cfg80211.c 195 KB
Newer Older
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
/*
 * Copyright (c) 2010 Broadcom Corporation
 *
 * Permission to use, copy, modify, and/or distribute this software for any
 * purpose with or without fee is hereby granted, provided that the above
 * copyright notice and this permission notice appear in all copies.
 *
 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY
 * SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION
 * OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN
 * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
 */

/* Toplevel file. Relies on dhd_linux.c to send commands to the dongle. */

#include <linux/kernel.h>
#include <linux/etherdevice.h>
21
#include <linux/module.h>
22
#include <linux/vmalloc.h>
23
#include <net/cfg80211.h>
24
#include <net/netlink.h>
25 26 27 28

#include <brcmu_utils.h>
#include <defs.h>
#include <brcmu_wifi.h>
29
#include "core.h"
30
#include "debug.h"
31
#include "tracepoint.h"
32
#include "fwil_types.h"
33
#include "p2p.h"
34
#include "btcoex.h"
35
#include "pno.h"
36
#include "cfg80211.h"
37
#include "feature.h"
38
#include "fwil.h"
39
#include "proto.h"
40
#include "vendor.h"
41
#include "bus.h"
42
#include "common.h"
43

44 45
#define BRCMF_SCAN_IE_LEN_MAX		2048

46 47 48 49
#define WPA_OUI				"\x00\x50\xF2"	/* WPA OUI */
#define WPA_OUI_TYPE			1
#define RSN_OUI				"\x00\x0F\xAC"	/* RSN OUI */
#define	WME_OUI_TYPE			2
50
#define WPS_OUI_TYPE			4
51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

#define VS_IE_FIXED_HDR_LEN		6
#define WPA_IE_VERSION_LEN		2
#define WPA_IE_MIN_OUI_LEN		4
#define WPA_IE_SUITE_COUNT_LEN		2

#define WPA_CIPHER_NONE			0	/* None */
#define WPA_CIPHER_WEP_40		1	/* WEP (40-bit) */
#define WPA_CIPHER_TKIP			2	/* TKIP: default for WPA */
#define WPA_CIPHER_AES_CCM		4	/* AES (CCM) */
#define WPA_CIPHER_WEP_104		5	/* WEP (104-bit) */

#define RSN_AKM_NONE			0	/* None (IBSS) */
#define RSN_AKM_UNSPECIFIED		1	/* Over 802.1x */
#define RSN_AKM_PSK			2	/* Pre-shared Key */
66 67
#define RSN_AKM_SHA256_1X		5	/* SHA256, 802.1X */
#define RSN_AKM_SHA256_PSK		6	/* SHA256, Pre-shared Key */
68
#define RSN_CAP_LEN			2	/* Length of RSN capabilities */
69 70 71 72
#define RSN_CAP_PTK_REPLAY_CNTR_MASK	(BIT(2) | BIT(3))
#define RSN_CAP_MFPR_MASK		BIT(6)
#define RSN_CAP_MFPC_MASK		BIT(7)
#define RSN_PMKID_COUNT_LEN		2
73 74 75 76 77 78 79 80

#define VNDR_IE_CMD_LEN			4	/* length of the set command
						 * string :"add", "del" (+ NUL)
						 */
#define VNDR_IE_COUNT_OFFSET		4
#define VNDR_IE_PKTFLAG_OFFSET		8
#define VNDR_IE_VSIE_OFFSET		12
#define VNDR_IE_HDR_SIZE		12
81
#define VNDR_IE_PARSE_LIMIT		5
82 83 84

#define	DOT11_MGMT_HDR_LEN		24	/* d11 management header len */
#define	DOT11_BCN_PRB_FIXED_LEN		12	/* beacon/probe fixed length */
85

86 87 88 89
#define BRCMF_SCAN_JOIN_ACTIVE_DWELL_TIME_MS	320
#define BRCMF_SCAN_JOIN_PASSIVE_DWELL_TIME_MS	400
#define BRCMF_SCAN_JOIN_PROBE_INTERVAL_MS	20

90 91 92 93
#define BRCMF_SCAN_CHANNEL_TIME		40
#define BRCMF_SCAN_UNASSOC_TIME		40
#define BRCMF_SCAN_PASSIVE_TIME		120

94 95
#define BRCMF_ND_INFO_TIMEOUT		msecs_to_jiffies(2000)

96 97 98
#define BRCMF_ASSOC_PARAMS_FIXED_SIZE \
	(sizeof(struct brcmf_assoc_params_le) - sizeof(u16))

99
static bool check_vif_up(struct brcmf_cfg80211_vif *vif)
100
{
101
	if (!test_bit(BRCMF_VIF_STATUS_READY, &vif->sme_state)) {
102 103
		brcmf_dbg(INFO, "device is not ready : status (%lu)\n",
			  vif->sme_state);
104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132
		return false;
	}
	return true;
}

#define RATE_TO_BASE100KBPS(rate)   (((rate) * 10) / 2)
#define RATETAB_ENT(_rateid, _flags) \
	{                                                               \
		.bitrate        = RATE_TO_BASE100KBPS(_rateid),     \
		.hw_value       = (_rateid),                            \
		.flags          = (_flags),                             \
	}

static struct ieee80211_rate __wl_rates[] = {
	RATETAB_ENT(BRCM_RATE_1M, 0),
	RATETAB_ENT(BRCM_RATE_2M, IEEE80211_RATE_SHORT_PREAMBLE),
	RATETAB_ENT(BRCM_RATE_5M5, IEEE80211_RATE_SHORT_PREAMBLE),
	RATETAB_ENT(BRCM_RATE_11M, IEEE80211_RATE_SHORT_PREAMBLE),
	RATETAB_ENT(BRCM_RATE_6M, 0),
	RATETAB_ENT(BRCM_RATE_9M, 0),
	RATETAB_ENT(BRCM_RATE_12M, 0),
	RATETAB_ENT(BRCM_RATE_18M, 0),
	RATETAB_ENT(BRCM_RATE_24M, 0),
	RATETAB_ENT(BRCM_RATE_36M, 0),
	RATETAB_ENT(BRCM_RATE_48M, 0),
	RATETAB_ENT(BRCM_RATE_54M, 0),
};

#define wl_g_rates		(__wl_rates + 0)
133 134 135 136 137
#define wl_g_rates_size		ARRAY_SIZE(__wl_rates)
#define wl_a_rates		(__wl_rates + 4)
#define wl_a_rates_size		(wl_g_rates_size - 4)

#define CHAN2G(_channel, _freq) {				\
138
	.band			= NL80211_BAND_2GHZ,		\
139 140 141 142 143 144 145
	.center_freq		= (_freq),			\
	.hw_value		= (_channel),			\
	.max_antenna_gain	= 0,				\
	.max_power		= 30,				\
}

#define CHAN5G(_channel) {					\
146
	.band			= NL80211_BAND_5GHZ,		\
147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167
	.center_freq		= 5000 + (5 * (_channel)),	\
	.hw_value		= (_channel),			\
	.max_antenna_gain	= 0,				\
	.max_power		= 30,				\
}

static struct ieee80211_channel __wl_2ghz_channels[] = {
	CHAN2G(1, 2412), CHAN2G(2, 2417), CHAN2G(3, 2422), CHAN2G(4, 2427),
	CHAN2G(5, 2432), CHAN2G(6, 2437), CHAN2G(7, 2442), CHAN2G(8, 2447),
	CHAN2G(9, 2452), CHAN2G(10, 2457), CHAN2G(11, 2462), CHAN2G(12, 2467),
	CHAN2G(13, 2472), CHAN2G(14, 2484)
};

static struct ieee80211_channel __wl_5ghz_channels[] = {
	CHAN5G(34), CHAN5G(36), CHAN5G(38), CHAN5G(40), CHAN5G(42),
	CHAN5G(44), CHAN5G(46), CHAN5G(48), CHAN5G(52), CHAN5G(56),
	CHAN5G(60), CHAN5G(64), CHAN5G(100), CHAN5G(104), CHAN5G(108),
	CHAN5G(112), CHAN5G(116), CHAN5G(120), CHAN5G(124), CHAN5G(128),
	CHAN5G(132), CHAN5G(136), CHAN5G(140), CHAN5G(144), CHAN5G(149),
	CHAN5G(153), CHAN5G(157), CHAN5G(161), CHAN5G(165)
};
168

169
/* Band templates duplicated per wiphy. The channel info
170
 * above is added to the band during setup.
171 172
 */
static const struct ieee80211_supported_band __wl_band_2ghz = {
173
	.band = NL80211_BAND_2GHZ,
174 175 176 177
	.bitrates = wl_g_rates,
	.n_bitrates = wl_g_rates_size,
};

178
static const struct ieee80211_supported_band __wl_band_5ghz = {
179
	.band = NL80211_BAND_5GHZ,
180 181 182 183
	.bitrates = wl_a_rates,
	.n_bitrates = wl_a_rates_size,
};

184 185
/* This is to override regulatory domains defined in cfg80211 module (reg.c)
 * By default world regulatory domain defined in reg.c puts the flags
186 187 188
 * NL80211_RRF_NO_IR for 5GHz channels (for * 36..48 and 149..165).
 * With respect to these flags, wpa_supplicant doesn't * start p2p
 * operations on 5GHz channels. All the changes in world regulatory
189 190 191 192 193 194 195 196 197 198 199 200 201 202
 * domain are to be done here.
 */
static const struct ieee80211_regdomain brcmf_regdom = {
	.n_reg_rules = 4,
	.alpha2 =  "99",
	.reg_rules = {
		/* IEEE 802.11b/g, channels 1..11 */
		REG_RULE(2412-10, 2472+10, 40, 6, 20, 0),
		/* If any */
		/* IEEE 802.11 channel 14 - Only JP enables
		 * this and for 802.11b only
		 */
		REG_RULE(2484-10, 2484+10, 20, 6, 20, 0),
		/* IEEE 802.11a, channel 36..64 */
203
		REG_RULE(5150-10, 5350+10, 80, 6, 20, 0),
204
		/* IEEE 802.11a, channel 100..165 */
205
		REG_RULE(5470-10, 5850+10, 80, 6, 20, 0), }
206 207
};

208 209 210 211 212 213 214
/* Note: brcmf_cipher_suites is an array of int defining which cipher suites
 * are supported. A pointer to this array and the number of entries is passed
 * on to upper layers. AES_CMAC defines whether or not the driver supports MFP.
 * So the cipher suite AES_CMAC has to be the last one in the array, and when
 * device does not support MFP then the number of suites will be decreased by 1
 */
static const u32 brcmf_cipher_suites[] = {
215 216 217 218
	WLAN_CIPHER_SUITE_WEP40,
	WLAN_CIPHER_SUITE_WEP104,
	WLAN_CIPHER_SUITE_TKIP,
	WLAN_CIPHER_SUITE_CCMP,
219 220
	/* Keep as last entry: */
	WLAN_CIPHER_SUITE_AES_CMAC
221 222
};

223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238
/* Vendor specific ie. id = 221, oui and type defines exact ie */
struct brcmf_vs_tlv {
	u8 id;
	u8 len;
	u8 oui[3];
	u8 oui_type;
};

struct parsed_vndr_ie_info {
	u8 *ie_ptr;
	u32 ie_len;	/* total length including id & length field */
	struct brcmf_vs_tlv vndrie;
};

struct parsed_vndr_ies {
	u32 count;
239
	struct parsed_vndr_ie_info ie_info[VNDR_IE_PARSE_LIMIT];
240 241
};

242 243 244 245 246 247 248 249 250 251 252 253 254 255
static u8 nl80211_band_to_fwil(enum nl80211_band band)
{
	switch (band) {
	case NL80211_BAND_2GHZ:
		return WLC_BAND_2G;
	case NL80211_BAND_5GHZ:
		return WLC_BAND_5G;
	default:
		WARN_ON(1);
		break;
	}
	return 0;
}

256 257
static u16 chandef_to_chanspec(struct brcmu_d11inf *d11inf,
			       struct cfg80211_chan_def *ch)
258 259 260 261 262 263 264
{
	struct brcmu_chan ch_inf;
	s32 primary_offset;

	brcmf_dbg(TRACE, "chandef: control %d center %d width %d\n",
		  ch->chan->center_freq, ch->center_freq1, ch->width);
	ch_inf.chnum = ieee80211_frequency_to_channel(ch->center_freq1);
265
	primary_offset = ch->chan->center_freq - ch->center_freq1;
266 267
	switch (ch->width) {
	case NL80211_CHAN_WIDTH_20:
268
	case NL80211_CHAN_WIDTH_20_NOHT:
269 270 271 272 273
		ch_inf.bw = BRCMU_CHAN_BW_20;
		WARN_ON(primary_offset != 0);
		break;
	case NL80211_CHAN_WIDTH_40:
		ch_inf.bw = BRCMU_CHAN_BW_40;
274
		if (primary_offset > 0)
275 276 277 278 279 280
			ch_inf.sb = BRCMU_CHAN_SB_U;
		else
			ch_inf.sb = BRCMU_CHAN_SB_L;
		break;
	case NL80211_CHAN_WIDTH_80:
		ch_inf.bw = BRCMU_CHAN_BW_80;
281 282 283 284 285 286 287 288
		if (primary_offset == -30)
			ch_inf.sb = BRCMU_CHAN_SB_LL;
		else if (primary_offset == -10)
			ch_inf.sb = BRCMU_CHAN_SB_LU;
		else if (primary_offset == 10)
			ch_inf.sb = BRCMU_CHAN_SB_UL;
		else
			ch_inf.sb = BRCMU_CHAN_SB_UU;
289
		break;
290 291 292 293
	case NL80211_CHAN_WIDTH_80P80:
	case NL80211_CHAN_WIDTH_160:
	case NL80211_CHAN_WIDTH_5:
	case NL80211_CHAN_WIDTH_10:
294 295 296 297
	default:
		WARN_ON_ONCE(1);
	}
	switch (ch->chan->band) {
298
	case NL80211_BAND_2GHZ:
299 300
		ch_inf.band = BRCMU_CHAN_BAND_2G;
		break;
301
	case NL80211_BAND_5GHZ:
302 303
		ch_inf.band = BRCMU_CHAN_BAND_5G;
		break;
304
	case NL80211_BAND_60GHZ:
305 306 307 308 309 310 311 312
	default:
		WARN_ON_ONCE(1);
	}
	d11inf->encchspec(&ch_inf);

	return ch_inf.chspec;
}

313 314
u16 channel_to_chanspec(struct brcmu_d11inf *d11inf,
			struct ieee80211_channel *ch)
315
{
316
	struct brcmu_chan ch_inf;
317

318 319 320
	ch_inf.chnum = ieee80211_frequency_to_channel(ch->center_freq);
	ch_inf.bw = BRCMU_CHAN_BW_20;
	d11inf->encchspec(&ch_inf);
321

322
	return ch_inf.chspec;
323 324
}

325 326 327 328
/* Traverse a string of 1-byte tag/1-byte length/variable-length value
 * triples, returning a pointer to the substring whose first element
 * matches tag
 */
329
static const struct brcmf_tlv *
330
brcmf_parse_tlvs(const void *buf, int buflen, uint key)
331
{
332 333
	const struct brcmf_tlv *elt = buf;
	int totlen = buflen;
334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353

	/* find tagged parameter */
	while (totlen >= TLV_HDR_LEN) {
		int len = elt->len;

		/* validate remaining totlen */
		if ((elt->id == key) && (totlen >= (len + TLV_HDR_LEN)))
			return elt;

		elt = (struct brcmf_tlv *)((u8 *)elt + (len + TLV_HDR_LEN));
		totlen -= (len + TLV_HDR_LEN);
	}

	return NULL;
}

/* Is any of the tlvs the expected entry? If
 * not update the tlvs buffer pointer/length.
 */
static bool
354 355
brcmf_tlv_has_ie(const u8 *ie, const u8 **tlvs, u32 *tlvs_len,
		 const u8 *oui, u32 oui_len, u8 type)
356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376
{
	/* If the contents match the OUI and the type */
	if (ie[TLV_LEN_OFF] >= oui_len + 1 &&
	    !memcmp(&ie[TLV_BODY_OFF], oui, oui_len) &&
	    type == ie[TLV_BODY_OFF + oui_len]) {
		return true;
	}

	if (tlvs == NULL)
		return false;
	/* point to the next ie */
	ie += ie[TLV_LEN_OFF] + TLV_HDR_LEN;
	/* calculate the length of the rest of the buffer */
	*tlvs_len -= (int)(ie - *tlvs);
	/* update the pointer to the start of the buffer */
	*tlvs = ie;

	return false;
}

static struct brcmf_vs_tlv *
377
brcmf_find_wpaie(const u8 *parse, u32 len)
378
{
379
	const struct brcmf_tlv *ie;
380 381

	while ((ie = brcmf_parse_tlvs(parse, len, WLAN_EID_VENDOR_SPECIFIC))) {
382
		if (brcmf_tlv_has_ie((const u8 *)ie, &parse, &len,
383 384 385 386 387 388 389
				     WPA_OUI, TLV_OUI_LEN, WPA_OUI_TYPE))
			return (struct brcmf_vs_tlv *)ie;
	}
	return NULL;
}

static struct brcmf_vs_tlv *
390
brcmf_find_wpsie(const u8 *parse, u32 len)
391
{
392
	const struct brcmf_tlv *ie;
393 394 395 396 397 398 399 400 401

	while ((ie = brcmf_parse_tlvs(parse, len, WLAN_EID_VENDOR_SPECIFIC))) {
		if (brcmf_tlv_has_ie((u8 *)ie, &parse, &len,
				     WPA_OUI, TLV_OUI_LEN, WPS_OUI_TYPE))
			return (struct brcmf_vs_tlv *)ie;
	}
	return NULL;
}

402 403 404 405 406
static int brcmf_vif_change_validate(struct brcmf_cfg80211_info *cfg,
				     struct brcmf_cfg80211_vif *vif,
				     enum nl80211_iftype new_type)
{
	struct brcmf_cfg80211_vif *pos;
407 408
	bool check_combos = false;
	int ret = 0;
409 410 411
	struct iface_combination_params params = {
		.num_different_channels = 1,
	};
412 413

	list_for_each_entry(pos, &cfg->vif_list, list)
414
		if (pos == vif) {
415
			params.iftype_num[new_type]++;
416 417 418
		} else {
			/* concurrent interfaces so need check combinations */
			check_combos = true;
419
			params.iftype_num[pos->wdev.iftype]++;
420 421 422
		}

	if (check_combos)
423
		ret = cfg80211_check_combinations(cfg->wiphy, &params);
424

425
	return ret;
426 427 428 429 430 431
}

static int brcmf_vif_add_validate(struct brcmf_cfg80211_info *cfg,
				  enum nl80211_iftype new_type)
{
	struct brcmf_cfg80211_vif *pos;
432 433 434
	struct iface_combination_params params = {
		.num_different_channels = 1,
	};
435 436

	list_for_each_entry(pos, &cfg->vif_list, list)
437
		params.iftype_num[pos->wdev.iftype]++;
438

439 440
	params.iftype_num[new_type]++;
	return cfg80211_check_combinations(cfg->wiphy, &params);
441
}
442

443 444 445 446 447 448 449 450 451 452 453 454 455 456
static void convert_key_from_CPU(struct brcmf_wsec_key *key,
				 struct brcmf_wsec_key_le *key_le)
{
	key_le->index = cpu_to_le32(key->index);
	key_le->len = cpu_to_le32(key->len);
	key_le->algo = cpu_to_le32(key->algo);
	key_le->flags = cpu_to_le32(key->flags);
	key_le->rxiv.hi = cpu_to_le32(key->rxiv.hi);
	key_le->rxiv.lo = cpu_to_le16(key->rxiv.lo);
	key_le->iv_initialized = cpu_to_le32(key->iv_initialized);
	memcpy(key_le->data, key->data, sizeof(key->data));
	memcpy(key_le->ea, key->ea, sizeof(key->ea));
}

457
static int
458
send_key_to_dongle(struct brcmf_if *ifp, struct brcmf_wsec_key *key)
459
{
460
	struct brcmf_pub *drvr = ifp->drvr;
461 462 463 464
	int err;
	struct brcmf_wsec_key_le key_le;

	convert_key_from_CPU(key, &key_le);
465

466
	brcmf_netdev_wait_pend8021x(ifp);
467

468
	err = brcmf_fil_bsscfg_data_set(ifp, "wsec_key", &key_le,
469
					sizeof(key_le));
470

471
	if (err)
472
		bphy_err(drvr, "wsec_key error (%d)\n", err);
473 474 475
	return err;
}

476 477 478
static void
brcmf_cfg80211_update_proto_addr_mode(struct wireless_dev *wdev)
{
479 480 481 482 483
	struct brcmf_cfg80211_vif *vif;
	struct brcmf_if *ifp;

	vif = container_of(wdev, struct brcmf_cfg80211_vif, wdev);
	ifp = vif->ifp;
484 485 486 487 488 489 490 491 492 493 494

	if ((wdev->iftype == NL80211_IFTYPE_ADHOC) ||
	    (wdev->iftype == NL80211_IFTYPE_AP) ||
	    (wdev->iftype == NL80211_IFTYPE_P2P_GO))
		brcmf_proto_configure_addr_mode(ifp->drvr, ifp->ifidx,
						ADDR_DIRECT);
	else
		brcmf_proto_configure_addr_mode(ifp->drvr, ifp->ifidx,
						ADDR_INDIRECT);
}

495 496 497 498 499 500 501 502 503 504 505 506 507 508 509
static int brcmf_get_first_free_bsscfgidx(struct brcmf_pub *drvr)
{
	int bsscfgidx;

	for (bsscfgidx = 0; bsscfgidx < BRCMF_MAX_IFS; bsscfgidx++) {
		/* bsscfgidx 1 is reserved for legacy P2P */
		if (bsscfgidx == 1)
			continue;
		if (!drvr->iflist[bsscfgidx])
			return bsscfgidx;
	}

	return -ENOMEM;
}

510 511
static int brcmf_cfg80211_request_ap_if(struct brcmf_if *ifp)
{
512
	struct brcmf_pub *drvr = ifp->drvr;
513 514 515 516 517
	struct brcmf_mbss_ssid_le mbss_ssid_le;
	int bsscfgidx;
	int err;

	memset(&mbss_ssid_le, 0, sizeof(mbss_ssid_le));
518
	bsscfgidx = brcmf_get_first_free_bsscfgidx(ifp->drvr);
519 520 521 522 523 524 525 526 527 528
	if (bsscfgidx < 0)
		return bsscfgidx;

	mbss_ssid_le.bsscfgidx = cpu_to_le32(bsscfgidx);
	mbss_ssid_le.SSID_len = cpu_to_le32(5);
	sprintf(mbss_ssid_le.SSID, "ssid%d" , bsscfgidx);

	err = brcmf_fil_bsscfg_data_set(ifp, "bsscfg:ssid", &mbss_ssid_le,
					sizeof(mbss_ssid_le));
	if (err < 0)
529
		bphy_err(drvr, "setting ssid failed %d\n", err);
530 531 532 533 534 535 536 537 538 539 540 541 542

	return err;
}

/**
 * brcmf_ap_add_vif() - create a new AP virtual interface for multiple BSS
 *
 * @wiphy: wiphy device of new interface.
 * @name: name of the new interface.
 * @params: contains mac address for AP device.
 */
static
struct wireless_dev *brcmf_ap_add_vif(struct wiphy *wiphy, const char *name,
543
				      struct vif_params *params)
544 545 546
{
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
	struct brcmf_if *ifp = netdev_priv(cfg_to_ndev(cfg));
547
	struct brcmf_pub *drvr = cfg->pub;
548 549 550 551 552 553 554 555
	struct brcmf_cfg80211_vif *vif;
	int err;

	if (brcmf_cfg80211_vif_event_armed(cfg))
		return ERR_PTR(-EBUSY);

	brcmf_dbg(INFO, "Adding vif \"%s\"\n", name);

556
	vif = brcmf_alloc_vif(cfg, NL80211_IFTYPE_AP);
557 558 559 560 561 562 563 564 565 566 567 568
	if (IS_ERR(vif))
		return (struct wireless_dev *)vif;

	brcmf_cfg80211_arm_vif_event(cfg, vif);

	err = brcmf_cfg80211_request_ap_if(ifp);
	if (err) {
		brcmf_cfg80211_arm_vif_event(cfg, NULL);
		goto fail;
	}

	/* wait for firmware event */
569 570
	err = brcmf_cfg80211_wait_vif_event(cfg, BRCMF_E_IF_ADD,
					    BRCMF_VIF_EVENT_TIMEOUT);
571 572
	brcmf_cfg80211_arm_vif_event(cfg, NULL);
	if (!err) {
573
		bphy_err(drvr, "timeout occurred\n");
574 575 576 577 578 579 580
		err = -EIO;
		goto fail;
	}

	/* interface created in firmware */
	ifp = vif->ifp;
	if (!ifp) {
581
		bphy_err(drvr, "no if pointer provided\n");
582 583 584 585 586 587 588
		err = -ENOENT;
		goto fail;
	}

	strncpy(ifp->ndev->name, name, sizeof(ifp->ndev->name) - 1);
	err = brcmf_net_attach(ifp, true);
	if (err) {
589
		bphy_err(drvr, "Registering netdevice failed\n");
590
		free_netdev(ifp->ndev);
591 592 593 594 595 596 597 598 599 600
		goto fail;
	}

	return &ifp->vif->wdev;

fail:
	brcmf_free_vif(vif);
	return ERR_PTR(err);
}

601 602 603 604 605 606 607 608 609 610 611 612 613
static bool brcmf_is_apmode(struct brcmf_cfg80211_vif *vif)
{
	enum nl80211_iftype iftype;

	iftype = vif->wdev.iftype;
	return iftype == NL80211_IFTYPE_AP || iftype == NL80211_IFTYPE_P2P_GO;
}

static bool brcmf_is_ibssmode(struct brcmf_cfg80211_vif *vif)
{
	return vif->wdev.iftype == NL80211_IFTYPE_ADHOC;
}

614 615
static struct wireless_dev *brcmf_cfg80211_add_iface(struct wiphy *wiphy,
						     const char *name,
616
						     unsigned char name_assign_type,
617 618 619
						     enum nl80211_iftype type,
						     struct vif_params *params)
{
620 621
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
	struct brcmf_pub *drvr = cfg->pub;
622
	struct wireless_dev *wdev;
623
	int err;
624

625
	brcmf_dbg(TRACE, "enter: %s type %d\n", name, type);
626 627
	err = brcmf_vif_add_validate(wiphy_to_cfg(wiphy), type);
	if (err) {
628
		bphy_err(drvr, "iface validation failed: err=%d\n", err);
629 630
		return ERR_PTR(err);
	}
631 632 633 634 635 636 637 638
	switch (type) {
	case NL80211_IFTYPE_ADHOC:
	case NL80211_IFTYPE_STATION:
	case NL80211_IFTYPE_AP_VLAN:
	case NL80211_IFTYPE_WDS:
	case NL80211_IFTYPE_MONITOR:
	case NL80211_IFTYPE_MESH_POINT:
		return ERR_PTR(-EOPNOTSUPP);
639
	case NL80211_IFTYPE_AP:
640
		wdev = brcmf_ap_add_vif(wiphy, name, params);
641
		break;
642 643
	case NL80211_IFTYPE_P2P_CLIENT:
	case NL80211_IFTYPE_P2P_GO:
644
	case NL80211_IFTYPE_P2P_DEVICE:
645
		wdev = brcmf_p2p_add_vif(wiphy, name, name_assign_type, type, params);
646
		break;
647 648 649 650
	case NL80211_IFTYPE_UNSPECIFIED:
	default:
		return ERR_PTR(-EINVAL);
	}
651 652

	if (IS_ERR(wdev))
653
		bphy_err(drvr, "add iface %s type %d failed: err=%d\n", name,
654
			 type, (int)PTR_ERR(wdev));
655 656 657 658
	else
		brcmf_cfg80211_update_proto_addr_mode(wdev);

	return wdev;
659 660
}

661 662
static void brcmf_scan_config_mpc(struct brcmf_if *ifp, int mpc)
{
663
	if (brcmf_feat_is_quirk_enabled(ifp, BRCMF_FEAT_QUIRK_NEED_MPC))
664 665 666
		brcmf_set_mpc(ifp, mpc);
}

667
void brcmf_set_mpc(struct brcmf_if *ifp, int mpc)
668
{
669
	struct brcmf_pub *drvr = ifp->drvr;
670 671 672 673 674
	s32 err = 0;

	if (check_vif_up(ifp->vif)) {
		err = brcmf_fil_iovar_int_set(ifp, "mpc", mpc);
		if (err) {
675
			bphy_err(drvr, "fail to set mpc\n");
676 677 678 679 680 681
			return;
		}
		brcmf_dbg(INFO, "MPC : %d\n", mpc);
	}
}

682 683 684
s32 brcmf_notify_escan_complete(struct brcmf_cfg80211_info *cfg,
				struct brcmf_if *ifp, bool aborted,
				bool fw_abort)
685
{
686
	struct brcmf_pub *drvr = cfg->pub;
687 688
	struct brcmf_scan_params_le params_le;
	struct cfg80211_scan_request *scan_request;
689 690
	u64 reqid;
	u32 bucket;
691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706
	s32 err = 0;

	brcmf_dbg(SCAN, "Enter\n");

	/* clear scan request, because the FW abort can cause a second call */
	/* to this functon and might cause a double cfg80211_scan_done      */
	scan_request = cfg->scan_request;
	cfg->scan_request = NULL;

	if (timer_pending(&cfg->escan_timeout))
		del_timer_sync(&cfg->escan_timeout);

	if (fw_abort) {
		/* Do a scan abort to stop the driver's scan engine */
		brcmf_dbg(SCAN, "ABORT scan in firmware\n");
		memset(&params_le, 0, sizeof(params_le));
707
		eth_broadcast_addr(params_le.bssid);
708 709 710 711 712 713 714 715 716 717
		params_le.bss_type = DOT11_BSSTYPE_ANY;
		params_le.scan_type = 0;
		params_le.channel_num = cpu_to_le32(1);
		params_le.nprobes = cpu_to_le32(1);
		params_le.active_time = cpu_to_le32(-1);
		params_le.passive_time = cpu_to_le32(-1);
		params_le.home_time = cpu_to_le32(-1);
		/* Scan is aborted by setting channel_list[0] to -1 */
		params_le.channel_list[0] = cpu_to_le16(-1);
		/* E-Scan (or anyother type) can be aborted by SCAN */
718
		err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SCAN,
719 720
					     &params_le, sizeof(params_le));
		if (err)
721
			bphy_err(drvr, "Scan abort failed\n");
722
	}
723

724
	brcmf_scan_config_mpc(ifp, 1);
725

726
	/*
727
	 * e-scan can be initiated internally
728 729
	 * which takes precedence.
	 */
730 731 732 733 734 735 736 737 738 739 740 741 742 743 744
	if (cfg->int_escan_map) {
		brcmf_dbg(SCAN, "scheduled scan completed (%x)\n",
			  cfg->int_escan_map);
		while (cfg->int_escan_map) {
			bucket = __ffs(cfg->int_escan_map);
			cfg->int_escan_map &= ~BIT(bucket);
			reqid = brcmf_pno_find_reqid_by_bucket(cfg->pno,
							       bucket);
			if (!aborted) {
				brcmf_dbg(SCAN, "report results: reqid=%llu\n",
					  reqid);
				cfg80211_sched_scan_results(cfg_to_wiphy(cfg),
							    reqid);
			}
		}
745
	} else if (scan_request) {
746 747 748 749
		struct cfg80211_scan_info info = {
			.aborted = aborted,
		};

