xref: /linux/drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c (revision 79ac11393328fb1717d17c12e3c0eef0e9fa0647)
1 // SPDX-License-Identifier: ISC
2 /*
3  * Copyright (c) 2010 Broadcom Corporation
4  */
5 
6 /* Toplevel file. Relies on dhd_linux.c to send commands to the dongle. */
7 
8 #include <linux/kernel.h>
9 #include <linux/etherdevice.h>
10 #include <linux/module.h>
11 #include <linux/vmalloc.h>
12 #include <net/cfg80211.h>
13 #include <net/netlink.h>
14 #include <uapi/linux/if_arp.h>
15 
16 #include <brcmu_utils.h>
17 #include <defs.h>
18 #include <brcmu_wifi.h>
19 #include <brcm_hw_ids.h>
20 #include "core.h"
21 #include "debug.h"
22 #include "tracepoint.h"
23 #include "fwil_types.h"
24 #include "p2p.h"
25 #include "btcoex.h"
26 #include "pno.h"
27 #include "fwsignal.h"
28 #include "cfg80211.h"
29 #include "feature.h"
30 #include "fwil.h"
31 #include "proto.h"
32 #include "vendor.h"
33 #include "bus.h"
34 #include "common.h"
35 
36 #define BRCMF_SCAN_IE_LEN_MAX		2048
37 
38 #define WPA_OUI				"\x00\x50\xF2"	/* WPA OUI */
39 #define WPA_OUI_TYPE			1
40 #define RSN_OUI				"\x00\x0F\xAC"	/* RSN OUI */
41 #define	WME_OUI_TYPE			2
42 #define WPS_OUI_TYPE			4
43 
44 #define VS_IE_FIXED_HDR_LEN		6
45 #define WPA_IE_VERSION_LEN		2
46 #define WPA_IE_MIN_OUI_LEN		4
47 #define WPA_IE_SUITE_COUNT_LEN		2
48 
49 #define WPA_CIPHER_NONE			0	/* None */
50 #define WPA_CIPHER_WEP_40		1	/* WEP (40-bit) */
51 #define WPA_CIPHER_TKIP			2	/* TKIP: default for WPA */
52 #define WPA_CIPHER_AES_CCM		4	/* AES (CCM) */
53 #define WPA_CIPHER_WEP_104		5	/* WEP (104-bit) */
54 
55 #define RSN_AKM_NONE			0	/* None (IBSS) */
56 #define RSN_AKM_UNSPECIFIED		1	/* Over 802.1x */
57 #define RSN_AKM_PSK			2	/* Pre-shared Key */
58 #define RSN_AKM_SHA256_1X		5	/* SHA256, 802.1X */
59 #define RSN_AKM_SHA256_PSK		6	/* SHA256, Pre-shared Key */
60 #define RSN_AKM_SAE			8	/* SAE */
61 #define RSN_CAP_LEN			2	/* Length of RSN capabilities */
62 #define RSN_CAP_PTK_REPLAY_CNTR_MASK	(BIT(2) | BIT(3))
63 #define RSN_CAP_MFPR_MASK		BIT(6)
64 #define RSN_CAP_MFPC_MASK		BIT(7)
65 #define RSN_PMKID_COUNT_LEN		2
66 
67 #define VNDR_IE_CMD_LEN			4	/* length of the set command
68 						 * string :"add", "del" (+ NUL)
69 						 */
70 #define VNDR_IE_COUNT_OFFSET		4
71 #define VNDR_IE_PKTFLAG_OFFSET		8
72 #define VNDR_IE_VSIE_OFFSET		12
73 #define VNDR_IE_HDR_SIZE		12
74 #define VNDR_IE_PARSE_LIMIT		5
75 
76 #define	DOT11_MGMT_HDR_LEN		24	/* d11 management header len */
77 #define	DOT11_BCN_PRB_FIXED_LEN		12	/* beacon/probe fixed length */
78 
79 #define BRCMF_SCAN_JOIN_ACTIVE_DWELL_TIME_MS	320
80 #define BRCMF_SCAN_JOIN_PASSIVE_DWELL_TIME_MS	400
81 #define BRCMF_SCAN_JOIN_PROBE_INTERVAL_MS	20
82 
83 #define BRCMF_SCAN_CHANNEL_TIME		40
84 #define BRCMF_SCAN_UNASSOC_TIME		40
85 #define BRCMF_SCAN_PASSIVE_TIME		120
86 
87 #define BRCMF_ND_INFO_TIMEOUT		msecs_to_jiffies(2000)
88 
89 #define BRCMF_PS_MAX_TIMEOUT_MS		2000
90 
91 /* Dump obss definitions */
92 #define ACS_MSRMNT_DELAY		80
93 #define CHAN_NOISE_DUMMY		(-80)
94 #define OBSS_TOKEN_IDX			15
95 #define IBSS_TOKEN_IDX			15
96 #define TX_TOKEN_IDX			14
97 #define CTG_TOKEN_IDX			13
98 #define PKT_TOKEN_IDX			15
99 #define IDLE_TOKEN_IDX			12
100 
101 #define BRCMF_ASSOC_PARAMS_FIXED_SIZE \
102 	(sizeof(struct brcmf_assoc_params_le) - sizeof(u16))
103 
104 #define BRCMF_MAX_CHANSPEC_LIST \
105 	(BRCMF_DCMD_MEDLEN / sizeof(__le32) - 1)
106 
107 struct brcmf_dump_survey {
108 	u32 obss;
109 	u32 ibss;
110 	u32 no_ctg;
111 	u32 no_pckt;
112 	u32 tx;
113 	u32 idle;
114 };
115 
116 struct cca_stats_n_flags {
117 	u32 msrmnt_time; /* Time for Measurement (msec) */
118 	u32 msrmnt_done; /* flag set when measurement complete */
119 	char buf[1];
120 };
121 
122 struct cca_msrmnt_query {
123 	u32 msrmnt_query;
124 	u32 time_req;
125 };
126 
127 static bool check_vif_up(struct brcmf_cfg80211_vif *vif)
128 {
129 	if (!test_bit(BRCMF_VIF_STATUS_READY, &vif->sme_state)) {
130 		brcmf_dbg(INFO, "device is not ready : status (%lu)\n",
131 			  vif->sme_state);
132 		return false;
133 	}
134 	return true;
135 }
136 
137 #define RATE_TO_BASE100KBPS(rate)   (((rate) * 10) / 2)
138 #define RATETAB_ENT(_rateid, _flags) \
139 	{                                                               \
140 		.bitrate        = RATE_TO_BASE100KBPS(_rateid),     \
141 		.hw_value       = (_rateid),                            \
142 		.flags          = (_flags),                             \
143 	}
144 
145 static struct ieee80211_rate __wl_rates[] = {
146 	RATETAB_ENT(BRCM_RATE_1M, 0),
147 	RATETAB_ENT(BRCM_RATE_2M, IEEE80211_RATE_SHORT_PREAMBLE),
148 	RATETAB_ENT(BRCM_RATE_5M5, IEEE80211_RATE_SHORT_PREAMBLE),
149 	RATETAB_ENT(BRCM_RATE_11M, IEEE80211_RATE_SHORT_PREAMBLE),
150 	RATETAB_ENT(BRCM_RATE_6M, 0),
151 	RATETAB_ENT(BRCM_RATE_9M, 0),
152 	RATETAB_ENT(BRCM_RATE_12M, 0),
153 	RATETAB_ENT(BRCM_RATE_18M, 0),
154 	RATETAB_ENT(BRCM_RATE_24M, 0),
155 	RATETAB_ENT(BRCM_RATE_36M, 0),
156 	RATETAB_ENT(BRCM_RATE_48M, 0),
157 	RATETAB_ENT(BRCM_RATE_54M, 0),
158 };
159 
160 #define wl_g_rates		(__wl_rates + 0)
161 #define wl_g_rates_size		ARRAY_SIZE(__wl_rates)
162 #define wl_a_rates		(__wl_rates + 4)
163 #define wl_a_rates_size		(wl_g_rates_size - 4)
164 
165 #define CHAN2G(_channel, _freq) {				\
166 	.band			= NL80211_BAND_2GHZ,		\
167 	.center_freq		= (_freq),			\
168 	.hw_value		= (_channel),			\
169 	.max_antenna_gain	= 0,				\
170 	.max_power		= 30,				\
171 }
172 
173 #define CHAN5G(_channel) {					\
174 	.band			= NL80211_BAND_5GHZ,		\
175 	.center_freq		= 5000 + (5 * (_channel)),	\
176 	.hw_value		= (_channel),			\
177 	.max_antenna_gain	= 0,				\
178 	.max_power		= 30,				\
179 }
180 
181 static struct ieee80211_channel __wl_2ghz_channels[] = {
182 	CHAN2G(1, 2412), CHAN2G(2, 2417), CHAN2G(3, 2422), CHAN2G(4, 2427),
183 	CHAN2G(5, 2432), CHAN2G(6, 2437), CHAN2G(7, 2442), CHAN2G(8, 2447),
184 	CHAN2G(9, 2452), CHAN2G(10, 2457), CHAN2G(11, 2462), CHAN2G(12, 2467),
185 	CHAN2G(13, 2472), CHAN2G(14, 2484)
186 };
187 
188 static struct ieee80211_channel __wl_5ghz_channels[] = {
189 	CHAN5G(34), CHAN5G(36), CHAN5G(38), CHAN5G(40), CHAN5G(42),
190 	CHAN5G(44), CHAN5G(46), CHAN5G(48), CHAN5G(52), CHAN5G(56),
191 	CHAN5G(60), CHAN5G(64), CHAN5G(100), CHAN5G(104), CHAN5G(108),
192 	CHAN5G(112), CHAN5G(116), CHAN5G(120), CHAN5G(124), CHAN5G(128),
193 	CHAN5G(132), CHAN5G(136), CHAN5G(140), CHAN5G(144), CHAN5G(149),
194 	CHAN5G(153), CHAN5G(157), CHAN5G(161), CHAN5G(165)
195 };
196 
197 /* Band templates duplicated per wiphy. The channel info
198  * above is added to the band during setup.
199  */
200 static const struct ieee80211_supported_band __wl_band_2ghz = {
201 	.band = NL80211_BAND_2GHZ,
202 	.bitrates = wl_g_rates,
203 	.n_bitrates = wl_g_rates_size,
204 };
205 
206 static const struct ieee80211_supported_band __wl_band_5ghz = {
207 	.band = NL80211_BAND_5GHZ,
208 	.bitrates = wl_a_rates,
209 	.n_bitrates = wl_a_rates_size,
210 };
211 
212 /* This is to override regulatory domains defined in cfg80211 module (reg.c)
213  * By default world regulatory domain defined in reg.c puts the flags
214  * NL80211_RRF_NO_IR for 5GHz channels (for * 36..48 and 149..165).
215  * With respect to these flags, wpa_supplicant doesn't * start p2p
216  * operations on 5GHz channels. All the changes in world regulatory
217  * domain are to be done here.
218  */
219 static const struct ieee80211_regdomain brcmf_regdom = {
220 	.n_reg_rules = 4,
221 	.alpha2 =  "99",
222 	.reg_rules = {
223 		/* IEEE 802.11b/g, channels 1..11 */
224 		REG_RULE(2412-10, 2472+10, 40, 6, 20, 0),
225 		/* If any */
226 		/* IEEE 802.11 channel 14 - Only JP enables
227 		 * this and for 802.11b only
228 		 */
229 		REG_RULE(2484-10, 2484+10, 20, 6, 20, 0),
230 		/* IEEE 802.11a, channel 36..64 */
231 		REG_RULE(5150-10, 5350+10, 160, 6, 20, 0),
232 		/* IEEE 802.11a, channel 100..165 */
233 		REG_RULE(5470-10, 5850+10, 160, 6, 20, 0), }
234 };
235 
236 /* Note: brcmf_cipher_suites is an array of int defining which cipher suites
237  * are supported. A pointer to this array and the number of entries is passed
238  * on to upper layers. AES_CMAC defines whether or not the driver supports MFP.
239  * So the cipher suite AES_CMAC has to be the last one in the array, and when
240  * device does not support MFP then the number of suites will be decreased by 1
241  */
242 static const u32 brcmf_cipher_suites[] = {
243 	WLAN_CIPHER_SUITE_WEP40,
244 	WLAN_CIPHER_SUITE_WEP104,
245 	WLAN_CIPHER_SUITE_TKIP,
246 	WLAN_CIPHER_SUITE_CCMP,
247 	/* Keep as last entry: */
248 	WLAN_CIPHER_SUITE_AES_CMAC
249 };
250 
251 /* Vendor specific ie. id = 221, oui and type defines exact ie */
252 struct brcmf_vs_tlv {
253 	u8 id;
254 	u8 len;
255 	u8 oui[3];
256 	u8 oui_type;
257 };
258 
259 struct parsed_vndr_ie_info {
260 	u8 *ie_ptr;
261 	u32 ie_len;	/* total length including id & length field */
262 	struct brcmf_vs_tlv vndrie;
263 };
264 
265 struct parsed_vndr_ies {
266 	u32 count;
267 	struct parsed_vndr_ie_info ie_info[VNDR_IE_PARSE_LIMIT];
268 };
269 
270 #define WL_INTERFACE_CREATE_VER_1		1
271 #define WL_INTERFACE_CREATE_VER_2		2
272 #define WL_INTERFACE_CREATE_VER_3		3
273 #define WL_INTERFACE_CREATE_VER_MAX		WL_INTERFACE_CREATE_VER_3
274 
275 #define WL_INTERFACE_MAC_DONT_USE	0x0
276 #define WL_INTERFACE_MAC_USE		0x2
277 
278 #define WL_INTERFACE_CREATE_STA		0x0
279 #define WL_INTERFACE_CREATE_AP		0x1
280 
281 struct wl_interface_create_v1 {
282 	u16	ver;			/* structure version */
283 	u32	flags;			/* flags for operation */
284 	u8	mac_addr[ETH_ALEN];	/* MAC address */
285 	u32	wlc_index;		/* optional for wlc index */
286 };
287 
288 struct wl_interface_create_v2 {
289 	u16	ver;			/* structure version */
290 	u8	pad1[2];
291 	u32	flags;			/* flags for operation */
292 	u8	mac_addr[ETH_ALEN];	/* MAC address */
293 	u8	iftype;			/* type of interface created */
294 	u8	pad2;
295 	u32	wlc_index;		/* optional for wlc index */
296 };
297 
298 struct wl_interface_create_v3 {
299 	u16 ver;			/* structure version */
300 	u16 len;			/* length of structure + data */
301 	u16 fixed_len;			/* length of structure */
302 	u8 iftype;			/* type of interface created */
303 	u8 wlc_index;			/* optional for wlc index */
304 	u32 flags;			/* flags for operation */
305 	u8 mac_addr[ETH_ALEN];		/* MAC address */
306 	u8 bssid[ETH_ALEN];		/* optional for BSSID */
307 	u8 if_index;			/* interface index request */
308 	u8 pad[3];
309 	u8 data[];			/* Optional for specific data */
310 };
311 
312 static u8 nl80211_band_to_fwil(enum nl80211_band band)
313 {
314 	switch (band) {
315 	case NL80211_BAND_2GHZ:
316 		return WLC_BAND_2G;
317 	case NL80211_BAND_5GHZ:
318 		return WLC_BAND_5G;
319 	default:
320 		WARN_ON(1);
321 		break;
322 	}
323 	return 0;
324 }
325 
326 static u16 chandef_to_chanspec(struct brcmu_d11inf *d11inf,
327 			       struct cfg80211_chan_def *ch)
328 {
329 	struct brcmu_chan ch_inf;
330 	s32 primary_offset;
331 
332 	brcmf_dbg(TRACE, "chandef: control %d center %d width %d\n",
333 		  ch->chan->center_freq, ch->center_freq1, ch->width);
334 	ch_inf.chnum = ieee80211_frequency_to_channel(ch->center_freq1);
335 	primary_offset = ch->chan->center_freq - ch->center_freq1;
336 	switch (ch->width) {
337 	case NL80211_CHAN_WIDTH_20:
338 	case NL80211_CHAN_WIDTH_20_NOHT:
339 		ch_inf.bw = BRCMU_CHAN_BW_20;
340 		WARN_ON(primary_offset != 0);
341 		break;
342 	case NL80211_CHAN_WIDTH_40:
343 		ch_inf.bw = BRCMU_CHAN_BW_40;
344 		if (primary_offset > 0)
345 			ch_inf.sb = BRCMU_CHAN_SB_U;
346 		else
347 			ch_inf.sb = BRCMU_CHAN_SB_L;
348 		break;
349 	case NL80211_CHAN_WIDTH_80:
350 		ch_inf.bw = BRCMU_CHAN_BW_80;
351 		if (primary_offset == -30)
352 			ch_inf.sb = BRCMU_CHAN_SB_LL;
353 		else if (primary_offset == -10)
354 			ch_inf.sb = BRCMU_CHAN_SB_LU;
355 		else if (primary_offset == 10)
356 			ch_inf.sb = BRCMU_CHAN_SB_UL;
357 		else
358 			ch_inf.sb = BRCMU_CHAN_SB_UU;
359 		break;
360 	case NL80211_CHAN_WIDTH_160:
361 		ch_inf.bw = BRCMU_CHAN_BW_160;
362 		if (primary_offset == -70)
363 			ch_inf.sb = BRCMU_CHAN_SB_LLL;
364 		else if (primary_offset == -50)
365 			ch_inf.sb = BRCMU_CHAN_SB_LLU;
366 		else if (primary_offset == -30)
367 			ch_inf.sb = BRCMU_CHAN_SB_LUL;
368 		else if (primary_offset == -10)
369 			ch_inf.sb = BRCMU_CHAN_SB_LUU;
370 		else if (primary_offset == 10)
371 			ch_inf.sb = BRCMU_CHAN_SB_ULL;
372 		else if (primary_offset == 30)
373 			ch_inf.sb = BRCMU_CHAN_SB_ULU;
374 		else if (primary_offset == 50)
375 			ch_inf.sb = BRCMU_CHAN_SB_UUL;
376 		else
377 			ch_inf.sb = BRCMU_CHAN_SB_UUU;
378 		break;
379 	case NL80211_CHAN_WIDTH_80P80:
380 	case NL80211_CHAN_WIDTH_5:
381 	case NL80211_CHAN_WIDTH_10:
382 	default:
383 		WARN_ON_ONCE(1);
384 	}
385 	switch (ch->chan->band) {
386 	case NL80211_BAND_2GHZ:
387 		ch_inf.band = BRCMU_CHAN_BAND_2G;
388 		break;
389 	case NL80211_BAND_5GHZ:
390 		ch_inf.band = BRCMU_CHAN_BAND_5G;
391 		break;
392 	case NL80211_BAND_60GHZ:
393 	default:
394 		WARN_ON_ONCE(1);
395 	}
396 	d11inf->encchspec(&ch_inf);
397 
398 	brcmf_dbg(TRACE, "chanspec: 0x%x\n", ch_inf.chspec);
399 	return ch_inf.chspec;
400 }
401 
402 u16 channel_to_chanspec(struct brcmu_d11inf *d11inf,
403 			struct ieee80211_channel *ch)
404 {
405 	struct brcmu_chan ch_inf;
406 
407 	ch_inf.chnum = ieee80211_frequency_to_channel(ch->center_freq);
408 	ch_inf.bw = BRCMU_CHAN_BW_20;
409 	d11inf->encchspec(&ch_inf);
410 
411 	return ch_inf.chspec;
412 }
413 
414 /* Traverse a string of 1-byte tag/1-byte length/variable-length value
415  * triples, returning a pointer to the substring whose first element
416  * matches tag
417  */
418 static const struct brcmf_tlv *
419 brcmf_parse_tlvs(const void *buf, int buflen, uint key)
420 {
421 	const struct brcmf_tlv *elt = buf;
422 	int totlen = buflen;
423 
424 	/* find tagged parameter */
425 	while (totlen >= TLV_HDR_LEN) {
426 		int len = elt->len;
427 
428 		/* validate remaining totlen */
429 		if ((elt->id == key) && (totlen >= (len + TLV_HDR_LEN)))
430 			return elt;
431 
432 		elt = (struct brcmf_tlv *)((u8 *)elt + (len + TLV_HDR_LEN));
433 		totlen -= (len + TLV_HDR_LEN);
434 	}
435 
436 	return NULL;
437 }
438 
439 /* Is any of the tlvs the expected entry? If
440  * not update the tlvs buffer pointer/length.
441  */
442 static bool
443 brcmf_tlv_has_ie(const u8 *ie, const u8 **tlvs, u32 *tlvs_len,
444 		 const u8 *oui, u32 oui_len, u8 type)
445 {
446 	/* If the contents match the OUI and the type */
447 	if (ie[TLV_LEN_OFF] >= oui_len + 1 &&
448 	    !memcmp(&ie[TLV_BODY_OFF], oui, oui_len) &&
449 	    type == ie[TLV_BODY_OFF + oui_len]) {
450 		return true;
451 	}
452 
453 	if (tlvs == NULL)
454 		return false;
455 	/* point to the next ie */
456 	ie += ie[TLV_LEN_OFF] + TLV_HDR_LEN;
457 	/* calculate the length of the rest of the buffer */
458 	*tlvs_len -= (int)(ie - *tlvs);
459 	/* update the pointer to the start of the buffer */
460 	*tlvs = ie;
461 
462 	return false;
463 }
464 
465 static struct brcmf_vs_tlv *
466 brcmf_find_wpaie(const u8 *parse, u32 len)
467 {
468 	const struct brcmf_tlv *ie;
469 
470 	while ((ie = brcmf_parse_tlvs(parse, len, WLAN_EID_VENDOR_SPECIFIC))) {
471 		if (brcmf_tlv_has_ie((const u8 *)ie, &parse, &len,
472 				     WPA_OUI, TLV_OUI_LEN, WPA_OUI_TYPE))
473 			return (struct brcmf_vs_tlv *)ie;
474 	}
475 	return NULL;
476 }
477 
478 static struct brcmf_vs_tlv *
479 brcmf_find_wpsie(const u8 *parse, u32 len)
480 {
481 	const struct brcmf_tlv *ie;
482 
483 	while ((ie = brcmf_parse_tlvs(parse, len, WLAN_EID_VENDOR_SPECIFIC))) {
484 		if (brcmf_tlv_has_ie((u8 *)ie, &parse, &len,
485 				     WPA_OUI, TLV_OUI_LEN, WPS_OUI_TYPE))
486 			return (struct brcmf_vs_tlv *)ie;
487 	}
488 	return NULL;
489 }
490 
491 static int brcmf_vif_change_validate(struct brcmf_cfg80211_info *cfg,
492 				     struct brcmf_cfg80211_vif *vif,
493 				     enum nl80211_iftype new_type)
494 {
495 	struct brcmf_cfg80211_vif *pos;
496 	bool check_combos = false;
497 	int ret = 0;
498 	struct iface_combination_params params = {
499 		.num_different_channels = 1,
500 	};
501 
502 	list_for_each_entry(pos, &cfg->vif_list, list)
503 		if (pos == vif) {
504 			params.iftype_num[new_type]++;
505 		} else {
506 			/* concurrent interfaces so need check combinations */
507 			check_combos = true;
508 			params.iftype_num[pos->wdev.iftype]++;
509 		}
510 
511 	if (check_combos)
512 		ret = cfg80211_check_combinations(cfg->wiphy, &params);
513 
514 	return ret;
515 }
516 
517 static int brcmf_vif_add_validate(struct brcmf_cfg80211_info *cfg,
518 				  enum nl80211_iftype new_type)
519 {
520 	struct brcmf_cfg80211_vif *pos;
521 	struct iface_combination_params params = {
522 		.num_different_channels = 1,
523 	};
524 
525 	list_for_each_entry(pos, &cfg->vif_list, list)
526 		params.iftype_num[pos->wdev.iftype]++;
527 
528 	params.iftype_num[new_type]++;
529 	return cfg80211_check_combinations(cfg->wiphy, &params);
530 }
531 
532 static void convert_key_from_CPU(struct brcmf_wsec_key *key,
533 				 struct brcmf_wsec_key_le *key_le)
534 {
535 	key_le->index = cpu_to_le32(key->index);
536 	key_le->len = cpu_to_le32(key->len);
537 	key_le->algo = cpu_to_le32(key->algo);
538 	key_le->flags = cpu_to_le32(key->flags);
539 	key_le->rxiv.hi = cpu_to_le32(key->rxiv.hi);
540 	key_le->rxiv.lo = cpu_to_le16(key->rxiv.lo);
541 	key_le->iv_initialized = cpu_to_le32(key->iv_initialized);
542 	memcpy(key_le->data, key->data, sizeof(key->data));
543 	memcpy(key_le->ea, key->ea, sizeof(key->ea));
544 }
545 
546 static int
547 send_key_to_dongle(struct brcmf_if *ifp, struct brcmf_wsec_key *key)
548 {
549 	struct brcmf_pub *drvr = ifp->drvr;
550 	int err;
551 	struct brcmf_wsec_key_le key_le;
552 
553 	convert_key_from_CPU(key, &key_le);
554 
555 	brcmf_netdev_wait_pend8021x(ifp);
556 
557 	err = brcmf_fil_bsscfg_data_set(ifp, "wsec_key", &key_le,
558 					sizeof(key_le));
559 
560 	if (err)
561 		bphy_err(drvr, "wsec_key error (%d)\n", err);
562 	return err;
563 }
564 
565 static void
566 brcmf_cfg80211_update_proto_addr_mode(struct wireless_dev *wdev)
567 {
568 	struct brcmf_cfg80211_vif *vif;
569 	struct brcmf_if *ifp;
570 
571 	vif = container_of(wdev, struct brcmf_cfg80211_vif, wdev);
572 	ifp = vif->ifp;
573 
574 	if ((wdev->iftype == NL80211_IFTYPE_ADHOC) ||
575 	    (wdev->iftype == NL80211_IFTYPE_AP) ||
576 	    (wdev->iftype == NL80211_IFTYPE_P2P_GO))
577 		brcmf_proto_configure_addr_mode(ifp->drvr, ifp->ifidx,
578 						ADDR_DIRECT);
579 	else
580 		brcmf_proto_configure_addr_mode(ifp->drvr, ifp->ifidx,
581 						ADDR_INDIRECT);
582 }
583 
584 static int brcmf_get_first_free_bsscfgidx(struct brcmf_pub *drvr)
585 {
586 	int bsscfgidx;
587 
588 	for (bsscfgidx = 0; bsscfgidx < BRCMF_MAX_IFS; bsscfgidx++) {
589 		/* bsscfgidx 1 is reserved for legacy P2P */
590 		if (bsscfgidx == 1)
591 			continue;
592 		if (!drvr->iflist[bsscfgidx])
593 			return bsscfgidx;
594 	}
595 
596 	return -ENOMEM;
597 }
598 
599 static void brcmf_set_vif_sta_macaddr(struct brcmf_if *ifp, u8 *mac_addr)
600 {
601 	u8 mac_idx = ifp->drvr->sta_mac_idx;
602 
603 	/* set difference MAC address with locally administered bit */
604 	memcpy(mac_addr, ifp->mac_addr, ETH_ALEN);
605 	mac_addr[0] |= 0x02;
606 	mac_addr[3] ^= mac_idx ? 0xC0 : 0xA0;
607 	mac_idx++;
608 	mac_idx = mac_idx % 2;
609 	ifp->drvr->sta_mac_idx = mac_idx;
610 }
611 
612 static int brcmf_cfg80211_request_sta_if(struct brcmf_if *ifp, u8 *macaddr)
613 {
614 	struct wl_interface_create_v1 iface_v1;
615 	struct wl_interface_create_v2 iface_v2;
616 	struct wl_interface_create_v3 iface_v3;
617 	u32 iface_create_ver;
618 	int err;
619 
620 	/* interface_create version 1 */
621 	memset(&iface_v1, 0, sizeof(iface_v1));
622 	iface_v1.ver = WL_INTERFACE_CREATE_VER_1;
623 	iface_v1.flags = WL_INTERFACE_CREATE_STA |
624 			 WL_INTERFACE_MAC_USE;
625 	if (!is_zero_ether_addr(macaddr))
626 		memcpy(iface_v1.mac_addr, macaddr, ETH_ALEN);
627 	else
628 		brcmf_set_vif_sta_macaddr(ifp, iface_v1.mac_addr);
629 
630 	err = brcmf_fil_iovar_data_get(ifp, "interface_create",
631 				       &iface_v1,
632 				       sizeof(iface_v1));
633 	if (err) {
634 		brcmf_info("failed to create interface(v1), err=%d\n",
635 			   err);
636 	} else {
637 		brcmf_dbg(INFO, "interface created(v1)\n");
638 		return 0;
639 	}
640 
641 	/* interface_create version 2 */
642 	memset(&iface_v2, 0, sizeof(iface_v2));
643 	iface_v2.ver = WL_INTERFACE_CREATE_VER_2;
644 	iface_v2.flags = WL_INTERFACE_MAC_USE;
645 	iface_v2.iftype = WL_INTERFACE_CREATE_STA;
646 	if (!is_zero_ether_addr(macaddr))
647 		memcpy(iface_v2.mac_addr, macaddr, ETH_ALEN);
648 	else
649 		brcmf_set_vif_sta_macaddr(ifp, iface_v2.mac_addr);
650 
651 	err = brcmf_fil_iovar_data_get(ifp, "interface_create",
652 				       &iface_v2,
653 				       sizeof(iface_v2));
654 	if (err) {
655 		brcmf_info("failed to create interface(v2), err=%d\n",
656 			   err);
657 	} else {
658 		brcmf_dbg(INFO, "interface created(v2)\n");
659 		return 0;
660 	}
661 
662 	/* interface_create version 3+ */
663 	/* get supported version from firmware side */
664 	iface_create_ver = 0;
665 	err = brcmf_fil_bsscfg_int_get(ifp, "interface_create",
666 				       &iface_create_ver);
667 	if (err) {
668 		brcmf_err("fail to get supported version, err=%d\n", err);
669 		return -EOPNOTSUPP;
670 	}
671 
672 	switch (iface_create_ver) {
673 	case WL_INTERFACE_CREATE_VER_3:
674 		memset(&iface_v3, 0, sizeof(iface_v3));
675 		iface_v3.ver = WL_INTERFACE_CREATE_VER_3;
676 		iface_v3.flags = WL_INTERFACE_MAC_USE;
677 		iface_v3.iftype = WL_INTERFACE_CREATE_STA;
678 		if (!is_zero_ether_addr(macaddr))
679 			memcpy(iface_v3.mac_addr, macaddr, ETH_ALEN);
680 		else
681 			brcmf_set_vif_sta_macaddr(ifp, iface_v3.mac_addr);
682 
683 		err = brcmf_fil_iovar_data_get(ifp, "interface_create",
684 					       &iface_v3,
685 					       sizeof(iface_v3));
686 
687 		if (!err)
688 			brcmf_dbg(INFO, "interface created(v3)\n");
689 		break;
690 	default:
691 		brcmf_err("not support interface create(v%d)\n",
692 			  iface_create_ver);
693 		err = -EOPNOTSUPP;
694 		break;
695 	}
696 
697 	if (err) {
698 		brcmf_info("station interface creation failed (%d)\n",
699 			   err);
700 		return -EIO;
701 	}
702 
703 	return 0;
704 }
705 
706 static int brcmf_cfg80211_request_ap_if(struct brcmf_if *ifp)
707 {
708 	struct wl_interface_create_v1 iface_v1;
709 	struct wl_interface_create_v2 iface_v2;
710 	struct wl_interface_create_v3 iface_v3;
711 	u32 iface_create_ver;
712 	struct brcmf_pub *drvr = ifp->drvr;
713 	struct brcmf_mbss_ssid_le mbss_ssid_le;
714 	int bsscfgidx;
715 	int err;
716 
717 	/* interface_create version 1 */
718 	memset(&iface_v1, 0, sizeof(iface_v1));
719 	iface_v1.ver = WL_INTERFACE_CREATE_VER_1;
720 	iface_v1.flags = WL_INTERFACE_CREATE_AP |
721 			 WL_INTERFACE_MAC_USE;
722 
723 	brcmf_set_vif_sta_macaddr(ifp, iface_v1.mac_addr);
724 
725 	err = brcmf_fil_iovar_data_get(ifp, "interface_create",
726 				       &iface_v1,
727 				       sizeof(iface_v1));
728 	if (err) {
729 		brcmf_info("failed to create interface(v1), err=%d\n",
730 			   err);
731 	} else {
732 		brcmf_dbg(INFO, "interface created(v1)\n");
733 		return 0;
734 	}
735 
736 	/* interface_create version 2 */
737 	memset(&iface_v2, 0, sizeof(iface_v2));
738 	iface_v2.ver = WL_INTERFACE_CREATE_VER_2;
739 	iface_v2.flags = WL_INTERFACE_MAC_USE;
740 	iface_v2.iftype = WL_INTERFACE_CREATE_AP;
741 
742 	brcmf_set_vif_sta_macaddr(ifp, iface_v2.mac_addr);
743 
744 	err = brcmf_fil_iovar_data_get(ifp, "interface_create",
745 				       &iface_v2,
746 				       sizeof(iface_v2));
747 	if (err) {
748 		brcmf_info("failed to create interface(v2), err=%d\n",
749 			   err);
750 	} else {
751 		brcmf_dbg(INFO, "interface created(v2)\n");
752 		return 0;
753 	}
754 
755 	/* interface_create version 3+ */
756 	/* get supported version from firmware side */
757 	iface_create_ver = 0;
758 	err = brcmf_fil_bsscfg_int_get(ifp, "interface_create",
759 				       &iface_create_ver);
760 	if (err) {
761 		brcmf_err("fail to get supported version, err=%d\n", err);
762 		return -EOPNOTSUPP;
763 	}
764 
765 	switch (iface_create_ver) {
766 	case WL_INTERFACE_CREATE_VER_3:
767 		memset(&iface_v3, 0, sizeof(iface_v3));
768 		iface_v3.ver = WL_INTERFACE_CREATE_VER_3;
769 		iface_v3.flags = WL_INTERFACE_MAC_USE;
770 		iface_v3.iftype = WL_INTERFACE_CREATE_AP;
771 		brcmf_set_vif_sta_macaddr(ifp, iface_v3.mac_addr);
772 
773 		err = brcmf_fil_iovar_data_get(ifp, "interface_create",
774 					       &iface_v3,
775 					       sizeof(iface_v3));
776 
777 		if (!err)
778 			brcmf_dbg(INFO, "interface created(v3)\n");
779 		break;
780 	default:
781 		brcmf_err("not support interface create(v%d)\n",
782 			  iface_create_ver);
783 		err = -EOPNOTSUPP;
784 		break;
785 	}
786 
787 	if (err) {
788 		brcmf_info("Does not support interface_create (%d)\n",
789 			   err);
790 		memset(&mbss_ssid_le, 0, sizeof(mbss_ssid_le));
791 		bsscfgidx = brcmf_get_first_free_bsscfgidx(ifp->drvr);
792 		if (bsscfgidx < 0)
793 			return bsscfgidx;
794 
795 		mbss_ssid_le.bsscfgidx = cpu_to_le32(bsscfgidx);
796 		mbss_ssid_le.SSID_len = cpu_to_le32(5);
797 		sprintf(mbss_ssid_le.SSID, "ssid%d", bsscfgidx);
798 
799 		err = brcmf_fil_bsscfg_data_set(ifp, "bsscfg:ssid", &mbss_ssid_le,
800 						sizeof(mbss_ssid_le));
801 
802 		if (err < 0)
803 			bphy_err(drvr, "setting ssid failed %d\n", err);
804 	}
805 
806 	return err;
807 }
808 
809 /**
810  * brcmf_apsta_add_vif() - create a new AP or STA virtual interface
811  *
812  * @wiphy: wiphy device of new interface.
813  * @name: name of the new interface.
814  * @params: contains mac address for AP or STA device.
815  * @type: interface type.
816  */
817 static
818 struct wireless_dev *brcmf_apsta_add_vif(struct wiphy *wiphy, const char *name,
819 					 struct vif_params *params,
820 					 enum nl80211_iftype type)
821 {
822 	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
823 	struct brcmf_if *ifp = netdev_priv(cfg_to_ndev(cfg));
824 	struct brcmf_pub *drvr = cfg->pub;
825 	struct brcmf_cfg80211_vif *vif;
826 	int err;
827 
828 	if (type != NL80211_IFTYPE_STATION && type != NL80211_IFTYPE_AP)
829 		return ERR_PTR(-EINVAL);
830 
831 	if (brcmf_cfg80211_vif_event_armed(cfg))
832 		return ERR_PTR(-EBUSY);
833 
834 	brcmf_dbg(INFO, "Adding vif \"%s\"\n", name);
835 
836 	vif = brcmf_alloc_vif(cfg, type);
837 	if (IS_ERR(vif))
838 		return (struct wireless_dev *)vif;
839 
840 	brcmf_cfg80211_arm_vif_event(cfg, vif);
841 
842 	if (type == NL80211_IFTYPE_STATION)
843 		err = brcmf_cfg80211_request_sta_if(ifp, params->macaddr);
844 	else
845 		err = brcmf_cfg80211_request_ap_if(ifp);
846 	if (err) {
847 		brcmf_cfg80211_arm_vif_event(cfg, NULL);
848 		goto fail;
849 	}
850 
851 	/* wait for firmware event */
852 	err = brcmf_cfg80211_wait_vif_event(cfg, BRCMF_E_IF_ADD,
853 					    BRCMF_VIF_EVENT_TIMEOUT);
854 	brcmf_cfg80211_arm_vif_event(cfg, NULL);
855 	if (!err) {
856 		bphy_err(drvr, "timeout occurred\n");
857 		err = -EIO;
858 		goto fail;
859 	}
860 
861 	/* interface created in firmware */
862 	ifp = vif->ifp;
863 	if (!ifp) {
864 		bphy_err(drvr, "no if pointer provided\n");
865 		err = -ENOENT;
866 		goto fail;
867 	}
868 
869 	strscpy(ifp->ndev->name, name, sizeof(ifp->ndev->name));
870 	err = brcmf_net_attach(ifp, true);
871 	if (err) {
872 		bphy_err(drvr, "Registering netdevice failed\n");
873 		free_netdev(ifp->ndev);
874 		goto fail;
875 	}
876 
877 	return &ifp->vif->wdev;
878 
879 fail:
880 	brcmf_free_vif(vif);
881 	return ERR_PTR(err);
882 }
883 
884 static bool brcmf_is_apmode(struct brcmf_cfg80211_vif *vif)
885 {
886 	enum nl80211_iftype iftype;
887 
888 	iftype = vif->wdev.iftype;
889 	return iftype == NL80211_IFTYPE_AP || iftype == NL80211_IFTYPE_P2P_GO;
890 }
891 
892 static bool brcmf_is_ibssmode(struct brcmf_cfg80211_vif *vif)
893 {
894 	return vif->wdev.iftype == NL80211_IFTYPE_ADHOC;
895 }
896 
897 /**
898  * brcmf_mon_add_vif() - create monitor mode virtual interface
899  *
900  * @wiphy: wiphy device of new interface.
901  * @name: name of the new interface.
902  */
903 static struct wireless_dev *brcmf_mon_add_vif(struct wiphy *wiphy,
904 					      const char *name)
905 {
906 	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
907 	struct brcmf_cfg80211_vif *vif;
908 	struct net_device *ndev;
909 	struct brcmf_if *ifp;
910 	int err;
911 
912 	if (cfg->pub->mon_if) {
913 		err = -EEXIST;
914 		goto err_out;
915 	}
916 
917 	vif = brcmf_alloc_vif(cfg, NL80211_IFTYPE_MONITOR);
918 	if (IS_ERR(vif)) {
919 		err = PTR_ERR(vif);
920 		goto err_out;
921 	}
922 
923 	ndev = alloc_netdev(sizeof(*ifp), name, NET_NAME_UNKNOWN, ether_setup);
924 	if (!ndev) {
925 		err = -ENOMEM;
926 		goto err_free_vif;
927 	}
928 	ndev->type = ARPHRD_IEEE80211_RADIOTAP;
929 	ndev->ieee80211_ptr = &vif->wdev;
930 	ndev->needs_free_netdev = true;
931 	ndev->priv_destructor = brcmf_cfg80211_free_netdev;
932 	SET_NETDEV_DEV(ndev, wiphy_dev(cfg->wiphy));
933 
934 	ifp = netdev_priv(ndev);
935 	ifp->vif = vif;
936 	ifp->ndev = ndev;
937 	ifp->drvr = cfg->pub;
938 
939 	vif->ifp = ifp;
940 	vif->wdev.netdev = ndev;
941 
942 	err = brcmf_net_mon_attach(ifp);
943 	if (err) {
944 		brcmf_err("Failed to attach %s device\n", ndev->name);
945 		free_netdev(ndev);
946 		goto err_free_vif;
947 	}
948 
949 	cfg->pub->mon_if = ifp;
950 
951 	return &vif->wdev;
952 
953 err_free_vif:
954 	brcmf_free_vif(vif);
955 err_out:
956 	return ERR_PTR(err);
957 }
958 
959 static int brcmf_mon_del_vif(struct wiphy *wiphy, struct wireless_dev *wdev)
960 {
961 	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
962 	struct net_device *ndev = wdev->netdev;
963 
964 	ndev->netdev_ops->ndo_stop(ndev);
965 
966 	brcmf_net_detach(ndev, true);
967 
968 	cfg->pub->mon_if = NULL;
969 
970 	return 0;
971 }
972 
973 static struct wireless_dev *brcmf_cfg80211_add_iface(struct wiphy *wiphy,
974 						     const char *name,
975 						     unsigned char name_assign_type,
976 						     enum nl80211_iftype type,
977 						     struct vif_params *params)
978 {
979 	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
980 	struct brcmf_pub *drvr = cfg->pub;
981 	struct wireless_dev *wdev;
982 	int err;
983 
984 	brcmf_dbg(TRACE, "enter: %s type %d\n", name, type);
985 	err = brcmf_vif_add_validate(wiphy_to_cfg(wiphy), type);
986 	if (err) {
987 		bphy_err(drvr, "iface validation failed: err=%d\n", err);
988 		return ERR_PTR(err);
989 	}
990 	switch (type) {
991 	case NL80211_IFTYPE_ADHOC:
992 	case NL80211_IFTYPE_AP_VLAN:
993 	case NL80211_IFTYPE_WDS:
994 	case NL80211_IFTYPE_MESH_POINT:
995 		return ERR_PTR(-EOPNOTSUPP);
996 	case NL80211_IFTYPE_MONITOR:
997 		return brcmf_mon_add_vif(wiphy, name);
998 	case NL80211_IFTYPE_STATION:
999 	case NL80211_IFTYPE_AP:
1000 		wdev = brcmf_apsta_add_vif(wiphy, name, params, type);
1001 		break;
1002 	case NL80211_IFTYPE_P2P_CLIENT:
1003 	case NL80211_IFTYPE_P2P_GO:
1004 	case NL80211_IFTYPE_P2P_DEVICE:
1005 		wdev = brcmf_p2p_add_vif(wiphy, name, name_assign_type, type, params);
1006 		break;
1007 	case NL80211_IFTYPE_UNSPECIFIED:
1008 	default:
1009 		return ERR_PTR(-EINVAL);
1010 	}
1011 
1012 	if (IS_ERR(wdev))
1013 		bphy_err(drvr, "add iface %s type %d failed: err=%d\n", name,
1014 			 type, (int)PTR_ERR(wdev));
1015 	else
1016 		brcmf_cfg80211_update_proto_addr_mode(wdev);
1017 
1018 	return wdev;
1019 }
1020 
1021 static void brcmf_scan_config_mpc(struct brcmf_if *ifp, int mpc)
1022 {
1023 	if (brcmf_feat_is_quirk_enabled(ifp, BRCMF_FEAT_QUIRK_NEED_MPC))
1024 		brcmf_set_mpc(ifp, mpc);
1025 }
1026 
1027 void brcmf_set_mpc(struct brcmf_if *ifp, int mpc)
1028 {
1029 	struct brcmf_pub *drvr = ifp->drvr;
1030 	s32 err = 0;
1031 
1032 	if (check_vif_up(ifp->vif)) {
1033 		err = brcmf_fil_iovar_int_set(ifp, "mpc", mpc);
1034 		if (err) {
1035 			bphy_err(drvr, "fail to set mpc\n");
1036 			return;
1037 		}
1038 		brcmf_dbg(INFO, "MPC : %d\n", mpc);
1039 	}
1040 }
1041 
1042 static void brcmf_scan_params_v2_to_v1(struct brcmf_scan_params_v2_le *params_v2_le,
1043 				       struct brcmf_scan_params_le *params_le)
1044 {
1045 	size_t params_size;
1046 	u32 ch;
1047 	int n_channels, n_ssids;
1048 
1049 	memcpy(&params_le->ssid_le, &params_v2_le->ssid_le,
1050 	       sizeof(params_le->ssid_le));
1051 	memcpy(&params_le->bssid, &params_v2_le->bssid,
1052 	       sizeof(params_le->bssid));
1053 
1054 	params_le->bss_type = params_v2_le->bss_type;
1055 	params_le->scan_type = le32_to_cpu(params_v2_le->scan_type);
1056 	params_le->nprobes = params_v2_le->nprobes;
1057 	params_le->active_time = params_v2_le->active_time;
1058 	params_le->passive_time = params_v2_le->passive_time;
1059 	params_le->home_time = params_v2_le->home_time;
1060 	params_le->channel_num = params_v2_le->channel_num;
1061 
1062 	ch = le32_to_cpu(params_v2_le->channel_num);
1063 	n_channels = ch & BRCMF_SCAN_PARAMS_COUNT_MASK;
1064 	n_ssids = ch >> BRCMF_SCAN_PARAMS_NSSID_SHIFT;
1065 
1066 	params_size = sizeof(u16) * n_channels;
1067 	if (n_ssids > 0) {
1068 		params_size = roundup(params_size, sizeof(u32));
1069 		params_size += sizeof(struct brcmf_ssid_le) * n_ssids;
1070 	}
1071 
1072 	memcpy(&params_le->channel_list[0],
1073 	       &params_v2_le->channel_list[0], params_size);
1074 }
1075 
1076 static void brcmf_escan_prep(struct brcmf_cfg80211_info *cfg,
1077 			     struct brcmf_scan_params_v2_le *params_le,
1078 			     struct cfg80211_scan_request *request)
1079 {
1080 	u32 n_ssids;
1081 	u32 n_channels;
1082 	s32 i;
1083 	s32 offset;
1084 	u16 chanspec;
1085 	char *ptr;
1086 	int length;
1087 	struct brcmf_ssid_le ssid_le;
1088 
1089 	eth_broadcast_addr(params_le->bssid);
1090 
1091 	length = BRCMF_SCAN_PARAMS_V2_FIXED_SIZE;
1092 
1093 	params_le->version = cpu_to_le16(BRCMF_SCAN_PARAMS_VERSION_V2);
1094 	params_le->bss_type = DOT11_BSSTYPE_ANY;
1095 	params_le->scan_type = cpu_to_le32(BRCMF_SCANTYPE_ACTIVE);
1096 	params_le->channel_num = 0;
1097 	params_le->nprobes = cpu_to_le32(-1);
1098 	params_le->active_time = cpu_to_le32(-1);
1099 	params_le->passive_time = cpu_to_le32(-1);
1100 	params_le->home_time = cpu_to_le32(-1);
1101 	memset(&params_le->ssid_le, 0, sizeof(params_le->ssid_le));
1102 
1103 	/* Scan abort */
1104 	if (!request) {
1105 		length += sizeof(u16);
1106 		params_le->channel_num = cpu_to_le32(1);
1107 		params_le->channel_list[0] = cpu_to_le16(-1);
1108 		params_le->length = cpu_to_le16(length);
1109 		return;
1110 	}
1111 
1112 	n_ssids = request->n_ssids;
1113 	n_channels = request->n_channels;
1114 
1115 	/* Copy channel array if applicable */
1116 	brcmf_dbg(SCAN, "### List of channelspecs to scan ### %d\n",
1117 		  n_channels);
1118 	if (n_channels > 0) {
1119 		length += roundup(sizeof(u16) * n_channels, sizeof(u32));
1120 		for (i = 0; i < n_channels; i++) {
1121 			chanspec = channel_to_chanspec(&cfg->d11inf,
1122 						       request->channels[i]);
1123 			brcmf_dbg(SCAN, "Chan : %d, Channel spec: %x\n",
1124 				  request->channels[i]->hw_value, chanspec);
1125 			params_le->channel_list[i] = cpu_to_le16(chanspec);
1126 		}
1127 	} else {
1128 		brcmf_dbg(SCAN, "Scanning all channels\n");
1129 	}
1130 
1131 	/* Copy ssid array if applicable */
1132 	brcmf_dbg(SCAN, "### List of SSIDs to scan ### %d\n", n_ssids);
1133 	if (n_ssids > 0) {
1134 		offset = offsetof(struct brcmf_scan_params_v2_le, channel_list) +
1135 				n_channels * sizeof(u16);
1136 		offset = roundup(offset, sizeof(u32));
1137 		length += sizeof(ssid_le) * n_ssids,
1138 		ptr = (char *)params_le + offset;
1139 		for (i = 0; i < n_ssids; i++) {
1140 			memset(&ssid_le, 0, sizeof(ssid_le));
1141 			ssid_le.SSID_len =
1142 					cpu_to_le32(request->ssids[i].ssid_len);
1143 			memcpy(ssid_le.SSID, request->ssids[i].ssid,
1144 			       request->ssids[i].ssid_len);
1145 			if (!ssid_le.SSID_len)
1146 				brcmf_dbg(SCAN, "%d: Broadcast scan\n", i);
1147 			else
1148 				brcmf_dbg(SCAN, "%d: scan for  %.32s size=%d\n",
1149 					  i, ssid_le.SSID, ssid_le.SSID_len);
1150 			memcpy(ptr, &ssid_le, sizeof(ssid_le));
1151 			ptr += sizeof(ssid_le);
1152 		}
1153 	} else {
1154 		brcmf_dbg(SCAN, "Performing passive scan\n");
1155 		params_le->scan_type = cpu_to_le32(BRCMF_SCANTYPE_PASSIVE);
1156 	}
1157 	params_le->length = cpu_to_le16(length);
1158 	/* Adding mask to channel numbers */
1159 	params_le->channel_num =
1160 		cpu_to_le32((n_ssids << BRCMF_SCAN_PARAMS_NSSID_SHIFT) |
1161 			(n_channels & BRCMF_SCAN_PARAMS_COUNT_MASK));
1162 }
1163 
1164 s32 brcmf_notify_escan_complete(struct brcmf_cfg80211_info *cfg,
1165 				struct brcmf_if *ifp, bool aborted,
1166 				bool fw_abort)
1167 {
1168 	struct brcmf_pub *drvr = cfg->pub;
1169 	struct brcmf_scan_params_v2_le params_v2_le;
1170 	struct cfg80211_scan_request *scan_request;
1171 	u64 reqid;
1172 	u32 bucket;
1173 	s32 err = 0;
1174 
1175 	brcmf_dbg(SCAN, "Enter\n");
1176 
1177 	/* clear scan request, because the FW abort can cause a second call */
1178 	/* to this functon and might cause a double cfg80211_scan_done      */
1179 	scan_request = cfg->scan_request;
1180 	cfg->scan_request = NULL;
1181 
1182 	if (timer_pending(&cfg->escan_timeout))
1183 		del_timer_sync(&cfg->escan_timeout);
1184 
1185 	if (fw_abort) {
1186 		/* Do a scan abort to stop the driver's scan engine */
1187 		brcmf_dbg(SCAN, "ABORT scan in firmware\n");
1188 
1189 		brcmf_escan_prep(cfg, &params_v2_le, NULL);
1190 
1191 		/* E-Scan (or anyother type) can be aborted by SCAN */
1192 		if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_SCAN_V2)) {
1193 			err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SCAN,
1194 						     &params_v2_le,
1195 						     sizeof(params_v2_le));
1196 		} else {
1197 			struct brcmf_scan_params_le params_le;
1198 
1199 			brcmf_scan_params_v2_to_v1(&params_v2_le, &params_le);
1200 			err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SCAN,
1201 						     &params_le,
1202 						     sizeof(params_le));
1203 		}
1204 
1205 		if (err)
1206 			bphy_err(drvr, "Scan abort failed\n");
1207 	}
1208 
1209 	brcmf_scan_config_mpc(ifp, 1);
1210 
1211 	/*
1212 	 * e-scan can be initiated internally
1213 	 * which takes precedence.
