xref: /linux/drivers/net/wireless/broadcom/brcm80211/brcmfmac/cyw/core.c (revision 323bbfcf1ef8836d0d2ad9e2c1f1c684f0e3b5b3)
1 // SPDX-License-Identifier: ISC
2 /*
3  * Copyright (c) 2022 Broadcom Corporation
4  */
5 #include <linux/errno.h>
6 #include <linux/types.h>
7 #include <core.h>
8 #include <bus.h>
9 #include <fwvid.h>
10 #include <fwil.h>
11 #include <fweh.h>
12 
13 #include "vops.h"
14 #include "fwil_types.h"
15 
16 /* event definitions */
17 #define BRCMF_CYW_E_EXT_AUTH_REQ	187
18 #define BRCMF_CYW_E_EXT_AUTH_FRAME_RX	188
19 #define BRCMF_CYW_E_MGMT_FRAME_TXS	189
20 #define BRCMF_CYW_E_MGMT_FRAME_TXS_OC	190
21 #define BRCMF_CYW_E_LAST		197
22 
23 #define MGMT_AUTH_FRAME_DWELL_TIME	4000
24 #define MGMT_AUTH_FRAME_WAIT_TIME	(MGMT_AUTH_FRAME_DWELL_TIME + 100)
25 
brcmf_cyw_set_sae_pwd(struct brcmf_if * ifp,struct cfg80211_crypto_settings * crypto)26 static int brcmf_cyw_set_sae_pwd(struct brcmf_if *ifp,
27 				 struct cfg80211_crypto_settings *crypto)
28 {
29 	struct brcmf_pub *drvr = ifp->drvr;
30 	struct brcmf_wsec_sae_pwd_le sae_pwd;
31 	u16 pwd_len = crypto->sae_pwd_len;
32 	int err;
33 
34 	if (pwd_len > BRCMF_WSEC_MAX_SAE_PASSWORD_LEN) {
35 		bphy_err(drvr, "sae_password must be less than %d\n",
36 			 BRCMF_WSEC_MAX_SAE_PASSWORD_LEN);
37 		return -EINVAL;
38 	}
39 
40 	sae_pwd.key_len = cpu_to_le16(pwd_len);
41 	memcpy(sae_pwd.key, crypto->sae_pwd, pwd_len);
42 
43 	err = brcmf_fil_iovar_data_set(ifp, "sae_password", &sae_pwd,
44 				       sizeof(sae_pwd));
45 	if (err < 0)
46 		bphy_err(drvr, "failed to set SAE password in firmware (len=%u)\n",
47 			 pwd_len);
48 
49 	return err;
50 }
51 
52 static const struct brcmf_fweh_event_map brcmf_cyw_event_map = {
53 	.items = {
54 		{ BRCMF_E_EXT_AUTH_REQ, BRCMF_CYW_E_EXT_AUTH_REQ },
55 		{ BRCMF_E_EXT_AUTH_FRAME_RX, BRCMF_CYW_E_EXT_AUTH_FRAME_RX },
56 		{ BRCMF_E_MGMT_FRAME_TXSTATUS, BRCMF_CYW_E_MGMT_FRAME_TXS },
57 		{
58 			BRCMF_E_MGMT_FRAME_OFFCHAN_DONE,
59 			BRCMF_CYW_E_MGMT_FRAME_TXS_OC
60 		},
61 	},
62 	.n_items = 4
63 };
64 
brcmf_cyw_alloc_fweh_info(struct brcmf_pub * drvr)65 static int brcmf_cyw_alloc_fweh_info(struct brcmf_pub *drvr)
66 {
67 	struct brcmf_fweh_info *fweh;
68 
69 	fweh = kzalloc_flex(*fweh, evt_handler, BRCMF_CYW_E_LAST);
70 	if (!fweh)
71 		return -ENOMEM;
72 
73 	fweh->num_event_codes = BRCMF_CYW_E_LAST;
74 	fweh->event_map = &brcmf_cyw_event_map;
75 	drvr->fweh = fweh;
76 	return 0;
77 }
78 
brcmf_cyw_activate_events(struct brcmf_if * ifp)79 static int brcmf_cyw_activate_events(struct brcmf_if *ifp)
80 {
81 	struct brcmf_fweh_info *fweh = ifp->drvr->fweh;
82 	struct brcmf_eventmsgs_ext *eventmask_msg;
83 	u32 msglen;
84 	int err;
85 
86 	msglen = sizeof(*eventmask_msg) + fweh->event_mask_len;
87 	eventmask_msg = kzalloc(msglen, GFP_KERNEL);
88 	if (!eventmask_msg)
