Commit | Line | Data |
---|---|---|
5b435de0 AS |
1 | /* |
2 | * Copyright (c) 2010 Broadcom Corporation | |
3 | * | |
4 | * Permission to use, copy, modify, and/or distribute this software for any | |
5 | * purpose with or without fee is hereby granted, provided that the above | |
6 | * copyright notice and this permission notice appear in all copies. | |
7 | * | |
8 | * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES | |
9 | * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF | |
10 | * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY | |
11 | * SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES | |
12 | * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION | |
13 | * OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN | |
14 | * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | |
15 | */ | |
02f77195 JP |
16 | |
17 | #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt | |
18 | ||
5b435de0 AS |
19 | #include <linux/kernel.h> |
20 | #include <linux/string.h> | |
21 | #include <linux/sched.h> | |
22 | #include <linux/netdevice.h> | |
23 | #include <asm/unaligned.h> | |
24 | #include <defs.h> | |
25 | #include <brcmu_wifi.h> | |
26 | #include <brcmu_utils.h> | |
27 | #include "dhd.h" | |
28 | #include "dhd_bus.h" | |
29 | #include "dhd_proto.h" | |
30 | #include "dhd_dbg.h" | |
31 | ||
32 | #define BRCM_OUI "\x00\x10\x18" | |
33 | #define DOT11_OUI_LEN 3 | |
34 | #define BCMILCP_BCM_SUBTYPE_EVENT 1 | |
35 | #define PKTFILTER_BUF_SIZE 2048 | |
36 | #define BRCMF_ARPOL_MODE 0xb /* agent|snoop|peer_autoreply */ | |
37 | ||
5b435de0 AS |
38 | #define MSGTRACE_VERSION 1 |
39 | ||
f7264adb | 40 | #define BRCMF_PKT_FILTER_FIXED_LEN offsetof(struct brcmf_pkt_filter_le, u) |
5b435de0 | 41 | #define BRCMF_PKT_FILTER_PATTERN_FIXED_LEN \ |
f7264adb | 42 | offsetof(struct brcmf_pkt_filter_pattern_le, mask_and_pattern) |
5b435de0 | 43 | |
8ae74654 | 44 | #ifdef DEBUG |
5b435de0 AS |
45 | static const char brcmf_version[] = |
46 | "Dongle Host Driver, version " BRCMF_VERSION_STR "\nCompiled on " | |
47 | __DATE__ " at " __TIME__; | |
48 | #else | |
49 | static const char brcmf_version[] = | |
50 | "Dongle Host Driver, version " BRCMF_VERSION_STR; | |
51 | #endif | |
52 | ||
53 | /* Message trace header */ | |
54 | struct msgtrace_hdr { | |
55 | u8 version; | |
56 | u8 spare; | |
57 | __be16 len; /* Len of the trace */ | |
58 | __be32 seqnum; /* Sequence number of message. Useful | |
59 | * if the messsage has been lost | |
60 | * because of DMA error or a bus reset | |
61 | * (ex: SDIO Func2) | |
62 | */ | |
63 | __be32 discarded_bytes; /* Number of discarded bytes because of | |
64 | trace overflow */ | |
65 | __be32 discarded_printf; /* Number of discarded printf | |
66 | because of trace overflow */ | |
67 | } __packed; | |
68 | ||
53a2277d AB |
69 | |
70 | uint | |
71 | brcmf_c_mkiovar(char *name, char *data, uint datalen, char *buf, uint buflen) | |
72 | { | |
73 | uint len; | |
74 | ||
75 | len = strlen(name) + 1; | |
76 | ||
77 | if ((len + datalen) > buflen) | |
78 | return 0; | |
79 | ||
80 | strncpy(buf, name, buflen); | |
81 | ||
82 | /* append data onto the end of the name string */ | |
83 | memcpy(&buf[len], data, datalen); | |
84 | len += datalen; | |
85 | ||
86 | return len; | |
87 | } | |
88 | ||
b63487ed | 89 | bool brcmf_c_prec_enq(struct device *dev, struct pktq *q, |
5b435de0 AS |
90 | struct sk_buff *pkt, int prec) |
91 | { | |
92 | struct sk_buff *p; | |
93 | int eprec = -1; /* precedence to evict from */ | |
94 | bool discard_oldest; | |
b63487ed FL |
95 | struct brcmf_bus *bus_if = dev_get_drvdata(dev); |
96 | struct brcmf_pub *drvr = bus_if->drvr; | |
5b435de0 AS |
97 | |
98 | /* Fast case, precedence queue is not full and we are also not | |
99 | * exceeding total queue length | |
100 | */ | |
101 | if (!pktq_pfull(q, prec) && !pktq_full(q)) { | |
102 | brcmu_pktq_penq(q, prec, pkt); | |
103 | return true; | |
104 | } | |
105 | ||
106 | /* Determine precedence from which to evict packet, if any */ | |
107 | if (pktq_pfull(q, prec)) | |
108 | eprec = prec; | |
109 | else if (pktq_full(q)) { | |
110 | p = brcmu_pktq_peek_tail(q, &eprec); | |
111 | if (eprec > prec) | |
