25098 lines
707 KiB
C
Executable File
25098 lines
707 KiB
C
Executable File
/*
|
|
* Linux cfg80211 driver
|
|
*
|
|
* Copyright (C) 1999-2019, Broadcom.
|
|
*
|
|
* Unless you and Broadcom execute a separate written software license
|
|
* agreement governing use of this software, this software is licensed to you
|
|
* under the terms of the GNU General Public License version 2 (the "GPL"),
|
|
* available at http://www.broadcom.com/licenses/GPLv2.php, with the
|
|
* following added to such license:
|
|
*
|
|
* As a special exception, the copyright holders of this software give you
|
|
* permission to link this software with independent modules, and to copy and
|
|
* distribute the resulting executable under terms of your choice, provided that
|
|
* you also meet, for each linked independent module, the terms and conditions of
|
|
* the license of that module. An independent module is a module which is not
|
|
* derived from this software. The special exception does not apply to any
|
|
* modifications of the software.
|
|
*
|
|
* Notwithstanding the above, under no circumstances may you combine this
|
|
* software in any way with any other Broadcom software provided under a license
|
|
* other than the GPL, without Broadcom's express prior written consent.
|
|
*
|
|
*
|
|
* <<Broadcom-WL-IPTag/Open:>>
|
|
*
|
|
* $Id: wl_cfg80211.c 826086 2019-06-18 19:23:59Z $
|
|
*/
|
|
/* */
|
|
#include <typedefs.h>
|
|
#include <linuxver.h>
|
|
#include <linux/kernel.h>
|
|
|
|
#include <bcmutils.h>
|
|
#include <bcmstdlib_s.h>
|
|
#include <bcmwifi_channels.h>
|
|
#include <bcmendian.h>
|
|
#include <ethernet.h>
|
|
#ifdef WL_WPS_SYNC
|
|
#include <eapol.h>
|
|
#endif /* WL_WPS_SYNC */
|
|
#include <802.11.h>
|
|
#include <bcmiov.h>
|
|
#include <linux/if_arp.h>
|
|
#include <asm/uaccess.h>
|
|
|
|
#include <ethernet.h>
|
|
#include <linux/kernel.h>
|
|
#include <linux/kthread.h>
|
|
#include <linux/netdevice.h>
|
|
#include <linux/sched.h>
|
|
#include <linux/etherdevice.h>
|
|
#include <linux/wireless.h>
|
|
#include <linux/ieee80211.h>
|
|
#include <linux/wait.h>
|
|
#include <net/cfg80211.h>
|
|
#include <net/rtnetlink.h>
|
|
|
|
#include <wlioctl.h>
|
|
#include <bcmevent.h>
|
|
#include <wldev_common.h>
|
|
#include <wl_cfg80211.h>
|
|
#include <wl_cfgp2p.h>
|
|
#include <wl_cfgscan.h>
|
|
#include <bcmdevs.h>
|
|
#ifdef WL_FILS
|
|
#include <fils.h>
|
|
#include <frag.h>
|
|
#endif /* WL_FILS */
|
|
#include <wl_android.h>
|
|
#include <dngl_stats.h>
|
|
#include <dhd.h>
|
|
#include <dhd_linux.h>
|
|
#include <dhd_linux_pktdump.h>
|
|
#include <dhd_debug.h>
|
|
#include <dhdioctl.h>
|
|
#include <wlioctl.h>
|
|
#include <dhd_cfg80211.h>
|
|
#include <dhd_bus.h>
|
|
#ifdef PNO_SUPPORT
|
|
#include <dhd_pno.h>
|
|
#endif /* PNO_SUPPORT */
|
|
#include <wl_cfgvendor.h>
|
|
|
|
#if !defined(WL_VENDOR_EXT_SUPPORT)
|
|
#undef GSCAN_SUPPORT
|
|
#endif
|
|
#include <dhd_config.h>
|
|
|
|
#ifdef WL_NAN
|
|
#include <wl_cfgnan.h>
|
|
#endif /* WL_NAN */
|
|
|
|
#ifdef PROP_TXSTATUS
|
|
#include <dhd_wlfc.h>
|
|
#endif // endif
|
|
|
|
#ifdef BCMPCIE
|
|
#include <dhd_flowring.h>
|
|
#endif // endif
|
|
#ifdef RTT_SUPPORT
|
|
#include <dhd_rtt.h>
|
|
#endif /* RTT_SUPPORT */
|
|
|
|
#define BRCM_SAE_VENDOR_EVENT_BUF_LEN 500
|
|
|
|
#ifdef DNGL_AXI_ERROR_LOGGING
|
|
#include <bcmtlv.h>
|
|
#endif /* DNGL_AXI_ERROR_LOGGING */
|
|
|
|
#if defined(CONFIG_WLAN_BEYONDX) || defined(CONFIG_SEC_5GMODEL)
|
|
#include <linux/dev_ril_bridge.h>
|
|
#include <linux/notifier.h>
|
|
#endif /* CONFIG_WLAN_BEYONDX || defined(CONFIG_SEC_5GMODEL) */
|
|
|
|
#ifdef BCMWAPI_WPI
|
|
/* these items should evetually go into wireless.h of the linux system headfile dir */
|
|
#ifndef IW_ENCODE_ALG_SM4
|
|
#define IW_ENCODE_ALG_SM4 0x20
|
|
#endif // endif
|
|
|
|
#ifndef IW_AUTH_WAPI_ENABLED
|
|
#define IW_AUTH_WAPI_ENABLED 0x20
|
|
#endif // endif
|
|
|
|
#ifndef IW_AUTH_WAPI_VERSION_1
|
|
#define IW_AUTH_WAPI_VERSION_1 0x00000008
|
|
#endif // endif
|
|
|
|
#ifndef IW_AUTH_CIPHER_SMS4
|
|
#define IW_AUTH_CIPHER_SMS4 0x00000020
|
|
#endif // endif
|
|
|
|
#ifndef IW_AUTH_KEY_MGMT_WAPI_PSK
|
|
#define IW_AUTH_KEY_MGMT_WAPI_PSK 4
|
|
#endif // endif
|
|
|
|
#ifndef IW_AUTH_KEY_MGMT_WAPI_CERT
|
|
#define IW_AUTH_KEY_MGMT_WAPI_CERT 8
|
|
#endif // endif
|
|
#endif /* BCMWAPI_WPI */
|
|
|
|
#ifdef BCMWAPI_WPI
|
|
#define IW_WSEC_ENABLED(wsec) ((wsec) & (WEP_ENABLED | TKIP_ENABLED | AES_ENABLED | SMS4_ENABLED))
|
|
#else /* BCMWAPI_WPI */
|
|
#define IW_WSEC_ENABLED(wsec) ((wsec) & (WEP_ENABLED | TKIP_ENABLED | AES_ENABLED))
|
|
#endif /* BCMWAPI_WPI */
|
|
|
|
#if (defined(WL_FW_OCE_AP_SELECT) || defined(BCMFW_ROAM_ENABLE) && ((LINUX_VERSION_CODE \
|
|
>= KERNEL_VERSION(3, 2, 0)) || defined(WL_COMPAT_WIRELESS)))
|
|
uint fw_ap_select = true;
|
|
#else
|
|
uint fw_ap_select = false;
|
|
#endif /* WL_FW_OCE_AP_SELECT && (ROAM_ENABLE || BCMFW_ROAM_ENABLE) */
|
|
module_param(fw_ap_select, uint, 0660);
|
|
|
|
static struct device *cfg80211_parent_dev = NULL;
|
|
static struct bcm_cfg80211 *g_bcmcfg = NULL;
|
|
u32 wl_dbg_level = WL_DBG_ERR; // | WL_DBG_P2P_ACTION | WL_DBG_INFO;
|
|
|
|
#define MAX_VIF_OFFSET 15
|
|
#define MAX_WAIT_TIME 1500
|
|
#ifdef WLAIBSS_MCHAN
|
|
#define IBSS_IF_NAME "ibss%d"
|
|
#endif /* WLAIBSS_MCHAN */
|
|
|
|
#ifdef VSDB
|
|
/* sleep time to keep STA's connecting or connection for continuous af tx or finding a peer */
|
|
#define DEFAULT_SLEEP_TIME_VSDB 120
|
|
#define OFF_CHAN_TIME_THRESHOLD_MS 200
|
|
#define AF_RETRY_DELAY_TIME 40
|
|
|
|
/* if sta is connected or connecting, sleep for a while before retry af tx or finding a peer */
|
|
#define WL_AF_TX_KEEP_PRI_CONNECTION_VSDB(cfg) \
|
|
do { \
|
|
if (wl_get_drv_status(cfg, CONNECTED, bcmcfg_to_prmry_ndev(cfg)) || \
|
|
wl_get_drv_status(cfg, CONNECTING, bcmcfg_to_prmry_ndev(cfg))) { \
|
|
OSL_SLEEP(DEFAULT_SLEEP_TIME_VSDB); \
|
|
} \
|
|
} while (0)
|
|
#else /* VSDB */
|
|
/* if not VSDB, do nothing */
|
|
#define WL_AF_TX_KEEP_PRI_CONNECTION_VSDB(cfg)
|
|
#endif /* VSDB */
|
|
|
|
#define DNGL_FUNC(func, parameters) func parameters
|
|
#define COEX_DHCP
|
|
|
|
#define WLAN_EID_SSID 0
|
|
#define CH_MIN_5G_CHANNEL 34
|
|
|
|
#ifdef WL_RELMCAST
|
|
enum rmc_event_type {
|
|
RMC_EVENT_NONE,
|
|
RMC_EVENT_LEADER_CHECK_FAIL
|
|
};
|
|
#endif /* WL_RELMCAST */
|
|
|
|
/* This is to override regulatory domains defined in cfg80211 module (reg.c)
|
|
* By default world regulatory domain defined in reg.c puts the flags NL80211_RRF_PASSIVE_SCAN
|
|
* and NL80211_RRF_NO_IBSS for 5GHz channels (for 36..48 and 149..165).
|
|
* With respect to these flags, wpa_supplicant doesn't start p2p operations on 5GHz channels.
|
|
* All the chnages in world regulatory domain are to be done here.
|
|
*
|
|
* this definition reuires disabling missing-field-initializer warning
|
|
* as the ieee80211_regdomain definition differs in plain linux and in Android
|
|
*/
|
|
#if defined(STRICT_GCC_WARNINGS) && defined(__GNUC__) && (__GNUC__ > 4 || (__GNUC__ == \
|
|
4 && __GNUC_MINOR__ >= 6))
|
|
_Pragma("GCC diagnostic push")
|
|
_Pragma("GCC diagnostic ignored \"-Wmissing-field-initializers\"")
|
|
#endif // endif
|
|
static const struct ieee80211_regdomain brcm_regdom = {
|
|
.n_reg_rules = 4,
|
|
.alpha2 = "99",
|
|
.reg_rules = {
|
|
/* IEEE 802.11b/g, channels 1..11 */
|
|
REG_RULE(2412-10, 2472+10, 40, 6, 20, 0),
|
|
/* If any */
|
|
/* IEEE 802.11 channel 14 - Only JP enables
|
|
* this and for 802.11b only
|
|
*/
|
|
REG_RULE(2484-10, 2484+10, 20, 6, 20, 0),
|
|
/* IEEE 802.11a, channel 36..64 */
|
|
REG_RULE(5150-10, 5350+10, 40, 6, 20, 0),
|
|
/* IEEE 802.11a, channel 100..165 */
|
|
REG_RULE(5470-10, 5850+10, 40, 6, 20, 0), }
|
|
};
|
|
#if defined(STRICT_GCC_WARNINGS) && defined(__GNUC__) && (__GNUC__ > 4 || (__GNUC__ == \
|
|
4 && __GNUC_MINOR__ >= 6))
|
|
_Pragma("GCC diagnostic pop")
|
|
#endif // endif
|
|
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 0, 0)) && \
|
|
(defined(WL_IFACE_COMB_NUM_CHANNELS) || defined(WL_CFG80211_P2P_DEV_IF))
|
|
static const struct ieee80211_iface_limit common_if_limits[] = {
|
|
{
|
|
/*
|
|
* Driver can support up to 2 AP's
|
|
*/
|
|
.max = 2,
|
|
.types = BIT(NL80211_IFTYPE_AP),
|
|
},
|
|
{
|
|
/*
|
|
* During P2P-GO removal, P2P-GO is first changed to STA and later only
|
|
* removed. So setting maximum possible number of STA interfaces according
|
|
* to kernel version.
|
|
*
|
|
* less than linux-3.8 - max:3 (wlan0 + p2p0 + group removal of p2p-p2p0-x)
|
|
* linux-3.8 and above - max:4
|
|
* sta + NAN NMI + NAN DPI open + NAN DPI sec (since there is no iface type
|
|
* for NAN defined, registering it as STA type)
|
|
*/
|
|
#ifdef WL_ENABLE_P2P_IF
|
|
.max = 5,
|
|
#else
|
|
.max = 4,
|
|
#endif /* WL_ENABLE_P2P_IF */
|
|
.types = BIT(NL80211_IFTYPE_STATION),
|
|
},
|
|
{
|
|
.max = 2,
|
|
.types = BIT(NL80211_IFTYPE_P2P_GO) | BIT(NL80211_IFTYPE_P2P_CLIENT),
|
|
},
|
|
#if defined(WL_CFG80211_P2P_DEV_IF)
|
|
{
|
|
.max = 1,
|
|
.types = BIT(NL80211_IFTYPE_P2P_DEVICE),
|
|
},
|
|
#endif /* WL_CFG80211_P2P_DEV_IF */
|
|
{
|
|
.max = 1,
|
|
.types = BIT(NL80211_IFTYPE_ADHOC),
|
|
},
|
|
};
|
|
|
|
#define NUM_DIFF_CHANNELS 2
|
|
|
|
static const struct ieee80211_iface_combination
|
|
common_iface_combinations[] = {
|
|
{
|
|
.num_different_channels = NUM_DIFF_CHANNELS,
|
|
/*
|
|
* At Max 5 network interfaces can be registered concurrently
|
|
*/
|
|
.max_interfaces = IFACE_MAX_CNT,
|
|
.limits = common_if_limits,
|
|
.n_limits = ARRAY_SIZE(common_if_limits),
|
|
},
|
|
};
|
|
#endif /* LINUX_VER >= 3.0 && (WL_IFACE_COMB_NUM_CHANNELS || WL_CFG80211_P2P_DEV_IF) */
|
|
|
|
static const char *wl_if_state_strs[WL_IF_STATE_MAX + 1] = {
|
|
"WL_IF_CREATE_REQ",
|
|
"WL_IF_CREATE_DONE",
|
|
"WL_IF_DELETE_REQ",
|
|
"WL_IF_DELETE_DONE",
|
|
"WL_IF_CHANGE_REQ",
|
|
"WL_IF_CHANGE_DONE",
|
|
"WL_IF_STATE_MAX"
|
|
};
|
|
|
|
#ifdef BCMWAPI_WPI
|
|
#if defined(ANDROID_PLATFORM_VERSION) && (ANDROID_PLATFORM_VERSION >= 8)
|
|
/* WAPI define in ieee80211.h is used */
|
|
#else
|
|
#undef WLAN_AKM_SUITE_WAPI_PSK
|
|
#define WLAN_AKM_SUITE_WAPI_PSK 0x000FAC04
|
|
|
|
#undef WLAN_AKM_SUITE_WAPI_CERT
|
|
#define WLAN_AKM_SUITE_WAPI_CERT 0x000FAC12
|
|
|
|
#undef NL80211_WAPI_VERSION_1
|
|
#define NL80211_WAPI_VERSION_1 1 << 2
|
|
#endif /* ANDROID_PLATFORM_VERSION && ANDROID_PLATFORM_VERSION >= 8 */
|
|
#endif /* BCMWAPI_WPI */
|
|
|
|
/* Data Element Definitions */
|
|
#define WPS_ID_CONFIG_METHODS 0x1008
|
|
#define WPS_ID_REQ_TYPE 0x103A
|
|
#define WPS_ID_DEVICE_NAME 0x1011
|
|
#define WPS_ID_VERSION 0x104A
|
|
#define WPS_ID_DEVICE_PWD_ID 0x1012
|
|
#define WPS_ID_REQ_DEV_TYPE 0x106A
|
|
#define WPS_ID_SELECTED_REGISTRAR_CONFIG_METHODS 0x1053
|
|
#define WPS_ID_PRIM_DEV_TYPE 0x1054
|
|
|
|
/* Device Password ID */
|
|
#define DEV_PW_DEFAULT 0x0000
|
|
#define DEV_PW_USER_SPECIFIED 0x0001,
|
|
#define DEV_PW_MACHINE_SPECIFIED 0x0002
|
|
#define DEV_PW_REKEY 0x0003
|
|
#define DEV_PW_PUSHBUTTON 0x0004
|
|
#define DEV_PW_REGISTRAR_SPECIFIED 0x0005
|
|
|
|
/* Config Methods */
|
|
#define WPS_CONFIG_USBA 0x0001
|
|
#define WPS_CONFIG_ETHERNET 0x0002
|
|
#define WPS_CONFIG_LABEL 0x0004
|
|
#define WPS_CONFIG_DISPLAY 0x0008
|
|
#define WPS_CONFIG_EXT_NFC_TOKEN 0x0010
|
|
#define WPS_CONFIG_INT_NFC_TOKEN 0x0020
|
|
#define WPS_CONFIG_NFC_INTERFACE 0x0040
|
|
#define WPS_CONFIG_PUSHBUTTON 0x0080
|
|
#define WPS_CONFIG_KEYPAD 0x0100
|
|
#define WPS_CONFIG_VIRT_PUSHBUTTON 0x0280
|
|
#define WPS_CONFIG_PHY_PUSHBUTTON 0x0480
|
|
#define WPS_CONFIG_VIRT_DISPLAY 0x2008
|
|
#define WPS_CONFIG_PHY_DISPLAY 0x4008
|
|
|
|
#define PM_BLOCK 1
|
|
#define PM_ENABLE 0
|
|
|
|
/* GCMP crypto supported above kernel v4.0 */
|
|
#if (LINUX_VERSION_CODE > KERNEL_VERSION(4, 0, 0))
|
|
#define WL_GCMP
|
|
#endif /* (LINUX_VERSION_CODE > KERNEL_VERSION(4, 0, 0) */
|
|
|
|
#ifndef IBSS_COALESCE_ALLOWED
|
|
#define IBSS_COALESCE_ALLOWED IBSS_COALESCE_DEFAULT
|
|
#endif // endif
|
|
|
|
#ifndef IBSS_INITIAL_SCAN_ALLOWED
|
|
#define IBSS_INITIAL_SCAN_ALLOWED IBSS_INITIAL_SCAN_ALLOWED_DEFAULT
|
|
#endif // endif
|
|
|
|
#define CUSTOM_RETRY_MASK 0xff000000 /* Mask for retry counter of custom dwell time */
|
|
#define LONG_LISTEN_TIME 2000
|
|
|
|
#ifdef RTT_SUPPORT
|
|
static s32 wl_cfg80211_rtt_event_handler(struct bcm_cfg80211 *cfg, bcm_struct_cfgdev *cfgdev,
|
|
const wl_event_msg_t *e, void *data);
|
|
#endif /* RTT_SUPPORT */
|
|
#ifdef WL_CHAN_UTIL
|
|
static s32 wl_cfg80211_bssload_report_event_handler(struct bcm_cfg80211 *cfg,
|
|
bcm_struct_cfgdev *cfgdev, const wl_event_msg_t *e, void *data);
|
|
static s32 wl_cfg80211_start_bssload_report(struct net_device *ndev);
|
|
#endif /* WL_CHAN_UTIL */
|
|
|
|
#ifdef SUPPORT_AP_RADIO_PWRSAVE
|
|
#define RADIO_PWRSAVE_PPS 10
|
|
#define RADIO_PWRSAVE_QUIET_TIME 10
|
|
#define RADIO_PWRSAVE_LEVEL 3
|
|
#define RADIO_PWRSAVE_STAS_ASSOC_CHECK 0
|
|
|
|
#define RADIO_PWRSAVE_LEVEL_MIN 1
|
|
#define RADIO_PWRSAVE_LEVEL_MAX 9
|
|
#define RADIO_PWRSAVE_PPS_MIN 1
|
|
#define RADIO_PWRSAVE_QUIETTIME_MIN 1
|
|
#define RADIO_PWRSAVE_ASSOCCHECK_MIN 0
|
|
#define RADIO_PWRSAVE_ASSOCCHECK_MAX 1
|
|
|
|
#define RADIO_PWRSAVE_MAJOR_VER 1
|
|
#define RADIO_PWRSAVE_MINOR_VER 1
|
|
#define RADIO_PWRSAVE_MAJOR_VER_SHIFT 8
|
|
#define RADIO_PWRSAVE_VERSION \
|
|
((RADIO_PWRSAVE_MAJOR_VER << RADIO_PWRSAVE_MAJOR_VER_SHIFT)| RADIO_PWRSAVE_MINOR_VER)
|
|
#endif /* SUPPORT_AP_RADIO_PWRSAVE */
|
|
|
|
/* SoftAP related parameters */
|
|
#define DEFAULT_2G_SOFTAP_CHANNEL 1
|
|
#define DEFAULT_5G_SOFTAP_CHANNEL 149
|
|
#define WL_MAX_NUM_CSA_COUNTERS 255
|
|
|
|
#define MAX_VNDR_OUI_STR_LEN 256u
|
|
#define VNDR_OUI_STR_LEN 10u
|
|
#define DOT11_DISCONNECT_RC 2u
|
|
static const uchar *exclude_vndr_oui_list[] = {
|
|
"\x00\x50\xf2", /* Microsoft */
|
|
"\x00\x00\xf0", /* Samsung Elec */
|
|
WFA_OUI, /* WFA */
|
|
NULL
|
|
};
|
|
|
|
typedef struct wl_vndr_oui_entry {
|
|
uchar oui[DOT11_OUI_LEN];
|
|
struct list_head list;
|
|
} wl_vndr_oui_entry_t;
|
|
|
|
#if defined(WL_DISABLE_HE_SOFTAP) || defined(WL_DISABLE_HE_P2P) || \
|
|
defined(SUPPORT_AP_BWCTRL)
|
|
#define WL_HE_FEATURES_HE_AP 0x8
|
|
#define WL_HE_FEATURES_HE_P2P 0x20
|
|
#endif // endif
|
|
|
|
static int wl_vndr_ies_get_vendor_oui(struct bcm_cfg80211 *cfg,
|
|
struct net_device *ndev, char *vndr_oui, u32 vndr_oui_len);
|
|
static void wl_vndr_ies_clear_vendor_oui_list(struct bcm_cfg80211 *cfg);
|
|
static s32 wl_cfg80211_parse_vndr_ies(const u8 *parse, u32 len,
|
|
struct parsed_vndr_ies *vndr_ies);
|
|
|
|
#if defined(WL_FW_OCE_AP_SELECT)
|
|
static bool
|
|
wl_cfgoce_has_ie(const u8 *ie, const u8 **tlvs, u32 *tlvs_len, const u8 *oui, u32 oui_len, u8 type);
|
|
|
|
/* Check whether the given IE looks like WFA OCE IE. */
|
|
#define wl_cfgoce_is_oce_ie(ie, tlvs, len) wl_cfgoce_has_ie(ie, tlvs, len, \
|
|
(const uint8 *)WFA_OUI, WFA_OUI_LEN, WFA_OUI_TYPE_MBO_OCE)
|
|
|
|
/* Is any of the tlvs the expected entry? If
|
|
* not update the tlvs buffer pointer/length.
|
|
*/
|
|
static bool
|
|
wl_cfgoce_has_ie(const u8 *ie, const u8 **tlvs, u32 *tlvs_len, const u8 *oui, u32 oui_len, u8 type)
|
|
{
|
|
/* If the contents match the OUI and the type */
|
|
if (ie[TLV_LEN_OFF] >= oui_len + 1 &&
|
|
!bcmp(&ie[TLV_BODY_OFF], oui, oui_len) &&
|
|
type == ie[TLV_BODY_OFF + oui_len]) {
|
|
return TRUE;
|
|
}
|
|
|
|
return FALSE;
|
|
}
|
|
#endif /* WL_FW_OCE_AP_SELECT */
|
|
|
|
/*
|
|
* cfg80211_ops api/callback list
|
|
*/
|
|
static s32 wl_frame_get_mgmt(struct bcm_cfg80211 *cfg, u16 fc,
|
|
const struct ether_addr *da, const struct ether_addr *sa,
|
|
const struct ether_addr *bssid, u8 **pheader, u32 *body_len, u8 *pbody);
|
|
static s32 wl_cfg80211_set_wiphy_params(struct wiphy *wiphy, u32 changed);
|
|
#ifdef WLAIBSS_MCHAN
|
|
static bcm_struct_cfgdev* bcm_cfg80211_add_ibss_if(struct wiphy *wiphy, char *name);
|
|
static s32 bcm_cfg80211_del_ibss_if(struct wiphy *wiphy, bcm_struct_cfgdev *cfgdev);
|
|
#endif /* WLAIBSS_MCHAN */
|
|
static s32 wl_cfg80211_join_ibss(struct wiphy *wiphy, struct net_device *dev,
|
|
struct cfg80211_ibss_params *params);
|
|
static s32 wl_cfg80211_leave_ibss(struct wiphy *wiphy,
|
|
struct net_device *dev);
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 16, 0))
|
|
static s32 wl_cfg80211_get_station(struct wiphy *wiphy,
|
|
struct net_device *dev, const u8 *mac,
|
|
struct station_info *sinfo);
|
|
#else
|
|
static s32 wl_cfg80211_get_station(struct wiphy *wiphy,
|
|
struct net_device *dev, u8 *mac,
|
|
struct station_info *sinfo);
|
|
#endif // endif
|
|
static s32 wl_cfg80211_set_power_mgmt(struct wiphy *wiphy,
|
|
struct net_device *dev, bool enabled,
|
|
s32 timeout);
|
|
static int wl_cfg80211_connect(struct wiphy *wiphy, struct net_device *dev,
|
|
struct cfg80211_connect_params *sme);
|
|
#if defined(WL_FILS)
|
|
static int wl_cfg80211_update_connect_params(struct wiphy *wiphy, struct net_device *dev,
|
|
struct cfg80211_connect_params *sme, u32 changed);
|
|
#endif /* WL_FILS */
|
|
static s32 wl_cfg80211_disconnect(struct wiphy *wiphy, struct net_device *dev,
|
|
u16 reason_code);
|
|
#if defined(WL_CFG80211_P2P_DEV_IF)
|
|
static s32
|
|
wl_cfg80211_set_tx_power(struct wiphy *wiphy, struct wireless_dev *wdev,
|
|
enum nl80211_tx_power_setting type, s32 mbm);
|
|
#else
|
|
static s32
|
|
wl_cfg80211_set_tx_power(struct wiphy *wiphy,
|
|
enum nl80211_tx_power_setting type, s32 dbm);
|
|
#endif /* WL_CFG80211_P2P_DEV_IF */
|
|
#if defined(WL_CFG80211_P2P_DEV_IF)
|
|
static s32 wl_cfg80211_get_tx_power(struct wiphy *wiphy,
|
|
struct wireless_dev *wdev, s32 *dbm);
|
|
#else
|
|
static s32 wl_cfg80211_get_tx_power(struct wiphy *wiphy, s32 *dbm);
|
|
#endif /* WL_CFG80211_P2P_DEV_IF */
|
|
static s32 wl_cfg80211_config_default_key(struct wiphy *wiphy,
|
|
struct net_device *dev,
|
|
u8 key_idx, bool unicast, bool multicast);
|
|
static s32 wl_cfg80211_add_key(struct wiphy *wiphy, struct net_device *dev,
|
|
u8 key_idx, bool pairwise, const u8 *mac_addr,
|
|
struct key_params *params);
|
|
static s32 wl_cfg80211_del_key(struct wiphy *wiphy, struct net_device *dev,
|
|
u8 key_idx, bool pairwise, const u8 *mac_addr);
|
|
static s32 wl_cfg80211_get_key(struct wiphy *wiphy, struct net_device *dev,
|
|
u8 key_idx, bool pairwise, const u8 *mac_addr,
|
|
void *cookie, void (*callback) (void *cookie,
|
|
struct key_params *params));
|
|
static s32 wl_cfg80211_config_default_mgmt_key(struct wiphy *wiphy,
|
|
struct net_device *dev, u8 key_idx);
|
|
static s32 wl_cfg80211_resume(struct wiphy *wiphy);
|
|
#if defined(WL_SUPPORT_BACKPORTED_KPATCHES) || (LINUX_VERSION_CODE >= KERNEL_VERSION(3, \
|
|
2, 0))
|
|
static s32 wl_cfg80211_mgmt_tx_cancel_wait(struct wiphy *wiphy,
|
|
bcm_struct_cfgdev *cfgdev, u64 cookie);
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 19, 0))
|
|
static s32 wl_cfg80211_del_station(
|
|
struct wiphy *wiphy, struct net_device *ndev,
|
|
struct station_del_parameters *params);
|
|
#elif (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 16, 0))
|
|
static s32 wl_cfg80211_del_station(struct wiphy *wiphy,
|
|
struct net_device *ndev, const u8* mac_addr);
|
|
#else
|
|
static s32 wl_cfg80211_del_station(struct wiphy *wiphy,
|
|
struct net_device *ndev, u8* mac_addr);
|
|
#endif // endif
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 16, 0))
|
|
static s32 wl_cfg80211_change_station(struct wiphy *wiphy,
|
|
struct net_device *dev, const u8 *mac, struct station_parameters *params);
|
|
#else
|
|
static s32 wl_cfg80211_change_station(struct wiphy *wiphy,
|
|
struct net_device *dev, u8 *mac, struct station_parameters *params);
|
|
#endif // endif
|
|
#endif /* WL_SUPPORT_BACKPORTED_KPATCHES || KERNEL_VER >= KERNEL_VERSION(3, 2, 0)) */
|
|
#if (LINUX_VERSION_CODE > KERNEL_VERSION(2, 6, 39)) || defined(WL_COMPAT_WIRELESS)
|
|
static s32 wl_cfg80211_suspend(struct wiphy *wiphy, struct cfg80211_wowlan *wow);
|
|
#else
|
|
static s32 wl_cfg80211_suspend(struct wiphy *wiphy);
|
|
#endif // endif
|
|
static s32 wl_cfg80211_set_pmksa(struct wiphy *wiphy, struct net_device *dev,
|
|
struct cfg80211_pmksa *pmksa);
|
|
static s32 wl_cfg80211_del_pmksa(struct wiphy *wiphy, struct net_device *dev,
|
|
struct cfg80211_pmksa *pmksa);
|
|
static s32 wl_cfg80211_flush_pmksa(struct wiphy *wiphy,
|
|
struct net_device *dev);
|
|
#ifdef WL_CLIENT_SAE
|
|
static bool wl_is_pmkid_available(struct net_device *dev, const u8 *bssid);
|
|
#endif /* WL_CLIENT_SAE */
|
|
#if (LINUX_VERSION_CODE > KERNEL_VERSION(3, 2, 0)) || defined(WL_COMPAT_WIRELESS)
|
|
#if (defined(CONFIG_ARCH_MSM) && defined(TDLS_MGMT_VERSION2)) || (LINUX_VERSION_CODE < \
|
|
KERNEL_VERSION(3, 16, 0) && LINUX_VERSION_CODE >= KERNEL_VERSION(3, 15, 0))
|
|
static s32 wl_cfg80211_tdls_mgmt(struct wiphy *wiphy, struct net_device *dev,
|
|
u8 *peer, u8 action_code, u8 dialog_token, u16 status_code,
|
|
u32 peer_capability, const u8 *buf, size_t len);
|
|
#elif ((LINUX_VERSION_CODE >= KERNEL_VERSION(3, 16, 0)) && \
|
|
(LINUX_VERSION_CODE < KERNEL_VERSION(3, 18, 0)))
|
|
static s32 wl_cfg80211_tdls_mgmt(struct wiphy *wiphy, struct net_device *dev,
|
|
const u8 *peer, u8 action_code, u8 dialog_token, u16 status_code,
|
|
u32 peer_capability, const u8 *buf, size_t len);
|
|
#elif (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 18, 0))
|
|
static s32 wl_cfg80211_tdls_mgmt(struct wiphy *wiphy, struct net_device *dev,
|
|
const u8 *peer, u8 action_code, u8 dialog_token, u16 status_code,
|
|
u32 peer_capability, bool initiator, const u8 *buf, size_t len);
|
|
#else /* CONFIG_ARCH_MSM && TDLS_MGMT_VERSION2 */
|
|
static s32 wl_cfg80211_tdls_mgmt(struct wiphy *wiphy, struct net_device *dev,
|
|
u8 *peer, u8 action_code, u8 dialog_token, u16 status_code,
|
|
const u8 *buf, size_t len);
|
|
#endif /* CONFIG_ARCH_MSM && TDLS_MGMT_VERSION2 */
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 16, 0))
|
|
static s32 wl_cfg80211_tdls_oper(struct wiphy *wiphy, struct net_device *dev,
|
|
const u8 *peer, enum nl80211_tdls_operation oper);
|
|
#else
|
|
static s32 wl_cfg80211_tdls_oper(struct wiphy *wiphy, struct net_device *dev,
|
|
u8 *peer, enum nl80211_tdls_operation oper);
|
|
#endif // endif
|
|
#endif /* LINUX_VERSION > KERNEL_VERSION(3,2,0) || WL_COMPAT_WIRELESS */
|
|
static s32 wl_cfg80211_set_ap_role(struct bcm_cfg80211 *cfg, struct net_device *dev);
|
|
|
|
struct wireless_dev *
|
|
wl_cfg80211_create_iface(struct wiphy *wiphy, wl_iftype_t
|
|
iface_type, u8 *mac_addr, const char *name);
|
|
s32
|
|
wl_cfg80211_del_iface(struct wiphy *wiphy, struct wireless_dev *wdev);
|
|
|
|
s32 wl_cfg80211_interface_ops(struct bcm_cfg80211 *cfg,
|
|
struct net_device *ndev, s32 bsscfg_idx,
|
|
wl_iftype_t iftype, s32 del, u8 *addr);
|
|
s32 wl_cfg80211_add_del_bss(struct bcm_cfg80211 *cfg,
|
|
struct net_device *ndev, s32 bsscfg_idx,
|
|
wl_iftype_t brcm_iftype, s32 del, u8 *addr);
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 4, 0)) || defined(WL_COMPAT_WIRELESS)
|
|
static s32 wl_cfg80211_stop_ap(struct wiphy *wiphy, struct net_device *dev);
|
|
#endif /* LINUX_VERSION_CODE >= KERNEL_VERSION(3, 4, 0) */
|
|
#ifdef GTK_OFFLOAD_SUPPORT
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 1, 0))
|
|
static s32 wl_cfg80211_set_rekey_data(struct wiphy *wiphy, struct net_device *dev,
|
|
struct cfg80211_gtk_rekey_data *data);
|
|
#endif /* LINUX_VERSION_CODE >= KERNEL_VERSION(3, 1, 0) */
|
|
#endif /* GTK_OFFLOAD_SUPPORT */
|
|
chanspec_t wl_chspec_driver_to_host(chanspec_t chanspec);
|
|
chanspec_t wl_chspec_host_to_driver(chanspec_t chanspec);
|
|
static void wl_cfg80211_wait_for_disconnection(struct bcm_cfg80211 *cfg, struct net_device *dev);
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 12, 0))
|
|
int wl_cfg80211_channel_switch(struct wiphy *wiphy, struct net_device *dev,
|
|
struct cfg80211_csa_settings *params);
|
|
#endif /* LINUX_VERSION_CODE >= KERNEL_VERSION(3, 12, 0) */
|
|
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(4, 13, 0))
|
|
static int wl_cfg80211_set_pmk(struct wiphy *wiphy, struct net_device *dev,
|
|
const struct cfg80211_pmk_conf *conf);
|
|
static int wl_cfg80211_del_pmk(struct wiphy *wiphy, struct net_device *dev,
|
|
const u8 *aa);
|
|
#endif /* LINUX_VERSION_CODE >= KERNEL_VERSION(4, 13, 0) */
|
|
|
|
/*
|
|
* event & event Q handlers for cfg80211 interfaces
|
|
*/
|
|
static s32 wl_create_event_handler(struct bcm_cfg80211 *cfg);
|
|
static void wl_destroy_event_handler(struct bcm_cfg80211 *cfg);
|
|
static void wl_event_handler(struct work_struct *work_data);
|
|
static void wl_init_eq(struct bcm_cfg80211 *cfg);
|
|
static void wl_flush_eq(struct bcm_cfg80211 *cfg);
|
|
static unsigned long wl_lock_eq(struct bcm_cfg80211 *cfg);
|
|
static void wl_unlock_eq(struct bcm_cfg80211 *cfg, unsigned long flags);
|
|
static void wl_init_eq_lock(struct bcm_cfg80211 *cfg);
|
|
static void wl_init_event_handler(struct bcm_cfg80211 *cfg);
|
|
static struct wl_event_q *wl_deq_event(struct bcm_cfg80211 *cfg);
|
|
static s32 wl_enq_event(struct bcm_cfg80211 *cfg, struct net_device *ndev, u32 type,
|
|
const wl_event_msg_t *msg, void *data);
|
|
static void wl_put_event(struct bcm_cfg80211 *cfg, struct wl_event_q *e);
|
|
static s32 wl_notify_connect_status_ap(struct bcm_cfg80211 *cfg, struct net_device *ndev,
|
|
const wl_event_msg_t *e, void *data);
|
|
static s32 wl_notify_connect_status(struct bcm_cfg80211 *cfg,
|
|
bcm_struct_cfgdev *cfgdev, const wl_event_msg_t *e, void *data);
|
|
static s32 wl_notify_roaming_status(struct bcm_cfg80211 *cfg,
|
|
bcm_struct_cfgdev *cfgdev, const wl_event_msg_t *e, void *data);
|
|
static s32 wl_bss_connect_done(struct bcm_cfg80211 *cfg, struct net_device *ndev,
|
|
const wl_event_msg_t *e, void *data, bool completed);
|
|
static s32 wl_bss_roaming_done(struct bcm_cfg80211 *cfg, struct net_device *ndev,
|
|
const wl_event_msg_t *e, void *data);
|
|
static s32 wl_notify_mic_status(struct bcm_cfg80211 *cfg, bcm_struct_cfgdev *cfgdev,
|
|
const wl_event_msg_t *e, void *data);
|
|
#ifdef BT_WIFI_HANDOVER
|
|
static s32 wl_notify_bt_wifi_handover_req(struct bcm_cfg80211 *cfg,
|
|
bcm_struct_cfgdev *cfgdev, const wl_event_msg_t *e, void *data);
|
|
#endif /* BT_WIFI_HANDOVER */
|
|
#ifdef GSCAN_SUPPORT
|
|
static s32 wl_handle_roam_exp_event(struct bcm_cfg80211 *wl, bcm_struct_cfgdev *cfgdev,
|
|
const wl_event_msg_t *e, void *data);
|
|
#endif /* GSCAN_SUPPORT */
|
|
#ifdef RSSI_MONITOR_SUPPORT
|
|
static s32 wl_handle_rssi_monitor_event(struct bcm_cfg80211 *wl, bcm_struct_cfgdev *cfgdev,
|
|
const wl_event_msg_t *e, void *data);
|
|
#endif /* RSSI_MONITOR_SUPPORT */
|
|
static s32 wl_notifier_change_state(struct bcm_cfg80211 *cfg, struct net_info *_net_info,
|
|
enum wl_status state, bool set);
|
|
#ifdef CUSTOM_EVENT_PM_WAKE
|
|
static s32 wl_check_pmstatus(struct bcm_cfg80211 *cfg, bcm_struct_cfgdev *cfgdev,
|
|
const wl_event_msg_t *e, void *data);
|
|
#endif /* CUSTOM_EVENT_PM_WAKE */
|
|
#if defined(DHD_LOSSLESS_ROAMING) || defined(DBG_PKT_MON)
|
|
static s32 wl_notify_roam_prep_status(struct bcm_cfg80211 *cfg,
|
|
bcm_struct_cfgdev *cfgdev, const wl_event_msg_t *e, void *data);
|
|
#endif /* DHD_LOSSLESS_ROAMING || DBG_PKT_MON */
|
|
#ifdef DHD_LOSSLESS_ROAMING
|
|
static void wl_del_roam_timeout(struct bcm_cfg80211 *cfg);
|
|
#endif /* DHD_LOSSLESS_ROAMING */
|
|
|
|
#ifdef WL_MBO
|
|
static s32
|
|
wl_mbo_event_handler(struct bcm_cfg80211 *cfg, bcm_struct_cfgdev *cfgdev,
|
|
const wl_event_msg_t *e, void *data);
|
|
#endif /* WL_MBO */
|
|
|
|
#ifdef WL_CLIENT_SAE
|
|
static s32 wl_notify_connect_status_bss(struct bcm_cfg80211 *cfg, struct net_device *ndev,
|
|
const wl_event_msg_t *e, void *data);
|
|
static s32 wl_notify_start_auth(struct bcm_cfg80211 *cfg,
|
|
bcm_struct_cfgdev *cfgdev, const wl_event_msg_t *e, void *data);
|
|
static s32 wl_cfg80211_external_auth(struct wiphy *wiphy,
|
|
struct net_device *dev, struct cfg80211_external_auth_params *ext_auth);
|
|
#endif /* WL_CLIENT_SAE */
|
|
|
|
/*
|
|
* register/deregister parent device
|
|
*/
|
|
static void wl_cfg80211_clear_parent_dev(void);
|
|
/*
|
|
* ioctl utilites
|
|
*/
|
|
|
|
/*
|
|
* cfg80211 set_wiphy_params utilities
|
|
*/
|
|
static s32 wl_set_frag(struct net_device *dev, u32 frag_threshold);
|
|
static s32 wl_set_rts(struct net_device *dev, u32 frag_threshold);
|
|
static s32 wl_set_retry(struct net_device *dev, u32 retry, bool l);
|
|
|
|
/*
|
|
* cfg profile utilities
|
|
*/
|
|
static s32 wl_update_prof(struct bcm_cfg80211 *cfg, struct net_device *ndev,
|
|
const wl_event_msg_t *e, const void *data, s32 item);
|
|
static void wl_init_prof(struct bcm_cfg80211 *cfg, struct net_device *ndev);
|
|
|
|
/*
|
|
* cfg80211 connect utilites
|
|
*/
|
|
static s32 wl_set_wpa_version(struct net_device *dev,
|
|
struct cfg80211_connect_params *sme);
|
|
static s32 wl_set_auth_type(struct net_device *dev,
|
|
struct cfg80211_connect_params *sme);
|
|
static s32 wl_set_set_cipher(struct net_device *dev,
|
|
struct cfg80211_connect_params *sme);
|
|
static s32 wl_set_key_mgmt(struct net_device *dev,
|
|
struct cfg80211_connect_params *sme);
|
|
static s32 wl_set_set_sharedkey(struct net_device *dev,
|
|
struct cfg80211_connect_params *sme);
|
|
#ifdef WL_FILS
|
|
static s32 wl_set_fils_params(struct net_device *dev,
|
|
struct cfg80211_connect_params *sme);
|
|
#endif // endif
|
|
#ifdef BCMWAPI_WPI
|
|
static s32 wl_set_set_wapi_ie(struct net_device *dev,
|
|
struct cfg80211_connect_params *sme);
|
|
#endif // endif
|
|
#ifdef WL_GCMP
|
|
static s32 wl_set_wsec_info_algos(struct net_device *dev, uint32 algos, uint32 mask);
|
|
#endif /* WL_GCMP */
|
|
static s32 wl_get_assoc_ies(struct bcm_cfg80211 *cfg, struct net_device *ndev);
|
|
static s32 wl_ch_to_chanspec(struct net_device *dev, int ch,
|
|
struct wl_join_params *join_params, size_t *join_params_size);
|
|
void wl_cfg80211_clear_security(struct bcm_cfg80211 *cfg);
|
|
|
|
/*
|
|
* information element utilities
|
|
*/
|
|
static void wl_rst_ie(struct bcm_cfg80211 *cfg);
|
|
static __used s32 wl_add_ie(struct bcm_cfg80211 *cfg, u8 t, u8 l, u8 *v);
|
|
static void wl_update_hidden_ap_ie(wl_bss_info_t *bi, const u8 *ie_stream, u32 *ie_size,
|
|
bool update_ssid);
|
|
static s32 wl_mrg_ie(struct bcm_cfg80211 *cfg, u8 *ie_stream, u16 ie_size);
|
|
static s32 wl_cp_ie(struct bcm_cfg80211 *cfg, u8 *dst, u16 dst_size);
|
|
static u32 wl_get_ielen(struct bcm_cfg80211 *cfg);
|
|
#ifdef MFP
|
|
static int wl_cfg80211_get_rsn_capa(const bcm_tlv_t *wpa2ie, const u8** rsn_cap);
|
|
#endif // endif
|
|
|
|
static s32 wl_setup_wiphy(struct wireless_dev *wdev, struct device *dev, dhd_pub_t *data);
|
|
static void wl_free_wdev(struct bcm_cfg80211 *cfg);
|
|
#ifdef CONFIG_CFG80211_INTERNAL_REGDB
|
|
#if (LINUX_VERSION_CODE < KERNEL_VERSION(3, 10, 11))
|
|
static int
|
|
#else
|
|
static void
|
|
#endif /* kernel version < 3.10.11 */
|
|
wl_cfg80211_reg_notifier(struct wiphy *wiphy, struct regulatory_request *request);
|
|
#endif /* CONFIG_CFG80211_INTERNAL_REGDB */
|
|
|
|
static s32 wl_inform_single_bss(struct bcm_cfg80211 *cfg, wl_bss_info_t *bi, bool update_ssid);
|
|
static s32 wl_update_bss_info(struct bcm_cfg80211 *cfg, struct net_device *ndev, bool update_ssid);
|
|
static chanspec_t wl_cfg80211_get_shared_freq(struct wiphy *wiphy);
|
|
s32 wl_cfg80211_channel_to_freq(u32 channel);
|
|
static void wl_cfg80211_work_handler(struct work_struct *work);
|
|
static s32 wl_add_keyext(struct wiphy *wiphy, struct net_device *dev,
|
|
u8 key_idx, const u8 *mac_addr,
|
|
struct key_params *params);
|
|
/*
|
|
* key indianess swap utilities
|
|
*/
|
|
static void swap_key_from_BE(struct wl_wsec_key *key);
|
|
static void swap_key_to_BE(struct wl_wsec_key *key);
|
|
|
|
/*
|
|
* bcm_cfg80211 memory init/deinit utilities
|
|
*/
|
|
static s32 wl_init_priv_mem(struct bcm_cfg80211 *cfg);
|
|
static void wl_deinit_priv_mem(struct bcm_cfg80211 *cfg);
|
|
|
|
static void wl_delay(u32 ms);
|
|
|
|
/*
|
|
* ibss mode utilities
|
|
*/
|
|
static bool wl_is_ibssmode(struct bcm_cfg80211 *cfg, struct net_device *ndev);
|
|
static __used bool wl_is_ibssstarter(struct bcm_cfg80211 *cfg);
|
|
|
|
/*
|
|
* link up/down , default configuration utilities
|
|
*/
|
|
static s32 __wl_cfg80211_up(struct bcm_cfg80211 *cfg);
|
|
static s32 __wl_cfg80211_down(struct bcm_cfg80211 *cfg);
|
|
static bool wl_is_linkdown(struct bcm_cfg80211 *cfg, const wl_event_msg_t *e);
|
|
|
|
static bool wl_is_linkup(struct bcm_cfg80211 *cfg, const wl_event_msg_t *e,
|
|
struct net_device *ndev);
|
|
static bool wl_is_nonetwork(struct bcm_cfg80211 *cfg, const wl_event_msg_t *e);
|
|
static void wl_link_up(struct bcm_cfg80211 *cfg);
|
|
static void wl_link_down(struct bcm_cfg80211 *cfg);
|
|
static s32 wl_config_infra(struct bcm_cfg80211 *cfg, struct net_device *ndev, u16 iftype);
|
|
static void wl_init_conf(struct wl_conf *conf);
|
|
int wl_cfg80211_get_ioctl_version(void);
|
|
|
|
/*
|
|
* find most significant bit set
|
|
*/
|
|
static __used u32 wl_find_msb(u16 bit16);
|
|
|
|
/*
|
|
* rfkill support
|
|
*/
|
|
static int wl_setup_rfkill(struct bcm_cfg80211 *cfg, bool setup);
|
|
static int wl_rfkill_set(void *data, bool blocked);
|
|
#ifdef DEBUGFS_CFG80211
|
|
static s32 wl_setup_debugfs(struct bcm_cfg80211 *cfg);
|
|
static s32 wl_free_debugfs(struct bcm_cfg80211 *cfg);
|
|
#endif // endif
|
|
static bool check_dev_role_integrity(struct bcm_cfg80211 *cfg, u32 dev_role);
|
|
|
|
#ifdef WL_CFG80211_ACL
|
|
/* ACL */
|
|
static int wl_cfg80211_set_mac_acl(struct wiphy *wiphy, struct net_device *cfgdev,
|
|
const struct cfg80211_acl_data *acl);
|
|
#endif /* WL_CFG80211_ACL */
|
|
|
|
/*
|
|
* Some external functions, TODO: move them to dhd_linux.h
|
|
*/
|
|
int dhd_add_monitor(const char *name, struct net_device **new_ndev);
|
|
int dhd_del_monitor(struct net_device *ndev);
|
|
int dhd_monitor_init(void *dhd_pub);
|
|
int dhd_monitor_uninit(void);
|
|
int dhd_start_xmit(struct sk_buff *skb, struct net_device *net);
|
|
|
|
#ifdef ESCAN_CHANNEL_CACHE
|
|
void reset_roam_cache(struct bcm_cfg80211 *cfg);
|
|
void add_roam_cache(struct bcm_cfg80211 *cfg, wl_bss_info_t *bi);
|
|
int get_roam_channel_list(int target_chan, chanspec_t *channels,
|
|
int n_channels, const wlc_ssid_t *ssid, int ioctl_ver);
|
|
void set_roam_band(int band);
|
|
#endif /* ESCAN_CHANNEL_CACHE */
|
|
|
|
#ifdef ROAM_CHANNEL_CACHE
|
|
int init_roam_cache(struct bcm_cfg80211 *cfg, int ioctl_ver);
|
|
void print_roam_cache(struct bcm_cfg80211 *cfg);
|
|
void update_roam_cache(struct bcm_cfg80211 *cfg, int ioctl_ver);
|
|
#endif /* ROAM_CHANNEL_CACHE */
|
|
|
|
#ifdef P2P_LISTEN_OFFLOADING
|
|
s32 wl_cfg80211_p2plo_deinit(struct bcm_cfg80211 *cfg);
|
|
#endif /* P2P_LISTEN_OFFLOADING */
|
|
|
|
#ifdef PKT_FILTER_SUPPORT
|
|
extern uint dhd_pkt_filter_enable;
|
|
extern uint dhd_master_mode;
|
|
extern void dhd_pktfilter_offload_enable(dhd_pub_t * dhd, char *arg, int enable, int master_mode);
|
|
#endif /* PKT_FILTER_SUPPORT */
|
|
|
|
#ifdef SUPPORT_SET_CAC
|
|
static void wl_cfg80211_set_cac(struct bcm_cfg80211 *cfg, int enable);
|
|
#endif /* SUPPORT_SET_CAC */
|
|
|
|
static int wl_cfg80211_delayed_roam(struct bcm_cfg80211 *cfg, struct net_device *ndev,
|
|
const struct ether_addr *bssid);
|
|
static s32 __wl_update_wiphybands(struct bcm_cfg80211 *cfg, bool notify);
|
|
|
|
#ifdef WL_WPS_SYNC
|
|
static void wl_init_wps_reauth_sm(struct bcm_cfg80211 *cfg);
|
|
static void wl_deinit_wps_reauth_sm(struct bcm_cfg80211 *cfg);
|
|
static void wl_wps_reauth_timeout(unsigned long data);
|
|
static s32 wl_get_free_wps_inst(struct bcm_cfg80211 *cfg);
|
|
static s32 wl_get_wps_inst_match(struct bcm_cfg80211 *cfg, struct net_device *ndev);
|
|
static s32 wl_wps_session_add(struct net_device *ndev, u16 mode, u8 *peer_mac);
|
|
static void wl_wps_session_del(struct net_device *ndev);
|
|
static s32 wl_wps_session_update(struct net_device *ndev, u16 state, const u8 *peer_mac);
|
|
static void wl_wps_handle_ifdel(struct net_device *ndev);
|
|
#endif /* WL_WPS_SYNC */
|
|
|
|
#if defined(WL_FW_OCE_AP_SELECT)
|
|
bool static wl_cfg80211_is_oce_ap(struct wiphy *wiphy, const u8 *bssid_hint);
|
|
#endif /* WL_FW_OCE_AP_SELECT */
|
|
|
|
#ifdef WL_BCNRECV
|
|
static s32 wl_bcnrecv_aborted_event_handler(struct bcm_cfg80211 *cfg, bcm_struct_cfgdev *cfgdev,
|
|
const wl_event_msg_t *e, void *data);
|
|
#endif /* WL_BCNRECV */
|
|
|
|
#ifdef WL_CAC_TS
|
|
static s32 wl_cfg80211_cac_event_handler(struct bcm_cfg80211 *cfg, bcm_struct_cfgdev *cfgdev,
|
|
const wl_event_msg_t *e, void *data);
|
|
#endif /* WL_CAC_TS */
|
|
|
|
#if defined(WL_MBO) || defined(WL_OCE)
|
|
static s32 wl_bssid_prune_event_handler(struct bcm_cfg80211 *cfg, bcm_struct_cfgdev *cfgdev,
|
|
const wl_event_msg_t *e, void *data);
|
|
#endif /* WL_MBO || WL_OCE */
|
|
|
|
static int bw2cap[] = { 0, 0, WLC_BW_CAP_20MHZ, WLC_BW_CAP_40MHZ, WLC_BW_CAP_80MHZ,
|
|
WLC_BW_CAP_160MHZ, WLC_BW_CAP_160MHZ };
|
|
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(4, 1, 0)) || (defined(CONFIG_ARCH_MSM) && \
|
|
defined(CFG80211_DISCONNECTED_V2))
|
|
#define CFG80211_GET_BSS(wiphy, channel, bssid, ssid, ssid_len) \
|
|
cfg80211_get_bss(wiphy, channel, bssid, ssid, ssid_len, \
|
|
IEEE80211_BSS_TYPE_ANY, IEEE80211_PRIVACY_ANY);
|
|
#else
|
|
#define CFG80211_GET_BSS(wiphy, channel, bssid, ssid, ssid_len) \
|
|
cfg80211_get_bss(wiphy, channel, bssid, ssid, ssid_len, \
|
|
WLAN_CAPABILITY_ESS, WLAN_CAPABILITY_ESS);
|
|
#endif /* (LINUX_VERSION_CODE >= KERNEL_VERSION(4, 1, 0)) */
|
|
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(4, 7, 0))
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(4, 11, 0)) || \
|
|
defined(CFG80211_CONNECT_TIMEOUT_REASON_CODE) || defined(WL_FILS) || \
|
|
defined(CONFIG_CFG80211_FILS_BKPORT)
|
|
#define CFG80211_CONNECT_RESULT(dev, bssid, bss, req_ie, req_ie_len, resp_ie, \
|
|
resp_ie_len, status, gfp) \
|
|
cfg80211_connect_bss(dev, bssid, bss, req_ie, req_ie_len, resp_ie, \
|
|
resp_ie_len, status, gfp, NL80211_TIMEOUT_UNSPECIFIED);
|
|
#else
|
|
#define CFG80211_CONNECT_RESULT(dev, bssid, bss, req_ie, req_ie_len, resp_ie, \
|
|
resp_ie_len, status, gfp) \
|
|
cfg80211_connect_bss(dev, bssid, bss, req_ie, req_ie_len, resp_ie, \
|
|
resp_ie_len, status, gfp);
|
|
#endif /* LINUX_VERSION_CODE >= KERNEL_VERSION(4, 11, 0) || \
|
|
* (CFG80211_CONNECT_TIMEOUT_REASON_CODE) ||
|
|
* WL_FILS || CONFIG_CFG80211_FILS_BKPORT
|
|
*/
|
|
#elif defined(CFG80211_CONNECT_TIMEOUT_REASON_CODE)
|
|
/* There are customer kernels with backported changes for
|
|
* connect timeout. CFG80211_CONNECT_TIMEOUT_REASON_CODE define
|
|
* is available for kernels < 4.7 in such cases.
|
|
*/
|
|
#define CFG80211_CONNECT_RESULT(dev, bssid, bss, req_ie, req_ie_len, resp_ie, \
|
|
resp_ie_len, status, gfp) \
|
|
cfg80211_connect_bss(dev, bssid, bss, req_ie, req_ie_len, resp_ie, \
|
|
resp_ie_len, status, gfp, NL80211_TIMEOUT_UNSPECIFIED);
|
|
#else
|
|
/* Kernels < 4.7 doesn't support cfg80211_connect_bss */
|
|
#define CFG80211_CONNECT_RESULT(dev, bssid, bss, req_ie, req_ie_len, resp_ie, \
|
|
resp_ie_len, status, gfp) \
|
|
cfg80211_connect_result(dev, bssid, req_ie, req_ie_len, resp_ie, \
|
|
resp_ie_len, status, gfp);
|
|
#endif /* LINUX_VERSION_CODE >= KERNEL_VERSION(4, 7, 0) */
|
|
|
|
#define IS_WPA_AKM(akm) ((akm) == RSN_AKM_NONE || \
|
|
(akm) == RSN_AKM_UNSPECIFIED || \
|
|
(akm) == RSN_AKM_PSK)
|
|
|
|
extern int dhd_wait_pend8021x(struct net_device *dev);
|
|
#ifdef PROP_TXSTATUS_VSDB
|
|
extern int disable_proptx;
|
|
#endif /* PROP_TXSTATUS_VSDB */
|
|
|
|
static s32
|
|
wl_ap_start_ind(struct bcm_cfg80211 *cfg, bcm_struct_cfgdev *cfgdev,
|
|
const wl_event_msg_t *e, void *data);
|
|
static s32
|
|
wl_csa_complete_ind(struct bcm_cfg80211 *cfg, bcm_struct_cfgdev *cfgdev,
|
|
const wl_event_msg_t *e, void *data);
|
|
#ifdef SUPPORT_AP_BWCTRL
|
|
static void
|
|
wl_update_apchan_bwcap(struct bcm_cfg80211 *cfg, struct net_device *ndev, chanspec_t chanspec);
|
|
static void
|
|
wl_restore_ap_bw(struct bcm_cfg80211 *cfg);
|
|
#endif /* SUPPORT_AP_BWCTRL */
|
|
|
|
#if ((LINUX_VERSION_CODE >= KERNEL_VERSION (3, 5, 0)) && (LINUX_VERSION_CODE <= (3, 7, \
|
|
0)))
|
|
struct chan_info {
|
|
int freq;
|
|
int chan_type;
|
|
};
|
|
#endif // endif
|
|
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 9, 0))
|
|
#define CFG80211_PUT_BSS(wiphy, bss) cfg80211_put_bss(wiphy, bss);
|
|
#else
|
|
#define CFG80211_PUT_BSS(wiphy, bss) cfg80211_put_bss(bss);
|
|
#endif /* (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 9, 0) */
|
|
|
|
#define CHAN2G(_channel, _freq, _flags) { \
|
|
.band = IEEE80211_BAND_2GHZ, \
|
|
.center_freq = (_freq), \
|
|
.hw_value = (_channel), \
|
|
.flags = (_flags), \
|
|
.max_antenna_gain = 0, \
|
|
.max_power = 30, \
|
|
}
|
|
|
|
#define CHAN5G(_channel, _flags) { \
|
|
.band = IEEE80211_BAND_5GHZ, \
|
|
.center_freq = 5000 + (5 * (_channel)), \
|
|
.hw_value = (_channel), \
|
|
.flags = (_flags), \
|
|
.max_antenna_gain = 0, \
|
|
.max_power = 30, \
|
|
}
|
|
|
|
#define RATE_TO_BASE100KBPS(rate) (((rate) * 10) / 2)
|
|
#define RATETAB_ENT(_rateid, _flags) \
|
|
{ \
|
|
.bitrate = RATE_TO_BASE100KBPS(_rateid), \
|
|
.hw_value = (_rateid), \
|
|
.flags = (_flags), \
|
|
}
|
|
|
|
static struct ieee80211_rate __wl_rates[] = {
|
|
RATETAB_ENT(DOT11_RATE_1M, 0),
|
|
RATETAB_ENT(DOT11_RATE_2M, IEEE80211_RATE_SHORT_PREAMBLE),
|
|
RATETAB_ENT(DOT11_RATE_5M5, IEEE80211_RATE_SHORT_PREAMBLE),
|
|
RATETAB_ENT(DOT11_RATE_11M, IEEE80211_RATE_SHORT_PREAMBLE),
|
|
RATETAB_ENT(DOT11_RATE_6M, 0),
|
|
RATETAB_ENT(DOT11_RATE_9M, 0),
|
|
RATETAB_ENT(DOT11_RATE_12M, 0),
|
|
RATETAB_ENT(DOT11_RATE_18M, 0),
|
|
RATETAB_ENT(DOT11_RATE_24M, 0),
|
|
RATETAB_ENT(DOT11_RATE_36M, 0),
|
|
RATETAB_ENT(DOT11_RATE_48M, 0),
|
|
RATETAB_ENT(DOT11_RATE_54M, 0)
|
|
};
|
|
|
|
#define wl_a_rates (__wl_rates + 4)
|
|
#define wl_a_rates_size 8
|
|
#define wl_g_rates (__wl_rates + 0)
|
|
#define wl_g_rates_size 12
|
|
|
|
static struct ieee80211_channel __wl_2ghz_channels[] = {
|
|
CHAN2G(1, 2412, 0),
|
|
CHAN2G(2, 2417, 0),
|
|
CHAN2G(3, 2422, 0),
|
|
CHAN2G(4, 2427, 0),
|
|
CHAN2G(5, 2432, 0),
|
|
CHAN2G(6, 2437, 0),
|
|
CHAN2G(7, 2442, 0),
|
|
CHAN2G(8, 2447, 0),
|
|
CHAN2G(9, 2452, 0),
|
|
CHAN2G(10, 2457, 0),
|
|
CHAN2G(11, 2462, 0),
|
|
CHAN2G(12, 2467, 0),
|
|
CHAN2G(13, 2472, 0),
|
|
CHAN2G(14, 2484, 0)
|
|
};
|
|
|
|
static struct ieee80211_channel __wl_5ghz_a_channels[] = {
|
|
CHAN5G(34, 0), CHAN5G(36, 0),
|
|
CHAN5G(38, 0), CHAN5G(40, 0),
|
|
CHAN5G(42, 0), CHAN5G(44, 0),
|
|
CHAN5G(46, 0), CHAN5G(48, 0),
|
|
CHAN5G(52, 0), CHAN5G(56, 0),
|
|
CHAN5G(60, 0), CHAN5G(64, 0),
|
|
CHAN5G(100, 0), CHAN5G(104, 0),
|
|
CHAN5G(108, 0), CHAN5G(112, 0),
|
|
CHAN5G(116, 0), CHAN5G(120, 0),
|
|
CHAN5G(124, 0), CHAN5G(128, 0),
|
|
CHAN5G(132, 0), CHAN5G(136, 0),
|
|
CHAN5G(140, 0), CHAN5G(144, 0),
|
|
CHAN5G(149, 0), CHAN5G(153, 0),
|
|
CHAN5G(157, 0), CHAN5G(161, 0),
|
|
CHAN5G(165, 0)
|
|
};
|
|
|
|
static struct ieee80211_supported_band __wl_band_2ghz = {
|
|
.band = IEEE80211_BAND_2GHZ,
|
|
.channels = __wl_2ghz_channels,
|
|
.n_channels = ARRAY_SIZE(__wl_2ghz_channels),
|
|
.bitrates = wl_g_rates,
|
|
.n_bitrates = wl_g_rates_size
|
|
};
|
|
|
|
static struct ieee80211_supported_band __wl_band_5ghz_a = {
|
|
.band = IEEE80211_BAND_5GHZ,
|
|
.channels = __wl_5ghz_a_channels,
|
|
.n_channels = ARRAY_SIZE(__wl_5ghz_a_channels),
|
|
.bitrates = wl_a_rates,
|
|
.n_bitrates = wl_a_rates_size
|
|
};
|
|
|
|
static const u32 __wl_cipher_suites[] = {
|
|
WLAN_CIPHER_SUITE_WEP40,
|
|
WLAN_CIPHER_SUITE_WEP104,
|
|
WLAN_CIPHER_SUITE_TKIP,
|
|
WLAN_CIPHER_SUITE_CCMP,
|
|
#ifdef MFP
|
|
/*
|
|
* Advertising AES_CMAC cipher suite to userspace would imply that we
|
|
* are supporting MFP. So advertise only when MFP support is enabled.
|
|
*/
|
|
WLAN_CIPHER_SUITE_AES_CMAC,
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(4, 0, 0))
|
|
WLAN_CIPHER_SUITE_BIP_GMAC_256,
|
|
WLAN_CIPHER_SUITE_BIP_GMAC_128,
|
|
WLAN_CIPHER_SUITE_BIP_CMAC_256,
|
|
#endif /* LINUX_VERSION_CODE >= KERNEL_VERSION(4, 0, 0) */
|
|
#endif /* MFP */
|
|
|
|
#ifdef BCMWAPI_WPI
|
|
WLAN_CIPHER_SUITE_SMS4,
|
|
#endif // endif
|
|
#if defined(WLAN_CIPHER_SUITE_PMK)
|
|
WLAN_CIPHER_SUITE_PMK,
|
|
#endif /* WLAN_CIPHER_SUITE_PMK */
|
|
#ifdef WL_GCMP
|
|
WLAN_CIPHER_SUITE_GCMP,
|
|
WLAN_CIPHER_SUITE_GCMP_256,
|
|
WLAN_CIPHER_SUITE_BIP_GMAC_128,
|
|
WLAN_CIPHER_SUITE_BIP_GMAC_256,
|
|
#endif /* WL_GCMP */
|
|
};
|
|
|
|
#ifdef WL_SUPPORT_ACS
|
|
/*
|
|
* The firmware code required for this feature to work is currently under
|
|
* BCMINTERNAL flag. In future if this is to enabled we need to bring the
|
|
* required firmware code out of the BCMINTERNAL flag.
|
|
*/
|
|
struct wl_dump_survey {
|
|
u32 obss;
|
|
u32 ibss;
|
|
u32 no_ctg;
|
|
u32 no_pckt;
|
|
u32 tx;
|
|
u32 idle;
|
|
};
|
|
#endif /* WL_SUPPORT_ACS */
|
|
|
|
#ifdef WL_CFG80211_GON_COLLISION
|
|
#define BLOCK_GON_REQ_MAX_NUM 5
|
|
#endif /* WL_CFG80211_GON_COLLISION */
|
|
|
|
#if defined(USE_DYNAMIC_MAXPKT_RXGLOM)
|
|
static int maxrxpktglom = 0;
|
|
#endif // endif
|
|
|
|
/* IOCtl version read from targeted driver */
|
|
int ioctl_version;
|
|
#ifdef DEBUGFS_CFG80211
|
|
#define SUBLOGLEVEL 20
|
|
#define SUBLOGLEVELZ ((SUBLOGLEVEL) + (1))
|
|
static const struct {
|
|
u32 log_level;
|
|
char *sublogname;
|
|
} sublogname_map[] = {
|
|
{WL_DBG_ERR, "ERR"},
|
|
{WL_DBG_INFO, "INFO"},
|
|
{WL_DBG_DBG, "DBG"},
|
|
{WL_DBG_SCAN, "SCAN"},
|
|
{WL_DBG_TRACE, "TRACE"},
|
|
{WL_DBG_P2P_ACTION, "P2PACTION"}
|
|
};
|
|
#endif // endif
|
|
|
|
typedef struct rsn_cipher_algo_entry {
|
|
u32 cipher_suite;
|
|
u32 wsec_algo;
|
|
u32 wsec_key_algo;
|
|
} rsn_cipher_algo_entry_t;
|
|
|
|
static const rsn_cipher_algo_entry_t rsn_cipher_algo_lookup_tbl[] = {
|
|
{WLAN_CIPHER_SUITE_WEP40, WEP_ENABLED, CRYPTO_ALGO_WEP1},
|
|
{WLAN_CIPHER_SUITE_WEP104, WEP_ENABLED, CRYPTO_ALGO_WEP128},
|
|
{WLAN_CIPHER_SUITE_TKIP, TKIP_ENABLED, CRYPTO_ALGO_TKIP},
|
|
{WLAN_CIPHER_SUITE_CCMP, AES_ENABLED, CRYPTO_ALGO_AES_CCM},
|
|
{WLAN_CIPHER_SUITE_AES_CMAC, AES_ENABLED, CRYPTO_ALGO_BIP},
|
|
#ifdef BCMWAPI_WPI
|
|
{WLAN_CIPHER_SUITE_SMS4, SMS4_ENABLED, CRYPTO_ALGO_SMS4},
|
|
#endif /* BCMWAPI_WPI */
|
|
#ifdef WL_GCMP
|
|
{WLAN_CIPHER_SUITE_GCMP, AES_ENABLED, CRYPTO_ALGO_AES_GCM},
|
|
{WLAN_CIPHER_SUITE_GCMP_256, AES_ENABLED, CRYPTO_ALGO_AES_GCM256},
|
|
{WLAN_CIPHER_SUITE_BIP_GMAC_128, AES_ENABLED, CRYPTO_ALGO_BIP_GMAC},
|
|
{WLAN_CIPHER_SUITE_BIP_GMAC_256, AES_ENABLED, CRYPTO_ALGO_BIP_GMAC256},
|
|
#endif /* WL_GCMP */
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(4, 0, 0))
|
|
{WLAN_CIPHER_SUITE_BIP_CMAC_256, AES_ENABLED, CRYPTO_ALGO_BIP_CMAC256},
|
|
#endif /* LINUX_VERSION_CODE >= KERNEL_VERSION(4, 0, 0) */
|
|
};
|
|
|
|
typedef struct rsn_akm_wpa_auth_entry {
|
|
u32 akm_suite;
|
|
u32 wpa_auth;
|
|
} rsn_akm_wpa_auth_entry_t;
|
|
|
|
static const rsn_akm_wpa_auth_entry_t rsn_akm_wpa_auth_lookup_tbl[] = {
|
|
#ifdef WL_OWE
|
|
{WLAN_AKM_SUITE_OWE, WPA3_AUTH_OWE},
|
|
#endif /* WL_OWE */
|
|
{WLAN_AKM_SUITE_8021X, WPA2_AUTH_UNSPECIFIED},
|
|
{WL_AKM_SUITE_SHA256_1X, WPA2_AUTH_1X_SHA256},
|
|
{WL_AKM_SUITE_SHA256_PSK, WPA2_AUTH_PSK_SHA256},
|
|
{WLAN_AKM_SUITE_PSK, WPA2_AUTH_PSK},
|
|
{WLAN_AKM_SUITE_FT_8021X, WPA2_AUTH_UNSPECIFIED | WPA2_AUTH_FT},
|
|
{WLAN_AKM_SUITE_FT_PSK, WPA2_AUTH_PSK | WPA2_AUTH_FT},
|
|
{WLAN_AKM_SUITE_FILS_SHA256, WPA2_AUTH_FILS_SHA256},
|
|
{WLAN_AKM_SUITE_FILS_SHA384, WPA2_AUTH_FILS_SHA384},
|
|
{WLAN_AKM_SUITE_8021X_SUITE_B, WPA3_AUTH_1X_SUITE_B_SHA256},
|
|
{WLAN_AKM_SUITE_8021X_SUITE_B_192, WPA3_AUTH_1X_SUITE_B_SHA384},
|
|
#ifdef BCMWAPI_WPI
|
|
{WLAN_AKM_SUITE_WAPI_CERT, WAPI_AUTH_UNSPECIFIED},
|
|
{WLAN_AKM_SUITE_WAPI_PSK, WAPI_AUTH_PSK},
|
|
#endif /* BCMWAPI_WPI */
|
|
#if defined(WL_SAE) || defined(WL_CLIENT_SAE)
|
|
{WLAN_AKM_SUITE_SAE, WPA3_AUTH_SAE_PSK},
|
|
#endif /* WL_SAE || WL_CLIENT_SAE */
|
|
{WLAN_AKM_SUITE_FT_8021X_SHA384, WPA3_AUTH_1X_SUITE_B_SHA384 | WPA2_AUTH_FT}
|
|
};
|
|
|
|
#define BUFSZ 8
|
|
#define BUFSZN BUFSZ + 1
|
|
|
|
#define _S(x) #x
|
|
#define S(x) _S(x)
|
|
|
|
#define SOFT_AP_IF_NAME "swlan0"
|
|
|
|
/* watchdog timer for disconnecting when fw is not associated for FW_ASSOC_WATCHDOG_TIME ms */
|
|
uint32 fw_assoc_watchdog_ms = 0;
|
|
bool fw_assoc_watchdog_started = 0;
|
|
#define FW_ASSOC_WATCHDOG_TIME 10 * 1000 /* msec */
|
|
|
|
static void wl_add_remove_pm_enable_work(struct bcm_cfg80211 *cfg,
|
|
enum wl_pm_workq_act_type type)
|
|
{
|
|
u16 wq_duration = 0;
|
|
dhd_pub_t *dhd = NULL;
|
|
|
|
if (cfg == NULL)
|
|
return;
|
|
|
|
dhd = (dhd_pub_t *)(cfg->pub);
|
|
|
|
mutex_lock(&cfg->pm_sync);
|
|
/*
|
|
* Make cancel and schedule work part mutually exclusive
|
|
* so that while cancelling, we are sure that there is no
|
|
* work getting scheduled.
|
|
*/
|
|
if (delayed_work_pending(&cfg->pm_enable_work)) {
|
|
cancel_delayed_work(&cfg->pm_enable_work);
|
|
DHD_PM_WAKE_UNLOCK(cfg->pub);
|
|
}
|
|
|
|
if (type == WL_PM_WORKQ_SHORT) {
|
|
wq_duration = WL_PM_ENABLE_TIMEOUT;
|
|
} else if (type == WL_PM_WORKQ_LONG) {
|
|
wq_duration = (WL_PM_ENABLE_TIMEOUT*2);
|
|
}
|
|
|
|
/* It should schedule work item only if driver is up */
|
|
if (wq_duration && dhd->up) {
|
|
if (schedule_delayed_work(&cfg->pm_enable_work,
|
|
msecs_to_jiffies((const unsigned int)wq_duration))) {
|
|
DHD_PM_WAKE_LOCK_TIMEOUT(cfg->pub, wq_duration);
|
|
} else {
|
|
WL_ERR(("Can't schedule pm work handler\n"));
|
|
}
|
|
}
|
|
mutex_unlock(&cfg->pm_sync);
|
|
}
|
|
|
|
/* Return a new chanspec given a legacy chanspec
|
|
* Returns INVCHANSPEC on error
|
|
*/
|
|
chanspec_t
|
|
wl_chspec_from_legacy(chanspec_t legacy_chspec)
|
|
{
|
|
chanspec_t chspec;
|
|
|
|
/* get the channel number */
|
|
chspec = LCHSPEC_CHANNEL(legacy_chspec);
|
|
|
|
/* convert the band */
|
|
if (LCHSPEC_IS2G(legacy_chspec)) {
|
|
chspec |= WL_CHANSPEC_BAND_2G;
|
|
} else {
|
|
chspec |= WL_CHANSPEC_BAND_5G;
|
|
}
|
|
|
|
/* convert the bw and sideband */
|
|
if (LCHSPEC_IS20(legacy_chspec)) {
|
|
chspec |= WL_CHANSPEC_BW_20;
|
|
} else {
|
|
chspec |= WL_CHANSPEC_BW_40;
|
|
if (LCHSPEC_CTL_SB(legacy_chspec) == WL_LCHANSPEC_CTL_SB_LOWER) {
|
|
chspec |= WL_CHANSPEC_CTL_SB_L;
|
|
} else {
|
|
chspec |= WL_CHANSPEC_CTL_SB_U;
|
|
}
|
|
}
|
|
|
|
if (wf_chspec_malformed(chspec)) {
|
|
WL_ERR(("wl_chspec_from_legacy: output chanspec (0x%04X) malformed\n",
|
|
chspec));
|
|
return INVCHANSPEC;
|
|
}
|
|
|
|
return chspec;
|
|
}
|
|
|
|
/* Return a legacy chanspec given a new chanspec
|
|
* Returns INVCHANSPEC on error
|
|
*/
|
|
static chanspec_t
|
|
wl_chspec_to_legacy(chanspec_t chspec)
|
|
{
|
|
chanspec_t lchspec;
|
|
|
|
if (wf_chspec_malformed(chspec)) {
|
|
WL_ERR(("wl_chspec_to_legacy: input chanspec (0x%04X) malformed\n",
|
|
chspec));
|
|
return INVCHANSPEC;
|
|
}
|
|
|
|
/* get the channel number */
|
|
lchspec = CHSPEC_CHANNEL(chspec);
|
|
|
|
/* convert the band */
|
|
if (CHSPEC_IS2G(chspec)) {
|
|
lchspec |= WL_LCHANSPEC_BAND_2G;
|
|
} else {
|
|
lchspec |= WL_LCHANSPEC_BAND_5G;
|
|
}
|
|
|
|
/* convert the bw and sideband */
|
|
if (CHSPEC_IS20(chspec)) {
|
|
lchspec |= WL_LCHANSPEC_BW_20;
|
|
lchspec |= WL_LCHANSPEC_CTL_SB_NONE;
|
|
} else if (CHSPEC_IS40(chspec)) {
|
|
lchspec |= WL_LCHANSPEC_BW_40;
|
|
if (CHSPEC_CTL_SB(chspec) == WL_CHANSPEC_CTL_SB_L) {
|
|
lchspec |= WL_LCHANSPEC_CTL_SB_LOWER;
|
|
} else {
|
|
lchspec |= WL_LCHANSPEC_CTL_SB_UPPER;
|
|
}
|
|
} else {
|
|
/* cannot express the bandwidth */
|
|
char chanbuf[CHANSPEC_STR_LEN];
|
|
WL_ERR((
|
|
"wl_chspec_to_legacy: unable to convert chanspec %s (0x%04X) "
|
|
"to pre-11ac format\n",
|
|
wf_chspec_ntoa(chspec, chanbuf), chspec));
|
|
return INVCHANSPEC;
|
|
}
|
|
|
|
return lchspec;
|
|
}
|
|
|
|
bool wl_cfg80211_is_hal_started(struct bcm_cfg80211 *cfg)
|
|
{
|
|
return cfg->hal_started;
|
|
}
|
|
|
|
/* given a chanspec value, do the endian and chanspec version conversion to
|
|
* a chanspec_t value
|
|
* Returns INVCHANSPEC on error
|
|
*/
|
|
chanspec_t
|
|
wl_chspec_host_to_driver(chanspec_t chanspec)
|
|
{
|
|
if (ioctl_version == 1) {
|
|
chanspec = wl_chspec_to_legacy(chanspec);
|
|
if (chanspec == INVCHANSPEC) {
|
|
return chanspec;
|
|
}
|
|
}
|
|
chanspec = htodchanspec(chanspec);
|
|
|
|
return chanspec;
|
|
}
|
|
|
|
/* given a channel value, do the endian and chanspec version conversion to
|
|
* a chanspec_t value
|
|
* Returns INVCHANSPEC on error
|
|
*/
|
|
chanspec_t
|
|
wl_ch_host_to_driver(u16 channel)
|
|
{
|
|
chanspec_t chanspec;
|
|
chanspec_band_t band;
|
|
|
|
band = WL_CHANNEL_BAND(channel);
|
|
|
|
chanspec = wf_create_20MHz_chspec(channel, band);
|
|
if (chanspec == INVCHANSPEC) {
|
|
return chanspec;
|
|
}
|
|
|
|
return wl_chspec_host_to_driver(chanspec);
|
|
}
|
|
|
|
/* given a chanspec value from the driver, do the endian and chanspec version conversion to
|
|
* a chanspec_t value
|
|
* Returns INVCHANSPEC on error
|
|
*/
|
|
chanspec_t
|
|
wl_chspec_driver_to_host(chanspec_t chanspec)
|
|
{
|
|
chanspec = dtohchanspec(chanspec);
|
|
if (ioctl_version == 1) {
|
|
chanspec = wl_chspec_from_legacy(chanspec);
|
|
}
|
|
|
|
return chanspec;
|
|
}
|
|
|
|
/*
|
|
* convert ASCII string to MAC address (colon-delimited format)
|
|
* eg: 00:11:22:33:44:55
|
|
*/
|
|
int
|
|
wl_cfg80211_ether_atoe(const char *a, struct ether_addr *n)
|
|
{
|
|
char *c = NULL;
|
|
int count = 0;
|
|
|
|
bzero(n, ETHER_ADDR_LEN);
|
|
for (;;) {
|
|
n->octet[count++] = (uint8)simple_strtoul(a, &c, 16);
|
|
if (!*c++ || count == ETHER_ADDR_LEN)
|
|
break;
|
|
a = c;
|
|
}
|
|
return (count == ETHER_ADDR_LEN);
|
|
}
|
|
|
|
/* There isn't a lot of sense in it, but you can transmit anything you like */
|
|
static const struct ieee80211_txrx_stypes
|
|
wl_cfg80211_default_mgmt_stypes[NUM_NL80211_IFTYPES] = {
|
|
#ifdef WLMESH_CFG80211
|
|
[NL80211_IFTYPE_MESH_POINT] = {
|
|
.tx = 0xffff,
|
|
.rx = BIT(IEEE80211_STYPE_ACTION >> 4) |
|
|
BIT(IEEE80211_STYPE_AUTH >> 4)
|
|
},
|
|
#endif /* WLMESH_CFG80211 */
|
|
[NL80211_IFTYPE_ADHOC] = {
|
|
.tx = 0xffff,
|
|
.rx = BIT(IEEE80211_STYPE_ACTION >> 4)
|
|
},
|
|
[NL80211_IFTYPE_STATION] = {
|
|
.tx = 0xffff,
|
|
.rx = BIT(IEEE80211_STYPE_ACTION >> 4) |
|
|
BIT(IEEE80211_STYPE_PROBE_REQ >> 4)
|
|
#ifdef WL_CLIENT_SAE
|
|
| BIT(IEEE80211_STYPE_AUTH >> 4)
|
|
#endif /* WL_CLIENT_SAE */
|
|
},
|
|
[NL80211_IFTYPE_AP] = {
|
|
.tx = 0xffff,
|
|
.rx = BIT(IEEE80211_STYPE_ASSOC_REQ >> 4) |
|
|
BIT(IEEE80211_STYPE_REASSOC_REQ >> 4) |
|
|
BIT(IEEE80211_STYPE_PROBE_REQ >> 4) |
|
|
BIT(IEEE80211_STYPE_DISASSOC >> 4) |
|
|
BIT(IEEE80211_STYPE_AUTH >> 4) |
|
|
BIT(IEEE80211_STYPE_DEAUTH >> 4) |
|
|
BIT(IEEE80211_STYPE_ACTION >> 4)
|
|
},
|
|
[NL80211_IFTYPE_AP_VLAN] = {
|
|
/* copy AP */
|
|
.tx = 0xffff,
|
|
.rx = BIT(IEEE80211_STYPE_ASSOC_REQ >> 4) |
|
|
BIT(IEEE80211_STYPE_REASSOC_REQ >> 4) |
|
|
BIT(IEEE80211_STYPE_PROBE_REQ >> 4) |
|
|
BIT(IEEE80211_STYPE_DISASSOC >> 4) |
|
|
BIT(IEEE80211_STYPE_AUTH >> 4) |
|
|
BIT(IEEE80211_STYPE_DEAUTH >> 4) |
|
|
BIT(IEEE80211_STYPE_ACTION >> 4)
|
|
},
|
|
[NL80211_IFTYPE_P2P_CLIENT] = {
|
|
.tx = 0xffff,
|
|
.rx = BIT(IEEE80211_STYPE_ACTION >> 4) |
|
|
BIT(IEEE80211_STYPE_PROBE_REQ >> 4)
|
|
},
|
|
[NL80211_IFTYPE_P2P_GO] = {
|
|
.tx = 0xffff,
|
|
.rx = BIT(IEEE80211_STYPE_ASSOC_REQ >> 4) |
|
|
BIT(IEEE80211_STYPE_REASSOC_REQ >> 4) |
|
|
BIT(IEEE80211_STYPE_PROBE_REQ >> 4) |
|
|
BIT(IEEE80211_STYPE_DISASSOC >> 4) |
|
|
BIT(IEEE80211_STYPE_AUTH >> 4) |
|
|
BIT(IEEE80211_STYPE_DEAUTH >> 4) |
|
|
BIT(IEEE80211_STYPE_ACTION >> 4)
|
|
},
|
|
#if defined(WL_CFG80211_P2P_DEV_IF)
|
|
[NL80211_IFTYPE_P2P_DEVICE] = {
|
|
.tx = 0xffff,
|
|
.rx = BIT(IEEE80211_STYPE_ACTION >> 4) |
|
|
BIT(IEEE80211_STYPE_PROBE_REQ >> 4)
|
|
},
|
|
#endif /* WL_CFG80211_P2P_DEV_IF */
|
|
};
|
|
|
|
static void swap_key_from_BE(struct wl_wsec_key *key)
|
|
{
|
|
key->index = htod32(key->index);
|
|
key->len = htod32(key->len);
|
|
key->algo = htod32(key->algo);
|
|
key->flags = htod32(key->flags);
|
|
key->rxiv.hi = htod32(key->rxiv.hi);
|
|
key->rxiv.lo = htod16(key->rxiv.lo);
|
|
key->iv_initialized = htod32(key->iv_initialized);
|
|
}
|
|
|
|
static void swap_key_to_BE(struct wl_wsec_key *key)
|
|
{
|
|
key->index = dtoh32(key->index);
|
|
key->len = dtoh32(key->len);
|
|
key->algo = dtoh32(key->algo);
|
|
key->flags = dtoh32(key->flags);
|
|
key->rxiv.hi = dtoh32(key->rxiv.hi);
|
|
key->rxiv.lo = dtoh16(key->rxiv.lo);
|
|
key->iv_initialized = dtoh32(key->iv_initialized);
|
|
}
|
|
|
|
#if defined(WL_FW_OCE_AP_SELECT)
|
|
bool static wl_cfg80211_is_oce_ap(struct wiphy *wiphy, const u8 *bssid_hint)
|
|
{
|
|
const u8 *parse = NULL;
|
|
bcm_tlv_t *ie;
|
|
const struct cfg80211_bss_ies *ies;
|
|
u32 len;
|
|
struct cfg80211_bss *bss;
|
|
|
|
bss = CFG80211_GET_BSS(wiphy, NULL, bssid_hint, 0, 0);
|
|
if (!bss) {
|
|
WL_ERR(("Unable to find AP in the cache"));
|
|
return false;
|
|
}
|
|
|
|
if (rcu_access_pointer(bss->ies)) {
|
|
ies = rcu_access_pointer(bss->ies);
|
|
parse = ies->data;
|
|
len = ies->len;
|
|
} else {
|
|
WL_ERR(("ies is NULL"));
|
|
return false;
|
|
}
|
|
|
|
while ((ie = bcm_parse_tlvs(parse, len, DOT11_MNG_VS_ID))) {
|
|
if (wl_cfgoce_is_oce_ie((const uint8*)ie, (u8 const **)&parse, &len) == TRUE) {
|
|
return true;
|
|
} else {
|
|
ie = bcm_next_tlv((const bcm_tlv_t*) ie, &len);
|
|
if (!ie) {
|
|
return false;
|
|
}
|
|
parse = (uint8 *)ie;
|
|
WL_DBG(("NON OCE IE. next ie ptr:%p", parse));
|
|
}
|
|
}
|
|
WL_DBG(("OCE IE NOT found"));
|
|
return false;
|
|
}
|
|
#endif /* WL_FW_OCE_AP_SELECT */
|
|
|
|
/* Dump the contents of the encoded wps ie buffer and get pbc value */
|
|
static void
|
|
wl_validate_wps_ie(const char *wps_ie, s32 wps_ie_len, bool *pbc)
|
|
{
|
|
#define WPS_IE_FIXED_LEN 6
|
|
s16 len;
|
|
const u8 *subel = NULL;
|
|
u16 subelt_id;
|
|
u16 subelt_len;
|
|
u16 val;
|
|
u8 *valptr = (uint8*) &val;
|
|
if (wps_ie == NULL || wps_ie_len < WPS_IE_FIXED_LEN) {
|
|
WL_ERR(("invalid argument : NULL\n"));
|
|
return;
|
|
}
|
|
len = (s16)wps_ie[TLV_LEN_OFF];
|
|
|
|
if (len > wps_ie_len) {
|
|
WL_ERR(("invalid length len %d, wps ie len %d\n", len, wps_ie_len));
|
|
return;
|
|
}
|
|
WL_DBG(("wps_ie len=%d\n", len));
|
|
len -= 4; /* for the WPS IE's OUI, oui_type fields */
|
|
subel = wps_ie + WPS_IE_FIXED_LEN;
|
|
while (len >= 4) { /* must have attr id, attr len fields */
|
|
valptr[0] = *subel++;
|
|
valptr[1] = *subel++;
|
|
subelt_id = HTON16(val);
|
|
|
|
valptr[0] = *subel++;
|
|
valptr[1] = *subel++;
|
|
subelt_len = HTON16(val);
|
|
|
|
len -= 4; /* for the attr id, attr len fields */
|
|
len -= (s16)subelt_len; /* for the remaining fields in this attribute */
|
|
if (len < 0) {
|
|
break;
|
|
}
|
|
WL_DBG((" subel=%p, subelt_id=0x%x subelt_len=%u\n",
|
|
subel, subelt_id, subelt_len));
|
|
|
|
if (subelt_id == WPS_ID_VERSION) {
|
|
WL_DBG((" attr WPS_ID_VERSION: %u\n", *subel));
|
|
} else if (subelt_id == WPS_ID_REQ_TYPE) {
|
|
WL_DBG((" attr WPS_ID_REQ_TYPE: %u\n", *subel));
|
|
} else if (subelt_id == WPS_ID_CONFIG_METHODS) {
|
|
valptr[0] = *subel;
|
|
valptr[1] = *(subel + 1);
|
|
WL_DBG((" attr WPS_ID_CONFIG_METHODS: %x\n", HTON16(val)));
|
|
} else if (subelt_id == WPS_ID_DEVICE_NAME) {
|
|
char devname[33];
|
|
int namelen = MIN(subelt_len, (sizeof(devname) - 1));
|
|
|
|
if (namelen) {
|
|
memcpy(devname, subel, namelen);
|
|
devname[namelen] = '\0';
|
|
/* Printing len as rx'ed in the IE */
|
|
WL_DBG((" attr WPS_ID_DEVICE_NAME: %s (len %u)\n",
|
|
devname, subelt_len));
|
|
}
|
|
} else if (subelt_id == WPS_ID_DEVICE_PWD_ID) {
|
|
valptr[0] = *subel;
|
|
valptr[1] = *(subel + 1);
|
|
WL_DBG((" attr WPS_ID_DEVICE_PWD_ID: %u\n", HTON16(val)));
|
|
*pbc = (HTON16(val) == DEV_PW_PUSHBUTTON) ? true : false;
|
|
} else if (subelt_id == WPS_ID_PRIM_DEV_TYPE) {
|
|
valptr[0] = *subel;
|
|
valptr[1] = *(subel + 1);
|
|
WL_DBG((" attr WPS_ID_PRIM_DEV_TYPE: cat=%u \n", HTON16(val)));
|
|
valptr[0] = *(subel + 6);
|
|
valptr[1] = *(subel + 7);
|
|
WL_DBG((" attr WPS_ID_PRIM_DEV_TYPE: subcat=%u\n", HTON16(val)));
|
|
} else if (subelt_id == WPS_ID_REQ_DEV_TYPE) {
|
|
valptr[0] = *subel;
|
|
valptr[1] = *(subel + 1);
|
|
WL_DBG((" attr WPS_ID_REQ_DEV_TYPE: cat=%u\n", HTON16(val)));
|
|
valptr[0] = *(subel + 6);
|
|
valptr[1] = *(subel + 7);
|
|
WL_DBG((" attr WPS_ID_REQ_DEV_TYPE: subcat=%u\n", HTON16(val)));
|
|
} else if (subelt_id == WPS_ID_SELECTED_REGISTRAR_CONFIG_METHODS) {
|
|
valptr[0] = *subel;
|
|
valptr[1] = *(subel + 1);
|
|
WL_DBG((" attr WPS_ID_SELECTED_REGISTRAR_CONFIG_METHODS"
|
|
": cat=%u\n", HTON16(val)));
|
|
} else {
|
|
WL_DBG((" unknown attr 0x%x\n", subelt_id));
|
|
}
|
|
|
|
subel += subelt_len;
|
|
}
|
|
}
|
|
|
|
s32 wl_set_tx_power(struct net_device *dev,
|
|
enum nl80211_tx_power_setting type, s32 dbm)
|
|
{
|
|
s32 err = 0;
|
|
s32 disable = 0;
|
|
s32 txpwrqdbm;
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(dev);
|
|
|
|
/* Make sure radio is off or on as far as software is concerned */
|
|
disable = WL_RADIO_SW_DISABLE << 16;
|
|
disable = htod32(disable);
|
|
err = wldev_ioctl_set(dev, WLC_SET_RADIO, &disable, sizeof(disable));
|
|
if (unlikely(err)) {
|
|
WL_ERR(("WLC_SET_RADIO error (%d)\n", err));
|
|
return err;
|
|
}
|
|
|
|
if (dbm > 0xffff)
|
|
dbm = 0xffff;
|
|
txpwrqdbm = dbm * 4;
|
|
#ifdef SUPPORT_WL_TXPOWER
|
|
if (type == NL80211_TX_POWER_AUTOMATIC)
|
|
txpwrqdbm = 127;
|
|
else
|
|
txpwrqdbm |= WL_TXPWR_OVERRIDE;
|
|
#endif /* SUPPORT_WL_TXPOWER */
|
|
err = wldev_iovar_setbuf_bsscfg(dev, "qtxpower", (void *)&txpwrqdbm,
|
|
sizeof(txpwrqdbm), cfg->ioctl_buf, WLC_IOCTL_SMLEN, 0,
|
|
&cfg->ioctl_buf_sync);
|
|
if (unlikely(err))
|
|
WL_ERR(("qtxpower error (%d)\n", err));
|
|
else
|
|
WL_ERR(("dBm=%d, txpwrqdbm=0x%x\n", dbm, txpwrqdbm));
|
|
|
|
return err;
|
|
}
|
|
|
|
s32 wl_get_tx_power(struct net_device *dev, s32 *dbm)
|
|
{
|
|
s32 err = 0;
|
|
s32 txpwrdbm;
|
|
char ioctl_buf[WLC_IOCTL_SMLEN];
|
|
|
|
err = wldev_iovar_getbuf_bsscfg(dev, "qtxpower",
|
|
NULL, 0, ioctl_buf, WLC_IOCTL_SMLEN, 0, NULL);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("error (%d)\n", err));
|
|
return err;
|
|
}
|
|
|
|
memcpy(&txpwrdbm, ioctl_buf, sizeof(txpwrdbm));
|
|
txpwrdbm = dtoh32(txpwrdbm);
|
|
*dbm = (txpwrdbm & ~WL_TXPWR_OVERRIDE) / 4;
|
|
|
|
WL_DBG(("dBm=%d, txpwrdbm=0x%x\n", *dbm, txpwrdbm));
|
|
|
|
return err;
|
|
}
|
|
|
|
static chanspec_t wl_cfg80211_get_shared_freq(struct wiphy *wiphy)
|
|
{
|
|
chanspec_t chspec;
|
|
int cur_band, err = 0;
|
|
struct bcm_cfg80211 *cfg = wiphy_priv(wiphy);
|
|
struct net_device *dev = bcmcfg_to_prmry_ndev(cfg);
|
|
struct ether_addr bssid;
|
|
wl_bss_info_t *bss = NULL;
|
|
u16 channel = WL_P2P_TEMP_CHAN;
|
|
char *buf;
|
|
|
|
bzero(&bssid, sizeof(bssid));
|
|
if ((err = wldev_ioctl_get(dev, WLC_GET_BSSID, &bssid, sizeof(bssid)))) {
|
|
/* STA interface is not associated. So start the new interface on a temp
|
|
* channel . Later proper channel will be applied by the above framework
|
|
* via set_channel (cfg80211 API).
|
|
*/
|
|
WL_DBG(("Not associated. Return a temp channel. \n"));
|
|
cur_band = 0;
|
|
err = wldev_ioctl_get(dev, WLC_GET_BAND, &cur_band, sizeof(int));
|
|
if (unlikely(err)) {
|
|
WL_ERR(("Get band failed\n"));
|
|
} else if (cur_band == WLC_BAND_5G) {
|
|
channel = WL_P2P_TEMP_CHAN_5G;
|
|
}
|
|
return wl_ch_host_to_driver(channel);
|
|
}
|
|
|
|
buf = (char *)MALLOCZ(cfg->osh, WL_EXTRA_BUF_MAX);
|
|
if (!buf) {
|
|
WL_ERR(("buf alloc failed. use temp channel\n"));
|
|
return wl_ch_host_to_driver(channel);
|
|
}
|
|
|
|
*(u32 *)buf = htod32(WL_EXTRA_BUF_MAX);
|
|
if ((err = wldev_ioctl_get(dev, WLC_GET_BSS_INFO, buf,
|
|
WL_EXTRA_BUF_MAX))) {
|
|
WL_ERR(("Failed to get associated bss info, use temp channel \n"));
|
|
chspec = wl_ch_host_to_driver(channel);
|
|
}
|
|
else {
|
|
bss = (wl_bss_info_t *) (buf + 4);
|
|
chspec = bss->chanspec;
|
|
|
|
WL_DBG(("Valid BSS Found. chanspec:%d \n", chspec));
|
|
}
|
|
|
|
MFREE(cfg->osh, buf, WL_EXTRA_BUF_MAX);
|
|
return chspec;
|
|
}
|
|
|
|
static void
|
|
wl_wlfc_enable(struct bcm_cfg80211 *cfg, bool enable)
|
|
{
|
|
#ifdef PROP_TXSTATUS_VSDB
|
|
#if defined(BCMSDIO) || defined(BCMDBUS)
|
|
bool wlfc_enabled = FALSE;
|
|
s32 err;
|
|
dhd_pub_t *dhd;
|
|
struct net_device *primary_ndev = bcmcfg_to_prmry_ndev(cfg);
|
|
|
|
dhd = (dhd_pub_t *)(cfg->pub);
|
|
if (!dhd) {
|
|
return;
|
|
}
|
|
|
|
if (enable) {
|
|
if (!cfg->wlfc_on && !disable_proptx) {
|
|
dhd_wlfc_get_enable(dhd, &wlfc_enabled);
|
|
if (!wlfc_enabled && dhd->op_mode != DHD_FLAG_HOSTAP_MODE &&
|
|
dhd->op_mode != DHD_FLAG_IBSS_MODE) {
|
|
dhd_wlfc_init(dhd);
|
|
err = wldev_ioctl_set(primary_ndev, WLC_UP, &up, sizeof(s32));
|
|
if (err < 0)
|
|
WL_ERR(("WLC_UP return err:%d\n", err));
|
|
}
|
|
cfg->wlfc_on = true;
|
|
WL_DBG(("wlfc_on:%d \n", cfg->wlfc_on));
|
|
}
|
|
} else if (dhd->conf->disable_proptx != 0){
|
|
dhd_wlfc_deinit(dhd);
|
|
cfg->wlfc_on = false;
|
|
}
|
|
#endif /* BCMSDIO || BCMDBUS */
|
|
#endif /* PROP_TXSTATUS_VSDB */
|
|
}
|
|
|
|
struct wireless_dev *
|
|
wl_cfg80211_p2p_if_add(struct bcm_cfg80211 *cfg,
|
|
wl_iftype_t wl_iftype,
|
|
char const *name, u8 *mac_addr, s32 *ret_err)
|
|
{
|
|
u16 chspec;
|
|
s16 cfg_type;
|
|
long timeout;
|
|
s32 err;
|
|
u16 p2p_iftype;
|
|
int dhd_mode;
|
|
struct net_device *new_ndev = NULL;
|
|
struct wiphy *wiphy = bcmcfg_to_wiphy(cfg);
|
|
struct ether_addr *p2p_addr;
|
|
|
|
*ret_err = BCME_OK;
|
|
if (!cfg->p2p) {
|
|
WL_ERR(("p2p not initialized\n"));
|
|
return NULL;
|
|
}
|
|
|
|
#if defined(WL_CFG80211_P2P_DEV_IF)
|
|
if (wl_iftype == WL_IF_TYPE_P2P_DISC) {
|
|
/* Handle Dedicated P2P discovery Interface */
|
|
return wl_cfgp2p_add_p2p_disc_if(cfg);
|
|
}
|
|
#endif /* WL_CFG80211_P2P_DEV_IF */
|
|
|
|
if (wl_iftype == WL_IF_TYPE_P2P_GO) {
|
|
p2p_iftype = WL_P2P_IF_GO;
|
|
} else {
|
|
p2p_iftype = WL_P2P_IF_CLIENT;
|
|
}
|
|
|
|
/* Dual p2p doesn't support multiple P2PGO interfaces,
|
|
* p2p_go_count is the counter for GO creation
|
|
* requests.
|
|
*/
|
|
if ((cfg->p2p->p2p_go_count > 0) && (wl_iftype == WL_IF_TYPE_P2P_GO)) {
|
|
WL_ERR(("FW does not support multiple GO\n"));
|
|
*ret_err = -ENOTSUPP;
|
|
return NULL;
|
|
}
|
|
if (!cfg->p2p->on) {
|
|
p2p_on(cfg) = true;
|
|
wl_cfgp2p_set_firm_p2p(cfg);
|
|
wl_cfgp2p_init_discovery(cfg);
|
|
}
|
|
|
|
strlcpy(cfg->p2p->vir_ifname, name, sizeof(cfg->p2p->vir_ifname));
|
|
/* In concurrency case, STA may be already associated in a particular channel.
|
|
* so retrieve the current channel of primary interface and then start the virtual
|
|
* interface on that.
|
|
*/
|
|
chspec = wl_cfg80211_get_shared_freq(wiphy);
|
|
|
|
/* For P2P mode, use P2P-specific driver features to create the
|
|
* bss: "cfg p2p_ifadd"
|
|
*/
|
|
wl_set_p2p_status(cfg, IF_ADDING);
|
|
bzero(&cfg->if_event_info, sizeof(cfg->if_event_info));
|
|
cfg_type = wl_cfgp2p_get_conn_idx(cfg);
|
|
if (cfg_type == BCME_ERROR) {
|
|
wl_clr_p2p_status(cfg, IF_ADDING);
|
|
WL_ERR(("Failed to get connection idx for p2p interface\n"));
|
|
return NULL;
|
|
}
|
|
|
|
p2p_addr = wl_to_p2p_bss_macaddr(cfg, cfg_type);
|
|
memcpy(p2p_addr->octet, mac_addr, ETH_ALEN);
|
|
|
|
err = wl_cfgp2p_ifadd(cfg, p2p_addr,
|
|
htod32(p2p_iftype), chspec);
|
|
if (unlikely(err)) {
|
|
wl_clr_p2p_status(cfg, IF_ADDING);
|
|
WL_ERR((" virtual iface add failed (%d) \n", err));
|
|
return NULL;
|
|
}
|
|
|
|
/* Wait for WLC_E_IF event with IF_ADD opcode */
|
|
timeout = wait_event_interruptible_timeout(cfg->netif_change_event,
|
|
((wl_get_p2p_status(cfg, IF_ADDING) == false) &&
|
|
(cfg->if_event_info.valid)),
|
|
msecs_to_jiffies(MAX_WAIT_TIME));
|
|
if (timeout > 0 && !wl_get_p2p_status(cfg, IF_ADDING) && cfg->if_event_info.valid) {
|
|
wl_if_event_info *event = &cfg->if_event_info;
|
|
new_ndev = wl_cfg80211_post_ifcreate(bcmcfg_to_prmry_ndev(cfg), event,
|
|
event->mac, cfg->p2p->vir_ifname, false);
|
|
if (unlikely(!new_ndev)) {
|
|
goto fail;
|
|
}
|
|
|
|
if (wl_iftype == WL_IF_TYPE_P2P_GO) {
|
|
cfg->p2p->p2p_go_count++;
|
|
}
|
|
/* Fill p2p specific data */
|
|
wl_to_p2p_bss_ndev(cfg, cfg_type) = new_ndev;
|
|
wl_to_p2p_bss_bssidx(cfg, cfg_type) = event->bssidx;
|
|
|
|
WL_ERR((" virtual interface(%s) is "
|
|
"created net attach done\n", cfg->p2p->vir_ifname));
|
|
dhd_mode = (wl_iftype == WL_IF_TYPE_P2P_GC) ?
|
|
DHD_FLAG_P2P_GC_MODE : DHD_FLAG_P2P_GO_MODE;
|
|
DNGL_FUNC(dhd_cfg80211_set_p2p_info, (cfg, dhd_mode));
|
|
/* reinitialize completion to clear previous count */
|
|
#if (LINUX_VERSION_CODE < KERNEL_VERSION(3, 13, 0))
|
|
INIT_COMPLETION(cfg->iface_disable);
|
|
#else
|
|
init_completion(&cfg->iface_disable);
|
|
#endif /* LINUX_VERSION_CODE < KERNEL_VERSION(3, 13, 0) */
|
|
|
|
return new_ndev->ieee80211_ptr;
|
|
}
|
|
|
|
fail:
|
|
return NULL;
|
|
}
|
|
|
|
bool
|
|
wl_cfg80211_check_vif_in_use(struct net_device *ndev)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(ndev);
|
|
dhd_pub_t *dhd = (dhd_pub_t *)(cfg->pub);
|
|
bool nan_enabled = FALSE;
|
|
|
|
#ifdef WL_NAN
|
|
nan_enabled = cfg->nan_enable;
|
|
#endif /* WL_NAN */
|
|
|
|
if (nan_enabled || (wl_cfgp2p_vif_created(cfg)) ||
|
|
(dhd->op_mode & DHD_FLAG_HOSTAP_MODE)) {
|
|
WL_MEM(("%s: Virtual interfaces in use. NAN %d P2P %d softAP %d\n",
|
|
__FUNCTION__, nan_enabled, wl_cfgp2p_vif_created(cfg),
|
|
(dhd->op_mode & DHD_FLAG_HOSTAP_MODE)));
|
|
return TRUE;
|
|
}
|
|
|
|
return FALSE;
|
|
}
|
|
|
|
void
|
|
wl_cfg80211_iface_state_ops(struct wireless_dev *wdev,
|
|
wl_interface_state_t state,
|
|
wl_iftype_t wl_iftype, u16 wl_mode)
|
|
{
|
|
struct net_device *ndev;
|
|
struct bcm_cfg80211 *cfg;
|
|
dhd_pub_t *dhd;
|
|
s32 bssidx;
|
|
|
|
WL_DBG(("state:%s wl_iftype:%d mode:%d\n",
|
|
wl_if_state_strs[state], wl_iftype, wl_mode));
|
|
if (!wdev) {
|
|
WL_ERR(("wdev null\n"));
|
|
return;
|
|
}
|
|
|
|
if ((wl_iftype == WL_IF_TYPE_P2P_DISC) || (wl_iftype == WL_IF_TYPE_NAN_NMI)) {
|
|
/* P2P discovery is a netless device and uses a
|
|
* hidden bsscfg interface in fw. Don't apply the
|
|
* iface ops state changes for p2p discovery I/F.
|
|
* NAN NMI is netless device and uses a hidden bsscfg interface in fw.
|
|
* Don't apply iface ops state changes for NMI I/F.
|
|
*/
|
|
return;
|
|
}
|
|
|
|
cfg = wiphy_priv(wdev->wiphy);
|
|
ndev = wdev->netdev;
|
|
dhd = (dhd_pub_t *)(cfg->pub);
|
|
|
|
bssidx = wl_get_bssidx_by_wdev(cfg, wdev);
|
|
if (!ndev || (bssidx < 0)) {
|
|
WL_ERR(("ndev null. skip iface state ops\n"));
|
|
return;
|
|
}
|
|
|
|
switch (state) {
|
|
case WL_IF_CREATE_REQ:
|
|
#ifdef WL_BCNRECV
|
|
/* check fakeapscan in progress then abort */
|
|
wl_android_bcnrecv_stop(ndev, WL_BCNRECV_CONCURRENCY);
|
|
#endif /* WL_BCNRECV */
|
|
wl_cfg80211_scan_abort(cfg);
|
|
wl_wlfc_enable(cfg, true);
|
|
#ifdef WLTDLS
|
|
/* disable TDLS if number of connected interfaces is >= 1 */
|
|
wl_cfg80211_tdls_config(cfg, TDLS_STATE_IF_CREATE, false);
|
|
#endif /* WLTDLS */
|
|
break;
|
|
case WL_IF_DELETE_REQ:
|
|
#ifdef WL_WPS_SYNC
|
|
wl_wps_handle_ifdel(ndev);
|
|
#endif /* WPS_SYNC */
|
|
if (wl_get_drv_status(cfg, SCANNING, ndev)) {
|
|
/* Send completion for any pending scans */
|
|
wl_cfg80211_cancel_scan(cfg);
|
|
}
|
|
|
|
#ifdef CUSTOM_SET_CPUCORE
|
|
dhd->chan_isvht80 &= ~DHD_FLAG_P2P_MODE;
|
|
if (!(dhd->chan_isvht80)) {
|
|
dhd_set_cpucore(dhd, FALSE);
|
|
}
|
|
#endif /* CUSTOM_SET_CPUCORE */
|
|
wl_add_remove_pm_enable_work(cfg, WL_PM_WORKQ_DEL);
|
|
break;
|
|
case WL_IF_CREATE_DONE:
|
|
if (wl_mode == WL_MODE_BSS) {
|
|
/* Common code for sta type interfaces - STA, GC */
|
|
wldev_iovar_setint(ndev, "buf_key_b4_m4", 1);
|
|
}
|
|
if (wl_iftype == WL_IF_TYPE_P2P_GC) {
|
|
/* Disable firmware roaming for P2P interface */
|
|
wldev_iovar_setint(ndev, "roam_off", 1);
|
|
wldev_iovar_setint(ndev, "bcn_timeout", dhd->conf->bcn_timeout);
|
|
}
|
|
if (wl_mode == WL_MODE_AP) {
|
|
/* Common code for AP/GO */
|
|
}
|
|
break;
|
|
case WL_IF_DELETE_DONE:
|
|
#ifdef WLTDLS
|
|
/* Enable back TDLS if connected interface is <= 1 */
|
|
wl_cfg80211_tdls_config(cfg, TDLS_STATE_IF_DELETE, false);
|
|
#endif /* WLTDLS */
|
|
wl_wlfc_enable(cfg, false);
|
|
break;
|
|
case WL_IF_CHANGE_REQ:
|
|
/* Flush existing IEs from firmware on role change */
|
|
wl_cfg80211_clear_per_bss_ies(cfg, wdev);
|
|
break;
|
|
case WL_IF_CHANGE_DONE:
|
|
if (wl_mode == WL_MODE_BSS) {
|
|
/* Enable buffering of PTK key till EAPOL 4/4 is sent out */
|
|
wldev_iovar_setint(ndev, "buf_key_b4_m4", 1);
|
|
}
|
|
break;
|
|
|
|
default:
|
|
WL_ERR(("Unsupported state: %d\n", state));
|
|
return;
|
|
}
|
|
}
|
|
|
|
static s32
|
|
wl_cfg80211_p2p_if_del(struct wiphy *wiphy, struct wireless_dev *wdev)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wiphy_priv(wiphy);
|
|
s16 bssidx;
|
|
s16 err;
|
|
s32 cfg_type;
|
|
struct net_device *ndev;
|
|
long timeout;
|
|
|
|
if (unlikely(!wl_get_drv_status(cfg, READY, bcmcfg_to_prmry_ndev(cfg)))) {
|
|
WL_INFORM_MEM(("device is not ready\n"));
|
|
return BCME_NOTFOUND;
|
|
}
|
|
#ifdef WL_CFG80211_P2P_DEV_IF
|
|
if (wdev->iftype == NL80211_IFTYPE_P2P_DEVICE) {
|
|
/* Handle dedicated P2P discovery interface. */
|
|
return wl_cfgp2p_del_p2p_disc_if(wdev, cfg);
|
|
}
|
|
#endif /* WL_CFG80211_P2P_DEV_IF */
|
|
|
|
/* Handle P2P Group Interface */
|
|
bssidx = wl_get_bssidx_by_wdev(cfg, wdev);
|
|
if (bssidx <= 0) {
|
|
WL_ERR(("bssidx not found\n"));
|
|
return BCME_NOTFOUND;
|
|
}
|
|
if (wl_cfgp2p_find_type(cfg, bssidx, &cfg_type) != BCME_OK) {
|
|
/* Couldn't find matching iftype */
|
|
WL_MEM(("non P2P interface\n"));
|
|
return BCME_NOTFOUND;
|
|
}
|
|
|
|
ndev = wdev->netdev;
|
|
wl_clr_p2p_status(cfg, GO_NEG_PHASE);
|
|
wl_clr_p2p_status(cfg, IF_ADDING);
|
|
|
|
/* for GO */
|
|
if (wl_get_mode_by_netdev(cfg, ndev) == WL_MODE_AP) {
|
|
wl_add_remove_eventmsg(ndev, WLC_E_PROBREQ_MSG, false);
|
|
cfg->p2p->p2p_go_count--;
|
|
/* disable interface before bsscfg free */
|
|
err = wl_cfgp2p_ifdisable(cfg, wl_to_p2p_bss_macaddr(cfg, cfg_type));
|
|
/* if fw doesn't support "ifdis",
|
|
do not wait for link down of ap mode
|
|
*/
|
|
if (err == 0) {
|
|
WL_ERR(("Wait for Link Down event for GO !!!\n"));
|
|
wait_for_completion_timeout(&cfg->iface_disable,
|
|
msecs_to_jiffies(500));
|
|
} else if (err != BCME_UNSUPPORTED) {
|
|
msleep(300);
|
|
}
|
|
} else {
|
|
/* GC case */
|
|
if (wl_get_drv_status(cfg, DISCONNECTING, ndev)) {
|
|
WL_ERR(("Wait for Link Down event for GC !\n"));
|
|
wait_for_completion_timeout
|
|
(&cfg->iface_disable, msecs_to_jiffies(500));
|
|
}
|
|
}
|
|
|
|
bzero(&cfg->if_event_info, sizeof(cfg->if_event_info));
|
|
wl_set_p2p_status(cfg, IF_DELETING);
|
|
DNGL_FUNC(dhd_cfg80211_clean_p2p_info, (cfg));
|
|
|
|
err = wl_cfgp2p_ifdel(cfg, wl_to_p2p_bss_macaddr(cfg, cfg_type));
|
|
if (unlikely(err)) {
|
|
WL_ERR(("IFDEL operation failed, error code = %d\n", err));
|
|
goto fail;
|
|
} else {
|
|
/* Wait for WLC_E_IF event */
|
|
timeout = wait_event_interruptible_timeout(cfg->netif_change_event,
|
|
((wl_get_p2p_status(cfg, IF_DELETING) == false) &&
|
|
(cfg->if_event_info.valid)),
|
|
msecs_to_jiffies(MAX_WAIT_TIME));
|
|
if (timeout > 0 && !wl_get_p2p_status(cfg, IF_DELETING) &&
|
|
cfg->if_event_info.valid) {
|
|
WL_ERR(("P2P IFDEL operation done\n"));
|
|
err = BCME_OK;
|
|
} else {
|
|
WL_ERR(("IFDEL didn't complete properly\n"));
|
|
err = -EINVAL;
|
|
}
|
|
}
|
|
|
|
fail:
|
|
/* Even in failure case, attempt to remove the host data structure.
|
|
* Firmware would be cleaned up via WiFi reset done by the
|
|
* user space from hang event context (for android only).
|
|
*/
|
|
bzero(cfg->p2p->vir_ifname, IFNAMSIZ);
|
|
wl_to_p2p_bss_bssidx(cfg, cfg_type) = -1;
|
|
wl_to_p2p_bss_ndev(cfg, cfg_type) = NULL;
|
|
wl_clr_drv_status(cfg, CONNECTED, wl_to_p2p_bss_ndev(cfg, cfg_type));
|
|
dhd_net_if_lock(ndev);
|
|
if (cfg->if_event_info.ifidx) {
|
|
/* Remove interface except for primary ifidx */
|
|
wl_cfg80211_remove_if(cfg, cfg->if_event_info.ifidx, ndev, FALSE);
|
|
}
|
|
dhd_net_if_unlock(ndev);
|
|
return err;
|
|
}
|
|
|
|
#ifdef WL_IFACE_MGMT_CONF
|
|
#ifdef WL_IFACE_MGMT
|
|
static s32
|
|
wl_cfg80211_is_policy_config_allowed(struct bcm_cfg80211 *cfg)
|
|
{
|
|
s32 ret = BCME_OK;
|
|
wl_iftype_t active_sec_iface = WL_IFACE_NOT_PRESENT;
|
|
bool p2p_disc_on = false;
|
|
bool sta_assoc_state = false;
|
|
|
|
mutex_lock(&cfg->if_sync);
|
|
|
|
sta_assoc_state = (wl_get_drv_status(cfg, CONNECTED, bcmcfg_to_prmry_ndev(cfg)) ||
|
|
wl_get_drv_status(cfg, CONNECTING, bcmcfg_to_prmry_ndev(cfg)));
|
|
active_sec_iface = wl_cfg80211_get_sec_iface(cfg);
|
|
p2p_disc_on = wl_get_p2p_status(cfg, SCANNING);
|
|
|
|
if ((sta_assoc_state == TRUE) || (p2p_disc_on == TRUE) ||
|
|
(cfg->nan_init_state == TRUE) ||
|
|
(active_sec_iface != WL_IFACE_NOT_PRESENT)) {
|
|
WL_INFORM_MEM(("Active iface matrix: sta_assoc_state = %d,"
|
|
" p2p_disc = %d, nan_disc = %d, active iface = %s\n",
|
|
sta_assoc_state, p2p_disc_on, cfg->nan_init_state,
|
|
wl_iftype_to_str(active_sec_iface)));
|
|
ret = BCME_BUSY;
|
|
}
|
|
mutex_unlock(&cfg->if_sync);
|
|
return ret;
|
|
}
|
|
#endif /* WL_IFACE_MGMT */
|
|
#ifdef WL_NANP2P
|
|
int
|
|
wl_cfg80211_set_iface_conc_disc(struct net_device *ndev,
|
|
uint8 arg_val)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(ndev);
|
|
if (!cfg) {
|
|
WL_ERR(("%s: Cannot find cfg\n", __FUNCTION__));
|
|
return BCME_ERROR;
|
|
}
|
|
|
|
if (wl_cfg80211_is_policy_config_allowed(cfg) != BCME_OK) {
|
|
WL_ERR(("Cant allow iface management modifications\n"));
|
|
return BCME_BUSY;
|
|
}
|
|
|
|
if (arg_val) {
|
|
cfg->conc_disc |= arg_val;
|
|
} else {
|
|
cfg->conc_disc &= ~arg_val;
|
|
}
|
|
return BCME_OK;
|
|
}
|
|
|
|
uint8
|
|
wl_cfg80211_get_iface_conc_disc(struct net_device *ndev)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(ndev);
|
|
if (!cfg) {
|
|
WL_ERR(("%s: Cannot find cfg\n", __FUNCTION__));
|
|
return BCME_ERROR;
|
|
}
|
|
return cfg->conc_disc;
|
|
}
|
|
#endif /* WL_NANP2P */
|
|
#ifdef WL_IFACE_MGMT
|
|
int
|
|
wl_cfg80211_set_iface_policy(struct net_device *ndev,
|
|
char *arg, int len)
|
|
{
|
|
int ret = BCME_OK;
|
|
uint8 i = 0;
|
|
iface_mgmt_data_t *iface_data = NULL;
|
|
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(ndev);
|
|
if (!cfg) {
|
|
WL_ERR(("%s: Cannot find cfg\n", __FUNCTION__));
|
|
return BCME_ERROR;
|
|
}
|
|
|
|
if (wl_cfg80211_is_policy_config_allowed(cfg) != BCME_OK) {
|
|
WL_ERR(("Cant allow iface management modifications\n"));
|
|
return BCME_BUSY;
|
|
}
|
|
|
|
if (!arg || len <= 0 || len > sizeof(iface_mgmt_data_t)) {
|
|
return BCME_BADARG;
|
|
}
|
|
|
|
iface_data = (iface_mgmt_data_t *)arg;
|
|
if (iface_data->policy >= WL_IF_POLICY_INVALID) {
|
|
WL_ERR(("Unexpected value of policy = %d\n",
|
|
iface_data->policy));
|
|
return BCME_BADARG;
|
|
}
|
|
|
|
bzero(&cfg->iface_data, sizeof(iface_mgmt_data_t));
|
|
ret = memcpy_s(&cfg->iface_data, sizeof(iface_mgmt_data_t), arg, len);
|
|
if (ret != BCME_OK) {
|
|
WL_ERR(("Failed to copy iface data, src len = %d\n", len));
|
|
return ret;
|
|
}
|
|
|
|
if (cfg->iface_data.policy == WL_IF_POLICY_ROLE_PRIORITY) {
|
|
for (i = 0; i < WL_IF_TYPE_MAX; i++) {
|
|
WL_DBG(("iface = %s, priority[i] = %d\n",
|
|
wl_iftype_to_str(i), cfg->iface_data.priority[i]));
|
|
}
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
uint8
|
|
wl_cfg80211_get_iface_policy(struct net_device *ndev)
|
|
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(ndev);
|
|
if (!cfg) {
|
|
WL_ERR(("%s: Cannot find cfg\n", __FUNCTION__));
|
|
return BCME_ERROR;
|
|
}
|
|
|
|
return cfg->iface_data.policy;
|
|
}
|
|
#endif /* WL_IFACE_MGMT */
|
|
#endif /* WL_IFACE_MGMT_CONF */
|
|
|
|
#ifdef WL_IFACE_MGMT
|
|
/* Get active secondary data iface type */
|
|
wl_iftype_t
|
|
wl_cfg80211_get_sec_iface(struct bcm_cfg80211 *cfg)
|
|
{
|
|
#ifndef WL_STATIC_IF
|
|
dhd_pub_t *dhd = (dhd_pub_t *)(cfg->pub);
|
|
#endif /* !WL_STATIC_IF */
|
|
struct net_device *p2p_ndev = NULL;
|
|
|
|
p2p_ndev = wl_to_p2p_bss_ndev(cfg,
|
|
P2PAPI_BSSCFG_CONNECTION1);
|
|
|
|
#ifdef WL_STATIC_IF
|
|
if (IS_CFG80211_STATIC_IF_ACTIVE(cfg)) {
|
|
if (IS_AP_IFACE(cfg->static_ndev->ieee80211_ptr)) {
|
|
return WL_IF_TYPE_AP;
|
|
}
|
|
}
|
|
#else
|
|
if (dhd->op_mode & DHD_FLAG_HOSTAP_MODE) {
|
|
return WL_IF_TYPE_AP;
|
|
}
|
|
#endif /* WL_STATIC_IF */
|
|
|
|
if (p2p_ndev && p2p_ndev->ieee80211_ptr) {
|
|
if (p2p_ndev->ieee80211_ptr->iftype == NL80211_IFTYPE_P2P_GO) {
|
|
return WL_IF_TYPE_P2P_GO;
|
|
}
|
|
|
|
if (p2p_ndev->ieee80211_ptr->iftype == NL80211_IFTYPE_P2P_CLIENT) {
|
|
return WL_IF_TYPE_P2P_GC;
|
|
}
|
|
}
|
|
|
|
#ifdef WL_NAN
|
|
if (wl_cfgnan_is_dp_active(bcmcfg_to_prmry_ndev(cfg))) {
|
|
return WL_IF_TYPE_NAN;
|
|
}
|
|
#endif /* WL_NAN */
|
|
return WL_IFACE_NOT_PRESENT;
|
|
}
|
|
|
|
/*
|
|
* Handle incoming data interface request based on policy.
|
|
* If there is any conflicting interface, that will be
|
|
* deleted.
|
|
*/
|
|
s32
|
|
wl_cfg80211_data_if_mgmt(struct bcm_cfg80211 *cfg,
|
|
wl_iftype_t new_wl_iftype)
|
|
{
|
|
s32 ret = BCME_OK;
|
|
bool del_iface = false;
|
|
wl_iftype_t sec_wl_if_type = wl_cfg80211_get_sec_iface(cfg);
|
|
|
|
if (sec_wl_if_type == WL_IF_TYPE_NAN &&
|
|
new_wl_iftype == WL_IF_TYPE_NAN) {
|
|
/* Multi NDP is allowed irrespective of Policy */
|
|
return BCME_OK;
|
|
}
|
|
|
|
if (sec_wl_if_type == WL_IFACE_NOT_PRESENT) {
|
|
/*
|
|
* If there is no active secondary I/F, there
|
|
* is no interface conflict. Do nothing.
|
|
*/
|
|
return BCME_OK;
|
|
}
|
|
|
|
/* Handle secondary data link case */
|
|
switch (cfg->iface_data.policy) {
|
|
case WL_IF_POLICY_CUSTOM:
|
|
case WL_IF_POLICY_DEFAULT: {
|
|
if (sec_wl_if_type == WL_IF_TYPE_NAN) {
|
|
/* NAN has the lowest priority */
|
|
del_iface = true;
|
|
} else {
|
|
/* Active iface is present, returning error */
|
|
ret = BCME_ERROR;
|
|
}
|
|
break;
|
|
}
|
|
case WL_IF_POLICY_FCFS: {
|
|
WL_INFORM_MEM(("Found active iface = %s, can't support new iface = %s\n",
|
|
wl_iftype_to_str(sec_wl_if_type), wl_iftype_to_str(new_wl_iftype)));
|
|
ret = BCME_ERROR;
|
|
break;
|
|
}
|
|
case WL_IF_POLICY_LP: {
|
|
WL_INFORM_MEM(("Remove active sec data interface, allow incoming iface\n"));
|
|
/* Delete existing data iface and allow incoming sec iface */
|
|
del_iface = true;
|
|
break;
|
|
}
|
|
case WL_IF_POLICY_ROLE_PRIORITY: {
|
|
WL_INFORM_MEM(("Existing iface = %s (%d) and new iface = %s (%d)\n",
|
|
wl_iftype_to_str(sec_wl_if_type),
|
|
cfg->iface_data.priority[sec_wl_if_type],
|
|
wl_iftype_to_str(new_wl_iftype),
|
|
cfg->iface_data.priority[new_wl_iftype]));
|
|
if (cfg->iface_data.priority[new_wl_iftype] >
|
|
cfg->iface_data.priority[sec_wl_if_type]) {
|
|
del_iface = true;
|
|
} else {
|
|
WL_ERR(("Can't support new iface = %s\n",
|
|
wl_iftype_to_str(new_wl_iftype)));
|
|
ret = BCME_ERROR;
|
|
}
|
|
break;
|
|
}
|
|
default: {
|
|
WL_ERR(("Unsupported interface policy = %d\n",
|
|
cfg->iface_data.policy));
|
|
return BCME_ERROR;
|
|
}
|
|
}
|
|
if (del_iface) {
|
|
ret = wl_cfg80211_delete_iface(cfg, sec_wl_if_type);
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
/* Handle discovery ifaces based on policy */
|
|
s32
|
|
wl_cfg80211_disc_if_mgmt(struct bcm_cfg80211 *cfg,
|
|
wl_iftype_t new_wl_iftype, bool *disable_nan, bool *disable_p2p)
|
|
{
|
|
s32 ret = BCME_OK;
|
|
wl_iftype_t sec_wl_if_type =
|
|
wl_cfg80211_get_sec_iface(cfg);
|
|
*disable_p2p = false;
|
|
*disable_nan = false;
|
|
|
|
if (sec_wl_if_type == WL_IF_TYPE_NAN &&
|
|
new_wl_iftype == WL_IF_TYPE_NAN) {
|
|
/* Multi NDP is allowed irrespective of Policy */
|
|
return BCME_OK;
|
|
}
|
|
|
|
/*
|
|
* Check for any policy conflicts with active secondary
|
|
* interface for incoming discovery iface
|
|
*/
|
|
if ((sec_wl_if_type != WL_IFACE_NOT_PRESENT) &&
|
|
(is_discovery_iface(new_wl_iftype))) {
|
|
switch (cfg->iface_data.policy) {
|
|
case WL_IF_POLICY_CUSTOM: {
|
|
if (sec_wl_if_type == WL_IF_TYPE_NAN &&
|
|
new_wl_iftype == WL_IF_TYPE_P2P_DISC) {
|
|
WL_INFORM_MEM(("Allow P2P Discovery with active NDP\n"));
|
|
/* No further checks are required. */
|
|
return BCME_OK;
|
|
}
|
|
/*
|
|
* Intentional fall through to default policy
|
|
* as for AP and associated ifaces, both are same
|
|
*/
|
|
}
|
|
case WL_IF_POLICY_DEFAULT: {
|
|
if (sec_wl_if_type == WL_IF_TYPE_AP) {
|
|
WL_INFORM_MEM(("AP is active, cant support new iface\n"));
|
|
ret = BCME_ERROR;
|
|
} else if (sec_wl_if_type == WL_IF_TYPE_P2P_GC ||
|
|
sec_wl_if_type == WL_IF_TYPE_P2P_GO) {
|
|
if (new_wl_iftype == WL_IF_TYPE_P2P_DISC) {
|
|
/*
|
|
* Associated discovery case,
|
|
* Fall through
|
|
*/
|
|
} else {
|
|
/* Active iface is present, returning error */
|
|
WL_INFORM_MEM(("P2P group is active,"
|
|
" cant support new iface\n"));
|
|
ret = BCME_ERROR;
|
|
}
|
|
} else if (sec_wl_if_type == WL_IF_TYPE_NAN) {
|
|
ret = wl_cfg80211_delete_iface(cfg, sec_wl_if_type);
|
|
}
|
|
break;
|
|
}
|
|
case WL_IF_POLICY_FCFS: {
|
|
WL_INFORM_MEM(("Can't support new iface = %s\n",
|
|
wl_iftype_to_str(new_wl_iftype)));
|
|
ret = BCME_ERROR;
|
|
break;
|
|
}
|
|
case WL_IF_POLICY_LP: {
|
|
/* Delete existing data iface n allow incoming sec iface */
|
|
WL_INFORM_MEM(("Remove active sec data interface = %s\n",
|
|
wl_iftype_to_str(sec_wl_if_type)));
|
|
ret = wl_cfg80211_delete_iface(cfg,
|
|
sec_wl_if_type);
|
|
break;
|
|
}
|
|
case WL_IF_POLICY_ROLE_PRIORITY: {
|
|
WL_INFORM_MEM(("Existing iface = %s (%d) and new iface = %s (%d)\n",
|
|
wl_iftype_to_str(sec_wl_if_type),
|
|
cfg->iface_data.priority[sec_wl_if_type],
|
|
wl_iftype_to_str(new_wl_iftype),
|
|
cfg->iface_data.priority[new_wl_iftype]));
|
|
if (cfg->iface_data.priority[new_wl_iftype] >
|
|
cfg->iface_data.priority[sec_wl_if_type]) {
|
|
WL_INFORM_MEM(("Remove active sec data iface\n"));
|
|
ret = wl_cfg80211_delete_iface(cfg,
|
|
sec_wl_if_type);
|
|
} else {
|
|
WL_ERR(("Can't support new iface = %s"
|
|
" due to low priority\n",
|
|
wl_iftype_to_str(new_wl_iftype)));
|
|
ret = BCME_ERROR;
|
|
}
|
|
break;
|
|
}
|
|
default: {
|
|
WL_ERR(("Unsupported policy\n"));
|
|
return BCME_ERROR;
|
|
}
|
|
}
|
|
} else {
|
|
/*
|
|
* Handle incoming new secondary iface request,
|
|
* irrespective of existing discovery ifaces
|
|
*/
|
|
if ((cfg->iface_data.policy == WL_IF_POLICY_CUSTOM) &&
|
|
(new_wl_iftype == WL_IF_TYPE_NAN)) {
|
|
WL_INFORM_MEM(("Allow NAN Data Path\n"));
|
|
/* No further checks are required. */
|
|
return BCME_OK;
|
|
}
|
|
}
|
|
|
|
/* Check for any conflicting discovery iface */
|
|
switch (new_wl_iftype) {
|
|
case WL_IF_TYPE_P2P_DISC:
|
|
case WL_IF_TYPE_P2P_GO:
|
|
case WL_IF_TYPE_P2P_GC: {
|
|
*disable_nan = true;
|
|
break;
|
|
}
|
|
case WL_IF_TYPE_NAN_NMI:
|
|
case WL_IF_TYPE_NAN: {
|
|
*disable_p2p = true;
|
|
break;
|
|
}
|
|
case WL_IF_TYPE_STA:
|
|
case WL_IF_TYPE_AP: {
|
|
*disable_nan = true;
|
|
*disable_p2p = true;
|
|
break;
|
|
}
|
|
default: {
|
|
WL_ERR(("Unsupported\n"));
|
|
return BCME_ERROR;
|
|
}
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
bool
|
|
wl_cfg80211_is_associated_discovery(struct bcm_cfg80211 *cfg,
|
|
wl_iftype_t new_wl_iftype)
|
|
{
|
|
struct net_device *p2p_ndev = NULL;
|
|
p2p_ndev = wl_to_p2p_bss_ndev(cfg, P2PAPI_BSSCFG_CONNECTION1);
|
|
|
|
if (new_wl_iftype == WL_IF_TYPE_P2P_DISC && p2p_ndev &&
|
|
p2p_ndev->ieee80211_ptr &&
|
|
is_p2p_group_iface(p2p_ndev->ieee80211_ptr)) {
|
|
return true;
|
|
}
|
|
#ifdef WL_NAN
|
|
else if ((new_wl_iftype == WL_IF_TYPE_NAN_NMI) &&
|
|
(wl_cfgnan_is_dp_active(bcmcfg_to_prmry_ndev(cfg)))) {
|
|
return true;
|
|
}
|
|
#endif /* WL_NAN */
|
|
return false;
|
|
}
|
|
|
|
/* Handle incoming discovery iface request */
|
|
s32
|
|
wl_cfg80211_handle_discovery_config(struct bcm_cfg80211 *cfg,
|
|
wl_iftype_t new_wl_iftype)
|
|
{
|
|
s32 ret = BCME_OK;
|
|
bool disable_p2p = false;
|
|
bool disable_nan = false;
|
|
|
|
wl_iftype_t active_sec_iface =
|
|
wl_cfg80211_get_sec_iface(cfg);
|
|
|
|
if (is_discovery_iface(new_wl_iftype) &&
|
|
(active_sec_iface != WL_IFACE_NOT_PRESENT)) {
|
|
if (wl_cfg80211_is_associated_discovery(cfg,
|
|
new_wl_iftype) == TRUE) {
|
|
WL_DBG(("Associate iface request is allowed= %s\n",
|
|
wl_iftype_to_str(new_wl_iftype)));
|
|
return ret;
|
|
}
|
|
}
|
|
|
|
ret = wl_cfg80211_disc_if_mgmt(cfg, new_wl_iftype,
|
|
&disable_nan, &disable_p2p);
|
|
if (ret != BCME_OK) {
|
|
WL_ERR(("Failed at disc iface mgmt, ret = %d\n", ret));
|
|
return ret;
|
|
}
|
|
#ifdef WL_NANP2P
|
|
if (((new_wl_iftype == WL_IF_TYPE_P2P_DISC) && disable_nan) ||
|
|
((new_wl_iftype == WL_IF_TYPE_NAN_NMI) && disable_p2p)) {
|
|
if ((cfg->nan_p2p_supported == TRUE) &&
|
|
(cfg->conc_disc == WL_NANP2P_CONC_SUPPORT)) {
|
|
WL_INFORM_MEM(("P2P + NAN conc is supported\n"));
|
|
disable_p2p = false;
|
|
disable_nan = false;
|
|
}
|
|
}
|
|
#endif /* WL_NANP2P */
|
|
|
|
if (disable_nan) {
|
|
#ifdef WL_NAN
|
|
/* Disable nan */
|
|
cfg->nancfg.disable_reason = NAN_CONCURRENCY_CONFLICT;
|
|
ret = wl_cfgnan_disable(cfg);
|
|
if (ret != BCME_OK) {
|
|
WL_ERR(("failed to disable nan, error[%d]\n", ret));
|
|
return ret;
|
|
}
|
|
#endif /* WL_NAN */
|
|
}
|
|
|
|
if (disable_p2p) {
|
|
/* Disable p2p discovery */
|
|
ret = wl_cfg80211_deinit_p2p_discovery(cfg);
|
|
if (ret != BCME_OK) {
|
|
WL_ERR(("Failed to disable p2p_disc for allowing nan\n"));
|
|
return ret;
|
|
}
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
/*
|
|
* Check for any conflicting iface before adding iface.
|
|
* Based on policy, either conflicting iface is removed
|
|
* or new iface add request is blocked.
|
|
*/
|
|
s32
|
|
wl_cfg80211_handle_if_role_conflict(struct bcm_cfg80211 *cfg,
|
|
wl_iftype_t new_wl_iftype)
|
|
{
|
|
s32 ret = BCME_OK;
|
|
|
|
WL_INFORM_MEM(("Incoming iface = %s\n", wl_iftype_to_str(new_wl_iftype)));
|
|
|
|
if (!is_discovery_iface(new_wl_iftype)) {
|
|
/* Incoming data interface request */
|
|
if (wl_cfg80211_get_sec_iface(cfg) != WL_IFACE_NOT_PRESENT) {
|
|
/* active interface present - Apply interface data policy */
|
|
ret = wl_cfg80211_data_if_mgmt(cfg, new_wl_iftype);
|
|
if (ret != BCME_OK) {
|
|
WL_ERR(("if_mgmt fail:%d\n", ret));
|
|
return ret;
|
|
}
|
|
}
|
|
}
|
|
/* Apply discovery config */
|
|
ret = wl_cfg80211_handle_discovery_config(cfg, new_wl_iftype);
|
|
return ret;
|
|
}
|
|
#endif /* WL_IFACE_MGMT */
|
|
|
|
static struct wireless_dev *
|
|
wl_cfg80211_add_monitor_if(struct wiphy *wiphy, const char *name)
|
|
{
|
|
#if defined(WL_ENABLE_P2P_IF) || defined(WL_CFG80211_P2P_DEV_IF)
|
|
WL_ERR(("wl_cfg80211_add_monitor_if: No more support monitor interface\n"));
|
|
return ERR_PTR(-EOPNOTSUPP);
|
|
#else
|
|
struct wireless_dev *wdev;
|
|
struct net_device* ndev = NULL;
|
|
|
|
dhd_add_monitor(name, &ndev);
|
|
|
|
wdev = kzalloc(sizeof(*wdev), GFP_KERNEL);
|
|
if (!wdev) {
|
|
WL_ERR(("wireless_dev alloc failed! \n"));
|
|
goto fail;
|
|
}
|
|
|
|
wdev->wiphy = wiphy;
|
|
wdev->iftype = NL80211_IFTYPE_MONITOR;
|
|
ndev->ieee80211_ptr = wdev;
|
|
SET_NETDEV_DEV(ndev, wiphy_dev(wiphy));
|
|
|
|
WL_DBG(("wl_cfg80211_add_monitor_if net device returned: 0x%p\n", ndev));
|
|
return ndev->ieee80211_ptr;
|
|
fail:
|
|
return ERR_PTR(-EOPNOTSUPP);
|
|
#endif // endif
|
|
}
|
|
|
|
static struct wireless_dev *
|
|
wl_cfg80211_add_ibss(struct wiphy *wiphy, u16 wl_iftype, char const *name)
|
|
{
|
|
#ifdef WLAIBSS_MCHAN
|
|
/* AIBSS */
|
|
return bcm_cfg80211_add_ibss_if(wiphy, (char *)name);
|
|
#else
|
|
/* Normal IBSS */
|
|
WL_ERR(("IBSS not supported on Virtual iface\n"));
|
|
return NULL;
|
|
#endif // endif
|
|
}
|
|
|
|
s32
|
|
wl_release_vif_macaddr(struct bcm_cfg80211 *cfg, u8 *mac_addr, u16 wl_iftype)
|
|
{
|
|
struct net_device *ndev = bcmcfg_to_prmry_ndev(cfg);
|
|
u16 org_toggle_bytes;
|
|
u16 cur_toggle_bytes;
|
|
u16 toggled_bit;
|
|
|
|
if (!ndev || !mac_addr || ETHER_ISNULLADDR(mac_addr)) {
|
|
return -EINVAL;
|
|
}
|
|
WL_DBG(("%s:Mac addr" MACDBG "\n",
|
|
__FUNCTION__, MAC2STRDBG(mac_addr)));
|
|
|
|
if ((wl_iftype == WL_IF_TYPE_P2P_DISC) || (wl_iftype == WL_IF_TYPE_AP) ||
|
|
(wl_iftype == WL_IF_TYPE_P2P_GO) || (wl_iftype == WL_IF_TYPE_P2P_GC)) {
|
|
/* Avoid invoking release mac addr code for interfaces using
|
|
* fixed mac addr.
|
|
*/
|
|
return BCME_OK;
|
|
}
|
|
|
|
/* Fetch last two bytes of mac address */
|
|
org_toggle_bytes = ntoh16(*((u16 *)&ndev->dev_addr[4]));
|
|
cur_toggle_bytes = ntoh16(*((u16 *)&mac_addr[4]));
|
|
|
|
toggled_bit = (org_toggle_bytes ^ cur_toggle_bytes);
|
|
WL_DBG(("org_toggle_bytes:%04X cur_toggle_bytes:%04X\n",
|
|
org_toggle_bytes, cur_toggle_bytes));
|
|
if (toggled_bit & cfg->vif_macaddr_mask) {
|
|
/* This toggled_bit is marked in the used mac addr
|
|
* mask. Clear it.
|
|
*/
|
|
cfg->vif_macaddr_mask &= ~toggled_bit;
|
|
WL_INFORM(("MAC address - " MACDBG " released. toggled_bit:%04X vif_mask:%04X\n",
|
|
MAC2STRDBG(mac_addr), toggled_bit, cfg->vif_macaddr_mask));
|
|
} else {
|
|
WL_ERR(("MAC address - " MACDBG " not found in the used list."
|
|
" toggled_bit:%04x vif_mask:%04x\n", MAC2STRDBG(mac_addr),
|
|
toggled_bit, cfg->vif_macaddr_mask));
|
|
return -EINVAL;
|
|
}
|
|
|
|
return BCME_OK;
|
|
}
|
|
|
|
s32
|
|
wl_get_vif_macaddr(struct bcm_cfg80211 *cfg, u16 wl_iftype, u8 *mac_addr)
|
|
{
|
|
#ifdef WL_P2P_USE_RANDMAC
|
|
struct ether_addr *p2p_dev_addr = wl_to_p2p_bss_macaddr(cfg, P2PAPI_BSSCFG_DEVICE);
|
|
#endif // endif
|
|
struct net_device *ndev = bcmcfg_to_prmry_ndev(cfg);
|
|
u16 toggle_mask;
|
|
u16 toggle_bit;
|
|
u16 toggle_bytes;
|
|
u16 used;
|
|
u32 offset = 0;
|
|
/* Toggle mask starts from MSB of second last byte */
|
|
u16 mask = 0x8000;
|
|
if (!mac_addr) {
|
|
return -EINVAL;
|
|
}
|
|
#ifdef WL_P2P_USE_RANDMAC
|
|
if (wl_iftype == WL_IF_TYPE_P2P_DISC) {
|
|
memcpy_s(mac_addr, ETH_ALEN, p2p_dev_addr->octet, ETH_ALEN);
|
|
return 0;
|
|
}
|
|
#endif // endif
|
|
memcpy(mac_addr, ndev->dev_addr, ETH_ALEN);
|
|
/*
|
|
* VIF MAC address managment
|
|
* P2P Device addres: Primary MAC with locally admin. bit set
|
|
* P2P Group address/NAN NMI/Softap/NAN DPI: Primary MAC addr
|
|
* with local admin bit set and one additional bit toggled.
|
|
* cfg->vif_macaddr_mask will hold the info regarding the mac address
|
|
* released. Ensure to call wl_release_vif_macaddress to free up
|
|
* the mac address.
|
|
*/
|
|
#if defined(SPECIFIC_MAC_GEN_SCHEME)
|
|
if (wl_iftype == WL_IF_TYPE_P2P_DISC || wl_iftype == WL_IF_TYPE_AP) {
|
|
mac_addr[0] |= 0x02;
|
|
} else if ((wl_iftype == WL_IF_TYPE_P2P_GO) || (wl_iftype == WL_IF_TYPE_P2P_GC)) {
|
|
mac_addr[0] |= 0x02;
|
|
mac_addr[4] ^= 0x80;
|
|
}
|
|
#else
|
|
if (wl_iftype == WL_IF_TYPE_P2P_DISC) {
|
|
mac_addr[0] |= 0x02;
|
|
}
|
|
#endif /* SEPCIFIC_MAC_GEN_SCHEME */
|
|
else {
|
|
/* For locally administered mac addresses, we keep the
|
|
* OUI part constant and just work on the last two bytes.
|
|
*/
|
|
mac_addr[0] |= 0x02;
|
|
toggle_mask = cfg->vif_macaddr_mask;
|
|
toggle_bytes = ntoh16(*((u16 *)&mac_addr[4]));
|
|
do {
|
|
used = toggle_mask & mask;
|
|
if (!used) {
|
|
/* Use this bit position */
|
|
toggle_bit = mask >> offset;
|
|
toggle_bytes ^= toggle_bit;
|
|
cfg->vif_macaddr_mask |= toggle_bit;
|
|
WL_DBG(("toggle_bit:%04X toggle_bytes:%04X toggle_mask:%04X\n",
|
|
toggle_bit, toggle_bytes, cfg->vif_macaddr_mask));
|
|
/* Macaddress are stored in network order */
|
|
mac_addr[5] = *((u8 *)&toggle_bytes);
|
|
mac_addr[4] = *(((u8 *)&toggle_bytes + 1));
|
|
break;
|
|
}
|
|
|
|
/* Shift by one */
|
|
toggle_mask = toggle_mask << 0x1;
|
|
offset++;
|
|
if (offset > MAX_VIF_OFFSET) {
|
|
/* We have used up all macaddresses. Something wrong! */
|
|
WL_ERR(("Entire range of macaddress used up.\n"));
|
|
ASSERT(0);
|
|
break;
|
|
}
|
|
} while (true);
|
|
}
|
|
WL_INFORM_MEM(("Get virtual I/F mac addr: "MACDBG"\n", MAC2STRDBG(mac_addr)));
|
|
return 0;
|
|
}
|
|
#ifdef DNGL_AXI_ERROR_LOGGING
|
|
static s32
|
|
_wl_cfg80211_check_axi_error(struct bcm_cfg80211 *cfg)
|
|
{
|
|
s32 ret = BCME_OK;
|
|
dhd_pub_t *dhd = (dhd_pub_t *)(cfg->pub);
|
|
hnd_ext_trap_hdr_t *hdr;
|
|
int axi_host_error_size;
|
|
uint8 *new_dst;
|
|
uint32 *ext_data = dhd->extended_trap_data;
|
|
struct file *fp = NULL;
|
|
char *filename = DHD_COMMON_DUMP_PATH
|
|
DHD_DUMP_AXI_ERROR_FILENAME
|
|
DHD_DUMP_HAL_FILENAME_SUFFIX;
|
|
|
|
WL_ERR(("%s: starts to read %s. Axi error \n", __FUNCTION__, filename));
|
|
|
|
fp = filp_open(filename, O_RDONLY, 0);
|
|
|
|
if (IS_ERR(fp) || (fp == NULL)) {
|
|
WL_ERR(("%s: Couldn't read the file, err %ld,File [%s] No previous axi error \n",
|
|
__FUNCTION__, PTR_ERR(fp), filename));
|
|
return ret;
|
|
}
|
|
|
|
kernel_read_compat(fp, fp->f_pos, (char *)dhd->axi_err_dump, sizeof(dhd_axi_error_dump_t));
|
|
filp_close(fp, NULL);
|
|
|
|
/* Delete axi error info file */
|
|
if (dhd_file_delete(filename) < 0) {
|
|
WL_ERR(("%s(): Failed to delete file: %s\n", __FUNCTION__, filename));
|
|
return ret;
|
|
}
|
|
WL_ERR(("%s(): Success to delete file: %s\n", __FUNCTION__, filename));
|
|
|
|
if (dhd->axi_err_dump->etd_axi_error_v1.signature != HND_EXT_TRAP_AXIERROR_SIGNATURE) {
|
|
WL_ERR(("%s: Invalid AXI signature: 0x%x\n",
|
|
__FUNCTION__, dhd->axi_err_dump->etd_axi_error_v1.signature));
|
|
}
|
|
|
|
/* First word is original trap_data */
|
|
ext_data++;
|
|
|
|
/* Followed by the extended trap data header */
|
|
hdr = (hnd_ext_trap_hdr_t *)ext_data;
|
|
new_dst = hdr->data;
|
|
|
|
axi_host_error_size = sizeof(dhd->axi_err_dump->axid)
|
|
+ sizeof(dhd->axi_err_dump->fault_address);
|
|
|
|
/* TAG_TRAP_AXI_HOST_INFO tlv : host's axid, fault address */
|
|
new_dst = bcm_write_tlv(TAG_TRAP_AXI_HOST_INFO,
|
|
(const void *)dhd->axi_err_dump,
|
|
axi_host_error_size, new_dst);
|
|
|
|
/* TAG_TRAP_AXI_ERROR tlv */
|
|
new_dst = bcm_write_tlv(TAG_TRAP_AXI_ERROR,
|
|
(const void *)&dhd->axi_err_dump->etd_axi_error_v1,
|
|
sizeof(dhd->axi_err_dump->etd_axi_error_v1), new_dst);
|
|
hdr->len = new_dst - hdr->data;
|
|
|
|
dhd->dongle_trap_occured = TRUE;
|
|
memset(dhd->axi_err_dump, 0, sizeof(dhd_axi_error_dump_t));
|
|
|
|
dhd->hang_reason = HANG_REASON_DONGLE_TRAP;
|
|
net_os_send_hang_message(bcmcfg_to_prmry_ndev(cfg));
|
|
ret = BCME_ERROR;
|
|
return ret;
|
|
}
|
|
#endif /* DNGL_AXI_ERROR_LOGGING */
|
|
|
|
/* All Android/Linux private/Vendor Interface calls should make
|
|
* use of below API for interface creation.
|
|
*/
|
|
struct wireless_dev *
|
|
wl_cfg80211_add_if(struct bcm_cfg80211 *cfg,
|
|
struct net_device *primary_ndev,
|
|
wl_iftype_t wl_iftype, const char *name, u8 *mac)
|
|
{
|
|
u8 mac_addr[ETH_ALEN];
|
|
s32 err = -ENODEV;
|
|
struct wireless_dev *wdev = NULL;
|
|
struct wiphy *wiphy;
|
|
s32 wl_mode;
|
|
dhd_pub_t *dhd;
|
|
wl_iftype_t macaddr_iftype = wl_iftype;
|
|
|
|
WL_INFORM_MEM(("if name: %s, wl_iftype:%d \n",
|
|
name ? name : "NULL", wl_iftype));
|
|
if (!cfg || !primary_ndev || !name) {
|
|
WL_ERR(("cfg/ndev/name ptr null\n"));
|
|
return NULL;
|
|
}
|
|
if (wl_cfg80211_get_wdev_from_ifname(cfg, name)) {
|
|
WL_ERR(("Interface name %s exists!\n", name));
|
|
return NULL;
|
|
}
|
|
|
|
wiphy = bcmcfg_to_wiphy(cfg);
|
|
dhd = (dhd_pub_t *)(cfg->pub);
|
|
if (!dhd) {
|
|
return NULL;
|
|
}
|
|
|
|
if ((wl_mode = wl_iftype_to_mode(wl_iftype)) < 0) {
|
|
return NULL;
|
|
}
|
|
mutex_lock(&cfg->if_sync);
|
|
#ifdef WL_NAN
|
|
if (wl_iftype == WL_IF_TYPE_NAN) {
|
|
/*
|
|
* Bypass the role conflict check for NDI and handle it
|
|
* from dp req and dp resp context
|
|
* because in aware comms, ndi gets created soon after nan enable.
