wireless: Remove casts to same type
[deliverable/linux.git] / drivers / net / wireless / mwifiex / scan.c
1 /*
2 * Marvell Wireless LAN device driver: scan ioctl and command handling
3 *
4 * Copyright (C) 2011, Marvell International Ltd.
5 *
6 * This software file (the "File") is distributed by Marvell International
7 * Ltd. under the terms of the GNU General Public License Version 2, June 1991
8 * (the "License"). You may use, redistribute and/or modify this File in
9 * accordance with the terms and conditions of the License, a copy of which
10 * is available by writing to the Free Software Foundation, Inc.,
11 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA or on the
12 * worldwide web at http://www.gnu.org/licenses/old-licenses/gpl-2.0.txt.
13 *
14 * THE FILE IS DISTRIBUTED AS-IS, WITHOUT WARRANTY OF ANY KIND, AND THE
15 * IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE
16 * ARE EXPRESSLY DISCLAIMED. The License provides additional details about
17 * this warranty disclaimer.
18 */
19
20 #include "decl.h"
21 #include "ioctl.h"
22 #include "util.h"
23 #include "fw.h"
24 #include "main.h"
25 #include "11n.h"
26 #include "cfg80211.h"
27
28 /* The maximum number of channels the firmware can scan per command */
29 #define MWIFIEX_MAX_CHANNELS_PER_SPECIFIC_SCAN 14
30
31 #define MWIFIEX_CHANNELS_PER_SCAN_CMD 4
32
33 /* Memory needed to store a max sized Channel List TLV for a firmware scan */
34 #define CHAN_TLV_MAX_SIZE (sizeof(struct mwifiex_ie_types_header) \
35 + (MWIFIEX_MAX_CHANNELS_PER_SPECIFIC_SCAN \
36 *sizeof(struct mwifiex_chan_scan_param_set)))
37
38 /* Memory needed to store supported rate */
39 #define RATE_TLV_MAX_SIZE (sizeof(struct mwifiex_ie_types_rates_param_set) \
40 + HOSTCMD_SUPPORTED_RATES)
41
42 /* Memory needed to store a max number/size WildCard SSID TLV for a firmware
43 scan */
44 #define WILDCARD_SSID_TLV_MAX_SIZE \
45 (MWIFIEX_MAX_SSID_LIST_LENGTH * \
46 (sizeof(struct mwifiex_ie_types_wildcard_ssid_params) \
47 + IEEE80211_MAX_SSID_LEN))
48
49 /* Maximum memory needed for a mwifiex_scan_cmd_config with all TLVs at max */
50 #define MAX_SCAN_CFG_ALLOC (sizeof(struct mwifiex_scan_cmd_config) \
51 + sizeof(struct mwifiex_ie_types_num_probes) \
52 + sizeof(struct mwifiex_ie_types_htcap) \
53 + CHAN_TLV_MAX_SIZE \
54 + RATE_TLV_MAX_SIZE \
55 + WILDCARD_SSID_TLV_MAX_SIZE)
56
57
58 union mwifiex_scan_cmd_config_tlv {
59 /* Scan configuration (variable length) */
60 struct mwifiex_scan_cmd_config config;
61 /* Max allocated block */
62 u8 config_alloc_buf[MAX_SCAN_CFG_ALLOC];
63 };
64
65 enum cipher_suite {
66 CIPHER_SUITE_TKIP,
67 CIPHER_SUITE_CCMP,
68 CIPHER_SUITE_MAX
69 };
70 static u8 mwifiex_wpa_oui[CIPHER_SUITE_MAX][4] = {
71 { 0x00, 0x50, 0xf2, 0x02 }, /* TKIP */
72 { 0x00, 0x50, 0xf2, 0x04 }, /* AES */
73 };
74 static u8 mwifiex_rsn_oui[CIPHER_SUITE_MAX][4] = {
75 { 0x00, 0x0f, 0xac, 0x02 }, /* TKIP */
76 { 0x00, 0x0f, 0xac, 0x04 }, /* AES */
77 };
78
79 /*
80 * This function parses a given IE for a given OUI.
81 *
82 * This is used to parse a WPA/RSN IE to find if it has
83 * a given oui in PTK.
84 */
85 static u8
86 mwifiex_search_oui_in_ie(struct ie_body *iebody, u8 *oui)
87 {
88 u8 count;
89
90 count = iebody->ptk_cnt[0];
91
92 /* There could be multiple OUIs for PTK hence
93 1) Take the length.
94 2) Check all the OUIs for AES.
95 3) If one of them is AES then pass success. */
96 while (count) {
97 if (!memcmp(iebody->ptk_body, oui, sizeof(iebody->ptk_body)))
98 return MWIFIEX_OUI_PRESENT;
99
100 --count;
101 if (count)
102 iebody = (struct ie_body *) ((u8 *) iebody +
103 sizeof(iebody->ptk_body));
104 }
105
106 pr_debug("info: %s: OUI is not found in PTK\n", __func__);
107 return MWIFIEX_OUI_NOT_PRESENT;
108 }
109
110 /*
111 * This function checks if a given OUI is present in a RSN IE.
112 *
113 * The function first checks if a RSN IE is present or not in the
114 * BSS descriptor. It tries to locate the OUI only if such an IE is
115 * present.
116 */
117 static u8
118 mwifiex_is_rsn_oui_present(struct mwifiex_bssdescriptor *bss_desc, u32 cipher)
119 {
120 u8 *oui;
121 struct ie_body *iebody;
122 u8 ret = MWIFIEX_OUI_NOT_PRESENT;
123
124 if (((bss_desc->bcn_rsn_ie) && ((*(bss_desc->bcn_rsn_ie)).
125 ieee_hdr.element_id == WLAN_EID_RSN))) {
126 iebody = (struct ie_body *)
127 (((u8 *) bss_desc->bcn_rsn_ie->data) +
128 RSN_GTK_OUI_OFFSET);
129 oui = &mwifiex_rsn_oui[cipher][0];
130 ret = mwifiex_search_oui_in_ie(iebody, oui);
131 if (ret)
132 return ret;
133 }
134 return ret;
135 }
136
137 /*
138 * This function checks if a given OUI is present in a WPA IE.
139 *
140 * The function first checks if a WPA IE is present or not in the
141 * BSS descriptor. It tries to locate the OUI only if such an IE is
142 * present.
143 */
144 static u8
145 mwifiex_is_wpa_oui_present(struct mwifiex_bssdescriptor *bss_desc, u32 cipher)
146 {
147 u8 *oui;
148 struct ie_body *iebody;
149 u8 ret = MWIFIEX_OUI_NOT_PRESENT;
150
151 if (((bss_desc->bcn_wpa_ie) &&
152 ((*(bss_desc->bcn_wpa_ie)).vend_hdr.element_id ==
153 WLAN_EID_WPA))) {
154 iebody = (struct ie_body *) bss_desc->bcn_wpa_ie->data;
155 oui = &mwifiex_wpa_oui[cipher][0];
156 ret = mwifiex_search_oui_in_ie(iebody, oui);
157 if (ret)
158 return ret;
159 }
160 return ret;
161 }
162
163 /*
164 * This function compares two SSIDs and checks if they match.
165 */
166 s32
167 mwifiex_ssid_cmp(struct cfg80211_ssid *ssid1, struct cfg80211_ssid *ssid2)
168 {
169 if (!ssid1 || !ssid2 || (ssid1->ssid_len != ssid2->ssid_len))
170 return -1;
171 return memcmp(ssid1->ssid, ssid2->ssid, ssid1->ssid_len);
172 }
173
174 /*
175 * This function checks if wapi is enabled in driver and scanned network is
176 * compatible with it.
177 */
178 static bool
179 mwifiex_is_bss_wapi(struct mwifiex_private *priv,
180 struct mwifiex_bssdescriptor *bss_desc)
181 {
182 if (priv->sec_info.wapi_enabled &&
183 (bss_desc->bcn_wapi_ie &&
184 ((*(bss_desc->bcn_wapi_ie)).ieee_hdr.element_id ==
185 WLAN_EID_BSS_AC_ACCESS_DELAY))) {
186 return true;
187 }
188 return false;
189 }
190
191 /*
192 * This function checks if driver is configured with no security mode and
193 * scanned network is compatible with it.
194 */
195 static bool
196 mwifiex_is_bss_no_sec(struct mwifiex_private *priv,
197 struct mwifiex_bssdescriptor *bss_desc)
198 {
199 if (!priv->sec_info.wep_enabled && !priv->sec_info.wpa_enabled &&
200 !priv->sec_info.wpa2_enabled && ((!bss_desc->bcn_wpa_ie) ||
201 ((*(bss_desc->bcn_wpa_ie)).vend_hdr.element_id !=
202 WLAN_EID_WPA)) &&
203 ((!bss_desc->bcn_rsn_ie) ||
204 ((*(bss_desc->bcn_rsn_ie)).ieee_hdr.element_id !=
205 WLAN_EID_RSN)) &&
206 !priv->sec_info.encryption_mode && !bss_desc->privacy) {
207 return true;
208 }
209 return false;
210 }
211
212 /*
213 * This function checks if static WEP is enabled in driver and scanned network
214 * is compatible with it.
215 */
216 static bool
217 mwifiex_is_bss_static_wep(struct mwifiex_private *priv,
218 struct mwifiex_bssdescriptor *bss_desc)
219 {
220 if (priv->sec_info.wep_enabled && !priv->sec_info.wpa_enabled &&
221 !priv->sec_info.wpa2_enabled && bss_desc->privacy) {
222 return true;
223 }
224 return false;
225 }
226
227 /*
228 * This function checks if wpa is enabled in driver and scanned network is
229 * compatible with it.
230 */
231 static bool
232 mwifiex_is_bss_wpa(struct mwifiex_private *priv,
233 struct mwifiex_bssdescriptor *bss_desc)
234 {
235 if (!priv->sec_info.wep_enabled && priv->sec_info.wpa_enabled &&
236 !priv->sec_info.wpa2_enabled && ((bss_desc->bcn_wpa_ie) &&
237 ((*(bss_desc->bcn_wpa_ie)).vend_hdr.element_id == WLAN_EID_WPA))
238 /*
239 * Privacy bit may NOT be set in some APs like
240 * LinkSys WRT54G && bss_desc->privacy
241 */
242 ) {
243 dev_dbg(priv->adapter->dev, "info: %s: WPA:"
244 " wpa_ie=%#x wpa2_ie=%#x WEP=%s WPA=%s WPA2=%s "
245 "EncMode=%#x privacy=%#x\n", __func__,
246 (bss_desc->bcn_wpa_ie) ?
