ieee80211_mgmt *mgmt; 5104 struct brcmf_cfg80211_vif *vif; 5105 s32 err = 0; 5106 s32 ie_offset; 5107 s32 ie_len; 5108 struct brcmf_fil_action_frame_le *action_frame; 5109 struct brcmf_fil_af_params_le *af_params; 5110 bool ack; 5111 s32 chan_nr; 5112 u32 freq; 5113 5114 brcmf_dbg(TRACE, "Enter\n"); 5115 5116 *cookie = 0; 5117 5118 mgmt = (const struct ieee80211_mgmt *)buf; 5119 5120 if (!ieee80211_is_mgmt(mgmt->frame_control)) { 5121 bphy_err(drvr, "Driver only allows MGMT packet type\n"); 5122 return -EPERM; 5123 } 5124 5125 vif = container_of(wdev, struct brcmf_cfg80211_vif, wdev); 5126 5127 if (ieee80211_is_probe_resp(mgmt->frame_control)) { 5128 /* Right now the only reason to get a probe response */ 5129 /* is for p2p listen response or for p2p GO from */ 5130 /* wpa_supplicant. Unfortunately the probe is send */ 5131 /* on primary ndev, while dongle wants it on the p2p */ 5132 /* vif. Since this is only reason for a probe */ 5133 /* response to be sent, the vif is taken from cfg. */ 5134 /* If ever desired to send proberesp for non p2p */ 5135 /* response then data should be checked for */ 5136 /* "DIRECT-". Note in future supplicant will take */ 5137 /* dedicated p2p wdev to do this and then this 'hack'*/ 5138 /* is not needed anymore. */ 5139 ie_offset = DOT11_MGMT_HDR_LEN + 5140 DOT11_BCN_PRB_FIXED_LEN; 5141 ie_len = len - ie_offset; 5142 if (vif == cfg->p2p.bss_idx[P2PAPI_BSSCFG_PRIMARY].vif) 5143 vif = cfg->p2p.bss_idx[P2PAPI_BSSCFG_DEVICE].vif; 5144 err = brcmf_vif_set_mgmt_ie(vif, 5145 BRCMF_VNDR_IE_PRBRSP_FLAG, 5146 &buf[ie_offset], 5147 ie_len); 5148 cfg80211_mgmt_tx_status(wdev, *cookie, buf, len, true, 5149 GFP_KERNEL); 5150 } else if (ieee80211_is_action(mgmt->frame_control)) { 5151 if (len > BRCMF_FIL_ACTION_FRAME_SIZE + DOT11_MGMT_HDR_LEN) { 5152 bphy_err(drvr, "invalid action frame length\n"); 5153 err = -EINVAL; 5154 goto exit; 5155 } 5156 af_params = kzalloc(sizeof(*af_params), GFP_KERNEL); 5157 if (af_params == NULL) { 5158 bphy_err(drvr, "unable to allocate frame\n"); 5159 err = -ENOMEM; 5160 goto exit; 5161 } 5162 action_frame = &af_params->action_frame; 5163 /* Add the packet Id */ 5164 action_frame->packet_id = cpu_to_le32(*cookie); 5165 /* Add BSSID */ 5166 memcpy(&action_frame->da[0], &mgmt->da[0], ETH_ALEN); 5167 memcpy(&af_params->bssid[0], &mgmt->bssid[0], ETH_ALEN); 5168 /* Add the length exepted for 802.11 header */ 5169 action_frame->len = cpu_to_le16(len - DOT11_MGMT_HDR_LEN); 5170 /* Add the channel. Use the one specified as parameter if any or 5171 * the current one (got from the firmware) otherwise 5172 */ 5173 if (chan) 5174 freq = chan->center_freq; 5175 else 5176 brcmf_fil_cmd_int_get(vif->ifp, BRCMF_C_GET_CHANNEL, 5177 &freq); 5178 chan_nr = ieee80211_frequency_to_channel(freq); 5179 af_params->channel = cpu_to_le32(chan_nr); 5180 af_params->dwell_time = cpu_to_le32(params->wait); 5181 memcpy(action_frame->data, &buf[DOT11_MGMT_HDR_LEN], 5182 le16_to_cpu(action_frame->len)); 5183 5184 brcmf_dbg(TRACE, "Action frame, cookie=%lld, len=%d, freq=%d\n", 5185 *cookie, le16_to_cpu(action_frame->len), freq); 5186 5187 ack = brcmf_p2p_send_action_frame(cfg, cfg_to_ndev(cfg), 5188 af_params); 5189 5190 cfg80211_mgmt_tx_status(wdev, *cookie, buf, len, ack, 5191 GFP_KERNEL); 5192 kfree(af_params); 5193 } else { 5194 brcmf_dbg(TRACE, "Unhandled, fc=%04x!!\n", mgmt->frame_control); 5195 brcmf_dbg_hex_dump(true, buf, len, "payload, len=%zu\n", len); 5196 } 5197 5198 exit: 5199 return err; 5200 } 5201 5202 static int brcmf_cfg80211_set_cqm_rssi_range_config(struct wiphy *wiphy, 5203 struct net_device *ndev, 5204 s32 rssi_low, s32 rssi_high) 5205 { 5206 struct brcmf_cfg80211_vif *vif; 5207 struct brcmf_if *ifp; 5208 int err = 0; 5209 5210 brcmf_dbg(TRACE, "low=%d high=%d", rssi_low, rssi_high); 5211 5212 ifp = netdev_priv(ndev); 5213 vif = ifp->vif; 5214 5215 if (rssi_low != vif->cqm_rssi_low || rssi_high != vif->cqm_rssi_high) { 5216 /* The firmware will send an event when the RSSI is less than or 5217 * equal to a configured level and the previous RSSI event was 5218 * less than or equal to a different level. Set a third level 5219 * so that we also detect the transition from rssi <= rssi_high 5220 * to rssi > rssi_high. 5221 */ 5222 struct brcmf_rssi_event_le config = { 5223 .rate_limit_msec = cpu_to_le32(0), 5224 .rssi_level_num = 3, 5225 .rssi_levels = { 5226 clamp_val(rssi_low, S8_MIN, S8_MAX - 2), 5227 clamp_val(rssi_high, S8_MIN + 1, S8_MAX - 1), 5228 S8_MAX, 5229 }, 5230 }; 5231 5232 err = brcmf_fil_iovar_data_set(ifp, "rssi_event", &config, 5233 sizeof(config)); 5234 if (err) { 5235 err = -EINVAL; 5236 } else { 5237 vif->cqm_rssi_low = rssi_low; 5238 vif->cqm_rssi_high = rssi_high; 5239 } 5240 } 5241 5242 return err; 5243 } 5244 5245 static int 5246 brcmf_cfg80211_cancel_remain_on_channel(struct wiphy *wiphy, 5247 struct wireless_dev *wdev, 5248 u64 cookie) 5249 { 5250 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 5251 struct brcmf_pub *drvr = cfg->pub; 5252 struct brcmf_cfg80211_vif *vif; 5253 int err = 0; 5254 5255 brcmf_dbg(TRACE, "Enter p2p listen cancel\n"); 5256 5257 vif = cfg->p2p.bss_idx[P2PAPI_BSSCFG_DEVICE].vif; 5258 if (vif == NULL) { 5259 bphy_err(drvr, "No p2p device available for probe response\n"); 5260 err = -ENODEV; 5261 goto exit; 5262 } 5263 brcmf_p2p_cancel_remain_on_channel(vif->ifp); 5264 exit: 5265 return err; 5266 } 5267 5268 static int brcmf_cfg80211_get_channel(struct wiphy *wiphy, 5269 struct wireless_dev *wdev, 5270 struct cfg80211_chan_def *chandef) 5271 { 5272 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 5273 struct net_device *ndev = wdev->netdev; 5274 struct brcmf_pub *drvr = cfg->pub; 5275 struct brcmu_chan ch; 5276 enum nl80211_band band = 0; 5277 enum nl80211_chan_width width = 0; 5278 u32 chanspec; 5279 int freq, err; 5280 5281 if (!ndev || drvr->bus_if->state != BRCMF_BUS_UP) 5282 return -ENODEV; 5283 5284 err = brcmf_fil_iovar_int_get(netdev_priv(ndev), "chanspec", &chanspec); 5285 if (err) { 5286 bphy_err(drvr, "chanspec failed (%d)\n", err); 5287 return err; 5288 } 5289 5290 ch.chspec = chanspec; 5291 cfg->d11inf.decchspec(&ch); 5292 5293 switch (ch.band) { 5294 case BRCMU_CHAN_BAND_2G: 5295 band = NL80211_BAND_2GHZ; 5296 break; 5297 case BRCMU_CHAN_BAND_5G: 5298 band = NL80211_BAND_5GHZ; 5299 break; 5300 } 5301 5302 switch (ch.bw) { 5303 case BRCMU_CHAN_BW_80: 5304 width = NL80211_CHAN_WIDTH_80; 5305 break; 5306 case BRCMU_CHAN_BW_40: 5307 width = NL80211_CHAN_WIDTH_40; 5308 break; 5309 case BRCMU_CHAN_BW_20: 5310 width = NL80211_CHAN_WIDTH_20; 5311 break; 5312 case BRCMU_CHAN_BW_80P80: 5313 width = NL80211_CHAN_WIDTH_80P80; 5314 break; 5315 case BRCMU_CHAN_BW_160: 5316 width = NL80211_CHAN_WIDTH_160; 5317 break; 5318 } 5319 5320 freq = ieee80211_channel_to_frequency(ch.control_ch_num, band); 5321 chandef->chan = ieee80211_get_channel(wiphy, freq); 5322 chandef->width = width; 5323 chandef->center_freq1 = ieee80211_channel_to_frequency(ch.chnum, band); 5324 chandef->center_freq2 = 0; 5325 5326 return 0; 5327 } 5328 5329 static int brcmf_cfg80211_crit_proto_start(struct wiphy *wiphy, 5330 struct wireless_dev *wdev, 5331 enum nl80211_crit_proto_id proto, 5332 u16 duration) 5333 { 5334 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 5335 struct brcmf_cfg80211_vif *vif; 5336 5337 vif = container_of(wdev, struct brcmf_cfg80211_vif, wdev); 5338 5339 /* only DHCP support for now */ 5340 if (proto != NL80211_CRIT_PROTO_DHCP) 5341 return -EINVAL; 5342 5343 /* suppress and abort scanning */ 5344 set_bit(BRCMF_SCAN_STATUS_SUPPRESS, &cfg->scan_status); 5345 brcmf_abort_scanning(cfg); 5346 5347 return brcmf_btcoex_set_mode(vif, BRCMF_BTCOEX_DISABLED, duration); 5348 } 5349 5350 static void brcmf_cfg80211_crit_proto_stop(struct wiphy *wiphy, 5351 struct wireless_dev *wdev) 5352 { 5353 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 5354 struct brcmf_cfg80211_vif *vif; 5355 5356 vif = container_of(wdev, struct brcmf_cfg80211_vif, wdev); 5357 5358 brcmf_btcoex_set_mode(vif, BRCMF_BTCOEX_ENABLED, 0); 5359 clear_bit(BRCMF_SCAN_STATUS_SUPPRESS, &cfg->scan_status); 5360 } 5361 5362 static s32 5363 brcmf_notify_tdls_peer_event(struct brcmf_if *ifp, 5364 const struct brcmf_event_msg *e, void *data) 5365 { 5366 switch (e->reason) { 5367 case BRCMF_E_REASON_TDLS_PEER_DISCOVERED: 5368 brcmf_dbg(TRACE, "TDLS Peer Discovered\n"); 5369 break; 5370 case BRCMF_E_REASON_TDLS_PEER_CONNECTED: 5371 brcmf_dbg(TRACE, "TDLS Peer Connected\n"); 5372 brcmf_proto_add_tdls_peer(ifp->drvr, ifp->ifidx, (u8 *)e->addr); 5373 break; 5374 case BRCMF_E_REASON_TDLS_PEER_DISCONNECTED: 5375 brcmf_dbg(TRACE, "TDLS Peer Disconnected\n"); 5376 brcmf_proto_delete_peer(ifp->drvr, ifp->ifidx, (u8 *)e->addr); 5377 break; 5378 } 5379 5380 return 0; 5381 } 5382 5383 static int brcmf_convert_nl80211_tdls_oper(enum nl80211_tdls_operation oper) 5384 { 5385 int ret; 5386 5387 switch (oper) { 5388 case NL80211_TDLS_DISCOVERY_REQ: 5389 ret = BRCMF_TDLS_MANUAL_EP_DISCOVERY; 5390 break; 5391 case NL80211_TDLS_SETUP: 5392 ret = BRCMF_TDLS_MANUAL_EP_CREATE; 5393 break; 5394 case NL80211_TDLS_TEARDOWN: 5395 ret = BRCMF_TDLS_MANUAL_EP_DELETE; 5396 break; 5397 default: 5398 brcmf_err("unsupported operation: %d\n", oper); 5399 ret = -EOPNOTSUPP; 5400 } 5401 return ret; 5402 } 5403 5404 static int brcmf_cfg80211_tdls_oper(struct wiphy *wiphy, 5405 struct net_device *ndev, const u8 *peer, 5406 enum nl80211_tdls_operation oper) 5407 { 5408 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 5409 struct brcmf_pub *drvr = cfg->pub; 5410 struct brcmf_if *ifp; 5411 struct brcmf_tdls_iovar_le info; 5412 int ret = 0; 5413 5414 ret = brcmf_convert_nl80211_tdls_oper(oper); 5415 if (ret < 0) 5416 return ret; 5417 5418 ifp = netdev_priv(ndev); 5419 memset(&info, 0, sizeof(info)); 5420 info.mode = (u8)ret; 5421 if (peer) 5422 memcpy(info.ea, peer, ETH_ALEN); 5423 5424 ret = brcmf_fil_iovar_data_set(ifp, "tdls_endpoint", 5425 &info, sizeof(info)); 5426 if (ret < 0) 5427 bphy_err(drvr, "tdls_endpoint iovar failed: ret=%d\n", ret); 5428 5429 return ret; 5430 } 5431 5432 static int 5433 brcmf_cfg80211_update_conn_params(struct wiphy *wiphy, 5434 struct net_device *ndev, 5435 struct cfg80211_connect_params *sme, 5436 u32 changed) 5437 { 5438 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 5439 struct brcmf_pub *drvr = cfg->pub; 5440 struct brcmf_if *ifp; 5441 int err; 5442 5443 if (!