1 // SPDX-License-Identifier: ISC 2 /* 3 * Copyright (c) 2010 Broadcom Corporation 4 */ 5 6 /* Toplevel file. Relies on dhd_linux.c to send commands to the dongle. */ 7 8 #include <linux/kernel.h> 9 #include <linux/etherdevice.h> 10 #include <linux/module.h> 11 #include <linux/vmalloc.h> 12 #include <net/cfg80211.h> 13 #include <net/netlink.h> 14 #include <uapi/linux/if_arp.h> 15 16 #include <brcmu_utils.h> 17 #include <defs.h> 18 #include <brcmu_wifi.h> 19 #include <brcm_hw_ids.h> 20 #include "core.h" 21 #include "debug.h" 22 #include "tracepoint.h" 23 #include "fwil_types.h" 24 #include "p2p.h" 25 #include "btcoex.h" 26 #include "pno.h" 27 #include "fwsignal.h" 28 #include "cfg80211.h" 29 #include "feature.h" 30 #include "fwil.h" 31 #include "proto.h" 32 #include "vendor.h" 33 #include "bus.h" 34 #include "common.h" 35 36 #define BRCMF_SCAN_IE_LEN_MAX 2048 37 38 #define WPA_OUI "\x00\x50\xF2" /* WPA OUI */ 39 #define WPA_OUI_TYPE 1 40 #define RSN_OUI "\x00\x0F\xAC" /* RSN OUI */ 41 #define WME_OUI_TYPE 2 42 #define WPS_OUI_TYPE 4 43 44 #define VS_IE_FIXED_HDR_LEN 6 45 #define WPA_IE_VERSION_LEN 2 46 #define WPA_IE_MIN_OUI_LEN 4 47 #define WPA_IE_SUITE_COUNT_LEN 2 48 49 #define WPA_CIPHER_NONE 0 /* None */ 50 #define WPA_CIPHER_WEP_40 1 /* WEP (40-bit) */ 51 #define WPA_CIPHER_TKIP 2 /* TKIP: default for WPA */ 52 #define WPA_CIPHER_AES_CCM 4 /* AES (CCM) */ 53 #define WPA_CIPHER_WEP_104 5 /* WEP (104-bit) */ 54 55 #define RSN_AKM_NONE 0 /* None (IBSS) */ 56 #define RSN_AKM_UNSPECIFIED 1 /* Over 802.1x */ 57 #define RSN_AKM_PSK 2 /* Pre-shared Key */ 58 #define RSN_AKM_SHA256_1X 5 /* SHA256, 802.1X */ 59 #define RSN_AKM_SHA256_PSK 6 /* SHA256, Pre-shared Key */ 60 #define RSN_AKM_SAE 8 /* SAE */ 61 #define RSN_CAP_LEN 2 /* Length of RSN capabilities */ 62 #define RSN_CAP_PTK_REPLAY_CNTR_MASK (BIT(2) | BIT(3)) 63 #define RSN_CAP_MFPR_MASK BIT(6) 64 #define RSN_CAP_MFPC_MASK BIT(7) 65 #define RSN_PMKID_COUNT_LEN 2 66 67 #define VNDR_IE_CMD_LEN 4 /* length of the set command 68 * string :"add", "del" (+ NUL) 69 */ 70 #define VNDR_IE_COUNT_OFFSET 4 71 #define VNDR_IE_PKTFLAG_OFFSET 8 72 #define VNDR_IE_VSIE_OFFSET 12 73 #define VNDR_IE_HDR_SIZE 12 74 #define VNDR_IE_PARSE_LIMIT 5 75 76 #define DOT11_MGMT_HDR_LEN 24 /* d11 management header len */ 77 #define DOT11_BCN_PRB_FIXED_LEN 12 /* beacon/probe fixed length */ 78 79 #define BRCMF_SCAN_JOIN_ACTIVE_DWELL_TIME_MS 320 80 #define BRCMF_SCAN_JOIN_PASSIVE_DWELL_TIME_MS 400 81 #define BRCMF_SCAN_JOIN_PROBE_INTERVAL_MS 20 82 83 #define BRCMF_SCAN_CHANNEL_TIME 40 84 #define BRCMF_SCAN_UNASSOC_TIME 40 85 #define BRCMF_SCAN_PASSIVE_TIME 120 86 87 #define BRCMF_ND_INFO_TIMEOUT msecs_to_jiffies(2000) 88 89 #define BRCMF_PS_MAX_TIMEOUT_MS 2000 90 91 /* Dump obss definitions */ 92 #define ACS_MSRMNT_DELAY 80 93 #define CHAN_NOISE_DUMMY (-80) 94 #define OBSS_TOKEN_IDX 15 95 #define IBSS_TOKEN_IDX 15 96 #define TX_TOKEN_IDX 14 97 #define CTG_TOKEN_IDX 13 98 #define PKT_TOKEN_IDX 15 99 #define IDLE_TOKEN_IDX 12 100 101 #define BRCMF_ASSOC_PARAMS_FIXED_SIZE \ 102 (sizeof(struct brcmf_assoc_params_le) - sizeof(u16)) 103 104 #define BRCMF_MAX_CHANSPEC_LIST \ 105 (BRCMF_DCMD_MEDLEN / sizeof(__le32) - 1) 106 107 struct brcmf_dump_survey { 108 u32 obss; 109 u32 ibss; 110 u32 no_ctg; 111 u32 no_pckt; 112 u32 tx; 113 u32 idle; 114 }; 115 116 struct cca_stats_n_flags { 117 u32 msrmnt_time; /* Time for Measurement (msec) */ 118 u32 msrmnt_done; /* flag set when measurement complete */ 119 char buf[1]; 120 }; 121 122 struct cca_msrmnt_query { 123 u32 msrmnt_query; 124 u32 time_req; 125 }; 126 127 static bool check_vif_up(struct brcmf_cfg80211_vif *vif) 128 { 129 if (!test_bit(BRCMF_VIF_STATUS_READY, &vif->sme_state)) { 130 brcmf_dbg(INFO, "device is not ready : status (%lu)\n", 131 vif->sme_state); 132 return false; 133 } 134 return true; 135 } 136 137 #define RATE_TO_BASE100KBPS(rate) (((rate) * 10) / 2) 138 #define RATETAB_ENT(_rateid, _flags) \ 139 { \ 140 .bitrate = RATE_TO_BASE100KBPS(_rateid), \ 141 .hw_value = (_rateid), \ 142 .flags = (_flags), \ 143 } 144 145 static struct ieee80211_rate __wl_rates[] = { 146 RATETAB_ENT(BRCM_RATE_1M, 0), 147 RATETAB_ENT(BRCM_RATE_2M, IEEE80211_RATE_SHORT_PREAMBLE), 148 RATETAB_ENT(BRCM_RATE_5M5, IEEE80211_RATE_SHORT_PREAMBLE), 149 RATETAB_ENT(BRCM_RATE_11M, IEEE80211_RATE_SHORT_PREAMBLE), 150 RATETAB_ENT(BRCM_RATE_6M, 0), 151 RATETAB_ENT(BRCM_RATE_9M, 0), 152 RATETAB_ENT(BRCM_RATE_12M, 0), 153 RATETAB_ENT(BRCM_RATE_18M, 0), 154 RATETAB_ENT(BRCM_RATE_24M, 0), 155 RATETAB_ENT(BRCM_RATE_36M, 0), 156 RATETAB_ENT(BRCM_RATE_48M, 0), 157 RATETAB_ENT(BRCM_RATE_54M, 0), 158 }; 159 160 #define wl_g_rates (__wl_rates + 0) 161 #define wl_g_rates_size ARRAY_SIZE(__wl_rates) 162 #define wl_a_rates (__wl_rates + 4) 163 #define wl_a_rates_size (wl_g_rates_size - 4) 164 165 #define CHAN2G(_channel, _freq) { \ 166 .band = NL80211_BAND_2GHZ, \ 167 .center_freq = (_freq), \ 168 .hw_value = (_channel), \ 169 .max_antenna_gain = 0, \ 170 .max_power = 30, \ 171 } 172 173 #define CHAN5G(_channel) { \ 174 .band = NL80211_BAND_5GHZ, \ 175 .center_freq = 5000 + (5 * (_channel)), \ 176 .hw_value = (_channel), \ 177 .max_antenna_gain = 0, \ 178 .max_power = 30, \ 179 } 180 181 static struct ieee80211_channel __wl_2ghz_channels[] = { 182 CHAN2G(1, 2412), CHAN2G(2, 2417), CHAN2G(3, 2422), CHAN2G(4, 2427), 183 CHAN2G(5, 2432), CHAN2G(6, 2437), CHAN2G(7, 2442), CHAN2G(8, 2447), 184 CHAN2G(9, 2452), CHAN2G(10, 2457), CHAN2G(11, 2462), CHAN2G(12, 2467), 185 CHAN2G(13, 2472), CHAN2G(14, 2484) 186 }; 187 188 static struct ieee80211_channel __wl_5ghz_channels[] = { 189 CHAN5G(34), CHAN5G(36), CHAN5G(38), CHAN5G(40), CHAN5G(42), 190 CHAN5G(44), CHAN5G(46), CHAN5G(48), CHAN5G(52), CHAN5G(56), 191 CHAN5G(60), CHAN5G(64), CHAN5G(100), CHAN5G(104), CHAN5G(108), 192 CHAN5G(112), CHAN5G(116), CHAN5G(120), CHAN5G(124), CHAN5G(128), 193 CHAN5G(132), CHAN5G(136), CHAN5G(140), CHAN5G(144), CHAN5G(149), 194 CHAN5G(153), CHAN5G(157), CHAN5G(161), CHAN5G(165) 195 }; 196 197 /* Band templates duplicated per wiphy. The channel info 198 * above is added to the band during setup. 199 */ 200 static const struct ieee80211_supported_band __wl_band_2ghz = { 201 .band = NL80211_BAND_2GHZ, 202 .bitrates = wl_g_rates, 203 .n_bitrates = wl_g_rates_size, 204 }; 205 206 static const struct ieee80211_supported_band __wl_band_5ghz = { 207 .band = NL80211_BAND_5GHZ, 208 .bitrates = wl_a_rates, 209 .n_bitrates = wl_a_rates_size, 210 }; 211 212 /* This is to override regulatory domains defined in cfg80211 module (reg.c) 213 * By default world regulatory domain defined in reg.c puts the flags 214 * NL80211_RRF_NO_IR for 5GHz channels (for * 36..48 and 149..165). 215 * With respect to these flags, wpa_supplicant doesn't * start p2p 216 * operations on 5GHz channels. All the changes in world regulatory 217 * domain are to be done here. 218 */ 219 static const struct ieee80211_regdomain brcmf_regdom = { 220 .n_reg_rules = 4, 221 .alpha2 = "99", 222 .reg_rules = { 223 /* IEEE 802.11b/g, channels 1..11 */ 224 REG_RULE(2412-10, 2472+10, 40, 6, 20, 0), 225 /* If any */ 226 /* IEEE 802.11 channel 14 - Only JP enables 227 * this and for 802.11b only 228 */ 229 REG_RULE(2484-10, 2484+10, 20, 6, 20, 0), 230 /* IEEE 802.11a, channel 36..64 */ 231 REG_RULE(5150-10, 5350+10, 160, 6, 20, 0), 232 /* IEEE 802.11a, channel 100..165 */ 233 REG_RULE(5470-10, 5850+10, 160, 6, 20, 0), } 234 }; 235 236 /* Note: brcmf_cipher_suites is an array of int defining which cipher suites 237 * are supported. A pointer to this array and the number of entries is passed 238 * on to upper layers. AES_CMAC defines whether or not the driver supports MFP. 239 * So the cipher suite AES_CMAC has to be the last one in the array, and when 240 * device does not support MFP then the number of suites will be decreased by 1 241 */ 242 static const u32 brcmf_cipher_suites[] = { 243 WLAN_CIPHER_SUITE_WEP40, 244 WLAN_CIPHER_SUITE_WEP104, 245 WLAN_CIPHER_SUITE_TKIP, 246 WLAN_CIPHER_SUITE_CCMP, 247 /* Keep as last entry: */ 248 WLAN_CIPHER_SUITE_AES_CMAC 249 }; 250 251 /* Vendor specific ie. id = 221, oui and type defines exact ie */ 252 struct brcmf_vs_tlv { 253 u8 id; 254 u8 len; 255 u8 oui[3]; 256 u8 oui_type; 257 }; 258 259 struct parsed_vndr_ie_info { 260 u8 *ie_ptr; 261 u32 ie_len; /* total length including id & length field */ 262 struct brcmf_vs_tlv vndrie; 263 }; 264 265 struct parsed_vndr_ies { 266 u32 count; 267 struct parsed_vndr_ie_info ie_info[VNDR_IE_PARSE_LIMIT]; 268 }; 269 270 #define WL_INTERFACE_CREATE_VER_1 1 271 #define WL_INTERFACE_CREATE_VER_2 2 272 #define WL_INTERFACE_CREATE_VER_3 3 273 #define WL_INTERFACE_CREATE_VER_MAX WL_INTERFACE_CREATE_VER_3 274 275 #define WL_INTERFACE_MAC_DONT_USE 0x0 276 #define WL_INTERFACE_MAC_USE 0x2 277 278 #define WL_INTERFACE_CREATE_STA 0x0 279 #define WL_INTERFACE_CREATE_AP 0x1 280 281 struct wl_interface_create_v1 { 282 u16 ver; /* structure version */ 283 u32 flags; /* flags for operation */ 284 u8 mac_addr[ETH_ALEN]; /* MAC address */ 285 u32 wlc_index; /* optional for wlc index */ 286 }; 287 288 struct wl_interface_create_v2 { 289 u16 ver; /* structure version */ 290 u8 pad1[2]; 291 u32 flags; /* flags for operation */ 292 u8 mac_addr[ETH_ALEN]; /* MAC address */ 293 u8 iftype; /* type of interface created */ 294 u8 pad2; 295 u32 wlc_index; /* optional for wlc index */ 296 }; 297 298 struct wl_interface_create_v3 { 299 u16 ver; /* structure version */ 300 u16 len; /* length of structure + data */ 301 u16 fixed_len; /* length of structure */ 302 u8 iftype; /* type of interface created */ 303 u8 wlc_index; /* optional for wlc index */ 304 u32 flags; /* flags for operation */ 305 u8 mac_addr[ETH_ALEN]; /* MAC address */ 306 u8 bssid[ETH_ALEN]; /* optional for BSSID */ 307 u8 if_index; /* interface index request */ 308 u8 pad[3]; 309 u8 data[]; /* Optional for specific data */ 310 }; 311 312 static u8 nl80211_band_to_fwil(enum nl80211_band band) 313 { 314 switch (band) { 315 case NL80211_BAND_2GHZ: 316 return WLC_BAND_2G; 317 case NL80211_BAND_5GHZ: 318 return WLC_BAND_5G; 319 default: 320 WARN_ON(1); 321 break; 322 } 323 return 0; 324 } 325 326 static u16 chandef_to_chanspec(struct brcmu_d11inf *d11inf, 327 struct cfg80211_chan_def *ch) 328 { 329 struct brcmu_chan ch_inf; 330 s32 primary_offset; 331 332 brcmf_dbg(TRACE, "chandef: control %d center %d width %d\n", 333 ch->chan->center_freq, ch->center_freq1, ch->width); 334 ch_inf.chnum = ieee80211_frequency_to_channel(ch->center_freq1); 335 primary_offset = ch->chan->center_freq - ch->center_freq1; 336 switch (ch->width) { 337 case NL80211_CHAN_WIDTH_20: 338 case NL80211_CHAN_WIDTH_20_NOHT: 339 ch_inf.bw = BRCMU_CHAN_BW_20; 340 WARN_ON(primary_offset != 0); 341 break; 342 case NL80211_CHAN_WIDTH_40: 343 ch_inf.bw = BRCMU_CHAN_BW_40; 344 if (primary_offset > 0) 345 ch_inf.sb = BRCMU_CHAN_SB_U; 346 else 347 ch_inf.sb = BRCMU_CHAN_SB_L; 348 break; 349 case NL80211_CHAN_WIDTH_80: 350 ch_inf.bw = BRCMU_CHAN_BW_80; 351 if (primary_offset == -30) 352 ch_inf.sb = BRCMU_CHAN_SB_LL; 353 else if (primary_offset == -10) 354 ch_inf.sb = BRCMU_CHAN_SB_LU; 355 else if (primary_offset == 10) 356 ch_inf.sb = BRCMU_CHAN_SB_UL; 357 else 358 ch_inf.sb = BRCMU_CHAN_SB_UU; 359 break; 360 case NL80211_CHAN_WIDTH_160: 361 ch_inf.bw = BRCMU_CHAN_BW_160; 362 if (primary_offset == -70) 363 ch_inf.sb = BRCMU_CHAN_SB_LLL; 364 else if (primary_offset == -50) 365 ch_inf.sb = BRCMU_CHAN_SB_LLU; 366 else if (primary_offset == -30) 367 ch_inf.sb = BRCMU_CHAN_SB_LUL; 368 else if (primary_offset == -10) 369 ch_inf.sb = BRCMU_CHAN_SB_LUU; 370 else if (primary_offset == 10) 371 ch_inf.sb = BRCMU_CHAN_SB_ULL; 372 else if (primary_offset == 30) 373 ch_inf.sb = BRCMU_CHAN_SB_ULU; 374 else if (primary_offset == 50) 375 ch_inf.sb = BRCMU_CHAN_SB_UUL; 376 else 377 ch_inf.sb = BRCMU_CHAN_SB_UUU; 378 break; 379 case NL80211_CHAN_WIDTH_80P80: 380 case NL80211_CHAN_WIDTH_5: 381 case NL80211_CHAN_WIDTH_10: 382 default: 383 WARN_ON_ONCE(1); 384 } 385 switch (ch->chan->band) { 386 case NL80211_BAND_2GHZ: 387 ch_inf.band = BRCMU_CHAN_BAND_2G; 388 break; 389 case NL80211_BAND_5GHZ: 390 ch_inf.band = BRCMU_CHAN_BAND_5G; 391 break; 392 case NL80211_BAND_60GHZ: 393 default: 394 WARN_ON_ONCE(1); 395 } 396 d11inf->encchspec(&ch_inf); 397 398 brcmf_dbg(TRACE, "chanspec: 0x%x\n", ch_inf.chspec); 399 return ch_inf.chspec; 400 } 401 402 u16 channel_to_chanspec(struct brcmu_d11inf *d11inf, 403 struct ieee80211_channel *ch) 404 { 405 struct brcmu_chan ch_inf; 406 407 ch_inf.chnum = ieee80211_frequency_to_channel(ch->center_freq); 408 ch_inf.bw = BRCMU_CHAN_BW_20; 409 d11inf->encchspec(&ch_inf); 410 411 return ch_inf.chspec; 412 } 413 414 /* Traverse a string of 1-byte tag/1-byte length/variable-length value 415 * triples, returning a pointer to the substring whose first element 416 * matches tag 417 */ 418 static const struct brcmf_tlv * 419 brcmf_parse_tlvs(const void *buf, int buflen, uint key) 420 { 421 const struct brcmf_tlv *elt = buf; 422 int totlen = buflen; 423 424 /* find tagged parameter */ 425 while (totlen >= TLV_HDR_LEN) { 426 int len = elt->len; 427 428 /* validate remaining totlen */ 429 if ((elt->id == key) && (totlen >= (len + TLV_HDR_LEN))) 430 return elt; 431 432 elt = (struct brcmf_tlv *)((u8 *)elt + (len + TLV_HDR_LEN)); 433 totlen -= (len + TLV_HDR_LEN); 434 } 435 436 return NULL; 437 } 438 439 /* Is any of the tlvs the expected entry? If 440 * not update the tlvs buffer pointer/length. 441 */ 442 static bool 443 brcmf_tlv_has_ie(const u8 *ie, const u8 **tlvs, u32 *tlvs_len, 444 const u8 *oui, u32 oui_len, u8 type) 445 { 446 /* If the contents match the OUI and the type */ 447 if (ie[TLV_LEN_OFF] >= oui_len + 1 && 448 !memcmp(&ie[TLV_BODY_OFF], oui, oui_len) && 449 type == ie[TLV_BODY_OFF + oui_len]) { 450 return true; 451 } 452 453 if (tlvs == NULL) 454 return false; 455 /* point to the next ie */ 456 ie += ie[TLV_LEN_OFF] + TLV_HDR_LEN; 457 /* calculate the length of the rest of the buffer */ 458 *tlvs_len -= (int)(ie - *tlvs); 459 /* update the pointer to the start of the buffer */ 460 *tlvs = ie; 461 462 return false; 463 } 464 465 static struct brcmf_vs_tlv * 466 brcmf_find_wpaie(const u8 *parse, u32 len) 467 { 468 const struct brcmf_tlv *ie; 469 470 while ((ie = brcmf_parse_tlvs(parse, len, WLAN_EID_VENDOR_SPECIFIC))) { 471 if (brcmf_tlv_has_ie((const u8 *)ie, &parse, &len, 472 WPA_OUI, TLV_OUI_LEN, WPA_OUI_TYPE)) 473 return (struct brcmf_vs_tlv *)ie; 474 } 475 return NULL; 476 } 477 478 static struct brcmf_vs_tlv * 479 brcmf_find_wpsie(const u8 *parse, u32 len) 480 { 481 const struct brcmf_tlv *ie; 482 483 while ((ie = brcmf_parse_tlvs(parse, len, WLAN_EID_VENDOR_SPECIFIC))) { 484 if (brcmf_tlv_has_ie((u8 *)ie, &parse, &len, 485 WPA_OUI, TLV_OUI_LEN, WPS_OUI_TYPE)) 486 return (struct brcmf_vs_tlv *)ie; 487 } 488 return NULL; 489 } 490 491 static int brcmf_vif_change_validate(struct brcmf_cfg80211_info *cfg, 492 struct brcmf_cfg80211_vif *vif, 493 enum nl80211_iftype new_type) 494 { 495 struct brcmf_cfg80211_vif *pos; 496 bool check_combos = false; 497 int ret = 0; 498 struct iface_combination_params params = { 499 .num_different_channels = 1, 500 }; 501 502 list_for_each_entry(pos, &cfg->vif_list, list) 503 if (pos == vif) { 504 params.iftype_num[new_type]++; 505 } else { 506 /* concurrent interfaces so need check combinations */ 507 check_combos = true; 508 params.iftype_num[pos->wdev.iftype]++; 509 } 510 511 if (check_combos) 512 ret = cfg80211_check_combinations(cfg->wiphy, ¶ms); 513 514 return ret; 515 } 516 517 static int brcmf_vif_add_validate(struct brcmf_cfg80211_info *cfg, 518 enum nl80211_iftype new_type) 519 { 520 struct brcmf_cfg80211_vif *pos; 521 struct iface_combination_params params = { 522 .num_different_channels = 1, 523 }; 524 525 list_for_each_entry(pos, &cfg->vif_list, list) 526 params.iftype_num[pos->wdev.iftype]++; 527 528 params.iftype_num[new_type]++; 529 return cfg80211_check_combinations(cfg->wiphy, ¶ms); 530 } 531 532 static void convert_key_from_CPU(struct brcmf_wsec_key *key, 533 struct brcmf_wsec_key_le *key_le) 534 { 535 key_le->index = cpu_to_le32(key->index); 536 key_le->len = cpu_to_le32(key->len); 537 key_le->algo = cpu_to_le32(key->algo); 538 key_le->flags = cpu_to_le32(key->flags); 539 key_le->rxiv.hi = cpu_to_le32(key->rxiv.hi); 540 key_le->rxiv.lo = cpu_to_le16(key->rxiv.lo); 541 key_le->iv_initialized = cpu_to_le32(key->iv_initialized); 542 memcpy(key_le->data, key->data, sizeof(key->data)); 543 memcpy(key_le->ea, key->ea, sizeof(key->ea)); 544 } 545 546 static int 547 send_key_to_dongle(struct brcmf_if *ifp, struct brcmf_wsec_key *key) 548 { 549 struct brcmf_pub *drvr = ifp->drvr; 550 int err; 551 struct brcmf_wsec_key_le key_le; 552 553 convert_key_from_CPU(key, &key_le); 554 555 brcmf_netdev_wait_pend8021x(ifp); 556 557 err = brcmf_fil_bsscfg_data_set(ifp, "wsec_key", &key_le, 558 sizeof(key_le)); 559 560 if (err) 561 bphy_err(drvr, "wsec_key error (%d)\n", err); 562 return err; 563 } 564 565 static void 566 brcmf_cfg80211_update_proto_addr_mode(struct wireless_dev *wdev) 567 { 568 struct brcmf_cfg80211_vif *vif; 569 struct brcmf_if *ifp; 570 571 vif = container_of(wdev, struct brcmf_cfg80211_vif, wdev); 572 ifp = vif->ifp; 573 574 if ((wdev->iftype == NL80211_IFTYPE_ADHOC) || 575 (wdev->iftype == NL80211_IFTYPE_AP) || 576 (wdev->iftype == NL80211_IFTYPE_P2P_GO)) 577 brcmf_proto_configure_addr_mode(ifp->drvr, ifp->ifidx, 578 ADDR_DIRECT); 579 else 580 brcmf_proto_configure_addr_mode(ifp->drvr, ifp->ifidx, 581 ADDR_INDIRECT); 582 } 583 584 static int brcmf_get_first_free_bsscfgidx(struct brcmf_pub *drvr) 585 { 586 int bsscfgidx; 587 588 for (bsscfgidx = 0; bsscfgidx < BRCMF_MAX_IFS; bsscfgidx++) { 589 /* bsscfgidx 1 is reserved for legacy P2P */ 590 if (bsscfgidx == 1) 591 continue; 592 if (!drvr->iflist[bsscfgidx]) 593 return bsscfgidx; 594 } 595 596 return -ENOMEM; 597 } 598 599 static void brcmf_set_vif_sta_macaddr(struct brcmf_if *ifp, u8 *mac_addr) 600 { 601 u8 mac_idx = ifp->drvr->sta_mac_idx; 602 603 /* set difference MAC address with locally administered bit */ 604 memcpy(mac_addr, ifp->mac_addr, ETH_ALEN); 605 mac_addr[0] |= 0x02; 606 mac_addr[3] ^= mac_idx ? 0xC0 : 0xA0; 607 mac_idx++; 608 mac_idx = mac_idx % 2; 609 ifp->drvr->sta_mac_idx = mac_idx; 610 } 611 612 static int brcmf_cfg80211_request_sta_if(struct brcmf_if *ifp, u8 *macaddr) 613 { 614 struct wl_interface_create_v1 iface_v1; 615 struct wl_interface_create_v2 iface_v2; 616 struct wl_interface_create_v3 iface_v3; 617 u32 iface_create_ver; 618 int err; 619 620 /* interface_create version 1 */ 621 memset(&iface_v1, 0, sizeof(iface_v1)); 622 iface_v1.ver = WL_INTERFACE_CREATE_VER_1; 623 iface_v1.flags = WL_INTERFACE_CREATE_STA | 624 WL_INTERFACE_MAC_USE; 625 if (!is_zero_ether_addr(macaddr)) 626 memcpy(iface_v1.mac_addr, macaddr, ETH_ALEN); 627 else 628 brcmf_set_vif_sta_macaddr(ifp, iface_v1.mac_addr); 629 630 err = brcmf_fil_iovar_data_get(ifp, "interface_create", 631 &iface_v1, 632 sizeof(iface_v1)); 633 if (err) { 634 brcmf_info("failed to create interface(v1), err=%d\n", 635 err); 636 } else { 637 brcmf_dbg(INFO, "interface created(v1)\n"); 638 return 0; 639 } 640 641 /* interface_create version 2 */ 642 memset(&iface_v2, 0, sizeof(iface_v2)); 643 iface_v2.ver = WL_INTERFACE_CREATE_VER_2; 644 iface_v2.flags = WL_INTERFACE_MAC_USE; 645 iface_v2.iftype = WL_INTERFACE_CREATE_STA; 646 if (!is_zero_ether_addr(macaddr)) 647 memcpy(iface_v2.mac_addr, macaddr, ETH_ALEN); 648 else 649 brcmf_set_vif_sta_macaddr(ifp, iface_v2.mac_addr); 650 651 err = brcmf_fil_iovar_data_get(ifp, "interface_create", 652 &iface_v2, 653 sizeof(iface_v2)); 654 if (err) { 655 brcmf_info("failed to create interface(v2), err=%d\n", 656 err); 657 } else { 658 brcmf_dbg(INFO, "interface created(v2)\n"); 659 return 0; 660 } 661 662 /* interface_create version 3+ */ 663 /* get supported version from firmware side */ 664 iface_create_ver = 0; 665 err = brcmf_fil_bsscfg_int_get(ifp, "interface_create", 666 &iface_create_ver); 667 if (err) { 668 brcmf_err("fail to get supported version, err=%d\n", err); 669 return -EOPNOTSUPP; 670 } 671 672 switch (iface_create_ver) { 673 case WL_INTERFACE_CREATE_VER_3: 674 memset(&iface_v3, 0, sizeof(iface_v3)); 675 iface_v3.ver = WL_INTERFACE_CREATE_VER_3; 676 iface_v3.flags = WL_INTERFACE_MAC_USE; 677 iface_v3.iftype = WL_INTERFACE_CREATE_STA; 678 if (!is_zero_ether_addr(macaddr)) 679 memcpy(iface_v3.mac_addr, macaddr, ETH_ALEN); 680 else 681 brcmf_set_vif_sta_macaddr(ifp, iface_v3.mac_addr); 682 683 err = brcmf_fil_iovar_data_get(ifp, "interface_create", 684 &iface_v3, 685 sizeof(iface_v3)); 686 687 if (!err) 688 brcmf_dbg(INFO, "interface created(v3)\n"); 689 break; 690 default: 691 brcmf_err("not support interface create(v%d)\n", 692 iface_create_ver); 693 err = -EOPNOTSUPP; 694 break; 695 } 696 697 if (err) { 698 brcmf_info("station interface creation failed (%d)\n", 699 err); 700 return -EIO; 701 } 702 703 return 0; 704 } 705 706 static int brcmf_cfg80211_request_ap_if(struct brcmf_if *ifp) 707 { 708 struct wl_interface_create_v1 iface_v1; 709 struct wl_interface_create_v2 iface_v2; 710 struct wl_interface_create_v3 iface_v3; 711 u32 iface_create_ver; 712 struct brcmf_pub *drvr = ifp->drvr; 713 struct brcmf_mbss_ssid_le mbss_ssid_le; 714 int bsscfgidx; 715 int err; 716 717 /* interface_create version 1 */ 718 memset(&iface_v1, 0, sizeof(iface_v1)); 719 iface_v1.ver = WL_INTERFACE_CREATE_VER_1; 720 iface_v1.flags = WL_INTERFACE_CREATE_AP | 721 WL_INTERFACE_MAC_USE; 722 723 brcmf_set_vif_sta_macaddr(ifp, iface_v1.mac_addr); 724 725 err = brcmf_fil_iovar_data_get(ifp, "interface_create", 726 &iface_v1, 727 sizeof(iface_v1)); 728 if (err) { 729 brcmf_info("failed to create interface(v1), err=%d\n", 730 err); 731 } else { 732 brcmf_dbg(INFO, "interface created(v1)\n"); 733 return 0; 734 } 735 736 /* interface_create version 2 */ 737 memset(&iface_v2, 0, sizeof(iface_v2)); 738 iface_v2.ver = WL_INTERFACE_CREATE_VER_2; 739 iface_v2.flags = WL_INTERFACE_MAC_USE; 740 iface_v2.iftype = WL_INTERFACE_CREATE_AP; 741 742 brcmf_set_vif_sta_macaddr(ifp, iface_v2.mac_addr); 743 744 err = brcmf_fil_iovar_data_get(ifp, "interface_create", 745 &iface_v2, 746 sizeof(iface_v2)); 747 if (err) { 748 brcmf_info("failed to create interface(v2), err=%d\n", 749 err); 750 } else { 751 brcmf_dbg(INFO, "interface created(v2)\n"); 752 return 0; 753 } 754 755 /* interface_create version 3+ */ 756 /* get supported version from firmware side */ 757 iface_create_ver = 0; 758 err = brcmf_fil_bsscfg_int_get(ifp, "interface_create", 759 &iface_create_ver); 760 if (err) { 761 brcmf_err("fail to get supported version, err=%d\n", err); 762 return -EOPNOTSUPP; 763 } 764 765 switch (iface_create_ver) { 766 case WL_INTERFACE_CREATE_VER_3: 767 memset(&iface_v3, 0, sizeof(iface_v3)); 768 iface_v3.ver = WL_INTERFACE_CREATE_VER_3; 769 iface_v3.flags = WL_INTERFACE_MAC_USE; 770 iface_v3.iftype = WL_INTERFACE_CREATE_AP; 771 brcmf_set_vif_sta_macaddr(ifp, iface_v3.mac_addr); 772 773 err = brcmf_fil_iovar_data_get(ifp, "interface_create", 774 &iface_v3, 775 sizeof(iface_v3)); 776 777 if (!err) 778 brcmf_dbg(INFO, "interface created(v3)\n"); 779 break; 780 default: 781 brcmf_err("not support interface create(v%d)\n", 782 iface_create_ver); 783 err = -EOPNOTSUPP; 784 break; 785 } 786 787 if (err) { 788 brcmf_info("Does not support interface_create (%d)\n", 789 err); 790 memset(&mbss_ssid_le, 0, sizeof(mbss_ssid_le)); 791 bsscfgidx = brcmf_get_first_free_bsscfgidx(ifp->drvr); 792 if (bsscfgidx < 0) 793 return bsscfgidx; 794 795 mbss_ssid_le.bsscfgidx = cpu_to_le32(bsscfgidx); 796 mbss_ssid_le.SSID_len = cpu_to_le32(5); 797 sprintf(mbss_ssid_le.SSID, "ssid%d", bsscfgidx); 798 799 err = brcmf_fil_bsscfg_data_set(ifp, "bsscfg:ssid", &mbss_ssid_le, 800 sizeof(mbss_ssid_le)); 801 802 if (err < 0) 803 bphy_err(drvr, "setting ssid failed %d\n", err); 804 } 805 806 return err; 807 } 808 809 /** 810 * brcmf_apsta_add_vif() - create a new AP or STA virtual interface 811 * 812 * @wiphy: wiphy device of new interface. 813 * @name: name of the new interface. 814 * @params: contains mac address for AP or STA device. 815 * @type: interface type. 816 */ 817 static 818 struct wireless_dev *brcmf_apsta_add_vif(struct wiphy *wiphy, const char *name, 819 struct vif_params *params, 820 enum nl80211_iftype type) 821 { 822 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 823 struct brcmf_if *ifp = netdev_priv(cfg_to_ndev(cfg)); 824 struct brcmf_pub *drvr = cfg->pub; 825 struct brcmf_cfg80211_vif *vif; 826 int err; 827 828 if (type != NL80211_IFTYPE_STATION && type != NL80211_IFTYPE_AP) 829 return ERR_PTR(-EINVAL); 830 831 if (brcmf_cfg80211_vif_event_armed(cfg)) 832 return ERR_PTR(-EBUSY); 833 834 brcmf_dbg(INFO, "Adding vif \"%s\"\n", name); 835 836 vif = brcmf_alloc_vif(cfg, type); 837 if (IS_ERR(vif)) 838 return (struct wireless_dev *)vif; 839 840 brcmf_cfg80211_arm_vif_event(cfg, vif); 841 842 if (type == NL80211_IFTYPE_STATION) 843 err = brcmf_cfg80211_request_sta_if(ifp, params->macaddr); 844 else 845 err = brcmf_cfg80211_request_ap_if(ifp); 846 if (err) { 847 brcmf_cfg80211_arm_vif_event(cfg, NULL); 848 goto fail; 849 } 850 851 /* wait for firmware event */ 852 err = brcmf_cfg80211_wait_vif_event(cfg, BRCMF_E_IF_ADD, 853 BRCMF_VIF_EVENT_TIMEOUT); 854 brcmf_cfg80211_arm_vif_event(cfg, NULL); 855 if (!err) { 856 bphy_err(drvr, "timeout occurred\n"); 857 err = -EIO; 858 goto fail; 859 } 860 861 /* interface created in firmware */ 862 ifp = vif->ifp; 863 if (!ifp) { 864 bphy_err(drvr, "no if pointer provided\n"); 865 err = -ENOENT; 866 goto fail; 867 } 868 869 strscpy(ifp->ndev->name, name, sizeof(ifp->ndev->name)); 870 err = brcmf_net_attach(ifp, true); 871 if (err) { 872 bphy_err(drvr, "Registering netdevice failed\n"); 873 free_netdev(ifp->ndev); 874 goto fail; 875 } 876 877 return &ifp->vif->wdev; 878 879 fail: 880 brcmf_free_vif(vif); 881 return ERR_PTR(err); 882 } 883 884 static bool brcmf_is_apmode(struct brcmf_cfg80211_vif *vif) 885 { 886 enum nl80211_iftype iftype; 887 888 iftype = vif->wdev.iftype; 889 return iftype == NL80211_IFTYPE_AP || iftype == NL80211_IFTYPE_P2P_GO; 890 } 891 892 static bool brcmf_is_ibssmode(struct brcmf_cfg80211_vif *vif) 893 { 894 return vif->wdev.iftype == NL80211_IFTYPE_ADHOC; 895 } 896 897 /** 898 * brcmf_mon_add_vif() - create monitor mode virtual interface 899 * 900 * @wiphy: wiphy device of new interface. 901 * @name: name of the new interface. 902 */ 903 static struct wireless_dev *brcmf_mon_add_vif(struct wiphy *wiphy, 904 const char *name) 905 { 906 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 907 struct brcmf_cfg80211_vif *vif; 908 struct net_device *ndev; 909 struct brcmf_if *ifp; 910 int err; 911 912 if (cfg->pub->mon_if) { 913 err = -EEXIST; 914 goto err_out; 915 } 916 917 vif = brcmf_alloc_vif(cfg, NL80211_IFTYPE_MONITOR); 918 if (IS_ERR(vif)) { 919 err = PTR_ERR(vif); 920 goto err_out; 921 } 922 923 ndev = alloc_netdev(sizeof(*ifp), name, NET_NAME_UNKNOWN, ether_setup); 924 if (!ndev) { 925 err = -ENOMEM; 926 goto err_free_vif; 927 } 928 ndev->type = ARPHRD_IEEE80211_RADIOTAP; 929 ndev->ieee80211_ptr = &vif->wdev; 930 ndev->needs_free_netdev = true; 931 ndev->priv_destructor = brcmf_cfg80211_free_netdev; 932 SET_NETDEV_DEV(ndev, wiphy_dev(cfg->wiphy)); 933 934 ifp = netdev_priv(ndev); 935 ifp->vif = vif; 936 ifp->ndev = ndev; 937 ifp->drvr = cfg->pub; 938 939 vif->ifp = ifp; 940 vif->wdev.netdev = ndev; 941 942 err = brcmf_net_mon_attach(ifp); 943 if (err) { 944 brcmf_err("Failed to attach %s device\n", ndev->name); 945 free_netdev(ndev); 946 goto err_free_vif; 947 } 948 949 cfg->pub->mon_if = ifp; 950 951 return &vif->wdev; 952 953 err_free_vif: 954 brcmf_free_vif(vif); 955 err_out: 956 return ERR_PTR(err); 957 } 958 959 static int brcmf_mon_del_vif(struct wiphy *wiphy, struct wireless_dev *wdev) 960 { 961 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 962 struct net_device *ndev = wdev->netdev; 963 964 ndev->netdev_ops->ndo_stop(ndev); 965 966 brcmf_net_detach(ndev, true); 967 968 cfg->pub->mon_if = NULL; 969 970 return 0; 971 } 972 973 static struct wireless_dev *brcmf_cfg80211_add_iface(struct wiphy *wiphy, 974 const char *name, 975 unsigned char name_assign_type, 976 enum nl80211_iftype type, 977 struct vif_params *params) 978 { 979 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 980 struct brcmf_pub *drvr = cfg->pub; 981 struct wireless_dev *wdev; 982 int err; 983 984 brcmf_dbg(TRACE, "enter: %s type %d\n", name, type); 985 err = brcmf_vif_add_validate(wiphy_to_cfg(wiphy), type); 986 if (err) { 987 bphy_err(drvr, "iface validation failed: err=%d\n", err); 988 return ERR_PTR(err); 989 } 990 switch (type) { 991 case NL80211_IFTYPE_ADHOC: 992 case NL80211_IFTYPE_AP_VLAN: 993 case NL80211_IFTYPE_WDS: 994 case NL80211_IFTYPE_MESH_POINT: 995 return ERR_PTR(-EOPNOTSUPP); 996 case NL80211_IFTYPE_MONITOR: 997 return brcmf_mon_add_vif(wiphy, name); 998 case NL80211_IFTYPE_STATION: 999 case NL80211_IFTYPE_AP: 1000 wdev = brcmf_apsta_add_vif(wiphy, name, params, type); 1001 break; 1002 case NL80211_IFTYPE_P2P_CLIENT: 1003 case NL80211_IFTYPE_P2P_GO: 1004 case NL80211_IFTYPE_P2P_DEVICE: 1005 wdev = brcmf_p2p_add_vif(wiphy, name, name_assign_type, type, params); 1006 break; 1007 case NL80211_IFTYPE_UNSPECIFIED: 1008 default: 1009 return ERR_PTR(-EINVAL); 1010 } 1011 1012 if (IS_ERR(wdev)) 1013 bphy_err(drvr, "add iface %s type %d failed: err=%d\n", name, 1014 type, (int)PTR_ERR(wdev)); 1015 else 1016 brcmf_cfg80211_update_proto_addr_mode(wdev); 1017 1018 return wdev; 1019 } 1020 1021 static void brcmf_scan_config_mpc(struct brcmf_if *ifp, int mpc) 1022 { 1023 if (brcmf_feat_is_quirk_enabled(ifp, BRCMF_FEAT_QUIRK_NEED_MPC)) 1024 brcmf_set_mpc(ifp, mpc); 1025 } 1026 1027 void brcmf_set_mpc(struct brcmf_if *ifp, int mpc) 1028 { 1029 struct brcmf_pub *drvr = ifp->drvr; 1030 s32 err = 0; 1031 1032 if (check_vif_up(ifp->vif)) { 1033 err = brcmf_fil_iovar_int_set(ifp, "mpc", mpc); 1034 if (err) { 1035 bphy_err(drvr, "fail to set mpc\n"); 1036 return; 1037 } 1038 brcmf_dbg(INFO, "MPC : %d\n", mpc); 1039 } 1040 } 1041 1042 static void brcmf_scan_params_v2_to_v1(struct brcmf_scan_params_v2_le *params_v2_le, 1043 struct brcmf_scan_params_le *params_le) 1044 { 1045 size_t params_size; 1046 u32 ch; 1047 int n_channels, n_ssids; 1048 1049 memcpy(¶ms_le->ssid_le, ¶ms_v2_le->ssid_le, 1050 sizeof(params_le->ssid_le)); 1051 memcpy(¶ms_le->bssid, ¶ms_v2_le->bssid, 1052 sizeof(params_le->bssid)); 1053 1054 params_le->bss_type = params_v2_le->bss_type; 1055 params_le->scan_type = le32_to_cpu(params_v2_le->scan_type); 1056 params_le->nprobes = params_v2_le->nprobes; 1057 params_le->active_time = params_v2_le->active_time; 1058 params_le->passive_time = params_v2_le->passive_time; 1059 params_le->home_time = params_v2_le->home_time; 1060 params_le->channel_num = params_v2_le->channel_num; 1061 1062 ch = le32_to_cpu(params_v2_le->channel_num); 1063 n_channels = ch & BRCMF_SCAN_PARAMS_COUNT_MASK; 1064 n_ssids = ch >> BRCMF_SCAN_PARAMS_NSSID_SHIFT; 1065 1066 params_size = sizeof(u16) * n_channels; 1067 if (n_ssids > 0) { 1068 params_size = roundup(params_size, sizeof(u32)); 1069 params_size += sizeof(struct brcmf_ssid_le) * n_ssids; 1070 } 1071 1072 memcpy(¶ms_le->channel_list[0], 1073 ¶ms_v2_le->channel_list[0], params_size); 1074 } 1075 1076 static void brcmf_escan_prep(struct brcmf_cfg80211_info *cfg, 1077 struct brcmf_scan_params_v2_le *params_le, 1078 struct cfg80211_scan_request *request) 1079 { 1080 u32 n_ssids; 1081 u32 n_channels; 1082 s32 i; 1083 s32 offset; 1084 u16 chanspec; 1085 char *ptr; 1086 int length; 1087 struct brcmf_ssid_le ssid_le; 1088 1089 eth_broadcast_addr(params_le->bssid); 1090 1091 length = BRCMF_SCAN_PARAMS_V2_FIXED_SIZE; 1092 1093 params_le->version = cpu_to_le16(BRCMF_SCAN_PARAMS_VERSION_V2); 1094 params_le->bss_type = DOT11_BSSTYPE_ANY; 1095 params_le->scan_type = cpu_to_le32(BRCMF_SCANTYPE_ACTIVE); 1096 params_le->channel_num = 0; 1097 params_le->nprobes = cpu_to_le32(-1); 1098 params_le->active_time = cpu_to_le32(-1); 1099 params_le->passive_time = cpu_to_le32(-1); 1100 params_le->home_time = cpu_to_le32(-1); 1101 memset(¶ms_le->ssid_le, 0, sizeof(params_le->ssid_le)); 1102 1103 /* Scan abort */ 1104 if (!request) { 1105 length += sizeof(u16); 1106 params_le->channel_num = cpu_to_le32(1); 1107 params_le->channel_list[0] = cpu_to_le16(-1); 1108 params_le->length = cpu_to_le16(length); 1109 return; 1110 } 1111 1112 n_ssids = request->n_ssids; 1113 n_channels = request->n_channels; 1114 1115 /* Copy channel array if applicable */ 1116 brcmf_dbg(SCAN, "### List of channelspecs to scan ### %d\n", 1117 n_channels); 1118 if (n_channels > 0) { 1119 length += roundup(sizeof(u16) * n_channels, sizeof(u32)); 1120 for (i = 0; i < n_channels; i++) { 1121 chanspec = channel_to_chanspec(&cfg->d11inf, 1122 request->channels[i]); 1123 brcmf_dbg(SCAN, "Chan : %d, Channel spec: %x\n", 1124 request->channels[i]->hw_value, chanspec); 1125 params_le->channel_list[i] = cpu_to_le16(chanspec); 1126 } 1127 } else { 1128 brcmf_dbg(SCAN, "Scanning all channels\n"); 1129 } 1130 1131 /* Copy ssid array if applicable */ 1132 brcmf_dbg(SCAN, "### List of SSIDs to scan ### %d\n", n_ssids); 1133 if (n_ssids > 0) { 1134 offset = offsetof(struct brcmf_scan_params_v2_le, channel_list) + 1135 n_channels * sizeof(u16); 1136 offset = roundup(offset, sizeof(u32)); 1137 length += sizeof(ssid_le) * n_ssids, 1138 ptr = (char *)params_le + offset; 1139 for (i = 0; i < n_ssids; i++) { 1140 memset(&ssid_le, 0, sizeof(ssid_le)); 1141 ssid_le.SSID_len = 1142 cpu_to_le32(request->ssids[i].ssid_len); 1143 memcpy(ssid_le.SSID, request->ssids[i].ssid, 1144 request->ssids[i].ssid_len); 1145 if (!ssid_le.SSID_len) 1146 brcmf_dbg(SCAN, "%d: Broadcast scan\n", i); 1147 else 1148 brcmf_dbg(SCAN, "%d: scan for %.32s size=%d\n", 1149 i, ssid_le.SSID, ssid_le.SSID_len); 1150 memcpy(ptr, &ssid_le, sizeof(ssid_le)); 1151 ptr += sizeof(ssid_le); 1152 } 1153 } else { 1154 brcmf_dbg(SCAN, "Performing passive scan\n"); 1155 params_le->scan_type = cpu_to_le32(BRCMF_SCANTYPE_PASSIVE); 1156 } 1157 params_le->length = cpu_to_le16(length); 1158 /* Adding mask to channel numbers */ 1159 params_le->channel_num = 1160 cpu_to_le32((n_ssids << BRCMF_SCAN_PARAMS_NSSID_SHIFT) | 1161 (n_channels & BRCMF_SCAN_PARAMS_COUNT_MASK)); 1162 } 1163 1164 s32 brcmf_notify_escan_complete(struct brcmf_cfg80211_info *cfg, 1165 struct brcmf_if *ifp, bool aborted, 1166 bool fw_abort) 1167 { 1168 struct brcmf_pub *drvr = cfg->pub; 1169 struct brcmf_scan_params_v2_le params_v2_le; 1170 struct cfg80211_scan_request *scan_request; 1171 u64 reqid; 1172 u32 bucket; 1173 s32 err = 0; 1174 1175 brcmf_dbg(SCAN, "Enter\n"); 1176 1177 /* clear scan request, because the FW abort can cause a second call */ 1178 /* to this functon and might cause a double cfg80211_scan_done */ 1179 scan_request = cfg->scan_request; 1180 cfg->scan_request = NULL; 1181 1182 if (timer_pending(&cfg->escan_timeout)) 1183 del_timer_sync(&cfg->escan_timeout); 1184 1185 if (fw_abort) { 1186 /* Do a scan abort to stop the driver's scan engine */ 1187 brcmf_dbg(SCAN, "ABORT scan in firmware\n"); 1188 1189 brcmf_escan_prep(cfg, ¶ms_v2_le, NULL); 1190 1191 /* E-Scan (or anyother type) can be aborted by SCAN */ 1192 if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_SCAN_V2)) { 1193 err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SCAN, 1194 ¶ms_v2_le, 1195 sizeof(params_v2_le)); 1196 } else { 1197 struct brcmf_scan_params_le params_le; 1198 1199 brcmf_scan_params_v2_to_v1(¶ms_v2_le, ¶ms_le); 1200 err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SCAN, 1201 ¶ms_le, 1202 sizeof(params_le)); 1203 } 1204 1205 if (err) 1206 bphy_err(drvr, "Scan abort failed\n"); 1207 } 1208 1209 brcmf_scan_config_mpc(ifp, 1); 1210 1211 /* 1212 * e-scan can be initiated internally 1213 * which takes precedence. 