staging: brcm80211: rename event handling definition
[deliverable/linux.git] / drivers / staging / brcm80211 / brcmfmac / dhd_common.c
CommitLineData
cf2b4488
HP
1/*
2 * Copyright (c) 2010 Broadcom Corporation
3 *
4 * Permission to use, copy, modify, and/or distribute this software for any
5 * purpose with or without fee is hereby granted, provided that the above
6 * copyright notice and this permission notice appear in all copies.
7 *
8 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
9 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
10 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY
11 * SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
12 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION
13 * OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN
14 * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
15 */
d5642d3b
AS
16#include <linux/kernel.h>
17#include <linux/string.h>
7c6100ee 18#include <linux/sched.h>
c6ac24e9 19#include <linux/netdevice.h>
7c6100ee 20#include <asm/unaligned.h>
c4daa849
RV
21#include <defs.h>
22#include <brcmu_wifi.h>
f97e956a 23#include <brcmu_utils.h>
c4daa849
RV
24#include "dngl_stats.h"
25#include "dhd.h"
26#include "dhd_bus.h"
27#include "dhd_proto.h"
28#include "dhd_dbg.h"
cf2b4488 29
9152bf26
RV
30#define BRCM_OUI "\x00\x10\x18"
31#define DOT11_OUI_LEN 3
a019382e 32#define BCMILCP_BCM_SUBTYPE_EVENT 1
9152bf26 33
aba5e0ad
AS
34int brcmf_msg_level;
35char brcmf_fw_path[MOD_PARAM_PATHLEN];
36char brcmf_nv_path[MOD_PARAM_PATHLEN];
cf2b4488 37
cf2b4488
HP
38extern int dhdcdc_set_ioctl(dhd_pub_t *dhd, int ifidx, uint cmd, void *buf,
39 uint len);
40extern void dhd_ind_scan_confirm(void *h, bool status);
41extern int dhd_wl_ioctl(dhd_pub_t *dhd, uint cmd, char *buf, uint buflen);
42void dhd_iscan_lock(void);
43void dhd_iscan_unlock(void);
44
45/* Packet alignment for most efficient SDIO (can change based on platform) */
46#ifndef DHD_SDALIGN
47#define DHD_SDALIGN 32
48#endif
49#if !ISPOWEROF2(DHD_SDALIGN)
50#error DHD_SDALIGN is not a power of 2!
51#endif
52
cf2b4488 53#define EPI_VERSION_STR "4.218.248.5"
86c01843
FL
54#define MSGTRACE_VERSION 1
55
26e80554 56#ifdef DHD_DEBUG
aba5e0ad 57const char brcmf_version[] =
cf2b4488
HP
58"Dongle Host Driver, version " EPI_VERSION_STR "\nCompiled on " __DATE__
59" at " __TIME__;
60#else
aba5e0ad 61const char brcmf_version[] = "Dongle Host Driver, version " EPI_VERSION_STR;
cf2b4488
HP
62#endif
63
cf2b4488
HP
64/* IOVar table */
65enum {
66 IOV_VERSION = 1,
67 IOV_MSGLEVEL,
68 IOV_BCMERRORSTR,
69 IOV_BCMERROR,
70 IOV_WDTICK,
71 IOV_DUMP,
72#ifdef DHD_DEBUG
73 IOV_CONS,
74 IOV_DCONSOLE_POLL,
75#endif
76 IOV_CLEARCOUNTS,
77 IOV_LOGDUMP,
78 IOV_LOGCAL,
79 IOV_LOGSTAMP,
80 IOV_GPIOOB,
81 IOV_IOCTLTIMEOUT,
82 IOV_LAST
83};
84
aba5e0ad
AS
85const struct brcmu_iovar brcmf_iovars[] = {
86 {"version", IOV_VERSION, 0, IOVT_BUFFER, sizeof(brcmf_version)}
cf2b4488
HP
87 ,
88#ifdef DHD_DEBUG
89 {"msglevel", IOV_MSGLEVEL, 0, IOVT_UINT32, 0}
90 ,
91#endif /* DHD_DEBUG */
92 {"bcmerrorstr", IOV_BCMERRORSTR, 0, IOVT_BUFFER, BCME_STRLEN}
93 ,
94 {"bcmerror", IOV_BCMERROR, 0, IOVT_INT8, 0}
95 ,
96 {"wdtick", IOV_WDTICK, 0, IOVT_UINT32, 0}
97 ,
98 {"dump", IOV_DUMP, 0, IOVT_BUFFER, DHD_IOCTL_MAXLEN}
99 ,
100#ifdef DHD_DEBUG
101 {"dconpoll", IOV_DCONSOLE_POLL, 0, IOVT_UINT32, 0}
102 ,
103 {"cons", IOV_CONS, 0, IOVT_BUFFER, 0}
104 ,
105#endif
106 {"clearcounts", IOV_CLEARCOUNTS, 0, IOVT_VOID, 0}
107 ,
108 {"gpioob", IOV_GPIOOB, 0, IOVT_UINT32, 0}
109 ,
110 {"ioctl_timeout", IOV_IOCTLTIMEOUT, 0, IOVT_UINT32, 0}
111 ,
112 {NULL, 0, 0, 0, 0}
113};
114
86c01843
FL
115/* Message trace header */
116struct msgtrace_hdr {
117 u8 version;
118 u8 spare;
119 u16 len; /* Len of the trace */
120 u32 seqnum; /* Sequence number of message. Useful
121 * if the messsage has been lost
122 * because of DMA error or a bus reset
123 * (ex: SDIO Func2)
124 */
125 u32 discarded_bytes; /* Number of discarded bytes because of
126 trace overflow */
127 u32 discarded_printf; /* Number of discarded printf
128 because of trace overflow */
129} __packed;
130
aba5e0ad 131void brcmf_c_init(void)
cf2b4488
HP
132{
133 /* Init global variables at run-time, not as part of the declaration.
134 * This is required to support init/de-init of the driver.
135 * Initialization
136 * of globals as part of the declaration results in non-deterministic
137 * behaviour since the value of the globals may be different on the
138 * first time that the driver is initialized vs subsequent
139 * initializations.
140 */
aba5e0ad 141 brcmf_msg_level = DHD_ERROR_VAL;
cf2b4488 142#ifdef CONFIG_BCM4329_FW_PATH
aba5e0ad 143 strncpy(brcmf_fw_path, CONFIG_BCM4329_FW_PATH, MOD_PARAM_PATHLEN - 1);
cf2b4488 144#else
aba5e0ad 145 brcmf_fw_path[0] = '\0';
cf2b4488
HP
146#endif
147#ifdef CONFIG_BCM4329_NVRAM_PATH
aba5e0ad
AS
148 strncpy(brcmf_nv_path,
149 CONFIG_BCM4329_NVRAM_PATH, MOD_PARAM_PATHLEN - 1);
cf2b4488 150#else
aba5e0ad 151 brcmf_nv_path[0] = '\0';
cf2b4488
HP
152#endif
153}
154
aba5e0ad 155static int brcmf_c_dump(dhd_pub_t *dhdp, char *buf, int buflen)
cf2b4488 156{
67ad48bc
RV
157 struct brcmu_strbuf b;
158 struct brcmu_strbuf *strbuf = &b;
cf2b4488 159
67ad48bc 160 brcmu_binit(strbuf, buf, buflen);
cf2b4488
HP
161
162 /* Base DHD info */
aba5e0ad 163 brcmu_bprintf(strbuf, "%s\n", brcmf_version);
67ad48bc
RV
164 brcmu_bprintf(strbuf, "\n");
165 brcmu_bprintf(strbuf, "pub.up %d pub.txoff %d pub.busstate %d\n",
cf2b4488 166 dhdp->up, dhdp->txoff, dhdp->busstate);
67ad48bc 167 brcmu_bprintf(strbuf, "pub.hdrlen %d pub.maxctl %d pub.rxsz %d\n",
cf2b4488 168 dhdp->hdrlen, dhdp->maxctl, dhdp->rxsz);
67ad48bc 169 brcmu_bprintf(strbuf, "pub.iswl %d pub.drv_version %ld pub.mac %pM\n",
ba07d0cb 170 dhdp->iswl, dhdp->drv_version, &dhdp->mac);
67ad48bc 171 brcmu_bprintf(strbuf, "pub.bcmerror %d tickcnt %d\n", dhdp->bcmerror,
cf2b4488
HP
172 dhdp->tickcnt);
173
67ad48bc
RV
174 brcmu_bprintf(strbuf, "dongle stats:\n");
175 brcmu_bprintf(strbuf,
cf2b4488
HP
176 "tx_packets %ld tx_bytes %ld tx_errors %ld tx_dropped %ld\n",
177 dhdp->dstats.tx_packets, dhdp->dstats.tx_bytes,
178 dhdp->dstats.tx_errors, dhdp->dstats.tx_dropped);
67ad48bc 179 brcmu_bprintf(strbuf,
cf2b4488
HP
180 "rx_packets %ld rx_bytes %ld rx_errors %ld rx_dropped %ld\n",
181 dhdp->dstats.rx_packets, dhdp->dstats.rx_bytes,
182 dhdp->dstats.rx_errors, dhdp->dstats.rx_dropped);
67ad48bc 183 brcmu_bprintf(strbuf, "multicast %ld\n", dhdp->dstats.multicast);
cf2b4488 184
67ad48bc
RV
185 brcmu_bprintf(strbuf, "bus stats:\n");
186 brcmu_bprintf(strbuf, "tx_packets %ld tx_multicast %ld tx_errors %ld\n",
cf2b4488 187 dhdp->tx_packets, dhdp->tx_multicast, dhdp->tx_errors);
67ad48bc 188 brcmu_bprintf(strbuf, "tx_ctlpkts %ld tx_ctlerrs %ld\n",
cf2b4488 189 dhdp->tx_ctlpkts, dhdp->tx_ctlerrs);
67ad48bc 190 brcmu_bprintf(strbuf, "rx_packets %ld rx_multicast %ld rx_errors %ld\n",
cf2b4488 191 dhdp->rx_packets, dhdp->rx_multicast, dhdp->rx_errors);
67ad48bc 192 brcmu_bprintf(strbuf,
cf2b4488
HP
193 "rx_ctlpkts %ld rx_ctlerrs %ld rx_dropped %ld rx_flushed %ld\n",
194 dhdp->rx_ctlpkts, dhdp->rx_ctlerrs, dhdp->rx_dropped,
195 dhdp->rx_flushed);
67ad48bc 196 brcmu_bprintf(strbuf,
cf2b4488
HP
197 "rx_readahead_cnt %ld tx_realloc %ld fc_packets %ld\n",
198 dhdp->rx_readahead_cnt, dhdp->tx_realloc, dhdp->fc_packets);
67ad48bc
RV
