1 /******************************************************************************
3 * This file is provided under a dual BSD/GPLv2 license. When using or
4 * redistributing this file, you may do so under either license.
8 * Copyright(c) 2012 - 2014 Intel Corporation. All rights reserved.
9 * Copyright(c) 2013 - 2014 Intel Mobile Communications GmbH
11 * This program is free software; you can redistribute it and/or modify
12 * it under the terms of version 2 of the GNU General Public License as
13 * published by the Free Software Foundation.
15 * This program is distributed in the hope that it will be useful, but
16 * WITHOUT ANY WARRANTY; without even the implied warranty of
17 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
18 * General Public License for more details.
20 * You should have received a copy of the GNU General Public License
21 * along with this program; if not, write to the Free Software
22 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110,
25 * The full GNU General Public License is included in this distribution
26 * in the file called COPYING.
28 * Contact Information:
29 * Intel Linux Wireless <ilw@linux.intel.com>
30 * Intel Corporation, 5200 N.E. Elam Young Parkway, Hillsboro, OR 97124-6497
34 * Copyright(c) 2012 - 2014 Intel Corporation. All rights reserved.
35 * Copyright(c) 2013 - 2014 Intel Mobile Communications GmbH
36 * All rights reserved.
38 * Redistribution and use in source and binary forms, with or without
39 * modification, are permitted provided that the following conditions
42 * * Redistributions of source code must retain the above copyright
43 * notice, this list of conditions and the following disclaimer.
44 * * Redistributions in binary form must reproduce the above copyright
45 * notice, this list of conditions and the following disclaimer in
46 * the documentation and/or other materials provided with the
48 * * Neither the name Intel Corporation nor the names of its
49 * contributors may be used to endorse or promote products derived
50 * from this software without specific prior written permission.
52 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
53 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
54 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
55 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
56 * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
57 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
58 * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
59 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
60 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
61 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
62 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
64 *****************************************************************************/
66 #include <linux/etherdevice.h>
69 #include <net/cfg80211.h>
72 #include <net/addrconf.h>
73 #include "iwl-modparams.h"
77 void iwl_mvm_set_rekey_data(struct ieee80211_hw
*hw
,
78 struct ieee80211_vif
*vif
,
79 struct cfg80211_gtk_rekey_data
*data
)
81 struct iwl_mvm
*mvm
= IWL_MAC80211_GET_MVM(hw
);
82 struct iwl_mvm_vif
*mvmvif
= iwl_mvm_vif_from_mac80211(vif
);
84 if (iwlwifi_mod_params
.sw_crypto
)
87 mutex_lock(&mvm
->mutex
);
89 memcpy(mvmvif
->rekey_data
.kek
, data
->kek
, NL80211_KEK_LEN
);
90 memcpy(mvmvif
->rekey_data
.kck
, data
->kck
, NL80211_KCK_LEN
);
91 mvmvif
->rekey_data
.replay_ctr
=
92 cpu_to_le64(be64_to_cpup((__be64
*)&data
->replay_ctr
));
93 mvmvif
->rekey_data
.valid
= true;
95 mutex_unlock(&mvm
->mutex
);
98 #if IS_ENABLED(CONFIG_IPV6)
99 void iwl_mvm_ipv6_addr_change(struct ieee80211_hw
*hw
,
100 struct ieee80211_vif
*vif
,
101 struct inet6_dev
*idev
)
103 struct iwl_mvm_vif
*mvmvif
= iwl_mvm_vif_from_mac80211(vif
);
104 struct inet6_ifaddr
*ifa
;
107 read_lock_bh(&idev
->lock
);
108 list_for_each_entry(ifa
, &idev
->addr_list
, if_list
) {
109 mvmvif
->target_ipv6_addrs
[idx
] = ifa
->addr
;
111 if (idx
>= IWL_PROTO_OFFLOAD_NUM_IPV6_ADDRS_MAX
)
114 read_unlock_bh(&idev
->lock
);
116 mvmvif
->num_target_ipv6_addrs
= idx
;
120 void iwl_mvm_set_default_unicast_key(struct ieee80211_hw
*hw
,
121 struct ieee80211_vif
*vif
, int idx
)
123 struct iwl_mvm_vif
*mvmvif
= iwl_mvm_vif_from_mac80211(vif
);
125 mvmvif
->tx_key_idx
= idx
;
128 static void iwl_mvm_convert_p1k(u16
*p1k
, __le16
*out
)
132 for (i
= 0; i
< IWL_P1K_SIZE
; i
++)
133 out
[i
] = cpu_to_le16(p1k
[i
]);
136 struct wowlan_key_data
{
137 struct iwl_wowlan_rsc_tsc_params_cmd
*rsc_tsc
;
138 struct iwl_wowlan_tkip_params_cmd
*tkip
;
139 bool error
, use_rsc_tsc
, use_tkip
;
143 static void iwl_mvm_wowlan_program_keys(struct ieee80211_hw
*hw
,
144 struct ieee80211_vif
*vif
,
145 struct ieee80211_sta
*sta
,
146 struct ieee80211_key_conf
*key
,
149 struct iwl_mvm
*mvm
= IWL_MAC80211_GET_MVM(hw
);
150 struct iwl_mvm_vif
*mvmvif
= iwl_mvm_vif_from_mac80211(vif
);
151 struct wowlan_key_data
*data
= _data
;
152 struct aes_sc
*aes_sc
, *aes_tx_sc
= NULL
;
153 struct tkip_sc
*tkip_sc
, *tkip_tx_sc
= NULL
;
154 struct iwl_p1k_cache
*rx_p1ks
;
156 struct ieee80211_key_seq seq
;
158 u16 p1k
[IWL_P1K_SIZE
];
161 mutex_lock(&mvm
->mutex
);
163 switch (key
->cipher
) {
164 case WLAN_CIPHER_SUITE_WEP40
:
165 case WLAN_CIPHER_SUITE_WEP104
: { /* hack it for now */
167 struct iwl_mvm_wep_key_cmd wep_key_cmd
;
168 struct iwl_mvm_wep_key wep_key
;
170 .wep_key_cmd
.mac_id_n_color
=
171 cpu_to_le32(FW_CMD_ID_AND_COLOR(mvmvif
->id
,
173 .wep_key_cmd
.num_keys
= 1,
174 /* firmware sets STA_KEY_FLG_WEP_13BYTES */
175 .wep_key_cmd
.decryption_type
= STA_KEY_FLG_WEP
,
176 .wep_key
.key_index
= key
->keyidx
,
177 .wep_key
.key_size
= key
->keylen
,
181 * This will fail -- the key functions don't set support
182 * pairwise WEP keys. However, that's better than silently
183 * failing WoWLAN. Or maybe not?
185 if (key
->flags
& IEEE80211_KEY_FLAG_PAIRWISE
)
188 memcpy(&wkc
.wep_key
.key
[3], key
->key
, key
->keylen
);
189 if (key
->keyidx
== mvmvif
->tx_key_idx
) {
190 /* TX key must be at offset 0 */
191 wkc
.wep_key
.key_offset
= 0;
193 /* others start at 1 */
195 wkc
.wep_key
.key_offset
= data
->wep_key_idx
;
198 ret
= iwl_mvm_send_cmd_pdu(mvm
, WEP_KEY
, 0, sizeof(wkc
), &wkc
);
199 data
->error
= ret
!= 0;
201 mvm
->ptk_ivlen
= key
->iv_len
;
202 mvm
->ptk_icvlen
= key
->icv_len
;
203 mvm
->gtk_ivlen
= key
->iv_len
;
204 mvm
->gtk_icvlen
= key
->icv_len
;
206 /* don't upload key again */
212 case WLAN_CIPHER_SUITE_AES_CMAC
:
214 * Ignore CMAC keys -- the WoWLAN firmware doesn't support them
215 * but we also shouldn't abort suspend due to that. It does have
216 * support for the IGTK key renewal, but doesn't really use the
217 * IGTK for anything. This means we could spuriously wake up or
218 * be deauthenticated, but that was considered acceptable.
