xref: /linux/drivers/net/wireless/intel/iwlwifi/mld/d3.c (revision af2d6148d2a159e1a0862bce5a2c88c1618a2b27)
1 // SPDX-License-Identifier: GPL-2.0 OR BSD-3-Clause
2 /*
3  * Copyright (C) 2024-2025 Intel Corporation
4  */
5 #include "mld.h"
6 
7 #include "d3.h"
8 #include "power.h"
9 #include "hcmd.h"
10 #include "iface.h"
11 #include "mcc.h"
12 #include "sta.h"
13 #include "mlo.h"
14 
15 #include "fw/api/d3.h"
16 #include "fw/api/offload.h"
17 #include "fw/api/sta.h"
18 #include "fw/dbg.h"
19 
20 #include <net/ipv6.h>
21 #include <net/addrconf.h>
22 #include <linux/bitops.h>
23 
24 /**
25  * enum iwl_mld_d3_notif - d3 notifications
26  * @IWL_D3_NOTIF_WOWLAN_INFO: WOWLAN_INFO_NOTIF is expected/was received
27  * @IWL_D3_NOTIF_WOWLAN_WAKE_PKT: WOWLAN_WAKE_PKT_NOTIF is expected/was received
28  * @IWL_D3_NOTIF_PROT_OFFLOAD: PROT_OFFLOAD_NOTIF is expected/was received
29  * @IWL_D3_ND_MATCH_INFO: OFFLOAD_MATCH_INFO_NOTIF is expected/was received
30  * @IWL_D3_NOTIF_D3_END_NOTIF: D3_END_NOTIF is expected/was received
31  */
32 enum iwl_mld_d3_notif {
33 	IWL_D3_NOTIF_WOWLAN_INFO =	BIT(0),
34 	IWL_D3_NOTIF_WOWLAN_WAKE_PKT =	BIT(1),
35 	IWL_D3_NOTIF_PROT_OFFLOAD =	BIT(2),
36 	IWL_D3_ND_MATCH_INFO      =     BIT(3),
37 	IWL_D3_NOTIF_D3_END_NOTIF =	BIT(4)
38 };
39 
40 struct iwl_mld_resume_key_iter_data {
41 	struct iwl_mld *mld;
42 	struct iwl_mld_wowlan_status *wowlan_status;
43 	u32 num_keys, gtk_cipher, igtk_cipher, bigtk_cipher;
44 	bool unhandled_cipher;
45 };
46 
47 struct iwl_mld_suspend_key_iter_data {
48 	struct iwl_wowlan_rsc_tsc_params_cmd *rsc;
49 	bool have_rsc;
50 	int gtks;
51 	int found_gtk_idx[4];
52 	__le32 gtk_cipher;
53 	__le32 igtk_cipher;
54 	__le32 bigtk_cipher;
55 };
56 
57 struct iwl_mld_mcast_key_data {
58 	u8 key[WOWLAN_KEY_MAX_SIZE];
59 	u8 len;
60 	u8 flags;
61 	u8 id;
62 	union {
63 		struct {
64 			struct ieee80211_key_seq aes_seq[IWL_MAX_TID_COUNT];
65 			struct ieee80211_key_seq tkip_seq[IWL_MAX_TID_COUNT];
66 		} gtk;
67 		struct {
68 			struct ieee80211_key_seq cmac_gmac_seq;
69 		} igtk_bigtk;
70 	};
71 
72 };
73 
74 /**
75  * struct iwl_mld_wowlan_status - contains wowlan status data from
76  * all wowlan notifications
77  * @wakeup_reasons: wakeup reasons, see &enum iwl_wowlan_wakeup_reason
78  * @replay_ctr: GTK rekey replay counter
79  * @pattern_number: number of the matched patterns on packets
80  * @last_qos_seq: QoS sequence counter of offloaded tid
81  * @num_of_gtk_rekeys: number of GTK rekeys during D3
82  * @tid_offloaded_tx: tid used by the firmware to transmit data packets
83  *	while in wowlan
84  * @wake_packet: wakeup packet received
85  * @wake_packet_length: wake packet length
86  * @wake_packet_bufsize: wake packet bufsize
87  * @gtk: data of the last two used gtk's by the FW upon resume
88  * @igtk: data of the last used igtk by the FW upon resume
89  * @bigtk: data of the last two used gtk's by the FW upon resume
90  * @ptk: last seq numbers per tid passed by the FW,
91  *	holds both in tkip and aes formats
92  */
93 struct iwl_mld_wowlan_status {
94 	u32 wakeup_reasons;
95 	u64 replay_ctr;
96 	u16 pattern_number;
97 	u16 last_qos_seq;
98 	u32 num_of_gtk_rekeys;
99 	u8 tid_offloaded_tx;
100 	u8 *wake_packet;
101 	u32 wake_packet_length;
102 	u32 wake_packet_bufsize;
103 	struct iwl_mld_mcast_key_data gtk[WOWLAN_GTK_KEYS_NUM];
104 	struct iwl_mld_mcast_key_data igtk;
105 	struct iwl_mld_mcast_key_data bigtk[WOWLAN_BIGTK_KEYS_NUM];
106 	struct {
107 		struct ieee80211_key_seq aes_seq[IWL_MAX_TID_COUNT];
108 		struct ieee80211_key_seq tkip_seq[IWL_MAX_TID_COUNT];
109 
110 	} ptk;
111 };
112 
113 #define NETDETECT_QUERY_BUF_LEN \
114 	(sizeof(struct iwl_scan_offload_profile_match) * \
115 	 IWL_SCAN_MAX_PROFILES_V2)
116 
117 /**
118  * struct iwl_mld_netdetect_res - contains netdetect results from
119  * match_info_notif
120  * @matched_profiles: bitmap of matched profiles, referencing the
121  *	matches passed in the scan offload request
122  * @matches: array of match information, one for each match
123  */
124 struct iwl_mld_netdetect_res {
125 	u32 matched_profiles;
126 	u8 matches[NETDETECT_QUERY_BUF_LEN];
127 };
128 
129 /**
130  * struct iwl_mld_resume_data - d3 resume flow data
131  * @notifs_expected: bitmap of expected notifications from fw,
132  *	see &enum iwl_mld_d3_notif
133  * @notifs_received: bitmap of received notifications from fw,
134  *	see &enum iwl_mld_d3_notif
135  * @d3_end_flags: bitmap of flags from d3_end_notif
136  * @notif_handling_err: error handling one of the resume notifications
137  * @wowlan_status: wowlan status data from all wowlan notifications
138  * @netdetect_res: contains netdetect results from match_info_notif
139  */
140 struct iwl_mld_resume_data {
141 	u32 notifs_expected;
142 	u32 notifs_received;
143 	u32 d3_end_flags;
144 	bool notif_handling_err;
145 	struct iwl_mld_wowlan_status *wowlan_status;
146 	struct iwl_mld_netdetect_res *netdetect_res;
147 };
148 
149 #define IWL_WOWLAN_WAKEUP_REASON_HAS_WAKEUP_PKT \
150 	(IWL_WOWLAN_WAKEUP_BY_MAGIC_PACKET | \
151 	IWL_WOWLAN_WAKEUP_BY_PATTERN | \
152 	IWL_WAKEUP_BY_PATTERN_IPV4_TCP_SYN |\
153 	IWL_WAKEUP_BY_PATTERN_IPV4_TCP_SYN_WILDCARD |\
154 	IWL_WAKEUP_BY_PATTERN_IPV6_TCP_SYN |\
155 	IWL_WAKEUP_BY_PATTERN_IPV6_TCP_SYN_WILDCARD)
156 
157 #define IWL_WOWLAN_OFFLOAD_TID 0
158 
159 void iwl_mld_set_rekey_data(struct ieee80211_hw *hw,
160 			    struct ieee80211_vif *vif,
161 			    struct cfg80211_gtk_rekey_data *data)
162 {
163 	struct iwl_mld *mld = IWL_MAC80211_GET_MLD(hw);
164 	struct iwl_mld_vif *mld_vif = iwl_mld_vif_from_mac80211(vif);
165 	struct iwl_mld_wowlan_data *wowlan_data = &mld_vif->wowlan_data;
166 
167 	lockdep_assert_wiphy(mld->wiphy);
168 
169 	wowlan_data->rekey_data.kek_len = data->kek_len;
170 	wowlan_data->rekey_data.kck_len = data->kck_len;
171 	memcpy(wowlan_data->rekey_data.kek, data->kek, data->kek_len);
172 	memcpy(wowlan_data->rekey_data.kck, data->kck, data->kck_len);
173 	wowlan_data->rekey_data.akm = data->akm & 0xFF;
174 	wowlan_data->rekey_data.replay_ctr =
175 		cpu_to_le64(be64_to_cpup((const __be64 *)data->replay_ctr));
176 	wowlan_data->rekey_data.valid = true;
177 }
178 
179 #if IS_ENABLED(CONFIG_IPV6)
180 void iwl_mld_ipv6_addr_change(struct ieee80211_hw *hw,
181 			      struct ieee80211_vif *vif,
182 			      struct inet6_dev *idev)
183 {
184 	struct iwl_mld_vif *mld_vif = iwl_mld_vif_from_mac80211(vif);
185 	struct iwl_mld_wowlan_data *wowlan_data = &mld_vif->wowlan_data;
186 	struct inet6_ifaddr *ifa;
187 	int idx = 0;
188 
189 	memset(wowlan_data->tentative_addrs, 0,
190 	       sizeof(wowlan_data->tentative_addrs));
191 
192 	read_lock_bh(&idev->lock);
193 	list_for_each_entry(ifa, &idev->addr_list, if_list) {
194 		wowlan_data->target_ipv6_addrs[idx] = ifa->addr;
195 		if (ifa->flags & IFA_F_TENTATIVE)
196 			__set_bit(idx, wowlan_data->tentative_addrs);
197 		idx++;
198 		if (idx >= IWL_PROTO_OFFLOAD_NUM_IPV6_ADDRS_MAX)
199 			break;
200 	}
201 	read_unlock_bh(&idev->lock);
202 
203 	wowlan_data->num_target_ipv6_addrs = idx;
204 }
205 #endif
206 
207 static int
208 iwl_mld_netdetect_config(struct iwl_mld *mld,
209 			 struct ieee80211_vif *vif,
210 			 const struct cfg80211_wowlan *wowlan)
211 {
212 	int ret;
213 	struct cfg80211_sched_scan_request *netdetect_cfg =
214 		wowlan->nd_config;
215 	struct ieee80211_scan_ies ies = {};
216 
217 	ret = iwl_mld_scan_stop(mld, IWL_MLD_SCAN_SCHED, true);
218 	if (ret)
219 		return ret;
220 
221 	ret = iwl_mld_sched_scan_start(mld, vif, netdetect_cfg, &ies,
222 				       IWL_MLD_SCAN_NETDETECT);
223 	return ret;
224 }
225 
226 static void
227 iwl_mld_le64_to_tkip_seq(__le64 le_pn, struct ieee80211_key_seq *seq)
228 {
229 	u64 pn = le64_to_cpu(le_pn);
230 
231 	seq->tkip.iv16 = (u16)pn;
232 	seq->tkip.iv32 = (u32)(pn >> 16);
233 }
234 
235 static void
236 iwl_mld_le64_to_aes_seq(__le64 le_pn, struct ieee80211_key_seq *seq)
237 {
238 	u64 pn = le64_to_cpu(le_pn);
239 
240 	seq->ccmp.pn[0] = pn >> 40;
241 	seq->ccmp.pn[1] = pn >> 32;
242 	seq->ccmp.pn[2] = pn >> 24;
243 	seq->ccmp.pn[3] = pn >> 16;
244 	seq->ccmp.pn[4] = pn >> 8;
245 	seq->ccmp.pn[5] = pn;
246 }
247 
248 static void
249 iwl_mld_convert_gtk_resume_seq(struct iwl_mld_mcast_key_data *gtk_data,
250 			       const struct iwl_wowlan_all_rsc_tsc_v5 *sc,
251 			       int rsc_idx)
252 {
253 	struct ieee80211_key_seq *aes_seq = gtk_data->gtk.aes_seq;
254 	struct ieee80211_key_seq *tkip_seq = gtk_data->gtk.tkip_seq;
255 
256 	if (rsc_idx >= ARRAY_SIZE(sc->mcast_rsc))
257 		return;
258 
259 	/* We store both the TKIP and AES representations coming from the
260 	 * FW because we decode the data from there before we iterate
261 	 * the keys and know which type is used.