|
|
*/
|
|
} else
|
|
#endif /* WL_NAN */
|
|
#ifdef WL_IFACE_MGMT
|
|
if ((err = wl_cfg80211_handle_if_role_conflict(cfg, wl_iftype)) < 0) {
|
|
mutex_unlock(&cfg->if_sync);
|
|
return NULL;
|
|
}
|
|
#endif /* WL_IFACE_MGMT */
|
|
#ifdef DNGL_AXI_ERROR_LOGGING
|
|
/* Check the previous smmu fault error */
|
|
if ((err = _wl_cfg80211_check_axi_error(cfg)) < 0) {
|
|
mutex_unlock(&cfg->if_sync);
|
|
return NULL;
|
|
}
|
|
#endif /* DNGL_AXI_ERROR_LOGGING */
|
|
/* Protect the interace op context */
|
|
/* Do pre-create ops */
|
|
wl_cfg80211_iface_state_ops(primary_ndev->ieee80211_ptr, WL_IF_CREATE_REQ,
|
|
wl_iftype, wl_mode);
|
|
|
|
if (strnicmp(name, SOFT_AP_IF_NAME, strlen(SOFT_AP_IF_NAME)) == 0) {
|
|
macaddr_iftype = WL_IF_TYPE_AP;
|
|
}
|
|
|
|
if (mac) {
|
|
/* If mac address is provided, use that */
|
|
memcpy(mac_addr, mac, ETH_ALEN);
|
|
} else if ((wl_get_vif_macaddr(cfg, macaddr_iftype, mac_addr) != BCME_OK)) {
|
|
/* Fetch the mac address to be used for virtual interface */
|
|
err = -EINVAL;
|
|
goto fail;
|
|
}
|
|
|
|
switch (wl_iftype) {
|
|
case WL_IF_TYPE_IBSS:
|
|
wdev = wl_cfg80211_add_ibss(wiphy, wl_iftype, name);
|
|
break;
|
|
case WL_IF_TYPE_MONITOR:
|
|
wdev = wl_cfg80211_add_monitor_if(wiphy, name);
|
|
break;
|
|
case WL_IF_TYPE_STA:
|
|
case WL_IF_TYPE_AP:
|
|
case WL_IF_TYPE_NAN:
|
|
if (cfg->iface_cnt >= (IFACE_MAX_CNT - 1)) {
|
|
WL_ERR(("iface_cnt exceeds max cnt. created iface_cnt: %d\n",
|
|
cfg->iface_cnt));
|
|
err = -ENOTSUPP;
|
|
goto fail;
|
|
}
|
|
wdev = wl_cfg80211_create_iface(cfg->wdev->wiphy,
|
|
wl_iftype, mac_addr, name);
|
|
break;
|
|
case WL_IF_TYPE_P2P_DISC:
|
|
case WL_IF_TYPE_P2P_GO:
|
|
/* Intentional fall through */
|
|
case WL_IF_TYPE_P2P_GC:
|
|
if (cfg->p2p_supported) {
|
|
wdev = wl_cfg80211_p2p_if_add(cfg, wl_iftype,
|
|
name, mac_addr, &err);
|
|
break;
|
|
}
|
|
/* Intentionally fall through for unsupported interface
|
|
* handling when firmware doesn't support p2p
|
|
*/
|
|
default:
|
|
WL_ERR(("Unsupported interface type\n"));
|
|
err = -ENOTSUPP;
|
|
goto fail;
|
|
}
|
|
|
|
if (!wdev) {
|
|
WL_ERR(("vif create failed. err:%d\n", err));
|
|
if (err != -ENOTSUPP) {
|
|
err = -ENODEV;
|
|
}
|
|
goto fail;
|
|
}
|
|
|
|
/* Ensure decrementing in case of failure */
|
|
cfg->vif_count++;
|
|
|
|
wl_cfg80211_iface_state_ops(wdev,
|
|
WL_IF_CREATE_DONE, wl_iftype, wl_mode);
|
|
|
|
WL_INFORM_MEM(("Vif created. dev->ifindex:%d"
|
|
" cfg_iftype:%d, vif_count:%d\n",
|
|
(wdev->netdev ? wdev->netdev->ifindex : 0xff),
|
|
wdev->iftype, cfg->vif_count));
|
|
mutex_unlock(&cfg->if_sync);
|
|
return wdev;
|
|
|
|
fail:
|
|
wl_cfg80211_iface_state_ops(primary_ndev->ieee80211_ptr,
|
|
WL_IF_DELETE_REQ, wl_iftype, wl_mode);
|
|
|
|
if (err != -ENOTSUPP) {
|
|
/* For non-supported interfaces, just return error and
|
|
* skip below recovery steps.
|
|
*/
|
|
SUPP_LOG(("IF_ADD fail. err:%d\n", err));
|
|
wl_flush_fw_log_buffer(primary_ndev, FW_LOGSET_MASK_ALL);
|
|
if (dhd_query_bus_erros(dhd)) {
|
|
goto exit;
|
|
}
|
|
dhd->iface_op_failed = TRUE;
|
|
#if defined(DHD_DEBUG) && defined(BCMPCIE) && defined(DHD_FW_COREDUMP)
|
|
if (dhd->memdump_enabled) {
|
|
dhd->memdump_type = DUMP_TYPE_IFACE_OP_FAILURE;
|
|
dhd_bus_mem_dump(dhd);
|
|
}
|
|
#endif /* DHD_DEBUG && BCMPCIE && DHD_FW_COREDUMP */
|
|
dhd->hang_reason = HANG_REASON_IFACE_ADD_FAILURE;
|
|
net_os_send_hang_message(bcmcfg_to_prmry_ndev(cfg));
|
|
}
|
|
exit:
|
|
mutex_unlock(&cfg->if_sync);
|
|
return NULL;
|
|
}
|
|
|
|
static bcm_struct_cfgdev *
|
|
wl_cfg80211_add_virtual_iface(struct wiphy *wiphy,
|
|
#if defined(WL_CFG80211_P2P_DEV_IF)
|
|
const char *name,
|
|
#else
|
|
char *name,
|
|
#endif /* WL_CFG80211_P2P_DEV_IF */
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(4, 1, 0))
|
|
unsigned char name_assign_type,
|
|
#endif /* (LINUX_VERSION_CODE >= KERNEL_VERSION(4, 1, 0)) */
|
|
enum nl80211_iftype type,
|
|
#if (LINUX_VERSION_CODE < KERNEL_VERSION(4, 12, 0))
|
|
u32 *flags,
|
|
#endif /* LINUX_VERSION_CODE < KERNEL_VERSION(4, 12, 0) */
|
|
struct vif_params *params)
|
|
{
|
|
u16 wl_iftype;
|
|
u16 wl_mode;
|
|
struct net_device *primary_ndev;
|
|
struct bcm_cfg80211 *cfg = wiphy_priv(wiphy);
|
|
struct wireless_dev *wdev;
|
|
|
|
WL_DBG(("Enter iftype: %d\n", type));
|
|
if (!cfg) {
|
|
return ERR_PTR(-EINVAL);
|
|
}
|
|
|
|
/* Use primary I/F for sending cmds down to firmware */
|
|
primary_ndev = bcmcfg_to_prmry_ndev(cfg);
|
|
if (unlikely(!wl_get_drv_status(cfg, READY, primary_ndev))) {
|
|
WL_ERR(("device is not ready\n"));
|
|
return ERR_PTR(-ENODEV);
|
|
}
|
|
|
|
if (!name) {
|
|
WL_ERR(("Interface name not provided \n"));
|
|
return ERR_PTR(-EINVAL);
|
|
}
|
|
|
|
if (cfg80211_to_wl_iftype(type, &wl_iftype, &wl_mode) < 0) {
|
|
return ERR_PTR(-EINVAL);
|
|
}
|
|
|
|
wdev = wl_cfg80211_add_if(cfg, primary_ndev, wl_iftype, name, NULL);
|
|
if (unlikely(!wdev)) {
|
|
return ERR_PTR(-ENODEV);
|
|
}
|
|
return wdev_to_cfgdev(wdev);
|
|
}
|
|
|
|
static s32
|
|
wl_cfg80211_del_ibss(struct wiphy *wiphy, struct wireless_dev *wdev)
|
|
{
|
|
WL_INFORM_MEM(("del ibss wdev_ptr:%p\n", wdev));
|
|
#ifdef WLAIBSS_MCHAN
|
|
/* AIBSS */
|
|
return bcm_cfg80211_del_ibss_if(wiphy, wdev);
|
|
#else
|
|
/* Normal IBSS */
|
|
return wl_cfg80211_del_iface(wiphy, wdev);
|
|
#endif // endif
|
|
}
|
|
|
|
s32
|
|
wl_cfg80211_del_if(struct bcm_cfg80211 *cfg, struct net_device *primary_ndev,
|
|
struct wireless_dev *wdev, char *ifname)
|
|
{
|
|
int ret = BCME_OK;
|
|
mutex_lock(&cfg->if_sync);
|
|
ret = _wl_cfg80211_del_if(cfg, primary_ndev, wdev, ifname);
|
|
mutex_unlock(&cfg->if_sync);
|
|
return ret;
|
|
}
|
|
|
|
s32
|
|
_wl_cfg80211_del_if(struct bcm_cfg80211 *cfg, struct net_device *primary_ndev,
|
|
struct wireless_dev *wdev, char *ifname)
|
|
{
|
|
int ret = BCME_OK;
|
|
s32 bssidx;
|
|
struct wiphy *wiphy;
|
|
u16 wl_mode;
|
|
u16 wl_iftype;
|
|
struct net_info *netinfo;
|
|
dhd_pub_t *dhd;
|
|
BCM_REFERENCE(dhd);
|
|
|
|
if (!cfg) {
|
|
return -EINVAL;
|
|
}
|
|
|
|
dhd = (dhd_pub_t *)(cfg->pub);
|
|
|
|
if (!wdev && ifname) {
|
|
/* If only ifname is provided, fetch corresponding wdev ptr from our
|
|
* internal data structure
|
|
*/
|
|
wdev = wl_cfg80211_get_wdev_from_ifname(cfg, ifname);
|
|
}
|
|
|
|
/* Check whether we have a valid wdev ptr */
|
|
if (unlikely(!wdev)) {
|
|
WL_ERR(("wdev not found. '%s' does not exists\n", ifname));
|
|
return -ENODEV;
|
|
}
|
|
|
|
WL_INFORM_MEM(("del vif. wdev cfg_iftype:%d\n", wdev->iftype));
|
|
|
|
wiphy = wdev->wiphy;
|
|
#ifdef WL_CFG80211_P2P_DEV_IF
|
|
if (wdev->iftype == NL80211_IFTYPE_P2P_DEVICE) {
|
|
/* p2p discovery would be de-initialized in stop p2p
|
|
* device context/from other virtual i/f creation context
|
|
* so netinfo list may not have any node corresponding to
|
|
* discovery I/F. Handle it before bssidx check.
|
|
*/
|
|
ret = wl_cfg80211_p2p_if_del(wiphy, wdev);
|
|
if (unlikely(ret)) {
|
|
goto exit;
|
|
} else {
|
|
/* success case. return from here */
|
|
if (cfg->vif_count) {
|
|
cfg->vif_count--;
|
|
}
|
|
return BCME_OK;
|
|
}
|
|
}
|
|
#endif /* WL_CFG80211_P2P_DEV_IF */
|
|
|
|
if ((netinfo = wl_get_netinfo_by_wdev(cfg, wdev)) == NULL) {
|
|
WL_ERR(("Find netinfo from wdev %p failed\n", wdev));
|
|
ret = -ENODEV;
|
|
goto exit;
|
|
}
|
|
|
|
if (!wdev->netdev) {
|
|
WL_ERR(("ndev null! \n"));
|
|
} else {
|
|
/* Disable tx before del */
|
|
netif_tx_disable(wdev->netdev);
|
|
}
|
|
|
|
wl_iftype = netinfo->iftype;
|
|
wl_mode = wl_iftype_to_mode(wl_iftype);
|
|
bssidx = netinfo->bssidx;
|
|
WL_INFORM_MEM(("[IFDEL] cfg_iftype:%d wl_iftype:%d mode:%d bssidx:%d\n",
|
|
wdev->iftype, wl_iftype, wl_mode, bssidx));
|
|
|
|
/* Do pre-interface del ops */
|
|
wl_cfg80211_iface_state_ops(wdev, WL_IF_DELETE_REQ, wl_iftype, wl_mode);
|
|
|
|
switch (wl_iftype) {
|
|
case WL_IF_TYPE_P2P_GO:
|
|
case WL_IF_TYPE_P2P_GC:
|
|
case WL_IF_TYPE_AP:
|
|
case WL_IF_TYPE_STA:
|
|
case WL_IF_TYPE_NAN:
|
|
ret = wl_cfg80211_del_iface(wiphy, wdev);
|
|
break;
|
|
case WL_IF_TYPE_IBSS:
|
|
ret = wl_cfg80211_del_ibss(wiphy, wdev);
|
|
break;
|
|
|
|
default:
|
|
WL_ERR(("Unsupported interface type\n"));
|
|
ret = BCME_ERROR;
|
|
}
|
|
|
|
exit:
|
|
if (ret == BCME_OK) {
|
|
/* Successful case */
|
|
if (cfg->vif_count) {
|
|
cfg->vif_count--;
|
|
}
|
|
wl_cfg80211_iface_state_ops(primary_ndev->ieee80211_ptr,
|
|
WL_IF_DELETE_DONE, wl_iftype, wl_mode);
|
|
#ifdef WL_NAN
|
|
if (!((cfg->nancfg.mac_rand) && (wl_iftype == WL_IF_TYPE_NAN)))
|
|
#endif /* WL_NAN */
|
|
{
|
|
wl_release_vif_macaddr(cfg, wdev->netdev->dev_addr, wl_iftype);
|
|
}
|
|
WL_INFORM_MEM(("vif deleted. vif_count:%d\n", cfg->vif_count));
|
|
} else {
|
|
if (!wdev->netdev) {
|
|
WL_ERR(("ndev null! \n"));
|
|
} else {
|
|
/* IF del failed. revert back tx queue status */
|
|
netif_tx_start_all_queues(wdev->netdev);
|
|
}
|
|
|
|
/* Skip generating log files and sending HANG event
|
|
* if driver state is not READY
|
|
*/
|
|
if (wl_get_drv_status(cfg, READY, bcmcfg_to_prmry_ndev(cfg))) {
|
|
SUPP_LOG(("IF_DEL fail. err:%d\n", ret));
|
|
wl_flush_fw_log_buffer(primary_ndev, FW_LOGSET_MASK_ALL);
|
|
/* IF dongle is down due to previous hang or other conditions, sending
|
|
* one more hang notification is not needed.
|
|
*/
|
|
if (dhd_query_bus_erros(dhd) || (ret == BCME_DONGLE_DOWN)) {
|
|
goto end;
|
|
}
|
|
dhd->iface_op_failed = TRUE;
|
|
#if defined(DHD_FW_COREDUMP)
|
|
if (dhd->memdump_enabled && (ret != -EBADTYPE)) {
|
|
dhd->memdump_type = DUMP_TYPE_IFACE_OP_FAILURE;
|
|
dhd_bus_mem_dump(dhd);
|
|
}
|
|
#endif /* DHD_FW_COREDUMP */
|
|
WL_ERR(("Notify hang event to upper layer \n"));
|
|
dhd->hang_reason = HANG_REASON_IFACE_DEL_FAILURE;
|
|
net_os_send_hang_message(bcmcfg_to_prmry_ndev(cfg));
|
|
}
|
|
}
|
|
end:
|
|
return ret;
|
|
}
|
|
|
|
static s32
|
|
wl_cfg80211_del_virtual_iface(struct wiphy *wiphy, bcm_struct_cfgdev *cfgdev)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wiphy_priv(wiphy);
|
|
struct wireless_dev *wdev = cfgdev_to_wdev(cfgdev);
|
|
int ret = BCME_OK;
|
|
u16 wl_iftype;
|
|
u16 wl_mode;
|
|
struct net_device *primary_ndev;
|
|
|
|
if (!cfg) {
|
|
return -EINVAL;
|
|
}
|
|
|
|
primary_ndev = bcmcfg_to_prmry_ndev(cfg);
|
|
wdev = cfgdev_to_wdev(cfgdev);
|
|
if (!wdev) {
|
|
WL_ERR(("wdev null"));
|
|
return -ENODEV;
|
|
}
|
|
|
|
WL_DBG(("Enter wdev:%p iftype: %d\n", wdev, wdev->iftype));
|
|
if (cfg80211_to_wl_iftype(wdev->iftype, &wl_iftype, &wl_mode) < 0) {
|
|
WL_ERR(("Wrong iftype: %d\n", wdev->iftype));
|
|
return -ENODEV;
|
|
}
|
|
|
|
if ((ret = wl_cfg80211_del_if(cfg, primary_ndev,
|
|
wdev, NULL)) < 0) {
|
|
WL_ERR(("IF del failed\n"));
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
static s32
|
|
wl_cfg80211_change_p2prole(struct wiphy *wiphy, struct net_device *ndev, enum nl80211_iftype type)
|
|
{
|
|
s32 wlif_type;
|
|
s32 mode = 0;
|
|
s32 index;
|
|
s32 err;
|
|
s32 conn_idx = -1;
|
|
chanspec_t chspec;
|
|
struct bcm_cfg80211 *cfg = wiphy_priv(wiphy);
|
|
dhd_pub_t *dhd = (dhd_pub_t *)(cfg->pub);
|
|
|
|
WL_INFORM_MEM(("Enter. current_role:%d new_role:%d \n", ndev->ieee80211_ptr->iftype, type));
|
|
|
|
if (!cfg->p2p || !wl_cfgp2p_vif_created(cfg)) {
|
|
WL_ERR(("P2P not initialized \n"));
|
|
return -EINVAL;
|
|
}
|
|
|
|
if (!is_p2p_group_iface(ndev->ieee80211_ptr)) {
|
|
WL_ERR(("Wrong if type \n"));
|
|
return -EINVAL;
|
|
}
|
|
|
|
/* Abort any on-going scans to avoid race condition issues */
|
|
wl_cfg80211_cancel_scan(cfg);
|
|
|
|
index = wl_get_bssidx_by_wdev(cfg, ndev->ieee80211_ptr);
|
|
if (index < 0) {
|
|
WL_ERR(("Find bsscfg index from ndev(%p) failed\n", ndev));
|
|
return BCME_ERROR;
|
|
}
|
|
if (wl_cfgp2p_find_type(cfg, index, &conn_idx) != BCME_OK) {
|
|
return BCME_ERROR;
|
|
}
|
|
|
|
/* In concurrency case, STA may be already associated in a particular
|
|
* channel. so retrieve the current channel of primary interface and
|
|
* then start the virtual interface on that.
|
|
*/
|
|
chspec = wl_cfg80211_get_shared_freq(wiphy);
|
|
if (type == NL80211_IFTYPE_P2P_GO) {
|
|
/* Dual p2p doesn't support multiple P2PGO interfaces,
|
|
* p2p_go_count is the counter for GO creation
|
|
* requests.
|
|
*/
|
|
if ((cfg->p2p->p2p_go_count > 0) && (type == NL80211_IFTYPE_P2P_GO)) {
|
|
WL_ERR(("FW does not support multiple GO\n"));
|
|
return BCME_ERROR;
|
|
}
|
|
mode = WL_MODE_AP;
|
|
wlif_type = WL_P2P_IF_GO;
|
|
dhd->op_mode &= ~DHD_FLAG_P2P_GC_MODE;
|
|
dhd->op_mode |= DHD_FLAG_P2P_GO_MODE;
|
|
} else {
|
|
wlif_type = WL_P2P_IF_CLIENT;
|
|
/* for GO */
|
|
if (wl_get_mode_by_netdev(cfg, ndev) == WL_MODE_AP) {
|
|
WL_INFORM_MEM(("Downgrading P2P GO to cfg_iftype:%d \n", type));
|
|
wl_add_remove_eventmsg(ndev, WLC_E_PROBREQ_MSG, false);
|
|
cfg->p2p->p2p_go_count--;
|
|
/* disable interface before bsscfg free */
|
|
err = wl_cfgp2p_ifdisable(cfg, wl_to_p2p_bss_macaddr(cfg, conn_idx));
|
|
/* if fw doesn't support "ifdis",
|
|
* do not wait for link down of ap mode
|
|
*/
|
|
if (err == 0) {
|
|
WL_DBG(("Wait for Link Down event for GO !!!\n"));
|
|
wait_for_completion_timeout(&cfg->iface_disable,
|
|
msecs_to_jiffies(500));
|
|
} else if (err != BCME_UNSUPPORTED) {
|
|
msleep(300);
|
|
}
|
|
}
|
|
}
|
|
|
|
wl_set_p2p_status(cfg, IF_CHANGING);
|
|
wl_clr_p2p_status(cfg, IF_CHANGED);
|
|
wl_cfgp2p_ifchange(cfg, wl_to_p2p_bss_macaddr(cfg, conn_idx),
|
|
htod32(wlif_type), chspec, conn_idx);
|
|
wait_event_interruptible_timeout(cfg->netif_change_event,
|
|
(wl_get_p2p_status(cfg, IF_CHANGED) == true),
|
|
msecs_to_jiffies(MAX_WAIT_TIME));
|
|
|
|
wl_clr_p2p_status(cfg, IF_CHANGING);
|
|
wl_clr_p2p_status(cfg, IF_CHANGED);
|
|
|
|
if (mode == WL_MODE_AP) {
|
|
wl_set_drv_status(cfg, CONNECTED, ndev);
|
|
}
|
|
|
|
return BCME_OK;
|
|
}
|
|
|
|
static s32
|
|
wl_cfg80211_change_virtual_iface(struct wiphy *wiphy, struct net_device *ndev,
|
|
enum nl80211_iftype type,
|
|
#if (LINUX_VERSION_CODE < KERNEL_VERSION(4, 12, 0))
|
|
u32 *flags,
|
|
#endif /* (LINUX_VERSION_CODE < KERNEL_VERSION(4, 12, 0) */
|
|
struct vif_params *params)
|
|
{
|
|
s32 infra = 1;
|
|
s32 err = BCME_OK;
|
|
u16 wl_iftype;
|
|
u16 wl_mode;
|
|
struct bcm_cfg80211 *cfg = wiphy_priv(wiphy);
|
|
struct net_info *netinfo = NULL;
|
|
dhd_pub_t *dhd = (dhd_pub_t *)(cfg->pub);
|
|
struct net_device *primary_ndev;
|
|
|
|
if (!dhd)
|
|
return -EINVAL;
|
|
|
|
WL_INFORM_MEM(("[%s] Enter. current cfg_iftype:%d new cfg_iftype:%d \n",
|
|
ndev->name, ndev->ieee80211_ptr->iftype, type));
|
|
primary_ndev = bcmcfg_to_prmry_ndev(cfg);
|
|
|
|
if (cfg80211_to_wl_iftype(type, &wl_iftype, &wl_mode) < 0) {
|
|
WL_ERR(("Unknown role \n"));
|
|
return -EINVAL;
|
|
}
|
|
|
|
mutex_lock(&cfg->if_sync);
|
|
netinfo = wl_get_netinfo_by_wdev(cfg, ndev->ieee80211_ptr);
|
|
if (unlikely(!netinfo)) {
|
|
#ifdef WL_STATIC_IF
|
|
if (IS_CFG80211_STATIC_IF(cfg, ndev)) {
|
|
/* Incase of static interfaces, the netinfo will be
|
|
* allocated only when FW interface is initialized. So
|
|
* store the value and use it during initialization.
|
|
*/
|
|
WL_INFORM_MEM(("skip change vif for static if\n"));
|
|
ndev->ieee80211_ptr->iftype = type;
|
|
err = BCME_OK;
|
|
} else
|
|
#endif /* WL_STATIC_IF */
|
|
{
|
|
WL_ERR(("netinfo not found \n"));
|
|
err = -ENODEV;
|
|
}
|
|
goto fail;
|
|
}
|
|
|
|
/* perform pre-if-change tasks */
|
|
wl_cfg80211_iface_state_ops(ndev->ieee80211_ptr,
|
|
WL_IF_CHANGE_REQ, wl_iftype, wl_mode);
|
|
|
|
switch (type) {
|
|
case NL80211_IFTYPE_ADHOC:
|
|
infra = 0;
|
|
break;
|
|
case NL80211_IFTYPE_STATION:
|
|
/* Supplicant sets iftype to STATION while removing p2p GO */
|
|
if (ndev->ieee80211_ptr->iftype == NL80211_IFTYPE_P2P_GO) {
|
|
/* Downgrading P2P GO */
|
|
err = wl_cfg80211_change_p2prole(wiphy, ndev, type);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("P2P downgrade failed \n"));
|
|
}
|
|
} else if (ndev->ieee80211_ptr->iftype == NL80211_IFTYPE_AP) {
|
|
/* Downgrade role from AP to STA */
|
|
if ((err = wl_cfg80211_add_del_bss(cfg, ndev,
|
|
netinfo->bssidx, wl_iftype, 0, NULL)) < 0) {
|
|
WL_ERR(("AP-STA Downgrade failed \n"));
|
|
goto fail;
|
|
}
|
|
}
|
|
break;
|
|
case NL80211_IFTYPE_AP:
|
|
/* intentional fall through */
|
|
case NL80211_IFTYPE_AP_VLAN:
|
|
{
|
|
if (!wl_get_drv_status(cfg, AP_CREATED, ndev) &&
|
|
wl_get_drv_status(cfg, READY, ndev)) {
|
|
err = wl_cfg80211_set_ap_role(cfg, ndev);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("set ap role failed!\n"));
|
|
goto fail;
|
|
}
|
|
} else {
|
|
WL_INFORM_MEM(("AP_CREATED bit set. Skip role change\n"));
|
|
}
|
|
break;
|
|
}
|
|
case NL80211_IFTYPE_P2P_GO:
|
|
/* Intentional fall through */
|
|
case NL80211_IFTYPE_P2P_CLIENT:
|
|
infra = 1;
|
|
err = wl_cfg80211_change_p2prole(wiphy, ndev, type);
|
|
break;
|
|
case NL80211_IFTYPE_MONITOR:
|
|
case NL80211_IFTYPE_WDS:
|
|
case NL80211_IFTYPE_MESH_POINT:
|
|
/* Intentional fall through */
|
|
default:
|
|
WL_ERR(("Unsupported type:%d \n", type));
|
|
err = -EINVAL;
|
|
goto fail;
|
|
}
|
|
|
|
if (wl_get_drv_status(cfg, READY, ndev)) {
|
|
err = wldev_ioctl_set(ndev, WLC_SET_INFRA, &infra, sizeof(s32));
|
|
if (err < 0) {
|
|
WL_ERR(("SET INFRA/IBSS error %d\n", err));
|
|
goto fail;
|
|
}
|
|
}
|
|
|
|
wl_cfg80211_iface_state_ops(primary_ndev->ieee80211_ptr,
|
|
WL_IF_CHANGE_DONE, wl_iftype, wl_mode);
|
|
|
|
/* Update new iftype in relevant structures */
|
|
ndev->ieee80211_ptr->iftype = type;
|
|
netinfo->iftype = wl_iftype;
|
|
WL_INFORM_MEM(("[%s] cfg_iftype changed to %d\n", ndev->name, type));
|
|
#ifdef WL_EXT_IAPSTA
|
|
wl_ext_iapsta_update_iftype(ndev, netinfo->ifidx, wl_iftype);
|
|
#endif
|
|
|
|
fail:
|
|
if (err) {
|
|
wl_flush_fw_log_buffer(ndev, FW_LOGSET_MASK_ALL);
|
|
}
|
|
mutex_unlock(&cfg->if_sync);
|
|
return err;
|
|
}
|
|
|
|
s32
|
|
wl_cfg80211_notify_ifadd(struct net_device *dev,
|
|
int ifidx, char *name, uint8 *mac, uint8 bssidx, uint8 role)
|
|
{
|
|
bool ifadd_expected = FALSE;
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(dev);
|
|
bool bss_pending_op = TRUE;
|
|
|
|
/* P2P may send WLC_E_IF_ADD and/or WLC_E_IF_CHANGE during IF updating ("p2p_ifupd")
|
|
* redirect the IF_ADD event to ifchange as it is not a real "new" interface
|
|
*/
|
|
if (wl_get_p2p_status(cfg, IF_CHANGING))
|
|
return wl_cfg80211_notify_ifchange(dev, ifidx, name, mac, bssidx);
|
|
|
|
/* Okay, we are expecting IF_ADD (as IF_ADDING is true) */
|
|
if (wl_get_p2p_status(cfg, IF_ADDING)) {
|
|
ifadd_expected = TRUE;
|
|
wl_clr_p2p_status(cfg, IF_ADDING);
|
|
} else if (cfg->bss_pending_op) {
|
|
ifadd_expected = TRUE;
|
|
bss_pending_op = FALSE;
|
|
}
|
|
|
|
if (ifadd_expected) {
|
|
wl_if_event_info *if_event_info = &cfg->if_event_info;
|
|
|
|
if_event_info->valid = TRUE;
|
|
if_event_info->ifidx = ifidx;
|
|
if_event_info->bssidx = bssidx;
|
|
if_event_info->role = role;
|
|
strlcpy(if_event_info->name, name, sizeof(if_event_info->name));
|
|
if_event_info->name[IFNAMSIZ - 1] = '\0';
|
|
if (mac)
|
|
memcpy(if_event_info->mac, mac, ETHER_ADDR_LEN);
|
|
|
|
/* Update bss pendig operation status */
|
|
if (!bss_pending_op) {
|
|
cfg->bss_pending_op = FALSE;
|
|
}
|
|
WL_INFORM_MEM(("IF_ADD ifidx:%d bssidx:%d role:%d\n",
|
|
ifidx, bssidx, role));
|
|
OSL_SMP_WMB();
|
|
wake_up_interruptible(&cfg->netif_change_event);
|
|
return BCME_OK;
|
|
}
|
|
|
|
return BCME_ERROR;
|
|
}
|
|
|
|
s32
|
|
wl_cfg80211_notify_ifdel(struct net_device *dev, int ifidx, char *name, uint8 *mac, uint8 bssidx)
|
|
{
|
|
bool ifdel_expected = FALSE;
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(dev);
|
|
wl_if_event_info *if_event_info = &cfg->if_event_info;
|
|
bool bss_pending_op = TRUE;
|
|
|
|
if (wl_get_p2p_status(cfg, IF_DELETING)) {
|
|
ifdel_expected = TRUE;
|
|
wl_clr_p2p_status(cfg, IF_DELETING);
|
|
} else if (cfg->bss_pending_op) {
|
|
ifdel_expected = TRUE;
|
|
bss_pending_op = FALSE;
|
|
}
|
|
|
|
if (ifdel_expected) {
|
|
if_event_info->valid = TRUE;
|
|
if_event_info->ifidx = ifidx;
|
|
if_event_info->bssidx = bssidx;
|
|
/* Update bss pendig operation status */
|
|
if (!bss_pending_op) {
|
|
cfg->bss_pending_op = FALSE;
|
|
}
|
|
WL_INFORM_MEM(("IF_DEL ifidx:%d bssidx:%d\n", ifidx, bssidx));
|
|
OSL_SMP_WMB();
|
|
wake_up_interruptible(&cfg->netif_change_event);
|
|
return BCME_OK;
|
|
}
|
|
|
|
return BCME_ERROR;
|
|
}
|
|
|
|
s32
|
|
wl_cfg80211_notify_ifchange(struct net_device * dev, int ifidx, char *name, uint8 *mac,
|
|
uint8 bssidx)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(dev);
|
|
|
|
if (wl_get_p2p_status(cfg, IF_CHANGING)) {
|
|
wl_set_p2p_status(cfg, IF_CHANGED);
|
|
OSL_SMP_WMB();
|
|
wake_up_interruptible(&cfg->netif_change_event);
|
|
return BCME_OK;
|
|
}
|
|
|
|
return BCME_ERROR;
|
|
}
|
|
|
|
static s32 wl_set_rts(struct net_device *dev, u32 rts_threshold)
|
|
{
|
|
s32 err = 0;
|
|
|
|
err = wldev_iovar_setint(dev, "rtsthresh", rts_threshold);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("Error (%d)\n", err));
|
|
return err;
|
|
}
|
|
return err;
|
|
}
|
|
|
|
static s32 wl_set_frag(struct net_device *dev, u32 frag_threshold)
|
|
{
|
|
s32 err = 0;
|
|
|
|
err = wldev_iovar_setint_bsscfg(dev, "fragthresh", frag_threshold, 0);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("Error (%d)\n", err));
|
|
return err;
|
|
}
|
|
return err;
|
|
}
|
|
|
|
static s32 wl_set_retry(struct net_device *dev, u32 retry, bool l)
|
|
{
|
|
s32 err = 0;
|
|
u32 cmd = (l ? WLC_SET_LRL : WLC_SET_SRL);
|
|
|
|
#ifdef CUSTOM_LONG_RETRY_LIMIT
|
|
if ((cmd == WLC_SET_LRL) &&
|
|
(retry != CUSTOM_LONG_RETRY_LIMIT)) {
|
|
WL_DBG(("CUSTOM_LONG_RETRY_LIMIT is used.Ignore configuration"));
|
|
return err;
|
|
}
|
|
#endif /* CUSTOM_LONG_RETRY_LIMIT */
|
|
|
|
retry = htod32(retry);
|
|
err = wldev_ioctl_set(dev, cmd, &retry, sizeof(retry));
|
|
if (unlikely(err)) {
|
|
WL_ERR(("cmd (%d) , error (%d)\n", cmd, err));
|
|
return err;
|
|
}
|
|
return err;
|
|
}
|
|
|
|
static s32 wl_cfg80211_set_wiphy_params(struct wiphy *wiphy, u32 changed)
|
|
{
|
|
struct bcm_cfg80211 *cfg = (struct bcm_cfg80211 *)wiphy_priv(wiphy);
|
|
struct net_device *ndev = bcmcfg_to_prmry_ndev(cfg);
|
|
s32 err = 0;
|
|
|
|
RETURN_EIO_IF_NOT_UP(cfg);
|
|
WL_DBG(("Enter\n"));
|
|
if (changed & WIPHY_PARAM_RTS_THRESHOLD &&
|
|
(cfg->conf->rts_threshold != wiphy->rts_threshold)) {
|
|
cfg->conf->rts_threshold = wiphy->rts_threshold;
|
|
err = wl_set_rts(ndev, cfg->conf->rts_threshold);
|
|
if (err != BCME_OK)
|
|
return err;
|
|
}
|
|
if (changed & WIPHY_PARAM_FRAG_THRESHOLD &&
|
|
(cfg->conf->frag_threshold != wiphy->frag_threshold)) {
|
|
cfg->conf->frag_threshold = wiphy->frag_threshold;
|
|
err = wl_set_frag(ndev, cfg->conf->frag_threshold);
|
|
if (err != BCME_OK)
|
|
return err;
|
|
}
|
|
if (changed & WIPHY_PARAM_RETRY_LONG &&
|
|
(cfg->conf->retry_long != wiphy->retry_long)) {
|
|
cfg->conf->retry_long = wiphy->retry_long;
|
|
err = wl_set_retry(ndev, cfg->conf->retry_long, true);
|
|
if (err != BCME_OK)
|
|
return err;
|
|
}
|
|
if (changed & WIPHY_PARAM_RETRY_SHORT &&
|
|
(cfg->conf->retry_short != wiphy->retry_short)) {
|
|
cfg->conf->retry_short = wiphy->retry_short;
|
|
err = wl_set_retry(ndev, cfg->conf->retry_short, false);
|
|
if (err != BCME_OK) {
|
|
return err;
|
|
}
|
|
}
|
|
|
|
return err;
|
|
}
|
|
static chanspec_t
|
|
channel_to_chanspec(struct wiphy *wiphy, struct net_device *dev, u32 channel, u32 bw_cap)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wiphy_priv(wiphy);
|
|
u8 *buf = NULL;
|
|
wl_uint32_list_t *list;
|
|
int err = BCME_OK;
|
|
chanspec_t c = 0, ret_c = 0;
|
|
int bw = 0, tmp_bw = 0;
|
|
int i;
|
|
u32 tmp_c;
|
|
|
|
#define LOCAL_BUF_SIZE 1024
|
|
buf = (u8 *)MALLOC(cfg->osh, LOCAL_BUF_SIZE);
|
|
if (!buf) {
|
|
WL_ERR(("buf memory alloc failed\n"));
|
|
goto exit;
|
|
}
|
|
|
|
err = wldev_iovar_getbuf_bsscfg(dev, "chanspecs", NULL,
|
|
0, buf, LOCAL_BUF_SIZE, 0, &cfg->ioctl_buf_sync);
|
|
if (err != BCME_OK) {
|
|
WL_ERR(("get chanspecs failed with %d\n", err));
|
|
goto exit;
|
|
}
|
|
|
|
list = (wl_uint32_list_t *)(void *)buf;
|
|
for (i = 0; i < dtoh32(list->count); i++) {
|
|
c = dtoh32(list->element[i]);
|
|
if (channel <= CH_MAX_2G_CHANNEL) {
|
|
if (!CHSPEC_IS20(c))
|
|
continue;
|
|
if (channel == CHSPEC_CHANNEL(c)) {
|
|
ret_c = c;
|
|
bw = 20;
|
|
goto exit;
|
|
}
|
|
}
|
|
tmp_c = wf_chspec_ctlchan(c);
|
|
tmp_bw = bw2cap[CHSPEC_BW(c) >> WL_CHANSPEC_BW_SHIFT];
|
|
if (tmp_c != channel)
|
|
continue;
|
|
|
|
if ((tmp_bw > bw) && (tmp_bw <= bw_cap)) {
|
|
bw = tmp_bw;
|
|
ret_c = c;
|
|
if (bw == bw_cap)
|
|
goto exit;
|
|
}
|
|
}
|
|
exit:
|
|
if (buf) {
|
|
MFREE(cfg->osh, buf, LOCAL_BUF_SIZE);
|
|
}
|
|
#undef LOCAL_BUF_SIZE
|
|
WL_DBG(("return chanspec %x %d\n", ret_c, bw));
|
|
return ret_c;
|
|
}
|
|
|
|
void
|
|
wl_cfg80211_ibss_vsie_set_buffer(struct net_device *dev, vndr_ie_setbuf_t *ibss_vsie,
|
|
int ibss_vsie_len)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(dev);
|
|
|
|
if (cfg != NULL && ibss_vsie != NULL) {
|
|
if (cfg->ibss_vsie != NULL) {
|
|
MFREE(cfg->osh, cfg->ibss_vsie, cfg->ibss_vsie_len);
|
|
}
|
|
cfg->ibss_vsie = ibss_vsie;
|
|
cfg->ibss_vsie_len = ibss_vsie_len;
|
|
}
|
|
}
|
|
|
|
static void
|
|
wl_cfg80211_ibss_vsie_free(struct bcm_cfg80211 *cfg)
|
|
{
|
|
/* free & initiralize VSIE (Vendor Specific IE) */
|
|
if (cfg->ibss_vsie != NULL) {
|
|
MFREE(cfg->osh, cfg->ibss_vsie, cfg->ibss_vsie_len);
|
|
cfg->ibss_vsie_len = 0;
|
|
}
|
|
}
|
|
|
|
s32
|
|
wl_cfg80211_ibss_vsie_delete(struct net_device *dev)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(dev);
|
|
char *ioctl_buf = NULL;
|
|
s32 ret = BCME_OK, bssidx;
|
|
|
|
if (cfg != NULL && cfg->ibss_vsie != NULL) {
|
|
ioctl_buf = (char *)MALLOC(cfg->osh, WLC_IOCTL_MEDLEN);
|
|
if (!ioctl_buf) {
|
|
WL_ERR(("ioctl memory alloc failed\n"));
|
|
return -ENOMEM;
|
|
}
|
|
if ((bssidx = wl_get_bssidx_by_wdev(cfg, dev->ieee80211_ptr)) < 0) {
|
|
WL_ERR(("Find index failed\n"));
|
|
ret = BCME_ERROR;
|
|
goto end;
|
|
}
|
|
/* change the command from "add" to "del" */
|
|
strlcpy(cfg->ibss_vsie->cmd, "del", sizeof(cfg->ibss_vsie->cmd));
|
|
|
|
ret = wldev_iovar_setbuf_bsscfg(dev, "vndr_ie",
|
|
cfg->ibss_vsie, cfg->ibss_vsie_len,
|
|
ioctl_buf, WLC_IOCTL_MEDLEN, bssidx, NULL);
|
|
WL_ERR(("ret=%d\n", ret));
|
|
|
|
if (ret == BCME_OK) {
|
|
/* Free & initialize VSIE */
|
|
MFREE(cfg->osh, cfg->ibss_vsie, cfg->ibss_vsie_len);
|
|
cfg->ibss_vsie_len = 0;
|
|
}
|
|
end:
|
|
if (ioctl_buf) {
|
|
MFREE(cfg->osh, ioctl_buf, WLC_IOCTL_MEDLEN);
|
|
}
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
#ifdef WLAIBSS_MCHAN
|
|
static bcm_struct_cfgdev*
|
|
bcm_cfg80211_add_ibss_if(struct wiphy *wiphy, char *name)
|
|
{
|
|
int err = 0;
|
|
struct bcm_cfg80211 *cfg = wiphy_priv(wiphy);
|
|
struct wireless_dev* wdev = NULL;
|
|
struct net_device *new_ndev = NULL;
|
|
struct net_device *primary_ndev = NULL;
|
|
long timeout;
|
|
wl_aibss_if_t aibss_if;
|
|
wl_if_event_info *event = NULL;
|
|
|
|
if (cfg->ibss_cfgdev != NULL) {
|
|
WL_ERR(("IBSS interface %s already exists\n", name));
|
|
return NULL;
|
|
}
|
|
|
|
WL_ERR(("Try to create IBSS interface %s\n", name));
|
|
primary_ndev = bcmcfg_to_prmry_ndev(cfg);
|
|
/* generate a new MAC address for the IBSS interface */
|
|
get_primary_mac(cfg, &cfg->ibss_if_addr);
|
|
cfg->ibss_if_addr.octet[4] ^= 0x40;
|
|
bzero(&aibss_if, sizeof(aibss_if));
|
|
memcpy(&aibss_if.addr, &cfg->ibss_if_addr, sizeof(aibss_if.addr));
|
|
aibss_if.chspec = 0;
|
|
aibss_if.len = sizeof(aibss_if);
|
|
|
|
cfg->bss_pending_op = TRUE;
|
|
bzero(&cfg->if_event_info, sizeof(cfg->if_event_info));
|
|
err = wldev_iovar_setbuf(primary_ndev, "aibss_ifadd", &aibss_if,
|
|
sizeof(aibss_if), cfg->ioctl_buf, WLC_IOCTL_MAXLEN, &cfg->ioctl_buf_sync);
|
|
if (err) {
|
|
WL_ERR(("IOVAR aibss_ifadd failed with error %d\n", err));
|
|
goto fail;
|
|
}
|
|
timeout = wait_event_interruptible_timeout(cfg->netif_change_event,
|
|
!cfg->bss_pending_op, msecs_to_jiffies(MAX_WAIT_TIME));
|
|
if (timeout <= 0 || cfg->bss_pending_op)
|
|
goto fail;
|
|
|
|
event = &cfg->if_event_info;
|
|
/* By calling wl_cfg80211_allocate_if (dhd_allocate_if eventually) we give the control
|
|
* over this net_device interface to dhd_linux, hence the interface is managed by dhd_liux
|
|
* and will be freed by dhd_detach unless it gets unregistered before that. The
|
|
* wireless_dev instance new_ndev->ieee80211_ptr associated with this net_device will
|
|
* be freed by wl_dealloc_netinfo
|
|
*/
|
|
new_ndev = wl_cfg80211_allocate_if(cfg, event->ifidx, event->name,
|
|
event->mac, event->bssidx, event->name);
|
|
if (new_ndev == NULL)
|
|
goto fail;
|
|
wdev = (struct wireless_dev *)MALLOCZ(cfg->osh, sizeof(*wdev));
|
|
if (wdev == NULL)
|
|
goto fail;
|
|
wdev->wiphy = wiphy;
|
|
wdev->iftype = NL80211_IFTYPE_ADHOC;
|
|
wdev->netdev = new_ndev;
|
|
new_ndev->ieee80211_ptr = wdev;
|
|
SET_NETDEV_DEV(new_ndev, wiphy_dev(wdev->wiphy));
|
|
|
|
/* rtnl lock must have been acquired, if this is not the case, wl_cfg80211_register_if
|
|
* needs to be modified to take one parameter (bool need_rtnl_lock)
|
|
*/
|
|
ASSERT_RTNL();
|
|
if (wl_cfg80211_register_if(cfg, event->ifidx, new_ndev, FALSE) != BCME_OK)
|
|
goto fail;
|
|
|
|
wl_alloc_netinfo(cfg, new_ndev, wdev, WL_IF_TYPE_IBSS,
|
|
PM_ENABLE, event->bssidx, event->ifidx);
|
|
cfg->ibss_cfgdev = ndev_to_cfgdev(new_ndev);
|
|
WL_ERR(("IBSS interface %s created\n", new_ndev->name));
|
|
return cfg->ibss_cfgdev;
|
|
|
|
fail:
|
|
WL_ERR(("failed to create IBSS interface %s \n", name));
|
|
cfg->bss_pending_op = FALSE;
|
|
if (new_ndev)
|
|
wl_cfg80211_remove_if(cfg, event->ifidx, new_ndev, FALSE);
|
|
if (wdev) {
|
|
MFREE(cfg->osh, wdev, sizeof(*wdev));
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
static s32
|
|
bcm_cfg80211_del_ibss_if(struct wiphy *wiphy, bcm_struct_cfgdev *cfgdev)
|
|
{
|
|
int err = 0;
|
|
struct bcm_cfg80211 *cfg = wiphy_priv(wiphy);
|
|
struct net_device *ndev = NULL;
|
|
struct net_device *primary_ndev = NULL;
|
|
long timeout;
|
|
|
|
if (!cfgdev || cfg->ibss_cfgdev != cfgdev || ETHER_ISNULLADDR(&cfg->ibss_if_addr.octet))
|
|
return -EINVAL;
|
|
ndev = (struct net_device *)cfgdev_to_ndev(cfg->ibss_cfgdev);
|
|
primary_ndev = bcmcfg_to_prmry_ndev(cfg);
|
|
|
|
cfg->bss_pending_op = TRUE;
|
|
bzero(&cfg->if_event_info, sizeof(cfg->if_event_info));
|
|
err = wldev_iovar_setbuf(primary_ndev, "aibss_ifdel", &cfg->ibss_if_addr,
|
|
sizeof(cfg->ibss_if_addr), cfg->ioctl_buf, WLC_IOCTL_MAXLEN, &cfg->ioctl_buf_sync);
|
|
if (err) {
|
|
WL_ERR(("IOVAR aibss_ifdel failed with error %d\n", err));
|
|
goto fail;
|
|
}
|
|
timeout = wait_event_interruptible_timeout(cfg->netif_change_event,
|
|
!cfg->bss_pending_op, msecs_to_jiffies(MAX_WAIT_TIME));
|
|
if (timeout <= 0 || cfg->bss_pending_op) {
|
|
WL_ERR(("timeout in waiting IF_DEL event\n"));
|
|
goto fail;
|
|
}
|
|
|
|
wl_cfg80211_remove_if(cfg, cfg->if_event_info.ifidx, ndev, FALSE);
|
|
cfg->ibss_cfgdev = NULL;
|
|
return 0;
|
|
|
|
fail:
|
|
cfg->bss_pending_op = FALSE;
|
|
return -1;
|
|
}
|
|
#endif /* WLAIBSS_MCHAN */
|
|
|
|
s32
|
|
wl_cfg80211_to_fw_iftype(wl_iftype_t iftype)
|
|
{
|
|
s32 ret = BCME_ERROR;
|
|
|
|
switch (iftype) {
|
|
case WL_IF_TYPE_AP:
|
|
ret = WL_INTERFACE_TYPE_AP;
|
|
break;
|
|
case WL_IF_TYPE_STA:
|
|
ret = WL_INTERFACE_TYPE_STA;
|
|
break;
|
|
case WL_IF_TYPE_NAN_NMI:
|
|
case WL_IF_TYPE_NAN:
|
|
ret = WL_INTERFACE_TYPE_NAN;
|
|
break;
|
|
case WL_IF_TYPE_P2P_DISC:
|
|
ret = WL_INTERFACE_TYPE_P2P_DISC;
|
|
break;
|
|
case WL_IF_TYPE_P2P_GO:
|
|
ret = WL_INTERFACE_TYPE_P2P_GO;
|
|
break;
|
|
case WL_IF_TYPE_P2P_GC:
|
|
ret = WL_INTERFACE_TYPE_P2P_GC;
|
|
break;
|
|
|
|
default:
|
|
WL_ERR(("Unsupported type:%d \n", iftype));
|
|
ret = -EINVAL;
|
|
break;
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
bool
|
|
wl_legacy_chip_check(struct bcm_cfg80211 *cfg)
|
|
{
|
|
dhd_pub_t *dhd = (dhd_pub_t *)(cfg->pub);
|
|
uint chip;
|
|
|
|
chip = dhd_conf_get_chip(dhd);
|
|
|
|
if (chip == BCM43362_CHIP_ID || chip == BCM4330_CHIP_ID ||
|
|
chip == BCM43430_CHIP_ID || chip == BCM43012_CHIP_ID ||
|
|
chip == BCM4334_CHIP_ID || chip == BCM43340_CHIP_ID ||
|
|
chip == BCM43341_CHIP_ID || chip == BCM4324_CHIP_ID ||
|
|
chip == BCM4335_CHIP_ID || chip == BCM4339_CHIP_ID ||
|
|
chip == BCM4345_CHIP_ID || chip == BCM43454_CHIP_ID ||
|
|
chip == BCM4354_CHIP_ID || chip == BCM4356_CHIP_ID ||
|
|
chip == BCM4371_CHIP_ID || chip == BCM4359_CHIP_ID ||
|
|
chip == BCM43143_CHIP_ID || chip == BCM43242_CHIP_ID ||
|
|
chip == BCM43569_CHIP_ID) {
|
|
return true;
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
s32
|
|
wl_cfg80211_interface_ops(struct bcm_cfg80211 *cfg,
|
|
struct net_device *ndev, s32 bsscfg_idx,
|
|
wl_iftype_t cfg_iftype, s32 del, u8 *addr)
|
|
{
|
|
s32 ret;
|
|
struct wl_interface_create_v2 iface;
|
|
wl_interface_create_v3_t iface_v3;
|
|
wl_interface_create_t iface_v0;
|
|
struct wl_interface_info_v1 *info;
|
|
wl_interface_info_v2_t *info_v2;
|
|
wl_interface_info_t *info_v0;
|
|
uint32 ifflags = 0;
|
|
bool use_iface_info_v2 = false;
|
|
u8 ioctl_buf[WLC_IOCTL_SMLEN];
|
|
s32 iftype;
|
|
|
|
if (del) {
|
|
ret = wldev_iovar_setbuf(ndev, "interface_remove",
|
|
NULL, 0, ioctl_buf, sizeof(ioctl_buf), NULL);
|
|
if (unlikely(ret))
|
|
WL_ERR(("Interface remove failed!! ret %d\n", ret));
|
|
return ret;
|
|
}
|
|
|
|
/* Interface create */
|
|
bzero(&iface, sizeof(iface));
|
|
/*
|
|
* flags field is still used along with iftype inorder to support the old version of the
|
|
* FW work with the latest app changes.
|
|
*/
|
|
|
|
iftype = wl_cfg80211_to_fw_iftype(cfg_iftype);
|
|
if (iftype < 0) {
|
|
return -ENOTSUPP;
|
|
}
|
|
|
|
if (addr) {
|
|
ifflags |= WL_INTERFACE_MAC_USE;
|
|
}
|
|
|
|
/* Pass ver = 0 for fetching the interface_create iovar version */
|
|
if (wl_legacy_chip_check(cfg)) {
|
|
bzero(&iface_v0, sizeof(iface_v0));
|
|
iface_v0.ver = WL_INTERFACE_CREATE_VER;
|
|
iface_v0.flags = iftype | ifflags;
|
|
if (addr) {
|
|
memcpy(&iface_v0.mac_addr.octet, addr, ETH_ALEN);
|
|
}
|
|
ret = wldev_iovar_getbuf(ndev, "interface_create",
|
|
&iface_v0, sizeof(struct wl_interface_create),
|
|
ioctl_buf, sizeof(ioctl_buf), NULL);
|
|
if (ret == 0) {
|
|
info_v0 = (wl_interface_info_t *)ioctl_buf;
|
|
ret = info_v0->bsscfgidx;
|
|
goto exit;
|
|
}
|
|
} else {
|
|
ret = wldev_iovar_getbuf(ndev, "interface_create",
|
|
&iface, sizeof(struct wl_interface_create_v2),
|
|
ioctl_buf, sizeof(ioctl_buf), NULL);
|
|
}
|
|
if (ret == BCME_UNSUPPORTED) {
|
|
WL_ERR(("interface_create iovar not supported\n"));
|
|
return ret;
|
|
} else if ((ret == 0) && *((uint32 *)ioctl_buf) == WL_INTERFACE_CREATE_VER_3) {
|
|
WL_DBG(("interface_create version 3. flags:0x%x \n", ifflags));
|
|
use_iface_info_v2 = true;
|
|
bzero(&iface_v3, sizeof(wl_interface_create_v3_t));
|
|
iface_v3.ver = WL_INTERFACE_CREATE_VER_3;
|
|
iface_v3.iftype = iftype;
|
|
iface_v3.flags = ifflags;
|
|
if (addr) {
|
|
memcpy(&iface_v3.mac_addr.octet, addr, ETH_ALEN);
|
|
}
|
|
ret = wldev_iovar_getbuf(ndev, "interface_create",
|
|
&iface_v3, sizeof(wl_interface_create_v3_t),
|
|
ioctl_buf, sizeof(ioctl_buf), NULL);
|
|
} else {
|
|
/* On any other error, attempt with iovar version 2 */
|
|
WL_DBG(("interface_create version 2. get_ver:%d ifflags:0x%x\n", ret, ifflags));
|
|
iface.ver = WL_INTERFACE_CREATE_VER_2;
|
|
iface.iftype = iftype;
|
|
iface.flags = ifflags;
|
|
if (addr) {
|
|
memcpy(&iface.mac_addr.octet, addr, ETH_ALEN);
|
|
}
|
|
ret = wldev_iovar_getbuf(ndev, "interface_create",
|
|
&iface, sizeof(struct wl_interface_create_v2),
|
|
ioctl_buf, sizeof(ioctl_buf), NULL);
|
|
}
|
|
|
|
if (unlikely(ret)) {
|
|
WL_ERR(("Interface create failed!! ret %d\n", ret));
|
|
return ret;
|
|
}
|
|
|
|
/* success case */
|
|
if (use_iface_info_v2 == true) {
|
|
info_v2 = (wl_interface_info_v2_t *)ioctl_buf;
|
|
ret = info_v2->bsscfgidx;
|
|
} else {
|
|
/* Use v1 struct */
|
|
info = (struct wl_interface_info_v1 *)ioctl_buf;
|
|
ret = info->bsscfgidx;
|
|
}
|
|
|
|
exit:
|
|
WL_DBG(("wl interface create success!! bssidx:%d \n", ret));
|
|
return ret;
|
|
}
|
|
|
|
s32
|
|
wl_cfg80211_add_del_bss(struct bcm_cfg80211 *cfg,
|
|
struct net_device *ndev, s32 bsscfg_idx,
|
|
wl_iftype_t brcm_iftype, s32 del, u8 *addr)
|
|
{
|
|
s32 ret = BCME_OK;
|
|
s32 val = 0;
|
|
|
|
struct {
|
|
s32 cfg;
|
|
s32 val;
|
|
struct ether_addr ea;
|
|
} bss_setbuf;
|
|
|
|
WL_DBG(("wl_iftype:%d del:%d \n", brcm_iftype, del));
|
|
|
|
bzero(&bss_setbuf, sizeof(bss_setbuf));
|
|
|
|
/* AP=2, STA=3, up=1, down=0, val=-1 */
|
|
if (del) {
|
|
val = WLC_AP_IOV_OP_DELETE;
|
|
} else if (brcm_iftype == WL_IF_TYPE_AP) {
|
|
/* Add/role change to AP Interface */
|
|
WL_DBG(("Adding AP Interface \n"));
|
|
val = WLC_AP_IOV_OP_MANUAL_AP_BSSCFG_CREATE;
|
|
} else if (brcm_iftype == WL_IF_TYPE_STA) {
|
|
/* Add/role change to STA Interface */
|
|
WL_DBG(("Adding STA Interface \n"));
|
|
val = WLC_AP_IOV_OP_MANUAL_STA_BSSCFG_CREATE;
|
|
} else {
|
|
WL_ERR((" add_del_bss NOT supported for IFACE type:0x%x", brcm_iftype));
|
|
return -EINVAL;
|
|
}
|
|
|
|
if (!del) {
|
|
wl_ext_bss_iovar_war(ndev, &val);
|
|
}
|
|
|
|
bss_setbuf.cfg = htod32(bsscfg_idx);
|
|
bss_setbuf.val = htod32(val);
|
|
|
|
if (addr) {
|
|
memcpy(&bss_setbuf.ea.octet, addr, ETH_ALEN);
|
|
}
|
|
|
|
WL_MSG(ndev->name, "wl bss %d bssidx:%d\n", val, bsscfg_idx);
|
|
ret = wldev_iovar_setbuf(ndev, "bss", &bss_setbuf, sizeof(bss_setbuf),
|
|
cfg->ioctl_buf, WLC_IOCTL_MAXLEN, &cfg->ioctl_buf_sync);
|
|
if (ret != 0)
|
|
WL_ERR(("'bss %d' failed with %d\n", val, ret));
|
|
|
|
return ret;
|
|
}
|
|
|
|
s32
|
|
wl_cfg80211_bss_up(struct bcm_cfg80211 *cfg, struct net_device *ndev, s32 bsscfg_idx, s32 bss_up)
|
|
{
|
|
s32 ret = BCME_OK;
|
|
s32 val = bss_up ? 1 : 0;
|
|
|
|
struct {
|
|
s32 cfg;
|
|
s32 val;
|
|
} bss_setbuf;
|
|
|
|
bss_setbuf.cfg = htod32(bsscfg_idx);
|
|
bss_setbuf.val = htod32(val);
|
|
|
|
WL_INFORM_MEM(("wl bss -C %d %s\n", bsscfg_idx, bss_up ? "up" : "down"));
|
|
ret = wldev_iovar_setbuf(ndev, "bss", &bss_setbuf, sizeof(bss_setbuf),
|
|
cfg->ioctl_buf, WLC_IOCTL_MAXLEN, &cfg->ioctl_buf_sync);
|
|
|
|
if (ret != 0) {
|
|
WL_ERR(("'bss %d' failed with %d\n", bss_up, ret));
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
bool
|
|
wl_cfg80211_bss_isup(struct net_device *ndev, int bsscfg_idx)
|
|
{
|
|
s32 result, val;
|
|
bool isup = false;
|
|
s8 getbuf[64];
|
|
|
|
/* Check if the BSS is up */
|
|
*(int*)getbuf = -1;
|
|
result = wldev_iovar_getbuf_bsscfg(ndev, "bss", &bsscfg_idx,
|
|
sizeof(bsscfg_idx), getbuf, sizeof(getbuf), 0, NULL);
|
|
if (result != 0) {
|
|
WL_ERR(("'cfg bss -C %d' failed: %d\n", bsscfg_idx, result));
|
|
WL_ERR(("NOTE: this ioctl error is normal "
|
|
"when the BSS has not been created yet.\n"));
|
|
} else {
|
|
val = *(int*)getbuf;
|
|
val = dtoh32(val);
|
|
WL_DBG(("wl bss -C %d = %d\n", bsscfg_idx, val));
|
|
isup = (val ? TRUE : FALSE);
|
|
}
|
|
return isup;
|
|
}
|
|
|
|
s32
|
|
wl_iftype_to_mode(wl_iftype_t iftype)
|
|
{
|
|
s32 mode = BCME_ERROR;
|
|
|
|
switch (iftype) {
|
|
case WL_IF_TYPE_STA:
|
|
case WL_IF_TYPE_P2P_GC:
|
|
case WL_IF_TYPE_P2P_DISC:
|
|
mode = WL_MODE_BSS;
|
|
break;
|
|
case WL_IF_TYPE_AP:
|
|
case WL_IF_TYPE_P2P_GO:
|
|
mode = WL_MODE_AP;
|
|
break;
|
|
case WL_IF_TYPE_NAN:
|
|
mode = WL_MODE_NAN;
|
|
break;
|
|
case WL_IF_TYPE_AIBSS:
|
|
/* Intentional fall through */
|
|
case WL_IF_TYPE_IBSS:
|
|
mode = WL_MODE_IBSS;
|
|
break;
|
|
#ifdef WLMESH_CFG80211
|
|
case WL_IF_TYPE_MESH:
|
|
mode = WL_MODE_MESH;
|
|
break;
|
|
#endif /* WLMESH_CFG80211 */
|
|
default:
|
|
WL_ERR(("Unsupported type:%d\n", iftype));
|
|
break;
|
|
}
|
|
return mode;
|
|
}
|
|
|
|
s32
|
|
cfg80211_to_wl_iftype(uint16 type, uint16 *role, uint16 *mode)
|
|
{
|
|
switch (type) {
|
|
case NL80211_IFTYPE_STATION:
|
|
*role = WL_IF_TYPE_STA;
|
|
*mode = WL_MODE_BSS;
|
|
break;
|
|
case NL80211_IFTYPE_AP:
|
|
*role = WL_IF_TYPE_AP;
|
|
*mode = WL_MODE_AP;
|
|
break;
|
|
#ifdef WL_CFG80211_P2P_DEV_IF
|
|
case NL80211_IFTYPE_P2P_DEVICE:
|
|
*role = WL_IF_TYPE_P2P_DISC;
|
|
*mode = WL_MODE_BSS;
|
|
break;
|
|
#endif /* WL_CFG80211_P2P_DEV_IF */
|
|
case NL80211_IFTYPE_P2P_GO:
|
|
*role = WL_IF_TYPE_P2P_GO;
|
|
*mode = WL_MODE_AP;
|
|
break;
|
|
case NL80211_IFTYPE_P2P_CLIENT:
|
|
*role = WL_IF_TYPE_P2P_GC;
|
|
*mode = WL_MODE_BSS;
|
|
break;
|
|
case NL80211_IFTYPE_MONITOR:
|
|
WL_ERR(("Unsupported mode \n"));
|
|
return BCME_UNSUPPORTED;
|
|
case NL80211_IFTYPE_ADHOC:
|
|
*role = WL_IF_TYPE_IBSS;
|
|
*mode = WL_MODE_IBSS;
|
|
break;
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(4, 9, 0))
|
|
case NL80211_IFTYPE_NAN:
|
|
*role = WL_IF_TYPE_NAN;
|
|
*mode = WL_MODE_NAN;
|
|
break;
|
|
#endif // endif
|
|
#ifdef WLMESH_CFG80211
|
|
case NL80211_IFTYPE_MESH_POINT:
|
|
*role = WLC_E_IF_ROLE_AP;
|
|
*mode = WL_MODE_MESH;
|
|
break;
|
|
#endif /* WLMESH_CFG80211 */
|
|
default:
|
|
WL_ERR(("Unknown interface type:0x%x\n", type));
|
|
return BCME_ERROR;
|
|
}
|
|
return BCME_OK;
|
|
}
|
|
|
|
static s32
|
|
wl_role_to_cfg80211_type(uint16 role, uint16 *wl_iftype, uint16 *mode)
|
|
{
|
|
switch (role) {
|
|
case WLC_E_IF_ROLE_STA:
|
|
*wl_iftype = WL_IF_TYPE_STA;
|
|
*mode = WL_MODE_BSS;
|
|
return NL80211_IFTYPE_STATION;
|
|
case WLC_E_IF_ROLE_AP:
|
|
*wl_iftype = WL_IF_TYPE_AP;
|
|
*mode = WL_MODE_AP;
|
|
return NL80211_IFTYPE_AP;
|
|
case WLC_E_IF_ROLE_P2P_GO:
|
|
*wl_iftype = WL_IF_TYPE_P2P_GO;
|
|
*mode = WL_MODE_AP;
|
|
return NL80211_IFTYPE_P2P_GO;
|
|
case WLC_E_IF_ROLE_P2P_CLIENT:
|
|
*wl_iftype = WL_IF_TYPE_P2P_GC;
|
|
*mode = WL_MODE_BSS;
|
|
return NL80211_IFTYPE_P2P_CLIENT;
|
|
case WLC_E_IF_ROLE_IBSS:
|
|
*wl_iftype = WL_IF_TYPE_IBSS;
|
|
*mode = WL_MODE_IBSS;
|
|
return NL80211_IFTYPE_ADHOC;
|
|
case WLC_E_IF_ROLE_NAN:
|
|
*wl_iftype = WL_IF_TYPE_NAN;
|
|
*mode = WL_MODE_NAN;
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(4, 9, 0)) && defined(WL_CFG80211_NAN)
|
|
/* NL80211_IFTYPE_NAN should only be used with CFG80211 NAN MGMT
|
|
* For Vendor HAL based NAN implementation, continue advertising
|
|
* as a STA interface
|
|
*/
|
|
return NL80211_IFTYPE_NAN;
|
|
#else
|
|
return NL80211_IFTYPE_STATION;
|
|
#endif /* ((LINUX_VER >= KERNEL_VERSION(4, 9, 0))) && WL_CFG80211_NAN */
|
|
#ifdef WLDWDS
|
|
case WLC_E_IF_ROLE_WDS:
|
|
*wl_iftype = WL_IF_TYPE_AP;
|
|
*mode = WL_MODE_AP;
|
|
return NL80211_IFTYPE_AP;
|
|
#endif
|
|
#ifdef WLMESH_CFG80211
|
|
case WLC_E_IF_ROLE_MESH:
|
|
*wl_iftype = WL_IF_TYPE_MESH;
|
|
*mode = WL_MODE_MESH;
|
|
return NL80211_IFTYPE_MESH_POINT;
|
|
#endif /* WLMESH_CFG80211 */
|
|
|
|
default:
|
|
WL_ERR(("Unknown interface role:0x%x. Forcing type station\n", role));
|
|
return BCME_ERROR;
|
|
}
|
|
}
|
|
|
|
struct net_device *
|
|
wl_cfg80211_post_ifcreate(struct net_device *ndev,
|
|
wl_if_event_info *event, u8 *addr,
|
|
const char *name, bool rtnl_lock_reqd)
|
|
{
|
|
struct bcm_cfg80211 *cfg;
|
|
struct net_device *primary_ndev;
|
|
struct net_device *new_ndev = NULL;
|
|
struct wireless_dev *wdev = NULL;
|
|
s32 iface_type;
|
|
s32 ret = BCME_OK;
|
|
u16 mode;
|
|
u8 mac_addr[ETH_ALEN];
|
|
u16 wl_iftype;
|
|
|
|
if (!ndev || !event) {
|
|
WL_ERR(("Wrong arg\n"));
|
|
return NULL;
|
|
}
|
|
|
|
cfg = wl_get_cfg(ndev);
|
|
if (!cfg) {
|
|
WL_ERR(("cfg null\n"));
|
|
return NULL;
|
|
}
|
|
|
|
WL_DBG(("Enter. role:%d ifidx:%d bssidx:%d\n",
|
|
event->role, event->ifidx, event->bssidx));
|
|
if (!event->ifidx || !event->bssidx) {
|
|
/* Fw returned primary idx (0) for virtual interface */
|
|
WL_ERR(("Wrong index. ifidx:%d bssidx:%d \n",
|
|
event->ifidx, event->bssidx));
|
|
return NULL;
|
|
}
|
|
|
|
#if defined(WLMESH_CFG80211) && defined(WL_EXT_IAPSTA)
|
|
if (wl_ext_iapsta_mesh_creating(ndev)) {
|
|
event->role = WLC_E_IF_ROLE_MESH;
|
|
WL_MSG(ndev->name, "change role to WLC_E_IF_ROLE_MESH\n");
|
|
}
|
|
#endif /* WLMESH_CFG80211 && WL_EXT_IAPSTA */
|
|
|
|
iface_type = wl_role_to_cfg80211_type(event->role, &wl_iftype, &mode);
|
|
if (iface_type < 0) {
|
|
/* Unknown iface type */
|
|
WL_ERR(("Wrong iface type \n"));
|
|
return NULL;
|
|
}
|
|
|
|
WL_DBG(("mac_ptr:%p name:%s role:%d nl80211_iftype:%d " MACDBG "\n",
|
|
addr, name, event->role, iface_type, MAC2STRDBG(event->mac)));
|
|
if (!name) {
|
|
/* If iface name is not provided, use dongle ifname */
|
|
name = event->name;
|
|
}
|
|
|
|
if (!addr) {
|
|
/* If mac address is not set, use primary mac with locally administered
|
|
* bit set.
|
|
*/
|
|
primary_ndev = bcmcfg_to_prmry_ndev(cfg);
|
|
memcpy(mac_addr, primary_ndev->dev_addr, ETH_ALEN);
|
|
/* For customer6 builds, use primary mac address for virtual interface */
|
|
mac_addr[0] |= 0x02;
|
|
addr = mac_addr;
|
|
}
|
|
|
|
#ifdef WL_STATIC_IF
|
|
if (IS_CFG80211_STATIC_IF_NAME(cfg, name)) {
|
|
new_ndev = wl_cfg80211_post_static_ifcreate(cfg, event, addr, iface_type);
|
|
if (!new_ndev) {
|
|
WL_ERR(("failed to get I/F pointer\n"));
|
|
return NULL;
|
|
}
|
|
wdev = new_ndev->ieee80211_ptr;
|
|
} else
|
|
#endif /* WL_STATIC_IF */
|
|
{
|
|
new_ndev = wl_cfg80211_allocate_if(cfg, event->ifidx,
|
|
name, addr, event->bssidx, event->name);
|
|
if (!new_ndev) {
|
|
WL_ERR(("I/F allocation failed! \n"));
|
|
return NULL;
|
|
} else {
|
|
WL_DBG(("I/F allocation succeeded! ifidx:0x%x bssidx:0x%x \n",
|
|
event->ifidx, event->bssidx));
|
|
}
|
|
|
|
wdev = (struct wireless_dev *)MALLOCZ(cfg->osh, sizeof(*wdev));
|
|
if (!wdev) {
|
|
WL_ERR(("wireless_dev alloc failed! \n"));
|
|
wl_cfg80211_remove_if(cfg, event->ifidx, new_ndev, rtnl_lock_reqd);
|
|
return NULL;
|
|
}
|
|
|
|
wdev->wiphy = bcmcfg_to_wiphy(cfg);
|
|
wdev->iftype = iface_type;
|
|
|
|
new_ndev->ieee80211_ptr = wdev;
|
|
#ifdef WLDWDS
|
|
/* set wds0.x to 4addr interface here */
|
|
if (event->role == WLC_E_IF_ROLE_WDS) {
|
|
printf("\n\n\n event->role == WLC_E_IF_ROLE_WDS, set vwdev 4addr to %s\n", event->name);
|
|
wdev->use_4addr = true;
|
|
}
|
|
#endif /* WLDWDS */
|
|
SET_NETDEV_DEV(new_ndev, wiphy_dev(wdev->wiphy));
|
|
|
|
memcpy(new_ndev->dev_addr, addr, ETH_ALEN);
|
|
#ifdef WL_EXT_IAPSTA
|
|
wl_ext_iapsta_ifadding(new_ndev, event->ifidx);
|
|
#endif /* WL_EXT_IAPSTA */
|
|
if (wl_cfg80211_register_if(cfg, event->ifidx, new_ndev, rtnl_lock_reqd)
|
|
!= BCME_OK) {
|
|
WL_ERR(("IFACE register failed \n"));
|
|
/* Post interface registration, wdev would be freed from the netdev
|
|
* destructor path. For other cases, handle it here.
|
|
*/
|
|
MFREE(cfg->osh, wdev, sizeof(*wdev));
|
|
wl_cfg80211_remove_if(cfg, event->ifidx, new_ndev, rtnl_lock_reqd);
|
|
return NULL;
|
|
}
|
|
}
|
|
|
|
/* Initialize with the station mode params */
|
|
ret = wl_alloc_netinfo(cfg, new_ndev, wdev, wl_iftype,
|
|
PM_ENABLE, event->bssidx, event->ifidx);
|
|
if (unlikely(ret)) {
|
|
WL_ERR(("wl_alloc_netinfo Error (%d)\n", ret));
|
|
goto fail;
|
|
}
|
|
|
|
/* Apply the mode & infra setting based on iftype */
|
|
if ((ret = wl_config_infra(cfg, new_ndev, wl_iftype)) < 0) {
|
|
WL_ERR(("config ifmode failure (%d)\n", ret));
|
|
goto fail;
|
|
}
|
|
|
|
if (mode == WL_MODE_AP) {
|
|
wl_set_drv_status(cfg, AP_CREATING, new_ndev);
|
|
}
|
|
#ifdef WL_EXT_IAPSTA
|
|
wl_ext_iapsta_update_iftype(new_ndev, event->ifidx, wl_iftype);
|
|
#endif
|
|
|
|
WL_INFORM_MEM(("Network Interface (%s) registered with host."
|
|
" cfg_iftype:%d wl_role:%d " MACDBG "\n",
|
|
new_ndev->name, iface_type, event->role, MAC2STRDBG(new_ndev->dev_addr)));
|
|
|
|
#ifdef SUPPORT_SET_CAC
|
|
wl_cfg80211_set_cac(cfg, 0);
|
|
#endif /* SUPPORT_SET_CAC */
|
|
|
|
return new_ndev;
|
|
|
|
fail:
|
|
#ifdef WL_STATIC_IF
|
|
/* remove static if from iflist */
|
|
if (IS_CFG80211_STATIC_IF_NAME(cfg, name)) {
|
|
cfg->static_ndev_state = NDEV_STATE_FW_IF_FAILED;
|
|
wl_cfg80211_update_iflist_info(cfg, new_ndev, WL_STATIC_IFIDX, addr,
|
|
event->bssidx, event->name, NDEV_STATE_FW_IF_FAILED);
|
|
}
|
|
#endif /* WL_STATIC_IF */
|
|
if (new_ndev) {
|
|
/* wdev would be freed from netdev destructor call back */
|
|
wl_cfg80211_remove_if(cfg, event->ifidx, new_ndev, rtnl_lock_reqd);
|
|
}
|
|
|
|
return NULL;
|
|
}
|
|
|
|
s32
|
|
wl_cfg80211_delete_iface(struct bcm_cfg80211 *cfg,
|
|
wl_iftype_t sec_data_if_type)
|
|
{
|
|
struct net_info *iter, *next;
|
|
struct net_device *primary_ndev;
|
|
s32 ret = BCME_OK;
|
|
uint8 i = 0;
|
|
|
|
BCM_REFERENCE(i);
|
|
BCM_REFERENCE(ret);
|
|
|
|
/* Note: This function will clean up only the network interface and host
|
|
* data structures. The firmware interface clean up will happen in the
|
|
* during chip reset (ifconfig wlan0 down for built-in drivers/rmmod
|
|
* context for the module case).
|
|
*/
|
|
primary_ndev = bcmcfg_to_prmry_ndev(cfg);
|
|
WL_DBG(("Enter, deleting iftype %s\n",
|
|
wl_iftype_to_str(sec_data_if_type)));
|
|
GCC_DIAGNOSTIC_PUSH_SUPPRESS_CAST();
|
|
for_each_ndev(cfg, iter, next) {
|
|
GCC_DIAGNOSTIC_POP();
|
|
if (iter->ndev && (iter->ndev != primary_ndev)) {
|
|
if (iter->iftype != sec_data_if_type) {
|
|
continue;
|
|
}
|
|
switch (sec_data_if_type) {
|
|
case WL_IF_TYPE_P2P_GO:
|
|
case WL_IF_TYPE_P2P_GC: {
|
|
ret = _wl_cfg80211_del_if(cfg,
|
|
iter->ndev, NULL, iter->ndev->name);
|
|
break;
|
|
}
|
|
#ifdef WL_NAN
|
|
case WL_IF_TYPE_NAN: {
|
|
if (cfg->nan_enable == false) {
|
|
WL_INFORM_MEM(("Nan is not active,"
|
|
" ignore NDI delete\n"));
|
|
} else {
|
|
ret = wl_cfgnan_delete_ndp(cfg, iter->ndev);
|
|
}
|
|
break;
|
|
}
|
|
#endif /* WL_NAN */
|
|
case WL_IF_TYPE_AP: {
|
|
/* Cleanup AP */
|
|
#ifdef WL_STATIC_IF
|
|
/* handle static ap */
|
|
if (IS_CFG80211_STATIC_IF(cfg, iter->ndev)) {
|
|
dev_close(iter->ndev);
|
|
} else
|
|
#endif /* WL_STATIC_IF */
|
|
{
|
|
/* handle virtual created AP */
|
|
ret = _wl_cfg80211_del_if(cfg, iter->ndev,
|
|
NULL, iter->ndev->name);
|
|
}
|
|
break;
|
|
}
|
|
default: {
|
|
WL_ERR(("Unsupported interface type\n"));
|
|
ret = -ENOTSUPP;
|
|
goto fail;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
fail:
|
|
return ret;
|
|
}
|
|
|
|
void
|
|
wl_cfg80211_cleanup_virtual_ifaces(struct bcm_cfg80211 *cfg, bool rtnl_lock_reqd)
|
|
{
|
|
struct net_info *iter, *next;
|
|
struct net_device *primary_ndev;
|
|
|
|
/* Note: This function will clean up only the network interface and host
|
|
* data structures. The firmware interface clean up will happen in the
|
|
* during chip reset (ifconfig wlan0 down for built-in drivers/rmmod
|
|
* context for the module case).
|
|
*/
|
|
primary_ndev = bcmcfg_to_prmry_ndev(cfg);
|
|
WL_DBG(("Enter\n"));
|
|
GCC_DIAGNOSTIC_PUSH_SUPPRESS_CAST();
|
|
for_each_ndev(cfg, iter, next) {
|
|
GCC_DIAGNOSTIC_POP();
|
|
if (iter->ndev && (iter->ndev != primary_ndev)) {
|
|
/* Ensure interfaces are down before deleting */
|
|
#ifdef WL_STATIC_IF
|
|
/* Avoiding cleaning static ifaces */
|
|
if (!IS_CFG80211_STATIC_IF(cfg, iter->ndev))
|
|
#endif /* WL_STATIC_IF */
|
|
{
|
|
dev_close(iter->ndev);
|
|
WL_DBG(("Cleaning up iface:%s \n", iter->ndev->name));
|
|
wl_cfg80211_post_ifdel(iter->ndev, rtnl_lock_reqd, 0);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
s32
|
|
wl_cfg80211_post_ifdel(struct net_device *ndev, bool rtnl_lock_reqd, s32 ifidx)
|
|
{
|
|
s32 ret = BCME_OK;
|
|
struct bcm_cfg80211 *cfg;
|
|
struct net_info *netinfo = NULL;
|
|
|
|
if (!ndev || !ndev->ieee80211_ptr) {
|
|
/* No wireless dev done for this interface */
|
|
ret = -EINVAL;
|
|
goto exit;
|
|
}
|
|
|
|
cfg = wl_get_cfg(ndev);
|
|
if (!cfg) {
|
|
WL_ERR(("cfg null\n"));
|
|
ret = BCME_ERROR;
|
|
goto exit;
|
|
}
|
|
|
|
if (ifidx <= 0) {
|
|
WL_ERR(("Invalid IF idx for iface:%s\n", ndev->name));
|
|
ifidx = dhd_net2idx(((struct dhd_pub *)(cfg->pub))->info, ndev);
|
|
BCM_REFERENCE(ifidx);
|
|
if (ifidx <= 0) {
|
|
ASSERT(0);
|
|
ret = BCME_ERROR;
|
|
goto exit;
|
|
}
|
|
}
|
|
|
|
if ((netinfo = wl_get_netinfo_by_wdev(cfg, ndev_to_wdev(ndev))) == NULL) {
|
|
WL_ERR(("Find netinfo from wdev %p failed\n", ndev_to_wdev(ndev)));
|
|
ret = -ENODEV;
|
|
goto exit;
|
|
}
|
|
|
|
#ifdef WL_STATIC_IF
|
|
if (IS_CFG80211_STATIC_IF(cfg, ndev)) {
|
|
ret = wl_cfg80211_post_static_ifdel(cfg, ndev);
|
|
} else
|
|
#endif /* WL_STATIC_IF */
|
|
{
|
|
WL_INFORM_MEM(("[%s] cfg80211_remove_if ifidx:%d, vif_count:%d\n",
|
|
ndev->name, ifidx, cfg->vif_count));
|
|
wl_cfg80211_remove_if(cfg, ifidx, ndev, rtnl_lock_reqd);
|
|
cfg->bss_pending_op = FALSE;
|
|
}
|
|
|
|
#ifdef SUPPORT_SET_CAC
|
|
wl_cfg80211_set_cac(cfg, 1);
|
|
#endif /* SUPPORT_SET_CAC */
|
|
exit:
|
|
return ret;
|
|
}
|
|
|
|
int
|
|
wl_cfg80211_deinit_p2p_discovery(struct bcm_cfg80211 *cfg)
|
|
{
|
|
s32 ret = BCME_OK;
|
|
bcm_struct_cfgdev *cfgdev;
|
|
|
|
if (cfg->p2p) {
|
|
/* De-initialize the p2p discovery interface, if operational */
|
|
WL_ERR(("Disabling P2P Discovery Interface \n"));
|
|
#ifdef WL_CFG80211_P2P_DEV_IF
|
|
cfgdev = bcmcfg_to_p2p_wdev(cfg);
|
|
#else
|
|
cfgdev = cfg->p2p_net;
|
|
#endif // endif
|
|
if (cfgdev) {
|
|
ret = wl_cfg80211_scan_stop(cfg, cfgdev);
|
|
if (unlikely(ret < 0)) {
|
|
CFGP2P_ERR(("P2P scan stop failed, ret=%d\n", ret));
|
|
}
|
|
}
|
|
|
|
wl_cfgp2p_disable_discovery(cfg);
|
|
wl_to_p2p_bss_bssidx(cfg, P2PAPI_BSSCFG_DEVICE) = 0;
|
|
p2p_on(cfg) = false;
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
/* Create a Generic Network Interface and initialize it depending up on
|
|
* the interface type
|
|
*/
|
|
struct wireless_dev *
|
|
wl_cfg80211_create_iface(struct wiphy *wiphy,
|
|
wl_iftype_t wl_iftype,
|
|
u8 *mac_addr, const char *name)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wiphy_priv(wiphy);
|
|
struct net_device *new_ndev = NULL;
|
|
struct net_device *primary_ndev = NULL;
|
|
s32 ret = BCME_OK;
|
|
s32 bsscfg_idx = 0;
|
|
long timeout;
|
|
wl_if_event_info *event = NULL;
|
|
u8 addr[ETH_ALEN];
|
|
struct net_info *iter, *next;
|
|
|
|
WL_DBG(("Enter\n"));
|
|
if (!name) {
|
|
WL_ERR(("Interface name not provided\n"));
|
|
return NULL;
|
|
}
|
|
else {
|
|
GCC_DIAGNOSTIC_PUSH_SUPPRESS_CAST();
|
|
for_each_ndev(cfg, iter, next) {
|
|
GCC_DIAGNOSTIC_POP();
|
|
if (iter->ndev) {
|
|
if (strncmp(iter->ndev->name, name, strlen(name)) == 0) {
|
|
WL_ERR(("Interface name,%s exists!\n", iter->ndev->name));
|
|
return NULL;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
primary_ndev = bcmcfg_to_prmry_ndev(cfg);
|
|
if (likely(!mac_addr)) {
|
|
/* Use primary MAC with the locally administered bit for the
|
|
* Secondary STA I/F
|
|
*/
|
|
memcpy(addr, primary_ndev->dev_addr, ETH_ALEN);
|
|
addr[0] |= 0x02;
|
|
} else {
|
|
/* Use the application provided mac address (if any) */
|
|
memcpy(addr, mac_addr, ETH_ALEN);
|
|
}
|
|
|
|
cfg->bss_pending_op = TRUE;
|
|
bzero(&cfg->if_event_info, sizeof(cfg->if_event_info));
|
|
|
|
/*
|
|
* Intialize the firmware I/F.
|
|
*/
|
|
{
|
|
ret = wl_cfg80211_interface_ops(cfg, primary_ndev, bsscfg_idx,
|
|
wl_iftype, 0, addr);
|
|
}
|
|
if (ret == BCME_UNSUPPORTED) {
|
|
/* Use bssidx 1 by default */
|
|
bsscfg_idx = 1;
|
|
if ((ret = wl_cfg80211_add_del_bss(cfg, primary_ndev,
|
|
bsscfg_idx, wl_iftype, 0, addr)) < 0) {
|
|
goto exit;
|
|
}
|
|
} else if (ret < 0) {
|
|
WL_ERR(("Interface create failed!! ret:%d \n", ret));
|
|
goto exit;
|
|
} else {
|
|
/* Success */
|
|
bsscfg_idx = ret;
|
|
}
|
|
|
|
WL_DBG(("Interface created!! bssidx:%d \n", bsscfg_idx));
|
|
/*
|
|
* Wait till the firmware send a confirmation event back.
|
|
*/
|
|
WL_DBG(("Wait for the FW I/F Event\n"));
|
|
timeout = wait_event_interruptible_timeout(cfg->netif_change_event,
|
|
!cfg->bss_pending_op, msecs_to_jiffies(MAX_WAIT_TIME));
|
|
if (timeout <= 0 || cfg->bss_pending_op) {
|
|
WL_ERR(("ADD_IF event, didn't come. Return. timeout:%lu bss_pending_op:%d\n",
|
|
timeout, cfg->bss_pending_op));
|
|
if (timeout == -ERESTARTSYS) {
|
|
WL_ERR(("waitqueue was interrupted by a signal, returns -ERESTARTSYS\n"));
|
|
}
|
|
goto exit;
|
|
}
|
|
|
|
event = &cfg->if_event_info;
|
|
/*
|
|
* Since FW operation is successful,we can go ahead with the
|
|
* the host interface creation.
|
|
*/
|
|
new_ndev = wl_cfg80211_post_ifcreate(primary_ndev,
|
|
event, addr, name, false);
|
|
|
|
if (new_ndev) {
|
|
/* Iface post ops successful. Return ndev/wdev ptr */
|
|
return new_ndev->ieee80211_ptr;
|
|
}
|
|
|
|
exit:
|
|
cfg->bss_pending_op = FALSE;
|
|
return NULL;
|
|
}
|
|
|
|
s32
|
|
wl_cfg80211_del_iface(struct wiphy *wiphy, struct wireless_dev *wdev)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wiphy_priv(wiphy);
|
|
struct net_device *ndev = NULL;
|
|
s32 ret = BCME_OK;
|
|
s32 bsscfg_idx = 1;
|
|
long timeout;
|
|
u16 wl_iftype;
|
|
u16 wl_mode;
|
|
|
|
WL_DBG(("Enter\n"));
|
|
|
|
/* If any scan is going on, abort it */
|
|
if (wl_get_drv_status_all(cfg, SCANNING)) {
|
|
WL_DBG(("Scan in progress. Aborting the scan!\n"));
|
|
wl_cfg80211_cancel_scan(cfg);
|
|
}
|
|
|
|
bsscfg_idx = wl_get_bssidx_by_wdev(cfg, wdev);
|
|
if (bsscfg_idx <= 0) {
|
|
/* validate bsscfgidx */
|
|
WL_ERR(("Wrong bssidx! \n"));
|
|
return -EINVAL;
|
|
}
|
|
|
|
/* Handle p2p iface */
|
|
if ((ret = wl_cfg80211_p2p_if_del(wiphy, wdev)) != BCME_NOTFOUND) {
|
|
WL_DBG(("P2P iface del handled \n"));
|
|
#ifdef SUPPORT_SET_CAC
|
|
wl_cfg80211_set_cac(cfg, 1);
|
|
#endif /* SUPPORT_SET_CAC */
|
|
return ret;
|
|
}
|
|
|
|
ndev = wdev->netdev;
|
|
if (unlikely(!ndev)) {
|
|
WL_ERR(("ndev null! \n"));
|
|
return -EINVAL;
|
|
}
|
|
|
|
memset(&cfg->if_event_info, 0, sizeof(cfg->if_event_info));
|
|
|
|
if (cfg80211_to_wl_iftype(ndev->ieee80211_ptr->iftype,
|
|
&wl_iftype, &wl_mode) < 0) {
|
|
return -EINVAL;
|
|
}
|
|
|
|
WL_DBG(("del interface. bssidx:%d cfg_iftype:%d wl_iftype:%d",
|
|
bsscfg_idx, ndev->ieee80211_ptr->iftype, wl_iftype));
|
|
/* Delete the firmware interface. "interface_remove" command
|
|
* should go on the interface to be deleted
|
|
*/
|
|
if (wl_cfg80211_get_bus_state(cfg)) {
|
|
WL_ERR(("Bus state is down: %d\n", __LINE__));
|
|
ret = BCME_DONGLE_DOWN;
|
|
goto exit;
|
|
}
|
|
|
|
cfg->bss_pending_op = true;
|
|
ret = wl_cfg80211_interface_ops(cfg, ndev, bsscfg_idx,
|
|
wl_iftype, 1, NULL);
|
|
if (ret == BCME_UNSUPPORTED) {
|
|
if ((ret = wl_cfg80211_add_del_bss(cfg, ndev,
|
|
bsscfg_idx, wl_iftype, true, NULL)) < 0) {
|
|
WL_ERR(("DEL bss failed ret:%d \n", ret));
|
|
goto exit;
|
|
}
|
|
} else if ((ret == BCME_NOTAP) || (ret == BCME_NOTSTA)) {
|
|
/* De-init sequence involving role downgrade not happened.
|
|
* Do nothing and return error. The del command should be
|
|
* retried.
|
|
*/
|
|
WL_ERR(("ifdel role mismatch:%d\n", ret));
|
|
ret = -EBADTYPE;
|
|
goto exit;
|
|
} else if (ret < 0) {
|
|
WL_ERR(("Interface DEL failed ret:%d \n", ret));
|
|
goto exit;
|
|
}
|
|
|
|
timeout = wait_event_interruptible_timeout(cfg->netif_change_event,
|
|
!cfg->bss_pending_op, msecs_to_jiffies(MAX_WAIT_TIME));
|
|
if (timeout <= 0 || cfg->bss_pending_op) {
|
|
WL_ERR(("timeout in waiting IF_DEL event\n"));
|
|
/* The interface unregister will happen from wifi reset context */
|
|
ret = -ETIMEDOUT;
|
|
/* fall through */
|
|
}
|
|
|
|
exit:
|
|
if (ret < 0) {
|
|
WL_ERR(("iface del failed:%d\n", ret));
|
|
#ifdef WL_STATIC_IF
|
|
if (IS_CFG80211_STATIC_IF(cfg, ndev)) {
|
|
/*
|
|
* For static interface, clean up the host data,
|
|
* irrespective of fw status. For dynamic
|
|
* interfaces it gets cleaned from dhd_stop context
|
|
*/
|
|
wl_cfg80211_post_static_ifdel(cfg, ndev);
|
|
}
|
|
#endif /* WL_STATIC_IF */
|
|
} else {
|
|
ret = wl_cfg80211_post_ifdel(ndev, false, cfg->if_event_info.ifidx);
|
|
if (unlikely(ret)) {
|
|
WL_ERR(("post_ifdel failed\n"));
|
|
}
|
|
}
|
|
|
|
cfg->bss_pending_op = false;
|
|
return ret;
|
|
}
|
|
|
|
static s32
|
|
wl_cfg80211_join_ibss(struct wiphy *wiphy, struct net_device *dev,
|
|
struct cfg80211_ibss_params *params)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wiphy_priv(wiphy);
|
|
struct cfg80211_bss *bss;
|
|
struct ieee80211_channel *chan;
|
|
struct wl_join_params join_params;
|
|
int scan_suppress;
|
|
struct cfg80211_ssid ssid;
|
|
s32 scan_retry = 0;
|
|
s32 err = 0;
|
|
size_t join_params_size;
|
|
chanspec_t chanspec = 0;
|
|
u32 param[2] = {0, 0};
|
|
u32 bw_cap = 0;
|
|
|
|
WL_TRACE(("In\n"));
|
|
RETURN_EIO_IF_NOT_UP(cfg);
|
|
WL_INFORM_MEM(("IBSS JOIN BSSID:" MACDBG "\n", MAC2STRDBG(params->bssid)));
|
|
if (!params->ssid || params->ssid_len <= 0 ||
|
|
params->ssid_len > DOT11_MAX_SSID_LEN) {
|
|
WL_ERR(("Invalid parameter\n"));
|
|
return -EINVAL;
|
|
}
|
|
#if defined(WL_CFG80211_P2P_DEV_IF)
|
|
chan = params->chandef.chan;
|
|
#else
|
|
chan = params->channel;
|
|
#endif /* WL_CFG80211_P2P_DEV_IF */
|
|
if (chan)
|
|
cfg->channel = ieee80211_frequency_to_channel(chan->center_freq);
|
|
if (wl_get_drv_status(cfg, CONNECTED, dev)) {
|
|
struct wlc_ssid *lssid = (struct wlc_ssid *)wl_read_prof(cfg, dev, WL_PROF_SSID);
|
|
u8 *bssid = (u8 *)wl_read_prof(cfg, dev, WL_PROF_BSSID);
|
|
u32 *channel = (u32 *)wl_read_prof(cfg, dev, WL_PROF_CHAN);
|
|
if (!params->bssid || ((memcmp(params->bssid, bssid, ETHER_ADDR_LEN) == 0) &&
|
|
(memcmp(params->ssid, lssid->SSID, lssid->SSID_len) == 0) &&
|
|
(*channel == cfg->channel))) {
|
|
WL_ERR(("Connection already existed to " MACDBG "\n",
|
|
MAC2STRDBG((u8 *)wl_read_prof(cfg, dev, WL_PROF_BSSID))));
|
|
return -EISCONN;
|
|
}
|
|
WL_ERR(("Ignore Previous connecton to %s (" MACDBG ")\n",
|
|
lssid->SSID, MAC2STRDBG(bssid)));
|
|
}
|
|
|
|
/* remove the VSIE */
|
|
wl_cfg80211_ibss_vsie_delete(dev);
|
|
|
|
bss = cfg80211_get_ibss(wiphy, NULL, params->ssid, params->ssid_len);
|
|
if (!bss) {
|
|
if (IBSS_INITIAL_SCAN_ALLOWED == TRUE) {
|
|
memcpy(ssid.ssid, params->ssid, params->ssid_len);
|
|
ssid.ssid_len = params->ssid_len;
|
|
do {
|
|
if (unlikely
|
|
(__wl_cfg80211_scan(wiphy, dev, NULL, &ssid) ==
|
|
-EBUSY)) {
|
|
wl_delay(150);
|
|
} else {
|
|
break;
|
|
}
|
|
} while (++scan_retry < WL_SCAN_RETRY_MAX);
|
|
|
|
/* rtnl lock code is removed here. don't see why rtnl lock
|
|
* needs to be released.
|
|
*/
|
|
|
|
/* wait 4 secons till scan done.... */
|
|
schedule_timeout_interruptible(msecs_to_jiffies(4000));
|
|
|
|
bss = cfg80211_get_ibss(wiphy, NULL,
|
|
params->ssid, params->ssid_len);
|
|
}
|
|
}
|
|
if (bss && ((IBSS_COALESCE_ALLOWED == TRUE) ||
|
|
((IBSS_COALESCE_ALLOWED == FALSE) && params->bssid &&
|
|
!memcmp(bss->bssid, params->bssid, ETHER_ADDR_LEN)))) {
|
|
cfg->ibss_starter = false;
|
|
WL_DBG(("Found IBSS\n"));
|
|
} else {
|
|
cfg->ibss_starter = true;
|
|
}
|
|
|
|
if (bss) {
|
|
CFG80211_PUT_BSS(wiphy, bss);
|
|
}
|
|
|
|
if (chan) {
|
|
if (chan->band == IEEE80211_BAND_5GHZ)
|
|
param[0] = WLC_BAND_5G;
|
|
else if (chan->band == IEEE80211_BAND_2GHZ)
|
|
param[0] = WLC_BAND_2G;
|
|
err = wldev_iovar_getint(dev, "bw_cap", param);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("Get bw_cap Failed (%d)\n", err));
|
|
return err;
|
|
}
|
|
bw_cap = param[0];
|
|
chanspec = channel_to_chanspec(wiphy, dev, cfg->channel, bw_cap);
|
|
}
|
|
/*
|
|
* Join with specific BSSID and cached SSID
|
|
* If SSID is zero join based on BSSID only
|
|
*/
|
|
bzero(&join_params, sizeof(join_params));
|
|
memcpy((void *)join_params.ssid.SSID, (const void *)params->ssid,
|
|
params->ssid_len);
|
|
join_params.ssid.SSID_len = htod32(params->ssid_len);
|
|
if (params->bssid) {
|
|
memcpy(&join_params.params.bssid, params->bssid, ETHER_ADDR_LEN);
|
|
err = wldev_ioctl_set(dev, WLC_SET_DESIRED_BSSID, &join_params.params.bssid,
|
|
ETHER_ADDR_LEN);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("Error (%d)\n", err));
|
|
return err;
|
|
}
|
|
} else
|
|
bzero(&join_params.params.bssid, ETHER_ADDR_LEN);
|
|
|
|
if (IBSS_INITIAL_SCAN_ALLOWED == FALSE) {
|
|
scan_suppress = TRUE;
|
|
/* Set the SCAN SUPPRESS Flag in the firmware to skip join scan */
|
|
err = wldev_ioctl_set(dev, WLC_SET_SCANSUPPRESS,
|
|
&scan_suppress, sizeof(int));
|
|
if (unlikely(err)) {
|
|
WL_ERR(("Scan Suppress Setting Failed (%d)\n", err));
|
|
return err;
|
|
}
|
|
}
|
|
|
|
join_params.params.chanspec_list[0] = chanspec;
|
|
join_params.params.chanspec_num = 1;
|
|
wldev_iovar_setint(dev, "chanspec", chanspec);
|
|
join_params_size = sizeof(join_params);
|
|
|
|
/* Disable Authentication, IBSS will add key if it required */
|
|
wldev_iovar_setint(dev, "wpa_auth", WPA_AUTH_DISABLED);
|
|
wldev_iovar_setint(dev, "wsec", 0);
|
|
|
|
err = wldev_ioctl_set(dev, WLC_SET_SSID, &join_params,
|
|
join_params_size);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("IBSS set_ssid Error (%d)\n", err));
|
|
return err;
|
|
}
|
|
|
|
if (IBSS_INITIAL_SCAN_ALLOWED == FALSE) {
|
|
scan_suppress = FALSE;
|
|
/* Reset the SCAN SUPPRESS Flag */
|
|
err = wldev_ioctl_set(dev, WLC_SET_SCANSUPPRESS,
|
|
&scan_suppress, sizeof(int));
|
|
if (unlikely(err)) {
|
|
WL_ERR(("Reset Scan Suppress Flag Failed (%d)\n", err));
|
|
return err;
|
|
}
|
|
}
|
|
wl_update_prof(cfg, dev, NULL, &join_params.ssid, WL_PROF_SSID);
|
|
wl_update_prof(cfg, dev, NULL, &cfg->channel, WL_PROF_CHAN);
|
|
#ifdef WL_RELMCAST
|
|
cfg->rmc_event_seq = 0; /* initialize rmcfail sequence */
|
|
#endif /* WL_RELMCAST */
|
|
return err;
|
|
}
|
|
|
|
static s32 wl_cfg80211_leave_ibss(struct wiphy *wiphy, struct net_device *dev)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wiphy_priv(wiphy);
|
|
s32 err = 0;
|
|
scb_val_t scbval;
|
|
u8 *curbssid;
|
|
|
|
RETURN_EIO_IF_NOT_UP(cfg);
|
|
wl_link_down(cfg);
|
|
|
|
WL_INFORM_MEM(("Leave IBSS\n"));
|
|
curbssid = wl_read_prof(cfg, dev, WL_PROF_BSSID);
|
|
wl_set_drv_status(cfg, DISCONNECTING, dev);
|
|
scbval.val = 0;
|
|
memcpy(&scbval.ea, curbssid, ETHER_ADDR_LEN);
|
|
err = wldev_ioctl_set(dev, WLC_DISASSOC, &scbval,
|
|
sizeof(scb_val_t));
|
|
if (unlikely(err)) {
|
|
wl_clr_drv_status(cfg, DISCONNECTING, dev);
|
|
WL_ERR(("error(%d)\n", err));
|
|
return err;
|
|
}
|
|
|
|
/* remove the VSIE */
|
|
wl_cfg80211_ibss_vsie_delete(dev);
|
|
|
|
return err;
|
|
}
|
|
|
|
#ifdef MFP
|
|
static
|
|
int wl_cfg80211_get_rsn_capa(const bcm_tlv_t *wpa2ie,
|
|
const u8** rsn_cap)
|
|
{
|
|
u16 suite_count;
|
|
const wpa_suite_mcast_t *mcast;
|
|
const wpa_suite_ucast_t *ucast;
|
|
int len;
|
|
const wpa_suite_auth_key_mgmt_t *mgmt;
|
|
|
|
if (!wpa2ie)
|
|
return BCME_BADARG;
|
|
|
|
len = wpa2ie->len;
|
|
|
|
/* check for Multicast cipher suite */
|
|
if ((len -= (WPA_SUITE_LEN + WPA2_VERSION_LEN)) <= 0) {
|
|
return BCME_NOTFOUND;
|
|
}
|
|
|
|
mcast = (const wpa_suite_mcast_t *)&wpa2ie->data[WPA2_VERSION_LEN];
|
|
|
|
/* Check for the unicast suite(s) */
|
|
if (len < WPA_IE_SUITE_COUNT_LEN) {
|
|
return BCME_NOTFOUND;
|
|
}
|
|
|
|
ucast = (const wpa_suite_ucast_t *)&mcast[1];
|
|
suite_count = ltoh16_ua(&ucast->count);
|
|
if ((suite_count > NL80211_MAX_NR_CIPHER_SUITES) ||
|
|
(len -= (WPA_IE_SUITE_COUNT_LEN +
|
|
(WPA_SUITE_LEN * suite_count))) <= 0)
|
|
return BCME_BADLEN;
|
|
|
|
/* Check for AUTH key management suite(s) */
|
|
if (len < WPA_IE_SUITE_COUNT_LEN) {
|
|
return BCME_NOTFOUND;
|
|
}
|
|
|
|
mgmt = (const wpa_suite_auth_key_mgmt_t *)&ucast->list[suite_count];
|
|
suite_count = ltoh16_ua(&mgmt->count);
|
|
|
|
if ((suite_count <= NL80211_MAX_NR_CIPHER_SUITES) &&
|
|
(len -= (WPA_IE_SUITE_COUNT_LEN +
|
|
(WPA_SUITE_LEN * suite_count))) >= RSN_CAP_LEN) {
|
|
rsn_cap[0] = (const u8 *)&mgmt->list[suite_count];
|
|
} else {
|
|
return BCME_BADLEN;
|
|
}
|
|
|
|
return BCME_OK;
|
|
}
|
|
#endif /* MFP */
|
|
|
|
static s32
|
|
wl_set_wpa_version(struct net_device *dev, struct cfg80211_connect_params *sme)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(dev);
|
|
struct wl_security *sec;
|
|
s32 val = 0;
|
|
s32 err = 0;
|
|
s32 bssidx;
|
|
|
|
if ((bssidx = wl_get_bssidx_by_wdev(cfg, dev->ieee80211_ptr)) < 0) {
|
|
WL_ERR(("Find p2p index from wdev(%p) failed\n", dev->ieee80211_ptr));
|
|
return BCME_ERROR;
|
|
}
|
|
|
|
if (sme->crypto.wpa_versions & NL80211_WPA_VERSION_1)
|
|
val = WPA_AUTH_PSK |
|
|
WPA_AUTH_UNSPECIFIED;
|
|
else if (sme->crypto.wpa_versions & NL80211_WPA_VERSION_2)
|
|
val = WPA2_AUTH_PSK|
|
|
WPA2_AUTH_UNSPECIFIED;
|
|
else
|
|
val = WPA_AUTH_DISABLED;
|
|
|
|
if (is_wps_conn(sme))
|
|
val = WPA_AUTH_DISABLED;
|
|
|
|
#ifdef BCMWAPI_WPI
|
|
if (sme->crypto.wpa_versions & NL80211_WAPI_VERSION_1) {
|
|
WL_DBG((" * wl_set_wpa_version, set wpa_auth"
|
|
" to WPA_AUTH_WAPI 0x400"));
|
|
val = WAPI_AUTH_PSK | WAPI_AUTH_UNSPECIFIED;
|
|
}
|
|
#endif // endif
|
|
WL_INFORM_MEM(("[%s] wl wpa_auth 0x%0x\n", dev->name, val));
|
|
err = wldev_iovar_setint_bsscfg(dev, "wpa_auth", val, bssidx);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("set wpa_auth failed (%d)\n", err));
|
|
return err;
|
|
}
|
|
sec = wl_read_prof(cfg, dev, WL_PROF_SEC);
|
|
sec->wpa_versions = sme->crypto.wpa_versions;
|
|
return err;
|
|
}
|
|
|
|
#ifdef BCMWAPI_WPI
|
|
static s32
|
|
wl_set_set_wapi_ie(struct net_device *dev, struct cfg80211_connect_params *sme)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(dev);
|
|
s32 err = 0;
|
|
s32 bssidx;
|
|
|
|
WL_DBG((" wl_set_set_wapi_ie\n"));
|
|
if ((bssidx = wl_get_bssidx_by_wdev(cfg, dev->ieee80211_ptr)) < 0) {
|
|
WL_ERR(("Find p2p index from wdev(%p) failed\n", dev->ieee80211_ptr));
|
|
return BCME_ERROR;
|
|
}
|
|
|
|
err = wldev_iovar_setbuf_bsscfg(dev, "wapiie", (const void *)sme->ie, sme->ie_len,
|
|
cfg->ioctl_buf, WLC_IOCTL_MAXLEN, bssidx, &cfg->ioctl_buf_sync);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("set_wapi_ie Error (%d)\n", err));
|
|
return err;
|
|
}
|
|
WL_INFORM_MEM(("wapi_ie successfully (%s)\n", dev->name));
|
|
return err;
|
|
}
|
|
#endif /* BCMWAPI_WPI */
|
|
|
|
static s32
|
|
wl_set_auth_type(struct net_device *dev, struct cfg80211_connect_params *sme)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(dev);
|
|
struct wl_security *sec;
|
|
s32 val = 0;
|
|
s32 err = 0;
|
|
s32 bssidx;
|
|
|
|
if ((bssidx = wl_get_bssidx_by_wdev(cfg, dev->ieee80211_ptr)) < 0) {
|
|
WL_ERR(("Find p2p index from wdev(%p) failed\n", dev->ieee80211_ptr));
|
|
return BCME_ERROR;
|
|
}
|
|
|
|
switch (sme->auth_type) {
|
|
case NL80211_AUTHTYPE_OPEN_SYSTEM:
|
|
val = WL_AUTH_OPEN_SYSTEM;
|
|
WL_DBG(("open system\n"));
|
|
break;
|
|
case NL80211_AUTHTYPE_SHARED_KEY:
|
|
val = WL_AUTH_SHARED_KEY;
|
|
WL_DBG(("shared key\n"));
|
|
break;
|
|
case NL80211_AUTHTYPE_AUTOMATIC:
|
|
val = WL_AUTH_OPEN_SHARED;
|
|
WL_DBG(("automatic\n"));
|
|
break;
|
|
#ifdef WL_FILS
|
|
case NL80211_AUTHTYPE_FILS_SK:
|
|
WL_DBG(("fils shared key\n"));
|
|
val = WL_AUTH_FILS_SHARED;
|
|
break;
|
|
case NL80211_AUTHTYPE_FILS_SK_PFS:
|
|
val = WL_AUTH_FILS_SHARED_PFS;
|
|
WL_DBG(("fils shared key with pfs\n"));
|
|
break;
|
|
case NL80211_AUTHTYPE_FILS_PK:
|
|
WL_DBG(("fils public key\n"));
|
|
val = WL_AUTH_FILS_PUBLIC;
|
|
break;
|
|
#endif /* WL_FILS */
|
|
#ifdef WL_CLIENT_SAE
|
|
case NL80211_AUTHTYPE_SAE:
|
|
if (!wl_is_pmkid_available(dev, sme->bssid)) {
|
|
val = WL_AUTH_SAE_KEY;
|
|
} else {
|
|
/* Fw will choose right auth type
|
|
* dynamically based on PMKID availability
|
|
*/
|
|
val = WL_AUTH_OPEN_SHARED;
|
|
}
|
|
WL_DBG(("sae auth type %d\n", val));
|
|
break;
|
|
#endif /* WL_CLIENT_SAE */
|
|
default:
|
|
val = 2;
|
|
WL_ERR(("invalid auth type (%d)\n", sme->auth_type));
|
|
break;
|
|
}
|
|
|
|
WL_INFORM_MEM(("[%s] wl auth 0x%0x \n", dev->name, val));
|
|
err = wldev_iovar_setint_bsscfg(dev, "auth", val, bssidx);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("set auth failed (%d)\n", err));
|
|
return err;
|
|
}
|
|
sec = wl_read_prof(cfg, dev, WL_PROF_SEC);
|
|
sec->auth_type = sme->auth_type;
|
|
return err;
|
|
}
|
|
|
|
#ifdef WL_CLIENT_SAE
|
|
static bool
|
|
wl_is_pmkid_available(struct net_device *dev, const u8 *bssid)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(dev);
|
|
int i;
|
|
int npmkids = (cfg->pmk_list->pmkids.length - sizeof(uint16)*2) / sizeof(pmkid_v2_t);
|
|
|
|
/* check the bssid is null or not */
|
|
if (!bssid) return FALSE;
|
|
|
|
for (i = 0; i < npmkids; i++) {
|
|
if (!memcmp(bssid, &cfg->pmk_list->pmkids.pmkid[i].bssid, ETHER_ADDR_LEN)) {
|
|
WL_DBG(("FOUND PMKID\n"));
|
|
return TRUE;
|
|
}
|
|
}
|
|
WL_ERR(("PMKID NOT FOUND\n"));
|
|
return FALSE;
|
|
}
|
|
#endif /* WL_CLIENT_SAE */
|
|
|
|
static u32
|
|
wl_rsn_cipher_wsec_algo_lookup(uint32 cipher)
|
|
{
|
|
uint i;
|
|
|
|
for (i = 0; i < ARRAYSIZE(rsn_cipher_algo_lookup_tbl); i++) {
|
|
if (cipher == rsn_cipher_algo_lookup_tbl[i].cipher_suite) {
|
|
return rsn_cipher_algo_lookup_tbl[i].wsec_algo;
|
|
}
|
|
}
|
|
return WSEC_NONE;
|
|
}
|
|
|
|
static u32
|
|
wl_rsn_cipher_wsec_key_algo_lookup(uint32 cipher)
|
|
{
|
|
uint i;
|
|
|
|
for (i = 0; i < ARRAYSIZE(rsn_cipher_algo_lookup_tbl); i++) {
|
|
if (cipher == rsn_cipher_algo_lookup_tbl[i].cipher_suite) {
|
|
return rsn_cipher_algo_lookup_tbl[i].wsec_key_algo;
|
|
}
|
|
}
|
|
return CRYPTO_ALGO_OFF;
|
|
}
|
|
|
|
static u32
|
|
wl_rsn_akm_wpa_auth_lookup(uint32 akm)
|
|
{
|
|
uint i;
|
|
|
|
for (i = 0; i < ARRAYSIZE(rsn_akm_wpa_auth_lookup_tbl); i++) {
|
|
if (akm == rsn_akm_wpa_auth_lookup_tbl[i].akm_suite) {
|
|
return rsn_akm_wpa_auth_lookup_tbl[i].wpa_auth;
|
|
}
|
|
}
|
|
return WPA_AUTH_DISABLED;
|
|
}
|
|
|
|
static s32
|
|
wl_set_set_cipher(struct net_device *dev, struct cfg80211_connect_params *sme)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(dev);
|
|
struct wl_security *sec;
|
|
s32 pval = 0;
|
|
s32 gval = 0;
|
|
s32 err = 0;
|
|
s32 wsec_val = 0;
|
|
#ifdef BCMWAPI_WPI
|
|
s32 wapi_val = 0;
|
|
s32 val = 0;
|
|
#endif // endif
|
|
s32 bssidx;
|
|
#ifdef WL_GCMP
|
|
uint32 algos = 0, mask = 0;
|
|
#endif /* WL_GCMP */
|
|
|
|
if ((bssidx = wl_get_bssidx_by_wdev(cfg, dev->ieee80211_ptr)) < 0) {
|
|
WL_ERR(("Find p2p index from wdev(%p) failed\n", dev->ieee80211_ptr));
|
|
return BCME_ERROR;
|
|
}
|
|
|
|
if (sme->crypto.n_ciphers_pairwise) {
|
|
pval = wl_rsn_cipher_wsec_algo_lookup(sme->crypto.ciphers_pairwise[0]);
|
|
if (pval == WSEC_NONE) {
|
|
WL_ERR(("invalid cipher pairwise (%d)\n", sme->crypto.ciphers_pairwise[0]));
|
|
return BCME_BADARG;
|
|
}
|
|
switch (sme->crypto.ciphers_pairwise[0]) {
|
|
#ifdef BCMWAPI_WPI
|
|
case WLAN_CIPHER_SUITE_SMS4:
|
|
val = pval;
|
|
err = wl_set_set_wapi_ie(dev, sme);
|
|
if (unlikely(err)) {
|
|
WL_DBG(("Set wapi ie failed \n"));
|
|
return err;
|
|
} else {
|
|
WL_DBG(("Set wapi ie succeded\n"));
|
|
}
|
|
wapi_val = WAPI_AUTH_PSK | WAPI_AUTH_UNSPECIFIED;
|
|
WL_INFORM_MEM(("[WAPI] wl wpa_auth to 0x%0x (%s)\n", val, dev->name));
|
|
err = wldev_iovar_setint_bsscfg(dev, "wpa_auth", wapi_val, bssidx);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("set wpa_auth failed (%d)\n", err));
|
|
return err;
|
|
}
|
|
break;
|
|
#endif /* BCMWAPI_WPI */
|
|
#ifdef WL_GCMP
|
|
case WLAN_CIPHER_SUITE_GCMP:
|
|
case WLAN_CIPHER_SUITE_GCMP_256:
|
|
algos = KEY_ALGO_MASK(wl_rsn_cipher_wsec_key_algo_lookup(
|
|
sme->crypto.ciphers_pairwise[0]));
|
|
mask = algos | KEY_ALGO_MASK(CRYPTO_ALGO_AES_CCM);
|
|
break;
|
|
#endif /* WL_GCMP */
|
|
default: /* No post processing required */
|
|
break;
|
|
}
|
|
}
|
|
#if defined(BCMSUP_4WAY_HANDSHAKE)
|
|
/* Ensure in-dongle supplicant is turned on when FBT wants to do the 4-way
|
|
* handshake.
|
|
* Note that the FW feature flag only exists on kernels that support the
|
|
* FT-EAP AKM suite.
|
|
*/
|
|
if (cfg->wdev->wiphy->features & NL80211_FEATURE_FW_4WAY_HANDSHAKE) {
|
|
err = wldev_iovar_setint_bsscfg(dev, "sup_wpa", 1, bssidx);
|
|
if (err) {
|
|
WL_ERR(("FBT: Error setting sup_wpa (%d)\n", err));
|
|
return err;
|
|
} else {
|
|
WL_INFORM_MEM(("idsup enabled.\n"));
|
|
}
|
|
}
|
|
#endif /* BCMSUP_4WAY_HANDSHAKE */
|
|
if (sme->crypto.cipher_group) {
|
|
gval = wl_rsn_cipher_wsec_algo_lookup(sme->crypto.cipher_group);
|
|
if (gval == WSEC_NONE) {
|
|
WL_ERR(("invalid cipher group (%d)\n", sme->crypto.cipher_group));
|
|
return BCME_BADARG;
|
|
}
|
|
switch (sme->crypto.cipher_group) {
|
|
#ifdef BCMWAPI_WPI
|
|
case WLAN_CIPHER_SUITE_SMS4:
|
|
val = gval;
|
|
break;
|
|
#endif // endif
|
|
#ifdef WL_GCMP
|
|
case WLAN_CIPHER_SUITE_GCMP:
|
|
case WLAN_CIPHER_SUITE_GCMP_256:
|
|
algos = KEY_ALGO_MASK(
|
|
wl_rsn_cipher_wsec_key_algo_lookup(sme->crypto.cipher_group));
|
|
mask = algos | KEY_ALGO_MASK(CRYPTO_ALGO_AES_CCM);
|
|
break;
|
|
#endif /* WL_GCMP */
|
|
default: /* No post processing required */
|
|
break;
|
|
}
|
|
}
|
|
|
|
WL_DBG(("pval (%d) gval (%d)\n", pval, gval));
|
|
#ifdef WL_GCMP
|
|
WL_DBG(("algos:%x, mask:%x", algos, mask));
|
|
#endif /* WL_GCMP */
|
|
|
|
if (is_wps_conn(sme)) {
|
|
if (sme->privacy) {
|
|
wsec_val = 4;
|
|
} else {
|
|
/* WPS-2.0 allows no security */
|
|
wsec_val = 0;
|
|
}
|
|
} else {
|
|
#ifdef BCMWAPI_WPI
|
|
if (sme->crypto.cipher_group == WLAN_CIPHER_SUITE_SMS4) {
|
|
WL_DBG((" NO, is_wps_conn, WAPI set to SMS4_ENABLED"));
|
|
wsec_val = val;
|
|
} else
|
|
#endif // endif
|
|
{
|
|
WL_DBG((" NO, is_wps_conn, Set pval | gval to WSEC"));
|
|
wsec_val = pval | gval;
|
|
}
|
|
}
|
|
|
|
WL_INFORM_MEM(("[%s] wl wsec 0x%x\n", dev->name, wsec_val));
|
|
err = wldev_iovar_setint_bsscfg(dev, "wsec", wsec_val, bssidx);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("error (%d)\n", err));
|
|
return err;
|
|
}
|
|
#ifdef WL_GCMP
|
|
wl_set_wsec_info_algos(dev, algos, mask);
|
|
#endif /* WL_GCMP */
|
|
sec = wl_read_prof(cfg, dev, WL_PROF_SEC);
|
|
sec->cipher_pairwise = sme->crypto.ciphers_pairwise[0];
|
|
sec->cipher_group = sme->crypto.cipher_group;
|
|
return err;
|
|
}
|
|
#ifdef WL_GCMP
|
|
static s32
|
|
wl_set_wsec_info_algos(struct net_device *dev, uint32 algos, uint32 mask)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(dev);
|
|
s32 bssidx;
|
|
s32 err = 0;
|
|
wl_wsec_info_t *wsec_info;
|
|
bcm_xtlv_t *wsec_info_tlv;
|
|
uint16 tlv_data_len;
|
|
uint8 tlv_data[8];
|
|
uint32 param_len;
|
|
uint8 * buf;
|
|
|
|
WL_DBG(("enter.\n"));
|
|
if (!cfg) {
|
|
return BCME_ERROR;
|
|
}
|
|
if ((bssidx = wl_get_bssidx_by_wdev(cfg, dev->ieee80211_ptr)) < 0) {
|
|
WL_ERR(("Find index from wdev(%p) failed\n", dev->ieee80211_ptr));
|
|
return BCME_ERROR;
|
|
}
|
|
|
|
buf = MALLOCZ(cfg->osh, sizeof(wl_wsec_info_t) + sizeof(tlv_data));
|
|
if (!buf) {
|
|
WL_ERR(("No memory"));
|
|
return BCME_NOMEM;
|
|
}
|
|
wsec_info = (wl_wsec_info_t *)buf;
|
|
wsec_info->version = WL_WSEC_INFO_VERSION;
|
|
wsec_info_tlv = (bcm_xtlv_t *)(buf + OFFSETOF(wl_wsec_info_t, tlvs));
|
|
|
|
wsec_info->num_tlvs++;
|
|
tlv_data_len = sizeof(tlv_data);
|
|
err = memcpy_s(tlv_data, sizeof(tlv_data), &algos, sizeof(algos));
|
|
if (err) {
|
|
WL_ERR(("memcpy_s algos error (%d)\n", err));
|
|
goto exit;
|
|
}
|
|
err = memcpy_s(tlv_data + sizeof(algos), sizeof(mask), &mask, sizeof(mask));
|
|
if (err) {
|
|
WL_ERR(("memcpy_s mask error (%d)\n", err));
|
|
goto exit;
|
|
}
|
|
bcm_xtlv_pack_xtlv(wsec_info_tlv, WL_WSEC_INFO_BSS_ALGOS, tlv_data_len, tlv_data, 0);
|
|
param_len = OFFSETOF(wl_wsec_info_t, tlvs) + WL_WSEC_INFO_TLV_HDR_LEN + tlv_data_len;
|
|
|
|
err = wldev_iovar_setbuf_bsscfg(dev, "wsec_info", wsec_info, param_len,
|
|
cfg->ioctl_buf, WLC_IOCTL_MAXLEN, bssidx, &cfg->ioctl_buf_sync);
|
|
if (unlikely(err))
|
|
WL_ERR(("wsec_info error (%d)\n", err));
|
|
exit:
|
|
MFREE(cfg->osh, buf, sizeof(wl_wsec_info_t) + sizeof(tlv_data));
|
|
return err;
|
|
}
|
|
#endif /* WL_GCMP */
|
|
#ifdef MFP
|
|
static s32
|
|
wl_cfg80211_set_mfp(struct bcm_cfg80211 *cfg,
|
|
struct net_device *dev,
|
|
struct cfg80211_connect_params *sme)
|
|
{
|
|
s32 mfp = WL_MFP_NONE;
|
|
s32 current_mfp = WL_MFP_NONE;
|
|
const bcm_tlv_t *wpa2_ie;
|
|
const u8* rsn_cap = NULL;
|
|
bool fw_support = false;
|
|
int err, count = 0;
|
|
const u8 *eptr = NULL, *ptr = NULL;
|
|
const u8* group_mgmt_cs = NULL;
|
|
const wpa_pmkid_list_t* pmkid = NULL;
|
|
|
|
if (!sme) {
|
|
/* No connection params from userspace, Do nothing. */
|
|
return 0;
|
|
}
|
|
|
|
/* Check fw support and retreive current mfp val */
|
|
err = wldev_iovar_getint(dev, "mfp", ¤t_mfp);
|
|
if (!err) {
|
|
fw_support = true;
|
|
}
|
|
|
|
/* Parse the wpa2ie to decode the MFP capablity */
|
|
if (((wpa2_ie = bcm_parse_tlvs((const u8 *)sme->ie, sme->ie_len,
|
|
DOT11_MNG_RSN_ID)) != NULL) &&
|
|
(wl_cfg80211_get_rsn_capa(wpa2_ie, &rsn_cap) == 0) && rsn_cap) {
|
|
WL_DBG(("rsn_cap 0x%x%x\n", rsn_cap[0], rsn_cap[1]));
|
|
/* Check for MFP cap in the RSN capability field */
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 9, 0))
|
|
if (sme->mfp)
|
|
#endif // endif
|
|
{
|
|
if (rsn_cap[0] & RSN_CAP_MFPR) {
|
|
mfp = WL_MFP_REQUIRED;
|
|
} else if (rsn_cap[0] & RSN_CAP_MFPC) {
|
|
mfp = WL_MFP_CAPABLE;
|
|
}
|
|
}
|
|
/*
|
|
* eptr --> end/last byte addr of wpa2_ie
|
|
* ptr --> to keep track of current/required byte addr
|
|
*/
|
|
eptr = (const u8*)wpa2_ie + (wpa2_ie->len + TLV_HDR_LEN);
|
|
/* pointing ptr to the next byte after rns_cap */
|
|
ptr = (const u8*)rsn_cap + RSN_CAP_LEN;
|
|
if (mfp && (eptr - ptr) >= WPA2_PMKID_COUNT_LEN) {
|
|
/* pmkid now to point to 1st byte addr of pmkid in wpa2_ie */
|
|
pmkid = (const wpa_pmkid_list_t*)ptr;
|
|
count = pmkid->count.low | (pmkid->count.high << 8);
|
|
/* ptr now to point to last byte addr of pmkid */
|
|
ptr = (const u8*)pmkid + (count * WPA2_PMKID_LEN
|
|
+ WPA2_PMKID_COUNT_LEN);
|
|
if ((eptr - ptr) >= WPA_SUITE_LEN) {
|
|
/* group_mgmt_cs now to point to first byte addr of bip */
|
|
group_mgmt_cs = ptr;
|
|
}
|
|
}
|
|
}
|
|
|
|
WL_DBG(("mfp:%d wpa2_ie ptr:%p mfp fw_support:%d\n",
|
|
mfp, wpa2_ie, fw_support));
|
|
|
|
if (fw_support == false) {
|
|
if (mfp == WL_MFP_REQUIRED) {
|
|
/* if mfp > 0, mfp capability set in wpa ie, but
|
|
* FW indicated error for mfp. Propagate the error up.
|
|
*/
|
|
WL_ERR(("mfp capability found in wpaie. But fw doesn't "
|
|
"seem to support MFP\n"));
|
|
err = -EINVAL;
|
|
goto exit;
|
|
} else {
|
|
/* Firmware doesn't support mfp. But since connection request
|
|
* is for non-mfp case, don't bother.
|
|
*/
|
|
err = BCME_OK;
|
|
goto exit;
|
|
}
|
|
} else if (mfp != current_mfp) {
|
|
err = wldev_iovar_setint(dev, "mfp", mfp);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("mfp (%d) set failed ret:%d \n", mfp, err));
|
|
goto exit;
|
|
}
|
|
WL_INFORM_MEM(("[%s] wl mfp 0x%x\n", dev->name, mfp));
|
|
}
|
|
|
|
if (group_mgmt_cs && bcmp((const uint8 *)WPA2_OUI,
|
|
group_mgmt_cs, (WPA_SUITE_LEN - 1)) == 0) {
|
|
WL_DBG(("BIP is found\n"));
|
|
err = wldev_iovar_setbuf(dev, "bip",
|
|
group_mgmt_cs, WPA_SUITE_LEN, cfg->ioctl_buf,
|
|
WLC_IOCTL_SMLEN, &cfg->ioctl_buf_sync);
|
|
/*
|
|
* Dont return failure for unsupported cases
|
|
* of bip iovar for backward compatibility
|
|
*/
|
|
if (err != BCME_UNSUPPORTED && err < 0) {
|
|
WL_ERR(("bip set error (%d)\n", err));
|
|
{
|
|
goto exit;
|
|
}
|
|
} else {
|
|
WL_INFORM_MEM(("[%s] wl bip %02X:%02X:%02X\n",
|
|
dev->name, group_mgmt_cs[0], group_mgmt_cs[1],
|
|
group_mgmt_cs[2]));
|
|
}
|
|
}
|
|
exit:
|
|
if (err) {
|
|
wl_flush_fw_log_buffer(bcmcfg_to_prmry_ndev(cfg),
|
|
FW_LOGSET_MASK_ALL);
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
#endif /* MFP */
|
|
|
|
#ifdef WL_FILS
|
|
bool
|
|
wl_is_fils_supported(struct net_device *ndev)
|
|
{
|
|
s32 err;
|
|
u8 ioctl_buf[WLC_IOCTL_SMLEN] = {0};
|
|
bcm_iov_buf_t *iov_buf = (bcm_iov_buf_t *)ioctl_buf;
|
|
|
|
iov_buf->version = WL_FILS_IOV_VERSION;
|
|
err = wldev_iovar_getbuf(ndev, "fils", (uint8*)iov_buf, sizeof(bcm_iov_buf_t),
|
|
iov_buf, WLC_IOCTL_SMLEN, NULL);
|
|
if (err == BCME_UNSUPPORTED) {
|
|
WL_DBG(("FILS NOT supported\n"));
|
|
return false;
|
|
}
|
|
|
|
WL_INFORM(("FILS supported\n"));
|
|
return true;
|
|
}
|
|
|
|
#define WL_NUM_OF_TLV_IN_SET_FILS_PARAMS 4u
|
|
static s32
|
|
wl_set_fils_params(struct net_device *dev, struct cfg80211_connect_params *sme)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(dev);
|
|
bcm_iov_buf_t *iov_buf = NULL;
|
|
bcm_xtlvbuf_t tbuf;
|
|
s32 err = BCME_OK;
|
|
uint32 buf_size;
|
|
|
|
if ((sme->auth_type != NL80211_AUTHTYPE_FILS_SK) &&
|
|
(sme->auth_type != NL80211_AUTHTYPE_FILS_SK_PFS) &&
|
|
(sme->auth_type != NL80211_AUTHTYPE_FILS_PK)) {
|
|
return BCME_OK;
|
|
}
|
|
if (sme->fils_erp_rrk_len > WL_MAX_FILS_KEY_LEN) {
|
|
WL_ERR(("%s: FILS rRK exceed allowed size\n", __FUNCTION__));
|
|
err = BCME_BADARG;
|
|
goto exit;
|
|
}
|
|
/* Check incoming buffer length */
|
|
buf_size = sme->fils_erp_username_len + sme->fils_erp_realm_len + sme->fils_erp_rrk_len +
|
|
sizeof(sme->fils_erp_next_seq_num) +
|
|
WL_NUM_OF_TLV_IN_SET_FILS_PARAMS * BCM_XTLV_HDR_SIZE_EX(BCM_XTLV_OPTION_ALIGN32) +
|
|
sizeof(bcm_iov_buf_t) - 1u;
|
|
|
|
if (buf_size > WLC_IOCTL_SMLEN) {
|
|
WL_ERR(("%s: FILS connect params arguments exceed allowed size\n", __FUNCTION__));
|
|
err = BCME_BADARG;
|
|
goto exit;
|
|
}
|
|
iov_buf = MALLOCZ(cfg->osh, WLC_IOCTL_SMLEN);
|
|
if (!iov_buf) {
|
|
WL_ERR(("%s: iov_buf alloc failed! %d bytes\n", __FUNCTION__, WLC_IOCTL_SMLEN));
|
|
err = BCME_NOMEM;
|
|
goto exit;
|
|
}
|
|
iov_buf->version = WL_FILS_IOV_VERSION;
|
|
iov_buf->id = WL_FILS_CMD_ADD_CONNECT_PARAMS;
|
|
/* check if this should be len w/o headers */
|
|
err = bcm_xtlv_buf_init(&tbuf, (uint8*)&iov_buf->data[0],
|
|
WLC_IOCTL_SMLEN - sizeof(bcm_iov_buf_t) + sizeof(uint16),
|
|
BCM_XTLV_OPTION_ALIGN32);
|
|
if (err != BCME_OK) {
|
|
WL_ERR(("%s: xtlv_context initialization failed\n", __FUNCTION__));
|
|
goto exit;
|
|
}
|
|
if (sme->fils_erp_username_len && sme->fils_erp_username != NULL) {
|
|
err = bcm_xtlv_put_data(&tbuf, WL_FILS_XTLV_ERP_USERNAME,
|
|
sme->fils_erp_username, sme->fils_erp_username_len);
|
|
if (err != BCME_OK) {
|
|
WL_ERR(("%s: write xtlv failed\n", __FUNCTION__));
|
|
goto exit;
|
|
}
|
|
}
|
|
if (sme->fils_erp_realm_len && sme->fils_erp_realm != NULL) {
|
|
err = bcm_xtlv_put_data(&tbuf, WL_FILS_XTLV_ERP_REALM,
|
|
sme->fils_erp_realm, sme->fils_erp_realm_len);
|
|
if (err != BCME_OK) {
|
|
WL_ERR(("%s: write xtlv failed\n", __FUNCTION__));
|
|
goto exit;
|
|
}
|
|
}
|
|
if (sme->fils_erp_rrk_len && sme->fils_erp_rrk != NULL) {
|
|
err = bcm_xtlv_put_data(&tbuf, WL_FILS_XTLV_ERP_RRK,
|
|
sme->fils_erp_rrk, sme->fils_erp_rrk_len);
|
|
if (err != BCME_OK) {
|
|
WL_ERR(("%s: write xtlv failed\n", __FUNCTION__));
|
|
goto exit;
|
|
}
|
|
}
|
|
err = bcm_xtlv_put_data(&tbuf, WL_FILS_XTLV_ERP_NEXT_SEQ_NUM,
|
|
(u8 *)&sme->fils_erp_next_seq_num, sizeof(sme->fils_erp_next_seq_num));
|
|
if (err != BCME_OK) {
|
|
WL_ERR(("%s: write xtlv failed\n", __FUNCTION__));
|
|
goto exit;
|
|
}
|
|
iov_buf->len = bcm_xtlv_buf_len(&tbuf);
|
|
err = wldev_iovar_setbuf(dev, "fils", iov_buf, iov_buf->len + sizeof(bcm_iov_buf_t) -
|
|
sizeof(uint16), cfg->ioctl_buf, WLC_IOCTL_SMLEN, &cfg->ioctl_buf_sync);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("set fils params ioctl error (%d)\n", err));
|
|
goto exit;
|
|
}
|
|
|
|
exit:
|
|
if (err != BCME_OK) {
|
|
WL_ERR(("set FILS params error %d\n", err));
|
|
}
|
|
else {
|
|
WL_INFORM_MEM(("FILS parameters succesfully applied\n"));
|
|
}
|
|
if (iov_buf) {
|
|
MFREE(cfg->osh, iov_buf, WLC_IOCTL_SMLEN);
|
|
}
|
|
return err;
|
|
}
|
|
|
|
#if !defined(WL_FILS_ROAM_OFFLD) && defined(WL_FILS)
|
|
static s32
|
|
wl_get_bcn_timeout(struct net_device *dev, u32 *bcn_timeout)
|
|
{
|
|
s32 err = 0;
|
|
|
|
err = wldev_iovar_getint(dev, "bcn_timeout", bcn_timeout);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("could not get bcn_timeout (%d)\n", err));
|
|
}
|
|
return err;
|
|
}
|
|
|
|
#define WL_ROAM_ENABLE 0
|
|
#define WL_ROAM_DISABLE 1
|
|
/* Beacon Timeout beacon loss in case FILS roaming offload is not supported by fw */
|
|
#define WL_BCN_TIMEOUT 3
|
|
|
|
static s32
|
|
wl_fils_toggle_roaming(struct net_device *dev, u32 auth_type)
|
|
{
|
|
s32 err = 0;
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(dev);
|
|
|
|
if (WPA2_AUTH_IS_FILS(auth_type) && !cfg->fils_info.fils_roam_disabled) {
|
|
err = wl_get_bcn_timeout(dev, &cfg->fils_info.fils_bcn_timeout_cache);
|
|
if (unlikely(err)) {
|
|
return err;
|
|
}
|
|
wl_dongle_roam(dev, WL_ROAM_DISABLE, WL_BCN_TIMEOUT);
|
|
cfg->fils_info.fils_roam_disabled = true;
|
|
WL_INFORM_MEM(("fw roam disabled for FILS akm\n"));
|
|
} else if (cfg->fils_info.fils_roam_disabled) {
|
|
/* Enable roaming back for other auth types */
|
|
wl_dongle_roam(dev, WL_ROAM_ENABLE, cfg->fils_info.fils_bcn_timeout_cache);
|
|
cfg->fils_info.fils_roam_disabled = false;
|
|
WL_INFORM_MEM(("fw roam enabled\n"));
|
|
}
|
|
return err;
|
|
}
|
|
#endif /* !WL_FILS_ROAM_OFFLD && WL_FILS */
|
|
#endif /* WL_FILS */
|
|
|
|
static s32
|
|
wl_set_key_mgmt(struct net_device *dev, struct cfg80211_connect_params *sme)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(dev);
|
|
struct wl_security *sec;
|
|
s32 val = 0;
|
|
s32 err = 0;
|
|
s32 bssidx;
|
|
|
|
if ((bssidx = wl_get_bssidx_by_wdev(cfg, dev->ieee80211_ptr)) < 0) {
|
|
WL_ERR(("Find p2p index from wdev(%p) failed\n", dev->ieee80211_ptr));
|
|
return BCME_ERROR;
|
|
}
|
|
|
|
if (sme->crypto.n_akm_suites) {
|
|
err = wldev_iovar_getint(dev, "wpa_auth", &val);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("could not get wpa_auth (%d)\n", err));
|
|
return err;
|
|
}
|
|
if (val & (WPA_AUTH_PSK |
|
|
WPA_AUTH_UNSPECIFIED)) {
|
|
switch (sme->crypto.akm_suites[0]) {
|
|
case WLAN_AKM_SUITE_8021X:
|
|
val = WPA_AUTH_UNSPECIFIED;
|
|
break;
|
|
case WLAN_AKM_SUITE_PSK:
|
|
val = WPA_AUTH_PSK;
|
|
break;
|
|
default:
|
|
WL_ERR(("invalid akm suite (0x%x)\n",
|
|
sme->crypto.akm_suites[0]));
|
|
return -EINVAL;
|
|
}
|
|
} else if (val & (WPA2_AUTH_PSK |
|
|
WPA2_AUTH_UNSPECIFIED)) {
|
|
switch (sme->crypto.akm_suites[0]) {
|
|
#ifdef MFP
|
|
case WL_AKM_SUITE_SHA256_1X:
|
|
val = WPA2_AUTH_1X_SHA256;
|
|
break;
|
|
case WL_AKM_SUITE_SHA256_PSK:
|
|
val = WPA2_AUTH_PSK_SHA256;
|
|
break;
|
|
#endif /* MFP */
|
|
case WLAN_AKM_SUITE_8021X:
|
|
case WLAN_AKM_SUITE_PSK:
|
|
#if defined(WLFBT) && defined(WLAN_AKM_SUITE_FT_8021X)
|
|
case WLAN_AKM_SUITE_FT_8021X:
|
|
#endif // endif
|
|
#if defined(WLFBT) && defined(WLAN_AKM_SUITE_FT_PSK)
|
|
case WLAN_AKM_SUITE_FT_PSK:
|
|
#endif // endif
|
|
case WLAN_AKM_SUITE_FILS_SHA256:
|
|
case WLAN_AKM_SUITE_FILS_SHA384:
|
|
case WLAN_AKM_SUITE_8021X_SUITE_B:
|
|
case WLAN_AKM_SUITE_8021X_SUITE_B_192:
|
|
#ifdef WL_OWE
|
|
case WLAN_AKM_SUITE_OWE:
|
|
#endif /* WL_OWE */
|
|
case WLAN_AKM_SUITE_FT_8021X_SHA384:
|
|
val = wl_rsn_akm_wpa_auth_lookup(sme->crypto.akm_suites[0]);
|
|
break;
|
|
case WLAN_AKM_SUITE_FT_FILS_SHA256:
|
|
val = WPA2_AUTH_FILS_SHA256 | WPA2_AUTH_FT;
|
|
break;
|
|
case WLAN_AKM_SUITE_FT_FILS_SHA384:
|
|
val = WPA2_AUTH_FILS_SHA384 | WPA2_AUTH_FT;
|
|
break;
|
|
#if defined(WL_SAE) || defined(WL_CLIENT_SAE)
|
|
case WLAN_AKM_SUITE_SAE:
|
|
val = WPA3_AUTH_SAE_PSK;
|
|
break;
|
|
#endif /* WL_SAE || WL_CLIENT_SAE */
|
|
default:
|
|
WL_ERR(("invalid akm suite (0x%x)\n",
|
|
sme->crypto.akm_suites[0]));
|
|
return -EINVAL;
|
|
}
|
|
}
|
|
#ifdef BCMWAPI_WPI
|
|
else if (val & (WAPI_AUTH_PSK | WAPI_AUTH_UNSPECIFIED)) {
|
|
switch (sme->crypto.akm_suites[0]) {
|
|
case WLAN_AKM_SUITE_WAPI_CERT:
|
|
val = WAPI_AUTH_UNSPECIFIED;
|
|
break;
|
|
case WLAN_AKM_SUITE_WAPI_PSK:
|
|
val = WAPI_AUTH_PSK;
|
|
break;
|
|
default:
|
|
WL_ERR(("invalid akm suite (0x%x)\n",
|
|
sme->crypto.akm_suites[0]));
|
|
return -EINVAL;
|
|
}
|
|
}
|
|
#endif // endif
|
|
|
|
#ifdef WL_FILS
|
|
#if !defined(WL_FILS_ROAM_OFFLD)
|
|
err = wl_fils_toggle_roaming(dev, val);
|
|
if (unlikely(err)) {
|
|
return err;
|
|
}
|
|
#endif /* !WL_FILS_ROAM_OFFLD */
|
|
#endif /* !WL_FILS */
|
|
|
|
#ifdef MFP
|
|
if ((err = wl_cfg80211_set_mfp(cfg, dev, sme)) < 0) {
|
|
WL_ERR(("MFP set failed err:%d\n", err));
|
|
return -EINVAL;
|
|
}
|
|
#endif /* MFP */
|
|
|
|
WL_INFORM_MEM(("[%s] wl wpa_auth to 0x%x\n", dev->name, val));
|
|
err = wldev_iovar_setint_bsscfg(dev, "wpa_auth", val, bssidx);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("could not set wpa_auth (0x%x)\n", err));
|
|
return err;
|
|
}
|
|
}
|
|
sec = wl_read_prof(cfg, dev, WL_PROF_SEC);
|
|
sec->wpa_auth = sme->crypto.akm_suites[0];
|
|
|
|
return err;
|
|
}
|
|
|
|
static s32
|
|
wl_set_set_sharedkey(struct net_device *dev,
|
|
struct cfg80211_connect_params *sme)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(dev);
|
|
struct wl_security *sec;
|
|
struct wl_wsec_key key;
|
|
s32 val;
|
|
s32 err = 0;
|
|
s32 bssidx;
|
|
|
|
if ((bssidx = wl_get_bssidx_by_wdev(cfg, dev->ieee80211_ptr)) < 0) {
|
|
WL_ERR(("Find p2p index from wdev(%p) failed\n", dev->ieee80211_ptr));
|
|
return BCME_ERROR;
|
|
}
|
|
|
|
WL_DBG(("key len (%d)\n", sme->key_len));
|
|
if (sme->key_len) {
|
|
sec = wl_read_prof(cfg, dev, WL_PROF_SEC);
|
|
WL_DBG(("wpa_versions 0x%x cipher_pairwise 0x%x\n",
|
|
sec->wpa_versions, sec->cipher_pairwise));
|
|
if (!(sec->wpa_versions & (NL80211_WPA_VERSION_1 |
|
|
NL80211_WPA_VERSION_2)) &&
|
|
#ifdef BCMWAPI_WPI
|
|
!is_wapi(sec->cipher_pairwise) &&
|
|
#endif // endif
|
|
(sec->cipher_pairwise & (WLAN_CIPHER_SUITE_WEP40 |
|
|
WLAN_CIPHER_SUITE_WEP104)))
|
|
{
|
|
bzero(&key, sizeof(key));
|
|
key.len = (u32) sme->key_len;
|
|
key.index = (u32) sme->key_idx;
|
|
if (unlikely(key.len > sizeof(key.data))) {
|
|
WL_ERR(("Too long key length (%u)\n", key.len));
|
|
return -EINVAL;
|
|
}
|
|
memcpy(key.data, sme->key, key.len);
|
|
key.flags = WL_PRIMARY_KEY;
|
|
if ((sec->cipher_pairwise == WLAN_CIPHER_SUITE_WEP40) ||
|
|
(sec->cipher_pairwise == WLAN_CIPHER_SUITE_WEP104)) {
|
|
key.algo = wl_rsn_cipher_wsec_key_algo_lookup(sec->cipher_pairwise);
|
|
} else {
|
|
WL_ERR(("Invalid algorithm (%d)\n",
|
|
sme->crypto.ciphers_pairwise[0]));
|
|
return -EINVAL;
|
|
}
|
|
/* Set the new key/index */
|
|
WL_DBG(("key length (%d) key index (%d) algo (%d)\n",
|
|
key.len, key.index, key.algo));
|
|
WL_DBG(("key \"%s\"\n", key.data));
|
|
swap_key_from_BE(&key);
|
|
err = wldev_iovar_setbuf_bsscfg(dev, "wsec_key", &key, sizeof(key),
|
|
cfg->ioctl_buf, WLC_IOCTL_MAXLEN, bssidx, &cfg->ioctl_buf_sync);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("WLC_SET_KEY error (%d)\n", err));
|
|
return err;
|
|
}
|
|
WL_INFORM_MEM(("key applied to fw\n"));
|
|
if (sec->auth_type == NL80211_AUTHTYPE_SHARED_KEY) {
|
|
WL_DBG(("set auth_type to shared key\n"));
|
|
val = WL_AUTH_SHARED_KEY; /* shared key */
|
|
err = wldev_iovar_setint_bsscfg(dev, "auth", val, bssidx);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("set auth failed (%d)\n", err));
|
|
return err;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
return err;
|
|
}
|
|
|
|
#if defined(ESCAN_RESULT_PATCH)
|
|
static u8 connect_req_bssid[6];
|
|
static u8 broad_bssid[6];
|
|
#endif /* ESCAN_RESULT_PATCH */
|
|
|
|
#if defined(CUSTOM_SET_CPUCORE) || defined(CONFIG_TCPACK_FASTTX)
|
|
static bool wl_get_chan_isvht80(struct net_device *net, dhd_pub_t *dhd)
|
|
{
|
|
u32 chanspec = 0;
|
|
bool isvht80 = 0;
|
|
|
|
if (wldev_iovar_getint(net, "chanspec", (s32 *)&chanspec) == BCME_OK)
|
|
chanspec = wl_chspec_driver_to_host(chanspec);
|
|
|
|
isvht80 = chanspec & WL_CHANSPEC_BW_80;
|
|
WL_DBG(("wl_get_chan_isvht80: chanspec(%x:%d)\n", chanspec, isvht80));
|
|
|
|
return isvht80;
|
|
}
|
|
#endif /* CUSTOM_SET_CPUCORE || CONFIG_TCPACK_FASTTX */
|
|
|
|
int wl_cfg80211_cleanup_mismatch_status(struct net_device *dev, struct bcm_cfg80211 *cfg,
|
|
bool disassociate)
|
|
{
|
|
scb_val_t scbval;
|
|
int err = TRUE;
|
|
int wait_cnt;
|
|
|
|
if (disassociate) {
|
|
dhd_pub_t *dhdp = (dhd_pub_t *)(cfg->pub);
|
|
BCM_REFERENCE(dhdp);
|
|
DHD_STATLOG_CTRL(dhdp, ST(DISASSOC_INT_START),
|
|
dhd_net2idx(dhdp->info, dev), DOT11_RC_DISASSOC_LEAVING);
|
|
WL_ERR(("Disassociate previous connection!\n"));
|
|
wl_set_drv_status(cfg, DISCONNECTING, dev);
|
|
scbval.val = DOT11_RC_DISASSOC_LEAVING;
|
|
scbval.val = htod32(scbval.val);
|
|
|
|
err = wldev_ioctl_set(dev, WLC_DISASSOC, &scbval,
|
|
sizeof(scb_val_t));
|
|
if (unlikely(err)) {
|
|
wl_clr_drv_status(cfg, DISCONNECTING, dev);
|
|
WL_ERR(("error (%d)\n", err));
|
|
return err;
|
|
}
|
|
wait_cnt = 500/10;
|
|
} else {
|
|
wait_cnt = 200/10;
|
|
WL_ERR(("Waiting for previous DISCONNECTING status!\n"));
|
|
if (wl_get_drv_status(cfg, DISCONNECTING, dev)) {
|
|
wl_clr_drv_status(cfg, DISCONNECTING, dev);
|
|
}
|
|
}
|
|
|
|
while (wl_get_drv_status(cfg, DISCONNECTING, dev) && wait_cnt) {
|
|
WL_DBG(("Waiting for disconnection terminated, wait_cnt: %d\n",
|
|
wait_cnt));
|
|
wait_cnt--;
|
|
OSL_SLEEP(10);
|
|
}
|
|
|
|
if (wait_cnt == 0) {
|
|
WL_ERR(("DISCONNECING clean up failed!\n"));
|
|
/* Clear DISCONNECTING driver status as we have made sufficient attempts
|
|
* for driver clean up.