1214 	 */
1215 	if (cfg->int_escan_map) {
1216 		brcmf_dbg(SCAN, "scheduled scan completed (%x)\n",
1217 			  cfg->int_escan_map);
1218 		while (cfg->int_escan_map) {
1219 			bucket = __ffs(cfg->int_escan_map);
1220 			cfg->int_escan_map &= ~BIT(bucket);
1221 			reqid = brcmf_pno_find_reqid_by_bucket(cfg->pno,
1222 							       bucket);
1223 			if (!aborted) {
1224 				brcmf_dbg(SCAN, "report results: reqid=%llu\n",
1225 					  reqid);
1226 				cfg80211_sched_scan_results(cfg_to_wiphy(cfg),
1227 							    reqid);
1228 			}
1229 		}
1230 	} else if (scan_request) {
1231 		struct cfg80211_scan_info info = {
1232 			.aborted = aborted,
1233 		};
1234 
1235 		brcmf_dbg(SCAN, "ESCAN Completed scan: %s\n",
1236 			  aborted ? "Aborted" : "Done");
1237 		cfg80211_scan_done(scan_request, &info);
1238 	}
1239 	if (!test_and_clear_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status))
1240 		brcmf_dbg(SCAN, "Scan complete, probably P2P scan\n");
1241 
1242 	return err;
1243 }
1244 
1245 static int brcmf_cfg80211_del_apsta_iface(struct wiphy *wiphy,
1246 					  struct wireless_dev *wdev)
1247 {
1248 	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
1249 	struct net_device *ndev = wdev->netdev;
1250 	struct brcmf_if *ifp = netdev_priv(ndev);
1251 	struct brcmf_pub *drvr = cfg->pub;
1252 	int ret;
1253 	int err;
1254 
1255 	brcmf_cfg80211_arm_vif_event(cfg, ifp->vif);
1256 
1257 	err = brcmf_fil_bsscfg_data_set(ifp, "interface_remove", NULL, 0);
1258 	if (err) {
1259 		bphy_err(drvr, "interface_remove failed %d\n", err);
1260 		goto err_unarm;
1261 	}
1262 
1263 	/* wait for firmware event */
1264 	ret = brcmf_cfg80211_wait_vif_event(cfg, BRCMF_E_IF_DEL,
1265 					    BRCMF_VIF_EVENT_TIMEOUT);
1266 	if (!ret) {
1267 		bphy_err(drvr, "timeout occurred\n");
1268 		err = -EIO;
1269 		goto err_unarm;
1270 	}
1271 
1272 	brcmf_remove_interface(ifp, true);
1273 
1274 err_unarm:
1275 	brcmf_cfg80211_arm_vif_event(cfg, NULL);
1276 	return err;
1277 }
1278 
1279 static
1280 int brcmf_cfg80211_del_iface(struct wiphy *wiphy, struct wireless_dev *wdev)
1281 {
1282 	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
1283 	struct net_device *ndev = wdev->netdev;
1284 
1285 	if (ndev && ndev == cfg_to_ndev(cfg))
1286 		return -ENOTSUPP;
1287 
1288 	/* vif event pending in firmware */
1289 	if (brcmf_cfg80211_vif_event_armed(cfg))
1290 		return -EBUSY;
1291 
1292 	if (ndev) {
1293 		if (test_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status) &&
1294 		    cfg->escan_info.ifp == netdev_priv(ndev))
1295 			brcmf_notify_escan_complete(cfg, netdev_priv(ndev),
1296 						    true, true);
1297 
1298 		brcmf_fil_iovar_int_set(netdev_priv(ndev), "mpc", 1);
1299 	}
1300 
1301 	switch (wdev->iftype) {
1302 	case NL80211_IFTYPE_ADHOC:
1303 	case NL80211_IFTYPE_AP_VLAN:
1304 	case NL80211_IFTYPE_WDS:
1305 	case NL80211_IFTYPE_MESH_POINT:
1306 		return -EOPNOTSUPP;
1307 	case NL80211_IFTYPE_MONITOR:
1308 		return brcmf_mon_del_vif(wiphy, wdev);
1309 	case NL80211_IFTYPE_STATION:
1310 	case NL80211_IFTYPE_AP:
1311 		return brcmf_cfg80211_del_apsta_iface(wiphy, wdev);
1312 	case NL80211_IFTYPE_P2P_CLIENT:
1313 	case NL80211_IFTYPE_P2P_GO:
1314 	case NL80211_IFTYPE_P2P_DEVICE:
1315 		return brcmf_p2p_del_vif(wiphy, wdev);
1316 	case NL80211_IFTYPE_UNSPECIFIED:
1317 	default:
1318 		return -EINVAL;
1319 	}
1320 	return -EOPNOTSUPP;
1321 }
1322 
1323 static s32
1324 brcmf_cfg80211_change_iface(struct wiphy *wiphy, struct net_device *ndev,
1325 			 enum nl80211_iftype type,
1326 			 struct vif_params *params)
1327 {
1328 	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
1329 	struct brcmf_if *ifp = netdev_priv(ndev);
1330 	struct brcmf_cfg80211_vif *vif = ifp->vif;
1331 	struct brcmf_pub *drvr = cfg->pub;
1332 	s32 infra = 0;
1333 	s32 ap = 0;
1334 	s32 err = 0;
1335 
1336 	brcmf_dbg(TRACE, "Enter, bsscfgidx=%d, type=%d\n", ifp->bsscfgidx,
1337 		  type);
1338 
1339 	/* WAR: There are a number of p2p interface related problems which
1340 	 * need to be handled initially (before doing the validate).
1341 	 * wpa_supplicant tends to do iface changes on p2p device/client/go
1342 	 * which are not always possible/allowed. However we need to return
1343 	 * OK otherwise the wpa_supplicant wont start. The situation differs
1344 	 * on configuration and setup (p2pon=1 module param). The first check
1345 	 * is to see if the request is a change to station for p2p iface.
1346 	 */
1347 	if ((type == NL80211_IFTYPE_STATION) &&
1348 	    ((vif->wdev.iftype == NL80211_IFTYPE_P2P_CLIENT) ||
1349 	     (vif->wdev.iftype == NL80211_IFTYPE_P2P_GO) ||
1350 	     (vif->wdev.iftype == NL80211_IFTYPE_P2P_DEVICE))) {
1351 		brcmf_dbg(TRACE, "Ignoring cmd for p2p if\n");
1352 		/* Now depending on whether module param p2pon=1 was used the
1353 		 * response needs to be either 0 or EOPNOTSUPP. The reason is
1354 		 * that if p2pon=1 is used, but a newer supplicant is used then
1355 		 * we should return an error, as this combination wont work.
1356 		 * In other situations 0 is returned and supplicant will start
1357 		 * normally. It will give a trace in cfg80211, but it is the
1358 		 * only way to get it working. Unfortunately this will result
1359 		 * in situation where we wont support new supplicant in
1360 		 * combination with module param p2pon=1, but that is the way
1361 		 * it is. If the user tries this then unloading of driver might
1362 		 * fail/lock.
1363 		 */
1364 		if (cfg->p2p.p2pdev_dynamically)
1365 			return -EOPNOTSUPP;
1366 		else
1367 			return 0;
1368 	}
1369 	err = brcmf_vif_change_validate(wiphy_to_cfg(wiphy), vif, type);
1370 	if (err) {
1371 		bphy_err(drvr, "iface validation failed: err=%d\n", err);
1372 		return err;
1373 	}
1374 	switch (type) {
1375 	case NL80211_IFTYPE_MONITOR:
1376 	case NL80211_IFTYPE_WDS:
1377 		bphy_err(drvr, "type (%d) : currently we do not support this type\n",
1378 			 type);
1379 		return -EOPNOTSUPP;
1380 	case NL80211_IFTYPE_ADHOC:
1381 		infra = 0;
1382 		break;
1383 	case NL80211_IFTYPE_STATION:
1384 		infra = 1;
1385 		break;
1386 	case NL80211_IFTYPE_AP:
1387 	case NL80211_IFTYPE_P2P_GO:
1388 		ap = 1;
1389 		break;
1390 	default:
1391 		err = -EINVAL;
1392 		goto done;
1393 	}
1394 
1395 	if (ap) {
1396 		if (type == NL80211_IFTYPE_P2P_GO) {
1397 			brcmf_dbg(INFO, "IF Type = P2P GO\n");
1398 			err = brcmf_p2p_ifchange(cfg, BRCMF_FIL_P2P_IF_GO);
1399 		}
1400 		if (!err) {
1401 			brcmf_dbg(INFO, "IF Type = AP\n");
1402 		}
1403 	} else {
1404 		err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_INFRA, infra);
1405 		if (err) {
1406 			bphy_err(drvr, "WLC_SET_INFRA error (%d)\n", err);
1407 			err = -EAGAIN;
1408 			goto done;
1409 		}
1410 		brcmf_dbg(INFO, "IF Type = %s\n", brcmf_is_ibssmode(vif) ?
1411 			  "Adhoc" : "Infra");
1412 	}
1413 	ndev->ieee80211_ptr->iftype = type;
1414 
1415 	brcmf_cfg80211_update_proto_addr_mode(&vif->wdev);
1416 
1417 done:
1418 	brcmf_dbg(TRACE, "Exit\n");
1419 
1420 	return err;
1421 }
1422 
1423 static s32
1424 brcmf_run_escan(struct brcmf_cfg80211_info *cfg, struct brcmf_if *ifp,
1425 		struct cfg80211_scan_request *request)
1426 {
1427 	struct brcmf_pub *drvr = cfg->pub;
1428 	s32 params_size = BRCMF_SCAN_PARAMS_V2_FIXED_SIZE +
1429 			  offsetof(struct brcmf_escan_params_le, params_v2_le);
1430 	struct brcmf_escan_params_le *params;
1431 	s32 err = 0;
1432 
1433 	brcmf_dbg(SCAN, "E-SCAN START\n");
1434 
1435 	if (request != NULL) {
1436 		/* Allocate space for populating ssids in struct */
1437 		params_size += sizeof(u32) * ((request->n_channels + 1) / 2);
1438 
1439 		/* Allocate space for populating ssids in struct */
1440 		params_size += sizeof(struct brcmf_ssid_le) * request->n_ssids;
1441 	}
1442 
1443 	params = kzalloc(params_size, GFP_KERNEL);
1444 	if (!params) {
1445 		err = -ENOMEM;
1446 		goto exit;
1447 	}
1448 	BUG_ON(params_size + sizeof("escan") >= BRCMF_DCMD_MEDLEN);
1449 	brcmf_escan_prep(cfg, &params->params_v2_le, request);
1450 
1451 	params->version = cpu_to_le32(BRCMF_ESCAN_REQ_VERSION_V2);
1452 
1453 	if (!brcmf_feat_is_enabled(ifp, BRCMF_FEAT_SCAN_V2)) {
1454 		struct brcmf_escan_params_le *params_v1;
1455 
1456 		params_size -= BRCMF_SCAN_PARAMS_V2_FIXED_SIZE;
1457 		params_size += BRCMF_SCAN_PARAMS_FIXED_SIZE;
1458 		params_v1 = kzalloc(params_size, GFP_KERNEL);
1459 		if (!params_v1) {
1460 			err = -ENOMEM;
1461 			goto exit_params;
1462 		}
1463 		params_v1->version = cpu_to_le32(BRCMF_ESCAN_REQ_VERSION);
1464 		brcmf_scan_params_v2_to_v1(&params->params_v2_le, &params_v1->params_le);
1465 		kfree(params);
1466 		params = params_v1;
1467 	}
1468 
1469 	params->action = cpu_to_le16(WL_ESCAN_ACTION_START);
1470 	params->sync_id = cpu_to_le16(0x1234);
1471 
1472 	err = brcmf_fil_iovar_data_set(ifp, "escan", params, params_size);
1473 	if (err) {
1474 		if (err == -EBUSY)
1475 			brcmf_dbg(INFO, "system busy : escan canceled\n");
1476 		else
1477 			bphy_err(drvr, "error (%d)\n", err);
1478 	}
1479 
1480 exit_params:
1481 	kfree(params);
1482 exit:
1483 	return err;
1484 }
1485 
1486 static s32
1487 brcmf_do_escan(struct brcmf_if *ifp, struct cfg80211_scan_request *request)
1488 {
1489 	struct brcmf_cfg80211_info *cfg = ifp->drvr->config;
1490 	s32 err;
1491 	struct brcmf_scan_results *results;
1492 	struct escan_info *escan = &cfg->escan_info;
1493 
1494 	brcmf_dbg(SCAN, "Enter\n");
1495 	escan->ifp = ifp;
1496 	escan->wiphy = cfg->wiphy;
1497 	escan->escan_state = WL_ESCAN_STATE_SCANNING;
1498 
1499 	brcmf_scan_config_mpc(ifp, 0);
1500 	results = (struct brcmf_scan_results *)cfg->escan_info.escan_buf;
1501 	results->version = 0;
1502 	results->count = 0;
1503 	results->buflen = WL_ESCAN_RESULTS_FIXED_SIZE;
1504 
1505 	err = escan->run(cfg, ifp, request);
1506 	if (err)
1507 		brcmf_scan_config_mpc(ifp, 1);
1508 	return err;
1509 }
1510 
1511 static s32
1512 brcmf_cfg80211_scan(struct wiphy *wiphy, struct cfg80211_scan_request *request)
1513 {
1514 	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
1515 	struct brcmf_pub *drvr = cfg->pub;
1516 	struct brcmf_cfg80211_vif *vif;
1517 	s32 err = 0;
1518 
1519 	brcmf_dbg(TRACE, "Enter\n");
1520 	vif = container_of(request->wdev, struct brcmf_cfg80211_vif, wdev);
1521 	if (!check_vif_up(vif))
1522 		return -EIO;
1523 
1524 	if (test_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status)) {
1525 		bphy_err(drvr, "Scanning already: status (%lu)\n",
1526 			 cfg->scan_status);
1527 		return -EAGAIN;
1528 	}
1529 	if (test_bit(BRCMF_SCAN_STATUS_ABORT, &cfg->scan_status)) {
1530 		bphy_err(drvr, "Scanning being aborted: status (%lu)\n",
1531 			 cfg->scan_status);
1532 		return -EAGAIN;
1533 	}
1534 	if (test_bit(BRCMF_SCAN_STATUS_SUPPRESS, &cfg->scan_status)) {
1535 		bphy_err(drvr, "Scanning suppressed: status (%lu)\n",
1536 			 cfg->scan_status);
1537 		return -EAGAIN;
1538 	}
1539 	if (test_bit(BRCMF_VIF_STATUS_CONNECTING, &vif->sme_state)) {
1540 		bphy_err(drvr, "Connecting: status (%lu)\n", vif->sme_state);
1541 		return -EAGAIN;
1542 	}
1543 
1544 	/* If scan req comes for p2p0, send it over primary I/F */
1545 	if (vif == cfg->p2p.bss_idx[P2PAPI_BSSCFG_DEVICE].vif)
1546 		vif = cfg->p2p.bss_idx[P2PAPI_BSSCFG_PRIMARY].vif;
1547 
1548 	brcmf_dbg(SCAN, "START ESCAN\n");
1549 
1550 	cfg->scan_request = request;
1551 	set_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status);
1552 
1553 	cfg->escan_info.run = brcmf_run_escan;
1554 	err = brcmf_p2p_scan_prep(wiphy, request, vif);
1555 	if (err)
1556 		goto scan_out;
1557 
1558 	err = brcmf_vif_set_mgmt_ie(vif, BRCMF_VNDR_IE_PRBREQ_FLAG,
1559 				    request->ie, request->ie_len);
1560 	if (err)
1561 		goto scan_out;
1562 
1563 	err = brcmf_do_escan(vif->ifp, request);
1564 	if (err)
1565 		goto scan_out;
1566 
1567 	/* Arm scan timeout timer */
1568 	mod_timer(&cfg->escan_timeout,
1569 		  jiffies + msecs_to_jiffies(BRCMF_ESCAN_TIMER_INTERVAL_MS));
1570 
1571 	return 0;
1572 
1573 scan_out:
1574 	bphy_err(drvr, "scan error (%d)\n", err);
1575 	clear_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status);
1576 	cfg->scan_request = NULL;
1577 	return err;
1578 }
1579 
1580 static s32 brcmf_set_rts(struct net_device *ndev, u32 rts_threshold)
1581 {
1582 	struct brcmf_if *ifp = netdev_priv(ndev);
1583 	struct brcmf_pub *drvr = ifp->drvr;
1584 	s32 err = 0;
1585 
1586 	err = brcmf_fil_iovar_int_set(ifp, "rtsthresh", rts_threshold);
1587 	if (err)
1588 		bphy_err(drvr, "Error (%d)\n", err);
1589 
1590 	return err;
1591 }
1592 
1593 static s32 brcmf_set_frag(struct net_device *ndev, u32 frag_threshold)
1594 {
1595 	struct brcmf_if *ifp = netdev_priv(ndev);
1596 	struct brcmf_pub *drvr = ifp->drvr;
1597 	s32 err = 0;
1598 
1599 	err = brcmf_fil_iovar_int_set(ifp, "fragthresh",
1600 				      frag_threshold);
1601 	if (err)
1602 		bphy_err(drvr, "Error (%d)\n", err);
1603 
1604 	return err;
1605 }
1606 
1607 static s32 brcmf_set_retry(struct net_device *ndev, u32 retry, bool l)
1608 {
1609 	struct brcmf_if *ifp = netdev_priv(ndev);
1610 	struct brcmf_pub *drvr = ifp->drvr;
1611 	s32 err = 0;
1612 	u32 cmd = (l ? BRCMF_C_SET_LRL : BRCMF_C_SET_SRL);
1613 
1614 	err = brcmf_fil_cmd_int_set(ifp, cmd, retry);
1615 	if (err) {
1616 		bphy_err(drvr, "cmd (%d) , error (%d)\n", cmd, err);
1617 		return err;
1618 	}
1619 	return err;
1620 }
1621 
1622 static s32 brcmf_cfg80211_set_wiphy_params(struct wiphy *wiphy, u32 changed)
1623 {
1624 	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
1625 	struct net_device *ndev = cfg_to_ndev(cfg);
1626 	struct brcmf_if *ifp = netdev_priv(ndev);
1627 	s32 err = 0;
1628 
1629 	brcmf_dbg(TRACE, "Enter\n");
1630 	if (!check_vif_up(ifp->vif))
1631 		return -EIO;
1632 
1633 	if (changed & WIPHY_PARAM_RTS_THRESHOLD &&
1634 	    (cfg->conf->rts_threshold != wiphy->rts_threshold)) {
1635 		cfg->conf->rts_threshold = wiphy->rts_threshold;
1636 		err = brcmf_set_rts(ndev, cfg->conf->rts_threshold);
1637 		if (!err)
1638 			goto done;
1639 	}
1640 	if (changed & WIPHY_PARAM_FRAG_THRESHOLD &&
1641 	    (cfg->conf->frag_threshold != wiphy->frag_threshold)) {
1642 		cfg->conf->frag_threshold = wiphy->frag_threshold;
1643 		err = brcmf_set_frag(ndev, cfg->conf->frag_threshold);
1644 		if (!err)
1645 			goto done;
1646 	}
1647 	if (changed & WIPHY_PARAM_RETRY_LONG
1648 	    && (cfg->conf->retry_long != wiphy->retry_long)) {
1649 		cfg->conf->retry_long = wiphy->retry_long;
1650 		err = brcmf_set_retry(ndev, cfg->conf->retry_long, true);
1651 		if (!err)
1652 			goto done;
1653 	}
1654 	if (changed & WIPHY_PARAM_RETRY_SHORT
1655 	    && (cfg->conf->retry_short != wiphy->retry_short)) {
1656 		cfg->conf->retry_short = wiphy->retry_short;
1657 		err = brcmf_set_retry(ndev, cfg->conf->retry_short, false);
1658 		if (!err)
1659 			goto done;
1660 	}
1661 
1662 done:
1663 	brcmf_dbg(TRACE, "Exit\n");
1664 	return err;
1665 }
1666 
1667 static void brcmf_init_prof(struct brcmf_cfg80211_profile *prof)
1668 {
1669 	memset(prof, 0, sizeof(*prof));
1670 }
1671 
1672 static u16 brcmf_map_fw_linkdown_reason(const struct brcmf_event_msg *e)
1673 {
1674 	u16 reason;
1675 
1676 	switch (e->event_code) {
1677 	case BRCMF_E_DEAUTH:
1678 	case BRCMF_E_DEAUTH_IND:
1679 	case BRCMF_E_DISASSOC_IND:
1680 		reason = e->reason;
1681 		break;
1682 	case BRCMF_E_LINK:
1683 	default:
1684 		reason = 0;
1685 		break;
1686 	}
1687 	return reason;
1688 }
1689 
1690 static int brcmf_set_pmk(struct brcmf_if *ifp, const u8 *pmk_data, u16 pmk_len)
1691 {
1692 	struct brcmf_pub *drvr = ifp->drvr;
1693 	struct brcmf_wsec_pmk_le pmk;
1694 	int err;
1695 
1696 	memset(&pmk, 0, sizeof(pmk));
1697 
1698 	/* pass pmk directly */
1699 	pmk.key_len = cpu_to_le16(pmk_len);
1700 	pmk.flags = cpu_to_le16(0);
1701 	memcpy(pmk.key, pmk_data, pmk_len);
1702 
1703 	/* store psk in firmware */
1704 	err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_WSEC_PMK,
1705 				     &pmk, sizeof(pmk));
1706 	if (err < 0)
1707 		bphy_err(drvr, "failed to change PSK in firmware (len=%u)\n",
1708 			 pmk_len);
1709 
1710 	return err;
1711 }
1712 
1713 static int brcmf_set_sae_password(struct brcmf_if *ifp, const u8 *pwd_data,
1714 				  u16 pwd_len)
1715 {
1716 	struct brcmf_pub *drvr = ifp->drvr;
1717 	struct brcmf_wsec_sae_pwd_le sae_pwd;
1718 	int err;
1719 
1720 	if (pwd_len > BRCMF_WSEC_MAX_SAE_PASSWORD_LEN) {
1721 		bphy_err(drvr, "sae_password must be less than %d\n",
1722 			 BRCMF_WSEC_MAX_SAE_PASSWORD_LEN);
1723 		return -EINVAL;
1724 	}
1725 
1726 	sae_pwd.key_len = cpu_to_le16(pwd_len);
1727 	memcpy(sae_pwd.key, pwd_data, pwd_len);
1728 
1729 	err = brcmf_fil_iovar_data_set(ifp, "sae_password", &sae_pwd,
1730 				       sizeof(sae_pwd));
1731 	if (err < 0)
1732 		bphy_err(drvr, "failed to set SAE password in firmware (len=%u)\n",
1733 			 pwd_len);
1734 
1735 	return err;
1736 }
1737 
1738 static void brcmf_link_down(struct brcmf_cfg80211_vif *vif, u16 reason,
1739 			    bool locally_generated)
1740 {
1741 	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(vif->wdev.wiphy);
1742 	struct brcmf_pub *drvr = cfg->pub;
1743 	bool bus_up = drvr->bus_if->state == BRCMF_BUS_UP;
1744 	s32 err = 0;
1745 
1746 	brcmf_dbg(TRACE, "Enter\n");
1747 
1748 	if (test_and_clear_bit(BRCMF_VIF_STATUS_CONNECTED, &vif->sme_state)) {
1749 		if (bus_up) {
1750 			brcmf_dbg(INFO, "Call WLC_DISASSOC to stop excess roaming\n");
1751 			err = brcmf_fil_cmd_data_set(vif->ifp,
1752 						     BRCMF_C_DISASSOC, NULL, 0);
1753 			if (err)
1754 				bphy_err(drvr, "WLC_DISASSOC failed (%d)\n",
1755 					 err);
1756 		}
1757 
1758 		if ((vif->wdev.iftype == NL80211_IFTYPE_STATION) ||
1759 		    (vif->wdev.iftype == NL80211_IFTYPE_P2P_CLIENT))
1760 			cfg80211_disconnected(vif->wdev.netdev, reason, NULL, 0,
1761 					      locally_generated, GFP_KERNEL);
1762 	}
1763 	clear_bit(BRCMF_VIF_STATUS_CONNECTING, &vif->sme_state);
1764 	clear_bit(BRCMF_VIF_STATUS_EAP_SUCCESS, &vif->sme_state);
1765 	clear_bit(BRCMF_VIF_STATUS_ASSOC_SUCCESS, &vif->sme_state);
1766 	clear_bit(BRCMF_SCAN_STATUS_SUPPRESS, &cfg->scan_status);
1767 	brcmf_btcoex_set_mode(vif, BRCMF_BTCOEX_ENABLED, 0);
1768 	if (vif->profile.use_fwsup != BRCMF_PROFILE_FWSUP_NONE) {
1769 		if (bus_up)
1770 			brcmf_set_pmk(vif->ifp, NULL, 0);
1771 		vif->profile.use_fwsup = BRCMF_PROFILE_FWSUP_NONE;
1772 	}
1773 	brcmf_dbg(TRACE, "Exit\n");
1774 }
1775 
1776 static s32
1777 brcmf_cfg80211_join_ibss(struct wiphy *wiphy, struct net_device *ndev,
1778 		      struct cfg80211_ibss_params *params)
1779 {
1780 	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
1781 	struct brcmf_if *ifp = netdev_priv(ndev);
1782 	struct brcmf_cfg80211_profile *profile = &ifp->vif->profile;
1783 	struct brcmf_pub *drvr = cfg->pub;
1784 	struct brcmf_join_params join_params;
1785 	size_t join_params_size = 0;
1786 	s32 err = 0;
1787 	s32 wsec = 0;
1788 	s32 bcnprd;
1789 	u16 chanspec;
1790 	u32 ssid_len;
1791 
1792 	brcmf_dbg(TRACE, "Enter\n");
1793 	if (!check_vif_up(ifp->vif))
1794 		return -EIO;
1795 
1796 	if (params->ssid)
1797 		brcmf_dbg(CONN, "SSID: %s\n", params->ssid);
1798 	else {
1799 		brcmf_dbg(CONN, "SSID: NULL, Not supported\n");
1800 		return -EOPNOTSUPP;
1801 	}
1802 
1803 	set_bit(BRCMF_VIF_STATUS_CONNECTING, &ifp->vif->sme_state);
1804 
1805 	if (params->bssid)
1806 		brcmf_dbg(CONN, "BSSID: %pM\n", params->bssid);
1807 	else
1808 		brcmf_dbg(CONN, "No BSSID specified\n");
1809 
1810 	if (params->chandef.chan)
1811 		brcmf_dbg(CONN, "channel: %d\n",
1812 			  params->chandef.chan->center_freq);
1813 	else
1814 		brcmf_dbg(CONN, "no channel specified\n");
1815 
1816 	if (params->channel_fixed)
1817 		brcmf_dbg(CONN, "fixed channel required\n");
1818 	else
1819 		brcmf_dbg(CONN, "no fixed channel required\n");
1820 
1821 	if (params->ie && params->ie_len)
1822 		brcmf_dbg(CONN, "ie len: %d\n", params->ie_len);
1823 	else
1824 		brcmf_dbg(CONN, "no ie specified\n");
1825 
1826 	if (params->beacon_interval)
1827 		brcmf_dbg(CONN, "beacon interval: %d\n",
1828 			  params->beacon_interval);
1829 	else
1830 		brcmf_dbg(CONN, "no beacon interval specified\n");
1831 
1832 	if (params->basic_rates)
1833 		brcmf_dbg(CONN, "basic rates: %08X\n", params->basic_rates);
1834 	else
1835 		brcmf_dbg(CONN, "no basic rates specified\n");
1836 
1837 	if (params->privacy)
1838 		brcmf_dbg(CONN, "privacy required\n");
1839 	else
1840 		brcmf_dbg(CONN, "no privacy required\n");
1841 
1842 	/* Configure Privacy for starter */
1843 	if (params->privacy)
1844 		wsec |= WEP_ENABLED;
1845 
1846 	err = brcmf_fil_iovar_int_set(ifp, "wsec", wsec);
1847 	if (err) {
1848 		bphy_err(drvr, "wsec failed (%d)\n", err);
1849 		goto done;
1850 	}
1851 
1852 	/* Configure Beacon Interval for starter */
1853 	if (params->beacon_interval)
1854 		bcnprd = params->beacon_interval;
1855 	else
1856 		bcnprd = 100;
1857 
1858 	err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_BCNPRD, bcnprd);
1859 	if (err) {
1860 		bphy_err(drvr, "WLC_SET_BCNPRD failed (%d)\n", err);
1861 		goto done;
1862 	}
1863 
1864 	/* Configure required join parameter */
1865 	memset(&join_params, 0, sizeof(struct brcmf_join_params));
1866 
1867 	/* SSID */
1868 	ssid_len = min_t(u32, params->ssid_len, IEEE80211_MAX_SSID_LEN);
1869 	memcpy(join_params.ssid_le.SSID, params->ssid, ssid_len);
1870 	join_params.ssid_le.SSID_len = cpu_to_le32(ssid_len);
1871 	join_params_size = sizeof(join_params.ssid_le);
1872 
1873 	/* BSSID */
1874 	if (params->bssid) {
1875 		memcpy(join_params.params_le.bssid, params->bssid, ETH_ALEN);
1876 		join_params_size += BRCMF_ASSOC_PARAMS_FIXED_SIZE;
1877 		memcpy(profile->bssid, params->bssid, ETH_ALEN);
1878 	} else {
1879 		eth_broadcast_addr(join_params.params_le.bssid);
1880 		eth_zero_addr(profile->bssid);
1881 	}
1882 
1883 	/* Channel */
1884 	if (params->chandef.chan) {
1885 		u32 target_channel;
1886 
1887 		cfg->channel =
1888 			ieee80211_frequency_to_channel(
1889 				params->chandef.chan->center_freq);
1890 		if (params->channel_fixed) {
1891 			/* adding chanspec */
1892 			chanspec = chandef_to_chanspec(&cfg->d11inf,
1893 						       &params->chandef);
1894 			join_params.params_le.chanspec_list[0] =
1895 				cpu_to_le16(chanspec);
1896 			join_params.params_le.chanspec_num = cpu_to_le32(1);
1897 			join_params_size += sizeof(join_params.params_le);
1898 		}
1899 
1900 		/* set channel for starter */
1901 		target_channel = cfg->channel;
1902 		err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_CHANNEL,
1903 					    target_channel);
1904 		if (err) {
1905 			bphy_err(drvr, "WLC_SET_CHANNEL failed (%d)\n", err);
1906 			goto done;
1907 		}
1908 	} else
1909 		cfg->channel = 0;
1910 
1911 	cfg->ibss_starter = false;
1912 
1913 
1914 	err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_SSID,
1915 				     &join_params, join_params_size);
1916 	if (err) {
1917 		bphy_err(drvr, "WLC_SET_SSID failed (%d)\n", err);
1918 		goto done;
1919 	}
1920 
1921 done:
1922 	if (err)
1923 		clear_bit(BRCMF_VIF_STATUS_CONNECTING, &ifp->vif->sme_state);
1924 	brcmf_dbg(TRACE, "Exit\n");
1925 	return err;
1926 }
1927 
1928 static s32
1929 brcmf_cfg80211_leave_ibss(struct wiphy *wiphy, struct net_device *ndev)
1930 {
1931 	struct brcmf_if *ifp = netdev_priv(ndev);
1932 
1933 	brcmf_dbg(TRACE, "Enter\n");
1934 	if (!check_vif_up(ifp->vif)) {
1935 		/* When driver is being unloaded, it can end up here. If an
1936 		 * error is returned then later on a debug trace in the wireless
1937 		 * core module will be printed. To avoid this 0 is returned.