1214 */ 1215 if (cfg->int_escan_map) { 1216 brcmf_dbg(SCAN, "scheduled scan completed (%x)\n", 1217 cfg->int_escan_map); 1218 while (cfg->int_escan_map) { 1219 bucket = __ffs(cfg->int_escan_map); 1220 cfg->int_escan_map &= ~BIT(bucket); 1221 reqid = brcmf_pno_find_reqid_by_bucket(cfg->pno, 1222 bucket); 1223 if (!aborted) { 1224 brcmf_dbg(SCAN, "report results: reqid=%llu\n", 1225 reqid); 1226 cfg80211_sched_scan_results(cfg_to_wiphy(cfg), 1227 reqid); 1228 } 1229 } 1230 } else if (scan_request) { 1231 struct cfg80211_scan_info info = { 1232 .aborted = aborted, 1233 }; 1234 1235 brcmf_dbg(SCAN, "ESCAN Completed scan: %s\n", 1236 aborted ? "Aborted" : "Done"); 1237 cfg80211_scan_done(scan_request, &info); 1238 } 1239 if (!test_and_clear_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status)) 1240 brcmf_dbg(SCAN, "Scan complete, probably P2P scan\n"); 1241 1242 return err; 1243 } 1244 1245 static int brcmf_cfg80211_del_apsta_iface(struct wiphy *wiphy, 1246 struct wireless_dev *wdev) 1247 { 1248 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 1249 struct net_device *ndev = wdev->netdev; 1250 struct brcmf_if *ifp = netdev_priv(ndev); 1251 struct brcmf_pub *drvr = cfg->pub; 1252 int ret; 1253 int err; 1254 1255 brcmf_cfg80211_arm_vif_event(cfg, ifp->vif); 1256 1257 err = brcmf_fil_bsscfg_data_set(ifp, "interface_remove", NULL, 0); 1258 if (err) { 1259 bphy_err(drvr, "interface_remove failed %d\n", err); 1260 goto err_unarm; 1261 } 1262 1263 /* wait for firmware event */ 1264 ret = brcmf_cfg80211_wait_vif_event(cfg, BRCMF_E_IF_DEL, 1265 BRCMF_VIF_EVENT_TIMEOUT); 1266 if (!ret) { 1267 bphy_err(drvr, "timeout occurred\n"); 1268 err = -EIO; 1269 goto err_unarm; 1270 } 1271 1272 brcmf_remove_interface(ifp, true); 1273 1274 err_unarm: 1275 brcmf_cfg80211_arm_vif_event(cfg, NULL); 1276 return err; 1277 } 1278 1279 static 1280 int brcmf_cfg80211_del_iface(struct wiphy *wiphy, struct wireless_dev *wdev) 1281 { 1282 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 1283 struct net_device *ndev = wdev->netdev; 1284 1285 if (ndev && ndev == cfg_to_ndev(cfg)) 1286 return -ENOTSUPP; 1287 1288 /* vif event pending in firmware */ 1289 if (brcmf_cfg80211_vif_event_armed(cfg)) 1290 return -EBUSY; 1291 1292 if (ndev) { 1293 if (test_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status) && 1294 cfg->escan_info.ifp == netdev_priv(ndev)) 1295 brcmf_notify_escan_complete(cfg, netdev_priv(ndev), 1296 true, true); 1297 1298 brcmf_fil_iovar_int_set(netdev_priv(ndev), "mpc", 1); 1299 } 1300 1301 switch (wdev->iftype) { 1302 case NL80211_IFTYPE_ADHOC: 1303 case NL80211_IFTYPE_AP_VLAN: 1304 case NL80211_IFTYPE_WDS: 1305 case NL80211_IFTYPE_MESH_POINT: 1306 return -EOPNOTSUPP; 1307 case NL80211_IFTYPE_MONITOR: 1308 return brcmf_mon_del_vif(wiphy, wdev); 1309 case NL80211_IFTYPE_STATION: 1310 case NL80211_IFTYPE_AP: 1311 return brcmf_cfg80211_del_apsta_iface(wiphy, wdev); 1312 case NL80211_IFTYPE_P2P_CLIENT: 1313 case NL80211_IFTYPE_P2P_GO: 1314 case NL80211_IFTYPE_P2P_DEVICE: 1315 return brcmf_p2p_del_vif(wiphy, wdev); 1316 case NL80211_IFTYPE_UNSPECIFIED: 1317 default: 1318 return -EINVAL; 1319 } 1320 return -EOPNOTSUPP; 1321 } 1322 1323 static s32 1324 brcmf_cfg80211_change_iface(struct wiphy *wiphy, struct net_device *ndev, 1325 enum nl80211_iftype type, 1326 struct vif_params *params) 1327 { 1328 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 1329 struct brcmf_if *ifp = netdev_priv(ndev); 1330 struct brcmf_cfg80211_vif *vif = ifp->vif; 1331 struct brcmf_pub *drvr = cfg->pub; 1332 s32 infra = 0; 1333 s32 ap = 0; 1334 s32 err = 0; 1335 1336 brcmf_dbg(TRACE, "Enter, bsscfgidx=%d, type=%d\n", ifp->bsscfgidx, 1337 type); 1338 1339 /* WAR: There are a number of p2p interface related problems which 1340 * need to be handled initially (before doing the validate). 1341 * wpa_supplicant tends to do iface changes on p2p device/client/go 1342 * which are not always possible/allowed. However we need to return 1343 * OK otherwise the wpa_supplicant wont start. The situation differs 1344 * on configuration and setup (p2pon=1 module param). The first check 1345 * is to see if the request is a change to station for p2p iface. 1346 */ 1347 if ((type == NL80211_IFTYPE_STATION) && 1348 ((vif->wdev.iftype == NL80211_IFTYPE_P2P_CLIENT) || 1349 (vif->wdev.iftype == NL80211_IFTYPE_P2P_GO) || 1350 (vif->wdev.iftype == NL80211_IFTYPE_P2P_DEVICE))) { 1351 brcmf_dbg(TRACE, "Ignoring cmd for p2p if\n"); 1352 /* Now depending on whether module param p2pon=1 was used the 1353 * response needs to be either 0 or EOPNOTSUPP. The reason is 1354 * that if p2pon=1 is used, but a newer supplicant is used then 1355 * we should return an error, as this combination wont work. 1356 * In other situations 0 is returned and supplicant will start 1357 * normally. It will give a trace in cfg80211, but it is the 1358 * only way to get it working. Unfortunately this will result 1359 * in situation where we wont support new supplicant in 1360 * combination with module param p2pon=1, but that is the way 1361 * it is. If the user tries this then unloading of driver might 1362 * fail/lock. 1363 */ 1364 if (cfg->p2p.p2pdev_dynamically) 1365 return -EOPNOTSUPP; 1366 else 1367 return 0; 1368 } 1369 err = brcmf_vif_change_validate(wiphy_to_cfg(wiphy), vif, type); 1370 if (err) { 1371 bphy_err(drvr, "iface validation failed: err=%d\n", err); 1372 return err; 1373 } 1374 switch (type) { 1375 case NL80211_IFTYPE_MONITOR: 1376 case NL80211_IFTYPE_WDS: 1377 bphy_err(drvr, "type (%d) : currently we do not support this type\n", 1378 type); 1379 return -EOPNOTSUPP; 1380 case NL80211_IFTYPE_ADHOC: 1381 infra = 0; 1382 break; 1383 case NL80211_IFTYPE_STATION: 1384 infra = 1; 1385 break; 1386 case NL80211_IFTYPE_AP: 1387 case NL80211_IFTYPE_P2P_GO: 1388 ap = 1; 1389 break; 1390 default: 1391 err = -EINVAL; 1392 goto done; 1393 } 1394 1395 if (ap) { 1396 if (type == NL80211_IFTYPE_P2P_GO) { 1397 brcmf_dbg(INFO, "IF Type = P2P GO\n"); 1398 err = brcmf_p2p_ifchange(cfg, BRCMF_FIL_P2P_IF_GO); 1399 } 1400 if (!err) { 1401 brcmf_dbg(INFO, "IF Type = AP\n"); 1402 } 1403 } else { 1404 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_INFRA, infra); 1405 if (err) { 1406 bphy_err(drvr, "WLC_SET_INFRA error (%d)\n", err); 1407 err = -EAGAIN; 1408 goto done; 1409 } 1410 brcmf_dbg(INFO, "IF Type = %s\n", brcmf_is_ibssmode(vif) ? 1411 "Adhoc" : "Infra"); 1412 } 1413 ndev->ieee80211_ptr->iftype = type; 1414 1415 brcmf_cfg80211_update_proto_addr_mode(&vif->wdev); 1416 1417 done: 1418 brcmf_dbg(TRACE, "Exit\n"); 1419 1420 return err; 1421 } 1422 1423 static s32 1424 brcmf_run_escan(struct brcmf_cfg80211_info *cfg, struct brcmf_if *ifp, 1425 struct cfg80211_scan_request *request) 1426 { 1427 struct brcmf_pub *drvr = cfg->pub; 1428 s32 params_size = BRCMF_SCAN_PARAMS_V2_FIXED_SIZE + 1429 offsetof(struct brcmf_escan_params_le, params_v2_le); 1430 struct brcmf_escan_params_le *params; 1431 s32 err = 0; 1432 1433 brcmf_dbg(SCAN, "E-SCAN START\n"); 1434 1435 if (request != NULL) { 1436 /* Allocate space for populating ssids in struct */ 1437 params_size += sizeof(u32) * ((request->n_channels + 1) / 2); 1438 1439 /* Allocate space for populating ssids in struct */ 1440 params_size += sizeof(struct brcmf_ssid_le) * request->n_ssids; 1441 } 1442 1443 params = kzalloc(params_size, GFP_KERNEL); 1444 if (!params) { 1445 err = -ENOMEM; 1446 goto exit; 1447 } 1448 BUG_ON(params_size + sizeof("escan") >= BRCMF_DCMD_MEDLEN); 1449 brcmf_escan_prep(cfg, ¶ms->params_v2_le, request); 1450 1451 params->version = cpu_to_le32(BRCMF_ESCAN_REQ_VERSION_V2); 1452 1453 if (!brcmf_feat_is_enabled(ifp, BRCMF_FEAT_SCAN_V2)) { 1454 struct brcmf_escan_params_le *params_v1; 1455 1456 params_size -= BRCMF_SCAN_PARAMS_V2_FIXED_SIZE; 1457 params_size += BRCMF_SCAN_PARAMS_FIXED_SIZE; 1458 params_v1 = kzalloc(params_size, GFP_KERNEL); 1459 if (!params_v1) { 1460 err = -ENOMEM; 1461 goto exit_params; 1462 } 1463 params_v1->version = cpu_to_le32(BRCMF_ESCAN_REQ_VERSION); 1464 brcmf_scan_params_v2_to_v1(¶ms->params_v2_le, ¶ms_v1->params_le); 1465 kfree(params); 1466 params = params_v1; 1467 } 1468 1469 params->action = cpu_to_le16(WL_ESCAN_ACTION_START); 1470 params->sync_id = cpu_to_le16(0x1234); 1471 1472 err = brcmf_fil_iovar_data_set(ifp, "escan", params, params_size); 1473 if (err) { 1474 if (err == -EBUSY) 1475 brcmf_dbg(INFO, "system busy : escan canceled\n"); 1476 else 1477 bphy_err(drvr, "error (%d)\n", err); 1478 } 1479 1480 exit_params: 1481 kfree(params); 1482 exit: 1483 return err; 1484 } 1485 1486 static s32 1487 brcmf_do_escan(struct brcmf_if *ifp, struct cfg80211_scan_request *request) 1488 { 1489 struct brcmf_cfg80211_info *cfg = ifp->drvr->config; 1490 s32 err; 1491 struct brcmf_scan_results *results; 1492 struct escan_info *escan = &cfg->escan_info; 1493 1494 brcmf_dbg(SCAN, "Enter\n"); 1495 escan->ifp = ifp; 1496 escan->wiphy = cfg->wiphy; 1497 escan->escan_state = WL_ESCAN_STATE_SCANNING; 1498 1499 brcmf_scan_config_mpc(ifp, 0); 1500 results = (struct brcmf_scan_results *)cfg->escan_info.escan_buf; 1501 results->version = 0; 1502 results->count = 0; 1503 results->buflen = WL_ESCAN_RESULTS_FIXED_SIZE; 1504 1505 err = escan->run(cfg, ifp, request); 1506 if (err) 1507 brcmf_scan_config_mpc(ifp, 1); 1508 return err; 1509 } 1510 1511 static s32 1512 brcmf_cfg80211_scan(struct wiphy *wiphy, struct cfg80211_scan_request *request) 1513 { 1514 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 1515 struct brcmf_pub *drvr = cfg->pub; 1516 struct brcmf_cfg80211_vif *vif; 1517 s32 err = 0; 1518 1519 brcmf_dbg(TRACE, "Enter\n"); 1520 vif = container_of(request->wdev, struct brcmf_cfg80211_vif, wdev); 1521 if (!check_vif_up(vif)) 1522 return -EIO; 1523 1524 if (test_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status)) { 1525 bphy_err(drvr, "Scanning already: status (%lu)\n", 1526 cfg->scan_status); 1527 return -EAGAIN; 1528 } 1529 if (test_bit(BRCMF_SCAN_STATUS_ABORT, &cfg->scan_status)) { 1530 bphy_err(drvr, "Scanning being aborted: status (%lu)\n", 1531 cfg->scan_status); 1532 return -EAGAIN; 1533 } 1534 if (test_bit(BRCMF_SCAN_STATUS_SUPPRESS, &cfg->scan_status)) { 1535 bphy_err(drvr, "Scanning suppressed: status (%lu)\n", 1536 cfg->scan_status); 1537 return -EAGAIN; 1538 } 1539 if (test_bit(BRCMF_VIF_STATUS_CONNECTING, &vif->sme_state)) { 1540 bphy_err(drvr, "Connecting: status (%lu)\n", vif->sme_state); 1541 return -EAGAIN; 1542 } 1543 1544 /* If scan req comes for p2p0, send it over primary I/F */ 1545 if (vif == cfg->p2p.bss_idx[P2PAPI_BSSCFG_DEVICE].vif) 1546 vif = cfg->p2p.bss_idx[P2PAPI_BSSCFG_PRIMARY].vif; 1547 1548 brcmf_dbg(SCAN, "START ESCAN\n"); 1549 1550 cfg->scan_request = request; 1551 set_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status); 1552 1553 cfg->escan_info.run = brcmf_run_escan; 1554 err = brcmf_p2p_scan_prep(wiphy, request, vif); 1555 if (err) 1556 goto scan_out; 1557 1558 err = brcmf_vif_set_mgmt_ie(vif, BRCMF_VNDR_IE_PRBREQ_FLAG, 1559 request->ie, request->ie_len); 1560 if (err) 1561 goto scan_out; 1562 1563 err = brcmf_do_escan(vif->ifp, request); 1564 if (err) 1565 goto scan_out; 1566 1567 /* Arm scan timeout timer */ 1568 mod_timer(&cfg->escan_timeout, 1569 jiffies + msecs_to_jiffies(BRCMF_ESCAN_TIMER_INTERVAL_MS)); 1570 1571 return 0; 1572 1573 scan_out: 1574 bphy_err(drvr, "scan error (%d)\n", err); 1575 clear_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status); 1576 cfg->scan_request = NULL; 1577 return err; 1578 } 1579 1580 static s32 brcmf_set_rts(struct net_device *ndev, u32 rts_threshold) 1581 { 1582 struct brcmf_if *ifp = netdev_priv(ndev); 1583 struct brcmf_pub *drvr = ifp->drvr; 1584 s32 err = 0; 1585 1586 err = brcmf_fil_iovar_int_set(ifp, "rtsthresh", rts_threshold); 1587 if (err) 1588 bphy_err(drvr, "Error (%d)\n", err); 1589 1590 return err; 1591 } 1592 1593 static s32 brcmf_set_frag(struct net_device *ndev, u32 frag_threshold) 1594 { 1595 struct brcmf_if *ifp = netdev_priv(ndev); 1596 struct brcmf_pub *drvr = ifp->drvr; 1597 s32 err = 0; 1598 1599 err = brcmf_fil_iovar_int_set(ifp, "fragthresh", 1600 frag_threshold); 1601 if (err) 1602 bphy_err(drvr, "Error (%d)\n", err); 1603 1604 return err; 1605 } 1606 1607 static s32 brcmf_set_retry(struct net_device *ndev, u32 retry, bool l) 1608 { 1609 struct brcmf_if *ifp = netdev_priv(ndev); 1610 struct brcmf_pub *drvr = ifp->drvr; 1611 s32 err = 0; 1612 u32 cmd = (l ? BRCMF_C_SET_LRL : BRCMF_C_SET_SRL); 1613 1614 err = brcmf_fil_cmd_int_set(ifp, cmd, retry); 1615 if (err) { 1616 bphy_err(drvr, "cmd (%d) , error (%d)\n", cmd, err); 1617 return err; 1618 } 1619 return err; 1620 } 1621 1622 static s32 brcmf_cfg80211_set_wiphy_params(struct wiphy *wiphy, u32 changed) 1623 { 1624 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 1625 struct net_device *ndev = cfg_to_ndev(cfg); 1626 struct brcmf_if *ifp = netdev_priv(ndev); 1627 s32 err = 0; 1628 1629 brcmf_dbg(TRACE, "Enter\n"); 1630 if (!check_vif_up(ifp->vif)) 1631 return -EIO; 1632 1633 if (changed & WIPHY_PARAM_RTS_THRESHOLD && 1634 (cfg->conf->rts_threshold != wiphy->rts_threshold)) { 1635 cfg->conf->rts_threshold = wiphy->rts_threshold; 1636 err = brcmf_set_rts(ndev, cfg->conf->rts_threshold); 1637 if (!err) 1638 goto done; 1639 } 1640 if (changed & WIPHY_PARAM_FRAG_THRESHOLD && 1641 (cfg->conf->frag_threshold != wiphy->frag_threshold)) { 1642 cfg->conf->frag_threshold = wiphy->frag_threshold; 1643 err = brcmf_set_frag(ndev, cfg->conf->frag_threshold); 1644 if (!err) 1645 goto done; 1646 } 1647 if (changed & WIPHY_PARAM_RETRY_LONG 1648 && (cfg->conf->retry_long != wiphy->retry_long)) { 1649 cfg->conf->retry_long = wiphy->retry_long; 1650 err = brcmf_set_retry(ndev, cfg->conf->retry_long, true); 1651 if (!err) 1652 goto done; 1653 } 1654 if (changed & WIPHY_PARAM_RETRY_SHORT 1655 && (cfg->conf->retry_short != wiphy->retry_short)) { 1656 cfg->conf->retry_short = wiphy->retry_short; 1657 err = brcmf_set_retry(ndev, cfg->conf->retry_short, false); 1658 if (!err) 1659 goto done; 1660 } 1661 1662 done: 1663 brcmf_dbg(TRACE, "Exit\n"); 1664 return err; 1665 } 1666 1667 static void brcmf_init_prof(struct brcmf_cfg80211_profile *prof) 1668 { 1669 memset(prof, 0, sizeof(*prof)); 1670 } 1671 1672 static u16 brcmf_map_fw_linkdown_reason(const struct brcmf_event_msg *e) 1673 { 1674 u16 reason; 1675 1676 switch (e->event_code) { 1677 case BRCMF_E_DEAUTH: 1678 case BRCMF_E_DEAUTH_IND: 1679 case BRCMF_E_DISASSOC_IND: 1680 reason = e->reason; 1681 break; 1682 case BRCMF_E_LINK: 1683 default: 1684 reason = 0; 1685 break; 1686 } 1687 return reason; 1688 } 1689 1690 static int brcmf_set_pmk(struct brcmf_if *ifp, const u8 *pmk_data, u16 pmk_len) 1691 { 1692 struct brcmf_pub *drvr = ifp->drvr; 1693 struct brcmf_wsec_pmk_le pmk; 1694 int err; 1695 1696 memset(&pmk, 0, sizeof(pmk)); 1697 1698 /* pass pmk directly */ 1699 pmk.key_len = cpu_to_le16(pmk_len); 1700 pmk.flags = cpu_to_le16(0); 1701 memcpy(pmk.key, pmk_data, pmk_len); 1702 1703 /* store psk in firmware */ 1704 err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_WSEC_PMK, 1705 &pmk, sizeof(pmk)); 1706 if (err < 0) 1707 bphy_err(drvr, "failed to change PSK in firmware (len=%u)\n", 1708 pmk_len); 1709 1710 return err; 1711 } 1712 1713 static int brcmf_set_sae_password(struct brcmf_if *ifp, const u8 *pwd_data, 1714 u16 pwd_len) 1715 { 1716 struct brcmf_pub *drvr = ifp->drvr; 1717 struct brcmf_wsec_sae_pwd_le sae_pwd; 1718 int err; 1719 1720 if (pwd_len > BRCMF_WSEC_MAX_SAE_PASSWORD_LEN) { 1721 bphy_err(drvr, "sae_password must be less than %d\n", 1722 BRCMF_WSEC_MAX_SAE_PASSWORD_LEN); 1723 return -EINVAL; 1724 } 1725 1726 sae_pwd.key_len = cpu_to_le16(pwd_len); 1727 memcpy(sae_pwd.key, pwd_data, pwd_len); 1728 1729 err = brcmf_fil_iovar_data_set(ifp, "sae_password", &sae_pwd, 1730 sizeof(sae_pwd)); 1731 if (err < 0) 1732 bphy_err(drvr, "failed to set SAE password in firmware (len=%u)\n", 1733 pwd_len); 1734 1735 return err; 1736 } 1737 1738 static void brcmf_link_down(struct brcmf_cfg80211_vif *vif, u16 reason, 1739 bool locally_generated) 1740 { 1741 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(vif->wdev.wiphy); 1742 struct brcmf_pub *drvr = cfg->pub; 1743 bool bus_up = drvr->bus_if->state == BRCMF_BUS_UP; 1744 s32 err = 0; 1745 1746 brcmf_dbg(TRACE, "Enter\n"); 1747 1748 if (test_and_clear_bit(BRCMF_VIF_STATUS_CONNECTED, &vif->sme_state)) { 1749 if (bus_up) { 1750 brcmf_dbg(INFO, "Call WLC_DISASSOC to stop excess roaming\n"); 1751 err = brcmf_fil_cmd_data_set(vif->ifp, 1752 BRCMF_C_DISASSOC, NULL, 0); 1753 if (err) 1754 bphy_err(drvr, "WLC_DISASSOC failed (%d)\n", 1755 err); 1756 } 1757 1758 if ((vif->wdev.iftype == NL80211_IFTYPE_STATION) || 1759 (vif->wdev.iftype == NL80211_IFTYPE_P2P_CLIENT)) 1760 cfg80211_disconnected(vif->wdev.netdev, reason, NULL, 0, 1761 locally_generated, GFP_KERNEL); 1762 } 1763 clear_bit(BRCMF_VIF_STATUS_CONNECTING, &vif->sme_state); 1764 clear_bit(BRCMF_VIF_STATUS_EAP_SUCCESS, &vif->sme_state); 1765 clear_bit(BRCMF_VIF_STATUS_ASSOC_SUCCESS, &vif->sme_state); 1766 clear_bit(BRCMF_SCAN_STATUS_SUPPRESS, &cfg->scan_status); 1767 brcmf_btcoex_set_mode(vif, BRCMF_BTCOEX_ENABLED, 0); 1768 if (vif->profile.use_fwsup != BRCMF_PROFILE_FWSUP_NONE) { 1769 if (bus_up) 1770 brcmf_set_pmk(vif->ifp, NULL, 0); 1771 vif->profile.use_fwsup = BRCMF_PROFILE_FWSUP_NONE; 1772 } 1773 brcmf_dbg(TRACE, "Exit\n"); 1774 } 1775 1776 static s32 1777 brcmf_cfg80211_join_ibss(struct wiphy *wiphy, struct net_device *ndev, 1778 struct cfg80211_ibss_params *params) 1779 { 1780 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 1781 struct brcmf_if *ifp = netdev_priv(ndev); 1782 struct brcmf_cfg80211_profile *profile = &ifp->vif->profile; 1783 struct brcmf_pub *drvr = cfg->pub; 1784 struct brcmf_join_params join_params; 1785 size_t join_params_size = 0; 1786 s32 err = 0; 1787 s32 wsec = 0; 1788 s32 bcnprd; 1789 u16 chanspec; 1790 u32 ssid_len; 1791 1792 brcmf_dbg(TRACE, "Enter\n"); 1793 if (!check_vif_up(ifp->vif)) 1794 return -EIO; 1795 1796 if (params->ssid) 1797 brcmf_dbg(CONN, "SSID: %s\n", params->ssid); 1798 else { 1799 brcmf_dbg(CONN, "SSID: NULL, Not supported\n"); 1800 return -EOPNOTSUPP; 1801 } 1802 1803 set_bit(BRCMF_VIF_STATUS_CONNECTING, &ifp->vif->sme_state); 1804 1805 if (params->bssid) 1806 brcmf_dbg(CONN, "BSSID: %pM\n", params->bssid); 1807 else 1808 brcmf_dbg(CONN, "No BSSID specified\n"); 1809 1810 if (params->chandef.chan) 1811 brcmf_dbg(CONN, "channel: %d\n", 1812 params->chandef.chan->center_freq); 1813 else 1814 brcmf_dbg(CONN, "no channel specified\n"); 1815 1816 if (params->channel_fixed) 1817 brcmf_dbg(CONN, "fixed channel required\n"); 1818 else 1819 brcmf_dbg(CONN, "no fixed channel required\n"); 1820 1821 if (params->ie && params->ie_len) 1822 brcmf_dbg(CONN, "ie len: %d\n", params->ie_len); 1823 else 1824 brcmf_dbg(CONN, "no ie specified\n"); 1825 1826 if (params->beacon_interval) 1827 brcmf_dbg(CONN, "beacon interval: %d\n", 1828 params->beacon_interval); 1829 else 1830 brcmf_dbg(CONN, "no beacon interval specified\n"); 1831 1832 if (params->basic_rates) 1833 brcmf_dbg(CONN, "basic rates: %08X\n", params->basic_rates); 1834 else 1835 brcmf_dbg(CONN, "no basic rates specified\n"); 1836 1837 if (params->privacy) 1838 brcmf_dbg(CONN, "privacy required\n"); 1839 else 1840 brcmf_dbg(CONN, "no privacy required\n"); 1841 1842 /* Configure Privacy for starter */ 1843 if (params->privacy) 1844 wsec |= WEP_ENABLED; 1845 1846 err = brcmf_fil_iovar_int_set(ifp, "wsec", wsec); 1847 if (err) { 1848 bphy_err(drvr, "wsec failed (%d)\n", err); 1849 goto done; 1850 } 1851 1852 /* Configure Beacon Interval for starter */ 1853 if (params->beacon_interval) 1854 bcnprd = params->beacon_interval; 1855 else 1856 bcnprd = 100; 1857 1858 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_BCNPRD, bcnprd); 1859 if (err) { 1860 bphy_err(drvr, "WLC_SET_BCNPRD failed (%d)\n", err); 1861 goto done; 1862 } 1863 1864 /* Configure required join parameter */ 1865 memset(&join_params, 0, sizeof(struct brcmf_join_params)); 1866 1867 /* SSID */ 1868 ssid_len = min_t(u32, params->ssid_len, IEEE80211_MAX_SSID_LEN); 1869 memcpy(join_params.ssid_le.SSID, params->ssid, ssid_len); 1870 join_params.ssid_le.SSID_len = cpu_to_le32(ssid_len); 1871 join_params_size = sizeof(join_params.ssid_le); 1872 1873 /* BSSID */ 1874 if (params->bssid) { 1875 memcpy(join_params.params_le.bssid, params->bssid, ETH_ALEN); 1876 join_params_size += BRCMF_ASSOC_PARAMS_FIXED_SIZE; 1877 memcpy(profile->bssid, params->bssid, ETH_ALEN); 1878 } else { 1879 eth_broadcast_addr(join_params.params_le.bssid); 1880 eth_zero_addr(profile->bssid); 1881 } 1882 1883 /* Channel */ 1884 if (params->chandef.chan) { 1885 u32 target_channel; 1886 1887 cfg->channel = 1888 ieee80211_frequency_to_channel( 1889 params->chandef.chan->center_freq); 1890 if (params->channel_fixed) { 1891 /* adding chanspec */ 1892 chanspec = chandef_to_chanspec(&cfg->d11inf, 1893 ¶ms->chandef); 1894 join_params.params_le.chanspec_list[0] = 1895 cpu_to_le16(chanspec); 1896 join_params.params_le.chanspec_num = cpu_to_le32(1); 1897 join_params_size += sizeof(join_params.params_le); 1898 } 1899 1900 /* set channel for starter */ 1901 target_channel = cfg->channel; 1902 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_CHANNEL, 1903 target_channel); 1904 if (err) { 1905 bphy_err(drvr, "WLC_SET_CHANNEL failed (%d)\n", err); 1906 goto done; 1907 } 1908 } else 1909 cfg->channel = 0; 1910 1911 cfg->ibss_starter = false; 1912 1913 1914 err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_SSID, 1915 &join_params, join_params_size); 1916 if (err) { 1917 bphy_err(drvr, "WLC_SET_SSID failed (%d)\n", err); 1918 goto done; 1919 } 1920 1921 done: 1922 if (err) 1923 clear_bit(BRCMF_VIF_STATUS_CONNECTING, &ifp->vif->sme_state); 1924 brcmf_dbg(TRACE, "Exit\n"); 1925 return err; 1926 } 1927 1928 static s32 1929 brcmf_cfg80211_leave_ibss(struct wiphy *wiphy, struct net_device *ndev) 1930 { 1931 struct brcmf_if *ifp = netdev_priv(ndev); 1932 1933 brcmf_dbg(TRACE, "Enter\n"); 1934 if (!check_vif_up(ifp->vif)) { 1935 /* When driver is being unloaded, it can end up here. If an 1936 * error is returned then later on a debug trace in the wireless 1937 * core module will be printed. To avoid this 0 is returned. 1938 */ 1939 return 0; 1940 } 1941 1942 brcmf_link_down(ifp->vif, WLAN_REASON_DEAUTH_LEAVING, true); 1943 brcmf_net_setcarrier(ifp, false); 1944 1945 brcmf_dbg(TRACE, "Exit\n"); 1946 1947 return 0; 1948 } 1949 1950 static s32 brcmf_set_wpa_version(struct net_device *ndev, 1951 struct cfg80211_connect_params *sme) 1952 { 1953 struct brcmf_if *ifp = netdev_priv(ndev); 1954 struct brcmf_cfg80211_profile *profile = ndev_to_prof(ndev); 1955 struct brcmf_pub *drvr = ifp->drvr; 1956 struct brcmf_cfg80211_security *sec; 1957 s32 val = 0; 1958 s32 err = 0; 1959 1960 if (sme->crypto.wpa_versions & NL80211_WPA_VERSION_1) 1961 val = WPA_AUTH_PSK | WPA_AUTH_UNSPECIFIED; 1962 else if (sme->crypto.wpa_versions & NL80211_WPA_VERSION_2) 1963 val = WPA2_AUTH_PSK | WPA2_AUTH_UNSPECIFIED; 1964 else if (sme->crypto.wpa_versions & NL80211_WPA_VERSION_3) 1965 val = WPA3_AUTH_SAE_PSK; 1966 else 1967 val = WPA_AUTH_DISABLED; 1968 brcmf_dbg(CONN, "setting wpa_auth to 0x%0x\n", val); 1969 err = brcmf_fil_bsscfg_int_set(ifp, "wpa_auth", val); 1970 if (err) { 1971 bphy_err(drvr, "set wpa_auth failed (%d)\n", err); 1972 return err; 1973 } 1974 sec = &profile->sec; 1975 sec->wpa_versions = sme->crypto.wpa_versions; 1976 return err; 1977 } 1978 1979 static s32 brcmf_set_auth_type(struct net_device *ndev, 1980 struct cfg80211_connect_params *sme) 1981 { 1982 struct brcmf_if *ifp = netdev_priv(ndev); 1983 struct brcmf_cfg80211_profile *profile = ndev_to_prof(ndev); 1984 struct brcmf_pub *drvr = ifp->drvr; 1985 struct brcmf_cfg80211_security *sec; 1986 s32 val = 0; 1987 s32 err = 0; 1988 1989 switch (sme->auth_type) { 1990 case NL80211_AUTHTYPE_OPEN_SYSTEM: 1991 val = 0; 1992 brcmf_dbg(CONN, "open system\n"); 1993 break; 1994 case NL80211_AUTHTYPE_SHARED_KEY: 1995 val = 1; 1996 brcmf_dbg(CONN, "shared key\n"); 1997 break; 1998 case NL80211_AUTHTYPE_SAE: 1999 val = 3; 2000 brcmf_dbg(CONN, "SAE authentication\n"); 2001 break; 2002 default: 2003 val = 2; 2004 brcmf_dbg(CONN, "automatic, auth type (%d)\n", sme->auth_type); 2005 break; 2006 } 2007 2008 err = brcmf_fil_bsscfg_int_set(ifp, "auth", val); 2009 if (err) { 2010 bphy_err(drvr, "set auth failed (%d)\n", err); 2011 return err; 2012 } 2013 sec = &profile->sec; 2014 sec->auth_type = sme->auth_type; 2015 return err; 2016 } 2017 2018 static s32 2019 brcmf_set_wsec_mode(struct net_device *ndev, 2020 struct cfg80211_connect_params *sme) 2021 { 2022 struct brcmf_if *ifp = netdev_priv(ndev); 2023 struct brcmf_cfg80211_profile *profile = ndev_to_prof(ndev); 2024 struct brcmf_pub *drvr = ifp->drvr; 2025 struct brcmf_cfg80211_security *sec; 2026 s32 pval = 0; 2027 s32 gval = 0; 2028 s32 wsec; 2029 s32 err = 0; 2030 2031 if (sme->crypto.n_ciphers_pairwise) { 2032 switch (sme->crypto.ciphers_pairwise[0]) { 2033 case WLAN_CIPHER_SUITE_WEP40: 2034 case WLAN_CIPHER_SUITE_WEP104: 2035 pval = WEP_ENABLED; 2036 break; 2037 case WLAN_CIPHER_SUITE_TKIP: 2038 pval = TKIP_ENABLED; 2039 break; 2040 case WLAN_CIPHER_SUITE_CCMP: 2041 pval = AES_ENABLED; 2042 break; 2043 case WLAN_CIPHER_SUITE_AES_CMAC: 2044 pval = AES_ENABLED; 2045 break; 2046 default: 2047 bphy_err(drvr, "invalid cipher pairwise (%d)\n", 2048 sme->crypto.ciphers_pairwise[0]); 2049 return -EINVAL; 2050 } 2051 } 2052 if (sme->crypto.cipher_group) { 2053 switch (sme->crypto.cipher_group) { 2054 case WLAN_CIPHER_SUITE_WEP40: 2055 case WLAN_CIPHER_SUITE_WEP104: 2056 gval = WEP_ENABLED; 2057 break; 2058 case WLAN_CIPHER_SUITE_TKIP: 2059 gval = TKIP_ENABLED; 2060 break; 2061 case WLAN_CIPHER_SUITE_CCMP: 2062 gval = AES_ENABLED; 2063 break; 2064 case WLAN_CIPHER_SUITE_AES_CMAC: 2065 gval = AES_ENABLED; 2066 break; 2067 default: 2068 bphy_err(drvr, "invalid cipher group (%d)\n", 2069 sme->crypto.cipher_group); 2070 return -EINVAL; 2071 } 2072 } 2073 2074 brcmf_dbg(CONN, "pval (%d) gval (%d)\n", pval, gval); 2075 /* In case of privacy, but no security and WPS then simulate */ 2076 /* setting AES. WPS-2.0 allows no security */ 2077 if (brcmf_find_wpsie(sme->ie, sme->ie_len) && !pval && !gval && 2078 sme->privacy) 2079 pval = AES_ENABLED; 2080 2081 wsec = pval | gval; 2082 err = brcmf_fil_bsscfg_int_set(ifp, "wsec", wsec); 2083 if (err) { 2084 bphy_err(drvr, "error (%d)\n", err); 2085 return err; 2086 } 2087 2088 sec = &profile->sec; 2089 sec->cipher_pairwise = sme->crypto.ciphers_pairwise[0]; 2090 sec->cipher_group = sme->crypto.cipher_group; 2091 2092 return err; 2093 } 2094 2095 static s32 2096 brcmf_set_key_mgmt(struct net_device *ndev, struct cfg80211_connect_params *sme) 2097 { 2098 struct brcmf_if *ifp = netdev_priv(ndev); 2099 struct brcmf_cfg80211_profile *profile = &ifp->vif->profile; 2100 struct brcmf_pub *drvr = ifp->drvr; 2101 s32 val; 2102 s32 err; 2103 const struct brcmf_tlv *rsn_ie; 2104 const u8 *ie; 2105 u32 ie_len; 2106 u32 offset; 2107 u16 rsn_cap; 2108 u32 mfp; 2109 u16 count; 2110 2111 profile->use_fwsup = BRCMF_PROFILE_FWSUP_NONE; 2112 profile->is_ft = false; 2113 2114 if (!sme->crypto.n_akm_suites) 2115 return 0; 2116 2117 err = brcmf_fil_bsscfg_int_get(netdev_priv(ndev), "wpa_auth", &val); 2118 if (err) { 2119 bphy_err(drvr, "could not get wpa_auth (%d)\n", err); 2120 return err; 2121 } 2122 if (val & (WPA_AUTH_PSK | WPA_AUTH_UNSPECIFIED)) { 2123 switch (sme->crypto.akm_suites[0]) { 2124 case WLAN_AKM_SUITE_8021X: 2125 val = WPA_AUTH_UNSPECIFIED; 2126 if (sme->want_1x) 2127 profile->use_fwsup = BRCMF_PROFILE_FWSUP_1X; 2128 break; 2129 case WLAN_AKM_SUITE_PSK: 2130 val = WPA_AUTH_PSK; 2131 break; 2132 default: 2133 bphy_err(drvr, "invalid akm suite (%d)\n", 2134 sme->crypto.akm_suites[0]); 2135 return -EINVAL; 2136 } 2137 } else if (val & (WPA2_AUTH_PSK | WPA2_AUTH_UNSPECIFIED)) { 2138 switch (sme->crypto.akm_suites[0]) { 2139 case WLAN_AKM_SUITE_8021X: 2140 val = WPA2_AUTH_UNSPECIFIED; 2141 if (sme->want_1x) 2142 profile->use_fwsup = BRCMF_PROFILE_FWSUP_1X; 2143 break; 2144 case WLAN_AKM_SUITE_8021X_SHA256: 2145 val = WPA2_AUTH_1X_SHA256; 2146 if (sme->want_1x) 2147 profile->use_fwsup = BRCMF_PROFILE_FWSUP_1X; 2148 break; 2149 case WLAN_AKM_SUITE_PSK_SHA256: 2150 val = WPA2_AUTH_PSK_SHA256; 2151 break; 2152 case WLAN_AKM_SUITE_PSK: 2153 val = WPA2_AUTH_PSK; 2154 break; 2155 case WLAN_AKM_SUITE_FT_8021X: 2156 val = WPA2_AUTH_UNSPECIFIED | WPA2_AUTH_FT; 2157 profile->is_ft = true; 2158 if (sme->want_1x) 2159 profile->use_fwsup = BRCMF_PROFILE_FWSUP_1X; 2160 break; 2161 case WLAN_AKM_SUITE_FT_PSK: 2162 val = WPA2_AUTH_PSK | WPA2_AUTH_FT; 2163 profile->is_ft = true; 2164 break; 2165 default: 2166 bphy_err(drvr, "invalid akm suite (%d)\n", 2167 sme->crypto.akm_suites[0]); 2168 return -EINVAL; 2169 } 2170 } else if (val & WPA3_AUTH_SAE_PSK) { 2171 switch (sme->crypto.akm_suites[0]) { 2172 case WLAN_AKM_SUITE_SAE: 2173 val = WPA3_AUTH_SAE_PSK; 2174 if (sme->crypto.sae_pwd) { 2175 brcmf_dbg(INFO, "using SAE offload\n"); 2176 profile->use_fwsup = BRCMF_PROFILE_FWSUP_SAE; 2177 } 2178 break; 2179 case WLAN_AKM_SUITE_FT_OVER_SAE: 2180 val = WPA3_AUTH_SAE_PSK | WPA2_AUTH_FT; 2181 profile->is_ft = true; 2182 if (sme->crypto.sae_pwd) { 2183 brcmf_dbg(INFO, "using SAE offload\n"); 2184 profile->use_fwsup = BRCMF_PROFILE_FWSUP_SAE; 2185 } 2186 break; 2187 default: 2188 bphy_err(drvr, "invalid akm suite (%d)\n", 2189 sme->crypto.akm_suites[0]); 2190 return -EINVAL; 2191 } 2192 } 2193 2194 if (profile->use_fwsup == BRCMF_PROFILE_FWSUP_1X) 2195 brcmf_dbg(INFO, "using 1X offload\n"); 2196 2197 if (!brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MFP)) 2198 goto skip_mfp_config; 2199 /* The MFP mode (1 or 2) needs to be determined, parse IEs. The 2200 * IE will not be verified, just a quick search for MFP config 2201 */ 2202 rsn_ie = brcmf_parse_tlvs((const u8 *)sme->ie, sme->ie_len, 2203 WLAN_EID_RSN); 2204 if (!rsn_ie) 2205 goto skip_mfp_config; 2206 ie = (const u8 *)rsn_ie; 2207 ie_len = rsn_ie->len + TLV_HDR_LEN; 2208 /* Skip unicast suite */ 2209 offset = TLV_HDR_LEN + WPA_IE_VERSION_LEN + WPA_IE_MIN_OUI_LEN; 2210 if (offset + WPA_IE_SUITE_COUNT_LEN >= ie_len) 2211 goto skip_mfp_config; 2212 /* Skip multicast suite */ 2213 count = ie[offset] + (ie[offset + 1] << 8); 2214 offset += WPA_IE_SUITE_COUNT_LEN + (count * WPA_IE_MIN_OUI_LEN); 2215 if (offset + WPA_IE_SUITE_COUNT_LEN >= ie_len) 2216 goto skip_mfp_config; 2217 /* Skip auth key management suite(s) */ 2218 count = ie[offset] + (ie[offset + 1] << 8); 2219 offset += WPA_IE_SUITE_COUNT_LEN + (count * WPA_IE_MIN_OUI_LEN); 2220 if (offset + WPA_IE_SUITE_COUNT_LEN > ie_len) 2221 goto skip_mfp_config; 2222 /* Ready to read capabilities */ 2223 mfp = BRCMF_MFP_NONE; 2224 rsn_cap = ie[offset] + (ie[offset + 1] << 8); 2225 if (rsn_cap & RSN_CAP_MFPR_MASK) 2226 mfp = BRCMF_MFP_REQUIRED; 2227 else if (rsn_cap & RSN_CAP_MFPC_MASK) 2228 mfp = BRCMF_MFP_CAPABLE; 2229 brcmf_fil_bsscfg_int_set(netdev_priv(ndev), "mfp", mfp); 2230 2231 skip_mfp_config: 2232 brcmf_dbg(CONN, "setting wpa_auth to %d\n", val); 2233 err = brcmf_fil_bsscfg_int_set(netdev_priv(ndev), "wpa_auth", val); 2234 if (err) { 2235 bphy_err(drvr, "could not set wpa_auth (%d)\n", err); 2236 return err; 2237 } 2238 2239 return err; 2240 } 2241 2242 static s32 2243 brcmf_set_sharedkey(struct net_device *ndev, 2244 struct cfg80211_connect_params *sme) 2245 { 2246 struct brcmf_if *ifp = netdev_priv(ndev); 2247 struct brcmf_pub *drvr = ifp->drvr; 2248 struct brcmf_cfg80211_profile *profile = ndev_to_prof(ndev); 2249 struct brcmf_cfg80211_security *sec; 2250 struct brcmf_wsec_key key; 2251 s32 val; 2252 s32 err = 0; 2253 2254 brcmf_dbg(CONN, "key len (%d)\n", sme->key_len); 2255 2256 if (sme->key_len == 0) 2257 return 0; 2258 2259 sec = &profile->sec; 2260 brcmf_dbg(CONN, "wpa_versions 0x%x cipher_pairwise 0x%x\n", 2261 sec->wpa_versions, sec->cipher_pairwise); 2262 2263 if (sec->wpa_versions & (NL80211_WPA_VERSION_1 | NL80211_WPA_VERSION_2 | 2264 NL80211_WPA_VERSION_3)) 2265 return 0; 2266 2267 if (!