|
|
*/
|
|
wl_clr_drv_status(cfg, DISCONNECTING, dev);
|
|
wl_clr_drv_status(cfg, CONNECTED, dev);
|
|
return BCME_NOTREADY;
|
|
}
|
|
return BCME_OK;
|
|
}
|
|
|
|
#ifdef WL_FILS
|
|
static int
|
|
wl_fils_add_hlp_container(struct bcm_cfg80211 *cfg, struct net_device *dev,
|
|
const uint8* ie_buf, uint16 ie_len)
|
|
{
|
|
const bcm_tlv_ext_t *hlp_ie;
|
|
|
|
if ((hlp_ie = (const bcm_tlv_ext_t*)bcm_parse_tlvs_dot11((const uint8 *)ie_buf, ie_len,
|
|
FILS_HLP_CONTAINER_EXT_ID, TRUE))) {
|
|
u16 hlp_len = hlp_ie->len;
|
|
u16 left_len = (ie_len - ((const uint8*)hlp_ie - ie_buf));
|
|
bcm_iov_buf_t *iov_buf = 0;
|
|
uint8* pxtlv;
|
|
int err;
|
|
size_t iov_buf_len;
|
|
bcm_tlv_dot11_frag_tot_len(ie_buf, ie_len, FILS_HLP_CONTAINER_EXT_ID,
|
|
TRUE, (uint*)&hlp_len);
|
|
|
|
hlp_len += BCM_TLV_EXT_HDR_SIZE;
|
|
|
|
if ((hlp_len > DOT11_MAX_MPDU_BODY_LEN) || (hlp_len > left_len)) {
|
|
WL_ERR(("bad HLP length %d\n", hlp_len));
|
|
return EFAULT;
|
|
}
|
|
iov_buf_len = sizeof(bcm_iov_buf_t) + sizeof(bcm_xtlv_t) - 1 + hlp_len;
|
|
iov_buf = MALLOCZ(cfg->osh, iov_buf_len);
|
|
if (iov_buf == NULL) {
|
|
WL_ERR(("failed to allocated iov_buf\n"));
|
|
return ENOMEM;
|
|
}
|
|
|
|
prhex("HLP, HLP", (const uchar *)hlp_ie, hlp_len);
|
|
|
|
pxtlv = (uint8 *)&iov_buf->data[0];
|
|
((bcm_xtlv_t*)pxtlv)->id = WL_FILS_XTLV_HLP_IE;
|
|
((bcm_xtlv_t*)pxtlv)->len = hlp_len;
|
|
|
|
memcpy(((bcm_xtlv_t*)pxtlv)->data, hlp_ie, ((bcm_xtlv_t*)pxtlv)->len);
|
|
|
|
iov_buf->version = WL_FILS_IOV_VERSION;
|
|
iov_buf->id = WL_FILS_CMD_ADD_HLP_IE;
|
|
iov_buf->len = ((sizeof(bcm_xtlv_t)-1) + ((bcm_xtlv_t*)pxtlv)->len);
|
|
|
|
err = wldev_iovar_setbuf(dev, "fils", iov_buf,
|
|
sizeof(bcm_iov_buf_t) + iov_buf->len,
|
|
cfg->ioctl_buf, WLC_IOCTL_MAXLEN, &cfg->ioctl_buf_sync);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("fils wldev_iovar_setbuf error (%d)\n", err));
|
|
}
|
|
else {
|
|
WL_INFORM_MEM(("FILS HLP Packet succesfully updated\n"));
|
|
}
|
|
MFREE(cfg->osh, iov_buf, iov_buf_len);
|
|
}
|
|
return BCME_OK;
|
|
}
|
|
#endif /* WL_FILS */
|
|
|
|
#if defined(WL_FILS)
|
|
#ifndef UPDATE_FILS_ERP_INFO
|
|
#define UPDATE_FILS_ERP_INFO BIT(1)
|
|
#define UPDATE_AUTH_TYPE BIT(2)
|
|
#endif // endif
|
|
|
|
static int
|
|
wl_cfg80211_update_connect_params(struct wiphy *wiphy, struct net_device *dev,
|
|
struct cfg80211_connect_params *sme, u32 changed)
|
|
{
|
|
s32 err = BCME_OK;
|
|
if (changed & UPDATE_FILS_ERP_INFO) {
|
|
err = wl_set_fils_params(dev, sme);
|
|
|
|
if (unlikely(err)) {
|
|
WL_ERR(("Invalid FILS params\n"));
|
|
goto exit;
|
|
}
|
|
}
|
|
if (changed & UPDATE_AUTH_TYPE) {
|
|
err = wl_set_auth_type(dev, sme);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("Invalid auth type\n"));
|
|
goto exit;
|
|
}
|
|
}
|
|
if ((changed & UPDATE_FILS_ERP_INFO) && !(changed & UPDATE_AUTH_TYPE)) {
|
|
WL_DBG(("Warning: FILS ERP params are set, but authentication type - not\n"));
|
|
}
|
|
exit:
|
|
return err;
|
|
|
|
}
|
|
#endif /* WL_FILS */
|
|
|
|
#define MAX_SCAN_ABORT_WAIT_CNT 20
|
|
#define WAIT_SCAN_ABORT_OSL_SLEEP_TIME 10
|
|
|
|
static s32
|
|
wl_cfg80211_connect(struct wiphy *wiphy, struct net_device *dev,
|
|
struct cfg80211_connect_params *sme)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wiphy_priv(wiphy);
|
|
struct ieee80211_channel *chan = sme->channel;
|
|
wl_extjoin_params_t *ext_join_params;
|
|
struct wl_join_params join_params;
|
|
size_t join_params_size;
|
|
dhd_pub_t *dhdp = (dhd_pub_t *)(cfg->pub);
|
|
#if defined(ROAM_ENABLE) && defined(ROAM_AP_ENV_DETECTION)
|
|
s32 roam_trigger[2] = {0, 0};
|
|
#endif /* ROAM_AP_ENV_DETECTION */
|
|
s32 err = 0;
|
|
const wpa_ie_fixed_t *wpa_ie;
|
|
const bcm_tlv_t *wpa2_ie;
|
|
const u8* wpaie = 0;
|
|
u32 wpaie_len = 0;
|
|
u32 chan_cnt = 0;
|
|
struct ether_addr bssid;
|
|
s32 bssidx = -1;
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 15, 0))
|
|
bool skip_hints = fw_ap_select;
|
|
#endif /* LINUX_VERSION_CODE >= KERNEL_VERSION(3, 15, 0) */
|
|
#ifdef ESCAN_CHANNEL_CACHE
|
|
chanspec_t chanspec_list[MAX_ROAM_CHANNEL];
|
|
#endif /* ESCAN_CHANNEL_CACHE */
|
|
int wait_cnt;
|
|
char sec[32];
|
|
|
|
WL_DBG(("In\n"));
|
|
if (!dev) {
|
|
WL_ERR(("dev is null\n"));
|
|
return -EINVAL;
|
|
}
|
|
BCM_REFERENCE(dhdp);
|
|
DHD_STATLOG_CTRL(dhdp, ST(ASSOC_START), dhd_net2idx(dhdp->info, dev), 0);
|
|
|
|
#ifdef ESCAN_CHANNEL_CACHE
|
|
memset(chanspec_list, 0, (sizeof(chanspec_t) * MAX_ROAM_CHANNEL));
|
|
#endif /* ESCAN_CHANNEL_CACHE */
|
|
|
|
/* Connection attempted via linux-wireless */
|
|
wl_set_drv_status(cfg, CFG80211_CONNECT, dev);
|
|
#ifdef DHDTCPSYNC_FLOOD_BLK
|
|
dhd_reset_tcpsync_info_by_dev(dev);
|
|
#endif /* DHDTCPSYNC_FLOOD_BLK */
|
|
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 15, 0))
|
|
#ifdef WL_SKIP_CONNECT_HINTS
|
|
skip_hints = true;
|
|
#elif defined(WL_FW_OCE_AP_SELECT)
|
|
/* override bssid_hint for oce networks */
|
|
skip_hints = (fw_ap_select && wl_cfg80211_is_oce_ap(wiphy, sme->bssid_hint));
|
|
#endif // endif
|
|
if (skip_hints) {
|
|
/* Let fw choose the best AP */
|
|
WL_INFORM(("skipping bssid & channel hint\n"));
|
|
} else {
|
|
if (sme->channel_hint) {
|
|
chan = sme->channel_hint;
|
|
WL_INFORM_MEM(("channel_hint (%d), channel_hint center_freq (%d)\n",
|
|
ieee80211_frequency_to_channel(sme->channel_hint->center_freq),
|
|
sme->channel_hint->center_freq));
|
|
}
|
|
if (sme->bssid_hint) {
|
|
sme->bssid = sme->bssid_hint;
|
|
WL_INFORM_MEM(("bssid_hint "MACDBG" \n", MAC2STRDBG(sme->bssid_hint)));
|
|
}
|
|
}
|
|
#endif /* LINUX_VERSION_CODE >= KERNEL_VERSION(3, 15, 0) */
|
|
|
|
if (unlikely(!sme->ssid)) {
|
|
WL_ERR(("Invalid ssid\n"));
|
|
return -EOPNOTSUPP;
|
|
}
|
|
|
|
if (unlikely(sme->ssid_len > DOT11_MAX_SSID_LEN)) {
|
|
WL_ERR(("Invalid SSID info: SSID=%s, length=%zd\n",
|
|
sme->ssid, sme->ssid_len));
|
|
return -EINVAL;
|
|
}
|
|
|
|
WL_DBG(("SME IE : len=%zu\n", sme->ie_len));
|
|
if (sme->ie != NULL && sme->ie_len > 0 && (wl_dbg_level & WL_DBG_DBG)) {
|
|
prhex(NULL, sme->ie, sme->ie_len);
|
|
}
|
|
|
|
RETURN_EIO_IF_NOT_UP(cfg);
|
|
/*
|
|
* Cancel ongoing scan to sync up with sme state machine of cfg80211.
|
|
*/
|
|
if (cfg->scan_request) {
|
|
WL_TRACE_HW4(("Aborting the scan! \n"));
|
|
wl_cfg80211_scan_abort(cfg);
|
|
wait_cnt = MAX_SCAN_ABORT_WAIT_CNT;
|
|
while (wl_get_drv_status(cfg, SCANNING, dev) && wait_cnt) {
|
|
WL_DBG(("Waiting for SCANNING terminated, wait_cnt: %d\n", wait_cnt));
|
|
wait_cnt--;
|
|
OSL_SLEEP(WAIT_SCAN_ABORT_OSL_SLEEP_TIME);
|
|
}
|
|
if (wl_get_drv_status(cfg, SCANNING, dev)) {
|
|
wl_cfg80211_cancel_scan(cfg);
|
|
}
|
|
}
|
|
#ifdef WL_SCHED_SCAN
|
|
/* Locks are taken in wl_cfg80211_sched_scan_stop()
|
|
* A start scan occuring during connect is unlikely
|
|
*/
|
|
if (cfg->sched_scan_req) {
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(4, 12, 0))
|
|
wl_cfg80211_sched_scan_stop(wiphy, bcmcfg_to_prmry_ndev(cfg),
|
|
cfg->sched_scan_req->reqid);
|
|
#else
|
|
wl_cfg80211_sched_scan_stop(wiphy, bcmcfg_to_prmry_ndev(cfg));
|
|
#endif /* (LINUX_VERSION_CODE >= KERNEL_VERSION(4, 12, 0)) */
|
|
}
|
|
#endif /* WL_SCHED_SCAN */
|
|
#ifdef WL_CFG80211_GON_COLLISION
|
|
/* init block gon req count */
|
|
cfg->block_gon_req_tx_count = 0;
|
|
cfg->block_gon_req_rx_count = 0;
|
|
#endif /* WL_CFG80211_GON_COLLISION */
|
|
#if defined(ESCAN_RESULT_PATCH)
|
|
if (sme->bssid)
|
|
memcpy(connect_req_bssid, sme->bssid, ETHER_ADDR_LEN);
|
|
else
|
|
bzero(connect_req_bssid, ETHER_ADDR_LEN);
|
|
bzero(broad_bssid, ETHER_ADDR_LEN);
|
|
#endif // endif
|
|
#if defined(USE_DYNAMIC_MAXPKT_RXGLOM)
|
|
maxrxpktglom = 0;
|
|
#endif // endif
|
|
if (wl_get_drv_status(cfg, CONNECTING, dev) || wl_get_drv_status(cfg, CONNECTED, dev)) {
|
|
/* set nested connect bit to identify the context */
|
|
wl_set_drv_status(cfg, NESTED_CONNECT, dev);
|
|
/* DHD prev status is CONNECTING/CONNECTED */
|
|
err = wl_cfg80211_cleanup_mismatch_status(dev, cfg, TRUE);
|
|
} else if (wl_get_drv_status(cfg, DISCONNECTING, dev)) {
|
|
/* DHD prev status is DISCONNECTING */
|
|
err = wl_cfg80211_cleanup_mismatch_status(dev, cfg, false);
|
|
} else if (!wl_get_drv_status(cfg, CONNECTED, dev)) {
|
|
/* DHD previous status is not connected and FW connected */
|
|
if (wldev_ioctl_get(dev, WLC_GET_BSSID, &bssid, ETHER_ADDR_LEN) == 0) {
|
|
/* set nested connect bit to identify the context */
|
|
wl_set_drv_status(cfg, NESTED_CONNECT, dev);
|
|
err = wl_cfg80211_cleanup_mismatch_status(dev, cfg, true);
|
|
}
|
|
}
|
|
wl_cfg80211_check_in4way(cfg, dev, WAIT_DISCONNECTED,
|
|
WL_EXT_STATUS_CONNECTING, NULL);
|
|
|
|
if (sme->bssid) {
|
|
wl_update_prof(cfg, dev, NULL, sme->bssid, WL_PROF_LATEST_BSSID);
|
|
} else {
|
|
wl_update_prof(cfg, dev, NULL, ðer_bcast, WL_PROF_LATEST_BSSID);
|
|
}
|
|
#ifdef SUPPORT_AP_BWCTRL
|
|
if (dhdp->op_mode & DHD_FLAG_HOSTAP_MODE) {
|
|
wl_restore_ap_bw(cfg);
|
|
}
|
|
#endif /* SUPPORT_AP_BWCTRL */
|
|
/* 'connect' request received */
|
|
wl_set_drv_status(cfg, CONNECTING, dev);
|
|
/* clear nested connect bit on proceeding for connection */
|
|
wl_clr_drv_status(cfg, NESTED_CONNECT, dev);
|
|
|
|
/* Clean BSSID */
|
|
bzero(&bssid, sizeof(bssid));
|
|
if (!wl_get_drv_status(cfg, DISCONNECTING, dev))
|
|
wl_update_prof(cfg, dev, NULL, (void *)&bssid, WL_PROF_BSSID);
|
|
|
|
if (p2p_is_on(cfg) && (dev != bcmcfg_to_prmry_ndev(cfg))) {
|
|
/* we only allow to connect using virtual interface in case of P2P */
|
|
if ((bssidx = wl_get_bssidx_by_wdev(cfg, dev->ieee80211_ptr)) < 0) {
|
|
WL_ERR(("Find p2p index from wdev(%p) failed\n",
|
|
dev->ieee80211_ptr));
|
|
err = BCME_ERROR;
|
|
goto exit;
|
|
}
|
|
wl_cfg80211_set_mgmt_vndr_ies(cfg, ndev_to_cfgdev(dev), bssidx,
|
|
VNDR_IE_ASSOCREQ_FLAG, sme->ie, sme->ie_len);
|
|
} else if (dev == bcmcfg_to_prmry_ndev(cfg)) {
|
|
if ((bssidx = wl_get_bssidx_by_wdev(cfg, dev->ieee80211_ptr)) < 0) {
|
|
WL_ERR(("Find wlan index from wdev(%p) failed\n", dev->ieee80211_ptr));
|
|
err = BCME_ERROR;
|
|
goto exit;
|
|
}
|
|
|
|
/* find the RSN_IE */
|
|
if ((wpa2_ie = bcm_parse_tlvs((const u8 *)sme->ie, sme->ie_len,
|
|
DOT11_MNG_RSN_ID)) != NULL) {
|
|
WL_DBG((" WPA2 IE is found\n"));
|
|
}
|
|
/* find the WPA_IE */
|
|
if ((wpa_ie = wl_cfgp2p_find_wpaie(sme->ie,
|
|
sme->ie_len)) != NULL) {
|
|
WL_DBG((" WPA IE is found\n"));
|
|
}
|
|
if (wpa_ie != NULL || wpa2_ie != NULL) {
|
|
wpaie = (wpa_ie != NULL) ? (const u8 *)wpa_ie : (const u8 *)wpa2_ie;
|
|
wpaie_len = (wpa_ie != NULL) ? wpa_ie->length : wpa2_ie->len;
|
|
wpaie_len += WPA_RSN_IE_TAG_FIXED_LEN;
|
|
err = wldev_iovar_setbuf(dev, "wpaie", wpaie, wpaie_len,
|
|
cfg->ioctl_buf, WLC_IOCTL_MAXLEN, &cfg->ioctl_buf_sync);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("wpaie set error (%d)\n", err));
|
|
goto exit;
|
|
}
|
|
} else {
|
|
err = wldev_iovar_setbuf(dev, "wpaie", NULL, 0,
|
|
cfg->ioctl_buf, WLC_IOCTL_MAXLEN, &cfg->ioctl_buf_sync);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("wpaie set error (%d)\n", err));
|
|
goto exit;
|
|
}
|
|
}
|
|
err = wl_cfg80211_set_mgmt_vndr_ies(cfg, ndev_to_cfgdev(dev), bssidx,
|
|
VNDR_IE_ASSOCREQ_FLAG, (const u8 *)sme->ie, sme->ie_len);
|
|
if (unlikely(err)) {
|
|
goto exit;
|
|
}
|
|
}
|
|
#if defined(ROAM_ENABLE) && defined(ROAM_AP_ENV_DETECTION)
|
|
if (dhdp->roam_env_detection) {
|
|
bool is_roamtrig_reset = TRUE;
|
|
bool is_roam_env_ok = (wldev_iovar_setint(dev, "roam_env_detection",
|
|
AP_ENV_DETECT_NOT_USED) == BCME_OK);
|
|
#ifdef SKIP_ROAM_TRIGGER_RESET
|
|
roam_trigger[1] = WLC_BAND_2G;
|
|
is_roamtrig_reset =
|
|
(wldev_ioctl_get(dev, WLC_GET_ROAM_TRIGGER, roam_trigger,
|
|
sizeof(roam_trigger)) == BCME_OK) &&
|
|
(roam_trigger[0] == WL_AUTO_ROAM_TRIGGER-10);
|
|
#endif /* SKIP_ROAM_TRIGGER_RESET */
|
|
if (is_roamtrig_reset && is_roam_env_ok) {
|
|
roam_trigger[0] = WL_AUTO_ROAM_TRIGGER;
|
|
roam_trigger[1] = WLC_BAND_ALL;
|
|
err = wldev_ioctl_set(dev, WLC_SET_ROAM_TRIGGER, roam_trigger,
|
|
sizeof(roam_trigger));
|
|
if (unlikely(err)) {
|
|
WL_ERR((" failed to restore roam_trigger for auto env"
|
|
" detection\n"));
|
|
}
|
|
}
|
|
}
|
|
#endif /* ROAM_ENABLE && ROAM_AP_ENV_DETECTION */
|
|
if (chan) {
|
|
cfg->channel = ieee80211_frequency_to_channel(chan->center_freq);
|
|
chan_cnt = 1;
|
|
WL_DBG(("channel (%d), center_req (%d), %d channels\n", cfg->channel,
|
|
chan->center_freq, chan_cnt));
|
|
} else {
|
|
WL_DBG(("No channel info from user space\n"));
|
|
cfg->channel = 0;
|
|
}
|
|
#ifdef ESCAN_CHANNEL_CACHE
|
|
/*
|
|
* No channel information from user space. if ECC is enabled, the ECC
|
|
* would prepare the channel list, else no channel would be provided
|
|
* and firmware would need to do a full channel scan.
|
|
*
|
|
* Use cached channels. This might take slightly longer time compared
|
|
* to using a single channel based join. But ECC would help choose
|
|
* a better AP for a given ssid. For a given SSID there might multiple
|
|
* APs on different channels and ECC would scan all those channels
|
|
* before deciding up on the AP. This accounts for the additional delay.
|
|
*/
|
|
if (cfg->rcc_enabled || cfg->channel == 0)
|
|
{
|
|
wlc_ssid_t ssid;
|
|
int band;
|
|
|
|
err = wldev_get_band(dev, &band);
|
|
if (!err) {
|
|
set_roam_band(band);
|
|
}
|
|
|
|
memcpy(ssid.SSID, sme->ssid, sme->ssid_len);
|
|
ssid.SSID_len = (uint32)sme->ssid_len;
|
|
chan_cnt = get_roam_channel_list(cfg->channel, chanspec_list,
|
|
MAX_ROAM_CHANNEL, &ssid, ioctl_version);
|
|
WL_DBG(("RCC channel count:%d \n", chan_cnt));
|
|
}
|
|
#endif /* ESCAN_CHANNEL_CACHE */
|
|
WL_DBG(("3. set wpa version \n"));
|
|
|
|
err = wl_set_wpa_version(dev, sme);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("Invalid wpa_version\n"));
|
|
goto exit;
|
|
}
|
|
#ifdef BCMWAPI_WPI
|
|
if (sme->crypto.wpa_versions & NL80211_WAPI_VERSION_1)
|
|
WL_DBG(("4. WAPI Dont Set wl_set_auth_type\n"));
|
|
else {
|
|
WL_DBG(("4. wl_set_auth_type\n"));
|
|
#endif // endif
|
|
err = wl_set_auth_type(dev, sme);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("Invalid auth type\n"));
|
|
goto exit;
|
|
}
|
|
#ifdef BCMWAPI_WPI
|
|
}
|
|
#endif // endif
|
|
#ifdef WL_FILS
|
|
if (sme->ie && sme->ie_len) {
|
|
err = wl_fils_add_hlp_container(cfg, dev, sme->ie, sme->ie_len);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("FILS sending HLP failed\n"));
|
|
goto exit;
|
|
}
|
|
}
|
|
#endif /* WL_FILS */
|
|
err = wl_set_set_cipher(dev, sme);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("Invalid ciper\n"));
|
|
goto exit;
|
|
}
|
|
|
|
err = wl_set_key_mgmt(dev, sme);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("Invalid key mgmt\n"));
|
|
goto exit;
|
|
}
|
|
|
|
err = wl_set_set_sharedkey(dev, sme);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("Invalid shared key\n"));
|
|
goto exit;
|
|
}
|
|
#ifdef WL_FILS
|
|
err = wl_set_fils_params(dev, sme);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("Invalid FILS params\n"));
|
|
goto exit;
|
|
}
|
|
#endif /* WL_FILS */
|
|
|
|
/*
|
|
* Join with specific BSSID and cached SSID
|
|
* If SSID is zero join based on BSSID only
|
|
*/
|
|
join_params_size = WL_EXTJOIN_PARAMS_FIXED_SIZE +
|
|
chan_cnt * sizeof(chanspec_t);
|
|
ext_join_params = (wl_extjoin_params_t *)MALLOCZ(cfg->osh, join_params_size);
|
|
if (ext_join_params == NULL) {
|
|
err = -ENOMEM;
|
|
wl_clr_drv_status(cfg, CONNECTING, dev);
|
|
goto exit;
|
|
}
|
|
ext_join_params->ssid.SSID_len =
|
|
(uint32)min(sizeof(ext_join_params->ssid.SSID), sme->ssid_len);
|
|
memcpy(&ext_join_params->ssid.SSID, sme->ssid, ext_join_params->ssid.SSID_len);
|
|
wl_update_prof(cfg, dev, NULL, &ext_join_params->ssid, WL_PROF_SSID);
|
|
ext_join_params->ssid.SSID_len = htod32(ext_join_params->ssid.SSID_len);
|
|
/* increate dwell time to receive probe response or detect Beacon
|
|
* from target AP at a noisy air only during connect command
|
|
*/
|
|
ext_join_params->scan.active_time = chan_cnt ? WL_SCAN_JOIN_ACTIVE_DWELL_TIME_MS : -1;
|
|
ext_join_params->scan.passive_time = chan_cnt ? WL_SCAN_JOIN_PASSIVE_DWELL_TIME_MS : -1;
|
|
/* Set up join scan parameters */
|
|
ext_join_params->scan.scan_type = -1;
|
|
ext_join_params->scan.nprobes = chan_cnt ?
|
|
(ext_join_params->scan.active_time/WL_SCAN_JOIN_PROBE_INTERVAL_MS) : -1;
|
|
ext_join_params->scan.home_time = -1;
|
|
|
|
if (sme->bssid)
|
|
memcpy(&ext_join_params->assoc.bssid, sme->bssid, ETH_ALEN);
|
|
else
|
|
memcpy(&ext_join_params->assoc.bssid, ðer_bcast, ETH_ALEN);
|
|
ext_join_params->assoc.chanspec_num = chan_cnt;
|
|
|
|
if (chan_cnt && !cfg->rcc_enabled) {
|
|
if (cfg->channel) {
|
|
/*
|
|
* Use the channel provided by userspace
|
|
*/
|
|
u16 channel, band, bw, ctl_sb;
|
|
chanspec_t chspec;
|
|
channel = cfg->channel;
|
|
band = (channel <= CH_MAX_2G_CHANNEL) ? WL_CHANSPEC_BAND_2G
|
|
: WL_CHANSPEC_BAND_5G;
|
|
|
|
/* Get min_bw set for the interface */
|
|
bw = WL_CHANSPEC_BW_20;
|
|
if (bw == INVCHANSPEC) {
|
|
WL_ERR(("Invalid chanspec \n"));
|
|
MFREE(cfg->osh, ext_join_params, join_params_size);
|
|
err = BCME_ERROR;
|
|
goto exit;
|
|
}
|
|
|
|
ctl_sb = WL_CHANSPEC_CTL_SB_NONE;
|
|
chspec = (channel | band | bw | ctl_sb);
|
|
ext_join_params->assoc.chanspec_list[0] &= WL_CHANSPEC_CHAN_MASK;
|
|
ext_join_params->assoc.chanspec_list[0] |= chspec;
|
|
ext_join_params->assoc.chanspec_list[0] =
|
|
wl_chspec_host_to_driver(ext_join_params->assoc.chanspec_list[0]);
|
|
}
|
|
}
|
|
#ifdef ESCAN_CHANNEL_CACHE
|
|
else {
|
|
memcpy(ext_join_params->assoc.chanspec_list, chanspec_list,
|
|
sizeof(chanspec_t) * chan_cnt);
|
|
}
|
|
#endif /* ESCAN_CHANNEL_CACHE */
|
|
ext_join_params->assoc.chanspec_num = htod32(ext_join_params->assoc.chanspec_num);
|
|
if (ext_join_params->ssid.SSID_len < IEEE80211_MAX_SSID_LEN) {
|
|
WL_DBG(("ssid \"%s\", len (%d)\n", ext_join_params->ssid.SSID,
|
|
ext_join_params->ssid.SSID_len));
|
|
}
|
|
|
|
if ((bssidx = wl_get_bssidx_by_wdev(cfg, dev->ieee80211_ptr)) < 0) {
|
|
WL_ERR(("Find p2p index from wdev(%p) failed\n", dev->ieee80211_ptr));
|
|
MFREE(cfg->osh, ext_join_params, join_params_size);
|
|
err = BCME_ERROR;
|
|
goto exit;
|
|
}
|
|
#ifdef WLTDLS
|
|
/* disable TDLS if number of connected interfaces is >= 1 */
|
|
wl_cfg80211_tdls_config(cfg, TDLS_STATE_CONNECT, false);
|
|
#endif /* WLTDLS */
|
|
#ifdef WL_EXT_IAPSTA
|
|
wl_ext_iapsta_update_channel(dhdp, dev, cfg->channel);
|
|
#endif
|
|
|
|
wl_ext_get_sec(dev, 0, sec, sizeof(sec));
|
|
if (cfg->rcc_enabled) {
|
|
WL_MSG(dev->name, "Connecting with " MACDBG " ssid \"%s\", len (%d), "
|
|
"sec=%s, with rcc channels. chan_cnt:%d \n\n",
|
|
MAC2STRDBG((u8*)(&ext_join_params->assoc.bssid)),
|
|
ext_join_params->ssid.SSID, ext_join_params->ssid.SSID_len, sec, chan_cnt);
|
|
} else {
|
|
WL_MSG(dev->name, "Connecting with " MACDBG " ssid \"%s\", len (%d), "
|
|
"sec=%s, channel=%d\n\n",
|
|
MAC2STRDBG((u8*)(&ext_join_params->assoc.bssid)),
|
|
ext_join_params->ssid.SSID, ext_join_params->ssid.SSID_len, sec,
|
|
cfg->channel);
|
|
}
|
|
SUPP_LOG(("[%s] Connecting with " MACDBG " ssid \"%s\","
|
|
"channel:%d rcc:%d\n",
|
|
dev->name, MAC2STRDBG((u8*)(&ext_join_params->assoc.bssid)),
|
|
ext_join_params->ssid.SSID, cfg->channel, cfg->rcc_enabled));
|
|
err = wldev_iovar_setbuf_bsscfg(dev, "join", ext_join_params, join_params_size,
|
|
cfg->ioctl_buf, WLC_IOCTL_MAXLEN, bssidx, &cfg->ioctl_buf_sync);
|
|
MFREE(cfg->osh, ext_join_params, join_params_size);
|
|
if (err) {
|
|
wl_clr_drv_status(cfg, CONNECTING, dev);
|
|
if (err == BCME_UNSUPPORTED) {
|
|
WL_DBG(("join iovar is not supported\n"));
|
|
goto set_ssid;
|
|
} else {
|
|
WL_ERR(("join iovar error (%d)\n", err));
|
|
goto exit;
|
|
}
|
|
} else
|
|
goto exit;
|
|
|
|
set_ssid:
|
|
#if defined(ROAMEXP_SUPPORT)
|
|
/* Clear Blacklist bssid and Whitelist ssid list before join issue
|
|
* This is temporary fix since currently firmware roaming is not
|
|
* disabled by android framework before SSID join from framework
|
|
*/
|
|
/* Flush blacklist bssid content */
|
|
dhd_dev_set_blacklist_bssid(dev, NULL, 0, true);
|
|
/* Flush whitelist ssid content */
|
|
dhd_dev_set_whitelist_ssid(dev, NULL, 0, true);
|
|
#endif /* ROAMEXP_SUPPORT */
|
|
bzero(&join_params, sizeof(join_params));
|
|
join_params_size = sizeof(join_params.ssid);
|
|
|
|
join_params.ssid.SSID_len = (uint32)min(sizeof(join_params.ssid.SSID), sme->ssid_len);
|
|
memcpy(&join_params.ssid.SSID, sme->ssid, join_params.ssid.SSID_len);
|
|
join_params.ssid.SSID_len = htod32(join_params.ssid.SSID_len);
|
|
wl_update_prof(cfg, dev, NULL, &join_params.ssid, WL_PROF_SSID);
|
|
if (sme->bssid)
|
|
memcpy(&join_params.params.bssid, sme->bssid, ETH_ALEN);
|
|
else
|
|
memcpy(&join_params.params.bssid, ðer_bcast, ETH_ALEN);
|
|
|
|
if (wl_ch_to_chanspec(dev, cfg->channel, &join_params, &join_params_size) < 0) {
|
|
WL_ERR(("Invalid chanspec\n"));
|
|
return -EINVAL;
|
|
}
|
|
|
|
WL_DBG(("join_param_size %zu\n", join_params_size));
|
|
|
|
if (join_params.ssid.SSID_len < IEEE80211_MAX_SSID_LEN) {
|
|
WL_MSG(dev->name, "ssid \"%s\", len (%d)\n", join_params.ssid.SSID,
|
|
join_params.ssid.SSID_len);
|
|
}
|
|
err = wldev_ioctl_set(dev, WLC_SET_SSID, &join_params, join_params_size);
|
|
exit:
|
|
if (err) {
|
|
WL_ERR(("error (%d)\n", err));
|
|
wl_clr_drv_status(cfg, CONNECTING, dev);
|
|
wl_flush_fw_log_buffer(dev, FW_LOGSET_MASK_ALL);
|
|
#ifdef WLTDLS
|
|
/* If connect fails, check whether we can enable back TDLS */
|
|
wl_cfg80211_tdls_config(cfg, TDLS_STATE_DISCONNECT, false);
|
|
#endif /* WLTDLS */
|
|
}
|
|
if (!err)
|
|
wl_cfg80211_check_in4way(cfg, dev, NO_SCAN_IN4WAY|NO_BTC_IN4WAY,
|
|
WL_EXT_STATUS_CONNECTING, NULL);
|
|
#ifdef DBG_PKT_MON
|
|
if ((dev == bcmcfg_to_prmry_ndev(cfg)) && !err) {
|
|
DHD_DBG_PKT_MON_START(dhdp);
|
|
}
|
|
#endif /* DBG_PKT_MON */
|
|
return err;
|
|
}
|
|
|
|
static void wl_cfg80211_disconnect_state_sync(struct bcm_cfg80211 *cfg, struct net_device *dev)
|
|
{
|
|
struct wireless_dev *wdev;
|
|
uint8 wait_cnt;
|
|
|
|
if (!dev || !dev->ieee80211_ptr) {
|
|
WL_ERR(("wrong ndev\n"));
|
|
return;
|
|
}
|
|
|
|
wdev = dev->ieee80211_ptr;
|
|
wait_cnt = WAIT_FOR_DISCONNECT_STATE_SYNC;
|
|
while ((wdev->current_bss) && wait_cnt) {
|
|
WL_DBG(("Waiting for disconnect sync, wait_cnt: %d\n", wait_cnt));
|
|
wait_cnt--;
|
|
OSL_SLEEP(50);
|
|
}
|
|
|
|
if (wait_cnt == 0) {
|
|
/* state didn't get cleared within given timeout */
|
|
WL_INFORM_MEM(("cfg80211 state. wdev->current_bss non null\n"));
|
|
} else {
|
|
WL_MEM(("cfg80211 disconnect state sync done\n"));
|
|
}
|
|
|
|
}
|
|
|
|
static void wl_cfg80211_wait_for_disconnection(struct bcm_cfg80211 *cfg, struct net_device *dev)
|
|
{
|
|
uint8 wait_cnt;
|
|
u32 status = 0;
|
|
|
|
wait_cnt = WAIT_FOR_DISCONNECT_MAX;
|
|
while ((status = wl_get_drv_status(cfg, DISCONNECTING, dev)) && wait_cnt) {
|
|
WL_DBG(("Waiting for disconnection, wait_cnt: %d\n", wait_cnt));
|
|
wait_cnt--;
|
|
OSL_SLEEP(50);
|
|
}
|
|
|
|
WL_INFORM_MEM(("Wait for disconnection done. status:%d wait_cnt:%d\n", status, wait_cnt));
|
|
if (!wait_cnt && wl_get_drv_status(cfg, DISCONNECTING, dev)) {
|
|
/* No response from firmware. Indicate connect result
|
|
* to clear cfg80211 state machine
|
|
*/
|
|
WL_INFORM_MEM(("force send connect result\n"));
|
|
CFG80211_CONNECT_RESULT(dev, NULL, NULL, NULL, 0, NULL, 0,
|
|
WLAN_STATUS_UNSPECIFIED_FAILURE,
|
|
GFP_KERNEL);
|
|
wl_clr_drv_status(cfg, DISCONNECTING, dev);
|
|
}
|
|
return;
|
|
}
|
|
|
|
static s32
|
|
wl_cfg80211_disconnect(struct wiphy *wiphy, struct net_device *dev,
|
|
u16 reason_code)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wiphy_priv(wiphy);
|
|
scb_val_t scbval;
|
|
bool act = false;
|
|
s32 err = 0;
|
|
u8 *curbssid = NULL;
|
|
u8 null_bssid[ETHER_ADDR_LEN];
|
|
s32 bssidx = 0;
|
|
dhd_pub_t *dhdp = (dhd_pub_t *)(cfg->pub);
|
|
|
|
RETURN_EIO_IF_NOT_UP(cfg);
|
|
act = *(bool *) wl_read_prof(cfg, dev, WL_PROF_ACT);
|
|
curbssid = wl_read_prof(cfg, dev, WL_PROF_BSSID);
|
|
WL_MSG(dev->name, "Reason %d, act %d\n", reason_code, act);
|
|
|
|
BCM_REFERENCE(dhdp);
|
|
DHD_STATLOG_CTRL(dhdp, ST(DISASSOC_START),
|
|
dhd_net2idx(dhdp->info, dev), reason_code);
|
|
#ifdef DHD_4WAYM4_FAIL_DISCONNECT
|
|
dhd_cleanup_m4_state_work(dhdp, dhd_net2idx(dhdp->info, dev));
|
|
#endif /* DHD_4WAYM4_FAIL_DISCONNECT */
|
|
|
|
#ifdef ESCAN_RESULT_PATCH
|
|
if (wl_get_drv_status(cfg, CONNECTING, dev)) {
|
|
if (curbssid) {
|
|
WL_ERR(("Disconnecting while CONNECTING status"
|
|
" connecting device: " MACDBG "\n", MAC2STRDBG(curbssid)));
|
|
} else {
|
|
WL_ERR(("Disconnecting while CONNECTING status \n"));
|
|
}
|
|
act = true;
|
|
}
|
|
#endif /* ESCAN_RESULT_PATCH */
|
|
|
|
if (!curbssid) {
|
|
WL_ERR(("Disconnecting while CONNECTING status %d\n", (int)sizeof(null_bssid)));
|
|
bzero(null_bssid, sizeof(null_bssid));
|
|
curbssid = null_bssid;
|
|
}
|
|
|
|
if (act) {
|
|
#ifdef DBG_PKT_MON
|
|
/* Stop packet monitor */
|
|
if (dev == bcmcfg_to_prmry_ndev(cfg)) {
|
|
DHD_DBG_PKT_MON_STOP(dhdp);
|
|
}
|
|
#endif /* DBG_PKT_MON */
|
|
/*
|
|
* Cancel ongoing scan to sync up with sme state machine of cfg80211.
|
|
*/
|
|
/* Let scan aborted by F/W */
|
|
if (cfg->scan_request) {
|
|
WL_TRACE_HW4(("Aborting the scan! \n"));
|
|
wl_cfg80211_cancel_scan(cfg);
|
|
}
|
|
/* Set DISCONNECTING state. We are clearing this state in all exit paths */
|
|
wl_set_drv_status(cfg, DISCONNECTING, dev);
|
|
if (wl_get_drv_status(cfg, CONNECTING, dev) ||
|
|
wl_get_drv_status(cfg, CONNECTED, dev)) {
|
|
scbval.val = reason_code;
|
|
memcpy(&scbval.ea, curbssid, ETHER_ADDR_LEN);
|
|
scbval.val = htod32(scbval.val);
|
|
WL_INFORM_MEM(("[%s] wl disassoc\n", dev->name));
|
|
err = wldev_ioctl_set(dev, WLC_DISASSOC, &scbval,
|
|
sizeof(scb_val_t));
|
|
if (unlikely(err)) {
|
|
wl_clr_drv_status(cfg, DISCONNECTING, dev);
|
|
WL_ERR(("error (%d)\n", err));
|
|
goto exit;
|
|
}
|
|
wl_cfg80211_check_in4way(cfg, dev, NO_SCAN_IN4WAY|NO_BTC_IN4WAY|WAIT_DISCONNECTED,
|
|
WL_EXT_STATUS_DISCONNECTING, NULL);
|
|
}
|
|
#ifdef WL_WPS_SYNC
|
|
/* If are in WPS reauth state, then we would be
|
|
* dropping the link down events. Ensure that
|
|
* Event is sent up for the disconnect Req
|
|
*/
|
|
if (wl_wps_session_update(dev,
|
|
WPS_STATE_DISCONNECT, curbssid) == BCME_OK) {
|
|
WL_INFORM_MEM(("[WPS] Disconnect done.\n"));
|
|
wl_clr_drv_status(cfg, DISCONNECTING, dev);
|
|
}
|
|
#endif /* WPS_SYNC */
|
|
wl_cfg80211_wait_for_disconnection(cfg, dev);
|
|
} else {
|
|
/* Not in connecting or connected state. However since disconnect came
|
|
* from upper layer, indicate connect fail to clear any state mismatch
|
|
*/
|
|
WL_INFORM_MEM(("act is false. report connect result fail.\n"));
|
|
CFG80211_CONNECT_RESULT(dev, NULL, NULL, NULL, 0, NULL, 0,
|
|
WLAN_STATUS_UNSPECIFIED_FAILURE, GFP_KERNEL);
|
|
}
|
|
#ifdef CUSTOM_SET_CPUCORE
|
|
/* set default cpucore */
|
|
if (dev == bcmcfg_to_prmry_ndev(cfg)) {
|
|
dhdp->chan_isvht80 &= ~DHD_FLAG_STA_MODE;
|
|
if (!(dhdp->chan_isvht80))
|
|
dhd_set_cpucore(dhdp, FALSE);
|
|
}
|
|
#endif /* CUSTOM_SET_CPUCORE */
|
|
|
|
cfg->rssi = 0; /* reset backup of rssi */
|
|
|
|
exit:
|
|
/* Clear IEs for disaasoc */
|
|
if ((bssidx = wl_get_bssidx_by_wdev(cfg, dev->ieee80211_ptr)) < 0) {
|
|
WL_ERR(("Find index failed\n"));
|
|
err = -EINVAL;
|
|
return err;
|
|
}
|
|
WL_ERR(("Clearing disconnect IEs \n"));
|
|
err = wl_cfg80211_set_mgmt_vndr_ies(cfg,
|
|
ndev_to_cfgdev(dev), bssidx, VNDR_IE_DISASSOC_FLAG, NULL, 0);
|
|
|
|
return err;
|
|
}
|
|
|
|
static s32
|
|
#if defined(WL_CFG80211_P2P_DEV_IF)
|
|
wl_cfg80211_set_tx_power(struct wiphy *wiphy, struct wireless_dev *wdev,
|
|
enum nl80211_tx_power_setting type, s32 mbm)
|
|
#else
|
|
wl_cfg80211_set_tx_power(struct wiphy *wiphy,
|
|
enum nl80211_tx_power_setting type, s32 dbm)
|
|
#endif /* WL_CFG80211_P2P_DEV_IF */
|
|
{
|
|
|
|
struct bcm_cfg80211 *cfg = wiphy_priv(wiphy);
|
|
struct net_device *ndev = bcmcfg_to_prmry_ndev(cfg);
|
|
s32 err = 0;
|
|
#if defined(WL_CFG80211_P2P_DEV_IF)
|
|
s32 dbm = MBM_TO_DBM(mbm);
|
|
#elif (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 3, 0)) || \
|
|
defined(WL_COMPAT_WIRELESS) || defined(WL_SUPPORT_BACKPORTED_KPATCHES)
|
|
dbm = MBM_TO_DBM(dbm);
|
|
#endif /* WL_CFG80211_P2P_DEV_IF */
|
|
|
|
RETURN_EIO_IF_NOT_UP(cfg);
|
|
switch (type) {
|
|
case NL80211_TX_POWER_AUTOMATIC:
|
|
break;
|
|
case NL80211_TX_POWER_LIMITED:
|
|
if (dbm < 0) {
|
|
WL_ERR(("TX_POWER_LIMITTED - dbm is negative\n"));
|
|
return -EINVAL;
|
|
}
|
|
break;
|
|
case NL80211_TX_POWER_FIXED:
|
|
if (dbm < 0) {
|
|
WL_ERR(("TX_POWER_FIXED - dbm is negative..\n"));
|
|
return -EINVAL;
|
|
}
|
|
break;
|
|
}
|
|
|
|
err = wl_set_tx_power(ndev, type, dbm);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("error (%d)\n", err));
|
|
return err;
|
|
}
|
|
|
|
cfg->conf->tx_power = dbm;
|
|
|
|
return err;
|
|
}
|
|
|
|
static s32
|
|
#if defined(WL_CFG80211_P2P_DEV_IF)
|
|
wl_cfg80211_get_tx_power(struct wiphy *wiphy,
|
|
struct wireless_dev *wdev, s32 *dbm)
|
|
#else
|
|
wl_cfg80211_get_tx_power(struct wiphy *wiphy, s32 *dbm)
|
|
#endif /* WL_CFG80211_P2P_DEV_IF */
|
|
{
|
|
struct bcm_cfg80211 *cfg = wiphy_priv(wiphy);
|
|
struct net_device *ndev = bcmcfg_to_prmry_ndev(cfg);
|
|
s32 err = 0;
|
|
|
|
RETURN_EIO_IF_NOT_UP(cfg);
|
|
err = wl_get_tx_power(ndev, dbm);
|
|
if (unlikely(err))
|
|
WL_ERR(("error (%d)\n", err));
|
|
|
|
return err;
|
|
}
|
|
|
|
static s32
|
|
wl_cfg80211_config_default_key(struct wiphy *wiphy, struct net_device *dev,
|
|
u8 key_idx, bool unicast, bool multicast)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wiphy_priv(wiphy);
|
|
u32 index;
|
|
s32 wsec;
|
|
s32 err = 0;
|
|
s32 bssidx;
|
|
|
|
if ((bssidx = wl_get_bssidx_by_wdev(cfg, dev->ieee80211_ptr)) < 0) {
|
|
WL_ERR(("Find p2p index from dev(%p) failed\n", dev->ieee80211_ptr));
|
|
return BCME_ERROR;
|
|
}
|
|
|
|
WL_DBG(("key index (%d)\n", key_idx));
|
|
RETURN_EIO_IF_NOT_UP(cfg);
|
|
err = wldev_iovar_getint_bsscfg(dev, "wsec", &wsec, bssidx);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("WLC_GET_WSEC error (%d)\n", err));
|
|
return err;
|
|
}
|
|
if (wsec == WEP_ENABLED) {
|
|
/* Just select a new current key */
|
|
index = (u32) key_idx;
|
|
index = htod32(index);
|
|
err = wldev_ioctl_set(dev, WLC_SET_KEY_PRIMARY, &index,
|
|
sizeof(index));
|
|
if (unlikely(err)) {
|
|
WL_ERR(("error (%d)\n", err));
|
|
}
|
|
}
|
|
return err;
|
|
}
|
|
|
|
static s32
|
|
wl_add_keyext(struct wiphy *wiphy, struct net_device *dev,
|
|
u8 key_idx, const u8 *mac_addr, struct key_params *params)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wiphy_priv(wiphy);
|
|
struct wl_wsec_key key;
|
|
s32 err = 0;
|
|
s32 bssidx;
|
|
s32 mode = wl_get_mode_by_netdev(cfg, dev);
|
|
|
|
WL_MSG(dev->name, "key index (%d)\n", key_idx);
|
|
if ((bssidx = wl_get_bssidx_by_wdev(cfg, dev->ieee80211_ptr)) < 0) {
|
|
WL_ERR(("Find p2p index from wdev(%p) failed\n", dev->ieee80211_ptr));
|
|
return BCME_ERROR;
|
|
}
|
|
bzero(&key, sizeof(key));
|
|
key.index = (u32) key_idx;
|
|
|
|
if (!ETHER_ISMULTI(mac_addr))
|
|
memcpy((char *)&key.ea, (const void *)mac_addr, ETHER_ADDR_LEN);
|
|
key.len = (u32) params->key_len;
|
|
|
|
/* check for key index change */
|
|
if (key.len == 0) {
|
|
/* key delete */
|
|
swap_key_from_BE(&key);
|
|
err = wldev_iovar_setbuf_bsscfg(dev, "wsec_key", &key, sizeof(key),
|
|
cfg->ioctl_buf, WLC_IOCTL_MAXLEN, bssidx, &cfg->ioctl_buf_sync);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("key delete error (%d)\n", err));
|
|
return err;
|
|
}
|
|
} else {
|
|
if (key.len > sizeof(key.data)) {
|
|
WL_ERR(("Invalid key length (%d)\n", key.len));
|
|
return -EINVAL;
|
|
}
|
|
WL_DBG(("Setting the key index %d\n", key.index));
|
|
memcpy(key.data, params->key, key.len);
|
|
|
|
if ((mode == WL_MODE_BSS) &&
|
|
(params->cipher == WLAN_CIPHER_SUITE_TKIP)) {
|
|
u8 keybuf[8];
|
|
memcpy(keybuf, &key.data[24], sizeof(keybuf));
|
|
memcpy(&key.data[24], &key.data[16], sizeof(keybuf));
|
|
memcpy(&key.data[16], keybuf, sizeof(keybuf));
|
|
}
|
|
|
|
/* if IW_ENCODE_EXT_RX_SEQ_VALID set */
|
|
if (params->seq && params->seq_len == 6) {
|
|
/* rx iv */
|
|
const u8 *ivptr;
|
|
ivptr = (const u8 *) params->seq;
|
|
key.rxiv.hi = (ivptr[5] << 24) | (ivptr[4] << 16) |
|
|
(ivptr[3] << 8) | ivptr[2];
|
|
key.rxiv.lo = (ivptr[1] << 8) | ivptr[0];
|
|
key.iv_initialized = true;
|
|
}
|
|
key.algo = wl_rsn_cipher_wsec_key_algo_lookup(params->cipher);
|
|
if (key.algo == CRYPTO_ALGO_OFF) { //not found.
|
|
WL_ERR(("Invalid cipher (0x%x)\n", params->cipher));
|
|
return -EINVAL;
|
|
}
|
|
swap_key_from_BE(&key);
|
|
/* need to guarantee EAPOL 4/4 send out before set key */
|
|
dhd_wait_pend8021x(dev);
|
|
err = wldev_iovar_setbuf_bsscfg(dev, "wsec_key", &key, sizeof(key),
|
|
cfg->ioctl_buf, WLC_IOCTL_MAXLEN, bssidx, &cfg->ioctl_buf_sync);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("WLC_SET_KEY error (%d)\n", err));
|
|
return err;
|
|
}
|
|
WL_INFORM_MEM(("[%s] wsec key set\n", dev->name));
|
|
}
|
|
return err;
|
|
}
|
|
|
|
int
|
|
wl_cfg80211_enable_roam_offload(struct net_device *dev, int enable)
|
|
{
|
|
int err;
|
|
wl_eventmsg_buf_t ev_buf;
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(dev);
|
|
|
|
if (dev != bcmcfg_to_prmry_ndev(cfg)) {
|
|
/* roam offload is only for the primary device */
|
|
return -1;
|
|
}
|
|
|
|
WL_INFORM_MEM(("[%s] wl roam_offload %d\n", dev->name, enable));
|
|
err = wldev_iovar_setint(dev, "roam_offload", enable);
|
|
if (err)
|
|
return err;
|
|
|
|
bzero(&ev_buf, sizeof(wl_eventmsg_buf_t));
|
|
wl_cfg80211_add_to_eventbuffer(&ev_buf, WLC_E_PSK_SUP, !enable);
|
|
wl_cfg80211_add_to_eventbuffer(&ev_buf, WLC_E_ASSOC_REQ_IE, !enable);
|
|
wl_cfg80211_add_to_eventbuffer(&ev_buf, WLC_E_ASSOC_RESP_IE, !enable);
|
|
wl_cfg80211_add_to_eventbuffer(&ev_buf, WLC_E_REASSOC, !enable);
|
|
wl_cfg80211_add_to_eventbuffer(&ev_buf, WLC_E_JOIN, !enable);
|
|
wl_cfg80211_add_to_eventbuffer(&ev_buf, WLC_E_ROAM, !enable);
|
|
err = wl_cfg80211_apply_eventbuffer(dev, cfg, &ev_buf);
|
|
if (!err) {
|
|
cfg->roam_offload = enable;
|
|
}
|
|
return err;
|
|
}
|
|
|
|
struct wireless_dev *
|
|
wl_cfg80211_get_wdev_from_ifname(struct bcm_cfg80211 *cfg, const char *name)
|
|
{
|
|
struct net_info *iter, *next;
|
|
|
|
if (name == NULL) {
|
|
WL_ERR(("Iface name is not provided\n"));
|
|
return NULL;
|
|
}
|
|
|
|
GCC_DIAGNOSTIC_PUSH_SUPPRESS_CAST();
|
|
for_each_ndev(cfg, iter, next) {
|
|
GCC_DIAGNOSTIC_POP();
|
|
if (iter->ndev) {
|
|
if (strcmp(iter->ndev->name, name) == 0) {
|
|
return iter->ndev->ieee80211_ptr;
|
|
}
|
|
}
|
|
}
|
|
|
|
WL_DBG(("Iface %s not found\n", name));
|
|
return NULL;
|
|
}
|
|
|
|
#if defined(PKT_FILTER_SUPPORT) && defined(APSTA_BLOCK_ARP_DURING_DHCP)
|
|
void
|
|
wl_cfg80211_block_arp(struct net_device *dev, int enable)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(dev);
|
|
dhd_pub_t *dhdp = (dhd_pub_t *)(cfg->pub);
|
|
|
|
WL_INFORM_MEM(("[%s] Enter. enable:%d\n", dev->name, enable));
|
|
if (!dhd_pkt_filter_enable) {
|
|
WL_DBG(("Packet filter isn't enabled\n"));
|
|
return;
|
|
}
|
|
|
|
/* Block/Unblock ARP frames only if STA is connected to
|
|
* the upstream AP in case of STA+SoftAP Concurrenct mode
|
|
*/
|
|
if (!wl_get_drv_status(cfg, CONNECTED, dev)) {
|
|
WL_DBG(("STA not connected to upstream AP\n"));
|
|
return;
|
|
}
|
|
|
|
if (enable) {
|
|
WL_DBG(("Enable ARP Filter\n"));
|
|
/* Add ARP filter */
|
|
dhd_packet_filter_add_remove(dhdp, TRUE, DHD_BROADCAST_ARP_FILTER_NUM);
|
|
|
|
/* Enable ARP packet filter - blacklist */
|
|
dhd_master_mode = FALSE;
|
|
dhd_pktfilter_offload_enable(dhdp, dhdp->pktfilter[DHD_BROADCAST_ARP_FILTER_NUM],
|
|
TRUE, dhd_master_mode);
|
|
} else {
|
|
WL_DBG(("Disable ARP Filter\n"));
|
|
/* Disable ARP packet filter */
|
|
dhd_master_mode = TRUE;
|
|
dhd_pktfilter_offload_enable(dhdp, dhdp->pktfilter[DHD_BROADCAST_ARP_FILTER_NUM],
|
|
FALSE, dhd_master_mode);
|
|
|
|
/* Delete ARP filter */
|
|
dhd_packet_filter_add_remove(dhdp, FALSE, DHD_BROADCAST_ARP_FILTER_NUM);
|
|
}
|
|
}
|
|
#endif /* PKT_FILTER_SUPPORT && APSTA_BLOCK_ARP_DURING_DHCP */
|
|
|
|
static s32
|
|
wl_cfg80211_add_key(struct wiphy *wiphy, struct net_device *dev,
|
|
u8 key_idx, bool pairwise, const u8 *mac_addr,
|
|
struct key_params *params)
|
|
{
|
|
struct wl_wsec_key key;
|
|
s32 val = 0;
|
|
s32 wsec = 0;
|
|
s32 err = 0;
|
|
u8 keybuf[8];
|
|
s32 bssidx = 0;
|
|
struct bcm_cfg80211 *cfg = wiphy_priv(wiphy);
|
|
s32 mode = wl_get_mode_by_netdev(cfg, dev);
|
|
#ifdef WL_GCMP
|
|
uint32 algos = 0, mask = 0;
|
|
#endif /* WL_GCMP */
|
|
#if defined(WLAN_CIPHER_SUITE_PMK)
|
|
int j;
|
|
wsec_pmk_t pmk;
|
|
char keystring[WSEC_MAX_PSK_LEN + 1];
|
|
char* charptr = keystring;
|
|
u16 len;
|
|
struct wl_security *sec;
|
|
#endif /* defined(WLAN_CIPHER_SUITE_PMK) */
|
|
dhd_pub_t *dhdp = (dhd_pub_t *)(cfg->pub);
|
|
|
|
WL_INFORM_MEM(("key index (%d) (0x%x)\n", key_idx, params->cipher));
|
|
RETURN_EIO_IF_NOT_UP(cfg);
|
|
|
|
if ((bssidx = wl_get_bssidx_by_wdev(cfg, dev->ieee80211_ptr)) < 0) {
|
|
WL_ERR(("Find p2p index from dev(%p) failed\n", dev->ieee80211_ptr));
|
|
return BCME_ERROR;
|
|
}
|
|
|
|
if (mac_addr &&
|
|
((params->cipher != WLAN_CIPHER_SUITE_WEP40) &&
|
|
(params->cipher != WLAN_CIPHER_SUITE_WEP104))) {
|
|
wl_add_keyext(wiphy, dev, key_idx, mac_addr, params);
|
|
goto exit;
|
|
}
|
|
|
|
BCM_REFERENCE(dhdp);
|
|
DHD_STATLOG_CTRL(dhdp, ST(INSTALL_KEY), dhd_net2idx(dhdp->info, dev), 0);
|
|
|
|
bzero(&key, sizeof(key));
|
|
/* Clear any buffered wep key */
|
|
bzero(&cfg->wep_key, sizeof(struct wl_wsec_key));
|
|
|
|
key.len = (u32) params->key_len;
|
|
key.index = (u32) key_idx;
|
|
|
|
if (unlikely(key.len > sizeof(key.data))) {
|
|
WL_ERR(("Too long key length (%u)\n", key.len));
|
|
return -EINVAL;
|
|
}
|
|
memcpy(key.data, params->key, key.len);
|
|
|
|
key.flags = WL_PRIMARY_KEY;
|
|
|
|
key.algo = wl_rsn_cipher_wsec_key_algo_lookup(params->cipher);
|
|
val = wl_rsn_cipher_wsec_algo_lookup(params->cipher);
|
|
if (val == WSEC_NONE) {
|
|
WL_ERR(("Invalid cipher (0x%x)\n", params->cipher));
|
|
#if defined(WLAN_CIPHER_SUITE_PMK)
|
|
/* WLAN_CIPHER_SUITE_PMK is not NL80211 standard ,but BRCM proprietary cipher suite.
|
|
* so it doesn't have right algo type too. Just for now, bypass this check for
|
|
* backward compatibility.
|
|
* TODO: deprecate this proprietary way and replace to nl80211 set_pmk API.
|
|
*/
|
|
if (params->cipher != WLAN_CIPHER_SUITE_PMK)
|
|
#endif /* defined(WLAN_CIPHER_SUITE_PMK) */
|
|
return -EINVAL;
|
|
}
|
|
switch (params->cipher) {
|
|
case WLAN_CIPHER_SUITE_TKIP:
|
|
/* wpa_supplicant switches the third and fourth quarters of the TKIP key */
|
|
if (mode == WL_MODE_BSS) {
|
|
bcopy(&key.data[24], keybuf, sizeof(keybuf));
|
|
bcopy(&key.data[16], &key.data[24], sizeof(keybuf));
|
|
bcopy(keybuf, &key.data[16], sizeof(keybuf));
|
|
}
|
|
WL_DBG(("WLAN_CIPHER_SUITE_TKIP\n"));
|
|
break;
|
|
#if defined(WLAN_CIPHER_SUITE_PMK)
|
|
case WLAN_CIPHER_SUITE_PMK:
|
|
sec = wl_read_prof(cfg, dev, WL_PROF_SEC);
|
|
|
|
WL_MEM(("set_pmk: wpa_auth:%x akm:%x\n", sec->wpa_auth, params->cipher));
|
|
/* Avoid pmk set for SAE and OWE for external supplicant case. */
|
|
if (IS_AKM_SAE(sec->wpa_auth) || IS_AKM_OWE(sec->wpa_auth)) {
|
|
WL_INFORM_MEM(("skip pmk set for akm:%x\n", sec->wpa_auth));
|
|
break;
|
|
}
|
|
|
|
if ((sec->wpa_auth == WLAN_AKM_SUITE_8021X) ||
|
|
(sec->wpa_auth == WL_AKM_SUITE_SHA256_1X)) {
|
|
err = wldev_iovar_setbuf(dev, "okc_info_pmk", (const void *)params->key,
|
|
WSEC_MAX_PSK_LEN / 2, keystring, sizeof(keystring), NULL);
|
|
if (err) {
|
|
/* could fail in case that 'okc' is not supported */
|
|
WL_INFORM_MEM(("okc_info_pmk failed, err=%d (ignore)\n", err));
|
|
}
|
|
}
|
|
/* copy the raw hex key to the appropriate format */
|
|
for (j = 0; j < (WSEC_MAX_PSK_LEN / 2); j++) {
|
|
charptr += snprintf(charptr, sizeof(keystring), "%02x", params->key[j]);
|
|
}
|
|
len = (u16)strlen(keystring);
|
|
pmk.key_len = htod16(len);
|
|
bcopy(keystring, pmk.key, len);
|
|
pmk.flags = htod16(WSEC_PASSPHRASE);
|
|
|
|
err = wldev_ioctl_set(dev, WLC_SET_WSEC_PMK, &pmk, sizeof(pmk));
|
|
if (err) {
|
|
return err;
|
|
}
|
|
/* Clear key length to delete key */
|
|
key.len = 0;
|
|
break;
|
|
#endif /* WLAN_CIPHER_SUITE_PMK */
|
|
#ifdef WL_GCMP
|
|
case WLAN_CIPHER_SUITE_GCMP:
|
|
case WLAN_CIPHER_SUITE_GCMP_256:
|
|
case WLAN_CIPHER_SUITE_BIP_GMAC_128:
|
|
case WLAN_CIPHER_SUITE_BIP_GMAC_256:
|
|
algos = KEY_ALGO_MASK(key.algo);
|
|
mask = algos | KEY_ALGO_MASK(CRYPTO_ALGO_AES_CCM);
|
|
break;
|
|
#endif /* WL_GCMP */
|
|
default: /* No post processing required */
|
|
WL_DBG(("no post processing required (0x%x)\n", params->cipher));
|
|
break;
|
|
}
|
|
|
|
/* Set the new key/index */
|
|
if ((mode == WL_MODE_IBSS) && (val & (TKIP_ENABLED | AES_ENABLED))) {
|
|
WL_ERR(("IBSS KEY setted\n"));
|
|
wldev_iovar_setint(dev, "wpa_auth", WPA_AUTH_NONE);
|
|
}
|
|
swap_key_from_BE(&key);
|
|
if ((params->cipher == WLAN_CIPHER_SUITE_WEP40) ||
|
|
(params->cipher == WLAN_CIPHER_SUITE_WEP104)) {
|
|
/*
|
|
* For AP role, since we are doing a wl down before bringing up AP,
|
|
* the plumbed keys will be lost. So for AP once we bring up AP, we
|
|
* need to plumb keys again. So buffer the keys for future use. This
|
|
* is more like a WAR. If firmware later has the capability to do
|
|
* interface upgrade without doing a "wl down" and "wl apsta 0", then
|
|
* this will not be required.
|
|
*/
|
|
WL_DBG(("Buffering WEP Keys \n"));
|
|
memcpy(&cfg->wep_key, &key, sizeof(struct wl_wsec_key));
|
|
}
|
|
err = wldev_iovar_setbuf_bsscfg(dev, "wsec_key", &key, sizeof(key), cfg->ioctl_buf,
|
|
WLC_IOCTL_MAXLEN, bssidx, &cfg->ioctl_buf_sync);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("WLC_SET_KEY error (%d)\n", err));
|
|
return err;
|
|
}
|
|
|
|
exit:
|
|
err = wldev_iovar_getint_bsscfg(dev, "wsec", &wsec, bssidx);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("get wsec error (%d)\n", err));
|
|
return err;
|
|
}
|
|
|
|
wsec |= val;
|
|
err = wldev_iovar_setint_bsscfg(dev, "wsec", wsec, bssidx);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("set wsec error (%d)\n", err));
|
|
return err;
|
|
}
|
|
#ifdef WL_GCMP
|
|
wl_set_wsec_info_algos(dev, algos, mask);
|
|
#endif /* WL_GCMP */
|
|
wl_cfg80211_check_in4way(cfg, dev, NO_SCAN_IN4WAY|NO_BTC_IN4WAY,
|
|
WL_EXT_STATUS_ADD_KEY, NULL);
|
|
return err;
|
|
}
|
|
|
|
static s32
|
|
wl_cfg80211_del_key(struct wiphy *wiphy, struct net_device *dev,
|
|
u8 key_idx, bool pairwise, const u8 *mac_addr)
|
|
{
|
|
struct wl_wsec_key key;
|
|
struct bcm_cfg80211 *cfg = wiphy_priv(wiphy);
|
|
s32 err = 0;
|
|
s32 bssidx;
|
|
dhd_pub_t *dhdp = (dhd_pub_t *)(cfg->pub);
|
|
|
|
if ((bssidx = wl_get_bssidx_by_wdev(cfg, dev->ieee80211_ptr)) < 0) {
|
|
WL_ERR(("Find p2p index from wdev(%p) failed\n", dev->ieee80211_ptr));
|
|
return BCME_ERROR;
|
|
}
|
|
WL_DBG(("Enter\n"));
|
|
|
|
#ifndef MFP
|
|
if ((key_idx >= DOT11_MAX_DEFAULT_KEYS) && (key_idx < DOT11_MAX_DEFAULT_KEYS+2))
|
|
return -EINVAL;
|
|
#endif // endif
|
|
|
|
RETURN_EIO_IF_NOT_UP(cfg);
|
|
BCM_REFERENCE(dhdp);
|
|
DHD_STATLOG_CTRL(dhdp, ST(DELETE_KEY), dhd_net2idx(dhdp->info, dev), 0);
|
|
bzero(&key, sizeof(key));
|
|
|
|
key.flags = WL_PRIMARY_KEY;
|
|
key.algo = CRYPTO_ALGO_OFF;
|
|
key.index = (u32) key_idx;
|
|
|
|
WL_DBG(("key index (%d)\n", key_idx));
|
|
/* Set the new key/index */
|
|
swap_key_from_BE(&key);
|
|
err = wldev_iovar_setbuf_bsscfg(dev, "wsec_key", &key, sizeof(key), cfg->ioctl_buf,
|
|
WLC_IOCTL_MAXLEN, bssidx, &cfg->ioctl_buf_sync);
|
|
if (unlikely(err)) {
|
|
if (err == -EINVAL) {
|
|
if (key.index >= DOT11_MAX_DEFAULT_KEYS) {
|
|
/* we ignore this key index in this case */
|
|
WL_DBG(("invalid key index (%d)\n", key_idx));
|
|
}
|
|
} else {
|
|
WL_ERR(("WLC_SET_KEY error (%d)\n", err));
|
|
}
|
|
return err;
|
|
}
|
|
return err;
|
|
}
|
|
|
|
/* NOTE : this function cannot work as is and is never called */
|
|
static s32
|
|
wl_cfg80211_get_key(struct wiphy *wiphy, struct net_device *dev,
|
|
u8 key_idx, bool pairwise, const u8 *mac_addr, void *cookie,
|
|
void (*callback) (void *cookie, struct key_params * params))
|
|
{
|
|
struct key_params params;
|
|
struct wl_wsec_key key;
|
|
struct bcm_cfg80211 *cfg = wiphy_priv(wiphy);
|
|
struct wl_security *sec;
|
|
s32 wsec;
|
|
s32 err = 0;
|
|
s32 bssidx;
|
|
|
|
if ((bssidx = wl_get_bssidx_by_wdev(cfg, dev->ieee80211_ptr)) < 0) {
|
|
WL_ERR(("Find p2p index from wdev(%p) failed\n", dev->ieee80211_ptr));
|
|
return BCME_ERROR;
|
|
}
|
|
WL_DBG(("key index (%d)\n", key_idx));
|
|
RETURN_EIO_IF_NOT_UP(cfg);
|
|
bzero(&key, sizeof(key));
|
|
key.index = key_idx;
|
|
swap_key_to_BE(&key);
|
|
bzero(¶ms, sizeof(params));
|
|
params.key_len = (u8) min_t(u8, DOT11_MAX_KEY_SIZE, key.len);
|
|
params.key = key.data;
|
|
|
|
err = wldev_iovar_getint_bsscfg(dev, "wsec", &wsec, bssidx);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("WLC_GET_WSEC error (%d)\n", err));
|
|
return err;
|
|
}
|
|
switch (WSEC_ENABLED(wsec)) {
|
|
case WEP_ENABLED:
|
|
sec = wl_read_prof(cfg, dev, WL_PROF_SEC);
|
|
if (sec->cipher_pairwise & WLAN_CIPHER_SUITE_WEP40) {
|
|
params.cipher = WLAN_CIPHER_SUITE_WEP40;
|
|
WL_DBG(("WLAN_CIPHER_SUITE_WEP40\n"));
|
|
} else if (sec->cipher_pairwise & WLAN_CIPHER_SUITE_WEP104) {
|
|
params.cipher = WLAN_CIPHER_SUITE_WEP104;
|
|
WL_DBG(("WLAN_CIPHER_SUITE_WEP104\n"));
|
|
}
|
|
break;
|
|
case TKIP_ENABLED:
|
|
params.cipher = WLAN_CIPHER_SUITE_TKIP;
|
|
WL_DBG(("WLAN_CIPHER_SUITE_TKIP\n"));
|
|
break;
|
|
case AES_ENABLED:
|
|
params.cipher = WLAN_CIPHER_SUITE_AES_CMAC;
|
|
WL_DBG(("WLAN_CIPHER_SUITE_AES_CMAC\n"));
|
|
break;
|
|
#ifdef BCMWAPI_WPI
|
|
case SMS4_ENABLED:
|
|
params.cipher = WLAN_CIPHER_SUITE_SMS4;
|
|
WL_DBG(("WLAN_CIPHER_SUITE_SMS4\n"));
|
|
break;
|
|
#endif // endif
|
|
#if defined(SUPPORT_SOFTAP_WPAWPA2_MIXED)
|
|
/* to connect to mixed mode AP */
|
|
case (AES_ENABLED | TKIP_ENABLED): /* TKIP CCMP */
|
|
params.cipher = WLAN_CIPHER_SUITE_AES_CMAC;
|
|
WL_DBG(("WLAN_CIPHER_SUITE_TKIP\n"));
|
|
break;
|
|
#endif // endif
|
|
default:
|
|
WL_ERR(("Invalid algo (0x%x)\n", wsec));
|
|
return -EINVAL;
|
|
}
|
|
|
|
callback(cookie, ¶ms);
|
|
return err;
|
|
}
|
|
|
|
static s32
|
|
wl_cfg80211_config_default_mgmt_key(struct wiphy *wiphy,
|
|
struct net_device *dev, u8 key_idx)
|
|
{
|
|
#ifdef MFP
|
|
return 0;
|
|
#else
|
|
WL_INFORM_MEM(("Not supported\n"));
|
|
return -EOPNOTSUPP;
|
|
#endif /* MFP */
|
|
}
|
|
|
|
static bool
|
|
wl_check_assoc_state(struct bcm_cfg80211 *cfg, struct net_device *dev)
|
|
{
|
|
wl_assoc_info_t asinfo;
|
|
uint32 state = 0;
|
|
int err;
|
|
|
|
err = wldev_iovar_getbuf_bsscfg(dev, "assoc_info",
|
|
NULL, 0, cfg->ioctl_buf, WLC_IOCTL_MEDLEN, 0, &cfg->ioctl_buf_sync);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("failed to get assoc_info : err=%d\n", err));
|
|
return FALSE;
|
|
} else {
|
|
memcpy(&asinfo, cfg->ioctl_buf, sizeof(wl_assoc_info_t));
|
|
state = dtoh32(asinfo.state);
|
|
WL_DBG(("assoc state=%d\n", state));
|
|
}
|
|
|
|
return (state > 0)? TRUE:FALSE;
|
|
}
|
|
|
|
static s32
|
|
wl_cfg80211_get_rssi(struct net_device *dev, struct bcm_cfg80211 *cfg, s32 *rssi)
|
|
{
|
|
s32 err = BCME_OK;
|
|
scb_val_t scb_val;
|
|
#ifdef SUPPORT_RSSI_SUM_REPORT
|
|
wl_rssi_ant_mimo_t rssi_ant_mimo;
|
|
#endif /* SUPPORT_RSSI_SUM_REPORT */
|
|
|
|
if (dev == NULL || cfg == NULL) {
|
|
return BCME_ERROR;
|
|
}
|
|
|
|
/* initialize rssi */
|
|
*rssi = 0;
|
|
|
|
#ifdef SUPPORT_RSSI_SUM_REPORT
|
|
/* Query RSSI sum across antennas */
|
|
bzero(&rssi_ant_mimo, sizeof(rssi_ant_mimo));
|
|
err = wl_get_rssi_per_ant(dev, dev->name, NULL, &rssi_ant_mimo);
|
|
if (err) {
|
|
WL_ERR(("Could not get rssi sum (%d)\n", err));
|
|
/* set rssi to zero and do not return error,
|
|
* because iovar phy_rssi_ant could return BCME_UNSUPPORTED
|
|
* when bssid was null during roaming
|
|
*/
|
|
err = BCME_OK;
|
|
} else {
|
|
cfg->rssi_sum_report = TRUE;
|
|
if ((*rssi = rssi_ant_mimo.rssi_sum) >= 0) {
|
|
*rssi = 0;
|
|
}
|
|
}
|
|
#endif /* SUPPORT_RSSI_SUM_REPORT */
|
|
|
|
/* if SUPPORT_RSSI_SUM_REPORT works once, do not use legacy method anymore */
|
|
if (cfg->rssi_sum_report == FALSE) {
|
|
bzero(&scb_val, sizeof(scb_val));
|
|
scb_val.val = 0;
|
|
err = wldev_ioctl_get(dev, WLC_GET_RSSI, &scb_val,
|
|
sizeof(scb_val_t));
|
|
if (err) {
|
|
WL_ERR(("Could not get rssi (%d)\n", err));
|
|
return err;
|
|
}
|
|
#if defined(RSSIOFFSET)
|
|
*rssi = wl_update_rssi_offset(dev, dtoh32(scb_val.val));
|
|
#else
|
|
*rssi = dtoh32(scb_val.val);
|
|
#endif
|
|
}
|
|
|
|
if (*rssi >= 0) {
|
|
/* check assoc status including roaming */
|
|
DHD_OS_WAKE_LOCK((dhd_pub_t *)(cfg->pub));
|
|
if (wl_get_drv_status(cfg, CONNECTED, dev) && wl_check_assoc_state(cfg, dev)) {
|
|
*rssi = cfg->rssi; /* use previous RSSI */
|
|
WL_DBG(("use previous RSSI %d dBm\n", cfg->rssi));
|
|
} else {
|
|
*rssi = 0;
|
|
}
|
|
DHD_OS_WAKE_UNLOCK((dhd_pub_t *)(cfg->pub));
|
|
} else {
|
|
/* backup the current rssi */
|
|
cfg->rssi = *rssi;
|
|
}
|
|
|
|
return err;
|
|
}
|
|
|
|
static int
|
|
wl_cfg80211_ifstats_counters_cb(void *ctx, const uint8 *data, uint16 type, uint16 len)
|
|
{
|
|
switch (type) {
|
|
case WL_IFSTATS_XTLV_IF_INDEX:
|
|
WL_DBG(("Stats received on interface index: %d\n", *data));
|
|
break;
|
|
case WL_IFSTATS_XTLV_GENERIC: {
|
|
if (len > sizeof(wl_if_stats_t)) {
|
|
WL_INFORM(("type 0x%x: cntbuf length too long! %d > %d\n",
|
|
type, len, (int)sizeof(wl_if_stats_t)));
|
|
}
|
|
memcpy(ctx, data, sizeof(wl_if_stats_t));
|
|
break;
|
|
}
|
|
default:
|
|
WL_DBG(("Unsupported counter type 0x%x\n", type));
|
|
break;
|
|
}
|
|
|
|
return BCME_OK;
|
|
}
|
|
|
|
/* Parameters to if_counters iovar need to be converted to XTLV format
|
|
* before sending to FW. The length of the top level XTLV container
|
|
* containing parameters should not exceed 228 bytes
|
|
*/
|
|
#define IF_COUNTERS_PARAM_CONTAINER_LEN_MAX 228
|
|
|
|
int
|
|
wl_cfg80211_ifstats_counters(struct net_device *dev, wl_if_stats_t *if_stats)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(dev);
|
|
dhd_pub_t *dhdp = (dhd_pub_t *)(cfg->pub);
|
|
uint8 *pbuf = NULL;
|
|
bcm_xtlvbuf_t xtlvbuf, local_xtlvbuf;
|
|
bcm_xtlv_t *xtlv;
|
|
uint16 expected_resp_len;
|
|
wl_stats_report_t *request = NULL, *response = NULL;
|
|
int bsscfg_idx;
|
|
int ret = BCME_OK;
|
|
|
|
pbuf = (uint8 *)MALLOCZ(dhdp->osh, WLC_IOCTL_MEDLEN);
|
|
if (!pbuf) {
|
|
WL_ERR(("Failed to allocate local pbuf\n"));
|
|
return BCME_NOMEM;
|
|
}
|
|
|
|
/* top level container length cannot exceed 228 bytes.
|
|
* This is because the output buffer is 1535 bytes long.
|
|
* Allow 1300 bytes for reporting stats coming in XTLV format
|
|
*/
|
|
request = (wl_stats_report_t *)
|
|
MALLOCZ(dhdp->osh, IF_COUNTERS_PARAM_CONTAINER_LEN_MAX);
|
|
if (!request) {
|
|
WL_ERR(("Failed to allocate wl_stats_report_t with length (%d)\n",
|
|
IF_COUNTERS_PARAM_CONTAINER_LEN_MAX));
|
|
ret = BCME_NOMEM;
|
|
goto fail;
|
|
}
|
|
|
|
request->version = WL_STATS_REPORT_REQUEST_VERSION_V2;
|
|
|
|
/* Top level container... we will create it ourselves */
|
|
/* Leave space for report version, length, and top level XTLV
|
|
* WL_IFSTATS_XTLV_IF.
|
|
*/
|
|
ret = bcm_xtlv_buf_init(&local_xtlvbuf,
|
|
(uint8*)(request->data) + BCM_XTLV_HDR_SIZE,
|
|
IF_COUNTERS_PARAM_CONTAINER_LEN_MAX -
|
|
offsetof(wl_stats_report_t, data) - BCM_XTLV_HDR_SIZE,
|
|
BCM_XTLV_OPTION_ALIGN32);
|
|
|
|
if (ret) {
|
|
goto fail;
|
|
}
|
|
|
|
/* Populate requests using this the local_xtlvbuf context. The xtlvbuf
|
|
* is used to fill the container containing the XTLVs populated using
|
|
* local_xtlvbuf.
|
|
*/
|
|
ret = bcm_xtlv_buf_init(&xtlvbuf,
|
|
(uint8*)(request->data),
|
|
IF_COUNTERS_PARAM_CONTAINER_LEN_MAX -
|
|
offsetof(wl_stats_report_t, data),
|
|
BCM_XTLV_OPTION_ALIGN32);
|
|
|
|
if (ret) {
|
|
goto fail;
|
|
}
|
|
|
|
/* Request generic stats */
|
|
ret = bcm_xtlv_put_data(&local_xtlvbuf,
|
|
WL_IFSTATS_XTLV_GENERIC, NULL, 0);
|
|
if (ret) {
|
|
goto fail;
|
|
}
|
|
|
|
/* Complete the outer container with type and length
|
|
* only.
|
|
*/
|
|
ret = bcm_xtlv_put_data(&xtlvbuf,
|
|
WL_IFSTATS_XTLV_IF,
|
|
NULL, bcm_xtlv_buf_len(&local_xtlvbuf));
|
|
|
|
if (ret) {
|
|
goto fail;
|
|
}
|
|
|
|
request->length = bcm_xtlv_buf_len(&xtlvbuf) +
|
|
offsetof(wl_stats_report_t, data);
|
|
bsscfg_idx = wl_get_bssidx_by_wdev(cfg, dev->ieee80211_ptr);
|
|
|
|
/* send the command over to the device and get teh output */
|
|
ret = wldev_iovar_getbuf_bsscfg(dev, "if_counters", (void *)request,
|
|
request->length, pbuf, WLC_IOCTL_MEDLEN, bsscfg_idx,
|
|
&cfg->ioctl_buf_sync);
|
|
if (ret < 0) {
|
|
WL_ERR(("if_counters not supported ret=%d\n", ret));
|
|
goto fail;
|
|
}
|
|
|
|
/* Reuse request to process response */
|
|
response = (wl_stats_report_t *)pbuf;
|
|
|
|
/* version check */
|
|
if (response->version != WL_STATS_REPORT_REQUEST_VERSION_V2) {
|
|
ret = BCME_VERSION;
|
|
goto fail;
|
|
}
|
|
|
|
xtlv = (bcm_xtlv_t *)(response->data);
|
|
|
|
expected_resp_len =
|
|
(BCM_XTLV_LEN(xtlv) + OFFSETOF(wl_stats_report_t, data));
|
|
|
|
/* Check if the received length is as expected */
|
|
if ((response->length > WLC_IOCTL_MEDLEN) ||
|
|
(response->length < expected_resp_len)) {
|
|
ret = BCME_ERROR;
|
|
WL_ERR(("Illegal response length received. Got: %d"
|
|
" Expected: %d. Expected len must be <= %u\n",
|
|
response->length, expected_resp_len, WLC_IOCTL_MEDLEN));
|
|
goto fail;
|
|
}
|
|
|
|
/* check the type. The return data will be in
|
|
* WL_IFSTATS_XTLV_IF container. So check if that container is
|
|
* present
|
|
*/
|
|
if (BCM_XTLV_ID(xtlv) != WL_IFSTATS_XTLV_IF) {
|
|
ret = BCME_ERROR;
|
|
WL_ERR(("unexpected type received: %d Expected: %d\n",
|
|
BCM_XTLV_ID(xtlv), WL_IFSTATS_XTLV_IF));
|
|
goto fail;
|
|
}
|
|
|
|
/* Process XTLVs within WL_IFSTATS_XTLV_IF container */
|
|
ret = bcm_unpack_xtlv_buf(if_stats,
|
|
(uint8*)response->data + BCM_XTLV_HDR_SIZE,
|
|
BCM_XTLV_LEN(xtlv), /* total length of all TLVs in container */
|
|
BCM_XTLV_OPTION_ALIGN32, wl_cfg80211_ifstats_counters_cb);
|
|
if (ret) {
|
|
WL_ERR(("Error unpacking XTLVs in wl_ifstats_counters: %d\n", ret));
|
|
}
|
|
|
|
fail:
|
|
if (pbuf) {
|
|
MFREE(dhdp->osh, pbuf, WLC_IOCTL_MEDLEN);
|
|
}
|
|
|
|
if (request) {
|
|
MFREE(dhdp->osh, request, IF_COUNTERS_PARAM_CONTAINER_LEN_MAX);
|
|
}
|
|
return ret;
|
|
}
|
|
#undef IF_COUNTERS_PARAM_CONTAINER_LEN_MAX
|
|
|
|
static s32
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 16, 0))
|
|
wl_cfg80211_get_station(struct wiphy *wiphy, struct net_device *dev,
|
|
const u8 *mac, struct station_info *sinfo)
|
|
#else
|
|
wl_cfg80211_get_station(struct wiphy *wiphy, struct net_device *dev,
|
|
u8 *mac, struct station_info *sinfo)
|
|
#endif // endif
|
|
{
|
|
struct bcm_cfg80211 *cfg = wiphy_priv(wiphy);
|
|
s32 rssi = 0;
|
|
s32 rate = 0;
|
|
s32 err = 0;
|
|
u16 wl_iftype = 0;
|
|
u16 wl_mode = 0;
|
|
get_pktcnt_t pktcnt;
|
|
wl_if_stats_t *if_stats = NULL;
|
|
sta_info_v4_t *sta = NULL;
|
|
u8 *curmacp = NULL;
|
|
s8 eabuf[ETHER_ADDR_STR_LEN];
|
|
dhd_pub_t *dhd = (dhd_pub_t *)(cfg->pub);
|
|
bool fw_assoc_state = FALSE;
|
|
u32 dhd_assoc_state = 0;
|
|
void *buf;
|
|
|
|
RETURN_EIO_IF_NOT_UP(cfg);
|
|
|
|
if (cfg80211_to_wl_iftype(dev->ieee80211_ptr->iftype, &wl_iftype, &wl_mode) < 0) {
|
|
return -EINVAL;
|
|
}
|
|
|
|
buf = MALLOC(cfg->osh, MAX(sizeof(wl_if_stats_t), WLC_IOCTL_SMLEN));
|
|
if (buf == NULL) {
|
|
WL_ERR(("wl_cfg80211_get_station: MALLOC failed\n"));
|
|
goto error;
|
|
}
|
|
|
|
switch (wl_iftype) {
|
|
case WL_IF_TYPE_STA:
|
|
case WL_IF_TYPE_IBSS:
|
|
if (cfg->roam_offload) {
|
|
struct ether_addr bssid;
|
|
bzero(&bssid, sizeof(bssid));
|
|
err = wldev_ioctl_get(dev, WLC_GET_BSSID, &bssid, ETHER_ADDR_LEN);
|
|
if (err) {
|
|
WL_ERR(("Failed to get current BSSID\n"));
|
|
} else {
|
|
if (memcmp(mac, &bssid.octet, ETHER_ADDR_LEN) != 0) {
|
|
/* roaming is detected */
|
|
err = wl_cfg80211_delayed_roam(cfg, dev, &bssid);
|
|
if (err)
|
|
WL_ERR(("Failed to handle the delayed"
|
|
" roam, err=%d", err));
|
|
mac = (u8 *)bssid.octet;
|
|
}
|
|
}
|
|
}
|
|
dhd_assoc_state = wl_get_drv_status(cfg, CONNECTED, dev);
|
|
DHD_OS_WAKE_LOCK(dhd);
|
|
fw_assoc_state = dhd_is_associated(dhd, 0, &err);
|
|
if (dhd_assoc_state && !fw_assoc_state) {
|
|
/* check roam (join) status */
|
|
if (wl_check_assoc_state(cfg, dev)) {
|
|
fw_assoc_state = TRUE;
|
|
WL_DBG(("roam status\n"));
|
|
}
|
|
}
|
|
DHD_OS_WAKE_UNLOCK(dhd);
|
|
if (!dhd_assoc_state || !fw_assoc_state) {
|
|
WL_ERR(("NOT assoc\n"));
|
|
if (err == -ENODATA)
|
|
goto error;
|
|
if (!dhd_assoc_state) {
|
|
WL_TRACE_HW4(("drv state is not connected \n"));
|
|
}
|
|
if (!fw_assoc_state) {
|
|
WL_TRACE_HW4(("fw state is not associated \n"));
|
|
}
|
|
/* Disconnect due to fw is not associated for
|
|
* FW_ASSOC_WATCHDOG_TIME ms.
|
|
* 'err == 0' of dhd_is_associated() and '!fw_assoc_state'
|
|
* means that BSSID is null.
|
|
*/
|
|
if (dhd_assoc_state && !fw_assoc_state && !err) {
|
|
if (!fw_assoc_watchdog_started) {
|
|
fw_assoc_watchdog_ms = OSL_SYSUPTIME();
|
|
fw_assoc_watchdog_started = TRUE;
|
|
WL_TRACE_HW4(("fw_assoc_watchdog_started \n"));
|
|
} else if (OSL_SYSUPTIME() - fw_assoc_watchdog_ms >
|
|
FW_ASSOC_WATCHDOG_TIME) {
|
|
fw_assoc_watchdog_started = FALSE;
|
|
err = -ENODEV;
|
|
WL_TRACE_HW4(("fw is not associated for %d ms \n",
|
|
(OSL_SYSUPTIME() - fw_assoc_watchdog_ms)));
|
|
goto get_station_err;
|
|
}
|
|
}
|
|
err = -ENODEV;
|
|
goto error;
|
|
}
|
|
if (dhd_is_associated(dhd, 0, NULL)) {
|
|
fw_assoc_watchdog_started = FALSE;
|
|
}
|
|
curmacp = wl_read_prof(cfg, dev, WL_PROF_BSSID);
|
|
if (memcmp(mac, curmacp, ETHER_ADDR_LEN)) {
|
|
WL_ERR(("Wrong Mac address: "MACDBG" != "MACDBG"\n",
|
|
MAC2STRDBG(mac), MAC2STRDBG(curmacp)));
|
|
}
|
|
/* go through to get another information */
|
|
case WL_IF_TYPE_P2P_GC:
|
|
case WL_IF_TYPE_P2P_DISC:
|
|
if ((err = wl_cfg80211_get_rssi(dev, cfg, &rssi)) != BCME_OK) {
|
|
goto get_station_err;
|
|
}
|
|
#if defined(RSSIAVG)
|
|
err = wl_update_connected_rssi_cache(dev, &cfg->g_connected_rssi_cache_ctrl, &rssi);
|
|
if (err) {
|
|
WL_ERR(("Could not get rssi (%d)\n", err));
|
|
goto get_station_err;
|
|
}
|
|
wl_delete_dirty_rssi_cache(&cfg->g_connected_rssi_cache_ctrl);
|
|
wl_reset_rssi_cache(&cfg->g_connected_rssi_cache_ctrl);
|
|
#endif
|
|
#if defined(RSSIOFFSET)
|
|
rssi = wl_update_rssi_offset(dev, rssi);
|
|
#endif
|
|
#if !defined(RSSIAVG) && !defined(RSSIOFFSET)
|
|
// terence 20150419: limit the max. rssi to -2 or the bss will be filtered out in android OS
|
|
rssi = MIN(rssi, RSSI_MAXVAL);
|
|
#endif
|
|
sinfo->filled |= STA_INFO_BIT(INFO_SIGNAL);
|
|
sinfo->signal = rssi;
|
|
WL_DBG(("RSSI %d dBm\n", rssi));
|
|
/* go through to get another information */
|
|
case WL_IF_TYPE_P2P_GO:
|
|
/* Report the current tx rate */
|
|
rate = 0;
|
|
err = wldev_ioctl_get(dev, WLC_GET_RATE, &rate, sizeof(rate));
|
|
if (err) {
|
|
WL_ERR(("Could not get rate (%d)\n", err));
|
|
} else {
|
|
#if defined(USE_DYNAMIC_MAXPKT_RXGLOM)
|
|
int rxpktglom;
|
|
#endif // endif
|
|
rate = dtoh32(rate);
|
|
sinfo->filled |= STA_INFO_BIT(INFO_TX_BITRATE);
|
|
sinfo->txrate.legacy = rate * 5;
|
|
WL_DBG(("Rate %d Mbps\n", (rate / 2)));
|
|
#if defined(USE_DYNAMIC_MAXPKT_RXGLOM)
|
|
rxpktglom = ((rate/2) > 150) ? 20 : 10;
|
|
|
|
if (maxrxpktglom != rxpktglom) {
|
|
maxrxpktglom = rxpktglom;
|
|
WL_DBG(("Rate %d Mbps, update bus:"
|
|
"maxtxpktglom=%d\n", (rate/2), maxrxpktglom));
|
|
err = wldev_iovar_setbuf(dev, "bus:maxtxpktglom",
|
|
(char*)&maxrxpktglom, 4, cfg->ioctl_buf,
|
|
WLC_IOCTL_MAXLEN, &cfg->ioctl_buf_sync);
|
|
if (err < 0) {
|
|
WL_ERR(("set bus:maxtxpktglom failed, %d\n", err));
|
|
}
|
|
}
|
|
#endif // endif
|
|
}
|
|
if_stats = (wl_if_stats_t *)buf;
|
|
bzero(if_stats, sizeof(*if_stats));
|
|
if (FW_SUPPORTED(dhd, ifst)) {
|
|
err = wl_cfg80211_ifstats_counters(dev, if_stats);
|
|
} else
|
|
{
|
|
err = wldev_iovar_getbuf(dev, "if_counters", NULL, 0,
|
|
(char *)if_stats, sizeof(*if_stats), NULL);
|
|
}
|
|
|
|
if (err) {
|
|
// WL_ERR(("if_counters not supported ret=%d\n", err));
|
|
bzero(&pktcnt, sizeof(pktcnt));
|
|
err = wldev_ioctl_get(dev, WLC_GET_PKTCNTS, &pktcnt,
|
|
sizeof(pktcnt));
|
|
if (!err) {
|
|
sinfo->rx_packets = pktcnt.rx_good_pkt;
|
|
sinfo->rx_dropped_misc = pktcnt.rx_bad_pkt;
|
|
sinfo->tx_packets = pktcnt.tx_good_pkt;
|
|
sinfo->tx_failed = pktcnt.tx_bad_pkt;
|
|
}
|
|
} else {
|
|
sinfo->rx_packets = (uint32)dtoh64(if_stats->rxframe);
|
|
sinfo->rx_dropped_misc = 0;
|
|
sinfo->tx_packets = (uint32)dtoh64(if_stats->txfrmsnt);
|
|
sinfo->tx_failed = (uint32)dtoh64(if_stats->txnobuf) +
|
|
(uint32)dtoh64(if_stats->txrunt) +
|
|
(uint32)dtoh64(if_stats->txfail);
|
|
}
|
|
|
|
sinfo->filled |= (STA_INFO_BIT(INFO_RX_PACKETS) |
|
|
STA_INFO_BIT(INFO_RX_DROP_MISC) |
|
|
STA_INFO_BIT(INFO_TX_PACKETS) |
|
|
STA_INFO_BIT(INFO_TX_FAILED));
|
|
get_station_err:
|
|
if (err && (err != -ENODATA)) {
|
|
/* Disconnect due to zero BSSID or error to get RSSI */
|
|
scb_val_t scbval;
|
|
DHD_STATLOG_CTRL(dhd, ST(DISASSOC_INT_START),
|
|
dhd_net2idx(dhd->info, dev), DOT11_RC_DISASSOC_LEAVING);
|
|
scbval.val = htod32(DOT11_RC_DISASSOC_LEAVING);
|
|
err = wldev_ioctl_set(dev, WLC_DISASSOC, &scbval,
|
|
sizeof(scb_val_t));
|
|
if (unlikely(err)) {
|
|
WL_ERR(("disassoc error (%d)\n", err));
|
|
}
|
|
|
|
WL_ERR(("force cfg80211_disconnected: %d\n", err));
|
|
wl_clr_drv_status(cfg, CONNECTED, dev);
|
|
DHD_STATLOG_CTRL(dhd, ST(DISASSOC_DONE),
|
|
dhd_net2idx(dhd->info, dev), DOT11_RC_DISASSOC_LEAVING);
|
|
CFG80211_DISCONNECTED(dev, 0, NULL, 0, false, GFP_KERNEL);
|
|
wl_link_down(cfg);
|
|
}
|
|
break;
|
|
case WL_IF_TYPE_AP:
|
|
err = wldev_iovar_getbuf(dev, "sta_info", (const void*)mac,
|
|
ETHER_ADDR_LEN, buf, WLC_IOCTL_SMLEN, NULL);
|
|
if (err < 0) {
|
|
WL_ERR(("GET STA INFO failed, %d\n", err));
|
|
goto error;
|
|
}
|
|
sinfo->filled = STA_INFO_BIT(INFO_INACTIVE_TIME);
|
|
sta = (sta_info_v4_t *)buf;
|
|
if (sta->ver != WL_STA_VER_4 && sta->ver != WL_STA_VER_5) {
|
|
WL_ERR(("GET STA INFO version mismatch, %d\n", err));
|
|
return BCME_VERSION;
|
|
}
|
|
sta->len = dtoh16(sta->len);
|
|
sta->cap = dtoh16(sta->cap);
|
|
sta->flags = dtoh32(sta->flags);
|
|
sta->idle = dtoh32(sta->idle);
|
|
sta->in = dtoh32(sta->in);
|
|
sinfo->inactive_time = sta->idle * 1000;
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 0, 0)) || defined(WL_COMPAT_WIRELESS)
|
|
if (sta->flags & WL_STA_ASSOC) {
|
|
sinfo->filled |= STA_INFO_BIT(INFO_CONNECTED_TIME);
|
|
sinfo->connected_time = sta->in;
|
|
}
|
|
#endif // endif
|
|
WL_INFORM_MEM(("STA %s, flags 0x%x, idle time %ds, connected time %ds\n",
|
|
bcm_ether_ntoa((const struct ether_addr *)mac, eabuf),
|
|
sta->flags, sta->idle, sta->in));
|
|
break;
|
|
default :
|
|
WL_ERR(("Invalid device mode %d\n", wl_get_mode_by_netdev(cfg, dev)));
|
|
}
|
|
error:
|
|
if (buf) {
|
|
MFREE(cfg->osh, buf, MAX(sizeof(wl_if_stats_t), WLC_IOCTL_SMLEN));
|
|
}
|
|
|
|
return err;
|
|
}
|
|
|
|
static s32
|
|
wl_cfg80211_set_power_mgmt(struct wiphy *wiphy, struct net_device *dev,
|
|
bool enabled, s32 timeout)
|
|
{
|
|
s32 pm;
|
|
s32 err = 0;
|
|
struct bcm_cfg80211 *cfg = wiphy_priv(wiphy);
|
|
struct net_info *_net_info = wl_get_netinfo_by_netdev(cfg, dev);
|
|
s32 mode;
|
|
#ifdef RTT_SUPPORT
|
|
rtt_status_info_t *rtt_status;
|
|
#endif /* RTT_SUPPORT */
|
|
dhd_pub_t *dhd = cfg->pub;
|
|
RETURN_EIO_IF_NOT_UP(cfg);
|
|
|
|
WL_DBG(("Enter\n"));
|
|
mode = wl_get_mode_by_netdev(cfg, dev);
|
|
if (cfg->p2p_net == dev || _net_info == NULL ||
|
|
!wl_get_drv_status(cfg, CONNECTED, dev) ||
|
|
((mode != WL_MODE_BSS) &&
|
|
(mode != WL_MODE_IBSS))) {
|
|
return err;
|
|
}
|
|
|
|
/* Enlarge pm_enable_work */
|
|
wl_add_remove_pm_enable_work(cfg, WL_PM_WORKQ_LONG);
|
|
|
|
pm = enabled ? PM_FAST : PM_OFF;
|
|
if (_net_info->pm_block) {
|
|
WL_ERR(("%s:Do not enable the power save for pm_block %d\n",
|
|
dev->name, _net_info->pm_block));
|
|
pm = PM_OFF;
|
|
}
|
|
if (enabled && dhd_conf_get_pm(dhd) >= 0)
|
|
pm = dhd_conf_get_pm(dhd);
|
|
pm = htod32(pm);
|
|
WL_DBG(("%s:power save %s\n", dev->name, (pm ? "enabled" : "disabled")));
|
|
#ifdef RTT_SUPPORT
|
|
rtt_status = GET_RTTSTATE(dhd);
|
|
if (rtt_status->status != RTT_ENABLED) {
|
|
#endif /* RTT_SUPPORT */
|
|
err = wldev_ioctl_set(dev, WLC_SET_PM, &pm, sizeof(pm));
|
|
if (unlikely(err)) {
|
|
if (err == -ENODEV)
|
|
WL_DBG(("net_device is not ready yet\n"));
|
|
else
|
|
WL_ERR(("error (%d)\n", err));
|
|
return err;
|
|
}
|
|
#ifdef RTT_SUPPORT
|
|
}
|
|
#endif /* RTT_SUPPORT */
|
|
wl_cfg80211_update_power_mode(dev);
|
|
return err;
|
|
}
|
|
|
|
void wl_cfg80211_update_power_mode(struct net_device *dev)
|
|
{
|
|
int err, pm = -1;
|
|
|
|
err = wldev_ioctl_get(dev, WLC_GET_PM, &pm, sizeof(pm));
|
|
if (err)
|
|
WL_ERR(("error (%d)\n", err));
|
|
else if (pm != -1 && dev->ieee80211_ptr)
|
|
dev->ieee80211_ptr->ps = (pm == PM_OFF) ? false : true;
|
|
}
|
|
|
|
static __used u32 wl_find_msb(u16 bit16)
|
|
{
|
|
u32 ret = 0;
|
|
|
|
if (bit16 & 0xff00) {
|
|
ret += 8;
|
|
bit16 >>= 8;
|
|
}
|
|
|
|
if (bit16 & 0xf0) {
|
|
ret += 4;
|
|
bit16 >>= 4;
|
|
}
|
|
|
|
if (bit16 & 0xc) {
|
|
ret += 2;
|
|
bit16 >>= 2;
|
|
}
|
|
|
|
if (bit16 & 2)
|
|
ret += bit16 & 2;
|
|
else if (bit16)
|
|
ret += bit16;
|
|
|
|
return ret;
|
|
}
|
|
|
|
static s32 wl_cfg80211_resume(struct wiphy *wiphy)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wiphy_priv(wiphy);
|
|
struct net_device *ndev = bcmcfg_to_prmry_ndev(cfg);
|
|
s32 err = BCME_OK;
|
|
|
|
if (unlikely(!wl_get_drv_status(cfg, READY, ndev))) {
|
|
WL_INFORM_MEM(("device is not ready\n"));
|
|
return err;
|
|
}
|
|
|
|
return err;
|
|
}
|
|
|
|
static s32
|
|
#if (LINUX_VERSION_CODE > KERNEL_VERSION(2, 6, 39)) || defined(WL_COMPAT_WIRELESS)
|
|
wl_cfg80211_suspend(struct wiphy *wiphy, struct cfg80211_wowlan *wow)
|
|
#else
|
|
wl_cfg80211_suspend(struct wiphy *wiphy)
|
|
#endif // endif
|
|
{
|
|
s32 err = BCME_OK;
|
|
#ifdef DHD_CLEAR_ON_SUSPEND
|
|
struct bcm_cfg80211 *cfg = wiphy_priv(wiphy);
|
|
struct net_info *iter, *next;
|
|
struct net_device *ndev = bcmcfg_to_prmry_ndev(cfg);
|
|
unsigned long flags;
|
|
|
|
if (unlikely(!wl_get_drv_status(cfg, READY, ndev))) {
|
|
WL_INFORM_MEM(("device is not ready : status (%d)\n",
|
|
(int)cfg->status));
|
|
return err;
|
|
}
|
|
for_each_ndev(cfg, iter, next) {
|
|
/* p2p discovery iface doesn't have a ndev associated with it (for kernel > 3.8) */
|
|
if (iter->ndev)
|
|
wl_set_drv_status(cfg, SCAN_ABORTING, iter->ndev);
|
|
}
|
|
WL_CFG_DRV_LOCK(&cfg->cfgdrv_lock, flags);
|
|
if (cfg->scan_request) {
|
|
wl_notify_scan_done(cfg, true);
|
|
cfg->scan_request = NULL;
|
|
}
|
|
for_each_ndev(cfg, iter, next) {
|
|
if (iter->ndev) {
|
|
wl_clr_drv_status(cfg, SCANNING, iter->ndev);
|
|
wl_clr_drv_status(cfg, SCAN_ABORTING, iter->ndev);
|
|
}
|
|
}
|
|
WL_CFG_DRV_UNLOCK(&cfg->cfgdrv_lock, flags);
|
|
for_each_ndev(cfg, iter, next) {
|
|
if (iter->ndev) {
|
|
if (wl_get_drv_status(cfg, CONNECTING, iter->ndev)) {
|
|
wl_bss_connect_done(cfg, iter->ndev, NULL, NULL, false);
|
|
}
|
|
}
|
|
}
|
|
#endif /* DHD_CLEAR_ON_SUSPEND */
|
|
|
|
return err;
|
|
}
|
|
|
|
static s32
|
|
wl_update_pmklist(struct net_device *dev, struct wl_pmk_list *pmk_list,
|
|
s32 err)
|
|
{
|
|
int i, j;
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(dev);
|
|
struct net_device *primary_dev = bcmcfg_to_prmry_ndev(cfg);
|
|
int npmkids = cfg->pmk_list->pmkids.count;
|
|
|
|
ASSERT(cfg->pmk_list->pmkids.length >= (sizeof(u16)*2));
|
|
if (!pmk_list) {
|
|
WL_ERR(("pmk_list is NULL\n"));
|
|
return -EINVAL;
|
|
}
|
|
/* pmk list is supported only for STA interface i.e. primary interface
|
|
* Refer code wlc_bsscfg.c->wlc_bsscfg_sta_init
|
|
*/
|
|
if (primary_dev != dev) {
|
|
WL_INFORM_MEM(("Not supporting Flushing pmklist on virtual"
|
|
" interfaces than primary interface\n"));
|
|
return err;
|
|
}
|
|
|
|
WL_DBG(("No of elements %d\n", npmkids));
|
|
for (i = 0; i < npmkids; i++) {
|
|
WL_DBG(("PMKID[%d]: %pM =\n", i,
|
|
&pmk_list->pmkids.pmkid[i].bssid));
|
|
for (j = 0; j < WPA2_PMKID_LEN; j++) {
|
|
WL_DBG(("%02x\n", pmk_list->pmkids.pmkid[i].pmkid[j]));
|
|
}
|
|
}
|
|
if (cfg->wlc_ver.wlc_ver_major >= MIN_PMKID_LIST_V3_FW_MAJOR) {
|
|
pmk_list->pmkids.version = PMKID_LIST_VER_3;
|
|
err = wldev_iovar_setbuf(dev, "pmkid_info", (char *)pmk_list,
|
|
sizeof(*pmk_list), cfg->ioctl_buf,
|
|
WLC_IOCTL_MAXLEN, &cfg->ioctl_buf_sync);
|
|
}
|
|
else if (cfg->wlc_ver.wlc_ver_major == MIN_PMKID_LIST_V2_FW_MAJOR) {
|
|
u32 v2_list_size = (u32)(sizeof(pmkid_list_v2_t) + npmkids*sizeof(pmkid_v2_t));
|
|
pmkid_list_v2_t *pmkid_v2_list = (pmkid_list_v2_t *)MALLOCZ(cfg->osh, v2_list_size);
|
|
|
|
if (pmkid_v2_list == NULL) {
|
|
WL_ERR(("failed to allocate pmkid list\n"));
|
|
return BCME_NOMEM;
|
|
}
|
|
|
|
pmkid_v2_list->version = PMKID_LIST_VER_2;
|
|
/* Account for version, length and pmkid_v2_t fields */
|
|
pmkid_v2_list->length = (npmkids * sizeof(pmkid_v2_t)) + (2 * sizeof(u16));
|
|
|
|
for (i = 0; i < npmkids; i++) {
|
|
/* memcpy_s return checks not needed as buffers are of same size */
|
|
(void)memcpy_s(&pmkid_v2_list->pmkid[i].BSSID,
|
|
ETHER_ADDR_LEN, &pmk_list->pmkids.pmkid[i].bssid,
|
|
ETHER_ADDR_LEN);
|
|
|
|
/* copy pmkid if available */
|
|
if (pmk_list->pmkids.pmkid[i].pmkid_len) {
|
|
(void)memcpy_s(pmkid_v2_list->pmkid[i].PMKID,
|
|
WPA2_PMKID_LEN,
|
|
pmk_list->pmkids.pmkid[i].pmkid,
|
|
pmk_list->pmkids.pmkid[i].pmkid_len);
|
|
}
|
|
|
|
if (pmk_list->pmkids.pmkid[i].pmk_len) {
|
|
(void)memcpy_s(pmkid_v2_list->pmkid[i].pmk,
|
|
pmk_list->pmkids.pmkid[i].pmk_len,
|
|
pmk_list->pmkids.pmkid[i].pmk,
|
|
pmk_list->pmkids.pmkid[i].pmk_len);
|
|
pmkid_v2_list->pmkid[i].pmk_len = pmk_list->pmkids.pmkid[i].pmk_len;
|
|
}
|
|
|
|
if (pmk_list->pmkids.pmkid[i].ssid_len) {
|
|
(void)memcpy_s(pmkid_v2_list->pmkid[i].ssid.ssid,
|
|
pmk_list->pmkids.pmkid[i].ssid_len,
|
|
pmk_list->pmkids.pmkid[i].ssid,
|
|
pmk_list->pmkids.pmkid[i].ssid_len);
|
|
pmkid_v2_list->pmkid[i].ssid.ssid_len
|
|
= pmk_list->pmkids.pmkid[i].ssid_len;
|
|
}
|
|
|
|
(void)memcpy_s(pmkid_v2_list->pmkid[i].fils_cache_id,
|
|
FILS_CACHE_ID_LEN, &pmk_list->pmkids.pmkid[i].fils_cache_id,
|
|
FILS_CACHE_ID_LEN);
|
|
pmkid_v2_list->pmkid[i].length = PMKID_ELEM_V2_LENGTH;
|
|
}
|
|
err = wldev_iovar_setbuf(dev, "pmkid_info", (char *)pmkid_v2_list,
|
|
v2_list_size, cfg->ioctl_buf,
|
|
WLC_IOCTL_MAXLEN, &cfg->ioctl_buf_sync);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("pmkid_info failed (%d)\n", err));
|
|
}
|
|
|
|
MFREE(cfg->osh, pmkid_v2_list, v2_list_size);
|
|
}
|
|
else {
|
|
u32 v1_list_size = (u32)(sizeof(pmkid_list_v1_t) + npmkids*sizeof(pmkid_v1_t));
|
|
pmkid_list_v1_t *pmkid_v1_list = (pmkid_list_v1_t *)MALLOCZ(cfg->osh, v1_list_size);
|
|
if (pmkid_v1_list == NULL) {
|
|
WL_ERR(("failed to allocate pmkid list\n"));
|
|
return BCME_NOMEM;
|
|
}
|
|
for (i = 0; i < npmkids; i++) {
|
|
/* memcpy_s return checks not needed as buffers are of same size */
|
|
(void)memcpy_s(&pmkid_v1_list->pmkid[i].BSSID,
|
|
ETHER_ADDR_LEN, &pmk_list->pmkids.pmkid[i].bssid,
|
|
ETHER_ADDR_LEN);
|
|
(void)memcpy_s(pmkid_v1_list->pmkid[i].PMKID,
|
|
WPA2_PMKID_LEN, pmk_list->pmkids.pmkid[i].pmkid,
|
|
WPA2_PMKID_LEN);
|
|
pmkid_v1_list->npmkid++;
|
|
}
|
|
err = wldev_iovar_setbuf(dev, "pmkid_info", (char *)pmkid_v1_list,
|
|
v1_list_size, cfg->ioctl_buf,
|
|
WLC_IOCTL_MAXLEN, &cfg->ioctl_buf_sync);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("pmkid_info failed (%d)\n", err));
|
|
}
|
|
|
|
MFREE(cfg->osh, pmkid_v1_list, v1_list_size);
|
|
}
|
|
return err;
|
|
}
|
|
|
|
/* TODO: remove temporal cfg->pmk_list list, and call wl_cfg80211_update_pmksa for single
|
|
* entry operation.
|
|
*/
|
|
static s32
|
|
wl_cfg80211_set_pmksa(struct wiphy *wiphy, struct net_device *dev,
|
|
struct cfg80211_pmksa *pmksa)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wiphy_priv(wiphy);
|
|
s32 err = 0;
|
|
int i;
|
|
int npmkids = cfg->pmk_list->pmkids.count;
|
|
dhd_pub_t *dhdp = (dhd_pub_t *)(cfg->pub);
|
|
|
|
RETURN_EIO_IF_NOT_UP(cfg);
|
|
BCM_REFERENCE(dhdp);
|
|
DHD_STATLOG_CTRL(dhdp, ST(INSTALL_PMKSA), dhd_net2idx(dhdp->info, dev), 0);
|
|
|
|
for (i = 0; i < npmkids; i++) {
|
|
if (pmksa->bssid != NULL) {
|
|
if (!memcmp(pmksa->bssid, &cfg->pmk_list->pmkids.pmkid[i].bssid,
|
|
ETHER_ADDR_LEN))
|
|
break;
|
|
}
|
|
#ifdef WL_FILS
|
|
else if (pmksa->ssid != NULL) {
|
|
if (!memcmp(pmksa->ssid, &cfg->pmk_list->pmkids.pmkid[i].ssid,
|
|
pmksa->ssid_len))
|
|
break;
|
|
}
|
|
#endif /* WL_FILS */
|
|
}
|
|
if (i < WL_NUM_PMKIDS_MAX) {
|
|
if (pmksa->bssid != NULL) {
|
|
memcpy(&cfg->pmk_list->pmkids.pmkid[i].bssid, pmksa->bssid,
|
|
ETHER_ADDR_LEN);
|
|
}
|
|
#ifdef WL_FILS
|
|
else if (pmksa->ssid != NULL) {
|
|
cfg->pmk_list->pmkids.pmkid[i].ssid_len = pmksa->ssid_len;
|
|
memcpy(&cfg->pmk_list->pmkids.pmkid[i].ssid, pmksa->ssid,
|
|
pmksa->ssid_len);
|
|
memcpy(&cfg->pmk_list->pmkids.pmkid[i].fils_cache_id, pmksa->cache_id,
|
|
FILS_CACHE_ID_LEN);
|
|
}
|
|
#endif /* WL_FILS */
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(4, 12, 0) || defined(WL_FILS))
|
|
if (pmksa->pmk_len) {
|
|
if (memcpy_s(&cfg->pmk_list->pmkids.pmkid[i].pmk, PMK_LEN_MAX, pmksa->pmk,
|
|
pmksa->pmk_len)) {
|
|
WL_ERR(("invalid pmk len = %zu", pmksa->pmk_len));
|
|
} else {
|
|
cfg->pmk_list->pmkids.pmkid[i].pmk_len = pmksa->pmk_len;
|
|
}
|
|
}
|
|
#endif /* LINUX_VERSION_CODE >= KERNEL_VERSION(4, 12, 0) || defined(WL_FILS) */
|
|
/* return check not required as buffer lengths are same */
|
|
(void)memcpy_s(cfg->pmk_list->pmkids.pmkid[i].pmkid, WPA2_PMKID_LEN, pmksa->pmkid,
|
|
WPA2_PMKID_LEN);
|
|
cfg->pmk_list->pmkids.pmkid[i].pmkid_len = WPA2_PMKID_LEN;
|
|
|
|
/* set lifetime not to expire in firmware by default.
|
|
* Currently, wpa_supplicant control PMKID lifetime on his end. e.g) set 12 hours
|
|
* when it expired, wpa_supplicant should call set_pmksa/del_pmksa to update
|
|
* corresponding entry.
|
|
*/
|
|
cfg->pmk_list->pmkids.pmkid[i].time_left = KEY_PERM_PMK;
|
|
if (i == npmkids) {
|
|
cfg->pmk_list->pmkids.length += sizeof(pmkid_v3_t);
|
|
cfg->pmk_list->pmkids.count++;
|
|
}
|
|
} else {
|
|
err = -EINVAL;
|
|
}
|
|
|
|
#if (WL_DBG_LEVEL > 0)
|
|
if (pmksa->bssid != NULL) {
|
|
WL_DBG(("set_pmksa,IW_PMKSA_ADD - PMKID: %pM =\n",
|
|
&cfg->pmk_list->pmkids.pmkid[npmkids - 1].bssid));
|
|
}
|
|
for (i = 0; i < WPA2_PMKID_LEN; i++) {
|
|
WL_DBG(("%02x\n",
|
|
cfg->pmk_list->pmkids.pmkid[npmkids - 1].
|
|
pmkid[i]));
|
|
}
|
|
#endif /* (WL_DBG_LEVEL > 0) */
|
|
|
|
err = wl_update_pmklist(dev, cfg->pmk_list, err);
|
|
|
|
return err;
|
|
}
|
|
|
|
/* sending pmkid_info IOVAR to manipulate PMKID(PMKSA) list in firmware.
|
|
* input @pmksa: host given single pmksa info.
|
|
* if it's NULL, assume whole list manipulated. e.g) flush all PMKIDs in firmware.
|
|
* input @set: TRUE means adding PMKSA operation. FALSE means deleting.
|
|
* return: log internal BCME_XXX error, and convert it to -EINVAL to linux generic error code.
|
|
*/
|
|
static s32 wl_cfg80211_update_pmksa(struct wiphy *wiphy, struct net_device *dev,
|
|
struct cfg80211_pmksa *pmksa, bool set) {
|
|
|
|
struct bcm_cfg80211 *cfg = wiphy_priv(wiphy);
|
|
s32 err = 0;
|
|
pmkid_list_v3_t *pmk_list;
|
|
uint32 alloc_len;
|
|
|
|
RETURN_EIO_IF_NOT_UP(cfg);
|
|
|
|
if (cfg->wlc_ver.wlc_ver_major < MIN_PMKID_LIST_V3_FW_MAJOR) {
|
|
WL_ERR(("wlc_ver_major not supported:%d\n", cfg->wlc_ver.wlc_ver_major));
|
|
return BCME_VERSION;
|
|
}
|
|
|
|
alloc_len = (uint32) OFFSETOF(pmkid_list_v3_t, pmkid) + ((pmksa) ? sizeof(pmkid_v3_t) : 0);
|
|
pmk_list = (pmkid_list_v3_t *)MALLOCZ(cfg->osh, alloc_len);
|
|
|
|
if (pmk_list == NULL) {
|
|
return BCME_NOMEM;
|
|
}
|
|
|
|
pmk_list->version = PMKID_LIST_VER_3;
|
|
pmk_list->length = alloc_len;
|
|
pmk_list->count = (pmksa) ? 1 : 0; // 1 means single entry operation, 0 means whole list.
|
|
|
|
/* controll set/del action by lifetime parameter accordingly.
|
|
* if set == TRUE, it's set PMKID action with lifetime permanent.
|
|
* if set == FALSE, it's del PMKID action with lifetime zero.
|
|
*/
|
|
pmk_list->pmkid->time_left = (set) ? KEY_PERM_PMK : 0;
|
|
|
|
if (pmksa) {
|
|
if (pmksa->bssid) {
|
|
err = memcpy_s(&pmk_list->pmkid->bssid, sizeof(pmk_list->pmkid->bssid),
|
|
pmksa->bssid, ETHER_ADDR_LEN);
|
|
if (err) {
|
|
goto exit;
|
|
}
|
|
}
|
|
if (pmksa->pmkid) {
|
|
err = memcpy_s(&pmk_list->pmkid->pmkid, sizeof(pmk_list->pmkid->pmkid),
|
|
pmksa->pmkid, WPA2_PMKID_LEN);
|
|
if (err) {
|
|
goto exit;
|
|
}
|
|
}
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(4, 12, 0))
|
|
if (pmksa->pmk) {
|
|
err = memcpy_s(&pmk_list->pmkid->pmk, sizeof(pmk_list->pmkid->pmk),
|
|
pmksa->pmk, pmksa->pmk_len);
|
|
if (err) {
|
|
goto exit;
|
|
}
|
|
pmk_list->pmkid->pmk_len = pmksa->pmk_len;
|
|
}
|
|
if (pmksa->ssid) {
|
|
err = memcpy_s(&pmk_list->pmkid->ssid, sizeof(pmk_list->pmkid->ssid),
|
|
pmksa->ssid, pmksa->ssid_len);
|
|
if (err) {
|
|
goto exit;
|
|
}
|
|
pmk_list->pmkid->ssid_len = pmksa->ssid_len;
|
|
}
|
|
if (pmksa->cache_id) {
|
|
pmk_list->pmkid->fils_cache_id = *(uint16 *)pmksa->cache_id;
|
|
}
|
|
#endif /* LINUX_VERSION_CODE >= KERNEL_VERSION(4, 12, 0) */
|
|
}
|
|
err = wldev_iovar_setbuf(dev, "pmkid_info", (char *)pmk_list,
|
|
alloc_len, cfg->ioctl_buf,
|
|
WLC_IOCTL_MAXLEN, &cfg->ioctl_buf_sync);
|
|
|
|
exit:
|
|
if (pmk_list) {
|
|
MFREE(cfg->osh, pmk_list, alloc_len);
|
|
}
|
|
return err;
|
|
}
|
|
|
|
/* TODO: remove temporal cfg->pmk_list list, and call wl_cfg80211_update_pmksa for single
|
|
* entry operation.
|
|
*/
|
|
static s32
|
|
wl_cfg80211_del_pmksa(struct wiphy *wiphy, struct net_device *dev,
|
|
struct cfg80211_pmksa *pmksa)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wiphy_priv(wiphy);
|
|
s32 err = 0;
|
|
int i;
|
|
int npmkids = cfg->pmk_list->pmkids.count;
|
|
RETURN_EIO_IF_NOT_UP(cfg);
|
|
|
|
if (!pmksa) {
|
|
WL_ERR(("pmksa is not initialized\n"));
|
|
return BCME_ERROR;
|
|
}
|
|
if (!npmkids) {
|
|
/* nmpkids = 0, nothing to delete */
|
|
WL_DBG(("npmkids=0. Skip del\n"));
|
|
return BCME_OK;
|
|
}
|
|
|
|
#if (WL_DBG_LEVEL > 0)
|
|
if (pmksa->bssid) {
|
|
WL_DBG(("del_pmksa,IW_PMKSA_REMOVE - PMKID: %pM =\n",
|
|
pmksa->bssid));
|
|
}
|
|
#ifdef WL_FILS
|
|
else if (pmksa->ssid) {
|
|
WL_DBG(("FILS: del_pmksa for ssid: "));
|
|
for (i = 0; i < pmksa->ssid_len; i++) {
|
|
WL_DBG(("%c", pmksa->ssid[i]));
|
|
}
|
|
WL_DBG(("\n"));
|
|
}
|
|
#endif /* WL_FILS */
|
|
if (pmksa->pmkid) {
|
|
for (i = 0; i < WPA2_PMKID_LEN; i++) {
|
|
WL_DBG(("%02x\n", pmksa->pmkid[i]));
|
|
}
|
|
}
|
|
#endif /* (WL_DBG_LEVEL > 0) */
|
|
|
|
for (i = 0; i < npmkids; i++) {
|
|
if (pmksa->bssid) {
|
|
if (!memcmp
|
|
(pmksa->bssid, &cfg->pmk_list->pmkids.pmkid[i].bssid,
|
|
ETHER_ADDR_LEN)) {
|
|
break;
|
|
}
|
|
}
|
|
#ifdef WL_FILS
|
|
else if (pmksa->ssid) {
|
|
if (!memcmp
|
|
(pmksa->ssid, &cfg->pmk_list->pmkids.pmkid[i].ssid,
|
|
pmksa->ssid_len)) {
|
|
break;
|
|
}
|
|
}
|
|
#endif /* WL_FILS */
|
|
}
|
|
if ((npmkids > 0) && (i < npmkids)) {
|
|
bzero(&cfg->pmk_list->pmkids.pmkid[i], sizeof(pmkid_v3_t));
|
|
for (; i < (npmkids - 1); i++) {
|
|
(void)memcpy_s(&cfg->pmk_list->pmkids.pmkid[i],
|
|
sizeof(pmkid_v3_t),
|
|
&cfg->pmk_list->pmkids.pmkid[i + 1],
|
|
sizeof(pmkid_v3_t));
|
|
}
|
|
npmkids--;
|
|
cfg->pmk_list->pmkids.length -= sizeof(pmkid_v3_t);
|
|
cfg->pmk_list->pmkids.count--;
|
|
|
|
} else {
|
|
err = -EINVAL;
|
|
}
|
|
|
|
/* current wl_update_pmklist() doesn't delete corresponding PMKID entry.
|
|
* inside firmware. So we need to issue delete action explicitely through
|
|
* this function.
|
|
*/
|
|
err = wl_cfg80211_update_pmksa(wiphy, dev, pmksa, FALSE);
|
|
/* intentional fall through even on error.
|
|
* it should work above MIN_PMKID_LIST_V3_FW_MAJOR, otherwise let ignore it.
|
|
*/
|
|
|
|
err = wl_update_pmklist(dev, cfg->pmk_list, err);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
/* TODO: remove temporal cfg->pmk_list list, and call wl_cfg80211_update_pmksa for single
|
|
* entry operation.
|
|
*/
|
|
static s32
|
|
wl_cfg80211_flush_pmksa(struct wiphy *wiphy, struct net_device *dev)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wiphy_priv(wiphy);
|
|
s32 err = 0;
|
|
RETURN_EIO_IF_NOT_UP(cfg);
|
|
bzero(cfg->pmk_list, sizeof(*cfg->pmk_list));
|
|
cfg->pmk_list->pmkids.length = OFFSETOF(pmkid_list_v3_t, pmkid);
|
|
cfg->pmk_list->pmkids.count = 0;
|
|
cfg->pmk_list->pmkids.version = PMKID_LIST_VER_3;
|
|
err = wl_update_pmklist(dev, cfg->pmk_list, err);
|
|
return err;
|
|
}
|
|
|
|
static s32
|
|
wl_cfg80211_remain_on_channel(struct wiphy *wiphy, bcm_struct_cfgdev *cfgdev,
|
|
struct ieee80211_channel *channel,
|
|
#if !defined(WL_CFG80211_P2P_DEV_IF)
|
|
enum nl80211_channel_type channel_type,
|
|
#endif /* WL_CFG80211_P2P_DEV_IF */
|
|
unsigned int duration, u64 *cookie)
|
|
{
|
|
s32 target_channel;
|
|
u32 id;
|
|
s32 err = BCME_OK;
|
|
struct ether_addr primary_mac;
|
|
struct net_device *ndev = NULL;
|
|
struct bcm_cfg80211 *cfg = wiphy_priv(wiphy);
|
|
|
|
RETURN_EIO_IF_NOT_UP(cfg);
|
|
#ifdef DHD_IFDEBUG
|
|
PRINT_WDEV_INFO(cfgdev);
|
|
#endif /* DHD_IFDEBUG */
|
|
|
|
ndev = cfgdev_to_wlc_ndev(cfgdev, cfg);
|
|
|
|
mutex_lock(&cfg->usr_sync);
|
|
WL_DBG(("Enter, channel: %d, duration ms (%d) SCANNING ?? %s \n",
|
|
ieee80211_frequency_to_channel(channel->center_freq),
|
|
duration, (wl_get_drv_status(cfg, SCANNING, ndev)) ? "YES":"NO"));
|
|
|
|
if (!cfg->p2p) {
|
|
WL_ERR(("cfg->p2p is not initialized\n"));
|
|
err = BCME_ERROR;
|
|
goto exit;
|
|
}
|
|
|
|
#ifdef P2P_LISTEN_OFFLOADING
|
|
if (wl_get_p2p_status(cfg, DISC_IN_PROGRESS)) {
|
|
WL_ERR(("P2P_FIND: Discovery offload is in progress\n"));
|
|
err = -EAGAIN;
|
|
goto exit;
|
|
}
|
|
#endif /* P2P_LISTEN_OFFLOADING */
|
|
|
|
#ifndef WL_CFG80211_VSDB_PRIORITIZE_SCAN_REQUEST
|
|
if (wl_get_drv_status_all(cfg, SCANNING)) {
|
|
wl_cfg80211_cancel_scan(cfg);
|
|
}
|
|
#endif /* not WL_CFG80211_VSDB_PRIORITIZE_SCAN_REQUEST */
|
|
|
|
target_channel = ieee80211_frequency_to_channel(channel->center_freq);
|
|
memcpy(&cfg->remain_on_chan, channel, sizeof(struct ieee80211_channel));
|
|
#if defined(WL_ENABLE_P2P_IF)
|
|
cfg->remain_on_chan_type = channel_type;
|
|
#endif /* WL_ENABLE_P2P_IF */
|
|
id = ++cfg->last_roc_id;
|
|
if (id == 0)
|
|
id = ++cfg->last_roc_id;
|
|
*cookie = id;
|
|
|
|
#ifdef WL_CFG80211_VSDB_PRIORITIZE_SCAN_REQUEST
|
|
if (wl_get_drv_status(cfg, SCANNING, ndev)) {
|
|
timer_list_compat_t *_timer;
|
|
WL_DBG(("scan is running. go to fake listen state\n"));
|
|
|
|
if (duration > LONG_LISTEN_TIME) {
|
|
wl_cfg80211_scan_abort(cfg);
|
|
} else {
|
|
wl_set_drv_status(cfg, FAKE_REMAINING_ON_CHANNEL, ndev);
|
|
|
|
if (timer_pending(&cfg->p2p->listen_timer)) {
|
|
WL_DBG(("cancel current listen timer \n"));
|
|
del_timer_sync(&cfg->p2p->listen_timer);
|
|
}
|
|
|
|
_timer = &cfg->p2p->listen_timer;
|
|
wl_clr_p2p_status(cfg, LISTEN_EXPIRED);
|
|
|
|
INIT_TIMER(_timer, wl_cfgp2p_listen_expired, duration, 0);
|
|
|
|
err = BCME_OK;
|
|
goto exit;
|
|
}
|
|
}
|
|
#endif /* WL_CFG80211_VSDB_PRIORITIZE_SCAN_REQUEST */
|
|
|
|
#ifdef WL_BCNRECV
|
|
/* check fakeapscan in progress then abort */
|
|
wl_android_bcnrecv_stop(ndev, WL_BCNRECV_LISTENBUSY);
|
|
#endif /* WL_BCNRECV */
|
|
#ifdef WL_CFG80211_SYNC_GON
|
|
if (wl_get_drv_status_all(cfg, WAITING_NEXT_ACT_FRM_LISTEN)) {
|
|
/* do not enter listen mode again if we are in listen mode already for next af.
|
|
* remain on channel completion will be returned by waiting next af completion.
|
|
*/
|
|
#ifdef WL_CFG80211_VSDB_PRIORITIZE_SCAN_REQUEST
|
|
wl_set_drv_status(cfg, FAKE_REMAINING_ON_CHANNEL, ndev);
|
|
#else
|
|
wl_set_drv_status(cfg, REMAINING_ON_CHANNEL, ndev);
|
|
#endif /* WL_CFG80211_VSDB_PRIORITIZE_SCAN_REQUEST */
|
|
goto exit;
|
|
}
|
|
#endif /* WL_CFG80211_SYNC_GON */
|
|
if (cfg->p2p && !cfg->p2p->on) {
|
|
/* In case of p2p_listen command, supplicant send remain_on_channel
|
|
* without turning on P2P
|
|
*/
|
|
get_primary_mac(cfg, &primary_mac);
|
|
#ifndef WL_P2P_USE_RANDMAC
|
|
wl_cfgp2p_generate_bss_mac(cfg, &primary_mac);
|
|
#endif /* WL_P2P_USE_RANDMAC */
|
|
p2p_on(cfg) = true;
|
|
}
|
|
|
|
if (p2p_is_on(cfg)) {
|
|
err = wl_cfgp2p_enable_discovery(cfg, ndev, NULL, 0);
|
|
if (unlikely(err)) {
|
|
goto exit;
|
|
}
|
|
#ifndef WL_CFG80211_VSDB_PRIORITIZE_SCAN_REQUEST
|
|
wl_set_drv_status(cfg, REMAINING_ON_CHANNEL, ndev);
|
|
#endif /* not WL_CFG80211_VSDB_PRIORITIZE_SCAN_REQUEST */
|
|
err = wl_cfgp2p_discover_listen(cfg, target_channel, duration);
|
|
|
|
#ifdef WL_CFG80211_VSDB_PRIORITIZE_SCAN_REQUEST
|
|
if (err == BCME_OK) {
|
|
wl_set_drv_status(cfg, REMAINING_ON_CHANNEL, ndev);
|
|
} else {
|
|
/* if failed, firmware may be internal scanning state.
|
|
* so other scan request shall not abort it
|
|
*/
|
|
wl_set_drv_status(cfg, FAKE_REMAINING_ON_CHANNEL, ndev);
|
|
}
|
|
#endif /* WL_CFG80211_VSDB_PRIORITIZE_SCAN_REQUEST */
|
|
|
|
if (err) {
|
|
wl_flush_fw_log_buffer(ndev, FW_LOGSET_MASK_ALL);
|
|
}
|
|
|
|
/* WAR: set err = ok to prevent cookie mismatch in wpa_supplicant
|
|
* and expire timer will send a completion to the upper layer
|
|
*/
|
|
err = BCME_OK;
|
|
}
|
|
|
|
exit:
|
|
if (err == BCME_OK) {
|
|
WL_DBG(("Success\n"));
|
|
#if defined(WL_CFG80211_P2P_DEV_IF)
|
|
cfg80211_ready_on_channel(cfgdev, *cookie, channel,
|
|
duration, GFP_KERNEL);
|
|
#else
|
|
cfg80211_ready_on_channel(cfgdev, *cookie, channel,
|
|
channel_type, duration, GFP_KERNEL);
|
|
#endif /* WL_CFG80211_P2P_DEV_IF */
|
|
} else {
|
|
WL_ERR(("Fail to Set (err=%d cookie:%llu)\n", err, *cookie));
|
|
}
|
|
mutex_unlock(&cfg->usr_sync);
|
|
return err;
|
|
}
|
|
|
|
static s32
|
|
wl_cfg80211_cancel_remain_on_channel(struct wiphy *wiphy,
|
|
bcm_struct_cfgdev *cfgdev, u64 cookie)
|
|
{
|
|
s32 err = 0;
|
|
|
|
struct bcm_cfg80211 *cfg = wiphy_priv(wiphy);
|
|
|
|
#ifdef P2PLISTEN_AP_SAMECHN
|
|
struct net_device *dev;
|
|
#endif /* P2PLISTEN_AP_SAMECHN */
|
|
|
|
RETURN_EIO_IF_NOT_UP(cfg);
|
|
|
|
#ifdef DHD_IFDEBUG
|
|
PRINT_WDEV_INFO(cfgdev);
|
|
#endif /* DHD_IFDEBUG */
|
|
|
|
#if defined(WL_CFG80211_P2P_DEV_IF)
|
|
if (cfgdev->iftype == NL80211_IFTYPE_P2P_DEVICE) {
|
|
WL_DBG((" enter ) on P2P dedicated discover interface\n"));
|
|
}
|
|
#else
|
|
WL_DBG((" enter ) netdev_ifidx: %d \n", cfgdev->ifindex));
|
|
#endif /* WL_CFG80211_P2P_DEV_IF */
|
|
|
|
#ifdef P2PLISTEN_AP_SAMECHN
|
|
if (cfg && cfg->p2p_resp_apchn_status) {
|
|
dev = bcmcfg_to_prmry_ndev(cfg);
|
|
wl_cfg80211_set_p2p_resp_ap_chn(dev, 0);
|
|
cfg->p2p_resp_apchn_status = false;
|
|
WL_DBG(("p2p_resp_apchn_status Turn OFF \n"));
|
|
}
|
|
#endif /* P2PLISTEN_AP_SAMECHN */
|
|
|
|
if (cfg->last_roc_id == cookie) {
|
|
wl_cfgp2p_set_p2p_mode(cfg, WL_P2P_DISC_ST_SCAN, 0, 0,
|
|
wl_to_p2p_bss_bssidx(cfg, P2PAPI_BSSCFG_DEVICE));
|
|
} else {
|
|
WL_ERR(("wl_cfg80211_cancel_remain_on_channel: ignore, request cookie(%llu)"
|
|
" is not matched. (cur : %llu)\n",
|
|
cookie, cfg->last_roc_id));
|
|
}
|
|
|
|
return err;
|
|
}
|
|
|
|
static void
|
|
wl_cfg80211_afx_handler(struct work_struct *work)
|
|
{
|
|
struct afx_hdl *afx_instance;
|
|
struct bcm_cfg80211 *cfg;
|
|
s32 ret = BCME_OK;
|
|
|
|
BCM_SET_CONTAINER_OF(afx_instance, work, struct afx_hdl, work);
|
|
if (afx_instance) {
|
|
cfg = wl_get_cfg(afx_instance->dev);
|
|
if (cfg != NULL && cfg->afx_hdl->is_active) {
|
|
if (cfg->afx_hdl->is_listen && cfg->afx_hdl->my_listen_chan) {
|
|
ret = wl_cfgp2p_discover_listen(cfg, cfg->afx_hdl->my_listen_chan,
|
|
(100 * (1 + (RANDOM32() % 3)))); /* 100ms ~ 300ms */
|
|
} else {
|
|
ret = wl_cfgp2p_act_frm_search(cfg, cfg->afx_hdl->dev,
|
|
cfg->afx_hdl->bssidx, cfg->afx_hdl->peer_listen_chan,
|
|
NULL);
|
|
}
|
|
if (unlikely(ret != BCME_OK)) {
|
|
WL_ERR(("ERROR occurred! returned value is (%d)\n", ret));
|
|
if (wl_get_drv_status_all(cfg, FINDING_COMMON_CHANNEL))
|
|
complete(&cfg->act_frm_scan);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
static s32
|
|
wl_cfg80211_af_searching_channel(struct bcm_cfg80211 *cfg, struct net_device *dev)
|
|
{
|
|
u32 max_retry = WL_CHANNEL_SYNC_RETRY;
|
|
bool is_p2p_gas = false;
|
|
|
|
if (dev == NULL)
|
|
return -1;
|
|
|
|
WL_DBG((" enter ) \n"));
|
|
|
|
wl_set_drv_status(cfg, FINDING_COMMON_CHANNEL, dev);
|
|
cfg->afx_hdl->is_active = TRUE;
|
|
|
|
if (cfg->afx_hdl->pending_tx_act_frm) {
|
|
wl_action_frame_t *action_frame;
|
|
action_frame = &(cfg->afx_hdl->pending_tx_act_frm->action_frame);
|
|
if (wl_cfgp2p_is_p2p_gas_action(action_frame->data, action_frame->len))
|
|
is_p2p_gas = true;
|
|
}
|
|
|
|
/* Loop to wait until we find a peer's channel or the
|
|
* pending action frame tx is cancelled.
|
|
*/
|
|
while ((cfg->afx_hdl->retry < max_retry) &&
|
|
(cfg->afx_hdl->peer_chan == WL_INVALID)) {
|
|
cfg->afx_hdl->is_listen = FALSE;
|
|
wl_set_drv_status(cfg, SCANNING, dev);
|
|
WL_DBG(("Scheduling the action frame for sending.. retry %d\n",
|
|
cfg->afx_hdl->retry));
|
|
/* search peer on peer's listen channel */
|
|
schedule_work(&cfg->afx_hdl->work);
|
|
wait_for_completion_timeout(&cfg->act_frm_scan,
|
|
msecs_to_jiffies(WL_AF_SEARCH_TIME_MAX));
|
|
|
|
if ((cfg->afx_hdl->peer_chan != WL_INVALID) ||
|
|
!(wl_get_drv_status(cfg, FINDING_COMMON_CHANNEL, dev)))
|
|
break;
|
|
|
|
if (is_p2p_gas)
|
|
break;
|
|
|
|
if (cfg->afx_hdl->my_listen_chan) {
|
|
WL_DBG(("Scheduling Listen peer in my listen channel = %d\n",
|
|
cfg->afx_hdl->my_listen_chan));
|
|
/* listen on my listen channel */
|
|
cfg->afx_hdl->is_listen = TRUE;
|
|
schedule_work(&cfg->afx_hdl->work);
|
|
wait_for_completion_timeout(&cfg->act_frm_scan,
|
|
msecs_to_jiffies(WL_AF_SEARCH_TIME_MAX));
|
|
}
|
|
if ((cfg->afx_hdl->peer_chan != WL_INVALID) ||
|
|
!(wl_get_drv_status(cfg, FINDING_COMMON_CHANNEL, dev)))
|
|
break;
|
|
|
|
cfg->afx_hdl->retry++;
|
|
|
|
WL_AF_TX_KEEP_PRI_CONNECTION_VSDB(cfg);
|
|
}
|
|
|
|
cfg->afx_hdl->is_active = FALSE;
|
|
|
|
wl_clr_drv_status(cfg, SCANNING, dev);
|
|
wl_clr_drv_status(cfg, FINDING_COMMON_CHANNEL, dev);
|
|
|
|
return (cfg->afx_hdl->peer_chan);
|
|
}
|
|
|
|
struct p2p_config_af_params {
|
|
s32 max_tx_retry; /* max tx retry count if tx no ack */
|
|
#ifdef WL_CFG80211_GON_COLLISION
|
|
/* drop tx go nego request if go nego collision occurs */
|
|
bool drop_tx_req;
|
|
#endif // endif
|
|
#ifdef WL_CFG80211_SYNC_GON
|
|
bool extra_listen;
|
|
#endif // endif
|
|
bool search_channel; /* 1: search peer's channel to send af */
|
|
};
|
|
|
|
#ifdef WL_DISABLE_HE_P2P
|
|
static s32
|
|
wl_cfg80211_he_p2p_disable(struct wiphy *wiphy, struct ether_addr peer_mac)
|
|
{
|
|
struct cfg80211_bss *bss;
|
|
u8 *ie = NULL;
|
|
u32 ie_len = 0;
|
|
struct net_device *ndev = NULL;
|
|
s32 bssidx = 0;
|
|
s32 err = BCME_OK;
|
|
struct bcm_cfg80211 *cfg = wiphy_priv(wiphy);
|
|
|
|
bss = CFG80211_GET_BSS(wiphy, NULL, peer_mac.octet, NULL, 0);
|
|
if (!bss) {
|
|
WL_ERR(("Could not find the Peer device\n"));
|
|
return BCME_ERROR;
|
|
} else {
|
|
GCC_DIAGNOSTIC_PUSH_SUPPRESS_CAST();
|
|
#if defined(WL_CFG80211_P2P_DEV_IF)
|
|
ie = (u8 *)bss->ies->data;
|
|
ie_len = bss->ies->len;
|
|
#else
|
|
ie = bss->information_elements;
|
|
ie_len = bss->len_information_elements;
|
|
#endif /* WL_CFG80211_P2P_DEV_IF */
|
|
GCC_DIAGNOSTIC_POP();
|
|
}
|
|
if (ie) {
|
|
if ((bcm_parse_tlvs_dot11(ie, ie_len,
|
|
EXT_MNG_HE_CAP_ID, TRUE)) == NULL) {
|
|
WL_DBG(("Peer does not support HE capability\n"));
|
|
ndev = wl_to_p2p_bss_ndev(cfg, P2PAPI_BSSCFG_CONNECTION1);
|
|
if (ndev && (bssidx =
|
|
wl_get_bssidx_by_wdev(cfg, ndev->ieee80211_ptr)) < 0) {
|
|
WL_ERR(("Find index failed\n"));
|
|
err = BCME_ERROR;
|
|
} else {
|
|
WL_DBG(("Disabling HE for P2P\n"));
|
|
err = wl_cfg80211_set_he_mode(ndev, cfg, bssidx,
|
|
WL_IF_TYPE_P2P_DISC, FALSE);
|
|
if (err < 0) {
|
|
WL_ERR(("failed to set he features, error=%d\n", err));
|
|
}
|
|
}
|
|
} else {
|
|
WL_DBG(("Peer supports HE capability\n"));
|
|
}
|
|
}
|
|
CFG80211_PUT_BSS(wiphy, bss);
|
|
|
|
return err;
|
|
}
|
|
#endif /* WL_DISABLE_HE_P2P */
|
|
|
|
static s32
|
|
wl_cfg80211_config_p2p_pub_af_tx(struct wiphy *wiphy,
|
|
wl_action_frame_t *action_frame, wl_af_params_t *af_params,
|
|
struct p2p_config_af_params *config_af_params)
|
|
{
|
|
s32 err = BCME_OK;
|
|
struct bcm_cfg80211 *cfg = wiphy_priv(wiphy);
|
|
wifi_p2p_pub_act_frame_t *act_frm =
|
|
(wifi_p2p_pub_act_frame_t *) (action_frame->data);
|
|
|
|
/* initialize default value */
|
|
#ifdef WL_CFG80211_GON_COLLISION
|
|
config_af_params->drop_tx_req = false;
|
|
#endif // endif
|
|
#ifdef WL_CFG80211_SYNC_GON
|
|
config_af_params->extra_listen = true;
|
|
#endif // endif
|
|
config_af_params->search_channel = false;
|
|
config_af_params->max_tx_retry = WL_AF_TX_MAX_RETRY;
|
|
cfg->next_af_subtype = P2P_PAF_SUBTYPE_INVALID;
|
|
|
|
switch (act_frm->subtype) {
|
|
case P2P_PAF_GON_REQ: {
|
|
/* Disable he if peer does not support before starting GONEG */
|
|
#ifdef WL_DISABLE_HE_P2P
|
|
wl_cfg80211_he_p2p_disable(wiphy, action_frame->da);
|
|
#endif /* WL_DISABLE_HE_P2P */
|
|
WL_DBG(("P2P: GO_NEG_PHASE status set \n"));
|
|
wl_set_p2p_status(cfg, GO_NEG_PHASE);
|
|
|
|
config_af_params->search_channel = true;
|
|
cfg->next_af_subtype = act_frm->subtype + 1;
|
|
|
|
/* increase dwell time to wait for RESP frame */
|
|
af_params->dwell_time = WL_MED_DWELL_TIME;
|
|
|
|
#ifdef WL_CFG80211_GON_COLLISION
|
|
config_af_params->drop_tx_req = true;
|
|
#endif /* WL_CFG80211_GON_COLLISION */
|
|
break;
|
|
}
|
|
case P2P_PAF_GON_RSP: {
|
|
cfg->next_af_subtype = act_frm->subtype + 1;
|
|
/* increase dwell time to wait for CONF frame */
|
|
af_params->dwell_time = WL_MED_DWELL_TIME + 100;
|
|
break;
|
|
}
|
|
case P2P_PAF_GON_CONF: {
|
|
/* If we reached till GO Neg confirmation reset the filter */
|
|
WL_DBG(("P2P: GO_NEG_PHASE status cleared \n"));
|
|
wl_clr_p2p_status(cfg, GO_NEG_PHASE);
|
|
|
|
/* minimize dwell time */
|
|
af_params->dwell_time = WL_MIN_DWELL_TIME;
|
|
|
|
#ifdef WL_CFG80211_GON_COLLISION
|
|
/* if go nego formation done, clear it */
|
|
cfg->block_gon_req_tx_count = 0;
|
|
cfg->block_gon_req_rx_count = 0;
|
|
#endif /* WL_CFG80211_GON_COLLISION */
|
|
#ifdef WL_CFG80211_SYNC_GON
|
|
config_af_params->extra_listen = false;
|
|
#endif /* WL_CFG80211_SYNC_GON */
|
|
break;
|
|
}
|
|
case P2P_PAF_INVITE_REQ: {
|
|
config_af_params->search_channel = true;
|
|
cfg->next_af_subtype = act_frm->subtype + 1;
|
|
|
|
/* increase dwell time */
|
|
af_params->dwell_time = WL_MED_DWELL_TIME;
|
|
break;
|
|
}
|
|
case P2P_PAF_INVITE_RSP:
|
|
/* minimize dwell time */
|
|
af_params->dwell_time = WL_MIN_DWELL_TIME;
|
|
#ifdef WL_CFG80211_SYNC_GON
|
|
config_af_params->extra_listen = false;
|
|
#endif /* WL_CFG80211_SYNC_GON */
|
|
break;
|
|
case P2P_PAF_DEVDIS_REQ: {
|
|
if (IS_ACTPUB_WITHOUT_GROUP_ID(&act_frm->elts[0],
|
|
action_frame->len)) {
|
|
config_af_params->search_channel = true;
|
|
}
|
|
|
|
cfg->next_af_subtype = act_frm->subtype + 1;
|
|
/* maximize dwell time to wait for RESP frame */
|
|
af_params->dwell_time = WL_LONG_DWELL_TIME;
|
|
break;
|
|
}
|
|
case P2P_PAF_DEVDIS_RSP:
|
|
/* minimize dwell time */
|
|
af_params->dwell_time = WL_MIN_DWELL_TIME;
|
|
#ifdef WL_CFG80211_SYNC_GON
|
|
config_af_params->extra_listen = false;
|
|
#endif /* WL_CFG80211_SYNC_GON */
|
|
break;
|
|
case P2P_PAF_PROVDIS_REQ: {
|
|
if (IS_ACTPUB_WITHOUT_GROUP_ID(&act_frm->elts[0],
|
|
action_frame->len)) {
|
|
config_af_params->search_channel = true;
|
|
}
|
|
|
|
cfg->next_af_subtype = act_frm->subtype + 1;
|
|
/* increase dwell time to wait for RESP frame */
|
|
af_params->dwell_time = WL_MED_DWELL_TIME;
|
|
break;
|
|
}
|
|
case P2P_PAF_PROVDIS_RSP: {
|
|
cfg->next_af_subtype = P2P_PAF_GON_REQ;
|
|
af_params->dwell_time = WL_MED_DWELL_TIME;
|
|
#ifdef WL_CFG80211_SYNC_GON
|
|
config_af_params->extra_listen = false;
|
|
#endif /* WL_CFG80211_SYNC_GON */
|
|
break;
|
|
}
|
|
default:
|
|
WL_DBG(("Unknown p2p pub act frame subtype: %d\n",
|
|
act_frm->subtype));
|
|
err = BCME_BADARG;
|
|
}
|
|
return err;
|
|
}
|
|
|
|
#ifdef WL11U
|
|
static bool
|
|
wl_cfg80211_check_DFS_channel(struct bcm_cfg80211 *cfg, wl_af_params_t *af_params,
|
|
void *frame, u16 frame_len)
|
|
{
|
|
struct wl_scan_results *bss_list;
|
|
wl_bss_info_t *bi = NULL;
|
|
bool result = false;
|
|
s32 i;
|
|
chanspec_t chanspec;
|
|
|
|
/* If DFS channel is 52~148, check to block it or not */
|
|
if (af_params &&
|
|
(af_params->channel >= 52 && af_params->channel <= 148)) {
|
|
if (!wl_cfgp2p_is_p2p_action(frame, frame_len)) {
|
|
bss_list = cfg->bss_list;
|
|
bi = next_bss(bss_list, bi);
|
|
for_each_bss(bss_list, bi, i) {
|
|
chanspec = wl_chspec_driver_to_host(bi->chanspec);
|
|
if (CHSPEC_IS5G(chanspec) &&
|
|
((bi->ctl_ch ? bi->ctl_ch : CHSPEC_CHANNEL(chanspec))
|
|
== af_params->channel)) {
|
|
result = true; /* do not block the action frame */
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
else {
|
|
result = true;
|
|
}
|
|
|
|
WL_DBG(("result=%s", result?"true":"false"));
|
|
return result;
|
|
}
|
|
#endif /* WL11U */
|
|
static bool
|
|
wl_cfg80211_check_dwell_overflow(int32 requested_dwell, ulong dwell_jiffies)
|
|
{
|
|
if ((requested_dwell & CUSTOM_RETRY_MASK) &&
|
|
(jiffies_to_msecs(jiffies - dwell_jiffies) >
|
|
(requested_dwell & ~CUSTOM_RETRY_MASK))) {
|
|
WL_ERR(("Action frame TX retry time over dwell time!\n"));
|
|
return true;
|
|
}
|
|
return false;
|
|
}
|
|
|
|
static bool
|
|
wl_cfg80211_send_action_frame(struct wiphy *wiphy, struct net_device *dev,
|
|
bcm_struct_cfgdev *cfgdev, wl_af_params_t *af_params,
|
|
wl_action_frame_t *action_frame, u16 action_frame_len, s32 bssidx)
|
|
{
|
|
#ifdef WL11U
|
|
struct net_device *ndev = NULL;
|
|
#endif /* WL11U */
|
|
struct bcm_cfg80211 *cfg = wiphy_priv(wiphy);
|
|
bool ack = false;
|
|
u8 category, action;
|
|
s32 tx_retry;
|
|
struct p2p_config_af_params config_af_params;
|
|
struct net_info *netinfo;
|
|
#ifdef VSDB
|
|
ulong off_chan_started_jiffies = 0;
|
|
#endif // endif
|
|
ulong dwell_jiffies = 0;
|
|
bool dwell_overflow = false;
|
|
dhd_pub_t *dhd = (dhd_pub_t *)(cfg->pub);
|
|
|
|
int32 requested_dwell = af_params->dwell_time;
|
|
|
|
/* Add the default dwell time
|
|
* Dwell time to stay off-channel to wait for a response action frame
|
|
* after transmitting an GO Negotiation action frame
|
|
*/
|
|
af_params->dwell_time = WL_DWELL_TIME;
|
|
|
|
#ifdef WL11U
|
|
#if defined(WL_CFG80211_P2P_DEV_IF)
|
|
ndev = dev;
|
|
#else
|
|
ndev = ndev_to_cfgdev(cfgdev);
|
|
#endif /* WL_CFG80211_P2P_DEV_IF */
|
|
#endif /* WL11U */
|
|
|
|
category = action_frame->data[DOT11_ACTION_CAT_OFF];
|
|
action = action_frame->data[DOT11_ACTION_ACT_OFF];
|
|
|
|
/* initialize variables */
|
|
tx_retry = 0;
|
|
cfg->next_af_subtype = P2P_PAF_SUBTYPE_INVALID;
|
|
config_af_params.max_tx_retry = WL_AF_TX_MAX_RETRY;
|
|
config_af_params.search_channel = false;
|
|
#ifdef WL_CFG80211_GON_COLLISION
|
|
config_af_params.drop_tx_req = false;
|
|
#endif // endif
|
|
#ifdef WL_CFG80211_SYNC_GON
|
|
config_af_params.extra_listen = false;
|
|
#endif // endif
|
|
|
|
/* config parameters */
|
|
/* Public Action Frame Process - DOT11_ACTION_CAT_PUBLIC */
|
|
if (category == DOT11_ACTION_CAT_PUBLIC) {
|
|
if ((action == P2P_PUB_AF_ACTION) &&
|
|
(action_frame_len >= sizeof(wifi_p2p_pub_act_frame_t))) {
|
|
/* p2p public action frame process */
|
|
if (BCME_OK != wl_cfg80211_config_p2p_pub_af_tx(wiphy,
|
|
action_frame, af_params, &config_af_params)) {
|
|
WL_DBG(("Unknown subtype.\n"));
|
|
}
|
|
|
|
#ifdef WL_CFG80211_GON_COLLISION
|
|
if (config_af_params.drop_tx_req) {
|
|
if (cfg->block_gon_req_tx_count) {
|
|
/* drop gon req tx action frame */
|
|
WL_DBG(("Drop gon req tx action frame: count %d\n",
|
|
cfg->block_gon_req_tx_count));
|
|
goto exit;
|
|
}
|
|
}
|
|
#endif /* WL_CFG80211_GON_COLLISION */
|
|
} else if (action_frame_len >= sizeof(wifi_p2psd_gas_pub_act_frame_t)) {
|
|
/* service discovery process */
|
|
if (action == P2PSD_ACTION_ID_GAS_IREQ ||
|
|
action == P2PSD_ACTION_ID_GAS_CREQ) {
|
|
/* configure service discovery query frame */
|
|
|
|
config_af_params.search_channel = true;
|
|
|
|
/* save next af suptype to cancel remained dwell time */
|
|
cfg->next_af_subtype = action + 1;
|
|
|
|
af_params->dwell_time = WL_MED_DWELL_TIME;
|
|
if (requested_dwell & CUSTOM_RETRY_MASK) {
|
|
config_af_params.max_tx_retry =
|
|
(requested_dwell & CUSTOM_RETRY_MASK) >> 24;
|
|
af_params->dwell_time =
|
|
(requested_dwell & ~CUSTOM_RETRY_MASK);
|
|
WL_DBG(("Custom retry(%d) and dwell time(%d) is set.\n",
|
|
config_af_params.max_tx_retry,
|
|
af_params->dwell_time));
|
|
}
|
|
} else if (action == P2PSD_ACTION_ID_GAS_IRESP ||
|
|
action == P2PSD_ACTION_ID_GAS_CRESP) {
|
|
/* configure service discovery response frame */
|
|
af_params->dwell_time = WL_MIN_DWELL_TIME;
|
|
} else {
|
|
WL_DBG(("Unknown action type: %d\n", action));
|
|
}
|
|
} else {
|
|
WL_DBG(("Unknown Frame: category 0x%x, action 0x%x, length %d\n",
|
|
category, action, action_frame_len));
|
|
}
|
|
} else if (category == P2P_AF_CATEGORY) {
|
|
/* do not configure anything. it will be sent with a default configuration */
|
|
} else {
|
|
WL_DBG(("Unknown Frame: category 0x%x, action 0x%x\n",
|
|
category, action));
|
|
if (dhd->op_mode & DHD_FLAG_HOSTAP_MODE) {
|
|
wl_clr_drv_status(cfg, SENDING_ACT_FRM, dev);
|
|
return false;
|
|
}
|
|
}
|
|
|
|
netinfo = wl_get_netinfo_by_wdev(cfg, cfgdev_to_wdev(cfgdev));
|
|
/* validate channel and p2p ies */
|
|
if (config_af_params.search_channel && IS_P2P_SOCIAL(af_params->channel) &&
|
|
netinfo && netinfo->bss.ies.probe_req_ie_len) {
|
|
config_af_params.search_channel = true;
|
|
} else {
|
|
config_af_params.search_channel = false;
|
|
}
|
|
#ifdef WL11U
|
|
if (ndev == bcmcfg_to_prmry_ndev(cfg))
|
|
config_af_params.search_channel = false;
|
|
#endif /* WL11U */
|
|
|
|
#ifdef VSDB
|
|
/* if connecting on primary iface, sleep for a while before sending af tx for VSDB */
|
|
if (wl_get_drv_status(cfg, CONNECTING, bcmcfg_to_prmry_ndev(cfg))) {
|
|
OSL_SLEEP(50);
|
|
}
|
|
#endif // endif
|
|
|
|
/* if scan is ongoing, abort current scan. */
|
|
if (wl_get_drv_status_all(cfg, SCANNING)) {
|
|
wl_cfg80211_cancel_scan(cfg);
|
|
}
|
|
|
|
/* Abort P2P listen */
|
|
if (discover_cfgdev(cfgdev, cfg)) {
|
|
if (cfg->p2p_supported && cfg->p2p) {
|
|
wl_cfgp2p_set_p2p_mode(cfg, WL_P2P_DISC_ST_SCAN, 0, 0,
|
|
wl_to_p2p_bss_bssidx(cfg, P2PAPI_BSSCFG_DEVICE));
|
|
}
|
|
}
|
|
|
|
#ifdef WL11U
|
|
/* handling DFS channel exceptions */
|
|
if (!wl_cfg80211_check_DFS_channel(cfg, af_params, action_frame->data, action_frame->len)) {
|
|
return false; /* the action frame was blocked */
|
|
}
|
|
#endif /* WL11U */
|
|
|
|
/* set status and destination address before sending af */
|
|
if (cfg->next_af_subtype != P2P_PAF_SUBTYPE_INVALID) {
|
|
/* set this status to cancel the remained dwell time in rx process */
|
|
wl_set_drv_status(cfg, WAITING_NEXT_ACT_FRM, dev);
|
|
}
|
|
wl_set_drv_status(cfg, SENDING_ACT_FRM, dev);
|
|
memcpy(cfg->afx_hdl->tx_dst_addr.octet,
|
|
af_params->action_frame.da.octet,
|
|
sizeof(cfg->afx_hdl->tx_dst_addr.octet));
|
|
|
|
/* save af_params for rx process */
|
|
cfg->afx_hdl->pending_tx_act_frm = af_params;
|
|
|
|
if (wl_cfgp2p_is_p2p_gas_action(action_frame->data, action_frame->len)) {
|
|
WL_DBG(("Set GAS action frame config.\n"));
|
|
config_af_params.search_channel = false;
|
|
config_af_params.max_tx_retry = 1;
|
|
}
|
|
|
|
/* search peer's channel */
|
|
if (config_af_params.search_channel) {
|
|
/* initialize afx_hdl */
|
|
if ((cfg->afx_hdl->bssidx = wl_get_bssidx_by_wdev(cfg, dev->ieee80211_ptr)) < 0) {
|
|
WL_ERR(("Find p2p index from wdev(%p) failed\n", dev->ieee80211_ptr));
|
|
goto exit;
|
|
}
|
|
cfg->afx_hdl->dev = dev;
|
|
cfg->afx_hdl->retry = 0;
|
|
cfg->afx_hdl->peer_chan = WL_INVALID;
|
|
|
|
if (wl_cfg80211_af_searching_channel(cfg, dev) == WL_INVALID) {
|
|
WL_ERR(("couldn't find peer's channel.\n"));
|
|
wl_cfgp2p_print_actframe(true, action_frame->data, action_frame->len,
|
|
af_params->channel);
|
|
/* Even if we couldn't find peer channel, try to send the frame
|
|
* out. P2P cert 5.1.14 testbed device (realtek) doesn't seem to
|
|
* respond to probe request (Ideally it has to be in listen and
|
|
* responsd to probe request). However if we send Go neg req, the
|
|
* peer is sending GO-neg resp. So instead of giving up here, just
|
|
* proceed and attempt sending out the action frame.
