mwifiex: replace num_cmd_timeout with is_cmd_timedout
[deliverable/linux.git] / drivers / net / wireless / mwifiex / cfg80211.c
CommitLineData
5e6e3a92
BZ
1/*
2 * Marvell Wireless LAN device driver: CFG80211
3 *
4 * Copyright (C) 2011, Marvell International Ltd.
5 *
6 * This software file (the "File") is distributed by Marvell International
7 * Ltd. under the terms of the GNU General Public License Version 2, June 1991
8 * (the "License"). You may use, redistribute and/or modify this File in
9 * accordance with the terms and conditions of the License, a copy of which
10 * is available by writing to the Free Software Foundation, Inc.,
11 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA or on the
12 * worldwide web at http://www.gnu.org/licenses/old-licenses/gpl-2.0.txt.
13 *
14 * THE FILE IS DISTRIBUTED AS-IS, WITHOUT WARRANTY OF ANY KIND, AND THE
15 * IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE
16 * ARE EXPRESSLY DISCLAIMED. The License provides additional details about
17 * this warranty disclaimer.
18 */
19
20#include "cfg80211.h"
21#include "main.h"
22
3c68ef5b
AP
23static char *reg_alpha2;
24module_param(reg_alpha2, charp, 0);
25
cd8440da
AP
26static const struct ieee80211_iface_limit mwifiex_ap_sta_limits[] = {
27 {
a4df8f56
AP
28 .max = 2, .types = BIT(NL80211_IFTYPE_STATION) |
29 BIT(NL80211_IFTYPE_P2P_GO) |
30 BIT(NL80211_IFTYPE_P2P_CLIENT),
cd8440da
AP
31 },
32 {
33 .max = 1, .types = BIT(NL80211_IFTYPE_AP),
34 },
35};
36
37static const struct ieee80211_iface_combination mwifiex_iface_comb_ap_sta = {
38 .limits = mwifiex_ap_sta_limits,
39 .num_different_channels = 1,
40 .n_limits = ARRAY_SIZE(mwifiex_ap_sta_limits),
41 .max_interfaces = MWIFIEX_MAX_BSS_NUM,
42 .beacon_int_infra_match = true,
43};
44
cc0ba0d5
AK
45static const struct ieee80211_regdomain mwifiex_world_regdom_custom = {
46 .n_reg_rules = 7,
47 .alpha2 = "99",
48 .reg_rules = {
49 /* Channel 1 - 11 */
50 REG_RULE(2412-10, 2462+10, 40, 3, 20, 0),
51 /* Channel 12 - 13 */
52 REG_RULE(2467-10, 2472+10, 20, 3, 20,
8fe02e16 53 NL80211_RRF_NO_IR),
cc0ba0d5
AK
54 /* Channel 14 */
55 REG_RULE(2484-10, 2484+10, 20, 3, 20,
8fe02e16 56 NL80211_RRF_NO_IR |
cc0ba0d5
AK
57 NL80211_RRF_NO_OFDM),
58 /* Channel 36 - 48 */
59 REG_RULE(5180-10, 5240+10, 40, 3, 20,
8fe02e16 60 NL80211_RRF_NO_IR),
cc0ba0d5
AK
61 /* Channel 149 - 165 */
62 REG_RULE(5745-10, 5825+10, 40, 3, 20,
8fe02e16 63 NL80211_RRF_NO_IR),
cc0ba0d5
AK
64 /* Channel 52 - 64 */
65 REG_RULE(5260-10, 5320+10, 40, 3, 30,
8fe02e16 66 NL80211_RRF_NO_IR |
cc0ba0d5
AK
67 NL80211_RRF_DFS),
68 /* Channel 100 - 140 */
69 REG_RULE(5500-10, 5700+10, 40, 3, 30,
8fe02e16 70 NL80211_RRF_NO_IR |
cc0ba0d5
AK
71 NL80211_RRF_DFS),
72 }
73};
74
5e6e3a92
BZ
75/*
76 * This function maps the nl802.11 channel type into driver channel type.
77 *
78 * The mapping is as follows -
21c3ba34
AK
79 * NL80211_CHAN_NO_HT -> IEEE80211_HT_PARAM_CHA_SEC_NONE
80 * NL80211_CHAN_HT20 -> IEEE80211_HT_PARAM_CHA_SEC_NONE
81 * NL80211_CHAN_HT40PLUS -> IEEE80211_HT_PARAM_CHA_SEC_ABOVE
82 * NL80211_CHAN_HT40MINUS -> IEEE80211_HT_PARAM_CHA_SEC_BELOW
83 * Others -> IEEE80211_HT_PARAM_CHA_SEC_NONE
5e6e3a92 84 */
7feb4c48 85u8 mwifiex_chan_type_to_sec_chan_offset(enum nl80211_channel_type chan_type)
5e6e3a92 86{
05910f4a 87 switch (chan_type) {
5e6e3a92
BZ
88 case NL80211_CHAN_NO_HT:
89 case NL80211_CHAN_HT20:
21c3ba34 90 return IEEE80211_HT_PARAM_CHA_SEC_NONE;
5e6e3a92 91 case NL80211_CHAN_HT40PLUS:
21c3ba34 92 return IEEE80211_HT_PARAM_CHA_SEC_ABOVE;
5e6e3a92 93 case NL80211_CHAN_HT40MINUS:
21c3ba34 94 return IEEE80211_HT_PARAM_CHA_SEC_BELOW;
5e6e3a92 95 default:
21c3ba34 96 return IEEE80211_HT_PARAM_CHA_SEC_NONE;
5e6e3a92 97 }
5e6e3a92
BZ
98}
99
5e6e3a92
BZ
100/*
101 * This function checks whether WEP is set.
102 */
103static int
104mwifiex_is_alg_wep(u32 cipher)
105{
5e6e3a92 106 switch (cipher) {
2be50b8d
YAP
107 case WLAN_CIPHER_SUITE_WEP40:
108 case WLAN_CIPHER_SUITE_WEP104:
270e58e8 109 return 1;
5e6e3a92 110 default:
5e6e3a92
BZ
111 break;
112 }
270e58e8
YAP
113
114 return 0;
5e6e3a92
BZ
115}
116
5e6e3a92
BZ
117/*
118 * This function retrieves the private structure from kernel wiphy structure.
119 */
67fdf39e 120static void *mwifiex_cfg80211_get_adapter(struct wiphy *wiphy)
5e6e3a92
BZ
121{
122 return (void *) (*(unsigned long *) wiphy_priv(wiphy));
123}
124
125/*
126 * CFG802.11 operation handler to delete a network key.
127 */
128static int
129mwifiex_cfg80211_del_key(struct wiphy *wiphy, struct net_device *netdev,
130 u8 key_index, bool pairwise, const u8 *mac_addr)
131{
f540f9f3 132 struct mwifiex_private *priv = mwifiex_netdev_get_priv(netdev);
75edd2c6
AP
133 const u8 bc_mac[] = {0xff, 0xff, 0xff, 0xff, 0xff, 0xff};
134 const u8 *peer_mac = pairwise ? mac_addr : bc_mac;
5e6e3a92 135
53b11231 136 if (mwifiex_set_encode(priv, NULL, NULL, 0, key_index, peer_mac, 1)) {
5e6e3a92
BZ
137 wiphy_err(wiphy, "deleting the crypto keys\n");
138 return -EFAULT;
139 }
140
141 wiphy_dbg(wiphy, "info: crypto keys deleted\n");
142 return 0;
143}
144
e39faa73
SP
145/*
146 * This function forms an skb for management frame.
147 */
148static int
149mwifiex_form_mgmt_frame(struct sk_buff *skb, const u8 *buf, size_t len)
150{
151 u8 addr[ETH_ALEN] = {0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF};
152 u16 pkt_len;
153 u32 tx_control = 0, pkt_type = PKT_TYPE_MGMT;
154 struct timeval tv;
155
156 pkt_len = len + ETH_ALEN;
157
158 skb_reserve(skb, MWIFIEX_MIN_DATA_HEADER_LEN +
159 MWIFIEX_MGMT_FRAME_HEADER_SIZE + sizeof(pkt_len));
160 memcpy(skb_push(skb, sizeof(pkt_len)), &pkt_len, sizeof(pkt_len));
161
162 memcpy(skb_push(skb, sizeof(tx_control)),
163 &tx_control, sizeof(tx_control));
164
165 memcpy(skb_push(skb, sizeof(pkt_type)), &pkt_type, sizeof(pkt_type));
166
167 /* Add packet data and address4 */
168 memcpy(skb_put(skb, sizeof(struct ieee80211_hdr_3addr)), buf,
169 sizeof(struct ieee80211_hdr_3addr));
170 memcpy(skb_put(skb, ETH_ALEN), addr, ETH_ALEN);
171 memcpy(skb_put(skb, len - sizeof(struct ieee80211_hdr_3addr)),
172 buf + sizeof(struct ieee80211_hdr_3addr),
173 len - sizeof(struct ieee80211_hdr_3addr));
174
175 skb->priority = LOW_PRIO_TID;
176 do_gettimeofday(&tv);
177 skb->tstamp = timeval_to_ktime(tv);
178
179 return 0;
180}
181
182/*
183 * CFG802.11 operation handler to transmit a management frame.
184 */
185static int
186mwifiex_cfg80211_mgmt_tx(struct wiphy *wiphy, struct wireless_dev *wdev,
b176e629 187 struct cfg80211_mgmt_tx_params *params, u64 *cookie)
e39faa73 188{
b176e629
AO
189 const u8 *buf = params->buf;
190 size_t len = params->len;
e39faa73
SP
191 struct sk_buff *skb;
192 u16 pkt_len;
193 const struct ieee80211_mgmt *mgmt;
231d83e2 194 struct mwifiex_txinfo *tx_info;
e39faa73
SP
195 struct mwifiex_private *priv = mwifiex_netdev_get_priv(wdev->netdev);
196
197 if (!buf || !len) {
198 wiphy_err(wiphy, "invalid buffer and length\n");
199 return -EFAULT;
200 }
201
202 mgmt = (const struct ieee80211_mgmt *)buf;
203 if (GET_BSS_ROLE(priv) != MWIFIEX_BSS_ROLE_STA &&
204 ieee80211_is_probe_resp(mgmt->frame_control)) {
205 /* Since we support offload probe resp, we need to skip probe
206 * resp in AP or GO mode */
207 wiphy_dbg(wiphy,
208 "info: skip to send probe resp in AP or GO mode\n");
209 return 0;
210 }
211
212 pkt_len = len + ETH_ALEN;
213 skb = dev_alloc_skb(MWIFIEX_MIN_DATA_HEADER_LEN +
214 MWIFIEX_MGMT_FRAME_HEADER_SIZE +
215 pkt_len + sizeof(pkt_len));
216
217 if (!skb) {
218 wiphy_err(wiphy, "allocate skb failed for management frame\n");
219 return -ENOMEM;
220 }
221
231d83e2
HY
222 tx_info = MWIFIEX_SKB_TXCB(skb);
223 tx_info->bss_num = priv->bss_num;
224 tx_info->bss_type = priv->bss_type;
a1ed4849 225 tx_info->pkt_len = pkt_len;
231d83e2 226
e39faa73
SP
227 mwifiex_form_mgmt_frame(skb, buf, len);
228 mwifiex_queue_tx_pkt(priv, skb);
229
e00adf39 230 *cookie = prandom_u32() | 1;
e39faa73
SP
231 cfg80211_mgmt_tx_status(wdev, *cookie, buf, len, true, GFP_ATOMIC);
232
233 wiphy_dbg(wiphy, "info: management frame transmitted\n");
234 return 0;
235}
236
3cec6870
SP
237/*
238 * CFG802.11 operation handler to register a mgmt frame.
239 */
240static void
241mwifiex_cfg80211_mgmt_frame_register(struct wiphy *wiphy,
242 struct wireless_dev *wdev,
243 u16 frame_type, bool reg)
244{
245 struct mwifiex_private *priv = mwifiex_netdev_get_priv(wdev->netdev);
4481b2db 246 u32 mask;
3cec6870
SP
247
248 if (reg)
4481b2db 249 mask = priv->mgmt_frame_mask | BIT(frame_type >> 4);
3cec6870 250 else
4481b2db
SP
251 mask = priv->mgmt_frame_mask & ~BIT(frame_type >> 4);
252
253 if (mask != priv->mgmt_frame_mask) {
254 priv->mgmt_frame_mask = mask;
fa0ecbb9
BZ
255 mwifiex_send_cmd(priv, HostCmd_CMD_MGMT_FRAME_REG,
256 HostCmd_ACT_GEN_SET, 0,
257 &priv->mgmt_frame_mask, false);
4481b2db
SP
258 wiphy_dbg(wiphy, "info: mgmt frame registered\n");
259 }
3cec6870
SP
260}
261
7feb4c48
SP
262/*
263 * CFG802.11 operation handler to remain on channel.
264 */
265static int
266mwifiex_cfg80211_remain_on_channel(struct wiphy *wiphy,
267 struct wireless_dev *wdev,
268 struct ieee80211_channel *chan,
7feb4c48
SP
269 unsigned int duration, u64 *cookie)
270{
271 struct mwifiex_private *priv = mwifiex_netdev_get_priv(wdev->netdev);
272 int ret;
273
274 if (!chan || !cookie) {
275 wiphy_err(wiphy, "Invalid parameter for ROC\n");
276 return -EINVAL;
277 }
278
279 if (priv->roc_cfg.cookie) {
280 wiphy_dbg(wiphy, "info: ongoing ROC, cookie = 0x%llu\n",
281 priv->roc_cfg.cookie);
282 return -EBUSY;
283 }
284
285 ret = mwifiex_remain_on_chan_cfg(priv, HostCmd_ACT_GEN_SET, chan,
42d97a59 286 duration);
7feb4c48
SP
287
288 if (!ret) {
e00adf39 289 *cookie = prandom_u32() | 1;
7feb4c48
SP
290 priv->roc_cfg.cookie = *cookie;
291 priv->roc_cfg.chan = *chan;
7feb4c48 292
42d97a59 293 cfg80211_ready_on_channel(wdev, *cookie, chan,
7feb4c48
SP
294 duration, GFP_ATOMIC);
295
296 wiphy_dbg(wiphy, "info: ROC, cookie = 0x%llx\n", *cookie);
297 }
298
299 return ret;
300}
301
302/*
303 * CFG802.11 operation handler to cancel remain on channel.
304 */
305static int
306mwifiex_cfg80211_cancel_remain_on_channel(struct wiphy *wiphy,
307 struct wireless_dev *wdev, u64 cookie)
308{
309 struct mwifiex_private *priv = mwifiex_netdev_get_priv(wdev->netdev);
310 int ret;
311
312 if (cookie != priv->roc_cfg.cookie)
313 return -ENOENT;
314
315 ret = mwifiex_remain_on_chan_cfg(priv, HostCmd_ACT_GEN_REMOVE,
42d97a59 316 &priv->roc_cfg.chan, 0);
7feb4c48
SP
317
318 if (!ret) {
319 cfg80211_remain_on_channel_expired(wdev, cookie,
320 &priv->roc_cfg.chan,
7feb4c48
SP
321 GFP_ATOMIC);
322
323 memset(&priv->roc_cfg, 0, sizeof(struct mwifiex_roc_cfg));
324
325 wiphy_dbg(wiphy, "info: cancel ROC, cookie = 0x%llx\n", cookie);
326 }
327
328 return ret;
329}
330
5e6e3a92
BZ
331/*
332 * CFG802.11 operation handler to set Tx power.
333 */
334static int
335mwifiex_cfg80211_set_tx_power(struct wiphy *wiphy,
c8442118 336 struct wireless_dev *wdev,
5e6e3a92 337 enum nl80211_tx_power_setting type,
742c29fd 338 int mbm)
5e6e3a92 339{
67fdf39e
AP
340 struct mwifiex_adapter *adapter = mwifiex_cfg80211_get_adapter(wiphy);
341 struct mwifiex_private *priv;
600f5d90 342 struct mwifiex_power_cfg power_cfg;
742c29fd 343 int dbm = MBM_TO_DBM(mbm);
5e6e3a92 344
600f5d90
AK
345 if (type == NL80211_TX_POWER_FIXED) {
346 power_cfg.is_power_auto = 0;
347 power_cfg.power_level = dbm;
348 } else {
349 power_cfg.is_power_auto = 1;
350 }
351
67fdf39e
AP
352 priv = mwifiex_get_priv(adapter, MWIFIEX_BSS_ROLE_ANY);
353
636c4598 354 return mwifiex_set_tx_power(priv, &power_cfg);
5e6e3a92
BZ
355}
356
357/*
358 * CFG802.11 operation handler to set Power Save option.
359 *
360 * The timeout value, if provided, is currently ignored.
361 */
362static int
363mwifiex_cfg80211_set_power_mgmt(struct wiphy *wiphy,
364 struct net_device *dev,
365 bool enabled, int timeout)
366{
f540f9f3 367 struct mwifiex_private *priv = mwifiex_netdev_get_priv(dev);
600f5d90 368 u32 ps_mode;
5e6e3a92
BZ
369
370 if (timeout)
371 wiphy_dbg(wiphy,
aea0701e 372 "info: ignore timeout value for IEEE Power Save\n");
5e6e3a92 373
600f5d90 374 ps_mode = enabled;
5e6e3a92 375
636c4598 376 return mwifiex_drv_set_power(priv, &ps_mode);
5e6e3a92
BZ
377}
378
379/*
380 * CFG802.11 operation handler to set the default network key.
381 */
382static int
383mwifiex_cfg80211_set_default_key(struct wiphy *wiphy, struct net_device *netdev,
384 u8 key_index, bool unicast,
385 bool multicast)
386{
f540f9f3 387 struct mwifiex_private *priv = mwifiex_netdev_get_priv(netdev);
5e6e3a92 388
2d3d0a88 389 /* Return if WEP key not configured */
5eb02e44 390 if (!priv->sec_info.wep_enabled)
2d3d0a88
AK
391 return 0;
392
96893538
AP
393 if (priv->bss_type == MWIFIEX_BSS_TYPE_UAP) {
394 priv->wep_key_curr_index = key_index;
53b11231
YL
395 } else if (mwifiex_set_encode(priv, NULL, NULL, 0, key_index,
396 NULL, 0)) {
636c4598 397 wiphy_err(wiphy, "set default Tx key index\n");
5e6e3a92 398 return -EFAULT;
636c4598 399 }
5e6e3a92
BZ
400
401 return 0;
402}
403
404/*
405 * CFG802.11 operation handler to add a network key.