1938 		 */
1939 		return 0;
1940 	}
1941 
1942 	brcmf_link_down(ifp->vif, WLAN_REASON_DEAUTH_LEAVING, true);
1943 	brcmf_net_setcarrier(ifp, false);
1944 
1945 	brcmf_dbg(TRACE, "Exit\n");
1946 
1947 	return 0;
1948 }
1949 
1950 static s32 brcmf_set_wpa_version(struct net_device *ndev,
1951 				 struct cfg80211_connect_params *sme)
1952 {
1953 	struct brcmf_if *ifp = netdev_priv(ndev);
1954 	struct brcmf_cfg80211_profile *profile = ndev_to_prof(ndev);
1955 	struct brcmf_pub *drvr = ifp->drvr;
1956 	struct brcmf_cfg80211_security *sec;
1957 	s32 val = 0;
1958 	s32 err = 0;
1959 
1960 	if (sme->crypto.wpa_versions & NL80211_WPA_VERSION_1)
1961 		val = WPA_AUTH_PSK | WPA_AUTH_UNSPECIFIED;
1962 	else if (sme->crypto.wpa_versions & NL80211_WPA_VERSION_2)
1963 		val = WPA2_AUTH_PSK | WPA2_AUTH_UNSPECIFIED;
1964 	else if (sme->crypto.wpa_versions & NL80211_WPA_VERSION_3)
1965 		val = WPA3_AUTH_SAE_PSK;
1966 	else
1967 		val = WPA_AUTH_DISABLED;
1968 	brcmf_dbg(CONN, "setting wpa_auth to 0x%0x\n", val);
1969 	err = brcmf_fil_bsscfg_int_set(ifp, "wpa_auth", val);
1970 	if (err) {
1971 		bphy_err(drvr, "set wpa_auth failed (%d)\n", err);
1972 		return err;
1973 	}
1974 	sec = &profile->sec;
1975 	sec->wpa_versions = sme->crypto.wpa_versions;
1976 	return err;
1977 }
1978 
1979 static s32 brcmf_set_auth_type(struct net_device *ndev,
1980 			       struct cfg80211_connect_params *sme)
1981 {
1982 	struct brcmf_if *ifp = netdev_priv(ndev);
1983 	struct brcmf_cfg80211_profile *profile = ndev_to_prof(ndev);
1984 	struct brcmf_pub *drvr = ifp->drvr;
1985 	struct brcmf_cfg80211_security *sec;
1986 	s32 val = 0;
1987 	s32 err = 0;
1988 
1989 	switch (sme->auth_type) {
1990 	case NL80211_AUTHTYPE_OPEN_SYSTEM:
1991 		val = 0;
1992 		brcmf_dbg(CONN, "open system\n");
1993 		break;
1994 	case NL80211_AUTHTYPE_SHARED_KEY:
1995 		val = 1;
1996 		brcmf_dbg(CONN, "shared key\n");
1997 		break;
1998 	case NL80211_AUTHTYPE_SAE:
1999 		val = 3;
2000 		brcmf_dbg(CONN, "SAE authentication\n");
2001 		break;
2002 	default:
2003 		val = 2;
2004 		brcmf_dbg(CONN, "automatic, auth type (%d)\n", sme->auth_type);
2005 		break;
2006 	}
2007 
2008 	err = brcmf_fil_bsscfg_int_set(ifp, "auth", val);
2009 	if (err) {
2010 		bphy_err(drvr, "set auth failed (%d)\n", err);
2011 		return err;
2012 	}
2013 	sec = &profile->sec;
2014 	sec->auth_type = sme->auth_type;
2015 	return err;
2016 }
2017 
2018 static s32
2019 brcmf_set_wsec_mode(struct net_device *ndev,
2020 		    struct cfg80211_connect_params *sme)
2021 {
2022 	struct brcmf_if *ifp = netdev_priv(ndev);
2023 	struct brcmf_cfg80211_profile *profile = ndev_to_prof(ndev);
2024 	struct brcmf_pub *drvr = ifp->drvr;
2025 	struct brcmf_cfg80211_security *sec;
2026 	s32 pval = 0;
2027 	s32 gval = 0;
2028 	s32 wsec;
2029 	s32 err = 0;
2030 
2031 	if (sme->crypto.n_ciphers_pairwise) {
2032 		switch (sme->crypto.ciphers_pairwise[0]) {
2033 		case WLAN_CIPHER_SUITE_WEP40:
2034 		case WLAN_CIPHER_SUITE_WEP104:
2035 			pval = WEP_ENABLED;
2036 			break;
2037 		case WLAN_CIPHER_SUITE_TKIP:
2038 			pval = TKIP_ENABLED;
2039 			break;
2040 		case WLAN_CIPHER_SUITE_CCMP:
2041 			pval = AES_ENABLED;
2042 			break;
2043 		case WLAN_CIPHER_SUITE_AES_CMAC:
2044 			pval = AES_ENABLED;
2045 			break;
2046 		default:
2047 			bphy_err(drvr, "invalid cipher pairwise (%d)\n",
2048 				 sme->crypto.ciphers_pairwise[0]);
2049 			return -EINVAL;
2050 		}
2051 	}
2052 	if (sme->crypto.cipher_group) {
2053 		switch (sme->crypto.cipher_group) {
2054 		case WLAN_CIPHER_SUITE_WEP40:
2055 		case WLAN_CIPHER_SUITE_WEP104:
2056 			gval = WEP_ENABLED;
2057 			break;
2058 		case WLAN_CIPHER_SUITE_TKIP:
2059 			gval = TKIP_ENABLED;
2060 			break;
2061 		case WLAN_CIPHER_SUITE_CCMP:
2062 			gval = AES_ENABLED;
2063 			break;
2064 		case WLAN_CIPHER_SUITE_AES_CMAC:
2065 			gval = AES_ENABLED;
2066 			break;
2067 		default:
2068 			bphy_err(drvr, "invalid cipher group (%d)\n",
2069 				 sme->crypto.cipher_group);
2070 			return -EINVAL;
2071 		}
2072 	}
2073 
2074 	brcmf_dbg(CONN, "pval (%d) gval (%d)\n", pval, gval);
2075 	/* In case of privacy, but no security and WPS then simulate */
2076 	/* setting AES. WPS-2.0 allows no security                   */
2077 	if (brcmf_find_wpsie(sme->ie, sme->ie_len) && !pval && !gval &&
2078 	    sme->privacy)
2079 		pval = AES_ENABLED;
2080 
2081 	wsec = pval | gval;
2082 	err = brcmf_fil_bsscfg_int_set(ifp, "wsec", wsec);
2083 	if (err) {
2084 		bphy_err(drvr, "error (%d)\n", err);
2085 		return err;
2086 	}
2087 
2088 	sec = &profile->sec;
2089 	sec->cipher_pairwise = sme->crypto.ciphers_pairwise[0];
2090 	sec->cipher_group = sme->crypto.cipher_group;
2091 
2092 	return err;
2093 }
2094 
2095 static s32
2096 brcmf_set_key_mgmt(struct net_device *ndev, struct cfg80211_connect_params *sme)
2097 {
2098 	struct brcmf_if *ifp = netdev_priv(ndev);
2099 	struct brcmf_cfg80211_profile *profile = &ifp->vif->profile;
2100 	struct brcmf_pub *drvr = ifp->drvr;
2101 	s32 val;
2102 	s32 err;
2103 	const struct brcmf_tlv *rsn_ie;
2104 	const u8 *ie;
2105 	u32 ie_len;
2106 	u32 offset;
2107 	u16 rsn_cap;
2108 	u32 mfp;
2109 	u16 count;
2110 
2111 	profile->use_fwsup = BRCMF_PROFILE_FWSUP_NONE;
2112 	profile->is_ft = false;
2113 
2114 	if (!sme->crypto.n_akm_suites)
2115 		return 0;
2116 
2117 	err = brcmf_fil_bsscfg_int_get(netdev_priv(ndev), "wpa_auth", &val);
2118 	if (err) {
2119 		bphy_err(drvr, "could not get wpa_auth (%d)\n", err);
2120 		return err;
2121 	}
2122 	if (val & (WPA_AUTH_PSK | WPA_AUTH_UNSPECIFIED)) {
2123 		switch (sme->crypto.akm_suites[0]) {
2124 		case WLAN_AKM_SUITE_8021X:
2125 			val = WPA_AUTH_UNSPECIFIED;
2126 			if (sme->want_1x)
2127 				profile->use_fwsup = BRCMF_PROFILE_FWSUP_1X;
2128 			break;
2129 		case WLAN_AKM_SUITE_PSK:
2130 			val = WPA_AUTH_PSK;
2131 			break;
2132 		default:
2133 			bphy_err(drvr, "invalid akm suite (%d)\n",
2134 				 sme->crypto.akm_suites[0]);
2135 			return -EINVAL;
2136 		}
2137 	} else if (val & (WPA2_AUTH_PSK | WPA2_AUTH_UNSPECIFIED)) {
2138 		switch (sme->crypto.akm_suites[0]) {
2139 		case WLAN_AKM_SUITE_8021X:
2140 			val = WPA2_AUTH_UNSPECIFIED;
2141 			if (sme->want_1x)
2142 				profile->use_fwsup = BRCMF_PROFILE_FWSUP_1X;
2143 			break;
2144 		case WLAN_AKM_SUITE_8021X_SHA256:
2145 			val = WPA2_AUTH_1X_SHA256;
2146 			if (sme->want_1x)
2147 				profile->use_fwsup = BRCMF_PROFILE_FWSUP_1X;
2148 			break;
2149 		case WLAN_AKM_SUITE_PSK_SHA256:
2150 			val = WPA2_AUTH_PSK_SHA256;
2151 			break;
2152 		case WLAN_AKM_SUITE_PSK:
2153 			val = WPA2_AUTH_PSK;
2154 			break;
2155 		case WLAN_AKM_SUITE_FT_8021X:
2156 			val = WPA2_AUTH_UNSPECIFIED | WPA2_AUTH_FT;
2157 			profile->is_ft = true;
2158 			if (sme->want_1x)
2159 				profile->use_fwsup = BRCMF_PROFILE_FWSUP_1X;
2160 			break;
2161 		case WLAN_AKM_SUITE_FT_PSK:
2162 			val = WPA2_AUTH_PSK | WPA2_AUTH_FT;
2163 			profile->is_ft = true;
2164 			break;
2165 		default:
2166 			bphy_err(drvr, "invalid akm suite (%d)\n",
2167 				 sme->crypto.akm_suites[0]);
2168 			return -EINVAL;
2169 		}
2170 	} else if (val & WPA3_AUTH_SAE_PSK) {
2171 		switch (sme->crypto.akm_suites[0]) {
2172 		case WLAN_AKM_SUITE_SAE:
2173 			val = WPA3_AUTH_SAE_PSK;
2174 			if (sme->crypto.sae_pwd) {
2175 				brcmf_dbg(INFO, "using SAE offload\n");
2176 				profile->use_fwsup = BRCMF_PROFILE_FWSUP_SAE;
2177 			}
2178 			break;
2179 		case WLAN_AKM_SUITE_FT_OVER_SAE:
2180 			val = WPA3_AUTH_SAE_PSK | WPA2_AUTH_FT;
2181 			profile->is_ft = true;
2182 			if (sme->crypto.sae_pwd) {
2183 				brcmf_dbg(INFO, "using SAE offload\n");
2184 				profile->use_fwsup = BRCMF_PROFILE_FWSUP_SAE;
2185 			}
2186 			break;
2187 		default:
2188 			bphy_err(drvr, "invalid akm suite (%d)\n",
2189 				 sme->crypto.akm_suites[0]);
2190 			return -EINVAL;
2191 		}
2192 	}
2193 
2194 	if (profile->use_fwsup == BRCMF_PROFILE_FWSUP_1X)
2195 		brcmf_dbg(INFO, "using 1X offload\n");
2196 
2197 	if (!brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MFP))
2198 		goto skip_mfp_config;
2199 	/* The MFP mode (1 or 2) needs to be determined, parse IEs. The
2200 	 * IE will not be verified, just a quick search for MFP config
2201 	 */
2202 	rsn_ie = brcmf_parse_tlvs((const u8 *)sme->ie, sme->ie_len,
2203 				  WLAN_EID_RSN);
2204 	if (!rsn_ie)
2205 		goto skip_mfp_config;
2206 	ie = (const u8 *)rsn_ie;
2207 	ie_len = rsn_ie->len + TLV_HDR_LEN;
2208 	/* Skip unicast suite */
2209 	offset = TLV_HDR_LEN + WPA_IE_VERSION_LEN + WPA_IE_MIN_OUI_LEN;
2210 	if (offset + WPA_IE_SUITE_COUNT_LEN >= ie_len)
2211 		goto skip_mfp_config;
2212 	/* Skip multicast suite */
2213 	count = ie[offset] + (ie[offset + 1] << 8);
2214 	offset += WPA_IE_SUITE_COUNT_LEN + (count * WPA_IE_MIN_OUI_LEN);
2215 	if (offset + WPA_IE_SUITE_COUNT_LEN >= ie_len)
2216 		goto skip_mfp_config;
2217 	/* Skip auth key management suite(s) */
2218 	count = ie[offset] + (ie[offset + 1] << 8);
2219 	offset += WPA_IE_SUITE_COUNT_LEN + (count * WPA_IE_MIN_OUI_LEN);
2220 	if (offset + WPA_IE_SUITE_COUNT_LEN > ie_len)
2221 		goto skip_mfp_config;
2222 	/* Ready to read capabilities */
2223 	mfp = BRCMF_MFP_NONE;
2224 	rsn_cap = ie[offset] + (ie[offset + 1] << 8);
2225 	if (rsn_cap & RSN_CAP_MFPR_MASK)
2226 		mfp = BRCMF_MFP_REQUIRED;
2227 	else if (rsn_cap & RSN_CAP_MFPC_MASK)
2228 		mfp = BRCMF_MFP_CAPABLE;
2229 	brcmf_fil_bsscfg_int_set(netdev_priv(ndev), "mfp", mfp);
2230 
2231 skip_mfp_config:
2232 	brcmf_dbg(CONN, "setting wpa_auth to %d\n", val);
2233 	err = brcmf_fil_bsscfg_int_set(netdev_priv(ndev), "wpa_auth", val);
2234 	if (err) {
2235 		bphy_err(drvr, "could not set wpa_auth (%d)\n", err);
2236 		return err;
2237 	}
2238 
2239 	return err;
2240 }
2241 
2242 static s32
2243 brcmf_set_sharedkey(struct net_device *ndev,
2244 		    struct cfg80211_connect_params *sme)
2245 {
2246 	struct brcmf_if *ifp = netdev_priv(ndev);
2247 	struct brcmf_pub *drvr = ifp->drvr;
2248 	struct brcmf_cfg80211_profile *profile = ndev_to_prof(ndev);
2249 	struct brcmf_cfg80211_security *sec;
2250 	struct brcmf_wsec_key key;
2251 	s32 val;
2252 	s32 err = 0;
2253 
2254 	brcmf_dbg(CONN, "key len (%d)\n", sme->key_len);
2255 
2256 	if (sme->key_len == 0)
2257 		return 0;
2258 
2259 	sec = &profile->sec;
2260 	brcmf_dbg(CONN, "wpa_versions 0x%x cipher_pairwise 0x%x\n",
2261 		  sec->wpa_versions, sec->cipher_pairwise);
2262 
2263 	if (sec->wpa_versions & (NL80211_WPA_VERSION_1 | NL80211_WPA_VERSION_2 |
2264 				 NL80211_WPA_VERSION_3))
2265 		return 0;
2266 
2267 	if (!(sec->cipher_pairwise &
2268 	    (WLAN_CIPHER_SUITE_WEP40 | WLAN_CIPHER_SUITE_WEP104)))
2269 		return 0;
2270 
2271 	memset(&key, 0, sizeof(key));
2272 	key.len = (u32) sme->key_len;
2273 	key.index = (u32) sme->key_idx;
2274 	if (key.len > sizeof(key.data)) {
2275 		bphy_err(drvr, "Too long key length (%u)\n", key.len);
2276 		return -EINVAL;
2277 	}
2278 	memcpy(key.data, sme->key, key.len);
2279 	key.flags = BRCMF_PRIMARY_KEY;
2280 	switch (sec->cipher_pairwise) {
2281 	case WLAN_CIPHER_SUITE_WEP40:
2282 		key.algo = CRYPTO_ALGO_WEP1;
2283 		break;
2284 	case WLAN_CIPHER_SUITE_WEP104:
2285 		key.algo = CRYPTO_ALGO_WEP128;
2286 		break;
2287 	default:
2288 		bphy_err(drvr, "Invalid algorithm (%d)\n",
2289 			 sme->crypto.ciphers_pairwise[0]);
2290 		return -EINVAL;
2291 	}
2292 	/* Set the new key/index */
2293 	brcmf_dbg(CONN, "key length (%d) key index (%d) algo (%d)\n",
2294 		  key.len, key.index, key.algo);
2295 	brcmf_dbg(CONN, "key \"%s\"\n", key.data);
2296 	err = send_key_to_dongle(ifp, &key);
2297 	if (err)
2298 		return err;
2299 
2300 	if (sec->auth_type == NL80211_AUTHTYPE_SHARED_KEY) {
2301 		brcmf_dbg(CONN, "set auth_type to shared key\n");
2302 		val = WL_AUTH_SHARED_KEY;	/* shared key */
2303 		err = brcmf_fil_bsscfg_int_set(ifp, "auth", val);
2304 		if (err)
2305 			bphy_err(drvr, "set auth failed (%d)\n", err);
2306 	}
2307 	return err;
2308 }
2309 
2310 static
2311 enum nl80211_auth_type brcmf_war_auth_type(struct brcmf_if *ifp,
2312 					   enum nl80211_auth_type type)
2313 {
2314 	if (type == NL80211_AUTHTYPE_AUTOMATIC &&
2315 	    brcmf_feat_is_quirk_enabled(ifp, BRCMF_FEAT_QUIRK_AUTO_AUTH)) {
2316 		brcmf_dbg(CONN, "WAR: use OPEN instead of AUTO\n");
2317 		type = NL80211_AUTHTYPE_OPEN_SYSTEM;
2318 	}
2319 	return type;
2320 }
2321 
2322 static void brcmf_set_join_pref(struct brcmf_if *ifp,
2323 				struct cfg80211_bss_selection *bss_select)
2324 {
2325 	struct brcmf_pub *drvr = ifp->drvr;
2326 	struct brcmf_join_pref_params join_pref_params[2];
2327 	enum nl80211_band band;
2328 	int err, i = 0;
2329 
2330 	join_pref_params[i].len = 2;
2331 	join_pref_params[i].rssi_gain = 0;
2332 
2333 	if (bss_select->behaviour != NL80211_BSS_SELECT_ATTR_BAND_PREF)
2334 		brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_ASSOC_PREFER, WLC_BAND_AUTO);
2335 
2336 	switch (bss_select->behaviour) {
2337 	case __NL80211_BSS_SELECT_ATTR_INVALID:
2338 		brcmf_c_set_joinpref_default(ifp);
2339 		return;
2340 	case NL80211_BSS_SELECT_ATTR_BAND_PREF:
2341 		join_pref_params[i].type = BRCMF_JOIN_PREF_BAND;
2342 		band = bss_select->param.band_pref;
2343 		join_pref_params[i].band = nl80211_band_to_fwil(band);
2344 		i++;
2345 		break;
2346 	case NL80211_BSS_SELECT_ATTR_RSSI_ADJUST:
2347 		join_pref_params[i].type = BRCMF_JOIN_PREF_RSSI_DELTA;
2348 		band = bss_select->param.adjust.band;
2349 		join_pref_params[i].band = nl80211_band_to_fwil(band);
2350 		join_pref_params[i].rssi_gain = bss_select->param.adjust.delta;
2351 		i++;
2352 		break;
2353 	case NL80211_BSS_SELECT_ATTR_RSSI:
2354 	default:
2355 		break;
2356 	}
2357 	join_pref_params[i].type = BRCMF_JOIN_PREF_RSSI;
2358 	join_pref_params[i].len = 2;
2359 	join_pref_params[i].rssi_gain = 0;
2360 	join_pref_params[i].band = 0;
2361 	err = brcmf_fil_iovar_data_set(ifp, "join_pref", join_pref_params,
2362 				       sizeof(join_pref_params));
2363 	if (err)
2364 		bphy_err(drvr, "Set join_pref error (%d)\n", err);
2365 }
2366 
2367 static s32
2368 brcmf_cfg80211_connect(struct wiphy *wiphy, struct net_device *ndev,
2369 		       struct cfg80211_connect_params *sme)
2370 {
2371 	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
2372 	struct brcmf_if *ifp = netdev_priv(ndev);
2373 	struct brcmf_cfg80211_profile *profile = &ifp->vif->profile;
2374 	struct ieee80211_channel *chan = sme->channel;
2375 	struct brcmf_pub *drvr = ifp->drvr;
2376 	struct brcmf_join_params join_params;
2377 	size_t join_params_size;
2378 	const struct brcmf_tlv *rsn_ie;
2379 	const struct brcmf_vs_tlv *wpa_ie;
2380 	const void *ie;
2381 	u32 ie_len;
2382 	struct brcmf_ext_join_params_le *ext_join_params;
2383 	u16 chanspec;
2384 	s32 err = 0;
2385 	u32 ssid_len;
2386 
2387 	brcmf_dbg(TRACE, "Enter\n");
2388 	if (!check_vif_up(ifp->vif))
2389 		return -EIO;
2390 
2391 	if (!sme->ssid) {
2392 		bphy_err(drvr, "Invalid ssid\n");
2393 		return -EOPNOTSUPP;
2394 	}
2395 
2396 	if (sme->channel_hint)
2397 		chan = sme->channel_hint;
2398 
2399 	if (sme->bssid_hint)
2400 		sme->bssid = sme->bssid_hint;
2401 
2402 	if (ifp->vif == cfg->p2p.bss_idx[P2PAPI_BSSCFG_PRIMARY].vif) {
2403 		/* A normal (non P2P) connection request setup. */
2404 		ie = NULL;
2405 		ie_len = 0;
2406 		/* find the WPA_IE */
2407 		wpa_ie = brcmf_find_wpaie((u8 *)sme->ie, sme->ie_len);
2408 		if (wpa_ie) {
2409 			ie = wpa_ie;
2410 			ie_len = wpa_ie->len + TLV_HDR_LEN;
2411 		} else {
2412 			/* find the RSN_IE */
2413 			rsn_ie = brcmf_parse_tlvs((const u8 *)sme->ie,
2414 						  sme->ie_len,
2415 						  WLAN_EID_RSN);
2416 			if (rsn_ie) {
2417 				ie = rsn_ie;
2418 				ie_len = rsn_ie->len + TLV_HDR_LEN;
2419 			}
2420 		}
2421 		brcmf_fil_iovar_data_set(ifp, "wpaie", ie, ie_len);
2422 	}
2423 
2424 	err = brcmf_vif_set_mgmt_ie(ifp->vif, BRCMF_VNDR_IE_ASSOCREQ_FLAG,
2425 				    sme->ie, sme->ie_len);
2426 	if (err)
2427 		bphy_err(drvr, "Set Assoc REQ IE Failed\n");
2428 	else
2429 		brcmf_dbg(TRACE, "Applied Vndr IEs for Assoc request\n");
2430 
2431 	set_bit(BRCMF_VIF_STATUS_CONNECTING, &ifp->vif->sme_state);
2432 
2433 	if (chan) {
2434 		cfg->channel =
2435 			ieee80211_frequency_to_channel(chan->center_freq);
2436 		chanspec = channel_to_chanspec(&cfg->d11inf, chan);
2437 		brcmf_dbg(CONN, "channel=%d, center_req=%d, chanspec=0x%04x\n",
2438 			  cfg->channel, chan->center_freq, chanspec);
2439 	} else {
2440 		cfg->channel = 0;
2441 		chanspec = 0;
2442 	}
2443 
2444 	brcmf_dbg(INFO, "ie (%p), ie_len (%zd)\n", sme->ie, sme->ie_len);
2445 
2446 	err = brcmf_set_wpa_version(ndev, sme);
2447 	if (err) {
2448 		bphy_err(drvr, "wl_set_wpa_version failed (%d)\n", err);
2449 		goto done;
2450 	}
2451 
2452 	sme->auth_type = brcmf_war_auth_type(ifp, sme->auth_type);
2453 	err = brcmf_set_auth_type(ndev, sme);
2454 	if (err) {
2455 		bphy_err(drvr, "wl_set_auth_type failed (%d)\n", err);
2456 		goto done;
2457 	}
2458 
2459 	err = brcmf_set_wsec_mode(ndev, sme);
2460 	if (err) {
2461 		bphy_err(drvr, "wl_set_set_cipher failed (%d)\n", err);
2462 		goto done;
2463 	}
2464 
2465 	err = brcmf_set_key_mgmt(ndev, sme);
2466 	if (err) {
2467 		bphy_err(drvr, "wl_set_key_mgmt failed (%d)\n", err);
2468 		goto done;
2469 	}
2470 
2471 	err = brcmf_set_sharedkey(ndev, sme);
2472 	if (err) {
2473 		bphy_err(drvr, "brcmf_set_sharedkey failed (%d)\n", err);
2474 		goto done;
2475 	}
2476 
2477 	if (sme->crypto.psk &&
2478 	    profile->use_fwsup != BRCMF_PROFILE_FWSUP_SAE) {
2479 		if (WARN_ON(profile->use_fwsup != BRCMF_PROFILE_FWSUP_NONE)) {
2480 			err = -EINVAL;
2481 			goto done;
2482 		}
2483 		brcmf_dbg(INFO, "using PSK offload\n");
2484 		profile->use_fwsup = BRCMF_PROFILE_FWSUP_PSK;
2485 	}
2486 
2487 	if (profile->use_fwsup != BRCMF_PROFILE_FWSUP_NONE) {
2488 		/* enable firmware supplicant for this interface */
2489 		err = brcmf_fil_iovar_int_set(ifp, "sup_wpa", 1);
2490 		if (err < 0) {
2491 			bphy_err(drvr, "failed to enable fw supplicant\n");
2492 			goto done;
2493 		}
2494 	}
2495 
2496 	if (profile->use_fwsup == BRCMF_PROFILE_FWSUP_PSK)
2497 		err = brcmf_set_pmk(ifp, sme->crypto.psk,
2498 				    BRCMF_WSEC_MAX_PSK_LEN);
2499 	else if (profile->use_fwsup == BRCMF_PROFILE_FWSUP_SAE) {
2500 		/* clean up user-space RSNE */
2501 		err = brcmf_fil_iovar_data_set(ifp, "wpaie", NULL, 0);
2502 		if (err) {
2503 			bphy_err(drvr, "failed to clean up user-space RSNE\n");
2504 			goto done;
2505 		}
2506 		err = brcmf_set_sae_password(ifp, sme->crypto.sae_pwd,
2507 					     sme->crypto.sae_pwd_len);
2508 		if (!err && sme->crypto.psk)
2509 			err = brcmf_set_pmk(ifp, sme->crypto.psk,
2510 					    BRCMF_WSEC_MAX_PSK_LEN);
2511 	}
2512 	if (err)
2513 		goto done;
2514 
2515 	/* Join with specific BSSID and cached SSID
2516 	 * If SSID is zero join based on BSSID only
2517 	 */
2518 	join_params_size = offsetof(struct brcmf_ext_join_params_le, assoc_le) +
2519 		offsetof(struct brcmf_assoc_params_le, chanspec_list);
2520 	if (cfg->channel)
2521 		join_params_size += sizeof(u16);
2522 	ext_join_params = kzalloc(sizeof(*ext_join_params), GFP_KERNEL);
2523 	if (ext_join_params == NULL) {
2524 		err = -ENOMEM;
2525 		goto done;
2526 	}
2527 	ssid_len = min_t(u32, sme->ssid_len, IEEE80211_MAX_SSID_LEN);
2528 	ext_join_params->ssid_le.SSID_len = cpu_to_le32(ssid_len);
2529 	memcpy(&ext_join_params->ssid_le.SSID, sme->ssid, ssid_len);
2530 	if (ssid_len < IEEE80211_MAX_SSID_LEN)
2531 		brcmf_dbg(CONN, "SSID \"%s\", len (%d)\n",
2532 			  ext_join_params->ssid_le.SSID, ssid_len);
2533 
2534 	/* Set up join scan parameters */
2535 	ext_join_params->scan_le.scan_type = -1;
2536 	ext_join_params->scan_le.home_time = cpu_to_le32(-1);
2537 
2538 	if (sme->bssid)
2539 		memcpy(&ext_join_params->assoc_le.bssid, sme->bssid, ETH_ALEN);
2540 	else
2541 		eth_broadcast_addr(ext_join_params->assoc_le.bssid);
2542 
2543 	if (cfg->channel) {
2544 		ext_join_params->assoc_le.chanspec_num = cpu_to_le32(1);
2545 
2546 		ext_join_params->assoc_le.chanspec_list[0] =
2547 			cpu_to_le16(chanspec);
2548 		/* Increase dwell time to receive probe response or detect
2549 		 * beacon from target AP at a noisy air only during connect
2550 		 * command.
2551 		 */
2552 		ext_join_params->scan_le.active_time =
2553 			cpu_to_le32(BRCMF_SCAN_JOIN_ACTIVE_DWELL_TIME_MS);
2554 		ext_join_params->scan_le.passive_time =
2555 			cpu_to_le32(BRCMF_SCAN_JOIN_PASSIVE_DWELL_TIME_MS);
2556 		/* To sync with presence period of VSDB GO send probe request
2557 		 * more frequently. Probe request will be stopped when it gets
2558 		 * probe response from target AP/GO.
2559 		 */
2560 		ext_join_params->scan_le.nprobes =
2561 			cpu_to_le32(BRCMF_SCAN_JOIN_ACTIVE_DWELL_TIME_MS /
2562 				    BRCMF_SCAN_JOIN_PROBE_INTERVAL_MS);
2563 	} else {
2564 		ext_join_params->scan_le.active_time = cpu_to_le32(-1);
2565 		ext_join_params->scan_le.passive_time = cpu_to_le32(-1);
2566 		ext_join_params->scan_le.nprobes = cpu_to_le32(-1);
2567 	}
2568 
2569 	brcmf_set_join_pref(ifp, &sme->bss_select);
2570 
2571 	err  = brcmf_fil_bsscfg_data_set(ifp, "join", ext_join_params,
2572 					 join_params_size);
2573 	kfree(ext_join_params);
2574 	if (!err)
2575 		/* This is it. join command worked, we are done */
2576 		goto done;
2577 
2578 	/* join command failed, fallback to set ssid */
2579 	memset(&join_params, 0, sizeof(join_params));
2580 	join_params_size = sizeof(join_params.ssid_le);
2581 
2582 	memcpy(&join_params.ssid_le.SSID, sme->ssid, ssid_len);
2583 	join_params.ssid_le.SSID_len = cpu_to_le32(ssid_len);
2584 
2585 	if (sme->bssid)
2586 		memcpy(join_params.params_le.bssid, sme->bssid, ETH_ALEN);
2587 	else
2588 		eth_broadcast_addr(join_params.params_le.bssid);
2589 
2590 	if (cfg->channel) {
2591 		join_params.params_le.chanspec_list[0] = cpu_to_le16(chanspec);
2592 		join_params.params_le.chanspec_num = cpu_to_le32(1);
2593 		join_params_size += sizeof(join_params.params_le);
2594 	}
2595 	err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_SSID,
2596 				     &join_params, join_params_size);
2597 	if (err)
2598 		bphy_err(drvr, "BRCMF_C_SET_SSID failed (%d)\n", err);
2599 
2600 done:
2601 	if (err)
2602 		clear_bit(BRCMF_VIF_STATUS_CONNECTING, &ifp->vif->sme_state);
2603 	brcmf_dbg(TRACE, "Exit\n");
2604 	return err;
2605 }
2606 
2607 static s32
2608 brcmf_cfg80211_disconnect(struct wiphy *wiphy, struct net_device *ndev,
2609 		       u16 reason_code)
2610 {
2611 	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
2612 	struct brcmf_if *ifp = netdev_priv(ndev);
2613 	struct brcmf_cfg80211_profile *profile = &ifp->vif->profile;
2614 	struct brcmf_pub *drvr = cfg->pub;
2615 	struct brcmf_scb_val_le scbval;
2616 	s32 err = 0;
2617 
2618 	brcmf_dbg(TRACE, "Enter. Reason code = %d\n", reason_code);
2619 	if (!check_vif_up(ifp->vif))
2620 		return -EIO;
2621 
2622 	clear_bit(BRCMF_VIF_STATUS_CONNECTED, &ifp->vif->sme_state);
2623 	clear_bit(BRCMF_VIF_STATUS_CONNECTING, &ifp->vif->sme_state);
2624 	clear_bit(BRCMF_VIF_STATUS_EAP_SUCCESS, &ifp->vif->sme_state);
2625 	clear_bit(BRCMF_VIF_STATUS_ASSOC_SUCCESS, &ifp->vif->sme_state);
2626 	cfg80211_disconnected(ndev, reason_code, NULL, 0, true, GFP_KERNEL);
2627 
2628 	memcpy(&scbval.ea, &profile->bssid, ETH_ALEN);
2629 	scbval.val = cpu_to_le32(reason_code);
2630 	err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_DISASSOC,
2631 				     &scbval, sizeof(scbval));
2632 	if (err)
2633 		bphy_err(drvr, "error (%d)\n", err);
2634 
2635 	brcmf_dbg(TRACE, "Exit\n");
2636 	return err;
2637 }
2638 
2639 static s32
2640 brcmf_cfg80211_set_tx_power(struct wiphy *wiphy, struct wireless_dev *wdev,
2641 			    enum nl80211_tx_power_setting type, s32 mbm)
2642 {
2643 	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
2644 	struct net_device *ndev = cfg_to_ndev(cfg);
2645 	struct brcmf_if *ifp = netdev_priv(ndev);
2646 	struct brcmf_pub *drvr = cfg->pub;
2647 	s32 err;
2648 	s32 disable;
2649 	u32 qdbm = 127;
2650 
2651 	brcmf_dbg(TRACE, "Enter %d %d\n", type, mbm);
2652 	if (!check_vif_up(ifp->vif))
2653 		return -EIO;
2654 
2655 	switch (type) {
2656 	case NL80211_TX_POWER_AUTOMATIC:
2657 		break;
2658 	case NL80211_TX_POWER_LIMITED:
2659 	case NL80211_TX_POWER_FIXED:
2660 		if (mbm < 0) {
2661 			bphy_err(drvr, "TX_POWER_FIXED - dbm is negative\n");
2662 			err = -EINVAL;
2663 			goto done;
2664 		}
2665 		qdbm =  MBM_TO_DBM(4 * mbm);
2666 		if (qdbm > 127)
2667 			qdbm = 127;
2668 		qdbm |= WL_TXPWR_OVERRIDE;
2669 		break;
2670 	default:
2671 		bphy_err(drvr, "Unsupported type %d\n", type);
2672 		err = -EINVAL;
2673 		goto done;
2674 	}
2675 	/* Make sure radio is off or on as far as software is concerned */
2676 	disable = WL_RADIO_SW_DISABLE << 16;
2677 	err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_RADIO, disable);
2678 	if (err)
2679 		bphy_err(drvr, "WLC_SET_RADIO error (%d)\n", err);
2680 
2681 	err = brcmf_fil_iovar_int_set(ifp, "qtxpower", qdbm);
2682 	if (err)
2683 		bphy_err(drvr, "qtxpower error (%d)\n", err);
2684 
2685 done:
2686 	brcmf_dbg(TRACE, "Exit %d (qdbm)\n", qdbm & ~WL_TXPWR_OVERRIDE);
2687 	return err;
2688 }
2689 
2690 static s32
2691 brcmf_cfg80211_get_tx_power(struct wiphy *wiphy, struct wireless_dev *wdev,
2692 			    s32 *dbm)
2693 {
2694 	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
2695 	struct brcmf_cfg80211_vif *vif = wdev_to_vif(wdev);
2696 	struct brcmf_pub *drvr = cfg->pub;
2697 	s32 qdbm = 0;
2698 	s32 err;
2699 
2700 	brcmf_dbg(TRACE, "Enter\n");
2701 	if (!check_vif_up(vif))
2702 		return -EIO;
2703 
2704 	err = brcmf_fil_iovar_int_get(vif->ifp, "qtxpower", &qdbm);
2705 	if (err) {
2706 		bphy_err(drvr, "error (%d)\n", err);
2707 		goto done;
2708 	}
2709 	*dbm = (qdbm & ~WL_TXPWR_OVERRIDE) / 4;
2710 
2711 done:
2712 	brcmf_dbg(TRACE, "Exit (0x%x %d)\n", qdbm, *dbm);
2713 	return err;
2714 }
2715 
2716 static s32
2717 brcmf_cfg80211_config_default_key(struct wiphy *wiphy, struct net_device *ndev,
2718 				  int link_id, u8 key_idx, bool unicast,
2719 				  bool multicast)
2720 {
2721 	struct brcmf_if *ifp = netdev_priv(ndev);
2722 	struct brcmf_pub *drvr = ifp->drvr;
2723 	u32 index;
2724 	u32 wsec;
2725 	s32 err = 0;
2726 
2727 	brcmf_dbg(TRACE, "Enter\n");
2728 	brcmf_dbg(CONN, "key index (%d)\n", key_idx);
2729 	if (!check_vif_up(ifp->vif))
2730 		return -EIO;
2731 
2732 	err = brcmf_fil_bsscfg_int_get(ifp, "wsec", &wsec);
2733 	if (err) {
2734 		bphy_err(drvr, "WLC_GET_WSEC error (%d)\n", err);
2735 		goto done;
2736 	}
2737 
2738 	if (wsec & WEP_ENABLED) {
2739 		/* Just select a new current key */
2740 		index = key_idx;
2741 		err = brcmf_fil_cmd_int_set(ifp,
2742 					    BRCMF_C_SET_KEY_PRIMARY, index);
2743 		if (err)
2744 			bphy_err(drvr, "error (%d)\n", err);
2745 	}
2746 done:
2747 	brcmf_dbg(TRACE, "Exit\n");
2748 	return err;
2749 }
2750 
2751 static s32
2752 brcmf_cfg80211_del_key(struct wiphy *wiphy, struct net_device *ndev,
2753 		       int link_id, u8 key_idx, bool pairwise,
2754 		       const u8 *mac_addr)
2755 {
2756 	struct brcmf_if *ifp = netdev_priv(ndev);
2757 	struct brcmf_wsec_key *key;
2758 	s32 err;
2759 
2760 	brcmf_dbg(TRACE, "Enter\n");
2761 	brcmf_dbg(CONN, "key index (%d)\n", key_idx);
2762 
2763 	if (!check_vif_up(ifp->vif))
2764 		return -EIO;
2765 
2766 	if (key_idx >= BRCMF_MAX_DEFAULT_KEYS) {
2767 		/* we ignore this key index in this case */
2768 		return -EINVAL;
2769 	}
2770 
2771 	key = &ifp->vif->profile.key[key_idx];
2772 
2773 	if (key->algo == CRYPTO_ALGO_OFF) {
2774 		brcmf_dbg(CONN, "Ignore clearing of (never configured) key\n");
2775 		return -EINVAL;
2776 	}
2777 
2778 	memset(key, 0, sizeof(*key));
2779 	key->index = (u32)key_idx;
2780 	key->flags = BRCMF_PRIMARY_KEY;
2781 
2782 	/* Clear the key/index */
2783 	err = send_key_to_dongle(ifp, key);
2784 
2785 	brcmf_dbg(TRACE, "Exit\n");
2786 	return err;
2787 }
2788 
2789 static s32
2790 brcmf_cfg80211_add_key(struct wiphy *wiphy, struct net_device *ndev,
2791 		       int link_id, u8 key_idx, bool pairwise,
2792 		       const u8 *mac_addr, struct key_params *params)
2793 {
2794 	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
2795 	struct brcmf_if *ifp = netdev_priv(ndev);
2796 	struct brcmf_pub *drvr = cfg->pub;
2797 	struct brcmf_wsec_key *key;
2798 	s32 val;
2799 	s32 wsec;
2800 	s32 err;
2801 	u8 keybuf[8];
2802 	bool ext_key;
2803 
2804 	brcmf_dbg(TRACE, "Enter\n");
2805 	brcmf_dbg(CONN, "key index (%d)\n", key_idx);
2806 	if (!check_vif_up(ifp->vif))
2807 		return -EIO;
2808 
2809 	if (key_idx >= BRCMF_MAX_DEFAULT_KEYS) {
2810 		/* we ignore this key index in this case */
2811 		bphy_err(drvr, "invalid key index (%d)\n", key_idx);
2812 		return -EINVAL;
2813 	}
2814 
2815 	if (params->key_len == 0)
2816 		return brcmf_cfg80211_del_key(wiphy, ndev, -1, key_idx,
2817 					      pairwise, mac_addr);
2818 
2819 	if (params->key_len > sizeof(key->data)) {
2820 		bphy_err(drvr, "Too long key length (%u)\n", params->key_len);
2821 		return -EINVAL;
2822 	}
2823 
2824 	ext_key = false;
2825 	if (mac_addr && (params->cipher != WLAN_CIPHER_SUITE_WEP40) &&
2826 	    (params->cipher != WLAN_CIPHER_SUITE_WEP104)) {
2827 		brcmf_dbg(TRACE, "Ext key, mac %pM", mac_addr);
2828 		ext_key = true;
2829 	}
2830 
2831 	key = &ifp->vif->profile.key[key_idx];
2832 	memset(key, 0, sizeof(*key));
2833 	if ((ext_key) && (!is_multicast_ether_addr(mac_addr)))
2834 		memcpy((char *)&key->ea, (void *)mac_addr, ETH_ALEN);
2835 	key->len = params->key_len;
2836 	key->index = key_idx;
2837 	memcpy(key->data, params->key, key->len);
2838 	if (!ext_key)
2839 		key->flags = BRCMF_PRIMARY_KEY;
2840 
2841 	if (params->seq && params->seq_len == 6) {
2842 		/* rx iv */
2843 		u8 *ivptr;
2844 
2845 		ivptr = (u8 *)params->seq;
2846 		key->rxiv.hi = (ivptr[5] << 24) | (ivptr[4] << 16) |
2847 			(ivptr[3] << 8) | ivptr[2];
2848 		key->rxiv.lo = (ivptr[1] << 8) | ivptr[0];
2849 		key->iv_initialized = true;
2850 	}
2851 
2852 	switch (params->cipher) {
2853 	case WLAN_CIPHER_SUITE_WEP40:
2854 		key->algo = CRYPTO_ALGO_WEP1;
2855 		val = WEP_ENABLED;
2856 		brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_WEP40\n");
2857 		break;
2858 	case WLAN_CIPHER_SUITE_WEP104:
2859 		key->algo = CRYPTO_ALGO_WEP128;
2860 		val = WEP_ENABLED;
2861 		brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_WEP104\n");
2862 		break;
2863 	case WLAN_CIPHER_SUITE_TKIP:
2864 		if (!brcmf_is_apmode(ifp->vif)) {
2865 			brcmf_dbg(CONN, "Swapping RX/TX MIC key\n");
2866 			memcpy(keybuf, &key->data[24], sizeof(keybuf));
2867 			memcpy(&key->data[24], &key->data[16], sizeof(keybuf));
2868 			memcpy(&key->data[16], keybuf, sizeof(keybuf));
2869 		}
2870 		key->algo = CRYPTO_ALGO_TKIP;
2871 		val = TKIP_ENABLED;
2872 		brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_TKIP\n");
2873 		break;
2874 	case WLAN_CIPHER_SUITE_AES_CMAC:
2875 		key->algo = CRYPTO_ALGO_AES_CCM;
2876 		val = AES_ENABLED;
2877 		brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_AES_CMAC\n");
2878 		break;
2879 	case WLAN_CIPHER_SUITE_CCMP:
2880 		key->algo = CRYPTO_ALGO_AES_CCM;
2881 		val = AES_ENABLED;
2882 		brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_CCMP\n");
2883 		break;
2884 	default:
2885 		bphy_err(drvr, "Invalid cipher (0x%x)\n", params->cipher);
2886 		err = -EINVAL;
2887 		goto done;
2888 	}
2889 
2890 	err = send_key_to_dongle(ifp, key);
2891 	if (ext_key || err)
2892 		goto done;
2893 
2894 	err = brcmf_fil_bsscfg_int_get(ifp, "wsec", &wsec);
2895 	if (err) {
2896 		bphy_err(drvr, "get wsec error (%d)\n", err);
2897 		goto done;
2898 	}
2899 	wsec |= val;
2900 	err = brcmf_fil_bsscfg_int_set(ifp, "wsec", wsec);
2901 	if (err) {
2902 		bphy_err(drvr, "set wsec error (%d)\n", err);
2903 		goto done;
2904 	}
2905 
2906 done:
2907 	brcmf_dbg(TRACE, "Exit\n");
2908 	return err;
2909 }
2910 
2911 static s32
2912 brcmf_cfg80211_get_key(struct wiphy *wiphy, struct net_device *ndev,
2913 		       int link_id, u8 key_idx, bool pairwise,
2914 		       const u8 *mac_addr, void *cookie,
2915 		       void (*callback)(void *cookie,
2916 					struct key_params *params))
2917 {
2918 	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
2919 	struct key_params params;
2920 	struct brcmf_if *ifp = netdev_priv(ndev);
2921 	struct brcmf_cfg80211_profile *profile = &ifp->vif->profile;
2922 	struct brcmf_pub *drvr = cfg->pub;
2923 	struct brcmf_cfg80211_security *sec;
2924 	s32 wsec;
2925 	s32 err = 0;
2926 
2927 	brcmf_dbg(TRACE, "Enter\n");
2928 	brcmf_dbg(CONN, "key index (%d)\n", key_idx);
2929 	if (!check_vif_up(ifp->vif))
2930 		return -EIO;
2931 
2932 	memset(&params, 0, sizeof(params));
2933 
2934 	err = brcmf_fil_bsscfg_int_get(ifp, "wsec", &wsec);
2935 	if (err) {
2936 		bphy_err(drvr, "WLC_GET_WSEC error (%d)\n", err);
2937 		/* Ignore this error, may happen during DISASSOC */
2938 		err = -EAGAIN;
2939 		goto done;
2940 	}
2941 	if (wsec & WEP_ENABLED) {
2942 		sec = &profile->sec;
2943 		if (sec->cipher_pairwise & WLAN_CIPHER_SUITE_WEP40) {
2944 			params.cipher = WLAN_CIPHER_SUITE_WEP40;
2945 			brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_WEP40\n");
2946 		} else if (sec->cipher_pairwise & WLAN_CIPHER_SUITE_WEP104) {
2947 			params.cipher = WLAN_CIPHER_SUITE_WEP104;
2948 			brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_WEP104\n");
2949 		}
2950 	} else if (wsec & TKIP_ENABLED) {
2951 		params.cipher = WLAN_CIPHER_SUITE_TKIP;
2952 		brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_TKIP\n");
2953 	} else if (wsec & AES_ENABLED) {
2954 		params.cipher = WLAN_CIPHER_SUITE_AES_CMAC;
2955 		brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_AES_CMAC\n");
2956 	} else  {
2957 		bphy_err(drvr, "Invalid algo (0x%x)\n", wsec);
2958 		err = -EINVAL;
2959 		goto done;
2960 	}
2961 	callback(cookie, &params);
2962 
2963 done:
2964 	brcmf_dbg(TRACE, "Exit\n");
2965 	return err;
2966 }
2967 
2968 static s32
2969 brcmf_cfg80211_config_default_mgmt_key(struct wiphy *wiphy,
2970 				       struct net_device *ndev, int link_id,
2971 				       u8 key_idx)
2972 {
2973 	struct brcmf_if *ifp = netdev_priv(ndev);
2974 
2975 	brcmf_dbg(TRACE, "Enter key_idx %d\n", key_idx);
2976 
2977 	if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MFP))
2978 		return 0;
2979 
2980 	brcmf_dbg(INFO, "Not supported\n");
2981 
2982 	return -EOPNOTSUPP;
2983 }
2984 
2985 static void
2986 brcmf_cfg80211_reconfigure_wep(struct brcmf_if *ifp)
2987 {
2988 	struct brcmf_pub *drvr = ifp->drvr;
2989 	s32 err;
2990 	u8 key_idx;
2991 	struct brcmf_wsec_key *key;
2992 	s32 wsec;
2993 
2994 	for (key_idx = 0; key_idx < BRCMF_MAX_DEFAULT_KEYS; key_idx++) {
2995 		key = &ifp->vif->profile.key[key_idx];
2996 		if ((key->algo == CRYPTO_ALGO_WEP1) ||
2997 		    (key->algo == CRYPTO_ALGO_WEP128))
2998 			break;
2999 	}
3000 	if (key_idx == BRCMF_MAX_DEFAULT_KEYS)
3001 		return;
3002 
3003 	err = send_key_to_dongle(ifp, key);
3004 	if (err) {
3005 		bphy_err(drvr, "Setting WEP key failed (%d)\n", err);
3006 		return;
3007 	}
3008 	err = brcmf_fil_bsscfg_int_get(ifp, "wsec", &wsec);
3009 	if (err) {
3010 		bphy_err(drvr, "get wsec error (%d)\n", err);
3011 		return;
3012 	}
3013 	wsec |= WEP_ENABLED;
3014 	err = brcmf_fil_bsscfg_int_set(ifp, "wsec", wsec);
3015 	if (err)
3016 		bphy_err(drvr, "set wsec error (%d)\n", err);
3017 }
3018 
3019 static void brcmf_convert_sta_flags(u32 fw_sta_flags, struct station_info *si)
3020 {
3021 	struct nl80211_sta_flag_update *sfu;
3022 
3023 	brcmf_dbg(TRACE, "flags %08x\n", fw_sta_flags);
3024 	si->filled |= BIT_ULL(NL80211_STA_INFO_STA_FLAGS);
3025 	sfu = &si->sta_flags;
3026 	sfu->mask = BIT(NL80211_STA_FLAG_WME) |
3027 		    BIT(NL80211_STA_FLAG_AUTHENTICATED) |
3028 		    BIT(NL80211_STA_FLAG_ASSOCIATED) |
3029 		    BIT(NL80211_STA_FLAG_AUTHORIZED);
3030 	if (fw_sta_flags & BRCMF_STA_WME)
3031 		sfu->set |= BIT(NL80211_STA_FLAG_WME);
3032 	if (fw_sta_flags & BRCMF_STA_AUTHE)
3033 		sfu->set |= BIT(NL80211_STA_FLAG_AUTHENTICATED);
3034 	if (fw_sta_flags & BRCMF_STA_ASSOC)
3035 		sfu->set |= BIT(NL80211_STA_FLAG_ASSOCIATED);
3036 	if (fw_sta_flags & BRCMF_STA_AUTHO)
3037 		sfu->set |= BIT(NL80211_STA_FLAG_AUTHORIZED);
3038 }
3039 
3040 static void brcmf_fill_bss_param(struct brcmf_if *ifp, struct station_info *si)
3041 {
3042 	struct brcmf_pub *drvr = ifp->drvr;
3043 	struct {
3044 		__le32 len;
3045 		struct brcmf_bss_info_le bss_le;
3046 	} *buf;
3047 	u16 capability;
3048 	int err;
3049 
3050 	buf = kzalloc(WL_BSS_INFO_MAX, GFP_KERNEL);
3051 	if (!buf)
3052 		return;
3053 
3054 	buf->len = cpu_to_le32(WL_BSS_INFO_MAX);
3055 	err = brcmf_fil_cmd_data_get(ifp, BRCMF_C_GET_BSS_INFO, buf,
3056 				     WL_BSS_INFO_MAX);
3057 	if (err) {
3058 		bphy_err(drvr, "Failed to get bss info (%d)\n", err);
3059 		goto out_kfree;
3060 	}
3061 	si->filled |= BIT_ULL(NL80211_STA_INFO_BSS_PARAM);
3062 	si->bss_param.beacon_interval = le16_to_cpu(buf->bss_le.beacon_period);
3063 	si->bss_param.dtim_period = buf->bss_le.dtim_period;
3064 	capability = le16_to_cpu(buf->bss_le.capability);
3065 	if (capability & IEEE80211_HT_STBC_PARAM_DUAL_CTS_PROT)
3066 		si->bss_param.flags |= BSS_PARAM_FLAGS_CTS_PROT;
3067 	if (capability & WLAN_CAPABILITY_SHORT_PREAMBLE)
3068 		si->bss_param.flags |= BSS_PARAM_FLAGS_SHORT_PREAMBLE;
3069 	if (capability & WLAN_CAPABILITY_SHORT_SLOT_TIME)
3070 		si->bss_param.flags |= BSS_PARAM_FLAGS_SHORT_SLOT_TIME;
3071 
3072 out_kfree:
3073 	kfree(buf);
3074 }
3075 
3076 static s32
3077 brcmf_cfg80211_get_station_ibss(struct brcmf_if *ifp,
3078 				struct station_info *sinfo)
3079 {
3080 	struct brcmf_pub *drvr = ifp->drvr;
3081 	struct brcmf_scb_val_le scbval;
3082 	struct brcmf_pktcnt_le pktcnt;
3083 	s32 err;
3084 	u32 rate;
3085 	u32 rssi;
3086 
3087 	/* Get the current tx rate */
3088 	err = brcmf_fil_cmd_int_get(ifp, BRCMF_C_GET_RATE, &rate);
3089 	if (err < 0) {
3090 		bphy_err(drvr, "BRCMF_C_GET_RATE error (%d)\n", err);
3091 		return err;
3092 	}
3093 	sinfo->filled |= BIT_ULL(NL80211_STA_INFO_TX_BITRATE);
3094 	sinfo->txrate.legacy = rate * 5;
3095 
3096 	memset(&scbval, 0, sizeof(scbval));
3097 	err = brcmf_fil_cmd_data_get(ifp, BRCMF_C_GET_RSSI, &scbval,
3098 				     sizeof(scbval));
3099 	if (err) {
3100 		bphy_err(drvr, "BRCMF_C_GET_RSSI error (%d)\n", err);
3101 		return err;
3102 	}
3103 	rssi = le32_to_cpu(scbval.val);
3104 	sinfo->filled |= BIT_ULL(NL80211_STA_INFO_SIGNAL);
3105 	sinfo->signal = rssi;
3106 
3107 	err = brcmf_fil_cmd_data_get(ifp, BRCMF_C_GET_GET_PKTCNTS, &pktcnt,
3108 				     sizeof(pktcnt));
3109 	if (err) {
3110 		bphy_err(drvr, "BRCMF_C_GET_GET_PKTCNTS error (%d)\n", err);
3111 		return err;
3112 	}
3113 	sinfo->filled |= BIT_ULL(NL80211_STA_INFO_RX_PACKETS) |
3114 			 BIT_ULL(NL80211_STA_INFO_RX_DROP_MISC) |
3115 			 BIT_ULL(NL80211_STA_INFO_TX_PACKETS) |
3116 			 BIT_ULL(NL80211_STA_INFO_TX_FAILED);
3117 	sinfo->rx_packets = le32_to_cpu(pktcnt.rx_good_pkt);
3118 	sinfo->rx_dropped_misc = le32_to_cpu(pktcnt.rx_bad_pkt);
3119 	sinfo->tx_packets = le32_to_cpu(pktcnt.tx_good_pkt);
3120 	sinfo->tx_failed  = le32_to_cpu(pktcnt.tx_bad_pkt);
3121 
3122 	return 0;
3123 }
3124 
3125 static s32
3126 brcmf_cfg80211_get_station(struct wiphy *wiphy, struct net_device *ndev,