89 		return -ENOMEM;
90 	eventmask_msg->ver = EVENTMSGS_VER;
91 	eventmask_msg->command = CYW_EVENTMSGS_SET_MASK;
92 	eventmask_msg->len = fweh->event_mask_len;
93 	memcpy(eventmask_msg->mask, fweh->event_mask, fweh->event_mask_len);
94 
95 	err = brcmf_fil_iovar_data_set(ifp, "event_msgs_ext", eventmask_msg,
96 				       msglen);
97 	kfree(eventmask_msg);
98 	return err;
99 }
100 
101 static
brcmf_cyw_mgmt_tx(struct wiphy * wiphy,struct wireless_dev * wdev,struct cfg80211_mgmt_tx_params * params,u64 * cookie)102 int brcmf_cyw_mgmt_tx(struct wiphy *wiphy, struct wireless_dev *wdev,
103 		      struct cfg80211_mgmt_tx_params *params, u64 *cookie)
104 {
105 	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
106 	struct ieee80211_channel *chan = params->chan;
107 	struct brcmf_pub *drvr = cfg->pub;
108 	const u8 *buf = params->buf;
109 	size_t len = params->len;
110 	const struct ieee80211_mgmt *mgmt;
111 	struct brcmf_cfg80211_vif *vif;
112 	s32 err = 0;
113 	bool ack = false;
114 	__le16 hw_ch;
115 	struct brcmf_mf_params_le *mf_params;
116 	u32 mf_params_len;
117 	s32 ready;
118 
119 	brcmf_dbg(TRACE, "Enter\n");
120 
121 	mgmt = (const struct ieee80211_mgmt *)buf;
122 
123 	if (!ieee80211_is_auth(mgmt->frame_control))
124 		return brcmf_cfg80211_mgmt_tx(wiphy, wdev, params, cookie);
125 
126 	*cookie = 0;
127 	vif = container_of(wdev, struct brcmf_cfg80211_vif, wdev);
128 
129 	reinit_completion(&vif->mgmt_tx);
130 	clear_bit(BRCMF_MGMT_TX_ACK, &vif->mgmt_tx_status);
131 	clear_bit(BRCMF_MGMT_TX_NOACK, &vif->mgmt_tx_status);
132 	clear_bit(BRCMF_MGMT_TX_OFF_CHAN_COMPLETED,
133 		  &vif->mgmt_tx_status);
134 	mf_params_len = offsetof(struct brcmf_mf_params_le, data) +
135 			(len - DOT11_MGMT_HDR_LEN);
136 	mf_params = kzalloc(mf_params_len, GFP_KERNEL);
137 	if (!mf_params)
138 		return -ENOMEM;
139 
140 	mf_params->dwell_time = cpu_to_le32(MGMT_AUTH_FRAME_DWELL_TIME);
141 	mf_params->len = cpu_to_le16(len - DOT11_MGMT_HDR_LEN);
142 	mf_params->frame_control = mgmt->frame_control;
143 
144 	if (chan) {
145 		hw_ch = cpu_to_le16(chan->hw_value);
146 	} else {
147 		err = brcmf_fil_cmd_data_get(vif->ifp, BRCMF_C_GET_CHANNEL,
148 					     &hw_ch, sizeof(hw_ch));
149 		if (err) {
150 			bphy_err(drvr, "unable to get current hw channel\n");
151 			goto free;
152 		}
153 	}
154 	mf_params->channel = hw_ch;
155 
156 	memcpy(&mf_params->da[0], &mgmt->da[0], ETH_ALEN);
157 	memcpy(&mf_params->bssid[0], &mgmt->bssid[0], ETH_ALEN);
158 	mf_params->packet_id = cpu_to_le32(*cookie);
159 	memcpy(mf_params->data, &buf[DOT11_MGMT_HDR_LEN],
160 	       le16_to_cpu(mf_params->len));
161 
162 	brcmf_dbg(TRACE, "Auth frame, cookie=%d, fc=%04x, len=%d, channel=%d\n",
163 		  le32_to_cpu(mf_params->packet_id),
164 		  le16_to_cpu(mf_params->frame_control),