(sec->cipher_pairwise & 2268 (WLAN_CIPHER_SUITE_WEP40 | WLAN_CIPHER_SUITE_WEP104))) 2269 return 0; 2270 2271 memset(&key, 0, sizeof(key)); 2272 key.len = (u32) sme->key_len; 2273 key.index = (u32) sme->key_idx; 2274 if (key.len > sizeof(key.data)) { 2275 bphy_err(drvr, "Too long key length (%u)\n", key.len); 2276 return -EINVAL; 2277 } 2278 memcpy(key.data, sme->key, key.len); 2279 key.flags = BRCMF_PRIMARY_KEY; 2280 switch (sec->cipher_pairwise) { 2281 case WLAN_CIPHER_SUITE_WEP40: 2282 key.algo = CRYPTO_ALGO_WEP1; 2283 break; 2284 case WLAN_CIPHER_SUITE_WEP104: 2285 key.algo = CRYPTO_ALGO_WEP128; 2286 break; 2287 default: 2288 bphy_err(drvr, "Invalid algorithm (%d)\n", 2289 sme->crypto.ciphers_pairwise[0]); 2290 return -EINVAL; 2291 } 2292 /* Set the new key/index */ 2293 brcmf_dbg(CONN, "key length (%d) key index (%d) algo (%d)\n", 2294 key.len, key.index, key.algo); 2295 brcmf_dbg(CONN, "key \"%s\"\n", key.data); 2296 err = send_key_to_dongle(ifp, &key); 2297 if (err) 2298 return err; 2299 2300 if (sec->auth_type == NL80211_AUTHTYPE_SHARED_KEY) { 2301 brcmf_dbg(CONN, "set auth_type to shared key\n"); 2302 val = WL_AUTH_SHARED_KEY; /* shared key */ 2303 err = brcmf_fil_bsscfg_int_set(ifp, "auth", val); 2304 if (err) 2305 bphy_err(drvr, "set auth failed (%d)\n", err); 2306 } 2307 return err; 2308 } 2309 2310 static 2311 enum nl80211_auth_type brcmf_war_auth_type(struct brcmf_if *ifp, 2312 enum nl80211_auth_type type) 2313 { 2314 if (type == NL80211_AUTHTYPE_AUTOMATIC && 2315 brcmf_feat_is_quirk_enabled(ifp, BRCMF_FEAT_QUIRK_AUTO_AUTH)) { 2316 brcmf_dbg(CONN, "WAR: use OPEN instead of AUTO\n"); 2317 type = NL80211_AUTHTYPE_OPEN_SYSTEM; 2318 } 2319 return type; 2320 } 2321 2322 static void brcmf_set_join_pref(struct brcmf_if *ifp, 2323 struct cfg80211_bss_selection *bss_select) 2324 { 2325 struct brcmf_pub *drvr = ifp->drvr; 2326 struct brcmf_join_pref_params join_pref_params[2]; 2327 enum nl80211_band band; 2328 int err, i = 0; 2329 2330 join_pref_params[i].len = 2; 2331 join_pref_params[i].rssi_gain = 0; 2332 2333 if (bss_select->behaviour != NL80211_BSS_SELECT_ATTR_BAND_PREF) 2334 brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_ASSOC_PREFER, WLC_BAND_AUTO); 2335 2336 switch (bss_select->behaviour) { 2337 case __NL80211_BSS_SELECT_ATTR_INVALID: 2338 brcmf_c_set_joinpref_default(ifp); 2339 return; 2340 case NL80211_BSS_SELECT_ATTR_BAND_PREF: 2341 join_pref_params[i].type = BRCMF_JOIN_PREF_BAND; 2342 band = bss_select->param.band_pref; 2343 join_pref_params[i].band = nl80211_band_to_fwil(band); 2344 i++; 2345 break; 2346 case NL80211_BSS_SELECT_ATTR_RSSI_ADJUST: 2347 join_pref_params[i].type = BRCMF_JOIN_PREF_RSSI_DELTA; 2348 band = bss_select->param.adjust.band; 2349 join_pref_params[i].band = nl80211_band_to_fwil(band); 2350 join_pref_params[i].rssi_gain = bss_select->param.adjust.delta; 2351 i++; 2352 break; 2353 case NL80211_BSS_SELECT_ATTR_RSSI: 2354 default: 2355 break; 2356 } 2357 join_pref_params[i].type = BRCMF_JOIN_PREF_RSSI; 2358 join_pref_params[i].len = 2; 2359 join_pref_params[i].rssi_gain = 0; 2360 join_pref_params[i].band = 0; 2361 err = brcmf_fil_iovar_data_set(ifp, "join_pref", join_pref_params, 2362 sizeof(join_pref_params)); 2363 if (err) 2364 bphy_err(drvr, "Set join_pref error (%d)\n", err); 2365 } 2366 2367 static s32 2368 brcmf_cfg80211_connect(struct wiphy *wiphy, struct net_device *ndev, 2369 struct cfg80211_connect_params *sme) 2370 { 2371 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 2372 struct brcmf_if *ifp = netdev_priv(ndev); 2373 struct brcmf_cfg80211_profile *profile = &ifp->vif->profile; 2374 struct ieee80211_channel *chan = sme->channel; 2375 struct brcmf_pub *drvr = ifp->drvr; 2376 struct brcmf_join_params join_params; 2377 size_t join_params_size; 2378 const struct brcmf_tlv *rsn_ie; 2379 const struct brcmf_vs_tlv *wpa_ie; 2380 const void *ie; 2381 u32 ie_len; 2382 struct brcmf_ext_join_params_le *ext_join_params; 2383 u16 chanspec; 2384 s32 err = 0; 2385 u32 ssid_len; 2386 2387 brcmf_dbg(TRACE, "Enter\n"); 2388 if (!check_vif_up(ifp->vif)) 2389 return -EIO; 2390 2391 if (!sme->ssid) { 2392 bphy_err(drvr, "Invalid ssid\n"); 2393 return -EOPNOTSUPP; 2394 } 2395 2396 if (sme->channel_hint) 2397 chan = sme->channel_hint; 2398 2399 if (sme->bssid_hint) 2400 sme->bssid = sme->bssid_hint; 2401 2402 if (ifp->vif == cfg->p2p.bss_idx[P2PAPI_BSSCFG_PRIMARY].vif) { 2403 /* A normal (non P2P) connection request setup. */ 2404 ie = NULL; 2405 ie_len = 0; 2406 /* find the WPA_IE */ 2407 wpa_ie = brcmf_find_wpaie((u8 *)sme->ie, sme->ie_len); 2408 if (wpa_ie) { 2409 ie = wpa_ie; 2410 ie_len = wpa_ie->len + TLV_HDR_LEN; 2411 } else { 2412 /* find the RSN_IE */ 2413 rsn_ie = brcmf_parse_tlvs((const u8 *)sme->ie, 2414 sme->ie_len, 2415 WLAN_EID_RSN); 2416 if (rsn_ie) { 2417 ie = rsn_ie; 2418 ie_len = rsn_ie->len + TLV_HDR_LEN; 2419 } 2420 } 2421 brcmf_fil_iovar_data_set(ifp, "wpaie", ie, ie_len); 2422 } 2423 2424 err = brcmf_vif_set_mgmt_ie(ifp->vif, BRCMF_VNDR_IE_ASSOCREQ_FLAG, 2425 sme->ie, sme->ie_len); 2426 if (err) 2427 bphy_err(drvr, "Set Assoc REQ IE Failed\n"); 2428 else 2429 brcmf_dbg(TRACE, "Applied Vndr IEs for Assoc request\n"); 2430 2431 set_bit(BRCMF_VIF_STATUS_CONNECTING, &ifp->vif->sme_state); 2432 2433 if (chan) { 2434 cfg->channel = 2435 ieee80211_frequency_to_channel(chan->center_freq); 2436 chanspec = channel_to_chanspec(&cfg->d11inf, chan); 2437 brcmf_dbg(CONN, "channel=%d, center_req=%d, chanspec=0x%04x\n", 2438 cfg->channel, chan->center_freq, chanspec); 2439 } else { 2440 cfg->channel = 0; 2441 chanspec = 0; 2442 } 2443 2444 brcmf_dbg(INFO, "ie (%p), ie_len (%zd)\n", sme->ie, sme->ie_len); 2445 2446 err = brcmf_set_wpa_version(ndev, sme); 2447 if (err) { 2448 bphy_err(drvr, "wl_set_wpa_version failed (%d)\n", err); 2449 goto done; 2450 } 2451 2452 sme->auth_type = brcmf_war_auth_type(ifp, sme->auth_type); 2453 err = brcmf_set_auth_type(ndev, sme); 2454 if (err) { 2455 bphy_err(drvr, "wl_set_auth_type failed (%d)\n", err); 2456 goto done; 2457 } 2458 2459 err = brcmf_set_wsec_mode(ndev, sme); 2460 if (err) { 2461 bphy_err(drvr, "wl_set_set_cipher failed (%d)\n", err); 2462 goto done; 2463 } 2464 2465 err = brcmf_set_key_mgmt(ndev, sme); 2466 if (err) { 2467 bphy_err(drvr, "wl_set_key_mgmt failed (%d)\n", err); 2468 goto done; 2469 } 2470 2471 err = brcmf_set_sharedkey(ndev, sme); 2472 if (err) { 2473 bphy_err(drvr, "brcmf_set_sharedkey failed (%d)\n", err); 2474 goto done; 2475 } 2476 2477 if (sme->crypto.psk && 2478 profile->use_fwsup != BRCMF_PROFILE_FWSUP_SAE) { 2479 if (WARN_ON(profile->use_fwsup != BRCMF_PROFILE_FWSUP_NONE)) { 2480 err = -EINVAL; 2481 goto done; 2482 } 2483 brcmf_dbg(INFO, "using PSK offload\n"); 2484 profile->use_fwsup = BRCMF_PROFILE_FWSUP_PSK; 2485 } 2486 2487 if (profile->use_fwsup != BRCMF_PROFILE_FWSUP_NONE) { 2488 /* enable firmware supplicant for this interface */ 2489 err = brcmf_fil_iovar_int_set(ifp, "sup_wpa", 1); 2490 if (err < 0) { 2491 bphy_err(drvr, "failed to enable fw supplicant\n"); 2492 goto done; 2493 } 2494 } 2495 2496 if (profile->use_fwsup == BRCMF_PROFILE_FWSUP_PSK) 2497 err = brcmf_set_pmk(ifp, sme->crypto.psk, 2498 BRCMF_WSEC_MAX_PSK_LEN); 2499 else if (profile->use_fwsup == BRCMF_PROFILE_FWSUP_SAE) { 2500 /* clean up user-space RSNE */ 2501 err = brcmf_fil_iovar_data_set(ifp, "wpaie", NULL, 0); 2502 if (err) { 2503 bphy_err(drvr, "failed to clean up user-space RSNE\n"); 2504 goto done; 2505 } 2506 err = brcmf_set_sae_password(ifp, sme->crypto.sae_pwd, 2507 sme->crypto.sae_pwd_len); 2508 if (!err && sme->crypto.psk) 2509 err = brcmf_set_pmk(ifp, sme->crypto.psk, 2510 BRCMF_WSEC_MAX_PSK_LEN); 2511 } 2512 if (err) 2513 goto done; 2514 2515 /* Join with specific BSSID and cached SSID 2516 * If SSID is zero join based on BSSID only 2517 */ 2518 join_params_size = offsetof(struct brcmf_ext_join_params_le, assoc_le) + 2519 offsetof(struct brcmf_assoc_params_le, chanspec_list); 2520 if (cfg->channel) 2521 join_params_size += sizeof(u16); 2522 ext_join_params = kzalloc(sizeof(*ext_join_params), GFP_KERNEL); 2523 if (ext_join_params == NULL) { 2524 err = -ENOMEM; 2525 goto done; 2526 } 2527 ssid_len = min_t(u32, sme->ssid_len, IEEE80211_MAX_SSID_LEN); 2528 ext_join_params->ssid_le.SSID_len = cpu_to_le32(ssid_len); 2529 memcpy(&ext_join_params->ssid_le.SSID, sme->ssid, ssid_len); 2530 if (ssid_len < IEEE80211_MAX_SSID_LEN) 2531 brcmf_dbg(CONN, "SSID \"%s\", len (%d)\n", 2532 ext_join_params->ssid_le.SSID, ssid_len); 2533 2534 /* Set up join scan parameters */ 2535 ext_join_params->scan_le.scan_type = -1; 2536 ext_join_params->scan_le.home_time = cpu_to_le32(-1); 2537 2538 if (sme->bssid) 2539 memcpy(&ext_join_params->assoc_le.bssid, sme->bssid, ETH_ALEN); 2540 else 2541 eth_broadcast_addr(ext_join_params->assoc_le.bssid); 2542 2543 if (cfg->channel) { 2544 ext_join_params->assoc_le.chanspec_num = cpu_to_le32(1); 2545 2546 ext_join_params->assoc_le.chanspec_list[0] = 2547 cpu_to_le16(chanspec); 2548 /* Increase dwell time to receive probe response or detect 2549 * beacon from target AP at a noisy air only during connect 2550 * command. 2551 */ 2552 ext_join_params->scan_le.active_time = 2553 cpu_to_le32(BRCMF_SCAN_JOIN_ACTIVE_DWELL_TIME_MS); 2554 ext_join_params->scan_le.passive_time = 2555 cpu_to_le32(BRCMF_SCAN_JOIN_PASSIVE_DWELL_TIME_MS); 2556 /* To sync with presence period of VSDB GO send probe request 2557 * more frequently. Probe request will be stopped when it gets 2558 * probe response from target AP/GO. 2559 */ 2560 ext_join_params->scan_le.nprobes = 2561 cpu_to_le32(BRCMF_SCAN_JOIN_ACTIVE_DWELL_TIME_MS / 2562 BRCMF_SCAN_JOIN_PROBE_INTERVAL_MS); 2563 } else { 2564 ext_join_params->scan_le.active_time = cpu_to_le32(-1); 2565 ext_join_params->scan_le.passive_time = cpu_to_le32(-1); 2566 ext_join_params->scan_le.nprobes = cpu_to_le32(-1); 2567 } 2568 2569 brcmf_set_join_pref(ifp, &sme->bss_select); 2570 2571 err = brcmf_fil_bsscfg_data_set(ifp, "join", ext_join_params, 2572 join_params_size); 2573 kfree(ext_join_params); 2574 if (!err) 2575 /* This is it. join command worked, we are done */ 2576 goto done; 2577 2578 /* join command failed, fallback to set ssid */ 2579 memset(&join_params, 0, sizeof(join_params)); 2580 join_params_size = sizeof(join_params.ssid_le); 2581 2582 memcpy(&join_params.ssid_le.SSID, sme->ssid, ssid_len); 2583 join_params.ssid_le.SSID_len = cpu_to_le32(ssid_len); 2584 2585 if (sme->bssid) 2586 memcpy(join_params.params_le.bssid, sme->bssid, ETH_ALEN); 2587 else 2588 eth_broadcast_addr(join_params.params_le.bssid); 2589 2590 if (cfg->channel) { 2591 join_params.params_le.chanspec_list[0] = cpu_to_le16(chanspec); 2592 join_params.params_le.chanspec_num = cpu_to_le32(1); 2593 join_params_size += sizeof(join_params.params_le); 2594 } 2595 err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_SSID, 2596 &join_params, join_params_size); 2597 if (err) 2598 bphy_err(drvr, "BRCMF_C_SET_SSID failed (%d)\n", err); 2599 2600 done: 2601 if (err) 2602 clear_bit(BRCMF_VIF_STATUS_CONNECTING, &ifp->vif->sme_state); 2603 brcmf_dbg(TRACE, "Exit\n"); 2604 return err; 2605 } 2606 2607 static s32 2608 brcmf_cfg80211_disconnect(struct wiphy *wiphy, struct net_device *ndev, 2609 u16 reason_code) 2610 { 2611 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 2612 struct brcmf_if *ifp = netdev_priv(ndev); 2613 struct brcmf_cfg80211_profile *profile = &ifp->vif->profile; 2614 struct brcmf_pub *drvr = cfg->pub; 2615 struct brcmf_scb_val_le scbval; 2616 s32 err = 0; 2617 2618 brcmf_dbg(TRACE, "Enter. Reason code = %d\n", reason_code); 2619 if (!check_vif_up(ifp->vif)) 2620 return -EIO; 2621 2622 clear_bit(BRCMF_VIF_STATUS_CONNECTED, &ifp->vif->sme_state); 2623 clear_bit(BRCMF_VIF_STATUS_CONNECTING, &ifp->vif->sme_state); 2624 clear_bit(BRCMF_VIF_STATUS_EAP_SUCCESS, &ifp->vif->sme_state); 2625 clear_bit(BRCMF_VIF_STATUS_ASSOC_SUCCESS, &ifp->vif->sme_state); 2626 cfg80211_disconnected(ndev, reason_code, NULL, 0, true, GFP_KERNEL); 2627 2628 memcpy(&scbval.ea, &profile->bssid, ETH_ALEN); 2629 scbval.val = cpu_to_le32(reason_code); 2630 err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_DISASSOC, 2631 &scbval, sizeof(scbval)); 2632 if (err) 2633 bphy_err(drvr, "error (%d)\n", err); 2634 2635 brcmf_dbg(TRACE, "Exit\n"); 2636 return err; 2637 } 2638 2639 static s32 2640 brcmf_cfg80211_set_tx_power(struct wiphy *wiphy, struct wireless_dev *wdev, 2641 enum nl80211_tx_power_setting type, s32 mbm) 2642 { 2643 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 2644 struct net_device *ndev = cfg_to_ndev(cfg); 2645 struct brcmf_if *ifp = netdev_priv(ndev); 2646 struct brcmf_pub *drvr = cfg->pub; 2647 s32 err; 2648 s32 disable; 2649 u32 qdbm = 127; 2650 2651 brcmf_dbg(TRACE, "Enter %d %d\n", type, mbm); 2652 if (!check_vif_up(ifp->vif)) 2653 return -EIO; 2654 2655 switch (type) { 2656 case NL80211_TX_POWER_AUTOMATIC: 2657 break; 2658 case NL80211_TX_POWER_LIMITED: 2659 case NL80211_TX_POWER_FIXED: 2660 if (mbm < 0) { 2661 bphy_err(drvr, "TX_POWER_FIXED - dbm is negative\n"); 2662 err = -EINVAL; 2663 goto done; 2664 } 2665 qdbm = MBM_TO_DBM(4 * mbm); 2666 if (qdbm > 127) 2667 qdbm = 127; 2668 qdbm |= WL_TXPWR_OVERRIDE; 2669 break; 2670 default: 2671 bphy_err(drvr, "Unsupported type %d\n", type); 2672 err = -EINVAL; 2673 goto done; 2674 } 2675 /* Make sure radio is off or on as far as software is concerned */ 2676 disable = WL_RADIO_SW_DISABLE << 16; 2677 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_RADIO, disable); 2678 if (err) 2679 bphy_err(drvr, "WLC_SET_RADIO error (%d)\n", err); 2680 2681 err = brcmf_fil_iovar_int_set(ifp, "qtxpower", qdbm); 2682 if (err) 2683 bphy_err(drvr, "qtxpower error (%d)\n", err); 2684 2685 done: 2686 brcmf_dbg(TRACE, "Exit %d (qdbm)\n", qdbm & ~WL_TXPWR_OVERRIDE); 2687 return err; 2688 } 2689 2690 static s32 2691 brcmf_cfg80211_get_tx_power(struct wiphy *wiphy, struct wireless_dev *wdev, 2692 s32 *dbm) 2693 { 2694 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 2695 struct brcmf_cfg80211_vif *vif = wdev_to_vif(wdev); 2696 struct brcmf_pub *drvr = cfg->pub; 2697 s32 qdbm = 0; 2698 s32 err; 2699 2700 brcmf_dbg(TRACE, "Enter\n"); 2701 if (!check_vif_up(vif)) 2702 return -EIO; 2703 2704 err = brcmf_fil_iovar_int_get(vif->ifp, "qtxpower", &qdbm); 2705 if (err) { 2706 bphy_err(drvr, "error (%d)\n", err); 2707 goto done; 2708 } 2709 *dbm = (qdbm & ~WL_TXPWR_OVERRIDE) / 4; 2710 2711 done: 2712 brcmf_dbg(TRACE, "Exit (0x%x %d)\n", qdbm, *dbm); 2713 return err; 2714 } 2715 2716 static s32 2717 brcmf_cfg80211_config_default_key(struct wiphy *wiphy, struct net_device *ndev, 2718 int link_id, u8 key_idx, bool unicast, 2719 bool multicast) 2720 { 2721 struct brcmf_if *ifp = netdev_priv(ndev); 2722 struct brcmf_pub *drvr = ifp->drvr; 2723 u32 index; 2724 u32 wsec; 2725 s32 err = 0; 2726 2727 brcmf_dbg(TRACE, "Enter\n"); 2728 brcmf_dbg(CONN, "key index (%d)\n", key_idx); 2729 if (!check_vif_up(ifp->vif)) 2730 return -EIO; 2731 2732 err = brcmf_fil_bsscfg_int_get(ifp, "wsec", &wsec); 2733 if (err) { 2734 bphy_err(drvr, "WLC_GET_WSEC error (%d)\n", err); 2735 goto done; 2736 } 2737 2738 if (wsec & WEP_ENABLED) { 2739 /* Just select a new current key */ 2740 index = key_idx; 2741 err = brcmf_fil_cmd_int_set(ifp, 2742 BRCMF_C_SET_KEY_PRIMARY, index); 2743 if (err) 2744 bphy_err(drvr, "error (%d)\n", err); 2745 } 2746 done: 2747 brcmf_dbg(TRACE, "Exit\n"); 2748 return err; 2749 } 2750 2751 static s32 2752 brcmf_cfg80211_del_key(struct wiphy *wiphy, struct net_device *ndev, 2753 int link_id, u8 key_idx, bool pairwise, 2754 const u8 *mac_addr) 2755 { 2756 struct brcmf_if *ifp = netdev_priv(ndev); 2757 struct brcmf_wsec_key *key; 2758 s32 err; 2759 2760 brcmf_dbg(TRACE, "Enter\n"); 2761 brcmf_dbg(CONN, "key index (%d)\n", key_idx); 2762 2763 if (!check_vif_up(ifp->vif)) 2764 return -EIO; 2765 2766 if (key_idx >= BRCMF_MAX_DEFAULT_KEYS) { 2767 /* we ignore this key index in this case */ 2768 return -EINVAL; 2769 } 2770 2771 key = &ifp->vif->profile.key[key_idx]; 2772 2773 if (key->algo == CRYPTO_ALGO_OFF) { 2774 brcmf_dbg(CONN, "Ignore clearing of (never configured) key\n"); 2775 return -EINVAL; 2776 } 2777 2778 memset(key, 0, sizeof(*key)); 2779 key->index = (u32)key_idx; 2780 key->flags = BRCMF_PRIMARY_KEY; 2781 2782 /* Clear the key/index */ 2783 err = send_key_to_dongle(ifp, key); 2784 2785 brcmf_dbg(TRACE, "Exit\n"); 2786 return err; 2787 } 2788 2789 static s32 2790 brcmf_cfg80211_add_key(struct wiphy *wiphy, struct net_device *ndev, 2791 int link_id, u8 key_idx, bool pairwise, 2792 const u8 *mac_addr, struct key_params *params) 2793 { 2794 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 2795 struct brcmf_if *ifp = netdev_priv(ndev); 2796 struct brcmf_pub *drvr = cfg->pub; 2797 struct brcmf_wsec_key *key; 2798 s32 val; 2799 s32 wsec; 2800 s32 err; 2801 u8 keybuf[8]; 2802 bool ext_key; 2803 2804 brcmf_dbg(TRACE, "Enter\n"); 2805 brcmf_dbg(CONN, "key index (%d)\n", key_idx); 2806 if (!check_vif_up(ifp->vif)) 2807 return -EIO; 2808 2809 if (key_idx >= BRCMF_MAX_DEFAULT_KEYS) { 2810 /* we ignore this key index in this case */ 2811 bphy_err(drvr, "invalid key index (%d)\n", key_idx); 2812 return -EINVAL; 2813 } 2814 2815 if (params->key_len == 0) 2816 return brcmf_cfg80211_del_key(wiphy, ndev, -1, key_idx, 2817 pairwise, mac_addr); 2818 2819 if (params->key_len > sizeof(key->data)) { 2820 bphy_err(drvr, "Too long key length (%u)\n", params->key_len); 2821 return -EINVAL; 2822 } 2823 2824 ext_key = false; 2825 if (mac_addr && (params->cipher != WLAN_CIPHER_SUITE_WEP40) && 2826 (params->cipher != WLAN_CIPHER_SUITE_WEP104)) { 2827 brcmf_dbg(TRACE, "Ext key, mac %pM", mac_addr); 2828 ext_key = true; 2829 } 2830 2831 key = &ifp->vif->profile.key[key_idx]; 2832 memset(key, 0, sizeof(*key)); 2833 if ((ext_key) && (!is_multicast_ether_addr(mac_addr))) 2834 memcpy((char *)&key->ea, (void *)mac_addr, ETH_ALEN); 2835 key->len = params->key_len; 2836 key->index = key_idx; 2837 memcpy(key->data, params->key, key->len); 2838 if (!ext_key) 2839 key->flags = BRCMF_PRIMARY_KEY; 2840 2841 if (params->seq && params->seq_len == 6) { 2842 /* rx iv */ 2843 u8 *ivptr; 2844 2845 ivptr = (u8 *)params->seq; 2846 key->rxiv.hi = (ivptr[5] << 24) | (ivptr[4] << 16) | 2847 (ivptr[3] << 8) | ivptr[2]; 2848 key->rxiv.lo = (ivptr[1] << 8) | ivptr[0]; 2849 key->iv_initialized = true; 2850 } 2851 2852 switch (params->cipher) { 2853 case WLAN_CIPHER_SUITE_WEP40: 2854 key->algo = CRYPTO_ALGO_WEP1; 2855 val = WEP_ENABLED; 2856 brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_WEP40\n"); 2857 break; 2858 case WLAN_CIPHER_SUITE_WEP104: 2859 key->algo = CRYPTO_ALGO_WEP128; 2860 val = WEP_ENABLED; 2861 brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_WEP104\n"); 2862 break; 2863 case WLAN_CIPHER_SUITE_TKIP: 2864 if (!brcmf_is_apmode(ifp->vif)) { 2865 brcmf_dbg(CONN, "Swapping RX/TX MIC key\n"); 2866 memcpy(keybuf, &key->data[24], sizeof(keybuf)); 2867 memcpy(&key->data[24], &key->data[16], sizeof(keybuf)); 2868 memcpy(&key->data[16], keybuf, sizeof(keybuf)); 2869 } 2870 key->algo = CRYPTO_ALGO_TKIP; 2871 val = TKIP_ENABLED; 2872 brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_TKIP\n"); 2873 break; 2874 case WLAN_CIPHER_SUITE_AES_CMAC: 2875 key->algo = CRYPTO_ALGO_AES_CCM; 2876 val = AES_ENABLED; 2877 brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_AES_CMAC\n"); 2878 break; 2879 case WLAN_CIPHER_SUITE_CCMP: 2880 key->algo = CRYPTO_ALGO_AES_CCM; 2881 val = AES_ENABLED; 2882 brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_CCMP\n"); 2883 break; 2884 default: 2885 bphy_err(drvr, "Invalid cipher (0x%x)\n", params->cipher); 2886 err = -EINVAL; 2887 goto done; 2888 } 2889 2890 err = send_key_to_dongle(ifp, key); 2891 if (ext_key || err) 2892 goto done; 2893 2894 err = brcmf_fil_bsscfg_int_get(ifp, "wsec", &wsec); 2895 if (err) { 2896 bphy_err(drvr, "get wsec error (%d)\n", err); 2897 goto done; 2898 } 2899 wsec |= val; 2900 err = brcmf_fil_bsscfg_int_set(ifp, "wsec", wsec); 2901 if (err) { 2902 bphy_err(drvr, "set wsec error (%d)\n", err); 2903 goto done; 2904 } 2905 2906 done: 2907 brcmf_dbg(TRACE, "Exit\n"); 2908 return err; 2909 } 2910 2911 static s32 2912 brcmf_cfg80211_get_key(struct wiphy *wiphy, struct net_device *ndev, 2913 int link_id, u8 key_idx, bool pairwise, 2914 const u8 *mac_addr, void *cookie, 2915 void (*callback)(void *cookie, 2916 struct key_params *params)) 2917 { 2918 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 2919 struct key_params params; 2920 struct brcmf_if *ifp = netdev_priv(ndev); 2921 struct brcmf_cfg80211_profile *profile = &ifp->vif->profile; 2922 struct brcmf_pub *drvr = cfg->pub; 2923 struct brcmf_cfg80211_security *sec; 2924 s32 wsec; 2925 s32 err = 0; 2926 2927 brcmf_dbg(TRACE, "Enter\n"); 2928 brcmf_dbg(CONN, "key index (%d)\n", key_idx); 2929 if (!check_vif_up(ifp->vif)) 2930 return -EIO; 2931 2932 memset(¶ms, 0, sizeof(params)); 2933 2934 err = brcmf_fil_bsscfg_int_get(ifp, "wsec", &wsec); 2935 if (err) { 2936 bphy_err(drvr, "WLC_GET_WSEC error (%d)\n", err); 2937 /* Ignore this error, may happen during DISASSOC */ 2938 err = -EAGAIN; 2939 goto done; 2940 } 2941 if (wsec & WEP_ENABLED) { 2942 sec = &profile->sec; 2943 if (sec->cipher_pairwise & WLAN_CIPHER_SUITE_WEP40) { 2944 params.cipher = WLAN_CIPHER_SUITE_WEP40; 2945 brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_WEP40\n"); 2946 } else if (sec->cipher_pairwise & WLAN_CIPHER_SUITE_WEP104) { 2947 params.cipher = WLAN_CIPHER_SUITE_WEP104; 2948 brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_WEP104\n"); 2949 } 2950 } else if (wsec & TKIP_ENABLED) { 2951 params.cipher = WLAN_CIPHER_SUITE_TKIP; 2952 brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_TKIP\n"); 2953 } else if (wsec & AES_ENABLED) { 2954 params.cipher = WLAN_CIPHER_SUITE_AES_CMAC; 2955 brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_AES_CMAC\n"); 2956 } else { 2957 bphy_err(drvr, "Invalid algo (0x%x)\n", wsec); 2958 err = -EINVAL; 2959 goto done; 2960 } 2961 callback(cookie, ¶ms); 2962 2963 done: 2964 brcmf_dbg(TRACE, "Exit\n"); 2965 return err; 2966 } 2967 2968 static s32 2969 brcmf_cfg80211_config_default_mgmt_key(struct wiphy *wiphy, 2970 struct net_device *ndev, int link_id, 2971 u8 key_idx) 2972 { 2973 struct brcmf_if *ifp = netdev_priv(ndev); 2974 2975 brcmf_dbg(TRACE, "Enter key_idx %d\n", key_idx); 2976 2977 if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MFP)) 2978 return 0; 2979 2980 brcmf_dbg(INFO, "Not supported\n"); 2981 2982 return -EOPNOTSUPP; 2983 } 2984 2985 static void 2986 brcmf_cfg80211_reconfigure_wep(struct brcmf_if *ifp) 2987 { 2988 struct brcmf_pub *drvr = ifp->drvr; 2989 s32 err; 2990 u8 key_idx; 2991 struct brcmf_wsec_key *key; 2992 s32 wsec; 2993 2994 for (key_idx = 0; key_idx < BRCMF_MAX_DEFAULT_KEYS; key_idx++) { 2995 key = &ifp->vif->profile.key[key_idx]; 2996 if ((key->algo == CRYPTO_ALGO_WEP1) || 2997 (key->algo == CRYPTO_ALGO_WEP128)) 2998 break; 2999 } 3000 if (key_idx == BRCMF_MAX_DEFAULT_KEYS) 3001 return; 3002 3003 err = send_key_to_dongle(ifp, key); 3004 if (err) { 3005 bphy_err(drvr, "Setting WEP key failed (%d)\n", err); 3006 return; 3007 } 3008 err = brcmf_fil_bsscfg_int_get(ifp, "wsec", &wsec); 3009 if (err) { 3010 bphy_err(drvr, "get wsec error (%d)\n", err); 3011 return; 3012 } 3013 wsec |= WEP_ENABLED; 3014 err = brcmf_fil_bsscfg_int_set(ifp, "wsec", wsec); 3015 if (err) 3016 bphy_err(drvr, "set wsec error (%d)\n", err); 3017 } 3018 3019 static void brcmf_convert_sta_flags(u32 fw_sta_flags, struct station_info *si) 3020 { 3021 struct nl80211_sta_flag_update *sfu; 3022 3023 brcmf_dbg(TRACE, "flags %08x\n", fw_sta_flags); 3024 si->filled |= BIT_ULL(NL80211_STA_INFO_STA_FLAGS); 3025 sfu = &si->sta_flags; 3026 sfu->mask = BIT(NL80211_STA_FLAG_WME) | 3027 BIT(NL80211_STA_FLAG_AUTHENTICATED) | 3028 BIT(NL80211_STA_FLAG_ASSOCIATED) | 3029 BIT(NL80211_STA_FLAG_AUTHORIZED); 3030 if (fw_sta_flags & BRCMF_STA_WME) 3031 sfu->set |= BIT(NL80211_STA_FLAG_WME); 3032 if (fw_sta_flags & BRCMF_STA_AUTHE) 3033 sfu->set |= BIT(NL80211_STA_FLAG_AUTHENTICATED); 3034 if (fw_sta_flags & BRCMF_STA_ASSOC) 3035 sfu->set |= BIT(NL80211_STA_FLAG_ASSOCIATED); 3036 if (fw_sta_flags & BRCMF_STA_AUTHO) 3037 sfu->set |= BIT(NL80211_STA_FLAG_AUTHORIZED); 3038 } 3039 3040 static void brcmf_fill_bss_param(struct brcmf_if *ifp, struct station_info *si) 3041 { 3042 struct brcmf_pub *drvr = ifp->drvr; 3043 struct { 3044 __le32 len; 3045 struct brcmf_bss_info_le bss_le; 3046 } *buf; 3047 u16 capability; 3048 int err; 3049 3050 buf = kzalloc(WL_BSS_INFO_MAX, GFP_KERNEL); 3051 if (!buf) 3052 return; 3053 3054 buf->len = cpu_to_le32(WL_BSS_INFO_MAX); 3055 err = brcmf_fil_cmd_data_get(ifp, BRCMF_C_GET_BSS_INFO, buf, 3056 WL_BSS_INFO_MAX); 3057 if (err) { 3058 bphy_err(drvr, "Failed to get bss info (%d)\n", err); 3059 goto out_kfree; 3060 } 3061 si->filled |= BIT_ULL(NL80211_STA_INFO_BSS_PARAM); 3062 si->bss_param.beacon_interval = le16_to_cpu(buf->bss_le.beacon_period); 3063 si->bss_param.dtim_period = buf->bss_le.dtim_period; 3064 capability = le16_to_cpu(buf->bss_le.capability); 3065 if (capability & IEEE80211_HT_STBC_PARAM_DUAL_CTS_PROT) 3066 si->bss_param.flags |= BSS_PARAM_FLAGS_CTS_PROT; 3067 if (capability & WLAN_CAPABILITY_SHORT_PREAMBLE) 3068 si->bss_param.flags |= BSS_PARAM_FLAGS_SHORT_PREAMBLE; 3069 if (capability & WLAN_CAPABILITY_SHORT_SLOT_TIME) 3070 si->bss_param.flags |= BSS_PARAM_FLAGS_SHORT_SLOT_TIME; 3071 3072 out_kfree: 3073 kfree(buf); 3074 } 3075 3076 static s32 3077 brcmf_cfg80211_get_station_ibss(struct brcmf_if *ifp, 3078 struct station_info *sinfo) 3079 { 3080 struct brcmf_pub *drvr = ifp->drvr; 3081 struct brcmf_scb_val_le scbval; 3082 struct brcmf_pktcnt_le pktcnt; 3083 s32 err; 3084 u32 rate; 3085 u32 rssi; 3086 3087 /* Get the current tx rate */ 3088 err = brcmf_fil_cmd_int_get(ifp, BRCMF_C_GET_RATE, &rate); 3089 if (err < 0) { 3090 bphy_err(drvr, "BRCMF_C_GET_RATE error (%d)\n", err); 3091 return err; 3092 } 3093 sinfo->filled |= BIT_ULL(NL80211_STA_INFO_TX_BITRATE); 3094 sinfo->txrate.legacy = rate * 5; 3095 3096 memset(&scbval, 0, sizeof(scbval)); 3097 err = brcmf_fil_cmd_data_get(ifp, BRCMF_C_GET_RSSI, &scbval, 3098 sizeof(scbval)); 3099 if (err) { 3100 bphy_err(drvr, "BRCMF_C_GET_RSSI error (%d)\n", err); 3101 return err; 3102 } 3103 rssi = le32_to_cpu(scbval.val); 3104 sinfo->filled |= BIT_ULL(NL80211_STA_INFO_SIGNAL); 3105 sinfo->signal = rssi; 3106 3107 err = brcmf_fil_cmd_data_get(ifp, BRCMF_C_GET_GET_PKTCNTS, &pktcnt, 3108 sizeof(pktcnt)); 3109 if (err) { 3110 bphy_err(drvr, "BRCMF_C_GET_GET_PKTCNTS error (%d)\n", err); 3111 return err; 3112 } 3113 sinfo->filled |= BIT_ULL(NL80211_STA_INFO_RX_PACKETS) | 3114 BIT_ULL(NL80211_STA_INFO_RX_DROP_MISC) | 3115 BIT_ULL(NL80211_STA_INFO_TX_PACKETS) | 3116 BIT_ULL(NL80211_STA_INFO_TX_FAILED); 3117 sinfo->rx_packets = le32_to_cpu(pktcnt.rx_good_pkt); 3118 sinfo->rx_dropped_misc = le32_to_cpu(pktcnt.rx_bad_pkt); 3119 sinfo->tx_packets = le32_to_cpu(pktcnt.tx_good_pkt); 3120 sinfo->tx_failed = le32_to_cpu(pktcnt.tx_bad_pkt); 3121 3122 return 0; 3123 } 3124 3125 static s32 3126 brcmf_cfg80211_get_station(struct wiphy *wiphy, struct net_device *ndev, 3127 const u8 *mac, struct station_info *sinfo) 3128 { 3129 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 3130 struct brcmf_if *ifp = netdev_priv(ndev); 3131 struct brcmf_pub *drvr = cfg->pub; 3132 struct brcmf_scb_val_le scb_val; 3133 s32 err = 0; 3134 struct brcmf_sta_info_le sta_info_le; 3135 u32 sta_flags; 3136 u32 is_tdls_peer; 3137 s32 total_rssi_avg = 0; 3138 s32 total_rssi = 0; 3139 s32 count_rssi = 0; 3140 int rssi; 3141 u32 i; 3142 3143 brcmf_dbg(TRACE, "Enter, MAC %pM\n", mac); 3144 if (!check_vif_up(ifp->vif)) 3145 return -EIO; 3146 3147 if (brcmf_is_ibssmode(ifp->vif)) 3148 return brcmf_cfg80211_get_station_ibss(ifp, sinfo); 3149 3150 memset(&sta_info_le, 0, sizeof(sta_info_le)); 3151 memcpy(&sta_info_le, mac, ETH_ALEN); 3152 err = brcmf_fil_iovar_data_get(ifp, "tdls_sta_info", 3153 &sta_info_le, 3154 sizeof(sta_info_le)); 3155 is_tdls_peer = !err; 3156 if (err) { 3157 err = brcmf_fil_iovar_data_get(ifp, "sta_info", 3158 &sta_info_le, 3159 sizeof(sta_info_le)); 3160 if (err < 0) { 3161 bphy_err(drvr, "GET STA INFO failed, %d\n", err); 3162 goto done; 3163 } 3164 } 3165 brcmf_dbg(TRACE, "version %d\n", le16_to_cpu(sta_info_le.ver)); 3166 sinfo->filled = BIT_ULL(NL80211_STA_INFO_INACTIVE_TIME); 3167 sinfo->inactive_time = le32_to_cpu(sta_info_le.idle) * 1000; 3168 sta_flags = le32_to_cpu(sta_info_le.flags); 3169 brcmf_convert_sta_flags(sta_flags, sinfo); 3170 sinfo->sta_flags.mask |= BIT(NL80211_STA_FLAG_TDLS_PEER); 3171 if (is_tdls_peer) 3172 sinfo->sta_flags.set |= BIT(NL80211_STA_FLAG_TDLS_PEER); 3173 else 3174 sinfo->sta_flags.set &= ~BIT(NL80211_STA_FLAG_TDLS_PEER); 3175 if (sta_flags & BRCMF_STA_ASSOC) { 3176 sinfo->filled |= BIT_ULL(NL80211_STA_INFO_CONNECTED_TIME); 3177 sinfo->connected_time = le32_to_cpu(sta_info_le.in); 3178 brcmf_fill_bss_param(ifp, sinfo); 3179 } 3180 if (sta_flags & BRCMF_STA_SCBSTATS) { 3181 sinfo->filled |= BIT_ULL(NL80211_STA_INFO_TX_FAILED); 3182 sinfo->tx_failed = le32_to_cpu(sta_info_le.tx_failures); 3183 sinfo->filled |= BIT_ULL(NL80211_STA_INFO_TX_PACKETS); 3184 sinfo->tx_packets = le32_to_cpu(sta_info_le.tx_pkts); 3185 sinfo->tx_packets += le32_to_cpu(sta_info_le.tx_mcast_pkts); 3186 sinfo->filled |= BIT_ULL(NL80211_STA_INFO_RX_PACKETS); 3187 sinfo->rx_packets = le32_to_cpu(sta_info_le.rx_ucast_pkts); 3188 sinfo->rx_packets += le32_to_cpu(sta_info_le.rx_mcast_pkts); 3189 if (sinfo->tx_packets) { 3190 sinfo->filled |= BIT_ULL(NL80211_STA_INFO_TX_BITRATE); 3191 sinfo->txrate.legacy = 3192 le32_to_cpu(sta_info_le.tx_rate) / 100; 3193 } 3194 if (sinfo->rx_packets) { 3195 sinfo->filled |= BIT_ULL(NL80211_STA_INFO_RX_BITRATE); 3196 sinfo->rxrate.legacy = 3197 le32_to_cpu(sta_info_le.rx_rate) / 100; 3198 } 3199 if (le16_to_cpu(sta_info_le.ver) >= 4) { 3200 sinfo->filled |= BIT_ULL(NL80211_STA_INFO_TX_BYTES); 3201 sinfo->tx_bytes = le64_to_cpu(sta_info_le.tx_tot_bytes); 3202 sinfo->filled |= BIT_ULL(NL80211_STA_INFO_RX_BYTES); 3203 sinfo->rx_bytes = le64_to_cpu(sta_info_le.rx_tot_bytes); 3204 } 3205 for (i = 0; i < BRCMF_ANT_MAX; i++) { 3206 if (sta_info_le.rssi[i] == 0 || 3207 sta_info_le.rx_lastpkt_rssi[i] == 0) 3208 continue; 3209 sinfo->chains |= BIT(count_rssi); 3210 sinfo->chain_signal[count_rssi] = 3211 sta_info_le.rx_lastpkt_rssi[i]; 3212 sinfo->chain_signal_avg[count_rssi] = 3213 sta_info_le.rssi[i]; 3214 total_rssi += sta_info_le.rx_lastpkt_rssi[i]; 3215 total_rssi_avg += sta_info_le.rssi[i]; 3216 count_rssi++; 3217 } 3218 if (count_rssi) { 3219 sinfo->filled |= BIT_ULL(NL80211_STA_INFO_SIGNAL); 3220 sinfo->filled |= BIT_ULL(NL80211_STA_INFO_SIGNAL_AVG); 3221 sinfo->filled |= BIT_ULL(NL80211_STA_INFO_CHAIN_SIGNAL); 3222 sinfo->filled |= 3223 BIT_ULL(NL80211_STA_INFO_CHAIN_SIGNAL_AVG); 3224 sinfo->signal = total_rssi / count_rssi; 3225 sinfo->signal_avg = total_rssi_avg / count_rssi; 3226 } else if (test_bit(BRCMF_VIF_STATUS_CONNECTED, 3227 &ifp->vif->sme_state)) { 3228 memset(&scb_val, 0, sizeof(scb_val)); 3229 err = brcmf_fil_cmd_data_get(ifp, BRCMF_C_GET_RSSI, 3230 &scb_val, sizeof(scb_val)); 3231 if (err) { 3232 bphy_err(drvr, "Could not get rssi (%d)\n", 3233 err); 3234 goto done; 3235 } else { 3236 rssi = le32_to_cpu(scb_val.val); 3237 sinfo->filled |= BIT_ULL(NL80211_STA_INFO_SIGNAL); 3238 sinfo->signal = rssi; 3239 brcmf_dbg(CONN, "RSSI %d dBm\n", rssi); 3240 } 3241 } 3242 } 3243 done: 3244 brcmf_dbg(TRACE, "Exit\n"); 3245 return err; 3246 } 3247 3248 static int 3249 brcmf_cfg80211_dump_station(struct wiphy *wiphy, struct net_device *ndev, 3250 int idx, u8 *mac, struct station_info *sinfo) 3251 { 3252 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 3253 struct brcmf_if *ifp = netdev_priv(ndev); 3254 struct brcmf_pub *drvr = cfg->pub; 3255 s32 err; 3256 3257 brcmf_dbg(TRACE, "Enter, idx %d\n", idx); 3258 3259 if (idx == 0) { 3260 cfg->assoclist.count = cpu_to_le32(BRCMF_MAX_ASSOCLIST); 3261 err = brcmf_fil_cmd_data_get(ifp, BRCMF_C_GET_ASSOCLIST, 3262 &cfg->assoclist, 3263 sizeof(cfg->assoclist)); 3264 if (err) { 3265 /* GET_ASSOCLIST unsupported by firmware of older chips */ 3266 if (err == -EBADE) 3267 bphy_info_once(drvr, "BRCMF_C_GET_ASSOCLIST unsupported\n"); 3268 else 3269 bphy_err(drvr, "BRCMF_C_GET_ASSOCLIST failed, err=%d\n", 3270 err); 3271 3272 cfg->assoclist.count = 0; 3273 return -EOPNOTSUPP; 3274 } 3275 } 3276 if (idx < le32_to_cpu(cfg->assoclist.count)) { 3277 memcpy(mac, cfg->assoclist.mac[idx], ETH_ALEN); 3278 return brcmf_cfg80211_get_station(wiphy, ndev, mac, sinfo); 3279 } 3280 return -ENOENT; 3281 } 3282 3283 static s32 3284 brcmf_cfg80211_set_power_mgmt(struct wiphy *wiphy, struct net_device *ndev, 3285 bool enabled, s32 timeout) 3286 { 3287 s32 pm; 3288 s32 err = 0; 3289 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 3290 struct brcmf_if *ifp = netdev_priv(ndev); 3291 struct brcmf_pub *drvr = cfg->pub; 3292 3293 brcmf_dbg(TRACE, "Enter\n"); 3294 3295 /* 3296 * Powersave enable/disable request is coming from the 3297 * cfg80211 even before the interface is up. In that 3298 * scenario, driver will be storing the power save 3299 * preference in cfg struct to apply this to 3300 * FW later while initializing the dongle 3301 */ 3302 cfg->pwr_save = enabled; 3303 if (!check_vif_up(ifp->vif)) { 3304 3305 brcmf_dbg(INFO, "Device is not ready, storing the value in cfg_info struct\n"); 3306 goto done; 3307 } 3308 3309 pm = enabled ? PM_FAST : PM_OFF; 3310 /* Do not enable the power save after assoc if it is a p2p interface */ 3311 if (ifp->vif->wdev.iftype == NL80211_IFTYPE_P2P_CLIENT) { 3312 brcmf_dbg(INFO, "Do not enable power save for P2P clients\n"); 3313 pm = PM_OFF; 3314 } 3315 brcmf_dbg(INFO, "power save %s\n", (pm ? "enabled" : "disabled")); 3316 3317 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_PM, pm); 3318 if (err) { 3319 if (err == -ENODEV) 3320 bphy_err(drvr, "net_device is not ready yet\n"); 3321 else 3322 bphy_err(drvr, "error (%d)\n", err); 3323 } 3324 3325 err = brcmf_fil_iovar_int_set(ifp, "pm2_sleep_ret", 3326 min_t(u32, timeout, BRCMF_PS_MAX_TIMEOUT_MS)); 3327 if (err) 3328 bphy_err(drvr, "Unable to set pm timeout, (%d)\n", err); 3329 3330 done: 3331 brcmf_dbg(TRACE, "Exit\n"); 3332 return err; 3333 } 3334 3335 static s32 brcmf_inform_single_bss(struct brcmf_cfg80211_info *cfg, 3336 struct brcmf_bss_info_le *bi) 3337 { 3338 struct wiphy *wiphy = cfg_to_wiphy(cfg); 3339 struct brcmf_pub *drvr = cfg->pub; 3340 struct cfg80211_bss *bss; 3341 enum nl80211_band band; 3342 struct brcmu_chan ch; 3343 u16 channel; 3344 u32 freq; 3345 u16 notify_capability; 3346 u16 notify_interval; 3347 u8 *notify_ie; 3348 size_t notify_ielen; 3349 struct cfg80211_inform_bss bss_data = {}; 3350 3351 if (le32_to_cpu(bi->length) > WL_BSS_INFO_MAX) { 3352 bphy_err(drvr, "Bss info is larger than buffer. Discarding\n"); 3353 return -EINVAL; 3354 } 3355 3356 if (!bi->ctl_ch) { 3357 ch.chspec = le16_to_cpu(bi->chanspec); 3358 cfg->d11inf.decchspec(&ch); 3359 bi->ctl_ch = ch.control_ch_num; 3360 } 3361 channel = bi->ctl_ch; 3362 3363 if (channel <= CH_MAX_2G_CHANNEL) 3364 band = NL80211_BAND_2GHZ; 3365 else 3366 band = NL80211_BAND_5GHZ; 3367 3368 freq = ieee80211_channel_to_frequency(channel, band); 3369 bss_data.chan = ieee80211_get_channel(wiphy, freq); 3370 bss_data.boottime_ns = ktime_to_ns(ktime_get_boottime()); 3371 3372 notify_capability = le16_to_cpu(bi->capability); 3373 notify_interval = le16_to_cpu(bi->beacon_period); 3374 notify_ie = (u8 *)bi + le16_to_cpu(bi->ie_offset); 3375 notify_ielen = le32_to_cpu(bi->ie_length); 3376 bss_data.signal = (s16)le16_to_cpu(bi->RSSI) * 100; 3377 3378 brcmf_dbg(CONN, "bssid: %pM\n", bi->BSSID); 3379 brcmf_dbg(CONN, "Channel: %d(%d)\n", channel, freq); 3380 brcmf_dbg(CONN, "Capability: %X\n", notify_capability); 3381 brcmf_dbg(CONN, "Beacon interval: %d\n", notify_interval); 3382 brcmf_dbg(CONN, "Signal: %d\n", bss_data.signal); 3383 3384 bss = cfg80211_inform_bss_data(wiphy, &bss_data, 3385 CFG80211_BSS_FTYPE_UNKNOWN, 3386 (const u8 *)bi->BSSID, 3387 0, notify_capability, 3388 notify_interval, notify_ie, 3389 notify_ielen, GFP_KERNEL); 3390 3391 if (!bss) 3392 return -ENOMEM; 3393 3394 cfg80211_put_bss(wiphy, bss); 3395 3396 return 0; 3397 } 3398 3399 static struct brcmf_bss_info_le * 3400 next_bss_le(struct brcmf_scan_results *list, struct brcmf_bss_info_le *bss) 3401 { 3402 if (bss == NULL) 3403 return list->bss_info_le; 3404 return (struct brcmf_bss_info_le *)((unsigned long)bss + 3405 le32_to_cpu(bss->length)); 3406 } 3407 3408 static s32 brcmf_inform_bss(struct brcmf_cfg80211_info *cfg) 3409 { 3410 struct brcmf_pub *drvr = cfg->pub; 3411 struct brcmf_scan_results *bss_list; 3412 struct brcmf_bss_info_le *bi = NULL; /* must be initialized */ 3413 s32 err = 0; 3414 int i; 3415 3416 bss_list = (struct brcmf_scan_results *)cfg->escan_info.escan_buf; 3417 if (bss_list->count != 0 && 3418 bss_list->version != BRCMF_BSS_INFO_VERSION) { 3419 bphy_err(drvr, "Version %d != WL_BSS_INFO_VERSION\n", 3420 bss_list->version); 3421 return -EOPNOTSUPP; 3422 } 3423 brcmf_dbg(SCAN, "scanned AP count (%d)\n", bss_list->count); 3424 for (i = 0; i < bss_list->count; i++) { 3425 bi = next_bss_le(bss_list, bi); 3426 err = brcmf_inform_single_bss(cfg, bi); 3427 if (err) 3428 break; 3429 } 3430 return err; 3431 } 3432 3433 static s32 brcmf_inform_ibss(struct brcmf_cfg80211_info *cfg, 3434 struct net_device *ndev, const u8 *bssid) 3435 { 3436 struct wiphy *wiphy = cfg_to_wiphy(cfg); 3437 struct brcmf_pub *drvr = cfg->pub; 3438 struct ieee80211_channel *notify_channel; 3439 struct brcmf_bss_info_le *bi = NULL; 3440 struct ieee80211_supported_band *band; 3441 struct cfg80211_bss *bss; 3442 struct brcmu_chan ch; 3443 u8 *buf = NULL; 3444 s32 err = 0; 3445 u32 freq; 3446 u16 notify_capability; 3447 u16 notify_interval; 3448 u8 *notify_ie; 3449 size_t notify_ielen; 3450 s32 notify_signal; 3451 3452 brcmf_dbg(TRACE, "Enter\n"); 3453 3454 buf = kzalloc(WL_BSS_INFO_MAX, GFP_KERNEL); 3455 if (buf == NULL) { 3456 err = -ENOMEM; 3457 goto CleanUp; 3458 } 3459 3460 *(__le32 *)buf = cpu_to_le32(WL_BSS_INFO_MAX); 3461 3462 err = brcmf_fil_cmd_data_get(netdev_priv(ndev), BRCMF_C_GET_BSS_INFO, 3463 buf, WL_BSS_INFO_MAX); 3464 if (err) { 3465 bphy_err(drvr, "WLC_GET_BSS_INFO failed: %d\n", err); 3466 goto CleanUp; 3467 } 3468 3469 bi = (struct brcmf_bss_info_le *)(buf + 4); 3470 3471 ch.chspec = le16_to_cpu(bi->chanspec); 3472 cfg->d11inf.decchspec(&ch); 3473 3474 if (ch.band == BRCMU_CHAN_BAND_2G) 3475 band = wiphy->bands[NL80211_BAND_2GHZ]; 3476 else 3477 band = wiphy->bands[NL80211_BAND_5GHZ]; 3478 3479 freq = ieee80211_channel_to_frequency(ch.control_ch_num, band->band); 3480 cfg->channel = freq; 3481 notify_channel = ieee80211_get_channel(wiphy, freq); 3482 3483 notify_capability = le16_to_cpu(bi->capability); 3484 notify_interval = le16_to_cpu(bi->beacon_period); 3485 notify_ie = (u8 *)bi + le16_to_cpu(bi->ie_offset); 3486 notify_ielen = le32_to_cpu(bi->ie_length); 3487 notify_signal = (s16)le16_to_cpu(bi->RSSI) * 100; 3488 3489 brcmf_dbg(CONN, "channel: %d(%d)\n", ch.control_ch_num, freq); 3490 brcmf_dbg(CONN, "capability: %X\n", notify_capability); 3491 brcmf_dbg(CONN, "beacon interval: %d\n", notify_interval); 3492 brcmf_dbg(CONN, "signal: %d\n", notify_signal); 3493 3494 bss = cfg80211_inform_bss(wiphy, notify_channel, 3495 CFG80211_BSS_FTYPE_UNKNOWN, bssid, 0, 3496 notify_capability, notify_interval, 3497 notify_ie, notify_ielen, notify_signal, 3498 GFP_KERNEL); 3499 3500 if (!bss) { 3501 err = -ENOMEM; 3502 goto CleanUp; 3503 } 3504 3505 cfg80211_put_bss(wiphy, bss); 3506 3507 CleanUp: 3508 3509 kfree(buf); 3510 3511 brcmf_dbg(TRACE, "Exit\n"); 3512 3513 return err; 3514 } 3515 3516 static s32 brcmf_update_bss_info(struct brcmf_cfg80211_info *cfg, 3517 struct brcmf_if *ifp) 3518 { 3519 struct brcmf_pub *drvr = cfg->pub; 3520 struct brcmf_bss_info_le *bi = NULL; 3521 s32 err = 0; 3522 3523 brcmf_dbg(TRACE, "Enter\n"); 3524 if (brcmf_is_ibssmode(ifp->vif)) 3525 return err; 3526 3527 *(__le32 *)cfg->extra_buf = cpu_to_le32(WL_EXTRA_BUF_MAX); 3528 err = brcmf_fil_cmd_data_get(ifp, BRCMF_C_GET_BSS_INFO, 3529 cfg->extra_buf, WL_EXTRA_BUF_MAX); 3530 if (err) { 3531 bphy_err(drvr, "Could not get bss info %d\n", err); 3532 goto update_bss_info_out; 3533 } 3534 bi = (struct brcmf_bss_info_le *)(cfg->extra_buf + 4); 3535 err = brcmf_inform_single_bss(cfg, bi); 3536 3537 update_bss_info_out: 3538 brcmf_dbg(TRACE, "Exit"); 3539 return err; 3540 } 3541 3542 void brcmf_abort_scanning(struct brcmf_cfg80211_info *cfg) 3543 { 3544 struct escan_info *escan = &cfg->escan_info; 3545 3546 set_bit(BRCMF_SCAN_STATUS_ABORT, &cfg->scan_status); 3547 if (cfg->int_escan_map || cfg->scan_request) { 3548 escan->escan_state = WL_ESCAN_STATE_IDLE; 3549 brcmf_notify_escan_complete(cfg, escan->ifp, true, true); 3550 } 3551 clear_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status); 3552 clear_bit(BRCMF_SCAN_STATUS_ABORT, &cfg->scan_status); 3553 } 3554 3555 static void brcmf_cfg80211_escan_timeout_worker(struct work_struct *work) 3556 { 3557 struct brcmf_cfg80211_info *cfg = 3558 container_of(work, struct brcmf_cfg80211_info, 3559 escan_timeout_work); 3560 3561 brcmf_inform_bss(cfg); 3562 brcmf_notify_escan_complete(cfg, cfg->escan_info.ifp, true, true); 3563 } 3564 3565 static void brcmf_escan_timeout(struct timer_list *t) 3566 { 3567 struct brcmf_cfg80211_info *cfg = 3568 from_timer(cfg, t, escan_timeout); 3569 struct brcmf_pub *drvr = cfg->pub; 3570 3571 if (cfg->int_escan_map || cfg->scan_request) { 3572 bphy_err(drvr, "timer expired\n"); 3573 schedule_work(&cfg->escan_timeout_work); 3574 } 3575 } 3576 3577 static s32 3578 brcmf_compare_update_same_bss(struct brcmf_cfg80211_info *cfg, 3579 struct brcmf_bss_info_le *bss, 3580 struct brcmf_bss_info_le *bss_info_le) 3581 { 3582 struct brcmu_chan ch_bss, ch_bss_info_le; 3583 3584 ch_bss.chspec = le16_to_cpu(bss->chanspec); 3585 cfg->d11inf.decchspec(&ch_bss); 3586 ch_bss_info_le.chspec = le16_to_cpu(bss_info_le->chanspec); 3587 cfg->d11inf.decchspec(&ch_bss_info_le); 3588 3589 if (!memcmp(&bss_info_le->BSSID, &bss->BSSID, ETH_ALEN) && 3590 ch_bss.band == ch_bss_info_le.band && 3591 bss_info_le->SSID_len == bss->SSID_len && 3592 !memcmp(bss_info_le->SSID, bss->SSID, bss_info_le->SSID_len)) { 3593 if ((bss->flags & BRCMF_BSS_RSSI_ON_CHANNEL) == 3594 (bss_info_le->flags & BRCMF_BSS_RSSI_ON_CHANNEL)) { 3595 s16 bss_rssi = le16_to_cpu(bss->RSSI); 3596 s16 bss_info_rssi = le16_to_cpu(bss_info_le->RSSI); 3597 3598 /* preserve max RSSI if the measurements are 3599 * both on-channel or both off-channel 3600 */ 3601 if (bss_info_rssi > bss_rssi) 3602 bss->RSSI = bss_info_le->RSSI; 3603 } else if ((bss->flags & BRCMF_BSS_RSSI_ON_CHANNEL) && 3604 (bss_info_le->flags & BRCMF_BSS_RSSI_ON_CHANNEL) == 0) { 3605 /* preserve the on-channel rssi measurement 3606 * if the new measurement is off channel 3607 */ 3608 bss->RSSI = bss_info_le->RSSI; 3609 bss->flags |= BRCMF_BSS_RSSI_ON_CHANNEL; 3610 } 3611 return 1; 3612 } 3613 return 0; 3614 } 3615 3616 static s32 3617 brcmf_cfg80211_escan_handler(struct brcmf_if *ifp, 3618 const struct brcmf_event_msg *e, void *data) 3619 { 3620 struct brcmf_pub *drvr = ifp->drvr; 3621 struct brcmf_cfg80211_info *cfg = drvr->config; 3622 s32 status; 3623 struct brcmf_escan_result_le *escan_result_le; 3624 u32 escan_buflen; 3625 struct brcmf_bss_info_le *bss_info_le; 3626 struct brcmf_bss_info_le *bss = NULL; 3627 u32 bi_length; 3628 struct brcmf_scan_results *list; 3629 u32 i; 3630 bool aborted; 3631 3632 status = e->status; 3633 3634 if (status == BRCMF_E_STATUS_ABORT) 3635 goto exit; 3636 3637 if (!test_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status)) { 3638 bphy_err(drvr, "scan not ready, bsscfgidx=%d\n", 3639 ifp->bsscfgidx); 3640 return -EPERM; 3641 } 3642 3643 if (status == BRCMF_E_STATUS_PARTIAL) { 3644 brcmf_dbg(SCAN, "ESCAN Partial result\n"); 3645 if (e->datalen < sizeof(*escan_result_le)) { 3646 bphy_err(drvr, "invalid event data length\n"); 3647 goto exit; 3648 } 3649 escan_result_le = (struct brcmf_escan_result_le *) data; 3650 if (!escan_result_le) { 3651 bphy_err(drvr, "Invalid escan result (NULL pointer)\n"); 3652 goto exit; 3653 } 3654 escan_buflen = le32_to_cpu(escan_result_le->buflen); 3655 if (escan_buflen > BRCMF_ESCAN_BUF_SIZE || 3656 escan_buflen > e->datalen || 3657 escan_buflen < sizeof(*escan_result_le)) { 3658 bphy_err(drvr, "Invalid escan buffer length: %d\n", 3659 escan_buflen); 3660 goto exit; 3661 } 3662 if (le16_to_cpu(escan_result_le->bss_count) != 1) { 3663 bphy_err(drvr, "Invalid bss_count %d: ignoring\n", 3664 escan_result_le->bss_count); 3665 goto exit; 3666 } 3667 bss_info_le = &escan_result_le->bss_info_le; 3668 3669 if (brcmf_p2p_scan_finding_common_channel(cfg, bss_info_le)) 3670 goto exit; 3671 3672 if (!cfg->int_escan_map && !cfg->scan_request) { 3673 brcmf_dbg(SCAN, "result without cfg80211 request\n"); 3674 goto exit; 3675 } 3676 3677 bi_length = le32_to_cpu(bss_info_le->length); 3678 if (bi_length != escan_buflen - WL_ESCAN_RESULTS_FIXED_SIZE) { 3679 bphy_err(drvr, "Ignoring invalid bss_info length: %d\n", 3680 bi_length); 3681 goto exit; 3682 } 3683 3684 if (!(cfg_to_wiphy(cfg)->interface_modes & 3685 BIT(NL80211_IFTYPE_ADHOC))) { 3686 if (le16_to_cpu(bss_info_le->capability) & 3687 WLAN_CAPABILITY_IBSS) { 3688 bphy_err(drvr, "Ignoring IBSS result\n"); 3689 goto exit; 3690 } 3691 } 3692 3693 list = (struct brcmf_scan_results *) 3694 cfg->escan_info.escan_buf; 3695 if (bi_length > BRCMF_ESCAN_BUF_SIZE - list->buflen) { 3696 bphy_err(drvr, "Buffer is too small: ignoring\n"); 3697 goto exit; 3698 } 3699 3700 for (i = 0; i < list->count; i++) { 3701 bss = bss ? (struct brcmf_bss_info_le *) 3702 ((unsigned char *)bss + 3703 le32_to_cpu(bss->length)) : list->bss_info_le; 3704 if (brcmf_compare_update_same_bss(cfg, bss, 3705 bss_info_le)) 3706 goto exit; 3707 } 3708 memcpy(&cfg->escan_info.escan_buf[list->buflen], bss_info_le, 3709 bi_length); 3710 list->version = le32_to_cpu(bss_info_le->version); 3711 list->buflen += bi_length; 3712 list->count++; 3713 } else { 3714 cfg->escan_info.escan_state = WL_ESCAN_STATE_IDLE; 3715 if (brcmf_p2p_scan_finding_common_channel(cfg, NULL)) 3716 goto exit; 3717 if (cfg->int_escan_map || cfg->scan_request) { 3718 brcmf_inform_bss(cfg); 3719 aborted = status != BRCMF_E_STATUS_SUCCESS; 3720 brcmf_notify_escan_complete(cfg, ifp, aborted, false); 3721 } else 3722 brcmf_dbg(SCAN, "Ignored scan complete result 0x%x\n", 3723 status); 3724 } 3725 exit: 3726 return 0; 3727 } 3728 3729 static void brcmf_init_escan(struct brcmf_cfg80211_info *cfg) 3730 { 3731 brcmf_fweh_register(cfg->pub, BRCMF_E_ESCAN_RESULT, 3732 brcmf_cfg80211_escan_handler); 3733 cfg->escan_info.escan_state = WL_ESCAN_STATE_IDLE; 3734 /* Init scan_timeout timer */ 3735 timer_setup(&cfg->escan_timeout, brcmf_escan_timeout, 0); 3736 INIT_WORK(&cfg->escan_timeout_work, 3737 brcmf_cfg80211_escan_timeout_worker); 3738 } 3739 3740 static struct cfg80211_scan_request * 3741 brcmf_alloc_internal_escan_request(struct wiphy *wiphy, u32 n_netinfo) { 3742 struct cfg80211_scan_request *req; 3743 size_t req_size; 3744 3745 req_size = sizeof(*req) + 3746 n_netinfo * sizeof(req->channels[0]) + 3747 n_netinfo * sizeof(*req->ssids); 3748 3749 req = kzalloc(req_size, GFP_KERNEL); 3750 if (req) { 3751 req->wiphy = wiphy; 3752 req->ssids = (void *)(&req->channels[0]) + 3753 n_netinfo * sizeof(req->channels[0]); 3754 } 3755 return req; 3756 } 3757 3758 static int brcmf_internal_escan_add_info(struct cfg80211_scan_request *req, 3759 u8 *ssid, u8 ssid_len, u8 channel) 3760 { 3761 struct ieee80211_channel *chan; 3762 enum nl80211_band band; 3763 int freq, i; 3764 3765 if (channel <= CH_MAX_2G_CHANNEL) 3766 band = NL80211_BAND_2GHZ; 3767 else 3768 band = NL80211_BAND_5GHZ; 3769 3770 freq = ieee80211_channel_to_frequency(channel, band); 3771 if (!freq) 3772 return -EINVAL; 3773 3774 chan = ieee80211_get_channel(req->wiphy, freq); 3775 if (!chan) 3776 return -EINVAL; 3777 3778 for (i = 0; i < req->n_channels; i++) { 3779 if (req->channels[i] == chan) 3780 break; 3781 } 3782 if (i == req->n_channels) 3783 req->channels[req->n_channels++] = chan; 3784 3785 for (i = 0; i < req->n_ssids; i++) { 3786 if (req->ssids[i].ssid_len == ssid_len && 3787 !memcmp(req->ssids[i].ssid, ssid, ssid_len)) 3788 break; 3789 } 3790 if (i == req->n_ssids) { 3791 memcpy(req->ssids[req->n_ssids].ssid, ssid, ssid_len); 3792 req->ssids[req->n_ssids++].ssid_len = ssid_len; 3793 } 3794 return 0; 3795 } 3796 3797 static int brcmf_start_internal_escan(struct brcmf_if *ifp, u32 fwmap, 3798 struct cfg80211_scan_request *request) 3799 { 3800 struct brcmf_cfg80211_info *cfg = ifp->drvr->config; 3801 int err; 3802 3803 if (test_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status)) { 3804 if (cfg->int_escan_map) 3805 brcmf_dbg(SCAN, "aborting internal scan: map=%u\n", 3806 cfg->int_escan_map); 3807 /* Abort any on-going scan */ 3808 brcmf_abort_scanning(cfg); 3809 } 3810 3811 brcmf_dbg(SCAN, "start internal scan: map=%u\n", fwmap); 3812 set_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status); 3813 cfg->escan_info.run = brcmf_run_escan; 3814 err = brcmf_do_escan(ifp, request); 3815 if (err) { 3816 clear_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status); 3817 return err; 3818 } 3819 cfg->int_escan_map = fwmap; 3820 return 0; 3821 } 3822 3823 static struct brcmf_pno_net_info_le * 3824 brcmf_get_netinfo_array(struct brcmf_pno_scanresults_le *pfn_v1) 3825 { 3826 struct brcmf_pno_scanresults_v2_le *pfn_v2; 3827 struct brcmf_pno_net_info_le *netinfo; 3828 3829 switch (pfn_v1->version) { 3830 default: 3831 WARN_ON(1); 3832 fallthrough; 3833 case cpu_to_le32(1): 3834 netinfo = (struct brcmf_pno_net_info_le *)(pfn_v1 + 1); 3835 break; 3836 case cpu_to_le32(2): 3837 pfn_v2 = (struct brcmf_pno_scanresults_v2_le *)pfn_v1; 3838 netinfo = (struct brcmf_pno_net_info_le *)(pfn_v2 + 1); 3839 break; 3840 } 3841 3842 return netinfo; 3843 } 3844 3845 /* PFN result doesn't have all the info which are required by the supplicant 3846 * (For e.g IEs) Do a target Escan so that sched scan results are reported 3847 * via wl_inform_single_bss in the required format. Escan does require the 3848 * scan request in the form of cfg80211_scan_request. For timebeing, create 3849 * cfg80211_scan_request one out of the received PNO event. 3850 */ 3851 static s32 3852 brcmf_notify_sched_scan_results(struct brcmf_if *ifp, 3853 const struct brcmf_event_msg *e, void *data) 3854 { 3855 struct brcmf_pub *drvr = ifp->drvr; 3856 struct brcmf_cfg80211_info *cfg = drvr->config; 3857 struct brcmf_pno_net_info_le *netinfo, *netinfo_start; 3858 struct cfg80211_scan_request *request = NULL; 3859 struct wiphy *wiphy = cfg_to_wiphy(cfg); 3860 int i, err = 0; 3861 struct brcmf_pno_scanresults_le *pfn_result; 3862 u32 bucket_map; 3863 u32 result_count; 3864 u32 status; 3865 u32 datalen; 3866 3867 brcmf_dbg(SCAN, "Enter\n"); 3868 3869 if (e->datalen < (sizeof(*pfn_result) + sizeof(*netinfo))) { 3870 brcmf_dbg(SCAN, "Event data to small. Ignore\n"); 3871 return 0; 3872 } 3873 3874 if (e->event_code == BRCMF_E_PFN_NET_LOST) { 3875 brcmf_dbg(SCAN, "PFN NET LOST event. Do Nothing\n"); 3876 return 0; 3877 } 3878 3879 pfn_result = (struct brcmf_pno_scanresults_le *)data; 3880 result_count = le32_to_cpu(pfn_result->count); 3881 status = le32_to_cpu(pfn_result->status); 3882 3883 /* PFN event is limited to fit 512 bytes so we may get 3884 * multiple NET_FOUND events. For now place a warning here. 3885 */ 3886 WARN_ON(status != BRCMF_PNO_SCAN_COMPLETE); 3887 brcmf_dbg(SCAN, "PFN NET FOUND event. count: %d\n", result_count); 3888 if (!result_count) { 3889 bphy_err(drvr, "FALSE PNO Event. (pfn_count == 0)\n"); 3890 goto out_err; 3891 } 3892 3893 netinfo_start = brcmf_get_netinfo_array(pfn_result); 3894 datalen = e->datalen - ((void *)netinfo_start - (void *)pfn_result); 3895 if (datalen < result_count * sizeof(*netinfo)) { 3896 bphy_err(drvr, "insufficient event data\n"); 3897 goto out_err; 3898 } 3899 3900 request = brcmf_alloc_internal_escan_request(wiphy, 3901 result_count); 3902 if (!request) { 3903 err = -ENOMEM; 3904 goto out_err; 3905 } 3906 3907 bucket_map = 0; 3908 for (i = 0; i < result_count; i++) { 3909 netinfo = &netinfo_start[i]; 3910 3911 if (netinfo->SSID_len > IEEE80211_MAX_SSID_LEN) 3912 netinfo->SSID_len = IEEE80211_MAX_SSID_LEN; 3913 brcmf_dbg(SCAN, "SSID:%.32s Channel:%d\n", 3914 netinfo->SSID, netinfo->channel); 3915 bucket_map |= brcmf_pno_get_bucket_map(cfg->pno, netinfo); 3916 err = brcmf_internal_escan_add_info(request, 3917 netinfo->SSID, 3918 netinfo->SSID_len, 3919 netinfo->channel); 3920 if (err) 3921 goto out_err; 3922 } 3923 3924 if (!bucket_map) 3925 goto free_req; 3926 3927 err = brcmf_start_internal_escan(ifp, bucket_map, request); 3928 if (!err) 3929 goto free_req; 3930 3931 out_err: 3932 cfg80211_sched_scan_stopped(wiphy, 0); 3933 free_req: 3934 kfree(request); 3935 return err; 3936 } 3937 3938 static int 3939 brcmf_cfg80211_sched_scan_start(struct wiphy *wiphy, 3940 struct net_device *ndev, 3941 struct cfg80211_sched_scan_request *req) 3942 { 3943 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 3944 struct brcmf_if *ifp = netdev_priv(ndev); 3945 struct brcmf_pub *drvr = cfg->pub; 3946 3947 brcmf_dbg(SCAN, "Enter: n_match_sets=%d n_ssids=%d\n", 3948 req->n_match_sets, req->n_ssids); 3949 3950 if (test_bit(BRCMF_SCAN_STATUS_SUPPRESS, &cfg->scan_status)) { 3951 bphy_err(drvr, "Scanning suppressed: status=%lu\n", 3952 cfg->scan_status); 3953 return -EAGAIN; 3954 } 3955 3956 if (req->n_match_sets <= 0) { 3957 brcmf_dbg(SCAN, "invalid number of matchsets specified: %d\n", 3958 req->n_match_sets); 3959 return -EINVAL; 3960 } 3961 3962 return brcmf_pno_start_sched_scan(ifp, req); 3963 } 3964 3965 static int brcmf_cfg80211_sched_scan_stop(struct wiphy *wiphy, 3966 struct net_device *ndev, u64 reqid) 3967 { 3968 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 3969 struct brcmf_if *ifp = netdev_priv(ndev); 3970 3971 brcmf_dbg(SCAN, "enter\n"); 3972 brcmf_pno_stop_sched_scan(ifp, reqid); 3973 if (cfg->int_escan_map) 3974 brcmf_notify_escan_complete(cfg, ifp, true, true); 3975 return 0; 3976 } 3977 3978 static __always_inline void brcmf_delay(u32 ms) 3979 { 3980 if (ms < 1000 / HZ) { 3981 cond_resched(); 3982 mdelay(ms); 3983 } else { 3984 msleep(ms); 3985 } 3986 } 3987 3988 static s32 brcmf_config_wowl_pattern(struct brcmf_if *ifp, u8 cmd[4], 3989 u8 *pattern, u32 patternsize, u8 *mask, 3990 u32 packet_offset) 3991 { 3992 struct brcmf_fil_wowl_pattern_le *filter; 3993 u32 masksize; 3994 u32 patternoffset; 3995 u8 *buf; 3996 u32 bufsize; 3997 s32 ret; 3998 3999 masksize = (patternsize + 7) / 8; 4000 patternoffset = sizeof(*filter) - sizeof(filter->cmd) + masksize; 4001 4002 bufsize = sizeof(*filter) + patternsize + masksize; 4003 buf = kzalloc(bufsize, GFP_KERNEL); 4004 if (!buf) 4005 return -ENOMEM; 4006 filter = (struct brcmf_fil_wowl_pattern_le *)buf; 4007 4008 memcpy(filter->cmd, cmd, 4); 4009 filter->masksize = cpu_to_le32(masksize); 4010 filter->offset = cpu_to_le32(packet_offset); 4011 filter->patternoffset = cpu_to_le32(patternoffset); 4012 filter->patternsize = cpu_to_le32(patternsize); 4013 filter->type = cpu_to_le32(BRCMF_WOWL_PATTERN_TYPE_BITMAP); 4014 4015 if ((mask) && (masksize)) 4016 memcpy(buf + sizeof(*filter), mask, masksize); 4017 if ((pattern) && (patternsize)) 4018 memcpy(buf + sizeof(*filter) + masksize, pattern, patternsize); 4019 4020 ret = brcmf_fil_iovar_data_set(ifp, "wowl_pattern", buf, bufsize); 4021 4022 kfree(buf); 4023 return ret; 4024 } 4025 4026 static s32 4027 brcmf_wowl_nd_results(struct brcmf_if *ifp, const struct brcmf_event_msg *e, 4028 void *data) 4029 { 4030 struct brcmf_pub *drvr = ifp->drvr; 4031 struct brcmf_cfg80211_info *cfg = drvr->config; 4032 struct brcmf_pno_scanresults_le *pfn_result; 4033 struct brcmf_pno_net_info_le *netinfo; 4034 4035 brcmf_dbg(SCAN, "Enter\n"); 4036 4037 if (e->datalen < (sizeof(*pfn_result) + sizeof(*netinfo))) { 4038 brcmf_dbg(SCAN, "Event data to small. Ignore\n"); 4039 return 0; 4040 } 4041 4042 pfn_result = (struct brcmf_pno_scanresults_le *)data; 4043 4044 if (e->event_code == BRCMF_E_PFN_NET_LOST) { 4045 brcmf_dbg(SCAN, "PFN NET LOST event. Ignore\n"); 4046 return 0; 4047 } 4048 4049 if (le32_to_cpu(pfn_result->count) < 1) { 4050 bphy_err(drvr, "Invalid result count, expected 1 (%d)\n", 4051 le32_to_cpu(pfn_result->count)); 4052 return -EINVAL; 4053 } 4054 4055 netinfo = brcmf_get_netinfo_array(pfn_result); 4056 if (netinfo->SSID_len > IEEE80211_MAX_SSID_LEN) 4057 netinfo->SSID_len = IEEE80211_MAX_SSID_LEN; 4058 memcpy(cfg->wowl.nd->ssid.ssid, netinfo->SSID, netinfo->SSID_len); 4059 cfg->wowl.nd->ssid.ssid_len = netinfo->SSID_len; 4060 cfg->wowl.nd->n_channels = 1; 4061 cfg->wowl.nd->channels[0] = 4062 ieee80211_channel_to_frequency(netinfo->channel, 4063 netinfo->channel <= CH_MAX_2G_CHANNEL ? 4064 NL80211_BAND_2GHZ : NL80211_BAND_5GHZ); 4065 cfg->wowl.nd_info->n_matches = 1; 4066 cfg->wowl.nd_info->matches[0] = cfg->wowl.nd; 4067 4068 /* Inform (the resume task) that the net detect information was recvd */ 4069 cfg->wowl.nd_data_completed = true; 4070 wake_up(&cfg->wowl.nd_data_wait); 4071 4072 return 0; 4073 } 4074 4075 #ifdef CONFIG_PM 4076 4077 static void brcmf_report_wowl_wakeind(struct wiphy *wiphy, struct brcmf_if *ifp) 4078 { 4079 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 4080 struct brcmf_pub *drvr = cfg->pub; 4081 struct brcmf_wowl_wakeind_le wake_ind_le; 4082 struct cfg80211_wowlan_wakeup wakeup_data; 4083 struct cfg80211_wowlan_wakeup *wakeup; 4084 u32 wakeind; 4085 s32 err; 4086 int timeout; 4087 4088 err = brcmf_fil_iovar_data_get(ifp, "wowl_wakeind", &wake_ind_le, 4089 sizeof(wake_ind_le)); 4090 if (err) { 4091 bphy_err(drvr, "Get wowl_wakeind failed, err = %d\n", err); 4092 return; 4093 } 4094 4095 wakeind = le32_to_cpu(wake_ind_le.ucode_wakeind); 4096 if (wakeind & (BRCMF_WOWL_MAGIC | BRCMF_WOWL_DIS | BRCMF_WOWL_BCN | 4097 BRCMF_WOWL_RETR | BRCMF_WOWL_NET | 4098 BRCMF_WOWL_PFN_FOUND)) { 4099 wakeup = &wakeup_data; 4100 memset(&wakeup_data, 0, sizeof(wakeup_data)); 4101 wakeup_data.pattern_idx = -1; 4102 4103 if (wakeind & BRCMF_WOWL_MAGIC) { 4104 brcmf_dbg(INFO, "WOWL Wake indicator: BRCMF_WOWL_MAGIC\n"); 4105 wakeup_data.magic_pkt = true; 4106 } 4107 if (wakeind & BRCMF_WOWL_DIS) { 4108 brcmf_dbg(INFO, "WOWL Wake indicator: BRCMF_WOWL_DIS\n"); 4109 wakeup_data.disconnect = true; 4110 } 4111 if (wakeind & BRCMF_WOWL_BCN) { 4112 brcmf_dbg(INFO, "WOWL Wake indicator: BRCMF_WOWL_BCN\n"); 4113 wakeup_data.disconnect = true; 4114 } 4115 if (wakeind & BRCMF_WOWL_RETR) { 4116 brcmf_dbg(INFO, "WOWL Wake indicator: BRCMF_WOWL_RETR\n"); 4117 wakeup_data.disconnect = true; 4118 } 4119 if (wakeind & BRCMF_WOWL_NET) { 4120 brcmf_dbg(INFO, "WOWL Wake indicator: BRCMF_WOWL_NET\n"); 4121 /* For now always map to pattern 0, no API to get 4122 * correct information available at the moment. 4123 */ 4124 wakeup_data.pattern_idx = 0; 4125 } 4126 if (wakeind & BRCMF_WOWL_PFN_FOUND) { 4127 brcmf_dbg(INFO, "WOWL Wake indicator: BRCMF_WOWL_PFN_FOUND\n"); 4128 timeout = wait_event_timeout(cfg->wowl.nd_data_wait, 4129 cfg->wowl.nd_data_completed, 4130 BRCMF_ND_INFO_TIMEOUT); 4131 if (!timeout) 4132 bphy_err(drvr, "No result for wowl net detect\n"); 4133 else 4134 wakeup_data.net_detect = cfg->wowl.nd_info; 4135 } 4136 if (wakeind & BRCMF_WOWL_GTK_FAILURE) { 4137 brcmf_dbg(INFO, "WOWL Wake indicator: BRCMF_WOWL_GTK_FAILURE\n"); 4138 wakeup_data.gtk_rekey_failure = true; 4139 } 4140 } else { 4141 wakeup = NULL; 4142 } 4143 cfg80211_report_wowlan_wakeup(&ifp->vif->wdev, wakeup, GFP_KERNEL); 4144 } 4145 4146 #else 4147 4148 static void brcmf_report_wowl_wakeind(struct wiphy *wiphy, struct brcmf_if *ifp) 4149 { 4150 } 4151 4152 #endif /* CONFIG_PM */ 4153 4154 static s32 brcmf_cfg80211_resume(struct wiphy *wiphy) 4155 { 4156 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 4157 struct net_device *ndev = cfg_to_ndev(cfg); 4158 struct brcmf_if *ifp = netdev_priv(ndev); 4159 4160 brcmf_dbg(TRACE, "Enter\n"); 4161 4162 if (cfg->wowl.active) { 4163 brcmf_report_wowl_wakeind(wiphy, ifp); 4164 brcmf_fil_iovar_int_set(ifp, "wowl_clear", 0); 4165 brcmf_config_wowl_pattern(ifp, "clr", NULL, 0, NULL, 0); 4166 if (!brcmf_feat_is_enabled(ifp, BRCMF_FEAT_WOWL_ARP_ND)) 4167 brcmf_configure_arp_nd_offload(ifp, true); 4168 brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_PM, 4169 cfg->wowl.pre_pmmode); 4170 cfg->wowl.active = false; 4171 if (cfg->wowl.nd_enabled) { 4172 brcmf_cfg80211_sched_scan_stop(cfg->wiphy, ifp->ndev, 0); 4173 brcmf_fweh_unregister(cfg->pub, BRCMF_E_PFN_NET_FOUND); 4174 brcmf_fweh_register(cfg->pub, BRCMF_E_PFN_NET_FOUND, 4175 brcmf_notify_sched_scan_results); 4176 cfg->wowl.nd_enabled = false; 4177 } 4178 } 4179 return 0; 4180 } 4181 4182 static void brcmf_configure_wowl(struct brcmf_cfg80211_info *cfg, 4183 struct brcmf_if *ifp, 4184 struct cfg80211_wowlan *wowl) 4185 { 4186 u32 wowl_config; 4187 struct brcmf_wowl_wakeind_le wowl_wakeind; 4188 u32 i; 4189 4190 brcmf_dbg(TRACE, "Suspend, wowl config.