(changed & UPDATE_ASSOC_IES)) 5444 return 0; 5445 5446 ifp = netdev_priv(ndev); 5447 err = brcmf_vif_set_mgmt_ie(ifp->vif, BRCMF_VNDR_IE_ASSOCREQ_FLAG, 5448 sme->ie, sme->ie_len); 5449 if (err) 5450 bphy_err(drvr, "Set Assoc REQ IE Failed\n"); 5451 else 5452 brcmf_dbg(TRACE, "Applied Vndr IEs for Assoc request\n"); 5453 5454 return err; 5455 } 5456 5457 #ifdef CONFIG_PM 5458 static int 5459 brcmf_cfg80211_set_rekey_data(struct wiphy *wiphy, struct net_device *ndev, 5460 struct cfg80211_gtk_rekey_data *gtk) 5461 { 5462 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 5463 struct brcmf_pub *drvr = cfg->pub; 5464 struct brcmf_if *ifp = netdev_priv(ndev); 5465 struct brcmf_gtk_keyinfo_le gtk_le; 5466 int ret; 5467 5468 brcmf_dbg(TRACE, "Enter, bssidx=%d\n", ifp->bsscfgidx); 5469 5470 memcpy(gtk_le.kck, gtk->kck, sizeof(gtk_le.kck)); 5471 memcpy(gtk_le.kek, gtk->kek, sizeof(gtk_le.kek)); 5472 memcpy(gtk_le.replay_counter, gtk->replay_ctr, 5473 sizeof(gtk_le.replay_counter)); 5474 5475 ret = brcmf_fil_iovar_data_set(ifp, "gtk_key_info", >k_le, 5476 sizeof(gtk_le)); 5477 if (ret < 0) 5478 bphy_err(drvr, "gtk_key_info iovar failed: ret=%d\n", ret); 5479 5480 return ret; 5481 } 5482 #endif 5483 5484 static int brcmf_cfg80211_set_pmk(struct wiphy *wiphy, struct net_device *dev, 5485 const struct cfg80211_pmk_conf *conf) 5486 { 5487 struct brcmf_if *ifp; 5488 5489 brcmf_dbg(TRACE, "enter\n"); 5490 5491 /* expect using firmware supplicant for 1X */ 5492 ifp = netdev_priv(dev); 5493 if (WARN_ON(ifp->vif->profile.use_fwsup != BRCMF_PROFILE_FWSUP_1X)) 5494 return -EINVAL; 5495 5496 if (conf->pmk_len > BRCMF_WSEC_MAX_PSK_LEN) 5497 return -ERANGE; 5498 5499 return brcmf_set_pmk(ifp, conf->pmk, conf->pmk_len); 5500 } 5501 5502 static int brcmf_cfg80211_del_pmk(struct wiphy *wiphy, struct net_device *dev, 5503 const u8 *aa) 5504 { 5505 struct brcmf_if *ifp; 5506 5507 brcmf_dbg(TRACE, "enter\n"); 5508 ifp = netdev_priv(dev); 5509 if (WARN_ON(ifp->vif->profile.use_fwsup != BRCMF_PROFILE_FWSUP_1X)) 5510 return -EINVAL; 5511 5512 return brcmf_set_pmk(ifp, NULL, 0); 5513 } 5514 5515 static struct cfg80211_ops brcmf_cfg80211_ops = { 5516 .add_virtual_intf = brcmf_cfg80211_add_iface, 5517 .del_virtual_intf = brcmf_cfg80211_del_iface, 5518 .change_virtual_intf = brcmf_cfg80211_change_iface, 5519 .scan = brcmf_cfg80211_scan, 5520 .set_wiphy_params = brcmf_cfg80211_set_wiphy_params, 5521 .join_ibss = brcmf_cfg80211_join_ibss, 5522 .leave_ibss = brcmf_cfg80211_leave_ibss, 5523 .get_station = brcmf_cfg80211_get_station, 5524 .dump_station = brcmf_cfg80211_dump_station, 5525 .set_tx_power = brcmf_cfg80211_set_tx_power, 5526 .get_tx_power = brcmf_cfg80211_get_tx_power, 5527 .add_key = brcmf_cfg80211_add_key, 5528 .del_key = brcmf_cfg80211_del_key, 5529 .get_key = brcmf_cfg80211_get_key, 5530 .set_default_key = brcmf_cfg80211_config_default_key, 5531 .set_default_mgmt_key = brcmf_cfg80211_config_default_mgmt_key, 5532 .set_power_mgmt = brcmf_cfg80211_set_power_mgmt, 5533 .connect = brcmf_cfg80211_connect, 5534 .disconnect = brcmf_cfg80211_disconnect, 5535 .suspend = brcmf_cfg80211_suspend, 5536 .resume = brcmf_cfg80211_resume, 5537 .set_pmksa = brcmf_cfg80211_set_pmksa, 5538 .del_pmksa = brcmf_cfg80211_del_pmksa, 5539 .flush_pmksa = brcmf_cfg80211_flush_pmksa, 5540 .start_ap = brcmf_cfg80211_start_ap, 5541 .stop_ap = brcmf_cfg80211_stop_ap, 5542 .change_beacon = brcmf_cfg80211_change_beacon, 5543 .del_station = brcmf_cfg80211_del_station, 5544 .change_station = brcmf_cfg80211_change_station, 5545 .sched_scan_start = brcmf_cfg80211_sched_scan_start, 5546 .sched_scan_stop = brcmf_cfg80211_sched_scan_stop, 5547 .update_mgmt_frame_registrations = 5548 brcmf_cfg80211_update_mgmt_frame_registrations, 5549 .mgmt_tx = brcmf_cfg80211_mgmt_tx, 5550 .set_cqm_rssi_range_config = brcmf_cfg80211_set_cqm_rssi_range_config, 5551 .remain_on_channel = brcmf_p2p_remain_on_channel, 5552 .cancel_remain_on_channel = brcmf_cfg80211_cancel_remain_on_channel, 5553 .get_channel = brcmf_cfg80211_get_channel, 5554 .start_p2p_device = brcmf_p2p_start_device, 5555 .stop_p2p_device = brcmf_p2p_stop_device, 5556 .crit_proto_start = brcmf_cfg80211_crit_proto_start, 5557 .crit_proto_stop = brcmf_cfg80211_crit_proto_stop, 5558 .tdls_oper = brcmf_cfg80211_tdls_oper, 5559 .update_connect_params = brcmf_cfg80211_update_conn_params, 5560 .set_pmk = brcmf_cfg80211_set_pmk, 5561 .del_pmk = brcmf_cfg80211_del_pmk, 5562 }; 5563 5564 struct cfg80211_ops *brcmf_cfg80211_get_ops(struct brcmf_mp_device *settings) 5565 { 5566 struct cfg80211_ops *ops; 5567 5568 ops = kmemdup(&brcmf_cfg80211_ops, sizeof(brcmf_cfg80211_ops), 5569 GFP_KERNEL); 5570 5571 if (ops && settings->roamoff) 5572 ops->update_connect_params = NULL; 5573 5574 return ops; 5575 } 5576 5577 struct brcmf_cfg80211_vif *brcmf_alloc_vif(struct brcmf_cfg80211_info *cfg, 5578 enum nl80211_iftype type) 5579 { 5580 struct brcmf_cfg80211_vif *vif_walk; 5581 struct brcmf_cfg80211_vif *vif; 5582 bool mbss; 5583 struct brcmf_if *ifp = brcmf_get_ifp(cfg->pub, 0); 5584 5585 brcmf_dbg(TRACE, "allocating virtual interface (size=%zu)\n", 5586 sizeof(*vif)); 5587 vif = kzalloc(sizeof(*vif), GFP_KERNEL); 5588 if (!vif) 5589 return ERR_PTR(-ENOMEM); 5590 5591 vif->wdev.wiphy = cfg->wiphy; 5592 vif->wdev.iftype = type; 5593 5594 brcmf_init_prof(&vif->profile); 5595 5596 if (type == NL80211_IFTYPE_AP && 5597 brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MBSS)) { 5598 mbss = false; 5599 list_for_each_entry(vif_walk, &cfg->vif_list, list) { 5600 if (vif_walk->wdev.iftype == NL80211_IFTYPE_AP) { 5601 mbss = true; 5602 break; 5603 } 5604 } 5605 vif->mbss = mbss; 5606 } 5607 5608 list_add_tail(&vif->list, &cfg->vif_list); 5609 return vif; 5610 } 5611 5612 void brcmf_free_vif(struct brcmf_cfg80211_vif *vif) 5613 { 5614 list_del(&vif->list); 5615 kfree(vif); 5616 } 5617 5618 void brcmf_cfg80211_free_netdev(struct net_device *ndev) 5619 { 5620 struct brcmf_cfg80211_vif *vif; 5621 struct brcmf_if *ifp; 5622 5623 ifp = netdev_priv(ndev); 5624 vif = ifp->vif; 5625 5626 if (vif) 5627 brcmf_free_vif(vif); 5628 } 5629 5630 static bool brcmf_is_linkup(struct brcmf_cfg80211_vif *vif, 5631 const struct brcmf_event_msg *e) 5632 { 5633 u32 event = e->event_code; 5634 u32 status = e->status; 5635 5636 if ((vif->profile.use_fwsup == BRCMF_PROFILE_FWSUP_PSK || 5637 vif->profile.use_fwsup == BRCMF_PROFILE_FWSUP_SAE) && 5638 event == BRCMF_E_PSK_SUP && 5639 status == BRCMF_E_STATUS_FWSUP_COMPLETED) 5640 set_bit(BRCMF_VIF_STATUS_EAP_SUCCESS, &vif->sme_state); 5641 if (event == BRCMF_E_SET_SSID && status == BRCMF_E_STATUS_SUCCESS) { 5642 brcmf_dbg(CONN, "Processing set ssid\n"); 5643 memcpy(vif->profile.bssid, e->addr, ETH_ALEN); 5644 if (vif->profile.use_fwsup != BRCMF_PROFILE_FWSUP_PSK && 5645 vif->profile.use_fwsup != BRCMF_PROFILE_FWSUP_SAE) 5646 return true; 5647 5648 set_bit(BRCMF_VIF_STATUS_ASSOC_SUCCESS, &vif->sme_state); 5649 } 5650 5651 if (test_bit(BRCMF_VIF_STATUS_EAP_SUCCESS, &vif->sme_state) && 5652 test_bit(BRCMF_VIF_STATUS_ASSOC_SUCCESS, &vif->sme_state)) { 5653 clear_bit(BRCMF_VIF_STATUS_EAP_SUCCESS, &vif->sme_state); 5654 clear_bit(BRCMF_VIF_STATUS_ASSOC_SUCCESS, &vif->sme_state); 5655 return true; 5656 } 5657 return false; 5658 } 5659 5660 static bool brcmf_is_linkdown(struct brcmf_cfg80211_vif *vif, 5661 const struct brcmf_event_msg *e) 5662 { 5663 u32 event = e->event_code; 5664 u16 flags = e->flags; 5665 5666 if ((event == BRCMF_E_DEAUTH) || (event == BRCMF_E_DEAUTH_IND) || 5667 (event == BRCMF_E_DISASSOC_IND) || 5668 ((event == BRCMF_E_LINK) && (!(flags & BRCMF_EVENT_MSG_LINK)))) { 5669 brcmf_dbg(CONN, "Processing link down\n"); 5670 clear_bit(BRCMF_VIF_STATUS_EAP_SUCCESS, &vif->sme_state); 5671 clear_bit(BRCMF_VIF_STATUS_ASSOC_SUCCESS, &vif->sme_state); 5672 return true; 5673 } 5674 return false; 5675 } 5676 5677 static bool brcmf_is_nonetwork(struct brcmf_cfg80211_info *cfg, 5678 const struct brcmf_event_msg *e) 5679 { 5680 u32 event = e->event_code; 5681 u32 status = e->status; 5682 5683 if (event == BRCMF_E_LINK && status == BRCMF_E_STATUS_NO_NETWORKS) { 5684 brcmf_dbg(CONN, "Processing Link %s & no network found\n", 5685 e->flags & BRCMF_EVENT_MSG_LINK ? "up" : "down"); 5686 return true; 5687 } 5688 5689 if (event == BRCMF_E_SET_SSID && status != BRCMF_E_STATUS_SUCCESS) { 5690 brcmf_dbg(CONN, "Processing connecting & no network found\n"); 5691 return true; 5692 } 5693 5694 if (event == BRCMF_E_PSK_SUP && 5695 status != BRCMF_E_STATUS_FWSUP_COMPLETED) { 5696 brcmf_dbg(CONN, "Processing failed supplicant state: %u\n", 5697 status); 5698 return true; 5699 } 5700 5701 return false; 5702 } 5703 5704 static void brcmf_clear_assoc_ies(struct brcmf_cfg80211_info *cfg) 5705 { 5706 struct brcmf_cfg80211_connect_info *conn_info = cfg_to_conn(cfg); 5707 5708 kfree(conn_info->req_ie); 5709 conn_info->req_ie = NULL; 5710 conn_info->req_ie_len = 0; 5711 kfree(conn_info->resp_ie); 5712 conn_info->resp_ie = NULL; 5713 conn_info->resp_ie_len = 0; 5714 } 5715 5716 u8 brcmf_map_prio_to_prec(void *config, u8 prio) 5717 { 5718 struct brcmf_cfg80211_info *cfg = (struct brcmf_cfg80211_info *)config; 5719 5720 if (!cfg) 5721 return (prio == PRIO_8021D_NONE || prio == PRIO_8021D_BE) ? 5722 (prio ^ 2) : prio; 5723 5724 /* For those AC(s) with ACM flag set to 1, convert its 4-level priority 5725 * to an 8-level precedence which is the same as BE's 5726 */ 5727 if (prio > PRIO_8021D_EE && 5728 cfg->ac_priority[prio] == cfg->ac_priority[PRIO_8021D_BE]) 5729 return cfg->ac_priority[prio] * 2; 5730 5731 /* Conversion of 4-level priority to 8-level precedence */ 5732 if (prio == PRIO_8021D_BE || prio == PRIO_8021D_BK || 5733 prio == PRIO_8021D_CL || prio == PRIO_8021D_VO) 5734 return cfg->ac_priority[prio] * 2; 5735 else 5736 return cfg->ac_priority[prio] * 2 + 1; 5737 } 5738 5739 u8 brcmf_map_prio_to_aci(void *config, u8 prio) 5740 { 5741 /* Prio here refers to the 802.1d priority in range of 0 to 7. 5742 * ACI here refers to the WLAN AC Index in range of 0 to 3. 