199 brcmu_bprintf(strbuf, "wd_dpc_sched %ld\n", dhdp->wd_dpc_sched);
200 brcmu_bprintf(strbuf, "\n");
cf2b4488
HP
201
202 /* Add any prot info */
203 dhd_prot_dump(dhdp, strbuf);
67ad48bc 204 brcmu_bprintf(strbuf, "\n");
cf2b4488
HP
205
206 /* Add any bus info */
54ca2969 207 brcmf_sdbrcm_bus_dump(dhdp, strbuf);
cf2b4488 208
e10d82d4 209 return !strbuf->size ? -EOVERFLOW : 0;
cf2b4488
HP
210}
211
212static int
aba5e0ad 213brcmf_c_doiovar(dhd_pub_t *dhd_pub, const struct brcmu_iovar *vi, u32 actionid,
cf2b4488
HP
214 const char *name, void *params, int plen, void *arg, int len,
215 int val_size)
216{
217 int bcmerror = 0;
3e26416e 218 s32 int_val = 0;
cf2b4488
HP
219
220 DHD_TRACE(("%s: Enter\n", __func__));
221
67ad48bc 222 bcmerror = brcmu_iovar_lencheck(vi, arg, len, IOV_ISSET(actionid));
b229fad2 223 if (bcmerror != 0)
cf2b4488
HP
224 goto exit;
225
226 if (plen >= (int)sizeof(int_val))
02160695 227 memcpy(&int_val, params, sizeof(int_val));
cf2b4488
HP
228
229 switch (actionid) {
230 case IOV_GVAL(IOV_VERSION):
231 /* Need to have checked buffer length */
aba5e0ad 232 strncpy((char *)arg, brcmf_version, len);
cf2b4488
HP
233 break;
234
235 case IOV_GVAL(IOV_MSGLEVEL):
aba5e0ad 236 int_val = (s32) brcmf_msg_level;
02160695 237 memcpy(arg, &int_val, val_size);
cf2b4488
HP
238 break;
239
240 case IOV_SVAL(IOV_MSGLEVEL):
aba5e0ad 241 brcmf_msg_level = int_val;
cf2b4488
HP
242 break;
243
244 case IOV_GVAL(IOV_BCMERRORSTR):
c2be548d 245 strncpy((char *)arg, "bcm_error",
cf2b4488
HP
246 BCME_STRLEN);
247 ((char *)arg)[BCME_STRLEN - 1] = 0x00;
248 break;
249
250 case IOV_GVAL(IOV_BCMERROR):
3e26416e 251 int_val = (s32) dhd_pub->bcmerror;
02160695 252 memcpy(arg, &int_val, val_size);
cf2b4488
HP
253 break;
254
255 case IOV_GVAL(IOV_WDTICK):
3e26416e 256 int_val = (s32) dhd_watchdog_ms;
02160695 257 memcpy(arg, &int_val, val_size);
cf2b4488
HP
258 break;
259
260 case IOV_SVAL(IOV_WDTICK):
261 if (!dhd_pub->up) {
e10d82d4 262 bcmerror = -ENOLINK;
cf2b4488
HP
263 break;
264 }
265 dhd_os_wd_timer(dhd_pub, (uint) int_val);
266 break;
267
268 case IOV_GVAL(IOV_DUMP):
aba5e0ad 269 bcmerror = brcmf_c_dump(dhd_pub, arg, len);
cf2b4488
HP
270 break;
271
272#ifdef DHD_DEBUG
273 case IOV_GVAL(IOV_DCONSOLE_POLL):
3e26416e 274 int_val = (s32) dhd_console_ms;
02160695 275 memcpy(arg, &int_val, val_size);
cf2b4488
HP
276 break;
277
278 case IOV_SVAL(IOV_DCONSOLE_POLL):
279 dhd_console_ms = (uint) int_val;
280 break;
281
282 case IOV_SVAL(IOV_CONS):
283 if (len > 0)
54ca2969
RV
284 bcmerror = brcmf_sdbrcm_bus_console_in(dhd_pub, arg,
285 len - 1);
cf2b4488
HP
286 break;
287#endif
288
289 case IOV_SVAL(IOV_CLEARCOUNTS):
290 dhd_pub->tx_packets = dhd_pub->rx_packets = 0;
291 dhd_pub->tx_errors = dhd_pub->rx_errors = 0;
292 dhd_pub->tx_ctlpkts = dhd_pub->rx_ctlpkts = 0;
293 dhd_pub->tx_ctlerrs = dhd_pub->rx_ctlerrs = 0;
294 dhd_pub->rx_dropped = 0;
295 dhd_pub->rx_readahead_cnt = 0;
296 dhd_pub->tx_realloc = 0;
297 dhd_pub->wd_dpc_sched = 0;
298 memset(&dhd_pub->dstats, 0, sizeof(dhd_pub->dstats));
299 dhd_bus_clearcounts(dhd_pub);
300 break;
301
302 case IOV_GVAL(IOV_IOCTLTIMEOUT):{
3e26416e 303 int_val = (s32) dhd_os_get_ioctl_resp_timeout();
02160695 304 memcpy(arg, &int_val, sizeof(int_val));
cf2b4488
HP
305 break;
306 }
307
308 case IOV_SVAL(IOV_IOCTLTIMEOUT):{
309 if (int_val <= 0)
e10d82d4 310 bcmerror = -EINVAL;
cf2b4488
HP
311 else
312 dhd_os_set_ioctl_resp_timeout((unsigned int)
313 int_val);
314 break;
315 }
316
317 default:
e10d82d4 318 bcmerror = -ENOTSUPP;
cf2b4488
HP
319 break;
320 }
321
322exit:
323 return bcmerror;
324}
325
aba5e0ad 326bool brcmf_c_prec_enq(dhd_pub_t *dhdp, struct pktq *q, struct sk_buff *pkt,
c26b1378 327 int prec)
cf2b4488 328{
c26b1378 329 struct sk_buff *p;
cf2b4488
HP
330 int eprec = -1; /* precedence to evict from */
331 bool discard_oldest;
332
333 /* Fast case, precedence queue is not full and we are also not
334 * exceeding total queue length
335 */
336 if (!pktq_pfull(q, prec) && !pktq_full(q)) {
67ad48bc 337 brcmu_pktq_penq(q, prec, pkt);
0f0881b0 338 return true;
cf2b4488
HP
339 }
340
341 /* Determine precedence from which to evict packet, if any */
342 if (pktq_pfull(q, prec))
343 eprec = prec;
344 else if (pktq_full(q)) {
67ad48bc 345 p = brcmu_pktq_peek_tail(q, &eprec);
cf2b4488
HP
346 ASSERT(p);
347 if (eprec > prec)
0965ae88 348 return false;
cf2b4488
HP
349 }
350
351 /* Evict if needed */
352 if (eprec >= 0) {
353 /* Detect queueing to unconfigured precedence */
354 ASSERT(!pktq_pempty(q, eprec));
355 discard_oldest = AC_BITMAP_TST(dhdp->wme_dp, eprec);
356 if (eprec == prec && !discard_oldest)
0965ae88 357 return false; /* refuse newer (incoming) packet */
cf2b4488 358 /* Evict packet according to discard policy */
67ad48bc
RV
359 p = discard_oldest ? brcmu_pktq_pdeq(q, eprec) :
360 brcmu_pktq_pdeq_tail(q, eprec);
cf2b4488 361 if (p == NULL) {
67ad48bc 362 DHD_ERROR(("%s: brcmu_pktq_penq() failed, oldest %d.",
cf2b4488
HP
363 __func__, discard_oldest));
364 ASSERT(p);
365 }
366
67ad48bc 367 brcmu_pkt_buf_free_skb(p);
cf2b4488
HP
368 }
369
370 /* Enqueue */
67ad48bc 371 p = brcmu_pktq_penq(q, prec, pkt);
cf2b4488 372 if (p == NULL) {
67ad48bc 373 DHD_ERROR(("%s: brcmu_pktq_penq() failed.", __func__));
cf2b4488
HP
374 ASSERT(p);
375 }
376
0f0881b0 377 return true;
cf2b4488
HP
378}
379
380static int
aba5e0ad 381brcmf_c_iovar_op(dhd_pub_t *dhd_pub, const char *name,
cf2b4488
HP
382 void *params, int plen, void *arg, int len, bool set)
383{
384 int bcmerror = 0;
385 int val_size;
67ad48bc 386 const struct brcmu_iovar *vi = NULL;
66cbd3ab 387 u32 actionid;
cf2b4488
HP
388
389 DHD_TRACE(("%s: Enter\n", __func__));
390
391 ASSERT(name);
392 ASSERT(len >= 0);
393
394 /* Get MUST have return space */
395 ASSERT(set || (arg && len));
396
397 /* Set does NOT take qualifiers */
398 ASSERT(!set || (!params && !plen));
399
aba5e0ad 400 vi = brcmu_iovar_lookup(brcmf_iovars, name);
b229fad2 401 if (vi == NULL) {
e10d82d4 402 bcmerror = -ENOTSUPP;
cf2b4488
HP
403 goto exit;
404 }
405
406 DHD_CTL(("%s: %s %s, len %d plen %d\n", __func__,
407 name, (set ? "set" : "get"), len, plen));
408
409 /* set up 'params' pointer in case this is a set command so that
410 * the convenience int and bool code can be common to set and get
411 */
412 if (params == NULL) {
413 params = arg;
414 plen = len;
415 }
416
417 if (vi->type == IOVT_VOID)
418 val_size = 0;
419 else if (vi->type == IOVT_BUFFER)
420 val_size = len;
421 else
422 /* all other types are integer sized */
423 val_size = sizeof(int);
424
425 actionid = set ? IOV_SVAL(vi->varid) : IOV_GVAL(vi->varid);
426 bcmerror =
aba5e0ad 427 brcmf_c_doiovar(dhd_pub, vi, actionid, name, params, plen, arg, len,
cf2b4488
HP
428 val_size);
429
430exit:
431 return bcmerror;
432}
433
aba5e0ad 434int brcmf_c_ioctl(dhd_pub_t *dhd_pub, dhd_ioctl_t *ioc, void *buf, uint buflen)
cf2b4488
HP
435{
436 int bcmerror = 0;
437
438 DHD_TRACE(("%s: Enter\n", __func__));
439
440 if (!buf)
e10d82d4 441 return -EINVAL;
cf2b4488
HP
442
443 switch (ioc->cmd) {
444 case DHD_GET_MAGIC:
445 if (buflen < sizeof(int))
e10d82d4 446 bcmerror = -EOVERFLOW;
cf2b4488
HP
447 else
448 *(int *)buf = DHD_IOCTL_MAGIC;
449 break;
450
451 case DHD_GET_VERSION:
452 if (buflen < sizeof(int))
e10d82d4 453 bcmerror = -EOVERFLOW;
cf2b4488
HP
454 else
455 *(int *)buf = DHD_IOCTL_VERSION;