406 */
407static int
408mwifiex_cfg80211_add_key(struct wiphy *wiphy, struct net_device *netdev,
409 u8 key_index, bool pairwise, const u8 *mac_addr,
410 struct key_params *params)
411{
f540f9f3 412 struct mwifiex_private *priv = mwifiex_netdev_get_priv(netdev);
96893538 413 struct mwifiex_wep_key *wep_key;
75edd2c6
AP
414 const u8 bc_mac[] = {0xff, 0xff, 0xff, 0xff, 0xff, 0xff};
415 const u8 *peer_mac = pairwise ? mac_addr : bc_mac;
5e6e3a92 416
96893538
AP
417 if (GET_BSS_ROLE(priv) == MWIFIEX_BSS_ROLE_UAP &&
418 (params->cipher == WLAN_CIPHER_SUITE_WEP40 ||
419 params->cipher == WLAN_CIPHER_SUITE_WEP104)) {
420 if (params->key && params->key_len) {
421 wep_key = &priv->wep_key[key_index];
422 memset(wep_key, 0, sizeof(struct mwifiex_wep_key));
423 memcpy(wep_key->key_material, params->key,
424 params->key_len);
425 wep_key->key_index = key_index;
426 wep_key->key_length = params->key_len;
427 priv->sec_info.wep_enabled = 1;
428 }
429 return 0;
430 }
431
53b11231 432 if (mwifiex_set_encode(priv, params, params->key, params->key_len,
75edd2c6 433 key_index, peer_mac, 0)) {
636c4598 434 wiphy_err(wiphy, "crypto keys added\n");
5e6e3a92 435 return -EFAULT;
636c4598 436 }
5e6e3a92
BZ
437
438 return 0;
439}
440
441/*
442 * This function sends domain information to the firmware.
443 *
444 * The following information are passed to the firmware -
445 * - Country codes
446 * - Sub bands (first channel, number of channels, maximum Tx power)
447 */
448static int mwifiex_send_domain_info_cmd_fw(struct wiphy *wiphy)
449{
450 u8 no_of_triplet = 0;
451 struct ieee80211_country_ie_triplet *t;
452 u8 no_of_parsed_chan = 0;
453 u8 first_chan = 0, next_chan = 0, max_pwr = 0;
454 u8 i, flag = 0;
455 enum ieee80211_band band;
456 struct ieee80211_supported_band *sband;
457 struct ieee80211_channel *ch;
67fdf39e
AP
458 struct mwifiex_adapter *adapter = mwifiex_cfg80211_get_adapter(wiphy);
459 struct mwifiex_private *priv;
5e6e3a92 460 struct mwifiex_802_11d_domain_reg *domain_info = &adapter->domain_reg;
5e6e3a92
BZ
461
462 /* Set country code */
67fdf39e
AP
463 domain_info->country_code[0] = adapter->country_code[0];
464 domain_info->country_code[1] = adapter->country_code[1];
5e6e3a92
BZ
465 domain_info->country_code[2] = ' ';
466
467 band = mwifiex_band_to_radio_type(adapter->config_bands);
468 if (!wiphy->bands[band]) {
469 wiphy_err(wiphy, "11D: setting domain info in FW\n");
470 return -1;
471 }
472
473 sband = wiphy->bands[band];
474
475 for (i = 0; i < sband->n_channels ; i++) {
476 ch = &sband->channels[i];
477 if (ch->flags & IEEE80211_CHAN_DISABLED)
478 continue;
479
480 if (!flag) {
481 flag = 1;
482 first_chan = (u32) ch->hw_value;
483 next_chan = first_chan;
22db2497 484 max_pwr = ch->max_power;
5e6e3a92
BZ
485 no_of_parsed_chan = 1;
486 continue;
487 }
488
489 if (ch->hw_value == next_chan + 1 &&
22db2497 490 ch->max_power == max_pwr) {
5e6e3a92
BZ
491 next_chan++;
492 no_of_parsed_chan++;
493 } else {
494 t = &domain_info->triplet[no_of_triplet];
495 t->chans.first_channel = first_chan;
496 t->chans.num_channels = no_of_parsed_chan;
497 t->chans.max_power = max_pwr;
498 no_of_triplet++;
499 first_chan = (u32) ch->hw_value;
500 next_chan = first_chan;
22db2497 501 max_pwr = ch->max_power;
5e6e3a92
BZ
502 no_of_parsed_chan = 1;
503 }
504 }
505
506 if (flag) {
507 t = &domain_info->triplet[no_of_triplet];
508 t->chans.first_channel = first_chan;
509 t->chans.num_channels = no_of_parsed_chan;
510 t->chans.max_power = max_pwr;
511 no_of_triplet++;
512 }
513
514 domain_info->no_of_triplet = no_of_triplet;
636c4598 515
67fdf39e
AP
516 priv = mwifiex_get_priv(adapter, MWIFIEX_BSS_ROLE_ANY);
517
fa0ecbb9
BZ
518 if (mwifiex_send_cmd(priv, HostCmd_CMD_802_11D_DOMAIN_INFO,
519 HostCmd_ACT_GEN_SET, 0, NULL, false)) {
5e6e3a92 520 wiphy_err(wiphy, "11D: setting domain info in FW\n");
636c4598
YAP
521 return -1;
522 }
5e6e3a92 523
636c4598 524 return 0;
5e6e3a92
BZ
525}
526
527/*
528 * CFG802.11 regulatory domain callback function.
529 *
530 * This function is called when the regulatory domain is changed due to the
531 * following reasons -
532 * - Set by driver
533 * - Set by system core
534 * - Set by user
535 * - Set bt Country IE
536 */
0c0280bd
LR
537static void mwifiex_reg_notifier(struct wiphy *wiphy,
538 struct regulatory_request *request)
5e6e3a92 539{
67fdf39e 540 struct mwifiex_adapter *adapter = mwifiex_cfg80211_get_adapter(wiphy);
82efa16a
BZ
541 struct mwifiex_private *priv = mwifiex_get_priv(adapter,
542 MWIFIEX_BSS_ROLE_ANY);
5e6e3a92 543
67fdf39e
AP
544 wiphy_dbg(wiphy, "info: cfg80211 regulatory domain callback for %c%c\n",
545 request->alpha2[0], request->alpha2[1]);
5e6e3a92 546
5e6e3a92
BZ
547 switch (request->initiator) {
548 case NL80211_REGDOM_SET_BY_DRIVER:
549 case NL80211_REGDOM_SET_BY_CORE:
550 case NL80211_REGDOM_SET_BY_USER:
5e6e3a92
BZ
551 case NL80211_REGDOM_SET_BY_COUNTRY_IE:
552 break;
dd4a9ac0
BZ
553 default:
554 wiphy_err(wiphy, "unknown regdom initiator: %d\n",
555 request->initiator);
556 return;
557 }
558
559 /* Don't send world or same regdom info to firmware */
560 if (strncmp(request->alpha2, "00", 2) &&
561 strncmp(request->alpha2, adapter->country_code,
562 sizeof(request->alpha2))) {
563 memcpy(adapter->country_code, request->alpha2,
564 sizeof(request->alpha2));
565 mwifiex_send_domain_info_cmd_fw(wiphy);
b58df446 566 mwifiex_dnld_txpwr_table(priv);
5e6e3a92 567 }
5e6e3a92
BZ
568}
569
5e6e3a92
BZ
570/*
571 * This function sets the fragmentation threshold.
572 *
600f5d90 573 * The fragmentation threshold value must lie between MWIFIEX_FRAG_MIN_VALUE
5e6e3a92
BZ
574 * and MWIFIEX_FRAG_MAX_VALUE.
575 */
576static int
577mwifiex_set_frag(struct mwifiex_private *priv, u32 frag_thr)
578{
aea0701e
YAP
579 if (frag_thr < MWIFIEX_FRAG_MIN_VALUE ||
580 frag_thr > MWIFIEX_FRAG_MAX_VALUE)
9b930eae 581 frag_thr = MWIFIEX_FRAG_MAX_VALUE;
5e6e3a92 582
fa0ecbb9
BZ
583 return mwifiex_send_cmd(priv, HostCmd_CMD_802_11_SNMP_MIB,
584 HostCmd_ACT_GEN_SET, FRAG_THRESH_I,
585 &frag_thr, true);
5e6e3a92
BZ
586}
587
588/*
589 * This function sets the RTS threshold.
600f5d90
AK
590
591 * The rts value must lie between MWIFIEX_RTS_MIN_VALUE
592 * and MWIFIEX_RTS_MAX_VALUE.
5e6e3a92
BZ
593 */
594static int
595mwifiex_set_rts(struct mwifiex_private *priv, u32 rts_thr)
596{
5e6e3a92
BZ
597 if (rts_thr < MWIFIEX_RTS_MIN_VALUE || rts_thr > MWIFIEX_RTS_MAX_VALUE)
598 rts_thr = MWIFIEX_RTS_MAX_VALUE;
599
fa0ecbb9
BZ
600 return mwifiex_send_cmd(priv, HostCmd_CMD_802_11_SNMP_MIB,
601 HostCmd_ACT_GEN_SET, RTS_THRESH_I,
602 &rts_thr, true);
5e6e3a92
BZ
603}
604
605/*
606 * CFG802.11 operation handler to set wiphy parameters.
607 *
608 * This function can be used to set the RTS threshold and the
609 * Fragmentation threshold of the driver.
610 */
611static int
612mwifiex_cfg80211_set_wiphy_params(struct wiphy *wiphy, u32 changed)
613{
67fdf39e 614 struct mwifiex_adapter *adapter = mwifiex_cfg80211_get_adapter(wiphy);
9b930eae
AP
615 struct mwifiex_private *priv;
616 struct mwifiex_uap_bss_param *bss_cfg;
617 int ret, bss_started, i;
618
619 for (i = 0; i < adapter->priv_num; i++) {
620 priv = adapter->priv[i];
621
622 switch (priv->bss_role) {
623 case MWIFIEX_BSS_ROLE_UAP:
624 bss_cfg = kzalloc(sizeof(struct mwifiex_uap_bss_param),
625 GFP_KERNEL);
626 if (!bss_cfg)
627 return -ENOMEM;
628
629 mwifiex_set_sys_config_invalid_data(bss_cfg);
630
631 if (changed & WIPHY_PARAM_RTS_THRESHOLD)
632 bss_cfg->rts_threshold = wiphy->rts_threshold;
633 if (changed & WIPHY_PARAM_FRAG_THRESHOLD)
634 bss_cfg->frag_threshold = wiphy->frag_threshold;
635 if (changed & WIPHY_PARAM_RETRY_LONG)
636 bss_cfg->retry_limit = wiphy->retry_long;
637
638 bss_started = priv->bss_started;
639
fa0ecbb9
BZ
640 ret = mwifiex_send_cmd(priv, HostCmd_CMD_UAP_BSS_STOP,
641 HostCmd_ACT_GEN_SET, 0,
642 NULL, true);
9b930eae
AP
643 if (ret) {
644 wiphy_err(wiphy, "Failed to stop the BSS\n");
645 kfree(bss_cfg);
646 return ret;
647 }
648
fa0ecbb9
BZ
649 ret = mwifiex_send_cmd(priv, HostCmd_CMD_UAP_SYS_CONFIG,
650 HostCmd_ACT_GEN_SET,
651 UAP_BSS_PARAMS_I, bss_cfg,
652 false);
5e6e3a92 653
9b930eae
AP
654 kfree(bss_cfg);
655
656 if (ret) {
657 wiphy_err(wiphy, "Failed to set bss config\n");
658 return ret;
659 }
5e6e3a92 660
9b930eae
AP
661 if (!bss_started)
662 break;
663
fa0ecbb9
BZ
664 ret = mwifiex_send_cmd(priv, HostCmd_CMD_UAP_BSS_START,
665 HostCmd_ACT_GEN_SET, 0,
666 NULL, false);
9b930eae
AP
667 if (ret) {
668 wiphy_err(wiphy, "Failed to start BSS\n");
669 return ret;
670 }
671
672 break;
673 case MWIFIEX_BSS_ROLE_STA:
674 if (changed & WIPHY_PARAM_RTS_THRESHOLD) {
675 ret = mwifiex_set_rts(priv,
676 wiphy->rts_threshold);
677 if (ret)
678 return ret;
679 }
680 if (changed & WIPHY_PARAM_FRAG_THRESHOLD) {
681 ret = mwifiex_set_frag(priv,
682 wiphy->frag_threshold);
683 if (ret)
684 return ret;
685 }
686 break;
687 }
688 }
689
690 return 0;
5e6e3a92
BZ
691}
692
e1a2b7a3
SP
693static int
694mwifiex_cfg80211_deinit_p2p(struct mwifiex_private *priv)
695{
696 u16 mode = P2P_MODE_DISABLE;
697
9197ab9e
SP
698 if (GET_BSS_ROLE(priv) != MWIFIEX_BSS_ROLE_STA)
699 mwifiex_set_bss_role(priv, MWIFIEX_BSS_ROLE_STA);
700
fa0ecbb9
BZ
701 if (mwifiex_send_cmd(priv, HostCmd_CMD_P2P_MODE_CFG,
702 HostCmd_ACT_GEN_SET, 0, &mode, true))
e1a2b7a3
SP
703 return -1;
704
705 return 0;
706}
707
708/*
709 * This function initializes the functionalities for P2P client.
710 * The P2P client initialization sequence is:
711 * disable -> device -> client
712 */
713static int
714mwifiex_cfg80211_init_p2p_client(struct mwifiex_private *priv)
715{
716 u16 mode;
717
718 if (mwifiex_cfg80211_deinit_p2p(priv))
719 return -1;
720
721 mode = P2P_MODE_DEVICE;
fa0ecbb9
BZ
722 if (mwifiex_send_cmd(priv, HostCmd_CMD_P2P_MODE_CFG,
723 HostCmd_ACT_GEN_SET, 0, &mode, true))
e1a2b7a3
SP
724 return -1;
725
726 mode = P2P_MODE_CLIENT;
fa0ecbb9
BZ
727 if (mwifiex_send_cmd(priv, HostCmd_CMD_P2P_MODE_CFG,
728 HostCmd_ACT_GEN_SET, 0, &mode, true))
e1a2b7a3
SP
729 return -1;
730
731 return 0;
732}
733
9197ab9e
SP
734/*
735 * This function initializes the functionalities for P2P GO.
736 * The P2P GO initialization sequence is:
737 * disable -> device -> GO
738 */
739static int
740mwifiex_cfg80211_init_p2p_go(struct mwifiex_private *priv)
741{
742 u16 mode;
743
744 if (mwifiex_cfg80211_deinit_p2p(priv))
745 return -1;
746
747 mode = P2P_MODE_DEVICE;
fa0ecbb9
BZ
748 if (mwifiex_send_cmd(priv, HostCmd_CMD_P2P_MODE_CFG,
749 HostCmd_ACT_GEN_SET, 0, &mode, true))
9197ab9e
SP
750 return -1;
751
752 mode = P2P_MODE_GO;
fa0ecbb9
BZ
753 if (mwifiex_send_cmd(priv, HostCmd_CMD_P2P_MODE_CFG,
754 HostCmd_ACT_GEN_SET, 0, &mode, true))
9197ab9e
SP
755 return -1;
756
757 if (GET_BSS_ROLE(priv) != MWIFIEX_BSS_ROLE_UAP)
758 mwifiex_set_bss_role(priv, MWIFIEX_BSS_ROLE_UAP);
759
760 return 0;
761}
762
5e6e3a92
BZ
763/*
764 * CFG802.11 operation handler to change interface type.
