1 // SPDX-License-Identifier: ISC 2 /* 3 * Copyright (c) 2010 Broadcom Corporation 4 */ 5 6 /* Toplevel file. Relies on dhd_linux.c to send commands to the dongle. */ 7 8 #include <linux/kernel.h> 9 #include <linux/etherdevice.h> 10 #include <linux/module.h> 11 #include <linux/vmalloc.h> 12 #include <net/cfg80211.h> 13 #include <net/netlink.h> 14 #include <uapi/linux/if_arp.h> 15 16 #include <brcmu_utils.h> 17 #include <defs.h> 18 #include <brcmu_wifi.h> 19 #include <brcm_hw_ids.h> 20 #include "core.h" 21 #include "debug.h" 22 #include "tracepoint.h" 23 #include "fwil_types.h" 24 #include "p2p.h" 25 #include "btcoex.h" 26 #include "pno.h" 27 #include "fwsignal.h" 28 #include "cfg80211.h" 29 #include "feature.h" 30 #include "fwil.h" 31 #include "proto.h" 32 #include "vendor.h" 33 #include "bus.h" 34 #include "common.h" 35 36 #define BRCMF_SCAN_IE_LEN_MAX 2048 37 38 #define WPA_OUI "\x00\x50\xF2" /* WPA OUI */ 39 #define WPA_OUI_TYPE 1 40 #define RSN_OUI "\x00\x0F\xAC" /* RSN OUI */ 41 #define WME_OUI_TYPE 2 42 #define WPS_OUI_TYPE 4 43 44 #define VS_IE_FIXED_HDR_LEN 6 45 #define WPA_IE_VERSION_LEN 2 46 #define WPA_IE_MIN_OUI_LEN 4 47 #define WPA_IE_SUITE_COUNT_LEN 2 48 49 #define WPA_CIPHER_NONE 0 /* None */ 50 #define WPA_CIPHER_WEP_40 1 /* WEP (40-bit) */ 51 #define WPA_CIPHER_TKIP 2 /* TKIP: default for WPA */ 52 #define WPA_CIPHER_AES_CCM 4 /* AES (CCM) */ 53 #define WPA_CIPHER_WEP_104 5 /* WEP (104-bit) */ 54 55 #define RSN_AKM_NONE 0 /* None (IBSS) */ 56 #define RSN_AKM_UNSPECIFIED 1 /* Over 802.1x */ 57 #define RSN_AKM_PSK 2 /* Pre-shared Key */ 58 #define RSN_AKM_SHA256_1X 5 /* SHA256, 802.1X */ 59 #define RSN_AKM_SHA256_PSK 6 /* SHA256, Pre-shared Key */ 60 #define RSN_AKM_SAE 8 /* SAE */ 61 #define RSN_CAP_LEN 2 /* Length of RSN capabilities */ 62 #define RSN_CAP_PTK_REPLAY_CNTR_MASK (BIT(2) | BIT(3)) 63 #define RSN_CAP_MFPR_MASK BIT(6) 64 #define RSN_CAP_MFPC_MASK BIT(7) 65 #define RSN_PMKID_COUNT_LEN 2 66 67 #define VNDR_IE_CMD_LEN 4 /* length of the set command 68 * string :"add", "del" (+ NUL) 69 */ 70 #define VNDR_IE_COUNT_OFFSET 4 71 #define VNDR_IE_PKTFLAG_OFFSET 8 72 #define VNDR_IE_VSIE_OFFSET 12 73 #define VNDR_IE_HDR_SIZE 12 74 #define VNDR_IE_PARSE_LIMIT 5 75 76 #define DOT11_MGMT_HDR_LEN 24 /* d11 management header len */ 77 #define DOT11_BCN_PRB_FIXED_LEN 12 /* beacon/probe fixed length */ 78 79 #define BRCMF_SCAN_JOIN_ACTIVE_DWELL_TIME_MS 320 80 #define BRCMF_SCAN_JOIN_PASSIVE_DWELL_TIME_MS 400 81 #define BRCMF_SCAN_JOIN_PROBE_INTERVAL_MS 20 82 83 #define BRCMF_SCAN_CHANNEL_TIME 40 84 #define BRCMF_SCAN_UNASSOC_TIME 40 85 #define BRCMF_SCAN_PASSIVE_TIME 120 86 87 #define BRCMF_ND_INFO_TIMEOUT msecs_to_jiffies(2000) 88 89 #define BRCMF_PS_MAX_TIMEOUT_MS 2000 90 91 /* Dump obss definitions */ 92 #define ACS_MSRMNT_DELAY 80 93 #define CHAN_NOISE_DUMMY (-80) 94 #define OBSS_TOKEN_IDX 15 95 #define IBSS_TOKEN_IDX 15 96 #define TX_TOKEN_IDX 14 97 #define CTG_TOKEN_IDX 13 98 #define PKT_TOKEN_IDX 15 99 #define IDLE_TOKEN_IDX 12 100 101 #define BRCMF_ASSOC_PARAMS_FIXED_SIZE \ 102 (sizeof(struct brcmf_assoc_params_le) - sizeof(u16)) 103 104 #define BRCMF_MAX_CHANSPEC_LIST \ 105 (BRCMF_DCMD_MEDLEN / sizeof(__le32) - 1) 106 107 struct brcmf_dump_survey { 108 u32 obss; 109 u32 ibss; 110 u32 no_ctg; 111 u32 no_pckt; 112 u32 tx; 113 u32 idle; 114 }; 115 116 struct cca_stats_n_flags { 117 u32 msrmnt_time; /* Time for Measurement (msec) */ 118 u32 msrmnt_done; /* flag set when measurement complete */ 119 char buf[1]; 120 }; 121 122 struct cca_msrmnt_query { 123 u32 msrmnt_query; 124 u32 time_req; 125 }; 126 127 static bool check_vif_up(struct brcmf_cfg80211_vif *vif) 128 { 129 if (!test_bit(BRCMF_VIF_STATUS_READY, &vif->sme_state)) { 130 brcmf_dbg(INFO, "device is not ready : status (%lu)\n", 131 vif->sme_state); 132 return false; 133 } 134 return true; 135 } 136 137 #define RATE_TO_BASE100KBPS(rate) (((rate) * 10) / 2) 138 #define RATETAB_ENT(_rateid, _flags) \ 139 { \ 140 .bitrate = RATE_TO_BASE100KBPS(_rateid), \ 141 .hw_value = (_rateid), \ 142 .flags = (_flags), \ 143 } 144 145 static struct ieee80211_rate __wl_rates[] = { 146 RATETAB_ENT(BRCM_RATE_1M, 0), 147 RATETAB_ENT(BRCM_RATE_2M, IEEE80211_RATE_SHORT_PREAMBLE), 148 RATETAB_ENT(BRCM_RATE_5M5, IEEE80211_RATE_SHORT_PREAMBLE), 149 RATETAB_ENT(BRCM_RATE_11M, IEEE80211_RATE_SHORT_PREAMBLE), 150 RATETAB_ENT(BRCM_RATE_6M, 0), 151 RATETAB_ENT(BRCM_RATE_9M, 0), 152 RATETAB_ENT(BRCM_RATE_12M, 0), 153 RATETAB_ENT(BRCM_RATE_18M, 0), 154 RATETAB_ENT(BRCM_RATE_24M, 0), 155 RATETAB_ENT(BRCM_RATE_36M, 0), 156 RATETAB_ENT(BRCM_RATE_48M, 0), 157 RATETAB_ENT(BRCM_RATE_54M, 0), 158 }; 159 160 #define wl_g_rates (__wl_rates + 0) 161 #define wl_g_rates_size ARRAY_SIZE(__wl_rates) 162 #define wl_a_rates (__wl_rates + 4) 163 #define wl_a_rates_size (wl_g_rates_size - 4) 164 165 #define CHAN2G(_channel, _freq) { \ 166 .band = NL80211_BAND_2GHZ, \ 167 .center_freq = (_freq), \ 168 .hw_value = (_channel), \ 169 .max_antenna_gain = 0, \ 170 .max_power = 30, \ 171 } 172 173 #define CHAN5G(_channel) { \ 174 .band = NL80211_BAND_5GHZ, \ 175 .center_freq = 5000 + (5 * (_channel)), \ 176 .hw_value = (_channel), \ 177 .max_antenna_gain = 0, \ 178 .max_power = 30, \ 179 } 180 181 static struct ieee80211_channel __wl_2ghz_channels[] = { 182 CHAN2G(1, 2412), CHAN2G(2, 2417), CHAN2G(3, 2422), CHAN2G(4, 2427), 183 CHAN2G(5, 2432), CHAN2G(6, 2437), CHAN2G(7, 2442), CHAN2G(8, 2447), 184 CHAN2G(9, 2452), CHAN2G(10, 2457), CHAN2G(11, 2462), CHAN2G(12, 2467), 185 CHAN2G(13, 2472), CHAN2G(14, 2484) 186 }; 187 188 static struct ieee80211_channel __wl_5ghz_channels[] = { 189 CHAN5G(34), CHAN5G(36), CHAN5G(38), CHAN5G(40), CHAN5G(42), 190 CHAN5G(44), CHAN5G(46), CHAN5G(48), CHAN5G(52), CHAN5G(56), 191 CHAN5G(60), CHAN5G(64), CHAN5G(100), CHAN5G(104), CHAN5G(108), 192 CHAN5G(112), CHAN5G(116), CHAN5G(120), CHAN5G(124), CHAN5G(128), 193 CHAN5G(132), CHAN5G(136), CHAN5G(140), CHAN5G(144), CHAN5G(149), 194 CHAN5G(153), CHAN5G(157), CHAN5G(161), CHAN5G(165) 195 }; 196 197 /* Band templates duplicated per wiphy. The channel info 198 * above is added to the band during setup. 199 */ 200 static const struct ieee80211_supported_band __wl_band_2ghz = { 201 .band = NL80211_BAND_2GHZ, 202 .bitrates = wl_g_rates, 203 .n_bitrates = wl_g_rates_size, 204 }; 205 206 static const struct ieee80211_supported_band __wl_band_5ghz = { 207 .band = NL80211_BAND_5GHZ, 208 .bitrates = wl_a_rates, 209 .n_bitrates = wl_a_rates_size, 210 }; 211 212 /* This is to override regulatory domains defined in cfg80211 module (reg.c) 213 * By default world regulatory domain defined in reg.c puts the flags 214 * NL80211_RRF_NO_IR for 5GHz channels (for * 36..48 and 149..165). 215 * With respect to these flags, wpa_supplicant doesn't * start p2p 216 * operations on 5GHz channels. All the changes in world regulatory 217 * domain are to be done here. 218 */ 219 static const struct ieee80211_regdomain brcmf_regdom = { 220 .n_reg_rules = 4, 221 .alpha2 = "99", 222 .reg_rules = { 223 /* IEEE 802.11b/g, channels 1..11 */ 224 REG_RULE(2412-10, 2472+10, 40, 6, 20, 0), 225 /* If any */ 226 /* IEEE 802.11 channel 14 - Only JP enables 227 * this and for 802.11b only 228 */ 229 REG_RULE(2484-10, 2484+10, 20, 6, 20, 0), 230 /* IEEE 802.11a, channel 36..64 */ 231 REG_RULE(5150-10, 5350+10, 160, 6, 20, 0), 232 /* IEEE 802.11a, channel 100..165 */ 233 REG_RULE(5470-10, 5850+10, 160, 6, 20, 0), } 234 }; 235 236 /* Note: brcmf_cipher_suites is an array of int defining which cipher suites 237 * are supported. A pointer to this array and the number of entries is passed 238 * on to upper layers. AES_CMAC defines whether or not the driver supports MFP. 239 * So the cipher suite AES_CMAC has to be the last one in the array, and when 240 * device does not support MFP then the number of suites will be decreased by 1 241 */ 242 static const u32 brcmf_cipher_suites[] = { 243 WLAN_CIPHER_SUITE_WEP40, 244 WLAN_CIPHER_SUITE_WEP104, 245 WLAN_CIPHER_SUITE_TKIP, 246 WLAN_CIPHER_SUITE_CCMP, 247 /* Keep as last entry: */ 248 WLAN_CIPHER_SUITE_AES_CMAC 249 }; 250 251 /* Vendor specific ie. id = 221, oui and type defines exact ie */ 252 struct brcmf_vs_tlv { 253 u8 id; 254 u8 len; 255 u8 oui[3]; 256 u8 oui_type; 257 }; 258 259 struct parsed_vndr_ie_info { 260 u8 *ie_ptr; 261 u32 ie_len; /* total length including id & length field */ 262 struct brcmf_vs_tlv vndrie; 263 }; 264 265 struct parsed_vndr_ies { 266 u32 count; 267 struct parsed_vndr_ie_info ie_info[VNDR_IE_PARSE_LIMIT]; 268 }; 269 270 #define WL_INTERFACE_CREATE_VER_1 1 271 #define WL_INTERFACE_CREATE_VER_2 2 272 #define WL_INTERFACE_CREATE_VER_3 3 273 #define WL_INTERFACE_CREATE_VER_MAX WL_INTERFACE_CREATE_VER_3 274 275 #define WL_INTERFACE_MAC_DONT_USE 0x0 276 #define WL_INTERFACE_MAC_USE 0x2 277 278 #define WL_INTERFACE_CREATE_STA 0x0 279 #define WL_INTERFACE_CREATE_AP 0x1 280 281 struct wl_interface_create_v1 { 282 u16 ver; /* structure version */ 283 u32 flags; /* flags for operation */ 284 u8 mac_addr[ETH_ALEN]; /* MAC address */ 285 u32 wlc_index; /* optional for wlc index */ 286 }; 287 288 struct wl_interface_create_v2 { 289 u16 ver; /* structure version */ 290 u8 pad1[2]; 291 u32 flags; /* flags for operation */ 292 u8 mac_addr[ETH_ALEN]; /* MAC address */ 293 u8 iftype; /* type of interface created */ 294 u8 pad2; 295 u32 wlc_index; /* optional for wlc index */ 296 }; 297 298 struct wl_interface_create_v3 { 299 u16 ver; /* structure version */ 300 u16 len; /* length of structure + data */ 301 u16 fixed_len; /* length of structure */ 302 u8 iftype; /* type of interface created */ 303 u8 wlc_index; /* optional for wlc index */ 304 u32 flags; /* flags for operation */ 305 u8 mac_addr[ETH_ALEN]; /* MAC address */ 306 u8 bssid[ETH_ALEN]; /* optional for BSSID */ 307 u8 if_index; /* interface index request */ 308 u8 pad[3]; 309 u8 data[]; /* Optional for specific data */ 310 }; 311 312 static u8 nl80211_band_to_fwil(enum nl80211_band band) 313 { 314 switch (band) { 315 case NL80211_BAND_2GHZ: 316 return WLC_BAND_2G; 317 case NL80211_BAND_5GHZ: 318 return WLC_BAND_5G; 319 default: 320 WARN_ON(1); 321 break; 322 } 323 return 0; 324 } 325 326 static u16 chandef_to_chanspec(struct brcmu_d11inf *d11inf, 327 struct cfg80211_chan_def *ch) 328 { 329 struct brcmu_chan ch_inf; 330 s32 primary_offset; 331 332 brcmf_dbg(TRACE, "chandef: control %d center %d width %d\n", 333 ch->chan->center_freq, ch->center_freq1, ch->width); 334 ch_inf.chnum = ieee80211_frequency_to_channel(ch->center_freq1); 335 primary_offset = ch->chan->center_freq - ch->center_freq1; 336 switch (ch->width) { 337 case NL80211_CHAN_WIDTH_20: 338 case NL80211_CHAN_WIDTH_20_NOHT: 339 ch_inf.bw = BRCMU_CHAN_BW_20; 340 WARN_ON(primary_offset != 0); 341 break; 342 case NL80211_CHAN_WIDTH_40: 343 ch_inf.bw = BRCMU_CHAN_BW_40; 344 if (primary_offset > 0) 345 ch_inf.sb = BRCMU_CHAN_SB_U; 346 else 347 ch_inf.sb = BRCMU_CHAN_SB_L; 348 break; 349 case NL80211_CHAN_WIDTH_80: 350 ch_inf.bw = BRCMU_CHAN_BW_80; 351 if (primary_offset == -30) 352 ch_inf.sb = BRCMU_CHAN_SB_LL; 353 else if (primary_offset == -10) 354 ch_inf.sb = BRCMU_CHAN_SB_LU; 355 else if (primary_offset == 10) 356 ch_inf.sb = BRCMU_CHAN_SB_UL; 357 else 358 ch_inf.sb = BRCMU_CHAN_SB_UU; 359 break; 360 case NL80211_CHAN_WIDTH_160: 361 ch_inf.bw = BRCMU_CHAN_BW_160; 362 if (primary_offset == -70) 363 ch_inf.sb = BRCMU_CHAN_SB_LLL; 364 else if (primary_offset == -50) 365 ch_inf.sb = BRCMU_CHAN_SB_LLU; 366 else if (primary_offset == -30) 367 ch_inf.sb = BRCMU_CHAN_SB_LUL; 368 else if (primary_offset == -10) 369 ch_inf.sb = BRCMU_CHAN_SB_LUU; 370 else if (primary_offset == 10) 371 ch_inf.sb = BRCMU_CHAN_SB_ULL; 372 else if (primary_offset == 30) 373 ch_inf.sb = BRCMU_CHAN_SB_ULU; 374 else if (primary_offset == 50) 375 ch_inf.sb = BRCMU_CHAN_SB_UUL; 376 else 377 ch_inf.sb = BRCMU_CHAN_SB_UUU; 378 break; 379 case NL80211_CHAN_WIDTH_80P80: 380 case NL80211_CHAN_WIDTH_5: 381 case NL80211_CHAN_WIDTH_10: 382 default: 383 WARN_ON_ONCE(1); 384 } 385 switch (ch->chan->band) { 386 case NL80211_BAND_2GHZ: 387 ch_inf.band = BRCMU_CHAN_BAND_2G; 388 break; 389 case NL80211_BAND_5GHZ: 390 ch_inf.band = BRCMU_CHAN_BAND_5G; 391 break; 392 case NL80211_BAND_60GHZ: 393 default: 394 WARN_ON_ONCE(1); 395 } 396 d11inf->encchspec(&ch_inf); 397 398 brcmf_dbg(TRACE, "chanspec: 0x%x\n", ch_inf.chspec); 399 return ch_inf.chspec; 400 } 401 402 u16 channel_to_chanspec(struct brcmu_d11inf *d11inf, 403 struct ieee80211_channel *ch) 404 { 405 struct brcmu_chan ch_inf; 406 407 ch_inf.chnum = ieee80211_frequency_to_channel(ch->center_freq); 408 ch_inf.bw = BRCMU_CHAN_BW_20; 409 d11inf->encchspec(&ch_inf); 410 411 return ch_inf.chspec; 412 } 413 414 /* Traverse a string of 1-byte tag/1-byte length/variable-length value 415 * triples, returning a pointer to the substring whose first element 416 * matches tag 417 */ 418 static const struct brcmf_tlv * 419 brcmf_parse_tlvs(const void *buf, int buflen, uint key) 420 { 421 const struct brcmf_tlv *elt = buf; 422 int totlen = buflen; 423 424 /* find tagged parameter */ 425 while (totlen >= TLV_HDR_LEN) { 426 int len = elt->len; 427 428 /* validate remaining totlen */ 429 if ((elt->id == key) && (totlen >= (len + TLV_HDR_LEN))) 430 return elt; 431 432 elt = (struct brcmf_tlv *)((u8 *)elt + (len + TLV_HDR_LEN)); 433 totlen -= (len + TLV_HDR_LEN); 434 } 435 436 return NULL; 437 } 438 439 /* Is any of the tlvs the expected entry? If 440 * not update the tlvs buffer pointer/length. 441 */ 442 static bool 443 brcmf_tlv_has_ie(const u8 *ie, const u8 **tlvs, u32 *tlvs_len, 444 const u8 *oui, u32 oui_len, u8 type) 445 { 446 /* If the contents match the OUI and the type */ 447 if (ie[TLV_LEN_OFF] >= oui_len + 1 && 448 !memcmp(&ie[TLV_BODY_OFF], oui, oui_len) && 449 type == ie[TLV_BODY_OFF + oui_len]) { 450 return true; 451 } 452 453 if (tlvs == NULL) 454 return false; 455 /* point to the next ie */ 456 ie += ie[TLV_LEN_OFF] + TLV_HDR_LEN; 457 /* calculate the length of the rest of the buffer */ 458 *tlvs_len -= (int)(ie - *tlvs); 459 /* update the pointer to the start of the buffer */ 460 *tlvs = ie; 461 462 return false; 463 } 464 465 static struct brcmf_vs_tlv * 466 brcmf_find_wpaie(const u8 *parse, u32 len) 467 { 468 const struct brcmf_tlv *ie; 469 470 while ((ie = brcmf_parse_tlvs(parse, len, WLAN_EID_VENDOR_SPECIFIC))) { 471 if (brcmf_tlv_has_ie((const u8 *)ie, &parse, &len, 472 WPA_OUI, TLV_OUI_LEN, WPA_OUI_TYPE)) 473 return (struct brcmf_vs_tlv *)ie; 474 } 475 return NULL; 476 } 477 478 static struct brcmf_vs_tlv * 479 brcmf_find_wpsie(const u8 *parse, u32 len) 480 { 481 const struct brcmf_tlv *ie; 482 483 while ((ie = brcmf_parse_tlvs(parse, len, WLAN_EID_VENDOR_SPECIFIC))) { 484 if (brcmf_tlv_has_ie((u8 *)ie, &parse, &len, 485 WPA_OUI, TLV_OUI_LEN, WPS_OUI_TYPE)) 486 return (struct brcmf_vs_tlv *)ie; 487 } 488 return NULL; 489 } 490 491 static int brcmf_vif_change_validate(struct brcmf_cfg80211_info *cfg, 492 struct brcmf_cfg80211_vif *vif, 493 enum nl80211_iftype new_type) 494 { 495 struct brcmf_cfg80211_vif *pos; 496 bool check_combos = false; 497 int ret = 0; 498 struct iface_combination_params params = { 499 .num_different_channels = 1, 500 }; 501 502 list_for_each_entry(pos, &cfg->vif_list, list) 503 if (pos == vif) { 504 params.iftype_num[new_type]++; 505 } else { 506 /* concurrent interfaces so need check combinations */ 507 check_combos = true; 508 params.iftype_num[pos->wdev.iftype]++; 509 } 510 511 if (check_combos) 512 ret = cfg80211_check_combinations(cfg->wiphy, ¶ms); 513 514 return ret; 515 } 516 517 static int brcmf_vif_add_validate(struct brcmf_cfg80211_info *cfg, 518 enum nl80211_iftype new_type) 519 { 520 struct brcmf_cfg80211_vif *pos; 521 struct iface_combination_params params = { 522 .num_different_channels = 1, 523 }; 524 525 list_for_each_entry(pos, &cfg->vif_list, list) 526 params.iftype_num[pos->wdev.iftype]++; 527 528 params.iftype_num[new_type]++; 529 return cfg80211_check_combinations(cfg->wiphy, ¶ms); 530 } 531 532 static void convert_key_from_CPU(struct brcmf_wsec_key *key, 533 struct brcmf_wsec_key_le *key_le) 534 { 535 key_le->index = cpu_to_le32(key->index); 536 key_le->len = cpu_to_le32(key->len); 537 key_le->algo = cpu_to_le32(key->algo); 538 key_le->flags = cpu_to_le32(key->flags); 539 key_le->rxiv.hi = cpu_to_le32(key->rxiv.hi); 540 key_le->rxiv.lo = cpu_to_le16(key->rxiv.lo); 541 key_le->iv_initialized = cpu_to_le32(key->iv_initialized); 542 memcpy(key_le->data, key->data, sizeof(key->data)); 543 memcpy(key_le->ea, key->ea, sizeof(key->ea)); 544 } 545 546 static int 547 send_key_to_dongle(struct brcmf_if *ifp, struct brcmf_wsec_key *key) 548 { 549 struct brcmf_pub *drvr = ifp->drvr; 550 int err; 551 struct brcmf_wsec_key_le key_le; 552 553 convert_key_from_CPU(key, &key_le); 554 555 brcmf_netdev_wait_pend8021x(ifp); 556 557 err = brcmf_fil_bsscfg_data_set(ifp, "wsec_key", &key_le, 558 sizeof(key_le)); 559 560 if (err) 561 bphy_err(drvr, "wsec_key error (%d)\n", err); 562 return err; 563 } 564 565 static void 566 brcmf_cfg80211_update_proto_addr_mode(struct wireless_dev *wdev) 567 { 568 struct brcmf_cfg80211_vif *vif; 569 struct brcmf_if *ifp; 570 571 vif = container_of(wdev, struct brcmf_cfg80211_vif, wdev); 572 ifp = vif->ifp; 573 574 if ((wdev->iftype == NL80211_IFTYPE_ADHOC) || 575 (wdev->iftype == NL80211_IFTYPE_AP) || 576 (wdev->iftype == NL80211_IFTYPE_P2P_GO)) 577 brcmf_proto_configure_addr_mode(ifp->drvr, ifp->ifidx, 578 ADDR_DIRECT); 579 else 580 brcmf_proto_configure_addr_mode(ifp->drvr, ifp->ifidx, 581 ADDR_INDIRECT); 582 } 583 584 static int brcmf_get_first_free_bsscfgidx(struct brcmf_pub *drvr) 585 { 586 int bsscfgidx; 587 588 for (bsscfgidx = 0; bsscfgidx < BRCMF_MAX_IFS; bsscfgidx++) { 589 /* bsscfgidx 1 is reserved for legacy P2P */ 590 if (bsscfgidx == 1) 591 continue; 592 if (!drvr->iflist[bsscfgidx]) 593 return bsscfgidx; 594 } 595 596 return -ENOMEM; 597 } 598 599 static void brcmf_set_vif_sta_macaddr(struct brcmf_if *ifp, u8 *mac_addr) 600 { 601 u8 mac_idx = ifp->drvr->sta_mac_idx; 602 603 /* set difference MAC address with locally administered bit */ 604 memcpy(mac_addr, ifp->mac_addr, ETH_ALEN); 605 mac_addr[0] |= 0x02; 606 mac_addr[3] ^= mac_idx ? 0xC0 : 0xA0; 607 mac_idx++; 608 mac_idx = mac_idx % 2; 609 ifp->drvr->sta_mac_idx = mac_idx; 610 } 611 612 static int brcmf_cfg80211_request_sta_if(struct brcmf_if *ifp, u8 *macaddr) 613 { 614 struct wl_interface_create_v1 iface_v1; 615 struct wl_interface_create_v2 iface_v2; 616 struct wl_interface_create_v3 iface_v3; 617 u32 iface_create_ver; 618 int err; 619 620 /* interface_create version 1 */ 621 memset(&iface_v1, 0, sizeof(iface_v1)); 622 iface_v1.ver = WL_INTERFACE_CREATE_VER_1; 623 iface_v1.flags = WL_INTERFACE_CREATE_STA | 624 WL_INTERFACE_MAC_USE; 625 if (!is_zero_ether_addr(macaddr)) 626 memcpy(iface_v1.mac_addr, macaddr, ETH_ALEN); 627 else 628 brcmf_set_vif_sta_macaddr(ifp, iface_v1.mac_addr); 629 630 err = brcmf_fil_iovar_data_get(ifp, "interface_create", 631 &iface_v1, 632 sizeof(iface_v1)); 633 if (err) { 634 brcmf_info("failed to create interface(v1), err=%d\n", 635 err); 636 } else { 637 brcmf_dbg(INFO, "interface created(v1)\n"); 638 return 0; 639 } 640 641 /* interface_create version 2 */ 642 memset(&iface_v2, 0, sizeof(iface_v2)); 643 iface_v2.ver = WL_INTERFACE_CREATE_VER_2; 644 iface_v2.flags = WL_INTERFACE_MAC_USE; 645 iface_v2.iftype = WL_INTERFACE_CREATE_STA; 646 if (!is_zero_ether_addr(macaddr)) 647 memcpy(iface_v2.mac_addr, macaddr, ETH_ALEN); 648 else 649 brcmf_set_vif_sta_macaddr(ifp, iface_v2.mac_addr); 650 651 err = brcmf_fil_iovar_data_get(ifp, "interface_create", 652 &iface_v2, 653 sizeof(iface_v2)); 654 if (err) { 655 brcmf_info("failed to create interface(v2), err=%d\n", 656 err); 657 } else { 658 brcmf_dbg(INFO, "interface created(v2)\n"); 659 return 0; 660 } 661 662 /* interface_create version 3+ */ 663 /* get supported version from firmware side */ 664 iface_create_ver = 0; 665 err = brcmf_fil_bsscfg_int_get(ifp, "interface_create", 666 &iface_create_ver); 667 if (err) { 668 brcmf_err("fail to get supported version, err=%d\n", err); 669 return -EOPNOTSUPP; 670 } 671 672 switch (iface_create_ver) { 673 case WL_INTERFACE_CREATE_VER_3: 674 memset(&iface_v3, 0, sizeof(iface_v3)); 675 iface_v3.ver = WL_INTERFACE_CREATE_VER_3; 676 iface_v3.flags = WL_INTERFACE_MAC_USE; 677 iface_v3.iftype = WL_INTERFACE_CREATE_STA; 678 if (!is_zero_ether_addr(macaddr)) 679 memcpy(iface_v3.mac_addr, macaddr, ETH_ALEN); 680 else 681 brcmf_set_vif_sta_macaddr(ifp, iface_v3.mac_addr); 682 683 err = brcmf_fil_iovar_data_get(ifp, "interface_create", 684 &iface_v3, 685 sizeof(iface_v3)); 686 687 if (!err) 688 brcmf_dbg(INFO, "interface created(v3)\n"); 689 break; 690 default: 691 brcmf_err("not support interface create(v%d)\n", 692 iface_create_ver); 693 err = -EOPNOTSUPP; 694 break; 695 } 696 697 if (err) { 698 brcmf_info("station interface creation failed (%d)\n", 699 err); 700 return -EIO; 701 } 702 703 return 0; 704 } 705 706 static int brcmf_cfg80211_request_ap_if(struct brcmf_if *ifp) 707 { 708 struct wl_interface_create_v1 iface_v1; 709 struct wl_interface_create_v2 iface_v2; 710 struct wl_interface_create_v3 iface_v3; 711 u32 iface_create_ver; 712 struct brcmf_pub *drvr = ifp->drvr; 713 struct brcmf_mbss_ssid_le mbss_ssid_le; 714 int bsscfgidx; 715 int err; 716 717 /* interface_create version 1 */ 718 memset(&iface_v1, 0, sizeof(iface_v1)); 719 iface_v1.ver = WL_INTERFACE_CREATE_VER_1; 720 iface_v1.flags = WL_INTERFACE_CREATE_AP | 721 WL_INTERFACE_MAC_USE; 722 723 brcmf_set_vif_sta_macaddr(ifp, iface_v1.mac_addr); 724 725 err = brcmf_fil_iovar_data_get(ifp, "interface_create", 726 &iface_v1, 727 sizeof(iface_v1)); 728 if (err) { 729 brcmf_info("failed to create interface(v1), err=%d\n", 730 err); 731 } else { 732 brcmf_dbg(INFO, "interface created(v1)\n"); 733 return 0; 734 } 735 736 /* interface_create version 2 */ 737 memset(&iface_v2, 0, sizeof(iface_v2)); 738 iface_v2.ver = WL_INTERFACE_CREATE_VER_2; 739 iface_v2.flags = WL_INTERFACE_MAC_USE; 740 iface_v2.iftype = WL_INTERFACE_CREATE_AP; 741 742 brcmf_set_vif_sta_macaddr(ifp, iface_v2.mac_addr); 743 744 err = brcmf_fil_iovar_data_get(ifp, "interface_create", 745 &iface_v2, 746 sizeof(iface_v2)); 747 if (err) { 748 brcmf_info("failed to create interface(v2), err=%d\n", 749 err); 750 } else { 751 brcmf_dbg(INFO, "interface created(v2)\n"); 752 return 0; 753 } 754 755 /* interface_create version 3+ */ 756 /* get supported version from firmware side */ 757 iface_create_ver = 0; 758 err = brcmf_fil_bsscfg_int_get(ifp, "interface_create", 759 &iface_create_ver); 760 if (err) { 761 brcmf_err("fail to get supported version, err=%d\n", err); 762 return -EOPNOTSUPP; 763 } 764 765 switch (iface_create_ver) { 766 case WL_INTERFACE_CREATE_VER_3: 767 memset(&iface_v3, 0, sizeof(iface_v3)); 768 iface_v3.ver = WL_INTERFACE_CREATE_VER_3; 769 iface_v3.flags = WL_INTERFACE_MAC_USE; 770 iface_v3.iftype = WL_INTERFACE_CREATE_AP; 771 brcmf_set_vif_sta_macaddr(ifp, iface_v3.mac_addr); 772 773 err = brcmf_fil_iovar_data_get(ifp, "interface_create", 774 &iface_v3, 775 sizeof(iface_v3)); 776 777 if (!err) 778 brcmf_dbg(INFO, "interface created(v3)\n"); 779 break; 780 default: 781 brcmf_err("not support interface create(v%d)\n", 782 iface_create_ver); 783 err = -EOPNOTSUPP; 784 break; 785 } 786 787 if (err) { 788 brcmf_info("Does not support interface_create (%d)\n", 789 err); 790 memset(&mbss_ssid_le, 0, sizeof(mbss_ssid_le)); 791 bsscfgidx = brcmf_get_first_free_bsscfgidx(ifp->drvr); 792 if (bsscfgidx < 0) 793 return bsscfgidx; 794 795 mbss_ssid_le.bsscfgidx = cpu_to_le32(bsscfgidx); 796 mbss_ssid_le.SSID_len = cpu_to_le32(5); 797 sprintf(mbss_ssid_le.SSID, "ssid%d", bsscfgidx); 798 799 err = brcmf_fil_bsscfg_data_set(ifp, "bsscfg:ssid", &mbss_ssid_le, 800 sizeof(mbss_ssid_le)); 801 802 if (err < 0) 803 bphy_err(drvr, "setting ssid failed %d\n", err); 804 } 805 806 return err; 807 } 808 809 /** 810 * brcmf_apsta_add_vif() - create a new AP or STA virtual interface 811 * 812 * @wiphy: wiphy device of new interface. 813 * @name: name of the new interface. 814 * @params: contains mac address for AP or STA device. 815 * @type: interface type. 816 */ 817 static 818 struct wireless_dev *brcmf_apsta_add_vif(struct wiphy *wiphy, const char *name, 819 struct vif_params *params, 820 enum nl80211_iftype type) 821 { 822 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 823 struct brcmf_if *ifp = netdev_priv(cfg_to_ndev(cfg)); 824 struct brcmf_pub *drvr = cfg->pub; 825 struct brcmf_cfg80211_vif *vif; 826 int err; 827 828 if (type != NL80211_IFTYPE_STATION && type != NL80211_IFTYPE_AP) 829 return ERR_PTR(-EINVAL); 830 831 if (brcmf_cfg80211_vif_event_armed(cfg)) 832 return ERR_PTR(-EBUSY); 833 834 brcmf_dbg(INFO, "Adding vif \"%s\"\n", name); 835 836 vif = brcmf_alloc_vif(cfg, type); 837 if (IS_ERR(vif)) 838 return (struct wireless_dev *)vif; 839 840 brcmf_cfg80211_arm_vif_event(cfg, vif); 841 842 if (type == NL80211_IFTYPE_STATION) 843 err = brcmf_cfg80211_request_sta_if(ifp, params->macaddr); 844 else 845 err = brcmf_cfg80211_request_ap_if(ifp); 846 if (err) { 847 brcmf_cfg80211_arm_vif_event(cfg, NULL); 848 goto fail; 849 } 850 851 /* wait for firmware event */ 852 err = brcmf_cfg80211_wait_vif_event(cfg, BRCMF_E_IF_ADD, 853 BRCMF_VIF_EVENT_TIMEOUT); 854 brcmf_cfg80211_arm_vif_event(cfg, NULL); 855 if (!err) { 856 bphy_err(drvr, "timeout occurred\n"); 857 err = -EIO; 858 goto fail; 859 } 860 861 /* interface created in firmware */ 862 ifp = vif->ifp; 863 if (!ifp) { 864 bphy_err(drvr, "no if pointer provided\n"); 865 err = -ENOENT; 866 goto fail; 867 } 868 869 strncpy(ifp->ndev->name, name, sizeof(ifp->ndev->name) - 1); 870 err = brcmf_net_attach(ifp, true); 871 if (err) { 872 bphy_err(drvr, "Registering netdevice failed\n"); 873 free_netdev(ifp->ndev); 874 goto fail; 875 } 876 877 return &ifp->vif->wdev; 878 879 fail: 880 brcmf_free_vif(vif); 881 return ERR_PTR(err); 882 } 883 884 static bool brcmf_is_apmode(struct brcmf_cfg80211_vif *vif) 885 { 886 enum nl80211_iftype iftype; 887 888 iftype = vif->wdev.iftype; 889 return iftype == NL80211_IFTYPE_AP || iftype == NL80211_IFTYPE_P2P_GO; 890 } 891 892 static bool brcmf_is_ibssmode(struct brcmf_cfg80211_vif *vif) 893 { 894 return vif->wdev.iftype == NL80211_IFTYPE_ADHOC; 895 } 896 897 /** 898 * brcmf_mon_add_vif() - create monitor mode virtual interface 899 * 900 * @wiphy: wiphy device of new interface. 901 * @name: name of the new interface. 902 */ 903 static struct wireless_dev *brcmf_mon_add_vif(struct wiphy *wiphy, 904 const char *name) 905 { 906 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 907 struct brcmf_cfg80211_vif *vif; 908 struct net_device *ndev; 909 struct brcmf_if *ifp; 910 int err; 911 912 if (cfg->pub->mon_if) { 913 err = -EEXIST; 914 goto err_out; 915 } 916 917 vif = brcmf_alloc_vif(cfg, NL80211_IFTYPE_MONITOR); 918 if (IS_ERR(vif)) { 919 err = PTR_ERR(vif); 920 goto err_out; 921 } 922 923 ndev = alloc_netdev(sizeof(*ifp), name, NET_NAME_UNKNOWN, ether_setup); 924 if (!ndev) { 925 err = -ENOMEM; 926 goto err_free_vif; 927 } 928 ndev->type = ARPHRD_IEEE80211_RADIOTAP; 929 ndev->ieee80211_ptr = &vif->wdev; 930 ndev->needs_free_netdev = true; 931 ndev->priv_destructor = brcmf_cfg80211_free_netdev; 932 SET_NETDEV_DEV(ndev, wiphy_dev(cfg->wiphy)); 933 934 ifp = netdev_priv(ndev); 935 ifp->vif = vif; 936 ifp->ndev = ndev; 937 ifp->drvr = cfg->pub; 938 939 vif->ifp = ifp; 940 vif->wdev.netdev = ndev; 941 942 err = brcmf_net_mon_attach(ifp); 943 if (err) { 944 brcmf_err("Failed to attach %s device\n", ndev->name); 945 free_netdev(ndev); 946 goto err_free_vif; 947 } 948 949 cfg->pub->mon_if = ifp; 950 951 return &vif->wdev; 952 953 err_free_vif: 954 brcmf_free_vif(vif); 955 err_out: 956 return ERR_PTR(err); 957 } 958 959 static int brcmf_mon_del_vif(struct wiphy *wiphy, struct wireless_dev *wdev) 960 { 961 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 962 struct net_device *ndev = wdev->netdev; 963 964 ndev->netdev_ops->ndo_stop(ndev); 965 966 brcmf_net_detach(ndev, true); 967 968 cfg->pub->mon_if = NULL; 969 970 return 0; 971 } 972 973 static struct wireless_dev *brcmf_cfg80211_add_iface(struct wiphy *wiphy, 974 const char *name, 975 unsigned char name_assign_type, 976 enum nl80211_iftype type, 977 struct vif_params *params) 978 { 979 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 980 struct brcmf_pub *drvr = cfg->pub; 981 struct wireless_dev *wdev; 982 int err; 983 984 brcmf_dbg(TRACE, "enter: %s type %d\n", name, type); 985 err = brcmf_vif_add_validate(wiphy_to_cfg(wiphy), type); 986 if (err) { 987 bphy_err(drvr, "iface validation failed: err=%d\n", err); 988 return ERR_PTR(err); 989 } 990 switch (type) { 991 case NL80211_IFTYPE_ADHOC: 992 case NL80211_IFTYPE_AP_VLAN: 993 case NL80211_IFTYPE_WDS: 994 case NL80211_IFTYPE_MESH_POINT: 995 return ERR_PTR(-EOPNOTSUPP); 996 case NL80211_IFTYPE_MONITOR: 997 return brcmf_mon_add_vif(wiphy, name); 998 case NL80211_IFTYPE_STATION: 999 case NL80211_IFTYPE_AP: 1000 wdev = brcmf_apsta_add_vif(wiphy, name, params, type); 1001 break; 1002 case NL80211_IFTYPE_P2P_CLIENT: 1003 case NL80211_IFTYPE_P2P_GO: 1004 case NL80211_IFTYPE_P2P_DEVICE: 1005 wdev = brcmf_p2p_add_vif(wiphy, name, name_assign_type, type, params); 1006 break; 1007 case NL80211_IFTYPE_UNSPECIFIED: 1008 default: 1009 return ERR_PTR(-EINVAL); 1010 } 1011 1012 if (IS_ERR(wdev)) 1013 bphy_err(drvr, "add iface %s type %d failed: err=%d\n", name, 1014 type, (int)PTR_ERR(wdev)); 1015 else 1016 brcmf_cfg80211_update_proto_addr_mode(wdev); 1017 1018 return wdev; 1019 } 1020 1021 static void brcmf_scan_config_mpc(struct brcmf_if *ifp, int mpc) 1022 { 1023 if (brcmf_feat_is_quirk_enabled(ifp, BRCMF_FEAT_QUIRK_NEED_MPC)) 1024 brcmf_set_mpc(ifp, mpc); 1025 } 1026 1027 void brcmf_set_mpc(struct brcmf_if *ifp, int mpc) 1028 { 1029 struct brcmf_pub *drvr = ifp->drvr; 1030 s32 err = 0; 1031 1032 if (check_vif_up(ifp->vif)) { 1033 err = brcmf_fil_iovar_int_set(ifp, "mpc", mpc); 1034 if (err) { 1035 bphy_err(drvr, "fail to set mpc\n"); 1036 return; 1037 } 1038 brcmf_dbg(INFO, "MPC : %d\n", mpc); 1039 } 1040 } 1041 1042 static void brcmf_scan_params_v2_to_v1(struct brcmf_scan_params_v2_le *params_v2_le, 1043 struct brcmf_scan_params_le *params_le) 1044 { 1045 size_t params_size; 1046 u32 ch; 1047 int n_channels, n_ssids; 1048 1049 memcpy(¶ms_le->ssid_le, ¶ms_v2_le->ssid_le, 1050 sizeof(params_le->ssid_le)); 1051 memcpy(¶ms_le->bssid, ¶ms_v2_le->bssid, 1052 sizeof(params_le->bssid)); 1053 1054 params_le->bss_type = params_v2_le->bss_type; 1055 params_le->scan_type = le32_to_cpu(params_v2_le->scan_type); 1056 params_le->nprobes = params_v2_le->nprobes; 1057 params_le->active_time = params_v2_le->active_time; 1058 params_le->passive_time = params_v2_le->passive_time; 1059 params_le->home_time = params_v2_le->home_time; 1060 params_le->channel_num = params_v2_le->channel_num; 1061 1062 ch = le32_to_cpu(params_v2_le->channel_num); 1063 n_channels = ch & BRCMF_SCAN_PARAMS_COUNT_MASK; 1064 n_ssids = ch >> BRCMF_SCAN_PARAMS_NSSID_SHIFT; 1065 1066 params_size = sizeof(u16) * n_channels; 1067 if (n_ssids > 0) { 1068 params_size = roundup(params_size, sizeof(u32)); 1069 params_size += sizeof(struct brcmf_ssid_le) * n_ssids; 1070 } 1071 1072 memcpy(¶ms_le->channel_list[0], 1073 ¶ms_v2_le->channel_list[0], params_size); 1074 } 1075 1076 static void brcmf_escan_prep(struct brcmf_cfg80211_info *cfg, 1077 struct brcmf_scan_params_v2_le *params_le, 1078 struct cfg80211_scan_request *request) 1079 { 1080 u32 n_ssids; 1081 u32 n_channels; 1082 s32 i; 1083 s32 offset; 1084 u16 chanspec; 1085 char *ptr; 1086 int length; 1087 struct brcmf_ssid_le ssid_le; 1088 1089 eth_broadcast_addr(params_le->bssid); 1090 1091 length = BRCMF_SCAN_PARAMS_V2_FIXED_SIZE; 1092 1093 params_le->version = cpu_to_le16(BRCMF_SCAN_PARAMS_VERSION_V2); 1094 params_le->bss_type = DOT11_BSSTYPE_ANY; 1095 params_le->scan_type = cpu_to_le32(BRCMF_SCANTYPE_ACTIVE); 1096 params_le->channel_num = 0; 1097 params_le->nprobes = cpu_to_le32(-1); 1098 params_le->active_time = cpu_to_le32(-1); 1099 params_le->passive_time = cpu_to_le32(-1); 1100 params_le->home_time = cpu_to_le32(-1); 1101 memset(¶ms_le->ssid_le, 0, sizeof(params_le->ssid_le)); 1102 1103 /* Scan abort */ 1104 if (!request) { 1105 length += sizeof(u16); 1106 params_le->channel_num = cpu_to_le32(1); 1107 params_le->channel_list[0] = cpu_to_le16(-1); 1108 params_le->length = cpu_to_le16(length); 1109 return; 1110 } 1111 1112 n_ssids = request->n_ssids; 1113 n_channels = request->n_channels; 1114 1115 /* Copy channel array if applicable */ 1116 brcmf_dbg(SCAN, "### List of channelspecs to scan ### %d\n", 1117 n_channels); 1118 if (n_channels > 0) { 1119 length += roundup(sizeof(u16) * n_channels, sizeof(u32)); 1120 for (i = 0; i < n_channels; i++) { 1121 chanspec = channel_to_chanspec(&cfg->d11inf, 1122 request->channels[i]); 1123 brcmf_dbg(SCAN, "Chan : %d, Channel spec: %x\n", 1124 request->channels[i]->hw_value, chanspec); 1125 params_le->channel_list[i] = cpu_to_le16(chanspec); 1126 } 1127 } else { 1128 brcmf_dbg(SCAN, "Scanning all channels\n"); 1129 } 1130 1131 /* Copy ssid array if applicable */ 1132 brcmf_dbg(SCAN, "### List of SSIDs to scan ### %d\n", n_ssids); 1133 if (n_ssids > 0) { 1134 offset = offsetof(struct brcmf_scan_params_v2_le, channel_list) + 1135 n_channels * sizeof(u16); 1136 offset = roundup(offset, sizeof(u32)); 1137 length += sizeof(ssid_le) * n_ssids, 1138 ptr = (char *)params_le + offset; 1139 for (i = 0; i < n_ssids; i++) { 1140 memset(&ssid_le, 0, sizeof(ssid_le)); 1141 ssid_le.SSID_len = 1142 cpu_to_le32(request->ssids[i].ssid_len); 1143 memcpy(ssid_le.SSID, request->ssids[i].ssid, 1144 request->ssids[i].ssid_len); 1145 if (!ssid_le.SSID_len) 1146 brcmf_dbg(SCAN, "%d: Broadcast scan\n", i); 1147 else 1148 brcmf_dbg(SCAN, "%d: scan for %.32s size=%d\n", 1149 i, ssid_le.SSID, ssid_le.SSID_len); 1150 memcpy(ptr, &ssid_le, sizeof(ssid_le)); 1151 ptr += sizeof(ssid_le); 1152 } 1153 } else { 1154 brcmf_dbg(SCAN, "Performing passive scan\n"); 1155 params_le->scan_type = cpu_to_le32(BRCMF_SCANTYPE_PASSIVE); 1156 } 1157 params_le->length = cpu_to_le16(length); 1158 /* Adding mask to channel numbers */ 1159 params_le->channel_num = 1160 cpu_to_le32((n_ssids << BRCMF_SCAN_PARAMS_NSSID_SHIFT) | 1161 (n_channels & BRCMF_SCAN_PARAMS_COUNT_MASK)); 1162 } 1163 1164 s32 brcmf_notify_escan_complete(struct brcmf_cfg80211_info *cfg, 1165 struct brcmf_if *ifp, bool aborted, 1166 bool fw_abort) 1167 { 1168 struct brcmf_pub *drvr = cfg->pub; 1169 struct brcmf_scan_params_v2_le params_v2_le; 1170 struct cfg80211_scan_request *scan_request; 1171 u64 reqid; 1172 u32 bucket; 1173 s32 err = 0; 1174 1175 brcmf_dbg(SCAN, "Enter\n"); 1176 1177 /* clear scan request, because the FW abort can cause a second call */ 1178 /* to this functon and might cause a double cfg80211_scan_done */ 1179 scan_request = cfg->scan_request; 1180 cfg->scan_request = NULL; 1181 1182 if (timer_pending(&cfg->escan_timeout)) 1183 del_timer_sync(&cfg->escan_timeout); 1184 1185 if (fw_abort) { 1186 /* Do a scan abort to stop the driver's scan engine */ 1187 brcmf_dbg(SCAN, "ABORT scan in firmware\n"); 1188 1189 brcmf_escan_prep(cfg, ¶ms_v2_le, NULL); 1190 1191 /* E-Scan (or anyother type) can be aborted by SCAN */ 1192 if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_SCAN_V2)) { 1193 err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SCAN, 1194 ¶ms_v2_le, 1195 sizeof(params_v2_le)); 1196 } else { 1197 struct brcmf_scan_params_le params_le; 1198 1199 brcmf_scan_params_v2_to_v1(¶ms_v2_le, ¶ms_le); 1200 err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SCAN, 1201 ¶ms_le, 1202 sizeof(params_le)); 1203 } 1204 1205 if (err) 1206 bphy_err(drvr, "Scan abort failed\n"); 1207 } 1208 1209 brcmf_scan_config_mpc(ifp, 1); 1210 1211 /* 1212 * e-scan can be initiated internally 1213 * which takes precedence. 