112 | return false; | |
113 | } | |
114 | ||
115 | /* Evict if needed */ | |
116 | if (eprec >= 0) { | |
117 | /* Detect queueing to unconfigured precedence */ | |
118 | discard_oldest = ac_bitmap_tst(drvr->wme_dp, eprec); | |
119 | if (eprec == prec && !discard_oldest) | |
120 | return false; /* refuse newer (incoming) packet */ | |
121 | /* Evict packet according to discard policy */ | |
122 | p = discard_oldest ? brcmu_pktq_pdeq(q, eprec) : | |
123 | brcmu_pktq_pdeq_tail(q, eprec); | |
124 | if (p == NULL) | |
125 | brcmf_dbg(ERROR, "brcmu_pktq_penq() failed, oldest %d\n", | |
126 | discard_oldest); | |
127 | ||
128 | brcmu_pkt_buf_free_skb(p); | |
129 | } | |
130 | ||
131 | /* Enqueue */ | |
132 | p = brcmu_pktq_penq(q, prec, pkt); | |
133 | if (p == NULL) | |
134 | brcmf_dbg(ERROR, "brcmu_pktq_penq() failed\n"); | |
135 | ||
136 | return p != NULL; | |
137 | } | |
138 | ||
8ae74654 | 139 | #ifdef DEBUG |
5b435de0 AS |
140 | static void |
141 | brcmf_c_show_host_event(struct brcmf_event_msg *event, void *event_data) | |
142 | { | |
143 | uint i, status, reason; | |
144 | bool group = false, flush_txq = false, link = false; | |
145 | char *auth_str, *event_name; | |
146 | unsigned char *buf; | |
147 | char err_msg[256], eabuf[ETHER_ADDR_STR_LEN]; | |
148 | static struct { | |
149 | uint event; | |
150 | char *event_name; | |
151 | } event_names[] = { | |
152 | { | |
153 | BRCMF_E_SET_SSID, "SET_SSID"}, { | |
154 | BRCMF_E_JOIN, "JOIN"}, { | |
155 | BRCMF_E_START, "START"}, { | |
156 | BRCMF_E_AUTH, "AUTH"}, { | |
157 | BRCMF_E_AUTH_IND, "AUTH_IND"}, { | |
158 | BRCMF_E_DEAUTH, "DEAUTH"}, { | |
159 | BRCMF_E_DEAUTH_IND, "DEAUTH_IND"}, { | |
160 | BRCMF_E_ASSOC, "ASSOC"}, { | |
161 | BRCMF_E_ASSOC_IND, "ASSOC_IND"}, { | |
162 | BRCMF_E_REASSOC, "REASSOC"}, { | |
163 | BRCMF_E_REASSOC_IND, "REASSOC_IND"}, { | |
164 | BRCMF_E_DISASSOC, "DISASSOC"}, { | |
165 | BRCMF_E_DISASSOC_IND, "DISASSOC_IND"}, { | |
166 | BRCMF_E_QUIET_START, "START_QUIET"}, { | |
167 | BRCMF_E_QUIET_END, "END_QUIET"}, { | |
168 | BRCMF_E_BEACON_RX, "BEACON_RX"}, { | |
169 | BRCMF_E_LINK, "LINK"}, { | |
170 | BRCMF_E_MIC_ERROR, "MIC_ERROR"}, { | |
171 | BRCMF_E_NDIS_LINK, "NDIS_LINK"}, { | |
172 | BRCMF_E_ROAM, "ROAM"}, { | |
173 | BRCMF_E_TXFAIL, "TXFAIL"}, { | |
174 | BRCMF_E_PMKID_CACHE, "PMKID_CACHE"}, { | |
175 | BRCMF_E_RETROGRADE_TSF, "RETROGRADE_TSF"}, { | |
176 | BRCMF_E_PRUNE, "PRUNE"}, { | |
177 | BRCMF_E_AUTOAUTH, "AUTOAUTH"}, { | |
178 | BRCMF_E_EAPOL_MSG, "EAPOL_MSG"}, { | |
179 | BRCMF_E_SCAN_COMPLETE, "SCAN_COMPLETE"}, { | |
180 | BRCMF_E_ADDTS_IND, "ADDTS_IND"}, { | |
181 | BRCMF_E_DELTS_IND, "DELTS_IND"}, { | |
182 | BRCMF_E_BCNSENT_IND, "BCNSENT_IND"}, { | |
183 | BRCMF_E_BCNRX_MSG, "BCNRX_MSG"}, { | |
184 | BRCMF_E_BCNLOST_MSG, "BCNLOST_MSG"}, { | |
185 | BRCMF_E_ROAM_PREP, "ROAM_PREP"}, { | |
186 | BRCMF_E_PFN_NET_FOUND, "PNO_NET_FOUND"}, { | |
187 | BRCMF_E_PFN_NET_LOST, "PNO_NET_LOST"}, { | |
188 | BRCMF_E_RESET_COMPLETE, "RESET_COMPLETE"}, { | |
189 | BRCMF_E_JOIN_START, "JOIN_START"}, { | |
190 | BRCMF_E_ROAM_START, "ROAM_START"}, { | |
191 | BRCMF_E_ASSOC_START, "ASSOC_START"}, { | |
192 | BRCMF_E_IBSS_ASSOC, "IBSS_ASSOC"}, { | |
193 | BRCMF_E_RADIO, "RADIO"}, { | |
194 | BRCMF_E_PSM_WATCHDOG, "PSM_WATCHDOG"}, { | |
195 | BRCMF_E_PROBREQ_MSG, "PROBREQ_MSG"}, { | |
196 | BRCMF_E_SCAN_CONFIRM_IND, "SCAN_CONFIRM_IND"}, { | |
197 | BRCMF_E_PSK_SUP, "PSK_SUP"}, { | |
198 | BRCMF_E_COUNTRY_CODE_CHANGED, "COUNTRY_CODE_CHANGED"}, { | |
199 | BRCMF_E_EXCEEDED_MEDIUM_TIME, "EXCEEDED_MEDIUM_TIME"}, { | |
200 | BRCMF_E_ICV_ERROR, "ICV_ERROR"}, { | |
201 | BRCMF_E_UNICAST_DECODE_ERROR, "UNICAST_DECODE_ERROR"}, { | |
202 | BRCMF_E_MULTICAST_DECODE_ERROR, "MULTICAST_DECODE_ERROR"}, { | |
203 | BRCMF_E_TRACE, "TRACE"}, { | |
204 | BRCMF_E_ACTION_FRAME, "ACTION FRAME"}, { | |
205 | BRCMF_E_ACTION_FRAME_COMPLETE, "ACTION FRAME TX COMPLETE"}, { | |
206 | BRCMF_E_IF, "IF"}, { | |
207 | BRCMF_E_RSSI, "RSSI"}, { | |
e756af5b HM |
208 | BRCMF_E_PFN_SCAN_COMPLETE, "SCAN_COMPLETE"}, { |
209 | BRCMF_E_ESCAN_RESULT, "ESCAN_RESULT"} | |
5b435de0 AS |
210 | }; |
211 | uint event_type, flags, auth_type, datalen; | |