5e6e3a92
BZ
765 */
766static int
767mwifiex_cfg80211_change_virtual_intf(struct wiphy *wiphy,
768 struct net_device *dev,
769 enum nl80211_iftype type, u32 *flags,
770 struct vif_params *params)
771{
270e58e8 772 int ret;
5e6e3a92 773 struct mwifiex_private *priv = mwifiex_netdev_get_priv(dev);
5e6e3a92 774
4f02341a 775 switch (dev->ieee80211_ptr->iftype) {
5e6e3a92 776 case NL80211_IFTYPE_ADHOC:
4f02341a
AP
777 switch (type) {
778 case NL80211_IFTYPE_STATION:
779 break;
780 case NL80211_IFTYPE_UNSPECIFIED:
781 wiphy_warn(wiphy, "%s: kept type as IBSS\n", dev->name);
782 case NL80211_IFTYPE_ADHOC: /* This shouldn't happen */
783 return 0;
784 case NL80211_IFTYPE_AP:
785 default:
786 wiphy_err(wiphy, "%s: changing to %d not supported\n",
787 dev->name, type);
788 return -EOPNOTSUPP;
789 }
5e6e3a92
BZ
790 break;
791 case NL80211_IFTYPE_STATION:
4f02341a
AP
792 switch (type) {
793 case NL80211_IFTYPE_ADHOC:
794 break;
e1a2b7a3
SP
795 case NL80211_IFTYPE_P2P_CLIENT:
796 if (mwifiex_cfg80211_init_p2p_client(priv))
797 return -EFAULT;
798 dev->ieee80211_ptr->iftype = type;
799 return 0;
9197ab9e
SP
800 case NL80211_IFTYPE_P2P_GO:
801 if (mwifiex_cfg80211_init_p2p_go(priv))
802 return -EFAULT;
803 dev->ieee80211_ptr->iftype = type;
804 return 0;
4f02341a
AP
805 case NL80211_IFTYPE_UNSPECIFIED:
806 wiphy_warn(wiphy, "%s: kept type as STA\n", dev->name);
807 case NL80211_IFTYPE_STATION: /* This shouldn't happen */
808 return 0;
809 case NL80211_IFTYPE_AP:
810 default:
811 wiphy_err(wiphy, "%s: changing to %d not supported\n",
812 dev->name, type);
813 return -EOPNOTSUPP;
814 }
815 break;
816 case NL80211_IFTYPE_AP:
817 switch (type) {
818 case NL80211_IFTYPE_UNSPECIFIED:
819 wiphy_warn(wiphy, "%s: kept type as AP\n", dev->name);
820 case NL80211_IFTYPE_AP: /* This shouldn't happen */
821 return 0;
822 case NL80211_IFTYPE_ADHOC:
823 case NL80211_IFTYPE_STATION:
824 default:
825 wiphy_err(wiphy, "%s: changing to %d not supported\n",
826 dev->name, type);
827 return -EOPNOTSUPP;
828 }
5e6e3a92 829 break;
e1a2b7a3 830 case NL80211_IFTYPE_P2P_CLIENT:
9197ab9e 831 case NL80211_IFTYPE_P2P_GO:
e1a2b7a3
SP
832 switch (type) {
833 case NL80211_IFTYPE_STATION:
834 if (mwifiex_cfg80211_deinit_p2p(priv))
835 return -EFAULT;
836 dev->ieee80211_ptr->iftype = type;
837 return 0;
838 default:
839 return -EOPNOTSUPP;
840 }
841 break;
5e6e3a92 842 default:
4f02341a
AP
843 wiphy_err(wiphy, "%s: unknown iftype: %d\n",
844 dev->name, dev->ieee80211_ptr->iftype);
845 return -EOPNOTSUPP;
5e6e3a92 846 }
5e6e3a92 847
4f02341a
AP
848 dev->ieee80211_ptr->iftype = type;
849 priv->bss_mode = type;
600f5d90 850 mwifiex_deauthenticate(priv, NULL);
eecd8250 851
f986b6d5 852 priv->sec_info.authentication_mode = NL80211_AUTHTYPE_OPEN_SYSTEM;
eecd8250 853
fa0ecbb9
BZ
854 ret = mwifiex_send_cmd(priv, HostCmd_CMD_SET_BSS_MODE,
855 HostCmd_ACT_GEN_SET, 0, NULL, true);
eecd8250 856
5e6e3a92
BZ
857 return ret;
858}
859
a5f39056
YAP
860static void
861mwifiex_parse_htinfo(struct mwifiex_private *priv, u8 tx_htinfo,
862 struct rate_info *rate)
863{
864 struct mwifiex_adapter *adapter = priv->adapter;
865
866 if (adapter->is_hw_11ac_capable) {
867 /* bit[1-0]: 00=LG 01=HT 10=VHT */
868 if (tx_htinfo & BIT(0)) {
869 /* HT */
870 rate->mcs = priv->tx_rate;
871 rate->flags |= RATE_INFO_FLAGS_MCS;
872 }
873 if (tx_htinfo & BIT(1)) {
874 /* VHT */
875 rate->mcs = priv->tx_rate & 0x0F;
876 rate->flags |= RATE_INFO_FLAGS_VHT_MCS;
877 }
878
879 if (tx_htinfo & (BIT(1) | BIT(0))) {
880 /* HT or VHT */
881 switch (tx_htinfo & (BIT(3) | BIT(2))) {
882 case 0:
883 /* This will be 20MHz */
884 break;
885 case (BIT(2)):
886 rate->flags |= RATE_INFO_FLAGS_40_MHZ_WIDTH;
887 break;
888 case (BIT(3)):
889 rate->flags |= RATE_INFO_FLAGS_80_MHZ_WIDTH;
890 break;
891 case (BIT(3) | BIT(2)):
892 rate->flags |= RATE_INFO_FLAGS_160_MHZ_WIDTH;
893 break;
894 }
895
896 if (tx_htinfo & BIT(4))
897 rate->flags |= RATE_INFO_FLAGS_SHORT_GI;
898
899 if ((priv->tx_rate >> 4) == 1)
900 rate->nss = 2;
901 else
902 rate->nss = 1;
903 }
904 } else {
905 /*
906 * Bit 0 in tx_htinfo indicates that current Tx rate
907 * is 11n rate. Valid MCS index values for us are 0 to 15.
908 */
909 if ((tx_htinfo & BIT(0)) && (priv->tx_rate < 16)) {
910 rate->mcs = priv->tx_rate;
911 rate->flags |= RATE_INFO_FLAGS_MCS;
912 if (tx_htinfo & BIT(1))
913 rate->flags |= RATE_INFO_FLAGS_40_MHZ_WIDTH;
914 if (tx_htinfo & BIT(2))
915 rate->flags |= RATE_INFO_FLAGS_SHORT_GI;
916 }
917 }
918}
919
5e6e3a92
BZ
920/*
921 * This function dumps the station information on a buffer.
922 *
923 * The following information are shown -
924 * - Total bytes transmitted
925 * - Total bytes received
926 * - Total packets transmitted
927 * - Total packets received
928 * - Signal quality level
929 * - Transmission rate
930 */
931static int
932mwifiex_dump_station_info(struct mwifiex_private *priv,
933 struct station_info *sinfo)
934{
006606c0 935 u32 rate;
5e6e3a92
BZ
936
937 sinfo->filled = STATION_INFO_RX_BYTES | STATION_INFO_TX_BYTES |
7013d3e2
AK
938 STATION_INFO_RX_PACKETS | STATION_INFO_TX_PACKETS |
939 STATION_INFO_TX_BITRATE |
940 STATION_INFO_SIGNAL | STATION_INFO_SIGNAL_AVG;
5e6e3a92
BZ
941
942 /* Get signal information from the firmware */
fa0ecbb9
BZ
943 if (mwifiex_send_cmd(priv, HostCmd_CMD_RSSI_INFO,
944 HostCmd_ACT_GEN_GET, 0, NULL, true)) {
958a4a86
AK
945 dev_err(priv->adapter->dev, "failed to get signal information\n");
946 return -EFAULT;
5e6e3a92
BZ
947 }
948
949 if (mwifiex_drv_get_data_rate(priv, &rate)) {
950 dev_err(priv->adapter->dev, "getting data rate\n");
958a4a86 951 return -EFAULT;
5e6e3a92
BZ
952 }
953
caf60a6c 954 /* Get DTIM period information from firmware */
fa0ecbb9
BZ
955 mwifiex_send_cmd(priv, HostCmd_CMD_802_11_SNMP_MIB,
956 HostCmd_ACT_GEN_GET, DTIM_PERIOD_I,
957 &priv->dtim_period, true);
caf60a6c 958
a5f39056 959 mwifiex_parse_htinfo(priv, priv->tx_htinfo, &sinfo->txrate);
4ec6f9c0 960
7013d3e2 961 sinfo->signal_avg = priv->bcn_rssi_avg;
5e6e3a92
BZ
962 sinfo->rx_bytes = priv->stats.rx_bytes;
963 sinfo->tx_bytes = priv->stats.tx_bytes;
964 sinfo->rx_packets = priv->stats.rx_packets;
965 sinfo->tx_packets = priv->stats.tx_packets;
958a4a86 966 sinfo->signal = priv->bcn_rssi_avg;
4ec6f9c0 967 /* bit rate is in 500 kb/s units. Convert it to 100kb/s units */
006606c0 968 sinfo->txrate.legacy = rate * 5;
5e6e3a92 969
c4f3b972
AK
970 if (priv->bss_mode == NL80211_IFTYPE_STATION) {
971 sinfo->filled |= STATION_INFO_BSS_PARAM;
972 sinfo->bss_param.flags = 0;
973 if (priv->curr_bss_params.bss_descriptor.cap_info_bitmap &
974 WLAN_CAPABILITY_SHORT_PREAMBLE)
975 sinfo->bss_param.flags |=
976 BSS_PARAM_FLAGS_SHORT_PREAMBLE;
977 if (priv->curr_bss_params.bss_descriptor.cap_info_bitmap &
978 WLAN_CAPABILITY_SHORT_SLOT_TIME)
979 sinfo->bss_param.flags |=
980 BSS_PARAM_FLAGS_SHORT_SLOT_TIME;
caf60a6c 981 sinfo->bss_param.dtim_period = priv->dtim_period;
c4f3b972
AK
982 sinfo->bss_param.beacon_interval =
983 priv->curr_bss_params.bss_descriptor.beacon_period;
984 }
985
958a4a86 986 return 0;
5e6e3a92
BZ
987}
988
989/*
990 * CFG802.11 operation handler to get station information.
991 *
992 * This function only works in connected mode, and dumps the
993 * requested station information, if available.
994 */
995static int
996mwifiex_cfg80211_get_station(struct wiphy *wiphy, struct net_device *dev,
997 u8 *mac, struct station_info *sinfo)
998{
999 struct mwifiex_private *priv = mwifiex_netdev_get_priv(dev);
5e6e3a92 1000
5e6e3a92
BZ
1001 if (!priv->media_connected)
1002 return -ENOENT;
1003 if (memcmp(mac, priv->cfg_bssid, ETH_ALEN))
1004 return -ENOENT;
1005
636c4598 1006 return mwifiex_dump_station_info(priv, sinfo);
5e6e3a92
BZ
1007}
1008
f85aae6b
AK
1009/*
1010 * CFG802.11 operation handler to dump station information.
1011 */
1012static int
1013mwifiex_cfg80211_dump_station(struct wiphy *wiphy, struct net_device *dev,
1014 int idx, u8 *mac, struct station_info *sinfo)
1015{
1016 struct mwifiex_private *priv = mwifiex_netdev_get_priv(dev);
1017
1018 if (!priv->media_connected || idx)
1019 return -ENOENT;
1020
1021 memcpy(mac, priv->cfg_bssid, ETH_ALEN);
1022
1023 return mwifiex_dump_station_info(priv, sinfo);
1024}
1025
5e6e3a92 1026/* Supported rates to be advertised to the cfg80211 */
5e6e3a92
BZ
1027static struct ieee80211_rate mwifiex_rates[] = {
1028 {.bitrate = 10, .hw_value = 2, },
1029 {.bitrate = 20, .hw_value = 4, },
1030 {.bitrate = 55, .hw_value = 11, },
1031 {.bitrate = 110, .hw_value = 22, },
5e6e3a92
BZ
1032 {.bitrate = 60, .hw_value = 12, },
1033 {.bitrate = 90, .hw_value = 18, },
1034 {.bitrate = 120, .hw_value = 24, },
1035 {.bitrate = 180, .hw_value = 36, },
1036 {.bitrate = 240, .hw_value = 48, },
1037 {.bitrate = 360, .hw_value = 72, },
1038 {.bitrate = 480, .hw_value = 96, },
1039 {.bitrate = 540, .hw_value = 108, },
5e6e3a92
BZ
1040};
1041
1042/* Channel definitions to be advertised to cfg80211 */
5e6e3a92
BZ
1043static struct ieee80211_channel mwifiex_channels_2ghz[] = {
1044 {.center_freq = 2412, .hw_value = 1, },
1045 {.center_freq = 2417, .hw_value = 2, },
1046 {.center_freq = 2422, .hw_value = 3, },
1047 {.center_freq = 2427, .hw_value = 4, },
1048 {.center_freq = 2432, .hw_value = 5, },
1049 {.center_freq = 2437, .hw_value = 6, },
1050 {.center_freq = 2442, .hw_value = 7, },
1051 {.center_freq = 2447, .hw_value = 8, },
1052 {.center_freq = 2452, .hw_value = 9, },
1053 {.center_freq = 2457, .hw_value = 10, },
1054 {.center_freq = 2462, .hw_value = 11, },
1055 {.center_freq = 2467, .hw_value = 12, },
1056 {.center_freq = 2472, .hw_value = 13, },
1057 {.center_freq = 2484, .hw_value = 14, },
1058};
1059
1060static struct ieee80211_supported_band mwifiex_band_2ghz = {
1061 .channels = mwifiex_channels_2ghz,
1062 .n_channels = ARRAY_SIZE(mwifiex_channels_2ghz),
1063 .bitrates = mwifiex_rates,
8763848e 1064 .n_bitrates = ARRAY_SIZE(mwifiex_rates),
5e6e3a92
BZ
1065};
1066
1067static struct ieee80211_channel mwifiex_channels_5ghz[] = {
1068 {.center_freq = 5040, .hw_value = 8, },
1069 {.center_freq = 5060, .hw_value = 12, },
1070 {.center_freq = 5080, .hw_value = 16, },
1071 {.center_freq = 5170, .hw_value = 34, },
1072 {.center_freq = 5190, .hw_value = 38, },
1073 {.center_freq = 5210, .hw_value = 42, },
1074 {.center_freq = 5230, .hw_value = 46, },
1075 {.center_freq = 5180, .hw_value = 36, },
1076 {.center_freq = 5200, .hw_value = 40, },
1077 {.center_freq = 5220, .hw_value = 44, },
1078 {.center_freq = 5240, .hw_value = 48, },
1079 {.center_freq = 5260, .hw_value = 52, },
1080 {.center_freq = 5280, .hw_value = 56, },
1081 {.center_freq = 5300, .hw_value = 60, },
1082 {.center_freq = 5320, .hw_value = 64, },
1083 {.center_freq = 5500, .hw_value = 100, },
1084 {.center_freq = 5520, .hw_value = 104, },
1085 {.center_freq = 5540, .hw_value = 108, },
1086 {.center_freq = 5560, .hw_value = 112, },
1087 {.center_freq = 5580, .hw_value = 116, },
1088 {.center_freq = 5600, .hw_value = 120, },
1089 {.center_freq = 5620, .hw_value = 124, },
1090 {.center_freq = 5640, .hw_value = 128, },
1091 {.center_freq = 5660, .hw_value = 132, },
1092 {.center_freq = 5680, .hw_value = 136, },
1093 {.center_freq = 5700, .hw_value = 140, },
1094 {.center_freq = 5745, .hw_value = 149, },
1095 {.center_freq = 5765, .hw_value = 153, },
1096 {.center_freq = 5785, .hw_value = 157, },
1097 {.center_freq = 5805, .hw_value = 161, },
1098 {.center_freq = 5825, .hw_value = 165, },
1099};
1100
1101static struct ieee80211_supported_band mwifiex_band_5ghz = {
1102 .channels = mwifiex_channels_5ghz,
1103 .n_channels = ARRAY_SIZE(mwifiex_channels_5ghz),
eb416ad3
AP
1104 .bitrates = mwifiex_rates + 4,
1105 .n_bitrates = ARRAY_SIZE(mwifiex_rates) - 4,
5e6e3a92
BZ
1106};
1107
1108
1109/* Supported crypto cipher suits to be advertised to cfg80211 */
5e6e3a92
BZ
1110static const u32 mwifiex_cipher_suites[] = {
1111 WLAN_CIPHER_SUITE_WEP40,
1112 WLAN_CIPHER_SUITE_WEP104,
1113 WLAN_CIPHER_SUITE_TKIP,
1114 WLAN_CIPHER_SUITE_CCMP,
53b11231 1115 WLAN_CIPHER_SUITE_AES_CMAC,
5e6e3a92
BZ
1116};
1117
83719be8
SP
1118/* Supported mgmt frame types to be advertised to cfg80211 */
1119static const struct ieee80211_txrx_stypes
1120mwifiex_mgmt_stypes[NUM_NL80211_IFTYPES] = {
1121 [NL80211_IFTYPE_STATION] = {
1122 .tx = BIT(IEEE80211_STYPE_ACTION >> 4) |
1123 BIT(IEEE80211_STYPE_PROBE_RESP >> 4),
1124 .rx = BIT(IEEE80211_STYPE_ACTION >> 4) |
1125 BIT(IEEE80211_STYPE_PROBE_REQ >> 4),
1126 },
1127 [NL80211_IFTYPE_AP] = {
1128 .tx = BIT(IEEE80211_STYPE_ACTION >> 4) |
1129 BIT(IEEE80211_STYPE_PROBE_RESP >> 4),
1130 .rx = BIT(IEEE80211_STYPE_ACTION >> 4) |
1131 BIT(IEEE80211_STYPE_PROBE_REQ >> 4),
1132 },
1133 [NL80211_IFTYPE_P2P_CLIENT] = {
1134 .tx = BIT(IEEE80211_STYPE_ACTION >> 4) |
1135 BIT(IEEE80211_STYPE_PROBE_RESP >> 4),
1136 .rx = BIT(IEEE80211_STYPE_ACTION >> 4) |
1137 BIT(IEEE80211_STYPE_PROBE_REQ >> 4),
1138 },
1139 [NL80211_IFTYPE_P2P_GO] = {
1140 .tx = BIT(IEEE80211_STYPE_ACTION >> 4) |
1141 BIT(IEEE80211_STYPE_PROBE_RESP >> 4),
1142 .rx = BIT(IEEE80211_STYPE_ACTION >> 4) |
1143 BIT(IEEE80211_STYPE_PROBE_REQ >> 4),
1144 },
1145};
1146
5d82c53a
YAP
1147/*
1148 * CFG802.11 operation handler for setting bit rates.
1149 *
433c3990
AK
1150 * Function configures data rates to firmware using bitrate mask
1151 * provided by cfg80211.
5d82c53a
YAP
1152 */
1153static int mwifiex_cfg80211_set_bitrate_mask(struct wiphy *wiphy,
1154 struct net_device *dev,
1155 const u8 *peer,
1156 const struct cfg80211_bitrate_mask *mask)
1157{
5d82c53a 1158 struct mwifiex_private *priv = mwifiex_netdev_get_priv(dev);
433c3990
AK
1159 u16 bitmap_rates[MAX_BITMAP_RATES_SIZE];
1160 enum ieee80211_band band;
5d82c53a 1161
433c3990
AK
1162 if (!priv->media_connected) {
1163 dev_err(priv->adapter->dev,
1164 "Can not set Tx data rate in disconnected state\n");
1165 return -EINVAL;
5d82c53a
YAP
1166 }
1167
433c3990 1168 band = mwifiex_band_to_radio_type(priv->curr_bss_params.band);
5d82c53a 1169
433c3990 1170 memset(bitmap_rates, 0, sizeof(bitmap_rates));
5d82c53a 1171
433c3990
AK
1172 /* Fill HR/DSSS rates. */
1173 if (band == IEEE80211_BAND_2GHZ)
1174 bitmap_rates[0] = mask->control[band].legacy & 0x000f;
5d82c53a 1175
433c3990
AK
1176 /* Fill OFDM rates */
1177 if (band == IEEE80211_BAND_2GHZ)
1178 bitmap_rates[1] = (mask->control[band].legacy & 0x0ff0) >> 4;
1179 else
1180 bitmap_rates[1] = mask->control[band].legacy;
1181
d1e33e65
JD
1182 /* Fill HT MCS rates */
1183 bitmap_rates[2] = mask->control[band].ht_mcs[0];
433c3990 1184 if (priv->adapter->hw_dev_mcs_support == HT_STREAM_2X2)
d1e33e65 1185 bitmap_rates[2] |= mask->control[band].ht_mcs[1] << 8;
433c3990 1186
fa0ecbb9
BZ
1187 return mwifiex_send_cmd(priv, HostCmd_CMD_TX_RATE_CFG,
1188 HostCmd_ACT_GEN_SET, 0, bitmap_rates, true);
5d82c53a
YAP
1189}
1190
fa444bf8
AK
1191/*
1192 * CFG802.11 operation handler for connection quality monitoring.