247 (*(bss_desc->bcn_wpa_ie)).
248 vend_hdr.element_id : 0,
249 (bss_desc->bcn_rsn_ie) ?
250 (*(bss_desc->bcn_rsn_ie)).
251 ieee_hdr.element_id : 0,
252 (priv->sec_info.wep_enabled) ? "e" : "d",
253 (priv->sec_info.wpa_enabled) ? "e" : "d",
254 (priv->sec_info.wpa2_enabled) ? "e" : "d",
255 priv->sec_info.encryption_mode,
256 bss_desc->privacy);
257 return true;
258 }
259 return false;
260 }
261
262 /*
263 * This function checks if wpa2 is enabled in driver and scanned network is
264 * compatible with it.
265 */
266 static bool
267 mwifiex_is_bss_wpa2(struct mwifiex_private *priv,
268 struct mwifiex_bssdescriptor *bss_desc)
269 {
270 if (!priv->sec_info.wep_enabled &&
271 !priv->sec_info.wpa_enabled &&
272 priv->sec_info.wpa2_enabled &&
273 ((bss_desc->bcn_rsn_ie) &&
274 ((*(bss_desc->bcn_rsn_ie)).ieee_hdr.element_id == WLAN_EID_RSN))) {
275 /*
276 * Privacy bit may NOT be set in some APs like
277 * LinkSys WRT54G && bss_desc->privacy
278 */
279 dev_dbg(priv->adapter->dev, "info: %s: WPA2: "
280 " wpa_ie=%#x wpa2_ie=%#x WEP=%s WPA=%s WPA2=%s "
281 "EncMode=%#x privacy=%#x\n", __func__,
282 (bss_desc->bcn_wpa_ie) ?
283 (*(bss_desc->bcn_wpa_ie)).
284 vend_hdr.element_id : 0,
285 (bss_desc->bcn_rsn_ie) ?
286 (*(bss_desc->bcn_rsn_ie)).
287 ieee_hdr.element_id : 0,
288 (priv->sec_info.wep_enabled) ? "e" : "d",
289 (priv->sec_info.wpa_enabled) ? "e" : "d",
290 (priv->sec_info.wpa2_enabled) ? "e" : "d",
291 priv->sec_info.encryption_mode,
292 bss_desc->privacy);
293 return true;
294 }
295 return false;
296 }
297
298 /*
299 * This function checks if adhoc AES is enabled in driver and scanned network is
300 * compatible with it.
301 */
302 static bool
303 mwifiex_is_bss_adhoc_aes(struct mwifiex_private *priv,
304 struct mwifiex_bssdescriptor *bss_desc)
305 {
306 if (!priv->sec_info.wep_enabled && !priv->sec_info.wpa_enabled &&
307 !priv->sec_info.wpa2_enabled &&
308 ((!bss_desc->bcn_wpa_ie) ||
309 ((*(bss_desc->bcn_wpa_ie)).vend_hdr.element_id != WLAN_EID_WPA)) &&
310 ((!bss_desc->bcn_rsn_ie) ||
311 ((*(bss_desc->bcn_rsn_ie)).ieee_hdr.element_id != WLAN_EID_RSN)) &&
312 !priv->sec_info.encryption_mode && bss_desc->privacy) {
313 return true;
314 }
315 return false;
316 }
317
318 /*
319 * This function checks if dynamic WEP is enabled in driver and scanned network
320 * is compatible with it.
321 */
322 static bool
323 mwifiex_is_bss_dynamic_wep(struct mwifiex_private *priv,
324 struct mwifiex_bssdescriptor *bss_desc)
325 {
326 if (!priv->sec_info.wep_enabled && !priv->sec_info.wpa_enabled &&
327 !priv->sec_info.wpa2_enabled &&
328 ((!bss_desc->bcn_wpa_ie) ||
329 ((*(bss_desc->bcn_wpa_ie)).vend_hdr.element_id != WLAN_EID_WPA)) &&
330 ((!bss_desc->bcn_rsn_ie) ||
331 ((*(bss_desc->bcn_rsn_ie)).ieee_hdr.element_id != WLAN_EID_RSN)) &&
332 priv->sec_info.encryption_mode && bss_desc->privacy) {
333 dev_dbg(priv->adapter->dev, "info: %s: dynamic "
334 "WEP: wpa_ie=%#x wpa2_ie=%#x "
335 "EncMode=%#x privacy=%#x\n",
336 __func__,
337 (bss_desc->bcn_wpa_ie) ?
338 (*(bss_desc->bcn_wpa_ie)).
339 vend_hdr.element_id : 0,
340 (bss_desc->bcn_rsn_ie) ?
341 (*(bss_desc->bcn_rsn_ie)).
342 ieee_hdr.element_id : 0,
343 priv->sec_info.encryption_mode,
344 bss_desc->privacy);
345 return true;
346 }
347 return false;
348 }
349
350 /*
351 * This function checks if a scanned network is compatible with the driver
352 * settings.
353 *
354 * WEP WPA WPA2 ad-hoc encrypt Network
355 * enabled enabled enabled AES mode Privacy WPA WPA2 Compatible
356 * 0 0 0 0 NONE 0 0 0 yes No security
357 * 0 1 0 0 x 1x 1 x yes WPA (disable
358 * HT if no AES)
359 * 0 0 1 0 x 1x x 1 yes WPA2 (disable
360 * HT if no AES)
361 * 0 0 0 1 NONE 1 0 0 yes Ad-hoc AES
362 * 1 0 0 0 NONE 1 0 0 yes Static WEP
363 * (disable HT)
364 * 0 0 0 0 !=NONE 1 0 0 yes Dynamic WEP
365 *
366 * Compatibility is not matched while roaming, except for mode.
367 */
368 static s32
369 mwifiex_is_network_compatible(struct mwifiex_private *priv,
370 struct mwifiex_bssdescriptor *bss_desc, u32 mode)
371 {
372 struct mwifiex_adapter *adapter = priv->adapter;
373
374 bss_desc->disable_11n = false;
375
376 /* Don't check for compatibility if roaming */
377 if (priv->media_connected &&
378 (priv->bss_mode == NL80211_IFTYPE_STATION) &&
379 (bss_desc->bss_mode == NL80211_IFTYPE_STATION))
380 return 0;
381
382 if (priv->wps.session_enable) {
383 dev_dbg(adapter->dev,
384 "info: return success directly in WPS period\n");
385 return 0;
386 }
387
388 if (mwifiex_is_bss_wapi(priv, bss_desc)) {
389 dev_dbg(adapter->dev, "info: return success for WAPI AP\n");
390 return 0;
391 }
392
393 if (bss_desc->bss_mode == mode) {
394 if (mwifiex_is_bss_no_sec(priv, bss_desc)) {
395 /* No security */
396 return 0;
397 } else if (mwifiex_is_bss_static_wep(priv, bss_desc)) {
398 /* Static WEP enabled */
399 dev_dbg(adapter->dev, "info: Disable 11n in WEP mode.\n");
400 bss_desc->disable_11n = true;
401 return 0;
402 } else if (mwifiex_is_bss_wpa(priv, bss_desc)) {
403 /* WPA enabled */
404 if (((priv->adapter->config_bands & BAND_GN ||
405 priv->adapter->config_bands & BAND_AN) &&
406 bss_desc->bcn_ht_cap) &&
407 !mwifiex_is_wpa_oui_present(bss_desc,
408 CIPHER_SUITE_CCMP)) {
409
410 if (mwifiex_is_wpa_oui_present
411 (bss_desc, CIPHER_SUITE_TKIP)) {
412 dev_dbg(adapter->dev,
413 "info: Disable 11n if AES "
414 "is not supported by AP\n");
415 bss_desc->disable_11n = true;
416 } else {
417 return -1;
418 }
419 }
420 return 0;
421 } else if (mwifiex_is_bss_wpa2(priv, bss_desc)) {
422 /* WPA2 enabled */
423 if (((priv->adapter->config_bands & BAND_GN ||
424 priv->adapter->config_bands & BAND_AN) &&
425 bss_desc->bcn_ht_cap) &&
426 !mwifiex_is_rsn_oui_present(bss_desc,
427 CIPHER_SUITE_CCMP)) {
428
429 if (mwifiex_is_rsn_oui_present
430 (bss_desc, CIPHER_SUITE_TKIP)) {
431 dev_dbg(adapter->dev,
432 "info: Disable 11n if AES "
433 "is not supported by AP\n");
434 bss_desc->disable_11n = true;
435 } else {
436 return -1;
437 }
438 }
439 return 0;
440 } else if (mwifiex_is_bss_adhoc_aes(priv, bss_desc)) {
441 /* Ad-hoc AES enabled */
442 return 0;
443 } else if (mwifiex_is_bss_dynamic_wep(priv, bss_desc)) {
444 /* Dynamic WEP enabled */
445 return 0;
446 }
447
448 /* Security doesn't match */
449 dev_dbg(adapter->dev,
450 "info: %s: failed: wpa_ie=%#x wpa2_ie=%#x WEP=%s "
451 "WPA=%s WPA2=%s EncMode=%#x privacy=%#x\n", __func__,
452 (bss_desc->bcn_wpa_ie) ?
453 (*(bss_desc->bcn_wpa_ie)).vend_hdr.element_id : 0,
454 (bss_desc->bcn_rsn_ie) ?
455 (*(bss_desc->bcn_rsn_ie)).ieee_hdr.element_id : 0,
456 (priv->sec_info.wep_enabled) ? "e" : "d",
457 (priv->sec_info.wpa_enabled) ? "e" : "d",
458 (priv->sec_info.wpa2_enabled) ? "e" : "d",
459 priv->sec_info.encryption_mode, bss_desc->privacy);
460 return -1;
461 }
462
463 /* Mode doesn't match */
464 return -1;
465 }
466
467 /*
468 * This function creates a channel list for the driver to scan, based
469 * on region/band information.
470 *
471 * This routine is used for any scan that is not provided with a
472 * specific channel list to scan.
