1 /* 2 * PS3 gelic network driver. 3 * 4 * Copyright (C) 2007 Sony Computer Entertainment Inc. 5 * Copyright 2007 Sony Corporation 6 * 7 * This program is free software; you can redistribute it and/or modify 8 * it under the terms of the GNU General Public License version 2 9 * as published by the Free Software Foundation. 10 * 11 * This program is distributed in the hope that it will be useful, 12 * but WITHOUT ANY WARRANTY; without even the implied warranty of 13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 14 * GNU General Public License for more details. 15 * 16 * You should have received a copy of the GNU General Public License 17 * along with this program; if not, write to the Free Software 18 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. 19 */ 20 #undef DEBUG 21 22 #include <linux/kernel.h> 23 #include <linux/module.h> 24 #include <linux/slab.h> 25 26 #include <linux/etherdevice.h> 27 #include <linux/ethtool.h> 28 #include <linux/if_vlan.h> 29 30 #include <linux/in.h> 31 #include <linux/ip.h> 32 #include <linux/tcp.h> 33 #include <linux/wireless.h> 34 #include <linux/ieee80211.h> 35 #include <linux/if_arp.h> 36 #include <linux/ctype.h> 37 #include <linux/string.h> 38 #include <net/iw_handler.h> 39 40 #include <linux/dma-mapping.h> 41 #include <net/checksum.h> 42 #include <asm/firmware.h> 43 #include <asm/ps3.h> 44 #include <asm/lv1call.h> 45 46 #include "ps3_gelic_net.h" 47 #include "ps3_gelic_wireless.h" 48 49 50 static int gelic_wl_start_scan(struct gelic_wl_info *wl, int always_scan, 51 u8 *essid, size_t essid_len); 52 static int gelic_wl_try_associate(struct net_device *netdev); 53 54 /* 55 * tables 56 */ 57 58 /* 802.11b/g channel to freq in MHz */ 59 static const int channel_freq[] = { 60 2412, 2417, 2422, 2427, 2432, 61 2437, 2442, 2447, 2452, 2457, 62 2462, 2467, 2472, 2484 63 }; 64 #define NUM_CHANNELS ARRAY_SIZE(channel_freq) 65 66 /* in bps */ 67 static const int bitrate_list[] = { 68 1000000, 69 2000000, 70 5500000, 71 11000000, 72 6000000, 73 9000000, 74 12000000, 75 18000000, 76 24000000, 77 36000000, 78 48000000, 79 54000000 80 }; 81 #define NUM_BITRATES ARRAY_SIZE(bitrate_list) 82 83 /* 84 * wpa2 support requires the hypervisor version 2.0 or later 85 */ 86 static inline int wpa2_capable(void) 87 { 88 return 0 <= ps3_compare_firmware_version(2, 0, 0); 89 } 90 91 static inline int precise_ie(void) 92 { 93 return 0 <= ps3_compare_firmware_version(2, 2, 0); 94 } 95 /* 96 * post_eurus_cmd helpers 97 */ 98 struct eurus_cmd_arg_info { 99 int pre_arg; /* command requires arg1, arg2 at POST COMMAND */ 100 int post_arg; /* command requires arg1, arg2 at GET_RESULT */ 101 }; 102 103 static const struct eurus_cmd_arg_info cmd_info[GELIC_EURUS_CMD_MAX_INDEX] = { 104 [GELIC_EURUS_CMD_SET_COMMON_CFG] = { .pre_arg = 1}, 105 [GELIC_EURUS_CMD_SET_WEP_CFG] = { .pre_arg = 1}, 106 [GELIC_EURUS_CMD_SET_WPA_CFG] = { .pre_arg = 1}, 107 [GELIC_EURUS_CMD_GET_COMMON_CFG] = { .post_arg = 1}, 108 [GELIC_EURUS_CMD_GET_WEP_CFG] = { .post_arg = 1}, 109 [GELIC_EURUS_CMD_GET_WPA_CFG] = { .post_arg = 1}, 110 [GELIC_EURUS_CMD_GET_RSSI_CFG] = { .post_arg = 1}, 111 [GELIC_EURUS_CMD_START_SCAN] = { .pre_arg = 1}, 112 [GELIC_EURUS_CMD_GET_SCAN] = { .post_arg = 1}, 113 }; 114 115 #ifdef DEBUG 116 static const char *cmdstr(enum gelic_eurus_command ix) 117 { 118 switch (ix) { 119 case GELIC_EURUS_CMD_ASSOC: 120 return "ASSOC"; 121 case GELIC_EURUS_CMD_DISASSOC: 122 return "DISASSOC"; 123 case GELIC_EURUS_CMD_START_SCAN: 124 return "SCAN"; 125 case GELIC_EURUS_CMD_GET_SCAN: 126 return "GET SCAN"; 127 case GELIC_EURUS_CMD_SET_COMMON_CFG: 128 return "SET_COMMON_CFG"; 129 case GELIC_EURUS_CMD_GET_COMMON_CFG: 130 return "GET_COMMON_CFG"; 131 case GELIC_EURUS_CMD_SET_WEP_CFG: 132 return "SET_WEP_CFG"; 133 case GELIC_EURUS_CMD_GET_WEP_CFG: 134 return "GET_WEP_CFG"; 135 case GELIC_EURUS_CMD_SET_WPA_CFG: 136 return "SET_WPA_CFG"; 137 case GELIC_EURUS_CMD_GET_WPA_CFG: 138 return "GET_WPA_CFG"; 139 case GELIC_EURUS_CMD_GET_RSSI_CFG: 140 return "GET_RSSI"; 141 default: 142 break; 143 } 144 return ""; 145 }; 146 #else 147 static inline const char *cmdstr(enum gelic_eurus_command ix) 148 { 149 return ""; 150 } 151 #endif 152 153 /* synchronously do eurus commands */ 154 static void gelic_eurus_sync_cmd_worker(struct work_struct *work) 155 { 156 struct gelic_eurus_cmd *cmd; 157 struct gelic_card *card; 158 struct gelic_wl_info *wl; 159 160 u64 arg1, arg2; 161 162 pr_debug("%s: <-\n", __func__); 163 cmd = container_of(work, struct gelic_eurus_cmd, work); 164 BUG_ON(cmd_info[cmd->cmd].pre_arg && 165 cmd_info[cmd->cmd].post_arg); 166 wl = cmd->wl; 167 card = port_to_card(wl_port(wl)); 168 169 if (cmd_info[cmd->cmd].pre_arg) { 170 arg1 = (cmd->buffer) ? 171 ps3_mm_phys_to_lpar(__pa(cmd->buffer)) : 172 0; 173 arg2 = cmd->buf_size; 174 } else { 175 arg1 = 0; 176 arg2 = 0; 177 } 178 init_completion(&wl->cmd_done_intr); 179 pr_debug("%s: cmd='%s' start\n", __func__, cmdstr(cmd->cmd)); 180 cmd->status = lv1_net_control(bus_id(card), dev_id(card), 181 GELIC_LV1_POST_WLAN_CMD, 182 cmd->cmd, arg1, arg2, 183 &cmd->tag, &cmd->size); 184 if (cmd->status) { 185 complete(&cmd->done); 186 pr_info("%s: cmd issue failed\n", __func__); 187 return; 188 } 189 190 wait_for_completion(&wl->cmd_done_intr); 191 192 if (cmd_info[cmd->cmd].post_arg) { 193 arg1 = ps3_mm_phys_to_lpar(__pa(cmd->buffer)); 194 arg2 = cmd->buf_size; 195 } else { 196 arg1 = 0; 197 arg2 = 0; 198 } 199 200 cmd->status = lv1_net_control(bus_id(card), dev_id(card), 201 GELIC_LV1_GET_WLAN_CMD_RESULT, 202 cmd->tag, arg1, arg2, 203 &cmd->cmd_status, &cmd->size); 204 #ifdef DEBUG 205 if (cmd->status || cmd->cmd_status) { 206 pr_debug("%s: cmd done tag=%#lx arg1=%#lx, arg2=%#lx\n", __func__, 207 cmd->tag, arg1, arg2); 208 pr_debug("%s: cmd done status=%#x cmd_status=%#lx size=%#lx\n", 209 __func__, cmd->status, cmd->cmd_status, cmd->size); 210 } 211 #endif 212 complete(&cmd->done); 213 pr_debug("%s: cmd='%s' done\n", __func__, cmdstr(cmd->cmd)); 214 } 215 216 static struct gelic_eurus_cmd *gelic_eurus_sync_cmd(struct gelic_wl_info *wl, 217 unsigned int eurus_cmd, 218 void *buffer, 219 unsigned int buf_size) 220 { 221 struct gelic_eurus_cmd *cmd; 222 223 /* allocate cmd */ 224 cmd = kzalloc(sizeof(*cmd), GFP_KERNEL); 225 if (!cmd) 226 return NULL; 227 228 /* initialize members */ 229 cmd->cmd = eurus_cmd; 230 cmd->buffer = buffer; 231 cmd->buf_size = buf_size; 232 cmd->wl = wl; 233 INIT_WORK(&cmd->work, gelic_eurus_sync_cmd_worker); 234 init_completion(&cmd->done); 235 queue_work(wl->eurus_cmd_queue, &cmd->work); 236 237 /* wait for command completion */ 238 wait_for_completion(&cmd->done); 239 240 return cmd; 241 } 242 243 static u32 gelic_wl_get_link(struct net_device *netdev) 244 { 245 struct gelic_wl_info *wl = port_wl(netdev_port(netdev)); 246 u32 ret; 247 248 pr_debug("%s: <-\n", __func__); 249 mutex_lock(&wl->assoc_stat_lock); 250 if (wl->assoc_stat == GELIC_WL_ASSOC_STAT_ASSOCIATED) 251 ret = 1; 252 else 253 ret = 0; 254 mutex_unlock(&wl->assoc_stat_lock); 255 pr_debug("%s: ->\n", __func__); 256 return ret; 257 } 258 259 static void gelic_wl_send_iwap_event(struct gelic_wl_info *wl, u8 *bssid) 260 { 261 union iwreq_data data; 262 263 memset(&data, 0, sizeof(data)); 264 if (bssid) 265 memcpy(data.ap_addr.sa_data, bssid, ETH_ALEN); 266 data.ap_addr.sa_family = ARPHRD_ETHER; 267 wireless_send_event(port_to_netdev(wl_port(wl)), SIOCGIWAP, 268 &data, NULL); 269 } 270 271 /* 272 * wireless extension handlers and helpers 273 */ 274 275 /* SIOGIWNAME */ 276 static int gelic_wl_get_name(struct net_device *dev, 277 struct iw_request_info *info, 278 union iwreq_data *iwreq, char *extra) 279 { 280 strcpy(iwreq->name, "IEEE 802.11bg"); 281 return 0; 282 } 283 284 static void gelic_wl_get_ch_info(struct gelic_wl_info *wl) 285 { 286 struct gelic_card *card = port_to_card(wl_port(wl)); 287 u64 ch_info_raw, tmp; 288 int status; 289 290 if (!test_and_set_bit(GELIC_WL_STAT_CH_INFO, &wl->stat)) { 291 status = lv1_net_control(bus_id(card), dev_id(card), 292 GELIC_LV1_GET_CHANNEL, 0, 0, 0, 293 &ch_info_raw, 294 &tmp); 295 /* some fw versions may return error */ 296 if (status) { 297 if (status != LV1_NO_ENTRY) 298 pr_info("%s: available ch unknown\n", __func__); 299 wl->ch_info = 0x07ff;/* 11 ch */ 300 } else 301 /* 16 bits of MSB has available channels */ 302 wl->ch_info = ch_info_raw >> 48; 303 } 304 } 305 306 /* SIOGIWRANGE */ 307 static int gelic_wl_get_range(struct net_device *netdev, 308 struct iw_request_info *info, 309 union iwreq_data *iwreq, char *extra) 310 { 311 struct iw_point *point = &iwreq->data; 312 struct iw_range *range = (struct iw_range *)extra; 313 struct gelic_wl_info *wl = port_wl(netdev_port(netdev)); 314 unsigned int i, chs; 315 316 pr_debug("%s: <-\n", __func__); 317 point->length = sizeof(struct iw_range); 318 memset(range, 0, sizeof(struct iw_range)); 319 320 range->we_version_compiled = WIRELESS_EXT; 321 range->we_version_source = 22; 322 323 /* available channels and frequencies */ 324 gelic_wl_get_ch_info(wl); 325 326 for (i = 0, chs = 0; 327 i < NUM_CHANNELS && chs < IW_MAX_FREQUENCIES; i++) 328 if (wl->ch_info & (1 << i)) { 329 range->freq[chs].i = i + 1; 330 range->freq[chs].m = channel_freq[i]; 331 range->freq[chs].e = 6; 332 chs++; 333 } 334 range->num_frequency = chs; 335 range->old_num_frequency = chs; 336 range->num_channels = chs; 337 range->old_num_channels = chs; 338 339 /* bitrates */ 340 for (i = 0; i < NUM_BITRATES; i++) 341 range->bitrate[i] = bitrate_list[i]; 342 range->num_bitrates = i; 343 344 /* signal levels */ 345 range->max_qual.qual = 100; /* relative value */ 346 range->max_qual.level = 100; 347 range->avg_qual.qual = 50; 348 range->avg_qual.level = 50; 349 range->sensitivity = 0; 350 351 /* Event capability */ 352 IW_EVENT_CAPA_SET_KERNEL(range->event_capa); 353 IW_EVENT_CAPA_SET(range->event_capa, SIOCGIWAP); 354 IW_EVENT_CAPA_SET(range->event_capa, SIOCGIWSCAN); 355 356 /* encryption capability */ 357 range->enc_capa = IW_ENC_CAPA_WPA | 358 IW_ENC_CAPA_CIPHER_TKIP | IW_ENC_CAPA_CIPHER_CCMP | 359 IW_ENC_CAPA_4WAY_HANDSHAKE; 360 if (wpa2_capable()) 361 range->enc_capa |= IW_ENC_CAPA_WPA2; 362 range->encoding_size[0] = 5; /* 40bit WEP */ 363 range->encoding_size[1] = 13; /* 104bit WEP */ 364 range->encoding_size[2] = 32; /* WPA-PSK */ 365 range->num_encoding_sizes = 3; 366 range->max_encoding_tokens = GELIC_WEP_KEYS; 367 368 /* scan capability */ 369 range->scan_capa = IW_SCAN_CAPA_ESSID; 370 371 pr_debug("%s: ->\n", __func__); 372 return 0; 373 374 } 375 376 /* SIOC{G,S}IWSCAN */ 377 static int gelic_wl_set_scan(struct net_device *netdev, 378 struct iw_request_info *info, 379 union iwreq_data *wrqu, char *extra) 380 { 381 struct gelic_wl_info *wl = port_wl(netdev_priv(netdev)); 382 struct iw_scan_req *req; 383 u8 *essid = NULL; 384 size_t essid_len = 0; 385 386 if (wrqu->data.length == sizeof(struct iw_scan_req) && 387 wrqu->data.flags & IW_SCAN_THIS_ESSID) { 388 req = (struct iw_scan_req*)extra; 389 essid = req->essid; 390 essid_len = req->essid_len; 391 pr_debug("%s: ESSID scan =%s\n", __func__, essid); 392 } 393 return gelic_wl_start_scan(wl, 1, essid, essid_len); 394 } 395 396 #define OUI_LEN 3 397 static const u8 rsn_oui[OUI_LEN] = { 0x00, 0x0f, 0xac }; 398 static const u8 wpa_oui[OUI_LEN] = { 0x00, 0x50, 0xf2 }; 399 400 /* 401 * synthesize WPA/RSN IE data 402 * See WiFi WPA specification and IEEE 802.11-2007 7.3.2.25 403 * for the format 404 */ 405 static size_t gelic_wl_synthesize_ie(u8 *buf, 406 struct gelic_eurus_scan_info *scan) 407 { 408 409 const u8 *oui_header; 410 u8 *start = buf; 411 int rsn; 412 int ccmp; 413 414 pr_debug("%s: <- sec=%16x\n", __func__, scan->security); 415 switch (be16_to_cpu(scan->security) & GELIC_EURUS_SCAN_SEC_MASK) { 416 case GELIC_EURUS_SCAN_SEC_WPA: 417 rsn = 0; 418 break; 419 case GELIC_EURUS_SCAN_SEC_WPA2: 420 rsn = 1; 421 break; 422 default: 423 /* WEP or none. No IE returned */ 424 return 0; 425 } 426 427 switch (be16_to_cpu(scan->security) & GELIC_EURUS_SCAN_SEC_WPA_MASK) { 428 case GELIC_EURUS_SCAN_SEC_WPA_TKIP: 429 ccmp = 0; 430 break; 431 case GELIC_EURUS_SCAN_SEC_WPA_AES: 432 ccmp = 1; 433 break; 434 default: 435 if (rsn) { 436 ccmp = 1; 437 pr_info("%s: no cipher info. defaulted to CCMP\n", 438 __func__); 439 } else { 440 ccmp = 0; 441 pr_info("%s: no cipher info. defaulted to TKIP\n", 442 __func__); 443 } 444 } 445 446 if (rsn) 447 oui_header = rsn_oui; 448 else 449 oui_header = wpa_oui; 450 451 /* element id */ 452 if (rsn) 453 *buf++ = WLAN_EID_RSN; 454 else 455 *buf++ = WLAN_EID_VENDOR_SPECIFIC; 456 457 /* length filed; set later */ 458 buf++; 459 460 /* wpa special header */ 461 if (!rsn) { 462 memcpy(buf, wpa_oui, OUI_LEN); 463 buf += OUI_LEN; 464 *buf++ = 0x01; 465 } 466 467 /* version */ 468 *buf++ = 0x01; /* version 1.0 */ 469 *buf++ = 0x00; 470 471 /* group cipher */ 472 memcpy(buf, oui_header, OUI_LEN); 473 buf += OUI_LEN; 474 475 if (ccmp) 476 *buf++ = 0x04; /* CCMP */ 477 else 478 *buf++ = 0x02; /* TKIP */ 479 480 /* pairwise key count always 1 */ 481 *buf++ = 0x01; 482 *buf++ = 0x00; 483 484 /* pairwise key suit */ 485 memcpy(buf, oui_header, OUI_LEN); 486 buf += OUI_LEN; 487 if (ccmp) 488 *buf++ = 0x04; /* CCMP */ 489 else 490 *buf++ = 0x02; /* TKIP */ 491 492 /* AKM count is 1 */ 493 *buf++ = 0x01; 494 *buf++ = 0x00; 495 496 /* AKM suite is assumed as PSK*/ 497 memcpy(buf, oui_header, OUI_LEN); 498 buf += OUI_LEN; 499 *buf++ = 0x02; /* PSK */ 500 501 /* RSN capabilities is 0 */ 502 *buf++ = 0x00; 503 *buf++ = 0x00; 504 505 /* set length field */ 506 start[1] = (buf - start - 2); 507 508 pr_debug("%s: ->\n", __func__); 509 return buf - start; 510 } 511 512 struct ie_item { 513 u8 *data; 514 u8 len; 515 }; 516 517 struct ie_info { 518 struct ie_item wpa; 519 struct ie_item rsn; 520 }; 521 522 static void gelic_wl_parse_ie(u8 *data, size_t len, 523 struct ie_info *ie_info) 524 { 525 size_t data_left = len; 526 u8 *pos = data; 527 u8 item_len; 528 u8 item_id; 529 530 pr_debug("%s: data=%p len=%ld\n", __func__, 531 data, len); 532 memset(ie_info, 0, sizeof(struct ie_info)); 533 534 while (2 <= data_left) { 535 item_id = *pos++; 536 item_len = *pos++; 537 data_left -= 2; 538 539 if (data_left < item_len) 540 break; 541 542 switch (item_id) { 543 case WLAN_EID_VENDOR_SPECIFIC: 544 if ((OUI_LEN + 1 <= item_len) && 545 !memcmp(pos, wpa_oui, OUI_LEN) && 546 pos[OUI_LEN] == 0x01) { 547 ie_info->wpa.data = pos - 2; 548 ie_info->wpa.len = item_len + 2; 549 } 550 break; 551 case WLAN_EID_RSN: 552 ie_info->rsn.data = pos - 2; 553 /* length includes the header */ 554 ie_info->rsn.len = item_len + 2; 555 break; 556 default: 557 pr_debug("%s: ignore %#x,%d\n", __func__, 558 item_id, item_len); 559 break; 560 } 561 pos += item_len; 562 data_left -= item_len; 563 } 564 pr_debug("%s: wpa=%p,%d wpa2=%p,%d\n", __func__, 565 ie_info->wpa.data, ie_info->wpa.len, 566 ie_info->rsn.data, ie_info->rsn.len); 567 } 568 569 570 /* 571 * translate the scan informations from hypervisor to a 572 * independent format 573 */ 574 static char *gelic_wl_translate_scan(struct net_device *netdev, 575 struct iw_request_info *info, 576 char *ev, 577 char *stop, 578 struct gelic_wl_scan_info *network) 579 { 580 struct iw_event iwe; 581 struct gelic_eurus_scan_info *scan = network->hwinfo; 582 char *tmp; 583 u8 rate; 584 unsigned int i, j, len; 585 u8 buf[64]; /* arbitrary size large enough */ 586 587 pr_debug("%s: <-\n", __func__); 588 589 /* first entry should be AP's mac address */ 590 iwe.cmd = SIOCGIWAP; 591 iwe.u.ap_addr.sa_family = ARPHRD_ETHER; 592 memcpy(iwe.u.ap_addr.sa_data, &scan->bssid[2], ETH_ALEN); 593 ev = iwe_stream_add_event(info, ev, stop, &iwe, IW_EV_ADDR_LEN); 594 595 /* ESSID */ 596 iwe.cmd = SIOCGIWESSID; 597 iwe.u.data.flags = 1; 598 iwe.u.data.length = strnlen(scan->essid, 32); 599 ev = iwe_stream_add_point(info, ev, stop, &iwe, scan->essid); 600 601 /* FREQUENCY */ 602 iwe.cmd = SIOCGIWFREQ; 603 iwe.u.freq.m = be16_to_cpu(scan->channel); 604 iwe.u.freq.e = 0; /* table value in MHz */ 605 iwe.u.freq.i = 0; 606 ev = iwe_stream_add_event(info, ev, stop, &iwe, IW_EV_FREQ_LEN); 607 608 /* RATES */ 609 iwe.cmd = SIOCGIWRATE; 610 iwe.u.bitrate.fixed = iwe.u.bitrate.disabled = 0; 611 /* to stuff multiple values in one event */ 612 tmp = ev + iwe_stream_lcp_len(info); 613 /* put them in ascendant order (older is first) */ 614 i = 0; 615 j = 0; 616 pr_debug("%s: rates=%d rate=%d\n", __func__, 617 network->rate_len, network->rate_ext_len); 618 while (i < network->rate_len) { 619 if (j < network->rate_ext_len && 620 ((scan->ext_rate[j] & 0x7f) < (scan->rate[i] & 0x7f))) 621 rate = scan->ext_rate[j++] & 0x7f; 622 else 623 rate = scan->rate[i++] & 0x7f; 624 iwe.u.bitrate.value = rate * 500000; /* 500kbps unit */ 625 tmp = iwe_stream_add_value(info, ev, tmp, stop, &iwe, 626 IW_EV_PARAM_LEN); 627 } 628 while (j < network->rate_ext_len) { 629 iwe.u.bitrate.value = (scan->ext_rate[j++] & 0x7f) * 500000; 630 tmp = iwe_stream_add_value(info, ev, tmp, stop, &iwe, 631 IW_EV_PARAM_LEN); 632 } 633 /* Check if we added any rate */ 634 if (iwe_stream_lcp_len(info) < (tmp - ev)) 635 ev = tmp; 636 637 /* ENCODE */ 638 iwe.cmd = SIOCGIWENCODE; 639 if (be16_to_cpu(scan->capability) & WLAN_CAPABILITY_PRIVACY) 640 iwe.u.data.flags = IW_ENCODE_ENABLED | IW_ENCODE_NOKEY; 641 else 642 iwe.u.data.flags = IW_ENCODE_DISABLED; 643 iwe.u.data.length = 0; 644 ev = iwe_stream_add_point(info, ev, stop, &iwe, scan->essid); 645 646 /* MODE */ 647 iwe.cmd = SIOCGIWMODE; 648 if (be16_to_cpu(scan->capability) & 649 (WLAN_CAPABILITY_ESS | WLAN_CAPABILITY_IBSS)) { 650 if (be16_to_cpu(scan->capability) & WLAN_CAPABILITY_ESS) 651 iwe.u.mode = IW_MODE_MASTER; 652 else 653 iwe.u.mode = IW_MODE_ADHOC; 654 ev = iwe_stream_add_event(info, ev, stop, &iwe, IW_EV_UINT_LEN); 655 } 656 657 /* QUAL */ 658 iwe.cmd = IWEVQUAL; 659 iwe.u.qual.updated = IW_QUAL_ALL_UPDATED | 660 IW_QUAL_QUAL_INVALID | IW_QUAL_NOISE_INVALID; 661 iwe.u.qual.level = be16_to_cpu(scan->rssi); 662 iwe.u.qual.qual = be16_to_cpu(scan->rssi); 663 iwe.u.qual.noise = 0; 664 ev = iwe_stream_add_event(info, ev, stop, &iwe, IW_EV_QUAL_LEN); 665 666 /* RSN */ 667 memset(&iwe, 0, sizeof(iwe)); 668 if (be16_to_cpu(scan->size) <= sizeof(*scan)) { 669 /* If wpa[2] capable station, synthesize IE and put it */ 670 len = gelic_wl_synthesize_ie(buf, scan); 671 if (len) { 672 iwe.cmd = IWEVGENIE; 673 iwe.u.data.length = len; 674 ev = iwe_stream_add_point(info, ev, stop, &iwe, buf); 675 } 676 } else { 677 /* this scan info has IE data */ 678 struct ie_info ie_info; 679 size_t data_len; 680 681 data_len = be16_to_cpu(scan->size) - sizeof(*scan); 682 683 gelic_wl_parse_ie(scan->elements, data_len, &ie_info); 684 685 if (ie_info.wpa.len && (ie_info.wpa.len <= sizeof(buf))) { 686 memcpy(buf, ie_info.wpa.data, ie_info.wpa.len); 687 iwe.cmd = IWEVGENIE; 688 iwe.u.data.length = ie_info.wpa.len; 689 ev = iwe_stream_add_point(info, ev, stop, &iwe, buf); 690 } 691 692 if (ie_info.rsn.len && (ie_info.rsn.len <= sizeof(buf))) { 693 memset(&iwe, 0, sizeof(iwe)); 694 memcpy(buf, ie_info.rsn.data, ie_info.rsn.len); 695 iwe.cmd = IWEVGENIE; 696 iwe.u.data.length = ie_info.rsn.len; 697 ev = iwe_stream_add_point(info, ev, stop, &iwe, buf); 698 } 699 } 700 701 pr_debug("%s: ->\n", __func__); 702 return ev; 703 } 704 705 706 static int gelic_wl_get_scan(struct net_device *netdev, 707 struct iw_request_info *info, 708 union