Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net
[deliverable/linux.git] / drivers / net / wireless / mwifiex / scan.c
1 /*
2 * Marvell Wireless LAN device driver: scan ioctl and command handling
3 *
4 * Copyright (C) 2011, Marvell International Ltd.
5 *
6 * This software file (the "File") is distributed by Marvell International
7 * Ltd. under the terms of the GNU General Public License Version 2, June 1991
8 * (the "License"). You may use, redistribute and/or modify this File in
9 * accordance with the terms and conditions of the License, a copy of which
10 * is available by writing to the Free Software Foundation, Inc.,
11 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA or on the
12 * worldwide web at http://www.gnu.org/licenses/old-licenses/gpl-2.0.txt.
13 *
14 * THE FILE IS DISTRIBUTED AS-IS, WITHOUT WARRANTY OF ANY KIND, AND THE
15 * IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE
16 * ARE EXPRESSLY DISCLAIMED. The License provides additional details about
17 * this warranty disclaimer.
18 */
19
20 #include "decl.h"
21 #include "ioctl.h"
22 #include "util.h"
23 #include "fw.h"
24 #include "main.h"
25 #include "11n.h"
26 #include "cfg80211.h"
27
28 /* The maximum number of channels the firmware can scan per command */
29 #define MWIFIEX_MAX_CHANNELS_PER_SPECIFIC_SCAN 14
30
31 #define MWIFIEX_DEF_CHANNELS_PER_SCAN_CMD 4
32 #define MWIFIEX_LIMIT_1_CHANNEL_PER_SCAN_CMD 15
33 #define MWIFIEX_LIMIT_2_CHANNELS_PER_SCAN_CMD 27
34 #define MWIFIEX_LIMIT_3_CHANNELS_PER_SCAN_CMD 35
35
36 /* Memory needed to store a max sized Channel List TLV for a firmware scan */
37 #define CHAN_TLV_MAX_SIZE (sizeof(struct mwifiex_ie_types_header) \
38 + (MWIFIEX_MAX_CHANNELS_PER_SPECIFIC_SCAN \
39 *sizeof(struct mwifiex_chan_scan_param_set)))
40
41 /* Memory needed to store supported rate */
42 #define RATE_TLV_MAX_SIZE (sizeof(struct mwifiex_ie_types_rates_param_set) \
43 + HOSTCMD_SUPPORTED_RATES)
44
45 /* Memory needed to store a max number/size WildCard SSID TLV for a firmware
46 scan */
47 #define WILDCARD_SSID_TLV_MAX_SIZE \
48 (MWIFIEX_MAX_SSID_LIST_LENGTH * \
49 (sizeof(struct mwifiex_ie_types_wildcard_ssid_params) \
50 + IEEE80211_MAX_SSID_LEN))
51
52 /* Maximum memory needed for a mwifiex_scan_cmd_config with all TLVs at max */
53 #define MAX_SCAN_CFG_ALLOC (sizeof(struct mwifiex_scan_cmd_config) \
54 + sizeof(struct mwifiex_ie_types_num_probes) \
55 + sizeof(struct mwifiex_ie_types_htcap) \
56 + CHAN_TLV_MAX_SIZE \
57 + RATE_TLV_MAX_SIZE \
58 + WILDCARD_SSID_TLV_MAX_SIZE)
59
60
61 union mwifiex_scan_cmd_config_tlv {
62 /* Scan configuration (variable length) */
63 struct mwifiex_scan_cmd_config config;
64 /* Max allocated block */
65 u8 config_alloc_buf[MAX_SCAN_CFG_ALLOC];
66 };
67
68 enum cipher_suite {
69 CIPHER_SUITE_TKIP,
70 CIPHER_SUITE_CCMP,
71 CIPHER_SUITE_MAX
72 };
73 static u8 mwifiex_wpa_oui[CIPHER_SUITE_MAX][4] = {
74 { 0x00, 0x50, 0xf2, 0x02 }, /* TKIP */
75 { 0x00, 0x50, 0xf2, 0x04 }, /* AES */
76 };
77 static u8 mwifiex_rsn_oui[CIPHER_SUITE_MAX][4] = {
78 { 0x00, 0x0f, 0xac, 0x02 }, /* TKIP */
79 { 0x00, 0x0f, 0xac, 0x04 }, /* AES */
80 };
81
82 /*
83 * This function parses a given IE for a given OUI.
84 *
85 * This is used to parse a WPA/RSN IE to find if it has
86 * a given oui in PTK.
87 */
88 static u8
89 mwifiex_search_oui_in_ie(struct ie_body *iebody, u8 *oui)
90 {
91 u8 count;
92
93 count = iebody->ptk_cnt[0];
94
95 /* There could be multiple OUIs for PTK hence
96 1) Take the length.
97 2) Check all the OUIs for AES.
98 3) If one of them is AES then pass success. */
99 while (count) {
100 if (!memcmp(iebody->ptk_body, oui, sizeof(iebody->ptk_body)))
101 return MWIFIEX_OUI_PRESENT;
102
103 --count;
104 if (count)
105 iebody = (struct ie_body *) ((u8 *) iebody +
106 sizeof(iebody->ptk_body));
107 }
108
109 pr_debug("info: %s: OUI is not found in PTK\n", __func__);
110 return MWIFIEX_OUI_NOT_PRESENT;
111 }
112
113 /*
114 * This function checks if a given OUI is present in a RSN IE.
115 *
116 * The function first checks if a RSN IE is present or not in the
117 * BSS descriptor. It tries to locate the OUI only if such an IE is
118 * present.
119 */
120 static u8
121 mwifiex_is_rsn_oui_present(struct mwifiex_bssdescriptor *bss_desc, u32 cipher)
122 {
123 u8 *oui;
124 struct ie_body *iebody;
125 u8 ret = MWIFIEX_OUI_NOT_PRESENT;
126
127 if (((bss_desc->bcn_rsn_ie) && ((*(bss_desc->bcn_rsn_ie)).
128 ieee_hdr.element_id == WLAN_EID_RSN))) {
129 iebody = (struct ie_body *)
130 (((u8 *) bss_desc->bcn_rsn_ie->data) +
131 RSN_GTK_OUI_OFFSET);
132 oui = &mwifiex_rsn_oui[cipher][0];
133 ret = mwifiex_search_oui_in_ie(iebody, oui);
134 if (ret)
135 return ret;
136 }
137 return ret;
138 }
139
140 /*
141 * This function checks if a given OUI is present in a WPA IE.
142 *
143 * The function first checks if a WPA IE is present or not in the
144 * BSS descriptor. It tries to locate the OUI only if such an IE is
145 * present.
146 */
147 static u8
148 mwifiex_is_wpa_oui_present(struct mwifiex_bssdescriptor *bss_desc, u32 cipher)
149 {
150 u8 *oui;
151 struct ie_body *iebody;
152 u8 ret = MWIFIEX_OUI_NOT_PRESENT;
153
154 if (((bss_desc->bcn_wpa_ie) &&
155 ((*(bss_desc->bcn_wpa_ie)).vend_hdr.element_id ==
156 WLAN_EID_WPA))) {
157 iebody = (struct ie_body *) bss_desc->bcn_wpa_ie->data;
158 oui = &mwifiex_wpa_oui[cipher][0];
159 ret = mwifiex_search_oui_in_ie(iebody, oui);
160 if (ret)
161 return ret;
162 }
163 return ret;
164 }
165
166 /*
167 * This function compares two SSIDs and checks if they match.
168 */
169 s32
170 mwifiex_ssid_cmp(struct cfg80211_ssid *ssid1, struct cfg80211_ssid *ssid2)
171 {
172 if (!ssid1 || !ssid2 || (ssid1->ssid_len != ssid2->ssid_len))
173 return -1;
174 return memcmp(ssid1->ssid, ssid2->ssid, ssid1->ssid_len);
175 }
176
177 /*
178 * This function checks if wapi is enabled in driver and scanned network is
179 * compatible with it.
180 */
181 static bool
182 mwifiex_is_bss_wapi(struct mwifiex_private *priv,
183 struct mwifiex_bssdescriptor *bss_desc)
184 {
185 if (priv->sec_info.wapi_enabled &&
186 (bss_desc->bcn_wapi_ie &&
187 ((*(bss_desc->bcn_wapi_ie)).ieee_hdr.element_id ==
188 WLAN_EID_BSS_AC_ACCESS_DELAY))) {
189 return true;
190 }
191 return false;
192 }
193
194 /*
195 * This function checks if driver is configured with no security mode and
196 * scanned network is compatible with it.
197 */
198 static bool
199 mwifiex_is_bss_no_sec(struct mwifiex_private *priv,
200 struct mwifiex_bssdescriptor *bss_desc)
201 {
202 if (!priv->sec_info.wep_enabled && !priv->sec_info.wpa_enabled &&
203 !priv->sec_info.wpa2_enabled && ((!bss_desc->bcn_wpa_ie) ||
204 ((*(bss_desc->bcn_wpa_ie)).vend_hdr.element_id !=
205 WLAN_EID_WPA)) &&
206 ((!bss_desc->bcn_rsn_ie) ||
207 ((*(bss_desc->bcn_rsn_ie)).ieee_hdr.element_id !=
208 WLAN_EID_RSN)) &&
209 !priv->sec_info.encryption_mode && !bss_desc->privacy) {
210 return true;
211 }
212 return false;
213 }
214
215 /*
216 * This function checks if static WEP is enabled in driver and scanned network
217 * is compatible with it.
218 */
219 static bool
220 mwifiex_is_bss_static_wep(struct mwifiex_private *priv,
221 struct mwifiex_bssdescriptor *bss_desc)
222 {
223 if (priv->sec_info.wep_enabled && !priv->sec_info.wpa_enabled &&
224 !priv->sec_info.wpa2_enabled && bss_desc->privacy) {
225 return true;
226 }
227 return false;
228 }
229
230 /*
231 * This function checks if wpa is enabled in driver and scanned network is
232 * compatible with it.
233 */
234 static bool
235 mwifiex_is_bss_wpa(struct mwifiex_private *priv,
236 struct mwifiex_bssdescriptor *bss_desc)
237 {
238 if (!priv->sec_info.wep_enabled && priv->sec_info.wpa_enabled &&
239 !priv->sec_info.wpa2_enabled && ((bss_desc->bcn_wpa_ie) &&
240 ((*(bss_desc->bcn_wpa_ie)).vend_hdr.element_id == WLAN_EID_WPA))
241 /*
242 * Privacy bit may NOT be set in some APs like
243 * LinkSys WRT54G && bss_desc->privacy
244 */
245 ) {
246 dev_dbg(priv->adapter->dev, "info: %s: WPA:"
247 " wpa_ie=%#x wpa2_ie=%#x WEP=%s WPA=%s WPA2=%s "
248 "EncMode=%#x privacy=%#x\n", __func__,
249 (bss_desc->bcn_wpa_ie) ?