262 	 */
263 	for (int tid = 0; tid < IWL_MAX_TID_COUNT; tid++) {
264 		iwl_mld_le64_to_tkip_seq(sc->mcast_rsc[rsc_idx][tid],
265 					 &tkip_seq[tid]);
266 		iwl_mld_le64_to_aes_seq(sc->mcast_rsc[rsc_idx][tid],
267 					&aes_seq[tid]);
268 	}
269 }
270 
271 static void
272 iwl_mld_convert_gtk_resume_data(struct iwl_mld *mld,
273 				struct iwl_mld_wowlan_status *wowlan_status,
274 				const struct iwl_wowlan_gtk_status_v3 *gtk_data,
275 				const struct iwl_wowlan_all_rsc_tsc_v5 *sc)
276 {
277 	int status_idx = 0;
278 
279 	BUILD_BUG_ON(sizeof(wowlan_status->gtk[0].key) <
280 		     sizeof(gtk_data[0].key));
281 	BUILD_BUG_ON(ARRAY_SIZE(wowlan_status->gtk) < WOWLAN_GTK_KEYS_NUM);
282 
283 	for (int notif_idx = 0; notif_idx < ARRAY_SIZE(wowlan_status->gtk);
284 	     notif_idx++) {
285 		int rsc_idx;
286 
287 		if (!(gtk_data[notif_idx].key_len))
288 			continue;
289 
290 		wowlan_status->gtk[status_idx].len =
291 			gtk_data[notif_idx].key_len;
292 		wowlan_status->gtk[status_idx].flags =
293 			gtk_data[notif_idx].key_flags;
294 		wowlan_status->gtk[status_idx].id =
295 			wowlan_status->gtk[status_idx].flags &
296 			IWL_WOWLAN_GTK_IDX_MASK;
297 		memcpy(wowlan_status->gtk[status_idx].key,
298 		       gtk_data[notif_idx].key,
299 		       sizeof(gtk_data[notif_idx].key));
300 
301 		/* The rsc for both gtk keys are stored in gtk[0]->sc->mcast_rsc
302 		 * The gtk ids can be any two numbers between 0 and 3,
303 		 * the id_map maps between the key id and the index in sc->mcast
304 		 */
305 		rsc_idx =
306 			sc->mcast_key_id_map[wowlan_status->gtk[status_idx].id];
307 		iwl_mld_convert_gtk_resume_seq(&wowlan_status->gtk[status_idx],
308 					       sc, rsc_idx);
309 
310 		/* if it's as long as the TKIP encryption key, copy MIC key */
311 		if (wowlan_status->gtk[status_idx].len ==
312 		    NL80211_TKIP_DATA_OFFSET_TX_MIC_KEY)
313 			memcpy(wowlan_status->gtk[status_idx].key +
314 			       NL80211_TKIP_DATA_OFFSET_RX_MIC_KEY,
315 			       gtk_data[notif_idx].tkip_mic_key,
316 			       sizeof(gtk_data[notif_idx].tkip_mic_key));
317 		status_idx++;
318 	}
319 }
320 
321 static void
322 iwl_mld_convert_ptk_resume_seq(struct iwl_mld *mld,
323 			       struct iwl_mld_wowlan_status *wowlan_status,
324 			       const struct iwl_wowlan_all_rsc_tsc_v5 *sc)
325 {
326 	struct ieee80211_key_seq *aes_seq = wowlan_status->ptk.aes_seq;
327 	struct ieee80211_key_seq *tkip_seq = wowlan_status->ptk.tkip_seq;
328 
329 	BUILD_BUG_ON(ARRAY_SIZE(sc->ucast_rsc) != IWL_MAX_TID_COUNT);
330 
331 	for (int tid = 0; tid < IWL_MAX_TID_COUNT; tid++) {
332 		iwl_mld_le64_to_aes_seq(sc->ucast_rsc[tid], &aes_seq[tid]);
333 		iwl_mld_le64_to_tkip_seq(sc->ucast_rsc[tid], &tkip_seq[tid]);
334 	}
335 }
336 
337 static void
338 iwl_mld_convert_mcast_ipn(struct iwl_mld_mcast_key_data *key_status,
339 			  const struct iwl_wowlan_igtk_status *key)
340 {
341 	struct ieee80211_key_seq *seq =
342 		&key_status->igtk_bigtk.cmac_gmac_seq;
343 	u8 ipn_len = ARRAY_SIZE(key->ipn);
344 
345 	BUILD_BUG_ON(ipn_len != ARRAY_SIZE(seq->aes_gmac.pn));
346 	BUILD_BUG_ON(ipn_len != ARRAY_SIZE(seq->aes_cmac.pn));
347 	BUILD_BUG_ON(offsetof(struct ieee80211_key_seq, aes_gmac) !=
348 		     offsetof(struct ieee80211_key_seq, aes_cmac));
349 
350 	/* mac80211 expects big endian for memcmp() to work, convert.
351 	 * We don't have the key cipher yet so copy to both to cmac and gmac
352 	 */
353 	for (int i = 0; i < ipn_len; i++) {
354 		seq->aes_gmac.pn[i] = key->ipn[ipn_len - i - 1];
355 		seq->aes_cmac.pn[i] = key->ipn[ipn_len - i - 1];
356 	}
357 }
358 
359 static void
360 iwl_mld_convert_igtk_resume_data(struct iwl_mld_wowlan_status *wowlan_status,
361 				 const struct iwl_wowlan_igtk_status *igtk)
362 {
363 	BUILD_BUG_ON(sizeof(wowlan_status->igtk.key) < sizeof(igtk->key));
364 
365 	if (!igtk->key_len)
366 		return;
367 
368 	wowlan_status->igtk.len = igtk->key_len;
369 	wowlan_status->igtk.flags = igtk->key_flags;
370 	wowlan_status->igtk.id =
371 		u32_get_bits(igtk->key_flags,
372 			     IWL_WOWLAN_IGTK_BIGTK_IDX_MASK) +
373 		WOWLAN_IGTK_MIN_INDEX;
374 
375 	memcpy(wowlan_status->igtk.key, igtk->key, sizeof(igtk->key));
376 	iwl_mld_convert_mcast_ipn(&wowlan_status->igtk, igtk);
377 }
378 
379 static void
380 iwl_mld_convert_bigtk_resume_data(struct iwl_mld_wowlan_status *wowlan_status,
381 				  const struct iwl_wowlan_igtk_status *bigtk)
382 {
383 	int status_idx = 0;
384 
385 	BUILD_BUG_ON(ARRAY_SIZE(wowlan_status->bigtk) < WOWLAN_BIGTK_KEYS_NUM);
386 
387 	for (int notif_idx = 0; notif_idx < WOWLAN_BIGTK_KEYS_NUM;
388 	     notif_idx++) {
389 		if (!bigtk[notif_idx].key_len)
390 			continue;
391 
392 		wowlan_status->bigtk[status_idx].len = bigtk[notif_idx].key_len;
393 		wowlan_status->bigtk[status_idx].flags =
394 			bigtk[notif_idx].key_flags;
395 		wowlan_status->bigtk[status_idx].id =
396 			u32_get_bits(bigtk[notif_idx].key_flags,
397 				     IWL_WOWLAN_IGTK_BIGTK_IDX_MASK)
398 			+ WOWLAN_BIGTK_MIN_INDEX;
399 
400 		BUILD_BUG_ON(sizeof(wowlan_status->bigtk[status_idx].key) <
401 			     sizeof(bigtk[notif_idx].key));
402 		memcpy(wowlan_status->bigtk[status_idx].key,
403 		       bigtk[notif_idx].key, sizeof(bigtk[notif_idx].key));
404 		iwl_mld_convert_mcast_ipn(&wowlan_status->bigtk[status_idx],
405 					  &bigtk[notif_idx]);
406 		status_idx++;
407 	}
408 }
409 
410 static bool
411 iwl_mld_handle_wowlan_info_notif(struct iwl_mld *mld,
412 				 struct iwl_mld_wowlan_status *wowlan_status,
413 				 struct iwl_rx_packet *pkt)
414 {
415 	const struct iwl_wowlan_info_notif *notif = (void *)pkt->data;
416 	u32 expected_len, len = iwl_rx_packet_payload_len(pkt);
417 
418 	expected_len = sizeof(*notif);
419 
420 	if (IWL_FW_CHECK(mld, len < expected_len,
421 			 "Invalid wowlan_info_notif (expected=%ud got=%ud)\n",
422 			 expected_len, len))
423 		return true;
424 
425 	if (IWL_FW_CHECK(mld, notif->tid_offloaded_tx != IWL_WOWLAN_OFFLOAD_TID,
426 			 "Invalid tid_offloaded_tx %d\n",
427 			 wowlan_status->tid_offloaded_tx))
428 		return true;
429 
430 	iwl_mld_convert_gtk_resume_data(mld, wowlan_status, notif->gtk,
431 					&notif->gtk[0].sc);
432 	iwl_mld_convert_ptk_resume_seq(mld, wowlan_status, &notif->gtk[0].sc);
433 	/* only one igtk is passed by FW */
434 	iwl_mld_convert_igtk_resume_data(wowlan_status, &notif->igtk[0]);
435 	iwl_mld_convert_bigtk_resume_data(wowlan_status, notif->bigtk);
436 
437 	wowlan_status->replay_ctr = le64_to_cpu(notif->replay_ctr);
438 	wowlan_status->pattern_number = le16_to_cpu(notif->pattern_number);
439 
440 	wowlan_status->tid_offloaded_tx = notif->tid_offloaded_tx;
441 	wowlan_status->last_qos_seq = le16_to_cpu(notif->qos_seq_ctr);
442 	wowlan_status->num_of_gtk_rekeys =
443 		le32_to_cpu(notif->num_of_gtk_rekeys);
444 	wowlan_status->wakeup_reasons = le32_to_cpu(notif->wakeup_reasons);
445 	return false;