1214 */ 1215 if (cfg->int_escan_map) { 1216 brcmf_dbg(SCAN, "scheduled scan completed (%x)\n", 1217 cfg->int_escan_map); 1218 while (cfg->int_escan_map) { 1219 bucket = __ffs(cfg->int_escan_map); 1220 cfg->int_escan_map &= ~BIT(bucket); 1221 reqid = brcmf_pno_find_reqid_by_bucket(cfg->pno, 1222 bucket); 1223 if (!aborted) { 1224 brcmf_dbg(SCAN, "report results: reqid=%llu\n", 1225 reqid); 1226 cfg80211_sched_scan_results(cfg_to_wiphy(cfg), 1227 reqid); 1228 } 1229 } 1230 } else if (scan_request) { 1231 struct cfg80211_scan_info info = { 1232 .aborted = aborted, 1233 }; 1234 1235 brcmf_dbg(SCAN, "ESCAN Completed scan: %s\n", 1236 aborted ? "Aborted" : "Done"); 1237 cfg80211_scan_done(scan_request, &info); 1238 } 1239 if (!test_and_clear_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status)) 1240 brcmf_dbg(SCAN, "Scan complete, probably P2P scan\n"); 1241 1242 return err; 1243 } 1244 1245 static int brcmf_cfg80211_del_apsta_iface(struct wiphy *wiphy, 1246 struct wireless_dev *wdev) 1247 { 1248 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 1249 struct net_device *ndev = wdev->netdev; 1250 struct brcmf_if *ifp = netdev_priv(ndev); 1251 struct brcmf_pub *drvr = cfg->pub; 1252 int ret; 1253 int err; 1254 1255 brcmf_cfg80211_arm_vif_event(cfg, ifp->vif); 1256 1257 err = brcmf_fil_bsscfg_data_set(ifp, "interface_remove", NULL, 0); 1258 if (err) { 1259 bphy_err(drvr, "interface_remove failed %d\n", err); 1260 goto err_unarm; 1261 } 1262 1263 /* wait for firmware event */ 1264 ret = brcmf_cfg80211_wait_vif_event(cfg, BRCMF_E_IF_DEL, 1265 BRCMF_VIF_EVENT_TIMEOUT); 1266 if (!ret) { 1267 bphy_err(drvr, "timeout occurred\n"); 1268 err = -EIO; 1269 goto err_unarm; 1270 } 1271 1272 brcmf_remove_interface(ifp, true); 1273 1274 err_unarm: 1275 brcmf_cfg80211_arm_vif_event(cfg, NULL); 1276 return err; 1277 } 1278 1279 static 1280 int brcmf_cfg80211_del_iface(struct wiphy *wiphy, struct wireless_dev *wdev) 1281 { 1282 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 1283 struct net_device *ndev = wdev->netdev; 1284 1285 if (ndev && ndev == cfg_to_ndev(cfg)) 1286 return -ENOTSUPP; 1287 1288 /* vif event pending in firmware */ 1289 if (brcmf_cfg80211_vif_event_armed(cfg)) 1290 return -EBUSY; 1291 1292 if (ndev) { 1293 if (test_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status) && 1294 cfg->escan_info.ifp == netdev_priv(ndev)) 1295 brcmf_notify_escan_complete(cfg, netdev_priv(ndev), 1296 true, true); 1297 1298 brcmf_fil_iovar_int_set(netdev_priv(ndev), "mpc", 1); 1299 } 1300 1301 switch (wdev->iftype) { 1302 case NL80211_IFTYPE_ADHOC: 1303 case NL80211_IFTYPE_AP_VLAN: 1304 case NL80211_IFTYPE_WDS: 1305 case NL80211_IFTYPE_MESH_POINT: 1306 return -EOPNOTSUPP; 1307 case NL80211_IFTYPE_MONITOR: 1308 return brcmf_mon_del_vif(wiphy, wdev); 1309 case NL80211_IFTYPE_STATION: 1310 case NL80211_IFTYPE_AP: 1311 return brcmf_cfg80211_del_apsta_iface(wiphy, wdev); 1312 case NL80211_IFTYPE_P2P_CLIENT: 1313 case NL80211_IFTYPE_P2P_GO: 1314 case NL80211_IFTYPE_P2P_DEVICE: 1315 return brcmf_p2p_del_vif(wiphy, wdev); 1316 case NL80211_IFTYPE_UNSPECIFIED: 1317 default: 1318 return -EINVAL; 1319 } 1320 return -EOPNOTSUPP; 1321 } 1322 1323 static s32 1324 brcmf_cfg80211_change_iface(struct wiphy *wiphy, struct net_device *ndev, 1325 enum nl80211_iftype type, 1326 struct vif_params *params) 1327 { 1328 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 1329 struct brcmf_if *ifp = netdev_priv(ndev); 1330 struct brcmf_cfg80211_vif *vif = ifp->vif; 1331 struct brcmf_pub *drvr = cfg->pub; 1332 s32 infra = 0; 1333 s32 ap = 0; 1334 s32 err = 0; 1335 1336 brcmf_dbg(TRACE, "Enter, bsscfgidx=%d, type=%d\n", ifp->bsscfgidx, 1337 type); 1338 1339 /* WAR: There are a number of p2p interface related problems which 1340 * need to be handled initially (before doing the validate). 1341 * wpa_supplicant tends to do iface changes on p2p device/client/go 1342 * which are not always possible/allowed. However we need to return 1343 * OK otherwise the wpa_supplicant wont start. The situation differs 1344 * on configuration and setup (p2pon=1 module param). The first check 1345 * is to see if the request is a change to station for p2p iface. 1346 */ 1347 if ((type == NL80211_IFTYPE_STATION) && 1348 ((vif->wdev.iftype == NL80211_IFTYPE_P2P_CLIENT) || 1349 (vif->wdev.iftype == NL80211_IFTYPE_P2P_GO) || 1350 (vif->wdev.iftype == NL80211_IFTYPE_P2P_DEVICE))) { 1351 brcmf_dbg(TRACE, "Ignoring cmd for p2p if\n"); 1352 /* Now depending on whether module param p2pon=1 was used the 1353 * response needs to be either 0 or EOPNOTSUPP. The reason is 1354 * that if p2pon=1 is used, but a newer supplicant is used then 1355 * we should return an error, as this combination wont work. 1356 * In other situations 0 is returned and supplicant will start 1357 * normally. It will give a trace in cfg80211, but it is the 1358 * only way to get it working. Unfortunately this will result 1359 * in situation where we wont support new supplicant in 1360 * combination with module param p2pon=1, but that is the way 1361 * it is. If the user tries this then unloading of driver might 1362 * fail/lock. 1363 */ 1364 if (cfg->p2p.p2pdev_dynamically) 1365 return -EOPNOTSUPP; 1366 else 1367 return 0; 1368 } 1369 err = brcmf_vif_change_validate(wiphy_to_cfg(wiphy), vif, type); 1370 if (err) { 1371 bphy_err(drvr, "iface validation failed: err=%d\n", err); 1372 return err; 1373 } 1374 switch (type) { 1375 case NL80211_IFTYPE_MONITOR: 1376 case NL80211_IFTYPE_WDS: 1377 bphy_err(drvr, "type (%d) : currently we do not support this type\n", 1378 type); 1379 return -EOPNOTSUPP; 1380 case NL80211_IFTYPE_ADHOC: 1381 infra = 0; 1382 break; 1383 case NL80211_IFTYPE_STATION: 1384 infra = 1; 1385 break; 1386 case NL80211_IFTYPE_AP: 1387 case NL80211_IFTYPE_P2P_GO: 1388 ap = 1; 1389 break; 1390 default: 1391 err = -EINVAL; 1392 goto done; 1393 } 1394 1395 if (ap) { 1396 if (type == NL80211_IFTYPE_P2P_GO) { 1397 brcmf_dbg(INFO, "IF Type = P2P GO\n"); 1398 err = brcmf_p2p_ifchange(cfg, BRCMF_FIL_P2P_IF_GO); 1399 } 1400 if (!err) { 1401 brcmf_dbg(INFO, "IF Type = AP\n"); 1402 } 1403 } else { 1404 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_INFRA, infra); 1405 if (err) { 1406 bphy_err(drvr, "WLC_SET_INFRA error (%d)\n", err); 1407 err = -EAGAIN; 1408 goto done; 1409 } 1410 brcmf_dbg(INFO, "IF Type = %s\n", brcmf_is_ibssmode(vif) ? 1411 "Adhoc" : "Infra"); 1412 } 1413 ndev->ieee80211_ptr->iftype = type; 1414 1415 brcmf_cfg80211_update_proto_addr_mode(&vif->wdev); 1416 1417 done: 1418 brcmf_dbg(TRACE, "Exit\n"); 1419 1420 return err; 1421 } 1422 1423 static s32 1424 brcmf_run_escan(struct brcmf_cfg80211_info *cfg, struct brcmf_if *ifp, 1425 struct cfg80211_scan_request *request) 1426 { 1427 struct brcmf_pub *drvr = cfg->pub; 1428 s32 params_size = BRCMF_SCAN_PARAMS_V2_FIXED_SIZE + 1429 offsetof(struct brcmf_escan_params_le, params_v2_le); 1430 struct brcmf_escan_params_le *params; 1431 s32 err = 0; 1432 1433 brcmf_dbg(SCAN, "E-SCAN START\n"); 1434 1435 if (request != NULL) { 1436 /* Allocate space for populating ssids in struct */ 1437 params_size += sizeof(u32) * ((request->n_channels + 1) / 2); 1438 1439 /* Allocate space for populating ssids in struct */ 1440 params_size += sizeof(struct brcmf_ssid_le) * request->n_ssids; 1441 } 1442 1443 params = kzalloc(params_size, GFP_KERNEL); 1444 if (!params) { 1445 err = -ENOMEM; 1446 goto exit; 1447 } 1448 BUG_ON(params_size + sizeof("escan") >= BRCMF_DCMD_MEDLEN); 1449 brcmf_escan_prep(cfg, ¶ms->params_v2_le, request); 1450 1451 params->version = cpu_to_le32(BRCMF_ESCAN_REQ_VERSION_V2); 1452 1453 if (!brcmf_feat_is_enabled(ifp, BRCMF_FEAT_SCAN_V2)) { 1454 struct brcmf_escan_params_le *params_v1; 1455 1456 params_size -= BRCMF_SCAN_PARAMS_V2_FIXED_SIZE; 1457 params_size += BRCMF_SCAN_PARAMS_FIXED_SIZE; 1458 params_v1 = kzalloc(params_size, GFP_KERNEL); 1459 if (!params_v1) { 1460 err = -ENOMEM; 1461 goto exit_params; 1462 } 1463 params_v1->version = cpu_to_le32(BRCMF_ESCAN_REQ_VERSION); 1464 brcmf_scan_params_v2_to_v1(¶ms->params_v2_le, ¶ms_v1->params_le); 1465 kfree(params); 1466 params = params_v1; 1467 } 1468 1469 params->action = cpu_to_le16(WL_ESCAN_ACTION_START); 1470 params->sync_id = cpu_to_le16(0x1234); 1471 1472 err = brcmf_fil_iovar_data_set(ifp, "escan", params, params_size); 1473 if (err) { 1474 if (err == -EBUSY) 1475 brcmf_dbg(INFO, "system busy : escan canceled\n"); 1476 else 1477 bphy_err(drvr, "error (%d)\n", err); 1478 } 1479 1480 exit_params: 1481 kfree(params); 1482 exit: 1483 return err; 1484 } 1485 1486 static s32 1487 brcmf_do_escan(struct brcmf_if *ifp, struct cfg80211_scan_request *request) 1488 { 1489 struct brcmf_cfg80211_info *cfg = ifp->drvr->config; 1490 s32 err; 1491 struct brcmf_scan_results *results; 1492 struct escan_info *escan = &cfg->escan_info; 1493 1494 brcmf_dbg(SCAN, "Enter\n"); 1495 escan->ifp = ifp; 1496 escan->wiphy = cfg->wiphy; 1497 escan->escan_state = WL_ESCAN_STATE_SCANNING; 1498 1499 brcmf_scan_config_mpc(ifp, 0); 1500 results = (struct brcmf_scan_results *)cfg->escan_info.escan_buf; 1501 results->version = 0; 1502 results->count = 0; 1503 results->buflen = WL_ESCAN_RESULTS_FIXED_SIZE; 1504 1505 err = escan->run(cfg, ifp, request); 1506 if (err) 1507 brcmf_scan_config_mpc(ifp, 1); 1508 return err; 1509 } 1510 1511 static s32 1512 brcmf_cfg80211_scan(struct wiphy *wiphy, struct cfg80211_scan_request *request) 1513 { 1514 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 1515 struct brcmf_pub *drvr = cfg->pub; 1516 struct brcmf_cfg80211_vif *vif; 1517 s32 err = 0; 1518 1519 brcmf_dbg(TRACE, "Enter\n"); 1520 vif = container_of(request->wdev, struct brcmf_cfg80211_vif, wdev); 1521 if (!check_vif_up(vif)) 1522 return -EIO; 1523 1524 if (test_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status)) { 1525 bphy_err(drvr, "Scanning already: status (%lu)\n", 1526 cfg->scan_status); 1527 return -EAGAIN; 1528 } 1529 if (test_bit(BRCMF_SCAN_STATUS_ABORT, &cfg->scan_status)) { 1530 bphy_err(drvr, "Scanning being aborted: status (%lu)\n", 1531 cfg->scan_status); 1532 return -EAGAIN; 1533 } 1534 if (test_bit(BRCMF_SCAN_STATUS_SUPPRESS, &cfg->scan_status)) { 1535 bphy_err(drvr, "Scanning suppressed: status (%lu)\n", 1536 cfg->scan_status); 1537 return -EAGAIN; 1538 } 1539 if (test_bit(BRCMF_VIF_STATUS_CONNECTING, &vif->sme_state)) { 1540 bphy_err(drvr, "Connecting: status (%lu)\n", vif->sme_state); 1541 return -EAGAIN; 1542 } 1543 1544 /* If scan req comes for p2p0, send it over primary I/F */ 1545 if (vif == cfg->p2p.bss_idx[P2PAPI_BSSCFG_DEVICE].vif) 1546 vif = cfg->p2p.bss_idx[P2PAPI_BSSCFG_PRIMARY].vif; 1547 1548 brcmf_dbg(SCAN, "START ESCAN\n"); 1549 1550 cfg->scan_request = request; 1551 set_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status); 1552 1553 cfg->escan_info.run = brcmf_run_escan; 1554 err = brcmf_p2p_scan_prep(wiphy, request, vif); 1555 if (err) 1556 goto scan_out; 1557 1558 err = brcmf_vif_set_mgmt_ie(vif, BRCMF_VNDR_IE_PRBREQ_FLAG, 1559 request->ie, request->ie_len); 1560 if (err) 1561 goto scan_out; 1562 1563 err = brcmf_do_escan(vif->ifp, request); 1564 if (err) 1565 goto scan_out; 1566 1567 /* Arm scan timeout timer */ 1568 mod_timer(&cfg->escan_timeout, 1569 jiffies + msecs_to_jiffies(BRCMF_ESCAN_TIMER_INTERVAL_MS)); 1570 1571 return 0; 1572 1573 scan_out: 1574 bphy_err(drvr, "scan error (%d)\n", err); 1575 clear_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status); 1576 cfg->scan_request = NULL; 1577 return err; 1578 } 1579 1580 static s32 brcmf_set_rts(struct net_device *ndev, u32 rts_threshold) 1581 { 1582 struct brcmf_if *ifp = netdev_priv(ndev); 1583 struct brcmf_pub *drvr = ifp->drvr; 1584 s32 err = 0; 1585 1586 err = brcmf_fil_iovar_int_set(ifp, "rtsthresh", rts_threshold); 1587 if (err) 1588 bphy_err(drvr, "Error (%d)\n", err); 1589 1590 return err; 1591 } 1592 1593 static s32 brcmf_set_frag(struct net_device *ndev, u32 frag_threshold) 1594 { 1595 struct brcmf_if *ifp = netdev_priv(ndev); 1596 struct brcmf_pub *drvr = ifp->drvr; 1597 s32 err = 0; 1598 1599 err = brcmf_fil_iovar_int_set(ifp, "fragthresh", 1600 frag_threshold); 1601 if (err) 1602 bphy_err(drvr, "Error (%d)\n", err); 1603 1604 return err; 1605 } 1606 1607 static s32 brcmf_set_retry(struct net_device *ndev, u32 retry, bool l) 1608 { 1609 struct brcmf_if *ifp = netdev_priv(ndev); 1610 struct brcmf_pub *drvr = ifp->drvr; 1611 s32 err = 0; 1612 u32 cmd = (l ? BRCMF_C_SET_LRL : BRCMF_C_SET_SRL); 1613 1614 err = brcmf_fil_cmd_int_set(ifp, cmd, retry); 1615 if (err) { 1616 bphy_err(drvr, "cmd (%d) , error (%d)\n", cmd, err); 1617 return err; 1618 } 1619 return err; 1620 } 1621 1622 static s32 brcmf_cfg80211_set_wiphy_params(struct wiphy *wiphy, u32 changed) 1623 { 1624 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 1625 struct net_device *ndev = cfg_to_ndev(cfg); 1626 struct brcmf_if *ifp = netdev_priv(ndev); 1627 s32 err = 0; 1628 1629 brcmf_dbg(TRACE, "Enter\n"); 1630 if (!check_vif_up(ifp->vif)) 1631 return -EIO; 1632 1633 if (changed & WIPHY_PARAM_RTS_THRESHOLD && 1634 (cfg->conf->rts_threshold != wiphy->rts_threshold)) { 1635 cfg->conf->rts_threshold = wiphy->rts_threshold; 1636 err = brcmf_set_rts(ndev, cfg->conf->rts_threshold); 1637 if (!err) 1638 goto done; 1639 } 1640 if (changed & WIPHY_PARAM_FRAG_THRESHOLD && 1641 (cfg->conf->frag_threshold != wiphy->frag_threshold)) { 1642 cfg->conf->frag_threshold = wiphy->frag_threshold; 1643 err = brcmf_set_frag(ndev, cfg->conf->frag_threshold); 1644 if (!err) 1645 goto done; 1646 } 1647 if (changed & WIPHY_PARAM_RETRY_LONG 1648 && (cfg->conf->retry_long != wiphy->retry_long)) { 1649 cfg->conf->retry_long = wiphy->retry_long; 1650 err = brcmf_set_retry(ndev, cfg->conf->retry_long, true); 1651 if (!err) 1652 goto done; 1653 } 1654 if (changed & WIPHY_PARAM_RETRY_SHORT 1655 && (cfg->conf->retry_short != wiphy->retry_short)) { 1656 cfg->conf->retry_short = wiphy->retry_short; 1657 err = brcmf_set_retry(ndev, cfg->conf->retry_short, false); 1658 if (!err) 1659 goto done; 1660 } 1661 1662 done: 1663 brcmf_dbg(TRACE, "Exit\n"); 1664 return err; 1665 } 1666 1667 static void brcmf_init_prof(struct brcmf_cfg80211_profile *prof) 1668 { 1669 memset(prof, 0, sizeof(*prof)); 1670 } 1671 1672 static u16 brcmf_map_fw_linkdown_reason(const struct brcmf_event_msg *e) 1673 { 1674 u16 reason; 1675 1676 switch (e->event_code) { 1677 case BRCMF_E_DEAUTH: 1678 case BRCMF_E_DEAUTH_IND: 1679 case BRCMF_E_DISASSOC_IND: 1680 reason = e->reason; 1681 break; 1682 case BRCMF_E_LINK: 1683 default: 1684 reason = 0; 1685 break; 1686 } 1687 return reason; 1688 } 1689 1690 static int brcmf_set_pmk(struct brcmf_if *ifp, const u8 *pmk_data, u16 pmk_len) 1691 { 1692 struct brcmf_pub *drvr = ifp->drvr; 1693 struct brcmf_wsec_pmk_le pmk; 1694 int err; 1695 1696 memset(&pmk, 0, sizeof(pmk)); 1697 1698 /* pass pmk directly */ 1699 pmk.key_len = cpu_to_le16(pmk_len); 1700 pmk.flags = cpu_to_le16(0); 1701 memcpy(pmk.key, pmk_data, pmk_len); 1702 1703 /* store psk in firmware */ 1704 err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_WSEC_PMK, 1705 &pmk, sizeof(pmk)); 1706 if (err < 0) 1707 bphy_err(drvr, "failed to change PSK in firmware (len=%u)\n", 1708 pmk_len); 1709 1710 return err; 1711 } 1712 1713 static int brcmf_set_sae_password(struct brcmf_if *ifp, const u8 *pwd_data, 1714 u16 pwd_len) 1715 { 1716 struct brcmf_pub *drvr = ifp->drvr; 1717 struct brcmf_wsec_sae_pwd_le sae_pwd; 1718 int err; 1719 1720 if (pwd_len > BRCMF_WSEC_MAX_SAE_PASSWORD_LEN) { 1721 bphy_err(drvr, "sae_password must be less than %d\n", 1722 BRCMF_WSEC_MAX_SAE_PASSWORD_LEN); 1723 return -EINVAL; 1724 } 1725 1726 sae_pwd.key_len = cpu_to_le16(pwd_len); 1727 memcpy(sae_pwd.key, pwd_data, pwd_len); 1728 1729 err = brcmf_fil_iovar_data_set(ifp, "sae_password", &sae_pwd, 1730 sizeof(sae_pwd)); 1731 if (err < 0) 1732 bphy_err(drvr, "failed to set SAE password in firmware (len=%u)\n", 1733 pwd_len); 1734 1735 return err; 1736 } 1737 1738 static void brcmf_link_down(struct brcmf_cfg80211_vif *vif, u16 reason, 1739 bool locally_generated) 1740 { 1741 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(vif->wdev.wiphy); 1742 struct brcmf_pub *drvr = cfg->pub; 1743 bool bus_up = drvr->bus_if->state == BRCMF_BUS_UP; 1744 s32 err = 0; 1745 1746 brcmf_dbg(TRACE, "Enter\n"); 1747 1748 if (test_and_clear_bit(BRCMF_VIF_STATUS_CONNECTED, &vif->sme_state)) { 1749 if (bus_up) { 1750 brcmf_dbg(INFO, "Call WLC_DISASSOC to stop excess roaming\n"); 1751 err = brcmf_fil_cmd_data_set(vif->ifp, 1752 BRCMF_C_DISASSOC, NULL, 0); 1753 if (err) 1754 bphy_err(drvr, "WLC_DISASSOC failed (%d)\n", 1755 err); 1756 } 1757 1758 if ((vif->wdev.iftype == NL80211_IFTYPE_STATION) || 1759 (vif->wdev.iftype == NL80211_IFTYPE_P2P_CLIENT)) 1760 cfg80211_disconnected(vif->wdev.netdev, reason, NULL, 0, 1761 locally_generated, GFP_KERNEL); 1762 } 1763 clear_bit(BRCMF_VIF_STATUS_CONNECTING, &vif->sme_state); 1764 clear_bit(BRCMF_VIF_STATUS_EAP_SUCCESS, &vif->sme_state); 1765 clear_bit(BRCMF_VIF_STATUS_ASSOC_SUCCESS, &vif->sme_state); 1766 clear_bit(BRCMF_SCAN_STATUS_SUPPRESS, &cfg->scan_status); 1767 brcmf_btcoex_set_mode(vif, BRCMF_BTCOEX_ENABLED, 0); 1768 if (vif->profile.use_fwsup != BRCMF_PROFILE_FWSUP_NONE) { 1769 if (bus_up) 1770 brcmf_set_pmk(vif->ifp, NULL, 0); 1771 vif->profile.use_fwsup = BRCMF_PROFILE_FWSUP_NONE; 1772 } 1773 brcmf_dbg(TRACE, "Exit\n"); 1774 } 1775 1776 static s32 1777 brcmf_cfg80211_join_ibss(struct wiphy *wiphy, struct net_device *ndev, 1778 struct cfg80211_ibss_params *params) 1779 { 1780 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 1781 struct brcmf_if *ifp = netdev_priv(ndev); 1782 struct brcmf_cfg80211_profile *profile = &ifp->vif->profile; 1783 struct brcmf_pub *drvr = cfg->pub; 1784 struct brcmf_join_params join_params; 1785 size_t join_params_size = 0; 1786 s32 err = 0; 1787 s32 wsec = 0; 1788 s32 bcnprd; 1789 u16 chanspec; 1790 u32 ssid_len; 1791 1792 brcmf_dbg(TRACE, "Enter\n"); 1793 if (!check_vif_up(ifp->vif)) 1794 return -EIO; 1795 1796 if (params->ssid) 1797 brcmf_dbg(CONN, "SSID: %s\n", params->ssid); 1798 else { 1799 brcmf_dbg(CONN, "SSID: NULL, Not supported\n"); 1800 return -EOPNOTSUPP; 1801 } 1802 1803 set_bit(BRCMF_VIF_STATUS_CONNECTING, &ifp->vif->sme_state); 1804 1805 if (params->bssid) 1806 brcmf_dbg(CONN, "BSSID: %pM\n", params->bssid); 1807 else 1808 brcmf_dbg(CONN, "No BSSID specified\n"); 1809 1810 if (params->chandef.chan) 1811 brcmf_dbg(CONN, "channel: %d\n", 1812 params->chandef.chan->center_freq); 1813 else 1814 brcmf_dbg(CONN, "no channel specified\n"); 1815 1816 if (params->channel_fixed) 1817 brcmf_dbg(CONN, "fixed channel required\n"); 1818 else 1819 brcmf_dbg(CONN, "no fixed channel required\n"); 1820 1821 if (params->ie && params->ie_len) 1822 brcmf_dbg(CONN, "ie len: %d\n", params->ie_len); 1823 else 1824 brcmf_dbg(CONN, "no ie specified\n"); 1825 1826 if (params->beacon_interval) 1827 brcmf_dbg(CONN, "beacon interval: %d\n", 1828 params->beacon_interval); 1829 else 1830 brcmf_dbg(CONN, "no beacon interval specified\n"); 1831 1832 if (params->basic_rates) 1833 brcmf_dbg(CONN, "basic rates: %08X\n", params->basic_rates); 1834 else 1835 brcmf_dbg(CONN, "no basic rates specified\n"); 1836 1837 if (params->privacy) 1838 brcmf_dbg(CONN, "privacy required\n"); 1839 else 1840 brcmf_dbg(CONN, "no privacy required\n"); 1841 1842 /* Configure Privacy for starter */ 1843 if (params->privacy) 1844 wsec |= WEP_ENABLED; 1845 1846 err = brcmf_fil_iovar_int_set(ifp, "wsec", wsec); 1847 if (err) { 1848 bphy_err(drvr, "wsec failed (%d)\n", err); 1849 goto done; 1850 } 1851 1852 /* Configure Beacon Interval for starter */ 1853 if (params->beacon_interval) 1854 bcnprd = params->beacon_interval; 1855 else 1856 bcnprd = 100; 1857 1858 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_BCNPRD, bcnprd); 1859 if (err) { 1860 bphy_err(drvr, "WLC_SET_BCNPRD failed (%d)\n", err); 1861 goto done; 1862 } 1863 1864 /* Configure required join parameter */ 1865 memset(&join_params, 0, sizeof(struct brcmf_join_params)); 1866 1867 /* SSID */ 1868 ssid_len = min_t(u32, params->ssid_len, IEEE80211_MAX_SSID_LEN); 1869 memcpy(join_params.ssid_le.SSID, params->ssid, ssid_len); 1870 join_params.ssid_le.SSID_len = cpu_to_le32(ssid_len); 1871 join_params_size = sizeof(join_params.ssid_le); 1872 1873 /* BSSID */ 1874 if (params->bssid) { 1875 memcpy(join_params.params_le.bssid, params->bssid, ETH_ALEN); 1876 join_params_size += BRCMF_ASSOC_PARAMS_FIXED_SIZE; 1877 memcpy(profile->bssid, params->bssid, ETH_ALEN); 1878 } else { 1879 eth_broadcast_addr(join_params.params_le.bssid); 1880 eth_zero_addr(profile->bssid); 1881 } 1882 1883 /* Channel */ 1884 if (params->chandef.chan) { 1885 u32 target_channel; 1886 1887 cfg->channel = 1888 ieee80211_frequency_to_channel( 1889 params->chandef.chan->center_freq); 1890 if (params->channel_fixed) { 1891 /* adding chanspec */ 1892 chanspec = chandef_to_chanspec(&cfg->d11inf, 1893 ¶ms->chandef); 1894 join_params.params_le.chanspec_list[0] = 1895 cpu_to_le16(chanspec); 1896 join_params.params_le.chanspec_num = cpu_to_le32(1); 1897 join_params_size += sizeof(join_params.params_le); 1898 } 1899 1900 /* set channel for starter */ 1901 target_channel = cfg->channel; 1902 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_CHANNEL, 1903 target_channel); 1904 if (err) { 1905 bphy_err(drvr, "WLC_SET_CHANNEL failed (%d)\n", err); 1906 goto done; 1907 } 1908 } else 1909 cfg->channel = 0; 1910 1911 cfg->ibss_starter = false; 1912 1913 1914 err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_SSID, 1915 &join_params, join_params_size); 1916 if (err) { 1917 bphy_err(drvr, "WLC_SET_SSID failed (%d)\n", err); 1918 goto done; 1919 } 1920 1921 done: 1922 if (err) 1923 clear_bit(BRCMF_VIF_STATUS_CONNECTING, &ifp->vif->sme_state); 1924 brcmf_dbg(TRACE, "Exit\n"); 1925 return err; 1926 } 1927 1928 static s32 1929 brcmf_cfg80211_leave_ibss(struct wiphy *wiphy, struct net_device *ndev) 1930 { 1931 struct brcmf_if *ifp = netdev_priv(ndev); 1932 1933 brcmf_dbg(TRACE, "Enter\n"); 1934 if (!check_vif_up(ifp->vif)) { 1935 /* When driver is being unloaded, it can end up here. If an 1936 * error is returned then later on a debug trace in the wireless 1937 * core module will be printed. To avoid this 0 is returned. 1938 */ 1939 return 0; 1940 } 1941 1942 brcmf_link_down(ifp->vif, WLAN_REASON_DEAUTH_LEAVING, true); 1943 brcmf_net_setcarrier(ifp, false); 1944 1945 brcmf_dbg(TRACE, "Exit\n"); 1946 1947 return 0; 1948 } 1949 1950 static s32 brcmf_set_wpa_version(struct net_device *ndev, 1951 struct cfg80211_connect_params *sme) 1952 { 1953 struct brcmf_if *ifp = netdev_priv(ndev); 1954 struct brcmf_cfg80211_profile *profile = ndev_to_prof(ndev); 1955 struct brcmf_pub *drvr = ifp->drvr; 1956 struct brcmf_cfg80211_security *sec; 1957 s32 val = 0; 1958 s32 err = 0; 1959 1960 if (sme->crypto.wpa_versions & NL80211_WPA_VERSION_1) 1961 val = WPA_AUTH_PSK | WPA_AUTH_UNSPECIFIED; 1962 else if (sme->crypto.wpa_versions & NL80211_WPA_VERSION_2) 1963 val = WPA2_AUTH_PSK | WPA2_AUTH_UNSPECIFIED; 1964 else if (sme->crypto.wpa_versions & NL80211_WPA_VERSION_3) 1965 val = WPA3_AUTH_SAE_PSK; 1966 else 1967 val = WPA_AUTH_DISABLED; 1968 brcmf_dbg(CONN, "setting wpa_auth to 0x%0x\n", val); 1969 err = brcmf_fil_bsscfg_int_set(ifp, "wpa_auth", val); 1970 if (err) { 1971 bphy_err(drvr, "set wpa_auth failed (%d)\n", err); 1972 return err; 1973 } 1974 sec = &profile->sec; 1975 sec->wpa_versions = sme->crypto.wpa_versions; 1976 return err; 1977 } 1978 1979 static s32 brcmf_set_auth_type(struct net_device *ndev, 1980 struct cfg80211_connect_params *sme) 1981 { 1982 struct brcmf_if *ifp = netdev_priv(ndev); 1983 struct brcmf_cfg80211_profile *profile = ndev_to_prof(ndev); 1984 struct brcmf_pub *drvr = ifp->drvr; 1985 struct brcmf_cfg80211_security *sec; 1986 s32 val = 0; 1987 s32 err = 0; 1988 1989 switch (sme->auth_type) { 1990 case NL80211_AUTHTYPE_OPEN_SYSTEM: 1991 val = 0; 1992 brcmf_dbg(CONN, "open system\n"); 1993 break; 1994 case NL80211_AUTHTYPE_SHARED_KEY: 1995 val = 1; 1996 brcmf_dbg(CONN, "shared key\n"); 1997 break; 1998 case NL80211_AUTHTYPE_SAE: 1999 val = 3; 2000 brcmf_dbg(CONN, "SAE authentication\n"); 2001 break; 2002 default: 2003 val = 2; 2004 brcmf_dbg(CONN, "automatic, auth type (%d)\n", sme->auth_type); 2005 break; 2006 } 2007 2008 err = brcmf_fil_bsscfg_int_set(ifp, "auth", val); 2009 if (err) { 2010 bphy_err(drvr, "set auth failed (%d)\n", err); 2011 return err; 2012 } 2013 sec = &profile->sec; 2014 sec->auth_type = sme->auth_type; 2015 return err; 2016 } 2017 2018 static s32 2019 brcmf_set_wsec_mode(struct net_device *ndev, 2020 struct cfg80211_connect_params *sme) 2021 { 2022 struct brcmf_if *ifp = netdev_priv(ndev); 2023 struct brcmf_cfg80211_profile *profile = ndev_to_prof(ndev); 2024 struct brcmf_pub *drvr = ifp->drvr; 2025 struct brcmf_cfg80211_security *sec; 2026 s32 pval = 0; 2027 s32 gval = 0; 2028 s32 wsec; 2029 s32 err = 0; 2030 2031 if (sme->crypto.n_ciphers_pairwise) { 2032 switch (sme->crypto.ciphers_pairwise[0]) { 2033 case WLAN_CIPHER_SUITE_WEP40: 2034 case WLAN_CIPHER_SUITE_WEP104: 2035 pval = WEP_ENABLED; 2036 break; 2037 case WLAN_CIPHER_SUITE_TKIP: 2038 pval = TKIP_ENABLED; 2039 break; 2040 case WLAN_CIPHER_SUITE_CCMP: 2041 pval = AES_ENABLED; 2042 break; 2043 case WLAN_CIPHER_SUITE_AES_CMAC: 2044 pval = AES_ENABLED; 2045 break; 2046 default: 2047 bphy_err(drvr, "invalid cipher pairwise (%d)\n", 2048 sme->crypto.ciphers_pairwise[0]); 2049 return -EINVAL; 2050 } 2051 } 2052 if (sme->crypto.cipher_group) { 2053 switch (sme->crypto.cipher_group) { 2054 case WLAN_CIPHER_SUITE_WEP40: 2055 case WLAN_CIPHER_SUITE_WEP104: 2056 gval = WEP_ENABLED; 2057 break; 2058 case WLAN_CIPHER_SUITE_TKIP: 2059 gval = TKIP_ENABLED; 2060 break; 2061 case WLAN_CIPHER_SUITE_CCMP: 2062 gval = AES_ENABLED; 2063 break; 2064 case WLAN_CIPHER_SUITE_AES_CMAC: 2065 gval = AES_ENABLED; 2066 break; 2067 default: 2068 bphy_err(drvr, "invalid cipher group (%d)\n", 2069 sme->crypto.cipher_group); 2070 return -EINVAL; 2071 } 2072 } 2073 2074 brcmf_dbg(CONN, "pval (%d) gval (%d)\n", pval, gval); 2075 /* In case of privacy, but no security and WPS then simulate */ 2076 /* setting AES. WPS-2.0 allows no security */ 2077 if (brcmf_find_wpsie(sme->ie, sme->ie_len) && !pval && !gval && 2078 sme->privacy) 2079 pval = AES_ENABLED; 2080 2081 wsec = pval | gval; 2082 err = brcmf_fil_bsscfg_int_set(ifp, "wsec", wsec); 2083 if (err) { 2084 bphy_err(drvr, "error (%d)\n", err); 2085 return err; 2086 } 2087 2088 sec = &profile->sec; 2089 sec->cipher_pairwise = sme->crypto.ciphers_pairwise[0]; 2090 sec->cipher_group = sme->crypto.cipher_group; 2091 2092 return err; 2093 } 2094 2095 static s32 2096 brcmf_set_key_mgmt(struct net_device *ndev, struct cfg80211_connect_params *sme) 2097 { 2098 struct brcmf_if *ifp = netdev_priv(ndev); 2099 struct brcmf_cfg80211_profile *profile = &ifp->vif->profile; 2100 struct brcmf_pub *drvr = ifp->drvr; 2101 s32 val; 2102 s32 err; 2103 const struct brcmf_tlv *rsn_ie; 2104 const u8 *ie; 2105 u32 ie_len; 2106 u32 offset; 2107 u16 rsn_cap; 2108 u32 mfp; 2109 u16 count; 2110 2111 profile->use_fwsup = BRCMF_PROFILE_FWSUP_NONE; 2112 profile->is_ft = false; 2113 2114 if (!sme->crypto.n_akm_suites) 2115 return 0; 2116 2117 err = brcmf_fil_bsscfg_int_get(netdev_priv(ndev), "wpa_auth", &val); 2118 if (err) { 2119 bphy_err(drvr, "could not get wpa_auth (%d)\n", err); 2120 return err; 2121 } 2122 if (val & (WPA_AUTH_PSK | WPA_AUTH_UNSPECIFIED)) { 2123 switch (sme->crypto.akm_suites[0]) { 2124 case WLAN_AKM_SUITE_8021X: 2125 val = WPA_AUTH_UNSPECIFIED; 2126 if (sme->want_1x) 2127 profile->use_fwsup = BRCMF_PROFILE_FWSUP_1X; 2128 break; 2129 case WLAN_AKM_SUITE_PSK: 2130 val = WPA_AUTH_PSK; 2131 break; 2132 default: 2133 bphy_err(drvr, "invalid akm suite (%d)\n", 2134 sme->crypto.akm_suites[0]); 2135 return -EINVAL; 2136 } 2137 } else if (val & (WPA2_AUTH_PSK | WPA2_AUTH_UNSPECIFIED)) { 2138 switch (sme->crypto.akm_suites[0]) { 2139 case WLAN_AKM_SUITE_8021X: 2140 val = WPA2_AUTH_UNSPECIFIED; 2141 if (sme->want_1x) 2142 profile->use_fwsup = BRCMF_PROFILE_FWSUP_1X; 2143 break; 2144 case WLAN_AKM_SUITE_8021X_SHA256: 2145 val = WPA2_AUTH_1X_SHA256; 2146 if (sme->want_1x) 2147 profile->use_fwsup = BRCMF_PROFILE_FWSUP_1X; 2148 break; 2149 case WLAN_AKM_SUITE_PSK_SHA256: 2150 val = WPA2_AUTH_PSK_SHA256; 2151 break; 2152 case WLAN_AKM_SUITE_PSK: 2153 val = WPA2_AUTH_PSK; 2154 break; 2155 case WLAN_AKM_SUITE_FT_8021X: 2156 val = WPA2_AUTH_UNSPECIFIED | WPA2_AUTH_FT; 2157 profile->is_ft = true; 2158 if (sme->want_1x) 2159 profile->use_fwsup = BRCMF_PROFILE_FWSUP_1X; 2160 break; 2161 case WLAN_AKM_SUITE_FT_PSK: 2162 val = WPA2_AUTH_PSK | WPA2_AUTH_FT; 2163 profile->is_ft = true; 2164 break; 2165 default: 2166 bphy_err(drvr, "invalid akm suite (%d)\n", 2167 sme->crypto.akm_suites[0]); 2168 return -EINVAL; 2169 } 2170 } else if (val & WPA3_AUTH_SAE_PSK) { 2171 switch (sme->crypto.akm_suites[0]) { 2172 case WLAN_AKM_SUITE_SAE: 2173 val = WPA3_AUTH_SAE_PSK; 2174 if (sme->crypto.sae_pwd) { 2175 brcmf_dbg(INFO, "using SAE offload\n"); 2176 profile->use_fwsup = BRCMF_PROFILE_FWSUP_SAE; 2177 } 2178 break; 2179 case WLAN_AKM_SUITE_FT_OVER_SAE: 2180 val = WPA3_AUTH_SAE_PSK | WPA2_AUTH_FT; 2181 profile->is_ft = true; 2182 if (sme->crypto.sae_pwd) { 2183 brcmf_dbg(INFO, "using SAE offload\n"); 2184 profile->use_fwsup = BRCMF_PROFILE_FWSUP_SAE; 2185 } 2186 break; 2187 default: 2188 bphy_err(drvr, "invalid akm suite (%d)\n", 2189 sme->crypto.akm_suites[0]); 2190 return -EINVAL; 2191 } 2192 } 2193 2194 if (profile->use_fwsup == BRCMF_PROFILE_FWSUP_1X) 2195 brcmf_dbg(INFO, "using 1X offload\n"); 2196 2197 if (!brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MFP)) 2198 goto skip_mfp_config; 2199 /* The MFP mode (1 or 2) needs to be determined, parse IEs. The 2200 * IE will not be verified, just a quick search for MFP config 2201 */ 2202 rsn_ie = brcmf_parse_tlvs((const u8 *)sme->ie, sme->ie_len, 2203 WLAN_EID_RSN); 2204 if (!rsn_ie) 2205 goto skip_mfp_config; 2206 ie = (const u8 *)rsn_ie; 2207 ie_len = rsn_ie->len + TLV_HDR_LEN; 2208 /* Skip unicast suite */ 2209 offset = TLV_HDR_LEN + WPA_IE_VERSION_LEN + WPA_IE_MIN_OUI_LEN; 2210 if (offset + WPA_IE_SUITE_COUNT_LEN >= ie_len) 2211 goto skip_mfp_config; 2212 /* Skip multicast suite */ 2213 count = ie[offset] + (ie[offset + 1] << 8); 2214 offset += WPA_IE_SUITE_COUNT_LEN + (count * WPA_IE_MIN_OUI_LEN); 2215 if (offset + WPA_IE_SUITE_COUNT_LEN >= ie_len) 2216 goto skip_mfp_config; 2217 /* Skip auth key management suite(s) */ 2218 count = ie[offset] + (ie[offset + 1] << 8); 2219 offset += WPA_IE_SUITE_COUNT_LEN + (count * WPA_IE_MIN_OUI_LEN); 2220 if (offset + WPA_IE_SUITE_COUNT_LEN > ie_len) 2221 goto skip_mfp_config; 2222 /* Ready to read capabilities */ 2223 mfp = BRCMF_MFP_NONE; 2224 rsn_cap = ie[offset] + (ie[offset + 1] << 8); 2225 if (rsn_cap & RSN_CAP_MFPR_MASK) 2226 mfp = BRCMF_MFP_REQUIRED; 2227 else if (rsn_cap & RSN_CAP_MFPC_MASK) 2228 mfp = BRCMF_MFP_CAPABLE; 2229 brcmf_fil_bsscfg_int_set(netdev_priv(ndev), "mfp", mfp); 2230 2231 skip_mfp_config: 2232 brcmf_dbg(CONN, "setting wpa_auth to %d\n", val); 2233 err = brcmf_fil_bsscfg_int_set(netdev_priv(ndev), "wpa_auth", val); 2234 if (err) { 2235 bphy_err(drvr, "could not set wpa_auth (%d)\n", err); 2236 return err; 2237 } 2238 2239 return err; 2240 } 2241 2242 static s32 2243 brcmf_set_sharedkey(struct net_device *ndev, 2244 struct cfg80211_connect_params *sme) 2245 { 2246 struct brcmf_if *ifp = netdev_priv(ndev); 2247 struct brcmf_pub *drvr = ifp->drvr; 2248 struct brcmf_cfg80211_profile *profile = ndev_to_prof(ndev); 2249 struct brcmf_cfg80211_security *sec; 2250 struct brcmf_wsec_key key; 2251 s32 val; 2252 s32 err = 0; 2253 2254 brcmf_dbg(CONN, "key len (%d)\n", sme->key_len); 2255 2256 if (sme->key_len == 0) 2257 return 0; 2258 2259 sec = &profile->sec; 2260 brcmf_dbg(CONN, "wpa_versions 0x%x cipher_pairwise 0x%x\n", 2261 sec->wpa_versions, sec->cipher_pairwise); 2262 2263 if (sec->wpa_versions & (NL80211_WPA_VERSION_1 | NL80211_WPA_VERSION_2 | 2264 NL80211_WPA_VERSION_3)) 2265 return 0; 2266 2267 if (!