iwreq_data *wrqu, char *extra) 709 { 710 struct gelic_wl_info *wl = port_wl(netdev_priv(netdev)); 711 struct gelic_wl_scan_info *scan_info; 712 char *ev = extra; 713 char *stop = ev + wrqu->data.length; 714 int ret = 0; 715 unsigned long this_time = jiffies; 716 717 pr_debug("%s: <-\n", __func__); 718 if (mutex_lock_interruptible(&wl->scan_lock)) 719 return -EAGAIN; 720 721 switch (wl->scan_stat) { 722 case GELIC_WL_SCAN_STAT_SCANNING: 723 /* If a scan in progress, caller should call me again */ 724 ret = -EAGAIN; 725 goto out; 726 case GELIC_WL_SCAN_STAT_INIT: 727 /* last scan request failed or never issued */ 728 ret = -ENODEV; 729 goto out; 730 case GELIC_WL_SCAN_STAT_GOT_LIST: 731 /* ok, use current list */ 732 break; 733 } 734 735 list_for_each_entry(scan_info, &wl->network_list, list) { 736 if (wl->scan_age == 0 || 737 time_after(scan_info->last_scanned + wl->scan_age, 738 this_time)) 739 ev = gelic_wl_translate_scan(netdev, info, 740 ev, stop, 741 scan_info); 742 else 743 pr_debug("%s:entry too old\n", __func__); 744 745 if (stop - ev <= IW_EV_ADDR_LEN) { 746 ret = -E2BIG; 747 goto out; 748 } 749 } 750 751 wrqu->data.length = ev - extra; 752 wrqu->data.flags = 0; 753 out: 754 mutex_unlock(&wl->scan_lock); 755 pr_debug("%s: -> %d %d\n", __func__, ret, wrqu->data.length); 756 return ret; 757 } 758 759 #ifdef DEBUG 760 static void scan_list_dump(struct gelic_wl_info *wl) 761 { 762 struct gelic_wl_scan_info *scan_info; 763 int i; 764 765 i = 0; 766 list_for_each_entry(scan_info, &wl->network_list, list) { 767 pr_debug("%s: item %d\n", __func__, i++); 768 pr_debug("valid=%d eurusindex=%d last=%lx\n", 769 scan_info->valid, scan_info->eurus_index, 770 scan_info->last_scanned); 771 pr_debug("r_len=%d r_ext_len=%d essid_len=%d\n", 772 scan_info->rate_len, scan_info->rate_ext_len, 773 scan_info->essid_len); 774 /* -- */ 775 pr_debug("bssid=%pM\n", &scan_info->hwinfo->bssid[2]); 776 pr_debug("essid=%s\n", scan_info->hwinfo->essid); 777 } 778 } 779 #endif 780 781 static int gelic_wl_set_auth(struct net_device *netdev, 782 struct iw_request_info *info, 783 union iwreq_data *data, char *extra) 784 { 785 struct iw_param *param = &data->param; 786 struct gelic_wl_info *wl = port_wl(netdev_port(netdev)); 787 unsigned long irqflag; 788 int ret = 0; 789 790 pr_debug("%s: <- %d\n", __func__, param->flags & IW_AUTH_INDEX); 791 spin_lock_irqsave(&wl->lock, irqflag); 792 switch (param->flags & IW_AUTH_INDEX) { 793 case IW_AUTH_WPA_VERSION: 794 if (param->value & IW_AUTH_WPA_VERSION_DISABLED) { 795 pr_debug("%s: NO WPA selected\n", __func__); 796 wl->wpa_level = GELIC_WL_WPA_LEVEL_NONE; 797 wl->group_cipher_method = GELIC_WL_CIPHER_WEP; 798 wl->pairwise_cipher_method = GELIC_WL_CIPHER_WEP; 799 } 800 if (param->value & IW_AUTH_WPA_VERSION_WPA) { 801 pr_debug("%s: WPA version 1 selected\n", __func__); 802 wl->wpa_level = GELIC_WL_WPA_LEVEL_WPA; 803 wl->group_cipher_method = GELIC_WL_CIPHER_TKIP; 804 wl->pairwise_cipher_method = GELIC_WL_CIPHER_TKIP; 805 wl->auth_method = GELIC_EURUS_AUTH_OPEN; 806 } 807 if (param->value & IW_AUTH_WPA_VERSION_WPA2) { 808 /* 809 * As the hypervisor may not tell the cipher 810 * information of the AP if it is WPA2, 811 * you will not decide suitable cipher from 812 * its beacon. 813 * You should have knowledge about the AP's 814 * cipher information in other method prior to 815 * the association. 816 */ 817 if (!precise_ie()) 818 pr_info("%s: WPA2 may not work\n", __func__); 819 if (wpa2_capable()) { 820 wl->wpa_level = GELIC_WL_WPA_LEVEL_WPA2; 821 wl->group_cipher_method = GELIC_WL_CIPHER_AES; 822 wl->pairwise_cipher_method = 823 GELIC_WL_CIPHER_AES; 824 wl->auth_method = GELIC_EURUS_AUTH_OPEN; 825 } else 826 ret = -EINVAL; 827 } 828 break; 829 830 case IW_AUTH_CIPHER_PAIRWISE: 831 if (param->value & 832 (IW_AUTH_CIPHER_WEP104 | IW_AUTH_CIPHER_WEP40)) { 833 pr_debug("%s: WEP selected\n", __func__); 834 wl->pairwise_cipher_method = GELIC_WL_CIPHER_WEP; 835 } 836 if (param->value & IW_AUTH_CIPHER_TKIP) { 837 pr_debug("%s: TKIP selected\n", __func__); 838 wl->pairwise_cipher_method = GELIC_WL_CIPHER_TKIP; 839 } 840 if (param->value & IW_AUTH_CIPHER_CCMP) { 841 pr_debug("%s: CCMP selected\n", __func__); 842 wl->pairwise_cipher_method = GELIC_WL_CIPHER_AES; 843 } 844 if (param->value & IW_AUTH_CIPHER_NONE) { 845 pr_debug("%s: no auth selected\n", __func__); 846 wl->pairwise_cipher_method = GELIC_WL_CIPHER_NONE; 847 } 848 break; 849 case IW_AUTH_CIPHER_GROUP: 850 if (param->value & 851 (IW_AUTH_CIPHER_WEP104 | IW_AUTH_CIPHER_WEP40)) { 852 pr_debug("%s: WEP selected\n", __func__); 853 wl->group_cipher_method = GELIC_WL_CIPHER_WEP; 854 } 855 if (param->value & IW_AUTH_CIPHER_TKIP) { 856 pr_debug("%s: TKIP selected\n", __func__); 857 wl->group_cipher_method = GELIC_WL_CIPHER_TKIP; 858 } 859 if (param->value & IW_AUTH_CIPHER_CCMP) { 860 pr_debug("%s: CCMP selected\n", __func__); 861 wl->group_cipher_method = GELIC_WL_CIPHER_AES; 862 } 863 if (param->value & IW_AUTH_CIPHER_NONE) { 864 pr_debug("%s: no auth selected\n", __func__); 865 wl->group_cipher_method = GELIC_WL_CIPHER_NONE; 866 } 867 break; 868 case IW_AUTH_80211_AUTH_ALG: 869 if (param->value & IW_AUTH_ALG_SHARED_KEY) { 870 pr_debug("%s: shared key specified\n", __func__); 871 wl->auth_method = GELIC_EURUS_AUTH_SHARED; 872 } else if (param->value & IW_AUTH_ALG_OPEN_SYSTEM) { 873 pr_debug("%s: open system specified\n", __func__); 874 wl->auth_method = GELIC_EURUS_AUTH_OPEN; 875 } else 876 ret = -EINVAL; 877 break; 878 879 case IW_AUTH_WPA_ENABLED: 880 if (param->value) { 881 pr_debug("%s: WPA enabled\n", __func__); 882 wl->wpa_level = GELIC_WL_WPA_LEVEL_WPA; 883 } else { 884 pr_debug("%s: WPA disabled\n", __func__); 885 wl->wpa_level = GELIC_WL_WPA_LEVEL_NONE; 886 } 887 break; 888 889 case IW_AUTH_KEY_MGMT: 890 if (param->value & IW_AUTH_KEY_MGMT_PSK) 891 break; 892 /* intentionally fall through */ 893 default: 894 ret = -EOPNOTSUPP; 895 break; 896 } 897 898 if (!ret) 899 set_bit(GELIC_WL_STAT_CONFIGURED, &wl->stat); 900 901 spin_unlock_irqrestore(&wl->lock, irqflag); 902 pr_debug("%s: -> %d\n", __func__, ret); 903 return ret; 904 } 905 906 static int gelic_wl_get_auth(struct net_device *netdev, 907 struct iw_request_info *info, 908 union iwreq_data *iwreq, char *extra) 909 { 910 struct iw_param *param = &iwreq->param; 911 struct gelic_wl_info *wl = port_wl(netdev_port(netdev)); 912 unsigned long irqflag; 913 int ret = 0; 914 915 pr_debug("%s: <- %d\n", __func__, param->flags & IW_AUTH_INDEX); 916 spin_lock_irqsave(&wl->lock, irqflag); 917 switch (param->flags & IW_AUTH_INDEX) { 918 case IW_AUTH_WPA_VERSION: 919 switch (wl->wpa_level) { 920 case GELIC_WL_WPA_LEVEL_WPA: 921 param->value |= IW_AUTH_WPA_VERSION_WPA; 922 break; 923 case GELIC_WL_WPA_LEVEL_WPA2: 924 param->value |= IW_AUTH_WPA_VERSION_WPA2; 925 break; 926 default: 927 param->value |= IW_AUTH_WPA_VERSION_DISABLED; 928 } 929 break; 930 931 case IW_AUTH_80211_AUTH_ALG: 932 if (wl->auth_method == GELIC_EURUS_AUTH_SHARED) 933 param->value = IW_AUTH_ALG_SHARED_KEY; 934 else if (wl->auth_method == GELIC_EURUS_AUTH_OPEN) 935 param->value = IW_AUTH_ALG_OPEN_SYSTEM; 936 break; 937 938 case IW_AUTH_WPA_ENABLED: 939 switch (wl->wpa_level) { 940 case GELIC_WL_WPA_LEVEL_WPA: 941 case GELIC_WL_WPA_LEVEL_WPA2: 942 param->value = 1; 943 break; 944 default: 945 param->value = 0; 946 break; 947 } 948 break; 949 default: 950 ret = -EOPNOTSUPP; 951 } 952 953 spin_unlock_irqrestore(&wl->lock, irqflag); 954 pr_debug("%s: -> %d\n", __func__, ret); 955 return ret; 956 } 957 958 /* SIOC{S,G}IWESSID */ 959 static int gelic_wl_set_essid(struct net_device *netdev, 960 struct iw_request_info *info, 961 union iwreq_data *data, char *extra) 962 { 963 struct gelic_wl_info *wl = port_wl(netdev_priv(netdev)); 964 unsigned long irqflag; 965 966 pr_debug("%s: <- l=%d f=%d\n", __func__, 967 data->essid.length, data->essid.flags); 968 if (IW_ESSID_MAX_SIZE < data->essid.length) 969 return -EINVAL; 970 971 spin_lock_irqsave(&wl->lock, irqflag); 972 if (data->essid.flags) { 973 wl->essid_len = data->essid.length; 974 memcpy(wl->essid, extra, wl->essid_len); 975 pr_debug("%s: essid = '%s'\n", __func__, extra); 976 set_bit(GELIC_WL_STAT_ESSID_SET, &wl->stat); 977 } else { 978 pr_debug("%s: ESSID any\n", __func__); 979 clear_bit(GELIC_WL_STAT_ESSID_SET, &wl->stat); 980 } 981 set_bit(GELIC_WL_STAT_CONFIGURED, &wl->stat); 982 spin_unlock_irqrestore(&wl->lock, irqflag); 983 984 985 gelic_wl_try_associate(netdev); /* FIXME */ 986 pr_debug("%s: ->\n", __func__); 987 return 0; 988 } 989 990 static int gelic_wl_get_essid(struct net_device *netdev, 991 struct iw_request_info *info, 992 union iwreq_data *data, char *extra) 993 { 994 struct gelic_wl_info *wl = port_wl(netdev_priv(netdev)); 995 unsigned long irqflag; 996 997 pr_debug("%s: <-\n", __func__); 998 mutex_lock(&wl->assoc_stat_lock); 999 spin_lock_irqsave(&wl->lock, irqflag); 1000 if (test_bit(GELIC_WL_STAT_ESSID_SET, &wl->stat) || 1001 wl->assoc_stat == GELIC_WL_ASSOC_STAT_ASSOCIATED) { 1002 memcpy(extra, wl->essid, wl->essid_len); 1003 data->essid.length = wl->essid_len; 1004 data->essid.flags = 1; 1005 } else 1006 data->essid.flags = 0; 1007 1008 mutex_unlock(&wl->assoc_stat_lock); 1009 spin_unlock_irqrestore(&wl->lock, irqflag); 1010 pr_debug("%s: -> len=%d\n", __func__, data->essid.length); 1011 1012 return 0; 1013 } 1014 1015 /* SIO{S,G}IWENCODE */ 1016 static int gelic_wl_set_encode(struct net_device *netdev, 1017 struct iw_request_info *info, 1018 union iwreq_data *data, char *extra) 1019 { 1020 struct gelic_wl_info *wl = port_wl(netdev_priv(netdev)); 1021 struct iw_point *enc = &data->encoding; 1022 __u16 flags; 1023 unsigned long irqflag; 1024 int key_index, index_specified; 