750 751
		brcmf_dbg(SCAN, "ESCAN Completed scan: %s\n",
			  aborted ? "Aborted" : "Done");
752
		cfg80211_scan_done(scan_request, &info);
753
	}
754 755
	if (!test_and_clear_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status))
		brcmf_dbg(SCAN, "Scan complete, probably P2P scan\n");
756 757 758 759

	return err;
}

760 761 762
static int brcmf_cfg80211_del_ap_iface(struct wiphy *wiphy,
				       struct wireless_dev *wdev)
{
763
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
764 765
	struct net_device *ndev = wdev->netdev;
	struct brcmf_if *ifp = netdev_priv(ndev);
766
	struct brcmf_pub *drvr = cfg->pub;
767 768 769 770 771 772 773
	int ret;
	int err;

	brcmf_cfg80211_arm_vif_event(cfg, ifp->vif);

	err = brcmf_fil_bsscfg_data_set(ifp, "interface_remove", NULL, 0);
	if (err) {
774
		bphy_err(drvr, "interface_remove failed %d\n", err);
775 776 777 778 779 780 781
		goto err_unarm;
	}

	/* wait for firmware event */
	ret = brcmf_cfg80211_wait_vif_event(cfg, BRCMF_E_IF_DEL,
					    BRCMF_VIF_EVENT_TIMEOUT);
	if (!ret) {
782
		bphy_err(drvr, "timeout occurred\n");
783 784 785 786 787 788 789 790 791 792 793
		err = -EIO;
		goto err_unarm;
	}

	brcmf_remove_interface(ifp, true);

err_unarm:
	brcmf_cfg80211_arm_vif_event(cfg, NULL);
	return err;
}

794 795 796
static
int brcmf_cfg80211_del_iface(struct wiphy *wiphy, struct wireless_dev *wdev)
{
797
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
798 799
	struct net_device *ndev = wdev->netdev;

800 801 802
	if (ndev && ndev == cfg_to_ndev(cfg))
		return -ENOTSUPP;

803 804 805 806 807 808
	/* vif event pending in firmware */
	if (brcmf_cfg80211_vif_event_armed(cfg))
		return -EBUSY;

	if (ndev) {
		if (test_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status) &&
809 810 811
		    cfg->escan_info.ifp == netdev_priv(ndev))
			brcmf_notify_escan_complete(cfg, netdev_priv(ndev),
						    true, true);
812 813 814 815

		brcmf_fil_iovar_int_set(netdev_priv(ndev), "mpc", 1);
	}

816 817 818 819 820 821 822 823
	switch (wdev->iftype) {
	case NL80211_IFTYPE_ADHOC:
	case NL80211_IFTYPE_STATION:
	case NL80211_IFTYPE_AP_VLAN:
	case NL80211_IFTYPE_WDS:
	case NL80211_IFTYPE_MONITOR:
	case NL80211_IFTYPE_MESH_POINT:
		return -EOPNOTSUPP;
824 825
	case NL80211_IFTYPE_AP:
		return brcmf_cfg80211_del_ap_iface(wiphy, wdev);
826 827
	case NL80211_IFTYPE_P2P_CLIENT:
	case NL80211_IFTYPE_P2P_GO:
828
	case NL80211_IFTYPE_P2P_DEVICE:
829 830 831 832 833 834 835 836
		return brcmf_p2p_del_vif(wiphy, wdev);
	case NL80211_IFTYPE_UNSPECIFIED:
	default:
		return -EINVAL;
	}
	return -EOPNOTSUPP;
}

837 838
static s32
brcmf_cfg80211_change_iface(struct wiphy *wiphy, struct net_device *ndev,
839
			 enum nl80211_iftype type,
840 841
			 struct vif_params *params)
{
842
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
843
	struct brcmf_if *ifp = netdev_priv(ndev);
844
	struct brcmf_cfg80211_vif *vif = ifp->vif;
845
	struct brcmf_pub *drvr = cfg->pub;
846
	s32 infra = 0;
847
	s32 ap = 0;
848 849
	s32 err = 0;

850 851
	brcmf_dbg(TRACE, "Enter, bsscfgidx=%d, type=%d\n", ifp->bsscfgidx,
		  type);
852 853 854 855 856 857 858 859 860 861 862 863 864 865 866 867 868 869 870 871 872 873 874 875 876 877 878 879 880 881 882

	/* WAR: There are a number of p2p interface related problems which
	 * need to be handled initially (before doing the validate).
	 * wpa_supplicant tends to do iface changes on p2p device/client/go
	 * which are not always possible/allowed. However we need to return
	 * OK otherwise the wpa_supplicant wont start. The situation differs
	 * on configuration and setup (p2pon=1 module param). The first check
	 * is to see if the request is a change to station for p2p iface.
	 */
	if ((type == NL80211_IFTYPE_STATION) &&
	    ((vif->wdev.iftype == NL80211_IFTYPE_P2P_CLIENT) ||
	     (vif->wdev.iftype == NL80211_IFTYPE_P2P_GO) ||
	     (vif->wdev.iftype == NL80211_IFTYPE_P2P_DEVICE))) {
		brcmf_dbg(TRACE, "Ignoring cmd for p2p if\n");
		/* Now depending on whether module param p2pon=1 was used the
		 * response needs to be either 0 or EOPNOTSUPP. The reason is
		 * that if p2pon=1 is used, but a newer supplicant is used then
		 * we should return an error, as this combination wont work.
		 * In other situations 0 is returned and supplicant will start
		 * normally. It will give a trace in cfg80211, but it is the
		 * only way to get it working. Unfortunately this will result
		 * in situation where we wont support new supplicant in
		 * combination with module param p2pon=1, but that is the way
		 * it is. If the user tries this then unloading of driver might
		 * fail/lock.
		 */
		if (cfg->p2p.p2pdev_dynamically)
			return -EOPNOTSUPP;
		else
			return 0;
	}
883 884
	err = brcmf_vif_change_validate(wiphy_to_cfg(wiphy), vif, type);
	if (err) {
885
		bphy_err(drvr, "iface validation failed: err=%d\n", err);
886 887
		return err;
	}
888 889 890
	switch (type) {
	case NL80211_IFTYPE_MONITOR:
	case NL80211_IFTYPE_WDS:
891
		bphy_err(drvr, "type (%d) : currently we do not support this type\n",
892
			 type);
893 894 895 896 897 898 899
		return -EOPNOTSUPP;
	case NL80211_IFTYPE_ADHOC:
		infra = 0;
		break;
	case NL80211_IFTYPE_STATION:
		infra = 1;
		break;
900
	case NL80211_IFTYPE_AP:
901
	case NL80211_IFTYPE_P2P_GO:
902 903
		ap = 1;
		break;
904 905 906 907 908
	default:
		err = -EINVAL;
		goto done;
	}

909
	if (ap) {
910 911 912 913 914 915 916
		if (type == NL80211_IFTYPE_P2P_GO) {
			brcmf_dbg(INFO, "IF Type = P2P GO\n");
			err = brcmf_p2p_ifchange(cfg, BRCMF_FIL_P2P_IF_GO);
		}
		if (!err) {
			brcmf_dbg(INFO, "IF Type = AP\n");
		}
917
	} else {
918
		err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_INFRA, infra);
919
		if (err) {
920
			bphy_err(drvr, "WLC_SET_INFRA error (%d)\n", err);
921 922 923
			err = -EAGAIN;
			goto done;
		}
924
		brcmf_dbg(INFO, "IF Type = %s\n", brcmf_is_ibssmode(vif) ?
925
			  "Adhoc" : "Infra");
926
	}
927
	ndev->ieee80211_ptr->iftype = type;
928

929 930
	brcmf_cfg80211_update_proto_addr_mode(&vif->wdev);

931
done:
932
	brcmf_dbg(TRACE, "Exit\n");
933 934 935 936

	return err;
}

937 938
static void brcmf_escan_prep(struct brcmf_cfg80211_info *cfg,
			     struct brcmf_scan_params_le *params_le,
939 940 941 942 943 944
			     struct cfg80211_scan_request *request)
{
	u32 n_ssids;
	u32 n_channels;
	s32 i;
	s32 offset;
945
	u16 chanspec;
946
	char *ptr;
947
	struct brcmf_ssid_le ssid_le;
948

949
	eth_broadcast_addr(params_le->bssid);
950
	params_le->bss_type = DOT11_BSSTYPE_ANY;
951
	params_le->scan_type = BRCMF_SCANTYPE_ACTIVE;
952 953 954 955 956 957 958 959 960
	params_le->channel_num = 0;
	params_le->nprobes = cpu_to_le32(-1);
	params_le->active_time = cpu_to_le32(-1);
	params_le->passive_time = cpu_to_le32(-1);
	params_le->home_time = cpu_to_le32(-1);
	memset(&params_le->ssid_le, 0, sizeof(params_le->ssid_le));

	n_ssids = request->n_ssids;
	n_channels = request->n_channels;
961

962
	/* Copy channel array if applicable */
963 964
	brcmf_dbg(SCAN, "### List of channelspecs to scan ### %d\n",
		  n_channels);
965 966
	if (n_channels > 0) {
		for (i = 0; i < n_channels; i++) {
967 968
			chanspec = channel_to_chanspec(&cfg->d11inf,
						       request->channels[i]);
969 970
			brcmf_dbg(SCAN, "Chan : %d, Channel spec: %x\n",
				  request->channels[i]->hw_value, chanspec);
971
			params_le->channel_list[i] = cpu_to_le16(chanspec);
972 973
		}
	} else {
974
		brcmf_dbg(SCAN, "Scanning all channels\n");
975 976
	}
	/* Copy ssid array if applicable */
977
	brcmf_dbg(SCAN, "### List of SSIDs to scan ### %d\n", n_ssids);
978 979 980 981 982 983
	if (n_ssids > 0) {
		offset = offsetof(struct brcmf_scan_params_le, channel_list) +
				n_channels * sizeof(u16);
		offset = roundup(offset, sizeof(u32));
		ptr = (char *)params_le + offset;
		for (i = 0; i < n_ssids; i++) {
984 985 986 987 988 989
			memset(&ssid_le, 0, sizeof(ssid_le));
			ssid_le.SSID_len =
					cpu_to_le32(request->ssids[i].ssid_len);
			memcpy(ssid_le.SSID, request->ssids[i].ssid,
			       request->ssids[i].ssid_len);
			if (!ssid_le.SSID_len)
990
				brcmf_dbg(SCAN, "%d: Broadcast scan\n", i);
991
			else
992
				brcmf_dbg(SCAN, "%d: scan for  %.32s size=%d\n",
993
					  i, ssid_le.SSID, ssid_le.SSID_len);
994 995
			memcpy(ptr, &ssid_le, sizeof(ssid_le));
			ptr += sizeof(ssid_le);
996 997
		}
	} else {
998 999
		brcmf_dbg(SCAN, "Performing passive scan\n");
		params_le->scan_type = BRCMF_SCANTYPE_PASSIVE;
1000 1001 1002 1003 1004 1005 1006 1007
	}
	/* Adding mask to channel numbers */
	params_le->channel_num =
		cpu_to_le32((n_ssids << BRCMF_SCAN_PARAMS_NSSID_SHIFT) |
			(n_channels & BRCMF_SCAN_PARAMS_COUNT_MASK));
}

static s32
1008
brcmf_run_escan(struct brcmf_cfg80211_info *cfg, struct brcmf_if *ifp,
1009
		struct cfg80211_scan_request *request)
1010
{
1011
	struct brcmf_pub *drvr = cfg->pub;
1012 1013 1014 1015 1016
	s32 params_size = BRCMF_SCAN_PARAMS_FIXED_SIZE +
			  offsetof(struct brcmf_escan_params_le, params_le);
	struct brcmf_escan_params_le *params;
	s32 err = 0;

1017
	brcmf_dbg(SCAN, "E-SCAN START\n");
1018 1019 1020 1021 1022 1023

	if (request != NULL) {
		/* Allocate space for populating ssids in struct */
		params_size += sizeof(u32) * ((request->n_channels + 1) / 2);

		/* Allocate space for populating ssids in struct */
1024
		params_size += sizeof(struct brcmf_ssid_le) * request->n_ssids;
1025 1026 1027 1028 1029 1030 1031 1032
	}

	params = kzalloc(params_size, GFP_KERNEL);
	if (!params) {
		err = -ENOMEM;
		goto exit;
	}
	BUG_ON(params_size + sizeof("escan") >= BRCMF_DCMD_MEDLEN);
1033
	brcmf_escan_prep(cfg, &params->params_le, request);
1034
	params->version = cpu_to_le32(BRCMF_ESCAN_REQ_VERSION);
1035
	params->action = cpu_to_le16(WL_ESCAN_ACTION_START);
1036 1037
	params->sync_id = cpu_to_le16(0x1234);

1038
	err = brcmf_fil_iovar_data_set(ifp, "escan", params, params_size);
1039 1040
	if (err) {
		if (err == -EBUSY)
1041
			brcmf_dbg(INFO, "system busy : escan canceled\n");
1042
		else
1043
			bphy_err(drvr, "error (%d)\n", err);
1044 1045 1046 1047 1048 1049 1050 1051
	}

	kfree(params);
exit:
	return err;
}

static s32
1052
brcmf_do_escan(struct brcmf_if *ifp, struct cfg80211_scan_request *request)
1053
{
1054
	struct brcmf_cfg80211_info *cfg = ifp->drvr->config;
1055 1056
	s32 err;
	struct brcmf_scan_results *results;
1057
	struct escan_info *escan = &cfg->escan_info;
1058

1059
	brcmf_dbg(SCAN, "Enter\n");
1060
	escan->ifp = ifp;
1061
	escan->wiphy = cfg->wiphy;
1062
	escan->escan_state = WL_ESCAN_STATE_SCANNING;
1063

1064
	brcmf_scan_config_mpc(ifp, 0);
1065
	results = (struct brcmf_scan_results *)cfg->escan_info.escan_buf;
1066 1067 1068 1069
	results->version = 0;
	results->count = 0;
	results->buflen = WL_ESCAN_RESULTS_FIXED_SIZE;

1070
	err = escan->run(cfg, ifp, request);
1071
	if (err)
1072
		brcmf_scan_config_mpc(ifp, 1);
1073 1074 1075 1076
	return err;
}

static s32
1077
brcmf_cfg80211_scan(struct wiphy *wiphy, struct cfg80211_scan_request *request)
1078
{
1079
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
1080
	struct brcmf_pub *drvr = cfg->pub;
1081 1082
	struct brcmf_cfg80211_vif *vif;
	s32 err = 0;
1083

1084 1085 1086 1087
	brcmf_dbg(TRACE, "Enter\n");
	vif = container_of(request->wdev, struct brcmf_cfg80211_vif, wdev);
	if (!check_vif_up(vif))
		return -EIO;
1088

1089
	if (test_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status)) {
1090
		bphy_err(drvr, "Scanning already: status (%lu)\n",
1091
			 cfg->scan_status);
1092 1093
		return -EAGAIN;
	}
1094
	if (test_bit(BRCMF_SCAN_STATUS_ABORT, &cfg->scan_status)) {
1095
		bphy_err(drvr, "Scanning being aborted: status (%lu)\n",
1096
			 cfg->scan_status);
1097 1098
		return -EAGAIN;
	}
1099
	if (test_bit(BRCMF_SCAN_STATUS_SUPPRESS, &cfg->scan_status)) {
1100
		bphy_err(drvr, "Scanning suppressed: status (%lu)\n",
1101
			 cfg->scan_status);
1102 1103
		return -EAGAIN;
	}
1104
	if (test_bit(BRCMF_VIF_STATUS_CONNECTING, &vif->sme_state)) {
1105
		bphy_err(drvr, "Connecting: status (%lu)\n", vif->sme_state);
1106 1107 1108
		return -EAGAIN;
	}

1109
	/* If scan req comes for p2p0, send it over primary I/F */
1110 1111
	if (vif == cfg->p2p.bss_idx[P2PAPI_BSSCFG_DEVICE].vif)
		vif = cfg->p2p.bss_idx[P2PAPI_BSSCFG_PRIMARY].vif;
1112

1113 1114
	brcmf_dbg(SCAN, "START ESCAN\n");

1115
	cfg->scan_request = request;
1116
	set_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status);
1117

1118 1119 1120 1121
	cfg->escan_info.run = brcmf_run_escan;
	err = brcmf_p2p_scan_prep(wiphy, request, vif);
	if (err)
		goto scan_out;
1122

1123 1124 1125 1126 1127
	err = brcmf_vif_set_mgmt_ie(vif, BRCMF_VNDR_IE_PRBREQ_FLAG,
				    request->ie, request->ie_len);
	if (err)
		goto scan_out;

1128 1129 1130
	err = brcmf_do_escan(vif->ifp, request);
	if (err)
		goto scan_out;
1131

1132
	/* Arm scan timeout timer */
1133 1134
	mod_timer(&cfg->escan_timeout,
		  jiffies + msecs_to_jiffies(BRCMF_ESCAN_TIMER_INTERVAL_MS));
1135

1136 1137 1138
	return 0;

scan_out:
1139
	bphy_err(drvr, "scan error (%d)\n", err);
1140
	clear_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status);
1141
	cfg->scan_request = NULL;
1142 1143 1144
	return err;
}

1145 1146
static s32 brcmf_set_rts(struct net_device *ndev, u32 rts_threshold)
{
1147
	struct brcmf_if *ifp = netdev_priv(ndev);
1148
	struct brcmf_pub *drvr = ifp->drvr;
1149 1150
	s32 err = 0;

1151
	err = brcmf_fil_iovar_int_set(ifp, "rtsthresh", rts_threshold);
1152
	if (err)
1153
		bphy_err(drvr, "Error (%d)\n", err);
1154 1155 1156 1157 1158 1159

	return err;
}

static s32 brcmf_set_frag(struct net_device *ndev, u32 frag_threshold)
{
1160
	struct brcmf_if *ifp = netdev_priv(ndev);
1161
	struct brcmf_pub *drvr = ifp->drvr;
1162 1163
	s32 err = 0;

1164
	err = brcmf_fil_iovar_int_set(ifp, "fragthresh",
1165
				      frag_threshold);
1166
	if (err)
1167
		bphy_err(drvr, "Error (%d)\n", err);
1168 1169 1170 1171 1172 1173

	return err;
}

static s32 brcmf_set_retry(struct net_device *ndev, u32 retry, bool l)
{
1174
	struct brcmf_if *ifp = netdev_priv(ndev);
1175
	struct brcmf_pub *drvr = ifp->drvr;
1176
	s32 err = 0;
Hante Meuleman's avatar
Hante Meuleman committed
1177
	u32 cmd = (l ? BRCMF_C_SET_LRL : BRCMF_C_SET_SRL);
1178

1179
	err = brcmf_fil_cmd_int_set(ifp, cmd, retry);
1180
	if (err) {
1181
		bphy_err(drvr, "cmd (%d) , error (%d)\n", cmd, err);
1182 1183 1184 1185 1186 1187 1188
		return err;
	}
	return err;
}

static s32 brcmf_cfg80211_set_wiphy_params(struct wiphy *wiphy, u32 changed)
{
1189 1190
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
	struct net_device *ndev = cfg_to_ndev(cfg);
1191
	struct brcmf_if *ifp = netdev_priv(ndev);
1192 1193
	s32 err = 0;

1194
	brcmf_dbg(TRACE, "Enter\n");
1195
	if (!check_vif_up(ifp->vif))
1196 1197 1198
		return -EIO;

	if (changed & WIPHY_PARAM_RTS_THRESHOLD &&
1199 1200 1201
	    (cfg->conf->rts_threshold != wiphy->rts_threshold)) {
		cfg->conf->rts_threshold = wiphy->rts_threshold;
		err = brcmf_set_rts(ndev, cfg->conf->rts_threshold);
1202 1203 1204 1205
		if (!err)
			goto done;
	}
	if (changed & WIPHY_PARAM_FRAG_THRESHOLD &&
1206 1207 1208
	    (cfg->conf->frag_threshold != wiphy->frag_threshold)) {
		cfg->conf->frag_threshold = wiphy->frag_threshold;
		err = brcmf_set_frag(ndev, cfg->conf->frag_threshold);
1209 1210 1211 1212
		if (!err)
			goto done;
	}
	if (changed & WIPHY_PARAM_RETRY_LONG
1213 1214 1215
	    && (cfg->conf->retry_long != wiphy->retry_long)) {
		cfg->conf->retry_long = wiphy->retry_long;
		err = brcmf_set_retry(ndev, cfg->conf->retry_long, true);
1216 1217 1218 1219
		if (!err)
			goto done;
	}
	if (changed & WIPHY_PARAM_RETRY_SHORT
1220 1221 1222
	    && (cfg->conf->retry_short != wiphy->retry_short)) {
		cfg->conf->retry_short = wiphy->retry_short;
		err = brcmf_set_retry(ndev, cfg->conf->retry_short, false);
1223 1224 1225 1226 1227
		if (!err)
			goto done;
	}

done:
1228
	brcmf_dbg(TRACE, "Exit\n");
1229 1230 1231 1232 1233 1234 1235 1236
	return err;
}

static void brcmf_init_prof(struct brcmf_cfg80211_profile *prof)
{
	memset(prof, 0, sizeof(*prof));
}

1237 1238 1239 1240 1241 1242 1243 1244 1245 1246 1247 1248 1249 1250 1251 1252 1253 1254
static u16 brcmf_map_fw_linkdown_reason(const struct brcmf_event_msg *e)
{
	u16 reason;

	switch (e->event_code) {
	case BRCMF_E_DEAUTH:
	case BRCMF_E_DEAUTH_IND:
	case BRCMF_E_DISASSOC_IND:
		reason = e->reason;
		break;
	case BRCMF_E_LINK:
	default:
		reason = 0;
		break;
	}
	return reason;
}

1255 1256
static int brcmf_set_pmk(struct brcmf_if *ifp, const u8 *pmk_data, u16 pmk_len)
{
1257
	struct brcmf_pub *drvr = ifp->drvr;
1258 1259 1260 1261 1262 1263 1264 1265 1266 1267 1268 1269 1270
	struct brcmf_wsec_pmk_le pmk;
	int i, err;

	/* convert to firmware key format */
	pmk.key_len = cpu_to_le16(pmk_len << 1);
	pmk.flags = cpu_to_le16(BRCMF_WSEC_PASSPHRASE);
	for (i = 0; i < pmk_len; i++)
		snprintf(&pmk.key[2 * i], 3, "%02x", pmk_data[i]);

	/* store psk in firmware */
	err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_WSEC_PMK,
				     &pmk, sizeof(pmk));
	if (err < 0)
1271
		bphy_err(drvr, "failed to change PSK in firmware (len=%u)\n",
1272
			 pmk_len);
1273 1274 1275 1276

	return err;
}

1277
static void brcmf_link_down(struct brcmf_cfg80211_vif *vif, u16 reason)
1278
{
1279
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(vif->wdev.wiphy);
1280
	struct brcmf_pub *drvr = cfg->pub;
1281 1282
	s32 err = 0;

1283
	brcmf_dbg(TRACE, "Enter\n");
1284

Hante Meuleman's avatar
Hante Meuleman committed
1285
	if (test_and_clear_bit(BRCMF_VIF_STATUS_CONNECTED, &vif->sme_state)) {
1286
		brcmf_dbg(INFO, "Call WLC_DISASSOC to stop excess roaming\n");
1287
		err = brcmf_fil_cmd_data_set(vif->ifp,
1288
					     BRCMF_C_DISASSOC, NULL, 0);
1289
		if (err) {
1290
			bphy_err(drvr, "WLC_DISASSOC failed (%d)\n", err);
1291
		}
Hante Meuleman's avatar
Hante Meuleman committed
1292 1293 1294 1295
		if ((vif->wdev.iftype == NL80211_IFTYPE_STATION) ||
		    (vif->wdev.iftype == NL80211_IFTYPE_P2P_CLIENT))
			cfg80211_disconnected(vif->wdev.netdev, reason, NULL, 0,
					      true, GFP_KERNEL);
1296
	}
1297
	clear_bit(BRCMF_VIF_STATUS_CONNECTING, &vif->sme_state);
1298 1299
	clear_bit(BRCMF_SCAN_STATUS_SUPPRESS, &cfg->scan_status);
	brcmf_btcoex_set_mode(vif, BRCMF_BTCOEX_ENABLED, 0);
1300 1301 1302 1303
	if (vif->profile.use_fwsup != BRCMF_PROFILE_FWSUP_NONE) {
		brcmf_set_pmk(vif->ifp, NULL, 0);
		vif->profile.use_fwsup = BRCMF_PROFILE_FWSUP_NONE;
	}
1304
	brcmf_dbg(TRACE, "Exit\n");
1305 1306 1307 1308 1309 1310
}

static s32
brcmf_cfg80211_join_ibss(struct wiphy *wiphy, struct net_device *ndev,
		      struct cfg80211_ibss_params *params)
{
1311
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
1312 1313
	struct brcmf_if *ifp = netdev_priv(ndev);
	struct brcmf_cfg80211_profile *profile = &ifp->vif->profile;
1314
	struct brcmf_pub *drvr = cfg->pub;
1315 1316 1317 1318 1319
	struct brcmf_join_params join_params;
	size_t join_params_size = 0;
	s32 err = 0;
	s32 wsec = 0;
	s32 bcnprd;
1320
	u16 chanspec;
1321
	u32 ssid_len;
1322

1323
	brcmf_dbg(TRACE, "Enter\n");
1324
	if (!check_vif_up(ifp->vif))
1325 1326 1327
		return -EIO;

	if (params->ssid)
1328
		brcmf_dbg(CONN, "SSID: %s\n", params->ssid);
1329
	else {
1330
		brcmf_dbg(CONN, "SSID: NULL, Not supported\n");
1331 1332 1333
		return -EOPNOTSUPP;
	}

1334
	set_bit(BRCMF_VIF_STATUS_CONNECTING, &ifp->vif->sme_state);
1335 1336

	if (params->bssid)
1337
		brcmf_dbg(CONN, "BSSID: %pM\n", params->bssid);
1338
	else
1339
		brcmf_dbg(CONN, "No BSSID specified\n");
1340

1341
	if (params->chandef.chan)
1342 1343
		brcmf_dbg(CONN, "channel: %d\n",
			  params->chandef.chan->center_freq);
1344
	else
1345
		brcmf_dbg(CONN, "no channel specified\n");
1346 1347

	if (params->channel_fixed)
1348
		brcmf_dbg(CONN, "fixed channel required\n");
1349
	else
1350
		brcmf_dbg(CONN, "no fixed channel required\n");
1351 1352

	if (params->ie && params->ie_len)
1353
		brcmf_dbg(CONN, "ie len: %d\n", params->ie_len);
1354
	else
1355
		brcmf_dbg(CONN, "no ie specified\n");
1356 1357

	if (params->beacon_interval)
1358 1359
		brcmf_dbg(CONN, "beacon interval: %d\n",
			  params->beacon_interval);
1360
	else
1361
		brcmf_dbg(CONN, "no beacon interval specified\n");
1362 1363

	if (params->basic_rates)
1364
		brcmf_dbg(CONN, "basic rates: %08X\n", params->basic_rates);
1365
	else
1366
		brcmf_dbg(CONN, "no basic rates specified\n");
1367 1368

	if (params->privacy)
1369
		brcmf_dbg(CONN, "privacy required\n");
1370
	else
1371
		brcmf_dbg(CONN, "no privacy required\n");
1372 1373 1374 1375 1376

	/* Configure Privacy for starter */
	if (params->privacy)
		wsec |= WEP_ENABLED;

1377
	err = brcmf_fil_iovar_int_set(ifp, "wsec", wsec);
1378
	if (err) {
1379
		bphy_err(drvr, "wsec failed (%d)\n", err);
1380 1381 1382 1383 1384 1385 1386 1387 1388
		goto done;
	}

	/* Configure Beacon Interval for starter */
	if (params->beacon_interval)
		bcnprd = params->beacon_interval;
	else
		bcnprd = 100;

Hante Meuleman's avatar
Hante Meuleman committed
1389
	err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_BCNPRD, bcnprd);
1390
	if (err) {
1391
		bphy_err(drvr, "WLC_SET_BCNPRD failed (%d)\n", err);
1392 1393 1394 1395 1396 1397 1398
		goto done;
	}

	/* Configure required join parameter */
	memset(&join_params, 0, sizeof(struct brcmf_join_params));

	/* SSID */
1399 1400 1401
	ssid_len = min_t(u32, params->ssid_len, IEEE80211_MAX_SSID_LEN);
	memcpy(join_params.ssid_le.SSID, params->ssid, ssid_len);
	join_params.ssid_le.SSID_len = cpu_to_le32(ssid_len);
1402 1403 1404 1405 1406
	join_params_size = sizeof(join_params.ssid_le);

	/* BSSID */
	if (params->bssid) {
		memcpy(join_params.params_le.bssid, params->bssid, ETH_ALEN);
1407
		join_params_size += BRCMF_ASSOC_PARAMS_FIXED_SIZE;
1408
		memcpy(profile->bssid, params->bssid, ETH_ALEN);
1409
	} else {
1410 1411
		eth_broadcast_addr(join_params.params_le.bssid);
		eth_zero_addr(profile->bssid);
1412 1413 1414
	}

	/* Channel */
1415
	if (params->chandef.chan) {
1416 1417
		u32 target_channel;

1418
		cfg->channel =
1419
			ieee80211_frequency_to_channel(
1420
				params->chandef.chan->center_freq);
1421 1422
		if (params->channel_fixed) {
			/* adding chanspec */
1423 1424
			chanspec = chandef_to_chanspec(&cfg->d11inf,
						       &params->chandef);
1425 1426 1427 1428
			join_params.params_le.chanspec_list[0] =
				cpu_to_le16(chanspec);
			join_params.params_le.chanspec_num = cpu_to_le32(1);
			join_params_size += sizeof(join_params.params_le);
1429 1430 1431
		}

		/* set channel for starter */
1432
		target_channel = cfg->channel;
Hante Meuleman's avatar
Hante Meuleman committed
1433
		err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_CHANNEL,
1434
					    target_channel);
1435
		if (err) {
1436
			bphy_err(drvr, "WLC_SET_CHANNEL failed (%d)\n", err);
1437 1438 1439
			goto done;
		}
	} else
1440
		cfg->channel = 0;
1441

1442
	cfg->ibss_starter = false;
1443 1444


1445
	err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_SSID,
1446
				     &join_params, join_params_size);
1447
	if (err) {
1448
		bphy_err(drvr, "WLC_SET_SSID failed (%d)\n", err);
1449 1450 1451 1452 1453
		goto done;
	}

done:
	if (err)
1454
		clear_bit(BRCMF_VIF_STATUS_CONNECTING, &ifp->vif->sme_state);
1455
	brcmf_dbg(TRACE, "Exit\n");
1456 1457 1458 1459 1460 1461
	return err;
}

static s32
brcmf_cfg80211_leave_ibss(struct wiphy *wiphy, struct net_device *ndev)
{
1462
	struct brcmf_if *ifp = netdev_priv(ndev);
1463