(sec->cipher_pairwise & 2268 (WLAN_CIPHER_SUITE_WEP40 | WLAN_CIPHER_SUITE_WEP104))) 2269 return 0; 2270 2271 memset(&key, 0, sizeof(key)); 2272 key.len = (u32) sme->key_len; 2273 key.index = (u32) sme->key_idx; 2274 if (key.len > sizeof(key.data)) { 2275 bphy_err(drvr, "Too long key length (%u)\n", key.len); 2276 return -EINVAL; 2277 } 2278 memcpy(key.data, sme->key, key.len); 2279 key.flags = BRCMF_PRIMARY_KEY; 2280 switch (sec->cipher_pairwise) { 2281 case WLAN_CIPHER_SUITE_WEP40: 2282 key.algo = CRYPTO_ALGO_WEP1; 2283 break; 2284 case WLAN_CIPHER_SUITE_WEP104: 2285 key.algo = CRYPTO_ALGO_WEP128; 2286 break; 2287 default: 2288 bphy_err(drvr, "Invalid algorithm (%d)\n", 2289 sme->crypto.ciphers_pairwise[0]); 2290 return -EINVAL; 2291 } 2292 /* Set the new key/index */ 2293 brcmf_dbg(CONN, "key length (%d) key index (%d) algo (%d)\n", 2294 key.len, key.index, key.algo); 2295 brcmf_dbg(CONN, "key \"%s\"\n", key.data); 2296 err = send_key_to_dongle(ifp, &key); 2297 if (err) 2298 return err; 2299 2300 if (sec->auth_type == NL80211_AUTHTYPE_SHARED_KEY) { 2301 brcmf_dbg(CONN, "set auth_type to shared key\n"); 2302 val = WL_AUTH_SHARED_KEY; /* shared key */ 2303 err = brcmf_fil_bsscfg_int_set(ifp, "auth", val); 2304 if (err) 2305 bphy_err(drvr, "set auth failed (%d)\n", err); 2306 } 2307 return err; 2308 } 2309 2310 static 2311 enum nl80211_auth_type brcmf_war_auth_type(struct brcmf_if *ifp, 2312 enum nl80211_auth_type type) 2313 { 2314 if (type == NL80211_AUTHTYPE_AUTOMATIC && 2315 brcmf_feat_is_quirk_enabled(ifp, BRCMF_FEAT_QUIRK_AUTO_AUTH)) { 2316 brcmf_dbg(CONN, "WAR: use OPEN instead of AUTO\n"); 2317 type = NL80211_AUTHTYPE_OPEN_SYSTEM; 2318 } 2319 return type; 2320 } 2321 2322 static void brcmf_set_join_pref(struct brcmf_if *ifp, 2323 struct cfg80211_bss_selection *bss_select) 2324 { 2325 struct brcmf_pub *drvr = ifp->drvr; 2326 struct brcmf_join_pref_params join_pref_params[2]; 2327 enum nl80211_band band; 2328 int err, i = 0; 2329 2330 join_pref_params[i].len = 2; 2331 join_pref_params[i].rssi_gain = 0; 2332 2333 if (bss_select->behaviour != NL80211_BSS_SELECT_ATTR_BAND_PREF) 2334 brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_ASSOC_PREFER, WLC_BAND_AUTO); 2335 2336 switch (bss_select->behaviour) { 2337 case __NL80211_BSS_SELECT_ATTR_INVALID: 2338 brcmf_c_set_joinpref_default(ifp); 2339 return; 2340 case NL80211_BSS_SELECT_ATTR_BAND_PREF: 2341 join_pref_params[i].type = BRCMF_JOIN_PREF_BAND; 2342 band = bss_select->param.band_pref; 2343 join_pref_params[i].band = nl80211_band_to_fwil(band); 2344 i++; 2345 break; 2346 case NL80211_BSS_SELECT_ATTR_RSSI_ADJUST: 2347 join_pref_params[i].type = BRCMF_JOIN_PREF_RSSI_DELTA; 2348 band = bss_select->param.adjust.band; 2349 join_pref_params[i].band = nl80211_band_to_fwil(band); 2350 join_pref_params[i].rssi_gain = bss_select->param.adjust.delta; 2351 i++; 2352 break; 2353 case NL80211_BSS_SELECT_ATTR_RSSI: 2354 default: 2355 break; 2356 } 2357 join_pref_params[i].type = BRCMF_JOIN_PREF_RSSI; 2358 join_pref_params[i].len = 2; 2359 join_pref_params[i].rssi_gain = 0; 2360 join_pref_params[i].band = 0; 2361 err = brcmf_fil_iovar_data_set(ifp, "join_pref", join_pref_params, 2362 sizeof(join_pref_params)); 2363 if (err) 2364 bphy_err(drvr, "Set join_pref error (%d)\n", err); 2365 } 2366 2367 static s32 2368 brcmf_cfg80211_connect(struct wiphy *wiphy, struct net_device *ndev, 2369 struct cfg80211_connect_params *sme) 2370 { 2371 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 2372 struct brcmf_if *ifp = netdev_priv(ndev); 2373 struct brcmf_cfg80211_profile *profile = &ifp->vif->profile; 2374 struct ieee80211_channel *chan = sme->channel; 2375 struct brcmf_pub *drvr = ifp->drvr; 2376 struct brcmf_join_params join_params; 2377 size_t join_params_size; 2378 const struct brcmf_tlv *rsn_ie; 2379 const struct brcmf_vs_tlv *wpa_ie; 2380 const void *ie; 2381 u32 ie_len; 2382 struct brcmf_ext_join_params_le *ext_join_params; 2383 u16 chanspec; 2384 s32 err = 0; 2385 u32 ssid_len; 2386 2387 brcmf_dbg(TRACE, "Enter\n"); 2388 if (!check_vif_up(ifp->vif)) 2389 return -EIO; 2390 2391 if (!sme->ssid) { 2392 bphy_err(drvr, "Invalid ssid\n"); 2393 return -EOPNOTSUPP; 2394 } 2395 2396 if (sme->channel_hint) 2397 chan = sme->channel_hint; 2398 2399 if (sme->bssid_hint) 2400 sme->bssid = sme->bssid_hint; 2401 2402 if (ifp->vif == cfg->p2p.bss_idx[P2PAPI_BSSCFG_PRIMARY].vif) { 2403 /* A normal (non P2P) connection request setup. */ 2404 ie = NULL; 2405 ie_len = 0; 2406 /* find the WPA_IE */ 2407 wpa_ie = brcmf_find_wpaie((u8 *)sme->ie, sme->ie_len); 2408 if (wpa_ie) { 2409 ie = wpa_ie; 2410 ie_len = wpa_ie->len + TLV_HDR_LEN; 2411 } else { 2412 /* find the RSN_IE */ 2413 rsn_ie = brcmf_parse_tlvs((const u8 *)sme->ie, 2414 sme->ie_len, 2415 WLAN_EID_RSN); 2416 if (rsn_ie) { 2417 ie = rsn_ie; 2418 ie_len = rsn_ie->len + TLV_HDR_LEN; 2419 } 2420 } 2421 brcmf_fil_iovar_data_set(ifp, "wpaie", ie, ie_len); 2422 } 2423 2424 err = brcmf_vif_set_mgmt_ie(ifp->vif, BRCMF_VNDR_IE_ASSOCREQ_FLAG, 2425 sme->ie, sme->ie_len); 2426 if (err) 2427 bphy_err(drvr, "Set Assoc REQ IE Failed\n"); 2428 else 2429 brcmf_dbg(TRACE, "Applied Vndr IEs for Assoc request\n"); 2430 2431 set_bit(BRCMF_VIF_STATUS_CONNECTING, &ifp->vif->sme_state); 2432 2433 if (chan) { 2434 cfg->channel = 2435 ieee80211_frequency_to_channel(chan->center_freq); 2436 chanspec = channel_to_chanspec(&cfg->d11inf, chan); 2437 brcmf_dbg(CONN, "channel=%d, center_req=%d, chanspec=0x%04x\n", 2438 cfg->channel, chan->center_freq, chanspec); 2439 } else { 2440 cfg->channel = 0; 2441 chanspec = 0; 2442 } 2443 2444 brcmf_dbg(INFO, "ie (%p), ie_len (%zd)\n", sme->ie, sme->ie_len); 2445 2446 err = brcmf_set_wpa_version(ndev, sme); 2447 if (err) { 2448 bphy_err(drvr, "wl_set_wpa_version failed (%d)\n", err); 2449 goto done; 2450 } 2451 2452 sme->auth_type = brcmf_war_auth_type(ifp, sme->auth_type); 2453 err = brcmf_set_auth_type(ndev, sme); 2454 if (err) { 2455 bphy_err(drvr, "wl_set_auth_type failed (%d)\n", err); 2456 goto done; 2457 } 2458 2459 err = brcmf_set_wsec_mode(ndev, sme); 2460 if (err) { 2461 bphy_err(drvr, "wl_set_set_cipher failed (%d)\n", err); 2462 goto done; 2463 } 2464 2465 err = brcmf_set_key_mgmt(ndev, sme); 2466 if (err) { 2467 bphy_err(drvr, "wl_set_key_mgmt failed (%d)\n", err); 2468 goto done; 2469 } 2470 2471 err = brcmf_set_sharedkey(ndev, sme); 2472 if (err) { 2473 bphy_err(drvr, "brcmf_set_sharedkey failed (%d)\n", err); 2474 goto done; 2475 } 2476 2477 if (sme->crypto.psk && 2478 profile->use_fwsup != BRCMF_PROFILE_FWSUP_SAE) { 2479 if (WARN_ON(profile->use_fwsup != BRCMF_PROFILE_FWSUP_NONE)) { 2480 err = -EINVAL; 2481 goto done; 2482 } 2483 brcmf_dbg(INFO, "using PSK offload\n"); 2484 profile->use_fwsup = BRCMF_PROFILE_FWSUP_PSK; 2485 } 2486 2487 if (profile->use_fwsup != BRCMF_PROFILE_FWSUP_NONE) { 2488 /* enable firmware supplicant for this interface */ 2489 err = brcmf_fil_iovar_int_set(ifp, "sup_wpa", 1); 2490 if (err < 0) { 2491 bphy_err(drvr, "failed to enable fw supplicant\n"); 2492 goto done; 2493 } 2494 } 2495 2496 if (profile->use_fwsup == BRCMF_PROFILE_FWSUP_PSK) 2497 err = brcmf_set_pmk(ifp, sme->crypto.psk, 2498 BRCMF_WSEC_MAX_PSK_LEN); 2499 else if (profile->use_fwsup == BRCMF_PROFILE_FWSUP_SAE) { 2500 /* clean up user-space RSNE */ 2501 err = brcmf_fil_iovar_data_set(ifp, "wpaie", NULL, 0); 2502 if (err) { 2503 bphy_err(drvr, "failed to clean up user-space RSNE\n"); 2504 goto done; 2505 } 2506 err = brcmf_set_sae_password(ifp, sme->crypto.sae_pwd, 2507 sme->crypto.sae_pwd_len); 2508 if (!err && sme->crypto.psk) 2509 err = brcmf_set_pmk(ifp, sme->crypto.psk, 2510 BRCMF_WSEC_MAX_PSK_LEN); 2511 } 2512 if (err) 2513 goto done; 2514 2515 /* Join with specific BSSID and cached SSID 2516 * If SSID is zero join based on BSSID only 2517 */ 2518 join_params_size = offsetof(struct brcmf_ext_join_params_le, assoc_le) + 2519 offsetof(struct brcmf_assoc_params_le, chanspec_list); 2520 if (cfg->channel) 2521 join_params_size += sizeof(u16); 2522 ext_join_params = kzalloc(sizeof(*ext_join_params), GFP_KERNEL); 2523 if (ext_join_params == NULL) { 2524 err = -ENOMEM; 2525 goto done; 2526 } 2527 ssid_len = min_t(u32, sme->ssid_len, IEEE80211_MAX_SSID_LEN); 2528 ext_join_params->ssid_le.SSID_len = cpu_to_le32(ssid_len); 2529 memcpy(&ext_join_params->ssid_le.SSID, sme->ssid, ssid_len); 2530 if (ssid_len < IEEE80211_MAX_SSID_LEN) 2531 brcmf_dbg(CONN, "SSID \"%s\", len (%d)\n", 2532 ext_join_params->ssid_le.SSID, ssid_len); 2533 2534 /* Set up join scan parameters */ 2535 ext_join_params->scan_le.scan_type = -1; 2536 ext_join_params->scan_le.home_time = cpu_to_le32(-1); 2537 2538 if (sme->bssid) 2539 memcpy(&ext_join_params->assoc_le.bssid, sme->bssid, ETH_ALEN); 2540 else 2541 eth_broadcast_addr(ext_join_params->assoc_le.bssid); 2542 2543 if (cfg->channel) { 2544 ext_join_params->assoc_le.chanspec_num = cpu_to_le32(1); 2545 2546 ext_join_params->assoc_le.chanspec_list[0] = 2547 cpu_to_le16(chanspec); 2548 /* Increase dwell time to receive probe response or detect 2549 * beacon from target AP at a noisy air only during connect 2550 * command. 2551 */ 2552 ext_join_params->scan_le.active_time = 2553 cpu_to_le32(BRCMF_SCAN_JOIN_ACTIVE_DWELL_TIME_MS); 2554 ext_join_params->scan_le.passive_time = 2555 cpu_to_le32(BRCMF_SCAN_JOIN_PASSIVE_DWELL_TIME_MS); 2556 /* To sync with presence period of VSDB GO send probe request 2557 * more frequently. Probe request will be stopped when it gets 2558 * probe response from target AP/GO. 2559 */ 2560 ext_join_params->scan_le.nprobes = 2561 cpu_to_le32(BRCMF_SCAN_JOIN_ACTIVE_DWELL_TIME_MS / 2562 BRCMF_SCAN_JOIN_PROBE_INTERVAL_MS); 2563 } else { 2564 ext_join_params->scan_le.active_time = cpu_to_le32(-1); 2565 ext_join_params->scan_le.passive_time = cpu_to_le32(-1); 2566 ext_join_params->scan_le.nprobes = cpu_to_le32(-1); 2567 } 2568 2569 brcmf_set_join_pref(ifp, &sme->bss_select); 2570 2571 err = brcmf_fil_bsscfg_data_set(ifp, "join", ext_join_params, 2572 join_params_size); 2573 kfree(ext_join_params); 2574 if (!err) 2575 /* This is it. join command worked, we are done */ 2576 goto done; 2577 2578 /* join command failed, fallback to set ssid */ 2579 memset(&join_params, 0, sizeof(join_params)); 2580 join_params_size = sizeof(join_params.ssid_le); 2581 2582 memcpy(&join_params.ssid_le.SSID, sme->ssid, ssid_len); 2583 join_params.ssid_le.SSID_len = cpu_to_le32(ssid_len); 2584 2585 if (sme->bssid) 2586 memcpy(join_params.params_le.bssid, sme->bssid, ETH_ALEN); 2587 else 2588 eth_broadcast_addr(join_params.params_le.bssid); 2589 2590 if (cfg->channel) { 2591 join_params.params_le.chanspec_list[0] = cpu_to_le16(chanspec); 2592 join_params.params_le.chanspec_num = cpu_to_le32(1); 2593 join_params_size += sizeof(join_params.params_le); 2594 } 2595 err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_SSID, 2596 &join_params, join_params_size); 2597 if (err) 2598 bphy_err(drvr, "BRCMF_C_SET_SSID failed (%d)\n", err); 2599 2600 done: 2601 if (err) 2602 clear_bit(BRCMF_VIF_STATUS_CONNECTING, &ifp->vif->sme_state); 2603 brcmf_dbg(TRACE, "Exit\n"); 2604 return err; 2605 } 2606 2607 static s32 2608 brcmf_cfg80211_disconnect(struct wiphy *wiphy, struct net_device *ndev, 2609 u16 reason_code) 2610 { 2611 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 2612 struct brcmf_if *ifp = netdev_priv(ndev); 2613 struct brcmf_cfg80211_profile *profile = &ifp->vif->profile; 2614 struct brcmf_pub *drvr = cfg->pub; 2615 struct brcmf_scb_val_le scbval; 2616 s32 err = 0; 2617 2618 brcmf_dbg(TRACE, "Enter. Reason code = %d\n", reason_code); 2619 if (!check_vif_up(ifp->vif)) 2620 return -EIO; 2621 2622 clear_bit(BRCMF_VIF_STATUS_CONNECTED, &ifp->vif->sme_state); 2623 clear_bit(BRCMF_VIF_STATUS_CONNECTING, &ifp->vif->sme_state); 2624 clear_bit(BRCMF_VIF_STATUS_EAP_SUCCESS, &ifp->vif->sme_state); 2625 clear_bit(BRCMF_VIF_STATUS_ASSOC_SUCCESS, &ifp->vif->sme_state); 2626 cfg80211_disconnected(ndev, reason_code, NULL, 0, true, GFP_KERNEL); 2627 2628 memcpy(&scbval.ea, &profile->bssid, ETH_ALEN); 2629 scbval.val = cpu_to_le32(reason_code); 2630 err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_DISASSOC, 2631 &scbval, sizeof(scbval)); 2632 if (err) 2633 bphy_err(drvr, "error (%d)\n", err); 2634 2635 brcmf_dbg(TRACE, "Exit\n"); 2636 return err; 2637 } 2638 2639 static s32 2640 brcmf_cfg80211_set_tx_power(struct wiphy *wiphy, struct wireless_dev *wdev, 2641 enum nl80211_tx_power_setting type, s32 mbm) 2642 { 2643 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 2644 struct net_device *ndev = cfg_to_ndev(cfg); 2645 struct brcmf_if *ifp = netdev_priv(ndev); 2646 struct brcmf_pub *drvr = cfg->pub; 2647 s32 err; 2648 s32 disable; 2649 u32 qdbm = 127; 2650 2651 brcmf_dbg(TRACE, "Enter %d %d\n", type, mbm); 2652 if (!check_vif_up(ifp->vif)) 2653 return -EIO; 2654 2655 switch (type) { 2656 case NL80211_TX_POWER_AUTOMATIC: 2657 break; 2658 case NL80211_TX_POWER_LIMITED: 2659 case NL80211_TX_POWER_FIXED: 2660 if (mbm < 0) { 2661 bphy_err(drvr, "TX_POWER_FIXED - dbm is negative\n"); 2662 err = -EINVAL; 2663 goto done; 2664 } 2665 qdbm = MBM_TO_DBM(4 * mbm); 2666 if (qdbm > 127) 2667 qdbm = 127; 2668 qdbm |= WL_TXPWR_OVERRIDE; 2669 break; 2670 default: 2671 bphy_err(drvr, "Unsupported type %d\n", type); 2672 err = -EINVAL; 2673 goto done; 2674 } 2675 /* Make sure radio is off or on as far as software is concerned */ 2676 disable = WL_RADIO_SW_DISABLE << 16; 2677 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_RADIO, disable); 2678 if (err) 2679 bphy_err(drvr, "WLC_SET_RADIO error (%d)\n", err); 2680 2681 err = brcmf_fil_iovar_int_set(ifp, "qtxpower", qdbm); 2682 if (err) 2683 bphy_err(drvr, "qtxpower error (%d)\n", err); 2684 2685 done: 2686 brcmf_dbg(TRACE, "Exit %d (qdbm)\n", qdbm & ~WL_TXPWR_OVERRIDE); 2687 return err; 2688 } 2689 2690 static s32 2691 brcmf_cfg80211_get_tx_power(struct wiphy *wiphy, struct wireless_dev *wdev, 2692 s32 *dbm) 2693 { 2694 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 2695 struct brcmf_cfg80211_vif *vif = wdev_to_vif(wdev); 2696 struct brcmf_pub *drvr = cfg->pub; 2697 s32 qdbm = 0; 2698 s32 err; 2699 2700 brcmf_dbg(TRACE, "Enter\n"); 2701 if (!check_vif_up(vif)) 2702 return -EIO; 2703 2704 err = brcmf_fil_iovar_int_get(vif->ifp, "qtxpower", &qdbm); 2705 if (err) { 2706 bphy_err(drvr, "error (%d)\n", err); 2707 goto done; 2708 } 2709 *dbm = (qdbm & ~WL_TXPWR_OVERRIDE) / 4; 2710 2711 done: 2712 brcmf_dbg(TRACE, "Exit (0x%x %d)\n", qdbm, *dbm); 2713 return err; 2714 } 2715 2716 static s32 2717 brcmf_cfg80211_config_default_key(struct wiphy *wiphy, struct net_device *ndev, 2718 int link_id, u8 key_idx, bool unicast, 2719 bool multicast) 2720 { 2721 struct brcmf_if *ifp = netdev_priv(ndev); 2722 struct brcmf_pub *drvr = ifp->drvr; 2723 u32 index; 2724 u32 wsec; 2725 s32 err = 0; 2726 2727 brcmf_dbg(TRACE, "Enter\n"); 2728 brcmf_dbg(CONN, "key index (%d)\n", key_idx); 2729 if (!check_vif_up(ifp->vif)) 2730 return -EIO; 2731 2732 err = brcmf_fil_bsscfg_int_get(ifp, "wsec", &wsec); 2733 if (err) { 2734 bphy_err(drvr, "WLC_GET_WSEC error (%d)\n", err); 2735 goto done; 2736 } 2737 2738 if (wsec & WEP_ENABLED) { 2739 /* Just select a new current key */ 2740 index = key_idx; 2741 err = brcmf_fil_cmd_int_set(ifp, 2742 BRCMF_C_SET_KEY_PRIMARY, index); 2743 if (err) 2744 bphy_err(drvr, "error (%d)\n", err); 2745 } 2746 done: 2747 brcmf_dbg(TRACE, "Exit\n"); 2748 return err; 2749 } 2750 2751 static s32 2752 brcmf_cfg80211_del_key(struct wiphy *wiphy, struct net_device *ndev, 2753 int link_id, u8 key_idx, bool pairwise, 2754 const u8 *mac_addr) 2755 { 2756 struct brcmf_if *ifp = netdev_priv(ndev); 2757 struct brcmf_wsec_key *key; 2758 s32 err; 2759 2760 brcmf_dbg(TRACE, "Enter\n"); 2761 brcmf_dbg(CONN, "key index (%d)\n", key_idx); 2762 2763 if (!check_vif_up(ifp->vif)) 2764 return -EIO; 2765 2766 if (key_idx >= BRCMF_MAX_DEFAULT_KEYS) { 2767 /* we ignore this key index in this case */ 2768 return -EINVAL; 2769 } 2770 2771 key = &ifp->vif->profile.key[key_idx]; 2772 2773 if (key->algo == CRYPTO_ALGO_OFF) { 2774 brcmf_dbg(CONN, "Ignore clearing of (never configured) key\n"); 2775 return -EINVAL; 2776 } 2777 2778 memset(key, 0, sizeof(*key)); 2779 key->index = (u32)key_idx; 2780 key->flags = BRCMF_PRIMARY_KEY; 2781 2782 /* Clear the key/index */ 2783 err = send_key_to_dongle(ifp, key); 2784 2785 brcmf_dbg(TRACE, "Exit\n"); 2786 return err; 2787 } 2788 2789 static s32 2790 brcmf_cfg80211_add_key(struct wiphy *wiphy, struct net_device *ndev, 2791 int link_id, u8 key_idx, bool pairwise, 2792 const u8 *mac_addr, struct key_params *params) 2793 { 2794 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 2795 struct brcmf_if *ifp = netdev_priv(ndev); 2796 struct brcmf_pub *drvr = cfg->pub; 2797 struct brcmf_wsec_key *key; 2798 s32 val; 2799 s32 wsec; 2800 s32 err; 2801 u8 keybuf[8]; 2802 bool ext_key; 2803 2804 brcmf_dbg(TRACE, "Enter\n"); 2805 brcmf_dbg(CONN, "key index (%d)\n", key_idx); 2806 if (!check_vif_up(ifp->vif)) 2807 return -EIO; 2808 2809 if (key_idx >= BRCMF_MAX_DEFAULT_KEYS) { 2810 /* we ignore this key index in this case */ 2811 bphy_err(drvr, "invalid key index (%d)\n", key_idx); 2812 return -EINVAL; 2813 } 2814 2815 if (params->key_len == 0) 2816 return brcmf_cfg80211_del_key(wiphy, ndev, -1, key_idx, 2817 pairwise, mac_addr); 2818 2819 if (params->key_len > sizeof(key->data)) { 2820 bphy_err(drvr, "Too long key length (%u)\n", params->key_len); 2821 return -EINVAL; 2822 } 2823 2824 ext_key = false; 2825 if (mac_addr && (params->cipher != WLAN_CIPHER_SUITE_WEP40) && 2826 (params->cipher != WLAN_CIPHER_SUITE_WEP104)) { 2827 brcmf_dbg(TRACE, "Ext key, mac %pM", mac_addr); 2828 ext_key = true; 2829 } 2830 2831 key = &ifp->vif->profile.key[key_idx]; 2832 memset(key, 0, sizeof(*key)); 2833 if ((ext_key) && (!is_multicast_ether_addr(mac_addr))) 2834 memcpy((char *)&key->ea, (void *)mac_addr, ETH_ALEN); 2835 key->len = params->key_len; 2836 key->index = key_idx; 2837 memcpy(key->data, params->key, key->len); 2838 if (!ext_key) 2839 key->flags = BRCMF_PRIMARY_KEY; 2840 2841 if (params->seq && params->seq_len == 6) { 2842 /* rx iv */ 2843 u8 *ivptr; 2844 2845 ivptr = (u8 *)params->seq; 2846 key->rxiv.hi = (ivptr[5] << 24) | (ivptr[4] << 16) | 2847 (ivptr[3] << 8) | ivptr[2]; 2848 key->rxiv.lo = (ivptr[1] << 8) | ivptr[0]; 2849 key->iv_initialized = true; 2850 } 2851 2852 switch (params->cipher) { 2853 case WLAN_CIPHER_SUITE_WEP40: 2854 key->algo = CRYPTO_ALGO_WEP1; 2855 val = WEP_ENABLED; 2856 brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_WEP40\n"); 2857 break; 2858 case WLAN_CIPHER_SUITE_WEP104: 2859 key->algo = CRYPTO_ALGO_WEP128; 2860 val = WEP_ENABLED; 2861 brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_WEP104\n"); 2862 break; 2863 case WLAN_CIPHER_SUITE_TKIP: 2864 if (!brcmf_is_apmode(ifp->vif)) { 2865 brcmf_dbg(CONN, "Swapping RX/TX MIC key\n"); 2866 memcpy(keybuf, &key->data[24], sizeof(keybuf)); 2867 memcpy(&key->data[24], &key->data[16], sizeof(keybuf)); 2868 memcpy(&key->data[16], keybuf, sizeof(keybuf)); 2869 } 2870 key->algo = CRYPTO_ALGO_TKIP; 2871 val = TKIP_ENABLED; 2872 brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_TKIP\n"); 2873 break; 2874 case WLAN_CIPHER_SUITE_AES_CMAC: 2875 key->algo = CRYPTO_ALGO_AES_CCM; 2876 val = AES_ENABLED; 2877 brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_AES_CMAC\n"); 2878 break; 2879 case WLAN_CIPHER_SUITE_CCMP: 2880 key->algo = CRYPTO_ALGO_AES_CCM; 2881 val = AES_ENABLED; 2882 brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_CCMP\n"); 2883 break; 2884 default: 2885 bphy_err(drvr, "Invalid cipher (0x%x)\n", params->cipher); 2886 err = -EINVAL; 2887 goto done; 2888 } 2889 2890 err = send_key_to_dongle(ifp, key); 2891 if (ext_key || err) 2892 goto done; 2893 2894 err = brcmf_fil_bsscfg_int_get(ifp, "wsec", &wsec); 2895 if (err) { 2896 bphy_err(drvr, "get wsec error (%d)\n", err); 2897 goto done; 2898 } 2899 wsec |= val; 2900 err = brcmf_fil_bsscfg_int_set(ifp, "wsec", wsec); 2901 if (err) { 2902 bphy_err(drvr, "set wsec error (%d)\n", err); 2903 goto done; 2904 } 2905 2906 done: 2907 brcmf_dbg(TRACE, "Exit\n"); 2908 return err; 2909 } 2910 2911 static s32 2912 brcmf_cfg80211_get_key(struct wiphy *wiphy, struct net_device *ndev, 2913 int link_id, u8 key_idx, bool pairwise, 2914 const u8 *mac_addr, void *cookie, 2915 void (*callback)(void *cookie, 2916 struct key_params *params)) 2917 { 2918 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 2919 struct key_params params; 2920 struct brcmf_if *ifp = netdev_priv(ndev); 2921 struct brcmf_cfg80211_profile *profile = &ifp->vif->profile; 2922 struct brcmf_pub *drvr = cfg->pub; 2923 struct brcmf_cfg80211_security *sec; 2924 s32 wsec; 2925 s32 err = 0; 2926 2927 brcmf_dbg(TRACE, "Enter\n"); 2928 brcmf_dbg(CONN, "key index (%d)\n", key_idx); 2929 if (!check_vif_up(ifp->vif)) 2930 return -EIO; 2931 2932 memset(¶ms, 0, sizeof(params)); 2933 2934 err = brcmf_fil_bsscfg_int_get(ifp, "wsec", &wsec); 2935 if (err) { 2936 bphy_err(drvr, "WLC_GET_WSEC error (%d)\n", err); 2937 /* Ignore this error, may happen during DISASSOC */ 2938 err = -EAGAIN; 2939 goto done; 2940 } 2941 if (wsec & WEP_ENABLED) { 2942 sec = &profile->sec; 2943 if (sec->cipher_pairwise & WLAN_CIPHER_SUITE_WEP40) { 2944 params.cipher = WLAN_CIPHER_SUITE_WEP40; 2945 brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_WEP40\n"); 2946 } else if (sec->cipher_pairwise & WLAN_CIPHER_SUITE_WEP104) { 2947 params.cipher = WLAN_CIPHER_SUITE_WEP104; 2948 brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_WEP104\n"); 2949 } 2950 } else if (wsec & TKIP_ENABLED) { 2951 params.cipher = WLAN_CIPHER_SUITE_TKIP; 2952 brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_TKIP\n"); 2953 } else if (wsec & AES_ENABLED) { 2954 params.cipher = WLAN_CIPHER_SUITE_AES_CMAC; 2955 brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_AES_CMAC\n"); 2956 } else { 2957 bphy_err(drvr, "Invalid algo (0x%x)\n", wsec); 2958 err = -EINVAL; 2959 goto done; 2960 } 2961 callback(cookie, ¶ms); 2962 2963 done: 2964 brcmf_dbg(TRACE, "Exit\n"); 2965 return err; 2966 } 2967 2968 static s32 2969 brcmf_cfg80211_config_default_mgmt_key(struct wiphy *wiphy, 2970 struct net_device *ndev, int link_id, 2971 u8 key_idx) 2972 { 2973 struct brcmf_if *ifp = netdev_priv(ndev); 2974 2975 brcmf_dbg(TRACE, "Enter key_idx %d\n", key_idx); 2976 2977 if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MFP)) 2978 return 0; 2979 2980 brcmf_dbg(INFO, "Not supported\n"); 2981 2982 return -EOPNOTSUPP; 2983 } 2984 2985 static void 2986 brcmf_cfg80211_reconfigure_wep(struct brcmf_if *ifp) 2987 { 2988 struct brcmf_pub *drvr = ifp->drvr; 2989 s32 err; 2990 u8 key_idx; 2991 struct brcmf_wsec_key *key; 2992 s32 wsec; 2993 2994 for (key_idx = 0; key_idx < BRCMF_MAX_DEFAULT_KEYS; key_idx++) { 2995 key = &ifp->vif->profile.key[key_idx]; 2996 if ((key->algo == CRYPTO_ALGO_WEP1) || 2997 (key->algo == CRYPTO_ALGO_WEP128)) 2998 break; 2999 } 3000 if (key_idx == BRCMF_MAX_DEFAULT_KEYS) 3001 return; 3002 3003 err = send_key_to_dongle(ifp, key); 3004 if (err) { 3005 bphy_err(drvr, "Setting WEP key failed (%d)\n", err); 3006 return; 3007 } 3008 err = brcmf_fil_bsscfg_int_get(ifp, "wsec", &wsec); 3009 if (err) { 3010 bphy_err(drvr, "get wsec error (%d)\n", err); 3011 return; 3012 } 3013 wsec |= WEP_ENABLED; 3014 err = brcmf_fil_bsscfg_int_set(ifp, "wsec", wsec); 3015 if (err) 3016 bphy_err(drvr, "set wsec error (%d)\n", err); 3017 } 3018 3019 static void brcmf_convert_sta_flags(u32 fw_sta_flags, struct station_info *si) 3020 { 3021 struct nl80211_sta_flag_update *sfu; 3022 3023 brcmf_dbg(TRACE, "flags %08x\n", fw_sta_flags); 3024 si->filled |= BIT_ULL(NL80211_STA_INFO_STA_FLAGS); 3025 sfu = &si->sta_flags; 3026 sfu->mask = BIT(NL80211_STA_FLAG_WME) | 3027 BIT(NL80211_STA_FLAG_AUTHENTICATED) | 3028 BIT(NL80211_STA_FLAG_ASSOCIATED) | 3029 BIT(NL80211_STA_FLAG_AUTHORIZED); 3030 if (fw_sta_flags & BRCMF_STA_WME) 3031 sfu->set |= BIT(NL80211_STA_FLAG_WME); 3032 if (fw_sta_flags & BRCMF_STA_AUTHE) 3033 sfu->set |= BIT(NL80211_STA_FLAG_AUTHENTICATED); 3034 if (fw_sta_flags & BRCMF_STA_ASSOC) 3035 sfu->set |= BIT(NL80211_STA_FLAG_ASSOCIATED); 3036 if (fw_sta_flags & BRCMF_STA_AUTHO) 3037 sfu->set |= BIT(NL80211_STA_FLAG_AUTHORIZED); 3038 } 3039 3040 static void brcmf_fill_bss_param(struct brcmf_if *ifp, struct station_info *si) 3041 { 3042 struct brcmf_pub *drvr = ifp->drvr; 3043 struct { 3044 __le32 len; 3045 struct brcmf_bss_info_le bss_le; 3046 } *buf; 3047 u16 capability; 3048 int err; 3049 3050 buf = kzalloc(WL_BSS_INFO_MAX, GFP_KERNEL); 3051 if (!buf) 3052 return; 3053 3054 buf->len = cpu_to_le32(WL_BSS_INFO_MAX); 3055 err = brcmf_fil_cmd_data_get(ifp, BRCMF_C_GET_BSS_INFO, buf, 3056 WL_BSS_INFO_MAX); 3057 if (err) { 3058 bphy_err(drvr, "Failed to get bss info (%d)\n", err); 3059 goto out_kfree; 3060 } 3061 si->filled |= BIT_ULL(NL80211_STA_INFO_BSS_PARAM); 3062 si->bss_param.beacon_interval = le16_to_cpu(buf->bss_le.beacon_period); 3063 si->bss_param.dtim_period = buf->bss_le.dtim_period; 3064 capability = le16_to_cpu(buf->bss_le.capability); 3065 if (capability & IEEE80211_HT_STBC_PARAM_DUAL_CTS_PROT) 3066 si->bss_param.flags |= BSS_PARAM_FLAGS_CTS_PROT; 3067 if (capability & WLAN_CAPABILITY_SHORT_PREAMBLE) 3068 si->bss_param.flags |= BSS_PARAM_FLAGS_SHORT_PREAMBLE; 3069 if (capability & WLAN_CAPABILITY_SHORT_SLOT_TIME) 3070 si->bss_param.flags |= BSS_PARAM_FLAGS_SHORT_SLOT_TIME; 3071 3072 out_kfree: 3073 kfree(buf); 3074 } 3075 3076 static s32 3077 brcmf_cfg80211_get_station_ibss(struct brcmf_if *ifp, 3078 struct station_info *sinfo) 3079 { 3080 struct brcmf_pub *drvr = ifp->drvr; 3081 struct brcmf_scb_val_le scbval; 3082 struct brcmf_pktcnt_le pktcnt; 3083 s32 err; 3084 u32 rate; 3085 u32 rssi; 3086 3087 /* Get the current tx rate */ 3088 err = brcmf_fil_cmd_int_get(ifp, BRCMF_C_GET_RATE, &rate); 3089 if (err < 0) { 3090 bphy_err(drvr, "BRCMF_C_GET_RATE error (%d)\n", err); 3091 return err; 3092 } 3093 sinfo->filled |= BIT_ULL(NL80211_STA_INFO_TX_BITRATE); 3094 sinfo->txrate.legacy = rate * 5; 3095 3096 memset(&scbval, 0, sizeof(scbval)); 3097 err = brcmf_fil_cmd_data_get(ifp, BRCMF_C_GET_RSSI, &scbval, 3098 sizeof(scbval)); 3099 if (err) { 3100 bphy_err(drvr, "BRCMF_C_GET_RSSI error (%d)\n", err); 3101 return err; 3102 } 3103 rssi = le32_to_cpu(scbval.val); 3104 sinfo->filled |= BIT_ULL(NL80211_STA_INFO_SIGNAL); 3105 sinfo->signal = rssi; 3106 3107 err = brcmf_fil_cmd_data_get(ifp, BRCMF_C_GET_GET_PKTCNTS, &pktcnt, 3108 sizeof(pktcnt)); 3109 if (err) { 3110 bphy_err(drvr, "BRCMF_C_GET_GET_PKTCNTS error (%d)\n", err); 3111 return err; 3112 } 3113 sinfo->filled |= BIT_ULL(NL80211_STA_INFO_RX_PACKETS) | 3114 BIT_ULL(NL80211_STA_INFO_RX_DROP_MISC) | 3115 BIT_ULL(NL80211_STA_INFO_TX_PACKETS) | 3116 BIT_ULL(NL80211_STA_INFO_TX_FAILED); 3117 sinfo->rx_packets = le32_to_cpu(pktcnt.rx_good_pkt); 3118 sinfo->rx_dropped_misc = le32_to_cpu(pktcnt.rx_bad_pkt); 3119 sinfo->tx_packets = le32_to_cpu(pktcnt.tx_good_pkt); 3120 sinfo->tx_failed = le32_to_cpu(pktcnt.tx_bad_pkt); 3121 3122 return 0; 3123 } 3124 3125 static s32 3126 brcmf_cfg80211_get_station(struct wiphy *wiphy, struct net_device *ndev, 3127 const u8 *mac, struct station_info *sinfo) 3128 { 3129 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 3130 struct brcmf_if *ifp = netdev_priv(ndev); 3131 struct brcmf_pub *drvr = cfg->pub; 3132 struct brcmf_scb_val_le scb_val; 3133 s32 err = 0; 3134 struct brcmf_sta_info_le sta_info_le; 3135 u32 sta_flags; 3136 u32 is_tdls_peer; 3137 s32 total_rssi_avg = 0; 3138 s32 total_rssi = 0; 3139 s32 count_rssi = 0; 3140 int rssi; 3141 u32 i; 3142 3143 brcmf_dbg(TRACE, "Enter, MAC %pM\n", mac); 3144 if (!check_vif_up(ifp->vif)) 3145 return -EIO; 3146 3147 if (brcmf_is_ibssmode(ifp->vif)) 3148 return brcmf_cfg80211_get_station_ibss(ifp, sinfo); 3149 3150 memset(&sta_info_le, 0, sizeof(sta_info_le)); 3151 memcpy(&sta_info_le, mac, ETH_ALEN); 3152 err = brcmf_fil_iovar_data_get(ifp, "tdls_sta_info", 3153 &sta_info_le, 3154 sizeof(sta_info_le)); 3155 is_tdls_peer = !err; 3156 if (err) { 3157 err = brcmf_fil_iovar_data_get(ifp, "sta_info", 3158 &sta_info_le, 3159 sizeof(sta_info_le)); 3160 if (err < 0) { 3161 bphy_err(drvr, "GET STA INFO failed, %d\n", err); 3162 goto done; 3163 } 3164 } 3165 brcmf_dbg(TRACE, "version %d\n", le16_to_cpu(sta_info_le.ver)); 3166 sinfo->filled = BIT_ULL(NL80211_STA_INFO_INACTIVE_TIME); 3167 sinfo->inactive_time = le32_to_cpu(sta_info_le.idle) * 1000; 3168 sta_flags = le32_to_cpu(sta_info_le.flags); 3169 brcmf_convert_sta_flags(sta_flags, sinfo); 3170 sinfo->sta_flags.mask |= BIT(NL80211_STA_FLAG_TDLS_PEER); 3171 if (is_tdls_peer) 3172 sinfo->sta_flags.set |= BIT(NL80211_STA_FLAG_TDLS_PEER); 3173 else 3174 sinfo->sta_flags.set &= ~BIT(NL80211_STA_FLAG_TDLS_PEER); 3175 if (sta_flags & BRCMF_STA_ASSOC) { 3176 sinfo->filled |= BIT_ULL(NL80211_STA_INFO_CONNECTED_TIME); 3177 sinfo->connected_time = le32_to_cpu(sta_info_le.in); 3178 brcmf_fill_bss_param(ifp, sinfo); 3179 } 3180 if (sta_flags & BRCMF_STA_SCBSTATS) { 3181 sinfo->filled |= BIT_ULL(NL80211_STA_INFO_TX_FAILED); 3182 sinfo->tx_failed = le32_to_cpu(sta_info_le.tx_failures); 3183 sinfo->filled |= BIT_ULL(NL80211_STA_INFO_TX_PACKETS); 3184 sinfo->tx_packets = le32_to_cpu(sta_info_le.tx_pkts); 3185 sinfo->tx_packets += le32_to_cpu(sta_info_le.tx_mcast_pkts); 3186 sinfo->filled |= BIT_ULL(NL80211_STA_INFO_RX_PACKETS); 3187 sinfo->rx_packets = le32_to_cpu(sta_info_le.rx_ucast_pkts); 3188 sinfo->rx_packets += le32_to_cpu(sta_info_le.rx_mcast_pkts); 3189 if (sinfo->tx_packets) { 3190 sinfo->filled |= BIT_ULL(NL80211_STA_INFO_TX_BITRATE); 3191 sinfo->txrate.legacy = 3192 le32_to_cpu(sta_info_le.tx_rate) / 100; 3193 } 3194 if (sinfo->rx_packets) { 