3127 			   const u8 *mac, struct station_info *sinfo)
3128 {
3129 	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
3130 	struct brcmf_if *ifp = netdev_priv(ndev);
3131 	struct brcmf_pub *drvr = cfg->pub;
3132 	struct brcmf_scb_val_le scb_val;
3133 	s32 err = 0;
3134 	struct brcmf_sta_info_le sta_info_le;
3135 	u32 sta_flags;
3136 	u32 is_tdls_peer;
3137 	s32 total_rssi_avg = 0;
3138 	s32 total_rssi = 0;
3139 	s32 count_rssi = 0;
3140 	int rssi;
3141 	u32 i;
3142 
3143 	brcmf_dbg(TRACE, "Enter, MAC %pM\n", mac);
3144 	if (!check_vif_up(ifp->vif))
3145 		return -EIO;
3146 
3147 	if (brcmf_is_ibssmode(ifp->vif))
3148 		return brcmf_cfg80211_get_station_ibss(ifp, sinfo);
3149 
3150 	memset(&sta_info_le, 0, sizeof(sta_info_le));
3151 	memcpy(&sta_info_le, mac, ETH_ALEN);
3152 	err = brcmf_fil_iovar_data_get(ifp, "tdls_sta_info",
3153 				       &sta_info_le,
3154 				       sizeof(sta_info_le));
3155 	is_tdls_peer = !err;
3156 	if (err) {
3157 		err = brcmf_fil_iovar_data_get(ifp, "sta_info",
3158 					       &sta_info_le,
3159 					       sizeof(sta_info_le));
3160 		if (err < 0) {
3161 			bphy_err(drvr, "GET STA INFO failed, %d\n", err);
3162 			goto done;
3163 		}
3164 	}
3165 	brcmf_dbg(TRACE, "version %d\n", le16_to_cpu(sta_info_le.ver));
3166 	sinfo->filled = BIT_ULL(NL80211_STA_INFO_INACTIVE_TIME);
3167 	sinfo->inactive_time = le32_to_cpu(sta_info_le.idle) * 1000;
3168 	sta_flags = le32_to_cpu(sta_info_le.flags);
3169 	brcmf_convert_sta_flags(sta_flags, sinfo);
3170 	sinfo->sta_flags.mask |= BIT(NL80211_STA_FLAG_TDLS_PEER);
3171 	if (is_tdls_peer)
3172 		sinfo->sta_flags.set |= BIT(NL80211_STA_FLAG_TDLS_PEER);
3173 	else
3174 		sinfo->sta_flags.set &= ~BIT(NL80211_STA_FLAG_TDLS_PEER);
3175 	if (sta_flags & BRCMF_STA_ASSOC) {
3176 		sinfo->filled |= BIT_ULL(NL80211_STA_INFO_CONNECTED_TIME);
3177 		sinfo->connected_time = le32_to_cpu(sta_info_le.in);
3178 		brcmf_fill_bss_param(ifp, sinfo);
3179 	}
3180 	if (sta_flags & BRCMF_STA_SCBSTATS) {
3181 		sinfo->filled |= BIT_ULL(NL80211_STA_INFO_TX_FAILED);
3182 		sinfo->tx_failed = le32_to_cpu(sta_info_le.tx_failures);
3183 		sinfo->filled |= BIT_ULL(NL80211_STA_INFO_TX_PACKETS);
3184 		sinfo->tx_packets = le32_to_cpu(sta_info_le.tx_pkts);
3185 		sinfo->tx_packets += le32_to_cpu(sta_info_le.tx_mcast_pkts);
3186 		sinfo->filled |= BIT_ULL(NL80211_STA_INFO_RX_PACKETS);
3187 		sinfo->rx_packets = le32_to_cpu(sta_info_le.rx_ucast_pkts);
3188 		sinfo->rx_packets += le32_to_cpu(sta_info_le.rx_mcast_pkts);
3189 		if (sinfo->tx_packets) {
3190 			sinfo->filled |= BIT_ULL(NL80211_STA_INFO_TX_BITRATE);
3191 			sinfo->txrate.legacy =
3192 				le32_to_cpu(sta_info_le.tx_rate) / 100;
3193 		}
3194 		if (sinfo->rx_packets) {
3195 			sinfo->filled |= BIT_ULL(NL80211_STA_INFO_RX_BITRATE);
3196 			sinfo->rxrate.legacy =
3197 				le32_to_cpu(sta_info_le.rx_rate) / 100;
3198 		}
3199 		if (le16_to_cpu(sta_info_le.ver) >= 4) {
3200 			sinfo->filled |= BIT_ULL(NL80211_STA_INFO_TX_BYTES);
3201 			sinfo->tx_bytes = le64_to_cpu(sta_info_le.tx_tot_bytes);
3202 			sinfo->filled |= BIT_ULL(NL80211_STA_INFO_RX_BYTES);
3203 			sinfo->rx_bytes = le64_to_cpu(sta_info_le.rx_tot_bytes);
3204 		}
3205 		for (i = 0; i < BRCMF_ANT_MAX; i++) {
3206 			if (sta_info_le.rssi[i] == 0 ||
3207 			    sta_info_le.rx_lastpkt_rssi[i] == 0)
3208 				continue;
3209 			sinfo->chains |= BIT(count_rssi);
3210 			sinfo->chain_signal[count_rssi] =
3211 				sta_info_le.rx_lastpkt_rssi[i];
3212 			sinfo->chain_signal_avg[count_rssi] =
3213 				sta_info_le.rssi[i];
3214 			total_rssi += sta_info_le.rx_lastpkt_rssi[i];
3215 			total_rssi_avg += sta_info_le.rssi[i];
3216 			count_rssi++;
3217 		}
3218 		if (count_rssi) {
3219 			sinfo->filled |= BIT_ULL(NL80211_STA_INFO_SIGNAL);
3220 			sinfo->filled |= BIT_ULL(NL80211_STA_INFO_SIGNAL_AVG);
3221 			sinfo->filled |= BIT_ULL(NL80211_STA_INFO_CHAIN_SIGNAL);
3222 			sinfo->filled |=
3223 				BIT_ULL(NL80211_STA_INFO_CHAIN_SIGNAL_AVG);
3224 			sinfo->signal = total_rssi / count_rssi;
3225 			sinfo->signal_avg = total_rssi_avg / count_rssi;
3226 		} else if (test_bit(BRCMF_VIF_STATUS_CONNECTED,
3227 			&ifp->vif->sme_state)) {
3228 			memset(&scb_val, 0, sizeof(scb_val));
3229 			err = brcmf_fil_cmd_data_get(ifp, BRCMF_C_GET_RSSI,
3230 						     &scb_val, sizeof(scb_val));
3231 			if (err) {
3232 				bphy_err(drvr, "Could not get rssi (%d)\n",
3233 					 err);
3234 				goto done;
3235 			} else {
3236 				rssi = le32_to_cpu(scb_val.val);
3237 				sinfo->filled |= BIT_ULL(NL80211_STA_INFO_SIGNAL);
3238 				sinfo->signal = rssi;
3239 				brcmf_dbg(CONN, "RSSI %d dBm\n", rssi);
3240 			}
3241 		}
3242 	}
3243 done:
3244 	brcmf_dbg(TRACE, "Exit\n");
3245 	return err;
3246 }
3247 
3248 static int
3249 brcmf_cfg80211_dump_station(struct wiphy *wiphy, struct net_device *ndev,
3250 			    int idx, u8 *mac, struct station_info *sinfo)
3251 {
3252 	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
3253 	struct brcmf_if *ifp = netdev_priv(ndev);
3254 	struct brcmf_pub *drvr = cfg->pub;
3255 	s32 err;
3256 
3257 	brcmf_dbg(TRACE, "Enter, idx %d\n", idx);
3258 
3259 	if (idx == 0) {
3260 		cfg->assoclist.count = cpu_to_le32(BRCMF_MAX_ASSOCLIST);
3261 		err = brcmf_fil_cmd_data_get(ifp, BRCMF_C_GET_ASSOCLIST,
3262 					     &cfg->assoclist,
3263 					     sizeof(cfg->assoclist));
3264 		if (err) {
3265 			/* GET_ASSOCLIST unsupported by firmware of older chips */
3266 			if (err == -EBADE)
3267 				bphy_info_once(drvr, "BRCMF_C_GET_ASSOCLIST unsupported\n");
3268 			else
3269 				bphy_err(drvr, "BRCMF_C_GET_ASSOCLIST failed, err=%d\n",
3270 					 err);
3271 
3272 			cfg->assoclist.count = 0;
3273 			return -EOPNOTSUPP;
3274 		}
3275 	}
3276 	if (idx < le32_to_cpu(cfg->assoclist.count)) {
3277 		memcpy(mac, cfg->assoclist.mac[idx], ETH_ALEN);
3278 		return brcmf_cfg80211_get_station(wiphy, ndev, mac, sinfo);
3279 	}
3280 	return -ENOENT;
3281 }
3282 
3283 static s32
3284 brcmf_cfg80211_set_power_mgmt(struct wiphy *wiphy, struct net_device *ndev,
3285 			   bool enabled, s32 timeout)
3286 {
3287 	s32 pm;
3288 	s32 err = 0;
3289 	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
3290 	struct brcmf_if *ifp = netdev_priv(ndev);
3291 	struct brcmf_pub *drvr = cfg->pub;
3292 
3293 	brcmf_dbg(TRACE, "Enter\n");
3294 
3295 	/*
3296 	 * Powersave enable/disable request is coming from the
3297 	 * cfg80211 even before the interface is up. In that
3298 	 * scenario, driver will be storing the power save
3299 	 * preference in cfg struct to apply this to
3300 	 * FW later while initializing the dongle
3301 	 */
3302 	cfg->pwr_save = enabled;
3303 	if (!check_vif_up(ifp->vif)) {
3304 
3305 		brcmf_dbg(INFO, "Device is not ready, storing the value in cfg_info struct\n");
3306 		goto done;
3307 	}
3308 
3309 	pm = enabled ? PM_FAST : PM_OFF;
3310 	/* Do not enable the power save after assoc if it is a p2p interface */
3311 	if (ifp->vif->wdev.iftype == NL80211_IFTYPE_P2P_CLIENT) {
3312 		brcmf_dbg(INFO, "Do not enable power save for P2P clients\n");
3313 		pm = PM_OFF;
3314 	}
3315 	brcmf_dbg(INFO, "power save %s\n", (pm ? "enabled" : "disabled"));
3316 
3317 	err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_PM, pm);
3318 	if (err) {
3319 		if (err == -ENODEV)
3320 			bphy_err(drvr, "net_device is not ready yet\n");
3321 		else
3322 			bphy_err(drvr, "error (%d)\n", err);
3323 	}
3324 
3325 	err = brcmf_fil_iovar_int_set(ifp, "pm2_sleep_ret",
3326 				min_t(u32, timeout, BRCMF_PS_MAX_TIMEOUT_MS));
3327 	if (err)
3328 		bphy_err(drvr, "Unable to set pm timeout, (%d)\n", err);
3329 
3330 done:
3331 	brcmf_dbg(TRACE, "Exit\n");
3332 	return err;
3333 }
3334 
3335 static s32 brcmf_inform_single_bss(struct brcmf_cfg80211_info *cfg,
3336 				   struct brcmf_bss_info_le *bi)
3337 {
3338 	struct wiphy *wiphy = cfg_to_wiphy(cfg);
3339 	struct brcmf_pub *drvr = cfg->pub;
3340 	struct cfg80211_bss *bss;
3341 	enum nl80211_band band;
3342 	struct brcmu_chan ch;
3343 	u16 channel;
3344 	u32 freq;
3345 	u16 notify_capability;
3346 	u16 notify_interval;
3347 	u8 *notify_ie;
3348 	size_t notify_ielen;
3349 	struct cfg80211_inform_bss bss_data = {};
3350 
3351 	if (le32_to_cpu(bi->length) > WL_BSS_INFO_MAX) {
3352 		bphy_err(drvr, "Bss info is larger than buffer. Discarding\n");
3353 		return -EINVAL;
3354 	}
3355 
3356 	if (!bi->ctl_ch) {
3357 		ch.chspec = le16_to_cpu(bi->chanspec);
3358 		cfg->d11inf.decchspec(&ch);
3359 		bi->ctl_ch = ch.control_ch_num;
3360 	}
3361 	channel = bi->ctl_ch;
3362 
3363 	if (channel <= CH_MAX_2G_CHANNEL)
3364 		band = NL80211_BAND_2GHZ;
3365 	else
3366 		band = NL80211_BAND_5GHZ;
3367 
3368 	freq = ieee80211_channel_to_frequency(channel, band);
3369 	bss_data.chan = ieee80211_get_channel(wiphy, freq);
3370 	bss_data.boottime_ns = ktime_to_ns(ktime_get_boottime());
3371 
3372 	notify_capability = le16_to_cpu(bi->capability);
3373 	notify_interval = le16_to_cpu(bi->beacon_period);
3374 	notify_ie = (u8 *)bi + le16_to_cpu(bi->ie_offset);
3375 	notify_ielen = le32_to_cpu(bi->ie_length);
3376 	bss_data.signal = (s16)le16_to_cpu(bi->RSSI) * 100;
3377 
3378 	brcmf_dbg(CONN, "bssid: %pM\n", bi->BSSID);
3379 	brcmf_dbg(CONN, "Channel: %d(%d)\n", channel, freq);
3380 	brcmf_dbg(CONN, "Capability: %X\n", notify_capability);
3381 	brcmf_dbg(CONN, "Beacon interval: %d\n", notify_interval);
3382 	brcmf_dbg(CONN, "Signal: %d\n", bss_data.signal);
3383 
3384 	bss = cfg80211_inform_bss_data(wiphy, &bss_data,
3385 				       CFG80211_BSS_FTYPE_UNKNOWN,
3386 				       (const u8 *)bi->BSSID,
3387 				       0, notify_capability,
3388 				       notify_interval, notify_ie,
3389 				       notify_ielen, GFP_KERNEL);
3390 
3391 	if (!bss)
3392 		return -ENOMEM;
3393 
3394 	cfg80211_put_bss(wiphy, bss);
3395 
3396 	return 0;
3397 }
3398 
3399 static struct brcmf_bss_info_le *
3400 next_bss_le(struct brcmf_scan_results *list, struct brcmf_bss_info_le *bss)
3401 {
3402 	if (bss == NULL)
3403 		return list->bss_info_le;
3404 	return (struct brcmf_bss_info_le *)((unsigned long)bss +
3405 					    le32_to_cpu(bss->length));
3406 }
3407 
3408 static s32 brcmf_inform_bss(struct brcmf_cfg80211_info *cfg)
3409 {
3410 	struct brcmf_pub *drvr = cfg->pub;
3411 	struct brcmf_scan_results *bss_list;
3412 	struct brcmf_bss_info_le *bi = NULL;	/* must be initialized */
3413 	s32 err = 0;
3414 	int i;
3415 
3416 	bss_list = (struct brcmf_scan_results *)cfg->escan_info.escan_buf;
3417 	if (bss_list->count != 0 &&
3418 	    bss_list->version != BRCMF_BSS_INFO_VERSION) {
3419 		bphy_err(drvr, "Version %d != WL_BSS_INFO_VERSION\n",
3420 			 bss_list->version);
3421 		return -EOPNOTSUPP;
3422 	}
3423 	brcmf_dbg(SCAN, "scanned AP count (%d)\n", bss_list->count);
3424 	for (i = 0; i < bss_list->count; i++) {
3425 		bi = next_bss_le(bss_list, bi);
3426 		err = brcmf_inform_single_bss(cfg, bi);
3427 		if (err)
3428 			break;
3429 	}
3430 	return err;
3431 }
3432 
3433 static s32 brcmf_inform_ibss(struct brcmf_cfg80211_info *cfg,
3434 			     struct net_device *ndev, const u8 *bssid)
3435 {
3436 	struct wiphy *wiphy = cfg_to_wiphy(cfg);
3437 	struct brcmf_pub *drvr = cfg->pub;
3438 	struct ieee80211_channel *notify_channel;
3439 	struct brcmf_bss_info_le *bi = NULL;
3440 	struct ieee80211_supported_band *band;
3441 	struct cfg80211_bss *bss;
3442 	struct brcmu_chan ch;
3443 	u8 *buf = NULL;
3444 	s32 err = 0;
3445 	u32 freq;
3446 	u16 notify_capability;
3447 	u16 notify_interval;
3448 	u8 *notify_ie;
3449 	size_t notify_ielen;
3450 	s32 notify_signal;
3451 
3452 	brcmf_dbg(TRACE, "Enter\n");
3453 
3454 	buf = kzalloc(WL_BSS_INFO_MAX, GFP_KERNEL);
3455 	if (buf == NULL) {
3456 		err = -ENOMEM;
3457 		goto CleanUp;
3458 	}
3459 
3460 	*(__le32 *)buf = cpu_to_le32(WL_BSS_INFO_MAX);
3461 
3462 	err = brcmf_fil_cmd_data_get(netdev_priv(ndev), BRCMF_C_GET_BSS_INFO,
3463 				     buf, WL_BSS_INFO_MAX);
3464 	if (err) {
3465 		bphy_err(drvr, "WLC_GET_BSS_INFO failed: %d\n", err);
3466 		goto CleanUp;
3467 	}
3468 
3469 	bi = (struct brcmf_bss_info_le *)(buf + 4);
3470 
3471 	ch.chspec = le16_to_cpu(bi->chanspec);
3472 	cfg->d11inf.decchspec(&ch);
3473 
3474 	if (ch.band == BRCMU_CHAN_BAND_2G)
3475 		band = wiphy->bands[NL80211_BAND_2GHZ];
3476 	else
3477 		band = wiphy->bands[NL80211_BAND_5GHZ];
3478 
3479 	freq = ieee80211_channel_to_frequency(ch.control_ch_num, band->band);
3480 	cfg->channel = freq;
3481 	notify_channel = ieee80211_get_channel(wiphy, freq);
3482 
3483 	notify_capability = le16_to_cpu(bi->capability);
3484 	notify_interval = le16_to_cpu(bi->beacon_period);
3485 	notify_ie = (u8 *)bi + le16_to_cpu(bi->ie_offset);
3486 	notify_ielen = le32_to_cpu(bi->ie_length);
3487 	notify_signal = (s16)le16_to_cpu(bi->RSSI) * 100;
3488 
3489 	brcmf_dbg(CONN, "channel: %d(%d)\n", ch.control_ch_num, freq);
3490 	brcmf_dbg(CONN, "capability: %X\n", notify_capability);
3491 	brcmf_dbg(CONN, "beacon interval: %d\n", notify_interval);
3492 	brcmf_dbg(CONN, "signal: %d\n", notify_signal);
3493 
3494 	bss = cfg80211_inform_bss(wiphy, notify_channel,
3495 				  CFG80211_BSS_FTYPE_UNKNOWN, bssid, 0,
3496 				  notify_capability, notify_interval,
3497 				  notify_ie, notify_ielen, notify_signal,
3498 				  GFP_KERNEL);
3499 
3500 	if (!bss) {
3501 		err = -ENOMEM;
3502 		goto CleanUp;
3503 	}
3504 
3505 	cfg80211_put_bss(wiphy, bss);
3506 
3507 CleanUp:
3508 
3509 	kfree(buf);
3510 
3511 	brcmf_dbg(TRACE, "Exit\n");
3512 
3513 	return err;
3514 }
3515 
3516 static s32 brcmf_update_bss_info(struct brcmf_cfg80211_info *cfg,
3517 				 struct brcmf_if *ifp)
3518 {
3519 	struct brcmf_pub *drvr = cfg->pub;
3520 	struct brcmf_bss_info_le *bi = NULL;
3521 	s32 err = 0;
3522 
3523 	brcmf_dbg(TRACE, "Enter\n");
3524 	if (brcmf_is_ibssmode(ifp->vif))
3525 		return err;
3526 
3527 	*(__le32 *)cfg->extra_buf = cpu_to_le32(WL_EXTRA_BUF_MAX);
3528 	err = brcmf_fil_cmd_data_get(ifp, BRCMF_C_GET_BSS_INFO,
3529 				     cfg->extra_buf, WL_EXTRA_BUF_MAX);
3530 	if (err) {
3531 		bphy_err(drvr, "Could not get bss info %d\n", err);
3532 		goto update_bss_info_out;
3533 	}
3534 	bi = (struct brcmf_bss_info_le *)(cfg->extra_buf + 4);
3535 	err = brcmf_inform_single_bss(cfg, bi);
3536 
3537 update_bss_info_out:
3538 	brcmf_dbg(TRACE, "Exit");
3539 	return err;
3540 }
3541 
3542 void brcmf_abort_scanning(struct brcmf_cfg80211_info *cfg)
3543 {
3544 	struct escan_info *escan = &cfg->escan_info;
3545 
3546 	set_bit(BRCMF_SCAN_STATUS_ABORT, &cfg->scan_status);
3547 	if (cfg->int_escan_map || cfg->scan_request) {
3548 		escan->escan_state = WL_ESCAN_STATE_IDLE;
3549 		brcmf_notify_escan_complete(cfg, escan->ifp, true, true);
3550 	}
3551 	clear_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status);
3552 	clear_bit(BRCMF_SCAN_STATUS_ABORT, &cfg->scan_status);
3553 }
3554 
3555 static void brcmf_cfg80211_escan_timeout_worker(struct work_struct *work)
3556 {
3557 	struct brcmf_cfg80211_info *cfg =
3558 			container_of(work, struct brcmf_cfg80211_info,
3559 				     escan_timeout_work);
3560 
3561 	brcmf_inform_bss(cfg);
3562 	brcmf_notify_escan_complete(cfg, cfg->escan_info.ifp, true, true);
3563 }
3564 
3565 static void brcmf_escan_timeout(struct timer_list *t)
3566 {
3567 	struct brcmf_cfg80211_info *cfg =
3568 			from_timer(cfg, t, escan_timeout);
3569 	struct brcmf_pub *drvr = cfg->pub;
3570 
3571 	if (cfg->int_escan_map || cfg->scan_request) {
3572 		bphy_err(drvr, "timer expired\n");
3573 		schedule_work(&cfg->escan_timeout_work);
3574 	}
3575 }
3576 
3577 static s32
3578 brcmf_compare_update_same_bss(struct brcmf_cfg80211_info *cfg,
3579 			      struct brcmf_bss_info_le *bss,
3580 			      struct brcmf_bss_info_le *bss_info_le)
3581 {
3582 	struct brcmu_chan ch_bss, ch_bss_info_le;
3583 
3584 	ch_bss.chspec = le16_to_cpu(bss->chanspec);
3585 	cfg->d11inf.decchspec(&ch_bss);
3586 	ch_bss_info_le.chspec = le16_to_cpu(bss_info_le->chanspec);
3587 	cfg->d11inf.decchspec(&ch_bss_info_le);
3588 
3589 	if (!memcmp(&bss_info_le->BSSID, &bss->BSSID, ETH_ALEN) &&
3590 		ch_bss.band == ch_bss_info_le.band &&
3591 		bss_info_le->SSID_len == bss->SSID_len &&
3592 		!memcmp(bss_info_le->SSID, bss->SSID, bss_info_le->SSID_len)) {
3593 		if ((bss->flags & BRCMF_BSS_RSSI_ON_CHANNEL) ==
3594 			(bss_info_le->flags & BRCMF_BSS_RSSI_ON_CHANNEL)) {
3595 			s16 bss_rssi = le16_to_cpu(bss->RSSI);
3596 			s16 bss_info_rssi = le16_to_cpu(bss_info_le->RSSI);
3597 
3598 			/* preserve max RSSI if the measurements are
3599 			* both on-channel or both off-channel
3600 			*/
3601 			if (bss_info_rssi > bss_rssi)
3602 				bss->RSSI = bss_info_le->RSSI;
3603 		} else if ((bss->flags & BRCMF_BSS_RSSI_ON_CHANNEL) &&
3604 			(bss_info_le->flags & BRCMF_BSS_RSSI_ON_CHANNEL) == 0) {
3605 			/* preserve the on-channel rssi measurement
3606 			* if the new measurement is off channel
3607 			*/
3608 			bss->RSSI = bss_info_le->RSSI;
3609 			bss->flags |= BRCMF_BSS_RSSI_ON_CHANNEL;
3610 		}
3611 		return 1;
3612 	}
3613 	return 0;
3614 }
3615 
3616 static s32
3617 brcmf_cfg80211_escan_handler(struct brcmf_if *ifp,
3618 			     const struct brcmf_event_msg *e, void *data)
3619 {
3620 	struct brcmf_pub *drvr = ifp->drvr;
3621 	struct brcmf_cfg80211_info *cfg = drvr->config;
3622 	s32 status;
3623 	struct brcmf_escan_result_le *escan_result_le;
3624 	u32 escan_buflen;
3625 	struct brcmf_bss_info_le *bss_info_le;
3626 	struct brcmf_bss_info_le *bss = NULL;
3627 	u32 bi_length;
3628 	struct brcmf_scan_results *list;
3629 	u32 i;
3630 	bool aborted;
3631 
3632 	status = e->status;
3633 
3634 	if (status == BRCMF_E_STATUS_ABORT)
3635 		goto exit;
3636 
3637 	if (!test_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status)) {
3638 		bphy_err(drvr, "scan not ready, bsscfgidx=%d\n",
3639 			 ifp->bsscfgidx);
3640 		return -EPERM;
3641 	}
3642 
3643 	if (status == BRCMF_E_STATUS_PARTIAL) {
3644 		brcmf_dbg(SCAN, "ESCAN Partial result\n");
3645 		if (e->datalen < sizeof(*escan_result_le)) {
3646 			bphy_err(drvr, "invalid event data length\n");
3647 			goto exit;
3648 		}
3649 		escan_result_le = (struct brcmf_escan_result_le *) data;
3650 		if (!escan_result_le) {
3651 			bphy_err(drvr, "Invalid escan result (NULL pointer)\n");
3652 			goto exit;
3653 		}
3654 		escan_buflen = le32_to_cpu(escan_result_le->buflen);
3655 		if (escan_buflen > BRCMF_ESCAN_BUF_SIZE ||
3656 		    escan_buflen > e->datalen ||
3657 		    escan_buflen < sizeof(*escan_result_le)) {
3658 			bphy_err(drvr, "Invalid escan buffer length: %d\n",
3659 				 escan_buflen);
3660 			goto exit;
3661 		}
3662 		if (le16_to_cpu(escan_result_le->bss_count) != 1) {
3663 			bphy_err(drvr, "Invalid bss_count %d: ignoring\n",
3664 				 escan_result_le->bss_count);
3665 			goto exit;
3666 		}
3667 		bss_info_le = &escan_result_le->bss_info_le;
3668 
3669 		if (brcmf_p2p_scan_finding_common_channel(cfg, bss_info_le))
3670 			goto exit;
3671 
3672 		if (!cfg->int_escan_map && !cfg->scan_request) {
3673 			brcmf_dbg(SCAN, "result without cfg80211 request\n");
3674 			goto exit;
3675 		}
3676 
3677 		bi_length = le32_to_cpu(bss_info_le->length);
3678 		if (bi_length != escan_buflen -	WL_ESCAN_RESULTS_FIXED_SIZE) {
3679 			bphy_err(drvr, "Ignoring invalid bss_info length: %d\n",
3680 				 bi_length);
3681 			goto exit;
3682 		}
3683 
3684 		if (!(cfg_to_wiphy(cfg)->interface_modes &
3685 					BIT(NL80211_IFTYPE_ADHOC))) {
3686 			if (le16_to_cpu(bss_info_le->capability) &
3687 						WLAN_CAPABILITY_IBSS) {
3688 				bphy_err(drvr, "Ignoring IBSS result\n");
3689 				goto exit;
3690 			}
3691 		}
3692 
3693 		list = (struct brcmf_scan_results *)
3694 				cfg->escan_info.escan_buf;
3695 		if (bi_length > BRCMF_ESCAN_BUF_SIZE - list->buflen) {
3696 			bphy_err(drvr, "Buffer is too small: ignoring\n");
3697 			goto exit;
3698 		}
3699 
3700 		for (i = 0; i < list->count; i++) {
3701 			bss = bss ? (struct brcmf_bss_info_le *)
3702 				((unsigned char *)bss +
3703 				le32_to_cpu(bss->length)) : list->bss_info_le;
3704 			if (brcmf_compare_update_same_bss(cfg, bss,
3705 							  bss_info_le))
3706 				goto exit;
3707 		}
3708 		memcpy(&cfg->escan_info.escan_buf[list->buflen], bss_info_le,
3709 		       bi_length);
3710 		list->version = le32_to_cpu(bss_info_le->version);
3711 		list->buflen += bi_length;
3712 		list->count++;
3713 	} else {
3714 		cfg->escan_info.escan_state = WL_ESCAN_STATE_IDLE;
3715 		if (brcmf_p2p_scan_finding_common_channel(cfg, NULL))
3716 			goto exit;
3717 		if (cfg->int_escan_map || cfg->scan_request) {
3718 			brcmf_inform_bss(cfg);
3719 			aborted = status != BRCMF_E_STATUS_SUCCESS;
3720 			brcmf_notify_escan_complete(cfg, ifp, aborted, false);
3721 		} else
3722 			brcmf_dbg(SCAN, "Ignored scan complete result 0x%x\n",
3723 				  status);
3724 	}
3725 exit:
3726 	return 0;
3727 }
3728 
3729 static void brcmf_init_escan(struct brcmf_cfg80211_info *cfg)
3730 {
3731 	brcmf_fweh_register(cfg->pub, BRCMF_E_ESCAN_RESULT,
3732 			    brcmf_cfg80211_escan_handler);
3733 	cfg->escan_info.escan_state = WL_ESCAN_STATE_IDLE;
3734 	/* Init scan_timeout timer */
3735 	timer_setup(&cfg->escan_timeout, brcmf_escan_timeout, 0);
3736 	INIT_WORK(&cfg->escan_timeout_work,
3737 		  brcmf_cfg80211_escan_timeout_worker);
3738 }
3739 
3740 static struct cfg80211_scan_request *
3741 brcmf_alloc_internal_escan_request(struct wiphy *wiphy, u32 n_netinfo) {
3742 	struct cfg80211_scan_request *req;
3743 	size_t req_size;
3744 
3745 	req_size = sizeof(*req) +
3746 		   n_netinfo * sizeof(req->channels[0]) +
3747 		   n_netinfo * sizeof(*req->ssids);
3748 
3749 	req = kzalloc(req_size, GFP_KERNEL);
3750 	if (req) {
3751 		req->wiphy = wiphy;
3752 		req->ssids = (void *)(&req->channels[0]) +
3753 			     n_netinfo * sizeof(req->channels[0]);
3754 	}
3755 	return req;
3756 }
3757 
3758 static int brcmf_internal_escan_add_info(struct cfg80211_scan_request *req,
3759 					 u8 *ssid, u8 ssid_len, u8 channel)
3760 {
3761 	struct ieee80211_channel *chan;
3762 	enum nl80211_band band;
3763 	int freq, i;
3764 
3765 	if (channel <= CH_MAX_2G_CHANNEL)
3766 		band = NL80211_BAND_2GHZ;
3767 	else
3768 		band = NL80211_BAND_5GHZ;
3769 
3770 	freq = ieee80211_channel_to_frequency(channel, band);
3771 	if (!freq)
3772 		return -EINVAL;
3773 
3774 	chan = ieee80211_get_channel(req->wiphy, freq);
3775 	if (!chan)
3776 		return -EINVAL;
3777 
3778 	for (i = 0; i < req->n_channels; i++) {
3779 		if (req->channels[i] == chan)
3780 			break;
3781 	}
3782 	if (i == req->n_channels)
3783 		req->channels[req->n_channels++] = chan;
3784 
3785 	for (i = 0; i < req->n_ssids; i++) {
3786 		if (req->ssids[i].ssid_len == ssid_len &&
3787 		    !memcmp(req->ssids[i].ssid, ssid, ssid_len))
3788 			break;
3789 	}
3790 	if (i == req->n_ssids) {
3791 		memcpy(req->ssids[req->n_ssids].ssid, ssid, ssid_len);
3792 		req->ssids[req->n_ssids++].ssid_len = ssid_len;
3793 	}
3794 	return 0;
3795 }
3796 
3797 static int brcmf_start_internal_escan(struct brcmf_if *ifp, u32 fwmap,
3798 				      struct cfg80211_scan_request *request)
3799 {
3800 	struct brcmf_cfg80211_info *cfg = ifp->drvr->config;
3801 	int err;
3802 
3803 	if (test_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status)) {
3804 		if (cfg->int_escan_map)
3805 			brcmf_dbg(SCAN, "aborting internal scan: map=%u\n",
3806 				  cfg->int_escan_map);
3807 		/* Abort any on-going scan */
3808 		brcmf_abort_scanning(cfg);
3809 	}
3810 
3811 	brcmf_dbg(SCAN, "start internal scan: map=%u\n", fwmap);
3812 	set_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status);
3813 	cfg->escan_info.run = brcmf_run_escan;
3814 	err = brcmf_do_escan(ifp, request);
3815 	if (err) {
3816 		clear_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status);
3817 		return err;
3818 	}
3819 	cfg->int_escan_map = fwmap;
3820 	return 0;
3821 }
3822 
3823 static struct brcmf_pno_net_info_le *
3824 brcmf_get_netinfo_array(struct brcmf_pno_scanresults_le *pfn_v1)
3825 {
3826 	struct brcmf_pno_scanresults_v2_le *pfn_v2;
3827 	struct brcmf_pno_net_info_le *netinfo;
3828 
3829 	switch (pfn_v1->version) {
3830 	default:
3831 		WARN_ON(1);
3832 		fallthrough;
3833 	case cpu_to_le32(1):
3834 		netinfo = (struct brcmf_pno_net_info_le *)(pfn_v1 + 1);
3835 		break;
3836 	case cpu_to_le32(2):
3837 		pfn_v2 = (struct brcmf_pno_scanresults_v2_le *)pfn_v1;
3838 		netinfo = (struct brcmf_pno_net_info_le *)(pfn_v2 + 1);
3839 		break;
3840 	}
3841 
3842 	return netinfo;
3843 }
3844 
3845 /* PFN result doesn't have all the info which are required by the supplicant
3846  * (For e.g IEs) Do a target Escan so that sched scan results are reported
3847  * via wl_inform_single_bss in the required format. Escan does require the
3848  * scan request in the form of cfg80211_scan_request. For timebeing, create
3849  * cfg80211_scan_request one out of the received PNO event.
3850  */
3851 static s32
3852 brcmf_notify_sched_scan_results(struct brcmf_if *ifp,
3853 				const struct brcmf_event_msg *e, void *data)
3854 {
3855 	struct brcmf_pub *drvr = ifp->drvr;
3856 	struct brcmf_cfg80211_info *cfg = drvr->config;
3857 	struct brcmf_pno_net_info_le *netinfo, *netinfo_start;
3858 	struct cfg80211_scan_request *request = NULL;
3859 	struct wiphy *wiphy = cfg_to_wiphy(cfg);
3860 	int i, err = 0;
3861 	struct brcmf_pno_scanresults_le *pfn_result;
3862 	u32 bucket_map;
3863 	u32 result_count;
3864 	u32 status;
3865 	u32 datalen;
3866 
3867 	brcmf_dbg(SCAN, "Enter\n");
3868 
3869 	if (e->datalen < (sizeof(*pfn_result) + sizeof(*netinfo))) {
3870 		brcmf_dbg(SCAN, "Event data to small. Ignore\n");
3871 		return 0;
3872 	}
3873 
3874 	if (e->event_code == BRCMF_E_PFN_NET_LOST) {
3875 		brcmf_dbg(SCAN, "PFN NET LOST event. Do Nothing\n");
3876 		return 0;
3877 	}
3878 
3879 	pfn_result = (struct brcmf_pno_scanresults_le *)data;
3880 	result_count = le32_to_cpu(pfn_result->count);
3881 	status = le32_to_cpu(pfn_result->status);
3882 
3883 	/* PFN event is limited to fit 512 bytes so we may get
3884 	 * multiple NET_FOUND events. For now place a warning here.
3885 	 */
3886 	WARN_ON(status != BRCMF_PNO_SCAN_COMPLETE);
3887 	brcmf_dbg(SCAN, "PFN NET FOUND event. count: %d\n", result_count);
3888 	if (!result_count) {
3889 		bphy_err(drvr, "FALSE PNO Event. (pfn_count == 0)\n");
3890 		goto out_err;
3891 	}
3892 
3893 	netinfo_start = brcmf_get_netinfo_array(pfn_result);
3894 	datalen = e->datalen - ((void *)netinfo_start - (void *)pfn_result);
3895 	if (datalen < result_count * sizeof(*netinfo)) {
3896 		bphy_err(drvr, "insufficient event data\n");
3897 		goto out_err;
3898 	}
3899 
3900 	request = brcmf_alloc_internal_escan_request(wiphy,
3901 						     result_count);
3902 	if (!request) {
3903 		err = -ENOMEM;
3904 		goto out_err;
3905 	}
3906 
3907 	bucket_map = 0;
3908 	for (i = 0; i < result_count; i++) {
3909 		netinfo = &netinfo_start[i];
3910 
3911 		if (netinfo->SSID_len > IEEE80211_MAX_SSID_LEN)
3912 			netinfo->SSID_len = IEEE80211_MAX_SSID_LEN;
3913 		brcmf_dbg(SCAN, "SSID:%.32s Channel:%d\n",
3914 			  netinfo->SSID, netinfo->channel);
3915 		bucket_map |= brcmf_pno_get_bucket_map(cfg->pno, netinfo);
3916 		err = brcmf_internal_escan_add_info(request,
3917 						    netinfo->SSID,
3918 						    netinfo->SSID_len,
3919 						    netinfo->channel);
3920 		if (err)
3921 			goto out_err;
3922 	}
3923 
3924 	if (!bucket_map)
3925 		goto free_req;
3926 
3927 	err = brcmf_start_internal_escan(ifp, bucket_map, request);
3928 	if (!err)
3929 		goto free_req;
3930 
3931 out_err:
3932 	cfg80211_sched_scan_stopped(wiphy, 0);
3933 free_req:
3934 	kfree(request);
3935 	return err;
3936 }
3937 
3938 static int
3939 brcmf_cfg80211_sched_scan_start(struct wiphy *wiphy,
3940 				struct net_device *ndev,
3941 				struct cfg80211_sched_scan_request *req)
3942 {
3943 	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
3944 	struct brcmf_if *ifp = netdev_priv(ndev);
3945 	struct brcmf_pub *drvr = cfg->pub;
3946 
3947 	brcmf_dbg(SCAN, "Enter: n_match_sets=%d n_ssids=%d\n",
3948 		  req->n_match_sets, req->n_ssids);
3949 
3950 	if (test_bit(BRCMF_SCAN_STATUS_SUPPRESS, &cfg->scan_status)) {
3951 		bphy_err(drvr, "Scanning suppressed: status=%lu\n",
3952 			 cfg->scan_status);
3953 		return -EAGAIN;
3954 	}
3955 
3956 	if (req->n_match_sets <= 0) {
3957 		brcmf_dbg(SCAN, "invalid number of matchsets specified: %d\n",
3958 			  req->n_match_sets);
3959 		return -EINVAL;
3960 	}
3961 
3962 	return brcmf_pno_start_sched_scan(ifp, req);
3963 }
3964 
3965 static int brcmf_cfg80211_sched_scan_stop(struct wiphy *wiphy,
3966 					  struct net_device *ndev, u64 reqid)
3967 {
3968 	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
3969 	struct brcmf_if *ifp = netdev_priv(ndev);
3970 
3971 	brcmf_dbg(SCAN, "enter\n");
3972 	brcmf_pno_stop_sched_scan(ifp, reqid);
3973 	if (cfg->int_escan_map)
3974 		brcmf_notify_escan_complete(cfg, ifp, true, true);
3975 	return 0;
3976 }
3977 
3978 static __always_inline void brcmf_delay(u32 ms)
3979 {
3980 	if (ms < 1000 / HZ) {
3981 		cond_resched();
3982 		mdelay(ms);
3983 	} else {
3984 		msleep(ms);
3985 	}
3986 }
3987 
3988 static s32 brcmf_config_wowl_pattern(struct brcmf_if *ifp, u8 cmd[4],
3989 				     u8 *pattern, u32 patternsize, u8 *mask,
3990 				     u32 packet_offset)
3991 {
3992 	struct brcmf_fil_wowl_pattern_le *filter;
3993 	u32 masksize;
3994 	u32 patternoffset;
3995 	u8 *buf;
3996 	u32 bufsize;
3997 	s32 ret;
3998 
3999 	masksize = (patternsize + 7) / 8;
4000 	patternoffset = sizeof(*filter) - sizeof(filter->cmd) + masksize;
4001 
4002 	bufsize = sizeof(*filter) + patternsize + masksize;
4003 	buf = kzalloc(bufsize, GFP_KERNEL);
4004 	if (!buf)
4005 		return -ENOMEM;
4006 	filter = (struct brcmf_fil_wowl_pattern_le *)buf;
4007 
4008 	memcpy(filter->cmd, cmd, 4);
4009 	filter->masksize = cpu_to_le32(masksize);
4010 	filter->offset = cpu_to_le32(packet_offset);
4011 	filter->patternoffset = cpu_to_le32(patternoffset);
4012 	filter->patternsize = cpu_to_le32(patternsize);
4013 	filter->type = cpu_to_le32(BRCMF_WOWL_PATTERN_TYPE_BITMAP);
4014 
4015 	if ((mask) && (masksize))
4016 		memcpy(buf + sizeof(*filter), mask, masksize);
4017 	if ((pattern) && (patternsize))
4018 		memcpy(buf + sizeof(*filter) + masksize, pattern, patternsize);
4019 
4020 	ret = brcmf_fil_iovar_data_set(ifp, "wowl_pattern", buf, bufsize);
4021 
4022 	kfree(buf);
4023 	return ret;
4024 }
4025 
4026 static s32
4027 brcmf_wowl_nd_results(struct brcmf_if *ifp, const struct brcmf_event_msg *e,
4028 		      void *data)
4029 {
4030 	struct brcmf_pub *drvr = ifp->drvr;
4031 	struct brcmf_cfg80211_info *cfg = drvr->config;
4032 	struct brcmf_pno_scanresults_le *pfn_result;
4033 	struct brcmf_pno_net_info_le *netinfo;
4034 
4035 	brcmf_dbg(SCAN, "Enter\n");
4036 
4037 	if (e->datalen < (sizeof(*pfn_result) + sizeof(*netinfo))) {
4038 		brcmf_dbg(SCAN, "Event data to small. Ignore\n");
4039 		return 0;
4040 	}
4041 
4042 	pfn_result = (struct brcmf_pno_scanresults_le *)data;
4043 
4044 	if (e->event_code == BRCMF_E_PFN_NET_LOST) {
4045 		brcmf_dbg(SCAN, "PFN NET LOST event. Ignore\n");
4046 		return 0;
4047 	}
4048 
4049 	if (le32_to_cpu(pfn_result->count) < 1) {
4050 		bphy_err(drvr, "Invalid result count, expected 1 (%d)\n",
4051 			 le32_to_cpu(pfn_result->count));
4052 		return -EINVAL;
4053 	}
4054 
4055 	netinfo = brcmf_get_netinfo_array(pfn_result);
4056 	if (netinfo->SSID_len > IEEE80211_MAX_SSID_LEN)
4057 		netinfo->SSID_len = IEEE80211_MAX_SSID_LEN;
4058 	memcpy(cfg->wowl.nd->ssid.ssid, netinfo->SSID, netinfo->SSID_len);
4059 	cfg->wowl.nd->ssid.ssid_len = netinfo->SSID_len;
4060 	cfg->wowl.nd->n_channels = 1;
4061 	cfg->wowl.nd->channels[0] =
4062 		ieee80211_channel_to_frequency(netinfo->channel,
4063 			netinfo->channel <= CH_MAX_2G_CHANNEL ?
4064 					NL80211_BAND_2GHZ : NL80211_BAND_5GHZ);
4065 	cfg->wowl.nd_info->n_matches = 1;
4066 	cfg->wowl.nd_info->matches[0] = cfg->wowl.nd;
4067 
4068 	/* Inform (the resume task) that the net detect information was recvd */
4069 	cfg->wowl.nd_data_completed = true;
4070 	wake_up(&cfg->wowl.nd_data_wait);
4071 
4072 	return 0;
4073 }
4074 
4075 #ifdef CONFIG_PM
4076 
4077 static void brcmf_report_wowl_wakeind(struct wiphy *wiphy, struct brcmf_if *ifp)
4078 {
4079 	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
4080 	struct brcmf_pub *drvr = cfg->pub;
4081 	struct brcmf_wowl_wakeind_le wake_ind_le;
4082 	struct cfg80211_wowlan_wakeup wakeup_data;
4083 	struct cfg80211_wowlan_wakeup *wakeup;
4084 	u32 wakeind;
4085 	s32 err;
4086 	int timeout;
4087 
4088 	err = brcmf_fil_iovar_data_get(ifp, "wowl_wakeind", &wake_ind_le,
4089 				       sizeof(wake_ind_le));
4090 	if (err) {
4091 		bphy_err(drvr, "Get wowl_wakeind failed, err = %d\n", err);
4092 		return;
4093 	}
4094 
4095 	wakeind = le32_to_cpu(wake_ind_le.ucode_wakeind);
4096 	if (wakeind & (BRCMF_WOWL_MAGIC | BRCMF_WOWL_DIS | BRCMF_WOWL_BCN |
4097 		       BRCMF_WOWL_RETR | BRCMF_WOWL_NET |
4098 		       BRCMF_WOWL_PFN_FOUND)) {
4099 		wakeup = &wakeup_data;
4100 		memset(&wakeup_data, 0, sizeof(wakeup_data));
4101 		wakeup_data.pattern_idx = -1;
4102 
4103 		if (wakeind & BRCMF_WOWL_MAGIC) {
4104 			brcmf_dbg(INFO, "WOWL Wake indicator: BRCMF_WOWL_MAGIC\n");
4105 			wakeup_data.magic_pkt = true;
4106 		}
4107 		if (wakeind & BRCMF_WOWL_DIS) {
4108 			brcmf_dbg(INFO, "WOWL Wake indicator: BRCMF_WOWL_DIS\n");
4109 			wakeup_data.disconnect = true;
4110 		}
4111 		if (wakeind & BRCMF_WOWL_BCN) {
4112 			brcmf_dbg(INFO, "WOWL Wake indicator: BRCMF_WOWL_BCN\n");
4113 			wakeup_data.disconnect = true;
4114 		}
4115 		if (wakeind & BRCMF_WOWL_RETR) {
4116 			brcmf_dbg(INFO, "WOWL Wake indicator: BRCMF_WOWL_RETR\n");
4117 			wakeup_data.disconnect = true;
4118 		}
4119 		if (wakeind & BRCMF_WOWL_NET) {
4120 			brcmf_dbg(INFO, "WOWL Wake indicator: BRCMF_WOWL_NET\n");
4121 			/* For now always map to pattern 0, no API to get
4122 			 * correct information available at the moment.
4123 			 */
4124 			wakeup_data.pattern_idx = 0;
4125 		}
4126 		if (wakeind & BRCMF_WOWL_PFN_FOUND) {
4127 			brcmf_dbg(INFO, "WOWL Wake indicator: BRCMF_WOWL_PFN_FOUND\n");
4128 			timeout = wait_event_timeout(cfg->wowl.nd_data_wait,
4129 				cfg->wowl.nd_data_completed,
4130 				BRCMF_ND_INFO_TIMEOUT);
4131 			if (!timeout)
4132 				bphy_err(drvr, "No result for wowl net detect\n");
4133 			else
4134 				wakeup_data.net_detect = cfg->wowl.nd_info;
4135 		}
4136 		if (wakeind & BRCMF_WOWL_GTK_FAILURE) {
4137 			brcmf_dbg(INFO, "WOWL Wake indicator: BRCMF_WOWL_GTK_FAILURE\n");
4138 			wakeup_data.gtk_rekey_failure = true;
4139 		}
4140 	} else {
4141 		wakeup = NULL;
4142 	}
4143 	cfg80211_report_wowlan_wakeup(&ifp->vif->wdev, wakeup, GFP_KERNEL);
4144 }
4145 
4146 #else
4147 
4148 static void brcmf_report_wowl_wakeind(struct wiphy *wiphy, struct brcmf_if *ifp)
4149 {
4150 }
4151 
4152 #endif /* CONFIG_PM */
4153 
4154 static s32 brcmf_cfg80211_resume(struct wiphy *wiphy)
4155 {
4156 	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
4157 	struct net_device *ndev = cfg_to_ndev(cfg);
4158 	struct brcmf_if *ifp = netdev_priv(ndev);
4159 
4160 	brcmf_dbg(TRACE, "Enter\n");
4161 
4162 	if (cfg->wowl.active) {
4163 		brcmf_report_wowl_wakeind(wiphy, ifp);
4164 		brcmf_fil_iovar_int_set(ifp, "wowl_clear", 0);
4165 		brcmf_config_wowl_pattern(ifp, "clr", NULL, 0, NULL, 0);
4166 		if (!brcmf_feat_is_enabled(ifp, BRCMF_FEAT_WOWL_ARP_ND))
4167 			brcmf_configure_arp_nd_offload(ifp, true);
4168 		brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_PM,
4169 				      cfg->wowl.pre_pmmode);
4170 		cfg->wowl.active = false;
4171 		if (cfg->wowl.nd_enabled) {
4172 			brcmf_cfg80211_sched_scan_stop(cfg->wiphy, ifp->ndev, 0);
4173 			brcmf_fweh_unregister(cfg->pub, BRCMF_E_PFN_NET_FOUND);
4174 			brcmf_fweh_register(cfg->pub, BRCMF_E_PFN_NET_FOUND,
4175 					    brcmf_notify_sched_scan_results);
4176 			cfg->wowl.nd_enabled = false;
4177 		}
4178 	}
4179 	return 0;
4180 }
4181 
4182 static void brcmf_configure_wowl(struct brcmf_cfg80211_info *cfg,
4183 				 struct brcmf_if *ifp,
4184 				 struct cfg80211_wowlan *wowl)
4185 {
4186 	u32 wowl_config;
4187 	struct brcmf_wowl_wakeind_le wowl_wakeind;
4188 	u32 i;
4189 
4190 	brcmf_dbg(TRACE, "Suspend, wowl config.\n");
4191 
4192 	if (!brcmf_feat_is_enabled(ifp, BRCMF_FEAT_WOWL_ARP_ND))
4193 		brcmf_configure_arp_nd_offload(ifp, false);
4194 	brcmf_fil_cmd_int_get(ifp, BRCMF_C_GET_PM, &cfg->wowl.pre_pmmode);
4195 	brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_PM, PM_MAX);
4196 
4197 	wowl_config = 0;
4198 	if (wowl->disconnect)
4199 		wowl_config = BRCMF_WOWL_DIS | BRCMF_WOWL_BCN | BRCMF_WOWL_RETR;
4200 	if (wowl->magic_pkt)
4201 		wowl_config |= BRCMF_WOWL_MAGIC;
4202 	if ((wowl->patterns) && (wowl->n_patterns)) {
4203 		wowl_config |= BRCMF_WOWL_NET;
4204 		for (i = 0; i < wowl->n_patterns; i++) {
4205 			brcmf_config_wowl_pattern(ifp, "add",
4206 				(u8 *)wowl->patterns[i].pattern,
4207 				wowl->patterns[i].pattern_len,
4208 				(u8 *)wowl->patterns[i].mask,
4209 				wowl->patterns[i].pkt_offset);
4210 		}
4211 	}
4212 	if (wowl->nd_config) {
4213 		brcmf_cfg80211_sched_scan_start(cfg->wiphy, ifp->ndev,
4214 						wowl->nd_config);
4215 		wowl_config |= BRCMF_WOWL_PFN_FOUND;
4216 
4217 		cfg->wowl.nd_data_completed = false;
4218 		cfg->wowl.nd_enabled = true;
4219 		/* Now reroute the event for PFN to the wowl function. */
4220 		brcmf_fweh_unregister(cfg->pub, BRCMF_E_PFN_NET_FOUND);
4221 		brcmf_fweh_register(cfg->pub, BRCMF_E_PFN_NET_FOUND,
4222 				    brcmf_wowl_nd_results);
4223 	}
4224 	if (wowl->gtk_rekey_failure)
4225 		wowl_config |= BRCMF_WOWL_GTK_FAILURE;
4226 	if (!test_bit(BRCMF_VIF_STATUS_CONNECTED, &ifp->vif->sme_state))
4227 		wowl_config |= BRCMF_WOWL_UNASSOC;
4228 
4229 	memcpy(&wowl_wakeind, "clear", 6);
4230 	brcmf_fil_iovar_data_set(ifp, "wowl_wakeind", &wowl_wakeind,
4231 				 sizeof(wowl_wakeind));
4232 	brcmf_fil_iovar_int_set(ifp, "wowl", wowl_config);
4233 	brcmf_fil_iovar_int_set(ifp, "wowl_activate", 1);
4234 	brcmf_bus_wowl_config(cfg->pub->bus_if, true);
4235 	cfg->wowl.active = true;
4236 }
4237 
4238 static int brcmf_keepalive_start(struct brcmf_if *ifp, unsigned int interval)
4239 {
4240 	struct brcmf_mkeep_alive_pkt_le kalive = {0};
4241 	int ret = 0;
4242 
4243 	/* Configure Null function/data keepalive */
4244 	kalive.version = cpu_to_le16(1);
4245 	kalive.period_msec = cpu_to_le32(interval * MSEC_PER_SEC);
4246 	kalive.len_bytes = cpu_to_le16(0);
4247 	kalive.keep_alive_id = 0;
4248 
4249 	ret = brcmf_fil_iovar_data_set(ifp, "mkeep_alive", &kalive, sizeof(kalive));
4250 	if (ret)
4251 		brcmf_err("keep-alive packet config failed, ret=%d\n", ret);
4252 
4253 	return ret;
4254 }
4255 
4256 static s32 brcmf_cfg80211_suspend(struct wiphy *wiphy,
4257 				  struct cfg80211_wowlan *wowl)
4258 {
4259 	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
4260 	struct net_device *ndev = cfg_to_ndev(cfg);
4261 	struct brcmf_if *ifp = netdev_priv(ndev);
4262 	struct brcmf_cfg80211_vif *vif;
4263 
4264 	brcmf_dbg(TRACE, "Enter\n");
4265 
4266 	/* if the primary net_device is not READY there is nothing
4267 	 * we can do but pray resume goes smoothly.