1464
	brcmf_dbg(TRACE, "Enter\n");
1465 1466 1467 1468 1469 1470 1471
	if (!check_vif_up(ifp->vif)) {
		/* When driver is being unloaded, it can end up here. If an
		 * error is returned then later on a debug trace in the wireless
		 * core module will be printed. To avoid this 0 is returned.
		 */
		return 0;
	}
1472

1473
	brcmf_link_down(ifp->vif, WLAN_REASON_DEAUTH_LEAVING);
1474
	brcmf_net_setcarrier(ifp, false);
1475

1476
	brcmf_dbg(TRACE, "Exit\n");
1477

1478
	return 0;
1479 1480 1481 1482 1483
}

static s32 brcmf_set_wpa_version(struct net_device *ndev,
				 struct cfg80211_connect_params *sme)
{
1484
	struct brcmf_if *ifp = netdev_priv(ndev);
1485
	struct brcmf_cfg80211_profile *profile = ndev_to_prof(ndev);
1486
	struct brcmf_pub *drvr = ifp->drvr;
1487 1488 1489 1490 1491 1492 1493 1494 1495 1496
	struct brcmf_cfg80211_security *sec;
	s32 val = 0;
	s32 err = 0;

	if (sme->crypto.wpa_versions & NL80211_WPA_VERSION_1)
		val = WPA_AUTH_PSK | WPA_AUTH_UNSPECIFIED;
	else if (sme->crypto.wpa_versions & NL80211_WPA_VERSION_2)
		val = WPA2_AUTH_PSK | WPA2_AUTH_UNSPECIFIED;
	else
		val = WPA_AUTH_DISABLED;
1497
	brcmf_dbg(CONN, "setting wpa_auth to 0x%0x\n", val);
1498
	err = brcmf_fil_bsscfg_int_set(ifp, "wpa_auth", val);
1499
	if (err) {
1500
		bphy_err(drvr, "set wpa_auth failed (%d)\n", err);
1501 1502
		return err;
	}
1503
	sec = &profile->sec;
1504 1505 1506 1507 1508 1509 1510
	sec->wpa_versions = sme->crypto.wpa_versions;
	return err;
}

static s32 brcmf_set_auth_type(struct net_device *ndev,
			       struct cfg80211_connect_params *sme)
{
1511
	struct brcmf_if *ifp = netdev_priv(ndev);
1512
	struct brcmf_cfg80211_profile *profile = ndev_to_prof(ndev);
1513
	struct brcmf_pub *drvr = ifp->drvr;
1514 1515 1516 1517 1518 1519 1520
	struct brcmf_cfg80211_security *sec;
	s32 val = 0;
	s32 err = 0;

	switch (sme->auth_type) {
	case NL80211_AUTHTYPE_OPEN_SYSTEM:
		val = 0;
1521
		brcmf_dbg(CONN, "open system\n");
1522 1523 1524
		break;
	case NL80211_AUTHTYPE_SHARED_KEY:
		val = 1;
1525
		brcmf_dbg(CONN, "shared key\n");
1526 1527 1528
		break;
	default:
		val = 2;
1529
		brcmf_dbg(CONN, "automatic, auth type (%d)\n", sme->auth_type);
1530 1531 1532
		break;
	}

1533
	err = brcmf_fil_bsscfg_int_set(ifp, "auth", val);
1534
	if (err) {
1535
		bphy_err(drvr, "set auth failed (%d)\n", err);
1536 1537
		return err;
	}
1538
	sec = &profile->sec;
1539 1540 1541 1542 1543
	sec->auth_type = sme->auth_type;
	return err;
}

static s32
1544
brcmf_set_wsec_mode(struct net_device *ndev,
1545
		    struct cfg80211_connect_params *sme)
1546
{
1547
	struct brcmf_if *ifp = netdev_priv(ndev);
1548
	struct brcmf_cfg80211_profile *profile = ndev_to_prof(ndev);
1549
	struct brcmf_pub *drvr = ifp->drvr;
1550 1551 1552
	struct brcmf_cfg80211_security *sec;
	s32 pval = 0;
	s32 gval = 0;
1553
	s32 wsec;
1554 1555 1556 1557 1558 1559 1560 1561 1562 1563 1564 1565 1566 1567 1568 1569 1570 1571
	s32 err = 0;

	if (sme->crypto.n_ciphers_pairwise) {
		switch (sme->crypto.ciphers_pairwise[0]) {
		case WLAN_CIPHER_SUITE_WEP40:
		case WLAN_CIPHER_SUITE_WEP104:
			pval = WEP_ENABLED;
			break;
		case WLAN_CIPHER_SUITE_TKIP:
			pval = TKIP_ENABLED;
			break;
		case WLAN_CIPHER_SUITE_CCMP:
			pval = AES_ENABLED;
			break;
		case WLAN_CIPHER_SUITE_AES_CMAC:
			pval = AES_ENABLED;
			break;
		default:
1572
			bphy_err(drvr, "invalid cipher pairwise (%d)\n",
1573
				 sme->crypto.ciphers_pairwise[0]);
1574 1575 1576 1577 1578 1579 1580 1581 1582 1583 1584 1585 1586 1587 1588 1589 1590 1591 1592
			return -EINVAL;
		}
	}
	if (sme->crypto.cipher_group) {
		switch (sme->crypto.cipher_group) {
		case WLAN_CIPHER_SUITE_WEP40:
		case WLAN_CIPHER_SUITE_WEP104:
			gval = WEP_ENABLED;
			break;
		case WLAN_CIPHER_SUITE_TKIP:
			gval = TKIP_ENABLED;
			break;
		case WLAN_CIPHER_SUITE_CCMP:
			gval = AES_ENABLED;
			break;
		case WLAN_CIPHER_SUITE_AES_CMAC:
			gval = AES_ENABLED;
			break;
		default:
1593
			bphy_err(drvr, "invalid cipher group (%d)\n",
1594
				 sme->crypto.cipher_group);
1595 1596 1597 1598
			return -EINVAL;
		}
	}

1599
	brcmf_dbg(CONN, "pval (%d) gval (%d)\n", pval, gval);
1600 1601 1602 1603 1604
	/* In case of privacy, but no security and WPS then simulate */
	/* setting AES. WPS-2.0 allows no security                   */
	if (brcmf_find_wpsie(sme->ie, sme->ie_len) && !pval && !gval &&
	    sme->privacy)
		pval = AES_ENABLED;
1605

1606
	wsec = pval | gval;
1607
	err = brcmf_fil_bsscfg_int_set(ifp, "wsec", wsec);
1608
	if (err) {
1609
		bphy_err(drvr, "error (%d)\n", err);
1610 1611 1612
		return err;
	}

1613
	sec = &profile->sec;
1614 1615 1616 1617 1618 1619 1620 1621 1622
	sec->cipher_pairwise = sme->crypto.ciphers_pairwise[0];
	sec->cipher_group = sme->crypto.cipher_group;

	return err;
}

static s32
brcmf_set_key_mgmt(struct net_device *ndev, struct cfg80211_connect_params *sme)
{
1623
	struct brcmf_if *ifp = netdev_priv(ndev);
1624
	struct brcmf_cfg80211_profile *profile = &ifp->vif->profile;
1625
	struct brcmf_pub *drvr = ifp->drvr;
1626 1627 1628 1629 1630 1631 1632 1633 1634
	s32 val;
	s32 err;
	const struct brcmf_tlv *rsn_ie;
	const u8 *ie;
	u32 ie_len;
	u32 offset;
	u16 rsn_cap;
	u32 mfp;
	u16 count;
1635

1636 1637
	profile->use_fwsup = BRCMF_PROFILE_FWSUP_NONE;

1638 1639 1640 1641 1642
	if (!sme->crypto.n_akm_suites)
		return 0;

	err = brcmf_fil_bsscfg_int_get(netdev_priv(ndev), "wpa_auth", &val);
	if (err) {
1643
		bphy_err(drvr, "could not get wpa_auth (%d)\n", err);
1644 1645 1646 1647 1648 1649
		return err;
	}
	if (val & (WPA_AUTH_PSK | WPA_AUTH_UNSPECIFIED)) {
		switch (sme->crypto.akm_suites[0]) {
		case WLAN_AKM_SUITE_8021X:
			val = WPA_AUTH_UNSPECIFIED;
1650 1651
			if (sme->want_1x)
				profile->use_fwsup = BRCMF_PROFILE_FWSUP_1X;
1652 1653 1654 1655 1656
			break;
		case WLAN_AKM_SUITE_PSK:
			val = WPA_AUTH_PSK;
			break;
		default:
1657
			bphy_err(drvr, "invalid cipher group (%d)\n",
1658
				 sme->crypto.cipher_group);
1659
			return -EINVAL;
1660
		}
1661 1662 1663 1664
	} else if (val & (WPA2_AUTH_PSK | WPA2_AUTH_UNSPECIFIED)) {
		switch (sme->crypto.akm_suites[0]) {
		case WLAN_AKM_SUITE_8021X:
			val = WPA2_AUTH_UNSPECIFIED;
1665 1666
			if (sme->want_1x)
				profile->use_fwsup = BRCMF_PROFILE_FWSUP_1X;
1667 1668 1669
			break;
		case WLAN_AKM_SUITE_8021X_SHA256:
			val = WPA2_AUTH_1X_SHA256;
1670 1671
			if (sme->want_1x)
				profile->use_fwsup = BRCMF_PROFILE_FWSUP_1X;
1672 1673 1674 1675 1676 1677 1678
			break;
		case WLAN_AKM_SUITE_PSK_SHA256:
			val = WPA2_AUTH_PSK_SHA256;
			break;
		case WLAN_AKM_SUITE_PSK:
			val = WPA2_AUTH_PSK;
			break;
1679 1680
		case WLAN_AKM_SUITE_FT_8021X:
			val = WPA2_AUTH_UNSPECIFIED | WPA2_AUTH_FT;
1681 1682
			if (sme->want_1x)
				profile->use_fwsup = BRCMF_PROFILE_FWSUP_1X;
1683 1684 1685 1686
			break;
		case WLAN_AKM_SUITE_FT_PSK:
			val = WPA2_AUTH_PSK | WPA2_AUTH_FT;
			break;
1687
		default:
1688
			bphy_err(drvr, "invalid cipher group (%d)\n",
1689
				 sme->crypto.cipher_group);
1690
			return -EINVAL;
1691
		}
1692
	}
1693

1694 1695 1696
	if (profile->use_fwsup == BRCMF_PROFILE_FWSUP_1X)
		brcmf_dbg(INFO, "using 1X offload\n");

1697 1698 1699 1700 1701 1702 1703 1704 1705 1706 1707 1708 1709 1710 1711 1712 1713 1714 1715 1716 1717 1718 1719 1720 1721 1722 1723 1724 1725 1726 1727 1728 1729 1730 1731 1732 1733 1734
	if (!brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MFP))
		goto skip_mfp_config;
	/* The MFP mode (1 or 2) needs to be determined, parse IEs. The
	 * IE will not be verified, just a quick search for MFP config
	 */
	rsn_ie = brcmf_parse_tlvs((const u8 *)sme->ie, sme->ie_len,
				  WLAN_EID_RSN);
	if (!rsn_ie)
		goto skip_mfp_config;
	ie = (const u8 *)rsn_ie;
	ie_len = rsn_ie->len + TLV_HDR_LEN;
	/* Skip unicast suite */
	offset = TLV_HDR_LEN + WPA_IE_VERSION_LEN + WPA_IE_MIN_OUI_LEN;
	if (offset + WPA_IE_SUITE_COUNT_LEN >= ie_len)
		goto skip_mfp_config;
	/* Skip multicast suite */
	count = ie[offset] + (ie[offset + 1] << 8);
	offset += WPA_IE_SUITE_COUNT_LEN + (count * WPA_IE_MIN_OUI_LEN);
	if (offset + WPA_IE_SUITE_COUNT_LEN >= ie_len)
		goto skip_mfp_config;
	/* Skip auth key management suite(s) */
	count = ie[offset] + (ie[offset + 1] << 8);
	offset += WPA_IE_SUITE_COUNT_LEN + (count * WPA_IE_MIN_OUI_LEN);
	if (offset + WPA_IE_SUITE_COUNT_LEN > ie_len)
		goto skip_mfp_config;
	/* Ready to read capabilities */
	mfp = BRCMF_MFP_NONE;
	rsn_cap = ie[offset] + (ie[offset + 1] << 8);
	if (rsn_cap & RSN_CAP_MFPR_MASK)
		mfp = BRCMF_MFP_REQUIRED;
	else if (rsn_cap & RSN_CAP_MFPC_MASK)
		mfp = BRCMF_MFP_CAPABLE;
	brcmf_fil_bsscfg_int_set(netdev_priv(ndev), "mfp", mfp);

skip_mfp_config:
	brcmf_dbg(CONN, "setting wpa_auth to %d\n", val);
	err = brcmf_fil_bsscfg_int_set(netdev_priv(ndev), "wpa_auth", val);
	if (err) {
1735
		bphy_err(drvr, "could not set wpa_auth (%d)\n", err);
1736
		return err;
1737 1738 1739 1740 1741 1742
	}

	return err;
}

static s32
1743 1744
brcmf_set_sharedkey(struct net_device *ndev,
		    struct cfg80211_connect_params *sme)
1745
{
1746
	struct brcmf_if *ifp = netdev_priv(ndev);
1747
	struct brcmf_pub *drvr = ifp->drvr;
1748
	struct brcmf_cfg80211_profile *profile = ndev_to_prof(ndev);
1749 1750 1751 1752 1753
	struct brcmf_cfg80211_security *sec;
	struct brcmf_wsec_key key;
	s32 val;
	s32 err = 0;

1754
	brcmf_dbg(CONN, "key len (%d)\n", sme->key_len);
1755

1756 1757 1758
	if (sme->key_len == 0)
		return 0;

1759
	sec = &profile->sec;
1760 1761
	brcmf_dbg(CONN, "wpa_versions 0x%x cipher_pairwise 0x%x\n",
		  sec->wpa_versions, sec->cipher_pairwise);
1762 1763 1764 1765

	if (sec->wpa_versions & (NL80211_WPA_VERSION_1 | NL80211_WPA_VERSION_2))
		return 0;

1766 1767 1768
	if (!(sec->cipher_pairwise &
	    (WLAN_CIPHER_SUITE_WEP40 | WLAN_CIPHER_SUITE_WEP104)))
		return 0;
1769

1770 1771 1772 1773
	memset(&key, 0, sizeof(key));
	key.len = (u32) sme->key_len;
	key.index = (u32) sme->key_idx;
	if (key.len > sizeof(key.data)) {
1774
		bphy_err(drvr, "Too long key length (%u)\n", key.len);
1775 1776 1777 1778 1779 1780 1781 1782 1783 1784 1785 1786
		return -EINVAL;
	}
	memcpy(key.data, sme->key, key.len);
	key.flags = BRCMF_PRIMARY_KEY;
	switch (sec->cipher_pairwise) {
	case WLAN_CIPHER_SUITE_WEP40:
		key.algo = CRYPTO_ALGO_WEP1;
		break;
	case WLAN_CIPHER_SUITE_WEP104:
		key.algo = CRYPTO_ALGO_WEP128;
		break;
	default:
1787
		bphy_err(drvr, "Invalid algorithm (%d)\n",
1788
			 sme->crypto.ciphers_pairwise[0]);
1789 1790 1791
		return -EINVAL;
	}
	/* Set the new key/index */
1792 1793 1794
	brcmf_dbg(CONN, "key length (%d) key index (%d) algo (%d)\n",
		  key.len, key.index, key.algo);
	brcmf_dbg(CONN, "key \"%s\"\n", key.data);
1795
	err = send_key_to_dongle(ifp, &key);
1796 1797 1798 1799
	if (err)
		return err;

	if (sec->auth_type == NL80211_AUTHTYPE_SHARED_KEY) {
1800
		brcmf_dbg(CONN, "set auth_type to shared key\n");
1801
		val = WL_AUTH_SHARED_KEY;	/* shared key */
1802
		err = brcmf_fil_bsscfg_int_set(ifp, "auth", val);
1803
		if (err)
1804
			bphy_err(drvr, "set auth failed (%d)\n", err);
1805 1806 1807 1808
	}
	return err;
}

1809 1810 1811 1812
static
enum nl80211_auth_type brcmf_war_auth_type(struct brcmf_if *ifp,
					   enum nl80211_auth_type type)
{
1813 1814 1815 1816
	if (type == NL80211_AUTHTYPE_AUTOMATIC &&
	    brcmf_feat_is_quirk_enabled(ifp, BRCMF_FEAT_QUIRK_AUTO_AUTH)) {
		brcmf_dbg(CONN, "WAR: use OPEN instead of AUTO\n");
		type = NL80211_AUTHTYPE_OPEN_SYSTEM;
1817 1818 1819 1820
	}
	return type;
}

1821 1822 1823
static void brcmf_set_join_pref(struct brcmf_if *ifp,
				struct cfg80211_bss_selection *bss_select)
{
1824
	struct brcmf_pub *drvr = ifp->drvr;
1825 1826 1827 1828 1829 1830 1831 1832 1833 1834 1835 1836 1837 1838 1839 1840 1841 1842 1843 1844 1845 1846 1847 1848 1849 1850 1851 1852 1853 1854 1855 1856 1857 1858 1859 1860 1861 1862
	struct brcmf_join_pref_params join_pref_params[2];
	enum nl80211_band band;
	int err, i = 0;

	join_pref_params[i].len = 2;
	join_pref_params[i].rssi_gain = 0;

	if (bss_select->behaviour != NL80211_BSS_SELECT_ATTR_BAND_PREF)
		brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_ASSOC_PREFER, WLC_BAND_AUTO);

	switch (bss_select->behaviour) {
	case __NL80211_BSS_SELECT_ATTR_INVALID:
		brcmf_c_set_joinpref_default(ifp);
		return;
	case NL80211_BSS_SELECT_ATTR_BAND_PREF:
		join_pref_params[i].type = BRCMF_JOIN_PREF_BAND;
		band = bss_select->param.band_pref;
		join_pref_params[i].band = nl80211_band_to_fwil(band);
		i++;
		break;
	case NL80211_BSS_SELECT_ATTR_RSSI_ADJUST:
		join_pref_params[i].type = BRCMF_JOIN_PREF_RSSI_DELTA;
		band = bss_select->param.adjust.band;
		join_pref_params[i].band = nl80211_band_to_fwil(band);
		join_pref_params[i].rssi_gain = bss_select->param.adjust.delta;
		i++;
		break;
	case NL80211_BSS_SELECT_ATTR_RSSI:
	default:
		break;
	}
	join_pref_params[i].type = BRCMF_JOIN_PREF_RSSI;
	join_pref_params[i].len = 2;
	join_pref_params[i].rssi_gain = 0;
	join_pref_params[i].band = 0;
	err = brcmf_fil_iovar_data_set(ifp, "join_pref", join_pref_params,
				       sizeof(join_pref_params));
	if (err)
1863
		bphy_err(drvr, "Set join_pref error (%d)\n", err);
1864 1865
}

1866 1867
static s32
brcmf_cfg80211_connect(struct wiphy *wiphy, struct net_device *ndev,
1868
		       struct cfg80211_connect_params *sme)
1869
{
1870
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
1871
	struct brcmf_if *ifp = netdev_priv(ndev);
1872
	struct brcmf_cfg80211_profile *profile = &ifp->vif->profile;
1873
	struct ieee80211_channel *chan = sme->channel;
1874
	struct brcmf_pub *drvr = ifp->drvr;
1875 1876
	struct brcmf_join_params join_params;
	size_t join_params_size;
1877 1878 1879
	const struct brcmf_tlv *rsn_ie;
	const struct brcmf_vs_tlv *wpa_ie;
	const void *ie;
1880 1881
	u32 ie_len;
	struct brcmf_ext_join_params_le *ext_join_params;
1882
	u16 chanspec;
1883
	s32 err = 0;
1884
	u32 ssid_len;
1885

1886
	brcmf_dbg(TRACE, "Enter\n");
1887
	if (!check_vif_up(ifp->vif))
1888 1889 1890
		return -EIO;

	if (!sme->ssid) {
1891
		bphy_err(drvr, "Invalid ssid\n");
1892 1893 1894
		return -EOPNOTSUPP;
	}

1895 1896 1897 1898 1899 1900 1901 1902 1903 1904 1905
	if (ifp->vif == cfg->p2p.bss_idx[P2PAPI_BSSCFG_PRIMARY].vif) {
		/* A normal (non P2P) connection request setup. */
		ie = NULL;
		ie_len = 0;
		/* find the WPA_IE */
		wpa_ie = brcmf_find_wpaie((u8 *)sme->ie, sme->ie_len);
		if (wpa_ie) {
			ie = wpa_ie;
			ie_len = wpa_ie->len + TLV_HDR_LEN;
		} else {
			/* find the RSN_IE */
1906 1907
			rsn_ie = brcmf_parse_tlvs((const u8 *)sme->ie,
						  sme->ie_len,
1908 1909 1910 1911 1912 1913 1914 1915 1916 1917 1918 1919
						  WLAN_EID_RSN);
			if (rsn_ie) {
				ie = rsn_ie;
				ie_len = rsn_ie->len + TLV_HDR_LEN;
			}
		}
		brcmf_fil_iovar_data_set(ifp, "wpaie", ie, ie_len);
	}

	err = brcmf_vif_set_mgmt_ie(ifp->vif, BRCMF_VNDR_IE_ASSOCREQ_FLAG,
				    sme->ie, sme->ie_len);
	if (err)
1920
		bphy_err(drvr, "Set Assoc REQ IE Failed\n");
1921 1922 1923
	else
		brcmf_dbg(TRACE, "Applied Vndr IEs for Assoc request\n");

1924
	set_bit(BRCMF_VIF_STATUS_CONNECTING, &ifp->vif->sme_state);
1925 1926

	if (chan) {
1927
		cfg->channel =
1928
			ieee80211_frequency_to_channel(chan->center_freq);
1929
		chanspec = channel_to_chanspec(&cfg->d11inf, chan);
1930 1931 1932
		brcmf_dbg(CONN, "channel=%d, center_req=%d, chanspec=0x%04x\n",
			  cfg->channel, chan->center_freq, chanspec);
	} else {
1933
		cfg->channel = 0;
1934 1935
		chanspec = 0;
	}
1936

1937
	brcmf_dbg(INFO, "ie (%p), ie_len (%zd)\n", sme->ie, sme->ie_len);
1938 1939 1940

	err = brcmf_set_wpa_version(ndev, sme);
	if (err) {
1941
		bphy_err(drvr, "wl_set_wpa_version failed (%d)\n", err);
1942 1943 1944
		goto done;
	}

1945
	sme->auth_type = brcmf_war_auth_type(ifp, sme->auth_type);
1946 1947
	err = brcmf_set_auth_type(ndev, sme);
	if (err) {
1948
		bphy_err(drvr, "wl_set_auth_type failed (%d)\n", err);
1949 1950 1951
		goto done;
	}

1952
	err = brcmf_set_wsec_mode(ndev, sme);
1953
	if (err) {
1954
		bphy_err(drvr, "wl_set_set_cipher failed (%d)\n", err);
1955 1956 1957 1958 1959
		goto done;
	}

	err = brcmf_set_key_mgmt(ndev, sme);
	if (err) {
1960
		bphy_err(drvr, "wl_set_key_mgmt failed (%d)\n", err);
1961 1962 1963
		goto done;
	}

1964
	err = brcmf_set_sharedkey(ndev, sme);
1965
	if (err) {
1966
		bphy_err(drvr, "brcmf_set_sharedkey failed (%d)\n", err);
1967 1968 1969
		goto done;
	}

1970
	if (sme->crypto.psk) {
1971 1972 1973 1974
		if (WARN_ON(profile->use_fwsup != BRCMF_PROFILE_FWSUP_NONE)) {
			err = -EINVAL;
			goto done;
		}
1975
		brcmf_dbg(INFO, "using PSK offload\n");
1976 1977
		profile->use_fwsup = BRCMF_PROFILE_FWSUP_PSK;
	}
1978

1979
	if (profile->use_fwsup != BRCMF_PROFILE_FWSUP_NONE) {
1980 1981 1982
		/* enable firmware supplicant for this interface */
		err = brcmf_fil_iovar_int_set(ifp, "sup_wpa", 1);
		if (err < 0) {
1983
			bphy_err(drvr, "failed to enable fw supplicant\n");
1984 1985
			goto done;
		}
1986
	}
1987

1988
	if (profile->use_fwsup == BRCMF_PROFILE_FWSUP_PSK) {
1989 1990 1991 1992 1993 1994
		err = brcmf_set_pmk(ifp, sme->crypto.psk,
				    BRCMF_WSEC_MAX_PSK_LEN);
		if (err)
			goto done;
	}

1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006
	/* Join with specific BSSID and cached SSID
	 * If SSID is zero join based on BSSID only
	 */
	join_params_size = offsetof(struct brcmf_ext_join_params_le, assoc_le) +
		offsetof(struct brcmf_assoc_params_le, chanspec_list);
	if (cfg->channel)
		join_params_size += sizeof(u16);
	ext_join_params = kzalloc(join_params_size, GFP_KERNEL);
	if (ext_join_params == NULL) {
		err = -ENOMEM;
		goto done;
	}
2007 2008 2009 2010 2011 2012
	ssid_len = min_t(u32, sme->ssid_len, IEEE80211_MAX_SSID_LEN);
	ext_join_params->ssid_le.SSID_len = cpu_to_le32(ssid_len);
	memcpy(&ext_join_params->ssid_le.SSID, sme->ssid, ssid_len);
	if (ssid_len < IEEE80211_MAX_SSID_LEN)
		brcmf_dbg(CONN, "SSID \"%s\", len (%d)\n",
			  ext_join_params->ssid_le.SSID, ssid_len);
2013

2014 2015 2016 2017 2018 2019 2020
	/* Set up join scan parameters */
	ext_join_params->scan_le.scan_type = -1;
	ext_join_params->scan_le.home_time = cpu_to_le32(-1);

	if (sme->bssid)
		memcpy(&ext_join_params->assoc_le.bssid, sme->bssid, ETH_ALEN);
	else
2021
		eth_broadcast_addr(ext_join_params->assoc_le.bssid);
2022 2023 2024 2025 2026 2027

	if (cfg->channel) {
		ext_join_params->assoc_le.chanspec_num = cpu_to_le32(1);

		ext_join_params->assoc_le.chanspec_list[0] =
			cpu_to_le16(chanspec);
2028 2029 2030 2031 2032 2033 2034 2035 2036 2037 2038 2039 2040 2041 2042 2043 2044 2045 2046
		/* Increase dwell time to receive probe response or detect
		 * beacon from target AP at a noisy air only during connect
		 * command.
		 */
		ext_join_params->scan_le.active_time =
			cpu_to_le32(BRCMF_SCAN_JOIN_ACTIVE_DWELL_TIME_MS);
		ext_join_params->scan_le.passive_time =
			cpu_to_le32(BRCMF_SCAN_JOIN_PASSIVE_DWELL_TIME_MS);
		/* To sync with presence period of VSDB GO send probe request
		 * more frequently. Probe request will be stopped when it gets
		 * probe response from target AP/GO.
		 */
		ext_join_params->scan_le.nprobes =
			cpu_to_le32(BRCMF_SCAN_JOIN_ACTIVE_DWELL_TIME_MS /
				    BRCMF_SCAN_JOIN_PROBE_INTERVAL_MS);
	} else {
		ext_join_params->scan_le.active_time = cpu_to_le32(-1);
		ext_join_params->scan_le.passive_time = cpu_to_le32(-1);
		ext_join_params->scan_le.nprobes = cpu_to_le32(-1);
2047 2048
	}

2049 2050
	brcmf_set_join_pref(ifp, &sme->bss_select);

2051 2052 2053 2054 2055 2056 2057 2058
	err  = brcmf_fil_bsscfg_data_set(ifp, "join", ext_join_params,
					 join_params_size);
	kfree(ext_join_params);
	if (!err)
		/* This is it. join command worked, we are done */
		goto done;

	/* join command failed, fallback to set ssid */
2059 2060 2061
	memset(&join_params, 0, sizeof(join_params));
	join_params_size = sizeof(join_params.ssid_le);

2062 2063
	memcpy(&join_params.ssid_le.SSID, sme->ssid, ssid_len);
	join_params.ssid_le.SSID_len = cpu_to_le32(ssid_len);
2064

2065 2066 2067
	if (sme->bssid)
		memcpy(join_params.params_le.bssid, sme->bssid, ETH_ALEN);
	else
2068
		eth_broadcast_addr(join_params.params_le.bssid);
2069

2070 2071 2072 2073 2074
	if (cfg->channel) {
		join_params.params_le.chanspec_list[0] = cpu_to_le16(chanspec);
		join_params.params_le.chanspec_num = cpu_to_le32(1);
		join_params_size += sizeof(join_params.params_le);
	}
2075
	err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_SSID,
2076
				     &join_params, join_params_size);
2077
	if (err)
2078
		bphy_err(drvr, "BRCMF_C_SET_SSID failed (%d)\n", err);
2079 2080 2081

done:
	if (err)
2082
		clear_bit(BRCMF_VIF_STATUS_CONNECTING, &ifp->vif->sme_state);
2083
	brcmf_dbg(TRACE, "Exit\n");
2084 2085 2086 2087 2088 2089 2090
	return err;
}

static s32
brcmf_cfg80211_disconnect(struct wiphy *wiphy, struct net_device *ndev,
		       u16 reason_code)
{
2091
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
2092 2093
	struct brcmf_if *ifp = netdev_priv(ndev);
	struct brcmf_cfg80211_profile *profile = &ifp->vif->profile;
2094
	struct brcmf_pub *drvr = cfg->pub;
2095 2096 2097
	struct brcmf_scb_val_le scbval;
	s32 err = 0;

2098
	brcmf_dbg(TRACE, "Enter. Reason code = %d\n", reason_code);
2099
	if (!check_vif_up(ifp->vif))
2100 2101
		return -EIO;

2102
	clear_bit(BRCMF_VIF_STATUS_CONNECTED, &ifp->vif->sme_state);
2103
	clear_bit(BRCMF_VIF_STATUS_CONNECTING, &ifp->vif->sme_state);
2104
	cfg80211_disconnected(ndev, reason_code, NULL, 0, true, GFP_KERNEL);
2105

2106
	memcpy(&scbval.ea, &profile->bssid, ETH_ALEN);
2107
	scbval.val = cpu_to_le32(reason_code);
2108
	err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_DISASSOC,
2109
				     &scbval, sizeof(scbval));
2110
	if (err)
2111
		bphy_err(drvr, "error (%d)\n", err);
2112