221 case WLAN_CIPHER_SUITE_TKIP
:
223 tkip_sc
= data
->rsc_tsc
->all_tsc_rsc
.tkip
.unicast_rsc
;
224 tkip_tx_sc
= &data
->rsc_tsc
->all_tsc_rsc
.tkip
.tsc
;
226 rx_p1ks
= data
->tkip
->rx_uni
;
228 ieee80211_get_key_tx_seq(key
, &seq
);
229 tkip_tx_sc
->iv16
= cpu_to_le16(seq
.tkip
.iv16
);
230 tkip_tx_sc
->iv32
= cpu_to_le32(seq
.tkip
.iv32
);
232 ieee80211_get_tkip_p1k_iv(key
, seq
.tkip
.iv32
, p1k
);
233 iwl_mvm_convert_p1k(p1k
, data
->tkip
->tx
.p1k
);
235 memcpy(data
->tkip
->mic_keys
.tx
,
236 &key
->key
[NL80211_TKIP_DATA_OFFSET_TX_MIC_KEY
],
239 rx_mic_key
= data
->tkip
->mic_keys
.rx_unicast
;
242 data
->rsc_tsc
->all_tsc_rsc
.tkip
.multicast_rsc
;
243 rx_p1ks
= data
->tkip
->rx_multi
;
244 rx_mic_key
= data
->tkip
->mic_keys
.rx_mcast
;
248 * For non-QoS this relies on the fact that both the uCode and
249 * mac80211 use TID 0 (as they need to to avoid replay attacks)
250 * for checking the IV in the frames.
252 for (i
= 0; i
< IWL_NUM_RSC
; i
++) {
253 ieee80211_get_key_rx_seq(key
, i
, &seq
);
254 tkip_sc
[i
].iv16
= cpu_to_le16(seq
.tkip
.iv16
);
255 tkip_sc
[i
].iv32
= cpu_to_le32(seq
.tkip
.iv32
);
256 /* wrapping isn't allowed, AP must rekey */
257 if (seq
.tkip
.iv32
> cur_rx_iv32
)
258 cur_rx_iv32
= seq
.tkip
.iv32
;
261 ieee80211_get_tkip_rx_p1k(key
, vif
->bss_conf
.bssid
,
263 iwl_mvm_convert_p1k(p1k
, rx_p1ks
[0].p1k
);
264 ieee80211_get_tkip_rx_p1k(key
, vif
->bss_conf
.bssid
,
265 cur_rx_iv32
+ 1, p1k
);
266 iwl_mvm_convert_p1k(p1k
, rx_p1ks
[1].p1k
);
269 &key
->key
[NL80211_TKIP_DATA_OFFSET_RX_MIC_KEY
],
272 data
->use_tkip
= true;
273 data
->use_rsc_tsc
= true;
275 case WLAN_CIPHER_SUITE_CCMP
:
277 u8
*pn
= seq
.ccmp
.pn
;
279 aes_sc
= data
->rsc_tsc
->all_tsc_rsc
.aes
.unicast_rsc
;
280 aes_tx_sc
= &data
->rsc_tsc
->all_tsc_rsc
.aes
.tsc
;
282 ieee80211_get_key_tx_seq(key
, &seq
);
283 aes_tx_sc
->pn
= cpu_to_le64((u64
)pn
[5] |
290 aes_sc
= data
->rsc_tsc
->all_tsc_rsc
.aes
.multicast_rsc
;
294 * For non-QoS this relies on the fact that both the uCode and
295 * mac80211 use TID 0 for checking the IV in the frames.
297 for (i
= 0; i
< IWL_NUM_RSC
; i
++) {
298 u8
*pn
= seq
.ccmp
.pn
;
300 ieee80211_get_key_rx_seq(key
, i
, &seq
);
301 aes_sc
->pn
= cpu_to_le64((u64
)pn
[5] |
308 data
->use_rsc_tsc
= true;
313 * The D3 firmware hardcodes the key offset 0 as the key it uses
314 * to transmit packets to the AP, i.e. the PTK.
316 if (key
->flags
& IEEE80211_KEY_FLAG_PAIRWISE
) {
318 mvm
->ptk_ivlen
= key
->iv_len
;
319 mvm
->ptk_icvlen
= key
->icv_len
;
322 * firmware only supports TSC/RSC for a single key,
323 * so if there are multiple keep overwriting them
324 * with new ones -- this relies on mac80211 doing
328 mvm
->gtk_ivlen
= key
->iv_len
;
329 mvm
->gtk_icvlen
= key
->icv_len
;
332 ret
= iwl_mvm_set_sta_key(mvm
, vif
, sta
, key
, true);
333 data
->error
= ret
!= 0;
335 mutex_unlock(&mvm
->mutex
);
338 static int iwl_mvm_send_patterns(struct iwl_mvm
*mvm
,
339 struct cfg80211_wowlan
*wowlan
)
341 struct iwl_wowlan_patterns_cmd
*pattern_cmd
;
342 struct iwl_host_cmd cmd
= {
343 .id
= WOWLAN_PATTERNS
,
344 .dataflags
[0] = IWL_HCMD_DFL_NOCOPY
,
348 if (!wowlan
->n_patterns
)
351 cmd
.len
[0] = sizeof(*pattern_cmd
) +
352 wowlan
->n_patterns
* sizeof(struct iwl_wowlan_pattern
);
354 pattern_cmd
= kmalloc(cmd
.len
[0], GFP_KERNEL
);
358 pattern_cmd
->n_patterns
= cpu_to_le32(wowlan
->n_patterns
);
360 for (i
= 0; i
< wowlan
->n_patterns
; i
++) {
361 int mask_len
= DIV_ROUND_UP(wowlan
->patterns
[i
].pattern_len
, 8);
363 memcpy(&pattern_cmd
->patterns
[i
].mask
,
364 wowlan
->patterns
[i
].mask
, mask_len
);
365 memcpy(&pattern_cmd
->patterns
[i
].pattern
,
366 wowlan
->patterns
[i
].pattern
,
367 wowlan
->patterns
[i
].pattern_len
);
368 pattern_cmd
->patterns
[i
].mask_size
= mask_len
;
369 pattern_cmd
->patterns
[i
].pattern_size
=
370 wowlan
->patterns
[i
].pattern_len
;
373 cmd
.data
[0] = pattern_cmd
;
374 err
= iwl_mvm_send_cmd(mvm
, &cmd
);
379 enum iwl_mvm_tcp_packet_type
{
388 static __le16
pseudo_hdr_check(int len
, __be32 saddr
, __be32 daddr
)
390 __sum16 check
= tcp_v4_check(len
, saddr
, daddr
, 0);
391 return cpu_to_le16(be16_to_cpu((__force __be16
)check
));
394 static void iwl_mvm_build_tcp_packet(struct ieee80211_vif
*vif
,
395 struct cfg80211_wowlan_tcp
*tcp
,
396 void *_pkt
, u8
*mask
,
397 __le16
*pseudo_hdr_csum
,
398 enum iwl_mvm_tcp_packet_type ptype
)
405 } __packed
*pkt
= _pkt
;
406 u16 ip_tot_len
= sizeof(struct iphdr
) + sizeof(struct tcphdr
);
409 pkt
->eth
.h_proto
= cpu_to_be16(ETH_P_IP
),
412 pkt
->ip
.protocol
= IPPROTO_TCP
;
416 case MVM_TCP_TX_DATA
:
418 memcpy(pkt
->eth
.h_dest
, tcp
->dst_mac
, ETH_ALEN
);
419 memcpy(pkt
->eth
.h_source
, vif
->addr
, ETH_ALEN
);
421 pkt
->ip
.saddr
= tcp
->src
;
422 pkt
->ip
.daddr
= tcp
->dst
;
423 pkt
->tcp
.source
= cpu_to_be16(tcp
->src_port
);
424 pkt
->tcp
.dest
= cpu_to_be16(tcp
->dst_port
);
425 /* overwritten for TX SYN later */
426 pkt
->tcp
.doff
= sizeof(struct tcphdr
) / 4;
427 pkt
->tcp
.window
= cpu_to_be16(65000);
429 case MVM_TCP_RX_SYNACK
:
431 case MVM_TCP_RX_WAKE
:
432 memcpy(pkt
->eth
.h_dest
, vif
->addr
, ETH_ALEN
);
433 memcpy(pkt
->eth
.h_source
, tcp
->dst_mac
, ETH_ALEN
);
434 pkt
->ip
.saddr
= tcp
->dst
;
435 pkt
->ip
.daddr
= tcp
->src
;
436 pkt
->tcp
.source
= cpu_to_be16(tcp
->dst_port
);
437 pkt