1193 *
1194 * This function subscribes/unsubscribes HIGH_RSSI and LOW_RSSI
1195 * events to FW.
1196 */
1197static int mwifiex_cfg80211_set_cqm_rssi_config(struct wiphy *wiphy,
1198 struct net_device *dev,
1199 s32 rssi_thold, u32 rssi_hyst)
1200{
1201 struct mwifiex_private *priv = mwifiex_netdev_get_priv(dev);
1202 struct mwifiex_ds_misc_subsc_evt subsc_evt;
1203
1204 priv->cqm_rssi_thold = rssi_thold;
1205 priv->cqm_rssi_hyst = rssi_hyst;
1206
1207 memset(&subsc_evt, 0x00, sizeof(struct mwifiex_ds_misc_subsc_evt));
1208 subsc_evt.events = BITMASK_BCN_RSSI_LOW | BITMASK_BCN_RSSI_HIGH;
1209
1210 /* Subscribe/unsubscribe low and high rssi events */
1211 if (rssi_thold && rssi_hyst) {
1212 subsc_evt.action = HostCmd_ACT_BITWISE_SET;
1213 subsc_evt.bcn_l_rssi_cfg.abs_value = abs(rssi_thold);
1214 subsc_evt.bcn_h_rssi_cfg.abs_value = abs(rssi_thold);
1215 subsc_evt.bcn_l_rssi_cfg.evt_freq = 1;
1216 subsc_evt.bcn_h_rssi_cfg.evt_freq = 1;
fa0ecbb9
BZ
1217 return mwifiex_send_cmd(priv,
1218 HostCmd_CMD_802_11_SUBSCRIBE_EVENT,
1219 0, 0, &subsc_evt, true);
fa444bf8
AK
1220 } else {
1221 subsc_evt.action = HostCmd_ACT_BITWISE_CLR;
fa0ecbb9
BZ
1222 return mwifiex_send_cmd(priv,
1223 HostCmd_CMD_802_11_SUBSCRIBE_EVENT,
1224 0, 0, &subsc_evt, true);
fa444bf8
AK
1225 }
1226
1227 return 0;
1228}
1229
5370c836
AP
1230/* cfg80211 operation handler for change_beacon.
1231 * Function retrieves and sets modified management IEs to FW.
1232 */
1233static int mwifiex_cfg80211_change_beacon(struct wiphy *wiphy,
1234 struct net_device *dev,
1235 struct cfg80211_beacon_data *data)
1236{
1237 struct mwifiex_private *priv = mwifiex_netdev_get_priv(dev);
1238
9197ab9e 1239 if (GET_BSS_ROLE(priv) != MWIFIEX_BSS_ROLE_UAP) {
5370c836
AP
1240 wiphy_err(wiphy, "%s: bss_type mismatched\n", __func__);
1241 return -EINVAL;
1242 }
1243
1244 if (!priv->bss_started) {
1245 wiphy_err(wiphy, "%s: bss not started\n", __func__);
1246 return -EINVAL;
1247 }
1248
1249 if (mwifiex_set_mgmt_ies(priv, data)) {
1250 wiphy_err(wiphy, "%s: setting mgmt ies failed\n", __func__);
1251 return -EFAULT;
1252 }
1253
1254 return 0;
1255}
1256
0f9e9b8b
AP
1257/* cfg80211 operation handler for del_station.
1258 * Function deauthenticates station which value is provided in mac parameter.
1259 * If mac is NULL/broadcast, all stations in associated station list are
1260 * deauthenticated. If bss is not started or there are no stations in
1261 * associated stations list, no action is taken.
1262 */
1263static int
1264mwifiex_cfg80211_del_station(struct wiphy *wiphy, struct net_device *dev,
1265 u8 *mac)
1266{
1267 struct mwifiex_private *priv = mwifiex_netdev_get_priv(dev);
1268 struct mwifiex_sta_node *sta_node;
1269 unsigned long flags;
1270
1271 if (list_empty(&priv->sta_list) || !priv->bss_started)
1272 return 0;
1273
1274 if (!mac || is_broadcast_ether_addr(mac)) {
1275 wiphy_dbg(wiphy, "%s: NULL/broadcast mac address\n", __func__);
1276 list_for_each_entry(sta_node, &priv->sta_list, list) {
fa0ecbb9
BZ
1277 if (mwifiex_send_cmd(priv, HostCmd_CMD_UAP_STA_DEAUTH,
1278 HostCmd_ACT_GEN_SET, 0,
1279 sta_node->mac_addr, true))
0f9e9b8b
AP
1280 return -1;
1281 mwifiex_uap_del_sta_data(priv, sta_node);
1282 }
1283 } else {
1284 wiphy_dbg(wiphy, "%s: mac address %pM\n", __func__, mac);
1285 spin_lock_irqsave(&priv->sta_list_spinlock, flags);
1286 sta_node = mwifiex_get_sta_entry(priv, mac);
1287 spin_unlock_irqrestore(&priv->sta_list_spinlock, flags);
1288 if (sta_node) {
fa0ecbb9
BZ
1289 if (mwifiex_send_cmd(priv, HostCmd_CMD_UAP_STA_DEAUTH,
1290 HostCmd_ACT_GEN_SET, 0,
1291 sta_node->mac_addr, true))
0f9e9b8b
AP
1292 return -1;
1293 mwifiex_uap_del_sta_data(priv, sta_node);
1294 }
1295 }
1296
1297 return 0;
1298}
1299
8a279d5b
AK
1300static int
1301mwifiex_cfg80211_set_antenna(struct wiphy *wiphy, u32 tx_ant, u32 rx_ant)
1302{
1303 struct mwifiex_adapter *adapter = mwifiex_cfg80211_get_adapter(wiphy);
1304 struct mwifiex_private *priv = mwifiex_get_priv(adapter,
1305 MWIFIEX_BSS_ROLE_ANY);
1306 struct mwifiex_ds_ant_cfg ant_cfg;
1307
1308 if (!tx_ant || !rx_ant)
1309 return -EOPNOTSUPP;
1310
1311 if (adapter->hw_dev_mcs_support != HT_STREAM_2X2) {
1312 /* Not a MIMO chip. User should provide specific antenna number
1313 * for Tx/Rx path or enable all antennas for diversity
1314 */
1315 if (tx_ant != rx_ant)
1316 return -EOPNOTSUPP;
1317
1318 if ((tx_ant & (tx_ant - 1)) &&
1319 (tx_ant != BIT(adapter->number_of_antenna) - 1))
1320 return -EOPNOTSUPP;
1321
1322 if ((tx_ant == BIT(adapter->number_of_antenna) - 1) &&
1323 (priv->adapter->number_of_antenna > 1)) {
1324 tx_ant = RF_ANTENNA_AUTO;
1325 rx_ant = RF_ANTENNA_AUTO;
1326 }
1327 }
1328
1329 ant_cfg.tx_ant = tx_ant;
1330 ant_cfg.rx_ant = rx_ant;
1331
fa0ecbb9
BZ
1332 return mwifiex_send_cmd(priv, HostCmd_CMD_RF_ANTENNA,
1333 HostCmd_ACT_GEN_SET, 0, &ant_cfg, true);
8a279d5b
AK
1334}
1335
12190c5d
AP
1336/* cfg80211 operation handler for stop ap.
1337 * Function stops BSS running at uAP interface.
1338 */
1339static int mwifiex_cfg80211_stop_ap(struct wiphy *wiphy, struct net_device *dev)
1340{
1341 struct mwifiex_private *priv = mwifiex_netdev_get_priv(dev);
1342
40bbc21a
AP
1343 if (mwifiex_del_mgmt_ies(priv))
1344 wiphy_err(wiphy, "Failed to delete mgmt IEs!\n");
1345
c8258913
AP
1346 priv->ap_11n_enabled = 0;
1347
fa0ecbb9
BZ
1348 if (mwifiex_send_cmd(priv, HostCmd_CMD_UAP_BSS_STOP,
1349 HostCmd_ACT_GEN_SET, 0, NULL, true)) {
12190c5d
AP
1350 wiphy_err(wiphy, "Failed to stop the BSS\n");
1351 return -1;
1352 }
1353
1354 return 0;
1355}
1356
1357/* cfg80211 operation handler for start_ap.
1358 * Function sets beacon period, DTIM period, SSID and security into
1359 * AP config structure.
1360 * AP is configured with these settings and BSS is started.
1361 */
1362static int mwifiex_cfg80211_start_ap(struct wiphy *wiphy,
1363 struct net_device *dev,
1364 struct cfg80211_ap_settings *params)
1365{
1366 struct mwifiex_uap_bss_param *bss_cfg;
1367 struct mwifiex_private *priv = mwifiex_netdev_get_priv(dev);
05910f4a 1368 u8 config_bands = 0;
12190c5d 1369
9197ab9e 1370 if (GET_BSS_ROLE(priv) != MWIFIEX_BSS_ROLE_UAP)
f752dcd5 1371 return -1;
adb6ed0c 1372 if (mwifiex_set_mgmt_ies(priv, &params->beacon))
f31acabe 1373 return -1;
f752dcd5 1374
12190c5d
AP
1375 bss_cfg = kzalloc(sizeof(struct mwifiex_uap_bss_param), GFP_KERNEL);
1376 if (!bss_cfg)
1377 return -ENOMEM;
1378
1379 mwifiex_set_sys_config_invalid_data(bss_cfg);
1380
1381 if (params->beacon_interval)
1382 bss_cfg->beacon_period = params->beacon_interval;
1383 if (params->dtim_period)
1384 bss_cfg->dtim_period = params->dtim_period;
1385
1386 if (params->ssid && params->ssid_len) {
1387 memcpy(bss_cfg->ssid.ssid, params->ssid, params->ssid_len);
1388 bss_cfg->ssid.ssid_len = params->ssid_len;
1389 }
1390
7a1c9934
AP
1391 switch (params->hidden_ssid) {
1392 case NL80211_HIDDEN_SSID_NOT_IN_USE:
1393 bss_cfg->bcast_ssid_ctl = 1;
1394 break;
1395 case NL80211_HIDDEN_SSID_ZERO_LEN:
1396 bss_cfg->bcast_ssid_ctl = 0;
1397 break;
1398 case NL80211_HIDDEN_SSID_ZERO_CONTENTS:
1399 /* firmware doesn't support this type of hidden SSID */
1400 default:
b3190466 1401 kfree(bss_cfg);
7a1c9934
AP
1402 return -EINVAL;
1403 }
1404
683b6d3b
JB
1405 bss_cfg->channel = ieee80211_frequency_to_channel(
1406 params->chandef.chan->center_freq);
0abd79e5 1407
05910f4a 1408 /* Set appropriate bands */
683b6d3b 1409 if (params->chandef.chan->band == IEEE80211_BAND_2GHZ) {
a3c2c4f6 1410 bss_cfg->band_cfg = BAND_CONFIG_BG;
a5f39056 1411 config_bands = BAND_B | BAND_G;
a3c2c4f6 1412
a5f39056
YAP
1413 if (params->chandef.width > NL80211_CHAN_WIDTH_20_NOHT)
1414 config_bands |= BAND_GN;
05910f4a 1415 } else {
a3c2c4f6 1416 bss_cfg->band_cfg = BAND_CONFIG_A;
a5f39056 1417 config_bands = BAND_A;
a3c2c4f6 1418
a5f39056
YAP
1419 if (params->chandef.width > NL80211_CHAN_WIDTH_20_NOHT)
1420 config_bands |= BAND_AN;
1421
1422 if (params->chandef.width > NL80211_CHAN_WIDTH_40)
1423 config_bands |= BAND_AAC;
0abd79e5
AP
1424 }
1425
05910f4a
AK
1426 if (!((config_bands | priv->adapter->fw_bands) &
1427 ~priv->adapter->fw_bands))
1428 priv->adapter->config_bands = config_bands;
1429
a3c2c4f6 1430 mwifiex_set_uap_rates(bss_cfg, params);
05910f4a
AK
1431 mwifiex_send_domain_info_cmd_fw(wiphy);
1432
f752dcd5
AP
1433 if (mwifiex_set_secure_params(priv, bss_cfg, params)) {
1434 kfree(bss_cfg);
1435 wiphy_err(wiphy, "Failed to parse secuirty parameters!\n");
1436 return -1;
1437 }
1438
22281256 1439 mwifiex_set_ht_params(priv, bss_cfg, params);
83c78da9
YAP
1440
1441 if (priv->adapter->is_hw_11ac_capable) {
1442 mwifiex_set_vht_params(priv, bss_cfg, params);
1443 mwifiex_set_vht_width(priv, params->chandef.width,
1444 priv->ap_11ac_enabled);
1445 }
1446
2b6254da
AP
1447 if (priv->ap_11ac_enabled)
1448 mwifiex_set_11ac_ba_params(priv);
1449 else
1450 mwifiex_set_ba_params(priv);
1451
54428c57 1452 mwifiex_set_wmm_params(priv, bss_cfg, params);
22281256 1453
8b4509f6
KG
1454 if (params->inactivity_timeout > 0) {
1455 /* sta_ao_timer/ps_sta_ao_timer is in unit of 100ms */
1456 bss_cfg->sta_ao_timer = 10 * params->inactivity_timeout;
1457 bss_cfg->ps_sta_ao_timer = 10 * params->inactivity_timeout;
1458 }
1459
fa0ecbb9
BZ
1460 if (mwifiex_send_cmd(priv, HostCmd_CMD_UAP_BSS_STOP,
1461 HostCmd_ACT_GEN_SET, 0, NULL, true)) {
12190c5d
AP
1462 wiphy_err(wiphy, "Failed to stop the BSS\n");
1463 kfree(bss_cfg);
1464 return -1;
1465 }
1466
fa0ecbb9
BZ
1467 if (mwifiex_send_cmd(priv, HostCmd_CMD_UAP_SYS_CONFIG,
1468 HostCmd_ACT_GEN_SET,
1469 UAP_BSS_PARAMS_I, bss_cfg, false)) {
12190c5d
AP
1470 wiphy_err(wiphy, "Failed to set the SSID\n");
1471 kfree(bss_cfg);
1472 return -1;
1473 }
1474
1475 kfree(bss_cfg);
1476
fa0ecbb9
BZ
1477 if (mwifiex_send_cmd(priv, HostCmd_CMD_UAP_BSS_START,
1478 HostCmd_ACT_GEN_SET, 0, NULL, false)) {
12190c5d
AP
1479 wiphy_err(wiphy, "Failed to start the BSS\n");
1480 return -1;
1481 }
1482
96893538
AP
1483 if (priv->sec_info.wep_enabled)
1484 priv->curr_pkt_filter |= HostCmd_ACT_MAC_WEP_ENABLE;
1485 else
1486 priv->curr_pkt_filter &= ~HostCmd_ACT_MAC_WEP_ENABLE;
1487
fa0ecbb9
BZ
1488 if (mwifiex_send_cmd(priv, HostCmd_CMD_MAC_CONTROL,
1489 HostCmd_ACT_GEN_SET, 0,
1490 &priv->curr_pkt_filter, true))
96893538
AP
1491 return -1;
1492
12190c5d
AP
1493 return 0;
1494}
1495
5e6e3a92
BZ
1496/*
1497 * CFG802.11 operation handler for disconnection request.
1498 *
1499 * This function does not work when there is already a disconnection
1500 * procedure going on.
1501 */
1502static int
1503mwifiex_cfg80211_disconnect(struct wiphy *wiphy, struct net_device *dev,
1504 u16 reason_code)
1505{
1506 struct mwifiex_private *priv = mwifiex_netdev_get_priv(dev);
1507
600f5d90 1508 if (mwifiex_deauthenticate(priv, NULL))
5e6e3a92
BZ
1509 return -EFAULT;
1510
1511 wiphy_dbg(wiphy, "info: successfully disconnected from %pM:"
1512 " reason code %d\n", priv->cfg_bssid, reason_code);
1513
38c9d664 1514 memset(priv->cfg_bssid, 0, ETH_ALEN);
587b36d3 1515 priv->hs2_enabled = false;
5e6e3a92
BZ
1516
1517 return 0;
1518}
1519
1520/*
1521 * This function informs the CFG802.11 subsystem of a new IBSS.
1522 *
1523 * The following information are sent to the CFG802.11 subsystem
1524 * to register the new IBSS. If we do not register the new IBSS,
1525 * a kernel panic will result.