2113
	brcmf_dbg(TRACE, "Exit\n");
2114 2115 2116 2117
	return err;
}

static s32
2118
brcmf_cfg80211_set_tx_power(struct wiphy *wiphy, struct wireless_dev *wdev,
2119
			    enum nl80211_tx_power_setting type, s32 mbm)
2120
{
2121
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
2122 2123
	struct net_device *ndev = cfg_to_ndev(cfg);
	struct brcmf_if *ifp = netdev_priv(ndev);
2124
	struct brcmf_pub *drvr = cfg->pub;
2125 2126 2127
	s32 err;
	s32 disable;
	u32 qdbm = 127;
2128

2129
	brcmf_dbg(TRACE, "Enter %d %d\n", type, mbm);
2130
	if (!check_vif_up(ifp->vif))
2131 2132 2133 2134 2135 2136 2137
		return -EIO;

	switch (type) {
	case NL80211_TX_POWER_AUTOMATIC:
		break;
	case NL80211_TX_POWER_LIMITED:
	case NL80211_TX_POWER_FIXED:
2138
		if (mbm < 0) {
2139
			bphy_err(drvr, "TX_POWER_FIXED - dbm is negative\n");
2140 2141 2142
			err = -EINVAL;
			goto done;
		}
2143 2144 2145 2146
		qdbm =  MBM_TO_DBM(4 * mbm);
		if (qdbm > 127)
			qdbm = 127;
		qdbm |= WL_TXPWR_OVERRIDE;
2147
		break;
2148
	default:
2149
		bphy_err(drvr, "Unsupported type %d\n", type);
2150 2151
		err = -EINVAL;
		goto done;
2152 2153 2154
	}
	/* Make sure radio is off or on as far as software is concerned */
	disable = WL_RADIO_SW_DISABLE << 16;
2155
	err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_RADIO, disable);
2156
	if (err)
2157
		bphy_err(drvr, "WLC_SET_RADIO error (%d)\n", err);
2158

2159
	err = brcmf_fil_iovar_int_set(ifp, "qtxpower", qdbm);
2160
	if (err)
2161
		bphy_err(drvr, "qtxpower error (%d)\n", err);
2162 2163

done:
2164
	brcmf_dbg(TRACE, "Exit %d (qdbm)\n", qdbm & ~WL_TXPWR_OVERRIDE);
2165 2166 2167
	return err;
}

2168 2169 2170
static s32
brcmf_cfg80211_get_tx_power(struct wiphy *wiphy, struct wireless_dev *wdev,
			    s32 *dbm)
2171
{
2172
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
2173
	struct brcmf_cfg80211_vif *vif = wdev_to_vif(wdev);
2174
	struct brcmf_pub *drvr = cfg->pub;
2175 2176
	s32 qdbm = 0;
	s32 err;
2177

2178
	brcmf_dbg(TRACE, "Enter\n");
2179
	if (!check_vif_up(vif))
2180 2181
		return -EIO;

2182
	err = brcmf_fil_iovar_int_get(vif->ifp, "qtxpower", &qdbm);
2183
	if (err) {
2184
		bphy_err(drvr, "error (%d)\n", err);
2185 2186
		goto done;
	}
2187
	*dbm = (qdbm & ~WL_TXPWR_OVERRIDE) / 4;
2188 2189

done:
2190
	brcmf_dbg(TRACE, "Exit (0x%x %d)\n", qdbm, *dbm);
2191 2192 2193 2194 2195
	return err;
}

static s32
brcmf_cfg80211_config_default_key(struct wiphy *wiphy, struct net_device *ndev,
2196
				  u8 key_idx, bool unicast, bool multicast)
2197
{
2198
	struct brcmf_if *ifp = netdev_priv(ndev);
2199
	struct brcmf_pub *drvr = ifp->drvr;
2200 2201 2202 2203
	u32 index;
	u32 wsec;
	s32 err = 0;

2204
	brcmf_dbg(TRACE, "Enter\n");
2205
	brcmf_dbg(CONN, "key index (%d)\n", key_idx);
2206
	if (!check_vif_up(ifp->vif))
2207 2208
		return -EIO;

2209
	err = brcmf_fil_bsscfg_int_get(ifp, "wsec", &wsec);
2210
	if (err) {
2211
		bphy_err(drvr, "WLC_GET_WSEC error (%d)\n", err);
2212 2213 2214 2215 2216 2217
		goto done;
	}

	if (wsec & WEP_ENABLED) {
		/* Just select a new current key */
		index = key_idx;
2218
		err = brcmf_fil_cmd_int_set(ifp,
2219
					    BRCMF_C_SET_KEY_PRIMARY, index);
2220
		if (err)
2221
			bphy_err(drvr, "error (%d)\n", err);
2222 2223
	}
done:
2224
	brcmf_dbg(TRACE, "Exit\n");
2225 2226 2227 2228
	return err;
}

static s32
2229 2230
brcmf_cfg80211_del_key(struct wiphy *wiphy, struct net_device *ndev,
		       u8 key_idx, bool pairwise, const u8 *mac_addr)
2231
{
2232
	struct brcmf_if *ifp = netdev_priv(ndev);
2233 2234
	struct brcmf_wsec_key *key;
	s32 err;
2235 2236

	brcmf_dbg(TRACE, "Enter\n");
2237 2238
	brcmf_dbg(CONN, "key index (%d)\n", key_idx);

2239 2240 2241 2242 2243 2244 2245
	if (!check_vif_up(ifp->vif))
		return -EIO;

	if (key_idx >= BRCMF_MAX_DEFAULT_KEYS) {
		/* we ignore this key index in this case */
		return -EINVAL;
	}
2246

2247
	key = &ifp->vif->profile.key[key_idx];
2248

2249 2250 2251 2252
	if (key->algo == CRYPTO_ALGO_OFF) {
		brcmf_dbg(CONN, "Ignore clearing of (never configured) key\n");
		return -EINVAL;
	}
2253

2254 2255 2256
	memset(key, 0, sizeof(*key));
	key->index = (u32)key_idx;
	key->flags = BRCMF_PRIMARY_KEY;
2257

2258 2259
	/* Clear the key/index */
	err = send_key_to_dongle(ifp, key);
2260

2261
	brcmf_dbg(TRACE, "Exit\n");
2262 2263 2264 2265 2266
	return err;
}

static s32
brcmf_cfg80211_add_key(struct wiphy *wiphy, struct net_device *ndev,
2267 2268
		       u8 key_idx, bool pairwise, const u8 *mac_addr,
		       struct key_params *params)
2269
{
2270
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
2271
	struct brcmf_if *ifp = netdev_priv(ndev);
2272
	struct brcmf_pub *drvr = cfg->pub;
2273
	struct brcmf_wsec_key *key;
2274 2275
	s32 val;
	s32 wsec;
2276
	s32 err;
2277
	u8 keybuf[8];
2278
	bool ext_key;
2279

2280
	brcmf_dbg(TRACE, "Enter\n");
2281
	brcmf_dbg(CONN, "key index (%d)\n", key_idx);
2282
	if (!check_vif_up(ifp->vif))
2283 2284
		return -EIO;

2285 2286
	if (key_idx >= BRCMF_MAX_DEFAULT_KEYS) {
		/* we ignore this key index in this case */
2287
		bphy_err(drvr, "invalid key index (%d)\n", key_idx);
2288 2289 2290
		return -EINVAL;
	}

2291 2292 2293
	if (params->key_len == 0)
		return brcmf_cfg80211_del_key(wiphy, ndev, key_idx, pairwise,
					      mac_addr);
2294

2295
	if (params->key_len > sizeof(key->data)) {
2296
		bphy_err(drvr, "Too long key length (%u)\n", params->key_len);
2297
		return -EINVAL;
2298
	}
2299 2300 2301 2302 2303 2304 2305 2306 2307 2308 2309 2310

	ext_key = false;
	if (mac_addr && (params->cipher != WLAN_CIPHER_SUITE_WEP40) &&
	    (params->cipher != WLAN_CIPHER_SUITE_WEP104)) {
		brcmf_dbg(TRACE, "Ext key, mac %pM", mac_addr);
		ext_key = true;
	}

	key = &ifp->vif->profile.key[key_idx];
	memset(key, 0, sizeof(*key));
	if ((ext_key) && (!is_multicast_ether_addr(mac_addr)))
		memcpy((char *)&key->ea, (void *)mac_addr, ETH_ALEN);
2311 2312 2313
	key->len = params->key_len;
	key->index = key_idx;
	memcpy(key->data, params->key, key->len);
2314 2315
	if (!ext_key)
		key->flags = BRCMF_PRIMARY_KEY;
2316

2317 2318
	switch (params->cipher) {
	case WLAN_CIPHER_SUITE_WEP40:
2319
		key->algo = CRYPTO_ALGO_WEP1;
2320
		val = WEP_ENABLED;
2321
		brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_WEP40\n");
2322 2323
		break;
	case WLAN_CIPHER_SUITE_WEP104:
2324
		key->algo = CRYPTO_ALGO_WEP128;
2325
		val = WEP_ENABLED;
2326
		brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_WEP104\n");
2327 2328
		break;
	case WLAN_CIPHER_SUITE_TKIP:
2329
		if (!brcmf_is_apmode(ifp->vif)) {
2330
			brcmf_dbg(CONN, "Swapping RX/TX MIC key\n");
2331 2332 2333
			memcpy(keybuf, &key->data[24], sizeof(keybuf));
			memcpy(&key->data[24], &key->data[16], sizeof(keybuf));
			memcpy(&key->data[16], keybuf, sizeof(keybuf));
2334
		}
2335
		key->algo = CRYPTO_ALGO_TKIP;
2336
		val = TKIP_ENABLED;
2337
		brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_TKIP\n");
2338 2339
		break;
	case WLAN_CIPHER_SUITE_AES_CMAC:
2340
		key->algo = CRYPTO_ALGO_AES_CCM;
2341
		val = AES_ENABLED;
2342
		brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_AES_CMAC\n");
2343 2344
		break;
	case WLAN_CIPHER_SUITE_CCMP:
2345
		key->algo = CRYPTO_ALGO_AES_CCM;
2346
		val = AES_ENABLED;
2347
		brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_CCMP\n");
2348 2349
		break;
	default:
2350
		bphy_err(drvr, "Invalid cipher (0x%x)\n", params->cipher);
2351 2352 2353 2354
		err = -EINVAL;
		goto done;
	}

2355
	err = send_key_to_dongle(ifp, key);
2356
	if (ext_key || err)
2357 2358
		goto done;

2359
	err = brcmf_fil_bsscfg_int_get(ifp, "wsec", &wsec);
2360
	if (err) {
2361
		bphy_err(drvr, "get wsec error (%d)\n", err);
2362 2363 2364
		goto done;
	}
	wsec |= val;
2365
	err = brcmf_fil_bsscfg_int_set(ifp, "wsec", wsec);
2366
	if (err) {
2367
		bphy_err(drvr, "set wsec error (%d)\n", err);
2368 2369 2370 2371
		goto done;
	}

done:
2372
	brcmf_dbg(TRACE, "Exit\n");
2373 2374 2375 2376
	return err;
}

static s32
2377 2378 2379 2380
brcmf_cfg80211_get_key(struct wiphy *wiphy, struct net_device *ndev, u8 key_idx,
		       bool pairwise, const u8 *mac_addr, void *cookie,
		       void (*callback)(void *cookie,
					struct key_params *params))
2381
{
2382
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
2383
	struct key_params params;
2384 2385
	struct brcmf_if *ifp = netdev_priv(ndev);
	struct brcmf_cfg80211_profile *profile = &ifp->vif->profile;
2386
	struct brcmf_pub *drvr = cfg->pub;
2387 2388 2389 2390
	struct brcmf_cfg80211_security *sec;
	s32 wsec;
	s32 err = 0;

2391
	brcmf_dbg(TRACE, "Enter\n");
2392
	brcmf_dbg(CONN, "key index (%d)\n", key_idx);
2393
	if (!check_vif_up(ifp->vif))
2394 2395 2396 2397
		return -EIO;

	memset(&params, 0, sizeof(params));

2398
	err = brcmf_fil_bsscfg_int_get(ifp, "wsec", &wsec);
2399
	if (err) {
2400
		bphy_err(drvr, "WLC_GET_WSEC error (%d)\n", err);
2401 2402 2403 2404
		/* Ignore this error, may happen during DISASSOC */
		err = -EAGAIN;
		goto done;
	}
2405
	if (wsec & WEP_ENABLED) {
2406
		sec = &profile->sec;
2407 2408
		if (sec->cipher_pairwise & WLAN_CIPHER_SUITE_WEP40) {
			params.cipher = WLAN_CIPHER_SUITE_WEP40;
2409
			brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_WEP40\n");
2410 2411
		} else if (sec->cipher_pairwise & WLAN_CIPHER_SUITE_WEP104) {
			params.cipher = WLAN_CIPHER_SUITE_WEP104;
2412
			brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_WEP104\n");
2413
		}
2414
	} else if (wsec & TKIP_ENABLED) {
2415
		params.cipher = WLAN_CIPHER_SUITE_TKIP;
2416
		brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_TKIP\n");
2417
	} else if (wsec & AES_ENABLED) {
2418
		params.cipher = WLAN_CIPHER_SUITE_AES_CMAC;
2419
		brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_AES_CMAC\n");
2420
	} else  {
2421
		bphy_err(drvr, "Invalid algo (0x%x)\n", wsec);
2422 2423 2424 2425 2426 2427
		err = -EINVAL;
		goto done;
	}
	callback(cookie, &params);

done:
2428
	brcmf_dbg(TRACE, "Exit\n");
2429 2430 2431 2432 2433
	return err;
}

static s32
brcmf_cfg80211_config_default_mgmt_key(struct wiphy *wiphy,
2434
				       struct net_device *ndev, u8 key_idx)
2435
{
2436 2437 2438 2439 2440 2441 2442
	struct brcmf_if *ifp = netdev_priv(ndev);

	brcmf_dbg(TRACE, "Enter key_idx %d\n", key_idx);

	if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MFP))
		return 0;

2443
	brcmf_dbg(INFO, "Not supported\n");
2444 2445 2446 2447

	return -EOPNOTSUPP;
}

2448 2449 2450
static void
brcmf_cfg80211_reconfigure_wep(struct brcmf_if *ifp)
{
2451
	struct brcmf_pub *drvr = ifp->drvr;
2452 2453 2454 2455 2456 2457 2458 2459 2460 2461 2462 2463 2464 2465 2466 2467
	s32 err;
	u8 key_idx;
	struct brcmf_wsec_key *key;
	s32 wsec;

	for (key_idx = 0; key_idx < BRCMF_MAX_DEFAULT_KEYS; key_idx++) {
		key = &ifp->vif->profile.key[key_idx];
		if ((key->algo == CRYPTO_ALGO_WEP1) ||
		    (key->algo == CRYPTO_ALGO_WEP128))
			break;
	}
	if (key_idx == BRCMF_MAX_DEFAULT_KEYS)
		return;

	err = send_key_to_dongle(ifp, key);
	if (err) {
2468
		bphy_err(drvr, "Setting WEP key failed (%d)\n", err);
2469 2470 2471 2472
		return;
	}
	err = brcmf_fil_bsscfg_int_get(ifp, "wsec", &wsec);
	if (err) {
2473
		bphy_err(drvr, "get wsec error (%d)\n", err);
2474 2475 2476 2477 2478
		return;
	}
	wsec |= WEP_ENABLED;
	err = brcmf_fil_bsscfg_int_set(ifp, "wsec", wsec);
	if (err)
2479
		bphy_err(drvr, "set wsec error (%d)\n", err);
2480 2481
}

2482 2483 2484 2485 2486
static void brcmf_convert_sta_flags(u32 fw_sta_flags, struct station_info *si)
{
	struct nl80211_sta_flag_update *sfu;

	brcmf_dbg(TRACE, "flags %08x\n", fw_sta_flags);
2487
	si->filled |= BIT_ULL(NL80211_STA_INFO_STA_FLAGS);
2488 2489 2490 2491 2492 2493 2494 2495 2496 2497 2498 2499 2500 2501 2502 2503 2504
	sfu = &si->sta_flags;
	sfu->mask = BIT(NL80211_STA_FLAG_WME) |
		    BIT(NL80211_STA_FLAG_AUTHENTICATED) |
		    BIT(NL80211_STA_FLAG_ASSOCIATED) |
		    BIT(NL80211_STA_FLAG_AUTHORIZED);
	if (fw_sta_flags & BRCMF_STA_WME)
		sfu->set |= BIT(NL80211_STA_FLAG_WME);
	if (fw_sta_flags & BRCMF_STA_AUTHE)
		sfu->set |= BIT(NL80211_STA_FLAG_AUTHENTICATED);
	if (fw_sta_flags & BRCMF_STA_ASSOC)
		sfu->set |= BIT(NL80211_STA_FLAG_ASSOCIATED);
	if (fw_sta_flags & BRCMF_STA_AUTHO)
		sfu->set |= BIT(NL80211_STA_FLAG_AUTHORIZED);
}

static void brcmf_fill_bss_param(struct brcmf_if *ifp, struct station_info *si)
{
2505
	struct brcmf_pub *drvr = ifp->drvr;
2506 2507 2508 2509 2510 2511 2512 2513 2514 2515 2516 2517 2518 2519 2520
	struct {
		__le32 len;
		struct brcmf_bss_info_le bss_le;
	} *buf;
	u16 capability;
	int err;

	buf = kzalloc(WL_BSS_INFO_MAX, GFP_KERNEL);
	if (!buf)
		return;

	buf->len = cpu_to_le32(WL_BSS_INFO_MAX);
	err = brcmf_fil_cmd_data_get(ifp, BRCMF_C_GET_BSS_INFO, buf,
				     WL_BSS_INFO_MAX);
	if (err) {
2521
		bphy_err(drvr, "Failed to get bss info (%d)\n", err);
2522
		goto out_kfree;
2523
	}
2524
	si->filled |= BIT_ULL(NL80211_STA_INFO_BSS_PARAM);
2525 2526 2527 2528 2529 2530 2531 2532 2533
	si->bss_param.beacon_interval = le16_to_cpu(buf->bss_le.beacon_period);
	si->bss_param.dtim_period = buf->bss_le.dtim_period;
	capability = le16_to_cpu(buf->bss_le.capability);
	if (capability & IEEE80211_HT_STBC_PARAM_DUAL_CTS_PROT)
		si->bss_param.flags |= BSS_PARAM_FLAGS_CTS_PROT;
	if (capability & WLAN_CAPABILITY_SHORT_PREAMBLE)
		si->bss_param.flags |= BSS_PARAM_FLAGS_SHORT_PREAMBLE;
	if (capability & WLAN_CAPABILITY_SHORT_SLOT_TIME)
		si->bss_param.flags |= BSS_PARAM_FLAGS_SHORT_SLOT_TIME;
2534 2535 2536

out_kfree:
	kfree(buf);
2537 2538
}

2539 2540 2541 2542
static s32
brcmf_cfg80211_get_station_ibss(struct brcmf_if *ifp,
				struct station_info *sinfo)
{
2543
	struct brcmf_pub *drvr = ifp->drvr;
2544 2545 2546 2547 2548 2549 2550 2551 2552
	struct brcmf_scb_val_le scbval;
	struct brcmf_pktcnt_le pktcnt;
	s32 err;
	u32 rate;
	u32 rssi;

	/* Get the current tx rate */
	err = brcmf_fil_cmd_int_get(ifp, BRCMF_C_GET_RATE, &rate);
	if (err < 0) {
2553
		bphy_err(drvr, "BRCMF_C_GET_RATE error (%d)\n", err);
2554 2555
		return err;
	}
2556
	sinfo->filled |= BIT_ULL(NL80211_STA_INFO_TX_BITRATE);
2557 2558 2559 2560 2561 2562
	sinfo->txrate.legacy = rate * 5;

	memset(&scbval, 0, sizeof(scbval));
	err = brcmf_fil_cmd_data_get(ifp, BRCMF_C_GET_RSSI, &scbval,
				     sizeof(scbval));
	if (err) {
2563
		bphy_err(drvr, "BRCMF_C_GET_RSSI error (%d)\n", err);
2564 2565 2566
		return err;
	}
	rssi = le32_to_cpu(scbval.val);
2567
	sinfo->filled |= BIT_ULL(NL80211_STA_INFO_SIGNAL);
2568 2569 2570 2571 2572
	sinfo->signal = rssi;

	err = brcmf_fil_cmd_data_get(ifp, BRCMF_C_GET_GET_PKTCNTS, &pktcnt,
				     sizeof(pktcnt));
	if (err) {
2573
		bphy_err(drvr, "BRCMF_C_GET_GET_PKTCNTS error (%d)\n", err);
2574 2575
		return err;
	}
2576 2577 2578 2579
	sinfo->filled |= BIT_ULL(NL80211_STA_INFO_RX_PACKETS) |
			 BIT_ULL(NL80211_STA_INFO_RX_DROP_MISC) |
			 BIT_ULL(NL80211_STA_INFO_TX_PACKETS) |
			 BIT_ULL(NL80211_STA_INFO_TX_FAILED);
2580 2581 2582 2583 2584 2585 2586 2587
	sinfo->rx_packets = le32_to_cpu(pktcnt.rx_good_pkt);
	sinfo->rx_dropped_misc = le32_to_cpu(pktcnt.rx_bad_pkt);
	sinfo->tx_packets = le32_to_cpu(pktcnt.tx_good_pkt);
	sinfo->tx_failed  = le32_to_cpu(pktcnt.tx_bad_pkt);

	return 0;
}

2588 2589
static s32
brcmf_cfg80211_get_station(struct wiphy *wiphy, struct net_device *ndev,
2590
			   const u8 *mac, struct station_info *sinfo)
2591
{
2592
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
2593
	struct brcmf_if *ifp = netdev_priv(ndev);
2594
	struct brcmf_pub *drvr = cfg->pub;
2595
	struct brcmf_scb_val_le scb_val;
2596
	s32 err = 0;
2597
	struct brcmf_sta_info_le sta_info_le;
2598 2599
	u32 sta_flags;
	u32 is_tdls_peer;
2600 2601
	s32 total_rssi;
	s32 count_rssi;
2602
	int rssi;
2603
	u32 i;
2604

2605
	brcmf_dbg(TRACE, "Enter, MAC %pM\n", mac);
2606
	if (!check_vif_up(ifp->vif))
2607 2608
		return -EIO;

2609 2610 2611
	if (brcmf_is_ibssmode(ifp->vif))
		return brcmf_cfg80211_get_station_ibss(ifp, sinfo);

2612 2613 2614 2615 2616 2617 2618
	memset(&sta_info_le, 0, sizeof(sta_info_le));
	memcpy(&sta_info_le, mac, ETH_ALEN);
	err = brcmf_fil_iovar_data_get(ifp, "tdls_sta_info",
				       &sta_info_le,
				       sizeof(sta_info_le));
	is_tdls_peer = !err;
	if (err) {
2619
		err = brcmf_fil_iovar_data_get(ifp, "sta_info",
2620
					       &sta_info_le,
2621
					       sizeof(sta_info_le));
2622
		if (err < 0) {
2623
			bphy_err(drvr, "GET STA INFO failed, %d\n", err);
2624 2625
			goto done;
		}
2626 2627
	}
	brcmf_dbg(TRACE, "version %d\n", le16_to_cpu(sta_info_le.ver));
2628
	sinfo->filled = BIT_ULL(NL80211_STA_INFO_INACTIVE_TIME);
2629 2630 2631 2632 2633 2634 2635 2636 2637
	sinfo->inactive_time = le32_to_cpu(sta_info_le.idle) * 1000;
	sta_flags = le32_to_cpu(sta_info_le.flags);
	brcmf_convert_sta_flags(sta_flags, sinfo);
	sinfo->sta_flags.mask |= BIT(NL80211_STA_FLAG_TDLS_PEER);
	if (is_tdls_peer)
		sinfo->sta_flags.set |= BIT(NL80211_STA_FLAG_TDLS_PEER);
	else
		sinfo->sta_flags.set &= ~BIT(NL80211_STA_FLAG_TDLS_PEER);
	if (sta_flags & BRCMF_STA_ASSOC) {
2638
		sinfo->filled |= BIT_ULL(NL80211_STA_INFO_CONNECTED_TIME);
2639 2640 2641 2642
		sinfo->connected_time = le32_to_cpu(sta_info_le.in);
		brcmf_fill_bss_param(ifp, sinfo);
	}
	if (sta_flags & BRCMF_STA_SCBSTATS) {
2643
		sinfo->filled |= BIT_ULL(NL80211_STA_INFO_TX_FAILED);
2644
		sinfo->tx_failed = le32_to_cpu(sta_info_le.tx_failures);
2645
		sinfo->filled |= BIT_ULL(NL80211_STA_INFO_TX_PACKETS);
2646 2647
		sinfo->tx_packets = le32_to_cpu(sta_info_le.tx_pkts);
		sinfo->tx_packets += le32_to_cpu(sta_info_le.tx_mcast_pkts);
2648
		sinfo->filled |= BIT_ULL(NL80211_STA_INFO_RX_PACKETS);
2649 2650 2651
		sinfo->rx_packets = le32_to_cpu(sta_info_le.rx_ucast_pkts);
		sinfo->rx_packets += le32_to_cpu(sta_info_le.rx_mcast_pkts);
		if (sinfo->tx_packets) {
2652
			sinfo->filled |= BIT_ULL(NL80211_STA_INFO_TX_BITRATE);
2653 2654
			sinfo->txrate.legacy =
				le32_to_cpu(sta_info_le.tx_rate) / 100;
2655
		}
2656
		if (sinfo->rx_packets) {
2657
			sinfo->filled |= BIT_ULL(NL80211_STA_INFO_RX_BITRATE);
2658 2659
			sinfo->rxrate.legacy =
				le32_to_cpu(sta_info_le.rx_rate) / 100;
2660
		}
2661
		if (le16_to_cpu(sta_info_le.ver) >= 4) {
2662
			sinfo->filled |= BIT_ULL(NL80211_STA_INFO_TX_BYTES);
2663
			sinfo->tx_bytes = le64_to_cpu(sta_info_le.tx_tot_bytes);
2664
			sinfo->filled |= BIT_ULL(NL80211_STA_INFO_RX_BYTES);
2665 2666
			sinfo->rx_bytes = le64_to_cpu(sta_info_le.rx_tot_bytes);
		}
2667 2668 2669 2670 2671 2672 2673 2674 2675 2676 2677 2678 2679
		total_rssi = 0;
		count_rssi = 0;
		for (i = 0; i < BRCMF_ANT_MAX; i++) {
			if (sta_info_le.rssi[i]) {
				sinfo->chain_signal_avg[count_rssi] =
					sta_info_le.rssi[i];
				sinfo->chain_signal[count_rssi] =
					sta_info_le.rssi[i];
				total_rssi += sta_info_le.rssi[i];
				count_rssi++;
			}
		}
		if (count_rssi) {
2680
			sinfo->filled |= BIT_ULL(NL80211_STA_INFO_CHAIN_SIGNAL);
2681 2682
			sinfo->chains = count_rssi;

2683
			sinfo->filled |= BIT_ULL(NL80211_STA_INFO_SIGNAL);
2684 2685
			total_rssi /= count_rssi;
			sinfo->signal = total_rssi;
2686 2687 2688 2689 2690 2691
		} else if (test_bit(BRCMF_VIF_STATUS_CONNECTED,
			&ifp->vif->sme_state)) {
			memset(&scb_val, 0, sizeof(scb_val));
			err = brcmf_fil_cmd_data_get(ifp, BRCMF_C_GET_RSSI,
						     &scb_val, sizeof(scb_val));
			if (err) {
2692
				bphy_err(drvr, "Could not get rssi (%d)\n",
2693
					 err);
2694 2695 2696
				goto done;
			} else {
				rssi = le32_to_cpu(scb_val.val);
2697
				sinfo->filled |= BIT_ULL(NL80211_STA_INFO_SIGNAL);
2698 2699 2700
				sinfo->signal = rssi;
				brcmf_dbg(CONN, "RSSI %d dBm\n", rssi);
			}
2701
		}
2702
	}
2703
done:
2704
	brcmf_dbg(TRACE, "Exit\n");
2705 2706 2707
	return err;
}

2708 2709 2710 2711 2712 2713
static int
brcmf_cfg80211_dump_station(struct wiphy *wiphy, struct net_device *ndev,
			    int idx, u8 *mac, struct station_info *sinfo)
{
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
	struct brcmf_if *ifp = netdev_priv(ndev);
2714
	struct brcmf_pub *drvr = cfg->pub;
2715 2716 2717 2718 2719 2720 2721 2722 2723 2724
	s32 err;

	brcmf_dbg(TRACE, "Enter, idx %d\n", idx);

	if (idx == 0) {
		cfg->assoclist.count = cpu_to_le32(BRCMF_MAX_ASSOCLIST);
		err = brcmf_fil_cmd_data_get(ifp, BRCMF_C_GET_ASSOCLIST,
					     &cfg->assoclist,
					     sizeof(cfg->assoclist));
		if (err) {
2725
			bphy_err(drvr, "BRCMF_C_GET_ASSOCLIST unsupported, err=%d\n",
2726
				 err);
2727 2728 2729 2730 2731 2732 2733 2734 2735 2736 2737
			cfg->assoclist.count = 0;
			return -EOPNOTSUPP;
		}
	}
	if (idx < le32_to_cpu(cfg->assoclist.count)) {
		memcpy(mac, cfg->assoclist.mac[idx], ETH_ALEN);
		return brcmf_cfg80211_get_station(wiphy, ndev, mac, sinfo);
	}
	return -ENOENT;
}

2738 2739 2740 2741 2742 2743
static s32
brcmf_cfg80211_set_power_mgmt(struct wiphy *wiphy, struct net_device *ndev,
			   bool enabled, s32 timeout)
{
	s32 pm;
	s32 err = 0;
2744
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
2745
	struct brcmf_if *ifp = netdev_priv(ndev);
2746
	struct brcmf_pub *drvr = cfg->pub;
2747

2748
	brcmf_dbg(TRACE, "Enter\n");
2749 2750 2751 2752 2753

	/*
	 * Powersave enable/disable request is coming from the
	 * cfg80211 even before the interface is up. In that
	 * scenario, driver will be storing the power save
2754
	 * preference in cfg struct to apply this to
2755 2756
	 * FW later while initializing the dongle
	 */
2757
	cfg->pwr_save = enabled;
2758
	if (!check_vif_up(ifp->vif)) {
2759

2760
		brcmf_dbg(INFO, "Device is not ready, storing the value in cfg_info struct\n");
2761 2762 2763 2764
		goto done;
	}

	pm = enabled ? PM_FAST : PM_OFF;
2765 2766 2767 2768 2769
	/* Do not enable the power save after assoc if it is a p2p interface */
	if (ifp->vif->wdev.iftype == NL80211_IFTYPE_P2P_CLIENT) {
		brcmf_dbg(INFO, "Do not enable power save for P2P clients\n");
		pm = PM_OFF;
	}
2770
	brcmf_dbg(INFO, "power save %s\n", (pm ? "enabled" : "disabled"));
2771

2772
	err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_PM, pm);
2773 2774
	if (err) {
		if (err == -ENODEV)
2775
			bphy_err(drvr, "net_device is not ready yet\n");
2776
		else
2777
			bphy_err(drvr, "error (%d)\n", err);
2778 2779
	}
done:
2780
	brcmf_dbg(TRACE, "Exit\n");
2781 2782 2783
	return err;
}