3195 sinfo->filled |= BIT_ULL(NL80211_STA_INFO_RX_BITRATE); 3196 sinfo->rxrate.legacy = 3197 le32_to_cpu(sta_info_le.rx_rate) / 100; 3198 } 3199 if (le16_to_cpu(sta_info_le.ver) >= 4) { 3200 sinfo->filled |= BIT_ULL(NL80211_STA_INFO_TX_BYTES); 3201 sinfo->tx_bytes = le64_to_cpu(sta_info_le.tx_tot_bytes); 3202 sinfo->filled |= BIT_ULL(NL80211_STA_INFO_RX_BYTES); 3203 sinfo->rx_bytes = le64_to_cpu(sta_info_le.rx_tot_bytes); 3204 } 3205 for (i = 0; i < BRCMF_ANT_MAX; i++) { 3206 if (sta_info_le.rssi[i] == 0 || 3207 sta_info_le.rx_lastpkt_rssi[i] == 0) 3208 continue; 3209 sinfo->chains |= BIT(count_rssi); 3210 sinfo->chain_signal[count_rssi] = 3211 sta_info_le.rx_lastpkt_rssi[i]; 3212 sinfo->chain_signal_avg[count_rssi] = 3213 sta_info_le.rssi[i]; 3214 total_rssi += sta_info_le.rx_lastpkt_rssi[i]; 3215 total_rssi_avg += sta_info_le.rssi[i]; 3216 count_rssi++; 3217 } 3218 if (count_rssi) { 3219 sinfo->filled |= BIT_ULL(NL80211_STA_INFO_SIGNAL); 3220 sinfo->filled |= BIT_ULL(NL80211_STA_INFO_SIGNAL_AVG); 3221 sinfo->filled |= BIT_ULL(NL80211_STA_INFO_CHAIN_SIGNAL); 3222 sinfo->filled |= 3223 BIT_ULL(NL80211_STA_INFO_CHAIN_SIGNAL_AVG); 3224 sinfo->signal = total_rssi / count_rssi; 3225 sinfo->signal_avg = total_rssi_avg / count_rssi; 3226 } else if (test_bit(BRCMF_VIF_STATUS_CONNECTED, 3227 &ifp->vif->sme_state)) { 3228 memset(&scb_val, 0, sizeof(scb_val)); 3229 err = brcmf_fil_cmd_data_get(ifp, BRCMF_C_GET_RSSI, 3230 &scb_val, sizeof(scb_val)); 3231 if (err) { 3232 bphy_err(drvr, "Could not get rssi (%d)\n", 3233 err); 3234 goto done; 3235 } else { 3236 rssi = le32_to_cpu(scb_val.val); 3237 sinfo->filled |= BIT_ULL(NL80211_STA_INFO_SIGNAL); 3238 sinfo->signal = rssi; 3239 brcmf_dbg(CONN, "RSSI %d dBm\n", rssi); 3240 } 3241 } 3242 } 3243 done: 3244 brcmf_dbg(TRACE, "Exit\n"); 3245 return err; 3246 } 3247 3248 static int 3249 brcmf_cfg80211_dump_station(struct wiphy *wiphy, struct net_device *ndev, 3250 int idx, u8 *mac, struct station_info *sinfo) 3251 { 3252 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 3253 struct brcmf_if *ifp = netdev_priv(ndev); 3254 struct brcmf_pub *drvr = cfg->pub; 3255 s32 err; 3256 3257 brcmf_dbg(TRACE, "Enter, idx %d\n", idx); 3258 3259 if (idx == 0) { 3260 cfg->assoclist.count = cpu_to_le32(BRCMF_MAX_ASSOCLIST); 3261 err = brcmf_fil_cmd_data_get(ifp, BRCMF_C_GET_ASSOCLIST, 3262 &cfg->assoclist, 3263 sizeof(cfg->assoclist)); 3264 if (err) { 3265 /* GET_ASSOCLIST unsupported by firmware of older chips */ 3266 if (err == -EBADE) 3267 bphy_info_once(drvr, "BRCMF_C_GET_ASSOCLIST unsupported\n"); 3268 else 3269 bphy_err(drvr, "BRCMF_C_GET_ASSOCLIST failed, err=%d\n", 3270 err); 3271 3272 cfg->assoclist.count = 0; 3273 return -EOPNOTSUPP; 3274 } 3275 } 3276 if (idx < le32_to_cpu(cfg->assoclist.count)) { 3277 memcpy(mac, cfg->assoclist.mac[idx], ETH_ALEN); 3278 return brcmf_cfg80211_get_station(wiphy, ndev, mac, sinfo); 3279 } 3280 return -ENOENT; 3281 } 3282 3283 static s32 3284 brcmf_cfg80211_set_power_mgmt(struct wiphy *wiphy, struct net_device *ndev, 3285 bool enabled, s32 timeout) 3286 { 3287 s32 pm; 3288 s32 err = 0; 3289 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 3290 struct brcmf_if *ifp = netdev_priv(ndev); 3291 struct brcmf_pub *drvr = cfg->pub; 3292 3293 brcmf_dbg(TRACE, "Enter\n"); 3294 3295 /* 3296 * Powersave enable/disable request is coming from the 3297 * cfg80211 even before the interface is up. In that 3298 * scenario, driver will be storing the power save 3299 * preference in cfg struct to apply this to 3300 * FW later while initializing the dongle 3301 */ 3302 cfg->pwr_save = enabled; 3303 if (!check_vif_up(ifp->vif)) { 3304 3305 brcmf_dbg(INFO, "Device is not ready, storing the value in cfg_info struct\n"); 3306 goto done; 3307 } 3308 3309 pm = enabled ? PM_FAST : PM_OFF; 3310 /* Do not enable the power save after assoc if it is a p2p interface */ 3311 if (ifp->vif->wdev.iftype == NL80211_IFTYPE_P2P_CLIENT) { 3312 brcmf_dbg(INFO, "Do not enable power save for P2P clients\n"); 3313 pm = PM_OFF; 3314 } 3315 brcmf_dbg(INFO, "power save %s\n", (pm ? "enabled" : "disabled")); 3316 3317 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_PM, pm); 3318 if (err) { 3319 if (err == -ENODEV) 3320 bphy_err(drvr, "net_device is not ready yet\n"); 3321 else 3322 bphy_err(drvr, "error (%d)\n", err); 3323 } 3324 3325 err = brcmf_fil_iovar_int_set(ifp, "pm2_sleep_ret", 3326 min_t(u32, timeout, BRCMF_PS_MAX_TIMEOUT_MS)); 3327 if (err) 3328 bphy_err(drvr, "Unable to set pm timeout, (%d)\n", err); 3329 3330 done: 3331 brcmf_dbg(TRACE, "Exit\n"); 3332 return err; 3333 } 3334 3335 static s32 brcmf_inform_single_bss(struct brcmf_cfg80211_info *cfg, 3336 struct brcmf_bss_info_le *bi) 3337 { 3338 struct wiphy *wiphy = cfg_to_wiphy(cfg); 3339 struct brcmf_pub *drvr = cfg->pub; 3340 struct cfg80211_bss *bss; 3341 enum nl80211_band band; 3342 struct brcmu_chan ch; 3343 u16 channel; 3344 u32 freq; 3345 u16 notify_capability; 3346 u16 notify_interval; 3347 u8 *notify_ie; 3348 size_t notify_ielen; 3349 struct cfg80211_inform_bss bss_data = {}; 3350 3351 if (le32_to_cpu(bi->length) > WL_BSS_INFO_MAX) { 3352 bphy_err(drvr, "Bss info is larger than buffer. Discarding\n"); 3353 return -EINVAL; 3354 } 3355 3356 if (!bi->ctl_ch) { 3357 ch.chspec = le16_to_cpu(bi->chanspec); 3358 cfg->d11inf.decchspec(&ch); 3359 bi->ctl_ch = ch.control_ch_num; 3360 } 3361 channel = bi->ctl_ch; 3362 3363 if (channel <= CH_MAX_2G_CHANNEL) 3364 band = NL80211_BAND_2GHZ; 3365 else 3366 band = NL80211_BAND_5GHZ; 3367 3368 freq = ieee80211_channel_to_frequency(channel, band); 3369 bss_data.chan = ieee80211_get_channel(wiphy, freq); 3370 bss_data.scan_width = NL80211_BSS_CHAN_WIDTH_20; 3371 bss_data.boottime_ns = ktime_to_ns(ktime_get_boottime()); 3372 3373 notify_capability = le16_to_cpu(bi->capability); 3374 notify_interval = le16_to_cpu(bi->beacon_period); 3375 notify_ie = (u8 *)bi + le16_to_cpu(bi->ie_offset); 3376 notify_ielen = le32_to_cpu(bi->ie_length); 3377 bss_data.signal = (s16)le16_to_cpu(bi->RSSI) * 100; 3378 3379 brcmf_dbg(CONN, "bssid: %pM\n", bi->BSSID); 3380 brcmf_dbg(CONN, "Channel: %d(%d)\n", channel, freq); 3381 brcmf_dbg(CONN, "Capability: %X\n", notify_capability); 3382 brcmf_dbg(CONN, "Beacon interval: %d\n", notify_interval); 3383 brcmf_dbg(CONN, "Signal: %d\n", bss_data.signal); 3384 3385 bss = cfg80211_inform_bss_data(wiphy, &bss_data, 3386 CFG80211_BSS_FTYPE_UNKNOWN, 3387 (const u8 *)bi->BSSID, 3388 0, notify_capability, 3389 notify_interval, notify_ie, 3390 notify_ielen, GFP_KERNEL); 3391 3392 if (!bss) 3393 return -ENOMEM; 3394 3395 cfg80211_put_bss(wiphy, bss); 3396 3397 return 0; 3398 } 3399 3400 static struct brcmf_bss_info_le * 3401 next_bss_le(struct brcmf_scan_results *list, struct brcmf_bss_info_le *bss) 3402 { 3403 if (bss == NULL) 3404 return list->bss_info_le; 3405 return (struct brcmf_bss_info_le *)((unsigned long)bss + 3406 le32_to_cpu(bss->length)); 3407 } 3408 3409 static s32 brcmf_inform_bss(struct brcmf_cfg80211_info *cfg) 3410 { 3411 struct brcmf_pub *drvr = cfg->pub; 3412 struct brcmf_scan_results *bss_list; 3413 struct brcmf_bss_info_le *bi = NULL; /* must be initialized */ 3414 s32 err = 0; 3415 int i; 3416 3417 bss_list = (struct brcmf_scan_results *)cfg->escan_info.escan_buf; 3418 if (bss_list->count != 0 && 3419 bss_list->version != BRCMF_BSS_INFO_VERSION) { 3420 bphy_err(drvr, "Version %d != WL_BSS_INFO_VERSION\n", 3421 bss_list->version); 3422 return -EOPNOTSUPP; 3423 } 3424 brcmf_dbg(SCAN, "scanned AP count (%d)\n", bss_list->count); 3425 for (i = 0; i < bss_list->count; i++) { 3426 bi = next_bss_le(bss_list, bi); 3427 err = brcmf_inform_single_bss(cfg, bi); 3428 if (err) 3429 break; 3430 } 3431 return err; 3432 } 3433 3434 static s32 brcmf_inform_ibss(struct brcmf_cfg80211_info *cfg, 3435 struct net_device *ndev, const u8 *bssid) 3436 { 3437 struct wiphy *wiphy = cfg_to_wiphy(cfg); 3438 struct brcmf_pub *drvr = cfg->pub; 3439 struct ieee80211_channel *notify_channel; 3440 struct brcmf_bss_info_le *bi = NULL; 3441 struct ieee80211_supported_band *band; 3442 struct cfg80211_bss *bss; 3443 struct brcmu_chan ch; 3444 u8 *buf = NULL; 3445 s32 err = 0; 3446 u32 freq; 3447 u16 notify_capability; 3448 u16 notify_interval; 3449 u8 *notify_ie; 3450 size_t notify_ielen; 3451 s32 notify_signal; 3452 3453 brcmf_dbg(TRACE, "Enter\n"); 3454 3455 buf = kzalloc(WL_BSS_INFO_MAX, GFP_KERNEL); 3456 if (buf == NULL) { 3457 err = -ENOMEM; 3458 goto CleanUp; 3459 } 3460 3461 *(__le32 *)buf = cpu_to_le32(WL_BSS_INFO_MAX); 3462 3463 err = brcmf_fil_cmd_data_get(netdev_priv(ndev), BRCMF_C_GET_BSS_INFO, 3464 buf, WL_BSS_INFO_MAX); 3465 if (err) { 3466 bphy_err(drvr, "WLC_GET_BSS_INFO failed: %d\n", err); 3467 goto CleanUp; 3468 } 3469 3470 bi = (struct brcmf_bss_info_le *)(buf + 4); 3471 3472 ch.chspec = le16_to_cpu(bi->chanspec); 3473 cfg->d11inf.decchspec(&ch); 3474 3475 if (ch.band == BRCMU_CHAN_BAND_2G) 3476 band = wiphy->bands[NL80211_BAND_2GHZ]; 3477 else 3478 band = wiphy->bands[NL80211_BAND_5GHZ]; 3479 3480 freq = ieee80211_channel_to_frequency(ch.control_ch_num, band->band); 3481 cfg->channel = freq; 3482 notify_channel = ieee80211_get_channel(wiphy, freq); 3483 3484 notify_capability = le16_to_cpu(bi->capability); 3485 notify_interval = le16_to_cpu(bi->beacon_period); 3486 notify_ie = (u8 *)bi + le16_to_cpu(bi->ie_offset); 3487 notify_ielen = le32_to_cpu(bi->ie_length); 3488 notify_signal = (s16)le16_to_cpu(bi->RSSI) * 100; 3489 3490 brcmf_dbg(CONN, "channel: %d(%d)\n", ch.control_ch_num, freq); 3491 brcmf_dbg(CONN, "capability: %X\n", notify_capability); 3492 brcmf_dbg(CONN, "beacon interval: %d\n", notify_interval); 3493 brcmf_dbg(CONN, "signal: %d\n", notify_signal); 3494 3495 bss = cfg80211_inform_bss(wiphy, notify_channel, 3496 CFG80211_BSS_FTYPE_UNKNOWN, bssid, 0, 3497 notify_capability, notify_interval, 3498 notify_ie, notify_ielen, notify_signal, 3499 GFP_KERNEL); 3500 3501 if (!bss) { 3502 err = -ENOMEM; 3503 goto CleanUp; 3504 } 3505 3506 cfg80211_put_bss(wiphy, bss); 3507 3508 CleanUp: 3509 3510 kfree(buf); 3511 3512 brcmf_dbg(TRACE, "Exit\n"); 3513 3514 return err; 3515 } 3516 3517 static s32 brcmf_update_bss_info(struct brcmf_cfg80211_info *cfg, 3518 struct brcmf_if *ifp) 3519 { 3520 struct brcmf_pub *drvr = cfg->pub; 3521 struct brcmf_bss_info_le *bi = NULL; 3522 s32 err = 0; 3523 3524 brcmf_dbg(TRACE, "Enter\n"); 3525 if (brcmf_is_ibssmode(ifp->vif)) 3526 return err; 3527 3528 *(__le32 *)cfg->extra_buf = cpu_to_le32(WL_EXTRA_BUF_MAX); 3529 err = brcmf_fil_cmd_data_get(ifp, BRCMF_C_GET_BSS_INFO, 3530 cfg->extra_buf, WL_EXTRA_BUF_MAX); 3531 if (err) { 3532 bphy_err(drvr, "Could not get bss info %d\n", err); 3533 goto update_bss_info_out; 3534 } 3535 bi = (struct brcmf_bss_info_le *)(cfg->extra_buf + 4); 3536 err = brcmf_inform_single_bss(cfg, bi); 3537 3538 update_bss_info_out: 3539 brcmf_dbg(TRACE, "Exit"); 3540 return err; 3541 } 3542 3543 void brcmf_abort_scanning(struct brcmf_cfg80211_info *cfg) 3544 { 3545 struct escan_info *escan = &cfg->escan_info; 3546 3547 set_bit(BRCMF_SCAN_STATUS_ABORT, &cfg->scan_status); 3548 if (cfg->int_escan_map || cfg->scan_request) { 3549 escan->escan_state = WL_ESCAN_STATE_IDLE; 3550 brcmf_notify_escan_complete(cfg, escan->ifp, true, true); 3551 } 3552 clear_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status); 3553 clear_bit(BRCMF_SCAN_STATUS_ABORT, &cfg->scan_status); 3554 } 3555 3556 static void brcmf_cfg80211_escan_timeout_worker(struct work_struct *work) 3557 { 3558 struct brcmf_cfg80211_info *cfg = 3559 container_of(work, struct brcmf_cfg80211_info, 3560 escan_timeout_work); 3561 3562 brcmf_inform_bss(cfg); 3563 brcmf_notify_escan_complete(cfg, cfg->escan_info.ifp, true, true); 3564 } 3565 3566 static void brcmf_escan_timeout(struct timer_list *t) 3567 { 3568 struct brcmf_cfg80211_info *cfg = 3569 from_timer(cfg, t, escan_timeout); 3570 struct brcmf_pub *drvr = cfg->pub; 3571 3572 if (cfg->int_escan_map || cfg->scan_request) { 3573 bphy_err(drvr, "timer expired\n"); 3574 schedule_work(&cfg->escan_timeout_work); 3575 } 3576 } 3577 3578 static s32 3579 brcmf_compare_update_same_bss(struct brcmf_cfg80211_info *cfg, 3580 struct brcmf_bss_info_le *bss, 3581 struct brcmf_bss_info_le *bss_info_le) 3582 { 3583 struct brcmu_chan ch_bss, ch_bss_info_le; 3584 3585 ch_bss.chspec = le16_to_cpu(bss->chanspec); 3586 cfg->d11inf.decchspec(&ch_bss); 3587 ch_bss_info_le.chspec = le16_to_cpu(bss_info_le->chanspec); 3588 cfg->d11inf.decchspec(&ch_bss_info_le); 3589 3590 if (!memcmp(&bss_info_le->BSSID, &bss->BSSID, ETH_ALEN) && 3591 ch_bss.band == ch_bss_info_le.band && 3592 bss_info_le->SSID_len == bss->SSID_len && 3593 !memcmp(bss_info_le->SSID, bss->SSID, bss_info_le->SSID_len)) { 3594 if ((bss->flags & BRCMF_BSS_RSSI_ON_CHANNEL) == 3595 (bss_info_le->flags & BRCMF_BSS_RSSI_ON_CHANNEL)) { 3596 s16 bss_rssi = le16_to_cpu(bss->RSSI); 3597 s16 bss_info_rssi = le16_to_cpu(bss_info_le->RSSI); 3598 3599 /* preserve max RSSI if the measurements are 3600 * both on-channel or both off-channel 3601 */ 3602 if (bss_info_rssi > bss_rssi) 3603 bss->RSSI = bss_info_le->RSSI; 3604 } else if ((bss->flags & BRCMF_BSS_RSSI_ON_CHANNEL) && 3605 (bss_info_le->flags & BRCMF_BSS_RSSI_ON_CHANNEL) == 0) { 3606 /* preserve the on-channel rssi measurement 3607 * if the new measurement is off channel 3608 */ 3609 bss->RSSI = bss_info_le->RSSI; 3610 bss->flags |= BRCMF_BSS_RSSI_ON_CHANNEL; 3611 } 3612 return 1; 3613 } 3614 return 0; 3615 } 3616 3617 static s32 3618 brcmf_cfg80211_escan_handler(struct brcmf_if *ifp, 3619 const struct brcmf_event_msg *e, void *data) 3620 { 3621 struct brcmf_pub *drvr = ifp->drvr; 3622 struct brcmf_cfg80211_info *cfg = drvr->config; 3623 s32 status; 3624 struct brcmf_escan_result_le *escan_result_le; 3625 u32 escan_buflen; 3626 struct brcmf_bss_info_le *bss_info_le; 3627 struct brcmf_bss_info_le *bss = NULL; 3628 u32 bi_length; 3629 struct brcmf_scan_results *list; 3630 u32 i; 3631 bool aborted; 3632 3633 status = e->status; 3634 3635 if (status == BRCMF_E_STATUS_ABORT) 3636 goto exit; 3637 3638 if (!test_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status)) { 3639 bphy_err(drvr, "scan not ready, bsscfgidx=%d\n", 3640 ifp->bsscfgidx); 3641 return -EPERM; 3642 } 3643 3644 if (status == BRCMF_E_STATUS_PARTIAL) { 3645 brcmf_dbg(SCAN, "ESCAN Partial result\n"); 3646 if (e->datalen < sizeof(*escan_result_le)) { 3647 bphy_err(drvr, "invalid event data length\n"); 3648 goto exit; 3649 } 3650 escan_result_le = (struct brcmf_escan_result_le *) data; 3651 if (!escan_result_le) { 3652 bphy_err(drvr, "Invalid escan result (NULL pointer)\n"); 3653 goto exit; 3654 } 3655 escan_buflen = le32_to_cpu(escan_result_le->buflen); 3656 if (escan_buflen > BRCMF_ESCAN_BUF_SIZE || 3657 escan_buflen > e->datalen || 3658 escan_buflen < sizeof(*escan_result_le)) { 3659 bphy_err(drvr, "Invalid escan buffer length: %d\n", 3660 escan_buflen); 3661 goto exit; 3662 } 3663 if (le16_to_cpu(escan_result_le->bss_count) != 1) { 3664 bphy_err(drvr, "Invalid bss_count %d: ignoring\n", 3665 escan_result_le->bss_count); 3666 goto exit; 3667 } 3668 bss_info_le = &escan_result_le->bss_info_le; 3669 3670 if (brcmf_p2p_scan_finding_common_channel(cfg, bss_info_le)) 3671 goto exit; 3672 3673 if (!cfg->int_escan_map && !cfg->scan_request) { 3674 brcmf_dbg(SCAN, "result without cfg80211 request\n"); 3675 goto exit; 3676 } 3677 3678 bi_length = le32_to_cpu(bss_info_le->length); 3679 if (bi_length != escan_buflen - WL_ESCAN_RESULTS_FIXED_SIZE) { 3680 bphy_err(drvr, "Ignoring invalid bss_info length: %d\n", 3681 bi_length); 3682 goto exit; 3683 } 3684 3685 if (!(cfg_to_wiphy(cfg)->interface_modes & 3686 BIT(NL80211_IFTYPE_ADHOC))) { 3687 if (le16_to_cpu(bss_info_le->capability) & 3688 WLAN_CAPABILITY_IBSS) { 3689 bphy_err(drvr, "Ignoring IBSS result\n"); 3690 goto exit; 3691 } 3692 } 3693 3694 list = (struct brcmf_scan_results *) 3695 cfg->escan_info.escan_buf; 3696 if (bi_length > BRCMF_ESCAN_BUF_SIZE - list->buflen) { 3697 bphy_err(drvr, "Buffer is too small: ignoring\n"); 3698 goto exit; 3699 } 3700 3701 for (i = 0; i < list->count; i++) { 3702 bss = bss ? (struct brcmf_bss_info_le *) 3703 ((unsigned char *)bss + 3704 le32_to_cpu(bss->length)) : list->bss_info_le; 3705 if (brcmf_compare_update_same_bss(cfg, bss, 3706 bss_info_le)) 3707 goto exit; 3708 } 3709 memcpy(&cfg->escan_info.escan_buf[list->buflen], bss_info_le, 3710 bi_length); 3711 list->version = le32_to_cpu(bss_info_le->version); 3712 list->buflen += bi_length; 3713 list->count++; 3714 } else { 3715 cfg->escan_info.escan_state = WL_ESCAN_STATE_IDLE; 3716 if (brcmf_p2p_scan_finding_common_channel(cfg, NULL)) 3717 goto exit; 3718 if (cfg->int_escan_map || cfg->scan_request) { 3719 brcmf_inform_bss(cfg); 3720 aborted = status != BRCMF_E_STATUS_SUCCESS; 3721 brcmf_notify_escan_complete(cfg, ifp, aborted, false); 3722 } else 3723 brcmf_dbg(SCAN, "Ignored scan complete result 0x%x\n", 3724 status); 3725 } 3726 exit: 3727 return 0; 3728 } 3729 3730 static void brcmf_init_escan(struct brcmf_cfg80211_info *cfg) 3731 { 3732 brcmf_fweh_register(cfg->pub, BRCMF_E_ESCAN_RESULT, 3733 brcmf_cfg80211_escan_handler); 3734 cfg->escan_info.escan_state = WL_ESCAN_STATE_IDLE; 3735 /* Init scan_timeout timer */ 3736 timer_setup(&cfg->escan_timeout, brcmf_escan_timeout, 0); 3737 INIT_WORK(&cfg->escan_timeout_work, 3738 brcmf_cfg80211_escan_timeout_worker); 3739 } 3740 3741 static struct cfg80211_scan_request * 3742 brcmf_alloc_internal_escan_request(struct wiphy *wiphy, u32 n_netinfo) { 3743 struct cfg80211_scan_request *req; 3744 size_t req_size; 3745 3746 req_size = sizeof(*req) + 3747 n_netinfo * sizeof(req->channels[0]) + 3748 n_netinfo * sizeof(*req->ssids); 3749 3750 req = kzalloc(req_size, GFP_KERNEL); 3751 if (req) { 3752 req->wiphy = wiphy; 3753 req->ssids = (void *)(&req->channels[0]) + 3754 n_netinfo * sizeof(req->channels[0]); 3755 } 3756 return req; 3757 } 3758 3759 static int brcmf_internal_escan_add_info(struct cfg80211_scan_request *req, 3760 u8 *ssid, u8 ssid_len, u8 channel) 3761 { 3762 struct ieee80211_channel *chan; 3763 enum nl80211_band band; 3764 int freq, i; 3765 3766 if (channel <= CH_MAX_2G_CHANNEL) 3767 band = NL80211_BAND_2GHZ; 3768 else 3769 band = NL80211_BAND_5GHZ; 3770 3771 freq = ieee80211_channel_to_frequency(channel, band); 3772 if (!freq) 3773 return -EINVAL; 3774 3775 chan = ieee80211_get_channel(req->wiphy, freq); 3776 if (!chan) 3777 return -EINVAL; 3778 3779 for (i = 0; i < req->n_channels; i++) { 3780 if (req->channels[i] == chan) 3781 break; 3782 } 3783 if (i == req->n_channels) 3784 req->channels[req->n_channels++] = chan; 3785 3786 for (i = 0; i < req->n_ssids; i++) { 3787 if (req->ssids[i].ssid_len == ssid_len && 3788 !memcmp(req->ssids[i].ssid, ssid, ssid_len)) 3789 break; 3790 } 3791 if (i == req->n_ssids) { 3792 memcpy(req->ssids[req->n_ssids].ssid, ssid, ssid_len); 3793 req->ssids[req->n_ssids++].ssid_len = ssid_len; 3794 } 3795 return 0; 3796 } 3797 3798 static int brcmf_start_internal_escan(struct brcmf_if *ifp, u32 fwmap, 3799 struct cfg80211_scan_request *request) 3800 { 3801 struct brcmf_cfg80211_info *cfg = ifp->drvr->config; 3802 int err; 3803 3804 if (test_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status)) { 3805 if (cfg->int_escan_map) 3806 brcmf_dbg(SCAN, "aborting internal scan: map=%u\n", 3807 cfg->int_escan_map); 3808 /* Abort any on-going scan */ 3809 brcmf_abort_scanning(cfg); 3810 } 3811 3812 brcmf_dbg(SCAN, "start internal scan: map=%u\n", fwmap); 3813 set_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status); 3814 cfg->escan_info.run = brcmf_run_escan; 3815 err = brcmf_do_escan(ifp, request); 3816 if (err) { 3817 clear_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status); 3818 return err; 3819 } 3820 cfg->int_escan_map = fwmap; 3821 return 0; 3822 } 3823 3824 static struct brcmf_pno_net_info_le * 3825 brcmf_get_netinfo_array(struct brcmf_pno_scanresults_le *pfn_v1) 3826 { 3827 struct brcmf_pno_scanresults_v2_le *pfn_v2; 3828 struct brcmf_pno_net_info_le *netinfo; 3829 3830 switch (pfn_v1->version) { 3831 default: 3832 WARN_ON(1); 3833 fallthrough; 3834 case cpu_to_le32(1): 3835 netinfo = (struct brcmf_pno_net_info_le *)(pfn_v1 + 1); 3836 break; 3837 case cpu_to_le32(2): 3838 pfn_v2 = (struct brcmf_pno_scanresults_v2_le *)pfn_v1; 3839 netinfo = (struct brcmf_pno_net_info_le *)(pfn_v2 + 1); 3840 break; 3841 } 3842 3843 return netinfo; 3844 } 3845 3846 /* PFN result doesn't have all the info which are required by the supplicant 3847 * (For e.g IEs) Do a target Escan so that sched scan results are reported 3848 * via wl_inform_single_bss in the required format. Escan does require the 3849 * scan request in the form of cfg80211_scan_request. For timebeing, create 3850 * cfg80211_scan_request one out of the received PNO event. 3851 */ 3852 static s32 3853 brcmf_notify_sched_scan_results(struct brcmf_if *ifp, 3854 const struct brcmf_event_msg *e, void *data) 3855 { 3856 struct brcmf_pub *drvr = ifp->drvr; 3857 struct brcmf_cfg80211_info *cfg = drvr->config; 3858 struct brcmf_pno_net_info_le *netinfo, *netinfo_start; 3859 struct cfg80211_scan_request *request = NULL; 3860 struct wiphy *wiphy = cfg_to_wiphy(cfg); 3861 int i, err = 0; 3862 struct brcmf_pno_scanresults_le *pfn_result; 3863 u32 bucket_map; 3864 u32 result_count; 3865 u32 status; 3866 u32 datalen; 3867 3868 brcmf_dbg(SCAN, "Enter\n"); 3869 3870 if (e->datalen < (sizeof(*pfn_result) + sizeof(*netinfo))) { 3871 brcmf_dbg(SCAN, "Event data to small. Ignore\n"); 3872 return 0; 3873 } 3874 3875 if (e->event_code == BRCMF_E_PFN_NET_LOST) { 3876 brcmf_dbg(SCAN, "PFN NET LOST event. Do Nothing\n"); 3877 return 0; 3878 } 3879 3880 pfn_result = (struct brcmf_pno_scanresults_le *)data; 3881 result_count = le32_to_cpu(pfn_result->count); 3882 status = le32_to_cpu(pfn_result->status); 3883 3884 /* PFN event is limited to fit 512 bytes so we may get 3885 * multiple NET_FOUND events. For now place a warning here. 3886 */ 3887 WARN_ON(status != BRCMF_PNO_SCAN_COMPLETE); 3888 brcmf_dbg(SCAN, "PFN NET FOUND event. count: %d\n", result_count); 3889 if (!result_count) { 3890 bphy_err(drvr, "FALSE PNO Event. (pfn_count == 0)\n"); 3891 goto out_err; 3892 } 3893 3894 netinfo_start = brcmf_get_netinfo_array(pfn_result); 3895 datalen = e->datalen - ((void *)netinfo_start - (void *)pfn_result); 3896 if (datalen < result_count * sizeof(*netinfo)) { 3897 bphy_err(drvr, "insufficient event data\n"); 3898 goto out_err; 3899 } 3900 3901 request = brcmf_alloc_internal_escan_request(wiphy, 3902 result_count); 3903 if (!request) { 3904 err = -ENOMEM; 3905 goto out_err; 3906 } 3907 3908 bucket_map = 0; 3909 for (i = 0; i < result_count; i++) { 3910 netinfo = &netinfo_start[i]; 3911 3912 if (netinfo->SSID_len > IEEE80211_MAX_SSID_LEN) 3913 netinfo->SSID_len = IEEE80211_MAX_SSID_LEN; 3914 brcmf_dbg(SCAN, "SSID:%.32s Channel:%d\n", 3915 netinfo->SSID, netinfo->channel); 3916 bucket_map |= brcmf_pno_get_bucket_map(cfg->pno, netinfo); 3917 err = brcmf_internal_escan_add_info(request, 3918 netinfo->SSID, 3919 netinfo->SSID_len, 3920 netinfo->channel); 3921 if (err) 3922 goto out_err; 3923 } 3924 3925 if (!bucket_map) 3926 goto free_req; 3927 3928 err = brcmf_start_internal_escan(ifp, bucket_map, request); 3929 if (!err) 3930 goto free_req; 3931 3932 out_err: 3933 cfg80211_sched_scan_stopped(wiphy, 0); 3934 free_req: 3935 kfree(request); 3936 return err; 3937 } 3938 3939 static int 3940 brcmf_cfg80211_sched_scan_start(struct wiphy *wiphy, 3941 struct net_device *ndev, 3942 struct cfg80211_sched_scan_request *req) 3943 { 3944 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 3945 struct brcmf_if *ifp = netdev_priv(ndev); 3946 struct brcmf_pub *drvr = cfg->pub; 3947 3948 brcmf_dbg(SCAN, "Enter: n_match_sets=%d n_ssids=%d\n", 3949 req->n_match_sets, req->n_ssids); 3950 3951 if (test_bit(BRCMF_SCAN_STATUS_SUPPRESS, &cfg->scan_status)) { 3952 bphy_err(drvr, "Scanning suppressed: status=%lu\n", 3953 cfg->scan_status); 3954 return -EAGAIN; 3955 } 3956 3957 if (req->n_match_sets <= 0) { 3958 brcmf_dbg(SCAN, "invalid number of matchsets specified: %d\n", 3959 req->n_match_sets); 3960 return -EINVAL; 3961 } 3962 3963 return brcmf_pno_start_sched_scan(ifp, req); 3964 } 3965 3966 static int brcmf_cfg80211_sched_scan_stop(struct wiphy *wiphy, 3967 struct net_device *ndev, u64 reqid) 3968 { 3969 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 3970 struct brcmf_if *ifp = netdev_priv(ndev); 3971 3972 brcmf_dbg(SCAN, "enter\n"); 3973 brcmf_pno_stop_sched_scan(ifp, reqid); 3974 if (cfg->int_escan_map) 3975 brcmf_notify_escan_complete(cfg, ifp, true, true); 3976 return 0; 3977 } 3978 3979 static __always_inline void brcmf_delay(u32 ms) 3980 { 3981 if (ms < 1000 / HZ) { 3982 cond_resched(); 3983 mdelay(ms); 3984 } else { 3985 msleep(ms); 3986 } 3987 } 3988 3989 static s32 brcmf_config_wowl_pattern(struct brcmf_if *ifp, u8 cmd[4], 3990 u8 *pattern, u32 patternsize, u8 *mask, 3991 u32 packet_offset) 3992 { 3993 struct brcmf_fil_wowl_pattern_le *filter; 3994 u32 masksize; 3995 u32 patternoffset; 3996 u8 *buf; 3997 u32 bufsize; 3998 s32 ret; 3999 4000 masksize = (patternsize + 7) / 8; 4001 patternoffset = sizeof(*filter) - sizeof(filter->cmd) + masksize; 4002 4003 bufsize = sizeof(*filter) + patternsize + masksize; 4004 buf = kzalloc(bufsize, GFP_KERNEL); 4005 if (!buf) 4006 return -ENOMEM; 4007 filter = (struct brcmf_fil_wowl_pattern_le *)buf; 4008 4009 memcpy(filter->cmd, cmd, 4); 4010 filter->masksize = cpu_to_le32(masksize); 4011 filter->offset = cpu_to_le32(packet_offset); 4012 filter->patternoffset = cpu_to_le32(patternoffset); 4013 filter->patternsize = cpu_to_le32(patternsize); 4014 filter->type = cpu_to_le32(BRCMF_WOWL_PATTERN_TYPE_BITMAP); 4015 4016 if ((mask) && (masksize)) 4017 memcpy(buf + sizeof(*filter), mask, masksize); 4018 if ((pattern) && (patternsize)) 4019 memcpy(buf + sizeof(*filter) + masksize, pattern, patternsize); 4020 4021 ret = brcmf_fil_iovar_data_set(ifp, "wowl_pattern", buf, bufsize); 4022 4023 kfree(buf); 4024 return ret; 4025 } 4026 4027 static s32 4028 brcmf_wowl_nd_results(struct brcmf_if *ifp, const struct brcmf_event_msg *e, 4029 void *data) 4030 { 4031 struct brcmf_pub *drvr = ifp->drvr; 4032 struct brcmf_cfg80211_info *cfg = drvr->config; 4033 struct brcmf_pno_scanresults_le *pfn_result; 4034 struct brcmf_pno_net_info_le *netinfo; 4035 4036 brcmf_dbg(SCAN, "Enter\n"); 4037 4038 if (e->datalen < (sizeof(*pfn_result) + sizeof(*netinfo))) { 4039 brcmf_dbg(SCAN, "Event data to small. Ignore\n"); 4040 return 0; 4041 } 4042 4043 pfn_result = (struct brcmf_pno_scanresults_le *)data; 4044 4045 if (e->event_code == BRCMF_E_PFN_NET_LOST) { 4046 brcmf_dbg(SCAN, "PFN NET LOST event. Ignore\n"); 4047 return 0; 4048 } 4049 4050 if (le32_to_cpu(pfn_result->count) < 1) { 4051 bphy_err(drvr, "Invalid result count, expected 1 (%d)\n", 4052 le32_to_cpu(pfn_result->count)); 4053 return -EINVAL; 4054 } 4055 4056 netinfo = brcmf_get_netinfo_array(pfn_result); 4057 if (netinfo->SSID_len > IEEE80211_MAX_SSID_LEN) 4058 netinfo->SSID_len = IEEE80211_MAX_SSID_LEN; 4059 memcpy(cfg->wowl.nd->ssid.ssid, netinfo->SSID, netinfo->SSID_len); 4060 cfg->wowl.nd->ssid.ssid_len = netinfo->SSID_len; 4061 cfg->wowl.nd->n_channels = 1; 4062 cfg->wowl.nd->channels[0] = 4063 ieee80211_channel_to_frequency(netinfo->channel, 4064 netinfo->channel <= CH_MAX_2G_CHANNEL ? 4065 NL80211_BAND_2GHZ : NL80211_BAND_5GHZ); 4066 cfg->wowl.nd_info->n_matches = 1; 4067 cfg->wowl.nd_info->matches[0] = cfg->wowl.nd; 4068 4069 /* Inform (the resume task) that the net detect information was recvd */ 4070 cfg->wowl.nd_data_completed = true; 4071 wake_up(&cfg->wowl.nd_data_wait); 4072 4073 return 0; 4074 } 4075 4076 #ifdef CONFIG_PM 4077 4078 static void brcmf_report_wowl_wakeind(struct wiphy *wiphy, struct brcmf_if *ifp) 4079 { 4080 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 4081 struct brcmf_pub *drvr = cfg->pub; 4082 struct brcmf_wowl_wakeind_le wake_ind_le; 4083 struct cfg80211_wowlan_wakeup wakeup_data; 4084 struct cfg80211_wowlan_wakeup *wakeup; 4085 u32 wakeind; 4086 s32 err; 4087 int timeout; 4088 4089 err = brcmf_fil_iovar_data_get(ifp, "wowl_wakeind", &wake_ind_le, 4090 sizeof(wake_ind_le)); 4091 if (err) { 4092 bphy_err(drvr, "Get wowl_wakeind failed, err = %d\n", err); 4093 return; 4094 } 4095 4096 wakeind = le32_to_cpu(wake_ind_le.ucode_wakeind); 4097 if (wakeind & (BRCMF_WOWL_MAGIC | BRCMF_WOWL_DIS | BRCMF_WOWL_BCN | 4098 BRCMF_WOWL_RETR | BRCMF_WOWL_NET | 4099 BRCMF_WOWL_PFN_FOUND)) { 4100 wakeup = &wakeup_data; 4101 memset(&wakeup_data, 0, sizeof(wakeup_data)); 4102 wakeup_data.pattern_idx = -1; 4103 4104 if (wakeind & BRCMF_WOWL_MAGIC) { 4105 brcmf_dbg(INFO, "WOWL Wake indicator: BRCMF_WOWL_MAGIC\n"); 4106 wakeup_data.magic_pkt = true; 4107 } 4108 if (wakeind & BRCMF_WOWL_DIS) { 4109 brcmf_dbg(INFO, "WOWL Wake indicator: BRCMF_WOWL_DIS\n"); 4110 wakeup_data.disconnect = true; 4111 } 4112 if (wakeind & BRCMF_WOWL_BCN) { 4113 brcmf_dbg(INFO, "WOWL Wake indicator: BRCMF_WOWL_BCN\n"); 4114 wakeup_data.disconnect = true; 4115 } 4116 if (wakeind & BRCMF_WOWL_RETR) { 4117 brcmf_dbg(INFO, "WOWL Wake indicator: BRCMF_WOWL_RETR\n"); 4118 wakeup_data.disconnect = true; 4119 } 4120 if (wakeind & BRCMF_WOWL_NET) { 4121 brcmf_dbg(INFO, "WOWL Wake indicator: BRCMF_WOWL_NET\n"); 4122 /* For now always map to pattern 0, no API to get 4123 * correct information available at the moment. 4124 */ 4125 wakeup_data.pattern_idx = 0; 4126 } 4127 if (wakeind & BRCMF_WOWL_PFN_FOUND) { 4128 brcmf_dbg(INFO, "WOWL Wake indicator: BRCMF_WOWL_PFN_FOUND\n"); 4129 timeout = wait_event_timeout(cfg->wowl.nd_data_wait, 4130 cfg->wowl.nd_data_completed, 4131 BRCMF_ND_INFO_TIMEOUT); 4132 if (!timeout) 4133 bphy_err(drvr, "No result for wowl net detect\n"); 4134 else 4135 wakeup_data.net_detect = cfg->wowl.nd_info; 4136 } 4137 if (wakeind & BRCMF_WOWL_GTK_FAILURE) { 4138 brcmf_dbg(INFO, "WOWL Wake indicator: BRCMF_WOWL_GTK_FAILURE\n"); 4139 wakeup_data.gtk_rekey_failure = true; 4140 } 4141 } else { 4142 wakeup = NULL; 4143 } 4144 cfg80211_report_wowlan_wakeup(&ifp->vif->wdev, wakeup, GFP_KERNEL); 4145 } 4146 4147 #else 4148 4149 static void brcmf_report_wowl_wakeind(struct wiphy *wiphy, struct brcmf_if *ifp) 4150 { 4151 } 4152 4153 #endif /* CONFIG_PM */ 4154 4155 static s32 brcmf_cfg80211_resume(struct wiphy *wiphy) 4156 { 4157 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 4158 struct net_device *ndev = cfg_to_ndev(cfg); 4159 struct brcmf_if *ifp = netdev_priv(ndev); 4160 4161 brcmf_dbg(TRACE, "Enter\n"); 4162 4163 if (cfg->wowl.active) { 4164 brcmf_report_wowl_wakeind(wiphy, ifp); 4165 brcmf_fil_iovar_int_set(ifp, "wowl_clear", 0); 4166 brcmf_config_wowl_pattern(ifp, "clr", NULL, 0, NULL, 0); 4167 if (!brcmf_feat_is_enabled(ifp, BRCMF_FEAT_WOWL_ARP_ND)) 4168 brcmf_configure_arp_nd_offload(ifp, true); 4169 brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_PM, 4170 cfg->wowl.pre_pmmode); 4171 cfg->wowl.active = false; 4172 if (cfg->wowl.nd_enabled) { 4173 brcmf_cfg80211_sched_scan_stop(cfg->wiphy, ifp->ndev, 0); 4174 brcmf_fweh_unregister(cfg->pub, BRCMF_E_PFN_NET_FOUND); 4175 brcmf_fweh_register(cfg->pub, BRCMF_E_PFN_NET_FOUND, 4176 brcmf_notify_sched_scan_results); 4177 cfg->wowl.nd_enabled = false; 4178 } 4179 } 4180 return 0; 4181 } 4182 4183 static void brcmf_configure_wowl(struct brcmf_cfg80211_info *cfg, 4184 struct brcmf_if *ifp, 4185 struct cfg80211_wowlan *wowl) 4186 { 4187 u32 wowl_config; 4188 struct brcmf_wowl_wakeind_le wowl_wakeind; 4189 u32 i; 4190 4191 brcmf_dbg(TRACE, "Suspend, wowl config.