250 (*(bss_desc->bcn_wpa_ie)).
251 vend_hdr.element_id : 0,
252 (bss_desc->bcn_rsn_ie) ?
253 (*(bss_desc->bcn_rsn_ie)).
254 ieee_hdr.element_id : 0,
255 (priv->sec_info.wep_enabled) ? "e" : "d",
256 (priv->sec_info.wpa_enabled) ? "e" : "d",
257 (priv->sec_info.wpa2_enabled) ? "e" : "d",
258 priv->sec_info.encryption_mode,
259 bss_desc->privacy);
260 return true;
261 }
262 return false;
263 }
264
265 /*
266 * This function checks if wpa2 is enabled in driver and scanned network is
267 * compatible with it.
268 */
269 static bool
270 mwifiex_is_bss_wpa2(struct mwifiex_private *priv,
271 struct mwifiex_bssdescriptor *bss_desc)
272 {
273 if (!priv->sec_info.wep_enabled &&
274 !priv->sec_info.wpa_enabled &&
275 priv->sec_info.wpa2_enabled &&
276 ((bss_desc->bcn_rsn_ie) &&
277 ((*(bss_desc->bcn_rsn_ie)).ieee_hdr.element_id == WLAN_EID_RSN))) {
278 /*
279 * Privacy bit may NOT be set in some APs like
280 * LinkSys WRT54G && bss_desc->privacy
281 */
282 dev_dbg(priv->adapter->dev, "info: %s: WPA2: "
283 " wpa_ie=%#x wpa2_ie=%#x WEP=%s WPA=%s WPA2=%s "
284 "EncMode=%#x privacy=%#x\n", __func__,
285 (bss_desc->bcn_wpa_ie) ?
286 (*(bss_desc->bcn_wpa_ie)).
287 vend_hdr.element_id : 0,
288 (bss_desc->bcn_rsn_ie) ?
289 (*(bss_desc->bcn_rsn_ie)).
290 ieee_hdr.element_id : 0,
291 (priv->sec_info.wep_enabled) ? "e" : "d",
292 (priv->sec_info.wpa_enabled) ? "e" : "d",
293 (priv->sec_info.wpa2_enabled) ? "e" : "d",
294 priv->sec_info.encryption_mode,
295 bss_desc->privacy);
296 return true;
297 }
298 return false;
299 }
300
301 /*
302 * This function checks if adhoc AES is enabled in driver and scanned network is
303 * compatible with it.
304 */
305 static bool
306 mwifiex_is_bss_adhoc_aes(struct mwifiex_private *priv,
307 struct mwifiex_bssdescriptor *bss_desc)
308 {
309 if (!priv->sec_info.wep_enabled && !priv->sec_info.wpa_enabled &&
310 !priv->sec_info.wpa2_enabled &&
311 ((!bss_desc->bcn_wpa_ie) ||
312 ((*(bss_desc->bcn_wpa_ie)).vend_hdr.element_id != WLAN_EID_WPA)) &&
313 ((!bss_desc->bcn_rsn_ie) ||
314 ((*(bss_desc->bcn_rsn_ie)).ieee_hdr.element_id != WLAN_EID_RSN)) &&
315 !priv->sec_info.encryption_mode && bss_desc->privacy) {
316 return true;
317 }
318 return false;
319 }
320
321 /*
322 * This function checks if dynamic WEP is enabled in driver and scanned network
323 * is compatible with it.
324 */
325 static bool
326 mwifiex_is_bss_dynamic_wep(struct mwifiex_private *priv,
327 struct mwifiex_bssdescriptor *bss_desc)
328 {
329 if (!priv->sec_info.wep_enabled && !priv->sec_info.wpa_enabled &&
330 !priv->sec_info.wpa2_enabled &&
331 ((!bss_desc->bcn_wpa_ie) ||
332 ((*(bss_desc->bcn_wpa_ie)).vend_hdr.element_id != WLAN_EID_WPA)) &&
333 ((!bss_desc->bcn_rsn_ie) ||
334 ((*(bss_desc->bcn_rsn_ie)).ieee_hdr.element_id != WLAN_EID_RSN)) &&
335 priv->sec_info.encryption_mode && bss_desc->privacy) {
336 dev_dbg(priv->adapter->dev, "info: %s: dynamic "
337 "WEP: wpa_ie=%#x wpa2_ie=%#x "
338 "EncMode=%#x privacy=%#x\n",
339 __func__,
340 (bss_desc->bcn_wpa_ie) ?
341 (*(bss_desc->bcn_wpa_ie)).
342 vend_hdr.element_id : 0,
343 (bss_desc->bcn_rsn_ie) ?
344 (*(bss_desc->bcn_rsn_ie)).
345 ieee_hdr.element_id : 0,
346 priv->sec_info.encryption_mode,
347 bss_desc->privacy);
348 return true;
349 }
350 return false;
351 }
352
353 /*
354 * This function checks if a scanned network is compatible with the driver
355 * settings.
356 *
357 * WEP WPA WPA2 ad-hoc encrypt Network
358 * enabled enabled enabled AES mode Privacy WPA WPA2 Compatible
359 * 0 0 0 0 NONE 0 0 0 yes No security
360 * 0 1 0 0 x 1x 1 x yes WPA (disable
361 * HT if no AES)
362 * 0 0 1 0 x 1x x 1 yes WPA2 (disable
363 * HT if no AES)
364 * 0 0 0 1 NONE 1 0 0 yes Ad-hoc AES
365 * 1 0 0 0 NONE 1 0 0 yes Static WEP
366 * (disable HT)
367 * 0 0 0 0 !=NONE 1 0 0 yes Dynamic WEP
368 *
369 * Compatibility is not matched while roaming, except for mode.
370 */
371 static s32
372 mwifiex_is_network_compatible(struct mwifiex_private *priv,
373 struct mwifiex_bssdescriptor *bss_desc, u32 mode)
374 {
375 struct mwifiex_adapter *adapter = priv->adapter;
376
377 bss_desc->disable_11n = false;
378
379 /* Don't check for compatibility if roaming */
380 if (priv->media_connected &&
381 (priv->bss_mode == NL80211_IFTYPE_STATION) &&
382 (bss_desc->bss_mode == NL80211_IFTYPE_STATION))
383 return 0;
384
385 if (priv->wps.session_enable) {
386 dev_dbg(adapter->dev,
387 "info: return success directly in WPS period\n");
388 return 0;
389 }
390
391 if (mwifiex_is_bss_wapi(priv, bss_desc)) {
392 dev_dbg(adapter->dev, "info: return success for WAPI AP\n");
393 return 0;
394 }
395
396 if (bss_desc->bss_mode == mode) {
397 if (mwifiex_is_bss_no_sec(priv, bss_desc)) {
398 /* No security */
399 return 0;
400 } else if (mwifiex_is_bss_static_wep(priv, bss_desc)) {
401 /* Static WEP enabled */
402 dev_dbg(adapter->dev, "info: Disable 11n in WEP mode.\n");
403 bss_desc->disable_11n = true;
404 return 0;
405 } else if (mwifiex_is_bss_wpa(priv, bss_desc)) {
406 /* WPA enabled */
407 if (((priv->adapter->config_bands & BAND_GN ||
408 priv->adapter->config_bands & BAND_AN) &&
409 bss_desc->bcn_ht_cap) &&
410 !mwifiex_is_wpa_oui_present(bss_desc,
411 CIPHER_SUITE_CCMP)) {
412
413 if (mwifiex_is_wpa_oui_present
414 (bss_desc, CIPHER_SUITE_TKIP)) {
415 dev_dbg(adapter->dev,
416 "info: Disable 11n if AES "
417 "is not supported by AP\n");
418 bss_desc->disable_11n = true;
419 } else {
420 return -1;
421 }
422 }
423 return 0;
424 } else if (mwifiex_is_bss_wpa2(priv, bss_desc)) {
425 /* WPA2 enabled */
426 if (((priv->adapter->config_bands & BAND_GN ||
427 priv->adapter->config_bands & BAND_AN) &&
428 bss_desc->bcn_ht_cap) &&
429 !mwifiex_is_rsn_oui_present(bss_desc,
430 CIPHER_SUITE_CCMP)) {
431
432 if (mwifiex_is_rsn_oui_present
433 (bss_desc, CIPHER_SUITE_TKIP)) {
434 dev_dbg(adapter->dev,
435 "info: Disable 11n if AES "
436 "is not supported by AP\n");
437 bss_desc->disable_11n = true;
438 } else {
439 return -1;
440 }
441 }
442 return 0;
443 } else if (mwifiex_is_bss_adhoc_aes(priv, bss_desc)) {
444 /* Ad-hoc AES enabled */
445 return 0;
446 } else if (mwifiex_is_bss_dynamic_wep(priv, bss_desc)) {
447 /* Dynamic WEP enabled */
448 return 0;
449 }
450
451 /* Security doesn't match */
452 dev_dbg(adapter->dev,
453 "info: %s: failed: wpa_ie=%#x wpa2_ie=%#x WEP=%s "
454 "WPA=%s WPA2=%s EncMode=%#x privacy=%#x\n", __func__,
455 (bss_desc->bcn_wpa_ie) ?
456 (*(bss_desc->bcn_wpa_ie)).vend_hdr.element_id : 0,
457 (bss_desc->bcn_rsn_ie) ?
458 (*(bss_desc->bcn_rsn_ie)).ieee_hdr.element_id : 0,
459 (priv->sec_info.wep_enabled) ? "e" : "d",
460 (priv->sec_info.wpa_enabled) ? "e" : "d",
461 (priv->sec_info.wpa2_enabled) ? "e" : "d",
462 priv->sec_info.encryption_mode, bss_desc->privacy);
463 return -1;
464 }
465
466 /* Mode doesn't match */
467 return -1;
468 }
469
470 /*
471 * This function creates a channel list for the driver to scan, based
472 * on region/band information.
473 *
474 * This routine is used for any scan that is not provided with a
475 * specific channel list to scan.