5743 * This function will return ACI corresponding to input prio. 5744 */ 5745 struct brcmf_cfg80211_info *cfg = (struct brcmf_cfg80211_info *)config; 5746 5747 if (cfg) 5748 return cfg->ac_priority[prio]; 5749 5750 return prio; 5751 } 5752 5753 static void brcmf_init_wmm_prio(u8 *priority) 5754 { 5755 /* Initialize AC priority array to default 5756 * 802.1d priority as per following table: 5757 * 802.1d prio 0,3 maps to BE 5758 * 802.1d prio 1,2 maps to BK 5759 * 802.1d prio 4,5 maps to VI 5760 * 802.1d prio 6,7 maps to VO 5761 */ 5762 priority[0] = BRCMF_FWS_FIFO_AC_BE; 5763 priority[3] = BRCMF_FWS_FIFO_AC_BE; 5764 priority[1] = BRCMF_FWS_FIFO_AC_BK; 5765 priority[2] = BRCMF_FWS_FIFO_AC_BK; 5766 priority[4] = BRCMF_FWS_FIFO_AC_VI; 5767 priority[5] = BRCMF_FWS_FIFO_AC_VI; 5768 priority[6] = BRCMF_FWS_FIFO_AC_VO; 5769 priority[7] = BRCMF_FWS_FIFO_AC_VO; 5770 } 5771 5772 static void brcmf_wifi_prioritize_acparams(const 5773 struct brcmf_cfg80211_edcf_acparam *acp, u8 *priority) 5774 { 5775 u8 aci; 5776 u8 aifsn; 5777 u8 ecwmin; 5778 u8 ecwmax; 5779 u8 acm; 5780 u8 ranking_basis[EDCF_AC_COUNT]; 5781 u8 aci_prio[EDCF_AC_COUNT]; /* AC_BE, AC_BK, AC_VI, AC_VO */ 5782 u8 index; 5783 5784 for (aci = 0; aci < EDCF_AC_COUNT; aci++, acp++) { 5785 aifsn = acp->ACI & EDCF_AIFSN_MASK; 5786 acm = (acp->ACI & EDCF_ACM_MASK) ? 1 : 0; 5787 ecwmin = acp->ECW & EDCF_ECWMIN_MASK; 5788 ecwmax = (acp->ECW & EDCF_ECWMAX_MASK) >> EDCF_ECWMAX_SHIFT; 5789 brcmf_dbg(CONN, "ACI %d aifsn %d acm %d ecwmin %d ecwmax %d\n", 5790 aci, aifsn, acm, ecwmin, ecwmax); 5791 /* Default AC_VO will be the lowest ranking value */ 5792 ranking_basis[aci] = aifsn + ecwmin + ecwmax; 5793 /* Initialise priority starting at 0 (AC_BE) */ 5794 aci_prio[aci] = 0; 5795 5796 /* If ACM is set, STA can't use this AC as per 802.11. 5797 * Change the ranking to BE 5798 */ 5799 if (aci != AC_BE && aci != AC_BK && acm == 1) 5800 ranking_basis[aci] = ranking_basis[AC_BE]; 5801 } 5802 5803 /* Ranking method which works for AC priority 5804 * swapping when values for cwmin, cwmax and aifsn are varied 5805 * Compare each aci_prio against each other aci_prio 5806 */ 5807 for (aci = 0; aci < EDCF_AC_COUNT; aci++) { 5808 for (index = 0; index < EDCF_AC_COUNT; index++) { 5809 if (index != aci) { 5810 /* Smaller ranking value has higher priority, 5811 * so increment priority for each ACI which has 5812 * a higher ranking value 5813 */ 5814 if (ranking_basis[aci] < ranking_basis[index]) 5815 aci_prio[aci]++; 5816 } 5817 } 5818 } 5819 5820 /* By now, aci_prio[] will be in range of 0 to 3. 5821 * Use ACI prio to get the new priority value for 5822 * each 802.1d traffic type, in this range. 5823 */ 5824 if (!(aci_prio[AC_BE] == aci_prio[AC_BK] && 5825 aci_prio[AC_BK] == aci_prio[AC_VI] && 5826 aci_prio[AC_VI] == aci_prio[AC_VO])) { 5827 /* 802.1d 0,3 maps to BE */ 5828 priority[0] = aci_prio[AC_BE]; 5829 priority[3] = aci_prio[AC_BE]; 5830 5831 /* 802.1d 1,2 maps to BK */ 5832 priority[1] = aci_prio[AC_BK]; 5833 priority[2] = aci_prio[AC_BK]; 5834 5835 /* 802.1d 4,5 maps to VO */ 5836 priority[4] = aci_prio[AC_VI]; 5837 priority[5] = aci_prio[AC_VI]; 5838 5839 /* 802.1d 6,7 maps to VO */ 5840 priority[6] = aci_prio[AC_VO]; 5841 priority[7] = aci_prio[AC_VO]; 5842 } else { 5843 /* Initialize to default priority */ 5844 brcmf_init_wmm_prio(priority); 5845 } 5846 5847 brcmf_dbg(CONN, "Adj prio BE 0->%d, BK 1->%d, BK 2->%d, BE 3->%d\n", 5848 priority[0], priority[1], priority[2], priority[3]); 5849 5850 brcmf_dbg(CONN, "Adj prio VI 4->%d, VI 5->%d, VO 6->%d, VO 7->%d\n", 5851 priority[4], priority[5], priority[6], priority[7]); 5852 } 5853 5854 static s32 brcmf_get_assoc_ies(struct brcmf_cfg80211_info *cfg, 5855 struct brcmf_if *ifp) 5856 { 5857 struct brcmf_pub *drvr = cfg->pub; 5858 struct brcmf_cfg80211_assoc_ielen_le *assoc_info; 5859 struct brcmf_cfg80211_connect_info *conn_info = cfg_to_conn(cfg); 5860 struct brcmf_cfg80211_edcf_acparam edcf_acparam_info[EDCF_AC_COUNT]; 5861 u32 req_len; 5862 u32 resp_len; 5863 s32 err = 0; 5864 5865 brcmf_clear_assoc_ies(cfg); 5866 5867 err = brcmf_fil_iovar_data_get(ifp, "assoc_info", 5868 cfg->extra_buf, WL_ASSOC_INFO_MAX); 5869 if (err) { 5870 bphy_err(drvr, "could not get assoc info (%d)\n", err); 5871 return err; 5872 } 5873 assoc_info = 5874 (struct brcmf_cfg80211_assoc_ielen_le *)cfg->extra_buf; 5875 req_len = le32_to_cpu(assoc_info->req_len); 5876 resp_len = le32_to_cpu(assoc_info->resp_len); 5877 if (req_len) { 5878 err = brcmf_fil_iovar_data_get(ifp, "assoc_req_ies", 5879 cfg->extra_buf, 5880 WL_ASSOC_INFO_MAX); 5881 if (err) { 5882 bphy_err(drvr, "could not get assoc req (%d)\n", err); 5883 return err; 5884 } 5885 conn_info->req_ie_len = req_len; 5886 conn_info->req_ie = 5887 kmemdup(cfg->extra_buf, conn_info->req_ie_len, 5888 GFP_KERNEL); 5889 if (!conn_info->req_ie) 5890 conn_info->req_ie_len = 0; 5891 } else { 5892 conn_info->req_ie_len = 0; 5893 conn_info->req_ie = NULL; 5894 } 5895 if (resp_len) { 5896 err = brcmf_fil_iovar_data_get(ifp, "assoc_resp_ies", 5897 cfg->extra_buf, 5898 WL_ASSOC_INFO_MAX); 5899 if (err) { 5900 bphy_err(drvr, "could not get assoc resp (%d)\n", err); 5901 return err; 5902 } 5903 conn_info->resp_ie_len = resp_len; 5904 conn_info->resp_ie = 5905 kmemdup(cfg->extra_buf, conn_info->resp_ie_len, 5906 GFP_KERNEL); 5907 if (!conn_info->resp_ie) 5908 conn_info->resp_ie_len = 0; 5909 5910 err = brcmf_fil_iovar_data_get(ifp, "wme_ac_sta", 5911 edcf_acparam_info, 5912 sizeof(edcf_acparam_info)); 5913 if (err) { 5914 brcmf_err("could not get wme_ac_sta (%d)\n", err); 5915 return err; 5916 } 5917 5918 brcmf_wifi_prioritize_acparams(edcf_acparam_info, 5919 cfg->ac_priority); 5920 } else { 5921 conn_info->resp_ie_len = 0; 5922 conn_info->resp_ie = NULL; 5923 } 5924 brcmf_dbg(CONN, "req len (%d) resp len (%d)\n", 5925 conn_info->req_ie_len, conn_info->resp_ie_len); 5926 5927 return err; 5928 } 5929 5930 static s32 5931 brcmf_bss_roaming_done(struct brcmf_cfg80211_info *cfg, 5932 struct net_device *ndev, 5933 const struct brcmf_event_msg *e) 5934 { 5935 struct brcmf_if *ifp = netdev_priv(ndev); 5936 struct brcmf_cfg80211_profile *profile = &ifp->vif->profile; 5937 struct brcmf_cfg80211_connect_info *conn_info = cfg_to_conn(cfg); 5938 struct wiphy *wiphy = cfg_to_wiphy(cfg); 5939 struct ieee80211_channel *notify_channel = NULL; 5940 struct ieee80211_supported_band *band; 5941 struct brcmf_bss_info_le *bi; 5942 struct brcmu_chan ch; 5943 struct cfg80211_roam_info roam_info = {}; 5944 u32 freq; 5945 s32 err = 0; 5946 u8 *buf; 5947 5948 brcmf_dbg(TRACE, "Enter\n"); 5949 5950 brcmf_get_assoc_ies(cfg, ifp); 5951 memcpy(profile->bssid, e->addr, ETH_ALEN); 5952 brcmf_update_bss_info(cfg, ifp); 5953 5954 buf = kzalloc(WL_BSS_INFO_MAX, GFP_KERNEL); 5955 if (buf == NULL) { 5956 err = -ENOMEM; 5957 goto done; 5958 } 5959 5960 /* data sent to dongle has to be little endian */ 5961 *(__le32 *)buf = cpu_to_le32(WL_BSS_INFO_MAX); 5962 err = brcmf_fil_cmd_data_get(ifp, BRCMF_C_GET_BSS_INFO, 5963 buf, WL_BSS_INFO_MAX); 5964 5965 if (err) 5966 goto done; 5967 5968 bi = (struct brcmf_bss_info_le *)(buf + 4); 5969 ch.chspec = le16_to_cpu(bi->chanspec); 5970 cfg->d11inf.decchspec(&ch); 5971 5972 if (ch.band == BRCMU_CHAN_BAND_2G) 5973 band = wiphy->bands[NL80211_BAND_2GHZ]; 5974 else 5975 band = wiphy->bands[NL80211_BAND_5GHZ]; 5976 5977 freq = ieee80211_channel_to_frequency(ch.control_ch_num, band->band); 5978 notify_channel = ieee80211_get_channel(wiphy, freq); 5979 5980 done: 5981 kfree(buf); 5982 5983 roam_info.channel = notify_channel; 5984 roam_info.bssid = profile->bssid; 5985 roam_info.req_ie = conn_info->req_ie; 5986 roam_info.req_ie_len = conn_info->req_ie_len; 5987 roam_info.resp_ie = conn_info->resp_ie; 5988 roam_info.resp_ie_len = conn_info->resp_ie_len; 5989 5990 cfg80211_roamed(ndev, &roam_info, GFP_KERNEL); 5991 brcmf_dbg(CONN, "Report roaming result\n"); 5992 5993 if (profile->use_fwsup == BRCMF_PROFILE_FWSUP_1X && profile->is_ft) { 5994 cfg80211_port_authorized(ndev, profile->bssid, GFP_KERNEL); 5995 brcmf_dbg(CONN, "Report port authorized\n"); 5996 } 5997 5998 set_bit(BRCMF_VIF_STATUS_CONNECTED, &ifp->vif->sme_state); 5999 brcmf_dbg(TRACE, "Exit\n"); 6000 return err; 6001 } 6002 6003 static s32 6004 brcmf_bss_connect_done(struct brcmf_cfg80211_info *cfg, 6005 struct net_device *ndev, const struct brcmf_event_msg *e, 6006 bool completed) 6007 { 6008 struct brcmf_if *ifp = netdev_priv(ndev); 6009 struct brcmf_cfg80211_profile *profile = &ifp->vif->profile; 6010 struct brcmf_cfg80211_connect_info *conn_info = cfg_to_conn(cfg); 6011 struct cfg80211_connect_resp_params conn_params; 6012 6013 brcmf_dbg(TRACE, "Enter\n"); 6014 6015 if (test_and_clear_bit(BRCMF_VIF_STATUS_CONNECTING, 6016 &ifp->vif->sme_state)) { 6017 memset(&conn_params, 0, sizeof(conn_params)); 6018 if (completed) { 6019 brcmf_get_assoc_ies(cfg, ifp); 6020 brcmf_update_bss_info(cfg, ifp); 6021 set_bit(BRCMF_VIF_STATUS_CONNECTED, 6022 &ifp->vif->sme_state); 6023 conn_params.status = WLAN_STATUS_SUCCESS; 6024 } else { 6025 conn_params.status = WLAN_STATUS_AUTH_TIMEOUT; 6026 } 6027 conn_params.bssid = profile->bssid; 6028 conn_params.req_ie = conn_info->req_ie; 6029 conn_params.req_ie_len = conn_info->req_ie_len; 6030 conn_params.resp_ie = conn_info->resp_ie; 6031 conn_params.resp_ie_len = conn_info->resp_ie_len; 6032 cfg80211_connect_done(ndev, &conn_params, GFP_KERNEL); 6033 brcmf_dbg(CONN, "Report connect result - connection %s\n", 6034 completed ? "succeeded" : "failed"); 6035 } 6036 brcmf_dbg(TRACE, "Exit\n"); 6037 return 0; 6038 } 6039 6040 static s32 6041 brcmf_notify_connect_status_ap(struct brcmf_cfg80211_info *cfg, 6042 struct net_device *ndev, 6043 const struct brcmf_event_msg *e, void *data) 6044 { 6045 struct brcmf_pub *drvr = cfg->pub; 6046 static int generation; 6047 u32 event = e->event_code; 6048 u32 reason = e->reason; 6049 struct station_info *sinfo; 6050 6051 brcmf_dbg(CONN, "event %s (%u), reason %d\n", 6052 brcmf_fweh_event_name(event), event, reason); 6053 if (event == BRCMF_E_LINK && reason == BRCMF_E_REASON_LINK_BSSCFG_DIS && 6054 ndev != cfg_to_ndev(cfg)) { 6055 brcmf_dbg(CONN, "AP mode link down\n"); 6056 complete(&cfg->vif_disabled); 6057 return 0; 6058 } 6059 6060 if (((event == BRCMF_E_ASSOC_IND) || (event == BRCMF_E_REASSOC_IND)) && 6061 (reason == BRCMF_E_STATUS_SUCCESS)) { 6062 if (!data) { 6063 bphy_err(drvr, "No IEs present in ASSOC/REASSOC_IND\n"); 6064 return -EINVAL; 6065 } 6066 6067 sinfo = kzalloc(sizeof(*sinfo), GFP_KERNEL); 6068 if (!sinfo) 6069 return -ENOMEM; 6070 6071 sinfo->assoc_req_ies = data; 6072 sinfo->assoc_req_ies_len = e->datalen; 6073 generation++; 