446 	/* TODO: mlo_links (task=MLO)*/
447 }
448 
449 static bool
450 iwl_mld_handle_wake_pkt_notif(struct iwl_mld *mld,
451 			      struct iwl_mld_wowlan_status *wowlan_status,
452 			      struct iwl_rx_packet *pkt)
453 {
454 	const struct iwl_wowlan_wake_pkt_notif *notif = (void *)pkt->data;
455 	u32 actual_size, len = iwl_rx_packet_payload_len(pkt);
456 	u32 expected_size = le32_to_cpu(notif->wake_packet_length);
457 
458 	if (IWL_FW_CHECK(mld, len < sizeof(*notif),
459 			 "Invalid WoWLAN wake packet notification (expected size=%zu got=%u)\n",
460 			 sizeof(*notif), len))
461 		return true;
462 
463 	if (IWL_FW_CHECK(mld, !(wowlan_status->wakeup_reasons &
464 				IWL_WOWLAN_WAKEUP_REASON_HAS_WAKEUP_PKT),
465 			 "Got wake packet but wakeup reason is %x\n",
466 			 wowlan_status->wakeup_reasons))
467 		return true;
468 
469 	actual_size = len - offsetof(struct iwl_wowlan_wake_pkt_notif,
470 				     wake_packet);
471 
472 	/* actual_size got the padding from the notification, remove it. */
473 	if (expected_size < actual_size)
474 		actual_size = expected_size;
475 	wowlan_status->wake_packet = kmemdup(notif->wake_packet, actual_size,
476 					     GFP_ATOMIC);
477 	if (!wowlan_status->wake_packet)
478 		return true;
479 
480 	wowlan_status->wake_packet_length = expected_size;
481 	wowlan_status->wake_packet_bufsize = actual_size;
482 
483 	return false;
484 }
485 
486 static void
487 iwl_mld_set_wake_packet(struct iwl_mld *mld,
488 			struct ieee80211_vif *vif,
489 			const struct iwl_mld_wowlan_status *wowlan_status,
490 			struct cfg80211_wowlan_wakeup *wakeup,
491 			struct sk_buff **_pkt)
492 {
493 	int pkt_bufsize = wowlan_status->wake_packet_bufsize;
494 	int expected_pktlen = wowlan_status->wake_packet_length;
495 	const u8 *pktdata = wowlan_status->wake_packet;
496 	const struct ieee80211_hdr *hdr = (const void *)pktdata;
497 	int truncated = expected_pktlen - pkt_bufsize;
498 
499 	if (ieee80211_is_data(hdr->frame_control)) {
500 		int hdrlen = ieee80211_hdrlen(hdr->frame_control);
501 		int ivlen = 0, icvlen = 4; /* also FCS */
502 
503 		struct sk_buff *pkt = alloc_skb(pkt_bufsize, GFP_KERNEL);
504 		*_pkt = pkt;
505 		if (!pkt)
506 			return;
507 
508 		skb_put_data(pkt, pktdata, hdrlen);
509 		pktdata += hdrlen;
510 		pkt_bufsize -= hdrlen;
511 
512 		/* if truncated, FCS/ICV is (partially) gone */
513 		if (truncated >= icvlen) {
514 			truncated -= icvlen;
515 			icvlen = 0;
516 		} else {
517 			icvlen -= truncated;
518 			truncated = 0;
519 		}
520 
521 		pkt_bufsize -= ivlen + icvlen;
522 		pktdata += ivlen;
523 
524 		skb_put_data(pkt, pktdata, pkt_bufsize);
525 
526 		if (ieee80211_data_to_8023(pkt, vif->addr, vif->type))
527 			return;
528 		wakeup->packet = pkt->data;
529 		wakeup->packet_present_len = pkt->len;
530 		wakeup->packet_len = pkt->len - truncated;
531 		wakeup->packet_80211 = false;
532 	} else {
533 		int fcslen = 4;
534 
535 		if (truncated >= 4) {
536 			truncated -= 4;
537 			fcslen = 0;
538 		} else {
539 			fcslen -= truncated;
540 			truncated = 0;
541 		}
542 		pkt_bufsize -= fcslen;
543 		wakeup->packet = wowlan_status->wake_packet;
544 		wakeup->packet_present_len = pkt_bufsize;
545 		wakeup->packet_len = expected_pktlen - truncated;
546 		wakeup->packet_80211 = true;
547 	}
548 }
549 
550 static void
551 iwl_mld_report_wowlan_wakeup(struct iwl_mld *mld,
552 			     struct ieee80211_vif *vif,
553 			     struct iwl_mld_wowlan_status *wowlan_status)
554 {
555 	struct sk_buff *pkt = NULL;
556 	struct cfg80211_wowlan_wakeup wakeup = {
557 		.pattern_idx = -1,
558 	};
559 	u32 reasons = wowlan_status->wakeup_reasons;
560 
561 	if (reasons == IWL_WOWLAN_WAKEUP_BY_NON_WIRELESS) {
562 		ieee80211_report_wowlan_wakeup(vif, NULL, GFP_KERNEL);
563 		return;
564 	}
565 
566 	pm_wakeup_event(mld->dev, 0);
567 
568 	if (reasons & IWL_WOWLAN_WAKEUP_BY_MAGIC_PACKET)
569 		wakeup.magic_pkt = true;
570 
571 	if (reasons & IWL_WOWLAN_WAKEUP_BY_PATTERN)
572 		wakeup.pattern_idx =
573 			wowlan_status->pattern_number;
574 
575 	if (reasons & (IWL_WOWLAN_WAKEUP_BY_DISCONNECTION_ON_MISSED_BEACON |
576 		       IWL_WOWLAN_WAKEUP_BY_DISCONNECTION_ON_DEAUTH |
577 		       IWL_WOWLAN_WAKEUP_BY_GTK_REKEY_FAILURE))
578 		wakeup.disconnect = true;
579 
580 	if (reasons & IWL_WOWLAN_WAKEUP_BY_GTK_REKEY_FAILURE)
581 		wakeup.gtk_rekey_failure = true;
582 
583 	if (reasons & IWL_WOWLAN_WAKEUP_BY_RFKILL_DEASSERTED)
584 		wakeup.rfkill_release = true;
585 
586 	if (reasons & IWL_WOWLAN_WAKEUP_BY_EAPOL_REQUEST)
587 		wakeup.eap_identity_req = true;
588 
589 	if (reasons & IWL_WOWLAN_WAKEUP_BY_FOUR_WAY_HANDSHAKE)
590 		wakeup.four_way_handshake = true;
591 
592 	if (reasons & IWL_WOWLAN_WAKEUP_BY_REM_WAKE_LINK_LOSS)
593 		wakeup.tcp_connlost = true;
594 
595 	if (reasons & IWL_WOWLAN_WAKEUP_BY_REM_WAKE_SIGNATURE_TABLE)
596 		wakeup.tcp_nomoretokens = true;
597 
598 	if (reasons & IWL_WOWLAN_WAKEUP_BY_REM_WAKE_WAKEUP_PACKET)
599 		wakeup.tcp_match = true;
600 
601 	if (reasons & IWL_WAKEUP_BY_11W_UNPROTECTED_DEAUTH_OR_DISASSOC)
602 		wakeup.unprot_deauth_disassoc = true;
603 
604 	if (wowlan_status->wake_packet)
605 		iwl_mld_set_wake_packet(mld, vif, wowlan_status, &wakeup, &pkt);
606 
607 	ieee80211_report_wowlan_wakeup(vif, &wakeup, GFP_KERNEL);
608 	kfree_skb(pkt);
609 }
610 
611 static void
612 iwl_mld_set_key_rx_seq_tids(struct ieee80211_key_conf *key,
613 			    struct ieee80211_key_seq *seq)
614 {
615 	int tid;
616 
617 	for (tid = 0; tid < IWL_MAX_TID_COUNT; tid++)
618 		ieee80211_set_key_rx_seq(key, tid, &seq[tid]);
619 }
620 
621 static void
622 iwl_mld_set_key_rx_seq(struct ieee80211_key_conf *key,
623 		       struct iwl_mld_mcast_key_data *key_data)
624 {
625 	switch (key->cipher) {
626 	case WLAN_CIPHER_SUITE_CCMP:
627 	case WLAN_CIPHER_SUITE_GCMP:
628 	case WLAN_CIPHER_SUITE_GCMP_256:
629 		iwl_mld_set_key_rx_seq_tids(key,
630 					    key_data->gtk.aes_seq);
631 		break;
632 	case WLAN_CIPHER_SUITE_TKIP:
633 		iwl_mld_set_key_rx_seq_tids(key,
634 					    key_data->gtk.tkip_seq);
635 		break;
636 	case WLAN_CIPHER_SUITE_BIP_GMAC_128:
637 	case WLAN_CIPHER_SUITE_BIP_GMAC_256:
638 	case WLAN_CIPHER_SUITE_BIP_CMAC_256:
639 	case WLAN_CIPHER_SUITE_AES_CMAC:
640 		/* igtk/bigtk ciphers*/
641 		ieee80211_set_key_rx_seq(key, 0,
642 					 &key_data->igtk_bigtk.cmac_gmac_seq);
643 		break;
644 	default:
645 		WARN_ON(1);
646 	}
647 }
648 
649 static void
650 iwl_mld_update_ptk_rx_seq(struct iwl_mld *mld,
651 			  struct iwl_mld_wowlan_status *wowlan_status,
652 			  struct ieee80211_sta *sta,
653 			  struct ieee80211_key_conf *key,
654 			  bool is_tkip)
655 {
656 	struct iwl_mld_sta *mld_sta =
657 		iwl_mld_sta_from_mac80211(sta);
658 	struct iwl_mld_ptk_pn *mld_ptk_pn =
659 		wiphy_dereference(mld->wiphy,
660 				  mld_sta->ptk_pn[key->keyidx]);
661 
662 	iwl_mld_set_key_rx_seq_tids(key, is_tkip ?