473 */
474 static void
475 mwifiex_scan_create_channel_list(struct mwifiex_private *priv,
476 const struct mwifiex_user_scan_cfg
477 *user_scan_in,
478 struct mwifiex_chan_scan_param_set
479 *scan_chan_list,
480 u8 filtered_scan)
481 {
482 enum ieee80211_band band;
483 struct ieee80211_supported_band *sband;
484 struct ieee80211_channel *ch;
485 struct mwifiex_adapter *adapter = priv->adapter;
486 int chan_idx = 0, i;
487
488 for (band = 0; (band < IEEE80211_NUM_BANDS) ; band++) {
489
490 if (!priv->wdev->wiphy->bands[band])
491 continue;
492
493 sband = priv->wdev->wiphy->bands[band];
494
495 for (i = 0; (i < sband->n_channels) ; i++) {
496 ch = &sband->channels[i];
497 if (ch->flags & IEEE80211_CHAN_DISABLED)
498 continue;
499 scan_chan_list[chan_idx].radio_type = band;
500
501 if (user_scan_in &&
502 user_scan_in->chan_list[0].scan_time)
503 scan_chan_list[chan_idx].max_scan_time =
504 cpu_to_le16((u16) user_scan_in->
505 chan_list[0].scan_time);
506 else if (ch->flags & IEEE80211_CHAN_PASSIVE_SCAN)
507 scan_chan_list[chan_idx].max_scan_time =
508 cpu_to_le16(adapter->passive_scan_time);
509 else
510 scan_chan_list[chan_idx].max_scan_time =
511 cpu_to_le16(adapter->active_scan_time);
512
513 if (ch->flags & IEEE80211_CHAN_PASSIVE_SCAN)
514 scan_chan_list[chan_idx].chan_scan_mode_bitmap
515 |= MWIFIEX_PASSIVE_SCAN;
516 else
517 scan_chan_list[chan_idx].chan_scan_mode_bitmap
518 &= ~MWIFIEX_PASSIVE_SCAN;
519 scan_chan_list[chan_idx].chan_number =
520 (u32) ch->hw_value;
521 if (filtered_scan) {
522 scan_chan_list[chan_idx].max_scan_time =
523 cpu_to_le16(adapter->specific_scan_time);
524 scan_chan_list[chan_idx].chan_scan_mode_bitmap
525 |= MWIFIEX_DISABLE_CHAN_FILT;
526 }
527 chan_idx++;
528 }
529
530 }
531 }
532
533 /*
534 * This function constructs and sends multiple scan config commands to
535 * the firmware.
536 *
537 * Previous routines in the code flow have created a scan command configuration
538 * with any requested TLVs. This function splits the channel TLV into maximum
539 * channels supported per scan lists and sends the portion of the channel TLV,
540 * along with the other TLVs, to the firmware.
541 */
542 static int
543 mwifiex_scan_channel_list(struct mwifiex_private *priv,
544 u32 max_chan_per_scan, u8 filtered_scan,
545 struct mwifiex_scan_cmd_config *scan_cfg_out,
546 struct mwifiex_ie_types_chan_list_param_set
547 *chan_tlv_out,
548 struct mwifiex_chan_scan_param_set *scan_chan_list)
549 {
550 int ret = 0;
551 struct mwifiex_chan_scan_param_set *tmp_chan_list;
552 struct mwifiex_chan_scan_param_set *start_chan;
553
554 u32 tlv_idx;
555 u32 total_scan_time;
556 u32 done_early;
557
558 if (!scan_cfg_out || !chan_tlv_out || !scan_chan_list) {
559 dev_dbg(priv->adapter->dev,
560 "info: Scan: Null detect: %p, %p, %p\n",
561 scan_cfg_out, chan_tlv_out, scan_chan_list);
562 return -1;
563 }
564
565 chan_tlv_out->header.type = cpu_to_le16(TLV_TYPE_CHANLIST);
566
567 /* Set the temp channel struct pointer to the start of the desired
568 list */
569 tmp_chan_list = scan_chan_list;
570
571 /* Loop through the desired channel list, sending a new firmware scan
572 commands for each max_chan_per_scan channels (or for 1,6,11
573 individually if configured accordingly) */
574 while (tmp_chan_list->chan_number) {
575
576 tlv_idx = 0;
577 total_scan_time = 0;
578 chan_tlv_out->header.len = 0;
579 start_chan = tmp_chan_list;
580 done_early = false;
581
582 /*
583 * Construct the Channel TLV for the scan command. Continue to
584 * insert channel TLVs until:
585 * - the tlv_idx hits the maximum configured per scan command
586 * - the next channel to insert is 0 (end of desired channel
587 * list)
588 * - done_early is set (controlling individual scanning of
589 * 1,6,11)
590 */
591 while (tlv_idx < max_chan_per_scan &&
592 tmp_chan_list->chan_number && !done_early) {
593
594 dev_dbg(priv->adapter->dev,
595 "info: Scan: Chan(%3d), Radio(%d),"
596 " Mode(%d, %d), Dur(%d)\n",
597 tmp_chan_list->chan_number,
598 tmp_chan_list->radio_type,
599 tmp_chan_list->chan_scan_mode_bitmap
600 & MWIFIEX_PASSIVE_SCAN,
601 (tmp_chan_list->chan_scan_mode_bitmap
602 & MWIFIEX_DISABLE_CHAN_FILT) >> 1,
603 le16_to_cpu(tmp_chan_list->max_scan_time));
604
605 /* Copy the current channel TLV to the command being
606 prepared */
607 memcpy(chan_tlv_out->chan_scan_param + tlv_idx,
608 tmp_chan_list,
609 sizeof(chan_tlv_out->chan_scan_param));
610
611 /* Increment the TLV header length by the size
612 appended */
613 chan_tlv_out->header.len =
614 cpu_to_le16(le16_to_cpu(chan_tlv_out->header.len) +
615 (sizeof(chan_tlv_out->chan_scan_param)));
616
617 /*
618 * The tlv buffer length is set to the number of bytes
619 * of the between the channel tlv pointer and the start
620 * of the tlv buffer. This compensates for any TLVs
621 * that were appended before the channel list.
622 */
623 scan_cfg_out->tlv_buf_len = (u32) ((u8 *) chan_tlv_out -
624 scan_cfg_out->tlv_buf);
625
626 /* Add the size of the channel tlv header and the data
627 length */
628 scan_cfg_out->tlv_buf_len +=
629 (sizeof(chan_tlv_out->header)
630 + le16_to_cpu(chan_tlv_out->header.len));
631
632 /* Increment the index to the channel tlv we are
633 constructing */
634 tlv_idx++;
635
636 /* Count the total scan time per command */
637 total_scan_time +=
638 le16_to_cpu(tmp_chan_list->max_scan_time);
639
640 done_early = false;
641
642 /* Stop the loop if the *current* channel is in the
643 1,6,11 set and we are not filtering on a BSSID
644 or SSID. */
645 if (!filtered_scan &&
646 (tmp_chan_list->chan_number == 1 ||
647 tmp_chan_list->chan_number == 6 ||
648 tmp_chan_list->chan_number == 11))
649 done_early = true;
650
651 /* Increment the tmp pointer to the next channel to
652 be scanned */
653 tmp_chan_list++;
654
655 /* Stop the loop if the *next* channel is in the 1,6,11
656 set. This will cause it to be the only channel
657 scanned on the next interation */
658 if (!filtered_scan &&
659 (tmp_chan_list->chan_number == 1 ||
660 tmp_chan_list->chan_number == 6 ||
661 tmp_chan_list->chan_number == 11))
662 done_early = true;
663 }
664
665 /* The total scan time should be less than scan command timeout
666 value */
667 if (total_scan_time > MWIFIEX_MAX_TOTAL_SCAN_TIME) {
668 dev_err(priv->adapter->dev, "total scan time %dms"
669 " is over limit (%dms), scan skipped\n",
670 total_scan_time, MWIFIEX_MAX_TOTAL_SCAN_TIME);
671 ret = -1;
672 break;
673 }
674
675 priv->adapter->scan_channels = start_chan;
676
677 /* Send the scan command to the firmware with the specified
678 cfg */
679 ret = mwifiex_send_cmd_async(priv, HostCmd_CMD_802_11_SCAN,
680 HostCmd_ACT_GEN_SET, 0,
681 scan_cfg_out);
682 if (ret)
683 break;
684 }
685
686 if (ret)
687 return -1;
688
689 return 0;
690 }
691
692 /*
693 * This function constructs a scan command configuration structure to use
694 * in scan commands.
695 *
696 * Application layer or other functions can invoke network scanning
697 * with a scan configuration supplied in a user scan configuration structure.
698 * This structure is used as the basis of one or many scan command configuration
699 * commands that are sent to the command processing module and eventually to the
700 * firmware.
701 *
702 * This function creates a scan command configuration structure based on the
703 * following user supplied parameters (if present):
704 * - SSID filter
705 * - BSSID filter
706 * - Number of Probes to be sent
707 * - Channel list
708 *
709 * If the SSID or BSSID filter is not present, the filter is disabled/cleared.
710 * If the number of probes is not set, adapter default setting is used.
711 */
712 static void
713 mwifiex_config_scan(struct mwifiex_private *priv,
714 const struct mwifiex_user_scan_cfg *user_scan_in,
715 struct mwifiex_scan_cmd_config *scan_cfg_out,
716 struct mwifiex_ie_types_chan_list_param_set **chan_list_out,
717 struct mwifiex_chan_scan_param_set *scan_chan_list,
718 u8 *max_chan_per_scan, u8 *filtered_scan,
719 u8 *scan_current_only)
720 {
721 struct mwifiex_adapter *adapter = priv->adapter;
722 struct mwifiex_ie_types_num_probes *num_probes_tlv;
723 struct mwifiex_ie_types_wildcard_ssid_params *wildcard_ssid_tlv;
724 struct mwifiex_ie_types_rates_param_set *rates_tlv;
725 const u8 zero_mac[ETH_ALEN] = { 0, 0, 0, 0, 0, 0 };
726 u8 *tlv_pos;
727 u32 num_probes;
728 u32 ssid_len;
729 u32 chan_idx;
730 u32 scan_type;
731 u16 scan_dur;
732 u8 channel;
733 u8 radio_type;
734 int i;
735 u8 ssid_filter;
736 u8 rates[MWIFIEX_SUPPORTED_RATES];
737 u32 rates_size;
738 struct mwifiex_ie_types_htcap *ht_cap;
739
740 /* The tlv_buf_len is calculated for each scan command. The TLVs added
741 in this routine will be preserved since the routine that sends the
742 command will append channelTLVs at *chan_list_out. The difference
743 between the *chan_list_out and the tlv_buf start will be used to
744 calculate the size of anything we add in this routine. */
745 scan_cfg_out->tlv_buf_len = 0;
746
747 /* Running tlv pointer. Assigned to chan_list_out at end of function
748 so later routines know where channels can be added to the command
749 buf */
750 tlv_pos = scan_cfg_out->tlv_buf;
751
752 /* Initialize the scan as un-filtered; the flag is later set to TRUE
753 below if a SSID or BSSID filter is sent in the command */
754 *filtered_scan = false;
755
756 /* Initialize the scan as not being only on the current channel. If
757 the channel list is customized, only contains one channel, and is
758 the active channel, this is set true and data flow is not halted. */
759 *scan_current_only = false;
760
761 if (user_scan_in) {
762
763 /* Default the ssid_filter flag to TRUE, set false under
764 certain wildcard conditions and qualified by the existence
765 of an SSID list before marking the scan as filtered */
766 ssid_filter = true;
767
768 /* Set the BSS type scan filter, use Adapter setting if
769 unset */
770 scan_cfg_out->bss_mode =
771 (user_scan_in->bss_mode ? (u8) user_scan_in->
772 bss_mode : (u8) adapter->scan_mode);
773
774 /* Set the number of probes to send, use Adapter setting
775 if unset */
776 num_probes =
777 (user_scan_in->num_probes ? user_scan_in->
778 num_probes : adapter->scan_probes);
779
780 /*
781 * Set the BSSID filter to the incoming configuration,
782 * if non-zero. If not set, it will remain disabled
783 * (all zeros).