456 break;
457
458 case DHD_GET_VAR:
459 case DHD_SET_VAR:{
460 char *arg;
461 uint arglen;
462
463 /* scan past the name to any arguments */
464 for (arg = buf, arglen = buflen; *arg && arglen;
465 arg++, arglen--)
466 ;
467
468 if (*arg) {
e10d82d4 469 bcmerror = -EOVERFLOW;
cf2b4488
HP
470 break;
471 }
472
473 /* account for the NUL terminator */
474 arg++, arglen--;
475
476 /* call with the appropriate arguments */
477 if (ioc->cmd == DHD_GET_VAR)
aba5e0ad
AS
478 bcmerror = brcmf_c_iovar_op(dhd_pub, buf, arg,
479 arglen, buf, buflen, IOV_GET);
cf2b4488
HP
480 else
481 bcmerror =
aba5e0ad
AS
482 brcmf_c_iovar_op(dhd_pub, buf, NULL, 0, arg,
483 arglen, IOV_SET);
e10d82d4 484 if (bcmerror != -ENOTSUPP)
cf2b4488
HP
485 break;
486
487 /* not in generic table, try protocol module */
488 if (ioc->cmd == DHD_GET_VAR)
489 bcmerror = dhd_prot_iovar_op(dhd_pub, buf, arg,
490 arglen, buf,
491 buflen, IOV_GET);
492 else
493 bcmerror = dhd_prot_iovar_op(dhd_pub, buf,
494 NULL, 0, arg,
495 arglen, IOV_SET);
e10d82d4 496 if (bcmerror != -ENOTSUPP)
cf2b4488
HP
497 break;
498
499 /* if still not found, try bus module */
500 if (ioc->cmd == DHD_GET_VAR)
54ca2969
RV
501 bcmerror = brcmf_sdbrcm_bus_iovar_op(dhd_pub,
502 buf, arg, arglen, buf, buflen,
503 IOV_GET);
cf2b4488 504 else
54ca2969
RV
505 bcmerror = brcmf_sdbrcm_bus_iovar_op(dhd_pub,
506 buf, NULL, 0, arg, arglen,
507 IOV_SET);
cf2b4488
HP
508
509 break;
510 }
511
512 default:
e10d82d4 513 bcmerror = -ENOTSUPP;
cf2b4488
HP
514 }
515
516 return bcmerror;
517}
518
519#ifdef SHOW_EVENTS
05dc0f43 520static void brcmf_c_show_host_event(brcmf_event_msg_t *event, void *event_data)
cf2b4488
HP
521{
522 uint i, status, reason;
0965ae88 523 bool group = false, flush_txq = false, link = false;
cf2b4488 524 char *auth_str, *event_name;
580a0bd9 525 unsigned char *buf;
cf2b4488
HP
526 char err_msg[256], eabuf[ETHER_ADDR_STR_LEN];
527 static struct {
528 uint event;
529 char *event_name;
530 } event_names[] = {
531 {
05dc0f43
AS
532 BRCMF_E_SET_SSID, "SET_SSID"}, {
533 BRCMF_E_JOIN, "JOIN"}, {
534 BRCMF_E_START, "START"}, {
535 BRCMF_E_AUTH, "AUTH"}, {
536 BRCMF_E_AUTH_IND, "AUTH_IND"}, {
537 BRCMF_E_DEAUTH, "DEAUTH"}, {
538 BRCMF_E_DEAUTH_IND, "DEAUTH_IND"}, {
539 BRCMF_E_ASSOC, "ASSOC"}, {
540 BRCMF_E_ASSOC_IND, "ASSOC_IND"}, {
541 BRCMF_E_REASSOC, "REASSOC"}, {
542 BRCMF_E_REASSOC_IND, "REASSOC_IND"}, {
543 BRCMF_E_DISASSOC, "DISASSOC"}, {
544 BRCMF_E_DISASSOC_IND, "DISASSOC_IND"}, {
545 BRCMF_E_QUIET_START, "START_QUIET"}, {
546 BRCMF_E_QUIET_END, "END_QUIET"}, {
547 BRCMF_E_BEACON_RX, "BEACON_RX"}, {
548 BRCMF_E_LINK, "LINK"}, {
549 BRCMF_E_MIC_ERROR, "MIC_ERROR"}, {
550 BRCMF_E_NDIS_LINK, "NDIS_LINK"}, {
551 BRCMF_E_ROAM, "ROAM"}, {
552 BRCMF_E_TXFAIL, "TXFAIL"}, {
553 BRCMF_E_PMKID_CACHE, "PMKID_CACHE"}, {
554 BRCMF_E_RETROGRADE_TSF, "RETROGRADE_TSF"}, {
555 BRCMF_E_PRUNE, "PRUNE"}, {
556 BRCMF_E_AUTOAUTH, "AUTOAUTH"}, {
557 BRCMF_E_EAPOL_MSG, "EAPOL_MSG"}, {
558 BRCMF_E_SCAN_COMPLETE, "SCAN_COMPLETE"}, {
559 BRCMF_E_ADDTS_IND, "ADDTS_IND"}, {
560 BRCMF_E_DELTS_IND, "DELTS_IND"}, {
561 BRCMF_E_BCNSENT_IND, "BCNSENT_IND"}, {
562 BRCMF_E_BCNRX_MSG, "BCNRX_MSG"}, {
563 BRCMF_E_BCNLOST_MSG, "BCNLOST_MSG"}, {
564 BRCMF_E_ROAM_PREP, "ROAM_PREP"}, {
565 BRCMF_E_PFN_NET_FOUND, "PNO_NET_FOUND"}, {
566 BRCMF_E_PFN_NET_LOST, "PNO_NET_LOST"}, {
567 BRCMF_E_RESET_COMPLETE, "RESET_COMPLETE"}, {
568 BRCMF_E_JOIN_START, "JOIN_START"}, {
569 BRCMF_E_ROAM_START, "ROAM_START"}, {
570 BRCMF_E_ASSOC_START, "ASSOC_START"}, {
571 BRCMF_E_IBSS_ASSOC, "IBSS_ASSOC"}, {
572 BRCMF_E_RADIO, "RADIO"}, {
573 BRCMF_E_PSM_WATCHDOG, "PSM_WATCHDOG"}, {
574 BRCMF_E_PROBREQ_MSG, "PROBREQ_MSG"}, {
575 BRCMF_E_SCAN_CONFIRM_IND, "SCAN_CONFIRM_IND"}, {
576 BRCMF_E_PSK_SUP, "PSK_SUP"}, {
577 BRCMF_E_COUNTRY_CODE_CHANGED, "COUNTRY_CODE_CHANGED"}, {
578 BRCMF_E_EXCEEDED_MEDIUM_TIME, "EXCEEDED_MEDIUM_TIME"}, {
579 BRCMF_E_ICV_ERROR, "ICV_ERROR"}, {
580 BRCMF_E_UNICAST_DECODE_ERROR, "UNICAST_DECODE_ERROR"}, {
581 BRCMF_E_MULTICAST_DECODE_ERROR, "MULTICAST_DECODE_ERROR"}, {
582 BRCMF_E_TRACE, "TRACE"}, {
583 BRCMF_E_ACTION_FRAME, "ACTION FRAME"}, {
584 BRCMF_E_ACTION_FRAME_COMPLETE, "ACTION FRAME TX COMPLETE"}, {
585 BRCMF_E_IF, "IF"}, {
586 BRCMF_E_RSSI, "RSSI"}, {
587 BRCMF_E_PFN_SCAN_COMPLETE, "SCAN_COMPLETE"}
cf2b4488
HP
588 };
589 uint event_type, flags, auth_type, datalen;
628f10ba
SF
590 event_type = be32_to_cpu(event->event_type);
591 flags = be16_to_cpu(event->flags);
592 status = be32_to_cpu(event->status);
593 reason = be32_to_cpu(event->reason);
594 auth_type = be32_to_cpu(event->auth_type);
595 datalen = be32_to_cpu(event->datalen);
cf2b4488 596 /* debug dump of event messages */
a44d4236 597 sprintf(eabuf, "%pM", event->addr);
cf2b4488
HP
598
599 event_name = "UNKNOWN";
8d3d6a69 600 for (i = 0; i < ARRAY_SIZE(event_names); i++) {
cf2b4488
HP
601 if (event_names[i].event == event_type)
602 event_name = event_names[i].event_name;
603 }
604
605 DHD_EVENT(("EVENT: %s, event ID = %d\n", event_name, event_type));
1ce4784e
SS
606 DHD_EVENT(("flags 0x%04x, status %d, reason %d, auth_type %d MAC %s\n",
607 flags, status, reason, auth_type, eabuf));
cf2b4488 608
05dc0f43 609 if (flags & BRCMF_EVENT_MSG_LINK)
0f0881b0 610 link = true;
05dc0f43 611 if (flags & BRCMF_EVENT_MSG_GROUP)
0f0881b0 612 group = true;
05dc0f43 613 if (flags & BRCMF_EVENT_MSG_FLUSHTXQ)
0f0881b0 614 flush_txq = true;
cf2b4488
HP
615
616 switch (event_type) {
05dc0f43
AS
617 case BRCMF_E_START:
618 case BRCMF_E_DEAUTH:
619 case BRCMF_E_DISASSOC:
cf2b4488
HP
620 DHD_EVENT(("MACEVENT: %s, MAC %s\n", event_name, eabuf));
621 break;
622
05dc0f43
AS
623 case BRCMF_E_ASSOC_IND:
624 case BRCMF_E_REASSOC_IND:
cf2b4488
HP
625 DHD_EVENT(("MACEVENT: %s, MAC %s\n", event_name, eabuf));
626 break;
627
05dc0f43
AS
628 case BRCMF_E_ASSOC:
629 case BRCMF_E_REASSOC:
630 if (status == BRCMF_E_STATUS_SUCCESS) {
cf2b4488
HP
631 DHD_EVENT(("MACEVENT: %s, MAC %s, SUCCESS\n",
632 event_name, eabuf));
05dc0f43 633 } else if (status == BRCMF_E_STATUS_TIMEOUT) {
cf2b4488
HP
634 DHD_EVENT(("MACEVENT: %s, MAC %s, TIMEOUT\n",
635 event_name, eabuf));
05dc0f43 636 } else if (status == BRCMF_E_STATUS_FAIL) {
cf2b4488
HP
637 DHD_EVENT(("MACEVENT: %s, MAC %s, FAILURE, reason %d\n",
638 event_name, eabuf, (int)reason));
639 } else {
640 DHD_EVENT(("MACEVENT: %s, MAC %s, unexpected status "
641 "%d\n", event_name, eabuf, (int)status));
642 }
643 break;
644
05dc0f43
AS
645 case BRCMF_E_DEAUTH_IND:
646 case BRCMF_E_DISASSOC_IND:
cf2b4488
HP
647 DHD_EVENT(("MACEVENT: %s, MAC %s, reason %d\n", event_name,
648 eabuf, (int)reason));
649 break;
650
05dc0f43
AS
651 case BRCMF_E_AUTH:
652 case BRCMF_E_AUTH_IND:
fd4bd42e 653 if (auth_type == WLAN_AUTH_OPEN)
cf2b4488 654 auth_str = "Open System";
fd4bd42e 655 else if (auth_type == WLAN_AUTH_SHARED_KEY)
cf2b4488
HP
656 auth_str = "Shared Key";
657 else {
658 sprintf(err_msg, "AUTH unknown: %d", (int)auth_type);
659 auth_str = err_msg;
660 }
05dc0f43 661 if (event_type == BRCMF_E_AUTH_IND) {
cf2b4488
HP
662 DHD_EVENT(("MACEVENT: %s, MAC %s, %s\n", event_name,
663 eabuf, auth_str));
05dc0f43 664 } else if (status == BRCMF_E_STATUS_SUCCESS) {
cf2b4488
HP
665 DHD_EVENT(("MACEVENT: %s, MAC %s, %s, SUCCESS\n",
666 event_name, eabuf, auth_str));
05dc0f43 667 } else if (status == BRCMF_E_STATUS_TIMEOUT) {
cf2b4488
HP