476 */
477 static int
478 mwifiex_scan_create_channel_list(struct mwifiex_private *priv,
479 const struct mwifiex_user_scan_cfg
480 *user_scan_in,
481 struct mwifiex_chan_scan_param_set
482 *scan_chan_list,
483 u8 filtered_scan)
484 {
485 enum ieee80211_band band;
486 struct ieee80211_supported_band *sband;
487 struct ieee80211_channel *ch;
488 struct mwifiex_adapter *adapter = priv->adapter;
489 int chan_idx = 0, i;
490
491 for (band = 0; (band < IEEE80211_NUM_BANDS) ; band++) {
492
493 if (!priv->wdev->wiphy->bands[band])
494 continue;
495
496 sband = priv->wdev->wiphy->bands[band];
497
498 for (i = 0; (i < sband->n_channels) ; i++) {
499 ch = &sband->channels[i];
500 if (ch->flags & IEEE80211_CHAN_DISABLED)
501 continue;
502 scan_chan_list[chan_idx].radio_type = band;
503
504 if (user_scan_in &&
505 user_scan_in->chan_list[0].scan_time)
506 scan_chan_list[chan_idx].max_scan_time =
507 cpu_to_le16((u16) user_scan_in->
508 chan_list[0].scan_time);
509 else if (ch->flags & IEEE80211_CHAN_PASSIVE_SCAN)
510 scan_chan_list[chan_idx].max_scan_time =
511 cpu_to_le16(adapter->passive_scan_time);
512 else
513 scan_chan_list[chan_idx].max_scan_time =
514 cpu_to_le16(adapter->active_scan_time);
515
516 if (ch->flags & IEEE80211_CHAN_PASSIVE_SCAN)
517 scan_chan_list[chan_idx].chan_scan_mode_bitmap
518 |= MWIFIEX_PASSIVE_SCAN;
519 else
520 scan_chan_list[chan_idx].chan_scan_mode_bitmap
521 &= ~MWIFIEX_PASSIVE_SCAN;
522 scan_chan_list[chan_idx].chan_number =
523 (u32) ch->hw_value;
524 if (filtered_scan) {
525 scan_chan_list[chan_idx].max_scan_time =
526 cpu_to_le16(adapter->specific_scan_time);
527 scan_chan_list[chan_idx].chan_scan_mode_bitmap
528 |= MWIFIEX_DISABLE_CHAN_FILT;
529 }
530 chan_idx++;
531 }
532
533 }
534 return chan_idx;
535 }
536
537 /*
538 * This function constructs and sends multiple scan config commands to
539 * the firmware.
540 *
541 * Previous routines in the code flow have created a scan command configuration
542 * with any requested TLVs. This function splits the channel TLV into maximum
543 * channels supported per scan lists and sends the portion of the channel TLV,
544 * along with the other TLVs, to the firmware.
545 */
546 static int
547 mwifiex_scan_channel_list(struct mwifiex_private *priv,
548 u32 max_chan_per_scan, u8 filtered_scan,
549 struct mwifiex_scan_cmd_config *scan_cfg_out,
550 struct mwifiex_ie_types_chan_list_param_set
551 *chan_tlv_out,
552 struct mwifiex_chan_scan_param_set *scan_chan_list)
553 {
554 int ret = 0;
555 struct mwifiex_chan_scan_param_set *tmp_chan_list;
556 struct mwifiex_chan_scan_param_set *start_chan;
557
558 u32 tlv_idx;
559 u32 total_scan_time;
560 u32 done_early;
561
562 if (!scan_cfg_out || !chan_tlv_out || !scan_chan_list) {
563 dev_dbg(priv->adapter->dev,
564 "info: Scan: Null detect: %p, %p, %p\n",
565 scan_cfg_out, chan_tlv_out, scan_chan_list);
566 return -1;
567 }
568
569 chan_tlv_out->header.type = cpu_to_le16(TLV_TYPE_CHANLIST);
570
571 /* Set the temp channel struct pointer to the start of the desired
572 list */
573 tmp_chan_list = scan_chan_list;
574
575 /* Loop through the desired channel list, sending a new firmware scan
576 commands for each max_chan_per_scan channels (or for 1,6,11
577 individually if configured accordingly) */
578 while (tmp_chan_list->chan_number) {
579
580 tlv_idx = 0;
581 total_scan_time = 0;
582 chan_tlv_out->header.len = 0;
583 start_chan = tmp_chan_list;
584 done_early = false;
585
586 /*
587 * Construct the Channel TLV for the scan command. Continue to
588 * insert channel TLVs until:
589 * - the tlv_idx hits the maximum configured per scan command
590 * - the next channel to insert is 0 (end of desired channel
591 * list)
592 * - done_early is set (controlling individual scanning of
593 * 1,6,11)
594 */
595 while (tlv_idx < max_chan_per_scan &&
596 tmp_chan_list->chan_number && !done_early) {
597
598 dev_dbg(priv->adapter->dev,
599 "info: Scan: Chan(%3d), Radio(%d),"
600 " Mode(%d, %d), Dur(%d)\n",
601 tmp_chan_list->chan_number,
602 tmp_chan_list->radio_type,
603 tmp_chan_list->chan_scan_mode_bitmap
604 & MWIFIEX_PASSIVE_SCAN,
605 (tmp_chan_list->chan_scan_mode_bitmap
606 & MWIFIEX_DISABLE_CHAN_FILT) >> 1,
607 le16_to_cpu(tmp_chan_list->max_scan_time));
608
609 /* Copy the current channel TLV to the command being
610 prepared */
611 memcpy(chan_tlv_out->chan_scan_param + tlv_idx,
612 tmp_chan_list,
613 sizeof(chan_tlv_out->chan_scan_param));
614
615 /* Increment the TLV header length by the size
616 appended */
617 chan_tlv_out->header.len =
618 cpu_to_le16(le16_to_cpu(chan_tlv_out->header.len) +
619 (sizeof(chan_tlv_out->chan_scan_param)));
620
621 /*
622 * The tlv buffer length is set to the number of bytes
623 * of the between the channel tlv pointer and the start
624 * of the tlv buffer. This compensates for any TLVs
625 * that were appended before the channel list.
626 */
627 scan_cfg_out->tlv_buf_len = (u32) ((u8 *) chan_tlv_out -
628 scan_cfg_out->tlv_buf);
629
630 /* Add the size of the channel tlv header and the data
631 length */
632 scan_cfg_out->tlv_buf_len +=
633 (sizeof(chan_tlv_out->header)
634 + le16_to_cpu(chan_tlv_out->header.len));
635
636 /* Increment the index to the channel tlv we are
637 constructing */
638 tlv_idx++;
639
640 /* Count the total scan time per command */
641 total_scan_time +=
642 le16_to_cpu(tmp_chan_list->max_scan_time);
643
644 done_early = false;
645
646 /* Stop the loop if the *current* channel is in the
647 1,6,11 set and we are not filtering on a BSSID
648 or SSID. */
649 if (!filtered_scan &&
650 (tmp_chan_list->chan_number == 1 ||
651 tmp_chan_list->chan_number == 6 ||
652 tmp_chan_list->chan_number == 11))
653 done_early = true;
654
655 /* Increment the tmp pointer to the next channel to
656 be scanned */
657 tmp_chan_list++;
658
659 /* Stop the loop if the *next* channel is in the 1,6,11
660 set. This will cause it to be the only channel
661 scanned on the next interation */
662 if (!filtered_scan &&
663 (tmp_chan_list->chan_number == 1 ||
664 tmp_chan_list->chan_number == 6 ||
665 tmp_chan_list->chan_number == 11))
666 done_early = true;
667 }
668
669 /* The total scan time should be less than scan command timeout
670 value */
671 if (total_scan_time > MWIFIEX_MAX_TOTAL_SCAN_TIME) {
672 dev_err(priv->adapter->dev, "total scan time %dms"
673 " is over limit (%dms), scan skipped\n",
674 total_scan_time, MWIFIEX_MAX_TOTAL_SCAN_TIME);
675 ret = -1;
676 break;
677 }
678
679 priv->adapter->scan_channels = start_chan;
680
681 /* Send the scan command to the firmware with the specified
682 cfg */
683 ret = mwifiex_send_cmd_async(priv, HostCmd_CMD_802_11_SCAN,
684 HostCmd_ACT_GEN_SET, 0,
685 scan_cfg_out);
686 if (ret)
687 break;
688 }
689
690 if (ret)
691 return -1;
692
693 return 0;
694 }
695
696 /*
697 * This function constructs a scan command configuration structure to use
698 * in scan commands.
699 *
700 * Application layer or other functions can invoke network scanning
701 * with a scan configuration supplied in a user scan configuration structure.
702 * This structure is used as the basis of one or many scan command configuration
703 * commands that are sent to the command processing module and eventually to the
704 * firmware.
705 *
706 * This function creates a scan command configuration structure based on the
707 * following user supplied parameters (if present):
708 * - SSID filter
709 * - BSSID filter
710 * - Number of Probes to be sent
711 * - Channel list
712 *
713 * If the SSID or BSSID filter is not present, the filter is disabled/cleared.
714 * If the number of probes is not set, adapter default setting is used.
715 */
716 static void
717 mwifiex_config_scan(struct mwifiex_private *priv,
718 const struct mwifiex_user_scan_cfg *user_scan_in,
719 struct mwifiex_scan_cmd_config *scan_cfg_out,
720 struct mwifiex_ie_types_chan_list_param_set **chan_list_out,
721 struct mwifiex_chan_scan_param_set *scan_chan_list,
722 u8 *max_chan_per_scan, u8 *filtered_scan,
723 u8 *scan_current_only)
724 {
725 struct mwifiex_adapter *adapter = priv->adapter;
726 struct mwifiex_ie_types_num_probes *num_probes_tlv;
727 struct mwifiex_ie_types_wildcard_ssid_params *wildcard_ssid_tlv;
728 struct mwifiex_ie_types_rates_param_set *rates_tlv;
729 const u8 zero_mac[ETH_ALEN] = { 0, 0, 0, 0, 0, 0 };
730 u8 *tlv_pos;
731 u32 num_probes;
732 u32 ssid_len;
733 u32 chan_idx;
734 u32 chan_num;
735 u32 scan_type;
736 u16 scan_dur;
737 u8 channel;
738 u8 radio_type;
739 int i;
740 u8 ssid_filter;
741 u8 rates[MWIFIEX_SUPPORTED_RATES];
742 u32 rates_size;
743 struct mwifiex_ie_types_htcap *ht_cap;
744
745 /* The tlv_buf_len is calculated for each scan command. The TLVs added
746 in this routine will be preserved since the routine that sends the
747 command will append channelTLVs at *chan_list_out. The difference
748 between the *chan_list_out and the tlv_buf start will be used to
749 calculate the size of anything we add in this routine. */
750 scan_cfg_out->tlv_buf_len = 0;
751
752 /* Running tlv pointer. Assigned to chan_list_out at end of function
753 so later routines know where channels can be added to the command
754 buf */
755 tlv_pos = scan_cfg_out->tlv_buf;
756
757 /* Initialize the scan as un-filtered; the flag is later set to TRUE
758 below if a SSID or BSSID filter is sent in the command */
759 *filtered_scan = false;
760
761 /* Initialize the scan as not being only on the current channel. If
762 the channel list is customized, only contains one channel, and is
763 the active channel, this is set true and data flow is not halted. */
764 *scan_current_only = false;
765
766 if (user_scan_in) {
767
768 /* Default the ssid_filter flag to TRUE, set false under
769 certain wildcard conditions and qualified by the existence
770 of an SSID list before marking the scan as filtered */
771 ssid_filter = true;
772
773 /* Set the BSS type scan filter, use Adapter setting if
774 unset */
775 scan_cfg_out->bss_mode =
776 (user_scan_in->bss_mode ? (u8) user_scan_in->
777 bss_mode : (u8) adapter->scan_mode);
778
779 /* Set the number of probes to send, use Adapter setting
780 if unset */
781 num_probes =
782 (user_scan_in->num_probes ? user_scan_in->
783 num_probes : adapter->scan_probes);
784
785 /*
786 * Set the BSSID filter to the incoming configuration,
787 * if non-zero. If not set, it will remain disabled
788 * (all zeros).