784 */
785 memcpy(scan_cfg_out->specific_bssid,
786 user_scan_in->specific_bssid,
787 sizeof(scan_cfg_out->specific_bssid));
788
789 for (i = 0; i < user_scan_in->num_ssids; i++) {
790 ssid_len = user_scan_in->ssid_list[i].ssid_len;
791
792 wildcard_ssid_tlv =
793 (struct mwifiex_ie_types_wildcard_ssid_params *)
794 tlv_pos;
795 wildcard_ssid_tlv->header.type =
796 cpu_to_le16(TLV_TYPE_WILDCARDSSID);
797 wildcard_ssid_tlv->header.len = cpu_to_le16(
798 (u16) (ssid_len + sizeof(wildcard_ssid_tlv->
799 max_ssid_length)));
800
801 /*
802 * max_ssid_length = 0 tells firmware to perform
803 * specific scan for the SSID filled, whereas
804 * max_ssid_length = IEEE80211_MAX_SSID_LEN is for
805 * wildcard scan.
806 */
807 if (ssid_len)
808 wildcard_ssid_tlv->max_ssid_length = 0;
809 else
810 wildcard_ssid_tlv->max_ssid_length =
811 IEEE80211_MAX_SSID_LEN;
812
813 memcpy(wildcard_ssid_tlv->ssid,
814 user_scan_in->ssid_list[i].ssid, ssid_len);
815
816 tlv_pos += (sizeof(wildcard_ssid_tlv->header)
817 + le16_to_cpu(wildcard_ssid_tlv->header.len));
818
819 dev_dbg(adapter->dev, "info: scan: ssid[%d]: %s, %d\n",
820 i, wildcard_ssid_tlv->ssid,
821 wildcard_ssid_tlv->max_ssid_length);
822
823 /* Empty wildcard ssid with a maxlen will match many or
824 potentially all SSIDs (maxlen == 32), therefore do
825 not treat the scan as
826 filtered. */
827 if (!ssid_len && wildcard_ssid_tlv->max_ssid_length)
828 ssid_filter = false;
829 }
830
831 /*
832 * The default number of channels sent in the command is low to
833 * ensure the response buffer from the firmware does not
834 * truncate scan results. That is not an issue with an SSID
835 * or BSSID filter applied to the scan results in the firmware.
836 */
837 if ((i && ssid_filter) ||
838 memcmp(scan_cfg_out->specific_bssid, &zero_mac,
839 sizeof(zero_mac)))
840 *filtered_scan = true;
841 } else {
842 scan_cfg_out->bss_mode = (u8) adapter->scan_mode;
843 num_probes = adapter->scan_probes;
844 }
845
846 /*
847 * If a specific BSSID or SSID is used, the number of channels in the
848 * scan command will be increased to the absolute maximum.
849 */
850 if (*filtered_scan)
851 *max_chan_per_scan = MWIFIEX_MAX_CHANNELS_PER_SPECIFIC_SCAN;
852 else
853 *max_chan_per_scan = MWIFIEX_CHANNELS_PER_SCAN_CMD;
854
855 /* If the input config or adapter has the number of Probes set,
856 add tlv */
857 if (num_probes) {
858
859 dev_dbg(adapter->dev, "info: scan: num_probes = %d\n",
860 num_probes);
861
862 num_probes_tlv = (struct mwifiex_ie_types_num_probes *) tlv_pos;
863 num_probes_tlv->header.type = cpu_to_le16(TLV_TYPE_NUMPROBES);
864 num_probes_tlv->header.len =
865 cpu_to_le16(sizeof(num_probes_tlv->num_probes));
866 num_probes_tlv->num_probes = cpu_to_le16((u16) num_probes);
867
868 tlv_pos += sizeof(num_probes_tlv->header) +
869 le16_to_cpu(num_probes_tlv->header.len);
870
871 }
872
873 /* Append rates tlv */
874 memset(rates, 0, sizeof(rates));
875
876 rates_size = mwifiex_get_supported_rates(priv, rates);
877
878 rates_tlv = (struct mwifiex_ie_types_rates_param_set *) tlv_pos;
879 rates_tlv->header.type = cpu_to_le16(WLAN_EID_SUPP_RATES);
880 rates_tlv->header.len = cpu_to_le16((u16) rates_size);
881 memcpy(rates_tlv->rates, rates, rates_size);
882 tlv_pos += sizeof(rates_tlv->header) + rates_size;
883
884 dev_dbg(adapter->dev, "info: SCAN_CMD: Rates size = %d\n", rates_size);
885
886 if (ISSUPP_11NENABLED(priv->adapter->fw_cap_info) &&
887 (priv->adapter->config_bands & BAND_GN ||
888 priv->adapter->config_bands & BAND_AN)) {
889 ht_cap = (struct mwifiex_ie_types_htcap *) tlv_pos;
890 memset(ht_cap, 0, sizeof(struct mwifiex_ie_types_htcap));
891 ht_cap->header.type = cpu_to_le16(WLAN_EID_HT_CAPABILITY);
892 ht_cap->header.len =
893 cpu_to_le16(sizeof(struct ieee80211_ht_cap));
894 radio_type =
895 mwifiex_band_to_radio_type(priv->adapter->config_bands);
896 mwifiex_fill_cap_info(priv, radio_type, ht_cap);
897 tlv_pos += sizeof(struct mwifiex_ie_types_htcap);
898 }
899
900 /* Append vendor specific IE TLV */
901 mwifiex_cmd_append_vsie_tlv(priv, MWIFIEX_VSIE_MASK_SCAN, &tlv_pos);
902
903 /*
904 * Set the output for the channel TLV to the address in the tlv buffer
905 * past any TLVs that were added in this function (SSID, num_probes).
906 * Channel TLVs will be added past this for each scan command,
907 * preserving the TLVs that were previously added.
908 */
909 *chan_list_out =
910 (struct mwifiex_ie_types_chan_list_param_set *) tlv_pos;
911
912 if (user_scan_in && user_scan_in->chan_list[0].chan_number) {
913
914 dev_dbg(adapter->dev, "info: Scan: Using supplied channel list\n");
915
916 for (chan_idx = 0;
917 chan_idx < MWIFIEX_USER_SCAN_CHAN_MAX &&
918 user_scan_in->chan_list[chan_idx].chan_number;
919 chan_idx++) {
920
921 channel = user_scan_in->chan_list[chan_idx].chan_number;
922 (scan_chan_list + chan_idx)->chan_number = channel;
923
924 radio_type =
925 user_scan_in->chan_list[chan_idx].radio_type;
926 (scan_chan_list + chan_idx)->radio_type = radio_type;
927
928 scan_type = user_scan_in->chan_list[chan_idx].scan_type;
929
930 if (scan_type == MWIFIEX_SCAN_TYPE_PASSIVE)
931 (scan_chan_list +
932 chan_idx)->chan_scan_mode_bitmap
933 |= MWIFIEX_PASSIVE_SCAN;
934 else
935 (scan_chan_list +
936 chan_idx)->chan_scan_mode_bitmap
937 &= ~MWIFIEX_PASSIVE_SCAN;
938
939 if (user_scan_in->chan_list[chan_idx].scan_time) {
940 scan_dur = (u16) user_scan_in->
941 chan_list[chan_idx].scan_time;
942 } else {
943 if (scan_type == MWIFIEX_SCAN_TYPE_PASSIVE)
944 scan_dur = adapter->passive_scan_time;
945 else if (*filtered_scan)
946 scan_dur = adapter->specific_scan_time;
947 else
948 scan_dur = adapter->active_scan_time;
949 }
950
951 (scan_chan_list + chan_idx)->min_scan_time =
952 cpu_to_le16(scan_dur);
953 (scan_chan_list + chan_idx)->max_scan_time =
954 cpu_to_le16(scan_dur);
955 }
956
957 /* Check if we are only scanning the current channel */
958 if ((chan_idx == 1) &&
959 (user_scan_in->chan_list[0].chan_number ==
960 priv->curr_bss_params.bss_descriptor.channel)) {
961 *scan_current_only = true;
962 dev_dbg(adapter->dev,
963 "info: Scan: Scanning current channel only\n");
964 }
965
966 } else {
967 dev_dbg(adapter->dev,
968 "info: Scan: Creating full region channel list\n");
969 mwifiex_scan_create_channel_list(priv, user_scan_in,
970 scan_chan_list,
971 *filtered_scan);
972 }
973 }
974
975 /*
976 * This function inspects the scan response buffer for pointers to
977 * expected TLVs.
978 *
979 * TLVs can be included at the end of the scan response BSS information.
980 *
981 * Data in the buffer is parsed pointers to TLVs that can potentially
982 * be passed back in the response.