212 | static u32 seqnum_prev; | |
213 | struct msgtrace_hdr hdr; | |
214 | u32 nblost; | |
215 | char *s, *p; | |
216 | ||
217 | event_type = be32_to_cpu(event->event_type); | |
218 | flags = be16_to_cpu(event->flags); | |
219 | status = be32_to_cpu(event->status); | |
220 | reason = be32_to_cpu(event->reason); | |
221 | auth_type = be32_to_cpu(event->auth_type); | |
222 | datalen = be32_to_cpu(event->datalen); | |
223 | /* debug dump of event messages */ | |
224 | sprintf(eabuf, "%pM", event->addr); | |
225 | ||
226 | event_name = "UNKNOWN"; | |
227 | for (i = 0; i < ARRAY_SIZE(event_names); i++) { | |
228 | if (event_names[i].event == event_type) | |
229 | event_name = event_names[i].event_name; | |
230 | } | |
231 | ||
232 | brcmf_dbg(EVENT, "EVENT: %s, event ID = %d\n", event_name, event_type); | |
233 | brcmf_dbg(EVENT, "flags 0x%04x, status %d, reason %d, auth_type %d MAC %s\n", | |
234 | flags, status, reason, auth_type, eabuf); | |
235 | ||
236 | if (flags & BRCMF_EVENT_MSG_LINK) | |
237 | link = true; | |
238 | if (flags & BRCMF_EVENT_MSG_GROUP) | |
239 | group = true; | |
240 | if (flags & BRCMF_EVENT_MSG_FLUSHTXQ) | |
241 | flush_txq = true; | |
242 | ||
243 | switch (event_type) { | |
244 | case BRCMF_E_START: | |
245 | case BRCMF_E_DEAUTH: | |
246 | case BRCMF_E_DISASSOC: | |
247 | brcmf_dbg(EVENT, "MACEVENT: %s, MAC %s\n", event_name, eabuf); | |
248 | break; | |
249 | ||
250 | case BRCMF_E_ASSOC_IND: | |
251 | case BRCMF_E_REASSOC_IND: | |
252 | brcmf_dbg(EVENT, "MACEVENT: %s, MAC %s\n", event_name, eabuf); | |
253 | break; | |
254 | ||
255 | case BRCMF_E_ASSOC: | |
256 | case BRCMF_E_REASSOC: | |
257 | if (status == BRCMF_E_STATUS_SUCCESS) | |
258 | brcmf_dbg(EVENT, "MACEVENT: %s, MAC %s, SUCCESS\n", | |
259 | event_name, eabuf); | |
260 | else if (status == BRCMF_E_STATUS_TIMEOUT) | |
261 | brcmf_dbg(EVENT, "MACEVENT: %s, MAC %s, TIMEOUT\n", | |
262 | event_name, eabuf); | |
263 | else if (status == BRCMF_E_STATUS_FAIL) | |
264 | brcmf_dbg(EVENT, "MACEVENT: %s, MAC %s, FAILURE, reason %d\n", | |
265 | event_name, eabuf, (int)reason); | |
266 | else | |
267 | brcmf_dbg(EVENT, "MACEVENT: %s, MAC %s, unexpected status %d\n", | |
268 | event_name, eabuf, (int)status); | |
269 | break; | |
270 | ||
271 | case BRCMF_E_DEAUTH_IND: | |
272 | case BRCMF_E_DISASSOC_IND: | |
273 | brcmf_dbg(EVENT, "MACEVENT: %s, MAC %s, reason %d\n", | |
274 | event_name, eabuf, (int)reason); | |
275 | break; | |
276 | ||
277 | case BRCMF_E_AUTH: | |
278 | case BRCMF_E_AUTH_IND: | |
279 | if (auth_type == WLAN_AUTH_OPEN) | |
280 | auth_str = "Open System"; | |
281 | else if (auth_type == WLAN_AUTH_SHARED_KEY) | |
282 | auth_str = "Shared Key"; | |
283 | else { | |
284 | sprintf(err_msg, "AUTH unknown: %d", (int)auth_type); | |
285 | auth_str = err_msg; | |
286 | } | |
287 | if (event_type == BRCMF_E_AUTH_IND) | |
288 | brcmf_dbg(EVENT, "MACEVENT: %s, MAC %s, %s\n", | |
289 | event_name, eabuf, auth_str); | |
290 | else if (status == BRCMF_E_STATUS_SUCCESS) | |
291 | brcmf_dbg(EVENT, "MACEVENT: %s, MAC %s, %s, SUCCESS\n", | |
292 | event_name, eabuf, auth_str); | |
293 | else if (status == BRCMF_E_STATUS_TIMEOUT) | |
294 | brcmf_dbg(EVENT, "MACEVENT: %s, MAC %s, %s, TIMEOUT\n", | |
295 | event_name, eabuf, auth_str); | |
296 | else if (status == BRCMF_E_STATUS_FAIL) { | |
297 | brcmf_dbg(EVENT, "MACEVENT: %s, MAC %s, %s, FAILURE, reason %d\n", | |
298 | event_name, eabuf, auth_str, (int)reason); | |
299 | } | |
300 | ||
301 | break; | |
302 | ||
303 | case BRCMF_E_JOIN: | |
304 | case BRCMF_E_ROAM: | |
305 | case BRCMF_E_SET_SSID: | |
306 | if (status == BRCMF_E_STATUS_SUCCESS) | |
307 | brcmf_dbg(EVENT, "MACEVENT: %s, MAC %s\n", | |
308 | event_name, eabuf); | |
309 | else if (status == BRCMF_E_STATUS_FAIL) | |
310 | brcmf_dbg(EVENT, "MACEVENT: %s, failed\n", event_name); | |
311 | else if (status == BRCMF_E_STATUS_NO_NETWORKS) | |
312 | brcmf_dbg(EVENT, "MACEVENT: %s, no networks found\n", | |
313 | event_name); | |
314 | else | |
315 | brcmf_dbg(EVENT, "MACEVENT: %s, unexpected status %d\n", | |
316 | event_name, (int)status); | |
317 | break; | |
318 | ||
319 | case BRCMF_E_BEACON_RX: | |
320 | if (status == BRCMF_E_STATUS_SUCCESS) | |