2784
static s32 brcmf_inform_single_bss(struct brcmf_cfg80211_info *cfg,
2785
				   struct brcmf_bss_info_le *bi)
2786
{
2787
	struct wiphy *wiphy = cfg_to_wiphy(cfg);
2788
	struct brcmf_pub *drvr = cfg->pub;
2789
	struct cfg80211_bss *bss;
2790
	enum nl80211_band band;
2791
	struct brcmu_chan ch;
2792 2793 2794 2795 2796 2797
	u16 channel;
	u32 freq;
	u16 notify_capability;
	u16 notify_interval;
	u8 *notify_ie;
	size_t notify_ielen;
2798
	struct cfg80211_inform_bss bss_data = {};
2799 2800

	if (le32_to_cpu(bi->length) > WL_BSS_INFO_MAX) {
2801
		bphy_err(drvr, "Bss info is larger than buffer. Discarding\n");
2802 2803 2804
		return 0;
	}

2805 2806 2807
	if (!bi->ctl_ch) {
		ch.chspec = le16_to_cpu(bi->chanspec);
		cfg->d11inf.decchspec(&ch);
2808
		bi->ctl_ch = ch.control_ch_num;
2809 2810
	}
	channel = bi->ctl_ch;
2811 2812

	if (channel <= CH_MAX_2G_CHANNEL)
2813
		band = NL80211_BAND_2GHZ;
2814
	else
2815
		band = NL80211_BAND_5GHZ;
2816

2817
	freq = ieee80211_channel_to_frequency(channel, band);
2818 2819 2820
	bss_data.chan = ieee80211_get_channel(wiphy, freq);
	bss_data.scan_width = NL80211_BSS_CHAN_WIDTH_20;
	bss_data.boottime_ns = ktime_to_ns(ktime_get_boottime());
2821 2822 2823 2824 2825

	notify_capability = le16_to_cpu(bi->capability);
	notify_interval = le16_to_cpu(bi->beacon_period);
	notify_ie = (u8 *)bi + le16_to_cpu(bi->ie_offset);
	notify_ielen = le32_to_cpu(bi->ie_length);
2826
	bss_data.signal = (s16)le16_to_cpu(bi->RSSI) * 100;
2827

2828 2829 2830 2831
	brcmf_dbg(CONN, "bssid: %pM\n", bi->BSSID);
	brcmf_dbg(CONN, "Channel: %d(%d)\n", channel, freq);
	brcmf_dbg(CONN, "Capability: %X\n", notify_capability);
	brcmf_dbg(CONN, "Beacon interval: %d\n", notify_interval);
2832 2833 2834 2835 2836 2837 2838 2839
	brcmf_dbg(CONN, "Signal: %d\n", bss_data.signal);

	bss = cfg80211_inform_bss_data(wiphy, &bss_data,
				       CFG80211_BSS_FTYPE_UNKNOWN,
				       (const u8 *)bi->BSSID,
				       0, notify_capability,
				       notify_interval, notify_ie,
				       notify_ielen, GFP_KERNEL);
2840

2841 2842 2843
	if (!bss)
		return -ENOMEM;

2844
	cfg80211_put_bss(wiphy, bss);
2845

2846
	return 0;
2847 2848
}

2849 2850 2851 2852 2853 2854 2855 2856 2857
static struct brcmf_bss_info_le *
next_bss_le(struct brcmf_scan_results *list, struct brcmf_bss_info_le *bss)
{
	if (bss == NULL)
		return list->bss_info_le;
	return (struct brcmf_bss_info_le *)((unsigned long)bss +
					    le32_to_cpu(bss->length));
}

2858
static s32 brcmf_inform_bss(struct brcmf_cfg80211_info *cfg)
2859
{
2860
	struct brcmf_pub *drvr = cfg->pub;
2861
	struct brcmf_scan_results *bss_list;
2862
	struct brcmf_bss_info_le *bi = NULL;	/* must be initialized */
2863 2864 2865
	s32 err = 0;
	int i;

2866
	bss_list = (struct brcmf_scan_results *)cfg->escan_info.escan_buf;
2867 2868
	if (bss_list->count != 0 &&
	    bss_list->version != BRCMF_BSS_INFO_VERSION) {
2869
		bphy_err(drvr, "Version %d != WL_BSS_INFO_VERSION\n",
2870
			 bss_list->version);
2871 2872
		return -EOPNOTSUPP;
	}
2873
	brcmf_dbg(SCAN, "scanned AP count (%d)\n", bss_list->count);
2874
	for (i = 0; i < bss_list->count; i++) {
2875
		bi = next_bss_le(bss_list, bi);
2876
		err = brcmf_inform_single_bss(cfg, bi);
2877 2878 2879 2880 2881 2882
		if (err)
			break;
	}
	return err;
}

Hante Meuleman's avatar
Hante Meuleman committed
2883 2884
static s32 brcmf_inform_ibss(struct brcmf_cfg80211_info *cfg,
			     struct net_device *ndev, const u8 *bssid)
2885
{
2886
	struct wiphy *wiphy = cfg_to_wiphy(cfg);
2887
	struct brcmf_pub *drvr = cfg->pub;
2888
	struct ieee80211_channel *notify_channel;
2889
	struct brcmf_bss_info_le *bi = NULL;
2890
	struct ieee80211_supported_band *band;
2891
	struct cfg80211_bss *bss;
2892
	struct brcmu_chan ch;
2893 2894 2895 2896 2897 2898 2899 2900 2901
	u8 *buf = NULL;
	s32 err = 0;
	u32 freq;
	u16 notify_capability;
	u16 notify_interval;
	u8 *notify_ie;
	size_t notify_ielen;
	s32 notify_signal;

2902
	brcmf_dbg(TRACE, "Enter\n");
2903 2904 2905 2906 2907 2908 2909 2910 2911

	buf = kzalloc(WL_BSS_INFO_MAX, GFP_KERNEL);
	if (buf == NULL) {
		err = -ENOMEM;
		goto CleanUp;
	}

	*(__le32 *)buf = cpu_to_le32(WL_BSS_INFO_MAX);

2912 2913
	err = brcmf_fil_cmd_data_get(netdev_priv(ndev), BRCMF_C_GET_BSS_INFO,
				     buf, WL_BSS_INFO_MAX);
2914
	if (err) {
2915
		bphy_err(drvr, "WLC_GET_BSS_INFO failed: %d\n", err);
2916 2917 2918
		goto CleanUp;
	}

2919
	bi = (struct brcmf_bss_info_le *)(buf + 4);
2920

2921 2922
	ch.chspec = le16_to_cpu(bi->chanspec);
	cfg->d11inf.decchspec(&ch);
2923

2924
	if (ch.band == BRCMU_CHAN_BAND_2G)
2925
		band = wiphy->bands[NL80211_BAND_2GHZ];
2926
	else
2927
		band = wiphy->bands[NL80211_BAND_5GHZ];
2928

2929
	freq = ieee80211_channel_to_frequency(ch.control_ch_num, band->band);
Hante Meuleman's avatar
Hante Meuleman committed
2930
	cfg->channel = freq;
2931 2932 2933 2934 2935 2936 2937 2938
	notify_channel = ieee80211_get_channel(wiphy, freq);

	notify_capability = le16_to_cpu(bi->capability);
	notify_interval = le16_to_cpu(bi->beacon_period);
	notify_ie = (u8 *)bi + le16_to_cpu(bi->ie_offset);
	notify_ielen = le32_to_cpu(bi->ie_length);
	notify_signal = (s16)le16_to_cpu(bi->RSSI) * 100;

2939
	brcmf_dbg(CONN, "channel: %d(%d)\n", ch.control_ch_num, freq);
2940 2941 2942
	brcmf_dbg(CONN, "capability: %X\n", notify_capability);
	brcmf_dbg(CONN, "beacon interval: %d\n", notify_interval);
	brcmf_dbg(CONN, "signal: %d\n", notify_signal);
2943

2944 2945 2946 2947 2948
	bss = cfg80211_inform_bss(wiphy, notify_channel,
				  CFG80211_BSS_FTYPE_UNKNOWN, bssid, 0,
				  notify_capability, notify_interval,
				  notify_ie, notify_ielen, notify_signal,
				  GFP_KERNEL);
2949

2950 2951 2952 2953 2954
	if (!bss) {
		err = -ENOMEM;
		goto CleanUp;
	}

2955
	cfg80211_put_bss(wiphy, bss);
2956

2957 2958 2959 2960
CleanUp:

	kfree(buf);

2961
	brcmf_dbg(TRACE, "Exit\n");
2962 2963 2964 2965

	return err;
}

2966 2967
static s32 brcmf_update_bss_info(struct brcmf_cfg80211_info *cfg,
				 struct brcmf_if *ifp)
2968
{
2969
	struct brcmf_pub *drvr = cfg->pub;
2970
	struct brcmf_bss_info_le *bi;
2971
	const struct brcmf_tlv *tim;
2972 2973 2974 2975 2976 2977
	u16 beacon_interval;
	u8 dtim_period;
	size_t ie_len;
	u8 *ie;
	s32 err = 0;

2978
	brcmf_dbg(TRACE, "Enter\n");
2979
	if (brcmf_is_ibssmode(ifp->vif))
2980 2981
		return err;

2982
	*(__le32 *)cfg->extra_buf = cpu_to_le32(WL_EXTRA_BUF_MAX);
2983
	err = brcmf_fil_cmd_data_get(ifp, BRCMF_C_GET_BSS_INFO,
2984
				     cfg->extra_buf, WL_EXTRA_BUF_MAX);
2985
	if (err) {
2986
		bphy_err(drvr, "Could not get bss info %d\n", err);
2987 2988 2989
		goto update_bss_info_out;
	}

2990 2991
	bi = (struct brcmf_bss_info_le *)(cfg->extra_buf + 4);
	err = brcmf_inform_single_bss(cfg, bi);
2992 2993 2994 2995 2996 2997 2998
	if (err)
		goto update_bss_info_out;

	ie = ((u8 *)bi) + le16_to_cpu(bi->ie_offset);
	ie_len = le32_to_cpu(bi->ie_length);
	beacon_interval = le16_to_cpu(bi->beacon_period);

2999
	tim = brcmf_parse_tlvs(ie, ie_len, WLAN_EID_TIM);
3000 3001 3002 3003 3004 3005 3006 3007 3008
	if (tim)
		dtim_period = tim->data[1];
	else {
		/*
		* active scan was done so we could not get dtim
		* information out of probe response.
		* so we speficially query dtim information to dongle.
		*/
		u32 var;
3009
		err = brcmf_fil_iovar_int_get(ifp, "dtim_assoc", &var);
3010
		if (err) {
3011
			bphy_err(drvr, "wl dtim_assoc failed (%d)\n", err);
3012 3013 3014 3015 3016 3017
			goto update_bss_info_out;
		}
		dtim_period = (u8)var;
	}

update_bss_info_out:
3018
	brcmf_dbg(TRACE, "Exit");
3019 3020 3021
	return err;
}

3022
void brcmf_abort_scanning(struct brcmf_cfg80211_info *cfg)
3023
{
3024
	struct escan_info *escan = &cfg->escan_info;
3025

3026
	set_bit(BRCMF_SCAN_STATUS_ABORT, &cfg->scan_status);
3027
	if (cfg->int_escan_map || cfg->scan_request) {
3028
		escan->escan_state = WL_ESCAN_STATE_IDLE;
3029
		brcmf_notify_escan_complete(cfg, escan->ifp, true, true);
3030
	}
3031 3032
	clear_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status);
	clear_bit(BRCMF_SCAN_STATUS_ABORT, &cfg->scan_status);
3033 3034
}

3035 3036
static void brcmf_cfg80211_escan_timeout_worker(struct work_struct *work)
{
3037 3038
	struct brcmf_cfg80211_info *cfg =
			container_of(work, struct brcmf_cfg80211_info,
3039 3040
				     escan_timeout_work);

3041
	brcmf_inform_bss(cfg);
3042
	brcmf_notify_escan_complete(cfg, cfg->escan_info.ifp, true, true);
3043 3044
}

3045
static void brcmf_escan_timeout(struct timer_list *t)
3046
{
3047
	struct brcmf_cfg80211_info *cfg =
3048
			from_timer(cfg, t, escan_timeout);
3049
	struct brcmf_pub *drvr = cfg->pub;
3050

3051
	if (cfg->int_escan_map || cfg->scan_request) {
3052
		bphy_err(drvr, "timer expired\n");
3053
		schedule_work(&cfg->escan_timeout_work);
3054 3055 3056 3057
	}
}

static s32
3058 3059
brcmf_compare_update_same_bss(struct brcmf_cfg80211_info *cfg,
			      struct brcmf_bss_info_le *bss,
3060 3061
			      struct brcmf_bss_info_le *bss_info_le)
{
3062 3063 3064 3065 3066 3067 3068
	struct brcmu_chan ch_bss, ch_bss_info_le;

	ch_bss.chspec = le16_to_cpu(bss->chanspec);
	cfg->d11inf.decchspec(&ch_bss);
	ch_bss_info_le.chspec = le16_to_cpu(bss_info_le->chanspec);
	cfg->d11inf.decchspec(&ch_bss_info_le);

3069
	if (!memcmp(&bss_info_le->BSSID, &bss->BSSID, ETH_ALEN) &&
3070
		ch_bss.band == ch_bss_info_le.band &&
3071 3072
		bss_info_le->SSID_len == bss->SSID_len &&
		!memcmp(bss_info_le->SSID, bss->SSID, bss_info_le->SSID_len)) {
3073 3074
		if ((bss->flags & BRCMF_BSS_RSSI_ON_CHANNEL) ==
			(bss_info_le->flags & BRCMF_BSS_RSSI_ON_CHANNEL)) {
3075 3076 3077
			s16 bss_rssi = le16_to_cpu(bss->RSSI);
			s16 bss_info_rssi = le16_to_cpu(bss_info_le->RSSI);

3078 3079 3080
			/* preserve max RSSI if the measurements are
			* both on-channel or both off-channel
			*/
3081
			if (bss_info_rssi > bss_rssi)
3082
				bss->RSSI = bss_info_le->RSSI;
3083 3084
		} else if ((bss->flags & BRCMF_BSS_RSSI_ON_CHANNEL) &&
			(bss_info_le->flags & BRCMF_BSS_RSSI_ON_CHANNEL) == 0) {
3085 3086 3087 3088
			/* preserve the on-channel rssi measurement
			* if the new measurement is off channel
			*/
			bss->RSSI = bss_info_le->RSSI;
3089
			bss->flags |= BRCMF_BSS_RSSI_ON_CHANNEL;
3090 3091 3092 3093 3094 3095 3096
		}
		return 1;
	}
	return 0;
}

static s32
3097
brcmf_cfg80211_escan_handler(struct brcmf_if *ifp,
3098 3099
			     const struct brcmf_event_msg *e, void *data)
{
3100 3101
	struct brcmf_pub *drvr = ifp->drvr;
	struct brcmf_cfg80211_info *cfg = drvr->config;
3102 3103
	s32 status;
	struct brcmf_escan_result_le *escan_result_le;
3104
	u32 escan_buflen;
3105 3106 3107 3108 3109
	struct brcmf_bss_info_le *bss_info_le;
	struct brcmf_bss_info_le *bss = NULL;
	u32 bi_length;
	struct brcmf_scan_results *list;
	u32 i;
3110
	bool aborted;
3111

3112
	status = e->status;
3113

3114 3115 3116
	if (status == BRCMF_E_STATUS_ABORT)
		goto exit;

3117
	if (!test_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status)) {
3118
		bphy_err(drvr, "scan not ready, bsscfgidx=%d\n",
3119
			 ifp->bsscfgidx);
3120 3121 3122 3123
		return -EPERM;
	}

	if (status == BRCMF_E_STATUS_PARTIAL) {
3124
		brcmf_dbg(SCAN, "ESCAN Partial result\n");
3125
		if (e->datalen < sizeof(*escan_result_le)) {
3126
			bphy_err(drvr, "invalid event data length\n");
3127 3128
			goto exit;
		}
3129 3130
		escan_result_le = (struct brcmf_escan_result_le *) data;
		if (!escan_result_le) {
3131
			bphy_err(drvr, "Invalid escan result (NULL pointer)\n");
3132 3133
			goto exit;
		}
3134 3135 3136 3137
		escan_buflen = le32_to_cpu(escan_result_le->buflen);
		if (escan_buflen > BRCMF_ESCAN_BUF_SIZE ||
		    escan_buflen > e->datalen ||
		    escan_buflen < sizeof(*escan_result_le)) {
3138
			bphy_err(drvr, "Invalid escan buffer length: %d\n",
3139
				 escan_buflen);
3140 3141
			goto exit;
		}
3142
		if (le16_to_cpu(escan_result_le->bss_count) != 1) {
3143
			bphy_err(drvr, "Invalid bss_count %d: ignoring\n",
3144
				 escan_result_le->bss_count);
3145 3146 3147 3148
			goto exit;
		}
		bss_info_le = &escan_result_le->bss_info_le;

3149 3150 3151
		if (brcmf_p2p_scan_finding_common_channel(cfg, bss_info_le))
			goto exit;

3152
		if (!cfg->int_escan_map && !cfg->scan_request) {
3153 3154 3155 3156
			brcmf_dbg(SCAN, "result without cfg80211 request\n");
			goto exit;
		}

3157
		bi_length = le32_to_cpu(bss_info_le->length);
3158
		if (bi_length != escan_buflen -	WL_ESCAN_RESULTS_FIXED_SIZE) {
3159
			bphy_err(drvr, "Ignoring invalid bss_info length: %d\n",
3160
				 bi_length);
3161 3162 3163
			goto exit;
		}

3164
		if (!(cfg_to_wiphy(cfg)->interface_modes &
3165 3166 3167
					BIT(NL80211_IFTYPE_ADHOC))) {
			if (le16_to_cpu(bss_info_le->capability) &
						WLAN_CAPABILITY_IBSS) {
3168
				bphy_err(drvr, "Ignoring IBSS result\n");
3169 3170 3171 3172 3173
				goto exit;
			}
		}

		list = (struct brcmf_scan_results *)
3174
				cfg->escan_info.escan_buf;
3175
		if (bi_length > BRCMF_ESCAN_BUF_SIZE - list->buflen) {
3176
			bphy_err(drvr, "Buffer is too small: ignoring\n");
3177 3178 3179 3180 3181 3182 3183
			goto exit;
		}

		for (i = 0; i < list->count; i++) {
			bss = bss ? (struct brcmf_bss_info_le *)
				((unsigned char *)bss +
				le32_to_cpu(bss->length)) : list->bss_info_le;
3184 3185
			if (brcmf_compare_update_same_bss(cfg, bss,
							  bss_info_le))
3186 3187
				goto exit;
		}
3188 3189
		memcpy(&cfg->escan_info.escan_buf[list->buflen], bss_info_le,
		       bi_length);
3190 3191 3192 3193
		list->version = le32_to_cpu(bss_info_le->version);
		list->buflen += bi_length;
		list->count++;
	} else {
3194
		cfg->escan_info.escan_state = WL_ESCAN_STATE_IDLE;
3195 3196
		if (brcmf_p2p_scan_finding_common_channel(cfg, NULL))
			goto exit;
3197
		if (cfg->int_escan_map || cfg->scan_request) {
3198
			brcmf_inform_bss(cfg);
3199
			aborted = status != BRCMF_E_STATUS_SUCCESS;
3200
			brcmf_notify_escan_complete(cfg, ifp, aborted, false);
3201
		} else
3202 3203
			brcmf_dbg(SCAN, "Ignored scan complete result 0x%x\n",
				  status);
3204 3205
	}
exit:
3206
	return 0;
3207 3208
}

3209
static void brcmf_init_escan(struct brcmf_cfg80211_info *cfg)
3210
{
3211 3212
	brcmf_fweh_register(cfg->pub, BRCMF_E_ESCAN_RESULT,
			    brcmf_cfg80211_escan_handler);
3213 3214
	cfg->escan_info.escan_state = WL_ESCAN_STATE_IDLE;
	/* Init scan_timeout timer */
3215
	timer_setup(&cfg->escan_timeout, brcmf_escan_timeout, 0);
3216 3217
	INIT_WORK(&cfg->escan_timeout_work,
		  brcmf_cfg80211_escan_timeout_worker);
3218 3219
}

3220 3221 3222 3223 3224 3225 3226 3227 3228 3229 3230 3231 3232 3233 3234 3235 3236 3237 3238 3239 3240 3241 3242
static struct cfg80211_scan_request *
brcmf_alloc_internal_escan_request(struct wiphy *wiphy, u32 n_netinfo) {
	struct cfg80211_scan_request *req;
	size_t req_size;

	req_size = sizeof(*req) +
		   n_netinfo * sizeof(req->channels[0]) +
		   n_netinfo * sizeof(*req->ssids);

	req = kzalloc(req_size, GFP_KERNEL);
	if (req) {
		req->wiphy = wiphy;
		req->ssids = (void *)(&req->channels[0]) +
			     n_netinfo * sizeof(req->channels[0]);
	}
	return req;
}

static int brcmf_internal_escan_add_info(struct cfg80211_scan_request *req,
					 u8 *ssid, u8 ssid_len, u8 channel)
{
	struct ieee80211_channel *chan;
	enum nl80211_band band;
3243
	int freq, i;
3244 3245 3246 3247 3248 3249 3250 3251 3252 3253 3254 3255 3256 3257

	if (channel <= CH_MAX_2G_CHANNEL)
		band = NL80211_BAND_2GHZ;
	else
		band = NL80211_BAND_5GHZ;

	freq = ieee80211_channel_to_frequency(channel, band);
	if (!freq)
		return -EINVAL;

	chan = ieee80211_get_channel(req->wiphy, freq);
	if (!chan)
		return -EINVAL;

3258 3259 3260 3261 3262 3263
	for (i = 0; i < req->n_channels; i++) {
		if (req->channels[i] == chan)
			break;
	}
	if (i == req->n_channels)
		req->channels[req->n_channels++] = chan;
3264

3265 3266 3267 3268 3269 3270 3271 3272 3273
	for (i = 0; i < req->n_ssids; i++) {
		if (req->ssids[i].ssid_len == ssid_len &&
		    !memcmp(req->ssids[i].ssid, ssid, ssid_len))
			break;
	}
	if (i == req->n_ssids) {
		memcpy(req->ssids[req->n_ssids].ssid, ssid, ssid_len);
		req->ssids[req->n_ssids++].ssid_len = ssid_len;
	}
3274 3275 3276
	return 0;
}

3277
static int brcmf_start_internal_escan(struct brcmf_if *ifp, u32 fwmap,
3278 3279 3280 3281 3282 3283
				      struct cfg80211_scan_request *request)
{
	struct brcmf_cfg80211_info *cfg = ifp->drvr->config;
	int err;

	if (test_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status)) {
3284 3285 3286
		if (cfg->int_escan_map)
			brcmf_dbg(SCAN, "aborting internal scan: map=%u\n",
				  cfg->int_escan_map);
3287 3288 3289 3290
		/* Abort any on-going scan */
		brcmf_abort_scanning(cfg);
	}

3291
	brcmf_dbg(SCAN, "start internal scan: map=%u\n", fwmap);
3292 3293 3294 3295 3296 3297 3298
	set_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status);
	cfg->escan_info.run = brcmf_run_escan;
	err = brcmf_do_escan(ifp, request);
	if (err) {
		clear_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status);
		return err;
	}
3299
	cfg->int_escan_map = fwmap;
3300 3301 3302
	return 0;
}

3303 3304 3305 3306 3307 3308 3309 3310 3311 3312 3313 3314 3315 3316 3317 3318 3319 3320 3321 3322 3323 3324
static struct brcmf_pno_net_info_le *
brcmf_get_netinfo_array(struct brcmf_pno_scanresults_le *pfn_v1)
{
	struct brcmf_pno_scanresults_v2_le *pfn_v2;
	struct brcmf_pno_net_info_le *netinfo;

	switch (pfn_v1->version) {
	default:
		WARN_ON(1);
		/* fall-thru */
	case cpu_to_le32(1):
		netinfo = (struct brcmf_pno_net_info_le *)(pfn_v1 + 1);
		break;
	case cpu_to_le32(2):
		pfn_v2 = (struct brcmf_pno_scanresults_v2_le *)pfn_v1;
		netinfo = (struct brcmf_pno_net_info_le *)(pfn_v2 + 1);
		break;
	}

	return netinfo;
}

3325 3326 3327 3328 3329 3330
/* PFN result doesn't have all the info which are required by the supplicant
 * (For e.g IEs) Do a target Escan so that sched scan results are reported
 * via wl_inform_single_bss in the required format. Escan does require the
 * scan request in the form of cfg80211_scan_request. For timebeing, create
 * cfg80211_scan_request one out of the received PNO event.
 */
3331
static s32
3332 3333
brcmf_notify_sched_scan_results(struct brcmf_if *ifp,
				const struct brcmf_event_msg *e, void *data)
3334
{
3335 3336
	struct brcmf_pub *drvr = ifp->drvr;
	struct brcmf_cfg80211_info *cfg = drvr->config;
3337 3338 3339
	struct brcmf_pno_net_info_le *netinfo, *netinfo_start;
	struct cfg80211_scan_request *request = NULL;
	struct wiphy *wiphy = cfg_to_wiphy(cfg);
3340
	int i, err = 0;
3341
	struct brcmf_pno_scanresults_le *pfn_result;
3342
	u32 bucket_map;
3343 3344
	u32 result_count;
	u32 status;
3345
	u32 datalen;
3346 3347 3348

	brcmf_dbg(SCAN, "Enter\n");

3349 3350 3351 3352 3353
	if (e->datalen < (sizeof(*pfn_result) + sizeof(*netinfo))) {
		brcmf_dbg(SCAN, "Event data to small. Ignore\n");
		return 0;
	}

3354
	if (e->event_code == BRCMF_E_PFN_NET_LOST) {
3355
		brcmf_dbg(SCAN, "PFN NET LOST event. Do Nothing\n");
3356 3357 3358
		return 0;
	}

3359 3360 3361
	pfn_result = (struct brcmf_pno_scanresults_le *)data;
	result_count = le32_to_cpu(pfn_result->count);
	status = le32_to_cpu(pfn_result->status);
3362

3363 3364 3365 3366 3367
	/* PFN event is limited to fit 512 bytes so we may get
	 * multiple NET_FOUND events. For now place a warning here.
	 */
	WARN_ON(status != BRCMF_PNO_SCAN_COMPLETE);
	brcmf_dbg(SCAN, "PFN NET FOUND event. count: %d\n", result_count);
3368
	if (!result_count) {
3369
		bphy_err(drvr, "FALSE PNO Event. (pfn_count == 0)\n");
3370
		goto out_err;
3371
	}
3372 3373 3374 3375

	netinfo_start = brcmf_get_netinfo_array(pfn_result);
	datalen = e->datalen - ((void *)netinfo_start - (void *)pfn_result);
	if (datalen < result_count * sizeof(*netinfo)) {
3376
		bphy_err(drvr, "insufficient event data\n");
3377 3378 3379
		goto out_err;
	}

3380 3381 3382 3383 3384
	request = brcmf_alloc_internal_escan_request(wiphy,
						     result_count);
	if (!request) {
		err = -ENOMEM;
		goto out_err;
3385 3386
	}

3387
	bucket_map = 0;
3388 3389
	for (i = 0; i < result_count; i++) {
		netinfo = &netinfo_start[i];
3390

3391 3392
		if (netinfo->SSID_len > IEEE80211_MAX_SSID_LEN)
			netinfo->SSID_len = IEEE80211_MAX_SSID_LEN;
3393 3394
		brcmf_dbg(SCAN, "SSID:%.32s Channel:%d\n",
			  netinfo->SSID, netinfo->channel);
3395
		bucket_map |= brcmf_pno_get_bucket_map(cfg->pno, netinfo);
3396 3397 3398 3399 3400
		err = brcmf_internal_escan_add_info(request,
						    netinfo->SSID,
						    netinfo->SSID_len,
						    netinfo->channel);
		if (err)
3401 3402 3403
			goto out_err;
	}

3404 3405 3406 3407
	if (!bucket_map)
		goto free_req;

	err = brcmf_start_internal_escan(ifp, bucket_map, request);
3408 3409
	if (!err)
		goto free_req;
3410 3411

out_err:
3412
	cfg80211_sched_scan_stopped(wiphy, 0);
3413 3414
free_req:
	kfree(request);
3415 3416 3417 3418 3419 3420
	return err;
}

static int
brcmf_cfg80211_sched_scan_start(struct wiphy *wiphy,
				struct net_device *ndev,
3421
				struct cfg80211_sched_scan_request *req)
3422
{
3423
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
3424 3425
	struct brcmf_if *ifp = netdev_priv(ndev);
	struct brcmf_pub *drvr = cfg->pub;
3426

3427
	brcmf_dbg(SCAN, "Enter: n_match_sets=%d n_ssids=%d\n",
3428
		  req->n_match_sets, req->n_ssids);
3429

3430
	if (test_bit(BRCMF_SCAN_STATUS_SUPPRESS, &cfg->scan_status)) {
3431
		bphy_err(drvr, "Scanning suppressed: status=%lu\n",
3432
			 cfg->scan_status);
3433 3434 3435
		return -EAGAIN;
	}

3436 3437 3438
	if (req->n_match_sets <= 0) {
		brcmf_dbg(SCAN, "invalid number of matchsets specified: %d\n",
			  req->n_match_sets);
3439 3440 3441
		return -EINVAL;
	}