1526 * - SSID
1527 * - SSID length
1528 * - BSSID
1529 * - Channel
1530 */
1531static int mwifiex_cfg80211_inform_ibss_bss(struct mwifiex_private *priv)
1532{
5e6e3a92
BZ
1533 struct ieee80211_channel *chan;
1534 struct mwifiex_bss_info bss_info;
aa95a48d 1535 struct cfg80211_bss *bss;
270e58e8 1536 int ie_len;
5e6e3a92 1537 u8 ie_buf[IEEE80211_MAX_SSID_LEN + sizeof(struct ieee_types_header)];
4ed5d521 1538 enum ieee80211_band band;
5e6e3a92 1539
636c4598
YAP
1540 if (mwifiex_get_bss_info(priv, &bss_info))
1541 return -1;
5e6e3a92
BZ
1542
1543 ie_buf[0] = WLAN_EID_SSID;
1544 ie_buf[1] = bss_info.ssid.ssid_len;
1545
1546 memcpy(&ie_buf[sizeof(struct ieee_types_header)],
aea0701e 1547 &bss_info.ssid.ssid, bss_info.ssid.ssid_len);
5e6e3a92
BZ
1548 ie_len = ie_buf[1] + sizeof(struct ieee_types_header);
1549
4ed5d521 1550 band = mwifiex_band_to_radio_type(priv->curr_bss_params.band);
5e6e3a92
BZ
1551 chan = __ieee80211_get_channel(priv->wdev->wiphy,
1552 ieee80211_channel_to_frequency(bss_info.bss_chan,
4ed5d521 1553 band));
5e6e3a92 1554
aa95a48d 1555 bss = cfg80211_inform_bss(priv->wdev->wiphy, chan,
aea0701e
YAP
1556 bss_info.bssid, 0, WLAN_CAPABILITY_IBSS,
1557 0, ie_buf, ie_len, 0, GFP_KERNEL);
5b112d3d 1558 cfg80211_put_bss(priv->wdev->wiphy, bss);
5e6e3a92
BZ
1559 memcpy(priv->cfg_bssid, bss_info.bssid, ETH_ALEN);
1560
636c4598 1561 return 0;
5e6e3a92
BZ
1562}
1563
5e6e3a92
BZ
1564/*
1565 * This function connects with a BSS.
1566 *
1567 * This function handles both Infra and Ad-Hoc modes. It also performs
1568 * validity checking on the provided parameters, disconnects from the
1569 * current BSS (if any), sets up the association/scan parameters,
1570 * including security settings, and performs specific SSID scan before
1571 * trying to connect.
1572 *
1573 * For Infra mode, the function returns failure if the specified SSID
1574 * is not found in scan table. However, for Ad-Hoc mode, it can create
1575 * the IBSS if it does not exist. On successful completion in either case,
7c6fa2a8 1576 * the function notifies the CFG802.11 subsystem of the new BSS connection.
5e6e3a92
BZ
1577 */
1578static int
664834de
JM
1579mwifiex_cfg80211_assoc(struct mwifiex_private *priv, size_t ssid_len,
1580 const u8 *ssid, const u8 *bssid, int mode,
1581 struct ieee80211_channel *channel,
5e6e3a92
BZ
1582 struct cfg80211_connect_params *sme, bool privacy)
1583{
b9be5f39 1584 struct cfg80211_ssid req_ssid;
270e58e8 1585 int ret, auth_type = 0;
7c6fa2a8 1586 struct cfg80211_bss *bss = NULL;
d7b9c520 1587 u8 is_scanning_required = 0;
5e6e3a92 1588
b9be5f39 1589 memset(&req_ssid, 0, sizeof(struct cfg80211_ssid));
5e6e3a92
BZ
1590
1591 req_ssid.ssid_len = ssid_len;
1592 if (ssid_len > IEEE80211_MAX_SSID_LEN) {
1593 dev_err(priv->adapter->dev, "invalid SSID - aborting\n");
1594 return -EINVAL;
1595 }
1596
1597 memcpy(req_ssid.ssid, ssid, ssid_len);
1598 if (!req_ssid.ssid_len || req_ssid.ssid[0] < 0x20) {
1599 dev_err(priv->adapter->dev, "invalid SSID - aborting\n");
1600 return -EINVAL;
1601 }
1602
1603 /* disconnect before try to associate */
600f5d90 1604 mwifiex_deauthenticate(priv, NULL);
5e6e3a92 1605
6670f15b
AK
1606 /* As this is new association, clear locally stored
1607 * keys and security related flags */
1608 priv->sec_info.wpa_enabled = false;
1609 priv->sec_info.wpa2_enabled = false;
1610 priv->wep_key_curr_index = 0;
00f157b4 1611 priv->sec_info.encryption_mode = 0;
a0f6d6ca 1612 priv->sec_info.is_authtype_auto = 0;
53b11231 1613 ret = mwifiex_set_encode(priv, NULL, NULL, 0, 0, NULL, 1);
5e6e3a92 1614
eecd8250 1615 if (mode == NL80211_IFTYPE_ADHOC) {
5e6e3a92
BZ
1616 /* "privacy" is set only for ad-hoc mode */
1617 if (privacy) {
1618 /*
2be50b8d 1619 * Keep WLAN_CIPHER_SUITE_WEP104 for now so that
5e6e3a92
BZ
1620 * the firmware can find a matching network from the
1621 * scan. The cfg80211 does not give us the encryption
1622 * mode at this stage so just setting it to WEP here.
1623 */
203afeca 1624 priv->sec_info.encryption_mode =
2be50b8d 1625 WLAN_CIPHER_SUITE_WEP104;
203afeca 1626 priv->sec_info.authentication_mode =
f986b6d5 1627 NL80211_AUTHTYPE_OPEN_SYSTEM;
5e6e3a92
BZ
1628 }
1629
1630 goto done;
1631 }
1632
1633 /* Now handle infra mode. "sme" is valid for infra mode only */
a0f6d6ca 1634 if (sme->auth_type == NL80211_AUTHTYPE_AUTOMATIC) {
f986b6d5 1635 auth_type = NL80211_AUTHTYPE_OPEN_SYSTEM;
a0f6d6ca
AK
1636 priv->sec_info.is_authtype_auto = 1;
1637 } else {
1638 auth_type = sme->auth_type;
1639 }
5e6e3a92
BZ
1640
1641 if (sme->crypto.n_ciphers_pairwise) {
2be50b8d
YAP
1642 priv->sec_info.encryption_mode =
1643 sme->crypto.ciphers_pairwise[0];
203afeca 1644 priv->sec_info.authentication_mode = auth_type;
5e6e3a92
BZ
1645 }
1646
1647 if (sme->crypto.cipher_group) {
2be50b8d 1648 priv->sec_info.encryption_mode = sme->crypto.cipher_group;
203afeca 1649 priv->sec_info.authentication_mode = auth_type;
5e6e3a92
BZ
1650 }
1651 if (sme->ie)
1652 ret = mwifiex_set_gen_ie(priv, sme->ie, sme->ie_len);
1653
1654 if (sme->key) {
e6faada5 1655 if (mwifiex_is_alg_wep(priv->sec_info.encryption_mode)) {
5e6e3a92
BZ
1656 dev_dbg(priv->adapter->dev,
1657 "info: setting wep encryption"
1658 " with key len %d\n", sme->key_len);
6670f15b 1659 priv->wep_key_curr_index = sme->key_idx;
53b11231
YL
1660 ret = mwifiex_set_encode(priv, NULL, sme->key,
1661 sme->key_len, sme->key_idx,
1662 NULL, 0);
5e6e3a92
BZ
1663 }
1664 }
1665done:
7c6fa2a8
AK
1666 /*
1667 * Scan entries are valid for some time (15 sec). So we can save one
1668 * active scan time if we just try cfg80211_get_bss first. If it fails
1669 * then request scan and cfg80211_get_bss() again for final output.
1670 */
1671 while (1) {
1672 if (is_scanning_required) {
1673 /* Do specific SSID scanning */
1674 if (mwifiex_request_scan(priv, &req_ssid)) {
1675 dev_err(priv->adapter->dev, "scan error\n");
1676 return -EFAULT;
1677 }
1678 }
5e6e3a92 1679
7c6fa2a8
AK
1680 /* Find the BSS we want using available scan results */
1681 if (mode == NL80211_IFTYPE_ADHOC)
1682 bss = cfg80211_get_bss(priv->wdev->wiphy, channel,
1683 bssid, ssid, ssid_len,
1684 WLAN_CAPABILITY_IBSS,
1685 WLAN_CAPABILITY_IBSS);
1686 else
1687 bss = cfg80211_get_bss(priv->wdev->wiphy, channel,
1688 bssid, ssid, ssid_len,
1689 WLAN_CAPABILITY_ESS,
1690 WLAN_CAPABILITY_ESS);
1691
1692 if (!bss) {
1693 if (is_scanning_required) {
aea0701e
YAP
1694 dev_warn(priv->adapter->dev,
1695 "assoc: requested bss not found in scan results\n");
7c6fa2a8
AK
1696 break;
1697 }
1698 is_scanning_required = 1;
1699 } else {
aea0701e
YAP
1700 dev_dbg(priv->adapter->dev,
1701 "info: trying to associate to '%s' bssid %pM\n",
1702 (char *) req_ssid.ssid, bss->bssid);
7c6fa2a8
AK
1703 memcpy(&priv->cfg_bssid, bss->bssid, ETH_ALEN);
1704 break;
1705 }
5e6e3a92
BZ
1706 }
1707
06975884
AK
1708 ret = mwifiex_bss_start(priv, bss, &req_ssid);
1709 if (ret)
1710 return ret;
5e6e3a92 1711
eecd8250 1712 if (mode == NL80211_IFTYPE_ADHOC) {
5e6e3a92
BZ
1713 /* Inform the BSS information to kernel, otherwise
1714 * kernel will give a panic after successful assoc */
1715 if (mwifiex_cfg80211_inform_ibss_bss(priv))
1716 return -EFAULT;
1717 }
1718
1719 return ret;
1720}
1721
1722/*
1723 * CFG802.11 operation handler for association request.
1724 *
1725 * This function does not work when the current mode is set to Ad-Hoc, or
1726 * when there is already an association procedure going on. The given BSS
1727 * information is used to associate.
1728 */
1729static int
1730mwifiex_cfg80211_connect(struct wiphy *wiphy, struct net_device *dev,
1731 struct cfg80211_connect_params *sme)
1732{
1733 struct mwifiex_private *priv = mwifiex_netdev_get_priv(dev);
8bc77a4d 1734 int ret;
5e6e3a92 1735
953b3539 1736 if (GET_BSS_ROLE(priv) != MWIFIEX_BSS_ROLE_STA) {
8bc77a4d 1737 wiphy_err(wiphy,
953b3539 1738 "%s: reject infra assoc request in non-STA role\n",
8bc77a4d
BZ
1739 dev->name);
1740 return -EINVAL;
e568634a
AP
1741 }
1742
5e6e3a92 1743 wiphy_dbg(wiphy, "info: Trying to associate to %s and bssid %pM\n",
aea0701e 1744 (char *) sme->ssid, sme->bssid);
5e6e3a92
BZ
1745
1746 ret = mwifiex_cfg80211_assoc(priv, sme->ssid_len, sme->ssid, sme->bssid,
eecd8250 1747 priv->bss_mode, sme->channel, sme, 0);
38c9d664
AK
1748 if (!ret) {
1749 cfg80211_connect_result(priv->netdev, priv->cfg_bssid, NULL, 0,
1750 NULL, 0, WLAN_STATUS_SUCCESS,
1751 GFP_KERNEL);
1752 dev_dbg(priv->adapter->dev,
1753 "info: associated to bssid %pM successfully\n",
1754 priv->cfg_bssid);
1755 } else {
1756 dev_dbg(priv->adapter->dev,
1757 "info: association to bssid %pM failed\n",
1758 priv->cfg_bssid);
1759 memset(priv->cfg_bssid, 0, ETH_ALEN);
06975884
AK
1760
1761 if (ret > 0)
1762 cfg80211_connect_result(priv->netdev, priv->cfg_bssid,
1763 NULL, 0, NULL, 0, ret,
1764 GFP_KERNEL);
1765 else
1766 cfg80211_connect_result(priv->netdev, priv->cfg_bssid,
1767 NULL, 0, NULL, 0,
1768 WLAN_STATUS_UNSPECIFIED_FAILURE,
1769 GFP_KERNEL);
38c9d664
AK
1770 }
1771
06975884 1772 return 0;
5e6e3a92
BZ
1773}
1774
05910f4a
AK
1775/*
1776 * This function sets following parameters for ibss network.
1777 * - channel
1778 * - start band
1779 * - 11n flag
1780 * - secondary channel offset
1781 */
1782static int mwifiex_set_ibss_params(struct mwifiex_private *priv,
1783 struct cfg80211_ibss_params *params)
1784{
1785 struct wiphy *wiphy = priv->wdev->wiphy;
1786 struct mwifiex_adapter *adapter = priv->adapter;
1787 int index = 0, i;
1788 u8 config_bands = 0;
1789
683b6d3b 1790 if (params->chandef.chan->band == IEEE80211_BAND_2GHZ) {
05910f4a
AK
1791 if (!params->basic_rates) {
1792 config_bands = BAND_B | BAND_G;
1793 } else {
1794 for (i = 0; i < mwifiex_band_2ghz.n_bitrates; i++) {
1795 /*
1796 * Rates below 6 Mbps in the table are CCK
1797 * rates; 802.11b and from 6 they are OFDM;
1798 * 802.11G
1799 */
1800 if (mwifiex_rates[i].bitrate == 60) {
1801 index = 1 << i;
1802 break;
1803 }
1804 }
1805
1806 if (params->basic_rates < index) {
1807 config_bands = BAND_B;
1808 } else {
1809 config_bands = BAND_G;
1810 if (params->basic_rates % index)
1811 config_bands |= BAND_B;
1812 }
1813 }
1814
683b6d3b
JB
1815 if (cfg80211_get_chandef_type(&params->chandef) !=
1816 NL80211_CHAN_NO_HT)
3b86acb8 1817 config_bands |= BAND_G | BAND_GN;
05910f4a 1818 } else {
c3ff0b2d 1819 if (cfg80211_get_chandef_type(&params->chandef) ==
683b6d3b 1820 NL80211_CHAN_NO_HT)
05910f4a
AK
1821 config_bands = BAND_A;
1822 else
1823 config_bands = BAND_AN | BAND_A;
1824 }
1825
1826 if (!((config_bands | adapter->fw_bands) & ~adapter->fw_bands)) {
1827 adapter->config_bands = config_bands;
1828 adapter->adhoc_start_band = config_bands;
1829
1830 if ((config_bands & BAND_GN) || (config_bands & BAND_AN))
1831 adapter->adhoc_11n_enabled = true;
1832 else
1833 adapter->adhoc_11n_enabled = false;
1834 }
1835
1836 adapter->sec_chan_offset =
683b6d3b
JB
1837 mwifiex_chan_type_to_sec_chan_offset(
1838 cfg80211_get_chandef_type(&params->chandef));
1839 priv->adhoc_channel = ieee80211_frequency_to_channel(
1840 params->chandef.chan->center_freq);
05910f4a
AK
1841
1842 wiphy_dbg(wiphy, "info: set ibss band %d, chan %d, chan offset %d\n",
1843 config_bands, priv->adhoc_channel, adapter->sec_chan_offset);
1844
1845 return 0;
1846}
1847
5e6e3a92
BZ
1848/*
1849 * CFG802.11 operation handler to join an IBSS.
1850 *
1851 * This function does not work in any mode other than Ad-Hoc, or if
1852 * a join operation is already in progress.
1853 */
1854static int
1855mwifiex_cfg80211_join_ibss(struct wiphy *wiphy, struct net_device *dev,
1856 struct cfg80211_ibss_params *params)
1857{
f540f9f3 1858 struct mwifiex_private *priv = mwifiex_netdev_get_priv(dev);
5e6e3a92 1859 int ret = 0;
5e6e3a92 1860
eecd8250 1861 if (priv->bss_mode != NL80211_IFTYPE_ADHOC) {
5e6e3a92
BZ
1862 wiphy_err(wiphy, "request to join ibss received "
1863 "when station is not in ibss mode\n");
1864 goto done;
1865 }
1866
5e6e3a92 1867 wiphy_dbg(wiphy, "info: trying to join to %s and bssid %pM\n",
aea0701e 1868 (char *) params->ssid, params->bssid);
5e6e3a92 1869
05910f4a
AK
1870 mwifiex_set_ibss_params(priv, params);
1871
5e6e3a92 1872 ret = mwifiex_cfg80211_assoc(priv, params->ssid_len, params->ssid,
aea0701e 1873 params->bssid, priv->bss_mode,
683b6d3b
JB
1874 params->chandef.chan, NULL,
1875 params->privacy);
5e6e3a92 1876done:
38c9d664 1877 if (!ret) {
fe94f3a4
AQ
1878 cfg80211_ibss_joined(priv->netdev, priv->cfg_bssid,
1879 params->chandef.chan, GFP_KERNEL);
38c9d664
AK
1880 dev_dbg(priv->adapter->dev,
1881 "info: joined/created adhoc network with bssid"
1882 " %pM successfully\n", priv->cfg_bssid);
1883 } else {
1884 dev_dbg(priv->adapter->dev,
1885 "info: failed creating/joining adhoc network\n");
1886 }
1887
5e6e3a92
BZ
1888 return ret;
1889}
1890
1891/*
1892 * CFG802.11 operation handler to leave an IBSS.
1893 *
1894 * This function does not work if a leave operation is
1895 * already in progress.
1896 */
1897static int
1898mwifiex_cfg80211_leave_ibss(struct wiphy *wiphy, struct net_device *dev)
1899{
f540f9f3 1900 struct mwifiex_private *priv = mwifiex_netdev_get_priv(dev);
5e6e3a92 1901
5e6e3a92 1902 wiphy_dbg(wiphy, "info: disconnecting from essid %pM\n",
aea0701e 1903 priv->cfg_bssid);
600f5d90 1904 if (mwifiex_deauthenticate(priv, NULL))
5e6e3a92
BZ
1905 return -EFAULT;
1906
38c9d664 1907 memset(priv->cfg_bssid, 0, ETH_ALEN);
5e6e3a92
BZ
1908
1909 return 0;
1910}
1911
1912/*
1913 * CFG802.11 operation handler for scan request.
1914 *
1915 * This function issues a scan request to the firmware based upon
1916 * the user specified scan configuration. On successfull completion,
1917 * it also informs the results.