321 | brcmf_dbg(EVENT, "MACEVENT: %s, SUCCESS\n", event_name); | |
322 | else if (status == BRCMF_E_STATUS_FAIL) | |
323 | brcmf_dbg(EVENT, "MACEVENT: %s, FAIL\n", event_name); | |
324 | else | |
325 | brcmf_dbg(EVENT, "MACEVENT: %s, status %d\n", | |
326 | event_name, status); | |
327 | break; | |
328 | ||
329 | case BRCMF_E_LINK: | |
330 | brcmf_dbg(EVENT, "MACEVENT: %s %s\n", | |
331 | event_name, link ? "UP" : "DOWN"); | |
332 | break; | |
333 | ||
334 | case BRCMF_E_MIC_ERROR: | |
335 | brcmf_dbg(EVENT, "MACEVENT: %s, MAC %s, Group %d, Flush %d\n", | |
336 | event_name, eabuf, group, flush_txq); | |
337 | break; | |
338 | ||
339 | case BRCMF_E_ICV_ERROR: | |
340 | case BRCMF_E_UNICAST_DECODE_ERROR: | |
341 | case BRCMF_E_MULTICAST_DECODE_ERROR: | |
342 | brcmf_dbg(EVENT, "MACEVENT: %s, MAC %s\n", event_name, eabuf); | |
343 | break; | |
344 | ||
345 | case BRCMF_E_TXFAIL: | |
346 | brcmf_dbg(EVENT, "MACEVENT: %s, RA %s\n", event_name, eabuf); | |
347 | break; | |
348 | ||
349 | case BRCMF_E_SCAN_COMPLETE: | |
350 | case BRCMF_E_PMKID_CACHE: | |
351 | brcmf_dbg(EVENT, "MACEVENT: %s\n", event_name); | |
352 | break; | |
353 | ||
e756af5b HM |
354 | case BRCMF_E_ESCAN_RESULT: |
355 | brcmf_dbg(EVENT, "MACEVENT: %s\n", event_name); | |
356 | datalen = 0; | |
357 | break; | |
358 | ||
5b435de0 AS |
359 | case BRCMF_E_PFN_NET_FOUND: |
360 | case BRCMF_E_PFN_NET_LOST: | |
361 | case BRCMF_E_PFN_SCAN_COMPLETE: | |
362 | brcmf_dbg(EVENT, "PNOEVENT: %s\n", event_name); | |
363 | break; | |
364 | ||
365 | case BRCMF_E_PSK_SUP: | |
366 | case BRCMF_E_PRUNE: | |
367 | brcmf_dbg(EVENT, "MACEVENT: %s, status %d, reason %d\n", | |
368 | event_name, (int)status, (int)reason); | |
369 | break; | |
370 | ||
371 | case BRCMF_E_TRACE: | |
372 | buf = (unsigned char *) event_data; | |
373 | memcpy(&hdr, buf, sizeof(struct msgtrace_hdr)); | |
374 | ||
375 | if (hdr.version != MSGTRACE_VERSION) { | |
376 | brcmf_dbg(ERROR, | |
377 | "MACEVENT: %s [unsupported version --> brcmf" | |
378 | " version:%d dongle version:%d]\n", | |
379 | event_name, MSGTRACE_VERSION, hdr.version); | |
380 | /* Reset datalen to avoid display below */ | |
381 | datalen = 0; | |
382 | break; | |
383 | } | |
384 | ||
385 | /* There are 2 bytes available at the end of data */ | |
386 | *(buf + sizeof(struct msgtrace_hdr) | |
387 | + be16_to_cpu(hdr.len)) = '\0'; | |
388 | ||
389 | if (be32_to_cpu(hdr.discarded_bytes) | |
390 | || be32_to_cpu(hdr.discarded_printf)) | |
391 | brcmf_dbg(ERROR, | |
392 | "WLC_E_TRACE: [Discarded traces in dongle -->" | |
393 | " discarded_bytes %d discarded_printf %d]\n", | |
394 | be32_to_cpu(hdr.discarded_bytes), | |
395 | be32_to_cpu(hdr.discarded_printf)); | |
396 | ||
397 | nblost = be32_to_cpu(hdr.seqnum) - seqnum_prev - 1; | |
398 | if (nblost > 0) | |
399 | brcmf_dbg(ERROR, "WLC_E_TRACE: [Event lost --> seqnum " | |
400 | " %d nblost %d\n", be32_to_cpu(hdr.seqnum), | |
401 | nblost); | |
402 | seqnum_prev = be32_to_cpu(hdr.seqnum); | |
403 | ||
404 | /* Display the trace buffer. Advance from \n to \n to | |
405 | * avoid display big | |
406 | * printf (issue with Linux printk ) | |
407 | */ | |
408 | p = (char *)&buf[sizeof(struct msgtrace_hdr)]; | |
409 | while ((s = strstr(p, "\n")) != NULL) { | |
410 | *s = '\0'; | |
18aad4f8 | 411 | pr_debug("%s\n", p); |
5b435de0 AS |
412 | p = s + 1; |
413 | } | |
18aad4f8 | 414 | pr_debug("%s\n", p); |
5b435de0 AS |
415 | |
416 | /* Reset datalen to avoid display below */ | |
417 | datalen = 0; | |
418 | break; | |
419 | ||
420 | case BRCMF_E_RSSI: | |
421 | brcmf_dbg(EVENT, "MACEVENT: %s %d\n", | |
422 | event_name, be32_to_cpu(*((__be32 *)event_data))); | |
423 | break; | |
424 | ||
425 | default: | |
426 | brcmf_dbg(EVENT, | |
427 | "MACEVENT: %s %d, MAC %s, status %d, reason %d, " | |
428 | "auth %d\n", event_name, event_type, eabuf, | |
429 | (int)status, (int)reason, (int)auth_type); | |
430 | break; | |
431 | } | |
432 | ||
433 | /* show any appended data */ | |
434 | if (datalen) { | |
435 | buf = (unsigned char *) event_data; | |
436 | brcmf_dbg(EVENT, " data (%d) : ", datalen); | |
437 | for (i = 0; i < datalen; i++) | |
438 | brcmf_dbg(EVENT, " 0x%02x ", *buf++); | |