663 				    wowlan_status->ptk.tkip_seq :
664 				    wowlan_status->ptk.aes_seq);
665 	if (is_tkip)
666 		return;
667 
668 	if (WARN_ON(!mld_ptk_pn))
669 		return;
670 
671 	for (int tid = 0; tid < IWL_MAX_TID_COUNT; tid++) {
672 		for (int i = 1; i < mld->trans->info.num_rxqs; i++)
673 			memcpy(mld_ptk_pn->q[i].pn[tid],
674 			       wowlan_status->ptk.aes_seq[tid].ccmp.pn,
675 			       IEEE80211_CCMP_PN_LEN);
676 	}
677 }
678 
679 static void
680 iwl_mld_resume_keys_iter(struct ieee80211_hw *hw,
681 			 struct ieee80211_vif *vif,
682 			 struct ieee80211_sta *sta,
683 			 struct ieee80211_key_conf *key,
684 			 void *_data)
685 {
686 	struct iwl_mld_resume_key_iter_data *data = _data;
687 	struct iwl_mld_wowlan_status *wowlan_status = data->wowlan_status;
688 	u8 status_idx;
689 
690 	/* TODO: check key link id (task=MLO) */
691 	if (data->unhandled_cipher)
692 		return;
693 
694 	switch (key->cipher) {
695 	case WLAN_CIPHER_SUITE_WEP40:
696 	case WLAN_CIPHER_SUITE_WEP104:
697 		/* ignore WEP completely, nothing to do */
698 		return;
699 	case WLAN_CIPHER_SUITE_CCMP:
700 	case WLAN_CIPHER_SUITE_GCMP:
701 	case WLAN_CIPHER_SUITE_GCMP_256:
702 	case WLAN_CIPHER_SUITE_TKIP:
703 		if (sta) {
704 			iwl_mld_update_ptk_rx_seq(data->mld, wowlan_status,
705 						  sta, key,
706 						  key->cipher ==
707 						  WLAN_CIPHER_SUITE_TKIP);
708 			return;
709 		}
710 
711 		if (WARN_ON(data->gtk_cipher &&
712 			    data->gtk_cipher != key->cipher))
713 			return;
714 
715 		data->gtk_cipher = key->cipher;
716 		status_idx = key->keyidx == wowlan_status->gtk[1].id;
717 		iwl_mld_set_key_rx_seq(key, &wowlan_status->gtk[status_idx]);
718 		break;
719 	case WLAN_CIPHER_SUITE_BIP_GMAC_128:
720 	case WLAN_CIPHER_SUITE_BIP_GMAC_256:
721 	case WLAN_CIPHER_SUITE_BIP_CMAC_256:
722 	case WLAN_CIPHER_SUITE_AES_CMAC:
723 		if (key->keyidx == 4 || key->keyidx == 5) {
724 			if (WARN_ON(data->igtk_cipher &&
725 				    data->igtk_cipher != key->cipher))
726 				return;
727 
728 			data->igtk_cipher = key->cipher;
729 			if (key->keyidx == wowlan_status->igtk.id)
730 				iwl_mld_set_key_rx_seq(key, &wowlan_status->igtk);
731 		}
732 		if (key->keyidx == 6 || key->keyidx == 7) {
733 			if (WARN_ON(data->bigtk_cipher &&
734 				    data->bigtk_cipher != key->cipher))
735 				return;
736 
737 			data->bigtk_cipher = key->cipher;
738 			status_idx = key->keyidx == wowlan_status->bigtk[1].id;
739 			iwl_mld_set_key_rx_seq(key, &wowlan_status->bigtk[status_idx]);
740 		}
741 		break;
742 	default:
743 		data->unhandled_cipher = true;
744 		return;
745 	}
746 	data->num_keys++;
747 }
748 
749 static void
750 iwl_mld_add_mcast_rekey(struct ieee80211_vif *vif,
751 			struct iwl_mld *mld,
752 			struct iwl_mld_mcast_key_data *key_data,
753 			struct ieee80211_bss_conf *link_conf,
754 			u32 cipher)
755 {
756 	struct ieee80211_key_conf *key_config;
757 	struct {
758 		struct ieee80211_key_conf conf;
759 		u8 key[WOWLAN_KEY_MAX_SIZE];
760 	} conf = {
761 		.conf.cipher = cipher,
762 		.conf.keyidx = key_data->id,
763 	};
764 	int link_id = vif->active_links ? __ffs(vif->active_links) : -1;
765 
766 	BUILD_BUG_ON(WLAN_KEY_LEN_CCMP != WLAN_KEY_LEN_GCMP);
767 	BUILD_BUG_ON(sizeof(conf.key) < WLAN_KEY_LEN_CCMP);
768 	BUILD_BUG_ON(sizeof(conf.key) < WLAN_KEY_LEN_GCMP_256);
769 	BUILD_BUG_ON(sizeof(conf.key) < WLAN_KEY_LEN_TKIP);
770 	BUILD_BUG_ON(sizeof(conf.key) < WLAN_KEY_LEN_BIP_GMAC_128);
771 	BUILD_BUG_ON(sizeof(conf.key) < WLAN_KEY_LEN_BIP_GMAC_256);
772 	BUILD_BUG_ON(sizeof(conf.key) < WLAN_KEY_LEN_AES_CMAC);
773 	BUILD_BUG_ON(sizeof(conf.key) < sizeof(key_data->key));
774 
775 	if (!key_data->len)
776 		return;
777 
778 	switch (cipher) {
779 	case WLAN_CIPHER_SUITE_CCMP:
780 	case WLAN_CIPHER_SUITE_GCMP:
781 		conf.conf.keylen = WLAN_KEY_LEN_CCMP;
782 		break;
783 	case WLAN_CIPHER_SUITE_GCMP_256:
784 		conf.conf.keylen = WLAN_KEY_LEN_GCMP_256;
785 		break;
786 	case WLAN_CIPHER_SUITE_TKIP:
787 		conf.conf.keylen = WLAN_KEY_LEN_TKIP;
788 		break;
789 	case WLAN_CIPHER_SUITE_BIP_GMAC_128:
790 		conf.conf.keylen = WLAN_KEY_LEN_BIP_GMAC_128;
791 		break;
792 	case WLAN_CIPHER_SUITE_BIP_GMAC_256:
793 		conf.conf.keylen = WLAN_KEY_LEN_BIP_GMAC_256;
794 		break;
795 	case WLAN_CIPHER_SUITE_AES_CMAC:
796 		conf.conf.keylen = WLAN_KEY_LEN_AES_CMAC;
797 		break;
798 	case WLAN_CIPHER_SUITE_BIP_CMAC_256:
799 		conf.conf.keylen = WLAN_KEY_LEN_BIP_CMAC_256;
800 		break;
801 	default:
802 		WARN_ON(1);
803 	}
804 
805 	memcpy(conf.conf.key, key_data->key, conf.conf.keylen);
806 	key_config = ieee80211_gtk_rekey_add(vif, &conf.conf, link_id);
807 	if (IS_ERR(key_config))
808 		return;
809 
810 	iwl_mld_set_key_rx_seq(key_config, key_data);
811 
812 	/* The FW holds only one igtk so we keep track of the valid one */
813 	if (key_config->keyidx == 4 || key_config->keyidx == 5) {
814 		struct iwl_mld_link *mld_link =
815 			iwl_mld_link_from_mac80211(link_conf);
816 
817 		/* If we had more than one rekey, mac80211 will tell us to
818 		 * remove the old and add the new so we will update the IGTK in
819 		 * drv_set_key
820 		 */
821 		if (mld_link->igtk && mld_link->igtk != key_config) {
822 			/* mark the old IGTK as not in FW */
823 			mld_link->igtk->hw_key_idx = STA_KEY_IDX_INVALID;
824 			mld_link->igtk = key_config;
825 		}
826 	}
827 
828 	/* Also keep track of the new BIGTK */
829 	if ((key_config->keyidx == 6 || key_config->keyidx == 7) &&
830 	    vif->type == NL80211_IFTYPE_STATION) {
831 		struct iwl_mld_vif *mld_vif = iwl_mld_vif_from_mac80211(vif);
832 
833 		rcu_assign_pointer(mld_vif->bigtks[key_config->keyidx - 6], key_config);
834 	}
835 }
836 
837 static void
838 iwl_mld_add_all_rekeys(struct ieee80211_vif *vif,
839 		       struct iwl_mld_wowlan_status *wowlan_status,
840 		       struct iwl_mld_resume_key_iter_data *key_iter_data,
841 		       struct ieee80211_bss_conf *link_conf)
842 {
843 	int i;
844 
845 	for (i = 0; i < ARRAY_SIZE(wowlan_status->gtk); i++)
846 		iwl_mld_add_mcast_rekey(vif, key_iter_data->mld,
847 					&wowlan_status->gtk[i],
848 					link_conf,
849 					key_iter_data->gtk_cipher);
850 
851 	iwl_mld_add_mcast_rekey(vif, key_iter_data->mld,
852 				&wowlan_status->igtk,
853 				link_conf, key_iter_data->igtk_cipher);
854 
855 	for (i = 0; i < ARRAY_SIZE(wowlan_status->bigtk); i++)
856 		iwl_mld_add_mcast_rekey(vif, key_iter_data->mld,
857 					&wowlan_status->bigtk[i],
858 					link_conf,
859 					key_iter_data->bigtk_cipher);
860 }
861 
862 static bool
863 iwl_mld_update_sec_keys(struct iwl_mld *mld,
864 			struct ieee80211_vif *vif,
865 			struct iwl_mld_wowlan_status *wowlan_status)
866 {
867 	int link_id = vif->active_links ? __ffs(vif->active_links) : 0;
868 	struct ieee80211_bss_conf *link_conf =
869 		link_conf_dereference_protected(vif, link_id);
870 	__be64 replay_ctr = cpu_to_be64(wowlan_status->replay_ctr);
871 	struct iwl_mld_resume_key_iter_data key_iter_data = {
872 		.mld = mld,
873 		.wowlan_status = wowlan_status,
874 	};
875 
876 	if (WARN_ON(!link_conf))
877 		return false;
878 
879 	ieee80211_iter_keys(mld->hw, vif, iwl_mld_resume_keys_iter,
880 			    &key_iter_data);
881 
882 	if (key_iter_data.unhandled_cipher)
883 		return false;
884 
885 	IWL_DEBUG_WOWLAN(mld,
886 			 "Number of installed keys: %d, Number of rekeys: %d\n",
887 			 key_iter_data.num_keys,
888 			 wowlan_status->num_of_gtk_rekeys);
889 
890 	if (!key_iter_data.num_keys || !wowlan_status->num_of_gtk_rekeys)
891 		return true;
892 
893 	iwl_mld_add_all_rekeys(vif, wowlan_status, &key_iter_data,
894 			       link_conf);
895 
896 	ieee80211_gtk_rekey_notify(vif, link_conf->bssid,
897 				   (void *)&replay_ctr, GFP_KERNEL);
898 	/* TODO: MLO rekey (task=MLO) */
899 	return true;
900 }
901 
902 static bool
903 iwl_mld_process_wowlan_status(struct iwl_mld *mld,
904 			      struct ieee80211_vif *vif,
905 			      struct iwl_mld_wowlan_status *wowlan_status)
906 {
907 	struct iwl_mld_vif *mld_vif = iwl_mld_vif_from_mac80211(vif);
908 	struct ieee80211_sta *ap_sta = mld_vif->ap_sta;
909 	struct iwl_mld_txq *mld_txq;
910 
911 	iwl_mld_report_wowlan_wakeup(mld, vif, wowlan_status);
912 
913 	if (WARN_ON(!ap_sta))
914 		return false;
915 
916 	mld_txq =
917 		iwl_mld_txq_from_mac80211(ap_sta->txq[wowlan_status->tid_offloaded_tx]);
918 
919 	/* Update the pointers of the Tx queue that may have moved during
920 	 * suspend if the firmware sent frames.
921 	 * The firmware stores last-used value, we store next value.