6074 sinfo->generation = generation; 6075 cfg80211_new_sta(ndev, e->addr, sinfo, GFP_KERNEL); 6076 6077 kfree(sinfo); 6078 } else if ((event == BRCMF_E_DISASSOC_IND) || 6079 (event == BRCMF_E_DEAUTH_IND) || 6080 (event == BRCMF_E_DEAUTH)) { 6081 cfg80211_del_sta(ndev, e->addr, GFP_KERNEL); 6082 } 6083 return 0; 6084 } 6085 6086 static s32 6087 brcmf_notify_connect_status(struct brcmf_if *ifp, 6088 const struct brcmf_event_msg *e, void *data) 6089 { 6090 struct brcmf_cfg80211_info *cfg = ifp->drvr->config; 6091 struct net_device *ndev = ifp->ndev; 6092 struct brcmf_cfg80211_profile *profile = &ifp->vif->profile; 6093 struct ieee80211_channel *chan; 6094 s32 err = 0; 6095 6096 if ((e->event_code == BRCMF_E_DEAUTH) || 6097 (e->event_code == BRCMF_E_DEAUTH_IND) || 6098 (e->event_code == BRCMF_E_DISASSOC_IND) || 6099 ((e->event_code == BRCMF_E_LINK) && (!e->flags))) { 6100 brcmf_proto_delete_peer(ifp->drvr, ifp->ifidx, (u8 *)e->addr); 6101 } 6102 6103 if (brcmf_is_apmode(ifp->vif)) { 6104 err = brcmf_notify_connect_status_ap(cfg, ndev, e, data); 6105 } else if (brcmf_is_linkup(ifp->vif, e)) { 6106 brcmf_dbg(CONN, "Linkup\n"); 6107 if (brcmf_is_ibssmode(ifp->vif)) { 6108 brcmf_inform_ibss(cfg, ndev, e->addr); 6109 chan = ieee80211_get_channel(cfg->wiphy, cfg->channel); 6110 memcpy(profile->bssid, e->addr, ETH_ALEN); 6111 cfg80211_ibss_joined(ndev, e->addr, chan, GFP_KERNEL); 6112 clear_bit(BRCMF_VIF_STATUS_CONNECTING, 6113 &ifp->vif->sme_state); 6114 set_bit(BRCMF_VIF_STATUS_CONNECTED, 6115 &ifp->vif->sme_state); 6116 } else 6117 brcmf_bss_connect_done(cfg, ndev, e, true); 6118 brcmf_net_setcarrier(ifp, true); 6119 } else if (brcmf_is_linkdown(ifp->vif, e)) { 6120 brcmf_dbg(CONN, "Linkdown\n"); 6121 if (!brcmf_is_ibssmode(ifp->vif) && 6122 test_bit(BRCMF_VIF_STATUS_CONNECTED, 6123 &ifp->vif->sme_state)) { 6124 if (memcmp(profile->bssid, e->addr, ETH_ALEN)) 6125 return err; 6126 6127 brcmf_bss_connect_done(cfg, ndev, e, false); 6128 brcmf_link_down(ifp->vif, 6129 brcmf_map_fw_linkdown_reason(e), 6130 e->event_code & 6131 (BRCMF_E_DEAUTH_IND | 6132 BRCMF_E_DISASSOC_IND) 6133 ? false : true); 6134 brcmf_init_prof(ndev_to_prof(ndev)); 6135 if (ndev != cfg_to_ndev(cfg)) 6136 complete(&cfg->vif_disabled); 6137 brcmf_net_setcarrier(ifp, false); 6138 } 6139 } else if (brcmf_is_nonetwork(cfg, e)) { 6140 if (brcmf_is_ibssmode(ifp->vif)) 6141 clear_bit(BRCMF_VIF_STATUS_CONNECTING, 6142 &ifp->vif->sme_state); 6143 else 6144 brcmf_bss_connect_done(cfg, ndev, e, false); 6145 } 6146 6147 return err; 6148 } 6149 6150 static s32 6151 brcmf_notify_roaming_status(struct brcmf_if *ifp, 6152 const struct brcmf_event_msg *e, void *data) 6153 { 6154 struct brcmf_cfg80211_info *cfg = ifp->drvr->config; 6155 u32 event = e->event_code; 6156 u32 status = e->status; 6157 6158 if (event == BRCMF_E_ROAM && status == BRCMF_E_STATUS_SUCCESS) { 6159 if (test_bit(BRCMF_VIF_STATUS_CONNECTED, 6160 &ifp->vif->sme_state)) { 6161 brcmf_bss_roaming_done(cfg, ifp->ndev, e); 6162 } else { 6163 brcmf_bss_connect_done(cfg, ifp->ndev, e, true); 6164 brcmf_net_setcarrier(ifp, true); 6165 } 6166 } 6167 6168 return 0; 6169 } 6170 6171 static s32 6172 brcmf_notify_mic_status(struct brcmf_if *ifp, 6173 const struct brcmf_event_msg *e, void *data) 6174 { 6175 u16 flags = e->flags; 6176 enum nl80211_key_type key_type; 6177 6178 if (flags & BRCMF_EVENT_MSG_GROUP) 6179 key_type = NL80211_KEYTYPE_GROUP; 6180 else 6181 key_type = NL80211_KEYTYPE_PAIRWISE; 6182 6183 cfg80211_michael_mic_failure(ifp->ndev, (u8 *)&e->addr, key_type, -1, 6184 NULL, GFP_KERNEL); 6185 6186 return 0; 6187 } 6188 6189 static s32 brcmf_notify_rssi(struct brcmf_if *ifp, 6190 const struct brcmf_event_msg *e, void *data) 6191 { 6192 struct brcmf_cfg80211_vif *vif = ifp->vif; 6193 struct brcmf_rssi_be *info = data; 6194 s32 rssi, snr, noise; 6195 s32 low, high, last; 6196 6197 if (e->datalen < sizeof(*info)) { 6198 brcmf_err("insufficient RSSI event data\n"); 6199 return 0; 6200 } 6201 6202 rssi = be32_to_cpu(info->rssi); 6203 snr = be32_to_cpu(info->snr); 6204 noise = be32_to_cpu(info->noise); 6205 6206 low = vif->cqm_rssi_low; 6207 high = vif->cqm_rssi_high; 6208 last = vif->cqm_rssi_last; 6209 6210 brcmf_dbg(TRACE, "rssi=%d snr=%d noise=%d low=%d high=%d last=%d\n", 6211 rssi, snr, noise, low, high, last); 6212 6213 vif->cqm_rssi_last = rssi; 6214 6215 if (rssi <= low || rssi == 0) { 6216 brcmf_dbg(INFO, "LOW rssi=%d\n", rssi); 6217 cfg80211_cqm_rssi_notify(ifp->ndev, 6218 NL80211_CQM_RSSI_THRESHOLD_EVENT_LOW, 6219 rssi, GFP_KERNEL); 6220 } else if (rssi > high) { 6221 brcmf_dbg(INFO, "HIGH rssi=%d\n", rssi); 6222 cfg80211_cqm_rssi_notify(ifp->ndev, 6223 NL80211_CQM_RSSI_THRESHOLD_EVENT_HIGH, 6224 rssi, GFP_KERNEL); 6225 } 6226 6227 return 0; 6228 } 6229 6230 static s32 brcmf_notify_vif_event(struct brcmf_if *ifp, 6231 const struct brcmf_event_msg *e, void *data) 6232 { 6233 struct brcmf_cfg80211_info *cfg = ifp->drvr->config; 6234 struct brcmf_if_event *ifevent = (struct brcmf_if_event *)data; 6235 struct brcmf_cfg80211_vif_event *event = &cfg->vif_event; 6236 struct brcmf_cfg80211_vif *vif; 6237 6238 brcmf_dbg(TRACE, "Enter: action %u flags %u ifidx %u bsscfgidx %u\n", 6239 ifevent->action, ifevent->flags, ifevent->ifidx, 6240 ifevent->bsscfgidx); 6241 6242 spin_lock(&event->vif_event_lock); 6243 event->action = ifevent->action; 6244 vif = event->vif; 6245 6246 switch (ifevent->action) { 6247 case BRCMF_E_IF_ADD: 6248 /* waiting process may have timed out */ 6249 if (!cfg->vif_event.vif) { 6250 spin_unlock(&event->vif_event_lock); 6251 return -EBADF; 6252 } 6253 6254 ifp->vif = vif; 6255 vif->ifp = ifp; 6256 if (ifp->ndev) { 6257 vif->wdev.netdev = ifp->ndev; 6258 ifp->ndev->ieee80211_ptr = &vif->wdev; 6259 SET_NETDEV_DEV(ifp->ndev, wiphy_dev(cfg->wiphy)); 6260 } 6261 spin_unlock(&event->vif_event_lock); 6262 wake_up(&event->vif_wq); 6263 return 0; 6264 6265 case BRCMF_E_IF_DEL: 6266 spin_unlock(&event->vif_event_lock); 6267 /* event may not be upon user request */ 6268 if (brcmf_cfg80211_vif_event_armed(cfg)) 6269 wake_up(&event->vif_wq); 6270 return 0; 6271 6272 case BRCMF_E_IF_CHANGE: 6273 spin_unlock(&event->vif_event_lock); 6274 wake_up(&event->vif_wq); 6275 return 0; 6276 6277 default: 6278 spin_unlock(&event->vif_event_lock); 6279 break; 6280 } 6281 return -EINVAL; 6282 } 6283 6284 static void brcmf_init_conf(struct brcmf_cfg80211_conf *conf) 6285 { 6286 conf->frag_threshold = (u32)-1; 6287 conf->rts_threshold = (u32)-1; 6288 conf->retry_short = (u32)-1; 6289 conf->retry_long = (u32)-1; 6290 } 6291 6292 static void brcmf_register_event_handlers(struct brcmf_cfg80211_info *cfg) 6293 { 6294 brcmf_fweh_register(cfg->pub, BRCMF_E_LINK, 6295 brcmf_notify_connect_status); 6296 brcmf_fweh_register(cfg->pub, BRCMF_E_DEAUTH_IND, 6297 brcmf_notify_connect_status); 6298 brcmf_fweh_register(cfg->pub, BRCMF_E_DEAUTH, 6299 brcmf_notify_connect_status); 6300 brcmf_fweh_register(cfg->pub, BRCMF_E_DISASSOC_IND, 6301 brcmf_notify_connect_status); 6302 brcmf_fweh_register(cfg->pub, BRCMF_E_ASSOC_IND, 6303 brcmf_notify_connect_status); 6304 brcmf_fweh_register(cfg->pub, BRCMF_E_REASSOC_IND, 6305 brcmf_notify_connect_status); 6306 brcmf_fweh_register(cfg->pub, BRCMF_E_ROAM, 6307 brcmf_notify_roaming_status); 6308 brcmf_fweh_register(cfg->pub, BRCMF_E_MIC_ERROR, 6309 brcmf_notify_mic_status); 6310 brcmf_fweh_register(cfg->pub, BRCMF_E_SET_SSID, 6311 brcmf_notify_connect_status); 6312 brcmf_fweh_register(cfg->pub, BRCMF_E_PFN_NET_FOUND, 6313 brcmf_notify_sched_scan_results); 6314 brcmf_fweh_register(cfg->pub, BRCMF_E_IF, 6315 brcmf_notify_vif_event); 6316 brcmf_fweh_register(cfg->pub, BRCMF_E_P2P_PROBEREQ_MSG, 6317 brcmf_p2p_notify_rx_mgmt_p2p_probereq); 6318 brcmf_fweh_register(cfg->pub, BRCMF_E_P2P_DISC_LISTEN_COMPLETE, 6319 brcmf_p2p_notify_listen_complete); 6320 brcmf_fweh_register(cfg->pub, BRCMF_E_ACTION_FRAME_RX, 6321 brcmf_p2p_notify_action_frame_rx); 6322 brcmf_fweh_register(cfg->pub, BRCMF_E_ACTION_FRAME_COMPLETE, 6323 brcmf_p2p_notify_action_tx_complete); 6324 brcmf_fweh_register(cfg->pub, BRCMF_E_ACTION_FRAME_OFF_CHAN_COMPLETE, 6325 brcmf_p2p_notify_action_tx_complete); 6326 brcmf_fweh_register(cfg->pub, BRCMF_E_PSK_SUP, 6327 brcmf_notify_connect_status); 6328 brcmf_fweh_register(cfg->pub, BRCMF_E_RSSI, brcmf_notify_rssi); 6329 } 6330 6331 static void brcmf_deinit_priv_mem(struct brcmf_cfg80211_info *cfg) 6332 { 6333 kfree(cfg->conf); 6334 cfg->conf = NULL; 6335 kfree(cfg->extra_buf); 6336 cfg->extra_buf = NULL; 6337 kfree(cfg->wowl.nd); 6338 cfg->wowl.nd = NULL; 6339 kfree(cfg->wowl.nd_info); 6340 cfg->wowl.nd_info = NULL; 6341 kfree(cfg->escan_info.escan_buf); 6342 cfg->escan_info.escan_buf = NULL; 6343 } 6344 6345 static s32 brcmf_init_priv_mem(struct brcmf_cfg80211_info *cfg) 6346 { 6347 cfg->conf = kzalloc(sizeof(*cfg->conf), GFP_KERNEL); 6348 if (!cfg->conf) 6349 goto init_priv_mem_out; 6350 cfg->extra_buf = kzalloc(WL_EXTRA_BUF_MAX, GFP_KERNEL); 6351 if (!cfg->extra_buf) 6352 goto init_priv_mem_out; 6353 cfg->wowl.nd = kzalloc(sizeof(*cfg->wowl.nd) + sizeof(u32), GFP_KERNEL); 6354 if (!cfg->wowl.nd) 6355 goto init_priv_mem_out; 6356 cfg->wowl.nd_info = kzalloc(sizeof(*cfg->wowl.nd_info) + 6357 sizeof(struct cfg80211_wowlan_nd_match *), 6358 GFP_KERNEL); 6359 if (!cfg->wowl.nd_info) 6360 goto init_priv_mem_out; 6361 cfg->escan_info.escan_buf = kzalloc(BRCMF_ESCAN_BUF_SIZE, GFP_KERNEL); 6362 if (!cfg->escan_info.escan_buf) 6363 goto init_priv_mem_out; 6364 6365 return 0; 6366 6367 init_priv_mem_out: 6368 brcmf_deinit_priv_mem(cfg); 6369 6370 return -ENOMEM; 6371 } 6372 6373 static s32 wl_init_priv(struct brcmf_cfg80211_info *cfg) 6374 { 6375 s32 err = 0; 6376 6377 cfg->scan_request = NULL; 6378 cfg->pwr_save = true; 6379 cfg->dongle_up = false; /* dongle is not up yet */ 6380 err = brcmf_init_priv_mem(cfg); 6381 if (err) 6382 return err; 6383 brcmf_register_event_handlers(cfg); 6384 mutex_init(&cfg->usr_sync); 6385 brcmf_init_escan(cfg); 6386 brcmf_init_conf(cfg->conf); 6387 brcmf_init_wmm_prio(cfg->ac_priority); 6388 init_completion(&cfg->vif_disabled); 6389 return err; 6390 } 6391 6392 static void wl_deinit_priv(struct brcmf_cfg80211_info *cfg) 6393 { 6394 cfg->dongle_up = false; /* dongle down */ 6395 brcmf_abort_scanning(cfg); 6396 brcmf_deinit_priv_mem(cfg); 6397 } 6398 6399 static void init_vif_event(struct brcmf_cfg80211_vif_event *event) 6400 { 6401 init_waitqueue_head(&event->vif_wq); 6402 spin_lock_init(&event->vif_event_lock); 6403 } 6404 6405 static s32 brcmf_dongle_roam(struct brcmf_if *ifp) 6406 { 6407 struct brcmf_pub *drvr = ifp->drvr; 6408 s32 err; 6409 u32 bcn_timeout; 6410 __le32 roamtrigger[2]; 6411 __le32 roam_delta[2]; 6412 6413 /* Configure beacon timeout value based upon roaming setting */ 6414 if (ifp->drvr->settings->roamoff) 6415 bcn_timeout = BRCMF_DEFAULT_BCN_TIMEOUT_ROAM_OFF; 6416 else 6417 bcn_timeout = BRCMF_DEFAULT_BCN_TIMEOUT_ROAM_ON; 6418 err = brcmf_fil_iovar_int_set(ifp, "bcn_timeout", bcn_timeout); 6419 if (err) { 6420 bphy_err(drvr, "bcn_timeout error (%d)\n", err); 6421 goto roam_setup_done; 6422 } 6423 6424 /* Enable/Disable built-in roaming to allow supplicant to take care of 6425 * roaming. 