165 		  le16_to_cpu(mf_params->len),
166 		  le16_to_cpu(mf_params->channel));
167 
168 	vif->mgmt_tx_id = le32_to_cpu(mf_params->packet_id);
169 	set_bit(BRCMF_MGMT_TX_SEND_FRAME, &vif->mgmt_tx_status);
170 
171 	err = brcmf_fil_bsscfg_data_set(vif->ifp, "mgmt_frame",
172 					mf_params, mf_params_len);
173 	if (err) {
174 		bphy_err(drvr, "Failed to send Auth frame: err=%d\n",
175 			 err);
176 		goto tx_status;
177 	}
178 
179 	ready = wait_for_completion_timeout(&vif->mgmt_tx,
180 					    MGMT_AUTH_FRAME_WAIT_TIME);
181 	if (test_bit(BRCMF_MGMT_TX_ACK, &vif->mgmt_tx_status)) {
182 		brcmf_dbg(TRACE, "TX Auth frame operation is success\n");
183 		ack = true;
184 	} else {
185 		bphy_err(drvr, "TX Auth frame operation is %s: status=%ld)\n",
186 			 ready ? "failed" : "timedout", vif->mgmt_tx_status);
187 	}
188 
189 tx_status:
190 	cfg80211_mgmt_tx_status(wdev, *cookie, buf, len, ack,
191 				GFP_KERNEL);
192 free:
193 	kfree(mf_params);
194 	return err;
195 }
196 
197 static int
brcmf_cyw_external_auth(struct wiphy * wiphy,struct net_device * dev,struct cfg80211_external_auth_params * params)198 brcmf_cyw_external_auth(struct wiphy *wiphy, struct net_device *dev,
199 			struct cfg80211_external_auth_params *params)
200 {
201 	struct brcmf_if *ifp;
202 	struct brcmf_pub *drvr;
203 	struct brcmf_auth_req_status_le auth_status;
204 	int ret = 0;
205 
206 	brcmf_dbg(TRACE, "Enter\n");
207 
208 	ifp = netdev_priv(dev);
209 	drvr = ifp->drvr;
210 	if (params->status == WLAN_STATUS_SUCCESS) {
211 		auth_status.flags = cpu_to_le16(BRCMF_EXTAUTH_SUCCESS);
212 	} else {
213 		bphy_err(drvr, "External authentication failed: status=%d\n",
214 			 params->status);
215 		auth_status.flags = cpu_to_le16(BRCMF_EXTAUTH_FAIL);
216 	}
217 
218 	memcpy(auth_status.peer_mac, params->bssid, ETH_ALEN);
219 	params->ssid.ssid_len = min_t(u8, params->ssid.ssid_len,
220 				      IEEE80211_MAX_SSID_LEN);
221 	auth_status.ssid_len = cpu_to_le32(params->ssid.ssid_len);
222 	memcpy(auth_status.ssid, params->ssid.ssid, params->ssid.ssid_len);
223 
224 	ret = brcmf_fil_iovar_data_set(ifp, "auth_status", &auth_status,
225 				       sizeof(auth_status));
226 	if (ret < 0)
227 		bphy_err(drvr, "auth_status iovar failed: ret=%d\n", ret);
228 
229 	return ret;
230 }
231 
brcmf_cyw_get_cfg80211_ops(struct brcmf_pub * drvr)232 static void brcmf_cyw_get_cfg80211_ops(struct brcmf_pub *drvr)
233 {
234 	drvr->ops->mgmt_tx = brcmf_cyw_mgmt_tx;
235 	drvr->ops->external_auth = brcmf_cyw_external_auth;
236 }
237 
238 static s32
brcmf_cyw_notify_ext_auth_req(struct brcmf_if * ifp,const struct brcmf_event_msg * e,void * data)239 brcmf_cyw_notify_ext_auth_req(struct brcmf_if *ifp,
240 			      const struct brcmf_event_msg *e, void *data)
241 {
242 	struct brcmf_pub *drvr = ifp->drvr;