\n"); 4192 4193 if (!brcmf_feat_is_enabled(ifp, BRCMF_FEAT_WOWL_ARP_ND)) 4194 brcmf_configure_arp_nd_offload(ifp, false); 4195 brcmf_fil_cmd_int_get(ifp, BRCMF_C_GET_PM, &cfg->wowl.pre_pmmode); 4196 brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_PM, PM_MAX); 4197 4198 wowl_config = 0; 4199 if (wowl->disconnect) 4200 wowl_config = BRCMF_WOWL_DIS | BRCMF_WOWL_BCN | BRCMF_WOWL_RETR; 4201 if (wowl->magic_pkt) 4202 wowl_config |= BRCMF_WOWL_MAGIC; 4203 if ((wowl->patterns) && (wowl->n_patterns)) { 4204 wowl_config |= BRCMF_WOWL_NET; 4205 for (i = 0; i < wowl->n_patterns; i++) { 4206 brcmf_config_wowl_pattern(ifp, "add", 4207 (u8 *)wowl->patterns[i].pattern, 4208 wowl->patterns[i].pattern_len, 4209 (u8 *)wowl->patterns[i].mask, 4210 wowl->patterns[i].pkt_offset); 4211 } 4212 } 4213 if (wowl->nd_config) { 4214 brcmf_cfg80211_sched_scan_start(cfg->wiphy, ifp->ndev, 4215 wowl->nd_config); 4216 wowl_config |= BRCMF_WOWL_PFN_FOUND; 4217 4218 cfg->wowl.nd_data_completed = false; 4219 cfg->wowl.nd_enabled = true; 4220 /* Now reroute the event for PFN to the wowl function. */ 4221 brcmf_fweh_unregister(cfg->pub, BRCMF_E_PFN_NET_FOUND); 4222 brcmf_fweh_register(cfg->pub, BRCMF_E_PFN_NET_FOUND, 4223 brcmf_wowl_nd_results); 4224 } 4225 if (wowl->gtk_rekey_failure) 4226 wowl_config |= BRCMF_WOWL_GTK_FAILURE; 4227 if (!test_bit(BRCMF_VIF_STATUS_CONNECTED, &ifp->vif->sme_state)) 4228 wowl_config |= BRCMF_WOWL_UNASSOC; 4229 4230 memcpy(&wowl_wakeind, "clear", 6); 4231 brcmf_fil_iovar_data_set(ifp, "wowl_wakeind", &wowl_wakeind, 4232 sizeof(wowl_wakeind)); 4233 brcmf_fil_iovar_int_set(ifp, "wowl", wowl_config); 4234 brcmf_fil_iovar_int_set(ifp, "wowl_activate", 1); 4235 brcmf_bus_wowl_config(cfg->pub->bus_if, true); 4236 cfg->wowl.active = true; 4237 } 4238 4239 static int brcmf_keepalive_start(struct brcmf_if *ifp, unsigned int interval) 4240 { 4241 struct brcmf_mkeep_alive_pkt_le kalive = {0}; 4242 int ret = 0; 4243 4244 /* Configure Null function/data keepalive */ 4245 kalive.version = cpu_to_le16(1); 4246 kalive.period_msec = cpu_to_le32(interval * MSEC_PER_SEC); 4247 kalive.len_bytes = cpu_to_le16(0); 4248 kalive.keep_alive_id = 0; 4249 4250 ret = brcmf_fil_iovar_data_set(ifp, "mkeep_alive", &kalive, sizeof(kalive)); 4251 if (ret) 4252 brcmf_err("keep-alive packet config failed, ret=%d\n", ret); 4253 4254 return ret; 4255 } 4256 4257 static s32 brcmf_cfg80211_suspend(struct wiphy *wiphy, 4258 struct cfg80211_wowlan *wowl) 4259 { 4260 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 4261 struct net_device *ndev = cfg_to_ndev(cfg); 4262 struct brcmf_if *ifp = netdev_priv(ndev); 4263 struct brcmf_cfg80211_vif *vif; 4264 4265 brcmf_dbg(TRACE, "Enter\n"); 4266 4267 /* if the primary net_device is not READY there is nothing 4268 * we can do but pray resume goes smoothly. 4269 */ 4270 if (!check_vif_up(ifp->vif)) 4271 goto exit; 4272 4273 /* Stop scheduled scan */ 4274 if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_PNO)) 4275 brcmf_cfg80211_sched_scan_stop(wiphy, ndev, 0); 4276 4277 /* end any scanning */ 4278 if (test_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status)) 4279 brcmf_abort_scanning(cfg); 4280 4281 if (wowl == NULL) { 4282 brcmf_bus_wowl_config(cfg->pub->bus_if, false); 4283 list_for_each_entry(vif, &cfg->vif_list, list) { 4284 if (!test_bit(BRCMF_VIF_STATUS_READY, &vif->sme_state)) 4285 continue; 4286 /* While going to suspend if associated with AP 4287 * disassociate from AP to save power while system is 4288 * in suspended state 4289 */ 4290 brcmf_link_down(vif, WLAN_REASON_UNSPECIFIED, true); 4291 /* Make sure WPA_Supplicant receives all the event 4292 * generated due to DISASSOC call to the fw to keep 4293 * the state fw and WPA_Supplicant state consistent 4294 */ 4295 brcmf_delay(500); 4296 } 4297 /* Configure MPC */ 4298 brcmf_set_mpc(ifp, 1); 4299 4300 } else { 4301 /* Configure WOWL paramaters */ 4302 brcmf_configure_wowl(cfg, ifp, wowl); 4303 4304 /* Prevent disassociation due to inactivity with keep-alive */ 4305 brcmf_keepalive_start(ifp, 30); 4306 } 4307 4308 exit: 4309 brcmf_dbg(TRACE, "Exit\n"); 4310 /* clear any scanning activity */ 4311 cfg->scan_status = 0; 4312 return 0; 4313 } 4314 4315 static s32 4316 brcmf_pmksa_v3_op(struct brcmf_if *ifp, struct cfg80211_pmksa *pmksa, 4317 bool alive) 4318 { 4319 struct brcmf_pmk_op_v3_le *pmk_op; 4320 int length = offsetof(struct brcmf_pmk_op_v3_le, pmk); 4321 int ret; 4322 4323 pmk_op = kzalloc(sizeof(*pmk_op), GFP_KERNEL); 4324 pmk_op->version = cpu_to_le16(BRCMF_PMKSA_VER_3); 4325 4326 if (!pmksa) { 4327 /* Flush operation, operate on entire list */ 4328 pmk_op->count = cpu_to_le16(0); 4329 } else { 4330 /* Single PMK operation */ 4331 pmk_op->count = cpu_to_le16(1); 4332 length += sizeof(struct brcmf_pmksa_v3); 4333 memcpy(pmk_op->pmk[0].bssid, pmksa->bssid, ETH_ALEN); 4334 memcpy(pmk_op->pmk[0].pmkid, pmksa->pmkid, WLAN_PMKID_LEN); 4335 pmk_op->pmk[0].pmkid_len = WLAN_PMKID_LEN; 4336 pmk_op->pmk[0].time_left = cpu_to_le32(alive ? BRCMF_PMKSA_NO_EXPIRY : 0); 4337 } 4338 4339 pmk_op->length = cpu_to_le16(length); 4340 4341 ret = brcmf_fil_iovar_data_set(ifp, "pmkid_info", pmk_op, sizeof(*pmk_op)); 4342 kfree(pmk_op); 4343 return ret; 4344 } 4345 4346 static __used s32 4347 brcmf_update_pmklist(struct brcmf_cfg80211_info *cfg, struct brcmf_if *ifp) 4348 { 4349 struct brcmf_pmk_list_le *pmk_list; 4350 int i; 4351 u32 npmk; 4352 4353 pmk_list = &cfg->pmk_list; 4354 npmk = le32_to_cpu(pmk_list->npmk); 4355 4356 brcmf_dbg(CONN, "No of elements %d\n", npmk); 4357 for (i = 0; i < npmk; i++) 4358 brcmf_dbg(CONN, "PMK[%d]: %pM\n", i, &pmk_list->pmk[i].bssid); 4359 4360 return brcmf_fil_iovar_data_set(ifp, "pmkid_info", pmk_list, 4361 sizeof(*pmk_list)); 4362 } 4363 4364 static s32 4365 brcmf_cfg80211_set_pmksa(struct wiphy *wiphy, struct net_device *ndev, 4366 struct cfg80211_pmksa *pmksa) 4367 { 4368 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 4369 struct brcmf_if *ifp = netdev_priv(ndev); 4370 struct brcmf_pmksa *pmk = &cfg->pmk_list.pmk[0]; 4371 struct brcmf_pub *drvr = cfg->pub; 4372 s32 err; 4373 u32 npmk, i; 4374 4375 brcmf_dbg(TRACE, "Enter\n"); 4376 if (!check_vif_up(ifp->vif)) 4377 return -EIO; 4378 4379 brcmf_dbg(CONN, "set_pmksa - PMK bssid: %pM =\n", pmksa->bssid); 4380 brcmf_dbg(CONN, "%*ph\n", WLAN_PMKID_LEN, pmksa->pmkid); 4381 4382 if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_PMKID_V3)) 4383 return brcmf_pmksa_v3_op(ifp, pmksa, true); 4384 4385 /* TODO: implement PMKID_V2 */ 4386 4387 npmk = le32_to_cpu(cfg->pmk_list.npmk); 4388 for (i = 0; i < npmk; i++) 4389 if (!memcmp(pmksa->bssid, pmk[i].bssid, ETH_ALEN)) 4390 break; 4391 if (i < BRCMF_MAXPMKID) { 4392 memcpy(pmk[i].bssid, pmksa->bssid, ETH_ALEN); 4393 memcpy(pmk[i].pmkid, pmksa->pmkid, WLAN_PMKID_LEN); 4394 if (i == npmk) { 4395 npmk++; 4396 cfg->pmk_list.npmk = cpu_to_le32(npmk); 4397 } 4398 } else { 4399 bphy_err(drvr, "Too many PMKSA entries cached %d\n", npmk); 4400 return -EINVAL; 4401 } 4402 4403 err = brcmf_update_pmklist(cfg, ifp); 4404 4405 brcmf_dbg(TRACE, "Exit\n"); 4406 return err; 4407 } 4408 4409 static s32 4410 brcmf_cfg80211_del_pmksa(struct wiphy *wiphy, struct net_device *ndev, 4411 struct cfg80211_pmksa *pmksa) 4412 { 4413 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 4414 struct brcmf_if *ifp = netdev_priv(ndev); 4415 struct brcmf_pmksa *pmk = &cfg->pmk_list.pmk[0]; 4416 struct brcmf_pub *drvr = cfg->pub; 4417 s32 err; 4418 u32 npmk, i; 4419 4420 brcmf_dbg(TRACE, "Enter\n"); 4421 if (!check_vif_up(ifp->vif)) 4422 return -EIO; 4423 4424 brcmf_dbg(CONN, "del_pmksa - PMK bssid = %pM\n", pmksa->bssid); 4425 4426 if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_PMKID_V3)) 4427 return brcmf_pmksa_v3_op(ifp, pmksa, false); 4428 4429 /* TODO: implement PMKID_V2 */ 4430 4431 npmk = le32_to_cpu(cfg->pmk_list.npmk); 4432 for (i = 0; i < npmk; i++) 4433 if (!memcmp(pmksa->bssid, pmk[i].bssid, ETH_ALEN)) 4434 break; 4435 4436 if ((npmk > 0) && (i < npmk)) { 4437 for (; i < (npmk - 1); i++) { 4438 memcpy(&pmk[i].bssid, &pmk[i + 1].bssid, ETH_ALEN); 4439 memcpy(&pmk[i].pmkid, &pmk[i + 1].pmkid, 4440 WLAN_PMKID_LEN); 4441 } 4442 memset(&pmk[i], 0, sizeof(*pmk)); 4443 cfg->pmk_list.npmk = cpu_to_le32(npmk - 1); 4444 } else { 4445 bphy_err(drvr, "Cache entry not found\n"); 4446 return -EINVAL; 4447 } 4448 4449 err = brcmf_update_pmklist(cfg, ifp); 4450 4451 brcmf_dbg(TRACE, "Exit\n"); 4452 return err; 4453 4454 } 4455 4456 static s32 4457 brcmf_cfg80211_flush_pmksa(struct wiphy *wiphy, struct net_device *ndev) 4458 { 4459 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 4460 struct brcmf_if *ifp = netdev_priv(ndev); 4461 s32 err; 4462 4463 brcmf_dbg(TRACE, "Enter\n"); 4464 if (!check_vif_up(ifp->vif)) 4465 return -EIO; 4466 4467 if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_PMKID_V3)) 4468 return brcmf_pmksa_v3_op(ifp, NULL, false); 4469 4470 /* TODO: implement PMKID_V2 */ 4471 4472 memset(&cfg->pmk_list, 0, sizeof(cfg->pmk_list)); 4473 err = brcmf_update_pmklist(cfg, ifp); 4474 4475 brcmf_dbg(TRACE, "Exit\n"); 4476 return err; 4477 4478 } 4479 4480 static s32 brcmf_configure_opensecurity(struct brcmf_if *ifp) 4481 { 4482 struct brcmf_pub *drvr = ifp->drvr; 4483 s32 err; 4484 s32 wpa_val; 4485 4486 /* set auth */ 4487 err = brcmf_fil_bsscfg_int_set(ifp, "auth", 0); 4488 if (err < 0) { 4489 bphy_err(drvr, "auth error %d\n", err); 4490 return err; 4491 } 4492 /* set wsec */ 4493 err = brcmf_fil_bsscfg_int_set(ifp, "wsec", 0); 4494 if (err < 0) { 4495 bphy_err(drvr, "wsec error %d\n", err); 4496 return err; 4497 } 4498 /* set upper-layer auth */ 4499 if (brcmf_is_ibssmode(ifp->vif)) 4500 wpa_val = WPA_AUTH_NONE; 4501 else 4502 wpa_val = WPA_AUTH_DISABLED; 4503 err = brcmf_fil_bsscfg_int_set(ifp, "wpa_auth", wpa_val); 4504 if (err < 0) { 4505 bphy_err(drvr, "wpa_auth error %d\n", err); 4506 return err; 4507 } 4508 4509 return 0; 4510 } 4511 4512 static bool brcmf_valid_wpa_oui(u8 *oui, bool is_rsn_ie) 4513 { 4514 if (is_rsn_ie) 4515 return (memcmp(oui, RSN_OUI, TLV_OUI_LEN) == 0); 4516 4517 return (memcmp(oui, WPA_OUI, TLV_OUI_LEN) == 0); 4518 } 4519 4520 static s32 4521 brcmf_configure_wpaie(struct brcmf_if *ifp, 4522 const struct brcmf_vs_tlv *wpa_ie, 4523 bool is_rsn_ie) 4524 { 4525 struct brcmf_pub *drvr = ifp->drvr; 4526 u32 auth = 0; /* d11 open authentication */ 4527 u16 count; 4528 s32 err = 0; 4529 s32 len; 4530 u32 i; 4531 u32 wsec; 4532 u32 pval = 0; 4533 u32 gval = 0; 4534 u32 wpa_auth = 0; 4535 u32 offset; 4536 u8 *data; 4537 u16 rsn_cap; 4538 u32 wme_bss_disable; 4539 u32 mfp; 4540 4541 brcmf_dbg(TRACE, "Enter\n"); 4542 if (wpa_ie == NULL) 4543 goto exit; 4544 4545 len = wpa_ie->len + TLV_HDR_LEN; 4546 data = (u8 *)wpa_ie; 4547 offset = TLV_HDR_LEN; 4548 if (!is_rsn_ie) 4549 offset += VS_IE_FIXED_HDR_LEN; 4550 else 4551 offset += WPA_IE_VERSION_LEN; 4552 4553 /* check for multicast cipher suite */ 4554 if (offset + WPA_IE_MIN_OUI_LEN > len) { 4555 err = -EINVAL; 4556 bphy_err(drvr, "no multicast cipher suite\n"); 4557 goto exit; 4558 } 4559 4560 if (!brcmf_valid_wpa_oui(&data[offset], is_rsn_ie)) { 4561 err = -EINVAL; 4562 bphy_err(drvr, "ivalid OUI\n"); 4563 goto exit; 4564 } 4565 offset += TLV_OUI_LEN; 4566 4567 /* pick up multicast cipher */ 4568 switch (data[offset]) { 4569 case WPA_CIPHER_NONE: 4570 gval = 0; 4571 break; 4572 case WPA_CIPHER_WEP_40: 4573 case WPA_CIPHER_WEP_104: 4574 gval = WEP_ENABLED; 4575 break; 4576 case WPA_CIPHER_TKIP: 4577 gval = TKIP_ENABLED; 4578 break; 4579 case WPA_CIPHER_AES_CCM: 4580 gval = AES_ENABLED; 4581 break; 4582 default: 4583 err = -EINVAL; 4584 bphy_err(drvr, "Invalid multi cast cipher info\n"); 4585 goto exit; 4586 } 4587 4588 offset++; 4589 /* walk thru unicast cipher list and pick up what we recognize */ 4590 count = data[offset] + (data[offset + 1] << 8); 4591 offset += WPA_IE_SUITE_COUNT_LEN; 4592 /* Check for unicast suite(s) */ 4593 if (offset + (WPA_IE_MIN_OUI_LEN * count) > len) { 4594 err = -EINVAL; 4595 bphy_err(drvr, "no unicast cipher suite\n"); 4596 goto exit; 4597 } 4598 for (i = 0; i < count; i++) { 4599 if (!brcmf_valid_wpa_oui(&data[offset], is_rsn_ie)) { 4600 err = -EINVAL; 4601 bphy_err(drvr, "ivalid OUI\n"); 4602 goto exit; 4603 } 4604 offset += TLV_OUI_LEN; 4605 switch (data[offset]) { 4606 case WPA_CIPHER_NONE: 4607 break; 4608 case WPA_CIPHER_WEP_40: 4609 case WPA_CIPHER_WEP_104: 4610 pval |= WEP_ENABLED; 4611 break; 4612 case WPA_CIPHER_TKIP: 4613 pval |= TKIP_ENABLED; 4614 break; 4615 case WPA_CIPHER_AES_CCM: 4616 pval |= AES_ENABLED; 4617 break; 4618 default: 4619 bphy_err(drvr, "Invalid unicast security info\n"); 4620 } 4621 offset++; 4622 } 4623 /* walk thru auth management suite list and pick up what we recognize */ 4624 count = data[offset] + (data[offset + 1] << 8); 4625 offset += WPA_IE_SUITE_COUNT_LEN; 4626 /* Check for auth key management suite(s) */ 4627 if (offset + (WPA_IE_MIN_OUI_LEN * count) > len) { 4628 err = -EINVAL; 4629 bphy_err(drvr, "no auth key mgmt suite\n"); 4630 goto exit; 4631 } 4632 for (i = 0; i < count; i++) { 4633 if (!brcmf_valid_wpa_oui(&data[offset], is_rsn_ie)) { 4634 err = -EINVAL; 4635 bphy_err(drvr, "ivalid OUI\n"); 4636 goto exit; 4637 } 4638 offset += TLV_OUI_LEN; 4639 switch (data[offset]) { 4640 case RSN_AKM_NONE: 4641 brcmf_dbg(TRACE, "RSN_AKM_NONE\n"); 4642 wpa_auth |= WPA_AUTH_NONE; 4643 break; 4644 case RSN_AKM_UNSPECIFIED: 4645 brcmf_dbg(TRACE, "RSN_AKM_UNSPECIFIED\n"); 4646 is_rsn_ie ? (wpa_auth |= WPA2_AUTH_UNSPECIFIED) : 4647 (wpa_auth |= WPA_AUTH_UNSPECIFIED); 4648 break; 4649 case RSN_AKM_PSK: 4650 brcmf_dbg(TRACE, "RSN_AKM_PSK\n"); 4651 is_rsn_ie ? (wpa_auth |= WPA2_AUTH_PSK) : 4652 (wpa_auth |= WPA_AUTH_PSK); 4653 break; 4654 case RSN_AKM_SHA256_PSK: 4655 brcmf_dbg(TRACE, "RSN_AKM_MFP_PSK\n"); 4656 wpa_auth |= WPA2_AUTH_PSK_SHA256; 4657 break; 4658 case RSN_AKM_SHA256_1X: 4659 brcmf_dbg(TRACE, "RSN_AKM_MFP_1X\n"); 4660 wpa_auth |= WPA2_AUTH_1X_SHA256; 4661 break; 4662 case RSN_AKM_SAE: 4663 brcmf_dbg(TRACE, "RSN_AKM_SAE\n"); 4664 wpa_auth |= WPA3_AUTH_SAE_PSK; 4665 break; 4666 default: 4667 bphy_err(drvr, "Invalid key mgmt info\n"); 4668 } 4669 offset++; 4670 } 4671 4672 mfp = BRCMF_MFP_NONE; 4673 if (is_rsn_ie) { 4674 wme_bss_disable = 1; 4675 if ((offset + RSN_CAP_LEN) <= len) { 4676 rsn_cap = data[offset] + (data[offset + 1] << 8); 4677 if (rsn_cap & RSN_CAP_PTK_REPLAY_CNTR_MASK) 4678 wme_bss_disable = 0; 4679 if (rsn_cap & RSN_CAP_MFPR_MASK) { 4680 brcmf_dbg(TRACE, "MFP Required\n"); 4681 mfp = BRCMF_MFP_REQUIRED; 4682 /* Firmware only supports mfp required in 4683 * combination with WPA2_AUTH_PSK_SHA256, 4684 * WPA2_AUTH_1X_SHA256, or WPA3_AUTH_SAE_PSK. 4685 */ 4686 if (!(wpa_auth & (WPA2_AUTH_PSK_SHA256 | 4687 WPA2_AUTH_1X_SHA256 | 4688 WPA3_AUTH_SAE_PSK))) { 4689 err = -EINVAL; 4690 goto exit; 4691 } 4692 /* Firmware has requirement that WPA2_AUTH_PSK/ 4693 * WPA2_AUTH_UNSPECIFIED be set, if SHA256 OUI 4694 * is to be included in the rsn ie. 4695 */ 4696 if (wpa_auth & WPA2_AUTH_PSK_SHA256) 4697 wpa_auth |= WPA2_AUTH_PSK; 4698 else if (wpa_auth & WPA2_AUTH_1X_SHA256) 4699 wpa_auth |= WPA2_AUTH_UNSPECIFIED; 4700 } else if (rsn_cap & RSN_CAP_MFPC_MASK) { 4701 brcmf_dbg(TRACE, "MFP Capable\n"); 4702 mfp = BRCMF_MFP_CAPABLE; 4703 } 4704 } 4705 offset += RSN_CAP_LEN; 4706 /* set wme_bss_disable to sync RSN Capabilities */ 4707 err = brcmf_fil_bsscfg_int_set(ifp, "wme_bss_disable", 4708 wme_bss_disable); 4709 if (err < 0) { 4710 bphy_err(drvr, "wme_bss_disable error %d\n", err); 4711 goto exit; 4712 } 4713 4714 /* Skip PMKID cnt as it is know to be 0 for AP. */ 4715 offset += RSN_PMKID_COUNT_LEN; 4716 4717 /* See if there is BIP wpa suite left for MFP */ 4718 if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MFP) && 4719 ((offset + WPA_IE_MIN_OUI_LEN) <= len)) { 4720 err = brcmf_fil_bsscfg_data_set(ifp, "bip", 4721 &data[offset], 4722 WPA_IE_MIN_OUI_LEN); 4723 if (err < 0) { 4724 bphy_err(drvr, "bip error %d\n", err); 4725 goto exit; 4726 } 4727 } 4728 } 4729 /* FOR WPS , set SES_OW_ENABLED */ 4730 wsec = (pval | gval | SES_OW_ENABLED); 4731 4732 /* set auth */ 4733 err = brcmf_fil_bsscfg_int_set(ifp, "auth", auth); 4734 if (err < 0) { 4735 bphy_err(drvr, "auth error %d\n", err); 4736 goto exit; 4737 } 4738 /* set wsec */ 4739 err = brcmf_fil_bsscfg_int_set(ifp, "wsec", wsec); 4740 if (err < 0) { 4741 bphy_err(drvr, "wsec error %d\n", err); 4742 goto exit; 4743 } 4744 /* Configure MFP, this needs to go after wsec otherwise the wsec command 4745 * will overwrite the values set by MFP 4746 */ 4747 if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MFP)) { 4748 err = brcmf_fil_bsscfg_int_set(ifp, "mfp", mfp); 4749 if (err < 0) { 4750 bphy_err(drvr, "mfp error %d\n", err); 4751 goto exit; 4752 } 4753 } 4754 /* set upper-layer auth */ 4755 err = brcmf_fil_bsscfg_int_set(ifp, "wpa_auth", wpa_auth); 4756 if (err < 0) { 4757 bphy_err(drvr, "wpa_auth error %d\n", err); 4758 goto exit; 4759 } 4760 4761 exit: 4762 return err; 4763 } 4764 4765 static s32 4766 brcmf_parse_vndr_ies(const u8 *vndr_ie_buf, u32 vndr_ie_len, 4767 struct parsed_vndr_ies *vndr_ies) 4768 { 4769 struct brcmf_vs_tlv *vndrie; 4770 struct brcmf_tlv *ie; 4771 struct parsed_vndr_ie_info *parsed_info; 4772 s32 remaining_len; 4773 4774 remaining_len = (s32)vndr_ie_len; 4775 memset(vndr_ies, 0, sizeof(*vndr_ies)); 4776 4777 ie = (struct brcmf_tlv *)vndr_ie_buf; 4778 while (ie) { 4779 if (ie->id != WLAN_EID_VENDOR_SPECIFIC) 4780 goto next; 4781 vndrie = (struct brcmf_vs_tlv *)ie; 4782 /* len should be bigger than OUI length + one */ 4783 if (vndrie->len < (VS_IE_FIXED_HDR_LEN - TLV_HDR_LEN + 1)) { 4784 brcmf_err("invalid vndr ie. length is too small %d\n", 4785 vndrie->len); 4786 goto next; 4787 } 4788 /* if wpa or wme ie, do not add ie */ 4789 if (!memcmp(vndrie->oui, (u8 *)WPA_OUI, TLV_OUI_LEN) && 4790 ((vndrie->oui_type == WPA_OUI_TYPE) || 4791 (vndrie->oui_type == WME_OUI_TYPE))) { 4792 brcmf_dbg(TRACE, "Found WPA/WME oui. Do not add it\n"); 4793 goto next; 4794 } 4795 4796 parsed_info = &vndr_ies->ie_info[vndr_ies->count]; 4797 4798 /* save vndr ie information */ 4799 parsed_info->ie_ptr = (char *)vndrie; 4800 parsed_info->ie_len = vndrie->len + TLV_HDR_LEN; 4801 memcpy(&parsed_info->vndrie, vndrie, sizeof(*vndrie)); 4802 4803 vndr_ies->count++; 4804 4805 brcmf_dbg(TRACE, "** OUI %3ph, type 0x%02x\n", 4806 parsed_info->vndrie.oui, 4807 parsed_info->vndrie.oui_type); 4808 4809 if (vndr_ies->count >= VNDR_IE_PARSE_LIMIT) 4810 break; 4811 next: 4812 remaining_len -= (ie->len + TLV_HDR_LEN); 4813 if (remaining_len <= TLV_HDR_LEN) 4814 ie = NULL; 4815 else 4816 ie = (struct brcmf_tlv *)(((u8 *)ie) + ie->len + 4817 TLV_HDR_LEN); 4818 } 4819 return 0; 4820 } 4821 4822 static u32 4823 brcmf_vndr_ie(u8 *iebuf, s32 pktflag, u8 *ie_ptr, u32 ie_len, s8 *add_del_cmd) 4824 { 4825 strscpy(iebuf, add_del_cmd, VNDR_IE_CMD_LEN); 4826 4827 put_unaligned_le32(1, &iebuf[VNDR_IE_COUNT_OFFSET]); 4828 4829 put_unaligned_le32(pktflag, &iebuf[VNDR_IE_PKTFLAG_OFFSET]); 4830 4831 memcpy(&iebuf[VNDR_IE_VSIE_OFFSET], ie_ptr, ie_len); 4832 4833 return ie_len + VNDR_IE_HDR_SIZE; 4834 } 4835 4836 s32 brcmf_vif_set_mgmt_ie(struct brcmf_cfg80211_vif *vif, s32 pktflag, 4837 const u8 *vndr_ie_buf, u32 vndr_ie_len) 4838 { 4839 struct brcmf_pub *drvr; 4840 struct brcmf_if *ifp; 4841 struct vif_saved_ie *saved_ie; 4842 s32 err = 0; 4843 u8 *iovar_ie_buf; 4844 u8 *curr_ie_buf; 4845 u8 *mgmt_ie_buf = NULL; 4846 int mgmt_ie_buf_len; 4847 u32 *mgmt_ie_len; 4848 u32 del_add_ie_buf_len = 0; 4849 u32 total_ie_buf_len = 0; 4850 u32 parsed_ie_buf_len = 0; 4851 struct parsed_vndr_ies old_vndr_ies; 4852 struct parsed_vndr_ies new_vndr_ies; 4853 struct parsed_vndr_ie_info *vndrie_info; 4854 s32 i; 4855 u8 *ptr; 4856 int remained_buf_len; 4857 4858 if (!vif) 4859 return -ENODEV; 4860 ifp = vif->ifp; 4861 drvr = ifp->drvr; 4862 saved_ie = &vif->saved_ie; 4863 4864 brcmf_dbg(TRACE, "bsscfgidx %d, pktflag : 0x%02X\n", ifp->bsscfgidx, 4865 pktflag); 4866 iovar_ie_buf = kzalloc(WL_EXTRA_BUF_MAX, GFP_KERNEL); 4867 if (!iovar_ie_buf) 4868 return -ENOMEM; 4869 curr_ie_buf = iovar_ie_buf; 4870 switch (pktflag) { 4871 case BRCMF_VNDR_IE_PRBREQ_FLAG: 4872 mgmt_ie_buf = saved_ie->probe_req_ie; 4873 mgmt_ie_len = &saved_ie->probe_req_ie_len; 4874 mgmt_ie_buf_len = sizeof(saved_ie->probe_req_ie); 4875 break; 4876 case BRCMF_VNDR_IE_PRBRSP_FLAG: 4877 mgmt_ie_buf = saved_ie->probe_res_ie; 4878 mgmt_ie_len = &saved_ie->probe_res_ie_len; 4879 mgmt_ie_buf_len = sizeof(saved_ie->probe_res_ie); 4880 break; 4881 case BRCMF_VNDR_IE_BEACON_FLAG: 4882 mgmt_ie_buf = saved_ie->beacon_ie; 4883 mgmt_ie_len = &saved_ie->beacon_ie_len; 4884 mgmt_ie_buf_len = sizeof(saved_ie->beacon_ie); 4885 break; 4886 case BRCMF_VNDR_IE_ASSOCREQ_FLAG: 4887 mgmt_ie_buf = saved_ie->assoc_req_ie; 4888 mgmt_ie_len = &saved_ie->assoc_req_ie_len; 4889 mgmt_ie_buf_len = sizeof(saved_ie->assoc_req_ie); 4890 break; 4891 case BRCMF_VNDR_IE_ASSOCRSP_FLAG: 4892 mgmt_ie_buf = saved_ie->assoc_res_ie; 4893 mgmt_ie_len = &saved_ie->assoc_res_ie_len; 4894 mgmt_ie_buf_len = sizeof(saved_ie->assoc_res_ie); 4895 break; 4896 default: 4897 err = -EPERM; 4898 bphy_err(drvr, "not suitable type\n"); 4899 goto exit; 4900 } 4901 4902 if (vndr_ie_len > mgmt_ie_buf_len) { 4903 err = -ENOMEM; 4904 bphy_err(drvr, "extra IE size too big\n"); 4905 goto exit; 4906 } 4907 4908 /* parse and save new vndr_ie in curr_ie_buff before comparing it */ 4909 if (vndr_ie_buf && vndr_ie_len && curr_ie_buf) { 4910 ptr = curr_ie_buf; 4911 brcmf_parse_vndr_ies(vndr_ie_buf, vndr_ie_len, &new_vndr_ies); 4912 for (i = 0; i < new_vndr_ies.count; i++) { 4913 vndrie_info = &new_vndr_ies.ie_info[i]; 4914 memcpy(ptr + parsed_ie_buf_len, vndrie_info->ie_ptr, 4915 vndrie_info->ie_len); 4916 parsed_ie_buf_len += vndrie_info->ie_len; 4917 } 4918 } 4919 4920 if (mgmt_ie_buf && *mgmt_ie_len) { 4921 if (parsed_ie_buf_len && (parsed_ie_buf_len == *mgmt_ie_len) && 4922 (memcmp(mgmt_ie_buf, curr_ie_buf, 4923 parsed_ie_buf_len) == 0)) { 4924 brcmf_dbg(TRACE, "Previous mgmt IE equals to current IE\n"); 4925 goto exit; 4926 } 4927 4928 /* parse old vndr_ie */ 4929 brcmf_parse_vndr_ies(mgmt_ie_buf, *mgmt_ie_len, &old_vndr_ies); 4930 4931 /* make a command to delete old ie */ 4932 for (i = 0; i < old_vndr_ies.count; i++) { 4933 vndrie_info = &old_vndr_ies.ie_info[i]; 4934 4935 brcmf_dbg(TRACE, "DEL ID : %d, Len: %d , OUI:%3ph\n", 4936 vndrie_info->vndrie.id, 4937 vndrie_info->vndrie.len, 4938 vndrie_info->vndrie.oui); 4939 4940 del_add_ie_buf_len = brcmf_vndr_ie(curr_ie_buf, pktflag, 4941 vndrie_info->ie_ptr, 4942 vndrie_info->ie_len, 4943 "del"); 4944 curr_ie_buf += del_add_ie_buf_len; 4945 total_ie_buf_len += del_add_ie_buf_len; 4946 } 4947 } 4948 4949 *mgmt_ie_len = 0; 4950 /* Add if there is any extra IE */ 4951 if (mgmt_ie_buf && parsed_ie_buf_len) { 4952 ptr = mgmt_ie_buf; 4953 4954 remained_buf_len = mgmt_ie_buf_len; 4955 4956 /* make a command to add new ie */ 4957 for (i = 0; i < new_vndr_ies.count; i++) { 4958 vndrie_info = &new_vndr_ies.ie_info[i]; 4959 4960 /* verify remained buf size before copy data */ 4961 if (remained_buf_len < (vndrie_info->vndrie.len + 4962 VNDR_IE_VSIE_OFFSET)) { 4963 bphy_err(drvr, "no space in mgmt_ie_buf: len left %d", 4964 remained_buf_len); 4965 break; 4966 } 4967 remained_buf_len -= (vndrie_info->ie_len + 4968 VNDR_IE_VSIE_OFFSET); 4969 4970 brcmf_dbg(TRACE, "ADDED ID : %d, Len: %d, OUI:%3ph\n", 4971 vndrie_info->vndrie.id, 4972 vndrie_info->vndrie.len, 4973 vndrie_info->vndrie.oui); 4974 4975 del_add_ie_buf_len = brcmf_vndr_ie(curr_ie_buf, pktflag, 4976 vndrie_info->ie_ptr, 4977 vndrie_info->ie_len, 4978 "add"); 4979 4980 /* save the parsed IE in wl struct */ 4981 memcpy(ptr + (*mgmt_ie_len), vndrie_info->ie_ptr, 4982 vndrie_info->ie_len); 4983 *mgmt_ie_len += vndrie_info->ie_len; 4984 4985 curr_ie_buf += del_add_ie_buf_len; 4986 total_ie_buf_len += del_add_ie_buf_len; 4987 } 4988 } 4989 if (total_ie_buf_len) { 4990 err = brcmf_fil_bsscfg_data_set(ifp, "vndr_ie", iovar_ie_buf, 4991 total_ie_buf_len); 4992 if (err) 4993 bphy_err(drvr, "vndr ie set error : %d\n", err); 4994 } 4995 4996 exit: 4997 kfree(iovar_ie_buf); 4998 return err; 4999 } 5000 5001 s32 brcmf_vif_clear_mgmt_ies(struct brcmf_cfg80211_vif *vif) 5002 { 5003 static const s32 pktflags[] = { 5004 BRCMF_VNDR_IE_PRBREQ_FLAG, 5005 BRCMF_VNDR_IE_PRBRSP_FLAG, 5006 BRCMF_VNDR_IE_BEACON_FLAG 5007 }; 5008 int i; 5009 5010 for (i = 0; i < ARRAY_SIZE(pktflags); i++) 5011 brcmf_vif_set_mgmt_ie(vif, pktflags[i], NULL, 0); 5012 5013 memset(&vif->saved_ie, 0, sizeof(vif->saved_ie)); 5014 return 0; 5015 } 5016 5017 static s32 5018 brcmf_config_ap_mgmt_ie(struct brcmf_cfg80211_vif *vif, 5019 struct cfg80211_beacon_data *beacon) 5020 { 5021 struct brcmf_pub *drvr = vif->ifp->drvr; 5022 s32 err; 5023 5024 /* Set Beacon IEs to FW */ 5025 err = brcmf_vif_set_mgmt_ie(vif, BRCMF_VNDR_IE_BEACON_FLAG, 5026 beacon->tail, beacon->tail_len); 5027 if (err) { 5028 bphy_err(drvr, "Set Beacon IE Failed\n"); 5029 return err; 5030 } 5031 brcmf_dbg(TRACE, "Applied Vndr IEs for Beacon\n"); 5032 5033 /* Set Probe Response IEs to FW */ 5034 err = brcmf_vif_set_mgmt_ie(vif, BRCMF_VNDR_IE_PRBRSP_FLAG, 5035 beacon->proberesp_ies, 5036 beacon->proberesp_ies_len); 5037 if (err) 5038 bphy_err(drvr, "Set Probe Resp IE Failed\n"); 5039 else 5040 brcmf_dbg(TRACE, "Applied Vndr IEs for Probe Resp\n"); 5041 5042 /* Set Assoc Response IEs to FW */ 5043 err = brcmf_vif_set_mgmt_ie(vif, BRCMF_VNDR_IE_ASSOCRSP_FLAG, 5044 beacon->assocresp_ies, 5045 beacon->assocresp_ies_len); 5046 if (err) 5047 brcmf_err("Set Assoc Resp IE Failed\n"); 5048 else 5049 brcmf_dbg(TRACE, "Applied Vndr IEs for Assoc Resp\n"); 5050 5051 return err; 5052 } 5053 5054 static s32 5055 brcmf_parse_configure_security(struct brcmf_if *ifp, 5056 struct cfg80211_ap_settings *settings, 5057 enum nl80211_iftype dev_role) 5058 { 5059 const struct brcmf_tlv *rsn_ie; 5060 const struct brcmf_vs_tlv *wpa_ie; 5061 s32 err = 0; 5062 5063 /* find the RSN_IE */ 5064 rsn_ie = brcmf_parse_tlvs((u8 *)settings->beacon.tail, 5065 settings->beacon.tail_len, WLAN_EID_RSN); 5066 5067 /* find the WPA_IE */ 5068 wpa_ie = brcmf_find_wpaie((u8 *)settings->beacon.tail, 5069 settings->beacon.tail_len); 5070 5071 if (wpa_ie || rsn_ie) { 5072 brcmf_dbg(TRACE, "WPA(2) IE is found\n"); 5073 if (wpa_ie) { 5074 /* WPA IE */ 5075 err = brcmf_configure_wpaie(ifp, wpa_ie, false); 5076 if (err < 0) 5077 return err; 5078 } else { 5079 struct brcmf_vs_tlv *tmp_ie; 5080 5081 tmp_ie = (struct brcmf_vs_tlv *)rsn_ie; 5082 5083 /* RSN IE */ 5084 err = brcmf_configure_wpaie(ifp, tmp_ie, true); 5085 if (err < 0) 5086 return err; 5087 } 5088 } else { 5089 brcmf_dbg(TRACE, "No WPA(2) IEs found\n"); 5090 brcmf_configure_opensecurity(ifp); 5091 } 5092 5093 return err; 5094 } 5095 5096 static s32 5097 brcmf_cfg80211_start_ap(struct wiphy *wiphy, struct net_device *ndev, 5098 struct cfg80211_ap_settings *settings) 5099 { 5100 s32 ie_offset; 5101 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 5102 struct brcmf_if *ifp = netdev_priv(ndev); 5103 struct brcmf_pub *drvr = cfg->pub; 5104 struct brcmf_cfg80211_profile *profile = &ifp->vif->profile; 5105 struct cfg80211_crypto_settings *crypto = &settings->crypto; 5106 const struct brcmf_tlv *ssid_ie; 5107 const struct brcmf_tlv *country_ie; 5108 struct brcmf_ssid_le ssid_le; 5109 s32 err = -EPERM; 5110 struct brcmf_join_params join_params; 5111 enum nl80211_iftype dev_role; 5112 struct brcmf_fil_bss_enable_le bss_enable; 5113 u16 chanspec = chandef_to_chanspec(&cfg->d11inf, &settings->chandef); 5114 bool mbss; 5115 int is_11d; 5116 bool supports_11d; 5117 5118 brcmf_dbg(TRACE, "ctrlchn=%d, center=%d, bw=%d, beacon_interval=%d, dtim_period=%d,\n", 5119 settings->chandef.chan->hw_value, 5120 settings->chandef.center_freq1, settings->chandef.width, 5121 settings->beacon_interval, settings->dtim_period); 5122 brcmf_dbg(TRACE, "ssid=%s(%zu), auth_type=%d, inactivity_timeout=%d\n", 5123 settings->ssid, settings->ssid_len, settings->auth_type, 5124 settings->inactivity_timeout); 5125 dev_role = ifp->vif->wdev.iftype; 5126 mbss = ifp->vif->mbss; 5127 5128 /* store current 11d setting */ 5129 if (brcmf_fil_cmd_int_get(ifp, BRCMF_C_GET_REGULATORY, 5130 &ifp->vif->is_11d)) { 5131 is_11d = supports_11d = false; 5132 } else { 5133 country_ie = brcmf_parse_tlvs((u8 *)settings->beacon.tail, 5134 settings->beacon.tail_len, 5135 WLAN_EID_COUNTRY); 5136 is_11d = country_ie ? 1 : 0; 5137 supports_11d = true; 5138 } 5139 5140 memset(&ssid_le, 0, sizeof(ssid_le)); 5141 if (settings->ssid == NULL || settings->ssid_len == 0) { 5142 ie_offset = DOT11_MGMT_HDR_LEN + DOT11_BCN_PRB_FIXED_LEN; 5143 ssid_ie = brcmf_parse_tlvs( 5144 (u8 *)&settings->beacon.head[ie_offset], 5145 settings->beacon.head_len - ie_offset, 5146 WLAN_EID_SSID); 5147 if (!ssid_ie || ssid_ie->len > IEEE80211_MAX_SSID_LEN) 5148 return -EINVAL; 5149 5150 memcpy(ssid_le.SSID, ssid_ie->data, ssid_ie->len); 5151 ssid_le.SSID_len = cpu_to_le32(ssid_ie->len); 5152 brcmf_dbg(TRACE, "SSID is (%s) in Head\n", ssid_le.SSID); 5153 } else { 5154 memcpy(ssid_le.SSID, settings->ssid, settings->ssid_len); 5155 ssid_le.SSID_len = cpu_to_le32((u32)settings->ssid_len); 5156 } 5157 5158 if (!mbss) { 5159 brcmf_set_mpc(ifp, 0); 5160 brcmf_configure_arp_nd_offload(ifp, false); 5161 } 5162 5163 /* Parameters shared by all radio interfaces */ 5164 if (!mbss) { 5165 if ((supports_11d) && (is_11d != ifp->vif->is_11d)) { 5166 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_REGULATORY, 5167 is_11d); 5168 if (err < 0) { 5169 bphy_err(drvr, "Regulatory Set Error, %d\n", 5170 err); 5171 goto exit; 5172 } 5173 } 5174 if (settings->beacon_interval) { 5175 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_BCNPRD, 5176 settings->beacon_interval); 5177 if (err < 0) { 5178 bphy_err(drvr, "Beacon Interval Set Error, %d\n", 5179 err); 5180 goto exit; 5181 } 5182 } 5183 if (settings->dtim_period) { 5184 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_DTIMPRD, 5185 settings->dtim_period); 5186 if (err < 0) { 5187 bphy_err(drvr, "DTIM Interval Set Error, %d\n", 5188 err); 5189 goto exit; 5190 } 5191 } 5192 5193 if ((dev_role == NL80211_IFTYPE_AP) && 5194 ((ifp->ifidx == 0) || 5195 (!brcmf_feat_is_enabled(ifp, BRCMF_FEAT_RSDB) && 5196 !brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MCHAN)))) { 5197 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_DOWN, 1); 5198 if (err < 0) { 5199 bphy_err(drvr, "BRCMF_C_DOWN error %d\n", 5200 err); 5201 goto exit; 5202 } 5203 brcmf_fil_iovar_int_set(ifp, "apsta", 0); 5204 } 5205 5206 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_INFRA, 1); 5207 if (err < 0) { 5208 bphy_err(drvr, "SET INFRA error %d\n", err); 5209 goto exit; 5210 } 5211 } else if (WARN_ON(supports_11d && (is_11d != ifp->vif->is_11d))) { 5212 /* Multiple-BSS should use same 11d configuration */ 5213 err = -EINVAL; 5214 goto exit; 5215 } 5216 5217 /* Interface specific setup */ 5218 if (dev_role == NL80211_IFTYPE_AP) { 5219 if ((brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MBSS)) && (!mbss)) 5220 brcmf_fil_iovar_int_set(ifp, "mbss", 1); 5221 5222 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_AP, 1); 5223 if (err < 0) { 5224 bphy_err(drvr, "setting AP mode failed %d\n", 5225 err); 5226 goto exit; 5227 } 5228 if (!mbss) { 5229 /* Firmware 10.x requires setting channel after enabling 5230 * AP and before bringing interface up. 5231 */ 5232 err = brcmf_fil_iovar_int_set(ifp, "chanspec", chanspec); 5233 if (err < 0) { 5234 bphy_err(drvr, "Set Channel failed: chspec=%d, %d\n", 5235 chanspec, err); 5236 goto exit; 5237 } 5238 } 5239 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_UP, 1); 5240 if (err < 0) { 5241 bphy_err(drvr, "BRCMF_C_UP error (%d)\n", err); 5242 goto exit; 5243 } 5244 5245 if (crypto->psk) { 5246 brcmf_dbg(INFO, "using PSK offload\n"); 5247 profile->use_fwauth |= BIT(BRCMF_PROFILE_FWAUTH_PSK); 5248 err = brcmf_set_pmk(ifp, crypto->psk, 5249 BRCMF_WSEC_MAX_PSK_LEN); 5250 if (err < 0) 5251 goto exit; 5252 } 5253 if (crypto->sae_pwd) { 5254 brcmf_dbg(INFO, "using SAE offload\n"); 5255 profile->use_fwauth |= BIT(BRCMF_PROFILE_FWAUTH_SAE); 5256 err = brcmf_set_sae_password(ifp, crypto->sae_pwd, 5257 crypto->sae_pwd_len); 5258 if (err < 0) 5259 goto exit; 5260 } 5261 if (profile->use_fwauth == 0) 5262 profile->use_fwauth = BIT(BRCMF_PROFILE_FWAUTH_NONE); 5263 5264 err = brcmf_parse_configure_security(ifp, settings, 5265 NL80211_IFTYPE_AP); 5266 if (err < 0) { 5267 bphy_err(drvr, "brcmf_parse_configure_security error\n"); 5268 goto exit; 5269 } 5270 5271 /* On DOWN the firmware removes the WEP keys, reconfigure 5272 * them if they were set. 5273 */ 5274 brcmf_cfg80211_reconfigure_wep(ifp); 5275 5276 memset(&join_params, 0, sizeof(join_params)); 5277 /* join parameters starts with ssid */ 5278 memcpy(&join_params.ssid_le, &ssid_le, sizeof(ssid_le)); 5279 /* create softap */ 5280 err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_SSID, 5281 &join_params, sizeof(join_params)); 5282 if (err < 0) { 5283 bphy_err(drvr, "SET SSID error (%d)\n", err); 5284 goto exit; 5285 } 5286 5287 err = brcmf_fil_iovar_int_set(ifp, "closednet", 5288 settings->hidden_ssid); 5289 if (err) { 5290 bphy_err(drvr, "%s closednet error (%d)\n", 5291 settings->hidden_ssid ? 