\n"); 4191 4192 if (!brcmf_feat_is_enabled(ifp, BRCMF_FEAT_WOWL_ARP_ND)) 4193 brcmf_configure_arp_nd_offload(ifp, false); 4194 brcmf_fil_cmd_int_get(ifp, BRCMF_C_GET_PM, &cfg->wowl.pre_pmmode); 4195 brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_PM, PM_MAX); 4196 4197 wowl_config = 0; 4198 if (wowl->disconnect) 4199 wowl_config = BRCMF_WOWL_DIS | BRCMF_WOWL_BCN | BRCMF_WOWL_RETR; 4200 if (wowl->magic_pkt) 4201 wowl_config |= BRCMF_WOWL_MAGIC; 4202 if ((wowl->patterns) && (wowl->n_patterns)) { 4203 wowl_config |= BRCMF_WOWL_NET; 4204 for (i = 0; i < wowl->n_patterns; i++) { 4205 brcmf_config_wowl_pattern(ifp, "add", 4206 (u8 *)wowl->patterns[i].pattern, 4207 wowl->patterns[i].pattern_len, 4208 (u8 *)wowl->patterns[i].mask, 4209 wowl->patterns[i].pkt_offset); 4210 } 4211 } 4212 if (wowl->nd_config) { 4213 brcmf_cfg80211_sched_scan_start(cfg->wiphy, ifp->ndev, 4214 wowl->nd_config); 4215 wowl_config |= BRCMF_WOWL_PFN_FOUND; 4216 4217 cfg->wowl.nd_data_completed = false; 4218 cfg->wowl.nd_enabled = true; 4219 /* Now reroute the event for PFN to the wowl function. */ 4220 brcmf_fweh_unregister(cfg->pub, BRCMF_E_PFN_NET_FOUND); 4221 brcmf_fweh_register(cfg->pub, BRCMF_E_PFN_NET_FOUND, 4222 brcmf_wowl_nd_results); 4223 } 4224 if (wowl->gtk_rekey_failure) 4225 wowl_config |= BRCMF_WOWL_GTK_FAILURE; 4226 if (!test_bit(BRCMF_VIF_STATUS_CONNECTED, &ifp->vif->sme_state)) 4227 wowl_config |= BRCMF_WOWL_UNASSOC; 4228 4229 memcpy(&wowl_wakeind, "clear", 6); 4230 brcmf_fil_iovar_data_set(ifp, "wowl_wakeind", &wowl_wakeind, 4231 sizeof(wowl_wakeind)); 4232 brcmf_fil_iovar_int_set(ifp, "wowl", wowl_config); 4233 brcmf_fil_iovar_int_set(ifp, "wowl_activate", 1); 4234 brcmf_bus_wowl_config(cfg->pub->bus_if, true); 4235 cfg->wowl.active = true; 4236 } 4237 4238 static int brcmf_keepalive_start(struct brcmf_if *ifp, unsigned int interval) 4239 { 4240 struct brcmf_mkeep_alive_pkt_le kalive = {0}; 4241 int ret = 0; 4242 4243 /* Configure Null function/data keepalive */ 4244 kalive.version = cpu_to_le16(1); 4245 kalive.period_msec = cpu_to_le32(interval * MSEC_PER_SEC); 4246 kalive.len_bytes = cpu_to_le16(0); 4247 kalive.keep_alive_id = 0; 4248 4249 ret = brcmf_fil_iovar_data_set(ifp, "mkeep_alive", &kalive, sizeof(kalive)); 4250 if (ret) 4251 brcmf_err("keep-alive packet config failed, ret=%d\n", ret); 4252 4253 return ret; 4254 } 4255 4256 static s32 brcmf_cfg80211_suspend(struct wiphy *wiphy, 4257 struct cfg80211_wowlan *wowl) 4258 { 4259 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 4260 struct net_device *ndev = cfg_to_ndev(cfg); 4261 struct brcmf_if *ifp = netdev_priv(ndev); 4262 struct brcmf_cfg80211_vif *vif; 4263 4264 brcmf_dbg(TRACE, "Enter\n"); 4265 4266 /* if the primary net_device is not READY there is nothing 4267 * we can do but pray resume goes smoothly. 4268 */ 4269 if (!check_vif_up(ifp->vif)) 4270 goto exit; 4271 4272 /* Stop scheduled scan */ 4273 if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_PNO)) 4274 brcmf_cfg80211_sched_scan_stop(wiphy, ndev, 0); 4275 4276 /* end any scanning */ 4277 if (test_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status)) 4278 brcmf_abort_scanning(cfg); 4279 4280 if (wowl == NULL) { 4281 brcmf_bus_wowl_config(cfg->pub->bus_if, false); 4282 list_for_each_entry(vif, &cfg->vif_list, list) { 4283 if (!test_bit(BRCMF_VIF_STATUS_READY, &vif->sme_state)) 4284 continue; 4285 /* While going to suspend if associated with AP 4286 * disassociate from AP to save power while system is 4287 * in suspended state 4288 */ 4289 brcmf_link_down(vif, WLAN_REASON_UNSPECIFIED, true); 4290 /* Make sure WPA_Supplicant receives all the event 4291 * generated due to DISASSOC call to the fw to keep 4292 * the state fw and WPA_Supplicant state consistent 4293 */ 4294 brcmf_delay(500); 4295 } 4296 /* Configure MPC */ 4297 brcmf_set_mpc(ifp, 1); 4298 4299 } else { 4300 /* Configure WOWL paramaters */ 4301 brcmf_configure_wowl(cfg, ifp, wowl); 4302 4303 /* Prevent disassociation due to inactivity with keep-alive */ 4304 brcmf_keepalive_start(ifp, 30); 4305 } 4306 4307 exit: 4308 brcmf_dbg(TRACE, "Exit\n"); 4309 /* clear any scanning activity */ 4310 cfg->scan_status = 0; 4311 return 0; 4312 } 4313 4314 static s32 4315 brcmf_pmksa_v3_op(struct brcmf_if *ifp, struct cfg80211_pmksa *pmksa, 4316 bool alive) 4317 { 4318 struct brcmf_pmk_op_v3_le *pmk_op; 4319 int length = offsetof(struct brcmf_pmk_op_v3_le, pmk); 4320 int ret; 4321 4322 pmk_op = kzalloc(sizeof(*pmk_op), GFP_KERNEL); 4323 pmk_op->version = cpu_to_le16(BRCMF_PMKSA_VER_3); 4324 4325 if (!pmksa) { 4326 /* Flush operation, operate on entire list */ 4327 pmk_op->count = cpu_to_le16(0); 4328 } else { 4329 /* Single PMK operation */ 4330 pmk_op->count = cpu_to_le16(1); 4331 length += sizeof(struct brcmf_pmksa_v3); 4332 memcpy(pmk_op->pmk[0].bssid, pmksa->bssid, ETH_ALEN); 4333 memcpy(pmk_op->pmk[0].pmkid, pmksa->pmkid, WLAN_PMKID_LEN); 4334 pmk_op->pmk[0].pmkid_len = WLAN_PMKID_LEN; 4335 pmk_op->pmk[0].time_left = cpu_to_le32(alive ? BRCMF_PMKSA_NO_EXPIRY : 0); 4336 } 4337 4338 pmk_op->length = cpu_to_le16(length); 4339 4340 ret = brcmf_fil_iovar_data_set(ifp, "pmkid_info", pmk_op, sizeof(*pmk_op)); 4341 kfree(pmk_op); 4342 return ret; 4343 } 4344 4345 static __used s32 4346 brcmf_update_pmklist(struct brcmf_cfg80211_info *cfg, struct brcmf_if *ifp) 4347 { 4348 struct brcmf_pmk_list_le *pmk_list; 4349 int i; 4350 u32 npmk; 4351 4352 pmk_list = &cfg->pmk_list; 4353 npmk = le32_to_cpu(pmk_list->npmk); 4354 4355 brcmf_dbg(CONN, "No of elements %d\n", npmk); 4356 for (i = 0; i < npmk; i++) 4357 brcmf_dbg(CONN, "PMK[%d]: %pM\n", i, &pmk_list->pmk[i].bssid); 4358 4359 return brcmf_fil_iovar_data_set(ifp, "pmkid_info", pmk_list, 4360 sizeof(*pmk_list)); 4361 } 4362 4363 static s32 4364 brcmf_cfg80211_set_pmksa(struct wiphy *wiphy, struct net_device *ndev, 4365 struct cfg80211_pmksa *pmksa) 4366 { 4367 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 4368 struct brcmf_if *ifp = netdev_priv(ndev); 4369 struct brcmf_pmksa *pmk = &cfg->pmk_list.pmk[0]; 4370 struct brcmf_pub *drvr = cfg->pub; 4371 s32 err; 4372 u32 npmk, i; 4373 4374 brcmf_dbg(TRACE, "Enter\n"); 4375 if (!check_vif_up(ifp->vif)) 4376 return -EIO; 4377 4378 brcmf_dbg(CONN, "set_pmksa - PMK bssid: %pM =\n", pmksa->bssid); 4379 brcmf_dbg(CONN, "%*ph\n", WLAN_PMKID_LEN, pmksa->pmkid); 4380 4381 if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_PMKID_V3)) 4382 return brcmf_pmksa_v3_op(ifp, pmksa, true); 4383 4384 /* TODO: implement PMKID_V2 */ 4385 4386 npmk = le32_to_cpu(cfg->pmk_list.npmk); 4387 for (i = 0; i < npmk; i++) 4388 if (!memcmp(pmksa->bssid, pmk[i].bssid, ETH_ALEN)) 4389 break; 4390 if (i < BRCMF_MAXPMKID) { 4391 memcpy(pmk[i].bssid, pmksa->bssid, ETH_ALEN); 4392 memcpy(pmk[i].pmkid, pmksa->pmkid, WLAN_PMKID_LEN); 4393 if (i == npmk) { 4394 npmk++; 4395 cfg->pmk_list.npmk = cpu_to_le32(npmk); 4396 } 4397 } else { 4398 bphy_err(drvr, "Too many PMKSA entries cached %d\n", npmk); 4399 return -EINVAL; 4400 } 4401 4402 err = brcmf_update_pmklist(cfg, ifp); 4403 4404 brcmf_dbg(TRACE, "Exit\n"); 4405 return err; 4406 } 4407 4408 static s32 4409 brcmf_cfg80211_del_pmksa(struct wiphy *wiphy, struct net_device *ndev, 4410 struct cfg80211_pmksa *pmksa) 4411 { 4412 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 4413 struct brcmf_if *ifp = netdev_priv(ndev); 4414 struct brcmf_pmksa *pmk = &cfg->pmk_list.pmk[0]; 4415 struct brcmf_pub *drvr = cfg->pub; 4416 s32 err; 4417 u32 npmk, i; 4418 4419 brcmf_dbg(TRACE, "Enter\n"); 4420 if (!check_vif_up(ifp->vif)) 4421 return -EIO; 4422 4423 brcmf_dbg(CONN, "del_pmksa - PMK bssid = %pM\n", pmksa->bssid); 4424 4425 if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_PMKID_V3)) 4426 return brcmf_pmksa_v3_op(ifp, pmksa, false); 4427 4428 /* TODO: implement PMKID_V2 */ 4429 4430 npmk = le32_to_cpu(cfg->pmk_list.npmk); 4431 for (i = 0; i < npmk; i++) 4432 if (!memcmp(pmksa->bssid, pmk[i].bssid, ETH_ALEN)) 4433 break; 4434 4435 if ((npmk > 0) && (i < npmk)) { 4436 for (; i < (npmk - 1); i++) { 4437 memcpy(&pmk[i].bssid, &pmk[i + 1].bssid, ETH_ALEN); 4438 memcpy(&pmk[i].pmkid, &pmk[i + 1].pmkid, 4439 WLAN_PMKID_LEN); 4440 } 4441 memset(&pmk[i], 0, sizeof(*pmk)); 4442 cfg->pmk_list.npmk = cpu_to_le32(npmk - 1); 4443 } else { 4444 bphy_err(drvr, "Cache entry not found\n"); 4445 return -EINVAL; 4446 } 4447 4448 err = brcmf_update_pmklist(cfg, ifp); 4449 4450 brcmf_dbg(TRACE, "Exit\n"); 4451 return err; 4452 4453 } 4454 4455 static s32 4456 brcmf_cfg80211_flush_pmksa(struct wiphy *wiphy, struct net_device *ndev) 4457 { 4458 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 4459 struct brcmf_if *ifp = netdev_priv(ndev); 4460 s32 err; 4461 4462 brcmf_dbg(TRACE, "Enter\n"); 4463 if (!check_vif_up(ifp->vif)) 4464 return -EIO; 4465 4466 if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_PMKID_V3)) 4467 return brcmf_pmksa_v3_op(ifp, NULL, false); 4468 4469 /* TODO: implement PMKID_V2 */ 4470 4471 memset(&cfg->pmk_list, 0, sizeof(cfg->pmk_list)); 4472 err = brcmf_update_pmklist(cfg, ifp); 4473 4474 brcmf_dbg(TRACE, "Exit\n"); 4475 return err; 4476 4477 } 4478 4479 static s32 brcmf_configure_opensecurity(struct brcmf_if *ifp) 4480 { 4481 struct brcmf_pub *drvr = ifp->drvr; 4482 s32 err; 4483 s32 wpa_val; 4484 4485 /* set auth */ 4486 err = brcmf_fil_bsscfg_int_set(ifp, "auth", 0); 4487 if (err < 0) { 4488 bphy_err(drvr, "auth error %d\n", err); 4489 return err; 4490 } 4491 /* set wsec */ 4492 err = brcmf_fil_bsscfg_int_set(ifp, "wsec", 0); 4493 if (err < 0) { 4494 bphy_err(drvr, "wsec error %d\n", err); 4495 return err; 4496 } 4497 /* set upper-layer auth */ 4498 if (brcmf_is_ibssmode(ifp->vif)) 4499 wpa_val = WPA_AUTH_NONE; 4500 else 4501 wpa_val = WPA_AUTH_DISABLED; 4502 err = brcmf_fil_bsscfg_int_set(ifp, "wpa_auth", wpa_val); 4503 if (err < 0) { 4504 bphy_err(drvr, "wpa_auth error %d\n", err); 4505 return err; 4506 } 4507 4508 return 0; 4509 } 4510 4511 static bool brcmf_valid_wpa_oui(u8 *oui, bool is_rsn_ie) 4512 { 4513 if (is_rsn_ie) 4514 return (memcmp(oui, RSN_OUI, TLV_OUI_LEN) == 0); 4515 4516 return (memcmp(oui, WPA_OUI, TLV_OUI_LEN) == 0); 4517 } 4518 4519 static s32 4520 brcmf_configure_wpaie(struct brcmf_if *ifp, 4521 const struct brcmf_vs_tlv *wpa_ie, 4522 bool is_rsn_ie) 4523 { 4524 struct brcmf_pub *drvr = ifp->drvr; 4525 u32 auth = 0; /* d11 open authentication */ 4526 u16 count; 4527 s32 err = 0; 4528 s32 len; 4529 u32 i; 4530 u32 wsec; 4531 u32 pval = 0; 4532 u32 gval = 0; 4533 u32 wpa_auth = 0; 4534 u32 offset; 4535 u8 *data; 4536 u16 rsn_cap; 4537 u32 wme_bss_disable; 4538 u32 mfp; 4539 4540 brcmf_dbg(TRACE, "Enter\n"); 4541 if (wpa_ie == NULL) 4542 goto exit; 4543 4544 len = wpa_ie->len + TLV_HDR_LEN; 4545 data = (u8 *)wpa_ie; 4546 offset = TLV_HDR_LEN; 4547 if (!is_rsn_ie) 4548 offset += VS_IE_FIXED_HDR_LEN; 4549 else 4550 offset += WPA_IE_VERSION_LEN; 4551 4552 /* check for multicast cipher suite */ 4553 if (offset + WPA_IE_MIN_OUI_LEN > len) { 4554 err = -EINVAL; 4555 bphy_err(drvr, "no multicast cipher suite\n"); 4556 goto exit; 4557 } 4558 4559 if (!brcmf_valid_wpa_oui(&data[offset], is_rsn_ie)) { 4560 err = -EINVAL; 4561 bphy_err(drvr, "ivalid OUI\n"); 4562 goto exit; 4563 } 4564 offset += TLV_OUI_LEN; 4565 4566 /* pick up multicast cipher */ 4567 switch (data[offset]) { 4568 case WPA_CIPHER_NONE: 4569 gval = 0; 4570 break; 4571 case WPA_CIPHER_WEP_40: 4572 case WPA_CIPHER_WEP_104: 4573 gval = WEP_ENABLED; 4574 break; 4575 case WPA_CIPHER_TKIP: 4576 gval = TKIP_ENABLED; 4577 break; 4578 case WPA_CIPHER_AES_CCM: 4579 gval = AES_ENABLED; 4580 break; 4581 default: 4582 err = -EINVAL; 4583 bphy_err(drvr, "Invalid multi cast cipher info\n"); 4584 goto exit; 4585 } 4586 4587 offset++; 4588 /* walk thru unicast cipher list and pick up what we recognize */ 4589 count = data[offset] + (data[offset + 1] << 8); 4590 offset += WPA_IE_SUITE_COUNT_LEN; 4591 /* Check for unicast suite(s) */ 4592 if (offset + (WPA_IE_MIN_OUI_LEN * count) > len) { 4593 err = -EINVAL; 4594 bphy_err(drvr, "no unicast cipher suite\n"); 4595 goto exit; 4596 } 4597 for (i = 0; i < count; i++) { 4598 if (!brcmf_valid_wpa_oui(&data[offset], is_rsn_ie)) { 4599 err = -EINVAL; 4600 bphy_err(drvr, "ivalid OUI\n"); 4601 goto exit; 4602 } 4603 offset += TLV_OUI_LEN; 4604 switch (data[offset]) { 4605 case WPA_CIPHER_NONE: 4606 break; 4607 case WPA_CIPHER_WEP_40: 4608 case WPA_CIPHER_WEP_104: 4609 pval |= WEP_ENABLED; 4610 break; 4611 case WPA_CIPHER_TKIP: 4612 pval |= TKIP_ENABLED; 4613 break; 4614 case WPA_CIPHER_AES_CCM: 4615 pval |= AES_ENABLED; 4616 break; 4617 default: 4618 bphy_err(drvr, "Invalid unicast security info\n"); 4619 } 4620 offset++; 4621 } 4622 /* walk thru auth management suite list and pick up what we recognize */ 4623 count = data[offset] + (data[offset + 1] << 8); 4624 offset += WPA_IE_SUITE_COUNT_LEN; 4625 /* Check for auth key management suite(s) */ 4626 if (offset + (WPA_IE_MIN_OUI_LEN * count) > len) { 4627 err = -EINVAL; 4628 bphy_err(drvr, "no auth key mgmt suite\n"); 4629 goto exit; 4630 } 4631 for (i = 0; i < count; i++) { 4632 if (!brcmf_valid_wpa_oui(&data[offset], is_rsn_ie)) { 4633 err = -EINVAL; 4634 bphy_err(drvr, "ivalid OUI\n"); 4635 goto exit; 4636 } 4637 offset += TLV_OUI_LEN; 4638 switch (data[offset]) { 4639 case RSN_AKM_NONE: 4640 brcmf_dbg(TRACE, "RSN_AKM_NONE\n"); 4641 wpa_auth |= WPA_AUTH_NONE; 4642 break; 4643 case RSN_AKM_UNSPECIFIED: 4644 brcmf_dbg(TRACE, "RSN_AKM_UNSPECIFIED\n"); 4645 is_rsn_ie ? (wpa_auth |= WPA2_AUTH_UNSPECIFIED) : 4646 (wpa_auth |= WPA_AUTH_UNSPECIFIED); 4647 break; 4648 case RSN_AKM_PSK: 4649 brcmf_dbg(TRACE, "RSN_AKM_PSK\n"); 4650 is_rsn_ie ? (wpa_auth |= WPA2_AUTH_PSK) : 4651 (wpa_auth |= WPA_AUTH_PSK); 4652 break; 4653 case RSN_AKM_SHA256_PSK: 4654 brcmf_dbg(TRACE, "RSN_AKM_MFP_PSK\n"); 4655 wpa_auth |= WPA2_AUTH_PSK_SHA256; 4656 break; 4657 case RSN_AKM_SHA256_1X: 4658 brcmf_dbg(TRACE, "RSN_AKM_MFP_1X\n"); 4659 wpa_auth |= WPA2_AUTH_1X_SHA256; 4660 break; 4661 case RSN_AKM_SAE: 4662 brcmf_dbg(TRACE, "RSN_AKM_SAE\n"); 4663 wpa_auth |= WPA3_AUTH_SAE_PSK; 4664 break; 4665 default: 4666 bphy_err(drvr, "Invalid key mgmt info\n"); 4667 } 4668 offset++; 4669 } 4670 4671 mfp = BRCMF_MFP_NONE; 4672 if (is_rsn_ie) { 4673 wme_bss_disable = 1; 4674 if ((offset + RSN_CAP_LEN) <= len) { 4675 rsn_cap = data[offset] + (data[offset + 1] << 8); 4676 if (rsn_cap & RSN_CAP_PTK_REPLAY_CNTR_MASK) 4677 wme_bss_disable = 0; 4678 if (rsn_cap & RSN_CAP_MFPR_MASK) { 4679 brcmf_dbg(TRACE, "MFP Required\n"); 4680 mfp = BRCMF_MFP_REQUIRED; 4681 /* Firmware only supports mfp required in 4682 * combination with WPA2_AUTH_PSK_SHA256, 4683 * WPA2_AUTH_1X_SHA256, or WPA3_AUTH_SAE_PSK. 4684 */ 4685 if (!(wpa_auth & (WPA2_AUTH_PSK_SHA256 | 4686 WPA2_AUTH_1X_SHA256 | 4687 WPA3_AUTH_SAE_PSK))) { 4688 err = -EINVAL; 4689 goto exit; 4690 } 4691 /* Firmware has requirement that WPA2_AUTH_PSK/ 4692 * WPA2_AUTH_UNSPECIFIED be set, if SHA256 OUI 4693 * is to be included in the rsn ie. 4694 */ 4695 if (wpa_auth & WPA2_AUTH_PSK_SHA256) 4696 wpa_auth |= WPA2_AUTH_PSK; 4697 else if (wpa_auth & WPA2_AUTH_1X_SHA256) 4698 wpa_auth |= WPA2_AUTH_UNSPECIFIED; 4699 } else if (rsn_cap & RSN_CAP_MFPC_MASK) { 4700 brcmf_dbg(TRACE, "MFP Capable\n"); 4701 mfp = BRCMF_MFP_CAPABLE; 4702 } 4703 } 4704 offset += RSN_CAP_LEN; 4705 /* set wme_bss_disable to sync RSN Capabilities */ 4706 err = brcmf_fil_bsscfg_int_set(ifp, "wme_bss_disable", 4707 wme_bss_disable); 4708 if (err < 0) { 4709 bphy_err(drvr, "wme_bss_disable error %d\n", err); 4710 goto exit; 4711 } 4712 4713 /* Skip PMKID cnt as it is know to be 0 for AP. */ 4714 offset += RSN_PMKID_COUNT_LEN; 4715 4716 /* See if there is BIP wpa suite left for MFP */ 4717 if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MFP) && 4718 ((offset + WPA_IE_MIN_OUI_LEN) <= len)) { 4719 err = brcmf_fil_bsscfg_data_set(ifp, "bip", 4720 &data[offset], 4721 WPA_IE_MIN_OUI_LEN); 4722 if (err < 0) { 4723 bphy_err(drvr, "bip error %d\n", err); 4724 goto exit; 4725 } 4726 } 4727 } 4728 /* FOR WPS , set SES_OW_ENABLED */ 4729 wsec = (pval | gval | SES_OW_ENABLED); 4730 4731 /* set auth */ 4732 err = brcmf_fil_bsscfg_int_set(ifp, "auth", auth); 4733 if (err < 0) { 4734 bphy_err(drvr, "auth error %d\n", err); 4735 goto exit; 4736 } 4737 /* set wsec */ 4738 err = brcmf_fil_bsscfg_int_set(ifp, "wsec", wsec); 4739 if (err < 0) { 4740 bphy_err(drvr, "wsec error %d\n", err); 4741 goto exit; 4742 } 4743 /* Configure MFP, this needs to go after wsec otherwise the wsec command 4744 * will overwrite the values set by MFP 4745 */ 4746 if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MFP)) { 4747 err = brcmf_fil_bsscfg_int_set(ifp, "mfp", mfp); 4748 if (err < 0) { 4749 bphy_err(drvr, "mfp error %d\n", err); 4750 goto exit; 4751 } 4752 } 4753 /* set upper-layer auth */ 4754 err = brcmf_fil_bsscfg_int_set(ifp, "wpa_auth", wpa_auth); 4755 if (err < 0) { 4756 bphy_err(drvr, "wpa_auth error %d\n", err); 4757 goto exit; 4758 } 4759 4760 exit: 4761 return err; 4762 } 4763 4764 static s32 4765 brcmf_parse_vndr_ies(const u8 *vndr_ie_buf, u32 vndr_ie_len, 4766 struct parsed_vndr_ies *vndr_ies) 4767 { 4768 struct brcmf_vs_tlv *vndrie; 4769 struct brcmf_tlv *ie; 4770 struct parsed_vndr_ie_info *parsed_info; 4771 s32 remaining_len; 4772 4773 remaining_len = (s32)vndr_ie_len; 4774 memset(vndr_ies, 0, sizeof(*vndr_ies)); 4775 4776 ie = (struct brcmf_tlv *)vndr_ie_buf; 4777 while (ie) { 4778 if (ie->id != WLAN_EID_VENDOR_SPECIFIC) 4779 goto next; 4780 vndrie = (struct brcmf_vs_tlv *)ie; 4781 /* len should be bigger than OUI length + one */ 4782 if (vndrie->len < (VS_IE_FIXED_HDR_LEN - TLV_HDR_LEN + 1)) { 4783 brcmf_err("invalid vndr ie. length is too small %d\n", 4784 vndrie->len); 4785 goto next; 4786 } 4787 /* if wpa or wme ie, do not add ie */ 4788 if (!memcmp(vndrie->oui, (u8 *)WPA_OUI, TLV_OUI_LEN) && 4789 ((vndrie->oui_type == WPA_OUI_TYPE) || 4790 (vndrie->oui_type == WME_OUI_TYPE))) { 4791 brcmf_dbg(TRACE, "Found WPA/WME oui. Do not add it\n"); 4792 goto next; 4793 } 4794 4795 parsed_info = &vndr_ies->ie_info[vndr_ies->count]; 4796 4797 /* save vndr ie information */ 4798 parsed_info->ie_ptr = (char *)vndrie; 4799 parsed_info->ie_len = vndrie->len + TLV_HDR_LEN; 4800 memcpy(&parsed_info->vndrie, vndrie, sizeof(*vndrie)); 4801 4802 vndr_ies->count++; 4803 4804 brcmf_dbg(TRACE, "** OUI %3ph, type 0x%02x\n", 4805 parsed_info->vndrie.oui, 4806 parsed_info->vndrie.oui_type); 4807 4808 if (vndr_ies->count >= VNDR_IE_PARSE_LIMIT) 4809 break; 4810 next: 4811 remaining_len -= (ie->len + TLV_HDR_LEN); 4812 if (remaining_len <= TLV_HDR_LEN) 4813 ie = NULL; 4814 else 4815 ie = (struct brcmf_tlv *)(((u8 *)ie) + ie->len + 4816 TLV_HDR_LEN); 4817 } 4818 return 0; 4819 } 4820 4821 static u32 4822 brcmf_vndr_ie(u8 *iebuf, s32 pktflag, u8 *ie_ptr, u32 ie_len, s8 *add_del_cmd) 4823 { 4824 strscpy(iebuf, add_del_cmd, VNDR_IE_CMD_LEN); 4825 4826 put_unaligned_le32(1, &iebuf[VNDR_IE_COUNT_OFFSET]); 4827 4828 put_unaligned_le32(pktflag, &iebuf[VNDR_IE_PKTFLAG_OFFSET]); 4829 4830 memcpy(&iebuf[VNDR_IE_VSIE_OFFSET], ie_ptr, ie_len); 4831 4832 return ie_len + VNDR_IE_HDR_SIZE; 4833 } 4834 4835 s32 brcmf_vif_set_mgmt_ie(struct brcmf_cfg80211_vif *vif, s32 pktflag, 4836 const u8 *vndr_ie_buf, u32 vndr_ie_len) 4837 { 4838 struct brcmf_pub *drvr; 4839 struct brcmf_if *ifp; 4840 struct vif_saved_ie *saved_ie; 4841 s32 err = 0; 4842 u8 *iovar_ie_buf; 4843 u8 *curr_ie_buf; 4844 u8 *mgmt_ie_buf = NULL; 4845 int mgmt_ie_buf_len; 4846 u32 *mgmt_ie_len; 4847 u32 del_add_ie_buf_len = 0; 4848 u32 total_ie_buf_len = 0; 4849 u32 parsed_ie_buf_len = 0; 4850 struct parsed_vndr_ies old_vndr_ies; 4851 struct parsed_vndr_ies new_vndr_ies; 4852 struct parsed_vndr_ie_info *vndrie_info; 4853 s32 i; 4854 u8 *ptr; 4855 int remained_buf_len; 4856 4857 if (!vif) 4858 return -ENODEV; 4859 ifp = vif->ifp; 4860 drvr = ifp->drvr; 4861 saved_ie = &vif->saved_ie; 4862 4863 brcmf_dbg(TRACE, "bsscfgidx %d, pktflag : 0x%02X\n", ifp->bsscfgidx, 4864 pktflag); 4865 iovar_ie_buf = kzalloc(WL_EXTRA_BUF_MAX, GFP_KERNEL); 4866 if (!iovar_ie_buf) 4867 return -ENOMEM; 4868 curr_ie_buf = iovar_ie_buf; 4869 switch (pktflag) { 4870 case BRCMF_VNDR_IE_PRBREQ_FLAG: 4871 mgmt_ie_buf = saved_ie->probe_req_ie; 4872 mgmt_ie_len = &saved_ie->probe_req_ie_len; 4873 mgmt_ie_buf_len = sizeof(saved_ie->probe_req_ie); 4874 break; 4875 case BRCMF_VNDR_IE_PRBRSP_FLAG: 4876 mgmt_ie_buf = saved_ie->probe_res_ie; 4877 mgmt_ie_len = &saved_ie->probe_res_ie_len; 4878 mgmt_ie_buf_len = sizeof(saved_ie->probe_res_ie); 4879 break; 4880 case BRCMF_VNDR_IE_BEACON_FLAG: 4881 mgmt_ie_buf = saved_ie->beacon_ie; 4882 mgmt_ie_len = &saved_ie->beacon_ie_len; 4883 mgmt_ie_buf_len = sizeof(saved_ie->beacon_ie); 4884 break; 4885 case BRCMF_VNDR_IE_ASSOCREQ_FLAG: 4886 mgmt_ie_buf = saved_ie->assoc_req_ie; 4887 mgmt_ie_len = &saved_ie->assoc_req_ie_len; 4888 mgmt_ie_buf_len = sizeof(saved_ie->assoc_req_ie); 4889 break; 4890 case BRCMF_VNDR_IE_ASSOCRSP_FLAG: 4891 mgmt_ie_buf = saved_ie->assoc_res_ie; 4892 mgmt_ie_len = &saved_ie->assoc_res_ie_len; 4893 mgmt_ie_buf_len = sizeof(saved_ie->assoc_res_ie); 4894 break; 4895 default: 4896 err = -EPERM; 4897 bphy_err(drvr, "not suitable type\n"); 4898 goto exit; 4899 } 4900 4901 if (vndr_ie_len > mgmt_ie_buf_len) { 4902 err = -ENOMEM; 4903 bphy_err(drvr, "extra IE size too big\n"); 4904 goto exit; 4905 } 4906 4907 /* parse and save new vndr_ie in curr_ie_buff before comparing it */ 4908 if (vndr_ie_buf && vndr_ie_len && curr_ie_buf) { 4909 ptr = curr_ie_buf; 4910 brcmf_parse_vndr_ies(vndr_ie_buf, vndr_ie_len, &new_vndr_ies); 4911 for (i = 0; i < new_vndr_ies.count; i++) { 4912 vndrie_info = &new_vndr_ies.ie_info[i]; 4913 memcpy(ptr + parsed_ie_buf_len, vndrie_info->ie_ptr, 4914 vndrie_info->ie_len); 4915 parsed_ie_buf_len += vndrie_info->ie_len; 4916 } 4917 } 4918 4919 if (mgmt_ie_buf && *mgmt_ie_len) { 4920 if (parsed_ie_buf_len && (parsed_ie_buf_len == *mgmt_ie_len) && 4921 (memcmp(mgmt_ie_buf, curr_ie_buf, 4922 parsed_ie_buf_len) == 0)) { 4923 brcmf_dbg(TRACE, "Previous mgmt IE equals to current IE\n"); 4924 goto exit; 4925 } 4926 4927 /* parse old vndr_ie */ 4928 brcmf_parse_vndr_ies(mgmt_ie_buf, *mgmt_ie_len, &old_vndr_ies); 4929 4930 /* make a command to delete old ie */ 4931 for (i = 0; i < old_vndr_ies.count; i++) { 4932 vndrie_info = &old_vndr_ies.ie_info[i]; 4933 4934 brcmf_dbg(TRACE, "DEL ID : %d, Len: %d , OUI:%3ph\n", 4935 vndrie_info->vndrie.id, 4936 vndrie_info->vndrie.len, 4937 vndrie_info->vndrie.oui); 4938 4939 del_add_ie_buf_len = brcmf_vndr_ie(curr_ie_buf, pktflag, 4940 vndrie_info->ie_ptr, 4941 vndrie_info->ie_len, 4942 "del"); 4943 curr_ie_buf += del_add_ie_buf_len; 4944 total_ie_buf_len += del_add_ie_buf_len; 4945 } 4946 } 4947 4948 *mgmt_ie_len = 0; 4949 /* Add if there is any extra IE */ 4950 if (mgmt_ie_buf && parsed_ie_buf_len) { 4951 ptr = mgmt_ie_buf; 4952 4953 remained_buf_len = mgmt_ie_buf_len; 4954 4955 /* make a command to add new ie */ 4956 for (i = 0; i < new_vndr_ies.count; i++) { 4957 vndrie_info = &new_vndr_ies.ie_info[i]; 4958 4959 /* verify remained buf size before copy data */ 4960 if (remained_buf_len < (vndrie_info->vndrie.len + 4961 VNDR_IE_VSIE_OFFSET)) { 4962 bphy_err(drvr, "no space in mgmt_ie_buf: len left %d", 4963 remained_buf_len); 4964 break; 4965 } 4966 remained_buf_len -= (vndrie_info->ie_len + 4967 VNDR_IE_VSIE_OFFSET); 4968 4969 brcmf_dbg(TRACE, "ADDED ID : %d, Len: %d, OUI:%3ph\n", 4970 vndrie_info->vndrie.id, 4971 vndrie_info->vndrie.len, 4972 vndrie_info->vndrie.oui); 4973 4974 del_add_ie_buf_len = brcmf_vndr_ie(curr_ie_buf, pktflag, 4975 vndrie_info->ie_ptr, 4976 vndrie_info->ie_len, 4977 "add"); 4978 4979 /* save the parsed IE in wl struct */ 4980 memcpy(ptr + (*mgmt_ie_len), vndrie_info->ie_ptr, 4981 vndrie_info->ie_len); 4982 *mgmt_ie_len += vndrie_info->ie_len; 4983 4984 curr_ie_buf += del_add_ie_buf_len; 4985 total_ie_buf_len += del_add_ie_buf_len; 4986 } 4987 } 4988 if (total_ie_buf_len) { 4989 err = brcmf_fil_bsscfg_data_set(ifp, "vndr_ie", iovar_ie_buf, 4990 total_ie_buf_len); 4991 if (err) 4992 bphy_err(drvr, "vndr ie set error : %d\n", err); 4993 } 4994 4995 exit: 4996 kfree(iovar_ie_buf); 4997 return err; 4998 } 4999 5000 s32 brcmf_vif_clear_mgmt_ies(struct brcmf_cfg80211_vif *vif) 5001 { 5002 static const s32 pktflags[] = { 5003 BRCMF_VNDR_IE_PRBREQ_FLAG, 5004 BRCMF_VNDR_IE_PRBRSP_FLAG, 5005 BRCMF_VNDR_IE_BEACON_FLAG 5006 }; 5007 int i; 5008 5009 for (i = 0; i < ARRAY_SIZE(pktflags); i++) 5010 brcmf_vif_set_mgmt_ie(vif, pktflags[i], NULL, 0); 5011 5012 memset(&vif->saved_ie, 0, sizeof(vif->saved_ie)); 5013 return 0; 5014 } 5015 5016 static s32 5017 brcmf_config_ap_mgmt_ie(struct brcmf_cfg80211_vif *vif, 5018 struct cfg80211_beacon_data *beacon) 5019 { 5020 struct brcmf_pub *drvr = vif->ifp->drvr; 5021 s32 err; 5022 5023 /* Set Beacon IEs to FW */ 5024 err = brcmf_vif_set_mgmt_ie(vif, BRCMF_VNDR_IE_BEACON_FLAG, 5025 beacon->tail, beacon->tail_len); 5026 if (err) { 5027 bphy_err(drvr, "Set Beacon IE Failed\n"); 5028 return err; 5029 } 5030 brcmf_dbg(TRACE, "Applied Vndr IEs for Beacon\n"); 5031 5032 /* Set Probe Response IEs to FW */ 5033 err = brcmf_vif_set_mgmt_ie(vif, BRCMF_VNDR_IE_PRBRSP_FLAG, 5034 beacon->proberesp_ies, 5035 beacon->proberesp_ies_len); 5036 if (err) 5037 bphy_err(drvr, "Set Probe Resp IE Failed\n"); 5038 else 5039 brcmf_dbg(TRACE, "Applied Vndr IEs for Probe Resp\n"); 5040 5041 /* Set Assoc Response IEs to FW */ 5042 err = brcmf_vif_set_mgmt_ie(vif, BRCMF_VNDR_IE_ASSOCRSP_FLAG, 5043 beacon->assocresp_ies, 5044 beacon->assocresp_ies_len); 5045 if (err) 5046 brcmf_err("Set Assoc Resp IE Failed\n"); 5047 else 5048 brcmf_dbg(TRACE, "Applied Vndr IEs for Assoc Resp\n"); 5049 5050 return err; 5051 } 5052 5053 static s32 5054 brcmf_parse_configure_security(struct brcmf_if *ifp, 5055 struct cfg80211_ap_settings *settings, 5056 enum nl80211_iftype dev_role) 5057 { 5058 const struct brcmf_tlv *rsn_ie; 5059 const struct brcmf_vs_tlv *wpa_ie; 5060 s32 err = 0; 5061 5062 /* find the RSN_IE */ 5063 rsn_ie = brcmf_parse_tlvs((u8 *)settings->beacon.tail, 5064 settings->beacon.tail_len, WLAN_EID_RSN); 5065 5066 /* find the WPA_IE */ 5067 wpa_ie = brcmf_find_wpaie((u8 *)settings->beacon.tail, 5068 settings->beacon.tail_len); 5069 5070 if (wpa_ie || rsn_ie) { 5071 brcmf_dbg(TRACE, "WPA(2) IE is found\n"); 5072 if (wpa_ie) { 5073 /* WPA IE */ 5074 err = brcmf_configure_wpaie(ifp, wpa_ie, false); 5075 if (err < 0) 5076 return err; 5077 } else { 5078 struct brcmf_vs_tlv *tmp_ie; 5079 5080 tmp_ie = (struct brcmf_vs_tlv *)rsn_ie; 5081 5082 /* RSN IE */ 5083 err = brcmf_configure_wpaie(ifp, tmp_ie, true); 5084 if (err < 0) 5085 return err; 5086 } 5087 } else { 5088 brcmf_dbg(TRACE, "No WPA(2) IEs found\n"); 5089 brcmf_configure_opensecurity(ifp); 5090 } 5091 5092 return err; 5093 } 5094 5095 static s32 5096 brcmf_cfg80211_start_ap(struct wiphy *wiphy, struct net_device *ndev, 5097 struct cfg80211_ap_settings *settings) 5098 { 5099 s32 ie_offset; 5100 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 5101 struct brcmf_if *ifp = netdev_priv(ndev); 5102 struct brcmf_pub *drvr = cfg->pub; 5103 struct brcmf_cfg80211_profile *profile = &ifp->vif->profile; 5104 struct cfg80211_crypto_settings *crypto = &settings->crypto; 5105 const struct brcmf_tlv *ssid_ie; 5106 const struct brcmf_tlv *country_ie; 5107 struct brcmf_ssid_le ssid_le; 5108 s32 err = -EPERM; 5109 struct brcmf_join_params join_params; 5110 enum nl80211_iftype dev_role; 5111 struct brcmf_fil_bss_enable_le bss_enable; 5112 u16 chanspec = chandef_to_chanspec(&cfg->d11inf, &settings->chandef); 5113 bool mbss; 5114 int is_11d; 5115 bool supports_11d; 5116 5117 brcmf_dbg(TRACE, "ctrlchn=%d, center=%d, bw=%d, beacon_interval=%d, dtim_period=%d,\n", 5118 settings->chandef.chan->hw_value, 5119 settings->chandef.center_freq1, settings->chandef.width, 5120 settings->beacon_interval, settings->dtim_period); 5121 brcmf_dbg(TRACE, "ssid=%s(%zu), auth_type=%d, inactivity_timeout=%d\n", 5122 settings->ssid, settings->ssid_len, settings->auth_type, 5123 settings->inactivity_timeout); 5124 dev_role = ifp->vif->wdev.iftype; 5125 mbss = ifp->vif->mbss; 5126 5127 /* store current 11d setting */ 5128 if (brcmf_fil_cmd_int_get(ifp, BRCMF_C_GET_REGULATORY, 5129 &ifp->vif->is_11d)) { 5130 is_11d = supports_11d = false; 5131 } else { 5132 country_ie = brcmf_parse_tlvs((u8 *)settings->beacon.tail, 5133 settings->beacon.tail_len, 5134 WLAN_EID_COUNTRY); 5135 is_11d = country_ie ? 1 : 0; 5136 supports_11d = true; 5137 } 5138 5139 memset(&ssid_le, 0, sizeof(ssid_le)); 5140 if (settings->ssid == NULL || settings->ssid_len == 0) { 5141 ie_offset = DOT11_MGMT_HDR_LEN + DOT11_BCN_PRB_FIXED_LEN; 5142 ssid_ie = brcmf_parse_tlvs( 5143 (u8 *)&settings->beacon.head[ie_offset], 5144 settings->beacon.head_len - ie_offset, 5145 WLAN_EID_SSID); 5146 if (!ssid_ie || ssid_ie->len > IEEE80211_MAX_SSID_LEN) 5147 return -EINVAL; 5148 5149 memcpy(ssid_le.SSID, ssid_ie->data, ssid_ie->len); 5150 ssid_le.SSID_len = cpu_to_le32(ssid_ie->len); 5151 brcmf_dbg(TRACE, "SSID is (%s) in Head\n", ssid_le.SSID); 5152 } else { 5153 memcpy(ssid_le.SSID, settings->ssid, settings->ssid_len); 5154 ssid_le.SSID_len = cpu_to_le32((u32)settings->ssid_len); 5155 } 5156 5157 if (!mbss) { 5158 brcmf_set_mpc(ifp, 0); 5159 brcmf_configure_arp_nd_offload(ifp, false); 5160 } 5161 5162 /* Parameters shared by all radio interfaces */ 5163 if (!mbss) { 5164 if ((supports_11d) && (is_11d != ifp->vif->is_11d)) { 5165 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_REGULATORY, 5166 is_11d); 5167 if (err < 0) { 5168 bphy_err(drvr, "Regulatory Set Error, %d\n", 5169 err); 5170 goto exit; 5171 } 5172 } 5173 if (settings->beacon_interval) { 5174 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_BCNPRD, 5175 settings->beacon_interval); 5176 if (err < 0) { 5177 bphy_err(drvr, "Beacon Interval Set Error, %d\n", 5178 err); 5179 goto exit; 5180 } 5181 } 5182 if (settings->dtim_period) { 5183 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_DTIMPRD, 5184 settings->dtim_period); 5185 if (err < 0) { 5186 bphy_err(drvr, "DTIM Interval Set Error, %d\n", 5187 err); 5188 goto exit; 5189 } 5190 } 5191 5192 if ((dev_role == NL80211_IFTYPE_AP) && 5193 ((ifp->ifidx == 0) || 5194 (!brcmf_feat_is_enabled(ifp, BRCMF_FEAT_RSDB) && 5195 !brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MCHAN)))) { 5196 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_DOWN, 1); 5197 if (err < 0) { 5198 bphy_err(drvr, "BRCMF_C_DOWN error %d\n", 5199 err); 5200 goto exit; 5201 } 5202 brcmf_fil_iovar_int_set(ifp, "apsta", 0); 5203 } 5204 5205 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_INFRA, 1); 5206 if (err < 0) { 5207 bphy_err(drvr, "SET INFRA error %d\n", err); 5208 goto exit; 5209 } 5210 } else if (WARN_ON(supports_11d && (is_11d != ifp->vif->is_11d))) { 5211 /* Multiple-BSS should use same 11d configuration */ 5212 err = -EINVAL; 5213 goto exit; 5214 } 5215 5216 /* Interface specific setup */ 5217 if (dev_role == NL80211_IFTYPE_AP) { 5218 if ((brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MBSS)) && (!mbss)) 5219 brcmf_fil_iovar_int_set(ifp, "mbss", 1); 5220 5221 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_AP, 1); 5222 if (err < 0) { 5223 bphy_err(drvr, "setting AP mode failed %d\n", 5224 err); 5225 goto exit; 5226 } 5227 if (!mbss) { 5228 /* Firmware 10.x requires setting channel after enabling 5229 * AP and before bringing interface up. 5230 */ 5231 err = brcmf_fil_iovar_int_set(ifp, "chanspec", chanspec); 5232 if (err < 0) { 5233 bphy_err(drvr, "Set Channel failed: chspec=%d, %d\n", 5234 chanspec, err); 5235 goto exit; 5236 } 5237 } 5238 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_UP, 1); 5239 if (err < 0) { 5240 bphy_err(drvr, "BRCMF_C_UP error (%d)\n", err); 5241 goto exit; 5242 } 5243 5244 if (crypto->psk) { 5245 brcmf_dbg(INFO, "using PSK offload\n"); 5246 profile->use_fwauth |= BIT(BRCMF_PROFILE_FWAUTH_PSK); 5247 err = brcmf_set_pmk(ifp, crypto->psk, 5248 BRCMF_WSEC_MAX_PSK_LEN); 5249 if (err < 0) 5250 goto exit; 5251 } 5252 if (crypto->sae_pwd) { 5253 brcmf_dbg(INFO, "using SAE offload\n"); 5254 profile->use_fwauth |= BIT(BRCMF_PROFILE_FWAUTH_SAE); 5255 err = brcmf_set_sae_password(ifp, crypto->sae_pwd, 5256 crypto->sae_pwd_len); 5257 if (err < 0) 5258 goto exit; 5259 } 5260 if (profile->use_fwauth == 0) 5261 profile->use_fwauth = BIT(BRCMF_PROFILE_FWAUTH_NONE); 5262 5263 err = brcmf_parse_configure_security(ifp, settings, 5264 NL80211_IFTYPE_AP); 5265 if (err < 0) { 5266 bphy_err(drvr, "brcmf_parse_configure_security error\n"); 5267 goto exit; 5268 } 5269 5270 /* On DOWN the firmware removes the WEP keys, reconfigure 5271 * them if they were set. 5272 */ 5273 brcmf_cfg80211_reconfigure_wep(ifp); 5274 5275 memset(&join_params, 0, sizeof(join_params)); 5276 /* join parameters starts with ssid */ 5277 memcpy(&join_params.ssid_le, &ssid_le, sizeof(ssid_le)); 5278 /* create softap */ 5279 err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_SSID, 5280 &join_params, sizeof(join_params)); 5281 if (err < 0) { 5282 bphy_err(drvr, "SET SSID error (%d)\n", err); 5283 goto exit; 5284 } 5285 5286 err = brcmf_fil_iovar_int_set(ifp, "closednet", 5287 settings->hidden_ssid); 5288 if (err) { 5289 bphy_err(drvr, "%s closednet error (%d)\n", 5290 settings->hidden_ssid ? 