6426 */ 6427 brcmf_dbg(INFO, "Internal Roaming = %s\n", 6428 ifp->drvr->settings->roamoff ? "Off" : "On"); 6429 err = brcmf_fil_iovar_int_set(ifp, "roam_off", 6430 ifp->drvr->settings->roamoff); 6431 if (err) { 6432 bphy_err(drvr, "roam_off error (%d)\n", err); 6433 goto roam_setup_done; 6434 } 6435 6436 roamtrigger[0] = cpu_to_le32(WL_ROAM_TRIGGER_LEVEL); 6437 roamtrigger[1] = cpu_to_le32(BRCM_BAND_ALL); 6438 err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_ROAM_TRIGGER, 6439 (void *)roamtrigger, sizeof(roamtrigger)); 6440 if (err) 6441 bphy_err(drvr, "WLC_SET_ROAM_TRIGGER error (%d)\n", err); 6442 6443 roam_delta[0] = cpu_to_le32(WL_ROAM_DELTA); 6444 roam_delta[1] = cpu_to_le32(BRCM_BAND_ALL); 6445 err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_ROAM_DELTA, 6446 (void *)roam_delta, sizeof(roam_delta)); 6447 if (err) 6448 bphy_err(drvr, "WLC_SET_ROAM_DELTA error (%d)\n", err); 6449 6450 return 0; 6451 6452 roam_setup_done: 6453 return err; 6454 } 6455 6456 static s32 6457 brcmf_dongle_scantime(struct brcmf_if *ifp) 6458 { 6459 struct brcmf_pub *drvr = ifp->drvr; 6460 s32 err = 0; 6461 6462 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_SCAN_CHANNEL_TIME, 6463 BRCMF_SCAN_CHANNEL_TIME); 6464 if (err) { 6465 bphy_err(drvr, "Scan assoc time error (%d)\n", err); 6466 goto dongle_scantime_out; 6467 } 6468 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_SCAN_UNASSOC_TIME, 6469 BRCMF_SCAN_UNASSOC_TIME); 6470 if (err) { 6471 bphy_err(drvr, "Scan unassoc time error (%d)\n", err); 6472 goto dongle_scantime_out; 6473 } 6474 6475 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_SCAN_PASSIVE_TIME, 6476 BRCMF_SCAN_PASSIVE_TIME); 6477 if (err) { 6478 bphy_err(drvr, "Scan passive time error (%d)\n", err); 6479 goto dongle_scantime_out; 6480 } 6481 6482 dongle_scantime_out: 6483 return err; 6484 } 6485 6486 static void brcmf_update_bw40_channel_flag(struct ieee80211_channel *channel, 6487 struct brcmu_chan *ch) 6488 { 6489 u32 ht40_flag; 6490 6491 ht40_flag = channel->flags & IEEE80211_CHAN_NO_HT40; 6492 if (ch->sb == BRCMU_CHAN_SB_U) { 6493 if (ht40_flag == IEEE80211_CHAN_NO_HT40) 6494 channel->flags &= ~IEEE80211_CHAN_NO_HT40; 6495 channel->flags |= IEEE80211_CHAN_NO_HT40PLUS; 6496 } else { 6497 /* It should be one of 6498 * IEEE80211_CHAN_NO_HT40 or 6499 * IEEE80211_CHAN_NO_HT40PLUS 6500 */ 6501 channel->flags &= ~IEEE80211_CHAN_NO_HT40; 6502 if (ht40_flag == IEEE80211_CHAN_NO_HT40) 6503 channel->flags |= IEEE80211_CHAN_NO_HT40MINUS; 6504 } 6505 } 6506 6507 static int brcmf_construct_chaninfo(struct brcmf_cfg80211_info *cfg, 6508 u32 bw_cap[]) 6509 { 6510 struct wiphy *wiphy = cfg_to_wiphy(cfg); 6511 struct brcmf_pub *drvr = cfg->pub; 6512 struct brcmf_if *ifp = brcmf_get_ifp(drvr, 0); 6513 struct ieee80211_supported_band *band; 6514 struct ieee80211_channel *channel; 6515 struct brcmf_chanspec_list *list; 6516 struct brcmu_chan ch; 6517 int err; 6518 u8 *pbuf; 6519 u32 i, j; 6520 u32 total; 6521 u32 chaninfo; 6522 6523 pbuf = kzalloc(BRCMF_DCMD_MEDLEN, GFP_KERNEL); 6524 6525 if (pbuf == NULL) 6526 return -ENOMEM; 6527 6528 list = (struct brcmf_chanspec_list *)pbuf; 6529 6530 err = brcmf_fil_iovar_data_get(ifp, "chanspecs", pbuf, 6531 BRCMF_DCMD_MEDLEN); 6532 if (err) { 6533 bphy_err(drvr, "get chanspecs error (%d)\n", err); 6534 goto fail_pbuf; 6535 } 6536 6537 band = wiphy->bands[NL80211_BAND_2GHZ]; 6538 if (band) 6539 for (i = 0; i < band->n_channels; i++) 6540 band->channels[i].flags = IEEE80211_CHAN_DISABLED; 6541 band = wiphy->bands[NL80211_BAND_5GHZ]; 6542 if (band) 6543 for (i = 0; i < band->n_channels; i++) 6544 band->channels[i].flags = IEEE80211_CHAN_DISABLED; 6545 6546 total = le32_to_cpu(list->count); 6547 for (i = 0; i < total; i++) { 6548 ch.chspec = (u16)le32_to_cpu(list->element[i]); 6549 cfg->d11inf.decchspec(&ch); 6550 6551 if (ch.band == BRCMU_CHAN_BAND_2G) { 6552 band = wiphy->bands[NL80211_BAND_2GHZ]; 6553 } else if (ch.band == BRCMU_CHAN_BAND_5G) { 6554 band = wiphy->bands[NL80211_BAND_5GHZ]; 6555 } else { 6556 bphy_err(drvr, "Invalid channel Spec. 0x%x.\n", 6557 ch.chspec); 6558 continue; 6559 } 6560 if (!band) 6561 continue; 6562 if (!(bw_cap[band->band] & WLC_BW_40MHZ_BIT) && 6563 ch.bw == BRCMU_CHAN_BW_40) 6564 continue; 6565 if (!(bw_cap[band->band] & WLC_BW_80MHZ_BIT) && 6566 ch.bw == BRCMU_CHAN_BW_80) 6567 continue; 6568 6569 channel = NULL; 6570 for (j = 0; j < band->n_channels; j++) { 6571 if (band->channels[j].hw_value == ch.control_ch_num) { 6572 channel = &band->channels[j]; 6573 break; 6574 } 6575 } 6576 if (!channel) { 6577 /* It seems firmware supports some channel we never 6578 * considered. Something new in IEEE standard? 6579 */ 6580 bphy_err(drvr, "Ignoring unexpected firmware channel %d\n", 6581 ch.control_ch_num); 6582 continue; 6583 } 6584 6585 if (channel->orig_flags & IEEE80211_CHAN_DISABLED) 6586 continue; 6587 6588 /* assuming the chanspecs order is HT20, 6589 * HT40 upper, HT40 lower, and VHT80. 6590 */ 6591 switch (ch.bw) { 6592 case BRCMU_CHAN_BW_160: 6593 channel->flags &= ~IEEE80211_CHAN_NO_160MHZ; 6594 break; 6595 case BRCMU_CHAN_BW_80: 6596 channel->flags &= ~IEEE80211_CHAN_NO_80MHZ; 6597 break; 6598 case BRCMU_CHAN_BW_40: 6599 brcmf_update_bw40_channel_flag(channel, &ch); 6600 break; 6601 default: 6602 wiphy_warn(wiphy, "Firmware reported unsupported bandwidth %d\n", 6603 ch.bw); 6604 fallthrough; 6605 case BRCMU_CHAN_BW_20: 6606 /* enable the channel and disable other bandwidths 6607 * for now as mentioned order assure they are enabled 6608 * for subsequent chanspecs. 6609 */ 6610 channel->flags = IEEE80211_CHAN_NO_HT40 | 6611 IEEE80211_CHAN_NO_80MHZ | 6612 IEEE80211_CHAN_NO_160MHZ; 6613 ch.bw = BRCMU_CHAN_BW_20; 6614 cfg->d11inf.encchspec(&ch); 6615 chaninfo = ch.chspec; 6616 err = brcmf_fil_bsscfg_int_get(ifp, "per_chan_info", 6617 &chaninfo); 6618 if (!err) { 6619 if (chaninfo & WL_CHAN_RADAR) 6620 channel->flags |= 6621 (IEEE80211_CHAN_RADAR | 6622 IEEE80211_CHAN_NO_IR); 6623 if (chaninfo & WL_CHAN_PASSIVE) 6624 channel->flags |= 6625 IEEE80211_CHAN_NO_IR; 6626 } 6627 } 6628 } 6629 6630 fail_pbuf: 6631 kfree(pbuf); 6632 return err; 6633 } 6634 6635 static int brcmf_enable_bw40_2g(struct brcmf_cfg80211_info *cfg) 6636 { 6637 struct brcmf_pub *drvr = cfg->pub; 6638 struct brcmf_if *ifp = brcmf_get_ifp(drvr, 0); 6639 struct ieee80211_supported_band *band; 6640 struct brcmf_fil_bwcap_le band_bwcap; 6641 struct brcmf_chanspec_list *list; 6642 u8 *pbuf; 6643 u32 val; 6644 int err; 6645 struct brcmu_chan ch; 6646 u32 num_chan; 6647 int i, j; 6648 6649 /* verify support for bw_cap command */ 6650 val = WLC_BAND_5G; 6651 err = brcmf_fil_iovar_int_get(ifp, "bw_cap", &val); 6652 6653 if (!err) { 6654 /* only set 2G bandwidth using bw_cap command */ 6655 band_bwcap.band = cpu_to_le32(WLC_BAND_2G); 6656 band_bwcap.bw_cap = cpu_to_le32(WLC_BW_CAP_40MHZ); 6657 err = brcmf_fil_iovar_data_set(ifp, "bw_cap", &band_bwcap, 6658 sizeof(band_bwcap)); 6659 } else { 6660 brcmf_dbg(INFO, "fallback to mimo_bw_cap\n"); 6661 val = WLC_N_BW_40ALL; 6662 err = brcmf_fil_iovar_int_set(ifp, "mimo_bw_cap", val); 6663 } 6664 6665 if (!err) { 6666 /* update channel info in 2G band */ 6667 pbuf = kzalloc(BRCMF_DCMD_MEDLEN, GFP_KERNEL); 6668 6669 if (pbuf == NULL) 6670 return -ENOMEM; 6671 6672 ch.band = BRCMU_CHAN_BAND_2G; 6673 ch.bw = BRCMU_CHAN_BW_40; 6674 ch.sb = BRCMU_CHAN_SB_NONE; 6675 ch.chnum = 0; 6676 cfg->d11inf.encchspec(&ch); 6677 6678 /* pass encoded chanspec in query */ 6679 *(__le16 *)pbuf = cpu_to_le16(ch.chspec); 6680 6681 err = brcmf_fil_iovar_data_get(ifp, "chanspecs", pbuf, 6682 BRCMF_DCMD_MEDLEN); 6683 if (err) { 6684 bphy_err(drvr, "get chanspecs error (%d)\n", err); 6685 kfree(pbuf); 6686 return err; 6687 } 6688 6689 band = cfg_to_wiphy(cfg)->bands[NL80211_BAND_2GHZ]; 6690 list = (struct brcmf_chanspec_list *)pbuf; 6691 num_chan = le32_to_cpu(list->count); 6692 for (i = 0; i < num_chan; i++) { 6693 ch.chspec = (u16)le32_to_cpu(list->element[i]); 6694 cfg->d11inf.decchspec(&ch); 6695 if (WARN_ON(ch.band != BRCMU_CHAN_BAND_2G)) 6696 continue; 6697 if (WARN_ON(ch.bw != BRCMU_CHAN_BW_40)) 6698 continue; 6699 for (j = 0; j < band->n_channels; j++) { 6700 if (band->channels[j].hw_value == ch.control_ch_num) 6701 break; 6702 } 6703 if (WARN_ON(j == band->n_channels)) 6704 continue; 6705 6706 brcmf_update_bw40_channel_flag(&band->channels[j], &ch); 6707 } 6708 kfree(pbuf); 6709 } 6710 return err; 6711 } 6712 6713 static void brcmf_get_bwcap(struct brcmf_if *ifp, u32 bw_cap[]) 6714 { 6715 struct brcmf_pub *drvr = ifp->drvr; 6716 u32 band, mimo_bwcap; 6717 int err; 6718 6719 band = WLC_BAND_2G; 6720 err = brcmf_fil_iovar_int_get(ifp, "bw_cap", &band); 6721 if (!err) { 6722 bw_cap[NL80211_BAND_2GHZ] = band; 6723 band = WLC_BAND_5G; 6724 err = brcmf_fil_iovar_int_get(ifp, "bw_cap", &band); 6725 if (!err) { 6726 bw_cap[NL80211_BAND_5GHZ] = band; 6727 return; 6728 } 6729 WARN_ON(1); 6730 return; 6731 } 6732 brcmf_dbg(INFO, "fallback to mimo_bw_cap info\n"); 6733 mimo_bwcap = 0; 6734 err = brcmf_fil_iovar_int_get(ifp, "mimo_bw_cap", &mimo_bwcap); 6735 if (err) 6736 /* assume 20MHz if firmware does not give a clue */ 6737 mimo_bwcap = WLC_N_BW_20ALL; 6738 6739 switch (mimo_bwcap) { 6740 case WLC_N_BW_40ALL: 6741 bw_cap[NL80211_BAND_2GHZ] |= WLC_BW_40MHZ_BIT; 6742 fallthrough; 6743 case WLC_N_BW_20IN2G_40IN5G: 6744 bw_cap[NL80211_BAND_5GHZ] |= WLC_BW_40MHZ_BIT; 6745 fallthrough; 6746 case WLC_N_BW_20ALL: 6747 bw_cap[NL80211_BAND_2GHZ] |= WLC_BW_20MHZ_BIT; 6748 bw_cap[NL80211_BAND_5GHZ] |= WLC_BW_20MHZ_BIT; 