|
|
*/
|
|
}
|
|
|
|
wl_clr_drv_status(cfg, SCANNING, cfg->afx_hdl->dev);
|
|
/*
|
|
* Abort scan even for VSDB scenarios. Scan gets aborted in firmware
|
|
* but after the check of piggyback algorithm.
|
|
* To take care of current piggback algo, lets abort the scan here itself.
|
|
*/
|
|
wl_cfg80211_cancel_scan(cfg);
|
|
/* Suspend P2P discovery's search-listen to prevent it from
|
|
* starting a scan or changing the channel.
|
|
*/
|
|
if ((wl_cfgp2p_discover_enable_search(cfg, false)) < 0) {
|
|
WL_ERR(("Can not disable discovery mode\n"));
|
|
goto exit;
|
|
}
|
|
|
|
/* update channel */
|
|
if (cfg->afx_hdl->peer_chan != WL_INVALID) {
|
|
af_params->channel = cfg->afx_hdl->peer_chan;
|
|
WL_ERR(("Attempt tx on peer listen channel:%d ",
|
|
cfg->afx_hdl->peer_chan));
|
|
} else {
|
|
WL_ERR(("Attempt tx with the channel provided by userspace."
|
|
"Channel: %d\n", af_params->channel));
|
|
}
|
|
}
|
|
|
|
#ifdef VSDB
|
|
off_chan_started_jiffies = jiffies;
|
|
#endif /* VSDB */
|
|
|
|
wl_cfgp2p_print_actframe(true, action_frame->data, action_frame->len, af_params->channel);
|
|
|
|
wl_cfgp2p_need_wait_actfrmae(cfg, action_frame->data, action_frame->len, true);
|
|
|
|
dwell_jiffies = jiffies;
|
|
/* Now send a tx action frame */
|
|
ack = wl_cfgp2p_tx_action_frame(cfg, dev, af_params, bssidx) ? false : true;
|
|
dwell_overflow = wl_cfg80211_check_dwell_overflow(requested_dwell, dwell_jiffies);
|
|
|
|
/* if failed, retry it. tx_retry_max value is configure by .... */
|
|
while ((ack == false) && (tx_retry++ < config_af_params.max_tx_retry) &&
|
|
!dwell_overflow) {
|
|
#ifdef VSDB
|
|
if (af_params->channel) {
|
|
if (jiffies_to_msecs(jiffies - off_chan_started_jiffies) >
|
|
OFF_CHAN_TIME_THRESHOLD_MS) {
|
|
WL_AF_TX_KEEP_PRI_CONNECTION_VSDB(cfg);
|
|
off_chan_started_jiffies = jiffies;
|
|
} else
|
|
OSL_SLEEP(AF_RETRY_DELAY_TIME);
|
|
}
|
|
#endif /* VSDB */
|
|
ack = wl_cfgp2p_tx_action_frame(cfg, dev, af_params, bssidx) ?
|
|
false : true;
|
|
dwell_overflow = wl_cfg80211_check_dwell_overflow(requested_dwell, dwell_jiffies);
|
|
}
|
|
|
|
if (ack == false) {
|
|
WL_ERR(("Failed to send Action Frame(retry %d)\n", tx_retry));
|
|
}
|
|
WL_DBG(("Complete to send action frame\n"));
|
|
exit:
|
|
/* Clear SENDING_ACT_FRM after all sending af is done */
|
|
wl_clr_drv_status(cfg, SENDING_ACT_FRM, dev);
|
|
|
|
#ifdef WL_CFG80211_SYNC_GON
|
|
/* WAR: sometimes dongle does not keep the dwell time of 'actframe'.
|
|
* if we coundn't get the next action response frame and dongle does not keep
|
|
* the dwell time, go to listen state again to get next action response frame.
|
|
*/
|
|
if (ack && config_af_params.extra_listen &&
|
|
#ifdef WL_CFG80211_GON_COLLISION
|
|
!cfg->block_gon_req_tx_count &&
|
|
#endif /* WL_CFG80211_GON_COLLISION */
|
|
wl_get_drv_status_all(cfg, WAITING_NEXT_ACT_FRM) &&
|
|
cfg->af_sent_channel == cfg->afx_hdl->my_listen_chan) {
|
|
s32 extar_listen_time;
|
|
|
|
extar_listen_time = af_params->dwell_time -
|
|
jiffies_to_msecs(jiffies - cfg->af_tx_sent_jiffies);
|
|
|
|
if (extar_listen_time > 50) {
|
|
wl_set_drv_status(cfg, WAITING_NEXT_ACT_FRM_LISTEN, dev);
|
|
WL_DBG(("Wait more time! actual af time:%d,"
|
|
"calculated extar listen:%d\n",
|
|
af_params->dwell_time, extar_listen_time));
|
|
if (wl_cfgp2p_discover_listen(cfg, cfg->af_sent_channel,
|
|
extar_listen_time + 100) == BCME_OK) {
|
|
wait_for_completion_timeout(&cfg->wait_next_af,
|
|
msecs_to_jiffies(extar_listen_time + 100 + 300));
|
|
}
|
|
wl_clr_drv_status(cfg, WAITING_NEXT_ACT_FRM_LISTEN, dev);
|
|
}
|
|
}
|
|
#endif /* WL_CFG80211_SYNC_GON */
|
|
wl_clr_drv_status(cfg, WAITING_NEXT_ACT_FRM, dev);
|
|
|
|
cfg->afx_hdl->pending_tx_act_frm = NULL;
|
|
|
|
if (ack) {
|
|
WL_DBG(("-- Action Frame Tx succeeded, listen chan: %d\n",
|
|
cfg->afx_hdl->my_listen_chan));
|
|
} else {
|
|
WL_ERR(("-- Action Frame Tx failed, listen chan: %d\n",
|
|
cfg->afx_hdl->my_listen_chan));
|
|
}
|
|
|
|
#ifdef WL_CFG80211_GON_COLLISION
|
|
if (cfg->block_gon_req_tx_count) {
|
|
cfg->block_gon_req_tx_count--;
|
|
/* if ack is ture, supplicant will wait more time(100ms).
|
|
* so we will return it as a success to get more time .
|
|
*/
|
|
ack = true;
|
|
}
|
|
#endif /* WL_CFG80211_GON_COLLISION */
|
|
return ack;
|
|
}
|
|
|
|
#define MAX_NUM_OF_ASSOCIATED_DEV 64
|
|
static s32
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 14, 0))
|
|
wl_cfg80211_mgmt_tx(struct wiphy *wiphy, bcm_struct_cfgdev *cfgdev,
|
|
struct cfg80211_mgmt_tx_params *params, u64 *cookie)
|
|
#else
|
|
wl_cfg80211_mgmt_tx(struct wiphy *wiphy, bcm_struct_cfgdev *cfgdev,
|
|
struct ieee80211_channel *channel, bool offchan,
|
|
#if (LINUX_VERSION_CODE <= KERNEL_VERSION(3, 7, 0))
|
|
enum nl80211_channel_type channel_type,
|
|
bool channel_type_valid,
|
|
#endif /* LINUX_VERSION_CODE <= KERNEL_VERSION(3, 7, 0) */
|
|
unsigned int wait, const u8* buf, size_t len,
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 2, 0)) || defined(WL_COMPAT_WIRELESS)
|
|
bool no_cck,
|
|
#endif // endif
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 3, 0)) || defined(WL_COMPAT_WIRELESS)
|
|
bool dont_wait_for_ack,
|
|
#endif // endif
|
|
u64 *cookie)
|
|
#endif /* LINUX_VERSION_CODE >= KERNEL_VERSION(3, 14, 0) */
|
|
{
|
|
wl_action_frame_t *action_frame;
|
|
wl_af_params_t *af_params;
|
|
scb_val_t scb_val;
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 14, 0))
|
|
struct ieee80211_channel *channel = params->chan;
|
|
const u8 *buf = params->buf;
|
|
size_t len = params->len;
|
|
#endif // endif
|
|
const struct ieee80211_mgmt *mgmt;
|
|
struct bcm_cfg80211 *cfg = wiphy_priv(wiphy);
|
|
struct net_device *dev = NULL;
|
|
s32 err = BCME_OK;
|
|
s32 bssidx = 0;
|
|
u32 id;
|
|
bool ack = false;
|
|
s8 eabuf[ETHER_ADDR_STR_LEN];
|
|
|
|
WL_DBG(("Enter \n"));
|
|
|
|
if (len > ACTION_FRAME_SIZE) {
|
|
WL_ERR(("bad length:%zu\n", len));
|
|
return BCME_BADLEN;
|
|
}
|
|
#ifdef DHD_IFDEBUG
|
|
PRINT_WDEV_INFO(cfgdev);
|
|
#endif /* DHD_IFDEBUG */
|
|
|
|
dev = cfgdev_to_wlc_ndev(cfgdev, cfg);
|
|
|
|
if (!dev) {
|
|
WL_ERR(("dev is NULL\n"));
|
|
return -EINVAL;
|
|
}
|
|
|
|
/* set bsscfg idx for iovar (wlan0: P2PAPI_BSSCFG_PRIMARY, p2p: P2PAPI_BSSCFG_DEVICE) */
|
|
if (discover_cfgdev(cfgdev, cfg)) {
|
|
if (!cfg->p2p_supported || !cfg->p2p) {
|
|
WL_ERR(("P2P doesn't setup completed yet\n"));
|
|
return -EINVAL;
|
|
}
|
|
bssidx = wl_to_p2p_bss_bssidx(cfg, P2PAPI_BSSCFG_DEVICE);
|
|
}
|
|
else {
|
|
if ((bssidx = wl_get_bssidx_by_wdev(cfg, cfgdev_to_wdev(cfgdev))) < 0) {
|
|
WL_ERR(("Find p2p index failed\n"));
|
|
return BCME_ERROR;
|
|
}
|
|
}
|
|
|
|
WL_DBG(("TX target bssidx=%d\n", bssidx));
|
|
|
|
if (p2p_is_on(cfg)) {
|
|
/* Suspend P2P discovery search-listen to prevent it from changing the
|
|
* channel.
|
|
*/
|
|
if ((err = wl_cfgp2p_discover_enable_search(cfg, false)) < 0) {
|
|
WL_ERR(("Can not disable discovery mode\n"));
|
|
return -EFAULT;
|
|
}
|
|
}
|
|
*cookie = 0;
|
|
id = cfg->send_action_id++;
|
|
if (id == 0)
|
|
id = cfg->send_action_id++;
|
|
*cookie = id;
|
|
mgmt = (const struct ieee80211_mgmt *)buf;
|
|
if (ieee80211_is_mgmt(mgmt->frame_control)) {
|
|
if (ieee80211_is_probe_resp(mgmt->frame_control)) {
|
|
s32 ie_offset = DOT11_MGMT_HDR_LEN + DOT11_BCN_PRB_FIXED_LEN;
|
|
s32 ie_len = len - ie_offset;
|
|
if ((dev == bcmcfg_to_prmry_ndev(cfg)) && cfg->p2p) {
|
|
bssidx = wl_to_p2p_bss_bssidx(cfg, P2PAPI_BSSCFG_DEVICE);
|
|
}
|
|
wl_cfg80211_set_mgmt_vndr_ies(cfg, ndev_to_cfgdev(dev), bssidx,
|
|
VNDR_IE_PRBRSP_FLAG, (const u8 *)(buf + ie_offset), ie_len);
|
|
cfg80211_mgmt_tx_status(cfgdev, *cookie, buf, len, true, GFP_KERNEL);
|
|
#if defined(P2P_IE_MISSING_FIX)
|
|
if (!cfg->p2p_prb_noti) {
|
|
cfg->p2p_prb_noti = true;
|
|
WL_DBG(("wl_cfg80211_mgmt_tx: TX 802_1X Probe"
|
|
" Response first time.\n"));
|
|
}
|
|
#endif // endif
|
|
goto exit;
|
|
} else if (ieee80211_is_disassoc(mgmt->frame_control) ||
|
|
ieee80211_is_deauth(mgmt->frame_control)) {
|
|
char mac_buf[MAX_NUM_OF_ASSOCIATED_DEV *
|
|
sizeof(struct ether_addr) + sizeof(uint)] = {0};
|
|
int num_associated = 0;
|
|
struct maclist *assoc_maclist = (struct maclist *)mac_buf;
|
|
if (!bcmp((const uint8 *)BSSID_BROADCAST,
|
|
(const struct ether_addr *)mgmt->da, ETHER_ADDR_LEN)) {
|
|
assoc_maclist->count = MAX_NUM_OF_ASSOCIATED_DEV;
|
|
err = wldev_ioctl_get(dev, WLC_GET_ASSOCLIST,
|
|
assoc_maclist, sizeof(mac_buf));
|
|
if (err < 0)
|
|
WL_ERR(("WLC_GET_ASSOCLIST error %d\n", err));
|
|
else
|
|
num_associated = assoc_maclist->count;
|
|
}
|
|
memcpy(scb_val.ea.octet, mgmt->da, ETH_ALEN);
|
|
scb_val.val = mgmt->u.disassoc.reason_code;
|
|
err = wldev_ioctl_set(dev, WLC_SCB_DEAUTHENTICATE_FOR_REASON, &scb_val,
|
|
sizeof(scb_val_t));
|
|
if (err < 0)
|
|
WL_ERR(("WLC_SCB_DEAUTHENTICATE_FOR_REASON error %d\n", err));
|
|
WL_ERR(("Disconnect STA : " MACDBG " scb_val.val %d\n",
|
|
MAC2STRDBG(bcm_ether_ntoa((const struct ether_addr *)mgmt->da,
|
|
eabuf)), scb_val.val));
|
|
|
|
if (num_associated > 0 && ETHER_ISBCAST(mgmt->da))
|
|
wl_delay(400);
|
|
|
|
cfg80211_mgmt_tx_status(cfgdev, *cookie, buf, len, true, GFP_KERNEL);
|
|
goto exit;
|
|
|
|
} else if (ieee80211_is_action(mgmt->frame_control)) {
|
|
/* Abort the dwell time of any previous off-channel
|
|
* action frame that may be still in effect. Sending
|
|
* off-channel action frames relies on the driver's
|
|
* scan engine. If a previous off-channel action frame
|
|
* tx is still in progress (including the dwell time),
|
|
* then this new action frame will not be sent out.
|
|
*/
|
|
/* Do not abort scan for VSDB. Scan will be aborted in firmware if necessary.
|
|
* And previous off-channel action frame must be ended before new af tx.
|
|
*/
|
|
#ifndef WL_CFG80211_VSDB_PRIORITIZE_SCAN_REQUEST
|
|
wl_cfg80211_cancel_scan(cfg);
|
|
#endif /* not WL_CFG80211_VSDB_PRIORITIZE_SCAN_REQUEST */
|
|
}
|
|
#ifdef WL_CLIENT_SAE
|
|
else if (ieee80211_is_auth(mgmt->frame_control)) {
|
|
int err = 0;
|
|
wl_assoc_mgr_cmd_t *cmd;
|
|
char *ambuf = NULL;
|
|
int param_len;
|
|
|
|
ack = true;
|
|
if ((dev == bcmcfg_to_prmry_ndev(cfg)) && cfg->p2p) {
|
|
bssidx = wl_to_p2p_bss_bssidx(cfg, P2PAPI_BSSCFG_DEVICE);
|
|
}
|
|
param_len = sizeof(wl_assoc_mgr_cmd_t) + len;
|
|
ambuf = MALLOCZ(cfg->osh, param_len);
|
|
if (ambuf == NULL) {
|
|
WL_ERR(("unable to allocate frame\n"));
|
|
return -ENOMEM;
|
|
}
|
|
cmd = (wl_assoc_mgr_cmd_t*)ambuf;
|
|
cmd->version = WL_ASSOC_MGR_CURRENT_VERSION;
|
|
cmd->length = len;
|
|
cmd->cmd = WL_ASSOC_MGR_CMD_SEND_AUTH;
|
|
memcpy(&cmd->params, buf, len);
|
|
err = wldev_iovar_setbuf(dev, "assoc_mgr_cmd", ambuf, param_len,
|
|
cfg->ioctl_buf, WLC_IOCTL_SMLEN, &cfg->ioctl_buf_sync);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("Failed to send auth(%d)\n", err));
|
|
ack = false;
|
|
}
|
|
MFREE(cfg->osh, ambuf, param_len);
|
|
cfg80211_mgmt_tx_status(cfgdev, *cookie, buf, len, ack, GFP_KERNEL);
|
|
goto exit;
|
|
}
|
|
#endif /* WL_CLIENT_SAE */
|
|
} else {
|
|
WL_ERR(("Driver only allows MGMT packet type\n"));
|
|
goto exit;
|
|
}
|
|
|
|
af_params = (wl_af_params_t *)MALLOCZ(cfg->osh, WL_WIFI_AF_PARAMS_SIZE);
|
|
|
|
if (af_params == NULL)
|
|
{
|
|
WL_ERR(("unable to allocate frame\n"));
|
|
return -ENOMEM;
|
|
}
|
|
|
|
action_frame = &af_params->action_frame;
|
|
|
|
/* Add the packet Id */
|
|
action_frame->packetId = *cookie;
|
|
WL_DBG(("action frame %d\n", action_frame->packetId));
|
|
/* Add BSSID */
|
|
memcpy(&action_frame->da, &mgmt->da[0], ETHER_ADDR_LEN);
|
|
memcpy(&af_params->BSSID, &mgmt->bssid[0], ETHER_ADDR_LEN);
|
|
|
|
/* Add the length exepted for 802.11 header */
|
|
action_frame->len = len - DOT11_MGMT_HDR_LEN;
|
|
WL_DBG(("action_frame->len: %d\n", action_frame->len));
|
|
|
|
/* Add the channel */
|
|
af_params->channel =
|
|
ieee80211_frequency_to_channel(channel->center_freq);
|
|
/* Save listen_chan for searching common channel */
|
|
cfg->afx_hdl->peer_listen_chan = af_params->channel;
|
|
WL_DBG(("channel from upper layer %d\n", cfg->afx_hdl->peer_listen_chan));
|
|
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 14, 0))
|
|
af_params->dwell_time = params->wait;
|
|
#else
|
|
af_params->dwell_time = wait;
|
|
#endif // endif
|
|
|
|
memcpy(action_frame->data, &buf[DOT11_MGMT_HDR_LEN], action_frame->len);
|
|
|
|
ack = wl_cfg80211_send_action_frame(wiphy, dev, cfgdev, af_params,
|
|
action_frame, action_frame->len, bssidx);
|
|
cfg80211_mgmt_tx_status(cfgdev, *cookie, buf, len, ack, GFP_KERNEL);
|
|
|
|
MFREE(cfg->osh, af_params, WL_WIFI_AF_PARAMS_SIZE);
|
|
exit:
|
|
return err;
|
|
}
|
|
|
|
static void
|
|
wl_cfg80211_mgmt_frame_register(struct wiphy *wiphy, bcm_struct_cfgdev *cfgdev,
|
|
u16 frame, bool reg)
|
|
{
|
|
|
|
WL_DBG(("frame_type: %x, reg: %d\n", frame, reg));
|
|
|
|
if (frame != (IEEE80211_FTYPE_MGMT | IEEE80211_STYPE_PROBE_REQ))
|
|
return;
|
|
|
|
return;
|
|
}
|
|
|
|
static s32
|
|
wl_cfg80211_change_bss(struct wiphy *wiphy,
|
|
struct net_device *dev,
|
|
struct bss_parameters *params)
|
|
{
|
|
s32 err = 0;
|
|
s32 ap_isolate = 0;
|
|
#ifdef PCIE_FULL_DONGLE
|
|
s32 ifidx = DHD_BAD_IF;
|
|
#endif // endif
|
|
#if defined(PCIE_FULL_DONGLE)
|
|
dhd_pub_t *dhd;
|
|
struct bcm_cfg80211 *cfg = wiphy_priv(wiphy);
|
|
dhd = (dhd_pub_t *)(cfg->pub);
|
|
#if defined(WL_ENABLE_P2P_IF)
|
|
if (cfg->p2p_net == dev)
|
|
dev = bcmcfg_to_prmry_ndev(cfg);
|
|
#endif
|
|
#endif // endif
|
|
|
|
if (params->use_cts_prot >= 0) {
|
|
}
|
|
|
|
if (params->use_short_preamble >= 0) {
|
|
}
|
|
|
|
if (params->use_short_slot_time >= 0) {
|
|
}
|
|
|
|
if (params->basic_rates) {
|
|
}
|
|
|
|
if (params->ap_isolate >= 0) {
|
|
ap_isolate = params->ap_isolate;
|
|
#ifdef PCIE_FULL_DONGLE
|
|
ifidx = dhd_net2idx(dhd->info, dev);
|
|
|
|
if (ifidx != DHD_BAD_IF) {
|
|
err = dhd_set_ap_isolate(dhd, ifidx, ap_isolate);
|
|
} else {
|
|
WL_ERR(("Failed to set ap_isolate\n"));
|
|
}
|
|
#else
|
|
err = wldev_iovar_setint(dev, "ap_isolate", ap_isolate);
|
|
if (unlikely(err))
|
|
{
|
|
WL_ERR(("set ap_isolate Error (%d)\n", err));
|
|
}
|
|
#endif /* PCIE_FULL_DONGLE */
|
|
}
|
|
|
|
if (params->ht_opmode >= 0) {
|
|
}
|
|
|
|
return err;
|
|
}
|
|
|
|
static int
|
|
wl_get_bandwidth_cap(struct net_device *ndev, uint32 band, uint32 *bandwidth)
|
|
{
|
|
u32 bw = WL_CHANSPEC_BW_20;
|
|
s32 err = BCME_OK;
|
|
s32 bw_cap = 0;
|
|
struct {
|
|
u32 band;
|
|
u32 bw_cap;
|
|
} param = {0, 0};
|
|
u8 ioctl_buf[WLC_IOCTL_SMLEN];
|
|
|
|
if (band == IEEE80211_BAND_5GHZ) {
|
|
param.band = WLC_BAND_5G;
|
|
err = wldev_iovar_getbuf(ndev, "bw_cap", ¶m, sizeof(param),
|
|
ioctl_buf, sizeof(ioctl_buf), NULL);
|
|
if (err) {
|
|
if (err != BCME_UNSUPPORTED) {
|
|
WL_ERR(("bw_cap failed, %d\n", err));
|
|
return err;
|
|
} else {
|
|
err = wldev_iovar_getint(ndev, "mimo_bw_cap", &bw_cap);
|
|
if (err) {
|
|
WL_ERR(("error get mimo_bw_cap (%d)\n", err));
|
|
}
|
|
if (bw_cap != WLC_N_BW_20ALL) {
|
|
bw = WL_CHANSPEC_BW_40;
|
|
}
|
|
}
|
|
} else {
|
|
if (WL_BW_CAP_80MHZ(ioctl_buf[0])) {
|
|
bw = WL_CHANSPEC_BW_80;
|
|
} else if (WL_BW_CAP_40MHZ(ioctl_buf[0])) {
|
|
bw = WL_CHANSPEC_BW_40;
|
|
} else {
|
|
bw = WL_CHANSPEC_BW_20;
|
|
}
|
|
}
|
|
} else if (band == IEEE80211_BAND_2GHZ) {
|
|
bw = WL_CHANSPEC_BW_20;
|
|
}
|
|
|
|
*bandwidth = bw;
|
|
|
|
return err;
|
|
}
|
|
|
|
static s32
|
|
wl_cfg80211_set_channel(struct wiphy *wiphy, struct net_device *dev,
|
|
struct ieee80211_channel *chan,
|
|
enum nl80211_channel_type channel_type)
|
|
{
|
|
s32 _chan;
|
|
chanspec_t chspec = 0;
|
|
chanspec_t fw_chspec = 0;
|
|
u32 bw = WL_CHANSPEC_BW_20;
|
|
s32 err = BCME_OK;
|
|
struct bcm_cfg80211 *cfg = wiphy_priv(wiphy);
|
|
#if defined(CUSTOM_SET_CPUCORE) || defined(APSTA_RESTRICTED_CHANNEL) || defined(WL_EXT_IAPSTA)
|
|
dhd_pub_t *dhd = (dhd_pub_t *)(cfg->pub);
|
|
#endif /* CUSTOM_SET_CPUCORE || APSTA_RESTRICTED_CHANNEL */
|
|
|
|
dev = ndev_to_wlc_ndev(dev, cfg);
|
|
_chan = ieee80211_frequency_to_channel(chan->center_freq);
|
|
#ifdef WL_EXT_IAPSTA
|
|
if (dev->ieee80211_ptr->iftype == NL80211_IFTYPE_AP) {
|
|
wl_ext_iapsta_update_iftype(dev, dhd_net2idx(dhd->info, dev), WL_IF_TYPE_AP);
|
|
_chan = wl_ext_iapsta_update_channel(dhd, dev, _chan);
|
|
}
|
|
#endif
|
|
WL_MSG(dev->name, "netdev_ifidx(%d), chan_type(%d) target channel(%d) \n",
|
|
dev->ifindex, channel_type, _chan);
|
|
|
|
#ifdef NOT_YET
|
|
switch (channel_type) {
|
|
case NL80211_CHAN_HT40MINUS:
|
|
/* secondary channel is below the control channel */
|
|
chspec = CH40MHZ_CHSPEC(channel, WL_CHANSPEC_CTL_SB_UPPER);
|
|
break;
|
|
case NL80211_CHAN_HT40PLUS:
|
|
/* secondary channel is above the control channel */
|
|
chspec = CH40MHZ_CHSPEC(channel, WL_CHANSPEC_CTL_SB_LOWER);
|
|
break;
|
|
default:
|
|
chspec = CH20MHZ_CHSPEC(channel);
|
|
|
|
}
|
|
#endif /* NOT_YET */
|
|
|
|
#if defined(APSTA_RESTRICTED_CHANNEL)
|
|
if (wl_get_mode_by_netdev(cfg, dev) == WL_MODE_AP &&
|
|
DHD_OPMODE_STA_SOFTAP_CONCURR(dhd) &&
|
|
wl_get_drv_status(cfg, CONNECTED, bcmcfg_to_prmry_ndev(cfg))) {
|
|
u32 *sta_chan = (u32 *)wl_read_prof(cfg,
|
|
bcmcfg_to_prmry_ndev(cfg), WL_PROF_CHAN);
|
|
u32 sta_band = (*sta_chan > CH_MAX_2G_CHANNEL) ?
|
|
IEEE80211_BAND_5GHZ : IEEE80211_BAND_2GHZ;
|
|
if (chan->band == sta_band) {
|
|
/* Do not try SCC in 5GHz if channel is not CH149 */
|
|
_chan = (sta_band == IEEE80211_BAND_5GHZ &&
|
|
*sta_chan != DEFAULT_5G_SOFTAP_CHANNEL) ?
|
|
DEFAULT_2G_SOFTAP_CHANNEL : *sta_chan;
|
|
WL_ERR(("target channel will be changed to %d\n", _chan));
|
|
if (_chan <= CH_MAX_2G_CHANNEL) {
|
|
bw = WL_CHANSPEC_BW_20;
|
|
goto set_channel;
|
|
}
|
|
}
|
|
}
|
|
#endif /* APSTA_RESTRICTED_CHANNEL */
|
|
|
|
err = wl_get_bandwidth_cap(dev, chan->band, &bw);
|
|
if (err < 0) {
|
|
WL_ERR(("Failed to get bandwidth information, err=%d\n", err));
|
|
return err;
|
|
}
|
|
|
|
set_channel:
|
|
chspec = wf_channel2chspec(_chan, bw);
|
|
if (wf_chspec_valid(chspec)) {
|
|
fw_chspec = wl_chspec_host_to_driver(chspec);
|
|
if (fw_chspec != INVCHANSPEC) {
|
|
if ((err = wldev_iovar_setint(dev, "chanspec",
|
|
fw_chspec)) == BCME_BADCHAN) {
|
|
if (bw == WL_CHANSPEC_BW_80)
|
|
goto change_bw;
|
|
err = wldev_ioctl_set(dev, WLC_SET_CHANNEL,
|
|
&_chan, sizeof(_chan));
|
|
if (err < 0) {
|
|
WL_ERR(("WLC_SET_CHANNEL error %d"
|
|
"chip may not be supporting this channel\n", err));
|
|
}
|
|
} else if (err) {
|
|
WL_ERR(("failed to set chanspec error %d\n", err));
|
|
}
|
|
#ifdef DISABLE_WL_FRAMEBURST_SOFTAP
|
|
else {
|
|
/* Disable Frameburst only for stand-alone 2GHz SoftAP */
|
|
if (wl_get_mode_by_netdev(cfg, dev) == WL_MODE_AP &&
|
|
DHD_OPMODE_SUPPORTED(cfg->pub, DHD_FLAG_HOSTAP_MODE) &&
|
|
(_chan <= CH_MAX_2G_CHANNEL) &&
|
|
!wl_get_drv_status(cfg, CONNECTED,
|
|
bcmcfg_to_prmry_ndev(cfg))) {
|
|
WL_DBG(("Disabling frameburst on "
|
|
"stand-alone 2GHz SoftAP\n"));
|
|
wl_cfg80211_set_frameburst(cfg, FALSE);
|
|
}
|
|
}
|
|
#endif /* DISABLE_WL_FRAMEBURST_SOFTAP */
|
|
} else {
|
|
WL_ERR(("failed to convert host chanspec to fw chanspec\n"));
|
|
err = BCME_ERROR;
|
|
}
|
|
} else {
|
|
change_bw:
|
|
if (bw == WL_CHANSPEC_BW_80)
|
|
bw = WL_CHANSPEC_BW_40;
|
|
else if (bw == WL_CHANSPEC_BW_40)
|
|
bw = WL_CHANSPEC_BW_20;
|
|
else
|
|
bw = 0;
|
|
if (bw)
|
|
goto set_channel;
|
|
WL_ERR(("Invalid chanspec 0x%x\n", chspec));
|
|
err = BCME_ERROR;
|
|
}
|
|
#ifdef CUSTOM_SET_CPUCORE
|
|
if (dhd->op_mode == DHD_FLAG_HOSTAP_MODE) {
|
|
WL_DBG(("SoftAP mode do not need to set cpucore\n"));
|
|
} else if (chspec & WL_CHANSPEC_BW_80) {
|
|
/* SoftAp only mode do not need to set cpucore */
|
|
if ((dev->ieee80211_ptr->iftype == NL80211_IFTYPE_AP) &&
|
|
dev != bcmcfg_to_prmry_ndev(cfg)) {
|
|
/* Soft AP on virtual Iface (AP+STA case) */
|
|
dhd->chan_isvht80 |= DHD_FLAG_HOSTAP_MODE;
|
|
dhd_set_cpucore(dhd, TRUE);
|
|
} else if (is_p2p_group_iface(dev->ieee80211_ptr)) {
|
|
/* If P2P IF is vht80 */
|
|
dhd->chan_isvht80 |= DHD_FLAG_P2P_MODE;
|
|
dhd_set_cpucore(dhd, TRUE);
|
|
}
|
|
}
|
|
#endif /* CUSTOM_SET_CPUCORE */
|
|
if (!err && (wl_get_mode_by_netdev(cfg, dev) == WL_MODE_AP)) {
|
|
/* Update AP/GO operating channel */
|
|
cfg->ap_oper_channel = ieee80211_frequency_to_channel(chan->center_freq);
|
|
}
|
|
if (err) {
|
|
wl_flush_fw_log_buffer(bcmcfg_to_prmry_ndev(cfg),
|
|
FW_LOGSET_MASK_ALL);
|
|
}
|
|
return err;
|
|
}
|
|
|
|
#ifdef WL_CFG80211_VSDB_PRIORITIZE_SCAN_REQUEST
|
|
struct net_device *
|
|
wl_cfg80211_get_remain_on_channel_ndev(struct bcm_cfg80211 *cfg)
|
|
{
|
|
struct net_info *_net_info, *next;
|
|
GCC_DIAGNOSTIC_PUSH_SUPPRESS_CAST();
|
|
list_for_each_entry_safe(_net_info, next, &cfg->net_list, list) {
|
|
GCC_DIAGNOSTIC_POP();
|
|
if (_net_info->ndev &&
|
|
test_bit(WL_STATUS_REMAINING_ON_CHANNEL, &_net_info->sme_state))
|
|
return _net_info->ndev;
|
|
}
|
|
|
|
return NULL;
|
|
}
|
|
#endif /* WL_CFG80211_VSDB_PRIORITIZE_SCAN_REQUEST */
|
|
|
|
static s32
|
|
wl_validate_opensecurity(struct net_device *dev, s32 bssidx, bool privacy)
|
|
{
|
|
s32 err = BCME_OK;
|
|
u32 wpa_val;
|
|
s32 wsec = 0;
|
|
|
|
/* set auth */
|
|
err = wldev_iovar_setint_bsscfg(dev, "auth", 0, bssidx);
|
|
if (err < 0) {
|
|
WL_ERR(("auth error %d\n", err));
|
|
return BCME_ERROR;
|
|
}
|
|
|
|
if (privacy) {
|
|
/* If privacy bit is set in open mode, then WEP would be enabled */
|
|
wsec = WEP_ENABLED;
|
|
WL_DBG(("Setting wsec to %d for WEP \n", wsec));
|
|
}
|
|
|
|
/* set wsec */
|
|
err = wldev_iovar_setint_bsscfg(dev, "wsec", wsec, bssidx);
|
|
if (err < 0) {
|
|
WL_ERR(("wsec error %d\n", err));
|
|
return BCME_ERROR;
|
|
}
|
|
|
|
/* set upper-layer auth */
|
|
if (dev->ieee80211_ptr->iftype == NL80211_IFTYPE_ADHOC)
|
|
wpa_val = WPA_AUTH_NONE;
|
|
else
|
|
wpa_val = WPA_AUTH_DISABLED;
|
|
err = wldev_iovar_setint_bsscfg(dev, "wpa_auth", wpa_val, bssidx);
|
|
if (err < 0) {
|
|
WL_ERR(("wpa_auth error %d\n", err));
|
|
return BCME_ERROR;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
#define MAX_FILS_IND_IE_LEN 1024u
|
|
static s32
|
|
wl_validate_fils_ind_ie(struct net_device *dev, const bcm_tlv_t *filsindie, s32 bssidx)
|
|
{
|
|
s32 err = BCME_OK;
|
|
struct bcm_cfg80211 *cfg = NULL;
|
|
bcm_iov_buf_t *iov_buf = NULL;
|
|
bcm_xtlv_t* pxtlv;
|
|
int iov_buf_size = 0;
|
|
|
|
if (!dev || !filsindie) {
|
|
WL_ERR(("%s: dev/filsidie is null\n", __FUNCTION__));
|
|
goto exit;
|
|
}
|
|
|
|
cfg = wl_get_cfg(dev);
|
|
if (!cfg) {
|
|
WL_ERR(("%s: cfg is null\n", __FUNCTION__));
|
|
goto exit;
|
|
}
|
|
|
|
iov_buf_size = sizeof(bcm_iov_buf_t) + sizeof(bcm_xtlv_t) + filsindie->len - 1;
|
|
iov_buf = MALLOCZ(cfg->osh, iov_buf_size);
|
|
if (!iov_buf) {
|
|
WL_ERR(("%s: iov_buf alloc failed! %d bytes\n", __FUNCTION__, iov_buf_size));
|
|
err = BCME_NOMEM;
|
|
goto exit;
|
|
}
|
|
iov_buf->version = WL_FILS_IOV_VERSION;
|
|
iov_buf->id = WL_FILS_CMD_ADD_IND_IE;
|
|
iov_buf->len = sizeof(bcm_xtlv_t) + filsindie->len - 1;
|
|
pxtlv = (bcm_xtlv_t*)&iov_buf->data[0];
|
|
pxtlv->id = WL_FILS_XTLV_IND_IE;
|
|
pxtlv->len = filsindie->len;
|
|
/* memcpy_s return check not required as buffer is allocated based on ie
|
|
* len
|
|
*/
|
|
(void)memcpy_s(pxtlv->data, filsindie->len, filsindie->data, filsindie->len);
|
|
|
|
err = wldev_iovar_setbuf(dev, "fils", iov_buf, iov_buf_size,
|
|
cfg->ioctl_buf, WLC_IOCTL_SMLEN, &cfg->ioctl_buf_sync);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("fils indication ioctl error (%d)\n", err));
|
|
goto exit;
|
|
}
|
|
|
|
exit:
|
|
if (err < 0) {
|
|
WL_ERR(("FILS Ind setting error %d\n", err));
|
|
}
|
|
|
|
if (iov_buf) {
|
|
MFREE(cfg->osh, iov_buf, iov_buf_size);
|
|
}
|
|
return err;
|
|
}
|
|
|
|
static s32
|
|
wl_validate_wpa2ie(struct net_device *dev, const bcm_tlv_t *wpa2ie, s32 bssidx)
|
|
{
|
|
s32 len = 0;
|
|
s32 err = BCME_OK;
|
|
u16 auth = 0; /* d11 open authentication */
|
|
u32 wsec;
|
|
u32 pval = 0;
|
|
u32 gval = 0;
|
|
u32 wpa_auth = 0;
|
|
const wpa_suite_mcast_t *mcast;
|
|
const wpa_suite_ucast_t *ucast;
|
|
const wpa_suite_auth_key_mgmt_t *mgmt;
|
|
const wpa_pmkid_list_t *pmkid;
|
|
int cnt = 0;
|
|
#ifdef MFP
|
|
int mfp = 0;
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(dev);
|
|
#endif /* MFP */
|
|
|
|
u16 suite_count;
|
|
u8 rsn_cap[2];
|
|
u32 wme_bss_disable;
|
|
|
|
if (wpa2ie == NULL)
|
|
goto exit;
|
|
|
|
WL_DBG(("Enter \n"));
|
|
len = wpa2ie->len - WPA2_VERSION_LEN;
|
|
/* check the mcast cipher */
|
|
mcast = (const wpa_suite_mcast_t *)&wpa2ie->data[WPA2_VERSION_LEN];
|
|
switch (mcast->type) {
|
|
case WPA_CIPHER_NONE:
|
|
gval = 0;
|
|
break;
|
|
case WPA_CIPHER_WEP_40:
|
|
case WPA_CIPHER_WEP_104:
|
|
gval = WEP_ENABLED;
|
|
break;
|
|
case WPA_CIPHER_TKIP:
|
|
gval = TKIP_ENABLED;
|
|
break;
|
|
case WPA_CIPHER_AES_CCM:
|
|
gval = AES_ENABLED;
|
|
break;
|
|
#ifdef BCMWAPI_WPI
|
|
case WAPI_CIPHER_SMS4:
|
|
gval = SMS4_ENABLED;
|
|
break;
|
|
#endif // endif
|
|
default:
|
|
WL_ERR(("No Security Info\n"));
|
|
break;
|
|
}
|
|
if ((len -= WPA_SUITE_LEN) <= 0)
|
|
return BCME_BADLEN;
|
|
|
|
/* check the unicast cipher */
|
|
ucast = (const wpa_suite_ucast_t *)&mcast[1];
|
|
suite_count = ltoh16_ua(&ucast->count);
|
|
switch (ucast->list[0].type) {
|
|
case WPA_CIPHER_NONE:
|
|
pval = 0;
|
|
break;
|
|
case WPA_CIPHER_WEP_40:
|
|
case WPA_CIPHER_WEP_104:
|
|
pval = WEP_ENABLED;
|
|
break;
|
|
case WPA_CIPHER_TKIP:
|
|
pval = TKIP_ENABLED;
|
|
break;
|
|
case WPA_CIPHER_AES_CCM:
|
|
pval = AES_ENABLED;
|
|
break;
|
|
#ifdef BCMWAPI_WPI
|
|
case WAPI_CIPHER_SMS4:
|
|
pval = SMS4_ENABLED;
|
|
break;
|
|
#endif // endif
|
|
default:
|
|
WL_ERR(("No Security Info\n"));
|
|
}
|
|
if ((len -= (WPA_IE_SUITE_COUNT_LEN + (WPA_SUITE_LEN * suite_count))) <= 0)
|
|
return BCME_BADLEN;
|
|
|
|
/* FOR WPS , set SEC_OW_ENABLED */
|
|
wsec = (pval | gval | SES_OW_ENABLED);
|
|
/* check the AKM */
|
|
mgmt = (const wpa_suite_auth_key_mgmt_t *)&ucast->list[suite_count];
|
|
suite_count = cnt = ltoh16_ua(&mgmt->count);
|
|
while (cnt--) {
|
|
switch (mgmt->list[cnt].type) {
|
|
case RSN_AKM_NONE:
|
|
wpa_auth |= WPA_AUTH_NONE;
|
|
break;
|
|
case RSN_AKM_UNSPECIFIED:
|
|
wpa_auth |= WPA2_AUTH_UNSPECIFIED;
|
|
break;
|
|
case RSN_AKM_PSK:
|
|
wpa_auth |= WPA2_AUTH_PSK;
|
|
break;
|
|
#ifdef MFP
|
|
case RSN_AKM_MFP_PSK:
|
|
wpa_auth |= WPA2_AUTH_PSK_SHA256;
|
|
break;
|
|
case RSN_AKM_MFP_1X:
|
|
wpa_auth |= WPA2_AUTH_1X_SHA256;
|
|
break;
|
|
case RSN_AKM_FILS_SHA256:
|
|
wpa_auth |= WPA2_AUTH_FILS_SHA256;
|
|
break;
|
|
case RSN_AKM_FILS_SHA384:
|
|
wpa_auth |= WPA2_AUTH_FILS_SHA384;
|
|
break;
|
|
#if defined(WL_SAE) || defined(WL_CLIENT_SAE)
|
|
case RSN_AKM_SAE_PSK:
|
|
wpa_auth |= WPA3_AUTH_SAE_PSK;
|
|
break;
|
|
#endif /* WL_SAE || WL_CLIENT_SAE */
|
|
#endif /* MFP */
|
|
default:
|
|
WL_ERR(("No Key Mgmt Info\n"));
|
|
}
|
|
}
|
|
|
|
if ((len -= (WPA_IE_SUITE_COUNT_LEN + (WPA_SUITE_LEN * suite_count))) >= RSN_CAP_LEN) {
|
|
rsn_cap[0] = *(const u8 *)&mgmt->list[suite_count];
|
|
rsn_cap[1] = *((const u8 *)&mgmt->list[suite_count] + 1);
|
|
|
|
if (rsn_cap[0] & (RSN_CAP_16_REPLAY_CNTRS << RSN_CAP_PTK_REPLAY_CNTR_SHIFT)) {
|
|
wme_bss_disable = 0;
|
|
} else {
|
|
wme_bss_disable = 1;
|
|
}
|
|
|
|
#ifdef MFP
|
|
if (rsn_cap[0] & RSN_CAP_MFPR) {
|
|
WL_DBG(("MFP Required \n"));
|
|
mfp = WL_MFP_REQUIRED;
|
|
/* Our firmware has requirement that WPA2_AUTH_PSK/WPA2_AUTH_UNSPECIFIED
|
|
* be set, if SHA256 OUI is to be included in the rsn ie.
|
|
*/
|
|
if (wpa_auth & WPA2_AUTH_PSK_SHA256) {
|
|
wpa_auth |= WPA2_AUTH_PSK;
|
|
} else if (wpa_auth & WPA2_AUTH_1X_SHA256) {
|
|
wpa_auth |= WPA2_AUTH_UNSPECIFIED;
|
|
}
|
|
} else if (rsn_cap[0] & RSN_CAP_MFPC) {
|
|
WL_DBG(("MFP Capable \n"));
|
|
mfp = WL_MFP_CAPABLE;
|
|
}
|
|
#endif /* MFP */
|
|
|
|
/* set wme_bss_disable to sync RSN Capabilities */
|
|
err = wldev_iovar_setint_bsscfg(dev, "wme_bss_disable", wme_bss_disable, bssidx);
|
|
if (err < 0) {
|
|
WL_ERR(("wme_bss_disable error %d\n", err));
|
|
return BCME_ERROR;
|
|
}
|
|
} else {
|
|
WL_DBG(("There is no RSN Capabilities. remained len %d\n", len));
|
|
}
|
|
|
|
len -= RSN_CAP_LEN;
|
|
if (len >= WPA2_PMKID_COUNT_LEN) {
|
|
pmkid = (const wpa_pmkid_list_t *)
|
|
((const u8 *)&mgmt->list[suite_count] + RSN_CAP_LEN);
|
|
cnt = ltoh16_ua(&pmkid->count);
|
|
if (cnt != 0) {
|
|
WL_ERR(("AP has non-zero PMKID count. Wrong!\n"));
|
|
return BCME_ERROR;
|
|
}
|
|
/* since PMKID cnt is known to be 0 for AP, */
|
|
/* so don't bother to send down this info to firmware */
|
|
}
|
|
|
|
#ifdef MFP
|
|
len -= WPA2_PMKID_COUNT_LEN;
|
|
if (len >= WPA_SUITE_LEN) {
|
|
cfg->bip_pos =
|
|
(const u8 *)&mgmt->list[suite_count] + RSN_CAP_LEN + WPA2_PMKID_COUNT_LEN;
|
|
} else {
|
|
cfg->bip_pos = NULL;
|
|
}
|
|
#endif // endif
|
|
|
|
/* set auth */
|
|
err = wldev_iovar_setint_bsscfg(dev, "auth", auth, bssidx);
|
|
if (err < 0) {
|
|
WL_ERR(("auth error %d\n", err));
|
|
return BCME_ERROR;
|
|
}
|
|
|
|
/* set wsec */
|
|
err = wldev_iovar_setint_bsscfg(dev, "wsec", wsec, bssidx);
|
|
if (err < 0) {
|
|
WL_ERR(("wsec error %d\n", err));
|
|
return BCME_ERROR;
|
|
}
|
|
|
|
#ifdef MFP
|
|
cfg->mfp_mode = mfp;
|
|
#endif /* MFP */
|
|
|
|
/* set upper-layer auth */
|
|
err = wldev_iovar_setint_bsscfg(dev, "wpa_auth", wpa_auth, bssidx);
|
|
if (err < 0) {
|
|
WL_ERR(("wpa_auth error %d\n", err));
|
|
return BCME_ERROR;
|
|
}
|
|
exit:
|
|
return 0;
|
|
}
|
|
|
|
static s32
|
|
wl_validate_wpaie(struct net_device *dev, const wpa_ie_fixed_t *wpaie, s32 bssidx)
|
|
{
|
|
const wpa_suite_mcast_t *mcast;
|
|
const wpa_suite_ucast_t *ucast;
|
|
const wpa_suite_auth_key_mgmt_t *mgmt;
|
|
u16 auth = 0; /* d11 open authentication */
|
|
u16 count;
|
|
s32 err = BCME_OK;
|
|
s32 len = 0;
|
|
u32 i;
|
|
u32 wsec;
|
|
u32 pval = 0;
|
|
u32 gval = 0;
|
|
u32 wpa_auth = 0;
|
|
u32 tmp = 0;
|
|
|
|
if (wpaie == NULL)
|
|
goto exit;
|
|
WL_DBG(("Enter \n"));
|
|
len = wpaie->length; /* value length */
|
|
len -= WPA_IE_TAG_FIXED_LEN;
|
|
/* check for multicast cipher suite */
|
|
if (len < WPA_SUITE_LEN) {
|
|
WL_INFORM_MEM(("no multicast cipher suite\n"));
|
|
goto exit;
|
|
}
|
|
|
|
/* pick up multicast cipher */
|
|
mcast = (const wpa_suite_mcast_t *)&wpaie[1];
|
|
len -= WPA_SUITE_LEN;
|
|
if (!bcmp(mcast->oui, WPA_OUI, WPA_OUI_LEN)) {
|
|
if (IS_WPA_CIPHER(mcast->type)) {
|
|
tmp = 0;
|
|
switch (mcast->type) {
|
|
case WPA_CIPHER_NONE:
|
|
tmp = 0;
|
|
break;
|
|
case WPA_CIPHER_WEP_40:
|
|
case WPA_CIPHER_WEP_104:
|
|
tmp = WEP_ENABLED;
|
|
break;
|
|
case WPA_CIPHER_TKIP:
|
|
tmp = TKIP_ENABLED;
|
|
break;
|
|
case WPA_CIPHER_AES_CCM:
|
|
tmp = AES_ENABLED;
|
|
break;
|
|
default:
|
|
WL_ERR(("No Security Info\n"));
|
|
}
|
|
gval |= tmp;
|
|
}
|
|
}
|
|
/* Check for unicast suite(s) */
|
|
if (len < WPA_IE_SUITE_COUNT_LEN) {
|
|
WL_INFORM_MEM(("no unicast suite\n"));
|
|
goto exit;
|
|
}
|
|
/* walk thru unicast cipher list and pick up what we recognize */
|
|
ucast = (const wpa_suite_ucast_t *)&mcast[1];
|
|
count = ltoh16_ua(&ucast->count);
|
|
len -= WPA_IE_SUITE_COUNT_LEN;
|
|
for (i = 0; i < count && len >= WPA_SUITE_LEN;
|
|
i++, len -= WPA_SUITE_LEN) {
|
|
if (!bcmp(ucast->list[i].oui, WPA_OUI, WPA_OUI_LEN)) {
|
|
if (IS_WPA_CIPHER(ucast->list[i].type)) {
|
|
tmp = 0;
|
|
switch (ucast->list[i].type) {
|
|
case WPA_CIPHER_NONE:
|
|
tmp = 0;
|
|
break;
|
|
case WPA_CIPHER_WEP_40:
|
|
case WPA_CIPHER_WEP_104:
|
|
tmp = WEP_ENABLED;
|
|
break;
|
|
case WPA_CIPHER_TKIP:
|
|
tmp = TKIP_ENABLED;
|
|
break;
|
|
case WPA_CIPHER_AES_CCM:
|
|
tmp = AES_ENABLED;
|
|
break;
|
|
default:
|
|
WL_ERR(("No Security Info\n"));
|
|
}
|
|
pval |= tmp;
|
|
}
|
|
}
|
|
}
|
|
len -= (count - i) * WPA_SUITE_LEN;
|
|
/* Check for auth key management suite(s) */
|
|
if (len < WPA_IE_SUITE_COUNT_LEN) {
|
|
WL_INFORM_MEM((" no auth key mgmt suite\n"));
|
|
goto exit;
|
|
}
|
|
/* walk thru auth management suite list and pick up what we recognize */
|
|
mgmt = (const wpa_suite_auth_key_mgmt_t *)&ucast->list[count];
|
|
count = ltoh16_ua(&mgmt->count);
|
|
len -= WPA_IE_SUITE_COUNT_LEN;
|
|
for (i = 0; i < count && len >= WPA_SUITE_LEN;
|
|
i++, len -= WPA_SUITE_LEN) {
|
|
if (!bcmp(mgmt->list[i].oui, WPA_OUI, WPA_OUI_LEN)) {
|
|
if (IS_WPA_AKM(mgmt->list[i].type)) {
|
|
tmp = 0;
|
|
switch (mgmt->list[i].type) {
|
|
case RSN_AKM_NONE:
|
|
tmp = WPA_AUTH_NONE;
|
|
break;
|
|
case RSN_AKM_UNSPECIFIED:
|
|
tmp = WPA_AUTH_UNSPECIFIED;
|
|
break;
|
|
case RSN_AKM_PSK:
|
|
tmp = WPA_AUTH_PSK;
|
|
break;
|
|
default:
|
|
WL_ERR(("No Key Mgmt Info\n"));
|
|
}
|
|
wpa_auth |= tmp;
|
|
}
|
|
}
|
|
|
|
}
|
|
/* FOR WPS , set SEC_OW_ENABLED */
|
|
wsec = (pval | gval | SES_OW_ENABLED);
|
|
/* set auth */
|
|
err = wldev_iovar_setint_bsscfg(dev, "auth", auth, bssidx);
|
|
if (err < 0) {
|
|
WL_ERR(("auth error %d\n", err));
|
|
return BCME_ERROR;
|
|
}
|
|
/* set wsec */
|
|
err = wldev_iovar_setint_bsscfg(dev, "wsec", wsec, bssidx);
|
|
if (err < 0) {
|
|
WL_ERR(("wsec error %d\n", err));
|
|
return BCME_ERROR;
|
|
}
|
|
/* set upper-layer auth */
|
|
err = wldev_iovar_setint_bsscfg(dev, "wpa_auth", wpa_auth, bssidx);
|
|
if (err < 0) {
|
|
WL_ERR(("wpa_auth error %d\n", err));
|
|
return BCME_ERROR;
|
|
}
|
|
exit:
|
|
return 0;
|
|
}
|
|
|
|
#if defined(SUPPORT_SOFTAP_WPAWPA2_MIXED)
|
|
static u32 wl_get_cipher_type(uint8 type)
|
|
{
|
|
u32 ret = 0;
|
|
switch (type) {
|
|
case WPA_CIPHER_NONE:
|
|
ret = 0;
|
|
break;
|
|
case WPA_CIPHER_WEP_40:
|
|
case WPA_CIPHER_WEP_104:
|
|
ret = WEP_ENABLED;
|
|
break;
|
|
case WPA_CIPHER_TKIP:
|
|
ret = TKIP_ENABLED;
|
|
break;
|
|
case WPA_CIPHER_AES_CCM:
|
|
ret = AES_ENABLED;
|
|
break;
|
|
#ifdef BCMWAPI_WPI
|
|
case WAPI_CIPHER_SMS4:
|
|
ret = SMS4_ENABLED;
|
|
break;
|
|
#endif // endif
|
|
default:
|
|
WL_ERR(("No Security Info\n"));
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
static u32 wl_get_suite_auth_key_mgmt_type(uint8 type, const wpa_suite_mcast_t *mcast)
|
|
{
|
|
u32 ret = 0;
|
|
u32 is_wpa2 = 0;
|
|
|
|
if (!bcmp(mcast->oui, WPA2_OUI, WPA2_OUI_LEN)) {
|
|
is_wpa2 = 1;
|
|
}
|
|
|
|
WL_INFORM_MEM(("%s, type = %d\n", is_wpa2 ? "WPA2":"WPA", type));
|
|
switch (type) {
|
|
case RSN_AKM_NONE:
|
|
/* For WPA and WPA2, AUTH_NONE is common */
|
|
ret = WPA_AUTH_NONE;
|
|
break;
|
|
case RSN_AKM_UNSPECIFIED:
|
|
if (is_wpa2) {
|
|
ret = WPA2_AUTH_UNSPECIFIED;
|
|
} else {
|
|
ret = WPA_AUTH_UNSPECIFIED;
|
|
}
|
|
break;
|
|
case RSN_AKM_PSK:
|
|
if (is_wpa2) {
|
|
ret = WPA2_AUTH_PSK;
|
|
} else {
|
|
ret = WPA_AUTH_PSK;
|
|
}
|
|
break;
|
|
#ifdef WL_SAE
|
|
case RSN_AKM_SAE_PSK:
|
|
ret = WPA3_AUTH_SAE_PSK;
|
|
break;
|
|
#endif /* WL_SAE */
|
|
default:
|
|
WL_ERR(("No Key Mgmt Info\n"));
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
static s32
|
|
wl_validate_wpaie_wpa2ie(struct net_device *dev, const wpa_ie_fixed_t *wpaie,
|
|
const bcm_tlv_t *wpa2ie, s32 bssidx)
|
|
{
|
|
const wpa_suite_mcast_t *mcast;
|
|
const wpa_suite_ucast_t *ucast;
|
|
const wpa_suite_auth_key_mgmt_t *mgmt;
|
|
u16 auth = 0; /* d11 open authentication */
|
|
u16 count;
|
|
s32 err = BCME_OK;
|
|
u32 wme_bss_disable;
|
|
u16 suite_count;
|
|
u8 rsn_cap[2];
|
|
s32 len = 0;
|
|
u32 i;
|
|
u32 wsec1, wsec2, wsec;
|
|
u32 pval = 0;
|
|
u32 gval = 0;
|
|
u32 wpa_auth = 0;
|
|
u32 wpa_auth1 = 0;
|
|
u32 wpa_auth2 = 0;
|
|
|
|
if (wpaie == NULL || wpa2ie == NULL)
|
|
goto exit;
|
|
|
|
WL_DBG(("Enter \n"));
|
|
len = wpaie->length; /* value length */
|
|
len -= WPA_IE_TAG_FIXED_LEN;
|
|
/* check for multicast cipher suite */
|
|
if (len < WPA_SUITE_LEN) {
|
|
WL_INFORM_MEM(("no multicast cipher suite\n"));
|
|
goto exit;
|
|
}
|
|
|
|
/* pick up multicast cipher */
|
|
mcast = (const wpa_suite_mcast_t *)&wpaie[1];
|
|
len -= WPA_SUITE_LEN;
|
|
if (!bcmp(mcast->oui, WPA_OUI, WPA_OUI_LEN)) {
|
|
if (IS_WPA_CIPHER(mcast->type)) {
|
|
gval |= wl_get_cipher_type(mcast->type);
|
|
}
|
|
}
|
|
WL_DBG(("\nwpa ie validate\n"));
|
|
WL_DBG(("wpa ie mcast cipher = 0x%X\n", gval));
|
|
|
|
/* Check for unicast suite(s) */
|
|
if (len < WPA_IE_SUITE_COUNT_LEN) {
|
|
WL_INFORM_MEM(("no unicast suite\n"));
|
|
goto exit;
|
|
}
|
|
|
|
/* walk thru unicast cipher list and pick up what we recognize */
|
|
ucast = (const wpa_suite_ucast_t *)&mcast[1];
|
|
count = ltoh16_ua(&ucast->count);
|
|
len -= WPA_IE_SUITE_COUNT_LEN;
|
|
for (i = 0; i < count && len >= WPA_SUITE_LEN;
|
|
i++, len -= WPA_SUITE_LEN) {
|
|
if (!bcmp(ucast->list[i].oui, WPA_OUI, WPA_OUI_LEN)) {
|
|
if (IS_WPA_CIPHER(ucast->list[i].type)) {
|
|
pval |= wl_get_cipher_type(ucast->list[i].type);
|
|
}
|
|
}
|
|
}
|
|
WL_ERR(("wpa ie ucast count =%d, cipher = 0x%X\n", count, pval));
|
|
|
|
/* FOR WPS , set SEC_OW_ENABLED */
|
|
wsec1 = (pval | gval | SES_OW_ENABLED);
|
|
WL_ERR(("wpa ie wsec = 0x%X\n", wsec1));
|
|
|
|
len -= (count - i) * WPA_SUITE_LEN;
|
|
/* Check for auth key management suite(s) */
|
|
if (len < WPA_IE_SUITE_COUNT_LEN) {
|
|
WL_INFORM_MEM((" no auth key mgmt suite\n"));
|
|
goto exit;
|
|
}
|
|
/* walk thru auth management suite list and pick up what we recognize */
|
|
mgmt = (const wpa_suite_auth_key_mgmt_t *)&ucast->list[count];
|
|
count = ltoh16_ua(&mgmt->count);
|
|
len -= WPA_IE_SUITE_COUNT_LEN;
|
|
for (i = 0; i < count && len >= WPA_SUITE_LEN;
|
|
i++, len -= WPA_SUITE_LEN) {
|
|
if (!bcmp(mgmt->list[i].oui, WPA_OUI, WPA_OUI_LEN)) {
|
|
if (IS_WPA_AKM(mgmt->list[i].type)) {
|
|
wpa_auth1 |=
|
|
wl_get_suite_auth_key_mgmt_type(mgmt->list[i].type, mcast);
|
|
}
|
|
}
|
|
|
|
}
|
|
WL_ERR(("wpa ie wpa_suite_auth_key_mgmt count=%d, key_mgmt = 0x%X\n", count, wpa_auth1));
|
|
WL_ERR(("\nwpa2 ie validate\n"));
|
|
|
|
pval = 0;
|
|
gval = 0;
|
|
len = wpa2ie->len;
|
|
/* check the mcast cipher */
|
|
mcast = (const wpa_suite_mcast_t *)&wpa2ie->data[WPA2_VERSION_LEN];
|
|
gval = wl_get_cipher_type(mcast->type);
|
|
|
|
WL_ERR(("wpa2 ie mcast cipher = 0x%X\n", gval));
|
|
if ((len -= WPA_SUITE_LEN) <= 0)
|
|
{
|
|
WL_ERR(("P:wpa2 ie len[%d]", len));
|
|
return BCME_BADLEN;
|
|
}
|
|
|
|
/* check the unicast cipher */
|
|
ucast = (const wpa_suite_ucast_t *)&mcast[1];
|
|
suite_count = ltoh16_ua(&ucast->count);
|
|
WL_ERR((" WPA2 ucast cipher count=%d\n", suite_count));
|
|
pval |= wl_get_cipher_type(ucast->list[0].type);
|
|
|
|
if ((len -= (WPA_IE_SUITE_COUNT_LEN + (WPA_SUITE_LEN * suite_count))) <= 0)
|
|
return BCME_BADLEN;
|
|
|
|
WL_ERR(("wpa2 ie ucast cipher = 0x%X\n", pval));
|
|
|
|
/* FOR WPS , set SEC_OW_ENABLED */
|
|
wsec2 = (pval | gval | SES_OW_ENABLED);
|
|
WL_ERR(("wpa2 ie wsec = 0x%X\n", wsec2));
|
|
|
|
/* check the AKM */
|
|
mgmt = (const wpa_suite_auth_key_mgmt_t *)&ucast->list[suite_count];
|
|
suite_count = ltoh16_ua(&mgmt->count);
|
|
wpa_auth2 = wl_get_suite_auth_key_mgmt_type(mgmt->list[0].type, mcast);
|
|
WL_ERR(("wpa ie wpa_suite_auth_key_mgmt count=%d, key_mgmt = 0x%X\n", count, wpa_auth2));
|
|
|
|
if ((len -= (WPA_IE_SUITE_COUNT_LEN + (WPA_SUITE_LEN * suite_count))) >= RSN_CAP_LEN) {
|
|
rsn_cap[0] = *(const u8 *)&mgmt->list[suite_count];
|
|
rsn_cap[1] = *((const u8 *)&mgmt->list[suite_count] + 1);
|
|
if (rsn_cap[0] & (RSN_CAP_16_REPLAY_CNTRS << RSN_CAP_PTK_REPLAY_CNTR_SHIFT)) {
|
|
wme_bss_disable = 0;
|
|
} else {
|
|
wme_bss_disable = 1;
|
|
}
|
|
WL_DBG(("P:rsn_cap[0]=[0x%X]:wme_bss_disabled[%d]\n", rsn_cap[0], wme_bss_disable));
|
|
|
|
/* set wme_bss_disable to sync RSN Capabilities */
|
|
err = wldev_iovar_setint_bsscfg(dev, "wme_bss_disable", wme_bss_disable, bssidx);
|
|
if (err < 0) {
|
|
WL_ERR(("wme_bss_disable error %d\n", err));
|
|
return BCME_ERROR;
|
|
}
|
|
} else {
|
|
WL_DBG(("There is no RSN Capabilities. remained len %d\n", len));
|
|
}
|
|
|
|
wsec = (wsec1 | wsec2);
|
|
wpa_auth = (wpa_auth1 | wpa_auth2);
|
|
WL_ERR(("wpa_wpa2 wsec=0x%X wpa_auth=0x%X\n", wsec, wpa_auth));
|
|
|
|
/* set auth */
|
|
err = wldev_iovar_setint_bsscfg(dev, "auth", auth, bssidx);
|
|
if (err < 0) {
|
|
WL_ERR(("auth error %d\n", err));
|
|
return BCME_ERROR;
|
|
}
|
|
/* set wsec */
|
|
err = wldev_iovar_setint_bsscfg(dev, "wsec", wsec, bssidx);
|
|
if (err < 0) {
|
|
WL_ERR(("wsec error %d\n", err));
|
|
return BCME_ERROR;
|
|
}
|
|
/* set upper-layer auth */
|
|
err = wldev_iovar_setint_bsscfg(dev, "wpa_auth", wpa_auth, bssidx);
|
|
if (err < 0) {
|
|
WL_ERR(("wpa_auth error %d\n", err));
|
|
return BCME_ERROR;
|
|
}
|
|
exit:
|
|
return 0;
|
|
}
|
|
#endif /* SUPPORT_SOFTAP_WPAWPA2_MIXED */
|
|
|
|
static s32
|
|
wl_cfg80211_bcn_validate_sec(
|
|
struct net_device *dev,
|
|
struct parsed_ies *ies,
|
|
u32 dev_role,
|
|
s32 bssidx,
|
|
bool privacy)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(dev);
|
|
wl_cfgbss_t *bss = wl_get_cfgbss_by_wdev(cfg, dev->ieee80211_ptr);
|
|
|
|
if (!bss) {
|
|
WL_ERR(("cfgbss is NULL \n"));
|
|
return BCME_ERROR;
|
|
}
|
|
|
|
if (dev_role == NL80211_IFTYPE_P2P_GO && (ies->wpa2_ie)) {
|
|
/* For P2P GO, the sec type is WPA2-PSK */
|
|
WL_DBG(("P2P GO: validating wpa2_ie"));
|
|
if (wl_validate_wpa2ie(dev, ies->wpa2_ie, bssidx) < 0)
|
|
return BCME_ERROR;
|
|
|
|
} else if (dev_role == NL80211_IFTYPE_AP) {
|
|
|
|
WL_DBG(("SoftAP: validating security"));
|
|
/* If wpa2_ie or wpa_ie is present validate it */
|
|
|
|
#if defined(SUPPORT_SOFTAP_WPAWPA2_MIXED)
|
|
if ((ies->wpa_ie != NULL && ies->wpa2_ie != NULL)) {
|
|
if (wl_validate_wpaie_wpa2ie(dev, ies->wpa_ie, ies->wpa2_ie, bssidx) < 0) {
|
|
bss->security_mode = false;
|
|
return BCME_ERROR;
|
|
}
|
|
}
|
|
else {
|
|
#endif /* SUPPORT_SOFTAP_WPAWPA2_MIXED */
|
|
if ((ies->wpa2_ie || ies->wpa_ie) &&
|
|
((wl_validate_wpa2ie(dev, ies->wpa2_ie, bssidx) < 0 ||
|
|
wl_validate_wpaie(dev, ies->wpa_ie, bssidx) < 0))) {
|
|
bss->security_mode = false;
|
|
return BCME_ERROR;
|
|
}
|
|
|
|
if (ies->fils_ind_ie &&
|
|
(wl_validate_fils_ind_ie(dev, ies->fils_ind_ie, bssidx) < 0)) {
|
|
bss->security_mode = false;
|
|
return BCME_ERROR;
|
|
}
|
|
|
|
bss->security_mode = true;
|
|
if (bss->rsn_ie) {
|
|
MFREE(cfg->osh, bss->rsn_ie, bss->rsn_ie[1]
|
|
+ WPA_RSN_IE_TAG_FIXED_LEN);
|
|
bss->rsn_ie = NULL;
|
|
}
|
|
if (bss->wpa_ie) {
|
|
MFREE(cfg->osh, bss->wpa_ie, bss->wpa_ie[1]
|
|
+ WPA_RSN_IE_TAG_FIXED_LEN);
|
|
bss->wpa_ie = NULL;
|
|
}
|
|
if (bss->wps_ie) {
|
|
MFREE(cfg->osh, bss->wps_ie, bss->wps_ie[1] + 2);
|
|
bss->wps_ie = NULL;
|
|
}
|
|
if (bss->fils_ind_ie) {
|
|
MFREE(cfg->osh, bss->fils_ind_ie, bss->fils_ind_ie[1]
|
|
+ FILS_INDICATION_IE_TAG_FIXED_LEN);
|
|
bss->fils_ind_ie = NULL;
|
|
}
|
|
if (ies->wpa_ie != NULL) {
|
|
/* WPAIE */
|
|
bss->rsn_ie = NULL;
|
|
bss->wpa_ie = MALLOCZ(cfg->osh,
|
|
ies->wpa_ie->length
|
|
+ WPA_RSN_IE_TAG_FIXED_LEN);
|
|
if (bss->wpa_ie) {
|
|
memcpy(bss->wpa_ie, ies->wpa_ie,
|
|
ies->wpa_ie->length
|
|
+ WPA_RSN_IE_TAG_FIXED_LEN);
|
|
}
|
|
} else if (ies->wpa2_ie != NULL) {
|
|
/* RSNIE */
|
|
bss->wpa_ie = NULL;
|
|
bss->rsn_ie = MALLOCZ(cfg->osh,
|
|
ies->wpa2_ie->len
|
|
+ WPA_RSN_IE_TAG_FIXED_LEN);
|
|
if (bss->rsn_ie) {
|
|
memcpy(bss->rsn_ie, ies->wpa2_ie,
|
|
ies->wpa2_ie->len
|
|
+ WPA_RSN_IE_TAG_FIXED_LEN);
|
|
}
|
|
}
|
|
#ifdef WL_FILS
|
|
if (ies->fils_ind_ie) {
|
|
bss->fils_ind_ie = MALLOCZ(cfg->osh,
|
|
ies->fils_ind_ie->len
|
|
+ FILS_INDICATION_IE_TAG_FIXED_LEN);
|
|
if (bss->fils_ind_ie) {
|
|
memcpy(bss->fils_ind_ie, ies->fils_ind_ie,
|
|
ies->fils_ind_ie->len
|
|
+ FILS_INDICATION_IE_TAG_FIXED_LEN);
|
|
}
|
|
}
|
|
#endif /* WL_FILS */
|
|
#if defined(SUPPORT_SOFTAP_WPAWPA2_MIXED)
|
|
}
|
|
#endif /* SUPPORT_SOFTAP_WPAWPA2_MIXED */
|
|
if (!ies->wpa2_ie && !ies->wpa_ie) {
|
|
wl_validate_opensecurity(dev, bssidx, privacy);
|
|
bss->security_mode = false;
|
|
}
|
|
|
|
if (ies->wps_ie) {
|
|
bss->wps_ie = MALLOCZ(cfg->osh, ies->wps_ie_len);
|
|
if (bss->wps_ie) {
|
|
memcpy(bss->wps_ie, ies->wps_ie, ies->wps_ie_len);
|
|
}
|
|
}
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 4, 0)) || defined(WL_COMPAT_WIRELESS)
|
|
static s32 wl_cfg80211_bcn_set_params(
|
|
struct cfg80211_ap_settings *info,
|
|
struct net_device *dev,
|
|
u32 dev_role, s32 bssidx)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(dev);
|
|
s32 err = BCME_OK;
|
|
|
|
WL_DBG(("interval (%d) \ndtim_period (%d) \n",
|
|
info->beacon_interval, info->dtim_period));
|
|
|
|
if (info->beacon_interval) {
|
|
if ((err = wldev_ioctl_set(dev, WLC_SET_BCNPRD,
|
|
&info->beacon_interval, sizeof(s32))) < 0) {
|
|
WL_ERR(("Beacon Interval Set Error, %d\n", err));
|
|
return err;
|
|
}
|
|
}
|
|
|
|
if (info->dtim_period) {
|
|
if ((err = wldev_ioctl_set(dev, WLC_SET_DTIMPRD,
|
|
&info->dtim_period, sizeof(s32))) < 0) {
|
|
WL_ERR(("DTIM Interval Set Error, %d\n", err));
|
|
return err;
|
|
}
|
|
}
|
|
|
|
if ((info->ssid) && (info->ssid_len > 0) &&
|
|
(info->ssid_len <= DOT11_MAX_SSID_LEN)) {
|
|
WL_DBG(("SSID (%s) len:%zd \n", info->ssid, info->ssid_len));
|
|
if (dev_role == NL80211_IFTYPE_AP) {
|
|
/* Store the hostapd SSID */
|
|
bzero(cfg->hostapd_ssid.SSID, DOT11_MAX_SSID_LEN);
|
|
memcpy(cfg->hostapd_ssid.SSID, info->ssid, info->ssid_len);
|
|
cfg->hostapd_ssid.SSID_len = (uint32)info->ssid_len;
|
|
} else {
|
|
/* P2P GO */
|
|
bzero(cfg->p2p->ssid.SSID, DOT11_MAX_SSID_LEN);
|
|
memcpy(cfg->p2p->ssid.SSID, info->ssid, info->ssid_len);
|
|
cfg->p2p->ssid.SSID_len = (uint32)info->ssid_len;
|
|
}
|
|
}
|
|
|
|
return err;
|
|
}
|
|
#endif /* LINUX_VERSION >= VERSION(3,4,0) || WL_COMPAT_WIRELESS */
|
|
|
|
static s32
|
|
wl_cfg80211_parse_ies(const u8 *ptr, u32 len, struct parsed_ies *ies)
|
|
{
|
|
s32 err = BCME_OK;
|
|
|
|
bzero(ies, sizeof(struct parsed_ies));
|
|
|
|
/* find the WPSIE */
|
|
if ((ies->wps_ie = wl_cfgp2p_find_wpsie(ptr, len)) != NULL) {
|
|
WL_DBG(("WPSIE in beacon \n"));
|
|
ies->wps_ie_len = ies->wps_ie->length + WPA_RSN_IE_TAG_FIXED_LEN;
|
|
} else {
|
|
WL_ERR(("No WPSIE in beacon \n"));
|
|
}
|
|
|
|
/* find the RSN_IE */
|
|
if ((ies->wpa2_ie = bcm_parse_tlvs(ptr, len,
|
|
DOT11_MNG_RSN_ID)) != NULL) {
|
|
WL_DBG((" WPA2 IE found\n"));
|
|
ies->wpa2_ie_len = ies->wpa2_ie->len;
|
|
}
|
|
|
|
/* find the FILS_IND_IE */
|
|
if ((ies->fils_ind_ie = bcm_parse_tlvs(ptr, len,
|
|
DOT11_MNG_FILS_IND_ID)) != NULL) {
|
|
WL_DBG((" FILS IND IE found\n"));
|
|
ies->fils_ind_ie_len = ies->fils_ind_ie->len;
|
|
}
|
|
|
|
/* find the WPA_IE */
|
|
if ((ies->wpa_ie = wl_cfgp2p_find_wpaie(ptr, len)) != NULL) {
|
|
WL_DBG((" WPA found\n"));
|
|
ies->wpa_ie_len = ies->wpa_ie->length;
|
|
}
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
static s32
|
|
wl_cfg80211_set_ap_role(
|
|
struct bcm_cfg80211 *cfg,
|
|
struct net_device *dev)
|
|
{
|
|
s32 err = BCME_OK;
|
|
s32 infra = 1;
|
|
s32 ap = 0;
|
|
s32 pm;
|
|
s32 bssidx;
|
|
s32 apsta = 0;
|
|
bool legacy_chip;
|
|
|
|
legacy_chip = wl_legacy_chip_check(cfg);
|
|
|
|
if ((bssidx = wl_get_bssidx_by_wdev(cfg, dev->ieee80211_ptr)) < 0) {
|
|
WL_ERR(("Find p2p index from wdev(%p) failed\n", dev->ieee80211_ptr));
|
|
return -EINVAL;
|
|
}
|
|
|
|
WL_INFORM_MEM(("[%s] Bringup SoftAP on bssidx:%d \n", dev->name, bssidx));
|
|
|
|
if (bssidx != 0 || !legacy_chip) {
|
|
if ((err = wl_cfg80211_add_del_bss(cfg, dev, bssidx,
|
|
WL_IF_TYPE_AP, 0, NULL)) < 0) {
|
|
WL_ERR(("wl add_del_bss returned error:%d\n", err));
|
|
return err;
|
|
}
|
|
}
|
|
|
|
/*
|
|
* For older chips, "bss" iovar does not support
|
|
* bsscfg role change/upgradation, and still
|
|
* return BCME_OK on attempt
|
|
* Hence, below traditional way to handle the same
|
|
*/
|
|
|
|
if ((err = wldev_ioctl_get(dev,
|
|
WLC_GET_AP, &ap, sizeof(s32))) < 0) {
|
|
WL_ERR(("Getting AP mode failed %d \n", err));
|
|
return err;
|
|
}
|
|
|
|
if (!ap) {
|
|
/* AP mode switch not supported. Try setting up AP explicitly */
|
|
err = wldev_iovar_getint(dev, "apsta", (s32 *)&apsta);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("Could not get apsta %d\n", err));
|
|
return err;
|
|
}
|
|
if (apsta == 0) {
|
|
/* If apsta is not set, set it */
|
|
|
|
/* Check for any connected interfaces before wl down */
|
|
if (wl_get_drv_status_all(cfg, CONNECTED) > 0) {
|
|
WL_ERR(("Concurrent i/f operational. can't do wl down"));
|
|
return BCME_ERROR;
|
|
}
|
|
err = wldev_ioctl_set(dev, WLC_DOWN, &ap, sizeof(s32));
|
|
if (err < 0) {
|
|
WL_ERR(("WLC_DOWN error %d\n", err));
|
|
return err;
|
|
}
|
|
err = wldev_iovar_setint(dev, "apsta", 0);
|
|
if (err < 0) {
|
|
WL_ERR(("wl apsta 0 error %d\n", err));
|
|
return err;
|
|
}
|
|
ap = 1;
|
|
if ((err = wldev_ioctl_set(dev,
|
|
WLC_SET_AP, &ap, sizeof(s32))) < 0) {
|
|
WL_ERR(("setting AP mode failed %d \n", err));
|
|
return err;
|
|
}
|
|
}
|
|
} else if (bssidx == 0 && legacy_chip) {
|
|
err = wldev_ioctl_set(dev, WLC_DOWN, &ap, sizeof(s32));
|
|
if (err < 0) {
|
|
WL_ERR(("WLC_DOWN error %d\n", err));
|
|
return err;
|
|
}
|
|
err = wldev_iovar_setint(dev, "apsta", 0);
|
|
if (err < 0) {
|
|
WL_ERR(("wl apsta 0 error %d\n", err));
|
|
return err;
|
|
}
|
|
ap = 1;
|
|
if ((err = wldev_ioctl_set(dev, WLC_SET_AP, &ap, sizeof(s32))) < 0) {
|
|
WL_ERR(("setting AP mode failed %d \n", err));
|
|
return err;
|
|
}
|
|
}
|
|
|
|
if (bssidx == 0) {
|
|
pm = 0;
|
|
if ((err = wldev_ioctl_set(dev, WLC_SET_PM, &pm, sizeof(pm))) != 0) {
|
|
WL_ERR(("wl PM 0 returned error:%d\n", err));
|
|
/* Ignore error, if any */
|
|
err = BCME_OK;
|
|
}
|
|
err = wldev_ioctl_set(dev, WLC_SET_INFRA, &infra, sizeof(s32));
|
|
if (err < 0) {
|
|
WL_ERR(("SET INFRA error %d\n", err));
|
|
return err;
|
|
}
|
|
}
|
|
|
|
/* On success, mark AP creation in progress. */
|
|
wl_set_drv_status(cfg, AP_CREATING, dev);
|
|
return 0;
|
|
}
|
|
|
|
/* In RSDB downgrade cases, the link up event can get delayed upto 7-8 secs */
|
|
#define MAX_AP_LINK_WAIT_TIME 10000
|
|
static s32
|
|
wl_cfg80211_bcn_bringup_ap(
|
|
struct net_device *dev,
|
|
struct parsed_ies *ies,
|
|
u32 dev_role, s32 bssidx)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(dev);
|
|
struct wl_join_params join_params;
|
|
bool is_bssup = false;
|
|
s32 infra = 1;
|
|
s32 join_params_size = 0;
|
|
s32 ap = 1;
|
|
s32 wsec;
|
|
#ifdef DISABLE_11H_SOFTAP
|
|
s32 spect = 0;
|
|
#endif /* DISABLE_11H_SOFTAP */
|
|
#ifdef SOFTAP_UAPSD_OFF
|
|
uint32 wme_apsd = 0;
|
|
#endif /* SOFTAP_UAPSD_OFF */
|
|
s32 err = BCME_OK;
|
|
s32 is_rsdb_supported = BCME_ERROR;
|
|
long timeout;
|
|
dhd_pub_t *dhdp = (dhd_pub_t *)(cfg->pub);
|
|
char sec[32];
|
|
|
|
is_rsdb_supported = DHD_OPMODE_SUPPORTED(cfg->pub, DHD_FLAG_RSDB_MODE);
|
|
if (is_rsdb_supported < 0)
|
|
return (-ENODEV);
|
|
|
|
WL_DBG(("Enter dev_role:%d bssidx:%d ifname:%s\n", dev_role, bssidx, dev->name));
|
|
|
|
/* Common code for SoftAP and P2P GO */
|
|
wl_clr_drv_status(cfg, AP_CREATED, dev);
|
|
|
|
/* Make sure INFRA is set for AP/GO */
|
|
err = wldev_ioctl_set(dev, WLC_SET_INFRA, &infra, sizeof(s32));
|
|
if (err < 0) {
|
|
WL_ERR(("SET INFRA error %d\n", err));
|
|
goto exit;
|
|
}
|
|
|
|
/* Do abort scan before creating GO */
|
|
wl_cfg80211_scan_abort(cfg);
|
|
|
|
if (dev_role == NL80211_IFTYPE_P2P_GO) {
|
|
wl_ext_get_sec(dev, 0, sec, sizeof(sec));
|
|
WL_MSG(dev->name, "Creating GO with sec=%s\n", sec);
|
|
is_bssup = wl_cfg80211_bss_isup(dev, bssidx);
|
|
if (!is_bssup && (ies->wpa2_ie != NULL)) {
|
|
|
|
err = wldev_iovar_setbuf_bsscfg(dev, "ssid", &cfg->p2p->ssid,
|
|
sizeof(cfg->p2p->ssid), cfg->ioctl_buf, WLC_IOCTL_MAXLEN,
|
|
bssidx, &cfg->ioctl_buf_sync);
|
|
if (err < 0) {
|
|
WL_ERR(("GO SSID setting error %d\n", err));
|
|
goto exit;
|
|
}
|
|
|
|
if ((err = wl_cfg80211_bss_up(cfg, dev, bssidx, 1)) < 0) {
|
|
WL_ERR(("GO Bring up error %d\n", err));
|
|
goto exit;
|
|
}
|
|
} else
|
|
WL_DBG(("Bss is already up\n"));
|
|
} else if (dev_role == NL80211_IFTYPE_AP) {
|
|
|
|
// if (!wl_get_drv_status(cfg, AP_CREATING, dev)) {
|
|
/* Make sure fw is in proper state */
|
|
err = wl_cfg80211_set_ap_role(cfg, dev);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("set ap role failed!\n"));
|
|
goto exit;
|
|
}
|
|
// }
|
|
|
|
/* Device role SoftAP */
|
|
WL_DBG(("Creating AP bssidx:%d dev_role:%d\n", bssidx, dev_role));
|
|
/* Clear the status bit after use */
|
|
wl_clr_drv_status(cfg, AP_CREATING, dev);
|
|
|
|
#ifdef DISABLE_11H_SOFTAP
|
|
if (is_rsdb_supported == 0) {
|
|
err = wldev_ioctl_set(dev, WLC_DOWN, &ap, sizeof(s32));
|
|
if (err < 0) {
|
|
WL_ERR(("WLC_DOWN error %d\n", err));
|
|
goto exit;
|
|
}
|
|
}
|
|
err = wldev_ioctl_set(dev, WLC_SET_SPECT_MANAGMENT,
|
|
&spect, sizeof(s32));
|
|
if (err < 0) {
|
|
WL_ERR(("SET SPECT_MANAGMENT error %d\n", err));
|
|
goto exit;
|
|
}
|
|
#endif /* DISABLE_11H_SOFTAP */
|
|
|
|
#ifdef WL_DISABLE_HE_SOFTAP
|
|
err = wl_cfg80211_set_he_mode(dev, cfg, bssidx, WL_IF_TYPE_AP, FALSE);
|
|
if (err < 0) {
|
|
WL_ERR(("failed to set he features, error=%d\n", err));
|
|
}
|
|
#endif /* WL_DISABLE_HE_SOFTAP */
|
|
|
|
#ifdef SOFTAP_UAPSD_OFF
|
|
err = wldev_iovar_setbuf_bsscfg(dev, "wme_apsd", &wme_apsd, sizeof(wme_apsd),
|
|
cfg->ioctl_buf, WLC_IOCTL_SMLEN, bssidx, &cfg->ioctl_buf_sync);
|
|
if (err < 0) {
|
|
WL_ERR(("failed to disable uapsd, error=%d\n", err));
|
|
}
|
|
#endif /* SOFTAP_UAPSD_OFF */
|
|
|
|
err = wldev_ioctl_set(dev, WLC_UP, &ap, sizeof(s32));
|
|
if (unlikely(err)) {
|
|
WL_ERR(("WLC_UP error (%d)\n", err));
|
|
goto exit;
|
|
}
|
|
|
|
#ifdef MFP
|
|
if (cfg->bip_pos) {
|
|
err = wldev_iovar_setbuf_bsscfg(dev, "bip",
|
|
(const void *)(cfg->bip_pos), WPA_SUITE_LEN, cfg->ioctl_buf,
|
|
WLC_IOCTL_SMLEN, bssidx, &cfg->ioctl_buf_sync);
|
|
if (err < 0) {
|
|
WL_ERR(("bip set error %d\n", err));
|
|
{
|
|
goto exit;
|
|
}
|
|
}
|
|
}
|
|
#endif /* MFP */
|
|
|
|
err = wldev_iovar_getint(dev, "wsec", (s32 *)&wsec);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("Could not get wsec %d\n", err));
|
|
goto exit;
|
|
}
|
|
if (dhdp->conf->chip == BCM43430_CHIP_ID && bssidx > 0 &&
|
|
(wsec & (TKIP_ENABLED|AES_ENABLED))) {
|
|
wsec |= WSEC_SWFLAG; // terence 20180628: fix me, this is a workaround
|
|
err = wldev_iovar_setint_bsscfg(dev, "wsec", wsec, bssidx);
|
|
if (err < 0) {
|
|
WL_ERR(("wsec error %d\n", err));
|
|
goto exit;
|
|
}
|
|
}
|
|
if ((wsec == WEP_ENABLED) && cfg->wep_key.len) {
|
|
WL_DBG(("Applying buffered WEP KEY \n"));
|
|
err = wldev_iovar_setbuf_bsscfg(dev, "wsec_key", &cfg->wep_key,
|
|
sizeof(struct wl_wsec_key), cfg->ioctl_buf,
|
|
WLC_IOCTL_MAXLEN, bssidx, &cfg->ioctl_buf_sync);
|
|
/* clear the key after use */
|
|
bzero(&cfg->wep_key, sizeof(struct wl_wsec_key));
|
|
if (unlikely(err)) {
|
|
WL_ERR(("WLC_SET_KEY error (%d)\n", err));
|
|
goto exit;
|
|
}
|
|
}
|
|
|
|
#ifdef MFP
|
|
if (cfg->mfp_mode) {
|
|
/* This needs to go after wsec otherwise the wsec command will
|
|
* overwrite the values set by MFP
|
|
*/
|
|
err = wldev_iovar_setint_bsscfg(dev, "mfp", cfg->mfp_mode, bssidx);
|
|
if (err < 0) {
|
|
WL_ERR(("MFP Setting failed. ret = %d \n", err));
|
|
/* If fw doesn't support mfp, Ignore the error */
|
|
if (err != BCME_UNSUPPORTED) {
|
|
goto exit;
|
|
}
|
|
}
|
|
}
|
|
#endif /* MFP */
|
|
|
|
bzero(&join_params, sizeof(join_params));
|
|
/* join parameters starts with ssid */
|
|
join_params_size = sizeof(join_params.ssid);
|
|
join_params.ssid.SSID_len = MIN(cfg->hostapd_ssid.SSID_len,
|
|
(uint32)DOT11_MAX_SSID_LEN);
|
|
memcpy(join_params.ssid.SSID, cfg->hostapd_ssid.SSID,
|
|
join_params.ssid.SSID_len);
|
|
join_params.ssid.SSID_len = htod32(join_params.ssid.SSID_len);
|
|
|
|
wl_ext_get_sec(dev, 0, sec, sizeof(sec));
|
|
WL_MSG(dev->name, "Creating AP with sec=%s\n", sec);
|
|
/* create softap */
|
|
if ((err = wldev_ioctl_set(dev, WLC_SET_SSID, &join_params,
|
|
join_params_size)) != 0) {
|
|
WL_ERR(("SoftAP/GO set ssid failed! \n"));
|
|
goto exit;
|
|
} else {
|
|
WL_DBG((" SoftAP SSID \"%s\" \n", join_params.ssid.SSID));
|
|
}
|
|
|
|
if (bssidx != 0) {
|
|
/* AP on Virtual Interface */
|
|
if ((err = wl_cfg80211_bss_up(cfg, dev, bssidx, 1)) < 0) {
|
|
WL_ERR(("AP Bring up error %d\n", err));
|
|
goto exit;
|
|
}
|
|
}
|
|
|
|
} else {
|
|
WL_ERR(("Wrong interface type %d\n", dev_role));
|
|
goto exit;
|
|
}
|
|
|
|
/* Wait for Linkup event to mark successful AP/GO bring up */
|
|
timeout = wait_event_interruptible_timeout(cfg->netif_change_event,
|
|
wl_get_drv_status(cfg, AP_CREATED, dev), msecs_to_jiffies(MAX_AP_LINK_WAIT_TIME));
|
|
if (timeout <= 0 || !wl_get_drv_status(cfg, AP_CREATED, dev)) {
|
|
WL_ERR(("Link up didn't come for AP interface. AP/GO creation failed! \n"));
|
|
if (timeout == -ERESTARTSYS) {
|
|
WL_ERR(("waitqueue was interrupted by a signal, returns -ERESTARTSYS\n"));
|
|
err = -ERESTARTSYS;
|
|
goto exit;
|
|
}
|
|
if (dhd_query_bus_erros(dhdp)) {
|
|
err = -ENODEV;
|
|
goto exit;
|
|
}
|
|
dhdp->iface_op_failed = TRUE;
|
|
#if defined(DHD_DEBUG) && defined(DHD_FW_COREDUMP)
|
|
if (dhdp->memdump_enabled) {
|
|
dhdp->memdump_type = DUMP_TYPE_AP_LINKUP_FAILURE;
|
|
dhd_bus_mem_dump(dhdp);
|
|
}
|
|
#endif /* DHD_DEBUG && DHD_FW_COREDUMP */
|
|
err = -ENODEV;
|
|
goto exit;
|
|
}
|
|
SUPP_LOG(("AP/GO Link up\n"));
|
|
|
|
exit:
|
|
if (cfg->wep_key.len) {
|
|
bzero(&cfg->wep_key, sizeof(struct wl_wsec_key));
|
|
}
|
|
|
|
#ifdef MFP
|
|
if (cfg->mfp_mode) {
|
|
cfg->mfp_mode = 0;
|
|
}
|
|
|
|
if (cfg->bip_pos) {
|
|
cfg->bip_pos = NULL;
|
|
}
|
|
#endif /* MFP */
|
|
|
|
if (err) {
|
|
SUPP_LOG(("AP/GO bring up fail. err:%d\n", err));
|
|
}
|
|
return err;
|
|
}
|
|
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 4, 0)) || defined(WL_COMPAT_WIRELESS)
|
|
s32
|
|
wl_cfg80211_parse_ap_ies(
|
|
struct net_device *dev,
|
|
struct cfg80211_beacon_data *info,
|
|
struct parsed_ies *ies)
|
|
{
|
|
struct parsed_ies prb_ies;
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(dev);
|
|
dhd_pub_t *dhd = (dhd_pub_t *)(cfg->pub);
|
|
const u8 *vndr = NULL;
|
|
u32 vndr_ie_len = 0;
|
|
s32 err = BCME_OK;
|
|
|
|
/* Parse Beacon IEs */
|
|
if (wl_cfg80211_parse_ies((const u8 *)info->tail,
|
|
info->tail_len, ies) < 0) {
|
|
WL_ERR(("Beacon get IEs failed \n"));
|
|
err = -EINVAL;
|
|
goto fail;
|
|
}
|
|
|
|
vndr = (const u8 *)info->proberesp_ies;
|
|
vndr_ie_len = (uint32)info->proberesp_ies_len;
|
|
|
|
if (dhd->op_mode & DHD_FLAG_HOSTAP_MODE) {
|
|
/* SoftAP mode */
|
|
const struct ieee80211_mgmt *mgmt;
|
|
mgmt = (const struct ieee80211_mgmt *)info->probe_resp;
|
|
if (mgmt != NULL) {
|
|
vndr = (const u8 *)&mgmt->u.probe_resp.variable;
|
|
vndr_ie_len = (uint32)(info->probe_resp_len -
|
|
offsetof(const struct ieee80211_mgmt, u.probe_resp.variable));
|
|
}
|
|
}
|
|
/* Parse Probe Response IEs */
|
|
if (wl_cfg80211_parse_ies((const u8 *)vndr, vndr_ie_len, &prb_ies) < 0) {
|
|
WL_ERR(("PROBE RESP get IEs failed \n"));
|
|
err = -EINVAL;
|
|
}
|
|
fail:
|
|
|
|
return err;
|
|
}
|
|
|
|
s32
|
|
wl_cfg80211_set_ies(
|
|
struct net_device *dev,
|
|
struct cfg80211_beacon_data *info,
|
|
s32 bssidx)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(dev);
|
|
dhd_pub_t *dhd = (dhd_pub_t *)(cfg->pub);
|
|
const u8 *vndr = NULL;
|
|
u32 vndr_ie_len = 0;
|
|
s32 err = BCME_OK;
|
|
|
|
/* Set Beacon IEs to FW */
|
|
if ((err = wl_cfg80211_set_mgmt_vndr_ies(cfg, ndev_to_cfgdev(dev), bssidx,
|
|
VNDR_IE_BEACON_FLAG, (const u8 *)info->tail,
|
|
info->tail_len)) < 0) {
|
|
WL_ERR(("Set Beacon IE Failed \n"));
|
|
} else {
|
|
WL_DBG(("Applied Vndr IEs for Beacon \n"));
|
|
}
|
|
|
|
vndr = (const u8 *)info->proberesp_ies;
|
|
vndr_ie_len = (uint32)info->proberesp_ies_len;
|
|
|
|
if (dhd->op_mode & DHD_FLAG_HOSTAP_MODE) {
|
|
/* SoftAP mode */
|
|
const struct ieee80211_mgmt *mgmt;
|
|
mgmt = (const struct ieee80211_mgmt *)info->probe_resp;
|
|
if (mgmt != NULL) {
|
|
vndr = (const u8 *)&mgmt->u.probe_resp.variable;
|
|
vndr_ie_len = (uint32)(info->probe_resp_len -
|
|
offsetof(struct ieee80211_mgmt, u.probe_resp.variable));
|
|
}
|
|
}
|
|
|
|
/* Set Probe Response IEs to FW */
|
|
if ((err = wl_cfg80211_set_mgmt_vndr_ies(cfg, ndev_to_cfgdev(dev), bssidx,
|
|
VNDR_IE_PRBRSP_FLAG, vndr, vndr_ie_len)) < 0) {
|
|
WL_ERR(("Set Probe Resp IE Failed \n"));
|
|
} else {
|
|
WL_DBG(("Applied Vndr IEs for Probe Resp \n"));
|
|
}
|
|
|
|
return err;
|
|
}
|
|
#endif /* LINUX_VERSION >= VERSION(3,4,0) || WL_COMPAT_WIRELESS */
|
|
|
|
static s32 wl_cfg80211_hostapd_sec(
|
|
struct net_device *dev,
|
|
struct parsed_ies *ies,
|
|
s32 bssidx)
|
|
{
|
|
bool update_bss = 0;
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(dev);
|
|
wl_cfgbss_t *bss = wl_get_cfgbss_by_wdev(cfg, dev->ieee80211_ptr);
|
|
|
|
if (!bss) {
|
|
WL_ERR(("cfgbss is NULL \n"));
|
|
return -EINVAL;
|
|
}
|
|
|
|
if (ies->wps_ie) {
|
|
if (bss->wps_ie &&
|
|
memcmp(bss->wps_ie, ies->wps_ie, ies->wps_ie_len)) {
|
|
WL_DBG((" WPS IE is changed\n"));
|
|
MFREE(cfg->osh, bss->wps_ie, bss->wps_ie[1] + 2);
|
|
bss->wps_ie = MALLOCZ(cfg->osh, ies->wps_ie_len);
|
|
if (bss->wps_ie) {
|
|
memcpy(bss->wps_ie, ies->wps_ie, ies->wps_ie_len);
|
|
}
|
|
} else if (bss->wps_ie == NULL) {
|
|
WL_DBG((" WPS IE is added\n"));
|
|
bss->wps_ie = MALLOCZ(cfg->osh, ies->wps_ie_len);
|
|
if (bss->wps_ie) {
|
|
memcpy(bss->wps_ie, ies->wps_ie, ies->wps_ie_len);
|
|
}
|
|
}
|
|
|
|
#if defined(SUPPORT_SOFTAP_WPAWPA2_MIXED)
|
|
if (ies->wpa_ie != NULL && ies->wpa2_ie != NULL) {
|
|
WL_ERR(("update bss - wpa_ie and wpa2_ie is not null\n"));
|
|
if (!bss->security_mode) {
|
|
/* change from open mode to security mode */
|
|
update_bss = true;
|
|
bss->wpa_ie = MALLOCZ(cfg->osh,
|
|
ies->wpa_ie->length + WPA_RSN_IE_TAG_FIXED_LEN);
|
|
if (bss->wpa_ie) {
|
|
memcpy(bss->wpa_ie, ies->wpa_ie,
|
|
ies->wpa_ie->length + WPA_RSN_IE_TAG_FIXED_LEN);
|
|
}
|
|
bss->rsn_ie = MALLOCZ(cfg->osh,
|
|
ies->wpa2_ie->len + WPA_RSN_IE_TAG_FIXED_LEN);
|
|
if (bss->rsn_ie) {
|
|
memcpy(bss->rsn_ie, ies->wpa2_ie,
|
|
ies->wpa2_ie->len + WPA_RSN_IE_TAG_FIXED_LEN);
|
|
}
|
|
} else {
|
|
/* change from (WPA or WPA2 or WPA/WPA2) to WPA/WPA2 mixed mode */
|
|
if (bss->wpa_ie) {
|
|
if (memcmp(bss->wpa_ie,
|
|
ies->wpa_ie, ies->wpa_ie->length +
|
|
WPA_RSN_IE_TAG_FIXED_LEN)) {
|
|
MFREE(cfg->osh, bss->wpa_ie,
|
|
bss->wpa_ie[1] + WPA_RSN_IE_TAG_FIXED_LEN);
|
|
update_bss = true;
|
|
bss->wpa_ie = MALLOCZ(cfg->osh,
|
|
ies->wpa_ie->length
|
|
+ WPA_RSN_IE_TAG_FIXED_LEN);
|
|
if (bss->wpa_ie) {
|
|
memcpy(bss->wpa_ie, ies->wpa_ie,
|
|
ies->wpa_ie->length
|
|
+ WPA_RSN_IE_TAG_FIXED_LEN);
|
|
}
|
|
}
|
|
}
|
|
else {
|
|
update_bss = true;
|
|
bss->wpa_ie = MALLOCZ(cfg->osh,
|
|
ies->wpa_ie->length + WPA_RSN_IE_TAG_FIXED_LEN);
|
|
if (bss->wpa_ie) {
|
|
memcpy(bss->wpa_ie, ies->wpa_ie,
|
|
ies->wpa_ie->length
|
|
+ WPA_RSN_IE_TAG_FIXED_LEN);
|
|
}
|
|
}
|
|
if (bss->rsn_ie) {
|
|
if (memcmp(bss->rsn_ie,
|
|
ies->wpa2_ie,
|
|
ies->wpa2_ie->len + WPA_RSN_IE_TAG_FIXED_LEN)) {
|
|
update_bss = true;
|
|
MFREE(cfg->osh, bss->rsn_ie,
|
|
bss->rsn_ie[1] + WPA_RSN_IE_TAG_FIXED_LEN);
|
|
bss->rsn_ie = MALLOCZ(cfg->osh,
|
|
ies->wpa2_ie->len
|
|
+ WPA_RSN_IE_TAG_FIXED_LEN);
|
|
if (bss->rsn_ie) {
|
|
memcpy(bss->rsn_ie, ies->wpa2_ie,
|
|
ies->wpa2_ie->len
|
|
+ WPA_RSN_IE_TAG_FIXED_LEN);
|
|
}
|
|
}
|
|
}
|
|
else {
|
|
update_bss = true;
|
|
bss->rsn_ie = MALLOCZ(cfg->osh,
|
|
ies->wpa2_ie->len
|
|
+ WPA_RSN_IE_TAG_FIXED_LEN);
|
|
if (bss->rsn_ie) {
|
|
memcpy(bss->rsn_ie, ies->wpa2_ie,
|
|
ies->wpa2_ie->len
|
|
+ WPA_RSN_IE_TAG_FIXED_LEN);
|
|
}
|
|
}
|
|
}
|
|
WL_ERR(("update_bss=%d\n", update_bss));
|
|
if (update_bss) {
|
|
bss->security_mode = true;
|
|
wl_cfg80211_bss_up(cfg, dev, bssidx, 0);
|
|
if (wl_validate_wpaie_wpa2ie(dev, ies->wpa_ie,
|
|
ies->wpa2_ie, bssidx) < 0) {
|
|
return BCME_ERROR;
|
|
}
|
|
wl_cfg80211_bss_up(cfg, dev, bssidx, 1);
|
|
}
|
|
|
|
}
|
|
else
|
|
#endif /* SUPPORT_SOFTAP_WPAWPA2_MIXED */
|
|
if ((ies->wpa_ie != NULL || ies->wpa2_ie != NULL)) {
|
|
if (!bss->security_mode) {
|
|
/* change from open mode to security mode */
|
|
update_bss = true;
|
|
if (ies->wpa_ie != NULL) {
|
|
bss->wpa_ie = MALLOCZ(cfg->osh,
|
|
ies->wpa_ie->length + WPA_RSN_IE_TAG_FIXED_LEN);
|
|
if (bss->wpa_ie) {
|
|
memcpy(bss->wpa_ie,
|
|
ies->wpa_ie,
|
|
ies->wpa_ie->length
|
|
+ WPA_RSN_IE_TAG_FIXED_LEN);
|
|
}
|
|
} else {
|
|
bss->rsn_ie = MALLOCZ(cfg->osh,
|
|
ies->wpa2_ie->len + WPA_RSN_IE_TAG_FIXED_LEN);
|
|
if (bss->rsn_ie) {
|
|
memcpy(bss->rsn_ie,
|
|
ies->wpa2_ie,
|
|
ies->wpa2_ie->len
|
|
+ WPA_RSN_IE_TAG_FIXED_LEN);
|
|
}
|
|
}
|
|
} else if (bss->wpa_ie) {
|
|
/* change from WPA2 mode to WPA mode */
|
|
if (ies->wpa_ie != NULL) {
|
|
update_bss = true;
|
|
MFREE(cfg->osh, bss->rsn_ie,
|
|
bss->rsn_ie[1] + WPA_RSN_IE_TAG_FIXED_LEN);
|
|
bss->rsn_ie = NULL;
|
|
bss->wpa_ie = MALLOCZ(cfg->osh,
|
|
ies->wpa_ie->length + WPA_RSN_IE_TAG_FIXED_LEN);
|
|
if (bss->wpa_ie) {
|
|
memcpy(bss->wpa_ie,
|
|
ies->wpa_ie,
|
|
ies->wpa_ie->length
|
|
+ WPA_RSN_IE_TAG_FIXED_LEN);
|
|
}
|
|
} else if (memcmp(bss->rsn_ie,
|
|
ies->wpa2_ie, ies->wpa2_ie->len
|
|
+ WPA_RSN_IE_TAG_FIXED_LEN)) {
|
|
update_bss = true;
|
|
MFREE(cfg->osh, bss->rsn_ie,
|
|
bss->rsn_ie[1] + WPA_RSN_IE_TAG_FIXED_LEN);
|
|
bss->rsn_ie = MALLOCZ(cfg->osh,
|
|
ies->wpa2_ie->len + WPA_RSN_IE_TAG_FIXED_LEN);
|
|
if (bss->rsn_ie) {
|
|
memcpy(bss->rsn_ie,
|
|
ies->wpa2_ie,
|
|
ies->wpa2_ie->len
|
|
+ WPA_RSN_IE_TAG_FIXED_LEN);
|
|
}
|
|
bss->wpa_ie = NULL;
|
|
}
|
|
}
|
|
if (update_bss) {
|
|
bss->security_mode = true;
|
|
wl_cfg80211_bss_up(cfg, dev, bssidx, 0);
|
|
if (wl_validate_wpa2ie(dev, ies->wpa2_ie, bssidx) < 0 ||
|
|
wl_validate_wpaie(dev, ies->wpa_ie, bssidx) < 0) {
|
|
return BCME_ERROR;
|
|
}
|
|
wl_cfg80211_bss_up(cfg, dev, bssidx, 1);
|
|
}
|
|
}
|
|
} else {
|
|
WL_ERR(("No WPSIE in beacon \n"));
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
static s32
|
|
#if defined(WL_SUPPORT_BACKPORTED_KPATCHES) || (LINUX_VERSION_CODE >= KERNEL_VERSION(3, \
|
|
2, 0))
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 19, 0))
|
|
wl_cfg80211_del_station(
|
|
struct wiphy *wiphy, struct net_device *ndev,
|
|
struct station_del_parameters *params)
|
|
#elif (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 16, 0))
|
|
wl_cfg80211_del_station(
|
|
struct wiphy *wiphy,
|
|
struct net_device *ndev,
|
|
const u8* mac_addr)
|
|
#else
|
|
wl_cfg80211_del_station(
|
|
struct wiphy *wiphy,
|
|
struct net_device *ndev,
|
|
u8* mac_addr)
|
|
#endif /* (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 19, 0)) */
|
|
{
|
|
struct net_device *dev;
|
|
struct bcm_cfg80211 *cfg = wiphy_priv(wiphy);
|
|
scb_val_t scb_val;
|
|
s8 eabuf[ETHER_ADDR_STR_LEN];
|
|
int err;
|
|
char mac_buf[MAX_NUM_OF_ASSOCIATED_DEV *
|
|
sizeof(struct ether_addr) + sizeof(uint)] = {0};
|
|
struct maclist *assoc_maclist = (struct maclist *)mac_buf;
|
|
int num_associated = 0;
|
|
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 19, 0))
|
|
const u8 *mac_addr = params->mac;
|
|
#ifdef CUSTOM_BLOCK_DEAUTH_AT_EAP_FAILURE
|
|
u16 rc = params->reason_code;
|
|
#endif /* CUSTOM_BLOCK_DEAUTH_AT_EAP_FAILURE */
|
|
#endif /* (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 19, 0)) */
|
|
|
|
WL_DBG(("Entry\n"));
|
|
if (mac_addr == NULL) {
|
|
WL_DBG(("mac_addr is NULL ignore it\n"));
|
|
return 0;
|
|
}
|
|
|
|
dev = ndev_to_wlc_ndev(ndev, cfg);
|
|
|
|
if (p2p_is_on(cfg)) {
|
|
/* Suspend P2P discovery search-listen to prevent it from changing the
|
|
* channel.
|
|
*/
|
|
if ((wl_cfgp2p_discover_enable_search(cfg, false)) < 0) {
|
|
WL_ERR(("Can not disable discovery mode\n"));
|
|
return -EFAULT;
|
|
}
|
|
}
|
|
err = wl_cfg80211_check_in4way(cfg, ndev, DONT_DELETE_GC_AFTER_WPS,
|
|
WL_EXT_STATUS_DELETE_STA, (void *)mac_addr);
|
|
if (err) {
|
|
return 0;
|
|
}
|
|
|
|
assoc_maclist->count = MAX_NUM_OF_ASSOCIATED_DEV;
|
|
err = wldev_ioctl_get(ndev, WLC_GET_ASSOCLIST,
|
|
assoc_maclist, sizeof(mac_buf));
|
|
if (err < 0)
|
|
WL_ERR(("WLC_GET_ASSOCLIST error %d\n", err));
|
|
else
|
|
num_associated = assoc_maclist->count;
|
|
|
|
memcpy(scb_val.ea.octet, mac_addr, ETHER_ADDR_LEN);
|
|
#ifdef CUSTOM_BLOCK_DEAUTH_AT_EAP_FAILURE
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 19, 0))
|
|
if (rc == DOT11_RC_8021X_AUTH_FAIL) {
|
|
WL_ERR(("deauth will be sent at F/W\n"));
|
|
scb_val.val = DOT11_RC_8021X_AUTH_FAIL;
|
|
} else {
|
|
#endif /* (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 19, 0)) */
|
|
#endif /* CUSTOM_BLOCK_DEAUTH_AT_EAP_FAILURE */
|
|
|
|
#ifdef WL_WPS_SYNC
|
|
if (wl_wps_session_update(ndev,
|
|
WPS_STATE_DISCONNECT_CLIENT, mac_addr) == BCME_UNSUPPORTED) {
|
|
/* Ignore disconnect command from upper layer */
|
|
WL_INFORM_MEM(("[WPS] Ignore client disconnect.\n"));
|
|
} else
|
|
#endif /* WL_WPS_SYNC */
|
|
{
|
|
scb_val.val = DOT11_RC_DEAUTH_LEAVING;
|
|
WL_MSG(dev->name, "Disconnect STA : " MACDBG " scb_val.val %d\n",
|
|
MAC2STRDBG(bcm_ether_ntoa((const struct ether_addr *)mac_addr,
|
|
eabuf)), scb_val.val);
|
|
/* need to guarantee EAP-Failure send out before deauth */
|
|
dhd_wait_pend8021x(dev);
|
|
err = wldev_ioctl_set(dev, WLC_SCB_DEAUTHENTICATE_FOR_REASON, &scb_val,
|
|
sizeof(scb_val_t));
|
|
if (err < 0) {
|
|
WL_ERR(("WLC_SCB_DEAUTHENTICATE_FOR_REASON err %d\n", err));
|
|
}
|
|
}
|
|
#ifdef CUSTOM_BLOCK_DEAUTH_AT_EAP_FAILURE
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 19, 0))
|
|
}
|
|
#endif /* (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 19, 0)) */
|
|
#endif /* CUSTOM_BLOCK_DEAUTH_AT_EAP_FAILURE */
|
|
|
|
if (num_associated > 0 && ETHER_ISBCAST(mac_addr))
|
|
wl_delay(400);
|
|
|
|
return 0;
|
|
}
|
|
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 16, 0))
|
|
static s32
|
|
wl_cfg80211_change_station(
|
|
struct wiphy *wiphy,
|
|
struct net_device *dev,
|
|
const u8 *mac,
|
|
struct station_parameters *params)
|
|
#else
|
|
static s32
|
|
wl_cfg80211_change_station(
|
|
struct wiphy *wiphy,
|
|
struct net_device *dev,
|
|
u8 *mac,
|
|
struct station_parameters *params)
|
|
#endif // endif
|
|
{
|
|
int err = BCME_OK;
|
|
struct bcm_cfg80211 *cfg = wiphy_priv(wiphy);
|
|
struct net_device *ndev = ndev_to_wlc_ndev(dev, cfg);
|
|
|
|
WL_DBG(("SCB_AUTHORIZE mac_addr:"MACDBG" sta_flags_mask:0x%x "
|
|
"sta_flags_set:0x%x iface:%s \n", MAC2STRDBG(mac),
|
|
params->sta_flags_mask, params->sta_flags_set, ndev->name));
|
|
|
|
if ((wl_get_mode_by_netdev(cfg, dev) == WL_MODE_BSS) &&
|
|
!(wl_get_drv_status(cfg, CONNECTED, dev))) {
|
|
/* Return error indicating not in connected state */
|
|
WL_ERR(("Ignore SCB_AUTHORIZE/DEAUTHORIZE in non connected state\n"));
|
|
return -ENOTSUPP;
|
|
}
|
|
|
|
/* Processing only authorize/de-authorize flag for now */
|
|
if (!(params->sta_flags_mask & BIT(NL80211_STA_FLAG_AUTHORIZED))) {
|
|
WL_ERR(("WLC_SCB_AUTHORIZE sta_flags_mask not set \n"));
|
|
return -ENOTSUPP;
|
|
}
|
|
|
|
if (!(params->sta_flags_set & BIT(NL80211_STA_FLAG_AUTHORIZED))) {
|
|
err = wldev_ioctl_set(ndev, WLC_SCB_DEAUTHORIZE, mac, ETH_ALEN);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("WLC_SCB_DEAUTHORIZE error (%d)\n", err));
|
|
} else {
|
|
WL_INFORM_MEM(("[%s] WLC_SCB_DEAUTHORIZE " MACDBG "\n",
|
|
ndev->name, MAC2STRDBG(mac)));
|
|
}
|
|
return err;
|
|
}
|
|
|
|
err = wldev_ioctl_set(ndev, WLC_SCB_AUTHORIZE, mac, ETH_ALEN);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("WLC_SCB_AUTHORIZE error (%d)\n", err));
|
|
} else {
|
|
WL_INFORM_MEM(("[%s] WLC_SCB_AUTHORIZE " MACDBG "\n",
|
|
ndev->name, MAC2STRDBG(mac)));
|
|
#ifdef WL_WPS_SYNC
|
|
wl_wps_session_update(ndev, WPS_STATE_AUTHORIZE, mac);
|
|
#endif /* WL_WPS_SYNC */
|
|
}
|
|
#ifdef DHD_LOSSLESS_ROAMING
|
|
wl_del_roam_timeout(cfg);
|
|
#endif // endif
|
|
|
|
return err;
|
|
}
|
|
#endif /* WL_SUPPORT_BACKPORTED_KPATCHES || KERNEL_VER >= KERNEL_VERSION(3, 2, 0)) */
|
|
|
|
static s32
|
|
wl_cfg80211_set_scb_timings(
|
|
struct bcm_cfg80211 *cfg,
|
|
struct net_device *dev)
|
|
{
|
|
int err;
|
|
u32 ps_pretend;
|
|
wl_scb_probe_t scb_probe;
|
|
u32 ps_pretend_retries;
|
|
|
|
bzero(&scb_probe, sizeof(wl_scb_probe_t));
|
|
scb_probe.scb_timeout = WL_SCB_TIMEOUT;
|
|
scb_probe.scb_activity_time = WL_SCB_ACTIVITY_TIME;
|
|
scb_probe.scb_max_probe = WL_SCB_MAX_PROBE;
|
|
err = wldev_iovar_setbuf(dev, "scb_probe", (void *)&scb_probe,
|
|
sizeof(wl_scb_probe_t), cfg->ioctl_buf, WLC_IOCTL_SMLEN,
|
|
&cfg->ioctl_buf_sync);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("set 'scb_probe' failed, error = %d\n", err));
|
|
return err;
|
|
}
|
|
|
|
ps_pretend_retries = WL_PSPRETEND_RETRY_LIMIT;
|
|
err = wldev_iovar_setint(dev, "pspretend_retry_limit", ps_pretend_retries);
|
|
if (unlikely(err)) {
|
|
if (err == BCME_UNSUPPORTED) {
|
|
/* Ignore error if fw doesn't support the iovar */
|
|
WL_DBG(("set 'pspretend_retry_limit %d' failed, error = %d\n",
|
|
ps_pretend_retries, err));
|
|
} else {
|
|
WL_ERR(("set 'pspretend_retry_limit %d' failed, error = %d\n",
|
|
ps_pretend_retries, err));
|
|
return err;
|
|
}
|
|
}
|
|
|
|
ps_pretend = MAX(WL_SCB_MAX_PROBE / 2, WL_MIN_PSPRETEND_THRESHOLD);
|
|
err = wldev_iovar_setint(dev, "pspretend_threshold", ps_pretend);
|
|
if (unlikely(err)) {
|
|
if (err == BCME_UNSUPPORTED) {
|
|
/* Ignore error if fw doesn't support the iovar */
|
|
WL_DBG(("wl pspretend_threshold %d set error %d\n",
|
|
ps_pretend, err));
|
|
} else {
|
|
WL_ERR(("wl pspretend_threshold %d set error %d\n",
|
|
ps_pretend, err));
|
|
return err;
|
|
}
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 4, 0)) || defined(WL_COMPAT_WIRELESS)
|
|
static s32
|
|
wl_cfg80211_start_ap(
|
|
struct wiphy *wiphy,
|
|
struct net_device *dev,
|
|
struct cfg80211_ap_settings *info)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wiphy_priv(wiphy);
|
|
s32 err = BCME_OK;
|
|
struct parsed_ies ies;
|
|
s32 bssidx = 0;
|
|
u32 dev_role = 0;
|
|
dhd_pub_t *dhd = (dhd_pub_t *)(cfg->pub);
|
|
|
|
WL_DBG(("Enter \n"));
|
|
|
|
if ((bssidx = wl_get_bssidx_by_wdev(cfg, dev->ieee80211_ptr)) < 0) {
|
|
WL_ERR(("Find p2p index from wdev(%p) failed\n", dev->ieee80211_ptr));
|
|
return BCME_ERROR;
|
|
}
|
|
|
|
if (p2p_is_on(cfg) && (dev->ieee80211_ptr->iftype == NL80211_IFTYPE_P2P_GO)) {
|
|
dev_role = NL80211_IFTYPE_P2P_GO;
|
|
} else if (dev->ieee80211_ptr->iftype == NL80211_IFTYPE_AP) {
|
|
dev_role = NL80211_IFTYPE_AP;
|
|
dhd->op_mode |= DHD_FLAG_HOSTAP_MODE;
|
|
err = dhd_ndo_enable(dhd, FALSE);
|
|
WL_DBG(("Disabling NDO on Hostapd mode %d\n", err));
|
|
if (err) {
|
|
WL_ERR(("Disabling NDO Failed %d\n", err));
|
|
}
|
|
#ifdef WL_EXT_IAPSTA
|
|
wl_ext_iapsta_update_iftype(dev, dhd_net2idx(dhd->info, dev), WL_IF_TYPE_AP);
|
|
#endif /* WL_EXT_IAPSTA */
|
|
#ifdef PKT_FILTER_SUPPORT
|
|
/* Disable packet filter */
|
|
if (dhd->early_suspended) {
|
|
WL_ERR(("Disable pkt_filter\n"));
|
|
dhd_enable_packet_filter(0, dhd);
|
|
#ifdef APF
|
|
dhd_dev_apf_disable_filter(dhd_linux_get_primary_netdev(dhd));
|
|
#endif /* APF */
|
|
}
|
|
#endif /* PKT_FILTER_SUPPORT */
|
|
#ifdef ARP_OFFLOAD_SUPPORT
|
|
/* IF SoftAP is enabled, disable arpoe */
|
|
if (dhd->op_mode & DHD_FLAG_STA_MODE) {
|
|
dhd_arp_offload_set(dhd, 0);
|
|
dhd_arp_offload_enable(dhd, FALSE);
|
|
}
|
|
#endif /* ARP_OFFLOAD_SUPPORT */
|
|
} else {
|
|
/* only AP or GO role need to be handled here. */
|
|
err = -EINVAL;
|
|
goto fail;
|
|
}
|
|
|
|
/* disable TDLS */
|
|
#ifdef WLTDLS
|
|
if (bssidx == 0) {
|
|
/* Disable TDLS for primary Iface. For virtual interface,
|
|
* tdls disable will happen from interface create context
|
|
*/
|
|
wl_cfg80211_tdls_config(cfg, TDLS_STATE_AP_CREATE, false);
|
|
}
|
|
#endif /* WLTDLS */
|
|
|
|
if (!check_dev_role_integrity(cfg, dev_role)) {
|
|
err = -EINVAL;
|
|
goto fail;
|
|
}
|
|
|
|
#if ((LINUX_VERSION_CODE >= KERNEL_VERSION(3, 6, 0)) && !defined(WL_COMPAT_WIRELESS))
|
|
if ((err = wl_cfg80211_set_channel(wiphy, dev,
|
|
dev->ieee80211_ptr->preset_chandef.chan,
|
|
NL80211_CHAN_HT20) < 0)) {
|
|
WL_ERR(("Set channel failed \n"));
|
|
goto fail;
|
|
}
|
|
#endif /* ((LINUX_VERSION >= VERSION(3, 6, 0) && !WL_COMPAT_WIRELESS) */
|
|
|
|
if ((err = wl_cfg80211_bcn_set_params(info, dev,
|
|
dev_role, bssidx)) < 0) {
|
|
WL_ERR(("Beacon params set failed \n"));
|
|
goto fail;
|
|
}
|
|
|
|
/* Parse IEs */
|
|
if ((err = wl_cfg80211_parse_ap_ies(dev, &info->beacon, &ies)) < 0) {
|
|
WL_ERR(("Set IEs failed \n"));
|
|
goto fail;
|
|
}
|
|
|
|
if ((err = wl_cfg80211_bcn_validate_sec(dev, &ies,
|
|
dev_role, bssidx, info->privacy)) < 0)
|
|
{
|
|
WL_ERR(("Beacon set security failed \n"));
|
|
goto fail;
|
|
}
|
|
|
|
if ((err = wl_cfg80211_bcn_bringup_ap(dev, &ies,
|
|
dev_role, bssidx)) < 0) {
|
|
WL_ERR(("Beacon bring up AP/GO failed \n"));
|
|
goto fail;
|
|
}
|
|
|
|
/* Set GC/STA SCB expiry timings. */
|
|
if ((err = wl_cfg80211_set_scb_timings(cfg, dev))) {
|
|
WL_ERR(("scb setting failed \n"));
|
|
// goto fail;
|
|
}
|
|
|
|
wl_set_drv_status(cfg, CONNECTED, dev);
|
|
WL_DBG(("** AP/GO Created **\n"));
|
|
|
|
#ifdef WL_CFG80211_ACL
|
|
/* Enfoce Admission Control. */
|
|
if ((err = wl_cfg80211_set_mac_acl(wiphy, dev, info->acl)) < 0) {
|
|
WL_ERR(("Set ACL failed\n"));
|
|
}
|
|
#endif /* WL_CFG80211_ACL */
|
|
|
|
/* Set IEs to FW */
|
|
if ((err = wl_cfg80211_set_ies(dev, &info->beacon, bssidx)) < 0)
|
|
WL_ERR(("Set IEs failed \n"));
|
|
|
|
#ifdef WLDWDS
|
|
if (dev->ieee80211_ptr->use_4addr) {
|
|
if ((err = wl_cfg80211_set_mgmt_vndr_ies(cfg, ndev_to_cfgdev(dev), bssidx,
|
|
VNDR_IE_ASSOCRSP_FLAG, (const u8 *)info->beacon.assocresp_ies,
|
|
info->beacon.assocresp_ies_len)) < 0) {
|
|
WL_ERR(("Set ASSOC RESP IE Failed\n"));
|
|
}
|
|
}
|
|
#endif /* WLDWDS */
|
|
|
|
/* Enable Probe Req filter, WPS-AP certification 4.2.13 */
|
|
if ((dev_role == NL80211_IFTYPE_AP) && (ies.wps_ie != NULL)) {
|
|
bool pbc = 0;
|
|
wl_validate_wps_ie((const char *) ies.wps_ie, ies.wps_ie_len, &pbc);
|
|
if (pbc) {
|
|
WL_DBG(("set WLC_E_PROBREQ_MSG\n"));
|
|
wl_add_remove_eventmsg(dev, WLC_E_PROBREQ_MSG, true);
|
|
}
|
|
}
|
|
|
|
/* Configure hidden SSID */
|
|
if (info->hidden_ssid != NL80211_HIDDEN_SSID_NOT_IN_USE) {
|
|
if ((err = wldev_iovar_setint(dev, "closednet", 1)) < 0)
|
|
WL_ERR(("failed to set hidden : %d\n", err));
|
|
WL_DBG(("hidden_ssid_enum_val: %d \n", info->hidden_ssid));
|
|
}
|
|
|
|
#ifdef SUPPORT_AP_RADIO_PWRSAVE
|
|
if (dev_role == NL80211_IFTYPE_AP) {
|
|
if (!wl_set_ap_rps(dev, FALSE, dev->name)) {
|
|
wl_cfg80211_init_ap_rps(cfg);
|
|
} else {
|
|
WL_ERR(("Set rpsnoa failed \n"));
|
|
}
|
|
}
|
|
#endif /* SUPPORT_AP_RADIO_PWRSAVE */
|
|
fail:
|
|
if (err) {
|
|
WL_ERR(("ADD/SET beacon failed\n"));
|
|
wl_flush_fw_log_buffer(dev, FW_LOGSET_MASK_ALL);
|
|
wl_cfg80211_stop_ap(wiphy, dev);
|
|
if (dev_role == NL80211_IFTYPE_AP) {
|
|
#ifdef WL_EXT_IAPSTA
|
|
if (!wl_ext_iapsta_iftype_enabled(dev, WL_IF_TYPE_AP)) {
|
|
#endif /* WL_EXT_IAPSTA */
|
|
dhd->op_mode &= ~DHD_FLAG_HOSTAP_MODE;
|
|
#ifdef PKT_FILTER_SUPPORT
|
|
/* Enable packet filter */
|
|
if (dhd->early_suspended) {
|
|
WL_ERR(("Enable pkt_filter\n"));
|
|
dhd_enable_packet_filter(1, dhd);
|
|
#ifdef APF
|
|
dhd_dev_apf_enable_filter(dhd_linux_get_primary_netdev(dhd));
|
|
#endif /* APF */
|
|
}
|
|
#endif /* PKT_FILTER_SUPPORT */
|
|
#ifdef ARP_OFFLOAD_SUPPORT
|
|
/* IF SoftAP is disabled, enable arpoe back for STA mode. */
|
|
if (dhd->op_mode & DHD_FLAG_STA_MODE) {
|
|
dhd_arp_offload_set(dhd, dhd_arp_mode);
|
|
dhd_arp_offload_enable(dhd, TRUE);
|
|
}
|
|
#endif /* ARP_OFFLOAD_SUPPORT */
|
|
#ifdef DISABLE_WL_FRAMEBURST_SOFTAP
|
|
wl_cfg80211_set_frameburst(cfg, TRUE);
|
|
#endif /* DISABLE_WL_FRAMEBURST_SOFTAP */
|
|
#ifdef WL_EXT_IAPSTA
|
|
}
|
|
#endif /* WL_EXT_IAPSTA */
|
|
}
|
|
#ifdef WLTDLS
|
|
if (bssidx == 0) {
|
|
/* Since AP creation failed, re-enable TDLS */
|
|
wl_cfg80211_tdls_config(cfg, TDLS_STATE_AP_DELETE, false);
|
|
}
|
|
#endif /* WLTDLS */
|
|
|
|
}
|
|
|
|
return err;
|
|
}
|
|
|
|
static s32
|
|
wl_cfg80211_stop_ap(
|
|
struct wiphy *wiphy,
|
|
struct net_device *dev)
|
|
{
|
|
int err = 0;
|
|
u32 dev_role = 0;
|
|
int ap = 0;
|
|
s32 bssidx = 0;
|
|
struct bcm_cfg80211 *cfg = wiphy_priv(wiphy);
|
|
s32 is_rsdb_supported = BCME_ERROR;
|
|
dhd_pub_t *dhd = (dhd_pub_t *)(cfg->pub);
|
|
|
|
WL_DBG(("Enter \n"));
|
|
|
|
if (wl_cfg80211_get_bus_state(cfg)) {
|
|
/* since bus is down, iovar will fail. recovery path will bringup the bus. */
|
|
WL_ERR(("bus is not ready\n"));
|
|
return BCME_OK;
|
|
}
|
|
is_rsdb_supported = DHD_OPMODE_SUPPORTED(cfg->pub, DHD_FLAG_RSDB_MODE);
|
|
if (is_rsdb_supported < 0)
|
|
return (-ENODEV);
|
|
|
|
wl_clr_drv_status(cfg, AP_CREATING, dev);
|
|
wl_clr_drv_status(cfg, AP_CREATED, dev);
|
|
cfg->ap_oper_channel = 0;
|
|
|
|
if (dev->ieee80211_ptr->iftype == NL80211_IFTYPE_AP) {
|
|
dev_role = NL80211_IFTYPE_AP;
|
|
WL_DBG(("stopping AP operation\n"));
|
|
} else if (dev->ieee80211_ptr->iftype == NL80211_IFTYPE_P2P_GO) {
|
|
dev_role = NL80211_IFTYPE_P2P_GO;
|
|
WL_DBG(("stopping P2P GO operation\n"));
|
|
} else {
|
|
WL_ERR(("no AP/P2P GO interface is operational.\n"));
|
|
return -EINVAL;
|
|
}
|
|
|
|
if ((bssidx = wl_get_bssidx_by_wdev(cfg, dev->ieee80211_ptr)) < 0) {
|
|
WL_ERR(("find p2p index from wdev(%p) failed\n", dev->ieee80211_ptr));
|
|
return BCME_ERROR;
|
|
}
|
|
|
|
if (!check_dev_role_integrity(cfg, dev_role)) {
|
|
WL_ERR(("role integrity check failed \n"));
|
|
err = -EINVAL;
|
|
goto exit;
|
|
}
|
|
|
|
/* Free up resources */
|
|
wl_cfg80211_cleanup_if(dev);
|
|
|
|
/* Clear AP/GO connected status */
|
|
wl_clr_drv_status(cfg, CONNECTED, dev);
|
|
if ((err = wl_cfg80211_bss_up(cfg, dev, bssidx, 0)) < 0) {
|
|
WL_ERR(("bss down error %d\n", err));
|
|
}
|
|
|
|
if (dev_role == NL80211_IFTYPE_AP) {
|
|
#ifdef DISABLE_WL_FRAMEBURST_SOFTAP
|
|
wl_cfg80211_set_frameburst(cfg, TRUE);
|
|
#endif /* DISABLE_WL_FRAMEBURST_SOFTAP */
|
|
#ifdef PKT_FILTER_SUPPORT
|
|
/* Enable packet filter */
|
|
if (dhd->early_suspended) {
|
|
WL_ERR(("Enable pkt_filter\n"));
|
|
dhd_enable_packet_filter(1, dhd);
|
|
#ifdef APF
|
|
dhd_dev_apf_enable_filter(dhd_linux_get_primary_netdev(dhd));
|
|
#endif /* APF */
|
|
}
|
|
#endif /* PKT_FILTER_SUPPORT */
|
|
#ifdef ARP_OFFLOAD_SUPPORT
|
|
/* IF SoftAP is disabled, enable arpoe back for STA mode. */
|
|
if (dhd->op_mode & DHD_FLAG_STA_MODE) {
|
|
dhd_arp_offload_set(dhd, dhd_arp_mode);
|
|
dhd_arp_offload_enable(dhd, TRUE);
|
|
}
|
|
#endif /* ARP_OFFLOAD_SUPPORT */
|
|
|
|
if (is_rsdb_supported == 0) {
|
|
/* For non-rsdb chips, we use stand alone AP. Do wl down on stop AP */
|
|
err = wldev_ioctl_set(dev, WLC_UP, &ap, sizeof(s32));
|
|
if (unlikely(err)) {
|
|
WL_ERR(("WLC_UP error (%d)\n", err));
|
|
err = -EINVAL;
|
|
goto exit;
|
|
}
|
|
}
|
|
|
|
#ifdef WL_DISABLE_HE_SOFTAP
|
|
if (wl_cfg80211_set_he_mode(dev, cfg, bssidx, WL_IF_TYPE_AP, TRUE) != BCME_OK) {
|
|
WL_ERR(("failed to set he features\n"));
|
|
}
|
|
#endif /* WL_DISABLE_HE_SOFTAP */
|
|
|
|
wl_cfg80211_clear_per_bss_ies(cfg, dev->ieee80211_ptr);
|
|
#ifdef SUPPORT_AP_RADIO_PWRSAVE
|
|
if (!wl_set_ap_rps(dev, FALSE, dev->name)) {
|
|
wl_cfg80211_init_ap_rps(cfg);
|
|
} else {
|
|
WL_ERR(("Set rpsnoa failed \n"));
|
|
}
|
|
#endif /* SUPPORT_AP_RADIO_PWRSAVE */
|
|
} else {
|
|
WL_DBG(("Stopping P2P GO \n"));
|
|
DHD_OS_WAKE_LOCK_CTRL_TIMEOUT_ENABLE((dhd_pub_t *)(cfg->pub),
|
|
DHD_EVENT_TIMEOUT_MS*3);
|
|
DHD_OS_WAKE_LOCK_TIMEOUT((dhd_pub_t *)(cfg->pub));
|
|
}
|
|
|
|
SUPP_LOG(("AP/GO Link down\n"));
|
|
exit:
|
|
if (err) {
|
|
/* In case of failure, flush fw logs */
|
|
wl_flush_fw_log_buffer(dev, FW_LOGSET_MASK_ALL);
|
|
SUPP_LOG(("AP/GO Link down fail. err:%d\n", err));
|
|
}
|
|
#ifdef WLTDLS
|
|
if (bssidx == 0) {
|
|
/* re-enable TDLS if the number of connected interfaces is less than 2 */
|
|
wl_cfg80211_tdls_config(cfg, TDLS_STATE_AP_DELETE, false);
|
|
}
|
|
#endif /* WLTDLS */
|
|
|
|
if (dev_role == NL80211_IFTYPE_AP) {
|
|
#ifdef WL_EXT_IAPSTA
|
|
if (!wl_ext_iapsta_iftype_enabled(dev, WL_IF_TYPE_AP)) {
|
|
#endif /* WL_EXT_IAPSTA */
|
|
/* clear the AP mode */
|
|
dhd->op_mode &= ~DHD_FLAG_HOSTAP_MODE;
|
|
#ifdef WL_EXT_IAPSTA
|
|
}
|
|
#endif /* WL_EXT_IAPSTA */
|
|
}
|
|
return err;
|
|
}
|
|
|
|
static s32
|
|
wl_cfg80211_change_beacon(
|
|
struct wiphy *wiphy,
|
|
struct net_device *dev,
|
|
struct cfg80211_beacon_data *info)
|
|
{
|
|
s32 err = BCME_OK;
|
|
struct bcm_cfg80211 *cfg = wiphy_priv(wiphy);
|
|
struct parsed_ies ies;
|
|
u32 dev_role = 0;
|
|
s32 bssidx = 0;
|
|
bool pbc = 0;
|
|
|
|
WL_DBG(("Enter \n"));
|
|
|
|
if ((bssidx = wl_get_bssidx_by_wdev(cfg, dev->ieee80211_ptr)) < 0) {
|
|
WL_ERR(("Find p2p index from wdev(%p) failed\n", dev->ieee80211_ptr));
|
|
return BCME_ERROR;
|
|
}
|
|
|
|
if (dev->ieee80211_ptr->iftype == NL80211_IFTYPE_P2P_GO) {
|
|
dev_role = NL80211_IFTYPE_P2P_GO;
|
|
} else if (dev->ieee80211_ptr->iftype == NL80211_IFTYPE_AP) {
|
|
dev_role = NL80211_IFTYPE_AP;
|
|
} else {
|
|
err = -EINVAL;
|
|
goto fail;
|
|
}
|
|
|
|
if (!check_dev_role_integrity(cfg, dev_role)) {
|
|
err = -EINVAL;
|
|
goto fail;
|
|
}
|
|
|
|
if ((dev_role == NL80211_IFTYPE_P2P_GO) && (cfg->p2p_wdev == NULL)) {
|
|
WL_ERR(("P2P already down status!\n"));
|
|
err = BCME_ERROR;
|
|
goto fail;
|
|
}
|
|
|
|
/* Parse IEs */
|
|
if ((err = wl_cfg80211_parse_ap_ies(dev, info, &ies)) < 0) {
|
|
WL_ERR(("Parse IEs failed \n"));
|
|
goto fail;
|
|
}
|
|
|
|
/* Set IEs to FW */
|
|
if ((err = wl_cfg80211_set_ies(dev, info, bssidx)) < 0) {
|
|
WL_ERR(("Set IEs failed \n"));
|
|
goto fail;
|
|
}
|
|
|
|
if (dev_role == NL80211_IFTYPE_AP) {
|
|
if (wl_cfg80211_hostapd_sec(dev, &ies, bssidx) < 0) {
|
|
WL_ERR(("Hostapd update sec failed \n"));
|
|
err = -EINVAL;
|
|
goto fail;
|
|
}
|
|
/* Enable Probe Req filter, WPS-AP certification 4.2.13 */
|
|
if ((dev_role == NL80211_IFTYPE_AP) && (ies.wps_ie != NULL)) {
|
|
wl_validate_wps_ie((const char *) ies.wps_ie, ies.wps_ie_len, &pbc);
|
|
WL_DBG((" WPS AP, wps_ie is exists pbc=%d\n", pbc));
|
|
if (pbc)
|
|
wl_add_remove_eventmsg(dev, WLC_E_PROBREQ_MSG, true);
|
|
else
|
|
wl_add_remove_eventmsg(dev, WLC_E_PROBREQ_MSG, false);
|
|
}
|
|
}
|
|
|
|
fail:
|
|
if (err) {
|
|
wl_flush_fw_log_buffer(dev, FW_LOGSET_MASK_ALL);
|
|
}
|
|
return err;
|
|
}
|
|
#else
|
|
static s32
|
|
wl_cfg80211_add_set_beacon(struct wiphy *wiphy, struct net_device *dev,
|
|
struct beacon_parameters *info)
|
|
{
|
|
s32 err = BCME_OK;
|
|
struct bcm_cfg80211 *cfg = wiphy_priv(wiphy);
|
|
s32 ie_offset = 0;
|
|
s32 bssidx = 0;
|
|
u32 dev_role = NL80211_IFTYPE_AP;
|
|
struct parsed_ies ies;
|
|
bcm_tlv_t *ssid_ie;
|
|
bool pbc = 0;
|
|
bool privacy;
|
|
bool is_bss_up = 0;
|
|
dhd_pub_t *dhd = (dhd_pub_t *)(cfg->pub);
|
|
|
|
WL_DBG(("interval (%d) dtim_period (%d) head_len (%d) tail_len (%d)\n",
|
|
info->interval, info->dtim_period, info->head_len, info->tail_len));
|
|
|
|
if (dev == bcmcfg_to_prmry_ndev(cfg)) {
|
|
dev_role = NL80211_IFTYPE_AP;
|
|
}
|
|
#if defined(WL_ENABLE_P2P_IF)
|
|
else if (dev == cfg->p2p_net) {
|
|
/* Group Add request on p2p0 */
|
|
dev = bcmcfg_to_prmry_ndev(cfg);
|
|
dev_role = NL80211_IFTYPE_P2P_GO;
|
|
}
|
|
#endif /* WL_ENABLE_P2P_IF */
|
|
|
|
if ((bssidx = wl_get_bssidx_by_wdev(cfg, dev->ieee80211_ptr)) < 0) {
|
|
WL_ERR(("Find p2p index from wdev(%p) failed\n", dev->ieee80211_ptr));
|
|
return BCME_ERROR;
|
|
}
|
|
|
|
if (dev->ieee80211_ptr->iftype == NL80211_IFTYPE_P2P_GO) {
|
|
dev_role = NL80211_IFTYPE_P2P_GO;
|
|
} else if (dev->ieee80211_ptr->iftype == NL80211_IFTYPE_AP) {
|
|
dhd->op_mode |= DHD_FLAG_HOSTAP_MODE;
|
|
}
|
|
|
|
if (!check_dev_role_integrity(cfg, dev_role)) {
|
|
err = -ENODEV;
|
|
goto fail;
|
|
}
|
|
|
|
if ((dev_role == NL80211_IFTYPE_P2P_GO) && (cfg->p2p_wdev == NULL)) {
|
|
WL_ERR(("P2P already down status!\n"));
|
|
err = BCME_ERROR;
|
|
goto fail;
|
|
}
|
|
|
|
ie_offset = DOT11_MGMT_HDR_LEN + DOT11_BCN_PRB_FIXED_LEN;
|
|
/* find the SSID */
|
|
if ((ssid_ie = bcm_parse_tlvs((u8 *)&info->head[ie_offset],
|
|
info->head_len - ie_offset,
|
|
DOT11_MNG_SSID_ID)) != NULL) {
|
|
if (dev_role == NL80211_IFTYPE_AP) {
|
|
/* Store the hostapd SSID */
|
|
bzero(&cfg->hostapd_ssid.SSID[0], DOT11_MAX_SSID_LEN);
|
|
cfg->hostapd_ssid.SSID_len = MIN(ssid_ie->len, DOT11_MAX_SSID_LEN);
|
|
memcpy(&cfg->hostapd_ssid.SSID[0], ssid_ie->data,
|
|
cfg->hostapd_ssid.SSID_len);
|
|
} else {
|
|
/* P2P GO */
|
|
bzero(&cfg->p2p->ssid.SSID[0], DOT11_MAX_SSID_LEN);
|
|
cfg->p2p->ssid.SSID_len = MIN(ssid_ie->len, DOT11_MAX_SSID_LEN);
|
|
memcpy(cfg->p2p->ssid.SSID, ssid_ie->data,
|
|
cfg->p2p->ssid.SSID_len);
|
|
}
|
|
}
|
|
|
|
if (wl_cfg80211_parse_ies((u8 *)info->tail,
|
|
info->tail_len, &ies) < 0) {
|
|
WL_ERR(("Beacon get IEs failed \n"));
|
|
err = -EINVAL;
|
|
goto fail;
|
|
}
|
|
|
|
if ((err = wl_cfg80211_set_mgmt_vndr_ies(cfg, ndev_to_cfgdev(dev), bssidx,
|
|
VNDR_IE_BEACON_FLAG, (u8 *)info->tail,
|
|
info->tail_len)) < 0) {
|
|
WL_ERR(("Beacon set IEs failed \n"));
|
|
goto fail;
|
|
} else {
|
|
WL_DBG(("Applied Vndr IEs for Beacon \n"));
|
|
}
|
|
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 2, 0))
|
|
if ((err = wl_cfg80211_set_mgmt_vndr_ies(cfg, ndev_to_cfgdev(dev), bssidx,
|
|
VNDR_IE_PRBRSP_FLAG, (u8 *)info->proberesp_ies,
|
|
info->proberesp_ies_len)) < 0) {
|
|
WL_ERR(("ProbeRsp set IEs failed \n"));
|
|
goto fail;
|
|
} else {
|
|
WL_DBG(("Applied Vndr IEs for ProbeRsp \n"));
|
|
}
|
|
#endif // endif
|
|
|
|
is_bss_up = wl_cfg80211_bss_isup(dev, bssidx);
|
|
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 2, 0))
|
|
privacy = info->privacy;
|
|
#else
|
|
privacy = 0;
|
|
#endif // endif
|
|
if (!is_bss_up &&
|
|
(wl_cfg80211_bcn_validate_sec(dev, &ies, dev_role, bssidx, privacy) < 0))
|
|
{
|
|
WL_ERR(("Beacon set security failed \n"));
|
|
err = -EINVAL;
|
|
goto fail;
|
|
}
|
|
|
|
/* Set BI and DTIM period */
|
|
if (info->interval) {
|
|
if ((err = wldev_ioctl_set(dev, WLC_SET_BCNPRD,
|
|
&info->interval, sizeof(s32))) < 0) {
|
|
WL_ERR(("Beacon Interval Set Error, %d\n", err));
|
|
return err;
|
|
}
|
|
}
|
|
if (info->dtim_period) {
|
|
if ((err = wldev_ioctl_set(dev, WLC_SET_DTIMPRD,
|
|
&info->dtim_period, sizeof(s32))) < 0) {
|
|
WL_ERR(("DTIM Interval Set Error, %d\n", err));
|
|
return err;
|
|
}
|
|
}
|
|
|
|
/* If bss is already up, skip bring up */
|
|
if (!is_bss_up &&
|
|
(err = wl_cfg80211_bcn_bringup_ap(dev, &ies, dev_role, bssidx)) < 0)
|
|
{
|
|
WL_ERR(("Beacon bring up AP/GO failed \n"));
|
|
goto fail;
|
|
}
|
|
|
|
/* Set GC/STA SCB expiry timings. */
|
|
if ((err = wl_cfg80211_set_scb_timings(cfg, dev))) {
|
|
WL_ERR(("scb setting failed \n"));
|
|
if (err == BCME_UNSUPPORTED)
|
|
err = 0;
|
|
// goto fail;
|
|
}
|
|
|
|
if (wl_get_drv_status(cfg, AP_CREATED, dev)) {
|
|
/* Soft AP already running. Update changed params */
|
|
if (wl_cfg80211_hostapd_sec(dev, &ies, bssidx) < 0) {
|
|
WL_ERR(("Hostapd update sec failed \n"));
|
|
err = -EINVAL;
|
|
goto fail;
|
|
}
|
|
}
|
|
|
|
/* Enable Probe Req filter */
|
|
if (((dev_role == NL80211_IFTYPE_P2P_GO) ||
|
|
(dev_role == NL80211_IFTYPE_AP)) && (ies.wps_ie != NULL)) {
|
|
wl_validate_wps_ie((char *) ies.wps_ie, ies.wps_ie_len, &pbc);
|
|
if (pbc)
|
|
wl_add_remove_eventmsg(dev, WLC_E_PROBREQ_MSG, true);
|
|
}
|
|
|
|
WL_DBG(("** ADD/SET beacon done **\n"));
|
|
wl_set_drv_status(cfg, CONNECTED, dev);
|
|
|
|
fail:
|
|
if (err) {
|
|
WL_ERR(("ADD/SET beacon failed\n"));
|
|
if (dev_role == NL80211_IFTYPE_AP) {
|
|
#ifdef WL_EXT_IAPSTA
|
|
if (!wl_ext_iapsta_iftype_enabled(dev, WL_IF_TYPE_AP)) {
|
|
#endif /* WL_EXT_IAPSTA */
|
|
/* clear the AP mode */
|
|
dhd->op_mode &= ~DHD_FLAG_HOSTAP_MODE;
|
|
#ifdef WL_EXT_IAPSTA
|
|
}
|
|
#endif /* WL_EXT_IAPSTA */
|
|
}
|
|
}
|
|
return err;
|
|
|
|
}
|
|
|
|
static s32
|
|
wl_cfg80211_del_beacon(struct wiphy *wiphy, struct net_device *dev)
|
|
{
|
|
int err = 0;
|
|
s32 bssidx = 0;
|
|
int infra = 0;
|
|
struct wireless_dev *wdev = dev->ieee80211_ptr;
|
|
struct bcm_cfg80211 *cfg = wiphy_priv(wiphy);
|
|
dhd_pub_t *dhd = (dhd_pub_t *)(cfg->pub);
|
|
|
|
WL_DBG(("Enter. \n"));
|
|
|
|
if (!wdev) {
|
|
WL_ERR(("wdev null \n"));
|
|
return -EINVAL;
|
|
}
|
|
|
|
if ((wdev->iftype != NL80211_IFTYPE_P2P_GO) && (wdev->iftype != NL80211_IFTYPE_AP)) {
|
|
WL_ERR(("Unspported iface type iftype:%d \n", wdev->iftype));
|
|
}
|
|
|
|
wl_clr_drv_status(cfg, AP_CREATING, dev);
|
|
wl_clr_drv_status(cfg, AP_CREATED, dev);
|
|
|
|
/* Clear AP/GO connected status */
|
|
wl_clr_drv_status(cfg, CONNECTED, dev);
|
|
|
|
cfg->ap_oper_channel = 0;
|
|
|
|
if ((bssidx = wl_get_bssidx_by_wdev(cfg, dev->ieee80211_ptr)) < 0) {
|
|
WL_ERR(("find p2p index from wdev(%p) failed\n", dev->ieee80211_ptr));
|
|
return BCME_ERROR;
|
|
}
|
|
|
|
/* Do bss down */
|
|
if ((err = wl_cfg80211_bss_up(cfg, dev, bssidx, 0)) < 0) {
|
|
WL_ERR(("bss down error %d\n", err));
|
|
}
|
|
|
|
/* fall through is intentional */
|
|
err = wldev_ioctl_set(dev, WLC_SET_INFRA, &infra, sizeof(s32));
|
|
if (err < 0) {
|
|
WL_ERR(("SET INFRA error %d\n", err));
|
|
}
|
|
wl_cfg80211_clear_per_bss_ies(cfg, dev->ieee80211_ptr);
|
|
|
|
if (wdev->iftype == NL80211_IFTYPE_AP) {
|
|
#ifdef WL_EXT_IAPSTA
|
|
if (!wl_ext_iapsta_iftype_enabled(dev, WL_IF_TYPE_AP)) {
|
|
#endif /* WL_EXT_IAPSTA */
|
|
/* clear the AP mode */
|
|
dhd->op_mode &= ~DHD_FLAG_HOSTAP_MODE;
|
|
#ifdef WL_EXT_IAPSTA
|
|
}
|
|
#endif /* WL_EXT_IAPSTA */
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
#endif /* LINUX_VERSION < VERSION(3,4,0) || WL_COMPAT_WIRELESS */
|
|
|
|
#ifdef WL_SUPPORT_ACS
|
|
/*
|
|
* Currently the dump_obss IOVAR is returning string as output so we need to
|
|
* parse the output buffer in an unoptimized way. Going forward if we get the
|
|
* IOVAR output in binary format this method can be optimized
|
|
*/
|
|
static int wl_parse_dump_obss(char *buf, struct wl_dump_survey *survey)
|
|
{
|
|
int i;
|
|
char *token;
|
|
char delim[] = " \n";
|
|
|
|
token = strsep(&buf, delim);
|
|
while (token != NULL) {
|
|
if (!strcmp(token, "OBSS")) {
|
|
for (i = 0; i < OBSS_TOKEN_IDX; i++)
|
|
token = strsep(&buf, delim);
|
|
survey->obss = simple_strtoul(token, NULL, 10);
|
|
}
|
|
|
|
if (!strcmp(token, "IBSS")) {
|
|
for (i = 0; i < IBSS_TOKEN_IDX; i++)
|
|
token = strsep(&buf, delim);
|
|
survey->ibss = simple_strtoul(token, NULL, 10);
|
|
}
|
|
|
|
if (!strcmp(token, "TXDur")) {
|
|
for (i = 0; i < TX_TOKEN_IDX; i++)
|
|
token = strsep(&buf, delim);
|
|
survey->tx = simple_strtoul(token, NULL, 10);
|
|
}
|
|
|
|
if (!strcmp(token, "Category")) {
|
|
for (i = 0; i < CTG_TOKEN_IDX; i++)
|
|
token = strsep(&buf, delim);
|
|
survey->no_ctg = simple_strtoul(token, NULL, 10);
|
|
}
|
|
|
|
if (!strcmp(token, "Packet")) {
|
|
for (i = 0; i < PKT_TOKEN_IDX; i++)
|
|
token = strsep(&buf, delim);
|
|
survey->no_pckt = simple_strtoul(token, NULL, 10);
|
|
}
|
|
|
|
if (!strcmp(token, "Opp(time):")) {
|
|
for (i = 0; i < IDLE_TOKEN_IDX; i++)
|
|
token = strsep(&buf, delim);
|
|
survey->idle = simple_strtoul(token, NULL, 10);
|
|
}
|
|
|
|
token = strsep(&buf, delim);
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int wl_dump_obss(struct net_device *ndev, cca_msrmnt_query req,
|
|
struct wl_dump_survey *survey)
|
|
{
|
|
cca_stats_n_flags *results;
|
|
char *buf;
|
|
int retry, err;
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(ndev);
|
|
|
|
buf = (char *)MALLOCZ(cfg->osh, sizeof(char) * WLC_IOCTL_MAXLEN);
|
|
if (unlikely(!buf)) {
|
|
WL_ERR(("%s: buf alloc failed\n", __func__));
|
|
return -ENOMEM;
|
|
}
|
|
|
|
retry = IOCTL_RETRY_COUNT;
|
|
while (retry--) {
|
|
err = wldev_iovar_getbuf(ndev, "dump_obss", &req, sizeof(req),
|
|
buf, WLC_IOCTL_MAXLEN, NULL);
|
|
if (err >= 0) {
|
|
break;
|
|
}
|
|
WL_DBG(("attempt = %d, err = %d, \n",
|
|
(IOCTL_RETRY_COUNT - retry), err));
|
|
}
|
|
|
|
if (retry <= 0) {
|
|
WL_ERR(("failure, dump_obss IOVAR failed\n"));
|
|
err = -EINVAL;
|
|
goto exit;
|
|
}
|
|
|
|
results = (cca_stats_n_flags *)(buf);
|
|
wl_parse_dump_obss(results->buf, survey);
|
|
MFREE(cfg->osh, buf, sizeof(char) * WLC_IOCTL_MAXLEN);
|
|
|
|
return 0;
|
|
exit:
|
|
MFREE(cfg->osh, buf, sizeof(char) * WLC_IOCTL_MAXLEN);
|
|
return err;
|
|
}
|
|
|
|
static int wl_cfg80211_dump_survey(struct wiphy *wiphy, struct net_device *ndev,
|
|
int idx, struct survey_info *info)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wiphy_priv(wiphy);
|
|
struct wl_dump_survey *survey;
|
|
struct ieee80211_supported_band *band;
|
|
struct ieee80211_channel*chan;
|
|
cca_msrmnt_query req;
|
|
int val, err, noise, retry;
|
|
|
|
dhd_pub_t *dhd = (dhd_pub_t *)(cfg->pub);
|
|
if (!(dhd->op_mode & DHD_FLAG_HOSTAP_MODE)) {
|
|
return -ENOENT;
|
|
}
|
|
band = wiphy->bands[IEEE80211_BAND_2GHZ];
|
|
if (band && idx >= band->n_channels) {
|
|
idx -= band->n_channels;
|
|
band = NULL;
|
|
}
|
|
|
|
if (!band || idx >= band->n_channels) {
|
|
/* Move to 5G band */
|
|
band = wiphy->bands[IEEE80211_BAND_5GHZ];
|
|
if (idx >= band->n_channels) {
|
|
return -ENOENT;
|
|
}
|
|
}
|
|
|
|
chan = &band->channels[idx];
|
|
/* Setting current channel to the requested channel */
|
|
if ((err = wl_cfg80211_set_channel(wiphy, ndev, chan,
|
|
NL80211_CHAN_HT20) < 0)) {
|
|
WL_ERR(("Set channel failed \n"));
|
|
}
|
|
|
|
if (!idx) {
|
|
/* Set interface up, explicitly. */
|
|
val = 1;
|
|
err = wldev_ioctl_set(ndev, WLC_UP, (void *)&val, sizeof(val));
|
|
if (err < 0) {
|
|
WL_ERR(("set interface up failed, error = %d\n", err));
|
|
}
|
|
}
|
|
|
|
/* Get noise value */
|
|
retry = IOCTL_RETRY_COUNT;
|
|
while (retry--) {
|
|
noise = 0;
|
|
err = wldev_ioctl_get(ndev, WLC_GET_PHY_NOISE, &noise,
|
|
sizeof(noise));
|
|
if (err >= 0) {
|
|
break;
|
|
}
|
|
WL_DBG(("attempt = %d, err = %d, \n",
|
|
(IOCTL_RETRY_COUNT - retry), err));
|
|
}
|
|
|
|
if (retry <= 0) {
|
|
WL_ERR(("Get Phy Noise failed, error = %d\n", err));
|
|
noise = CHAN_NOISE_DUMMY;
|
|
}
|
|
|
|
survey = (struct wl_dump_survey *)MALLOCZ(cfg->osh,
|
|
sizeof(struct wl_dump_survey));
|
|
if (unlikely(!survey)) {
|
|
WL_ERR(("%s: alloc failed\n", __func__));
|
|
return -ENOMEM;
|
|
}
|
|
|
|
/* Start Measurement for obss stats on current channel */
|
|
req.msrmnt_query = 0;
|
|
req.time_req = ACS_MSRMNT_DELAY;
|
|
if ((err = wl_dump_obss(ndev, req, survey)) < 0) {
|
|
goto exit;
|
|
}
|
|
|
|
/*
|
|
* Wait for the meaurement to complete, adding a buffer value of 10 to take
|
|
* into consideration any delay in IOVAR completion
|
|
*/
|
|
msleep(ACS_MSRMNT_DELAY + 10);
|
|
|
|
/* Issue IOVAR to collect measurement results */
|
|
req.msrmnt_query = 1;
|
|
if ((err = wl_dump_obss(ndev, req, survey)) < 0) {
|
|
goto exit;
|
|
}
|
|
|
|
info->channel = chan;
|
|
info->noise = noise;
|
|
info->channel_time = ACS_MSRMNT_DELAY;
|
|
info->channel_time_busy = ACS_MSRMNT_DELAY - survey->idle;
|
|
info->channel_time_rx = survey->obss + survey->ibss + survey->no_ctg +
|
|
survey->no_pckt;
|
|
info->channel_time_tx = survey->tx;
|
|
info->filled = SURVEY_INFO_NOISE_DBM |SURVEY_INFO_CHANNEL_TIME |
|
|
SURVEY_INFO_CHANNEL_TIME_BUSY | SURVEY_INFO_CHANNEL_TIME_RX |
|
|
SURVEY_INFO_CHANNEL_TIME_TX;
|
|
MFREE(cfg->osh, survey, sizeof(struct wl_dump_survey));
|
|
|
|
return 0;
|
|
exit:
|
|
MFREE(cfg->osh, survey, sizeof(struct wl_dump_survey));
|
|
return err;
|
|
}
|
|
#endif /* WL_SUPPORT_ACS */
|
|
|
|
static struct cfg80211_ops wl_cfg80211_ops = {
|
|
.add_virtual_intf = wl_cfg80211_add_virtual_iface,
|
|
.del_virtual_intf = wl_cfg80211_del_virtual_iface,
|
|
.change_virtual_intf = wl_cfg80211_change_virtual_iface,
|
|
#if defined(WL_CFG80211_P2P_DEV_IF)
|
|
.start_p2p_device = wl_cfgp2p_start_p2p_device,
|
|
.stop_p2p_device = wl_cfgp2p_stop_p2p_device,
|
|
#endif /* WL_CFG80211_P2P_DEV_IF */
|
|
.scan = wl_cfg80211_scan,
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(4, 5, 0))
|
|
.abort_scan = wl_cfg80211_abort_scan,
|
|
#endif /* (LINUX_VERSION_CODE >= KERNEL_VERSION(4, 5, 0)) */
|
|
.set_wiphy_params = wl_cfg80211_set_wiphy_params,
|
|
.join_ibss = wl_cfg80211_join_ibss,
|
|
.leave_ibss = wl_cfg80211_leave_ibss,
|
|
.get_station = wl_cfg80211_get_station,
|
|
.set_tx_power = wl_cfg80211_set_tx_power,
|
|
.get_tx_power = wl_cfg80211_get_tx_power,
|
|
.add_key = wl_cfg80211_add_key,
|
|
.del_key = wl_cfg80211_del_key,
|
|
.get_key = wl_cfg80211_get_key,
|
|
.set_default_key = wl_cfg80211_config_default_key,
|
|
.set_default_mgmt_key = wl_cfg80211_config_default_mgmt_key,
|
|
.set_power_mgmt = wl_cfg80211_set_power_mgmt,
|
|
.connect = wl_cfg80211_connect,
|
|
.disconnect = wl_cfg80211_disconnect,
|
|
.suspend = wl_cfg80211_suspend,
|
|
.resume = wl_cfg80211_resume,
|
|
.set_pmksa = wl_cfg80211_set_pmksa,
|
|
.del_pmksa = wl_cfg80211_del_pmksa,
|
|
.flush_pmksa = wl_cfg80211_flush_pmksa,
|
|
.remain_on_channel = wl_cfg80211_remain_on_channel,
|
|
.cancel_remain_on_channel = wl_cfg80211_cancel_remain_on_channel,
|
|
.mgmt_tx = wl_cfg80211_mgmt_tx,
|
|
.mgmt_frame_register = wl_cfg80211_mgmt_frame_register,
|
|
.change_bss = wl_cfg80211_change_bss,
|
|
#if (LINUX_VERSION_CODE < KERNEL_VERSION(3, 6, 0)) || defined(WL_COMPAT_WIRELESS)
|
|
.set_channel = wl_cfg80211_set_channel,
|
|
#endif /* ((LINUX_VERSION < VERSION(3, 6, 0)) || WL_COMPAT_WIRELESS */
|
|
#if (LINUX_VERSION_CODE < KERNEL_VERSION(3, 4, 0)) && !defined(WL_COMPAT_WIRELESS)
|
|
.set_beacon = wl_cfg80211_add_set_beacon,
|
|
.add_beacon = wl_cfg80211_add_set_beacon,
|
|
.del_beacon = wl_cfg80211_del_beacon,
|
|
#else
|
|
.change_beacon = wl_cfg80211_change_beacon,
|
|
.start_ap = wl_cfg80211_start_ap,
|
|
.stop_ap = wl_cfg80211_stop_ap,
|
|
#endif /* LINUX_VERSION < KERNEL_VERSION(3,4,0) && !WL_COMPAT_WIRELESS */
|
|
#ifdef WL_SCHED_SCAN
|
|
.sched_scan_start = wl_cfg80211_sched_scan_start,
|
|
.sched_scan_stop = wl_cfg80211_sched_scan_stop,
|
|
#endif /* WL_SCHED_SCAN */
|
|
#if defined(WL_SUPPORT_BACKPORTED_KPATCHES) || (LINUX_VERSION_CODE >= KERNEL_VERSION(3, \
|
|
2, 0))
|
|
.del_station = wl_cfg80211_del_station,
|
|
.change_station = wl_cfg80211_change_station,
|
|
.mgmt_tx_cancel_wait = wl_cfg80211_mgmt_tx_cancel_wait,
|
|
#endif /* WL_SUPPORT_BACKPORTED_KPATCHES || KERNEL_VERSION >= (3,2,0) */
|
|
#if (LINUX_VERSION_CODE > KERNEL_VERSION(3, 2, 0)) || defined(WL_COMPAT_WIRELESS)
|
|
.tdls_mgmt = wl_cfg80211_tdls_mgmt,
|
|
.tdls_oper = wl_cfg80211_tdls_oper,
|
|
#endif /* LINUX_VERSION > VERSION(3, 2, 0) || WL_COMPAT_WIRELESS */
|
|
#ifdef WL_SUPPORT_ACS
|
|
.dump_survey = wl_cfg80211_dump_survey,
|
|
#endif /* WL_SUPPORT_ACS */
|
|
#ifdef WL_CFG80211_ACL
|
|
.set_mac_acl = wl_cfg80211_set_mac_acl,
|
|
#endif /* WL_CFG80211_ACL */
|
|
#ifdef GTK_OFFLOAD_SUPPORT
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 1, 0))
|
|
.set_rekey_data = wl_cfg80211_set_rekey_data,
|
|
#endif /* LINUX_VERSION_CODE >= KERNEL_VERSION(3, 1, 0) */
|
|
#endif /* GTK_OFFLOAD_SUPPORT */
|
|
#if defined(WL_FILS)
|
|
/* This should be enabled from kernel version which supports this */
|
|
.update_connect_params = wl_cfg80211_update_connect_params,
|
|
#endif /* WL_FILS */
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(4, 13, 0))
|
|
.set_pmk = wl_cfg80211_set_pmk,
|
|
.del_pmk = wl_cfg80211_del_pmk,
|
|
#endif /* LINUX_VERSION_CODE >= KERNEL_VERSION(4, 13, 0) */
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 12, 0))
|
|
.channel_switch = wl_cfg80211_channel_switch,
|
|
#endif /* LINUX_VERSION_CODE >= KERNEL_VERSION(3, 12, 0) */
|
|
#ifdef WL_CLIENT_SAE
|
|
.external_auth = wl_cfg80211_external_auth,
|
|
#endif /* WL_CLIENT_SAE */
|
|
};
|
|
|
|
s32 wl_mode_to_nl80211_iftype(s32 mode)
|
|
{
|
|
s32 err = 0;
|
|
|
|
switch (mode) {
|
|
case WL_MODE_BSS:
|
|
return NL80211_IFTYPE_STATION;
|
|
case WL_MODE_IBSS:
|
|
return NL80211_IFTYPE_ADHOC;
|
|
case WL_MODE_AP:
|
|
return NL80211_IFTYPE_AP;
|
|
#ifdef WLMESH_CFG80211
|
|
case WL_MODE_MESH:
|
|
return NL80211_IFTYPE_MESH_POINT;
|
|
#endif /* WLMESH_CFG80211 */
|
|
default:
|
|
return NL80211_IFTYPE_UNSPECIFIED;
|
|
}
|
|
|
|
return err;
|
|
}
|
|
|
|
s32
|
|
wl_cfg80211_set_country_code(struct net_device *net, char *country_code,
|
|
bool notify, bool user_enforced, int revinfo)
|
|
{
|
|
s32 ret = BCME_OK;
|
|
#ifdef WL_NAN
|
|
struct wireless_dev *wdev = ndev_to_wdev(net);
|
|
struct wiphy *wiphy = wdev->wiphy;
|
|
struct bcm_cfg80211 *cfg = wiphy_priv(wiphy);
|
|
if (cfg->nan_enable) {
|
|
mutex_lock(&cfg->if_sync);
|
|
cfg->nancfg.disable_reason = NAN_COUNTRY_CODE_CHANGE;
|
|
ret = wl_cfgnan_disable(cfg);
|
|
mutex_unlock(&cfg->if_sync);
|
|
if (ret != BCME_OK) {
|
|
WL_ERR(("failed to disable nan, error[%d]\n", ret));
|
|
return ret;
|
|
}
|
|
}
|
|
#endif /* WL_NAN */
|
|
ret = wldev_set_country(net, country_code,
|
|
notify, user_enforced, revinfo);
|
|
if (ret < 0) {
|
|
WL_ERR(("set country Failed :%d\n", ret));
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
#ifdef CONFIG_CFG80211_INTERNAL_REGDB
|
|
#if (LINUX_VERSION_CODE < KERNEL_VERSION(3, 9, 0))
|
|
#define WL_CFG80211_REG_NOTIFIER() static int wl_cfg80211_reg_notifier(struct wiphy *wiphy, struct regulatory_request *request)
|
|
#else
|
|
#define WL_CFG80211_REG_NOTIFIER() static void wl_cfg80211_reg_notifier(struct wiphy *wiphy, struct regulatory_request *request)
|
|
#endif /* kernel version < 3.9.0 */
|
|
#endif
|
|
|
|
#ifdef CONFIG_CFG80211_INTERNAL_REGDB
|
|
WL_CFG80211_REG_NOTIFIER()
|
|
{
|
|
struct bcm_cfg80211 *cfg = (struct bcm_cfg80211 *)wiphy_priv(wiphy);
|
|
int ret = 0;
|
|
int revinfo = -1;
|
|
|
|
if (!request || !cfg) {
|
|
WL_ERR(("Invalid arg\n"));
|
|
#if (LINUX_VERSION_CODE < KERNEL_VERSION(3, 10, 11))
|
|
return -EINVAL;
|
|
#else
|
|
return;
|
|
#endif /* kernel version < 3.10.11 */
|
|
}
|
|
|
|
WL_DBG(("ccode: %c%c Initiator: %d\n",
|
|
request->alpha2[0], request->alpha2[1], request->initiator));
|
|
|
|
/* We support only REGDOM_SET_BY_USER as of now */
|
|
if ((request->initiator != NL80211_REGDOM_SET_BY_USER) &&
|
|
(request->initiator != NL80211_REGDOM_SET_BY_COUNTRY_IE)) {
|
|
WL_ERR(("reg_notifier for intiator:%d not supported : set default\n",
|
|
request->initiator));
|
|
/* in case of no supported country by regdb
|
|
lets driver setup platform default Locale
|
|
*/
|
|
}
|
|
|
|
WL_ERR(("Set country code %c%c from %s\n",
|
|
request->alpha2[0], request->alpha2[1],
|
|
((request->initiator == NL80211_REGDOM_SET_BY_COUNTRY_IE) ? " 11d AP" : "User")));
|
|
|
|
if ((ret = wldev_set_country(bcmcfg_to_prmry_ndev(cfg), request->alpha2,
|
|
false, (request->initiator == NL80211_REGDOM_SET_BY_USER ? true : false),
|
|
revinfo)) < 0) {
|
|
WL_ERR(("set country Failed :%d\n", ret));
|
|
}
|
|
|
|
#if (LINUX_VERSION_CODE < KERNEL_VERSION(3, 10, 11))
|
|
return ret;
|
|
#else
|
|
return;
|
|
#endif /* kernel version < 3.10.11 */
|
|
}
|
|
#endif /* CONFIG_CFG80211_INTERNAL_REGDB */
|
|
|
|
#ifdef CONFIG_PM
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 6, 0))
|
|
static const struct wiphy_wowlan_support brcm_wowlan_support = {
|
|
.flags = WIPHY_WOWLAN_ANY,
|
|
.n_patterns = WL_WOWLAN_MAX_PATTERNS,
|
|
.pattern_min_len = WL_WOWLAN_MIN_PATTERN_LEN,
|
|
.pattern_max_len = WL_WOWLAN_MAX_PATTERN_LEN,
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 9, 0))
|
|
.max_pkt_offset = WL_WOWLAN_MAX_PATTERN_LEN,
|
|
#endif /* LINUX_VERSION_CODE >= KERNEL_VERSION(3, 9, 0) */
|
|
};
|
|
#endif /* LINUX_VERSION_CODE >= KERNEL_VERSION(3, 6, 0) */
|
|
#endif /* CONFIG_PM */
|
|
|
|
int wl_features_set(u8 *array, uint8 len, u32 ftidx)
|
|
{
|
|
u8* ft_byte;
|
|
|
|
if ((ftidx / 8u) >= len)
|
|
return BCME_BADARG;
|
|
|
|
ft_byte = &array[ftidx / 8u];
|
|
*ft_byte |= BIT(ftidx % 8u);
|
|
return BCME_OK;
|
|
}
|
|
|
|
static s32 wl_setup_wiphy(struct wireless_dev *wdev, struct device *sdiofunc_dev, dhd_pub_t *context)
|
|
{
|
|
s32 err = 0;
|
|
#ifdef CONFIG_PM
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 11, 0))
|
|
struct cfg80211_wowlan *brcm_wowlan_config = NULL;
|
|
#endif /* LINUX_VERSION_CODE >= KERNEL_VERSION(3, 11, 0) */
|
|
#endif /* CONFIG_PM */
|
|
|
|
//#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 4, 0) || defined(WL_COMPAT_WIRELESS))
|
|
dhd_pub_t *dhd = (dhd_pub_t *)context;
|
|
BCM_REFERENCE(dhd);
|
|
|
|
if (!dhd) {
|
|
WL_ERR(("DHD is NULL!!"));
|
|
err = -ENODEV;
|
|
return err;
|
|
}
|
|
//#endif // endif
|
|
|
|
wdev->wiphy =
|
|
wiphy_new(&wl_cfg80211_ops, sizeof(struct bcm_cfg80211));
|
|
if (unlikely(!wdev->wiphy)) {
|
|
WL_ERR(("Couldn not allocate wiphy device\n"));
|
|
err = -ENOMEM;
|
|
return err;
|
|
}
|
|
set_wiphy_dev(wdev->wiphy, sdiofunc_dev);
|
|
wdev->wiphy->max_scan_ie_len = WL_SCAN_IE_LEN_MAX;
|
|
/* Report how many SSIDs Driver can support per Scan request */
|
|
wdev->wiphy->max_scan_ssids = WL_SCAN_PARAMS_SSID_MAX;
|
|
wdev->wiphy->max_num_pmkids = WL_NUM_PMKIDS_MAX;
|
|
#ifdef WL_SCHED_SCAN
|
|
wdev->wiphy->max_sched_scan_ssids = MAX_PFN_LIST_COUNT;
|
|
wdev->wiphy->max_match_sets = MAX_PFN_LIST_COUNT;
|
|
wdev->wiphy->max_sched_scan_ie_len = WL_SCAN_IE_LEN_MAX;
|
|
#if (LINUX_VERSION_CODE < KERNEL_VERSION(4, 12, 0))
|
|
wdev->wiphy->flags |= WIPHY_FLAG_SUPPORTS_SCHED_SCAN;
|
|
#endif /* LINUX_VER < 4.12 */
|
|
#endif /* WL_SCHED_SCAN */
|
|
#ifdef WLMESH_CFG80211
|
|
wdev->wiphy->flags |= WIPHY_FLAG_MESH_AUTH;
|
|
#endif /* WLMESH_CFG80211 */
|
|
wdev->wiphy->interface_modes =
|
|
BIT(NL80211_IFTYPE_STATION)
|
|
| BIT(NL80211_IFTYPE_ADHOC)
|
|
#if !defined(WL_ENABLE_P2P_IF) && !defined(WL_CFG80211_P2P_DEV_IF)
|
|
| BIT(NL80211_IFTYPE_MONITOR)
|
|
#endif // endif
|
|
#if defined(WL_IFACE_COMB_NUM_CHANNELS) || defined(WL_CFG80211_P2P_DEV_IF)
|
|
| BIT(NL80211_IFTYPE_P2P_CLIENT)
|
|
| BIT(NL80211_IFTYPE_P2P_GO)
|
|
#endif /* WL_IFACE_COMB_NUM_CHANNELS || WL_CFG80211_P2P_DEV_IF */
|
|
#if defined(WL_CFG80211_P2P_DEV_IF)
|
|
| BIT(NL80211_IFTYPE_P2P_DEVICE)
|
|
#endif /* WL_CFG80211_P2P_DEV_IF */
|
|
#ifdef WLMESH_CFG80211
|
|
| BIT(NL80211_IFTYPE_MESH_POINT)
|
|
#endif /* WLMESH_CFG80211 */
|
|
| BIT(NL80211_IFTYPE_AP);
|
|
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 0, 0)) && \
|
|
(defined(WL_IFACE_COMB_NUM_CHANNELS) || defined(WL_CFG80211_P2P_DEV_IF))
|
|
WL_DBG(("Setting interface combinations for common mode\n"));
|
|
wdev->wiphy->iface_combinations = common_iface_combinations;
|
|
wdev->wiphy->n_iface_combinations =
|
|
ARRAY_SIZE(common_iface_combinations);
|
|
#endif /* LINUX_VER >= 3.0 && (WL_IFACE_COMB_NUM_CHANNELS || WL_CFG80211_P2P_DEV_IF) */
|
|
|
|
wdev->wiphy->bands[IEEE80211_BAND_2GHZ] = &__wl_band_2ghz;
|
|
|
|
wdev->wiphy->signal_type = CFG80211_SIGNAL_TYPE_MBM;
|
|
wdev->wiphy->cipher_suites = __wl_cipher_suites;
|
|
wdev->wiphy->n_cipher_suites = ARRAY_SIZE(__wl_cipher_suites);
|
|
wdev->wiphy->max_remain_on_channel_duration = 5000;
|
|
wdev->wiphy->mgmt_stypes = wl_cfg80211_default_mgmt_stypes;
|
|
#ifndef WL_POWERSAVE_DISABLED
|
|
wdev->wiphy->flags |= WIPHY_FLAG_PS_ON_BY_DEFAULT;
|
|
#else
|
|
wdev->wiphy->flags &= ~WIPHY_FLAG_PS_ON_BY_DEFAULT;
|
|
#endif /* !WL_POWERSAVE_DISABLED */
|
|
wdev->wiphy->flags |= WIPHY_FLAG_NETNS_OK |
|
|
WIPHY_FLAG_4ADDR_AP |
|
|
#if (LINUX_VERSION_CODE <= KERNEL_VERSION(2, 6, 39)) && !defined(WL_COMPAT_WIRELESS)
|
|
WIPHY_FLAG_SUPPORTS_SEPARATE_DEFAULT_KEYS |
|
|
#endif // endif
|
|
WIPHY_FLAG_4ADDR_STATION;
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 15, 0))
|
|
/*
|
|
* If FW ROAM flag is advertised, upper layer doesn't provide the
|
|
* bssid & freq in the connect command. However, kernel ver >= 3.15,
|
|
* provides bssid_hint & freq_hint which can be used by the firmware.