789 */
790 memcpy(scan_cfg_out->specific_bssid,
791 user_scan_in->specific_bssid,
792 sizeof(scan_cfg_out->specific_bssid));
793
794 for (i = 0; i < user_scan_in->num_ssids; i++) {
795 ssid_len = user_scan_in->ssid_list[i].ssid_len;
796
797 wildcard_ssid_tlv =
798 (struct mwifiex_ie_types_wildcard_ssid_params *)
799 tlv_pos;
800 wildcard_ssid_tlv->header.type =
801 cpu_to_le16(TLV_TYPE_WILDCARDSSID);
802 wildcard_ssid_tlv->header.len = cpu_to_le16(
803 (u16) (ssid_len + sizeof(wildcard_ssid_tlv->
804 max_ssid_length)));
805
806 /*
807 * max_ssid_length = 0 tells firmware to perform
808 * specific scan for the SSID filled, whereas
809 * max_ssid_length = IEEE80211_MAX_SSID_LEN is for
810 * wildcard scan.
811 */
812 if (ssid_len)
813 wildcard_ssid_tlv->max_ssid_length = 0;
814 else
815 wildcard_ssid_tlv->max_ssid_length =
816 IEEE80211_MAX_SSID_LEN;
817
818 memcpy(wildcard_ssid_tlv->ssid,
819 user_scan_in->ssid_list[i].ssid, ssid_len);
820
821 tlv_pos += (sizeof(wildcard_ssid_tlv->header)
822 + le16_to_cpu(wildcard_ssid_tlv->header.len));
823
824 dev_dbg(adapter->dev, "info: scan: ssid[%d]: %s, %d\n",
825 i, wildcard_ssid_tlv->ssid,
826 wildcard_ssid_tlv->max_ssid_length);
827
828 /* Empty wildcard ssid with a maxlen will match many or
829 potentially all SSIDs (maxlen == 32), therefore do
830 not treat the scan as
831 filtered. */
832 if (!ssid_len && wildcard_ssid_tlv->max_ssid_length)
833 ssid_filter = false;
834 }
835
836 /*
837 * The default number of channels sent in the command is low to
838 * ensure the response buffer from the firmware does not
839 * truncate scan results. That is not an issue with an SSID
840 * or BSSID filter applied to the scan results in the firmware.
841 */
842 if ((i && ssid_filter) ||
843 memcmp(scan_cfg_out->specific_bssid, &zero_mac,
844 sizeof(zero_mac)))
845 *filtered_scan = true;
846 } else {
847 scan_cfg_out->bss_mode = (u8) adapter->scan_mode;
848 num_probes = adapter->scan_probes;
849 }
850
851 /*
852 * If a specific BSSID or SSID is used, the number of channels in the
853 * scan command will be increased to the absolute maximum.
854 */
855 if (*filtered_scan)
856 *max_chan_per_scan = MWIFIEX_MAX_CHANNELS_PER_SPECIFIC_SCAN;
857 else
858 *max_chan_per_scan = MWIFIEX_DEF_CHANNELS_PER_SCAN_CMD;
859
860 /* If the input config or adapter has the number of Probes set,
861 add tlv */
862 if (num_probes) {
863
864 dev_dbg(adapter->dev, "info: scan: num_probes = %d\n",
865 num_probes);
866
867 num_probes_tlv = (struct mwifiex_ie_types_num_probes *) tlv_pos;
868 num_probes_tlv->header.type = cpu_to_le16(TLV_TYPE_NUMPROBES);
869 num_probes_tlv->header.len =
870 cpu_to_le16(sizeof(num_probes_tlv->num_probes));
871 num_probes_tlv->num_probes = cpu_to_le16((u16) num_probes);
872
873 tlv_pos += sizeof(num_probes_tlv->header) +
874 le16_to_cpu(num_probes_tlv->header.len);
875
876 }
877
878 /* Append rates tlv */
879 memset(rates, 0, sizeof(rates));
880
881 rates_size = mwifiex_get_supported_rates(priv, rates);
882
883 rates_tlv = (struct mwifiex_ie_types_rates_param_set *) tlv_pos;
884 rates_tlv->header.type = cpu_to_le16(WLAN_EID_SUPP_RATES);
885 rates_tlv->header.len = cpu_to_le16((u16) rates_size);
886 memcpy(rates_tlv->rates, rates, rates_size);
887 tlv_pos += sizeof(rates_tlv->header) + rates_size;
888
889 dev_dbg(adapter->dev, "info: SCAN_CMD: Rates size = %d\n", rates_size);
890
891 if (ISSUPP_11NENABLED(priv->adapter->fw_cap_info) &&
892 (priv->adapter->config_bands & BAND_GN ||
893 priv->adapter->config_bands & BAND_AN)) {
894 ht_cap = (struct mwifiex_ie_types_htcap *) tlv_pos;
895 memset(ht_cap, 0, sizeof(struct mwifiex_ie_types_htcap));
896 ht_cap->header.type = cpu_to_le16(WLAN_EID_HT_CAPABILITY);
897 ht_cap->header.len =
898 cpu_to_le16(sizeof(struct ieee80211_ht_cap));
899 radio_type =
900 mwifiex_band_to_radio_type(priv->adapter->config_bands);
901 mwifiex_fill_cap_info(priv, radio_type, ht_cap);
902 tlv_pos += sizeof(struct mwifiex_ie_types_htcap);
903 }
904
905 /* Append vendor specific IE TLV */
906 mwifiex_cmd_append_vsie_tlv(priv, MWIFIEX_VSIE_MASK_SCAN, &tlv_pos);
907
908 /*
909 * Set the output for the channel TLV to the address in the tlv buffer
910 * past any TLVs that were added in this function (SSID, num_probes).
911 * Channel TLVs will be added past this for each scan command,
912 * preserving the TLVs that were previously added.
913 */
914 *chan_list_out =
915 (struct mwifiex_ie_types_chan_list_param_set *) tlv_pos;
916
917 if (user_scan_in && user_scan_in->chan_list[0].chan_number) {
918
919 dev_dbg(adapter->dev, "info: Scan: Using supplied channel list\n");
920
921 for (chan_idx = 0;
922 chan_idx < MWIFIEX_USER_SCAN_CHAN_MAX &&
923 user_scan_in->chan_list[chan_idx].chan_number;
924 chan_idx++) {
925
926 channel = user_scan_in->chan_list[chan_idx].chan_number;
927 (scan_chan_list + chan_idx)->chan_number = channel;
928
929 radio_type =
930 user_scan_in->chan_list[chan_idx].radio_type;
931 (scan_chan_list + chan_idx)->radio_type = radio_type;
932
933 scan_type = user_scan_in->chan_list[chan_idx].scan_type;
934
935 if (scan_type == MWIFIEX_SCAN_TYPE_PASSIVE)
936 (scan_chan_list +
937 chan_idx)->chan_scan_mode_bitmap
938 |= MWIFIEX_PASSIVE_SCAN;
939 else
940 (scan_chan_list +
941 chan_idx)->chan_scan_mode_bitmap
942 &= ~MWIFIEX_PASSIVE_SCAN;
943
944 if (user_scan_in->chan_list[chan_idx].scan_time) {
945 scan_dur = (u16) user_scan_in->
946 chan_list[chan_idx].scan_time;
947 } else {
948 if (scan_type == MWIFIEX_SCAN_TYPE_PASSIVE)
949 scan_dur = adapter->passive_scan_time;
950 else if (*filtered_scan)
951 scan_dur = adapter->specific_scan_time;
952 else
953 scan_dur = adapter->active_scan_time;
954 }
955
956 (scan_chan_list + chan_idx)->min_scan_time =
957 cpu_to_le16(scan_dur);
958 (scan_chan_list + chan_idx)->max_scan_time =
959 cpu_to_le16(scan_dur);
960 }
961
962 /* Check if we are only scanning the current channel */
963 if ((chan_idx == 1) &&
964 (user_scan_in->chan_list[0].chan_number ==
965 priv->curr_bss_params.bss_descriptor.channel)) {
966 *scan_current_only = true;
967 dev_dbg(adapter->dev,
968 "info: Scan: Scanning current channel only\n");
969 }
970 chan_num = chan_idx;
971 } else {
972 dev_dbg(adapter->dev,
973 "info: Scan: Creating full region channel list\n");
974 chan_num = mwifiex_scan_create_channel_list(priv, user_scan_in,
975 scan_chan_list,
976 *filtered_scan);
977 }
978
979 /*
980 * In associated state we will reduce the number of channels scanned per
981 * scan command to avoid any traffic delay/loss. This number is decided
982 * based on total number of channels to be scanned due to constraints
983 * of command buffers.
984 */
985 if (priv->media_connected) {
986 if (chan_num < MWIFIEX_LIMIT_1_CHANNEL_PER_SCAN_CMD)
987 *max_chan_per_scan = 1;
988 else if (chan_num < MWIFIEX_LIMIT_2_CHANNELS_PER_SCAN_CMD)
989 *max_chan_per_scan = 2;
990 else if (chan_num < MWIFIEX_LIMIT_3_CHANNELS_PER_SCAN_CMD)
991 *max_chan_per_scan = 3;
992 else
993 *max_chan_per_scan = 4;
994 }
995 }
996
997 /*
998 * This function inspects the scan response buffer for pointers to
999 * expected TLVs.
1000 *
1001 * TLVs can be included at the end of the scan response BSS information.
1002 *
1003 * Data in the buffer is parsed pointers to TLVs that can potentially
1004 * be passed back in the response.