6749 break; 6750 default: 6751 bphy_err(drvr, "invalid mimo_bw_cap value\n"); 6752 } 6753 } 6754 6755 static void brcmf_update_ht_cap(struct ieee80211_supported_band *band, 6756 u32 bw_cap[2], u32 nchain) 6757 { 6758 band->ht_cap.ht_supported = true; 6759 if (bw_cap[band->band] & WLC_BW_40MHZ_BIT) { 6760 band->ht_cap.cap |= IEEE80211_HT_CAP_SGI_40; 6761 band->ht_cap.cap |= IEEE80211_HT_CAP_SUP_WIDTH_20_40; 6762 } 6763 band->ht_cap.cap |= IEEE80211_HT_CAP_SGI_20; 6764 band->ht_cap.cap |= IEEE80211_HT_CAP_DSSSCCK40; 6765 band->ht_cap.ampdu_factor = IEEE80211_HT_MAX_AMPDU_64K; 6766 band->ht_cap.ampdu_density = IEEE80211_HT_MPDU_DENSITY_16; 6767 memset(band->ht_cap.mcs.rx_mask, 0xff, nchain); 6768 band->ht_cap.mcs.tx_params = IEEE80211_HT_MCS_TX_DEFINED; 6769 } 6770 6771 static __le16 brcmf_get_mcs_map(u32 nchain, enum ieee80211_vht_mcs_support supp) 6772 { 6773 u16 mcs_map; 6774 int i; 6775 6776 for (i = 0, mcs_map = 0xFFFF; i < nchain; i++) 6777 mcs_map = (mcs_map << 2) | supp; 6778 6779 return cpu_to_le16(mcs_map); 6780 } 6781 6782 static void brcmf_update_vht_cap(struct ieee80211_supported_band *band, 6783 u32 bw_cap[2], u32 nchain, u32 txstreams, 6784 u32 txbf_bfe_cap, u32 txbf_bfr_cap) 6785 { 6786 __le16 mcs_map; 6787 6788 /* not allowed in 2.4G band */ 6789 if (band->band == NL80211_BAND_2GHZ) 6790 return; 6791 6792 band->vht_cap.vht_supported = true; 6793 /* 80MHz is mandatory */ 6794 band->vht_cap.cap |= IEEE80211_VHT_CAP_SHORT_GI_80; 6795 if (bw_cap[band->band] & WLC_BW_160MHZ_BIT) { 6796 band->vht_cap.cap |= IEEE80211_VHT_CAP_SUPP_CHAN_WIDTH_160MHZ; 6797 band->vht_cap.cap |= IEEE80211_VHT_CAP_SHORT_GI_160; 6798 } 6799 /* all support 256-QAM */ 6800 mcs_map = brcmf_get_mcs_map(nchain, IEEE80211_VHT_MCS_SUPPORT_0_9); 6801 band->vht_cap.vht_mcs.rx_mcs_map = mcs_map; 6802 band->vht_cap.vht_mcs.tx_mcs_map = mcs_map; 6803 6804 /* Beamforming support information */ 6805 if (txbf_bfe_cap & BRCMF_TXBF_SU_BFE_CAP) 6806 band->vht_cap.cap |= IEEE80211_VHT_CAP_SU_BEAMFORMEE_CAPABLE; 6807 if (txbf_bfe_cap & BRCMF_TXBF_MU_BFE_CAP) 6808 band->vht_cap.cap |= IEEE80211_VHT_CAP_MU_BEAMFORMEE_CAPABLE; 6809 if (txbf_bfr_cap & BRCMF_TXBF_SU_BFR_CAP) 6810 band->vht_cap.cap |= IEEE80211_VHT_CAP_SU_BEAMFORMER_CAPABLE; 6811 if (txbf_bfr_cap & BRCMF_TXBF_MU_BFR_CAP) 6812 band->vht_cap.cap |= IEEE80211_VHT_CAP_MU_BEAMFORMER_CAPABLE; 6813 6814 if ((txbf_bfe_cap || txbf_bfr_cap) && (txstreams > 1)) { 6815 band->vht_cap.cap |= 6816 (2 << IEEE80211_VHT_CAP_BEAMFORMEE_STS_SHIFT); 6817 band->vht_cap.cap |= ((txstreams - 1) << 6818 IEEE80211_VHT_CAP_SOUNDING_DIMENSIONS_SHIFT); 6819 band->vht_cap.cap |= 6820 IEEE80211_VHT_CAP_VHT_LINK_ADAPTATION_VHT_MRQ_MFB; 6821 } 6822 } 6823 6824 static int brcmf_setup_wiphybands(struct brcmf_cfg80211_info *cfg) 6825 { 6826 struct brcmf_pub *drvr = cfg->pub; 6827 struct brcmf_if *ifp = brcmf_get_ifp(drvr, 0); 6828 struct wiphy *wiphy = cfg_to_wiphy(cfg); 6829 u32 nmode = 0; 6830 u32 vhtmode = 0; 6831 u32 bw_cap[2] = { WLC_BW_20MHZ_BIT, WLC_BW_20MHZ_BIT }; 6832 u32 rxchain; 6833 u32 nchain; 6834 int err; 6835 s32 i; 6836 struct ieee80211_supported_band *band; 6837 u32 txstreams = 0; 6838 u32 txbf_bfe_cap = 0; 6839 u32 txbf_bfr_cap = 0; 6840 6841 (void)brcmf_fil_iovar_int_get(ifp, "vhtmode", &vhtmode); 6842 err = brcmf_fil_iovar_int_get(ifp, "nmode", &nmode); 6843 if (err) { 6844 bphy_err(drvr, "nmode error (%d)\n", err); 6845 } else { 6846 brcmf_get_bwcap(ifp, bw_cap); 6847 } 6848 brcmf_dbg(INFO, "nmode=%d, vhtmode=%d, bw_cap=(%d, %d)\n", 6849 nmode, vhtmode, bw_cap[NL80211_BAND_2GHZ], 6850 bw_cap[NL80211_BAND_5GHZ]); 6851 6852 err = brcmf_fil_iovar_int_get(ifp, "rxchain", &rxchain); 6853 if (err) { 6854 bphy_err(drvr, "rxchain error (%d)\n", err); 6855 nchain = 1; 6856 } else { 6857 for (nchain = 0; rxchain; nchain++) 6858 rxchain = rxchain & (rxchain - 1); 6859 } 6860 brcmf_dbg(INFO, "nchain=%d\n", nchain); 6861 6862 err = brcmf_construct_chaninfo(cfg, bw_cap); 6863 if (err) { 6864 bphy_err(drvr, "brcmf_construct_chaninfo failed (%d)\n", err); 6865 return err; 6866 } 6867 6868 if (vhtmode) { 6869 (void)brcmf_fil_iovar_int_get(ifp, "txstreams", &txstreams); 6870 (void)brcmf_fil_iovar_int_get(ifp, "txbf_bfe_cap", 6871 &txbf_bfe_cap); 6872 (void)brcmf_fil_iovar_int_get(ifp, "txbf_bfr_cap", 6873 &txbf_bfr_cap); 6874 } 6875 6876 for (i = 0; i < ARRAY_SIZE(wiphy->bands); i++) { 6877 band = wiphy->bands[i]; 6878 if (band == NULL) 6879 continue; 6880 6881 if (nmode) 6882 brcmf_update_ht_cap(band, bw_cap, nchain); 6883 if (vhtmode) 6884 brcmf_update_vht_cap(band, bw_cap, nchain, txstreams, 6885 txbf_bfe_cap, txbf_bfr_cap); 6886 } 6887 6888 return 0; 6889 } 6890 6891 static const struct ieee80211_txrx_stypes 6892 brcmf_txrx_stypes[NUM_NL80211_IFTYPES] = { 6893 [NL80211_IFTYPE_STATION] = { 6894 .tx = 0xffff, 6895 .rx = BIT(IEEE80211_STYPE_ACTION >> 4) | 6896 BIT(IEEE80211_STYPE_PROBE_REQ >> 4) 6897 }, 6898 [NL80211_IFTYPE_P2P_CLIENT] = { 6899 .tx = 0xffff, 6900 .rx = BIT(IEEE80211_STYPE_ACTION >> 4) | 6901 BIT(IEEE80211_STYPE_PROBE_REQ >> 4) 6902 }, 6903 [NL80211_IFTYPE_P2P_GO] = { 6904 .tx = 0xffff, 6905 .rx = BIT(IEEE80211_STYPE_ASSOC_REQ >> 4) | 6906 BIT(IEEE80211_STYPE_REASSOC_REQ >> 4) | 6907 BIT(IEEE80211_STYPE_PROBE_REQ >> 4) | 6908 BIT(IEEE80211_STYPE_DISASSOC >> 4) | 6909 BIT(IEEE80211_STYPE_AUTH >> 4) | 6910 BIT(IEEE80211_STYPE_DEAUTH >> 4) | 6911 BIT(IEEE80211_STYPE_ACTION >> 4) 6912 }, 6913 [NL80211_IFTYPE_P2P_DEVICE] = { 6914 .tx = 0xffff, 6915 .rx = BIT(IEEE80211_STYPE_ACTION >> 4) | 6916 BIT(IEEE80211_STYPE_PROBE_REQ >> 4) 6917 }, 6918 [NL80211_IFTYPE_AP] = { 6919 .tx = 0xffff, 6920 .rx = BIT(IEEE80211_STYPE_ASSOC_REQ >> 4) | 6921 BIT(IEEE80211_STYPE_REASSOC_REQ >> 4) | 6922 BIT(IEEE80211_STYPE_PROBE_REQ >> 4) | 6923 BIT(IEEE80211_STYPE_DISASSOC >> 4) | 6924 BIT(IEEE80211_STYPE_AUTH >> 4) | 6925 BIT(IEEE80211_STYPE_DEAUTH >> 4) | 6926 BIT(IEEE80211_STYPE_ACTION >> 4) 6927 } 6928 }; 6929 6930 /** 6931 * brcmf_setup_ifmodes() - determine interface modes and combinations. 6932 * 6933 * @wiphy: wiphy object. 6934 * @ifp: interface object needed for feat module api. 6935 * 6936 * The interface modes and combinations are determined dynamically here 6937 * based on firmware functionality. 6938 * 6939 * no p2p and no mbss: 6940 * 6941 * #STA <= 1, #AP <= 1, channels = 1, 2 total 6942 * 6943 * no p2p and mbss: 6944 * 6945 * #STA <= 1, #AP <= 1, channels = 1, 2 total 6946 * #AP <= 4, matching BI, channels = 1, 4 total 6947 * 6948 * no p2p and rsdb: 6949 * #STA <= 1, #AP <= 2, channels = 2, 4 total 6950 * 6951 * p2p, no mchan, and mbss: 6952 * 6953 * #STA <= 1, #P2P-DEV <= 1, #{P2P-CL, P2P-GO} <= 1, channels = 1, 3 total 6954 * #STA <= 1, #P2P-DEV <= 1, #AP <= 1, #P2P-CL <= 1, channels = 1, 4 total 6955 * #AP <= 4, matching BI, channels = 1, 4 total 6956 * 6957 * p2p, mchan, and mbss: 6958 * 6959 * #STA <= 1, #P2P-DEV <= 1, #{P2P-CL, P2P-GO} <= 1, channels = 2, 3 total 6960 * #STA <= 1, #P2P-DEV <= 1, #AP <= 1, #P2P-CL <= 1, channels = 1, 4 total 6961 * #AP <= 4, matching BI, channels = 1, 4 total 6962 * 6963 * p2p, rsdb, and no mbss: 6964 * #STA <= 1, #P2P-DEV <= 1, #{P2P-CL, P2P-GO} <= 2, AP <= 2, 6965 * channels = 2, 4 total 6966 */ 6967 static int brcmf_setup_ifmodes(struct wiphy *wiphy, struct brcmf_if *ifp) 6968 { 6969 struct ieee80211_iface_combination *combo = NULL; 6970 struct ieee80211_iface_limit *c0_limits = NULL; 6971 struct ieee80211_iface_limit *p2p_limits = NULL; 6972 struct ieee80211_iface_limit *mbss_limits = NULL; 6973 bool mon_flag, mbss, p2p, rsdb, mchan; 6974 int i, c, n_combos, n_limits; 6975 6976 mon_flag = brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MONITOR_FLAG); 6977 mbss = brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MBSS); 6978 p2p = brcmf_feat_is_enabled(ifp, BRCMF_FEAT_P2P); 6979 rsdb = brcmf_feat_is_enabled(ifp, BRCMF_FEAT_RSDB); 6980 mchan = brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MCHAN); 6981 6982 n_combos = 1 + !!(p2p && !rsdb) + !!mbss; 6983 combo = kcalloc(n_combos, sizeof(*combo), GFP_KERNEL); 6984 if (!combo) 6985 goto err; 6986 6987 wiphy->interface_modes = BIT(NL80211_IFTYPE_STATION) | 6988 BIT(NL80211_IFTYPE_ADHOC) | 6989 BIT(NL80211_IFTYPE_AP); 6990 if (mon_flag) 6991 wiphy->interface_modes |= BIT(NL80211_IFTYPE_MONITOR); 6992 if (p2p) 6993 wiphy->interface_modes |= BIT(NL80211_IFTYPE_P2P_CLIENT) | 6994 BIT(NL80211_IFTYPE_P2P_GO) | 6995 BIT(NL80211_IFTYPE_P2P_DEVICE); 6996 6997 c = 0; 6998 i = 0; 6999 n_limits = 1 + mon_flag + (p2p ? 2 : 0) + (rsdb || !p2p); 7000 c0_limits = kcalloc(n_limits, sizeof(*c0_limits), GFP_KERNEL); 7001 if (!c0_limits) 7002 goto err; 7003 7004 combo[c].num_different_channels = 1 + (rsdb || (p2p && mchan)); 7005 c0_limits[i].max = 1; 7006 c0_limits[i++].types = BIT(NL80211_IFTYPE_STATION); 7007 if (mon_flag) { 7008 c0_limits[i].max = 1; 7009 c0_limits[i++].types = BIT(NL80211_IFTYPE_MONITOR); 7010 } 7011 if (p2p) { 7012 c0_limits[i].max = 1; 7013 c0_limits[i++].types = BIT(NL80211_IFTYPE_P2P_DEVICE); 7014 c0_limits[i].max = 1 + rsdb; 7015 c0_limits[i++].types = BIT(NL80211_IFTYPE_P2P_CLIENT) | 7016 BIT(NL80211_IFTYPE_P2P_GO); 7017 } 7018 if (p2p && rsdb) { 7019 c0_limits[i].max = 2; 7020 c0_limits[i++].types = BIT(NL80211_IFTYPE_AP); 7021 combo[c].max_interfaces = 4; 7022 } else if (p2p) { 7023 combo[c].max_interfaces = i; 7024 } else if (rsdb) { 7025 c0_limits[i].max = 2; 7026 c0_limits[i++].types = BIT(NL80211_IFTYPE_AP); 7027 combo[c].max_interfaces = 3; 7028 } else { 7029 c0_limits[i].max = 1; 7030 c0_limits[i++].types = BIT(NL80211_IFTYPE_AP); 7031 combo[c].max_interfaces = i; 7032 } 7033 combo[c].n_limits = i; 7034 combo[c].limits = c0_limits; 7035 7036 if (p2p && !rsdb) { 7037 c++; 7038 i = 0; 7039 p2p_limits = kcalloc(4, sizeof(*p2p_limits), GFP_KERNEL); 7040 if (!p2p_limits) 7041 goto err; 7042 p2p_limits[i].max = 1; 7043 p2p_limits[i++].types = BIT(NL80211_IFTYPE_STATION); 7044 p2p_limits[i].max = 1; 7045 p2p_limits[i++].types = BIT(NL80211_IFTYPE_AP); 7046 p2p_limits[i].max = 1; 7047 p2p_limits[i++].types = BIT(NL80211_IFTYPE_P2P_CLIENT); 7048 p2p_limits[i].max = 1; 7049 p2p_limits[i++].types = BIT(NL80211_IFTYPE_P2P_DEVICE); 7050 combo[c].num_different_channels = 1; 7051 combo[c].max_interfaces = i; 7052 combo[c].n_limits = i; 7053 combo[c].limits = p2p_limits; 7054 } 7055 7056 if (mbss) { 7057 c++; 7058 i = 0; 7059 n_limits = 1 + mon_flag; 