|
|
* fw_ap_select variable determines whether FW selects the AP or the
|
|
* user space selects the target AP within the given ESS.
|
|
*/
|
|
wdev->wiphy->flags |= WIPHY_FLAG_SUPPORTS_FW_ROAM;
|
|
#endif /* (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 15, 0) */
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 3, 0)) || defined(WL_COMPAT_WIRELESS)
|
|
wdev->wiphy->flags |= WIPHY_FLAG_HAS_REMAIN_ON_CHANNEL |
|
|
WIPHY_FLAG_OFFCHAN_TX;
|
|
#endif // endif
|
|
#if defined(WL_SUPPORT_BACKPORTED_KPATCHES) || (LINUX_VERSION_CODE >= KERNEL_VERSION(3, \
|
|
4, 0))
|
|
/* From 3.4 kernel ownards AP_SME flag can be advertised
|
|
* to remove the patch from supplicant
|
|
*/
|
|
wdev->wiphy->flags |= WIPHY_FLAG_HAVE_AP_SME;
|
|
|
|
#ifdef WL_CFG80211_ACL
|
|
/* Configure ACL capabilities. */
|
|
wdev->wiphy->max_acl_mac_addrs = MAX_NUM_MAC_FILT;
|
|
#endif // endif
|
|
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 4, 0) || defined(WL_COMPAT_WIRELESS))
|
|
/* Supplicant distinguish between the SoftAP mode and other
|
|
* modes (e.g. P2P, WPS, HS2.0) when it builds the probe
|
|
* response frame from Supplicant MR1 and Kernel 3.4.0 or
|
|
* later version. To add Vendor specific IE into the
|
|
* probe response frame in case of SoftAP mode,
|
|
* AP_PROBE_RESP_OFFLOAD flag is set to wiphy->flags variable.
|
|
*/
|
|
if (dhd_get_fw_mode(dhd->info) == DHD_FLAG_HOSTAP_MODE) {
|
|
wdev->wiphy->flags |= WIPHY_FLAG_AP_PROBE_RESP_OFFLOAD;
|
|
wdev->wiphy->probe_resp_offload = 0;
|
|
}
|
|
#endif // endif
|
|
#endif /* WL_SUPPORT_BACKPORTED_KPATCHES) || (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 4, 0)) */
|
|
|
|
#if (LINUX_VERSION_CODE > KERNEL_VERSION(3, 2, 0)) || defined(WL_COMPAT_WIRELESS)
|
|
wdev->wiphy->flags |= WIPHY_FLAG_SUPPORTS_TDLS;
|
|
#endif // endif
|
|
|
|
#if defined(CONFIG_PM) && defined(WL_CFG80211_P2P_DEV_IF)
|
|
/*
|
|
* From linux-3.10 kernel, wowlan packet filter is mandated to avoid the
|
|
* disconnection of connected network before suspend. So a dummy wowlan
|
|
* filter is configured for kernels linux-3.8 and above.
|
|
*/
|
|
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 11, 0))
|
|
wdev->wiphy->wowlan = &brcm_wowlan_support;
|
|
/* If this is not provided cfg stack will get disconnect
|
|
* during suspend.
|
|
* Note: wiphy->wowlan_config is freed by cfg80211 layer.
|
|
* so use malloc instead of MALLOC(osh) to avoid false alarm.
|
|
*/
|
|
brcm_wowlan_config = kmalloc(sizeof(struct cfg80211_wowlan), GFP_KERNEL);
|
|
if (brcm_wowlan_config) {
|
|
brcm_wowlan_config->disconnect = true;
|
|
brcm_wowlan_config->gtk_rekey_failure = true;
|
|
brcm_wowlan_config->eap_identity_req = true;
|
|
brcm_wowlan_config->four_way_handshake = true;
|
|
brcm_wowlan_config->patterns = NULL;
|
|
brcm_wowlan_config->n_patterns = 0;
|
|
brcm_wowlan_config->tcp = NULL;
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 19, 0))
|
|
brcm_wowlan_config->nd_config = NULL;
|
|
#endif // endif
|
|
} else {
|
|
WL_ERR(("Can not allocate memory for brcm_wowlan_config,"
|
|
" So wiphy->wowlan_config is set to NULL\n"));
|
|
}
|
|
wdev->wiphy->wowlan_config = brcm_wowlan_config;
|
|
#else
|
|
wdev->wiphy->wowlan.flags = WIPHY_WOWLAN_ANY;
|
|
wdev->wiphy->wowlan.n_patterns = WL_WOWLAN_MAX_PATTERNS;
|
|
wdev->wiphy->wowlan.pattern_min_len = WL_WOWLAN_MIN_PATTERN_LEN;
|
|
wdev->wiphy->wowlan.pattern_max_len = WL_WOWLAN_MAX_PATTERN_LEN;
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 9, 0))
|
|
wdev->wiphy->wowlan.max_pkt_offset = WL_WOWLAN_MAX_PATTERN_LEN;
|
|
#endif /* LINUX_VERSION_CODE >= KERNEL_VERSION(3, 9, 0) */
|
|
#endif /* LINUX_VERSION_CODE >= KERNEL_VERSION(3, 11, 0) */
|
|
#endif /* CONFIG_PM && WL_CFG80211_P2P_DEV_IF */
|
|
|
|
WL_DBG(("Registering custom regulatory)\n"));
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 14, 0))
|
|
wdev->wiphy->regulatory_flags |=
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 19, 0))
|
|
REGULATORY_IGNORE_STALE_KICKOFF |
|
|
#endif /* LINUX_VERSION_CODE >= KERNEL_VERSION(3, 19, 0) */
|
|
REGULATORY_CUSTOM_REG;
|
|
#else
|
|
wdev->wiphy->flags |= WIPHY_FLAG_CUSTOM_REGULATORY;
|
|
#endif /* LINUX_VERSION_CODE >= KERNEL_VERSION(3, 14, 0) */
|
|
wiphy_apply_custom_regulatory(wdev->wiphy, &brcm_regdom);
|
|
|
|
#if (LINUX_VERSION_CODE > KERNEL_VERSION(3, 14, 0)) || defined(WL_VENDOR_EXT_SUPPORT)
|
|
WL_INFORM_MEM(("Registering Vendor80211\n"));
|
|
err = wl_cfgvendor_attach(wdev->wiphy, dhd);
|
|
if (unlikely(err < 0)) {
|
|
WL_ERR(("Couldn not attach vendor commands (%d)\n", err));
|
|
}
|
|
#endif /* (LINUX_VERSION_CODE > KERNEL_VERSION(3, 14, 0)) || defined(WL_VENDOR_EXT_SUPPORT) */
|
|
#ifdef WL_FILS
|
|
wiphy_ext_feature_set(wdev->wiphy, NL80211_EXT_FEATURE_FILS_SK_OFFLOAD);
|
|
#endif /* WL_FILS */
|
|
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 17, 0))
|
|
wdev->wiphy->flags |= WIPHY_FLAG_HAS_CHANNEL_SWITCH;
|
|
wdev->wiphy->max_num_csa_counters = WL_MAX_NUM_CSA_COUNTERS;
|
|
#endif /* LINUX_VERSION_CODE > KERNEL_VERSION(3, 12, 0) */
|
|
|
|
/* Now we can register wiphy with cfg80211 module */
|
|
err = wiphy_register(wdev->wiphy);
|
|
if (unlikely(err < 0)) {
|
|
WL_ERR(("Couldn not register wiphy device (%d)\n", err));
|
|
wiphy_free(wdev->wiphy);
|
|
}
|
|
|
|
#if ((LINUX_VERSION_CODE >= KERNEL_VERSION(3, 0, 0)) && (LINUX_VERSION_CODE <= \
|
|
KERNEL_VERSION(3, 3, 0))) && defined(WL_IFACE_COMB_NUM_CHANNELS)
|
|
wdev->wiphy->flags &= ~WIPHY_FLAG_ENFORCE_COMBINATIONS;
|
|
#endif // endif
|
|
|
|
#if defined(WL_SAE) || defined(WL_CLIENT_SAE)
|
|
wdev->wiphy->features |= NL80211_FEATURE_SAE;
|
|
#endif /* WL_SAE || WL_CLIENT_SAE */
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(4, 13, 0)) && defined(BCMSUP_4WAY_HANDSHAKE)
|
|
if (FW_SUPPORTED(dhd, idsup)) {
|
|
err = wiphy_ext_feature_set(wdev->wiphy,
|
|
NL80211_EXT_FEATURE_4WAY_HANDSHAKE_STA_PSK);
|
|
if (err) {
|
|
return err;
|
|
}
|
|
err = wiphy_ext_feature_set(wdev->wiphy,
|
|
NL80211_EXT_FEATURE_4WAY_HANDSHAKE_STA_1X);
|
|
if (err) {
|
|
return err;
|
|
}
|
|
}
|
|
#endif /* LINUX_VERSION_CODE >= KERNEL_VERSION(4, 13, 0) && defined(BCMSUP_4WAY_HANDSHAKE) */
|
|
#ifdef WL_SCAN_TYPE
|
|
/* These scan types will be mapped to default scan on non-supported chipset */
|
|
/* Advertise scan type capability. */
|
|
wiphy_ext_feature_set(wdev->wiphy, NL80211_EXT_FEATURE_LOW_SPAN_SCAN);
|
|
wiphy_ext_feature_set(wdev->wiphy, NL80211_EXT_FEATURE_LOW_POWER_SCAN);
|
|
wiphy_ext_feature_set(wdev->wiphy, NL80211_EXT_FEATURE_HIGH_ACCURACY_SCAN);
|
|
wdev->wiphy->features |= NL80211_FEATURE_LOW_PRIORITY_SCAN;
|
|
#endif /* WL_SCAN_TYPE */
|
|
|
|
return err;
|
|
}
|
|
|
|
static void wl_free_wdev(struct bcm_cfg80211 *cfg)
|
|
{
|
|
struct wireless_dev *wdev = cfg->wdev;
|
|
struct wiphy *wiphy = NULL;
|
|
if (!wdev) {
|
|
WL_ERR(("wdev is invalid\n"));
|
|
return;
|
|
}
|
|
if (wdev->wiphy) {
|
|
wiphy = wdev->wiphy;
|
|
|
|
#if (LINUX_VERSION_CODE > KERNEL_VERSION(3, 14, 0)) || defined(WL_VENDOR_EXT_SUPPORT)
|
|
wl_cfgvendor_detach(wdev->wiphy);
|
|
#endif /* (LINUX_VERSION_CODE > KERNEL_VERSION(3, 14, 0)) || defined(WL_VENDOR_EXT_SUPPORT) */
|
|
#if defined(CONFIG_PM) && defined(WL_CFG80211_P2P_DEV_IF)
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 11, 0))
|
|
/* Reset wowlan & wowlan_config before Unregister to avoid Kernel Panic */
|
|
WL_DBG(("clear wowlan\n"));
|
|
wdev->wiphy->wowlan = NULL;
|
|
#endif /* LINUX_VERSION_CODE >= KERNEL_VERSION(3, 11, 0) */
|
|
#endif /* CONFIG_PM && WL_CFG80211_P2P_DEV_IF */
|
|
wiphy_unregister(wdev->wiphy);
|
|
wdev->wiphy->dev.parent = NULL;
|
|
wdev->wiphy = NULL;
|
|
}
|
|
|
|
wl_delete_all_netinfo(cfg);
|
|
if (wiphy) {
|
|
if (wdev->netdev)
|
|
wdev->netdev->ieee80211_ptr = NULL;
|
|
wdev->netdev = NULL;
|
|
MFREE(cfg->osh, wdev, sizeof(*wdev));
|
|
cfg->wdev = NULL;
|
|
wiphy_free(wiphy);
|
|
}
|
|
|
|
/* PLEASE do NOT call any function after wiphy_free, the driver's private structure "cfg",
|
|
* which is the private part of wiphy, has been freed in wiphy_free !!!!!!!!!!!
|
|
*/
|
|
}
|
|
|
|
#if defined(BSSCACHE) || defined(RSSIAVG)
|
|
void wl_cfg80211_update_bss_cache(struct bcm_cfg80211 *cfg)
|
|
{
|
|
#if defined(RSSIAVG)
|
|
int rssi;
|
|
#endif
|
|
struct wl_scan_results *bss_list = cfg->bss_list;
|
|
|
|
/* Free cache in p2p scanning*/
|
|
if (p2p_is_on(cfg) && p2p_scan(cfg)) {
|
|
#if defined(RSSIAVG)
|
|
wl_free_rssi_cache(&cfg->g_rssi_cache_ctrl);
|
|
#endif
|
|
#if defined(BSSCACHE)
|
|
wl_free_bss_cache(&cfg->g_bss_cache_ctrl);
|
|
#endif
|
|
}
|
|
|
|
/* Delete disconnected cache */
|
|
#if defined(BSSCACHE)
|
|
wl_delete_disconnected_bss_cache(&cfg->g_bss_cache_ctrl,
|
|
(u8*)&cfg->disconnected_bssid);
|
|
#if defined(RSSIAVG)
|
|
wl_delete_disconnected_rssi_cache(&cfg->g_rssi_cache_ctrl,
|
|
(u8*)&cfg->disconnected_bssid);
|
|
#endif
|
|
if (cfg->p2p_disconnected == 0)
|
|
memset(&cfg->disconnected_bssid, 0, ETHER_ADDR_LEN);
|
|
#endif
|
|
|
|
/* Update cache */
|
|
#if defined(RSSIAVG)
|
|
wl_update_rssi_cache(&cfg->g_rssi_cache_ctrl, bss_list);
|
|
if (!in_atomic())
|
|
wl_update_connected_rssi_cache(ndev, &cfg->g_rssi_cache_ctrl, &rssi);
|
|
#endif
|
|
#if defined(BSSCACHE)
|
|
wl_update_bss_cache(&cfg->g_bss_cache_ctrl,
|
|
#if defined(RSSIAVG)
|
|
&cfg->g_rssi_cache_ctrl,
|
|
#endif
|
|
bss_list);
|
|
#endif
|
|
|
|
/* delete dirty cache */
|
|
#if defined(RSSIAVG)
|
|
wl_delete_dirty_rssi_cache(&cfg->g_rssi_cache_ctrl);
|
|
wl_reset_rssi_cache(&cfg->g_rssi_cache_ctrl);
|
|
#endif
|
|
#if defined(BSSCACHE)
|
|
wl_delete_dirty_bss_cache(&cfg->g_bss_cache_ctrl);
|
|
wl_reset_bss_cache(&cfg->g_bss_cache_ctrl);
|
|
#endif
|
|
|
|
}
|
|
#endif
|
|
|
|
#if defined(BSSCACHE)
|
|
s32 wl_inform_bss_cache(struct bcm_cfg80211 *cfg)
|
|
{
|
|
struct wl_scan_results *bss_list = cfg->bss_list;
|
|
wl_bss_info_t *bi = NULL; /* must be initialized */
|
|
s32 err = 0;
|
|
s32 i;
|
|
struct net_device *ndev = bcmcfg_to_prmry_ndev(cfg);
|
|
#if defined(BSSCACHE)
|
|
wl_bss_cache_t *node;
|
|
#endif
|
|
|
|
if (cfg->p2p_disconnected > 0) {
|
|
// terence 20130703: Fix for wrong group_capab (timing issue)
|
|
wl_delete_disconnected_bss_cache(&cfg->g_bss_cache_ctrl, (u8*)&cfg->disconnected_bssid);
|
|
#if defined(RSSIAVG)
|
|
wl_delete_disconnected_rssi_cache(&cfg->g_rssi_cache_ctrl, (u8*)&cfg->disconnected_bssid);
|
|
#endif
|
|
}
|
|
WL_SCAN(("scanned AP count (%d)\n", bss_list->count));
|
|
node = cfg->g_bss_cache_ctrl.m_cache_head;
|
|
for (i=0; node && i<WL_AP_MAX; i++) {
|
|
bi = node->results.bss_info;
|
|
err = wl_inform_single_bss(cfg, bi, false);
|
|
node = node->next;
|
|
}
|
|
if (cfg->autochannel)
|
|
wl_ext_get_best_channel(ndev, &cfg->g_bss_cache_ctrl, ioctl_version,
|
|
&cfg->best_2g_ch, &cfg->best_5g_ch);
|
|
|
|
return err;
|
|
}
|
|
#endif
|
|
|
|
s32 wl_inform_bss(struct bcm_cfg80211 *cfg)
|
|
{
|
|
#if !defined(BSSCACHE)
|
|
struct wl_scan_results *bss_list;
|
|
wl_bss_info_t *bi = NULL; /* must be initialized */
|
|
s32 i;
|
|
struct net_device *ndev = bcmcfg_to_prmry_ndev(cfg);
|
|
#endif
|
|
s32 err = 0;
|
|
|
|
#if defined(BSSCACHE) || defined(RSSIAVG)
|
|
wl_cfg80211_update_bss_cache(cfg);
|
|
#endif
|
|
|
|
#if defined(BSSCACHE)
|
|
err = wl_inform_bss_cache(cfg);
|
|
#else
|
|
bss_list = cfg->bss_list;
|
|
WL_SCAN(("scanned AP count (%d)\n", bss_list->count));
|
|
#ifdef ESCAN_CHANNEL_CACHE
|
|
reset_roam_cache(cfg);
|
|
#endif /* ESCAN_CHANNEL_CACHE */
|
|
preempt_disable();
|
|
bi = next_bss(bss_list, bi);
|
|
for_each_bss(bss_list, bi, i) {
|
|
if (cfg->p2p_disconnected > 0 &&
|
|
!memcmp(&bi->BSSID, &cfg->disconnected_bssid, ETHER_ADDR_LEN)) {
|
|
WL_SCAN(("Skip %pM\n", &bi->BSSID));
|
|
continue;
|
|
}
|
|
#ifdef ESCAN_CHANNEL_CACHE
|
|
add_roam_cache(cfg, bi);
|
|
#endif /* ESCAN_CHANNEL_CACHE */
|
|
err = wl_inform_single_bss(cfg, bi, false);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("bss inform failed\n"));
|
|
}
|
|
}
|
|
preempt_enable();
|
|
if (cfg->autochannel)
|
|
wl_ext_get_best_channel(ndev, bss_list, ioctl_version,
|
|
&cfg->best_2g_ch, &cfg->best_5g_ch);
|
|
#endif
|
|
|
|
if (cfg->p2p_disconnected > 0) {
|
|
// terence 20130703: Fix for wrong group_capab (timing issue)
|
|
cfg->p2p_disconnected++;
|
|
if (cfg->p2p_disconnected >= 2) {
|
|
cfg->p2p_disconnected = 0;
|
|
memset(&cfg->disconnected_bssid, 0, ETHER_ADDR_LEN);
|
|
}
|
|
}
|
|
WL_MEM(("cfg80211 scan cache updated\n"));
|
|
#ifdef ROAM_CHANNEL_CACHE
|
|
/* print_roam_cache(); */
|
|
update_roam_cache(cfg, ioctl_version);
|
|
#endif /* ROAM_CHANNEL_CACHE */
|
|
return err;
|
|
}
|
|
|
|
static s32 wl_inform_single_bss(struct bcm_cfg80211 *cfg, wl_bss_info_t *bi, bool update_ssid)
|
|
{
|
|
struct wiphy *wiphy = bcmcfg_to_wiphy(cfg);
|
|
struct ieee80211_mgmt *mgmt;
|
|
struct ieee80211_channel *channel;
|
|
struct ieee80211_supported_band *band;
|
|
struct wl_cfg80211_bss_info *notif_bss_info;
|
|
struct wl_scan_req *sr = wl_to_sr(cfg);
|
|
struct beacon_proberesp *beacon_proberesp;
|
|
struct cfg80211_bss *cbss = NULL;
|
|
dhd_pub_t *dhdp = (dhd_pub_t *)(cfg->pub);
|
|
log_conn_event_t *event_data = NULL;
|
|
tlv_log *tlv_data = NULL;
|
|
u32 alloc_len, tlv_len;
|
|
u32 payload_len;
|
|
s32 mgmt_type;
|
|
s32 signal;
|
|
u32 freq;
|
|
s32 err = 0;
|
|
gfp_t aflags;
|
|
u8 tmp_buf[IEEE80211_MAX_SSID_LEN + 1];
|
|
chanspec_t chanspec;
|
|
|
|
if (unlikely(dtoh32(bi->length) > WL_BSS_INFO_MAX)) {
|
|
WL_DBG(("Beacon is larger than buffer. Discarding\n"));
|
|
return err;
|
|
}
|
|
|
|
if (bi->SSID_len > IEEE80211_MAX_SSID_LEN) {
|
|
WL_ERR(("wrong SSID len:%d\n", bi->SSID_len));
|
|
return -EINVAL;
|
|
}
|
|
|
|
aflags = (in_atomic()) ? GFP_ATOMIC : GFP_KERNEL;
|
|
notif_bss_info = (struct wl_cfg80211_bss_info *)MALLOCZ(cfg->osh,
|
|
sizeof(*notif_bss_info) + sizeof(*mgmt) - sizeof(u8) + WL_BSS_INFO_MAX);
|
|
if (unlikely(!notif_bss_info)) {
|
|
WL_ERR(("notif_bss_info alloc failed\n"));
|
|
return -ENOMEM;
|
|
}
|
|
mgmt = (struct ieee80211_mgmt *)notif_bss_info->frame_buf;
|
|
chanspec = wl_chspec_driver_to_host(bi->chanspec);
|
|
notif_bss_info->channel = wf_chspec_ctlchan(chanspec);
|
|
|
|
if (notif_bss_info->channel <= CH_MAX_2G_CHANNEL)
|
|
band = wiphy->bands[IEEE80211_BAND_2GHZ];
|
|
else
|
|
band = wiphy->bands[IEEE80211_BAND_5GHZ];
|
|
if (!band) {
|
|
WL_ERR(("No valid band\n"));
|
|
MFREE(cfg->osh, notif_bss_info, sizeof(*notif_bss_info)
|
|
+ sizeof(*mgmt) - sizeof(u8) + WL_BSS_INFO_MAX);
|
|
return -EINVAL;
|
|
}
|
|
notif_bss_info->rssi = dtoh16(bi->RSSI);
|
|
#if defined(RSSIAVG)
|
|
notif_bss_info->rssi = wl_get_avg_rssi(&cfg->g_rssi_cache_ctrl, &bi->BSSID);
|
|
if (notif_bss_info->rssi == RSSI_MINVAL)
|
|
notif_bss_info->rssi = MIN(dtoh16(bi->RSSI), RSSI_MAXVAL);
|
|
#endif
|
|
#if defined(RSSIOFFSET)
|
|
notif_bss_info->rssi = wl_update_rssi_offset(bcmcfg_to_prmry_ndev(cfg), notif_bss_info->rssi);
|
|
#endif
|
|
#if !defined(RSSIAVG) && !defined(RSSIOFFSET)
|
|
// terence 20150419: limit the max. rssi to -2 or the bss will be filtered out in android OS
|
|
notif_bss_info->rssi = MIN(notif_bss_info->rssi, RSSI_MAXVAL);
|
|
#endif
|
|
memcpy(mgmt->bssid, &bi->BSSID, ETHER_ADDR_LEN);
|
|
mgmt_type = cfg->active_scan ?
|
|
IEEE80211_STYPE_PROBE_RESP : IEEE80211_STYPE_BEACON;
|
|
if (!memcmp(bi->SSID, sr->ssid.SSID, bi->SSID_len)) {
|
|
mgmt->frame_control = cpu_to_le16(IEEE80211_FTYPE_MGMT | mgmt_type);
|
|
}
|
|
beacon_proberesp = cfg->active_scan ?
|
|
(struct beacon_proberesp *)&mgmt->u.probe_resp :
|
|
(struct beacon_proberesp *)&mgmt->u.beacon;
|
|
beacon_proberesp->timestamp = 0;
|
|
beacon_proberesp->beacon_int = cpu_to_le16(bi->beacon_period);
|
|
beacon_proberesp->capab_info = cpu_to_le16(bi->capability);
|
|
wl_rst_ie(cfg);
|
|
wl_update_hidden_ap_ie(bi, ((u8 *) bi) + bi->ie_offset, &bi->ie_length, update_ssid);
|
|
wl_mrg_ie(cfg, ((u8 *) bi) + bi->ie_offset, bi->ie_length);
|
|
wl_cp_ie(cfg, beacon_proberesp->variable, WL_BSS_INFO_MAX -
|
|
offsetof(struct wl_cfg80211_bss_info, frame_buf));
|
|
notif_bss_info->frame_len = offsetof(struct ieee80211_mgmt,
|
|
u.beacon.variable) + wl_get_ielen(cfg);
|
|
#if LINUX_VERSION_CODE < KERNEL_VERSION(2, 6, 39) && !defined(WL_COMPAT_WIRELESS)
|
|
freq = ieee80211_channel_to_frequency(notif_bss_info->channel);
|
|
(void)band->band;
|
|
#else
|
|
freq = ieee80211_channel_to_frequency(notif_bss_info->channel, band->band);
|
|
#endif // endif
|
|
if (freq == 0) {
|
|
WL_ERR(("Invalid channel, fail to change channel to freq\n"));
|
|
MFREE(cfg->osh, notif_bss_info, sizeof(*notif_bss_info)
|
|
+ sizeof(*mgmt) - sizeof(u8) + WL_BSS_INFO_MAX);
|
|
return -EINVAL;
|
|
}
|
|
channel = ieee80211_get_channel(wiphy, freq);
|
|
memcpy(tmp_buf, bi->SSID, bi->SSID_len);
|
|
tmp_buf[bi->SSID_len] = '\0';
|
|
WL_SCAN(("BSSID %pM, channel %3d(%3d %sMHz), rssi %3d, capa 0x04%x, mgmt_type %d, "
|
|
"frame_len %d, SSID \"%s\"\n",
|
|
&bi->BSSID, notif_bss_info->channel, CHSPEC_CHANNEL(chanspec),
|
|
CHSPEC_IS20(chanspec)?"20":
|
|
CHSPEC_IS40(chanspec)?"40":
|
|
CHSPEC_IS80(chanspec)?"80":"160",
|
|
notif_bss_info->rssi, mgmt->u.beacon.capab_info, mgmt_type,
|
|
notif_bss_info->frame_len, tmp_buf));
|
|
if (unlikely(!channel)) {
|
|
WL_ERR(("ieee80211_get_channel error, freq=%d, channel=%d\n",
|
|
freq, notif_bss_info->channel));
|
|
MFREE(cfg->osh, notif_bss_info, sizeof(*notif_bss_info)
|
|
+ sizeof(*mgmt) - sizeof(u8) + WL_BSS_INFO_MAX);
|
|
return -EINVAL;
|
|
}
|
|
|
|
signal = notif_bss_info->rssi * 100;
|
|
if (!mgmt->u.probe_resp.timestamp) {
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(2, 6, 39))
|
|
struct osl_timespec ts;
|
|
osl_get_monotonic_boottime(&ts);
|
|
mgmt->u.probe_resp.timestamp = ((u64)ts.tv_sec*1000000)
|
|
+ ts.tv_nsec / 1000;
|
|
#else
|
|
struct osl_timespec tv;
|
|
osl_do_gettimeofday(&tv);
|
|
mgmt->u.probe_resp.timestamp = ((u64)tv.tv_sec*1000000)
|
|
+ tv.tv_usec;
|
|
#endif // endif
|
|
}
|
|
|
|
cbss = cfg80211_inform_bss_frame(wiphy, channel, mgmt,
|
|
le16_to_cpu(notif_bss_info->frame_len), signal, aflags);
|
|
if (unlikely(!cbss)) {
|
|
WL_ERR(("cfg80211_inform_bss_frame error bssid " MACDBG " channel %d \n",
|
|
MAC2STRDBG((u8*)(&bi->BSSID)), notif_bss_info->channel));
|
|
err = -EINVAL;
|
|
goto out_err;
|
|
}
|
|
|
|
CFG80211_PUT_BSS(wiphy, cbss);
|
|
|
|
if (DBG_RING_ACTIVE(dhdp, DHD_EVENT_RING_ID) &&
|
|
(cfg->sched_scan_req && !cfg->scan_request)) {
|
|
alloc_len = sizeof(log_conn_event_t) + IEEE80211_MAX_SSID_LEN + sizeof(uint16) +
|
|
sizeof(int16);
|
|
event_data = (log_conn_event_t *)MALLOCZ(dhdp->osh, alloc_len);
|
|
if (!event_data) {
|
|
WL_ERR(("%s: failed to allocate the log_conn_event_t with "
|
|
"length(%d)\n", __func__, alloc_len));
|
|
goto out_err;
|
|
}
|
|
tlv_len = 3 * sizeof(tlv_log);
|
|
event_data->tlvs = (tlv_log *)MALLOCZ(cfg->osh, tlv_len);
|
|
if (!event_data->tlvs) {
|
|
WL_ERR(("%s: failed to allocate the log_conn_event_t with "
|
|
"length(%d)\n", __func__, tlv_len));
|
|
goto free_evt_data;
|
|
}
|
|
|
|
payload_len = sizeof(log_conn_event_t);
|
|
event_data->event = WIFI_EVENT_DRIVER_PNO_SCAN_RESULT_FOUND;
|
|
tlv_data = event_data->tlvs;
|
|
|
|
/* ssid */
|
|
tlv_data->tag = WIFI_TAG_SSID;
|
|
tlv_data->len = bi->SSID_len;
|
|
memcpy(tlv_data->value, bi->SSID, bi->SSID_len);
|
|
payload_len += TLV_LOG_SIZE(tlv_data);
|
|
tlv_data = TLV_LOG_NEXT(tlv_data);
|
|
|
|
/* channel */
|
|
tlv_data->tag = WIFI_TAG_CHANNEL;
|
|
tlv_data->len = sizeof(uint16);
|
|
memcpy(tlv_data->value, ¬if_bss_info->channel, sizeof(uint16));
|
|
payload_len += TLV_LOG_SIZE(tlv_data);
|
|
tlv_data = TLV_LOG_NEXT(tlv_data);
|
|
|
|
/* rssi */
|
|
tlv_data->tag = WIFI_TAG_RSSI;
|
|
tlv_data->len = sizeof(int16);
|
|
memcpy(tlv_data->value, ¬if_bss_info->rssi, sizeof(int16));
|
|
payload_len += TLV_LOG_SIZE(tlv_data);
|
|
tlv_data = TLV_LOG_NEXT(tlv_data);
|
|
|
|
dhd_os_push_push_ring_data(dhdp, DHD_EVENT_RING_ID,
|
|
event_data, payload_len);
|
|
MFREE(dhdp->osh, event_data->tlvs, tlv_len);
|
|
free_evt_data:
|
|
MFREE(dhdp->osh, event_data, alloc_len);
|
|
}
|
|
|
|
out_err:
|
|
MFREE(cfg->osh, notif_bss_info, sizeof(*notif_bss_info)
|
|
+ sizeof(*mgmt) - sizeof(u8) + WL_BSS_INFO_MAX);
|
|
return err;
|
|
}
|
|
|
|
static bool wl_is_linkup(struct bcm_cfg80211 *cfg, const wl_event_msg_t *e, struct net_device *ndev)
|
|
{
|
|
u32 event = ntoh32(e->event_type);
|
|
u32 status = ntoh32(e->status);
|
|
u16 flags = ntoh16(e->flags);
|
|
#if defined(CUSTOM_SET_ANTNPM)
|
|
dhd_pub_t *dhd;
|
|
dhd = (dhd_pub_t *)(cfg->pub);
|
|
#endif // endif
|
|
|
|
WL_DBG(("event %d, status %d flags %x\n", event, status, flags));
|
|
if (event == WLC_E_SET_SSID) {
|
|
if (status == WLC_E_STATUS_SUCCESS) {
|
|
#ifdef CUSTOM_SET_ANTNPM
|
|
if (dhd->mimo_ant_set) {
|
|
int err = 0;
|
|
|
|
WL_ERR(("[WIFI_SEC] mimo_ant_set = %d\n", dhd->mimo_ant_set));
|
|
err = wldev_iovar_setint(ndev, "txchain", dhd->mimo_ant_set);
|
|
if (err != 0) {
|
|
WL_ERR(("[WIFI_SEC] Fail set txchain\n"));
|
|
}
|
|
err = wldev_iovar_setint(ndev, "rxchain", dhd->mimo_ant_set);
|
|
if (err != 0) {
|
|
WL_ERR(("[WIFI_SEC] Fail set rxchain\n"));
|
|
}
|
|
}
|
|
#endif /* CUSTOM_SET_ANTNPM */
|
|
if (!wl_is_ibssmode(cfg, ndev))
|
|
return true;
|
|
}
|
|
} else if (event == WLC_E_LINK) {
|
|
if (flags & WLC_EVENT_MSG_LINK)
|
|
return true;
|
|
}
|
|
|
|
WL_DBG(("wl_is_linkup false\n"));
|
|
return false;
|
|
}
|
|
|
|
static bool wl_is_linkdown(struct bcm_cfg80211 *cfg, const wl_event_msg_t *e)
|
|
{
|
|
u32 event = ntoh32(e->event_type);
|
|
u16 flags = ntoh16(e->flags);
|
|
|
|
if (event == WLC_E_DEAUTH_IND ||
|
|
event == WLC_E_DISASSOC_IND ||
|
|
event == WLC_E_DISASSOC ||
|
|
event == WLC_E_DEAUTH) {
|
|
WL_ERR(("Link down Reason : %s\n", bcmevent_get_name(event)));
|
|
return true;
|
|
} else if (event == WLC_E_LINK) {
|
|
if (!(flags & WLC_EVENT_MSG_LINK)) {
|
|
WL_ERR(("Link down Reason : %s\n", bcmevent_get_name(event)));
|
|
return true;
|
|
}
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
static bool wl_is_nonetwork(struct bcm_cfg80211 *cfg, const wl_event_msg_t *e)
|
|
{
|
|
u32 event = ntoh32(e->event_type);
|
|
u32 status = ntoh32(e->status);
|
|
|
|
if (event == WLC_E_LINK && status == WLC_E_STATUS_NO_NETWORKS)
|
|
return true;
|
|
if (event == WLC_E_SET_SSID && status != WLC_E_STATUS_SUCCESS)
|
|
return true;
|
|
if (event == WLC_E_ASSOC_RESP_IE && status != WLC_E_STATUS_SUCCESS)
|
|
return true;
|
|
|
|
return false;
|
|
}
|
|
|
|
#ifdef WL_SAE
|
|
static s32
|
|
wl_cfg80211_event_sae_key(struct bcm_cfg80211 *cfg, struct net_device *ndev,
|
|
wl_sae_key_info_t *sae_key)
|
|
{
|
|
struct sk_buff *skb;
|
|
gfp_t kflags;
|
|
struct wiphy *wiphy = bcmcfg_to_wiphy(cfg);
|
|
int err = BCME_OK;
|
|
|
|
kflags = in_atomic() ? GFP_ATOMIC : GFP_KERNEL;
|
|
#if (defined(CONFIG_ARCH_MSM) && defined(SUPPORT_WDEV_CFG80211_VENDOR_EVENT_ALLOC)) || \
|
|
LINUX_VERSION_CODE >= KERNEL_VERSION(4, 1, 0)
|
|
skb = cfg80211_vendor_event_alloc(wiphy, ndev_to_wdev(ndev), BRCM_SAE_VENDOR_EVENT_BUF_LEN,
|
|
BRCM_VENDOR_EVENT_SAE_KEY, kflags);
|
|
#else
|
|
skb = cfg80211_vendor_event_alloc(wiphy, BRCM_SAE_VENDOR_EVENT_BUF_LEN,
|
|
BRCM_VENDOR_EVENT_SAE_KEY, kflags);
|
|
#endif /* (defined(CONFIG_ARCH_MSM) && defined(SUPPORT_WDEV_CFG80211_VENDOR_EVENT_ALLOC)) || */
|
|
/* LINUX_VERSION_CODE >= KERNEL_VERSION(4, 1, 0) */
|
|
if (!skb) {
|
|
WL_ERR(("skb alloc failed"));
|
|
err = BCME_NOMEM;
|
|
goto done;
|
|
}
|
|
|
|
WL_INFORM_MEM(("Received Sae Key event for "MACDBG" key length %x %x",
|
|
MAC2STRDBG(sae_key->peer_mac), sae_key->pmk_len, sae_key->pmkid_len));
|
|
nla_put(skb, BRCM_SAE_KEY_ATTR_PEER_MAC, ETHER_ADDR_LEN, sae_key->peer_mac);
|
|
nla_put(skb, BRCM_SAE_KEY_ATTR_PMK, sae_key->pmk_len, sae_key->pmk);
|
|
nla_put(skb, BRCM_SAE_KEY_ATTR_PMKID, sae_key->pmkid_len, sae_key->pmkid);
|
|
cfg80211_vendor_event(skb, kflags);
|
|
|
|
done:
|
|
return err;
|
|
}
|
|
|
|
static s32
|
|
wl_bss_handle_sae_auth(struct bcm_cfg80211 *cfg, struct net_device *ndev,
|
|
const wl_event_msg_t *event, void *data)
|
|
{
|
|
int err = BCME_OK;
|
|
uint status = ntoh32(event->status);
|
|
wl_auth_event_t *auth_data;
|
|
wl_sae_key_info_t sae_key;
|
|
uint16 tlv_buf_len;
|
|
|
|
if (status == WLC_E_STATUS_SUCCESS) {
|
|
auth_data = (wl_auth_event_t *)data;
|
|
if (auth_data->version != WL_AUTH_EVENT_DATA_V1) {
|
|
WL_ERR(("unknown auth event data version %x\n",
|
|
auth_data->version));
|
|
err = BCME_VERSION;
|
|
goto done;
|
|
}
|
|
|
|
tlv_buf_len = auth_data->length - WL_AUTH_EVENT_FIXED_LEN_V1;
|
|
|
|
/* check if PMK info present */
|
|
sae_key.pmk = bcm_get_data_from_xtlv_buf(auth_data->xtlvs, tlv_buf_len,
|
|
WL_AUTH_PMK_TLV_ID, &(sae_key.pmk_len), BCM_XTLV_OPTION_ALIGN32);
|
|
if (!sae_key.pmk || !sae_key.pmk_len) {
|
|
WL_ERR(("Mandatory PMK info not present"));
|
|
err = BCME_NOTFOUND;
|
|
goto done;
|
|
}
|
|
/* check if PMKID info present */
|
|
sae_key.pmkid = bcm_get_data_from_xtlv_buf(auth_data->xtlvs, tlv_buf_len,
|
|
WL_AUTH_PMKID_TLV_ID, &(sae_key.pmkid_len), BCM_XTLV_OPTION_ALIGN32);
|
|
if (!sae_key.pmkid || !sae_key.pmkid_len) {
|
|
WL_ERR(("Mandatory PMKID info not present\n"));
|
|
err = BCME_NOTFOUND;
|
|
goto done;
|
|
}
|
|
memcpy_s(sae_key.peer_mac, ETHER_ADDR_LEN, event->addr.octet, ETHER_ADDR_LEN);
|
|
err = wl_cfg80211_event_sae_key(cfg, ndev, &sae_key);
|
|
if (err) {
|
|
WL_ERR(("Failed to event sae key info\n"));
|
|
}
|
|
} else {
|
|
WL_ERR(("sae auth status failure:%d\n", status));
|
|
}
|
|
done:
|
|
return err;
|
|
}
|
|
#endif /* WL_SAE */
|
|
|
|
static s32
|
|
wl_get_auth_assoc_status(struct bcm_cfg80211 *cfg, struct net_device *ndev,
|
|
const wl_event_msg_t *e, void *data)
|
|
{
|
|
u32 reason = ntoh32(e->reason);
|
|
u32 event = ntoh32(e->event_type);
|
|
#ifdef WL_SAE
|
|
uint auth_type = ntoh32(e->auth_type);
|
|
#endif /* WL_SAE */
|
|
struct wl_security *sec = wl_read_prof(cfg, ndev, WL_PROF_SEC);
|
|
WL_DBG(("event type : %d, reason : %d\n", event, reason));
|
|
|
|
if (sec) {
|
|
switch (event) {
|
|
case WLC_E_ASSOC:
|
|
case WLC_E_AUTH:
|
|
case WLC_E_AUTH_IND:
|
|
sec->auth_assoc_res_status = reason;
|
|
#ifdef WL_SAE
|
|
if ((event == WLC_E_AUTH || event == WLC_E_AUTH_IND) &&
|
|
auth_type == DOT11_SAE) {
|
|
wl_bss_handle_sae_auth(cfg, ndev, e, data);
|
|
}
|
|
#endif /* WL_SAE */
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
} else {
|
|
WL_ERR(("sec is NULL\n"));
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
#ifdef WL_CLIENT_SAE
|
|
static s32
|
|
wl_notify_connect_status_ap_auth(struct bcm_cfg80211 *cfg,
|
|
struct net_device *ndev, const wl_event_msg_t *e, void *data)
|
|
{
|
|
bcm_struct_cfgdev *cfgdev = ndev_to_cfgdev(ndev);
|
|
struct wiphy *wiphy = bcmcfg_to_wiphy(cfg);
|
|
u8 bsscfgidx = e->bsscfgidx;
|
|
u8 *mgmt_frame = NULL;
|
|
u8 *body = NULL;
|
|
u32 body_len = 0;
|
|
s32 chan;
|
|
u16 channel;
|
|
struct ieee80211_supported_band *band;
|
|
chanspec_t chanspec;
|
|
s32 freq;
|
|
struct ether_addr da;
|
|
struct ether_addr bssid;
|
|
u32 event = ntoh32(e->event_type);
|
|
u32 reason = ntoh32(e->reason);
|
|
u32 len = ntoh32(e->datalen);
|
|
s32 err = 0;
|
|
|
|
if (!len) {
|
|
WL_ERR(("event %s(%d) has no payload. status %d reason %d\n",
|
|
bcmevent_get_name(event), event, ntoh32(e->status), reason));
|
|
return 0;
|
|
}
|
|
|
|
body = (u8 *)MALLOCZ(cfg->osh, len);
|
|
if (body == NULL) {
|
|
WL_ERR(("Failed to allocate body\n"));
|
|
return WL_INVALID;
|
|
}
|
|
(void)memcpy_s(body, len, data, len);
|
|
|
|
err = wldev_iovar_getbuf_bsscfg(ndev, "cur_etheraddr",
|
|
NULL, 0, cfg->ioctl_buf, WLC_IOCTL_SMLEN, bsscfgidx, &cfg->ioctl_buf_sync);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("Could not get cur_etheraddr %d\n", err));
|
|
goto exit;
|
|
}
|
|
(void)memcpy_s(da.octet, ETHER_ADDR_LEN, cfg->ioctl_buf, ETHER_ADDR_LEN);
|
|
|
|
bzero(&bssid, sizeof(bssid));
|
|
err = wldev_ioctl_get(ndev, WLC_GET_BSSID, &bssid, ETHER_ADDR_LEN);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("Could not get bssid %d\n", err));
|
|
goto exit;
|
|
}
|
|
|
|
err = wldev_iovar_getint(ndev, "chanspec", &chan);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("Could not get chanspec %d\n", err));
|
|
goto exit;
|
|
}
|
|
chanspec = wl_chspec_driver_to_host(chan);
|
|
channel = wf_chspec_ctlchan(chanspec);
|
|
|
|
if (channel <= CH_MAX_2G_CHANNEL)
|
|
band = wiphy->bands[IEEE80211_BAND_2GHZ];
|
|
else
|
|
band = wiphy->bands[IEEE80211_BAND_5GHZ];
|
|
if (!band) {
|
|
WL_ERR(("No valid band\n"));
|
|
goto exit;
|
|
}
|
|
|
|
#if LINUX_VERSION_CODE < KERNEL_VERSION(2, 6, 39) && !defined(WL_COMPAT_WIRELESS)
|
|
freq = ieee80211_channel_to_frequency(channel);
|
|
#else
|
|
freq = ieee80211_channel_to_frequency(channel, band->band);
|
|
#endif
|
|
|
|
body_len = len;
|
|
err = wl_frame_get_mgmt(cfg, FC_AUTH, &da, &e->addr, &bssid,
|
|
&mgmt_frame, &len, body);
|
|
if (!err) {
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 18, 0))
|
|
cfg80211_rx_mgmt(cfgdev, freq, 0, mgmt_frame, len, 0);
|
|
#elif (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 4, 0))
|
|
cfg80211_rx_mgmt(ndev, freq, 0, mgmt_frame, len, GFP_ATOMIC);
|
|
#else
|
|
cfg80211_rx_mgmt(ndev, freq, mgmt_frame, len, GFP_ATOMIC);
|
|
#endif
|
|
MFREE(cfg->osh, mgmt_frame, len);
|
|
}
|
|
|
|
exit:
|
|
if (body) {
|
|
MFREE(cfg->osh, body, body_len);
|
|
}
|
|
|
|
return err;
|
|
}
|
|
#endif /* WL_CLIENT_SAE */
|
|
|
|
|
|
/* The mainline kernel >= 3.2.0 has support for indicating new/del station
|
|
* to AP/P2P GO via events. If this change is backported to kernel for which
|
|
* this driver is being built, then define WL_CFG80211_STA_EVENT. You
|
|
* should use this new/del sta event mechanism for BRCM supplicant >= 22.
|
|
*/
|
|
static s32
|
|
wl_notify_connect_status_ap(struct bcm_cfg80211 *cfg, struct net_device *ndev,
|
|
const wl_event_msg_t *e, void *data)
|
|
{
|
|
s32 err = 0;
|
|
u32 event = ntoh32(e->event_type);
|
|
u32 reason = ntoh32(e->reason);
|
|
u32 len = ntoh32(e->datalen);
|
|
u32 status = ntoh32(e->status);
|
|
|
|
#if !defined(WL_CFG80211_STA_EVENT) && !defined(WL_COMPAT_WIRELESS) && \
|
|
(LINUX_VERSION_CODE < KERNEL_VERSION(3, 2, 0))
|
|
bool isfree = false;
|
|
u8 *mgmt_frame;
|
|
u8 bsscfgidx = e->bsscfgidx;
|
|
s32 freq;
|
|
s32 channel;
|
|
u8 *body = NULL;
|
|
u16 fc = 0;
|
|
u32 body_len = 0;
|
|
|
|
struct ieee80211_supported_band *band;
|
|
struct ether_addr da;
|
|
struct ether_addr bssid;
|
|
struct wiphy *wiphy = bcmcfg_to_wiphy(cfg);
|
|
channel_info_t ci;
|
|
u8 ioctl_buf[WLC_IOCTL_SMLEN];
|
|
#else
|
|
struct station_info sinfo;
|
|
#endif /* (LINUX_VERSION < VERSION(3,2,0)) && !WL_CFG80211_STA_EVENT && !WL_COMPAT_WIRELESS */
|
|
|
|
WL_INFORM_MEM(("[%s] Mode AP/GO. Event:%d status:%d reason:%d\n",
|
|
ndev->name, event, ntoh32(e->status), reason));
|
|
|
|
if (event == WLC_E_AUTH_IND) {
|
|
wl_get_auth_assoc_status(cfg, ndev, e, data);
|
|
return 0;
|
|
}
|
|
/* if link down, bsscfg is disabled. */
|
|
if (event == WLC_E_LINK && reason == WLC_E_LINK_BSSCFG_DIS &&
|
|
wl_get_p2p_status(cfg, IF_DELETING) && (ndev != bcmcfg_to_prmry_ndev(cfg))) {
|
|
wl_add_remove_eventmsg(ndev, WLC_E_PROBREQ_MSG, false);
|
|
WL_MSG(ndev->name, "AP mode link down !! \n");
|
|
complete(&cfg->iface_disable);
|
|
return 0;
|
|
}
|
|
|
|
if ((event == WLC_E_LINK) && (status == WLC_E_STATUS_SUCCESS) &&
|
|
(reason == WLC_E_REASON_INITIAL_ASSOC) &&
|
|
(wl_get_mode_by_netdev(cfg, ndev) == WL_MODE_AP)) {
|
|
if (!wl_get_drv_status(cfg, AP_CREATED, ndev)) {
|
|
/* AP/GO brought up successfull in firmware */
|
|
WL_MSG(ndev->name, "AP/GO Link up\n");
|
|
wl_set_drv_status(cfg, AP_CREATED, ndev);
|
|
OSL_SMP_WMB();
|
|
wake_up_interruptible(&cfg->netif_change_event);
|
|
#ifdef WL_BCNRECV
|
|
/* check fakeapscan is in progress, if progress then abort */
|
|
wl_android_bcnrecv_stop(ndev, WL_BCNRECV_CONCURRENCY);
|
|
#endif /* WL_BCNRECV */
|
|
wl_cfg80211_check_in4way(cfg, ndev, 0, WL_EXT_STATUS_AP_ENABLED, NULL);
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
if (event == WLC_E_DISASSOC_IND || event == WLC_E_DEAUTH_IND || event == WLC_E_DEAUTH) {
|
|
WL_MSG_RLMT(ndev->name, &e->addr, ETHER_ADDR_LEN,
|
|
"event %s(%d) status %d reason %d\n",
|
|
bcmevent_get_name(event), event, ntoh32(e->status), reason);
|
|
}
|
|
|
|
#if !defined(WL_CFG80211_STA_EVENT) && !defined(WL_COMPAT_WIRELESS) && \
|
|
(LINUX_VERSION_CODE < KERNEL_VERSION(3, 2, 0))
|
|
WL_DBG(("Enter \n"));
|
|
if (!len && (event == WLC_E_DEAUTH)) {
|
|
len = 2; /* reason code field */
|
|
data = &reason;
|
|
}
|
|
if (len) {
|
|
body = (u8 *)MALLOCZ(cfg->osh, len);
|
|
if (body == NULL) {
|
|
WL_ERR(("Failed to allocate body\n"));
|
|
return WL_INVALID;
|
|
}
|
|
}
|
|
bzero(&bssid, ETHER_ADDR_LEN);
|
|
WL_DBG(("Enter event %d ndev %p\n", event, ndev));
|
|
if (wl_get_mode_by_netdev(cfg, ndev) == WL_INVALID) {
|
|
MFREE(cfg->osh, body, len);
|
|
return WL_INVALID;
|
|
}
|
|
if (len)
|
|
memcpy(body, data, len);
|
|
|
|
wldev_iovar_getbuf_bsscfg(ndev, "cur_etheraddr",
|
|
NULL, 0, ioctl_buf, sizeof(ioctl_buf), bsscfgidx, NULL);
|
|
memcpy(da.octet, ioctl_buf, ETHER_ADDR_LEN);
|
|
bzero(&bssid, sizeof(bssid));
|
|
err = wldev_ioctl_get(ndev, WLC_GET_BSSID, &bssid, ETHER_ADDR_LEN);
|
|
switch (event) {
|
|
case WLC_E_ASSOC_IND:
|
|
fc = FC_ASSOC_REQ;
|
|
break;
|
|
case WLC_E_REASSOC_IND:
|
|
fc = FC_REASSOC_REQ;
|
|
break;
|
|
case WLC_E_DISASSOC_IND:
|
|
fc = FC_DISASSOC;
|
|
break;
|
|
case WLC_E_DEAUTH_IND:
|
|
fc = FC_DISASSOC;
|
|
break;
|
|
case WLC_E_DEAUTH:
|
|
fc = FC_DISASSOC;
|
|
break;
|
|
default:
|
|
fc = 0;
|
|
goto exit;
|
|
}
|
|
bzero(&ci, sizeof(ci));
|
|
if ((err = wldev_ioctl_get(ndev, WLC_GET_CHANNEL, &ci, sizeof(ci)))) {
|
|
MFREE(cfg->osh, body, len);
|
|
return err;
|
|
}
|
|
|
|
channel = dtoh32(ci.hw_channel);
|
|
if (channel <= CH_MAX_2G_CHANNEL)
|
|
band = wiphy->bands[IEEE80211_BAND_2GHZ];
|
|
else
|
|
band = wiphy->bands[IEEE80211_BAND_5GHZ];
|
|
if (!band) {
|
|
WL_ERR(("No valid band\n"));
|
|
if (body) {
|
|
MFREE(cfg->osh, body, len);
|
|
}
|
|
return -EINVAL;
|
|
}
|
|
#if LINUX_VERSION_CODE < KERNEL_VERSION(2, 6, 39) && !defined(WL_COMPAT_WIRELESS)
|
|
freq = ieee80211_channel_to_frequency(channel);
|
|
(void)band->band;
|
|
#else
|
|
freq = ieee80211_channel_to_frequency(channel, band->band);
|
|
#endif // endif
|
|
body_len = len;
|
|
err = wl_frame_get_mgmt(cfg, fc, &da, &e->addr, &bssid,
|
|
&mgmt_frame, &len, body);
|
|
if (err < 0)
|
|
goto exit;
|
|
isfree = true;
|
|
|
|
if ((event == WLC_E_ASSOC_IND && reason == DOT11_SC_SUCCESS) ||
|
|
(event == WLC_E_DISASSOC_IND) ||
|
|
((event == WLC_E_DEAUTH_IND) || (event == WLC_E_DEAUTH))) {
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 18, 0))
|
|
cfg80211_rx_mgmt(ndev, freq, 0, mgmt_frame, len, 0);
|
|
#elif (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 12, 0))
|
|
cfg80211_rx_mgmt(ndev, freq, 0, mgmt_frame, len, 0, GFP_ATOMIC);
|
|
#elif (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 4, 0)) || \
|
|
defined(WL_COMPAT_WIRELESS)
|
|
cfg80211_rx_mgmt(ndev, freq, 0, mgmt_frame, len, GFP_ATOMIC);
|
|
#else
|
|
cfg80211_rx_mgmt(ndev, freq, mgmt_frame, len, GFP_ATOMIC);
|
|
#endif /* LINUX_VERSION >= VERSION(3, 18,0) || WL_COMPAT_WIRELESS */
|
|
}
|
|
|
|
exit:
|
|
if (isfree) {
|
|
MFREE(cfg->osh, mgmt_frame, len);
|
|
}
|
|
if (body) {
|
|
MFREE(cfg->osh, body, body_len);
|
|
}
|
|
#else /* LINUX_VERSION < VERSION(3,2,0) && !WL_CFG80211_STA_EVENT && !WL_COMPAT_WIRELESS */
|
|
memset(&sinfo, 0, sizeof(struct station_info));
|
|
sinfo.filled = 0;
|
|
if (((event == WLC_E_ASSOC_IND) || (event == WLC_E_REASSOC_IND)) &&
|
|
reason == DOT11_SC_SUCCESS) {
|
|
/* Linux ver >= 4.0 assoc_req_ies_len is used instead of
|
|
* STATION_INFO_ASSOC_REQ_IES flag
|
|
*/
|
|
#if (LINUX_VERSION_CODE < KERNEL_VERSION(4, 0, 0))
|
|
sinfo.filled = STA_INFO_BIT(INFO_ASSOC_REQ_IES);
|
|
#endif /* (LINUX_VERSION_CODE >= KERNEL_VERSION(4, 0, 0)) */
|
|
if (!data) {
|
|
WL_ERR(("No IEs present in ASSOC/REASSOC_IND"));
|
|
return -EINVAL;
|
|
}
|
|
sinfo.assoc_req_ies = data;
|
|
sinfo.assoc_req_ies_len = len;
|
|
WL_MSG(ndev->name, "new sta event for "MACDBG "\n",
|
|
MAC2STRDBG(e->addr.octet));
|
|
wl_cfg80211_check_in4way(cfg, ndev, DONT_DELETE_GC_AFTER_WPS,
|
|
WL_EXT_STATUS_STA_CONNECTED, NULL);
|
|
cfg80211_new_sta(ndev, e->addr.octet, &sinfo, GFP_ATOMIC);
|
|
#ifdef WL_WPS_SYNC
|
|
wl_wps_session_update(ndev, WPS_STATE_LINKUP, e->addr.octet);
|
|
#endif /* WL_WPS_SYNC */
|
|
} else if ((event == WLC_E_DEAUTH_IND) ||
|
|
((event == WLC_E_DEAUTH) && (reason != DOT11_RC_RESERVED)) ||
|
|
(event == WLC_E_DISASSOC_IND)) {
|
|
WL_MSG_RLMT(ndev->name, &e->addr, ETHER_ADDR_LEN,
|
|
"del sta event for "MACDBG "\n", MAC2STRDBG(e->addr.octet));
|
|
wl_cfg80211_check_in4way(cfg, ndev, DONT_DELETE_GC_AFTER_WPS,
|
|
WL_EXT_STATUS_STA_DISCONNECTED, NULL);
|
|
cfg80211_del_sta(ndev, e->addr.octet, GFP_ATOMIC);
|
|
#ifdef WL_WPS_SYNC
|
|
wl_wps_session_update(ndev, WPS_STATE_LINKDOWN, e->addr.octet);
|
|
#endif /* WL_WPS_SYNC */
|
|
}
|
|
#ifdef WL_CLIENT_SAE
|
|
else if (event == WLC_E_AUTH) {
|
|
WL_MSG_RLMT(ndev->name, &e->addr, ETHER_ADDR_LEN,
|
|
"add sta auth event for "MACDBG "\n", MAC2STRDBG(e->addr.octet));
|
|
if (wl_get_mode_by_netdev(cfg, ndev) == WL_INVALID) {
|
|
WL_ERR(("invalid mode\n"));
|
|
return WL_INVALID;
|
|
}
|
|
err = wl_notify_connect_status_ap_auth(cfg, ndev, e, data);
|
|
}
|
|
#endif /* WL_CLIENT_SAE */
|
|
#endif /* LINUX_VERSION < VERSION(3,2,0) && !WL_CFG80211_STA_EVENT && !WL_COMPAT_WIRELESS */
|
|
return err;
|
|
}
|
|
|
|
#ifdef WL_CLIENT_SAE
|
|
static s32
|
|
wl_notify_start_auth(struct bcm_cfg80211 *cfg,
|
|
bcm_struct_cfgdev *cfgdev, const wl_event_msg_t *e, void *data)
|
|
{
|
|
struct cfg80211_external_auth_params ext_auth_param;
|
|
struct net_device *ndev = cfgdev_to_wlc_ndev(cfgdev, cfg);
|
|
u32 datalen = be32_to_cpu(e->datalen);
|
|
wl_ext_auth_evt_t *evt_data = (wl_ext_auth_evt_t *)data;
|
|
wl_assoc_mgr_cmd_t cmd;
|
|
int err;
|
|
|
|
WL_DBG(("Enter\n"));
|
|
|
|
if (!datalen || !data)
|
|
return BCME_ERROR;
|
|
|
|
ext_auth_param.ssid.ssid_len = MIN(evt_data->ssid.SSID_len, DOT11_MAX_SSID_LEN);
|
|
if (ext_auth_param.ssid.ssid_len)
|
|
memcpy(&ext_auth_param.ssid.ssid, evt_data->ssid.SSID,
|
|
ext_auth_param.ssid.ssid_len);
|
|
|
|
memcpy(&ext_auth_param.bssid, &evt_data->bssid, ETHER_ADDR_LEN);
|
|
ext_auth_param.action = NL80211_EXTERNAL_AUTH_START;
|
|
ext_auth_param.key_mgmt_suite = ntoh32(WLAN_AKM_SUITE_SAE_SHA256);
|
|
|
|
WL_MSG(ndev->name, "BSSID: "MACDBG"\n", MAC2STRDBG(&evt_data->bssid));
|
|
|
|
err = cfg80211_external_auth_request(ndev, &ext_auth_param, GFP_KERNEL);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("Failed to notify external auth req(%d)\n", err));
|
|
}
|
|
|
|
cmd.version = WL_ASSOC_MGR_CURRENT_VERSION;
|
|
cmd.length = sizeof(cmd);
|
|
cmd.cmd = WL_ASSOC_MGR_CMD_PAUSE_ON_EVT;
|
|
cmd.params = WL_ASSOC_MGR_PARAMS_PAUSE_EVENT_AUTH_RESP;
|
|
err = wldev_iovar_setbuf(ndev, "assoc_mgr_cmd", (void *)&cmd, sizeof(cmd),
|
|
cfg->ioctl_buf, WLC_IOCTL_SMLEN, &cfg->ioctl_buf_sync);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("Failed to pause assoc(%d)\n", err));
|
|
}
|
|
|
|
return BCME_OK;
|
|
}
|
|
|
|
static s32
|
|
wl_notify_connect_status_bss(struct bcm_cfg80211 *cfg, struct net_device *ndev,
|
|
const wl_event_msg_t *e, void *data)
|
|
{
|
|
s32 err = 0;
|
|
u32 event = ntoh32(e->event_type);
|
|
u32 reason = ntoh32(e->reason);
|
|
u32 len = ntoh32(e->datalen);
|
|
u32 status = ntoh32(e->status);
|
|
|
|
bool isfree = false;
|
|
u8 *mgmt_frame;
|
|
u8 bsscfgidx = e->bsscfgidx;
|
|
s32 freq;
|
|
s32 channel;
|
|
u8 *body = NULL;
|
|
u16 fc = 0, rssi = 0;
|
|
bcm_struct_cfgdev *cfgdev = ndev_to_cfgdev(ndev);
|
|
|
|
struct ieee80211_supported_band *band;
|
|
struct ether_addr da;
|
|
struct ether_addr bssid;
|
|
struct wiphy *wiphy = bcmcfg_to_wiphy(cfg);
|
|
channel_info_t ci;
|
|
|
|
WL_DBG(("event %d status %d reason %d\n", event, status, reason));
|
|
|
|
if (event == WLC_E_AUTH) {
|
|
struct wl_security *sec;
|
|
sec = wl_read_prof(cfg, ndev, WL_PROF_SEC);
|
|
|
|
if (!(sec->auth_type == NL80211_AUTHTYPE_SAE)) {
|
|
WL_DBG(("Abort AUTH processing due to NOT SAE\n"));
|
|
return 0;
|
|
} else {
|
|
if (status != WLC_E_STATUS_SUCCESS && !len) {
|
|
WL_ERR(("SAE AUTH FAIL EVENT\n"));
|
|
wl_cfg80211_check_in4way(cfg, ndev, NO_SCAN_IN4WAY|NO_BTC_IN4WAY|WAIT_DISCONNECTED,
|
|
WL_EXT_STATUS_DISCONNECTED, NULL);
|
|
return 0;
|
|
}
|
|
}
|
|
}
|
|
|
|
if (!len && (event == WLC_E_DEAUTH)) {
|
|
len = 2; /* reason code field */
|
|
data = &reason;
|
|
}
|
|
|
|
if (len) {
|
|
body = kzalloc(len, GFP_KERNEL);
|
|
if (body == NULL) {
|
|
WL_ERR(("wl_notify_connect_status: Failed to allocate body\n"));
|
|
return WL_INVALID;
|
|
}
|
|
}
|
|
|
|
memset(&bssid, 0, ETHER_ADDR_LEN);
|
|
if (wl_get_mode_by_netdev(cfg, ndev) == WL_INVALID) {
|
|
kfree(body);
|
|
return WL_INVALID;
|
|
}
|
|
if (len)
|
|
memcpy(body, data, len);
|
|
|
|
wldev_iovar_getbuf_bsscfg(ndev, "cur_etheraddr",
|
|
NULL, 0, cfg->ioctl_buf, WLC_IOCTL_SMLEN, bsscfgidx, &cfg->ioctl_buf_sync);
|
|
memcpy(da.octet, cfg->ioctl_buf, ETHER_ADDR_LEN);
|
|
err = wldev_ioctl_get(ndev, WLC_GET_BSSID, &bssid, ETHER_ADDR_LEN);
|
|
/* Use e->addr as bssid for Sta case , before association completed */
|
|
if (err == BCME_NOTASSOCIATED)
|
|
memcpy(&bssid, &e->addr, ETHER_ADDR_LEN);
|
|
|
|
switch (event) {
|
|
case WLC_E_ASSOC_IND:
|
|
fc = FC_ASSOC_REQ;
|
|
break;
|
|
case WLC_E_REASSOC_IND:
|
|
fc = FC_REASSOC_REQ;
|
|
break;
|
|
case WLC_E_DISASSOC_IND:
|
|
fc = FC_DISASSOC;
|
|
break;
|
|
case WLC_E_DEAUTH_IND:
|
|
fc = FC_DISASSOC;
|
|
break;
|
|
case WLC_E_DEAUTH:
|
|
fc = FC_DISASSOC;
|
|
break;
|
|
case WLC_E_AUTH:
|
|
fc = FC_AUTH;
|
|
break;
|
|
default:
|
|
fc = 0;
|
|
goto exit;
|
|
}
|
|
if ((err = wldev_ioctl_get(ndev, WLC_GET_CHANNEL, &ci, sizeof(ci)))) {
|
|
kfree(body);
|
|
return err;
|
|
}
|
|
|
|
channel = dtoh32(ci.hw_channel);
|
|
if (channel <= CH_MAX_2G_CHANNEL)
|
|
band = wiphy->bands[IEEE80211_BAND_2GHZ];
|
|
else
|
|
band = wiphy->bands[IEEE80211_BAND_5GHZ];
|
|
if (!band) {
|
|
WL_ERR(("No valid band\n"));
|
|
if (body)
|
|
kfree(body);
|
|
return -EINVAL;
|
|
}
|
|
#if LINUX_VERSION_CODE < KERNEL_VERSION(2, 6, 39)
|
|
freq = ieee80211_channel_to_frequency(channel);
|
|
(void)band->band;
|
|
#else
|
|
freq = ieee80211_channel_to_frequency(channel, band->band);
|
|
#endif
|
|
|
|
err = wl_frame_get_mgmt(cfg, fc, &da, &e->addr, &bssid,
|
|
&mgmt_frame, &len, body);
|
|
if (err < 0) {
|
|
goto exit;
|
|
}
|
|
isfree = true;
|
|
|
|
if (event == WLC_E_ASSOC_IND && reason == DOT11_SC_SUCCESS) {
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 18, 0))
|
|
cfg80211_rx_mgmt(cfgdev, freq, rssi, mgmt_frame, len, 0);
|
|
#elif (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 4, 0))
|
|
cfg80211_rx_mgmt(ndev, freq, 0, mgmt_frame, len, GFP_ATOMIC);
|
|
#else
|
|
cfg80211_rx_mgmt(ndev, freq, mgmt_frame, len, GFP_ATOMIC);
|
|
#endif
|
|
} else if (event == WLC_E_DISASSOC_IND) {
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 18, 0))
|
|
cfg80211_rx_mgmt(cfgdev, freq, rssi, mgmt_frame, len, 0);
|
|
#elif (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 4, 0))
|
|
cfg80211_rx_mgmt(ndev, freq, 0, mgmt_frame, len, GFP_ATOMIC);
|
|
#else
|
|
cfg80211_rx_mgmt(ndev, freq, mgmt_frame, len, GFP_ATOMIC);
|
|
#endif
|
|
} else if ((event == WLC_E_DEAUTH_IND) || (event == WLC_E_DEAUTH)) {
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 18, 0))
|
|
cfg80211_rx_mgmt(cfgdev, freq, rssi, mgmt_frame, len, 0);
|
|
#elif (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 4, 0))
|
|
cfg80211_rx_mgmt(ndev, freq, 0, mgmt_frame, len, GFP_ATOMIC);
|
|
#else
|
|
cfg80211_rx_mgmt(ndev, freq, mgmt_frame, len, GFP_ATOMIC);
|
|
#endif
|
|
} else if (event == WLC_E_AUTH) {
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 18, 0))
|
|
cfg80211_rx_mgmt(cfgdev, freq, rssi, mgmt_frame, len, 0);
|
|
#elif (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 4, 0))
|
|
cfg80211_rx_mgmt(ndev, freq, 0, mgmt_frame, len, GFP_ATOMIC);
|
|
#else
|
|
cfg80211_rx_mgmt(ndev, freq, mgmt_frame, len, GFP_ATOMIC);
|
|
#endif
|
|
}
|
|
exit:
|
|
if (isfree)
|
|
kfree(mgmt_frame);
|
|
if (body)
|
|
kfree(body);
|
|
return err;
|
|
}
|
|
#endif /* WL_CLIENT_SAE */
|
|
|
|
static s32
|
|
wl_notify_connect_status_ibss(struct bcm_cfg80211 *cfg, struct net_device *ndev,
|
|
const wl_event_msg_t *e, void *data)
|
|
{
|
|
s32 err = 0;
|
|
u32 event = ntoh32(e->event_type);
|
|
u16 flags = ntoh16(e->flags);
|
|
u32 status = ntoh32(e->status);
|
|
bool active;
|
|
#if LINUX_VERSION_CODE >= KERNEL_VERSION(3, 15, 0)
|
|
struct ieee80211_channel *channel = NULL;
|
|
struct wiphy *wiphy = bcmcfg_to_wiphy(cfg);
|
|
u32 chanspec, chan;
|
|
u32 freq, band;
|
|
#endif /* LINUX_VERSION_CODE >= KERNEL_VERSION(3, 15, 0) */
|
|
|
|
if (event == WLC_E_JOIN) {
|
|
WL_INFORM_MEM(("[%s] joined in IBSS network\n", ndev->name));
|
|
}
|
|
if (event == WLC_E_START) {
|
|
WL_INFORM_MEM(("[%s] started IBSS network\n", ndev->name));
|
|
}
|
|
if (event == WLC_E_JOIN || event == WLC_E_START ||
|
|
(event == WLC_E_LINK && (flags == WLC_EVENT_MSG_LINK))) {
|
|
#if LINUX_VERSION_CODE >= KERNEL_VERSION(3, 15, 0)
|
|
err = wldev_iovar_getint(ndev, "chanspec", (s32 *)&chanspec);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("Could not get chanspec %d\n", err));
|
|
return err;
|
|
}
|
|
chan = wf_chspec_ctlchan(wl_chspec_driver_to_host(chanspec));
|
|
band = (chan <= CH_MAX_2G_CHANNEL) ? IEEE80211_BAND_2GHZ : IEEE80211_BAND_5GHZ;
|
|
freq = ieee80211_channel_to_frequency(chan, band);
|
|
channel = ieee80211_get_channel(wiphy, freq);
|
|
#endif /* LINUX_VERSION_CODE >= KERNEL_VERSION(3, 15, 0) */
|
|
if (wl_get_drv_status(cfg, CONNECTED, ndev)) {
|
|
/* ROAM or Redundant */
|
|
u8 *cur_bssid = wl_read_prof(cfg, ndev, WL_PROF_BSSID);
|
|
if (memcmp(cur_bssid, &e->addr, ETHER_ADDR_LEN) == 0) {
|
|
WL_DBG(("IBSS connected event from same BSSID("
|
|
MACDBG "), ignore it\n", MAC2STRDBG(cur_bssid)));
|
|
return err;
|
|
}
|
|
WL_INFORM_MEM(("[%s] IBSS BSSID is changed from " MACDBG " to " MACDBG "\n",
|
|
ndev->name, MAC2STRDBG(cur_bssid),
|
|
MAC2STRDBG((const u8 *)&e->addr)));
|
|
wl_get_assoc_ies(cfg, ndev);
|
|
wl_update_prof(cfg, ndev, NULL, (const void *)&e->addr, WL_PROF_BSSID);
|
|
wl_update_bss_info(cfg, ndev, false);
|
|
#if LINUX_VERSION_CODE >= KERNEL_VERSION(3, 15, 0)
|
|
cfg80211_ibss_joined(ndev, (const s8 *)&e->addr, channel, GFP_KERNEL);
|
|
#else
|
|
cfg80211_ibss_joined(ndev, (const s8 *)&e->addr, GFP_KERNEL);
|
|
#endif // endif
|
|
}
|
|
else {
|
|
/* New connection */
|
|
WL_INFORM_MEM(("[%s] IBSS connected to " MACDBG "\n",
|
|
ndev->name, MAC2STRDBG((const u8 *)&e->addr)));
|
|
wl_link_up(cfg);
|
|
wl_get_assoc_ies(cfg, ndev);
|
|
wl_update_prof(cfg, ndev, NULL, (const void *)&e->addr, WL_PROF_BSSID);
|
|
wl_update_bss_info(cfg, ndev, false);
|
|
#if LINUX_VERSION_CODE >= KERNEL_VERSION(3, 15, 0)
|
|
cfg80211_ibss_joined(ndev, (const s8 *)&e->addr, channel, GFP_KERNEL);
|
|
#else
|
|
cfg80211_ibss_joined(ndev, (const s8 *)&e->addr, GFP_KERNEL);
|
|
#endif // endif
|
|
wl_set_drv_status(cfg, CONNECTED, ndev);
|
|
active = true;
|
|
wl_update_prof(cfg, ndev, NULL, (const void *)&active, WL_PROF_ACT);
|
|
}
|
|
} else if ((event == WLC_E_LINK && !(flags & WLC_EVENT_MSG_LINK)) ||
|
|
event == WLC_E_DEAUTH_IND || event == WLC_E_DISASSOC_IND) {
|
|
wl_clr_drv_status(cfg, CONNECTED, ndev);
|
|
wl_link_down(cfg);
|
|
wl_init_prof(cfg, ndev);
|
|
}
|
|
else if (event == WLC_E_SET_SSID && status == WLC_E_STATUS_NO_NETWORKS) {
|
|
WL_INFORM_MEM(("no action - join fail (IBSS mode)\n"));
|
|
}
|
|
else {
|
|
WL_DBG(("no action (IBSS mode)\n"));
|
|
}
|
|
return err;
|
|
}
|
|
|
|
void wl_cfg80211_disassoc(struct net_device *ndev, uint32 reason)
|
|
{
|
|
scb_val_t scbval;
|
|
s32 err;
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(ndev);
|
|
dhd_pub_t *dhdp = (dhd_pub_t *)(cfg->pub);
|
|
|
|
BCM_REFERENCE(cfg);
|
|
BCM_REFERENCE(dhdp);
|
|
DHD_STATLOG_CTRL(dhdp, ST(DISASSOC_INT_START),
|
|
dhd_net2idx(dhdp->info, ndev), WLAN_REASON_DEAUTH_LEAVING);
|
|
|
|
memset_s(&scbval, sizeof(scb_val_t), 0x0, sizeof(scb_val_t));
|
|
scbval.val = htod32(reason);
|
|
err = wldev_ioctl_set(ndev, WLC_DISASSOC, &scbval, sizeof(scb_val_t));
|
|
if (err < 0) {
|
|
WL_ERR(("WLC_DISASSOC error %d\n", err));
|
|
}
|
|
}
|
|
void wl_cfg80211_del_all_sta(struct net_device *ndev, uint32 reason)
|
|
{
|
|
struct net_device *dev;
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(ndev);
|
|
scb_val_t scb_val;
|
|
int err;
|
|
char mac_buf[MAX_NUM_OF_ASSOCIATED_DEV *
|
|
sizeof(struct ether_addr) + sizeof(uint)] = {0};
|
|
struct maclist *assoc_maclist = (struct maclist *)mac_buf;
|
|
int num_associated = 0;
|
|
|
|
dev = ndev_to_wlc_ndev(ndev, cfg);
|
|
|
|
if (p2p_is_on(cfg)) {
|
|
/* Suspend P2P discovery search-listen to prevent it from changing the
|
|
* channel.
|
|
*/
|
|
if ((wl_cfgp2p_discover_enable_search(cfg, false)) < 0) {
|
|
WL_ERR(("Can not disable discovery mode\n"));
|
|
return;
|
|
}
|
|
}
|
|
|
|
assoc_maclist->count = MAX_NUM_OF_ASSOCIATED_DEV;
|
|
err = wldev_ioctl_get(ndev, WLC_GET_ASSOCLIST,
|
|
assoc_maclist, sizeof(mac_buf));
|
|
if (err < 0)
|
|
WL_ERR(("WLC_GET_ASSOCLIST error %d\n", err));
|
|
else
|
|
num_associated = assoc_maclist->count;
|
|
|
|
memset(scb_val.ea.octet, 0xff, ETHER_ADDR_LEN);
|
|
scb_val.val = DOT11_RC_DEAUTH_LEAVING;
|
|
scb_val.val = htod32(reason);
|
|
err = wldev_ioctl_set(dev, WLC_SCB_DEAUTHENTICATE_FOR_REASON, &scb_val,
|
|
sizeof(scb_val_t));
|
|
if (err < 0) {
|
|
WL_ERR(("WLC_SCB_DEAUTHENTICATE_FOR_REASON err %d\n", err));
|
|
}
|
|
|
|
if (num_associated > 0)
|
|
wl_delay(400);
|
|
|
|
return;
|
|
}
|
|
/* API to handle the Deauth from the AP.
|
|
* For now we are deleting the PMKID cache in DHD/FW
|
|
* in case of current connection is using SAE authnetication
|
|
*/
|
|
static s32
|
|
wl_cfg80211_handle_deauth_ind(struct bcm_cfg80211 *cfg, struct net_device *ndev,
|
|
const wl_event_msg_t *e, void *data)
|
|
{
|
|
int err = BCME_OK;
|
|
#ifdef WL_SAE
|
|
uint8 bssid[ETHER_ADDR_LEN];
|
|
struct cfg80211_pmksa pmksa;
|
|
s32 val = 0;
|
|
|
|
err = wldev_iovar_getint(ndev, "wpa_auth", &val);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("could not get wpa_auth (%d)\n", err));
|
|
goto done;
|
|
}
|
|
if (val == WPA3_AUTH_SAE_PSK) {
|
|
(void)memcpy_s(bssid, ETHER_ADDR_LEN,
|
|
(const uint8*)&e->addr, ETHER_ADDR_LEN);
|
|
memset_s(&pmksa, sizeof(pmksa), 0, sizeof(pmksa));
|
|
pmksa.bssid = bssid;
|
|
WL_INFORM_MEM(("Deleting the PMKSA for SAE AP "MACDBG,
|
|
MAC2STRDBG(e->addr.octet)));
|
|
wl_cfg80211_del_pmksa(cfg->wdev->wiphy, ndev, &pmksa);
|
|
}
|
|
done:
|
|
#endif /* WL_SAE */
|
|
return err;
|
|
}
|
|
|
|
static void
|
|
wl_cache_assoc_resp_ies(struct bcm_cfg80211 *cfg, struct net_device *ndev,
|
|
const wl_event_msg_t *e, void *data)
|
|
{
|
|
struct wl_connect_info *conn_info = wl_to_conn(cfg);
|
|
u32 datalen = ntoh32(e->datalen);
|
|
u32 event_type = ntoh32(e->event_type);
|
|
|
|
if (datalen > VNDR_IE_MIN_LEN &&
|
|
datalen < VNDR_IE_MAX_LEN &&
|
|
data) {
|
|
conn_info->resp_ie_len = datalen;
|
|
WL_DBG((" assoc resp IES len = %d\n", conn_info->resp_ie_len));
|
|
bzero(conn_info->resp_ie, sizeof(conn_info->resp_ie));
|
|
(void)memcpy_s(conn_info->resp_ie, sizeof(conn_info->resp_ie),
|
|
data, datalen);
|
|
|
|
WL_INFORM_MEM(("[%s] copied assoc resp ies, sent to upper layer:"
|
|
"event %d reason=%d ie_len=%d from " MACDBG "\n",
|
|
ndev->name, event_type, ntoh32(e->reason), datalen,
|
|
MAC2STRDBG((const u8*)(&e->addr))));
|
|
}
|
|
}
|
|
|
|
#ifdef WLMESH_CFG80211
|
|
static s32
|
|
wl_notify_connect_status_mesh(struct bcm_cfg80211 *cfg, struct net_device *ndev,
|
|
const wl_event_msg_t *e, void *data)
|
|
{
|
|
s32 err = 0;
|
|
u32 event = ntoh32(e->event_type);
|
|
u32 reason = ntoh32(e->reason);
|
|
u32 len = ntoh32(e->datalen);
|
|
u32 status = ntoh32(e->status);
|
|
|
|
#if !defined(WL_CFG80211_STA_EVENT) && !defined(WL_COMPAT_WIRELESS) && \
|
|
(LINUX_VERSION_CODE < KERNEL_VERSION(3, 2, 0))
|
|
bool isfree = false;
|
|
u8 *mgmt_frame;
|
|
u8 bsscfgidx = e->bsscfgidx;
|
|
s32 freq;
|
|
s32 channel;
|
|
u8 *body = NULL;
|
|
u16 fc = 0;
|
|
u32 body_len = 0;
|
|
|
|
struct ieee80211_supported_band *band;
|
|
struct ether_addr da;
|
|
struct ether_addr bssid;
|
|
struct wiphy *wiphy = bcmcfg_to_wiphy(cfg);
|
|
channel_info_t ci;
|
|
u8 ioctl_buf[WLC_IOCTL_SMLEN];
|
|
#else
|
|
struct station_info sinfo;
|
|
#endif /* (LINUX_VERSION < VERSION(3,2,0)) && !WL_CFG80211_STA_EVENT && !WL_COMPAT_WIRELESS */
|
|
|
|
WL_INFORM_MEM(("[%s] Mode Mesh. Event:%d status:%d reason:%d\n",
|
|
ndev->name, event, ntoh32(e->status), reason));
|
|
|
|
/* if link down, bsscfg is disabled. */
|
|
if (event == WLC_E_LINK && reason == WLC_E_LINK_BSSCFG_DIS &&
|
|
(ndev != bcmcfg_to_prmry_ndev(cfg))) {
|
|
WL_MSG(ndev->name, "Mesh mode link down !! \n");
|
|
return 0;
|
|
}
|
|
|
|
if ((event == WLC_E_LINK) && (status == WLC_E_STATUS_SUCCESS) &&
|
|
(reason == WLC_E_REASON_INITIAL_ASSOC)) {
|
|
/* AP/GO brought up successfull in firmware */
|
|
WL_MSG(ndev->name, "Mesh Link up\n");
|
|
return 0;
|
|
}
|
|
|
|
if (event == WLC_E_DISASSOC_IND || event == WLC_E_DEAUTH_IND || event == WLC_E_DEAUTH) {
|
|
WL_MSG(ndev->name, "event %s(%d) status %d reason %d\n",
|
|
bcmevent_get_name(event), event, ntoh32(e->status), reason);
|
|
}
|
|
|
|
#if !defined(WL_CFG80211_STA_EVENT) && !defined(WL_COMPAT_WIRELESS) && \
|
|
(LINUX_VERSION_CODE < KERNEL_VERSION(3, 2, 0))
|
|
WL_DBG(("Enter \n"));
|
|
if (!len && (event == WLC_E_DEAUTH)) {
|
|
len = 2; /* reason code field */
|
|
data = &reason;
|
|
}
|
|
if (len) {
|
|
body = (u8 *)MALLOCZ(cfg->osh, len);
|
|
if (body == NULL) {
|
|
WL_ERR(("Failed to allocate body\n"));
|
|
return WL_INVALID;
|
|
}
|
|
}
|
|
bzero(&bssid, ETHER_ADDR_LEN);
|
|
WL_DBG(("Enter event %d ndev %p\n", event, ndev));
|
|
if (wl_get_mode_by_netdev(cfg, ndev) == WL_INVALID) {
|
|
MFREE(cfg->osh, body, len);
|
|
return WL_INVALID;
|
|
}
|
|
if (len)
|
|
memcpy(body, data, len);
|
|
|
|
wldev_iovar_getbuf_bsscfg(ndev, "cur_etheraddr",
|
|
NULL, 0, ioctl_buf, sizeof(ioctl_buf), bsscfgidx, NULL);
|
|
memcpy(da.octet, ioctl_buf, ETHER_ADDR_LEN);
|
|
bzero(&bssid, sizeof(bssid));
|
|
err = wldev_ioctl_get(ndev, WLC_GET_BSSID, &bssid, ETHER_ADDR_LEN);
|
|
switch (event) {
|
|
case WLC_E_ASSOC_IND:
|
|
fc = FC_ASSOC_REQ;
|
|
break;
|
|
case WLC_E_REASSOC_IND:
|
|
fc = FC_REASSOC_REQ;
|
|
break;
|
|
case WLC_E_DISASSOC_IND:
|
|
fc = FC_DISASSOC;
|
|
break;
|
|
case WLC_E_DEAUTH_IND:
|
|
fc = FC_DISASSOC;
|
|
break;
|
|
case WLC_E_DEAUTH:
|
|
fc = FC_DISASSOC;
|
|
break;
|
|
default:
|
|
fc = 0;
|
|
goto exit;
|
|
}
|
|
bzero(&ci, sizeof(ci));
|
|
if ((err = wldev_ioctl_get(ndev, WLC_GET_CHANNEL, &ci, sizeof(ci)))) {
|
|
MFREE(cfg->osh, body, len);
|
|
return err;
|
|
}
|
|
|
|
channel = dtoh32(ci.hw_channel);
|
|
if (channel <= CH_MAX_2G_CHANNEL)
|
|
band = wiphy->bands[IEEE80211_BAND_2GHZ];
|
|
else
|
|
band = wiphy->bands[IEEE80211_BAND_5GHZ];
|
|
if (!band) {
|
|
WL_ERR(("No valid band\n"));
|
|
if (body) {
|
|
MFREE(cfg->osh, body, len);
|
|
}
|
|
return -EINVAL;
|
|
}
|
|
#if LINUX_VERSION_CODE < KERNEL_VERSION(2, 6, 39) && !defined(WL_COMPAT_WIRELESS)
|
|
freq = ieee80211_channel_to_frequency(channel);
|
|
(void)band->band;
|
|
#else
|
|
freq = ieee80211_channel_to_frequency(channel, band->band);
|
|
#endif // endif
|
|
body_len = len;
|
|
err = wl_frame_get_mgmt(cfg, fc, &da, &e->addr, &bssid,
|
|
&mgmt_frame, &len, body);
|
|
if (err < 0)
|
|
goto exit;
|
|
isfree = true;
|
|
|
|
if ((event == WLC_E_ASSOC_IND && reason == DOT11_SC_SUCCESS) ||
|
|
(event == WLC_E_DISASSOC_IND) ||
|
|
((event == WLC_E_DEAUTH_IND) || (event == WLC_E_DEAUTH))) {
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 18, 0))
|
|
cfg80211_rx_mgmt(ndev, freq, 0, mgmt_frame, len, 0);
|
|
#elif (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 12, 0))
|
|
cfg80211_rx_mgmt(ndev, freq, 0, mgmt_frame, len, 0, GFP_ATOMIC);
|
|
#elif (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 4, 0)) || \
|
|
defined(WL_COMPAT_WIRELESS)
|
|
cfg80211_rx_mgmt(ndev, freq, 0, mgmt_frame, len, GFP_ATOMIC);
|
|
#else
|
|
cfg80211_rx_mgmt(ndev, freq, mgmt_frame, len, GFP_ATOMIC);
|
|
#endif /* LINUX_VERSION >= VERSION(3, 18,0) || WL_COMPAT_WIRELESS */
|
|
}
|
|
|
|
exit:
|
|
if (isfree) {
|
|
MFREE(cfg->osh, mgmt_frame, len);
|
|
}
|
|
if (body) {
|
|
MFREE(cfg->osh, body, body_len);
|
|
}
|
|
#else /* LINUX_VERSION < VERSION(3,2,0) && !WL_CFG80211_STA_EVENT && !WL_COMPAT_WIRELESS */
|
|
memset(&sinfo, 0, sizeof(struct station_info));
|
|
sinfo.filled = 0;
|
|
if (((event == WLC_E_ASSOC_IND) || (event == WLC_E_REASSOC_IND)) &&
|
|
reason == DOT11_SC_SUCCESS) {
|
|
/* Linux ver >= 4.0 assoc_req_ies_len is used instead of
|
|
* STATION_INFO_ASSOC_REQ_IES flag
|
|
*/
|
|
#if (LINUX_VERSION_CODE < KERNEL_VERSION(4, 0, 0))
|
|
sinfo.filled = STA_INFO_BIT(INFO_ASSOC_REQ_IES);
|
|
#endif /* (LINUX_VERSION_CODE >= KERNEL_VERSION(4, 0, 0)) */
|
|
if (!data) {
|
|
WL_ERR(("No IEs present in ASSOC/REASSOC_IND"));
|
|
return -EINVAL;
|
|
}
|
|
sinfo.assoc_req_ies = data;
|
|
sinfo.assoc_req_ies_len = len;
|
|
WL_MSG(ndev->name, "new sta event for "MACDBG "\n",
|
|
MAC2STRDBG(e->addr.octet));
|
|
cfg80211_new_sta(ndev, e->addr.octet, &sinfo, GFP_ATOMIC);
|
|
} else if ((event == WLC_E_DEAUTH_IND) ||
|
|
((event == WLC_E_DEAUTH) && (reason != DOT11_RC_RESERVED)) ||
|
|
(event == WLC_E_DISASSOC_IND)) {
|
|
WL_MSG(ndev->name, "del sta event for "MACDBG "\n",
|
|
MAC2STRDBG(e->addr.octet));
|
|
cfg80211_del_sta(ndev, e->addr.octet, GFP_ATOMIC);
|
|
}
|
|
#endif /* LINUX_VERSION < VERSION(3,2,0) && !WL_CFG80211_STA_EVENT && !WL_COMPAT_WIRELESS */
|
|
return err;
|
|
}
|
|
#endif /* WLMESH_CFG80211 */
|
|
|
|
static s32
|
|
wl_notify_connect_status(struct bcm_cfg80211 *cfg, bcm_struct_cfgdev *cfgdev,
|
|
const wl_event_msg_t *e, void *data)
|
|
{
|
|
bool act;
|
|
struct net_device *ndev = NULL;
|
|
s32 err = 0;
|
|
u32 event = ntoh32(e->event_type);
|
|
u32 datalen = ntoh32(e->datalen);
|
|
struct wiphy *wiphy = NULL;
|
|
struct cfg80211_bss *bss = NULL;
|
|
struct wlc_ssid *ssid = NULL;
|
|
u8 *bssid = 0;
|
|
s32 bssidx = 0;
|
|
u8 *ie_ptr = NULL;
|
|
uint32 ie_len = 0;
|
|
#ifdef WL_ANALYTICS
|
|
struct parsed_vndr_ies disco_vndr_ie;
|
|
struct parsed_vndr_ie_info *vndrie_info = NULL;
|
|
uint32 i = 0;
|
|
#endif /* WL_ANALYTICS */
|
|
|
|
dhd_pub_t *dhdp;
|
|
u32 mode;
|
|
int vndr_oui_num = 0;
|
|
char vndr_oui[MAX_VNDR_OUI_STR_LEN] = {0, };
|
|
bool loc_gen = false;
|
|
#ifdef DHD_LOSSLESS_ROAMING
|
|
struct wl_security *sec;
|
|
#endif /* DHD_LOSSLESS_ROAMING */
|
|
|
|
ndev = cfgdev_to_wlc_ndev(cfgdev, cfg);
|
|
#ifdef DHD_LOSSLESS_ROAMING
|
|
sec = wl_read_prof(cfg, ndev, WL_PROF_SEC);
|
|
#endif /* DHD_LOSSLESS_ROAMING */
|
|
dhdp = (dhd_pub_t *)(cfg->pub);
|
|
BCM_REFERENCE(dhdp);
|
|
|
|
mode = wl_get_mode_by_netdev(cfg, ndev);
|
|
/* Push link events to upper layer log */
|
|
SUPP_LOG(("[%s] Mode:%d event:%d status:0x%x reason:%d\n",
|
|
ndev->name, mode, ntoh32(e->event_type),
|
|
ntoh32(e->status), ntoh32(e->reason)));
|
|
if (mode == WL_MODE_AP) {
|
|
err = wl_notify_connect_status_ap(cfg, ndev, e, data);
|
|
#ifdef WLMESH_CFG80211
|
|
} else if (mode == WL_MODE_MESH) {
|
|
err = wl_notify_connect_status_mesh(cfg, ndev, e, data);
|
|
#endif /* WLMESH_CFG80211 */
|
|
} else if (mode == WL_MODE_IBSS) {
|
|
err = wl_notify_connect_status_ibss(cfg, ndev, e, data);
|
|
} else if (mode == WL_MODE_BSS) {
|
|
WL_INFORM_MEM(("[%s] Mode BSS. event:%d status:%d reason:%d\n",
|
|
ndev->name, ntoh32(e->event_type),
|
|
ntoh32(e->status), ntoh32(e->reason)));
|
|
|
|
if (!wl_get_drv_status(cfg, CFG80211_CONNECT, ndev)) {
|
|
/* Join attempt via non-cfg80211 interface.
|
|
* Don't send resultant events to cfg80211
|
|
* layer
|
|
*/
|
|
WL_INFORM_MEM(("Event received in non-cfg80211"
|
|
" connect state. Ignore\n"));
|
|
return BCME_OK;
|
|
}
|
|
#ifdef WL_CLIENT_SAE
|
|
if (event == WLC_E_AUTH)
|
|
wl_notify_connect_status_bss(cfg, ndev, e, data);
|
|
#endif /* WL_CLIENT_SAE */
|
|
|
|
if (event == WLC_E_ASSOC || event == WLC_E_AUTH) {
|
|
wl_get_auth_assoc_status(cfg, ndev, e, data);
|
|
return 0;
|
|
}
|
|
if (event == WLC_E_ASSOC_RESP_IE) {
|
|
if (ntoh32(e->status) != WLC_E_STATUS_SUCCESS) {
|
|
wl_cache_assoc_resp_ies(cfg, ndev, e, data);
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
DHD_DISABLE_RUNTIME_PM((dhd_pub_t *)cfg->pub);
|
|
if (wl_is_linkup(cfg, e, ndev)) {
|
|
wl_link_up(cfg);
|
|
act = true;
|
|
if (!wl_get_drv_status(cfg, DISCONNECTING, ndev)) {
|
|
WL_INFORM_MEM(("[%s] link up for bssid " MACDBG "\n",
|
|
ndev->name, MAC2STRDBG((const u8*)(&e->addr))));
|
|
if ((event == WLC_E_LINK) &&
|
|
(ntoh16(e->flags) & WLC_EVENT_MSG_LINK) &&
|
|
!wl_get_drv_status(cfg, CONNECTED, ndev) &&
|
|
!wl_get_drv_status(cfg, CONNECTING, ndev)) {
|
|
WL_INFORM_MEM(("link up in non-connected/"
|
|
"non-connecting state\n"));
|
|
wl_cfg80211_disassoc(ndev, WLAN_REASON_DEAUTH_LEAVING);
|
|
return BCME_OK;
|
|
}
|
|
|
|
#ifdef WL_WPS_SYNC
|
|
/* Avoid invocation for Roam cases */
|
|
if ((event == WLC_E_LINK) &&
|
|
!wl_get_drv_status(cfg, CONNECTED, ndev)) {
|
|
wl_wps_session_update(ndev,
|
|
WPS_STATE_LINKUP, e->addr.octet);
|
|
}
|
|
#endif /* WL_WPS_SYNC */
|
|
|
|
if (event == WLC_E_LINK &&
|
|
#ifdef DHD_LOSSLESS_ROAMING
|
|
!cfg->roam_offload &&
|
|
!IS_AKM_SUITE_FT(sec) &&
|
|
#endif /* DHD_LOSSLESS_ROAMING */
|
|
wl_get_drv_status(cfg, CONNECTED, ndev)) {
|
|
wl_bss_roaming_done(cfg, ndev, e, data);
|
|
/* Arm pkt logging timer */
|
|
dhd_dump_mod_pkt_timer(dhdp, PKT_CNT_RSN_ROAM);
|
|
} else {
|
|
/* Initial Association */
|
|
wl_update_prof(cfg, ndev, e, &act, WL_PROF_ACT);
|
|
wl_bss_connect_done(cfg, ndev, e, data, true);
|
|
if (ndev == bcmcfg_to_prmry_ndev(cfg)) {
|
|
vndr_oui_num = wl_vndr_ies_get_vendor_oui(cfg,
|
|
ndev, vndr_oui, ARRAY_SIZE(vndr_oui));
|
|
if (vndr_oui_num > 0) {
|
|
WL_INFORM_MEM(("[%s] vendor oui: %s\n",
|
|
ndev->name, vndr_oui));
|
|
}
|
|
}
|
|
if (event == WLC_E_LINK) {
|
|
/* Arm pkt logging timer */
|
|
dhd_dump_mod_pkt_timer(dhdp, PKT_CNT_RSN_CONNECT);
|
|
}
|
|
WL_DBG(("joined in BSS network \"%s\"\n",
|
|
((struct wlc_ssid *)wl_read_prof(cfg, ndev,
|
|
WL_PROF_SSID))->SSID));
|
|
}
|
|
}
|
|
wl_update_prof(cfg, ndev, e, &act, WL_PROF_ACT);
|
|
wl_update_prof(cfg, ndev, NULL, (const void *)&e->addr, WL_PROF_BSSID);
|
|
} else if (wl_is_linkdown(cfg, e) ||
|
|
((event == WLC_E_SET_SSID) &&
|
|
(ntoh32(e->status) != WLC_E_STATUS_SUCCESS) &&
|
|
(wl_get_drv_status(cfg, CONNECTED, ndev)))) {
|
|
if (wl_is_linkdown(cfg, e)) {
|
|
/* Clear IEs for disaasoc */
|
|
if ((bssidx = wl_get_bssidx_by_wdev(cfg,
|
|
ndev->ieee80211_ptr)) < 0) {
|
|
WL_ERR(("Find index failed\n"));
|
|
} else {
|
|
WL_ERR(("link down--clearing disconnect IEs\n"));
|
|
if ((err = wl_cfg80211_set_mgmt_vndr_ies(cfg,
|
|
ndev_to_cfgdev(ndev), bssidx, VNDR_IE_DISASSOC_FLAG,
|
|
NULL, 0)) != BCME_OK) {
|
|
WL_ERR(("Failed to clear ies err = %d\n", err));
|
|
}
|
|
}
|
|
}
|
|
|
|
WL_INFORM_MEM(("link down. connection state bit status: [%u:%u:%u:%u]\n",
|
|
wl_get_drv_status(cfg, CONNECTING, ndev),
|
|
wl_get_drv_status(cfg, CONNECTED, ndev),
|
|
wl_get_drv_status(cfg, DISCONNECTING, ndev),
|
|
wl_get_drv_status(cfg, NESTED_CONNECT, ndev)));
|
|
|
|
#ifdef WL_WPS_SYNC
|
|
{
|
|
u8 wps_state;
|
|
if ((event == WLC_E_SET_SSID) &&
|
|
(ntoh32(e->status) != WLC_E_STATUS_SUCCESS)) {
|
|
/* connect fail */
|
|
wps_state = WPS_STATE_CONNECT_FAIL;
|
|
} else {
|
|
wps_state = WPS_STATE_LINKDOWN;
|
|
}
|
|
if (wl_wps_session_update(ndev,
|
|
wps_state, e->addr.octet) == BCME_UNSUPPORTED) {
|
|
/* Unexpected event. Ignore it. */
|
|
return 0;
|
|
}
|
|
}
|
|
#endif /* WL_WPS_SYNC */
|
|
|
|
if (wl_get_drv_status(cfg, DISCONNECTING, ndev) &&
|
|
(wl_get_drv_status(cfg, NESTED_CONNECT, ndev) ||
|
|
wl_get_drv_status(cfg, CONNECTING, ndev))) {
|
|
/* wl_cfg80211_connect was called before 'DISCONNECTING' was
|
|
* cleared. Deauth/Link down event is caused by WLC_DISASSOC
|
|
* command issued from the wl_cfg80211_connect context. Ignore
|
|
* the event to avoid pre-empting the current connection
|
|
*/
|
|
WL_DBG(("Nested connection case. Drop event. \n"));
|
|
wl_cfg80211_check_in4way(cfg, ndev, NO_SCAN_IN4WAY|NO_BTC_IN4WAY|WAIT_DISCONNECTED,
|
|
WL_EXT_STATUS_DISCONNECTED, NULL);
|
|
wl_clr_drv_status(cfg, NESTED_CONNECT, ndev);
|
|
wl_clr_drv_status(cfg, DISCONNECTING, ndev);
|
|
/* Not in 'CONNECTED' state, clear it */
|
|
wl_clr_drv_status(cfg, CONNECTED, ndev);
|
|
return 0;
|
|
}
|
|
|
|
if (wl_get_drv_status(cfg, CONNECTED, ndev)) {
|
|
wl_flush_fw_log_buffer(bcmcfg_to_prmry_ndev(cfg),
|
|
FW_LOGSET_MASK_ALL);
|
|
}
|
|
#ifdef DHD_LOSSLESS_ROAMING
|
|
wl_del_roam_timeout(cfg);
|
|
#endif // endif
|
|
#ifdef P2PLISTEN_AP_SAMECHN
|
|
if (ndev == bcmcfg_to_prmry_ndev(cfg)) {
|
|
wl_cfg80211_set_p2p_resp_ap_chn(ndev, 0);
|
|
cfg->p2p_resp_apchn_status = false;
|
|
WL_DBG(("p2p_resp_apchn_status Turn OFF \n"));
|
|
}
|
|
#endif /* P2PLISTEN_AP_SAMECHN */
|
|
wl_cfg80211_cancel_scan(cfg);
|
|
|
|
if (wl_get_drv_status(cfg, CONNECTED, ndev)) {
|
|
u8 *curbssid = wl_read_prof(cfg, ndev, WL_PROF_BSSID);
|
|
if (memcmp(curbssid, &e->addr, ETHER_ADDR_LEN) != 0) {
|
|
bool fw_assoc_state = TRUE;
|
|
dhd_pub_t *dhd = (dhd_pub_t *)cfg->pub;
|
|
fw_assoc_state = dhd_is_associated(dhd, e->ifidx, &err);
|
|
if (!fw_assoc_state) {
|
|
WL_ERR(("Event sends up even different BSSID"
|
|
" cur: " MACDBG " event: " MACDBG"\n",
|
|
MAC2STRDBG(curbssid),
|
|
MAC2STRDBG((const u8*)(&e->addr))));
|
|
} else {
|
|
WL_ERR(("BSSID of event is not the connected BSSID"
|
|
"(ignore it) cur: " MACDBG
|
|
" event: " MACDBG"\n",
|
|
MAC2STRDBG(curbssid),
|
|
MAC2STRDBG((const u8*)(&e->addr))));
|
|
return 0;
|
|
}
|
|
}
|
|
}
|
|
/* Explicitly calling unlink to remove BSS in CFG */
|
|
wiphy = bcmcfg_to_wiphy(cfg);
|
|
ssid = (struct wlc_ssid *)wl_read_prof(cfg, ndev, WL_PROF_SSID);
|
|
bssid = (u8 *)wl_read_prof(cfg, ndev, WL_PROF_BSSID);
|
|
if (ssid && bssid) {
|
|
bss = CFG80211_GET_BSS(wiphy, NULL, bssid,
|
|
ssid->SSID, ssid->SSID_len);
|
|
if (bss) {
|
|
cfg80211_unlink_bss(wiphy, bss);
|
|
CFG80211_PUT_BSS(wiphy, bss);
|
|
}
|
|
}
|
|
|
|
if (wl_get_drv_status(cfg, CONNECTED, ndev)) {
|
|
scb_val_t scbval;
|
|
u8 *curbssid = wl_read_prof(cfg, ndev, WL_PROF_BSSID);
|
|
uint32 reason = 0;
|
|
struct ether_addr bssid_dongle = {{0, 0, 0, 0, 0, 0}};
|
|
struct ether_addr bssid_null = {{0, 0, 0, 0, 0, 0}};
|
|
|
|
if (event == WLC_E_DEAUTH_IND || event == WLC_E_DISASSOC_IND) {
|
|
reason = ntoh32(e->reason);
|
|
if (reason > WLC_E_DEAUTH_MAX_REASON) {
|
|
WL_ERR(("Event %d original reason is %d, "
|
|
"changed 0xFF\n", event, reason));
|
|
reason = WLC_E_DEAUTH_MAX_REASON;
|
|
}
|
|
wl_cfg80211_handle_deauth_ind(cfg, ndev, e, data);
|
|
}
|
|
#ifdef SET_SSID_FAIL_CUSTOM_RC
|
|
if ((event == WLC_E_SET_SSID) &&
|
|
(ntoh32(e->status) == WLC_E_STATUS_TIMEOUT)) {
|
|
reason = SET_SSID_FAIL_CUSTOM_RC;
|
|
}
|
|
#endif /* SET_SSID_FAIL_CUSTOM_RC */
|
|
|
|
/* roam offload does not sync BSSID always, get it from dongle */
|
|
if (cfg->roam_offload) {
|
|
bzero(&bssid_dongle, sizeof(bssid_dongle));
|
|
if (wldev_ioctl_get(ndev, WLC_GET_BSSID, &bssid_dongle,
|
|
sizeof(bssid_dongle)) == BCME_OK) {
|
|
/* if not roam case, it would return null bssid */
|
|
if (memcmp(&bssid_dongle, &bssid_null,
|
|
ETHER_ADDR_LEN) != 0) {
|
|
curbssid = (u8 *)&bssid_dongle;
|
|
}
|
|
}
|
|
}
|
|
if (memcmp(curbssid, &e->addr, ETHER_ADDR_LEN) != 0) {
|
|
bool fw_assoc_state = TRUE;
|
|
dhd_pub_t *dhd = (dhd_pub_t *)cfg->pub;
|
|
fw_assoc_state = dhd_is_associated(dhd, e->ifidx, &err);
|
|
if (!fw_assoc_state) {
|
|
WL_ERR(("Event sends up even different BSSID"
|
|
" cur: " MACDBG " event: " MACDBG"\n",
|
|
MAC2STRDBG(curbssid),
|
|
MAC2STRDBG((const u8*)(&e->addr))));
|
|
} else {
|
|
WL_ERR(("BSSID of event is not the connected BSSID"
|
|
"(ignore it) cur: " MACDBG
|
|
" event: " MACDBG"\n",
|
|
MAC2STRDBG(curbssid),
|
|
MAC2STRDBG((const u8*)(&e->addr))));
|
|
return 0;
|
|
}
|
|
}
|
|
#ifdef DBG_PKT_MON
|
|
/* Stop packet monitor */
|
|
if (ndev == bcmcfg_to_prmry_ndev(cfg)) {
|
|
DHD_DBG_PKT_MON_STOP(dhdp);
|
|
}
|
|
#endif /* DBG_PKT_MON */
|
|
/* clear RSSI monitor, framework will set new cfg */
|
|
#ifdef RSSI_MONITOR_SUPPORT
|
|
dhd_dev_set_rssi_monitor_cfg(bcmcfg_to_prmry_ndev(cfg),
|
|
FALSE, 0, 0);
|
|
#endif /* RSSI_MONITOR_SUPPORT */
|
|
if (dhdp->conf->eapol_status == EAPOL_STATUS_4WAY_DONE &&
|
|
!memcmp(ndev->name, WL_P2P_INTERFACE_PREFIX, strlen(WL_P2P_INTERFACE_PREFIX))) {
|
|
// terence 20130703: Fix for wrong group_capab (timing issue)
|
|
cfg->p2p_disconnected = 1;
|
|
}
|
|
memcpy(&cfg->disconnected_bssid, curbssid, ETHER_ADDR_LEN);
|
|
wl_clr_drv_status(cfg, CONNECTED, ndev);
|
|
|
|
if (!wl_get_drv_status(cfg, DISCONNECTING, ndev)) {
|
|
DHD_STATLOG_CTRL(dhdp, ST(DISASSOC_INT_START),
|
|
dhd_net2idx(dhdp->info, ndev),
|
|
WLAN_REASON_DEAUTH_LEAVING);
|
|
/* To make sure disconnect, explictly send dissassoc
|
|
* for BSSID 00:00:00:00:00:00 issue
|
|
*/
|
|
scbval.val = WLAN_REASON_DEAUTH_LEAVING;
|
|
WL_INFORM_MEM(("clear fw state\n"));
|
|
memcpy(&scbval.ea, curbssid, ETHER_ADDR_LEN);
|
|
scbval.val = htod32(scbval.val);
|
|
err = wldev_ioctl_set(ndev, WLC_DISASSOC, &scbval,
|
|
sizeof(scb_val_t));
|
|
if (err < 0) {
|
|
WL_ERR(("WLC_DISASSOC error %d\n", err));
|
|
err = 0;
|
|
}
|
|
}
|
|
if (wl_get_drv_status(cfg, DISCONNECTING, ndev)) {
|
|
loc_gen = true;
|
|
}
|
|
WL_INFORM_MEM(("[%s] Indicate disconnect event to upper layer. "
|
|
"event: %d reason=%d from " MACDBG "\n",
|
|
ndev->name, event, ntoh32(e->reason),
|
|
MAC2STRDBG((const u8*)(&e->addr))));
|
|
|
|
DHD_STATLOG_CTRL(dhdp, ST(DISASSOC_DONE),
|
|
dhd_net2idx(dhdp->info, ndev), reason);
|
|
/* Send up deauth and clear states */
|
|
|
|
/*
|
|
* FW sends body and body len as a part of deauth
|
|
* and disassoc events (WLC_E_DISASSOC_IND, WLC_E_DEAUTH_IND)
|
|
* The VIEs sits after reason code in the body. Reason code is
|
|
* 2 bytes long.
|
|
*/
|
|
WL_DBG(("recv disconnect ies ie_len = %d\n", ie_len));
|
|
if (event == WLC_E_DISASSOC_IND || event == WLC_E_DEAUTH_IND) {
|
|
if ((datalen > DOT11_DISCONNECT_RC) &&
|
|
datalen < (VNDR_IE_MAX_LEN + DOT11_DISCONNECT_RC) &&
|
|
data) {
|
|
ie_ptr = (uchar*)data + DOT11_DISCONNECT_RC;
|
|
ie_len = datalen - DOT11_DISCONNECT_RC;
|
|
}
|
|
} else if (event == WLC_E_LINK &&
|
|
ntoh32(e->reason) == WLC_E_LINK_BCN_LOSS) {
|
|
#ifdef WL_ANALYTICS
|
|
/*
|
|
* In case of linkdown, FW sends prb rsp IEs. Disco VIE
|
|
* are appended with prb rsp ies. Remove prb rsp IES and
|
|
* send disco vie to upper layer.
|
|
* Disco VIE has fixed len of 11 octets.
|
|
* As per SS spec.(2 octet header + 9 octet VIE)
|
|
*/
|
|
if (datalen < (VNDR_IE_MAX_LEN + DOT11_DISCONNECT_RC) &&
|
|
datalen >= DOT11_DISCONNECT_RC &&
|
|
((err = wl_cfg80211_parse_vndr_ies(
|
|
(const u8 *)data, datalen,
|
|
&disco_vndr_ie)) == BCME_OK)) {
|
|
for (i = 0; i < disco_vndr_ie.count; i++) {
|
|
vndrie_info = &disco_vndr_ie.ie_info[i];
|
|
if ((vndrie_info->vndrie.id ==
|
|
0xDD) && (!memcmp(
|
|
vndrie_info->vndrie.oui,
|
|
SSE_OUI, DOT11_OUI_LEN)) &&
|
|
(vndrie_info->vndrie.data[0] ==
|
|
VENDOR_ENTERPRISE_STA_OUI_TYPE)) {
|
|
ie_ptr = (u8 *)vndrie_info->ie_ptr;
|
|
ie_len = vndrie_info->ie_len;
|
|
}
|
|
}
|
|
}
|
|
#endif /* WL_ANALYTICS */
|
|
}
|
|
|
|
CFG80211_DISCONNECTED(ndev, reason, ie_ptr, ie_len,
|
|
loc_gen, GFP_KERNEL);
|
|
WL_INFORM_MEM(("[%s] Disconnect event sent to upper layer"
|
|
"event:%d reason=%d ie_len=%d from " MACDBG "\n",
|
|
ndev->name, event, ntoh32(e->reason), ie_len,
|
|
MAC2STRDBG((const u8*)(&e->addr))));
|
|
|
|
/* Wait for status to be cleared to prevent race condition
|
|
* issues with connect context
|
|
*/
|
|
wl_cfg80211_disconnect_state_sync(cfg, ndev);
|
|
wl_link_down(cfg);
|
|
wl_init_prof(cfg, ndev);
|
|
}
|
|
else if (wl_get_drv_status(cfg, CONNECTING, ndev)) {
|
|
DHD_STATLOG_CTRL(dhdp, ST(DISASSOC_INT_START),
|
|
dhd_net2idx(dhdp->info, ndev), 0);
|
|
WL_INFORM_MEM(("link down, during connecting\n"));
|
|
/* Issue WLC_DISASSOC to prevent FW roam attempts.
|
|
* Do not issue WLC_DISASSOC again if the linkdown is
|
|
* generated due to local disassoc, to avoid connect-disconnect
|
|
* loop.
|
|
*/
|
|
if (!((event == WLC_E_LINK) &&
|
|
(ntoh32(e->reason) == WLC_E_LINK_DISASSOC) &&
|
|
(ntoh32(e->status) == WLC_E_STATUS_SUCCESS))) {
|
|
err = wldev_ioctl_set(ndev, WLC_DISASSOC, NULL, 0);
|
|
if (err < 0) {
|
|
WL_ERR(("CONNECTING state,"
|
|
" WLC_DISASSOC error %d\n",
|
|
err));
|
|
err = 0;
|
|
}
|
|
#ifdef ESCAN_RESULT_PATCH
|
|
if ((memcmp(connect_req_bssid, broad_bssid,
|
|
ETHER_ADDR_LEN) == 0) ||
|
|
(memcmp(&e->addr, broad_bssid,
|
|
ETHER_ADDR_LEN) == 0) ||
|
|
(memcmp(&e->addr, connect_req_bssid,
|
|
ETHER_ADDR_LEN) == 0))
|
|
/* In case this event comes while associating
|
|
* another AP
|
|
*/
|
|
#endif /* ESCAN_RESULT_PATCH */
|
|
wl_bss_connect_done(cfg, ndev, e, data, false);
|
|
}
|
|
}
|
|
wl_clr_drv_status(cfg, DISCONNECTING, ndev);
|
|
wl_cfg80211_check_in4way(cfg, ndev, NO_SCAN_IN4WAY|NO_BTC_IN4WAY|WAIT_DISCONNECTED,
|
|
WL_EXT_STATUS_DISCONNECTED, NULL);
|
|
|
|
/* if link down, bsscfg is diabled */
|
|
if (ndev != bcmcfg_to_prmry_ndev(cfg))
|
|
complete(&cfg->iface_disable);
|
|
#ifdef WLTDLS
|
|
/* re-enable TDLS if the number of connected interfaces
|
|
* is less than 2.
|
|
*/
|
|
wl_cfg80211_tdls_config(cfg, TDLS_STATE_DISCONNECT, false);
|
|
#endif /* WLTDLS */
|
|
} else if (wl_is_nonetwork(cfg, e)) {
|
|
WL_ERR(("connect failed event=%d e->status %d e->reason %d \n",
|
|
event, (int)ntoh32(e->status), (int)ntoh32(e->reason)));
|
|
wl_cfg80211_check_in4way(cfg, ndev, NO_SCAN_IN4WAY|NO_BTC_IN4WAY|WAIT_DISCONNECTED,
|
|
WL_EXT_STATUS_DISCONNECTED, NULL);
|
|
#ifdef WL_WPS_SYNC
|
|
if (wl_wps_session_update(ndev,
|
|
WPS_STATE_CONNECT_FAIL, e->addr.octet) == BCME_UNSUPPORTED) {
|
|
/* Unexpected event. Ignore it. */
|
|
return 0;
|
|
}
|
|
#endif /* WL_WPS_SYNC */
|
|
/* Dump FW preserve buffer content */
|
|
wl_flush_fw_log_buffer(ndev, FW_LOGSET_MASK_ALL);
|
|
|
|
/* Clean up any pending scan request */
|
|
wl_cfg80211_cancel_scan(cfg);
|
|
|
|
if (wl_get_drv_status(cfg, CONNECTING, ndev)) {
|
|
if (!wl_get_drv_status(cfg, DISCONNECTING, ndev)) {
|
|
WL_INFORM_MEM(("wl dissassoc\n"));
|
|
err = wldev_ioctl_set(ndev, WLC_DISASSOC, NULL, 0);
|
|
if (err < 0) {
|
|
WL_ERR(("WLC_DISASSOC error %d\n", err));
|
|
err = 0;
|
|
}
|
|
} else {
|
|
WL_DBG(("connect fail. clear disconnecting bit\n"));
|
|
wl_clr_drv_status(cfg, DISCONNECTING, ndev);
|
|
}
|
|
wl_bss_connect_done(cfg, ndev, e, data, false);
|
|
wl_clr_drv_status(cfg, CONNECTING, ndev);
|
|
WL_INFORM_MEM(("connect fail reported\n"));
|
|
}
|
|
} else {
|
|
WL_DBG(("%s nothing\n", __FUNCTION__));
|
|
}
|
|
DHD_ENABLE_RUNTIME_PM((dhd_pub_t *)cfg->pub);
|
|
} else {
|
|
WL_MSG(ndev->name, "Invalid mode %d event %d status %d\n",
|
|
wl_get_mode_by_netdev(cfg, ndev), ntoh32(e->event_type),
|
|
ntoh32(e->status));
|
|
}
|
|
return err;
|
|
}
|
|
|
|
#ifdef WL_RELMCAST
|
|
void wl_cfg80211_set_rmc_pid(struct net_device *dev, int pid)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(dev);
|
|
if (pid > 0)
|
|
cfg->rmc_event_pid = pid;
|
|
WL_DBG(("set pid for rmc event : pid=%d\n", pid));
|
|
}
|
|
#endif /* WL_RELMCAST */
|
|
|
|
#ifdef WL_RELMCAST
|
|
static s32
|
|
wl_notify_rmc_status(struct bcm_cfg80211 *cfg, bcm_struct_cfgdev *cfgdev,
|
|
const wl_event_msg_t *e, void *data)
|
|
{
|
|
u32 evt = ntoh32(e->event_type);
|
|
u32 reason = ntoh32(e->reason);
|
|
int ret = -1;
|
|
|
|
switch (reason) {
|
|
case WLC_E_REASON_RMC_AR_LOST:
|
|
case WLC_E_REASON_RMC_AR_NO_ACK:
|
|
if (cfg->rmc_event_pid != 0) {
|
|
ret = wl_netlink_send_msg(cfg->rmc_event_pid,
|
|
RMC_EVENT_LEADER_CHECK_FAIL,
|
|
cfg->rmc_event_seq++, NULL, 0);
|
|
}
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
WL_DBG(("rmcevent : evt=%d, pid=%d, ret=%d\n", evt, cfg->rmc_event_pid, ret));
|
|
return ret;
|
|
}
|
|
#endif /* WL_RELMCAST */
|
|
|
|
#ifdef GSCAN_SUPPORT
|
|
static s32
|
|
wl_handle_roam_exp_event(struct bcm_cfg80211 *cfg, bcm_struct_cfgdev *cfgdev,
|
|
const wl_event_msg_t *e, void *data)
|
|
{
|
|
struct net_device *ndev = NULL;
|
|
u32 datalen = be32_to_cpu(e->datalen);
|
|
|
|
if (datalen) {
|
|
wl_roam_exp_event_t *evt_data = (wl_roam_exp_event_t *)data;
|
|
if (evt_data->version == ROAM_EXP_EVENT_VERSION) {
|
|
wlc_ssid_t *ssid = &evt_data->cur_ssid;
|
|
struct wireless_dev *wdev;
|
|
ndev = cfgdev_to_wlc_ndev(cfgdev, cfg);
|
|
if (ndev) {
|
|
wdev = ndev->ieee80211_ptr;
|
|
wdev->ssid_len = min(ssid->SSID_len, (uint32)DOT11_MAX_SSID_LEN);
|
|
memcpy(wdev->ssid, ssid->SSID, wdev->ssid_len);
|
|
WL_ERR(("SSID is %s\n", ssid->SSID));
|
|
wl_update_prof(cfg, ndev, NULL, ssid, WL_PROF_SSID);
|
|
} else {
|
|
WL_ERR(("NULL ndev!\n"));
|
|
}
|
|
} else {
|
|
WL_ERR(("Version mismatch %d, expected %d", evt_data->version,
|
|
ROAM_EXP_EVENT_VERSION));
|
|
}
|
|
}
|
|
return BCME_OK;
|
|
}
|
|
#endif /* GSCAN_SUPPORT */
|
|
|
|
#ifdef RSSI_MONITOR_SUPPORT
|
|
static s32 wl_handle_rssi_monitor_event(struct bcm_cfg80211 *cfg, bcm_struct_cfgdev *cfgdev,
|
|
const wl_event_msg_t *e, void *data)
|
|
{
|
|
|
|
#if defined(WL_VENDOR_EXT_SUPPORT) || defined(CONFIG_BCMDHD_VENDOR_EXT)
|
|
u32 datalen = be32_to_cpu(e->datalen);
|
|
struct net_device *ndev = cfgdev_to_wlc_ndev(cfgdev, cfg);
|
|
struct wiphy *wiphy = bcmcfg_to_wiphy(cfg);
|
|
|
|
if (datalen) {
|
|
wl_rssi_monitor_evt_t *evt_data = (wl_rssi_monitor_evt_t *)data;
|
|
if (evt_data->version == RSSI_MONITOR_VERSION) {
|
|
dhd_rssi_monitor_evt_t monitor_data;
|
|
monitor_data.version = DHD_RSSI_MONITOR_EVT_VERSION;
|
|
monitor_data.cur_rssi = evt_data->cur_rssi;
|
|
memcpy(&monitor_data.BSSID, &e->addr, ETHER_ADDR_LEN);
|
|
wl_cfgvendor_send_async_event(wiphy, ndev,
|
|
GOOGLE_RSSI_MONITOR_EVENT,
|
|
&monitor_data, sizeof(monitor_data));
|
|
} else {
|
|
WL_ERR(("Version mismatch %d, expected %d", evt_data->version,
|
|
RSSI_MONITOR_VERSION));
|
|
}
|
|
}
|
|
#endif /* WL_VENDOR_EXT_SUPPORT || CONFIG_BCMDHD_VENDOR_EXT */
|
|
return BCME_OK;
|
|
}
|
|
#endif /* RSSI_MONITOR_SUPPORT */
|
|
|
|
static s32
|
|
wl_notify_roaming_status(struct bcm_cfg80211 *cfg, bcm_struct_cfgdev *cfgdev,
|
|
const wl_event_msg_t *e, void *data)
|
|
{
|
|
bool act;
|
|
struct net_device *ndev = NULL;
|
|
s32 err = 0;
|
|
u32 event = be32_to_cpu(e->event_type);
|
|
u32 status = be32_to_cpu(e->status);
|
|
#ifdef DHD_LOSSLESS_ROAMING
|
|
struct wl_security *sec;
|
|
#endif // endif
|
|
dhd_pub_t *dhdp = (dhd_pub_t *)(cfg->pub);
|
|
WL_DBG(("Enter \n"));
|
|
|
|
BCM_REFERENCE(dhdp);
|
|
ndev = cfgdev_to_wlc_ndev(cfgdev, cfg);
|
|
|
|
if ((!cfg->disable_roam_event) && (event == WLC_E_BSSID)) {
|
|
wl_add_remove_eventmsg(ndev, WLC_E_ROAM, false);
|
|
cfg->disable_roam_event = TRUE;
|
|
}
|
|
|
|
if ((cfg->disable_roam_event) && (event == WLC_E_ROAM))
|
|
return err;
|
|
|
|
if ((event == WLC_E_ROAM || event == WLC_E_BSSID) && status == WLC_E_STATUS_SUCCESS) {
|
|
if (wl_get_drv_status(cfg, CONNECTED, ndev)) {
|
|
#ifdef DHD_LOSSLESS_ROAMING
|
|
sec = wl_read_prof(cfg, ndev, WL_PROF_SEC);
|
|
/* In order to reduce roaming delay, wl_bss_roaming_done is
|
|
* early called with WLC_E_LINK event. It is called from
|
|
* here only if WLC_E_LINK event is blocked for specific
|
|
* security type.