1005 */
1006 static void
1007 mwifiex_ret_802_11_scan_get_tlv_ptrs(struct mwifiex_adapter *adapter,
1008 struct mwifiex_ie_types_data *tlv,
1009 u32 tlv_buf_size, u32 req_tlv_type,
1010 struct mwifiex_ie_types_data **tlv_data)
1011 {
1012 struct mwifiex_ie_types_data *current_tlv;
1013 u32 tlv_buf_left;
1014 u32 tlv_type;
1015 u32 tlv_len;
1016
1017 current_tlv = tlv;
1018 tlv_buf_left = tlv_buf_size;
1019 *tlv_data = NULL;
1020
1021 dev_dbg(adapter->dev, "info: SCAN_RESP: tlv_buf_size = %d\n",
1022 tlv_buf_size);
1023
1024 while (tlv_buf_left >= sizeof(struct mwifiex_ie_types_header)) {
1025
1026 tlv_type = le16_to_cpu(current_tlv->header.type);
1027 tlv_len = le16_to_cpu(current_tlv->header.len);
1028
1029 if (sizeof(tlv->header) + tlv_len > tlv_buf_left) {
1030 dev_err(adapter->dev, "SCAN_RESP: TLV buffer corrupt\n");
1031 break;
1032 }
1033
1034 if (req_tlv_type == tlv_type) {
1035 switch (tlv_type) {
1036 case TLV_TYPE_TSFTIMESTAMP:
1037 dev_dbg(adapter->dev, "info: SCAN_RESP: TSF "
1038 "timestamp TLV, len = %d\n", tlv_len);
1039 *tlv_data = current_tlv;
1040 break;
1041 case TLV_TYPE_CHANNELBANDLIST:
1042 dev_dbg(adapter->dev, "info: SCAN_RESP: channel"
1043 " band list TLV, len = %d\n", tlv_len);
1044 *tlv_data = current_tlv;
1045 break;
1046 default:
1047 dev_err(adapter->dev,
1048 "SCAN_RESP: unhandled TLV = %d\n",
1049 tlv_type);
1050 /* Give up, this seems corrupted */
1051 return;
1052 }
1053 }
1054
1055 if (*tlv_data)
1056 break;
1057
1058
1059 tlv_buf_left -= (sizeof(tlv->header) + tlv_len);
1060 current_tlv =
1061 (struct mwifiex_ie_types_data *) (current_tlv->data +
1062 tlv_len);
1063
1064 } /* while */
1065 }
1066
1067 /*
1068 * This function parses provided beacon buffer and updates
1069 * respective fields in bss descriptor structure.
1070 */
1071 int mwifiex_update_bss_desc_with_ie(struct mwifiex_adapter *adapter,
1072 struct mwifiex_bssdescriptor *bss_entry)
1073 {
1074 int ret = 0;
1075 u8 element_id;
1076 struct ieee_types_fh_param_set *fh_param_set;
1077 struct ieee_types_ds_param_set *ds_param_set;
1078 struct ieee_types_cf_param_set *cf_param_set;
1079 struct ieee_types_ibss_param_set *ibss_param_set;
1080 u8 *current_ptr;
1081 u8 *rate;
1082 u8 element_len;
1083 u16 total_ie_len;
1084 u8 bytes_to_copy;
1085 u8 rate_size;
1086 u8 found_data_rate_ie;
1087 u32 bytes_left;
1088 struct ieee_types_vendor_specific *vendor_ie;
1089 const u8 wpa_oui[4] = { 0x00, 0x50, 0xf2, 0x01 };
1090 const u8 wmm_oui[4] = { 0x00, 0x50, 0xf2, 0x02 };
1091
1092 found_data_rate_ie = false;
1093 rate_size = 0;
1094 current_ptr = bss_entry->beacon_buf;
1095 bytes_left = bss_entry->beacon_buf_size;
1096
1097 /* Process variable IE */
1098 while (bytes_left >= 2) {
1099 element_id = *current_ptr;
1100 element_len = *(current_ptr + 1);
1101 total_ie_len = element_len + sizeof(struct ieee_types_header);
1102
1103 if (bytes_left < total_ie_len) {
1104 dev_err(adapter->dev, "err: InterpretIE: in processing"
1105 " IE, bytes left < IE length\n");
1106 return -1;
1107 }
1108 switch (element_id) {
1109 case WLAN_EID_SSID:
1110 bss_entry->ssid.ssid_len = element_len;
1111 memcpy(bss_entry->ssid.ssid, (current_ptr + 2),
1112 element_len);
1113 dev_dbg(adapter->dev,
1114 "info: InterpretIE: ssid: %-32s\n",
1115 bss_entry->ssid.ssid);
1116 break;
1117
1118 case WLAN_EID_SUPP_RATES:
1119 memcpy(bss_entry->data_rates, current_ptr + 2,
1120 element_len);
1121 memcpy(bss_entry->supported_rates, current_ptr + 2,
1122 element_len);
1123 rate_size = element_len;
1124 found_data_rate_ie = true;
1125 break;
1126
1127 case WLAN_EID_FH_PARAMS:
1128 fh_param_set =
1129 (struct ieee_types_fh_param_set *) current_ptr;
1130 memcpy(&bss_entry->phy_param_set.fh_param_set,
1131 fh_param_set,
1132 sizeof(struct ieee_types_fh_param_set));
1133 break;
1134
1135 case WLAN_EID_DS_PARAMS:
1136 ds_param_set =
1137 (struct ieee_types_ds_param_set *) current_ptr;
1138
1139 bss_entry->channel = ds_param_set->current_chan;
1140
1141 memcpy(&bss_entry->phy_param_set.ds_param_set,
1142 ds_param_set,
1143 sizeof(struct ieee_types_ds_param_set));
1144 break;
1145
1146 case WLAN_EID_CF_PARAMS:
1147 cf_param_set =
1148 (struct ieee_types_cf_param_set *) current_ptr;
1149 memcpy(&bss_entry->ss_param_set.cf_param_set,
1150 cf_param_set,
1151 sizeof(struct ieee_types_cf_param_set));
1152 break;
1153
1154 case WLAN_EID_IBSS_PARAMS:
1155 ibss_param_set =
1156 (struct ieee_types_ibss_param_set *)
1157 current_ptr;
1158 memcpy(&bss_entry->ss_param_set.ibss_param_set,
1159 ibss_param_set,
1160 sizeof(struct ieee_types_ibss_param_set));
1161 break;
1162
1163 case WLAN_EID_ERP_INFO:
1164 bss_entry->erp_flags = *(current_ptr + 2);
1165 break;
1166
1167 case WLAN_EID_EXT_SUPP_RATES:
1168 /*
1169 * Only process extended supported rate
1170 * if data rate is already found.
1171 * Data rate IE should come before
1172 * extended supported rate IE
1173 */
1174 if (found_data_rate_ie) {
1175 if ((element_len + rate_size) >
1176 MWIFIEX_SUPPORTED_RATES)
1177 bytes_to_copy =
1178 (MWIFIEX_SUPPORTED_RATES -
1179 rate_size);
1180 else
1181 bytes_to_copy = element_len;
1182
1183 rate = (u8 *) bss_entry->data_rates;
1184 rate += rate_size;
1185 memcpy(rate, current_ptr + 2, bytes_to_copy);
1186
1187 rate = (u8 *) bss_entry->supported_rates;
1188 rate += rate_size;
1189 memcpy(rate, current_ptr + 2, bytes_to_copy);
1190 }
1191 break;
1192
1193 case WLAN_EID_VENDOR_SPECIFIC:
1194 vendor_ie = (struct ieee_types_vendor_specific *)
1195 current_ptr;
1196
1197 if (!memcmp
1198 (vendor_ie->vend_hdr.oui, wpa_oui,
1199 sizeof(wpa_oui))) {
1200 bss_entry->bcn_wpa_ie =
1201 (struct ieee_types_vendor_specific *)
1202 current_ptr;
1203 bss_entry->wpa_offset = (u16)
1204 (current_ptr - bss_entry->beacon_buf);
1205 } else if (!memcmp(vendor_ie->vend_hdr.oui, wmm_oui,
1206 sizeof(wmm_oui))) {
1207 if (total_ie_len ==
1208 sizeof(struct ieee_types_wmm_parameter) ||
1209 total_ie_len ==
1210 sizeof(struct ieee_types_wmm_info))
1211 /*
1212 * Only accept and copy the WMM IE if
1213 * it matches the size expected for the
1214 * WMM Info IE or the WMM Parameter IE.
1215 */
1216 memcpy((u8 *) &bss_entry->wmm_ie,
1217 current_ptr, total_ie_len);
1218 }
1219 break;
1220 case WLAN_EID_RSN:
1221 bss_entry->bcn_rsn_ie =
1222 (struct ieee_types_generic *) current_ptr;
1223 bss_entry->rsn_offset = (u16) (current_ptr -
1224 bss_entry->beacon_buf);
1225 break;
1226 case WLAN_EID_BSS_AC_ACCESS_DELAY:
1227 bss_entry->bcn_wapi_ie =
1228 (struct ieee_types_generic *) current_ptr;
1229 bss_entry->wapi_offset = (u16) (current_ptr -
1230 bss_entry->beacon_buf);
1231 break;
1232 case WLAN_EID_HT_CAPABILITY:
1233 bss_entry->bcn_ht_cap = (struct ieee80211_ht_cap *)
1234 (current_ptr +
1235 sizeof(struct ieee_types_header));
1236 bss_entry->ht_cap_offset = (u16) (current_ptr +
1237 sizeof(struct ieee_types_header) -
1238 bss_entry->beacon_buf);
1239 break;
1240 case WLAN_EID_HT_OPERATION:
1241 bss_entry->bcn_ht_oper =
1242 (struct ieee80211_ht_operation *)(current_ptr +
1243 sizeof(struct ieee_types_header));
1244 bss_entry->ht_info_offset = (u16) (current_ptr +
1245 sizeof(struct ieee_types_header) -
1246 bss_entry->beacon_buf);
1247 break;
1248 case WLAN_EID_BSS_COEX_2040:
1249 bss_entry->bcn_bss_co_2040 = current_ptr +
1250 sizeof(struct ieee_types_header);
1251 bss_entry->bss_co_2040_offset = (u16) (current_ptr +
1252 sizeof(struct ieee_types_header) -
1253 bss_entry->beacon_buf);
1254 break;
1255 case WLAN_EID_EXT_CAPABILITY:
1256 bss_entry->bcn_ext_cap = current_ptr +
1257 sizeof(struct ieee_types_header);
1258 bss_entry->ext_cap_offset = (u16) (current_ptr +
1259 sizeof(struct ieee_types_header) -
1260 bss_entry->beacon_buf);
1261 break;
1262 default:
1263 break;
1264 }
1265
1266 current_ptr += element_len + 2;
1267
1268 /* Need to account for IE ID and IE Len */
1269 bytes_left -= (element_len + 2);
1270
1271 } /* while (bytes_left > 2) */
1272 return ret;
1273 }
1274
1275 /*
1276 * This function converts radio type scan parameter to a band configuration
1277 * to be used in join command.