5292 "enabled" : "disabled", 5293 err); 5294 goto exit; 5295 } 5296 5297 brcmf_dbg(TRACE, "AP mode configuration complete\n"); 5298 } else if (dev_role == NL80211_IFTYPE_P2P_GO) { 5299 err = brcmf_fil_iovar_int_set(ifp, "chanspec", chanspec); 5300 if (err < 0) { 5301 bphy_err(drvr, "Set Channel failed: chspec=%d, %d\n", 5302 chanspec, err); 5303 goto exit; 5304 } 5305 5306 err = brcmf_parse_configure_security(ifp, settings, 5307 NL80211_IFTYPE_P2P_GO); 5308 if (err < 0) { 5309 brcmf_err("brcmf_parse_configure_security error\n"); 5310 goto exit; 5311 } 5312 5313 err = brcmf_fil_bsscfg_data_set(ifp, "ssid", &ssid_le, 5314 sizeof(ssid_le)); 5315 if (err < 0) { 5316 bphy_err(drvr, "setting ssid failed %d\n", err); 5317 goto exit; 5318 } 5319 bss_enable.bsscfgidx = cpu_to_le32(ifp->bsscfgidx); 5320 bss_enable.enable = cpu_to_le32(1); 5321 err = brcmf_fil_iovar_data_set(ifp, "bss", &bss_enable, 5322 sizeof(bss_enable)); 5323 if (err < 0) { 5324 bphy_err(drvr, "bss_enable config failed %d\n", err); 5325 goto exit; 5326 } 5327 5328 brcmf_dbg(TRACE, "GO mode configuration complete\n"); 5329 } else { 5330 WARN_ON(1); 5331 } 5332 5333 brcmf_config_ap_mgmt_ie(ifp->vif, &settings->beacon); 5334 set_bit(BRCMF_VIF_STATUS_AP_CREATED, &ifp->vif->sme_state); 5335 brcmf_net_setcarrier(ifp, true); 5336 5337 exit: 5338 if ((err) && (!mbss)) { 5339 brcmf_set_mpc(ifp, 1); 5340 brcmf_configure_arp_nd_offload(ifp, true); 5341 } 5342 return err; 5343 } 5344 5345 static int brcmf_cfg80211_stop_ap(struct wiphy *wiphy, struct net_device *ndev, 5346 unsigned int link_id) 5347 { 5348 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 5349 struct brcmf_if *ifp = netdev_priv(ndev); 5350 struct brcmf_pub *drvr = cfg->pub; 5351 struct brcmf_cfg80211_profile *profile = &ifp->vif->profile; 5352 s32 err; 5353 struct brcmf_fil_bss_enable_le bss_enable; 5354 struct brcmf_join_params join_params; 5355 5356 brcmf_dbg(TRACE, "Enter\n"); 5357 5358 if (ifp->vif->wdev.iftype == NL80211_IFTYPE_AP) { 5359 /* Due to most likely deauths outstanding we sleep */ 5360 /* first to make sure they get processed by fw. */ 5361 msleep(400); 5362 5363 if (profile->use_fwauth != BIT(BRCMF_PROFILE_FWAUTH_NONE)) { 5364 if (profile->use_fwauth & BIT(BRCMF_PROFILE_FWAUTH_PSK)) 5365 brcmf_set_pmk(ifp, NULL, 0); 5366 if (profile->use_fwauth & BIT(BRCMF_PROFILE_FWAUTH_SAE)) 5367 brcmf_set_sae_password(ifp, NULL, 0); 5368 profile->use_fwauth = BIT(BRCMF_PROFILE_FWAUTH_NONE); 5369 } 5370 5371 if (ifp->vif->mbss) { 5372 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_DOWN, 1); 5373 return err; 5374 } 5375 5376 /* First BSS doesn't get a full reset */ 5377 if (ifp->bsscfgidx == 0) 5378 brcmf_fil_iovar_int_set(ifp, "closednet", 0); 5379 5380 memset(&join_params, 0, sizeof(join_params)); 5381 err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_SSID, 5382 &join_params, sizeof(join_params)); 5383 if (err < 0) 5384 bphy_err(drvr, "SET SSID error (%d)\n", err); 5385 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_DOWN, 1); 5386 if (err < 0) 5387 bphy_err(drvr, "BRCMF_C_DOWN error %d\n", err); 5388 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_AP, 0); 5389 if (err < 0) 5390 bphy_err(drvr, "setting AP mode failed %d\n", err); 5391 if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MBSS)) 5392 brcmf_fil_iovar_int_set(ifp, "mbss", 0); 5393 brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_REGULATORY, 5394 ifp->vif->is_11d); 5395 /* Bring device back up so it can be used again */ 5396 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_UP, 1); 5397 if (err < 0) 5398 bphy_err(drvr, "BRCMF_C_UP error %d\n", err); 5399 5400 brcmf_vif_clear_mgmt_ies(ifp->vif); 5401 } else { 5402 bss_enable.bsscfgidx = cpu_to_le32(ifp->bsscfgidx); 5403 bss_enable.enable = cpu_to_le32(0); 5404 err = brcmf_fil_iovar_data_set(ifp, "bss", &bss_enable, 5405 sizeof(bss_enable)); 5406 if (err < 0) 5407 bphy_err(drvr, "bss_enable config failed %d\n", err); 5408 } 5409 brcmf_set_mpc(ifp, 1); 5410 brcmf_configure_arp_nd_offload(ifp, true); 5411 clear_bit(BRCMF_VIF_STATUS_AP_CREATED, &ifp->vif->sme_state); 5412 brcmf_net_setcarrier(ifp, false); 5413 5414 return err; 5415 } 5416 5417 static s32 5418 brcmf_cfg80211_change_beacon(struct wiphy *wiphy, struct net_device *ndev, 5419 struct cfg80211_beacon_data *info) 5420 { 5421 struct brcmf_if *ifp = netdev_priv(ndev); 5422 5423 brcmf_dbg(TRACE, "Enter\n"); 5424 5425 return brcmf_config_ap_mgmt_ie(ifp->vif, info); 5426 } 5427 5428 static int 5429 brcmf_cfg80211_del_station(struct wiphy *wiphy, struct net_device *ndev, 5430 struct station_del_parameters *params) 5431 { 5432 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 5433 struct brcmf_pub *drvr = cfg->pub; 5434 struct brcmf_scb_val_le scbval; 5435 struct brcmf_if *ifp = netdev_priv(ndev); 5436 s32 err; 5437 5438 if (!params->mac) 5439 return -EFAULT; 5440 5441 brcmf_dbg(TRACE, "Enter %pM\n", params->mac); 5442 5443 if (ifp->vif == cfg->p2p.bss_idx[P2PAPI_BSSCFG_DEVICE].vif) 5444 ifp = cfg->p2p.bss_idx[P2PAPI_BSSCFG_PRIMARY].vif->ifp; 5445 if (!check_vif_up(ifp->vif)) 5446 return -EIO; 5447 5448 memcpy(&scbval.ea, params->mac, ETH_ALEN); 5449 scbval.val = cpu_to_le32(params->reason_code); 5450 err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SCB_DEAUTHENTICATE_FOR_REASON, 5451 &scbval, sizeof(scbval)); 5452 if (err) 5453 bphy_err(drvr, "SCB_DEAUTHENTICATE_FOR_REASON failed %d\n", 5454 err); 5455 5456 brcmf_dbg(TRACE, "Exit\n"); 5457 return err; 5458 } 5459 5460 static int 5461 brcmf_cfg80211_change_station(struct wiphy *wiphy, struct net_device *ndev, 5462 const u8 *mac, struct station_parameters *params) 5463 { 5464 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 5465 struct brcmf_pub *drvr = cfg->pub; 5466 struct brcmf_if *ifp = netdev_priv(ndev); 5467 s32 err; 5468 5469 brcmf_dbg(TRACE, "Enter, MAC %pM, mask 0x%04x set 0x%04x\n", mac, 5470 params->sta_flags_mask, params->sta_flags_set); 5471 5472 /* Ignore all 00 MAC */ 5473 if (is_zero_ether_addr(mac)) 5474 return 0; 5475 5476 if (!(params->sta_flags_mask & BIT(NL80211_STA_FLAG_AUTHORIZED))) 5477 return 0; 5478 5479 if (params->sta_flags_set & BIT(NL80211_STA_FLAG_AUTHORIZED)) 5480 err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_SCB_AUTHORIZE, 5481 (void *)mac, ETH_ALEN); 5482 else 5483 err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_SCB_DEAUTHORIZE, 5484 (void *)mac, ETH_ALEN); 5485 if (err < 0) 5486 bphy_err(drvr, "Setting SCB (de-)authorize failed, %d\n", err); 5487 5488 return err; 5489 } 5490 5491 static void 5492 brcmf_cfg80211_update_mgmt_frame_registrations(struct wiphy *wiphy, 5493 struct wireless_dev *wdev, 5494 struct mgmt_frame_regs *upd) 5495 { 5496 struct brcmf_cfg80211_vif *vif; 5497 5498 vif = container_of(wdev, struct brcmf_cfg80211_vif, wdev); 5499 5500 vif->mgmt_rx_reg = upd->interface_stypes; 5501 } 5502 5503 5504 static int 5505 brcmf_cfg80211_mgmt_tx(struct wiphy *wiphy, struct wireless_dev *wdev, 5506 struct cfg80211_mgmt_tx_params *params, u64 *cookie) 5507 { 5508 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 5509 struct ieee80211_channel *chan = params->chan; 5510 struct brcmf_pub *drvr = cfg->pub; 5511 const u8 *buf = params->buf; 5512 size_t len = params->len; 5513 const struct ieee80211_mgmt *mgmt; 5514 struct brcmf_cfg80211_vif *vif; 5515 s32 err = 0; 5516 s32 ie_offset; 5517 s32 ie_len; 5518 struct brcmf_fil_action_frame_le *action_frame; 5519 struct brcmf_fil_af_params_le *af_params; 5520 bool ack; 5521 s32 chan_nr; 5522 u32 freq; 5523 5524 brcmf_dbg(TRACE, "Enter\n"); 5525 5526 *cookie = 0; 5527 5528 mgmt = (const struct ieee80211_mgmt *)buf; 5529 5530 if (!ieee80211_is_mgmt(mgmt->frame_control)) { 5531 bphy_err(drvr, "Driver only allows MGMT packet type\n"); 5532 return -EPERM; 5533 } 5534 5535 vif = container_of(wdev, struct brcmf_cfg80211_vif, wdev); 5536 5537 if (ieee80211_is_probe_resp(mgmt->frame_control)) { 5538 /* Right now the only reason to get a probe response */ 5539 /* is for p2p listen response or for p2p GO from */ 5540 /* wpa_supplicant. Unfortunately the probe is send */ 5541 /* on primary ndev, while dongle wants it on the p2p */ 5542 /* vif. Since this is only reason for a probe */ 5543 /* response to be sent, the vif is taken from cfg. */ 5544 /* If ever desired to send proberesp for non p2p */ 5545 /* response then data should be checked for */ 5546 /* "DIRECT-". Note in future supplicant will take */ 5547 /* dedicated p2p wdev to do this and then this 'hack'*/ 5548 /* is not needed anymore. */ 5549 ie_offset = DOT11_MGMT_HDR_LEN + 5550 DOT11_BCN_PRB_FIXED_LEN; 5551 ie_len = len - ie_offset; 5552 if (vif == cfg->p2p.bss_idx[P2PAPI_BSSCFG_PRIMARY].vif) 5553 vif = cfg->p2p.bss_idx[P2PAPI_BSSCFG_DEVICE].vif; 5554 err = brcmf_vif_set_mgmt_ie(vif, 5555 BRCMF_VNDR_IE_PRBRSP_FLAG, 5556 &buf[ie_offset], 5557 ie_len); 5558 cfg80211_mgmt_tx_status(wdev, *cookie, buf, len, true, 5559 GFP_KERNEL); 5560 } else if (ieee80211_is_action(mgmt->frame_control)) { 5561 if (len > BRCMF_FIL_ACTION_FRAME_SIZE + DOT11_MGMT_HDR_LEN) { 5562 bphy_err(drvr, "invalid action frame length\n"); 5563 err = -EINVAL; 5564 goto exit; 5565 } 5566 af_params = kzalloc(sizeof(*af_params), GFP_KERNEL); 5567 if (af_params == NULL) { 5568 bphy_err(drvr, "unable to allocate frame\n"); 5569 err = -ENOMEM; 5570 goto exit; 5571 } 5572 action_frame = &af_params->action_frame; 5573 /* Add the packet Id */ 5574 action_frame->packet_id = cpu_to_le32(*cookie); 5575 /* Add BSSID */ 5576 memcpy(&action_frame->da[0], &mgmt->da[0], ETH_ALEN); 5577 memcpy(&af_params->bssid[0], &mgmt->bssid[0], ETH_ALEN); 5578 /* Add the length exepted for 802.11 header */ 5579 action_frame->len = cpu_to_le16(len - DOT11_MGMT_HDR_LEN); 5580 /* Add the channel. Use the one specified as parameter if any or 5581 * the current one (got from the firmware) otherwise 5582 */ 5583 if (chan) 5584 freq = chan->center_freq; 5585 else 5586 brcmf_fil_cmd_int_get(vif->ifp, BRCMF_C_GET_CHANNEL, 5587 &freq); 5588 chan_nr = ieee80211_frequency_to_channel(freq); 5589 af_params->channel = cpu_to_le32(chan_nr); 5590 af_params->dwell_time = cpu_to_le32(params->wait); 5591 memcpy(action_frame->data, &buf[DOT11_MGMT_HDR_LEN], 5592 le16_to_cpu(action_frame->len)); 5593 5594 brcmf_dbg(TRACE, "Action frame, cookie=%lld, len=%d, freq=%d\n", 5595 *cookie, le16_to_cpu(action_frame->len), freq); 5596 5597 ack = brcmf_p2p_send_action_frame(cfg, cfg_to_ndev(cfg), 5598 af_params); 5599 5600 cfg80211_mgmt_tx_status(wdev, *cookie, buf, len, ack, 5601 GFP_KERNEL); 5602 kfree(af_params); 5603 } else { 5604 brcmf_dbg(TRACE, "Unhandled, fc=%04x!!\n", mgmt->frame_control); 5605 brcmf_dbg_hex_dump(true, buf, len, "payload, len=%zu\n", len); 5606 } 5607 5608 exit: 5609 return err; 5610 } 5611 5612 static int brcmf_cfg80211_set_cqm_rssi_range_config(struct wiphy *wiphy, 5613 struct net_device *ndev, 5614 s32 rssi_low, s32 rssi_high) 5615 { 5616 struct brcmf_cfg80211_vif *vif; 5617 struct brcmf_if *ifp; 5618 int err = 0; 5619 5620 brcmf_dbg(TRACE, "low=%d high=%d", rssi_low, rssi_high); 5621 5622 ifp = netdev_priv(ndev); 5623 vif = ifp->vif; 5624 5625 if (rssi_low != vif->cqm_rssi_low || rssi_high != vif->cqm_rssi_high) { 5626 /* The firmware will send an event when the RSSI is less than or 5627 * equal to a configured level and the previous RSSI event was 5628 * less than or equal to a different level. Set a third level 5629 * so that we also detect the transition from rssi <= rssi_high 5630 * to rssi > rssi_high. 5631 */ 5632 struct brcmf_rssi_event_le config = { 5633 .rate_limit_msec = cpu_to_le32(0), 5634 .rssi_level_num = 3, 5635 .rssi_levels = { 5636 clamp_val(rssi_low, S8_MIN, S8_MAX - 2), 5637 clamp_val(rssi_high, S8_MIN + 1, S8_MAX - 1), 5638 S8_MAX, 5639 }, 5640 }; 5641 5642 err = brcmf_fil_iovar_data_set(ifp, "rssi_event", &config, 5643 sizeof(config)); 5644 if (err) { 5645 err = -EINVAL; 5646 } else { 5647 vif->cqm_rssi_low = rssi_low; 5648 vif->cqm_rssi_high = rssi_high; 5649 } 5650 } 5651 5652 return err; 5653 } 5654 5655 static int 5656 brcmf_cfg80211_cancel_remain_on_channel(struct wiphy *wiphy, 5657 struct wireless_dev *wdev, 5658 u64 cookie) 5659 { 5660 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 5661 struct brcmf_pub *drvr = cfg->pub; 5662 struct brcmf_cfg80211_vif *vif; 5663 int err = 0; 5664 5665 brcmf_dbg(TRACE, "Enter p2p listen cancel\n"); 5666 5667 vif = cfg->p2p.bss_idx[P2PAPI_BSSCFG_DEVICE].vif; 5668 if (vif == NULL) { 5669 bphy_err(drvr, "No p2p device available for probe response\n"); 5670 err = -ENODEV; 5671 goto exit; 5672 } 5673 brcmf_p2p_cancel_remain_on_channel(vif->ifp); 5674 exit: 5675 return err; 5676 } 5677 5678 static int brcmf_cfg80211_get_channel(struct wiphy *wiphy, 5679 struct wireless_dev *wdev, 5680 unsigned int link_id, 5681 struct cfg80211_chan_def *chandef) 5682 { 5683 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 5684 struct net_device *ndev = wdev->netdev; 5685 struct brcmf_pub *drvr = cfg->pub; 5686 struct brcmu_chan ch; 5687 enum nl80211_band band = 0; 5688 enum nl80211_chan_width width = 0; 5689 u32 chanspec; 5690 int freq, err; 5691 5692 if (!ndev || drvr->bus_if->state != BRCMF_BUS_UP) 5693 return -ENODEV; 5694 5695 err = brcmf_fil_iovar_int_get(netdev_priv(ndev), "chanspec", &chanspec); 5696 if (err) { 5697 bphy_err(drvr, "chanspec failed (%d)\n", err); 5698 return err; 5699 } 5700 5701 ch.chspec = chanspec; 5702 cfg->d11inf.decchspec(&ch); 5703 5704 switch (ch.band) { 5705 case BRCMU_CHAN_BAND_2G: 5706 band = NL80211_BAND_2GHZ; 5707 break; 5708 case BRCMU_CHAN_BAND_5G: 5709 band = NL80211_BAND_5GHZ; 5710 break; 5711 } 5712 5713 switch (ch.bw) { 5714 case BRCMU_CHAN_BW_80: 5715 width = NL80211_CHAN_WIDTH_80; 5716 break; 5717 case BRCMU_CHAN_BW_40: 5718 width = NL80211_CHAN_WIDTH_40; 5719 break; 5720 case BRCMU_CHAN_BW_20: 5721 width = NL80211_CHAN_WIDTH_20; 5722 break; 5723 case BRCMU_CHAN_BW_80P80: 5724 width = NL80211_CHAN_WIDTH_80P80; 5725 break; 5726 case BRCMU_CHAN_BW_160: 5727 width = NL80211_CHAN_WIDTH_160; 5728 break; 5729 } 5730 5731 freq = ieee80211_channel_to_frequency(ch.control_ch_num, band); 5732 chandef->chan = ieee80211_get_channel(wiphy, freq); 5733 chandef->width = width; 5734 chandef->center_freq1 = ieee80211_channel_to_frequency(ch.chnum, band); 5735 chandef->center_freq2 = 0; 5736 5737 return 0; 5738 } 5739 5740 static int brcmf_cfg80211_crit_proto_start(struct wiphy *wiphy, 5741 struct wireless_dev *wdev, 5742 enum nl80211_crit_proto_id proto, 5743 u16 duration) 5744 { 5745 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 5746 struct brcmf_cfg80211_vif *vif; 5747 5748 vif = container_of(wdev, struct brcmf_cfg80211_vif, wdev); 5749 5750 /* only DHCP support for now */ 5751 if (proto != NL80211_CRIT_PROTO_DHCP) 5752 return -EINVAL; 5753 5754 /* suppress and abort scanning */ 5755 set_bit(BRCMF_SCAN_STATUS_SUPPRESS, &cfg->scan_status); 5756 brcmf_abort_scanning(cfg); 5757 5758 return brcmf_btcoex_set_mode(vif, BRCMF_BTCOEX_DISABLED, duration); 5759 } 5760 5761 static void brcmf_cfg80211_crit_proto_stop(struct wiphy *wiphy, 5762 struct wireless_dev *wdev) 5763 { 5764 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 5765 struct brcmf_cfg80211_vif *vif; 5766 5767 vif = container_of(wdev, struct brcmf_cfg80211_vif, wdev); 5768 5769 brcmf_btcoex_set_mode(vif, BRCMF_BTCOEX_ENABLED, 0); 5770 clear_bit(BRCMF_SCAN_STATUS_SUPPRESS, &cfg->scan_status); 5771 } 5772 5773 static s32 5774 brcmf_notify_tdls_peer_event(struct brcmf_if *ifp, 5775 const struct brcmf_event_msg *e, void *data) 5776 { 5777 switch (e->reason) { 5778 case BRCMF_E_REASON_TDLS_PEER_DISCOVERED: 5779 brcmf_dbg(TRACE, "TDLS Peer Discovered\n"); 5780 break; 5781 case BRCMF_E_REASON_TDLS_PEER_CONNECTED: 5782 brcmf_dbg(TRACE, "TDLS Peer Connected\n"); 5783 brcmf_proto_add_tdls_peer(ifp->drvr, ifp->ifidx, (u8 *)e->addr); 5784 break; 5785 case BRCMF_E_REASON_TDLS_PEER_DISCONNECTED: 5786 brcmf_dbg(TRACE, "TDLS Peer Disconnected\n"); 5787 brcmf_proto_delete_peer(ifp->drvr, ifp->ifidx, (u8 *)e->addr); 5788 break; 5789 } 5790 5791 return 0; 5792 } 5793 5794 static int brcmf_convert_nl80211_tdls_oper(enum nl80211_tdls_operation oper) 5795 { 5796 int ret; 5797 5798 switch (oper) { 5799 case NL80211_TDLS_DISCOVERY_REQ: 5800 ret = BRCMF_TDLS_MANUAL_EP_DISCOVERY; 5801 break; 5802 case NL80211_TDLS_SETUP: 5803 ret = BRCMF_TDLS_MANUAL_EP_CREATE; 5804 break; 5805 case NL80211_TDLS_TEARDOWN: 5806 ret = BRCMF_TDLS_MANUAL_EP_DELETE; 5807 break; 5808 default: 5809 brcmf_err("unsupported operation: %d\n", oper); 5810 ret = -EOPNOTSUPP; 5811 } 5812 return ret; 5813 } 5814 5815 static int brcmf_cfg80211_tdls_oper(struct wiphy *wiphy, 5816 struct net_device *ndev, const u8 *peer, 5817 enum nl80211_tdls_operation oper) 5818 { 5819 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 5820 struct brcmf_pub *drvr = cfg->pub; 5821 struct brcmf_if *ifp; 5822 struct brcmf_tdls_iovar_le info; 5823 int ret = 0; 5824 5825 ret = brcmf_convert_nl80211_tdls_oper(oper); 5826 if (ret < 0) 5827 return ret; 5828 5829 ifp = netdev_priv(ndev); 5830 memset(&info, 0, sizeof(info)); 5831 info.mode = (u8)ret; 5832 if (peer) 5833 memcpy(info.ea, peer, ETH_ALEN); 5834 5835 ret = brcmf_fil_iovar_data_set(ifp, "tdls_endpoint", 5836 &info, sizeof(info)); 5837 if (ret < 0) 5838 bphy_err(drvr, "tdls_endpoint iovar failed: ret=%d\n", ret); 5839 5840 return ret; 5841 } 5842 5843 static int 5844 brcmf_cfg80211_update_conn_params(struct wiphy *wiphy, 5845 struct net_device *ndev, 5846 struct cfg80211_connect_params *sme, 5847 u32 changed) 5848 { 5849 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 5850 struct brcmf_pub *drvr = cfg->pub; 5851 struct brcmf_if *ifp; 5852 int err; 5853 5854 if (!(changed & UPDATE_ASSOC_IES)) 5855 return 0; 5856 5857 ifp = netdev_priv(ndev); 5858 err = brcmf_vif_set_mgmt_ie(ifp->vif, BRCMF_VNDR_IE_ASSOCREQ_FLAG, 5859 sme->ie, sme->ie_len); 5860 if (err) 5861 bphy_err(drvr, "Set Assoc REQ IE Failed\n"); 5862 else 5863 brcmf_dbg(TRACE, "Applied Vndr IEs for Assoc request\n"); 5864 5865 return err; 5866 } 5867 5868 #ifdef CONFIG_PM 5869 static int 5870 brcmf_cfg80211_set_rekey_data(struct wiphy *wiphy, struct net_device *ndev, 5871 struct cfg80211_gtk_rekey_data *gtk) 5872 { 5873 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 5874 struct brcmf_pub *drvr = cfg->pub; 5875 struct brcmf_if *ifp = netdev_priv(ndev); 5876 struct brcmf_gtk_keyinfo_le gtk_le; 5877 int ret; 5878 5879 brcmf_dbg(TRACE, "Enter, bssidx=%d\n", ifp->bsscfgidx); 5880 5881 memcpy(gtk_le.kck, gtk->kck, sizeof(gtk_le.kck)); 5882 memcpy(gtk_le.kek, gtk->kek, sizeof(gtk_le.kek)); 5883 memcpy(gtk_le.replay_counter, gtk->replay_ctr, 5884 sizeof(gtk_le.replay_counter)); 5885 5886 ret = brcmf_fil_iovar_data_set(ifp, "gtk_key_info", >k_le, 5887 sizeof(gtk_le)); 5888 if (ret < 0) 5889 bphy_err(drvr, "gtk_key_info iovar failed: ret=%d\n", ret); 5890 5891 return ret; 5892 } 5893 #endif 5894 5895 static int brcmf_cfg80211_set_pmk(struct wiphy *wiphy, struct net_device *dev, 5896 const struct cfg80211_pmk_conf *conf) 5897 { 5898 struct brcmf_if *ifp; 5899 5900 brcmf_dbg(TRACE, "enter\n"); 5901 5902 /* expect using firmware supplicant for 1X */ 5903 ifp = netdev_priv(dev); 5904 if (WARN_ON(ifp->vif->profile.use_fwsup != BRCMF_PROFILE_FWSUP_1X)) 5905 return -EINVAL; 5906 5907 if (conf->pmk_len > BRCMF_WSEC_MAX_PSK_LEN) 5908 return -ERANGE; 5909 5910 return brcmf_set_pmk(ifp, conf->pmk, conf->pmk_len); 5911 } 5912 5913 static int brcmf_cfg80211_del_pmk(struct wiphy *wiphy, struct net_device *dev, 5914 const u8 *aa) 5915 { 5916 struct brcmf_if *ifp; 5917 5918 brcmf_dbg(TRACE, "enter\n"); 5919 ifp = netdev_priv(dev); 5920 if (WARN_ON(ifp->vif->profile.use_fwsup != BRCMF_PROFILE_FWSUP_1X)) 5921 return -EINVAL; 5922 5923 return brcmf_set_pmk(ifp, NULL, 0); 5924 } 5925 5926 static struct cfg80211_ops brcmf_cfg80211_ops = { 5927 .add_virtual_intf = brcmf_cfg80211_add_iface, 5928 .del_virtual_intf = brcmf_cfg80211_del_iface, 5929 .change_virtual_intf = brcmf_cfg80211_change_iface, 5930 .scan = brcmf_cfg80211_scan, 5931 .set_wiphy_params = brcmf_cfg80211_set_wiphy_params, 5932 .join_ibss = brcmf_cfg80211_join_ibss, 5933 .leave_ibss = brcmf_cfg80211_leave_ibss, 5934 .get_station = brcmf_cfg80211_get_station, 5935 .dump_station = brcmf_cfg80211_dump_station, 5936 .set_tx_power = brcmf_cfg80211_set_tx_power, 5937 .get_tx_power = brcmf_cfg80211_get_tx_power, 5938 .add_key = brcmf_cfg80211_add_key, 5939 .del_key = brcmf_cfg80211_del_key, 5940 .get_key = brcmf_cfg80211_get_key, 5941 .set_default_key = brcmf_cfg80211_config_default_key, 5942 .set_default_mgmt_key = brcmf_cfg80211_config_default_mgmt_key, 5943 .set_power_mgmt = brcmf_cfg80211_set_power_mgmt, 5944 .connect = brcmf_cfg80211_connect, 5945 .disconnect = brcmf_cfg80211_disconnect, 5946 .suspend = brcmf_cfg80211_suspend, 5947 .resume = brcmf_cfg80211_resume, 5948 .set_pmksa = brcmf_cfg80211_set_pmksa, 5949 .del_pmksa = brcmf_cfg80211_del_pmksa, 5950 .flush_pmksa = brcmf_cfg80211_flush_pmksa, 5951 .start_ap = brcmf_cfg80211_start_ap, 5952 .stop_ap = brcmf_cfg80211_stop_ap, 5953 .change_beacon = brcmf_cfg80211_change_beacon, 5954 .del_station = brcmf_cfg80211_del_station, 5955 .change_station = brcmf_cfg80211_change_station, 5956 .sched_scan_start = brcmf_cfg80211_sched_scan_start, 5957 .sched_scan_stop = brcmf_cfg80211_sched_scan_stop, 5958 .update_mgmt_frame_registrations = 5959 brcmf_cfg80211_update_mgmt_frame_registrations, 5960 .mgmt_tx = brcmf_cfg80211_mgmt_tx, 5961 .set_cqm_rssi_range_config = brcmf_cfg80211_set_cqm_rssi_range_config, 5962 .remain_on_channel = brcmf_p2p_remain_on_channel, 5963 .cancel_remain_on_channel = brcmf_cfg80211_cancel_remain_on_channel, 5964 .get_channel = brcmf_cfg80211_get_channel, 5965 .start_p2p_device = brcmf_p2p_start_device, 5966 .stop_p2p_device = brcmf_p2p_stop_device, 5967 .crit_proto_start = brcmf_cfg80211_crit_proto_start, 5968 .crit_proto_stop = brcmf_cfg80211_crit_proto_stop, 5969 .tdls_oper = brcmf_cfg80211_tdls_oper, 5970 .update_connect_params = brcmf_cfg80211_update_conn_params, 5971 .set_pmk = brcmf_cfg80211_set_pmk, 5972 .del_pmk = brcmf_cfg80211_del_pmk, 5973 }; 5974 5975 struct cfg80211_ops *brcmf_cfg80211_get_ops(struct brcmf_mp_device *settings) 5976 { 5977 struct cfg80211_ops *ops; 5978 5979 ops = kmemdup(&brcmf_cfg80211_ops, sizeof(brcmf_cfg80211_ops), 5980 GFP_KERNEL); 5981 5982 if (ops && settings->roamoff) 5983 ops->update_connect_params = NULL; 5984 5985 return ops; 5986 } 5987 5988 struct brcmf_cfg80211_vif *brcmf_alloc_vif(struct brcmf_cfg80211_info *cfg, 5989 enum nl80211_iftype type) 5990 { 5991 struct brcmf_cfg80211_vif *vif_walk; 5992 struct brcmf_cfg80211_vif *vif; 5993 bool mbss; 5994 struct brcmf_if *ifp = brcmf_get_ifp(cfg->pub, 0); 5995 5996 brcmf_dbg(TRACE, "allocating virtual interface (size=%zu)\n", 5997 sizeof(*vif)); 5998 vif = kzalloc(sizeof(*vif), GFP_KERNEL); 5999 if (!vif) 6000 return ERR_PTR(-ENOMEM); 6001 6002 vif->wdev.wiphy = cfg->wiphy; 6003 vif->wdev.iftype = type; 6004 6005 brcmf_init_prof(&vif->profile); 6006 6007 if (type == NL80211_IFTYPE_AP && 6008 brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MBSS)) { 6009 mbss = false; 6010 list_for_each_entry(vif_walk, &cfg->vif_list, list) { 6011 if (vif_walk->wdev.iftype == NL80211_IFTYPE_AP) { 6012 mbss = true; 6013 break; 6014 } 6015 } 6016 vif->mbss = mbss; 6017 } 6018 6019 list_add_tail(&vif->list, &cfg->vif_list); 6020 return vif; 6021 } 6022 6023 void brcmf_free_vif(struct brcmf_cfg80211_vif *vif) 6024 { 6025 list_del(&vif->list); 6026 kfree(vif); 6027 } 6028 6029 void brcmf_cfg80211_free_netdev(struct net_device *ndev) 6030 { 6031 struct brcmf_cfg80211_vif *vif; 6032 struct brcmf_if *ifp; 6033 6034 ifp = netdev_priv(ndev); 6035 vif = ifp->vif; 6036 6037 if (vif) 6038 brcmf_free_vif(vif); 6039 } 6040 6041 static bool brcmf_is_linkup(struct brcmf_cfg80211_vif *vif, 6042 const struct brcmf_event_msg *e) 6043 { 6044 u32 event = e->event_code; 6045 u32 status = e->status; 6046 6047 if ((vif->profile.use_fwsup == BRCMF_PROFILE_FWSUP_PSK || 6048 vif->profile.use_fwsup == BRCMF_PROFILE_FWSUP_SAE) && 6049 event == BRCMF_E_PSK_SUP && 6050 status == BRCMF_E_STATUS_FWSUP_COMPLETED) 6051 set_bit(BRCMF_VIF_STATUS_EAP_SUCCESS, &vif->sme_state); 6052 if (event == BRCMF_E_SET_SSID && status == BRCMF_E_STATUS_SUCCESS) { 6053 brcmf_dbg(CONN, "Processing set ssid\n"); 6054 memcpy(vif->profile.bssid, e->addr, ETH_ALEN); 6055 if (vif->profile.use_fwsup != BRCMF_PROFILE_FWSUP_PSK && 6056 vif->profile.use_fwsup != BRCMF_PROFILE_FWSUP_SAE) 6057 return true; 6058 6059 set_bit(BRCMF_VIF_STATUS_ASSOC_SUCCESS, &vif->sme_state); 6060 } 6061 6062 if (test_bit(BRCMF_VIF_STATUS_EAP_SUCCESS, &vif->sme_state) && 6063 test_bit(BRCMF_VIF_STATUS_ASSOC_SUCCESS, &vif->sme_state)) { 6064 clear_bit(BRCMF_VIF_STATUS_EAP_SUCCESS, &vif->sme_state); 6065 clear_bit(BRCMF_VIF_STATUS_ASSOC_SUCCESS, &vif->sme_state); 6066 return true; 6067 } 6068 return false; 6069 } 6070 6071 static bool brcmf_is_linkdown(struct brcmf_cfg80211_vif *vif, 6072 const struct brcmf_event_msg *e) 6073 { 6074 u32 event = e->event_code; 6075 u16 flags = e->flags; 6076 6077 if ((event == BRCMF_E_DEAUTH) || (event == BRCMF_E_DEAUTH_IND) || 6078 (event == BRCMF_E_DISASSOC_IND) || 6079 ((event == BRCMF_E_LINK) && (!(flags & BRCMF_EVENT_MSG_LINK)))) { 6080 brcmf_dbg(CONN, "Processing link down\n"); 6081 clear_bit(BRCMF_VIF_STATUS_EAP_SUCCESS, &vif->sme_state); 6082 clear_bit(BRCMF_VIF_STATUS_ASSOC_SUCCESS, &vif->sme_state); 6083 return true; 6084 } 6085 return false; 6086 } 6087 6088 static bool brcmf_is_nonetwork(struct brcmf_cfg80211_info *cfg, 6089 const struct brcmf_event_msg *e) 6090 { 6091 u32 event = e->event_code; 6092 u32 status = e->status; 6093 6094 if (event == BRCMF_E_LINK && status == BRCMF_E_STATUS_NO_NETWORKS) { 6095 brcmf_dbg(CONN, "Processing Link %s & no network found\n", 6096 e->flags & BRCMF_EVENT_MSG_LINK ? "up" : "down"); 6097 return true; 6098 } 6099 6100 if (event == BRCMF_E_SET_SSID && status != BRCMF_E_STATUS_SUCCESS) { 6101 brcmf_dbg(CONN, "Processing connecting & no network found\n"); 6102 return true; 6103 } 6104 6105 if (event == BRCMF_E_PSK_SUP && 6106 status != BRCMF_E_STATUS_FWSUP_COMPLETED) { 6107 brcmf_dbg(CONN, "Processing failed supplicant state: %u\n", 6108 status); 6109 return true; 6110 } 6111 6112 return false; 6113 } 6114 6115 static void brcmf_clear_assoc_ies(struct brcmf_cfg80211_info *cfg) 6116 { 6117 struct brcmf_cfg80211_connect_info *conn_info = cfg_to_conn(cfg); 6118 6119 kfree(conn_info->req_ie); 6120 conn_info->req_ie = NULL; 6121 conn_info->req_ie_len = 0; 6122 kfree(conn_info->resp_ie); 6123 conn_info->resp_ie = NULL; 6124 conn_info->resp_ie_len = 0; 6125 } 6126 6127 u8 brcmf_map_prio_to_prec(void *config, u8 prio) 6128 { 6129 struct brcmf_cfg80211_info *cfg = (struct brcmf_cfg80211_info *)config; 6130 6131 if (!cfg) 6132 return (prio == PRIO_8021D_NONE || prio == PRIO_8021D_BE) ? 6133 (prio ^ 2) : prio; 6134 6135 /* For those AC(s) with ACM flag set to 1, convert its 4-level priority 6136 * to an 8-level precedence which is the same as BE's 6137 */ 6138 if (prio > PRIO_8021D_EE && 6139 cfg->ac_priority[prio] == cfg->ac_priority[PRIO_8021D_BE]) 6140 return cfg->ac_priority[prio] * 2; 6141 6142 /* Conversion of 4-level priority to 8-level precedence */ 6143 if (prio == PRIO_8021D_BE || prio == PRIO_8021D_BK || 6144 prio == PRIO_8021D_CL || prio == PRIO_8021D_VO) 6145 return cfg->ac_priority[prio] * 2; 6146 else 6147 return cfg->ac_priority[prio] * 2 + 1; 6148 } 6149 6150 u8 brcmf_map_prio_to_aci(void *config, u8 prio) 6151 { 6152 /* Prio here refers to the 802.1d priority in range of 0 to 7. 6153 * ACI here refers to the WLAN AC Index in range of 0 to 3. 6154 * This function will return ACI corresponding to input prio. 6155 */ 6156 struct brcmf_cfg80211_info *cfg = (struct brcmf_cfg80211_info *)config; 6157 6158 if (cfg) 6159 return cfg->ac_priority[prio]; 6160 6161 return prio; 6162 } 6163 6164 static void brcmf_init_wmm_prio(u8 *priority) 6165 { 6166 /* Initialize AC priority array to default 6167 * 802.1d priority as per following table: 6168 * 802.1d prio 0,3 maps to BE 6169 * 802.1d prio 1,2 maps to BK 6170 * 802.1d prio 4,5 maps to VI 6171 * 802.1d prio 6,7 maps to VO 6172 */ 6173 priority[0] = BRCMF_FWS_FIFO_AC_BE; 6174 priority[3] = BRCMF_FWS_FIFO_AC_BE; 6175 priority[1] = BRCMF_FWS_FIFO_AC_BK; 6176 priority[2] = BRCMF_FWS_FIFO_AC_BK; 6177 priority[4] = BRCMF_FWS_FIFO_AC_VI; 6178 priority[5] = BRCMF_FWS_FIFO_AC_VI; 6179 priority[6] = BRCMF_FWS_FIFO_AC_VO; 6180 priority[7] = BRCMF_FWS_FIFO_AC_VO; 6181 } 6182 6183 static void brcmf_wifi_prioritize_acparams(const 6184 struct brcmf_cfg80211_edcf_acparam *acp, u8 *priority) 6185 { 6186 u8 aci; 6187 u8 aifsn; 6188 u8 ecwmin; 6189 u8 ecwmax; 6190 u8 acm; 6191 u8 ranking_basis[EDCF_AC_COUNT]; 6192 u8 aci_prio[EDCF_AC_COUNT]; /* AC_BE, AC_BK, AC_VI, AC_VO */ 6193 u8 index; 6194 6195 for (aci = 0; aci < EDCF_AC_COUNT; aci++, acp++) { 6196 aifsn = acp->ACI & EDCF_AIFSN_MASK; 6197 acm = (acp->ACI & EDCF_ACM_MASK) ? 1 : 0; 6198 ecwmin = acp->ECW & EDCF_ECWMIN_MASK; 6199 ecwmax = (acp->ECW & EDCF_ECWMAX_MASK) >> EDCF_ECWMAX_SHIFT; 6200 brcmf_dbg(CONN, "ACI %d aifsn %d acm %d ecwmin %d ecwmax %d\n", 6201 aci, aifsn, acm, ecwmin, ecwmax); 6202 /* Default AC_VO will be the lowest ranking value */ 6203 ranking_basis[aci] = aifsn + ecwmin + ecwmax; 6204 /* Initialise priority starting at 0 (AC_BE) */ 6205 aci_prio[aci] = 0; 6206 6207 /* If ACM is set, STA can't use this AC as per 802.11. 6208 * Change the ranking to BE 6209 */ 6210 if (aci != AC_BE && aci != AC_BK && acm == 1) 6211 ranking_basis[aci] = ranking_basis[AC_BE]; 6212 } 6213 6214 /* Ranking method which works for AC priority 6215 * swapping when values for cwmin, cwmax and aifsn are varied 6216 * Compare each aci_prio against each other aci_prio 6217 */ 6218 for (aci = 0; aci < EDCF_AC_COUNT; aci++) { 6219 for (index = 0; index < EDCF_AC_COUNT; index++) { 6220 if (index != aci) { 6221 /* Smaller ranking value has higher priority, 6222 * so increment priority for each ACI which has 6223 * a higher ranking value 6224 */ 6225 if (ranking_basis[aci] < ranking_basis[index]) 6226 aci_prio[aci]++; 6227 } 6228 } 6229 } 6230 6231 /* By now, aci_prio[] will be in range of 0 to 3. 6232 * Use ACI prio to get the new priority value for 6233 * each 802.1d traffic type, in this range. 6234 */ 6235 if (!