3442
	return brcmf_pno_start_sched_scan(ifp, req);
3443 3444 3445
}

static int brcmf_cfg80211_sched_scan_stop(struct wiphy *wiphy,
3446
					  struct net_device *ndev, u64 reqid)
3447 3448
{
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
3449
	struct brcmf_if *ifp = netdev_priv(ndev);
3450 3451

	brcmf_dbg(SCAN, "enter\n");
3452 3453
	brcmf_pno_stop_sched_scan(ifp, reqid);
	if (cfg->int_escan_map)
3454
		brcmf_notify_escan_complete(cfg, ifp, true, true);
3455 3456 3457 3458 3459 3460 3461 3462 3463 3464 3465 3466 3467 3468 3469 3470 3471 3472 3473 3474 3475 3476 3477 3478 3479 3480 3481 3482 3483 3484 3485 3486 3487 3488 3489 3490 3491 3492 3493 3494 3495 3496 3497 3498 3499 3500 3501 3502 3503 3504 3505 3506 3507 3508 3509
	return 0;
}

static __always_inline void brcmf_delay(u32 ms)
{
	if (ms < 1000 / HZ) {
		cond_resched();
		mdelay(ms);
	} else {
		msleep(ms);
	}
}

static s32 brcmf_config_wowl_pattern(struct brcmf_if *ifp, u8 cmd[4],
				     u8 *pattern, u32 patternsize, u8 *mask,
				     u32 packet_offset)
{
	struct brcmf_fil_wowl_pattern_le *filter;
	u32 masksize;
	u32 patternoffset;
	u8 *buf;
	u32 bufsize;
	s32 ret;

	masksize = (patternsize + 7) / 8;
	patternoffset = sizeof(*filter) - sizeof(filter->cmd) + masksize;

	bufsize = sizeof(*filter) + patternsize + masksize;
	buf = kzalloc(bufsize, GFP_KERNEL);
	if (!buf)
		return -ENOMEM;
	filter = (struct brcmf_fil_wowl_pattern_le *)buf;

	memcpy(filter->cmd, cmd, 4);
	filter->masksize = cpu_to_le32(masksize);
	filter->offset = cpu_to_le32(packet_offset);
	filter->patternoffset = cpu_to_le32(patternoffset);
	filter->patternsize = cpu_to_le32(patternsize);
	filter->type = cpu_to_le32(BRCMF_WOWL_PATTERN_TYPE_BITMAP);

	if ((mask) && (masksize))
		memcpy(buf + sizeof(*filter), mask, masksize);
	if ((pattern) && (patternsize))
		memcpy(buf + sizeof(*filter) + masksize, pattern, patternsize);

	ret = brcmf_fil_iovar_data_set(ifp, "wowl_pattern", buf, bufsize);

	kfree(buf);
	return ret;
}

static s32
brcmf_wowl_nd_results(struct brcmf_if *ifp, const struct brcmf_event_msg *e,
		      void *data)
{
3510 3511
	struct brcmf_pub *drvr = ifp->drvr;
	struct brcmf_cfg80211_info *cfg = drvr->config;
3512 3513 3514 3515 3516
	struct brcmf_pno_scanresults_le *pfn_result;
	struct brcmf_pno_net_info_le *netinfo;

	brcmf_dbg(SCAN, "Enter\n");

3517 3518 3519 3520 3521
	if (e->datalen < (sizeof(*pfn_result) + sizeof(*netinfo))) {
		brcmf_dbg(SCAN, "Event data to small. Ignore\n");
		return 0;
	}

3522 3523 3524 3525 3526 3527 3528 3529
	pfn_result = (struct brcmf_pno_scanresults_le *)data;

	if (e->event_code == BRCMF_E_PFN_NET_LOST) {
		brcmf_dbg(SCAN, "PFN NET LOST event. Ignore\n");
		return 0;
	}

	if (le32_to_cpu(pfn_result->count) < 1) {
3530
		bphy_err(drvr, "Invalid result count, expected 1 (%d)\n",
3531
			 le32_to_cpu(pfn_result->count));
3532 3533 3534
		return -EINVAL;
	}

3535
	netinfo = brcmf_get_netinfo_array(pfn_result);
3536 3537
	if (netinfo->SSID_len > IEEE80211_MAX_SSID_LEN)
		netinfo->SSID_len = IEEE80211_MAX_SSID_LEN;
3538 3539 3540 3541 3542 3543 3544 3545 3546 3547 3548 3549 3550 3551 3552 3553 3554 3555 3556 3557 3558 3559
	memcpy(cfg->wowl.nd->ssid.ssid, netinfo->SSID, netinfo->SSID_len);
	cfg->wowl.nd->ssid.ssid_len = netinfo->SSID_len;
	cfg->wowl.nd->n_channels = 1;
	cfg->wowl.nd->channels[0] =
		ieee80211_channel_to_frequency(netinfo->channel,
			netinfo->channel <= CH_MAX_2G_CHANNEL ?
					NL80211_BAND_2GHZ : NL80211_BAND_5GHZ);
	cfg->wowl.nd_info->n_matches = 1;
	cfg->wowl.nd_info->matches[0] = cfg->wowl.nd;

	/* Inform (the resume task) that the net detect information was recvd */
	cfg->wowl.nd_data_completed = true;
	wake_up(&cfg->wowl.nd_data_wait);

	return 0;
}

#ifdef CONFIG_PM

static void brcmf_report_wowl_wakeind(struct wiphy *wiphy, struct brcmf_if *ifp)
{
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
3560
	struct brcmf_pub *drvr = cfg->pub;
3561 3562 3563 3564 3565 3566 3567 3568 3569 3570
	struct brcmf_wowl_wakeind_le wake_ind_le;
	struct cfg80211_wowlan_wakeup wakeup_data;
	struct cfg80211_wowlan_wakeup *wakeup;
	u32 wakeind;
	s32 err;
	int timeout;

	err = brcmf_fil_iovar_data_get(ifp, "wowl_wakeind", &wake_ind_le,
				       sizeof(wake_ind_le));
	if (err) {
3571
		bphy_err(drvr, "Get wowl_wakeind failed, err = %d\n", err);
3572 3573 3574 3575 3576 3577 3578 3579 3580 3581 3582 3583 3584 3585 3586 3587 3588 3589 3590 3591 3592 3593 3594 3595 3596 3597 3598 3599 3600 3601 3602 3603 3604 3605 3606 3607 3608 3609 3610 3611
		return;
	}

	wakeind = le32_to_cpu(wake_ind_le.ucode_wakeind);
	if (wakeind & (BRCMF_WOWL_MAGIC | BRCMF_WOWL_DIS | BRCMF_WOWL_BCN |
		       BRCMF_WOWL_RETR | BRCMF_WOWL_NET |
		       BRCMF_WOWL_PFN_FOUND)) {
		wakeup = &wakeup_data;
		memset(&wakeup_data, 0, sizeof(wakeup_data));
		wakeup_data.pattern_idx = -1;

		if (wakeind & BRCMF_WOWL_MAGIC) {
			brcmf_dbg(INFO, "WOWL Wake indicator: BRCMF_WOWL_MAGIC\n");
			wakeup_data.magic_pkt = true;
		}
		if (wakeind & BRCMF_WOWL_DIS) {
			brcmf_dbg(INFO, "WOWL Wake indicator: BRCMF_WOWL_DIS\n");
			wakeup_data.disconnect = true;
		}
		if (wakeind & BRCMF_WOWL_BCN) {
			brcmf_dbg(INFO, "WOWL Wake indicator: BRCMF_WOWL_BCN\n");
			wakeup_data.disconnect = true;
		}
		if (wakeind & BRCMF_WOWL_RETR) {
			brcmf_dbg(INFO, "WOWL Wake indicator: BRCMF_WOWL_RETR\n");
			wakeup_data.disconnect = true;
		}
		if (wakeind & BRCMF_WOWL_NET) {
			brcmf_dbg(INFO, "WOWL Wake indicator: BRCMF_WOWL_NET\n");
			/* For now always map to pattern 0, no API to get
			 * correct information available at the moment.
			 */
			wakeup_data.pattern_idx = 0;
		}
		if (wakeind & BRCMF_WOWL_PFN_FOUND) {
			brcmf_dbg(INFO, "WOWL Wake indicator: BRCMF_WOWL_PFN_FOUND\n");
			timeout = wait_event_timeout(cfg->wowl.nd_data_wait,
				cfg->wowl.nd_data_completed,
				BRCMF_ND_INFO_TIMEOUT);
			if (!timeout)
3612
				bphy_err(drvr, "No result for wowl net detect\n");
3613 3614 3615
			else
				wakeup_data.net_detect = cfg->wowl.nd_info;
		}
3616 3617 3618 3619
		if (wakeind & BRCMF_WOWL_GTK_FAILURE) {
			brcmf_dbg(INFO, "WOWL Wake indicator: BRCMF_WOWL_GTK_FAILURE\n");
			wakeup_data.gtk_rekey_failure = true;
		}
3620 3621 3622 3623 3624 3625 3626 3627 3628 3629 3630 3631 3632 3633 3634 3635 3636 3637 3638 3639 3640 3641 3642 3643 3644 3645
	} else {
		wakeup = NULL;
	}
	cfg80211_report_wowlan_wakeup(&ifp->vif->wdev, wakeup, GFP_KERNEL);
}

#else

static void brcmf_report_wowl_wakeind(struct wiphy *wiphy, struct brcmf_if *ifp)
{
}

#endif /* CONFIG_PM */

static s32 brcmf_cfg80211_resume(struct wiphy *wiphy)
{
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
	struct net_device *ndev = cfg_to_ndev(cfg);
	struct brcmf_if *ifp = netdev_priv(ndev);

	brcmf_dbg(TRACE, "Enter\n");

	if (cfg->wowl.active) {
		brcmf_report_wowl_wakeind(wiphy, ifp);
		brcmf_fil_iovar_int_set(ifp, "wowl_clear", 0);
		brcmf_config_wowl_pattern(ifp, "clr", NULL, 0, NULL, 0);
3646 3647
		if (!brcmf_feat_is_enabled(ifp, BRCMF_FEAT_WOWL_ARP_ND))
			brcmf_configure_arp_nd_offload(ifp, true);
3648
		brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_PM,
3649 3650 3651
				      cfg->wowl.pre_pmmode);
		cfg->wowl.active = false;
		if (cfg->wowl.nd_enabled) {
3652
			brcmf_cfg80211_sched_scan_stop(cfg->wiphy, ifp->ndev, 0);
3653 3654 3655 3656 3657
			brcmf_fweh_unregister(cfg->pub, BRCMF_E_PFN_NET_FOUND);
			brcmf_fweh_register(cfg->pub, BRCMF_E_PFN_NET_FOUND,
					    brcmf_notify_sched_scan_results);
			cfg->wowl.nd_enabled = false;
		}
3658
	}
3659 3660 3661
	return 0;
}

3662 3663 3664 3665 3666
static void brcmf_configure_wowl(struct brcmf_cfg80211_info *cfg,
				 struct brcmf_if *ifp,
				 struct cfg80211_wowlan *wowl)
{
	u32 wowl_config;
3667
	struct brcmf_wowl_wakeind_le wowl_wakeind;
3668
	u32 i;
3669 3670 3671

	brcmf_dbg(TRACE, "Suspend, wowl config.\n");

3672 3673
	if (!brcmf_feat_is_enabled(ifp, BRCMF_FEAT_WOWL_ARP_ND))
		brcmf_configure_arp_nd_offload(ifp, false);
3674
	brcmf_fil_cmd_int_get(ifp, BRCMF_C_GET_PM, &cfg->wowl.pre_pmmode);
3675 3676 3677 3678
	brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_PM, PM_MAX);

	wowl_config = 0;
	if (wowl->disconnect)
3679
		wowl_config = BRCMF_WOWL_DIS | BRCMF_WOWL_BCN | BRCMF_WOWL_RETR;
3680
	if (wowl->magic_pkt)
3681 3682 3683 3684 3685 3686 3687 3688 3689 3690 3691
		wowl_config |= BRCMF_WOWL_MAGIC;
	if ((wowl->patterns) && (wowl->n_patterns)) {
		wowl_config |= BRCMF_WOWL_NET;
		for (i = 0; i < wowl->n_patterns; i++) {
			brcmf_config_wowl_pattern(ifp, "add",
				(u8 *)wowl->patterns[i].pattern,
				wowl->patterns[i].pattern_len,
				(u8 *)wowl->patterns[i].mask,
				wowl->patterns[i].pkt_offset);
		}
	}
3692 3693 3694 3695 3696 3697 3698 3699 3700 3701 3702 3703
	if (wowl->nd_config) {
		brcmf_cfg80211_sched_scan_start(cfg->wiphy, ifp->ndev,
						wowl->nd_config);
		wowl_config |= BRCMF_WOWL_PFN_FOUND;

		cfg->wowl.nd_data_completed = false;
		cfg->wowl.nd_enabled = true;
		/* Now reroute the event for PFN to the wowl function. */
		brcmf_fweh_unregister(cfg->pub, BRCMF_E_PFN_NET_FOUND);
		brcmf_fweh_register(cfg->pub, BRCMF_E_PFN_NET_FOUND,
				    brcmf_wowl_nd_results);
	}
3704 3705
	if (wowl->gtk_rekey_failure)
		wowl_config |= BRCMF_WOWL_GTK_FAILURE;
3706 3707 3708
	if (!test_bit(BRCMF_VIF_STATUS_CONNECTED, &ifp->vif->sme_state))
		wowl_config |= BRCMF_WOWL_UNASSOC;

3709 3710 3711
	memcpy(&wowl_wakeind, "clear", 6);
	brcmf_fil_iovar_data_set(ifp, "wowl_wakeind", &wowl_wakeind,
				 sizeof(wowl_wakeind));
3712 3713 3714
	brcmf_fil_iovar_int_set(ifp, "wowl", wowl_config);
	brcmf_fil_iovar_int_set(ifp, "wowl_activate", 1);
	brcmf_bus_wowl_config(cfg->pub->bus_if, true);
3715
	cfg->wowl.active = true;
3716 3717
}

3718
static s32 brcmf_cfg80211_suspend(struct wiphy *wiphy,
3719
				  struct cfg80211_wowlan *wowl)
3720
{
3721 3722
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
	struct net_device *ndev = cfg_to_ndev(cfg);
3723
	struct brcmf_if *ifp = netdev_priv(ndev);
3724
	struct brcmf_cfg80211_vif *vif;
3725

3726
	brcmf_dbg(TRACE, "Enter\n");
3727

3728
	/* if the primary net_device is not READY there is nothing
3729
	 * we can do but pray resume goes smoothly.
3730
	 */
3731
	if (!check_vif_up(ifp->vif))
3732
		goto exit;
3733

3734 3735
	/* Stop scheduled scan */
	if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_PNO))
3736
		brcmf_cfg80211_sched_scan_stop(wiphy, ndev, 0);
3737

3738 3739
	/* end any scanning */
	if (test_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status))
3740
		brcmf_abort_scanning(cfg);
3741

3742 3743 3744 3745 3746 3747 3748 3749 3750
	if (wowl == NULL) {
		brcmf_bus_wowl_config(cfg->pub->bus_if, false);
		list_for_each_entry(vif, &cfg->vif_list, list) {
			if (!test_bit(BRCMF_VIF_STATUS_READY, &vif->sme_state))
				continue;
			/* While going to suspend if associated with AP
			 * disassociate from AP to save power while system is
			 * in suspended state
			 */
3751
			brcmf_link_down(vif, WLAN_REASON_UNSPECIFIED);
3752 3753
			/* Make sure WPA_Supplicant receives all the event
			 * generated due to DISASSOC call to the fw to keep
3754 3755 3756
			 * the state fw and WPA_Supplicant state consistent
			 */
			brcmf_delay(500);
3757
		}
3758 3759
		/* Configure MPC */
		brcmf_set_mpc(ifp, 1);
3760 3761

	} else {
3762 3763
		/* Configure WOWL paramaters */
		brcmf_configure_wowl(cfg, ifp, wowl);
3764 3765
	}

3766 3767 3768 3769
exit:
	brcmf_dbg(TRACE, "Exit\n");
	/* clear any scanning activity */
	cfg->scan_status = 0;
3770 3771 3772
	return 0;
}

3773 3774
static __used s32
brcmf_update_pmklist(struct brcmf_cfg80211_info *cfg, struct brcmf_if *ifp)
3775
{
3776
	struct brcmf_pmk_list_le *pmk_list;
3777
	int i;
3778 3779
	u32 npmk;
	s32 err;
3780

3781 3782
	pmk_list = &cfg->pmk_list;
	npmk = le32_to_cpu(pmk_list->npmk);
3783

3784 3785 3786
	brcmf_dbg(CONN, "No of elements %d\n", npmk);
	for (i = 0; i < npmk; i++)
		brcmf_dbg(CONN, "PMK[%d]: %pM\n", i, &pmk_list->pmk[i].bssid);
3787

3788 3789
	err = brcmf_fil_iovar_data_set(ifp, "pmkid_info", pmk_list,
				       sizeof(*pmk_list));
3790 3791

	return err;
3792 3793
}

3794 3795 3796
static s32
brcmf_cfg80211_set_pmksa(struct wiphy *wiphy, struct net_device *ndev,
			 struct cfg80211_pmksa *pmksa)
3797
{
3798
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
3799
	struct brcmf_if *ifp = netdev_priv(ndev);
3800
	struct brcmf_pmksa *pmk = &cfg->pmk_list.pmk[0];
3801
	struct brcmf_pub *drvr = cfg->pub;
3802 3803
	s32 err;
	u32 npmk, i;
3804

3805 3806 3807
	brcmf_dbg(TRACE, "Enter\n");
	if (!check_vif_up(ifp->vif))
		return -EIO;
3808

3809 3810 3811 3812 3813 3814 3815 3816 3817 3818 3819 3820
	npmk = le32_to_cpu(cfg->pmk_list.npmk);
	for (i = 0; i < npmk; i++)
		if (!memcmp(pmksa->bssid, pmk[i].bssid, ETH_ALEN))
			break;
	if (i < BRCMF_MAXPMKID) {
		memcpy(pmk[i].bssid, pmksa->bssid, ETH_ALEN);
		memcpy(pmk[i].pmkid, pmksa->pmkid, WLAN_PMKID_LEN);
		if (i == npmk) {
			npmk++;
			cfg->pmk_list.npmk = cpu_to_le32(npmk);
		}
	} else {
3821
		bphy_err(drvr, "Too many PMKSA entries cached %d\n", npmk);
3822 3823 3824
		return -EINVAL;
	}

3825 3826 3827 3828 3829
	brcmf_dbg(CONN, "set_pmksa - PMK bssid: %pM =\n", pmk[npmk].bssid);
	for (i = 0; i < WLAN_PMKID_LEN; i += 4)
		brcmf_dbg(CONN, "%02x %02x %02x %02x\n", pmk[npmk].pmkid[i],
			  pmk[npmk].pmkid[i + 1], pmk[npmk].pmkid[i + 2],
			  pmk[npmk].pmkid[i + 3]);
3830

3831
	err = brcmf_update_pmklist(cfg, ifp);
3832

3833 3834 3835
	brcmf_dbg(TRACE, "Exit\n");
	return err;
}
3836

3837 3838 3839 3840 3841 3842 3843
static s32
brcmf_cfg80211_del_pmksa(struct wiphy *wiphy, struct net_device *ndev,
			 struct cfg80211_pmksa *pmksa)
{
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
	struct brcmf_if *ifp = netdev_priv(ndev);
	struct brcmf_pmksa *pmk = &cfg->pmk_list.pmk[0];
3844
	struct brcmf_pub *drvr = cfg->pub;
3845 3846
	s32 err;
	u32 npmk, i;
3847

3848 3849 3850
	brcmf_dbg(TRACE, "Enter\n");
	if (!check_vif_up(ifp->vif))
		return -EIO;
3851

3852
	brcmf_dbg(CONN, "del_pmksa - PMK bssid = %pM\n", pmksa->bssid);
3853

3854 3855
	npmk = le32_to_cpu(cfg->pmk_list.npmk);
	for (i = 0; i < npmk; i++)
3856
		if (!memcmp(pmksa->bssid, pmk[i].bssid, ETH_ALEN))
3857 3858 3859 3860 3861 3862 3863
			break;

	if ((npmk > 0) && (i < npmk)) {
		for (; i < (npmk - 1); i++) {
			memcpy(&pmk[i].bssid, &pmk[i + 1].bssid, ETH_ALEN);
			memcpy(&pmk[i].pmkid, &pmk[i + 1].pmkid,
			       WLAN_PMKID_LEN);
3864
		}
3865 3866
		memset(&pmk[i], 0, sizeof(*pmk));
		cfg->pmk_list.npmk = cpu_to_le32(npmk - 1);
3867
	} else {
3868
		bphy_err(drvr, "Cache entry not found\n");
3869 3870 3871
		return -EINVAL;
	}

3872 3873 3874 3875 3876
	err = brcmf_update_pmklist(cfg, ifp);

	brcmf_dbg(TRACE, "Exit\n");
	return err;

3877 3878
}

3879 3880
static s32
brcmf_cfg80211_flush_pmksa(struct wiphy *wiphy, struct net_device *ndev)
3881
{
3882
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
3883 3884 3885 3886 3887 3888 3889 3890 3891 3892 3893 3894
	struct brcmf_if *ifp = netdev_priv(ndev);
	s32 err;

	brcmf_dbg(TRACE, "Enter\n");
	if (!check_vif_up(ifp->vif))
		return -EIO;

	memset(&cfg->pmk_list, 0, sizeof(cfg->pmk_list));
	err = brcmf_update_pmklist(cfg, ifp);

	brcmf_dbg(TRACE, "Exit\n");
	return err;
3895 3896 3897

}

3898
static s32 brcmf_configure_opensecurity(struct brcmf_if *ifp)
3899
{
3900
	struct brcmf_pub *drvr = ifp->drvr;
3901
	s32 err;
3902
	s32 wpa_val;
3903 3904

	/* set auth */
3905
	err = brcmf_fil_bsscfg_int_set(ifp, "auth", 0);
3906
	if (err < 0) {
3907
		bphy_err(drvr, "auth error %d\n", err);
3908 3909 3910
		return err;
	}
	/* set wsec */
3911
	err = brcmf_fil_bsscfg_int_set(ifp, "wsec", 0);
3912
	if (err < 0) {
3913
		bphy_err(drvr, "wsec error %d\n", err);
3914 3915 3916
		return err;
	}
	/* set upper-layer auth */
3917 3918 3919 3920 3921
	if (brcmf_is_ibssmode(ifp->vif))
		wpa_val = WPA_AUTH_NONE;
	else
		wpa_val = WPA_AUTH_DISABLED;
	err = brcmf_fil_bsscfg_int_set(ifp, "wpa_auth", wpa_val);
3922
	if (err < 0) {
3923
		bphy_err(drvr, "wpa_auth error %d\n", err);
3924 3925 3926 3927 3928 3929 3930 3931 3932 3933 3934 3935 3936 3937 3938
		return err;
	}

	return 0;
}

static bool brcmf_valid_wpa_oui(u8 *oui, bool is_rsn_ie)
{
	if (is_rsn_ie)
		return (memcmp(oui, RSN_OUI, TLV_OUI_LEN) == 0);

	return (memcmp(oui, WPA_OUI, TLV_OUI_LEN) == 0);
}

static s32
3939
brcmf_configure_wpaie(struct brcmf_if *ifp,
3940 3941
		      const struct brcmf_vs_tlv *wpa_ie,
		      bool is_rsn_ie)
3942
{
3943
	struct brcmf_pub *drvr = ifp->drvr;
3944 3945 3946
	u32 auth = 0; /* d11 open authentication */
	u16 count;
	s32 err = 0;
3947
	s32 len;
3948 3949 3950 3951 3952 3953 3954 3955 3956
	u32 i;
	u32 wsec;
	u32 pval = 0;
	u32 gval = 0;
	u32 wpa_auth = 0;
	u32 offset;
	u8 *data;
	u16 rsn_cap;
	u32 wme_bss_disable;
3957
	u32 mfp;
3958

3959
	brcmf_dbg(TRACE, "Enter\n");
3960 3961 3962 3963 3964
	if (wpa_ie == NULL)
		goto exit;

	len = wpa_ie->len + TLV_HDR_LEN;
	data = (u8 *)wpa_ie;
3965
	offset = TLV_HDR_LEN;
3966 3967
	if (!is_rsn_ie)
		offset += VS_IE_FIXED_HDR_LEN;
3968 3969
	else
		offset += WPA_IE_VERSION_LEN;
3970 3971 3972 3973

	/* check for multicast cipher suite */
	if (offset + WPA_IE_MIN_OUI_LEN > len) {
		err = -EINVAL;
3974
		bphy_err(drvr, "no multicast cipher suite\n");
3975 3976 3977 3978 3979
		goto exit;
	}

	if (!brcmf_valid_wpa_oui(&data[offset], is_rsn_ie)) {
		err = -EINVAL;
3980
		bphy_err(drvr, "ivalid OUI\n");
3981 3982 3983 3984 3985 3986 3987 3988 3989 3990 3991 3992 3993 3994 3995 3996 3997 3998 3999 4000 4001
		goto exit;
	}
	offset += TLV_OUI_LEN;

	/* pick up multicast cipher */
	switch (data[offset]) {
	case WPA_CIPHER_NONE:
		gval = 0;
		break;
	case WPA_CIPHER_WEP_40:
	case WPA_CIPHER_WEP_104:
		gval = WEP_ENABLED;
		break;
	case WPA_CIPHER_TKIP:
		gval = TKIP_ENABLED;
		break;
	case WPA_CIPHER_AES_CCM:
		gval = AES_ENABLED;
		break;
	default:
		err = -EINVAL;
4002
		bphy_err(drvr, "Invalid multi cast cipher info\n");
4003 4004 4005 4006 4007 4008 4009 4010 4011 4012
		goto exit;
	}

	offset++;
	/* walk thru unicast cipher list and pick up what we recognize */
	count = data[offset] + (data[offset + 1] << 8);
	offset += WPA_IE_SUITE_COUNT_LEN;
	/* Check for unicast suite(s) */
	if (offset + (WPA_IE_MIN_OUI_LEN * count) > len) {
		err = -EINVAL;
4013
		bphy_err(drvr, "no unicast cipher suite\n");
4014 4015 4016 4017 4018
		goto exit;
	}
	for (i = 0; i < count; i++) {
		if (!brcmf_valid_wpa_oui(&data[offset], is_rsn_ie)) {
			err = -EINVAL;
4019
			bphy_err(drvr, "ivalid OUI\n");
4020 4021 4022 4023 4024 4025 4026 4027 4028 4029 4030 4031 4032 4033 4034 4035 4036
			goto exit;
		}
		offset += TLV_OUI_LEN;
		switch (data[offset]) {
		case WPA_CIPHER_NONE:
			break;
		case WPA_CIPHER_WEP_40:
		case WPA_CIPHER_WEP_104:
			pval |= WEP_ENABLED;
			break;
		case WPA_CIPHER_TKIP:
			pval |= TKIP_ENABLED;
			break;
		case WPA_CIPHER_AES_CCM:
			pval |= AES_ENABLED;
			break;
		default:
4037
			bphy_err(drvr, "Invalid unicast security info\n");
4038 4039 4040 4041 4042 4043 4044 4045 4046
		}
		offset++;
	}
	/* walk thru auth management suite list and pick up what we recognize */
	count = data[offset] + (data[offset + 1] << 8);
	offset += WPA_IE_SUITE_COUNT_LEN;
	/* Check for auth key management suite(s) */
	if (offset + (WPA_IE_MIN_OUI_LEN * count) > len) {
		err = -EINVAL;
4047
		bphy_err(drvr, "no auth key mgmt suite\n");
4048 4049 4050 4051 4052
		goto exit;
	}
	for (i = 0; i < count; i++) {
		if (!brcmf_valid_wpa_oui(&data[offset], is_rsn_ie)) {
			err = -EINVAL;
4053
			bphy_err(drvr, "ivalid OUI\n");
4054 4055 4056 4057 4058
			goto exit;
		}
		offset += TLV_OUI_LEN;
		switch (data[offset]) {
		case RSN_AKM_NONE:
4059
			brcmf_dbg(TRACE, "RSN_AKM_NONE\n");
4060 4061 4062
			wpa_auth |= WPA_AUTH_NONE;
			break;
		case RSN_AKM_UNSPECIFIED:
4063
			brcmf_dbg(TRACE, "RSN_AKM_UNSPECIFIED\n");
4064 4065 4066 4067
			is_rsn_ie ? (wpa_auth |= WPA2_AUTH_UNSPECIFIED) :
				    (wpa_auth |= WPA_AUTH_UNSPECIFIED);
			break;
		case RSN_AKM_PSK:
4068
			brcmf_dbg(TRACE, "RSN_AKM_PSK\n");
4069 4070 4071
			is_rsn_ie ? (wpa_auth |= WPA2_AUTH_PSK) :
				    (wpa_auth |= WPA_AUTH_PSK);
			break;
4072 4073 4074 4075 4076 4077 4078 4079
		case RSN_AKM_SHA256_PSK:
			brcmf_dbg(TRACE, "RSN_AKM_MFP_PSK\n");
			wpa_auth |= WPA2_AUTH_PSK_SHA256;
			break;
		case RSN_AKM_SHA256_1X:
			brcmf_dbg(TRACE, "RSN_AKM_MFP_1X\n");
			wpa_auth |= WPA2_AUTH_1X_SHA256;
			break;
4080
		default:
4081
			bphy_err(drvr, "Invalid key mgmt info\n");
4082 4083 4084 4085
		}
		offset++;
	}

4086
	mfp = BRCMF_MFP_NONE;
4087 4088 4089 4090 4091 4092
	if (is_rsn_ie) {
		wme_bss_disable = 1;
		if ((offset + RSN_CAP_LEN) <= len) {
			rsn_cap = data[offset] + (data[offset + 1] << 8);
			if (rsn_cap & RSN_CAP_PTK_REPLAY_CNTR_MASK)
				wme_bss_disable = 0;
4093 4094 4095 4096 4097 4098 4099 4100 4101 4102 4103 4104 4105 4106 4107 4108 4109 4110 4111 4112 4113 4114 4115 4116
			if (rsn_cap & RSN_CAP_MFPR_MASK) {
				brcmf_dbg(TRACE, "MFP Required\n");
				mfp = BRCMF_MFP_REQUIRED;
				/* Firmware only supports mfp required in
				 * combination with WPA2_AUTH_PSK_SHA256 or
				 * WPA2_AUTH_1X_SHA256.
				 */
				if (!(wpa_auth & (WPA2_AUTH_PSK_SHA256 |
						  WPA2_AUTH_1X_SHA256))) {
					err = -EINVAL;
					goto exit;
				}
				/* Firmware has requirement that WPA2_AUTH_PSK/
				 * WPA2_AUTH_UNSPECIFIED be set, if SHA256 OUI
				 * is to be included in the rsn ie.
				 */
				if (wpa_auth & WPA2_AUTH_PSK_SHA256)
					wpa_auth |= WPA2_AUTH_PSK;
				else if (wpa_auth & WPA2_AUTH_1X_SHA256)
					wpa_auth |= WPA2_AUTH_UNSPECIFIED;
			} else if (rsn_cap & RSN_CAP_MFPC_MASK) {
				brcmf_dbg(TRACE, "MFP Capable\n");
				mfp = BRCMF_MFP_CAPABLE;
			}
4117
		}
4118
		offset += RSN_CAP_LEN;
4119
		/* set wme_bss_disable to sync RSN Capabilities */
4120
		err = brcmf_fil_bsscfg_int_set(ifp, "wme_bss_disable",
4121
					       wme_bss_disable);
4122
		if (err < 0) {
4123
			bphy_err(drvr, "wme_bss_disable error %d\n", err);
4124 4125
			goto exit;
		}
4126 4127 4128 4129 4130 4131 4132 4133 4134 4135 4136

		/* Skip PMKID cnt as it is know to be 0 for AP. */
		offset += RSN_PMKID_COUNT_LEN;

		/* See if there is BIP wpa suite left for MFP */
		if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MFP) &&
		    ((offset + WPA_IE_MIN_OUI_LEN) <= len)) {
			err = brcmf_fil_bsscfg_data_set(ifp, "bip",
							&data[offset],
							WPA_IE_MIN_OUI_LEN);
			if (err < 0) {
4137
				bphy_err(drvr, "bip error %d\n", err);
4138 4139 4140
				goto exit;
			}
		}
4141 4142 4143 4144 4145
	}
	/* FOR WPS , set SES_OW_ENABLED */
	wsec = (pval | gval | SES_OW_ENABLED);