439 | brcmf_dbg(EVENT, "\n"); | |
440 | } | |
441 | } | |
8ae74654 | 442 | #endif /* DEBUG */ |
5b435de0 AS |
443 | |
444 | int | |
d08b6a37 | 445 | brcmf_c_host_event(struct brcmf_pub *drvr, int *ifidx, void *pktdata, |
5b435de0 AS |
446 | struct brcmf_event_msg *event, void **data_ptr) |
447 | { | |
448 | /* check whether packet is a BRCM event pkt */ | |
449 | struct brcmf_event *pvt_data = (struct brcmf_event *) pktdata; | |
450 | struct brcmf_if_event *ifevent; | |
451 | char *event_data; | |
452 | u32 type, status; | |
453 | u16 flags; | |
454 | int evlen; | |
455 | ||
456 | if (memcmp(BRCM_OUI, &pvt_data->hdr.oui[0], DOT11_OUI_LEN)) { | |
457 | brcmf_dbg(ERROR, "mismatched OUI, bailing\n"); | |
458 | return -EBADE; | |
459 | } | |
460 | ||
461 | /* BRCM event pkt may be unaligned - use xxx_ua to load user_subtype. */ | |
462 | if (get_unaligned_be16(&pvt_data->hdr.usr_subtype) != | |
463 | BCMILCP_BCM_SUBTYPE_EVENT) { | |
464 | brcmf_dbg(ERROR, "mismatched subtype, bailing\n"); | |
465 | return -EBADE; | |
466 | } | |
467 | ||
468 | *data_ptr = &pvt_data[1]; | |
469 | event_data = *data_ptr; | |
470 | ||
471 | /* memcpy since BRCM event pkt may be unaligned. */ | |
472 | memcpy(event, &pvt_data->msg, sizeof(struct brcmf_event_msg)); | |
473 | ||
474 | type = get_unaligned_be32(&event->event_type); | |
475 | flags = get_unaligned_be16(&event->flags); | |
476 | status = get_unaligned_be32(&event->status); | |
477 | evlen = get_unaligned_be32(&event->datalen) + | |
478 | sizeof(struct brcmf_event); | |
479 | ||
480 | switch (type) { | |
481 | case BRCMF_E_IF: | |
482 | ifevent = (struct brcmf_if_event *) event_data; | |
483 | brcmf_dbg(TRACE, "if event\n"); | |
484 | ||
485 | if (ifevent->ifidx > 0 && ifevent->ifidx < BRCMF_MAX_IFS) { | |
486 | if (ifevent->action == BRCMF_E_IF_ADD) | |
55a63bcc | 487 | brcmf_add_if(drvr->dev, ifevent->ifidx, |
5b435de0 | 488 | event->ifname, |
15d45b6f | 489 | pvt_data->eth.h_dest); |
5b435de0 | 490 | else |
d08b6a37 | 491 | brcmf_del_if(drvr, ifevent->ifidx); |
5b435de0 AS |
492 | } else { |
493 | brcmf_dbg(ERROR, "Invalid ifidx %d for %s\n", | |
494 | ifevent->ifidx, event->ifname); | |
495 | } | |
496 | ||
497 | /* send up the if event: btamp user needs it */ | |
d08b6a37 | 498 | *ifidx = brcmf_ifname2idx(drvr, event->ifname); |
5b435de0 AS |
499 | break; |
500 | ||
501 | /* These are what external supplicant/authenticator wants */ | |
502 | case BRCMF_E_LINK: | |
503 | case BRCMF_E_ASSOC_IND: | |
504 | case BRCMF_E_REASSOC_IND: | |
505 | case BRCMF_E_DISASSOC_IND: | |
506 | case BRCMF_E_MIC_ERROR: | |
507 | default: | |
508 | /* Fall through: this should get _everything_ */ | |
509 | ||
d08b6a37 | 510 | *ifidx = brcmf_ifname2idx(drvr, event->ifname); |
5b435de0 AS |
511 | brcmf_dbg(TRACE, "MAC event %d, flags %x, status %x\n", |
512 | type, flags, status); | |
513 | ||
514 | /* put it back to BRCMF_E_NDIS_LINK */ | |
515 | if (type == BRCMF_E_NDIS_LINK) { | |
516 | u32 temp1; | |
517 | __be32 temp2; | |
518 | ||
519 | temp1 = get_unaligned_be32(&event->event_type); | |
520 | brcmf_dbg(TRACE, "Converted to WLC_E_LINK type %d\n", | |
521 | temp1); | |
522 | ||
523 | temp2 = cpu_to_be32(BRCMF_E_NDIS_LINK); | |
524 | memcpy((void *)(&pvt_data->msg.event_type), &temp2, | |
525 | sizeof(pvt_data->msg.event_type)); | |
526 | } | |
527 | break; | |
528 | } | |
529 | ||
8ae74654 | 530 | #ifdef DEBUG |
5b435de0 | 531 | brcmf_c_show_host_event(event, event_data); |
8ae74654 | 532 | #endif /* DEBUG */ |
5b435de0 AS |
533 | |
534 | return 0; | |
535 | } | |
536 | ||
537 | /* Convert user's input in hex pattern to byte-size mask */ | |
538 | static int brcmf_c_pattern_atoh(char *src, char *dst) | |
539 | { | |
540 | int i; | |
541 | if (strncmp(src, "0x", 2) != 0 && strncmp(src, "0X", 2) != 0) { | |
542 | brcmf_dbg(ERROR, "Mask invalid format. Needs to start with 0x\n"); | |
543 | return -EINVAL; | |
544 | } | |
545 | src = src + 2; /* Skip past 0x */ | |
546 | if (strlen(src) % 2 != 0) { | |
547 | brcmf_dbg(ERROR, "Mask invalid format. Length must be even.\n"); | |
548 | return -EINVAL; | |
549 | } | |
550 | for (i = 0; *src != '\0'; i++) { | |
551 | unsigned long res; | |