668 DHD_EVENT(("MACEVENT: %s, MAC %s, %s, TIMEOUT\n",
669 event_name, eabuf, auth_str));
05dc0f43 670 } else if (status == BRCMF_E_STATUS_FAIL) {
cf2b4488
HP
671 DHD_EVENT(("MACEVENT: %s, MAC %s, %s, FAILURE, "
672 "reason %d\n",
673 event_name, eabuf, auth_str, (int)reason));
674 }
675
676 break;
677
05dc0f43
AS
678 case BRCMF_E_JOIN:
679 case BRCMF_E_ROAM:
680 case BRCMF_E_SET_SSID:
681 if (status == BRCMF_E_STATUS_SUCCESS) {
cf2b4488
HP
682 DHD_EVENT(("MACEVENT: %s, MAC %s\n", event_name,
683 eabuf));
05dc0f43 684 } else if (status == BRCMF_E_STATUS_FAIL) {
cf2b4488 685 DHD_EVENT(("MACEVENT: %s, failed\n", event_name));
05dc0f43 686 } else if (status == BRCMF_E_STATUS_NO_NETWORKS) {
cf2b4488
HP
687 DHD_EVENT(("MACEVENT: %s, no networks found\n",
688 event_name));
689 } else {
690 DHD_EVENT(("MACEVENT: %s, unexpected status %d\n",
691 event_name, (int)status));
692 }
693 break;
694
05dc0f43
AS
695 case BRCMF_E_BEACON_RX:
696 if (status == BRCMF_E_STATUS_SUCCESS) {
cf2b4488 697 DHD_EVENT(("MACEVENT: %s, SUCCESS\n", event_name));
05dc0f43 698 } else if (status == BRCMF_E_STATUS_FAIL) {
cf2b4488
HP
699 DHD_EVENT(("MACEVENT: %s, FAIL\n", event_name));
700 } else {
701 DHD_EVENT(("MACEVENT: %s, status %d\n", event_name,
702 status));
703 }
704 break;
705
05dc0f43 706 case BRCMF_E_LINK:
cf2b4488
HP
707 DHD_EVENT(("MACEVENT: %s %s\n", event_name,
708 link ? "UP" : "DOWN"));
709 break;
710
05dc0f43 711 case BRCMF_E_MIC_ERROR:
cf2b4488
HP
712 DHD_EVENT(("MACEVENT: %s, MAC %s, Group %d, Flush %d\n",
713 event_name, eabuf, group, flush_txq));
714 break;
715
05dc0f43
AS
716 case BRCMF_E_ICV_ERROR:
717 case BRCMF_E_UNICAST_DECODE_ERROR:
718 case BRCMF_E_MULTICAST_DECODE_ERROR:
cf2b4488
HP
719 DHD_EVENT(("MACEVENT: %s, MAC %s\n", event_name, eabuf));
720 break;
721
05dc0f43 722 case BRCMF_E_TXFAIL:
cf2b4488
HP
723 DHD_EVENT(("MACEVENT: %s, RA %s\n", event_name, eabuf));
724 break;
725
05dc0f43
AS
726 case BRCMF_E_SCAN_COMPLETE:
727 case BRCMF_E_PMKID_CACHE:
cf2b4488
HP
728 DHD_EVENT(("MACEVENT: %s\n", event_name));
729 break;
730
05dc0f43
AS
731 case BRCMF_E_PFN_NET_FOUND:
732 case BRCMF_E_PFN_NET_LOST:
733 case BRCMF_E_PFN_SCAN_COMPLETE:
cf2b4488
HP
734 DHD_EVENT(("PNOEVENT: %s\n", event_name));
735 break;
736
05dc0f43
AS
737 case BRCMF_E_PSK_SUP:
738 case BRCMF_E_PRUNE:
cf2b4488
HP
739 DHD_EVENT(("MACEVENT: %s, status %d, reason %d\n",
740 event_name, (int)status, (int)reason));
741 break;
742
05dc0f43 743 case BRCMF_E_TRACE:
cf2b4488 744 {
66cbd3ab 745 static u32 seqnum_prev;
86c01843 746 struct msgtrace_hdr hdr;
66cbd3ab 747 u32 nblost;
cf2b4488
HP
748 char *s, *p;
749
580a0bd9 750 buf = (unsigned char *) event_data;
86c01843 751 memcpy(&hdr, buf, sizeof(struct msgtrace_hdr));
cf2b4488
HP
752
753 if (hdr.version != MSGTRACE_VERSION) {
0bef7748 754 DHD_ERROR(
cf2b4488
HP
755 ("\nMACEVENT: %s [unsupported version --> "
756 "dhd version:%d dongle version:%d]\n",
0bef7748
AS
757 event_name, MSGTRACE_VERSION, hdr.version)
758 );
cf2b4488
HP
759 /* Reset datalen to avoid display below */
760 datalen = 0;
761 break;
762 }
763
764 /* There are 2 bytes available at the end of data */
86c01843
FL
765 *(buf + sizeof(struct msgtrace_hdr)
766 + be16_to_cpu(hdr.len)) = '\0';
cf2b4488 767
628f10ba
SF
768 if (be32_to_cpu(hdr.discarded_bytes)
769 || be32_to_cpu(hdr.discarded_printf)) {
0bef7748 770 DHD_ERROR(
cf2b4488
HP
771 ("\nWLC_E_TRACE: [Discarded traces in dongle -->"
772 "discarded_bytes %d discarded_printf %d]\n",
628f10ba
SF
773 be32_to_cpu(hdr.discarded_bytes),
774 be32_to_cpu(hdr.discarded_printf)));
cf2b4488
HP
775 }
776
628f10ba 777 nblost = be32_to_cpu(hdr.seqnum) - seqnum_prev - 1;
cf2b4488 778 if (nblost > 0) {
0bef7748 779 DHD_ERROR(
cf2b4488 780 ("\nWLC_E_TRACE: [Event lost --> seqnum %d nblost %d\n",
628f10ba 781 be32_to_cpu(hdr.seqnum), nblost));
cf2b4488 782 }
628f10ba 783 seqnum_prev = be32_to_cpu(hdr.seqnum);
cf2b4488
HP
784
785 /* Display the trace buffer. Advance from \n to \n to
786 * avoid display big
787 * printf (issue with Linux printk )
788 */
86c01843 789 p = (char *)&buf[sizeof(struct msgtrace_hdr)];
cf2b4488
HP
790 while ((s = strstr(p, "\n")) != NULL) {
791 *s = '\0';
0bef7748 792 printk(KERN_DEBUG"%s\n", p);
cf2b4488
HP
793 p = s + 1;
794 }
0bef7748 795 printk(KERN_DEBUG "%s\n", p);
cf2b4488
HP
796
797 /* Reset datalen to avoid display below */
798 datalen = 0;
799 }
800 break;
801
05dc0f43 802 case BRCMF_E_RSSI:
cf2b4488 803 DHD_EVENT(("MACEVENT: %s %d\n", event_name,
628f10ba 804 be32_to_cpu(*((int *)event_data))));
cf2b4488
HP
805 break;
806
807 default:
808 DHD_EVENT(("MACEVENT: %s %d, MAC %s, status %d, reason %d, "
809 "auth %d\n", event_name, event_type, eabuf,
810 (int)status, (int)reason, (int)auth_type));
811 break;
812 }
813
814 /* show any appended data */
815 if (datalen) {
580a0bd9 816 buf = (unsigned char *) event_data;
cf2b4488
HP
817 DHD_EVENT((" data (%d) : ", datalen));
818 for (i = 0; i < datalen; i++)
819 DHD_EVENT((" 0x%02x ", *buf++));
820 DHD_EVENT(("\n"));
821 }
822}
823#endif /* SHOW_EVENTS */
824
825int
aba5e0ad 826brcmf_c_host_event(struct dhd_info *dhd, int *ifidx, void *pktdata,
05dc0f43 827 brcmf_event_msg_t *event, void **data_ptr)
cf2b4488
HP
828{
829 /* check whether packet is a BRCM event pkt */
05dc0f43 830 brcmf_event_t *pvt_data = (brcmf_event_t *) pktdata;
cf2b4488 831 char *event_data;
66cbd3ab 832 u32 type, status;
7d4df48e 833 u16 flags;
cf2b4488
HP
834 int evlen;
835
05dc0f43 836 if (memcmp(BRCM_OUI, &pvt_data->hdr.oui[0], DOT11_OUI_LEN)) {
cf2b4488 837 DHD_ERROR(("%s: mismatched OUI, bailing\n", __func__));
b74ac12e 838 return -EBADE;
cf2b4488
HP
839 }
840
841 /* BRCM event pkt may be unaligned - use xxx_ua to load user_subtype. */
05dc0f43 842 if (get_unaligned_be16(&pvt_data->hdr.usr_subtype) !=
cf2b4488
HP
843 BCMILCP_BCM_SUBTYPE_EVENT) {
844 DHD_ERROR(("%s: mismatched subtype, bailing\n", __func__));
b74ac12e 845 return -EBADE;
cf2b4488
HP
846 }
847
848 *data_ptr = &pvt_data[1];
849 event_data = *data_ptr;
850
851 /* memcpy since BRCM event pkt may be unaligned. */
05dc0f43 852 memcpy(event, &pvt_data->msg, sizeof(brcmf_event_msg_t));
cf2b4488 853
56dfe3c7
SF
854 type = get_unaligned_be32(&event->event_type);
855 flags = get_unaligned_be16(&event->flags);
856 status = get_unaligned_be32(&event->status);
05dc0f43 857 evlen = get_unaligned_be32(&event->datalen) + sizeof(brcmf_event_t);
cf2b4488
HP
858
859 switch (type) {
05dc0f43 860 case BRCMF_E_IF:
cf2b4488
HP
861 {
862 dhd_if_event_t *ifevent = (dhd_if_event_t *) event_data;
863 DHD_TRACE(("%s: if event\n", __func__));
864
865 if (ifevent->ifidx > 0 &&
866 ifevent->ifidx < DHD_MAX_IFS) {
05dc0f43 867 if (ifevent->action == BRCMF_E_IF_ADD)
cf2b4488
HP
868 dhd_add_if(dhd, ifevent->ifidx,
869 NULL, event->ifname,
e2582ad8 870 pvt_data->eth.h_dest,
cf2b4488
HP
871 ifevent->flags,
872 ifevent->bssidx);
873 else
874 dhd_del_if(dhd, ifevent->ifidx);
875 } else {
876 DHD_ERROR(("%s: Invalid ifidx %d for %s\n",
877 __func__, ifevent->ifidx,
878 event->ifname));
879 }
880 }
881 /* send up the if event: btamp user needs it */
882 *ifidx = dhd_ifname2idx(dhd, event->ifname);
883 /* push up to external supp/auth */
884 dhd_event(dhd, (char *)pvt_data, evlen, *ifidx);
885 break;
886
887#ifdef P2P
05dc0f43 888 case BRCMF_E_NDIS_LINK:
cf2b4488
HP
889 break;
890#endif
891 /* fall through */