	/* set auth */
4146
	err = brcmf_fil_bsscfg_int_set(ifp, "auth", auth);
4147
	if (err < 0) {
4148
		bphy_err(drvr, "auth error %d\n", err);
4149 4150 4151
		goto exit;
	}
	/* set wsec */
4152
	err = brcmf_fil_bsscfg_int_set(ifp, "wsec", wsec);
4153
	if (err < 0) {
4154
		bphy_err(drvr, "wsec error %d\n", err);
4155 4156
		goto exit;
	}
4157 4158 4159 4160 4161 4162
	/* Configure MFP, this needs to go after wsec otherwise the wsec command
	 * will overwrite the values set by MFP
	 */
	if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MFP)) {
		err = brcmf_fil_bsscfg_int_set(ifp, "mfp", mfp);
		if (err < 0) {
4163
			bphy_err(drvr, "mfp error %d\n", err);
4164 4165 4166
			goto exit;
		}
	}
4167
	/* set upper-layer auth */
4168
	err = brcmf_fil_bsscfg_int_set(ifp, "wpa_auth", wpa_auth);
4169
	if (err < 0) {
4170
		bphy_err(drvr, "wpa_auth error %d\n", err);
4171 4172 4173 4174 4175 4176 4177 4178
		goto exit;
	}

exit:
	return err;
}

static s32
4179
brcmf_parse_vndr_ies(const u8 *vndr_ie_buf, u32 vndr_ie_len,
4180 4181 4182 4183 4184 4185 4186 4187 4188 4189 4190 4191 4192 4193 4194 4195 4196
		     struct parsed_vndr_ies *vndr_ies)
{
	struct brcmf_vs_tlv *vndrie;
	struct brcmf_tlv *ie;
	struct parsed_vndr_ie_info *parsed_info;
	s32 remaining_len;

	remaining_len = (s32)vndr_ie_len;
	memset(vndr_ies, 0, sizeof(*vndr_ies));

	ie = (struct brcmf_tlv *)vndr_ie_buf;
	while (ie) {
		if (ie->id != WLAN_EID_VENDOR_SPECIFIC)
			goto next;
		vndrie = (struct brcmf_vs_tlv *)ie;
		/* len should be bigger than OUI length + one */
		if (vndrie->len < (VS_IE_FIXED_HDR_LEN - TLV_HDR_LEN + 1)) {
4197 4198
			brcmf_err("invalid vndr ie. length is too small %d\n",
				  vndrie->len);
4199 4200 4201 4202 4203 4204
			goto next;
		}
		/* if wpa or wme ie, do not add ie */
		if (!memcmp(vndrie->oui, (u8 *)WPA_OUI, TLV_OUI_LEN) &&
		    ((vndrie->oui_type == WPA_OUI_TYPE) ||
		    (vndrie->oui_type == WME_OUI_TYPE))) {
4205
			brcmf_dbg(TRACE, "Found WPA/WME oui. Do not add it\n");
4206 4207 4208 4209 4210 4211 4212 4213 4214 4215 4216 4217
			goto next;
		}

		parsed_info = &vndr_ies->ie_info[vndr_ies->count];

		/* save vndr ie information */
		parsed_info->ie_ptr = (char *)vndrie;
		parsed_info->ie_len = vndrie->len + TLV_HDR_LEN;
		memcpy(&parsed_info->vndrie, vndrie, sizeof(*vndrie));

		vndr_ies->count++;

4218 4219 4220 4221 4222
		brcmf_dbg(TRACE, "** OUI %02x %02x %02x, type 0x%02x\n",
			  parsed_info->vndrie.oui[0],
			  parsed_info->vndrie.oui[1],
			  parsed_info->vndrie.oui[2],
			  parsed_info->vndrie.oui_type);
4223

4224
		if (vndr_ies->count >= VNDR_IE_PARSE_LIMIT)
4225 4226
			break;
next:
4227 4228
		remaining_len -= (ie->len + TLV_HDR_LEN);
		if (remaining_len <= TLV_HDR_LEN)
4229 4230
			ie = NULL;
		else
4231 4232
			ie = (struct brcmf_tlv *)(((u8 *)ie) + ie->len +
				TLV_HDR_LEN);
4233
	}
4234
	return 0;
4235 4236 4237 4238 4239 4240 4241 4242 4243
}

static u32
brcmf_vndr_ie(u8 *iebuf, s32 pktflag, u8 *ie_ptr, u32 ie_len, s8 *add_del_cmd)
{

	strncpy(iebuf, add_del_cmd, VNDR_IE_CMD_LEN - 1);
	iebuf[VNDR_IE_CMD_LEN - 1] = '\0';

4244
	put_unaligned_le32(1, &iebuf[VNDR_IE_COUNT_OFFSET]);
4245

4246
	put_unaligned_le32(pktflag, &iebuf[VNDR_IE_PKTFLAG_OFFSET]);
4247 4248 4249 4250 4251 4252

	memcpy(&iebuf[VNDR_IE_VSIE_OFFSET], ie_ptr, ie_len);

	return ie_len + VNDR_IE_HDR_SIZE;
}

4253 4254
s32 brcmf_vif_set_mgmt_ie(struct brcmf_cfg80211_vif *vif, s32 pktflag,
			  const u8 *vndr_ie_buf, u32 vndr_ie_len)
4255
{
4256
	struct brcmf_pub *drvr;
4257 4258
	struct brcmf_if *ifp;
	struct vif_saved_ie *saved_ie;
4259 4260 4261 4262
	s32 err = 0;
	u8  *iovar_ie_buf;
	u8  *curr_ie_buf;
	u8  *mgmt_ie_buf = NULL;
4263
	int mgmt_ie_buf_len;
4264
	u32 *mgmt_ie_len;
4265 4266 4267 4268 4269 4270 4271 4272
	u32 del_add_ie_buf_len = 0;
	u32 total_ie_buf_len = 0;
	u32 parsed_ie_buf_len = 0;
	struct parsed_vndr_ies old_vndr_ies;
	struct parsed_vndr_ies new_vndr_ies;
	struct parsed_vndr_ie_info *vndrie_info;
	s32 i;
	u8 *ptr;
4273
	int remained_buf_len;
4274

4275 4276 4277
	if (!vif)
		return -ENODEV;
	ifp = vif->ifp;
4278
	drvr = ifp->drvr;
4279 4280
	saved_ie = &vif->saved_ie;

4281 4282
	brcmf_dbg(TRACE, "bsscfgidx %d, pktflag : 0x%02X\n", ifp->bsscfgidx,
		  pktflag);
4283 4284 4285 4286
	iovar_ie_buf = kzalloc(WL_EXTRA_BUF_MAX, GFP_KERNEL);
	if (!iovar_ie_buf)
		return -ENOMEM;
	curr_ie_buf = iovar_ie_buf;
4287 4288 4289 4290 4291 4292 4293 4294 4295 4296 4297 4298 4299 4300 4301 4302 4303 4304 4305 4306 4307 4308 4309
	switch (pktflag) {
	case BRCMF_VNDR_IE_PRBREQ_FLAG:
		mgmt_ie_buf = saved_ie->probe_req_ie;
		mgmt_ie_len = &saved_ie->probe_req_ie_len;
		mgmt_ie_buf_len = sizeof(saved_ie->probe_req_ie);
		break;
	case BRCMF_VNDR_IE_PRBRSP_FLAG:
		mgmt_ie_buf = saved_ie->probe_res_ie;
		mgmt_ie_len = &saved_ie->probe_res_ie_len;
		mgmt_ie_buf_len = sizeof(saved_ie->probe_res_ie);
		break;
	case BRCMF_VNDR_IE_BEACON_FLAG:
		mgmt_ie_buf = saved_ie->beacon_ie;
		mgmt_ie_len = &saved_ie->beacon_ie_len;
		mgmt_ie_buf_len = sizeof(saved_ie->beacon_ie);
		break;
	case BRCMF_VNDR_IE_ASSOCREQ_FLAG:
		mgmt_ie_buf = saved_ie->assoc_req_ie;
		mgmt_ie_len = &saved_ie->assoc_req_ie_len;
		mgmt_ie_buf_len = sizeof(saved_ie->assoc_req_ie);
		break;
	default:
		err = -EPERM;
4310
		bphy_err(drvr, "not suitable type\n");
4311
		goto exit;
4312 4313 4314 4315
	}

	if (vndr_ie_len > mgmt_ie_buf_len) {
		err = -ENOMEM;
4316
		bphy_err(drvr, "extra IE size too big\n");
4317 4318 4319 4320 4321 4322 4323 4324 4325 4326 4327 4328 4329 4330 4331
		goto exit;
	}

	/* parse and save new vndr_ie in curr_ie_buff before comparing it */
	if (vndr_ie_buf && vndr_ie_len && curr_ie_buf) {
		ptr = curr_ie_buf;
		brcmf_parse_vndr_ies(vndr_ie_buf, vndr_ie_len, &new_vndr_ies);
		for (i = 0; i < new_vndr_ies.count; i++) {
			vndrie_info = &new_vndr_ies.ie_info[i];
			memcpy(ptr + parsed_ie_buf_len, vndrie_info->ie_ptr,
			       vndrie_info->ie_len);
			parsed_ie_buf_len += vndrie_info->ie_len;
		}
	}

4332
	if (mgmt_ie_buf && *mgmt_ie_len) {
4333 4334 4335
		if (parsed_ie_buf_len && (parsed_ie_buf_len == *mgmt_ie_len) &&
		    (memcmp(mgmt_ie_buf, curr_ie_buf,
			    parsed_ie_buf_len) == 0)) {
4336
			brcmf_dbg(TRACE, "Previous mgmt IE equals to current IE\n");
4337 4338 4339 4340 4341 4342 4343 4344 4345 4346
			goto exit;
		}

		/* parse old vndr_ie */
		brcmf_parse_vndr_ies(mgmt_ie_buf, *mgmt_ie_len, &old_vndr_ies);

		/* make a command to delete old ie */
		for (i = 0; i < old_vndr_ies.count; i++) {
			vndrie_info = &old_vndr_ies.ie_info[i];

4347 4348 4349 4350 4351 4352
			brcmf_dbg(TRACE, "DEL ID : %d, Len: %d , OUI:%02x:%02x:%02x\n",
				  vndrie_info->vndrie.id,
				  vndrie_info->vndrie.len,
				  vndrie_info->vndrie.oui[0],
				  vndrie_info->vndrie.oui[1],
				  vndrie_info->vndrie.oui[2]);
4353 4354 4355 4356 4357 4358 4359 4360 4361 4362 4363 4364 4365 4366 4367 4368 4369 4370 4371 4372 4373

			del_add_ie_buf_len = brcmf_vndr_ie(curr_ie_buf, pktflag,
							   vndrie_info->ie_ptr,
							   vndrie_info->ie_len,
							   "del");
			curr_ie_buf += del_add_ie_buf_len;
			total_ie_buf_len += del_add_ie_buf_len;
		}
	}

	*mgmt_ie_len = 0;
	/* Add if there is any extra IE */
	if (mgmt_ie_buf && parsed_ie_buf_len) {
		ptr = mgmt_ie_buf;

		remained_buf_len = mgmt_ie_buf_len;

		/* make a command to add new ie */
		for (i = 0; i < new_vndr_ies.count; i++) {
			vndrie_info = &new_vndr_ies.ie_info[i];

4374 4375 4376
			/* verify remained buf size before copy data */
			if (remained_buf_len < (vndrie_info->vndrie.len +
							VNDR_IE_VSIE_OFFSET)) {
4377
				bphy_err(drvr, "no space in mgmt_ie_buf: len left %d",
4378
					 remained_buf_len);
4379 4380 4381 4382 4383
				break;
			}
			remained_buf_len -= (vndrie_info->ie_len +
					     VNDR_IE_VSIE_OFFSET);

4384 4385 4386 4387 4388 4389
			brcmf_dbg(TRACE, "ADDED ID : %d, Len: %d, OUI:%02x:%02x:%02x\n",
				  vndrie_info->vndrie.id,
				  vndrie_info->vndrie.len,
				  vndrie_info->vndrie.oui[0],
				  vndrie_info->vndrie.oui[1],
				  vndrie_info->vndrie.oui[2]);
4390 4391 4392 4393 4394 4395 4396 4397 4398 4399 4400 4401 4402 4403 4404 4405

			del_add_ie_buf_len = brcmf_vndr_ie(curr_ie_buf, pktflag,
							   vndrie_info->ie_ptr,
							   vndrie_info->ie_len,
							   "add");

			/* save the parsed IE in wl struct */
			memcpy(ptr + (*mgmt_ie_len), vndrie_info->ie_ptr,
			       vndrie_info->ie_len);
			*mgmt_ie_len += vndrie_info->ie_len;

			curr_ie_buf += del_add_ie_buf_len;
			total_ie_buf_len += del_add_ie_buf_len;
		}
	}
	if (total_ie_buf_len) {
4406
		err  = brcmf_fil_bsscfg_data_set(ifp, "vndr_ie", iovar_ie_buf,
4407
						 total_ie_buf_len);
4408
		if (err)
4409
			bphy_err(drvr, "vndr ie set error : %d\n", err);
4410 4411 4412 4413 4414 4415 4416
	}

exit:
	kfree(iovar_ie_buf);
	return err;
}

4417 4418 4419 4420 4421 4422 4423 4424 4425 4426 4427 4428 4429 4430 4431 4432
s32 brcmf_vif_clear_mgmt_ies(struct brcmf_cfg80211_vif *vif)
{
	s32 pktflags[] = {
		BRCMF_VNDR_IE_PRBREQ_FLAG,
		BRCMF_VNDR_IE_PRBRSP_FLAG,
		BRCMF_VNDR_IE_BEACON_FLAG
	};
	int i;

	for (i = 0; i < ARRAY_SIZE(pktflags); i++)
		brcmf_vif_set_mgmt_ie(vif, pktflags[i], NULL, 0);

	memset(&vif->saved_ie, 0, sizeof(vif->saved_ie));
	return 0;
}

4433 4434 4435 4436
static s32
brcmf_config_ap_mgmt_ie(struct brcmf_cfg80211_vif *vif,
			struct cfg80211_beacon_data *beacon)
{
4437
	struct brcmf_pub *drvr = vif->ifp->drvr;
4438 4439 4440 4441 4442 4443
	s32 err;

	/* Set Beacon IEs to FW */
	err = brcmf_vif_set_mgmt_ie(vif, BRCMF_VNDR_IE_BEACON_FLAG,
				    beacon->tail, beacon->tail_len);
	if (err) {
4444
		bphy_err(drvr, "Set Beacon IE Failed\n");
4445 4446 4447 4448 4449 4450 4451 4452 4453
		return err;
	}
	brcmf_dbg(TRACE, "Applied Vndr IEs for Beacon\n");

	/* Set Probe Response IEs to FW */
	err = brcmf_vif_set_mgmt_ie(vif, BRCMF_VNDR_IE_PRBRSP_FLAG,
				    beacon->proberesp_ies,
				    beacon->proberesp_ies_len);
	if (err)
4454
		bphy_err(drvr, "Set Probe Resp IE Failed\n");
4455 4456 4457 4458 4459 4460
	else
		brcmf_dbg(TRACE, "Applied Vndr IEs for Probe Resp\n");

	return err;
}

4461 4462 4463 4464 4465
static s32
brcmf_cfg80211_start_ap(struct wiphy *wiphy, struct net_device *ndev,
			struct cfg80211_ap_settings *settings)
{
	s32 ie_offset;
4466
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
4467
	struct brcmf_if *ifp = netdev_priv(ndev);
4468
	struct brcmf_pub *drvr = cfg->pub;
4469
	const struct brcmf_tlv *ssid_ie;
4470
	const struct brcmf_tlv *country_ie;
4471 4472
	struct brcmf_ssid_le ssid_le;
	s32 err = -EPERM;
4473 4474
	const struct brcmf_tlv *rsn_ie;
	const struct brcmf_vs_tlv *wpa_ie;
4475
	struct brcmf_join_params join_params;
4476 4477
	enum nl80211_iftype dev_role;
	struct brcmf_fil_bss_enable_le bss_enable;
4478
	u16 chanspec = chandef_to_chanspec(&cfg->d11inf, &settings->chandef);
4479
	bool mbss;
4480
	int is_11d;
4481
	bool supports_11d;
4482

4483 4484 4485
	brcmf_dbg(TRACE, "ctrlchn=%d, center=%d, bw=%d, beacon_interval=%d, dtim_period=%d,\n",
		  settings->chandef.chan->hw_value,
		  settings->chandef.center_freq1, settings->chandef.width,
4486
		  settings->beacon_interval, settings->dtim_period);
4487 4488 4489
	brcmf_dbg(TRACE, "ssid=%s(%zu), auth_type=%d, inactivity_timeout=%d\n",
		  settings->ssid, settings->ssid_len, settings->auth_type,
		  settings->inactivity_timeout);
4490
	dev_role = ifp->vif->wdev.iftype;
4491
	mbss = ifp->vif->mbss;
4492

4493
	/* store current 11d setting */
4494 4495
	if (brcmf_fil_cmd_int_get(ifp, BRCMF_C_GET_REGULATORY,
				  &ifp->vif->is_11d)) {
4496
		is_11d = supports_11d = false;
4497 4498 4499 4500 4501 4502 4503
	} else {
		country_ie = brcmf_parse_tlvs((u8 *)settings->beacon.tail,
					      settings->beacon.tail_len,
					      WLAN_EID_COUNTRY);
		is_11d = country_ie ? 1 : 0;
		supports_11d = true;
	}
4504

4505 4506 4507 4508 4509 4510 4511
	memset(&ssid_le, 0, sizeof(ssid_le));
	if (settings->ssid == NULL || settings->ssid_len == 0) {
		ie_offset = DOT11_MGMT_HDR_LEN + DOT11_BCN_PRB_FIXED_LEN;
		ssid_ie = brcmf_parse_tlvs(
				(u8 *)&settings->beacon.head[ie_offset],
				settings->beacon.head_len - ie_offset,
				WLAN_EID_SSID);
4512
		if (!ssid_ie || ssid_ie->len > IEEE80211_MAX_SSID_LEN)
4513 4514 4515 4516
			return -EINVAL;

		memcpy(ssid_le.SSID, ssid_ie->data, ssid_ie->len);
		ssid_le.SSID_len = cpu_to_le32(ssid_ie->len);
4517
		brcmf_dbg(TRACE, "SSID is (%s) in Head\n", ssid_le.SSID);
4518 4519 4520 4521 4522
	} else {
		memcpy(ssid_le.SSID, settings->ssid, settings->ssid_len);
		ssid_le.SSID_len = cpu_to_le32((u32)settings->ssid_len);
	}

4523 4524
	if (!mbss) {
		brcmf_set_mpc(ifp, 0);
4525
		brcmf_configure_arp_nd_offload(ifp, false);
4526
	}
4527 4528 4529 4530 4531 4532 4533 4534 4535 4536

	/* find the RSN_IE */
	rsn_ie = brcmf_parse_tlvs((u8 *)settings->beacon.tail,
				  settings->beacon.tail_len, WLAN_EID_RSN);

	/* find the WPA_IE */
	wpa_ie = brcmf_find_wpaie((u8 *)settings->beacon.tail,
				  settings->beacon.tail_len);

	if ((wpa_ie != NULL || rsn_ie != NULL)) {
4537
		brcmf_dbg(TRACE, "WPA(2) IE is found\n");
4538 4539
		if (wpa_ie != NULL) {
			/* WPA IE */
4540
			err = brcmf_configure_wpaie(ifp, wpa_ie, false);
4541 4542 4543
			if (err < 0)
				goto exit;
		} else {
4544 4545 4546 4547
			struct brcmf_vs_tlv *tmp_ie;

			tmp_ie = (struct brcmf_vs_tlv *)rsn_ie;

4548
			/* RSN IE */
4549
			err = brcmf_configure_wpaie(ifp, tmp_ie, true);
4550 4551 4552 4553
			if (err < 0)
				goto exit;
		}
	} else {
4554
		brcmf_dbg(TRACE, "No WPA(2) IEs found\n");
4555
		brcmf_configure_opensecurity(ifp);
4556 4557
	}

4558
	/* Parameters shared by all radio interfaces */
4559
	if (!mbss) {
4560
		if ((supports_11d) && (is_11d != ifp->vif->is_11d)) {
4561 4562 4563
			err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_REGULATORY,
						    is_11d);
			if (err < 0) {
4564
				bphy_err(drvr, "Regulatory Set Error, %d\n",
4565
					 err);
4566 4567 4568
				goto exit;
			}
		}
4569 4570 4571 4572
		if (settings->beacon_interval) {
			err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_BCNPRD,
						    settings->beacon_interval);
			if (err < 0) {
4573
				bphy_err(drvr, "Beacon Interval Set Error, %d\n",
4574
					 err);
4575 4576 4577 4578 4579 4580 4581
				goto exit;
			}
		}
		if (settings->dtim_period) {
			err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_DTIMPRD,
						    settings->dtim_period);
			if (err < 0) {
4582
				bphy_err(drvr, "DTIM Interval Set Error, %d\n",
4583
					 err);
4584 4585
				goto exit;
			}
4586
		}
4587

4588 4589 4590
		if ((dev_role == NL80211_IFTYPE_AP) &&
		    ((ifp->ifidx == 0) ||
		     !brcmf_feat_is_enabled(ifp, BRCMF_FEAT_RSDB))) {
4591 4592
			err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_DOWN, 1);
			if (err < 0) {
4593
				bphy_err(drvr, "BRCMF_C_DOWN error %d\n",
4594
					 err);
4595 4596 4597 4598 4599 4600
				goto exit;
			}
			brcmf_fil_iovar_int_set(ifp, "apsta", 0);
		}

		err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_INFRA, 1);
4601
		if (err < 0) {
4602
			bphy_err(drvr, "SET INFRA error %d\n", err);
4603 4604
			goto exit;
		}
4605
	} else if (WARN_ON(supports_11d && (is_11d != ifp->vif->is_11d))) {
4606 4607 4608
		/* Multiple-BSS should use same 11d configuration */
		err = -EINVAL;
		goto exit;
4609
	}
4610 4611

	/* Interface specific setup */
4612
	if (dev_role == NL80211_IFTYPE_AP) {
4613 4614 4615
		if ((brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MBSS)) && (!mbss))
			brcmf_fil_iovar_int_set(ifp, "mbss", 1);

4616 4617
		err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_AP, 1);
		if (err < 0) {
4618
			bphy_err(drvr, "setting AP mode failed %d\n",
4619
				 err);
4620 4621
			goto exit;
		}
4622 4623 4624 4625 4626 4627
		if (!mbss) {
			/* Firmware 10.x requires setting channel after enabling
			 * AP and before bringing interface up.
			 */
			err = brcmf_fil_iovar_int_set(ifp, "chanspec", chanspec);
			if (err < 0) {
4628
				bphy_err(drvr, "Set Channel failed: chspec=%d, %d\n",
4629
					 chanspec, err);
4630 4631 4632
				goto exit;
			}
		}
4633 4634
		err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_UP, 1);
		if (err < 0) {
4635
			bphy_err(drvr, "BRCMF_C_UP error (%d)\n", err);
4636 4637
			goto exit;
		}
4638 4639 4640 4641
		/* On DOWN the firmware removes the WEP keys, reconfigure
		 * them if they were set.
		 */
		brcmf_cfg80211_reconfigure_wep(ifp);
4642 4643 4644 4645 4646 4647 4648 4649

		memset(&join_params, 0, sizeof(join_params));
		/* join parameters starts with ssid */
		memcpy(&join_params.ssid_le, &ssid_le, sizeof(ssid_le));
		/* create softap */
		err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_SSID,
					     &join_params, sizeof(join_params));
		if (err < 0) {
4650
			bphy_err(drvr, "SET SSID error (%d)\n", err);
4651 4652
			goto exit;
		}
4653 4654 4655 4656

		if (settings->hidden_ssid) {
			err = brcmf_fil_iovar_int_set(ifp, "closednet", 1);
			if (err) {
4657
				bphy_err(drvr, "closednet error (%d)\n", err);
4658 4659 4660 4661
				goto exit;
			}
		}

4662
		brcmf_dbg(TRACE, "AP mode configuration complete\n");
4663 4664 4665
	} else if (dev_role == NL80211_IFTYPE_P2P_GO) {
		err = brcmf_fil_iovar_int_set(ifp, "chanspec", chanspec);
		if (err < 0) {
4666
			bphy_err(drvr, "Set Channel failed: chspec=%d, %d\n",
4667
				 chanspec, err);
4668 4669
			goto exit;
		}
4670 4671 4672
		err = brcmf_fil_bsscfg_data_set(ifp, "ssid", &ssid_le,
						sizeof(ssid_le));
		if (err < 0) {
4673
			bphy_err(drvr, "setting ssid failed %d\n", err);
4674 4675
			goto exit;
		}
4676
		bss_enable.bsscfgidx = cpu_to_le32(ifp->bsscfgidx);
4677 4678 4679 4680
		bss_enable.enable = cpu_to_le32(1);
		err = brcmf_fil_iovar_data_set(ifp, "bss", &bss_enable,
					       sizeof(bss_enable));
		if (err < 0) {
4681
			bphy_err(drvr, "bss_enable config failed %d\n", err);
4682 4683 4684 4685
			goto exit;
		}

		brcmf_dbg(TRACE, "GO mode configuration complete\n");
4686 4687
	} else {
		WARN_ON(1);
4688
	}
4689

4690
	brcmf_config_ap_mgmt_ie(ifp->vif, &settings->beacon);
4691
	set_bit(BRCMF_VIF_STATUS_AP_CREATED, &ifp->vif->sme_state);
4692
	brcmf_net_setcarrier(ifp, true);
4693 4694

exit:
4695
	if ((err) && (!mbss)) {
4696
		brcmf_set_mpc(ifp, 1);
4697
		brcmf_configure_arp_nd_offload(ifp, true);
4698
	}
4699 4700 4701 4702 4703
	return err;
}

static int brcmf_cfg80211_stop_ap(struct wiphy *wiphy, struct net_device *ndev)
{
4704
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
4705
	struct brcmf_if *ifp = netdev_priv(ndev);
4706
	struct brcmf_pub *drvr = cfg->pub;
Hante Meuleman's avatar
Hante Meuleman committed
4707
	s32 err;
4708
	struct brcmf_fil_bss_enable_le bss_enable;
Hante Meuleman's avatar
Hante Meuleman committed
4709
	struct brcmf_join_params join_params;
4710

4711
	brcmf_dbg(TRACE, "Enter\n");
4712

4713
	if (ifp->vif->wdev.iftype == NL80211_IFTYPE_AP) {
4714 4715 4716
		/* Due to most likely deauths outstanding we sleep */
		/* first to make sure they get processed by fw. */
		msleep(400);
Hante Meuleman's avatar
Hante Meuleman committed
4717

4718 4719 4720 4721 4722
		if (ifp->vif->mbss) {
			err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_DOWN, 1);
			return err;
		}

4723 4724 4725 4726
		/* First BSS doesn't get a full reset */
		if (ifp->bsscfgidx == 0)
			brcmf_fil_iovar_int_set(ifp, "closednet", 0);

Hante Meuleman's avatar
Hante Meuleman committed
4727 4728 4729 4730
		memset(&join_params, 0, sizeof(join_params));
		err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_SSID,
					     &join_params, sizeof(join_params));
		if (err < 0)
4731
			bphy_err(drvr, "SET SSID error (%d)\n", err);
4732
		err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_DOWN, 1);
Hante Meuleman's avatar
Hante Meuleman committed
4733
		if (err < 0)
4734
			bphy_err(drvr, "BRCMF_C_DOWN error %d\n", err);
Hante Meuleman's avatar
Hante Meuleman committed
4735 4736
		err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_AP, 0);
		if (err < 0)
4737
			bphy_err(drvr, "setting AP mode failed %d\n", err);
4738 4739
		if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MBSS))
			brcmf_fil_iovar_int_set(ifp, "mbss", 0);
4740 4741
		brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_REGULATORY,
				      ifp->vif->is_11d);
4742 4743 4744
		/* Bring device back up so it can be used again */
		err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_UP, 1);
		if (err < 0)
4745
			bphy_err(drvr, "BRCMF_C_UP error %d\n", err);
4746 4747

		brcmf_vif_clear_mgmt_ies(ifp->vif);
4748
	} else {
4749
		bss_enable.bsscfgidx = cpu_to_le32(ifp->bsscfgidx);
4750 4751 4752 4753
		bss_enable.enable = cpu_to_le32(0);
		err = brcmf_fil_iovar_data_set(ifp, "bss", &bss_enable,
					       sizeof(bss_enable));
		if (err < 0)
4754
			bphy_err(drvr, "bss_enable config failed %d\n", err);
4755
	}
4756
	brcmf_set_mpc(ifp, 1);
4757
	brcmf_configure_arp_nd_offload(ifp, true);
4758
	clear_bit(BRCMF_VIF_STATUS_AP_CREATED, &ifp->vif->sme_state);
4759
	brcmf_net_setcarrier(ifp, false);
4760

4761 4762 4763
	return err;
}

4764 4765 4766 4767 4768 4769 4770 4771 4772 4773 4774 4775 4776 4777
static s32
brcmf_cfg80211_change_beacon(struct wiphy *wiphy, struct net_device *ndev,
			     struct cfg80211_beacon_data *info)
{
	struct brcmf_if *ifp = netdev_priv(ndev);
	s32 err;

	brcmf_dbg(TRACE, "Enter\n");

	err = brcmf_config_ap_mgmt_ie(ifp->vif, info);

	return err;
}

4778 4779
static int
brcmf_cfg80211_del_station(struct wiphy *wiphy, struct net_device *ndev,
4780
			   struct station_del_parameters *params)
4781
{
4782
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
4783
	struct brcmf_pub *drvr = cfg->pub;
4784
	struct brcmf_scb_val_le scbval;
4785
	struct brcmf_if *ifp = netdev_priv(ndev);
4786 4787
	s32 err;

4788
	if (!params->mac)
4789 4790
		return -EFAULT;

4791
	brcmf_dbg(TRACE, "Enter %pM\n", params->mac);
4792

4793 4794
	if (ifp->vif == cfg->p2p.bss_idx[P2PAPI_BSSCFG_DEVICE].vif)
		ifp = cfg->p2p.bss_idx[P2PAPI_BSSCFG_PRIMARY].vif->ifp;
4795
	if (!check_vif_up(ifp->vif))
4796 4797
		return -EIO;

4798
	memcpy(&scbval.ea, params->mac, ETH_ALEN);
4799
	scbval.val = cpu_to_le32(params->reason_code);
4800
	err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SCB_DEAUTHENTICATE_FOR_REASON,
4801
				     &scbval, sizeof(scbval));
4802
	if (err)
4803
		bphy_err(drvr, "SCB_DEAUTHENTICATE_FOR_REASON failed %d\n",
4804
			 err);
4805