243 	struct cfg80211_external_auth_params params;
244 	struct brcmf_auth_req_status_le *auth_req =
245 		(struct brcmf_auth_req_status_le *)data;
246 	s32 err = 0;
247 
248 	brcmf_dbg(INFO, "Enter: event %s (%d) received\n",
249 		  brcmf_fweh_event_name(e->event_code), e->event_code);
250 
251 	if (e->datalen < sizeof(*auth_req)) {
252 		bphy_err(drvr, "Event %s (%d) data too small. Ignore\n",
253 			 brcmf_fweh_event_name(e->event_code), e->event_code);
254 		return -EINVAL;
255 	}
256 
257 	memset(&params, 0, sizeof(params));
258 	params.action = NL80211_EXTERNAL_AUTH_START;
259 	params.key_mgmt_suite = WLAN_AKM_SUITE_SAE;
260 	params.status = WLAN_STATUS_SUCCESS;
261 	params.ssid.ssid_len = min_t(u32, 32, le32_to_cpu(auth_req->ssid_len));
262 	memcpy(params.ssid.ssid, auth_req->ssid, params.ssid.ssid_len);
263 	memcpy(params.bssid, auth_req->peer_mac, ETH_ALEN);
264 
265 	err = cfg80211_external_auth_request(ifp->ndev, &params, GFP_KERNEL);
266 	if (err)
267 		bphy_err(drvr, "Ext Auth request to supplicant failed (%d)\n",
268 			 err);
269 
270 	return err;
271 }
272 
273 static s32
brcmf_notify_auth_frame_rx(struct brcmf_if * ifp,const struct brcmf_event_msg * e,void * data)274 brcmf_notify_auth_frame_rx(struct brcmf_if *ifp,
275 			   const struct brcmf_event_msg *e, void *data)
276 {
277 	struct brcmf_pub *drvr = ifp->drvr;
278 	struct brcmf_cfg80211_info *cfg = drvr->config;
279 	struct wireless_dev *wdev;
280 	u32 mgmt_frame_len = e->datalen - sizeof(struct brcmf_rx_mgmt_data);
281 	struct brcmf_rx_mgmt_data *rxframe = (struct brcmf_rx_mgmt_data *)data;
282 	u8 *frame = (u8 *)(rxframe + 1);
283 	struct brcmu_chan ch;
284 	struct ieee80211_mgmt *mgmt_frame;
285 	s32 freq;
286 
287 	brcmf_dbg(INFO, "Enter: event %s (%d) received\n",
288 		  brcmf_fweh_event_name(e->event_code), e->event_code);
289 
290 	if (e->datalen < sizeof(*rxframe)) {
291 		bphy_err(drvr, "Event %s (%d) data too small. Ignore\n",
292 			 brcmf_fweh_event_name(e->event_code), e->event_code);
293 		return -EINVAL;
294 	}
295 
296 	wdev = &ifp->vif->wdev;
297 	WARN_ON(!wdev);
298 
299 	ch.chspec = be16_to_cpu(rxframe->chanspec);
300 	cfg->d11inf.decchspec(&ch);
301 
302 	mgmt_frame = kzalloc(mgmt_frame_len, GFP_KERNEL);
303 	if (!mgmt_frame)
304 		return -ENOMEM;
305 
306 	mgmt_frame->frame_control = cpu_to_le16(IEEE80211_STYPE_AUTH);
307 	memcpy(mgmt_frame->da, ifp->mac_addr, ETH_ALEN);
308 	memcpy(mgmt_frame->sa, e->addr, ETH_ALEN);
309 	brcmf_fil_cmd_data_get(ifp, BRCMF_C_GET_BSSID, mgmt_frame->bssid,
310 			       ETH_ALEN);
311 	frame += offsetof(struct ieee80211_mgmt, u);
312 	memcpy(&mgmt_frame->u, frame,
313 	       mgmt_frame_len - offsetof(struct ieee80211_mgmt, u));
314 
315 	freq = ieee80211_channel_to_frequency(ch.control_ch_num,
316 					      ch.band == BRCMU_CHAN_BAND_2G ?