->tcp
.dest
= cpu_to_be16(tcp
->src_port
);
446 /* firmware assumes 8 option bytes - 8 NOPs for now */
447 memset(pkt
->data
, 0x01, 8);
449 pkt
->tcp
.doff
= (sizeof(struct tcphdr
) + 8) / 4;
452 case MVM_TCP_TX_DATA
:
453 ip_tot_len
+= tcp
->payload_len
;
454 memcpy(pkt
->data
, tcp
->payload
, tcp
->payload_len
);
462 case MVM_TCP_RX_SYNACK
:
469 case MVM_TCP_RX_WAKE
:
470 ip_tot_len
+= tcp
->wake_len
;
473 memcpy(pkt
->data
, tcp
->wake_data
, tcp
->wake_len
);
479 case MVM_TCP_TX_DATA
:
481 pkt
->ip
.tot_len
= cpu_to_be16(ip_tot_len
);
482 pkt
->ip
.check
= ip_fast_csum(&pkt
->ip
, pkt
->ip
.ihl
);
484 case MVM_TCP_RX_WAKE
:
485 for (i
= 0; i
< DIV_ROUND_UP(tcp
->wake_len
, 8); i
++) {
486 u8 tmp
= tcp
->wake_mask
[i
];
487 mask
[i
+ 6] |= tmp
<< 6;
488 if (i
+ 1 < DIV_ROUND_UP(tcp
->wake_len
, 8))
489 mask
[i
+ 7] = tmp
>> 2;
491 /* fall through for ethernet/IP/TCP headers mask */
492 case MVM_TCP_RX_SYNACK
:
494 mask
[0] = 0xff; /* match ethernet */
496 * match ethernet, ip.version, ip.ihl
497 * the ip.ihl half byte is really masked out by firmware
500 mask
[2] = 0x80; /* match ip.protocol */
501 mask
[3] = 0xfc; /* match ip.saddr, ip.daddr */
502 mask
[4] = 0x3f; /* match ip.daddr, tcp.source, tcp.dest */
503 mask
[5] = 0x80; /* match tcp flags */
504 /* leave rest (0 or set for MVM_TCP_RX_WAKE) */
508 *pseudo_hdr_csum
= pseudo_hdr_check(ip_tot_len
- sizeof(struct iphdr
),
509 pkt
->ip
.saddr
, pkt
->ip
.daddr
);
512 static int iwl_mvm_send_remote_wake_cfg(struct iwl_mvm
*mvm
,
513 struct ieee80211_vif
*vif
,
514 struct cfg80211_wowlan_tcp
*tcp
)
516 struct iwl_wowlan_remote_wake_config
*cfg
;
517 struct iwl_host_cmd cmd
= {
518 .id
= REMOTE_WAKE_CONFIG_CMD
,
519 .len
= { sizeof(*cfg
), },
520 .dataflags
= { IWL_HCMD_DFL_NOCOPY
, },
527 cfg
= kzalloc(sizeof(*cfg
), GFP_KERNEL
);
532 cfg
->max_syn_retries
= 10;
533 cfg
->max_data_retries
= 10;
534 cfg
->tcp_syn_ack_timeout
= 1; /* seconds */
535 cfg
->tcp_ack_timeout
= 1; /* seconds */
538 iwl_mvm_build_tcp_packet(
539 vif
, tcp
, cfg
->syn_tx
.data
, NULL
,
540 &cfg
->syn_tx
.info
.tcp_pseudo_header_checksum
,
542 cfg
->syn_tx
.info
.tcp_payload_length
= 0;
545 iwl_mvm_build_tcp_packet(
546 vif
, tcp
, cfg
->synack_rx
.data
, cfg
->synack_rx
.rx_mask
,
547 &cfg
->synack_rx
.info
.tcp_pseudo_header_checksum
,
549 cfg
->synack_rx
.info
.tcp_payload_length
= 0;
551 /* KEEPALIVE/ACK (TX) */
552 iwl_mvm_build_tcp_packet(
553 vif
, tcp
, cfg
->keepalive_tx
.data
, NULL
,
554 &cfg
->keepalive_tx
.info
.tcp_pseudo_header_checksum
,
556 cfg
->keepalive_tx
.info
.tcp_payload_length
=
557 cpu_to_le16(tcp
->payload_len
);
558 cfg
->sequence_number_offset
= tcp
->payload_seq
.offset
;
559 /* length must be 0..4, the field is little endian */
560 cfg
->sequence_number_length
= tcp
->payload_seq
.len
;
561 cfg
->initial_sequence_number
= cpu_to_le32(tcp
->payload_seq
.start
);
562 cfg
->keepalive_interval
= cpu_to_le16(tcp
->data_interval
);
563 if (tcp
->payload_tok
.len
) {
564 cfg
->token_offset
= tcp
->payload_tok
.offset
;
565 cfg
->token_length
= tcp
->payload_tok
.len
;
567 cpu_to_le16(tcp
->tokens_size
% tcp
->payload_tok
.len
);
568 memcpy(cfg
->tokens
, tcp
->payload_tok
.token_stream
,
571 /* set tokens to max value to almost never run out */
572 cfg
->num_tokens
= cpu_to_le16(65535);
576 iwl_mvm_build_tcp_packet(
577 vif
, tcp
, cfg
->keepalive_ack_rx
.data
,
578 cfg
->keepalive_ack_rx
.rx_mask
,
579 &cfg
->keepalive_ack_rx
.info
.tcp_pseudo_header_checksum
,
581 cfg
->keepalive_ack_rx
.info
.tcp_payload_length
= 0;
584 iwl_mvm_build_tcp_packet(
585 vif
, tcp
, cfg
->wake_rx
.data
, cfg
->wake_rx
.rx_mask
,
586 &cfg
->wake_rx
.info
.tcp_pseudo_header_checksum
,
588 cfg
->wake_rx
.info
.tcp_payload_length
=
589 cpu_to_le16(tcp
->wake_len
);
592 iwl_mvm_build_tcp_packet(
593 vif
, tcp
, cfg
->fin_tx
.data
, NULL
,
594 &cfg
->fin_tx
.info
.tcp_pseudo_header_checksum
,
596 cfg
->fin_tx
.info
.tcp_payload_length
= 0;
598 ret
= iwl_mvm_send_cmd(mvm
, &cmd
);
604 static int iwl_mvm_d3_reprogram(struct iwl_mvm
*mvm
, struct ieee80211_vif
*vif
,
605 struct ieee80211_sta
*ap_sta
)
607 struct iwl_mvm_vif
*mvmvif
= iwl_mvm_vif_from_mac80211(vif
);
608 struct ieee80211_chanctx_conf
*ctx
;
609 u8 chains_static
, chains_dynamic
;
610 struct cfg80211_chan_def chandef
;
612 struct iwl_binding_cmd binding_cmd
= {};
613 struct iwl_time_quota_cmd quota_cmd
= {};
616 /* add back the PHY */
617 if (WARN_ON(!mvmvif
->phy_ctxt
))
621 ctx
= rcu_dereference(vif
->chanctx_conf
);
627 chains_static
= ctx
->rx_chains_static
;
628 chains_dynamic
= ctx
->rx_chains_dynamic
;
631 ret
= iwl_mvm_phy_ctxt_add(mvm
, mvmvif
->phy_ctxt
, &chandef
,
632 chains_static
, chains_dynamic
);
636 /* add back the MAC */
637 mvmvif
->uploaded
= false;
639 if (WARN_ON(!vif
->bss_conf
.assoc
))
642 ret
= iwl_mvm_mac_ctxt_add(mvm
, vif
);
646 /* add back binding - XXX refactor? */
647 binding_cmd
.id_and_color
=
648 cpu_to_le32(FW_CMD_ID_AND_COLOR(mvmvif
->phy_ctxt
->id
,
649 mvmvif
->phy_ctxt
->color
));
650 binding_cmd
.action
= cpu_to_le32(FW_CTXT_ACTION_ADD
);
652 cpu_to_le32(FW_CMD_ID_AND_COLOR(mvmvif
->phy_ctxt
->id
,
653 mvmvif
->phy_ctxt
->color
));
654 binding_cmd
.macs
[0] = cpu_to_le32(FW_CMD_ID_AND_COLOR(mvmvif
->id
,
656 for (i
= 1; i
< MAX_MACS_IN_BINDING
; i
++)
657 binding_cmd
.macs
[i
] = cpu_to_le32(FW_CTXT_INVALID