983 */
984 static void
985 mwifiex_ret_802_11_scan_get_tlv_ptrs(struct mwifiex_adapter *adapter,
986 struct mwifiex_ie_types_data *tlv,
987 u32 tlv_buf_size, u32 req_tlv_type,
988 struct mwifiex_ie_types_data **tlv_data)
989 {
990 struct mwifiex_ie_types_data *current_tlv;
991 u32 tlv_buf_left;
992 u32 tlv_type;
993 u32 tlv_len;
994
995 current_tlv = tlv;
996 tlv_buf_left = tlv_buf_size;
997 *tlv_data = NULL;
998
999 dev_dbg(adapter->dev, "info: SCAN_RESP: tlv_buf_size = %d\n",
1000 tlv_buf_size);
1001
1002 while (tlv_buf_left >= sizeof(struct mwifiex_ie_types_header)) {
1003
1004 tlv_type = le16_to_cpu(current_tlv->header.type);
1005 tlv_len = le16_to_cpu(current_tlv->header.len);
1006
1007 if (sizeof(tlv->header) + tlv_len > tlv_buf_left) {
1008 dev_err(adapter->dev, "SCAN_RESP: TLV buffer corrupt\n");
1009 break;
1010 }
1011
1012 if (req_tlv_type == tlv_type) {
1013 switch (tlv_type) {
1014 case TLV_TYPE_TSFTIMESTAMP:
1015 dev_dbg(adapter->dev, "info: SCAN_RESP: TSF "
1016 "timestamp TLV, len = %d\n", tlv_len);
1017 *tlv_data = current_tlv;
1018 break;
1019 case TLV_TYPE_CHANNELBANDLIST:
1020 dev_dbg(adapter->dev, "info: SCAN_RESP: channel"
1021 " band list TLV, len = %d\n", tlv_len);
1022 *tlv_data = current_tlv;
1023 break;
1024 default:
1025 dev_err(adapter->dev,
1026 "SCAN_RESP: unhandled TLV = %d\n",
1027 tlv_type);
1028 /* Give up, this seems corrupted */
1029 return;
1030 }
1031 }
1032
1033 if (*tlv_data)
1034 break;
1035
1036
1037 tlv_buf_left -= (sizeof(tlv->header) + tlv_len);
1038 current_tlv =
1039 (struct mwifiex_ie_types_data *) (current_tlv->data +
1040 tlv_len);
1041
1042 } /* while */
1043 }
1044
1045 /*
1046 * This function parses provided beacon buffer and updates
1047 * respective fields in bss descriptor structure.
1048 */
1049 int mwifiex_update_bss_desc_with_ie(struct mwifiex_adapter *adapter,
1050 struct mwifiex_bssdescriptor *bss_entry)
1051 {
1052 int ret = 0;
1053 u8 element_id;
1054 struct ieee_types_fh_param_set *fh_param_set;
1055 struct ieee_types_ds_param_set *ds_param_set;
1056 struct ieee_types_cf_param_set *cf_param_set;
1057 struct ieee_types_ibss_param_set *ibss_param_set;
1058 u8 *current_ptr;
1059 u8 *rate;
1060 u8 element_len;
1061 u16 total_ie_len;
1062 u8 bytes_to_copy;
1063 u8 rate_size;
1064 u8 found_data_rate_ie;
1065 u32 bytes_left;
1066 struct ieee_types_vendor_specific *vendor_ie;
1067 const u8 wpa_oui[4] = { 0x00, 0x50, 0xf2, 0x01 };
1068 const u8 wmm_oui[4] = { 0x00, 0x50, 0xf2, 0x02 };
1069
1070 found_data_rate_ie = false;
1071 rate_size = 0;
1072 current_ptr = bss_entry->beacon_buf;
1073 bytes_left = bss_entry->beacon_buf_size;
1074
1075 /* Process variable IE */
1076 while (bytes_left >= 2) {
1077 element_id = *current_ptr;
1078 element_len = *(current_ptr + 1);
1079 total_ie_len = element_len + sizeof(struct ieee_types_header);
1080
1081 if (bytes_left < total_ie_len) {
1082 dev_err(adapter->dev, "err: InterpretIE: in processing"
1083 " IE, bytes left < IE length\n");
1084 return -1;
1085 }
1086 switch (element_id) {
1087 case WLAN_EID_SSID:
1088 bss_entry->ssid.ssid_len = element_len;
1089 memcpy(bss_entry->ssid.ssid, (current_ptr + 2),
1090 element_len);
1091 dev_dbg(adapter->dev,
1092 "info: InterpretIE: ssid: %-32s\n",
1093 bss_entry->ssid.ssid);
1094 break;
1095
1096 case WLAN_EID_SUPP_RATES:
1097 memcpy(bss_entry->data_rates, current_ptr + 2,
1098 element_len);
1099 memcpy(bss_entry->supported_rates, current_ptr + 2,
1100 element_len);
1101 rate_size = element_len;
1102 found_data_rate_ie = true;
1103 break;
1104
1105 case WLAN_EID_FH_PARAMS:
1106 fh_param_set =
1107 (struct ieee_types_fh_param_set *) current_ptr;
1108 memcpy(&bss_entry->phy_param_set.fh_param_set,
1109 fh_param_set,
1110 sizeof(struct ieee_types_fh_param_set));
1111 break;
1112
1113 case WLAN_EID_DS_PARAMS:
1114 ds_param_set =
1115 (struct ieee_types_ds_param_set *) current_ptr;
1116
1117 bss_entry->channel = ds_param_set->current_chan;
1118
1119 memcpy(&bss_entry->phy_param_set.ds_param_set,
1120 ds_param_set,
1121 sizeof(struct ieee_types_ds_param_set));
1122 break;
1123
1124 case WLAN_EID_CF_PARAMS:
1125 cf_param_set =
1126 (struct ieee_types_cf_param_set *) current_ptr;
1127 memcpy(&bss_entry->ss_param_set.cf_param_set,
1128 cf_param_set,
1129 sizeof(struct ieee_types_cf_param_set));
1130 break;
1131
1132 case WLAN_EID_IBSS_PARAMS:
1133 ibss_param_set =
1134 (struct ieee_types_ibss_param_set *)
1135 current_ptr;
1136 memcpy(&bss_entry->ss_param_set.ibss_param_set,
1137 ibss_param_set,
1138 sizeof(struct ieee_types_ibss_param_set));
1139 break;
1140
1141 case WLAN_EID_ERP_INFO:
1142 bss_entry->erp_flags = *(current_ptr + 2);
1143 break;
1144
1145 case WLAN_EID_EXT_SUPP_RATES:
1146 /*
1147 * Only process extended supported rate
1148 * if data rate is already found.
1149 * Data rate IE should come before
1150 * extended supported rate IE
1151 */
1152 if (found_data_rate_ie) {
1153 if ((element_len + rate_size) >
1154 MWIFIEX_SUPPORTED_RATES)
1155 bytes_to_copy =
1156 (MWIFIEX_SUPPORTED_RATES -
1157 rate_size);
1158 else
1159 bytes_to_copy = element_len;
1160
1161 rate = (u8 *) bss_entry->data_rates;
1162 rate += rate_size;
1163 memcpy(rate, current_ptr + 2, bytes_to_copy);
1164
1165 rate = (u8 *) bss_entry->supported_rates;
1166 rate += rate_size;
1167 memcpy(rate, current_ptr + 2, bytes_to_copy);
1168 }
1169 break;
1170
1171 case WLAN_EID_VENDOR_SPECIFIC:
1172 vendor_ie = (struct ieee_types_vendor_specific *)
1173 current_ptr;
1174
1175 if (!memcmp
1176 (vendor_ie->vend_hdr.oui, wpa_oui,
1177 sizeof(wpa_oui))) {
1178 bss_entry->bcn_wpa_ie =
1179 (struct ieee_types_vendor_specific *)
1180 current_ptr;
1181 bss_entry->wpa_offset = (u16)
1182 (current_ptr - bss_entry->beacon_buf);
1183 } else if (!memcmp(vendor_ie->vend_hdr.oui, wmm_oui,
1184 sizeof(wmm_oui))) {
1185 if (total_ie_len ==
1186 sizeof(struct ieee_types_wmm_parameter) ||
1187 total_ie_len ==
1188 sizeof(struct ieee_types_wmm_info))
1189 /*
1190 * Only accept and copy the WMM IE if
1191 * it matches the size expected for the
1192 * WMM Info IE or the WMM Parameter IE.
1193 */
1194 memcpy((u8 *) &bss_entry->wmm_ie,
1195 current_ptr, total_ie_len);
1196 }
1197 break;
1198 case WLAN_EID_RSN:
1199 bss_entry->bcn_rsn_ie =
1200 (struct ieee_types_generic *) current_ptr;
1201 bss_entry->rsn_offset = (u16) (current_ptr -
1202 bss_entry->beacon_buf);
1203 break;
1204 case WLAN_EID_BSS_AC_ACCESS_DELAY:
1205 bss_entry->bcn_wapi_ie =
1206 (struct ieee_types_generic *) current_ptr;
1207 bss_entry->wapi_offset = (u16) (current_ptr -
1208 bss_entry->beacon_buf);
1209 break;
1210 case WLAN_EID_HT_CAPABILITY:
1211 bss_entry->bcn_ht_cap = (struct ieee80211_ht_cap *)
1212 (current_ptr +
1213 sizeof(struct ieee_types_header));
1214 bss_entry->ht_cap_offset = (u16) (current_ptr +
1215 sizeof(struct ieee_types_header) -
1216 bss_entry->beacon_buf);
1217 break;
1218 case WLAN_EID_HT_OPERATION:
1219 bss_entry->bcn_ht_oper =
1220 (struct ieee80211_ht_operation *)(current_ptr +
1221 sizeof(struct ieee_types_header));
1222 bss_entry->ht_info_offset = (u16) (current_ptr +
1223 sizeof(struct ieee_types_header) -
1224 bss_entry->beacon_buf);
1225 break;
1226 case WLAN_EID_BSS_COEX_2040:
1227 bss_entry->bcn_bss_co_2040 = current_ptr +
1228 sizeof(struct ieee_types_header);
1229 bss_entry->bss_co_2040_offset = (u16) (current_ptr +
1230 sizeof(struct ieee_types_header) -
1231 bss_entry->beacon_buf);
1232 break;
1233 case WLAN_EID_EXT_CAPABILITY:
1234 bss_entry->bcn_ext_cap = current_ptr +
1235 sizeof(struct ieee_types_header);
1236 bss_entry->ext_cap_offset = (u16) (current_ptr +
1237 sizeof(struct ieee_types_header) -
1238 bss_entry->beacon_buf);
1239 break;
1240 default:
1241 break;
1242 }
1243
1244 current_ptr += element_len + 2;
1245
1246 /* Need to account for IE ID and IE Len */
1247 bytes_left -= (element_len + 2);
1248
1249 } /* while (bytes_left > 2) */
1250 return ret;
1251 }
1252
1253 /*
1254 * This function converts radio type scan parameter to a band configuration
1255 * to be used in join command.
1256 */
1257 static u8
1258 mwifiex_radio_type_to_band(u8 radio_type)
1259 {
1260 switch (radio_type) {
1261 case HostCmd_SCAN_RADIO_TYPE_A:
1262 return BAND_A;
1263 case HostCmd_SCAN_RADIO_TYPE_BG:
1264 default:
1265 return BAND_G;
1266 }
1267 }
1268
1269 /*
1270 * This is an internal function used to start a scan based on an input
1271 * configuration.
1272 *
1273 * This uses the input user scan configuration information when provided in
1274 * order to send the appropriate scan commands to firmware to populate or
1275 * update the internal driver scan table.