892 /* These are what external supplicant/authenticator wants */
05dc0f43
AS
893 case BRCMF_E_LINK:
894 case BRCMF_E_ASSOC_IND:
895 case BRCMF_E_REASSOC_IND:
896 case BRCMF_E_DISASSOC_IND:
897 case BRCMF_E_MIC_ERROR:
cf2b4488
HP
898 default:
899 /* Fall through: this should get _everything_ */
900
901 *ifidx = dhd_ifname2idx(dhd, event->ifname);
902 /* push up to external supp/auth */
903 dhd_event(dhd, (char *)pvt_data, evlen, *ifidx);
904 DHD_TRACE(("%s: MAC event %d, flags %x, status %x\n",
905 __func__, type, flags, status));
906
05dc0f43
AS
907 /* put it back to BRCMF_E_NDIS_LINK */
908 if (type == BRCMF_E_NDIS_LINK) {
66cbd3ab 909 u32 temp;
cf2b4488 910
56dfe3c7 911 temp = get_unaligned_be32(&event->event_type);
cf2b4488
HP
912 DHD_TRACE(("Converted to WLC_E_LINK type %d\n", temp));
913
05dc0f43
AS
914 temp = be32_to_cpu(BRCMF_E_NDIS_LINK);
915 memcpy((void *)(&pvt_data->msg.event_type), &temp,
916 sizeof(pvt_data->msg.event_type));
cf2b4488
HP
917 }
918 break;
919 }
920
921#ifdef SHOW_EVENTS
aba5e0ad 922 brcmf_c_show_host_event(event, event_data);
cf2b4488
HP
923#endif /* SHOW_EVENTS */
924
a1c5ad81 925 return 0;
cf2b4488
HP
926}
927
cf2b4488 928/* Convert user's input in hex pattern to byte-size mask */
aba5e0ad 929static int brcmf_c_pattern_atoh(char *src, char *dst)
cf2b4488
HP
930{
931 int i;
932 if (strncmp(src, "0x", 2) != 0 && strncmp(src, "0X", 2) != 0) {
933 DHD_ERROR(("Mask invalid format. Needs to start with 0x\n"));
934 return -1;
935 }
936 src = src + 2; /* Skip past 0x */
937 if (strlen(src) % 2 != 0) {
938 DHD_ERROR(("Mask invalid format. Length must be even.\n"));
939 return -1;
940 }
941 for (i = 0; *src != '\0'; i++) {
942 char num[3];
943 strncpy(num, src, 2);
944 num[2] = '\0';
d5642d3b 945 dst[i] = (u8) simple_strtoul(num, NULL, 16);
cf2b4488
HP
946 src += 2;
947 }
948 return i;
949}
950
951void
aba5e0ad 952brcmf_c_pktfilter_offload_enable(dhd_pub_t *dhd, char *arg, int enable,
cf2b4488
HP
953 int master_mode)
954{
955 char *argv[8];
956 int i = 0;
957 const char *str;
958 int buf_len;
959 int str_len;
960 char *arg_save = 0, *arg_org = 0;
961 int rc;
962 char buf[128];
963 wl_pkt_filter_enable_t enable_parm;
964 wl_pkt_filter_enable_t *pkt_filterp;
965
5fcc1fcb 966 arg_save = kmalloc(strlen(arg) + 1, GFP_ATOMIC);
b229fad2 967 if (!arg_save) {
cf2b4488
HP
968 DHD_ERROR(("%s: kmalloc failed\n", __func__));
969 goto fail;
970 }
971 arg_org = arg_save;
972 memcpy(arg_save, arg, strlen(arg) + 1);
973
d5642d3b 974 argv[i] = strsep(&arg_save, " ");
cf2b4488
HP
975
976 i = 0;
977 if (NULL == argv[i]) {
978 DHD_ERROR(("No args provided\n"));
979 goto fail;
980 }
981
982 str = "pkt_filter_enable";
983 str_len = strlen(str);
984 strncpy(buf, str, str_len);
985 buf[str_len] = '\0';
986 buf_len = str_len + 1;
987
988 pkt_filterp = (wl_pkt_filter_enable_t *) (buf + str_len + 1);
989
990 /* Parse packet filter id. */
29750b90 991 enable_parm.id = simple_strtoul(argv[i], NULL, 0);
cf2b4488
HP
992
993 /* Parse enable/disable value. */
29750b90 994 enable_parm.enable = enable;
cf2b4488
HP
995
996 buf_len += sizeof(enable_parm);
997 memcpy((char *)pkt_filterp, &enable_parm, sizeof(enable_parm));
998
999 /* Enable/disable the specified filter. */
366bbb3f 1000 rc = dhdcdc_set_ioctl(dhd, 0, BRCMF_C_SET_VAR, buf, buf_len);
cf2b4488
HP
1001 rc = rc >= 0 ? 0 : rc;
1002 if (rc)
1003 DHD_TRACE(("%s: failed to add pktfilter %s, retcode = %d\n",
1004 __func__, arg, rc));
1005 else
1006 DHD_TRACE(("%s: successfully added pktfilter %s\n",
1007 __func__, arg));
1008
1009 /* Contorl the master mode */
67ad48bc 1010 brcmu_mkiovar("pkt_filter_mode", (char *)&master_mode, 4, buf,
cf2b4488 1011 sizeof(buf));
366bbb3f 1012 rc = dhdcdc_set_ioctl(dhd, 0, BRCMF_C_SET_VAR, buf, sizeof(buf));
cf2b4488
HP
1013 rc = rc >= 0 ? 0 : rc;
1014 if (rc)
1015 DHD_TRACE(("%s: failed to add pktfilter %s, retcode = %d\n",
1016 __func__, arg, rc));
1017
1018fail:
46d994b1 1019 kfree(arg_org);
cf2b4488
HP
1020}
1021
aba5e0ad 1022void brcmf_c_pktfilter_offload_set(dhd_pub_t *dhd, char *arg)
cf2b4488
HP
1023{
1024 const char *str;
1025 wl_pkt_filter_t pkt_filter;
1026 wl_pkt_filter_t *pkt_filterp;
1027 int buf_len;
1028 int str_len;
1029 int rc;
66cbd3ab
GKH
1030 u32 mask_size;
1031 u32 pattern_size;
cf2b4488
HP
1032 char *argv[8], *buf = 0;
1033 int i = 0;
1034 char *arg_save = 0, *arg_org = 0;
1035#define BUF_SIZE 2048
1036
5fcc1fcb 1037 arg_save = kmalloc(strlen(arg) + 1, GFP_ATOMIC);
81e95f9d 1038 if (!arg_save) {
cf2b4488
HP
1039 DHD_ERROR(("%s: kmalloc failed\n", __func__));
1040 goto fail;
1041 }
1042
1043 arg_org = arg_save;
1044
5fcc1fcb 1045 buf = kmalloc(BUF_SIZE, GFP_ATOMIC);
81e95f9d 1046 if (!buf) {
cf2b4488
HP
1047 DHD_ERROR(("%s: kmalloc failed\n", __func__));
1048 goto fail;
1049 }
1050
1051 memcpy(arg_save, arg, strlen(arg) + 1);
1052
1053 if (strlen(arg) > BUF_SIZE) {
1054 DHD_ERROR(("Not enough buffer %d < %d\n", (int)strlen(arg),
1055 (int)sizeof(buf)));
1056 goto fail;
1057 }
1058
d5642d3b 1059 argv[i] = strsep(&arg_save, " ");
cf2b4488 1060 while (argv[i++])
d5642d3b 1061 argv[i] = strsep(&arg_save, " ");
cf2b4488
HP
1062
1063 i = 0;
1064 if (NULL == argv[i]) {
1065 DHD_ERROR(("No args provided\n"));
1066 goto fail;
1067 }
1068
1069 str = "pkt_filter_add";
1070 str_len = strlen(str);
1071 strncpy(buf, str, str_len);
1072 buf[str_len] = '\0';
1073 buf_len = str_len + 1;
1074
1075 pkt_filterp = (wl_pkt_filter_t *) (buf + str_len + 1);
1076
1077 /* Parse packet filter id. */
29750b90 1078 pkt_filter.id = simple_strtoul(argv[i], NULL, 0);
cf2b4488
HP
1079
1080 if (NULL == argv[++i]) {
1081 DHD_ERROR(("Polarity not provided\n"));
1082 goto fail;
1083 }
1084
1085 /* Parse filter polarity. */
29750b90 1086 pkt_filter.negate_match = simple_strtoul(argv[i], NULL, 0);
cf2b4488
HP
1087
1088 if (NULL == argv[++i]) {
1089 DHD_ERROR(("Filter type not provided\n"));
1090 goto fail;
1091 }
1092
1093 /* Parse filter type. */
29750b90 1094 pkt_filter.type = simple_strtoul(argv[i], NULL, 0);
cf2b4488
HP
1095
1096 if (NULL == argv[++i]) {
1097 DHD_ERROR(("Offset not provided\n"));
1098 goto fail;
1099 }
1100
1101 /* Parse pattern filter offset. */
29750b90 1102 pkt_filter.u.pattern.offset = simple_strtoul(argv[i], NULL, 0);
cf2b4488
HP
1103
1104 if (NULL == argv[++i]) {
1105 DHD_ERROR(("Bitmask not provided\n"));
1106 goto fail;
1107 }
1108
1109 /* Parse pattern filter mask. */
1110 mask_size =
aba5e0ad 1111 brcmf_c_pattern_atoh
29750b90 1112 (argv[i], (char *)pkt_filterp->u.pattern.mask_and_pattern);
cf2b4488
HP
1113
1114 if (NULL == argv[++i]) {
1115 DHD_ERROR(("Pattern not provided\n"));
1116 goto fail;
1117 }
1118
1119 /* Parse pattern filter pattern. */
1120 pattern_size =
aba5e0ad 1121 brcmf_c_pattern_atoh(argv[i],
cf2b4488 1122 (char *)&pkt_filterp->u.pattern.
29750b90 1123 mask_and_pattern[mask_size]);
cf2b4488
HP
1124
1125 if (mask_size != pattern_size) {
1126 DHD_ERROR(("Mask and pattern not the same size\n"));
1127 goto fail;
1128 }
1129
1130 pkt_filter.u.pattern.size_bytes = mask_size;
1131 buf_len += WL_PKT_FILTER_FIXED_LEN;
1132 buf_len += (WL_PKT_FILTER_PATTERN_FIXED_LEN + 2 * mask_size);
1133
1134 /* Keep-alive attributes are set in local
1135 * variable (keep_alive_pkt), and
1136 ** then memcpy'ed into buffer (keep_alive_pktp) since there is no
1137 ** guarantee that the buffer is properly aligned.