4268 	 */
4269 	if (!check_vif_up(ifp->vif))
4270 		goto exit;
4271 
4272 	/* Stop scheduled scan */
4273 	if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_PNO))
4274 		brcmf_cfg80211_sched_scan_stop(wiphy, ndev, 0);
4275 
4276 	/* end any scanning */
4277 	if (test_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status))
4278 		brcmf_abort_scanning(cfg);
4279 
4280 	if (wowl == NULL) {
4281 		brcmf_bus_wowl_config(cfg->pub->bus_if, false);
4282 		list_for_each_entry(vif, &cfg->vif_list, list) {
4283 			if (!test_bit(BRCMF_VIF_STATUS_READY, &vif->sme_state))
4284 				continue;
4285 			/* While going to suspend if associated with AP
4286 			 * disassociate from AP to save power while system is
4287 			 * in suspended state
4288 			 */
4289 			brcmf_link_down(vif, WLAN_REASON_UNSPECIFIED, true);
4290 			/* Make sure WPA_Supplicant receives all the event
4291 			 * generated due to DISASSOC call to the fw to keep
4292 			 * the state fw and WPA_Supplicant state consistent
4293 			 */
4294 			brcmf_delay(500);
4295 		}
4296 		/* Configure MPC */
4297 		brcmf_set_mpc(ifp, 1);
4298 
4299 	} else {
4300 		/* Configure WOWL paramaters */
4301 		brcmf_configure_wowl(cfg, ifp, wowl);
4302 
4303 		/* Prevent disassociation due to inactivity with keep-alive */
4304 		brcmf_keepalive_start(ifp, 30);
4305 	}
4306 
4307 exit:
4308 	brcmf_dbg(TRACE, "Exit\n");
4309 	/* clear any scanning activity */
4310 	cfg->scan_status = 0;
4311 	return 0;
4312 }
4313 
4314 static s32
4315 brcmf_pmksa_v3_op(struct brcmf_if *ifp, struct cfg80211_pmksa *pmksa,
4316 		  bool alive)
4317 {
4318 	struct brcmf_pmk_op_v3_le *pmk_op;
4319 	int length = offsetof(struct brcmf_pmk_op_v3_le, pmk);
4320 	int ret;
4321 
4322 	pmk_op = kzalloc(sizeof(*pmk_op), GFP_KERNEL);
4323 	pmk_op->version = cpu_to_le16(BRCMF_PMKSA_VER_3);
4324 
4325 	if (!pmksa) {
4326 		/* Flush operation, operate on entire list */
4327 		pmk_op->count = cpu_to_le16(0);
4328 	} else {
4329 		/* Single PMK operation */
4330 		pmk_op->count = cpu_to_le16(1);
4331 		length += sizeof(struct brcmf_pmksa_v3);
4332 		memcpy(pmk_op->pmk[0].bssid, pmksa->bssid, ETH_ALEN);
4333 		memcpy(pmk_op->pmk[0].pmkid, pmksa->pmkid, WLAN_PMKID_LEN);
4334 		pmk_op->pmk[0].pmkid_len = WLAN_PMKID_LEN;
4335 		pmk_op->pmk[0].time_left = cpu_to_le32(alive ? BRCMF_PMKSA_NO_EXPIRY : 0);
4336 	}
4337 
4338 	pmk_op->length = cpu_to_le16(length);
4339 
4340 	ret = brcmf_fil_iovar_data_set(ifp, "pmkid_info", pmk_op, sizeof(*pmk_op));
4341 	kfree(pmk_op);
4342 	return ret;
4343 }
4344 
4345 static __used s32
4346 brcmf_update_pmklist(struct brcmf_cfg80211_info *cfg, struct brcmf_if *ifp)
4347 {
4348 	struct brcmf_pmk_list_le *pmk_list;
4349 	int i;
4350 	u32 npmk;
4351 
4352 	pmk_list = &cfg->pmk_list;
4353 	npmk = le32_to_cpu(pmk_list->npmk);
4354 
4355 	brcmf_dbg(CONN, "No of elements %d\n", npmk);
4356 	for (i = 0; i < npmk; i++)
4357 		brcmf_dbg(CONN, "PMK[%d]: %pM\n", i, &pmk_list->pmk[i].bssid);
4358 
4359 	return brcmf_fil_iovar_data_set(ifp, "pmkid_info", pmk_list,
4360 			sizeof(*pmk_list));
4361 }
4362 
4363 static s32
4364 brcmf_cfg80211_set_pmksa(struct wiphy *wiphy, struct net_device *ndev,
4365 			 struct cfg80211_pmksa *pmksa)
4366 {
4367 	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
4368 	struct brcmf_if *ifp = netdev_priv(ndev);
4369 	struct brcmf_pmksa *pmk = &cfg->pmk_list.pmk[0];
4370 	struct brcmf_pub *drvr = cfg->pub;
4371 	s32 err;
4372 	u32 npmk, i;
4373 
4374 	brcmf_dbg(TRACE, "Enter\n");
4375 	if (!check_vif_up(ifp->vif))
4376 		return -EIO;
4377 
4378 	brcmf_dbg(CONN, "set_pmksa - PMK bssid: %pM =\n", pmksa->bssid);
4379 	brcmf_dbg(CONN, "%*ph\n", WLAN_PMKID_LEN, pmksa->pmkid);
4380 
4381 	if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_PMKID_V3))
4382 		return brcmf_pmksa_v3_op(ifp, pmksa, true);
4383 
4384 	/* TODO: implement PMKID_V2 */
4385 
4386 	npmk = le32_to_cpu(cfg->pmk_list.npmk);
4387 	for (i = 0; i < npmk; i++)
4388 		if (!memcmp(pmksa->bssid, pmk[i].bssid, ETH_ALEN))
4389 			break;
4390 	if (i < BRCMF_MAXPMKID) {
4391 		memcpy(pmk[i].bssid, pmksa->bssid, ETH_ALEN);
4392 		memcpy(pmk[i].pmkid, pmksa->pmkid, WLAN_PMKID_LEN);
4393 		if (i == npmk) {
4394 			npmk++;
4395 			cfg->pmk_list.npmk = cpu_to_le32(npmk);
4396 		}
4397 	} else {
4398 		bphy_err(drvr, "Too many PMKSA entries cached %d\n", npmk);
4399 		return -EINVAL;
4400 	}
4401 
4402 	err = brcmf_update_pmklist(cfg, ifp);
4403 
4404 	brcmf_dbg(TRACE, "Exit\n");
4405 	return err;
4406 }
4407 
4408 static s32
4409 brcmf_cfg80211_del_pmksa(struct wiphy *wiphy, struct net_device *ndev,
4410 			 struct cfg80211_pmksa *pmksa)
4411 {
4412 	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
4413 	struct brcmf_if *ifp = netdev_priv(ndev);
4414 	struct brcmf_pmksa *pmk = &cfg->pmk_list.pmk[0];
4415 	struct brcmf_pub *drvr = cfg->pub;
4416 	s32 err;
4417 	u32 npmk, i;
4418 
4419 	brcmf_dbg(TRACE, "Enter\n");
4420 	if (!check_vif_up(ifp->vif))
4421 		return -EIO;
4422 
4423 	brcmf_dbg(CONN, "del_pmksa - PMK bssid = %pM\n", pmksa->bssid);
4424 
4425 	if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_PMKID_V3))
4426 		return brcmf_pmksa_v3_op(ifp, pmksa, false);
4427 
4428 	/* TODO: implement PMKID_V2 */
4429 
4430 	npmk = le32_to_cpu(cfg->pmk_list.npmk);
4431 	for (i = 0; i < npmk; i++)
4432 		if (!memcmp(pmksa->bssid, pmk[i].bssid, ETH_ALEN))
4433 			break;
4434 
4435 	if ((npmk > 0) && (i < npmk)) {
4436 		for (; i < (npmk - 1); i++) {
4437 			memcpy(&pmk[i].bssid, &pmk[i + 1].bssid, ETH_ALEN);
4438 			memcpy(&pmk[i].pmkid, &pmk[i + 1].pmkid,
4439 			       WLAN_PMKID_LEN);
4440 		}
4441 		memset(&pmk[i], 0, sizeof(*pmk));
4442 		cfg->pmk_list.npmk = cpu_to_le32(npmk - 1);
4443 	} else {
4444 		bphy_err(drvr, "Cache entry not found\n");
4445 		return -EINVAL;
4446 	}
4447 
4448 	err = brcmf_update_pmklist(cfg, ifp);
4449 
4450 	brcmf_dbg(TRACE, "Exit\n");
4451 	return err;
4452 
4453 }
4454 
4455 static s32
4456 brcmf_cfg80211_flush_pmksa(struct wiphy *wiphy, struct net_device *ndev)
4457 {
4458 	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
4459 	struct brcmf_if *ifp = netdev_priv(ndev);
4460 	s32 err;
4461 
4462 	brcmf_dbg(TRACE, "Enter\n");
4463 	if (!check_vif_up(ifp->vif))
4464 		return -EIO;
4465 
4466 	if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_PMKID_V3))
4467 		return brcmf_pmksa_v3_op(ifp, NULL, false);
4468 
4469 	/* TODO: implement PMKID_V2 */
4470 
4471 	memset(&cfg->pmk_list, 0, sizeof(cfg->pmk_list));
4472 	err = brcmf_update_pmklist(cfg, ifp);
4473 
4474 	brcmf_dbg(TRACE, "Exit\n");
4475 	return err;
4476 
4477 }
4478 
4479 static s32 brcmf_configure_opensecurity(struct brcmf_if *ifp)
4480 {
4481 	struct brcmf_pub *drvr = ifp->drvr;
4482 	s32 err;
4483 	s32 wpa_val;
4484 
4485 	/* set auth */
4486 	err = brcmf_fil_bsscfg_int_set(ifp, "auth", 0);
4487 	if (err < 0) {
4488 		bphy_err(drvr, "auth error %d\n", err);
4489 		return err;
4490 	}
4491 	/* set wsec */
4492 	err = brcmf_fil_bsscfg_int_set(ifp, "wsec", 0);
4493 	if (err < 0) {
4494 		bphy_err(drvr, "wsec error %d\n", err);
4495 		return err;
4496 	}
4497 	/* set upper-layer auth */
4498 	if (brcmf_is_ibssmode(ifp->vif))
4499 		wpa_val = WPA_AUTH_NONE;
4500 	else
4501 		wpa_val = WPA_AUTH_DISABLED;
4502 	err = brcmf_fil_bsscfg_int_set(ifp, "wpa_auth", wpa_val);
4503 	if (err < 0) {
4504 		bphy_err(drvr, "wpa_auth error %d\n", err);
4505 		return err;
4506 	}
4507 
4508 	return 0;
4509 }
4510 
4511 static bool brcmf_valid_wpa_oui(u8 *oui, bool is_rsn_ie)
4512 {
4513 	if (is_rsn_ie)
4514 		return (memcmp(oui, RSN_OUI, TLV_OUI_LEN) == 0);
4515 
4516 	return (memcmp(oui, WPA_OUI, TLV_OUI_LEN) == 0);
4517 }
4518 
4519 static s32
4520 brcmf_configure_wpaie(struct brcmf_if *ifp,
4521 		      const struct brcmf_vs_tlv *wpa_ie,
4522 		      bool is_rsn_ie)
4523 {
4524 	struct brcmf_pub *drvr = ifp->drvr;
4525 	u32 auth = 0; /* d11 open authentication */
4526 	u16 count;
4527 	s32 err = 0;
4528 	s32 len;
4529 	u32 i;
4530 	u32 wsec;
4531 	u32 pval = 0;
4532 	u32 gval = 0;
4533 	u32 wpa_auth = 0;
4534 	u32 offset;
4535 	u8 *data;
4536 	u16 rsn_cap;
4537 	u32 wme_bss_disable;
4538 	u32 mfp;
4539 
4540 	brcmf_dbg(TRACE, "Enter\n");
4541 	if (wpa_ie == NULL)
4542 		goto exit;
4543 
4544 	len = wpa_ie->len + TLV_HDR_LEN;
4545 	data = (u8 *)wpa_ie;
4546 	offset = TLV_HDR_LEN;
4547 	if (!is_rsn_ie)
4548 		offset += VS_IE_FIXED_HDR_LEN;
4549 	else
4550 		offset += WPA_IE_VERSION_LEN;
4551 
4552 	/* check for multicast cipher suite */
4553 	if (offset + WPA_IE_MIN_OUI_LEN > len) {
4554 		err = -EINVAL;
4555 		bphy_err(drvr, "no multicast cipher suite\n");
4556 		goto exit;
4557 	}
4558 
4559 	if (!brcmf_valid_wpa_oui(&data[offset], is_rsn_ie)) {
4560 		err = -EINVAL;
4561 		bphy_err(drvr, "ivalid OUI\n");
4562 		goto exit;
4563 	}
4564 	offset += TLV_OUI_LEN;
4565 
4566 	/* pick up multicast cipher */
4567 	switch (data[offset]) {
4568 	case WPA_CIPHER_NONE:
4569 		gval = 0;
4570 		break;
4571 	case WPA_CIPHER_WEP_40:
4572 	case WPA_CIPHER_WEP_104:
4573 		gval = WEP_ENABLED;
4574 		break;
4575 	case WPA_CIPHER_TKIP:
4576 		gval = TKIP_ENABLED;
4577 		break;
4578 	case WPA_CIPHER_AES_CCM:
4579 		gval = AES_ENABLED;
4580 		break;
4581 	default:
4582 		err = -EINVAL;
4583 		bphy_err(drvr, "Invalid multi cast cipher info\n");
4584 		goto exit;
4585 	}
4586 
4587 	offset++;
4588 	/* walk thru unicast cipher list and pick up what we recognize */
4589 	count = data[offset] + (data[offset + 1] << 8);
4590 	offset += WPA_IE_SUITE_COUNT_LEN;
4591 	/* Check for unicast suite(s) */
4592 	if (offset + (WPA_IE_MIN_OUI_LEN * count) > len) {
4593 		err = -EINVAL;
4594 		bphy_err(drvr, "no unicast cipher suite\n");
4595 		goto exit;
4596 	}
4597 	for (i = 0; i < count; i++) {
4598 		if (!brcmf_valid_wpa_oui(&data[offset], is_rsn_ie)) {
4599 			err = -EINVAL;
4600 			bphy_err(drvr, "ivalid OUI\n");
4601 			goto exit;
4602 		}
4603 		offset += TLV_OUI_LEN;
4604 		switch (data[offset]) {
4605 		case WPA_CIPHER_NONE:
4606 			break;
4607 		case WPA_CIPHER_WEP_40:
4608 		case WPA_CIPHER_WEP_104:
4609 			pval |= WEP_ENABLED;
4610 			break;
4611 		case WPA_CIPHER_TKIP:
4612 			pval |= TKIP_ENABLED;
4613 			break;
4614 		case WPA_CIPHER_AES_CCM:
4615 			pval |= AES_ENABLED;
4616 			break;
4617 		default:
4618 			bphy_err(drvr, "Invalid unicast security info\n");
4619 		}
4620 		offset++;
4621 	}
4622 	/* walk thru auth management suite list and pick up what we recognize */
4623 	count = data[offset] + (data[offset + 1] << 8);
4624 	offset += WPA_IE_SUITE_COUNT_LEN;
4625 	/* Check for auth key management suite(s) */
4626 	if (offset + (WPA_IE_MIN_OUI_LEN * count) > len) {
4627 		err = -EINVAL;
4628 		bphy_err(drvr, "no auth key mgmt suite\n");
4629 		goto exit;
4630 	}
4631 	for (i = 0; i < count; i++) {
4632 		if (!brcmf_valid_wpa_oui(&data[offset], is_rsn_ie)) {
4633 			err = -EINVAL;
4634 			bphy_err(drvr, "ivalid OUI\n");
4635 			goto exit;
4636 		}
4637 		offset += TLV_OUI_LEN;
4638 		switch (data[offset]) {
4639 		case RSN_AKM_NONE:
4640 			brcmf_dbg(TRACE, "RSN_AKM_NONE\n");
4641 			wpa_auth |= WPA_AUTH_NONE;
4642 			break;
4643 		case RSN_AKM_UNSPECIFIED:
4644 			brcmf_dbg(TRACE, "RSN_AKM_UNSPECIFIED\n");
4645 			is_rsn_ie ? (wpa_auth |= WPA2_AUTH_UNSPECIFIED) :
4646 				    (wpa_auth |= WPA_AUTH_UNSPECIFIED);
4647 			break;
4648 		case RSN_AKM_PSK:
4649 			brcmf_dbg(TRACE, "RSN_AKM_PSK\n");
4650 			is_rsn_ie ? (wpa_auth |= WPA2_AUTH_PSK) :
4651 				    (wpa_auth |= WPA_AUTH_PSK);
4652 			break;
4653 		case RSN_AKM_SHA256_PSK:
4654 			brcmf_dbg(TRACE, "RSN_AKM_MFP_PSK\n");
4655 			wpa_auth |= WPA2_AUTH_PSK_SHA256;
4656 			break;
4657 		case RSN_AKM_SHA256_1X:
4658 			brcmf_dbg(TRACE, "RSN_AKM_MFP_1X\n");
4659 			wpa_auth |= WPA2_AUTH_1X_SHA256;
4660 			break;
4661 		case RSN_AKM_SAE:
4662 			brcmf_dbg(TRACE, "RSN_AKM_SAE\n");
4663 			wpa_auth |= WPA3_AUTH_SAE_PSK;
4664 			break;
4665 		default:
4666 			bphy_err(drvr, "Invalid key mgmt info\n");
4667 		}
4668 		offset++;
4669 	}
4670 
4671 	mfp = BRCMF_MFP_NONE;
4672 	if (is_rsn_ie) {
4673 		wme_bss_disable = 1;
4674 		if ((offset + RSN_CAP_LEN) <= len) {
4675 			rsn_cap = data[offset] + (data[offset + 1] << 8);
4676 			if (rsn_cap & RSN_CAP_PTK_REPLAY_CNTR_MASK)
4677 				wme_bss_disable = 0;
4678 			if (rsn_cap & RSN_CAP_MFPR_MASK) {
4679 				brcmf_dbg(TRACE, "MFP Required\n");
4680 				mfp = BRCMF_MFP_REQUIRED;
4681 				/* Firmware only supports mfp required in
4682 				 * combination with WPA2_AUTH_PSK_SHA256,
4683 				 * WPA2_AUTH_1X_SHA256, or WPA3_AUTH_SAE_PSK.
4684 				 */
4685 				if (!(wpa_auth & (WPA2_AUTH_PSK_SHA256 |
4686 						  WPA2_AUTH_1X_SHA256 |
4687 						  WPA3_AUTH_SAE_PSK))) {
4688 					err = -EINVAL;
4689 					goto exit;
4690 				}
4691 				/* Firmware has requirement that WPA2_AUTH_PSK/
4692 				 * WPA2_AUTH_UNSPECIFIED be set, if SHA256 OUI
4693 				 * is to be included in the rsn ie.
4694 				 */
4695 				if (wpa_auth & WPA2_AUTH_PSK_SHA256)
4696 					wpa_auth |= WPA2_AUTH_PSK;
4697 				else if (wpa_auth & WPA2_AUTH_1X_SHA256)
4698 					wpa_auth |= WPA2_AUTH_UNSPECIFIED;
4699 			} else if (rsn_cap & RSN_CAP_MFPC_MASK) {
4700 				brcmf_dbg(TRACE, "MFP Capable\n");
4701 				mfp = BRCMF_MFP_CAPABLE;
4702 			}
4703 		}
4704 		offset += RSN_CAP_LEN;
4705 		/* set wme_bss_disable to sync RSN Capabilities */
4706 		err = brcmf_fil_bsscfg_int_set(ifp, "wme_bss_disable",
4707 					       wme_bss_disable);
4708 		if (err < 0) {
4709 			bphy_err(drvr, "wme_bss_disable error %d\n", err);
4710 			goto exit;
4711 		}
4712 
4713 		/* Skip PMKID cnt as it is know to be 0 for AP. */
4714 		offset += RSN_PMKID_COUNT_LEN;
4715 
4716 		/* See if there is BIP wpa suite left for MFP */
4717 		if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MFP) &&
4718 		    ((offset + WPA_IE_MIN_OUI_LEN) <= len)) {
4719 			err = brcmf_fil_bsscfg_data_set(ifp, "bip",
4720 							&data[offset],
4721 							WPA_IE_MIN_OUI_LEN);
4722 			if (err < 0) {
4723 				bphy_err(drvr, "bip error %d\n", err);
4724 				goto exit;
4725 			}
4726 		}
4727 	}
4728 	/* FOR WPS , set SES_OW_ENABLED */
4729 	wsec = (pval | gval | SES_OW_ENABLED);
4730 
4731 	/* set auth */
4732 	err = brcmf_fil_bsscfg_int_set(ifp, "auth", auth);
4733 	if (err < 0) {
4734 		bphy_err(drvr, "auth error %d\n", err);
4735 		goto exit;
4736 	}
4737 	/* set wsec */
4738 	err = brcmf_fil_bsscfg_int_set(ifp, "wsec", wsec);
4739 	if (err < 0) {
4740 		bphy_err(drvr, "wsec error %d\n", err);
4741 		goto exit;
4742 	}
4743 	/* Configure MFP, this needs to go after wsec otherwise the wsec command
4744 	 * will overwrite the values set by MFP
4745 	 */
4746 	if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MFP)) {
4747 		err = brcmf_fil_bsscfg_int_set(ifp, "mfp", mfp);
4748 		if (err < 0) {
4749 			bphy_err(drvr, "mfp error %d\n", err);
4750 			goto exit;
4751 		}
4752 	}
4753 	/* set upper-layer auth */
4754 	err = brcmf_fil_bsscfg_int_set(ifp, "wpa_auth", wpa_auth);
4755 	if (err < 0) {
4756 		bphy_err(drvr, "wpa_auth error %d\n", err);
4757 		goto exit;
4758 	}
4759 
4760 exit:
4761 	return err;
4762 }
4763 
4764 static s32
4765 brcmf_parse_vndr_ies(const u8 *vndr_ie_buf, u32 vndr_ie_len,
4766 		     struct parsed_vndr_ies *vndr_ies)
4767 {
4768 	struct brcmf_vs_tlv *vndrie;
4769 	struct brcmf_tlv *ie;
4770 	struct parsed_vndr_ie_info *parsed_info;
4771 	s32 remaining_len;
4772 
4773 	remaining_len = (s32)vndr_ie_len;
4774 	memset(vndr_ies, 0, sizeof(*vndr_ies));
4775 
4776 	ie = (struct brcmf_tlv *)vndr_ie_buf;
4777 	while (ie) {
4778 		if (ie->id != WLAN_EID_VENDOR_SPECIFIC)
4779 			goto next;
4780 		vndrie = (struct brcmf_vs_tlv *)ie;
4781 		/* len should be bigger than OUI length + one */
4782 		if (vndrie->len < (VS_IE_FIXED_HDR_LEN - TLV_HDR_LEN + 1)) {
4783 			brcmf_err("invalid vndr ie. length is too small %d\n",
4784 				  vndrie->len);
4785 			goto next;
4786 		}
4787 		/* if wpa or wme ie, do not add ie */
4788 		if (!memcmp(vndrie->oui, (u8 *)WPA_OUI, TLV_OUI_LEN) &&
4789 		    ((vndrie->oui_type == WPA_OUI_TYPE) ||
4790 		    (vndrie->oui_type == WME_OUI_TYPE))) {
4791 			brcmf_dbg(TRACE, "Found WPA/WME oui. Do not add it\n");
4792 			goto next;
4793 		}
4794 
4795 		parsed_info = &vndr_ies->ie_info[vndr_ies->count];
4796 
4797 		/* save vndr ie information */
4798 		parsed_info->ie_ptr = (char *)vndrie;
4799 		parsed_info->ie_len = vndrie->len + TLV_HDR_LEN;
4800 		memcpy(&parsed_info->vndrie, vndrie, sizeof(*vndrie));
4801 
4802 		vndr_ies->count++;
4803 
4804 		brcmf_dbg(TRACE, "** OUI %3ph, type 0x%02x\n",
4805 			  parsed_info->vndrie.oui,
4806 			  parsed_info->vndrie.oui_type);
4807 
4808 		if (vndr_ies->count >= VNDR_IE_PARSE_LIMIT)
4809 			break;
4810 next:
4811 		remaining_len -= (ie->len + TLV_HDR_LEN);
4812 		if (remaining_len <= TLV_HDR_LEN)
4813 			ie = NULL;
4814 		else
4815 			ie = (struct brcmf_tlv *)(((u8 *)ie) + ie->len +
4816 				TLV_HDR_LEN);
4817 	}
4818 	return 0;
4819 }
4820 
4821 static u32
4822 brcmf_vndr_ie(u8 *iebuf, s32 pktflag, u8 *ie_ptr, u32 ie_len, s8 *add_del_cmd)
4823 {
4824 	strscpy(iebuf, add_del_cmd, VNDR_IE_CMD_LEN);
4825 
4826 	put_unaligned_le32(1, &iebuf[VNDR_IE_COUNT_OFFSET]);
4827 
4828 	put_unaligned_le32(pktflag, &iebuf[VNDR_IE_PKTFLAG_OFFSET]);
4829 
4830 	memcpy(&iebuf[VNDR_IE_VSIE_OFFSET], ie_ptr, ie_len);
4831 
4832 	return ie_len + VNDR_IE_HDR_SIZE;
4833 }
4834 
4835 s32 brcmf_vif_set_mgmt_ie(struct brcmf_cfg80211_vif *vif, s32 pktflag,
4836 			  const u8 *vndr_ie_buf, u32 vndr_ie_len)
4837 {
4838 	struct brcmf_pub *drvr;
4839 	struct brcmf_if *ifp;
4840 	struct vif_saved_ie *saved_ie;
4841 	s32 err = 0;
4842 	u8  *iovar_ie_buf;
4843 	u8  *curr_ie_buf;
4844 	u8  *mgmt_ie_buf = NULL;
4845 	int mgmt_ie_buf_len;
4846 	u32 *mgmt_ie_len;
4847 	u32 del_add_ie_buf_len = 0;
4848 	u32 total_ie_buf_len = 0;
4849 	u32 parsed_ie_buf_len = 0;
4850 	struct parsed_vndr_ies old_vndr_ies;
4851 	struct parsed_vndr_ies new_vndr_ies;
4852 	struct parsed_vndr_ie_info *vndrie_info;
4853 	s32 i;
4854 	u8 *ptr;
4855 	int remained_buf_len;
4856 
4857 	if (!vif)
4858 		return -ENODEV;
4859 	ifp = vif->ifp;
4860 	drvr = ifp->drvr;
4861 	saved_ie = &vif->saved_ie;
4862 
4863 	brcmf_dbg(TRACE, "bsscfgidx %d, pktflag : 0x%02X\n", ifp->bsscfgidx,
4864 		  pktflag);
4865 	iovar_ie_buf = kzalloc(WL_EXTRA_BUF_MAX, GFP_KERNEL);
4866 	if (!iovar_ie_buf)
4867 		return -ENOMEM;
4868 	curr_ie_buf = iovar_ie_buf;
4869 	switch (pktflag) {
4870 	case BRCMF_VNDR_IE_PRBREQ_FLAG:
4871 		mgmt_ie_buf = saved_ie->probe_req_ie;
4872 		mgmt_ie_len = &saved_ie->probe_req_ie_len;
4873 		mgmt_ie_buf_len = sizeof(saved_ie->probe_req_ie);
4874 		break;
4875 	case BRCMF_VNDR_IE_PRBRSP_FLAG:
4876 		mgmt_ie_buf = saved_ie->probe_res_ie;
4877 		mgmt_ie_len = &saved_ie->probe_res_ie_len;
4878 		mgmt_ie_buf_len = sizeof(saved_ie->probe_res_ie);
4879 		break;
4880 	case BRCMF_VNDR_IE_BEACON_FLAG:
4881 		mgmt_ie_buf = saved_ie->beacon_ie;
4882 		mgmt_ie_len = &saved_ie->beacon_ie_len;
4883 		mgmt_ie_buf_len = sizeof(saved_ie->beacon_ie);
4884 		break;
4885 	case BRCMF_VNDR_IE_ASSOCREQ_FLAG:
4886 		mgmt_ie_buf = saved_ie->assoc_req_ie;
4887 		mgmt_ie_len = &saved_ie->assoc_req_ie_len;
4888 		mgmt_ie_buf_len = sizeof(saved_ie->assoc_req_ie);
4889 		break;
4890 	case BRCMF_VNDR_IE_ASSOCRSP_FLAG:
4891 		mgmt_ie_buf = saved_ie->assoc_res_ie;
4892 		mgmt_ie_len = &saved_ie->assoc_res_ie_len;
4893 		mgmt_ie_buf_len = sizeof(saved_ie->assoc_res_ie);
4894 		break;
4895 	default:
4896 		err = -EPERM;
4897 		bphy_err(drvr, "not suitable type\n");
4898 		goto exit;
4899 	}
4900 
4901 	if (vndr_ie_len > mgmt_ie_buf_len) {
4902 		err = -ENOMEM;
4903 		bphy_err(drvr, "extra IE size too big\n");
4904 		goto exit;
4905 	}
4906 
4907 	/* parse and save new vndr_ie in curr_ie_buff before comparing it */
4908 	if (vndr_ie_buf && vndr_ie_len && curr_ie_buf) {
4909 		ptr = curr_ie_buf;
4910 		brcmf_parse_vndr_ies(vndr_ie_buf, vndr_ie_len, &new_vndr_ies);
4911 		for (i = 0; i < new_vndr_ies.count; i++) {
4912 			vndrie_info = &new_vndr_ies.ie_info[i];
4913 			memcpy(ptr + parsed_ie_buf_len, vndrie_info->ie_ptr,
4914 			       vndrie_info->ie_len);
4915 			parsed_ie_buf_len += vndrie_info->ie_len;
4916 		}
4917 	}
4918 
4919 	if (mgmt_ie_buf && *mgmt_ie_len) {
4920 		if (parsed_ie_buf_len && (parsed_ie_buf_len == *mgmt_ie_len) &&
4921 		    (memcmp(mgmt_ie_buf, curr_ie_buf,
4922 			    parsed_ie_buf_len) == 0)) {
4923 			brcmf_dbg(TRACE, "Previous mgmt IE equals to current IE\n");
4924 			goto exit;
4925 		}
4926 
4927 		/* parse old vndr_ie */
4928 		brcmf_parse_vndr_ies(mgmt_ie_buf, *mgmt_ie_len, &old_vndr_ies);
4929 
4930 		/* make a command to delete old ie */
4931 		for (i = 0; i < old_vndr_ies.count; i++) {
4932 			vndrie_info = &old_vndr_ies.ie_info[i];
4933 
4934 			brcmf_dbg(TRACE, "DEL ID : %d, Len: %d , OUI:%3ph\n",
4935 				  vndrie_info->vndrie.id,
4936 				  vndrie_info->vndrie.len,
4937 				  vndrie_info->vndrie.oui);
4938 
4939 			del_add_ie_buf_len = brcmf_vndr_ie(curr_ie_buf, pktflag,
4940 							   vndrie_info->ie_ptr,
4941 							   vndrie_info->ie_len,
4942 							   "del");
4943 			curr_ie_buf += del_add_ie_buf_len;
4944 			total_ie_buf_len += del_add_ie_buf_len;
4945 		}
4946 	}
4947 
4948 	*mgmt_ie_len = 0;
4949 	/* Add if there is any extra IE */
4950 	if (mgmt_ie_buf && parsed_ie_buf_len) {
4951 		ptr = mgmt_ie_buf;
4952 
4953 		remained_buf_len = mgmt_ie_buf_len;
4954 
4955 		/* make a command to add new ie */
4956 		for (i = 0; i < new_vndr_ies.count; i++) {
4957 			vndrie_info = &new_vndr_ies.ie_info[i];
4958 
4959 			/* verify remained buf size before copy data */
4960 			if (remained_buf_len < (vndrie_info->vndrie.len +
4961 							VNDR_IE_VSIE_OFFSET)) {
4962 				bphy_err(drvr, "no space in mgmt_ie_buf: len left %d",
4963 					 remained_buf_len);
4964 				break;
4965 			}
4966 			remained_buf_len -= (vndrie_info->ie_len +
4967 					     VNDR_IE_VSIE_OFFSET);
4968 
4969 			brcmf_dbg(TRACE, "ADDED ID : %d, Len: %d, OUI:%3ph\n",
4970 				  vndrie_info->vndrie.id,
4971 				  vndrie_info->vndrie.len,
4972 				  vndrie_info->vndrie.oui);
4973 
4974 			del_add_ie_buf_len = brcmf_vndr_ie(curr_ie_buf, pktflag,
4975 							   vndrie_info->ie_ptr,
4976 							   vndrie_info->ie_len,
4977 							   "add");
4978 
4979 			/* save the parsed IE in wl struct */
4980 			memcpy(ptr + (*mgmt_ie_len), vndrie_info->ie_ptr,
4981 			       vndrie_info->ie_len);
4982 			*mgmt_ie_len += vndrie_info->ie_len;
4983 
4984 			curr_ie_buf += del_add_ie_buf_len;
4985 			total_ie_buf_len += del_add_ie_buf_len;
4986 		}
4987 	}
4988 	if (total_ie_buf_len) {
4989 		err  = brcmf_fil_bsscfg_data_set(ifp, "vndr_ie", iovar_ie_buf,
4990 						 total_ie_buf_len);
4991 		if (err)
4992 			bphy_err(drvr, "vndr ie set error : %d\n", err);
4993 	}
4994 
4995 exit:
4996 	kfree(iovar_ie_buf);
4997 	return err;
4998 }
4999 
5000 s32 brcmf_vif_clear_mgmt_ies(struct brcmf_cfg80211_vif *vif)
5001 {
5002 	static const s32 pktflags[] = {
5003 		BRCMF_VNDR_IE_PRBREQ_FLAG,
5004 		BRCMF_VNDR_IE_PRBRSP_FLAG,
5005 		BRCMF_VNDR_IE_BEACON_FLAG
5006 	};
5007 	int i;
5008 
5009 	for (i = 0; i < ARRAY_SIZE(pktflags); i++)
5010 		brcmf_vif_set_mgmt_ie(vif, pktflags[i], NULL, 0);
5011 
5012 	memset(&vif->saved_ie, 0, sizeof(vif->saved_ie));
5013 	return 0;
5014 }
5015 
5016 static s32
5017 brcmf_config_ap_mgmt_ie(struct brcmf_cfg80211_vif *vif,
5018 			struct cfg80211_beacon_data *beacon)
5019 {
5020 	struct brcmf_pub *drvr = vif->ifp->drvr;
5021 	s32 err;
5022 
5023 	/* Set Beacon IEs to FW */
5024 	err = brcmf_vif_set_mgmt_ie(vif, BRCMF_VNDR_IE_BEACON_FLAG,
5025 				    beacon->tail, beacon->tail_len);
5026 	if (err) {
5027 		bphy_err(drvr, "Set Beacon IE Failed\n");
5028 		return err;
5029 	}
5030 	brcmf_dbg(TRACE, "Applied Vndr IEs for Beacon\n");
5031 
5032 	/* Set Probe Response IEs to FW */
5033 	err = brcmf_vif_set_mgmt_ie(vif, BRCMF_VNDR_IE_PRBRSP_FLAG,
5034 				    beacon->proberesp_ies,
5035 				    beacon->proberesp_ies_len);
5036 	if (err)
5037 		bphy_err(drvr, "Set Probe Resp IE Failed\n");
5038 	else
5039 		brcmf_dbg(TRACE, "Applied Vndr IEs for Probe Resp\n");
5040 
5041 	/* Set Assoc Response IEs to FW */
5042 	err = brcmf_vif_set_mgmt_ie(vif, BRCMF_VNDR_IE_ASSOCRSP_FLAG,
5043 				    beacon->assocresp_ies,
5044 				    beacon->assocresp_ies_len);
5045 	if (err)
5046 		brcmf_err("Set Assoc Resp IE Failed\n");
5047 	else
5048 		brcmf_dbg(TRACE, "Applied Vndr IEs for Assoc Resp\n");
5049 
5050 	return err;
5051 }
5052 
5053 static s32
5054 brcmf_parse_configure_security(struct brcmf_if *ifp,
5055 			       struct cfg80211_ap_settings *settings,
5056 			       enum nl80211_iftype dev_role)
5057 {
5058 	const struct brcmf_tlv *rsn_ie;
5059 	const struct brcmf_vs_tlv *wpa_ie;
5060 	s32 err = 0;
5061 
5062 	/* find the RSN_IE */
5063 	rsn_ie = brcmf_parse_tlvs((u8 *)settings->beacon.tail,
5064 				  settings->beacon.tail_len, WLAN_EID_RSN);
5065 
5066 	/* find the WPA_IE */
5067 	wpa_ie = brcmf_find_wpaie((u8 *)settings->beacon.tail,
5068 				  settings->beacon.tail_len);
5069 
5070 	if (wpa_ie || rsn_ie) {
5071 		brcmf_dbg(TRACE, "WPA(2) IE is found\n");
5072 		if (wpa_ie) {
5073 			/* WPA IE */
5074 			err = brcmf_configure_wpaie(ifp, wpa_ie, false);
5075 			if (err < 0)
5076 				return err;
5077 		} else {
5078 			struct brcmf_vs_tlv *tmp_ie;
5079 
5080 			tmp_ie = (struct brcmf_vs_tlv *)rsn_ie;
5081 
5082 			/* RSN IE */
5083 			err = brcmf_configure_wpaie(ifp, tmp_ie, true);
5084 			if (err < 0)
5085 				return err;
5086 		}
5087 	} else {
5088 		brcmf_dbg(TRACE, "No WPA(2) IEs found\n");
5089 		brcmf_configure_opensecurity(ifp);
5090 	}
5091 
5092 	return err;
5093 }
5094 
5095 static s32
5096 brcmf_cfg80211_start_ap(struct wiphy *wiphy, struct net_device *ndev,
5097 			struct cfg80211_ap_settings *settings)
5098 {
5099 	s32 ie_offset;
5100 	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
5101 	struct brcmf_if *ifp = netdev_priv(ndev);
5102 	struct brcmf_pub *drvr = cfg->pub;
5103 	struct brcmf_cfg80211_profile *profile = &ifp->vif->profile;
5104 	struct cfg80211_crypto_settings *crypto = &settings->crypto;
5105 	const struct brcmf_tlv *ssid_ie;
5106 	const struct brcmf_tlv *country_ie;
5107 	struct brcmf_ssid_le ssid_le;
5108 	s32 err = -EPERM;
5109 	struct brcmf_join_params join_params;
5110 	enum nl80211_iftype dev_role;
5111 	struct brcmf_fil_bss_enable_le bss_enable;
5112 	u16 chanspec = chandef_to_chanspec(&cfg->d11inf, &settings->chandef);
5113 	bool mbss;
5114 	int is_11d;
5115 	bool supports_11d;
5116 
5117 	brcmf_dbg(TRACE, "ctrlchn=%d, center=%d, bw=%d, beacon_interval=%d, dtim_period=%d,\n",
5118 		  settings->chandef.chan->hw_value,
5119 		  settings->chandef.center_freq1, settings->chandef.width,
5120 		  settings->beacon_interval, settings->dtim_period);
5121 	brcmf_dbg(TRACE, "ssid=%s(%zu), auth_type=%d, inactivity_timeout=%d\n",
5122 		  settings->ssid, settings->ssid_len, settings->auth_type,
5123 		  settings->inactivity_timeout);
5124 	dev_role = ifp->vif->wdev.iftype;
5125 	mbss = ifp->vif->mbss;
5126 
5127 	/* store current 11d setting */
5128 	if (brcmf_fil_cmd_int_get(ifp, BRCMF_C_GET_REGULATORY,
5129 				  &ifp->vif->is_11d)) {
5130 		is_11d = supports_11d = false;
5131 	} else {
5132 		country_ie = brcmf_parse_tlvs((u8 *)settings->beacon.tail,
5133 					      settings->beacon.tail_len,
5134 					      WLAN_EID_COUNTRY);
5135 		is_11d = country_ie ? 1 : 0;
5136 		supports_11d = true;
5137 	}
5138 
5139 	memset(&ssid_le, 0, sizeof(ssid_le));
5140 	if (settings->ssid == NULL || settings->ssid_len == 0) {
5141 		ie_offset = DOT11_MGMT_HDR_LEN + DOT11_BCN_PRB_FIXED_LEN;
5142 		ssid_ie = brcmf_parse_tlvs(
5143 				(u8 *)&settings->beacon.head[ie_offset],
5144 				settings->beacon.head_len - ie_offset,
5145 				WLAN_EID_SSID);
5146 		if (!ssid_ie || ssid_ie->len > IEEE80211_MAX_SSID_LEN)
5147 			return -EINVAL;
5148 
5149 		memcpy(ssid_le.SSID, ssid_ie->data, ssid_ie->len);
5150 		ssid_le.SSID_len = cpu_to_le32(ssid_ie->len);
5151 		brcmf_dbg(TRACE, "SSID is (%s) in Head\n", ssid_le.SSID);
5152 	} else {
5153 		memcpy(ssid_le.SSID, settings->ssid, settings->ssid_len);
5154 		ssid_le.SSID_len = cpu_to_le32((u32)settings->ssid_len);
5155 	}
5156 
5157 	if (!mbss) {
5158 		brcmf_set_mpc(ifp, 0);
5159 		brcmf_configure_arp_nd_offload(ifp, false);
5160 	}
5161 
5162 	/* Parameters shared by all radio interfaces */
5163 	if (!mbss) {
5164 		if ((supports_11d) && (is_11d != ifp->vif->is_11d)) {
5165 			err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_REGULATORY,
5166 						    is_11d);
5167 			if (err < 0) {
5168 				bphy_err(drvr, "Regulatory Set Error, %d\n",
5169 					 err);
5170 				goto exit;
5171 			}
5172 		}
5173 		if (settings->beacon_interval) {
5174 			err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_BCNPRD,
5175 						    settings->beacon_interval);
5176 			if (err < 0) {
5177 				bphy_err(drvr, "Beacon Interval Set Error, %d\n",
5178 					 err);
5179 				goto exit;
5180 			}
5181 		}
5182 		if (settings->dtim_period) {
5183 			err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_DTIMPRD,
5184 						    settings->dtim_period);
5185 			if (err < 0) {
5186 				bphy_err(drvr, "DTIM Interval Set Error, %d\n",
5187 					 err);
5188 				goto exit;
5189 			}
5190 		}
5191 
5192 		if ((dev_role == NL80211_IFTYPE_AP) &&
5193 		    ((ifp->ifidx == 0) ||
5194 		     (!brcmf_feat_is_enabled(ifp, BRCMF_FEAT_RSDB) &&
5195 		      !brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MCHAN)))) {
5196 			err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_DOWN, 1);
5197 			if (err < 0) {
5198 				bphy_err(drvr, "BRCMF_C_DOWN error %d\n",
5199 					 err);
5200 				goto exit;
5201 			}
5202 			brcmf_fil_iovar_int_set(ifp, "apsta", 0);
5203 		}
5204 
5205 		err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_INFRA, 1);
5206 		if (err < 0) {
5207 			bphy_err(drvr, "SET INFRA error %d\n", err);
5208 			goto exit;
5209 		}
5210 	} else if (WARN_ON(supports_11d && (is_11d != ifp->vif->is_11d))) {
5211 		/* Multiple-BSS should use same 11d configuration */
5212 		err = -EINVAL;
5213 		goto exit;
5214 	}
5215 
5216 	/* Interface specific setup */
5217 	if (dev_role == NL80211_IFTYPE_AP) {
5218 		if ((brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MBSS)) && (!mbss))
5219 			brcmf_fil_iovar_int_set(ifp, "mbss", 1);
5220 
5221 		err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_AP, 1);
5222 		if (err < 0) {
5223 			bphy_err(drvr, "setting AP mode failed %d\n",
5224 				 err);
5225 			goto exit;
5226 		}
5227 		if (!mbss) {
5228 			/* Firmware 10.x requires setting channel after enabling
5229 			 * AP and before bringing interface up.
5230 			 */
5231 			err = brcmf_fil_iovar_int_set(ifp, "chanspec", chanspec);
5232 			if (err < 0) {
5233 				bphy_err(drvr, "Set Channel failed: chspec=%d, %d\n",
5234 					 chanspec, err);
5235 				goto exit;
5236 			}
5237 		}
5238 		err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_UP, 1);
5239 		if (err < 0) {
5240 			bphy_err(drvr, "BRCMF_C_UP error (%d)\n", err);
5241 			goto exit;
5242 		}
5243 
5244 		if (crypto->psk) {
5245 			brcmf_dbg(INFO, "using PSK offload\n");
5246 			profile->use_fwauth |= BIT(BRCMF_PROFILE_FWAUTH_PSK);
5247 			err = brcmf_set_pmk(ifp, crypto->psk,
5248 					    BRCMF_WSEC_MAX_PSK_LEN);
5249 			if (err < 0)
5250 				goto exit;
5251 		}
5252 		if (crypto->sae_pwd) {
5253 			brcmf_dbg(INFO, "using SAE offload\n");
5254 			profile->use_fwauth |= BIT(BRCMF_PROFILE_FWAUTH_SAE);
5255 			err = brcmf_set_sae_password(ifp, crypto->sae_pwd,
5256 						     crypto->sae_pwd_len);
5257 			if (err < 0)
5258 				goto exit;
5259 		}
5260 		if (profile->use_fwauth == 0)
5261 			profile->use_fwauth = BIT(BRCMF_PROFILE_FWAUTH_NONE);
5262 
5263 		err = brcmf_parse_configure_security(ifp, settings,
5264 						     NL80211_IFTYPE_AP);
5265 		if (err < 0) {
5266 			bphy_err(drvr, "brcmf_parse_configure_security error\n");
5267 			goto exit;
5268 		}
5269 
5270 		/* On DOWN the firmware removes the WEP keys, reconfigure
5271 		 * them if they were set.
5272 		 */
5273 		brcmf_cfg80211_reconfigure_wep(ifp);
5274 
5275 		memset(&join_params, 0, sizeof(join_params));
5276 		/* join parameters starts with ssid */
5277 		memcpy(&join_params.ssid_le, &ssid_le, sizeof(ssid_le));
5278 		/* create softap */
5279 		err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_SSID,
5280 					     &join_params, sizeof(join_params));
5281 		if (err < 0) {
5282 			bphy_err(drvr, "SET SSID error (%d)\n", err);
5283 			goto exit;
5284 		}
5285 
5286 		err = brcmf_fil_iovar_int_set(ifp, "closednet",
5287 					      settings->hidden_ssid);
5288 		if (err) {
5289 			bphy_err(drvr, "%s closednet error (%d)\n",
5290 				 settings->hidden_ssid ?