1276 */
1277 static int mwifiex_scan_networks(struct mwifiex_private *priv,
1278 const struct mwifiex_user_scan_cfg *user_scan_in)
1279 {
1280 int ret = 0;
1281 struct mwifiex_adapter *adapter = priv->adapter;
1282 struct cmd_ctrl_node *cmd_node;
1283 union mwifiex_scan_cmd_config_tlv *scan_cfg_out;
1284 struct mwifiex_ie_types_chan_list_param_set *chan_list_out;
1285 u32 buf_size;
1286 struct mwifiex_chan_scan_param_set *scan_chan_list;
1287 u8 filtered_scan;
1288 u8 scan_current_chan_only;
1289 u8 max_chan_per_scan;
1290 unsigned long flags;
1291
1292 if (adapter->scan_processing) {
1293 dev_dbg(adapter->dev, "cmd: Scan already in process...\n");
1294 return ret;
1295 }
1296
1297 spin_lock_irqsave(&adapter->mwifiex_cmd_lock, flags);
1298 adapter->scan_processing = true;
1299 spin_unlock_irqrestore(&adapter->mwifiex_cmd_lock, flags);
1300
1301 if (priv->scan_block) {
1302 dev_dbg(adapter->dev,
1303 "cmd: Scan is blocked during association...\n");
1304 return ret;
1305 }
1306
1307 scan_cfg_out = kzalloc(sizeof(union mwifiex_scan_cmd_config_tlv),
1308 GFP_KERNEL);
1309 if (!scan_cfg_out) {
1310 dev_err(adapter->dev, "failed to alloc scan_cfg_out\n");
1311 return -ENOMEM;
1312 }
1313
1314 buf_size = sizeof(struct mwifiex_chan_scan_param_set) *
1315 MWIFIEX_USER_SCAN_CHAN_MAX;
1316 scan_chan_list = kzalloc(buf_size, GFP_KERNEL);
1317 if (!scan_chan_list) {
1318 dev_err(adapter->dev, "failed to alloc scan_chan_list\n");
1319 kfree(scan_cfg_out);
1320 return -ENOMEM;
1321 }
1322
1323 mwifiex_config_scan(priv, user_scan_in, &scan_cfg_out->config,
1324 &chan_list_out, scan_chan_list, &max_chan_per_scan,
1325 &filtered_scan, &scan_current_chan_only);
1326
1327 ret = mwifiex_scan_channel_list(priv, max_chan_per_scan, filtered_scan,
1328 &scan_cfg_out->config, chan_list_out,
1329 scan_chan_list);
1330
1331 /* Get scan command from scan_pending_q and put to cmd_pending_q */
1332 if (!ret) {
1333 spin_lock_irqsave(&adapter->scan_pending_q_lock, flags);
1334 if (!list_empty(&adapter->scan_pending_q)) {
1335 cmd_node = list_first_entry(&adapter->scan_pending_q,
1336 struct cmd_ctrl_node, list);
1337 list_del(&cmd_node->list);
1338 spin_unlock_irqrestore(&adapter->scan_pending_q_lock,
1339 flags);
1340 adapter->cmd_queued = cmd_node;
1341 mwifiex_insert_cmd_to_pending_q(adapter, cmd_node,
1342 true);
1343 } else {
1344 spin_unlock_irqrestore(&adapter->scan_pending_q_lock,
1345 flags);
1346 }
1347 } else {
1348 spin_lock_irqsave(&adapter->mwifiex_cmd_lock, flags);
1349 adapter->scan_processing = true;
1350 spin_unlock_irqrestore(&adapter->mwifiex_cmd_lock, flags);
1351 }
1352
1353 kfree(scan_cfg_out);
1354 kfree(scan_chan_list);
1355 return ret;
1356 }
1357
1358 /*
1359 * Sends IOCTL request to start a scan with user configurations.
1360 *
1361 * This function allocates the IOCTL request buffer, fills it
1362 * with requisite parameters and calls the IOCTL handler.
1363 *
1364 * Upon completion, it also generates a wireless event to notify
1365 * applications.
1366 */
1367 int mwifiex_set_user_scan_ioctl(struct mwifiex_private *priv,
1368 struct mwifiex_user_scan_cfg *scan_req)
1369 {
1370 int status;
1371
1372 status = mwifiex_scan_networks(priv, scan_req);
1373 queue_work(priv->adapter->workqueue, &priv->adapter->main_work);
1374
1375 return status;
1376 }
1377
1378 /*
1379 * This function prepares a scan command to be sent to the firmware.
1380 *
1381 * This uses the scan command configuration sent to the command processing
1382 * module in command preparation stage to configure a scan command structure
1383 * to send to firmware.
1384 *
1385 * The fixed fields specifying the BSS type and BSSID filters as well as a
1386 * variable number/length of TLVs are sent in the command to firmware.
1387 *
1388 * Preparation also includes -
1389 * - Setting command ID, and proper size
1390 * - Ensuring correct endian-ness
1391 */
1392 int mwifiex_cmd_802_11_scan(struct host_cmd_ds_command *cmd,
1393 struct mwifiex_scan_cmd_config *scan_cfg)
1394 {
1395 struct host_cmd_ds_802_11_scan *scan_cmd = &cmd->params.scan;
1396
1397 /* Set fixed field variables in scan command */
1398 scan_cmd->bss_mode = scan_cfg->bss_mode;
1399 memcpy(scan_cmd->bssid, scan_cfg->specific_bssid,
1400 sizeof(scan_cmd->bssid));
1401 memcpy(scan_cmd->tlv_buffer, scan_cfg->tlv_buf, scan_cfg->tlv_buf_len);
1402
1403 cmd->command = cpu_to_le16(HostCmd_CMD_802_11_SCAN);
1404
1405 /* Size is equal to the sizeof(fixed portions) + the TLV len + header */
1406 cmd->size = cpu_to_le16((u16) (sizeof(scan_cmd->bss_mode)
1407 + sizeof(scan_cmd->bssid)
1408 + scan_cfg->tlv_buf_len + S_DS_GEN));
1409
1410 return 0;
1411 }
1412
1413 /*
1414 * This function checks compatibility of requested network with current
1415 * driver settings.
1416 */
1417 int mwifiex_check_network_compatibility(struct mwifiex_private *priv,
1418 struct mwifiex_bssdescriptor *bss_desc)
1419 {
1420 int ret = -1;
1421
1422 if (!bss_desc)
1423 return -1;
1424
1425 if ((mwifiex_get_cfp(priv, (u8) bss_desc->bss_band,
1426 (u16) bss_desc->channel, 0))) {
1427 switch (priv->bss_mode) {
1428 case NL80211_IFTYPE_STATION:
1429 case NL80211_IFTYPE_ADHOC:
1430 ret = mwifiex_is_network_compatible(priv, bss_desc,
1431 priv->bss_mode);
1432 if (ret)
1433 dev_err(priv->adapter->dev, "cannot find ssid "
1434 "%s\n", bss_desc->ssid.ssid);
1435 break;
1436 default:
1437 ret = 0;
1438 }
1439 }
1440
1441 return ret;
1442 }
1443
1444 static int mwifiex_update_curr_bss_params(struct mwifiex_private *priv,
1445 struct cfg80211_bss *bss)
1446 {
1447 struct mwifiex_bssdescriptor *bss_desc;
1448 int ret;
1449 unsigned long flags;
1450
1451 /* Allocate and fill new bss descriptor */
1452 bss_desc = kzalloc(sizeof(struct mwifiex_bssdescriptor),
1453 GFP_KERNEL);
1454 if (!bss_desc) {
1455 dev_err(priv->adapter->dev, " failed to alloc bss_desc\n");
1456 return -ENOMEM;
1457 }
1458
1459 ret = mwifiex_fill_new_bss_desc(priv, bss, bss_desc);
1460 if (ret)
1461 goto done;
1462
1463 ret = mwifiex_check_network_compatibility(priv, bss_desc);
1464 if (ret)
1465 goto done;
1466
1467 /* Update current bss descriptor parameters */
1468 spin_lock_irqsave(&priv->curr_bcn_buf_lock, flags);
1469 priv->curr_bss_params.bss_descriptor.bcn_wpa_ie = NULL;
1470 priv->curr_bss_params.bss_descriptor.wpa_offset = 0;
1471 priv->curr_bss_params.bss_descriptor.bcn_rsn_ie = NULL;
1472 priv->curr_bss_params.bss_descriptor.rsn_offset = 0;
1473 priv->curr_bss_params.bss_descriptor.bcn_wapi_ie = NULL;
1474 priv->curr_bss_params.bss_descriptor.wapi_offset = 0;
1475 priv->curr_bss_params.bss_descriptor.bcn_ht_cap = NULL;
1476 priv->curr_bss_params.bss_descriptor.ht_cap_offset =
1477 0;
1478 priv->curr_bss_params.bss_descriptor.bcn_ht_oper = NULL;
1479 priv->curr_bss_params.bss_descriptor.ht_info_offset =
1480 0;
1481 priv->curr_bss_params.bss_descriptor.bcn_bss_co_2040 =
1482 NULL;
1483 priv->curr_bss_params.bss_descriptor.
1484 bss_co_2040_offset = 0;
1485 priv->curr_bss_params.bss_descriptor.bcn_ext_cap = NULL;
1486 priv->curr_bss_params.bss_descriptor.ext_cap_offset = 0;
1487 priv->curr_bss_params.bss_descriptor.beacon_buf = NULL;
1488 priv->curr_bss_params.bss_descriptor.beacon_buf_size =
1489 0;
1490
1491 /* Make a copy of current BSSID descriptor */
1492 memcpy(&priv->curr_bss_params.bss_descriptor, bss_desc,
1493 sizeof(priv->curr_bss_params.bss_descriptor));
1494 mwifiex_save_curr_bcn(priv);
1495 spin_unlock_irqrestore(&priv->curr_bcn_buf_lock, flags);
1496
1497 done:
1498 kfree(bss_desc);
1499 return 0;
1500 }
1501
1502 /*
1503 * This function handles the command response of scan.
1504 *
1505 * The response buffer for the scan command has the following
1506 * memory layout:
1507 *
1508 * .-------------------------------------------------------------.
1509 * | Header (4 * sizeof(t_u16)): Standard command response hdr |
1510 * .-------------------------------------------------------------.
1511 * | BufSize (t_u16) : sizeof the BSS Description data |
1512 * .-------------------------------------------------------------.
1513 * | NumOfSet (t_u8) : Number of BSS Descs returned |
1514 * .-------------------------------------------------------------.