|
|
*/
|
|
if (IS_AKM_SUITE_FT(sec)) {
|
|
wl_bss_roaming_done(cfg, ndev, e, data);
|
|
/* Arm pkt logging timer */
|
|
dhd_dump_mod_pkt_timer(dhdp, PKT_CNT_RSN_ROAM);
|
|
}
|
|
/* Roam timer is deleted mostly from wl_cfg80211_change_station
|
|
* after roaming is finished successfully. We need to delete
|
|
* the timer from here only for some security types that aren't
|
|
* using wl_cfg80211_change_station to authorize SCB
|
|
*/
|
|
if (IS_AKM_SUITE_FT(sec) || IS_AKM_SUITE_CCKM(sec)) {
|
|
wl_del_roam_timeout(cfg);
|
|
}
|
|
#else
|
|
#if !defined(DHD_NONFT_ROAMING)
|
|
wl_bss_roaming_done(cfg, ndev, e, data);
|
|
#endif /* !DHD_NONFT_ROAMING */
|
|
#endif /* DHD_LOSSLESS_ROAMING */
|
|
} else {
|
|
wl_bss_connect_done(cfg, ndev, e, data, true);
|
|
}
|
|
act = true;
|
|
wl_update_prof(cfg, ndev, e, &act, WL_PROF_ACT);
|
|
wl_update_prof(cfg, ndev, NULL, (const void *)&e->addr, WL_PROF_BSSID);
|
|
|
|
if (ndev == bcmcfg_to_prmry_ndev(cfg)) {
|
|
wl_vndr_ies_get_vendor_oui(cfg, ndev, NULL, 0);
|
|
}
|
|
}
|
|
#ifdef DHD_LOSSLESS_ROAMING
|
|
else if ((event == WLC_E_ROAM || event == WLC_E_BSSID) && status != WLC_E_STATUS_SUCCESS) {
|
|
wl_del_roam_timeout(cfg);
|
|
}
|
|
#endif // endif
|
|
return err;
|
|
}
|
|
|
|
#ifdef CUSTOM_EVENT_PM_WAKE
|
|
uint32 last_dpm_upd_time = 0; /* ms */
|
|
#define DPM_UPD_LMT_TIME ((CUSTOM_EVENT_PM_WAKE + (5)) * (1000) * (4)) /* ms */
|
|
#define DPM_UPD_LMT_RSSI -85 /* dbm */
|
|
|
|
static s32
|
|
wl_check_pmstatus(struct bcm_cfg80211 *cfg, bcm_struct_cfgdev *cfgdev,
|
|
const wl_event_msg_t *e, void *data)
|
|
{
|
|
s32 err = BCME_OK;
|
|
struct net_device *ndev = NULL;
|
|
u8 *pbuf = NULL;
|
|
uint32 cur_dpm_upd_time = 0;
|
|
dhd_pub_t *dhd = (dhd_pub_t *)(cfg->pub);
|
|
s32 rssi;
|
|
#ifdef SUPPORT_RSSI_SUM_REPORT
|
|
wl_rssi_ant_mimo_t rssi_ant_mimo;
|
|
#endif /* SUPPORT_RSSI_SUM_REPORT */
|
|
ndev = cfgdev_to_wlc_ndev(cfgdev, cfg);
|
|
|
|
pbuf = (u8 *)MALLOCZ(cfg->osh, WLC_IOCTL_MEDLEN);
|
|
if (pbuf == NULL) {
|
|
WL_ERR(("failed to allocate local pbuf\n"));
|
|
return -ENOMEM;
|
|
}
|
|
|
|
err = wldev_iovar_getbuf_bsscfg(ndev, "dump",
|
|
"pm", strlen("pm"), pbuf, WLC_IOCTL_MEDLEN,
|
|
0, &cfg->ioctl_buf_sync);
|
|
|
|
if (err) {
|
|
WL_ERR(("dump ioctl err = %d", err));
|
|
} else {
|
|
WL_ERR(("PM status : %s\n", pbuf));
|
|
}
|
|
|
|
if (pbuf) {
|
|
MFREE(cfg->osh, pbuf, WLC_IOCTL_MEDLEN);
|
|
}
|
|
|
|
if (dhd->early_suspended) {
|
|
/* LCD off */
|
|
#ifdef SUPPORT_RSSI_SUM_REPORT
|
|
/* Query RSSI sum across antennas */
|
|
memset(&rssi_ant_mimo, 0, sizeof(rssi_ant_mimo));
|
|
err = wl_get_rssi_per_ant(ndev, ndev->name, NULL, &rssi_ant_mimo);
|
|
if (err) {
|
|
WL_ERR(("Could not get rssi sum (%d)\n", err));
|
|
}
|
|
rssi = rssi_ant_mimo.rssi_sum;
|
|
if (rssi == 0)
|
|
#endif /* SUPPORT_RSSI_SUM_REPORT */
|
|
{
|
|
scb_val_t scb_val;
|
|
memset(&scb_val, 0, sizeof(scb_val_t));
|
|
scb_val.val = 0;
|
|
err = wldev_ioctl_get(ndev, WLC_GET_RSSI, &scb_val, sizeof(scb_val_t));
|
|
if (err) {
|
|
WL_ERR(("Could not get rssi (%d)\n", err));
|
|
}
|
|
#if defined(RSSIOFFSET)
|
|
rssi = wl_update_rssi_offset(ndev, dtoh32(scb_val.val));
|
|
#else
|
|
rssi = dtoh32(scb_val.val);
|
|
#endif
|
|
}
|
|
WL_ERR(("RSSI %d dBm\n", rssi));
|
|
if (rssi > DPM_UPD_LMT_RSSI) {
|
|
return err;
|
|
}
|
|
} else {
|
|
/* LCD on */
|
|
return err;
|
|
}
|
|
|
|
if (last_dpm_upd_time == 0) {
|
|
last_dpm_upd_time = OSL_SYSUPTIME();
|
|
} else {
|
|
cur_dpm_upd_time = OSL_SYSUPTIME();
|
|
if (cur_dpm_upd_time - last_dpm_upd_time < DPM_UPD_LMT_TIME) {
|
|
scb_val_t scbval;
|
|
DHD_STATLOG_CTRL(dhd, ST(DISASSOC_INT_START),
|
|
dhd_net2idx(dhd->info, ndev), 0);
|
|
bzero(&scbval, sizeof(scb_val_t));
|
|
|
|
err = wldev_ioctl_set(ndev, WLC_DISASSOC,
|
|
&scbval, sizeof(scb_val_t));
|
|
if (err < 0) {
|
|
WL_ERR(("Disassoc error %d\n", err));
|
|
return err;
|
|
}
|
|
WL_ERR(("Force Disassoc due to updated DPM event.\n"));
|
|
|
|
last_dpm_upd_time = 0;
|
|
} else {
|
|
last_dpm_upd_time = cur_dpm_upd_time;
|
|
}
|
|
}
|
|
|
|
return err;
|
|
}
|
|
#endif /* CUSTOM_EVENT_PM_WAKE */
|
|
|
|
#ifdef QOS_MAP_SET
|
|
/* get user priority table */
|
|
uint8 *
|
|
wl_get_up_table(dhd_pub_t * dhdp, int idx)
|
|
{
|
|
struct net_device *ndev;
|
|
struct bcm_cfg80211 *cfg;
|
|
|
|
ndev = dhd_idx2net(dhdp, idx);
|
|
if (ndev) {
|
|
cfg = wl_get_cfg(ndev);
|
|
if (cfg)
|
|
return (uint8 *)(cfg->up_table);
|
|
}
|
|
|
|
return NULL;
|
|
}
|
|
#endif /* QOS_MAP_SET */
|
|
|
|
#if defined(DHD_LOSSLESS_ROAMING) || defined(DBG_PKT_MON)
|
|
static s32
|
|
wl_notify_roam_prep_status(struct bcm_cfg80211 *cfg, bcm_struct_cfgdev *cfgdev,
|
|
const wl_event_msg_t *e, void *data)
|
|
{
|
|
struct wl_security *sec;
|
|
struct net_device *ndev;
|
|
dhd_pub_t *dhdp = (dhd_pub_t *)(cfg->pub);
|
|
u32 status = ntoh32(e->status);
|
|
u32 reason = ntoh32(e->reason);
|
|
|
|
BCM_REFERENCE(sec);
|
|
|
|
if (status == WLC_E_STATUS_SUCCESS && reason != WLC_E_REASON_INITIAL_ASSOC) {
|
|
WL_ERR(("Attempting roam with reason code : %d\n", reason));
|
|
}
|
|
|
|
#ifdef CONFIG_SILENT_ROAM
|
|
if (dhdp->in_suspend && reason == WLC_E_REASON_SILENT_ROAM) {
|
|
dhdp->sroamed = TRUE;
|
|
}
|
|
#endif /* CONFIG_SILENT_ROAM */
|
|
|
|
ndev = cfgdev_to_wlc_ndev(cfgdev, cfg);
|
|
|
|
#ifdef DBG_PKT_MON
|
|
if (ndev == bcmcfg_to_prmry_ndev(cfg)) {
|
|
DHD_DBG_PKT_MON_STOP(dhdp);
|
|
DHD_DBG_PKT_MON_START(dhdp);
|
|
}
|
|
#endif /* DBG_PKT_MON */
|
|
#ifdef DHD_LOSSLESS_ROAMING
|
|
sec = wl_read_prof(cfg, ndev, WL_PROF_SEC);
|
|
/* Disable Lossless Roaming for specific AKM suite
|
|
* Any other AKM suite can be added below if transition time
|
|
* is delayed because of Lossless Roaming
|
|
* and it causes any certication failure
|
|
*/
|
|
if (IS_AKM_SUITE_FT(sec)) {
|
|
return BCME_OK;
|
|
}
|
|
|
|
dhdp->dequeue_prec_map = 1 << PRIO_8021D_NC;
|
|
/* Restore flow control */
|
|
dhd_txflowcontrol(dhdp, ALL_INTERFACES, OFF);
|
|
|
|
mod_timer(&cfg->roam_timeout, jiffies + msecs_to_jiffies(WL_ROAM_TIMEOUT_MS));
|
|
#endif /* DHD_LOSSLESS_ROAMING */
|
|
|
|
return BCME_OK;
|
|
}
|
|
#endif /* DHD_LOSSLESS_ROAMING || DBG_PKT_MON */
|
|
|
|
static s32
|
|
wl_notify_roam_start_status(struct bcm_cfg80211 *cfg, bcm_struct_cfgdev *cfgdev,
|
|
const wl_event_msg_t *e, void *data)
|
|
{
|
|
#if (LINUX_VERSION_CODE > KERNEL_VERSION(3, 13, 0)) || defined(WL_VENDOR_EXT_SUPPORT)
|
|
struct net_device *ndev = cfgdev_to_wlc_ndev(cfgdev, cfg);
|
|
struct wiphy *wiphy = bcmcfg_to_wiphy(cfg);
|
|
int event_type;
|
|
|
|
event_type = WIFI_EVENT_ROAM_SCAN_STARTED;
|
|
wl_cfgvendor_send_async_event(wiphy, ndev, GOOGLE_ROAM_EVENT_START,
|
|
&event_type, sizeof(int));
|
|
#endif /* (LINUX_VERSION_CODE > KERNEL_VERSION(3, 13, 0)) || (WL_VENDOR_EXT_SUPPORT) */
|
|
|
|
return BCME_OK;
|
|
}
|
|
|
|
static s32 wl_get_assoc_ies(struct bcm_cfg80211 *cfg, struct net_device *ndev)
|
|
{
|
|
wl_assoc_info_t assoc_info;
|
|
struct wl_connect_info *conn_info = wl_to_conn(cfg);
|
|
s32 err = 0;
|
|
#ifdef QOS_MAP_SET
|
|
bcm_tlv_t * qos_map_ie = NULL;
|
|
#endif /* QOS_MAP_SET */
|
|
|
|
WL_DBG(("Enter \n"));
|
|
err = wldev_iovar_getbuf(ndev, "assoc_info", NULL, 0, cfg->extra_buf,
|
|
WL_ASSOC_INFO_MAX, NULL);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("could not get assoc info (%d)\n", err));
|
|
return err;
|
|
}
|
|
memcpy(&assoc_info, cfg->extra_buf, sizeof(wl_assoc_info_t));
|
|
assoc_info.req_len = htod32(assoc_info.req_len);
|
|
assoc_info.resp_len = htod32(assoc_info.resp_len);
|
|
assoc_info.flags = htod32(assoc_info.flags);
|
|
if (conn_info->req_ie_len) {
|
|
conn_info->req_ie_len = 0;
|
|
bzero(conn_info->req_ie, sizeof(conn_info->req_ie));
|
|
}
|
|
if (conn_info->resp_ie_len) {
|
|
conn_info->resp_ie_len = 0;
|
|
bzero(conn_info->resp_ie, sizeof(conn_info->resp_ie));
|
|
}
|
|
|
|
if (assoc_info.req_len) {
|
|
err = wldev_iovar_getbuf(ndev, "assoc_req_ies", NULL, 0, cfg->extra_buf,
|
|
assoc_info.req_len, NULL);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("could not get assoc req (%d)\n", err));
|
|
return err;
|
|
}
|
|
if (assoc_info.req_len < sizeof(struct dot11_assoc_req)) {
|
|
WL_ERR(("req_len %d lessthan %d \n", assoc_info.req_len,
|
|
(int)sizeof(struct dot11_assoc_req)));
|
|
return BCME_BADLEN;
|
|
}
|
|
conn_info->req_ie_len = (uint32)(assoc_info.req_len
|
|
- sizeof(struct dot11_assoc_req));
|
|
if (assoc_info.flags & WLC_ASSOC_REQ_IS_REASSOC) {
|
|
conn_info->req_ie_len -= ETHER_ADDR_LEN;
|
|
}
|
|
if (conn_info->req_ie_len <= MAX_REQ_LINE)
|
|
memcpy(conn_info->req_ie, cfg->extra_buf, conn_info->req_ie_len);
|
|
else {
|
|
WL_ERR(("IE size %d above max %d size \n",
|
|
conn_info->req_ie_len, MAX_REQ_LINE));
|
|
return err;
|
|
}
|
|
} else {
|
|
conn_info->req_ie_len = 0;
|
|
}
|
|
|
|
if (assoc_info.resp_len) {
|
|
err = wldev_iovar_getbuf(ndev, "assoc_resp_ies", NULL, 0, cfg->extra_buf,
|
|
assoc_info.resp_len, NULL);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("could not get assoc resp (%d)\n", err));
|
|
return err;
|
|
}
|
|
if (assoc_info.resp_len < sizeof(struct dot11_assoc_resp)) {
|
|
WL_ERR(("resp_len %d is lessthan %d \n", assoc_info.resp_len,
|
|
(int)sizeof(struct dot11_assoc_resp)));
|
|
return BCME_BADLEN;
|
|
}
|
|
conn_info->resp_ie_len = assoc_info.resp_len -
|
|
(uint32)sizeof(struct dot11_assoc_resp);
|
|
if (conn_info->resp_ie_len <= MAX_REQ_LINE) {
|
|
memcpy(conn_info->resp_ie, cfg->extra_buf, conn_info->resp_ie_len);
|
|
} else {
|
|
WL_ERR(("IE size %d above max %d size \n",
|
|
conn_info->resp_ie_len, MAX_REQ_LINE));
|
|
return err;
|
|
}
|
|
|
|
#ifdef QOS_MAP_SET
|
|
/* find qos map set ie */
|
|
if ((qos_map_ie = bcm_parse_tlvs(conn_info->resp_ie, conn_info->resp_ie_len,
|
|
DOT11_MNG_QOS_MAP_ID)) != NULL) {
|
|
WL_DBG((" QoS map set IE found in assoc response\n"));
|
|
if (!cfg->up_table) {
|
|
cfg->up_table = (uint8 *)MALLOC(cfg->osh, UP_TABLE_MAX);
|
|
}
|
|
wl_set_up_table(cfg->up_table, qos_map_ie);
|
|
} else {
|
|
MFREE(cfg->osh, cfg->up_table, UP_TABLE_MAX);
|
|
}
|
|
#endif /* QOS_MAP_SET */
|
|
} else {
|
|
conn_info->resp_ie_len = 0;
|
|
}
|
|
WL_DBG(("req len (%d) resp len (%d)\n", conn_info->req_ie_len,
|
|
conn_info->resp_ie_len));
|
|
|
|
return err;
|
|
}
|
|
|
|
static s32 wl_ch_to_chanspec(struct net_device *dev, int ch, struct wl_join_params *join_params,
|
|
size_t *join_params_size)
|
|
{
|
|
chanspec_t chanspec = 0, chspec;
|
|
struct bcm_cfg80211 *cfg =
|
|
(struct bcm_cfg80211 *)wiphy_priv(dev->ieee80211_ptr->wiphy);
|
|
|
|
if ((ch != 0) && (cfg && !cfg->rcc_enabled)) {
|
|
join_params->params.chanspec_num = 1;
|
|
join_params->params.chanspec_list[0] = ch;
|
|
|
|
if (join_params->params.chanspec_list[0] <= CH_MAX_2G_CHANNEL)
|
|
chanspec |= WL_CHANSPEC_BAND_2G;
|
|
else
|
|
chanspec |= WL_CHANSPEC_BAND_5G;
|
|
|
|
/* Get the min_bw set for the interface */
|
|
chspec = WL_CHANSPEC_BW_20;
|
|
if (chspec == INVCHANSPEC) {
|
|
WL_ERR(("Invalid chanspec \n"));
|
|
return -EINVAL;
|
|
}
|
|
chanspec |= chspec;
|
|
chanspec |= WL_CHANSPEC_CTL_SB_NONE;
|
|
|
|
*join_params_size += WL_ASSOC_PARAMS_FIXED_SIZE +
|
|
join_params->params.chanspec_num * sizeof(chanspec_t);
|
|
|
|
join_params->params.chanspec_list[0] &= WL_CHANSPEC_CHAN_MASK;
|
|
join_params->params.chanspec_list[0] |= chanspec;
|
|
join_params->params.chanspec_list[0] =
|
|
wl_chspec_host_to_driver(join_params->params.chanspec_list[0]);
|
|
|
|
join_params->params.chanspec_num =
|
|
htod32(join_params->params.chanspec_num);
|
|
}
|
|
#ifdef ESCAN_CHANNEL_CACHE
|
|
else {
|
|
/* If channel is not present and ESCAN_CHANNEL_CACHE is enabled,
|
|
* use the cached channel list
|
|
*/
|
|
int n_channels;
|
|
n_channels = get_roam_channel_list(ch, join_params->params.chanspec_list,
|
|
MAX_ROAM_CHANNEL, &join_params->ssid, ioctl_version);
|
|
join_params->params.chanspec_num = htod32(n_channels);
|
|
*join_params_size += WL_ASSOC_PARAMS_FIXED_SIZE +
|
|
join_params->params.chanspec_num * sizeof(chanspec_t);
|
|
}
|
|
#endif /* ESCAN_CHANNEL_CACHE */
|
|
|
|
WL_DBG(("join_params->params.chanspec_list[0]= %X, %d channels\n",
|
|
join_params->params.chanspec_list[0],
|
|
join_params->params.chanspec_num));
|
|
return 0;
|
|
}
|
|
|
|
static s32 wl_update_bss_info(struct bcm_cfg80211 *cfg, struct net_device *ndev,
|
|
bool update_ssid)
|
|
{
|
|
struct cfg80211_bss *bss;
|
|
wl_bss_info_t *bi;
|
|
struct wlc_ssid *ssid;
|
|
const struct bcm_tlv *tim;
|
|
s32 beacon_interval;
|
|
s32 dtim_period;
|
|
size_t ie_len;
|
|
const u8 *ie;
|
|
u8 *curbssid;
|
|
s32 err = 0;
|
|
struct wiphy *wiphy;
|
|
u32 channel;
|
|
char *buf;
|
|
u32 freq, band;
|
|
|
|
wiphy = bcmcfg_to_wiphy(cfg);
|
|
|
|
ssid = (struct wlc_ssid *)wl_read_prof(cfg, ndev, WL_PROF_SSID);
|
|
curbssid = wl_read_prof(cfg, ndev, WL_PROF_BSSID);
|
|
bss = CFG80211_GET_BSS(wiphy, NULL, curbssid,
|
|
ssid->SSID, ssid->SSID_len);
|
|
buf = (char *)MALLOCZ(cfg->osh, WL_EXTRA_BUF_MAX);
|
|
if (!buf) {
|
|
WL_ERR(("buffer alloc failed.\n"));
|
|
return BCME_NOMEM;
|
|
}
|
|
mutex_lock(&cfg->usr_sync);
|
|
*(u32 *)buf = htod32(WL_EXTRA_BUF_MAX);
|
|
err = wldev_ioctl_get(ndev, WLC_GET_BSS_INFO, buf, WL_EXTRA_BUF_MAX);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("Could not get bss info %d\n", err));
|
|
goto update_bss_info_out;
|
|
}
|
|
bi = (wl_bss_info_t *)(buf + 4);
|
|
channel = wf_chspec_ctlchan(wl_chspec_driver_to_host(bi->chanspec));
|
|
wl_update_prof(cfg, ndev, NULL, &channel, WL_PROF_CHAN);
|
|
|
|
if (!bss) {
|
|
WL_DBG(("Could not find the AP\n"));
|
|
if (memcmp(bi->BSSID.octet, curbssid, ETHER_ADDR_LEN)) {
|
|
WL_ERR(("Bssid doesn't match\n"));
|
|
err = -EIO;
|
|
goto update_bss_info_out;
|
|
}
|
|
err = wl_inform_single_bss(cfg, bi, update_ssid);
|
|
if (unlikely(err))
|
|
goto update_bss_info_out;
|
|
|
|
ie = ((u8 *)bi) + bi->ie_offset;
|
|
ie_len = bi->ie_length;
|
|
beacon_interval = cpu_to_le16(bi->beacon_period);
|
|
} else {
|
|
WL_DBG(("Found the AP in the list - BSSID %pM\n", bss->bssid));
|
|
#if LINUX_VERSION_CODE < KERNEL_VERSION(2, 6, 39) && !defined(WL_COMPAT_WIRELESS)
|
|
freq = ieee80211_channel_to_frequency(channel);
|
|
#else
|
|
band = (channel <= CH_MAX_2G_CHANNEL) ? IEEE80211_BAND_2GHZ : IEEE80211_BAND_5GHZ;
|
|
freq = ieee80211_channel_to_frequency(channel, band);
|
|
#endif // endif
|
|
bss->channel = ieee80211_get_channel(wiphy, freq);
|
|
#if defined(WL_CFG80211_P2P_DEV_IF)
|
|
ie = (const u8 *)bss->ies->data;
|
|
ie_len = bss->ies->len;
|
|
#else
|
|
ie = bss->information_elements;
|
|
ie_len = bss->len_information_elements;
|
|
#endif /* WL_CFG80211_P2P_DEV_IF */
|
|
beacon_interval = bss->beacon_interval;
|
|
|
|
CFG80211_PUT_BSS(wiphy, bss);
|
|
}
|
|
|
|
tim = bcm_parse_tlvs(ie, ie_len, WLAN_EID_TIM);
|
|
if (tim) {
|
|
dtim_period = tim->data[1];
|
|
} else {
|
|
/*
|
|
* active scan was done so we could not get dtim
|
|
* information out of probe response.
|
|
* so we speficially query dtim information.
|
|
*/
|
|
dtim_period = 0;
|
|
err = wldev_ioctl_get(ndev, WLC_GET_DTIMPRD,
|
|
&dtim_period, sizeof(dtim_period));
|
|
if (unlikely(err)) {
|
|
WL_ERR(("WLC_GET_DTIMPRD error (%d)\n", err));
|
|
goto update_bss_info_out;
|
|
}
|
|
}
|
|
|
|
wl_update_prof(cfg, ndev, NULL, &beacon_interval, WL_PROF_BEACONINT);
|
|
wl_update_prof(cfg, ndev, NULL, &dtim_period, WL_PROF_DTIMPERIOD);
|
|
|
|
update_bss_info_out:
|
|
if (unlikely(err)) {
|
|
WL_ERR(("Failed with error %d\n", err));
|
|
}
|
|
|
|
MFREE(cfg->osh, buf, WL_EXTRA_BUF_MAX);
|
|
mutex_unlock(&cfg->usr_sync);
|
|
return err;
|
|
}
|
|
|
|
static s32
|
|
wl_bss_roaming_done(struct bcm_cfg80211 *cfg, struct net_device *ndev,
|
|
const wl_event_msg_t *e, void *data)
|
|
{
|
|
struct wl_connect_info *conn_info = wl_to_conn(cfg);
|
|
s32 err = 0;
|
|
u8 *curbssid;
|
|
u32 *channel;
|
|
scb_val_t scbval;
|
|
#if (LINUX_VERSION_CODE > KERNEL_VERSION(2, 6, 39)) || defined(WL_COMPAT_WIRELESS)
|
|
struct wiphy *wiphy = bcmcfg_to_wiphy(cfg);
|
|
struct ieee80211_supported_band *band;
|
|
struct ieee80211_channel *notify_channel = NULL;
|
|
u32 freq;
|
|
struct channel_info ci;
|
|
u32 cur_channel;
|
|
#endif /* LINUX_VERSION > 2.6.39 || WL_COMPAT_WIRELESS */
|
|
#if (defined(CONFIG_ARCH_MSM) && defined(CFG80211_ROAMED_API_UNIFIED)) || \
|
|
(LINUX_VERSION_CODE >= KERNEL_VERSION(4, 12, 0)) || defined(WL_FILS_ROAM_OFFLD) || \
|
|
defined(CFG80211_ROAM_API_GE_4_12)
|
|
struct cfg80211_roam_info roam_info;
|
|
#endif /* (CONFIG_ARCH_MSM && CFG80211_ROAMED_API_UNIFIED) || LINUX_VERSION >= 4.12.0 */
|
|
#if defined(WL_FILS_ROAM_OFFLD)
|
|
struct wl_fils_info *fils_info = wl_to_fils_info(cfg);
|
|
struct wl_security *sec = wl_read_prof(cfg, ndev, WL_PROF_SEC);
|
|
#endif // endif
|
|
dhd_pub_t *dhdp = (dhd_pub_t *)(cfg->pub);
|
|
#ifdef DHD_POST_EAPOL_M1_AFTER_ROAM_EVT
|
|
dhd_if_t *ifp = NULL;
|
|
#endif /* DHD_POST_EAPOL_M1_AFTER_ROAM_EVT */
|
|
#ifdef WLFBT
|
|
uint32 data_len = 0;
|
|
if (data)
|
|
data_len = ntoh32(e->datalen);
|
|
#endif /* WLFBT */
|
|
|
|
BCM_REFERENCE(dhdp);
|
|
curbssid = wl_read_prof(cfg, ndev, WL_PROF_BSSID);
|
|
channel = (u32 *)wl_read_prof(cfg, ndev, WL_PROF_CHAN);
|
|
#if (LINUX_VERSION_CODE > KERNEL_VERSION(2, 6, 39)) || defined(WL_COMPAT_WIRELESS)
|
|
/* Skip calling cfg80211_roamed If the channels are same and
|
|
* the current bssid & the new bssid are same
|
|
* Also clear timer roam_timeout.
|
|
* Only used on BCM4359 devices.
|
|
*/
|
|
bzero(&ci, sizeof(ci));
|
|
if ((wldev_ioctl_get(ndev, WLC_GET_CHANNEL, &ci,
|
|
sizeof(ci))) < 0) {
|
|
WL_ERR(("Failed to get current channel !"));
|
|
err = BCME_ERROR;
|
|
goto fail;
|
|
}
|
|
cur_channel = dtoh32(ci.hw_channel);
|
|
if ((*channel == cur_channel) && ((memcmp(curbssid, &e->addr,
|
|
ETHER_ADDR_LEN) == 0) || (memcmp(&cfg->last_roamed_addr,
|
|
&e->addr, ETHER_ADDR_LEN) == 0))) {
|
|
WL_DBG(("BSS already present, Skipping roamed event to"
|
|
" upper layer\n"));
|
|
goto fail;
|
|
}
|
|
#endif /* LINUX_VERSION > 2.6.39 || WL_COMPAT_WIRELESS */
|
|
|
|
if ((err = wl_get_assoc_ies(cfg, ndev)) != BCME_OK) {
|
|
DHD_STATLOG_CTRL(dhdp, ST(DISASSOC_INT_START),
|
|
dhd_net2idx(dhdp->info, ndev), WLAN_REASON_DEAUTH_LEAVING);
|
|
WL_ERR(("Fetching Assoc IEs failed, Skipping roamed event to"
|
|
" upper layer\n"));
|
|
/* To make sure disconnect, and fw sync, explictly send dissassoc
|
|
* for BSSID 00:00:00:00:00:00 issue
|
|
*/
|
|
bzero(&scbval, sizeof(scb_val_t));
|
|
scbval.val = WLAN_REASON_DEAUTH_LEAVING;
|
|
memcpy(&scbval.ea, curbssid, ETHER_ADDR_LEN);
|
|
scbval.val = htod32(scbval.val);
|
|
if (wldev_ioctl_set(ndev, WLC_DISASSOC, &scbval,
|
|
sizeof(scb_val_t)) < 0) {
|
|
WL_ERR(("WLC_DISASSOC error\n"));
|
|
}
|
|
goto fail;
|
|
}
|
|
|
|
wl_update_prof(cfg, ndev, NULL, (const void *)(e->addr.octet), WL_PROF_BSSID);
|
|
curbssid = wl_read_prof(cfg, ndev, WL_PROF_BSSID);
|
|
if ((err = wl_update_bss_info(cfg, ndev, true)) != BCME_OK) {
|
|
WL_ERR(("failed to update bss info, err=%d\n", err));
|
|
goto fail;
|
|
}
|
|
wl_update_pmklist(ndev, cfg->pmk_list, err);
|
|
|
|
channel = (u32 *)wl_read_prof(cfg, ndev, WL_PROF_CHAN);
|
|
#if (LINUX_VERSION_CODE > KERNEL_VERSION(2, 6, 39)) || defined(WL_COMPAT_WIRELESS)
|
|
/* channel info for cfg80211_roamed introduced in 2.6.39-rc1 */
|
|
if (*channel <= CH_MAX_2G_CHANNEL)
|
|
band = wiphy->bands[IEEE80211_BAND_2GHZ];
|
|
else
|
|
band = wiphy->bands[IEEE80211_BAND_5GHZ];
|
|
freq = ieee80211_channel_to_frequency(*channel, band->band);
|
|
notify_channel = ieee80211_get_channel(wiphy, freq);
|
|
#endif /* LINUX_VERSION > 2.6.39 || WL_COMPAT_WIRELESS */
|
|
#ifdef WLFBT
|
|
/* back up the given FBT key for the further supplicant request,
|
|
* currently not checking the FBT is enabled for current BSS in DHD,
|
|
* because the supplicant decides to take it or not.
|
|
*/
|
|
if (data && (data_len == FBT_KEYLEN)) {
|
|
memcpy(cfg->fbt_key, data, FBT_KEYLEN);
|
|
}
|
|
#endif /* WLFBT */
|
|
#ifdef CUSTOM_LONG_RETRY_LIMIT
|
|
if (wl_set_retry(ndev, CUSTOM_LONG_RETRY_LIMIT, 1) < 0) {
|
|
WL_ERR(("CUSTOM_LONG_RETRY_LIMIT set fail!\n"));
|
|
}
|
|
#endif /* CUSTOM_LONG_RETRY_LIMIT */
|
|
DHD_STATLOG_CTRL(dhdp, ST(REASSOC_INFORM),
|
|
dhd_net2idx(dhdp->info, ndev), 0);
|
|
WL_ERR(("Report roam event to upper layer. " MACDBG " (ch:%d)\n",
|
|
MAC2STRDBG((const u8*)(&e->addr)), *channel));
|
|
wl_cfg80211_check_in4way(cfg, ndev, 0, WL_EXT_STATUS_CONNECTED, NULL);
|
|
|
|
#if (defined(CONFIG_ARCH_MSM) && defined(CFG80211_ROAMED_API_UNIFIED)) || \
|
|
(LINUX_VERSION_CODE >= KERNEL_VERSION(4, 12, 0)) || defined(WL_FILS_ROAM_OFFLD) || \
|
|
defined(CFG80211_ROAM_API_GE_4_12)
|
|
memset(&roam_info, 0, sizeof(struct cfg80211_roam_info));
|
|
roam_info.channel = notify_channel;
|
|
roam_info.bssid = curbssid;
|
|
roam_info.req_ie = conn_info->req_ie;
|
|
roam_info.req_ie_len = conn_info->req_ie_len;
|
|
roam_info.resp_ie = conn_info->resp_ie;
|
|
roam_info.resp_ie_len = conn_info->resp_ie_len;
|
|
#if defined(WL_FILS_ROAM_OFFLD)
|
|
if ((sec->auth_type == DOT11_FILS_SKEY_PFS)||(sec->auth_type == DOT11_FILS_SKEY)) {
|
|
roam_info.fils.kek = fils_info->fils_kek;
|
|
roam_info.fils.kek_len = fils_info->fils_kek_len;
|
|
roam_info.fils.update_erp_next_seq_num = true;
|
|
roam_info.fils.erp_next_seq_num = fils_info->fils_erp_next_seq_num;
|
|
roam_info.fils.pmk = fils_info->fils_pmk;
|
|
roam_info.fils.pmk_len = fils_info->fils_kek_len;
|
|
roam_info.fils.pmkid = fils_info->fils_pmkid;
|
|
}
|
|
#endif // endif
|
|
cfg80211_roamed(ndev, &roam_info, GFP_KERNEL);
|
|
#else
|
|
cfg80211_roamed(ndev,
|
|
#if (LINUX_VERSION_CODE > KERNEL_VERSION(2, 6, 39)) || defined(WL_COMPAT_WIRELESS)
|
|
notify_channel,
|
|
#endif // endif
|
|
curbssid,
|
|
conn_info->req_ie, conn_info->req_ie_len,
|
|
conn_info->resp_ie, conn_info->resp_ie_len, GFP_KERNEL);
|
|
#endif /* (CONFIG_ARCH_MSM && CFG80211_ROAMED_API_UNIFIED) || LINUX_VERSION >= 4.12.0 */
|
|
|
|
memcpy(&cfg->last_roamed_addr, &e->addr, ETHER_ADDR_LEN);
|
|
wl_set_drv_status(cfg, CONNECTED, ndev);
|
|
|
|
#ifdef DHD_POST_EAPOL_M1_AFTER_ROAM_EVT
|
|
ifp = dhd_get_ifp(dhdp, e->ifidx);
|
|
if (ifp) {
|
|
ifp->post_roam_evt = TRUE;
|
|
}
|
|
#endif /* DHD_POST_EAPOL_M1_AFTER_ROAM_EVT */
|
|
|
|
return err;
|
|
|
|
fail:
|
|
#ifdef DHD_LOSSLESS_ROAMING
|
|
wl_del_roam_timeout(cfg);
|
|
#endif /* DHD_LOSSLESS_ROAMING */
|
|
return err;
|
|
}
|
|
|
|
static bool
|
|
wl_cfg80211_verify_bss(struct bcm_cfg80211 *cfg, struct net_device *ndev,
|
|
struct cfg80211_bss **bss)
|
|
{
|
|
struct wiphy *wiphy;
|
|
struct wlc_ssid *ssid;
|
|
uint8 *curbssid;
|
|
int count = 0;
|
|
int ret = false;
|
|
u8 cur_ssid[DOT11_MAX_SSID_LEN + 1];
|
|
|
|
wiphy = bcmcfg_to_wiphy(cfg);
|
|
ssid = (struct wlc_ssid *)wl_read_prof(cfg, ndev, WL_PROF_SSID);
|
|
curbssid = wl_read_prof(cfg, ndev, WL_PROF_BSSID);
|
|
if (!ssid) {
|
|
WL_ERR(("No SSID found in the saved profile \n"));
|
|
return false;
|
|
}
|
|
|
|
do {
|
|
*bss = CFG80211_GET_BSS(wiphy, NULL, curbssid,
|
|
ssid->SSID, ssid->SSID_len);
|
|
if (*bss || (count > 5)) {
|
|
break;
|
|
}
|
|
|
|
count++;
|
|
msleep(100);
|
|
} while (*bss == NULL);
|
|
|
|
WL_DBG(("cfg80211 bss_ptr:%p loop_cnt:%d\n", *bss, count));
|
|
if (*bss) {
|
|
#if (LINUX_VERSION_CODE < KERNEL_VERSION(4, 7, 0))
|
|
/* Update the reference count after use. In case of kernel version >= 4.7
|
|
* the cfg802_put_bss is called in cfg80211_connect_bss context
|
|
*/
|
|
CFG80211_PUT_BSS(wiphy, *bss);
|
|
#endif /* LINUX_VERSION_CODE < KERNEL_VERSION(4, 7, 0) */
|
|
ret = true;
|
|
} else {
|
|
memset(cur_ssid, 0, DOT11_MAX_SSID_LEN);
|
|
strncpy(cur_ssid, ssid->SSID,
|
|
MIN(ssid->SSID_len, DOT11_MAX_SSID_LEN));
|
|
WL_ERR(("No bss entry for ssid:%s bssid:"MACDBG"\n",
|
|
cur_ssid, MAC2STRDBG(curbssid)));
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
#ifdef WL_FILS
|
|
static s32
|
|
wl_get_fils_connect_params(struct bcm_cfg80211 *cfg, struct net_device *ndev)
|
|
{
|
|
const bcm_xtlv_t* pxtlv_out;
|
|
struct wl_fils_info *fils_info = wl_to_fils_info(cfg);
|
|
int err = BCME_OK;
|
|
bcm_iov_buf_t *iov_buf_in = NULL;
|
|
bcm_iov_buf_t iov_buf_out = {0};
|
|
u16 len;
|
|
u16 type;
|
|
const u8 *data;
|
|
iov_buf_in = MALLOCZ(cfg->osh, WLC_IOCTL_SMLEN);
|
|
if (!iov_buf_in) {
|
|
WL_ERR(("buf memory alloc failed\n"));
|
|
err = BCME_NOMEM;
|
|
goto exit;
|
|
}
|
|
iov_buf_out.version = WL_FILS_IOV_VERSION;
|
|
iov_buf_out.id = WL_FILS_CMD_GET_CONNECT_PARAMS;
|
|
err = wldev_iovar_getbuf(ndev, "fils", (uint8*)&iov_buf_out, sizeof(bcm_iov_buf_t),
|
|
iov_buf_in, WLC_IOCTL_SMLEN, &cfg->ioctl_buf_sync);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("Get FILS Params Error (%d)\n", err));
|
|
goto exit;
|
|
}
|
|
pxtlv_out = (bcm_xtlv_t*)((bcm_iov_buf_t*)iov_buf_in)->data;
|
|
len = iov_buf_in->len;
|
|
do {
|
|
if (!bcm_valid_xtlv(pxtlv_out, iov_buf_in->len, BCM_XTLV_OPTION_ALIGN32)) {
|
|
WL_ERR(("%s: XTLV is not valid\n", __func__));
|
|
err = BCME_BADARG;
|
|
goto exit;
|
|
}
|
|
bcm_xtlv_unpack_xtlv(pxtlv_out, &type, &len, &data, BCM_XTLV_OPTION_ALIGN32);
|
|
switch (type) {
|
|
case WL_FILS_XTLV_ERP_NEXT_SEQ_NUM:
|
|
fils_info->fils_erp_next_seq_num = *(const u16 *)data;
|
|
break;
|
|
case WL_FILS_XTLV_KEK:
|
|
if (memcpy_s(fils_info->fils_kek,
|
|
WL_MAX_FILS_KEY_LEN, data, len) < 0) {
|
|
err = BCME_BADARG;
|
|
goto exit;
|
|
}
|
|
fils_info->fils_kek_len = len;
|
|
break;
|
|
case WL_FILS_XTLV_PMK:
|
|
if (memcpy_s(fils_info->fils_pmk,
|
|
WL_MAX_FILS_KEY_LEN, data, len) < 0) {
|
|
err = BCME_BADARG;
|
|
goto exit;
|
|
}
|
|
fils_info->fils_pmk_len = len;
|
|
break;
|
|
case WL_FILS_XTLV_PMKID:
|
|
if (memcpy_s(fils_info->fils_pmkid,
|
|
WL_MAX_FILS_KEY_LEN, data, len) < 0) {
|
|
err = BCME_BADARG;
|
|
goto exit;
|
|
}
|
|
break;
|
|
default:
|
|
WL_ERR(("%s: wrong XTLV code\n", __func__));
|
|
break;
|
|
|
|
}
|
|
} while ((pxtlv_out = bcm_next_xtlv(pxtlv_out, (int *)&iov_buf_in->len,
|
|
BCM_XTLV_OPTION_ALIGN32)) && iov_buf_in->len);
|
|
exit:
|
|
if (iov_buf_in) {
|
|
MFREE(cfg->osh, iov_buf_in, WLC_IOCTL_SMLEN);
|
|
}
|
|
return err;
|
|
}
|
|
#endif /* WL_FILS */
|
|
static s32
|
|
wl_bss_connect_done(struct bcm_cfg80211 *cfg, struct net_device *ndev,
|
|
const wl_event_msg_t *e, void *data, bool completed)
|
|
{
|
|
struct wl_connect_info *conn_info = wl_to_conn(cfg);
|
|
struct wl_security *sec = wl_read_prof(cfg, ndev, WL_PROF_SEC);
|
|
s32 err = 0;
|
|
#ifdef WL_FILS
|
|
struct cfg80211_connect_resp_params resp_params = {0};
|
|
struct wl_fils_info *fils_info = NULL;
|
|
struct wlc_ssid *ssid = NULL;
|
|
struct wiphy *wiphy = NULL;
|
|
|
|
#endif /* WL_FILS */
|
|
u8 *curbssid = wl_read_prof(cfg, ndev, WL_PROF_BSSID);
|
|
u32 event_type = ntoh32(e->event_type);
|
|
struct cfg80211_bss *bss = NULL;
|
|
dhd_pub_t *dhdp;
|
|
dhdp = (dhd_pub_t *)(cfg->pub);
|
|
BCM_REFERENCE(dhdp);
|
|
|
|
if (!sec) {
|
|
WL_ERR(("sec is NULL\n"));
|
|
return -ENODEV;
|
|
}
|
|
WL_DBG((" enter\n"));
|
|
#ifdef ESCAN_RESULT_PATCH
|
|
if (wl_get_drv_status(cfg, CONNECTED, ndev)) {
|
|
if (memcmp(curbssid, connect_req_bssid, ETHER_ADDR_LEN) == 0) {
|
|
WL_INFORM_MEM((" Connected event of connected device "
|
|
"e=%d s=%d, ignore it\n",
|
|
ntoh32(e->event_type), ntoh32(e->status)));
|
|
return err;
|
|
}
|
|
}
|
|
if (memcmp(curbssid, broad_bssid, ETHER_ADDR_LEN) == 0 &&
|
|
memcmp(broad_bssid, connect_req_bssid, ETHER_ADDR_LEN) != 0) {
|
|
WL_DBG(("copy bssid\n"));
|
|
memcpy(curbssid, connect_req_bssid, ETHER_ADDR_LEN);
|
|
}
|
|
#else
|
|
if (cfg->scan_request) {
|
|
wl_cfg80211_cancel_scan(cfg);
|
|
}
|
|
#endif /* ESCAN_RESULT_PATCH */
|
|
if (wl_get_drv_status(cfg, CONNECTING, ndev)) {
|
|
wl_cfg80211_scan_abort(cfg);
|
|
if (completed) {
|
|
wl_get_assoc_ies(cfg, ndev);
|
|
wl_update_prof(cfg, ndev, NULL, (const void *)(e->addr.octet),
|
|
WL_PROF_BSSID);
|
|
curbssid = wl_read_prof(cfg, ndev, WL_PROF_BSSID);
|
|
/*
|
|
* CFG layer relies on cached IEs (from probe/beacon) to fetch matching bss.
|
|
* For cases, there is no match available,
|
|
* need to update the cache based on bss info from fw.
|
|
*/
|
|
wl_update_bss_info(cfg, ndev, true);
|
|
wl_update_pmklist(ndev, cfg->pmk_list, err);
|
|
wl_set_drv_status(cfg, CONNECTED, ndev);
|
|
#if defined(ROAM_ENABLE) && defined(ROAM_AP_ENV_DETECTION)
|
|
if (dhdp->roam_env_detection)
|
|
wldev_iovar_setint(ndev, "roam_env_detection",
|
|
AP_ENV_INDETERMINATE);
|
|
#endif /* ROAM_AP_ENV_DETECTION */
|
|
if (ndev != bcmcfg_to_prmry_ndev(cfg)) {
|
|
#if LINUX_VERSION_CODE >= KERNEL_VERSION(3, 13, 0)
|
|
init_completion(&cfg->iface_disable);
|
|
#else
|
|
/* reinitialize completion to clear previous count */
|
|
INIT_COMPLETION(cfg->iface_disable);
|
|
#endif // endif
|
|
}
|
|
#ifdef CUSTOM_SET_CPUCORE
|
|
if (wl_get_chan_isvht80(ndev, dhdp)) {
|
|
if (ndev == bcmcfg_to_prmry_ndev(cfg))
|
|
dhdp->chan_isvht80 |= DHD_FLAG_STA_MODE; /* STA mode */
|
|
else if (is_p2p_group_iface(ndev->ieee80211_ptr))
|
|
dhdp->chan_isvht80 |= DHD_FLAG_P2P_MODE; /* p2p mode */
|
|
dhd_set_cpucore(dhdp, TRUE);
|
|
}
|
|
#endif /* CUSTOM_SET_CPUCORE */
|
|
#ifdef CUSTOM_LONG_RETRY_LIMIT
|
|
if (wl_set_retry(ndev, CUSTOM_LONG_RETRY_LIMIT, 1) < 0) {
|
|
WL_ERR(("CUSTOM_LONG_RETRY_LIMIT set fail!\n"));
|
|
}
|
|
#endif /* CUSTOM_LONG_RETRY_LIMIT */
|
|
bzero(&cfg->last_roamed_addr, ETHER_ADDR_LEN);
|
|
}
|
|
wl_clr_drv_status(cfg, CONNECTING, ndev);
|
|
|
|
if (completed && (wl_cfg80211_verify_bss(cfg, ndev, &bss) != true)) {
|
|
/* If bss entry is not available in the cfg80211 bss cache
|
|
* the wireless stack will complain and won't populate
|
|
* wdev->current_bss ptr
|
|
*/
|
|
WL_ERR(("BSS entry not found. Indicate assoc event failure\n"));
|
|
completed = false;
|
|
sec->auth_assoc_res_status = WLAN_STATUS_UNSPECIFIED_FAILURE;
|
|
}
|
|
if (completed) {
|
|
WL_MSG(ndev->name, "Report connect result - connection succeeded\n");
|
|
wl_cfg80211_check_in4way(cfg, ndev, 0, WL_EXT_STATUS_CONNECTED, NULL);
|
|
} else {
|
|
WL_MSG(ndev->name, "Report connect result - connection failed\n");
|
|
wl_cfg80211_check_in4way(cfg, ndev, NO_SCAN_IN4WAY|NO_BTC_IN4WAY|WAIT_DISCONNECTED,
|
|
WL_EXT_STATUS_DISCONNECTED, NULL);
|
|
}
|
|
#ifdef WL_FILS
|
|
if ((sec->auth_type == DOT11_FILS_SKEY_PFS)||(sec->auth_type == DOT11_FILS_SKEY)) {
|
|
wl_get_fils_connect_params(cfg, ndev);
|
|
fils_info = wl_to_fils_info(cfg);
|
|
ssid = (struct wlc_ssid *)wl_read_prof(cfg, ndev, WL_PROF_SSID);
|
|
wiphy = bcmcfg_to_wiphy(cfg);
|
|
resp_params.status = completed ? WLAN_STATUS_SUCCESS :
|
|
(sec->auth_assoc_res_status) ?
|
|
sec->auth_assoc_res_status :
|
|
WLAN_STATUS_UNSPECIFIED_FAILURE;
|
|
resp_params.bssid = curbssid;
|
|
resp_params.bss = CFG80211_GET_BSS(wiphy, NULL, curbssid,
|
|
ssid->SSID, ssid->SSID_len);
|
|
resp_params.req_ie = conn_info->req_ie;
|
|
resp_params.req_ie_len = conn_info->req_ie_len;
|
|
resp_params.resp_ie = conn_info->resp_ie;
|
|
resp_params.resp_ie_len = conn_info->resp_ie_len;
|
|
#if defined(WL_FILS_ROAM_OFFLD) || (LINUX_VERSION_CODE >= KERNEL_VERSION(4, 18, 0))
|
|
resp_params.fils.kek = fils_info->fils_kek;
|
|
resp_params.fils.kek_len = fils_info->fils_kek_len;
|
|
resp_params.fils.update_erp_next_seq_num = true;
|
|
resp_params.fils.erp_next_seq_num = fils_info->fils_erp_next_seq_num;
|
|
resp_params.fils.pmk = fils_info->fils_pmk;
|
|
resp_params.fils.pmk_len = fils_info->fils_kek_len;
|
|
resp_params.fils.pmkid = fils_info->fils_pmkid;
|
|
#else
|
|
resp_params.fils_kek = fils_info->fils_kek;
|
|
resp_params.fils_kek_len = fils_info->fils_kek_len;
|
|
resp_params.update_erp_next_seq_num = true;
|
|
resp_params.fils_erp_next_seq_num = fils_info->fils_erp_next_seq_num;
|
|
resp_params.pmk = fils_info->fils_pmk;
|
|
resp_params.pmk_len = fils_info->fils_kek_len;
|
|
resp_params.pmkid = fils_info->fils_pmkid;
|
|
#endif /* WL_FILS_ROAM_OFFLD */
|
|
cfg80211_connect_done(ndev, &resp_params, GFP_KERNEL);
|
|
}
|
|
else
|
|
#endif /* WL_FILS */
|
|
{
|
|
CFG80211_CONNECT_RESULT(ndev,
|
|
curbssid,
|
|
bss,
|
|
conn_info->req_ie,
|
|
conn_info->req_ie_len,
|
|
conn_info->resp_ie,
|
|
conn_info->resp_ie_len,
|
|
completed ? WLAN_STATUS_SUCCESS :
|
|
(sec->auth_assoc_res_status) ?
|
|
sec->auth_assoc_res_status :
|
|
WLAN_STATUS_UNSPECIFIED_FAILURE,
|
|
GFP_KERNEL);
|
|
}
|
|
} else {
|
|
WL_INFORM_MEM(("[%s] Ignore event:%d. drv status"
|
|
" connecting:%x. connected:%d\n",
|
|
ndev->name, event_type, wl_get_drv_status(cfg, CONNECTING, ndev),
|
|
wl_get_drv_status(cfg, CONNECTED, ndev)));
|
|
}
|
|
#ifdef CONFIG_TCPACK_FASTTX
|
|
if (wl_get_chan_isvht80(ndev, dhdp))
|
|
wldev_iovar_setint(ndev, "tcpack_fast_tx", 0);
|
|
else
|
|
wldev_iovar_setint(ndev, "tcpack_fast_tx", 1);
|
|
#endif /* CONFIG_TCPACK_FASTTX */
|
|
|
|
return err;
|
|
}
|
|
|
|
static s32
|
|
wl_notify_mic_status(struct bcm_cfg80211 *cfg, bcm_struct_cfgdev *cfgdev,
|
|
const wl_event_msg_t *e, void *data)
|
|
{
|
|
struct net_device *ndev = NULL;
|
|
u16 flags = ntoh16(e->flags);
|
|
enum nl80211_key_type key_type;
|
|
|
|
ndev = cfgdev_to_wlc_ndev(cfgdev, cfg);
|
|
|
|
WL_INFORM_MEM(("[%s] mic fail event - " MACDBG " \n",
|
|
ndev->name, MAC2STRDBG(e->addr.octet)));
|
|
mutex_lock(&cfg->usr_sync);
|
|
if (flags & WLC_EVENT_MSG_GROUP)
|
|
key_type = NL80211_KEYTYPE_GROUP;
|
|
else
|
|
key_type = NL80211_KEYTYPE_PAIRWISE;
|
|
|
|
wl_flush_fw_log_buffer(ndev, FW_LOGSET_MASK_ALL);
|
|
cfg80211_michael_mic_failure(ndev, (const u8 *)&e->addr, key_type, -1,
|
|
NULL, GFP_KERNEL);
|
|
mutex_unlock(&cfg->usr_sync);
|
|
|
|
return 0;
|
|
}
|
|
|
|
#ifdef BT_WIFI_HANDOVER
|
|
static s32
|
|
wl_notify_bt_wifi_handover_req(struct bcm_cfg80211 *cfg, bcm_struct_cfgdev *cfgdev,
|
|
const wl_event_msg_t *e, void *data)
|
|
{
|
|
struct net_device *ndev = NULL;
|
|
u32 event = ntoh32(e->event_type);
|
|
u32 datalen = ntoh32(e->datalen);
|
|
s32 err;
|
|
|
|
WL_ERR(("wl_notify_bt_wifi_handover_req: event_type : %d, datalen : %d\n", event, datalen));
|
|
ndev = cfgdev_to_wlc_ndev(cfgdev, cfg);
|
|
err = wl_genl_send_msg(ndev, event, data, (u16)datalen, 0, 0);
|
|
|
|
return err;
|
|
}
|
|
#endif /* BT_WIFI_HANDOVER */
|
|
|
|
static s32
|
|
wl_frame_get_mgmt(struct bcm_cfg80211 *cfg, u16 fc,
|
|
const struct ether_addr *da, const struct ether_addr *sa,
|
|
const struct ether_addr *bssid, u8 **pheader, u32 *body_len, u8 *pbody)
|
|
{
|
|
struct dot11_management_header *hdr;
|
|
u32 totlen = 0;
|
|
s32 err = 0;
|
|
u8 *offset;
|
|
u32 prebody_len = *body_len;
|
|
switch (fc) {
|
|
case FC_ASSOC_REQ:
|
|
/* capability , listen interval */
|
|
totlen = DOT11_ASSOC_REQ_FIXED_LEN;
|
|
*body_len += DOT11_ASSOC_REQ_FIXED_LEN;
|
|
break;
|
|
|
|
case FC_REASSOC_REQ:
|
|
/* capability, listen inteval, ap address */
|
|
totlen = DOT11_REASSOC_REQ_FIXED_LEN;
|
|
*body_len += DOT11_REASSOC_REQ_FIXED_LEN;
|
|
break;
|
|
}
|
|
totlen += DOT11_MGMT_HDR_LEN + prebody_len;
|
|
*pheader = (u8 *)MALLOCZ(cfg->osh, totlen);
|
|
if (*pheader == NULL) {
|
|
WL_ERR(("memory alloc failed \n"));
|
|
return -ENOMEM;
|
|
}
|
|
hdr = (struct dot11_management_header *) (*pheader);
|
|
hdr->fc = htol16(fc);
|
|
hdr->durid = 0;
|
|
hdr->seq = 0;
|
|
offset = (u8*)(hdr + 1) + (totlen - DOT11_MGMT_HDR_LEN - prebody_len);
|
|
bcopy((const char*)da, (u8*)&hdr->da, ETHER_ADDR_LEN);
|
|
bcopy((const char*)sa, (u8*)&hdr->sa, ETHER_ADDR_LEN);
|
|
bcopy((const char*)bssid, (u8*)&hdr->bssid, ETHER_ADDR_LEN);
|
|
if ((pbody != NULL) && prebody_len)
|
|
bcopy((const char*)pbody, offset, prebody_len);
|
|
*body_len = totlen;
|
|
return err;
|
|
}
|
|
|
|
#ifdef WL_CFG80211_GON_COLLISION
|
|
static void
|
|
wl_gon_req_collision(struct bcm_cfg80211 *cfg, wl_action_frame_t *tx_act_frm,
|
|
wifi_p2p_pub_act_frame_t *rx_act_frm, struct net_device *ndev,
|
|
struct ether_addr sa, struct ether_addr da)
|
|
{
|
|
if (cfg->afx_hdl->pending_tx_act_frm == NULL)
|
|
return;
|
|
|
|
if (tx_act_frm &&
|
|
wl_cfgp2p_is_pub_action(tx_act_frm->data, tx_act_frm->len)) {
|
|
wifi_p2p_pub_act_frame_t *pact_frm;
|
|
|
|
pact_frm = (wifi_p2p_pub_act_frame_t *)tx_act_frm->data;
|
|
|
|
if (!(pact_frm->subtype == P2P_PAF_GON_REQ &&
|
|
rx_act_frm->subtype == P2P_PAF_GON_REQ)) {
|
|
return;
|
|
}
|
|
}
|
|
|
|
WL_ERR((" GO NEGO Request COLLISION !!! \n"));
|
|
|
|
/* if sa(peer) addr is less than da(my) addr,
|
|
* my device will process peer's gon request and block to send my gon req.
|
|
*
|
|
* if not (sa addr > da addr),
|
|
* my device will process gon request and drop gon req of peer.
|
|
*/
|
|
if (memcmp(sa.octet, da.octet, ETHER_ADDR_LEN) < 0) {
|
|
/* block to send tx gon request */
|
|
cfg->block_gon_req_tx_count = BLOCK_GON_REQ_MAX_NUM;
|
|
WL_ERR((" block to send gon req tx !!!\n"));
|
|
|
|
/* if we are finding a common channel for sending af,
|
|
* do not scan more to block to send current gon req
|
|
*/
|
|
if (wl_get_drv_status_all(cfg, FINDING_COMMON_CHANNEL)) {
|
|
wl_clr_drv_status(cfg, FINDING_COMMON_CHANNEL, ndev);
|
|
complete(&cfg->act_frm_scan);
|
|
}
|
|
} else {
|
|
/* drop gon request of peer to process gon request by my device. */
|
|
WL_ERR((" drop to receive gon req rx !!! \n"));
|
|
cfg->block_gon_req_rx_count = BLOCK_GON_REQ_MAX_NUM;
|
|
}
|
|
|
|
return;
|
|
}
|
|
#endif /* WL_CFG80211_GON_COLLISION */
|
|
|
|
void
|
|
wl_stop_wait_next_action_frame(struct bcm_cfg80211 *cfg, struct net_device *ndev, u8 bsscfgidx)
|
|
{
|
|
s32 err = 0;
|
|
|
|
if (wl_get_drv_status_all(cfg, FINDING_COMMON_CHANNEL)) {
|
|
if (timer_pending(&cfg->p2p->listen_timer)) {
|
|
del_timer_sync(&cfg->p2p->listen_timer);
|
|
}
|
|
if (cfg->afx_hdl != NULL) {
|
|
if (cfg->afx_hdl->dev != NULL) {
|
|
wl_clr_drv_status(cfg, SCANNING, cfg->afx_hdl->dev);
|
|
wl_clr_drv_status(cfg, FINDING_COMMON_CHANNEL, cfg->afx_hdl->dev);
|
|
}
|
|
cfg->afx_hdl->peer_chan = WL_INVALID;
|
|
}
|
|
complete(&cfg->act_frm_scan);
|
|
WL_DBG(("*** Wake UP ** Working afx searching is cleared\n"));
|
|
} else if (wl_get_drv_status_all(cfg, SENDING_ACT_FRM)) {
|
|
if (!(wl_get_p2p_status(cfg, ACTION_TX_COMPLETED) ||
|
|
wl_get_p2p_status(cfg, ACTION_TX_NOACK)))
|
|
wl_set_p2p_status(cfg, ACTION_TX_COMPLETED);
|
|
|
|
WL_DBG(("*** Wake UP ** abort actframe iovar on bsscfxidx %d\n", bsscfgidx));
|
|
/* Scan engine is not used for sending action frames in the latest driver
|
|
* branches. actframe_abort is used in the latest driver branches
|
|
* instead of scan abort.
|
|
* If actframe_abort iovar succeeds, don't execute scan abort.
|
|
* If actframe_abort fails with unsupported error,
|
|
* execute scan abort (for backward copmatibility).
|
|
*/
|
|
if (cfg->af_sent_channel) {
|
|
err = wldev_iovar_setint_bsscfg(ndev, "actframe_abort", 1, bsscfgidx);
|
|
if (err < 0) {
|
|
if (err == BCME_UNSUPPORTED) {
|
|
wl_cfg80211_scan_abort(cfg);
|
|
} else {
|
|
WL_ERR(("actframe_abort failed. ret:%d\n", err));
|
|
}
|
|
}
|
|
}
|
|
}
|
|
#ifdef WL_CFG80211_SYNC_GON
|
|
else if (wl_get_drv_status_all(cfg, WAITING_NEXT_ACT_FRM_LISTEN)) {
|
|
WL_DBG(("*** Wake UP ** abort listen for next af frame\n"));
|
|
/* So abort scan to cancel listen */
|
|
wl_cfg80211_scan_abort(cfg);
|
|
}
|
|
#endif /* WL_CFG80211_SYNC_GON */
|
|
}
|
|
|
|
#if defined(WLTDLS)
|
|
bool wl_cfg80211_is_tdls_tunneled_frame(void *frame, u32 frame_len)
|
|
{
|
|
unsigned char *data;
|
|
|
|
if (frame == NULL) {
|
|
WL_ERR(("Invalid frame \n"));
|
|
return false;
|
|
}
|
|
|
|
if (frame_len < 5) {
|
|
WL_ERR(("Invalid frame length [%d] \n", frame_len));
|
|
return false;
|
|
}
|
|
|
|
data = frame;
|
|
|
|
if (!memcmp(data, TDLS_TUNNELED_PRB_REQ, 5) ||
|
|
!memcmp(data, TDLS_TUNNELED_PRB_RESP, 5)) {
|
|
WL_DBG(("TDLS Vendor Specific Received type\n"));
|
|
return true;
|
|
}
|
|
|
|
return false;
|
|
}
|
|
#endif /* WLTDLS */
|
|
|
|
int wl_cfg80211_get_ioctl_version(void)
|
|
{
|
|
return ioctl_version;
|
|
}
|
|
|
|
static s32
|
|
wl_notify_rx_mgmt_frame(struct bcm_cfg80211 *cfg, bcm_struct_cfgdev *cfgdev,
|
|
const wl_event_msg_t *e, void *data)
|
|
{
|
|
struct ieee80211_supported_band *band;
|
|
struct wiphy *wiphy = bcmcfg_to_wiphy(cfg);
|
|
struct ether_addr da;
|
|
struct ether_addr bssid;
|
|
bool isfree = false;
|
|
s32 err = 0;
|
|
s32 freq;
|
|
struct net_device *ndev = NULL;
|
|
wifi_p2p_pub_act_frame_t *act_frm = NULL;
|
|
wifi_p2p_action_frame_t *p2p_act_frm = NULL;
|
|
wifi_p2psd_gas_pub_act_frame_t *sd_act_frm = NULL;
|
|
wl_event_rx_frame_data_t *rxframe;
|
|
u32 event;
|
|
u8 *mgmt_frame;
|
|
u8 bsscfgidx;
|
|
u32 mgmt_frame_len;
|
|
u16 channel;
|
|
#if defined(TDLS_MSG_ONLY_WFD) && defined(WLTDLS)
|
|
dhd_pub_t *dhdp = (dhd_pub_t *)(cfg->pub);
|
|
#endif /* BCMDONGLEHOST && TDLS_MSG_ONLY_WFD && WLTDLS */
|
|
if (ntoh32(e->datalen) < sizeof(wl_event_rx_frame_data_t)) {
|
|
WL_ERR(("wrong datalen:%d\n", ntoh32(e->datalen)));
|
|
return -EINVAL;
|
|
}
|
|
mgmt_frame_len = ntoh32(e->datalen) - (uint32)sizeof(wl_event_rx_frame_data_t);
|
|
event = ntoh32(e->event_type);
|
|
bsscfgidx = e->bsscfgidx;
|
|
rxframe = (wl_event_rx_frame_data_t *)data;
|
|
if (!rxframe) {
|
|
WL_ERR(("rxframe: NULL\n"));
|
|
return -EINVAL;
|
|
}
|
|
channel = (ntoh16(rxframe->channel) & WL_CHANSPEC_CHAN_MASK);
|
|
bzero(&bssid, ETHER_ADDR_LEN);
|
|
ndev = cfgdev_to_wlc_ndev(cfgdev, cfg);
|
|
if ((ndev->ieee80211_ptr->iftype != NL80211_IFTYPE_AP) &&
|
|
(event == WLC_E_PROBREQ_MSG)) {
|
|
struct net_info *iter, *next;
|
|
GCC_DIAGNOSTIC_PUSH_SUPPRESS_CAST();
|
|
for_each_ndev(cfg, iter, next) {
|
|
GCC_DIAGNOSTIC_POP();
|
|
if (iter->ndev && iter->wdev &&
|
|
iter->wdev->iftype == NL80211_IFTYPE_AP) {
|
|
ndev = iter->ndev;
|
|
cfgdev = ndev_to_cfgdev(ndev);
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
if (channel <= CH_MAX_2G_CHANNEL)
|
|
band = wiphy->bands[IEEE80211_BAND_2GHZ];
|
|
else
|
|
band = wiphy->bands[IEEE80211_BAND_5GHZ];
|
|
if (!band) {
|
|
WL_ERR(("No valid band\n"));
|
|
return -EINVAL;
|
|
}
|
|
#if LINUX_VERSION_CODE < KERNEL_VERSION(2, 6, 39) && !defined(WL_COMPAT_WIRELESS)
|
|
freq = ieee80211_channel_to_frequency(channel);
|
|
(void)band->band;
|
|
#else
|
|
freq = ieee80211_channel_to_frequency(channel, band->band);
|
|
#endif // endif
|
|
if (event == WLC_E_ACTION_FRAME_RX) {
|
|
u8 ioctl_buf[WLC_IOCTL_SMLEN];
|
|
|
|
if ((err = wldev_iovar_getbuf_bsscfg(ndev, "cur_etheraddr",
|
|
NULL, 0, ioctl_buf, sizeof(ioctl_buf), bsscfgidx,
|
|
NULL)) != BCME_OK) {
|
|
WL_ERR(("WLC_GET_CUR_ETHERADDR failed, error %d\n", err));
|
|
goto exit;
|
|
}
|
|
|
|
err = wldev_ioctl_get(ndev, WLC_GET_BSSID, &bssid, ETHER_ADDR_LEN);
|
|
if (err < 0)
|
|
WL_ERR(("WLC_GET_BSSID error %d\n", err));
|
|
memcpy(da.octet, ioctl_buf, ETHER_ADDR_LEN);
|
|
err = wl_frame_get_mgmt(cfg, FC_ACTION, &da, &e->addr, &bssid,
|
|
&mgmt_frame, &mgmt_frame_len,
|
|
(u8 *)((wl_event_rx_frame_data_t *)rxframe + 1));
|
|
if (err < 0) {
|
|
WL_ERR(("Error in receiving action frame len %d channel %d freq %d\n",
|
|
mgmt_frame_len, channel, freq));
|
|
goto exit;
|
|
}
|
|
isfree = true;
|
|
if (wl_cfgp2p_is_pub_action(&mgmt_frame[DOT11_MGMT_HDR_LEN],
|
|
mgmt_frame_len - DOT11_MGMT_HDR_LEN)) {
|
|
act_frm = (wifi_p2p_pub_act_frame_t *)
|
|
(&mgmt_frame[DOT11_MGMT_HDR_LEN]);
|
|
} else if (wl_cfgp2p_is_p2p_action(&mgmt_frame[DOT11_MGMT_HDR_LEN],
|
|
mgmt_frame_len - DOT11_MGMT_HDR_LEN)) {
|
|
p2p_act_frm = (wifi_p2p_action_frame_t *)
|
|
(&mgmt_frame[DOT11_MGMT_HDR_LEN]);
|
|
(void) p2p_act_frm;
|
|
} else if (wl_cfgp2p_is_gas_action(&mgmt_frame[DOT11_MGMT_HDR_LEN],
|
|
mgmt_frame_len - DOT11_MGMT_HDR_LEN)) {
|
|
|
|
sd_act_frm = (wifi_p2psd_gas_pub_act_frame_t *)
|
|
(&mgmt_frame[DOT11_MGMT_HDR_LEN]);
|
|
if (sd_act_frm && wl_get_drv_status_all(cfg, WAITING_NEXT_ACT_FRM)) {
|
|
if (cfg->next_af_subtype == sd_act_frm->action) {
|
|
WL_DBG(("We got a right next frame of SD!(%d)\n",
|
|
sd_act_frm->action));
|
|
wl_clr_drv_status(cfg, WAITING_NEXT_ACT_FRM, ndev);
|
|
|
|
/* Stop waiting for next AF. */
|
|
wl_stop_wait_next_action_frame(cfg, ndev, bsscfgidx);
|
|
}
|
|
}
|
|
(void) sd_act_frm;
|
|
#ifdef WLTDLS
|
|
} else if ((mgmt_frame[DOT11_MGMT_HDR_LEN] == TDLS_AF_CATEGORY) ||
|
|
(wl_cfg80211_is_tdls_tunneled_frame(
|
|
&mgmt_frame[DOT11_MGMT_HDR_LEN],
|
|
mgmt_frame_len - DOT11_MGMT_HDR_LEN))) {
|
|
if (mgmt_frame[DOT11_MGMT_HDR_LEN] == TDLS_AF_CATEGORY) {
|
|
WL_ERR((" TDLS Action Frame Received type = %d \n",
|
|
mgmt_frame[DOT11_MGMT_HDR_LEN + 1]));
|
|
}
|
|
#ifdef TDLS_MSG_ONLY_WFD
|
|
if (!dhdp->tdls_mode) {
|
|
WL_DBG((" TDLS Frame filtered \n"));
|
|
goto exit;
|
|
}
|
|
#else
|
|
if (mgmt_frame[DOT11_MGMT_HDR_LEN + 1] == TDLS_ACTION_SETUP_RESP) {
|
|
cfg->tdls_mgmt_frame = mgmt_frame;
|
|
cfg->tdls_mgmt_frame_len = mgmt_frame_len;
|
|
cfg->tdls_mgmt_freq = freq;
|
|
return 0;
|
|
}
|
|
#endif /* TDLS_MSG_ONLY_WFD */
|
|
#endif /* WLTDLS */
|
|
#ifdef QOS_MAP_SET
|
|
} else if (mgmt_frame[DOT11_MGMT_HDR_LEN] == DOT11_ACTION_CAT_QOS) {
|
|
/* update QoS map set table */
|
|
bcm_tlv_t * qos_map_ie = NULL;
|
|
if ((qos_map_ie = bcm_parse_tlvs(&mgmt_frame[DOT11_MGMT_HDR_LEN],
|
|
mgmt_frame_len - DOT11_MGMT_HDR_LEN,
|
|
DOT11_MNG_QOS_MAP_ID)) != NULL) {
|
|
WL_DBG((" QoS map set IE found in QoS action frame\n"));
|
|
if (!cfg->up_table) {
|
|
cfg->up_table = (uint8 *)MALLOC(cfg->osh, UP_TABLE_MAX);
|
|
}
|
|
wl_set_up_table(cfg->up_table, qos_map_ie);
|
|
} else {
|
|
MFREE(cfg->osh, cfg->up_table, UP_TABLE_MAX);
|
|
}
|
|
#endif /* QOS_MAP_SET */
|
|
} else {
|
|
/*
|
|
* if we got normal action frame and ndev is p2p0,
|
|
* we have to change ndev from p2p0 to wlan0
|
|
*/
|
|
|
|
if (cfg->next_af_subtype != P2P_PAF_SUBTYPE_INVALID) {
|
|
u8 action = 0;
|
|
if (wl_get_public_action(&mgmt_frame[DOT11_MGMT_HDR_LEN],
|
|
mgmt_frame_len - DOT11_MGMT_HDR_LEN, &action) != BCME_OK) {
|
|
WL_DBG(("Recived action is not public action frame\n"));
|
|
} else if (cfg->next_af_subtype == action) {
|
|
WL_DBG(("Recived action is the waiting action(%d)\n",
|
|
action));
|
|
wl_clr_drv_status(cfg, WAITING_NEXT_ACT_FRM, ndev);
|
|
|
|
/* Stop waiting for next AF. */
|
|
wl_stop_wait_next_action_frame(cfg, ndev, bsscfgidx);
|
|
}
|
|
}
|
|
}
|
|
|
|
if (act_frm) {
|
|
#ifdef WL_CFG80211_GON_COLLISION
|
|
if (act_frm->subtype == P2P_PAF_GON_REQ) {
|
|
wl_gon_req_collision(cfg,
|
|
&cfg->afx_hdl->pending_tx_act_frm->action_frame,
|
|
act_frm, ndev, e->addr, da);
|
|
|
|
if (cfg->block_gon_req_rx_count) {
|
|
WL_ERR(("drop frame GON Req Rx : count (%d)\n",
|
|
cfg->block_gon_req_rx_count));
|
|
cfg->block_gon_req_rx_count--;
|
|
goto exit;
|
|
}
|
|
} else if (act_frm->subtype == P2P_PAF_GON_CONF) {
|
|
/* if go formation done, clear it */
|
|
cfg->block_gon_req_tx_count = 0;
|
|
cfg->block_gon_req_rx_count = 0;
|
|
}
|
|
#endif /* WL_CFG80211_GON_COLLISION */
|
|
|
|
if (wl_get_drv_status_all(cfg, WAITING_NEXT_ACT_FRM)) {
|
|
if (cfg->next_af_subtype == act_frm->subtype) {
|
|
WL_DBG(("We got a right next frame!(%d)\n",
|
|
act_frm->subtype));
|
|
wl_clr_drv_status(cfg, WAITING_NEXT_ACT_FRM, ndev);
|
|
|
|
if (cfg->next_af_subtype == P2P_PAF_GON_CONF) {
|
|
OSL_SLEEP(20);
|
|
}
|
|
|
|
/* Stop waiting for next AF. */
|
|
wl_stop_wait_next_action_frame(cfg, ndev, bsscfgidx);
|
|
} else if ((cfg->next_af_subtype == P2P_PAF_GON_RSP) &&
|
|
(act_frm->subtype == P2P_PAF_GON_REQ)) {
|
|
/* If current received frame is GO NEG REQ and next
|
|
* expected frame is GO NEG RESP, do not send it up.
|
|
*/
|
|
WL_ERR(("GO Neg req received while waiting for RESP."
|
|
"Discard incoming frame\n"));
|
|
goto exit;
|
|
}
|
|
}
|
|
}
|
|
|
|
wl_cfgp2p_print_actframe(false, &mgmt_frame[DOT11_MGMT_HDR_LEN],
|
|
mgmt_frame_len - DOT11_MGMT_HDR_LEN, channel);
|
|
if (act_frm && (act_frm->subtype == P2P_PAF_GON_CONF)) {
|
|
WL_DBG(("P2P: GO_NEG_PHASE status cleared \n"));
|
|
wl_clr_p2p_status(cfg, GO_NEG_PHASE);
|
|
}
|
|
} else if (event == WLC_E_PROBREQ_MSG) {
|
|
|
|
/* Handle probe reqs frame
|
|
* WPS-AP certification 4.2.13
|
|
*/
|
|
struct parsed_ies prbreq_ies;
|
|
u32 prbreq_ie_len = 0;
|
|
bool pbc = 0;
|
|
|
|
WL_DBG((" Event WLC_E_PROBREQ_MSG received\n"));
|
|
mgmt_frame = (u8 *)(data);
|
|
mgmt_frame_len = ntoh32(e->datalen);
|
|
if (mgmt_frame_len < DOT11_MGMT_HDR_LEN) {
|
|
WL_ERR(("wrong datalen:%d\n", mgmt_frame_len));
|
|
return -EINVAL;
|
|
}
|
|
prbreq_ie_len = mgmt_frame_len - DOT11_MGMT_HDR_LEN;
|
|
|
|
/* Parse prob_req IEs */
|
|
if (wl_cfg80211_parse_ies(&mgmt_frame[DOT11_MGMT_HDR_LEN],
|
|
prbreq_ie_len, &prbreq_ies) < 0) {
|
|
WL_ERR(("Prob req get IEs failed\n"));
|
|
return 0;
|
|
}
|
|
if (prbreq_ies.wps_ie != NULL) {
|
|
wl_validate_wps_ie(
|
|
(const char *)prbreq_ies.wps_ie, prbreq_ies.wps_ie_len, &pbc);
|
|
WL_DBG((" wps_ie exist pbc = %d\n", pbc));
|
|
/* if pbc method, send prob_req mgmt frame to upper layer */
|
|
if (!pbc)
|
|
return 0;
|
|
} else
|
|
return 0;
|
|
} else {
|
|
mgmt_frame = (u8 *)((wl_event_rx_frame_data_t *)rxframe + 1);
|
|
|
|
/* wpa supplicant use probe request event for restarting another GON Req.
|
|
* but it makes GON Req repetition.
|
|
* so if src addr of prb req is same as my target device,
|
|
* do not send probe request event during sending action frame.
|
|
*/
|
|
if (event == WLC_E_P2P_PROBREQ_MSG) {
|
|
WL_DBG((" Event %s\n", (event == WLC_E_P2P_PROBREQ_MSG) ?
|
|
"WLC_E_P2P_PROBREQ_MSG":"WLC_E_PROBREQ_MSG"));
|
|
|
|
#ifdef WL_CFG80211_USE_PRB_REQ_FOR_AF_TX
|
|
if (WL_DRV_STATUS_SENDING_AF_FRM_EXT(cfg) &&
|
|
!memcmp(cfg->afx_hdl->tx_dst_addr.octet, e->addr.octet,
|
|
ETHER_ADDR_LEN)) {
|
|
if (cfg->afx_hdl->pending_tx_act_frm &&
|
|
wl_get_drv_status_all(cfg, FINDING_COMMON_CHANNEL)) {
|
|
s32 channel = CHSPEC_CHANNEL(hton16(rxframe->channel));
|
|
WL_DBG(("PROBE REQUEST : Peer found, channel : %d\n",
|
|
channel));
|
|
cfg->afx_hdl->peer_chan = channel;
|
|
complete(&cfg->act_frm_scan);
|
|
}
|
|
}
|
|
#endif /* WL_CFG80211_USE_PRB_REQ_FOR_AF_TX */
|
|
|
|
/* Filter any P2P probe reqs arriving during the
|
|
* GO-NEG Phase
|
|
*/
|
|
if (cfg->p2p &&
|
|
#if defined(P2P_IE_MISSING_FIX)
|
|
cfg->p2p_prb_noti &&
|
|
#endif // endif
|
|
wl_get_p2p_status(cfg, GO_NEG_PHASE)) {
|
|
WL_DBG(("Filtering P2P probe_req while "
|
|
"being in GO-Neg state\n"));
|
|
return 0;
|
|
}
|
|
}
|
|
}
|
|
|
|
if (discover_cfgdev(cfgdev, cfg))
|
|
WL_DBG(("Rx Managment frame For P2P Discovery Interface \n"));
|
|
else
|
|
WL_DBG(("Rx Managment frame For Iface (%s) \n", ndev->name));
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 18, 0))
|
|
cfg80211_rx_mgmt(cfgdev, freq, 0, mgmt_frame, mgmt_frame_len, 0);
|
|
#elif (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 12, 0))
|
|
cfg80211_rx_mgmt(cfgdev, freq, 0, mgmt_frame, mgmt_frame_len, 0, GFP_ATOMIC);
|
|
#elif (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 4, 0)) || \
|
|
defined(WL_COMPAT_WIRELESS)
|
|
cfg80211_rx_mgmt(cfgdev, freq, 0, mgmt_frame, mgmt_frame_len, GFP_ATOMIC);
|
|
#else
|
|
cfg80211_rx_mgmt(cfgdev, freq, mgmt_frame, mgmt_frame_len, GFP_ATOMIC);
|
|
#endif /* LINUX_VERSION >= VERSION(3, 18, 0) */
|
|
|
|
WL_DBG(("mgmt_frame_len (%d) , e->datalen (%d), channel (%d), freq (%d)\n",
|
|
mgmt_frame_len, ntoh32(e->datalen), channel, freq));
|
|
exit:
|
|
if (isfree) {
|
|
MFREE(cfg->osh, mgmt_frame, mgmt_frame_len);
|
|
}
|
|
return err;
|
|
}
|
|
|
|
static void wl_init_conf(struct wl_conf *conf)
|
|
{
|
|
WL_DBG(("Enter \n"));
|
|
conf->frag_threshold = (u32)-1;
|
|
conf->rts_threshold = (u32)-1;
|
|
conf->retry_short = (u32)-1;
|
|
conf->retry_long = (u32)-1;
|
|
conf->tx_power = -1;
|
|
}
|
|
|
|
static void wl_init_prof(struct bcm_cfg80211 *cfg, struct net_device *ndev)
|
|
{
|
|
unsigned long flags;
|
|
struct wl_profile *profile = wl_get_profile_by_netdev(cfg, ndev);
|
|
|
|
if (!profile) {
|
|
WL_ERR(("profile null\n"));
|
|
return;
|
|
}
|
|
|
|
WL_CFG_DRV_LOCK(&cfg->cfgdrv_lock, flags);
|
|
bzero(profile, sizeof(struct wl_profile));
|
|
WL_CFG_DRV_UNLOCK(&cfg->cfgdrv_lock, flags);
|
|
}
|
|
|
|
static void wl_init_event_handler(struct bcm_cfg80211 *cfg)
|
|
{
|
|
bzero(cfg->evt_handler, sizeof(cfg->evt_handler));
|
|
|
|
cfg->evt_handler[WLC_E_SCAN_COMPLETE] = wl_notify_scan_status;
|
|
cfg->evt_handler[WLC_E_AUTH] = wl_notify_connect_status;
|
|
cfg->evt_handler[WLC_E_ASSOC] = wl_notify_connect_status;
|
|
cfg->evt_handler[WLC_E_LINK] = wl_notify_connect_status;
|
|
cfg->evt_handler[WLC_E_DEAUTH_IND] = wl_notify_connect_status;
|
|
cfg->evt_handler[WLC_E_DEAUTH] = wl_notify_connect_status;
|
|
cfg->evt_handler[WLC_E_DISASSOC_IND] = wl_notify_connect_status;
|
|
cfg->evt_handler[WLC_E_ASSOC_IND] = wl_notify_connect_status;
|
|
cfg->evt_handler[WLC_E_REASSOC_IND] = wl_notify_connect_status;
|
|
cfg->evt_handler[WLC_E_ROAM] = wl_notify_roaming_status;
|
|
cfg->evt_handler[WLC_E_MIC_ERROR] = wl_notify_mic_status;
|
|
cfg->evt_handler[WLC_E_SET_SSID] = wl_notify_connect_status;
|
|
cfg->evt_handler[WLC_E_ACTION_FRAME_RX] = wl_notify_rx_mgmt_frame;
|
|
cfg->evt_handler[WLC_E_PROBREQ_MSG] = wl_notify_rx_mgmt_frame;
|
|
cfg->evt_handler[WLC_E_P2P_PROBREQ_MSG] = wl_notify_rx_mgmt_frame;
|
|
cfg->evt_handler[WLC_E_P2P_DISC_LISTEN_COMPLETE] = wl_cfgp2p_listen_complete;
|
|
cfg->evt_handler[WLC_E_ACTION_FRAME_COMPLETE] = wl_cfgp2p_action_tx_complete;
|
|
cfg->evt_handler[WLC_E_ACTION_FRAME_OFF_CHAN_COMPLETE] = wl_cfgp2p_action_tx_complete;
|
|
cfg->evt_handler[WLC_E_JOIN] = wl_notify_connect_status;
|
|
cfg->evt_handler[WLC_E_START] = wl_notify_connect_status;
|
|
cfg->evt_handler[WLC_E_AUTH_IND] = wl_notify_connect_status;
|
|
cfg->evt_handler[WLC_E_ASSOC_RESP_IE] = wl_notify_connect_status;
|
|
#ifdef PNO_SUPPORT
|
|
cfg->evt_handler[WLC_E_PFN_NET_FOUND] = wl_notify_pfn_status;
|
|
#endif /* PNO_SUPPORT */
|
|
#ifdef GSCAN_SUPPORT
|
|
cfg->evt_handler[WLC_E_PFN_BEST_BATCHING] = wl_notify_gscan_event;
|
|
cfg->evt_handler[WLC_E_PFN_SCAN_COMPLETE] = wl_notify_gscan_event;
|
|
cfg->evt_handler[WLC_E_PFN_GSCAN_FULL_RESULT] = wl_notify_gscan_event;
|
|
cfg->evt_handler[WLC_E_PFN_BSSID_NET_FOUND] = wl_notify_gscan_event;
|
|
cfg->evt_handler[WLC_E_PFN_BSSID_NET_LOST] = wl_notify_gscan_event;
|
|
cfg->evt_handler[WLC_E_PFN_SSID_EXT] = wl_notify_gscan_event;
|
|
cfg->evt_handler[WLC_E_GAS_FRAGMENT_RX] = wl_notify_gscan_event;
|
|
cfg->evt_handler[WLC_E_ROAM_EXP_EVENT] = wl_handle_roam_exp_event;
|
|
#endif /* GSCAN_SUPPORT */
|
|
#ifdef RSSI_MONITOR_SUPPORT
|
|
cfg->evt_handler[WLC_E_RSSI_LQM] = wl_handle_rssi_monitor_event;
|
|
#endif /* RSSI_MONITOR_SUPPORT */
|
|
#ifdef WLTDLS
|
|
cfg->evt_handler[WLC_E_TDLS_PEER_EVENT] = wl_tdls_event_handler;
|
|
#endif /* WLTDLS */
|
|
cfg->evt_handler[WLC_E_BSSID] = wl_notify_roaming_status;
|
|
#ifdef WL_RELMCAST
|
|
cfg->evt_handler[WLC_E_RMC_EVENT] = wl_notify_rmc_status;
|
|
#endif /* WL_RELMCAST */
|
|
#ifdef BT_WIFI_HANDOVER
|
|
cfg->evt_handler[WLC_E_BT_WIFI_HANDOVER_REQ] = wl_notify_bt_wifi_handover_req;
|
|
#endif // endif
|
|
#ifdef WL_NAN
|
|
cfg->evt_handler[WLC_E_NAN_CRITICAL] = wl_cfgnan_notify_nan_status;
|
|
cfg->evt_handler[WLC_E_NAN_NON_CRITICAL] = wl_cfgnan_notify_nan_status;
|
|
#endif /* WL_NAN */
|
|
cfg->evt_handler[WLC_E_CSA_COMPLETE_IND] = wl_csa_complete_ind;
|
|
cfg->evt_handler[WLC_E_AP_STARTED] = wl_ap_start_ind;
|
|
#ifdef CUSTOM_EVENT_PM_WAKE
|
|
cfg->evt_handler[WLC_E_EXCESS_PM_WAKE_EVENT] = wl_check_pmstatus;
|
|
#endif /* CUSTOM_EVENT_PM_WAKE */
|
|
#if defined(DHD_LOSSLESS_ROAMING) || defined(DBG_PKT_MON)
|
|
cfg->evt_handler[WLC_E_ROAM_PREP] = wl_notify_roam_prep_status;
|
|
#endif /* DHD_LOSSLESS_ROAMING || DBG_PKT_MON */
|
|
cfg->evt_handler[WLC_E_ROAM_START] = wl_notify_roam_start_status;
|
|
cfg->evt_handler[WLC_E_PSK_SUP] = wl_cfg80211_sup_event_handler;
|
|
#ifdef WL_BCNRECV
|
|
cfg->evt_handler[WLC_E_BCNRECV_ABORTED] = wl_bcnrecv_aborted_event_handler;
|
|
#endif /* WL_BCNRECV */
|
|
#ifdef WL_MBO
|
|
cfg->evt_handler[WLC_E_MBO] = wl_mbo_event_handler;
|
|
#endif /* WL_MBO */
|
|
#ifdef WL_CAC_TS
|
|
cfg->evt_handler[WLC_E_ADDTS_IND] = wl_cfg80211_cac_event_handler;
|
|
cfg->evt_handler[WLC_E_DELTS_IND] = wl_cfg80211_cac_event_handler;
|
|
#endif /* WL_CAC_TS */
|
|
#if defined(WL_MBO) || defined(WL_OCE)
|
|
cfg->evt_handler[WLC_E_PRUNE] = wl_bssid_prune_event_handler;
|
|
#endif /* WL_MBO || WL_OCE */
|
|
#ifdef RTT_SUPPORT
|
|
cfg->evt_handler[WLC_E_PROXD] = wl_cfg80211_rtt_event_handler;
|
|
#endif // endif
|
|
#ifdef WL_CHAN_UTIL
|
|
cfg->evt_handler[WLC_E_BSS_LOAD] = wl_cfg80211_bssload_report_event_handler;
|
|
#endif /* WL_CHAN_UTIL */
|
|
#ifdef WL_CLIENT_SAE
|
|
cfg->evt_handler[WLC_E_JOIN_START] = wl_notify_start_auth;
|
|
#endif /* WL_CLIENT_SAE */
|
|
}
|
|
|
|
#ifdef WL_CLIENT_SAE
|
|
/** Called by the cfg80211 framework */
|
|
static s32
|
|
wl_cfg80211_external_auth(struct wiphy *wiphy,
|
|
struct net_device *ndev, struct cfg80211_external_auth_params *ext_auth_param)
|
|
{
|
|
int err = 0;
|
|
struct bcm_cfg80211 *cfg = wiphy_priv(wiphy);
|
|
wl_assoc_mgr_cmd_t cmd;
|
|
|
|
WL_DBG(("Enter\n"));
|
|
|
|
if (!ext_auth_param ||
|
|
ETHER_ISNULLADDR(ext_auth_param->bssid)) {
|
|
WL_ERR(("Invalid wl_cfg80211_external_auth param\n"));
|
|
return -EINVAL;
|
|
}
|
|
|
|
cmd.version = WL_ASSOC_MGR_CURRENT_VERSION;
|
|
cmd.length = sizeof(cmd);
|
|
cmd.cmd = WL_ASSOC_MGR_CMD_PAUSE_ON_EVT;
|
|
cmd.params = WL_ASSOC_MGR_PARAMS_EVENT_NONE;
|
|
err = wldev_iovar_setbuf(ndev, "assoc_mgr_cmd", (void *)&cmd, sizeof(cmd), cfg->ioctl_buf,
|
|
WLC_IOCTL_SMLEN, &cfg->ioctl_buf_sync);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("Failed to pause assoc(%d)\n", err));
|
|
}
|
|
|
|
return err;
|
|
}
|
|
#endif /* WL_CLIENT_SAE */
|
|
|
|
#if defined(STATIC_WL_PRIV_STRUCT)
|
|
static int
|
|
wl_init_escan_result_buf(struct bcm_cfg80211 *cfg)
|
|
{
|
|
#ifdef DUAL_ESCAN_RESULT_BUFFER
|
|
cfg->escan_info.escan_buf[0] = DHD_OS_PREALLOC(cfg->pub,
|
|
DHD_PREALLOC_WIPHY_ESCAN0, ESCAN_BUF_SIZE);
|
|
if (cfg->escan_info.escan_buf[0] == NULL) {
|
|
WL_ERR(("Failed to alloc ESCAN_BUF0\n"));
|
|
return -ENOMEM;
|
|
}
|
|
|
|
cfg->escan_info.escan_buf[1] = DHD_OS_PREALLOC(cfg->pub,
|
|
DHD_PREALLOC_WIPHY_ESCAN1, ESCAN_BUF_SIZE);
|
|
if (cfg->escan_info.escan_buf[1] == NULL) {
|
|
WL_ERR(("Failed to alloc ESCAN_BUF1\n"));
|
|
return -ENOMEM;
|
|
}
|
|
|
|
bzero(cfg->escan_info.escan_buf[0], ESCAN_BUF_SIZE);
|
|
bzero(cfg->escan_info.escan_buf[1], ESCAN_BUF_SIZE);
|
|
cfg->escan_info.escan_type[0] = 0;
|
|
cfg->escan_info.escan_type[1] = 0;
|
|
#else
|
|
cfg->escan_info.escan_buf = DHD_OS_PREALLOC(cfg->pub,
|
|
DHD_PREALLOC_WIPHY_ESCAN0, ESCAN_BUF_SIZE);
|
|
if (cfg->escan_info.escan_buf == NULL) {
|
|
WL_ERR(("Failed to alloc ESCAN_BUF\n"));
|
|
return -ENOMEM;
|
|
}
|
|
bzero(cfg->escan_info.escan_buf, ESCAN_BUF_SIZE);
|
|
#endif /* DUAL_ESCAN_RESULT_BUFFER */
|
|
|
|
return 0;
|
|
}
|
|
|
|
static void
|
|
wl_deinit_escan_result_buf(struct bcm_cfg80211 *cfg)
|
|
{
|
|
#ifdef DUAL_ESCAN_RESULT_BUFFER
|
|
if (cfg->escan_info.escan_buf[0] != NULL) {
|
|
cfg->escan_info.escan_buf[0] = NULL;
|
|
cfg->escan_info.escan_type[0] = 0;
|
|
}
|
|
|
|
if (cfg->escan_info.escan_buf[1] != NULL) {
|
|
cfg->escan_info.escan_buf[1] = NULL;
|
|
cfg->escan_info.escan_type[1] = 0;
|
|
}
|
|
#else
|
|
if (cfg->escan_info.escan_buf != NULL) {
|
|
cfg->escan_info.escan_buf = NULL;
|
|
}
|
|
#endif /* DUAL_ESCAN_RESULT_BUFFER */
|
|
}
|
|
#endif /* STATIC_WL_PRIV_STRUCT */
|
|
|
|
static s32 wl_init_priv_mem(struct bcm_cfg80211 *cfg)
|
|
{
|
|
WL_DBG(("Enter \n"));
|
|
|
|
cfg->scan_results = (struct wl_scan_results *)MALLOCZ(cfg->osh,
|
|
WL_SCAN_BUF_MAX);
|
|
if (unlikely(!cfg->scan_results)) {
|
|
WL_ERR(("Scan results alloc failed\n"));
|
|
goto init_priv_mem_out;
|
|
}
|
|
cfg->conf = (struct wl_conf *)MALLOCZ(cfg->osh, sizeof(*cfg->conf));
|
|
if (unlikely(!cfg->conf)) {
|
|
WL_ERR(("wl_conf alloc failed\n"));
|
|
goto init_priv_mem_out;
|
|
}
|
|
cfg->scan_req_int = (void *)MALLOCZ(cfg->osh,
|
|
sizeof(*cfg->scan_req_int));
|
|
if (unlikely(!cfg->scan_req_int)) {
|
|
WL_ERR(("Scan req alloc failed\n"));
|
|
goto init_priv_mem_out;
|
|
}
|
|
cfg->ioctl_buf = (u8 *)MALLOCZ(cfg->osh, WLC_IOCTL_MAXLEN);
|
|
if (unlikely(!cfg->ioctl_buf)) {
|
|
WL_ERR(("Ioctl buf alloc failed\n"));
|
|
goto init_priv_mem_out;
|
|
}
|
|
cfg->escan_ioctl_buf = (void *)MALLOCZ(cfg->osh, WLC_IOCTL_MAXLEN);
|
|
if (unlikely(!cfg->escan_ioctl_buf)) {
|
|
WL_ERR(("Ioctl buf alloc failed\n"));
|
|
goto init_priv_mem_out;
|
|
}
|
|
cfg->extra_buf = (void *)MALLOCZ(cfg->osh, WL_EXTRA_BUF_MAX);
|
|
if (unlikely(!cfg->extra_buf)) {
|
|
WL_ERR(("Extra buf alloc failed\n"));
|
|
goto init_priv_mem_out;
|
|
}
|
|
cfg->pmk_list = (void *)MALLOCZ(cfg->osh, sizeof(*cfg->pmk_list));
|
|
if (unlikely(!cfg->pmk_list)) {
|
|
WL_ERR(("pmk list alloc failed\n"));
|
|
goto init_priv_mem_out;
|
|
}
|
|
#if defined(STATIC_WL_PRIV_STRUCT)
|
|
cfg->conn_info = (void *)MALLOCZ(cfg->osh, sizeof(*cfg->conn_info));
|
|
if (unlikely(!cfg->conn_info)) {
|
|
WL_ERR(("cfg->conn_info alloc failed\n"));
|
|
goto init_priv_mem_out;
|
|
}
|
|
cfg->ie = (void *)MALLOC(cfg->osh, sizeof(*cfg->ie));
|
|
if (unlikely(!cfg->ie)) {
|
|
WL_ERR(("cfg->ie alloc failed\n"));
|
|
goto init_priv_mem_out;
|
|
}
|
|
if (unlikely(wl_init_escan_result_buf(cfg))) {
|
|
WL_ERR(("Failed to init escan resul buf\n"));
|
|
goto init_priv_mem_out;
|
|
}
|
|
#endif /* STATIC_WL_PRIV_STRUCT */
|
|
cfg->afx_hdl = (void *)MALLOCZ(cfg->osh, sizeof(*cfg->afx_hdl));
|
|
if (unlikely(!cfg->afx_hdl)) {
|
|
WL_ERR(("afx hdl alloc failed\n"));
|
|
goto init_priv_mem_out;
|
|
} else {
|
|
init_completion(&cfg->act_frm_scan);
|
|
init_completion(&cfg->wait_next_af);
|
|
|
|
INIT_WORK(&cfg->afx_hdl->work, wl_cfg80211_afx_handler);
|
|
}
|
|
#ifdef WLTDLS
|
|
if (cfg->tdls_mgmt_frame) {
|
|
MFREE(cfg->osh, cfg->tdls_mgmt_frame, cfg->tdls_mgmt_frame_len);
|
|
cfg->tdls_mgmt_frame = NULL;
|
|
cfg->tdls_mgmt_frame_len = 0;
|
|
}
|
|
#endif /* WLTDLS */
|
|
return 0;
|
|
|
|
init_priv_mem_out:
|
|
wl_deinit_priv_mem(cfg);
|
|
|
|
return -ENOMEM;
|
|
}
|
|
|
|
static void wl_deinit_priv_mem(struct bcm_cfg80211 *cfg)
|
|
{
|
|
MFREE(cfg->osh, cfg->scan_results, WL_SCAN_BUF_MAX);
|
|
MFREE(cfg->osh, cfg->conf, sizeof(*cfg->conf));
|
|
MFREE(cfg->osh, cfg->scan_req_int, sizeof(*cfg->scan_req_int));
|
|
MFREE(cfg->osh, cfg->ioctl_buf, WLC_IOCTL_MAXLEN);
|
|
MFREE(cfg->osh, cfg->escan_ioctl_buf, WLC_IOCTL_MAXLEN);
|
|
MFREE(cfg->osh, cfg->extra_buf, WL_EXTRA_BUF_MAX);
|
|
MFREE(cfg->osh, cfg->pmk_list, sizeof(*cfg->pmk_list));
|
|
#if defined(STATIC_WL_PRIV_STRUCT)
|
|
MFREE(cfg->osh, cfg->conn_info, sizeof(*cfg->conn_info));
|
|
MFREE(cfg->osh, cfg->ie, sizeof(*cfg->ie));
|
|
wl_deinit_escan_result_buf(cfg);
|
|
#endif /* STATIC_WL_PRIV_STRUCT */
|
|
if (cfg->afx_hdl) {
|
|
cancel_work_sync(&cfg->afx_hdl->work);
|
|
MFREE(cfg->osh, cfg->afx_hdl, sizeof(*cfg->afx_hdl));
|
|
}
|
|
|
|
}
|
|
|
|
static s32 wl_create_event_handler(struct bcm_cfg80211 *cfg)
|
|
{
|
|
int ret = 0;
|
|
WL_DBG(("Enter \n"));
|
|
|
|
/* Allocate workqueue for event */
|
|
if (!cfg->event_workq) {
|
|
cfg->event_workq = alloc_workqueue("dhd_eventd",
|
|
WQ_MEM_RECLAIM | WQ_HIGHPRI | WQ_UNBOUND, 1);
|
|
}
|
|
|
|
if (!cfg->event_workq) {
|
|
WL_ERR(("event_workq alloc_workqueue failed\n"));
|
|
ret = -ENOMEM;
|
|
} else {
|
|
INIT_WORK(&cfg->event_work, wl_event_handler);
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
static void wl_destroy_event_handler(struct bcm_cfg80211 *cfg)
|
|
{
|
|
if (cfg && cfg->event_workq) {
|
|
cancel_work_sync(&cfg->event_work);
|
|
destroy_workqueue(cfg->event_workq);
|
|
cfg->event_workq = NULL;
|
|
}
|
|
}
|
|
|
|
void wl_terminate_event_handler(struct net_device *dev)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(dev);
|
|
|
|
if (cfg) {
|
|
wl_destroy_event_handler(cfg);
|
|
wl_flush_eq(cfg);
|
|
}
|
|
}
|
|
|
|
#ifdef DHD_LOSSLESS_ROAMING
|
|
static void wl_del_roam_timeout(struct bcm_cfg80211 *cfg)
|
|
{
|
|
dhd_pub_t *dhdp = (dhd_pub_t *)(cfg->pub);
|
|
|
|
/* restore prec_map to ALLPRIO */
|
|
dhdp->dequeue_prec_map = ALLPRIO;
|
|
if (timer_pending(&cfg->roam_timeout)) {
|
|
del_timer_sync(&cfg->roam_timeout);
|
|
}
|
|
|
|
}
|
|
|
|
static void wl_roam_timeout(unsigned long data)
|
|
{
|
|
struct bcm_cfg80211 *cfg = (struct bcm_cfg80211 *)data;
|
|
dhd_pub_t *dhdp = (dhd_pub_t *)(cfg->pub);
|
|
|
|
WL_ERR(("roam timer expired\n"));
|
|
|
|
/* restore prec_map to ALLPRIO */
|
|
dhdp->dequeue_prec_map = ALLPRIO;
|
|
}
|
|
|
|
#endif /* DHD_LOSSLESS_ROAMING */
|
|
|
|
#if defined(CONFIG_WLAN_BEYONDX) || defined(CONFIG_SEC_5GMODEL)
|
|
#define CP_CHAN_INFO_RAT_MODE_LTE 3
|
|
#define CP_CHAN_INFO_RAT_MODE_NR5G 7
|
|
int g_mhs_chan_for_cpcoex = 0;
|
|
|
|
struct __packed cam_cp_noti_info {
|
|
u8 rat;
|
|
u32 band;
|
|
u32 channel;
|
|
};
|
|
|
|
int
|
|
wl_cfg80211_send_msg_to_ril()
|
|
{
|
|
int id, buf = 1;
|
|
|
|
id = IPC_SYSTEM_CP_CHANNEL_INFO;
|
|
dev_ril_bridge_send_msg(id, sizeof(int), &buf);
|
|
WL_ERR(("[BeyondX] send message to ril.\n"));
|
|
|
|
OSL_SLEEP(500);
|
|
return 0;
|
|
}
|
|
|
|
int
|
|
wl_cfg80211_ril_bridge_notifier_call(struct notifier_block *nb,
|
|
unsigned long size, void *buf)
|
|
{
|
|
struct dev_ril_bridge_msg *msg;
|
|
struct cam_cp_noti_info *cp_noti_info;
|
|
static int mhs_channel_for_4g, mhs_channel_for_5g;
|
|
static int recv_msg_4g, recv_msg_5g;
|
|
|
|
WL_ERR(("[BeyondX] receive message from ril.\n"));
|
|
msg = (struct dev_ril_bridge_msg *)buf;
|
|
|
|
if (msg->dev_id == IPC_SYSTEM_CP_CHANNEL_INFO &&
|
|
msg->data_len <= sizeof(struct cam_cp_noti_info)) {
|
|
u8 rat;
|
|
u32 band;
|
|
u32 channel;
|
|
|
|
cp_noti_info = (struct cam_cp_noti_info *)msg->data;
|
|
rat = cp_noti_info->rat;
|
|
band = cp_noti_info->band;
|
|
channel = cp_noti_info->channel;
|
|
|
|
/* LTE/5G Band/Freq information => Mobile Hotspot channel mapping.
|
|
* LTE/B40: 38650~39649 => Ch.11
|
|
* LTE/B41: 39650~41589 => Ch.1
|
|
* 5G/N41: 499200~537999 => Ch.1
|
|
*/
|
|
if (rat == CP_CHAN_INFO_RAT_MODE_LTE) {
|
|
recv_msg_4g = 1;
|
|
if (channel >= 38650 && channel <= 39649) {
|
|
mhs_channel_for_4g = 11;
|
|
} else if (channel >= 39650 && channel <= 41589) {
|
|
mhs_channel_for_4g = 1;
|
|
}
|
|
}
|
|
if (rat == CP_CHAN_INFO_RAT_MODE_NR5G) {
|
|
recv_msg_5g = 1;
|
|
if (channel >= 499200 && channel <= 537999) {
|
|
mhs_channel_for_5g = 1;
|
|
}
|
|
}
|
|
|
|
WL_DBG(("[BeyondX] rat: %u, band: %u, channel: %u, mhs_channel_for_4g: %u, "
|
|
"mhs_channel_for_5g: %u\n", rat, band, channel,
|
|
mhs_channel_for_4g, mhs_channel_for_5g));
|
|
|
|
if (recv_msg_4g && recv_msg_5g) {
|
|
if (mhs_channel_for_4g && mhs_channel_for_5g) {
|
|
/* if 4G/B40 + 5G/N41, select channel 6 for MHS */
|
|
if (mhs_channel_for_4g == 11 && mhs_channel_for_5g == 1) {
|
|
g_mhs_chan_for_cpcoex = 6;
|
|
/* if 4G(except for B40) + 5G/N41, select channel 1 for MHS */
|
|
} else {
|
|
g_mhs_chan_for_cpcoex = 1;
|
|
}
|
|
} else {
|
|
g_mhs_chan_for_cpcoex = mhs_channel_for_4g ? mhs_channel_for_4g :
|
|
mhs_channel_for_5g ? mhs_channel_for_5g : 0;
|
|
}
|
|
mhs_channel_for_4g = mhs_channel_for_5g = 0;
|
|
recv_msg_4g = recv_msg_5g = 0;
|
|
}
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static struct notifier_block wl_cfg80211_ril_bridge_notifier = {
|
|
.notifier_call = wl_cfg80211_ril_bridge_notifier_call,
|
|
};
|
|
|
|
static bool wl_cfg80211_ril_bridge_notifier_registered = FALSE;
|
|
#endif /* CONFIG_WLAN_BEYONDX || defined(CONFIG_SEC_5GMODEL) */
|
|
|
|
static s32
|
|
wl_cfg80211_netdev_notifier_call(struct notifier_block * nb,
|
|
unsigned long state, void *ptr)
|
|
{
|
|
#if (LINUX_VERSION_CODE < KERNEL_VERSION(3, 11, 0))
|
|
struct net_device *dev = ptr;
|
|
#else
|
|
struct net_device *dev = netdev_notifier_info_to_dev(ptr);
|
|
#endif /* LINUX_VERSION < VERSION(3, 11, 0) */
|
|
struct wireless_dev *wdev = NULL;
|
|
struct bcm_cfg80211 *cfg = NULL;
|
|
|
|
WL_DBG(("Enter state:%lu ndev%p \n", state, dev));
|
|
if (!dev) {
|
|
WL_ERR(("dev null\n"));
|
|
return NOTIFY_DONE;
|
|
}
|
|
|
|
wdev = ndev_to_wdev(dev);
|
|
if (!wdev) {
|
|
WL_ERR(("wdev null. Do nothing\n"));
|
|
return NOTIFY_DONE;
|
|
}
|
|
|
|
cfg = (struct bcm_cfg80211 *)wiphy_priv(wdev->wiphy);
|
|
if (!cfg || (cfg != wl_cfg80211_get_bcmcfg())) {
|
|
/* If cfg80211 priv is null or doesn't match return */
|
|
WL_ERR(("wrong cfg ptr (%p)\n", cfg));
|
|
return NOTIFY_DONE;
|
|
}
|
|
|
|
if (dev == bcmcfg_to_prmry_ndev(cfg)) {
|
|
/* Nothing to be done for primary I/F */
|
|
return NOTIFY_DONE;
|
|
}
|
|
|
|
switch (state) {
|
|
case NETDEV_DOWN:
|
|
{
|
|
#if (LINUX_VERSION_CODE < KERNEL_VERSION(3, 11, 0))
|
|
int max_wait_timeout = 2;
|
|
int max_wait_count = 100;
|
|
int refcnt = 0;
|
|
unsigned long limit = jiffies + max_wait_timeout * HZ;
|
|
while (work_pending(&wdev->cleanup_work)) {
|
|
if (refcnt%5 == 0) {
|
|
WL_ERR(("[NETDEV_DOWN] wait for "
|
|
"complete of cleanup_work"
|
|
" (%d th)\n", refcnt));
|
|
}
|
|
if (!time_before(jiffies, limit)) {
|
|
WL_ERR(("[NETDEV_DOWN] cleanup_work"
|
|
" of CFG80211 is not"
|
|
" completed in %d sec\n",
|
|
max_wait_timeout));
|
|
break;
|
|
}
|
|
if (refcnt >= max_wait_count) {
|
|
WL_ERR(("[NETDEV_DOWN] cleanup_work"
|
|
" of CFG80211 is not"
|
|
" completed in %d loop\n",
|
|
max_wait_count));
|
|
break;
|
|
}
|
|
set_current_state(TASK_INTERRUPTIBLE);
|
|
(void)schedule_timeout(100);
|
|
set_current_state(TASK_RUNNING);
|
|
refcnt++;
|
|
}
|
|
#endif /* LINUX_VERSION < VERSION(3, 14, 0) */
|
|
break;
|
|
}
|
|
case NETDEV_UNREGISTER:
|
|
wl_cfg80211_clear_per_bss_ies(cfg, wdev);
|
|
/* after calling list_del_rcu(&wdev->list) */
|
|
wl_dealloc_netinfo_by_wdev(cfg, wdev);
|
|
break;
|
|
case NETDEV_GOING_DOWN:
|
|
/*
|
|
* At NETDEV_DOWN state, wdev_cleanup_work work will be called.
|
|
* In front of door, the function checks whether current scan
|
|
* is working or not. If the scanning is still working,
|
|
* wdev_cleanup_work call WARN_ON and make the scan done forcibly.
|
|
*/
|
|
if (wl_get_drv_status(cfg, SCANNING, dev))
|
|
wl_cfg80211_cancel_scan(cfg);
|
|
break;
|
|
}
|
|
return NOTIFY_DONE;
|
|
}
|
|
|
|
static struct notifier_block wl_cfg80211_netdev_notifier = {
|
|
.notifier_call = wl_cfg80211_netdev_notifier_call,
|
|
};
|
|
|
|
/*
|
|
* to make sure we won't register the same notifier twice, otherwise a loop is likely to be
|
|
* created in kernel notifier link list (with 'next' pointing to itself)
|
|
*/
|
|
static bool wl_cfg80211_netdev_notifier_registered = FALSE;
|
|
|
|
static void wl_cfg80211_concurrent_roam(struct bcm_cfg80211 *cfg, int enable)
|
|
{
|
|
u32 connected_cnt = wl_get_drv_status_all(cfg, CONNECTED);
|
|
bool p2p_connected = wl_cfgp2p_vif_created(cfg);
|
|
struct net_info *iter, *next;
|
|
|
|
if (!(cfg->roam_flags & WL_ROAM_OFF_ON_CONCURRENT))
|
|
return;
|
|
|
|
WL_DBG(("roam off:%d p2p_connected:%d connected_cnt:%d \n",
|
|
enable, p2p_connected, connected_cnt));
|
|
/* Disable FW roam when we have a concurrent P2P connection */
|
|
if (enable && p2p_connected && connected_cnt > 1) {
|
|
|
|
/* Mark it as to be reverted */
|
|
cfg->roam_flags |= WL_ROAM_REVERT_STATUS;
|
|
GCC_DIAGNOSTIC_PUSH_SUPPRESS_CAST();
|
|
for_each_ndev(cfg, iter, next) {
|
|
GCC_DIAGNOSTIC_POP();
|
|
if (iter->ndev && iter->wdev &&
|
|
iter->wdev->iftype == NL80211_IFTYPE_STATION) {
|
|
if (wldev_iovar_setint(iter->ndev, "roam_off", TRUE)
|
|
== BCME_OK) {
|
|
iter->roam_off = TRUE;
|
|
}
|
|
else {
|
|
WL_ERR(("error to enable roam_off\n"));
|
|
}
|
|
}
|
|
}
|
|
}
|
|
else if (!enable && (cfg->roam_flags & WL_ROAM_REVERT_STATUS)) {
|
|
cfg->roam_flags &= ~WL_ROAM_REVERT_STATUS;
|
|
GCC_DIAGNOSTIC_PUSH_SUPPRESS_CAST();
|
|
for_each_ndev(cfg, iter, next) {
|
|
GCC_DIAGNOSTIC_POP();
|
|
if (iter->ndev && iter->wdev &&
|
|
iter->wdev->iftype == NL80211_IFTYPE_STATION) {
|
|
if (iter->roam_off != WL_INVALID) {
|
|
if (wldev_iovar_setint(iter->ndev, "roam_off", FALSE)
|
|
== BCME_OK) {
|
|
iter->roam_off = FALSE;
|
|
}
|
|
else {
|
|
WL_ERR(("error to disable roam_off\n"));
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
return;
|
|
}
|
|
|
|
static void wl_cfg80211_determine_vsdb_mode(struct bcm_cfg80211 *cfg)
|
|
{
|
|
struct net_info *iter, *next;
|
|
u32 ctl_chan = 0;
|
|
u32 chanspec = 0;
|
|
u32 pre_ctl_chan = 0;
|
|
u32 connected_cnt = wl_get_drv_status_all(cfg, CONNECTED);
|
|
cfg->vsdb_mode = false;
|
|
|
|
if (connected_cnt <= 1) {
|
|
return;
|
|
}
|
|
GCC_DIAGNOSTIC_PUSH_SUPPRESS_CAST();
|
|
for_each_ndev(cfg, iter, next) {
|
|
GCC_DIAGNOSTIC_POP();
|
|
/* p2p discovery iface ndev could be null */
|
|
if (iter->ndev) {
|
|
chanspec = 0;
|
|
ctl_chan = 0;
|
|
if (wl_get_drv_status(cfg, CONNECTED, iter->ndev)) {
|
|
if (wldev_iovar_getint(iter->ndev, "chanspec",
|
|
(s32 *)&chanspec) == BCME_OK) {
|
|
chanspec = wl_chspec_driver_to_host(chanspec);
|
|
ctl_chan = wf_chspec_ctlchan(chanspec);
|
|
wl_update_prof(cfg, iter->ndev, NULL,
|
|
&ctl_chan, WL_PROF_CHAN);
|
|
}
|
|
if (!cfg->vsdb_mode) {
|
|
if (!pre_ctl_chan && ctl_chan)
|
|
pre_ctl_chan = ctl_chan;
|
|
else if (pre_ctl_chan && (pre_ctl_chan != ctl_chan)) {
|
|
cfg->vsdb_mode = true;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
WL_MSG("wlan", "%s concurrency is enabled\n", cfg->vsdb_mode ? "Multi Channel" : "Same Channel");
|
|
return;
|
|
}
|
|
|
|
int
|
|
wl_cfg80211_determine_p2p_rsdb_mode(struct bcm_cfg80211 *cfg)
|
|
{
|
|
struct net_info *iter, *next;
|
|
u32 chanspec = 0;
|
|
u32 band = 0;
|
|
u32 pre_band = 0;
|
|
bool is_rsdb_supported = FALSE;
|
|
bool rsdb_mode = FALSE;
|
|
|
|
is_rsdb_supported = DHD_OPMODE_SUPPORTED(cfg->pub, DHD_FLAG_RSDB_MODE);
|
|
|
|
if (!is_rsdb_supported) {
|
|
return 0;
|
|
}
|
|
|
|
GCC_DIAGNOSTIC_PUSH_SUPPRESS_CAST();
|
|
for_each_ndev(cfg, iter, next) {
|
|
GCC_DIAGNOSTIC_POP();
|
|
/* p2p discovery iface ndev could be null */
|
|
if (iter->ndev) {
|
|
chanspec = 0;
|
|
band = 0;
|
|
if (wl_get_drv_status(cfg, CONNECTED, iter->ndev)) {
|
|
if (wldev_iovar_getint(iter->ndev, "chanspec",
|
|
(s32 *)&chanspec) == BCME_OK) {
|
|
chanspec = wl_chspec_driver_to_host(chanspec);
|
|
band = CHSPEC_BAND(chanspec);
|
|
}
|
|
|
|
if (!pre_band && band) {
|
|
pre_band = band;
|
|
} else if (pre_band && (pre_band != band)) {
|
|
rsdb_mode = TRUE;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
WL_DBG(("RSDB mode is %s\n", rsdb_mode ? "enabled" : "disabled"));
|
|
|
|
return rsdb_mode;
|
|
}
|
|
|
|
static s32 wl_notifier_change_state(struct bcm_cfg80211 *cfg, struct net_info *_net_info,
|
|
enum wl_status state, bool set)
|
|
{
|
|
s32 pm = PM_FAST;
|
|
s32 err = BCME_OK;
|
|
u32 mode;
|
|
u32 chan = 0;
|
|
struct net_device *primary_dev = bcmcfg_to_prmry_ndev(cfg);
|
|
dhd_pub_t *dhd = cfg->pub;
|
|
#ifdef RTT_SUPPORT
|
|
rtt_status_info_t *rtt_status;
|
|
#endif /* RTT_SUPPORT */
|
|
if (dhd->busstate == DHD_BUS_DOWN) {
|
|
WL_ERR(("busstate is DHD_BUS_DOWN!\n"));
|
|
return 0;
|
|
}
|
|
WL_DBG(("Enter state %d set %d _net_info->pm_restore %d iface %s\n",
|
|
state, set, _net_info->pm_restore, _net_info->ndev->name));
|
|
|
|
if (state != WL_STATUS_CONNECTED)
|
|
return 0;
|
|
mode = wl_get_mode_by_netdev(cfg, _net_info->ndev);
|
|
if (set) {
|
|
wl_cfg80211_concurrent_roam(cfg, 1);
|
|
wl_cfg80211_determine_vsdb_mode(cfg);
|
|
if (mode == WL_MODE_AP) {
|
|
if (wl_add_remove_eventmsg(primary_dev, WLC_E_P2P_PROBREQ_MSG, false))
|
|
WL_ERR((" failed to unset WLC_E_P2P_PROPREQ_MSG\n"));
|
|
}
|
|
pm = PM_OFF;
|
|
if ((err = wldev_ioctl_set(_net_info->ndev, WLC_SET_PM, &pm,
|
|
sizeof(pm))) != 0) {
|
|
if (err == -ENODEV)
|
|
WL_DBG(("%s:netdev not ready\n",
|
|
_net_info->ndev->name));
|
|
else
|
|
WL_ERR(("%s:error (%d)\n",
|
|
_net_info->ndev->name, err));
|
|
|
|
wl_cfg80211_update_power_mode(_net_info->ndev);
|
|
}
|
|
wl_add_remove_pm_enable_work(cfg, WL_PM_WORKQ_SHORT);
|
|
#if defined(WLTDLS)
|
|
if (wl_cfg80211_is_concurrent_mode(primary_dev)) {
|
|
err = wldev_iovar_setint(primary_dev, "tdls_enable", 0);
|
|
}
|
|
#endif /* defined(WLTDLS) */
|
|
|
|
#ifdef DISABLE_FRAMEBURST_VSDB
|
|
if (!DHD_OPMODE_SUPPORTED(cfg->pub, DHD_FLAG_HOSTAP_MODE) &&
|
|
wl_cfg80211_is_concurrent_mode(primary_dev) &&
|
|
!wl_cfg80211_determine_p2p_rsdb_mode(cfg)) {
|
|
wl_cfg80211_set_frameburst(cfg, FALSE);
|
|
}
|
|
#endif /* DISABLE_FRAMEBURST_VSDB */
|
|
#ifdef DISABLE_WL_FRAMEBURST_SOFTAP
|
|
if (DHD_OPMODE_STA_SOFTAP_CONCURR(dhd) &&
|
|
wl_get_drv_status(cfg, CONNECTED, bcmcfg_to_prmry_ndev(cfg))) {
|
|
/* Enable frameburst for
|
|
* STA/SoftAP concurrent mode
|
|
*/
|
|
wl_cfg80211_set_frameburst(cfg, TRUE);
|
|
}
|
|
#endif /* DISABLE_WL_FRAMEBURST_SOFTAP */
|
|
} else { /* clear */
|
|
chan = 0;
|
|
/* clear chan information when the net device is disconnected */
|
|
wl_update_prof(cfg, _net_info->ndev, NULL, &chan, WL_PROF_CHAN);
|
|
wl_cfg80211_determine_vsdb_mode(cfg);
|
|
if (primary_dev == _net_info->ndev) {
|
|
pm = PM_FAST;
|
|
#ifdef RTT_SUPPORT
|
|
rtt_status = GET_RTTSTATE(dhd);
|
|
if (rtt_status->status != RTT_ENABLED) {
|
|
#endif /* RTT_SUPPORT */
|
|
if (dhd_conf_get_pm(dhd) >= 0)
|
|
pm = dhd_conf_get_pm(dhd);
|
|
if ((err = wldev_ioctl_set(_net_info->ndev, WLC_SET_PM, &pm,
|
|
sizeof(pm))) != 0) {
|
|
if (err == -ENODEV)
|
|
WL_DBG(("%s:netdev not ready\n",
|
|
_net_info->ndev->name));
|
|
else
|
|
WL_ERR(("%s:error (%d)\n",
|
|
_net_info->ndev->name, err));
|
|
|
|
wl_cfg80211_update_power_mode(_net_info->ndev);
|
|
}
|
|
#ifdef RTT_SUPPORT
|
|
}
|
|
#endif /* RTT_SUPPORT */
|
|
}
|
|
wl_cfg80211_concurrent_roam(cfg, 0);
|
|
#if defined(WLTDLS)
|
|
if (!wl_cfg80211_is_concurrent_mode(primary_dev)) {
|
|
err = wldev_iovar_setint(primary_dev, "tdls_enable", 1);
|
|
}
|
|
#endif /* defined(WLTDLS) */
|
|
|
|
#if defined(DISABLE_FRAMEBURST_VSDB)
|
|
if (!DHD_OPMODE_SUPPORTED(cfg->pub, DHD_FLAG_HOSTAP_MODE)) {
|
|
wl_cfg80211_set_frameburst(cfg, TRUE);
|
|
}
|
|
#endif /* DISABLE_FRAMEBURST_VSDB */
|
|
#ifdef DISABLE_WL_FRAMEBURST_SOFTAP
|
|
if (DHD_OPMODE_STA_SOFTAP_CONCURR(dhd) &&
|
|
(cfg->ap_oper_channel <= CH_MAX_2G_CHANNEL)) {
|
|
/* Disable frameburst for stand-alone 2GHz SoftAP */
|
|
wl_cfg80211_set_frameburst(cfg, FALSE);
|
|
}
|
|
#endif /* DISABLE_WL_FRAMEBURST_SOFTAP */
|
|
}
|
|
return err;
|
|
}
|
|
|
|
#ifdef DHD_LOSSLESS_ROAMING
|
|
static s32 wl_init_roam_timeout(struct bcm_cfg80211 *cfg)
|
|
{
|
|
int err = 0;
|
|
|
|
/* Init roam timer */
|
|
init_timer_compat(&cfg->roam_timeout, wl_roam_timeout, cfg);
|
|
|
|
return err;
|
|
}
|
|
#endif /* DHD_LOSSLESS_ROAMING */
|
|
|
|
static s32 wl_init_priv(struct bcm_cfg80211 *cfg)
|
|
{
|
|
struct wiphy *wiphy = bcmcfg_to_wiphy(cfg);
|
|
struct net_device *ndev = bcmcfg_to_prmry_ndev(cfg);
|
|
s32 err = 0;
|
|
|
|
cfg->scan_request = NULL;
|
|
cfg->pwr_save = !!(wiphy->flags & WIPHY_FLAG_PS_ON_BY_DEFAULT);
|
|
#ifdef DISABLE_BUILTIN_ROAM
|
|
cfg->roam_on = false;
|
|
#else
|
|
cfg->roam_on = true;
|
|
#endif /* DISABLE_BUILTIN_ROAM */
|
|
cfg->active_scan = true;
|
|
cfg->rf_blocked = false;
|
|
cfg->vsdb_mode = false;
|
|
#if defined(BCMSDIO) || defined(BCMDBUS)
|
|
cfg->wlfc_on = false;
|
|
#endif /* BCMSDIO || BCMDBUS */
|
|
cfg->roam_flags |= WL_ROAM_OFF_ON_CONCURRENT;
|
|
cfg->disable_roam_event = false;
|
|
/* register interested state */
|
|
set_bit(WL_STATUS_CONNECTED, &cfg->interrested_state);
|
|
spin_lock_init(&cfg->cfgdrv_lock);
|
|
mutex_init(&cfg->ioctl_buf_sync);
|
|
init_waitqueue_head(&cfg->netif_change_event);
|
|
init_waitqueue_head(&cfg->wps_done_event);
|
|
init_completion(&cfg->send_af_done);
|
|
init_completion(&cfg->iface_disable);
|
|
mutex_init(&cfg->usr_sync);
|
|
mutex_init(&cfg->event_sync);
|
|
mutex_init(&cfg->if_sync);
|
|
mutex_init(&cfg->scan_sync);
|
|
mutex_init(&cfg->pm_sync);
|
|
mutex_init(&cfg->in4way_sync);
|
|
#ifdef WLTDLS
|
|
mutex_init(&cfg->tdls_sync);
|
|
#endif /* WLTDLS */
|
|
#ifdef WL_BCNRECV
|
|
mutex_init(&cfg->bcn_sync);
|
|
#endif /* WL_BCNRECV */
|
|
#ifdef WL_WPS_SYNC
|
|
wl_init_wps_reauth_sm(cfg);
|
|
#endif /* WL_WPS_SYNC */
|
|
wl_init_eq(cfg);
|
|
err = wl_init_priv_mem(cfg);
|
|
if (err)
|
|
return err;
|
|
if (wl_create_event_handler(cfg))
|
|
return -ENOMEM;
|
|
wl_init_event_handler(cfg);
|
|
err = wl_init_scan(cfg);
|
|
if (err)
|
|
return err;
|
|
#ifdef DHD_LOSSLESS_ROAMING
|
|
err = wl_init_roam_timeout(cfg);
|
|
if (err) {
|
|
return err;
|
|
}
|
|
#endif /* DHD_LOSSLESS_ROAMING */
|
|
wl_init_conf(cfg->conf);
|
|
wl_init_prof(cfg, ndev);
|
|
wl_link_down(cfg);
|
|
DNGL_FUNC(dhd_cfg80211_init, (cfg));
|
|
#ifdef WL_NAN
|
|
cfg->nan_dp_state = NAN_DP_STATE_DISABLED;
|
|
init_waitqueue_head(&cfg->ndp_if_change_event);
|
|
mutex_init(&cfg->nancfg.nan_sync);
|
|
init_waitqueue_head(&cfg->nancfg.nan_event_wait);
|
|
#endif /* WL_NAN */
|
|
cfg->pmk_list->pmkids.length = OFFSETOF(pmkid_list_v3_t, pmkid);
|
|
cfg->pmk_list->pmkids.count = 0;
|
|
cfg->pmk_list->pmkids.version = PMKID_LIST_VER_3;
|
|
return err;
|
|
}
|
|
|
|
static void wl_deinit_priv(struct bcm_cfg80211 *cfg)
|
|
{
|
|
DNGL_FUNC(dhd_cfg80211_deinit, (cfg));
|
|
wl_destroy_event_handler(cfg);
|
|
wl_flush_eq(cfg);
|
|
wl_link_down(cfg);
|
|
del_timer_sync(&cfg->scan_timeout);
|
|
#ifdef DHD_LOSSLESS_ROAMING
|
|
del_timer_sync(&cfg->roam_timeout);
|
|
#endif // endif
|
|
wl_deinit_priv_mem(cfg);
|
|
if (wl_cfg80211_netdev_notifier_registered) {
|
|
wl_cfg80211_netdev_notifier_registered = FALSE;
|
|
unregister_netdevice_notifier(&wl_cfg80211_netdev_notifier);
|
|
}
|
|
}
|
|
|
|
#if defined(WL_ENABLE_P2P_IF)
|
|
static s32 wl_cfg80211_attach_p2p(struct bcm_cfg80211 *cfg)
|
|
{
|
|
WL_TRACE(("Enter \n"));
|
|
|
|
if (wl_cfgp2p_register_ndev(cfg) < 0) {
|
|
WL_ERR(("P2P attach failed. \n"));
|
|
return -ENODEV;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static s32 wl_cfg80211_detach_p2p(struct bcm_cfg80211 *cfg)
|
|
{
|
|
struct wireless_dev *wdev;
|
|
|
|
WL_DBG(("Enter \n"));
|
|
if (!cfg) {
|
|
WL_ERR(("Invalid Ptr\n"));
|
|
return -EINVAL;
|
|
}
|
|
else {
|
|
wdev = cfg->p2p_wdev;
|
|
if (!wdev) {
|
|
WL_ERR(("Invalid Ptr\n"));
|
|
return -EINVAL;
|
|
}
|
|
}
|
|
|
|
wl_cfgp2p_unregister_ndev(cfg);
|
|
|
|
cfg->p2p_wdev = NULL;
|
|
cfg->p2p_net = NULL;
|
|
WL_DBG(("Freeing 0x%p \n", wdev));
|
|
kfree(wdev);
|
|
|
|
return 0;
|
|
}
|
|
#endif
|
|
|
|
static s32 wl_cfg80211_attach_post(struct net_device *ndev)
|
|
{
|
|
struct bcm_cfg80211 * cfg;
|
|
s32 err = 0;
|
|
s32 ret = 0;
|
|
WL_TRACE(("In\n"));
|
|
if (unlikely(!ndev)) {
|
|
WL_ERR(("ndev is invaild\n"));
|
|
return -ENODEV;
|
|
}
|
|
cfg = wl_get_cfg(ndev);
|
|
if (unlikely(!cfg)) {
|
|
WL_ERR(("cfg is invaild\n"));
|
|
return -EINVAL;
|
|
}
|
|
if (!wl_get_drv_status(cfg, READY, ndev)) {
|
|
if (cfg->wdev) {
|
|
ret = wl_cfgp2p_supported(cfg, ndev);
|
|
if (ret > 0) {
|
|
#if !defined(WL_ENABLE_P2P_IF)
|
|
cfg->wdev->wiphy->interface_modes |=
|
|
(BIT(NL80211_IFTYPE_P2P_CLIENT)|
|
|
BIT(NL80211_IFTYPE_P2P_GO));
|
|
#endif /* !WL_ENABLE_P2P_IF */
|
|
if ((err = wl_cfgp2p_init_priv(cfg)) != 0)
|
|
goto fail;
|
|
|
|
#if defined(WL_ENABLE_P2P_IF)
|
|
if (cfg->p2p_net) {
|
|
/* Update MAC addr for p2p0 interface here. */
|
|
memcpy(cfg->p2p_net->dev_addr, ndev->dev_addr, ETH_ALEN);
|
|
cfg->p2p_net->dev_addr[0] |= 0x02;
|
|
WL_MSG(cfg->p2p_net->name, "p2p_dev_addr="MACDBG "\n",
|
|
MAC2STRDBG(cfg->p2p_net->dev_addr));
|
|
} else {
|
|
WL_ERR(("p2p_net not yet populated."
|
|
" Couldn't update the MAC Address for p2p0 \n"));
|
|
return -ENODEV;
|
|
}
|
|
#endif /* WL_ENABLE_P2P_IF */
|
|
cfg->p2p_supported = true;
|
|
} else if (ret == 0) {
|
|
if ((err = wl_cfgp2p_init_priv(cfg)) != 0)
|
|
goto fail;
|
|
} else {
|
|
/* SDIO bus timeout */
|
|
err = -ENODEV;
|
|
goto fail;
|
|
}
|
|
}
|
|
}
|
|
wl_set_drv_status(cfg, READY, ndev);
|
|
fail:
|
|
return err;
|
|
}
|
|
|
|
struct bcm_cfg80211 *wl_get_cfg(struct net_device *ndev)
|
|
{
|
|
struct wireless_dev *wdev = ndev->ieee80211_ptr;
|
|
|
|
if (!wdev || !wdev->wiphy)
|
|
return NULL;
|
|
|
|
return wiphy_priv(wdev->wiphy);
|
|
}
|
|
|
|
s32
|
|
wl_cfg80211_net_attach(struct net_device *primary_ndev)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(primary_ndev);
|
|
|
|
if (!cfg) {
|
|
WL_ERR(("cfg null\n"));
|
|
return BCME_ERROR;
|
|
}
|
|
#ifdef WL_STATIC_IF
|
|
/* Register dummy n/w iface. FW init will happen only from dev_open */
|
|
if (wl_cfg80211_register_static_if(cfg, NL80211_IFTYPE_STATION,
|
|
WL_STATIC_IFNAME_PREFIX) == NULL) {
|
|
WL_ERR(("static i/f registration failed!\n"));
|
|
return BCME_ERROR;
|
|
}
|
|
#endif /* WL_STATIC_IF */
|
|
return BCME_OK;
|
|
}
|
|
|
|
s32 wl_cfg80211_attach(struct net_device *ndev, void *context)
|
|
{
|
|
struct wireless_dev *wdev;
|
|
struct bcm_cfg80211 *cfg;
|
|
s32 err = 0;
|
|
struct device *dev;
|
|
u16 bssidx = 0;
|
|
u16 ifidx = 0;
|
|
dhd_pub_t *dhd = (struct dhd_pub *)(context);
|
|
|
|
WL_TRACE(("In\n"));
|
|
if (!ndev) {
|
|
WL_ERR(("ndev is invaild\n"));
|
|
return -ENODEV;
|
|
}
|
|
WL_DBG(("func %p\n", wl_cfg80211_get_parent_dev()));
|
|
dev = wl_cfg80211_get_parent_dev();
|
|
|
|
wdev = (struct wireless_dev *)MALLOCZ(dhd->osh, sizeof(*wdev));
|
|
if (unlikely(!wdev)) {
|
|
WL_ERR(("Could not allocate wireless device\n"));
|
|
return -ENOMEM;
|
|
}
|
|
err = wl_setup_wiphy(wdev, dev, context);
|
|
if (unlikely(err)) {
|
|
MFREE(dhd->osh, wdev, sizeof(*wdev));
|
|
return -ENOMEM;
|
|
}
|
|
#ifdef WLMESH_CFG80211
|
|
wdev->iftype = wl_mode_to_nl80211_iftype(WL_MODE_MESH);
|
|
#else
|
|
wdev->iftype = wl_mode_to_nl80211_iftype(WL_MODE_BSS);
|
|
#endif
|
|
cfg = wiphy_priv(wdev->wiphy);
|
|
cfg->wdev = wdev;
|
|
cfg->pub = context;
|
|
cfg->osh = dhd->osh;
|
|
INIT_LIST_HEAD(&cfg->net_list);
|
|
INIT_LIST_HEAD(&cfg->vndr_oui_list);
|
|
spin_lock_init(&cfg->vndr_oui_sync);
|
|
spin_lock_init(&cfg->net_list_sync);
|
|
ndev->ieee80211_ptr = wdev;
|
|
SET_NETDEV_DEV(ndev, wiphy_dev(wdev->wiphy));
|
|
wdev->netdev = ndev;
|
|
cfg->state_notifier = wl_notifier_change_state;
|
|
err = wl_alloc_netinfo(cfg, ndev, wdev, WL_IF_TYPE_STA, PM_ENABLE, bssidx, ifidx);
|
|
if (err) {
|
|
WL_ERR(("Failed to alloc net_info (%d)\n", err));
|
|
goto cfg80211_attach_out;
|
|
}
|
|
err = wl_init_priv(cfg);
|
|
if (err) {
|
|
WL_ERR(("Failed to init iwm_priv (%d)\n", err));
|
|
goto cfg80211_attach_out;
|
|
}
|
|
|
|
err = wl_setup_rfkill(cfg, TRUE);
|
|
if (err) {
|
|
WL_ERR(("Failed to setup rfkill %d\n", err));
|
|
goto cfg80211_attach_out;
|
|
}
|
|
#ifdef DEBUGFS_CFG80211
|
|
err = wl_setup_debugfs(cfg);
|
|
if (err) {
|
|
WL_ERR(("Failed to setup debugfs %d\n", err));
|
|
goto cfg80211_attach_out;
|
|
}
|
|
#endif // endif
|
|
if (!wl_cfg80211_netdev_notifier_registered) {
|
|
wl_cfg80211_netdev_notifier_registered = TRUE;
|
|
err = register_netdevice_notifier(&wl_cfg80211_netdev_notifier);
|
|
if (err) {
|
|
wl_cfg80211_netdev_notifier_registered = FALSE;
|
|
WL_ERR(("Failed to register notifierl %d\n", err));
|
|
goto cfg80211_attach_out;
|
|
}
|
|
}
|
|
#if defined(COEX_DHCP)
|
|
cfg->btcoex_info = wl_cfg80211_btcoex_init(cfg->wdev->netdev);
|
|
if (!cfg->btcoex_info)
|
|
goto cfg80211_attach_out;
|
|
#endif // endif
|
|
|
|
#ifdef CONFIG_CFG80211_INTERNAL_REGDB
|
|
wdev->wiphy->reg_notifier = wl_cfg80211_reg_notifier;
|
|
#endif /* CONFIG_CFG80211_INTERNAL_REGDB */
|
|
|
|
#if defined(WL_ENABLE_P2P_IF)
|
|
err = wl_cfg80211_attach_p2p(cfg);
|
|
if (err)
|
|
goto cfg80211_attach_out;
|
|
#endif
|
|
|
|
INIT_DELAYED_WORK(&cfg->pm_enable_work, wl_cfg80211_work_handler);
|
|
#ifdef WL_NAN
|
|
WL_DBG(("NAN: Armed wl_cfgnan_delayed_disable work\n"));
|
|
INIT_DELAYED_WORK(&cfg->nan_disable, wl_cfgnan_delayed_disable);
|
|
#endif /* WL_NAN */
|
|
cfg->rssi_sum_report = FALSE;
|
|
return err;
|
|
|
|
cfg80211_attach_out:
|
|
wl_cfg80211_detach(cfg);
|
|
return err;
|
|
}
|
|
|
|
void wl_cfg80211_detach(struct bcm_cfg80211 *cfg)
|
|
{
|
|
WL_DBG(("Enter\n"));
|
|
if (!cfg) {
|
|
return;
|
|
}
|
|
wl_add_remove_pm_enable_work(cfg, WL_PM_WORKQ_DEL);
|
|
|
|
#if defined(COEX_DHCP)
|
|
wl_cfg80211_btcoex_deinit();
|
|
cfg->btcoex_info = NULL;
|
|
#endif // endif
|
|
|
|
wl_setup_rfkill(cfg, FALSE);
|
|
#ifdef DEBUGFS_CFG80211
|
|
wl_free_debugfs(cfg);
|
|
#endif // endif
|
|
if (cfg->p2p_supported) {
|
|
if (timer_pending(&cfg->p2p->listen_timer))
|
|
del_timer_sync(&cfg->p2p->listen_timer);
|
|
wl_cfgp2p_deinit_priv(cfg);
|
|
}
|
|
|
|
#ifdef WL_WPS_SYNC
|
|
wl_deinit_wps_reauth_sm(cfg);
|
|
#endif /* WL_WPS_SYNC */
|
|
|
|
if (timer_pending(&cfg->scan_timeout))
|
|
del_timer_sync(&cfg->scan_timeout);
|
|
#ifdef DHD_LOSSLESS_ROAMING
|
|
if (timer_pending(&cfg->roam_timeout)) {
|
|
del_timer_sync(&cfg->roam_timeout);
|
|
}
|
|
#endif /* DHD_LOSSLESS_ROAMING */
|
|
|
|
#ifdef WL_STATIC_IF
|
|
wl_cfg80211_unregister_static_if(cfg);
|
|
#endif /* WL_STATIC_IF */
|
|
#if defined(WL_CFG80211_P2P_DEV_IF)
|
|
if (cfg->p2p_wdev)
|
|
wl_cfgp2p_del_p2p_disc_if(cfg->p2p_wdev, cfg);
|
|
#endif /* WL_CFG80211_P2P_DEV_IF */
|
|
#if defined(WL_ENABLE_P2P_IF)
|
|
wl_cfg80211_detach_p2p(cfg);
|
|
#endif
|
|
wl_cfg80211_ibss_vsie_free(cfg);
|
|
wl_dealloc_netinfo_by_wdev(cfg, cfg->wdev);
|
|
wl_cfg80211_set_bcmcfg(NULL);
|
|
wl_deinit_priv(cfg);
|
|
wl_cfg80211_clear_parent_dev();
|
|
#if defined(RSSIAVG)
|
|
wl_free_rssi_cache(&cfg->g_rssi_cache_ctrl);
|
|
wl_free_rssi_cache(&cfg->g_connected_rssi_cache_ctrl);
|
|
#endif
|
|
#if defined(BSSCACHE)
|
|
wl_release_bss_cache_ctrl(&cfg->g_bss_cache_ctrl);
|
|
#endif
|
|
wl_free_wdev(cfg);
|
|
/* PLEASE do NOT call any function after wl_free_wdev, the driver's private
|
|
* structure "cfg", which is the private part of wiphy, has been freed in
|
|
* wl_free_wdev !!!!!!!!!!!
|
|
*/
|
|
WL_DBG(("Exit\n"));
|
|
}
|
|
|
|
#if defined(CONFIG_WLAN_BEYONDX) || defined(CONFIG_SEC_5GMODEL)
|
|
void wl_cfg80211_register_dev_ril_bridge_event_notifier()
|
|
{
|
|
WL_DBG(("Enter\n"));
|
|
if (!wl_cfg80211_ril_bridge_notifier_registered) {
|
|
s32 err = 0;
|
|
wl_cfg80211_ril_bridge_notifier_registered = TRUE;
|
|
err = register_dev_ril_bridge_event_notifier(&wl_cfg80211_ril_bridge_notifier);
|
|
if (err) {
|
|
wl_cfg80211_ril_bridge_notifier_registered = FALSE;
|
|
WL_ERR(("Failed to register ril_notifier! %d\n", err));
|
|
}
|
|
}
|
|
}
|
|
|
|
void wl_cfg80211_unregister_dev_ril_bridge_event_notifier()
|
|
{
|
|
WL_DBG(("Enter\n"));
|
|
if (wl_cfg80211_ril_bridge_notifier_registered) {
|
|
wl_cfg80211_ril_bridge_notifier_registered = FALSE;
|
|
unregister_dev_ril_bridge_event_notifier(&wl_cfg80211_ril_bridge_notifier);
|
|
}
|
|
}
|
|
#endif /* CONFIG_WLAN_BEYONDX || defined(CONFIG_SEC_5GMODEL) */
|
|
|
|
static void wl_print_event_data(struct bcm_cfg80211 *cfg,
|
|
uint32 event_type, const wl_event_msg_t *e)
|
|
{
|
|
s32 status = ntoh32(e->status);
|
|
s32 reason = ntoh32(e->reason);
|
|
s32 ifidx = ntoh32(e->ifidx);
|
|
s32 bssidx = ntoh32(e->bsscfgidx);
|
|
|
|
switch (event_type) {
|
|
case WLC_E_ESCAN_RESULT:
|
|
if ((status == WLC_E_STATUS_SUCCESS) ||
|
|
(status == WLC_E_STATUS_ABORT)) {
|
|
WL_INFORM_MEM(("event_type (%d), ifidx: %d"
|
|
" bssidx: %d scan_type:%d\n",
|
|
event_type, ifidx, bssidx, status));
|
|
}
|
|
break;
|
|
case WLC_E_LINK:
|
|
case WLC_E_DISASSOC:
|
|
case WLC_E_DISASSOC_IND:
|
|
case WLC_E_DEAUTH:
|
|
case WLC_E_DEAUTH_IND:
|
|
WL_INFORM_MEM(("event_type (%d), ifidx: %d bssidx: %d"
|
|
" status:%d reason:%d\n",
|
|
event_type, ifidx, bssidx, status, reason));
|
|
break;
|
|
|
|
default:
|
|
/* Print only when DBG verbose is enabled */
|
|
WL_DBG(("event_type (%d), ifidx: %d bssidx: %d status:%d reason: %d\n",
|
|
event_type, ifidx, bssidx, status, reason));
|
|
}
|
|
}
|
|
|
|
static void wl_event_handler(struct work_struct *work_data)
|
|
{
|
|
struct bcm_cfg80211 *cfg = NULL;
|
|
struct wl_event_q *e;
|
|
struct wireless_dev *wdev = NULL;
|
|
|
|
WL_DBG(("Enter \n"));
|
|
BCM_SET_CONTAINER_OF(cfg, work_data, struct bcm_cfg80211, event_work);
|
|
cfg->wl_evt_hdlr_entry_time = OSL_LOCALTIME_NS();
|
|
DHD_EVENT_WAKE_LOCK(cfg->pub);
|
|
while ((e = wl_deq_event(cfg))) {
|
|
s32 status = ntoh32(e->emsg.status);
|
|
u32 event_type = ntoh32(e->emsg.event_type);
|
|
bool scan_cmplt_evt = (event_type == WLC_E_ESCAN_RESULT) &&
|
|
((status == WLC_E_STATUS_SUCCESS) || (status == WLC_E_STATUS_ABORT));
|
|
|
|
cfg->wl_evt_deq_time = OSL_LOCALTIME_NS();
|
|
if (scan_cmplt_evt) {
|
|
cfg->scan_deq_time = OSL_LOCALTIME_NS();
|
|
}
|
|
/* Print only critical events to avoid too many prints */
|
|
wl_print_event_data(cfg, e->etype, &e->emsg);
|
|
|
|
if (e->emsg.ifidx > WL_MAX_IFS) {
|
|
WL_ERR((" Event ifidx not in range. val:%d \n", e->emsg.ifidx));
|
|
goto fail;
|
|
}
|
|
|
|
/* Make sure iface operations, don't creat race conditions */
|
|
mutex_lock(&cfg->if_sync);
|
|
if (!(wdev = wl_get_wdev_by_fw_idx(cfg,
|
|
e->emsg.bsscfgidx, e->emsg.ifidx))) {
|
|
/* For WLC_E_IF would be handled by wl_host_event */
|
|
if (e->etype != WLC_E_IF)
|
|
WL_ERR(("No wdev corresponding to bssidx: 0x%x found!"
|
|
" Ignoring event.\n", e->emsg.bsscfgidx));
|
|
} else if (e->etype < WLC_E_LAST && cfg->evt_handler[e->etype]) {
|
|
dhd_pub_t *dhd = (struct dhd_pub *)(cfg->pub);
|
|
if (dhd->busstate == DHD_BUS_DOWN) {
|
|
WL_ERR((": BUS is DOWN.\n"));
|
|
} else
|
|
{
|
|
WL_DBG(("event_type %d event_sub %d\n",
|
|
ntoh32(e->emsg.event_type),
|
|
ntoh32(e->emsg.reason)));
|
|
cfg->evt_handler[e->etype](cfg, wdev_to_cfgdev(wdev),
|
|
&e->emsg, e->edata);
|
|
if (scan_cmplt_evt) {
|
|
cfg->scan_hdlr_cmplt_time = OSL_LOCALTIME_NS();
|
|
}
|
|
}
|
|
} else {
|
|
WL_DBG(("Unknown Event (%d): ignoring\n", e->etype));
|
|
}
|
|
mutex_unlock(&cfg->if_sync);
|
|
fail:
|
|
wl_put_event(cfg, e);
|
|
if (scan_cmplt_evt) {
|
|
cfg->scan_cmplt_time = OSL_LOCALTIME_NS();
|
|
}
|
|
cfg->wl_evt_hdlr_exit_time = OSL_LOCALTIME_NS();
|
|
}
|
|
DHD_EVENT_WAKE_UNLOCK(cfg->pub);
|
|
}
|
|
|
|
/*
|
|
* Generic API to handle critical events which doesnt need
|
|
* cfg enquening and sleepable API calls.
|
|
*/
|
|
s32
|
|
wl_cfg80211_handle_critical_events(struct bcm_cfg80211 *cfg,
|
|
const wl_event_msg_t * e)
|
|
{
|
|
s32 ret = BCME_ERROR;
|
|
u32 event_type = ntoh32(e->event_type);
|
|
|
|
if (event_type >= WLC_E_LAST) {
|
|
return BCME_ERROR;
|
|
}
|
|
|
|
switch (event_type) {
|
|
case WLC_E_NAN_CRITICAL: {
|
|
#ifdef WL_NAN
|
|
if (ntoh32(e->reason) == WL_NAN_EVENT_STOP) {
|
|
ret =
|
|
wl_cfgvendor_nan_send_async_disable_resp(cfg->static_ndev->ieee80211_ptr);
|
|
}
|
|
#endif /* WL_NAN */
|
|
break;
|
|
}
|
|
default:
|
|
ret = BCME_ERROR;
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
void
|
|
wl_cfg80211_event(struct net_device *ndev, const wl_event_msg_t * e, void *data)
|
|
{
|
|
s32 status = ntoh32(e->status);
|
|
u32 event_type = ntoh32(e->event_type);
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(ndev);
|
|
struct net_info *netinfo;
|
|
|
|
WL_DBG(("event_type (%d): reason (%d): %s\n", event_type, ntoh32(e->reason),
|
|
bcmevent_get_name(event_type)));
|
|
if ((cfg == NULL) || (cfg->p2p_supported && cfg->p2p == NULL)) {
|
|
WL_ERR(("Stale event ignored\n"));
|
|
return;
|
|
}
|
|
|
|
if (cfg->event_workq == NULL) {
|
|
WL_ERR(("Event handler is not created\n"));
|
|
return;
|
|
}
|
|
|
|
if (event_type == WLC_E_IF) {
|
|
/* Don't process WLC_E_IF events in wl_cfg80211 layer */
|
|
return;
|
|
}
|
|
|
|
netinfo = wl_get_netinfo_by_fw_idx(cfg, e->bsscfgidx, e->ifidx);
|
|
if (!netinfo) {
|
|
/* Since the netinfo entry is not there, the netdev entry is not
|
|
* created via cfg80211 interface. so the event is not of interest
|
|
* to the cfg80211 layer.