922 	 */
923 	WARN_ON(!mld_txq->status.allocated);
924 	iwl_trans_set_q_ptrs(mld->trans, mld_txq->fw_id,
925 			     (wowlan_status->last_qos_seq +
926 			     0x10) >> 4);
927 
928 	if (!iwl_mld_update_sec_keys(mld, vif, wowlan_status))
929 		return false;
930 
931 	if (wowlan_status->wakeup_reasons &
932 	    (IWL_WOWLAN_WAKEUP_BY_DISCONNECTION_ON_MISSED_BEACON |
933 	     IWL_WOWLAN_WAKEUP_BY_DISCONNECTION_ON_DEAUTH |
934 	     IWL_WOWLAN_WAKEUP_BY_GTK_REKEY_FAILURE))
935 		return false;
936 
937 	return true;
938 }
939 
940 static bool
941 iwl_mld_netdetect_match_info_handler(struct iwl_mld *mld,
942 				     struct iwl_mld_resume_data *resume_data,
943 				     struct iwl_rx_packet *pkt)
944 {
945 	struct iwl_mld_netdetect_res *results = resume_data->netdetect_res;
946 	const struct iwl_scan_offload_match_info *notif = (void *)pkt->data;
947 	u32 len = iwl_rx_packet_payload_len(pkt);
948 
949 	if (IWL_FW_CHECK(mld, !mld->netdetect,
950 			 "Got scan match info notif when mld->netdetect==%d\n",
951 			 mld->netdetect))
952 		return true;
953 
954 	if (IWL_FW_CHECK(mld, len < sizeof(*notif),
955 			 "Invalid scan offload match notif of length: %d\n",
956 			 len))
957 		return true;
958 
959 	if (IWL_FW_CHECK(mld, resume_data->wowlan_status->wakeup_reasons !=
960 			 IWL_WOWLAN_WAKEUP_BY_NON_WIRELESS,
961 			 "Ignore scan match info: unexpected wakeup reason (expected=0x%x got=0x%x)\n",
962 			 IWL_WOWLAN_WAKEUP_BY_NON_WIRELESS,
963 			 resume_data->wowlan_status->wakeup_reasons))
964 		return true;
965 
966 	results->matched_profiles = le32_to_cpu(notif->matched_profiles);
967 	IWL_DEBUG_WOWLAN(mld, "number of matched profiles=%u\n",
968 			 results->matched_profiles);
969 
970 	if (results->matched_profiles)
971 		memcpy(results->matches, notif->matches,
972 		       NETDETECT_QUERY_BUF_LEN);
973 
974 	/* No scan should be active at this point */
975 	mld->scan.status = 0;
976 	memset(mld->scan.uid_status, 0, sizeof(mld->scan.uid_status));
977 	return false;
978 }
979 
980 static void
981 iwl_mld_set_netdetect_info(struct iwl_mld *mld,
982 			   const struct cfg80211_sched_scan_request *netdetect_cfg,
983 			   struct cfg80211_wowlan_nd_info *netdetect_info,
984 			   struct iwl_mld_netdetect_res *netdetect_res,
985 			   unsigned long matched_profiles)
986 {
987 	int i;
988 
989 	for_each_set_bit(i, &matched_profiles, netdetect_cfg->n_match_sets) {
990 		struct cfg80211_wowlan_nd_match *match;
991 		int idx, j, n_channels = 0;
992 		struct iwl_scan_offload_profile_match *matches =
993 			(void *)netdetect_res->matches;
994 
995 		for (int k = 0; k < SCAN_OFFLOAD_MATCHING_CHANNELS_LEN; k++)
996 			n_channels +=
997 				hweight8(matches[i].matching_channels[k]);
998 		match = kzalloc(struct_size(match, channels, n_channels),
999 				GFP_KERNEL);
1000 		if (!match)
1001 			return;
1002 
1003 		netdetect_info->matches[netdetect_info->n_matches] = match;
1004 		netdetect_info->n_matches++;
1005 
1006 		/* We inverted the order of the SSIDs in the scan
1007 		 * request, so invert the index here.
1008 		 */
1009 		idx = netdetect_cfg->n_match_sets - i - 1;
1010 		match->ssid.ssid_len =
1011 			netdetect_cfg->match_sets[idx].ssid.ssid_len;
1012 		memcpy(match->ssid.ssid,
1013 		       netdetect_cfg->match_sets[idx].ssid.ssid,
1014 		       match->ssid.ssid_len);
1015 
1016 		if (netdetect_cfg->n_channels < n_channels)
1017 			continue;
1018 
1019 		for_each_set_bit(j,
1020 				 (unsigned long *)&matches[i].matching_channels[0],
1021 				 sizeof(matches[i].matching_channels)) {
1022 			match->channels[match->n_channels] =
1023 				netdetect_cfg->channels[j]->center_freq;
1024 			match->n_channels++;
1025 		}
1026 	}
1027 }
1028 
1029 static void
1030 iwl_mld_process_netdetect_res(struct iwl_mld *mld,
1031 			      struct ieee80211_vif *vif,
1032 			      struct iwl_mld_resume_data *resume_data)
1033 {
1034 	struct cfg80211_wowlan_nd_info *netdetect_info = NULL;
1035 	const struct cfg80211_sched_scan_request *netdetect_cfg;
1036 	struct cfg80211_wowlan_wakeup wakeup = {
1037 		.pattern_idx = -1,
1038 	};
1039 	struct cfg80211_wowlan_wakeup *wakeup_report = &wakeup;
1040 	unsigned long matched_profiles;
1041 	u32 wakeup_reasons;
1042 	int n_matches;
1043 
1044 	lockdep_assert_wiphy(mld->wiphy);
1045 
1046 	if (WARN_ON(!mld->wiphy->wowlan_config ||
1047 		    !mld->wiphy->wowlan_config->nd_config)) {
1048 		IWL_DEBUG_WOWLAN(mld,
1049 				 "Netdetect isn't configured on resume flow\n");
1050 		goto out;
1051 	}
1052 
1053 	netdetect_cfg = mld->wiphy->wowlan_config->nd_config;
1054 	wakeup_reasons = resume_data->wowlan_status->wakeup_reasons;
1055 
1056 	if (wakeup_reasons & IWL_WOWLAN_WAKEUP_BY_RFKILL_DEASSERTED)
1057 		wakeup.rfkill_release = true;
1058 
1059 	if (wakeup_reasons != IWL_WOWLAN_WAKEUP_BY_NON_WIRELESS)
1060 		goto out;
1061 
1062 	if (!resume_data->netdetect_res->matched_profiles) {
1063 		IWL_DEBUG_WOWLAN(mld,
1064 				 "Netdetect results aren't valid\n");
1065 		wakeup_report = NULL;
1066 		goto out;
1067 	}
1068 
1069 	matched_profiles = resume_data->netdetect_res->matched_profiles;
1070 	if (!netdetect_cfg->n_match_sets) {
1071 		IWL_DEBUG_WOWLAN(mld,
1072 				 "No netdetect match sets are configured\n");
1073 		goto out;
1074 	}
1075 	n_matches = hweight_long(matched_profiles);
1076 	netdetect_info = kzalloc(struct_size(netdetect_info, matches,
1077 					     n_matches), GFP_KERNEL);
1078 	if (netdetect_info)
1079 		iwl_mld_set_netdetect_info(mld, netdetect_cfg, netdetect_info,
1080 					   resume_data->netdetect_res,
1081 					   matched_profiles);
1082 
1083 	wakeup.net_detect = netdetect_info;
1084  out:
1085 	ieee80211_report_wowlan_wakeup(vif, wakeup_report, GFP_KERNEL);
1086 	if (netdetect_info) {
1087 		for (int i = 0; i < netdetect_info->n_matches; i++)
1088 			kfree(netdetect_info->matches[i]);
1089 		kfree(netdetect_info);
1090 	}
1091 }
1092 
1093 static bool iwl_mld_handle_d3_notif(struct iwl_notif_wait_data *notif_wait,
1094 				    struct iwl_rx_packet *pkt, void *data)
1095 {
1096 	struct iwl_mld_resume_data *resume_data = data;
1097 	struct iwl_mld *mld =
1098 		container_of(notif_wait, struct iwl_mld, notif_wait);
1099 
1100 	switch (WIDE_ID(pkt->hdr.group_id, pkt->hdr.cmd)) {
1101 	case WIDE_ID(PROT_OFFLOAD_GROUP, WOWLAN_INFO_NOTIFICATION): {
1102 		if (resume_data->notifs_received & IWL_D3_NOTIF_WOWLAN_INFO) {
1103 			IWL_DEBUG_WOWLAN(mld,
1104 					 "got additional wowlan_info notif\n");
1105 			break;
1106 		}
1107 		resume_data->notif_handling_err =
1108 			iwl_mld_handle_wowlan_info_notif(mld,
1109 							 resume_data->wowlan_status,
1110 							 pkt);
1111 		resume_data->notifs_received |= IWL_D3_NOTIF_WOWLAN_INFO;
1112 
1113 		if (resume_data->wowlan_status->wakeup_reasons &
1114 		    IWL_WOWLAN_WAKEUP_REASON_HAS_WAKEUP_PKT)
1115 			resume_data->notifs_expected |=
1116 				IWL_D3_NOTIF_WOWLAN_WAKE_PKT;
1117 		break;
1118 	}
1119 	case WIDE_ID(PROT_OFFLOAD_GROUP, WOWLAN_WAKE_PKT_NOTIFICATION): {
1120 		if (resume_data->notifs_received &
1121 		    IWL_D3_NOTIF_WOWLAN_WAKE_PKT) {
1122 			/* We shouldn't get two wake packet notifications */
1123 			IWL_DEBUG_WOWLAN(mld,
1124 					 "Got additional wowlan wake packet notification\n");
1125 			break;
1126 		}
1127 		resume_data->notif_handling_err =
1128 			iwl_mld_handle_wake_pkt_notif(mld,
1129 						      resume_data->wowlan_status,
1130 						      pkt);
1131 		resume_data->notifs_received |= IWL_D3_NOTIF_WOWLAN_WAKE_PKT;
1132 		break;
1133 	}
1134 	case WIDE_ID(SCAN_GROUP, OFFLOAD_MATCH_INFO_NOTIF): {
1135 		if (resume_data->notifs_received & IWL_D3_ND_MATCH_INFO) {
1136 			IWL_ERR(mld,
1137 				"Got additional netdetect match info\n");
1138 			break;
1139 		}
1140 
1141 		resume_data->notif_handling_err =
1142 			iwl_mld_netdetect_match_info_handler(mld, resume_data,
1143 							     pkt);
1144 		resume_data->notifs_received |= IWL_D3_ND_MATCH_INFO;
1145 		break;
1146 	}
1147 	case WIDE_ID(PROT_OFFLOAD_GROUP, D3_END_NOTIFICATION): {
1148 		struct iwl_d3_end_notif *notif = (void *)pkt->data;