1515 * | BSSDescription data (variable, size given in BufSize) |
1516 * .-------------------------------------------------------------.
1517 * | TLV data (variable, size calculated using Header->Size, |
1518 * | BufSize and sizeof the fixed fields above) |
1519 * .-------------------------------------------------------------.
1520 */
1521 int mwifiex_ret_802_11_scan(struct mwifiex_private *priv,
1522 struct host_cmd_ds_command *resp)
1523 {
1524 int ret = 0;
1525 struct mwifiex_adapter *adapter = priv->adapter;
1526 struct cmd_ctrl_node *cmd_node;
1527 struct host_cmd_ds_802_11_scan_rsp *scan_rsp;
1528 struct mwifiex_ie_types_data *tlv_data;
1529 struct mwifiex_ie_types_tsf_timestamp *tsf_tlv;
1530 u8 *bss_info;
1531 u32 scan_resp_size;
1532 u32 bytes_left;
1533 u32 idx;
1534 u32 tlv_buf_size;
1535 struct mwifiex_chan_freq_power *cfp;
1536 struct mwifiex_ie_types_chan_band_list_param_set *chan_band_tlv;
1537 struct chan_band_param_set *chan_band;
1538 u8 is_bgscan_resp;
1539 unsigned long flags;
1540 struct cfg80211_bss *bss;
1541
1542 is_bgscan_resp = (le16_to_cpu(resp->command)
1543 == HostCmd_CMD_802_11_BG_SCAN_QUERY);
1544 if (is_bgscan_resp)
1545 scan_rsp = &resp->params.bg_scan_query_resp.scan_resp;
1546 else
1547 scan_rsp = &resp->params.scan_resp;
1548
1549
1550 if (scan_rsp->number_of_sets > MWIFIEX_MAX_AP) {
1551 dev_err(adapter->dev, "SCAN_RESP: too many AP returned (%d)\n",
1552 scan_rsp->number_of_sets);
1553 ret = -1;
1554 goto done;
1555 }
1556
1557 bytes_left = le16_to_cpu(scan_rsp->bss_descript_size);
1558 dev_dbg(adapter->dev, "info: SCAN_RESP: bss_descript_size %d\n",
1559 bytes_left);
1560
1561 scan_resp_size = le16_to_cpu(resp->size);
1562
1563 dev_dbg(adapter->dev,
1564 "info: SCAN_RESP: returned %d APs before parsing\n",
1565 scan_rsp->number_of_sets);
1566
1567 bss_info = scan_rsp->bss_desc_and_tlv_buffer;
1568
1569 /*
1570 * The size of the TLV buffer is equal to the entire command response
1571 * size (scan_resp_size) minus the fixed fields (sizeof()'s), the
1572 * BSS Descriptions (bss_descript_size as bytesLef) and the command
1573 * response header (S_DS_GEN)
1574 */
1575 tlv_buf_size = scan_resp_size - (bytes_left
1576 + sizeof(scan_rsp->bss_descript_size)
1577 + sizeof(scan_rsp->number_of_sets)
1578 + S_DS_GEN);
1579
1580 tlv_data = (struct mwifiex_ie_types_data *) (scan_rsp->
1581 bss_desc_and_tlv_buffer +
1582 bytes_left);
1583
1584 /* Search the TLV buffer space in the scan response for any valid
1585 TLVs */
1586 mwifiex_ret_802_11_scan_get_tlv_ptrs(adapter, tlv_data, tlv_buf_size,
1587 TLV_TYPE_TSFTIMESTAMP,
1588 (struct mwifiex_ie_types_data **)
1589 &tsf_tlv);
1590
1591 /* Search the TLV buffer space in the scan response for any valid
1592 TLVs */
1593 mwifiex_ret_802_11_scan_get_tlv_ptrs(adapter, tlv_data, tlv_buf_size,
1594 TLV_TYPE_CHANNELBANDLIST,
1595 (struct mwifiex_ie_types_data **)
1596 &chan_band_tlv);
1597
1598 for (idx = 0; idx < scan_rsp->number_of_sets && bytes_left; idx++) {
1599 u8 bssid[ETH_ALEN];
1600 s32 rssi;
1601 const u8 *ie_buf;
1602 size_t ie_len;
1603 u16 channel = 0;
1604 u64 fw_tsf = 0;
1605 u16 beacon_size = 0;
1606 u32 curr_bcn_bytes;
1607 u32 freq;
1608 u16 beacon_period;
1609 u16 cap_info_bitmap;
1610 u8 *current_ptr;
1611 u64 timestamp;
1612 struct mwifiex_bcn_param *bcn_param;
1613 struct mwifiex_bss_priv *bss_priv;
1614
1615 if (bytes_left >= sizeof(beacon_size)) {
1616 /* Extract & convert beacon size from command buffer */
1617 memcpy(&beacon_size, bss_info, sizeof(beacon_size));
1618 bytes_left -= sizeof(beacon_size);
1619 bss_info += sizeof(beacon_size);
1620 }
1621
1622 if (!beacon_size || beacon_size > bytes_left) {
1623 bss_info += bytes_left;
1624 bytes_left = 0;
1625 return -1;
1626 }
1627
1628 /* Initialize the current working beacon pointer for this BSS
1629 * iteration */
1630 current_ptr = bss_info;
1631
1632 /* Advance the return beacon pointer past the current beacon */
1633 bss_info += beacon_size;
1634 bytes_left -= beacon_size;
1635
1636 curr_bcn_bytes = beacon_size;
1637
1638 /*
1639 * First 5 fields are bssid, RSSI, time stamp, beacon interval,
1640 * and capability information
1641 */
1642 if (curr_bcn_bytes < sizeof(struct mwifiex_bcn_param)) {
1643 dev_err(adapter->dev,
1644 "InterpretIE: not enough bytes left\n");
1645 continue;
1646 }
1647 bcn_param = (struct mwifiex_bcn_param *)current_ptr;
1648 current_ptr += sizeof(*bcn_param);
1649 curr_bcn_bytes -= sizeof(*bcn_param);
1650
1651 memcpy(bssid, bcn_param->bssid, ETH_ALEN);
1652
1653 rssi = (s32) bcn_param->rssi;
1654 rssi = (-rssi) * 100; /* Convert dBm to mBm */
1655 dev_dbg(adapter->dev, "info: InterpretIE: RSSI=%d\n", rssi);
1656
1657 timestamp = le64_to_cpu(bcn_param->timestamp);
1658 beacon_period = le16_to_cpu(bcn_param->beacon_period);
1659
1660 cap_info_bitmap = le16_to_cpu(bcn_param->cap_info_bitmap);
1661 dev_dbg(adapter->dev, "info: InterpretIE: capabilities=0x%X\n",
1662 cap_info_bitmap);
1663
1664 /* Rest of the current buffer are IE's */
1665 ie_buf = current_ptr;
1666 ie_len = curr_bcn_bytes;
1667 dev_dbg(adapter->dev,
1668 "info: InterpretIE: IELength for this AP = %d\n",
1669 curr_bcn_bytes);
1670
1671 while (curr_bcn_bytes >= sizeof(struct ieee_types_header)) {
1672 u8 element_id, element_len;
1673
1674 element_id = *current_ptr;
1675 element_len = *(current_ptr + 1);
1676 if (curr_bcn_bytes < element_len +
1677 sizeof(struct ieee_types_header)) {
1678 dev_err(priv->adapter->dev,
1679 "%s: bytes left < IE length\n",
1680 __func__);
1681 goto done;
1682 }
1683 if (element_id == WLAN_EID_DS_PARAMS) {
1684 channel = *(current_ptr + sizeof(struct ieee_types_header));
1685 break;
1686 }
1687
1688 current_ptr += element_len +
1689 sizeof(struct ieee_types_header);
1690 curr_bcn_bytes -= element_len +
1691 sizeof(struct ieee_types_header);
1692 }
1693
1694 /*
1695 * If the TSF TLV was appended to the scan results, save this
1696 * entry's TSF value in the fw_tsf field. It is the firmware's
1697 * TSF value at the time the beacon or probe response was
1698 * received.
1699 */
1700 if (tsf_tlv)
1701 memcpy(&fw_tsf, &tsf_tlv->tsf_data[idx * TSF_DATA_SIZE],
1702 sizeof(fw_tsf));
1703
1704 if (channel) {
1705 struct ieee80211_channel *chan;
1706 u8 band;
1707
1708 band = BAND_G;
1709 if (chan_band_tlv) {
1710 chan_band =
1711 &chan_band_tlv->chan_band_param[idx];
1712 band = mwifiex_radio_type_to_band(
1713 chan_band->radio_type
1714 & (BIT(0) | BIT(1)));
1715 }
1716
1717 cfp = mwifiex_get_cfp(priv, band, channel, 0);
1718
1719 freq = cfp ? cfp->freq : 0;
1720
1721 chan = ieee80211_get_channel(priv->wdev->wiphy, freq);
1722
1723 if (chan && !(chan->flags & IEEE80211_CHAN_DISABLED)) {
1724 bss = cfg80211_inform_bss(priv->wdev->wiphy,
1725 chan, bssid, timestamp,
1726 cap_info_bitmap, beacon_period,
1727 ie_buf, ie_len, rssi, GFP_KERNEL);
1728 bss_priv = (struct mwifiex_bss_priv *)bss->priv;
1729 bss_priv->band = band;
1730 bss_priv->fw_tsf = fw_tsf;
1731 if (priv->media_connected &&
1732 !memcmp(bssid,
1733 priv->curr_bss_params.bss_descriptor
1734 .mac_address, ETH_ALEN))
1735 mwifiex_update_curr_bss_params(priv,
1736 bss);
1737 cfg80211_put_bss(bss);
1738 }
1739 } else {
1740 dev_dbg(adapter->dev, "missing BSS channel IE\n");
1741 }
1742 }
1743
1744 spin_lock_irqsave(&adapter->scan_pending_q_lock, flags);
1745 if (list_empty(&adapter->scan_pending_q)) {
1746 spin_unlock_irqrestore(&adapter->scan_pending_q_lock, flags);
1747 spin_lock_irqsave(&adapter->mwifiex_cmd_lock, flags);
1748 adapter->scan_processing = false;
1749 spin_unlock_irqrestore(&adapter->mwifiex_cmd_lock, flags);
1750
1751 /* Need to indicate IOCTL complete */
1752 if (adapter->curr_cmd->wait_q_enabled) {
1753 adapter->cmd_wait_q.status = 0;
1754 mwifiex_complete_cmd(adapter, adapter->curr_cmd);
1755 }
1756 if (priv->report_scan_result)
1757 priv->report_scan_result = false;
1758 if (priv->scan_pending_on_block) {
1759 priv->scan_pending_on_block = false;
1760 up(&priv->async_sem);
1761 }
1762
1763 if (priv->user_scan_cfg) {
1764 dev_dbg(priv->adapter->dev,
1765 "info: %s: sending scan results\n", __func__);
1766 cfg80211_scan_done(priv->scan_request, 0);
1767 priv->scan_request = NULL;
1768 kfree(priv->user_scan_cfg);
1769 priv->user_scan_cfg = NULL;
1770 }
1771 } else {
1772 /* Get scan command from scan_pending_q and put to
1773 cmd_pending_q */
1774 cmd_node = list_first_entry(&adapter->scan_pending_q,
1775 struct cmd_ctrl_node, list);
1776 list_del(&cmd_node->list);
1777 spin_unlock_irqrestore(&adapter->scan_pending_q_lock, flags);
1778
1779 mwifiex_insert_cmd_to_pending_q(adapter, cmd_node, true);
1780 }
1781
1782 done:
1783 return ret;
1784 }
1785
1786 /*
1787 * This function prepares command for background scan query.