1138 */
1139 memcpy((char *)pkt_filterp,
1140 &pkt_filter,
1141 WL_PKT_FILTER_FIXED_LEN + WL_PKT_FILTER_PATTERN_FIXED_LEN);
1142
366bbb3f 1143 rc = dhdcdc_set_ioctl(dhd, 0, BRCMF_C_SET_VAR, buf, buf_len);
cf2b4488
HP
1144 rc = rc >= 0 ? 0 : rc;
1145
1146 if (rc)
1147 DHD_TRACE(("%s: failed to add pktfilter %s, retcode = %d\n",
1148 __func__, arg, rc));
1149 else
1150 DHD_TRACE(("%s: successfully added pktfilter %s\n",
1151 __func__, arg));
1152
1153fail:
46d994b1 1154 kfree(arg_org);
cf2b4488 1155
46d994b1 1156 kfree(buf);
cf2b4488
HP
1157}
1158
aba5e0ad 1159void brcmf_c_arp_offload_set(dhd_pub_t *dhd, int arp_mode)
cf2b4488
HP
1160{
1161 char iovbuf[32];
1162 int retcode;
1163
67ad48bc 1164 brcmu_mkiovar("arp_ol", (char *)&arp_mode, 4, iovbuf, sizeof(iovbuf));
366bbb3f
AS
1165 retcode = dhdcdc_set_ioctl(dhd, 0, BRCMF_C_SET_VAR,
1166 iovbuf, sizeof(iovbuf));
cf2b4488
HP
1167 retcode = retcode >= 0 ? 0 : retcode;
1168 if (retcode)
1169 DHD_TRACE(("%s: failed to set ARP offload mode to 0x%x, "
1170 "retcode = %d\n", __func__, arp_mode, retcode));
1171 else
1172 DHD_TRACE(("%s: successfully set ARP offload mode to 0x%x\n",
1173 __func__, arp_mode));
1174}
1175
aba5e0ad 1176void brcmf_c_arp_offload_enable(dhd_pub_t *dhd, int arp_enable)
cf2b4488
HP
1177{
1178 char iovbuf[32];
1179 int retcode;
1180
67ad48bc 1181 brcmu_mkiovar("arpoe", (char *)&arp_enable, 4, iovbuf, sizeof(iovbuf));
366bbb3f
AS
1182 retcode = dhdcdc_set_ioctl(dhd, 0, BRCMF_C_SET_VAR,
1183 iovbuf, sizeof(iovbuf));
cf2b4488
HP
1184 retcode = retcode >= 0 ? 0 : retcode;
1185 if (retcode)
1186 DHD_TRACE(("%s: failed to enabe ARP offload to %d, "
1187 "retcode = %d\n", __func__, arp_enable, retcode));
1188 else
1189 DHD_TRACE(("%s: successfully enabed ARP offload to %d\n",
1190 __func__, arp_enable));
1191}
1192
aba5e0ad 1193int brcmf_c_preinit_ioctls(dhd_pub_t *dhd)
cf2b4488
HP
1194{
1195 char iovbuf[WL_EVENTING_MASK_LEN + 12]; /* Room for
1196 "event_msgs" + '\0' + bitvec */
1197 uint up = 0;
1198 char buf[128], *ptr;
1199 uint power_mode = PM_FAST;
66cbd3ab
GKH
1200 u32 dongle_align = DHD_SDALIGN;
1201 u32 glom = 0;
cf2b4488
HP
1202 uint bcn_timeout = 3;
1203 int scan_assoc_time = 40;
1204 int scan_unassoc_time = 40;
1205#ifdef GET_CUSTOM_MAC_ENABLE
1206 int ret = 0;
a44d4236 1207 u8 ea_addr[ETH_ALEN];
cf2b4488
HP
1208#endif /* GET_CUSTOM_MAC_ENABLE */
1209
1210 dhd_os_proto_block(dhd);
1211
1212#ifdef GET_CUSTOM_MAC_ENABLE
1213 /* Read MAC address from external customer place
1214 ** NOTE that default mac address has to be present in
1215 ** otp or nvram file to bring up
1216 ** firmware but unique per board mac address maybe provided by
1217 ** customer code
1218 */
a44d4236 1219 ret = dhd_custom_get_mac_address(ea_addr);
cf2b4488 1220 if (!ret) {
67ad48bc 1221 brcmu_mkiovar("cur_etheraddr", (void *)ea_addr, ETH_ALEN,
cf2b4488 1222 buf, sizeof(buf));
366bbb3f
AS
1223 ret = dhdcdc_set_ioctl(dhd, 0, BRCMF_C_SET_VAR,
1224 buf, sizeof(buf));
cf2b4488
HP
1225 if (ret < 0) {
1226 DHD_ERROR(("%s: can't set MAC address , error=%d\n",
1227 __func__, ret));
1228 } else
1229 memcpy(dhd->mac.octet, (void *)&ea_addr,
b8d63078 1230 ETH_ALEN);
cf2b4488
HP
1231 }
1232#endif /* GET_CUSTOM_MAC_ENABLE */
1233
1234 /* Set Country code */
1235 if (dhd->country_code[0] != 0) {
366bbb3f 1236 if (dhdcdc_set_ioctl(dhd, 0, BRCMF_C_SET_COUNTRY,
cf2b4488
HP
1237 dhd->country_code,
1238 sizeof(dhd->country_code)) < 0) {
1239 DHD_ERROR(("%s: country code setting failed\n",
1240 __func__));
1241 }
1242 }
1243
1244 /* query for 'ver' to get version info from firmware */
1245 memset(buf, 0, sizeof(buf));
1246 ptr = buf;
67ad48bc 1247 brcmu_mkiovar("ver", 0, 0, buf, sizeof(buf));
366bbb3f 1248 dhdcdc_query_ioctl(dhd, 0, BRCMF_C_GET_VAR, buf, sizeof(buf));
d5642d3b 1249 strsep(&ptr, "\n");
cf2b4488
HP
1250 /* Print fw version info */
1251 DHD_ERROR(("Firmware version = %s\n", buf));
1252
1253 /* Set PowerSave mode */
366bbb3f 1254 dhdcdc_set_ioctl(dhd, 0, BRCMF_C_SET_PM, (char *)&power_mode,
cf2b4488
HP
1255 sizeof(power_mode));
1256
1257 /* Match Host and Dongle rx alignment */
67ad48bc 1258 brcmu_mkiovar("bus:txglomalign", (char *)&dongle_align, 4, iovbuf,
cf2b4488 1259 sizeof(iovbuf));
366bbb3f 1260 dhdcdc_set_ioctl(dhd, 0, BRCMF_C_SET_VAR, iovbuf, sizeof(iovbuf));
cf2b4488
HP
1261
1262 /* disable glom option per default */
67ad48bc 1263 brcmu_mkiovar("bus:txglom", (char *)&glom, 4, iovbuf, sizeof(iovbuf));
366bbb3f 1264 dhdcdc_set_ioctl(dhd, 0, BRCMF_C_SET_VAR, iovbuf, sizeof(iovbuf));
cf2b4488
HP
1265
1266 /* Setup timeout if Beacons are lost and roam is off to report
1267 link down */
67ad48bc 1268 brcmu_mkiovar("bcn_timeout", (char *)&bcn_timeout, 4, iovbuf,
cf2b4488 1269 sizeof(iovbuf));
366bbb3f 1270 dhdcdc_set_ioctl(dhd, 0, BRCMF_C_SET_VAR, iovbuf, sizeof(iovbuf));
cf2b4488
HP
1271
1272 /* Enable/Disable build-in roaming to allowed ext supplicant to take
1273 of romaing */
67ad48bc 1274 brcmu_mkiovar("roam_off", (char *)&dhd_roam, 4, iovbuf, sizeof(iovbuf));
366bbb3f 1275 dhdcdc_set_ioctl(dhd, 0, BRCMF_C_SET_VAR, iovbuf, sizeof(iovbuf));
cf2b4488
HP
1276
1277 /* Force STA UP */
1278 if (dhd_radio_up)
366bbb3f 1279 dhdcdc_set_ioctl(dhd, 0, BRCMF_C_UP, (char *)&up, sizeof(up));
cf2b4488
HP
1280
1281 /* Setup event_msgs */
67ad48bc
RV
1282 brcmu_mkiovar("event_msgs", dhd->eventmask, WL_EVENTING_MASK_LEN,
1283 iovbuf, sizeof(iovbuf));
366bbb3f 1284 dhdcdc_set_ioctl(dhd, 0, BRCMF_C_SET_VAR, iovbuf, sizeof(iovbuf));
cf2b4488 1285
366bbb3f 1286 dhdcdc_set_ioctl(dhd, 0, BRCMF_C_SET_SCAN_CHANNEL_TIME,
cf2b4488 1287 (char *)&scan_assoc_time, sizeof(scan_assoc_time));
366bbb3f 1288 dhdcdc_set_ioctl(dhd, 0, BRCMF_C_SET_SCAN_UNASSOC_TIME,
cf2b4488
HP
1289 (char *)&scan_unassoc_time, sizeof(scan_unassoc_time));
1290
1291#ifdef ARP_OFFLOAD_SUPPORT
1292 /* Set and enable ARP offload feature */
1293 if (dhd_arp_enable)
aba5e0ad
AS
1294 brcmf_c_arp_offload_set(dhd, dhd_arp_mode);
1295 brcmf_c_arp_offload_enable(dhd, dhd_arp_enable);
cf2b4488
HP
1296#endif /* ARP_OFFLOAD_SUPPORT */
1297
1298#ifdef PKT_FILTER_SUPPORT
1299 {
1300 int i;
1301 /* Set up pkt filter */
1302 if (dhd_pkt_filter_enable) {
1303 for (i = 0; i < dhd->pktfilter_count; i++) {
aba5e0ad 1304 brcmf_c_pktfilter_offload_set(dhd,
cf2b4488 1305 dhd->pktfilter[i]);
aba5e0ad 1306 brcmf_c_pktfilter_offload_enable(dhd,
cf2b4488
HP
1307 dhd->pktfilter[i],
1308 dhd_pkt_filter_init,
1309 dhd_master_mode);
1310 }
1311 }
1312 }
1313#endif /* PKT_FILTER_SUPPORT */
1314
1315 dhd_os_proto_unblock(dhd);
1316
1317 return 0;
1318}
1319
1320#ifdef SIMPLE_ISCAN
1321uint iscan_thread_id;
6998d337 1322iscan_buf_t *iscan_chain;
cf2b4488
HP
1323
1324iscan_buf_t *dhd_iscan_allocate_buf(dhd_pub_t *dhd, iscan_buf_t **iscanbuf)
1325{
1326 iscan_buf_t *iscanbuf_alloc = 0;
1327 iscan_buf_t *iscanbuf_head;
1328
1329 dhd_iscan_lock();
1330
5fcc1fcb 1331 iscanbuf_alloc = kmalloc(sizeof(iscan_buf_t), GFP_ATOMIC);
cf2b4488
HP
1332 if (iscanbuf_alloc == NULL)
1333 goto fail;
1334
1335 iscanbuf_alloc->next = NULL;
1336 iscanbuf_head = *iscanbuf;
1337
1338 DHD_ISCAN(("%s: addr of allocated node = 0x%X"
1339 "addr of iscanbuf_head = 0x%X dhd = 0x%X\n",
1340 __func__, iscanbuf_alloc, iscanbuf_head, dhd));
1341
1342 if (iscanbuf_head == NULL) {
1343 *iscanbuf = iscanbuf_alloc;
1344 DHD_ISCAN(("%s: Head is allocated\n", __func__));