5291 "enabled" : "disabled", 5292 err); 5293 goto exit; 5294 } 5295 5296 brcmf_dbg(TRACE, "AP mode configuration complete\n"); 5297 } else if (dev_role == NL80211_IFTYPE_P2P_GO) { 5298 err = brcmf_fil_iovar_int_set(ifp, "chanspec", chanspec); 5299 if (err < 0) { 5300 bphy_err(drvr, "Set Channel failed: chspec=%d, %d\n", 5301 chanspec, err); 5302 goto exit; 5303 } 5304 5305 err = brcmf_parse_configure_security(ifp, settings, 5306 NL80211_IFTYPE_P2P_GO); 5307 if (err < 0) { 5308 brcmf_err("brcmf_parse_configure_security error\n"); 5309 goto exit; 5310 } 5311 5312 err = brcmf_fil_bsscfg_data_set(ifp, "ssid", &ssid_le, 5313 sizeof(ssid_le)); 5314 if (err < 0) { 5315 bphy_err(drvr, "setting ssid failed %d\n", err); 5316 goto exit; 5317 } 5318 bss_enable.bsscfgidx = cpu_to_le32(ifp->bsscfgidx); 5319 bss_enable.enable = cpu_to_le32(1); 5320 err = brcmf_fil_iovar_data_set(ifp, "bss", &bss_enable, 5321 sizeof(bss_enable)); 5322 if (err < 0) { 5323 bphy_err(drvr, "bss_enable config failed %d\n", err); 5324 goto exit; 5325 } 5326 5327 brcmf_dbg(TRACE, "GO mode configuration complete\n"); 5328 } else { 5329 WARN_ON(1); 5330 } 5331 5332 brcmf_config_ap_mgmt_ie(ifp->vif, &settings->beacon); 5333 set_bit(BRCMF_VIF_STATUS_AP_CREATED, &ifp->vif->sme_state); 5334 brcmf_net_setcarrier(ifp, true); 5335 5336 exit: 5337 if ((err) && (!mbss)) { 5338 brcmf_set_mpc(ifp, 1); 5339 brcmf_configure_arp_nd_offload(ifp, true); 5340 } 5341 return err; 5342 } 5343 5344 static int brcmf_cfg80211_stop_ap(struct wiphy *wiphy, struct net_device *ndev, 5345 unsigned int link_id) 5346 { 5347 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 5348 struct brcmf_if *ifp = netdev_priv(ndev); 5349 struct brcmf_pub *drvr = cfg->pub; 5350 struct brcmf_cfg80211_profile *profile = &ifp->vif->profile; 5351 s32 err; 5352 struct brcmf_fil_bss_enable_le bss_enable; 5353 struct brcmf_join_params join_params; 5354 5355 brcmf_dbg(TRACE, "Enter\n"); 5356 5357 if (ifp->vif->wdev.iftype == NL80211_IFTYPE_AP) { 5358 /* Due to most likely deauths outstanding we sleep */ 5359 /* first to make sure they get processed by fw. */ 5360 msleep(400); 5361 5362 if (profile->use_fwauth != BIT(BRCMF_PROFILE_FWAUTH_NONE)) { 5363 if (profile->use_fwauth & BIT(BRCMF_PROFILE_FWAUTH_PSK)) 5364 brcmf_set_pmk(ifp, NULL, 0); 5365 if (profile->use_fwauth & BIT(BRCMF_PROFILE_FWAUTH_SAE)) 5366 brcmf_set_sae_password(ifp, NULL, 0); 5367 profile->use_fwauth = BIT(BRCMF_PROFILE_FWAUTH_NONE); 5368 } 5369 5370 if (ifp->vif->mbss) { 5371 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_DOWN, 1); 5372 return err; 5373 } 5374 5375 /* First BSS doesn't get a full reset */ 5376 if (ifp->bsscfgidx == 0) 5377 brcmf_fil_iovar_int_set(ifp, "closednet", 0); 5378 5379 memset(&join_params, 0, sizeof(join_params)); 5380 err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_SSID, 5381 &join_params, sizeof(join_params)); 5382 if (err < 0) 5383 bphy_err(drvr, "SET SSID error (%d)\n", err); 5384 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_DOWN, 1); 5385 if (err < 0) 5386 bphy_err(drvr, "BRCMF_C_DOWN error %d\n", err); 5387 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_AP, 0); 5388 if (err < 0) 5389 bphy_err(drvr, "setting AP mode failed %d\n", err); 5390 if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MBSS)) 5391 brcmf_fil_iovar_int_set(ifp, "mbss", 0); 5392 brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_REGULATORY, 5393 ifp->vif->is_11d); 5394 /* Bring device back up so it can be used again */ 5395 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_UP, 1); 5396 if (err < 0) 5397 bphy_err(drvr, "BRCMF_C_UP error %d\n", err); 5398 5399 brcmf_vif_clear_mgmt_ies(ifp->vif); 5400 } else { 5401 bss_enable.bsscfgidx = cpu_to_le32(ifp->bsscfgidx); 5402 bss_enable.enable = cpu_to_le32(0); 5403 err = brcmf_fil_iovar_data_set(ifp, "bss", &bss_enable, 5404 sizeof(bss_enable)); 5405 if (err < 0) 5406 bphy_err(drvr, "bss_enable config failed %d\n", err); 5407 } 5408 brcmf_set_mpc(ifp, 1); 5409 brcmf_configure_arp_nd_offload(ifp, true); 5410 clear_bit(BRCMF_VIF_STATUS_AP_CREATED, &ifp->vif->sme_state); 5411 brcmf_net_setcarrier(ifp, false); 5412 5413 return err; 5414 } 5415 5416 static s32 5417 brcmf_cfg80211_change_beacon(struct wiphy *wiphy, struct net_device *ndev, 5418 struct cfg80211_ap_update *info) 5419 { 5420 struct brcmf_if *ifp = netdev_priv(ndev); 5421 5422 brcmf_dbg(TRACE, "Enter\n"); 5423 5424 return brcmf_config_ap_mgmt_ie(ifp->vif, &info->beacon); 5425 } 5426 5427 static int 5428 brcmf_cfg80211_del_station(struct wiphy *wiphy, struct net_device *ndev, 5429 struct station_del_parameters *params) 5430 { 5431 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 5432 struct brcmf_pub *drvr = cfg->pub; 5433 struct brcmf_scb_val_le scbval; 5434 struct brcmf_if *ifp = netdev_priv(ndev); 5435 s32 err; 5436 5437 if (!params->mac) 5438 return -EFAULT; 5439 5440 brcmf_dbg(TRACE, "Enter %pM\n", params->mac); 5441 5442 if (ifp->vif == cfg->p2p.bss_idx[P2PAPI_BSSCFG_DEVICE].vif) 5443 ifp = cfg->p2p.bss_idx[P2PAPI_BSSCFG_PRIMARY].vif->ifp; 5444 if (!check_vif_up(ifp->vif)) 5445 return -EIO; 5446 5447 memcpy(&scbval.ea, params->mac, ETH_ALEN); 5448 scbval.val = cpu_to_le32(params->reason_code); 5449 err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SCB_DEAUTHENTICATE_FOR_REASON, 5450 &scbval, sizeof(scbval)); 5451 if (err) 5452 bphy_err(drvr, "SCB_DEAUTHENTICATE_FOR_REASON failed %d\n", 5453 err); 5454 5455 brcmf_dbg(TRACE, "Exit\n"); 5456 return err; 5457 } 5458 5459 static int 5460 brcmf_cfg80211_change_station(struct wiphy *wiphy, struct net_device *ndev, 5461 const u8 *mac, struct station_parameters *params) 5462 { 5463 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 5464 struct brcmf_pub *drvr = cfg->pub; 5465 struct brcmf_if *ifp = netdev_priv(ndev); 5466 s32 err; 5467 5468 brcmf_dbg(TRACE, "Enter, MAC %pM, mask 0x%04x set 0x%04x\n", mac, 5469 params->sta_flags_mask, params->sta_flags_set); 5470 5471 /* Ignore all 00 MAC */ 5472 if (is_zero_ether_addr(mac)) 5473 return 0; 5474 5475 if (!(params->sta_flags_mask & BIT(NL80211_STA_FLAG_AUTHORIZED))) 5476 return 0; 5477 5478 if (params->sta_flags_set & BIT(NL80211_STA_FLAG_AUTHORIZED)) 5479 err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_SCB_AUTHORIZE, 5480 (void *)mac, ETH_ALEN); 5481 else 5482 err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_SCB_DEAUTHORIZE, 5483 (void *)mac, ETH_ALEN); 5484 if (err < 0) 5485 bphy_err(drvr, "Setting SCB (de-)authorize failed, %d\n", err); 5486 5487 return err; 5488 } 5489 5490 static void 5491 brcmf_cfg80211_update_mgmt_frame_registrations(struct wiphy *wiphy, 5492 struct wireless_dev *wdev, 5493 struct mgmt_frame_regs *upd) 5494 { 5495 struct brcmf_cfg80211_vif *vif; 5496 5497 vif = container_of(wdev, struct brcmf_cfg80211_vif, wdev); 5498 5499 vif->mgmt_rx_reg = upd->interface_stypes; 5500 } 5501 5502 5503 static int 5504 brcmf_cfg80211_mgmt_tx(struct wiphy *wiphy, struct wireless_dev *wdev, 5505 struct cfg80211_mgmt_tx_params *params, u64 *cookie) 5506 { 5507 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 5508 struct ieee80211_channel *chan = params->chan; 5509 struct brcmf_pub *drvr = cfg->pub; 5510 const u8 *buf = params->buf; 5511 size_t len = params->len; 5512 const struct ieee80211_mgmt *mgmt; 5513 struct brcmf_cfg80211_vif *vif; 5514 s32 err = 0; 5515 s32 ie_offset; 5516 s32 ie_len; 5517 struct brcmf_fil_action_frame_le *action_frame; 5518 struct brcmf_fil_af_params_le *af_params; 5519 bool ack; 5520 s32 chan_nr; 5521 u32 freq; 5522 5523 brcmf_dbg(TRACE, "Enter\n"); 5524 5525 *cookie = 0; 5526 5527 mgmt = (const struct ieee80211_mgmt *)buf; 5528 5529 if (!ieee80211_is_mgmt(mgmt->frame_control)) { 5530 bphy_err(drvr, "Driver only allows MGMT packet type\n"); 5531 return -EPERM; 5532 } 5533 5534 vif = container_of(wdev, struct brcmf_cfg80211_vif, wdev); 5535 5536 if (ieee80211_is_probe_resp(mgmt->frame_control)) { 5537 /* Right now the only reason to get a probe response */ 5538 /* is for p2p listen response or for p2p GO from */ 5539 /* wpa_supplicant. Unfortunately the probe is send */ 5540 /* on primary ndev, while dongle wants it on the p2p */ 5541 /* vif. Since this is only reason for a probe */ 5542 /* response to be sent, the vif is taken from cfg. */ 5543 /* If ever desired to send proberesp for non p2p */ 5544 /* response then data should be checked for */ 5545 /* "DIRECT-". Note in future supplicant will take */ 5546 /* dedicated p2p wdev to do this and then this 'hack'*/ 5547 /* is not needed anymore. */ 5548 ie_offset = DOT11_MGMT_HDR_LEN + 5549 DOT11_BCN_PRB_FIXED_LEN; 5550 ie_len = len - ie_offset; 5551 if (vif == cfg->p2p.bss_idx[P2PAPI_BSSCFG_PRIMARY].vif) 5552 vif = cfg->p2p.bss_idx[P2PAPI_BSSCFG_DEVICE].vif; 5553 err = brcmf_vif_set_mgmt_ie(vif, 5554 BRCMF_VNDR_IE_PRBRSP_FLAG, 5555 &buf[ie_offset], 5556 ie_len); 5557 cfg80211_mgmt_tx_status(wdev, *cookie, buf, len, true, 5558 GFP_KERNEL); 5559 } else if (ieee80211_is_action(mgmt->frame_control)) { 5560 if (len > BRCMF_FIL_ACTION_FRAME_SIZE + DOT11_MGMT_HDR_LEN) { 5561 bphy_err(drvr, "invalid action frame length\n"); 5562 err = -EINVAL; 5563 goto exit; 5564 } 5565 af_params = kzalloc(sizeof(*af_params), GFP_KERNEL); 5566 if (af_params == NULL) { 5567 bphy_err(drvr, "unable to allocate frame\n"); 5568 err = -ENOMEM; 5569 goto exit; 5570 } 5571 action_frame = &af_params->action_frame; 5572 /* Add the packet Id */ 5573 action_frame->packet_id = cpu_to_le32(*cookie); 5574 /* Add BSSID */ 5575 memcpy(&action_frame->da[0], &mgmt->da[0], ETH_ALEN); 5576 memcpy(&af_params->bssid[0], &mgmt->bssid[0], ETH_ALEN); 5577 /* Add the length exepted for 802.11 header */ 5578 action_frame->len = cpu_to_le16(len - DOT11_MGMT_HDR_LEN); 5579 /* Add the channel. Use the one specified as parameter if any or 5580 * the current one (got from the firmware) otherwise 5581 */ 5582 if (chan) 5583 freq = chan->center_freq; 5584 else 5585 brcmf_fil_cmd_int_get(vif->ifp, BRCMF_C_GET_CHANNEL, 5586 &freq); 5587 chan_nr = ieee80211_frequency_to_channel(freq); 5588 af_params->channel = cpu_to_le32(chan_nr); 5589 af_params->dwell_time = cpu_to_le32(params->wait); 5590 memcpy(action_frame->data, &buf[DOT11_MGMT_HDR_LEN], 5591 le16_to_cpu(action_frame->len)); 5592 5593 brcmf_dbg(TRACE, "Action frame, cookie=%lld, len=%d, freq=%d\n", 5594 *cookie, le16_to_cpu(action_frame->len), freq); 5595 5596 ack = brcmf_p2p_send_action_frame(cfg, cfg_to_ndev(cfg), 5597 af_params); 5598 5599 cfg80211_mgmt_tx_status(wdev, *cookie, buf, len, ack, 5600 GFP_KERNEL); 5601 kfree(af_params); 5602 } else { 5603 brcmf_dbg(TRACE, "Unhandled, fc=%04x!!\n", mgmt->frame_control); 5604 brcmf_dbg_hex_dump(true, buf, len, "payload, len=%zu\n", len); 5605 } 5606 5607 exit: 5608 return err; 5609 } 5610 5611 static int brcmf_cfg80211_set_cqm_rssi_range_config(struct wiphy *wiphy, 5612 struct net_device *ndev, 5613 s32 rssi_low, s32 rssi_high) 5614 { 5615 struct brcmf_cfg80211_vif *vif; 5616 struct brcmf_if *ifp; 5617 int err = 0; 5618 5619 brcmf_dbg(TRACE, "low=%d high=%d", rssi_low, rssi_high); 5620 5621 ifp = netdev_priv(ndev); 5622 vif = ifp->vif; 5623 5624 if (rssi_low != vif->cqm_rssi_low || rssi_high != vif->cqm_rssi_high) { 5625 /* The firmware will send an event when the RSSI is less than or 5626 * equal to a configured level and the previous RSSI event was 5627 * less than or equal to a different level. Set a third level 5628 * so that we also detect the transition from rssi <= rssi_high 5629 * to rssi > rssi_high. 5630 */ 5631 struct brcmf_rssi_event_le config = { 5632 .rate_limit_msec = cpu_to_le32(0), 5633 .rssi_level_num = 3, 5634 .rssi_levels = { 5635 clamp_val(rssi_low, S8_MIN, S8_MAX - 2), 5636 clamp_val(rssi_high, S8_MIN + 1, S8_MAX - 1), 5637 S8_MAX, 5638 }, 5639 }; 5640 5641 err = brcmf_fil_iovar_data_set(ifp, "rssi_event", &config, 5642 sizeof(config)); 5643 if (err) { 5644 err = -EINVAL; 5645 } else { 5646 vif->cqm_rssi_low = rssi_low; 5647 vif->cqm_rssi_high = rssi_high; 5648 } 5649 } 5650 5651 return err; 5652 } 5653 5654 static int 5655 brcmf_cfg80211_cancel_remain_on_channel(struct wiphy *wiphy, 5656 struct wireless_dev *wdev, 5657 u64 cookie) 5658 { 5659 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 5660 struct brcmf_pub *drvr = cfg->pub; 5661 struct brcmf_cfg80211_vif *vif; 5662 int err = 0; 5663 5664 brcmf_dbg(TRACE, "Enter p2p listen cancel\n"); 5665 5666 vif = cfg->p2p.bss_idx[P2PAPI_BSSCFG_DEVICE].vif; 5667 if (vif == NULL) { 5668 bphy_err(drvr, "No p2p device available for probe response\n"); 5669 err = -ENODEV; 5670 goto exit; 5671 } 5672 brcmf_p2p_cancel_remain_on_channel(vif->ifp); 5673 exit: 5674 return err; 5675 } 5676 5677 static int brcmf_cfg80211_get_channel(struct wiphy *wiphy, 5678 struct wireless_dev *wdev, 5679 unsigned int link_id, 5680 struct cfg80211_chan_def *chandef) 5681 { 5682 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 5683 struct net_device *ndev = wdev->netdev; 5684 struct brcmf_pub *drvr = cfg->pub; 5685 struct brcmu_chan ch; 5686 enum nl80211_band band = 0; 5687 enum nl80211_chan_width width = 0; 5688 u32 chanspec; 5689 int freq, err; 5690 5691 if (!ndev || drvr->bus_if->state != BRCMF_BUS_UP) 5692 return -ENODEV; 5693 5694 err = brcmf_fil_iovar_int_get(netdev_priv(ndev), "chanspec", &chanspec); 5695 if (err) { 5696 bphy_err(drvr, "chanspec failed (%d)\n", err); 5697 return err; 5698 } 5699 5700 ch.chspec = chanspec; 5701 cfg->d11inf.decchspec(&ch); 5702 5703 switch (ch.band) { 5704 case BRCMU_CHAN_BAND_2G: 5705 band = NL80211_BAND_2GHZ; 5706 break; 5707 case BRCMU_CHAN_BAND_5G: 5708 band = NL80211_BAND_5GHZ; 5709 break; 5710 } 5711 5712 switch (ch.bw) { 5713 case BRCMU_CHAN_BW_80: 5714 width = NL80211_CHAN_WIDTH_80; 5715 break; 5716 case BRCMU_CHAN_BW_40: 5717 width = NL80211_CHAN_WIDTH_40; 5718 break; 5719 case BRCMU_CHAN_BW_20: 5720 width = NL80211_CHAN_WIDTH_20; 5721 break; 5722 case BRCMU_CHAN_BW_80P80: 5723 width = NL80211_CHAN_WIDTH_80P80; 5724 break; 5725 case BRCMU_CHAN_BW_160: 5726 width = NL80211_CHAN_WIDTH_160; 5727 break; 5728 } 5729 5730 freq = ieee80211_channel_to_frequency(ch.control_ch_num, band); 5731 chandef->chan = ieee80211_get_channel(wiphy, freq); 5732 chandef->width = width; 5733 chandef->center_freq1 = ieee80211_channel_to_frequency(ch.chnum, band); 5734 chandef->center_freq2 = 0; 5735 5736 return 0; 5737 } 5738 5739 static int brcmf_cfg80211_crit_proto_start(struct wiphy *wiphy, 5740 struct wireless_dev *wdev, 5741 enum nl80211_crit_proto_id proto, 5742 u16 duration) 5743 { 5744 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 5745 struct brcmf_cfg80211_vif *vif; 5746 5747 vif = container_of(wdev, struct brcmf_cfg80211_vif, wdev); 5748 5749 /* only DHCP support for now */ 5750 if (proto != NL80211_CRIT_PROTO_DHCP) 5751 return -EINVAL; 5752 5753 /* suppress and abort scanning */ 5754 set_bit(BRCMF_SCAN_STATUS_SUPPRESS, &cfg->scan_status); 5755 brcmf_abort_scanning(cfg); 5756 5757 return brcmf_btcoex_set_mode(vif, BRCMF_BTCOEX_DISABLED, duration); 5758 } 5759 5760 static void brcmf_cfg80211_crit_proto_stop(struct wiphy *wiphy, 5761 struct wireless_dev *wdev) 5762 { 5763 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 5764 struct brcmf_cfg80211_vif *vif; 5765 5766 vif = container_of(wdev, struct brcmf_cfg80211_vif, wdev); 5767 5768 brcmf_btcoex_set_mode(vif, BRCMF_BTCOEX_ENABLED, 0); 5769 clear_bit(BRCMF_SCAN_STATUS_SUPPRESS, &cfg->scan_status); 5770 } 5771 5772 static s32 5773 brcmf_notify_tdls_peer_event(struct brcmf_if *ifp, 5774 const struct brcmf_event_msg *e, void *data) 5775 { 5776 switch (e->reason) { 5777 case BRCMF_E_REASON_TDLS_PEER_DISCOVERED: 5778 brcmf_dbg(TRACE, "TDLS Peer Discovered\n"); 5779 break; 5780 case BRCMF_E_REASON_TDLS_PEER_CONNECTED: 5781 brcmf_dbg(TRACE, "TDLS Peer Connected\n"); 5782 brcmf_proto_add_tdls_peer(ifp->drvr, ifp->ifidx, (u8 *)e->addr); 5783 break; 5784 case BRCMF_E_REASON_TDLS_PEER_DISCONNECTED: 5785 brcmf_dbg(TRACE, "TDLS Peer Disconnected\n"); 5786 brcmf_proto_delete_peer(ifp->drvr, ifp->ifidx, (u8 *)e->addr); 5787 break; 5788 } 5789 5790 return 0; 5791 } 5792 5793 static int brcmf_convert_nl80211_tdls_oper(enum nl80211_tdls_operation oper) 5794 { 5795 int ret; 5796 5797 switch (oper) { 5798 case NL80211_TDLS_DISCOVERY_REQ: 5799 ret = BRCMF_TDLS_MANUAL_EP_DISCOVERY; 5800 break; 5801 case NL80211_TDLS_SETUP: 5802 ret = BRCMF_TDLS_MANUAL_EP_CREATE; 5803 break; 5804 case NL80211_TDLS_TEARDOWN: 5805 ret = BRCMF_TDLS_MANUAL_EP_DELETE; 5806 break; 5807 default: 5808 brcmf_err("unsupported operation: %d\n", oper); 5809 ret = -EOPNOTSUPP; 5810 } 5811 return ret; 5812 } 5813 5814 static int brcmf_cfg80211_tdls_oper(struct wiphy *wiphy, 5815 struct net_device *ndev, const u8 *peer, 5816 enum nl80211_tdls_operation oper) 5817 { 5818 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 5819 struct brcmf_pub *drvr = cfg->pub; 5820 struct brcmf_if *ifp; 5821 struct brcmf_tdls_iovar_le info; 5822 int ret = 0; 5823 5824 ret = brcmf_convert_nl80211_tdls_oper(oper); 5825 if (ret < 0) 5826 return ret; 5827 5828 ifp = netdev_priv(ndev); 5829 memset(&info, 0, sizeof(info)); 5830 info.mode = (u8)ret; 5831 if (peer) 5832 memcpy(info.ea, peer, ETH_ALEN); 5833 5834 ret = brcmf_fil_iovar_data_set(ifp, "tdls_endpoint", 5835 &info, sizeof(info)); 5836 if (ret < 0) 5837 bphy_err(drvr, "tdls_endpoint iovar failed: ret=%d\n", ret); 5838 5839 return ret; 5840 } 5841 5842 static int 5843 brcmf_cfg80211_update_conn_params(struct wiphy *wiphy, 5844 struct net_device *ndev, 5845 struct cfg80211_connect_params *sme, 5846 u32 changed) 5847 { 5848 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 5849 struct brcmf_pub *drvr = cfg->pub; 5850 struct brcmf_if *ifp; 5851 int err; 5852 5853 if (!(changed & UPDATE_ASSOC_IES)) 5854 return 0; 5855 5856 ifp = netdev_priv(ndev); 5857 err = brcmf_vif_set_mgmt_ie(ifp->vif, BRCMF_VNDR_IE_ASSOCREQ_FLAG, 5858 sme->ie, sme->ie_len); 5859 if (err) 5860 bphy_err(drvr, "Set Assoc REQ IE Failed\n"); 5861 else 5862 brcmf_dbg(TRACE, "Applied Vndr IEs for Assoc request\n"); 5863 5864 return err; 5865 } 5866 5867 #ifdef CONFIG_PM 5868 static int 5869 brcmf_cfg80211_set_rekey_data(struct wiphy *wiphy, struct net_device *ndev, 5870 struct cfg80211_gtk_rekey_data *gtk) 5871 { 5872 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 5873 struct brcmf_pub *drvr = cfg->pub; 5874 struct brcmf_if *ifp = netdev_priv(ndev); 5875 struct brcmf_gtk_keyinfo_le gtk_le; 5876 int ret; 5877 5878 brcmf_dbg(TRACE, "Enter, bssidx=%d\n", ifp->bsscfgidx); 5879 5880 memcpy(gtk_le.kck, gtk->kck, sizeof(gtk_le.kck)); 5881 memcpy(gtk_le.kek, gtk->kek, sizeof(gtk_le.kek)); 5882 memcpy(gtk_le.replay_counter, gtk->replay_ctr, 5883 sizeof(gtk_le.replay_counter)); 5884 5885 ret = brcmf_fil_iovar_data_set(ifp, "gtk_key_info", >k_le, 5886 sizeof(gtk_le)); 5887 if (ret < 0) 5888 bphy_err(drvr, "gtk_key_info iovar failed: ret=%d\n", ret); 5889 5890 return ret; 5891 } 5892 #endif 5893 5894 static int brcmf_cfg80211_set_pmk(struct wiphy *wiphy, struct net_device *dev, 5895 const struct cfg80211_pmk_conf *conf) 5896 { 5897 struct brcmf_if *ifp; 5898 5899 brcmf_dbg(TRACE, "enter\n"); 5900 5901 /* expect using firmware supplicant for 1X */ 5902 ifp = netdev_priv(dev); 5903 if (WARN_ON(ifp->vif->profile.use_fwsup != BRCMF_PROFILE_FWSUP_1X)) 5904 return -EINVAL; 5905 5906 if (conf->pmk_len > BRCMF_WSEC_MAX_PSK_LEN) 5907 return -ERANGE; 5908 5909 return brcmf_set_pmk(ifp, conf->pmk, conf->pmk_len); 5910 } 5911 5912 static int brcmf_cfg80211_del_pmk(struct wiphy *wiphy, struct net_device *dev, 5913 const u8 *aa) 5914 { 5915 struct brcmf_if *ifp; 5916 5917 brcmf_dbg(TRACE, "enter\n"); 5918 ifp = netdev_priv(dev); 5919 if (WARN_ON(ifp->vif->profile.use_fwsup != BRCMF_PROFILE_FWSUP_1X)) 5920 return -EINVAL; 5921 5922 return brcmf_set_pmk(ifp, NULL, 0); 5923 } 5924 5925 static struct cfg80211_ops brcmf_cfg80211_ops = { 5926 .add_virtual_intf = brcmf_cfg80211_add_iface, 5927 .del_virtual_intf = brcmf_cfg80211_del_iface, 5928 .change_virtual_intf = brcmf_cfg80211_change_iface, 5929 .scan = brcmf_cfg80211_scan, 5930 .set_wiphy_params = brcmf_cfg80211_set_wiphy_params, 5931 .join_ibss = brcmf_cfg80211_join_ibss, 5932 .leave_ibss = brcmf_cfg80211_leave_ibss, 5933 .get_station = brcmf_cfg80211_get_station, 5934 .dump_station = brcmf_cfg80211_dump_station, 5935 .set_tx_power = brcmf_cfg80211_set_tx_power, 5936 .get_tx_power = brcmf_cfg80211_get_tx_power, 5937 .add_key = brcmf_cfg80211_add_key, 5938 .del_key = brcmf_cfg80211_del_key, 5939 .get_key = brcmf_cfg80211_get_key, 5940 .set_default_key = brcmf_cfg80211_config_default_key, 5941 .set_default_mgmt_key = brcmf_cfg80211_config_default_mgmt_key, 5942 .set_power_mgmt = brcmf_cfg80211_set_power_mgmt, 5943 .connect = brcmf_cfg80211_connect, 5944 .disconnect = brcmf_cfg80211_disconnect, 5945 .suspend = brcmf_cfg80211_suspend, 5946 .resume = brcmf_cfg80211_resume, 5947 .set_pmksa = brcmf_cfg80211_set_pmksa, 5948 .del_pmksa = brcmf_cfg80211_del_pmksa, 5949 .flush_pmksa = brcmf_cfg80211_flush_pmksa, 5950 .start_ap = brcmf_cfg80211_start_ap, 5951 .stop_ap = brcmf_cfg80211_stop_ap, 5952 .change_beacon = brcmf_cfg80211_change_beacon, 5953 .del_station = brcmf_cfg80211_del_station, 5954 .change_station = brcmf_cfg80211_change_station, 5955 .sched_scan_start = brcmf_cfg80211_sched_scan_start, 5956 .sched_scan_stop = brcmf_cfg80211_sched_scan_stop, 5957 .update_mgmt_frame_registrations = 5958 brcmf_cfg80211_update_mgmt_frame_registrations, 5959 .mgmt_tx = brcmf_cfg80211_mgmt_tx, 5960 .set_cqm_rssi_range_config = brcmf_cfg80211_set_cqm_rssi_range_config, 5961 .remain_on_channel = brcmf_p2p_remain_on_channel, 5962 .cancel_remain_on_channel = brcmf_cfg80211_cancel_remain_on_channel, 5963 .get_channel = brcmf_cfg80211_get_channel, 5964 .start_p2p_device = brcmf_p2p_start_device, 5965 .stop_p2p_device = brcmf_p2p_stop_device, 5966 .crit_proto_start = brcmf_cfg80211_crit_proto_start, 5967 .crit_proto_stop = brcmf_cfg80211_crit_proto_stop, 5968 .tdls_oper = brcmf_cfg80211_tdls_oper, 5969 .update_connect_params = brcmf_cfg80211_update_conn_params, 5970 .set_pmk = brcmf_cfg80211_set_pmk, 5971 .del_pmk = brcmf_cfg80211_del_pmk, 5972 }; 5973 5974 struct cfg80211_ops *brcmf_cfg80211_get_ops(struct brcmf_mp_device *settings) 5975 { 5976 struct cfg80211_ops *ops; 5977 5978 ops = kmemdup(&brcmf_cfg80211_ops, sizeof(brcmf_cfg80211_ops), 5979 GFP_KERNEL); 5980 5981 if (ops && settings->roamoff) 5982 ops->update_connect_params = NULL; 5983 5984 return ops; 5985 } 5986 5987 struct brcmf_cfg80211_vif *brcmf_alloc_vif(struct brcmf_cfg80211_info *cfg, 5988 enum nl80211_iftype type) 5989 { 5990 struct brcmf_cfg80211_vif *vif_walk; 5991 struct brcmf_cfg80211_vif *vif; 5992 bool mbss; 5993 struct brcmf_if *ifp = brcmf_get_ifp(cfg->pub, 0); 5994 5995 brcmf_dbg(TRACE, "allocating virtual interface (size=%zu)\n", 5996 sizeof(*vif)); 5997 vif = kzalloc(sizeof(*vif), GFP_KERNEL); 5998 if (!vif) 5999 return ERR_PTR(-ENOMEM); 6000 6001 vif->wdev.wiphy = cfg->wiphy; 6002 vif->wdev.iftype = type; 6003 6004 brcmf_init_prof(&vif->profile); 6005 6006 if (type == NL80211_IFTYPE_AP && 6007 brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MBSS)) { 6008 mbss = false; 6009 list_for_each_entry(vif_walk, &cfg->vif_list, list) { 6010 if (vif_walk->wdev.iftype == NL80211_IFTYPE_AP) { 6011 mbss = true; 6012 break; 6013 } 6014 } 6015 vif->mbss = mbss; 6016 } 6017 6018 list_add_tail(&vif->list, &cfg->vif_list); 6019 return vif; 6020 } 6021 6022 void brcmf_free_vif(struct brcmf_cfg80211_vif *vif) 6023 { 6024 list_del(&vif->list); 6025 kfree(vif); 6026 } 6027 6028 void brcmf_cfg80211_free_netdev(struct net_device *ndev) 6029 { 6030 struct brcmf_cfg80211_vif *vif; 6031 struct brcmf_if *ifp; 6032 6033 ifp = netdev_priv(ndev); 6034 vif = ifp->vif; 6035 6036 if (vif) 6037 brcmf_free_vif(vif); 6038 } 6039 6040 static bool brcmf_is_linkup(struct brcmf_cfg80211_vif *vif, 6041 const struct brcmf_event_msg *e) 6042 { 6043 u32 event = e->event_code; 6044 u32 status = e->status; 6045 6046 if ((vif->profile.use_fwsup == BRCMF_PROFILE_FWSUP_PSK || 6047 vif->profile.use_fwsup == BRCMF_PROFILE_FWSUP_SAE) && 6048 event == BRCMF_E_PSK_SUP && 6049 status == BRCMF_E_STATUS_FWSUP_COMPLETED) 6050 set_bit(BRCMF_VIF_STATUS_EAP_SUCCESS, &vif->sme_state); 6051 if (event == BRCMF_E_SET_SSID && status == BRCMF_E_STATUS_SUCCESS) { 6052 brcmf_dbg(CONN, "Processing set ssid\n"); 6053 memcpy(vif->profile.bssid, e->addr, ETH_ALEN); 6054 if (vif->profile.use_fwsup != BRCMF_PROFILE_FWSUP_PSK && 6055 vif->profile.use_fwsup != BRCMF_PROFILE_FWSUP_SAE) 6056 return true; 6057 6058 set_bit(BRCMF_VIF_STATUS_ASSOC_SUCCESS, &vif->sme_state); 6059 } 6060 6061 if (test_bit(BRCMF_VIF_STATUS_EAP_SUCCESS, &vif->sme_state) && 6062 test_bit(BRCMF_VIF_STATUS_ASSOC_SUCCESS, &vif->sme_state)) { 6063 clear_bit(BRCMF_VIF_STATUS_EAP_SUCCESS, &vif->sme_state); 6064 clear_bit(BRCMF_VIF_STATUS_ASSOC_SUCCESS, &vif->sme_state); 6065 return true; 6066 } 6067 return false; 6068 } 6069 6070 static bool brcmf_is_linkdown(struct brcmf_cfg80211_vif *vif, 6071 const struct brcmf_event_msg *e) 6072 { 6073 u32 event = e->event_code; 6074 u16 flags = e->flags; 6075 6076 if ((event == BRCMF_E_DEAUTH) || (event == BRCMF_E_DEAUTH_IND) || 6077 (event == BRCMF_E_DISASSOC_IND) || 6078 ((event == BRCMF_E_LINK) && (!(flags & BRCMF_EVENT_MSG_LINK)))) { 6079 brcmf_dbg(CONN, "Processing link down\n"); 6080 clear_bit(BRCMF_VIF_STATUS_EAP_SUCCESS, &vif->sme_state); 6081 clear_bit(BRCMF_VIF_STATUS_ASSOC_SUCCESS, &vif->sme_state); 6082 return true; 6083 } 6084 return false; 6085 } 6086 6087 static bool brcmf_is_nonetwork(struct brcmf_cfg80211_info *cfg, 6088 const struct brcmf_event_msg *e) 6089 { 6090 u32 event = e->event_code; 6091 u32 status = e->status; 6092 6093 if (event == BRCMF_E_LINK && status == BRCMF_E_STATUS_NO_NETWORKS) { 6094 brcmf_dbg(CONN, "Processing Link %s & no network found\n", 6095 e->flags & BRCMF_EVENT_MSG_LINK ? "up" : "down"); 6096 return true; 6097 } 6098 6099 if (event == BRCMF_E_SET_SSID && status != BRCMF_E_STATUS_SUCCESS) { 6100 brcmf_dbg(CONN, "Processing connecting & no network found\n"); 6101 return true; 6102 } 6103 6104 if (event == BRCMF_E_PSK_SUP && 6105 status != BRCMF_E_STATUS_FWSUP_COMPLETED) { 6106 brcmf_dbg(CONN, "Processing failed supplicant state: %u\n", 6107 status); 6108 return true; 6109 } 6110 6111 return false; 6112 } 6113 6114 static void brcmf_clear_assoc_ies(struct brcmf_cfg80211_info *cfg) 6115 { 6116 struct brcmf_cfg80211_connect_info *conn_info = cfg_to_conn(cfg); 6117 6118 kfree(conn_info->req_ie); 6119 conn_info->req_ie = NULL; 6120 conn_info->req_ie_len = 0; 6121 kfree(conn_info->resp_ie); 6122 conn_info->resp_ie = NULL; 6123 conn_info->resp_ie_len = 0; 6124 } 6125 6126 u8 brcmf_map_prio_to_prec(void *config, u8 prio) 6127 { 6128 struct brcmf_cfg80211_info *cfg = (struct brcmf_cfg80211_info *)config; 6129 6130 if (!cfg) 6131 return (prio == PRIO_8021D_NONE || prio == PRIO_8021D_BE) ? 6132 (prio ^ 2) : prio; 6133 6134 /* For those AC(s) with ACM flag set to 1, convert its 4-level priority 6135 * to an 8-level precedence which is the same as BE's 6136 */ 6137 if (prio > PRIO_8021D_EE && 6138 cfg->ac_priority[prio] == cfg->ac_priority[PRIO_8021D_BE]) 6139 return cfg->ac_priority[prio] * 2; 6140 6141 /* Conversion of 4-level priority to 8-level precedence */ 6142 if (prio == PRIO_8021D_BE || prio == PRIO_8021D_BK || 6143 prio == PRIO_8021D_CL || prio == PRIO_8021D_VO) 6144 return cfg->ac_priority[prio] * 2; 6145 else 6146 return cfg->ac_priority[prio] * 2 + 1; 6147 } 6148 6149 u8 brcmf_map_prio_to_aci(void *config, u8 prio) 6150 { 6151 /* Prio here refers to the 802.1d priority in range of 0 to 7. 6152 * ACI here refers to the WLAN AC Index in range of 0 to 3. 6153 * This function will return ACI corresponding to input prio. 6154 */ 6155 struct brcmf_cfg80211_info *cfg = (struct brcmf_cfg80211_info *)config; 6156 6157 if (cfg) 6158 return cfg->ac_priority[prio]; 6159 6160 return prio; 6161 } 6162 6163 static void brcmf_init_wmm_prio(u8 *priority) 6164 { 6165 /* Initialize AC priority array to default 6166 * 802.1d priority as per following table: 6167 * 802.1d prio 0,3 maps to BE 6168 * 802.1d prio 1,2 maps to BK 6169 * 802.1d prio 4,5 maps to VI 6170 * 802.1d prio 6,7 maps to VO 6171 */ 6172 priority[0] = BRCMF_FWS_FIFO_AC_BE; 6173 priority[3] = BRCMF_FWS_FIFO_AC_BE; 6174 priority[1] = BRCMF_FWS_FIFO_AC_BK; 6175 priority[2] = BRCMF_FWS_FIFO_AC_BK; 6176 priority[4] = BRCMF_FWS_FIFO_AC_VI; 6177 priority[5] = BRCMF_FWS_FIFO_AC_VI; 6178 priority[6] = BRCMF_FWS_FIFO_AC_VO; 6179 priority[7] = BRCMF_FWS_FIFO_AC_VO; 6180 } 6181 6182 static void brcmf_wifi_prioritize_acparams(const 6183 struct brcmf_cfg80211_edcf_acparam *acp, u8 *priority) 6184 { 6185 u8 aci; 6186 u8 aifsn; 6187 u8 ecwmin; 6188 u8 ecwmax; 6189 u8 acm; 6190 u8 ranking_basis[EDCF_AC_COUNT]; 6191 u8 aci_prio[EDCF_AC_COUNT]; /* AC_BE, AC_BK, AC_VI, AC_VO */ 6192 u8 index; 6193 6194 for (aci = 0; aci < EDCF_AC_COUNT; aci++, acp++) { 6195 aifsn = acp->ACI & EDCF_AIFSN_MASK; 6196 acm = (acp->ACI & EDCF_ACM_MASK) ? 1 : 0; 6197 ecwmin = acp->ECW & EDCF_ECWMIN_MASK; 6198 ecwmax = (acp->ECW & EDCF_ECWMAX_MASK) >> EDCF_ECWMAX_SHIFT; 6199 brcmf_dbg(CONN, "ACI %d aifsn %d acm %d ecwmin %d ecwmax %d\n", 6200 aci, aifsn, acm, ecwmin, ecwmax); 6201 /* Default AC_VO will be the lowest ranking value */ 6202 ranking_basis[aci] = aifsn + ecwmin + ecwmax; 6203 /* Initialise priority starting at 0 (AC_BE) */ 6204 aci_prio[aci] = 0; 6205 6206 /* If ACM is set, STA can't use this AC as per 802.11. 6207 * Change the ranking to BE 6208 */ 6209 if (aci != AC_BE && aci != AC_BK && acm == 1) 6210 ranking_basis[aci] = ranking_basis[AC_BE]; 6211 } 6212 6213 /* Ranking method which works for AC priority 6214 * swapping when values for cwmin, cwmax and aifsn are varied 6215 * Compare each aci_prio against each other aci_prio 6216 */ 6217 for (aci = 0; aci < EDCF_AC_COUNT; aci++) { 6218 for (index = 0; index < EDCF_AC_COUNT; index++) { 6219 if (index != aci) { 6220 /* Smaller ranking value has higher priority, 6221 * so increment priority for each ACI which has 6222 * a higher ranking value 6223 */ 6224 if (ranking_basis[aci] < ranking_basis[index]) 6225 aci_prio[aci]++; 6226 } 6227 } 6228 } 6229 6230 /* By now, aci_prio[] will be in range of 0 to 3. 6231 * Use ACI prio to get the new priority value for 6232 * each 802.1d traffic type, in this range. 6233 */ 6234 if (!