1278 */
1279 static u8
1280 mwifiex_radio_type_to_band(u8 radio_type)
1281 {
1282 switch (radio_type) {
1283 case HostCmd_SCAN_RADIO_TYPE_A:
1284 return BAND_A;
1285 case HostCmd_SCAN_RADIO_TYPE_BG:
1286 default:
1287 return BAND_G;
1288 }
1289 }
1290
1291 /*
1292 * This is an internal function used to start a scan based on an input
1293 * configuration.
1294 *
1295 * This uses the input user scan configuration information when provided in
1296 * order to send the appropriate scan commands to firmware to populate or
1297 * update the internal driver scan table.
1298 */
1299 int mwifiex_scan_networks(struct mwifiex_private *priv,
1300 const struct mwifiex_user_scan_cfg *user_scan_in)
1301 {
1302 int ret = 0;
1303 struct mwifiex_adapter *adapter = priv->adapter;
1304 struct cmd_ctrl_node *cmd_node;
1305 union mwifiex_scan_cmd_config_tlv *scan_cfg_out;
1306 struct mwifiex_ie_types_chan_list_param_set *chan_list_out;
1307 u32 buf_size;
1308 struct mwifiex_chan_scan_param_set *scan_chan_list;
1309 u8 filtered_scan;
1310 u8 scan_current_chan_only;
1311 u8 max_chan_per_scan;
1312 unsigned long flags;
1313
1314 if (adapter->scan_processing) {
1315 dev_dbg(adapter->dev, "cmd: Scan already in process...\n");
1316 return ret;
1317 }
1318
1319 spin_lock_irqsave(&adapter->mwifiex_cmd_lock, flags);
1320 adapter->scan_processing = true;
1321 spin_unlock_irqrestore(&adapter->mwifiex_cmd_lock, flags);
1322
1323 if (priv->scan_block) {
1324 dev_dbg(adapter->dev,
1325 "cmd: Scan is blocked during association...\n");
1326 return ret;
1327 }
1328
1329 scan_cfg_out = kzalloc(sizeof(union mwifiex_scan_cmd_config_tlv),
1330 GFP_KERNEL);
1331 if (!scan_cfg_out) {
1332 dev_err(adapter->dev, "failed to alloc scan_cfg_out\n");
1333 return -ENOMEM;
1334 }
1335
1336 buf_size = sizeof(struct mwifiex_chan_scan_param_set) *
1337 MWIFIEX_USER_SCAN_CHAN_MAX;
1338 scan_chan_list = kzalloc(buf_size, GFP_KERNEL);
1339 if (!scan_chan_list) {
1340 dev_err(adapter->dev, "failed to alloc scan_chan_list\n");
1341 kfree(scan_cfg_out);
1342 return -ENOMEM;
1343 }
1344
1345 mwifiex_config_scan(priv, user_scan_in, &scan_cfg_out->config,
1346 &chan_list_out, scan_chan_list, &max_chan_per_scan,
1347 &filtered_scan, &scan_current_chan_only);
1348
1349 ret = mwifiex_scan_channel_list(priv, max_chan_per_scan, filtered_scan,
1350 &scan_cfg_out->config, chan_list_out,
1351 scan_chan_list);
1352
1353 /* Get scan command from scan_pending_q and put to cmd_pending_q */
1354 if (!ret) {
1355 spin_lock_irqsave(&adapter->scan_pending_q_lock, flags);
1356 if (!list_empty(&adapter->scan_pending_q)) {
1357 cmd_node = list_first_entry(&adapter->scan_pending_q,
1358 struct cmd_ctrl_node, list);
1359 list_del(&cmd_node->list);
1360 spin_unlock_irqrestore(&adapter->scan_pending_q_lock,
1361 flags);
1362 adapter->cmd_queued = cmd_node;
1363 mwifiex_insert_cmd_to_pending_q(adapter, cmd_node,
1364 true);
1365 queue_work(adapter->workqueue, &adapter->main_work);
1366 } else {
1367 spin_unlock_irqrestore(&adapter->scan_pending_q_lock,
1368 flags);
1369 }
1370 } else {
1371 spin_lock_irqsave(&adapter->mwifiex_cmd_lock, flags);
1372 adapter->scan_processing = true;
1373 spin_unlock_irqrestore(&adapter->mwifiex_cmd_lock, flags);
1374 }
1375
1376 kfree(scan_cfg_out);
1377 kfree(scan_chan_list);
1378 return ret;
1379 }
1380
1381 /*
1382 * This function prepares a scan command to be sent to the firmware.
1383 *
1384 * This uses the scan command configuration sent to the command processing
1385 * module in command preparation stage to configure a scan command structure
1386 * to send to firmware.
1387 *
1388 * The fixed fields specifying the BSS type and BSSID filters as well as a
1389 * variable number/length of TLVs are sent in the command to firmware.
1390 *
1391 * Preparation also includes -
1392 * - Setting command ID, and proper size
1393 * - Ensuring correct endian-ness
1394 */
1395 int mwifiex_cmd_802_11_scan(struct host_cmd_ds_command *cmd,
1396 struct mwifiex_scan_cmd_config *scan_cfg)
1397 {
1398 struct host_cmd_ds_802_11_scan *scan_cmd = &cmd->params.scan;
1399
1400 /* Set fixed field variables in scan command */
1401 scan_cmd->bss_mode = scan_cfg->bss_mode;
1402 memcpy(scan_cmd->bssid, scan_cfg->specific_bssid,
1403 sizeof(scan_cmd->bssid));
1404 memcpy(scan_cmd->tlv_buffer, scan_cfg->tlv_buf, scan_cfg->tlv_buf_len);
1405
1406 cmd->command = cpu_to_le16(HostCmd_CMD_802_11_SCAN);
1407
1408 /* Size is equal to the sizeof(fixed portions) + the TLV len + header */
1409 cmd->size = cpu_to_le16((u16) (sizeof(scan_cmd->bss_mode)
1410 + sizeof(scan_cmd->bssid)
1411 + scan_cfg->tlv_buf_len + S_DS_GEN));
1412
1413 return 0;
1414 }
1415
1416 /*
1417 * This function checks compatibility of requested network with current
1418 * driver settings.
1419 */
1420 int mwifiex_check_network_compatibility(struct mwifiex_private *priv,
1421 struct mwifiex_bssdescriptor *bss_desc)
1422 {
1423 int ret = -1;
1424
1425 if (!bss_desc)
1426 return -1;
1427
1428 if ((mwifiex_get_cfp(priv, (u8) bss_desc->bss_band,
1429 (u16) bss_desc->channel, 0))) {
1430 switch (priv->bss_mode) {
1431 case NL80211_IFTYPE_STATION:
1432 case NL80211_IFTYPE_ADHOC:
1433 ret = mwifiex_is_network_compatible(priv, bss_desc,
1434 priv->bss_mode);
1435 if (ret)
1436 dev_err(priv->adapter->dev, "cannot find ssid "
1437 "%s\n", bss_desc->ssid.ssid);
1438 break;
1439 default:
1440 ret = 0;
1441 }
1442 }
1443
1444 return ret;
1445 }
1446
1447 static int mwifiex_update_curr_bss_params(struct mwifiex_private *priv,
1448 struct cfg80211_bss *bss)
1449 {
1450 struct mwifiex_bssdescriptor *bss_desc;
1451 int ret;
1452 unsigned long flags;
1453
1454 /* Allocate and fill new bss descriptor */
1455 bss_desc = kzalloc(sizeof(struct mwifiex_bssdescriptor),
1456 GFP_KERNEL);
1457 if (!bss_desc) {
1458 dev_err(priv->adapter->dev, " failed to alloc bss_desc\n");
1459 return -ENOMEM;
1460 }
1461
1462 ret = mwifiex_fill_new_bss_desc(priv, bss, bss_desc);
1463 if (ret)
1464 goto done;
1465
1466 ret = mwifiex_check_network_compatibility(priv, bss_desc);
1467 if (ret)
1468 goto done;
1469
1470 /* Update current bss descriptor parameters */
1471 spin_lock_irqsave(&priv->curr_bcn_buf_lock, flags);
1472 priv->curr_bss_params.bss_descriptor.bcn_wpa_ie = NULL;
1473 priv->curr_bss_params.bss_descriptor.wpa_offset = 0;
1474 priv->curr_bss_params.bss_descriptor.bcn_rsn_ie = NULL;
1475 priv->curr_bss_params.bss_descriptor.rsn_offset = 0;
1476 priv->curr_bss_params.bss_descriptor.bcn_wapi_ie = NULL;
1477 priv->curr_bss_params.bss_descriptor.wapi_offset = 0;
1478 priv->curr_bss_params.bss_descriptor.bcn_ht_cap = NULL;
1479 priv->curr_bss_params.bss_descriptor.ht_cap_offset =
1480 0;
1481 priv->curr_bss_params.bss_descriptor.bcn_ht_oper = NULL;
1482 priv->curr_bss_params.bss_descriptor.ht_info_offset =
1483 0;
1484 priv->curr_bss_params.bss_descriptor.bcn_bss_co_2040 =
1485 NULL;
1486 priv->curr_bss_params.bss_descriptor.
1487 bss_co_2040_offset = 0;
1488 priv->curr_bss_params.bss_descriptor.bcn_ext_cap = NULL;
1489 priv->curr_bss_params.bss_descriptor.ext_cap_offset = 0;
1490 priv->curr_bss_params.bss_descriptor.beacon_buf = NULL;
1491 priv->curr_bss_params.bss_descriptor.beacon_buf_size =
1492 0;
1493
1494 /* Make a copy of current BSSID descriptor */
1495 memcpy(&priv->curr_bss_params.bss_descriptor, bss_desc,
1496 sizeof(priv->curr_bss_params.bss_descriptor));
1497 mwifiex_save_curr_bcn(priv);
1498 spin_unlock_irqrestore(&priv->curr_bcn_buf_lock, flags);
1499
1500 done:
1501 kfree(bss_desc);
1502 return 0;
1503 }
1504
1505 /*
1506 * This function handles the command response of scan.
1507 *
1508 * The response buffer for the scan command has the following
1509 * memory layout:
1510 *
1511 * .-------------------------------------------------------------.
1512 * | Header (4 * sizeof(t_u16)): Standard command response hdr |
1513 * .-------------------------------------------------------------.
1514 * | BufSize (t_u16) : sizeof the BSS Description data |
1515 * .-------------------------------------------------------------.
1516 * | NumOfSet (t_u8) : Number of BSS Descs returned |
1517 * .-------------------------------------------------------------.
1518 * | BSSDescription data (variable, size given in BufSize) |
1519 * .-------------------------------------------------------------.
1520 * | TLV data (variable, size calculated using Header->Size, |
1521 * | BufSize and sizeof the fixed fields above) |
1522 * .-------------------------------------------------------------.