552 | char num[3]; | |
553 | strncpy(num, src, 2); | |
554 | num[2] = '\0'; | |
555 | if (kstrtoul(num, 16, &res)) | |
556 | return -EINVAL; | |
557 | dst[i] = (u8)res; | |
558 | src += 2; | |
559 | } | |
560 | return i; | |
561 | } | |
562 | ||
563 | void | |
564 | brcmf_c_pktfilter_offload_enable(struct brcmf_pub *drvr, char *arg, int enable, | |
565 | int master_mode) | |
566 | { | |
567 | unsigned long res; | |
568 | char *argv[8]; | |
569 | int i = 0; | |
570 | const char *str; | |
571 | int buf_len; | |
572 | int str_len; | |
573 | char *arg_save = NULL, *arg_org = NULL; | |
574 | int rc; | |
575 | char buf[128]; | |
f7264adb AS |
576 | struct brcmf_pkt_filter_enable_le enable_parm; |
577 | struct brcmf_pkt_filter_enable_le *pkt_filterp; | |
578 | __le32 mmode_le; | |
5b435de0 AS |
579 | |
580 | arg_save = kmalloc(strlen(arg) + 1, GFP_ATOMIC); | |
581 | if (!arg_save) | |
582 | goto fail; | |
583 | ||
584 | arg_org = arg_save; | |
585 | memcpy(arg_save, arg, strlen(arg) + 1); | |
586 | ||
587 | argv[i] = strsep(&arg_save, " "); | |
588 | ||
589 | i = 0; | |
590 | if (NULL == argv[i]) { | |
591 | brcmf_dbg(ERROR, "No args provided\n"); | |
592 | goto fail; | |
593 | } | |
594 | ||
595 | str = "pkt_filter_enable"; | |
596 | str_len = strlen(str); | |
597 | strncpy(buf, str, str_len); | |
598 | buf[str_len] = '\0'; | |
599 | buf_len = str_len + 1; | |
600 | ||
f7264adb | 601 | pkt_filterp = (struct brcmf_pkt_filter_enable_le *) (buf + str_len + 1); |
5b435de0 AS |
602 | |
603 | /* Parse packet filter id. */ | |
604 | enable_parm.id = 0; | |
605 | if (!kstrtoul(argv[i], 0, &res)) | |
f7264adb | 606 | enable_parm.id = cpu_to_le32((u32)res); |
5b435de0 AS |
607 | |
608 | /* Parse enable/disable value. */ | |
f7264adb | 609 | enable_parm.enable = cpu_to_le32(enable); |
5b435de0 AS |
610 | |
611 | buf_len += sizeof(enable_parm); | |
612 | memcpy((char *)pkt_filterp, &enable_parm, sizeof(enable_parm)); | |
613 | ||
614 | /* Enable/disable the specified filter. */ | |
615 | rc = brcmf_proto_cdc_set_dcmd(drvr, 0, BRCMF_C_SET_VAR, buf, buf_len); | |
616 | rc = rc >= 0 ? 0 : rc; | |
617 | if (rc) | |
618 | brcmf_dbg(TRACE, "failed to add pktfilter %s, retcode = %d\n", | |
619 | arg, rc); | |
620 | else | |
621 | brcmf_dbg(TRACE, "successfully added pktfilter %s\n", arg); | |
622 | ||
623 | /* Contorl the master mode */ | |
f7264adb | 624 | mmode_le = cpu_to_le32(master_mode); |
53a2277d | 625 | brcmf_c_mkiovar("pkt_filter_mode", (char *)&mmode_le, 4, buf, |
5b435de0 AS |
626 | sizeof(buf)); |
627 | rc = brcmf_proto_cdc_set_dcmd(drvr, 0, BRCMF_C_SET_VAR, buf, | |
628 | sizeof(buf)); | |
629 | rc = rc >= 0 ? 0 : rc; | |
630 | if (rc) | |
631 | brcmf_dbg(TRACE, "failed to add pktfilter %s, retcode = %d\n", | |
632 | arg, rc); | |
633 | ||
634 | fail: | |
635 | kfree(arg_org); | |
636 | } | |
637 | ||
638 | void brcmf_c_pktfilter_offload_set(struct brcmf_pub *drvr, char *arg) | |
639 | { | |
640 | const char *str; | |
f7264adb AS |
641 | struct brcmf_pkt_filter_le pkt_filter; |
642 | struct brcmf_pkt_filter_le *pkt_filterp; | |
5b435de0 AS |
643 | unsigned long res; |
644 | int buf_len; | |
645 | int str_len; | |
646 | int rc; | |
647 | u32 mask_size; | |
648 | u32 pattern_size; | |
649 | char *argv[8], *buf = NULL; | |
650 | int i = 0; | |
651 | char *arg_save = NULL, *arg_org = NULL; | |
652 | ||
653 | arg_save = kstrdup(arg, GFP_ATOMIC); | |
654 | if (!arg_save) | |
655 | goto fail; | |
656 | ||
657 | arg_org = arg_save; | |
658 | ||
659 | buf = kmalloc(PKTFILTER_BUF_SIZE, GFP_ATOMIC); | |
660 | if (!buf) | |
661 | goto fail; | |
662 | ||
663 | argv[i] = strsep(&arg_save, " "); | |
664 | while (argv[i++]) | |
665 | argv[i] = strsep(&arg_save, " "); | |
666 | ||
667 | i = 0; | |
668 | if (NULL == argv[i]) { | |
669 | brcmf_dbg(ERROR, "No args provided\n"); | |
670 | goto fail; | |
671 | } | |
672 | ||
673 | str = "pkt_filter_add"; | |
674 | strcpy(buf, str); | |
675 | str_len = strlen(str); | |
676 | buf_len = str_len + 1; | |
677 | ||
f7264adb | 678 | pkt_filterp = (struct brcmf_pkt_filter_le *) (buf + str_len + 1); |
5b435de0 AS |
679 | |
680 | /* Parse packet filter id. */ | |
681 | pkt_filter.id = 0; | |