);
660 ret
= iwl_mvm_send_cmd_pdu_status(mvm
, BINDING_CONTEXT_CMD
,
661 sizeof(binding_cmd
), &binding_cmd
,
664 IWL_ERR(mvm
, "Failed to add binding: %d\n", ret
);
669 IWL_ERR(mvm
, "Binding command failed: %u\n", status
);
673 ret
= iwl_mvm_sta_send_to_fw(mvm
, ap_sta
, false);
676 rcu_assign_pointer(mvm
->fw_id_to_mac_id
[mvmvif
->ap_sta_id
], ap_sta
);
678 ret
= iwl_mvm_mac_ctxt_changed(mvm
, vif
, false, NULL
);
683 quota_cmd
.quotas
[0].id_and_color
=
684 cpu_to_le32(FW_CMD_ID_AND_COLOR(mvmvif
->phy_ctxt
->id
,
685 mvmvif
->phy_ctxt
->color
));
686 quota_cmd
.quotas
[0].quota
= cpu_to_le32(IWL_MVM_MAX_QUOTA
);
687 quota_cmd
.quotas
[0].max_duration
= cpu_to_le32(IWL_MVM_MAX_QUOTA
);
689 for (i
= 1; i
< MAX_BINDINGS
; i
++)
690 quota_cmd
.quotas
[i
].id_and_color
= cpu_to_le32(FW_CTXT_INVALID
);
692 ret
= iwl_mvm_send_cmd_pdu(mvm
, TIME_QUOTA_CMD
, 0,
693 sizeof(quota_cmd
), "a_cmd
);
695 IWL_ERR(mvm
, "Failed to send quota: %d\n", ret
);
700 static int iwl_mvm_get_last_nonqos_seq(struct iwl_mvm
*mvm
,
701 struct ieee80211_vif
*vif
)
703 struct iwl_mvm_vif
*mvmvif
= iwl_mvm_vif_from_mac80211(vif
);
704 struct iwl_nonqos_seq_query_cmd query_cmd
= {
705 .get_set_flag
= cpu_to_le32(IWL_NONQOS_SEQ_GET
),
707 cpu_to_le32(FW_CMD_ID_AND_COLOR(mvmvif
->id
,
710 struct iwl_host_cmd cmd
= {
711 .id
= NON_QOS_TX_COUNTER_CMD
,
712 .flags
= CMD_WANT_SKB
,
717 cmd
.data
[0] = &query_cmd
;
718 cmd
.len
[0] = sizeof(query_cmd
);
720 err
= iwl_mvm_send_cmd(mvm
, &cmd
);
724 size
= iwl_rx_packet_payload_len(cmd
.resp_pkt
);
725 if (size
< sizeof(__le16
)) {
728 err
= le16_to_cpup((__le16
*)cmd
.resp_pkt
->data
);
729 /* firmware returns next, not last-used seqno */
730 err
= (u16
) (err
- 0x10);
737 void iwl_mvm_set_last_nonqos_seq(struct iwl_mvm
*mvm
, struct ieee80211_vif
*vif
)
739 struct iwl_mvm_vif
*mvmvif
= iwl_mvm_vif_from_mac80211(vif
);
740 struct iwl_nonqos_seq_query_cmd query_cmd
= {
741 .get_set_flag
= cpu_to_le32(IWL_NONQOS_SEQ_SET
),
743 cpu_to_le32(FW_CMD_ID_AND_COLOR(mvmvif
->id
,
745 .value
= cpu_to_le16(mvmvif
->seqno
),
748 /* return if called during restart, not resume from D3 */
749 if (!mvmvif
->seqno_valid
)
752 mvmvif
->seqno_valid
= false;
754 if (iwl_mvm_send_cmd_pdu(mvm
, NON_QOS_TX_COUNTER_CMD
, 0,
755 sizeof(query_cmd
), &query_cmd
))
756 IWL_ERR(mvm
, "failed to set non-QoS seqno\n");
759 static int iwl_mvm_switch_to_d3(struct iwl_mvm
*mvm
)
761 iwl_mvm_cancel_scan(mvm
);
763 iwl_trans_stop_device(mvm
->trans
);
766 * Set the HW restart bit -- this is mostly true as we're
767 * going to load new firmware and reprogram that, though
768 * the reprogramming is going to be manual to avoid adding
769 * all the MACs that aren't support.
770 * We don't have to clear up everything though because the
771 * reprogramming is manual. When we resume, we'll actually
772 * go through a proper restart sequence again to switch
773 * back to the runtime firmware image.
775 set_bit(IWL_MVM_STATUS_IN_HW_RESTART
, &mvm
->status
);
777 /* We reprogram keys and shouldn't allocate new key indices */
778 memset(mvm
->fw_key_table
, 0, sizeof(mvm
->fw_key_table
));
785 return iwl_mvm_load_d3_fw(mvm
);
789 iwl_mvm_send_wowlan_config_cmd(struct iwl_mvm
*mvm
,
790 const struct iwl_wowlan_config_cmd_v3
*cmd
)
792 /* start only with the v2 part of the command */
793 u16 cmd_len
= sizeof(cmd
->common
);
795 if (mvm
->fw
->ucode_capa
.api
[0] & IWL_UCODE_TLV_API_WOWLAN_CONFIG_TID
)
796 cmd_len
= sizeof(*cmd
);
798 return iwl_mvm_send_cmd_pdu(mvm
, WOWLAN_CONFIGURATION
, 0,
803 iwl_mvm_get_wowlan_config(struct iwl_mvm
*mvm
,
804 struct cfg80211_wowlan
*wowlan
,
805 struct iwl_wowlan_config_cmd_v3
*wowlan_config_cmd
,
806 struct ieee80211_vif
*vif
, struct iwl_mvm_vif
*mvmvif
,
807 struct ieee80211_sta
*ap_sta
)
810 struct iwl_mvm_sta
*mvm_ap_sta
= (struct iwl_mvm_sta
*)ap_sta
->drv_priv
;
812 /* TODO: wowlan_config_cmd->common.wowlan_ba_teardown_tids */
814 wowlan_config_cmd
->common
.is_11n_connection
=
815 ap_sta
->ht_cap
.ht_supported
;
817 /* Query the last used seqno and set it */
818 ret
= iwl_mvm_get_last_nonqos_seq(mvm
, vif
);
822 wowlan_config_cmd
->common
.non_qos_seq
= cpu_to_le16(ret
);
824 iwl_mvm_set_wowlan_qos_seq(mvm_ap_sta
, &wowlan_config_cmd
->common
);
826 if (wowlan
->disconnect
)
827 wowlan_config_cmd
->common
.wakeup_filter
|=
828 cpu_to_le32(IWL_WOWLAN_WAKEUP_BEACON_MISS
|
829 IWL_WOWLAN_WAKEUP_LINK_CHANGE
);
830 if (wowlan
->magic_pkt
)
831 wowlan_config_cmd
->common
.wakeup_filter
|=
832 cpu_to_le32(IWL_WOWLAN_WAKEUP_MAGIC_PACKET
);
833 if (wowlan
->gtk_rekey_failure
)
834 wowlan_config_cmd
->common
.wakeup_filter
|=
835 cpu_to_le32(IWL_WOWLAN_WAKEUP_GTK_REKEY_FAIL
);
836 if (wowlan
->eap_identity_req
)
837 wowlan_config_cmd
->common
.wakeup_filter
|=
838 cpu_to_le32(IWL_WOWLAN_WAKEUP_EAP_IDENT_REQ
);
839 if (wowlan
->four_way_handshake
)
840 wowlan_config_cmd
->common
.wakeup_filter
|=
841 cpu_to_le32(IWL_WOWLAN_WAKEUP_4WAY_HANDSHAKE
);
842 if (wowlan
->n_patterns
)
843 wowlan_config_cmd
->common
.wakeup_filter
|=
844 cpu_to_le32(IWL_WOWLAN_WAKEUP_PATTERN_MATCH
);
846 if (wowlan
->rfkill_release
)
847 wowlan_config_cmd
->common
.wakeup_filter
|=
848 cpu_to_le32(IWL_WOWLAN_WAKEUP_RF_KILL_DEASSERT
);
852 * Set the "link change" (really "link lost") flag as well
853 * since that implies losing the TCP connection.