1025 int ret = 0; 1026 1027 pr_debug("%s: <-\n", __func__); 1028 flags = enc->flags & IW_ENCODE_FLAGS; 1029 key_index = enc->flags & IW_ENCODE_INDEX; 1030 1031 pr_debug("%s: key_index = %d\n", __func__, key_index); 1032 pr_debug("%s: key_len = %d\n", __func__, enc->length); 1033 pr_debug("%s: flag=%x\n", __func__, enc->flags & IW_ENCODE_FLAGS); 1034 1035 if (GELIC_WEP_KEYS < key_index) 1036 return -EINVAL; 1037 1038 spin_lock_irqsave(&wl->lock, irqflag); 1039 if (key_index) { 1040 index_specified = 1; 1041 key_index--; 1042 } else { 1043 index_specified = 0; 1044 key_index = wl->current_key; 1045 } 1046 1047 if (flags & IW_ENCODE_NOKEY) { 1048 /* if just IW_ENCODE_NOKEY, change current key index */ 1049 if (!flags && index_specified) { 1050 wl->current_key = key_index; 1051 goto done; 1052 } 1053 1054 if (flags & IW_ENCODE_DISABLED) { 1055 if (!index_specified) { 1056 /* disable encryption */ 1057 wl->group_cipher_method = GELIC_WL_CIPHER_NONE; 1058 wl->pairwise_cipher_method = 1059 GELIC_WL_CIPHER_NONE; 1060 /* invalidate all key */ 1061 wl->key_enabled = 0; 1062 } else 1063 clear_bit(key_index, &wl->key_enabled); 1064 } 1065 1066 if (flags & IW_ENCODE_OPEN) 1067 wl->auth_method = GELIC_EURUS_AUTH_OPEN; 1068 if (flags & IW_ENCODE_RESTRICTED) { 1069 pr_info("%s: shared key mode enabled\n", __func__); 1070 wl->auth_method = GELIC_EURUS_AUTH_SHARED; 1071 } 1072 } else { 1073 if (IW_ENCODING_TOKEN_MAX < enc->length) { 1074 ret = -EINVAL; 1075 goto done; 1076 } 1077 wl->key_len[key_index] = enc->length; 1078 memcpy(wl->key[key_index], extra, enc->length); 1079 set_bit(key_index, &wl->key_enabled); 1080 wl->pairwise_cipher_method = GELIC_WL_CIPHER_WEP; 1081 wl->group_cipher_method = GELIC_WL_CIPHER_WEP; 1082 } 1083 set_bit(GELIC_WL_STAT_CONFIGURED, &wl->stat); 1084 done: 1085 spin_unlock_irqrestore(&wl->lock, irqflag); 1086 pr_debug("%s: ->\n", __func__); 1087 return ret; 1088 } 1089 1090 static int gelic_wl_get_encode(struct net_device *netdev, 1091 struct iw_request_info *info, 1092 union iwreq_data *data, char *extra) 1093 { 1094 struct gelic_wl_info *wl = port_wl(netdev_priv(netdev)); 1095 struct iw_point *enc = &data->encoding; 1096 unsigned long irqflag; 1097 unsigned int key_index, index_specified; 1098 int ret = 0; 1099 1100 pr_debug("%s: <-\n", __func__); 1101 key_index = enc->flags & IW_ENCODE_INDEX; 1102 pr_debug("%s: flag=%#x point=%p len=%d extra=%p\n", __func__, 1103 enc->flags, enc->pointer, enc->length, extra); 1104 if (GELIC_WEP_KEYS < key_index) 1105 return -EINVAL; 1106 1107 spin_lock_irqsave(&wl->lock, irqflag); 1108 if (key_index) { 1109 index_specified = 1; 1110 key_index--; 1111 } else { 1112 index_specified = 0; 1113 key_index = wl->current_key; 1114 } 1115 1116 if (wl->group_cipher_method == GELIC_WL_CIPHER_WEP) { 1117 switch (wl->auth_method) { 1118 case GELIC_EURUS_AUTH_OPEN: 1119 enc->flags = IW_ENCODE_OPEN; 1120 break; 1121 case GELIC_EURUS_AUTH_SHARED: 1122 enc->flags = IW_ENCODE_RESTRICTED; 1123 break; 1124 } 1125 } else 1126 enc->flags = IW_ENCODE_DISABLED; 1127 1128 if (test_bit(key_index, &wl->key_enabled)) { 1129 if (enc->length < wl->key_len[key_index]) { 1130 ret = -EINVAL; 1131 goto done; 1132 } 1133 enc->length = wl->key_len[key_index]; 1134 memcpy(extra, wl->key[key_index], wl->key_len[key_index]); 1135 } else { 1136 enc->length = 0; 1137 enc->flags |= IW_ENCODE_NOKEY; 1138 } 1139 enc->flags |= key_index + 1; 1140 pr_debug("%s: -> flag=%x len=%d\n", __func__, 1141 enc->flags, enc->length); 1142 1143 done: 1144 spin_unlock_irqrestore(&wl->lock, irqflag); 1145 return ret; 1146 } 1147 1148 /* SIOC{S,G}IWAP */ 1149 static int gelic_wl_set_ap(struct net_device *netdev, 1150 struct iw_request_info *info, 1151 union iwreq_data *data, char *extra) 1152 { 1153 struct gelic_wl_info *wl = port_wl(netdev_priv(netdev)); 1154 unsigned long irqflag; 1155 1156 pr_debug("%s: <-\n", __func__); 1157 if (data->ap_addr.sa_family != ARPHRD_ETHER) 1158 return -EINVAL; 1159 1160 spin_lock_irqsave(&wl->lock, irqflag); 1161 if (is_valid_ether_addr(data->ap_addr.sa_data)) { 1162 memcpy(wl->bssid, data->ap_addr.sa_data, 1163 ETH_ALEN); 1164 set_bit(GELIC_WL_STAT_BSSID_SET, &wl->stat); 1165 set_bit(GELIC_WL_STAT_CONFIGURED, &wl->stat); 1166 pr_debug("%s: bss=%pM\n", __func__, wl->bssid); 1167 } else { 1168 pr_debug("%s: clear bssid\n", __func__); 1169 clear_bit(GELIC_WL_STAT_BSSID_SET, &wl->stat); 1170 memset(wl->bssid, 0, ETH_ALEN); 1171 } 1172 spin_unlock_irqrestore(&wl->lock, irqflag); 1173 pr_debug("%s: ->\n", __func__); 1174 return 0; 1175 } 1176 1177 static int gelic_wl_get_ap(struct net_device *netdev, 1178 struct iw_request_info *info, 1179 union iwreq_data *data, char *extra) 1180 { 1181 struct gelic_wl_info *wl = port_wl(netdev_priv(netdev)); 1182 unsigned long irqflag; 1183 1184 pr_debug("%s: <-\n", __func__); 1185 mutex_lock(&wl->assoc_stat_lock); 1186 spin_lock_irqsave(&wl->lock, irqflag); 1187 if (wl->assoc_stat == GELIC_WL_ASSOC_STAT_ASSOCIATED) { 1188 data->ap_addr.sa_family = ARPHRD_ETHER; 1189 memcpy(data->ap_addr.sa_data, wl->active_bssid, 1190 ETH_ALEN); 1191 } else 1192 memset(data->ap_addr.sa_data, 0, ETH_ALEN); 1193 1194 spin_unlock_irqrestore(&wl->lock, irqflag); 1195 mutex_unlock(&wl->assoc_stat_lock); 1196 pr_debug("%s: ->\n", __func__); 1197 return 0; 1198 } 1199 1200 /* SIOC{S,G}IWENCODEEXT */ 1201 static int gelic_wl_set_encodeext(struct net_device *netdev, 1202 struct iw_request_info *info, 1203 union iwreq_data *data, char *extra) 1204 { 1205 struct gelic_wl_info *wl = port_wl(netdev_priv(netdev)); 1206 struct iw_point *enc = &data->encoding; 1207 struct iw_encode_ext *ext = (struct iw_encode_ext *)extra; 1208 __u16 alg; 1209 __u16 flags; 1210 unsigned long irqflag; 1211 int key_index; 1212 int ret = 0; 1213 1214 pr_debug("%s: <-\n", __func__); 1215 flags = enc->flags & IW_ENCODE_FLAGS; 1216 alg = ext->alg; 1217 key_index = enc->flags & IW_ENCODE_INDEX; 1218 1219 pr_debug("%s: key_index = %d\n", __func__, key_index); 1220 pr_debug("%s: key_len = %d\n", __func__, enc->length); 1221 pr_debug("%s: flag=%x\n", __func__, enc->flags & IW_ENCODE_FLAGS); 1222 pr_debug("%s: ext_flag=%x\n", __func__, ext->ext_flags); 1223 pr_debug("%s: ext_key_len=%x\n", __func__, ext->key_len); 1224 1225 if (GELIC_WEP_KEYS < key_index) 1226 return -EINVAL; 1227 1228 spin_lock_irqsave(&wl->lock, irqflag); 1229 if (key_index) 1230 key_index--; 1231 else 1232 key_index = wl->current_key; 1233 1234 if (!enc->length && (ext->ext_flags & IW_ENCODE_EXT_SET_TX_KEY)) { 1235 /* reques to change default key index */ 1236 pr_debug("%s: request to change default key to %d\n", 1237 __func__, key_index); 1238 wl->current_key = key_index; 1239 goto done; 1240 } 1241 1242 if (alg == IW_ENCODE_ALG_NONE || (flags & IW_ENCODE_DISABLED)) { 1243 pr_debug("%s: alg disabled\n", __func__); 1244 wl->wpa_level = GELIC_WL_WPA_LEVEL_NONE; 1245 wl->group_cipher_method = GELIC_WL_CIPHER_NONE; 1246 wl->pairwise_cipher_method = GELIC_WL_CIPHER_NONE; 1247 wl->auth_method = GELIC_EURUS_AUTH_OPEN; /* should be open */ 1248 } else if (alg == IW_ENCODE_ALG_WEP) { 1249 pr_debug("%s: WEP requested\n", __func__); 1250 if (flags & IW_ENCODE_OPEN) { 1251 pr_debug("%s: open key mode\n", __func__); 1252 wl->auth_method = GELIC_EURUS_AUTH_OPEN; 1253 } 1254 if (flags & IW_ENCODE_RESTRICTED) { 1255 pr_debug("%s: shared key mode\n", __func__); 1256 wl->auth_method = GELIC_EURUS_AUTH_SHARED; 1257 } 1258 if (IW_ENCODING_TOKEN_MAX < ext->key_len) { 1259 pr_info("%s: key is too long %d\n", __func__, 1260 ext->key_len); 1261 ret = -EINVAL; 1262 goto done; 1263 } 1264 /* OK, update the key */ 1265 wl->key_len[key_index] = ext->key_len; 1266 memset(wl->key[key_index], 0, IW_ENCODING_TOKEN_MAX); 1267 memcpy(wl->key[key_index], ext->key, ext->key_len); 1268 set_bit(key_index, &wl->key_enabled); 1269 /* remember wep info changed */ 1270 set_bit(GELIC_WL_STAT_CONFIGURED, &wl->stat); 1271 } else if (alg == IW_ENCODE_ALG_PMK) { 1272 if (ext->key_len != WPA_PSK_LEN) { 1273 pr_err("%s: PSK length wrong %d\n", __func__, 1274 ext->key_len); 1275 ret = -EINVAL; 1276 goto done; 1277 } 1278 memset(wl->psk, 0, sizeof(wl->psk)); 1279 memcpy(wl->psk, ext->key, ext->key_len); 1280 wl->psk_len = ext->key_len; 1281 wl->psk_type = GELIC_EURUS_WPA_PSK_BIN; 1282 /* remember PSK configured */ 1283 set_bit(GELIC_WL_STAT_WPA_PSK_SET, &wl->stat); 1284 } 1285 done: 1286 spin_unlock_irqrestore(&wl->lock, irqflag); 1287 pr_debug("%s: ->\n", __func__); 1288 return ret; 1289 } 1290 1291 static int gelic_wl_get_encodeext(struct net_device *netdev, 1292 struct iw_request_info *info, 1293 union iwreq_data *data, char *extra) 1294 { 1295 struct gelic_wl_info *wl = port_wl(netdev_priv(netdev)); 1296 struct iw_point *enc = &data->encoding; 1297 struct iw_encode_ext *ext = (struct iw_encode_ext *)extra; 1298 unsigned long irqflag; 1299 int key_index; 1300 int ret = 0; 1301 int max_key_len; 1302 1303 pr_debug("%s: <-\n", __func__); 1304 1305 max_key_len = enc->length - sizeof(struct iw_encode_ext); 1306 if (max_key_len < 0) 1307 return -EINVAL; 1308 key_index = enc->flags & IW_ENCODE_INDEX; 1309 1310 pr_debug("%s: key_index = %d\n", __func__, key_index); 1311 pr_debug("%s: key_len = %d\n", __func__, enc->length); 1312 pr_debug("%s: flag=%x\n", __func__, enc->flags & IW_ENCODE_FLAGS); 1313 1314 if (GELIC_WEP_KEYS < key_index) 1315 return -EINVAL; 1316 1317 spin_lock_irqsave(&wl->lock, irqflag); 1318 if (key_index) 1319 key_index--; 1320 else 1321 key_index = wl->current_key; 1322 1323 memset(ext, 0, sizeof(struct iw_encode_ext)); 1324 switch (wl->group_cipher_method) { 1325 case GELIC_WL_CIPHER_WEP: 1326 ext->alg = IW_ENCODE_ALG_WEP; 1327 enc->flags |= IW_ENCODE_ENABLED; 1328 break; 1329 case GELIC_WL_CIPHER_TKIP: 1330 ext->alg = IW_ENCODE_ALG_TKIP; 1331 enc->flags |= IW_ENCODE_ENABLED; 1332 break; 1333 case GELIC_WL_CIPHER_AES: 1334 ext->alg = IW_ENCODE_ALG_CCMP; 1335 enc->flags |= IW_ENCODE_ENABLED; 1336 break; 1337 case GELIC_WL_CIPHER_NONE: 1338 default: 1339 ext->alg = IW_ENCODE_ALG_NONE; 1340 enc->flags |= IW_ENCODE_NOKEY; 1341 break; 1342 } 1343 1344 if (!