682 | if (!kstrtoul(argv[i], 0, &res)) | |
f7264adb | 683 | pkt_filter.id = cpu_to_le32((u32)res); |
5b435de0 AS |
684 | |
685 | if (NULL == argv[++i]) { | |
686 | brcmf_dbg(ERROR, "Polarity not provided\n"); | |
687 | goto fail; | |
688 | } | |
689 | ||
690 | /* Parse filter polarity. */ | |
691 | pkt_filter.negate_match = 0; | |
692 | if (!kstrtoul(argv[i], 0, &res)) | |
f7264adb | 693 | pkt_filter.negate_match = cpu_to_le32((u32)res); |
5b435de0 AS |
694 | |
695 | if (NULL == argv[++i]) { | |
696 | brcmf_dbg(ERROR, "Filter type not provided\n"); | |
697 | goto fail; | |
698 | } | |
699 | ||
700 | /* Parse filter type. */ | |
701 | pkt_filter.type = 0; | |
702 | if (!kstrtoul(argv[i], 0, &res)) | |
f7264adb | 703 | pkt_filter.type = cpu_to_le32((u32)res); |
5b435de0 AS |
704 | |
705 | if (NULL == argv[++i]) { | |
706 | brcmf_dbg(ERROR, "Offset not provided\n"); | |
707 | goto fail; | |
708 | } | |
709 | ||
710 | /* Parse pattern filter offset. */ | |
711 | pkt_filter.u.pattern.offset = 0; | |
712 | if (!kstrtoul(argv[i], 0, &res)) | |
f7264adb | 713 | pkt_filter.u.pattern.offset = cpu_to_le32((u32)res); |
5b435de0 AS |
714 | |
715 | if (NULL == argv[++i]) { | |
716 | brcmf_dbg(ERROR, "Bitmask not provided\n"); | |
717 | goto fail; | |
718 | } | |
719 | ||
720 | /* Parse pattern filter mask. */ | |
721 | mask_size = | |
722 | brcmf_c_pattern_atoh | |
723 | (argv[i], (char *)pkt_filterp->u.pattern.mask_and_pattern); | |
724 | ||
725 | if (NULL == argv[++i]) { | |
726 | brcmf_dbg(ERROR, "Pattern not provided\n"); | |
727 | goto fail; | |
728 | } | |
729 | ||
730 | /* Parse pattern filter pattern. */ | |
731 | pattern_size = | |
732 | brcmf_c_pattern_atoh(argv[i], | |
733 | (char *)&pkt_filterp->u.pattern. | |
734 | mask_and_pattern[mask_size]); | |
735 | ||
736 | if (mask_size != pattern_size) { | |
737 | brcmf_dbg(ERROR, "Mask and pattern not the same size\n"); | |
738 | goto fail; | |
739 | } | |
740 | ||
f7264adb | 741 | pkt_filter.u.pattern.size_bytes = cpu_to_le32(mask_size); |
5b435de0 AS |
742 | buf_len += BRCMF_PKT_FILTER_FIXED_LEN; |
743 | buf_len += (BRCMF_PKT_FILTER_PATTERN_FIXED_LEN + 2 * mask_size); | |
744 | ||
745 | /* Keep-alive attributes are set in local | |
746 | * variable (keep_alive_pkt), and | |
747 | ** then memcpy'ed into buffer (keep_alive_pktp) since there is no | |
748 | ** guarantee that the buffer is properly aligned. | |
749 | */ | |
750 | memcpy((char *)pkt_filterp, | |
751 | &pkt_filter, | |
752 | BRCMF_PKT_FILTER_FIXED_LEN + BRCMF_PKT_FILTER_PATTERN_FIXED_LEN); | |
753 | ||
754 | rc = brcmf_proto_cdc_set_dcmd(drvr, 0, BRCMF_C_SET_VAR, buf, buf_len); | |
755 | rc = rc >= 0 ? 0 : rc; | |
756 | ||
757 | if (rc) | |
758 | brcmf_dbg(TRACE, "failed to add pktfilter %s, retcode = %d\n", | |
759 | arg, rc); | |
760 | else | |
761 | brcmf_dbg(TRACE, "successfully added pktfilter %s\n", arg); | |
762 | ||
763 | fail: | |
764 | kfree(arg_org); | |
765 | ||
766 | kfree(buf); | |
767 | } | |
768 | ||
769 | static void brcmf_c_arp_offload_set(struct brcmf_pub *drvr, int arp_mode) | |
770 | { | |
771 | char iovbuf[32]; | |
772 | int retcode; | |
e020a83d | 773 | __le32 arp_mode_le; |
5b435de0 | 774 | |
e020a83d HM |
775 | arp_mode_le = cpu_to_le32(arp_mode); |
776 | brcmf_c_mkiovar("arp_ol", (char *)&arp_mode_le, 4, iovbuf, | |
777 | sizeof(iovbuf)); | |
5b435de0 AS |
778 | retcode = brcmf_proto_cdc_set_dcmd(drvr, 0, BRCMF_C_SET_VAR, |
779 | iovbuf, sizeof(iovbuf)); | |
780 | retcode = retcode >= 0 ? 0 : retcode; | |
781 | if (retcode) | |
782 | brcmf_dbg(TRACE, "failed to set ARP offload mode to 0x%x, retcode = %d\n", | |
783 | arp_mode, retcode); | |
784 | else | |
785 | brcmf_dbg(TRACE, "successfully set ARP offload mode to 0x%x\n", | |
786 | arp_mode); | |
787 | } | |
788 | ||
789 | static void brcmf_c_arp_offload_enable(struct brcmf_pub *drvr, int arp_enable) | |
790 | { | |
791 | char iovbuf[32]; | |
792 | int retcode; | |
e020a83d | 793 | __le32 arp_enable_le; |
5b435de0 | 794 | |
e020a83d HM |
795 | arp_enable_le = cpu_to_le32(arp_enable); |
796 | ||
797 | brcmf_c_mkiovar("arpoe", (char *)&arp_enable_le, 4, | |
53a2277d | 798 | iovbuf, sizeof(iovbuf)); |
5b435de0 AS |