1788 *
1789 * Preparation includes -
1790 * - Setting command ID and proper size
1791 * - Setting background scan flush parameter
1792 * - Ensuring correct endian-ness
1793 */
1794 int mwifiex_cmd_802_11_bg_scan_query(struct host_cmd_ds_command *cmd)
1795 {
1796 struct host_cmd_ds_802_11_bg_scan_query *bg_query =
1797 &cmd->params.bg_scan_query;
1798
1799 cmd->command = cpu_to_le16(HostCmd_CMD_802_11_BG_SCAN_QUERY);
1800 cmd->size = cpu_to_le16(sizeof(struct host_cmd_ds_802_11_bg_scan_query)
1801 + S_DS_GEN);
1802
1803 bg_query->flush = 1;
1804
1805 return 0;
1806 }
1807
1808 /*
1809 * This function inserts scan command node to the scan pending queue.
1810 */
1811 void
1812 mwifiex_queue_scan_cmd(struct mwifiex_private *priv,
1813 struct cmd_ctrl_node *cmd_node)
1814 {
1815 struct mwifiex_adapter *adapter = priv->adapter;
1816 unsigned long flags;
1817
1818 cmd_node->wait_q_enabled = true;
1819 cmd_node->condition = &adapter->scan_wait_q_woken;
1820 spin_lock_irqsave(&adapter->scan_pending_q_lock, flags);
1821 list_add_tail(&cmd_node->list, &adapter->scan_pending_q);
1822 spin_unlock_irqrestore(&adapter->scan_pending_q_lock, flags);
1823 }
1824
1825 /*
1826 * This function sends a scan command for all available channels to the
1827 * firmware, filtered on a specific SSID.
1828 */
1829 static int mwifiex_scan_specific_ssid(struct mwifiex_private *priv,
1830 struct cfg80211_ssid *req_ssid)
1831 {
1832 struct mwifiex_adapter *adapter = priv->adapter;
1833 int ret = 0;
1834 struct mwifiex_user_scan_cfg *scan_cfg;
1835
1836 if (!req_ssid)
1837 return -1;
1838
1839 if (adapter->scan_processing) {
1840 dev_dbg(adapter->dev, "cmd: Scan already in process...\n");
1841 return ret;
1842 }
1843
1844 if (priv->scan_block) {
1845 dev_dbg(adapter->dev,
1846 "cmd: Scan is blocked during association...\n");
1847 return ret;
1848 }
1849
1850 scan_cfg = kzalloc(sizeof(struct mwifiex_user_scan_cfg), GFP_KERNEL);
1851 if (!scan_cfg) {
1852 dev_err(adapter->dev, "failed to alloc scan_cfg\n");
1853 return -ENOMEM;
1854 }
1855
1856 scan_cfg->ssid_list = req_ssid;
1857 scan_cfg->num_ssids = 1;
1858
1859 ret = mwifiex_scan_networks(priv, scan_cfg);
1860
1861 kfree(scan_cfg);
1862 return ret;
1863 }
1864
1865 /*
1866 * Sends IOCTL request to start a scan.
1867 *
1868 * This function allocates the IOCTL request buffer, fills it
1869 * with requisite parameters and calls the IOCTL handler.
1870 *
1871 * Scan command can be issued for both normal scan and specific SSID
1872 * scan, depending upon whether an SSID is provided or not.
1873 */
1874 int mwifiex_request_scan(struct mwifiex_private *priv,
1875 struct cfg80211_ssid *req_ssid)
1876 {
1877 int ret;
1878
1879 if (down_interruptible(&priv->async_sem)) {
1880 dev_err(priv->adapter->dev, "%s: acquire semaphore\n",
1881 __func__);
1882 return -1;
1883 }
1884 priv->scan_pending_on_block = true;
1885
1886 priv->adapter->scan_wait_q_woken = false;
1887
1888 if (req_ssid && req_ssid->ssid_len != 0)
1889 /* Specific SSID scan */
1890 ret = mwifiex_scan_specific_ssid(priv, req_ssid);
1891 else
1892 /* Normal scan */
1893 ret = mwifiex_scan_networks(priv, NULL);
1894
1895 if (!ret)
1896 ret = mwifiex_wait_queue_complete(priv->adapter);
1897
1898 if (ret == -1) {
1899 priv->scan_pending_on_block = false;
1900 up(&priv->async_sem);
1901 }
1902
1903 return ret;
1904 }
1905
1906 /*
1907 * This function appends the vendor specific IE TLV to a buffer.
1908 */
1909 int
1910 mwifiex_cmd_append_vsie_tlv(struct mwifiex_private *priv,
1911 u16 vsie_mask, u8 **buffer)
1912 {
1913 int id, ret_len = 0;
1914 struct mwifiex_ie_types_vendor_param_set *vs_param_set;
1915
1916 if (!buffer)
1917 return 0;
1918 if (!(*buffer))
1919 return 0;
1920
1921 /*
1922 * Traverse through the saved vendor specific IE array and append
1923 * the selected(scan/assoc/adhoc) IE as TLV to the command
1924 */
1925 for (id = 0; id < MWIFIEX_MAX_VSIE_NUM; id++) {
1926 if (priv->vs_ie[id].mask & vsie_mask) {
1927 vs_param_set =
1928 (struct mwifiex_ie_types_vendor_param_set *)
1929 *buffer;
1930 vs_param_set->header.type =
1931 cpu_to_le16(TLV_TYPE_PASSTHROUGH);
1932 vs_param_set->header.len =
1933 cpu_to_le16((((u16) priv->vs_ie[id].ie[1])
1934 & 0x00FF) + 2);
1935 memcpy(vs_param_set->ie, priv->vs_ie[id].ie,
1936 le16_to_cpu(vs_param_set->header.len));
1937 *buffer += le16_to_cpu(vs_param_set->header.len) +
1938 sizeof(struct mwifiex_ie_types_header);
1939 ret_len += le16_to_cpu(vs_param_set->header.len) +
1940 sizeof(struct mwifiex_ie_types_header);
1941 }
1942 }
1943 return ret_len;
1944 }
1945
1946 /*
1947 * This function saves a beacon buffer of the current BSS descriptor.
1948 *
1949 * The current beacon buffer is saved so that it can be restored in the
1950 * following cases that makes the beacon buffer not to contain the current
1951 * ssid's beacon buffer.
1952 * - The current ssid was not found somehow in the last scan.
1953 * - The current ssid was the last entry of the scan table and overloaded.
1954 */
1955 void
1956 mwifiex_save_curr_bcn(struct mwifiex_private *priv)
1957 {
1958 struct mwifiex_bssdescriptor *curr_bss =
1959 &priv->curr_bss_params.bss_descriptor;
1960
1961 if (!curr_bss->beacon_buf_size)
1962 return;
1963
1964 /* allocate beacon buffer at 1st time; or if it's size has changed */
1965 if (!priv->curr_bcn_buf ||
1966 priv->curr_bcn_size != curr_bss->beacon_buf_size) {
1967 priv->curr_bcn_size = curr_bss->beacon_buf_size;
1968
1969 kfree(priv->curr_bcn_buf);
1970 priv->curr_bcn_buf = kmalloc(curr_bss->beacon_buf_size,
1971 GFP_ATOMIC);
1972 if (!priv->curr_bcn_buf) {
1973 dev_err(priv->adapter->dev,
1974 "failed to alloc curr_bcn_buf\n");
1975 return;
1976 }
1977 }
1978
1979 memcpy(priv->curr_bcn_buf, curr_bss->beacon_buf,
1980 curr_bss->beacon_buf_size);
1981 dev_dbg(priv->adapter->dev, "info: current beacon saved %d\n",
1982 priv->curr_bcn_size);
1983
1984 curr_bss->beacon_buf = priv->curr_bcn_buf;
1985
1986 /* adjust the pointers in the current BSS descriptor */
1987 if (curr_bss->bcn_wpa_ie)
1988 curr_bss->bcn_wpa_ie =
1989 (struct ieee_types_vendor_specific *)
1990 (curr_bss->beacon_buf +
1991 curr_bss->wpa_offset);
1992
1993 if (curr_bss->bcn_rsn_ie)
1994 curr_bss->bcn_rsn_ie = (struct ieee_types_generic *)
1995 (curr_bss->beacon_buf +
1996 curr_bss->rsn_offset);
1997
1998 if (curr_bss->bcn_ht_cap)
1999 curr_bss->bcn_ht_cap = (struct ieee80211_ht_cap *)
2000 (curr_bss->beacon_buf +
2001 curr_bss->ht_cap_offset);
2002
2003 if (curr_bss->bcn_ht_oper)
2004 curr_bss->bcn_ht_oper = (struct ieee80211_ht_operation *)
2005 (curr_bss->beacon_buf +
2006 curr_bss->ht_info_offset);
2007
2008 if (curr_bss->bcn_bss_co_2040)
2009 curr_bss->bcn_bss_co_2040 =
2010 (curr_bss->beacon_buf + curr_bss->bss_co_2040_offset);
2011
2012 if (curr_bss->bcn_ext_cap)
2013 curr_bss->bcn_ext_cap = curr_bss->beacon_buf +
2014 curr_bss->ext_cap_offset;
2015 }
2016
2017 /*
2018 * This function frees the current BSS descriptor beacon buffer.
2019 */
2020 void
2021 mwifiex_free_curr_bcn(struct mwifiex_private *priv)
2022 {
2023 kfree(priv->curr_bcn_buf);
2024 priv->curr_bcn_buf = NULL;
2025 }
This page took 0.074165 seconds and 5 git commands to generate.