(enc->flags & IW_ENCODE_NOKEY)) { 1345 if (max_key_len < wl->key_len[key_index]) { 1346 ret = -E2BIG; 1347 goto out; 1348 } 1349 if (test_bit(key_index, &wl->key_enabled)) 1350 memcpy(ext->key, wl->key[key_index], 1351 wl->key_len[key_index]); 1352 else 1353 pr_debug("%s: disabled key requested ix=%d\n", 1354 __func__, key_index); 1355 } 1356 out: 1357 spin_unlock_irqrestore(&wl->lock, irqflag); 1358 pr_debug("%s: ->\n", __func__); 1359 return ret; 1360 } 1361 /* SIOC{S,G}IWMODE */ 1362 static int gelic_wl_set_mode(struct net_device *netdev, 1363 struct iw_request_info *info, 1364 union iwreq_data *data, char *extra) 1365 { 1366 __u32 mode = data->mode; 1367 int ret; 1368 1369 pr_debug("%s: <-\n", __func__); 1370 if (mode == IW_MODE_INFRA) 1371 ret = 0; 1372 else 1373 ret = -EOPNOTSUPP; 1374 pr_debug("%s: -> %d\n", __func__, ret); 1375 return ret; 1376 } 1377 1378 static int gelic_wl_get_mode(struct net_device *netdev, 1379 struct iw_request_info *info, 1380 union iwreq_data *data, char *extra) 1381 { 1382 __u32 *mode = &data->mode; 1383 pr_debug("%s: <-\n", __func__); 1384 *mode = IW_MODE_INFRA; 1385 pr_debug("%s: ->\n", __func__); 1386 return 0; 1387 } 1388 1389 /* SIOCGIWNICKN */ 1390 static int gelic_wl_get_nick(struct net_device *net_dev, 1391 struct iw_request_info *info, 1392 union iwreq_data *data, char *extra) 1393 { 1394 strcpy(extra, "gelic_wl"); 1395 data->data.length = strlen(extra); 1396 data->data.flags = 1; 1397 return 0; 1398 } 1399 1400 1401 /* --- */ 1402 1403 static struct iw_statistics *gelic_wl_get_wireless_stats( 1404 struct net_device *netdev) 1405 { 1406 1407 struct gelic_wl_info *wl = port_wl(netdev_priv(netdev)); 1408 struct gelic_eurus_cmd *cmd; 1409 struct iw_statistics *is; 1410 struct gelic_eurus_rssi_info *rssi; 1411 void *buf; 1412 1413 pr_debug("%s: <-\n", __func__); 1414 1415 buf = (void *)__get_free_page(GFP_KERNEL); 1416 if (!buf) 1417 return NULL; 1418 1419 is = &wl->iwstat; 1420 memset(is, 0, sizeof(*is)); 1421 cmd = gelic_eurus_sync_cmd(wl, GELIC_EURUS_CMD_GET_RSSI_CFG, 1422 buf, sizeof(*rssi)); 1423 if (cmd && !cmd->status && !cmd->cmd_status) { 1424 rssi = buf; 1425 is->qual.level = be16_to_cpu(rssi->rssi); 1426 is->qual.updated = IW_QUAL_LEVEL_UPDATED | 1427 IW_QUAL_QUAL_INVALID | IW_QUAL_NOISE_INVALID; 1428 } else 1429 /* not associated */ 1430 is->qual.updated = IW_QUAL_ALL_INVALID; 1431 1432 kfree(cmd); 1433 free_page((unsigned long)buf); 1434 pr_debug("%s: ->\n", __func__); 1435 return is; 1436 } 1437 1438 /* 1439 * scanning helpers 1440 */ 1441 static int gelic_wl_start_scan(struct gelic_wl_info *wl, int always_scan, 1442 u8 *essid, size_t essid_len) 1443 { 1444 struct gelic_eurus_cmd *cmd; 1445 int ret = 0; 1446 void *buf = NULL; 1447 size_t len; 1448 1449 pr_debug("%s: <- always=%d\n", __func__, always_scan); 1450 if (mutex_lock_interruptible(&wl->scan_lock)) 1451 return -ERESTARTSYS; 1452 1453 /* 1454 * If already a scan in progress, do not trigger more 1455 */ 1456 if (wl->scan_stat == GELIC_WL_SCAN_STAT_SCANNING) { 1457 pr_debug("%s: scanning now\n", __func__); 1458 goto out; 1459 } 1460 1461 init_completion(&wl->scan_done); 1462 /* 1463 * If we have already a bss list, don't try to get new 1464 * unless we are doing an ESSID scan 1465 */ 1466 if ((!essid_len && !always_scan) 1467 && wl->scan_stat == GELIC_WL_SCAN_STAT_GOT_LIST) { 1468 pr_debug("%s: already has the list\n", __func__); 1469 complete(&wl->scan_done); 1470 goto out; 1471 } 1472 1473 /* ESSID scan ? */ 1474 if (essid_len && essid) { 1475 buf = (void *)__get_free_page(GFP_KERNEL); 1476 if (!buf) { 1477 ret = -ENOMEM; 1478 goto out; 1479 } 1480 len = IW_ESSID_MAX_SIZE; /* hypervisor always requires 32 */ 1481 memset(buf, 0, len); 1482 memcpy(buf, essid, essid_len); 1483 pr_debug("%s: essid scan='%s'\n", __func__, (char *)buf); 1484 } else 1485 len = 0; 1486 1487 /* 1488 * issue start scan request 1489 */ 1490 wl->scan_stat = GELIC_WL_SCAN_STAT_SCANNING; 1491 cmd = gelic_eurus_sync_cmd(wl, GELIC_EURUS_CMD_START_SCAN, 1492 buf, len); 1493 if (!cmd || cmd->status || cmd->cmd_status) { 1494 wl->scan_stat = GELIC_WL_SCAN_STAT_INIT; 1495 complete(&wl->scan_done); 1496 ret = -ENOMEM; 1497 goto out; 1498 } 1499 kfree(cmd); 1500 out: 1501 free_page((unsigned long)buf); 1502 mutex_unlock(&wl->scan_lock); 1503 pr_debug("%s: ->\n", __func__); 1504 return ret; 1505 } 1506 1507 /* 1508 * retrieve scan result from the chip (hypervisor) 1509 * this function is invoked by schedule work. 1510 */ 1511 static void gelic_wl_scan_complete_event(struct gelic_wl_info *wl) 1512 { 1513 struct gelic_eurus_cmd *cmd = NULL; 1514 struct gelic_wl_scan_info *target, *tmp; 1515 struct gelic_wl_scan_info *oldest = NULL; 1516 struct gelic_eurus_scan_info *scan_info; 1517 unsigned int scan_info_size; 1518 union iwreq_data data; 1519 unsigned long this_time = jiffies; 1520 unsigned int data_len, i, found, r; 1521 void *buf; 1522 1523 pr_debug("%s:start\n", __func__); 1524 mutex_lock(&wl->scan_lock); 1525 1526 buf = (void *)__get_free_page(GFP_KERNEL); 1527 if (!buf) { 1528 pr_info("%s: scan buffer alloc failed\n", __func__); 1529 goto out; 1530 } 1531 1532 if (wl->scan_stat != GELIC_WL_SCAN_STAT_SCANNING) { 1533 /* 1534 * stop() may be called while scanning, ignore result 1535 */ 1536 pr_debug("%s: scan complete when stat != scanning(%d)\n", 1537 __func__, wl->scan_stat); 1538 goto out; 1539 } 1540 1541 cmd = gelic_eurus_sync_cmd(wl, GELIC_EURUS_CMD_GET_SCAN, 1542 buf, PAGE_SIZE); 1543 if (!cmd || cmd->status || cmd->cmd_status) { 1544 wl->scan_stat = GELIC_WL_SCAN_STAT_INIT; 1545 pr_info("%s:cmd failed\n", __func__); 1546 kfree(cmd); 1547 goto out; 1548 } 1549 data_len = cmd->size; 1550 pr_debug("%s: data_len = %d\n", __func__, data_len); 1551 kfree(cmd); 1552 1553 /* OK, bss list retrieved */ 1554 wl->scan_stat = GELIC_WL_SCAN_STAT_GOT_LIST; 1555 1556 /* mark all entries are old */ 1557 list_for_each_entry_safe(target, tmp, &wl->network_list, list) { 1558 target->valid = 0; 1559 /* expire too old entries */ 1560 if (time_before(target->last_scanned + wl->scan_age, 1561 this_time)) { 1562 kfree(target->hwinfo); 1563 target->hwinfo = NULL; 1564 list_move_tail(&target->list, &wl->network_free_list); 1565 } 1566 } 1567 1568 /* put them in the network_list */ 1569 for (i = 0, scan_info_size = 0, scan_info = buf; 1570 scan_info_size < data_len; 1571 i++, scan_info_size += be16_to_cpu(scan_info->size), 1572 scan_info = (void *)scan_info + be16_to_cpu(scan_info->size)) { 1573 pr_debug("%s:size=%d bssid=%pM scan_info=%p\n", __func__, 1574 be16_to_cpu(scan_info->size), 1575 &scan_info->bssid[2], scan_info); 1576 1577 /* 1578 * The wireless firmware may return invalid channel 0 and/or 1579 * invalid rate if the AP emits zero length SSID ie. As this 1580 * scan information is useless, ignore it 1581 */ 1582 if (!be16_to_cpu(scan_info->channel) || !scan_info->rate[0]) { 1583 pr_debug("%s: invalid scan info\n", __func__); 1584 continue; 1585 } 1586 1587 found = 0; 1588 oldest = NULL; 1589 list_for_each_entry(target, &wl->network_list, list) { 1590 if (ether_addr_equal(&target->hwinfo->bssid[2], 1591 &scan_info->bssid[2])) { 1592 found = 1; 1593 pr_debug("%s: same BBS found scanned list\n", 1594 __func__); 1595 break; 1596 } 1597 if (!oldest || 1598 (target->last_scanned < oldest->last_scanned)) 1599 oldest = target; 1600 } 1601 1602 if (!found) { 1603 /* not found in the list */ 1604 if (list_empty(&wl->network_free_list)) { 1605 /* expire oldest */ 1606 target = oldest; 1607 } else { 1608 target = list_entry(wl->network_free_list.next, 1609 struct gelic_wl_scan_info, 1610 list); 1611 } 1612 } 1613 1614 /* update the item */ 1615 target->last_scanned = this_time; 1616 target->valid = 1; 1617 target->eurus_index = i; 1618 kfree(target->hwinfo); 1619 target->hwinfo = kzalloc(be16_to_cpu(scan_info->size), 1620 GFP_KERNEL); 1621 if (!target->hwinfo) 1622 continue; 1623 1624 /* copy hw scan info */ 1625 memcpy(target->hwinfo, scan_info, scan_info->size); 1626 target->essid_len = strnlen(scan_info->essid, 1627 sizeof(scan_info->essid)); 1628 target->rate_len = 0; 1629 for (r = 0; r < 12; r++) 1630 if (scan_info->rate[r]) 1631 target->rate_len++; 1632 if (8 < target->rate_len) 1633 pr_info("%s: AP returns %d rates\n", __func__, 1634 target->rate_len); 1635 target->rate_ext_len = 0; 1636 for (r = 0; r < 16; r++) 1637 if (scan_info->ext_rate[r]) 1638 target->rate_ext_len++; 1639 list_move_tail(&target->list, &wl->network_list); 1640 } 1641 memset(&data, 0, sizeof(data)); 1642 wireless_send_event(port_to_netdev(wl_port(wl)), SIOCGIWSCAN, &data, 1643 NULL); 1644 out: 1645 free_page((unsigned long)buf); 1646 complete(&wl->scan_done); 1647 mutex_unlock(&wl->scan_lock); 1648 pr_debug("%s:end\n", __func__); 1649 } 1650 1651 /* 1652 * Select an appropriate bss from current scan list regarding 1653 * current settings from userspace. 