5291 				 "enabled" : "disabled",
5292 				 err);
5293 			goto exit;
5294 		}
5295 
5296 		brcmf_dbg(TRACE, "AP mode configuration complete\n");
5297 	} else if (dev_role == NL80211_IFTYPE_P2P_GO) {
5298 		err = brcmf_fil_iovar_int_set(ifp, "chanspec", chanspec);
5299 		if (err < 0) {
5300 			bphy_err(drvr, "Set Channel failed: chspec=%d, %d\n",
5301 				 chanspec, err);
5302 			goto exit;
5303 		}
5304 
5305 		err = brcmf_parse_configure_security(ifp, settings,
5306 						     NL80211_IFTYPE_P2P_GO);
5307 		if (err < 0) {
5308 			brcmf_err("brcmf_parse_configure_security error\n");
5309 			goto exit;
5310 		}
5311 
5312 		err = brcmf_fil_bsscfg_data_set(ifp, "ssid", &ssid_le,
5313 						sizeof(ssid_le));
5314 		if (err < 0) {
5315 			bphy_err(drvr, "setting ssid failed %d\n", err);
5316 			goto exit;
5317 		}
5318 		bss_enable.bsscfgidx = cpu_to_le32(ifp->bsscfgidx);
5319 		bss_enable.enable = cpu_to_le32(1);
5320 		err = brcmf_fil_iovar_data_set(ifp, "bss", &bss_enable,
5321 					       sizeof(bss_enable));
5322 		if (err < 0) {
5323 			bphy_err(drvr, "bss_enable config failed %d\n", err);
5324 			goto exit;
5325 		}
5326 
5327 		brcmf_dbg(TRACE, "GO mode configuration complete\n");
5328 	} else {
5329 		WARN_ON(1);
5330 	}
5331 
5332 	brcmf_config_ap_mgmt_ie(ifp->vif, &settings->beacon);
5333 	set_bit(BRCMF_VIF_STATUS_AP_CREATED, &ifp->vif->sme_state);
5334 	brcmf_net_setcarrier(ifp, true);
5335 
5336 exit:
5337 	if ((err) && (!mbss)) {
5338 		brcmf_set_mpc(ifp, 1);
5339 		brcmf_configure_arp_nd_offload(ifp, true);
5340 	}
5341 	return err;
5342 }
5343 
5344 static int brcmf_cfg80211_stop_ap(struct wiphy *wiphy, struct net_device *ndev,
5345 				  unsigned int link_id)
5346 {
5347 	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
5348 	struct brcmf_if *ifp = netdev_priv(ndev);
5349 	struct brcmf_pub *drvr = cfg->pub;
5350 	struct brcmf_cfg80211_profile *profile = &ifp->vif->profile;
5351 	s32 err;
5352 	struct brcmf_fil_bss_enable_le bss_enable;
5353 	struct brcmf_join_params join_params;
5354 
5355 	brcmf_dbg(TRACE, "Enter\n");
5356 
5357 	if (ifp->vif->wdev.iftype == NL80211_IFTYPE_AP) {
5358 		/* Due to most likely deauths outstanding we sleep */
5359 		/* first to make sure they get processed by fw. */
5360 		msleep(400);
5361 
5362 		if (profile->use_fwauth != BIT(BRCMF_PROFILE_FWAUTH_NONE)) {
5363 			if (profile->use_fwauth & BIT(BRCMF_PROFILE_FWAUTH_PSK))
5364 				brcmf_set_pmk(ifp, NULL, 0);
5365 			if (profile->use_fwauth & BIT(BRCMF_PROFILE_FWAUTH_SAE))
5366 				brcmf_set_sae_password(ifp, NULL, 0);
5367 			profile->use_fwauth = BIT(BRCMF_PROFILE_FWAUTH_NONE);
5368 		}
5369 
5370 		if (ifp->vif->mbss) {
5371 			err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_DOWN, 1);
5372 			return err;
5373 		}
5374 
5375 		/* First BSS doesn't get a full reset */
5376 		if (ifp->bsscfgidx == 0)
5377 			brcmf_fil_iovar_int_set(ifp, "closednet", 0);
5378 
5379 		memset(&join_params, 0, sizeof(join_params));
5380 		err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_SSID,
5381 					     &join_params, sizeof(join_params));
5382 		if (err < 0)
5383 			bphy_err(drvr, "SET SSID error (%d)\n", err);
5384 		err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_DOWN, 1);
5385 		if (err < 0)
5386 			bphy_err(drvr, "BRCMF_C_DOWN error %d\n", err);
5387 		err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_AP, 0);
5388 		if (err < 0)
5389 			bphy_err(drvr, "setting AP mode failed %d\n", err);
5390 		if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MBSS))
5391 			brcmf_fil_iovar_int_set(ifp, "mbss", 0);
5392 		brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_REGULATORY,
5393 				      ifp->vif->is_11d);
5394 		/* Bring device back up so it can be used again */
5395 		err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_UP, 1);
5396 		if (err < 0)
5397 			bphy_err(drvr, "BRCMF_C_UP error %d\n", err);
5398 
5399 		brcmf_vif_clear_mgmt_ies(ifp->vif);
5400 	} else {
5401 		bss_enable.bsscfgidx = cpu_to_le32(ifp->bsscfgidx);
5402 		bss_enable.enable = cpu_to_le32(0);
5403 		err = brcmf_fil_iovar_data_set(ifp, "bss", &bss_enable,
5404 					       sizeof(bss_enable));
5405 		if (err < 0)
5406 			bphy_err(drvr, "bss_enable config failed %d\n", err);
5407 	}
5408 	brcmf_set_mpc(ifp, 1);
5409 	brcmf_configure_arp_nd_offload(ifp, true);
5410 	clear_bit(BRCMF_VIF_STATUS_AP_CREATED, &ifp->vif->sme_state);
5411 	brcmf_net_setcarrier(ifp, false);
5412 
5413 	return err;
5414 }
5415 
5416 static s32
5417 brcmf_cfg80211_change_beacon(struct wiphy *wiphy, struct net_device *ndev,
5418 			     struct cfg80211_ap_update *info)
5419 {
5420 	struct brcmf_if *ifp = netdev_priv(ndev);
5421 
5422 	brcmf_dbg(TRACE, "Enter\n");
5423 
5424 	return brcmf_config_ap_mgmt_ie(ifp->vif, &info->beacon);
5425 }
5426 
5427 static int
5428 brcmf_cfg80211_del_station(struct wiphy *wiphy, struct net_device *ndev,
5429 			   struct station_del_parameters *params)
5430 {
5431 	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
5432 	struct brcmf_pub *drvr = cfg->pub;
5433 	struct brcmf_scb_val_le scbval;
5434 	struct brcmf_if *ifp = netdev_priv(ndev);
5435 	s32 err;
5436 
5437 	if (!params->mac)
5438 		return -EFAULT;
5439 
5440 	brcmf_dbg(TRACE, "Enter %pM\n", params->mac);
5441 
5442 	if (ifp->vif == cfg->p2p.bss_idx[P2PAPI_BSSCFG_DEVICE].vif)
5443 		ifp = cfg->p2p.bss_idx[P2PAPI_BSSCFG_PRIMARY].vif->ifp;
5444 	if (!check_vif_up(ifp->vif))
5445 		return -EIO;
5446 
5447 	memcpy(&scbval.ea, params->mac, ETH_ALEN);
5448 	scbval.val = cpu_to_le32(params->reason_code);
5449 	err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SCB_DEAUTHENTICATE_FOR_REASON,
5450 				     &scbval, sizeof(scbval));
5451 	if (err)
5452 		bphy_err(drvr, "SCB_DEAUTHENTICATE_FOR_REASON failed %d\n",
5453 			 err);
5454 
5455 	brcmf_dbg(TRACE, "Exit\n");
5456 	return err;
5457 }
5458 
5459 static int
5460 brcmf_cfg80211_change_station(struct wiphy *wiphy, struct net_device *ndev,
5461 			      const u8 *mac, struct station_parameters *params)
5462 {
5463 	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
5464 	struct brcmf_pub *drvr = cfg->pub;
5465 	struct brcmf_if *ifp = netdev_priv(ndev);
5466 	s32 err;
5467 
5468 	brcmf_dbg(TRACE, "Enter, MAC %pM, mask 0x%04x set 0x%04x\n", mac,
5469 		  params->sta_flags_mask, params->sta_flags_set);
5470 
5471 	/* Ignore all 00 MAC */
5472 	if (is_zero_ether_addr(mac))
5473 		return 0;
5474 
5475 	if (!(params->sta_flags_mask & BIT(NL80211_STA_FLAG_AUTHORIZED)))
5476 		return 0;
5477 
5478 	if (params->sta_flags_set & BIT(NL80211_STA_FLAG_AUTHORIZED))
5479 		err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_SCB_AUTHORIZE,
5480 					     (void *)mac, ETH_ALEN);
5481 	else
5482 		err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_SCB_DEAUTHORIZE,
5483 					     (void *)mac, ETH_ALEN);
5484 	if (err < 0)
5485 		bphy_err(drvr, "Setting SCB (de-)authorize failed, %d\n", err);
5486 
5487 	return err;
5488 }
5489 
5490 static void
5491 brcmf_cfg80211_update_mgmt_frame_registrations(struct wiphy *wiphy,
5492 					       struct wireless_dev *wdev,
5493 					       struct mgmt_frame_regs *upd)
5494 {
5495 	struct brcmf_cfg80211_vif *vif;
5496 
5497 	vif = container_of(wdev, struct brcmf_cfg80211_vif, wdev);
5498 
5499 	vif->mgmt_rx_reg = upd->interface_stypes;
5500 }
5501 
5502 
5503 static int
5504 brcmf_cfg80211_mgmt_tx(struct wiphy *wiphy, struct wireless_dev *wdev,
5505 		       struct cfg80211_mgmt_tx_params *params, u64 *cookie)
5506 {
5507 	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
5508 	struct ieee80211_channel *chan = params->chan;
5509 	struct brcmf_pub *drvr = cfg->pub;
5510 	const u8 *buf = params->buf;
5511 	size_t len = params->len;
5512 	const struct ieee80211_mgmt *mgmt;
5513 	struct brcmf_cfg80211_vif *vif;
5514 	s32 err = 0;
5515 	s32 ie_offset;
5516 	s32 ie_len;
5517 	struct brcmf_fil_action_frame_le *action_frame;
5518 	struct brcmf_fil_af_params_le *af_params;
5519 	bool ack;
5520 	s32 chan_nr;
5521 	u32 freq;
5522 
5523 	brcmf_dbg(TRACE, "Enter\n");
5524 
5525 	*cookie = 0;
5526 
5527 	mgmt = (const struct ieee80211_mgmt *)buf;
5528 
5529 	if (!ieee80211_is_mgmt(mgmt->frame_control)) {
5530 		bphy_err(drvr, "Driver only allows MGMT packet type\n");
5531 		return -EPERM;
5532 	}
5533 
5534 	vif = container_of(wdev, struct brcmf_cfg80211_vif, wdev);
5535 
5536 	if (ieee80211_is_probe_resp(mgmt->frame_control)) {
5537 		/* Right now the only reason to get a probe response */
5538 		/* is for p2p listen response or for p2p GO from     */
5539 		/* wpa_supplicant. Unfortunately the probe is send   */
5540 		/* on primary ndev, while dongle wants it on the p2p */
5541 		/* vif. Since this is only reason for a probe        */
5542 		/* response to be sent, the vif is taken from cfg.   */
5543 		/* If ever desired to send proberesp for non p2p     */
5544 		/* response then data should be checked for          */
5545 		/* "DIRECT-". Note in future supplicant will take    */
5546 		/* dedicated p2p wdev to do this and then this 'hack'*/
5547 		/* is not needed anymore.                            */
5548 		ie_offset =  DOT11_MGMT_HDR_LEN +
5549 			     DOT11_BCN_PRB_FIXED_LEN;
5550 		ie_len = len - ie_offset;
5551 		if (vif == cfg->p2p.bss_idx[P2PAPI_BSSCFG_PRIMARY].vif)
5552 			vif = cfg->p2p.bss_idx[P2PAPI_BSSCFG_DEVICE].vif;
5553 		err = brcmf_vif_set_mgmt_ie(vif,
5554 					    BRCMF_VNDR_IE_PRBRSP_FLAG,
5555 					    &buf[ie_offset],
5556 					    ie_len);
5557 		cfg80211_mgmt_tx_status(wdev, *cookie, buf, len, true,
5558 					GFP_KERNEL);
5559 	} else if (ieee80211_is_action(mgmt->frame_control)) {
5560 		if (len > BRCMF_FIL_ACTION_FRAME_SIZE + DOT11_MGMT_HDR_LEN) {
5561 			bphy_err(drvr, "invalid action frame length\n");
5562 			err = -EINVAL;
5563 			goto exit;
5564 		}
5565 		af_params = kzalloc(sizeof(*af_params), GFP_KERNEL);
5566 		if (af_params == NULL) {
5567 			bphy_err(drvr, "unable to allocate frame\n");
5568 			err = -ENOMEM;
5569 			goto exit;
5570 		}
5571 		action_frame = &af_params->action_frame;
5572 		/* Add the packet Id */
5573 		action_frame->packet_id = cpu_to_le32(*cookie);
5574 		/* Add BSSID */
5575 		memcpy(&action_frame->da[0], &mgmt->da[0], ETH_ALEN);
5576 		memcpy(&af_params->bssid[0], &mgmt->bssid[0], ETH_ALEN);
5577 		/* Add the length exepted for 802.11 header  */
5578 		action_frame->len = cpu_to_le16(len - DOT11_MGMT_HDR_LEN);
5579 		/* Add the channel. Use the one specified as parameter if any or
5580 		 * the current one (got from the firmware) otherwise
5581 		 */
5582 		if (chan)
5583 			freq = chan->center_freq;
5584 		else
5585 			brcmf_fil_cmd_int_get(vif->ifp, BRCMF_C_GET_CHANNEL,
5586 					      &freq);
5587 		chan_nr = ieee80211_frequency_to_channel(freq);
5588 		af_params->channel = cpu_to_le32(chan_nr);
5589 		af_params->dwell_time = cpu_to_le32(params->wait);
5590 		memcpy(action_frame->data, &buf[DOT11_MGMT_HDR_LEN],
5591 		       le16_to_cpu(action_frame->len));
5592 
5593 		brcmf_dbg(TRACE, "Action frame, cookie=%lld, len=%d, freq=%d\n",
5594 			  *cookie, le16_to_cpu(action_frame->len), freq);
5595 
5596 		ack = brcmf_p2p_send_action_frame(cfg, cfg_to_ndev(cfg),
5597 						  af_params);
5598 
5599 		cfg80211_mgmt_tx_status(wdev, *cookie, buf, len, ack,
5600 					GFP_KERNEL);
5601 		kfree(af_params);
5602 	} else {
5603 		brcmf_dbg(TRACE, "Unhandled, fc=%04x!!\n", mgmt->frame_control);
5604 		brcmf_dbg_hex_dump(true, buf, len, "payload, len=%zu\n", len);
5605 	}
5606 
5607 exit:
5608 	return err;
5609 }
5610 
5611 static int brcmf_cfg80211_set_cqm_rssi_range_config(struct wiphy *wiphy,
5612 						    struct net_device *ndev,
5613 						    s32 rssi_low, s32 rssi_high)
5614 {
5615 	struct brcmf_cfg80211_vif *vif;
5616 	struct brcmf_if *ifp;
5617 	int err = 0;
5618 
5619 	brcmf_dbg(TRACE, "low=%d high=%d", rssi_low, rssi_high);
5620 
5621 	ifp = netdev_priv(ndev);
5622 	vif = ifp->vif;
5623 
5624 	if (rssi_low != vif->cqm_rssi_low || rssi_high != vif->cqm_rssi_high) {
5625 		/* The firmware will send an event when the RSSI is less than or
5626 		 * equal to a configured level and the previous RSSI event was
5627 		 * less than or equal to a different level. Set a third level
5628 		 * so that we also detect the transition from rssi <= rssi_high
5629 		 * to rssi > rssi_high.
5630 		 */
5631 		struct brcmf_rssi_event_le config = {
5632 			.rate_limit_msec = cpu_to_le32(0),
5633 			.rssi_level_num = 3,
5634 			.rssi_levels = {
5635 				clamp_val(rssi_low, S8_MIN, S8_MAX - 2),
5636 				clamp_val(rssi_high, S8_MIN + 1, S8_MAX - 1),
5637 				S8_MAX,
5638 			},
5639 		};
5640 
5641 		err = brcmf_fil_iovar_data_set(ifp, "rssi_event", &config,
5642 					       sizeof(config));
5643 		if (err) {
5644 			err = -EINVAL;
5645 		} else {
5646 			vif->cqm_rssi_low = rssi_low;
5647 			vif->cqm_rssi_high = rssi_high;
5648 		}
5649 	}
5650 
5651 	return err;
5652 }
5653 
5654 static int
5655 brcmf_cfg80211_cancel_remain_on_channel(struct wiphy *wiphy,
5656 					struct wireless_dev *wdev,
5657 					u64 cookie)
5658 {
5659 	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
5660 	struct brcmf_pub *drvr = cfg->pub;
5661 	struct brcmf_cfg80211_vif *vif;
5662 	int err = 0;
5663 
5664 	brcmf_dbg(TRACE, "Enter p2p listen cancel\n");
5665 
5666 	vif = cfg->p2p.bss_idx[P2PAPI_BSSCFG_DEVICE].vif;
5667 	if (vif == NULL) {
5668 		bphy_err(drvr, "No p2p device available for probe response\n");
5669 		err = -ENODEV;
5670 		goto exit;
5671 	}
5672 	brcmf_p2p_cancel_remain_on_channel(vif->ifp);
5673 exit:
5674 	return err;
5675 }
5676 
5677 static int brcmf_cfg80211_get_channel(struct wiphy *wiphy,
5678 				      struct wireless_dev *wdev,
5679 				      unsigned int link_id,
5680 				      struct cfg80211_chan_def *chandef)
5681 {
5682 	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
5683 	struct net_device *ndev = wdev->netdev;
5684 	struct brcmf_pub *drvr = cfg->pub;
5685 	struct brcmu_chan ch;
5686 	enum nl80211_band band = 0;
5687 	enum nl80211_chan_width width = 0;
5688 	u32 chanspec;
5689 	int freq, err;
5690 
5691 	if (!ndev || drvr->bus_if->state != BRCMF_BUS_UP)
5692 		return -ENODEV;
5693 
5694 	err = brcmf_fil_iovar_int_get(netdev_priv(ndev), "chanspec", &chanspec);
5695 	if (err) {
5696 		bphy_err(drvr, "chanspec failed (%d)\n", err);
5697 		return err;
5698 	}
5699 
5700 	ch.chspec = chanspec;
5701 	cfg->d11inf.decchspec(&ch);
5702 
5703 	switch (ch.band) {
5704 	case BRCMU_CHAN_BAND_2G:
5705 		band = NL80211_BAND_2GHZ;
5706 		break;
5707 	case BRCMU_CHAN_BAND_5G:
5708 		band = NL80211_BAND_5GHZ;
5709 		break;
5710 	}
5711 
5712 	switch (ch.bw) {
5713 	case BRCMU_CHAN_BW_80:
5714 		width = NL80211_CHAN_WIDTH_80;
5715 		break;
5716 	case BRCMU_CHAN_BW_40:
5717 		width = NL80211_CHAN_WIDTH_40;
5718 		break;
5719 	case BRCMU_CHAN_BW_20:
5720 		width = NL80211_CHAN_WIDTH_20;
5721 		break;
5722 	case BRCMU_CHAN_BW_80P80:
5723 		width = NL80211_CHAN_WIDTH_80P80;
5724 		break;
5725 	case BRCMU_CHAN_BW_160:
5726 		width = NL80211_CHAN_WIDTH_160;
5727 		break;
5728 	}
5729 
5730 	freq = ieee80211_channel_to_frequency(ch.control_ch_num, band);
5731 	chandef->chan = ieee80211_get_channel(wiphy, freq);
5732 	chandef->width = width;
5733 	chandef->center_freq1 = ieee80211_channel_to_frequency(ch.chnum, band);
5734 	chandef->center_freq2 = 0;
5735 
5736 	return 0;
5737 }
5738 
5739 static int brcmf_cfg80211_crit_proto_start(struct wiphy *wiphy,
5740 					   struct wireless_dev *wdev,
5741 					   enum nl80211_crit_proto_id proto,
5742 					   u16 duration)
5743 {
5744 	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
5745 	struct brcmf_cfg80211_vif *vif;
5746 
5747 	vif = container_of(wdev, struct brcmf_cfg80211_vif, wdev);
5748 
5749 	/* only DHCP support for now */
5750 	if (proto != NL80211_CRIT_PROTO_DHCP)
5751 		return -EINVAL;
5752 
5753 	/* suppress and abort scanning */
5754 	set_bit(BRCMF_SCAN_STATUS_SUPPRESS, &cfg->scan_status);
5755 	brcmf_abort_scanning(cfg);
5756 
5757 	return brcmf_btcoex_set_mode(vif, BRCMF_BTCOEX_DISABLED, duration);
5758 }
5759 
5760 static void brcmf_cfg80211_crit_proto_stop(struct wiphy *wiphy,
5761 					   struct wireless_dev *wdev)
5762 {
5763 	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
5764 	struct brcmf_cfg80211_vif *vif;
5765 
5766 	vif = container_of(wdev, struct brcmf_cfg80211_vif, wdev);
5767 
5768 	brcmf_btcoex_set_mode(vif, BRCMF_BTCOEX_ENABLED, 0);
5769 	clear_bit(BRCMF_SCAN_STATUS_SUPPRESS, &cfg->scan_status);
5770 }
5771 
5772 static s32
5773 brcmf_notify_tdls_peer_event(struct brcmf_if *ifp,
5774 			     const struct brcmf_event_msg *e, void *data)
5775 {
5776 	switch (e->reason) {
5777 	case BRCMF_E_REASON_TDLS_PEER_DISCOVERED:
5778 		brcmf_dbg(TRACE, "TDLS Peer Discovered\n");
5779 		break;
5780 	case BRCMF_E_REASON_TDLS_PEER_CONNECTED:
5781 		brcmf_dbg(TRACE, "TDLS Peer Connected\n");
5782 		brcmf_proto_add_tdls_peer(ifp->drvr, ifp->ifidx, (u8 *)e->addr);
5783 		break;
5784 	case BRCMF_E_REASON_TDLS_PEER_DISCONNECTED:
5785 		brcmf_dbg(TRACE, "TDLS Peer Disconnected\n");
5786 		brcmf_proto_delete_peer(ifp->drvr, ifp->ifidx, (u8 *)e->addr);
5787 		break;
5788 	}
5789 
5790 	return 0;
5791 }
5792 
5793 static int brcmf_convert_nl80211_tdls_oper(enum nl80211_tdls_operation oper)
5794 {
5795 	int ret;
5796 
5797 	switch (oper) {
5798 	case NL80211_TDLS_DISCOVERY_REQ:
5799 		ret = BRCMF_TDLS_MANUAL_EP_DISCOVERY;
5800 		break;
5801 	case NL80211_TDLS_SETUP:
5802 		ret = BRCMF_TDLS_MANUAL_EP_CREATE;
5803 		break;
5804 	case NL80211_TDLS_TEARDOWN:
5805 		ret = BRCMF_TDLS_MANUAL_EP_DELETE;
5806 		break;
5807 	default:
5808 		brcmf_err("unsupported operation: %d\n", oper);
5809 		ret = -EOPNOTSUPP;
5810 	}
5811 	return ret;
5812 }
5813 
5814 static int brcmf_cfg80211_tdls_oper(struct wiphy *wiphy,
5815 				    struct net_device *ndev, const u8 *peer,
5816 				    enum nl80211_tdls_operation oper)
5817 {
5818 	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
5819 	struct brcmf_pub *drvr = cfg->pub;
5820 	struct brcmf_if *ifp;
5821 	struct brcmf_tdls_iovar_le info;
5822 	int ret = 0;
5823 
5824 	ret = brcmf_convert_nl80211_tdls_oper(oper);
5825 	if (ret < 0)
5826 		return ret;
5827 
5828 	ifp = netdev_priv(ndev);
5829 	memset(&info, 0, sizeof(info));
5830 	info.mode = (u8)ret;
5831 	if (peer)
5832 		memcpy(info.ea, peer, ETH_ALEN);
5833 
5834 	ret = brcmf_fil_iovar_data_set(ifp, "tdls_endpoint",
5835 				       &info, sizeof(info));
5836 	if (ret < 0)
5837 		bphy_err(drvr, "tdls_endpoint iovar failed: ret=%d\n", ret);
5838 
5839 	return ret;
5840 }
5841 
5842 static int
5843 brcmf_cfg80211_update_conn_params(struct wiphy *wiphy,
5844 				  struct net_device *ndev,
5845 				  struct cfg80211_connect_params *sme,
5846 				  u32 changed)
5847 {
5848 	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
5849 	struct brcmf_pub *drvr = cfg->pub;
5850 	struct brcmf_if *ifp;
5851 	int err;
5852 
5853 	if (!(changed & UPDATE_ASSOC_IES))
5854 		return 0;
5855 
5856 	ifp = netdev_priv(ndev);
5857 	err = brcmf_vif_set_mgmt_ie(ifp->vif, BRCMF_VNDR_IE_ASSOCREQ_FLAG,
5858 				    sme->ie, sme->ie_len);
5859 	if (err)
5860 		bphy_err(drvr, "Set Assoc REQ IE Failed\n");
5861 	else
5862 		brcmf_dbg(TRACE, "Applied Vndr IEs for Assoc request\n");
5863 
5864 	return err;
5865 }
5866 
5867 #ifdef CONFIG_PM
5868 static int
5869 brcmf_cfg80211_set_rekey_data(struct wiphy *wiphy, struct net_device *ndev,
5870 			      struct cfg80211_gtk_rekey_data *gtk)
5871 {
5872 	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
5873 	struct brcmf_pub *drvr = cfg->pub;
5874 	struct brcmf_if *ifp = netdev_priv(ndev);
5875 	struct brcmf_gtk_keyinfo_le gtk_le;
5876 	int ret;
5877 
5878 	brcmf_dbg(TRACE, "Enter, bssidx=%d\n", ifp->bsscfgidx);
5879 
5880 	memcpy(gtk_le.kck, gtk->kck, sizeof(gtk_le.kck));
5881 	memcpy(gtk_le.kek, gtk->kek, sizeof(gtk_le.kek));
5882 	memcpy(gtk_le.replay_counter, gtk->replay_ctr,
5883 	       sizeof(gtk_le.replay_counter));
5884 
5885 	ret = brcmf_fil_iovar_data_set(ifp, "gtk_key_info", &gtk_le,
5886 				       sizeof(gtk_le));
5887 	if (ret < 0)
5888 		bphy_err(drvr, "gtk_key_info iovar failed: ret=%d\n", ret);
5889 
5890 	return ret;
5891 }
5892 #endif
5893 
5894 static int brcmf_cfg80211_set_pmk(struct wiphy *wiphy, struct net_device *dev,
5895 				  const struct cfg80211_pmk_conf *conf)
5896 {
5897 	struct brcmf_if *ifp;
5898 
5899 	brcmf_dbg(TRACE, "enter\n");
5900 
5901 	/* expect using firmware supplicant for 1X */
5902 	ifp = netdev_priv(dev);
5903 	if (WARN_ON(ifp->vif->profile.use_fwsup != BRCMF_PROFILE_FWSUP_1X))
5904 		return -EINVAL;
5905 
5906 	if (conf->pmk_len > BRCMF_WSEC_MAX_PSK_LEN)
5907 		return -ERANGE;
5908 
5909 	return brcmf_set_pmk(ifp, conf->pmk, conf->pmk_len);
5910 }
5911 
5912 static int brcmf_cfg80211_del_pmk(struct wiphy *wiphy, struct net_device *dev,
5913 				  const u8 *aa)
5914 {
5915 	struct brcmf_if *ifp;
5916 
5917 	brcmf_dbg(TRACE, "enter\n");
5918 	ifp = netdev_priv(dev);
5919 	if (WARN_ON(ifp->vif->profile.use_fwsup != BRCMF_PROFILE_FWSUP_1X))
5920 		return -EINVAL;
5921 
5922 	return brcmf_set_pmk(ifp, NULL, 0);
5923 }
5924 
5925 static struct cfg80211_ops brcmf_cfg80211_ops = {
5926 	.add_virtual_intf = brcmf_cfg80211_add_iface,
5927 	.del_virtual_intf = brcmf_cfg80211_del_iface,
5928 	.change_virtual_intf = brcmf_cfg80211_change_iface,
5929 	.scan = brcmf_cfg80211_scan,
5930 	.set_wiphy_params = brcmf_cfg80211_set_wiphy_params,
5931 	.join_ibss = brcmf_cfg80211_join_ibss,
5932 	.leave_ibss = brcmf_cfg80211_leave_ibss,
5933 	.get_station = brcmf_cfg80211_get_station,
5934 	.dump_station = brcmf_cfg80211_dump_station,
5935 	.set_tx_power = brcmf_cfg80211_set_tx_power,
5936 	.get_tx_power = brcmf_cfg80211_get_tx_power,
5937 	.add_key = brcmf_cfg80211_add_key,
5938 	.del_key = brcmf_cfg80211_del_key,
5939 	.get_key = brcmf_cfg80211_get_key,
5940 	.set_default_key = brcmf_cfg80211_config_default_key,
5941 	.set_default_mgmt_key = brcmf_cfg80211_config_default_mgmt_key,
5942 	.set_power_mgmt = brcmf_cfg80211_set_power_mgmt,
5943 	.connect = brcmf_cfg80211_connect,
5944 	.disconnect = brcmf_cfg80211_disconnect,
5945 	.suspend = brcmf_cfg80211_suspend,
5946 	.resume = brcmf_cfg80211_resume,
5947 	.set_pmksa = brcmf_cfg80211_set_pmksa,
5948 	.del_pmksa = brcmf_cfg80211_del_pmksa,
5949 	.flush_pmksa = brcmf_cfg80211_flush_pmksa,
5950 	.start_ap = brcmf_cfg80211_start_ap,
5951 	.stop_ap = brcmf_cfg80211_stop_ap,
5952 	.change_beacon = brcmf_cfg80211_change_beacon,
5953 	.del_station = brcmf_cfg80211_del_station,
5954 	.change_station = brcmf_cfg80211_change_station,
5955 	.sched_scan_start = brcmf_cfg80211_sched_scan_start,
5956 	.sched_scan_stop = brcmf_cfg80211_sched_scan_stop,
5957 	.update_mgmt_frame_registrations =
5958 		brcmf_cfg80211_update_mgmt_frame_registrations,
5959 	.mgmt_tx = brcmf_cfg80211_mgmt_tx,
5960 	.set_cqm_rssi_range_config = brcmf_cfg80211_set_cqm_rssi_range_config,
5961 	.remain_on_channel = brcmf_p2p_remain_on_channel,
5962 	.cancel_remain_on_channel = brcmf_cfg80211_cancel_remain_on_channel,
5963 	.get_channel = brcmf_cfg80211_get_channel,
5964 	.start_p2p_device = brcmf_p2p_start_device,
5965 	.stop_p2p_device = brcmf_p2p_stop_device,
5966 	.crit_proto_start = brcmf_cfg80211_crit_proto_start,
5967 	.crit_proto_stop = brcmf_cfg80211_crit_proto_stop,
5968 	.tdls_oper = brcmf_cfg80211_tdls_oper,
5969 	.update_connect_params = brcmf_cfg80211_update_conn_params,
5970 	.set_pmk = brcmf_cfg80211_set_pmk,
5971 	.del_pmk = brcmf_cfg80211_del_pmk,
5972 };
5973 
5974 struct cfg80211_ops *brcmf_cfg80211_get_ops(struct brcmf_mp_device *settings)
5975 {
5976 	struct cfg80211_ops *ops;
5977 
5978 	ops = kmemdup(&brcmf_cfg80211_ops, sizeof(brcmf_cfg80211_ops),
5979 		       GFP_KERNEL);
5980 
5981 	if (ops && settings->roamoff)
5982 		ops->update_connect_params = NULL;
5983 
5984 	return ops;
5985 }
5986 
5987 struct brcmf_cfg80211_vif *brcmf_alloc_vif(struct brcmf_cfg80211_info *cfg,
5988 					   enum nl80211_iftype type)
5989 {
5990 	struct brcmf_cfg80211_vif *vif_walk;
5991 	struct brcmf_cfg80211_vif *vif;
5992 	bool mbss;
5993 	struct brcmf_if *ifp = brcmf_get_ifp(cfg->pub, 0);
5994 
5995 	brcmf_dbg(TRACE, "allocating virtual interface (size=%zu)\n",
5996 		  sizeof(*vif));
5997 	vif = kzalloc(sizeof(*vif), GFP_KERNEL);
5998 	if (!vif)
5999 		return ERR_PTR(-ENOMEM);
6000 
6001 	vif->wdev.wiphy = cfg->wiphy;
6002 	vif->wdev.iftype = type;
6003 
6004 	brcmf_init_prof(&vif->profile);
6005 
6006 	if (type == NL80211_IFTYPE_AP &&
6007 	    brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MBSS)) {
6008 		mbss = false;
6009 		list_for_each_entry(vif_walk, &cfg->vif_list, list) {
6010 			if (vif_walk->wdev.iftype == NL80211_IFTYPE_AP) {
6011 				mbss = true;
6012 				break;
6013 			}
6014 		}
6015 		vif->mbss = mbss;
6016 	}
6017 
6018 	list_add_tail(&vif->list, &cfg->vif_list);
6019 	return vif;
6020 }
6021 
6022 void brcmf_free_vif(struct brcmf_cfg80211_vif *vif)
6023 {
6024 	list_del(&vif->list);
6025 	kfree(vif);
6026 }
6027 
6028 void brcmf_cfg80211_free_netdev(struct net_device *ndev)
6029 {
6030 	struct brcmf_cfg80211_vif *vif;
6031 	struct brcmf_if *ifp;
6032 
6033 	ifp = netdev_priv(ndev);
6034 	vif = ifp->vif;
6035 
6036 	if (vif)
6037 		brcmf_free_vif(vif);
6038 }
6039 
6040 static bool brcmf_is_linkup(struct brcmf_cfg80211_vif *vif,
6041 			    const struct brcmf_event_msg *e)
6042 {
6043 	u32 event = e->event_code;
6044 	u32 status = e->status;
6045 
6046 	if ((vif->profile.use_fwsup == BRCMF_PROFILE_FWSUP_PSK ||
6047 	     vif->profile.use_fwsup == BRCMF_PROFILE_FWSUP_SAE) &&
6048 	    event == BRCMF_E_PSK_SUP &&
6049 	    status == BRCMF_E_STATUS_FWSUP_COMPLETED)
6050 		set_bit(BRCMF_VIF_STATUS_EAP_SUCCESS, &vif->sme_state);
6051 	if (event == BRCMF_E_SET_SSID && status == BRCMF_E_STATUS_SUCCESS) {
6052 		brcmf_dbg(CONN, "Processing set ssid\n");
6053 		memcpy(vif->profile.bssid, e->addr, ETH_ALEN);
6054 		if (vif->profile.use_fwsup != BRCMF_PROFILE_FWSUP_PSK &&
6055 		    vif->profile.use_fwsup != BRCMF_PROFILE_FWSUP_SAE)
6056 			return true;
6057 
6058 		set_bit(BRCMF_VIF_STATUS_ASSOC_SUCCESS, &vif->sme_state);
6059 	}
6060 
6061 	if (test_bit(BRCMF_VIF_STATUS_EAP_SUCCESS, &vif->sme_state) &&
6062 	    test_bit(BRCMF_VIF_STATUS_ASSOC_SUCCESS, &vif->sme_state)) {
6063 		clear_bit(BRCMF_VIF_STATUS_EAP_SUCCESS, &vif->sme_state);
6064 		clear_bit(BRCMF_VIF_STATUS_ASSOC_SUCCESS, &vif->sme_state);
6065 		return true;
6066 	}
6067 	return false;
6068 }
6069 
6070 static bool brcmf_is_linkdown(struct brcmf_cfg80211_vif *vif,
6071 			    const struct brcmf_event_msg *e)
6072 {
6073 	u32 event = e->event_code;
6074 	u16 flags = e->flags;
6075 
6076 	if ((event == BRCMF_E_DEAUTH) || (event == BRCMF_E_DEAUTH_IND) ||
6077 	    (event == BRCMF_E_DISASSOC_IND) ||
6078 	    ((event == BRCMF_E_LINK) && (!(flags & BRCMF_EVENT_MSG_LINK)))) {
6079 		brcmf_dbg(CONN, "Processing link down\n");
6080 		clear_bit(BRCMF_VIF_STATUS_EAP_SUCCESS, &vif->sme_state);
6081 		clear_bit(BRCMF_VIF_STATUS_ASSOC_SUCCESS, &vif->sme_state);
6082 		return true;
6083 	}
6084 	return false;
6085 }
6086 
6087 static bool brcmf_is_nonetwork(struct brcmf_cfg80211_info *cfg,
6088 			       const struct brcmf_event_msg *e)
6089 {
6090 	u32 event = e->event_code;
6091 	u32 status = e->status;
6092 
6093 	if (event == BRCMF_E_LINK && status == BRCMF_E_STATUS_NO_NETWORKS) {
6094 		brcmf_dbg(CONN, "Processing Link %s & no network found\n",
6095 			  e->flags & BRCMF_EVENT_MSG_LINK ? "up" : "down");
6096 		return true;
6097 	}
6098 
6099 	if (event == BRCMF_E_SET_SSID && status != BRCMF_E_STATUS_SUCCESS) {
6100 		brcmf_dbg(CONN, "Processing connecting & no network found\n");
6101 		return true;
6102 	}
6103 
6104 	if (event == BRCMF_E_PSK_SUP &&
6105 	    status != BRCMF_E_STATUS_FWSUP_COMPLETED) {
6106 		brcmf_dbg(CONN, "Processing failed supplicant state: %u\n",
6107 			  status);
6108 		return true;
6109 	}
6110 
6111 	return false;
6112 }
6113 
6114 static void brcmf_clear_assoc_ies(struct brcmf_cfg80211_info *cfg)
6115 {
6116 	struct brcmf_cfg80211_connect_info *conn_info = cfg_to_conn(cfg);
6117 
6118 	kfree(conn_info->req_ie);
6119 	conn_info->req_ie = NULL;
6120 	conn_info->req_ie_len = 0;
6121 	kfree(conn_info->resp_ie);
6122 	conn_info->resp_ie = NULL;
6123 	conn_info->resp_ie_len = 0;
6124 }
6125 
6126 u8 brcmf_map_prio_to_prec(void *config, u8 prio)
6127 {
6128 	struct brcmf_cfg80211_info *cfg = (struct brcmf_cfg80211_info *)config;
6129 
6130 	if (!cfg)
6131 		return (prio == PRIO_8021D_NONE || prio == PRIO_8021D_BE) ?
6132 		       (prio ^ 2) : prio;
6133 
6134 	/* For those AC(s) with ACM flag set to 1, convert its 4-level priority
6135 	 * to an 8-level precedence which is the same as BE's
6136 	 */
6137 	if (prio > PRIO_8021D_EE &&
6138 	    cfg->ac_priority[prio] == cfg->ac_priority[PRIO_8021D_BE])
6139 		return cfg->ac_priority[prio] * 2;
6140 
6141 	/* Conversion of 4-level priority to 8-level precedence */
6142 	if (prio == PRIO_8021D_BE || prio == PRIO_8021D_BK ||
6143 	    prio == PRIO_8021D_CL || prio == PRIO_8021D_VO)
6144 		return cfg->ac_priority[prio] * 2;
6145 	else
6146 		return cfg->ac_priority[prio] * 2 + 1;
6147 }
6148 
6149 u8 brcmf_map_prio_to_aci(void *config, u8 prio)
6150 {
6151 	/* Prio here refers to the 802.1d priority in range of 0 to 7.
6152 	 * ACI here refers to the WLAN AC Index in range of 0 to 3.
6153 	 * This function will return ACI corresponding to input prio.
6154 	 */
6155 	struct brcmf_cfg80211_info *cfg = (struct brcmf_cfg80211_info *)config;
6156 
6157 	if (cfg)
6158 		return cfg->ac_priority[prio];
6159 
6160 	return prio;
6161 }
6162 
6163 static void brcmf_init_wmm_prio(u8 *priority)
6164 {
6165 	/* Initialize AC priority array to default
6166 	 * 802.1d priority as per following table:
6167 	 * 802.1d prio 0,3 maps to BE
6168 	 * 802.1d prio 1,2 maps to BK
6169 	 * 802.1d prio 4,5 maps to VI
6170 	 * 802.1d prio 6,7 maps to VO
6171 	 */
6172 	priority[0] = BRCMF_FWS_FIFO_AC_BE;
6173 	priority[3] = BRCMF_FWS_FIFO_AC_BE;
6174 	priority[1] = BRCMF_FWS_FIFO_AC_BK;
6175 	priority[2] = BRCMF_FWS_FIFO_AC_BK;
6176 	priority[4] = BRCMF_FWS_FIFO_AC_VI;
6177 	priority[5] = BRCMF_FWS_FIFO_AC_VI;
6178 	priority[6] = BRCMF_FWS_FIFO_AC_VO;
6179 	priority[7] = BRCMF_FWS_FIFO_AC_VO;
6180 }
6181 
6182 static void brcmf_wifi_prioritize_acparams(const
6183 	struct brcmf_cfg80211_edcf_acparam *acp, u8 *priority)
6184 {
6185 	u8 aci;
6186 	u8 aifsn;
6187 	u8 ecwmin;
6188 	u8 ecwmax;
6189 	u8 acm;
6190 	u8 ranking_basis[EDCF_AC_COUNT];
6191 	u8 aci_prio[EDCF_AC_COUNT]; /* AC_BE, AC_BK, AC_VI, AC_VO */
6192 	u8 index;
6193 
6194 	for (aci = 0; aci < EDCF_AC_COUNT; aci++, acp++) {
6195 		aifsn  = acp->ACI & EDCF_AIFSN_MASK;
6196 		acm = (acp->ACI & EDCF_ACM_MASK) ? 1 : 0;
6197 		ecwmin = acp->ECW & EDCF_ECWMIN_MASK;
6198 		ecwmax = (acp->ECW & EDCF_ECWMAX_MASK) >> EDCF_ECWMAX_SHIFT;
6199 		brcmf_dbg(CONN, "ACI %d aifsn %d acm %d ecwmin %d ecwmax %d\n",
6200 			  aci, aifsn, acm, ecwmin, ecwmax);
6201 		/* Default AC_VO will be the lowest ranking value */
6202 		ranking_basis[aci] = aifsn + ecwmin + ecwmax;
6203 		/* Initialise priority starting at 0 (AC_BE) */
6204 		aci_prio[aci] = 0;
6205 
6206 		/* If ACM is set, STA can't use this AC as per 802.11.
6207 		 * Change the ranking to BE
6208 		 */
6209 		if (aci != AC_BE && aci != AC_BK && acm == 1)
6210 			ranking_basis[aci] = ranking_basis[AC_BE];
6211 	}
6212 
6213 	/* Ranking method which works for AC priority
6214 	 * swapping when values for cwmin, cwmax and aifsn are varied
6215 	 * Compare each aci_prio against each other aci_prio
6216 	 */
6217 	for (aci = 0; aci < EDCF_AC_COUNT; aci++) {
6218 		for (index = 0; index < EDCF_AC_COUNT; index++) {
6219 			if (index != aci) {
6220 				/* Smaller ranking value has higher priority,
6221 				 * so increment priority for each ACI which has
6222 				 * a higher ranking value
6223 				 */
6224 				if (ranking_basis[aci] < ranking_basis[index])
6225 					aci_prio[aci]++;
6226 			}
6227 		}
6228 	}
6229 
6230 	/* By now, aci_prio[] will be in range of 0 to 3.
6231 	 * Use ACI prio to get the new priority value for
6232 	 * each 802.1d traffic type, in this range.