|
|
*/
|
|
WL_TRACE(("ignore event %d, not interested\n", event_type));
|
|
return;
|
|
}
|
|
|
|
/* Handle wl_cfg80211_critical_events */
|
|
if (wl_cfg80211_handle_critical_events(cfg, e) == BCME_OK) {
|
|
return;
|
|
}
|
|
|
|
if (event_type == WLC_E_PFN_NET_FOUND) {
|
|
WL_DBG((" PNOEVENT: PNO_NET_FOUND\n"));
|
|
}
|
|
else if (event_type == WLC_E_PFN_NET_LOST) {
|
|
WL_DBG((" PNOEVENT: PNO_NET_LOST\n"));
|
|
}
|
|
|
|
if (likely(!wl_enq_event(cfg, ndev, event_type, e, data))) {
|
|
queue_work(cfg->event_workq, &cfg->event_work);
|
|
}
|
|
/* Mark timeout value for thread sched */
|
|
if ((event_type == WLC_E_ESCAN_RESULT) &&
|
|
((status == WLC_E_STATUS_SUCCESS) ||
|
|
(status == WLC_E_STATUS_ABORT))) {
|
|
cfg->scan_enq_time = OSL_LOCALTIME_NS();
|
|
WL_INFORM_MEM(("Enqueing escan completion (%d). WQ state:0x%x \n",
|
|
status, work_busy(&cfg->event_work)));
|
|
}
|
|
}
|
|
|
|
static void wl_init_eq(struct bcm_cfg80211 *cfg)
|
|
{
|
|
wl_init_eq_lock(cfg);
|
|
INIT_LIST_HEAD(&cfg->eq_list);
|
|
}
|
|
|
|
static void wl_flush_eq(struct bcm_cfg80211 *cfg)
|
|
{
|
|
struct wl_event_q *e;
|
|
unsigned long flags;
|
|
|
|
flags = wl_lock_eq(cfg);
|
|
while (!list_empty_careful(&cfg->eq_list)) {
|
|
BCM_SET_LIST_FIRST_ENTRY(e, &cfg->eq_list, struct wl_event_q, eq_list);
|
|
list_del(&e->eq_list);
|
|
MFREE(cfg->osh, e, e->datalen + sizeof(struct wl_event_q));
|
|
}
|
|
wl_unlock_eq(cfg, flags);
|
|
}
|
|
|
|
/*
|
|
* retrieve first queued event from head
|
|
*/
|
|
|
|
static struct wl_event_q *wl_deq_event(struct bcm_cfg80211 *cfg)
|
|
{
|
|
struct wl_event_q *e = NULL;
|
|
unsigned long flags;
|
|
|
|
flags = wl_lock_eq(cfg);
|
|
if (likely(!list_empty(&cfg->eq_list))) {
|
|
BCM_SET_LIST_FIRST_ENTRY(e, &cfg->eq_list, struct wl_event_q, eq_list);
|
|
list_del(&e->eq_list);
|
|
}
|
|
wl_unlock_eq(cfg, flags);
|
|
|
|
return e;
|
|
}
|
|
|
|
/*
|
|
* push event to tail of the queue
|
|
*/
|
|
|
|
static s32
|
|
wl_enq_event(struct bcm_cfg80211 *cfg, struct net_device *ndev, u32 event,
|
|
const wl_event_msg_t *msg, void *data)
|
|
{
|
|
struct wl_event_q *e;
|
|
s32 err = 0;
|
|
uint32 evtq_size;
|
|
uint32 data_len;
|
|
unsigned long flags;
|
|
|
|
data_len = 0;
|
|
if (data)
|
|
data_len = ntoh32(msg->datalen);
|
|
evtq_size = (uint32)(sizeof(struct wl_event_q) + data_len);
|
|
e = (struct wl_event_q *)MALLOCZ(cfg->osh, evtq_size);
|
|
if (unlikely(!e)) {
|
|
WL_ERR(("event alloc failed\n"));
|
|
return -ENOMEM;
|
|
}
|
|
e->etype = event;
|
|
memcpy(&e->emsg, msg, sizeof(wl_event_msg_t));
|
|
if (data)
|
|
memcpy(e->edata, data, data_len);
|
|
e->datalen = data_len;
|
|
flags = wl_lock_eq(cfg);
|
|
list_add_tail(&e->eq_list, &cfg->eq_list);
|
|
wl_unlock_eq(cfg, flags);
|
|
|
|
return err;
|
|
}
|
|
|
|
static void wl_put_event(struct bcm_cfg80211 *cfg, struct wl_event_q *e)
|
|
{
|
|
MFREE(cfg->osh, e, e->datalen + sizeof(struct wl_event_q));
|
|
}
|
|
|
|
static s32 wl_config_infra(struct bcm_cfg80211 *cfg, struct net_device *ndev, u16 iftype)
|
|
{
|
|
s32 infra = 0;
|
|
s32 err = 0;
|
|
bool skip_infra = false;
|
|
|
|
switch (iftype) {
|
|
case WL_IF_TYPE_IBSS:
|
|
case WL_IF_TYPE_AIBSS:
|
|
infra = 0;
|
|
break;
|
|
case WL_IF_TYPE_AP:
|
|
case WL_IF_TYPE_STA:
|
|
case WL_IF_TYPE_P2P_GO:
|
|
case WL_IF_TYPE_P2P_GC:
|
|
/* Intentional fall through */
|
|
infra = 1;
|
|
break;
|
|
#ifdef WLMESH_CFG80211
|
|
case NL80211_IFTYPE_MESH_POINT:
|
|
infra = WL_BSSTYPE_MESH;
|
|
break;
|
|
#endif /* WLMESH_CFG80211 */
|
|
case WL_IF_TYPE_MONITOR:
|
|
case WL_IF_TYPE_NAN:
|
|
/* Intentionall fall through */
|
|
default:
|
|
skip_infra = true;
|
|
WL_ERR(("Skipping infra setting for type:%d\n", iftype));
|
|
break;
|
|
}
|
|
|
|
if (!skip_infra) {
|
|
infra = htod32(infra);
|
|
err = wldev_ioctl_set(ndev, WLC_SET_INFRA, &infra, sizeof(infra));
|
|
if (unlikely(err)) {
|
|
WL_ERR(("WLC_SET_INFRA error (%d)\n", err));
|
|
return err;
|
|
}
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
void wl_cfg80211_add_to_eventbuffer(struct wl_eventmsg_buf *ev, u16 event, bool set)
|
|
{
|
|
if (!ev || (event > WLC_E_LAST))
|
|
return;
|
|
|
|
if (ev->num < MAX_EVENT_BUF_NUM) {
|
|
ev->event[ev->num].type = event;
|
|
ev->event[ev->num].set = set;
|
|
ev->num++;
|
|
} else {
|
|
WL_ERR(("evenbuffer doesn't support > %u events. Update"
|
|
" the define MAX_EVENT_BUF_NUM \n", MAX_EVENT_BUF_NUM));
|
|
ASSERT(0);
|
|
}
|
|
}
|
|
|
|
s32 wl_cfg80211_apply_eventbuffer(
|
|
struct net_device *ndev,
|
|
struct bcm_cfg80211 *cfg,
|
|
wl_eventmsg_buf_t *ev)
|
|
{
|
|
char eventmask[WL_EVENTING_MASK_LEN];
|
|
int i, ret = 0;
|
|
s8 iovbuf[WL_EVENTING_MASK_LEN + 12];
|
|
|
|
if (!ev || (!ev->num))
|
|
return -EINVAL;
|
|
|
|
mutex_lock(&cfg->event_sync);
|
|
|
|
/* Read event_msgs mask */
|
|
ret = wldev_iovar_getbuf(ndev, "event_msgs", NULL, 0, iovbuf, sizeof(iovbuf), NULL);
|
|
if (unlikely(ret)) {
|
|
WL_ERR(("Get event_msgs error (%d)\n", ret));
|
|
goto exit;
|
|
}
|
|
memcpy(eventmask, iovbuf, WL_EVENTING_MASK_LEN);
|
|
|
|
/* apply the set bits */
|
|
for (i = 0; i < ev->num; i++) {
|
|
if (ev->event[i].set)
|
|
setbit(eventmask, ev->event[i].type);
|
|
else
|
|
clrbit(eventmask, ev->event[i].type);
|
|
}
|
|
|
|
/* Write updated Event mask */
|
|
ret = wldev_iovar_setbuf(ndev, "event_msgs", eventmask, sizeof(eventmask), iovbuf,
|
|
sizeof(iovbuf), NULL);
|
|
if (unlikely(ret)) {
|
|
WL_ERR(("Set event_msgs error (%d)\n", ret));
|
|
}
|
|
|
|
exit:
|
|
mutex_unlock(&cfg->event_sync);
|
|
return ret;
|
|
}
|
|
|
|
s32 wl_add_remove_eventmsg(struct net_device *ndev, u16 event, bool add)
|
|
{
|
|
s8 iovbuf[WL_EVENTING_MASK_LEN + 12];
|
|
s8 eventmask[WL_EVENTING_MASK_LEN];
|
|
s32 err = 0;
|
|
struct bcm_cfg80211 *cfg;
|
|
|
|
if (!ndev)
|
|
return -ENODEV;
|
|
|
|
cfg = wl_get_cfg(ndev);
|
|
if (!cfg)
|
|
return -ENODEV;
|
|
|
|
mutex_lock(&cfg->event_sync);
|
|
|
|
/* Setup event_msgs */
|
|
err = wldev_iovar_getbuf(ndev, "event_msgs", NULL, 0, iovbuf, sizeof(iovbuf), NULL);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("Get event_msgs error (%d)\n", err));
|
|
goto eventmsg_out;
|
|
}
|
|
memcpy(eventmask, iovbuf, WL_EVENTING_MASK_LEN);
|
|
if (add) {
|
|
setbit(eventmask, event);
|
|
} else {
|
|
clrbit(eventmask, event);
|
|
}
|
|
err = wldev_iovar_setbuf(ndev, "event_msgs", eventmask, WL_EVENTING_MASK_LEN, iovbuf,
|
|
sizeof(iovbuf), NULL);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("Set event_msgs error (%d)\n", err));
|
|
goto eventmsg_out;
|
|
}
|
|
|
|
eventmsg_out:
|
|
mutex_unlock(&cfg->event_sync);
|
|
return err;
|
|
}
|
|
|
|
static int wl_construct_reginfo(struct bcm_cfg80211 *cfg, s32 bw_cap)
|
|
{
|
|
struct net_device *dev = bcmcfg_to_prmry_ndev(cfg);
|
|
struct ieee80211_channel *band_chan_arr = NULL;
|
|
wl_uint32_list_t *list;
|
|
u32 i, j, index, n_2g, n_5g, band, channel, array_size;
|
|
u32 *n_cnt = NULL;
|
|
chanspec_t c = 0;
|
|
s32 err = BCME_OK;
|
|
bool update;
|
|
bool ht40_allowed;
|
|
u8 *pbuf = NULL;
|
|
bool dfs_radar_disabled = FALSE;
|
|
|
|
#define LOCAL_BUF_LEN 2048
|
|
pbuf = (u8 *)MALLOCZ(cfg->osh, LOCAL_BUF_LEN);
|
|
if (pbuf == NULL) {
|
|
WL_ERR(("failed to allocate local buf\n"));
|
|
return -ENOMEM;
|
|
}
|
|
|
|
err = wldev_iovar_getbuf_bsscfg(dev, "chanspecs", NULL,
|
|
0, pbuf, LOCAL_BUF_LEN, 0, &cfg->ioctl_buf_sync);
|
|
if (err != 0) {
|
|
WL_ERR(("get chanspecs failed with %d\n", err));
|
|
MFREE(cfg->osh, pbuf, LOCAL_BUF_LEN);
|
|
return err;
|
|
}
|
|
|
|
list = (wl_uint32_list_t *)(void *)pbuf;
|
|
band = array_size = n_2g = n_5g = 0;
|
|
for (i = 0; i < dtoh32(list->count); i++) {
|
|
index = 0;
|
|
update = false;
|
|
ht40_allowed = false;
|
|
c = (chanspec_t)dtoh32(list->element[i]);
|
|
c = wl_chspec_driver_to_host(c);
|
|
channel = wf_chspec_ctlchan(c);
|
|
|
|
if (!CHSPEC_IS40(c) && ! CHSPEC_IS20(c)) {
|
|
WL_DBG(("HT80/160/80p80 center channel : %d\n", channel));
|
|
continue;
|
|
}
|
|
if (CHSPEC_IS2G(c) && (channel >= CH_MIN_2G_CHANNEL) &&
|
|
(channel <= CH_MAX_2G_CHANNEL)) {
|
|
band_chan_arr = __wl_2ghz_channels;
|
|
array_size = ARRAYSIZE(__wl_2ghz_channels);
|
|
n_cnt = &n_2g;
|
|
band = IEEE80211_BAND_2GHZ;
|
|
ht40_allowed = (bw_cap == WLC_N_BW_40ALL)? true : false;
|
|
} else if (CHSPEC_IS5G(c) && channel >= CH_MIN_5G_CHANNEL) {
|
|
band_chan_arr = __wl_5ghz_a_channels;
|
|
array_size = ARRAYSIZE(__wl_5ghz_a_channels);
|
|
n_cnt = &n_5g;
|
|
band = IEEE80211_BAND_5GHZ;
|
|
ht40_allowed = (bw_cap == WLC_N_BW_20ALL)? false : true;
|
|
} else {
|
|
WL_ERR(("Invalid channel Sepc. 0x%x.\n", c));
|
|
continue;
|
|
}
|
|
if (!ht40_allowed && CHSPEC_IS40(c))
|
|
continue;
|
|
for (j = 0; (j < *n_cnt && (*n_cnt < array_size)); j++) {
|
|
if (band_chan_arr[j].hw_value == channel) {
|
|
update = true;
|
|
break;
|
|
}
|
|
}
|
|
if (update)
|
|
index = j;
|
|
else
|
|
index = *n_cnt;
|
|
if (!dhd_conf_match_channel(cfg->pub, channel))
|
|
continue;
|
|
if (index < array_size) {
|
|
#if LINUX_VERSION_CODE < KERNEL_VERSION(2, 6, 39) && !defined(WL_COMPAT_WIRELESS)
|
|
band_chan_arr[index].center_freq =
|
|
ieee80211_channel_to_frequency(channel);
|
|
#else
|
|
band_chan_arr[index].center_freq =
|
|
ieee80211_channel_to_frequency(channel, band);
|
|
#endif // endif
|
|
band_chan_arr[index].hw_value = channel;
|
|
band_chan_arr[index].beacon_found = false;
|
|
|
|
if (CHSPEC_IS40(c) && ht40_allowed) {
|
|
/* assuming the order is HT20, HT40 Upper,
|
|
* HT40 lower from chanspecs
|
|
*/
|
|
u32 ht40_flag = band_chan_arr[index].flags & IEEE80211_CHAN_NO_HT40;
|
|
if (CHSPEC_SB_UPPER(c)) {
|
|
if (ht40_flag == IEEE80211_CHAN_NO_HT40)
|
|
band_chan_arr[index].flags &=
|
|
~IEEE80211_CHAN_NO_HT40;
|
|
band_chan_arr[index].flags |= IEEE80211_CHAN_NO_HT40PLUS;
|
|
} else {
|
|
/* It should be one of
|
|
* IEEE80211_CHAN_NO_HT40 or IEEE80211_CHAN_NO_HT40PLUS
|
|
*/
|
|
band_chan_arr[index].flags &= ~IEEE80211_CHAN_NO_HT40;
|
|
if (ht40_flag == IEEE80211_CHAN_NO_HT40)
|
|
band_chan_arr[index].flags |=
|
|
IEEE80211_CHAN_NO_HT40MINUS;
|
|
}
|
|
} else {
|
|
band_chan_arr[index].flags = IEEE80211_CHAN_NO_HT40;
|
|
if (!dfs_radar_disabled) {
|
|
if (band == IEEE80211_BAND_2GHZ)
|
|
channel |= WL_CHANSPEC_BAND_2G;
|
|
else
|
|
channel |= WL_CHANSPEC_BAND_5G;
|
|
channel |= WL_CHANSPEC_BW_20;
|
|
channel = wl_chspec_host_to_driver(channel);
|
|
err = wldev_iovar_getint(dev, "per_chan_info", &channel);
|
|
if (!err) {
|
|
if (channel & WL_CHAN_RADAR) {
|
|
#if (LINUX_VERSION_CODE < KERNEL_VERSION(3, 14, 0))
|
|
band_chan_arr[index].flags |=
|
|
(IEEE80211_CHAN_RADAR
|
|
| IEEE80211_CHAN_NO_IBSS);
|
|
#else
|
|
band_chan_arr[index].flags |=
|
|
IEEE80211_CHAN_RADAR;
|
|
#endif // endif
|
|
}
|
|
|
|
if (channel & WL_CHAN_PASSIVE)
|
|
#if (LINUX_VERSION_CODE < KERNEL_VERSION(3, 14, 0))
|
|
band_chan_arr[index].flags |=
|
|
IEEE80211_CHAN_PASSIVE_SCAN;
|
|
#else
|
|
band_chan_arr[index].flags |=
|
|
IEEE80211_CHAN_NO_IR;
|
|
#endif // endif
|
|
} else if (err == BCME_UNSUPPORTED) {
|
|
dfs_radar_disabled = TRUE;
|
|
WL_ERR(("does not support per_chan_info\n"));
|
|
}
|
|
}
|
|
}
|
|
if (!update)
|
|
(*n_cnt)++;
|
|
}
|
|
|
|
}
|
|
__wl_band_2ghz.n_channels = n_2g;
|
|
__wl_band_5ghz_a.n_channels = n_5g;
|
|
MFREE(cfg->osh, pbuf, LOCAL_BUF_LEN);
|
|
#undef LOCAL_BUF_LEN
|
|
|
|
return err;
|
|
}
|
|
|
|
static s32 __wl_update_wiphybands(struct bcm_cfg80211 *cfg, bool notify)
|
|
{
|
|
struct wiphy *wiphy;
|
|
struct net_device *dev = bcmcfg_to_prmry_ndev(cfg);
|
|
u32 bandlist[3];
|
|
u32 nband = 0;
|
|
u32 i = 0;
|
|
s32 err = 0;
|
|
s32 index = 0;
|
|
s32 nmode = 0;
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 6, 0))
|
|
u32 j = 0;
|
|
s32 vhtmode = 0;
|
|
s32 txstreams = 0;
|
|
s32 rxstreams = 0;
|
|
s32 ldpc_cap = 0;
|
|
s32 stbc_rx = 0;
|
|
s32 stbc_tx = 0;
|
|
s32 txbf_bfe_cap = 0;
|
|
s32 txbf_bfr_cap = 0;
|
|
#endif // endif
|
|
s32 bw_cap = 0;
|
|
s32 cur_band = -1;
|
|
struct ieee80211_supported_band *bands[IEEE80211_NUM_BANDS] = {NULL, };
|
|
|
|
bzero(bandlist, sizeof(bandlist));
|
|
err = wldev_ioctl_get(dev, WLC_GET_BANDLIST, bandlist,
|
|
sizeof(bandlist));
|
|
if (unlikely(err)) {
|
|
WL_ERR(("error read bandlist (%d)\n", err));
|
|
return err;
|
|
}
|
|
err = wldev_ioctl_get(dev, WLC_GET_BAND, &cur_band,
|
|
sizeof(s32));
|
|
if (unlikely(err)) {
|
|
WL_ERR(("error (%d)\n", err));
|
|
return err;
|
|
}
|
|
|
|
err = wldev_iovar_getint(dev, "nmode", &nmode);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("error reading nmode (%d)\n", err));
|
|
}
|
|
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 6, 0))
|
|
err = wldev_iovar_getint(dev, "vhtmode", &vhtmode);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("error reading vhtmode (%d)\n", err));
|
|
}
|
|
|
|
if (vhtmode) {
|
|
err = wldev_iovar_getint(dev, "txstreams", &txstreams);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("error reading txstreams (%d)\n", err));
|
|
}
|
|
|
|
err = wldev_iovar_getint(dev, "rxstreams", &rxstreams);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("error reading rxstreams (%d)\n", err));
|
|
}
|
|
|
|
err = wldev_iovar_getint(dev, "ldpc_cap", &ldpc_cap);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("error reading ldpc_cap (%d)\n", err));
|
|
}
|
|
|
|
err = wldev_iovar_getint(dev, "stbc_rx", &stbc_rx);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("error reading stbc_rx (%d)\n", err));
|
|
}
|
|
|
|
err = wldev_iovar_getint(dev, "stbc_tx", &stbc_tx);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("error reading stbc_tx (%d)\n", err));
|
|
}
|
|
|
|
err = wldev_iovar_getint(dev, "txbf_bfe_cap", &txbf_bfe_cap);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("error reading txbf_bfe_cap (%d)\n", err));
|
|
}
|
|
|
|
err = wldev_iovar_getint(dev, "txbf_bfr_cap", &txbf_bfr_cap);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("error reading txbf_bfr_cap (%d)\n", err));
|
|
}
|
|
}
|
|
#endif // endif
|
|
|
|
/* For nmode and vhtmode check bw cap */
|
|
if (nmode ||
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 6, 0))
|
|
vhtmode ||
|
|
#endif // endif
|
|
0) {
|
|
err = wldev_iovar_getint(dev, "mimo_bw_cap", &bw_cap);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("error get mimo_bw_cap (%d)\n", err));
|
|
}
|
|
}
|
|
|
|
err = wl_construct_reginfo(cfg, bw_cap);
|
|
if (err) {
|
|
WL_ERR(("wl_construct_reginfo() fails err=%d\n", err));
|
|
if (err != BCME_UNSUPPORTED)
|
|
return err;
|
|
}
|
|
|
|
wiphy = bcmcfg_to_wiphy(cfg);
|
|
nband = bandlist[0];
|
|
|
|
for (i = 1; i <= nband && i < ARRAYSIZE(bandlist); i++) {
|
|
index = -1;
|
|
if (bandlist[i] == WLC_BAND_5G && __wl_band_5ghz_a.n_channels > 0) {
|
|
bands[IEEE80211_BAND_5GHZ] =
|
|
&__wl_band_5ghz_a;
|
|
index = IEEE80211_BAND_5GHZ;
|
|
if (nmode && (bw_cap == WLC_N_BW_40ALL || bw_cap == WLC_N_BW_20IN2G_40IN5G))
|
|
bands[index]->ht_cap.cap |= IEEE80211_HT_CAP_SGI_40;
|
|
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 6, 0))
|
|
/* VHT capabilities. */
|
|
if (vhtmode) {
|
|
/* Supported */
|
|
bands[index]->vht_cap.vht_supported = TRUE;
|
|
|
|
for (j = 1; j <= VHT_CAP_MCS_MAP_NSS_MAX; j++) {
|
|
/* TX stream rates. */
|
|
if (j <= txstreams) {
|
|
VHT_MCS_MAP_SET_MCS_PER_SS(j, VHT_CAP_MCS_MAP_0_9,
|
|
bands[index]->vht_cap.vht_mcs.tx_mcs_map);
|
|
} else {
|
|
VHT_MCS_MAP_SET_MCS_PER_SS(j, VHT_CAP_MCS_MAP_NONE,
|
|
bands[index]->vht_cap.vht_mcs.tx_mcs_map);
|
|
}
|
|
|
|
/* RX stream rates. */
|
|
if (j <= rxstreams) {
|
|
VHT_MCS_MAP_SET_MCS_PER_SS(j, VHT_CAP_MCS_MAP_0_9,
|
|
bands[index]->vht_cap.vht_mcs.rx_mcs_map);
|
|
} else {
|
|
VHT_MCS_MAP_SET_MCS_PER_SS(j, VHT_CAP_MCS_MAP_NONE,
|
|
bands[index]->vht_cap.vht_mcs.rx_mcs_map);
|
|
}
|
|
}
|
|
|
|
/* Capabilities */
|
|
/* 80 MHz is mandatory */
|
|
bands[index]->vht_cap.cap |=
|
|
IEEE80211_VHT_CAP_SHORT_GI_80;
|
|
|
|
if (WL_BW_CAP_160MHZ(bw_cap)) {
|
|
bands[index]->vht_cap.cap |=
|
|
IEEE80211_VHT_CAP_SUPP_CHAN_WIDTH_160MHZ;
|
|
bands[index]->vht_cap.cap |=
|
|
IEEE80211_VHT_CAP_SHORT_GI_160;
|
|
}
|
|
|
|
bands[index]->vht_cap.cap |=
|
|
IEEE80211_VHT_CAP_MAX_MPDU_LENGTH_11454;
|
|
|
|
if (ldpc_cap)
|
|
bands[index]->vht_cap.cap |=
|
|
IEEE80211_VHT_CAP_RXLDPC;
|
|
|
|
if (stbc_tx)
|
|
bands[index]->vht_cap.cap |=
|
|
IEEE80211_VHT_CAP_TXSTBC;
|
|
|
|
if (stbc_rx)
|
|
bands[index]->vht_cap.cap |=
|
|
(stbc_rx << VHT_CAP_INFO_RX_STBC_SHIFT);
|
|
|
|
if (txbf_bfe_cap)
|
|
bands[index]->vht_cap.cap |=
|
|
IEEE80211_VHT_CAP_SU_BEAMFORMEE_CAPABLE;
|
|
|
|
if (txbf_bfr_cap) {
|
|
bands[index]->vht_cap.cap |=
|
|
IEEE80211_VHT_CAP_SU_BEAMFORMER_CAPABLE;
|
|
}
|
|
|
|
if (txbf_bfe_cap || txbf_bfr_cap) {
|
|
bands[index]->vht_cap.cap |=
|
|
(2 << VHT_CAP_INFO_NUM_BMFMR_ANT_SHIFT);
|
|
bands[index]->vht_cap.cap |=
|
|
((txstreams - 1) <<
|
|
VHT_CAP_INFO_NUM_SOUNDING_DIM_SHIFT);
|
|
bands[index]->vht_cap.cap |=
|
|
IEEE80211_VHT_CAP_VHT_LINK_ADAPTATION_VHT_MRQ_MFB;
|
|
}
|
|
|
|
/* AMPDU length limit, support max 1MB (2 ^ (13 + 7)) */
|
|
bands[index]->vht_cap.cap |=
|
|
(7 << VHT_CAP_INFO_AMPDU_MAXLEN_EXP_SHIFT);
|
|
WL_DBG(("__wl_update_wiphybands band[%d] vht_enab=%d vht_cap=%08x "
|
|
"vht_rx_mcs_map=%04x vht_tx_mcs_map=%04x\n",
|
|
index,
|
|
bands[index]->vht_cap.vht_supported,
|
|
bands[index]->vht_cap.cap,
|
|
bands[index]->vht_cap.vht_mcs.rx_mcs_map,
|
|
bands[index]->vht_cap.vht_mcs.tx_mcs_map));
|
|
}
|
|
#endif // endif
|
|
}
|
|
else if (bandlist[i] == WLC_BAND_2G && __wl_band_2ghz.n_channels > 0) {
|
|
bands[IEEE80211_BAND_2GHZ] =
|
|
&__wl_band_2ghz;
|
|
index = IEEE80211_BAND_2GHZ;
|
|
if (bw_cap == WLC_N_BW_40ALL)
|
|
bands[index]->ht_cap.cap |= IEEE80211_HT_CAP_SGI_40;
|
|
}
|
|
|
|
if ((index >= 0) && nmode) {
|
|
bands[index]->ht_cap.cap |=
|
|
(IEEE80211_HT_CAP_SGI_20 | IEEE80211_HT_CAP_DSSSCCK40);
|
|
bands[index]->ht_cap.ht_supported = TRUE;
|
|
bands[index]->ht_cap.ampdu_factor = IEEE80211_HT_MAX_AMPDU_64K;
|
|
bands[index]->ht_cap.ampdu_density = IEEE80211_HT_MPDU_DENSITY_16;
|
|
/* An HT shall support all EQM rates for one spatial stream */
|
|
bands[index]->ht_cap.mcs.rx_mask[0] = 0xff;
|
|
}
|
|
|
|
}
|
|
|
|
wiphy->bands[IEEE80211_BAND_2GHZ] = bands[IEEE80211_BAND_2GHZ];
|
|
wiphy->bands[IEEE80211_BAND_5GHZ] = bands[IEEE80211_BAND_5GHZ];
|
|
|
|
/* check if any bands populated otherwise makes 2Ghz as default */
|
|
if (wiphy->bands[IEEE80211_BAND_2GHZ] == NULL &&
|
|
wiphy->bands[IEEE80211_BAND_5GHZ] == NULL) {
|
|
/* Setup 2Ghz band as default */
|
|
wiphy->bands[IEEE80211_BAND_2GHZ] = &__wl_band_2ghz;
|
|
}
|
|
|
|
if (notify)
|
|
wiphy_apply_custom_regulatory(wiphy, &brcm_regdom);
|
|
|
|
return 0;
|
|
}
|
|
|
|
s32 wl_update_wiphybands(struct bcm_cfg80211 *cfg, bool notify)
|
|
{
|
|
s32 err;
|
|
|
|
mutex_lock(&cfg->usr_sync);
|
|
err = __wl_update_wiphybands(cfg, notify);
|
|
mutex_unlock(&cfg->usr_sync);
|
|
|
|
return err;
|
|
}
|
|
|
|
static s32 __wl_cfg80211_up(struct bcm_cfg80211 *cfg)
|
|
{
|
|
s32 err = 0;
|
|
#ifdef WL_HOST_BAND_MGMT
|
|
s32 ret = 0;
|
|
#endif /* WL_HOST_BAND_MGMT */
|
|
struct net_device *ndev = bcmcfg_to_prmry_ndev(cfg);
|
|
struct wireless_dev *wdev = ndev->ieee80211_ptr;
|
|
#if defined(WL_NANP2P)
|
|
dhd_pub_t *dhd = (dhd_pub_t *)(cfg->pub);
|
|
#endif // endif
|
|
#ifdef WLTDLS
|
|
u32 tdls;
|
|
#endif /* WLTDLS */
|
|
u16 wl_iftype = 0;
|
|
u16 wl_mode = 0;
|
|
u8 ioctl_buf[WLC_IOCTL_SMLEN];
|
|
|
|
WL_DBG(("In\n"));
|
|
|
|
if (!dhd_download_fw_on_driverload) {
|
|
err = wl_create_event_handler(cfg);
|
|
if (err) {
|
|
WL_ERR(("wl_create_event_handler failed\n"));
|
|
return err;
|
|
}
|
|
wl_init_event_handler(cfg);
|
|
}
|
|
/* Reserve 0x8000 toggle bit for P2P GO/GC */
|
|
cfg->vif_macaddr_mask = 0x8000;
|
|
|
|
err = dhd_config_dongle(cfg);
|
|
if (unlikely(err))
|
|
return err;
|
|
|
|
#if 0
|
|
/* terence 20180108: this patch will cause to kernel panic with below
|
|
* steps in Android 4.4 with kernel 3.4
|
|
* insmod bcmdhd.ko; hostapd /data/misc/wifi/hostapd.conf
|
|
*/
|
|
/* Always bring up interface in STA mode.
|
|
* Did observe , if previous SofAP Bringup/cleanup
|
|
* is not done properly, iftype is stuck with AP mode.
|
|
* So during next wlan0 up, forcing the type to STA
|
|
*/
|
|
netinfo = wl_get_netinfo_by_wdev(cfg, wdev);
|
|
if (!netinfo) {
|
|
WL_ERR(("there is no netinfo\n"));
|
|
return -ENODEV;
|
|
}
|
|
ndev->ieee80211_ptr->iftype = NL80211_IFTYPE_STATION;
|
|
netinfo->iftype = WL_IF_TYPE_STA;
|
|
#endif
|
|
|
|
if (cfg80211_to_wl_iftype(wdev->iftype, &wl_iftype, &wl_mode) < 0) {
|
|
return -EINVAL;
|
|
}
|
|
err = wl_config_infra(cfg, ndev, wl_iftype);
|
|
if (unlikely(err && err != -EINPROGRESS)) {
|
|
WL_ERR(("wl_config_infra failed\n"));
|
|
if (err == -1) {
|
|
WL_ERR(("return error %d\n", err));
|
|
return err;
|
|
}
|
|
}
|
|
|
|
err = wl_init_scan(cfg);
|
|
if (err) {
|
|
WL_ERR(("wl_init_scan failed\n"));
|
|
return err;
|
|
}
|
|
err = __wl_update_wiphybands(cfg, true);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("wl_update_wiphybands failed\n"));
|
|
if (err == -1) {
|
|
WL_ERR(("return error %d\n", err));
|
|
return err;
|
|
}
|
|
}
|
|
|
|
err = wldev_iovar_getbuf(ndev, "wlc_ver", NULL, 0,
|
|
&cfg->wlc_ver, sizeof(wl_wlc_version_t), NULL);
|
|
if (likely(!err)) {
|
|
WL_INFORM(("wl version. Major: %d\n",
|
|
cfg->wlc_ver.wlc_ver_major));
|
|
if ((cfg->wlc_ver.wlc_ver_major >= MIN_ESCAN_PARAM_V2_FW_MAJOR) &&
|
|
(wldev_iovar_getbuf(ndev, "scan_ver", NULL, 0,
|
|
ioctl_buf, sizeof(ioctl_buf), NULL) == BCME_OK)) {
|
|
WL_INFORM_MEM(("scan_params v2\n"));
|
|
/* use scan_params ver2 */
|
|
cfg->scan_params_v2 = true;
|
|
}
|
|
} else {
|
|
if (err == BCME_UNSUPPORTED) {
|
|
/* Ignore on unsupported chips */
|
|
err = BCME_OK;
|
|
} else {
|
|
WL_ERR(("wlc_ver query failed. err: %d\n", err));
|
|
return err;
|
|
}
|
|
}
|
|
#ifdef DHD_LOSSLESS_ROAMING
|
|
if (timer_pending(&cfg->roam_timeout)) {
|
|
del_timer_sync(&cfg->roam_timeout);
|
|
}
|
|
#endif /* DHD_LOSSLESS_ROAMING */
|
|
|
|
err = dhd_monitor_init(cfg->pub);
|
|
|
|
#ifdef WL_HOST_BAND_MGMT
|
|
/* By default the curr_band is initialized to BAND_AUTO */
|
|
if ((ret = wl_cfg80211_set_band(ndev, WLC_BAND_AUTO)) < 0) {
|
|
if (ret == BCME_UNSUPPORTED) {
|
|
/* Don't fail the initialization, lets just
|
|
* fall back to the original method
|
|
*/
|
|
WL_ERR(("WL_HOST_BAND_MGMT defined, "
|
|
"but roam_band iovar not supported \n"));
|
|
} else {
|
|
WL_ERR(("roam_band failed. ret=%d", ret));
|
|
err = -1;
|
|
}
|
|
}
|
|
#endif /* WL_HOST_BAND_MGMT */
|
|
#ifdef WLTDLS
|
|
if (wldev_iovar_getint(ndev, "tdls_enable", &tdls) == 0) {
|
|
WL_DBG(("TDLS supported in fw\n"));
|
|
cfg->tdls_supported = true;
|
|
}
|
|
#endif /* WLTDLS */
|
|
#ifdef WL_IFACE_MGMT
|
|
#ifdef CUSTOM_IF_MGMT_POLICY
|
|
cfg->iface_data.policy = CUSTOM_IF_MGMT_POLICY;
|
|
#else
|
|
cfg->iface_data.policy = WL_IF_POLICY_DEFAULT;
|
|
#endif /* CUSTOM_IF_MGMT_POLICY */
|
|
#endif /* WL_IFACE_MGMT */
|
|
#ifdef WL_NAN
|
|
#ifdef WL_NANP2P
|
|
if (FW_SUPPORTED(dhd, nanp2p)) {
|
|
/* Enable NANP2P concurrent support */
|
|
cfg->conc_disc = WL_NANP2P_CONC_SUPPORT;
|
|
WL_INFORM_MEM(("nan + p2p conc discovery is supported\n"));
|
|
cfg->nan_p2p_supported = true;
|
|
}
|
|
#endif /* WL_NANP2P */
|
|
#endif /* WL_NAN */
|
|
|
|
INIT_DELAYED_WORK(&cfg->pm_enable_work, wl_cfg80211_work_handler);
|
|
wl_set_drv_status(cfg, READY, ndev);
|
|
return err;
|
|
}
|
|
|
|
static s32 __wl_cfg80211_down(struct bcm_cfg80211 *cfg)
|
|
{
|
|
s32 err = 0;
|
|
struct net_info *iter, *next;
|
|
struct net_device *ndev = bcmcfg_to_prmry_ndev(cfg);
|
|
#if defined(WL_CFG80211) && (defined(WL_ENABLE_P2P_IF) || \
|
|
defined(WL_NEW_CFG_PRIVCMD_SUPPORT)) && !defined(PLATFORM_SLP)
|
|
struct net_device *p2p_net = cfg->p2p_net;
|
|
#endif
|
|
|
|
dhd_pub_t *dhd = (dhd_pub_t *)(cfg->pub);
|
|
WL_INFORM_MEM(("cfg80211 down\n"));
|
|
|
|
/* Check if cfg80211 interface is already down */
|
|
if (!wl_get_drv_status(cfg, READY, ndev)) {
|
|
WL_DBG(("cfg80211 interface is already down\n"));
|
|
return err; /* it is even not ready */
|
|
}
|
|
|
|
#ifdef SHOW_LOGTRACE
|
|
/* Stop the event logging */
|
|
wl_add_remove_eventmsg(ndev, WLC_E_TRACE, FALSE);
|
|
#endif /* SHOW_LOGTRACE */
|
|
|
|
/* clear vendor OUI list */
|
|
wl_vndr_ies_clear_vendor_oui_list(cfg);
|
|
|
|
/* Delete pm_enable_work */
|
|
wl_add_remove_pm_enable_work(cfg, WL_PM_WORKQ_DEL);
|
|
|
|
if (cfg->p2p_supported) {
|
|
wl_clr_p2p_status(cfg, GO_NEG_PHASE);
|
|
#ifdef PROP_TXSTATUS_VSDB
|
|
#if defined(BCMSDIO) || defined(BCMDBUS)
|
|
if (wl_cfgp2p_vif_created(cfg)) {
|
|
bool enabled = false;
|
|
dhd_wlfc_get_enable(dhd, &enabled);
|
|
if (enabled && cfg->wlfc_on && dhd->op_mode != DHD_FLAG_HOSTAP_MODE &&
|
|
dhd->op_mode != DHD_FLAG_IBSS_MODE) {
|
|
dhd_wlfc_deinit(dhd);
|
|
cfg->wlfc_on = false;
|
|
}
|
|
}
|
|
#endif /* BCMSDIO || BCMDBUS */
|
|
#endif /* PROP_TXSTATUS_VSDB */
|
|
}
|
|
|
|
#ifdef WL_NAN
|
|
mutex_lock(&cfg->if_sync);
|
|
/* Cancel pending nan disable work if any */
|
|
if (delayed_work_pending(&cfg->nan_disable)) {
|
|
WL_DBG(("Unarm the nan_disable work\n"));
|
|
cancel_delayed_work_sync(&cfg->nan_disable);
|
|
}
|
|
cfg->nancfg.disable_reason = NAN_BUS_IS_DOWN;
|
|
wl_cfgnan_disable(cfg);
|
|
mutex_unlock(&cfg->if_sync);
|
|
#endif /* WL_NAN */
|
|
|
|
if (!dhd_download_fw_on_driverload) {
|
|
/* For built-in drivers/other drivers that do reset on
|
|
* "ifconfig <primary_iface> down", cleanup any left
|
|
* over interfaces
|
|
*/
|
|
wl_cfg80211_cleanup_virtual_ifaces(cfg, false);
|
|
}
|
|
/* Clear used mac addr mask */
|
|
cfg->vif_macaddr_mask = 0;
|
|
|
|
if (dhd->up)
|
|
{
|
|
/* If primary BSS is operational (for e.g SoftAP), bring it down */
|
|
if (wl_cfg80211_bss_isup(ndev, 0)) {
|
|
if (wl_cfg80211_bss_up(cfg, ndev, 0, 0) < 0)
|
|
WL_ERR(("BSS down failed \n"));
|
|
}
|
|
|
|
/* clear all the security setting on primary Interface */
|
|
wl_cfg80211_clear_security(cfg);
|
|
}
|
|
|
|
GCC_DIAGNOSTIC_PUSH_SUPPRESS_CAST();
|
|
for_each_ndev(cfg, iter, next) {
|
|
GCC_DIAGNOSTIC_POP();
|
|
if (iter->ndev) /* p2p discovery iface is null */
|
|
wl_set_drv_status(cfg, SCAN_ABORTING, iter->ndev);
|
|
}
|
|
|
|
#ifdef P2P_LISTEN_OFFLOADING
|
|
wl_cfg80211_p2plo_deinit(cfg);
|
|
#endif /* P2P_LISTEN_OFFLOADING */
|
|
|
|
/* cancel and notify scan complete, if scan request is pending */
|
|
wl_cfg80211_cancel_scan(cfg);
|
|
GCC_DIAGNOSTIC_PUSH_SUPPRESS_CAST();
|
|
for_each_ndev(cfg, iter, next) {
|
|
GCC_DIAGNOSTIC_POP();
|
|
/* p2p discovery iface ndev ptr could be null */
|
|
if (iter->ndev == NULL)
|
|
continue;
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 14, 0))
|
|
WL_INFORM_MEM(("wl_cfg80211_down. connection state bit status: [%u:%u:%u:%u]\n",
|
|
wl_get_drv_status(cfg, CONNECTING, ndev),
|
|
wl_get_drv_status(cfg, CONNECTED, ndev),
|
|
wl_get_drv_status(cfg, DISCONNECTING, ndev),
|
|
wl_get_drv_status(cfg, NESTED_CONNECT, ndev)));
|
|
|
|
if (wl_get_drv_status(cfg, CONNECTED, iter->ndev)) {
|
|
CFG80211_DISCONNECTED(iter->ndev, 0, NULL, 0, false, GFP_KERNEL);
|
|
}
|
|
|
|
if ((iter->ndev->ieee80211_ptr->iftype == NL80211_IFTYPE_STATION) &&
|
|
wl_get_drv_status(cfg, CONNECTING, iter->ndev)) {
|
|
|
|
u8 *latest_bssid = wl_read_prof(cfg, ndev, WL_PROF_LATEST_BSSID);
|
|
struct wiphy *wiphy = bcmcfg_to_wiphy(cfg);
|
|
struct wireless_dev *wdev = ndev->ieee80211_ptr;
|
|
struct cfg80211_bss *bss = CFG80211_GET_BSS(wiphy, NULL, latest_bssid,
|
|
wdev->ssid, wdev->ssid_len);
|
|
|
|
BCM_REFERENCE(bss);
|
|
|
|
CFG80211_CONNECT_RESULT(ndev,
|
|
latest_bssid, bss, NULL, 0, NULL, 0,
|
|
WLAN_STATUS_UNSPECIFIED_FAILURE,
|
|
GFP_KERNEL);
|
|
}
|
|
#endif /* (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 14, 0)) */
|
|
wl_clr_drv_status(cfg, READY, iter->ndev);
|
|
wl_clr_drv_status(cfg, SCANNING, iter->ndev);
|
|
wl_clr_drv_status(cfg, SCAN_ABORTING, iter->ndev);
|
|
wl_clr_drv_status(cfg, CONNECTING, iter->ndev);
|
|
wl_clr_drv_status(cfg, CONNECTED, iter->ndev);
|
|
wl_clr_drv_status(cfg, DISCONNECTING, iter->ndev);
|
|
wl_clr_drv_status(cfg, AP_CREATED, iter->ndev);
|
|
wl_clr_drv_status(cfg, AP_CREATING, iter->ndev);
|
|
wl_clr_drv_status(cfg, NESTED_CONNECT, iter->ndev);
|
|
wl_clr_drv_status(cfg, CFG80211_CONNECT, iter->ndev);
|
|
}
|
|
bcmcfg_to_prmry_ndev(cfg)->ieee80211_ptr->iftype =
|
|
NL80211_IFTYPE_STATION;
|
|
#if defined(WL_CFG80211) && (defined(WL_ENABLE_P2P_IF) || \
|
|
defined(WL_NEW_CFG_PRIVCMD_SUPPORT)) && !defined(PLATFORM_SLP)
|
|
if (p2p_net)
|
|
dev_close(p2p_net);
|
|
#endif
|
|
|
|
/* Avoid deadlock from wl_cfg80211_down */
|
|
if (!dhd_download_fw_on_driverload) {
|
|
mutex_unlock(&cfg->usr_sync);
|
|
wl_destroy_event_handler(cfg);
|
|
mutex_lock(&cfg->usr_sync);
|
|
}
|
|
|
|
wl_flush_eq(cfg);
|
|
wl_link_down(cfg);
|
|
if (cfg->p2p_supported) {
|
|
if (timer_pending(&cfg->p2p->listen_timer))
|
|
del_timer_sync(&cfg->p2p->listen_timer);
|
|
wl_cfgp2p_down(cfg);
|
|
}
|
|
|
|
if (timer_pending(&cfg->scan_timeout)) {
|
|
del_timer_sync(&cfg->scan_timeout);
|
|
}
|
|
|
|
wl_cfg80211_clear_mgmt_vndr_ies(cfg);
|
|
DHD_OS_SCAN_WAKE_UNLOCK((dhd_pub_t *)(cfg->pub));
|
|
|
|
dhd_monitor_uninit();
|
|
#ifdef WLAIBSS_MCHAN
|
|
bcm_cfg80211_del_ibss_if(cfg->wdev->wiphy, cfg->ibss_cfgdev);
|
|
#endif /* WLAIBSS_MCHAN */
|
|
|
|
#ifdef WL11U
|
|
/* Clear interworking element. */
|
|
if (cfg->wl11u) {
|
|
cfg->wl11u = FALSE;
|
|
}
|
|
#endif /* WL11U */
|
|
|
|
cfg->disable_roam_event = false;
|
|
|
|
DNGL_FUNC(dhd_cfg80211_down, (cfg));
|
|
|
|
#ifdef DHD_IFDEBUG
|
|
/* Printout all netinfo entries */
|
|
wl_probe_wdev_all(cfg);
|
|
#endif /* DHD_IFDEBUG */
|
|
|
|
return err;
|
|
}
|
|
|
|
s32 wl_cfg80211_up(struct net_device *net)
|
|
{
|
|
struct bcm_cfg80211 *cfg;
|
|
s32 err = 0;
|
|
int val = 1;
|
|
dhd_pub_t *dhd;
|
|
#ifdef DISABLE_PM_BCNRX
|
|
s32 interr = 0;
|
|
uint param = 0;
|
|
s8 iovbuf[WLC_IOCTL_SMLEN];
|
|
#endif /* DISABLE_PM_BCNRX */
|
|
|
|
WL_DBG(("In\n"));
|
|
cfg = wl_get_cfg(net);
|
|
|
|
if ((err = wldev_ioctl_get(bcmcfg_to_prmry_ndev(cfg), WLC_GET_VERSION, &val,
|
|
sizeof(int)) < 0)) {
|
|
WL_ERR(("WLC_GET_VERSION failed, err=%d\n", err));
|
|
return err;
|
|
}
|
|
val = dtoh32(val);
|
|
if (val != WLC_IOCTL_VERSION && val != 1) {
|
|
WL_ERR(("Version mismatch, please upgrade. Got %d, expected %d or 1\n",
|
|
val, WLC_IOCTL_VERSION));
|
|
return BCME_VERSION;
|
|
}
|
|
ioctl_version = val;
|
|
WL_TRACE(("WLC_GET_VERSION=%d\n", ioctl_version));
|
|
wl_cfg80211_check_in4way(cfg, net, NO_SCAN_IN4WAY|NO_BTC_IN4WAY|WAIT_DISCONNECTED,
|
|
WL_EXT_STATUS_DISCONNECTED, NULL);
|
|
|
|
mutex_lock(&cfg->usr_sync);
|
|
dhd = (dhd_pub_t *)(cfg->pub);
|
|
if (!(dhd->op_mode & DHD_FLAG_HOSTAP_MODE)) {
|
|
err = wl_cfg80211_attach_post(bcmcfg_to_prmry_ndev(cfg));
|
|
if (unlikely(err)) {
|
|
mutex_unlock(&cfg->usr_sync);
|
|
return err;
|
|
}
|
|
}
|
|
#ifdef WLMESH_CFG80211
|
|
cfg->wdev->wiphy->features |= NL80211_FEATURE_USERSPACE_MPM;
|
|
#endif /* WLMESH_CFG80211 */
|
|
#if defined(BCMSUP_4WAY_HANDSHAKE)
|
|
if (dhd->fw_4way_handshake) {
|
|
/* This is a hacky method to indicate fw 4WHS support and
|
|
* is used only for kernels (kernels < 3.14). For newer
|
|
* kernels, we would be using vendor extn. path to advertise
|
|
* FW based 4-way handshake feature support.
|
|
*/
|
|
cfg->wdev->wiphy->features |= NL80211_FEATURE_FW_4WAY_HANDSHAKE;
|
|
}
|
|
#endif /* BCMSUP_4WAY_HANDSHAKE */
|
|
err = __wl_cfg80211_up(cfg);
|
|
if (unlikely(err))
|
|
WL_ERR(("__wl_cfg80211_up failed\n"));
|
|
|
|
#ifdef ROAM_CHANNEL_CACHE
|
|
if (init_roam_cache(cfg, ioctl_version) == 0) {
|
|
/* Enable support for Roam cache */
|
|
cfg->rcc_enabled = true;
|
|
WL_ERR(("Roam channel cache enabled\n"));
|
|
} else {
|
|
WL_ERR(("Failed to enable RCC.\n"));
|
|
}
|
|
#endif /* ROAM_CHANNEL_CACHE */
|
|
|
|
/* IOVAR configurations with 'up' condition */
|
|
#ifdef DISABLE_PM_BCNRX
|
|
interr = wldev_iovar_setbuf(net, "pm_bcnrx", (char *)¶m, sizeof(param), iovbuf,
|
|
sizeof(iovbuf), &cfg->ioctl_buf_sync);
|
|
|
|
if (unlikely(interr)) {
|
|
WL_ERR(("Set pm_bcnrx returned (%d)\n", interr));
|
|
}
|
|
#endif /* DISABLE_PM_BCNRX */
|
|
#ifdef WL_CHAN_UTIL
|
|
interr = wl_cfg80211_start_bssload_report(net);
|
|
if (unlikely(interr)) {
|
|
WL_ERR(("%s: Failed to start bssload_report eventing, err=%d\n",
|
|
__FUNCTION__, interr));
|
|
}
|
|
#endif /* WL_CHAN_UTIL */
|
|
|
|
mutex_unlock(&cfg->usr_sync);
|
|
|
|
#ifdef WLAIBSS_MCHAN
|
|
bcm_cfg80211_add_ibss_if(cfg->wdev->wiphy, IBSS_IF_NAME);
|
|
#endif /* WLAIBSS_MCHAN */
|
|
return err;
|
|
}
|
|
|
|
/* Private Event to Supplicant with indication that chip hangs */
|
|
int wl_cfg80211_hang(struct net_device *dev, u16 reason)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(dev);
|
|
dhd_pub_t *dhd;
|
|
if (!cfg) {
|
|
return BCME_ERROR;
|
|
}
|
|
|
|
RETURN_EIO_IF_NOT_UP(cfg);
|
|
|
|
dhd = (dhd_pub_t *)(cfg->pub);
|
|
if ((dhd->hang_reason <= HANG_REASON_MASK) || (dhd->hang_reason >= HANG_REASON_MAX)) {
|
|
WL_ERR(("wl_cfg80211_hang, Invalid hang reason 0x%x\n",
|
|
dhd->hang_reason));
|
|
dhd->hang_reason = HANG_REASON_UNKNOWN;
|
|
}
|
|
WL_ERR(("In : chip crash eventing, reason=0x%x\n", (uint32)(dhd->hang_reason)));
|
|
|
|
wl_add_remove_pm_enable_work(cfg, WL_PM_WORKQ_DEL);
|
|
{
|
|
if (dhd->up == TRUE) {
|
|
CFG80211_DISCONNECTED(dev, reason, NULL, 0, false, GFP_KERNEL);
|
|
}
|
|
}
|
|
#if defined(RSSIAVG)
|
|
wl_free_rssi_cache(&cfg->g_rssi_cache_ctrl);
|
|
#endif
|
|
#if defined(BSSCACHE)
|
|
wl_free_bss_cache(&cfg->g_bss_cache_ctrl);
|
|
#endif
|
|
if (cfg != NULL) {
|
|
wl_link_down(cfg);
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
s32 wl_cfg80211_down(struct net_device *dev)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(dev);
|
|
s32 err = BCME_ERROR;
|
|
|
|
WL_DBG(("In\n"));
|
|
|
|
if (cfg && (cfg == wl_cfg80211_get_bcmcfg())) {
|
|
mutex_lock(&cfg->usr_sync);
|
|
#if defined(RSSIAVG)
|
|
wl_free_rssi_cache(&cfg->g_rssi_cache_ctrl);
|
|
#endif
|
|
#if defined(BSSCACHE)
|
|
wl_free_bss_cache(&cfg->g_bss_cache_ctrl);
|
|
#endif
|
|
err = __wl_cfg80211_down(cfg);
|
|
mutex_unlock(&cfg->usr_sync);
|
|
}
|
|
|
|
return err;
|
|
}
|
|
|
|
void
|
|
wl_cfg80211_sta_ifdown(struct net_device *dev)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(dev);
|
|
|
|
WL_DBG(("In\n"));
|
|
|
|
if (cfg) {
|
|
/* cancel scan if anything pending */
|
|
wl_cfg80211_cancel_scan(cfg);
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 14, 0))
|
|
if ((dev->ieee80211_ptr->iftype == NL80211_IFTYPE_STATION) &&
|
|
wl_get_drv_status(cfg, CONNECTED, dev)) {
|
|
CFG80211_DISCONNECTED(dev, 0, NULL, 0, false, GFP_KERNEL);
|
|
}
|
|
#endif /* (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 14, 0)) */
|
|
}
|
|
}
|
|
|
|
void *wl_read_prof(struct bcm_cfg80211 *cfg, struct net_device *ndev, s32 item)
|
|
{
|
|
unsigned long flags;
|
|
void *rptr = NULL;
|
|
struct wl_profile *profile = wl_get_profile_by_netdev(cfg, ndev);
|
|
|
|
if (!profile)
|
|
return NULL;
|
|
WL_CFG_DRV_LOCK(&cfg->cfgdrv_lock, flags);
|
|
switch (item) {
|
|
case WL_PROF_SEC:
|
|
rptr = &profile->sec;
|
|
break;
|
|
case WL_PROF_ACT:
|
|
rptr = &profile->active;
|
|
break;
|
|
case WL_PROF_BSSID:
|
|
rptr = profile->bssid;
|
|
break;
|
|
case WL_PROF_SSID:
|
|
rptr = &profile->ssid;
|
|
break;
|
|
case WL_PROF_CHAN:
|
|
rptr = &profile->channel;
|
|
break;
|
|
case WL_PROF_LATEST_BSSID:
|
|
rptr = profile->latest_bssid;
|
|
break;
|
|
}
|
|
WL_CFG_DRV_UNLOCK(&cfg->cfgdrv_lock, flags);
|
|
if (!rptr)
|
|
WL_ERR(("invalid item (%d)\n", item));
|
|
return rptr;
|
|
}
|
|
|
|
static s32
|
|
wl_update_prof(struct bcm_cfg80211 *cfg, struct net_device *ndev,
|
|
const wl_event_msg_t *e, const void *data, s32 item)
|
|
{
|
|
s32 err = 0;
|
|
const struct wlc_ssid *ssid;
|
|
unsigned long flags;
|
|
struct wl_profile *profile = wl_get_profile_by_netdev(cfg, ndev);
|
|
|
|
if (!profile)
|
|
return WL_INVALID;
|
|
WL_CFG_DRV_LOCK(&cfg->cfgdrv_lock, flags);
|
|
switch (item) {
|
|
case WL_PROF_SSID:
|
|
ssid = (const wlc_ssid_t *) data;
|
|
bzero(profile->ssid.SSID,
|
|
sizeof(profile->ssid.SSID));
|
|
profile->ssid.SSID_len = MIN(ssid->SSID_len, DOT11_MAX_SSID_LEN);
|
|
memcpy(profile->ssid.SSID, ssid->SSID, profile->ssid.SSID_len);
|
|
break;
|
|
case WL_PROF_BSSID:
|
|
if (data)
|
|
memcpy(profile->bssid, data, ETHER_ADDR_LEN);
|
|
else
|
|
bzero(profile->bssid, ETHER_ADDR_LEN);
|
|
break;
|
|
case WL_PROF_SEC:
|
|
memcpy(&profile->sec, data, sizeof(profile->sec));
|
|
break;
|
|
case WL_PROF_ACT:
|
|
profile->active = *(const bool *)data;
|
|
break;
|
|
case WL_PROF_BEACONINT:
|
|
profile->beacon_interval = *(const u16 *)data;
|
|
break;
|
|
case WL_PROF_DTIMPERIOD:
|
|
profile->dtim_period = *(const u8 *)data;
|
|
break;
|
|
case WL_PROF_CHAN:
|
|
profile->channel = *(const u32*)data;
|
|
break;
|
|
case WL_PROF_LATEST_BSSID:
|
|
if (data) {
|
|
memcpy_s(profile->latest_bssid, sizeof(profile->latest_bssid),
|
|
data, ETHER_ADDR_LEN);
|
|
} else {
|
|
memset_s(profile->latest_bssid, sizeof(profile->latest_bssid),
|
|
0, ETHER_ADDR_LEN);
|
|
}
|
|
break;
|
|
default:
|
|
err = -EOPNOTSUPP;
|
|
break;
|
|
}
|
|
WL_CFG_DRV_UNLOCK(&cfg->cfgdrv_lock, flags);
|
|
|
|
if (err == -EOPNOTSUPP)
|
|
WL_ERR(("unsupported item (%d)\n", item));
|
|
|
|
return err;
|
|
}
|
|
|
|
void wl_cfg80211_dbg_level(u32 level)
|
|
{
|
|
/*
|
|
* prohibit to change debug level
|
|
* by insmod parameter.
|
|
* eventually debug level will be configured
|
|
* in compile time by using CONFIG_XXX
|
|
*/
|
|
/* wl_dbg_level = level; */
|
|
}
|
|
|
|
static bool wl_is_ibssmode(struct bcm_cfg80211 *cfg, struct net_device *ndev)
|
|
{
|
|
return wl_get_mode_by_netdev(cfg, ndev) == WL_MODE_IBSS;
|
|
}
|
|
|
|
static __used bool wl_is_ibssstarter(struct bcm_cfg80211 *cfg)
|
|
{
|
|
return cfg->ibss_starter;
|
|
}
|
|
|
|
static void wl_rst_ie(struct bcm_cfg80211 *cfg)
|
|
{
|
|
struct wl_ie *ie = wl_to_ie(cfg);
|
|
|
|
ie->offset = 0;
|
|
bzero(ie->buf, sizeof(ie->buf));
|
|
}
|
|
|
|
static __used s32 wl_add_ie(struct bcm_cfg80211 *cfg, u8 t, u8 l, u8 *v)
|
|
{
|
|
struct wl_ie *ie = wl_to_ie(cfg);
|
|
s32 err = 0;
|
|
|
|
if (unlikely(ie->offset + l + 2 > WL_TLV_INFO_MAX)) {
|
|
WL_ERR(("ei crosses buffer boundary\n"));
|
|
return -ENOSPC;
|
|
}
|
|
ie->buf[ie->offset] = t;
|
|
ie->buf[ie->offset + 1] = l;
|
|
memcpy(&ie->buf[ie->offset + 2], v, l);
|
|
ie->offset += l + 2;
|
|
|
|
return err;
|
|
}
|
|
|
|
static void wl_update_hidden_ap_ie(wl_bss_info_t *bi, const u8 *ie_stream, u32 *ie_size,
|
|
bool update_ssid)
|
|
{
|
|
u8 *ssidie;
|
|
int32 ssid_len = MIN(bi->SSID_len, DOT11_MAX_SSID_LEN);
|
|
int32 remaining_ie_buf_len, available_buffer_len, unused_buf_len;
|
|
/* cfg80211_find_ie defined in kernel returning const u8 */
|
|
|
|
GCC_DIAGNOSTIC_PUSH_SUPPRESS_CAST();
|
|
ssidie = (u8 *)cfg80211_find_ie(WLAN_EID_SSID, ie_stream, *ie_size);
|
|
GCC_DIAGNOSTIC_POP();
|
|
|
|
/* ERROR out if
|
|
* 1. No ssid IE is FOUND or
|
|
* 2. New ssid length is > what was allocated for existing ssid (as
|
|
* we do not want to overwrite the rest of the IEs) or
|
|
* 3. If in case of erroneous buffer input where ssid length doesnt match the space
|
|
* allocated to it.
|
|
*/
|
|
if (!ssidie) {
|
|
return;
|
|
}
|
|
available_buffer_len = ((int)(*ie_size)) - (ssidie + 2 - ie_stream);
|
|
remaining_ie_buf_len = available_buffer_len - (int)ssidie[1];
|
|
unused_buf_len = WL_EXTRA_BUF_MAX - (4 + bi->length + *ie_size);
|
|
if (ssidie[1] > available_buffer_len) {
|
|
WL_ERR_MEM(("wl_update_hidden_ap_ie: skip wl_update_hidden_ap_ie : overflow\n"));
|
|
return;
|
|
}
|
|
|
|
if (ssidie[1] != ssid_len) {
|
|
if (ssidie[1]) {
|
|
WL_ERR_RLMT(("wl_update_hidden_ap_ie: Wrong SSID len: %d != %d\n",
|
|
ssidie[1], bi->SSID_len));
|
|
}
|
|
/*
|
|
* The bss info in firmware gets updated from beacon and probe resp.
|
|
* In case of hidden network, the bss_info that got updated by beacon,
|
|
* will not carry SSID and this can result in cfg80211_get_bss not finding a match.
|
|
* so include the SSID element.
|
|
*/
|
|
if ((update_ssid && (ssid_len > ssidie[1])) && (unused_buf_len > ssid_len)) {
|
|
WL_INFORM_MEM(("Changing the SSID Info.\n"));
|
|
memmove(ssidie + ssid_len + 2,
|
|
(ssidie + 2) + ssidie[1],
|
|
remaining_ie_buf_len);
|
|
memcpy(ssidie + 2, bi->SSID, ssid_len);
|
|
*ie_size = *ie_size + ssid_len - ssidie[1];
|
|
ssidie[1] = ssid_len;
|
|
} else if (ssid_len < ssidie[1]) {
|
|
WL_ERR_MEM(("wl_update_hidden_ap_ie: Invalid SSID len: %d < %d\n",
|
|
bi->SSID_len, ssidie[1]));
|
|
}
|
|
return;
|
|
}
|
|
if (*(ssidie + 2) == '\0')
|
|
memcpy(ssidie + 2, bi->SSID, ssid_len);
|
|
return;
|
|
}
|
|
|
|
static s32 wl_mrg_ie(struct bcm_cfg80211 *cfg, u8 *ie_stream, u16 ie_size)
|
|
{
|
|
struct wl_ie *ie = wl_to_ie(cfg);
|
|
s32 err = 0;
|
|
|
|
if (unlikely(ie->offset + ie_size > WL_TLV_INFO_MAX)) {
|
|
WL_ERR(("ei_stream crosses buffer boundary\n"));
|
|
return -ENOSPC;
|
|
}
|
|
memcpy(&ie->buf[ie->offset], ie_stream, ie_size);
|
|
ie->offset += ie_size;
|
|
|
|
return err;
|
|
}
|
|
|
|
static s32 wl_cp_ie(struct bcm_cfg80211 *cfg, u8 *dst, u16 dst_size)
|
|
{
|
|
struct wl_ie *ie = wl_to_ie(cfg);
|
|
s32 err = 0;
|
|
|
|
if (unlikely(ie->offset > dst_size)) {
|
|
WL_ERR(("dst_size is not enough\n"));
|
|
return -ENOSPC;
|
|
}
|
|
memcpy(dst, &ie->buf[0], ie->offset);
|
|
|
|
return err;
|
|
}
|
|
|
|
static u32 wl_get_ielen(struct bcm_cfg80211 *cfg)
|
|
{
|
|
struct wl_ie *ie = wl_to_ie(cfg);
|
|
|
|
return ie->offset;
|
|
}
|
|
|
|
static void wl_link_up(struct bcm_cfg80211 *cfg)
|
|
{
|
|
cfg->link_up = true;
|
|
}
|
|
|
|
static void wl_link_down(struct bcm_cfg80211 *cfg)
|
|
{
|
|
struct wl_connect_info *conn_info = wl_to_conn(cfg);
|
|
|
|
WL_DBG(("In\n"));
|
|
cfg->link_up = false;
|
|
if (conn_info) {
|
|
conn_info->req_ie_len = 0;
|
|
conn_info->resp_ie_len = 0;
|
|
}
|
|
}
|
|
|
|
static unsigned long wl_lock_eq(struct bcm_cfg80211 *cfg)
|
|
{
|
|
unsigned long flags;
|
|
|
|
WL_CFG_EQ_LOCK(&cfg->eq_lock, flags);
|
|
return flags;
|
|
}
|
|
|
|
static void wl_unlock_eq(struct bcm_cfg80211 *cfg, unsigned long flags)
|
|
{
|
|
WL_CFG_EQ_UNLOCK(&cfg->eq_lock, flags);
|
|
}
|
|
|
|
static void wl_init_eq_lock(struct bcm_cfg80211 *cfg)
|
|
{
|
|
spin_lock_init(&cfg->eq_lock);
|
|
}
|
|
|
|
static void wl_delay(u32 ms)
|
|
{
|
|
if (in_atomic() || (ms < jiffies_to_msecs(1))) {
|
|
OSL_DELAY(ms*1000);
|
|
} else {
|
|
OSL_SLEEP(ms);
|
|
}
|
|
}
|
|
|
|
s32 wl_cfg80211_get_p2p_dev_addr(struct net_device *net, struct ether_addr *p2pdev_addr)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(net);
|
|
struct ether_addr primary_mac;
|
|
if (!cfg->p2p)
|
|
return -1;
|
|
if (!p2p_is_on(cfg)) {
|
|
get_primary_mac(cfg, &primary_mac);
|
|
#ifndef WL_P2P_USE_RANDMAC
|
|
wl_cfgp2p_generate_bss_mac(cfg, &primary_mac);
|
|
#endif /* WL_P2P_USE_RANDMAC */
|
|
memcpy((void *)&p2pdev_addr, (void *)&primary_mac, ETHER_ADDR_LEN);
|
|
} else {
|
|
memcpy(p2pdev_addr->octet, wl_to_p2p_bss_macaddr(cfg, P2PAPI_BSSCFG_DEVICE).octet,
|
|
ETHER_ADDR_LEN);
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
s32 wl_cfg80211_set_p2p_noa(struct net_device *net, char* buf, int len)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(net);
|
|
|
|
return wl_cfgp2p_set_p2p_noa(cfg, net, buf, len);
|
|
}
|
|
|
|
s32 wl_cfg80211_get_p2p_noa(struct net_device *net, char* buf, int len)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(net);
|
|
|
|
return wl_cfgp2p_get_p2p_noa(cfg, net, buf, len);
|
|
}
|
|
|
|
s32 wl_cfg80211_set_p2p_ps(struct net_device *net, char* buf, int len)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(net);
|
|
|
|
return wl_cfgp2p_set_p2p_ps(cfg, net, buf, len);
|
|
}
|
|
|
|
s32 wl_cfg80211_set_p2p_ecsa(struct net_device *net, char* buf, int len)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(net);
|
|
|
|
return wl_cfgp2p_set_p2p_ecsa(cfg, net, buf, len);
|
|
}
|
|
|
|
s32 wl_cfg80211_increase_p2p_bw(struct net_device *net, char* buf, int len)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(net);
|
|
|
|
return wl_cfgp2p_increase_p2p_bw(cfg, net, buf, len);
|
|
}
|
|
|
|
#ifdef P2PLISTEN_AP_SAMECHN
|
|
s32 wl_cfg80211_set_p2p_resp_ap_chn(struct net_device *net, s32 enable)
|
|
{
|
|
s32 ret = wldev_iovar_setint(net, "p2p_resp_ap_chn", enable);
|
|
|
|
if ((ret == 0) && enable) {
|
|
/* disable PM for p2p responding on infra AP channel */
|
|
s32 pm = PM_OFF;
|
|
|
|
ret = wldev_ioctl_set(net, WLC_SET_PM, &pm, sizeof(pm));
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
#endif /* P2PLISTEN_AP_SAMECHN */
|
|
|
|
s32 wl_cfg80211_channel_to_freq(u32 channel)
|
|
{
|
|
int freq = 0;
|
|
|
|
#if LINUX_VERSION_CODE < KERNEL_VERSION(2, 6, 39) && !defined(WL_COMPAT_WIRELESS)
|
|
freq = ieee80211_channel_to_frequency(channel);
|
|
#else
|
|
{
|
|
u16 band = 0;
|
|
if (channel <= CH_MAX_2G_CHANNEL)
|
|
band = IEEE80211_BAND_2GHZ;
|
|
else
|
|
band = IEEE80211_BAND_5GHZ;
|
|
freq = ieee80211_channel_to_frequency(channel, band);
|
|
}
|
|
#endif // endif
|
|
return freq;
|
|
}
|
|
|
|
#ifdef WLTDLS
|
|
s32
|
|
wl_tdls_event_handler(struct bcm_cfg80211 *cfg, bcm_struct_cfgdev *cfgdev,
|
|
const wl_event_msg_t *e, void *data) {
|
|
|
|
struct net_device *ndev = NULL;
|
|
u32 reason = ntoh32(e->reason);
|
|
s8 *msg = NULL;
|
|
|
|
ndev = cfgdev_to_wlc_ndev(cfgdev, cfg);
|
|
|
|
switch (reason) {
|
|
case WLC_E_TDLS_PEER_DISCOVERED :
|
|
msg = " TDLS PEER DISCOVERD ";
|
|
break;
|
|
case WLC_E_TDLS_PEER_CONNECTED :
|
|
if (cfg->tdls_mgmt_frame) {
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 18, 0))
|
|
cfg80211_rx_mgmt(cfgdev, cfg->tdls_mgmt_freq, 0,
|
|
cfg->tdls_mgmt_frame, cfg->tdls_mgmt_frame_len, 0);
|
|
#elif (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 12, 0))
|
|
cfg80211_rx_mgmt(cfgdev, cfg->tdls_mgmt_freq, 0,
|
|
cfg->tdls_mgmt_frame, cfg->tdls_mgmt_frame_len, 0,
|
|
GFP_ATOMIC);
|
|
#elif (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 4, 0)) || \
|
|
defined(WL_COMPAT_WIRELESS)
|
|
cfg80211_rx_mgmt(cfgdev, cfg->tdls_mgmt_freq, 0,
|
|
cfg->tdls_mgmt_frame, cfg->tdls_mgmt_frame_len,
|
|
GFP_ATOMIC);
|
|
#else
|
|
cfg80211_rx_mgmt(cfgdev, cfg->tdls_mgmt_freq,
|
|
cfg->tdls_mgmt_frame, cfg->tdls_mgmt_frame_len, GFP_ATOMIC);
|
|
|
|
#endif /* LINUX_VERSION >= VERSION(3, 18,0) || WL_COMPAT_WIRELESS */
|
|
}
|
|
msg = " TDLS PEER CONNECTED ";
|
|
#ifdef SUPPORT_SET_CAC
|
|
/* TDLS connect reset CAC */
|
|
wl_cfg80211_set_cac(cfg, 0);
|
|
#endif /* SUPPORT_SET_CAC */
|
|
break;
|
|
case WLC_E_TDLS_PEER_DISCONNECTED :
|
|
if (cfg->tdls_mgmt_frame) {
|
|
MFREE(cfg->osh, cfg->tdls_mgmt_frame, cfg->tdls_mgmt_frame_len);
|
|
cfg->tdls_mgmt_frame_len = 0;
|
|
cfg->tdls_mgmt_freq = 0;
|
|
}
|
|
msg = "TDLS PEER DISCONNECTED ";
|
|
#ifdef SUPPORT_SET_CAC
|
|
/* TDLS disconnec, set CAC */
|
|
wl_cfg80211_set_cac(cfg, 1);
|
|
#endif /* SUPPORT_SET_CAC */
|
|
break;
|
|
}
|
|
if (msg) {
|
|
WL_ERR(("%s: " MACDBG " on %s ndev\n", msg, MAC2STRDBG((const u8*)(&e->addr)),
|
|
(bcmcfg_to_prmry_ndev(cfg) == ndev) ? "primary" : "secondary"));
|
|
}
|
|
return 0;
|
|
|
|
}
|
|
#endif /* WLTDLS */
|
|
|
|
static s32
|
|
#if (LINUX_VERSION_CODE > KERNEL_VERSION(3, 2, 0)) || defined(WL_COMPAT_WIRELESS)
|
|
#if (defined(CONFIG_ARCH_MSM) && defined(TDLS_MGMT_VERSION2)) || (LINUX_VERSION_CODE < \
|
|
KERNEL_VERSION(3, 16, 0) && LINUX_VERSION_CODE >= KERNEL_VERSION(3, 15, 0))
|
|
wl_cfg80211_tdls_mgmt(struct wiphy *wiphy, struct net_device *dev,
|
|
u8 *peer, u8 action_code, u8 dialog_token, u16 status_code,
|
|
u32 peer_capability, const u8 *buf, size_t len)
|
|
#elif ((LINUX_VERSION_CODE >= KERNEL_VERSION(3, 16, 0)) && \
|
|
(LINUX_VERSION_CODE < KERNEL_VERSION(3, 18, 0)))
|
|
wl_cfg80211_tdls_mgmt(struct wiphy *wiphy, struct net_device *dev,
|
|
const u8 *peer, u8 action_code, u8 dialog_token, u16 status_code,
|
|
u32 peer_capability, const u8 *buf, size_t len)
|
|
#elif (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 18, 0))
|
|
wl_cfg80211_tdls_mgmt(struct wiphy *wiphy, struct net_device *dev,
|
|
const u8 *peer, u8 action_code, u8 dialog_token, u16 status_code,
|
|
u32 peer_capability, bool initiator, const u8 *buf, size_t len)
|
|
#else /* CONFIG_ARCH_MSM && TDLS_MGMT_VERSION2 */
|
|
wl_cfg80211_tdls_mgmt(struct wiphy *wiphy, struct net_device *dev,
|
|
u8 *peer, u8 action_code, u8 dialog_token, u16 status_code,
|
|
const u8 *buf, size_t len)
|
|
#endif /* CONFIG_ARCH_MSM && TDLS_MGMT_VERSION2 */
|
|
{
|
|
s32 ret = 0;
|
|
#if defined(TDLS_MSG_ONLY_WFD) && defined(WLTDLS)
|
|
struct bcm_cfg80211 *cfg;
|
|
tdls_wfd_ie_iovar_t info;
|
|
bzero(&info, sizeof(info));
|
|
cfg = wl_get_cfg(dev);
|
|
|
|
#if defined(CONFIG_ARCH_MSM) && defined(TDLS_MGMT_VERSION2)
|
|
/* Some customer platform back ported this feature from kernel 3.15 to kernel 3.10
|
|
* and that cuases build error
|
|
*/
|
|
BCM_REFERENCE(peer_capability);
|
|
#endif /* CONFIG_ARCH_MSM && TDLS_MGMT_VERSION2 */
|
|
|
|
switch (action_code) {
|
|
/* We need to set TDLS Wifi Display IE to firmware
|
|
* using tdls_wfd_ie iovar
|
|
*/
|
|
case WLAN_TDLS_SET_PROBE_WFD_IE:
|
|
WL_ERR(("wl_cfg80211_tdls_mgmt: WLAN_TDLS_SET_PROBE_WFD_IE\n"));
|
|
info.mode = TDLS_WFD_PROBE_IE_TX;
|
|
|
|
if (len > sizeof(info.data)) {
|
|
return -EINVAL;
|
|
}
|
|
memcpy(&info.data, buf, len);
|
|
info.length = len;
|
|
break;
|
|
case WLAN_TDLS_SET_SETUP_WFD_IE:
|
|
WL_ERR(("wl_cfg80211_tdls_mgmt: WLAN_TDLS_SET_SETUP_WFD_IE\n"));
|
|
info.mode = TDLS_WFD_IE_TX;
|
|
|
|
if (len > sizeof(info.data)) {
|
|
return -EINVAL;
|
|
}
|
|
memcpy(&info.data, buf, len);
|
|
info.length = len;
|
|
break;
|
|
case WLAN_TDLS_SET_WFD_ENABLED:
|
|
WL_ERR(("wl_cfg80211_tdls_mgmt: WLAN_TDLS_SET_MODE_WFD_ENABLED\n"));
|
|
dhd_tdls_set_mode((dhd_pub_t *)(cfg->pub), true);
|
|
goto out;
|
|
case WLAN_TDLS_SET_WFD_DISABLED:
|
|
WL_ERR(("wl_cfg80211_tdls_mgmt: WLAN_TDLS_SET_MODE_WFD_DISABLED\n"));
|
|
dhd_tdls_set_mode((dhd_pub_t *)(cfg->pub), false);
|
|
goto out;
|
|
default:
|
|
WL_ERR(("Unsupported action code : %d\n", action_code));
|
|
goto out;
|
|
}
|
|
ret = wldev_iovar_setbuf(dev, "tdls_wfd_ie", &info, sizeof(info),
|
|
cfg->ioctl_buf, WLC_IOCTL_MAXLEN, &cfg->ioctl_buf_sync);
|
|
|
|
if (ret) {
|
|
WL_ERR(("tdls_wfd_ie error %d\n", ret));
|
|
}
|
|
|
|
out:
|
|
#endif /* TDLS_MSG_ONLY_WFD && WLTDLS */
|
|
return ret;
|
|
}
|
|
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 16, 0))
|
|
static s32
|
|
wl_cfg80211_tdls_oper(struct wiphy *wiphy, struct net_device *dev,
|
|
const u8 *peer, enum nl80211_tdls_operation oper)
|
|
#else
|
|
static s32
|
|
wl_cfg80211_tdls_oper(struct wiphy *wiphy, struct net_device *dev,
|
|
u8 *peer, enum nl80211_tdls_operation oper)
|
|
#endif // endif
|
|
{
|
|
s32 ret = 0;
|
|
#ifdef WLTDLS
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(dev);
|
|
tdls_iovar_t info;
|
|
dhd_pub_t *dhdp;
|
|
bool tdls_auto_mode = false;
|
|
dhdp = (dhd_pub_t *)(cfg->pub);
|
|
bzero(&info, sizeof(tdls_iovar_t));
|
|
if (peer) {
|
|
memcpy(&info.ea, peer, ETHER_ADDR_LEN);
|
|
} else {
|
|
return -1;
|
|
}
|
|
switch (oper) {
|
|
case NL80211_TDLS_DISCOVERY_REQ:
|
|
/* If the discovery request is broadcast then we need to set
|
|
* info.mode to Tunneled Probe Request
|
|
*/
|
|
if (memcmp(peer, (const uint8 *)BSSID_BROADCAST, ETHER_ADDR_LEN) == 0) {
|
|
info.mode = TDLS_MANUAL_EP_WFD_TPQ;
|
|
WL_ERR(("wl_cfg80211_tdls_oper: TDLS TUNNELED PRBOBE REQUEST\n"));
|
|
} else {
|
|
info.mode = TDLS_MANUAL_EP_DISCOVERY;
|
|
}
|
|
break;
|
|
case NL80211_TDLS_SETUP:
|
|
if (dhdp->tdls_mode == true) {
|
|
info.mode = TDLS_MANUAL_EP_CREATE;
|
|
tdls_auto_mode = false;
|
|
/* Do tear down and create a fresh one */
|
|
ret = wl_cfg80211_tdls_config(cfg, TDLS_STATE_TEARDOWN, tdls_auto_mode);
|
|
if (ret < 0) {
|
|
return ret;
|
|
}
|
|
} else {
|
|
tdls_auto_mode = true;
|
|
}
|
|
break;
|
|
case NL80211_TDLS_TEARDOWN:
|
|
info.mode = TDLS_MANUAL_EP_DELETE;
|
|
break;
|
|
default:
|
|
WL_ERR(("Unsupported operation : %d\n", oper));
|
|
goto out;
|
|
}
|
|
/* turn on TDLS */
|
|
ret = wl_cfg80211_tdls_config(cfg, TDLS_STATE_SETUP, tdls_auto_mode);
|
|
if (ret < 0) {
|
|
return ret;
|
|
}
|
|
if (info.mode) {
|
|
ret = wldev_iovar_setbuf(dev, "tdls_endpoint", &info, sizeof(info),
|
|
cfg->ioctl_buf, WLC_IOCTL_MAXLEN, &cfg->ioctl_buf_sync);
|
|
if (ret) {
|
|
WL_ERR(("tdls_endpoint error %d\n", ret));
|
|
}
|
|
}
|
|
out:
|
|
if (ret) {
|
|
wl_flush_fw_log_buffer(dev, FW_LOGSET_MASK_ALL);
|
|
return -ENOTSUPP;
|
|
}
|
|
#endif /* WLTDLS */
|
|
return ret;
|
|
}
|
|
#endif /* LINUX_VERSION > VERSION(3,2,0) || WL_COMPAT_WIRELESS */
|
|
|
|
s32 wl_cfg80211_set_wps_p2p_ie(struct net_device *ndev, char *buf, int len,
|
|
enum wl_management_type type)
|
|
{
|
|
struct bcm_cfg80211 *cfg;
|
|
s32 ret = 0;
|
|
struct ether_addr primary_mac;
|
|
s32 bssidx = 0;
|
|
s32 pktflag = 0;
|
|
cfg = wl_get_cfg(ndev);
|
|
|
|
if (wl_get_drv_status(cfg, AP_CREATING, ndev)) {
|
|
/* Vendor IEs should be set to FW
|
|
* after SoftAP interface is brought up
|
|
*/
|
|
WL_DBG(("Skipping set IE since AP is not up \n"));
|
|
goto exit;
|
|
} else if (ndev == bcmcfg_to_prmry_ndev(cfg)) {
|
|
/* Either stand alone AP case or P2P discovery */
|
|
if (wl_get_drv_status(cfg, AP_CREATED, ndev)) {
|
|
/* Stand alone AP case on primary interface */
|
|
WL_DBG(("Apply IEs for Primary AP Interface \n"));
|
|
bssidx = 0;
|
|
} else {
|
|
if (!cfg->p2p) {
|
|
/* If p2p not initialized, return failure */
|
|
WL_ERR(("P2P not initialized \n"));
|
|
goto exit;
|
|
}
|
|
/* P2P Discovery case (p2p listen) */
|
|
if (!cfg->p2p->on) {
|
|
/* Turn on Discovery interface */
|
|
get_primary_mac(cfg, &primary_mac);
|
|
#ifndef WL_P2P_USE_RANDMAC
|
|
wl_cfgp2p_generate_bss_mac(cfg, &primary_mac);
|
|
#endif /* WL_P2P_USE_RANDMAC */
|
|
p2p_on(cfg) = true;
|
|
ret = wl_cfgp2p_enable_discovery(cfg, ndev, NULL, 0);
|
|
if (unlikely(ret)) {
|
|
WL_ERR(("Enable discovery failed \n"));
|
|
goto exit;
|
|
}
|
|
}
|
|
WL_DBG(("Apply IEs for P2P Discovery Iface \n"));
|
|
ndev = wl_to_p2p_bss_ndev(cfg, P2PAPI_BSSCFG_PRIMARY);
|
|
bssidx = wl_to_p2p_bss_bssidx(cfg, P2PAPI_BSSCFG_DEVICE);
|
|
}
|
|
} else {
|
|
/* Virtual AP/ P2P Group Interface */
|
|
WL_DBG(("Apply IEs for iface:%s\n", ndev->name));
|
|
bssidx = wl_get_bssidx_by_wdev(cfg, ndev->ieee80211_ptr);
|
|
}
|
|
|
|
if (ndev != NULL) {
|
|
switch (type) {
|
|
case WL_BEACON:
|
|
pktflag = VNDR_IE_BEACON_FLAG;
|
|
break;
|
|
case WL_PROBE_RESP:
|
|
pktflag = VNDR_IE_PRBRSP_FLAG;
|
|
break;
|
|
case WL_ASSOC_RESP:
|
|
pktflag = VNDR_IE_ASSOCRSP_FLAG;
|
|
break;
|
|
}
|
|
if (pktflag) {
|
|
ret = wl_cfg80211_set_mgmt_vndr_ies(cfg,
|
|
ndev_to_cfgdev(ndev), bssidx, pktflag, buf, len);
|
|
}
|
|
}
|
|
exit:
|
|
return ret;
|
|
}
|
|
|
|
#ifdef WL_SUPPORT_AUTO_CHANNEL
|
|
static s32
|
|
wl_cfg80211_set_auto_channel_scan_state(struct net_device *ndev)
|
|
{
|
|
u32 val = 0;
|
|
s32 ret = BCME_ERROR;
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(ndev);
|
|
/* Set interface up, explicitly. */
|
|
val = 1;
|
|
|
|
ret = wldev_ioctl_set(ndev, WLC_UP, (void *)&val, sizeof(val));
|
|
if (ret < 0) {
|
|
WL_ERR(("set interface up failed, error = %d\n", ret));
|
|
goto done;
|
|
}
|
|
|
|
/* Stop all scan explicitly, till auto channel selection complete. */
|
|
wl_set_drv_status(cfg, SCANNING, ndev);
|
|
if (cfg->escan_info.ndev == NULL) {
|
|
ret = BCME_OK;
|
|
goto done;
|
|
}
|
|
|
|
wl_cfg80211_cancel_scan(cfg);
|
|
|
|
done:
|
|
return ret;
|
|
}
|
|
|
|
static bool
|
|
wl_cfg80211_valid_channel_p2p(int channel)
|
|
{
|
|
bool valid = false;
|
|
|
|
/* channel 1 to 14 */
|
|
if ((channel >= 1) && (channel <= 14)) {
|
|
valid = true;
|
|
}
|
|
/* channel 36 to 48 */
|
|
else if ((channel >= 36) && (channel <= 48)) {
|
|
valid = true;
|
|
}
|
|
/* channel 149 to 161 */
|
|
else if ((channel >= 149) && (channel <= 161)) {
|
|
valid = true;
|
|
}
|
|
else {
|
|
valid = false;
|
|
WL_INFORM(("invalid P2P chanspec, channel = %d\n", channel));
|
|
}
|
|
|
|
return valid;
|
|
}
|
|
|
|
s32
|
|
wl_cfg80211_get_chanspecs_2g(struct net_device *ndev, void *buf, s32 buflen)
|
|
{
|
|
s32 ret = BCME_ERROR;
|
|
struct bcm_cfg80211 *cfg = NULL;
|
|
chanspec_t chanspec = 0;
|
|
|
|
cfg = wl_get_cfg(ndev);
|
|
|
|
/* Restrict channels to 2.4GHz, 20MHz BW, no SB. */
|
|
chanspec |= (WL_CHANSPEC_BAND_2G | WL_CHANSPEC_BW_20 |
|
|
WL_CHANSPEC_CTL_SB_NONE);
|
|
chanspec = wl_chspec_host_to_driver(chanspec);
|
|
|
|
ret = wldev_iovar_getbuf_bsscfg(ndev, "chanspecs", (void *)&chanspec,
|
|
sizeof(chanspec), buf, buflen, 0, &cfg->ioctl_buf_sync);
|
|
if (ret < 0) {
|
|
WL_ERR(("get 'chanspecs' failed, error = %d\n", ret));
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
s32
|
|
wl_cfg80211_get_chanspecs_5g(struct net_device *ndev, void *buf, s32 buflen)
|
|
{
|
|
u32 channel = 0;
|
|
s32 ret = BCME_ERROR;
|
|
s32 i = 0;
|
|
s32 j = 0;
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(ndev);
|
|
wl_uint32_list_t *list = NULL;
|
|
chanspec_t chanspec = 0;
|
|
|
|
/* Restrict channels to 5GHz, 20MHz BW, no SB. */
|
|
chanspec |= (WL_CHANSPEC_BAND_5G | WL_CHANSPEC_BW_20 |
|
|
WL_CHANSPEC_CTL_SB_NONE);
|
|
chanspec = wl_chspec_host_to_driver(chanspec);
|
|
|
|
ret = wldev_iovar_getbuf_bsscfg(ndev, "chanspecs", (void *)&chanspec,
|
|
sizeof(chanspec), buf, buflen, 0, &cfg->ioctl_buf_sync);
|
|
if (ret < 0) {
|
|
WL_ERR(("get 'chanspecs' failed, error = %d\n", ret));
|
|
goto done;
|
|
}
|
|
|
|
list = (wl_uint32_list_t *)buf;
|
|
/* Skip DFS and inavlid P2P channel. */
|
|
for (i = 0, j = 0; i < dtoh32(list->count); i++) {
|
|
chanspec = (chanspec_t) dtoh32(list->element[i]);
|
|
channel = CHSPEC_CHANNEL(chanspec);
|
|
|
|
ret = wldev_iovar_getint(ndev, "per_chan_info", &channel);
|
|
if (ret < 0) {
|
|
WL_ERR(("get 'per_chan_info' failed, error = %d\n", ret));
|
|
goto done;
|
|
}
|
|
|
|
if (CHANNEL_IS_RADAR(channel) ||
|
|
!(wl_cfg80211_valid_channel_p2p(CHSPEC_CHANNEL(chanspec)))) {
|
|
continue;
|
|
} else {
|
|
list->element[j] = list->element[i];
|
|
}
|
|
|
|
j++;
|
|
}
|
|
|
|
list->count = j;
|
|
|
|
done:
|
|
return ret;
|
|
}
|
|
|
|
static s32
|
|
wl_cfg80211_get_best_channel(struct net_device *ndev, void *buf, int buflen,
|
|
int *channel)
|
|
{
|
|
s32 ret = BCME_ERROR;
|
|
int chosen = 0;
|
|
int retry = 0;
|
|
uint chip;
|
|
|
|
/* Start auto channel selection scan. */
|
|
ret = wldev_ioctl_set(ndev, WLC_START_CHANNEL_SEL, buf, buflen);
|
|
if (ret < 0) {
|
|
WL_ERR(("can't start auto channel scan, error = %d\n", ret));
|
|
*channel = 0;
|
|
goto done;
|
|
}
|
|
|
|
/* Wait for auto channel selection, worst case possible delay is 5250ms. */
|
|
retry = CHAN_SEL_RETRY_COUNT;
|
|
|
|
while (retry--) {
|
|
OSL_SLEEP(CHAN_SEL_IOCTL_DELAY);
|
|
chosen = 0;
|
|
ret = wldev_ioctl_get(ndev, WLC_GET_CHANNEL_SEL, &chosen, sizeof(chosen));
|
|
if ((ret == 0) && (dtoh32(chosen) != 0)) {
|
|
chip = dhd_conf_get_chip(dhd_get_pub(ndev));
|
|
if (chip != BCM43362_CHIP_ID && chip != BCM4330_CHIP_ID &&
|
|
chip != BCM43143_CHIP_ID) {
|
|
u32 chanspec = 0;
|
|
int ctl_chan;
|
|
chanspec = wl_chspec_driver_to_host(chosen);
|
|
WL_INFORM(("selected chanspec = 0x%x\n", chanspec));
|
|
ctl_chan = wf_chspec_ctlchan(chanspec);
|
|
WL_INFORM(("selected ctl_chan = %d\n", ctl_chan));
|
|
*channel = (u16)(ctl_chan & 0x00FF);
|
|
} else
|
|
*channel = (u16)(chosen & 0x00FF);
|
|
WL_INFORM(("selected channel = %d\n", *channel));
|
|
break;
|
|
}
|
|
WL_INFORM(("attempt = %d, ret = %d, chosen = %d\n",
|
|
(CHAN_SEL_RETRY_COUNT - retry), ret, dtoh32(chosen)));
|
|
}
|
|
|
|
if (retry <= 0) {
|
|
WL_ERR(("failure, auto channel selection timed out\n"));
|
|
*channel = 0;
|
|
ret = BCME_ERROR;
|
|
}
|
|
WL_INFORM(("selected channel = %d\n", *channel));
|
|
|
|
done:
|
|
return ret;
|
|
}
|
|
|
|
static s32
|
|
wl_cfg80211_restore_auto_channel_scan_state(struct net_device *ndev)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(ndev);
|
|
/* Clear scan stop driver status. */
|
|
wl_clr_drv_status(cfg, SCANNING, ndev);
|
|
|
|
return BCME_OK;
|
|
}
|
|
|
|
s32
|
|
wl_cfg80211_get_best_channels(struct net_device *dev, char* cmd, int total_len)
|
|
{
|
|
int channel = 0, band, band_cur;
|
|
s32 ret = BCME_ERROR;
|
|
u8 *buf = NULL;
|
|
char *pos = cmd;
|
|
struct bcm_cfg80211 *cfg = NULL;
|
|
struct net_device *ndev = NULL;
|
|
|
|
bzero(cmd, total_len);
|
|
cfg = wl_get_cfg(dev);
|
|
|
|
buf = (u8 *)MALLOC(cfg->osh, CHANSPEC_BUF_SIZE);
|
|
if (buf == NULL) {
|
|
WL_ERR(("failed to allocate chanspec buffer\n"));
|
|
return -ENOMEM;
|
|
}
|
|
|
|
/*
|
|
* Always use primary interface, irrespective of interface on which
|
|
* command came.
|
|
*/
|
|
ndev = bcmcfg_to_prmry_ndev(cfg);
|
|
|
|
/*
|
|
* Make sure that FW and driver are in right state to do auto channel
|
|
* selection scan.
|
|
*/
|
|
ret = wl_cfg80211_set_auto_channel_scan_state(ndev);
|
|
if (ret < 0) {
|
|
WL_ERR(("can't set auto channel scan state, error = %d\n", ret));
|
|
goto done;
|
|
}
|
|
|
|
ret = wldev_ioctl(dev, WLC_GET_BAND, &band_cur, sizeof(band_cur), false);
|
|
if (band_cur != WLC_BAND_5G) {
|
|
/* Best channel selection in 2.4GHz band. */
|
|
ret = wl_cfg80211_get_chanspecs_2g(ndev, (void *)buf, CHANSPEC_BUF_SIZE);
|
|
if (ret < 0) {
|
|
WL_ERR(("can't get chanspecs in 2.4GHz, error = %d\n", ret));
|
|
goto done;
|
|
}
|
|
|
|
ret = wl_cfg80211_get_best_channel(ndev, (void *)buf, CHANSPEC_BUF_SIZE,
|
|
&channel);
|
|
if (ret < 0) {
|
|
WL_ERR(("can't select best channel scan in 2.4GHz, error = %d\n", ret));
|
|
goto done;
|
|
}
|
|
|
|
if (CHANNEL_IS_2G(channel)) {
|
|
// channel = ieee80211_channel_to_frequency(channel, IEEE80211_BAND_2GHZ);
|
|
} else {
|
|
WL_ERR(("invalid 2.4GHz channel, channel = %d\n", channel));
|
|
channel = 0;
|
|
}
|
|
pos += snprintf(pos, total_len, "2g=%d ", channel);
|
|
}
|
|
|
|
if (band_cur != WLC_BAND_2G) {
|
|
// terence 20140120: fix for some chipsets only return 2.4GHz channel (4330b2/43341b0/4339a0)
|
|
band = band_cur==WLC_BAND_2G ? band_cur : WLC_BAND_5G;
|
|
ret = wldev_ioctl(dev, WLC_SET_BAND, &band, sizeof(band), true);
|
|
if (ret < 0) {
|
|
WL_ERR(("WLC_SET_BAND error %d\n", ret));
|
|
goto done;
|
|
}
|
|
|
|
/* Best channel selection in 5GHz band. */
|
|
ret = wl_cfg80211_get_chanspecs_5g(ndev, (void *)buf, CHANSPEC_BUF_SIZE);
|
|
if (ret < 0) {
|
|
WL_ERR(("can't get chanspecs in 5GHz, error = %d\n", ret));
|
|
goto done;
|
|
}
|
|
|
|
ret = wl_cfg80211_get_best_channel(ndev, (void *)buf, CHANSPEC_BUF_SIZE,
|
|
&channel);
|
|
if (ret < 0) {
|
|
WL_ERR(("can't select best channel scan in 5GHz, error = %d\n", ret));
|
|
goto done;
|
|
}
|
|
|
|
if (CHANNEL_IS_5G(channel)) {
|
|
// channel = ieee80211_channel_to_frequency(channel, IEEE80211_BAND_5GHZ);
|
|
} else {
|
|
WL_ERR(("invalid 5GHz channel, channel = %d\n", channel));
|
|
channel = 0;
|
|
}
|
|
|
|
ret = wldev_ioctl(dev, WLC_SET_BAND, &band_cur, sizeof(band_cur), true);
|
|
if (ret < 0)
|
|
WL_ERR(("WLC_SET_BAND error %d\n", ret));
|
|
pos += snprintf(pos, total_len, "5g=%d ", channel);
|
|
}
|
|
|
|
done:
|
|
if (NULL != buf) {
|
|
MFREE(cfg->osh, buf, CHANSPEC_BUF_SIZE);
|
|
}
|
|
|
|
/* Restore FW and driver back to normal state. */
|
|
ret = wl_cfg80211_restore_auto_channel_scan_state(ndev);
|
|
if (ret < 0) {
|
|
WL_ERR(("can't restore auto channel scan state, error = %d\n", ret));
|
|
}
|
|
|
|
WL_MSG(ndev->name, "%s\n", cmd);
|
|
|
|
return (pos - cmd);
|
|
}
|
|
#endif /* WL_SUPPORT_AUTO_CHANNEL */
|
|
|
|
static const struct rfkill_ops wl_rfkill_ops = {
|
|
.set_block = wl_rfkill_set
|
|
};
|
|
|
|
static int wl_rfkill_set(void *data, bool blocked)
|
|
{
|
|
struct bcm_cfg80211 *cfg = (struct bcm_cfg80211 *)data;
|
|
|
|
WL_DBG(("Enter \n"));
|
|
WL_DBG(("RF %s\n", blocked ? "blocked" : "unblocked"));
|
|
|
|
if (!cfg)
|
|
return -EINVAL;
|
|
|
|
cfg->rf_blocked = blocked;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int wl_setup_rfkill(struct bcm_cfg80211 *cfg, bool setup)
|
|
{
|
|
s32 err = 0;
|
|
|
|
WL_DBG(("Enter \n"));
|
|
if (!cfg)
|
|
return -EINVAL;
|
|
if (setup) {
|
|
cfg->rfkill = rfkill_alloc("brcmfmac-wifi",
|
|
wl_cfg80211_get_parent_dev(),
|
|
RFKILL_TYPE_WLAN, &wl_rfkill_ops, (void *)cfg);
|
|
|
|
if (!cfg->rfkill) {
|
|
err = -ENOMEM;
|
|
goto err_out;
|
|
}
|
|
|
|
err = rfkill_register(cfg->rfkill);
|
|
|
|
if (err)
|
|
rfkill_destroy(cfg->rfkill);
|
|
} else {
|
|
if (!cfg->rfkill) {
|
|
err = -ENOMEM;
|
|
goto err_out;
|
|
}
|
|
|
|
rfkill_unregister(cfg->rfkill);
|
|
rfkill_destroy(cfg->rfkill);
|
|
}
|
|
|
|
err_out:
|
|
return err;
|
|
}
|
|
|
|
#ifdef DEBUGFS_CFG80211
|
|
/**
|
|
* Format : echo "SCAN:1 DBG:1" > /sys/kernel/debug/dhd/debug_level
|
|
* to turn on SCAN and DBG log.
|
|
* To turn off SCAN partially, echo "SCAN:0" > /sys/kernel/debug/dhd/debug_level
|
|
* To see current setting of debug level,
|
|
* cat /sys/kernel/debug/dhd/debug_level
|
|
*/
|
|
static ssize_t
|
|
wl_debuglevel_write(struct file *file, const char __user *userbuf,
|
|
size_t count, loff_t *ppos)
|
|
{
|
|
char tbuf[SUBLOGLEVELZ * ARRAYSIZE(sublogname_map)], sublog[SUBLOGLEVELZ];
|
|
char *params, *token, *colon;
|
|
uint i, tokens, log_on = 0;
|
|
size_t minsize = min_t(size_t, (sizeof(tbuf) - 1), count);
|
|
|
|
bzero(tbuf, sizeof(tbuf));
|
|
bzero(sublog, sizeof(sublog));
|
|
if (copy_from_user(&tbuf, userbuf, minsize)) {
|
|
return -EFAULT;
|
|
}
|
|
|
|
tbuf[minsize] = '\0';
|
|
params = &tbuf[0];
|
|
colon = strchr(params, '\n');
|
|
if (colon != NULL)
|
|
*colon = '\0';
|
|
while ((token = strsep(¶ms, " ")) != NULL) {
|
|
bzero(sublog, sizeof(sublog));
|
|
if (token == NULL || !*token)
|
|
break;
|
|
if (*token == '\0')
|
|
continue;
|
|
colon = strchr(token, ':');
|
|
if (colon != NULL) {
|
|
*colon = ' ';
|
|
}
|
|
tokens = sscanf(token, "%"S(SUBLOGLEVEL)"s %u", sublog, &log_on);
|
|
if (colon != NULL)
|
|
*colon = ':';
|
|
|
|
if (tokens == 2) {
|
|
for (i = 0; i < ARRAYSIZE(sublogname_map); i++) {
|
|
if (!strncmp(sublog, sublogname_map[i].sublogname,
|
|
strlen(sublogname_map[i].sublogname))) {
|
|
if (log_on)
|
|
wl_dbg_level |=
|
|
(sublogname_map[i].log_level);
|
|
else
|
|
wl_dbg_level &=
|
|
~(sublogname_map[i].log_level);
|
|
}
|
|
}
|
|
} else
|
|
WL_ERR(("%s: can't parse '%s' as a "
|
|
"SUBMODULE:LEVEL (%d tokens)\n",
|
|
tbuf, token, tokens));
|
|
|
|
}
|
|
return count;
|
|
}
|
|
|
|
static ssize_t
|
|
wl_debuglevel_read(struct file *file, char __user *user_buf,
|
|
size_t count, loff_t *ppos)
|
|
{
|
|
char *param;
|
|
char tbuf[SUBLOGLEVELZ * ARRAYSIZE(sublogname_map)];
|
|
uint i;
|
|
bzero(tbuf, sizeof(tbuf));
|
|
param = &tbuf[0];
|
|
for (i = 0; i < ARRAYSIZE(sublogname_map); i++) {
|
|
param += snprintf(param, sizeof(tbuf) - 1, "%s:%d ",
|
|
sublogname_map[i].sublogname,
|
|
(wl_dbg_level & sublogname_map[i].log_level) ? 1 : 0);
|
|
}
|
|
*param = '\n';
|
|
return simple_read_from_buffer(user_buf, count, ppos, tbuf, strlen(&tbuf[0]));
|
|
|
|
}
|
|
static const struct file_operations fops_debuglevel = {
|
|
.open = NULL,
|
|
.write = wl_debuglevel_write,
|
|
.read = wl_debuglevel_read,
|
|
.owner = THIS_MODULE,
|
|
.llseek = NULL,
|
|
};
|
|
|
|
static s32 wl_setup_debugfs(struct bcm_cfg80211 *cfg)
|
|
{
|
|
s32 err = 0;
|
|
struct dentry *_dentry;
|
|
if (!cfg)
|
|
return -EINVAL;
|
|
cfg->debugfs = debugfs_create_dir(KBUILD_MODNAME, NULL);
|
|
if (!cfg->debugfs || IS_ERR(cfg->debugfs)) {
|
|
if (cfg->debugfs == ERR_PTR(-ENODEV))
|
|
WL_ERR(("Debugfs is not enabled on this kernel\n"));
|
|
else
|
|
WL_ERR(("Can not create debugfs directory\n"));
|
|
cfg->debugfs = NULL;
|
|
goto exit;
|
|
|
|
}
|
|
_dentry = debugfs_create_file("debug_level", S_IRUSR | S_IWUSR,
|
|
cfg->debugfs, cfg, &fops_debuglevel);
|
|
if (!_dentry || IS_ERR(_dentry)) {
|
|
WL_ERR(("failed to create debug_level debug file\n"));
|
|
wl_free_debugfs(cfg);
|
|
}
|
|
exit:
|
|
return err;
|
|
}
|
|
static s32 wl_free_debugfs(struct bcm_cfg80211 *cfg)
|
|
{
|
|
if (!cfg)
|
|
return -EINVAL;
|
|
if (cfg->debugfs)
|
|
debugfs_remove_recursive(cfg->debugfs);
|
|
cfg->debugfs = NULL;
|
|
return 0;
|
|
}
|
|
#endif /* DEBUGFS_CFG80211 */
|
|
|
|
struct bcm_cfg80211 *wl_cfg80211_get_bcmcfg(void)
|
|
{
|
|
return g_bcmcfg;
|
|
}
|
|
|
|
void wl_cfg80211_set_bcmcfg(struct bcm_cfg80211 *cfg)
|
|
{
|
|
g_bcmcfg = cfg;
|
|
}
|
|
|
|
struct device *wl_cfg80211_get_parent_dev(void)
|
|
{
|
|
return cfg80211_parent_dev;
|
|
}
|
|
|
|
void wl_cfg80211_set_parent_dev(void *dev)
|
|
{
|
|
cfg80211_parent_dev = dev;
|
|
}
|
|
|
|
static void wl_cfg80211_clear_parent_dev(void)
|
|
{
|
|
cfg80211_parent_dev = NULL;
|
|
}
|
|
|
|
void get_primary_mac(struct bcm_cfg80211 *cfg, struct ether_addr *mac)
|
|
{
|
|
u8 ioctl_buf[WLC_IOCTL_SMLEN];
|
|
|
|
if (wldev_iovar_getbuf_bsscfg(bcmcfg_to_prmry_ndev(cfg),
|
|
"cur_etheraddr", NULL, 0, ioctl_buf, sizeof(ioctl_buf),
|
|
0, NULL) == BCME_OK) {
|
|
memcpy(mac->octet, ioctl_buf, ETHER_ADDR_LEN);
|
|
} else {
|
|
bzero(mac->octet, ETHER_ADDR_LEN);
|
|
}
|
|
}
|
|
static bool check_dev_role_integrity(struct bcm_cfg80211 *cfg, u32 dev_role)
|
|
{
|
|
dhd_pub_t *dhd = (dhd_pub_t *)(cfg->pub);
|
|
if (((dev_role == NL80211_IFTYPE_AP) &&
|
|
!(dhd->op_mode & DHD_FLAG_HOSTAP_MODE)) ||
|
|
((dev_role == NL80211_IFTYPE_P2P_GO) &&
|
|
!(dhd->op_mode & DHD_FLAG_P2P_GO_MODE)))
|
|
{
|
|
WL_ERR(("device role select failed role:%d op_mode:%d \n", dev_role, dhd->op_mode));
|
|
return false;
|
|
}
|
|
return true;
|
|
}
|
|
|
|
int wl_cfg80211_do_driver_init(struct net_device *net)
|
|
{
|
|
struct bcm_cfg80211 *cfg = *(struct bcm_cfg80211 **)netdev_priv(net);
|
|
|
|
if (!cfg || !cfg->wdev)
|
|
return -EINVAL;
|
|
|
|
if (dhd_do_driver_init(cfg->wdev->netdev) < 0)
|
|
return -1;
|
|
|
|
return 0;
|
|
}
|
|
|
|
void wl_cfg80211_enable_trace(u32 level)
|
|
{
|
|
wl_dbg_level = level;
|
|
WL_MSG("wlan", "wl_dbg_level = 0x%x\n", wl_dbg_level);
|
|
}
|
|
|
|
#if defined(WL_SUPPORT_BACKPORTED_KPATCHES) || (LINUX_VERSION_CODE >= KERNEL_VERSION(3, \
|
|
2, 0))
|
|
static s32
|
|
wl_cfg80211_mgmt_tx_cancel_wait(struct wiphy *wiphy,
|
|
bcm_struct_cfgdev *cfgdev, u64 cookie)
|
|
{
|
|
/* CFG80211 checks for tx_cancel_wait callback when ATTR_DURATION
|
|
* is passed with CMD_FRAME. This callback is supposed to cancel
|
|
* the OFFCHANNEL Wait. Since we are already taking care of that
|
|
* with the tx_mgmt logic, do nothing here.
|
|
*/
|
|
|
|
return 0;
|
|
}
|
|
#endif /* WL_SUPPORT_BACKPORTED_PATCHES || KERNEL >= 3.2.0 */
|
|
|
|
#ifdef WL_HOST_BAND_MGMT
|
|
s32
|
|
wl_cfg80211_set_band(struct net_device *ndev, int band)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(ndev);
|
|
int ret = 0;
|
|
char ioctl_buf[50];
|
|
|
|
if ((band < WLC_BAND_AUTO) || (band > WLC_BAND_2G)) {
|
|
WL_ERR(("Invalid band\n"));
|
|
return -EINVAL;
|
|
}
|
|
|
|
if ((ret = wldev_iovar_setbuf(ndev, "roam_band", &band,
|
|
sizeof(int), ioctl_buf, sizeof(ioctl_buf), NULL)) < 0) {
|
|
WL_ERR(("seting roam_band failed code=%d\n", ret));
|
|
return ret;
|
|
}
|
|
|
|
WL_DBG(("Setting band to %d\n", band));
|
|
cfg->curr_band = band;
|
|
|
|
return 0;
|
|
}
|
|
#endif /* WL_HOST_BAND_MGMT */
|
|
|
|
s32
|
|
wl_cfg80211_set_if_band(struct net_device *ndev, int band)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(ndev);
|
|
int ret = 0, wait_cnt;
|
|
char ioctl_buf[32];
|
|
|
|
if ((band < WLC_BAND_AUTO) || (band > WLC_BAND_2G)) {
|
|
WL_ERR(("Invalid band\n"));
|
|
return -EINVAL;
|
|
}
|
|
if (wl_get_drv_status(cfg, CONNECTED, ndev)) {
|
|
dhd_pub_t *dhdp = (dhd_pub_t *)(cfg->pub);
|
|
BCM_REFERENCE(dhdp);
|
|
DHD_STATLOG_CTRL(dhdp, ST(DISASSOC_INT_START),
|
|
dhd_net2idx(dhdp->info, ndev), 0);
|
|
ret = wldev_ioctl_set(ndev, WLC_DISASSOC, NULL, 0);
|
|
if (ret < 0) {
|
|
WL_ERR(("WLC_DISASSOC error %d\n", ret));
|
|
/* continue to set 'if_band' */
|
|
}
|
|
else {
|
|
/* This is to ensure that 'if_band' iovar is issued only after
|
|
* disconnection is completed
|
|
*/
|
|
wait_cnt = WAIT_FOR_DISCONNECT_MAX;
|
|
while (wl_get_drv_status(cfg, CONNECTED, ndev) && wait_cnt) {
|
|
WL_DBG(("Wait until disconnected. wait_cnt: %d\n", wait_cnt));
|
|
wait_cnt--;
|
|
OSL_SLEEP(50);
|
|
}
|
|
}
|
|
}
|
|
if ((ret = wldev_iovar_setbuf(ndev, "if_band", &band,
|
|
sizeof(int), ioctl_buf, sizeof(ioctl_buf), NULL)) < 0) {
|
|
WL_ERR(("seting if_band failed ret=%d\n", ret));
|
|
/* issue 'WLC_SET_BAND' if if_band is not supported */
|
|
if (ret == BCME_UNSUPPORTED) {
|
|
ret = wldev_set_band(ndev, band);
|
|
if (ret < 0) {
|
|
WL_ERR(("seting band failed ret=%d\n", ret));
|
|
}
|
|
}
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
s32
|
|
wl_cfg80211_dfs_ap_move(struct net_device *ndev, char *data, char *command, int total_len)
|
|
{
|
|
char ioctl_buf[WLC_IOCTL_SMLEN];
|
|
int err = 0;
|
|
uint32 val = 0;
|
|
chanspec_t chanspec = 0;
|
|
int abort;
|
|
int bytes_written = 0;
|
|
struct wl_dfs_ap_move_status_v2 *status;
|
|
char chanbuf[CHANSPEC_STR_LEN];
|
|
const char *dfs_state_str[DFS_SCAN_S_MAX] = {
|
|
"Radar Free On Channel",
|
|
"Radar Found On Channel",
|
|
"Radar Scan In Progress",
|
|
"Radar Scan Aborted",
|
|
"RSDB Mode switch in Progress For Scan"
|
|
};
|
|
if (ndev->ieee80211_ptr->iftype != NL80211_IFTYPE_AP) {
|
|
bytes_written = snprintf(command, total_len, "AP is not up\n");
|
|
return bytes_written;
|
|
}
|
|
if (!*data) {
|
|
if ((err = wldev_iovar_getbuf(ndev, "dfs_ap_move", NULL, 0,
|
|
ioctl_buf, sizeof(ioctl_buf), NULL))) {
|
|
WL_ERR(("setting dfs_ap_move failed with err=%d \n", err));
|
|
return err;
|
|
}
|
|
status = (struct wl_dfs_ap_move_status_v2 *)ioctl_buf;
|
|
|
|
if (status->version != WL_DFS_AP_MOVE_VERSION) {
|
|
err = BCME_UNSUPPORTED;
|
|
WL_ERR(("err=%d version=%d\n", err, status->version));
|
|
return err;
|
|
}
|
|
|
|
if (status->move_status != (int8) DFS_SCAN_S_IDLE) {
|
|
chanspec = wl_chspec_driver_to_host(status->chanspec);
|
|
if (chanspec != 0 && chanspec != INVCHANSPEC) {
|
|
wf_chspec_ntoa(chanspec, chanbuf);
|
|
bytes_written = snprintf(command, total_len,
|
|
"AP Target Chanspec %s (0x%x)\n", chanbuf, chanspec);
|
|
}
|
|
bytes_written += snprintf(command + bytes_written,
|
|
total_len - bytes_written,
|
|
"%s\n", dfs_state_str[status->move_status]);
|
|
return bytes_written;
|
|
} else {
|
|
bytes_written = snprintf(command, total_len, "dfs AP move in IDLE state\n");
|
|
return bytes_written;
|
|
}
|
|
}
|
|
|
|
abort = bcm_atoi(data);
|
|
if (abort == -1) {
|
|
if ((err = wldev_iovar_setbuf(ndev, "dfs_ap_move", &abort,
|
|
sizeof(int), ioctl_buf, sizeof(ioctl_buf), NULL)) < 0) {
|
|
WL_ERR(("seting dfs_ap_move failed with err %d\n", err));
|
|
return err;
|
|
}
|
|
} else {
|
|
chanspec = wf_chspec_aton(data);
|
|
if (chanspec != 0) {
|
|
val = wl_chspec_host_to_driver(chanspec);
|
|
if (val != INVCHANSPEC) {
|
|
if ((err = wldev_iovar_setbuf(ndev, "dfs_ap_move", &val,
|
|
sizeof(int), ioctl_buf, sizeof(ioctl_buf), NULL)) < 0) {
|
|
WL_ERR(("seting dfs_ap_move failed with err %d\n", err));
|
|
return err;
|
|
}
|
|
WL_DBG((" set dfs_ap_move successfull"));
|
|
} else {
|
|
err = BCME_USAGE_ERROR;
|
|
}
|
|
}
|
|
}
|
|
return err;
|
|
}
|
|
|
|
bool wl_cfg80211_is_concurrent_mode(struct net_device *dev)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(dev);
|
|
if ((cfg) && (wl_get_drv_status_all(cfg, CONNECTED) > 1)) {
|
|
return true;
|
|
} else {
|
|
return false;
|
|
}
|
|
}
|
|
|
|
void* wl_cfg80211_get_dhdp(struct net_device *dev)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(dev);
|
|
|
|
return cfg->pub;
|
|
}
|
|
|
|
bool wl_cfg80211_is_p2p_active(struct net_device *dev)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(dev);
|
|
return (cfg && cfg->p2p);
|
|
}
|
|
|
|
bool wl_cfg80211_is_roam_offload(struct net_device * dev)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(dev);
|
|
return (cfg && cfg->roam_offload);
|
|
}
|
|
|
|
bool wl_cfg80211_is_event_from_connected_bssid(struct net_device * dev, const wl_event_msg_t *e,
|
|
int ifidx)
|
|
{
|
|
u8 *curbssid = NULL;
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(dev);
|
|
|
|
if (!cfg) {
|
|
/* When interface is created using wl
|
|
* ndev->ieee80211_ptr will be NULL.
|
|
*/
|
|
return NULL;
|
|
}
|
|
curbssid = wl_read_prof(cfg, dev, WL_PROF_BSSID);
|
|
|
|
if (memcmp(curbssid, &e->addr, ETHER_ADDR_LEN) == 0) {
|
|
return true;
|
|
}
|
|
return false;
|
|
}
|
|
|
|
static void wl_cfg80211_work_handler(struct work_struct * work)
|
|
{
|
|
struct bcm_cfg80211 *cfg = NULL;
|
|
struct net_info *iter, *next;
|
|
s32 err = BCME_OK;
|
|
s32 pm = PM_FAST;
|
|
dhd_pub_t *dhd;
|
|
BCM_SET_CONTAINER_OF(cfg, work, struct bcm_cfg80211, pm_enable_work.work);
|
|
WL_DBG(("Enter \n"));
|
|
GCC_DIAGNOSTIC_PUSH_SUPPRESS_CAST();
|
|
for_each_ndev(cfg, iter, next) {
|
|
GCC_DIAGNOSTIC_POP();
|
|
/* p2p discovery iface ndev could be null */
|
|
if (iter->ndev) {
|
|
if (!wl_get_drv_status(cfg, CONNECTED, iter->ndev) ||
|
|
(wl_get_mode_by_netdev(cfg, iter->ndev) != WL_MODE_BSS &&
|
|
wl_get_mode_by_netdev(cfg, iter->ndev) != WL_MODE_IBSS))
|
|
continue;
|
|
if (iter->ndev) {
|
|
dhd = (dhd_pub_t *)(cfg->pub);
|
|
if (dhd_conf_get_pm(dhd) >= 0)
|
|
pm = dhd_conf_get_pm(dhd);
|
|
if ((err = wldev_ioctl_set(iter->ndev, WLC_SET_PM,
|
|
&pm, sizeof(pm))) != 0) {
|
|
if (err == -ENODEV)
|
|
WL_DBG(("%s:netdev not ready\n",
|
|
iter->ndev->name));
|
|
else
|
|
WL_ERR(("%s:error (%d)\n",
|
|
iter->ndev->name, err));
|
|
} else
|
|
wl_cfg80211_update_power_mode(iter->ndev);
|
|
}
|
|
}
|
|
}
|
|
DHD_PM_WAKE_UNLOCK(cfg->pub);
|
|
}
|
|
|
|
u8
|
|
wl_get_action_category(void *frame, u32 frame_len)
|
|
{
|
|
u8 category;
|
|
u8 *ptr = (u8 *)frame;
|
|
if (frame == NULL)
|
|
return DOT11_ACTION_CAT_ERR_MASK;
|
|
if (frame_len < DOT11_ACTION_HDR_LEN)
|
|
return DOT11_ACTION_CAT_ERR_MASK;
|
|
category = ptr[DOT11_ACTION_CAT_OFF];
|
|
WL_DBG(("Action Category: %d\n", category));
|
|
return category;
|
|
}
|
|
|
|
int
|
|
wl_get_public_action(void *frame, u32 frame_len, u8 *ret_action)
|
|
{
|
|
u8 *ptr = (u8 *)frame;
|
|
if (frame == NULL || ret_action == NULL)
|
|
return BCME_ERROR;
|
|
if (frame_len < DOT11_ACTION_HDR_LEN)
|
|
return BCME_ERROR;
|
|
if (DOT11_ACTION_CAT_PUBLIC != wl_get_action_category(frame, frame_len))
|
|
return BCME_ERROR;
|
|
*ret_action = ptr[DOT11_ACTION_ACT_OFF];
|
|
WL_DBG(("Public Action : %d\n", *ret_action));
|
|
return BCME_OK;
|
|
}
|
|
|
|
#ifdef WLFBT
|
|
int
|
|
wl_cfg80211_get_fbt_key(struct net_device *dev, uint8 *key, int total_len)
|
|
{
|
|
struct bcm_cfg80211 * cfg = wl_get_cfg(dev);
|
|
int bytes_written = -1;
|
|
|
|
if (total_len < FBT_KEYLEN) {
|
|
WL_ERR(("wl_cfg80211_get_fbt_key: Insufficient buffer \n"));
|
|
goto end;
|
|
}
|
|
if (cfg) {
|
|
memcpy(key, cfg->fbt_key, FBT_KEYLEN);
|
|
bytes_written = FBT_KEYLEN;
|
|
} else {
|
|
bzero(key, FBT_KEYLEN);
|
|
WL_ERR(("wl_cfg80211_get_fbt_key: Failed to copy KCK and KEK \n"));
|
|
}
|
|
prhex("KCK, KEK", (uchar *)key, FBT_KEYLEN);
|
|
end:
|
|
return bytes_written;
|
|
}
|
|
#endif /* WLFBT */
|
|
|
|
static int
|
|
wl_cfg80211_delayed_roam(struct bcm_cfg80211 *cfg, struct net_device *ndev,
|
|
const struct ether_addr *bssid)
|
|
{
|
|
s32 err;
|
|
wl_event_msg_t e;
|
|
|
|
bzero(&e, sizeof(e));
|
|
e.event_type = cpu_to_be32(WLC_E_ROAM);
|
|
memcpy(&e.addr, bssid, ETHER_ADDR_LEN);
|
|
/* trigger the roam event handler */
|
|
err = wl_notify_roaming_status(cfg, ndev_to_cfgdev(ndev), &e, NULL);
|
|
|
|
return err;
|
|
}
|
|
|
|
static s32
|
|
wl_cfg80211_parse_vndr_ies(const u8 *parse, u32 len,
|
|
struct parsed_vndr_ies *vndr_ies)
|
|
{
|
|
s32 err = BCME_OK;
|
|
const vndr_ie_t *vndrie;
|
|
const bcm_tlv_t *ie;
|
|
struct parsed_vndr_ie_info *parsed_info;
|
|
u32 count = 0;
|
|
u32 remained_len;
|
|
|
|
remained_len = len;
|
|
bzero(vndr_ies, sizeof(*vndr_ies));
|
|
|
|
WL_DBG(("---> len %d\n", len));
|
|
ie = (const bcm_tlv_t *) parse;
|
|
if (!bcm_valid_tlv(ie, remained_len))
|
|
ie = NULL;
|
|
while (ie) {
|
|
if (count >= MAX_VNDR_IE_NUMBER)
|
|
break;
|
|
if (ie->id == DOT11_MNG_VS_ID || (ie->id == DOT11_MNG_ID_EXT_ID)) {
|
|
vndrie = (const vndr_ie_t *) ie;
|
|
if (ie->id == DOT11_MNG_ID_EXT_ID) {
|
|
/* len should be bigger than sizeof ID extn field at least */
|
|
if (vndrie->len < MIN_VENDOR_EXTN_IE_LEN) {
|
|
WL_ERR(("%s: invalid vndr extn ie."
|
|
" length %d\n",
|
|
__FUNCTION__, vndrie->len));
|
|
goto end;
|
|
}
|
|
} else {
|
|
/* len should be bigger than OUI length +
|
|
* one data length at least
|
|
*/
|
|
if (vndrie->len < (VNDR_IE_MIN_LEN + 1)) {
|
|
WL_ERR(("wl_cfg80211_parse_vndr_ies:"
|
|
" invalid vndr ie. length is too small %d\n",
|
|
vndrie->len));
|
|
goto end;
|
|
}
|
|
|
|
/* if wpa or wme ie, do not add ie */
|
|
if (!bcmp(vndrie->oui, (u8*)WPA_OUI, WPA_OUI_LEN) &&
|
|
((vndrie->data[0] == WPA_OUI_TYPE) ||
|
|
(vndrie->data[0] == WME_OUI_TYPE))) {
|
|
CFGP2P_DBG(("Found WPA/WME oui. Do not add it\n"));
|
|
goto end;
|
|
}
|
|
}
|
|
|
|
parsed_info = &vndr_ies->ie_info[count++];
|
|
|
|
/* save vndr ie information */
|
|
parsed_info->ie_ptr = (const char *)vndrie;
|
|
parsed_info->ie_len = (vndrie->len + TLV_HDR_LEN);
|
|
memcpy(&parsed_info->vndrie, vndrie, sizeof(vndr_ie_t));
|
|
vndr_ies->count = count;
|
|
if (ie->id == DOT11_MNG_ID_EXT_ID) {
|
|
WL_DBG(("\t ** Vendor Extension ie id: 0x%02x, len:%d\n",
|
|
ie->id, parsed_info->ie_len));
|
|
} else {
|
|
WL_DBG(("\t ** OUI "MACOUIDBG", type 0x%02x len:%d\n",
|
|
MACOUI2STRDBG(parsed_info->vndrie.oui),
|
|
parsed_info->vndrie.data[0], parsed_info->ie_len));
|
|
}
|
|
}
|
|
end:
|
|
ie = bcm_next_tlv(ie, &remained_len);
|
|
}
|
|
return err;
|
|
}
|
|
|
|
static bool
|
|
wl_vndr_ies_exclude_vndr_oui(struct parsed_vndr_ie_info *vndr_info)
|
|
{
|
|
int i = 0;
|
|
|
|
while (exclude_vndr_oui_list[i]) {
|
|
if (!memcmp(vndr_info->vndrie.oui,
|
|
exclude_vndr_oui_list[i],
|
|
DOT11_OUI_LEN)) {
|
|
return TRUE;
|
|
}
|
|
i++;
|
|
}
|
|
|
|
return FALSE;
|
|
}
|
|
|
|
static bool
|
|
wl_vndr_ies_check_duplicate_vndr_oui(struct bcm_cfg80211 *cfg,
|
|
struct parsed_vndr_ie_info *vndr_info)
|
|
{
|
|
wl_vndr_oui_entry_t *oui_entry = NULL;
|
|
unsigned long flags;
|
|
|
|
WL_CFG_VNDR_OUI_SYNC_LOCK(&cfg->vndr_oui_sync, flags);
|
|
GCC_DIAGNOSTIC_PUSH_SUPPRESS_CAST();
|
|
list_for_each_entry(oui_entry, &cfg->vndr_oui_list, list) {
|
|
GCC_DIAGNOSTIC_POP();
|
|
if (!memcmp(oui_entry->oui, vndr_info->vndrie.oui, DOT11_OUI_LEN)) {
|
|
WL_CFG_VNDR_OUI_SYNC_UNLOCK(&cfg->vndr_oui_sync, flags);
|
|
return TRUE;
|
|
}
|
|
}
|
|
WL_CFG_VNDR_OUI_SYNC_UNLOCK(&cfg->vndr_oui_sync, flags);
|
|
return FALSE;
|
|
}
|
|
|
|
static bool
|
|
wl_vndr_ies_add_vendor_oui_list(struct bcm_cfg80211 *cfg,
|
|
struct parsed_vndr_ie_info *vndr_info)
|
|
{
|
|
wl_vndr_oui_entry_t *oui_entry = NULL;
|
|
unsigned long flags;
|
|
|
|
oui_entry = kmalloc(sizeof(*oui_entry), GFP_KERNEL);
|
|
if (oui_entry == NULL) {
|
|
WL_ERR(("alloc failed\n"));
|
|
return FALSE;
|
|
}
|
|
|
|
memcpy(oui_entry->oui, vndr_info->vndrie.oui, DOT11_OUI_LEN);
|
|
|
|
INIT_LIST_HEAD(&oui_entry->list);
|
|
WL_CFG_VNDR_OUI_SYNC_LOCK(&cfg->vndr_oui_sync, flags);
|
|
list_add_tail(&oui_entry->list, &cfg->vndr_oui_list);
|
|
WL_CFG_VNDR_OUI_SYNC_UNLOCK(&cfg->vndr_oui_sync, flags);
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
static void
|
|
wl_vndr_ies_clear_vendor_oui_list(struct bcm_cfg80211 *cfg)
|
|
{
|
|
wl_vndr_oui_entry_t *oui_entry = NULL;
|
|
unsigned long flags;
|
|
|
|
WL_CFG_VNDR_OUI_SYNC_LOCK(&cfg->vndr_oui_sync, flags);
|
|
while (!list_empty(&cfg->vndr_oui_list)) {
|
|
GCC_DIAGNOSTIC_PUSH_SUPPRESS_CAST();
|
|
oui_entry = list_entry(cfg->vndr_oui_list.next, wl_vndr_oui_entry_t, list);
|
|
GCC_DIAGNOSTIC_POP();
|
|
if (oui_entry) {
|
|
list_del(&oui_entry->list);
|
|
kfree(oui_entry);
|
|
}
|
|
}
|
|
WL_CFG_VNDR_OUI_SYNC_UNLOCK(&cfg->vndr_oui_sync, flags);
|
|
}
|
|
|
|
static int
|
|
wl_vndr_ies_get_vendor_oui(struct bcm_cfg80211 *cfg, struct net_device *ndev,
|
|
char *vndr_oui, u32 vndr_oui_len)
|
|
{
|
|
int i;
|
|
int vndr_oui_num = 0;
|
|
|
|
struct wl_connect_info *conn_info = wl_to_conn(cfg);
|
|
wl_vndr_oui_entry_t *oui_entry = NULL;
|
|
struct parsed_vndr_ie_info *vndr_info;
|
|
struct parsed_vndr_ies vndr_ies;
|
|
|
|
char *pos = vndr_oui;
|
|
u32 remained_buf_len = vndr_oui_len;
|
|
unsigned long flags;
|
|
|
|
if (!conn_info->resp_ie_len) {
|
|
return BCME_ERROR;
|
|
}
|
|
|
|
wl_vndr_ies_clear_vendor_oui_list(cfg);
|
|
|
|
if ((wl_cfg80211_parse_vndr_ies((u8 *)conn_info->resp_ie,
|
|
conn_info->resp_ie_len, &vndr_ies)) == BCME_OK) {
|
|
for (i = 0; i < vndr_ies.count; i++) {
|
|
vndr_info = &vndr_ies.ie_info[i];
|
|
if (wl_vndr_ies_exclude_vndr_oui(vndr_info)) {
|
|
continue;
|
|
}
|
|
|
|
if (wl_vndr_ies_check_duplicate_vndr_oui(cfg, vndr_info)) {
|
|
continue;
|
|
}
|
|
|
|
wl_vndr_ies_add_vendor_oui_list(cfg, vndr_info);
|
|
vndr_oui_num++;
|
|
}
|
|
}
|
|
|
|
if (vndr_oui) {
|
|
WL_CFG_VNDR_OUI_SYNC_LOCK(&cfg->vndr_oui_sync, flags);
|
|
GCC_DIAGNOSTIC_PUSH_SUPPRESS_CAST();
|
|
list_for_each_entry(oui_entry, &cfg->vndr_oui_list, list) {
|
|
GCC_DIAGNOSTIC_POP();
|
|
if (remained_buf_len < VNDR_OUI_STR_LEN) {
|
|
WL_CFG_VNDR_OUI_SYNC_UNLOCK(&cfg->vndr_oui_sync, flags);
|
|
return BCME_ERROR;
|
|
}
|
|
pos += snprintf(pos, VNDR_OUI_STR_LEN, "%02X-%02X-%02X ",
|
|
oui_entry->oui[0], oui_entry->oui[1], oui_entry->oui[2]);
|
|
remained_buf_len -= VNDR_OUI_STR_LEN;
|
|
}
|
|
WL_CFG_VNDR_OUI_SYNC_UNLOCK(&cfg->vndr_oui_sync, flags);
|
|
}
|
|
|
|
return vndr_oui_num;
|
|
}
|
|
|
|
void
|
|
wl_cfg80211_clear_p2p_disc_ies(struct bcm_cfg80211 *cfg)
|
|
{
|
|
/* Legacy P2P used to store it in primary dev cache */
|
|
s32 index;
|
|
struct net_device *ndev;
|
|
s32 bssidx;
|
|
s32 ret;
|
|
s32 vndrie_flag[] = {VNDR_IE_BEACON_FLAG, VNDR_IE_PRBRSP_FLAG,
|
|
VNDR_IE_ASSOCRSP_FLAG, VNDR_IE_PRBREQ_FLAG, VNDR_IE_ASSOCREQ_FLAG};
|
|
|
|
WL_DBG(("Clear IEs for P2P Discovery Iface \n"));
|
|
/* certain vendors uses p2p0 interface in addition to
|
|
* the dedicated p2p interface supported by the linux
|
|
* kernel.
|
|
*/
|
|
ndev = wl_to_p2p_bss_ndev(cfg, P2PAPI_BSSCFG_PRIMARY);
|
|
bssidx = wl_to_p2p_bss_bssidx(cfg, P2PAPI_BSSCFG_DEVICE);
|
|
if (bssidx == WL_INVALID) {
|
|
WL_DBG(("No discovery I/F available. Do nothing.\n"));
|
|
return;
|
|
}
|
|
|
|
for (index = 0; index < ARRAYSIZE(vndrie_flag); index++) {
|
|
if ((ret = wl_cfg80211_set_mgmt_vndr_ies(cfg, ndev_to_cfgdev(ndev),
|
|
bssidx, vndrie_flag[index], NULL, 0)) < 0) {
|
|
if (ret != BCME_NOTFOUND) {
|
|
WL_ERR(("vndr_ies clear failed (%d). Ignoring.. \n", ret));
|
|
}
|
|
}
|
|
}
|
|
|
|
if (cfg->p2p_wdev && (ndev->ieee80211_ptr != cfg->p2p_wdev)) {
|
|
/* clear IEs for dedicated p2p interface */
|
|
wl_cfg80211_clear_per_bss_ies(cfg, cfg->p2p_wdev);
|
|
}
|
|
}
|
|
|
|
s32
|
|
wl_cfg80211_clear_per_bss_ies(struct bcm_cfg80211 *cfg, struct wireless_dev *wdev)
|
|
{
|
|
s32 index;
|
|
s32 ret;
|
|
struct net_info *netinfo;
|
|
s32 vndrie_flag[] = {VNDR_IE_BEACON_FLAG, VNDR_IE_PRBRSP_FLAG,
|
|
VNDR_IE_ASSOCRSP_FLAG, VNDR_IE_PRBREQ_FLAG, VNDR_IE_ASSOCREQ_FLAG};
|
|
|
|
netinfo = wl_get_netinfo_by_wdev(cfg, wdev);
|
|
if (!netinfo || !netinfo->wdev) {
|
|
WL_ERR(("netinfo or netinfo->wdev is NULL\n"));
|
|
return -1;
|
|
}
|
|
|
|
WL_DBG(("clear management vendor IEs for bssidx:%d \n", netinfo->bssidx));
|
|
/* Clear the IEs set in the firmware so that host is in sync with firmware */
|
|
for (index = 0; index < ARRAYSIZE(vndrie_flag); index++) {
|
|
if ((ret = wl_cfg80211_set_mgmt_vndr_ies(cfg, wdev_to_cfgdev(netinfo->wdev),
|
|
netinfo->bssidx, vndrie_flag[index], NULL, 0)) < 0)
|
|
if (ret != BCME_NOTFOUND) {
|
|
WL_ERR(("vndr_ies clear failed. Ignoring.. \n"));
|
|
}
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
s32
|
|
wl_cfg80211_clear_mgmt_vndr_ies(struct bcm_cfg80211 *cfg)
|
|
{
|
|
struct net_info *iter, *next;
|
|
|
|
WL_DBG(("clear management vendor IEs \n"));
|
|
GCC_DIAGNOSTIC_PUSH_SUPPRESS_CAST();
|
|
for_each_ndev(cfg, iter, next) {
|
|
GCC_DIAGNOSTIC_POP();
|
|
wl_cfg80211_clear_per_bss_ies(cfg, iter->wdev);
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
#define WL_VNDR_IE_MAXLEN 2048
|
|
static s8 g_mgmt_ie_buf[WL_VNDR_IE_MAXLEN];
|
|
int
|
|
wl_cfg80211_set_mgmt_vndr_ies(struct bcm_cfg80211 *cfg, bcm_struct_cfgdev *cfgdev,
|
|
s32 bssidx, s32 pktflag, const u8 *vndr_ie, u32 vndr_ie_len)
|
|
{
|
|
struct net_device *ndev = NULL;
|
|
s32 ret = BCME_OK;
|
|
u8 *curr_ie_buf = NULL;
|
|
u8 *mgmt_ie_buf = NULL;
|
|
u32 mgmt_ie_buf_len = 0;
|
|
u32 *mgmt_ie_len = 0;
|
|
u32 del_add_ie_buf_len = 0;
|
|
u32 total_ie_buf_len = 0;
|
|
u32 parsed_ie_buf_len = 0;
|
|
struct parsed_vndr_ies old_vndr_ies;
|
|
struct parsed_vndr_ies new_vndr_ies;
|
|
s32 i;
|
|
u8 *ptr;
|
|
s32 remained_buf_len;
|
|
wl_bss_vndr_ies_t *ies = NULL;
|
|
struct net_info *netinfo;
|
|
struct wireless_dev *wdev;
|
|
|
|
if (!cfgdev) {
|
|
WL_ERR(("cfgdev is NULL\n"));
|
|
return -EINVAL;
|
|
}
|
|
|
|
ndev = cfgdev_to_wlc_ndev(cfgdev, cfg);
|
|
wdev = cfgdev_to_wdev(cfgdev);
|
|
|
|
if (bssidx > WL_MAX_IFS) {
|
|
WL_ERR(("bssidx > supported concurrent Ifaces \n"));
|
|
return -EINVAL;
|
|
}
|
|
|
|
netinfo = wl_get_netinfo_by_wdev(cfg, wdev);
|
|
if (!netinfo) {
|
|
WL_ERR(("net_info ptr is NULL \n"));
|
|
return -EINVAL;
|
|
}
|
|
|
|
/* Clear the global buffer */
|
|
bzero(g_mgmt_ie_buf, sizeof(g_mgmt_ie_buf));
|
|
curr_ie_buf = g_mgmt_ie_buf;
|
|
ies = &netinfo->bss.ies;
|
|
|
|
WL_DBG(("Enter. pktflag:0x%x bssidx:%x vnd_ie_len:%d wdev:%p\n",
|
|
pktflag, bssidx, vndr_ie_len, wdev));
|
|
|
|
switch (pktflag) {
|
|
case VNDR_IE_PRBRSP_FLAG :
|
|
mgmt_ie_buf = ies->probe_res_ie;
|
|
mgmt_ie_len = &ies->probe_res_ie_len;
|
|
mgmt_ie_buf_len = sizeof(ies->probe_res_ie);
|
|
break;
|
|
case VNDR_IE_ASSOCRSP_FLAG :
|
|
mgmt_ie_buf = ies->assoc_res_ie;
|
|
mgmt_ie_len = &ies->assoc_res_ie_len;
|
|
mgmt_ie_buf_len = sizeof(ies->assoc_res_ie);
|
|
break;
|
|
case VNDR_IE_BEACON_FLAG :
|
|
mgmt_ie_buf = ies->beacon_ie;
|
|
mgmt_ie_len = &ies->beacon_ie_len;
|
|
mgmt_ie_buf_len = sizeof(ies->beacon_ie);
|
|
break;
|
|
case VNDR_IE_PRBREQ_FLAG :
|
|
mgmt_ie_buf = ies->probe_req_ie;
|
|
mgmt_ie_len = &ies->probe_req_ie_len;
|
|
mgmt_ie_buf_len = sizeof(ies->probe_req_ie);
|
|
break;
|
|
case VNDR_IE_ASSOCREQ_FLAG :
|
|
mgmt_ie_buf = ies->assoc_req_ie;
|
|
mgmt_ie_len = &ies->assoc_req_ie_len;
|
|
mgmt_ie_buf_len = sizeof(ies->assoc_req_ie);
|
|
break;
|
|
case VNDR_IE_DISASSOC_FLAG :
|
|
mgmt_ie_buf = ies->disassoc_ie;
|
|
mgmt_ie_len = &ies->disassoc_ie_len;
|
|
mgmt_ie_buf_len = sizeof(ies->disassoc_ie);
|
|
break;
|
|
default:
|
|
mgmt_ie_buf = NULL;
|
|
mgmt_ie_len = NULL;
|
|
WL_ERR(("not suitable packet type (%d)\n", pktflag));
|
|
return BCME_ERROR;
|
|
}
|
|
|
|
if (vndr_ie_len > mgmt_ie_buf_len) {
|
|
WL_ERR(("extra IE size too big\n"));
|
|
ret = -ENOMEM;
|
|
} else {
|
|
/* parse and save new vndr_ie in curr_ie_buff before comparing it */
|
|
if (vndr_ie && vndr_ie_len && curr_ie_buf) {
|
|
ptr = curr_ie_buf;
|
|
|
|
if ((ret = wl_cfg80211_parse_vndr_ies((const u8 *)vndr_ie,
|
|
vndr_ie_len, &new_vndr_ies)) < 0) {
|
|
WL_ERR(("parse vndr ie failed \n"));
|
|
goto exit;
|
|
}
|
|
|
|
for (i = 0; i < new_vndr_ies.count; i++) {
|
|
struct parsed_vndr_ie_info *vndrie_info =
|
|
&new_vndr_ies.ie_info[i];
|
|
|
|
if ((parsed_ie_buf_len + vndrie_info->ie_len) > WL_VNDR_IE_MAXLEN) {
|
|
WL_ERR(("IE size is too big (%d > %d)\n",
|
|
parsed_ie_buf_len, WL_VNDR_IE_MAXLEN));
|
|
ret = -EINVAL;
|
|
goto exit;
|
|
}
|
|
|
|
memcpy(ptr + parsed_ie_buf_len, vndrie_info->ie_ptr,
|
|
vndrie_info->ie_len);
|
|
parsed_ie_buf_len += vndrie_info->ie_len;
|
|
}
|
|
}
|
|
|
|
if (mgmt_ie_buf != NULL) {
|
|
if (parsed_ie_buf_len && (parsed_ie_buf_len == *mgmt_ie_len) &&
|
|
(memcmp(mgmt_ie_buf, curr_ie_buf, parsed_ie_buf_len) == 0)) {
|
|
WL_DBG(("Previous mgmt IE is equals to current IE"));
|
|
goto exit;
|
|
}
|
|
|
|
/* parse old vndr_ie */
|
|
if ((ret = wl_cfg80211_parse_vndr_ies(mgmt_ie_buf, *mgmt_ie_len,
|
|
&old_vndr_ies)) < 0) {
|
|
WL_ERR(("parse vndr ie failed \n"));
|
|
goto exit;
|
|
}
|
|
/* make a command to delete old ie */
|
|
for (i = 0; i < old_vndr_ies.count; i++) {
|
|
struct parsed_vndr_ie_info *vndrie_info =
|
|
&old_vndr_ies.ie_info[i];
|
|
#if defined(WL_MBO) || defined(WL_OCE)
|
|
{
|
|
if ((vndrie_info->vndrie.id == 0xDD) &&
|
|
(!memcmp(vndrie_info->vndrie.oui, WFA_OUI, WFA_OUI_LEN)) &&
|
|
(vndrie_info->vndrie.data[0] == WFA_OUI_TYPE_MBO_OCE)) {
|
|
WL_DBG(("skipping ID : %d, Len: %d, OUI:"MACOUIDBG
|
|
", type: %0x\n",
|
|
vndrie_info->vndrie.id,
|
|
vndrie_info->vndrie.len,
|
|
MACOUI2STRDBG(vndrie_info->vndrie.oui),
|
|
vndrie_info->vndrie.data[0]));
|
|
continue;
|
|
}
|
|
}
|
|
#endif /* WL_MBO || WL_OCE */
|
|
|
|
if (vndrie_info->vndrie.id == DOT11_MNG_ID_EXT_ID) {
|
|
WL_DBG(("DELETED VENDOR EXTN ID : %d, TYPE: %d Len: %d\n",
|
|
vndrie_info->vndrie.id, vndrie_info->vndrie.oui[0],
|
|
vndrie_info->vndrie.len));
|
|
} else {
|
|
WL_DBG(("DELETED ID : %d, Len: %d , OUI:"MACOUIDBG"\n",
|
|
vndrie_info->vndrie.id, vndrie_info->vndrie.len,
|
|
MACOUI2STRDBG(vndrie_info->vndrie.oui)));
|
|
}
|
|
|
|
del_add_ie_buf_len = wl_cfgp2p_vndr_ie(cfg, curr_ie_buf,
|
|
pktflag, vndrie_info->vndrie.oui,
|
|
vndrie_info->vndrie.id,
|
|
vndrie_info->ie_ptr + VNDR_IE_FIXED_LEN,
|
|
vndrie_info->ie_len - VNDR_IE_FIXED_LEN,
|
|
"del");
|
|
|
|
curr_ie_buf += del_add_ie_buf_len;
|
|
total_ie_buf_len += del_add_ie_buf_len;
|
|
}
|
|
}
|
|
|
|
*mgmt_ie_len = 0;
|
|
/* Add if there is any extra IE */
|
|
if (mgmt_ie_buf && parsed_ie_buf_len) {
|
|
ptr = mgmt_ie_buf;
|
|
|
|
remained_buf_len = mgmt_ie_buf_len;
|
|
|
|
/* make a command to add new ie */
|
|
for (i = 0; i < new_vndr_ies.count; i++) {
|
|
struct parsed_vndr_ie_info *vndrie_info =
|
|
&new_vndr_ies.ie_info[i];
|
|
#if defined(WL_MBO) || defined(WL_OCE)
|
|
{
|
|
if ((vndrie_info->vndrie.id == 0xDD) &&
|
|
(!memcmp(vndrie_info->vndrie.oui, WFA_OUI, WFA_OUI_LEN)) &&
|
|
(vndrie_info->vndrie.data[0] == WFA_OUI_TYPE_MBO_OCE)) {
|
|
WL_DBG(("skipping ID : %d, Len: %d, OUI:"MACOUIDBG
|
|
",type :%0x\n",
|
|
vndrie_info->vndrie.id,
|
|
vndrie_info->vndrie.len,
|
|
MACOUI2STRDBG(vndrie_info->vndrie.oui),
|
|
vndrie_info->vndrie.data[0]));
|
|
continue;
|
|
}
|
|
}
|
|
#endif /* WL_MBO || WL_OCE */
|
|
if (vndrie_info->vndrie.id == DOT11_MNG_ID_EXT_ID) {
|
|
WL_DBG(("ADDED VENDOR EXTN ID : %d, TYPE = %d, Len: %d\n",
|
|
vndrie_info->vndrie.id, vndrie_info->vndrie.oui[0],
|
|
vndrie_info->vndrie.len));
|
|
} else {
|
|
WL_DBG(("ADDED ID : %d, Len: %d(%d), OUI:"MACOUIDBG"\n",
|
|
vndrie_info->vndrie.id, vndrie_info->vndrie.len,
|
|
vndrie_info->ie_len - 2,
|
|
MACOUI2STRDBG(vndrie_info->vndrie.oui)));
|
|
}
|
|
|
|
del_add_ie_buf_len = wl_cfgp2p_vndr_ie(cfg, curr_ie_buf,
|
|
pktflag, vndrie_info->vndrie.oui,
|
|
vndrie_info->vndrie.id,
|
|
vndrie_info->ie_ptr + VNDR_IE_FIXED_LEN,
|
|
vndrie_info->ie_len - VNDR_IE_FIXED_LEN,
|
|
"add");
|
|
|
|
/* verify remained buf size before copy data */
|
|
if (remained_buf_len >= vndrie_info->ie_len) {
|
|
remained_buf_len -= vndrie_info->ie_len;
|
|
} else {
|
|
WL_ERR(("no space in mgmt_ie_buf: pktflag = %d, "
|
|
"found vndr ies # = %d(cur %d), remained len %d, "
|
|
"cur mgmt_ie_len %d, new ie len = %d\n",
|
|
pktflag, new_vndr_ies.count, i, remained_buf_len,
|
|
*mgmt_ie_len, vndrie_info->ie_len));
|
|
break;
|
|
}
|
|
|
|
/* save the parsed IE in cfg struct */
|
|
memcpy(ptr + (*mgmt_ie_len), vndrie_info->ie_ptr,
|
|
vndrie_info->ie_len);
|
|
*mgmt_ie_len += vndrie_info->ie_len;
|
|
curr_ie_buf += del_add_ie_buf_len;
|
|
total_ie_buf_len += del_add_ie_buf_len;
|
|
}
|
|
}
|
|
|
|
if (total_ie_buf_len && cfg->ioctl_buf != NULL) {
|
|
ret = wldev_iovar_setbuf_bsscfg(ndev, "vndr_ie", g_mgmt_ie_buf,
|
|
total_ie_buf_len, cfg->ioctl_buf, WLC_IOCTL_MAXLEN,
|
|
bssidx, &cfg->ioctl_buf_sync);
|
|
if (ret)
|
|
WL_ERR(("vndr ie set error : %d\n", ret));
|
|
}
|
|
}
|
|
exit:
|
|
|
|
return ret;
|
|
}
|
|
|
|
#ifdef WL_CFG80211_ACL
|
|
static int
|
|
wl_cfg80211_set_mac_acl(struct wiphy *wiphy, struct net_device *cfgdev,
|
|
const struct cfg80211_acl_data *acl)
|
|
{
|
|
int i;
|
|
int ret = 0;
|
|
int macnum = 0;
|
|
int macmode = MACLIST_MODE_DISABLED;
|
|
struct maclist *list;
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(cfgdev);
|
|
|
|
/* get the MAC filter mode */
|
|
if (acl && acl->acl_policy == NL80211_ACL_POLICY_DENY_UNLESS_LISTED) {
|
|
macmode = MACLIST_MODE_ALLOW;
|
|
} else if (acl && acl->acl_policy == NL80211_ACL_POLICY_ACCEPT_UNLESS_LISTED &&
|
|
acl->n_acl_entries) {
|
|
macmode = MACLIST_MODE_DENY;
|
|
}
|
|
|
|
/* if acl == NULL, macmode is still disabled.. */
|
|
if (macmode == MACLIST_MODE_DISABLED) {
|
|
if ((ret = wl_android_set_ap_mac_list(cfgdev, macmode, NULL)) != 0)
|
|
WL_ERR(("wl_cfg80211_set_mac_acl: Setting MAC list"
|
|
" failed error=%d\n", ret));
|
|
|
|
return ret;
|
|
}
|
|
|
|
macnum = acl->n_acl_entries;
|
|
if (macnum < 0 || macnum > MAX_NUM_MAC_FILT) {
|
|
WL_ERR(("wl_cfg80211_set_mac_acl: invalid number of MAC address entries %d\n",
|
|
macnum));
|
|
return -1;
|
|
}
|
|
|
|
/* allocate memory for the MAC list */
|
|
list = (struct maclist *)MALLOC(cfg->osh, sizeof(int) +
|
|
sizeof(struct ether_addr) * macnum);
|
|
if (!list) {
|
|
WL_ERR(("wl_cfg80211_set_mac_acl: failed to allocate memory\n"));
|
|
return -1;
|
|
}
|
|
|
|
/* prepare the MAC list */
|
|
list->count = htod32(macnum);
|
|
for (i = 0; i < macnum; i++) {
|
|
memcpy(&list->ea[i], &acl->mac_addrs[i], ETHER_ADDR_LEN);
|
|
}
|
|
/* set the list */
|
|
if ((ret = wl_android_set_ap_mac_list(cfgdev, macmode, list)) != 0)
|
|
WL_ERR(("wl_cfg80211_set_mac_acl: Setting MAC list failed error=%d\n", ret));
|
|
|
|
MFREE(cfg->osh, list, sizeof(int) +
|
|
sizeof(struct ether_addr) * macnum);
|
|
|
|
return ret;
|
|
}
|
|
#endif /* WL_CFG80211_ACL */
|
|
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 5, 0))
|
|
int wl_chspec_chandef(chanspec_t chanspec,
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 8, 0))
|
|
struct cfg80211_chan_def *chandef,
|
|
#elif (LINUX_VERSION_CODE >= KERNEL_VERSION (3, 5, 0) && (LINUX_VERSION_CODE <= (3, 7, 0)))
|
|
struct chan_info *chaninfo,
|
|
#endif /* (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 5, 0)) */
|
|
struct wiphy *wiphy)
|
|
{
|
|
uint16 freq = 0;
|
|
int chan_type = 0;
|
|
int channel = 0;
|
|
struct ieee80211_channel *chan;
|
|
|
|
if (!chandef) {
|
|
return -1;
|
|
}
|
|
channel = CHSPEC_CHANNEL(chanspec);
|
|
|
|
switch (CHSPEC_BW(chanspec)) {
|
|
case WL_CHANSPEC_BW_20:
|
|
chan_type = NL80211_CHAN_HT20;
|
|
break;
|
|
case WL_CHANSPEC_BW_40:
|
|
{
|
|
if (CHSPEC_SB_UPPER(chanspec)) {
|
|
channel += CH_10MHZ_APART;
|
|
} else {
|
|
channel -= CH_10MHZ_APART;
|
|
}
|
|
}
|
|
chan_type = NL80211_CHAN_HT40PLUS;
|
|
break;
|
|
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION (3, 8, 0))
|
|
case WL_CHANSPEC_BW_80:
|
|
case WL_CHANSPEC_BW_8080:
|
|
{
|
|
uint16 sb = CHSPEC_CTL_SB(chanspec);
|
|
|
|
if (sb == WL_CHANSPEC_CTL_SB_LL) {
|
|
channel -= (CH_10MHZ_APART + CH_20MHZ_APART);
|
|
} else if (sb == WL_CHANSPEC_CTL_SB_LU) {
|
|
channel -= CH_10MHZ_APART;
|
|
} else if (sb == WL_CHANSPEC_CTL_SB_UL) {
|
|
channel += CH_10MHZ_APART;
|
|
} else {
|
|
/* WL_CHANSPEC_CTL_SB_UU */
|
|
channel += (CH_10MHZ_APART + CH_20MHZ_APART);
|
|
}
|
|
|
|
if (sb == WL_CHANSPEC_CTL_SB_LL || sb == WL_CHANSPEC_CTL_SB_LU)
|
|
chan_type = NL80211_CHAN_HT40MINUS;
|
|
else if (sb == WL_CHANSPEC_CTL_SB_UL || sb == WL_CHANSPEC_CTL_SB_UU)
|
|
chan_type = NL80211_CHAN_HT40PLUS;
|
|
}
|
|
break;
|
|
#endif /* (LINUX_VERSION_CODE >= KERNEL_VERSION (3, 8, 0)) */
|
|
default:
|
|
chan_type = NL80211_CHAN_HT20;
|
|
break;
|
|
|
|
}
|
|
|
|
if (CHSPEC_IS5G(chanspec))
|
|
freq = ieee80211_channel_to_frequency(channel, NL80211_BAND_5GHZ);
|
|
else
|
|
freq = ieee80211_channel_to_frequency(channel, NL80211_BAND_2GHZ);
|
|
|
|
chan = ieee80211_get_channel(wiphy, freq);
|
|
WL_DBG(("channel:%d freq:%d chan_type: %d chan_ptr:%p \n",
|
|
channel, freq, chan_type, chan));
|
|
|
|
if (unlikely(!chan)) {
|
|
/* fw and cfg80211 channel lists are not in sync */
|
|
WL_ERR(("Couldn't find matching channel in wiphy channel list \n"));
|
|
ASSERT(0);
|
|
return -EINVAL;
|
|
}
|
|
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION (3, 8, 0))
|
|
cfg80211_chandef_create(chandef, chan, chan_type);
|
|
#elif (LINUX_VERSION_CODE >= KERNEL_VERSION (3, 5, 0) && (LINUX_VERSION_CODE <= (3, 7, \
|
|
\
|
|
0)))
|
|
chaninfo->freq = freq;
|
|
chaninfo->chan_type = chan_type;
|
|
#endif /* (LINUX_VERSION_CODE >= KERNEL_VERSION (3, 8, 0)) */
|
|
return 0;
|
|
}
|
|
|
|
void
|
|
wl_cfg80211_ch_switch_notify(struct net_device *dev, uint16 chanspec, struct wiphy *wiphy)
|
|
{
|
|
u32 freq;
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION (3, 8, 0))
|
|
struct cfg80211_chan_def chandef;
|
|
#elif (LINUX_VERSION_CODE >= KERNEL_VERSION (3, 5, 0) && (LINUX_VERSION_CODE <= (3, 7, 0)))
|
|
struct chan_info chaninfo;
|
|
#endif /* (LINUX_VERSION_CODE >= KERNEL_VERSION (3, 8, 0)) */
|
|
|
|
if (!wiphy) {
|
|
WL_ERR(("wiphy is null\n"));
|
|
return;
|
|
}
|
|
#if (LINUX_VERSION_CODE <= KERNEL_VERSION (3, 18, 0))
|
|
/* Channel switch support is only for AP/GO/ADHOC/MESH */
|
|
if (dev->ieee80211_ptr->iftype == NL80211_IFTYPE_STATION ||
|
|
dev->ieee80211_ptr->iftype == NL80211_IFTYPE_P2P_CLIENT) {
|
|
WL_ERR(("No channel switch notify support for STA/GC\n"));
|
|
return;
|
|
}
|
|
#endif /* (LINUX_VERSION_CODE <= KERNEL_VERSION (3, 18, 0)) */
|
|
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION (3, 8, 0))
|
|
if (wl_chspec_chandef(chanspec, &chandef, wiphy))
|
|
#elif (LINUX_VERSION_CODE >= KERNEL_VERSION (3, 5, 0) && (LINUX_VERSION_CODE <= (3, 7, 0)))
|
|
if (wl_chspec_chandef(chanspec, &chaninfo, wiphy))
|
|
#endif /* (LINUX_VERSION_CODE >= KERNEL_VERSION (3, 8, 0)) */
|
|
{
|
|
WL_ERR(("chspec_chandef failed\n"));
|
|
return;
|
|
}
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION (3, 8, 0))
|
|
freq = chandef.chan ? chandef.chan->center_freq : chandef.center_freq1;
|
|
cfg80211_ch_switch_notify(dev, &chandef);
|
|
#elif (LINUX_VERSION_CODE >= KERNEL_VERSION (3, 5, 0) && (LINUX_VERSION_CODE <= (3, 7, 0)))
|
|
freq = chan_info.freq;
|
|
cfg80211_ch_switch_notify(dev, freq, chan_info.chan_type);
|
|
#endif /* (LINUX_VERSION_CODE >= KERNEL_VERSION (3, 8, 0)) */
|
|
|
|
WL_MSG(dev->name, "Channel switch notification for freq: %d chanspec: 0x%x\n",
|
|
freq, chanspec);
|
|
return;
|
|
}
|
|
#endif /* LINUX_VERSION_CODE >= (3, 5, 0) */
|
|
|
|
static void
|
|
wl_ap_channel_ind(struct bcm_cfg80211 *cfg,
|
|
struct net_device *ndev,
|
|
chanspec_t chanspec)
|
|
{
|
|
u32 channel = LCHSPEC_CHANNEL(chanspec);
|
|
|
|
WL_INFORM_MEM(("(%s) AP channel:%d chspec:0x%x \n",
|
|
ndev->name, channel, chanspec));
|
|
|
|
#ifdef SUPPORT_AP_BWCTRL
|
|
wl_update_apchan_bwcap(cfg, ndev, chanspec);
|
|
#endif /* SUPPORT_AP_BWCTRL */
|
|
|
|
if (cfg->ap_oper_channel && (cfg->ap_oper_channel != channel)) {
|
|
/*
|
|
* If cached channel is different from the channel indicated
|
|
* by the event, notify user space about the channel switch.