1345 goto fail;
1346 }
1347
1348 while (iscanbuf_head->next)
1349 iscanbuf_head = iscanbuf_head->next;
1350
1351 iscanbuf_head->next = iscanbuf_alloc;
1352
1353fail:
1354 dhd_iscan_unlock();
1355 return iscanbuf_alloc;
1356}
1357
1358void dhd_iscan_free_buf(void *dhdp, iscan_buf_t *iscan_delete)
1359{
1360 iscan_buf_t *iscanbuf_free = 0;
1361 iscan_buf_t *iscanbuf_prv = 0;
1362 iscan_buf_t *iscanbuf_cur = iscan_chain;
1363 dhd_pub_t *dhd = dhd_bus_pub(dhdp);
1364
1365 dhd_iscan_lock();
1366 /* If iscan_delete is null then delete the entire
1367 * chain or else delete specific one provided
1368 */
1369 if (!iscan_delete) {
1370 while (iscanbuf_cur) {
1371 iscanbuf_free = iscanbuf_cur;
1372 iscanbuf_cur = iscanbuf_cur->next;
1373 iscanbuf_free->next = 0;
182acb3c 1374 kfree(iscanbuf_free);
cf2b4488
HP
1375 }
1376 iscan_chain = 0;
1377 } else {
1378 while (iscanbuf_cur) {
1379 if (iscanbuf_cur == iscan_delete)
1380 break;
1381 iscanbuf_prv = iscanbuf_cur;
1382 iscanbuf_cur = iscanbuf_cur->next;
1383 }
1384 if (iscanbuf_prv)
1385 iscanbuf_prv->next = iscan_delete->next;
1386
1387 iscan_delete->next = 0;
182acb3c 1388 kfree(iscan_delete);
cf2b4488
HP
1389
1390 if (!iscanbuf_prv)
1391 iscan_chain = 0;
1392 }
1393 dhd_iscan_unlock();
1394}
1395
1396iscan_buf_t *dhd_iscan_result_buf(void)
1397{
1398 return iscan_chain;
1399}
1400
1401/*
1402* print scan cache
1403* print partial iscan_skip list differently
1404*/
1405int dhd_iscan_print_cache(iscan_buf_t *iscan_skip)
1406{
1407 int i = 0, l = 0;
1408 iscan_buf_t *iscan_cur;
1409 wl_iscan_results_t *list;
1410 wl_scan_results_t *results;
1411 wl_bss_info_t UNALIGNED *bi;
1412
1413 dhd_iscan_lock();
1414
1415 iscan_cur = dhd_iscan_result_buf();
1416
1417 while (iscan_cur) {
1418 list = (wl_iscan_results_t *)iscan_cur->iscan_buf;
1419 if (!list)
1420 break;
1421
1422 results = (wl_scan_results_t *)&list->results;
1423 if (!results)
1424 break;
1425
1426 if (results->version != WL_BSS_INFO_VERSION) {
1427 DHD_ISCAN(("%s: results->version %d != "
1428 "WL_BSS_INFO_VERSION\n",
1429 __func__, results->version));
1430 goto done;
1431 }
1432
1433 bi = results->bss_info;
1434 for (i = 0; i < results->count; i++) {
1435 if (!bi)
1436 break;
1437
1438 DHD_ISCAN(("%s[%2.2d:%2.2d] %X:%X:%X:%X:%X:%X\n",
1439 iscan_cur != iscan_skip ? "BSS" : "bss", l,
1440 i, bi->BSSID.octet[0], bi->BSSID.octet[1],
1441 bi->BSSID.octet[2], bi->BSSID.octet[3],
1442 bi->BSSID.octet[4], bi->BSSID.octet[5]));
1443
29750b90 1444 bi = (wl_bss_info_t *)((unsigned long)bi + bi->length);
cf2b4488
HP
1445 }
1446 iscan_cur = iscan_cur->next;
1447 l++;
1448 }
1449
1450done:
1451 dhd_iscan_unlock();
1452 return 0;
1453}
1454
1455/*
1456* delete disappeared AP from specific scan cache but skip partial
1457* list in iscan_skip
1458*/
1459int dhd_iscan_delete_bss(void *dhdp, void *addr, iscan_buf_t *iscan_skip)
1460{
1461 int i = 0, j = 0, l = 0;
1462 iscan_buf_t *iscan_cur;
1463 wl_iscan_results_t *list;
1464 wl_scan_results_t *results;
1465 wl_bss_info_t UNALIGNED *bi, *bi_new, *bi_next;
1466
580a0bd9 1467 unsigned char *s_addr = addr;
cf2b4488
HP
1468
1469 dhd_iscan_lock();
1470 DHD_ISCAN(("%s: BSS to remove %X:%X:%X:%X:%X:%X\n",
1471 __func__, s_addr[0], s_addr[1], s_addr[2],
1472 s_addr[3], s_addr[4], s_addr[5]));
1473
1474 iscan_cur = dhd_iscan_result_buf();
1475
1476 while (iscan_cur) {
1477 if (iscan_cur != iscan_skip) {
1478 list = (wl_iscan_results_t *)iscan_cur->iscan_buf;
1479 if (!list)
1480 break;
1481
1482 results = (wl_scan_results_t *)&list->results;
1483 if (!results)
1484 break;
1485
1486 if (results->version != WL_BSS_INFO_VERSION) {
1487 DHD_ERROR(("%s: results->version %d != "
1488 "WL_BSS_INFO_VERSION\n",
1489 __func__, results->version));
1490 goto done;
1491 }
1492
1493 bi = results->bss_info;
1494 for (i = 0; i < results->count; i++) {
1495 if (!bi)
1496 break;
1497
1498 if (!memcmp
b8d63078 1499 (bi->BSSID.octet, addr, ETH_ALEN)) {
cf2b4488
HP
1500 DHD_ISCAN(("%s: Del BSS[%2.2d:%2.2d] "
1501 "%X:%X:%X:%X:%X:%X\n",
1502 __func__, l, i, bi->BSSID.octet[0],
1503 bi->BSSID.octet[1], bi->BSSID.octet[2],
1504 bi->BSSID.octet[3], bi->BSSID.octet[4],
1505 bi->BSSID.octet[5]));
1506
1507 bi_new = bi;
29750b90
SF
1508 bi = (wl_bss_info_t *)((unsigned long)
1509 bi + bi->length);
cf2b4488
HP
1510/*
1511 if(bi && bi_new) {
02160695 1512 memcpy(bi_new, bi, results->buflen -
29750b90
SF
1513 bi_new->length);
1514 results->buflen -= bi_new->length;
cf2b4488
HP
1515 }
1516*/
29750b90 1517 results->buflen -= bi_new->length;
cf2b4488
HP
1518 results->count--;
1519
1520 for (j = i; j < results->count; j++) {
1521 if (bi && bi_new) {
1522 DHD_ISCAN(("%s: Moved up BSS[%2.2d:%2.2d]" "%X:%X:%X:%X:%X:%X\n",
1523 __func__, l, j,
1524 bi->BSSID.octet[0],
1525 bi->BSSID.octet[1],
1526 bi->BSSID.octet[2],
1527 bi->BSSID.octet[3],
1528 bi->BSSID.octet[4],
1529 bi->BSSID.octet[5]));
1530
1531 bi_next =
f024c48a 1532 (wl_bss_info_t *)((unsigned long)bi +
29750b90 1533 bi->length);
02160695 1534 memcpy(bi_new, bi,
29750b90 1535 bi->length);
cf2b4488 1536 bi_new =
f024c48a 1537 (wl_bss_info_t *)((unsigned long)bi_new +
29750b90
SF
1538 bi_new->
1539 length);
cf2b4488
HP
1540 bi = bi_next;
1541 }
1542 }
1543
1544 if (results->count == 0) {
1545 /* Prune now empty partial
1546 scan list */
1547 dhd_iscan_free_buf(dhdp,
1548 iscan_cur);
1549 goto done;
1550 }
1551 break;
1552 }
f024c48a 1553 bi = (wl_bss_info_t *)((unsigned long)bi +
29750b90 1554 bi->length);
cf2b4488
HP
1555 }
1556 }
1557 iscan_cur = iscan_cur->next;
1558 l++;
1559 }
1560
1561done:
1562 dhd_iscan_unlock();
1563 return 0;
1564}
1565
1566int dhd_iscan_remove_duplicates(void *dhdp, iscan_buf_t *iscan_cur)
1567{
1568 int i = 0;
1569 wl_iscan_results_t *list;
1570 wl_scan_results_t *results;
1571 wl_bss_info_t UNALIGNED *bi, *bi_new, *bi_next;
1572
1573 dhd_iscan_lock();
1574
1575 DHD_ISCAN(("%s: Scan cache before delete\n", __func__));
1576 dhd_iscan_print_cache(iscan_cur);
1577
1578 if (!iscan_cur)
1579 goto done;
1580
1581 list = (wl_iscan_results_t *)iscan_cur->iscan_buf;
1582 if (!list)
1583 goto done;
1584
1585 results = (wl_scan_results_t *)&list->results;
1586 if (!results)
1587 goto done;
1588
1589 if (results->version != WL_BSS_INFO_VERSION) {
1590 DHD_ERROR(("%s: results->version %d != WL_BSS_INFO_VERSION\n",
1591 __func__, results->version));
1592 goto done;
1593 }
1594
1595 bi = results->bss_info;
1596 for (i = 0; i < results->count; i++) {
1597 if (!bi)
1598 break;
1599
1600 DHD_ISCAN(("%s: Find dups for BSS[%2.2d] %X:%X:%X:%X:%X:%X\n",
1601 __func__, i, bi->BSSID.octet[0],
1602 bi->BSSID.octet[1], bi->BSSID.octet[2],
1603 bi->BSSID.octet[3], bi->BSSID.octet[4],
1604 bi->BSSID.octet[5]));
1605
1606 dhd_iscan_delete_bss(dhdp, bi->BSSID.octet, iscan_cur);
1607
29750b90 1608 bi = (wl_bss_info_t *)((unsigned long)bi + bi->length);
cf2b4488
HP
1609 }
1610
1611done:
1612 DHD_ISCAN(("%s: Scan cache after delete\n", __func__));
1613 dhd_iscan_print_cache(iscan_cur);
1614 dhd_iscan_unlock();
1615 return 0;
1616}
1617
1618void dhd_iscan_ind_scan_confirm(void *dhdp, bool status)
1619{
1620
1621 dhd_ind_scan_confirm(dhdp, status);
1622}
1623
7d4df48e 1624int dhd_iscan_request(void *dhdp, u16 action)
cf2b4488
HP
1625{
1626 int rc;
1627 wl_iscan_params_t params;
1628 dhd_pub_t *dhd = dhd_bus_pub(dhdp);