1918 */
1919static int
fd014284 1920mwifiex_cfg80211_scan(struct wiphy *wiphy,
5e6e3a92
BZ
1921 struct cfg80211_scan_request *request)
1922{
fd014284 1923 struct net_device *dev = request->wdev->netdev;
5e6e3a92 1924 struct mwifiex_private *priv = mwifiex_netdev_get_priv(dev);
c2476335 1925 int i, offset, ret;
38c9d664 1926 struct ieee80211_channel *chan;
ea021f56 1927 struct ieee_types_header *ie;
75ab753d 1928 struct mwifiex_user_scan_cfg *user_scan_cfg;
5e6e3a92
BZ
1929
1930 wiphy_dbg(wiphy, "info: received scan request on %s\n", dev->name);
1931
e45a8419
AK
1932 if ((request->flags & NL80211_SCAN_FLAG_LOW_PRIORITY) &&
1933 atomic_read(&priv->wmm.tx_pkts_queued) >=
de09364e
AK
1934 MWIFIEX_MIN_TX_PENDING_TO_CANCEL_SCAN) {
1935 dev_dbg(priv->adapter->dev, "scan rejected due to traffic\n");
1936 return -EBUSY;
1937 }
1938
75ab753d
AK
1939 /* Block scan request if scan operation or scan cleanup when interface
1940 * is disabled is in process
1941 */
1942 if (priv->scan_request || priv->scan_aborting) {
f162cac8
AK
1943 dev_err(priv->adapter->dev, "cmd: Scan already in process..\n");
1944 return -EBUSY;
1945 }
1946
75ab753d
AK
1947 user_scan_cfg = kzalloc(sizeof(*user_scan_cfg), GFP_KERNEL);
1948 if (!user_scan_cfg)
38c9d664 1949 return -ENOMEM;
be0b281e 1950
6fcf2b10
BZ
1951 priv->scan_request = request;
1952
75ab753d
AK
1953 user_scan_cfg->num_ssids = request->n_ssids;
1954 user_scan_cfg->ssid_list = request->ssids;
be0b281e 1955
13d7ba78 1956 if (request->ie && request->ie_len) {
ea021f56 1957 offset = 0;
13d7ba78
AP
1958 for (i = 0; i < MWIFIEX_MAX_VSIE_NUM; i++) {
1959 if (priv->vs_ie[i].mask != MWIFIEX_VSIE_MASK_CLEAR)
1960 continue;
1961 priv->vs_ie[i].mask = MWIFIEX_VSIE_MASK_SCAN;
ea021f56
SP
1962 ie = (struct ieee_types_header *)(request->ie + offset);
1963 memcpy(&priv->vs_ie[i].ie, ie, sizeof(*ie) + ie->len);
1964 offset += sizeof(*ie) + ie->len;
1965
1966 if (offset >= request->ie_len)
1967 break;
13d7ba78
AP
1968 }
1969 }
1970
901ceba4
SP
1971 for (i = 0; i < min_t(u32, request->n_channels,
1972 MWIFIEX_USER_SCAN_CHAN_MAX); i++) {
38c9d664 1973 chan = request->channels[i];
75ab753d
AK
1974 user_scan_cfg->chan_list[i].chan_number = chan->hw_value;
1975 user_scan_cfg->chan_list[i].radio_type = chan->band;
38c9d664 1976
8fe02e16 1977 if (chan->flags & IEEE80211_CHAN_NO_IR)
75ab753d 1978 user_scan_cfg->chan_list[i].scan_type =
aea0701e 1979 MWIFIEX_SCAN_TYPE_PASSIVE;
38c9d664 1980 else
75ab753d 1981 user_scan_cfg->chan_list[i].scan_type =
aea0701e 1982 MWIFIEX_SCAN_TYPE_ACTIVE;
38c9d664 1983
75ab753d 1984 user_scan_cfg->chan_list[i].scan_time = 0;
38c9d664 1985 }
c2476335 1986
75ab753d
AK
1987 ret = mwifiex_scan_networks(priv, user_scan_cfg);
1988 kfree(user_scan_cfg);
c2476335
BZ
1989 if (ret) {
1990 dev_err(priv->adapter->dev, "scan failed: %d\n", ret);
75ab753d 1991 priv->scan_aborting = false;
6fcf2b10 1992 priv->scan_request = NULL;
c2476335
BZ
1993 return ret;
1994 }
38c9d664 1995
13d7ba78
AP
1996 if (request->ie && request->ie_len) {
1997 for (i = 0; i < MWIFIEX_MAX_VSIE_NUM; i++) {
1998 if (priv->vs_ie[i].mask == MWIFIEX_VSIE_MASK_SCAN) {
1999 priv->vs_ie[i].mask = MWIFIEX_VSIE_MASK_CLEAR;
2000 memset(&priv->vs_ie[i].ie, 0,
2001 MWIFIEX_MAX_VSIE_LEN);
2002 }
2003 }
2004 }
5e6e3a92
BZ
2005 return 0;
2006}
2007
a5f39056
YAP
2008static void mwifiex_setup_vht_caps(struct ieee80211_sta_vht_cap *vht_info,
2009 struct mwifiex_private *priv)
2010{
2011 struct mwifiex_adapter *adapter = priv->adapter;
a5f39056
YAP
2012
2013 vht_info->vht_supported = true;
2014
43283feb 2015 vht_info->cap = adapter->hw_dot_11ac_dev_cap;
a5f39056
YAP
2016 /* Update MCS support for VHT */
2017 vht_info->vht_mcs.rx_mcs_map = cpu_to_le16(
2018 adapter->hw_dot_11ac_mcs_support & 0xFFFF);
2019 vht_info->vht_mcs.rx_highest = 0;
2020 vht_info->vht_mcs.tx_mcs_map = cpu_to_le16(
2021 adapter->hw_dot_11ac_mcs_support >> 16);
2022 vht_info->vht_mcs.tx_highest = 0;
2023}
2024
5e6e3a92
BZ
2025/*
2026 * This function sets up the CFG802.11 specific HT capability fields
2027 * with default values.
2028 *
2029 * The following default values are set -
2030 * - HT Supported = True
a46b7b5c
AK
2031 * - Maximum AMPDU length factor = IEEE80211_HT_MAX_AMPDU_64K
2032 * - Minimum AMPDU spacing = IEEE80211_HT_MPDU_DENSITY_NONE
2033 * - HT Capabilities supported by firmware
5e6e3a92
BZ
2034 * - MCS information, Rx mask = 0xff
2035 * - MCD information, Tx parameters = IEEE80211_HT_MCS_TX_DEFINED (0x01)
2036 */
2037static void
2038mwifiex_setup_ht_caps(struct ieee80211_sta_ht_cap *ht_info,
2039 struct mwifiex_private *priv)
2040{
2041 int rx_mcs_supp;
2042 struct ieee80211_mcs_info mcs_set;
2043 u8 *mcs = (u8 *)&mcs_set;
2044 struct mwifiex_adapter *adapter = priv->adapter;
2045
2046 ht_info->ht_supported = true;
a46b7b5c
AK
2047 ht_info->ampdu_factor = IEEE80211_HT_MAX_AMPDU_64K;
2048 ht_info->ampdu_density = IEEE80211_HT_MPDU_DENSITY_NONE;
5e6e3a92
BZ
2049
2050 memset(&ht_info->mcs, 0, sizeof(ht_info->mcs));
5e6e3a92 2051
a46b7b5c
AK
2052 /* Fill HT capability information */
2053 if (ISSUPP_CHANWIDTH40(adapter->hw_dot_11n_dev_cap))
2054 ht_info->cap |= IEEE80211_HT_CAP_SUP_WIDTH_20_40;
2055 else
2056 ht_info->cap &= ~IEEE80211_HT_CAP_SUP_WIDTH_20_40;
2057
2058 if (ISSUPP_SHORTGI20(adapter->hw_dot_11n_dev_cap))
2059 ht_info->cap |= IEEE80211_HT_CAP_SGI_20;
2060 else
2061 ht_info->cap &= ~IEEE80211_HT_CAP_SGI_20;
2062
2063 if (ISSUPP_SHORTGI40(adapter->hw_dot_11n_dev_cap))
2064 ht_info->cap |= IEEE80211_HT_CAP_SGI_40;
2065 else
2066 ht_info->cap &= ~IEEE80211_HT_CAP_SGI_40;
2067
2068 if (ISSUPP_RXSTBC(adapter->hw_dot_11n_dev_cap))
2069 ht_info->cap |= 1 << IEEE80211_HT_CAP_RX_STBC_SHIFT;
2070 else
2071 ht_info->cap &= ~(3 << IEEE80211_HT_CAP_RX_STBC_SHIFT);
2072
2073 if (ISSUPP_TXSTBC(adapter->hw_dot_11n_dev_cap))
2074 ht_info->cap |= IEEE80211_HT_CAP_TX_STBC;
2075 else
2076 ht_info->cap &= ~IEEE80211_HT_CAP_TX_STBC;
2077
dd0d83c2
AP
2078 if (ISSUPP_GREENFIELD(adapter->hw_dot_11n_dev_cap))
2079 ht_info->cap |= IEEE80211_HT_CAP_GRN_FLD;
2080 else
2081 ht_info->cap &= ~IEEE80211_HT_CAP_GRN_FLD;
2082
2083 if (ISENABLED_40MHZ_INTOLERANT(adapter->hw_dot_11n_dev_cap))
2084 ht_info->cap |= IEEE80211_HT_CAP_40MHZ_INTOLERANT;
2085 else
2086 ht_info->cap &= ~IEEE80211_HT_CAP_40MHZ_INTOLERANT;
2087
2088 if (ISSUPP_RXLDPC(adapter->hw_dot_11n_dev_cap))
2089 ht_info->cap |= IEEE80211_HT_CAP_LDPC_CODING;
2090 else
2091 ht_info->cap &= ~IEEE80211_HT_CAP_LDPC_CODING;
2092
a46b7b5c
AK
2093 ht_info->cap &= ~IEEE80211_HT_CAP_MAX_AMSDU;
2094 ht_info->cap |= IEEE80211_HT_CAP_SM_PS;
2095
2096 rx_mcs_supp = GET_RXMCSSUPP(adapter->hw_dev_mcs_support);
5e6e3a92
BZ
2097 /* Set MCS for 1x1 */
2098 memset(mcs, 0xff, rx_mcs_supp);
2099 /* Clear all the other values */
2100 memset(&mcs[rx_mcs_supp], 0,
aea0701e 2101 sizeof(struct ieee80211_mcs_info) - rx_mcs_supp);
eecd8250 2102 if (priv->bss_mode == NL80211_IFTYPE_STATION ||
aea0701e 2103 ISSUPP_CHANWIDTH40(adapter->hw_dot_11n_dev_cap))
5e6e3a92
BZ
2104 /* Set MCS32 for infra mode or ad-hoc mode with 40MHz support */
2105 SETHT_MCS32(mcs_set.rx_mask);
2106
2107 memcpy((u8 *) &ht_info->mcs, mcs, sizeof(struct ieee80211_mcs_info));
2108
2109 ht_info->mcs.tx_params = IEEE80211_HT_MCS_TX_DEFINED;
2110}
2111
93a1df48
YAP
2112/*
2113 * create a new virtual interface with the given name
2114 */
84efbb84 2115struct wireless_dev *mwifiex_add_virtual_intf(struct wiphy *wiphy,
552bff0c 2116 const char *name,
84efbb84
JB
2117 enum nl80211_iftype type,
2118 u32 *flags,
2119 struct vif_params *params)
93a1df48 2120{
67fdf39e
AP
2121 struct mwifiex_adapter *adapter = mwifiex_cfg80211_get_adapter(wiphy);
2122 struct mwifiex_private *priv;
93a1df48
YAP
2123 struct net_device *dev;
2124 void *mdev_priv;
d6bffe8b 2125 struct wireless_dev *wdev;
93a1df48 2126
93a1df48 2127 if (!adapter)
858faa57 2128 return ERR_PTR(-EFAULT);
93a1df48
YAP
2129
2130 switch (type) {
2131 case NL80211_IFTYPE_UNSPECIFIED:
2132 case NL80211_IFTYPE_STATION:
2133 case NL80211_IFTYPE_ADHOC:
d6bffe8b 2134 priv = adapter->priv[MWIFIEX_BSS_TYPE_STA];
93a1df48 2135 if (priv->bss_mode) {
d6bffe8b
AP
2136 wiphy_err(wiphy,
2137 "cannot create multiple sta/adhoc ifaces\n");
858faa57 2138 return ERR_PTR(-EINVAL);
93a1df48
YAP
2139 }
2140
d6bffe8b
AP
2141 wdev = kzalloc(sizeof(struct wireless_dev), GFP_KERNEL);
2142 if (!wdev)
858faa57 2143 return ERR_PTR(-ENOMEM);
d6bffe8b
AP
2144
2145 wdev->wiphy = wiphy;
2146 priv->wdev = wdev;
2147 wdev->iftype = NL80211_IFTYPE_STATION;
2148
93a1df48
YAP
2149 if (type == NL80211_IFTYPE_UNSPECIFIED)
2150 priv->bss_mode = NL80211_IFTYPE_STATION;
2151 else
2152 priv->bss_mode = type;
2153
2154 priv->bss_type = MWIFIEX_BSS_TYPE_STA;
2155 priv->frame_type = MWIFIEX_DATA_FRAME_TYPE_ETH_II;
a458c0ae 2156 priv->bss_priority = 0;
93a1df48 2157 priv->bss_role = MWIFIEX_BSS_ROLE_STA;
93a1df48
YAP
2158 priv->bss_num = 0;
2159
d6bffe8b
AP
2160 break;
2161 case NL80211_IFTYPE_AP:
2162 priv = adapter->priv[MWIFIEX_BSS_TYPE_UAP];
2163
2164 if (priv->bss_mode) {
2165 wiphy_err(wiphy, "Can't create multiple AP interfaces");
858faa57 2166 return ERR_PTR(-EINVAL);
d6bffe8b
AP
2167 }
2168
2169 wdev = kzalloc(sizeof(struct wireless_dev), GFP_KERNEL);
2170 if (!wdev)
858faa57 2171 return ERR_PTR(-ENOMEM);
d6bffe8b
AP
2172
2173 priv->wdev = wdev;
2174 wdev->wiphy = wiphy;
2175 wdev->iftype = NL80211_IFTYPE_AP;
2176
2177 priv->bss_type = MWIFIEX_BSS_TYPE_UAP;
2178 priv->frame_type = MWIFIEX_DATA_FRAME_TYPE_ETH_II;
a458c0ae 2179 priv->bss_priority = 0;
d6bffe8b
AP
2180 priv->bss_role = MWIFIEX_BSS_ROLE_UAP;
2181 priv->bss_started = 0;
2182 priv->bss_num = 0;
2183 priv->bss_mode = type;
2184
197f4a2e
SP
2185 break;
2186 case NL80211_IFTYPE_P2P_CLIENT:
2187 priv = adapter->priv[MWIFIEX_BSS_TYPE_P2P];
2188
2189 if (priv->bss_mode) {
2190 wiphy_err(wiphy, "Can't create multiple P2P ifaces");
2191 return ERR_PTR(-EINVAL);
2192 }
2193
2194 wdev = kzalloc(sizeof(struct wireless_dev), GFP_KERNEL);
2195 if (!wdev)
2196 return ERR_PTR(-ENOMEM);
2197
2198 priv->wdev = wdev;
2199 wdev->wiphy = wiphy;
2200
2201 /* At start-up, wpa_supplicant tries to change the interface
2202 * to NL80211_IFTYPE_STATION if it is not managed mode.
197f4a2e 2203 */
5586d3e2
PS
2204 wdev->iftype = NL80211_IFTYPE_P2P_CLIENT;
2205 priv->bss_mode = NL80211_IFTYPE_P2P_CLIENT;
197f4a2e
SP
2206
2207 /* Setting bss_type to P2P tells firmware that this interface
2208 * is receiving P2P peers found during find phase and doing
2209 * action frame handshake.