|
|
*/
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 5, 0))
|
|
wl_cfg80211_ch_switch_notify(ndev, chanspec, bcmcfg_to_wiphy(cfg));
|
|
#endif /* LINUX_VERSION_CODE >= (3, 5, 0) */
|
|
cfg->ap_oper_channel = channel;
|
|
}
|
|
}
|
|
|
|
static s32
|
|
wl_ap_start_ind(struct bcm_cfg80211 *cfg, bcm_struct_cfgdev *cfgdev,
|
|
const wl_event_msg_t *e, void *data)
|
|
{
|
|
struct net_device *ndev = NULL;
|
|
chanspec_t chanspec;
|
|
|
|
WL_DBG(("Enter\n"));
|
|
if (unlikely(e->status)) {
|
|
WL_ERR(("status:0x%x \n", e->status));
|
|
return -1;
|
|
}
|
|
|
|
if (!data) {
|
|
return -EINVAL;
|
|
}
|
|
|
|
if (likely(cfgdev)) {
|
|
ndev = cfgdev_to_wlc_ndev(cfgdev, cfg);
|
|
chanspec = *((chanspec_t *)data);
|
|
|
|
if (wl_get_mode_by_netdev(cfg, ndev) == WL_MODE_AP) {
|
|
/* For AP/GO role */
|
|
wl_ap_channel_ind(cfg, ndev, chanspec);
|
|
}
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static s32
|
|
wl_csa_complete_ind(struct bcm_cfg80211 *cfg, bcm_struct_cfgdev *cfgdev,
|
|
const wl_event_msg_t *e, void *data)
|
|
{
|
|
int error = 0;
|
|
u32 chanspec = 0;
|
|
struct net_device *ndev = NULL;
|
|
struct ether_addr bssid;
|
|
|
|
WL_DBG(("Enter\n"));
|
|
if (unlikely(e->status)) {
|
|
WL_ERR(("status:0x%x \n", e->status));
|
|
return -1;
|
|
}
|
|
|
|
if (likely(cfgdev)) {
|
|
ndev = cfgdev_to_wlc_ndev(cfgdev, cfg);
|
|
/* Get association state if not AP and then query chanspec */
|
|
if (!((wl_get_mode_by_netdev(cfg, ndev)) == WL_MODE_AP)) {
|
|
error = wldev_ioctl_get(ndev, WLC_GET_BSSID, &bssid, ETHER_ADDR_LEN);
|
|
if (error) {
|
|
WL_ERR(("CSA on %s. Not associated. error=%d\n",
|
|
ndev->name, error));
|
|
return BCME_ERROR;
|
|
}
|
|
}
|
|
|
|
error = wldev_iovar_getint(ndev, "chanspec", &chanspec);
|
|
if (unlikely(error)) {
|
|
WL_ERR(("Get chanspec error: %d \n", error));
|
|
return -1;
|
|
}
|
|
|
|
WL_INFORM_MEM(("[%s] CSA ind. ch:0x%x\n", ndev->name, chanspec));
|
|
if (wl_get_mode_by_netdev(cfg, ndev) == WL_MODE_AP) {
|
|
/* For AP/GO role */
|
|
wl_ap_channel_ind(cfg, ndev, chanspec);
|
|
} else {
|
|
/* STA/GC roles */
|
|
if (!wl_get_drv_status(cfg, CONNECTED, ndev)) {
|
|
WL_ERR(("CSA on %s. Not associated.\n", ndev->name));
|
|
return BCME_ERROR;
|
|
}
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 5, 0))
|
|
wl_cfg80211_ch_switch_notify(ndev, chanspec, bcmcfg_to_wiphy(cfg));
|
|
#endif /* LINUX_VERSION_CODE >= (3, 5, 0) */
|
|
}
|
|
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
void wl_cfg80211_clear_security(struct bcm_cfg80211 *cfg)
|
|
{
|
|
struct net_device *dev = bcmcfg_to_prmry_ndev(cfg);
|
|
int err;
|
|
|
|
/* Clear the security settings on the primary Interface */
|
|
err = wldev_iovar_setint(dev, "wsec", 0);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("wsec clear failed \n"));
|
|
}
|
|
err = wldev_iovar_setint(dev, "auth", 0);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("auth clear failed \n"));
|
|
}
|
|
err = wldev_iovar_setint(dev, "wpa_auth", WPA_AUTH_DISABLED);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("wpa_auth clear failed \n"));
|
|
}
|
|
}
|
|
|
|
#ifdef WL_CFG80211_P2P_DEV_IF
|
|
void wl_cfg80211_del_p2p_wdev(struct net_device *dev)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(dev);
|
|
struct wireless_dev *wdev = NULL;
|
|
|
|
WL_DBG(("Enter \n"));
|
|
if (!cfg) {
|
|
WL_ERR(("Invalid Ptr\n"));
|
|
return;
|
|
} else {
|
|
wdev = cfg->p2p_wdev;
|
|
}
|
|
|
|
if (wdev) {
|
|
wl_cfgp2p_del_p2p_disc_if(wdev, cfg);
|
|
}
|
|
}
|
|
#endif /* WL_CFG80211_P2P_DEV_IF */
|
|
|
|
#ifdef GTK_OFFLOAD_SUPPORT
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 1, 0))
|
|
static s32
|
|
wl_cfg80211_set_rekey_data(struct wiphy *wiphy, struct net_device *dev,
|
|
struct cfg80211_gtk_rekey_data *data)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wiphy_priv(wiphy);
|
|
s32 err = 0;
|
|
gtk_keyinfo_t keyinfo;
|
|
bcol_gtk_para_t bcol_keyinfo;
|
|
|
|
WL_DBG(("Enter\n"));
|
|
if (data == NULL || cfg->p2p_net == dev) {
|
|
WL_ERR(("data is NULL or wrong net device\n"));
|
|
return -EINVAL;
|
|
}
|
|
|
|
prhex("kck", (const u8 *) (data->kck), RSN_KCK_LENGTH);
|
|
prhex("kek", (const u8 *) (data->kek), RSN_KEK_LENGTH);
|
|
prhex("replay_ctr", (const u8 *) (data->replay_ctr), RSN_REPLAY_LEN);
|
|
bcopy(data->kck, keyinfo.KCK, RSN_KCK_LENGTH);
|
|
bcopy(data->kek, keyinfo.KEK, RSN_KEK_LENGTH);
|
|
bcopy(data->replay_ctr, keyinfo.ReplayCounter, RSN_REPLAY_LEN);
|
|
|
|
memset(&bcol_keyinfo, 0, sizeof(bcol_keyinfo));
|
|
bcol_keyinfo.enable = 1;
|
|
bcol_keyinfo.ptk_len = 64;
|
|
memcpy(&bcol_keyinfo.ptk[0], data->kck, RSN_KCK_LENGTH);
|
|
memcpy(&bcol_keyinfo.ptk[RSN_KCK_LENGTH], data->kek, RSN_KEK_LENGTH);
|
|
err = wldev_iovar_setbuf(dev, "bcol_gtk_rekey_ptk", &bcol_keyinfo,
|
|
sizeof(bcol_keyinfo), cfg->ioctl_buf, WLC_IOCTL_SMLEN, &cfg->ioctl_buf_sync);
|
|
if (!err) {
|
|
return err;
|
|
}
|
|
|
|
if ((err = wldev_iovar_setbuf(dev, "gtk_key_info", &keyinfo, sizeof(keyinfo),
|
|
cfg->ioctl_buf, WLC_IOCTL_SMLEN, &cfg->ioctl_buf_sync)) < 0) {
|
|
WL_ERR(("seting gtk_key_info failed code=%d\n", err));
|
|
return err;
|
|
}
|
|
|
|
WL_DBG(("Exit\n"));
|
|
return err;
|
|
}
|
|
#endif /* LINUX_VERSION_CODE >= KERNEL_VERSION(3, 1, 0) */
|
|
#endif /* GTK_OFFLOAD_SUPPORT */
|
|
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(4, 13, 0))
|
|
static int wl_cfg80211_set_pmk(struct wiphy *wiphy, struct net_device *dev,
|
|
const struct cfg80211_pmk_conf *conf)
|
|
{
|
|
int ret = 0;
|
|
wsec_pmk_t pmk;
|
|
struct bcm_cfg80211 *cfg = wiphy_priv(wiphy);
|
|
struct wl_security *sec;
|
|
s32 bssidx;
|
|
|
|
pmk.key_len = conf->pmk_len;
|
|
if (pmk.key_len > sizeof(pmk.key)) {
|
|
ret = -EINVAL;
|
|
return ret;
|
|
}
|
|
pmk.flags = 0;
|
|
ret = memcpy_s(&pmk.key, sizeof(pmk.key), conf->pmk, conf->pmk_len);
|
|
if (ret) {
|
|
ret = -EINVAL;
|
|
return ret;
|
|
}
|
|
|
|
if ((bssidx = wl_get_bssidx_by_wdev(cfg, dev->ieee80211_ptr)) < 0) {
|
|
WL_ERR(("Find index failed\n"));
|
|
ret = -EINVAL;
|
|
return ret;
|
|
}
|
|
|
|
sec = wl_read_prof(cfg, dev, WL_PROF_SEC);
|
|
if ((sec->wpa_auth == WLAN_AKM_SUITE_8021X) ||
|
|
(sec->wpa_auth == WL_AKM_SUITE_SHA256_1X)) {
|
|
ret = wldev_iovar_setbuf_bsscfg(dev, "okc_info_pmk", pmk.key, pmk.key_len,
|
|
cfg->ioctl_buf, WLC_IOCTL_SMLEN, bssidx, &cfg->ioctl_buf_sync);
|
|
if (ret) {
|
|
/* could fail in case that 'okc' is not supported */
|
|
WL_INFORM_MEM(("okc_info_pmk failed, err=%d (ignore)\n", ret));
|
|
}
|
|
}
|
|
|
|
ret = wldev_ioctl_set(dev, WLC_SET_WSEC_PMK, &pmk, sizeof(pmk));
|
|
if (ret) {
|
|
WL_ERR(("wl_cfg80211_set_pmk error:%d", ret));
|
|
ret = -EINVAL;
|
|
return ret;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
static int wl_cfg80211_del_pmk(struct wiphy *wiphy, struct net_device *dev,
|
|
const u8 *aa)
|
|
{
|
|
int err = BCME_OK;
|
|
struct cfg80211_pmksa pmksa;
|
|
|
|
/* build up cfg80211_pmksa structure to use existing wl_cfg80211_update_pmksa API */
|
|
bzero(&pmksa, sizeof(pmksa));
|
|
pmksa.bssid = aa;
|
|
|
|
err = wl_cfg80211_update_pmksa(wiphy, dev, &pmksa, FALSE);
|
|
|
|
if (err) {
|
|
WL_ERR(("wl_cfg80211_update_pmksa err:%d\n", err));
|
|
err = -EINVAL;
|
|
}
|
|
|
|
return err;
|
|
}
|
|
#endif /* LINUX_VERSION_CODE >= KERNEL_VERSION(4, 13, 0) */
|
|
|
|
#if defined(WL_SUPPORT_AUTO_CHANNEL)
|
|
int
|
|
wl_cfg80211_set_spect(struct net_device *dev, int spect)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(dev);
|
|
int wlc_down = 1;
|
|
int wlc_up = 1;
|
|
int err = BCME_OK;
|
|
|
|
if (!wl_get_drv_status_all(cfg, CONNECTED)) {
|
|
err = wldev_ioctl_set(dev, WLC_DOWN, &wlc_down, sizeof(wlc_down));
|
|
if (err) {
|
|
WL_ERR(("%s: WLC_DOWN failed: code: %d\n", __func__, err));
|
|
return err;
|
|
}
|
|
|
|
err = wldev_ioctl_set(dev, WLC_SET_SPECT_MANAGMENT, &spect, sizeof(spect));
|
|
if (err) {
|
|
WL_ERR(("%s: error setting spect: code: %d\n", __func__, err));
|
|
return err;
|
|
}
|
|
|
|
err = wldev_ioctl_set(dev, WLC_UP, &wlc_up, sizeof(wlc_up));
|
|
if (err) {
|
|
WL_ERR(("%s: WLC_UP failed: code: %d\n", __func__, err));
|
|
return err;
|
|
}
|
|
}
|
|
return err;
|
|
}
|
|
|
|
int
|
|
wl_cfg80211_get_sta_channel(struct bcm_cfg80211 *cfg)
|
|
{
|
|
int channel = 0;
|
|
|
|
if (wl_get_drv_status(cfg, CONNECTED, bcmcfg_to_prmry_ndev(cfg))) {
|
|
channel = cfg->channel;
|
|
}
|
|
return channel;
|
|
}
|
|
#endif /* WL_SUPPORT_AUTO_CHANNEL */
|
|
|
|
u64
|
|
wl_cfg80211_get_new_roc_id(struct bcm_cfg80211 *cfg)
|
|
{
|
|
u64 id = 0;
|
|
id = ++cfg->last_roc_id;
|
|
#ifdef P2P_LISTEN_OFFLOADING
|
|
if (id == P2PO_COOKIE) {
|
|
id = ++cfg->last_roc_id;
|
|
}
|
|
#endif /* P2P_LISTEN_OFFLOADING */
|
|
if (id == 0)
|
|
id = ++cfg->last_roc_id;
|
|
return id;
|
|
}
|
|
|
|
#ifdef WLTDLS
|
|
s32
|
|
wl_cfg80211_tdls_config(struct bcm_cfg80211 *cfg, enum wl_tdls_config state, bool auto_mode)
|
|
{
|
|
struct net_device *ndev = bcmcfg_to_prmry_ndev(cfg);
|
|
int err = 0;
|
|
struct net_info *iter, *next;
|
|
int update_reqd = 0;
|
|
int enable = 0;
|
|
dhd_pub_t *dhdp;
|
|
dhdp = (dhd_pub_t *)(cfg->pub);
|
|
|
|
/*
|
|
* TDLS need to be enabled only if we have a single STA/GC
|
|
* connection.
|
|
*/
|
|
|
|
WL_DBG(("Enter state:%d\n", state));
|
|
if (!cfg->tdls_supported) {
|
|
/* FW doesn't support tdls. Do nothing */
|
|
return -ENODEV;
|
|
}
|
|
|
|
/* Protect tdls config session */
|
|
mutex_lock(&cfg->tdls_sync);
|
|
|
|
if (state == TDLS_STATE_TEARDOWN) {
|
|
/* Host initiated TDLS tear down */
|
|
err = dhd_tdls_enable(ndev, false, auto_mode, NULL);
|
|
goto exit;
|
|
} else if ((state == TDLS_STATE_AP_CREATE) ||
|
|
(state == TDLS_STATE_NMI_CREATE)) {
|
|
/* We don't support tdls while AP/GO/NAN is operational */
|
|
update_reqd = true;
|
|
enable = false;
|
|
} else if ((state == TDLS_STATE_CONNECT) || (state == TDLS_STATE_IF_CREATE)) {
|
|
if (wl_get_drv_status_all(cfg,
|
|
CONNECTED) >= TDLS_MAX_IFACE_FOR_ENABLE) {
|
|
/* For STA/GC connect command request, disable
|
|
* tdls if we have any concurrent interfaces
|
|
* operational.
|
|
*/
|
|
WL_DBG(("Interface limit restriction. disable tdls.\n"));
|
|
update_reqd = true;
|
|
enable = false;
|
|
}
|
|
} else if ((state == TDLS_STATE_DISCONNECT) ||
|
|
(state == TDLS_STATE_AP_DELETE) ||
|
|
(state == TDLS_STATE_SETUP) ||
|
|
(state == TDLS_STATE_IF_DELETE)) {
|
|
/* Enable back the tdls connection only if we have less than
|
|
* or equal to a single STA/GC connection.
|
|
*/
|
|
if (wl_get_drv_status_all(cfg,
|
|
CONNECTED) == 0) {
|
|
/* If there are no interfaces connected, enable tdls */
|
|
update_reqd = true;
|
|
enable = true;
|
|
} else if (wl_get_drv_status_all(cfg,
|
|
CONNECTED) == TDLS_MAX_IFACE_FOR_ENABLE) {
|
|
/* We have one interface in CONNECTED state.
|
|
* Verify whether its a STA interface before
|
|
* we enable back tdls.
|
|
*/
|
|
GCC_DIAGNOSTIC_PUSH_SUPPRESS_CAST();
|
|
for_each_ndev(cfg, iter, next) {
|
|
GCC_DIAGNOSTIC_POP();
|
|
if ((iter->ndev) && (wl_get_drv_status(cfg, CONNECTED, ndev)) &&
|
|
(ndev->ieee80211_ptr->iftype != NL80211_IFTYPE_STATION)) {
|
|
WL_DBG(("Non STA iface operational. cfg_iftype:%d"
|
|
" Can't enable tdls.\n",
|
|
ndev->ieee80211_ptr->iftype));
|
|
err = -ENOTSUPP;
|
|
goto exit;
|
|
}
|
|
}
|
|
/* No AP/GO found. Enable back tdls */
|
|
update_reqd = true;
|
|
enable = true;
|
|
} else {
|
|
WL_DBG(("Concurrent connection mode. Can't enable tdls. \n"));
|
|
err = -ENOTSUPP;
|
|
goto exit;
|
|
}
|
|
} else {
|
|
WL_ERR(("Unknown tdls state:%d \n", state));
|
|
err = -EINVAL;
|
|
goto exit;
|
|
}
|
|
|
|
if (update_reqd == true) {
|
|
if (dhdp->tdls_enable == enable) {
|
|
WL_DBG(("No change in tdls state. Do nothing."
|
|
" tdls_enable:%d\n", enable));
|
|
goto exit;
|
|
}
|
|
err = wldev_iovar_setint(ndev, "tdls_enable", enable);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("tdls_enable setting failed. err:%d\n", err));
|
|
goto exit;
|
|
} else {
|
|
WL_INFORM_MEM(("tdls_enable %d state:%d\n", enable, state));
|
|
/* Update the dhd state variable to be in sync */
|
|
dhdp->tdls_enable = enable;
|
|
if (state == TDLS_STATE_SETUP) {
|
|
/* For host initiated setup, apply TDLS params
|
|
* Don't propagate errors up for param config
|
|
* failures
|
|
*/
|
|
dhd_tdls_enable(ndev, true, auto_mode, NULL);
|
|
|
|
}
|
|
}
|
|
} else {
|
|
WL_DBG(("Skip tdls config. state:%d update_reqd:%d "
|
|
"current_status:%d \n",
|
|
state, update_reqd, dhdp->tdls_enable));
|
|
}
|
|
|
|
exit:
|
|
if (err) {
|
|
wl_flush_fw_log_buffer(ndev, FW_LOGSET_MASK_ALL);
|
|
}
|
|
mutex_unlock(&cfg->tdls_sync);
|
|
return err;
|
|
}
|
|
#endif /* WLTDLS */
|
|
|
|
struct net_device* wl_get_ap_netdev(struct bcm_cfg80211 *cfg, char *ifname)
|
|
{
|
|
struct net_info *iter, *next;
|
|
struct net_device *ndev = NULL;
|
|
|
|
GCC_DIAGNOSTIC_PUSH_SUPPRESS_CAST();
|
|
for_each_ndev(cfg, iter, next) {
|
|
GCC_DIAGNOSTIC_POP();
|
|
if (iter->ndev) {
|
|
if (strncmp(iter->ndev->name, ifname, IFNAMSIZ) == 0) {
|
|
if (iter->ndev->ieee80211_ptr->iftype == NL80211_IFTYPE_AP) {
|
|
ndev = iter->ndev;
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
return ndev;
|
|
}
|
|
|
|
struct net_device*
|
|
wl_get_netdev_by_name(struct bcm_cfg80211 *cfg, char *ifname)
|
|
{
|
|
struct net_info *iter, *next;
|
|
struct net_device *ndev = NULL;
|
|
|
|
GCC_DIAGNOSTIC_PUSH_SUPPRESS_CAST();
|
|
for_each_ndev(cfg, iter, next) {
|
|
GCC_DIAGNOSTIC_POP();
|
|
if (iter->ndev) {
|
|
if (strncmp(iter->ndev->name, ifname, IFNAMSIZ) == 0) {
|
|
ndev = iter->ndev;
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
return ndev;
|
|
}
|
|
|
|
#ifdef SUPPORT_AP_HIGHER_BEACONRATE
|
|
#define WLC_RATE_FLAG 0x80
|
|
#define RATE_MASK 0x7f
|
|
|
|
int wl_set_ap_beacon_rate(struct net_device *dev, int val, char *ifname)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(dev);
|
|
dhd_pub_t *dhdp;
|
|
wl_rateset_args_t rs;
|
|
int error = BCME_ERROR, i;
|
|
struct net_device *ndev = NULL;
|
|
|
|
dhdp = (dhd_pub_t *)(cfg->pub);
|
|
|
|
if (dhdp && !(dhdp->op_mode & DHD_FLAG_HOSTAP_MODE)) {
|
|
WL_ERR(("Not Hostapd mode\n"));
|
|
return BCME_NOTAP;
|
|
}
|
|
|
|
ndev = wl_get_ap_netdev(cfg, ifname);
|
|
|
|
if (ndev == NULL) {
|
|
WL_ERR(("No softAP interface named %s\n", ifname));
|
|
return BCME_NOTAP;
|
|
}
|
|
|
|
bzero(&rs, sizeof(wl_rateset_args_t));
|
|
error = wldev_iovar_getbuf(ndev, "rateset", NULL, 0,
|
|
&rs, sizeof(wl_rateset_args_t), NULL);
|
|
if (error < 0) {
|
|
WL_ERR(("get rateset failed = %d\n", error));
|
|
return error;
|
|
}
|
|
|
|
if (rs.count < 1) {
|
|
WL_ERR(("Failed to get rate count\n"));
|
|
return BCME_ERROR;
|
|
}
|
|
|
|
/* Host delivers target rate in the unit of 500kbps */
|
|
/* To make it to 1mbps unit, atof should be implemented for 5.5mbps basic rate */
|
|
for (i = 0; i < rs.count && i < WL_NUMRATES; i++)
|
|
if (rs.rates[i] & WLC_RATE_FLAG)
|
|
if ((rs.rates[i] & RATE_MASK) == val)
|
|
break;
|
|
|
|
/* Valid rate has been delivered as an argument */
|
|
if (i < rs.count && i < WL_NUMRATES) {
|
|
error = wldev_iovar_setint(ndev, "force_bcn_rspec", val);
|
|
if (error < 0) {
|
|
WL_ERR(("set beacon rate failed = %d\n", error));
|
|
return BCME_ERROR;
|
|
}
|
|
} else {
|
|
WL_ERR(("Rate is invalid"));
|
|
return BCME_BADARG;
|
|
}
|
|
|
|
return BCME_OK;
|
|
}
|
|
|
|
int
|
|
wl_get_ap_basic_rate(struct net_device *dev, char* command, char *ifname, int total_len)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(dev);
|
|
dhd_pub_t *dhdp;
|
|
wl_rateset_args_t rs;
|
|
int error = BCME_ERROR;
|
|
int i, bytes_written = 0;
|
|
struct net_device *ndev = NULL;
|
|
|
|
dhdp = (dhd_pub_t *)(cfg->pub);
|
|
|
|
if (!(dhdp->op_mode & DHD_FLAG_HOSTAP_MODE)) {
|
|
WL_ERR(("Not Hostapd mode\n"));
|
|
return BCME_NOTAP;
|
|
}
|
|
|
|
ndev = wl_get_ap_netdev(cfg, ifname);
|
|
|
|
if (ndev == NULL) {
|
|
WL_ERR(("No softAP interface named %s\n", ifname));
|
|
return BCME_NOTAP;
|
|
}
|
|
|
|
bzero(&rs, sizeof(wl_rateset_args_t));
|
|
error = wldev_iovar_getbuf(ndev, "rateset", NULL, 0,
|
|
&rs, sizeof(wl_rateset_args_t), NULL);
|
|
if (error < 0) {
|
|
WL_ERR(("get rateset failed = %d\n", error));
|
|
return error;
|
|
}
|
|
|
|
if (rs.count < 1) {
|
|
WL_ERR(("Failed to get rate count\n"));
|
|
return BCME_ERROR;
|
|
}
|
|
|
|
/* Delivers basic rate in the unit of 500kbps to host */
|
|
for (i = 0; i < rs.count && i < WL_NUMRATES; i++)
|
|
if (rs.rates[i] & WLC_RATE_FLAG)
|
|
bytes_written += snprintf(command + bytes_written, total_len,
|
|
"%d ", rs.rates[i] & RATE_MASK);
|
|
|
|
/* Remove last space in the command buffer */
|
|
if (bytes_written && (bytes_written < total_len)) {
|
|
command[bytes_written - 1] = '\0';
|
|
bytes_written--;
|
|
}
|
|
|
|
return bytes_written;
|
|
|
|
}
|
|
#endif /* SUPPORT_AP_HIGHER_BEACONRATE */
|
|
|
|
#ifdef SUPPORT_AP_RADIO_PWRSAVE
|
|
#define MSEC_PER_MIN (60000L)
|
|
|
|
static int
|
|
_wl_update_ap_rps_params(struct net_device *dev)
|
|
{
|
|
struct bcm_cfg80211 *cfg = NULL;
|
|
rpsnoa_iovar_params_t iovar;
|
|
u8 smbuf[WLC_IOCTL_SMLEN];
|
|
|
|
if (!dev)
|
|
return BCME_BADARG;
|
|
|
|
cfg = wl_get_cfg(dev);
|
|
|
|
bzero(&iovar, sizeof(iovar));
|
|
bzero(smbuf, sizeof(smbuf));
|
|
|
|
iovar.hdr.ver = RADIO_PWRSAVE_VERSION;
|
|
iovar.hdr.subcmd = WL_RPSNOA_CMD_PARAMS;
|
|
iovar.hdr.len = sizeof(iovar);
|
|
iovar.param->band = WLC_BAND_ALL;
|
|
iovar.param->level = cfg->ap_rps_info.level;
|
|
iovar.param->stas_assoc_check = cfg->ap_rps_info.sta_assoc_check;
|
|
iovar.param->pps = cfg->ap_rps_info.pps;
|
|
iovar.param->quiet_time = cfg->ap_rps_info.quiet_time;
|
|
|
|
if (wldev_iovar_setbuf(dev, "rpsnoa", &iovar, sizeof(iovar),
|
|
smbuf, sizeof(smbuf), NULL)) {
|
|
WL_ERR(("Failed to set rpsnoa params"));
|
|
return BCME_ERROR;
|
|
}
|
|
|
|
return BCME_OK;
|
|
}
|
|
|
|
int
|
|
wl_get_ap_rps(struct net_device *dev, char* command, char *ifname, int total_len)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(dev);
|
|
dhd_pub_t *dhdp;
|
|
int error = BCME_ERROR;
|
|
int bytes_written = 0;
|
|
struct net_device *ndev = NULL;
|
|
rpsnoa_iovar_status_t iovar;
|
|
u8 smbuf[WLC_IOCTL_SMLEN];
|
|
u32 chanspec = 0;
|
|
u8 idx = 0;
|
|
u16 state;
|
|
u32 sleep;
|
|
u32 time_since_enable;
|
|
|
|
dhdp = (dhd_pub_t *)(cfg->pub);
|
|
|
|
if (!dhdp) {
|
|
error = BCME_NOTUP;
|
|
goto fail;
|
|
}
|
|
|
|
if (!(dhdp->op_mode & DHD_FLAG_HOSTAP_MODE)) {
|
|
WL_ERR(("Not Hostapd mode\n"));
|
|
error = BCME_NOTAP;
|
|
goto fail;
|
|
}
|
|
|
|
ndev = wl_get_ap_netdev(cfg, ifname);
|
|
|
|
if (ndev == NULL) {
|
|
WL_ERR(("No softAP interface named %s\n", ifname));
|
|
error = BCME_NOTAP;
|
|
goto fail;
|
|
}
|
|
|
|
bzero(&iovar, sizeof(iovar));
|
|
bzero(smbuf, sizeof(smbuf));
|
|
|
|
iovar.hdr.ver = RADIO_PWRSAVE_VERSION;
|
|
iovar.hdr.subcmd = WL_RPSNOA_CMD_STATUS;
|
|
iovar.hdr.len = sizeof(iovar);
|
|
iovar.stats->band = WLC_BAND_ALL;
|
|
|
|
error = wldev_iovar_getbuf(ndev, "rpsnoa", &iovar, sizeof(iovar),
|
|
smbuf, sizeof(smbuf), NULL);
|
|
if (error < 0) {
|
|
WL_ERR(("get ap radio pwrsave failed = %d\n", error));
|
|
goto fail;
|
|
}
|
|
|
|
/* RSDB event doesn't seem to be handled correctly.
|
|
* So check chanspec of AP directly from the firmware
|
|
*/
|
|
error = wldev_iovar_getint(ndev, "chanspec", (s32 *)&chanspec);
|
|
if (error < 0) {
|
|
WL_ERR(("get chanspec from AP failed = %d\n", error));
|
|
goto fail;
|
|
}
|
|
|
|
chanspec = wl_chspec_driver_to_host(chanspec);
|
|
if (CHSPEC_IS2G(chanspec))
|
|
idx = 0;
|
|
else if (CHSPEC_IS5G(chanspec))
|
|
idx = 1;
|
|
else {
|
|
error = BCME_BADCHAN;
|
|
goto fail;
|
|
}
|
|
|
|
state = ((rpsnoa_iovar_status_t *)smbuf)->stats[idx].state;
|
|
sleep = ((rpsnoa_iovar_status_t *)smbuf)->stats[idx].sleep_dur;
|
|
time_since_enable = ((rpsnoa_iovar_status_t *)smbuf)->stats[idx].sleep_avail_dur;
|
|
|
|
/* Conver ms to minute, round down only */
|
|
sleep = DIV_U64_BY_U32(sleep, MSEC_PER_MIN);
|
|
time_since_enable = DIV_U64_BY_U32(time_since_enable, MSEC_PER_MIN);
|
|
|
|
bytes_written += snprintf(command + bytes_written, total_len,
|
|
"state=%d sleep=%d time_since_enable=%d", state, sleep, time_since_enable);
|
|
error = bytes_written;
|
|
|
|
fail:
|
|
return error;
|
|
}
|
|
|
|
int
|
|
wl_set_ap_rps(struct net_device *dev, bool enable, char *ifname)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(dev);
|
|
dhd_pub_t *dhdp;
|
|
struct net_device *ndev = NULL;
|
|
rpsnoa_iovar_t iovar;
|
|
u8 smbuf[WLC_IOCTL_SMLEN];
|
|
int ret = BCME_OK;
|
|
|
|
dhdp = (dhd_pub_t *)(cfg->pub);
|
|
|
|
if (!dhdp) {
|
|
ret = BCME_NOTUP;
|
|
goto exit;
|
|
}
|
|
|
|
if (!(dhdp->op_mode & DHD_FLAG_HOSTAP_MODE)) {
|
|
WL_ERR(("Not Hostapd mode\n"));
|
|
ret = BCME_NOTAP;
|
|
goto exit;
|
|
}
|
|
|
|
ndev = wl_get_ap_netdev(cfg, ifname);
|
|
|
|
if (ndev == NULL) {
|
|
WL_ERR(("No softAP interface named %s\n", ifname));
|
|
ret = BCME_NOTAP;
|
|
goto exit;
|
|
}
|
|
|
|
if (cfg->ap_rps_info.enable != enable) {
|
|
cfg->ap_rps_info.enable = enable;
|
|
if (enable) {
|
|
ret = _wl_update_ap_rps_params(ndev);
|
|
if (ret) {
|
|
WL_ERR(("Filed to update rpsnoa params\n"));
|
|
goto exit;
|
|
}
|
|
}
|
|
bzero(&iovar, sizeof(iovar));
|
|
bzero(smbuf, sizeof(smbuf));
|
|
|
|
iovar.hdr.ver = RADIO_PWRSAVE_VERSION;
|
|
iovar.hdr.subcmd = WL_RPSNOA_CMD_ENABLE;
|
|
iovar.hdr.len = sizeof(iovar);
|
|
iovar.data->band = WLC_BAND_ALL;
|
|
iovar.data->value = (int16)enable;
|
|
|
|
ret = wldev_iovar_setbuf(ndev, "rpsnoa", &iovar, sizeof(iovar),
|
|
smbuf, sizeof(smbuf), NULL);
|
|
if (ret) {
|
|
WL_ERR(("Failed to enable AP radio power save"));
|
|
goto exit;
|
|
}
|
|
cfg->ap_rps_info.enable = enable;
|
|
}
|
|
exit:
|
|
return ret;
|
|
}
|
|
|
|
int
|
|
wl_update_ap_rps_params(struct net_device *dev, ap_rps_info_t* rps, char *ifname)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(dev);
|
|
dhd_pub_t *dhdp;
|
|
struct net_device *ndev = NULL;
|
|
|
|
dhdp = (dhd_pub_t *)(cfg->pub);
|
|
|
|
if (!dhdp)
|
|
return BCME_NOTUP;
|
|
|
|
if (!(dhdp->op_mode & DHD_FLAG_HOSTAP_MODE)) {
|
|
WL_ERR(("Not Hostapd mode\n"));
|
|
return BCME_NOTAP;
|
|
}
|
|
|
|
ndev = wl_get_ap_netdev(cfg, ifname);
|
|
|
|
if (ndev == NULL) {
|
|
WL_ERR(("No softAP interface named %s\n", ifname));
|
|
return BCME_NOTAP;
|
|
}
|
|
|
|
if (!rps)
|
|
return BCME_BADARG;
|
|
|
|
if (rps->pps < RADIO_PWRSAVE_PPS_MIN)
|
|
return BCME_BADARG;
|
|
|
|
if (rps->level < RADIO_PWRSAVE_LEVEL_MIN ||
|
|
rps->level > RADIO_PWRSAVE_LEVEL_MAX)
|
|
return BCME_BADARG;
|
|
|
|
if (rps->quiet_time < RADIO_PWRSAVE_QUIETTIME_MIN)
|
|
return BCME_BADARG;
|
|
|
|
if (rps->sta_assoc_check > RADIO_PWRSAVE_ASSOCCHECK_MAX ||
|
|
rps->sta_assoc_check < RADIO_PWRSAVE_ASSOCCHECK_MIN)
|
|
return BCME_BADARG;
|
|
|
|
cfg->ap_rps_info.pps = rps->pps;
|
|
cfg->ap_rps_info.level = rps->level;
|
|
cfg->ap_rps_info.quiet_time = rps->quiet_time;
|
|
cfg->ap_rps_info.sta_assoc_check = rps->sta_assoc_check;
|
|
|
|
if (cfg->ap_rps_info.enable) {
|
|
if (_wl_update_ap_rps_params(ndev)) {
|
|
WL_ERR(("Failed to update rpsnoa params"));
|
|
return BCME_ERROR;
|
|
}
|
|
}
|
|
|
|
return BCME_OK;
|
|
}
|
|
|
|
void
|
|
wl_cfg80211_init_ap_rps(struct bcm_cfg80211 *cfg)
|
|
{
|
|
cfg->ap_rps_info.enable = FALSE;
|
|
cfg->ap_rps_info.sta_assoc_check = RADIO_PWRSAVE_STAS_ASSOC_CHECK;
|
|
cfg->ap_rps_info.pps = RADIO_PWRSAVE_PPS;
|
|
cfg->ap_rps_info.quiet_time = RADIO_PWRSAVE_QUIET_TIME;
|
|
cfg->ap_rps_info.level = RADIO_PWRSAVE_LEVEL;
|
|
}
|
|
#endif /* SUPPORT_AP_RADIO_PWRSAVE */
|
|
|
|
int
|
|
wl_cfg80211_iface_count(struct net_device *dev)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(dev);
|
|
struct net_info *iter, *next;
|
|
int iface_count = 0;
|
|
|
|
/* Return the count of network interfaces (skip netless p2p discovery
|
|
* interface)
|
|
*/
|
|
GCC_DIAGNOSTIC_PUSH_SUPPRESS_CAST();
|
|
for_each_ndev(cfg, iter, next) {
|
|
GCC_DIAGNOSTIC_POP();
|
|
if (iter->ndev) {
|
|
iface_count++;
|
|
}
|
|
}
|
|
return iface_count;
|
|
}
|
|
|
|
#ifdef SUPPORT_SET_CAC
|
|
static void
|
|
wl_cfg80211_set_cac(struct bcm_cfg80211 *cfg, int enable)
|
|
{
|
|
int ret = 0;
|
|
dhd_pub_t *dhd = (dhd_pub_t *)(cfg->pub);
|
|
|
|
WL_DBG(("cac enable %d\n", enable));
|
|
if (!dhd) {
|
|
WL_ERR(("dhd is NULL\n"));
|
|
return;
|
|
}
|
|
if ((ret = dhd_wl_ioctl_set_intiovar(dhd, "cac", enable,
|
|
WLC_SET_VAR, TRUE, 0)) < 0) {
|
|
WL_ERR(("Failed set CAC, ret=%d\n", ret));
|
|
} else {
|
|
WL_DBG(("CAC set successfully\n"));
|
|
}
|
|
return;
|
|
}
|
|
#endif /* SUPPORT_SET_CAC */
|
|
|
|
#ifdef SUPPORT_RSSI_SUM_REPORT
|
|
int
|
|
wl_get_rssi_per_ant(struct net_device *dev, char *ifname, char *peer_mac, void *param)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(dev);
|
|
wl_rssi_ant_mimo_t *get_param = (wl_rssi_ant_mimo_t *)param;
|
|
rssi_ant_param_t *set_param = NULL;
|
|
struct net_device *ifdev = NULL;
|
|
char iobuf[WLC_IOCTL_SMLEN];
|
|
int err = BCME_OK;
|
|
int iftype = 0;
|
|
|
|
bzero(iobuf, WLC_IOCTL_SMLEN);
|
|
|
|
/* Check the interface type */
|
|
ifdev = wl_get_netdev_by_name(cfg, ifname);
|
|
if (ifdev == NULL) {
|
|
WL_ERR(("Could not find net_device for ifname:%s\n", ifname));
|
|
err = BCME_BADARG;
|
|
goto fail;
|
|
}
|
|
|
|
iftype = ifdev->ieee80211_ptr->iftype;
|
|
if (iftype == NL80211_IFTYPE_AP || iftype == NL80211_IFTYPE_P2P_GO) {
|
|
if (peer_mac) {
|
|
set_param = (rssi_ant_param_t *)MALLOCZ(cfg->osh, sizeof(rssi_ant_param_t));
|
|
err = wl_cfg80211_ether_atoe(peer_mac, &set_param->ea);
|
|
if (!err) {
|
|
WL_ERR(("Invalid Peer MAC format\n"));
|
|
err = BCME_BADARG;
|
|
goto fail;
|
|
}
|
|
} else {
|
|
WL_ERR(("Peer MAC is not provided for iftype %d\n", iftype));
|
|
err = BCME_BADARG;
|
|
goto fail;
|
|
}
|
|
}
|
|
|
|
err = wldev_iovar_getbuf(ifdev, "phy_rssi_ant", peer_mac ?
|
|
(void *)&(set_param->ea) : NULL, peer_mac ? ETHER_ADDR_LEN : 0,
|
|
(void *)iobuf, sizeof(iobuf), NULL);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("Failed to get rssi info, err=%d\n", err));
|
|
} else {
|
|
memcpy(get_param, iobuf, sizeof(wl_rssi_ant_mimo_t));
|
|
if (get_param->count == 0) {
|
|
WL_ERR(("Not supported on this chip\n"));
|
|
err = BCME_UNSUPPORTED;
|
|
}
|
|
}
|
|
|
|
fail:
|
|
if (set_param) {
|
|
MFREE(cfg->osh, set_param, sizeof(rssi_ant_param_t));
|
|
}
|
|
|
|
return err;
|
|
}
|
|
|
|
int
|
|
wl_get_rssi_logging(struct net_device *dev, void *param)
|
|
{
|
|
rssilog_get_param_t *get_param = (rssilog_get_param_t *)param;
|
|
char iobuf[WLC_IOCTL_SMLEN];
|
|
int err = BCME_OK;
|
|
|
|
bzero(iobuf, WLC_IOCTL_SMLEN);
|
|
bzero(get_param, sizeof(*get_param));
|
|
err = wldev_iovar_getbuf(dev, "rssilog", NULL, 0, (void *)iobuf,
|
|
sizeof(iobuf), NULL);
|
|
if (err) {
|
|
WL_ERR(("Failed to get rssi logging info, err=%d\n", err));
|
|
} else {
|
|
memcpy(get_param, iobuf, sizeof(*get_param));
|
|
}
|
|
|
|
return err;
|
|
}
|
|
|
|
int
|
|
wl_set_rssi_logging(struct net_device *dev, void *param)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(dev);
|
|
rssilog_set_param_t *set_param = (rssilog_set_param_t *)param;
|
|
int err;
|
|
|
|
err = wldev_iovar_setbuf(dev, "rssilog", set_param,
|
|
sizeof(*set_param), cfg->ioctl_buf, WLC_IOCTL_SMLEN,
|
|
&cfg->ioctl_buf_sync);
|
|
if (err) {
|
|
WL_ERR(("Failed to set rssi logging param, err=%d\n", err));
|
|
}
|
|
|
|
return err;
|
|
}
|
|
#endif /* SUPPORT_RSSI_SUM_REPORT */
|
|
/* Function to flush the FW preserve buffer content
|
|
* The buffer content is sent to host in form of events.
|
|
*/
|
|
void
|
|
wl_flush_fw_log_buffer(struct net_device *dev, uint32 logset_mask)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(dev);
|
|
dhd_pub_t *dhd = (dhd_pub_t *)(cfg->pub);
|
|
int i;
|
|
int err = 0;
|
|
u8 buf[WLC_IOCTL_SMLEN] = {0};
|
|
wl_el_set_params_t set_param;
|
|
|
|
/* Set the size of data to retrieve */
|
|
memset(&set_param, 0, sizeof(set_param));
|
|
set_param.size = WLC_IOCTL_SMLEN;
|
|
|
|
for (i = 0; i < dhd->event_log_max_sets; i++)
|
|
{
|
|
if ((0x01u << i) & logset_mask) {
|
|
set_param.set = i;
|
|
err = wldev_iovar_setbuf(dev, "event_log_get", &set_param,
|
|
sizeof(struct wl_el_set_params_s), buf, WLC_IOCTL_SMLEN,
|
|
NULL);
|
|
if (err) {
|
|
WL_DBG(("Failed to get fw preserve logs, err=%d\n", err));
|
|
}
|
|
}
|
|
}
|
|
}
|
|
#ifdef USE_WFA_CERT_CONF
|
|
extern int g_frameburst;
|
|
#endif /* USE_WFA_CERT_CONF */
|
|
|
|
int
|
|
wl_cfg80211_set_frameburst(struct bcm_cfg80211 *cfg, bool enable)
|
|
{
|
|
int ret = BCME_OK;
|
|
int val = enable ? 1 : 0;
|
|
|
|
#ifdef USE_WFA_CERT_CONF
|
|
if (!g_frameburst) {
|
|
WL_DBG(("Skip setting frameburst\n"));
|
|
return 0;
|
|
}
|
|
#endif /* USE_WFA_CERT_CONF */
|
|
|
|
WL_DBG(("Set frameburst %d\n", val));
|
|
ret = wldev_ioctl_set(bcmcfg_to_prmry_ndev(cfg), WLC_SET_FAKEFRAG, &val, sizeof(val));
|
|
if (ret < 0) {
|
|
WL_ERR(("Failed set frameburst, ret=%d\n", ret));
|
|
} else {
|
|
WL_INFORM_MEM(("frameburst is %s\n", enable ? "enabled" : "disabled"));
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
s32
|
|
wl_cfg80211_set_dbg_verbose(struct net_device *ndev, u32 level)
|
|
{
|
|
/* configure verbose level for debugging */
|
|
if (level) {
|
|
/* Enable increased verbose */
|
|
wl_dbg_level |= WL_DBG_DBG;
|
|
} else {
|
|
/* Disable */
|
|
wl_dbg_level &= ~WL_DBG_DBG;
|
|
}
|
|
WL_INFORM(("debug verbose set to %d\n", level));
|
|
|
|
return BCME_OK;
|
|
}
|
|
|
|
const u8 *
|
|
wl_find_attribute(const u8 *buf, u16 len, u16 element_id)
|
|
{
|
|
const u8 *attrib;
|
|
u16 attrib_id;
|
|
u16 attrib_len;
|
|
|
|
if (!buf) {
|
|
WL_ERR(("buf null\n"));
|
|
return NULL;
|
|
}
|
|
|
|
attrib = buf;
|
|
while (len >= 4) {
|
|
/* attribute id */
|
|
attrib_id = *attrib++ << 8;
|
|
attrib_id |= *attrib++;
|
|
len -= 2;
|
|
|
|
/* 2-byte little endian */
|
|
attrib_len = *attrib++ << 8;
|
|
attrib_len |= *attrib++;
|
|
|
|
len -= 2;
|
|
if (attrib_id == element_id) {
|
|
/* This will point to start of subelement attrib after
|
|
* attribute id & len
|
|
*/
|
|
return attrib;
|
|
}
|
|
if (len > attrib_len) {
|
|
len -= attrib_len; /* for the remaining subelt fields */
|
|
WL_DBG(("Attribue:%4x attrib_len:%d rem_len:%d\n",
|
|
attrib_id, attrib_len, len));
|
|
|
|
/* Go to next subelement */
|
|
attrib += attrib_len;
|
|
} else {
|
|
WL_ERR(("Incorrect Attribue:%4x attrib_len:%d\n",
|
|
attrib_id, attrib_len));
|
|
return NULL;
|
|
}
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
uint8 wl_cfg80211_get_bus_state(struct bcm_cfg80211 *cfg)
|
|
{
|
|
dhd_pub_t *dhd = (dhd_pub_t *)(cfg->pub);
|
|
WL_INFORM(("dhd->hang_was_sent = %d and busstate = %d\n",
|
|
dhd->hang_was_sent, dhd->busstate));
|
|
return ((dhd->busstate == DHD_BUS_DOWN) || dhd->hang_was_sent);
|
|
}
|
|
|
|
#ifdef WL_WPS_SYNC
|
|
static void wl_wps_reauth_timeout(unsigned long data)
|
|
{
|
|
struct net_device *ndev = (struct net_device *)data;
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(ndev);
|
|
s32 inst;
|
|
unsigned long flags;
|
|
|
|
WL_CFG_WPS_SYNC_LOCK(&cfg->wps_sync, flags);
|
|
inst = wl_get_wps_inst_match(cfg, ndev);
|
|
if (inst >= 0) {
|
|
WL_ERR(("[%s][WPS] Reauth Timeout Inst:%d! state:%d\n",
|
|
ndev->name, inst, cfg->wps_session[inst].state));
|
|
if (cfg->wps_session[inst].state == WPS_STATE_REAUTH_WAIT) {
|
|
/* Session should get deleted from success (linkup) or
|
|
* deauth case. Just in case, link reassoc failed, clear
|
|
* state here.
|
|
*/
|
|
WL_ERR(("[%s][WPS] Reauth Timeout Inst:%d!\n",
|
|
ndev->name, inst));
|
|
cfg->wps_session[inst].state = WPS_STATE_IDLE;
|
|
cfg->wps_session[inst].in_use = false;
|
|
}
|
|
}
|
|
WL_CFG_WPS_SYNC_UNLOCK(&cfg->wps_sync, flags);
|
|
}
|
|
|
|
static void wl_init_wps_reauth_sm(struct bcm_cfg80211 *cfg)
|
|
{
|
|
/* Only two instances are supported as of now. one for
|
|
* infra STA and other for infra STA/GC.
|
|
*/
|
|
int i = 0;
|
|
struct net_device *pdev = bcmcfg_to_prmry_ndev(cfg);
|
|
|
|
spin_lock_init(&cfg->wps_sync);
|
|
for (i = 0; i < WPS_MAX_SESSIONS; i++) {
|
|
/* Init scan_timeout timer */
|
|
init_timer_compat(&cfg->wps_session[i].timer, wl_wps_reauth_timeout, pdev);
|
|
cfg->wps_session[i].in_use = false;
|
|
cfg->wps_session[i].state = WPS_STATE_IDLE;
|
|
}
|
|
}
|
|
|
|
static void wl_deinit_wps_reauth_sm(struct bcm_cfg80211 *cfg)
|
|
{
|
|
int i = 0;
|
|
|
|
for (i = 0; i < WPS_MAX_SESSIONS; i++) {
|
|
cfg->wps_session[i].in_use = false;
|
|
cfg->wps_session[i].state = WPS_STATE_IDLE;
|
|
if (timer_pending(&cfg->wps_session[i].timer)) {
|
|
del_timer_sync(&cfg->wps_session[i].timer);
|
|
}
|
|
}
|
|
|
|
}
|
|
|
|
static s32
|
|
wl_get_free_wps_inst(struct bcm_cfg80211 *cfg)
|
|
{
|
|
int i;
|
|
|
|
for (i = 0; i < WPS_MAX_SESSIONS; i++) {
|
|
if (!cfg->wps_session[i].in_use) {
|
|
return i;
|
|
}
|
|
}
|
|
return BCME_ERROR;
|
|
}
|
|
|
|
static s32
|
|
wl_get_wps_inst_match(struct bcm_cfg80211 *cfg, struct net_device *ndev)
|
|
{
|
|
int i;
|
|
|
|
for (i = 0; i < WPS_MAX_SESSIONS; i++) {
|
|
if ((cfg->wps_session[i].in_use) &&
|
|
(ndev == cfg->wps_session[i].ndev)) {
|
|
return i;
|
|
}
|
|
}
|
|
|
|
return BCME_ERROR;
|
|
}
|
|
|
|
static s32
|
|
wl_wps_session_add(struct net_device *ndev, u16 mode, u8 *mac_addr)
|
|
{
|
|
s32 inst;
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(ndev);
|
|
unsigned long flags;
|
|
|
|
WL_CFG_WPS_SYNC_LOCK(&cfg->wps_sync, flags);
|
|
/* Fetch and initialize a wps instance */
|
|
inst = wl_get_free_wps_inst(cfg);
|
|
if (inst == BCME_ERROR) {
|
|
WL_ERR(("[WPS] No free insance\n"));
|
|
WL_CFG_WPS_SYNC_UNLOCK(&cfg->wps_sync, flags);
|
|
return BCME_ERROR;
|
|
}
|
|
cfg->wps_session[inst].in_use = true;
|
|
cfg->wps_session[inst].state = WPS_STATE_STARTED;
|
|
cfg->wps_session[inst].ndev = ndev;
|
|
cfg->wps_session[inst].mode = mode;
|
|
/* return check not required since both buffer lens are same */
|
|
(void)memcpy_s(cfg->wps_session[inst].peer_mac, ETH_ALEN, mac_addr, ETH_ALEN);
|
|
WL_CFG_WPS_SYNC_UNLOCK(&cfg->wps_sync, flags);
|
|
|
|
WL_INFORM_MEM(("[%s][WPS] session created. Peer: " MACDBG "\n",
|
|
ndev->name, MAC2STRDBG(mac_addr)));
|
|
return BCME_OK;
|
|
}
|
|
|
|
static void
|
|
wl_wps_session_del(struct net_device *ndev)
|
|
{
|
|
s32 inst;
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(ndev);
|
|
unsigned long flags;
|
|
u16 cur_state;
|
|
|
|
WL_CFG_WPS_SYNC_LOCK(&cfg->wps_sync, flags);
|
|
|
|
/* Get current instance for the given ndev */
|
|
inst = wl_get_wps_inst_match(cfg, ndev);
|
|
if (inst == BCME_ERROR) {
|
|
WL_DBG(("[WPS] instance match NOT found\n"));
|
|
WL_CFG_WPS_SYNC_UNLOCK(&cfg->wps_sync, flags);
|
|
return;
|
|
}
|
|
|
|
cur_state = cfg->wps_session[inst].state;
|
|
if (cur_state != WPS_STATE_DONE) {
|
|
WL_DBG(("[WPS] wrong state:%d\n", cur_state));
|
|
WL_CFG_WPS_SYNC_UNLOCK(&cfg->wps_sync, flags);
|
|
return;
|
|
}
|
|
|
|
/* Mark this as unused */
|
|
cfg->wps_session[inst].in_use = false;
|
|
cfg->wps_session[inst].state = WPS_STATE_IDLE;
|
|
WL_CFG_WPS_SYNC_UNLOCK(&cfg->wps_sync, flags);
|
|
|
|
/* Ensure this API is called from sleepable context. */
|
|
if (timer_pending(&cfg->wps_session[inst].timer)) {
|
|
del_timer_sync(&cfg->wps_session[inst].timer);
|
|
}
|
|
|
|
WL_INFORM_MEM(("[%s][WPS] session deleted\n", ndev->name));
|
|
}
|
|
|
|
static void
|
|
wl_wps_handle_ifdel(struct net_device *ndev)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(ndev);
|
|
unsigned long flags;
|
|
u16 cur_state;
|
|
s32 inst;
|
|
|
|
WL_CFG_WPS_SYNC_LOCK(&cfg->wps_sync, flags);
|
|
inst = wl_get_wps_inst_match(cfg, ndev);
|
|
if (inst == BCME_ERROR) {
|
|
WL_DBG(("[WPS] instance match NOT found\n"));
|
|
WL_CFG_WPS_SYNC_UNLOCK(&cfg->wps_sync, flags);
|
|
return;
|
|
}
|
|
cur_state = cfg->wps_session[inst].state;
|
|
cfg->wps_session[inst].state = WPS_STATE_DONE;
|
|
WL_CFG_WPS_SYNC_UNLOCK(&cfg->wps_sync, flags);
|
|
|
|
WL_INFORM_MEM(("[%s][WPS] state:%x\n", ndev->name, cur_state));
|
|
if (cur_state > WPS_STATE_IDLE) {
|
|
wl_wps_session_del(ndev);
|
|
}
|
|
}
|
|
|
|
static s32
|
|
wl_wps_handle_sta_linkdown(struct net_device *ndev, u16 inst)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(ndev);
|
|
unsigned long flags;
|
|
u16 cur_state;
|
|
bool wps_done = false;
|
|
|
|
WL_CFG_WPS_SYNC_LOCK(&cfg->wps_sync, flags);
|
|
cur_state = cfg->wps_session[inst].state;
|
|
if (cur_state == WPS_STATE_REAUTH_WAIT) {
|
|
WL_CFG_WPS_SYNC_UNLOCK(&cfg->wps_sync, flags);
|
|
wl_clr_drv_status(cfg, CONNECTED, ndev);
|
|
wl_clr_drv_status(cfg, DISCONNECTING, ndev);
|
|
WL_INFORM_MEM(("[%s][WPS] REAUTH link down\n", ndev->name));
|
|
/* Drop the link down event while we are waiting for reauth */
|
|
return BCME_UNSUPPORTED;
|
|
} else if (cur_state == WPS_STATE_STARTED) {
|
|
/* Link down before reaching EAP-FAIL. End WPS session */
|
|
cfg->wps_session[inst].state = WPS_STATE_DONE;
|
|
wps_done = true;
|
|
WL_INFORM_MEM(("[%s][WPS] link down after wps start\n", ndev->name));
|
|
} else {
|
|
WL_DBG(("[%s][WPS] link down in state:%d\n",
|
|
ndev->name, cur_state));
|
|
}
|
|
|
|
WL_CFG_WPS_SYNC_UNLOCK(&cfg->wps_sync, flags);
|
|
|
|
if (wps_done) {
|
|
wl_wps_session_del(ndev);
|
|
}
|
|
return BCME_OK;
|
|
}
|
|
|
|
static s32
|
|
wl_wps_handle_peersta_linkdown(struct net_device *ndev, u16 inst, const u8 *peer_mac)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(ndev);
|
|
unsigned long flags;
|
|
u16 cur_state;
|
|
s32 ret = BCME_OK;
|
|
bool wps_done = false;
|
|
|
|
WL_CFG_WPS_SYNC_LOCK(&cfg->wps_sync, flags);
|
|
cur_state = cfg->wps_session[inst].state;
|
|
|
|
if (!peer_mac) {
|
|
WL_ERR(("Invalid arg\n"));
|
|
ret = BCME_ERROR;
|
|
goto exit;
|
|
}
|
|
|
|
/* AP/GO can have multiple clients. so validate peer_mac addr
|
|
* and ensure states are updated only for right peer.
|
|
*/
|
|
if (memcmp(cfg->wps_session[inst].peer_mac, peer_mac, ETH_ALEN)) {
|
|
/* Mac addr not matching. Ignore. */
|
|
WL_DBG(("[%s][WPS] No active WPS session"
|
|
"for the peer:" MACDBG "\n", ndev->name, MAC2STRDBG(peer_mac)));
|
|
ret = BCME_OK;
|
|
goto exit;
|
|
}
|
|
if (cur_state == WPS_STATE_REAUTH_WAIT) {
|
|
WL_INFORM_MEM(("[%s][WPS] REAUTH link down."
|
|
" Peer: " MACDBG "\n",
|
|
ndev->name, MAC2STRDBG(peer_mac)));
|
|
#ifdef NOT_YET
|
|
/* Link down during REAUTH state is expected. However,
|
|
* if this is send up, hostapd statemachine issues a
|
|
* deauth down and that may pre-empt WPS reauth state
|
|
* at GC.
|
|
*/
|
|
WL_INFORM_MEM(("[%s][WPS] REAUTH link down. Ignore."
|
|
" for client:" MACDBG "\n",
|
|
ndev->name, MAC2STRDBG(peer_mac)));
|
|
ret = BCME_UNSUPPORTED;
|
|
#endif // endif
|
|
} else if (cur_state == WPS_STATE_STARTED) {
|
|
/* Link down before reaching REAUTH_WAIT state. WPS
|
|
* session ended.
|
|
*/
|
|
cfg->wps_session[inst].state = WPS_STATE_DONE;
|
|
WL_INFORM_MEM(("[%s][WPS] link down after wps start"
|
|
" client:" MACDBG "\n",
|
|
ndev->name, MAC2STRDBG(peer_mac)));
|
|
wps_done = true;
|
|
/* since we have freed lock above, return from here */
|
|
ret = BCME_OK;
|
|
} else {
|
|
WL_ERR(("[%s][WPS] Unsupported state:%d",
|
|
ndev->name, cur_state));
|
|
ret = BCME_ERROR;
|
|
}
|
|
exit:
|
|
WL_CFG_WPS_SYNC_UNLOCK(&cfg->wps_sync, flags);
|
|
if (wps_done) {
|
|
wl_wps_session_del(ndev);
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
static s32
|
|
wl_wps_handle_sta_linkup(struct net_device *ndev, u16 inst)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(ndev);
|
|
unsigned long flags;
|
|
u16 cur_state;
|
|
s32 ret = BCME_OK;
|
|
bool wps_done = false;
|
|
|
|
WL_CFG_WPS_SYNC_LOCK(&cfg->wps_sync, flags);
|
|
cur_state = cfg->wps_session[inst].state;
|
|
if (cur_state == WPS_STATE_REAUTH_WAIT) {
|
|
/* WPS session succeeded. del session. */
|
|
cfg->wps_session[inst].state = WPS_STATE_DONE;
|
|
wps_done = true;
|
|
WL_INFORM_MEM(("[%s][WPS] WPS_REAUTH link up (WPS DONE)\n", ndev->name));
|
|
ret = BCME_OK;
|
|
} else {
|
|
WL_ERR(("[%s][WPS] unexpected link up in state:%d \n",
|
|
ndev->name, cur_state));
|
|
ret = BCME_ERROR;
|
|
}
|
|
WL_CFG_WPS_SYNC_UNLOCK(&cfg->wps_sync, flags);
|
|
if (wps_done) {
|
|
wl_wps_session_del(ndev);
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
static s32
|
|
wl_wps_handle_peersta_linkup(struct net_device *ndev, u16 inst, const u8 *peer_mac)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(ndev);
|
|
unsigned long flags;
|
|
u16 cur_state;
|
|
s32 ret = BCME_OK;
|
|
|
|
WL_CFG_WPS_SYNC_LOCK(&cfg->wps_sync, flags);
|
|
cur_state = cfg->wps_session[inst].state;
|
|
|
|
/* For AP case, check whether call came for right peer */
|
|
if (!peer_mac ||
|
|
memcmp(cfg->wps_session[inst].peer_mac, peer_mac, ETH_ALEN)) {
|
|
WL_ERR(("[WPS] macaddr mismatch\n"));
|
|
WL_CFG_WPS_SYNC_UNLOCK(&cfg->wps_sync, flags);
|
|
/* Mac addr not matching. Ignore. */
|
|
return BCME_ERROR;
|
|
}
|
|
|
|
if (cur_state == WPS_STATE_REAUTH_WAIT) {
|
|
WL_INFORM_MEM(("[%s][WPS] REAUTH link up\n", ndev->name));
|
|
ret = BCME_OK;
|
|
} else {
|
|
WL_INFORM_MEM(("[%s][WPS] unexpected link up in state:%d \n",
|
|
ndev->name, cur_state));
|
|
ret = BCME_ERROR;
|
|
}
|
|
|
|
WL_CFG_WPS_SYNC_UNLOCK(&cfg->wps_sync, flags);
|
|
|
|
return ret;
|
|
}
|
|
|
|
static s32
|
|
wl_wps_handle_authorize(struct net_device *ndev, u16 inst, const u8 *peer_mac)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(ndev);
|
|
unsigned long flags;
|
|
u16 cur_state;
|
|
bool wps_done = false;
|
|
s32 ret = BCME_OK;
|
|
|
|
WL_CFG_WPS_SYNC_LOCK(&cfg->wps_sync, flags);
|
|
cur_state = cfg->wps_session[inst].state;
|
|
|
|
/* For AP case, check whether call came for right peer */
|
|
if (!peer_mac ||
|
|
memcmp(cfg->wps_session[inst].peer_mac, peer_mac, ETH_ALEN)) {
|
|
WL_ERR(("[WPS] macaddr mismatch\n"));
|
|
WL_CFG_WPS_SYNC_UNLOCK(&cfg->wps_sync, flags);
|
|
/* Mac addr not matching. Ignore. */
|
|
return BCME_ERROR;
|
|
}
|
|
|
|
if (cur_state == WPS_STATE_REAUTH_WAIT) {
|
|
/* WPS session succeeded. del session. */
|
|
cfg->wps_session[inst].state = WPS_STATE_DONE;
|
|
wps_done = true;
|
|
WL_INFORM_MEM(("[%s][WPS] Authorize done (WPS DONE)\n", ndev->name));
|
|
ret = BCME_OK;
|
|
} else {
|
|
WL_INFORM_MEM(("[%s][WPS] unexpected Authorize in state:%d \n",
|
|
ndev->name, cur_state));
|
|
ret = BCME_ERROR;
|
|
}
|
|
|
|
WL_CFG_WPS_SYNC_UNLOCK(&cfg->wps_sync, flags);
|
|
if (wps_done) {
|
|
wl_wps_session_del(ndev);
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
static s32
|
|
wl_wps_handle_reauth(struct net_device *ndev, u16 inst, const u8 *peer_mac)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(ndev);
|
|
unsigned long flags;
|
|
u16 cur_state;
|
|
u16 mode;
|
|
s32 ret = BCME_OK;
|
|
|
|
WL_CFG_WPS_SYNC_LOCK(&cfg->wps_sync, flags);
|
|
cur_state = cfg->wps_session[inst].state;
|
|
mode = cfg->wps_session[inst].mode;
|
|
|
|
if (((mode == WL_MODE_BSS) && (cur_state == WPS_STATE_STARTED)) ||
|
|
((mode == WL_MODE_AP) && (cur_state == WPS_STATE_M8_SENT))) {
|
|
/* Move to reauth wait */
|
|
cfg->wps_session[inst].state = WPS_STATE_REAUTH_WAIT;
|
|
/* Use ndev to find the wps instance which fired the timer */
|
|
timer_set_private(&cfg->wps_session[inst].timer, ndev);
|
|
WL_CFG_WPS_SYNC_UNLOCK(&cfg->wps_sync, flags);
|
|
mod_timer(&cfg->wps_session[inst].timer,
|
|
jiffies + msecs_to_jiffies(WL_WPS_REAUTH_TIMEOUT));
|
|
WL_INFORM_MEM(("[%s][WPS] STATE_REAUTH_WAIT mode:%d Peer: " MACDBG "\n",
|
|
ndev->name, mode, MAC2STRDBG(peer_mac)));
|
|
return BCME_OK;
|
|
} else {
|
|
/* 802.1x cases */
|
|
WL_DBG(("[%s][WPS] EAP-FAIL\n", ndev->name));
|
|
}
|
|
WL_CFG_WPS_SYNC_UNLOCK(&cfg->wps_sync, flags);
|
|
return ret;
|
|
}
|
|
|
|
static s32
|
|
wl_wps_handle_disconnect(struct net_device *ndev, u16 inst, const u8 *peer_mac)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(ndev);
|
|
unsigned long flags;
|
|
u16 cur_state;
|
|
s32 ret = BCME_OK;
|
|
|
|
WL_CFG_WPS_SYNC_LOCK(&cfg->wps_sync, flags);
|
|
cur_state = cfg->wps_session[inst].state;
|
|
/* If Disconnect command comes from user space for STA/GC,
|
|
* respond with event without waiting for event from fw as
|
|
* it would be dropped by the WPS_SYNC code.
|
|
*/
|
|
if (cur_state == WPS_STATE_REAUTH_WAIT) {
|
|
if (ETHER_ISBCAST(peer_mac)) {
|
|
WL_DBG(("[WPS] Bcast peer. Do nothing.\n"));
|
|
} else {
|
|
/* Notify link down */
|
|
CFG80211_DISCONNECTED(ndev,
|
|
WLAN_REASON_DEAUTH_LEAVING, NULL, 0,
|
|
true, GFP_ATOMIC);
|
|
}
|
|
} else {
|
|
WL_DBG(("[%s][WPS] Not valid state to report disconnected:%d",
|
|
ndev->name, cur_state));
|
|
ret = BCME_UNSUPPORTED;
|
|
}
|
|
WL_CFG_WPS_SYNC_UNLOCK(&cfg->wps_sync, flags);
|
|
return ret;
|
|
}
|
|
|
|
static s32
|
|
wl_wps_handle_disconnect_client(struct net_device *ndev, u16 inst, const u8 *peer_mac)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(ndev);
|
|
unsigned long flags;
|
|
u16 cur_state;
|
|
s32 ret = BCME_OK;
|
|
bool wps_done = false;
|
|
|
|
WL_CFG_WPS_SYNC_LOCK(&cfg->wps_sync, flags);
|
|
cur_state = cfg->wps_session[inst].state;
|
|
/* For GO/AP, ignore disconnect client during reauth state */
|
|
if (cur_state == WPS_STATE_REAUTH_WAIT) {
|
|
if (ETHER_ISBCAST(peer_mac)) {
|
|
/* If there is broadcast deauth, then mark wps session as ended */
|
|
cfg->wps_session[inst].state = WPS_STATE_DONE;
|
|
wps_done = true;
|
|
WL_INFORM_MEM(("[%s][WPS] BCAST deauth. WPS stopped.\n", ndev->name));
|
|
ret = BCME_OK;
|
|
goto exit;
|
|
} else if (!(memcmp(cfg->wps_session[inst].peer_mac,
|
|
peer_mac, ETH_ALEN))) {
|
|
WL_ERR(("[%s][WPS] Drop disconnect client\n", ndev->name));
|
|
ret = BCME_UNSUPPORTED;
|
|
}
|
|
}
|
|
|
|
exit:
|
|
WL_CFG_WPS_SYNC_UNLOCK(&cfg->wps_sync, flags);
|
|
if (wps_done) {
|
|
wl_wps_session_del(ndev);
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
static s32
|
|
wl_wps_handle_connect_fail(struct net_device *ndev, u16 inst)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(ndev);
|
|
unsigned long flags;
|
|
u16 cur_state;
|
|
bool wps_done = false;
|
|
|
|
WL_CFG_WPS_SYNC_LOCK(&cfg->wps_sync, flags);
|
|
cur_state = cfg->wps_session[inst].state;
|
|
if (cur_state == WPS_STATE_REAUTH_WAIT) {
|
|
cfg->wps_session[inst].state = WPS_STATE_DONE;
|
|
wps_done = true;
|
|
WL_INFORM_MEM(("[%s][WPS] Connect fail. WPS stopped.\n",
|
|
ndev->name));
|
|
} else {
|
|
WL_ERR(("[%s][WPS] Connect fail. state:%d\n",
|
|
ndev->name, cur_state));
|
|
}
|
|
WL_CFG_WPS_SYNC_UNLOCK(&cfg->wps_sync, flags);
|
|
if (wps_done) {
|
|
wl_wps_session_del(ndev);
|
|
}
|
|
return BCME_OK;
|
|
}
|
|
|
|
static s32
|
|
wl_wps_handle_m8_sent(struct net_device *ndev, u16 inst, const u8 *peer_mac)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(ndev);
|
|
unsigned long flags;
|
|
u16 cur_state;
|
|
s32 ret = BCME_OK;
|
|
|
|
WL_CFG_WPS_SYNC_LOCK(&cfg->wps_sync, flags);
|
|
cur_state = cfg->wps_session[inst].state;
|
|
|
|
if (cur_state == WPS_STATE_STARTED) {
|
|
/* Move to M8 sent state */
|
|
cfg->wps_session[inst].state = WPS_STATE_M8_SENT;
|
|
WL_CFG_WPS_SYNC_UNLOCK(&cfg->wps_sync, flags);
|
|
return BCME_OK;
|
|
} else {
|
|
/* 802.1x cases */
|
|
WL_DBG(("[%s][WPS] Not valid state to send M8\n", ndev->name));
|
|
}
|
|
WL_CFG_WPS_SYNC_UNLOCK(&cfg->wps_sync, flags);
|
|
return ret;
|
|
}
|
|
|
|
static s32
|
|
wl_wps_session_update(struct net_device *ndev, u16 state, const u8 *peer_mac)
|
|
{
|
|
s32 inst;
|
|
u16 mode;
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(ndev);
|
|
s32 ret = BCME_ERROR;
|
|
unsigned long flags;
|
|
|
|
WL_CFG_WPS_SYNC_LOCK(&cfg->wps_sync, flags);
|
|
/* Get current instance for the given ndev */
|
|
inst = wl_get_wps_inst_match(cfg, ndev);
|
|
if (inst == BCME_ERROR) {
|
|
/* No active WPS session. Do Nothing. */
|
|
WL_DBG(("[%s][WPS] No matching instance.\n", ndev->name));
|
|
WL_CFG_WPS_SYNC_UNLOCK(&cfg->wps_sync, flags);
|
|
return BCME_NOTFOUND;
|
|
}
|
|
mode = cfg->wps_session[inst].mode;
|
|
WL_CFG_WPS_SYNC_UNLOCK(&cfg->wps_sync, flags);
|
|
|
|
WL_DBG(("[%s][WPS] state:%d mode:%d Peer: " MACDBG "\n",
|
|
ndev->name, state, mode, MAC2STRDBG(peer_mac)));
|
|
|
|
switch (state) {
|
|
case WPS_STATE_M8_RECVD:
|
|
{
|
|
/* Occasionally, due to race condition between ctrl
|
|
* and data path, deauth ind is recvd before EAP-FAIL.
|
|
* Ignore deauth ind before EAP-FAIL
|
|
* So move to REAUTH WAIT on receiving M8 on GC and
|
|
* ignore deauth ind before EAP-FAIL till 'x' timeout.
|
|
* Kickoff a timer to monitor reauth status.
|
|
*/
|
|
if (mode == WL_MODE_BSS) {
|
|
ret = wl_wps_handle_reauth(ndev, inst, peer_mac);
|
|
} else {
|
|
/* Nothing to be done for AP/GO mode */
|
|
ret = BCME_OK;
|
|
}
|
|
break;
|
|
}
|
|
case WPS_STATE_M8_SENT:
|
|
{
|
|
/* Mantain the M8 sent state to verify
|
|
* EAP-FAIL sent is valid
|
|
*/
|
|
if (mode == WL_MODE_AP) {
|
|
ret = wl_wps_handle_m8_sent(ndev, inst, peer_mac);
|
|
} else {
|
|
/* Nothing to be done for STA/GC mode */
|
|
ret = BCME_OK;
|
|
}
|
|
break;
|
|
}
|
|
case WPS_STATE_EAP_FAIL:
|
|
{
|
|
/* Move to REAUTH WAIT following EAP-FAIL TX on GO/AP.
|
|
* Kickoff a timer to monitor reauth status
|
|
*/
|
|
if (mode == WL_MODE_AP) {
|
|
ret = wl_wps_handle_reauth(ndev, inst, peer_mac);
|
|
} else {
|
|
/* Nothing to be done for STA/GC mode */
|
|
ret = BCME_OK;
|
|
}
|
|
break;
|
|
}
|
|
case WPS_STATE_LINKDOWN:
|
|
{
|
|
if (mode == WL_MODE_BSS) {
|
|
ret = wl_wps_handle_sta_linkdown(ndev, inst);
|
|
} else if (mode == WL_MODE_AP) {
|
|
/* Take action only for matching peer mac */
|
|
if (!memcmp(cfg->wps_session[inst].peer_mac, peer_mac, ETH_ALEN)) {
|
|
ret = wl_wps_handle_peersta_linkdown(ndev, inst, peer_mac);
|
|
}
|
|
}
|
|
break;
|
|
}
|
|
case WPS_STATE_LINKUP:
|
|
{
|
|
if (mode == WL_MODE_BSS) {
|
|
wl_wps_handle_sta_linkup(ndev, inst);
|
|
} else if (mode == WL_MODE_AP) {
|
|
/* Take action only for matching peer mac */
|
|
if (!memcmp(cfg->wps_session[inst].peer_mac, peer_mac, ETH_ALEN)) {
|
|
wl_wps_handle_peersta_linkup(ndev, inst, peer_mac);
|
|
}
|
|
}
|
|
break;
|
|
}
|
|
case WPS_STATE_DISCONNECT_CLIENT:
|
|
{
|
|
/* Disconnect STA/GC command from user space */
|
|
if (mode == WL_MODE_AP) {
|
|
ret = wl_wps_handle_disconnect_client(ndev, inst, peer_mac);
|
|
} else {
|
|
WL_ERR(("[WPS] Unsupported mode %d\n", mode));
|
|
}
|
|
break;
|
|
}
|
|
case WPS_STATE_DISCONNECT:
|
|
{
|
|
/* Disconnect command on STA/GC interface */
|
|
if (mode == WL_MODE_BSS) {
|
|
ret = wl_wps_handle_disconnect(ndev, inst, peer_mac);
|
|
}
|
|
break;
|
|
}
|
|
case WPS_STATE_CONNECT_FAIL:
|
|
{
|
|
if (mode == WL_MODE_BSS) {
|
|
ret = wl_wps_handle_connect_fail(ndev, inst);
|
|
} else {
|
|
WL_ERR(("[WPS] Unsupported mode %d\n", mode));
|
|
}
|
|
break;
|
|
}
|
|
case WPS_STATE_AUTHORIZE:
|
|
{
|
|
if (mode == WL_MODE_AP) {
|
|
/* Take action only for matching peer mac */
|
|
if (!memcmp(cfg->wps_session[inst].peer_mac, peer_mac, ETH_ALEN)) {
|
|
wl_wps_handle_authorize(ndev, inst, peer_mac);
|
|
} else {
|
|
WL_INFORM_MEM(("[WPS] Authorize Request for wrong peer\n"));
|
|
}
|
|
}
|
|
break;
|
|
}
|
|
|
|
default:
|
|
WL_ERR(("[WPS] Unsupported state:%d mode:%d\n", state, mode));
|
|
ret = BCME_ERROR;
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
#define EAP_EXP_ATTRIB_DATA_OFFSET 14
|
|
void
|
|
wl_handle_wps_states(struct net_device *ndev, u8 *pkt, u16 len, bool direction)
|
|
{
|
|
eapol_header_t *eapol_hdr;
|
|
bool tx_packet = direction;
|
|
u16 eapol_type;
|
|
u16 mode;
|
|
u8 *peer_mac;
|
|
|
|
if (!ndev || !pkt) {
|
|
WL_ERR(("[WPS] Invalid arg\n"));
|
|
return;
|
|
}
|
|
|
|
if (len < (ETHER_HDR_LEN + EAPOL_HDR_LEN)) {
|
|
WL_ERR(("[WPS] Invalid len\n"));
|
|
return;
|
|
}
|
|
|
|
eapol_hdr = (eapol_header_t *)pkt;
|
|
eapol_type = eapol_hdr->type;
|
|
|
|
peer_mac = tx_packet ? eapol_hdr->eth.ether_dhost :
|
|
eapol_hdr->eth.ether_shost;
|
|
/*
|
|
* The implementation assumes only one WPS session would be active
|
|
* per interface at a time. Even for hostap, the wps_pin session
|
|
* is limited to one enrollee/client at a time. A session is marked
|
|
* started on WSC_START and gets cleared from below contexts
|
|
* a) Deauth/link down before reaching EAP-FAIL state. (Fail case)
|
|
* b) Link up following EAP-FAIL. (success case)
|
|
* c) Link up timeout after EAP-FAIL. (Fail case)
|
|
*/
|
|
|
|
if (eapol_type == EAP_PACKET) {
|
|
wl_eap_header_t *eap;
|
|
|
|
if (len > sizeof(*eap)) {
|
|
eap = (wl_eap_header_t *)(pkt + ETHER_HDR_LEN + EAPOL_HDR_LEN);
|
|
if (eap->type == EAP_EXPANDED_TYPE) {
|
|
wl_eap_exp_t *exp = (wl_eap_exp_t *)eap->data;
|
|
if (eap->length > EAP_EXP_HDR_MIN_LENGTH) {
|
|
/* opcode is at fixed offset */
|
|
u8 opcode = exp->opcode;
|
|
u16 eap_len = ntoh16(eap->length);
|
|
|
|
WL_DBG(("[%s][WPS] EAP EXPANDED packet. opcode:%x len:%d\n",
|
|
ndev->name, opcode, eap_len));
|
|
if (opcode == EAP_WSC_MSG) {
|
|
const u8 *msg;
|
|
const u8* parse_buf = exp->data;
|
|
/* Check if recvd pkt is fragmented */
|
|
if ((!tx_packet) &&
|
|
(exp->flags &
|
|
EAP_EXP_FLAGS_FRAGMENTED_DATA)) {
|
|
if ((eap_len - EAP_EXP_ATTRIB_DATA_OFFSET)
|
|
> 2) {
|
|
parse_buf +=
|
|
EAP_EXP_FRAGMENT_LEN_OFFSET;
|
|
eap_len -=
|
|
EAP_EXP_FRAGMENT_LEN_OFFSET;
|
|
WL_DBG(("Rcvd EAP"
|
|
" fragmented pkt\n"));
|
|
} else {
|
|
/* If recvd pkt is fragmented
|
|
* and does not have
|
|
* length field drop the packet.
|
|
*/
|
|
return;
|
|
}
|
|
}
|
|
|
|
msg = wl_find_attribute(parse_buf,
|
|
(eap_len - EAP_EXP_ATTRIB_DATA_OFFSET),
|
|
EAP_ATTRIB_MSGTYPE);
|
|
if (unlikely(!msg)) {
|
|
WL_ERR(("[WPS] ATTRIB MSG not found!\n"));
|
|
} else if ((*msg == EAP_WSC_MSG_M8) &&
|
|
!tx_packet) {
|
|
WL_INFORM_MEM(("[%s][WPS] M8\n",
|
|
ndev->name));
|
|
wl_wps_session_update(ndev,
|
|
WPS_STATE_M8_RECVD, peer_mac);
|
|
} else if ((*msg == EAP_WSC_MSG_M8) &&
|
|
tx_packet) {
|
|
WL_INFORM_MEM(("[%s][WPS] M8 Sent\n",
|
|
ndev->name));
|
|
wl_wps_session_update(ndev,
|
|
WPS_STATE_M8_SENT, peer_mac);
|
|
} else {
|
|
WL_DBG(("[%s][WPS] EAP WSC MSG: 0x%X\n",
|
|
ndev->name, *msg));
|
|
}
|
|
} else if (opcode == EAP_WSC_START) {
|
|
/* WSC session started. WSC_START - Tx from GO/AP.
|
|
* Session will be deleted on successful link up or
|
|
* on failure (deauth context)
|
|
*/
|
|
mode = tx_packet ? WL_MODE_AP : WL_MODE_BSS;
|
|
wl_wps_session_add(ndev, mode, peer_mac);
|
|
WL_INFORM_MEM(("[%s][WPS] WSC_START Mode:%d\n",
|
|
ndev->name, mode));
|
|
} else if (opcode == EAP_WSC_DONE) {
|
|
/* WSC session done. TX on STA/GC. RX on GO/AP
|
|
* On devices where config file save fails, it may
|
|
* return WPS_NAK with config_error:0. But the
|
|
* connection would still proceed. Hence don't let
|
|
* state machine depend on WSC DONE.
|
|
*/
|
|
WL_INFORM_MEM(("[%s][WPS] WSC_DONE\n", ndev->name));
|
|
}
|
|
}
|
|
}
|
|
|
|
if (eap->code == EAP_CODE_FAILURE) {
|
|
/* EAP_FAIL */
|
|
WL_INFORM_MEM(("[%s][WPS] EAP_FAIL\n", ndev->name));
|
|
wl_wps_session_update(ndev,
|
|
WPS_STATE_EAP_FAIL, peer_mac);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
#endif /* WL_WPS_SYNC */
|
|
|
|
s32
|
|
wl_cfg80211_sup_event_handler(struct bcm_cfg80211 *cfg, bcm_struct_cfgdev *cfgdev,
|
|
const wl_event_msg_t *event, void *data)
|
|
{
|
|
int err = BCME_OK;
|
|
u32 status = ntoh32(event->status);
|
|
struct net_device *ndev = bcmcfg_to_prmry_ndev(cfg);
|
|
u32 reason = ntoh32(event->reason);
|
|
|
|
if (!wl_get_drv_status(cfg, CFG80211_CONNECT, ndev)) {
|
|
/* Join attempt via non-cfg80211 interface.
|
|
* Don't send resultant events to cfg80211
|
|
* layer
|
|
*/
|
|
WL_INFORM_MEM(("Event received in non-cfg80211"
|
|
" connect state. Ignore\n"));
|
|
return BCME_OK;
|
|
}
|
|
|
|
if ((status == WLC_SUP_KEYED || status == WLC_SUP_KEYXCHANGE_WAIT_G1) &&
|
|
reason == WLC_E_SUP_OTHER) {
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(4, 15, 0))
|
|
/* NL80211_CMD_PORT_AUTHORIZED supported above >= 4.15 */
|
|
cfg80211_port_authorized(ndev, (u8 *)wl_read_prof(cfg, ndev, WL_PROF_BSSID),
|
|
GFP_KERNEL);
|
|
WL_INFORM_MEM(("4way HS finished. port authorized event sent\n"));
|
|
#elif ((LINUX_VERSION_CODE > KERNEL_VERSION(3, 14, 0)) || \
|
|
defined(WL_VENDOR_EXT_SUPPORT))
|
|
err = wl_cfgvendor_send_async_event(bcmcfg_to_wiphy(cfg), ndev,
|
|
BRCM_VENDOR_EVENT_PORT_AUTHORIZED, NULL, 0);
|
|
WL_INFORM_MEM(("4way HS finished. port authorized event sent\n"));
|
|
#else
|
|
/* not supported in kernel <= 3,14,0 */
|
|
#endif /* LINUX_VERSION_CODE >= KERNEL_VERSION(4, 15, 0) */
|
|
} else if (status < WLC_SUP_KEYXCHANGE_WAIT_G1 && (reason != WLC_E_SUP_OTHER &&
|
|
reason != WLC_E_SUP_PTK_UPDATE)) {
|
|
/* if any failure seen while 4way HS, should send NL80211_CMD_DISCONNECT */
|
|
WL_ERR(("4way HS error. status:%d, reason:%d\n", status, reason));
|
|
CFG80211_DISCONNECTED(ndev, 0, NULL, 0, false, GFP_KERNEL);
|
|
}
|
|
|
|
return err;
|
|
}
|
|
|
|
#ifdef WL_BCNRECV
|
|
static s32
|
|
wl_bcnrecv_aborted_event_handler(struct bcm_cfg80211 *cfg, bcm_struct_cfgdev *cfgdev,
|
|
const wl_event_msg_t *e, void *data)
|
|
{
|
|
s32 status = ntoh32(e->status);
|
|
struct net_device *ndev = bcmcfg_to_prmry_ndev(cfg);
|
|
/* Abort fakeapscan, when Roam is in progress */
|
|
if (status == WLC_E_STATUS_RXBCN_ABORT) {
|
|
wl_android_bcnrecv_stop(ndev, WL_BCNRECV_ROAMABORT);
|
|
} else {
|
|
WL_ERR(("UNKNOWN STATUS. status:%d\n", status));
|
|
}
|
|
return BCME_OK;
|
|
}
|
|
#endif /* WL_BCNRECV */
|
|
|
|
#ifdef WL_MBO
|
|
static s32
|
|
wl_mbo_event_handler(struct bcm_cfg80211 *cfg, bcm_struct_cfgdev *cfgdev,
|
|
const wl_event_msg_t *e, void *data)
|
|
{
|
|
s32 err = 0;
|
|
wl_event_mbo_t *mbo_evt = (wl_event_mbo_t *)data;
|
|
wl_event_mbo_cell_nw_switch_t *cell_sw_evt = NULL;
|
|
wl_btm_event_type_data_t *evt_data = NULL;
|
|
|
|
WL_INFORM(("MBO: Evt %u\n", mbo_evt->type));
|
|
|
|
if (mbo_evt->type == WL_MBO_E_CELLULAR_NW_SWITCH) {
|
|
cell_sw_evt = (wl_event_mbo_cell_nw_switch_t *)mbo_evt->data;
|
|
BCM_REFERENCE(cell_sw_evt);
|
|
SUPP_EVENT(("CTRL-EVENT-CELLULAR-SWITCH", "reason %d cur_assoc_time_left %u "
|
|
"reassoc_delay %u\n", cell_sw_evt->reason,
|
|
cell_sw_evt->assoc_time_remain, cell_sw_evt->reassoc_delay));
|
|
} else if (mbo_evt->type == WL_MBO_E_BTM_RCVD) {
|
|
evt_data = (wl_btm_event_type_data_t *)mbo_evt->data;
|
|
if (evt_data->version != WL_BTM_EVENT_DATA_VER_1) {
|
|
WL_ERR(("version mismatch. rcvd %u expected %u\n",
|
|
evt_data->version, WL_BTM_EVENT_DATA_VER_1));
|
|
return -1;
|
|
}
|
|
SUPP_EVENT(("CTRL-EVENT-BRCM-BTM-REQ-RCVD", "reason=%u\n",
|
|
evt_data->transition_reason));
|
|
} else {
|
|
WL_INFORM(("UNKNOWN EVENT. type:%u\n", mbo_evt->type));
|
|
}
|
|
return err;
|
|
}
|
|
#endif /* WL_MBO */
|
|
|
|
#ifdef WL_CAC_TS
|
|
static s32
|
|
wl_cfg80211_cac_event_handler(struct bcm_cfg80211 *cfg, bcm_struct_cfgdev *cfgdev,
|
|
const wl_event_msg_t *e, void *data)
|
|
{
|
|
u32 event = ntoh32(e->event_type);
|
|
s32 status = ntoh32(e->status);
|
|
s32 reason = ntoh32(e->reason);
|
|
|
|
BCM_REFERENCE(reason);
|
|
|
|
if (event == WLC_E_ADDTS_IND) {
|
|
/* The supp log format of adding ts_delay in success case needs to be maintained */
|
|
if (status == WLC_E_STATUS_SUCCESS) {
|
|
uint *ts_delay = (uint *)data;
|
|
BCM_REFERENCE(ts_delay);
|
|
SUPP_EVENT(("CTRL-EVENT-CAC-ADDTS", "status=%d reason=%d ts_delay=%u\n",
|
|
status, reason, *ts_delay));
|
|
} else {
|
|
SUPP_EVENT(("CTRL-EVENT-CAC-ADDTS", "status=%d reason=%d\n",
|
|
status, reason));
|
|
}
|
|
} else if (event == WLC_E_DELTS_IND) {
|
|
SUPP_EVENT(("CTRL-EVENT-CAC-DELTS", "status=%d reason=%d\n", status, reason));
|
|
}
|
|
|
|
return BCME_OK;
|
|
}
|
|
#endif /* WL_CAC_TS */
|
|
|
|
#if defined(WL_MBO) || defined(WL_OCE)
|
|
static s32
|
|
wl_bssid_prune_event_handler(struct bcm_cfg80211 *cfg, bcm_struct_cfgdev *cfgdev,
|
|
const wl_event_msg_t *e, void *data)
|
|
{
|
|
s32 err = 0;
|
|
uint reason = 0;
|
|
wl_bssid_pruned_evt_info_t *evt_info = (wl_bssid_pruned_evt_info_t *)data;
|
|
|
|
if (evt_info->version == WL_BSSID_PRUNE_EVT_VER_1) {
|
|
if (evt_info->reason == WLC_E_PRUNE_ASSOC_RETRY_DELAY) {
|
|
/* MBO assoc retry delay */
|
|
reason = WIFI_PRUNE_ASSOC_RETRY_DELAY;
|
|
SUPP_EVENT(("CTRL-EVENT-BRCM-BSSID-PRUNED", "ssid=%s bssid=" MACF
|
|
" reason=%u timeout_val=%u(ms)\n", evt_info->SSID,
|
|
ETHER_TO_MACF(evt_info->BSSID), reason, evt_info->time_remaining));
|
|
} else if (evt_info->reason == WLC_E_PRUNE_RSSI_ASSOC_REJ) {
|
|
/* OCE RSSI-based assoc rejection */
|
|
reason = WIFI_PRUNE_RSSI_ASSOC_REJ;
|
|
SUPP_EVENT(("CTRL-EVENT-BRCM-BSSID-PRUNED", "ssid=%s bssid=" MACF
|
|
" reason=%u timeout_val=%u(ms) rssi_threshold=%d(dBm)\n",
|
|
evt_info->SSID, ETHER_TO_MACF(evt_info->BSSID),
|
|
reason, evt_info->time_remaining, evt_info->rssi_threshold));
|
|
} else {
|
|
/* Invalid other than the assoc retry delay/RSSI assoc rejection
|
|
* in the current handler
|
|
*/
|
|
BCM_REFERENCE(reason);
|
|
WL_INFORM(("INVALID. reason:%u\n", evt_info->reason));
|
|
}
|
|
} else {
|
|
WL_INFORM(("version mismatch. rcvd %u expected %u\n", evt_info->version,
|
|
WL_BSSID_PRUNE_EVT_VER_1));
|
|
}
|
|
return err;
|
|
}
|
|
#endif /* WL_MBO || WL_OCE */
|
|
#ifdef RTT_SUPPORT
|
|
static s32
|
|
wl_cfg80211_rtt_event_handler(struct bcm_cfg80211 *cfg, bcm_struct_cfgdev *cfgdev,
|
|
const wl_event_msg_t *e, void *data)
|
|
{
|
|
dhd_pub_t *dhdp = (dhd_pub_t *)(cfg->pub);
|
|
wl_event_msg_t event;
|
|
|
|
(void)memcpy_s(&event, sizeof(wl_event_msg_t),
|
|
e, sizeof(wl_event_msg_t));
|
|
return dhd_rtt_event_handler(dhdp, &event, data);
|
|
}
|
|
#endif /* RTT_SUPPORT */
|
|
|
|
void
|
|
wl_print_verinfo(struct bcm_cfg80211 *cfg)
|
|
{
|
|
char *ver_ptr;
|
|
uint32 alloc_len = MOD_PARAM_INFOLEN;
|
|
|
|
if (!cfg) {
|
|
WL_ERR(("cfg is NULL\n"));
|
|
return;
|
|
}
|
|
|
|
ver_ptr = (char *)MALLOCZ(cfg->osh, alloc_len);
|
|
if (!ver_ptr) {
|
|
WL_ERR(("Failed to alloc ver_ptr\n"));
|
|
return;
|
|
}
|
|
|
|
if (!dhd_os_get_version(bcmcfg_to_prmry_ndev(cfg),
|
|
TRUE, &ver_ptr, alloc_len)) {
|
|
WL_ERR(("DHD Version: %s\n", ver_ptr));
|
|
}
|
|
|
|
if (!dhd_os_get_version(bcmcfg_to_prmry_ndev(cfg),
|
|
FALSE, &ver_ptr, alloc_len)) {
|
|
WL_ERR(("F/W Version: %s\n", ver_ptr));
|
|
}
|
|
|
|
MFREE(cfg->osh, ver_ptr, alloc_len);
|
|
}
|
|
#if defined(WL_DISABLE_HE_SOFTAP) || defined(WL_DISABLE_HE_P2P)
|
|
typedef struct {
|
|
uint16 id;
|
|
uint16 len;
|
|
uint32 val;
|
|
} he_xtlv_v32;
|
|
|
|
static bool
|
|
wl_he_get_uint_cb(void *ctx, uint16 *id, uint16 *len)
|
|
{
|
|
he_xtlv_v32 *v32 = ctx;
|
|
|
|
*id = v32->id;
|
|
*len = v32->len;
|
|
|
|
return FALSE;
|
|
}
|
|
|
|
static void
|
|
wl_he_pack_uint_cb(void *ctx, uint16 id, uint16 len, uint8 *buf)
|
|
{
|
|
he_xtlv_v32 *v32 = ctx;
|
|
|
|
BCM_REFERENCE(id);
|
|
BCM_REFERENCE(len);
|
|
|
|
v32->val = htod32(v32->val);
|
|
|
|
switch (v32->len) {
|
|
case sizeof(uint8):
|
|
*buf = (uint8)v32->val;
|
|
break;
|
|
case sizeof(uint16):
|
|
store16_ua(buf, (uint16)v32->val);
|
|
break;
|
|
case sizeof(uint32):
|
|
store32_ua(buf, v32->val);
|
|
break;
|
|
default:
|
|
/* ASSERT(0); */
|
|
break;
|
|
}
|
|
}
|
|
|
|
int wl_cfg80211_set_he_mode(struct net_device *dev, struct bcm_cfg80211 *cfg,
|
|
s32 bssidx, u32 interface_type, bool set)
|
|
{
|
|
bcm_xtlv_t read_he_xtlv;
|
|
uint8 se_he_xtlv[32];
|
|
int se_he_xtlv_len = sizeof(se_he_xtlv);
|
|
he_xtlv_v32 v32;
|
|
u32 he_feature = 0;
|
|
s32 err = 0;
|
|
u32 he_interface = 0;
|
|
|
|
read_he_xtlv.id = WL_HE_CMD_FEATURES;
|
|
read_he_xtlv.len = 0;
|
|
err = wldev_iovar_getbuf_bsscfg(dev, "he", &read_he_xtlv, sizeof(read_he_xtlv),
|
|
cfg->ioctl_buf, WLC_IOCTL_SMLEN, bssidx, NULL);
|
|
if (err < 0) {
|
|
if (err == BCME_UNSUPPORTED) {
|
|
/* HE not supported. Do nothing. */
|
|
return BCME_OK;
|
|
}
|
|
WL_ERR(("HE get failed. error=%d\n", err));
|
|
} else {
|
|
he_feature = *(int*)cfg->ioctl_buf;
|
|
he_feature = dtoh32(he_feature);
|
|
}
|
|
|
|
v32.id = WL_HE_CMD_FEATURES;
|
|
v32.len = sizeof(s32);
|
|
if (interface_type == WL_IF_TYPE_P2P_DISC) {
|
|
he_interface = WL_HE_FEATURES_HE_P2P;
|
|
} else if (interface_type == WL_IF_TYPE_AP) {
|
|
he_interface = WL_HE_FEATURES_HE_AP;
|
|
} else {
|
|
WL_ERR(("HE request for Invalid interface type"));
|
|
err = BCME_BADARG;
|
|
return err;
|
|
}
|
|
|
|
if (set) {
|
|
v32.val = (he_feature | he_interface);
|
|
} else {
|
|
v32.val = (he_feature & ~he_interface);
|
|
}
|
|
|
|
err = bcm_pack_xtlv_buf((void *)&v32, se_he_xtlv, sizeof(se_he_xtlv),
|
|
BCM_XTLV_OPTION_ALIGN32, wl_he_get_uint_cb, wl_he_pack_uint_cb,
|
|
&se_he_xtlv_len);
|
|
if (err != BCME_OK) {
|
|
WL_ERR(("failed to pack he settvl=%d\n", err));
|
|
}
|
|
|
|
err = wldev_iovar_setbuf_bsscfg(dev, "he", &se_he_xtlv, sizeof(se_he_xtlv),
|
|
cfg->ioctl_buf, WLC_IOCTL_SMLEN, bssidx, &cfg->ioctl_buf_sync);
|
|
if (err < 0) {
|
|
WL_ERR(("failed to set he features, error=%d\n", err));
|
|
}
|
|
WL_INFORM(("Set HE[%d] done\n", set));
|
|
|
|
return err;
|
|
}
|
|
#endif /* WL_DISABLE_HE_SOFTAP || WL_DISABLE_HE_P2P */
|
|
|
|
/* Get the concurrency mode */
|
|
int wl_cfg80211_get_concurrency_mode(struct bcm_cfg80211 *cfg)
|
|
{
|
|
struct net_info *iter, *next;
|
|
uint cmode = CONCURRENCY_MODE_NONE;
|
|
u32 connected_cnt = 0;
|
|
u32 pre_channel = 0, channel = 0;
|
|
u32 pre_band = 0;
|
|
u32 chanspec = 0;
|
|
u32 band = 0;
|
|
|
|
connected_cnt = wl_get_drv_status_all(cfg, CONNECTED);
|
|
if (connected_cnt <= 1) {
|
|
return cmode;
|
|
}
|
|
GCC_DIAGNOSTIC_PUSH_SUPPRESS_CAST();
|
|
for_each_ndev(cfg, iter, next) {
|
|
if (iter->ndev) {
|
|
if (wl_get_drv_status(cfg, CONNECTED, iter->ndev)) {
|
|
if (wldev_iovar_getint(iter->ndev, "chanspec",
|
|
(s32 *)&chanspec) == BCME_OK) {
|
|
channel = wf_chspec_ctlchan(
|
|
wl_chspec_driver_to_host(chanspec));
|
|
band = (channel <= CH_MAX_2G_CHANNEL) ?
|
|
IEEE80211_BAND_2GHZ : IEEE80211_BAND_5GHZ;
|
|
}
|
|
if ((!pre_channel && channel)) {
|
|
pre_band = band;
|
|
pre_channel = channel;
|
|
} else if (pre_channel) {
|
|
if ((pre_band == band) && (pre_channel == channel)) {
|
|
cmode = CONCURRENCY_SCC_MODE;
|
|
goto exit;
|
|
} else if ((pre_band == band) && (pre_channel != channel)) {
|
|
cmode = CONCURRENCY_VSDB_MODE;
|
|
goto exit;
|
|
} else if (pre_band != band) {
|
|
cmode = CONCURRENCY_RSDB_MODE;
|
|
goto exit;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
#if defined(STRICT_GCC_WARNINGS) && defined(__GNUC__) && (__GNUC__ > 4 || (__GNUC__ == \
|
|
4 && __GNUC_MINOR__ >= 6))
|
|
_Pragma("GCC diagnostic pop")
|
|
#endif // endif
|
|
exit:
|
|
return cmode;
|
|
}
|
|
#ifdef WL_CHAN_UTIL
|
|
static s32
|
|
wl_cfg80211_bssload_report_event_handler(struct bcm_cfg80211 *cfg, bcm_struct_cfgdev *cfgdev,
|
|
const wl_event_msg_t *e, void *data)
|
|
{
|
|
s32 err = BCME_OK;
|
|
struct sk_buff *skb = NULL;
|
|
s32 status = ntoh32(e->status);
|
|
u8 chan_use_percentage = 0;
|
|
#if (defined(CONFIG_ARCH_MSM) && defined(SUPPORT_WDEV_CFG80211_VENDOR_EVENT_ALLOC)) || \
|
|
LINUX_VERSION_CODE >= KERNEL_VERSION(4, 1, 0)
|
|
struct net_device *ndev = bcmcfg_to_prmry_ndev(cfg);
|
|
#endif /* (defined(CONFIG_ARCH_MSM) && defined(SUPPORT_WDEV_CFG80211_VENDOR_EVENT_ALLOC)) || */
|
|
/* LINUX_VERSION_CODE >= KERNEL_VERSION(4, 1, 0) */
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 14, 0))
|
|
struct wiphy *wiphy = bcmcfg_to_wiphy(cfg);
|
|
uint len;
|
|
gfp_t kflags;
|
|
#endif /* LINUX_VERSION_CODE >= KERNEL_VERSION(3, 14, 0) */
|
|
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 14, 0))
|
|
len = CU_ATTR_HDR_LEN + sizeof(u8);
|
|
kflags = in_atomic() ? GFP_ATOMIC : GFP_KERNEL;
|
|
#endif /* LINUX_VERSION_CODE >= KERNEL_VERSION(3, 14, 0) */
|
|
|
|
#if (defined(CONFIG_ARCH_MSM) && defined(SUPPORT_WDEV_CFG80211_VENDOR_EVENT_ALLOC)) || \
|
|
LINUX_VERSION_CODE >= KERNEL_VERSION(4, 1, 0)
|
|
skb = cfg80211_vendor_event_alloc(wiphy, ndev_to_wdev(ndev), len,
|
|
BRCM_VENDOR_EVENT_CU, kflags);
|
|
#elif (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 14, 0))
|
|
skb = cfg80211_vendor_event_alloc(wiphy, len, BRCM_VENDOR_EVENT_CU, kflags);
|
|
#else
|
|
/* No support exist */
|
|
#endif /* (defined(CONFIG_ARCH_MSM) && defined(SUPPORT_WDEV_CFG80211_VENDOR_EVENT_ALLOC)) || */
|
|
/* LINUX_VERSION_CODE >= KERNEL_VERSION(4, 1, 0) */
|
|
if (!skb) {
|
|
WL_ERR(("skb alloc failed"));
|
|
return -ENOMEM;
|
|
}
|
|
|
|
if ((status == WLC_E_STATUS_SUCCESS) && data) {
|
|
wl_bssload_t *bssload_report = (wl_bssload_t *)data;
|
|
chan_use_percentage = (bssload_report->chan_util * 100) / 255;
|
|
WL_DBG(("ChannelUtilization=%hhu\n", chan_use_percentage));
|
|
err = nla_put_u8(skb, CU_ATTR_PERCENTAGE, chan_use_percentage);
|
|
if (err < 0) {
|
|
WL_ERR(("Failed to put CU_ATTR_PERCENTAGE, err:%d\n", err));
|
|
}
|
|
}
|
|
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 14, 0))
|
|
cfg80211_vendor_event(skb, kflags);
|
|
#endif /* LINUX_VERSION_CODE >= KERNEL_VERSION(3, 14, 0) */
|
|
|
|
return err;
|
|
}
|
|
|
|
#define WL_CHAN_UTIL_DEFAULT_INTERVAL 3000
|
|
#define WL_CHAN_UTIL_THRESH_MIN 15
|
|
#define WL_CHAN_UTIL_THRESH_INTERVAL 10
|
|
#ifndef CUSTOM_CU_INTERVAL
|
|
#define CUSTOM_CU_INTERVAL WL_CHAN_UTIL_DEFAULT_INTERVAL
|
|
#endif /* CUSTOM_CU_INTERVAL */
|
|
|
|
static s32
|
|
wl_cfg80211_start_bssload_report(struct net_device *ndev)
|
|
{
|
|
s32 err = BCME_OK;
|
|
wl_bssload_cfg_t blcfg;
|
|
u8 i;
|
|
struct bcm_cfg80211 *cfg;
|
|
|
|
if (!ndev) {
|
|
return -ENODEV;
|
|
}
|
|
|
|
cfg = wl_get_cfg(ndev);
|
|
if (!cfg) {
|
|
return -ENODEV;
|
|
}
|
|
|
|
/* Typecasting to void as the buffer size is same as the memset size */
|
|
(void)memset_s(&blcfg, sizeof(wl_bssload_cfg_t), 0, sizeof(wl_bssload_cfg_t));
|
|
/* Set default report interval 3 sec and 8 threshhold levels between 15 to 85% */
|
|
blcfg.rate_limit_msec = CUSTOM_CU_INTERVAL;
|
|
blcfg.num_util_levels = MAX_BSSLOAD_LEVELS;
|
|
for (i = 0; i < MAX_BSSLOAD_LEVELS; i++) {
|
|
blcfg.util_levels[i] = (((WL_CHAN_UTIL_THRESH_MIN +
|
|
(i * WL_CHAN_UTIL_THRESH_INTERVAL)) * 255) / 100);
|
|
}
|
|
|
|
err = wldev_iovar_setbuf(ndev, "bssload_report_event", &blcfg,
|
|
sizeof(wl_bssload_cfg_t), cfg->ioctl_buf, WLC_IOCTL_SMLEN, &cfg->ioctl_buf_sync);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("Set event_msgs error (%d)\n", err));
|
|
}
|
|
|
|
return err;
|
|
}
|
|
#endif /* WL_CHAN_UTIL */
|
|
|
|
s32
|
|
wl_cfg80211_config_suspend_events(struct net_device *ndev, bool enable)
|
|
{
|
|
s8 iovbuf[WL_EVENTING_MASK_LEN + 12];
|
|
s8 eventmask[WL_EVENTING_MASK_LEN];
|
|
s32 err = 0;
|
|
struct bcm_cfg80211 *cfg;
|
|
|
|
if (!ndev) {
|
|
return -ENODEV;
|
|
}
|
|
|
|
cfg = wl_get_cfg(ndev);
|
|
if (!cfg) {
|
|
return -ENODEV;
|
|
}
|
|
|
|
mutex_lock(&cfg->event_sync);
|
|
err = wldev_iovar_getbuf(ndev, "event_msgs", NULL, 0, iovbuf, sizeof(iovbuf), NULL);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("Get event_msgs error (%d)\n", err));
|
|
goto eventmsg_out;
|
|
}
|
|
|
|
(void)memcpy_s(eventmask, WL_EVENTING_MASK_LEN, iovbuf, WL_EVENTING_MASK_LEN);
|
|
/* Add set/clear of event mask under feature specific flags */
|
|
if (enable) {
|
|
WL_DBG(("%s: Enabling events on resume\n", __FUNCTION__));
|
|
#ifdef WL_CHAN_UTIL
|
|
setbit(eventmask, WLC_E_BSS_LOAD);
|
|
#endif /* WL_CHAN_UTIL */
|
|
} else {
|
|
WL_DBG(("%s: Disabling events before suspend\n", __FUNCTION__));
|
|
#ifdef WL_CHAN_UTIL
|
|
clrbit(eventmask, WLC_E_BSS_LOAD);
|
|
#endif /* WL_CHAN_UTIL */
|
|
}
|
|
|
|
err = wldev_iovar_setbuf(ndev, "event_msgs", eventmask, WL_EVENTING_MASK_LEN, iovbuf,
|
|
sizeof(iovbuf), NULL);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("Set event_msgs error (%d)\n", err));
|
|
goto eventmsg_out;
|
|
}
|
|
|
|
eventmsg_out:
|
|
mutex_unlock(&cfg->event_sync);
|
|
return err;
|
|
}
|
|
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 12, 0))
|
|
int
|
|
wl_cfg80211_channel_switch(struct wiphy *wiphy, struct net_device *dev,
|
|
struct cfg80211_csa_settings *params)
|
|
{
|
|
s32 err = BCME_OK;
|
|
s32 chan = 0;
|
|
u32 band = 0;
|
|
u32 bw = WL_CHANSPEC_BW_20;
|
|
chanspec_t chspec = 0;
|
|
wl_chan_switch_t csa_arg;
|
|
struct cfg80211_chan_def *chandef = ¶ms->chandef;
|
|
struct bcm_cfg80211 *cfg = wiphy_priv(wiphy);
|
|
struct net_device *primary_dev = bcmcfg_to_prmry_ndev(cfg);
|
|
|
|
dev = ndev_to_wlc_ndev(dev, cfg);
|
|
chan = ieee80211_frequency_to_channel(chandef->chan->center_freq);
|
|
band = chandef->chan->band;
|
|
|
|
WL_ERR(("netdev_ifidx(%d), target channel(%d) target bandwidth(%d),"
|
|
" mode(%d), count(%d)\n", dev->ifindex, chan, chandef->width,
|
|
params->block_tx, params->count));
|
|
|
|
if (wl_get_mode_by_netdev(cfg, dev) != WL_MODE_AP) {
|
|
WL_ERR(("Channel Switch doesn't support on "
|
|
"the non-SoftAP mode\n"));
|
|
return -EINVAL;
|
|
}
|
|
|
|
/* Check if STA is trying to associate with an AP */
|
|
if (wl_get_drv_status(cfg, CONNECTING, primary_dev)) {
|
|
WL_ERR(("Connecting is in progress\n"));
|
|
return BCME_BUSY;
|
|
}
|
|
|
|
if (chan == cfg->ap_oper_channel) {
|
|
WL_ERR(("Channel %d is same as current operating channel,"
|
|
" so skip\n", chan));
|
|
return BCME_OK;
|
|
}
|
|
|
|
if (band == IEEE80211_BAND_5GHZ) {
|
|
#ifdef APSTA_RESTRICTED_CHANNEL
|
|
if (chan != DEFAULT_5G_SOFTAP_CHANNEL) {
|
|
WL_ERR(("Invalid 5G Channel, chan=%d\n", chan));
|
|
return -EINVAL;
|
|
}
|
|
#endif /* APSTA_RESTRICTED_CHANNEL */
|
|
err = wl_get_bandwidth_cap(primary_dev, band, &bw);
|
|
if (err < 0) {
|
|
WL_ERR(("Failed to get bandwidth information,"
|
|
" err=%d\n", err));
|
|
return err;
|
|
}
|
|
} else if (band == IEEE80211_BAND_2GHZ) {
|
|
#ifdef APSTA_RESTRICTED_CHANNEL
|
|
dhd_pub_t *dhdp = (dhd_pub_t *)(cfg->pub);
|
|
u32 *sta_chan = (u32 *)wl_read_prof(cfg,
|
|
primary_dev, WL_PROF_CHAN);
|
|
|
|
/* In 2GHz STA/SoftAP concurrent mode, the operating channel
|
|
* of STA and SoftAP should be confgiured to the same 2GHz
|
|
* channel. Otherwise, it is an invalid configuration.
|
|
*/
|
|
if (DHD_OPMODE_STA_SOFTAP_CONCURR(dhdp) &&
|
|
wl_get_drv_status(cfg, CONNECTED, primary_dev) &&
|
|
sta_chan && (*sta_chan != chan)) {
|
|
WL_ERR(("Invalid 2G Channel in case of STA/SoftAP"
|
|
" concurrent mode, sta_chan=%d, chan=%d\n",
|
|
*sta_chan, chan));
|
|
return -EINVAL;
|
|
}
|
|
#endif /* APSTA_RESTRICTED_CHANNEL */
|
|
bw = WL_CHANSPEC_BW_20;
|
|
} else {
|
|
WL_ERR(("invalid band (%d)\n", band));
|
|
return -EINVAL;
|
|
}
|
|
|
|
chspec = wf_channel2chspec(chan, bw);
|
|
if (!wf_chspec_valid(chspec)) {
|
|
WL_ERR(("Invalid chanspec 0x%x\n", chspec));
|
|
return -EINVAL;
|
|
}
|
|
|
|
/* Send CSA to associated STAs */
|
|
memset(&csa_arg, 0, sizeof(wl_chan_switch_t));
|
|
csa_arg.mode = params->block_tx;
|
|
csa_arg.count = params->count;
|
|
csa_arg.chspec = chspec;
|
|
csa_arg.frame_type = CSA_BROADCAST_ACTION_FRAME;
|
|
csa_arg.reg = 0;
|
|
|
|
err = wldev_iovar_setbuf(dev, "csa", &csa_arg, sizeof(wl_chan_switch_t),
|
|
cfg->ioctl_buf, WLC_IOCTL_SMLEN, &cfg->ioctl_buf_sync);
|
|
if (err < 0) {
|
|
WL_ERR(("Failed to switch channel, err=%d\n", err));
|
|
}
|
|
|
|
return err;
|
|
}
|
|
#endif /* LINUX_VERSION_CODE >= KERNEL_VERSION(3, 12, 0) */
|
|
|
|
#ifdef WL_WIPSEVT
|
|
int
|
|
wl_cfg80211_wips_event_ext(wl_wips_event_info_t *wips_event)
|
|
{
|
|
s32 err = BCME_OK;
|
|
#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3, 14, 0))
|
|
struct sk_buff *skb;
|
|
gfp_t kflags;
|
|
struct bcm_cfg80211 *cfg;
|
|
struct net_device *ndev;
|
|
struct wiphy *wiphy;
|
|
|
|
cfg = wl_cfg80211_get_bcmcfg();
|
|
if (!cfg || !cfg->wdev) {
|
|
WL_ERR(("WIPS evt invalid arg\n"));
|
|
return err;
|
|
}
|
|
|
|
ndev = bcmcfg_to_prmry_ndev(cfg);
|
|
wiphy = bcmcfg_to_wiphy(cfg);
|
|
|
|
kflags = in_atomic() ? GFP_ATOMIC : GFP_KERNEL;
|
|
skb = CFG80211_VENDOR_EVENT_ALLOC(wiphy, ndev_to_wdev(ndev),
|
|
BRCM_VENDOR_WIPS_EVENT_BUF_LEN, BRCM_VENDOR_EVENT_WIPS, kflags);
|
|
|
|
if (!skb) {
|
|
WL_ERR(("skb alloc failed"));
|
|
return BCME_NOMEM;
|
|
}
|
|
|
|
err = nla_put_u16(skb, WIPS_ATTR_DEAUTH_CNT, wips_event->misdeauth);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("nla_put_u16 WIPS_ATTR_DEAUTH_CNT failed\n"));
|
|
goto fail;
|
|
}
|
|
err = nla_put(skb, WIPS_ATTR_DEAUTH_BSSID, ETHER_ADDR_LEN, &wips_event->bssid);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("nla_put WIPS_ATTR_DEAUTH_BSSID failed\n"));
|
|
goto fail;
|
|
}
|
|
err = nla_put_s16(skb, WIPS_ATTR_CURRENT_RSSI, wips_event->current_RSSI);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("nla_put_u16 WIPS_ATTR_CURRENT_RSSI failed\n"));
|
|
goto fail;
|
|
}
|
|
err = nla_put_s16(skb, WIPS_ATTR_DEAUTH_RSSI, wips_event->deauth_RSSI);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("nla_put_u16 WIPS_ATTR_DEAUTH_RSSI failed\n"));
|
|
goto fail;
|
|
}
|
|
cfg80211_vendor_event(skb, kflags);
|
|
|
|
return err;
|
|
|
|
fail:
|
|
if (skb) {
|
|
nlmsg_free(skb);
|
|
}
|
|
#endif /* LINUX_VERSION_CODE >= KERNEL_VERSION(3, 14, 0) */
|
|
return err;
|
|
}
|
|
|
|
int
|
|
wl_cfg80211_wips_event(uint16 misdeauth, char* bssid)
|
|
{
|
|
s32 err = BCME_OK;
|
|
wl_wips_event_info_t wips_event;
|
|
|
|
wips_event.misdeauth = misdeauth;
|
|
memcpy(&wips_event.bssid, bssid, ETHER_ADDR_LEN);
|
|
wips_event.current_RSSI = 0;
|
|
wips_event.deauth_RSSI = 0;
|
|
|
|
err = wl_cfg80211_wips_event_ext(&wips_event);
|
|
return err;
|
|
}
|
|
#endif /* WL_WIPSEVT */
|
|
|
|
bool wl_cfg80211_check_in_progress(struct net_device *dev)
|
|
{
|
|
/* TODO: Check for cfg status like scan in progress,
|
|
* four way handshake, etc before entering Deep Sleep.
|
|
*/
|
|
return TRUE;
|
|
}
|
|
|
|
#ifdef SUPPORT_AP_SUSPEND
|
|
void
|
|
wl_set_ap_suspend_error_handler(struct net_device *ndev, bool suspend)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(ndev);
|
|
dhd_pub_t *dhdp = (dhd_pub_t *)(cfg->pub);
|
|
|
|
if (wl_get_drv_status(cfg, READY, ndev)) {
|
|
/* IF dongle is down due to previous hang or other conditions, sending
|
|
* one more hang notification is not needed.
|
|
*/
|
|
if (dhd_query_bus_erros(dhdp)) {
|
|
return;
|
|
}
|
|
dhdp->iface_op_failed = TRUE;
|
|
#if defined(DHD_FW_COREDUMP)
|
|
if (dhdp->memdump_enabled) {
|
|
dhdp->memdump_type = DUMP_TYPE_IFACE_OP_FAILURE;
|
|
dhd_bus_mem_dump(dhdp);
|
|
}
|
|
#endif /* DHD_FW_COREDUMP */
|
|
WL_ERR(("Notify hang event to upper layer \n"));
|
|
dhdp->hang_reason = suspend ?
|
|
HANG_REASON_BSS_DOWN_FAILURE : HANG_REASON_BSS_UP_FAILURE;
|
|
net_os_send_hang_message(ndev);
|
|
}
|
|
}
|
|
|
|
#define MAX_AP_RESUME_TIME 5000
|
|
int
|
|
wl_set_ap_suspend(struct net_device *dev, bool suspend, char *ifname)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(dev);
|
|
dhd_pub_t *dhdp;
|
|
struct net_device *ndev = NULL;
|
|
int ret = BCME_OK;
|
|
bool is_bssup = FALSE;
|
|
int bssidx;
|
|
unsigned long start_j;
|
|
int time_to_sleep = MAX_AP_RESUME_TIME;
|
|
|
|
dhdp = (dhd_pub_t *)(cfg->pub);
|
|
|
|
if (!dhdp) {
|
|
return BCME_NOTUP;
|
|
}
|
|
|
|
if (!(dhdp->op_mode & DHD_FLAG_HOSTAP_MODE)) {
|
|
WL_ERR(("Not Hostapd mode\n"));
|
|
return BCME_NOTAP;
|
|
}
|
|
|
|
ndev = wl_get_ap_netdev(cfg, ifname);
|
|
|
|
if (ndev == NULL) {
|
|
WL_ERR(("No softAP interface named %s\n", ifname));
|
|
return BCME_NOTAP;
|
|
}
|
|
|
|
if ((bssidx = wl_get_bssidx_by_wdev(cfg, ndev->ieee80211_ptr)) < 0) {
|
|
WL_ERR(("Find p2p index from wdev(%p) failed\n", ndev->ieee80211_ptr));
|
|
return BCME_NOTFOUND;
|
|
}
|
|
|
|
is_bssup = wl_cfg80211_bss_isup(ndev, bssidx);
|
|
if (is_bssup && suspend) {
|
|
wl_clr_drv_status(cfg, AP_CREATED, ndev);
|
|
wl_clr_drv_status(cfg, CONNECTED, ndev);
|
|
|
|
if ((ret = wl_cfg80211_bss_up(cfg, ndev, bssidx, 0)) < 0) {
|
|
WL_ERR(("AP suspend error %d, suspend %d\n", ret, suspend));
|
|
ret = BCME_NOTDOWN;
|
|
goto exit;
|
|
}
|
|
} else if (!is_bssup && !suspend) {
|
|
/* Abort scan before starting AP again */
|
|
wl_cfg80211_scan_abort(cfg);
|
|
|
|
if ((ret = wl_cfg80211_bss_up(cfg, ndev, bssidx, 1)) < 0) {
|
|
WL_ERR(("AP resume error %d, suspend %d\n", ret, suspend));
|
|
ret = BCME_NOTUP;
|
|
goto exit;
|
|
}
|
|
|
|
while (TRUE) {
|
|
start_j = get_jiffies_64();
|
|
/* Wait for Linkup event to mark successful AP bring up */
|
|
ret = wait_event_interruptible_timeout(cfg->netif_change_event,
|
|
wl_get_drv_status(cfg, AP_CREATED, ndev),
|
|
msecs_to_jiffies(time_to_sleep));
|
|
if (ret == -ERESTARTSYS) {
|
|
WL_ERR(("waitqueue was interrupted by a signal\n"));
|
|
time_to_sleep -= jiffies_to_msecs(get_jiffies_64() - start_j);
|
|
if (time_to_sleep <= 0) {
|
|
WL_ERR(("time to sleep hits 0\n"));
|
|
ret = BCME_NOTUP;
|
|
goto exit;
|
|
}
|
|
} else if (ret == 0 || !wl_get_drv_status(cfg, AP_CREATED, ndev)) {
|
|
WL_ERR(("AP resume failed!\n"));
|
|
ret = BCME_NOTUP;
|
|
goto exit;
|
|
} else {
|
|
wl_set_drv_status(cfg, CONNECTED, ndev);
|
|
ret = BCME_OK;
|
|
break;
|
|
}
|
|
}
|
|
} else {
|
|
/* bssup + resume or bssdown + suspend,
|
|
* So, returns OK
|
|
*/
|
|
ret = BCME_OK;
|
|
}
|
|
exit:
|
|
if (ret != BCME_OK)
|
|
wl_set_ap_suspend_error_handler(bcmcfg_to_prmry_ndev(cfg), suspend);
|
|
|
|
return ret;
|
|
}
|
|
#endif /* SUPPORT_AP_SUSPEND */
|
|
|
|
#ifdef SUPPORT_SOFTAP_ELNA_BYPASS
|
|
int wl_set_softap_elna_bypass(struct net_device *dev, char *ifname, int enable)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(dev);
|
|
struct net_device *ifdev = NULL;
|
|
char iobuf[WLC_IOCTL_SMLEN];
|
|
int err = BCME_OK;
|
|
int iftype = 0;
|
|
|
|
memset(iobuf, 0, WLC_IOCTL_SMLEN);
|
|
|
|
/* Check the interface type */
|
|
ifdev = wl_get_netdev_by_name(cfg, ifname);
|
|
if (ifdev == NULL) {
|
|
WL_ERR(("%s: Could not find net_device for ifname:%s\n", __FUNCTION__, ifname));
|
|
err = BCME_BADARG;
|
|
goto fail;
|
|
}
|
|
|
|
iftype = ifdev->ieee80211_ptr->iftype;
|
|
if (iftype == NL80211_IFTYPE_AP) {
|
|
err = wldev_iovar_setint(ifdev, "softap_elnabypass", enable);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("%s: Failed to set softap_elnabypass, err=%d\n",
|
|
__FUNCTION__, err));
|
|
}
|
|
} else {
|
|
WL_ERR(("%s: softap_elnabypass should control in SoftAP mode only\n",
|
|
__FUNCTION__));
|
|
err = BCME_BADARG;
|
|
}
|
|
fail:
|
|
return err;
|
|
}
|
|
int wl_get_softap_elna_bypass(struct net_device *dev, char *ifname, void *param)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(dev);
|
|
int *enable = (int*)param;
|
|
struct net_device *ifdev = NULL;
|
|
char iobuf[WLC_IOCTL_SMLEN];
|
|
int err = BCME_OK;
|
|
int iftype = 0;
|
|
|
|
memset(iobuf, 0, WLC_IOCTL_SMLEN);
|
|
|
|
/* Check the interface type */
|
|
ifdev = wl_get_netdev_by_name(cfg, ifname);
|
|
if (ifdev == NULL) {
|
|
WL_ERR(("%s: Could not find net_device for ifname:%s\n", __FUNCTION__, ifname));
|
|
err = BCME_BADARG;
|
|
goto fail;
|
|
}
|
|
|
|
iftype = ifdev->ieee80211_ptr->iftype;
|
|
if (iftype == NL80211_IFTYPE_AP) {
|
|
err = wldev_iovar_getint(ifdev, "softap_elnabypass", enable);
|
|
if (unlikely(err)) {
|
|
WL_ERR(("%s: Failed to get softap_elnabypass, err=%d\n",
|
|
__FUNCTION__, err));
|
|
}
|
|
} else {
|
|
WL_ERR(("%s: softap_elnabypass should control in SoftAP mode only\n",
|
|
__FUNCTION__));
|
|
err = BCME_BADARG;
|
|
}
|
|
fail:
|
|
return err;
|
|
|
|
}
|
|
#endif /* SUPPORT_SOFTAP_ELNA_BYPASS */
|
|
|
|
#ifdef SUPPORT_AP_BWCTRL
|
|
#define OPER_MODE_ENABLE (1 << 8)
|
|
static int op2bw[] = {20, 40, 80, 160};
|
|
|
|
static int
|
|
wl_get_ap_he_mode(struct net_device *ndev, struct bcm_cfg80211 *cfg, bool *he)
|
|
{
|
|
bcm_xtlv_t read_he_xtlv;
|
|
int ret = 0;
|
|
u8 he_enab = 0;
|
|
u32 he_feature = 0;
|
|
*he = FALSE;
|
|
|
|
/* Check he enab first */
|
|
read_he_xtlv.id = WL_HE_CMD_ENAB;
|
|
read_he_xtlv.len = 0;
|
|
|
|
ret = wldev_iovar_getbuf(ndev, "he", &read_he_xtlv, sizeof(read_he_xtlv),
|
|
cfg->ioctl_buf, WLC_IOCTL_SMLEN, NULL);
|
|
if (ret < 0) {
|
|
if (ret == BCME_UNSUPPORTED) {
|
|
/* HE not supported */
|
|
ret = BCME_OK;
|
|
} else {
|
|
WL_ERR(("HE ENAB get failed. ret=%d\n", ret));
|
|
}
|
|
goto exit;
|
|
} else {
|
|
he_enab = *(u8*)cfg->ioctl_buf;
|
|
}
|
|
|
|
if (!he_enab) {
|
|
goto exit;
|
|
}
|
|
|
|
/* Then check BIT3 of he features */
|
|
read_he_xtlv.id = WL_HE_CMD_FEATURES;
|
|
read_he_xtlv.len = 0;
|
|
|
|
ret = wldev_iovar_getbuf(ndev, "he", &read_he_xtlv, sizeof(read_he_xtlv),
|
|
cfg->ioctl_buf, WLC_IOCTL_SMLEN, NULL);
|
|
if (ret < 0) {
|
|
WL_ERR(("HE FEATURE get failed. error=%d\n", ret));
|
|
goto exit;
|
|
} else {
|
|
he_feature = *(int*)cfg->ioctl_buf;
|
|
he_feature = dtoh32(he_feature);
|
|
}
|
|
|
|
if (he_feature & WL_HE_FEATURES_HE_AP) {
|
|
WL_DBG(("HE is enabled in AP\n"));
|
|
*he = TRUE;
|
|
}
|
|
exit:
|
|
return ret;
|
|
}
|
|
|
|
static void
|
|
wl_update_apchan_bwcap(struct bcm_cfg80211 *cfg, struct net_device *ndev, chanspec_t chanspec)
|
|
{
|
|
struct net_device *dev = bcmcfg_to_prmry_ndev(cfg);
|
|
struct wireless_dev *wdev = ndev_to_wdev(dev);
|
|
struct wiphy *wiphy = wdev->wiphy;
|
|
int ret = BCME_OK;
|
|
u32 bw_cap;
|
|
u32 ctl_chan;
|
|
chanspec_t chanbw = WL_CHANSPEC_BW_20;
|
|
|
|
/* Update channel in profile */
|
|
ctl_chan = wf_chspec_ctlchan(chanspec);
|
|
wl_update_prof(cfg, ndev, NULL, &ctl_chan, WL_PROF_CHAN);
|
|
|
|
/* BW cap is only updated in 5GHz */
|
|
if (ctl_chan <= CH_MAX_2G_CHANNEL)
|
|
return;
|
|
|
|
/* Get WL BW CAP */
|
|
ret = wl_get_bandwidth_cap(bcmcfg_to_prmry_ndev(cfg),
|
|
IEEE80211_BAND_5GHZ, &bw_cap);
|
|
if (ret < 0) {
|
|
WL_ERR(("get bw_cap failed = %d\n", ret));
|
|
goto exit;
|
|
}
|
|
|
|
chanbw = CHSPEC_BW(channel_to_chanspec(wiphy,
|
|
ndev, wf_chspec_ctlchan(chanspec), bw_cap));
|
|
|
|
exit:
|
|
cfg->bw_cap_5g = bw2cap[chanbw >> WL_CHANSPEC_BW_SHIFT];
|
|
WL_INFORM_MEM(("supported bw cap is:0x%x\n", cfg->bw_cap_5g));
|
|
|
|
}
|
|
|
|
int
|
|
wl_rxchain_to_opmode_nss(int rxchain)
|
|
{
|
|
/*
|
|
* Nss 1 -> 0, Nss 2 -> 1
|
|
* This is from operating mode field
|
|
* in 8.4.1.50 of 802.11ac-2013
|
|
*/
|
|
/* TODO : Nss 3 ? */
|
|
if (rxchain == 3)
|
|
return (1 << 4);
|
|
else
|
|
return 0;
|
|
}
|
|
|
|
int
|
|
wl_update_opmode(struct net_device *ndev, u32 bw)
|
|
{
|
|
int ret = BCME_OK;
|
|
int oper_mode;
|
|
int rxchain;
|
|
|
|
ret = wldev_iovar_getint(ndev, "rxchain", (s32 *)&rxchain);
|
|
if (ret < 0) {
|
|
WL_ERR(("get rxchain failed = %d\n", ret));
|
|
goto exit;
|
|
}
|
|
|
|
oper_mode = bw;
|
|
oper_mode |= wl_rxchain_to_opmode_nss(rxchain);
|
|
/* Enable flag */
|
|
oper_mode |= OPER_MODE_ENABLE;
|
|
|
|
ret = wldev_iovar_setint(ndev, "oper_mode", oper_mode);
|
|
if (ret < 0) {
|
|
WL_ERR(("set oper_mode failed = %d\n", ret));
|
|
goto exit;
|
|
}
|
|
|
|
exit:
|
|
return ret;
|
|
}
|
|
|
|
int
|
|
wl_set_ap_bw(struct net_device *dev, u32 bw, char *ifname)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(dev);
|
|
dhd_pub_t *dhdp;
|
|
struct net_device *ndev = NULL;
|
|
int ret = BCME_OK;
|
|
u32 *channel;
|
|
bool he;
|
|
|
|
dhdp = (dhd_pub_t *)(cfg->pub);
|
|
|
|
if (!dhdp) {
|
|
return BCME_NOTUP;
|
|
}
|
|
|
|
if (!(dhdp->op_mode & DHD_FLAG_HOSTAP_MODE)) {
|
|
WL_ERR(("Not Hostapd mode\n"));
|
|
return BCME_NOTAP;
|
|
}
|
|
|
|
ndev = wl_get_ap_netdev(cfg, ifname);
|
|
|
|
if (ndev == NULL) {
|
|
WL_ERR(("No softAP interface named %s\n", ifname));
|
|
return BCME_NOTAP;
|
|
}
|
|
|
|
if (bw > DOT11_OPER_MODE_160MHZ) {
|
|
WL_ERR(("BW is too big %d\n", bw));
|
|
return BCME_BADARG;
|
|
}
|
|
|
|
channel = (u32 *)wl_read_prof(cfg, ndev, WL_PROF_CHAN);
|
|
if (*channel <= CH_MAX_2G_CHANNEL) {
|
|
WL_ERR(("current channel is %d, not supported\n", *channel));
|
|
ret = BCME_BADCHAN;
|
|
goto exit;
|
|
}
|
|
|
|
if ((DHD_OPMODE_STA_SOFTAP_CONCURR(dhdp) &&
|
|
wl_get_drv_status(cfg, CONNECTED, bcmcfg_to_prmry_ndev(cfg))) ||
|
|
cfg->nan_enable) {
|
|
WL_ERR(("BW control in concurrent mode is not supported\n"));
|
|
return BCME_BUSY;
|
|
}
|
|
|
|
/* When SCAN is on going either in STA or in AP, return BUSY */
|
|
if (wl_get_drv_status_all(cfg, SCANNING)) {
|
|
WL_ERR(("STA is SCANNING, not support BW control\n"));
|
|
return BCME_BUSY;
|
|
}
|
|
|
|
/* When SCANABORT is on going either in STA or in AP, return BUSY */
|
|
if (wl_get_drv_status_all(cfg, SCAN_ABORTING)) {
|
|
WL_ERR(("STA is SCAN_ABORTING, not support BW control\n"));
|
|
return BCME_BUSY;
|
|
}
|
|
|
|
/* When CONNECTION is on going in STA, return BUSY */
|
|
if (wl_get_drv_status(cfg, CONNECTING, bcmcfg_to_prmry_ndev(cfg))) {
|
|
WL_ERR(("STA is CONNECTING, not support BW control\n"));
|
|
return BCME_BUSY;
|
|
}
|
|
|
|
/* BW control in AX mode needs more verification */
|
|
ret = wl_get_ap_he_mode(ndev, cfg, &he);
|
|
if (ret == BCME_OK && he) {
|
|
WL_ERR(("BW control in HE mode is not supported\n"));
|
|
return BCME_UNSUPPORTED;
|
|
}
|
|
if (ret < 0) {
|
|
WL_ERR(("Check AX mode is failed\n"));
|
|
goto exit;
|
|
}
|
|
|
|
if ((!WL_BW_CAP_160MHZ(cfg->bw_cap_5g) && (bw == DOT11_OPER_MODE_160MHZ)) ||
|
|
(!WL_BW_CAP_80MHZ(cfg->bw_cap_5g) && (bw >= DOT11_OPER_MODE_80MHZ)) ||
|
|
(!WL_BW_CAP_40MHZ(cfg->bw_cap_5g) && (bw >= DOT11_OPER_MODE_40MHZ)) ||
|
|
(!WL_BW_CAP_20MHZ(cfg->bw_cap_5g) && (bw >= DOT11_OPER_MODE_20MHZ))) {
|
|
WL_ERR(("bw_cap %x does not support bw = %d\n", cfg->bw_cap_5g, bw));
|
|
ret = BCME_BADARG;
|
|
goto exit;
|
|
}
|
|
|
|
WL_DBG(("Updating AP BW to %d\n", op2bw[bw]));
|
|
|
|
ret = wl_update_opmode(ndev, bw);
|
|
if (ret < 0) {
|
|
WL_ERR(("opmode set failed = %d\n", ret));
|
|
goto exit;
|
|
}
|
|
|
|
exit:
|
|
return ret;
|
|
}
|
|
|
|
int
|
|
wl_get_ap_bw(struct net_device *dev, char* command, char *ifname, int total_len)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(dev);
|
|
dhd_pub_t *dhdp;
|
|
struct net_device *ndev = NULL;
|
|
int ret = BCME_OK;
|
|
u32 chanspec = 0;
|
|
u32 bw = DOT11_OPER_MODE_20MHZ;
|
|
int bytes_written = 0;
|
|
|
|
dhdp = (dhd_pub_t *)(cfg->pub);
|
|
|
|
if (!dhdp) {
|
|
return BCME_NOTUP;
|
|
}
|
|
|
|
if (!(dhdp->op_mode & DHD_FLAG_HOSTAP_MODE)) {
|
|
WL_ERR(("Not Hostapd mode\n"));
|
|
return BCME_NOTAP;
|
|
}
|
|
|
|
ndev = wl_get_ap_netdev(cfg, ifname);
|
|
|
|
if (ndev == NULL) {
|
|
WL_ERR(("No softAP interface named %s\n", ifname));
|
|
return BCME_NOTAP;
|
|
}
|
|
|
|
ret = wldev_iovar_getint(ndev, "chanspec", (s32 *)&chanspec);
|
|
if (ret < 0) {
|
|
WL_ERR(("get chanspec from AP failed = %d\n", ret));
|
|
goto exit;
|
|
}
|
|
|
|
chanspec = wl_chspec_driver_to_host(chanspec);
|
|
|
|
if (CHSPEC_IS20(chanspec)) {
|
|
bw = DOT11_OPER_MODE_20MHZ;
|
|
} else if (CHSPEC_IS40(chanspec)) {
|
|
bw = DOT11_OPER_MODE_40MHZ;
|
|
} else if (CHSPEC_IS80(chanspec)) {
|
|
bw = DOT11_OPER_MODE_80MHZ;
|
|
} else if (CHSPEC_IS_BW_160_WIDE(chanspec)) {
|
|
bw = DOT11_OPER_MODE_160MHZ;
|
|
} else {
|
|
WL_ERR(("chanspec error %x\n", chanspec));
|
|
ret = BCME_BADCHAN;
|
|
goto exit;
|
|
}
|
|
|
|
bytes_written += snprintf(command + bytes_written, total_len,
|
|
"bw=%d", bw);
|
|
ret = bytes_written;
|
|
exit:
|
|
return ret;
|
|
}
|
|
|
|
static void
|
|
wl_restore_ap_bw(struct bcm_cfg80211 *cfg)
|
|
{
|
|
int ret = BCME_OK;
|
|
u32 bw;
|
|
bool he = FALSE;
|
|
struct net_info *iter, *next;
|
|
struct net_device *ndev = NULL;
|
|
u32 *channel;
|
|
|
|
if (!cfg) {
|
|
return;
|
|
}
|
|
|
|
GCC_DIAGNOSTIC_PUSH_SUPPRESS_CAST();
|
|
for_each_ndev(cfg, iter, next) {
|
|
GCC_DIAGNOSTIC_POP();
|
|
if (iter->ndev) {
|
|
if (iter->ndev->ieee80211_ptr->iftype == NL80211_IFTYPE_AP) {
|
|
channel = (u32 *)wl_read_prof(cfg, iter->ndev, WL_PROF_CHAN);
|
|
if (*channel > CH_MAX_2G_CHANNEL) {
|
|
ndev = iter->ndev;
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
if (!ndev) {
|
|
return;
|
|
}
|
|
|
|
/* BW control in AX mode not allowed */
|
|
ret = wl_get_ap_he_mode(bcmcfg_to_prmry_ndev(cfg), cfg, &he);
|
|
if (ret == BCME_OK && he) {
|
|
return;
|
|
}
|
|
if (ret < 0) {
|
|
WL_ERR(("Check AX mode is failed\n"));
|
|
return;
|
|
}
|
|
|
|
if (WL_BW_CAP_160MHZ(cfg->bw_cap_5g)) {
|
|
bw = DOT11_OPER_MODE_160MHZ;
|
|
} else if (WL_BW_CAP_80MHZ(cfg->bw_cap_5g)) {
|
|
bw = DOT11_OPER_MODE_80MHZ;
|
|
} else if (WL_BW_CAP_40MHZ(cfg->bw_cap_5g)) {
|
|
bw = DOT11_OPER_MODE_40MHZ;
|
|
} else {
|
|
return;
|
|
}
|
|
|
|
WL_DBG(("Restoring AP BW to %d\n", op2bw[bw]));
|
|
|
|
ret = wl_update_opmode(ndev, bw);
|
|
if (ret < 0) {
|
|
WL_ERR(("bw restore failed = %d\n", ret));
|
|
return;
|
|
}
|
|
}
|
|
#endif /* SUPPORT_AP_BWCTRL */
|
|
|
|
s32
|
|
wl_cfg80211_autochannel(struct net_device *dev, char* command, int total_len)
|
|
{
|
|
struct bcm_cfg80211 *cfg = wl_get_cfg(dev);
|
|
int ret = 0;
|
|
int bytes_written = -1;
|
|
|
|
sscanf(command, "%*s %d", &cfg->autochannel);
|
|
|
|
if (cfg->autochannel == 0) {
|
|
cfg->best_2g_ch = 0;
|
|
cfg->best_5g_ch = 0;
|
|
} else if (cfg->autochannel == 2) {
|
|
bytes_written = snprintf(command, total_len, "2g=%d 5g=%d",
|
|
cfg->best_2g_ch, cfg->best_5g_ch);
|
|
WL_TRACE(("%s: command result is %s\n", __FUNCTION__, command));
|
|
ret = bytes_written;
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
int
|
|
wl_cfg80211_check_in4way(struct bcm_cfg80211 *cfg,
|
|
struct net_device *dev, uint action, enum wl_ext_status status, void *context)
|
|
{
|
|
dhd_pub_t *dhdp = (dhd_pub_t *)(cfg->pub);
|
|
struct wl_security *sec;
|
|
s32 bssidx = -1;
|
|
int ret = 0, cur_eapol_status, ifidx;
|
|
int max_wait_time, max_wait_cnt;
|
|
int suppressed = 0;
|
|
|
|
mutex_lock(&cfg->in4way_sync);
|
|
action = action & dhdp->conf->in4way;
|
|
WL_DBG(("status=%d, action=0x%x, in4way=0x%x\n", status, action, dhdp->conf->in4way));
|
|
|
|
cur_eapol_status = dhdp->conf->eapol_status;
|
|
switch (status) {
|
|
case WL_EXT_STATUS_SCAN:
|
|
wldev_ioctl(dev, WLC_GET_SCANSUPPRESS, &suppressed, sizeof(int), false);
|
|
if (suppressed) {
|
|
WL_ERR(("scan suppressed\n"));
|
|
ret = -EBUSY;
|
|
break;
|
|
}
|
|
if (action & NO_SCAN_IN4WAY) {
|
|
if (cfg->handshaking > 0 && cfg->handshaking <= 3) {
|
|
WL_ERR(("return -EBUSY cnt %d\n", cfg->handshaking));
|
|
cfg->handshaking++;
|
|
ret = -EBUSY;
|
|
break;
|
|
}
|
|
}
|
|
break;
|
|
case WL_EXT_STATUS_DISCONNECTING:
|
|
if (cur_eapol_status >= EAPOL_STATUS_4WAY_START &&
|
|
cur_eapol_status < EAPOL_STATUS_4WAY_DONE) {
|
|
WL_ERR(("WPA failed at %d\n", cur_eapol_status));
|
|
dhdp->conf->eapol_status = EAPOL_STATUS_NONE;
|
|
} else if (cur_eapol_status >= EAPOL_STATUS_WSC_START &&
|
|
cur_eapol_status < EAPOL_STATUS_WSC_DONE) {
|
|
WL_ERR(("WPS failed at %d\n", cur_eapol_status));
|
|
dhdp->conf->eapol_status = EAPOL_STATUS_NONE;
|
|
}
|
|
if (action & (NO_SCAN_IN4WAY|NO_BTC_IN4WAY)) {
|
|
if (cfg->handshaking) {
|
|
if ((action & NO_BTC_IN4WAY) && cfg->btc_mode) {
|
|
WL_TRACE(("status=%d, restore btc_mode %d\n",
|
|
status, cfg->btc_mode));
|
|
wldev_iovar_setint(dev, "btc_mode", cfg->btc_mode);
|
|
}
|
|
cfg->handshaking = 0;
|
|
}
|
|
}
|
|
if (action & WAIT_DISCONNECTED) {
|
|
max_wait_time = 200;
|
|
max_wait_cnt = 20;
|
|
cfg->disconnected_jiffies = jiffies;
|
|
while (!time_after(jiffies,
|
|
cfg->disconnected_jiffies + msecs_to_jiffies(max_wait_time)) &&
|
|
max_wait_cnt) {
|
|
WL_TRACE(("status=%d, max_wait_cnt=%d waiting...\n",
|
|
status, max_wait_cnt));
|
|
mutex_unlock(&cfg->in4way_sync);
|
|
OSL_SLEEP(50);
|
|
mutex_lock(&cfg->in4way_sync);
|
|
max_wait_cnt--;
|
|
}
|
|
wake_up_interruptible(&dhdp->conf->event_complete);
|
|
}
|
|
break;
|
|
case WL_EXT_STATUS_CONNECTING:
|
|
if (action & (NO_SCAN_IN4WAY|NO_BTC_IN4WAY)) {
|
|
bssidx = wl_get_bssidx_by_wdev(cfg, dev->ieee80211_ptr);
|
|
sec = wl_read_prof(cfg, dev, WL_PROF_SEC);
|
|
if ((sec->wpa_versions & (NL80211_WPA_VERSION_1 | NL80211_WPA_VERSION_2)) &&
|
|
bssidx == 0) {
|
|
dhdp->conf->eapol_status = EAPOL_STATUS_4WAY_START;
|
|
cfg->handshaking = 1;
|
|
if (action & NO_BTC_IN4WAY) {
|
|
ret = wldev_iovar_getint(dev, "btc_mode", &cfg->btc_mode);
|
|
if (!ret && cfg->btc_mode) {
|
|
WL_TRACE(("status=%d, disable current btc_mode %d\n",
|
|
status, cfg->btc_mode));
|
|
wldev_iovar_setint(dev, "btc_mode", 0);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
if (action & WAIT_DISCONNECTED) {
|
|
max_wait_time = 200;
|
|
max_wait_cnt = 10;
|
|
while (!time_after(jiffies,
|
|
cfg->disconnected_jiffies + msecs_to_jiffies(max_wait_time)) &&
|
|
max_wait_cnt) {
|
|
WL_TRACE(("status=%d, max_wait_cnt=%d waiting...\n",
|
|
status, max_wait_cnt));
|
|
mutex_unlock(&cfg->in4way_sync);
|
|
OSL_SLEEP(50);
|
|
mutex_lock(&cfg->in4way_sync);
|
|
max_wait_cnt--;
|
|
}
|
|
wake_up_interruptible(&dhdp->conf->event_complete);
|
|
}
|
|
break;
|
|
case WL_EXT_STATUS_CONNECTED:
|
|
ifidx = dhd_net2idx(dhdp->info, dev);
|
|
if (dev->ieee80211_ptr->iftype == NL80211_IFTYPE_STATION && ifidx >= 0) {
|
|
dhd_conf_set_wme(cfg->pub, ifidx, 0);
|
|
wake_up_interruptible(&dhdp->conf->event_complete);
|
|
}
|
|
else if (dev->ieee80211_ptr->iftype == NL80211_IFTYPE_P2P_CLIENT) {
|
|
dhd_conf_set_mchan_bw(cfg->pub, WL_P2P_IF_CLIENT, -1);
|
|
}
|
|
break;
|
|
case WL_EXT_STATUS_DISCONNECTED:
|
|
if (cur_eapol_status >= EAPOL_STATUS_4WAY_START &&
|
|
cur_eapol_status < EAPOL_STATUS_4WAY_DONE) {
|
|
WL_ERR(("WPA failed at %d\n", cur_eapol_status));
|
|
dhdp->conf->eapol_status = EAPOL_STATUS_NONE;
|
|
} else if (cur_eapol_status >= EAPOL_STATUS_WSC_START &&
|
|
cur_eapol_status < EAPOL_STATUS_WSC_DONE) {
|
|
WL_ERR(("WPS failed at %d\n", cur_eapol_status));
|
|
dhdp->conf->eapol_status = EAPOL_STATUS_NONE;
|
|
}
|
|
if (action & (NO_SCAN_IN4WAY|NO_BTC_IN4WAY)) {
|
|
if (cfg->handshaking) {
|
|
if ((action & NO_BTC_IN4WAY) && cfg->btc_mode) {
|
|
WL_TRACE(("status=%d, restore btc_mode %d\n",
|
|
status, cfg->btc_mode));
|
|
wldev_iovar_setint(dev, "btc_mode", cfg->btc_mode);
|
|
}
|
|
cfg->handshaking = 0;
|
|
}
|
|
}
|
|
if (action & WAIT_DISCONNECTED) {
|
|
cfg->disconnected_jiffies = jiffies;
|
|
}
|
|
wake_up_interruptible(&dhdp->conf->event_complete);
|
|
break;
|
|
case WL_EXT_STATUS_ADD_KEY:
|
|
dhdp->conf->eapol_status = EAPOL_STATUS_4WAY_DONE;
|
|
if (action & (NO_SCAN_IN4WAY|NO_BTC_IN4WAY)) {
|
|
if (cfg->handshaking) {
|
|
if ((action & NO_BTC_IN4WAY) && cfg->btc_mode) {
|
|
WL_TRACE(("status=%d, restore btc_mode %d\n",
|
|
status, cfg->btc_mode));
|
|
wldev_iovar_setint(dev, "btc_mode", cfg->btc_mode);
|
|
}
|
|
cfg->handshaking = 0;
|
|
}
|
|
}
|
|
wake_up_interruptible(&dhdp->conf->event_complete);
|
|
break;
|
|
case WL_EXT_STATUS_AP_ENABLED:
|
|
ifidx = dhd_net2idx(dhdp->info, dev);
|
|
if (dev->ieee80211_ptr->iftype == NL80211_IFTYPE_AP && ifidx >= 0) {
|
|
dhd_conf_set_wme(cfg->pub, ifidx, 1);
|
|
}
|
|
else if (dev->ieee80211_ptr->iftype == NL80211_IFTYPE_P2P_GO) {
|
|
dhd_conf_set_mchan_bw(cfg->pub, WL_P2P_IF_GO, -1);
|
|
}
|
|
break;
|
|
case WL_EXT_STATUS_DELETE_STA:
|
|
if ((action & DONT_DELETE_GC_AFTER_WPS) &&
|
|
(dev->ieee80211_ptr->iftype == NL80211_IFTYPE_P2P_GO)) {
|
|
u8* mac_addr = context;
|
|
if (mac_addr && memcmp(ðer_bcast, mac_addr, ETHER_ADDR_LEN) &&
|
|
cur_eapol_status == EAPOL_STATUS_WSC_DONE) {
|
|
u32 timeout;
|
|
max_wait_time = 300;
|
|
WL_TRACE(("status=%d, wps_done=%d, waiting %dms ...\n",
|
|
status, cfg->wps_done, max_wait_time));
|
|
mutex_unlock(&cfg->in4way_sync);
|
|
timeout = wait_event_interruptible_timeout(cfg->wps_done_event,
|
|
cfg->wps_done, msecs_to_jiffies(max_wait_time));
|
|
mutex_lock(&cfg->in4way_sync);
|
|
WL_TRACE(("status=%d, wps_done=%d, timeout=%d\n",
|
|
status, cfg->wps_done, timeout));
|
|
if (timeout > 0) {
|
|
ret = -1;
|
|
break;
|
|
}
|
|
} else {
|
|
WL_TRACE(("status=%d, wps_done=%d => 0\n", status, cfg->wps_done));
|
|
cfg->wps_done = FALSE;
|
|
dhdp->conf->eapol_status = EAPOL_STATUS_NONE;
|
|
}
|
|
}
|
|
break;
|
|
case WL_EXT_STATUS_STA_DISCONNECTED:
|
|
if ((action & DONT_DELETE_GC_AFTER_WPS) &&
|
|
(dev->ieee80211_ptr->iftype == NL80211_IFTYPE_P2P_GO) &&
|
|
cur_eapol_status == EAPOL_STATUS_WSC_DONE) {
|
|
WL_TRACE(("status=%d, wps_done=%d => 0\n", status, cfg->wps_done));
|
|
cfg->wps_done = FALSE;
|
|
}
|
|
break;
|
|
case WL_EXT_STATUS_STA_CONNECTED:
|
|
if ((action & DONT_DELETE_GC_AFTER_WPS) &&
|
|
(dev->ieee80211_ptr->iftype == NL80211_IFTYPE_P2P_GO) &&
|
|
cur_eapol_status == EAPOL_STATUS_WSC_DONE) {
|
|
WL_TRACE(("status=%d, wps_done=%d => 1\n", status, cfg->wps_done));
|
|
cfg->wps_done = TRUE;
|
|
wake_up_interruptible(&cfg->wps_done_event);
|
|
}
|
|
break;
|
|
default:
|
|
WL_ERR(("Unknown action=0x%x, status=%d\n", action, status));
|
|
}
|
|
|
|
mutex_unlock(&cfg->in4way_sync);
|
|
|
|
return ret;
|
|
}
|