855 wowlan_config_cmd
->common
.wakeup_filter
|=
856 cpu_to_le32(IWL_WOWLAN_WAKEUP_REMOTE_LINK_LOSS
|
857 IWL_WOWLAN_WAKEUP_REMOTE_SIGNATURE_TABLE
|
858 IWL_WOWLAN_WAKEUP_REMOTE_WAKEUP_PACKET
|
859 IWL_WOWLAN_WAKEUP_LINK_CHANGE
);
866 iwl_mvm_wowlan_config(struct iwl_mvm
*mvm
,
867 struct cfg80211_wowlan
*wowlan
,
868 struct iwl_wowlan_config_cmd_v3
*wowlan_config_cmd
,
869 struct ieee80211_vif
*vif
, struct iwl_mvm_vif
*mvmvif
,
870 struct ieee80211_sta
*ap_sta
)
872 struct iwl_wowlan_kek_kck_material_cmd kek_kck_cmd
= {};
873 struct iwl_wowlan_tkip_params_cmd tkip_cmd
= {};
874 struct wowlan_key_data key_data
= {
875 .use_rsc_tsc
= false,
881 ret
= iwl_mvm_switch_to_d3(mvm
);
885 ret
= iwl_mvm_d3_reprogram(mvm
, vif
, ap_sta
);
889 key_data
.rsc_tsc
= kzalloc(sizeof(*key_data
.rsc_tsc
), GFP_KERNEL
);
890 if (!key_data
.rsc_tsc
)
893 if (!iwlwifi_mod_params
.sw_crypto
) {
895 * This needs to be unlocked due to lock ordering
896 * constraints. Since we're in the suspend path
897 * that isn't really a problem though.
899 mutex_unlock(&mvm
->mutex
);
900 ieee80211_iter_keys(mvm
->hw
, vif
,
901 iwl_mvm_wowlan_program_keys
,
903 mutex_lock(&mvm
->mutex
);
904 if (key_data
.error
) {
909 if (key_data
.use_rsc_tsc
) {
910 struct iwl_host_cmd rsc_tsc_cmd
= {
911 .id
= WOWLAN_TSC_RSC_PARAM
,
912 .data
[0] = key_data
.rsc_tsc
,
913 .dataflags
[0] = IWL_HCMD_DFL_NOCOPY
,
914 .len
[0] = sizeof(*key_data
.rsc_tsc
),
917 ret
= iwl_mvm_send_cmd(mvm
, &rsc_tsc_cmd
);
922 if (key_data
.use_tkip
) {
923 ret
= iwl_mvm_send_cmd_pdu(mvm
,
931 if (mvmvif
->rekey_data
.valid
) {
932 memset(&kek_kck_cmd
, 0, sizeof(kek_kck_cmd
));
933 memcpy(kek_kck_cmd
.kck
, mvmvif
->rekey_data
.kck
,
935 kek_kck_cmd
.kck_len
= cpu_to_le16(NL80211_KCK_LEN
);
936 memcpy(kek_kck_cmd
.kek
, mvmvif
->rekey_data
.kek
,
938 kek_kck_cmd
.kek_len
= cpu_to_le16(NL80211_KEK_LEN
);
939 kek_kck_cmd
.replay_ctr
= mvmvif
->rekey_data
.replay_ctr
;
941 ret
= iwl_mvm_send_cmd_pdu(mvm
,
942 WOWLAN_KEK_KCK_MATERIAL
, 0,
950 ret
= iwl_mvm_send_wowlan_config_cmd(mvm
, wowlan_config_cmd
);
954 ret
= iwl_mvm_send_patterns(mvm
, wowlan
);
958 ret
= iwl_mvm_send_proto_offload(mvm
, vif
, false, 0);
962 ret
= iwl_mvm_send_remote_wake_cfg(mvm
, vif
, wowlan
->tcp
);
965 kfree(key_data
.rsc_tsc
);
970 iwl_mvm_netdetect_config(struct iwl_mvm
*mvm
,
971 struct cfg80211_wowlan
*wowlan
,
972 struct cfg80211_sched_scan_request
*nd_config
,
973 struct ieee80211_vif
*vif
)
975 struct iwl_wowlan_config_cmd_v3 wowlan_config_cmd
= {};
978 ret
= iwl_mvm_switch_to_d3(mvm
);
982 /* rfkill release can be either for wowlan or netdetect */
983 if (wowlan
->rfkill_release
)
984 wowlan_config_cmd
.common
.wakeup_filter
|=
985 cpu_to_le32(IWL_WOWLAN_WAKEUP_RF_KILL_DEASSERT
);
987 ret
= iwl_mvm_send_wowlan_config_cmd(mvm
, &wowlan_config_cmd
);
991 ret
= iwl_mvm_scan_offload_start(mvm
, vif
, nd_config
, &mvm
->nd_ies
);
996 static int __iwl_mvm_suspend(struct ieee80211_hw
*hw
,
997 struct cfg80211_wowlan
*wowlan
,
1000 struct iwl_mvm
*mvm
= IWL_MAC80211_GET_MVM(hw
);
1001 struct ieee80211_vif
*vif
= NULL
;
1002 struct iwl_mvm_vif
*mvmvif
= NULL
;
1003 struct ieee80211_sta
*ap_sta
= NULL
;
1004 struct iwl_d3_manager_config d3_cfg_cmd_data
= {
1006 * Program the minimum sleep time to 10 seconds, as many
1007 * platforms have issues processing a wakeup signal while
1008 * still being in the process of suspending.
1010 .min_sleep_time
= cpu_to_le32(10 * 1000 * 1000),
1012 struct iwl_host_cmd d3_cfg_cmd
= {
1013 .id
= D3_CONFIG_CMD
,
1014 .flags
= CMD_WANT_SKB
,
1015 .data
[0] = &d3_cfg_cmd_data
,
1016 .len
[0] = sizeof(d3_cfg_cmd_data
),
1019 int len __maybe_unused
;
1023 * mac80211 shouldn't get here, but for D3 test
1024 * it doesn't warrant a warning
1030 mutex_lock(&mvm
->mutex
);
1032 vif
= iwl_mvm_get_bss_vif(mvm
);
1033 if (IS_ERR_OR_NULL(vif
)) {
1038 mvmvif
= iwl_mvm_vif_from_mac80211(vif
);
1040 if (mvmvif
->ap_sta_id
== IWL_MVM_STATION_COUNT
) {
1041 /* if we're not associated, this must be netdetect */
1042 if (!wowlan
->nd_config
&& !mvm
->nd_config
) {
1047 ret
= iwl_mvm_netdetect_config(
1048 mvm
, wowlan
, wowlan
->nd_config
?: mvm
->nd_config
, vif
);
1052 struct iwl_wowlan_config_cmd_v3 wowlan_config_cmd
= {};
1054 ap_sta
= rcu_dereference_protected(
1055 mvm
->fw_id_to_mac_id
[mvmvif
->ap_sta_id
],
1056 lockdep_is_held(&mvm
->mutex
));
1057 if (IS_ERR_OR_NULL(ap_sta
)) {
1062 ret
= iwl_mvm_get_wowlan_config(mvm
, wowlan
, &wowlan_config_cmd
,
1063 vif
, mvmvif
, ap_sta
);
1066 ret
= iwl_mvm_wowlan_config(mvm
, wowlan
, &wowlan_config_cmd
,
1067 vif
, mvmvif
, ap_sta
);
1072 ret
= iwl_mvm_power_update_device(mvm
);
1076 ret
= iwl_mvm_power_update_mac(mvm
);
1080 #ifdef CONFIG_IWLWIFI_DEBUGFS
1081 if (mvm
->d3_wake_sysassert
)
1082 d3_cfg_cmd_data
.wakeup_flags
|=
1083 cpu_to_le32(IWL_WAKEUP_D3_CONFIG_FW_ERROR
);
1086 /* must be last -- this switches firmware state */
1087 ret
= iwl_mvm_send_cmd(mvm
, &d3_cfg_cmd
);
1090 #ifdef CONFIG_IWLWIFI_DEBUGFS
1091 len
= iwl_rx_packet_payload_len(d3_cfg_cmd
.resp_pkt
);
1092 if (len
>= sizeof(u32
)) {
1093 mvm
->d3_test_pme_ptr
=
1094 le32_to_cpup((__le32
*)d3_cfg_cmd
.resp_pkt
->data
);
1097 iwl_free_resp(&d3_cfg_cmd
);
1099 clear_bit(IWL_MVM_STATUS_IN_HW_RESTART
, &mvm
->status
);
1101 iwl_trans_d3_suspend(mvm
->trans
, test
);
1104 ieee80211_restart_hw(mvm
->hw
);
1106 mutex_unlock(&mvm
->mutex
);
1111 int iwl_mvm_suspend(struct ieee80211_hw
*hw
, struct cfg80211_wowlan
*wowlan
)
1113 struct iwl_mvm
*mvm
= IWL_MAC80211_GET_MVM(hw
);
1115 if (iwl_mvm_is_d0i3_supported(mvm
)) {
1116 mutex_lock(&mvm