317 					      NL80211_BAND_2GHZ :
318 					      NL80211_BAND_5GHZ);
319 
320 	cfg80211_rx_mgmt(wdev, freq, 0, (u8 *)mgmt_frame, mgmt_frame_len,
321 			 NL80211_RXMGMT_FLAG_EXTERNAL_AUTH);
322 	kfree(mgmt_frame);
323 	return 0;
324 }
325 
326 static s32
brcmf_notify_mgmt_tx_status(struct brcmf_if * ifp,const struct brcmf_event_msg * e,void * data)327 brcmf_notify_mgmt_tx_status(struct brcmf_if *ifp,
328 			    const struct brcmf_event_msg *e, void *data)
329 {
330 	struct brcmf_cfg80211_vif *vif = ifp->vif;
331 	u32 *packet_id = (u32 *)data;
332 
333 	brcmf_dbg(INFO, "Enter: event %s (%d), status=%d\n",
334 		  brcmf_fweh_event_name(e->event_code), e->event_code,
335 		  e->status);
336 
337 	if (!test_bit(BRCMF_MGMT_TX_SEND_FRAME, &vif->mgmt_tx_status) ||
338 	    (*packet_id != vif->mgmt_tx_id))
339 		return 0;
340 
341 	if (e->event_code == BRCMF_E_MGMT_FRAME_TXSTATUS) {
342 		if (e->status == BRCMF_E_STATUS_SUCCESS)
343 			set_bit(BRCMF_MGMT_TX_ACK, &vif->mgmt_tx_status);
344 		else
345 			set_bit(BRCMF_MGMT_TX_NOACK, &vif->mgmt_tx_status);
346 	} else {
347 		set_bit(BRCMF_MGMT_TX_OFF_CHAN_COMPLETED, &vif->mgmt_tx_status);
348 	}
349 
350 	complete(&vif->mgmt_tx);
351 	return 0;
352 }
353 
brcmf_cyw_register_event_handlers(struct brcmf_pub * drvr)354 static void brcmf_cyw_register_event_handlers(struct brcmf_pub *drvr)
355 {
356 	brcmf_fweh_register(drvr, BRCMF_E_EXT_AUTH_REQ,
357 			    brcmf_cyw_notify_ext_auth_req);
358 	brcmf_fweh_register(drvr, BRCMF_E_EXT_AUTH_FRAME_RX,
359 			    brcmf_notify_auth_frame_rx);
360 	brcmf_fweh_register(drvr, BRCMF_E_MGMT_FRAME_TXSTATUS,
361 			    brcmf_notify_mgmt_tx_status);
362 	brcmf_fweh_register(drvr, BRCMF_E_MGMT_FRAME_OFFCHAN_DONE,
363 			    brcmf_notify_mgmt_tx_status);
364 }
365 
366 const struct brcmf_fwvid_ops brcmf_cyw_ops = {
367 	.set_sae_password = brcmf_cyw_set_sae_pwd,
368 	.alloc_fweh_info = brcmf_cyw_alloc_fweh_info,
369 	.activate_events = brcmf_cyw_activate_events,
370 	.get_cfg80211_ops = brcmf_cyw_get_cfg80211_ops,
371 	.register_event_handlers = brcmf_cyw_register_event_handlers,
372 };
373