1523 */
1524 int mwifiex_ret_802_11_scan(struct mwifiex_private *priv,
1525 struct host_cmd_ds_command *resp)
1526 {
1527 int ret = 0;
1528 struct mwifiex_adapter *adapter = priv->adapter;
1529 struct cmd_ctrl_node *cmd_node;
1530 struct host_cmd_ds_802_11_scan_rsp *scan_rsp;
1531 struct mwifiex_ie_types_data *tlv_data;
1532 struct mwifiex_ie_types_tsf_timestamp *tsf_tlv;
1533 u8 *bss_info;
1534 u32 scan_resp_size;
1535 u32 bytes_left;
1536 u32 idx;
1537 u32 tlv_buf_size;
1538 struct mwifiex_chan_freq_power *cfp;
1539 struct mwifiex_ie_types_chan_band_list_param_set *chan_band_tlv;
1540 struct chan_band_param_set *chan_band;
1541 u8 is_bgscan_resp;
1542 unsigned long flags;
1543 struct cfg80211_bss *bss;
1544
1545 is_bgscan_resp = (le16_to_cpu(resp->command)
1546 == HostCmd_CMD_802_11_BG_SCAN_QUERY);
1547 if (is_bgscan_resp)
1548 scan_rsp = &resp->params.bg_scan_query_resp.scan_resp;
1549 else
1550 scan_rsp = &resp->params.scan_resp;
1551
1552
1553 if (scan_rsp->number_of_sets > MWIFIEX_MAX_AP) {
1554 dev_err(adapter->dev, "SCAN_RESP: too many AP returned (%d)\n",
1555 scan_rsp->number_of_sets);
1556 ret = -1;
1557 goto done;
1558 }
1559
1560 bytes_left = le16_to_cpu(scan_rsp->bss_descript_size);
1561 dev_dbg(adapter->dev, "info: SCAN_RESP: bss_descript_size %d\n",
1562 bytes_left);
1563
1564 scan_resp_size = le16_to_cpu(resp->size);
1565
1566 dev_dbg(adapter->dev,
1567 "info: SCAN_RESP: returned %d APs before parsing\n",
1568 scan_rsp->number_of_sets);
1569
1570 bss_info = scan_rsp->bss_desc_and_tlv_buffer;
1571
1572 /*
1573 * The size of the TLV buffer is equal to the entire command response
1574 * size (scan_resp_size) minus the fixed fields (sizeof()'s), the
1575 * BSS Descriptions (bss_descript_size as bytesLef) and the command
1576 * response header (S_DS_GEN)
1577 */
1578 tlv_buf_size = scan_resp_size - (bytes_left
1579 + sizeof(scan_rsp->bss_descript_size)
1580 + sizeof(scan_rsp->number_of_sets)
1581 + S_DS_GEN);
1582
1583 tlv_data = (struct mwifiex_ie_types_data *) (scan_rsp->
1584 bss_desc_and_tlv_buffer +
1585 bytes_left);
1586
1587 /* Search the TLV buffer space in the scan response for any valid
1588 TLVs */
1589 mwifiex_ret_802_11_scan_get_tlv_ptrs(adapter, tlv_data, tlv_buf_size,
1590 TLV_TYPE_TSFTIMESTAMP,
1591 (struct mwifiex_ie_types_data **)
1592 &tsf_tlv);
1593
1594 /* Search the TLV buffer space in the scan response for any valid
1595 TLVs */
1596 mwifiex_ret_802_11_scan_get_tlv_ptrs(adapter, tlv_data, tlv_buf_size,
1597 TLV_TYPE_CHANNELBANDLIST,
1598 (struct mwifiex_ie_types_data **)
1599 &chan_band_tlv);
1600
1601 for (idx = 0; idx < scan_rsp->number_of_sets && bytes_left; idx++) {
1602 u8 bssid[ETH_ALEN];
1603 s32 rssi;
1604 const u8 *ie_buf;
1605 size_t ie_len;
1606 u16 channel = 0;
1607 u64 fw_tsf = 0;
1608 u16 beacon_size = 0;
1609 u32 curr_bcn_bytes;
1610 u32 freq;
1611 u16 beacon_period;
1612 u16 cap_info_bitmap;
1613 u8 *current_ptr;
1614 u64 timestamp;
1615 struct mwifiex_bcn_param *bcn_param;
1616 struct mwifiex_bss_priv *bss_priv;
1617
1618 if (bytes_left >= sizeof(beacon_size)) {
1619 /* Extract & convert beacon size from command buffer */
1620 memcpy(&beacon_size, bss_info, sizeof(beacon_size));
1621 bytes_left -= sizeof(beacon_size);
1622 bss_info += sizeof(beacon_size);
1623 }
1624
1625 if (!beacon_size || beacon_size > bytes_left) {
1626 bss_info += bytes_left;
1627 bytes_left = 0;
1628 return -1;
1629 }
1630
1631 /* Initialize the current working beacon pointer for this BSS
1632 * iteration */
1633 current_ptr = bss_info;
1634
1635 /* Advance the return beacon pointer past the current beacon */
1636 bss_info += beacon_size;
1637 bytes_left -= beacon_size;
1638
1639 curr_bcn_bytes = beacon_size;
1640
1641 /*
1642 * First 5 fields are bssid, RSSI, time stamp, beacon interval,
1643 * and capability information
1644 */
1645 if (curr_bcn_bytes < sizeof(struct mwifiex_bcn_param)) {
1646 dev_err(adapter->dev,
1647 "InterpretIE: not enough bytes left\n");
1648 continue;
1649 }
1650 bcn_param = (struct mwifiex_bcn_param *)current_ptr;
1651 current_ptr += sizeof(*bcn_param);
1652 curr_bcn_bytes -= sizeof(*bcn_param);
1653
1654 memcpy(bssid, bcn_param->bssid, ETH_ALEN);
1655
1656 rssi = (s32) bcn_param->rssi;
1657 rssi = (-rssi) * 100; /* Convert dBm to mBm */
1658 dev_dbg(adapter->dev, "info: InterpretIE: RSSI=%d\n", rssi);
1659
1660 timestamp = le64_to_cpu(bcn_param->timestamp);
1661 beacon_period = le16_to_cpu(bcn_param->beacon_period);
1662
1663 cap_info_bitmap = le16_to_cpu(bcn_param->cap_info_bitmap);
1664 dev_dbg(adapter->dev, "info: InterpretIE: capabilities=0x%X\n",
1665 cap_info_bitmap);
1666
1667 /* Rest of the current buffer are IE's */
1668 ie_buf = current_ptr;
1669 ie_len = curr_bcn_bytes;
1670 dev_dbg(adapter->dev,
1671 "info: InterpretIE: IELength for this AP = %d\n",
1672 curr_bcn_bytes);
1673
1674 while (curr_bcn_bytes >= sizeof(struct ieee_types_header)) {
1675 u8 element_id, element_len;
1676
1677 element_id = *current_ptr;
1678 element_len = *(current_ptr + 1);
1679 if (curr_bcn_bytes < element_len +
1680 sizeof(struct ieee_types_header)) {
1681 dev_err(priv->adapter->dev,
1682 "%s: bytes left < IE length\n",
1683 __func__);
1684 goto done;
1685 }
1686 if (element_id == WLAN_EID_DS_PARAMS) {
1687 channel = *(current_ptr + sizeof(struct ieee_types_header));
1688 break;
1689 }
1690
1691 current_ptr += element_len +
1692 sizeof(struct ieee_types_header);
1693 curr_bcn_bytes -= element_len +
1694 sizeof(struct ieee_types_header);
1695 }
1696
1697 /*
1698 * If the TSF TLV was appended to the scan results, save this
1699 * entry's TSF value in the fw_tsf field. It is the firmware's
1700 * TSF value at the time the beacon or probe response was
1701 * received.
1702 */
1703 if (tsf_tlv)
1704 memcpy(&fw_tsf, &tsf_tlv->tsf_data[idx * TSF_DATA_SIZE],
1705 sizeof(fw_tsf));
1706
1707 if (channel) {
1708 struct ieee80211_channel *chan;
1709 u8 band;
1710
1711 band = BAND_G;
1712 if (chan_band_tlv) {
1713 chan_band =
1714 &chan_band_tlv->chan_band_param[idx];
1715 band = mwifiex_radio_type_to_band(
1716 chan_band->radio_type
1717 & (BIT(0) | BIT(1)));
1718 }
1719
1720 cfp = mwifiex_get_cfp(priv, band, channel, 0);
1721
1722 freq = cfp ? cfp->freq : 0;
1723
1724 chan = ieee80211_get_channel(priv->wdev->wiphy, freq);
1725
1726 if (chan && !(chan->flags & IEEE80211_CHAN_DISABLED)) {
1727 bss = cfg80211_inform_bss(priv->wdev->wiphy,
1728 chan, bssid, timestamp,
1729 cap_info_bitmap, beacon_period,
1730 ie_buf, ie_len, rssi, GFP_KERNEL);
1731 bss_priv = (struct mwifiex_bss_priv *)bss->priv;
1732 bss_priv->band = band;
1733 bss_priv->fw_tsf = fw_tsf;
1734 if (priv->media_connected &&
1735 !memcmp(bssid,
1736 priv->curr_bss_params.bss_descriptor
1737 .mac_address, ETH_ALEN))
1738 mwifiex_update_curr_bss_params(priv,
1739 bss);
1740 cfg80211_put_bss(bss);
1741 }
1742 } else {
1743 dev_dbg(adapter->dev, "missing BSS channel IE\n");
1744 }
1745 }
1746
1747 spin_lock_irqsave(&adapter->scan_pending_q_lock, flags);
1748 if (list_empty(&adapter->scan_pending_q)) {
1749 spin_unlock_irqrestore(&adapter->scan_pending_q_lock, flags);
1750 spin_lock_irqsave(&adapter->mwifiex_cmd_lock, flags);
1751 adapter->scan_processing = false;
1752 spin_unlock_irqrestore(&adapter->mwifiex_cmd_lock, flags);
1753
1754 /* Need to indicate IOCTL complete */
1755 if (adapter->curr_cmd->wait_q_enabled) {
1756 adapter->cmd_wait_q.status = 0;
1757 mwifiex_complete_cmd(adapter, adapter->curr_cmd);
1758 }
1759 if (priv->report_scan_result)
1760 priv->report_scan_result = false;
1761 if (priv->scan_pending_on_block) {
1762 priv->scan_pending_on_block = false;
1763 up(&priv->async_sem);
1764 }
1765
1766 if (priv->user_scan_cfg) {
1767 dev_dbg(priv->adapter->dev,
1768 "info: %s: sending scan results\n", __func__);
1769 cfg80211_scan_done(priv->scan_request, 0);
1770 priv->scan_request = NULL;
1771 kfree(priv->user_scan_cfg);
1772 priv->user_scan_cfg = NULL;
1773 }
1774 } else {
1775 if (!mwifiex_wmm_lists_empty(adapter)) {
1776 spin_unlock_irqrestore(&adapter->scan_pending_q_lock,
1777 flags);
1778 adapter->scan_delay_cnt = 1;
1779 mod_timer(&priv->scan_delay_timer, jiffies +
1780 msecs_to_jiffies(MWIFIEX_SCAN_DELAY_MSEC));
1781 } else {
1782 /* Get scan command from scan_pending_q and put to
1783 cmd_pending_q */
1784 cmd_node = list_first_entry(&adapter->scan_pending_q,
1785 struct cmd_ctrl_node, list);
1786 list_del(&cmd_node->list);
1787 spin_unlock_irqrestore(&adapter->scan_pending_q_lock,
1788 flags);
1789 mwifiex_insert_cmd_to_pending_q(adapter, cmd_node,
1790 true);
1791 }
1792 }
1793
1794 done:
1795 return ret;
1796 }
1797
1798 /*
1799 * This function prepares command for background scan query.