366bbb3f 1629 char buf[BRCMF_C_IOCTL_SMLEN];
cf2b4488
HP
1630
1631 memset(&params, 0, sizeof(wl_iscan_params_t));
b8d63078 1632 memcpy(&params.params.bssid, &ether_bcast, ETH_ALEN);
cf2b4488
HP
1633
1634 params.params.bss_type = DOT11_BSSTYPE_ANY;
1635 params.params.scan_type = DOT11_SCANTYPE_ACTIVE;
1636
29750b90
SF
1637 params.params.nprobes = -1;
1638 params.params.active_time = -1;
1639 params.params.passive_time = -1;
1640 params.params.home_time = -1;
1641 params.params.channel_num = 0;
cf2b4488 1642
29750b90
SF
1643 params.version = ISCAN_REQ_VERSION;
1644 params.action = action;
1645 params.scan_duration = 0;
cf2b4488 1646
67ad48bc 1647 brcmu_mkiovar("iscan", (char *)&params, sizeof(wl_iscan_params_t), buf,
366bbb3f
AS
1648 BRCMF_C_IOCTL_SMLEN);
1649 rc = dhd_wl_ioctl(dhdp, BRCMF_C_SET_VAR, buf, BRCMF_C_IOCTL_SMLEN);
cf2b4488
HP
1650
1651 return rc;
1652}
1653
1654static int dhd_iscan_get_partial_result(void *dhdp, uint *scan_count)
1655{
1656 wl_iscan_results_t *list_buf;
1657 wl_iscan_results_t list;
1658 wl_scan_results_t *results;
1659 iscan_buf_t *iscan_cur;
1660 int status = -1;
1661 dhd_pub_t *dhd = dhd_bus_pub(dhdp);
1662 int rc;
1663
1664 iscan_cur = dhd_iscan_allocate_buf(dhd, &iscan_chain);
1665 if (!iscan_cur) {
1666 DHD_ERROR(("%s: Failed to allocate node\n", __func__));
1667 dhd_iscan_free_buf(dhdp, 0);
1668 dhd_iscan_request(dhdp, WL_SCAN_ACTION_ABORT);
1669 goto fail;
1670 }
1671
1672 dhd_iscan_lock();
1673
1674 memset(iscan_cur->iscan_buf, 0, WLC_IW_ISCAN_MAXLEN);
1675 list_buf = (wl_iscan_results_t *) iscan_cur->iscan_buf;
1676 results = &list_buf->results;
1677 results->buflen = WL_ISCAN_RESULTS_FIXED_SIZE;
1678 results->version = 0;
1679 results->count = 0;
1680
1681 memset(&list, 0, sizeof(list));
29750b90 1682 list.results.buflen = WLC_IW_ISCAN_MAXLEN;
67ad48bc
RV
1683 brcmu_mkiovar("iscanresults", (char *)&list,
1684 WL_ISCAN_RESULTS_FIXED_SIZE,
1685 iscan_cur->iscan_buf, WLC_IW_ISCAN_MAXLEN);
366bbb3f 1686 rc = dhd_wl_ioctl(dhdp, BRCMF_C_GET_VAR, iscan_cur->iscan_buf,
cf2b4488
HP
1687 WLC_IW_ISCAN_MAXLEN);
1688
29750b90
SF
1689 results->buflen = results->buflen;
1690 results->version = results->version;
1691 *scan_count = results->count = results->count;
1692 status = list_buf->status;
cf2b4488
HP
1693
1694 dhd_iscan_unlock();
1695
1696 if (!(*scan_count))
1697 dhd_iscan_free_buf(dhdp, iscan_cur);
1698 else
1699 dhd_iscan_remove_duplicates(dhdp, iscan_cur);
1700
1701fail:
1702 return status;
1703}
1704#endif /* SIMPLE_ISCAN */
1705
1706#ifdef PNO_SUPPORT
1707int dhd_pno_clean(dhd_pub_t *dhd)
1708{
1709 char iovbuf[128];
1710 int pfn_enabled = 0;
1711 int iov_len = 0;
1712 int ret;
1713
1714 /* Disable pfn */
67ad48bc
RV
1715 iov_len = brcmu_mkiovar("pfn", (char *)&pfn_enabled, 4, iovbuf,
1716 sizeof(iovbuf));
366bbb3f 1717 ret = dhdcdc_set_ioctl(dhd, 0, BRCMF_C_SET_VAR, iovbuf, sizeof(iovbuf));
81e95f9d 1718 if (ret >= 0) {
cf2b4488 1719 /* clear pfn */
67ad48bc
RV
1720 iov_len = brcmu_mkiovar("pfnclear", 0, 0, iovbuf,
1721 sizeof(iovbuf));
cf2b4488 1722 if (iov_len) {
366bbb3f 1723 ret = dhdcdc_set_ioctl(dhd, 0, BRCMF_C_SET_VAR, iovbuf,
81e95f9d
JC
1724 iov_len);
1725 if (ret < 0) {
cf2b4488
HP
1726 DHD_ERROR(("%s failed code %d\n", __func__,
1727 ret));
1728 }
1729 } else {
1730 ret = -1;
1731 DHD_ERROR(("%s failed code %d\n", __func__, iov_len));
1732 }
1733 } else
1734 DHD_ERROR(("%s failed code %d\n", __func__, ret));
1735
1736 return ret;
1737}
1738
1739int dhd_pno_enable(dhd_pub_t *dhd, int pfn_enabled)
1740{
1741 char iovbuf[128];
1742 int ret = -1;
1743
1744 if ((!dhd) && ((pfn_enabled != 0) || (pfn_enabled != 1))) {
1745 DHD_ERROR(("%s error exit\n", __func__));
1746 return ret;
1747 }
1748
1749 /* Enable/disable PNO */
67ad48bc 1750 ret = brcmu_mkiovar("pfn", (char *)&pfn_enabled, 4, iovbuf,
81e95f9d
JC
1751 sizeof(iovbuf));
1752 if (ret > 0) {
366bbb3f 1753 ret = dhdcdc_set_ioctl(dhd, 0, BRCMF_C_SET_VAR, iovbuf,
81e95f9d
JC
1754 sizeof(iovbuf));
1755 if (ret < 0) {
cf2b4488
HP
1756 DHD_ERROR(("%s failed for error=%d\n", __func__, ret));
1757 return ret;
1758 } else {
1759 dhd->pno_enable = pfn_enabled;
1760 DHD_TRACE(("%s set pno as %d\n", __func__,
1761 dhd->pno_enable));
1762 }
1763 } else
1764 DHD_ERROR(("%s failed err=%d\n", __func__, ret));
1765
1766 return ret;
1767}
1768
1769/* Function to execute combined scan */
1770int
580a0bd9 1771dhd_pno_set(dhd_pub_t *dhd, wlc_ssid_t *ssids_local, int nssid, unsigned char scan_fr)
cf2b4488
HP
1772{
1773 int err = -1;
1774 char iovbuf[128];
1775 int k, i;
1776 wl_pfn_param_t pfn_param;
1777 wl_pfn_t pfn_element;
1778
1779 DHD_TRACE(("%s nssid=%d nchan=%d\n", __func__, nssid, scan_fr));
1780
1781 if ((!dhd) && (!ssids_local)) {
1782 DHD_ERROR(("%s error exit\n", __func__));
1783 err = -1;
1784 }
1785
1786 /* Check for broadcast ssid */
1787 for (k = 0; k < nssid; k++) {
1788 if (!ssids_local[k].SSID_len) {
1789 DHD_ERROR(("%d: Broadcast SSID is ilegal for PNO "
1790 "setting\n", k));
1791 return err;
1792 }
1793 }
1794/* #define PNO_DUMP 1 */
1795#ifdef PNO_DUMP
1796 {
1797 int j;
1798 for (j = 0; j < nssid; j++) {
1799 DHD_ERROR(("%d: scan for %s size =%d\n", j,
1800 ssids_local[j].SSID,
1801 ssids_local[j].SSID_len));
1802 }
1803 }
1804#endif /* PNO_DUMP */
1805
1806 /* clean up everything */
81e95f9d
JC
1807 err = dhd_pno_clean(dhd);
1808 if (err < 0) {
cf2b4488
HP
1809 DHD_ERROR(("%s failed error=%d\n", __func__, err));
1810 return err;
1811 }
1812 memset(&pfn_param, 0, sizeof(pfn_param));
1813 memset(&pfn_element, 0, sizeof(pfn_element));
1814
1815 /* set pfn parameters */
29750b90
SF
1816 pfn_param.version = PFN_VERSION;
1817 pfn_param.flags = (PFN_LIST_ORDER << SORT_CRITERIA_BIT);
cf2b4488
HP
1818
1819 /* set up pno scan fr */
1820 if (scan_fr != 0)
29750b90 1821 pfn_param.scan_freq = scan_fr;
cf2b4488 1822
67ad48bc 1823 brcmu_mkiovar("pfn_set", (char *)&pfn_param, sizeof(pfn_param), iovbuf,
cf2b4488 1824 sizeof(iovbuf));
366bbb3f 1825 dhdcdc_set_ioctl(dhd, 0, BRCMF_C_SET_VAR, iovbuf, sizeof(iovbuf));
cf2b4488
HP
1826
1827 /* set all pfn ssid */
1828 for (i = 0; i < nssid; i++) {
1829
29750b90 1830 pfn_element.bss_type = DOT11_BSSTYPE_INFRASTRUCTURE;
fd4bd42e 1831 pfn_element.auth = WLAN_AUTH_OPEN;
29750b90
SF
1832 pfn_element.wpa_auth = WPA_AUTH_PFN_ANY;
1833 pfn_element.wsec = 0;
1834 pfn_element.infra = 1;
cf2b4488
HP
1835
1836 memcpy((char *)pfn_element.ssid.SSID, ssids_local[i].SSID,
1837 ssids_local[i].SSID_len);
1838 pfn_element.ssid.SSID_len = ssids_local[i].SSID_len;
1839
67ad48bc 1840 err = brcmu_mkiovar("pfn_add", (char *)&pfn_element,
81e95f9d
JC
1841 sizeof(pfn_element), iovbuf, sizeof(iovbuf));
1842 if (err > 0) {
366bbb3f 1843 err = dhdcdc_set_ioctl(dhd, 0, BRCMF_C_SET_VAR, iovbuf,
81e95f9d
JC
1844 sizeof(iovbuf));
1845 if (err < 0) {
cf2b4488
HP
1846 DHD_ERROR(("%s failed for i=%d error=%d\n",
1847 __func__, i, err));
1848 return err;
1849 }
1850 } else
1851 DHD_ERROR(("%s failed err=%d\n", __func__, err));
1852 }
1853
1854 /* Enable PNO */
1855 /* dhd_pno_enable(dhd, 1); */
1856 return err;
1857}
1858
1859int dhd_pno_get_status(dhd_pub_t *dhd)
1860{
1861 int ret = -1;
1862
1863 if (!dhd)
1864 return ret;
1865 else
1866 return dhd->pno_enable;
1867}
1868
1869#endif /* PNO_SUPPORT */
1870
1871/* Androd ComboSCAN support */
This page took 0.202657 seconds and 5 git commands to generate.