2210 */
2211 priv->bss_type = MWIFIEX_BSS_TYPE_P2P;
2212
2213 priv->frame_type = MWIFIEX_DATA_FRAME_TYPE_ETH_II;
2214 priv->bss_priority = MWIFIEX_BSS_ROLE_STA;
2215 priv->bss_role = MWIFIEX_BSS_ROLE_STA;
2216 priv->bss_started = 0;
2217 priv->bss_num = 0;
2218
bec568ff
AK
2219 if (mwifiex_cfg80211_init_p2p_client(priv)) {
2220 wdev = ERR_PTR(-EFAULT);
2221 goto done;
2222 }
66aa1ae2 2223
93a1df48
YAP
2224 break;
2225 default:
2226 wiphy_err(wiphy, "type not supported\n");
858faa57 2227 return ERR_PTR(-EINVAL);
93a1df48
YAP
2228 }
2229
47411a06
AP
2230 dev = alloc_netdev_mqs(sizeof(struct mwifiex_private *), name,
2231 ether_setup, IEEE80211_NUM_ACS, 1);
93a1df48
YAP
2232 if (!dev) {
2233 wiphy_err(wiphy, "no memory available for netdevice\n");
858faa57 2234 priv->bss_mode = NL80211_IFTYPE_UNSPECIFIED;
bec568ff
AK
2235 wdev = ERR_PTR(-ENOMEM);
2236 goto done;
93a1df48
YAP
2237 }
2238
d6bffe8b
AP
2239 mwifiex_init_priv_params(priv, dev);
2240 priv->netdev = dev;
2241
2242 mwifiex_setup_ht_caps(&wiphy->bands[IEEE80211_BAND_2GHZ]->ht_cap, priv);
a5f39056
YAP
2243 if (adapter->is_hw_11ac_capable)
2244 mwifiex_setup_vht_caps(
2245 &wiphy->bands[IEEE80211_BAND_2GHZ]->vht_cap, priv);
d6bffe8b
AP
2246
2247 if (adapter->config_bands & BAND_A)
2248 mwifiex_setup_ht_caps(
2249 &wiphy->bands[IEEE80211_BAND_5GHZ]->ht_cap, priv);
2250
a5f39056
YAP
2251 if ((adapter->config_bands & BAND_A) && adapter->is_hw_11ac_capable)
2252 mwifiex_setup_vht_caps(
2253 &wiphy->bands[IEEE80211_BAND_5GHZ]->vht_cap, priv);
2254
93a1df48
YAP
2255 dev_net_set(dev, wiphy_net(wiphy));
2256 dev->ieee80211_ptr = priv->wdev;
2257 dev->ieee80211_ptr->iftype = priv->bss_mode;
2258 memcpy(dev->dev_addr, wiphy->perm_addr, ETH_ALEN);
93a1df48
YAP
2259 SET_NETDEV_DEV(dev, wiphy_dev(wiphy));
2260
2261 dev->flags |= IFF_BROADCAST | IFF_MULTICAST;
2262 dev->watchdog_timeo = MWIFIEX_DEFAULT_WATCHDOG_TIMEOUT;
2263 dev->hard_header_len += MWIFIEX_MIN_DATA_HEADER_LEN;
0d7f53e3 2264 dev->ethtool_ops = &mwifiex_ethtool_ops;
93a1df48
YAP
2265
2266 mdev_priv = netdev_priv(dev);
2267 *((unsigned long *) mdev_priv) = (unsigned long) priv;
2268
93a1df48
YAP
2269 SET_NETDEV_DEV(dev, adapter->dev);
2270
2271 /* Register network device */
2272 if (register_netdevice(dev)) {
2273 wiphy_err(wiphy, "cannot register virtual network device\n");
858faa57
BZ
2274 free_netdev(dev);
2275 priv->bss_mode = NL80211_IFTYPE_UNSPECIFIED;
bec568ff
AK
2276 priv->netdev = NULL;
2277 wdev = ERR_PTR(-EFAULT);
2278 goto done;
93a1df48
YAP
2279 }
2280
2281 sema_init(&priv->async_sem, 1);
93a1df48
YAP
2282
2283 dev_dbg(adapter->dev, "info: %s: Marvell 802.11 Adapter\n", dev->name);
2284
2285#ifdef CONFIG_DEBUG_FS
2286 mwifiex_dev_debugfs_init(priv);
2287#endif
bec568ff
AK
2288
2289done:
2290 if (IS_ERR(wdev)) {
2291 kfree(priv->wdev);
2292 priv->wdev = NULL;
2293 }
2294
84efbb84 2295 return wdev;
93a1df48
YAP
2296}
2297EXPORT_SYMBOL_GPL(mwifiex_add_virtual_intf);
2298
2299/*
2300 * del_virtual_intf: remove the virtual interface determined by dev
2301 */
84efbb84 2302int mwifiex_del_virtual_intf(struct wiphy *wiphy, struct wireless_dev *wdev)
93a1df48 2303{
84efbb84 2304 struct mwifiex_private *priv = mwifiex_netdev_get_priv(wdev->netdev);
93a1df48
YAP
2305
2306#ifdef CONFIG_DEBUG_FS
2307 mwifiex_dev_debugfs_remove(priv);
2308#endif
2309
47411a06 2310 mwifiex_stop_net_dev_queue(priv->netdev, priv->adapter);
93a1df48
YAP
2311
2312 if (netif_carrier_ok(priv->netdev))
2313 netif_carrier_off(priv->netdev);
2314
84efbb84
JB
2315 if (wdev->netdev->reg_state == NETREG_REGISTERED)
2316 unregister_netdevice(wdev->netdev);
93a1df48 2317
93a1df48 2318 /* Clear the priv in adapter */
98a4635b 2319 priv->netdev->ieee80211_ptr = NULL;
93a1df48 2320 priv->netdev = NULL;
98a4635b
AK
2321 kfree(wdev);
2322 priv->wdev = NULL;
93a1df48
YAP
2323
2324 priv->media_connected = false;
2325
93a1df48
YAP
2326 priv->bss_mode = NL80211_IFTYPE_UNSPECIFIED;
2327
2328 return 0;
2329}
2330EXPORT_SYMBOL_GPL(mwifiex_del_virtual_intf);
2331
7da060c1 2332static bool
0434c464
AK
2333mwifiex_is_pattern_supported(struct cfg80211_pkt_pattern *pat, s8 *byte_seq,
2334 u8 max_byte_seq)
7da060c1
AK
2335{
2336 int j, k, valid_byte_cnt = 0;
2337 bool dont_care_byte = false;
2338
2339 for (j = 0; j < DIV_ROUND_UP(pat->pattern_len, 8); j++) {
2340 for (k = 0; k < 8; k++) {
2341 if (pat->mask[j] & 1 << k) {
2342 memcpy(byte_seq + valid_byte_cnt,
2343 &pat->pattern[j * 8 + k], 1);
2344 valid_byte_cnt++;
2345 if (dont_care_byte)
2346 return false;
2347 } else {
2348 if (valid_byte_cnt)
2349 dont_care_byte = true;
2350 }
2351
0434c464 2352 if (valid_byte_cnt > max_byte_seq)
7da060c1
AK
2353 return false;
2354 }
2355 }
2356
0434c464 2357 byte_seq[max_byte_seq] = valid_byte_cnt;
7da060c1
AK
2358
2359 return true;
2360}
2361
d1e2586f 2362#ifdef CONFIG_PM
7da060c1
AK
2363static int mwifiex_cfg80211_suspend(struct wiphy *wiphy,
2364 struct cfg80211_wowlan *wowlan)
2365{
2366 struct mwifiex_adapter *adapter = mwifiex_cfg80211_get_adapter(wiphy);
2367 struct mwifiex_ds_mef_cfg mef_cfg;
2368 struct mwifiex_mef_entry *mef_entry;
2369 int i, filt_num = 0, ret;
2370 bool first_pat = true;
3f4e854a 2371 u8 byte_seq[MWIFIEX_MEF_MAX_BYTESEQ + 1];
7da060c1
AK
2372 const u8 ipv4_mc_mac[] = {0x33, 0x33};
2373 const u8 ipv6_mc_mac[] = {0x01, 0x00, 0x5e};
2374 struct mwifiex_private *priv =
2375 mwifiex_get_priv(adapter, MWIFIEX_BSS_ROLE_STA);
2376
2377 if (!wowlan) {
2378 dev_warn(adapter->dev, "None of the WOWLAN triggers enabled\n");
2379 return 0;
2380 }
2381
2382 if (!priv->media_connected) {
2383 dev_warn(adapter->dev,
2384 "Can not configure WOWLAN in disconnected state\n");
2385 return 0;
2386 }
2387
c678fb2a
BZ
2388 mef_entry = kzalloc(sizeof(*mef_entry), GFP_KERNEL);
2389 if (!mef_entry)
2390 return -ENOMEM;
2391
7da060c1
AK
2392 memset(&mef_cfg, 0, sizeof(mef_cfg));
2393 mef_cfg.num_entries = 1;
7da060c1
AK
2394 mef_cfg.mef_entry = mef_entry;
2395 mef_entry->mode = MEF_MODE_HOST_SLEEP;
2396 mef_entry->action = MEF_ACTION_ALLOW_AND_WAKEUP_HOST;
2397
2398 for (i = 0; i < wowlan->n_patterns; i++) {
2399 memset(byte_seq, 0, sizeof(byte_seq));
2400 if (!mwifiex_is_pattern_supported(&wowlan->patterns[i],
0434c464
AK
2401 byte_seq,
2402 MWIFIEX_MEF_MAX_BYTESEQ)) {
7da060c1
AK
2403 wiphy_err(wiphy, "Pattern not supported\n");
2404 kfree(mef_entry);
2405 return -EOPNOTSUPP;
2406 }
2407
2408 if (!wowlan->patterns[i].pkt_offset) {
2409 if (!(byte_seq[0] & 0x01) &&
3f4e854a 2410 (byte_seq[MWIFIEX_MEF_MAX_BYTESEQ] == 1)) {
7da060c1
AK
2411 mef_cfg.criteria |= MWIFIEX_CRITERIA_UNICAST;
2412 continue;
2413 } else if (is_broadcast_ether_addr(byte_seq)) {
2414 mef_cfg.criteria |= MWIFIEX_CRITERIA_BROADCAST;
2415 continue;
2416 } else if ((!memcmp(byte_seq, ipv4_mc_mac, 2) &&
3f4e854a 2417 (byte_seq[MWIFIEX_MEF_MAX_BYTESEQ] == 2)) ||
7da060c1 2418 (!memcmp(byte_seq, ipv6_mc_mac, 3) &&
3f4e854a 2419 (byte_seq[MWIFIEX_MEF_MAX_BYTESEQ] == 3))) {
7da060c1
AK
2420 mef_cfg.criteria |= MWIFIEX_CRITERIA_MULTICAST;
2421 continue;
2422 }
2423 }
2424
2425 mef_entry->filter[filt_num].repeat = 1;
2426 mef_entry->filter[filt_num].offset =
2427 wowlan->patterns[i].pkt_offset;
2428 memcpy(mef_entry->filter[filt_num].byte_seq, byte_seq,
2429 sizeof(byte_seq));
2430 mef_entry->filter[filt_num].filt_type = TYPE_EQ;
2431
2432 if (first_pat)
2433 first_pat = false;
2434 else
2435 mef_entry->filter[filt_num].filt_action = TYPE_AND;
2436
2437 filt_num++;
2438 }
2439
2440 if (wowlan->magic_pkt) {
2441 mef_cfg.criteria |= MWIFIEX_CRITERIA_UNICAST;
2442 mef_entry->filter[filt_num].repeat = 16;
2443 memcpy(mef_entry->filter[filt_num].byte_seq, priv->curr_addr,
2444 ETH_ALEN);
3f4e854a
AK
2445 mef_entry->filter[filt_num].byte_seq[MWIFIEX_MEF_MAX_BYTESEQ] =
2446 ETH_ALEN;
09e65f5b 2447 mef_entry->filter[filt_num].offset = 28;
7da060c1
AK
2448 mef_entry->filter[filt_num].filt_type = TYPE_EQ;
2449 if (filt_num)
2450 mef_entry->filter[filt_num].filt_action = TYPE_OR;
2451 }
2452
2453 if (!mef_cfg.criteria)
2454 mef_cfg.criteria = MWIFIEX_CRITERIA_BROADCAST |
2455 MWIFIEX_CRITERIA_UNICAST |
2456 MWIFIEX_CRITERIA_MULTICAST;
2457
fa0ecbb9
BZ
2458 ret = mwifiex_send_cmd(priv, HostCmd_CMD_MEF_CFG,
2459 HostCmd_ACT_GEN_SET, 0, &mef_cfg, true);
7da060c1
AK
2460
2461 kfree(mef_entry);
2462 return ret;
2463}
2464
2465static int mwifiex_cfg80211_resume(struct wiphy *wiphy)
2466{
2467 return 0;
2468}
2469
2470static void mwifiex_cfg80211_set_wakeup(struct wiphy *wiphy,
2471 bool enabled)
2472{
2473 struct mwifiex_adapter *adapter = mwifiex_cfg80211_get_adapter(wiphy);
2474
2475 device_set_wakeup_enable(adapter->dev, enabled);
2476}
2477#endif
2478
562fc5b3
AK
2479static int mwifiex_get_coalesce_pkt_type(u8 *byte_seq)
2480{
2481 const u8 ipv4_mc_mac[] = {0x33, 0x33};
2482 const u8 ipv6_mc_mac[] = {0x01, 0x00, 0x5e};
2483 const u8 bc_mac[] = {0xff, 0xff, 0xff, 0xff};
2484
2485 if ((byte_seq[0] & 0x01) &&
2486 (byte_seq[MWIFIEX_COALESCE_MAX_BYTESEQ] == 1))
2487 return PACKET_TYPE_UNICAST;
2488 else if (!memcmp(byte_seq, bc_mac, 4))
2489 return PACKET_TYPE_BROADCAST;
2490 else if ((!memcmp(byte_seq, ipv4_mc_mac, 2) &&
2491 byte_seq[MWIFIEX_COALESCE_MAX_BYTESEQ] == 2) ||
2492 (!memcmp(byte_seq, ipv6_mc_mac, 3) &&
2493 byte_seq[MWIFIEX_COALESCE_MAX_BYTESEQ] == 3))
2494 return PACKET_TYPE_MULTICAST;
2495
2496 return 0;
2497}
2498
2499static int
2500mwifiex_fill_coalesce_rule_info(struct mwifiex_private *priv,
2501 struct cfg80211_coalesce_rules *crule,
2502 struct mwifiex_coalesce_rule *mrule)
2503{
2504 u8 byte_seq[MWIFIEX_COALESCE_MAX_BYTESEQ + 1];
2505 struct filt_field_param *param;
2506 int i;
2507
2508 mrule->max_coalescing_delay = crule->delay;
2509
2510 param = mrule->params;
2511
2512 for (i = 0; i < crule->n_patterns; i++) {
2513 memset(byte_seq, 0, sizeof(byte_seq));
2514 if (!mwifiex_is_pattern_supported(&crule->patterns[i],
2515 byte_seq,
2516 MWIFIEX_COALESCE_MAX_BYTESEQ)) {
2517 dev_err(priv->adapter->dev, "Pattern not supported\n");
2518 return -EOPNOTSUPP;
2519 }
2520
2521 if (!crule->patterns[i].pkt_offset) {
2522 u8 pkt_type;
2523
2524 pkt_type = mwifiex_get_coalesce_pkt_type(byte_seq);
2525 if (pkt_type && mrule->pkt_type) {
2526 dev_err(priv->adapter->dev,
2527 "Multiple packet types not allowed\n");
2528 return -EOPNOTSUPP;
2529 } else if (pkt_type) {
2530 mrule->pkt_type = pkt_type;
2531 continue;
2532 }
2533 }
2534
2535 if (crule->condition == NL80211_COALESCE_CONDITION_MATCH)
2536 param->operation = RECV_FILTER_MATCH_TYPE_EQ;
2537 else
2538 param->operation = RECV_FILTER_MATCH_TYPE_NE;
2539
2540 param->operand_len = byte_seq[MWIFIEX_COALESCE_MAX_BYTESEQ];
2541 memcpy(param->operand_byte_stream, byte_seq,
2542 param->operand_len);
2543 param->offset = crule->patterns[i].pkt_offset;
2544 param++;
2545
2546 mrule->num_of_fields++;
2547 }
2548
2549 if (!mrule->pkt_type) {
2550 dev_err(priv->adapter->dev,
2551 "Packet type can not be determined\n");
2552 return -EOPNOTSUPP;
2553 }
2554
2555 return 0;
2556}
2557
2558static int mwifiex_cfg80211_set_coalesce(struct wiphy *wiphy,
2559 struct cfg80211_coalesce *coalesce)
2560{
2561 struct mwifiex_adapter *adapter = mwifiex_cfg80211_get_adapter(wiphy);
2562 int i, ret;
2563 struct mwifiex_ds_coalesce_cfg coalesce_cfg;
2564 struct mwifiex_private *priv =
2565 mwifiex_get_priv(adapter, MWIFIEX_BSS_ROLE_STA);
2566
2567 memset(&coalesce_cfg, 0, sizeof(coalesce_cfg));
2568 if (!coalesce) {
2569 dev_dbg(adapter->dev,
2570 "Disable coalesce and reset all previous rules\n");
fa0ecbb9
BZ
2571 return mwifiex_send_cmd(priv, HostCmd_CMD_COALESCE_CFG,
2572 HostCmd_ACT_GEN_SET, 0,
2573 &coalesce_cfg, true);
562fc5b3
AK
2574 }
2575
2576 coalesce_cfg.num_of_rules = coalesce->n_rules;
2577 for (i = 0; i < coalesce->n_rules; i++) {
2578 ret = mwifiex_fill_coalesce_rule_info(priv, &coalesce->rules[i],
2579 &coalesce_cfg.rule[i]);
2580 if (ret) {
2581 dev_err(priv->adapter->dev,
2582 "Recheck the patterns provided for rule %d\n",
2583 i + 1);
2584 return ret;
2585 }
2586 }
2587
fa0ecbb9
BZ
2588 return mwifiex_send_cmd(priv, HostCmd_CMD_COALESCE_CFG,
2589 HostCmd_ACT_GEN_SET, 0, &coalesce_cfg, true);
562fc5b3
AK
2590}
2591
b23bce29
AP
2592/* cfg80211 ops handler for tdls_mgmt.