6233 	 */
6234 	if (!(aci_prio[AC_BE] == aci_prio[AC_BK] &&
6235 	      aci_prio[AC_BK] == aci_prio[AC_VI] &&
6236 	      aci_prio[AC_VI] == aci_prio[AC_VO])) {
6237 		/* 802.1d 0,3 maps to BE */
6238 		priority[0] = aci_prio[AC_BE];
6239 		priority[3] = aci_prio[AC_BE];
6240 
6241 		/* 802.1d 1,2 maps to BK */
6242 		priority[1] = aci_prio[AC_BK];
6243 		priority[2] = aci_prio[AC_BK];
6244 
6245 		/* 802.1d 4,5 maps to VO */
6246 		priority[4] = aci_prio[AC_VI];
6247 		priority[5] = aci_prio[AC_VI];
6248 
6249 		/* 802.1d 6,7 maps to VO */
6250 		priority[6] = aci_prio[AC_VO];
6251 		priority[7] = aci_prio[AC_VO];
6252 	} else {
6253 		/* Initialize to default priority */
6254 		brcmf_init_wmm_prio(priority);
6255 	}
6256 
6257 	brcmf_dbg(CONN, "Adj prio BE 0->%d, BK 1->%d, BK 2->%d, BE 3->%d\n",
6258 		  priority[0], priority[1], priority[2], priority[3]);
6259 
6260 	brcmf_dbg(CONN, "Adj prio VI 4->%d, VI 5->%d, VO 6->%d, VO 7->%d\n",
6261 		  priority[4], priority[5], priority[6], priority[7]);
6262 }
6263 
6264 static s32 brcmf_get_assoc_ies(struct brcmf_cfg80211_info *cfg,
6265 			       struct brcmf_if *ifp)
6266 {
6267 	struct brcmf_pub *drvr = cfg->pub;
6268 	struct brcmf_cfg80211_assoc_ielen_le *assoc_info;
6269 	struct brcmf_cfg80211_connect_info *conn_info = cfg_to_conn(cfg);
6270 	struct brcmf_cfg80211_edcf_acparam edcf_acparam_info[EDCF_AC_COUNT];
6271 	u32 req_len;
6272 	u32 resp_len;
6273 	s32 err = 0;
6274 
6275 	brcmf_clear_assoc_ies(cfg);
6276 
6277 	err = brcmf_fil_iovar_data_get(ifp, "assoc_info",
6278 				       cfg->extra_buf, WL_ASSOC_INFO_MAX);
6279 	if (err) {
6280 		bphy_err(drvr, "could not get assoc info (%d)\n", err);
6281 		return err;
6282 	}
6283 	assoc_info =
6284 		(struct brcmf_cfg80211_assoc_ielen_le *)cfg->extra_buf;
6285 	req_len = le32_to_cpu(assoc_info->req_len);
6286 	resp_len = le32_to_cpu(assoc_info->resp_len);
6287 	if (req_len > WL_EXTRA_BUF_MAX || resp_len > WL_EXTRA_BUF_MAX) {
6288 		bphy_err(drvr, "invalid lengths in assoc info: req %u resp %u\n",
6289 			 req_len, resp_len);
6290 		return -EINVAL;
6291 	}
6292 	if (req_len) {
6293 		err = brcmf_fil_iovar_data_get(ifp, "assoc_req_ies",
6294 					       cfg->extra_buf,
6295 					       WL_ASSOC_INFO_MAX);
6296 		if (err) {
6297 			bphy_err(drvr, "could not get assoc req (%d)\n", err);
6298 			return err;
6299 		}
6300 		conn_info->req_ie_len = req_len;
6301 		conn_info->req_ie =
6302 		    kmemdup(cfg->extra_buf, conn_info->req_ie_len,
6303 			    GFP_KERNEL);
6304 		if (!conn_info->req_ie)
6305 			conn_info->req_ie_len = 0;
6306 	} else {
6307 		conn_info->req_ie_len = 0;
6308 		conn_info->req_ie = NULL;
6309 	}
6310 	if (resp_len) {
6311 		err = brcmf_fil_iovar_data_get(ifp, "assoc_resp_ies",
6312 					       cfg->extra_buf,
6313 					       WL_ASSOC_INFO_MAX);
6314 		if (err) {
6315 			bphy_err(drvr, "could not get assoc resp (%d)\n", err);
6316 			return err;
6317 		}
6318 		conn_info->resp_ie_len = resp_len;
6319 		conn_info->resp_ie =
6320 		    kmemdup(cfg->extra_buf, conn_info->resp_ie_len,
6321 			    GFP_KERNEL);
6322 		if (!conn_info->resp_ie)
6323 			conn_info->resp_ie_len = 0;
6324 
6325 		err = brcmf_fil_iovar_data_get(ifp, "wme_ac_sta",
6326 					       edcf_acparam_info,
6327 					       sizeof(edcf_acparam_info));
6328 		if (err) {
6329 			brcmf_err("could not get wme_ac_sta (%d)\n", err);
6330 			return err;
6331 		}
6332 
6333 		brcmf_wifi_prioritize_acparams(edcf_acparam_info,
6334 					       cfg->ac_priority);
6335 	} else {
6336 		conn_info->resp_ie_len = 0;
6337 		conn_info->resp_ie = NULL;
6338 	}
6339 	brcmf_dbg(CONN, "req len (%d) resp len (%d)\n",
6340 		  conn_info->req_ie_len, conn_info->resp_ie_len);
6341 
6342 	return err;
6343 }
6344 
6345 static s32
6346 brcmf_bss_roaming_done(struct brcmf_cfg80211_info *cfg,
6347 		       struct net_device *ndev,
6348 		       const struct brcmf_event_msg *e)
6349 {
6350 	struct brcmf_if *ifp = netdev_priv(ndev);
6351 	struct brcmf_cfg80211_profile *profile = &ifp->vif->profile;
6352 	struct brcmf_cfg80211_connect_info *conn_info = cfg_to_conn(cfg);
6353 	struct wiphy *wiphy = cfg_to_wiphy(cfg);
6354 	struct ieee80211_channel *notify_channel = NULL;
6355 	struct ieee80211_supported_band *band;
6356 	struct brcmf_bss_info_le *bi;
6357 	struct brcmu_chan ch;
6358 	struct cfg80211_roam_info roam_info = {};
6359 	u32 freq;
6360 	s32 err = 0;
6361 	u8 *buf;
6362 
6363 	brcmf_dbg(TRACE, "Enter\n");
6364 
6365 	brcmf_get_assoc_ies(cfg, ifp);
6366 	memcpy(profile->bssid, e->addr, ETH_ALEN);
6367 	brcmf_update_bss_info(cfg, ifp);
6368 
6369 	buf = kzalloc(WL_BSS_INFO_MAX, GFP_KERNEL);
6370 	if (buf == NULL) {
6371 		err = -ENOMEM;
6372 		goto done;
6373 	}
6374 
6375 	/* data sent to dongle has to be little endian */
6376 	*(__le32 *)buf = cpu_to_le32(WL_BSS_INFO_MAX);
6377 	err = brcmf_fil_cmd_data_get(ifp, BRCMF_C_GET_BSS_INFO,
6378 				     buf, WL_BSS_INFO_MAX);
6379 
6380 	if (err)
6381 		goto done;
6382 
6383 	bi = (struct brcmf_bss_info_le *)(buf + 4);
6384 	ch.chspec = le16_to_cpu(bi->chanspec);
6385 	cfg->d11inf.decchspec(&ch);
6386 
6387 	if (ch.band == BRCMU_CHAN_BAND_2G)
6388 		band = wiphy->bands[NL80211_BAND_2GHZ];
6389 	else
6390 		band = wiphy->bands[NL80211_BAND_5GHZ];
6391 
6392 	freq = ieee80211_channel_to_frequency(ch.control_ch_num, band->band);
6393 	notify_channel = ieee80211_get_channel(wiphy, freq);
6394 
6395 done:
6396 	kfree(buf);
6397 
6398 	roam_info.links[0].channel = notify_channel;
6399 	roam_info.links[0].bssid = profile->bssid;
6400 	roam_info.req_ie = conn_info->req_ie;
6401 	roam_info.req_ie_len = conn_info->req_ie_len;
6402 	roam_info.resp_ie = conn_info->resp_ie;
6403 	roam_info.resp_ie_len = conn_info->resp_ie_len;
6404 
6405 	cfg80211_roamed(ndev, &roam_info, GFP_KERNEL);
6406 	brcmf_dbg(CONN, "Report roaming result\n");
6407 
6408 	if (profile->use_fwsup == BRCMF_PROFILE_FWSUP_1X && profile->is_ft) {
6409 		cfg80211_port_authorized(ndev, profile->bssid, NULL, 0, GFP_KERNEL);
6410 		brcmf_dbg(CONN, "Report port authorized\n");
6411 	}
6412 
6413 	set_bit(BRCMF_VIF_STATUS_CONNECTED, &ifp->vif->sme_state);
6414 	brcmf_dbg(TRACE, "Exit\n");
6415 	return err;
6416 }
6417 
6418 static s32
6419 brcmf_bss_connect_done(struct brcmf_cfg80211_info *cfg,
6420 		       struct net_device *ndev, const struct brcmf_event_msg *e,
6421 		       bool completed)
6422 {
6423 	struct brcmf_if *ifp = netdev_priv(ndev);
6424 	struct brcmf_cfg80211_profile *profile = &ifp->vif->profile;
6425 	struct brcmf_cfg80211_connect_info *conn_info = cfg_to_conn(cfg);
6426 	struct cfg80211_connect_resp_params conn_params;
6427 
6428 	brcmf_dbg(TRACE, "Enter\n");
6429 
6430 	if (test_and_clear_bit(BRCMF_VIF_STATUS_CONNECTING,
6431 			       &ifp->vif->sme_state)) {
6432 		memset(&conn_params, 0, sizeof(conn_params));
6433 		if (completed) {
6434 			brcmf_get_assoc_ies(cfg, ifp);
6435 			brcmf_update_bss_info(cfg, ifp);
6436 			set_bit(BRCMF_VIF_STATUS_CONNECTED,
6437 				&ifp->vif->sme_state);
6438 			conn_params.status = WLAN_STATUS_SUCCESS;
6439 		} else {
6440 			clear_bit(BRCMF_VIF_STATUS_EAP_SUCCESS,
6441 				  &ifp->vif->sme_state);
6442 			clear_bit(BRCMF_VIF_STATUS_ASSOC_SUCCESS,
6443 				  &ifp->vif->sme_state);
6444 			conn_params.status = WLAN_STATUS_AUTH_TIMEOUT;
6445 		}
6446 		conn_params.links[0].bssid = profile->bssid;
6447 		conn_params.req_ie = conn_info->req_ie;
6448 		conn_params.req_ie_len = conn_info->req_ie_len;
6449 		conn_params.resp_ie = conn_info->resp_ie;
6450 		conn_params.resp_ie_len = conn_info->resp_ie_len;
6451 		cfg80211_connect_done(ndev, &conn_params, GFP_KERNEL);
6452 		brcmf_dbg(CONN, "Report connect result - connection %s\n",
6453 			  completed ? "succeeded" : "failed");
6454 	}
6455 	brcmf_dbg(TRACE, "Exit\n");
6456 	return 0;
6457 }
6458 
6459 static s32
6460 brcmf_notify_connect_status_ap(struct brcmf_cfg80211_info *cfg,
6461 			       struct net_device *ndev,
6462 			       const struct brcmf_event_msg *e, void *data)
6463 {
6464 	struct brcmf_pub *drvr = cfg->pub;
6465 	static int generation;
6466 	u32 event = e->event_code;
6467 	u32 reason = e->reason;
6468 	struct station_info *sinfo;
6469 
6470 	brcmf_dbg(CONN, "event %s (%u), reason %d\n",
6471 		  brcmf_fweh_event_name(event), event, reason);
6472 	if (event == BRCMF_E_LINK && reason == BRCMF_E_REASON_LINK_BSSCFG_DIS &&
6473 	    ndev != cfg_to_ndev(cfg)) {
6474 		brcmf_dbg(CONN, "AP mode link down\n");
6475 		complete(&cfg->vif_disabled);
6476 		return 0;
6477 	}
6478 
6479 	if (((event == BRCMF_E_ASSOC_IND) || (event == BRCMF_E_REASSOC_IND)) &&
6480 	    (reason == BRCMF_E_STATUS_SUCCESS)) {
6481 		if (!data) {
6482 			bphy_err(drvr, "No IEs present in ASSOC/REASSOC_IND\n");
6483 			return -EINVAL;
6484 		}
6485 
6486 		sinfo = kzalloc(sizeof(*sinfo), GFP_KERNEL);
6487 		if (!sinfo)
6488 			return -ENOMEM;
6489 
6490 		sinfo->assoc_req_ies = data;
6491 		sinfo->assoc_req_ies_len = e->datalen;
6492 		generation++;
6493 		sinfo->generation = generation;
6494 		cfg80211_new_sta(ndev, e->addr, sinfo, GFP_KERNEL);
6495 
6496 		kfree(sinfo);
6497 	} else if ((event == BRCMF_E_DISASSOC_IND) ||
6498 		   (event == BRCMF_E_DEAUTH_IND) ||
6499 		   (event == BRCMF_E_DEAUTH)) {
6500 		cfg80211_del_sta(ndev, e->addr, GFP_KERNEL);
6501 	}
6502 	return 0;
6503 }
6504 
6505 static s32
6506 brcmf_notify_connect_status(struct brcmf_if *ifp,
6507 			    const struct brcmf_event_msg *e, void *data)
6508 {
6509 	struct brcmf_cfg80211_info *cfg = ifp->drvr->config;
6510 	struct net_device *ndev = ifp->ndev;
6511 	struct brcmf_cfg80211_profile *profile = &ifp->vif->profile;
6512 	struct ieee80211_channel *chan;
6513 	s32 err = 0;
6514 
6515 	if ((e->event_code == BRCMF_E_DEAUTH) ||
6516 	    (e->event_code == BRCMF_E_DEAUTH_IND) ||
6517 	    (e->event_code == BRCMF_E_DISASSOC_IND) ||
6518 	    ((e->event_code == BRCMF_E_LINK) && (!e->flags))) {
6519 		brcmf_proto_delete_peer(ifp->drvr, ifp->ifidx, (u8 *)e->addr);
6520 	}
6521 
6522 	if (brcmf_is_apmode(ifp->vif)) {
6523 		err = brcmf_notify_connect_status_ap(cfg, ndev, e, data);
6524 	} else if (brcmf_is_linkup(ifp->vif, e)) {
6525 		brcmf_dbg(CONN, "Linkup\n");
6526 		if (brcmf_is_ibssmode(ifp->vif)) {
6527 			brcmf_inform_ibss(cfg, ndev, e->addr);
6528 			chan = ieee80211_get_channel(cfg->wiphy, cfg->channel);
6529 			memcpy(profile->bssid, e->addr, ETH_ALEN);
6530 			cfg80211_ibss_joined(ndev, e->addr, chan, GFP_KERNEL);
6531 			clear_bit(BRCMF_VIF_STATUS_CONNECTING,
6532 				  &ifp->vif->sme_state);
6533 			set_bit(BRCMF_VIF_STATUS_CONNECTED,
6534 				&ifp->vif->sme_state);
6535 		} else
6536 			brcmf_bss_connect_done(cfg, ndev, e, true);
6537 		brcmf_net_setcarrier(ifp, true);
6538 	} else if (brcmf_is_linkdown(ifp->vif, e)) {
6539 		brcmf_dbg(CONN, "Linkdown\n");
6540 		if (!brcmf_is_ibssmode(ifp->vif) &&
6541 		    (test_bit(BRCMF_VIF_STATUS_CONNECTED,
6542 			      &ifp->vif->sme_state) ||
6543 		     test_bit(BRCMF_VIF_STATUS_CONNECTING,
6544 			      &ifp->vif->sme_state))) {
6545 			if (test_bit(BRCMF_VIF_STATUS_CONNECTED,
6546 				     &ifp->vif->sme_state) &&
6547 			    memcmp(profile->bssid, e->addr, ETH_ALEN))
6548 				return err;
6549 
6550 			brcmf_bss_connect_done(cfg, ndev, e, false);
6551 			brcmf_link_down(ifp->vif,
6552 					brcmf_map_fw_linkdown_reason(e),
6553 					e->event_code &
6554 					(BRCMF_E_DEAUTH_IND |
6555 					BRCMF_E_DISASSOC_IND)
6556 					? false : true);
6557 			brcmf_init_prof(ndev_to_prof(ndev));
6558 			if (ndev != cfg_to_ndev(cfg))
6559 				complete(&cfg->vif_disabled);
6560 			brcmf_net_setcarrier(ifp, false);
6561 		}
6562 	} else if (brcmf_is_nonetwork(cfg, e)) {
6563 		if (brcmf_is_ibssmode(ifp->vif))
6564 			clear_bit(BRCMF_VIF_STATUS_CONNECTING,
6565 				  &ifp->vif->sme_state);
6566 		else
6567 			brcmf_bss_connect_done(cfg, ndev, e, false);
6568 	}
6569 
6570 	return err;
6571 }
6572 
6573 static s32
6574 brcmf_notify_roaming_status(struct brcmf_if *ifp,
6575 			    const struct brcmf_event_msg *e, void *data)
6576 {
6577 	struct brcmf_cfg80211_info *cfg = ifp->drvr->config;
6578 	u32 event = e->event_code;
6579 	u32 status = e->status;
6580 
6581 	if (event == BRCMF_E_ROAM && status == BRCMF_E_STATUS_SUCCESS) {
6582 		if (test_bit(BRCMF_VIF_STATUS_CONNECTED,
6583 			     &ifp->vif->sme_state)) {
6584 			brcmf_bss_roaming_done(cfg, ifp->ndev, e);
6585 		} else {
6586 			brcmf_bss_connect_done(cfg, ifp->ndev, e, true);
6587 			brcmf_net_setcarrier(ifp, true);
6588 		}
6589 	}
6590 
6591 	return 0;
6592 }
6593 
6594 static s32
6595 brcmf_notify_mic_status(struct brcmf_if *ifp,
6596 			const struct brcmf_event_msg *e, void *data)
6597 {
6598 	u16 flags = e->flags;
6599 	enum nl80211_key_type key_type;
6600 
6601 	if (flags & BRCMF_EVENT_MSG_GROUP)
6602 		key_type = NL80211_KEYTYPE_GROUP;
6603 	else
6604 		key_type = NL80211_KEYTYPE_PAIRWISE;
6605 
6606 	cfg80211_michael_mic_failure(ifp->ndev, (u8 *)&e->addr, key_type, -1,
6607 				     NULL, GFP_KERNEL);
6608 
6609 	return 0;
6610 }
6611 
6612 static s32 brcmf_notify_rssi(struct brcmf_if *ifp,
6613 			     const struct brcmf_event_msg *e, void *data)
6614 {
6615 	struct brcmf_cfg80211_vif *vif = ifp->vif;
6616 	struct brcmf_rssi_be *info = data;
6617 	s32 rssi, snr = 0, noise = 0;
6618 	s32 low, high, last;
6619 
6620 	if (e->datalen >= sizeof(*info)) {
6621 		rssi = be32_to_cpu(info->rssi);
6622 		snr = be32_to_cpu(info->snr);
6623 		noise = be32_to_cpu(info->noise);
6624 	} else if (e->datalen >= sizeof(rssi)) {
6625 		rssi = be32_to_cpu(*(__be32 *)data);
6626 	} else {
6627 		brcmf_err("insufficient RSSI event data\n");
6628 		return 0;
6629 	}
6630 
6631 	low = vif->cqm_rssi_low;
6632 	high = vif->cqm_rssi_high;
6633 	last = vif->cqm_rssi_last;
6634 
6635 	brcmf_dbg(TRACE, "rssi=%d snr=%d noise=%d low=%d high=%d last=%d\n",
6636 		  rssi, snr, noise, low, high, last);
6637 
6638 	vif->cqm_rssi_last = rssi;
6639 
6640 	if (rssi <= low || rssi == 0) {
6641 		brcmf_dbg(INFO, "LOW rssi=%d\n", rssi);
6642 		cfg80211_cqm_rssi_notify(ifp->ndev,
6643 					 NL80211_CQM_RSSI_THRESHOLD_EVENT_LOW,
6644 					 rssi, GFP_KERNEL);
6645 	} else if (rssi > high) {
6646 		brcmf_dbg(INFO, "HIGH rssi=%d\n", rssi);
6647 		cfg80211_cqm_rssi_notify(ifp->ndev,
6648 					 NL80211_CQM_RSSI_THRESHOLD_EVENT_HIGH,
6649 					 rssi, GFP_KERNEL);
6650 	}
6651 
6652 	return 0;
6653 }
6654 
6655 static s32 brcmf_notify_vif_event(struct brcmf_if *ifp,
6656 				  const struct brcmf_event_msg *e, void *data)
6657 {
6658 	struct brcmf_cfg80211_info *cfg = ifp->drvr->config;
6659 	struct brcmf_if_event *ifevent = (struct brcmf_if_event *)data;
6660 	struct brcmf_cfg80211_vif_event *event = &cfg->vif_event;
6661 	struct brcmf_cfg80211_vif *vif;
6662 
6663 	brcmf_dbg(TRACE, "Enter: action %u flags %u ifidx %u bsscfgidx %u\n",
6664 		  ifevent->action, ifevent->flags, ifevent->ifidx,
6665 		  ifevent->bsscfgidx);
6666 
6667 	spin_lock(&event->vif_event_lock);
6668 	event->action = ifevent->action;
6669 	vif = event->vif;
6670 
6671 	switch (ifevent->action) {
6672 	case BRCMF_E_IF_ADD:
6673 		/* waiting process may have timed out */
6674 		if (!cfg->vif_event.vif) {
6675 			spin_unlock(&event->vif_event_lock);
6676 			return -EBADF;
6677 		}
6678 
6679 		ifp->vif = vif;
6680 		vif->ifp = ifp;
6681 		if (ifp->ndev) {
6682 			vif->wdev.netdev = ifp->ndev;
6683 			ifp->ndev->ieee80211_ptr = &vif->wdev;
6684 			SET_NETDEV_DEV(ifp->ndev, wiphy_dev(cfg->wiphy));
6685 		}
6686 		spin_unlock(&event->vif_event_lock);
6687 		wake_up(&event->vif_wq);
6688 		return 0;
6689 
6690 	case BRCMF_E_IF_DEL:
6691 		spin_unlock(&event->vif_event_lock);
6692 		/* event may not be upon user request */
6693 		if (brcmf_cfg80211_vif_event_armed(cfg))
6694 			wake_up(&event->vif_wq);
6695 		return 0;
6696 
6697 	case BRCMF_E_IF_CHANGE:
6698 		spin_unlock(&event->vif_event_lock);
6699 		wake_up(&event->vif_wq);
6700 		return 0;
6701 
6702 	default:
6703 		spin_unlock(&event->vif_event_lock);
6704 		break;
6705 	}
6706 	return -EINVAL;
6707 }
6708 
6709 static void brcmf_init_conf(struct brcmf_cfg80211_conf *conf)
6710 {
6711 	conf->frag_threshold = (u32)-1;
6712 	conf->rts_threshold = (u32)-1;
6713 	conf->retry_short = (u32)-1;
6714 	conf->retry_long = (u32)-1;
6715 }
6716 
6717 static void brcmf_register_event_handlers(struct brcmf_cfg80211_info *cfg)
6718 {
6719 	brcmf_fweh_register(cfg->pub, BRCMF_E_LINK,
6720 			    brcmf_notify_connect_status);
6721 	brcmf_fweh_register(cfg->pub, BRCMF_E_DEAUTH_IND,
6722 			    brcmf_notify_connect_status);
6723 	brcmf_fweh_register(cfg->pub, BRCMF_E_DEAUTH,
6724 			    brcmf_notify_connect_status);
6725 	brcmf_fweh_register(cfg->pub, BRCMF_E_DISASSOC_IND,
6726 			    brcmf_notify_connect_status);
6727 	brcmf_fweh_register(cfg->pub, BRCMF_E_ASSOC_IND,
6728 			    brcmf_notify_connect_status);
6729 	brcmf_fweh_register(cfg->pub, BRCMF_E_REASSOC_IND,
6730 			    brcmf_notify_connect_status);
6731 	brcmf_fweh_register(cfg->pub, BRCMF_E_ROAM,
6732 			    brcmf_notify_roaming_status);
6733 	brcmf_fweh_register(cfg->pub, BRCMF_E_MIC_ERROR,
6734 			    brcmf_notify_mic_status);
6735 	brcmf_fweh_register(cfg->pub, BRCMF_E_SET_SSID,
6736 			    brcmf_notify_connect_status);
6737 	brcmf_fweh_register(cfg->pub, BRCMF_E_PFN_NET_FOUND,
6738 			    brcmf_notify_sched_scan_results);
6739 	brcmf_fweh_register(cfg->pub, BRCMF_E_IF,
6740 			    brcmf_notify_vif_event);
6741 	brcmf_fweh_register(cfg->pub, BRCMF_E_P2P_PROBEREQ_MSG,
6742 			    brcmf_p2p_notify_rx_mgmt_p2p_probereq);
6743 	brcmf_fweh_register(cfg->pub, BRCMF_E_P2P_DISC_LISTEN_COMPLETE,
6744 			    brcmf_p2p_notify_listen_complete);
6745 	brcmf_fweh_register(cfg->pub, BRCMF_E_ACTION_FRAME_RX,
6746 			    brcmf_p2p_notify_action_frame_rx);
6747 	brcmf_fweh_register(cfg->pub, BRCMF_E_ACTION_FRAME_COMPLETE,
6748 			    brcmf_p2p_notify_action_tx_complete);
6749 	brcmf_fweh_register(cfg->pub, BRCMF_E_ACTION_FRAME_OFF_CHAN_COMPLETE,
6750 			    brcmf_p2p_notify_action_tx_complete);
6751 	brcmf_fweh_register(cfg->pub, BRCMF_E_PSK_SUP,
6752 			    brcmf_notify_connect_status);
6753 	brcmf_fweh_register(cfg->pub, BRCMF_E_RSSI, brcmf_notify_rssi);
6754 }
6755 
6756 static void brcmf_deinit_priv_mem(struct brcmf_cfg80211_info *cfg)
6757 {
6758 	kfree(cfg->conf);
6759 	cfg->conf = NULL;
6760 	kfree(cfg->extra_buf);
6761 	cfg->extra_buf = NULL;
6762 	kfree(cfg->wowl.nd);
6763 	cfg->wowl.nd = NULL;
6764 	kfree(cfg->wowl.nd_info);
6765 	cfg->wowl.nd_info = NULL;
6766 	kfree(cfg->escan_info.escan_buf);
6767 	cfg->escan_info.escan_buf = NULL;
6768 }
6769 
6770 static s32 brcmf_init_priv_mem(struct brcmf_cfg80211_info *cfg)
6771 {
6772 	cfg->conf = kzalloc(sizeof(*cfg->conf), GFP_KERNEL);
6773 	if (!cfg->conf)
6774 		goto init_priv_mem_out;
6775 	cfg->extra_buf = kzalloc(WL_EXTRA_BUF_MAX, GFP_KERNEL);
6776 	if (!cfg->extra_buf)
6777 		goto init_priv_mem_out;
6778 	cfg->wowl.nd = kzalloc(sizeof(*cfg->wowl.nd) + sizeof(u32), GFP_KERNEL);
6779 	if (!cfg->wowl.nd)
6780 		goto init_priv_mem_out;
6781 	cfg->wowl.nd_info = kzalloc(sizeof(*cfg->wowl.nd_info) +
6782 				    sizeof(struct cfg80211_wowlan_nd_match *),
6783 				    GFP_KERNEL);
6784 	if (!cfg->wowl.nd_info)
6785 		goto init_priv_mem_out;
6786 	cfg->escan_info.escan_buf = kzalloc(BRCMF_ESCAN_BUF_SIZE, GFP_KERNEL);
6787 	if (!cfg->escan_info.escan_buf)
6788 		goto init_priv_mem_out;
6789 
6790 	return 0;
6791 
6792 init_priv_mem_out:
6793 	brcmf_deinit_priv_mem(cfg);
6794 
6795 	return -ENOMEM;
6796 }
6797 
6798 static s32 wl_init_priv(struct brcmf_cfg80211_info *cfg)
6799 {
6800 	s32 err = 0;
6801 
6802 	cfg->scan_request = NULL;
6803 	cfg->pwr_save = true;
6804 	cfg->dongle_up = false;		/* dongle is not up yet */
6805 	err = brcmf_init_priv_mem(cfg);
6806 	if (err)
6807 		return err;
6808 	brcmf_register_event_handlers(cfg);
6809 	mutex_init(&cfg->usr_sync);
6810 	brcmf_init_escan(cfg);
6811 	brcmf_init_conf(cfg->conf);
6812 	brcmf_init_wmm_prio(cfg->ac_priority);
6813 	init_completion(&cfg->vif_disabled);
6814 	return err;
6815 }
6816 
6817 static void wl_deinit_priv(struct brcmf_cfg80211_info *cfg)
6818 {
6819 	cfg->dongle_up = false;	/* dongle down */
6820 	brcmf_abort_scanning(cfg);
6821 	brcmf_deinit_priv_mem(cfg);
6822 	brcmf_clear_assoc_ies(cfg);
6823 }
6824 
6825 static void init_vif_event(struct brcmf_cfg80211_vif_event *event)
6826 {
6827 	init_waitqueue_head(&event->vif_wq);
6828 	spin_lock_init(&event->vif_event_lock);
6829 }
6830 
6831 static s32 brcmf_dongle_roam(struct brcmf_if *ifp)
6832 {
6833 	struct brcmf_pub *drvr = ifp->drvr;
6834 	s32 err;
6835 	u32 bcn_timeout;
6836 	__le32 roamtrigger[2];
6837 	__le32 roam_delta[2];
6838 
6839 	/* Configure beacon timeout value based upon roaming setting */
6840 	if (ifp->drvr->settings->roamoff)
6841 		bcn_timeout = BRCMF_DEFAULT_BCN_TIMEOUT_ROAM_OFF;
6842 	else
6843 		bcn_timeout = BRCMF_DEFAULT_BCN_TIMEOUT_ROAM_ON;
6844 	err = brcmf_fil_iovar_int_set(ifp, "bcn_timeout", bcn_timeout);
6845 	if (err) {
6846 		bphy_err(drvr, "bcn_timeout error (%d)\n", err);
6847 		goto roam_setup_done;
6848 	}
6849 
6850 	/* Enable/Disable built-in roaming to allow supplicant to take care of
6851 	 * roaming.
6852 	 */
6853 	brcmf_dbg(INFO, "Internal Roaming = %s\n",
6854 		  ifp->drvr->settings->roamoff ? "Off" : "On");
6855 	err = brcmf_fil_iovar_int_set(ifp, "roam_off",
6856 				      ifp->drvr->settings->roamoff);
6857 	if (err) {
6858 		bphy_err(drvr, "roam_off error (%d)\n", err);
6859 		goto roam_setup_done;
6860 	}
6861 
6862 	roamtrigger[0] = cpu_to_le32(WL_ROAM_TRIGGER_LEVEL);
6863 	roamtrigger[1] = cpu_to_le32(BRCM_BAND_ALL);
6864 	err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_ROAM_TRIGGER,
6865 				     (void *)roamtrigger, sizeof(roamtrigger));
6866 	if (err)
6867 		bphy_err(drvr, "WLC_SET_ROAM_TRIGGER error (%d)\n", err);
6868 
6869 	roam_delta[0] = cpu_to_le32(WL_ROAM_DELTA);
6870 	roam_delta[1] = cpu_to_le32(BRCM_BAND_ALL);
6871 	err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_ROAM_DELTA,
6872 				     (void *)roam_delta, sizeof(roam_delta));
6873 	if (err)
6874 		bphy_err(drvr, "WLC_SET_ROAM_DELTA error (%d)\n", err);
6875 
6876 	return 0;
6877 
6878 roam_setup_done:
6879 	return err;
6880 }
6881 
6882 static s32
6883 brcmf_dongle_scantime(struct brcmf_if *ifp)
6884 {
6885 	struct brcmf_pub *drvr = ifp->drvr;
6886 	s32 err = 0;
6887 
6888 	err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_SCAN_CHANNEL_TIME,
6889 				    BRCMF_SCAN_CHANNEL_TIME);
6890 	if (err) {
6891 		bphy_err(drvr, "Scan assoc time error (%d)\n", err);
6892 		goto dongle_scantime_out;
6893 	}
6894 	err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_SCAN_UNASSOC_TIME,
6895 				    BRCMF_SCAN_UNASSOC_TIME);
6896 	if (err) {
6897 		bphy_err(drvr, "Scan unassoc time error (%d)\n", err);
6898 		goto dongle_scantime_out;
6899 	}
6900 
6901 	err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_SCAN_PASSIVE_TIME,
6902 				    BRCMF_SCAN_PASSIVE_TIME);
6903 	if (err) {
6904 		bphy_err(drvr, "Scan passive time error (%d)\n", err);
6905 		goto dongle_scantime_out;
6906 	}
6907 
6908 dongle_scantime_out:
6909 	return err;
6910 }
6911 
6912 static void brcmf_update_bw40_channel_flag(struct ieee80211_channel *channel,
6913 					   struct brcmu_chan *ch)
6914 {
6915 	u32 ht40_flag;
6916 
6917 	ht40_flag = channel->flags & IEEE80211_CHAN_NO_HT40;
6918 	if (ch->sb == BRCMU_CHAN_SB_U) {
6919 		if (ht40_flag == IEEE80211_CHAN_NO_HT40)
6920 			channel->flags &= ~IEEE80211_CHAN_NO_HT40;
6921 		channel->flags |= IEEE80211_CHAN_NO_HT40PLUS;
6922 	} else {
6923 		/* It should be one of
6924 		 * IEEE80211_CHAN_NO_HT40 or
6925 		 * IEEE80211_CHAN_NO_HT40PLUS
6926 		 */
6927 		channel->flags &= ~IEEE80211_CHAN_NO_HT40;
6928 		if (ht40_flag == IEEE80211_CHAN_NO_HT40)
6929 			channel->flags |= IEEE80211_CHAN_NO_HT40MINUS;
6930 	}
6931 }
6932 
6933 static int brcmf_construct_chaninfo(struct brcmf_cfg80211_info *cfg,
6934 				    u32 bw_cap[])
6935 {
6936 	struct wiphy *wiphy = cfg_to_wiphy(cfg);
6937 	struct brcmf_pub *drvr = cfg->pub;
6938 	struct brcmf_if *ifp = brcmf_get_ifp(drvr, 0);
6939 	struct ieee80211_supported_band *band;
6940 	struct ieee80211_channel *channel;
6941 	struct brcmf_chanspec_list *list;
6942 	struct brcmu_chan ch;
6943 	int err;
6944 	u8 *pbuf;
6945 	u32 i, j;
6946 	u32 total;
6947 	u32 chaninfo;
6948 
6949 	pbuf = kzalloc(BRCMF_DCMD_MEDLEN, GFP_KERNEL);
6950 
6951 	if (pbuf == NULL)
6952 		return -ENOMEM;
6953 
6954 	list = (struct brcmf_chanspec_list *)pbuf;
6955 
6956 	err = brcmf_fil_iovar_data_get(ifp, "chanspecs", pbuf,
6957 				       BRCMF_DCMD_MEDLEN);
6958 	if (err) {
6959 		bphy_err(drvr, "get chanspecs error (%d)\n", err);
6960 		goto fail_pbuf;
6961 	}
6962 
6963 	band = wiphy->bands[NL80211_BAND_2GHZ];
6964 	if (band)
6965 		for (i = 0; i < band->n_channels; i++)
6966 			band->channels[i].flags = IEEE80211_CHAN_DISABLED;
6967 	band = wiphy->bands[NL80211_BAND_5GHZ];
6968 	if (band)
6969 		for (i = 0; i < band->n_channels; i++)
6970 			band->channels[i].flags = IEEE80211_CHAN_DISABLED;
6971 
6972 	total = le32_to_cpu(list->count);
6973 	if (total > BRCMF_MAX_CHANSPEC_LIST) {
6974 		bphy_err(drvr, "Invalid count of channel Spec. (%u)\n",
6975 			 total);
6976 		err = -EINVAL;
6977 		goto fail_pbuf;
6978 	}
6979 
6980 	for (i = 0; i < total; i++) {
6981 		ch.chspec = (u16)le32_to_cpu(list->element[i]);
6982 		cfg->d11inf.decchspec(&ch);
6983 
6984 		if (ch.band == BRCMU_CHAN_BAND_2G) {
6985 			band = wiphy->bands[NL80211_BAND_2GHZ];
6986 		} else if (ch.band == BRCMU_CHAN_BAND_5G) {
6987 			band = wiphy->bands[NL80211_BAND_5GHZ];
6988 		} else {
6989 			bphy_err(drvr, "Invalid channel Spec. 0x%x.\n",
6990 				 ch.chspec);
6991 			continue;
6992 		}
6993 		if (!band)
6994 			continue;
6995 		if (!(bw_cap[band->band] & WLC_BW_40MHZ_BIT) &&
6996 		    ch.bw == BRCMU_CHAN_BW_40)
6997 			continue;
6998 		if (!(bw_cap[band->band] & WLC_BW_80MHZ_BIT) &&
6999 		    ch.bw == BRCMU_CHAN_BW_80)
7000 			continue;
7001 
7002 		channel = NULL;
7003 		for (j = 0; j < band->n_channels; j++) {
7004 			if (band->channels[j].hw_value == ch.control_ch_num) {
7005 				channel = &band->channels[j];
7006 				break;
7007 			}
7008 		}
7009 		if (!channel) {
7010 			/* It seems firmware supports some channel we never
7011 			 * considered. Something new in IEEE standard?
7012 			 */
7013 			bphy_err(drvr, "Ignoring unexpected firmware channel %d\n",
7014 				 ch.control_ch_num);
7015 			continue;
7016 		}
7017 
7018 		if (channel->orig_flags & IEEE80211_CHAN_DISABLED)
7019 			continue;
7020 
7021 		/* assuming the chanspecs order is HT20,
7022 		 * HT40 upper, HT40 lower, and VHT80.
7023 		 */
7024 		switch (ch.bw) {
7025 		case BRCMU_CHAN_BW_160:
7026 			channel->flags &= ~IEEE80211_CHAN_NO_160MHZ;
7027 			break;
7028 		case BRCMU_CHAN_BW_80:
7029 			channel->flags &= ~IEEE80211_CHAN_NO_80MHZ;
7030 			break;
7031 		case BRCMU_CHAN_BW_40:
7032 			brcmf_update_bw40_channel_flag(channel, &ch);
7033 			break;
7034 		default:
7035 			wiphy_warn(wiphy, "Firmware reported unsupported bandwidth %d\n",
7036 				   ch.bw);
7037 			fallthrough;
7038 		case BRCMU_CHAN_BW_20:
7039 			/* enable the channel and disable other bandwidths
7040 			 * for now as mentioned order assure they are enabled
7041 			 * for subsequent chanspecs.
7042 			 */
7043 			channel->flags = IEEE80211_CHAN_NO_HT40 |
7044 					 IEEE80211_CHAN_NO_80MHZ |
7045 					 IEEE80211_CHAN_NO_160MHZ;
7046 			ch.bw = BRCMU_CHAN_BW_20;
7047 			cfg->d11inf.encchspec(&ch);
7048 			chaninfo = ch.chspec;
7049 			err = brcmf_fil_bsscfg_int_get(ifp, "per_chan_info",
7050 						       &chaninfo);
7051 			if (!err) {
7052 				if (chaninfo & WL_CHAN_RADAR)
7053 					channel->flags |=
7054 						(IEEE80211_CHAN_RADAR |
7055 						 IEEE80211_CHAN_NO_IR);
7056 				if (chaninfo & WL_CHAN_PASSIVE)
7057 					channel->flags |=
7058 						IEEE80211_CHAN_NO_IR;
7059 			}
7060 		}
7061 	}
7062 
7063 fail_pbuf:
7064 	kfree(pbuf);
7065 	return err;
7066 }
7067 
7068 static int brcmf_enable_bw40_2g(struct brcmf_cfg80211_info *cfg)
7069 {
7070 	struct brcmf_pub *drvr = cfg->pub;
7071 	struct brcmf_if *ifp = brcmf_get_ifp(drvr, 0);
7072 	struct ieee80211_supported_band *band;
7073 	struct brcmf_fil_bwcap_le band_bwcap;
7074 	struct brcmf_chanspec_list *list;
7075 	u8 *pbuf;
7076 	u32 val;
7077 	int err;
7078 	struct brcmu_chan ch;
7079 	u32 num_chan;
7080 	int i, j;
7081 
7082 	/* verify support for bw_cap command */
7083 	val = WLC_BAND_5G;
7084 	err = brcmf_fil_iovar_int_get(ifp, "bw_cap", &val);
7085 
7086 	if (!err) {
7087 		/* only set 2G bandwidth using bw_cap command */
7088 		band_bwcap.band = cpu_to_le32(WLC_BAND_2G);
7089 		band_bwcap.bw_cap = cpu_to_le32(WLC_BW_CAP_40MHZ);
7090 		err = brcmf_fil_iovar_data_set(ifp, "bw_cap", &band_bwcap,
7091 					       sizeof(band_bwcap));
7092 	} else {
7093 		brcmf_dbg(INFO, "fallback to mimo_bw_cap\n");
7094 		val = WLC_N_BW_40ALL;
7095 		err = brcmf_fil_iovar_int_set(ifp, "mimo_bw_cap", val);
7096 	}
7097 
7098 	if (!err) {
7099 		/* update channel info in 2G band */
7100 		pbuf = kzalloc(BRCMF_DCMD_MEDLEN, GFP_KERNEL);
7101 
7102 		if (pbuf == NULL)
7103 			return -ENOMEM;
7104 
7105 		ch.band = BRCMU_CHAN_BAND_2G;
7106 		ch.bw = BRCMU_CHAN_BW_40;
7107 		ch.sb = BRCMU_CHAN_SB_NONE;
7108 		ch.chnum = 0;
7109 		cfg->d11inf.encchspec(&ch);
7110 
7111 		/* pass encoded chanspec in query */
7112 		*(__le16 *)pbuf = cpu_to_le16(ch.chspec);
7113 
7114 		err = brcmf_fil_iovar_data_get(ifp, "chanspecs", pbuf,
7115 					       BRCMF_DCMD_MEDLEN);
7116 		if (err) {
7117 			bphy_err(drvr, "get chanspecs error (%d)\n", err);
7118 			kfree(pbuf);
7119 			return err;
7120 		}
7121 
7122 		band = cfg_to_wiphy(cfg)->bands[NL80211_BAND_2GHZ];
7123 		list = (struct brcmf_chanspec_list *)pbuf;
7124 		num_chan = le32_to_cpu(list->count);
7125 		if (num_chan > BRCMF_MAX_CHANSPEC_LIST) {
7126 			bphy_err(drvr, "Invalid count of channel Spec. (%u)\n",
7127 				 num_chan);
7128 			kfree(pbuf);
7129 			return -EINVAL;
7130 		}
7131 
7132 		for (i = 0; i < num_chan; i++) {
7133 			ch.chspec = (u16)le32_to_cpu(list->element[i]);
7134 			cfg->d11inf.decchspec(&ch);
7135 			if (WARN_ON(ch.band != BRCMU_CHAN_BAND_2G))
7136 				continue;
7137 			if (WARN_ON(ch.bw != BRCMU_CHAN_BW_40))
7138 				continue;
7139 			for (j = 0; j < band->n_channels; j++) {
7140 				if (band->channels[j].hw_value == ch.control_ch_num)
7141 					break;
7142 			}
7143 			if (WARN_ON(j == band->n_channels))
7144 				continue;
7145 
7146 			brcmf_update_bw40_channel_flag(&band->channels[j], &ch);
7147 		}
7148 		kfree(pbuf);
7149 	}
7150 	return err;
7151 }
7152 
7153 static void brcmf_get_bwcap(struct brcmf_if *ifp, u32 bw_cap[])
7154 {
7155 	struct brcmf_pub *drvr = ifp->drvr;
7156 	u32 band, mimo_bwcap;
7157 	int err;
7158 
7159 	band = WLC_BAND_2G;
7160 	err = brcmf_fil_iovar_int_get(ifp, "bw_cap", &band);
7161 	if (!err) {
7162 		bw_cap[NL80211_BAND_2GHZ] = band;
7163 		band = WLC_BAND_5G;
7164 		err = brcmf_fil_iovar_int_get(ifp, "bw_cap", &band);
7165 		if (!err) {
7166 			bw_cap[NL80211_BAND_5GHZ] = band;
7167 			return;
7168 		}
7169 		WARN_ON(1);
7170 		return;
7171 	}
7172 	brcmf_dbg(INFO, "fallback to mimo_bw_cap info\n");
7173 	mimo_bwcap = 0;
7174 	err = brcmf_fil_iovar_int_get(ifp, "mimo_bw_cap", &mimo_bwcap);
7175 	if (err)
7176 		/* assume 20MHz if firmware does not give a clue */
7177 		mimo_bwcap = WLC_N_BW_20ALL;
7178 
7179 	switch (mimo_bwcap) {
7180 	case WLC_N_BW_40ALL:
7181 		bw_cap[NL80211_BAND_2GHZ] |= WLC_BW_40MHZ_BIT;
7182 		fallthrough;
7183 	case WLC_N_BW_20IN2G_40IN5G:
7184 		bw_cap[NL80211_BAND_5GHZ] |= WLC_BW_40MHZ_BIT;
7185 		fallthrough;
7186 	case WLC_N_BW_20ALL:
7187 		bw_cap[NL80211_BAND_2GHZ] |= WLC_BW_20MHZ_BIT;
7188 		bw_cap[NL80211_BAND_5GHZ] |= WLC_BW_20MHZ_BIT;
7189 		break;
7190 	default:
7191 		bphy_err(drvr, "invalid mimo_bw_cap value\n");
7192 	}
7193 }
7194 
7195 static void brcmf_update_ht_cap(struct ieee80211_supported_band *band,
7196 				u32 bw_cap[2], u32 nchain)
7197 {
7198 	band->ht_cap.ht_supported = true;
7199 	if (bw_cap[band->band] & WLC_BW_40MHZ_BIT) {
7200 		band->ht_cap.cap |= IEEE80211_HT_CAP_SGI_40;
7201 		band->ht_cap.cap |= IEEE80211_HT_CAP_SUP_WIDTH_20_40;
7202 	}
7203 	band->ht_cap.cap |= IEEE80211_HT_CAP_SGI_20;
7204 	band->ht_cap.cap |= IEEE80211_HT_CAP_DSSSCCK40;
7205 	band->ht_cap.ampdu_factor = IEEE80211_HT_MAX_AMPDU_64K;
7206 	band->ht_cap.ampdu_density = IEEE80211_HT_MPDU_DENSITY_16;
7207 	memset(band->ht_cap.mcs.rx_mask, 0xff, nchain);
7208 	band->ht_cap.mcs.tx_params = IEEE80211_HT_MCS_TX_DEFINED;
7209 }
7210 
7211 static __le16 brcmf_get_mcs_map(u32 nchain, enum ieee80211_vht_mcs_support supp)
7212 {
7213 	u16 mcs_map;
7214 	int i;
7215 
7216 	for (i = 0, mcs_map = 0xFFFF; i < nchain; i++)
7217 		mcs_map = (mcs_map << 2) | supp;
7218 
7219 	return cpu_to_le16(mcs_map);
7220 }
7221 
7222 static void brcmf_update_vht_cap(struct ieee80211_supported_band *band,
7223 				 u32 bw_cap[2], u32 nchain, u32 txstreams,
7224 				 u32 txbf_bfe_cap, u32 txbf_bfr_cap)
7225 {
7226 	__le16 mcs_map;
7227 
7228 	/* not allowed in 2.4G band */
7229 	if (band->band == NL80211_BAND_2GHZ)
7230 		return;
7231 
7232 	band->vht_cap.vht_supported = true;
7233 	/* 80MHz is mandatory */
7234 	band->vht_cap.cap |= IEEE80211_VHT_CAP_SHORT_GI_80;
7235 	if (bw_cap[band->band] & WLC_BW_160MHZ_BIT) {
7236 		band->vht_cap.cap |= IEEE80211_VHT_CAP_SUPP_CHAN_WIDTH_160MHZ;
7237 		band->vht_cap.cap |= IEEE80211_VHT_CAP_SHORT_GI_160;
7238 	}
7239 	/* all support 256-QAM */
7240 	mcs_map = brcmf_get_mcs_map(nchain, IEEE80211_VHT_MCS_SUPPORT_0_9);
7241 	band->vht_cap.vht_mcs.rx_mcs_map = mcs_map;
7242 	band->vht_cap.vht_mcs.tx_mcs_map = mcs_map;
7243 
7244 	/* Beamforming support information */
7245 	if (txbf_bfe_cap & BRCMF_TXBF_SU_BFE_CAP)
7246 		band->vht_cap.cap |= IEEE80211_VHT_CAP_SU_BEAMFORMEE_CAPABLE;
7247 	if (txbf_bfe_cap & BRCMF_TXBF_MU_BFE_CAP)
7248 		band->vht_cap.cap |= IEEE80211_VHT_CAP_MU_BEAMFORMEE_CAPABLE;
7249 	if (txbf_bfr_cap & BRCMF_TXBF_SU_BFR_CAP)
7250 		band->vht_cap.cap |= IEEE80211_VHT_CAP_SU_BEAMFORMER_CAPABLE;
7251 	if (txbf_bfr_cap & BRCMF_TXBF_MU_BFR_CAP)
7252 		band->vht_cap.cap |= IEEE80211_VHT_CAP_MU_BEAMFORMER_CAPABLE;
7253 
7254 	if ((txbf_bfe_cap || txbf_bfr_cap) && (txstreams > 1)) {
7255 		band->vht_cap.cap |=
7256 			(2 << IEEE80211_VHT_CAP_BEAMFORMEE_STS_SHIFT);
7257 		band->vht_cap.cap |= ((txstreams - 1) <<
7258 				IEEE80211_VHT_CAP_SOUNDING_DIMENSIONS_SHIFT);
7259 		band->vht_cap.cap |=
7260 			IEEE80211_VHT_CAP_VHT_LINK_ADAPTATION_VHT_MRQ_MFB;
7261 	}
7262 }
7263 
7264 static int brcmf_setup_wiphybands(struct brcmf_cfg80211_info *cfg)
7265 {
7266 	struct brcmf_pub *drvr = cfg->pub;
7267 	struct brcmf_if *ifp = brcmf_get_ifp(drvr, 0);
7268 	struct wiphy *wiphy = cfg_to_wiphy(cfg);
7269 	u32 nmode = 0;
7270 	u32 vhtmode = 0;
7271 	u32 bw_cap[2] = { WLC_BW_20MHZ_BIT, WLC_BW_20MHZ_BIT };
7272 	u32 rxchain;
7273 	u32 nchain;
7274 	int err;
7275 	s32 i;
7276 	struct ieee80211_supported_band *band;
7277 	u32 txstreams = 0;
7278 	u32 txbf_bfe_cap = 0;
7279 	u32 txbf_bfr_cap = 0;
7280 
7281 	(void)brcmf_fil_iovar_int_get(ifp, "vhtmode", &vhtmode);
7282 	err = brcmf_fil_iovar_int_get(ifp, "nmode", &nmode);
7283 	if (err) {
7284 		bphy_err(drvr, "nmode error (%d)\n", err);
7285 	} else {
7286 		brcmf_get_bwcap(ifp, bw_cap);
7287 	}
7288 	brcmf_dbg(INFO, "nmode=%d, vhtmode=%d, bw_cap=(%d, %d)\n",
7289 		  nmode, vhtmode, bw_cap[NL80211_BAND_2GHZ],
7290 		  bw_cap[NL80211_BAND_5GHZ]);
7291 
7292 	err = brcmf_fil_iovar_int_get(ifp, "rxchain", &rxchain);
7293 	if (err) {
7294 		/* rxchain unsupported by firmware of older chips */
7295 		if (err == -EBADE)
7296 			bphy_info_once(drvr, "rxchain unsupported\n");
7297 		else
7298 			bphy_err(drvr, "rxchain error (%d)\n", err);
7299 
7300 		nchain = 1;
7301 	} else {
7302 		for (nchain = 0; rxchain; nchain++)
7303 			rxchain = rxchain & (rxchain - 1);
7304 	}
7305 	brcmf_dbg(INFO, "nchain=%d\n", nchain);
7306 
7307 	err = brcmf_construct_chaninfo(cfg, bw_cap);
7308 	if (err) {
7309 		bphy_err(drvr, "brcmf_construct_chaninfo failed (%d)\n", err);
7310 		return err;
7311 	}
7312 
7313 	if (vhtmode) {
7314 		(void)brcmf_fil_iovar_int_get(ifp, "txstreams", &txstreams);
7315 		(void)brcmf_fil_iovar_int_get(ifp, "txbf_bfe_cap",
7316 					      &txbf_bfe_cap);
7317 		(void)brcmf_fil_iovar_int_get(ifp, "txbf_bfr_cap",
7318 					      &txbf_bfr_cap);
7319 	}
7320 
7321 	for (i = 0; i < ARRAY_SIZE(wiphy->bands); i++) {
7322 		band = wiphy->bands[i];
7323 		if (band == NULL)
7324 			continue;
7325 
7326 		if (nmode)
7327 			brcmf_update_ht_cap(band, bw_cap, nchain);
7328 		if (vhtmode)
7329 			brcmf_update_vht_cap(band, bw_cap, nchain, txstreams,
7330 					     txbf_bfe_cap, txbf_bfr_cap);
7331 	}
7332 
7333 	return 0;
7334 }
7335 
7336 static const struct ieee80211_txrx_stypes
7337 brcmf_txrx_stypes[NUM_NL80211_IFTYPES] = {
7338 	[NL80211_IFTYPE_STATION] = {
7339 		.tx = 0xffff,
7340 		.rx = BIT(IEEE80211_STYPE_ACTION >> 4) |
7341 		      BIT(IEEE80211_STYPE_PROBE_REQ >> 4)
7342 	},
7343 	[NL80211_IFTYPE_P2P_CLIENT] = {
7344 		.tx = 0xffff,
7345 		.rx = BIT(IEEE80211_STYPE_ACTION >> 4) |
7346 		      BIT(IEEE80211_STYPE_PROBE_REQ >> 4)
7347 	},
7348 	[NL80211_IFTYPE_P2P_GO] = {
7349 		.tx = 0xffff,
7350 		.rx = BIT(IEEE80211_STYPE_ASSOC_REQ >> 4) |
7351 		      BIT(IEEE80211_STYPE_REASSOC_REQ >> 4) |
7352 		      BIT(IEEE80211_STYPE_PROBE_REQ >> 4) |
7353 		      BIT(IEEE80211_STYPE_DISASSOC >> 4) |
7354 		      BIT(IEEE80211_STYPE_AUTH >> 4) |
7355 		      BIT(IEEE80211_STYPE_DEAUTH >> 4) |
7356 		      BIT(IEEE80211_STYPE_ACTION >> 4)
7357 	},
7358 	[NL80211_IFTYPE_P2P_DEVICE] = {
7359 		.tx = 0xffff,
7360 		.rx = BIT(IEEE80211_STYPE_ACTION >> 4) |
7361 		      BIT(IEEE80211_STYPE_PROBE_REQ >> 4)
7362 	},
7363 	[NL80211_IFTYPE_AP] = {
7364 		.tx = 0xffff,
7365 		.rx = BIT(IEEE80211_STYPE_ASSOC_REQ >> 4) |
7366 		      BIT(IEEE80211_STYPE_REASSOC_REQ >> 4) |
7367 		      BIT(IEEE80211_STYPE_PROBE_REQ >> 4) |
7368 		      BIT(IEEE80211_STYPE_DISASSOC >> 4) |
7369 		      BIT(IEEE80211_STYPE_AUTH >> 4) |
7370 		      BIT(IEEE80211_STYPE_DEAUTH >> 4) |
7371 		      BIT(IEEE80211_STYPE_ACTION >> 4)
7372 	}
7373 };
7374 
7375 /**
7376  * brcmf_setup_ifmodes() - determine interface modes and combinations.