7060 mbss_limits = kcalloc(n_limits, sizeof(*mbss_limits), 7061 GFP_KERNEL); 7062 if (!mbss_limits) 7063 goto err; 7064 mbss_limits[i].max = 4; 7065 mbss_limits[i++].types = BIT(NL80211_IFTYPE_AP); 7066 if (mon_flag) { 7067 mbss_limits[i].max = 1; 7068 mbss_limits[i++].types = BIT(NL80211_IFTYPE_MONITOR); 7069 } 7070 combo[c].beacon_int_infra_match = true; 7071 combo[c].num_different_channels = 1; 7072 combo[c].max_interfaces = 4 + mon_flag; 7073 combo[c].n_limits = i; 7074 combo[c].limits = mbss_limits; 7075 } 7076 7077 wiphy->n_iface_combinations = n_combos; 7078 wiphy->iface_combinations = combo; 7079 return 0; 7080 7081 err: 7082 kfree(c0_limits); 7083 kfree(p2p_limits); 7084 kfree(mbss_limits); 7085 kfree(combo); 7086 return -ENOMEM; 7087 } 7088 7089 #ifdef CONFIG_PM 7090 static const struct wiphy_wowlan_support brcmf_wowlan_support = { 7091 .flags = WIPHY_WOWLAN_MAGIC_PKT | WIPHY_WOWLAN_DISCONNECT, 7092 .n_patterns = BRCMF_WOWL_MAXPATTERNS, 7093 .pattern_max_len = BRCMF_WOWL_MAXPATTERNSIZE, 7094 .pattern_min_len = 1, 7095 .max_pkt_offset = 1500, 7096 }; 7097 #endif 7098 7099 static void brcmf_wiphy_wowl_params(struct wiphy *wiphy, struct brcmf_if *ifp) 7100 { 7101 #ifdef CONFIG_PM 7102 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 7103 struct brcmf_pub *drvr = cfg->pub; 7104 struct wiphy_wowlan_support *wowl; 7105 7106 wowl = kmemdup(&brcmf_wowlan_support, sizeof(brcmf_wowlan_support), 7107 GFP_KERNEL); 7108 if (!wowl) { 7109 bphy_err(drvr, "only support basic wowlan features\n"); 7110 wiphy->wowlan = &brcmf_wowlan_support; 7111 return; 7112 } 7113 7114 if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_PNO)) { 7115 if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_WOWL_ND)) { 7116 wowl->flags |= WIPHY_WOWLAN_NET_DETECT; 7117 wowl->max_nd_match_sets = BRCMF_PNO_MAX_PFN_COUNT; 7118 init_waitqueue_head(&cfg->wowl.nd_data_wait); 7119 } 7120 } 7121 if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_WOWL_GTK)) { 7122 wowl->flags |= WIPHY_WOWLAN_SUPPORTS_GTK_REKEY; 7123 wowl->flags |= WIPHY_WOWLAN_GTK_REKEY_FAILURE; 7124 } 7125 7126 wiphy->wowlan = wowl; 7127 #endif 7128 } 7129 7130 static int brcmf_setup_wiphy(struct wiphy *wiphy, struct brcmf_if *ifp) 7131 { 7132 struct brcmf_pub *drvr = ifp->drvr; 7133 const struct ieee80211_iface_combination *combo; 7134 struct ieee80211_supported_band *band; 7135 u16 max_interfaces = 0; 7136 bool gscan; 7137 __le32 bandlist[3]; 7138 u32 n_bands; 7139 int err, i; 7140 7141 wiphy->max_scan_ssids = WL_NUM_SCAN_MAX; 7142 wiphy->max_scan_ie_len = BRCMF_SCAN_IE_LEN_MAX; 7143 wiphy->max_num_pmkids = BRCMF_MAXPMKID; 7144 7145 err = brcmf_setup_ifmodes(wiphy, ifp); 7146 if (err) 7147 return err; 7148 7149 for (i = 0, combo = wiphy->iface_combinations; 7150 i < wiphy->n_iface_combinations; i++, combo++) { 7151 max_interfaces = max(max_interfaces, combo->max_interfaces); 7152 } 7153 7154 for (i = 0; i < max_interfaces && i < ARRAY_SIZE(drvr->addresses); 7155 i++) { 7156 u8 *addr = drvr->addresses[i].addr; 7157 7158 memcpy(addr, drvr->mac, ETH_ALEN); 7159 if (i) { 7160 addr[0] |= BIT(1); 7161 addr[ETH_ALEN - 1] ^= i; 7162 } 7163 } 7164 wiphy->addresses = drvr->addresses; 7165 wiphy->n_addresses = i; 7166 7167 wiphy->signal_type = CFG80211_SIGNAL_TYPE_MBM; 7168 wiphy->cipher_suites = brcmf_cipher_suites; 7169 wiphy->n_cipher_suites = ARRAY_SIZE(brcmf_cipher_suites); 7170 if (!brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MFP)) 7171 wiphy->n_cipher_suites--; 7172 wiphy->bss_select_support = BIT(NL80211_BSS_SELECT_ATTR_RSSI) | 7173 BIT(NL80211_BSS_SELECT_ATTR_BAND_PREF) | 7174 BIT(NL80211_BSS_SELECT_ATTR_RSSI_ADJUST); 7175 7176 wiphy->flags |= WIPHY_FLAG_NETNS_OK | 7177 WIPHY_FLAG_PS_ON_BY_DEFAULT | 7178 WIPHY_FLAG_HAVE_AP_SME | 7179 WIPHY_FLAG_OFFCHAN_TX | 7180 WIPHY_FLAG_HAS_REMAIN_ON_CHANNEL; 7181 if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_TDLS)) 7182 wiphy->flags |= WIPHY_FLAG_SUPPORTS_TDLS; 7183 if (!ifp->drvr->settings->roamoff) 7184 wiphy->flags |= WIPHY_FLAG_SUPPORTS_FW_ROAM; 7185 if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_FWSUP)) { 7186 wiphy_ext_feature_set(wiphy, 7187 NL80211_EXT_FEATURE_4WAY_HANDSHAKE_STA_PSK); 7188 wiphy_ext_feature_set(wiphy, 7189 NL80211_EXT_FEATURE_4WAY_HANDSHAKE_STA_1X); 7190 if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_SAE)) 7191 wiphy_ext_feature_set(wiphy, 7192 NL80211_EXT_FEATURE_SAE_OFFLOAD); 7193 } 7194 if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_FWAUTH)) { 7195 wiphy_ext_feature_set(wiphy, 7196 NL80211_EXT_FEATURE_4WAY_HANDSHAKE_AP_PSK); 7197 if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_SAE)) 7198 wiphy_ext_feature_set(wiphy, 7199 NL80211_EXT_FEATURE_SAE_OFFLOAD_AP); 7200 } 7201 wiphy->mgmt_stypes = brcmf_txrx_stypes; 7202 wiphy->max_remain_on_channel_duration = 5000; 7203 if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_PNO)) { 7204 gscan = brcmf_feat_is_enabled(ifp, BRCMF_FEAT_GSCAN); 7205 brcmf_pno_wiphy_params(wiphy, gscan); 7206 } 7207 /* vendor commands/events support */ 7208 wiphy->vendor_commands = brcmf_vendor_cmds; 7209 wiphy->n_vendor_commands = BRCMF_VNDR_CMDS_LAST - 1; 7210 7211 if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_WOWL)) 7212 brcmf_wiphy_wowl_params(wiphy, ifp); 7213 err = brcmf_fil_cmd_data_get(ifp, BRCMF_C_GET_BANDLIST, &bandlist, 7214 sizeof(bandlist)); 7215 if (err) { 7216 bphy_err(drvr, "could not obtain band info: err=%d\n", err); 7217 return err; 7218 } 7219 /* first entry in bandlist is number of bands */ 7220 n_bands = le32_to_cpu(bandlist[0]); 7221 for (i = 1; i <= n_bands && i < ARRAY_SIZE(bandlist); i++) { 7222 if (bandlist[i] == cpu_to_le32(WLC_BAND_2G)) { 7223 band = kmemdup(&__wl_band_2ghz, sizeof(__wl_band_2ghz), 7224 GFP_KERNEL); 7225 if (!band) 7226 return -ENOMEM; 7227 7228 band->channels = kmemdup(&__wl_2ghz_channels, 7229 sizeof(__wl_2ghz_channels), 7230 GFP_KERNEL); 7231 if (!band->channels) { 7232 kfree(band); 7233 return -ENOMEM; 7234 } 7235 7236 band->n_channels = ARRAY_SIZE(__wl_2ghz_channels); 7237 wiphy->bands[NL80211_BAND_2GHZ] = band; 7238 } 7239 if (bandlist[i] == cpu_to_le32(WLC_BAND_5G)) { 7240 band = kmemdup(&__wl_band_5ghz, sizeof(__wl_band_5ghz), 7241 GFP_KERNEL); 7242 if (!band) 7243 return -ENOMEM; 7244 7245 band->channels = kmemdup(&__wl_5ghz_channels, 7246 sizeof(__wl_5ghz_channels), 7247 GFP_KERNEL); 7248 if (!band->channels) { 7249 kfree(band); 7250 return -ENOMEM; 7251 } 7252 7253 band->n_channels = ARRAY_SIZE(__wl_5ghz_channels); 7254 wiphy->bands[NL80211_BAND_5GHZ] = band; 7255 } 7256 } 7257 7258 if (wiphy->bands[NL80211_BAND_5GHZ] && 7259 brcmf_feat_is_enabled(ifp, BRCMF_FEAT_DOT11H)) 7260 wiphy_ext_feature_set(wiphy, 7261 NL80211_EXT_FEATURE_DFS_OFFLOAD); 7262 7263 wiphy_ext_feature_set(wiphy, NL80211_EXT_FEATURE_CQM_RSSI_LIST); 7264 7265 wiphy_read_of_freq_limits(wiphy); 7266 7267 return 0; 7268 } 7269 7270 static s32 brcmf_config_dongle(struct brcmf_cfg80211_info *cfg) 7271 { 7272 struct brcmf_pub *drvr = cfg->pub; 7273 struct net_device *ndev; 7274 struct wireless_dev *wdev; 7275 struct brcmf_if *ifp; 7276 s32 power_mode; 7277 s32 err = 0; 7278 7279 if (cfg->dongle_up) 7280 return err; 7281 7282 ndev = cfg_to_ndev(cfg); 7283 wdev = ndev->ieee80211_ptr; 7284 ifp = netdev_priv(ndev); 7285 7286 /* make sure RF is ready for work */ 7287 brcmf_fil_cmd_int_set(ifp, BRCMF_C_UP, 0); 7288 7289 brcmf_dongle_scantime(ifp); 7290 7291 power_mode = cfg->pwr_save ? PM_FAST : PM_OFF; 7292 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_PM, power_mode); 7293 if (err) 7294 goto default_conf_out; 7295 brcmf_dbg(INFO, "power save set to %s\n", 7296 (power_mode ? "enabled" : "disabled")); 7297 7298 err = brcmf_dongle_roam(ifp); 7299 if (err) 7300 goto default_conf_out; 7301 err = brcmf_cfg80211_change_iface(wdev->wiphy, ndev, wdev->iftype, 7302 NULL); 7303 if (err) 7304 goto default_conf_out; 7305 7306 brcmf_configure_arp_nd_offload(ifp, true); 7307 7308 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_FAKEFRAG, 1); 7309 if (err) { 7310 bphy_err(drvr, "failed to set frameburst mode\n"); 7311 goto default_conf_out; 7312 } 7313 7314 cfg->dongle_up = true; 7315 default_conf_out: 7316 7317 return err; 7318 7319 } 7320 7321 static s32 __brcmf_cfg80211_up(struct brcmf_if *ifp) 7322 { 7323 set_bit(BRCMF_VIF_STATUS_READY, &ifp->vif->sme_state); 7324 7325 return brcmf_config_dongle(ifp->drvr->config); 7326 } 7327 7328 static s32 __brcmf_cfg80211_down(struct brcmf_if *ifp) 7329 { 7330 struct brcmf_cfg80211_info *cfg = ifp->drvr->config; 7331 7332 /* 7333 * While going down, if associated with AP disassociate 7334 * from AP to save power 7335 */ 7336 if (check_vif_up(ifp->vif)) { 7337 brcmf_link_down(ifp->vif, WLAN_REASON_UNSPECIFIED, true); 7338 7339 /* Make sure WPA_Supplicant receives all the event 7340 generated due to DISASSOC call to the fw to keep 7341 the state fw and WPA_Supplicant state consistent 7342 */ 7343 brcmf_delay(500); 7344 } 7345 7346 brcmf_abort_scanning(cfg); 7347 clear_bit(BRCMF_VIF_STATUS_READY, &ifp->vif->sme_state); 7348 7349 return 0; 7350 } 7351 7352 s32 brcmf_cfg80211_up(struct net_device *ndev) 7353 { 7354 struct brcmf_if *ifp = netdev_priv(ndev); 7355 struct brcmf_cfg80211_info *cfg = ifp->drvr->config; 7356 s32 err = 0; 7357 7358 mutex_lock(&cfg->usr_sync); 7359 err = __brcmf_cfg80211_up(ifp); 7360 mutex_unlock(&cfg->usr_sync); 7361 7362 return err; 7363 } 7364 7365 s32 brcmf_cfg80211_down(struct net_device *ndev) 7366 { 7367 struct brcmf_if *ifp = netdev_priv(ndev); 7368 struct brcmf_cfg80211_info *cfg = ifp->drvr->config; 7369 s32 err = 0; 7370 7371 mutex_lock(&cfg->usr_sync); 7372 err = __brcmf_cfg80211_down(ifp); 7373 mutex_unlock(&cfg->usr_sync); 7374 7375 return err; 7376 } 7377 7378 enum nl80211_iftype brcmf_cfg80211_get_iftype(struct brcmf_if *ifp) 7379 { 7380 struct wireless_dev *wdev = &ifp->vif->wdev; 7381 7382 return wdev->iftype; 7383 } 7384 7385 bool brcmf_get_vif_state_any(struct brcmf_cfg80211_info *cfg, 7386 unsigned long state) 7387 { 7388 struct brcmf_cfg80211_vif *vif; 7389 7390 list_for_each_entry(vif, &cfg->vif_list, list) { 7391 if (test_bit(state, &vif->sme_state)) 7392 return true; 7393 } 7394 return false; 7395 } 7396 7397 static inline bool vif_event_equals(struct brcmf_cfg80211_vif_event *event, 7398 u8 action) 7399 { 7400 u8 evt_action; 7401 7402 spin_lock(&event->vif_event_lock); 7403 evt_action = event->action; 7404 spin_unlock(&event->vif_event_lock); 7405 return evt_action == action; 7406 } 7407 7408 void brcmf_cfg80211_arm_vif_event(struct brcmf_cfg80211_info *cfg, 7409 struct brcmf_cfg80211_vif *vif) 7410 { 7411 struct brcmf_cfg80211_vif_event *event = &cfg->vif_event; 7412 7413 spin_lock(&event->vif_event_lock); 7414 event->vif = vif; 7415 event->action = 0; 7416 spin_unlock(&event->vif_event_lock); 7417 } 7418 7419 bool brcmf_cfg80211_vif_event_armed(struct brcmf_cfg80211_info *cfg) 7420 { 7421 struct brcmf_cfg80211_vif_event *event = &cfg->vif_event; 7422 bool armed; 7423 7424 spin_lock(&event->vif_event_lock); 7425 armed = event->vif != NULL; 7426 spin_unlock(&event->vif_event_lock); 7427 7428 return armed; 7429 } 7430 7431 int brcmf_cfg80211_wait_vif_event(struct brcmf_cfg80211_info *cfg, 7432 u8 action, ulong timeout) 7433 { 7434 struct brcmf_cfg80211_vif_event *event = &cfg->vif_event; 7435 7436 return wait_event_timeout(event->vif_wq, 7437 vif_event_equals(event, action), timeout); 7438 } 7439 7440 static s32 brcmf_translate_country_code(struct brcmf_pub *drvr, char alpha2[2], 7441 struct brcmf_fil_country_le *ccreq) 7442 { 7443 struct brcmfmac_pd_cc *country_codes; 7444 struct brcmfmac_pd_cc_entry *cc; 7445 s32 found_index; 7446 int i; 7447 7448 if ((alpha2[0] == ccreq->country_abbrev[0]) && 7449 (alpha2[1] == ccreq->country_abbrev[1])) { 7450 brcmf_dbg(TRACE, "Country code already set\n"); 7451 return -EAGAIN; 7452 } 7453 7454 country_codes = drvr->settings->country_codes; 7455 if (!country_codes) { 7456 brcmf_dbg(TRACE, "No country codes configured for device, using ISO3166 code and 0 rev\n"); 7457 memset(ccreq, 0, sizeof(*ccreq)); 7458 ccreq->country_abbrev[0] = alpha2[0]; 7459 ccreq->country_abbrev[1] = alpha2[1]; 7460 ccreq->ccode[0] = alpha2[0]; 7461 ccreq->ccode[1] = alpha2[1]; 7462 return 0; 7463 } 7464 7465 found_index = -1; 7466 for (i = 0; i < country_codes->table_size; i++) { 7467 cc = &country_codes->table[i]; 7468 if ((cc->iso3166[0] == '\0') && (found_index == -1)) 7469 found_index = i; 7470 if ((cc->iso3166[0] == alpha2[0]) && 7471 (cc->iso3166[1] == alpha2[1])) { 7472 found_index = i; 7473 break; 7474 } 7475 } 7476 if (found_index == -1) { 7477 brcmf_dbg(TRACE, "No country code match found\n"); 7478 return -EINVAL; 7479 } 7480 memset(ccreq, 0, sizeof(*ccreq)); 7481 ccreq->rev = cpu_to_le32(country_codes->table[found_index].rev); 7482 memcpy(ccreq->ccode, country_codes->table[found_index].cc, 7483 BRCMF_COUNTRY_BUF_SZ); 7484 ccreq->country_abbrev[0] = alpha2[0]; 7485 ccreq->country_abbrev[1] = alpha2[1]; 7486 ccreq->country_abbrev[2] = 0; 7487 7488 return 0; 7489 } 7490 7491 static void brcmf_cfg80211_reg_notifier(struct wiphy *wiphy, 7492 struct regulatory_request *req) 7493 { 7494 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 7495 struct brcmf_if *ifp = brcmf_get_ifp(cfg->pub, 0); 7496 struct brcmf_pub *drvr = cfg->pub; 7497 struct brcmf_fil_country_le ccreq; 7498 s32 err; 7499 int i; 7500 7501 /* The country code gets set to "00" by default at boot, ignore */ 7502 if (req->alpha2[0] == '0' && req->alpha2[1] == '0') 7503 return; 7504 7505 /* ignore non-ISO3166 country codes */ 7506 for (i = 0; i < 2; i++) 7507 if (req->alpha2[i] < 'A' || req->alpha2[i] > 'Z') { 7508 bphy_err(drvr, "not an ISO3166 code (0x%02x 0x%02x)\n", 7509 req->alpha2[0], req->alpha2[1]); 7510 return; 7511 } 7512 7513 brcmf_dbg(TRACE, "Enter: initiator=%d, alpha=%c%c\n", req->initiator, 7514 req->alpha2[0], req->alpha2[1]); 7515 7516 err = brcmf_fil_iovar_data_get(ifp, "country", &ccreq, sizeof(ccreq)); 7517 if (err) { 7518 bphy_err(drvr, "Country code iovar returned err = %d\n", err); 7519 return; 7520 } 7521 7522 err = brcmf_translate_country_code(ifp->drvr, req->alpha2, &ccreq); 7523 if (err) 7524 return; 7525 7526 err = brcmf_fil_iovar_data_set(ifp, "country", &ccreq, sizeof(ccreq)); 7527 if (err) { 7528 bphy_err(drvr, "Firmware rejected country setting\n"); 7529 return; 7530 } 7531 brcmf_setup_wiphybands(cfg); 7532 } 7533 7534 static void brcmf_free_wiphy(struct wiphy *wiphy) 7535 { 7536 int i; 7537 7538 if (!wiphy) 7539 return; 7540 7541 if (wiphy->iface_combinations) { 7542 for (i = 0; i < wiphy->n_iface_combinations; i++) 7543 kfree(wiphy->iface_combinations[i].limits); 7544 } 7545 kfree(wiphy->iface_combinations); 7546 if (wiphy->bands[NL80211_BAND_2GHZ]) { 7547 kfree(wiphy->bands[NL80211_BAND_2GHZ]->channels); 7548 kfree(wiphy->bands[NL80211_BAND_2GHZ]); 7549 } 7550 if (wiphy->bands[NL80211_BAND_5GHZ]) { 7551 kfree(wiphy->bands[NL80211_BAND_5GHZ]->channels); 7552 kfree(wiphy->bands[NL80211_BAND_5GHZ]); 7553 } 7554 #if IS_ENABLED(CONFIG_PM) 7555 if (wiphy->wowlan != &brcmf_wowlan_support) 7556 kfree(wiphy->wowlan); 7557 #endif 7558 } 7559 7560 struct brcmf_cfg80211_info *brcmf_cfg80211_attach(struct brcmf_pub *drvr, 7561 struct cfg80211_ops *ops, 7562 bool p2pdev_forced) 7563 { 7564 struct wiphy *wiphy = drvr->wiphy; 7565 struct net_device *ndev = brcmf_get_ifp(drvr, 0)->ndev; 7566 struct brcmf_cfg80211_info *cfg; 7567 struct brcmf_cfg80211_vif *vif; 7568 struct brcmf_if *ifp; 7569 s32 err = 0; 7570 s32 io_type; 7571 u16 *cap = NULL; 7572 7573 if (!ndev) { 7574 bphy_err(drvr, "ndev is invalid\n"); 7575 return NULL; 7576 } 7577 7578 cfg = kzalloc(sizeof(*cfg), GFP_KERNEL); 7579 if (!cfg) { 7580 bphy_err(drvr, "Could not allocate wiphy device\n"); 7581 return NULL; 7582 } 7583 7584 cfg->wiphy = wiphy; 7585 cfg->pub = drvr; 7586 init_vif_event(&cfg->vif_event); 7587 INIT_LIST_HEAD(&cfg->vif_list); 7588 7589 vif = brcmf_alloc_vif(cfg, NL80211_IFTYPE_STATION); 7590 if (IS_ERR(vif)) 7591 goto wiphy_out; 7592 7593 ifp = netdev_priv(ndev); 7594 vif->ifp = ifp; 7595 vif->wdev.netdev = ndev; 7596 ndev->ieee80211_ptr = &vif->wdev; 7597 SET_NETDEV_DEV(ndev, wiphy_dev(cfg->wiphy)); 7598 7599 err = wl_init_priv(cfg); 7600 if (err) { 7601 bphy_err(drvr, "Failed to init iwm_priv (%d)\n", err); 7602 brcmf_free_vif(vif); 7603 goto wiphy_out; 7604 } 7605 ifp->vif = vif; 7606 7607 /* determine d11 io type before wiphy setup */ 7608 err = brcmf_fil_cmd_int_get(ifp, BRCMF_C_GET_VERSION, &io_type); 7609 if (err) { 7610 bphy_err(drvr, "Failed to get D11 version (%d)\n", err); 7611 goto priv_out; 7612 } 7613 cfg->d11inf.io_type = (u8)io_type; 7614 brcmu_d11_attach(&cfg->d11inf); 7615 7616 /* regulatory notifer below needs access to cfg so 7617 * assign it now. 7618 */ 7619 drvr->config = cfg; 7620 7621 err = brcmf_setup_wiphy(wiphy, ifp); 7622 if (err < 0) 7623 goto priv_out; 7624 7625 brcmf_dbg(INFO, "Registering custom regulatory\n"); 7626 wiphy->reg_notifier = brcmf_cfg80211_reg_notifier; 7627 wiphy->regulatory_flags |= REGULATORY_CUSTOM_REG; 7628 wiphy_apply_custom_regulatory(wiphy, &brcmf_regdom); 7629 7630 /* firmware defaults to 40MHz disabled in 2G band. We signal 7631 * cfg80211 here that we do and have it decide we can enable 7632 * it. But first check if device does support 2G operation. 7633 */ 7634 if (wiphy->bands[NL80211_BAND_2GHZ]) { 7635 cap = &wiphy->bands[NL80211_BAND_2GHZ]->ht_cap.cap; 7636 *cap |= IEEE80211_HT_CAP_SUP_WIDTH_20_40; 7637 } 7638 #ifdef CONFIG_PM 7639 if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_WOWL_GTK)) 7640 ops->set_rekey_data = brcmf_cfg80211_set_rekey_data; 7641 #endif 7642 err = wiphy_register(wiphy); 7643 if (err < 0) { 7644 bphy_err(drvr, "Could not register wiphy device (%d)\n", err); 7645 goto priv_out; 7646 } 7647 7648 err = brcmf_setup_wiphybands(cfg); 7649 if (err) { 7650 bphy_err(drvr, "Setting wiphy bands failed (%d)\n", err); 7651 goto wiphy_unreg_out; 7652 } 7653 7654 /* If cfg80211 didn't disable 40MHz HT CAP in wiphy_register(), 7655 * setup 40MHz in 2GHz band and enable OBSS scanning. 7656 */ 7657 if (cap && (*cap & IEEE80211_HT_CAP_SUP_WIDTH_20_40)) { 7658 err = brcmf_enable_bw40_2g(cfg); 7659 if (!err) 7660 err = brcmf_fil_iovar_int_set(ifp, "obss_coex", 7661 BRCMF_OBSS_COEX_AUTO); 7662 else 7663 *cap &= ~IEEE80211_HT_CAP_SUP_WIDTH_20_40; 7664 } 7665 7666 err = brcmf_fweh_activate_events(ifp); 7667 if (err) { 7668 bphy_err(drvr, "FWEH activation failed (%d)\n", err); 7669 goto wiphy_unreg_out; 7670 } 7671 7672 err = brcmf_p2p_attach(cfg, p2pdev_forced); 7673 if (err) { 7674 bphy_err(drvr, "P2P initialisation failed (%d)\n", err); 7675 goto wiphy_unreg_out; 7676 } 7677 err = brcmf_btcoex_attach(cfg); 7678 if (err) { 7679 bphy_err(drvr, "BT-coex initialisation failed (%d)\n", err); 7680 brcmf_p2p_detach(&cfg->p2p); 7681 goto wiphy_unreg_out; 7682 } 7683 err = brcmf_pno_attach(cfg); 7684 if (err) { 7685 bphy_err(drvr, "PNO initialisation failed (%d)\n", err); 7686 brcmf_btcoex_detach(cfg); 7687 brcmf_p2p_detach(&cfg->p2p); 7688 goto wiphy_unreg_out; 7689 } 7690 7691 if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_TDLS)) { 7692 err = brcmf_fil_iovar_int_set(ifp, "tdls_enable", 1); 7693 if (err) { 7694 brcmf_dbg(INFO, "TDLS not enabled (%d)\n", err); 7695 wiphy->flags &= ~WIPHY_FLAG_SUPPORTS_TDLS; 7696 } else { 7697 brcmf_fweh_register(cfg->pub, BRCMF_E_TDLS_PEER_EVENT, 7698 brcmf_notify_tdls_peer_event); 7699 } 7700 } 7701 7702 /* (re-) activate FWEH event handling */ 7703 err = brcmf_fweh_activate_events(ifp); 7704 if (err) { 7705 bphy_err(drvr, "FWEH activation failed (%d)\n", err); 7706 goto detach; 7707 } 7708 7709 /* Fill in some of the advertised nl80211 supported features */ 7710 if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_SCAN_RANDOM_MAC)) { 7711 wiphy->features |= NL80211_FEATURE_SCHED_SCAN_RANDOM_MAC_ADDR; 7712 #ifdef CONFIG_PM 7713 if (wiphy->wowlan && 7714 wiphy->wowlan->flags & WIPHY_WOWLAN_NET_DETECT) 7715 wiphy->features |= NL80211_FEATURE_ND_RANDOM_MAC_ADDR; 7716 #endif 7717 } 7718 7719 return cfg; 7720 7721 detach: 7722 brcmf_pno_detach(cfg); 7723 brcmf_btcoex_detach(cfg); 7724 brcmf_p2p_detach(&cfg->p2p); 7725 wiphy_unreg_out: 7726 wiphy_unregister(cfg->wiphy); 7727 priv_out: 7728 wl_deinit_priv(cfg); 7729 brcmf_free_vif(vif); 7730 ifp->vif = NULL; 7731 wiphy_out: 7732 brcmf_free_wiphy(wiphy); 7733 kfree(cfg); 7734 return NULL; 7735 } 7736 7737 void brcmf_cfg80211_detach(struct brcmf_cfg80211_info *cfg) 7738 { 7739 if (!cfg) 7740 return; 7741 7742 brcmf_pno_detach(cfg); 7743 brcmf_btcoex_detach(cfg); 7744 wiphy_unregister(cfg->wiphy); 7745 wl_deinit_priv(cfg); 7746 brcmf_free_wiphy(cfg->wiphy); 7747 kfree(cfg); 7748 } 7749