1149 
1150 		resume_data->d3_end_flags = le32_to_cpu(notif->flags);
1151 		resume_data->notifs_received |= IWL_D3_NOTIF_D3_END_NOTIF;
1152 		break;
1153 	}
1154 	default:
1155 		WARN_ON(1);
1156 	}
1157 
1158 	return resume_data->notifs_received == resume_data->notifs_expected;
1159 }
1160 
1161 #define IWL_MLD_D3_NOTIF_TIMEOUT (HZ / 3)
1162 
1163 static int iwl_mld_wait_d3_notif(struct iwl_mld *mld,
1164 				 struct iwl_mld_resume_data *resume_data,
1165 				 bool with_wowlan)
1166 {
1167 	static const u16 wowlan_resume_notif[] = {
1168 		WIDE_ID(PROT_OFFLOAD_GROUP, WOWLAN_INFO_NOTIFICATION),
1169 		WIDE_ID(PROT_OFFLOAD_GROUP, WOWLAN_WAKE_PKT_NOTIFICATION),
1170 		WIDE_ID(SCAN_GROUP, OFFLOAD_MATCH_INFO_NOTIF),
1171 		WIDE_ID(PROT_OFFLOAD_GROUP, D3_END_NOTIFICATION)
1172 	};
1173 	static const u16 d3_resume_notif[] = {
1174 		WIDE_ID(PROT_OFFLOAD_GROUP, D3_END_NOTIFICATION)
1175 	};
1176 	struct iwl_notification_wait wait_d3_notif;
1177 	enum iwl_d3_status d3_status;
1178 	int ret;
1179 
1180 	if (with_wowlan)
1181 		iwl_init_notification_wait(&mld->notif_wait, &wait_d3_notif,
1182 					   wowlan_resume_notif,
1183 					   ARRAY_SIZE(wowlan_resume_notif),
1184 					   iwl_mld_handle_d3_notif,
1185 					   resume_data);
1186 	else
1187 		iwl_init_notification_wait(&mld->notif_wait, &wait_d3_notif,
1188 					   d3_resume_notif,
1189 					   ARRAY_SIZE(d3_resume_notif),
1190 					   iwl_mld_handle_d3_notif,
1191 					   resume_data);
1192 
1193 	ret = iwl_trans_d3_resume(mld->trans, &d3_status, false, false);
1194 	if (ret || d3_status != IWL_D3_STATUS_ALIVE) {
1195 		if (d3_status != IWL_D3_STATUS_ALIVE) {
1196 			IWL_INFO(mld, "Device was reset during suspend\n");
1197 			ret = -ENOENT;
1198 		} else {
1199 			IWL_ERR(mld, "Transport resume failed\n");
1200 		}
1201 		iwl_remove_notification(&mld->notif_wait, &wait_d3_notif);
1202 		return ret;
1203 	}
1204 
1205 	ret = iwl_wait_notification(&mld->notif_wait, &wait_d3_notif,
1206 				    IWL_MLD_D3_NOTIF_TIMEOUT);
1207 	if (ret)
1208 		IWL_ERR(mld, "Couldn't get the d3 notif %d\n", ret);
1209 
1210 	if (resume_data->notif_handling_err)
1211 		ret = -EIO;
1212 
1213 	return ret;
1214 }
1215 
1216 int iwl_mld_no_wowlan_suspend(struct iwl_mld *mld)
1217 {
1218 	struct iwl_d3_manager_config d3_cfg_cmd_data = {};
1219 	int ret;
1220 
1221 	if (mld->debug_max_sleep) {
1222 		d3_cfg_cmd_data.wakeup_host_timer =
1223 			cpu_to_le32(mld->debug_max_sleep);
1224 		d3_cfg_cmd_data.wakeup_flags =
1225 			cpu_to_le32(IWL_WAKEUP_D3_HOST_TIMER);
1226 	}
1227 
1228 	lockdep_assert_wiphy(mld->wiphy);
1229 
1230 	IWL_DEBUG_WOWLAN(mld, "Starting the no wowlan suspend flow\n");
1231 
1232 	iwl_mld_low_latency_stop(mld);
1233 
1234 	/* This will happen if iwl_mld_supsend failed with FW error */
1235 	if (mld->trans->state == IWL_TRANS_NO_FW &&
1236 	    test_bit(STATUS_FW_ERROR, &mld->trans->status))
1237 		return -ENODEV;
1238 
1239 	ret = iwl_mld_update_device_power(mld, true);
1240 	if (ret) {
1241 		IWL_ERR(mld,
1242 			"d3 suspend: couldn't send power_device %d\n", ret);
1243 		goto out;
1244 	}
1245 
1246 	ret = iwl_mld_send_cmd_pdu(mld, D3_CONFIG_CMD,
1247 				   &d3_cfg_cmd_data);
1248 	if (ret) {
1249 		IWL_ERR(mld,
1250 			"d3 suspend: couldn't send D3_CONFIG_CMD %d\n", ret);
1251 		goto out;
1252 	}
1253 
1254 	ret = iwl_trans_d3_suspend(mld->trans, false, false);
1255 	if (ret) {
1256 		IWL_ERR(mld, "d3 suspend: trans_d3_suspend failed %d\n", ret);
1257 	} else {
1258 		/* Async notification might send hcmds, which is not allowed in suspend */
1259 		iwl_mld_cancel_async_notifications(mld);
1260 		mld->fw_status.in_d3 = true;
1261 	}
1262 
1263  out:
1264 	if (ret) {
1265 		mld->trans->state = IWL_TRANS_NO_FW;
1266 		set_bit(STATUS_FW_ERROR, &mld->trans->status);
1267 	}
1268 
1269 	return ret;
1270 }
1271 
1272 int iwl_mld_no_wowlan_resume(struct iwl_mld *mld)
1273 {
1274 	struct iwl_mld_resume_data resume_data = {
1275 		.notifs_expected =
1276 			IWL_D3_NOTIF_D3_END_NOTIF,
1277 	};
1278 	int ret;
1279 
1280 	lockdep_assert_wiphy(mld->wiphy);
1281 
1282 	IWL_DEBUG_WOWLAN(mld, "Starting the no wowlan resume flow\n");
1283 
1284 	mld->fw_status.in_d3 = false;
1285 	iwl_fw_dbg_read_d3_debug_data(&mld->fwrt);
1286 
1287 	ret = iwl_mld_wait_d3_notif(mld, &resume_data, false);
1288 
1289 	if (!ret && (resume_data.d3_end_flags & IWL_D0I3_RESET_REQUIRE))
1290 		return -ENODEV;
1291 
1292 	if (ret) {
1293 		mld->trans->state = IWL_TRANS_NO_FW;
1294 		set_bit(STATUS_FW_ERROR, &mld->trans->status);
1295 		return ret;
1296 	}
1297 	iwl_mld_low_latency_restart(mld);
1298 
1299 	return iwl_mld_update_device_power(mld, false);
1300 }
1301 
1302 static void
1303 iwl_mld_aes_seq_to_le64_pn(struct ieee80211_key_conf *key,
1304 			   __le64 *key_rsc)
1305 {
1306 	for (int i = 0; i < IWL_MAX_TID_COUNT; i++) {
1307 		struct ieee80211_key_seq seq;
1308 		u8 *pn = key->cipher == WLAN_CIPHER_SUITE_CCMP ? seq.ccmp.pn :
1309 			seq.gcmp.pn;
1310 
1311 		ieee80211_get_key_rx_seq(key, i, &seq);
1312 		key_rsc[i] = cpu_to_le64((u64)pn[5] |
1313 					 ((u64)pn[4] << 8) |
1314 					 ((u64)pn[3] << 16) |
1315 					 ((u64)pn[2] << 24) |
1316 					 ((u64)pn[1] << 32) |
1317 					 ((u64)pn[0] << 40));
1318 	}
1319 }
1320 
1321 static void
1322 iwl_mld_suspend_set_ucast_pn(struct iwl_mld *mld, struct ieee80211_sta *sta,
1323 			     struct ieee80211_key_conf *key, __le64 *key_rsc)
1324 {
1325 	struct iwl_mld_sta *mld_sta =
1326 		iwl_mld_sta_from_mac80211(sta);
1327 	struct iwl_mld_ptk_pn *mld_ptk_pn;
1328 
1329 	if (WARN_ON(key->keyidx >= ARRAY_SIZE(mld_sta->ptk_pn)))
1330 		return;
1331 
1332 	mld_ptk_pn = wiphy_dereference(mld->wiphy,
1333 				       mld_sta->ptk_pn[key->keyidx]);
1334 	if (WARN_ON(!mld_ptk_pn))
1335 		return;
1336 
1337 	for (int tid = 0; tid < IWL_MAX_TID_COUNT; tid++) {
1338 		struct ieee80211_key_seq seq;
1339 		u8 *max_pn = seq.ccmp.pn;
1340 
1341 		/* get the PN from mac80211, used on the default queue */
1342 		ieee80211_get_key_rx_seq(key, tid, &seq);
1343 
1344 		/* and use the internal data for all queues */
1345 		for (int que = 1; que < mld->trans->info.num_rxqs; que++) {
1346 			u8 *cur_pn = mld_ptk_pn->q[que].pn[tid];
1347 
1348 			if (memcmp(max_pn, cur_pn, IEEE80211_CCMP_PN_LEN) < 0)
1349 				max_pn = cur_pn;
1350 		}
1351 		key_rsc[tid] = cpu_to_le64((u64)max_pn[5] |
1352 					   ((u64)max_pn[4] << 8) |
1353 					   ((u64)max_pn[3] << 16) |
1354 					   ((u64)max_pn[2] << 24) |
1355 					   ((u64)max_pn[1] << 32) |
1356 					   ((u64)max_pn[0] << 40));
1357 	}
1358 }
1359 
1360 static void
1361 iwl_mld_suspend_convert_tkip_ipn(struct ieee80211_key_conf *key,
1362 				 __le64 *rsc)
1363 {
1364 	struct ieee80211_key_seq seq;
1365 
1366 	for (int i = 0; i < IWL_MAX_TID_COUNT; i++) {
1367 		ieee80211_get_key_rx_seq(key, i, &seq);
1368 		rsc[i] =
1369 			cpu_to_le64(((u64)seq.tkip.iv32 << 16) |
1370 				    seq.tkip.iv16);
1371 	}
1372 }
1373 
1374 static void
1375 iwl_mld_suspend_key_data_iter(struct ieee80211_hw *hw,
1376 			      struct ieee80211_vif *vif,
1377 			      struct ieee80211_sta *sta,
1378 			      struct ieee80211_key_conf *key,
1379 			      void *_data)
1380 {
1381 	struct iwl_mld *mld = IWL_MAC80211_GET_MLD(hw);
1382 	struct iwl_mld_suspend_key_iter_data *data = _data;
1383 	__le64 *key_rsc;
1384 	__le32 cipher = 0;
1385 
1386 	switch (key->cipher) {
1387 	case WLAN_CIPHER_SUITE_CCMP:
1388 		cipher = cpu_to_le32(STA_KEY_FLG_CCM);
1389 		fallthrough;
1390 	case WLAN_CIPHER_SUITE_GCMP:
1391 	case WLAN_CIPHER_SUITE_GCMP_256:
1392 		if (!cipher)
1393 			cipher = cpu_to_le32(STA_KEY_FLG_GCMP);
1394 		fallthrough;
1395 	case WLAN_CIPHER_SUITE_TKIP:
1396 		if (!cipher)
1397 			cipher = cpu_to_le32(STA_KEY_FLG_TKIP);
1398 		if (sta) {
1399 			key_rsc = data->rsc->ucast_rsc;
1400 			if (key->cipher == WLAN_CIPHER_SUITE_TKIP)
1401 				iwl_mld_suspend_convert_tkip_ipn(key, key_rsc);
1402 			else
1403 				iwl_mld_suspend_set_ucast_pn(mld, sta, key,
1404 							     key_rsc);
1405 