7377  *
7378  * @wiphy: wiphy object.
7379  * @ifp: interface object needed for feat module api.
7380  *
7381  * The interface modes and combinations are determined dynamically here
7382  * based on firmware functionality.
7383  *
7384  * no p2p and no mbss:
7385  *
7386  *	#STA <= 1, #AP <= 1, channels = 1, 2 total
7387  *
7388  * no p2p and mbss:
7389  *
7390  *	#STA <= 1, #AP <= 1, channels = 1, 2 total
7391  *	#AP <= 4, matching BI, channels = 1, 4 total
7392  *
7393  * no p2p and rsdb:
7394  *	#STA <= 1, #AP <= 2, channels = 2, 4 total
7395  *
7396  * p2p, no mchan, and mbss:
7397  *
7398  *	#STA <= 1, #P2P-DEV <= 1, #{P2P-CL, P2P-GO} <= 1, channels = 1, 3 total
7399  *	#STA <= 1, #P2P-DEV <= 1, #AP <= 1, #P2P-CL <= 1, channels = 1, 4 total
7400  *	#AP <= 4, matching BI, channels = 1, 4 total
7401  *
7402  * p2p, mchan, and mbss:
7403  *
7404  *	#STA <= 2, #P2P-DEV <= 1, #{P2P-CL, P2P-GO} <= 1, channels = 2, 3 total
7405  *	#STA <= 1, #P2P-DEV <= 1, #AP <= 1, #P2P-CL <= 1, channels = 1, 4 total
7406  *	#AP <= 4, matching BI, channels = 1, 4 total
7407  *
7408  * p2p, rsdb, and no mbss:
7409  *	#STA <= 1, #P2P-DEV <= 1, #{P2P-CL, P2P-GO} <= 2, AP <= 2,
7410  *	 channels = 2, 4 total
7411  */
7412 static int brcmf_setup_ifmodes(struct wiphy *wiphy, struct brcmf_if *ifp)
7413 {
7414 	struct ieee80211_iface_combination *combo = NULL;
7415 	struct ieee80211_iface_limit *c0_limits = NULL;
7416 	struct ieee80211_iface_limit *p2p_limits = NULL;
7417 	struct ieee80211_iface_limit *mbss_limits = NULL;
7418 	bool mon_flag, mbss, p2p, rsdb, mchan;
7419 	int i, c, n_combos, n_limits;
7420 
7421 	mon_flag = brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MONITOR_FLAG);
7422 	mbss = brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MBSS);
7423 	p2p = brcmf_feat_is_enabled(ifp, BRCMF_FEAT_P2P);
7424 	rsdb = brcmf_feat_is_enabled(ifp, BRCMF_FEAT_RSDB);
7425 	mchan = brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MCHAN);
7426 
7427 	n_combos = 1 + !!(p2p && !rsdb) + !!mbss;
7428 	combo = kcalloc(n_combos, sizeof(*combo), GFP_KERNEL);
7429 	if (!combo)
7430 		goto err;
7431 
7432 	wiphy->interface_modes = BIT(NL80211_IFTYPE_STATION) |
7433 				 BIT(NL80211_IFTYPE_ADHOC) |
7434 				 BIT(NL80211_IFTYPE_AP);
7435 	if (mon_flag)
7436 		wiphy->interface_modes |= BIT(NL80211_IFTYPE_MONITOR);
7437 	if (p2p)
7438 		wiphy->interface_modes |= BIT(NL80211_IFTYPE_P2P_CLIENT) |
7439 					  BIT(NL80211_IFTYPE_P2P_GO) |
7440 					  BIT(NL80211_IFTYPE_P2P_DEVICE);
7441 
7442 	c = 0;
7443 	i = 0;
7444 	n_limits = 1 + mon_flag + (p2p ? 2 : 0) + (rsdb || !p2p);
7445 	c0_limits = kcalloc(n_limits, sizeof(*c0_limits), GFP_KERNEL);
7446 	if (!c0_limits)
7447 		goto err;
7448 
7449 	combo[c].num_different_channels = 1 + (rsdb || (p2p && mchan));
7450 	c0_limits[i].max = 1 + (p2p && mchan);
7451 	c0_limits[i++].types = BIT(NL80211_IFTYPE_STATION);
7452 	if (mon_flag) {
7453 		c0_limits[i].max = 1;
7454 		c0_limits[i++].types = BIT(NL80211_IFTYPE_MONITOR);
7455 	}
7456 	if (p2p) {
7457 		c0_limits[i].max = 1;
7458 		c0_limits[i++].types = BIT(NL80211_IFTYPE_P2P_DEVICE);
7459 		c0_limits[i].max = 1 + rsdb;
7460 		c0_limits[i++].types = BIT(NL80211_IFTYPE_P2P_CLIENT) |
7461 				       BIT(NL80211_IFTYPE_P2P_GO);
7462 	}
7463 	if (p2p && rsdb) {
7464 		c0_limits[i].max = 2;
7465 		c0_limits[i++].types = BIT(NL80211_IFTYPE_AP);
7466 		combo[c].max_interfaces = 4;
7467 	} else if (p2p) {
7468 		combo[c].max_interfaces = i;
7469 	} else if (rsdb) {
7470 		c0_limits[i].max = 2;
7471 		c0_limits[i++].types = BIT(NL80211_IFTYPE_AP);
7472 		combo[c].max_interfaces = 3;
7473 	} else {
7474 		c0_limits[i].max = 1;
7475 		c0_limits[i++].types = BIT(NL80211_IFTYPE_AP);
7476 		combo[c].max_interfaces = i;
7477 	}
7478 	combo[c].n_limits = i;
7479 	combo[c].limits = c0_limits;
7480 
7481 	if (p2p && !rsdb) {
7482 		c++;
7483 		i = 0;
7484 		p2p_limits = kcalloc(4, sizeof(*p2p_limits), GFP_KERNEL);
7485 		if (!p2p_limits)
7486 			goto err;
7487 		p2p_limits[i].max = 1;
7488 		p2p_limits[i++].types = BIT(NL80211_IFTYPE_STATION);
7489 		p2p_limits[i].max = 1;
7490 		p2p_limits[i++].types = BIT(NL80211_IFTYPE_AP);
7491 		p2p_limits[i].max = 1;
7492 		p2p_limits[i++].types = BIT(NL80211_IFTYPE_P2P_CLIENT);
7493 		p2p_limits[i].max = 1;
7494 		p2p_limits[i++].types = BIT(NL80211_IFTYPE_P2P_DEVICE);
7495 		combo[c].num_different_channels = 1;
7496 		combo[c].max_interfaces = i;
7497 		combo[c].n_limits = i;
7498 		combo[c].limits = p2p_limits;
7499 	}
7500 
7501 	if (mbss) {
7502 		c++;
7503 		i = 0;
7504 		n_limits = 1 + mon_flag;
7505 		mbss_limits = kcalloc(n_limits, sizeof(*mbss_limits),
7506 				      GFP_KERNEL);
7507 		if (!mbss_limits)
7508 			goto err;
7509 		mbss_limits[i].max = 4;
7510 		mbss_limits[i++].types = BIT(NL80211_IFTYPE_AP);
7511 		if (mon_flag) {
7512 			mbss_limits[i].max = 1;
7513 			mbss_limits[i++].types = BIT(NL80211_IFTYPE_MONITOR);
7514 		}
7515 		combo[c].beacon_int_infra_match = true;
7516 		combo[c].num_different_channels = 1;
7517 		combo[c].max_interfaces = 4 + mon_flag;
7518 		combo[c].n_limits = i;
7519 		combo[c].limits = mbss_limits;
7520 	}
7521 
7522 	wiphy->n_iface_combinations = n_combos;
7523 	wiphy->iface_combinations = combo;
7524 	return 0;
7525 
7526 err:
7527 	kfree(c0_limits);
7528 	kfree(p2p_limits);
7529 	kfree(mbss_limits);
7530 	kfree(combo);
7531 	return -ENOMEM;
7532 }
7533 
7534 #ifdef CONFIG_PM
7535 static const struct wiphy_wowlan_support brcmf_wowlan_support = {
7536 	.flags = WIPHY_WOWLAN_MAGIC_PKT | WIPHY_WOWLAN_DISCONNECT,
7537 	.n_patterns = BRCMF_WOWL_MAXPATTERNS,
7538 	.pattern_max_len = BRCMF_WOWL_MAXPATTERNSIZE,
7539 	.pattern_min_len = 1,
7540 	.max_pkt_offset = 1500,
7541 };
7542 #endif
7543 
7544 static void brcmf_wiphy_wowl_params(struct wiphy *wiphy, struct brcmf_if *ifp)
7545 {
7546 #ifdef CONFIG_PM
7547 	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
7548 	struct brcmf_pub *drvr = cfg->pub;
7549 	struct wiphy_wowlan_support *wowl;
7550 
7551 	wowl = kmemdup(&brcmf_wowlan_support, sizeof(brcmf_wowlan_support),
7552 		       GFP_KERNEL);
7553 	if (!wowl) {
7554 		bphy_err(drvr, "only support basic wowlan features\n");
7555 		wiphy->wowlan = &brcmf_wowlan_support;
7556 		return;
7557 	}
7558 
7559 	if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_PNO)) {
7560 		if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_WOWL_ND)) {
7561 			wowl->flags |= WIPHY_WOWLAN_NET_DETECT;
7562 			wowl->max_nd_match_sets = BRCMF_PNO_MAX_PFN_COUNT;
7563 			init_waitqueue_head(&cfg->wowl.nd_data_wait);
7564 		}
7565 	}
7566 	if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_WOWL_GTK)) {
7567 		wowl->flags |= WIPHY_WOWLAN_SUPPORTS_GTK_REKEY;
7568 		wowl->flags |= WIPHY_WOWLAN_GTK_REKEY_FAILURE;
7569 	}
7570 
7571 	wiphy->wowlan = wowl;
7572 #endif
7573 }
7574 
7575 static int brcmf_setup_wiphy(struct wiphy *wiphy, struct brcmf_if *ifp)
7576 {
7577 	struct brcmf_pub *drvr = ifp->drvr;
7578 	const struct ieee80211_iface_combination *combo;
7579 	struct ieee80211_supported_band *band;
7580 	u16 max_interfaces = 0;
7581 	bool gscan;
7582 	__le32 bandlist[3];
7583 	u32 n_bands;
7584 	int err, i;
7585 
7586 	wiphy->max_scan_ssids = WL_NUM_SCAN_MAX;
7587 	wiphy->max_scan_ie_len = BRCMF_SCAN_IE_LEN_MAX;
7588 	wiphy->max_num_pmkids = BRCMF_MAXPMKID;
7589 
7590 	err = brcmf_setup_ifmodes(wiphy, ifp);
7591 	if (err)
7592 		return err;
7593 
7594 	for (i = 0, combo = wiphy->iface_combinations;
7595 	     i < wiphy->n_iface_combinations; i++, combo++) {
7596 		max_interfaces = max(max_interfaces, combo->max_interfaces);
7597 	}
7598 
7599 	for (i = 0; i < max_interfaces && i < ARRAY_SIZE(drvr->addresses);
7600 	     i++) {
7601 		u8 *addr = drvr->addresses[i].addr;
7602 
7603 		memcpy(addr, drvr->mac, ETH_ALEN);
7604 		if (i) {
7605 			addr[0] |= BIT(1);
7606 			addr[ETH_ALEN - 1] ^= i;
7607 		}
7608 	}
7609 	wiphy->addresses = drvr->addresses;
7610 	wiphy->n_addresses = i;
7611 
7612 	wiphy->signal_type = CFG80211_SIGNAL_TYPE_MBM;
7613 	wiphy->cipher_suites = brcmf_cipher_suites;
7614 	wiphy->n_cipher_suites = ARRAY_SIZE(brcmf_cipher_suites);
7615 	if (!brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MFP))
7616 		wiphy->n_cipher_suites--;
7617 	wiphy->bss_select_support = BIT(NL80211_BSS_SELECT_ATTR_RSSI) |
7618 				    BIT(NL80211_BSS_SELECT_ATTR_BAND_PREF) |
7619 				    BIT(NL80211_BSS_SELECT_ATTR_RSSI_ADJUST);
7620 
7621 	wiphy->flags |= WIPHY_FLAG_NETNS_OK |
7622 			WIPHY_FLAG_PS_ON_BY_DEFAULT |
7623 			WIPHY_FLAG_HAVE_AP_SME |
7624 			WIPHY_FLAG_OFFCHAN_TX |
7625 			WIPHY_FLAG_HAS_REMAIN_ON_CHANNEL;
7626 	if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_TDLS))
7627 		wiphy->flags |= WIPHY_FLAG_SUPPORTS_TDLS;
7628 	if (!ifp->drvr->settings->roamoff)
7629 		wiphy->flags |= WIPHY_FLAG_SUPPORTS_FW_ROAM;
7630 	if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_FWSUP)) {
7631 		wiphy_ext_feature_set(wiphy,
7632 				      NL80211_EXT_FEATURE_4WAY_HANDSHAKE_STA_PSK);
7633 		wiphy_ext_feature_set(wiphy,
7634 				      NL80211_EXT_FEATURE_4WAY_HANDSHAKE_STA_1X);
7635 		if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_SAE))
7636 			wiphy_ext_feature_set(wiphy,
7637 					      NL80211_EXT_FEATURE_SAE_OFFLOAD);
7638 	}
7639 	if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_FWAUTH)) {
7640 		wiphy_ext_feature_set(wiphy,
7641 				      NL80211_EXT_FEATURE_4WAY_HANDSHAKE_AP_PSK);
7642 		if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_SAE))
7643 			wiphy_ext_feature_set(wiphy,
7644 					      NL80211_EXT_FEATURE_SAE_OFFLOAD_AP);
7645 	}
7646 	wiphy->mgmt_stypes = brcmf_txrx_stypes;
7647 	wiphy->max_remain_on_channel_duration = 5000;
7648 	if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_PNO)) {
7649 		gscan = brcmf_feat_is_enabled(ifp, BRCMF_FEAT_GSCAN);
7650 		brcmf_pno_wiphy_params(wiphy, gscan);
7651 	}
7652 	/* vendor commands/events support */
7653 	wiphy->vendor_commands = brcmf_vendor_cmds;
7654 	wiphy->n_vendor_commands = BRCMF_VNDR_CMDS_LAST - 1;
7655 
7656 	if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_WOWL))
7657 		brcmf_wiphy_wowl_params(wiphy, ifp);
7658 	err = brcmf_fil_cmd_data_get(ifp, BRCMF_C_GET_BANDLIST, &bandlist,
7659 				     sizeof(bandlist));
7660 	if (err) {
7661 		bphy_err(drvr, "could not obtain band info: err=%d\n", err);
7662 		return err;
7663 	}
7664 	/* first entry in bandlist is number of bands */
7665 	n_bands = le32_to_cpu(bandlist[0]);
7666 	for (i = 1; i <= n_bands && i < ARRAY_SIZE(bandlist); i++) {
7667 		if (bandlist[i] == cpu_to_le32(WLC_BAND_2G)) {
7668 			band = kmemdup(&__wl_band_2ghz, sizeof(__wl_band_2ghz),
7669 				       GFP_KERNEL);
7670 			if (!band)
7671 				return -ENOMEM;
7672 
7673 			band->channels = kmemdup(&__wl_2ghz_channels,
7674 						 sizeof(__wl_2ghz_channels),
7675 						 GFP_KERNEL);
7676 			if (!band->channels) {
7677 				kfree(band);
7678 				return -ENOMEM;
7679 			}
7680 
7681 			band->n_channels = ARRAY_SIZE(__wl_2ghz_channels);
7682 			wiphy->bands[NL80211_BAND_2GHZ] = band;
7683 		}
7684 		if (bandlist[i] == cpu_to_le32(WLC_BAND_5G)) {
7685 			band = kmemdup(&__wl_band_5ghz, sizeof(__wl_band_5ghz),
7686 				       GFP_KERNEL);
7687 			if (!band)
7688 				return -ENOMEM;
7689 
7690 			band->channels = kmemdup(&__wl_5ghz_channels,
7691 						 sizeof(__wl_5ghz_channels),
7692 						 GFP_KERNEL);
7693 			if (!band->channels) {
7694 				kfree(band);
7695 				return -ENOMEM;
7696 			}
7697 
7698 			band->n_channels = ARRAY_SIZE(__wl_5ghz_channels);
7699 			wiphy->bands[NL80211_BAND_5GHZ] = band;
7700 		}
7701 	}
7702 
7703 	if (wiphy->bands[NL80211_BAND_5GHZ] &&
7704 	    brcmf_feat_is_enabled(ifp, BRCMF_FEAT_DOT11H))
7705 		wiphy_ext_feature_set(wiphy,
7706 				      NL80211_EXT_FEATURE_DFS_OFFLOAD);
7707 
7708 	wiphy_ext_feature_set(wiphy, NL80211_EXT_FEATURE_CQM_RSSI_LIST);
7709 
7710 	wiphy_read_of_freq_limits(wiphy);
7711 
7712 	return 0;
7713 }
7714 
7715 static s32 brcmf_config_dongle(struct brcmf_cfg80211_info *cfg)
7716 {
7717 	struct brcmf_pub *drvr = cfg->pub;
7718 	struct net_device *ndev;
7719 	struct wireless_dev *wdev;
7720 	struct brcmf_if *ifp;
7721 	s32 power_mode;
7722 	s32 err = 0;
7723 
7724 	if (cfg->dongle_up)
7725 		return err;
7726 
7727 	ndev = cfg_to_ndev(cfg);
7728 	wdev = ndev->ieee80211_ptr;
7729 	ifp = netdev_priv(ndev);
7730 
7731 	/* make sure RF is ready for work */
7732 	brcmf_fil_cmd_int_set(ifp, BRCMF_C_UP, 0);
7733 
7734 	brcmf_dongle_scantime(ifp);
7735 
7736 	power_mode = cfg->pwr_save ? PM_FAST : PM_OFF;
7737 	err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_PM, power_mode);
7738 	if (err)
7739 		goto default_conf_out;
7740 	brcmf_dbg(INFO, "power save set to %s\n",
7741 		  (power_mode ? "enabled" : "disabled"));
7742 
7743 	err = brcmf_dongle_roam(ifp);
7744 	if (err)
7745 		goto default_conf_out;
7746 	err = brcmf_cfg80211_change_iface(wdev->wiphy, ndev, wdev->iftype,
7747 					  NULL);
7748 	if (err)
7749 		goto default_conf_out;
7750 
7751 	brcmf_configure_arp_nd_offload(ifp, true);
7752 
7753 	err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_FAKEFRAG, 1);
7754 	if (err) {
7755 		bphy_err(drvr, "failed to set frameburst mode\n");
7756 		goto default_conf_out;
7757 	}
7758 
7759 	cfg->dongle_up = true;
7760 default_conf_out:
7761 
7762 	return err;
7763 
7764 }
7765 
7766 static s32 __brcmf_cfg80211_up(struct brcmf_if *ifp)
7767 {
7768 	set_bit(BRCMF_VIF_STATUS_READY, &ifp->vif->sme_state);
7769 
7770 	return brcmf_config_dongle(ifp->drvr->config);
7771 }
7772 
7773 static s32 __brcmf_cfg80211_down(struct brcmf_if *ifp)
7774 {
7775 	struct brcmf_cfg80211_info *cfg = ifp->drvr->config;
7776 
7777 	/*
7778 	 * While going down, if associated with AP disassociate
7779 	 * from AP to save power
7780 	 */
7781 	if (check_vif_up(ifp->vif)) {
7782 		brcmf_link_down(ifp->vif, WLAN_REASON_UNSPECIFIED, true);
7783 
7784 		/* Make sure WPA_Supplicant receives all the event
7785 		   generated due to DISASSOC call to the fw to keep
7786 		   the state fw and WPA_Supplicant state consistent
7787 		 */
7788 		brcmf_delay(500);
7789 	}
7790 
7791 	brcmf_abort_scanning(cfg);
7792 	clear_bit(BRCMF_VIF_STATUS_READY, &ifp->vif->sme_state);
7793 
7794 	return 0;
7795 }
7796 
7797 s32 brcmf_cfg80211_up(struct net_device *ndev)
7798 {
7799 	struct brcmf_if *ifp = netdev_priv(ndev);
7800 	struct brcmf_cfg80211_info *cfg = ifp->drvr->config;
7801 	s32 err = 0;
7802 
7803 	mutex_lock(&cfg->usr_sync);
7804 	err = __brcmf_cfg80211_up(ifp);
7805 	mutex_unlock(&cfg->usr_sync);
7806 
7807 	return err;
7808 }
7809 
7810 s32 brcmf_cfg80211_down(struct net_device *ndev)
7811 {
7812 	struct brcmf_if *ifp = netdev_priv(ndev);
7813 	struct brcmf_cfg80211_info *cfg = ifp->drvr->config;
7814 	s32 err = 0;
7815 
7816 	mutex_lock(&cfg->usr_sync);
7817 	err = __brcmf_cfg80211_down(ifp);
7818 	mutex_unlock(&cfg->usr_sync);
7819 
7820 	return err;
7821 }
7822 
7823 enum nl80211_iftype brcmf_cfg80211_get_iftype(struct brcmf_if *ifp)
7824 {
7825 	struct wireless_dev *wdev = &ifp->vif->wdev;
7826 
7827 	return wdev->iftype;
7828 }
7829 
7830 bool brcmf_get_vif_state_any(struct brcmf_cfg80211_info *cfg,
7831 			     unsigned long state)
7832 {
7833 	struct brcmf_cfg80211_vif *vif;
7834 
7835 	list_for_each_entry(vif, &cfg->vif_list, list) {
7836 		if (test_bit(state, &vif->sme_state))
7837 			return true;
7838 	}
7839 	return false;
7840 }
7841 
7842 static inline bool vif_event_equals(struct brcmf_cfg80211_vif_event *event,
7843 				    u8 action)
7844 {
7845 	u8 evt_action;
7846 
7847 	spin_lock(&event->vif_event_lock);
7848 	evt_action = event->action;
7849 	spin_unlock(&event->vif_event_lock);
7850 	return evt_action == action;
7851 }
7852 
7853 void brcmf_cfg80211_arm_vif_event(struct brcmf_cfg80211_info *cfg,
7854 				  struct brcmf_cfg80211_vif *vif)
7855 {
7856 	struct brcmf_cfg80211_vif_event *event = &cfg->vif_event;
7857 
7858 	spin_lock(&event->vif_event_lock);
7859 	event->vif = vif;
7860 	event->action = 0;
7861 	spin_unlock(&event->vif_event_lock);
7862 }
7863 
7864 bool brcmf_cfg80211_vif_event_armed(struct brcmf_cfg80211_info *cfg)
7865 {
7866 	struct brcmf_cfg80211_vif_event *event = &cfg->vif_event;
7867 	bool armed;
7868 
7869 	spin_lock(&event->vif_event_lock);
7870 	armed = event->vif != NULL;
7871 	spin_unlock(&event->vif_event_lock);
7872 
7873 	return armed;
7874 }
7875 
7876 int brcmf_cfg80211_wait_vif_event(struct brcmf_cfg80211_info *cfg,
7877 				  u8 action, ulong timeout)
7878 {
7879 	struct brcmf_cfg80211_vif_event *event = &cfg->vif_event;
7880 
7881 	return wait_event_timeout(event->vif_wq,
7882 				  vif_event_equals(event, action), timeout);
7883 }
7884 
7885 static bool brmcf_use_iso3166_ccode_fallback(struct brcmf_pub *drvr)
7886 {
7887 	if (drvr->settings->trivial_ccode_map)
7888 		return true;
7889 
7890 	switch (drvr->bus_if->chip) {
7891 	case BRCM_CC_43430_CHIP_ID:
7892 	case BRCM_CC_4345_CHIP_ID:
7893 	case BRCM_CC_4356_CHIP_ID:
7894 	case BRCM_CC_43602_CHIP_ID:
7895 		return true;
7896 	default:
7897 		return false;
7898 	}
7899 }
7900 
7901 static s32 brcmf_translate_country_code(struct brcmf_pub *drvr, char alpha2[2],
7902 					struct brcmf_fil_country_le *ccreq)
7903 {
7904 	struct brcmfmac_pd_cc *country_codes;
7905 	struct brcmfmac_pd_cc_entry *cc;
7906 	s32 found_index;
7907 	int i;
7908 
7909 	if ((alpha2[0] == ccreq->country_abbrev[0]) &&
7910 	    (alpha2[1] == ccreq->country_abbrev[1])) {
7911 		brcmf_dbg(TRACE, "Country code already set\n");
7912 		return -EAGAIN;
7913 	}
7914 
7915 	country_codes = drvr->settings->country_codes;
7916 	if (!country_codes) {
7917 		if (brmcf_use_iso3166_ccode_fallback(drvr)) {
7918 			brcmf_dbg(TRACE, "No country codes configured for device, using ISO3166 code and 0 rev\n");
7919 			memset(ccreq, 0, sizeof(*ccreq));
7920 			ccreq->country_abbrev[0] = alpha2[0];
7921 			ccreq->country_abbrev[1] = alpha2[1];
7922 			ccreq->ccode[0] = alpha2[0];
7923 			ccreq->ccode[1] = alpha2[1];
7924 			return 0;
7925 		}
7926 
7927 		brcmf_dbg(TRACE, "No country codes configured for device\n");
7928 		return -EINVAL;
7929 	}
7930 
7931 	found_index = -1;
7932 	for (i = 0; i < country_codes->table_size; i++) {
7933 		cc = &country_codes->table[i];
7934 		if ((cc->iso3166[0] == '\0') && (found_index == -1))
7935 			found_index = i;
7936 		if ((cc->iso3166[0] == alpha2[0]) &&
7937 		    (cc->iso3166[1] == alpha2[1])) {
7938 			found_index = i;
7939 			break;
7940 		}
7941 	}
7942 	if (found_index == -1) {
7943 		brcmf_dbg(TRACE, "No country code match found\n");
7944 		return -EINVAL;
7945 	}
7946 	memset(ccreq, 0, sizeof(*ccreq));
7947 	ccreq->rev = cpu_to_le32(country_codes->table[found_index].rev);
7948 	memcpy(ccreq->ccode, country_codes->table[found_index].cc,
7949 	       BRCMF_COUNTRY_BUF_SZ);
7950 	ccreq->country_abbrev[0] = alpha2[0];
7951 	ccreq->country_abbrev[1] = alpha2[1];
7952 	ccreq->country_abbrev[2] = 0;
7953 
7954 	return 0;
7955 }
7956 
7957 static int
7958 brcmf_parse_dump_obss(char *buf, struct brcmf_dump_survey *survey)
7959 {
7960 	int i;
7961 	char *token;
7962 	char delim[] = "\n ";
7963 	unsigned long val;
7964 	int err = 0;
7965 
7966 	token = strsep(&buf, delim);
7967 	while (token) {
7968 		if (!strcmp(token, "OBSS")) {
7969 			for (i = 0; i < OBSS_TOKEN_IDX; i++)
7970 				token = strsep(&buf, delim);
7971 			err = kstrtoul(token, 10, &val);
7972 			if (err)
7973 				break;
7974 			survey->obss = val;
7975 		}
7976 
7977 		if (!strcmp(token, "IBSS")) {
7978 			for (i = 0; i < IBSS_TOKEN_IDX; i++)
7979 				token = strsep(&buf, delim);
7980 			err = kstrtoul(token, 10, &val);
7981 			if (err)
7982 				break;
7983 			survey->ibss = val;
7984 		}
7985 
7986 		if (!strcmp(token, "TXDur")) {
7987 			for (i = 0; i < TX_TOKEN_IDX; i++)
7988 				token = strsep(&buf, delim);
7989 			err = kstrtoul(token, 10, &val);
7990 			if (err)
7991 				break;
7992 			survey->tx = val;
7993 		}
7994 
7995 		if (!strcmp(token, "Category")) {
7996 			for (i = 0; i < CTG_TOKEN_IDX; i++)
7997 				token = strsep(&buf, delim);
7998 			err = kstrtoul(token, 10, &val);
7999 			if (err)
8000 				break;
8001 			survey->no_ctg = val;
8002 		}
8003 
8004 		if (!strcmp(token, "Packet")) {
8005 			for (i = 0; i < PKT_TOKEN_IDX; i++)
8006 				token = strsep(&buf, delim);
8007 			err = kstrtoul(token, 10, &val);
8008 			if (err)
8009 				break;
8010 			survey->no_pckt = val;
8011 		}
8012 
8013 		if (!strcmp(token, "Opp(time):")) {
8014 			for (i = 0; i < IDLE_TOKEN_IDX; i++)
8015 				token = strsep(&buf, delim);
8016 			err = kstrtoul(token, 10, &val);
8017 			if (err)
8018 				break;
8019 			survey->idle = val;
8020 		}
8021 
8022 		token = strsep(&buf, delim);
8023 	}
8024 
8025 	return err;
8026 }
8027 
8028 static int
8029 brcmf_dump_obss(struct brcmf_if *ifp, struct cca_msrmnt_query req,
8030 		struct brcmf_dump_survey *survey)
8031 {
8032 	struct cca_stats_n_flags *results;
8033 	char *buf;
8034 	int err;
8035 
8036 	buf = kzalloc(sizeof(char) * BRCMF_DCMD_MEDLEN, GFP_KERNEL);
8037 	if (!buf)
8038 		return -ENOMEM;
8039 
8040 	memcpy(buf, &req, sizeof(struct cca_msrmnt_query));
8041 	err = brcmf_fil_iovar_data_get(ifp, "dump_obss",
8042 				       buf, BRCMF_DCMD_MEDLEN);
8043 	if (err) {
8044 		brcmf_err("dump_obss error (%d)\n", err);
8045 		err = -EINVAL;
8046 		goto exit;
8047 	}
8048 	results = (struct cca_stats_n_flags *)(buf);
8049 
8050 	if (req.msrmnt_query)
8051 		brcmf_parse_dump_obss(results->buf, survey);
8052 
8053 exit:
8054 	kfree(buf);
8055 	return err;
8056 }
8057 
8058 static s32
8059 brcmf_set_channel(struct brcmf_cfg80211_info *cfg, struct ieee80211_channel *chan)
8060 {
8061 	u16 chspec = 0;
8062 	int err = 0;
8063 	struct brcmf_if *ifp = netdev_priv(cfg_to_ndev(cfg));
8064 
8065 	if (chan->flags & IEEE80211_CHAN_DISABLED)
8066 		return -EINVAL;
8067 
8068 	/* set_channel */
8069 	chspec = channel_to_chanspec(&cfg->d11inf, chan);
8070 	if (chspec != INVCHANSPEC) {
8071 		err = brcmf_fil_iovar_int_set(ifp, "chanspec", chspec);
8072 		if (err) {
8073 			brcmf_err("set chanspec 0x%04x fail, reason %d\n", chspec, err);
8074 			err = -EINVAL;
8075 		}
8076 	} else {
8077 		brcmf_err("failed to convert host chanspec to fw chanspec\n");
8078 		err = -EINVAL;
8079 	}
8080 
8081 	return err;
8082 }
8083 
8084 static int
8085 brcmf_cfg80211_dump_survey(struct wiphy *wiphy, struct net_device *ndev,
8086 			   int idx, struct survey_info *info)
8087 {
8088 	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
8089 	struct brcmf_if *ifp = netdev_priv(cfg_to_ndev(cfg));
8090 	struct brcmf_dump_survey survey = {};
8091 	struct ieee80211_supported_band *band;
8092 	enum nl80211_band band_id;
8093 	struct cca_msrmnt_query req;
8094 	u32 noise;
8095 	int err;
8096 
8097 	brcmf_dbg(TRACE, "Enter: channel idx=%d\n", idx);
8098 
8099 	/* Do not run survey when VIF in CONNECTING / CONNECTED states */
8100 	if ((test_bit(BRCMF_VIF_STATUS_CONNECTING, &ifp->vif->sme_state)) ||
8101 	    (test_bit(BRCMF_VIF_STATUS_CONNECTED, &ifp->vif->sme_state))) {
8102 		return -EBUSY;
8103 	}
8104 
8105 	for (band_id = 0; band_id < NUM_NL80211_BANDS; band_id++) {
8106 		band = wiphy->bands[band_id];
8107 		if (!band)
8108 			continue;
8109 		if (idx >= band->n_channels) {
8110 			idx -= band->n_channels;
8111 			continue;
8112 		}
8113 
8114 		info->channel = &band->channels[idx];
8115 		break;
8116 	}
8117 	if (band_id == NUM_NL80211_BANDS)
8118 		return -ENOENT;
8119 
8120 	/* Setting current channel to the requested channel */
8121 	info->filled = 0;
8122 	if (brcmf_set_channel(cfg, info->channel))
8123 		return 0;
8124 
8125 	/* Disable mpc */
8126 	brcmf_set_mpc(ifp, 0);
8127 
8128 	/* Set interface up, explicitly. */
8129 	err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_UP, 1);
8130 	if (err) {
8131 		brcmf_err("set interface up failed, err = %d\n", err);
8132 		goto exit;
8133 	}
8134 
8135 	/* Get noise value */
8136 	err = brcmf_fil_cmd_int_get(ifp, BRCMF_C_GET_PHY_NOISE, &noise);
8137 	if (err) {
8138 		brcmf_err("Get Phy Noise failed, use dummy value\n");
8139 		noise = CHAN_NOISE_DUMMY;
8140 	}
8141 
8142 	/* Start Measurement for obss stats on current channel */
8143 	req.msrmnt_query = 0;
8144 	req.time_req = ACS_MSRMNT_DELAY;
8145 	err = brcmf_dump_obss(ifp, req, &survey);
8146 	if (err)
8147 		goto exit;
8148 
8149 	/* Add 10 ms for IOVAR completion */
8150 	msleep(ACS_MSRMNT_DELAY + 10);
8151 
8152 	/* Issue IOVAR to collect measurement results */
8153 	req.msrmnt_query = 1;
8154 	err = brcmf_dump_obss(ifp, req, &survey);
8155 	if (err)
8156 		goto exit;
8157 
8158 	info->noise = noise;
8159 	info->time = ACS_MSRMNT_DELAY;
8160 	info->time_busy = ACS_MSRMNT_DELAY - survey.idle;
8161 	info->time_rx = survey.obss + survey.ibss + survey.no_ctg +
8162 		survey.no_pckt;
8163 	info->time_tx = survey.tx;
8164 	info->filled = SURVEY_INFO_NOISE_DBM | SURVEY_INFO_TIME |
8165 		SURVEY_INFO_TIME_BUSY | SURVEY_INFO_TIME_RX |
8166 		SURVEY_INFO_TIME_TX;
8167 
8168 	brcmf_dbg(INFO, "OBSS dump: channel %d: survey duration %d\n",
8169 		  ieee80211_frequency_to_channel(info->channel->center_freq),
8170 		  ACS_MSRMNT_DELAY);
8171 	brcmf_dbg(INFO, "noise(%d) busy(%llu) rx(%llu) tx(%llu)\n",
8172 		  info->noise, info->time_busy, info->time_rx, info->time_tx);
8173 
8174 exit:
8175 	if (!brcmf_is_apmode(ifp->vif))
8176 		brcmf_set_mpc(ifp, 1);
8177 	return err;
8178 }
8179 
8180 static void brcmf_cfg80211_reg_notifier(struct wiphy *wiphy,
8181 					struct regulatory_request *req)
8182 {
8183 	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
8184 	struct brcmf_if *ifp = brcmf_get_ifp(cfg->pub, 0);
8185 	struct brcmf_pub *drvr = cfg->pub;
8186 	struct brcmf_fil_country_le ccreq;
8187 	s32 err;
8188 	int i;
8189 
8190 	/* The country code gets set to "00" by default at boot, ignore */
8191 	if (req->alpha2[0] == '0' && req->alpha2[1] == '0')
8192 		return;
8193 
8194 	/* ignore non-ISO3166 country codes */
8195 	for (i = 0; i < 2; i++)
8196 		if (req->alpha2[i] < 'A' || req->alpha2[i] > 'Z') {
8197 			bphy_err(drvr, "not an ISO3166 code (0x%02x 0x%02x)\n",
8198 				 req->alpha2[0], req->alpha2[1]);
8199 			return;
8200 		}
8201 
8202 	brcmf_dbg(TRACE, "Enter: initiator=%d, alpha=%c%c\n", req->initiator,
8203 		  req->alpha2[0], req->alpha2[1]);
8204 
8205 	err = brcmf_fil_iovar_data_get(ifp, "country", &ccreq, sizeof(ccreq));
8206 	if (err) {
8207 		bphy_err(drvr, "Country code iovar returned err = %d\n", err);
8208 		return;
8209 	}
8210 
8211 	err = brcmf_translate_country_code(ifp->drvr, req->alpha2, &ccreq);
8212 	if (err)
8213 		return;
8214 
8215 	err = brcmf_fil_iovar_data_set(ifp, "country", &ccreq, sizeof(ccreq));
8216 	if (err) {
8217 		bphy_err(drvr, "Firmware rejected country setting\n");
8218 		return;
8219 	}
8220 	brcmf_setup_wiphybands(cfg);
8221 }
8222 
8223 static void brcmf_free_wiphy(struct wiphy *wiphy)
8224 {
8225 	int i;
8226 
8227 	if (!wiphy)
8228 		return;
8229 
8230 	if (wiphy->iface_combinations) {
8231 		for (i = 0; i < wiphy->n_iface_combinations; i++)
8232 			kfree(wiphy->iface_combinations[i].limits);
8233 	}
8234 	kfree(wiphy->iface_combinations);
8235 	if (wiphy->bands[NL80211_BAND_2GHZ]) {
8236 		kfree(wiphy->bands[NL80211_BAND_2GHZ]->channels);
8237 		kfree(wiphy->bands[NL80211_BAND_2GHZ]);
8238 	}
8239 	if (wiphy->bands[NL80211_BAND_5GHZ]) {
8240 		kfree(wiphy->bands[NL80211_BAND_5GHZ]->channels);
8241 		kfree(wiphy->bands[NL80211_BAND_5GHZ]);
8242 	}
8243 #if IS_ENABLED(CONFIG_PM)
8244 	if (wiphy->wowlan != &brcmf_wowlan_support)
8245 		kfree(wiphy->wowlan);
8246 #endif
8247 }
8248 
8249 struct brcmf_cfg80211_info *brcmf_cfg80211_attach(struct brcmf_pub *drvr,
8250 						  struct cfg80211_ops *ops,
8251 						  bool p2pdev_forced)
8252 {
8253 	struct wiphy *wiphy = drvr->wiphy;
8254 	struct net_device *ndev = brcmf_get_ifp(drvr, 0)->ndev;
8255 	struct brcmf_cfg80211_info *cfg;
8256 	struct brcmf_cfg80211_vif *vif;
8257 	struct brcmf_if *ifp;
8258 	s32 err = 0;
8259 	s32 io_type;
8260 	u16 *cap = NULL;
8261 
8262 	if (!ndev) {
8263 		bphy_err(drvr, "ndev is invalid\n");
8264 		return NULL;
8265 	}
8266 
8267 	cfg = kzalloc(sizeof(*cfg), GFP_KERNEL);
8268 	if (!cfg) {
8269 		bphy_err(drvr, "Could not allocate wiphy device\n");
8270 		return NULL;
8271 	}
8272 
8273 	cfg->wiphy = wiphy;
8274 	cfg->pub = drvr;
8275 	init_vif_event(&cfg->vif_event);
8276 	INIT_LIST_HEAD(&cfg->vif_list);
8277 
8278 	vif = brcmf_alloc_vif(cfg, NL80211_IFTYPE_STATION);
8279 	if (IS_ERR(vif))
8280 		goto wiphy_out;
8281 
8282 	ifp = netdev_priv(ndev);
8283 	vif->ifp = ifp;
8284 	vif->wdev.netdev = ndev;
8285 	ndev->ieee80211_ptr = &vif->wdev;
8286 	SET_NETDEV_DEV(ndev, wiphy_dev(cfg->wiphy));
8287 
8288 	err = wl_init_priv(cfg);
8289 	if (err) {
8290 		bphy_err(drvr, "Failed to init iwm_priv (%d)\n", err);
8291 		brcmf_free_vif(vif);
8292 		goto wiphy_out;
8293 	}
8294 	ifp->vif = vif;
8295 
8296 	/* determine d11 io type before wiphy setup */
8297 	err = brcmf_fil_cmd_int_get(ifp, BRCMF_C_GET_VERSION, &io_type);
8298 	if (err) {
8299 		bphy_err(drvr, "Failed to get D11 version (%d)\n", err);
8300 		goto priv_out;
8301 	}
8302 	cfg->d11inf.io_type = (u8)io_type;
8303 	brcmu_d11_attach(&cfg->d11inf);
8304 
8305 	/* regulatory notifer below needs access to cfg so
8306 	 * assign it now.
8307 	 */
8308 	drvr->config = cfg;
8309 
8310 	err = brcmf_setup_wiphy(wiphy, ifp);
8311 	if (err < 0)
8312 		goto priv_out;
8313 
8314 	brcmf_dbg(INFO, "Registering custom regulatory\n");
8315 	wiphy->reg_notifier = brcmf_cfg80211_reg_notifier;
8316 	wiphy->regulatory_flags |= REGULATORY_CUSTOM_REG;
8317 	wiphy_apply_custom_regulatory(wiphy, &brcmf_regdom);
8318 
8319 	/* firmware defaults to 40MHz disabled in 2G band. We signal
8320 	 * cfg80211 here that we do and have it decide we can enable
8321 	 * it. But first check if device does support 2G operation.
8322 	 */
8323 	if (wiphy->bands[NL80211_BAND_2GHZ]) {
8324 		cap = &wiphy->bands[NL80211_BAND_2GHZ]->ht_cap.cap;
8325 		*cap |= IEEE80211_HT_CAP_SUP_WIDTH_20_40;
8326 	}
8327 #ifdef CONFIG_PM
8328 	if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_WOWL_GTK))
8329 		ops->set_rekey_data = brcmf_cfg80211_set_rekey_data;
8330 #endif
8331 	if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_DUMP_OBSS))
8332 		ops->dump_survey = brcmf_cfg80211_dump_survey;
8333 
8334 	err = wiphy_register(wiphy);
8335 	if (err < 0) {
8336 		bphy_err(drvr, "Could not register wiphy device (%d)\n", err);
8337 		goto priv_out;
8338 	}
8339 
8340 	err = brcmf_setup_wiphybands(cfg);
8341 	if (err) {
8342 		bphy_err(drvr, "Setting wiphy bands failed (%d)\n", err);
8343 		goto wiphy_unreg_out;
8344 	}
8345 
8346 	/* If cfg80211 didn't disable 40MHz HT CAP in wiphy_register(),
8347 	 * setup 40MHz in 2GHz band and enable OBSS scanning.
8348 	 */
8349 	if (cap && (*cap & IEEE80211_HT_CAP_SUP_WIDTH_20_40)) {
8350 		err = brcmf_enable_bw40_2g(cfg);
8351 		if (!err)
8352 			err = brcmf_fil_iovar_int_set(ifp, "obss_coex",
8353 						      BRCMF_OBSS_COEX_AUTO);
8354 		else
8355 			*cap &= ~IEEE80211_HT_CAP_SUP_WIDTH_20_40;
8356 	}
8357 
8358 	err = brcmf_fweh_activate_events(ifp);
8359 	if (err) {
8360 		bphy_err(drvr, "FWEH activation failed (%d)\n", err);
8361 		goto wiphy_unreg_out;
8362 	}
8363 
8364 	err = brcmf_p2p_attach(cfg, p2pdev_forced);
8365 	if (err) {
8366 		bphy_err(drvr, "P2P initialisation failed (%d)\n", err);
8367 		goto wiphy_unreg_out;
8368 	}
8369 	err = brcmf_btcoex_attach(cfg);
8370 	if (err) {
8371 		bphy_err(drvr, "BT-coex initialisation failed (%d)\n", err);
8372 		brcmf_p2p_detach(&cfg->p2p);
8373 		goto wiphy_unreg_out;
8374 	}
8375 	err = brcmf_pno_attach(cfg);
8376 	if (err) {
8377 		bphy_err(drvr, "PNO initialisation failed (%d)\n", err);
8378 		brcmf_btcoex_detach(cfg);
8379 		brcmf_p2p_detach(&cfg->p2p);
8380 		goto wiphy_unreg_out;
8381 	}
8382 
8383 	if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_TDLS)) {
8384 		err = brcmf_fil_iovar_int_set(ifp, "tdls_enable", 1);
8385 		if (err) {
8386 			brcmf_dbg(INFO, "TDLS not enabled (%d)\n", err);
8387 			wiphy->flags &= ~WIPHY_FLAG_SUPPORTS_TDLS;
8388 		} else {
8389 			brcmf_fweh_register(cfg->pub, BRCMF_E_TDLS_PEER_EVENT,
8390 					    brcmf_notify_tdls_peer_event);
8391 		}
8392 	}
8393 
8394 	/* (re-) activate FWEH event handling */
8395 	err = brcmf_fweh_activate_events(ifp);
8396 	if (err) {
8397 		bphy_err(drvr, "FWEH activation failed (%d)\n", err);
8398 		goto detach;
8399 	}
8400 
8401 	/* Fill in some of the advertised nl80211 supported features */
8402 	if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_SCAN_RANDOM_MAC)) {
8403 		wiphy->features |= NL80211_FEATURE_SCHED_SCAN_RANDOM_MAC_ADDR;
8404 #ifdef CONFIG_PM
8405 		if (wiphy->wowlan &&
8406 		    wiphy->wowlan->flags & WIPHY_WOWLAN_NET_DETECT)
8407 			wiphy->features |= NL80211_FEATURE_ND_RANDOM_MAC_ADDR;
8408 #endif
8409 	}
8410 
8411 	return cfg;
8412 
8413 detach:
8414 	brcmf_pno_detach(cfg);
8415 	brcmf_btcoex_detach(cfg);
8416 	brcmf_p2p_detach(&cfg->p2p);
8417 wiphy_unreg_out:
8418 	wiphy_unregister(cfg->wiphy);
8419 priv_out:
8420 	wl_deinit_priv(cfg);
8421 	brcmf_free_vif(vif);
8422 	ifp->vif = NULL;
8423 wiphy_out:
8424 	brcmf_free_wiphy(wiphy);
8425 	kfree(cfg);
8426 	return NULL;
8427 }
8428 
8429 void brcmf_cfg80211_detach(struct brcmf_cfg80211_info *cfg)
8430 {
8431 	if (!cfg)
8432 		return;
8433 
8434 	brcmf_pno_detach(cfg);
8435 	brcmf_btcoex_detach(cfg);
8436 	wiphy_unregister(cfg->wiphy);
8437 	wl_deinit_priv(cfg);
8438 	brcmf_free_wiphy(cfg->wiphy);
8439 	kfree(cfg);
8440 }
8441