1654 * The caller must hold wl->scan_lock, 1655 * and on the state of wl->scan_state == GELIC_WL_SCAN_GOT_LIST 1656 */ 1657 static void update_best(struct gelic_wl_scan_info **best, 1658 struct gelic_wl_scan_info *candid, 1659 int *best_weight, 1660 int *weight) 1661 { 1662 if (*best_weight < ++(*weight)) { 1663 *best_weight = *weight; 1664 *best = candid; 1665 } 1666 } 1667 1668 static 1669 struct gelic_wl_scan_info *gelic_wl_find_best_bss(struct gelic_wl_info *wl) 1670 { 1671 struct gelic_wl_scan_info *scan_info; 1672 struct gelic_wl_scan_info *best_bss; 1673 int weight, best_weight; 1674 u16 security; 1675 1676 pr_debug("%s: <-\n", __func__); 1677 1678 best_bss = NULL; 1679 best_weight = 0; 1680 1681 list_for_each_entry(scan_info, &wl->network_list, list) { 1682 pr_debug("%s: station %p\n", __func__, scan_info); 1683 1684 if (!scan_info->valid) { 1685 pr_debug("%s: station invalid\n", __func__); 1686 continue; 1687 } 1688 1689 /* If bss specified, check it only */ 1690 if (test_bit(GELIC_WL_STAT_BSSID_SET, &wl->stat)) { 1691 if (ether_addr_equal(&scan_info->hwinfo->bssid[2], 1692 wl->bssid)) { 1693 best_bss = scan_info; 1694 pr_debug("%s: bssid matched\n", __func__); 1695 break; 1696 } else { 1697 pr_debug("%s: bssid unmached\n", __func__); 1698 continue; 1699 } 1700 } 1701 1702 weight = 0; 1703 1704 /* security */ 1705 security = be16_to_cpu(scan_info->hwinfo->security) & 1706 GELIC_EURUS_SCAN_SEC_MASK; 1707 if (wl->wpa_level == GELIC_WL_WPA_LEVEL_WPA2) { 1708 if (security == GELIC_EURUS_SCAN_SEC_WPA2) 1709 update_best(&best_bss, scan_info, 1710 &best_weight, &weight); 1711 else 1712 continue; 1713 } else if (wl->wpa_level == GELIC_WL_WPA_LEVEL_WPA) { 1714 if (security == GELIC_EURUS_SCAN_SEC_WPA) 1715 update_best(&best_bss, scan_info, 1716 &best_weight, &weight); 1717 else 1718 continue; 1719 } else if (wl->wpa_level == GELIC_WL_WPA_LEVEL_NONE && 1720 wl->group_cipher_method == GELIC_WL_CIPHER_WEP) { 1721 if (security == GELIC_EURUS_SCAN_SEC_WEP) 1722 update_best(&best_bss, scan_info, 1723 &best_weight, &weight); 1724 else 1725 continue; 1726 } 1727 1728 /* If ESSID is set, check it */ 1729 if (test_bit(GELIC_WL_STAT_ESSID_SET, &wl->stat)) { 1730 if ((scan_info->essid_len == wl->essid_len) && 1731 !strncmp(wl->essid, 1732 scan_info->hwinfo->essid, 1733 scan_info->essid_len)) 1734 update_best(&best_bss, scan_info, 1735 &best_weight, &weight); 1736 else 1737 continue; 1738 } 1739 } 1740 1741 #ifdef DEBUG 1742 pr_debug("%s: -> bss=%p\n", __func__, best_bss); 1743 if (best_bss) { 1744 pr_debug("%s:addr=%pM\n", __func__, 1745 &best_bss->hwinfo->bssid[2]); 1746 } 1747 #endif 1748 return best_bss; 1749 } 1750 1751 /* 1752 * Setup WEP configuration to the chip 1753 * The caller must hold wl->scan_lock, 1754 * and on the state of wl->scan_state == GELIC_WL_SCAN_GOT_LIST 1755 */ 1756 static int gelic_wl_do_wep_setup(struct gelic_wl_info *wl) 1757 { 1758 unsigned int i; 1759 struct gelic_eurus_wep_cfg *wep; 1760 struct gelic_eurus_cmd *cmd; 1761 int wep104 = 0; 1762 int have_key = 0; 1763 int ret = 0; 1764 1765 pr_debug("%s: <-\n", __func__); 1766 /* we can assume no one should uses the buffer */ 1767 wep = (struct gelic_eurus_wep_cfg *)__get_free_page(GFP_KERNEL); 1768 if (!wep) 1769 return -ENOMEM; 1770 1771 memset(wep, 0, sizeof(*wep)); 1772 1773 if (wl->group_cipher_method == GELIC_WL_CIPHER_WEP) { 1774 pr_debug("%s: WEP mode\n", __func__); 1775 for (i = 0; i < GELIC_WEP_KEYS; i++) { 1776 if (!test_bit(i, &wl->key_enabled)) 1777 continue; 1778 1779 pr_debug("%s: key#%d enabled\n", __func__, i); 1780 have_key = 1; 1781 if (wl->key_len[i] == 13) 1782 wep104 = 1; 1783 else if (wl->key_len[i] != 5) { 1784 pr_info("%s: wrong wep key[%d]=%d\n", 1785 __func__, i, wl->key_len[i]); 1786 ret = -EINVAL; 1787 goto out; 1788 } 1789 memcpy(wep->key[i], wl->key[i], wl->key_len[i]); 1790 } 1791 1792 if (!have_key) { 1793 pr_info("%s: all wep key disabled\n", __func__); 1794 ret = -EINVAL; 1795 goto out; 1796 } 1797 1798 if (wep104) { 1799 pr_debug("%s: 104bit key\n", __func__); 1800 wep->security = cpu_to_be16(GELIC_EURUS_WEP_SEC_104BIT); 1801 } else { 1802 pr_debug("%s: 40bit key\n", __func__); 1803 wep->security = cpu_to_be16(GELIC_EURUS_WEP_SEC_40BIT); 1804 } 1805 } else { 1806 pr_debug("%s: NO encryption\n", __func__); 1807 wep->security = cpu_to_be16(GELIC_EURUS_WEP_SEC_NONE); 1808 } 1809 1810 /* issue wep setup */ 1811 cmd = gelic_eurus_sync_cmd(wl, GELIC_EURUS_CMD_SET_WEP_CFG, 1812 wep, sizeof(*wep)); 1813 if (!cmd) 1814 ret = -ENOMEM; 1815 else if (cmd->status || cmd->cmd_status) 1816 ret = -ENXIO; 1817 1818 kfree(cmd); 1819 out: 1820 free_page((unsigned long)wep); 1821 pr_debug("%s: ->\n", __func__); 1822 return ret; 1823 } 1824 1825 #ifdef DEBUG 1826 static const char *wpasecstr(enum gelic_eurus_wpa_security sec) 1827 { 1828 switch (sec) { 1829 case GELIC_EURUS_WPA_SEC_NONE: 1830 return "NONE"; 1831 case GELIC_EURUS_WPA_SEC_WPA_TKIP_TKIP: 1832 return "WPA_TKIP_TKIP"; 1833 case GELIC_EURUS_WPA_SEC_WPA_TKIP_AES: 1834 return "WPA_TKIP_AES"; 1835 case GELIC_EURUS_WPA_SEC_WPA_AES_AES: 1836 return "WPA_AES_AES"; 1837 case GELIC_EURUS_WPA_SEC_WPA2_TKIP_TKIP: 1838 return "WPA2_TKIP_TKIP"; 1839 case GELIC_EURUS_WPA_SEC_WPA2_TKIP_AES: 1840 return "WPA2_TKIP_AES"; 1841 case GELIC_EURUS_WPA_SEC_WPA2_AES_AES: 1842 return "WPA2_AES_AES"; 1843 } 1844 return ""; 1845 }; 1846 #endif 1847 1848 static int gelic_wl_do_wpa_setup(struct gelic_wl_info *wl) 1849 { 1850 struct gelic_eurus_wpa_cfg *wpa; 1851 struct gelic_eurus_cmd *cmd; 1852 u16 security; 1853 int ret = 0; 1854 1855 pr_debug("%s: <-\n", __func__); 1856 /* we can assume no one should uses the buffer */ 1857 wpa = (struct gelic_eurus_wpa_cfg *)__get_free_page(GFP_KERNEL); 1858 if (!wpa) 1859 return -ENOMEM; 1860 1861 memset(wpa, 0, sizeof(*wpa)); 1862 1863 if (!test_bit(GELIC_WL_STAT_WPA_PSK_SET, &wl->stat)) 1864 pr_info("%s: PSK not configured yet\n", __func__); 1865 1866 /* copy key */ 1867 memcpy(wpa->psk, wl->psk, wl->psk_len); 1868 1869 /* set security level */ 1870 if (wl->wpa_level == GELIC_WL_WPA_LEVEL_WPA2) { 1871 if (wl->group_cipher_method == GELIC_WL_CIPHER_AES) { 1872 security = GELIC_EURUS_WPA_SEC_WPA2_AES_AES; 1873 } else { 1874 if (wl->pairwise_cipher_method == GELIC_WL_CIPHER_AES && 1875 precise_ie()) 1876 security = GELIC_EURUS_WPA_SEC_WPA2_TKIP_AES; 1877 else 1878 security = GELIC_EURUS_WPA_SEC_WPA2_TKIP_TKIP; 1879 } 1880 } else { 1881 if (wl->group_cipher_method == GELIC_WL_CIPHER_AES) { 1882 security = GELIC_EURUS_WPA_SEC_WPA_AES_AES; 1883 } else { 1884 if (wl->pairwise_cipher_method == GELIC_WL_CIPHER_AES && 1885 precise_ie()) 1886 security = GELIC_EURUS_WPA_SEC_WPA_TKIP_AES; 1887 else 1888 security = GELIC_EURUS_WPA_SEC_WPA_TKIP_TKIP; 1889 } 1890 } 1891 wpa->security = cpu_to_be16(security); 1892 1893 /* PSK type */ 1894 wpa->psk_type = cpu_to_be16(wl->psk_type); 1895 #ifdef DEBUG 1896 pr_debug("%s: sec=%s psktype=%s\n", __func__, 1897 wpasecstr(wpa->security), 1898 (wpa->psk_type == GELIC_EURUS_WPA_PSK_BIN) ? 1899 "BIN" : "passphrase"); 1900 #if 0 1901 /* 1902 * don't enable here if you plan to submit 1903 * the debug log because this dumps your precious 1904 * passphrase/key. 1905 */ 1906 pr_debug("%s: psk=%s\n", __func__, 1907 (wpa->psk_type == GELIC_EURUS_WPA_PSK_BIN) ? 1908 "N/A" : wpa->psk); 1909 #endif 1910 #endif 1911 /* issue wpa setup */ 1912 cmd = gelic_eurus_sync_cmd(wl, GELIC_EURUS_CMD_SET_WPA_CFG, 1913 wpa, sizeof(*wpa)); 1914 if (!cmd) 1915 ret = -ENOMEM; 1916 else if (cmd->status || cmd->cmd_status) 1917 ret = -ENXIO; 1918 kfree(cmd); 1919 free_page((unsigned long)wpa); 1920 pr_debug("%s: --> %d\n", __func__, ret); 1921 return ret; 1922 } 1923 1924 /* 1925 * Start association. caller must hold assoc_stat_lock 1926 */ 1927 static int gelic_wl_associate_bss(struct gelic_wl_info *wl, 1928 struct gelic_wl_scan_info *bss) 1929 { 1930 struct gelic_eurus_cmd *cmd; 1931 struct gelic_eurus_common_cfg *common; 1932 int ret = 0; 1933 unsigned long rc; 1934 1935 pr_debug("%s: <-\n", __func__); 1936 1937 /* do common config */ 1938 common = (struct gelic_eurus_common_cfg *)__get_free_page(GFP_KERNEL); 1939 if (!common) 1940 return -ENOMEM; 1941 1942 memset(common, 0, sizeof(*common)); 1943 common->bss_type = cpu_to_be16(GELIC_EURUS_BSS_INFRA); 1944 common->op_mode = cpu_to_be16(GELIC_EURUS_OPMODE_11BG); 1945 1946 common->scan_index = cpu_to_be16(bss->eurus_index); 1947 switch (wl->auth_method) { 1948 case GELIC_EURUS_AUTH_OPEN: 1949 common->auth_method = cpu_to_be16(GELIC_EURUS_AUTH_OPEN); 1950 break; 1951 case GELIC_EURUS_AUTH_SHARED: 1952 common->auth_method = cpu_to_be16(GELIC_EURUS_AUTH_SHARED); 1953 break; 1954 } 1955 1956 #ifdef DEBUG 1957 scan_list_dump(wl); 1958 #endif 1959 pr_debug("%s: common cfg index=%d bsstype=%d auth=%d\n", __func__, 1960 be16_to_cpu(common->scan_index), 1961 be16_to_cpu(common->bss_type), 1962 be16_to_cpu(common->auth_method)); 1963 1964 cmd = gelic_eurus_sync_cmd(wl, GELIC_EURUS_CMD_SET_COMMON_CFG, 1965 common, sizeof(*common)); 1966 if (!cmd || cmd->status || cmd->cmd_status) { 1967 ret = -ENOMEM; 1968 kfree(cmd); 1969 goto out; 1970 } 1971 kfree(cmd); 1972 1973 /* WEP/WPA */ 1974 switch (wl->wpa_level) { 1975 case GELIC_WL_WPA_LEVEL_NONE: 1976 /* If WEP or no security, setup WEP config */ 1977 ret = gelic_wl_do_wep_setup(wl); 1978 break; 1979 case GELIC_WL_WPA_LEVEL_WPA: 1980 case GELIC_WL_WPA_LEVEL_WPA2: 1981 ret = gelic_wl_do_wpa_setup(wl); 1982 break; 1983 } 1984 1985 if (ret) { 1986 pr_debug("%s: WEP/WPA setup failed %d\n", __func__, 1987 ret); 1988 ret = -EPERM; 1989 gelic_wl_send_iwap_event(wl, NULL); 1990 goto out; 1991 } 1992 1993 /* start association */ 1994 init_completion(&wl->assoc_done); 1995 wl->assoc_stat = GELIC_WL_ASSOC_STAT_ASSOCIATING; 1996 cmd = gelic_eurus_sync_cmd(wl, GELIC_EURUS_CMD_ASSOC, 1997 NULL, 0); 1998 if (!cmd || cmd->status || cmd->cmd_status) { 1999 pr_debug("%s: assoc request failed\n", __func__); 2000 wl->assoc_stat = GELIC_WL_ASSOC_STAT_DISCONN; 2001 kfree(cmd); 2002 ret = -ENOMEM; 2003 gelic_wl_send_iwap_event(wl, NULL); 2004 goto out; 2005 } 2006 kfree(cmd); 2007 2008 /* wait for connected event */ 2009 rc = wait_for_completion_timeout(&wl->assoc_done, HZ * 4);/*FIXME*/ 2010 2011 if (!rc) { 2012 /* timeouted. Maybe key or cyrpt mode is wrong */ 2013 pr_info("%s: connect timeout\n", __func__); 2014 cmd = gelic_eurus_sync_cmd(wl, GELIC_EURUS_CMD_DISASSOC, 2015 NULL, 0); 2016 kfree(cmd); 2017 wl->assoc_stat = GELIC_WL_ASSOC_STAT_DISCONN; 2018 gelic_wl_send_iwap_event(wl, NULL); 2019 ret = -ENXIO; 2020 } else { 2021 wl->assoc_stat = GELIC_WL_ASSOC_STAT_ASSOCIATED; 2022 /* copy bssid */ 2023 memcpy(wl->active_bssid, &bss->hwinfo->bssid[2], ETH_ALEN); 2024 2025 /* send connect event */ 2026 gelic_wl_send_iwap_event(wl, wl->active_bssid); 2027 pr_info("%s: connected\n", __func__); 2028 } 2029 out: 2030 free_page((unsigned long)common); 2031 pr_debug("%s: ->\n", __func__); 2032 return ret; 2033 } 2034 2035 /* 2036 * connected event 2037 */ 2038 static void gelic_wl_connected_event(struct gelic_wl_info *wl, 2039 u64 event) 2040 { 2041 u64 desired_event = 0; 2042 2043 switch (wl->wpa_level) { 2044 case GELIC_WL_WPA_LEVEL_NONE: 2045 desired_event = GELIC_LV1_WL_EVENT_CONNECTED; 2046 break; 2047 case GELIC_WL_WPA_LEVEL_WPA: 2048 case GELIC_WL_WPA_LEVEL_WPA2: 2049 desired_event = GELIC_LV1_WL_EVENT_WPA_CONNECTED; 2050 break; 2051 } 2052 2053 if (desired_event == event) { 2054 pr_debug("%s: completed\n", __func__); 2055 complete(&wl->assoc_done); 2056 netif_carrier_on(port_to_netdev(wl_port(wl))); 2057 } else 2058 pr_debug("%s: event %#llx under wpa\n", 2059 __func__, event); 2060 } 2061 2062 /* 2063 * disconnect event 2064 */ 2065 static void gelic_wl_disconnect_event(struct gelic_wl_info *wl, 2066 u64 event) 2067 { 2068 struct gelic_eurus_cmd *cmd; 2069 int lock; 2070 2071 /* 2072 * If we fall here in the middle of association, 2073 * associate_bss() should be waiting for complation of 2074 * wl->assoc_done. 2075 * As it waits with timeout, just leave assoc_done 2076 * uncompleted, then it terminates with timeout 2077 */ 2078 if (!mutex_trylock(&wl->assoc_stat_lock)) { 2079 pr_debug("%s: already locked\n", __func__); 2080 lock = 0; 2081 } else { 2082 pr_debug("%s: obtain lock\n", __func__); 2083 lock = 1; 2084 } 2085 2086 cmd = gelic_eurus_sync_cmd(wl, GELIC_EURUS_CMD_DISASSOC, NULL, 0); 2087 kfree(cmd); 2088 2089 /* send disconnected event to the supplicant */ 2090 if (wl->assoc_stat == GELIC_WL_ASSOC_STAT_ASSOCIATED) 2091 gelic_wl_send_iwap_event(wl, NULL); 2092 2093 wl->assoc_stat = GELIC_WL_ASSOC_STAT_DISCONN; 2094 netif_carrier_off(port_to_netdev(wl_port(wl))); 2095 2096 if (lock) 2097 mutex_unlock(&wl->assoc_stat_lock); 2098 } 2099 /* 2100 * event worker 2101 */ 2102 #ifdef DEBUG 2103 static const char *eventstr(enum gelic_lv1_wl_event event) 2104 { 2105 static char buf[32]; 2106 char *ret; 2107 if (event & GELIC_LV1_WL_EVENT_DEVICE_READY) 2108 ret = "EURUS_READY"; 2109 else if (event & GELIC_LV1_WL_EVENT_SCAN_COMPLETED) 2110 ret = "SCAN_COMPLETED"; 2111 else if (event & GELIC_LV1_WL_EVENT_DEAUTH) 2112 ret = "DEAUTH"; 2113 else if (event & GELIC_LV1_WL_EVENT_BEACON_LOST) 2114 ret = "BEACON_LOST"; 2115 else if (event & GELIC_LV1_WL_EVENT_CONNECTED) 2116 ret = "CONNECTED"; 2117 else if (event & GELIC_LV1_WL_EVENT_WPA_CONNECTED) 2118 ret = "WPA_CONNECTED"; 2119 else if (event & GELIC_LV1_WL_EVENT_WPA_ERROR) 2120 ret = "WPA_ERROR"; 2121 else { 2122 sprintf(buf, "Unknown(%#x)", event); 2123 ret = buf; 2124 } 2125 return ret; 2126 } 2127 #else 2128 static const char *eventstr(enum gelic_lv1_wl_event event) 2129 { 2130 return NULL; 2131 } 2132 #endif 2133 static void gelic_wl_event_worker(struct work_struct *work) 2134 { 2135 struct gelic_wl_info *wl; 2136 struct gelic_port *port; 2137 u64 event, tmp; 2138 int status; 2139 2140 pr_debug("%s:start\n", __func__); 2141 wl = container_of(work, struct gelic_wl_info, event_work.work); 2142 port = wl_port(wl); 2143 while (1) { 2144 status = lv1_net_control(bus_id(port->card), dev_id(port->card), 2145 GELIC_LV1_GET_WLAN_EVENT, 0, 0, 0, 2146 &event, &tmp); 2147 if (status) { 2148 if (status != LV1_NO_ENTRY) 2149 pr_debug("%s:wlan event failed %d\n", 2150 __func__, status); 2151 /* got all events */ 2152 pr_debug("%s:end\n", __func__); 2153 return; 2154 } 2155 pr_debug("%s: event=%s\n", __func__, eventstr(event)); 2156 switch (event) { 2157 case GELIC_LV1_WL_EVENT_SCAN_COMPLETED: 2158 gelic_wl_scan_complete_event(wl); 2159 break; 2160 case GELIC_LV1_WL_EVENT_BEACON_LOST: 2161 case GELIC_LV1_WL_EVENT_DEAUTH: 2162 gelic_wl_disconnect_event(wl, event); 2163 break; 2164 case GELIC_LV1_WL_EVENT_CONNECTED: 2165 case GELIC_LV1_WL_EVENT_WPA_CONNECTED: 2166 gelic_wl_connected_event(wl, event); 2167 break; 2168 default: 2169 break; 2170 } 2171 } /* while */ 2172 } 2173 /* 2174 * association worker 2175 */ 2176 static void gelic_wl_assoc_worker(struct work_struct *work) 2177 { 2178 struct gelic_wl_info *wl; 2179 2180 struct gelic_wl_scan_info *best_bss; 2181 int ret; 2182 unsigned long irqflag; 2183 u8 *essid; 2184 size_t essid_len; 2185 2186 wl = container_of(work, struct gelic_wl_info, assoc_work.work); 2187 2188 mutex_lock(&wl->assoc_stat_lock); 2189 2190 if (wl->assoc_stat != GELIC_WL_ASSOC_STAT_DISCONN) 2191 goto out; 2192 2193 spin_lock_irqsave(&wl->lock, irqflag); 2194 if (test_bit(GELIC_WL_STAT_ESSID_SET, &wl->stat)) { 2195 pr_debug("%s: assoc ESSID configured %s\n", __func__, 2196 wl->essid); 2197 essid = wl->essid; 2198 essid_len = wl->essid_len; 2199 } else { 2200 essid = NULL; 2201 essid_len = 0; 2202 } 2203 spin_unlock_irqrestore(&wl->lock, irqflag); 2204 2205 ret = gelic_wl_start_scan(wl, 0, essid, essid_len); 2206 if (ret == -ERESTARTSYS) { 2207 pr_debug("%s: scan start failed association\n", __func__); 2208 schedule_delayed_work(&wl->assoc_work, HZ/10); /*FIXME*/ 2209 goto out; 2210 } else if (ret) { 2211 pr_info("%s: scan prerequisite failed\n", __func__); 2212 goto out; 2213 } 2214 2215 /* 2216 * Wait for bss scan completion 2217 * If we have scan list already, gelic_wl_start_scan() 2218 * returns OK and raises the complete. Thus, 2219 * it's ok to wait unconditionally here 2220 */ 2221 wait_for_completion(&wl->scan_done); 2222 2223 pr_debug("%s: scan done\n", __func__); 2224 mutex_lock(&wl->scan_lock); 2225 if (wl->scan_stat != GELIC_WL_SCAN_STAT_GOT_LIST) { 2226 gelic_wl_send_iwap_event(wl, NULL); 2227 pr_info("%s: no scan list. association failed\n", __func__); 2228 goto scan_lock_out; 2229 } 2230 2231 /* find best matching bss */ 2232 best_bss = gelic_wl_find_best_bss(wl); 2233 if (!best_bss) { 2234 gelic_wl_send_iwap_event(wl, NULL); 2235 pr_info("%s: no bss matched. association failed\n", __func__); 2236 goto scan_lock_out; 2237 } 2238 2239 /* ok, do association */ 2240 ret = gelic_wl_associate_bss(wl, best_bss); 2241 if (ret) 2242 pr_info("%s: association failed %d\n", __func__, ret); 2243 scan_lock_out: 2244 mutex_unlock(&wl->scan_lock); 2245 out: 2246 mutex_unlock(&wl->assoc_stat_lock); 2247 } 2248 /* 2249 * Interrupt handler 2250 * Called from the ethernet interrupt handler 2251 * Processes wireless specific virtual interrupts only 2252 */ 2253 void gelic_wl_interrupt(struct net_device *netdev, u64 status) 2254 { 2255 struct gelic_wl_info *wl = port_wl(netdev_priv(netdev)); 2256 2257 if (status & GELIC_CARD_WLAN_COMMAND_COMPLETED) { 2258 pr_debug("%s:cmd complete\n", __func__); 2259 complete(&wl->cmd_done_intr); 2260 } 2261 2262 if (status & GELIC_CARD_WLAN_EVENT_RECEIVED) { 2263 pr_debug("%s:event received\n", __func__); 2264 queue_delayed_work(wl->event_queue, &wl->event_work, 0); 2265 } 2266 } 2267 2268 /* 2269 * driver helpers 2270 */ 2271 static const iw_handler gelic_wl_wext_handler[] = 2272 { 2273 IW_HANDLER(SIOCGIWNAME, gelic_wl_get_name), 2274 IW_HANDLER(SIOCGIWRANGE, gelic_wl_get_range), 2275 IW_HANDLER(SIOCSIWSCAN, gelic_wl_set_scan), 2276 IW_HANDLER(SIOCGIWSCAN, gelic_wl_get_scan), 2277 IW_HANDLER(SIOCSIWAUTH, gelic_wl_set_auth), 2278 IW_HANDLER(SIOCGIWAUTH, gelic_wl_get_auth), 2279 IW_HANDLER(SIOCSIWESSID, gelic_wl_set_essid), 2280 IW_HANDLER(SIOCGIWESSID, gelic_wl_get_essid), 2281 IW_HANDLER(SIOCSIWENCODE, gelic_wl_set_encode), 2282 IW_HANDLER(SIOCGIWENCODE, gelic_wl_get_encode), 2283 IW_HANDLER(SIOCSIWAP, gelic_wl_set_ap), 2284 IW_HANDLER(SIOCGIWAP, gelic_wl_get_ap), 2285 IW_HANDLER(SIOCSIWENCODEEXT, gelic_wl_set_encodeext), 2286 IW_HANDLER(SIOCGIWENCODEEXT, gelic_wl_get_encodeext), 2287 IW_HANDLER(SIOCSIWMODE, gelic_wl_set_mode), 2288 IW_HANDLER(SIOCGIWMODE, gelic_wl_get_mode), 2289 IW_HANDLER(SIOCGIWNICKN, gelic_wl_get_nick), 2290 }; 2291 2292 static const struct iw_handler_def gelic_wl_wext_handler_def = { 2293 .num_standard = ARRAY_SIZE(gelic_wl_wext_handler), 2294 .standard = gelic_wl_wext_handler, 2295 .get_wireless_stats = gelic_wl_get_wireless_stats, 2296 }; 2297 2298 static struct net_device *gelic_wl_alloc(struct gelic_card *card) 2299 { 2300 struct net_device *netdev; 2301 struct gelic_port *port; 2302 struct gelic_wl_info *wl; 2303 unsigned int i; 2304 2305 pr_debug("%s:start\n", __func__); 2306 netdev = alloc_etherdev(sizeof(struct gelic_port) + 2307 sizeof(struct gelic_wl_info)); 2308 pr_debug("%s: netdev =%p card=%p\n", __func__, netdev, card); 2309 if (!netdev) 2310 return NULL; 2311 2312 strcpy(netdev->name, "wlan%d"); 2313 2314 port = netdev_priv(netdev); 2315 port->netdev = netdev; 2316 port->card = card; 2317 port->type = GELIC_PORT_WIRELESS; 2318 2319 wl = port_wl(port); 2320 pr_debug("%s: wl=%p port=%p\n", __func__, wl, port); 2321 2322 /* allocate scan list */ 2323 wl->networks = kzalloc(sizeof(struct gelic_wl_scan_info) * 2324 GELIC_WL_BSS_MAX_ENT, GFP_KERNEL); 2325 2326 if (!wl->networks) 2327 goto fail_bss; 2328 2329 wl->eurus_cmd_queue = create_singlethread_workqueue("gelic_cmd"); 2330 if (!wl->eurus_cmd_queue) 2331 goto fail_cmd_workqueue; 2332 2333 