799 | retcode = brcmf_proto_cdc_set_dcmd(drvr, 0, BRCMF_C_SET_VAR, |
800 | iovbuf, sizeof(iovbuf)); | |
801 | retcode = retcode >= 0 ? 0 : retcode; | |
802 | if (retcode) | |
803 | brcmf_dbg(TRACE, "failed to enable ARP offload to %d, retcode = %d\n", | |
804 | arp_enable, retcode); | |
805 | else | |
806 | brcmf_dbg(TRACE, "successfully enabled ARP offload to %d\n", | |
807 | arp_enable); | |
808 | } | |
809 | ||
810 | int brcmf_c_preinit_dcmds(struct brcmf_pub *drvr) | |
811 | { | |
812 | char iovbuf[BRCMF_EVENTING_MASK_LEN + 12]; /* Room for | |
813 | "event_msgs" + '\0' + bitvec */ | |
5b435de0 | 814 | char buf[128], *ptr; |
e020a83d HM |
815 | __le32 roaming_le = cpu_to_le32(1); |
816 | __le32 bcn_timeout_le = cpu_to_le32(3); | |
817 | __le32 scan_assoc_time_le = cpu_to_le32(40); | |
818 | __le32 scan_unassoc_time_le = cpu_to_le32(40); | |
5b435de0 | 819 | int i; |
135e4c61 FL |
820 | struct brcmf_bus_dcmd *cmdlst; |
821 | struct list_head *cur, *q; | |
5b435de0 | 822 | |
1ae00421 | 823 | mutex_lock(&drvr->proto_block); |
5b435de0 AS |
824 | |
825 | /* Set Country code */ | |
826 | if (drvr->country_code[0] != 0) { | |
827 | if (brcmf_proto_cdc_set_dcmd(drvr, 0, BRCMF_C_SET_COUNTRY, | |
828 | drvr->country_code, | |
829 | sizeof(drvr->country_code)) < 0) | |
830 | brcmf_dbg(ERROR, "country code setting failed\n"); | |
831 | } | |
832 | ||
833 | /* query for 'ver' to get version info from firmware */ | |
834 | memset(buf, 0, sizeof(buf)); | |
835 | ptr = buf; | |
53a2277d | 836 | brcmf_c_mkiovar("ver", NULL, 0, buf, sizeof(buf)); |
5b435de0 AS |
837 | brcmf_proto_cdc_query_dcmd(drvr, 0, BRCMF_C_GET_VAR, buf, sizeof(buf)); |
838 | strsep(&ptr, "\n"); | |
839 | /* Print fw version info */ | |
840 | brcmf_dbg(ERROR, "Firmware version = %s\n", buf); | |
841 | ||
5b435de0 AS |
842 | /* Setup timeout if Beacons are lost and roam is off to report |
843 | link down */ | |
e020a83d | 844 | brcmf_c_mkiovar("bcn_timeout", (char *)&bcn_timeout_le, 4, iovbuf, |
5b435de0 AS |
845 | sizeof(iovbuf)); |
846 | brcmf_proto_cdc_set_dcmd(drvr, 0, BRCMF_C_SET_VAR, iovbuf, | |
847 | sizeof(iovbuf)); | |
848 | ||
849 | /* Enable/Disable build-in roaming to allowed ext supplicant to take | |
850 | of romaing */ | |
e020a83d | 851 | brcmf_c_mkiovar("roam_off", (char *)&roaming_le, 4, |
5b435de0 AS |
852 | iovbuf, sizeof(iovbuf)); |
853 | brcmf_proto_cdc_set_dcmd(drvr, 0, BRCMF_C_SET_VAR, iovbuf, | |
854 | sizeof(iovbuf)); | |
855 | ||
5b435de0 | 856 | /* Setup event_msgs */ |
53a2277d | 857 | brcmf_c_mkiovar("event_msgs", drvr->eventmask, BRCMF_EVENTING_MASK_LEN, |
5b435de0 AS |
858 | iovbuf, sizeof(iovbuf)); |
859 | brcmf_proto_cdc_set_dcmd(drvr, 0, BRCMF_C_SET_VAR, iovbuf, | |
860 | sizeof(iovbuf)); | |
861 | ||
862 | brcmf_proto_cdc_set_dcmd(drvr, 0, BRCMF_C_SET_SCAN_CHANNEL_TIME, | |
e020a83d | 863 | (char *)&scan_assoc_time_le, sizeof(scan_assoc_time_le)); |
5b435de0 | 864 | brcmf_proto_cdc_set_dcmd(drvr, 0, BRCMF_C_SET_SCAN_UNASSOC_TIME, |
e020a83d | 865 | (char *)&scan_unassoc_time_le, sizeof(scan_unassoc_time_le)); |
5b435de0 AS |
866 | |
867 | /* Set and enable ARP offload feature */ | |
868 | brcmf_c_arp_offload_set(drvr, BRCMF_ARPOL_MODE); | |
869 | brcmf_c_arp_offload_enable(drvr, true); | |
870 | ||
871 | /* Set up pkt filter */ | |
872 | for (i = 0; i < drvr->pktfilter_count; i++) { | |
873 | brcmf_c_pktfilter_offload_set(drvr, drvr->pktfilter[i]); | |
874 | brcmf_c_pktfilter_offload_enable(drvr, drvr->pktfilter[i], | |
875 | 0, true); | |
876 | } | |
877 | ||
135e4c61 FL |
878 | /* set bus specific command if there is any */ |
879 | list_for_each_safe(cur, q, &drvr->bus_if->dcmd_list) { | |
880 | cmdlst = list_entry(cur, struct brcmf_bus_dcmd, list); | |
881 | if (cmdlst->name && cmdlst->param && cmdlst->param_len) { | |
882 | brcmf_c_mkiovar(cmdlst->name, cmdlst->param, | |
883 | cmdlst->param_len, iovbuf, | |
884 | sizeof(iovbuf)); | |
885 | brcmf_proto_cdc_set_dcmd(drvr, 0, BRCMF_C_SET_VAR, | |
886 | iovbuf, sizeof(iovbuf)); | |
887 | } | |
888 | list_del(cur); | |
889 | kfree(cmdlst); | |
890 | } | |
891 | ||
1ae00421 | 892 | mutex_unlock(&drvr->proto_block); |
5b435de0 AS |
893 | |
894 | return 0; | |
895 | } |