(aci_prio[AC_BE] == aci_prio[AC_BK] && 6235 aci_prio[AC_BK] == aci_prio[AC_VI] && 6236 aci_prio[AC_VI] == aci_prio[AC_VO])) { 6237 /* 802.1d 0,3 maps to BE */ 6238 priority[0] = aci_prio[AC_BE]; 6239 priority[3] = aci_prio[AC_BE]; 6240 6241 /* 802.1d 1,2 maps to BK */ 6242 priority[1] = aci_prio[AC_BK]; 6243 priority[2] = aci_prio[AC_BK]; 6244 6245 /* 802.1d 4,5 maps to VO */ 6246 priority[4] = aci_prio[AC_VI]; 6247 priority[5] = aci_prio[AC_VI]; 6248 6249 /* 802.1d 6,7 maps to VO */ 6250 priority[6] = aci_prio[AC_VO]; 6251 priority[7] = aci_prio[AC_VO]; 6252 } else { 6253 /* Initialize to default priority */ 6254 brcmf_init_wmm_prio(priority); 6255 } 6256 6257 brcmf_dbg(CONN, "Adj prio BE 0->%d, BK 1->%d, BK 2->%d, BE 3->%d\n", 6258 priority[0], priority[1], priority[2], priority[3]); 6259 6260 brcmf_dbg(CONN, "Adj prio VI 4->%d, VI 5->%d, VO 6->%d, VO 7->%d\n", 6261 priority[4], priority[5], priority[6], priority[7]); 6262 } 6263 6264 static s32 brcmf_get_assoc_ies(struct brcmf_cfg80211_info *cfg, 6265 struct brcmf_if *ifp) 6266 { 6267 struct brcmf_pub *drvr = cfg->pub; 6268 struct brcmf_cfg80211_assoc_ielen_le *assoc_info; 6269 struct brcmf_cfg80211_connect_info *conn_info = cfg_to_conn(cfg); 6270 struct brcmf_cfg80211_edcf_acparam edcf_acparam_info[EDCF_AC_COUNT]; 6271 u32 req_len; 6272 u32 resp_len; 6273 s32 err = 0; 6274 6275 brcmf_clear_assoc_ies(cfg); 6276 6277 err = brcmf_fil_iovar_data_get(ifp, "assoc_info", 6278 cfg->extra_buf, WL_ASSOC_INFO_MAX); 6279 if (err) { 6280 bphy_err(drvr, "could not get assoc info (%d)\n", err); 6281 return err; 6282 } 6283 assoc_info = 6284 (struct brcmf_cfg80211_assoc_ielen_le *)cfg->extra_buf; 6285 req_len = le32_to_cpu(assoc_info->req_len); 6286 resp_len = le32_to_cpu(assoc_info->resp_len); 6287 if (req_len > WL_EXTRA_BUF_MAX || resp_len > WL_EXTRA_BUF_MAX) { 6288 bphy_err(drvr, "invalid lengths in assoc info: req %u resp %u\n", 6289 req_len, resp_len); 6290 return -EINVAL; 6291 } 6292 if (req_len) { 6293 err = brcmf_fil_iovar_data_get(ifp, "assoc_req_ies", 6294 cfg->extra_buf, 6295 WL_ASSOC_INFO_MAX); 6296 if (err) { 6297 bphy_err(drvr, "could not get assoc req (%d)\n", err); 6298 return err; 6299 } 6300 conn_info->req_ie_len = req_len; 6301 conn_info->req_ie = 6302 kmemdup(cfg->extra_buf, conn_info->req_ie_len, 6303 GFP_KERNEL); 6304 if (!conn_info->req_ie) 6305 conn_info->req_ie_len = 0; 6306 } else { 6307 conn_info->req_ie_len = 0; 6308 conn_info->req_ie = NULL; 6309 } 6310 if (resp_len) { 6311 err = brcmf_fil_iovar_data_get(ifp, "assoc_resp_ies", 6312 cfg->extra_buf, 6313 WL_ASSOC_INFO_MAX); 6314 if (err) { 6315 bphy_err(drvr, "could not get assoc resp (%d)\n", err); 6316 return err; 6317 } 6318 conn_info->resp_ie_len = resp_len; 6319 conn_info->resp_ie = 6320 kmemdup(cfg->extra_buf, conn_info->resp_ie_len, 6321 GFP_KERNEL); 6322 if (!conn_info->resp_ie) 6323 conn_info->resp_ie_len = 0; 6324 6325 err = brcmf_fil_iovar_data_get(ifp, "wme_ac_sta", 6326 edcf_acparam_info, 6327 sizeof(edcf_acparam_info)); 6328 if (err) { 6329 brcmf_err("could not get wme_ac_sta (%d)\n", err); 6330 return err; 6331 } 6332 6333 brcmf_wifi_prioritize_acparams(edcf_acparam_info, 6334 cfg->ac_priority); 6335 } else { 6336 conn_info->resp_ie_len = 0; 6337 conn_info->resp_ie = NULL; 6338 } 6339 brcmf_dbg(CONN, "req len (%d) resp len (%d)\n", 6340 conn_info->req_ie_len, conn_info->resp_ie_len); 6341 6342 return err; 6343 } 6344 6345 static s32 6346 brcmf_bss_roaming_done(struct brcmf_cfg80211_info *cfg, 6347 struct net_device *ndev, 6348 const struct brcmf_event_msg *e) 6349 { 6350 struct brcmf_if *ifp = netdev_priv(ndev); 6351 struct brcmf_cfg80211_profile *profile = &ifp->vif->profile; 6352 struct brcmf_cfg80211_connect_info *conn_info = cfg_to_conn(cfg); 6353 struct wiphy *wiphy = cfg_to_wiphy(cfg); 6354 struct ieee80211_channel *notify_channel = NULL; 6355 struct ieee80211_supported_band *band; 6356 struct brcmf_bss_info_le *bi; 6357 struct brcmu_chan ch; 6358 struct cfg80211_roam_info roam_info = {}; 6359 u32 freq; 6360 s32 err = 0; 6361 u8 *buf; 6362 6363 brcmf_dbg(TRACE, "Enter\n"); 6364 6365 brcmf_get_assoc_ies(cfg, ifp); 6366 memcpy(profile->bssid, e->addr, ETH_ALEN); 6367 brcmf_update_bss_info(cfg, ifp); 6368 6369 buf = kzalloc(WL_BSS_INFO_MAX, GFP_KERNEL); 6370 if (buf == NULL) { 6371 err = -ENOMEM; 6372 goto done; 6373 } 6374 6375 /* data sent to dongle has to be little endian */ 6376 *(__le32 *)buf = cpu_to_le32(WL_BSS_INFO_MAX); 6377 err = brcmf_fil_cmd_data_get(ifp, BRCMF_C_GET_BSS_INFO, 6378 buf, WL_BSS_INFO_MAX); 6379 6380 if (err) 6381 goto done; 6382 6383 bi = (struct brcmf_bss_info_le *)(buf + 4); 6384 ch.chspec = le16_to_cpu(bi->chanspec); 6385 cfg->d11inf.decchspec(&ch); 6386 6387 if (ch.band == BRCMU_CHAN_BAND_2G) 6388 band = wiphy->bands[NL80211_BAND_2GHZ]; 6389 else 6390 band = wiphy->bands[NL80211_BAND_5GHZ]; 6391 6392 freq = ieee80211_channel_to_frequency(ch.control_ch_num, band->band); 6393 notify_channel = ieee80211_get_channel(wiphy, freq); 6394 6395 done: 6396 kfree(buf); 6397 6398 roam_info.links[0].channel = notify_channel; 6399 roam_info.links[0].bssid = profile->bssid; 6400 roam_info.req_ie = conn_info->req_ie; 6401 roam_info.req_ie_len = conn_info->req_ie_len; 6402 roam_info.resp_ie = conn_info->resp_ie; 6403 roam_info.resp_ie_len = conn_info->resp_ie_len; 6404 6405 cfg80211_roamed(ndev, &roam_info, GFP_KERNEL); 6406 brcmf_dbg(CONN, "Report roaming result\n"); 6407 6408 if (profile->use_fwsup == BRCMF_PROFILE_FWSUP_1X && profile->is_ft) { 6409 cfg80211_port_authorized(ndev, profile->bssid, NULL, 0, GFP_KERNEL); 6410 brcmf_dbg(CONN, "Report port authorized\n"); 6411 } 6412 6413 set_bit(BRCMF_VIF_STATUS_CONNECTED, &ifp->vif->sme_state); 6414 brcmf_dbg(TRACE, "Exit\n"); 6415 return err; 6416 } 6417 6418 static s32 6419 brcmf_bss_connect_done(struct brcmf_cfg80211_info *cfg, 6420 struct net_device *ndev, const struct brcmf_event_msg *e, 6421 bool completed) 6422 { 6423 struct brcmf_if *ifp = netdev_priv(ndev); 6424 struct brcmf_cfg80211_profile *profile = &ifp->vif->profile; 6425 struct brcmf_cfg80211_connect_info *conn_info = cfg_to_conn(cfg); 6426 struct cfg80211_connect_resp_params conn_params; 6427 6428 brcmf_dbg(TRACE, "Enter\n"); 6429 6430 if (test_and_clear_bit(BRCMF_VIF_STATUS_CONNECTING, 6431 &ifp->vif->sme_state)) { 6432 memset(&conn_params, 0, sizeof(conn_params)); 6433 if (completed) { 6434 brcmf_get_assoc_ies(cfg, ifp); 6435 brcmf_update_bss_info(cfg, ifp); 6436 set_bit(BRCMF_VIF_STATUS_CONNECTED, 6437 &ifp->vif->sme_state); 6438 conn_params.status = WLAN_STATUS_SUCCESS; 6439 } else { 6440 clear_bit(BRCMF_VIF_STATUS_EAP_SUCCESS, 6441 &ifp->vif->sme_state); 6442 clear_bit(BRCMF_VIF_STATUS_ASSOC_SUCCESS, 6443 &ifp->vif->sme_state); 6444 conn_params.status = WLAN_STATUS_AUTH_TIMEOUT; 6445 } 6446 conn_params.links[0].bssid = profile->bssid; 6447 conn_params.req_ie = conn_info->req_ie; 6448 conn_params.req_ie_len = conn_info->req_ie_len; 6449 conn_params.resp_ie = conn_info->resp_ie; 6450 conn_params.resp_ie_len = conn_info->resp_ie_len; 6451 cfg80211_connect_done(ndev, &conn_params, GFP_KERNEL); 6452 brcmf_dbg(CONN, "Report connect result - connection %s\n", 6453 completed ? "succeeded" : "failed"); 6454 } 6455 brcmf_dbg(TRACE, "Exit\n"); 6456 return 0; 6457 } 6458 6459 static s32 6460 brcmf_notify_connect_status_ap(struct brcmf_cfg80211_info *cfg, 6461 struct net_device *ndev, 6462 const struct brcmf_event_msg *e, void *data) 6463 { 6464 struct brcmf_pub *drvr = cfg->pub; 6465 static int generation; 6466 u32 event = e->event_code; 6467 u32 reason = e->reason; 6468 struct station_info *sinfo; 6469 6470 brcmf_dbg(CONN, "event %s (%u), reason %d\n", 6471 brcmf_fweh_event_name(event), event, reason); 6472 if (event == BRCMF_E_LINK && reason == BRCMF_E_REASON_LINK_BSSCFG_DIS && 6473 ndev != cfg_to_ndev(cfg)) { 6474 brcmf_dbg(CONN, "AP mode link down\n"); 6475 complete(&cfg->vif_disabled); 6476 return 0; 6477 } 6478 6479 if (((event == BRCMF_E_ASSOC_IND) || (event == BRCMF_E_REASSOC_IND)) && 6480 (reason == BRCMF_E_STATUS_SUCCESS)) { 6481 if (!data) { 6482 bphy_err(drvr, "No IEs present in ASSOC/REASSOC_IND\n"); 6483 return -EINVAL; 6484 } 6485 6486 sinfo = kzalloc(sizeof(*sinfo), GFP_KERNEL); 6487 if (!sinfo) 6488 return -ENOMEM; 6489 6490 sinfo->assoc_req_ies = data; 6491 sinfo->assoc_req_ies_len = e->datalen; 6492 generation++; 6493 sinfo->generation = generation; 6494 cfg80211_new_sta(ndev, e->addr, sinfo, GFP_KERNEL); 6495 6496 kfree(sinfo); 6497 } else if ((event == BRCMF_E_DISASSOC_IND) || 6498 (event == BRCMF_E_DEAUTH_IND) || 6499 (event == BRCMF_E_DEAUTH)) { 6500 cfg80211_del_sta(ndev, e->addr, GFP_KERNEL); 6501 } 6502 return 0; 6503 } 6504 6505 static s32 6506 brcmf_notify_connect_status(struct brcmf_if *ifp, 6507 const struct brcmf_event_msg *e, void *data) 6508 { 6509 struct brcmf_cfg80211_info *cfg = ifp->drvr->config; 6510 struct net_device *ndev = ifp->ndev; 6511 struct brcmf_cfg80211_profile *profile = &ifp->vif->profile; 6512 struct ieee80211_channel *chan; 6513 s32 err = 0; 6514 6515 if ((e->event_code == BRCMF_E_DEAUTH) || 6516 (e->event_code == BRCMF_E_DEAUTH_IND) || 6517 (e->event_code == BRCMF_E_DISASSOC_IND) || 6518 ((e->event_code == BRCMF_E_LINK) && (!e->flags))) { 6519 brcmf_proto_delete_peer(ifp->drvr, ifp->ifidx, (u8 *)e->addr); 6520 } 6521 6522 if (brcmf_is_apmode(ifp->vif)) { 6523 err = brcmf_notify_connect_status_ap(cfg, ndev, e, data); 6524 } else if (brcmf_is_linkup(ifp->vif, e)) { 6525 brcmf_dbg(CONN, "Linkup\n"); 6526 if (brcmf_is_ibssmode(ifp->vif)) { 6527 brcmf_inform_ibss(cfg, ndev, e->addr); 6528 chan = ieee80211_get_channel(cfg->wiphy, cfg->channel); 6529 memcpy(profile->bssid, e->addr, ETH_ALEN); 6530 cfg80211_ibss_joined(ndev, e->addr, chan, GFP_KERNEL); 6531 clear_bit(BRCMF_VIF_STATUS_CONNECTING, 6532 &ifp->vif->sme_state); 6533 set_bit(BRCMF_VIF_STATUS_CONNECTED, 6534 &ifp->vif->sme_state); 6535 } else 6536 brcmf_bss_connect_done(cfg, ndev, e, true); 6537 brcmf_net_setcarrier(ifp, true); 6538 } else if (brcmf_is_linkdown(ifp->vif, e)) { 6539 brcmf_dbg(CONN, "Linkdown\n"); 6540 if (!brcmf_is_ibssmode(ifp->vif) && 6541 (test_bit(BRCMF_VIF_STATUS_CONNECTED, 6542 &ifp->vif->sme_state) || 6543 test_bit(BRCMF_VIF_STATUS_CONNECTING, 6544 &ifp->vif->sme_state))) { 6545 if (test_bit(BRCMF_VIF_STATUS_CONNECTED, 6546 &ifp->vif->sme_state) && 6547 memcmp(profile->bssid, e->addr, ETH_ALEN)) 6548 return err; 6549 6550 brcmf_bss_connect_done(cfg, ndev, e, false); 6551 brcmf_link_down(ifp->vif, 6552 brcmf_map_fw_linkdown_reason(e), 6553 e->event_code & 6554 (BRCMF_E_DEAUTH_IND | 6555 BRCMF_E_DISASSOC_IND) 6556 ? false : true); 6557 brcmf_init_prof(ndev_to_prof(ndev)); 6558 if (ndev != cfg_to_ndev(cfg)) 6559 complete(&cfg->vif_disabled); 6560 brcmf_net_setcarrier(ifp, false); 6561 } 6562 } else if (brcmf_is_nonetwork(cfg, e)) { 6563 if (brcmf_is_ibssmode(ifp->vif)) 6564 clear_bit(BRCMF_VIF_STATUS_CONNECTING, 6565 &ifp->vif->sme_state); 6566 else 6567 brcmf_bss_connect_done(cfg, ndev, e, false); 6568 } 6569 6570 return err; 6571 } 6572 6573 static s32 6574 brcmf_notify_roaming_status(struct brcmf_if *ifp, 6575 const struct brcmf_event_msg *e, void *data) 6576 { 6577 struct brcmf_cfg80211_info *cfg = ifp->drvr->config; 6578 u32 event = e->event_code; 6579 u32 status = e->status; 6580 6581 if (event == BRCMF_E_ROAM && status == BRCMF_E_STATUS_SUCCESS) { 6582 if (test_bit(BRCMF_VIF_STATUS_CONNECTED, 6583 &ifp->vif->sme_state)) { 6584 brcmf_bss_roaming_done(cfg, ifp->ndev, e); 6585 } else { 6586 brcmf_bss_connect_done(cfg, ifp->ndev, e, true); 6587 brcmf_net_setcarrier(ifp, true); 6588 } 6589 } 6590 6591 return 0; 6592 } 6593 6594 static s32 6595 brcmf_notify_mic_status(struct brcmf_if *ifp, 6596 const struct brcmf_event_msg *e, void *data) 6597 { 6598 u16 flags = e->flags; 6599 enum nl80211_key_type key_type; 6600 6601 if (flags & BRCMF_EVENT_MSG_GROUP) 6602 key_type = NL80211_KEYTYPE_GROUP; 6603 else 6604 key_type = NL80211_KEYTYPE_PAIRWISE; 6605 6606 cfg80211_michael_mic_failure(ifp->ndev, (u8 *)&e->addr, key_type, -1, 6607 NULL, GFP_KERNEL); 6608 6609 return 0; 6610 } 6611 6612 static s32 brcmf_notify_rssi(struct brcmf_if *ifp, 6613 const struct brcmf_event_msg *e, void *data) 6614 { 6615 struct brcmf_cfg80211_vif *vif = ifp->vif; 6616 struct brcmf_rssi_be *info = data; 6617 s32 rssi, snr = 0, noise = 0; 6618 s32 low, high, last; 6619 6620 if (e->datalen >= sizeof(*info)) { 6621 rssi = be32_to_cpu(info->rssi); 6622 snr = be32_to_cpu(info->snr); 6623 noise = be32_to_cpu(info->noise); 6624 } else if (e->datalen >= sizeof(rssi)) { 6625 rssi = be32_to_cpu(*(__be32 *)data); 6626 } else { 6627 brcmf_err("insufficient RSSI event data\n"); 6628 return 0; 6629 } 6630 6631 low = vif->cqm_rssi_low; 6632 high = vif->cqm_rssi_high; 6633 last = vif->cqm_rssi_last; 6634 6635 brcmf_dbg(TRACE, "rssi=%d snr=%d noise=%d low=%d high=%d last=%d\n", 6636 rssi, snr, noise, low, high, last); 6637 6638 vif->cqm_rssi_last = rssi; 6639 6640 if (rssi <= low || rssi == 0) { 6641 brcmf_dbg(INFO, "LOW rssi=%d\n", rssi); 6642 cfg80211_cqm_rssi_notify(ifp->ndev, 6643 NL80211_CQM_RSSI_THRESHOLD_EVENT_LOW, 6644 rssi, GFP_KERNEL); 6645 } else if (rssi > high) { 6646 brcmf_dbg(INFO, "HIGH rssi=%d\n", rssi); 6647 cfg80211_cqm_rssi_notify(ifp->ndev, 6648 NL80211_CQM_RSSI_THRESHOLD_EVENT_HIGH, 6649 rssi, GFP_KERNEL); 6650 } 6651 6652 return 0; 6653 } 6654 6655 static s32 brcmf_notify_vif_event(struct brcmf_if *ifp, 6656 const struct brcmf_event_msg *e, void *data) 6657 { 6658 struct brcmf_cfg80211_info *cfg = ifp->drvr->config; 6659 struct brcmf_if_event *ifevent = (struct brcmf_if_event *)data; 6660 struct brcmf_cfg80211_vif_event *event = &cfg->vif_event; 6661 struct brcmf_cfg80211_vif *vif; 6662 6663 brcmf_dbg(TRACE, "Enter: action %u flags %u ifidx %u bsscfgidx %u\n", 6664 ifevent->action, ifevent->flags, ifevent->ifidx, 6665 ifevent->bsscfgidx); 6666 6667 spin_lock(&event->vif_event_lock); 6668 event->action = ifevent->action; 6669 vif = event->vif; 6670 6671 switch (ifevent->action) { 6672 case BRCMF_E_IF_ADD: 6673 /* waiting process may have timed out */ 6674 if (!cfg->vif_event.vif) { 6675 spin_unlock(&event->vif_event_lock); 6676 return -EBADF; 6677 } 6678 6679 ifp->vif = vif; 6680 vif->ifp = ifp; 6681 if (ifp->ndev) { 6682 vif->wdev.netdev = ifp->ndev; 6683 ifp->ndev->ieee80211_ptr = &vif->wdev; 6684 SET_NETDEV_DEV(ifp->ndev, wiphy_dev(cfg->wiphy)); 6685 } 6686 spin_unlock(&event->vif_event_lock); 6687 wake_up(&event->vif_wq); 6688 return 0; 6689 6690 case BRCMF_E_IF_DEL: 6691 spin_unlock(&event->vif_event_lock); 6692 /* event may not be upon user request */ 6693 if (brcmf_cfg80211_vif_event_armed(cfg)) 6694 wake_up(&event->vif_wq); 6695 return 0; 6696 6697 case BRCMF_E_IF_CHANGE: 6698 spin_unlock(&event->vif_event_lock); 6699 wake_up(&event->vif_wq); 6700 return 0; 6701 6702 default: 6703 spin_unlock(&event->vif_event_lock); 6704 break; 6705 } 6706 return -EINVAL; 6707 } 6708 6709 static void brcmf_init_conf(struct brcmf_cfg80211_conf *conf) 6710 { 6711 conf->frag_threshold = (u32)-1; 6712 conf->rts_threshold = (u32)-1; 6713 conf->retry_short = (u32)-1; 6714 conf->retry_long = (u32)-1; 6715 } 6716 6717 static void brcmf_register_event_handlers(struct brcmf_cfg80211_info *cfg) 6718 { 6719 brcmf_fweh_register(cfg->pub, BRCMF_E_LINK, 6720 brcmf_notify_connect_status); 6721 brcmf_fweh_register(cfg->pub, BRCMF_E_DEAUTH_IND, 6722 brcmf_notify_connect_status); 6723 brcmf_fweh_register(cfg->pub, BRCMF_E_DEAUTH, 6724 brcmf_notify_connect_status); 6725 brcmf_fweh_register(cfg->pub, BRCMF_E_DISASSOC_IND, 6726 brcmf_notify_connect_status); 6727 brcmf_fweh_register(cfg->pub, BRCMF_E_ASSOC_IND, 6728 brcmf_notify_connect_status); 6729 brcmf_fweh_register(cfg->pub, BRCMF_E_REASSOC_IND, 6730 brcmf_notify_connect_status); 6731 brcmf_fweh_register(cfg->pub, BRCMF_E_ROAM, 6732 brcmf_notify_roaming_status); 6733 brcmf_fweh_register(cfg->pub, BRCMF_E_MIC_ERROR, 6734 brcmf_notify_mic_status); 6735 brcmf_fweh_register(cfg->pub, BRCMF_E_SET_SSID, 6736 brcmf_notify_connect_status); 6737 brcmf_fweh_register(cfg->pub, BRCMF_E_PFN_NET_FOUND, 6738 brcmf_notify_sched_scan_results); 6739 brcmf_fweh_register(cfg->pub, BRCMF_E_IF, 6740 brcmf_notify_vif_event); 6741 brcmf_fweh_register(cfg->pub, BRCMF_E_P2P_PROBEREQ_MSG, 6742 brcmf_p2p_notify_rx_mgmt_p2p_probereq); 6743 brcmf_fweh_register(cfg->pub, BRCMF_E_P2P_DISC_LISTEN_COMPLETE, 6744 brcmf_p2p_notify_listen_complete); 6745 brcmf_fweh_register(cfg->pub, BRCMF_E_ACTION_FRAME_RX, 6746 brcmf_p2p_notify_action_frame_rx); 6747 brcmf_fweh_register(cfg->pub, BRCMF_E_ACTION_FRAME_COMPLETE, 6748 brcmf_p2p_notify_action_tx_complete); 6749 brcmf_fweh_register(cfg->pub, BRCMF_E_ACTION_FRAME_OFF_CHAN_COMPLETE, 6750 brcmf_p2p_notify_action_tx_complete); 6751 brcmf_fweh_register(cfg->pub, BRCMF_E_PSK_SUP, 6752 brcmf_notify_connect_status); 6753 brcmf_fweh_register(cfg->pub, BRCMF_E_RSSI, brcmf_notify_rssi); 6754 } 6755 6756 static void brcmf_deinit_priv_mem(struct brcmf_cfg80211_info *cfg) 6757 { 6758 kfree(cfg->conf); 6759 cfg->conf = NULL; 6760 kfree(cfg->extra_buf); 6761 cfg->extra_buf = NULL; 6762 kfree(cfg->wowl.nd); 6763 cfg->wowl.nd = NULL; 6764 kfree(cfg->wowl.nd_info); 6765 cfg->wowl.nd_info = NULL; 6766 kfree(cfg->escan_info.escan_buf); 6767 cfg->escan_info.escan_buf = NULL; 6768 } 6769 6770 static s32 brcmf_init_priv_mem(struct brcmf_cfg80211_info *cfg) 6771 { 6772 cfg->conf = kzalloc(sizeof(*cfg->conf), GFP_KERNEL); 6773 if (!cfg->conf) 6774 goto init_priv_mem_out; 6775 cfg->extra_buf = kzalloc(WL_EXTRA_BUF_MAX, GFP_KERNEL); 6776 if (!cfg->extra_buf) 6777 goto init_priv_mem_out; 6778 cfg->wowl.nd = kzalloc(sizeof(*cfg->wowl.nd) + sizeof(u32), GFP_KERNEL); 6779 if (!cfg->wowl.nd) 6780 goto init_priv_mem_out; 6781 cfg->wowl.nd_info = kzalloc(sizeof(*cfg->wowl.nd_info) + 6782 sizeof(struct cfg80211_wowlan_nd_match *), 6783 GFP_KERNEL); 6784 if (!cfg->wowl.nd_info) 6785 goto init_priv_mem_out; 6786 cfg->escan_info.escan_buf = kzalloc(BRCMF_ESCAN_BUF_SIZE, GFP_KERNEL); 6787 if (!cfg->escan_info.escan_buf) 6788 goto init_priv_mem_out; 6789 6790 return 0; 6791 6792 init_priv_mem_out: 6793 brcmf_deinit_priv_mem(cfg); 6794 6795 return -ENOMEM; 6796 } 6797 6798 static s32 wl_init_priv(struct brcmf_cfg80211_info *cfg) 6799 { 6800 s32 err = 0; 6801 6802 cfg->scan_request = NULL; 6803 cfg->pwr_save = true; 6804 cfg->dongle_up = false; /* dongle is not up yet */ 6805 err = brcmf_init_priv_mem(cfg); 6806 if (err) 6807 return err; 6808 brcmf_register_event_handlers(cfg); 6809 mutex_init(&cfg->usr_sync); 6810 brcmf_init_escan(cfg); 6811 brcmf_init_conf(cfg->conf); 6812 brcmf_init_wmm_prio(cfg->ac_priority); 6813 init_completion(&cfg->vif_disabled); 6814 return err; 6815 } 6816 6817 static void wl_deinit_priv(struct brcmf_cfg80211_info *cfg) 6818 { 6819 cfg->dongle_up = false; /* dongle down */ 6820 brcmf_abort_scanning(cfg); 6821 brcmf_deinit_priv_mem(cfg); 6822 brcmf_clear_assoc_ies(cfg); 6823 } 6824 6825 static void init_vif_event(struct brcmf_cfg80211_vif_event *event) 6826 { 6827 init_waitqueue_head(&event->vif_wq); 6828 spin_lock_init(&event->vif_event_lock); 6829 } 6830 6831 static s32 brcmf_dongle_roam(struct brcmf_if *ifp) 6832 { 6833 struct brcmf_pub *drvr = ifp->drvr; 6834 s32 err; 6835 u32 bcn_timeout; 6836 __le32 roamtrigger[2]; 6837 __le32 roam_delta[2]; 6838 6839 /* Configure beacon timeout value based upon roaming setting */ 6840 if (ifp->drvr->settings->roamoff) 6841 bcn_timeout = BRCMF_DEFAULT_BCN_TIMEOUT_ROAM_OFF; 6842 else 6843 bcn_timeout = BRCMF_DEFAULT_BCN_TIMEOUT_ROAM_ON; 6844 err = brcmf_fil_iovar_int_set(ifp, "bcn_timeout", bcn_timeout); 6845 if (err) { 6846 bphy_err(drvr, "bcn_timeout error (%d)\n", err); 6847 goto roam_setup_done; 6848 } 6849 6850 /* Enable/Disable built-in roaming to allow supplicant to take care of 6851 * roaming. 6852 */ 6853 brcmf_dbg(INFO, "Internal Roaming = %s\n", 6854 ifp->drvr->settings->roamoff ? "Off" : "On"); 6855 err = brcmf_fil_iovar_int_set(ifp, "roam_off", 6856 ifp->drvr->settings->roamoff); 6857 if (err) { 6858 bphy_err(drvr, "roam_off error (%d)\n", err); 6859 goto roam_setup_done; 6860 } 6861 6862 roamtrigger[0] = cpu_to_le32(WL_ROAM_TRIGGER_LEVEL); 6863 roamtrigger[1] = cpu_to_le32(BRCM_BAND_ALL); 6864 err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_ROAM_TRIGGER, 6865 (void *)roamtrigger, sizeof(roamtrigger)); 6866 if (err) 6867 bphy_err(drvr, "WLC_SET_ROAM_TRIGGER error (%d)\n", err); 6868 6869 roam_delta[0] = cpu_to_le32(WL_ROAM_DELTA); 6870 roam_delta[1] = cpu_to_le32(BRCM_BAND_ALL); 6871 err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_ROAM_DELTA, 6872 (void *)roam_delta, sizeof(roam_delta)); 6873 if (err) 6874 bphy_err(drvr, "WLC_SET_ROAM_DELTA error (%d)\n", err); 6875 6876 return 0; 6877 6878 roam_setup_done: 6879 return err; 6880 } 6881 6882 static s32 6883 brcmf_dongle_scantime(struct brcmf_if *ifp) 6884 { 6885 struct brcmf_pub *drvr = ifp->drvr; 6886 s32 err = 0; 6887 6888 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_SCAN_CHANNEL_TIME, 6889 BRCMF_SCAN_CHANNEL_TIME); 6890 if (err) { 6891 bphy_err(drvr, "Scan assoc time error (%d)\n", err); 6892 goto dongle_scantime_out; 6893 } 6894 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_SCAN_UNASSOC_TIME, 6895 BRCMF_SCAN_UNASSOC_TIME); 6896 if (err) { 6897 bphy_err(drvr, "Scan unassoc time error (%d)\n", err); 6898 goto dongle_scantime_out; 6899 } 6900 6901 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_SCAN_PASSIVE_TIME, 6902 BRCMF_SCAN_PASSIVE_TIME); 6903 if (err) { 6904 bphy_err(drvr, "Scan passive time error (%d)\n", err); 6905 goto dongle_scantime_out; 6906 } 6907 6908 dongle_scantime_out: 6909 return err; 6910 } 6911 6912 static void brcmf_update_bw40_channel_flag(struct ieee80211_channel *channel, 6913 struct brcmu_chan *ch) 6914 { 6915 u32 ht40_flag; 6916 6917 ht40_flag = channel->flags & IEEE80211_CHAN_NO_HT40; 6918 if (ch->sb == BRCMU_CHAN_SB_U) { 6919 if (ht40_flag == IEEE80211_CHAN_NO_HT40) 6920 channel->flags &= ~IEEE80211_CHAN_NO_HT40; 6921 channel->flags |= IEEE80211_CHAN_NO_HT40PLUS; 6922 } else { 6923 /* It should be one of 6924 * IEEE80211_CHAN_NO_HT40 or 6925 * IEEE80211_CHAN_NO_HT40PLUS 6926 */ 6927 channel->flags &= ~IEEE80211_CHAN_NO_HT40; 6928 if (ht40_flag == IEEE80211_CHAN_NO_HT40) 6929 channel->flags |= IEEE80211_CHAN_NO_HT40MINUS; 6930 } 6931 } 6932 6933 static int brcmf_construct_chaninfo(struct brcmf_cfg80211_info *cfg, 6934 u32 bw_cap[]) 6935 { 6936 struct wiphy *wiphy = cfg_to_wiphy(cfg); 6937 struct brcmf_pub *drvr = cfg->pub; 6938 struct brcmf_if *ifp = brcmf_get_ifp(drvr, 0); 6939 struct ieee80211_supported_band *band; 6940 struct ieee80211_channel *channel; 6941 struct brcmf_chanspec_list *list; 6942 struct brcmu_chan ch; 6943 int err; 6944 u8 *pbuf; 6945 u32 i, j; 6946 u32 total; 6947 u32 chaninfo; 6948 6949 pbuf = kzalloc(BRCMF_DCMD_MEDLEN, GFP_KERNEL); 6950 6951 if (pbuf == NULL) 6952 return -ENOMEM; 6953 6954 list = (struct brcmf_chanspec_list *)pbuf; 6955 6956 err = brcmf_fil_iovar_data_get(ifp, "chanspecs", pbuf, 6957 BRCMF_DCMD_MEDLEN); 6958 if (err) { 6959 bphy_err(drvr, "get chanspecs error (%d)\n", err); 6960 goto fail_pbuf; 6961 } 6962 6963 band = wiphy->bands[NL80211_BAND_2GHZ]; 6964 if (band) 6965 for (i = 0; i < band->n_channels; i++) 6966 band->channels[i].flags = IEEE80211_CHAN_DISABLED; 6967 band = wiphy->bands[NL80211_BAND_5GHZ]; 6968 if (band) 6969 for (i = 0; i < band->n_channels; i++) 6970 band->channels[i].flags = IEEE80211_CHAN_DISABLED; 6971 6972 total = le32_to_cpu(list->count); 6973 if (total > BRCMF_MAX_CHANSPEC_LIST) { 6974 bphy_err(drvr, "Invalid count of channel Spec. (%u)\n", 6975 total); 6976 err = -EINVAL; 6977 goto fail_pbuf; 6978 } 6979 6980 for (i = 0; i < total; i++) { 6981 ch.chspec = (u16)le32_to_cpu(list->element[i]); 6982 cfg->d11inf.decchspec(&ch); 6983 6984 if (ch.band == BRCMU_CHAN_BAND_2G) { 6985 band = wiphy->bands[NL80211_BAND_2GHZ]; 6986 } else if (ch.band == BRCMU_CHAN_BAND_5G) { 6987 band = wiphy->bands[NL80211_BAND_5GHZ]; 6988 } else { 6989 bphy_err(drvr, "Invalid channel Spec. 0x%x.\n", 6990 ch.chspec); 6991 continue; 6992 } 6993 if (!band) 6994 continue; 6995 if (!(bw_cap[band->band] & WLC_BW_40MHZ_BIT) && 6996 ch.bw == BRCMU_CHAN_BW_40) 6997 continue; 6998 if (!(bw_cap[band->band] & WLC_BW_80MHZ_BIT) && 6999 ch.bw == BRCMU_CHAN_BW_80) 7000 continue; 7001 7002 channel = NULL; 7003 for (j = 0; j < band->n_channels; j++) { 7004 if (band->channels[j].hw_value == ch.control_ch_num) { 7005 channel = &band->channels[j]; 7006 break; 7007 } 7008 } 7009 if (!channel) { 7010 /* It seems firmware supports some channel we never 7011 * considered. Something new in IEEE standard? 7012 */ 7013 bphy_err(drvr, "Ignoring unexpected firmware channel %d\n", 7014 ch.control_ch_num); 7015 continue; 7016 } 7017 7018 if (channel->orig_flags & IEEE80211_CHAN_DISABLED) 7019 continue; 7020 7021 /* assuming the chanspecs order is HT20, 7022 * HT40 upper, HT40 lower, and VHT80. 7023 */ 7024 switch (ch.bw) { 7025 case BRCMU_CHAN_BW_160: 7026 channel->flags &= ~IEEE80211_CHAN_NO_160MHZ; 7027 break; 7028 case BRCMU_CHAN_BW_80: 7029 channel->flags &= ~IEEE80211_CHAN_NO_80MHZ; 7030 break; 7031 case BRCMU_CHAN_BW_40: 7032 brcmf_update_bw40_channel_flag(channel, &ch); 7033 break; 7034 default: 7035 wiphy_warn(wiphy, "Firmware reported unsupported bandwidth %d\n", 7036 ch.bw); 7037 fallthrough; 7038 case BRCMU_CHAN_BW_20: 7039 /* enable the channel and disable other bandwidths 7040 * for now as mentioned order assure they are enabled 7041 * for subsequent chanspecs. 7042 */ 7043 channel->flags = IEEE80211_CHAN_NO_HT40 | 7044 IEEE80211_CHAN_NO_80MHZ | 7045 IEEE80211_CHAN_NO_160MHZ; 7046 ch.bw = BRCMU_CHAN_BW_20; 7047 cfg->d11inf.encchspec(&ch); 7048 chaninfo = ch.chspec; 7049 err = brcmf_fil_bsscfg_int_get(ifp, "per_chan_info", 7050 &chaninfo); 7051 if (!err) { 7052 if (chaninfo & WL_CHAN_RADAR) 7053 channel->flags |= 7054 (IEEE80211_CHAN_RADAR | 7055 IEEE80211_CHAN_NO_IR); 7056 if (chaninfo & WL_CHAN_PASSIVE) 7057 channel->flags |= 7058 IEEE80211_CHAN_NO_IR; 7059 } 7060 } 7061 } 7062 7063 fail_pbuf: 7064 kfree(pbuf); 7065 return err; 7066 } 7067 7068 static int brcmf_enable_bw40_2g(struct brcmf_cfg80211_info *cfg) 7069 { 7070 struct brcmf_pub *drvr = cfg->pub; 7071 struct brcmf_if *ifp = brcmf_get_ifp(drvr, 0); 7072 struct ieee80211_supported_band *band; 7073 struct brcmf_fil_bwcap_le band_bwcap; 7074 struct brcmf_chanspec_list *list; 7075 u8 *pbuf; 7076 u32 val; 7077 int err; 7078 struct brcmu_chan ch; 7079 u32 num_chan; 7080 int i, j; 7081 7082 /* verify support for bw_cap command */ 7083 val = WLC_BAND_5G; 7084 err = brcmf_fil_iovar_int_get(ifp, "bw_cap", &val); 7085 7086 if (!err) { 7087 /* only set 2G bandwidth using bw_cap command */ 7088 band_bwcap.band = cpu_to_le32(WLC_BAND_2G); 7089 band_bwcap.bw_cap = cpu_to_le32(WLC_BW_CAP_40MHZ); 7090 err = brcmf_fil_iovar_data_set(ifp, "bw_cap", &band_bwcap, 7091 sizeof(band_bwcap)); 7092 } else { 7093 brcmf_dbg(INFO, "fallback to mimo_bw_cap\n"); 7094 val = WLC_N_BW_40ALL; 7095 err = brcmf_fil_iovar_int_set(ifp, "mimo_bw_cap", val); 7096 } 7097 7098 if (!err) { 7099 /* update channel info in 2G band */ 7100 pbuf = kzalloc(BRCMF_DCMD_MEDLEN, GFP_KERNEL); 7101 7102 if (pbuf == NULL) 7103 return -ENOMEM; 7104 7105 ch.band = BRCMU_CHAN_BAND_2G; 7106 ch.bw = BRCMU_CHAN_BW_40; 7107 ch.sb = BRCMU_CHAN_SB_NONE; 7108 ch.chnum = 0; 7109 cfg->d11inf.encchspec(&ch); 7110 7111 /* pass encoded chanspec in query */ 7112 *(__le16 *)pbuf = cpu_to_le16(ch.chspec); 7113 7114 err = brcmf_fil_iovar_data_get(ifp, "chanspecs", pbuf, 7115 BRCMF_DCMD_MEDLEN); 7116 if (err) { 7117 bphy_err(drvr, "get chanspecs error (%d)\n", err); 7118 kfree(pbuf); 7119 return err; 7120 } 7121 7122 band = cfg_to_wiphy(cfg)->bands[NL80211_BAND_2GHZ]; 7123 list = (struct brcmf_chanspec_list *)pbuf; 7124 num_chan = le32_to_cpu(list->count); 7125 if (num_chan > BRCMF_MAX_CHANSPEC_LIST) { 7126 bphy_err(drvr, "Invalid count of channel Spec. (%u)\n", 7127 num_chan); 7128 kfree(pbuf); 7129 return -EINVAL; 7130 } 7131 7132 for (i = 0; i < num_chan; i++) { 7133 ch.chspec = (u16)le32_to_cpu(list->element[i]); 7134 cfg->d11inf.decchspec(&ch); 7135 if (WARN_ON(ch.band != BRCMU_CHAN_BAND_2G)) 7136 continue; 7137 if (WARN_ON(ch.bw != BRCMU_CHAN_BW_40)) 7138 continue; 7139 for (j = 0; j < band->n_channels; j++) { 7140 if (band->channels[j].hw_value == ch.control_ch_num) 7141 break; 7142 } 7143 if (WARN_ON(j == band->n_channels)) 7144 continue; 7145 7146 brcmf_update_bw40_channel_flag(&band->channels[j], &ch); 7147 } 7148 kfree(pbuf); 7149 } 7150 return err; 7151 } 7152 7153 static void brcmf_get_bwcap(struct brcmf_if *ifp, u32 bw_cap[]) 7154 { 7155 struct brcmf_pub *drvr = ifp->drvr; 7156 u32 band, mimo_bwcap; 7157 int err; 7158 7159 band = WLC_BAND_2G; 7160 err = brcmf_fil_iovar_int_get(ifp, "bw_cap", &band); 7161 if (!err) { 7162 bw_cap[NL80211_BAND_2GHZ] = band; 7163 band = WLC_BAND_5G; 7164 err = brcmf_fil_iovar_int_get(ifp, "bw_cap", &band); 7165 if (!err) { 7166 bw_cap[NL80211_BAND_5GHZ] = band; 7167 return; 7168 } 7169 WARN_ON(1); 7170 return; 7171 } 7172 brcmf_dbg(INFO, "fallback to mimo_bw_cap info\n"); 7173 mimo_bwcap = 0; 7174 err = brcmf_fil_iovar_int_get(ifp, "mimo_bw_cap", &mimo_bwcap); 7175 if (err) 7176 /* assume 20MHz if firmware does not give a clue */ 7177 mimo_bwcap = WLC_N_BW_20ALL; 7178 7179 switch (mimo_bwcap) { 7180 case WLC_N_BW_40ALL: 7181 bw_cap[NL80211_BAND_2GHZ] |= WLC_BW_40MHZ_BIT; 7182 fallthrough; 7183 case WLC_N_BW_20IN2G_40IN5G: 7184 bw_cap[NL80211_BAND_5GHZ] |= WLC_BW_40MHZ_BIT; 7185 fallthrough; 7186 case WLC_N_BW_20ALL: 7187 bw_cap[NL80211_BAND_2GHZ] |= WLC_BW_20MHZ_BIT; 7188 bw_cap[NL80211_BAND_5GHZ] |= WLC_BW_20MHZ_BIT; 7189 break; 7190 default: 7191 bphy_err(drvr, "invalid mimo_bw_cap value\n"); 7192 } 7193 } 7194 7195 static void brcmf_update_ht_cap(struct ieee80211_supported_band *band, 7196 u32 bw_cap[2], u32 nchain) 7197 { 7198 band->ht_cap.ht_supported = true; 7199 if (bw_cap[band->band] & WLC_BW_40MHZ_BIT) { 7200 band->ht_cap.cap |= IEEE80211_HT_CAP_SGI_40; 7201 band->ht_cap.cap |= IEEE80211_HT_CAP_SUP_WIDTH_20_40; 7202 } 7203 band->ht_cap.cap |= IEEE80211_HT_CAP_SGI_20; 7204 band->ht_cap.cap |= IEEE80211_HT_CAP_DSSSCCK40; 7205 band->ht_cap.ampdu_factor = IEEE80211_HT_MAX_AMPDU_64K; 7206 band->ht_cap.ampdu_density = IEEE80211_HT_MPDU_DENSITY_16; 7207 memset(band->ht_cap.mcs.rx_mask, 0xff, nchain); 7208 band->ht_cap.mcs.tx_params = IEEE80211_HT_MCS_TX_DEFINED; 7209 } 7210 7211 static __le16 brcmf_get_mcs_map(u32 nchain, enum ieee80211_vht_mcs_support supp) 7212 { 7213 u16 mcs_map; 7214 int i; 7215 7216 for (i = 0, mcs_map = 0xFFFF; i < nchain; i++) 7217 mcs_map = (mcs_map << 2) | supp; 7218 7219 return cpu_to_le16(mcs_map); 7220 } 7221 7222 static void brcmf_update_vht_cap(struct ieee80211_supported_band *band, 7223 u32 bw_cap[2], u32 nchain, u32 txstreams, 7224 u32 txbf_bfe_cap, u32 txbf_bfr_cap) 7225 { 7226 __le16 mcs_map; 7227 7228 /* not allowed in 2.4G band */ 7229 if (band->band == NL80211_BAND_2GHZ) 7230 return; 7231 7232 band->vht_cap.vht_supported = true; 7233 /* 80MHz is mandatory */ 7234 band->vht_cap.cap |= IEEE80211_VHT_CAP_SHORT_GI_80; 7235 if (bw_cap[band->band] & WLC_BW_160MHZ_BIT) { 7236 band->vht_cap.cap |= IEEE80211_VHT_CAP_SUPP_CHAN_WIDTH_160MHZ; 7237 band->vht_cap.cap |= IEEE80211_VHT_CAP_SHORT_GI_160; 7238 } 7239 /* all support 256-QAM */ 7240 mcs_map = brcmf_get_mcs_map(nchain, IEEE80211_VHT_MCS_SUPPORT_0_9); 7241 band->vht_cap.vht_mcs.rx_mcs_map = mcs_map; 7242 band->vht_cap.vht_mcs.tx_mcs_map = mcs_map; 7243 7244 /* Beamforming support information */ 7245 if (txbf_bfe_cap & BRCMF_TXBF_SU_BFE_CAP) 7246 band->vht_cap.cap |= IEEE80211_VHT_CAP_SU_BEAMFORMEE_CAPABLE; 7247 if (txbf_bfe_cap & BRCMF_TXBF_MU_BFE_CAP) 7248 band->vht_cap.cap |= IEEE80211_VHT_CAP_MU_BEAMFORMEE_CAPABLE; 7249 if (txbf_bfr_cap & BRCMF_TXBF_SU_BFR_CAP) 7250 band->vht_cap.cap |= IEEE80211_VHT_CAP_SU_BEAMFORMER_CAPABLE; 7251 if (txbf_bfr_cap & BRCMF_TXBF_MU_BFR_CAP) 7252 band->vht_cap.cap |= IEEE80211_VHT_CAP_MU_BEAMFORMER_CAPABLE; 7253 7254 if ((txbf_bfe_cap || txbf_bfr_cap) && (txstreams > 1)) { 7255 band->vht_cap.cap |= 7256 (2 << IEEE80211_VHT_CAP_BEAMFORMEE_STS_SHIFT); 7257 band->vht_cap.cap |= ((txstreams - 1) << 7258 IEEE80211_VHT_CAP_SOUNDING_DIMENSIONS_SHIFT); 7259 band->vht_cap.cap |= 7260 IEEE80211_VHT_CAP_VHT_LINK_ADAPTATION_VHT_MRQ_MFB; 7261 } 7262 } 7263 7264 static int brcmf_setup_wiphybands(struct brcmf_cfg80211_info *cfg) 7265 { 7266 struct brcmf_pub *drvr = cfg->pub; 7267 struct brcmf_if *ifp = brcmf_get_ifp(drvr, 0); 7268 struct wiphy *wiphy = cfg_to_wiphy(cfg); 7269 u32 nmode = 0; 7270 u32 vhtmode = 0; 7271 u32 bw_cap[2] = { WLC_BW_20MHZ_BIT, WLC_BW_20MHZ_BIT }; 7272 u32 rxchain; 7273 u32 nchain; 7274 int err; 7275 s32 i; 7276 struct ieee80211_supported_band *band; 7277 u32 txstreams = 0; 7278 u32 txbf_bfe_cap = 0; 7279 u32 txbf_bfr_cap = 0; 7280 7281 (void)brcmf_fil_iovar_int_get(ifp, "vhtmode", &vhtmode); 7282 err = brcmf_fil_iovar_int_get(ifp, "nmode", &nmode); 7283 if (err) { 7284 bphy_err(drvr, "nmode error (%d)\n", err); 7285 } else { 7286 brcmf_get_bwcap(ifp, bw_cap); 7287 } 7288 brcmf_dbg(INFO, "nmode=%d, vhtmode=%d, bw_cap=(%d, %d)\n", 7289 nmode, vhtmode, bw_cap[NL80211_BAND_2GHZ], 7290 bw_cap[NL80211_BAND_5GHZ]); 7291 7292 err = brcmf_fil_iovar_int_get(ifp, "rxchain", &rxchain); 7293 if (err) { 7294 /* rxchain unsupported by firmware of older chips */ 7295 if (err == -EBADE) 7296 bphy_info_once(drvr, "rxchain unsupported\n"); 7297 else 7298 bphy_err(drvr, "rxchain error (%d)\n", err); 7299 7300 nchain = 1; 7301 } else { 7302 for (nchain = 0; rxchain; nchain++) 7303 rxchain = rxchain & (rxchain - 1); 7304 } 7305 brcmf_dbg(INFO, "nchain=%d\n", nchain); 7306 7307 err = brcmf_construct_chaninfo(cfg, bw_cap); 7308 if (err) { 7309 bphy_err(drvr, "brcmf_construct_chaninfo failed (%d)\n", err); 7310 return err; 7311 } 7312 7313 if (vhtmode) { 7314 (void)brcmf_fil_iovar_int_get(ifp, "txstreams", &txstreams); 7315 (void)brcmf_fil_iovar_int_get(ifp, "txbf_bfe_cap", 7316 &txbf_bfe_cap); 7317 (void)brcmf_fil_iovar_int_get(ifp, "txbf_bfr_cap", 7318 &txbf_bfr_cap); 7319 } 7320 7321 for (i = 0; i < ARRAY_SIZE(wiphy->bands); i++) { 7322 band = wiphy->bands[i]; 7323 if (band == NULL) 7324 continue; 7325 7326 if (nmode) 7327 brcmf_update_ht_cap(band, bw_cap, nchain); 7328 if (vhtmode) 7329 brcmf_update_vht_cap(band, bw_cap, nchain, txstreams, 7330 txbf_bfe_cap, txbf_bfr_cap); 7331 } 7332 7333 return 0; 7334 } 7335 7336 static const struct ieee80211_txrx_stypes 7337 brcmf_txrx_stypes[NUM_NL80211_IFTYPES] = { 7338 [NL80211_IFTYPE_STATION] = { 7339 .tx = 0xffff, 7340 .rx = BIT(IEEE80211_STYPE_ACTION >> 4) | 7341 BIT(IEEE80211_STYPE_PROBE_REQ >> 4) 7342 }, 7343 [NL80211_IFTYPE_P2P_CLIENT] = { 7344 .tx = 0xffff, 7345 .rx = BIT(IEEE80211_STYPE_ACTION >> 4) | 7346 BIT(IEEE80211_STYPE_PROBE_REQ >> 4) 7347 }, 7348 [NL80211_IFTYPE_P2P_GO] = { 7349 .tx = 0xffff, 7350 .rx = BIT(IEEE80211_STYPE_ASSOC_REQ >> 4) | 7351 BIT(IEEE80211_STYPE_REASSOC_REQ >> 4) | 7352 BIT(IEEE80211_STYPE_PROBE_REQ >> 4) | 7353 BIT(IEEE80211_STYPE_DISASSOC >> 4) | 7354 BIT(IEEE80211_STYPE_AUTH >> 4) | 7355 BIT(IEEE80211_STYPE_DEAUTH >> 4) | 7356 BIT(IEEE80211_STYPE_ACTION >> 4) 7357 }, 7358 [NL80211_IFTYPE_P2P_DEVICE] = { 7359 .tx = 0xffff, 7360 .rx = BIT(IEEE80211_STYPE_ACTION >> 4) | 7361 BIT(IEEE80211_STYPE_PROBE_REQ >> 4) 7362 }, 7363 [NL80211_IFTYPE_AP] = { 7364 .tx = 0xffff, 7365 .rx = BIT(IEEE80211_STYPE_ASSOC_REQ >> 4) | 7366 BIT(IEEE80211_STYPE_REASSOC_REQ >> 4) | 7367 BIT(IEEE80211_STYPE_PROBE_REQ >> 4) | 7368 BIT(IEEE80211_STYPE_DISASSOC >> 4) | 7369 BIT(IEEE80211_STYPE_AUTH >> 4) | 7370 BIT(IEEE80211_STYPE_DEAUTH >> 4) | 7371 BIT(IEEE80211_STYPE_ACTION >> 4) 7372 } 7373 }; 7374 7375 /** 7376 * brcmf_setup_ifmodes() - determine interface modes and combinations. 