(aci_prio[AC_BE] == aci_prio[AC_BK] && 6236 aci_prio[AC_BK] == aci_prio[AC_VI] && 6237 aci_prio[AC_VI] == aci_prio[AC_VO])) { 6238 /* 802.1d 0,3 maps to BE */ 6239 priority[0] = aci_prio[AC_BE]; 6240 priority[3] = aci_prio[AC_BE]; 6241 6242 /* 802.1d 1,2 maps to BK */ 6243 priority[1] = aci_prio[AC_BK]; 6244 priority[2] = aci_prio[AC_BK]; 6245 6246 /* 802.1d 4,5 maps to VO */ 6247 priority[4] = aci_prio[AC_VI]; 6248 priority[5] = aci_prio[AC_VI]; 6249 6250 /* 802.1d 6,7 maps to VO */ 6251 priority[6] = aci_prio[AC_VO]; 6252 priority[7] = aci_prio[AC_VO]; 6253 } else { 6254 /* Initialize to default priority */ 6255 brcmf_init_wmm_prio(priority); 6256 } 6257 6258 brcmf_dbg(CONN, "Adj prio BE 0->%d, BK 1->%d, BK 2->%d, BE 3->%d\n", 6259 priority[0], priority[1], priority[2], priority[3]); 6260 6261 brcmf_dbg(CONN, "Adj prio VI 4->%d, VI 5->%d, VO 6->%d, VO 7->%d\n", 6262 priority[4], priority[5], priority[6], priority[7]); 6263 } 6264 6265 static s32 brcmf_get_assoc_ies(struct brcmf_cfg80211_info *cfg, 6266 struct brcmf_if *ifp) 6267 { 6268 struct brcmf_pub *drvr = cfg->pub; 6269 struct brcmf_cfg80211_assoc_ielen_le *assoc_info; 6270 struct brcmf_cfg80211_connect_info *conn_info = cfg_to_conn(cfg); 6271 struct brcmf_cfg80211_edcf_acparam edcf_acparam_info[EDCF_AC_COUNT]; 6272 u32 req_len; 6273 u32 resp_len; 6274 s32 err = 0; 6275 6276 brcmf_clear_assoc_ies(cfg); 6277 6278 err = brcmf_fil_iovar_data_get(ifp, "assoc_info", 6279 cfg->extra_buf, WL_ASSOC_INFO_MAX); 6280 if (err) { 6281 bphy_err(drvr, "could not get assoc info (%d)\n", err); 6282 return err; 6283 } 6284 assoc_info = 6285 (struct brcmf_cfg80211_assoc_ielen_le *)cfg->extra_buf; 6286 req_len = le32_to_cpu(assoc_info->req_len); 6287 resp_len = le32_to_cpu(assoc_info->resp_len); 6288 if (req_len > WL_EXTRA_BUF_MAX || resp_len > WL_EXTRA_BUF_MAX) { 6289 bphy_err(drvr, "invalid lengths in assoc info: req %u resp %u\n", 6290 req_len, resp_len); 6291 return -EINVAL; 6292 } 6293 if (req_len) { 6294 err = brcmf_fil_iovar_data_get(ifp, "assoc_req_ies", 6295 cfg->extra_buf, 6296 WL_ASSOC_INFO_MAX); 6297 if (err) { 6298 bphy_err(drvr, "could not get assoc req (%d)\n", err); 6299 return err; 6300 } 6301 conn_info->req_ie_len = req_len; 6302 conn_info->req_ie = 6303 kmemdup(cfg->extra_buf, conn_info->req_ie_len, 6304 GFP_KERNEL); 6305 if (!conn_info->req_ie) 6306 conn_info->req_ie_len = 0; 6307 } else { 6308 conn_info->req_ie_len = 0; 6309 conn_info->req_ie = NULL; 6310 } 6311 if (resp_len) { 6312 err = brcmf_fil_iovar_data_get(ifp, "assoc_resp_ies", 6313 cfg->extra_buf, 6314 WL_ASSOC_INFO_MAX); 6315 if (err) { 6316 bphy_err(drvr, "could not get assoc resp (%d)\n", err); 6317 return err; 6318 } 6319 conn_info->resp_ie_len = resp_len; 6320 conn_info->resp_ie = 6321 kmemdup(cfg->extra_buf, conn_info->resp_ie_len, 6322 GFP_KERNEL); 6323 if (!conn_info->resp_ie) 6324 conn_info->resp_ie_len = 0; 6325 6326 err = brcmf_fil_iovar_data_get(ifp, "wme_ac_sta", 6327 edcf_acparam_info, 6328 sizeof(edcf_acparam_info)); 6329 if (err) { 6330 brcmf_err("could not get wme_ac_sta (%d)\n", err); 6331 return err; 6332 } 6333 6334 brcmf_wifi_prioritize_acparams(edcf_acparam_info, 6335 cfg->ac_priority); 6336 } else { 6337 conn_info->resp_ie_len = 0; 6338 conn_info->resp_ie = NULL; 6339 } 6340 brcmf_dbg(CONN, "req len (%d) resp len (%d)\n", 6341 conn_info->req_ie_len, conn_info->resp_ie_len); 6342 6343 return err; 6344 } 6345 6346 static s32 6347 brcmf_bss_roaming_done(struct brcmf_cfg80211_info *cfg, 6348 struct net_device *ndev, 6349 const struct brcmf_event_msg *e) 6350 { 6351 struct brcmf_if *ifp = netdev_priv(ndev); 6352 struct brcmf_cfg80211_profile *profile = &ifp->vif->profile; 6353 struct brcmf_cfg80211_connect_info *conn_info = cfg_to_conn(cfg); 6354 struct wiphy *wiphy = cfg_to_wiphy(cfg); 6355 struct ieee80211_channel *notify_channel = NULL; 6356 struct ieee80211_supported_band *band; 6357 struct brcmf_bss_info_le *bi; 6358 struct brcmu_chan ch; 6359 struct cfg80211_roam_info roam_info = {}; 6360 u32 freq; 6361 s32 err = 0; 6362 u8 *buf; 6363 6364 brcmf_dbg(TRACE, "Enter\n"); 6365 6366 brcmf_get_assoc_ies(cfg, ifp); 6367 memcpy(profile->bssid, e->addr, ETH_ALEN); 6368 brcmf_update_bss_info(cfg, ifp); 6369 6370 buf = kzalloc(WL_BSS_INFO_MAX, GFP_KERNEL); 6371 if (buf == NULL) { 6372 err = -ENOMEM; 6373 goto done; 6374 } 6375 6376 /* data sent to dongle has to be little endian */ 6377 *(__le32 *)buf = cpu_to_le32(WL_BSS_INFO_MAX); 6378 err = brcmf_fil_cmd_data_get(ifp, BRCMF_C_GET_BSS_INFO, 6379 buf, WL_BSS_INFO_MAX); 6380 6381 if (err) 6382 goto done; 6383 6384 bi = (struct brcmf_bss_info_le *)(buf + 4); 6385 ch.chspec = le16_to_cpu(bi->chanspec); 6386 cfg->d11inf.decchspec(&ch); 6387 6388 if (ch.band == BRCMU_CHAN_BAND_2G) 6389 band = wiphy->bands[NL80211_BAND_2GHZ]; 6390 else 6391 band = wiphy->bands[NL80211_BAND_5GHZ]; 6392 6393 freq = ieee80211_channel_to_frequency(ch.control_ch_num, band->band); 6394 notify_channel = ieee80211_get_channel(wiphy, freq); 6395 6396 done: 6397 kfree(buf); 6398 6399 roam_info.links[0].channel = notify_channel; 6400 roam_info.links[0].bssid = profile->bssid; 6401 roam_info.req_ie = conn_info->req_ie; 6402 roam_info.req_ie_len = conn_info->req_ie_len; 6403 roam_info.resp_ie = conn_info->resp_ie; 6404 roam_info.resp_ie_len = conn_info->resp_ie_len; 6405 6406 cfg80211_roamed(ndev, &roam_info, GFP_KERNEL); 6407 brcmf_dbg(CONN, "Report roaming result\n"); 6408 6409 if (profile->use_fwsup == BRCMF_PROFILE_FWSUP_1X && profile->is_ft) { 6410 cfg80211_port_authorized(ndev, profile->bssid, NULL, 0, GFP_KERNEL); 6411 brcmf_dbg(CONN, "Report port authorized\n"); 6412 } 6413 6414 set_bit(BRCMF_VIF_STATUS_CONNECTED, &ifp->vif->sme_state); 6415 brcmf_dbg(TRACE, "Exit\n"); 6416 return err; 6417 } 6418 6419 static s32 6420 brcmf_bss_connect_done(struct brcmf_cfg80211_info *cfg, 6421 struct net_device *ndev, const struct brcmf_event_msg *e, 6422 bool completed) 6423 { 6424 struct brcmf_if *ifp = netdev_priv(ndev); 6425 struct brcmf_cfg80211_profile *profile = &ifp->vif->profile; 6426 struct brcmf_cfg80211_connect_info *conn_info = cfg_to_conn(cfg); 6427 struct cfg80211_connect_resp_params conn_params; 6428 6429 brcmf_dbg(TRACE, "Enter\n"); 6430 6431 if (test_and_clear_bit(BRCMF_VIF_STATUS_CONNECTING, 6432 &ifp->vif->sme_state)) { 6433 memset(&conn_params, 0, sizeof(conn_params)); 6434 if (completed) { 6435 brcmf_get_assoc_ies(cfg, ifp); 6436 brcmf_update_bss_info(cfg, ifp); 6437 set_bit(BRCMF_VIF_STATUS_CONNECTED, 6438 &ifp->vif->sme_state); 6439 conn_params.status = WLAN_STATUS_SUCCESS; 6440 } else { 6441 clear_bit(BRCMF_VIF_STATUS_EAP_SUCCESS, 6442 &ifp->vif->sme_state); 6443 clear_bit(BRCMF_VIF_STATUS_ASSOC_SUCCESS, 6444 &ifp->vif->sme_state); 6445 conn_params.status = WLAN_STATUS_AUTH_TIMEOUT; 6446 } 6447 conn_params.links[0].bssid = profile->bssid; 6448 conn_params.req_ie = conn_info->req_ie; 6449 conn_params.req_ie_len = conn_info->req_ie_len; 6450 conn_params.resp_ie = conn_info->resp_ie; 6451 conn_params.resp_ie_len = conn_info->resp_ie_len; 6452 cfg80211_connect_done(ndev, &conn_params, GFP_KERNEL); 6453 brcmf_dbg(CONN, "Report connect result - connection %s\n", 6454 completed ? "succeeded" : "failed"); 6455 } 6456 brcmf_dbg(TRACE, "Exit\n"); 6457 return 0; 6458 } 6459 6460 static s32 6461 brcmf_notify_connect_status_ap(struct brcmf_cfg80211_info *cfg, 6462 struct net_device *ndev, 6463 const struct brcmf_event_msg *e, void *data) 6464 { 6465 struct brcmf_pub *drvr = cfg->pub; 6466 static int generation; 6467 u32 event = e->event_code; 6468 u32 reason = e->reason; 6469 struct station_info *sinfo; 6470 6471 brcmf_dbg(CONN, "event %s (%u), reason %d\n", 6472 brcmf_fweh_event_name(event), event, reason); 6473 if (event == BRCMF_E_LINK && reason == BRCMF_E_REASON_LINK_BSSCFG_DIS && 6474 ndev != cfg_to_ndev(cfg)) { 6475 brcmf_dbg(CONN, "AP mode link down\n"); 6476 complete(&cfg->vif_disabled); 6477 return 0; 6478 } 6479 6480 if (((event == BRCMF_E_ASSOC_IND) || (event == BRCMF_E_REASSOC_IND)) && 6481 (reason == BRCMF_E_STATUS_SUCCESS)) { 6482 if (!data) { 6483 bphy_err(drvr, "No IEs present in ASSOC/REASSOC_IND\n"); 6484 return -EINVAL; 6485 } 6486 6487 sinfo = kzalloc(sizeof(*sinfo), GFP_KERNEL); 6488 if (!sinfo) 6489 return -ENOMEM; 6490 6491 sinfo->assoc_req_ies = data; 6492 sinfo->assoc_req_ies_len = e->datalen; 6493 generation++; 6494 sinfo->generation = generation; 6495 cfg80211_new_sta(ndev, e->addr, sinfo, GFP_KERNEL); 6496 6497 kfree(sinfo); 6498 } else if ((event == BRCMF_E_DISASSOC_IND) || 6499 (event == BRCMF_E_DEAUTH_IND) || 6500 (event == BRCMF_E_DEAUTH)) { 6501 cfg80211_del_sta(ndev, e->addr, GFP_KERNEL); 6502 } 6503 return 0; 6504 } 6505 6506 static s32 6507 brcmf_notify_connect_status(struct brcmf_if *ifp, 6508 const struct brcmf_event_msg *e, void *data) 6509 { 6510 struct brcmf_cfg80211_info *cfg = ifp->drvr->config; 6511 struct net_device *ndev = ifp->ndev; 6512 struct brcmf_cfg80211_profile *profile = &ifp->vif->profile; 6513 struct ieee80211_channel *chan; 6514 s32 err = 0; 6515 6516 if ((e->event_code == BRCMF_E_DEAUTH) || 6517 (e->event_code == BRCMF_E_DEAUTH_IND) || 6518 (e->event_code == BRCMF_E_DISASSOC_IND) || 6519 ((e->event_code == BRCMF_E_LINK) && (!e->flags))) { 6520 brcmf_proto_delete_peer(ifp->drvr, ifp->ifidx, (u8 *)e->addr); 6521 } 6522 6523 if (brcmf_is_apmode(ifp->vif)) { 6524 err = brcmf_notify_connect_status_ap(cfg, ndev, e, data); 6525 } else if (brcmf_is_linkup(ifp->vif, e)) { 6526 brcmf_dbg(CONN, "Linkup\n"); 6527 if (brcmf_is_ibssmode(ifp->vif)) { 6528 brcmf_inform_ibss(cfg, ndev, e->addr); 6529 chan = ieee80211_get_channel(cfg->wiphy, cfg->channel); 6530 memcpy(profile->bssid, e->addr, ETH_ALEN); 6531 cfg80211_ibss_joined(ndev, e->addr, chan, GFP_KERNEL); 6532 clear_bit(BRCMF_VIF_STATUS_CONNECTING, 6533 &ifp->vif->sme_state); 6534 set_bit(BRCMF_VIF_STATUS_CONNECTED, 6535 &ifp->vif->sme_state); 6536 } else 6537 brcmf_bss_connect_done(cfg, ndev, e, true); 6538 brcmf_net_setcarrier(ifp, true); 6539 } else if (brcmf_is_linkdown(ifp->vif, e)) { 6540 brcmf_dbg(CONN, "Linkdown\n"); 6541 if (!brcmf_is_ibssmode(ifp->vif) && 6542 (test_bit(BRCMF_VIF_STATUS_CONNECTED, 6543 &ifp->vif->sme_state) || 6544 test_bit(BRCMF_VIF_STATUS_CONNECTING, 6545 &ifp->vif->sme_state))) { 6546 if (test_bit(BRCMF_VIF_STATUS_CONNECTED, 6547 &ifp->vif->sme_state) && 6548 memcmp(profile->bssid, e->addr, ETH_ALEN)) 6549 return err; 6550 6551 brcmf_bss_connect_done(cfg, ndev, e, false); 6552 brcmf_link_down(ifp->vif, 6553 brcmf_map_fw_linkdown_reason(e), 6554 e->event_code & 6555 (BRCMF_E_DEAUTH_IND | 6556 BRCMF_E_DISASSOC_IND) 6557 ? false : true); 6558 brcmf_init_prof(ndev_to_prof(ndev)); 6559 if (ndev != cfg_to_ndev(cfg)) 6560 complete(&cfg->vif_disabled); 6561 brcmf_net_setcarrier(ifp, false); 6562 } 6563 } else if (brcmf_is_nonetwork(cfg, e)) { 6564 if (brcmf_is_ibssmode(ifp->vif)) 6565 clear_bit(BRCMF_VIF_STATUS_CONNECTING, 6566 &ifp->vif->sme_state); 6567 else 6568 brcmf_bss_connect_done(cfg, ndev, e, false); 6569 } 6570 6571 return err; 6572 } 6573 6574 static s32 6575 brcmf_notify_roaming_status(struct brcmf_if *ifp, 6576 const struct brcmf_event_msg *e, void *data) 6577 { 6578 struct brcmf_cfg80211_info *cfg = ifp->drvr->config; 6579 u32 event = e->event_code; 6580 u32 status = e->status; 6581 6582 if (event == BRCMF_E_ROAM && status == BRCMF_E_STATUS_SUCCESS) { 6583 if (test_bit(BRCMF_VIF_STATUS_CONNECTED, 6584 &ifp->vif->sme_state)) { 6585 brcmf_bss_roaming_done(cfg, ifp->ndev, e); 6586 } else { 6587 brcmf_bss_connect_done(cfg, ifp->ndev, e, true); 6588 brcmf_net_setcarrier(ifp, true); 6589 } 6590 } 6591 6592 return 0; 6593 } 6594 6595 static s32 6596 brcmf_notify_mic_status(struct brcmf_if *ifp, 6597 const struct brcmf_event_msg *e, void *data) 6598 { 6599 u16 flags = e->flags; 6600 enum nl80211_key_type key_type; 6601 6602 if (flags & BRCMF_EVENT_MSG_GROUP) 6603 key_type = NL80211_KEYTYPE_GROUP; 6604 else 6605 key_type = NL80211_KEYTYPE_PAIRWISE; 6606 6607 cfg80211_michael_mic_failure(ifp->ndev, (u8 *)&e->addr, key_type, -1, 6608 NULL, GFP_KERNEL); 6609 6610 return 0; 6611 } 6612 6613 static s32 brcmf_notify_rssi(struct brcmf_if *ifp, 6614 const struct brcmf_event_msg *e, void *data) 6615 { 6616 struct brcmf_cfg80211_vif *vif = ifp->vif; 6617 struct brcmf_rssi_be *info = data; 6618 s32 rssi, snr = 0, noise = 0; 6619 s32 low, high, last; 6620 6621 if (e->datalen >= sizeof(*info)) { 6622 rssi = be32_to_cpu(info->rssi); 6623 snr = be32_to_cpu(info->snr); 6624 noise = be32_to_cpu(info->noise); 6625 } else if (e->datalen >= sizeof(rssi)) { 6626 rssi = be32_to_cpu(*(__be32 *)data); 6627 } else { 6628 brcmf_err("insufficient RSSI event data\n"); 6629 return 0; 6630 } 6631 6632 low = vif->cqm_rssi_low; 6633 high = vif->cqm_rssi_high; 6634 last = vif->cqm_rssi_last; 6635 6636 brcmf_dbg(TRACE, "rssi=%d snr=%d noise=%d low=%d high=%d last=%d\n", 6637 rssi, snr, noise, low, high, last); 6638 6639 vif->cqm_rssi_last = rssi; 6640 6641 if (rssi <= low || rssi == 0) { 6642 brcmf_dbg(INFO, "LOW rssi=%d\n", rssi); 6643 cfg80211_cqm_rssi_notify(ifp->ndev, 6644 NL80211_CQM_RSSI_THRESHOLD_EVENT_LOW, 6645 rssi, GFP_KERNEL); 6646 } else if (rssi > high) { 6647 brcmf_dbg(INFO, "HIGH rssi=%d\n", rssi); 6648 cfg80211_cqm_rssi_notify(ifp->ndev, 6649 NL80211_CQM_RSSI_THRESHOLD_EVENT_HIGH, 6650 rssi, GFP_KERNEL); 6651 } 6652 6653 return 0; 6654 } 6655 6656 static s32 brcmf_notify_vif_event(struct brcmf_if *ifp, 6657 const struct brcmf_event_msg *e, void *data) 6658 { 6659 struct brcmf_cfg80211_info *cfg = ifp->drvr->config; 6660 struct brcmf_if_event *ifevent = (struct brcmf_if_event *)data; 6661 struct brcmf_cfg80211_vif_event *event = &cfg->vif_event; 6662 struct brcmf_cfg80211_vif *vif; 6663 6664 brcmf_dbg(TRACE, "Enter: action %u flags %u ifidx %u bsscfgidx %u\n", 6665 ifevent->action, ifevent->flags, ifevent->ifidx, 6666 ifevent->bsscfgidx); 6667 6668 spin_lock(&event->vif_event_lock); 6669 event->action = ifevent->action; 6670 vif = event->vif; 6671 6672 switch (ifevent->action) { 6673 case BRCMF_E_IF_ADD: 6674 /* waiting process may have timed out */ 6675 if (!cfg->vif_event.vif) { 6676 spin_unlock(&event->vif_event_lock); 6677 return -EBADF; 6678 } 6679 6680 ifp->vif = vif; 6681 vif->ifp = ifp; 6682 if (ifp->ndev) { 6683 vif->wdev.netdev = ifp->ndev; 6684 ifp->ndev->ieee80211_ptr = &vif->wdev; 6685 SET_NETDEV_DEV(ifp->ndev, wiphy_dev(cfg->wiphy)); 6686 } 6687 spin_unlock(&event->vif_event_lock); 6688 wake_up(&event->vif_wq); 6689 return 0; 6690 6691 case BRCMF_E_IF_DEL: 6692 spin_unlock(&event->vif_event_lock); 6693 /* event may not be upon user request */ 6694 if (brcmf_cfg80211_vif_event_armed(cfg)) 6695 wake_up(&event->vif_wq); 6696 return 0; 6697 6698 case BRCMF_E_IF_CHANGE: 6699 spin_unlock(&event->vif_event_lock); 6700 wake_up(&event->vif_wq); 6701 return 0; 6702 6703 default: 6704 spin_unlock(&event->vif_event_lock); 6705 break; 6706 } 6707 return -EINVAL; 6708 } 6709 6710 static void brcmf_init_conf(struct brcmf_cfg80211_conf *conf) 6711 { 6712 conf->frag_threshold = (u32)-1; 6713 conf->rts_threshold = (u32)-1; 6714 conf->retry_short = (u32)-1; 6715 conf->retry_long = (u32)-1; 6716 } 6717 6718 static void brcmf_register_event_handlers(struct brcmf_cfg80211_info *cfg) 6719 { 6720 brcmf_fweh_register(cfg->pub, BRCMF_E_LINK, 6721 brcmf_notify_connect_status); 6722 brcmf_fweh_register(cfg->pub, BRCMF_E_DEAUTH_IND, 6723 brcmf_notify_connect_status); 6724 brcmf_fweh_register(cfg->pub, BRCMF_E_DEAUTH, 6725 brcmf_notify_connect_status); 6726 brcmf_fweh_register(cfg->pub, BRCMF_E_DISASSOC_IND, 6727 brcmf_notify_connect_status); 6728 brcmf_fweh_register(cfg->pub, BRCMF_E_ASSOC_IND, 6729 brcmf_notify_connect_status); 6730 brcmf_fweh_register(cfg->pub, BRCMF_E_REASSOC_IND, 6731 brcmf_notify_connect_status); 6732 brcmf_fweh_register(cfg->pub, BRCMF_E_ROAM, 6733 brcmf_notify_roaming_status); 6734 brcmf_fweh_register(cfg->pub, BRCMF_E_MIC_ERROR, 6735 brcmf_notify_mic_status); 6736 brcmf_fweh_register(cfg->pub, BRCMF_E_SET_SSID, 6737 brcmf_notify_connect_status); 6738 brcmf_fweh_register(cfg->pub, BRCMF_E_PFN_NET_FOUND, 6739 brcmf_notify_sched_scan_results); 6740 brcmf_fweh_register(cfg->pub, BRCMF_E_IF, 6741 brcmf_notify_vif_event); 6742 brcmf_fweh_register(cfg->pub, BRCMF_E_P2P_PROBEREQ_MSG, 6743 brcmf_p2p_notify_rx_mgmt_p2p_probereq); 6744 brcmf_fweh_register(cfg->pub, BRCMF_E_P2P_DISC_LISTEN_COMPLETE, 6745 brcmf_p2p_notify_listen_complete); 6746 brcmf_fweh_register(cfg->pub, BRCMF_E_ACTION_FRAME_RX, 6747 brcmf_p2p_notify_action_frame_rx); 6748 brcmf_fweh_register(cfg->pub, BRCMF_E_ACTION_FRAME_COMPLETE, 6749 brcmf_p2p_notify_action_tx_complete); 6750 brcmf_fweh_register(cfg->pub, BRCMF_E_ACTION_FRAME_OFF_CHAN_COMPLETE, 6751 brcmf_p2p_notify_action_tx_complete); 6752 brcmf_fweh_register(cfg->pub, BRCMF_E_PSK_SUP, 6753 brcmf_notify_connect_status); 6754 brcmf_fweh_register(cfg->pub, BRCMF_E_RSSI, brcmf_notify_rssi); 6755 } 6756 6757 static void brcmf_deinit_priv_mem(struct brcmf_cfg80211_info *cfg) 6758 { 6759 kfree(cfg->conf); 6760 cfg->conf = NULL; 6761 kfree(cfg->extra_buf); 6762 cfg->extra_buf = NULL; 6763 kfree(cfg->wowl.nd); 6764 cfg->wowl.nd = NULL; 6765 kfree(cfg->wowl.nd_info); 6766 cfg->wowl.nd_info = NULL; 6767 kfree(cfg->escan_info.escan_buf); 6768 cfg->escan_info.escan_buf = NULL; 6769 } 6770 6771 static s32 brcmf_init_priv_mem(struct brcmf_cfg80211_info *cfg) 6772 { 6773 cfg->conf = kzalloc(sizeof(*cfg->conf), GFP_KERNEL); 6774 if (!cfg->conf) 6775 goto init_priv_mem_out; 6776 cfg->extra_buf = kzalloc(WL_EXTRA_BUF_MAX, GFP_KERNEL); 6777 if (!cfg->extra_buf) 6778 goto init_priv_mem_out; 6779 cfg->wowl.nd = kzalloc(sizeof(*cfg->wowl.nd) + sizeof(u32), GFP_KERNEL); 6780 if (!cfg->wowl.nd) 6781 goto init_priv_mem_out; 6782 cfg->wowl.nd_info = kzalloc(sizeof(*cfg->wowl.nd_info) + 6783 sizeof(struct cfg80211_wowlan_nd_match *), 6784 GFP_KERNEL); 6785 if (!cfg->wowl.nd_info) 6786 goto init_priv_mem_out; 6787 cfg->escan_info.escan_buf = kzalloc(BRCMF_ESCAN_BUF_SIZE, GFP_KERNEL); 6788 if (!cfg->escan_info.escan_buf) 6789 goto init_priv_mem_out; 6790 6791 return 0; 6792 6793 init_priv_mem_out: 6794 brcmf_deinit_priv_mem(cfg); 6795 6796 return -ENOMEM; 6797 } 6798 6799 static s32 wl_init_priv(struct brcmf_cfg80211_info *cfg) 6800 { 6801 s32 err = 0; 6802 6803 cfg->scan_request = NULL; 6804 cfg->pwr_save = true; 6805 cfg->dongle_up = false; /* dongle is not up yet */ 6806 err = brcmf_init_priv_mem(cfg); 6807 if (err) 6808 return err; 6809 brcmf_register_event_handlers(cfg); 6810 mutex_init(&cfg->usr_sync); 6811 brcmf_init_escan(cfg); 6812 brcmf_init_conf(cfg->conf); 6813 brcmf_init_wmm_prio(cfg->ac_priority); 6814 init_completion(&cfg->vif_disabled); 6815 return err; 6816 } 6817 6818 static void wl_deinit_priv(struct brcmf_cfg80211_info *cfg) 6819 { 6820 cfg->dongle_up = false; /* dongle down */ 6821 brcmf_abort_scanning(cfg); 6822 brcmf_deinit_priv_mem(cfg); 6823 brcmf_clear_assoc_ies(cfg); 6824 } 6825 6826 static void init_vif_event(struct brcmf_cfg80211_vif_event *event) 6827 { 6828 init_waitqueue_head(&event->vif_wq); 6829 spin_lock_init(&event->vif_event_lock); 6830 } 6831 6832 static s32 brcmf_dongle_roam(struct brcmf_if *ifp) 6833 { 6834 struct brcmf_pub *drvr = ifp->drvr; 6835 s32 err; 6836 u32 bcn_timeout; 6837 __le32 roamtrigger[2]; 6838 __le32 roam_delta[2]; 6839 6840 /* Configure beacon timeout value based upon roaming setting */ 6841 if (ifp->drvr->settings->roamoff) 6842 bcn_timeout = BRCMF_DEFAULT_BCN_TIMEOUT_ROAM_OFF; 6843 else 6844 bcn_timeout = BRCMF_DEFAULT_BCN_TIMEOUT_ROAM_ON; 6845 err = brcmf_fil_iovar_int_set(ifp, "bcn_timeout", bcn_timeout); 6846 if (err) { 6847 bphy_err(drvr, "bcn_timeout error (%d)\n", err); 6848 goto roam_setup_done; 6849 } 6850 6851 /* Enable/Disable built-in roaming to allow supplicant to take care of 6852 * roaming. 6853 */ 6854 brcmf_dbg(INFO, "Internal Roaming = %s\n", 6855 ifp->drvr->settings->roamoff ? "Off" : "On"); 6856 err = brcmf_fil_iovar_int_set(ifp, "roam_off", 6857 ifp->drvr->settings->roamoff); 6858 if (err) { 6859 bphy_err(drvr, "roam_off error (%d)\n", err); 6860 goto roam_setup_done; 6861 } 6862 6863 roamtrigger[0] = cpu_to_le32(WL_ROAM_TRIGGER_LEVEL); 6864 roamtrigger[1] = cpu_to_le32(BRCM_BAND_ALL); 6865 err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_ROAM_TRIGGER, 6866 (void *)roamtrigger, sizeof(roamtrigger)); 6867 if (err) 6868 bphy_err(drvr, "WLC_SET_ROAM_TRIGGER error (%d)\n", err); 6869 6870 roam_delta[0] = cpu_to_le32(WL_ROAM_DELTA); 6871 roam_delta[1] = cpu_to_le32(BRCM_BAND_ALL); 6872 err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_ROAM_DELTA, 6873 (void *)roam_delta, sizeof(roam_delta)); 6874 if (err) 6875 bphy_err(drvr, "WLC_SET_ROAM_DELTA error (%d)\n", err); 6876 6877 return 0; 6878 6879 roam_setup_done: 6880 return err; 6881 } 6882 6883 static s32 6884 brcmf_dongle_scantime(struct brcmf_if *ifp) 6885 { 6886 struct brcmf_pub *drvr = ifp->drvr; 6887 s32 err = 0; 6888 6889 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_SCAN_CHANNEL_TIME, 6890 BRCMF_SCAN_CHANNEL_TIME); 6891 if (err) { 6892 bphy_err(drvr, "Scan assoc time error (%d)\n", err); 6893 goto dongle_scantime_out; 6894 } 6895 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_SCAN_UNASSOC_TIME, 6896 BRCMF_SCAN_UNASSOC_TIME); 6897 if (err) { 6898 bphy_err(drvr, "Scan unassoc time error (%d)\n", err); 6899 goto dongle_scantime_out; 6900 } 6901 6902 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_SCAN_PASSIVE_TIME, 6903 BRCMF_SCAN_PASSIVE_TIME); 6904 if (err) { 6905 bphy_err(drvr, "Scan passive time error (%d)\n", err); 6906 goto dongle_scantime_out; 6907 } 6908 6909 dongle_scantime_out: 6910 return err; 6911 } 6912 6913 static void brcmf_update_bw40_channel_flag(struct ieee80211_channel *channel, 6914 struct brcmu_chan *ch) 6915 { 6916 u32 ht40_flag; 6917 6918 ht40_flag = channel->flags & IEEE80211_CHAN_NO_HT40; 6919 if (ch->sb == BRCMU_CHAN_SB_U) { 6920 if (ht40_flag == IEEE80211_CHAN_NO_HT40) 6921 channel->flags &= ~IEEE80211_CHAN_NO_HT40; 6922 channel->flags |= IEEE80211_CHAN_NO_HT40PLUS; 6923 } else { 6924 /* It should be one of 6925 * IEEE80211_CHAN_NO_HT40 or 6926 * IEEE80211_CHAN_NO_HT40PLUS 6927 */ 6928 channel->flags &= ~IEEE80211_CHAN_NO_HT40; 6929 if (ht40_flag == IEEE80211_CHAN_NO_HT40) 6930 channel->flags |= IEEE80211_CHAN_NO_HT40MINUS; 6931 } 6932 } 6933 6934 static int brcmf_construct_chaninfo(struct brcmf_cfg80211_info *cfg, 6935 u32 bw_cap[]) 6936 { 6937 struct wiphy *wiphy = cfg_to_wiphy(cfg); 6938 struct brcmf_pub *drvr = cfg->pub; 6939 struct brcmf_if *ifp = brcmf_get_ifp(drvr, 0); 6940 struct ieee80211_supported_band *band; 6941 struct ieee80211_channel *channel; 6942 struct brcmf_chanspec_list *list; 6943 struct brcmu_chan ch; 6944 int err; 6945 u8 *pbuf; 6946 u32 i, j; 6947 u32 total; 6948 u32 chaninfo; 6949 6950 pbuf = kzalloc(BRCMF_DCMD_MEDLEN, GFP_KERNEL); 6951 6952 if (pbuf == NULL) 6953 return -ENOMEM; 6954 6955 list = (struct brcmf_chanspec_list *)pbuf; 6956 6957 err = brcmf_fil_iovar_data_get(ifp, "chanspecs", pbuf, 6958 BRCMF_DCMD_MEDLEN); 6959 if (err) { 6960 bphy_err(drvr, "get chanspecs error (%d)\n", err); 6961 goto fail_pbuf; 6962 } 6963 6964 band = wiphy->bands[NL80211_BAND_2GHZ]; 6965 if (band) 6966 for (i = 0; i < band->n_channels; i++) 6967 band->channels[i].flags = IEEE80211_CHAN_DISABLED; 6968 band = wiphy->bands[NL80211_BAND_5GHZ]; 6969 if (band) 6970 for (i = 0; i < band->n_channels; i++) 6971 band->channels[i].flags = IEEE80211_CHAN_DISABLED; 6972 6973 total = le32_to_cpu(list->count); 6974 if (total > BRCMF_MAX_CHANSPEC_LIST) { 6975 bphy_err(drvr, "Invalid count of channel Spec. (%u)\n", 6976 total); 6977 err = -EINVAL; 6978 goto fail_pbuf; 6979 } 6980 6981 for (i = 0; i < total; i++) { 6982 ch.chspec = (u16)le32_to_cpu(list->element[i]); 6983 cfg->d11inf.decchspec(&ch); 6984 6985 if (ch.band == BRCMU_CHAN_BAND_2G) { 6986 band = wiphy->bands[NL80211_BAND_2GHZ]; 6987 } else if (ch.band == BRCMU_CHAN_BAND_5G) { 6988 band = wiphy->bands[NL80211_BAND_5GHZ]; 6989 } else { 6990 bphy_err(drvr, "Invalid channel Spec. 0x%x.\n", 6991 ch.chspec); 6992 continue; 6993 } 6994 if (!band) 6995 continue; 6996 if (!(bw_cap[band->band] & WLC_BW_40MHZ_BIT) && 6997 ch.bw == BRCMU_CHAN_BW_40) 6998 continue; 6999 if (!(bw_cap[band->band] & WLC_BW_80MHZ_BIT) && 7000 ch.bw == BRCMU_CHAN_BW_80) 7001 continue; 7002 7003 channel = NULL; 7004 for (j = 0; j < band->n_channels; j++) { 7005 if (band->channels[j].hw_value == ch.control_ch_num) { 7006 channel = &band->channels[j]; 7007 break; 7008 } 7009 } 7010 if (!channel) { 7011 /* It seems firmware supports some channel we never 7012 * considered. Something new in IEEE standard? 7013 */ 7014 bphy_err(drvr, "Ignoring unexpected firmware channel %d\n", 7015 ch.control_ch_num); 7016 continue; 7017 } 7018 7019 if (channel->orig_flags & IEEE80211_CHAN_DISABLED) 7020 continue; 7021 7022 /* assuming the chanspecs order is HT20, 7023 * HT40 upper, HT40 lower, and VHT80. 7024 */ 7025 switch (ch.bw) { 7026 case BRCMU_CHAN_BW_160: 7027 channel->flags &= ~IEEE80211_CHAN_NO_160MHZ; 7028 break; 7029 case BRCMU_CHAN_BW_80: 7030 channel->flags &= ~IEEE80211_CHAN_NO_80MHZ; 7031 break; 7032 case BRCMU_CHAN_BW_40: 7033 brcmf_update_bw40_channel_flag(channel, &ch); 7034 break; 7035 default: 7036 wiphy_warn(wiphy, "Firmware reported unsupported bandwidth %d\n", 7037 ch.bw); 7038 fallthrough; 7039 case BRCMU_CHAN_BW_20: 7040 /* enable the channel and disable other bandwidths 7041 * for now as mentioned order assure they are enabled 7042 * for subsequent chanspecs. 7043 */ 7044 channel->flags = IEEE80211_CHAN_NO_HT40 | 7045 IEEE80211_CHAN_NO_80MHZ | 7046 IEEE80211_CHAN_NO_160MHZ; 7047 ch.bw = BRCMU_CHAN_BW_20; 7048 cfg->d11inf.encchspec(&ch); 7049 chaninfo = ch.chspec; 7050 err = brcmf_fil_bsscfg_int_get(ifp, "per_chan_info", 7051 &chaninfo); 7052 if (!err) { 7053 if (chaninfo & WL_CHAN_RADAR) 7054 channel->flags |= 7055 (IEEE80211_CHAN_RADAR | 7056 IEEE80211_CHAN_NO_IR); 7057 if (chaninfo & WL_CHAN_PASSIVE) 7058 channel->flags |= 7059 IEEE80211_CHAN_NO_IR; 7060 } 7061 } 7062 } 7063 7064 fail_pbuf: 7065 kfree(pbuf); 7066 return err; 7067 } 7068 7069 static int brcmf_enable_bw40_2g(struct brcmf_cfg80211_info *cfg) 7070 { 7071 struct brcmf_pub *drvr = cfg->pub; 7072 struct brcmf_if *ifp = brcmf_get_ifp(drvr, 0); 7073 struct ieee80211_supported_band *band; 7074 struct brcmf_fil_bwcap_le band_bwcap; 7075 struct brcmf_chanspec_list *list; 7076 u8 *pbuf; 7077 u32 val; 7078 int err; 7079 struct brcmu_chan ch; 7080 u32 num_chan; 7081 int i, j; 7082 7083 /* verify support for bw_cap command */ 7084 val = WLC_BAND_5G; 7085 err = brcmf_fil_iovar_int_get(ifp, "bw_cap", &val); 7086 7087 if (!err) { 7088 /* only set 2G bandwidth using bw_cap command */ 7089 band_bwcap.band = cpu_to_le32(WLC_BAND_2G); 7090 band_bwcap.bw_cap = cpu_to_le32(WLC_BW_CAP_40MHZ); 7091 err = brcmf_fil_iovar_data_set(ifp, "bw_cap", &band_bwcap, 7092 sizeof(band_bwcap)); 7093 } else { 7094 brcmf_dbg(INFO, "fallback to mimo_bw_cap\n"); 7095 val = WLC_N_BW_40ALL; 7096 err = brcmf_fil_iovar_int_set(ifp, "mimo_bw_cap", val); 7097 } 7098 7099 if (!err) { 7100 /* update channel info in 2G band */ 7101 pbuf = kzalloc(BRCMF_DCMD_MEDLEN, GFP_KERNEL); 7102 7103 if (pbuf == NULL) 7104 return -ENOMEM; 7105 7106 ch.band = BRCMU_CHAN_BAND_2G; 7107 ch.bw = BRCMU_CHAN_BW_40; 7108 ch.sb = BRCMU_CHAN_SB_NONE; 7109 ch.chnum = 0; 7110 cfg->d11inf.encchspec(&ch); 7111 7112 /* pass encoded chanspec in query */ 7113 *(__le16 *)pbuf = cpu_to_le16(ch.chspec); 7114 7115 err = brcmf_fil_iovar_data_get(ifp, "chanspecs", pbuf, 7116 BRCMF_DCMD_MEDLEN); 7117 if (err) { 7118 bphy_err(drvr, "get chanspecs error (%d)\n", err); 7119 kfree(pbuf); 7120 return err; 7121 } 7122 7123 band = cfg_to_wiphy(cfg)->bands[NL80211_BAND_2GHZ]; 7124 list = (struct brcmf_chanspec_list *)pbuf; 7125 num_chan = le32_to_cpu(list->count); 7126 if (num_chan > BRCMF_MAX_CHANSPEC_LIST) { 7127 bphy_err(drvr, "Invalid count of channel Spec. (%u)\n", 7128 num_chan); 7129 kfree(pbuf); 7130 return -EINVAL; 7131 } 7132 7133 for (i = 0; i < num_chan; i++) { 7134 ch.chspec = (u16)le32_to_cpu(list->element[i]); 7135 cfg->d11inf.decchspec(&ch); 7136 if (WARN_ON(ch.band != BRCMU_CHAN_BAND_2G)) 7137 continue; 7138 if (WARN_ON(ch.bw != BRCMU_CHAN_BW_40)) 7139 continue; 7140 for (j = 0; j < band->n_channels; j++) { 7141 if (band->channels[j].hw_value == ch.control_ch_num) 7142 break; 7143 } 7144 if (WARN_ON(j == band->n_channels)) 7145 continue; 7146 7147 brcmf_update_bw40_channel_flag(&band->channels[j], &ch); 7148 } 7149 kfree(pbuf); 7150 } 7151 return err; 7152 } 7153 7154 static void brcmf_get_bwcap(struct brcmf_if *ifp, u32 bw_cap[]) 7155 { 7156 struct brcmf_pub *drvr = ifp->drvr; 7157 u32 band, mimo_bwcap; 7158 int err; 7159 7160 band = WLC_BAND_2G; 7161 err = brcmf_fil_iovar_int_get(ifp, "bw_cap", &band); 7162 if (!err) { 7163 bw_cap[NL80211_BAND_2GHZ] = band; 7164 band = WLC_BAND_5G; 7165 err = brcmf_fil_iovar_int_get(ifp, "bw_cap", &band); 7166 if (!err) { 7167 bw_cap[NL80211_BAND_5GHZ] = band; 7168 return; 7169 } 7170 WARN_ON(1); 7171 return; 7172 } 7173 brcmf_dbg(INFO, "fallback to mimo_bw_cap info\n"); 7174 mimo_bwcap = 0; 7175 err = brcmf_fil_iovar_int_get(ifp, "mimo_bw_cap", &mimo_bwcap); 7176 if (err) 7177 /* assume 20MHz if firmware does not give a clue */ 7178 mimo_bwcap = WLC_N_BW_20ALL; 7179 7180 switch (mimo_bwcap) { 7181 case WLC_N_BW_40ALL: 7182 bw_cap[NL80211_BAND_2GHZ] |= WLC_BW_40MHZ_BIT; 7183 fallthrough; 7184 case WLC_N_BW_20IN2G_40IN5G: 7185 bw_cap[NL80211_BAND_5GHZ] |= WLC_BW_40MHZ_BIT; 7186 fallthrough; 7187 case WLC_N_BW_20ALL: 7188 bw_cap[NL80211_BAND_2GHZ] |= WLC_BW_20MHZ_BIT; 7189 bw_cap[NL80211_BAND_5GHZ] |= WLC_BW_20MHZ_BIT; 7190 break; 7191 default: 7192 bphy_err(drvr, "invalid mimo_bw_cap value\n"); 7193 } 7194 } 7195 7196 static void brcmf_update_ht_cap(struct ieee80211_supported_band *band, 7197 u32 bw_cap[2], u32 nchain) 7198 { 7199 band->ht_cap.ht_supported = true; 7200 if (bw_cap[band->band] & WLC_BW_40MHZ_BIT) { 7201 band->ht_cap.cap |= IEEE80211_HT_CAP_SGI_40; 7202 band->ht_cap.cap |= IEEE80211_HT_CAP_SUP_WIDTH_20_40; 7203 } 7204 band->ht_cap.cap |= IEEE80211_HT_CAP_SGI_20; 7205 band->ht_cap.cap |= IEEE80211_HT_CAP_DSSSCCK40; 7206 band->ht_cap.ampdu_factor = IEEE80211_HT_MAX_AMPDU_64K; 7207 band->ht_cap.ampdu_density = IEEE80211_HT_MPDU_DENSITY_16; 7208 memset(band->ht_cap.mcs.rx_mask, 0xff, nchain); 7209 band->ht_cap.mcs.tx_params = IEEE80211_HT_MCS_TX_DEFINED; 7210 } 7211 7212 static __le16 brcmf_get_mcs_map(u32 nchain, enum ieee80211_vht_mcs_support supp) 7213 { 7214 u16 mcs_map; 7215 int i; 7216 7217 for (i = 0, mcs_map = 0xFFFF; i < nchain; i++) 7218 mcs_map = (mcs_map << 2) | supp; 7219 7220 return cpu_to_le16(mcs_map); 7221 } 7222 7223 static void brcmf_update_vht_cap(struct ieee80211_supported_band *band, 7224 u32 bw_cap[2], u32 nchain, u32 txstreams, 7225 u32 txbf_bfe_cap, u32 txbf_bfr_cap) 7226 { 7227 __le16 mcs_map; 7228 7229 /* not allowed in 2.4G band */ 7230 if (band->band == NL80211_BAND_2GHZ) 7231 return; 7232 7233 band->vht_cap.vht_supported = true; 7234 /* 80MHz is mandatory */ 7235 band->vht_cap.cap |= IEEE80211_VHT_CAP_SHORT_GI_80; 7236 if (bw_cap[band->band] & WLC_BW_160MHZ_BIT) { 7237 band->vht_cap.cap |= IEEE80211_VHT_CAP_SUPP_CHAN_WIDTH_160MHZ; 7238 band->vht_cap.cap |= IEEE80211_VHT_CAP_SHORT_GI_160; 7239 } 7240 /* all support 256-QAM */ 7241 mcs_map = brcmf_get_mcs_map(nchain, IEEE80211_VHT_MCS_SUPPORT_0_9); 7242 band->vht_cap.vht_mcs.rx_mcs_map = mcs_map; 7243 band->vht_cap.vht_mcs.tx_mcs_map = mcs_map; 7244 7245 /* Beamforming support information */ 7246 if (txbf_bfe_cap & BRCMF_TXBF_SU_BFE_CAP) 7247 band->vht_cap.cap |= IEEE80211_VHT_CAP_SU_BEAMFORMEE_CAPABLE; 7248 if (txbf_bfe_cap & BRCMF_TXBF_MU_BFE_CAP) 7249 band->vht_cap.cap |= IEEE80211_VHT_CAP_MU_BEAMFORMEE_CAPABLE; 7250 if (txbf_bfr_cap & BRCMF_TXBF_SU_BFR_CAP) 7251 band->vht_cap.cap |= IEEE80211_VHT_CAP_SU_BEAMFORMER_CAPABLE; 7252 if (txbf_bfr_cap & BRCMF_TXBF_MU_BFR_CAP) 7253 band->vht_cap.cap |= IEEE80211_VHT_CAP_MU_BEAMFORMER_CAPABLE; 7254 7255 if ((txbf_bfe_cap || txbf_bfr_cap) && (txstreams > 1)) { 7256 band->vht_cap.cap |= 7257 (2 << IEEE80211_VHT_CAP_BEAMFORMEE_STS_SHIFT); 7258 band->vht_cap.cap |= ((txstreams - 1) << 7259 IEEE80211_VHT_CAP_SOUNDING_DIMENSIONS_SHIFT); 7260 band->vht_cap.cap |= 7261 IEEE80211_VHT_CAP_VHT_LINK_ADAPTATION_VHT_MRQ_MFB; 7262 } 7263 } 7264 7265 static int brcmf_setup_wiphybands(struct brcmf_cfg80211_info *cfg) 7266 { 7267 struct brcmf_pub *drvr = cfg->pub; 7268 struct brcmf_if *ifp = brcmf_get_ifp(drvr, 0); 7269 struct wiphy *wiphy = cfg_to_wiphy(cfg); 7270 u32 nmode = 0; 7271 u32 vhtmode = 0; 7272 u32 bw_cap[2] = { WLC_BW_20MHZ_BIT, WLC_BW_20MHZ_BIT }; 7273 u32 rxchain; 7274 u32 nchain; 7275 int err; 7276 s32 i; 7277 struct ieee80211_supported_band *band; 7278 u32 txstreams = 0; 7279 u32 txbf_bfe_cap = 0; 7280 u32 txbf_bfr_cap = 0; 7281 7282 (void)brcmf_fil_iovar_int_get(ifp, "vhtmode", &vhtmode); 7283 err = brcmf_fil_iovar_int_get(ifp, "nmode", &nmode); 7284 if (err) { 7285 bphy_err(drvr, "nmode error (%d)\n", err); 7286 } else { 7287 brcmf_get_bwcap(ifp, bw_cap); 7288 } 7289 brcmf_dbg(INFO, "nmode=%d, vhtmode=%d, bw_cap=(%d, %d)\n", 7290 nmode, vhtmode, bw_cap[NL80211_BAND_2GHZ], 7291 bw_cap[NL80211_BAND_5GHZ]); 7292 7293 err = brcmf_fil_iovar_int_get(ifp, "rxchain", &rxchain); 7294 if (err) { 7295 /* rxchain unsupported by firmware of older chips */ 7296 if (err == -EBADE) 7297 bphy_info_once(drvr, "rxchain unsupported\n"); 7298 else 7299 bphy_err(drvr, "rxchain error (%d)\n", err); 7300 7301 nchain = 1; 7302 } else { 7303 for (nchain = 0; rxchain; nchain++) 7304 rxchain = rxchain & (rxchain - 1); 7305 } 7306 brcmf_dbg(INFO, "nchain=%d\n", nchain); 7307 7308 err = brcmf_construct_chaninfo(cfg, bw_cap); 7309 if (err) { 7310 bphy_err(drvr, "brcmf_construct_chaninfo failed (%d)\n", err); 7311 return err; 7312 } 7313 7314 if (vhtmode) { 7315 (void)brcmf_fil_iovar_int_get(ifp, "txstreams", &txstreams); 7316 (void)brcmf_fil_iovar_int_get(ifp, "txbf_bfe_cap", 7317 &txbf_bfe_cap); 7318 (void)brcmf_fil_iovar_int_get(ifp, "txbf_bfr_cap", 7319 &txbf_bfr_cap); 7320 } 7321 7322 for (i = 0; i < ARRAY_SIZE(wiphy->bands); i++) { 7323 band = wiphy->bands[i]; 7324 if (band == NULL) 7325 continue; 7326 7327 if (nmode) 7328 brcmf_update_ht_cap(band, bw_cap, nchain); 7329 if (vhtmode) 7330 brcmf_update_vht_cap(band, bw_cap, nchain, txstreams, 7331 txbf_bfe_cap, txbf_bfr_cap); 7332 } 7333 7334 return 0; 7335 } 7336 7337 static const struct ieee80211_txrx_stypes 7338 brcmf_txrx_stypes[NUM_NL80211_IFTYPES] = { 7339 [NL80211_IFTYPE_STATION] = { 7340 .tx = 0xffff, 7341 .rx = BIT(IEEE80211_STYPE_ACTION >> 4) | 7342 BIT(IEEE80211_STYPE_PROBE_REQ >> 4) 7343 }, 7344 [NL80211_IFTYPE_P2P_CLIENT] = { 7345 .tx = 0xffff, 7346 .rx = BIT(IEEE80211_STYPE_ACTION >> 4) | 7347 BIT(IEEE80211_STYPE_PROBE_REQ >> 4) 7348 }, 7349 [NL80211_IFTYPE_P2P_GO] = { 7350 .tx = 0xffff, 7351 .rx = BIT(IEEE80211_STYPE_ASSOC_REQ >> 4) | 7352 BIT(IEEE80211_STYPE_REASSOC_REQ >> 4) | 7353 BIT(IEEE80211_STYPE_PROBE_REQ >> 4) | 7354 BIT(IEEE80211_STYPE_DISASSOC >> 4) | 7355 BIT(IEEE80211_STYPE_AUTH >> 4) | 7356 BIT(IEEE80211_STYPE_DEAUTH >> 4) | 7357 BIT(IEEE80211_STYPE_ACTION >> 4) 7358 }, 7359 [NL80211_IFTYPE_P2P_DEVICE] = { 7360 .tx = 0xffff, 7361 .rx = BIT(IEEE80211_STYPE_ACTION >> 4) | 7362 BIT(IEEE80211_STYPE_PROBE_REQ >> 4) 7363 }, 7364 [NL80211_IFTYPE_AP] = { 7365 .tx = 0xffff, 7366 .rx = BIT(IEEE80211_STYPE_ASSOC_REQ >> 4) | 7367 BIT(IEEE80211_STYPE_REASSOC_REQ >> 4) | 7368 BIT(IEEE80211_STYPE_PROBE_REQ >> 4) | 7369 BIT(IEEE80211_STYPE_DISASSOC >> 4) | 7370 BIT(IEEE80211_STYPE_AUTH >> 4) | 7371 BIT(IEEE80211_STYPE_DEAUTH >> 4) | 7372 BIT(IEEE80211_STYPE_ACTION >> 4) 7373 } 7374 }; 7375 7376 /** 7377 * brcmf_setup_ifmodes() - determine interface modes and combinations. 