->d0i3_suspend_mutex
);
1117 __set_bit(D0I3_DEFER_WAKEUP
, &mvm
->d0i3_suspend_flags
);
1118 mutex_unlock(&mvm
->d0i3_suspend_mutex
);
1122 return __iwl_mvm_suspend(hw
, wowlan
, false);
1125 /* converted data from the different status responses */
1126 struct iwl_wowlan_status_data
{
1130 u32 wake_packet_length
;
1131 u32 wake_packet_bufsize
;
1132 const u8
*wake_packet
;
1135 static void iwl_mvm_report_wakeup_reasons(struct iwl_mvm
*mvm
,
1136 struct ieee80211_vif
*vif
,
1137 struct iwl_wowlan_status_data
*status
)
1139 struct sk_buff
*pkt
= NULL
;
1140 struct cfg80211_wowlan_wakeup wakeup
= {
1143 struct cfg80211_wowlan_wakeup
*wakeup_report
= &wakeup
;
1144 u32 reasons
= status
->wakeup_reasons
;
1146 if (reasons
== IWL_WOWLAN_WAKEUP_BY_NON_WIRELESS
) {
1147 wakeup_report
= NULL
;
1151 if (reasons
& IWL_WOWLAN_WAKEUP_BY_MAGIC_PACKET
)
1152 wakeup
.magic_pkt
= true;
1154 if (reasons
& IWL_WOWLAN_WAKEUP_BY_PATTERN
)
1155 wakeup
.pattern_idx
=
1156 status
->pattern_number
;
1158 if (reasons
& (IWL_WOWLAN_WAKEUP_BY_DISCONNECTION_ON_MISSED_BEACON
|
1159 IWL_WOWLAN_WAKEUP_BY_DISCONNECTION_ON_DEAUTH
))
1160 wakeup
.disconnect
= true;
1162 if (reasons
& IWL_WOWLAN_WAKEUP_BY_GTK_REKEY_FAILURE
)
1163 wakeup
.gtk_rekey_failure
= true;
1165 if (reasons
& IWL_WOWLAN_WAKEUP_BY_RFKILL_DEASSERTED
)
1166 wakeup
.rfkill_release
= true;
1168 if (reasons
& IWL_WOWLAN_WAKEUP_BY_EAPOL_REQUEST
)
1169 wakeup
.eap_identity_req
= true;
1171 if (reasons
& IWL_WOWLAN_WAKEUP_BY_FOUR_WAY_HANDSHAKE
)
1172 wakeup
.four_way_handshake
= true;
1174 if (reasons
& IWL_WOWLAN_WAKEUP_BY_REM_WAKE_LINK_LOSS
)
1175 wakeup
.tcp_connlost
= true;
1177 if (reasons
& IWL_WOWLAN_WAKEUP_BY_REM_WAKE_SIGNATURE_TABLE
)
1178 wakeup
.tcp_nomoretokens
= true;
1180 if (reasons
& IWL_WOWLAN_WAKEUP_BY_REM_WAKE_WAKEUP_PACKET
)
1181 wakeup
.tcp_match
= true;
1183 if (status
->wake_packet_bufsize
) {
1184 int pktsize
= status
->wake_packet_bufsize
;
1185 int pktlen
= status
->wake_packet_length
;
1186 const u8
*pktdata
= status
->wake_packet
;
1187 struct ieee80211_hdr
*hdr
= (void *)pktdata
;
1188 int truncated
= pktlen
- pktsize
;
1190 /* this would be a firmware bug */
1191 if (WARN_ON_ONCE(truncated
< 0))
1194 if (ieee80211_is_data(hdr
->frame_control
)) {
1195 int hdrlen
= ieee80211_hdrlen(hdr
->frame_control
);
1196 int ivlen
= 0, icvlen
= 4; /* also FCS */
1198 pkt
= alloc_skb(pktsize
, GFP_KERNEL
);
1202 memcpy(skb_put(pkt
, hdrlen
), pktdata
, hdrlen
);
1206 if (ieee80211_has_protected(hdr
->frame_control
)) {
1208 * This is unlocked and using gtk_i(c)vlen,
1209 * but since everything is under RTNL still
1210 * that's not really a problem - changing
1211 * it would be difficult.
1213 if (is_multicast_ether_addr(hdr
->addr1
)) {
1214 ivlen
= mvm
->gtk_ivlen
;
1215 icvlen
+= mvm
->gtk_icvlen
;
1217 ivlen
= mvm
->ptk_ivlen
;
1218 icvlen
+= mvm
->ptk_icvlen
;
1222 /* if truncated, FCS/ICV is (partially) gone */
1223 if (truncated
>= icvlen
) {
1225 truncated
-= icvlen
;
1227 icvlen
-= truncated
;
1231 pktsize
-= ivlen
+ icvlen
;
1234 memcpy(skb_put(pkt
, pktsize
), pktdata
, pktsize
);
1236 if (ieee80211_data_to_8023(pkt
, vif
->addr
, vif
->type
))
1238 wakeup
.packet
= pkt
->data
;
1239 wakeup
.packet_present_len
= pkt
->len
;
1240 wakeup
.packet_len
= pkt
->len
- truncated
;
1241 wakeup
.packet_80211
= false;
1245 if (truncated
>= 4) {
1249 fcslen
-= truncated
;
1253 wakeup
.packet
= status
->wake_packet
;
1254 wakeup
.packet_present_len
= pktsize
;
1255 wakeup
.packet_len
= pktlen
- truncated
;
1256 wakeup
.packet_80211
= true;
1261 ieee80211_report_wowlan_wakeup(vif
, wakeup_report
, GFP_KERNEL
);
1265 static void iwl_mvm_aes_sc_to_seq(struct aes_sc
*sc
,
1266 struct ieee80211_key_seq
*seq
)
1270 pn
= le64_to_cpu(sc
->pn
);
1271 seq
->ccmp
.pn
[0] = pn
>> 40;
1272 seq
->ccmp
.pn
[1] = pn
>> 32;
1273 seq
->ccmp
.pn
[2] = pn
>> 24;
1274 seq
->ccmp
.pn
[3] = pn
>> 16;
1275 seq
->ccmp
.pn
[4] = pn
>> 8;
1276 seq
->ccmp
.pn
[5] = pn
;
1279 static void iwl_mvm_tkip_sc_to_seq(struct tkip_sc
*sc
,
1280 struct ieee80211_key_seq
*seq
)
1282 seq
->tkip
.iv32
= le32_to_cpu(sc
->iv32
);
1283 seq
->tkip
.iv16
= le16_to_cpu(sc
->iv16
);
1286 static void iwl_mvm_set_aes_rx_seq(struct aes_sc
*scs
,
1287 struct ieee80211_key_conf
*key
)
1291 BUILD_BUG_ON(IWL_NUM_RSC
!= IEEE80211_NUM_TIDS
);
1293 for (tid
= 0; tid
< IWL_NUM_RSC
; tid
++) {
1294 struct ieee80211_key_seq seq
= {};
1296 iwl_mvm_aes_sc_to_seq(&scs
[tid
], &seq
);
1297 ieee80211_set_key_rx_seq(key
, tid
, &seq
);
1301 static void iwl_mvm_set_tkip_rx_seq(struct tkip_sc
*scs
,
1302 struct ieee80211_key_conf
*key
)
1306 BUILD_BUG_ON(IWL_NUM_RSC
!= IEEE80211_NUM_TIDS
);
1308 for (tid
= 0; tid
< IWL_NUM_RSC
; tid
++) {
1309 struct ieee80211_key_seq seq
= {};
1311 iwl_mvm_tkip_sc_to_seq(&scs
[tid
], &seq
);
1312 ieee80211_set_key_rx_seq(key
, tid
, &seq
);
1316 static void iwl_mvm_set_key_rx_seq(struct ieee80211_key_conf
*key
,
1317 struct iwl_wowlan_status
*status
)
1319 union iwl_all_tsc_rsc
*rsc
= &status
->gtk
.rsc
.all_tsc_rsc
;
1321 switch (key
->cipher
) {
1322 case WLAN_CIPHER_SUITE_CCMP
:
1323 iwl_mvm_set_aes_rx_seq(rsc
->aes
.multicast_rsc
, key
);
1325 case WLAN_CIPHER_SUITE_TKIP
:
1326 iwl_mvm_set_tkip_rx_seq(rsc
->tkip
.multicast_rsc
, key
);
1333 struct iwl_mvm_d3_gtk_iter_data
{
1334 struct iwl_wowlan_status
*status
;
1337 bool find_phase
, unhandled_cipher
;
1341 static void iwl_mvm_d3_update_gtks(struct ieee80211_hw
*hw
,
1342 struct ieee80211_vif
*vif
,
1343 struct ieee80211_sta
*sta
,
1344 struct ieee80211_key_conf
*key
,
1347 struct iwl_mvm_d3_gtk_iter_data
*data