1800 *
1801 * Preparation includes -
1802 * - Setting command ID and proper size
1803 * - Setting background scan flush parameter
1804 * - Ensuring correct endian-ness
1805 */
1806 int mwifiex_cmd_802_11_bg_scan_query(struct host_cmd_ds_command *cmd)
1807 {
1808 struct host_cmd_ds_802_11_bg_scan_query *bg_query =
1809 &cmd->params.bg_scan_query;
1810
1811 cmd->command = cpu_to_le16(HostCmd_CMD_802_11_BG_SCAN_QUERY);
1812 cmd->size = cpu_to_le16(sizeof(struct host_cmd_ds_802_11_bg_scan_query)
1813 + S_DS_GEN);
1814
1815 bg_query->flush = 1;
1816
1817 return 0;
1818 }
1819
1820 /*
1821 * This function inserts scan command node to the scan pending queue.
1822 */
1823 void
1824 mwifiex_queue_scan_cmd(struct mwifiex_private *priv,
1825 struct cmd_ctrl_node *cmd_node)
1826 {
1827 struct mwifiex_adapter *adapter = priv->adapter;
1828 unsigned long flags;
1829
1830 cmd_node->wait_q_enabled = true;
1831 cmd_node->condition = &adapter->scan_wait_q_woken;
1832 spin_lock_irqsave(&adapter->scan_pending_q_lock, flags);
1833 list_add_tail(&cmd_node->list, &adapter->scan_pending_q);
1834 spin_unlock_irqrestore(&adapter->scan_pending_q_lock, flags);
1835 }
1836
1837 /*
1838 * This function sends a scan command for all available channels to the
1839 * firmware, filtered on a specific SSID.
1840 */
1841 static int mwifiex_scan_specific_ssid(struct mwifiex_private *priv,
1842 struct cfg80211_ssid *req_ssid)
1843 {
1844 struct mwifiex_adapter *adapter = priv->adapter;
1845 int ret = 0;
1846 struct mwifiex_user_scan_cfg *scan_cfg;
1847
1848 if (!req_ssid)
1849 return -1;
1850
1851 if (adapter->scan_processing) {
1852 dev_dbg(adapter->dev, "cmd: Scan already in process...\n");
1853 return ret;
1854 }
1855
1856 if (priv->scan_block) {
1857 dev_dbg(adapter->dev,
1858 "cmd: Scan is blocked during association...\n");
1859 return ret;
1860 }
1861
1862 scan_cfg = kzalloc(sizeof(struct mwifiex_user_scan_cfg), GFP_KERNEL);
1863 if (!scan_cfg) {
1864 dev_err(adapter->dev, "failed to alloc scan_cfg\n");
1865 return -ENOMEM;
1866 }
1867
1868 scan_cfg->ssid_list = req_ssid;
1869 scan_cfg->num_ssids = 1;
1870
1871 ret = mwifiex_scan_networks(priv, scan_cfg);
1872
1873 kfree(scan_cfg);
1874 return ret;
1875 }
1876
1877 /*
1878 * Sends IOCTL request to start a scan.
1879 *
1880 * This function allocates the IOCTL request buffer, fills it
1881 * with requisite parameters and calls the IOCTL handler.
1882 *
1883 * Scan command can be issued for both normal scan and specific SSID
1884 * scan, depending upon whether an SSID is provided or not.
1885 */
1886 int mwifiex_request_scan(struct mwifiex_private *priv,
1887 struct cfg80211_ssid *req_ssid)
1888 {
1889 int ret;
1890
1891 if (down_interruptible(&priv->async_sem)) {
1892 dev_err(priv->adapter->dev, "%s: acquire semaphore\n",
1893 __func__);
1894 return -1;
1895 }
1896 priv->scan_pending_on_block = true;
1897
1898 priv->adapter->scan_wait_q_woken = false;
1899
1900 if (req_ssid && req_ssid->ssid_len != 0)
1901 /* Specific SSID scan */
1902 ret = mwifiex_scan_specific_ssid(priv, req_ssid);
1903 else
1904 /* Normal scan */
1905 ret = mwifiex_scan_networks(priv, NULL);
1906
1907 if (!ret)
1908 ret = mwifiex_wait_queue_complete(priv->adapter);
1909
1910 if (ret == -1) {
1911 priv->scan_pending_on_block = false;
1912 up(&priv->async_sem);
1913 }
1914
1915 return ret;
1916 }
1917
1918 /*
1919 * This function appends the vendor specific IE TLV to a buffer.
1920 */
1921 int
1922 mwifiex_cmd_append_vsie_tlv(struct mwifiex_private *priv,
1923 u16 vsie_mask, u8 **buffer)
1924 {
1925 int id, ret_len = 0;
1926 struct mwifiex_ie_types_vendor_param_set *vs_param_set;
1927
1928 if (!buffer)
1929 return 0;
1930 if (!(*buffer))
1931 return 0;
1932
1933 /*
1934 * Traverse through the saved vendor specific IE array and append
1935 * the selected(scan/assoc/adhoc) IE as TLV to the command
1936 */
1937 for (id = 0; id < MWIFIEX_MAX_VSIE_NUM; id++) {
1938 if (priv->vs_ie[id].mask & vsie_mask) {
1939 vs_param_set =
1940 (struct mwifiex_ie_types_vendor_param_set *)
1941 *buffer;
1942 vs_param_set->header.type =
1943 cpu_to_le16(TLV_TYPE_PASSTHROUGH);
1944 vs_param_set->header.len =
1945 cpu_to_le16((((u16) priv->vs_ie[id].ie[1])
1946 & 0x00FF) + 2);
1947 memcpy(vs_param_set->ie, priv->vs_ie[id].ie,
1948 le16_to_cpu(vs_param_set->header.len));
1949 *buffer += le16_to_cpu(vs_param_set->header.len) +
1950 sizeof(struct mwifiex_ie_types_header);
1951 ret_len += le16_to_cpu(vs_param_set->header.len) +
1952 sizeof(struct mwifiex_ie_types_header);
1953 }
1954 }
1955 return ret_len;
1956 }
1957
1958 /*
1959 * This function saves a beacon buffer of the current BSS descriptor.
1960 *
1961 * The current beacon buffer is saved so that it can be restored in the
1962 * following cases that makes the beacon buffer not to contain the current
1963 * ssid's beacon buffer.
1964 * - The current ssid was not found somehow in the last scan.
1965 * - The current ssid was the last entry of the scan table and overloaded.
1966 */
1967 void
1968 mwifiex_save_curr_bcn(struct mwifiex_private *priv)
1969 {
1970 struct mwifiex_bssdescriptor *curr_bss =
1971 &priv->curr_bss_params.bss_descriptor;
1972
1973 if (!curr_bss->beacon_buf_size)
1974 return;
1975
1976 /* allocate beacon buffer at 1st time; or if it's size has changed */
1977 if (!priv->curr_bcn_buf ||
1978 priv->curr_bcn_size != curr_bss->beacon_buf_size) {
1979 priv->curr_bcn_size = curr_bss->beacon_buf_size;
1980
1981 kfree(priv->curr_bcn_buf);
1982 priv->curr_bcn_buf = kmalloc(curr_bss->beacon_buf_size,
1983 GFP_ATOMIC);
1984 if (!priv->curr_bcn_buf) {
1985 dev_err(priv->adapter->dev,
1986 "failed to alloc curr_bcn_buf\n");
1987 return;
1988 }
1989 }
1990
1991 memcpy(priv->curr_bcn_buf, curr_bss->beacon_buf,
1992 curr_bss->beacon_buf_size);
1993 dev_dbg(priv->adapter->dev, "info: current beacon saved %d\n",
1994 priv->curr_bcn_size);
1995
1996 curr_bss->beacon_buf = priv->curr_bcn_buf;
1997
1998 /* adjust the pointers in the current BSS descriptor */
1999 if (curr_bss->bcn_wpa_ie)
2000 curr_bss->bcn_wpa_ie =
2001 (struct ieee_types_vendor_specific *)
2002 (curr_bss->beacon_buf +
2003 curr_bss->wpa_offset);
2004
2005 if (curr_bss->bcn_rsn_ie)
2006 curr_bss->bcn_rsn_ie = (struct ieee_types_generic *)
2007 (curr_bss->beacon_buf +
2008 curr_bss->rsn_offset);
2009
2010 if (curr_bss->bcn_ht_cap)
2011 curr_bss->bcn_ht_cap = (struct ieee80211_ht_cap *)
2012 (curr_bss->beacon_buf +
2013 curr_bss->ht_cap_offset);
2014
2015 if (curr_bss->bcn_ht_oper)
2016 curr_bss->bcn_ht_oper = (struct ieee80211_ht_operation *)
2017 (curr_bss->beacon_buf +
2018 curr_bss->ht_info_offset);
2019
2020 if (curr_bss->bcn_bss_co_2040)
2021 curr_bss->bcn_bss_co_2040 =
2022 (curr_bss->beacon_buf + curr_bss->bss_co_2040_offset);
2023
2024 if (curr_bss->bcn_ext_cap)
2025 curr_bss->bcn_ext_cap = curr_bss->beacon_buf +
2026 curr_bss->ext_cap_offset;
2027 }
2028
2029 /*
2030 * This function frees the current BSS descriptor beacon buffer.
2031 */
2032 void
2033 mwifiex_free_curr_bcn(struct mwifiex_private *priv)
2034 {
2035 kfree(priv->curr_bcn_buf);
2036 priv->curr_bcn_buf = NULL;
2037 }
This page took 0.176264 seconds and 5 git commands to generate.