wl->event_queue = create_singlethread_workqueue("gelic_event"); 2334 if (!wl->event_queue) 2335 goto fail_event_workqueue; 2336 2337 INIT_LIST_HEAD(&wl->network_free_list); 2338 INIT_LIST_HEAD(&wl->network_list); 2339 for (i = 0; i < GELIC_WL_BSS_MAX_ENT; i++) 2340 list_add_tail(&wl->networks[i].list, 2341 &wl->network_free_list); 2342 init_completion(&wl->cmd_done_intr); 2343 2344 INIT_DELAYED_WORK(&wl->event_work, gelic_wl_event_worker); 2345 INIT_DELAYED_WORK(&wl->assoc_work, gelic_wl_assoc_worker); 2346 mutex_init(&wl->scan_lock); 2347 mutex_init(&wl->assoc_stat_lock); 2348 2349 init_completion(&wl->scan_done); 2350 /* for the case that no scan request is issued and stop() is called */ 2351 complete(&wl->scan_done); 2352 2353 spin_lock_init(&wl->lock); 2354 2355 wl->scan_age = 5*HZ; /* FIXME */ 2356 2357 /* buffer for receiving scanned list etc */ 2358 BUILD_BUG_ON(PAGE_SIZE < 2359 sizeof(struct gelic_eurus_scan_info) * 2360 GELIC_EURUS_MAX_SCAN); 2361 pr_debug("%s:end\n", __func__); 2362 return netdev; 2363 2364 fail_event_workqueue: 2365 destroy_workqueue(wl->eurus_cmd_queue); 2366 fail_cmd_workqueue: 2367 kfree(wl->networks); 2368 fail_bss: 2369 free_netdev(netdev); 2370 pr_debug("%s:end error\n", __func__); 2371 return NULL; 2372 2373 } 2374 2375 static void gelic_wl_free(struct gelic_wl_info *wl) 2376 { 2377 struct gelic_wl_scan_info *scan_info; 2378 unsigned int i; 2379 2380 pr_debug("%s: <-\n", __func__); 2381 2382 pr_debug("%s: destroy queues\n", __func__); 2383 destroy_workqueue(wl->eurus_cmd_queue); 2384 destroy_workqueue(wl->event_queue); 2385 2386 scan_info = wl->networks; 2387 for (i = 0; i < GELIC_WL_BSS_MAX_ENT; i++, scan_info++) 2388 kfree(scan_info->hwinfo); 2389 kfree(wl->networks); 2390 2391 free_netdev(port_to_netdev(wl_port(wl))); 2392 2393 pr_debug("%s: ->\n", __func__); 2394 } 2395 2396 static int gelic_wl_try_associate(struct net_device *netdev) 2397 { 2398 struct gelic_wl_info *wl = port_wl(netdev_priv(netdev)); 2399 int ret = -1; 2400 unsigned int i; 2401 2402 pr_debug("%s: <-\n", __func__); 2403 2404 /* check constraits for start association */ 2405 /* for no access restriction AP */ 2406 if (wl->group_cipher_method == GELIC_WL_CIPHER_NONE) { 2407 if (test_bit(GELIC_WL_STAT_CONFIGURED, 2408 &wl->stat)) 2409 goto do_associate; 2410 else { 2411 pr_debug("%s: no wep, not configured\n", __func__); 2412 return ret; 2413 } 2414 } 2415 2416 /* for WEP, one of four keys should be set */ 2417 if (wl->group_cipher_method == GELIC_WL_CIPHER_WEP) { 2418 /* one of keys set */ 2419 for (i = 0; i < GELIC_WEP_KEYS; i++) { 2420 if (test_bit(i, &wl->key_enabled)) 2421 goto do_associate; 2422 } 2423 pr_debug("%s: WEP, but no key specified\n", __func__); 2424 return ret; 2425 } 2426 2427 /* for WPA[2], psk should be set */ 2428 if ((wl->group_cipher_method == GELIC_WL_CIPHER_TKIP) || 2429 (wl->group_cipher_method == GELIC_WL_CIPHER_AES)) { 2430 if (test_bit(GELIC_WL_STAT_WPA_PSK_SET, 2431 &wl->stat)) 2432 goto do_associate; 2433 else { 2434 pr_debug("%s: AES/TKIP, but PSK not configured\n", 2435 __func__); 2436 return ret; 2437 } 2438 } 2439 2440 do_associate: 2441 ret = schedule_delayed_work(&wl->assoc_work, 0); 2442 pr_debug("%s: start association work %d\n", __func__, ret); 2443 return ret; 2444 } 2445 2446 /* 2447 * netdev handlers 2448 */ 2449 static int gelic_wl_open(struct net_device *netdev) 2450 { 2451 struct gelic_card *card = netdev_card(netdev); 2452 2453 pr_debug("%s:->%p\n", __func__, netdev); 2454 2455 gelic_card_up(card); 2456 2457 /* try to associate */ 2458 gelic_wl_try_associate(netdev); 2459 2460 netif_start_queue(netdev); 2461 2462 pr_debug("%s:<-\n", __func__); 2463 return 0; 2464 } 2465 2466 /* 2467 * reset state machine 2468 */ 2469 static int gelic_wl_reset_state(struct gelic_wl_info *wl) 2470 { 2471 struct gelic_wl_scan_info *target; 2472 struct gelic_wl_scan_info *tmp; 2473 2474 /* empty scan list */ 2475 list_for_each_entry_safe(target, tmp, &wl->network_list, list) { 2476 list_move_tail(&target->list, &wl->network_free_list); 2477 } 2478 wl->scan_stat = GELIC_WL_SCAN_STAT_INIT; 2479 2480 /* clear configuration */ 2481 wl->auth_method = GELIC_EURUS_AUTH_OPEN; 2482 wl->group_cipher_method = GELIC_WL_CIPHER_NONE; 2483 wl->pairwise_cipher_method = GELIC_WL_CIPHER_NONE; 2484 wl->wpa_level = GELIC_WL_WPA_LEVEL_NONE; 2485 2486 wl->key_enabled = 0; 2487 wl->current_key = 0; 2488 2489 wl->psk_type = GELIC_EURUS_WPA_PSK_PASSPHRASE; 2490 wl->psk_len = 0; 2491 2492 wl->essid_len = 0; 2493 memset(wl->essid, 0, sizeof(wl->essid)); 2494 memset(wl->bssid, 0, sizeof(wl->bssid)); 2495 memset(wl->active_bssid, 0, sizeof(wl->active_bssid)); 2496 2497 wl->assoc_stat = GELIC_WL_ASSOC_STAT_DISCONN; 2498 2499 memset(&wl->iwstat, 0, sizeof(wl->iwstat)); 2500 /* all status bit clear */ 2501 wl->stat = 0; 2502 return 0; 2503 } 2504 2505 /* 2506 * Tell eurus to terminate association 2507 */ 2508 static void gelic_wl_disconnect(struct net_device *netdev) 2509 { 2510 struct gelic_port *port = netdev_priv(netdev); 2511 struct gelic_wl_info *wl = port_wl(port); 2512 struct gelic_eurus_cmd *cmd; 2513 2514 /* 2515 * If scann process is running on chip, 2516 * further requests will be rejected 2517 */ 2518 if (wl->scan_stat == GELIC_WL_SCAN_STAT_SCANNING) 2519 wait_for_completion_timeout(&wl->scan_done, HZ); 2520 2521 cmd = gelic_eurus_sync_cmd(wl, GELIC_EURUS_CMD_DISASSOC, NULL, 0); 2522 kfree(cmd); 2523 gelic_wl_send_iwap_event(wl, NULL); 2524 }; 2525 2526 static int gelic_wl_stop(struct net_device *netdev) 2527 { 2528 struct gelic_port *port = netdev_priv(netdev); 2529 struct gelic_wl_info *wl = port_wl(port); 2530 struct gelic_card *card = netdev_card(netdev); 2531 2532 pr_debug("%s:<-\n", __func__); 2533 2534 /* 2535 * Cancel pending association work. 2536 * event work can run after netdev down 2537 */ 2538 cancel_delayed_work(&wl->assoc_work); 2539 2540 if (wl->assoc_stat == GELIC_WL_ASSOC_STAT_ASSOCIATED) 2541 gelic_wl_disconnect(netdev); 2542 2543 /* reset our state machine */ 2544 gelic_wl_reset_state(wl); 2545 2546 netif_stop_queue(netdev); 2547 2548 gelic_card_down(card); 2549 2550 pr_debug("%s:->\n", __func__); 2551 return 0; 2552 } 2553 2554 /* -- */ 2555 2556 static const struct net_device_ops gelic_wl_netdevice_ops = { 2557 .ndo_open = gelic_wl_open, 2558 .ndo_stop = gelic_wl_stop, 2559 .ndo_start_xmit = gelic_net_xmit, 2560 .ndo_set_rx_mode = gelic_net_set_multi, 2561 .ndo_change_mtu = gelic_net_change_mtu, 2562 .ndo_tx_timeout = gelic_net_tx_timeout, 2563 .ndo_set_mac_address = eth_mac_addr, 2564 .ndo_validate_addr = eth_validate_addr, 2565 #ifdef CONFIG_NET_POLL_CONTROLLER 2566 .ndo_poll_controller = gelic_net_poll_controller, 2567 #endif 2568 }; 2569 2570 static const struct ethtool_ops gelic_wl_ethtool_ops = { 2571 .get_drvinfo = gelic_net_get_drvinfo, 2572 .get_link = gelic_wl_get_link, 2573 }; 2574 2575 static void gelic_wl_setup_netdev_ops(struct net_device *netdev) 2576 { 2577 struct gelic_wl_info *wl; 2578 wl = port_wl(netdev_priv(netdev)); 2579 BUG_ON(!wl); 2580 netdev->watchdog_timeo = GELIC_NET_WATCHDOG_TIMEOUT; 2581 2582 netdev->ethtool_ops = &gelic_wl_ethtool_ops; 2583 netdev->netdev_ops = &gelic_wl_netdevice_ops; 2584 netdev->wireless_data = &wl->wireless_data; 2585 netdev->wireless_handlers = &gelic_wl_wext_handler_def; 2586 } 2587 2588 /* 2589 * driver probe/remove 2590 */ 2591 int gelic_wl_driver_probe(struct gelic_card *card) 2592 { 2593 int ret; 2594 struct net_device *netdev; 2595 2596 pr_debug("%s:start\n", __func__); 2597 2598 if (ps3_compare_firmware_version(1, 6, 0) < 0) 2599 return 0; 2600 if (!card->vlan[GELIC_PORT_WIRELESS].tx) 2601 return 0; 2602 2603 /* alloc netdevice for wireless */ 2604 netdev = gelic_wl_alloc(card); 2605 if (!netdev) 2606 return -ENOMEM; 2607 2608 /* setup net_device structure */ 2609 SET_NETDEV_DEV(netdev, &card->dev->core); 2610 gelic_wl_setup_netdev_ops(netdev); 2611 2612 /* setup some of net_device and register it */ 2613 ret = gelic_net_setup_netdev(netdev, card); 2614 if (ret) 2615 goto fail_setup; 2616 card->netdev[GELIC_PORT_WIRELESS] = netdev; 2617 2618 /* add enable wireless interrupt */ 2619 card->irq_mask |= GELIC_CARD_WLAN_EVENT_RECEIVED | 2620 GELIC_CARD_WLAN_COMMAND_COMPLETED; 2621 /* to allow wireless commands while both interfaces are down */ 2622 gelic_card_set_irq_mask(card, GELIC_CARD_WLAN_EVENT_RECEIVED | 2623 GELIC_CARD_WLAN_COMMAND_COMPLETED); 2624 pr_debug("%s:end\n", __func__); 2625 return 0; 2626 2627 fail_setup: 2628 gelic_wl_free(port_wl(netdev_port(netdev))); 2629 2630 return ret; 2631 } 2632 2633 int gelic_wl_driver_remove(struct gelic_card *card) 2634 { 2635 struct gelic_wl_info *wl; 2636 struct net_device *netdev; 2637 2638 pr_debug("%s:start\n", __func__); 2639 2640 if (ps3_compare_firmware_version(1, 6, 0) < 0) 2641 return 0; 2642 if (!card->vlan[GELIC_PORT_WIRELESS].tx) 2643 return 0; 2644 2645 netdev = card->netdev[GELIC_PORT_WIRELESS]; 2646 wl = port_wl(netdev_priv(netdev)); 2647 2648 /* if the interface was not up, but associated */ 2649 if (wl->assoc_stat == GELIC_WL_ASSOC_STAT_ASSOCIATED) 2650 gelic_wl_disconnect(netdev); 2651 2652 complete(&wl->cmd_done_intr); 2653 2654 /* cancel all work queue */ 2655 cancel_delayed_work(&wl->assoc_work); 2656 cancel_delayed_work(&wl->event_work); 2657 flush_workqueue(wl->eurus_cmd_queue); 2658 flush_workqueue(wl->event_queue); 2659 2660 unregister_netdev(netdev); 2661 2662 /* disable wireless interrupt */ 2663 pr_debug("%s: disable intr\n", __func__); 2664 card->irq_mask &= ~(GELIC_CARD_WLAN_EVENT_RECEIVED | 2665 GELIC_CARD_WLAN_COMMAND_COMPLETED); 2666 /* free bss list, netdev*/ 2667 gelic_wl_free(wl); 2668 pr_debug("%s:end\n", __func__); 2669 return 0; 2670 } 2671