2593 * Function prepares TDLS action frame packets and forwards them to FW
2594 */
2595static int
2596mwifiex_cfg80211_tdls_mgmt(struct wiphy *wiphy, struct net_device *dev,
2597 u8 *peer, u8 action_code, u8 dialog_token,
df942e7b
SDU
2598 u16 status_code, u32 peer_capability,
2599 const u8 *extra_ies, size_t extra_ies_len)
b23bce29
AP
2600{
2601 struct mwifiex_private *priv = mwifiex_netdev_get_priv(dev);
2602 int ret;
2603
2604 if (!(wiphy->flags & WIPHY_FLAG_SUPPORTS_TDLS))
2605 return -ENOTSUPP;
2606
2607 /* make sure we are in station mode and connected */
2608 if (!(priv->bss_type == MWIFIEX_BSS_TYPE_STA && priv->media_connected))
2609 return -ENOTSUPP;
2610
2611 switch (action_code) {
2612 case WLAN_TDLS_SETUP_REQUEST:
2613 dev_dbg(priv->adapter->dev,
2614 "Send TDLS Setup Request to %pM status_code=%d\n", peer,
2615 status_code);
2616 ret = mwifiex_send_tdls_data_frame(priv, peer, action_code,
2617 dialog_token, status_code,
2618 extra_ies, extra_ies_len);
2619 break;
2620 case WLAN_TDLS_SETUP_RESPONSE:
2621 dev_dbg(priv->adapter->dev,
2622 "Send TDLS Setup Response to %pM status_code=%d\n",
2623 peer, status_code);
2624 ret = mwifiex_send_tdls_data_frame(priv, peer, action_code,
2625 dialog_token, status_code,
2626 extra_ies, extra_ies_len);
2627 break;
2628 case WLAN_TDLS_SETUP_CONFIRM:
2629 dev_dbg(priv->adapter->dev,
2630 "Send TDLS Confirm to %pM status_code=%d\n", peer,
2631 status_code);
2632 ret = mwifiex_send_tdls_data_frame(priv, peer, action_code,
2633 dialog_token, status_code,
2634 extra_ies, extra_ies_len);
2635 break;
2636 case WLAN_TDLS_TEARDOWN:
2637 dev_dbg(priv->adapter->dev, "Send TDLS Tear down to %pM\n",
2638 peer);
2639 ret = mwifiex_send_tdls_data_frame(priv, peer, action_code,
2640 dialog_token, status_code,
2641 extra_ies, extra_ies_len);
2642 break;
2643 case WLAN_TDLS_DISCOVERY_REQUEST:
2644 dev_dbg(priv->adapter->dev,
2645 "Send TDLS Discovery Request to %pM\n", peer);
2646 ret = mwifiex_send_tdls_data_frame(priv, peer, action_code,
2647 dialog_token, status_code,
2648 extra_ies, extra_ies_len);
2649 break;
2650 case WLAN_PUB_ACTION_TDLS_DISCOVER_RES:
2651 dev_dbg(priv->adapter->dev,
2652 "Send TDLS Discovery Response to %pM\n", peer);
2653 ret = mwifiex_send_tdls_action_frame(priv, peer, action_code,
2654 dialog_token, status_code,
2655 extra_ies, extra_ies_len);
2656 break;
2657 default:
2658 dev_warn(priv->adapter->dev,
2659 "Unknown TDLS mgmt/action frame %pM\n", peer);
2660 ret = -EINVAL;
2661 break;
2662 }
2663
2664 return ret;
2665}
2666
429d90d2
AP
2667static int
2668mwifiex_cfg80211_tdls_oper(struct wiphy *wiphy, struct net_device *dev,
2669 u8 *peer, enum nl80211_tdls_operation action)
2670{
2671 struct mwifiex_private *priv = mwifiex_netdev_get_priv(dev);
2672
2673 if (!(wiphy->flags & WIPHY_FLAG_SUPPORTS_TDLS) ||
2674 !(wiphy->flags & WIPHY_FLAG_TDLS_EXTERNAL_SETUP))
2675 return -ENOTSUPP;
2676
2677 /* make sure we are in station mode and connected */
2678 if (!(priv->bss_type == MWIFIEX_BSS_TYPE_STA && priv->media_connected))
2679 return -ENOTSUPP;
2680
2681 dev_dbg(priv->adapter->dev,
2682 "TDLS peer=%pM, oper=%d\n", peer, action);
2683
2684 switch (action) {
2685 case NL80211_TDLS_ENABLE_LINK:
2686 action = MWIFIEX_TDLS_ENABLE_LINK;
2687 break;
2688 case NL80211_TDLS_DISABLE_LINK:
2689 action = MWIFIEX_TDLS_DISABLE_LINK;
2690 break;
2691 case NL80211_TDLS_TEARDOWN:
2692 /* shouldn't happen!*/
2693 dev_warn(priv->adapter->dev,
2694 "tdls_oper: teardown from driver not supported\n");
2695 return -EINVAL;
2696 case NL80211_TDLS_SETUP:
2697 /* shouldn't happen!*/
2698 dev_warn(priv->adapter->dev,
2699 "tdls_oper: setup from driver not supported\n");
2700 return -EINVAL;
2701 case NL80211_TDLS_DISCOVERY_REQ:
2702 /* shouldn't happen!*/
2703 dev_warn(priv->adapter->dev,
2704 "tdls_oper: discovery from driver not supported\n");
2705 return -EINVAL;
2706 default:
2707 dev_err(priv->adapter->dev,
2708 "tdls_oper: operation not supported\n");
2709 return -ENOTSUPP;
2710 }
2711
2712 return mwifiex_tdls_oper(priv, peer, action);
2713}
2714
e48e0de0
AP
2715static int
2716mwifiex_cfg80211_add_station(struct wiphy *wiphy,
2717 struct net_device *dev,
2718 u8 *mac, struct station_parameters *params)
2719{
2720 struct mwifiex_private *priv = mwifiex_netdev_get_priv(dev);
2721
2722 if (!(params->sta_flags_set & BIT(NL80211_STA_FLAG_TDLS_PEER)))
2723 return -ENOTSUPP;
2724
2725 /* make sure we are in station mode and connected */
2726 if ((priv->bss_type != MWIFIEX_BSS_TYPE_STA) || !priv->media_connected)
2727 return -ENOTSUPP;
2728
2729 return mwifiex_tdls_oper(priv, mac, MWIFIEX_TDLS_CREATE_LINK);
2730}
2731
1f4dfd8a
AP
2732static int
2733mwifiex_cfg80211_change_station(struct wiphy *wiphy,
2734 struct net_device *dev,
2735 u8 *mac, struct station_parameters *params)
2736{
2737 int ret;
2738 struct mwifiex_private *priv = mwifiex_netdev_get_priv(dev);
2739
2740 /* we support change_station handler only for TDLS peers*/
2741 if (!(params->sta_flags_set & BIT(NL80211_STA_FLAG_TDLS_PEER)))
2742 return -ENOTSUPP;
2743
2744 /* make sure we are in station mode and connected */
2745 if ((priv->bss_type != MWIFIEX_BSS_TYPE_STA) || !priv->media_connected)
2746 return -ENOTSUPP;
2747
2748 priv->sta_params = params;
2749
2750 ret = mwifiex_tdls_oper(priv, mac, MWIFIEX_TDLS_CONFIG_LINK);
2751 priv->sta_params = NULL;
2752
2753 return ret;
2754}
2755
5e6e3a92
BZ
2756/* station cfg80211 operations */
2757static struct cfg80211_ops mwifiex_cfg80211_ops = {
93a1df48
YAP
2758 .add_virtual_intf = mwifiex_add_virtual_intf,
2759 .del_virtual_intf = mwifiex_del_virtual_intf,
5e6e3a92
BZ
2760 .change_virtual_intf = mwifiex_cfg80211_change_virtual_intf,
2761 .scan = mwifiex_cfg80211_scan,
2762 .connect = mwifiex_cfg80211_connect,
2763 .disconnect = mwifiex_cfg80211_disconnect,
2764 .get_station = mwifiex_cfg80211_get_station,
f85aae6b 2765 .dump_station = mwifiex_cfg80211_dump_station,
5e6e3a92 2766 .set_wiphy_params = mwifiex_cfg80211_set_wiphy_params,
5e6e3a92
BZ
2767 .join_ibss = mwifiex_cfg80211_join_ibss,
2768 .leave_ibss = mwifiex_cfg80211_leave_ibss,
2769 .add_key = mwifiex_cfg80211_add_key,
2770 .del_key = mwifiex_cfg80211_del_key,
e39faa73 2771 .mgmt_tx = mwifiex_cfg80211_mgmt_tx,
3cec6870 2772 .mgmt_frame_register = mwifiex_cfg80211_mgmt_frame_register,
7feb4c48
SP
2773 .remain_on_channel = mwifiex_cfg80211_remain_on_channel,
2774 .cancel_remain_on_channel = mwifiex_cfg80211_cancel_remain_on_channel,
5e6e3a92
BZ
2775 .set_default_key = mwifiex_cfg80211_set_default_key,
2776 .set_power_mgmt = mwifiex_cfg80211_set_power_mgmt,
2777 .set_tx_power = mwifiex_cfg80211_set_tx_power,
5d82c53a 2778 .set_bitrate_mask = mwifiex_cfg80211_set_bitrate_mask,
12190c5d
AP
2779 .start_ap = mwifiex_cfg80211_start_ap,
2780 .stop_ap = mwifiex_cfg80211_stop_ap,
5370c836 2781 .change_beacon = mwifiex_cfg80211_change_beacon,
fa444bf8 2782 .set_cqm_rssi_config = mwifiex_cfg80211_set_cqm_rssi_config,
8a279d5b 2783 .set_antenna = mwifiex_cfg80211_set_antenna,
0f9e9b8b 2784 .del_station = mwifiex_cfg80211_del_station,
7da060c1
AK
2785#ifdef CONFIG_PM
2786 .suspend = mwifiex_cfg80211_suspend,
2787 .resume = mwifiex_cfg80211_resume,
2788 .set_wakeup = mwifiex_cfg80211_set_wakeup,
2789#endif
d1e2586f 2790 .set_coalesce = mwifiex_cfg80211_set_coalesce,
b23bce29 2791 .tdls_mgmt = mwifiex_cfg80211_tdls_mgmt,
429d90d2 2792 .tdls_oper = mwifiex_cfg80211_tdls_oper,
e48e0de0 2793 .add_station = mwifiex_cfg80211_add_station,
1f4dfd8a 2794 .change_station = mwifiex_cfg80211_change_station,
5e6e3a92
BZ
2795};
2796
964dc9e2
JB
2797#ifdef CONFIG_PM
2798static const struct wiphy_wowlan_support mwifiex_wowlan_support = {
2799 .flags = WIPHY_WOWLAN_MAGIC_PKT,
3f4e854a 2800 .n_patterns = MWIFIEX_MEF_MAX_FILTERS,
964dc9e2
JB
2801 .pattern_min_len = 1,
2802 .pattern_max_len = MWIFIEX_MAX_PATTERN_LEN,
2803 .max_pkt_offset = MWIFIEX_MAX_OFFSET_LEN,
2804};
2805#endif
2806
3c68ef5b
AP
2807static bool mwifiex_is_valid_alpha2(const char *alpha2)
2808{
2809 if (!alpha2 || strlen(alpha2) != 2)
2810 return false;
2811
2812 if (isalpha(alpha2[0]) && isalpha(alpha2[1]))
2813 return true;
2814
2815 return false;
2816}
2817
562fc5b3
AK
2818static const struct wiphy_coalesce_support mwifiex_coalesce_support = {
2819 .n_rules = MWIFIEX_COALESCE_MAX_RULES,
2820 .max_delay = MWIFIEX_MAX_COALESCING_DELAY,
2821 .n_patterns = MWIFIEX_COALESCE_MAX_FILTERS,
2822 .pattern_min_len = 1,
2823 .pattern_max_len = MWIFIEX_MAX_PATTERN_LEN,
2824 .max_pkt_offset = MWIFIEX_MAX_OFFSET_LEN,
2825};
2826
5e6e3a92
BZ
2827/*
2828 * This function registers the device with CFG802.11 subsystem.
2829 *
2830 * The function creates the wireless device/wiphy, populates it with
2831 * default parameters and handler function pointers, and finally
2832 * registers the device.
2833 */
d6bffe8b
AP
2834
2835int mwifiex_register_cfg80211(struct mwifiex_adapter *adapter)
5e6e3a92 2836{
270e58e8
YAP
2837 int ret;
2838 void *wdev_priv;
d6bffe8b
AP
2839 struct wiphy *wiphy;
2840 struct mwifiex_private *priv = adapter->priv[MWIFIEX_BSS_TYPE_STA];
9e04a7c6 2841 u8 *country_code;
f862bfd1 2842 u32 thr, retry;
5e6e3a92 2843
d6bffe8b
AP
2844 /* create a new wiphy for use with cfg80211 */
2845 wiphy = wiphy_new(&mwifiex_cfg80211_ops,
2846 sizeof(struct mwifiex_adapter *));
2847 if (!wiphy) {
2848 dev_err(adapter->dev, "%s: creating new wiphy\n", __func__);
5e6e3a92
BZ
2849 return -ENOMEM;
2850 }
d6bffe8b
AP
2851 wiphy->max_scan_ssids = MWIFIEX_MAX_SSID_LIST_LENGTH;
2852 wiphy->max_scan_ie_len = MWIFIEX_MAX_VSIE_LEN;
83719be8 2853 wiphy->mgmt_stypes = mwifiex_mgmt_stypes;
7feb4c48 2854 wiphy->max_remain_on_channel_duration = 5000;
d6bffe8b
AP
2855 wiphy->interface_modes = BIT(NL80211_IFTYPE_STATION) |
2856 BIT(NL80211_IFTYPE_ADHOC) |
197f4a2e
SP
2857 BIT(NL80211_IFTYPE_P2P_CLIENT) |
2858 BIT(NL80211_IFTYPE_P2P_GO) |
d6bffe8b
AP
2859 BIT(NL80211_IFTYPE_AP);
2860
2861 wiphy->bands[IEEE80211_BAND_2GHZ] = &mwifiex_band_2ghz;
2862 if (adapter->config_bands & BAND_A)
2863 wiphy->bands[IEEE80211_BAND_5GHZ] = &mwifiex_band_5ghz;
2864 else
2865 wiphy->bands[IEEE80211_BAND_5GHZ] = NULL;
5e6e3a92 2866
cd8440da
AP
2867 wiphy->iface_combinations = &mwifiex_iface_comb_ap_sta;
2868 wiphy->n_iface_combinations = 1;
2869
5e6e3a92 2870 /* Initialize cipher suits */
d6bffe8b
AP
2871 wiphy->cipher_suites = mwifiex_cipher_suites;
2872 wiphy->n_cipher_suites = ARRAY_SIZE(mwifiex_cipher_suites);
5e6e3a92 2873
d6bffe8b
AP
2874 memcpy(wiphy->perm_addr, priv->curr_addr, ETH_ALEN);
2875 wiphy->signal_type = CFG80211_SIGNAL_TYPE_MBM;
2dd2bd6b 2876 wiphy->flags |= WIPHY_FLAG_HAVE_AP_SME |
cc0ba0d5 2877 WIPHY_FLAG_AP_PROBE_RESP_OFFLOAD |
54428c57 2878 WIPHY_FLAG_AP_UAPSD |
7feb4c48 2879 WIPHY_FLAG_HAS_REMAIN_ON_CHANNEL;
b23bce29
AP
2880
2881 if (ISSUPP_TDLS_ENABLED(adapter->fw_cap_info))
2882 wiphy->flags |= WIPHY_FLAG_SUPPORTS_TDLS |
2883 WIPHY_FLAG_TDLS_EXTERNAL_SETUP;
2884
a2f73b6c
LR
2885 wiphy->regulatory_flags |=
2886 REGULATORY_CUSTOM_REG |
2887 REGULATORY_STRICT_REG;
cc0ba0d5
AK
2888
2889 wiphy_apply_custom_regulatory(wiphy, &mwifiex_world_regdom_custom);
2dd2bd6b 2890
7da060c1 2891#ifdef CONFIG_PM
964dc9e2 2892 wiphy->wowlan = &mwifiex_wowlan_support;
7da060c1
AK
2893#endif
2894
562fc5b3
AK
2895 wiphy->coalesce = &mwifiex_coalesce_support;
2896
2dd2bd6b 2897 wiphy->probe_resp_offload = NL80211_PROBE_RESP_OFFLOAD_SUPPORT_WPS |
e39faa73
SP
2898 NL80211_PROBE_RESP_OFFLOAD_SUPPORT_WPS2 |
2899 NL80211_PROBE_RESP_OFFLOAD_SUPPORT_P2P;
5e6e3a92 2900
8a279d5b
AK
2901 wiphy->available_antennas_tx = BIT(adapter->number_of_antenna) - 1;
2902 wiphy->available_antennas_rx = BIT(adapter->number_of_antenna) - 1;
5e6e3a92 2903
b292219f 2904 wiphy->features |= NL80211_FEATURE_HT_IBSS |
e45a8419 2905 NL80211_FEATURE_INACTIVITY_TIMER |
e3c91683
AK
2906 NL80211_FEATURE_LOW_PRIORITY_SCAN |
2907 NL80211_FEATURE_NEED_OBSS_SCAN;
05910f4a 2908
b5abcf02 2909 /* Reserve space for mwifiex specific private data for BSS */
d6bffe8b 2910 wiphy->bss_priv_size = sizeof(struct mwifiex_bss_priv);
5116f3ce 2911
d6bffe8b 2912 wiphy->reg_notifier = mwifiex_reg_notifier;
5e6e3a92 2913
67fdf39e 2914 /* Set struct mwifiex_adapter pointer in wiphy_priv */
d6bffe8b 2915 wdev_priv = wiphy_priv(wiphy);
67fdf39e 2916 *(unsigned long *)wdev_priv = (unsigned long)adapter;
5e6e3a92 2917
2c208890 2918 set_wiphy_dev(wiphy, priv->adapter->dev);
a7b21165 2919
d6bffe8b 2920 ret = wiphy_register(wiphy);
5e6e3a92 2921 if (ret < 0) {
d6bffe8b
AP
2922 dev_err(adapter->dev,
2923 "%s: wiphy_register failed: %d\n", __func__, ret);
2924 wiphy_free(wiphy);
5e6e3a92 2925 return ret;
5e6e3a92 2926 }
3c68ef5b
AP
2927
2928 if (reg_alpha2 && mwifiex_is_valid_alpha2(reg_alpha2)) {
2929 wiphy_info(wiphy, "driver hint alpha2: %2.2s\n", reg_alpha2);
2930 regulatory_hint(wiphy, reg_alpha2);
2931 } else {
2932 country_code = mwifiex_11d_code_2_region(adapter->region_code);
2933 if (country_code)
2934 wiphy_info(wiphy, "ignoring F/W country code %2.2s\n",
2935 country_code);
2936 }
5e6e3a92 2937
fa0ecbb9
BZ
2938 mwifiex_send_cmd(priv, HostCmd_CMD_802_11_SNMP_MIB,
2939 HostCmd_ACT_GEN_GET, FRAG_THRESH_I, &thr, true);
f862bfd1 2940 wiphy->frag_threshold = thr;
fa0ecbb9
BZ
2941 mwifiex_send_cmd(priv, HostCmd_CMD_802_11_SNMP_MIB,
2942 HostCmd_ACT_GEN_GET, RTS_THRESH_I, &thr, true);
f862bfd1 2943 wiphy->rts_threshold = thr;
fa0ecbb9
BZ
2944 mwifiex_send_cmd(priv, HostCmd_CMD_802_11_SNMP_MIB,
2945 HostCmd_ACT_GEN_GET, SHORT_RETRY_LIM_I, &retry, true);
f862bfd1 2946 wiphy->retry_short = (u8) retry;
fa0ecbb9
BZ
2947 mwifiex_send_cmd(priv, HostCmd_CMD_802_11_SNMP_MIB,
2948 HostCmd_ACT_GEN_GET, LONG_RETRY_LIM_I, &retry, true);
f862bfd1
UR
2949 wiphy->retry_long = (u8) retry;
2950
d6bffe8b 2951 adapter->wiphy = wiphy;
5e6e3a92
BZ
2952 return ret;
2953}
This page took 0.526697 seconds and 5 git commands to generate.