7377 * 7378 * @wiphy: wiphy object. 7379 * @ifp: interface object needed for feat module api. 7380 * 7381 * The interface modes and combinations are determined dynamically here 7382 * based on firmware functionality. 7383 * 7384 * no p2p and no mbss: 7385 * 7386 * #STA <= 1, #AP <= 1, channels = 1, 2 total 7387 * 7388 * no p2p and mbss: 7389 * 7390 * #STA <= 1, #AP <= 1, channels = 1, 2 total 7391 * #AP <= 4, matching BI, channels = 1, 4 total 7392 * 7393 * no p2p and rsdb: 7394 * #STA <= 1, #AP <= 2, channels = 2, 4 total 7395 * 7396 * p2p, no mchan, and mbss: 7397 * 7398 * #STA <= 1, #P2P-DEV <= 1, #{P2P-CL, P2P-GO} <= 1, channels = 1, 3 total 7399 * #STA <= 1, #P2P-DEV <= 1, #AP <= 1, #P2P-CL <= 1, channels = 1, 4 total 7400 * #AP <= 4, matching BI, channels = 1, 4 total 7401 * 7402 * p2p, mchan, and mbss: 7403 * 7404 * #STA <= 2, #P2P-DEV <= 1, #{P2P-CL, P2P-GO} <= 1, channels = 2, 3 total 7405 * #STA <= 1, #P2P-DEV <= 1, #AP <= 1, #P2P-CL <= 1, channels = 1, 4 total 7406 * #AP <= 4, matching BI, channels = 1, 4 total 7407 * 7408 * p2p, rsdb, and no mbss: 7409 * #STA <= 1, #P2P-DEV <= 1, #{P2P-CL, P2P-GO} <= 2, AP <= 2, 7410 * channels = 2, 4 total 7411 */ 7412 static int brcmf_setup_ifmodes(struct wiphy *wiphy, struct brcmf_if *ifp) 7413 { 7414 struct ieee80211_iface_combination *combo = NULL; 7415 struct ieee80211_iface_limit *c0_limits = NULL; 7416 struct ieee80211_iface_limit *p2p_limits = NULL; 7417 struct ieee80211_iface_limit *mbss_limits = NULL; 7418 bool mon_flag, mbss, p2p, rsdb, mchan; 7419 int i, c, n_combos, n_limits; 7420 7421 mon_flag = brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MONITOR_FLAG); 7422 mbss = brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MBSS); 7423 p2p = brcmf_feat_is_enabled(ifp, BRCMF_FEAT_P2P); 7424 rsdb = brcmf_feat_is_enabled(ifp, BRCMF_FEAT_RSDB); 7425 mchan = brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MCHAN); 7426 7427 n_combos = 1 + !!(p2p && !rsdb) + !!mbss; 7428 combo = kcalloc(n_combos, sizeof(*combo), GFP_KERNEL); 7429 if (!combo) 7430 goto err; 7431 7432 wiphy->interface_modes = BIT(NL80211_IFTYPE_STATION) | 7433 BIT(NL80211_IFTYPE_ADHOC) | 7434 BIT(NL80211_IFTYPE_AP); 7435 if (mon_flag) 7436 wiphy->interface_modes |= BIT(NL80211_IFTYPE_MONITOR); 7437 if (p2p) 7438 wiphy->interface_modes |= BIT(NL80211_IFTYPE_P2P_CLIENT) | 7439 BIT(NL80211_IFTYPE_P2P_GO) | 7440 BIT(NL80211_IFTYPE_P2P_DEVICE); 7441 7442 c = 0; 7443 i = 0; 7444 n_limits = 1 + mon_flag + (p2p ? 2 : 0) + (rsdb || !p2p); 7445 c0_limits = kcalloc(n_limits, sizeof(*c0_limits), GFP_KERNEL); 7446 if (!c0_limits) 7447 goto err; 7448 7449 combo[c].num_different_channels = 1 + (rsdb || (p2p && mchan)); 7450 c0_limits[i].max = 1 + (p2p && mchan); 7451 c0_limits[i++].types = BIT(NL80211_IFTYPE_STATION); 7452 if (mon_flag) { 7453 c0_limits[i].max = 1; 7454 c0_limits[i++].types = BIT(NL80211_IFTYPE_MONITOR); 7455 } 7456 if (p2p) { 7457 c0_limits[i].max = 1; 7458 c0_limits[i++].types = BIT(NL80211_IFTYPE_P2P_DEVICE); 7459 c0_limits[i].max = 1 + rsdb; 7460 c0_limits[i++].types = BIT(NL80211_IFTYPE_P2P_CLIENT) | 7461 BIT(NL80211_IFTYPE_P2P_GO); 7462 } 7463 if (p2p && rsdb) { 7464 c0_limits[i].max = 2; 7465 c0_limits[i++].types = BIT(NL80211_IFTYPE_AP); 7466 combo[c].max_interfaces = 4; 7467 } else if (p2p) { 7468 combo[c].max_interfaces = i; 7469 } else if (rsdb) { 7470 c0_limits[i].max = 2; 7471 c0_limits[i++].types = BIT(NL80211_IFTYPE_AP); 7472 combo[c].max_interfaces = 3; 7473 } else { 7474 c0_limits[i].max = 1; 7475 c0_limits[i++].types = BIT(NL80211_IFTYPE_AP); 7476 combo[c].max_interfaces = i; 7477 } 7478 combo[c].n_limits = i; 7479 combo[c].limits = c0_limits; 7480 7481 if (p2p && !rsdb) { 7482 c++; 7483 i = 0; 7484 p2p_limits = kcalloc(4, sizeof(*p2p_limits), GFP_KERNEL); 7485 if (!p2p_limits) 7486 goto err; 7487 p2p_limits[i].max = 1; 7488 p2p_limits[i++].types = BIT(NL80211_IFTYPE_STATION); 7489 p2p_limits[i].max = 1; 7490 p2p_limits[i++].types = BIT(NL80211_IFTYPE_AP); 7491 p2p_limits[i].max = 1; 7492 p2p_limits[i++].types = BIT(NL80211_IFTYPE_P2P_CLIENT); 7493 p2p_limits[i].max = 1; 7494 p2p_limits[i++].types = BIT(NL80211_IFTYPE_P2P_DEVICE); 7495 combo[c].num_different_channels = 1; 7496 combo[c].max_interfaces = i; 7497 combo[c].n_limits = i; 7498 combo[c].limits = p2p_limits; 7499 } 7500 7501 if (mbss) { 7502 c++; 7503 i = 0; 7504 n_limits = 1 + mon_flag; 7505 mbss_limits = kcalloc(n_limits, sizeof(*mbss_limits), 7506 GFP_KERNEL); 7507 if (!mbss_limits) 7508 goto err; 7509 mbss_limits[i].max = 4; 7510 mbss_limits[i++].types = BIT(NL80211_IFTYPE_AP); 7511 if (mon_flag) { 7512 mbss_limits[i].max = 1; 7513 mbss_limits[i++].types = BIT(NL80211_IFTYPE_MONITOR); 7514 } 7515 combo[c].beacon_int_infra_match = true; 7516 combo[c].num_different_channels = 1; 7517 combo[c].max_interfaces = 4 + mon_flag; 7518 combo[c].n_limits = i; 7519 combo[c].limits = mbss_limits; 7520 } 7521 7522 wiphy->n_iface_combinations = n_combos; 7523 wiphy->iface_combinations = combo; 7524 return 0; 7525 7526 err: 7527 kfree(c0_limits); 7528 kfree(p2p_limits); 7529 kfree(mbss_limits); 7530 kfree(combo); 7531 return -ENOMEM; 7532 } 7533 7534 #ifdef CONFIG_PM 7535 static const struct wiphy_wowlan_support brcmf_wowlan_support = { 7536 .flags = WIPHY_WOWLAN_MAGIC_PKT | WIPHY_WOWLAN_DISCONNECT, 7537 .n_patterns = BRCMF_WOWL_MAXPATTERNS, 7538 .pattern_max_len = BRCMF_WOWL_MAXPATTERNSIZE, 7539 .pattern_min_len = 1, 7540 .max_pkt_offset = 1500, 7541 }; 7542 #endif 7543 7544 static void brcmf_wiphy_wowl_params(struct wiphy *wiphy, struct brcmf_if *ifp) 7545 { 7546 #ifdef CONFIG_PM 7547 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 7548 struct brcmf_pub *drvr = cfg->pub; 7549 struct wiphy_wowlan_support *wowl; 7550 7551 wowl = kmemdup(&brcmf_wowlan_support, sizeof(brcmf_wowlan_support), 7552 GFP_KERNEL); 7553 if (!wowl) { 7554 bphy_err(drvr, "only support basic wowlan features\n"); 7555 wiphy->wowlan = &brcmf_wowlan_support; 7556 return; 7557 } 7558 7559 if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_PNO)) { 7560 if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_WOWL_ND)) { 7561 wowl->flags |= WIPHY_WOWLAN_NET_DETECT; 7562 wowl->max_nd_match_sets = BRCMF_PNO_MAX_PFN_COUNT; 7563 init_waitqueue_head(&cfg->wowl.nd_data_wait); 7564 } 7565 } 7566 if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_WOWL_GTK)) { 7567 wowl->flags |= WIPHY_WOWLAN_SUPPORTS_GTK_REKEY; 7568 wowl->flags |= WIPHY_WOWLAN_GTK_REKEY_FAILURE; 7569 } 7570 7571 wiphy->wowlan = wowl; 7572 #endif 7573 } 7574 7575 static int brcmf_setup_wiphy(struct wiphy *wiphy, struct brcmf_if *ifp) 7576 { 7577 struct brcmf_pub *drvr = ifp->drvr; 7578 const struct ieee80211_iface_combination *combo; 7579 struct ieee80211_supported_band *band; 7580 u16 max_interfaces = 0; 7581 bool gscan; 7582 __le32 bandlist[3]; 7583 u32 n_bands; 7584 int err, i; 7585 7586 wiphy->max_scan_ssids = WL_NUM_SCAN_MAX; 7587 wiphy->max_scan_ie_len = BRCMF_SCAN_IE_LEN_MAX; 7588 wiphy->max_num_pmkids = BRCMF_MAXPMKID; 7589 7590 err = brcmf_setup_ifmodes(wiphy, ifp); 7591 if (err) 7592 return err; 7593 7594 for (i = 0, combo = wiphy->iface_combinations; 7595 i < wiphy->n_iface_combinations; i++, combo++) { 7596 max_interfaces = max(max_interfaces, combo->max_interfaces); 7597 } 7598 7599 for (i = 0; i < max_interfaces && i < ARRAY_SIZE(drvr->addresses); 7600 i++) { 7601 u8 *addr = drvr->addresses[i].addr; 7602 7603 memcpy(addr, drvr->mac, ETH_ALEN); 7604 if (i) { 7605 addr[0] |= BIT(1); 7606 addr[ETH_ALEN - 1] ^= i; 7607 } 7608 } 7609 wiphy->addresses = drvr->addresses; 7610 wiphy->n_addresses = i; 7611 7612 wiphy->signal_type = CFG80211_SIGNAL_TYPE_MBM; 7613 wiphy->cipher_suites = brcmf_cipher_suites; 7614 wiphy->n_cipher_suites = ARRAY_SIZE(brcmf_cipher_suites); 7615 if (!brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MFP)) 7616 wiphy->n_cipher_suites--; 7617 wiphy->bss_select_support = BIT(NL80211_BSS_SELECT_ATTR_RSSI) | 7618 BIT(NL80211_BSS_SELECT_ATTR_BAND_PREF) | 7619 BIT(NL80211_BSS_SELECT_ATTR_RSSI_ADJUST); 7620 7621 wiphy->flags |= WIPHY_FLAG_NETNS_OK | 7622 WIPHY_FLAG_PS_ON_BY_DEFAULT | 7623 WIPHY_FLAG_HAVE_AP_SME | 7624 WIPHY_FLAG_OFFCHAN_TX | 7625 WIPHY_FLAG_HAS_REMAIN_ON_CHANNEL; 7626 if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_TDLS)) 7627 wiphy->flags |= WIPHY_FLAG_SUPPORTS_TDLS; 7628 if (!ifp->drvr->settings->roamoff) 7629 wiphy->flags |= WIPHY_FLAG_SUPPORTS_FW_ROAM; 7630 if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_FWSUP)) { 7631 wiphy_ext_feature_set(wiphy, 7632 NL80211_EXT_FEATURE_4WAY_HANDSHAKE_STA_PSK); 7633 wiphy_ext_feature_set(wiphy, 7634 NL80211_EXT_FEATURE_4WAY_HANDSHAKE_STA_1X); 7635 if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_SAE)) 7636 wiphy_ext_feature_set(wiphy, 7637 NL80211_EXT_FEATURE_SAE_OFFLOAD); 7638 } 7639 if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_FWAUTH)) { 7640 wiphy_ext_feature_set(wiphy, 7641 NL80211_EXT_FEATURE_4WAY_HANDSHAKE_AP_PSK); 7642 if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_SAE)) 7643 wiphy_ext_feature_set(wiphy, 7644 NL80211_EXT_FEATURE_SAE_OFFLOAD_AP); 7645 } 7646 wiphy->mgmt_stypes = brcmf_txrx_stypes; 7647 wiphy->max_remain_on_channel_duration = 5000; 7648 if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_PNO)) { 7649 gscan = brcmf_feat_is_enabled(ifp, BRCMF_FEAT_GSCAN); 7650 brcmf_pno_wiphy_params(wiphy, gscan); 7651 } 7652 /* vendor commands/events support */ 7653 wiphy->vendor_commands = brcmf_vendor_cmds; 7654 wiphy->n_vendor_commands = BRCMF_VNDR_CMDS_LAST - 1; 7655 7656 if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_WOWL)) 7657 brcmf_wiphy_wowl_params(wiphy, ifp); 7658 err = brcmf_fil_cmd_data_get(ifp, BRCMF_C_GET_BANDLIST, &bandlist, 7659 sizeof(bandlist)); 7660 if (err) { 7661 bphy_err(drvr, "could not obtain band info: err=%d\n", err); 7662 return err; 7663 } 7664 /* first entry in bandlist is number of bands */ 7665 n_bands = le32_to_cpu(bandlist[0]); 7666 for (i = 1; i <= n_bands && i < ARRAY_SIZE(bandlist); i++) { 7667 if (bandlist[i] == cpu_to_le32(WLC_BAND_2G)) { 7668 band = kmemdup(&__wl_band_2ghz, sizeof(__wl_band_2ghz), 7669 GFP_KERNEL); 7670 if (!band) 7671 return -ENOMEM; 7672 7673 band->channels = kmemdup(&__wl_2ghz_channels, 7674 sizeof(__wl_2ghz_channels), 7675 GFP_KERNEL); 7676 if (!band->channels) { 7677 kfree(band); 7678 return -ENOMEM; 7679 } 7680 7681 band->n_channels = ARRAY_SIZE(__wl_2ghz_channels); 7682 wiphy->bands[NL80211_BAND_2GHZ] = band; 7683 } 7684 if (bandlist[i] == cpu_to_le32(WLC_BAND_5G)) { 7685 band = kmemdup(&__wl_band_5ghz, sizeof(__wl_band_5ghz), 7686 GFP_KERNEL); 7687 if (!band) 7688 return -ENOMEM; 7689 7690 band->channels = kmemdup(&__wl_5ghz_channels, 7691 sizeof(__wl_5ghz_channels), 7692 GFP_KERNEL); 7693 if (!band->channels) { 7694 kfree(band); 7695 return -ENOMEM; 7696 } 7697 7698 band->n_channels = ARRAY_SIZE(__wl_5ghz_channels); 7699 wiphy->bands[NL80211_BAND_5GHZ] = band; 7700 } 7701 } 7702 7703 if (wiphy->bands[NL80211_BAND_5GHZ] && 7704 brcmf_feat_is_enabled(ifp, BRCMF_FEAT_DOT11H)) 7705 wiphy_ext_feature_set(wiphy, 7706 NL80211_EXT_FEATURE_DFS_OFFLOAD); 7707 7708 wiphy_ext_feature_set(wiphy, NL80211_EXT_FEATURE_CQM_RSSI_LIST); 7709 7710 wiphy_read_of_freq_limits(wiphy); 7711 7712 return 0; 7713 } 7714 7715 static s32 brcmf_config_dongle(struct brcmf_cfg80211_info *cfg) 7716 { 7717 struct brcmf_pub *drvr = cfg->pub; 7718 struct net_device *ndev; 7719 struct wireless_dev *wdev; 7720 struct brcmf_if *ifp; 7721 s32 power_mode; 7722 s32 err = 0; 7723 7724 if (cfg->dongle_up) 7725 return err; 7726 7727 ndev = cfg_to_ndev(cfg); 7728 wdev = ndev->ieee80211_ptr; 7729 ifp = netdev_priv(ndev); 7730 7731 /* make sure RF is ready for work */ 7732 brcmf_fil_cmd_int_set(ifp, BRCMF_C_UP, 0); 7733 7734 brcmf_dongle_scantime(ifp); 7735 7736 power_mode = cfg->pwr_save ? PM_FAST : PM_OFF; 7737 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_PM, power_mode); 7738 if (err) 7739 goto default_conf_out; 7740 brcmf_dbg(INFO, "power save set to %s\n", 7741 (power_mode ? "enabled" : "disabled")); 7742 7743 err = brcmf_dongle_roam(ifp); 7744 if (err) 7745 goto default_conf_out; 7746 err = brcmf_cfg80211_change_iface(wdev->wiphy, ndev, wdev->iftype, 7747 NULL); 7748 if (err) 7749 goto default_conf_out; 7750 7751 brcmf_configure_arp_nd_offload(ifp, true); 7752 7753 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_FAKEFRAG, 1); 7754 if (err) { 7755 bphy_err(drvr, "failed to set frameburst mode\n"); 7756 goto default_conf_out; 7757 } 7758 7759 cfg->dongle_up = true; 7760 default_conf_out: 7761 7762 return err; 7763 7764 } 7765 7766 static s32 __brcmf_cfg80211_up(struct brcmf_if *ifp) 7767 { 7768 set_bit(BRCMF_VIF_STATUS_READY, &ifp->vif->sme_state); 7769 7770 return brcmf_config_dongle(ifp->drvr->config); 7771 } 7772 7773 static s32 __brcmf_cfg80211_down(struct brcmf_if *ifp) 7774 { 7775 struct brcmf_cfg80211_info *cfg = ifp->drvr->config; 7776 7777 /* 7778 * While going down, if associated with AP disassociate 7779 * from AP to save power 7780 */ 7781 if (check_vif_up(ifp->vif)) { 7782 brcmf_link_down(ifp->vif, WLAN_REASON_UNSPECIFIED, true); 7783 7784 /* Make sure WPA_Supplicant receives all the event 7785 generated due to DISASSOC call to the fw to keep 7786 the state fw and WPA_Supplicant state consistent 7787 */ 7788 brcmf_delay(500); 7789 } 7790 7791 brcmf_abort_scanning(cfg); 7792 clear_bit(BRCMF_VIF_STATUS_READY, &ifp->vif->sme_state); 7793 7794 return 0; 7795 } 7796 7797 s32 brcmf_cfg80211_up(struct net_device *ndev) 7798 { 7799 struct brcmf_if *ifp = netdev_priv(ndev); 7800 struct brcmf_cfg80211_info *cfg = ifp->drvr->config; 7801 s32 err = 0; 7802 7803 mutex_lock(&cfg->usr_sync); 7804 err = __brcmf_cfg80211_up(ifp); 7805 mutex_unlock(&cfg->usr_sync); 7806 7807 return err; 7808 } 7809 7810 s32 brcmf_cfg80211_down(struct net_device *ndev) 7811 { 7812 struct brcmf_if *ifp = netdev_priv(ndev); 7813 struct brcmf_cfg80211_info *cfg = ifp->drvr->config; 7814 s32 err = 0; 7815 7816 mutex_lock(&cfg->usr_sync); 7817 err = __brcmf_cfg80211_down(ifp); 7818 mutex_unlock(&cfg->usr_sync); 7819 7820 return err; 7821 } 7822 7823 enum nl80211_iftype brcmf_cfg80211_get_iftype(struct brcmf_if *ifp) 7824 { 7825 struct wireless_dev *wdev = &ifp->vif->wdev; 7826 7827 return wdev->iftype; 7828 } 7829 7830 bool brcmf_get_vif_state_any(struct brcmf_cfg80211_info *cfg, 7831 unsigned long state) 7832 { 7833 struct brcmf_cfg80211_vif *vif; 7834 7835 list_for_each_entry(vif, &cfg->vif_list, list) { 7836 if (test_bit(state, &vif->sme_state)) 7837 return true; 7838 } 7839 return false; 7840 } 7841 7842 static inline bool vif_event_equals(struct brcmf_cfg80211_vif_event *event, 7843 u8 action) 7844 { 7845 u8 evt_action; 7846 7847 spin_lock(&event->vif_event_lock); 7848 evt_action = event->action; 7849 spin_unlock(&event->vif_event_lock); 7850 return evt_action == action; 7851 } 7852 7853 void brcmf_cfg80211_arm_vif_event(struct brcmf_cfg80211_info *cfg, 7854 struct brcmf_cfg80211_vif *vif) 7855 { 7856 struct brcmf_cfg80211_vif_event *event = &cfg->vif_event; 7857 7858 spin_lock(&event->vif_event_lock); 7859 event->vif = vif; 7860 event->action = 0; 7861 spin_unlock(&event->vif_event_lock); 7862 } 7863 7864 bool brcmf_cfg80211_vif_event_armed(struct brcmf_cfg80211_info *cfg) 7865 { 7866 struct brcmf_cfg80211_vif_event *event = &cfg->vif_event; 7867 bool armed; 7868 7869 spin_lock(&event->vif_event_lock); 7870 armed = event->vif != NULL; 7871 spin_unlock(&event->vif_event_lock); 7872 7873 return armed; 7874 } 7875 7876 int brcmf_cfg80211_wait_vif_event(struct brcmf_cfg80211_info *cfg, 7877 u8 action, ulong timeout) 7878 { 7879 struct brcmf_cfg80211_vif_event *event = &cfg->vif_event; 7880 7881 return wait_event_timeout(event->vif_wq, 7882 vif_event_equals(event, action), timeout); 7883 } 7884 7885 static bool brmcf_use_iso3166_ccode_fallback(struct brcmf_pub *drvr) 7886 { 7887 if (drvr->settings->trivial_ccode_map) 7888 return true; 7889 7890 switch (drvr->bus_if->chip) { 7891 case BRCM_CC_43430_CHIP_ID: 7892 case BRCM_CC_4345_CHIP_ID: 7893 case BRCM_CC_4356_CHIP_ID: 7894 case BRCM_CC_43602_CHIP_ID: 7895 return true; 7896 default: 7897 return false; 7898 } 7899 } 7900 7901 static s32 brcmf_translate_country_code(struct brcmf_pub *drvr, char alpha2[2], 7902 struct brcmf_fil_country_le *ccreq) 7903 { 7904 struct brcmfmac_pd_cc *country_codes; 7905 struct brcmfmac_pd_cc_entry *cc; 7906 s32 found_index; 7907 int i; 7908 7909 if ((alpha2[0] == ccreq->country_abbrev[0]) && 7910 (alpha2[1] == ccreq->country_abbrev[1])) { 7911 brcmf_dbg(TRACE, "Country code already set\n"); 7912 return -EAGAIN; 7913 } 7914 7915 country_codes = drvr->settings->country_codes; 7916 if (!country_codes) { 7917 if (brmcf_use_iso3166_ccode_fallback(drvr)) { 7918 brcmf_dbg(TRACE, "No country codes configured for device, using ISO3166 code and 0 rev\n"); 7919 memset(ccreq, 0, sizeof(*ccreq)); 7920 ccreq->country_abbrev[0] = alpha2[0]; 7921 ccreq->country_abbrev[1] = alpha2[1]; 7922 ccreq->ccode[0] = alpha2[0]; 7923 ccreq->ccode[1] = alpha2[1]; 7924 return 0; 7925 } 7926 7927 brcmf_dbg(TRACE, "No country codes configured for device\n"); 7928 return -EINVAL; 7929 } 7930 7931 found_index = -1; 7932 for (i = 0; i < country_codes->table_size; i++) { 7933 cc = &country_codes->table[i]; 7934 if ((cc->iso3166[0] == '\0') && (found_index == -1)) 7935 found_index = i; 7936 if ((cc->iso3166[0] == alpha2[0]) && 7937 (cc->iso3166[1] == alpha2[1])) { 7938 found_index = i; 7939 break; 7940 } 7941 } 7942 if (found_index == -1) { 7943 brcmf_dbg(TRACE, "No country code match found\n"); 7944 return -EINVAL; 7945 } 7946 memset(ccreq, 0, sizeof(*ccreq)); 7947 ccreq->rev = cpu_to_le32(country_codes->table[found_index].rev); 7948 memcpy(ccreq->ccode, country_codes->table[found_index].cc, 7949 BRCMF_COUNTRY_BUF_SZ); 7950 ccreq->country_abbrev[0] = alpha2[0]; 7951 ccreq->country_abbrev[1] = alpha2[1]; 7952 ccreq->country_abbrev[2] = 0; 7953 7954 return 0; 7955 } 7956 7957 static int 7958 brcmf_parse_dump_obss(char *buf, struct brcmf_dump_survey *survey) 7959 { 7960 int i; 7961 char *token; 7962 char delim[] = "\n "; 7963 unsigned long val; 7964 int err = 0; 7965 7966 token = strsep(&buf, delim); 7967 while (token) { 7968 if (!strcmp(token, "OBSS")) { 7969 for (i = 0; i < OBSS_TOKEN_IDX; i++) 7970 token = strsep(&buf, delim); 7971 err = kstrtoul(token, 10, &val); 7972 if (err) 7973 break; 7974 survey->obss = val; 7975 } 7976 7977 if (!strcmp(token, "IBSS")) { 7978 for (i = 0; i < IBSS_TOKEN_IDX; i++) 7979 token = strsep(&buf, delim); 7980 err = kstrtoul(token, 10, &val); 7981 if (err) 7982 break; 7983 survey->ibss = val; 7984 } 7985 7986 if (!strcmp(token, "TXDur")) { 7987 for (i = 0; i < TX_TOKEN_IDX; i++) 7988 token = strsep(&buf, delim); 7989 err = kstrtoul(token, 10, &val); 7990 if (err) 7991 break; 7992 survey->tx = val; 7993 } 7994 7995 if (!strcmp(token, "Category")) { 7996 for (i = 0; i < CTG_TOKEN_IDX; i++) 7997 token = strsep(&buf, delim); 7998 err = kstrtoul(token, 10, &val); 7999 if (err) 8000 break; 8001 survey->no_ctg = val; 8002 } 8003 8004 if (!strcmp(token, "Packet")) { 8005 for (i = 0; i < PKT_TOKEN_IDX; i++) 8006 token = strsep(&buf, delim); 8007 err = kstrtoul(token, 10, &val); 8008 if (err) 8009 break; 8010 survey->no_pckt = val; 8011 } 8012 8013 if (!strcmp(token, "Opp(time):")) { 8014 for (i = 0; i < IDLE_TOKEN_IDX; i++) 8015 token = strsep(&buf, delim); 8016 err = kstrtoul(token, 10, &val); 8017 if (err) 8018 break; 8019 survey->idle = val; 8020 } 8021 8022 token = strsep(&buf, delim); 8023 } 8024 8025 return err; 8026 } 8027 8028 static int 8029 brcmf_dump_obss(struct brcmf_if *ifp, struct cca_msrmnt_query req, 8030 struct brcmf_dump_survey *survey) 8031 { 8032 struct cca_stats_n_flags *results; 8033 char *buf; 8034 int err; 8035 8036 buf = kzalloc(sizeof(char) * BRCMF_DCMD_MEDLEN, GFP_KERNEL); 8037 if (!buf) 8038 return -ENOMEM; 8039 8040 memcpy(buf, &req, sizeof(struct cca_msrmnt_query)); 8041 err = brcmf_fil_iovar_data_get(ifp, "dump_obss", 8042 buf, BRCMF_DCMD_MEDLEN); 8043 if (err) { 8044 brcmf_err("dump_obss error (%d)\n", err); 8045 err = -EINVAL; 8046 goto exit; 8047 } 8048 results = (struct cca_stats_n_flags *)(buf); 8049 8050 if (req.msrmnt_query) 8051 brcmf_parse_dump_obss(results->buf, survey); 8052 8053 exit: 8054 kfree(buf); 8055 return err; 8056 } 8057 8058 static s32 8059 brcmf_set_channel(struct brcmf_cfg80211_info *cfg, struct ieee80211_channel *chan) 8060 { 8061 u16 chspec = 0; 8062 int err = 0; 8063 struct brcmf_if *ifp = netdev_priv(cfg_to_ndev(cfg)); 8064 8065 if (chan->flags & IEEE80211_CHAN_DISABLED) 8066 return -EINVAL; 8067 8068 /* set_channel */ 8069 chspec = channel_to_chanspec(&cfg->d11inf, chan); 8070 if (chspec != INVCHANSPEC) { 8071 err = brcmf_fil_iovar_int_set(ifp, "chanspec", chspec); 8072 if (err) { 8073 brcmf_err("set chanspec 0x%04x fail, reason %d\n", chspec, err); 8074 err = -EINVAL; 8075 } 8076 } else { 8077 brcmf_err("failed to convert host chanspec to fw chanspec\n"); 8078 err = -EINVAL; 8079 } 8080 8081 return err; 8082 } 8083 8084 static int 8085 brcmf_cfg80211_dump_survey(struct wiphy *wiphy, struct net_device *ndev, 8086 int idx, struct survey_info *info) 8087 { 8088 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 8089 struct brcmf_if *ifp = netdev_priv(cfg_to_ndev(cfg)); 8090 struct brcmf_dump_survey survey = {}; 8091 struct ieee80211_supported_band *band; 8092 enum nl80211_band band_id; 8093 struct cca_msrmnt_query req; 8094 u32 noise; 8095 int err; 8096 8097 brcmf_dbg(TRACE, "Enter: channel idx=%d\n", idx); 8098 8099 /* Do not run survey when VIF in CONNECTING / CONNECTED states */ 8100 if ((test_bit(BRCMF_VIF_STATUS_CONNECTING, &ifp->vif->sme_state)) || 8101 (test_bit(BRCMF_VIF_STATUS_CONNECTED, &ifp->vif->sme_state))) { 8102 return -EBUSY; 8103 } 8104 8105 for (band_id = 0; band_id < NUM_NL80211_BANDS; band_id++) { 8106 band = wiphy->bands[band_id]; 8107 if (!band) 8108 continue; 8109 if (idx >= band->n_channels) { 8110 idx -= band->n_channels; 8111 continue; 8112 } 8113 8114 info->channel = &band->channels[idx]; 8115 break; 8116 } 8117 if (band_id == NUM_NL80211_BANDS) 8118 return -ENOENT; 8119 8120 /* Setting current channel to the requested channel */ 8121 info->filled = 0; 8122 if (brcmf_set_channel(cfg, info->channel)) 8123 return 0; 8124 8125 /* Disable mpc */ 8126 brcmf_set_mpc(ifp, 0); 8127 8128 /* Set interface up, explicitly. */ 8129 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_UP, 1); 8130 if (err) { 8131 brcmf_err("set interface up failed, err = %d\n", err); 8132 goto exit; 8133 } 8134 8135 /* Get noise value */ 8136 err = brcmf_fil_cmd_int_get(ifp, BRCMF_C_GET_PHY_NOISE, &noise); 8137 if (err) { 8138 brcmf_err("Get Phy Noise failed, use dummy value\n"); 8139 noise = CHAN_NOISE_DUMMY; 8140 } 8141 8142 /* Start Measurement for obss stats on current channel */ 8143 req.msrmnt_query = 0; 8144 req.time_req = ACS_MSRMNT_DELAY; 8145 err = brcmf_dump_obss(ifp, req, &survey); 8146 if (err) 8147 goto exit; 8148 8149 /* Add 10 ms for IOVAR completion */ 8150 msleep(ACS_MSRMNT_DELAY + 10); 8151 8152 /* Issue IOVAR to collect measurement results */ 8153 req.msrmnt_query = 1; 8154 err = brcmf_dump_obss(ifp, req, &survey); 8155 if (err) 8156 goto exit; 8157 8158 info->noise = noise; 8159 info->time = ACS_MSRMNT_DELAY; 8160 info->time_busy = ACS_MSRMNT_DELAY - survey.idle; 8161 info->time_rx = survey.obss + survey.ibss + survey.no_ctg + 8162 survey.no_pckt; 8163 info->time_tx = survey.tx; 8164 info->filled = SURVEY_INFO_NOISE_DBM | SURVEY_INFO_TIME | 8165 SURVEY_INFO_TIME_BUSY | SURVEY_INFO_TIME_RX | 8166 SURVEY_INFO_TIME_TX; 8167 8168 brcmf_dbg(INFO, "OBSS dump: channel %d: survey duration %d\n", 8169 ieee80211_frequency_to_channel(info->channel->center_freq), 8170 ACS_MSRMNT_DELAY); 8171 brcmf_dbg(INFO, "noise(%d) busy(%llu) rx(%llu) tx(%llu)\n", 8172 info->noise, info->time_busy, info->time_rx, info->time_tx); 8173 8174 exit: 8175 if (!brcmf_is_apmode(ifp->vif)) 8176 brcmf_set_mpc(ifp, 1); 8177 return err; 8178 } 8179 8180 static void brcmf_cfg80211_reg_notifier(struct wiphy *wiphy, 8181 struct regulatory_request *req) 8182 { 8183 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy); 8184 struct brcmf_if *ifp = brcmf_get_ifp(cfg->pub, 0); 8185 struct brcmf_pub *drvr = cfg->pub; 8186 struct brcmf_fil_country_le ccreq; 8187 s32 err; 8188 int i; 8189 8190 /* The country code gets set to "00" by default at boot, ignore */ 8191 if (req->alpha2[0] == '0' && req->alpha2[1] == '0') 8192 return; 8193 8194 /* ignore non-ISO3166 country codes */ 8195 for (i = 0; i < 2; i++) 8196 if (req->alpha2[i] < 'A' || req->alpha2[i] > 'Z') { 8197 bphy_err(drvr, "not an ISO3166 code (0x%02x 0x%02x)\n", 8198 req->alpha2[0], req->alpha2[1]); 8199 return; 8200 } 8201 8202 brcmf_dbg(TRACE, "Enter: initiator=%d, alpha=%c%c\n", req->initiator, 8203 req->alpha2[0], req->alpha2[1]); 8204 8205 err = brcmf_fil_iovar_data_get(ifp, "country", &ccreq, sizeof(ccreq)); 8206 if (err) { 8207 bphy_err(drvr, "Country code iovar returned err = %d\n", err); 8208 return; 8209 } 8210 8211 err = brcmf_translate_country_code(ifp->drvr, req->alpha2, &ccreq); 8212 if (err) 8213 return; 8214 8215 err = brcmf_fil_iovar_data_set(ifp, "country", &ccreq, sizeof(ccreq)); 8216 if (err) { 8217 bphy_err(drvr, "Firmware rejected country setting\n"); 8218 return; 8219 } 8220 brcmf_setup_wiphybands(cfg); 8221 } 8222 8223 static void brcmf_free_wiphy(struct wiphy *wiphy) 8224 { 8225 int i; 8226 8227 if (!wiphy) 8228 return; 8229 8230 if (wiphy->iface_combinations) { 8231 for (i = 0; i < wiphy->n_iface_combinations; i++) 8232 kfree(wiphy->iface_combinations[i].limits); 8233 } 8234 kfree(wiphy->iface_combinations); 8235 if (wiphy->bands[NL80211_BAND_2GHZ]) { 8236 kfree(wiphy->bands[NL80211_BAND_2GHZ]->channels); 8237 kfree(wiphy->bands[NL80211_BAND_2GHZ]); 8238 } 8239 if (wiphy->bands[NL80211_BAND_5GHZ]) { 8240 kfree(wiphy->bands[NL80211_BAND_5GHZ]->channels); 8241 kfree(wiphy->bands[NL80211_BAND_5GHZ]); 8242 } 8243 #if IS_ENABLED(CONFIG_PM) 8244 if (wiphy->wowlan != &brcmf_wowlan_support) 8245 kfree(wiphy->wowlan); 8246 #endif 8247 } 8248 8249 struct brcmf_cfg80211_info *brcmf_cfg80211_attach(struct brcmf_pub *drvr, 8250 struct cfg80211_ops *ops, 8251 bool p2pdev_forced) 8252 { 8253 struct wiphy *wiphy = drvr->wiphy; 8254 struct net_device *ndev = brcmf_get_ifp(drvr, 0)->ndev; 8255 struct brcmf_cfg80211_info *cfg; 8256 struct brcmf_cfg80211_vif *vif; 8257 struct brcmf_if *ifp; 8258 s32 err = 0; 8259 s32 io_type; 8260 u16 *cap = NULL; 8261 8262 if (!ndev) { 8263 bphy_err(drvr, "ndev is invalid\n"); 8264 return NULL; 8265 } 8266 8267 cfg = kzalloc(sizeof(*cfg), GFP_KERNEL); 8268 if (!cfg) { 8269 bphy_err(drvr, "Could not allocate wiphy device\n"); 8270 return NULL; 8271 } 8272 8273 cfg->wiphy = wiphy; 8274 cfg->pub = drvr; 8275 init_vif_event(&cfg->vif_event); 8276 INIT_LIST_HEAD(&cfg->vif_list); 8277 8278 vif = brcmf_alloc_vif(cfg, NL80211_IFTYPE_STATION); 8279 if (IS_ERR(vif)) 8280 goto wiphy_out; 8281 8282 ifp = netdev_priv(ndev); 8283 vif->ifp = ifp; 8284 vif->wdev.netdev = ndev; 8285 ndev->ieee80211_ptr = &vif->wdev; 8286 SET_NETDEV_DEV(ndev, wiphy_dev(cfg->wiphy)); 8287 8288 err = wl_init_priv(cfg); 8289 if (err) { 8290 bphy_err(drvr, "Failed to init iwm_priv (%d)\n", err); 8291 brcmf_free_vif(vif); 8292 goto wiphy_out; 8293 } 8294 ifp->vif = vif; 8295 8296 /* determine d11 io type before wiphy setup */ 8297 err = brcmf_fil_cmd_int_get(ifp, BRCMF_C_GET_VERSION, &io_type); 8298 if (err) { 8299 bphy_err(drvr, "Failed to get D11 version (%d)\n", err); 8300 goto priv_out; 8301 } 8302 cfg->d11inf.io_type = (u8)io_type; 8303 brcmu_d11_attach(&cfg->d11inf); 8304 8305 /* regulatory notifer below needs access to cfg so 8306 * assign it now. 8307 */ 8308 drvr->config = cfg; 8309 8310 err = brcmf_setup_wiphy(wiphy, ifp); 8311 if (err < 0) 8312 goto priv_out; 8313 8314 brcmf_dbg(INFO, "Registering custom regulatory\n"); 8315 wiphy->reg_notifier = brcmf_cfg80211_reg_notifier; 8316 wiphy->regulatory_flags |= REGULATORY_CUSTOM_REG; 8317 wiphy_apply_custom_regulatory(wiphy, &brcmf_regdom); 8318 8319 /* firmware defaults to 40MHz disabled in 2G band. We signal 8320 * cfg80211 here that we do and have it decide we can enable 8321 * it. But first check if device does support 2G operation. 8322 */ 8323 if (wiphy->bands[NL80211_BAND_2GHZ]) { 8324 cap = &wiphy->bands[NL80211_BAND_2GHZ]->ht_cap.cap; 8325 *cap |= IEEE80211_HT_CAP_SUP_WIDTH_20_40; 8326 } 8327 #ifdef CONFIG_PM 8328 if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_WOWL_GTK)) 8329 ops->set_rekey_data = brcmf_cfg80211_set_rekey_data; 8330 #endif 8331 if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_DUMP_OBSS)) 8332 ops->dump_survey = brcmf_cfg80211_dump_survey; 8333 8334 err = wiphy_register(wiphy); 8335 if (err < 0) { 8336 bphy_err(drvr, "Could not register wiphy device (%d)\n", err); 8337 goto priv_out; 8338 } 8339 8340 err = brcmf_setup_wiphybands(cfg); 8341 if (err) { 8342 bphy_err(drvr, "Setting wiphy bands failed (%d)\n", err); 8343 goto wiphy_unreg_out; 8344 } 8345 8346 /* If cfg80211 didn't disable 40MHz HT CAP in wiphy_register(), 8347 * setup 40MHz in 2GHz band and enable OBSS scanning. 8348 */ 8349 if (cap && (*cap & IEEE80211_HT_CAP_SUP_WIDTH_20_40)) { 8350 err = brcmf_enable_bw40_2g(cfg); 8351 if (!err) 8352 err = brcmf_fil_iovar_int_set(ifp, "obss_coex", 8353 BRCMF_OBSS_COEX_AUTO); 8354 else 8355 *cap &= ~IEEE80211_HT_CAP_SUP_WIDTH_20_40; 8356 } 8357 8358 err = brcmf_fweh_activate_events(ifp); 8359 if (err) { 8360 bphy_err(drvr, "FWEH activation failed (%d)\n", err); 8361 goto wiphy_unreg_out; 8362 } 8363 8364 err = brcmf_p2p_attach(cfg, p2pdev_forced); 8365 if (err) { 8366 bphy_err(drvr, "P2P initialisation failed (%d)\n", err); 8367 goto wiphy_unreg_out; 8368 } 8369 err = brcmf_btcoex_attach(cfg); 8370 if (err) { 8371 bphy_err(drvr, "BT-coex initialisation failed (%d)\n", err); 8372 brcmf_p2p_detach(&cfg->p2p); 8373 goto wiphy_unreg_out; 8374 } 8375 err = brcmf_pno_attach(cfg); 8376 if (err) { 8377 bphy_err(drvr, "PNO initialisation failed (%d)\n", err); 8378 brcmf_btcoex_detach(cfg); 8379 brcmf_p2p_detach(&cfg->p2p); 8380 goto wiphy_unreg_out; 8381 } 8382 8383 if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_TDLS)) { 8384 err = brcmf_fil_iovar_int_set(ifp, "tdls_enable", 1); 8385 if (err) { 8386 brcmf_dbg(INFO, "TDLS not enabled (%d)\n", err); 8387 wiphy->flags &= ~WIPHY_FLAG_SUPPORTS_TDLS; 8388 } else { 8389 brcmf_fweh_register(cfg->pub, BRCMF_E_TDLS_PEER_EVENT, 8390 brcmf_notify_tdls_peer_event); 8391 } 8392 } 8393 8394 /* (re-) activate FWEH event handling */ 8395 err = brcmf_fweh_activate_events(ifp); 8396 if (err) { 8397 bphy_err(drvr, "FWEH activation failed (%d)\n", err); 8398 goto detach; 8399 } 8400 8401 /* Fill in some of the advertised nl80211 supported features */ 8402 if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_SCAN_RANDOM_MAC)) { 8403 wiphy->features |= NL80211_FEATURE_SCHED_SCAN_RANDOM_MAC_ADDR; 8404 #ifdef CONFIG_PM 8405 if (wiphy->wowlan && 8406 wiphy->wowlan->flags & WIPHY_WOWLAN_NET_DETECT) 8407 wiphy->features |= NL80211_FEATURE_ND_RANDOM_MAC_ADDR; 8408 #endif 8409 } 8410 8411 return cfg; 8412 8413 detach: 8414 brcmf_pno_detach(cfg); 8415 brcmf_btcoex_detach(cfg); 8416 brcmf_p2p_detach(&cfg->p2p); 8417 wiphy_unreg_out: 8418 wiphy_unregister(cfg->wiphy); 8419 priv_out: 8420 wl_deinit_priv(cfg); 8421 brcmf_free_vif(vif); 8422 ifp->vif = NULL; 8423 wiphy_out: 8424 brcmf_free_wiphy(wiphy); 8425 kfree(cfg); 8426 return NULL; 8427 } 8428 8429 void brcmf_cfg80211_detach(struct brcmf_cfg80211_info *cfg) 8430 { 8431 if (!cfg) 8432 return; 8433 8434 brcmf_pno_detach(cfg); 8435 brcmf_btcoex_detach(cfg); 8436 wiphy_unregister(cfg->wiphy); 8437 wl_deinit_priv(cfg); 8438 brcmf_free_wiphy(cfg->wiphy); 8439 kfree(cfg); 8440 } 8441