1406 			data->have_rsc = true;
1407 			return;
1408 		}
1409 		/* We're iterating from old to new, there're 4 possible
1410 		 * gtk ids, and only the last two keys matter
1411 		 */
1412 		if (WARN_ON(data->gtks >=
1413 				ARRAY_SIZE(data->found_gtk_idx)))
1414 			return;
1415 
1416 		if (WARN_ON(key->keyidx >=
1417 				ARRAY_SIZE(data->rsc->mcast_key_id_map)))
1418 			return;
1419 		data->gtk_cipher = cipher;
1420 		data->found_gtk_idx[data->gtks] = key->keyidx;
1421 		key_rsc = data->rsc->mcast_rsc[data->gtks % 2];
1422 		data->rsc->mcast_key_id_map[key->keyidx] =
1423 			data->gtks % 2;
1424 
1425 		if (data->gtks >= 2) {
1426 			int prev = data->gtks % 2;
1427 			int prev_idx = data->found_gtk_idx[prev];
1428 
1429 			data->rsc->mcast_key_id_map[prev_idx] =
1430 				IWL_MCAST_KEY_MAP_INVALID;
1431 		}
1432 
1433 		if (key->cipher == WLAN_CIPHER_SUITE_TKIP)
1434 			iwl_mld_suspend_convert_tkip_ipn(key, key_rsc);
1435 		else
1436 			iwl_mld_aes_seq_to_le64_pn(key, key_rsc);
1437 
1438 		data->gtks++;
1439 		data->have_rsc = true;
1440 		break;
1441 	case WLAN_CIPHER_SUITE_BIP_GMAC_128:
1442 	case WLAN_CIPHER_SUITE_BIP_GMAC_256:
1443 		cipher = cpu_to_le32(STA_KEY_FLG_GCMP);
1444 		fallthrough;
1445 	case WLAN_CIPHER_SUITE_BIP_CMAC_256:
1446 	case WLAN_CIPHER_SUITE_AES_CMAC:
1447 		if (!cipher)
1448 			cipher = cpu_to_le32(STA_KEY_FLG_CCM);
1449 		if (key->keyidx == 4 || key->keyidx == 5)
1450 			data->igtk_cipher = cipher;
1451 
1452 		if (key->keyidx == 6 || key->keyidx == 7)
1453 			data->bigtk_cipher = cipher;
1454 
1455 		break;
1456 	}
1457 }
1458 
1459 static int
1460 iwl_mld_send_kek_kck_cmd(struct iwl_mld *mld,
1461 			 struct iwl_mld_vif *mld_vif,
1462 			 struct iwl_mld_suspend_key_iter_data data,
1463 			 int ap_sta_id)
1464 {
1465 	struct iwl_wowlan_kek_kck_material_cmd_v4 kek_kck_cmd = {};
1466 	struct iwl_mld_rekey_data *rekey_data =
1467 		&mld_vif->wowlan_data.rekey_data;
1468 
1469 	memcpy(kek_kck_cmd.kck, rekey_data->kck,
1470 	       rekey_data->kck_len);
1471 	kek_kck_cmd.kck_len = cpu_to_le16(rekey_data->kck_len);
1472 	memcpy(kek_kck_cmd.kek, rekey_data->kek,
1473 	       rekey_data->kek_len);
1474 	kek_kck_cmd.kek_len = cpu_to_le16(rekey_data->kek_len);
1475 	kek_kck_cmd.replay_ctr = rekey_data->replay_ctr;
1476 	kek_kck_cmd.akm = cpu_to_le32(rekey_data->akm);
1477 	kek_kck_cmd.sta_id = cpu_to_le32(ap_sta_id);
1478 	kek_kck_cmd.gtk_cipher = data.gtk_cipher;
1479 	kek_kck_cmd.igtk_cipher = data.igtk_cipher;
1480 	kek_kck_cmd.bigtk_cipher = data.bigtk_cipher;
1481 
1482 	IWL_DEBUG_WOWLAN(mld, "setting akm %d\n",
1483 			 rekey_data->akm);
1484 
1485 	return iwl_mld_send_cmd_pdu(mld, WOWLAN_KEK_KCK_MATERIAL,
1486 				    &kek_kck_cmd);
1487 }
1488 
1489 static int
1490 iwl_mld_suspend_send_security_cmds(struct iwl_mld *mld,
1491 				   struct ieee80211_vif *vif,
1492 				   struct iwl_mld_vif *mld_vif,
1493 				   int ap_sta_id)
1494 {
1495 	struct iwl_mld_suspend_key_iter_data data = {};
1496 	int ret;
1497 
1498 	data.rsc = kzalloc(sizeof(*data.rsc), GFP_KERNEL);
1499 	if (!data.rsc)
1500 		return -ENOMEM;
1501 
1502 	memset(data.rsc->mcast_key_id_map, IWL_MCAST_KEY_MAP_INVALID,
1503 	       ARRAY_SIZE(data.rsc->mcast_key_id_map));
1504 
1505 	data.rsc->sta_id = cpu_to_le32(ap_sta_id);
1506 	ieee80211_iter_keys(mld->hw, vif,
1507 			    iwl_mld_suspend_key_data_iter,
1508 			    &data);
1509 
1510 	if (data.have_rsc)
1511 		ret = iwl_mld_send_cmd_pdu(mld, WOWLAN_TSC_RSC_PARAM,
1512 					   data.rsc);
1513 	else
1514 		ret = 0;
1515 
1516 	if (!ret && mld_vif->wowlan_data.rekey_data.valid)
1517 		ret = iwl_mld_send_kek_kck_cmd(mld, mld_vif, data, ap_sta_id);
1518 
1519 	kfree(data.rsc);
1520 
1521 	return ret;
1522 }
1523 
1524 static void
1525 iwl_mld_set_wowlan_config_cmd(struct iwl_mld *mld,
1526 			      struct cfg80211_wowlan *wowlan,
1527 			      struct iwl_wowlan_config_cmd *wowlan_config_cmd,
1528 			      struct ieee80211_sta *ap_sta)
1529 {
1530 	wowlan_config_cmd->is_11n_connection =
1531 					ap_sta->deflink.ht_cap.ht_supported;
1532 	wowlan_config_cmd->flags = ENABLE_L3_FILTERING |
1533 		ENABLE_NBNS_FILTERING | ENABLE_DHCP_FILTERING;
1534 
1535 	if (ap_sta->mfp)
1536 		wowlan_config_cmd->flags |= IS_11W_ASSOC;
1537 
1538 	if (wowlan->disconnect)
1539 		wowlan_config_cmd->wakeup_filter |=
1540 			cpu_to_le32(IWL_WOWLAN_WAKEUP_BEACON_MISS |
1541 				    IWL_WOWLAN_WAKEUP_LINK_CHANGE);
1542 	if (wowlan->magic_pkt)
1543 		wowlan_config_cmd->wakeup_filter |=
1544 			cpu_to_le32(IWL_WOWLAN_WAKEUP_MAGIC_PACKET);
1545 	if (wowlan->gtk_rekey_failure)
1546 		wowlan_config_cmd->wakeup_filter |=
1547 			cpu_to_le32(IWL_WOWLAN_WAKEUP_GTK_REKEY_FAIL);
1548 	if (wowlan->eap_identity_req)
1549 		wowlan_config_cmd->wakeup_filter |=
1550 			cpu_to_le32(IWL_WOWLAN_WAKEUP_EAP_IDENT_REQ);
1551 	if (wowlan->four_way_handshake)
1552 		wowlan_config_cmd->wakeup_filter |=
1553 			cpu_to_le32(IWL_WOWLAN_WAKEUP_4WAY_HANDSHAKE);
1554 	if (wowlan->n_patterns)
1555 		wowlan_config_cmd->wakeup_filter |=
1556 			cpu_to_le32(IWL_WOWLAN_WAKEUP_PATTERN_MATCH);
1557 
1558 	if (wowlan->rfkill_release)
1559 		wowlan_config_cmd->wakeup_filter |=
1560 			cpu_to_le32(IWL_WOWLAN_WAKEUP_RF_KILL_DEASSERT);
1561 
1562 	if (wowlan->any) {
1563 		wowlan_config_cmd->wakeup_filter |=
1564 			cpu_to_le32(IWL_WOWLAN_WAKEUP_BEACON_MISS |
1565 				    IWL_WOWLAN_WAKEUP_LINK_CHANGE |
1566 				    IWL_WOWLAN_WAKEUP_RX_FRAME |
1567 				    IWL_WOWLAN_WAKEUP_BCN_FILTERING);
1568 	}
1569 }
1570 
1571 static int iwl_mld_send_patterns(struct iwl_mld *mld,
1572 				 struct cfg80211_wowlan *wowlan,
1573 				 int ap_sta_id)
1574 {
1575 	struct iwl_wowlan_patterns_cmd *pattern_cmd;
1576 	struct iwl_host_cmd cmd = {
1577 		.id = WOWLAN_PATTERNS,
1578 		.dataflags[0] = IWL_HCMD_DFL_NOCOPY,
1579 	};
1580 	int ret;
1581 
1582 	if (!wowlan->n_patterns)
1583 		return 0;
1584 
1585 	cmd.len[0] = struct_size(pattern_cmd, patterns, wowlan->n_patterns);
1586 
1587 	pattern_cmd = kzalloc(cmd.len[0], GFP_KERNEL);
1588 	if (!pattern_cmd)
1589 		return -ENOMEM;
1590 
1591 	pattern_cmd->n_patterns = wowlan->n_patterns;
1592 	pattern_cmd->sta_id = ap_sta_id;
1593 
1594 	for (int i = 0; i < wowlan->n_patterns; i++) {
1595 		int mask_len = DIV_ROUND_UP(wowlan->patterns[i].pattern_len, 8);
1596 
1597 		pattern_cmd->patterns[i].pattern_type =
1598 			WOWLAN_PATTERN_TYPE_BITMASK;
1599 
1600 		memcpy(&pattern_cmd->patterns[i].u.bitmask.mask,
1601 		       wowlan->patterns[i].mask, mask_len);
1602 		memcpy(&pattern_cmd->patterns[i].u.bitmask.pattern,
1603 		       wowlan->patterns[i].pattern,
1604 		       wowlan->patterns[i].pattern_len);
1605 		pattern_cmd->patterns[i].u.bitmask.mask_size = mask_len;
1606 		pattern_cmd->patterns[i].u.bitmask.pattern_size =
1607 			wowlan->patterns[i].pattern_len;
1608 	}
1609 
1610 	cmd.data[0] = pattern_cmd;
1611 	ret = iwl_mld_send_cmd(mld, &cmd);
1612 	kfree(pattern_cmd);
1613 	return ret;
1614 }
1615 
1616 static int
1617 iwl_mld_send_proto_offload(struct iwl_mld *mld,
1618 			   struct ieee80211_vif *vif,
1619 			   u8 ap_sta_id)
1620 {
1621 	struct iwl_proto_offload_cmd_v4 *cmd __free(kfree);
1622 	struct iwl_host_cmd hcmd = {
1623 		.id = PROT_OFFLOAD_CONFIG_CMD,
1624 		.dataflags[0] = IWL_HCMD_DFL_NOCOPY,
1625 		.len[0] = sizeof(*cmd),
1626 	};
1627 	u32 enabled = 0;
1628 
1629 	cmd = kzalloc(hcmd.len[0], GFP_KERNEL);
1630 
1631 #if IS_ENABLED(CONFIG_IPV6)
1632 	struct iwl_mld_vif *mld_vif = iwl_mld_vif_from_mac80211(vif);
1633 	struct iwl_mld_wowlan_data *wowlan_data = &mld_vif->wowlan_data;
1634 	struct iwl_ns_config *nsc;
1635 	struct iwl_targ_addr *addrs;
1636 	int n_nsc, n_addrs;
1637 	int i, c;
1638 	int num_skipped = 0;
1639 
1640 	nsc = cmd->ns_config;
1641 	n_nsc = IWL_PROTO_OFFLOAD_NUM_NS_CONFIG_V3L;
1642 	addrs = cmd->targ_addrs;
1643 	n_addrs = IWL_PROTO_OFFLOAD_NUM_IPV6_ADDRS_V3L;
1644 
1645 	/* For each address we have (and that will fit) fill a target
1646 	 * address struct and combine for NS offload structs with the
1647 	 * solicited node addresses.