= _data
;
1349 if (data
->unhandled_cipher
)
1352 switch (key
->cipher
) {
1353 case WLAN_CIPHER_SUITE_WEP40
:
1354 case WLAN_CIPHER_SUITE_WEP104
:
1355 /* ignore WEP completely, nothing to do */
1357 case WLAN_CIPHER_SUITE_CCMP
:
1358 case WLAN_CIPHER_SUITE_TKIP
:
1359 /* we support these */
1362 /* everything else (even CMAC for MFP) - disconnect from AP */
1363 data
->unhandled_cipher
= true;
1370 * pairwise key - update sequence counters only;
1371 * note that this assumes no TDLS sessions are active
1374 struct ieee80211_key_seq seq
= {};
1375 union iwl_all_tsc_rsc
*sc
= &data
->status
->gtk
.rsc
.all_tsc_rsc
;
1377 if (data
->find_phase
)
1380 switch (key
->cipher
) {
1381 case WLAN_CIPHER_SUITE_CCMP
:
1382 iwl_mvm_aes_sc_to_seq(&sc
->aes
.tsc
, &seq
);
1383 iwl_mvm_set_aes_rx_seq(sc
->aes
.unicast_rsc
, key
);
1385 case WLAN_CIPHER_SUITE_TKIP
:
1386 iwl_mvm_tkip_sc_to_seq(&sc
->tkip
.tsc
, &seq
);
1387 iwl_mvm_set_tkip_rx_seq(sc
->tkip
.unicast_rsc
, key
);
1390 ieee80211_set_key_tx_seq(key
, &seq
);
1392 /* that's it for this key */
1396 if (data
->find_phase
) {
1397 data
->last_gtk
= key
;
1398 data
->cipher
= key
->cipher
;
1402 if (data
->status
->num_of_gtk_rekeys
)
1403 ieee80211_remove_key(key
);
1404 else if (data
->last_gtk
== key
)
1405 iwl_mvm_set_key_rx_seq(key
, data
->status
);
1408 static bool iwl_mvm_setup_connection_keep(struct iwl_mvm
*mvm
,
1409 struct ieee80211_vif
*vif
,
1410 struct iwl_wowlan_status
*status
)
1412 struct iwl_mvm_vif
*mvmvif
= iwl_mvm_vif_from_mac80211(vif
);
1413 struct iwl_mvm_d3_gtk_iter_data gtkdata
= {
1416 u32 disconnection_reasons
=
1417 IWL_WOWLAN_WAKEUP_BY_DISCONNECTION_ON_MISSED_BEACON
|
1418 IWL_WOWLAN_WAKEUP_BY_DISCONNECTION_ON_DEAUTH
;
1420 if (!status
|| !vif
->bss_conf
.bssid
)
1423 if (le32_to_cpu(status
->wakeup_reasons
) & disconnection_reasons
)
1426 /* find last GTK that we used initially, if any */
1427 gtkdata
.find_phase
= true;
1428 ieee80211_iter_keys(mvm
->hw
, vif
,
1429 iwl_mvm_d3_update_gtks
, >kdata
);
1430 /* not trying to keep connections with MFP/unhandled ciphers */
1431 if (gtkdata
.unhandled_cipher
)
1433 if (!gtkdata
.num_keys
)
1435 if (!gtkdata
.last_gtk
)
1439 * invalidate all other GTKs that might still exist and update
1440 * the one that we used
1442 gtkdata
.find_phase
= false;
1443 ieee80211_iter_keys(mvm
->hw
, vif
,
1444 iwl_mvm_d3_update_gtks
, >kdata
);
1446 if (status
->num_of_gtk_rekeys
) {
1447 struct ieee80211_key_conf
*key
;
1449 struct ieee80211_key_conf conf
;
1452 .conf
.cipher
= gtkdata
.cipher
,
1453 .conf
.keyidx
= status
->gtk
.key_index
,
1456 switch (gtkdata
.cipher
) {
1457 case WLAN_CIPHER_SUITE_CCMP
:
1458 conf
.conf
.keylen
= WLAN_KEY_LEN_CCMP
;
1459 memcpy(conf
.conf
.key
, status
->gtk
.decrypt_key
,
1462 case WLAN_CIPHER_SUITE_TKIP
:
1463 conf
.conf
.keylen
= WLAN_KEY_LEN_TKIP
;
1464 memcpy(conf
.conf
.key
, status
->gtk
.decrypt_key
, 16);
1465 /* leave TX MIC key zeroed, we don't use it anyway */
1466 memcpy(conf
.conf
.key
+
1467 NL80211_TKIP_DATA_OFFSET_RX_MIC_KEY
,
1468 status
->gtk
.tkip_mic_key
, 8);
1472 key
= ieee80211_gtk_rekey_add(vif
, &conf
.conf
);
1475 iwl_mvm_set_key_rx_seq(key
, status
);
1478 if (status
->num_of_gtk_rekeys
) {
1480 cpu_to_be64(le64_to_cpu(status
->replay_ctr
));
1481 ieee80211_gtk_rekey_notify(vif
, vif
->bss_conf
.bssid
,
1482 (void *)&replay_ctr
, GFP_KERNEL
);
1486 mvmvif
->seqno_valid
= true;
1487 /* +0x10 because the set API expects next-to-use, not last-used */
1488 mvmvif
->seqno
= le16_to_cpu(status
->non_qos_seq_ctr
) + 0x10;
1493 static struct iwl_wowlan_status
*
1494 iwl_mvm_get_wakeup_status(struct iwl_mvm
*mvm
, struct ieee80211_vif
*vif
)
1496 u32 base
= mvm
->error_event_table
;
1497 struct error_table_start
{
1498 /* cf. struct iwl_error_event_table */
1502 struct iwl_host_cmd cmd
= {
1503 .id
= WOWLAN_GET_STATUSES
,
1504 .flags
= CMD_WANT_SKB
,
1506 struct iwl_wowlan_status
*status
, *fw_status
;
1507 int ret
, len
, status_size
;
1509 iwl_trans_read_mem_bytes(mvm
->trans
, base
,
1510 &err_info
, sizeof(err_info
));
1512 if (err_info
.valid
) {
1513 IWL_INFO(mvm
, "error table is valid (%d) with error (%d)\n",
1514 err_info
.valid
, err_info
.error_id
);
1515 if (err_info
.error_id
== RF_KILL_INDICATOR_FOR_WOWLAN
) {
1516 struct cfg80211_wowlan_wakeup wakeup
= {
1517 .rfkill_release
= true,
1519 ieee80211_report_wowlan_wakeup(vif
, &wakeup
,
1522 return ERR_PTR(-EIO
);
1525 /* only for tracing for now */
1526 ret
= iwl_mvm_send_cmd_pdu(mvm
, OFFLOADS_QUERY_CMD
, 0, 0, NULL
);
1528 IWL_ERR(mvm
, "failed to query offload statistics (%d)\n", ret
);
1530 ret
= iwl_mvm_send_cmd(mvm
, &cmd
);
1532 IWL_ERR(mvm
, "failed to query status (%d)\n", ret
);
1533 return ERR_PTR(ret
);
1536 /* RF-kill already asserted again... */
1537 if (!cmd
.resp_pkt
) {
1542 status_size
= sizeof(*fw_status
);
1544 len
= iwl_rx_packet_payload_len(cmd
.resp_pkt
);
1545 if (len
< status_size
) {
1546 IWL_ERR(mvm
, "Invalid WoWLAN status response!\n");
1551 status
= (void *)cmd
.resp_pkt
->data
;
1552 if (len
!= (status_size
+
1553 ALIGN(le32_to_cpu(status
->wake_packet_bufsize
), 4))) {
1554 IWL_ERR(mvm
, "Invalid WoWLAN status response!\n");
1559 fw_status
= kmemdup(status
, len
, GFP_KERNEL
);
1562 iwl_free_resp(&cmd
);
1563 return ret
? ERR_PTR(ret
) : fw_status
;
1566 /* releases the MVM mutex */
1567 static bool iwl_mvm_query_wakeup_reasons(struct iwl_mvm
*mvm
,
1568 struct ieee80211_vif
*vif
)
1570 struct iwl_wowlan_status_data status
;
1571 struct iwl_wowlan_status
*fw_status
;
1574 struct ieee80211_sta
*ap_sta
;
1575 struct iwl_mvm_sta