7378 * 7379 * @wiphy: wiphy object. 7380 * @ifp: interface object needed for feat module api. 7381 * 7382 * The interface modes and combinations are determined dynamically here 7383 * based on firmware functionality. 7384 * 7385 * no p2p and no mbss: 7386 * 7387 * #STA <= 1, #AP <= 1, channels = 1, 2 total 7388 * 7389 * no p2p and mbss: 7390 * 7391 * #STA <= 1, #AP <= 1, channels = 1, 2 total 7392 * #AP <= 4, matching BI, channels = 1, 4 total 7393 * 7394 * no p2p and rsdb: 7395 * #STA <= 1, #AP <= 2, channels = 2, 4 total 7396 * 7397 * p2p, no mchan, and mbss: 7398 * 7399 * #STA <= 1, #P2P-DEV <= 1, #{P2P-CL, P2P-GO} <= 1, channels = 1, 3 total 7400 * #STA <= 1, #P2P-DEV <= 1, #AP <= 1, #P2P-CL <= 1, channels = 1, 4 total 7401 * #AP <= 4, matching BI, channels = 1, 4 total 7402 * 7403 * p2p, mchan, and mbss: 7404 * 7405 * #STA <= 2, #P2P-DEV <= 1, #{P2P-CL, P2P-GO} <= 1, channels = 2, 3 total 7406 * #STA <= 1, #P2P-DEV <= 1, #AP <= 1, #P2P-CL <= 1, channels = 1, 4 total 7407 * #AP <= 4, matching BI, channels = 1, 4 total 7408 * 7409 * p2p, rsdb, and no mbss: 7410 * #STA <= 1, #P2P-DEV <= 1, #{P2P-CL, P2P-GO} <= 2, AP <= 2, 7411 * channels = 2, 4 total 7412 */ 7413 static int brcmf_setup_ifmodes(struct wiphy *wiphy, struct brcmf_if *ifp) 7414 { 7415 struct ieee80211_iface_combination *combo = NULL; 7416 struct ieee80211_iface_limit *c0_limits = NULL; 7417 struct ieee80211_iface_limit *p2p_limits = NULL; 7418 struct ieee80211_iface_limit *mbss_limits = NULL; 7419 bool mon_flag, mbss, p2p, rsdb, mchan; 7420 int i, c, n_combos, n_limits; 7421 7422 mon_flag = brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MONITOR_FLAG); 7423 mbss = brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MBSS); 7424 p2p = brcmf_feat_is_enabled(ifp, BRCMF_FEAT_P2P); 7425 rsdb = brcmf_feat_is_enabled(ifp, BRCMF_FEAT_RSDB); 7426 mchan = brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MCHAN); 7427 7428 n_combos = 1 + !!(p2p && !rsdb) + !!mbss; 7429 combo = kcalloc(n_combos, sizeof(*combo), GFP_KERNEL); 7430 if (!combo) 7431 goto err; 7432 7433 wiphy->interface_modes = BIT(NL80211_IFTYPE_STATION) | 7434 BIT(NL80211_IFTYPE_ADHOC) | 7435 BIT(NL80211_IFTYPE_AP); 7436 if (mon_flag) 7437 wiphy->interface_modes |= BIT(NL80211_IFTYPE_MONITOR); 7438 if (p2p) 7439 wiphy->interface_modes |= BIT(NL80211_IFTYPE_P2P_CLIENT) | 7440 BIT(NL80211_IFTYPE_P2P_GO) | 7441 BIT(NL80211_IFTYPE_P2P_DEVICE); 7442 7443 c = 0; 7444 i = 0; 7445 n_limits = 1 + mon_flag + (p2p ? 2 : 0) + (rsdb || !p2p); 7446 c0_limits = kcalloc(n_limits, sizeof(*c0_limits), GFP_KERNEL); 7447 if (!c0_limits) 7448 goto err; 7449 7450 combo[c].num_different_channels = 1 + (rsdb || (p2p && mchan)); 7451 c0_limits[i].max = 1 + (p2p && mchan); 7452 c0_limits[i++].types = BIT(NL80211_IFTYPE_STATION); 7453 if (mon_flag) { 7454 c0_limits[i].max = 1; 7455 c0_limits[i++].types = BIT(NL80211_IFTYPE_MONITOR); 7456 } 7457 if (p2p) { 7458 c0_limits[i].max = 1; 7459 c0_limits[i++].types = BIT(NL80211_IFTYPE_P2P_DEVICE); 7460 c0_limits[i].max = 1 + rsdb; 7461 c0_limits[i++].types = BIT(NL80211_IFTYPE_P2P_CLIENT) | 7462 BIT(NL80211_IFTYPE_P2P_GO); 7463 } 7464 if (p2p && rsdb) { 7465 c0_limits[i].max = 2; 7466 c0_limits[i++].types = BIT(NL80211_IFTYPE_AP); 7467 combo[c].max_interfaces = 4; 7468 } else if (p2p) { 7469 combo[c].max_interfaces = i; 7470 } else if (rsdb) { 7471 c0_limits[i].max = 2; 7472 c0_limits[i++].types = BIT(NL80211_IFTYPE_AP); 7473 combo[c].max_interfaces = 3; 7474 } else { 7475 c0_limits[i].max = 1; 7476 c0_limits[i++].types = BIT(NL80211_IFTYPE_AP); 7477 combo[c].max_interfaces = i; 7478 } 7479 combo[c].n_limits = i; 7480 combo[c].limits = c0_limits; 7481 7482 if (p2p && !rsdb) { 7483 c++; 7484 i = 0; 7485 p2p_limits = kcalloc(4, sizeof(*p2p_limits), GFP_KERNEL); 7486 if (!p2p_limits) 7487 goto err; 7488 p2p_limits[i].max = 1; 7489 p2p_limits[i++].types = BIT(NL80211_IFTYPE_STATION); 7490 p2p_limits[i].max = 1; 7491 p2p_limits[i++].types = BIT(NL80211_IFTYPE_AP); 7492 p2p_limits[i].max = 1; 7493 p2p_limits[i++].types = BIT(NL80211_IFTYPE_P2P_CLIENT); 7494 p2p_limits[i].max = 1; 7495 p2p_limits[i++].types = BIT(NL80211_IFTYPE_P2P_DEVICE); 7496 combo[c].num_different_channels = 1; 7497 combo[c].max_interfaces = i; 7498 combo[c].n_limits = i; 7499 combo[c].limits = p2p_limits; 7500 } 7501 7502 if (mbss) { 7503 c++; 7504 i = 0; 7505 n_limits = 1 + mon_flag; 7506 mbss_limits = kcalloc(n_limits, sizeof(*mbss_limits), 7507 GFP_KERNEL); 7508 if (!mbss_limits) 7509 goto err; 7510 mbss_limits[i].max = 4; 7511 mbss_limits[i++].types = BIT(NL80211_IFTYPE_AP); 7512 if (mon_flag) { 7513 mbss_limits[i].max = 1; 7514 mbss_limits[i++].types = BIT(NL80211_IFTYPE_MONITOR); 7515 } 7516 combo[c].beacon_int_infra_match = true; 7517 combo[c].num_different_channels = 1; 7518 combo[c].max_interfaces = 4 + mon_flag; 7519 combo[c].n_limits = i; 7520 combo[c].limits = mbss_limits; 7521 } 7522 7523 wiphy->n_iface_combinations = n_combos; 7524 wiphy->iface_combinations = combo; 7525 return 0; 7526 7527 err: 7528 kfree(c0_limits); 7529 kfree(p2p_limits); 7530 kfree(mbss_limits); 7531 kfree(combo); 7532 return -ENOMEM; 7533 } 7534 7535 #ifdef CONFIG_PM 7536 static const struct wiphy_wowlan_support brcmf_wowlan_support = { 7537 .flags = WIPHY_WOWLAN_MAGIC_PKT | WIPHY_WOWLAN_DISCONNECT, 7538 .n_patterns = BRCMF_WOWL_MAXPATTERNS, 7539 .pattern_max_len = BRCMF_WOWL_MAXPATTERNSIZE, 7540 .pattern_min_len = 1, 7541 .max_pkt_offset = 1500, 7542 }; 7543 #endif 7544 7545 static void brcmf_wiphy_wowl_params(struct wiphy *wiphy, struct brcmf_if *ifp) 7546 { 7547 #ifdef CONFIG_PM 7548 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 7549 struct brcmf_pub *drvr = cfg->pub; 7550 struct wiphy_wowlan_support *wowl; 7551 7552 wowl = kmemdup(&brcmf_wowlan_support, sizeof(brcmf_wowlan_support), 7553 GFP_KERNEL); 7554 if (!wowl) { 7555 bphy_err(drvr, "only support basic wowlan features\n"); 7556 wiphy->wowlan = &brcmf_wowlan_support; 7557 return; 7558 } 7559 7560 if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_PNO)) { 7561 if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_WOWL_ND)) { 7562 wowl->flags |= WIPHY_WOWLAN_NET_DETECT; 7563 wowl->max_nd_match_sets = BRCMF_PNO_MAX_PFN_COUNT; 7564 init_waitqueue_head(&cfg->wowl.nd_data_wait); 7565 } 7566 } 7567 if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_WOWL_GTK)) { 7568 wowl->flags |= WIPHY_WOWLAN_SUPPORTS_GTK_REKEY; 7569 wowl->flags |= WIPHY_WOWLAN_GTK_REKEY_FAILURE; 7570 } 7571 7572 wiphy->wowlan = wowl; 7573 #endif 7574 } 7575 7576 static int brcmf_setup_wiphy(struct wiphy *wiphy, struct brcmf_if *ifp) 7577 { 7578 struct brcmf_pub *drvr = ifp->drvr; 7579 const struct ieee80211_iface_combination *combo; 7580 struct ieee80211_supported_band *band; 7581 u16 max_interfaces = 0; 7582 bool gscan; 7583 __le32 bandlist[3]; 7584 u32 n_bands; 7585 int err, i; 7586 7587 wiphy->max_scan_ssids = WL_NUM_SCAN_MAX; 7588 wiphy->max_scan_ie_len = BRCMF_SCAN_IE_LEN_MAX; 7589 wiphy->max_num_pmkids = BRCMF_MAXPMKID; 7590 7591 err = brcmf_setup_ifmodes(wiphy, ifp); 7592 if (err) 7593 return err; 7594 7595 for (i = 0, combo = wiphy->iface_combinations; 7596 i < wiphy->n_iface_combinations; i++, combo++) { 7597 max_interfaces = max(max_interfaces, combo->max_interfaces); 7598 } 7599 7600 for (i = 0; i < max_interfaces && i < ARRAY_SIZE(drvr->addresses); 7601 i++) { 7602 u8 *addr = drvr->addresses[i].addr; 7603 7604 memcpy(addr, drvr->mac, ETH_ALEN); 7605 if (i) { 7606 addr[0] |= BIT(1); 7607 addr[ETH_ALEN - 1] ^= i; 7608 } 7609 } 7610 wiphy->addresses = drvr->addresses; 7611 wiphy->n_addresses = i; 7612 7613 wiphy->signal_type = CFG80211_SIGNAL_TYPE_MBM; 7614 wiphy->cipher_suites = brcmf_cipher_suites; 7615 wiphy->n_cipher_suites = ARRAY_SIZE(brcmf_cipher_suites); 7616 if (!brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MFP)) 7617 wiphy->n_cipher_suites--; 7618 wiphy->bss_select_support = BIT(NL80211_BSS_SELECT_ATTR_RSSI) | 7619 BIT(NL80211_BSS_SELECT_ATTR_BAND_PREF) | 7620 BIT(NL80211_BSS_SELECT_ATTR_RSSI_ADJUST); 7621 7622 wiphy->flags |= WIPHY_FLAG_NETNS_OK | 7623 WIPHY_FLAG_PS_ON_BY_DEFAULT | 7624 WIPHY_FLAG_HAVE_AP_SME | 7625 WIPHY_FLAG_OFFCHAN_TX | 7626 WIPHY_FLAG_HAS_REMAIN_ON_CHANNEL; 7627 if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_TDLS)) 7628 wiphy->flags |= WIPHY_FLAG_SUPPORTS_TDLS; 7629 if (!ifp->drvr->settings->roamoff) 7630 wiphy->flags |= WIPHY_FLAG_SUPPORTS_FW_ROAM; 7631 if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_FWSUP)) { 7632 wiphy_ext_feature_set(wiphy, 7633 NL80211_EXT_FEATURE_4WAY_HANDSHAKE_STA_PSK); 7634 wiphy_ext_feature_set(wiphy, 7635 NL80211_EXT_FEATURE_4WAY_HANDSHAKE_STA_1X); 7636 if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_SAE)) 7637 wiphy_ext_feature_set(wiphy, 7638 NL80211_EXT_FEATURE_SAE_OFFLOAD); 7639 } 7640 if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_FWAUTH)) { 7641 wiphy_ext_feature_set(wiphy, 7642 NL80211_EXT_FEATURE_4WAY_HANDSHAKE_AP_PSK); 7643 if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_SAE)) 7644 wiphy_ext_feature_set(wiphy, 7645 NL80211_EXT_FEATURE_SAE_OFFLOAD_AP); 7646 } 7647 wiphy->mgmt_stypes = brcmf_txrx_stypes; 7648 wiphy->max_remain_on_channel_duration = 5000; 7649 if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_PNO)) { 7650 gscan = brcmf_feat_is_enabled(ifp, BRCMF_FEAT_GSCAN); 7651 brcmf_pno_wiphy_params(wiphy, gscan); 7652 } 7653 /* vendor commands/events support */ 7654 wiphy->vendor_commands = brcmf_vendor_cmds; 7655 wiphy->n_vendor_commands = BRCMF_VNDR_CMDS_LAST - 1; 7656 7657 if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_WOWL)) 7658 brcmf_wiphy_wowl_params(wiphy, ifp); 7659 err = brcmf_fil_cmd_data_get(ifp, BRCMF_C_GET_BANDLIST, &bandlist, 7660 sizeof(bandlist)); 7661 if (err) { 7662 bphy_err(drvr, "could not obtain band info: err=%d\n", err); 7663 return err; 7664 } 7665 /* first entry in bandlist is number of bands */ 7666 n_bands = le32_to_cpu(bandlist[0]); 7667 for (i = 1; i <= n_bands && i < ARRAY_SIZE(bandlist); i++) { 7668 if (bandlist[i] == cpu_to_le32(WLC_BAND_2G)) { 7669 band = kmemdup(&__wl_band_2ghz, sizeof(__wl_band_2ghz), 7670 GFP_KERNEL); 7671 if (!band) 7672 return -ENOMEM; 7673 7674 band->channels = kmemdup(&__wl_2ghz_channels, 7675 sizeof(__wl_2ghz_channels), 7676 GFP_KERNEL); 7677 if (!band->channels) { 7678 kfree(band); 7679 return -ENOMEM; 7680 } 7681 7682 band->n_channels = ARRAY_SIZE(__wl_2ghz_channels); 7683 wiphy->bands[NL80211_BAND_2GHZ] = band; 7684 } 7685 if (bandlist[i] == cpu_to_le32(WLC_BAND_5G)) { 7686 band = kmemdup(&__wl_band_5ghz, sizeof(__wl_band_5ghz), 7687 GFP_KERNEL); 7688 if (!band) 7689 return -ENOMEM; 7690 7691 band->channels = kmemdup(&__wl_5ghz_channels, 7692 sizeof(__wl_5ghz_channels), 7693 GFP_KERNEL); 7694 if (!band->channels) { 7695 kfree(band); 7696 return -ENOMEM; 7697 } 7698 7699 band->n_channels = ARRAY_SIZE(__wl_5ghz_channels); 7700 wiphy->bands[NL80211_BAND_5GHZ] = band; 7701 } 7702 } 7703 7704 if (wiphy->bands[NL80211_BAND_5GHZ] && 7705 brcmf_feat_is_enabled(ifp, BRCMF_FEAT_DOT11H)) 7706 wiphy_ext_feature_set(wiphy, 7707 NL80211_EXT_FEATURE_DFS_OFFLOAD); 7708 7709 wiphy_ext_feature_set(wiphy, NL80211_EXT_FEATURE_CQM_RSSI_LIST); 7710 7711 wiphy_read_of_freq_limits(wiphy); 7712 7713 return 0; 7714 } 7715 7716 static s32 brcmf_config_dongle(struct brcmf_cfg80211_info *cfg) 7717 { 7718 struct brcmf_pub *drvr = cfg->pub; 7719 struct net_device *ndev; 7720 struct wireless_dev *wdev; 7721 struct brcmf_if *ifp; 7722 s32 power_mode; 7723 s32 err = 0; 7724 7725 if (cfg->dongle_up) 7726 return err; 7727 7728 ndev = cfg_to_ndev(cfg); 7729 wdev = ndev->ieee80211_ptr; 7730 ifp = netdev_priv(ndev); 7731 7732 /* make sure RF is ready for work */ 7733 brcmf_fil_cmd_int_set(ifp, BRCMF_C_UP, 0); 7734 7735 brcmf_dongle_scantime(ifp); 7736 7737 power_mode = cfg->pwr_save ? PM_FAST : PM_OFF; 7738 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_PM, power_mode); 7739 if (err) 7740 goto default_conf_out; 7741 brcmf_dbg(INFO, "power save set to %s\n", 7742 (power_mode ? "enabled" : "disabled")); 7743 7744 err = brcmf_dongle_roam(ifp); 7745 if (err) 7746 goto default_conf_out; 7747 err = brcmf_cfg80211_change_iface(wdev->wiphy, ndev, wdev->iftype, 7748 NULL); 7749 if (err) 7750 goto default_conf_out; 7751 7752 brcmf_configure_arp_nd_offload(ifp, true); 7753 7754 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_FAKEFRAG, 1); 7755 if (err) { 7756 bphy_err(drvr, "failed to set frameburst mode\n"); 7757 goto default_conf_out; 7758 } 7759 7760 cfg->dongle_up = true; 7761 default_conf_out: 7762 7763 return err; 7764 7765 } 7766 7767 static s32 __brcmf_cfg80211_up(struct brcmf_if *ifp) 7768 { 7769 set_bit(BRCMF_VIF_STATUS_READY, &ifp->vif->sme_state); 7770 7771 return brcmf_config_dongle(ifp->drvr->config); 7772 } 7773 7774 static s32 __brcmf_cfg80211_down(struct brcmf_if *ifp) 7775 { 7776 struct brcmf_cfg80211_info *cfg = ifp->drvr->config; 7777 7778 /* 7779 * While going down, if associated with AP disassociate 7780 * from AP to save power 7781 */ 7782 if (check_vif_up(ifp->vif)) { 7783 brcmf_link_down(ifp->vif, WLAN_REASON_UNSPECIFIED, true); 7784 7785 /* Make sure WPA_Supplicant receives all the event 7786 generated due to DISASSOC call to the fw to keep 7787 the state fw and WPA_Supplicant state consistent 7788 */ 7789 brcmf_delay(500); 7790 } 7791 7792 brcmf_abort_scanning(cfg); 7793 clear_bit(BRCMF_VIF_STATUS_READY, &ifp->vif->sme_state); 7794 7795 return 0; 7796 } 7797 7798 s32 brcmf_cfg80211_up(struct net_device *ndev) 7799 { 7800 struct brcmf_if *ifp = netdev_priv(ndev); 7801 struct brcmf_cfg80211_info *cfg = ifp->drvr->config; 7802 s32 err = 0; 7803 7804 mutex_lock(&cfg->usr_sync); 7805 err = __brcmf_cfg80211_up(ifp); 7806 mutex_unlock(&cfg->usr_sync); 7807 7808 return err; 7809 } 7810 7811 s32 brcmf_cfg80211_down(struct net_device *ndev) 7812 { 7813 struct brcmf_if *ifp = netdev_priv(ndev); 7814 struct brcmf_cfg80211_info *cfg = ifp->drvr->config; 7815 s32 err = 0; 7816 7817 mutex_lock(&cfg->usr_sync); 7818 err = __brcmf_cfg80211_down(ifp); 7819 mutex_unlock(&cfg->usr_sync); 7820 7821 return err; 7822 } 7823 7824 enum nl80211_iftype brcmf_cfg80211_get_iftype(struct brcmf_if *ifp) 7825 { 7826 struct wireless_dev *wdev = &ifp->vif->wdev; 7827 7828 return wdev->iftype; 7829 } 7830 7831 bool brcmf_get_vif_state_any(struct brcmf_cfg80211_info *cfg, 7832 unsigned long state) 7833 { 7834 struct brcmf_cfg80211_vif *vif; 7835 7836 list_for_each_entry(vif, &cfg->vif_list, list) { 7837 if (test_bit(state, &vif->sme_state)) 7838 return true; 7839 } 7840 return false; 7841 } 7842 7843 static inline bool vif_event_equals(struct brcmf_cfg80211_vif_event *event, 7844 u8 action) 7845 { 7846 u8 evt_action; 7847 7848 spin_lock(&event->vif_event_lock); 7849 evt_action = event->action; 7850 spin_unlock(&event->vif_event_lock); 7851 return evt_action == action; 7852 } 7853 7854 void brcmf_cfg80211_arm_vif_event(struct brcmf_cfg80211_info *cfg, 7855 struct brcmf_cfg80211_vif *vif) 7856 { 7857 struct brcmf_cfg80211_vif_event *event = &cfg->vif_event; 7858 7859 spin_lock(&event->vif_event_lock); 7860 event->vif = vif; 7861 event->action = 0; 7862 spin_unlock(&event->vif_event_lock); 7863 } 7864 7865 bool brcmf_cfg80211_vif_event_armed(struct brcmf_cfg80211_info *cfg) 7866 { 7867 struct brcmf_cfg80211_vif_event *event = &cfg->vif_event; 7868 bool armed; 7869 7870 spin_lock(&event->vif_event_lock); 7871 armed = event->vif != NULL; 7872 spin_unlock(&event->vif_event_lock); 7873 7874 return armed; 7875 } 7876 7877 int brcmf_cfg80211_wait_vif_event(struct brcmf_cfg80211_info *cfg, 7878 u8 action, ulong timeout) 7879 { 7880 struct brcmf_cfg80211_vif_event *event = &cfg->vif_event; 7881 7882 return wait_event_timeout(event->vif_wq, 7883 vif_event_equals(event, action), timeout); 7884 } 7885 7886 static bool brmcf_use_iso3166_ccode_fallback(struct brcmf_pub *drvr) 7887 { 7888 if (drvr->settings->trivial_ccode_map) 7889 return true; 7890 7891 switch (drvr->bus_if->chip) { 7892 case BRCM_CC_43430_CHIP_ID: 7893 case BRCM_CC_4345_CHIP_ID: 7894 case BRCM_CC_4356_CHIP_ID: 7895 case BRCM_CC_43602_CHIP_ID: 7896 return true; 7897 default: 7898 return false; 7899 } 7900 } 7901 7902 static s32 brcmf_translate_country_code(struct brcmf_pub *drvr, char alpha2[2], 7903 struct brcmf_fil_country_le *ccreq) 7904 { 7905 struct brcmfmac_pd_cc *country_codes; 7906 struct brcmfmac_pd_cc_entry *cc; 7907 s32 found_index; 7908 int i; 7909 7910 if ((alpha2[0] == ccreq->country_abbrev[0]) && 7911 (alpha2[1] == ccreq->country_abbrev[1])) { 7912 brcmf_dbg(TRACE, "Country code already set\n"); 7913 return -EAGAIN; 7914 } 7915 7916 country_codes = drvr->settings->country_codes; 7917 if (!country_codes) { 7918 if (brmcf_use_iso3166_ccode_fallback(drvr)) { 7919 brcmf_dbg(TRACE, "No country codes configured for device, using ISO3166 code and 0 rev\n"); 7920 memset(ccreq, 0, sizeof(*ccreq)); 7921 ccreq->country_abbrev[0] = alpha2[0]; 7922 ccreq->country_abbrev[1] = alpha2[1]; 7923 ccreq->ccode[0] = alpha2[0]; 7924 ccreq->ccode[1] = alpha2[1]; 7925 return 0; 7926 } 7927 7928 brcmf_dbg(TRACE, "No country codes configured for device\n"); 7929 return -EINVAL; 7930 } 7931 7932 found_index = -1; 7933 for (i = 0; i < country_codes->table_size; i++) { 7934 cc = &country_codes->table[i]; 7935 if ((cc->iso3166[0] == '\0') && (found_index == -1)) 7936 found_index = i; 7937 if ((cc->iso3166[0] == alpha2[0]) && 7938 (cc->iso3166[1] == alpha2[1])) { 7939 found_index = i; 7940 break; 7941 } 7942 } 7943 if (found_index == -1) { 7944 brcmf_dbg(TRACE, "No country code match found\n"); 7945 return -EINVAL; 7946 } 7947 memset(ccreq, 0, sizeof(*ccreq)); 7948 ccreq->rev = cpu_to_le32(country_codes->table[found_index].rev); 7949 memcpy(ccreq->ccode, country_codes->table[found_index].cc, 7950 BRCMF_COUNTRY_BUF_SZ); 7951 ccreq->country_abbrev[0] = alpha2[0]; 7952 ccreq->country_abbrev[1] = alpha2[1]; 7953 ccreq->country_abbrev[2] = 0; 7954 7955 return 0; 7956 } 7957 7958 static int 7959 brcmf_parse_dump_obss(char *buf, struct brcmf_dump_survey *survey) 7960 { 7961 int i; 7962 char *token; 7963 char delim[] = "\n "; 7964 unsigned long val; 7965 int err = 0; 7966 7967 token = strsep(&buf, delim); 7968 while (token) { 7969 if (!strcmp(token, "OBSS")) { 7970 for (i = 0; i < OBSS_TOKEN_IDX; i++) 7971 token = strsep(&buf, delim); 7972 err = kstrtoul(token, 10, &val); 7973 if (err) 7974 break; 7975 survey->obss = val; 7976 } 7977 7978 if (!strcmp(token, "IBSS")) { 7979 for (i = 0; i < IBSS_TOKEN_IDX; i++) 7980 token = strsep(&buf, delim); 7981 err = kstrtoul(token, 10, &val); 7982 if (err) 7983 break; 7984 survey->ibss = val; 7985 } 7986 7987 if (!strcmp(token, "TXDur")) { 7988 for (i = 0; i < TX_TOKEN_IDX; i++) 7989 token = strsep(&buf, delim); 7990 err = kstrtoul(token, 10, &val); 7991 if (err) 7992 break; 7993 survey->tx = val; 7994 } 7995 7996 if (!strcmp(token, "Category")) { 7997 for (i = 0; i < CTG_TOKEN_IDX; i++) 7998 token = strsep(&buf, delim); 7999 err = kstrtoul(token, 10, &val); 8000 if (err) 8001 break; 8002 survey->no_ctg = val; 8003 } 8004 8005 if (!strcmp(token, "Packet")) { 8006 for (i = 0; i < PKT_TOKEN_IDX; i++) 8007 token = strsep(&buf, delim); 8008 err = kstrtoul(token, 10, &val); 8009 if (err) 8010 break; 8011 survey->no_pckt = val; 8012 } 8013 8014 if (!strcmp(token, "Opp(time):")) { 8015 for (i = 0; i < IDLE_TOKEN_IDX; i++) 8016 token = strsep(&buf, delim); 8017 err = kstrtoul(token, 10, &val); 8018 if (err) 8019 break; 8020 survey->idle = val; 8021 } 8022 8023 token = strsep(&buf, delim); 8024 } 8025 8026 return err; 8027 } 8028 8029 static int 8030 brcmf_dump_obss(struct brcmf_if *ifp, struct cca_msrmnt_query req, 8031 struct brcmf_dump_survey *survey) 8032 { 8033 struct cca_stats_n_flags *results; 8034 char *buf; 8035 int err; 8036 8037 buf = kzalloc(sizeof(char) * BRCMF_DCMD_MEDLEN, GFP_KERNEL); 8038 if (!buf) 8039 return -ENOMEM; 8040 8041 memcpy(buf, &req, sizeof(struct cca_msrmnt_query)); 8042 err = brcmf_fil_iovar_data_get(ifp, "dump_obss", 8043 buf, BRCMF_DCMD_MEDLEN); 8044 if (err) { 8045 brcmf_err("dump_obss error (%d)\n", err); 8046 err = -EINVAL; 8047 goto exit; 8048 } 8049 results = (struct cca_stats_n_flags *)(buf); 8050 8051 if (req.msrmnt_query) 8052 brcmf_parse_dump_obss(results->buf, survey); 8053 8054 exit: 8055 kfree(buf); 8056 return err; 8057 } 8058 8059 static s32 8060 brcmf_set_channel(struct brcmf_cfg80211_info *cfg, struct ieee80211_channel *chan) 8061 { 8062 u16 chspec = 0; 8063 int err = 0; 8064 struct brcmf_if *ifp = netdev_priv(cfg_to_ndev(cfg)); 8065 8066 if (chan->flags & IEEE80211_CHAN_DISABLED) 8067 return -EINVAL; 8068 8069 /* set_channel */ 8070 chspec = channel_to_chanspec(&cfg->d11inf, chan); 8071 if (chspec != INVCHANSPEC) { 8072 err = brcmf_fil_iovar_int_set(ifp, "chanspec", chspec); 8073 if (err) { 8074 brcmf_err("set chanspec 0x%04x fail, reason %d\n", chspec, err); 8075 err = -EINVAL; 8076 } 8077 } else { 8078 brcmf_err("failed to convert host chanspec to fw chanspec\n"); 8079 err = -EINVAL; 8080 } 8081 8082 return err; 8083 } 8084 8085 static int 8086 brcmf_cfg80211_dump_survey(struct wiphy *wiphy, struct net_device *ndev, 8087 int idx, struct survey_info *info) 8088 { 8089 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 8090 struct brcmf_if *ifp = netdev_priv(cfg_to_ndev(cfg)); 8091 struct brcmf_dump_survey survey = {}; 8092 struct ieee80211_supported_band *band; 8093 enum nl80211_band band_id; 8094 struct cca_msrmnt_query req; 8095 u32 noise; 8096 int err; 8097 8098 brcmf_dbg(TRACE, "Enter: channel idx=%d\n", idx); 8099 8100 /* Do not run survey when VIF in CONNECTING / CONNECTED states */ 8101 if ((test_bit(BRCMF_VIF_STATUS_CONNECTING, &ifp->vif->sme_state)) || 8102 (test_bit(BRCMF_VIF_STATUS_CONNECTED, &ifp->vif->sme_state))) { 8103 return -EBUSY; 8104 } 8105 8106 for (band_id = 0; band_id < NUM_NL80211_BANDS; band_id++) { 8107 band = wiphy->bands[band_id]; 8108 if (!band) 8109 continue; 8110 if (idx >= band->n_channels) { 8111 idx -= band->n_channels; 8112 continue; 8113 } 8114 8115 info->channel = &band->channels[idx]; 8116 break; 8117 } 8118 if (band_id == NUM_NL80211_BANDS) 8119 return -ENOENT; 8120 8121 /* Setting current channel to the requested channel */ 8122 info->filled = 0; 8123 if (brcmf_set_channel(cfg, info->channel)) 8124 return 0; 8125 8126 /* Disable mpc */ 8127 brcmf_set_mpc(ifp, 0); 8128 8129 /* Set interface up, explicitly. */ 8130 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_UP, 1); 8131 if (err) { 8132 brcmf_err("set interface up failed, err = %d\n", err); 8133 goto exit; 8134 } 8135 8136 /* Get noise value */ 8137 err = brcmf_fil_cmd_int_get(ifp, BRCMF_C_GET_PHY_NOISE, &noise); 8138 if (err) { 8139 brcmf_err("Get Phy Noise failed, use dummy value\n"); 8140 noise = CHAN_NOISE_DUMMY; 8141 } 8142 8143 /* Start Measurement for obss stats on current channel */ 8144 req.msrmnt_query = 0; 8145 req.time_req = ACS_MSRMNT_DELAY; 8146 err = brcmf_dump_obss(ifp, req, &survey); 8147 if (err) 8148 goto exit; 8149 8150 /* Add 10 ms for IOVAR completion */ 8151 msleep(ACS_MSRMNT_DELAY + 10); 8152 8153 /* Issue IOVAR to collect measurement results */ 8154 req.msrmnt_query = 1; 8155 err = brcmf_dump_obss(ifp, req, &survey); 8156 if (err) 8157 goto exit; 8158 8159 info->noise = noise; 8160 info->time = ACS_MSRMNT_DELAY; 8161 info->time_busy = ACS_MSRMNT_DELAY - survey.idle; 8162 info->time_rx = survey.obss + survey.ibss + survey.no_ctg + 8163 survey.no_pckt; 8164 info->time_tx = survey.tx; 8165 info->filled = SURVEY_INFO_NOISE_DBM | SURVEY_INFO_TIME | 8166 SURVEY_INFO_TIME_BUSY | SURVEY_INFO_TIME_RX | 8167 SURVEY_INFO_TIME_TX; 8168 8169 brcmf_dbg(INFO, "OBSS dump: channel %d: survey duration %d\n", 8170 ieee80211_frequency_to_channel(info->channel->center_freq), 8171 ACS_MSRMNT_DELAY); 8172 brcmf_dbg(INFO, "noise(%d) busy(%llu) rx(%llu) tx(%llu)\n", 8173 info->noise, info->time_busy, info->time_rx, info->time_tx); 8174 8175 exit: 8176 if (!brcmf_is_apmode(ifp->vif)) 8177 brcmf_set_mpc(ifp, 1); 8178 return err; 8179 } 8180 8181 static void brcmf_cfg80211_reg_notifier(struct wiphy *wiphy, 8182 struct regulatory_request *req) 8183 { 8184 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 8185 struct brcmf_if *ifp = brcmf_get_ifp(cfg->pub, 0); 8186 struct brcmf_pub *drvr = cfg->pub; 8187 struct brcmf_fil_country_le ccreq; 8188 s32 err; 8189 int i; 8190 8191 /* The country code gets set to "00" by default at boot, ignore */ 8192 if (req->alpha2[0] == '0' && req->alpha2[1] == '0') 8193 return; 8194 8195 /* ignore non-ISO3166 country codes */ 8196 for (i = 0; i < 2; i++) 8197 if (req->alpha2[i] < 'A' || req->alpha2[i] > 'Z') { 8198 bphy_err(drvr, "not an ISO3166 code (0x%02x 0x%02x)\n", 8199 req->alpha2[0], req->alpha2[1]); 8200 return; 8201 } 8202 8203 brcmf_dbg(TRACE, "Enter: initiator=%d, alpha=%c%c\n", req->initiator, 8204 req->alpha2[0], req->alpha2[1]); 8205 8206 err = brcmf_fil_iovar_data_get(ifp, "country", &ccreq, sizeof(ccreq)); 8207 if (err) { 8208 bphy_err(drvr, "Country code iovar returned err = %d\n", err); 8209 return; 8210 } 8211 8212 err = brcmf_translate_country_code(ifp->drvr, req->alpha2, &ccreq); 8213 if (err) 8214 return; 8215 8216 err = brcmf_fil_iovar_data_set(ifp, "country", &ccreq, sizeof(ccreq)); 8217 if (err) { 8218 bphy_err(drvr, "Firmware rejected country setting\n"); 8219 return; 8220 } 8221 brcmf_setup_wiphybands(cfg); 8222 } 8223 8224 static void brcmf_free_wiphy(struct wiphy *wiphy) 8225 { 8226 int i; 8227 8228 if (!wiphy) 8229 return; 8230 8231 if (wiphy->iface_combinations) { 8232 for (i = 0; i < wiphy->n_iface_combinations; i++) 8233 kfree(wiphy->iface_combinations[i].limits); 8234 } 8235 kfree(wiphy->iface_combinations); 8236 if (wiphy->bands[NL80211_BAND_2GHZ]) { 8237 kfree(wiphy->bands[NL80211_BAND_2GHZ]->channels); 8238 kfree(wiphy->bands[NL80211_BAND_2GHZ]); 8239 } 8240 if (wiphy->bands[NL80211_BAND_5GHZ]) { 8241 kfree(wiphy->bands[NL80211_BAND_5GHZ]->channels); 8242 kfree(wiphy->bands[NL80211_BAND_5GHZ]); 8243 } 8244 #if IS_ENABLED(CONFIG_PM) 8245 if (wiphy->wowlan != &brcmf_wowlan_support) 8246 kfree(wiphy->wowlan); 8247 #endif 8248 } 8249 8250 struct brcmf_cfg80211_info *brcmf_cfg80211_attach(struct brcmf_pub *drvr, 8251 struct cfg80211_ops *ops, 8252 bool p2pdev_forced) 8253 { 8254 struct wiphy *wiphy = drvr->wiphy; 8255 struct net_device *ndev = brcmf_get_ifp(drvr, 0)->ndev; 8256 struct brcmf_cfg80211_info *cfg; 8257 struct brcmf_cfg80211_vif *vif; 8258 struct brcmf_if *ifp; 8259 s32 err = 0; 8260 s32 io_type; 8261 u16 *cap = NULL; 8262 8263 if (!ndev) { 8264 bphy_err(drvr, "ndev is invalid\n"); 8265 return NULL; 8266 } 8267 8268 cfg = kzalloc(sizeof(*cfg), GFP_KERNEL); 8269 if (!cfg) { 8270 bphy_err(drvr, "Could not allocate wiphy device\n"); 8271 return NULL; 8272 } 8273 8274 cfg->wiphy = wiphy; 8275 cfg->pub = drvr; 8276 init_vif_event(&cfg->vif_event); 8277 INIT_LIST_HEAD(&cfg->vif_list); 8278 8279 vif = brcmf_alloc_vif(cfg, NL80211_IFTYPE_STATION); 8280 if (IS_ERR(vif)) 8281 goto wiphy_out; 8282 8283 ifp = netdev_priv(ndev); 8284 vif->ifp = ifp; 8285 vif->wdev.netdev = ndev; 8286 ndev->ieee80211_ptr = &vif->wdev; 8287 SET_NETDEV_DEV(ndev, wiphy_dev(cfg->wiphy)); 8288 8289 err = wl_init_priv(cfg); 8290 if (err) { 8291 bphy_err(drvr, "Failed to init iwm_priv (%d)\n", err); 8292 brcmf_free_vif(vif); 8293 goto wiphy_out; 8294 } 8295 ifp->vif = vif; 8296 8297 /* determine d11 io type before wiphy setup */ 8298 err = brcmf_fil_cmd_int_get(ifp, BRCMF_C_GET_VERSION, &io_type); 8299 if (err) { 8300 bphy_err(drvr, "Failed to get D11 version (%d)\n", err); 8301 goto priv_out; 8302 } 8303 cfg->d11inf.io_type = (u8)io_type; 8304 brcmu_d11_attach(&cfg->d11inf); 8305 8306 /* regulatory notifer below needs access to cfg so 8307 * assign it now. 8308 */ 8309 drvr->config = cfg; 8310 8311 err = brcmf_setup_wiphy(wiphy, ifp); 8312 if (err < 0) 8313 goto priv_out; 8314 8315 brcmf_dbg(INFO, "Registering custom regulatory\n"); 8316 wiphy->reg_notifier = brcmf_cfg80211_reg_notifier; 8317 wiphy->regulatory_flags |= REGULATORY_CUSTOM_REG; 8318 wiphy_apply_custom_regulatory(wiphy, &brcmf_regdom); 8319 8320 /* firmware defaults to 40MHz disabled in 2G band. We signal 8321 * cfg80211 here that we do and have it decide we can enable 8322 * it. But first check if device does support 2G operation. 8323 */ 8324 if (wiphy->bands[NL80211_BAND_2GHZ]) { 8325 cap = &wiphy->bands[NL80211_BAND_2GHZ]->ht_cap.cap; 8326 *cap |= IEEE80211_HT_CAP_SUP_WIDTH_20_40; 8327 } 8328 #ifdef CONFIG_PM 8329 if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_WOWL_GTK)) 8330 ops->set_rekey_data = brcmf_cfg80211_set_rekey_data; 8331 #endif 8332 if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_DUMP_OBSS)) 8333 ops->dump_survey = brcmf_cfg80211_dump_survey; 8334 8335 err = wiphy_register(wiphy); 8336 if (err < 0) { 8337 bphy_err(drvr, "Could not register wiphy device (%d)\n", err); 8338 goto priv_out; 8339 } 8340 8341 err = brcmf_setup_wiphybands(cfg); 8342 if (err) { 8343 bphy_err(drvr, "Setting wiphy bands failed (%d)\n", err); 8344 goto wiphy_unreg_out; 8345 } 8346 8347 /* If cfg80211 didn't disable 40MHz HT CAP in wiphy_register(), 8348 * setup 40MHz in 2GHz band and enable OBSS scanning. 8349 */ 8350 if (cap && (*cap & IEEE80211_HT_CAP_SUP_WIDTH_20_40)) { 8351 err = brcmf_enable_bw40_2g(cfg); 8352 if (!err) 8353 err = brcmf_fil_iovar_int_set(ifp, "obss_coex", 8354 BRCMF_OBSS_COEX_AUTO); 8355 else 8356 *cap &= ~IEEE80211_HT_CAP_SUP_WIDTH_20_40; 8357 } 8358 8359 err = brcmf_fweh_activate_events(ifp); 8360 if (err) { 8361 bphy_err(drvr, "FWEH activation failed (%d)\n", err); 8362 goto wiphy_unreg_out; 8363 } 8364 8365 err = brcmf_p2p_attach(cfg, p2pdev_forced); 8366 if (err) { 8367 bphy_err(drvr, "P2P initialisation failed (%d)\n", err); 8368 goto wiphy_unreg_out; 8369 } 8370 err = brcmf_btcoex_attach(cfg); 8371 if (err) { 8372 bphy_err(drvr, "BT-coex initialisation failed (%d)\n", err); 8373 brcmf_p2p_detach(&cfg->p2p); 8374 goto wiphy_unreg_out; 8375 } 8376 err = brcmf_pno_attach(cfg); 8377 if (err) { 8378 bphy_err(drvr, "PNO initialisation failed (%d)\n", err); 8379 brcmf_btcoex_detach(cfg); 8380 brcmf_p2p_detach(&cfg->p2p); 8381 goto wiphy_unreg_out; 8382 } 8383 8384 if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_TDLS)) { 8385 err = brcmf_fil_iovar_int_set(ifp, "tdls_enable", 1); 8386 if (err) { 8387 brcmf_dbg(INFO, "TDLS not enabled (%d)\n", err); 8388 wiphy->flags &= ~WIPHY_FLAG_SUPPORTS_TDLS; 8389 } else { 8390 brcmf_fweh_register(cfg->pub, BRCMF_E_TDLS_PEER_EVENT, 8391 brcmf_notify_tdls_peer_event); 8392 } 8393 } 8394 8395 /* (re-) activate FWEH event handling */ 8396 err = brcmf_fweh_activate_events(ifp); 8397 if (err) { 8398 bphy_err(drvr, "FWEH activation failed (%d)\n", err); 8399 goto detach; 8400 } 8401 8402 /* Fill in some of the advertised nl80211 supported features */ 8403 if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_SCAN_RANDOM_MAC)) { 8404 wiphy->features |= NL80211_FEATURE_SCHED_SCAN_RANDOM_MAC_ADDR; 8405 #ifdef CONFIG_PM 8406 if (wiphy->wowlan && 8407 wiphy->wowlan->flags & WIPHY_WOWLAN_NET_DETECT) 8408 wiphy->features |= NL80211_FEATURE_ND_RANDOM_MAC_ADDR; 8409 #endif 8410 } 8411 8412 return cfg; 8413 8414 detach: 8415 brcmf_pno_detach(cfg); 8416 brcmf_btcoex_detach(cfg); 8417 brcmf_p2p_detach(&cfg->p2p); 8418 wiphy_unreg_out: 8419 wiphy_unregister(cfg->wiphy); 8420 priv_out: 8421 wl_deinit_priv(cfg); 8422 brcmf_free_vif(vif); 8423 ifp->vif = NULL; 8424 wiphy_out: 8425 brcmf_free_wiphy(wiphy); 8426 kfree(cfg); 8427 return NULL; 8428 } 8429 8430 void brcmf_cfg80211_detach(struct brcmf_cfg80211_info *cfg) 8431 { 8432 if (!cfg) 8433 return; 8434 8435 brcmf_pno_detach(cfg); 8436 brcmf_btcoex_detach(cfg); 8437 wiphy_unregister(cfg->wiphy); 8438 wl_deinit_priv(cfg); 8439 brcmf_free_wiphy(cfg->wiphy); 8440 kfree(cfg); 8441 } 8442