1648 	 */
1649 	for (i = 0, c = 0;
1650 		i < wowlan_data->num_target_ipv6_addrs &&
1651 		i < n_addrs && c < n_nsc; i++) {
1652 		int j;
1653 		struct in6_addr solicited_addr;
1654 
1655 		/* Because ns is offloaded skip tentative address to avoid
1656 		 * violating RFC4862.
1657 		 */
1658 		if (test_bit(i, wowlan_data->tentative_addrs)) {
1659 			num_skipped++;
1660 			continue;
1661 		}
1662 
1663 		addrconf_addr_solict_mult(&wowlan_data->target_ipv6_addrs[i],
1664 					  &solicited_addr);
1665 		for (j = 0; j < n_nsc && j < c; j++)
1666 			if (ipv6_addr_cmp(&nsc[j].dest_ipv6_addr,
1667 					  &solicited_addr) == 0)
1668 				break;
1669 		if (j == c)
1670 			c++;
1671 		addrs[i].addr = wowlan_data->target_ipv6_addrs[i];
1672 		addrs[i].config_num = cpu_to_le32(j);
1673 		nsc[j].dest_ipv6_addr = solicited_addr;
1674 		memcpy(nsc[j].target_mac_addr, vif->addr, ETH_ALEN);
1675 	}
1676 
1677 	if (wowlan_data->num_target_ipv6_addrs - num_skipped)
1678 		enabled |= IWL_D3_PROTO_IPV6_VALID;
1679 
1680 	cmd->num_valid_ipv6_addrs = cpu_to_le32(i - num_skipped);
1681 	if (enabled & IWL_D3_PROTO_IPV6_VALID)
1682 		enabled |= IWL_D3_PROTO_OFFLOAD_NS;
1683 #endif
1684 
1685 	if (vif->cfg.arp_addr_cnt) {
1686 		enabled |= IWL_D3_PROTO_OFFLOAD_ARP | IWL_D3_PROTO_IPV4_VALID;
1687 		cmd->common.host_ipv4_addr = vif->cfg.arp_addr_list[0];
1688 		ether_addr_copy(cmd->common.arp_mac_addr, vif->addr);
1689 	}
1690 
1691 	enabled |= IWL_D3_PROTO_OFFLOAD_BTM;
1692 	cmd->common.enabled = cpu_to_le32(enabled);
1693 	cmd->sta_id = cpu_to_le32(ap_sta_id);
1694 	hcmd.data[0] = cmd;
1695 	return iwl_mld_send_cmd(mld, &hcmd);
1696 }
1697 
1698 static int
1699 iwl_mld_wowlan_config(struct iwl_mld *mld, struct ieee80211_vif *bss_vif,
1700 		      struct cfg80211_wowlan *wowlan)
1701 {
1702 	struct iwl_mld_vif *mld_vif = iwl_mld_vif_from_mac80211(bss_vif);
1703 	struct ieee80211_sta *ap_sta = mld_vif->ap_sta;
1704 	struct iwl_wowlan_config_cmd wowlan_config_cmd = {
1705 			.offloading_tid = IWL_WOWLAN_OFFLOAD_TID,
1706 	};
1707 	u32 sta_id_mask;
1708 	int ap_sta_id, ret;
1709 	int link_id = iwl_mld_get_primary_link(bss_vif);
1710 	struct ieee80211_bss_conf *link_conf;
1711 
1712 	ret = iwl_mld_block_emlsr_sync(mld, bss_vif,
1713 				       IWL_MLD_EMLSR_BLOCKED_WOWLAN, link_id);
1714 	if (ret)
1715 		return ret;
1716 
1717 	link_conf = link_conf_dereference_protected(bss_vif, link_id);
1718 
1719 	if (WARN_ON(!ap_sta || !link_conf))
1720 		return -EINVAL;
1721 
1722 	sta_id_mask = iwl_mld_fw_sta_id_mask(mld, ap_sta);
1723 	if (WARN_ON(hweight32(sta_id_mask) != 1))
1724 		return -EINVAL;
1725 
1726 	ap_sta_id = __ffs(sta_id_mask);
1727 	wowlan_config_cmd.sta_id = ap_sta_id;
1728 
1729 	ret = iwl_mld_ensure_queue(mld,
1730 				   ap_sta->txq[wowlan_config_cmd.offloading_tid]);
1731 	if (ret)
1732 		return ret;
1733 
1734 	iwl_mld_set_wowlan_config_cmd(mld, wowlan,
1735 				      &wowlan_config_cmd, ap_sta);
1736 	ret = iwl_mld_send_cmd_pdu(mld, WOWLAN_CONFIGURATION,
1737 				   &wowlan_config_cmd);
1738 	if (ret)
1739 		return ret;
1740 
1741 	ret = iwl_mld_suspend_send_security_cmds(mld, bss_vif, mld_vif,
1742 						 ap_sta_id);
1743 	if (ret)
1744 		return ret;
1745 
1746 	ret = iwl_mld_send_patterns(mld, wowlan, ap_sta_id);
1747 	if (ret)
1748 		return ret;
1749 
1750 	ret = iwl_mld_send_proto_offload(mld, bss_vif, ap_sta_id);
1751 	if (ret)
1752 		return ret;
1753 
1754 	iwl_mld_enable_beacon_filter(mld, link_conf, true);
1755 	return iwl_mld_update_mac_power(mld, bss_vif, true);
1756 }
1757 
1758 int iwl_mld_wowlan_suspend(struct iwl_mld *mld, struct cfg80211_wowlan *wowlan)
1759 {
1760 	struct ieee80211_vif *bss_vif;
1761 
1762 	lockdep_assert_wiphy(mld->wiphy);
1763 
1764 	if (WARN_ON(!wowlan))
1765 		return 1;
1766 
1767 	IWL_DEBUG_WOWLAN(mld, "Starting the wowlan suspend flow\n");
1768 
1769 	bss_vif = iwl_mld_get_bss_vif(mld);
1770 	if (WARN_ON(!bss_vif))
1771 		return 1;
1772 
1773 	if (!bss_vif->cfg.assoc) {
1774 		int ret;
1775 		/* If we're not associated, this must be netdetect */
1776 		if (WARN_ON(!wowlan->nd_config))
1777 			return 1;
1778 
1779 		ret = iwl_mld_netdetect_config(mld, bss_vif, wowlan);
1780 		if (!ret)
1781 			mld->netdetect = true;
1782 
1783 		return ret;
1784 	}
1785 
1786 	return iwl_mld_wowlan_config(mld, bss_vif, wowlan);
1787 }
1788 
1789 /* Returns 0 on success, 1 if an error occurred in firmware during d3,
1790  * A negative value is expected only in unrecovreable cases.
1791  */
1792 int iwl_mld_wowlan_resume(struct iwl_mld *mld)
1793 {
1794 	struct ieee80211_vif *bss_vif;
1795 	struct ieee80211_bss_conf *link_conf;
1796 	struct iwl_mld_netdetect_res netdetect_res;
1797 	struct iwl_mld_resume_data resume_data = {
1798 		.notifs_expected =
1799 			IWL_D3_NOTIF_WOWLAN_INFO |
1800 			IWL_D3_NOTIF_D3_END_NOTIF,
1801 		.netdetect_res = &netdetect_res,
1802 	};
1803 	int link_id;
1804 	int ret;
1805 	bool fw_err = false;
1806 
1807 	lockdep_assert_wiphy(mld->wiphy);
1808 
1809 	IWL_DEBUG_WOWLAN(mld, "Starting the wowlan resume flow\n");
1810 
1811 	if (!mld->fw_status.in_d3) {
1812 		IWL_DEBUG_WOWLAN(mld,
1813 				 "Device_powered_off() was called during wowlan\n");
1814 		goto err;
1815 	}
1816 
1817 	mld->fw_status.resuming = true;
1818 	mld->fw_status.in_d3 = false;
1819 	mld->scan.last_start_time_jiffies = jiffies;
1820 
1821 	bss_vif = iwl_mld_get_bss_vif(mld);
1822 	if (WARN_ON(!bss_vif))
1823 		goto err;
1824 
1825 	/* We can't have several links upon wowlan entry,
1826 	 * this is enforced in the suspend flow.
1827 	 */
1828 	WARN_ON(hweight16(bss_vif->active_links) > 1);
1829 	link_id = bss_vif->active_links ? __ffs(bss_vif->active_links) : 0;
1830 	link_conf = link_conf_dereference_protected(bss_vif, link_id);
1831 
1832 	if (WARN_ON(!link_conf))
1833 		goto err;
1834 
1835 	iwl_fw_dbg_read_d3_debug_data(&mld->fwrt);
1836 
1837 	resume_data.wowlan_status = kzalloc(sizeof(*resume_data.wowlan_status),
1838 					    GFP_KERNEL);
1839 	if (!resume_data.wowlan_status)
1840 		return -ENOMEM;
1841 
1842 	if (mld->netdetect)
1843 		resume_data.notifs_expected |= IWL_D3_ND_MATCH_INFO;
1844 
1845 	ret = iwl_mld_wait_d3_notif(mld, &resume_data, true);
1846 	if (ret) {
1847 		IWL_ERR(mld, "Couldn't get the d3 notifs %d\n", ret);
1848 		fw_err = true;
1849 		goto err;
1850 	}
1851 
1852 	if (resume_data.d3_end_flags & IWL_D0I3_RESET_REQUIRE) {
1853 		mld->fw_status.in_hw_restart = true;
1854 		goto process_wakeup_results;
1855 	}
1856 
1857 	iwl_mld_update_changed_regdomain(mld);
1858 	iwl_mld_update_mac_power(mld, bss_vif, false);
1859 	iwl_mld_enable_beacon_filter(mld, link_conf, false);
1860 	iwl_mld_update_device_power(mld, false);
1861 
1862 	if (mld->netdetect)
1863 		ret = iwl_mld_scan_stop(mld, IWL_MLD_SCAN_NETDETECT, false);
1864 
1865  process_wakeup_results:
1866 	if (mld->netdetect) {
1867 		iwl_mld_process_netdetect_res(mld, bss_vif, &resume_data);
1868 		mld->netdetect = false;
1869 	} else {
1870 		bool keep_connection =
1871 			iwl_mld_process_wowlan_status(mld, bss_vif,
1872 						      resume_data.wowlan_status);
1873 
1874 		/* EMLSR state will be cleared if the connection is not kept */
1875 		if (keep_connection)
1876 			iwl_mld_unblock_emlsr(mld, bss_vif,
1877 					      IWL_MLD_EMLSR_BLOCKED_WOWLAN);
1878 		else
1879 			ieee80211_resume_disconnect(bss_vif);
1880 	}
1881 
1882 	goto out;
1883 
1884  err:
1885 	if (fw_err) {
1886 		mld->trans->state = IWL_TRANS_NO_FW;
1887 		set_bit(STATUS_FW_ERROR, &mld->trans->status);
1888 	}
1889 
1890 	mld->fw_status.in_hw_restart = true;
1891 	ret = 1;
1892  out:
1893 	mld->fw_status.resuming = false;
1894 
1895 	if (resume_data.wowlan_status) {
1896 		kfree(resume_data.wowlan_status->wake_packet);
1897 		kfree(resume_data.wowlan_status);
1898 	}
1899 
1900 	return ret;
1901 }
1902