*mvm_ap_sta
;
1577 fw_status
= iwl_mvm_get_wakeup_status(mvm
, vif
);
1578 if (IS_ERR_OR_NULL(fw_status
))
1581 status
.pattern_number
= le16_to_cpu(fw_status
->pattern_number
);
1582 for (i
= 0; i
< 8; i
++)
1583 status
.qos_seq_ctr
[i
] =
1584 le16_to_cpu(fw_status
->qos_seq_ctr
[i
]);
1585 status
.wakeup_reasons
= le32_to_cpu(fw_status
->wakeup_reasons
);
1586 status
.wake_packet_length
=
1587 le32_to_cpu(fw_status
->wake_packet_length
);
1588 status
.wake_packet_bufsize
=
1589 le32_to_cpu(fw_status
->wake_packet_bufsize
);
1590 status
.wake_packet
= fw_status
->wake_packet
;
1592 /* still at hard-coded place 0 for D3 image */
1593 ap_sta
= rcu_dereference_protected(
1594 mvm
->fw_id_to_mac_id
[0],
1595 lockdep_is_held(&mvm
->mutex
));
1596 if (IS_ERR_OR_NULL(ap_sta
))
1599 mvm_ap_sta
= (struct iwl_mvm_sta
*)ap_sta
->drv_priv
;
1600 for (i
= 0; i
< IWL_MAX_TID_COUNT
; i
++) {
1601 u16 seq
= status
.qos_seq_ctr
[i
];
1602 /* firmware stores last-used value, we store next value */
1604 mvm_ap_sta
->tid_data
[i
].seq_number
= seq
;
1607 /* now we have all the data we need, unlock to avoid mac80211 issues */
1608 mutex_unlock(&mvm
->mutex
);
1610 iwl_mvm_report_wakeup_reasons(mvm
, vif
, &status
);
1612 keep
= iwl_mvm_setup_connection_keep(mvm
, vif
, fw_status
);
1620 mutex_unlock(&mvm
->mutex
);
1624 static void iwl_mvm_read_d3_sram(struct iwl_mvm
*mvm
)
1626 #ifdef CONFIG_IWLWIFI_DEBUGFS
1627 const struct fw_img
*img
= &mvm
->fw
->img
[IWL_UCODE_WOWLAN
];
1628 u32 len
= img
->sec
[IWL_UCODE_SECTION_DATA
].len
;
1629 u32 offs
= img
->sec
[IWL_UCODE_SECTION_DATA
].offset
;
1631 if (!mvm
->store_d3_resume_sram
)
1634 if (!mvm
->d3_resume_sram
) {
1635 mvm
->d3_resume_sram
= kzalloc(len
, GFP_KERNEL
);
1636 if (!mvm
->d3_resume_sram
)
1640 iwl_trans_read_mem_bytes(mvm
->trans
, offs
, mvm
->d3_resume_sram
, len
);
1644 static void iwl_mvm_d3_disconnect_iter(void *data
, u8
*mac
,
1645 struct ieee80211_vif
*vif
)
1647 /* skip the one we keep connection on */
1651 if (vif
->type
== NL80211_IFTYPE_STATION
)
1652 ieee80211_resume_disconnect(vif
);
1655 static int __iwl_mvm_resume(struct iwl_mvm
*mvm
, bool test
)
1657 struct ieee80211_vif
*vif
= NULL
;
1659 enum iwl_d3_status d3_status
;
1662 mutex_lock(&mvm
->mutex
);
1664 /* get the BSS vif pointer again */
1665 vif
= iwl_mvm_get_bss_vif(mvm
);
1666 if (IS_ERR_OR_NULL(vif
))
1669 ret
= iwl_trans_d3_resume(mvm
->trans
, &d3_status
, test
);
1673 if (d3_status
!= IWL_D3_STATUS_ALIVE
) {
1674 IWL_INFO(mvm
, "Device was reset during suspend\n");
1678 /* query SRAM first in case we want event logging */
1679 iwl_mvm_read_d3_sram(mvm
);
1681 keep
= iwl_mvm_query_wakeup_reasons(mvm
, vif
);
1682 #ifdef CONFIG_IWLWIFI_DEBUGFS
1684 mvm
->keep_vif
= vif
;
1686 /* has unlocked the mutex, so skip that */
1690 mutex_unlock(&mvm
->mutex
);
1694 ieee80211_iterate_active_interfaces_rtnl(mvm
->hw
,
1695 IEEE80211_IFACE_ITER_NORMAL
,
1696 iwl_mvm_d3_disconnect_iter
, keep
? vif
: NULL
);
1698 /* return 1 to reconfigure the device */
1699 set_bit(IWL_MVM_STATUS_IN_HW_RESTART
, &mvm
->status
);
1700 set_bit(IWL_MVM_STATUS_D3_RECONFIG
, &mvm
->status
);
1704 int iwl_mvm_resume(struct ieee80211_hw
*hw
)
1706 struct iwl_mvm
*mvm
= IWL_MAC80211_GET_MVM(hw
);
1708 if (iwl_mvm_is_d0i3_supported(mvm
))
1711 return __iwl_mvm_resume(mvm
, false);
1714 void iwl_mvm_set_wakeup(struct ieee80211_hw
*hw
, bool enabled
)
1716 struct iwl_mvm
*mvm
= IWL_MAC80211_GET_MVM(hw
);
1718 device_set_wakeup_enable(mvm
->trans
->dev
, enabled
);
1721 #ifdef CONFIG_IWLWIFI_DEBUGFS
1722 static int iwl_mvm_d3_test_open(struct inode
*inode
, struct file
*file
)
1724 struct iwl_mvm
*mvm
= inode
->i_private
;
1727 if (mvm
->d3_test_active
)
1730 file
->private_data
= inode
->i_private
;
1732 ieee80211_stop_queues(mvm
->hw
);
1735 /* start pseudo D3 */
1737 err
= __iwl_mvm_suspend(mvm
->hw
, mvm
->hw
->wiphy
->wowlan_config
, true);
1742 ieee80211_wake_queues(mvm
->hw
);
1745 mvm
->d3_test_active
= true;
1746 mvm
->keep_vif
= NULL
;
1750 static ssize_t
iwl_mvm_d3_test_read(struct file
*file
, char __user
*user_buf
,
1751 size_t count
, loff_t
*ppos
)
1753 struct iwl_mvm
*mvm
= file
->private_data
;
1757 /* read pme_ptr if available */
1758 if (mvm
->d3_test_pme_ptr
) {
1759 pme_asserted
= iwl_trans_read_mem32(mvm
->trans
,
1760 mvm
->d3_test_pme_ptr
);
1765 if (msleep_interruptible(100))
1772 static void iwl_mvm_d3_test_disconn_work_iter(void *_data
, u8
*mac
,
1773 struct ieee80211_vif
*vif
)
1775 /* skip the one we keep connection on */
1779 if (vif
->type
== NL80211_IFTYPE_STATION
)
1780 ieee80211_connection_loss(vif
);
1783 static int iwl_mvm_d3_test_release(struct inode
*inode
, struct file
*file
)
1785 struct iwl_mvm
*mvm
= inode
->i_private
;
1786 int remaining_time
= 10;
1788 mvm
->d3_test_active
= false;
1790 __iwl_mvm_resume(mvm
, true);
1792 iwl_abort_notification_waits(&mvm
->notif_wait
);
1793 ieee80211_restart_hw(mvm
->hw
);
1795 /* wait for restart and disconnect all interfaces */
1796 while (test_bit(IWL_MVM_STATUS_IN_HW_RESTART
, &mvm
->status
) &&
1797 remaining_time
> 0) {
1802 if (remaining_time
== 0)
1803 IWL_ERR(mvm
, "Timed out waiting for HW restart to finish!\n");
1805 ieee80211_iterate_active_interfaces_atomic(
1806 mvm
->hw
, IEEE80211_IFACE_ITER_NORMAL
,
1807 iwl_mvm_d3_test_disconn_work_iter
, mvm
->keep_vif
);
1809 ieee80211_wake_queues(mvm
->hw
);
1814 const struct file_operations iwl_dbgfs_d3_test_ops
= {
1815 .llseek
= no_llseek
,
1816 .open
= iwl_mvm_d3_test_open
,
1817 .read
= iwl_mvm_d3_test_read
,
1818 .release
= iwl_mvm_d3_test_release
,