4806
	brcmf_dbg(TRACE, "Exit\n");
4807 4808 4809
	return err;
}

4810 4811 4812 4813
static int
brcmf_cfg80211_change_station(struct wiphy *wiphy, struct net_device *ndev,
			      const u8 *mac, struct station_parameters *params)
{
4814 4815
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
	struct brcmf_pub *drvr = cfg->pub;
4816 4817 4818 4819 4820 4821 4822 4823 4824 4825 4826 4827 4828 4829 4830 4831 4832 4833 4834 4835
	struct brcmf_if *ifp = netdev_priv(ndev);
	s32 err;

	brcmf_dbg(TRACE, "Enter, MAC %pM, mask 0x%04x set 0x%04x\n", mac,
		  params->sta_flags_mask, params->sta_flags_set);

	/* Ignore all 00 MAC */
	if (is_zero_ether_addr(mac))
		return 0;

	if (!(params->sta_flags_mask & BIT(NL80211_STA_FLAG_AUTHORIZED)))
		return 0;

	if (params->sta_flags_set & BIT(NL80211_STA_FLAG_AUTHORIZED))
		err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_SCB_AUTHORIZE,
					     (void *)mac, ETH_ALEN);
	else
		err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_SCB_DEAUTHORIZE,
					     (void *)mac, ETH_ALEN);
	if (err < 0)
4836
		bphy_err(drvr, "Setting SCB (de-)authorize failed, %d\n", err);
4837 4838 4839

	return err;
}
4840 4841 4842 4843 4844 4845

static void
brcmf_cfg80211_mgmt_frame_register(struct wiphy *wiphy,
				   struct wireless_dev *wdev,
				   u16 frame_type, bool reg)
{
4846
	struct brcmf_cfg80211_vif *vif;
4847 4848 4849 4850 4851
	u16 mgmt_type;

	brcmf_dbg(TRACE, "Enter, frame_type %04x, reg=%d\n", frame_type, reg);

	mgmt_type = (frame_type & IEEE80211_FCTL_STYPE) >> 4;
4852
	vif = container_of(wdev, struct brcmf_cfg80211_vif, wdev);
4853 4854 4855
	if (reg)
		vif->mgmt_rx_reg |= BIT(mgmt_type);
	else
4856
		vif->mgmt_rx_reg &= ~BIT(mgmt_type);
4857 4858 4859 4860 4861
}


static int
brcmf_cfg80211_mgmt_tx(struct wiphy *wiphy, struct wireless_dev *wdev,
4862
		       struct cfg80211_mgmt_tx_params *params, u64 *cookie)
4863 4864
{
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
4865
	struct ieee80211_channel *chan = params->chan;
4866
	struct brcmf_pub *drvr = cfg->pub;
4867 4868
	const u8 *buf = params->buf;
	size_t len = params->len;
4869 4870 4871 4872 4873
	const struct ieee80211_mgmt *mgmt;
	struct brcmf_cfg80211_vif *vif;
	s32 err = 0;
	s32 ie_offset;
	s32 ie_len;
4874 4875 4876 4877
	struct brcmf_fil_action_frame_le *action_frame;
	struct brcmf_fil_af_params_le *af_params;
	bool ack;
	s32 chan_nr;
4878
	u32 freq;
4879 4880 4881 4882 4883 4884 4885

	brcmf_dbg(TRACE, "Enter\n");

	*cookie = 0;

	mgmt = (const struct ieee80211_mgmt *)buf;

4886
	if (!ieee80211_is_mgmt(mgmt->frame_control)) {
4887
		bphy_err(drvr, "Driver only allows MGMT packet type\n");
4888 4889
		return -EPERM;
	}
4890

4891 4892
	vif = container_of(wdev, struct brcmf_cfg80211_vif, wdev);

4893 4894 4895 4896 4897 4898 4899 4900 4901 4902 4903 4904 4905 4906 4907 4908
	if (ieee80211_is_probe_resp(mgmt->frame_control)) {
		/* Right now the only reason to get a probe response */
		/* is for p2p listen response or for p2p GO from     */
		/* wpa_supplicant. Unfortunately the probe is send   */
		/* on primary ndev, while dongle wants it on the p2p */
		/* vif. Since this is only reason for a probe        */
		/* response to be sent, the vif is taken from cfg.   */
		/* If ever desired to send proberesp for non p2p     */
		/* response then data should be checked for          */
		/* "DIRECT-". Note in future supplicant will take    */
		/* dedicated p2p wdev to do this and then this 'hack'*/
		/* is not needed anymore.                            */
		ie_offset =  DOT11_MGMT_HDR_LEN +
			     DOT11_BCN_PRB_FIXED_LEN;
		ie_len = len - ie_offset;
		if (vif == cfg->p2p.bss_idx[P2PAPI_BSSCFG_PRIMARY].vif)
4909
			vif = cfg->p2p.bss_idx[P2PAPI_BSSCFG_DEVICE].vif;
4910 4911 4912 4913 4914 4915
		err = brcmf_vif_set_mgmt_ie(vif,
					    BRCMF_VNDR_IE_PRBRSP_FLAG,
					    &buf[ie_offset],
					    ie_len);
		cfg80211_mgmt_tx_status(wdev, *cookie, buf, len, true,
					GFP_KERNEL);
4916
	} else if (ieee80211_is_action(mgmt->frame_control)) {
4917
		if (len > BRCMF_FIL_ACTION_FRAME_SIZE + DOT11_MGMT_HDR_LEN) {
4918
			bphy_err(drvr, "invalid action frame length\n");
4919 4920 4921
			err = -EINVAL;
			goto exit;
		}
4922 4923
		af_params = kzalloc(sizeof(*af_params), GFP_KERNEL);
		if (af_params == NULL) {
4924
			bphy_err(drvr, "unable to allocate frame\n");
4925 4926 4927 4928 4929 4930 4931 4932 4933 4934 4935
			err = -ENOMEM;
			goto exit;
		}
		action_frame = &af_params->action_frame;
		/* Add the packet Id */
		action_frame->packet_id = cpu_to_le32(*cookie);
		/* Add BSSID */
		memcpy(&action_frame->da[0], &mgmt->da[0], ETH_ALEN);
		memcpy(&af_params->bssid[0], &mgmt->bssid[0], ETH_ALEN);
		/* Add the length exepted for 802.11 header  */
		action_frame->len = cpu_to_le16(len - DOT11_MGMT_HDR_LEN);
4936 4937 4938 4939 4940 4941 4942 4943 4944
		/* Add the channel. Use the one specified as parameter if any or
		 * the current one (got from the firmware) otherwise
		 */
		if (chan)
			freq = chan->center_freq;
		else
			brcmf_fil_cmd_int_get(vif->ifp, BRCMF_C_GET_CHANNEL,
					      &freq);
		chan_nr = ieee80211_frequency_to_channel(freq);
4945 4946 4947 4948 4949 4950
		af_params->channel = cpu_to_le32(chan_nr);

		memcpy(action_frame->data, &buf[DOT11_MGMT_HDR_LEN],
		       le16_to_cpu(action_frame->len));

		brcmf_dbg(TRACE, "Action frame, cookie=%lld, len=%d, freq=%d\n",
4951
			  *cookie, le16_to_cpu(action_frame->len), freq);
4952

4953
		ack = brcmf_p2p_send_action_frame(cfg, cfg_to_ndev(cfg),
4954 4955 4956 4957 4958
						  af_params);

		cfg80211_mgmt_tx_status(wdev, *cookie, buf, len, ack,
					GFP_KERNEL);
		kfree(af_params);
4959 4960
	} else {
		brcmf_dbg(TRACE, "Unhandled, fc=%04x!!\n", mgmt->frame_control);
4961
		brcmf_dbg_hex_dump(true, buf, len, "payload, len=%zu\n", len);
4962
	}
4963

4964
exit:
4965 4966 4967 4968 4969 4970 4971 4972 4973 4974
	return err;
}


static int
brcmf_cfg80211_cancel_remain_on_channel(struct wiphy *wiphy,
					struct wireless_dev *wdev,
					u64 cookie)
{
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
4975
	struct brcmf_pub *drvr = cfg->pub;
4976 4977 4978 4979 4980 4981 4982
	struct brcmf_cfg80211_vif *vif;
	int err = 0;

	brcmf_dbg(TRACE, "Enter p2p listen cancel\n");

	vif = cfg->p2p.bss_idx[P2PAPI_BSSCFG_DEVICE].vif;
	if (vif == NULL) {
4983
		bphy_err(drvr, "No p2p device available for probe response\n");
4984 4985 4986 4987 4988 4989 4990 4991
		err = -ENODEV;
		goto exit;
	}
	brcmf_p2p_cancel_remain_on_channel(vif->ifp);
exit:
	return err;
}

4992 4993 4994 4995 4996 4997
static int brcmf_cfg80211_get_channel(struct wiphy *wiphy,
				      struct wireless_dev *wdev,
				      struct cfg80211_chan_def *chandef)
{
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
	struct net_device *ndev = wdev->netdev;
4998
	struct brcmf_pub *drvr = cfg->pub;
4999 5000 5001 5002 5003 5004 5005 5006 5007 5008 5009 5010 5011
	struct brcmf_if *ifp;
	struct brcmu_chan ch;
	enum nl80211_band band = 0;
	enum nl80211_chan_width width = 0;
	u32 chanspec;
	int freq, err;

	if (!ndev)
		return -ENODEV;
	ifp = netdev_priv(ndev);

	err = brcmf_fil_iovar_int_get(ifp, "chanspec", &chanspec);
	if (err) {
5012
		bphy_err(drvr, "chanspec failed (%d)\n", err);
5013 5014 5015 5016 5017 5018 5019 5020 5021 5022 5023 5024 5025 5026 5027 5028 5029 5030 5031 5032 5033 5034 5035 5036 5037 5038 5039 5040 5041 5042 5043 5044 5045 5046 5047 5048 5049 5050 5051 5052 5053 5054
		return err;
	}

	ch.chspec = chanspec;
	cfg->d11inf.decchspec(&ch);

	switch (ch.band) {
	case BRCMU_CHAN_BAND_2G:
		band = NL80211_BAND_2GHZ;
		break;
	case BRCMU_CHAN_BAND_5G:
		band = NL80211_BAND_5GHZ;
		break;
	}

	switch (ch.bw) {
	case BRCMU_CHAN_BW_80:
		width = NL80211_CHAN_WIDTH_80;
		break;
	case BRCMU_CHAN_BW_40:
		width = NL80211_CHAN_WIDTH_40;
		break;
	case BRCMU_CHAN_BW_20:
		width = NL80211_CHAN_WIDTH_20;
		break;
	case BRCMU_CHAN_BW_80P80:
		width = NL80211_CHAN_WIDTH_80P80;
		break;
	case BRCMU_CHAN_BW_160:
		width = NL80211_CHAN_WIDTH_160;
		break;
	}

	freq = ieee80211_channel_to_frequency(ch.control_ch_num, band);
	chandef->chan = ieee80211_get_channel(wiphy, freq);
	chandef->width = width;
	chandef->center_freq1 = ieee80211_channel_to_frequency(ch.chnum, band);
	chandef->center_freq2 = 0;

	return 0;
}

5055 5056 5057 5058 5059 5060 5061 5062 5063 5064 5065 5066 5067 5068 5069 5070 5071 5072 5073 5074 5075 5076 5077 5078 5079 5080 5081 5082 5083 5084 5085 5086 5087
static int brcmf_cfg80211_crit_proto_start(struct wiphy *wiphy,
					   struct wireless_dev *wdev,
					   enum nl80211_crit_proto_id proto,
					   u16 duration)
{
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
	struct brcmf_cfg80211_vif *vif;

	vif = container_of(wdev, struct brcmf_cfg80211_vif, wdev);

	/* only DHCP support for now */
	if (proto != NL80211_CRIT_PROTO_DHCP)
		return -EINVAL;

	/* suppress and abort scanning */
	set_bit(BRCMF_SCAN_STATUS_SUPPRESS, &cfg->scan_status);
	brcmf_abort_scanning(cfg);

	return brcmf_btcoex_set_mode(vif, BRCMF_BTCOEX_DISABLED, duration);
}

static void brcmf_cfg80211_crit_proto_stop(struct wiphy *wiphy,
					   struct wireless_dev *wdev)
{
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
	struct brcmf_cfg80211_vif *vif;

	vif = container_of(wdev, struct brcmf_cfg80211_vif, wdev);

	brcmf_btcoex_set_mode(vif, BRCMF_BTCOEX_ENABLED, 0);
	clear_bit(BRCMF_SCAN_STATUS_SUPPRESS, &cfg->scan_status);
}

5088 5089 5090 5091 5092 5093 5094 5095 5096 5097 5098 5099 5100 5101 5102 5103 5104 5105 5106 5107 5108
static s32
brcmf_notify_tdls_peer_event(struct brcmf_if *ifp,
			     const struct brcmf_event_msg *e, void *data)
{
	switch (e->reason) {
	case BRCMF_E_REASON_TDLS_PEER_DISCOVERED:
		brcmf_dbg(TRACE, "TDLS Peer Discovered\n");
		break;
	case BRCMF_E_REASON_TDLS_PEER_CONNECTED:
		brcmf_dbg(TRACE, "TDLS Peer Connected\n");
		brcmf_proto_add_tdls_peer(ifp->drvr, ifp->ifidx, (u8 *)e->addr);
		break;
	case BRCMF_E_REASON_TDLS_PEER_DISCONNECTED:
		brcmf_dbg(TRACE, "TDLS Peer Disconnected\n");
		brcmf_proto_delete_peer(ifp->drvr, ifp->ifidx, (u8 *)e->addr);
		break;
	}

	return 0;
}

5109 5110 5111 5112 5113 5114 5115 5116 5117 5118 5119 5120 5121 5122 5123 5124 5125 5126 5127 5128 5129 5130
static int brcmf_convert_nl80211_tdls_oper(enum nl80211_tdls_operation oper)
{
	int ret;

	switch (oper) {
	case NL80211_TDLS_DISCOVERY_REQ:
		ret = BRCMF_TDLS_MANUAL_EP_DISCOVERY;
		break;
	case NL80211_TDLS_SETUP:
		ret = BRCMF_TDLS_MANUAL_EP_CREATE;
		break;
	case NL80211_TDLS_TEARDOWN:
		ret = BRCMF_TDLS_MANUAL_EP_DELETE;
		break;
	default:
		brcmf_err("unsupported operation: %d\n", oper);
		ret = -EOPNOTSUPP;
	}
	return ret;
}

static int brcmf_cfg80211_tdls_oper(struct wiphy *wiphy,
5131
				    struct net_device *ndev, const u8 *peer,
5132 5133
				    enum nl80211_tdls_operation oper)
{
5134 5135
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
	struct brcmf_pub *drvr = cfg->pub;
5136 5137 5138 5139 5140 5141 5142 5143 5144 5145 5146 5147 5148 5149 5150 5151 5152
	struct brcmf_if *ifp;
	struct brcmf_tdls_iovar_le info;
	int ret = 0;

	ret = brcmf_convert_nl80211_tdls_oper(oper);
	if (ret < 0)
		return ret;

	ifp = netdev_priv(ndev);
	memset(&info, 0, sizeof(info));
	info.mode = (u8)ret;
	if (peer)
		memcpy(info.ea, peer, ETH_ALEN);

	ret = brcmf_fil_iovar_data_set(ifp, "tdls_endpoint",
				       &info, sizeof(info));
	if (ret < 0)
5153
		bphy_err(drvr, "tdls_endpoint iovar failed: ret=%d\n", ret);
5154 5155 5156 5157

	return ret;
}

5158 5159 5160 5161 5162 5163
static int
brcmf_cfg80211_update_conn_params(struct wiphy *wiphy,
				  struct net_device *ndev,
				  struct cfg80211_connect_params *sme,
				  u32 changed)
{
5164 5165
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
	struct brcmf_pub *drvr = cfg->pub;
5166 5167 5168 5169 5170 5171 5172 5173 5174 5175
	struct brcmf_if *ifp;
	int err;

	if (!(changed & UPDATE_ASSOC_IES))
		return 0;

	ifp = netdev_priv(ndev);
	err = brcmf_vif_set_mgmt_ie(ifp->vif, BRCMF_VNDR_IE_ASSOCREQ_FLAG,
				    sme->ie, sme->ie_len);
	if (err)
5176
		bphy_err(drvr, "Set Assoc REQ IE Failed\n");
5177 5178 5179 5180 5181 5182
	else
		brcmf_dbg(TRACE, "Applied Vndr IEs for Assoc request\n");

	return err;
}

5183 5184 5185 5186 5187
#ifdef CONFIG_PM
static int
brcmf_cfg80211_set_rekey_data(struct wiphy *wiphy, struct net_device *ndev,
			      struct cfg80211_gtk_rekey_data *gtk)
{
5188 5189
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
	struct brcmf_pub *drvr = cfg->pub;
5190 5191 5192 5193 5194 5195 5196 5197 5198 5199 5200 5201 5202 5203
	struct brcmf_if *ifp = netdev_priv(ndev);
	struct brcmf_gtk_keyinfo_le gtk_le;
	int ret;

	brcmf_dbg(TRACE, "Enter, bssidx=%d\n", ifp->bsscfgidx);

	memcpy(gtk_le.kck, gtk->kck, sizeof(gtk_le.kck));
	memcpy(gtk_le.kek, gtk->kek, sizeof(gtk_le.kek));
	memcpy(gtk_le.replay_counter, gtk->replay_ctr,
	       sizeof(gtk_le.replay_counter));

	ret = brcmf_fil_iovar_data_set(ifp, "gtk_key_info", &gtk_le,
				       sizeof(gtk_le));
	if (ret < 0)
5204
		bphy_err(drvr, "gtk_key_info iovar failed: ret=%d\n", ret);
5205 5206 5207 5208 5209

	return ret;
}
#endif

5210 5211 5212 5213 5214 5215 5216 5217 5218 5219 5220 5221
static int brcmf_cfg80211_set_pmk(struct wiphy *wiphy, struct net_device *dev,
				  const struct cfg80211_pmk_conf *conf)
{
	struct brcmf_if *ifp;

	brcmf_dbg(TRACE, "enter\n");

	/* expect using firmware supplicant for 1X */
	ifp = netdev_priv(dev);
	if (WARN_ON(ifp->vif->profile.use_fwsup != BRCMF_PROFILE_FWSUP_1X))
		return -EINVAL;

5222 5223 5224
	if (conf->pmk_len > BRCMF_WSEC_MAX_PSK_LEN)
		return -ERANGE;

5225 5226 5227 5228 5229 5230 5231 5232 5233 5234 5235 5236 5237 5238 5239 5240
	return brcmf_set_pmk(ifp, conf->pmk, conf->pmk_len);
}

static int brcmf_cfg80211_del_pmk(struct wiphy *wiphy, struct net_device *dev,
				  const u8 *aa)
{
	struct brcmf_if *ifp;

	brcmf_dbg(TRACE, "enter\n");
	ifp = netdev_priv(dev);
	if (WARN_ON(ifp->vif->profile.use_fwsup != BRCMF_PROFILE_FWSUP_1X))
		return -EINVAL;

	return brcmf_set_pmk(ifp, NULL, 0);
}

5241
static struct cfg80211_ops brcmf_cfg80211_ops = {
5242 5243
	.add_virtual_intf = brcmf_cfg80211_add_iface,
	.del_virtual_intf = brcmf_cfg80211_del_iface,
5244 5245 5246 5247 5248 5249
	.change_virtual_intf = brcmf_cfg80211_change_iface,
	.scan = brcmf_cfg80211_scan,
	.set_wiphy_params = brcmf_cfg80211_set_wiphy_params,
	.join_ibss = brcmf_cfg80211_join_ibss,
	.leave_ibss = brcmf_cfg80211_leave_ibss,
	.get_station = brcmf_cfg80211_get_station,
5250
	.dump_station = brcmf_cfg80211_dump_station,
5251 5252 5253 5254 5255 5256 5257 5258 5259 5260 5261 5262 5263 5264
	.set_tx_power = brcmf_cfg80211_set_tx_power,
	.get_tx_power = brcmf_cfg80211_get_tx_power,
	.add_key = brcmf_cfg80211_add_key,
	.del_key = brcmf_cfg80211_del_key,
	.get_key = brcmf_cfg80211_get_key,
	.set_default_key = brcmf_cfg80211_config_default_key,
	.set_default_mgmt_key = brcmf_cfg80211_config_default_mgmt_key,
	.set_power_mgmt = brcmf_cfg80211_set_power_mgmt,
	.connect = brcmf_cfg80211_connect,
	.disconnect = brcmf_cfg80211_disconnect,
	.suspend = brcmf_cfg80211_suspend,
	.resume = brcmf_cfg80211_resume,
	.set_pmksa = brcmf_cfg80211_set_pmksa,
	.del_pmksa = brcmf_cfg80211_del_pmksa,
5265
	.flush_pmksa = brcmf_cfg80211_flush_pmksa,
5266 5267
	.start_ap = brcmf_cfg80211_start_ap,
	.stop_ap = brcmf_cfg80211_stop_ap,
5268
	.change_beacon = brcmf_cfg80211_change_beacon,
5269
	.del_station = brcmf_cfg80211_del_station,
5270
	.change_station = brcmf_cfg80211_change_station,
5271 5272
	.sched_scan_start = brcmf_cfg80211_sched_scan_start,
	.sched_scan_stop = brcmf_cfg80211_sched_scan_stop,
5273 5274 5275 5276
	.mgmt_frame_register = brcmf_cfg80211_mgmt_frame_register,
	.mgmt_tx = brcmf_cfg80211_mgmt_tx,
	.remain_on_channel = brcmf_p2p_remain_on_channel,
	.cancel_remain_on_channel = brcmf_cfg80211_cancel_remain_on_channel,
5277
	.get_channel = brcmf_cfg80211_get_channel,
5278 5279
	.start_p2p_device = brcmf_p2p_start_device,
	.stop_p2p_device = brcmf_p2p_stop_device,
5280 5281
	.crit_proto_start = brcmf_cfg80211_crit_proto_start,
	.crit_proto_stop = brcmf_cfg80211_crit_proto_stop,
5282
	.tdls_oper = brcmf_cfg80211_tdls_oper,
5283
	.update_connect_params = brcmf_cfg80211_update_conn_params,
5284 5285
	.set_pmk = brcmf_cfg80211_set_pmk,
	.del_pmk = brcmf_cfg80211_del_pmk,
5286 5287
};

5288
struct cfg80211_ops *brcmf_cfg80211_get_ops(struct brcmf_mp_device *settings)
5289
{
5290 5291 5292
	struct cfg80211_ops *ops;

	ops = kmemdup(&brcmf_cfg80211_ops, sizeof(brcmf_cfg80211_ops),
5293
		       GFP_KERNEL);
5294 5295 5296 5297 5298

	if (ops && settings->roamoff)
		ops->update_connect_params = NULL;

	return ops;
5299 5300
}

5301
struct brcmf_cfg80211_vif *brcmf_alloc_vif(struct brcmf_cfg80211_info *cfg,
5302
					   enum nl80211_iftype type)
5303
{
5304
	struct brcmf_cfg80211_vif *vif_walk;
5305
	struct brcmf_cfg80211_vif *vif;
5306
	bool mbss;
5307

5308
	brcmf_dbg(TRACE, "allocating virtual interface (size=%zu)\n",
5309
		  sizeof(*vif));
5310 5311 5312 5313 5314
	vif = kzalloc(sizeof(*vif), GFP_KERNEL);
	if (!vif)
		return ERR_PTR(-ENOMEM);

	vif->wdev.wiphy = cfg->wiphy;
5315
	vif->wdev.iftype = type;
5316

5317 5318
	brcmf_init_prof(&vif->profile);

5319 5320 5321 5322 5323 5324 5325 5326 5327 5328 5329
	if (type == NL80211_IFTYPE_AP) {
		mbss = false;
		list_for_each_entry(vif_walk, &cfg->vif_list, list) {
			if (vif_walk->wdev.iftype == NL80211_IFTYPE_AP) {
				mbss = true;
				break;
			}
		}
		vif->mbss = mbss;
	}

5330 5331
	list_add_tail(&vif->list, &cfg->vif_list);
	return vif;
5332 5333
}

5334
void brcmf_free_vif(struct brcmf_cfg80211_vif *vif)
5335
{
5336 5337
	list_del(&vif->list);
	kfree(vif);
5338 5339
}

5340 5341 5342 5343 5344 5345 5346 5347
void brcmf_cfg80211_free_netdev(struct net_device *ndev)
{
	struct brcmf_cfg80211_vif *vif;
	struct brcmf_if *ifp;

	ifp = netdev_priv(ndev);
	vif = ifp->vif;

5348 5349
	if (vif)
		brcmf_free_vif(vif);
5350 5351
}

5352 5353
static bool brcmf_is_linkup(struct brcmf_cfg80211_vif *vif,
			    const struct brcmf_event_msg *e)
5354
{
5355 5356
	u32 event = e->event_code;
	u32 status = e->status;
5357

5358 5359
	if (vif->profile.use_fwsup == BRCMF_PROFILE_FWSUP_PSK &&
	    event == BRCMF_E_PSK_SUP &&
5360 5361
	    status == BRCMF_E_STATUS_FWSUP_COMPLETED)
		set_bit(BRCMF_VIF_STATUS_EAP_SUCCESS, &vif->sme_state);
5362
	if (event == BRCMF_E_SET_SSID && status == BRCMF_E_STATUS_SUCCESS) {
5363
		brcmf_dbg(CONN, "Processing set ssid\n");
5364 5365 5366 5367 5368
		memcpy(vif->profile.bssid, e->addr, ETH_ALEN);
		if (vif->profile.use_fwsup != BRCMF_PROFILE_FWSUP_PSK)
			return true;

		set_bit(BRCMF_VIF_STATUS_ASSOC_SUCCESS, &vif->sme_state);
5369 5370
	}

5371 5372 5373 5374 5375 5376
	if (test_bit(BRCMF_VIF_STATUS_EAP_SUCCESS, &vif->sme_state) &&
	    test_bit(BRCMF_VIF_STATUS_ASSOC_SUCCESS, &vif->sme_state)) {
		clear_bit(BRCMF_VIF_STATUS_EAP_SUCCESS, &vif->sme_state);
		clear_bit(BRCMF_VIF_STATUS_ASSOC_SUCCESS, &vif->sme_state);
		return true;
	}
5377 5378 5379
	return false;
}

5380
static bool brcmf_is_linkdown(const struct brcmf_event_msg *e)
5381
{
5382 5383
	u32 event = e->event_code;
	u16 flags = e->flags;
5384

5385 5386 5387
	if ((event == BRCMF_E_DEAUTH) || (event == BRCMF_E_DEAUTH_IND) ||
	    (event == BRCMF_E_DISASSOC_IND) ||
	    ((event == BRCMF_E_LINK) && (!(flags & BRCMF_EVENT_MSG_LINK)))) {
5388
		brcmf_dbg(CONN, "Processing link down\n");
5389 5390 5391 5392 5393
		return true;
	}
	return false;
}

5394
static bool brcmf_is_nonetwork(struct brcmf_cfg80211_info *cfg,
5395 5396
			       const struct brcmf_event_msg *e)
{
5397 5398
	u32 event = e->event_code;
	u32 status = e->status;
5399 5400

	if (event == BRCMF_E_LINK && status == BRCMF_E_STATUS_NO_NETWORKS) {
5401 5402
		brcmf_dbg(CONN, "Processing Link %s & no network found\n",
			  e->flags & BRCMF_EVENT_MSG_LINK ? "up" : "down");
5403 5404 5405 5406
		return true;
	}

	if (event == BRCMF_E_SET_SSID && status != BRCMF_E_STATUS_SUCCESS) {
5407
		brcmf_dbg(CONN, "Processing connecting & no network found\n");
5408 5409 5410
		return true;
	}

5411 5412 5413 5414 5415 5416 5417
	if (event == BRCMF_E_PSK_SUP &&
	    status != BRCMF_E_STATUS_FWSUP_COMPLETED) {
		brcmf_dbg(CONN, "Processing failed supplicant state: %u\n",
			  status);
		return true;
	}

5418 5419 5420
	return false;
}

5421
static void brcmf_clear_assoc_ies(struct brcmf_cfg80211_info *cfg)
5422
{
5423
	struct brcmf_cfg80211_connect_info *conn_info = cfg_to_conn(cfg);
5424 5425 5426 5427 5428 5429 5430 5431 5432

	kfree(conn_info->req_ie);
	conn_info->req_ie = NULL;
	conn_info->req_ie_len = 0;
	kfree(conn_info->resp_ie);
	conn_info->resp_ie = NULL;
	conn_info->resp_ie_len = 0;
}

5433 5434
static s32 brcmf_get_assoc_ies(struct brcmf_cfg80211_info *cfg,
			       struct brcmf_if *ifp)
5435
{
5436
	struct brcmf_pub *drvr = cfg->pub;
5437
	struct brcmf_cfg80211_assoc_ielen_le *assoc_info;
5438
	struct brcmf_cfg80211_connect_info *conn_info = cfg_to_conn(cfg);
5439 5440 5441 5442
	u32 req_len;
	u32 resp_len;
	s32 err = 0;

5443
	brcmf_clear_assoc_ies(cfg);
5444

5445 5446
	err = brcmf_fil_iovar_data_get(ifp, "assoc_info",
				       cfg->extra_buf, WL_ASSOC_INFO_MAX);
5447
	if (err) {
5448
		bphy_err(drvr, "could not get assoc info (%d)\n", err);
5449 5450
		return err;
	}
5451
	assoc_info =
5452
		(struct brcmf_cfg80211_assoc_ielen_le *)cfg->extra_buf;
5453 5454
	req_len = le32_to_cpu(assoc_info->req_len);
	resp_len = le32_to_cpu(assoc_info->resp_len);
5455
	if (req_len) {
5456
		err = brcmf_fil_iovar_data_get(ifp, "assoc_req_ies",
5457 5458
					       cfg->extra_buf,
					       WL_ASSOC_INFO_MAX);
5459
		if (err) {
5460
			bphy_err(drvr, "could not get assoc req (%d)\n", err);
5461 5462 5463 5464
			return err;
		}
		conn_info->req_ie_len = req_len;
		conn_info->req_ie =
5465
		    kmemdup(cfg->extra_buf, conn_info->req_ie_len,
5466 5467 5468 5469 5470 5471
			    GFP_KERNEL);
	} else {
		conn_info->req_ie_len = 0;
		conn_info->req_ie = NULL;
	}
	if (resp_len) {
5472
		err = brcmf_fil_iovar_data_get(ifp, "assoc_resp_ies",
5473 5474
					       cfg->extra_buf,
					       WL_ASSOC_INFO_MAX);
5475
		if (err) {
5476
			bphy_err(drvr, "could not get assoc resp (%d)\n", err);
5477 5478 5479 5480
			return err;
		}
		conn_info->resp_ie_len = resp_len;
		conn_info->resp_ie =
5481
		    kmemdup(cfg->extra_buf, conn_info->resp_ie_len,
5482 5483 5484 5485 5486
			    GFP_KERNEL);
	} else {
		conn_info->resp_ie_len = 0;
		conn_info->resp_ie = NULL;
	}
5487 5488
	brcmf_dbg(CONN, "req len (%d) resp len (%d)\n",
		  conn_info->req_ie_len, conn_info->resp_ie_len);
5489 5490 5491 5492 5493

	return err;
}

static s32
5494
brcmf_bss_roaming_done(struct brcmf_cfg80211_info *cfg,
5495 5496 5497
		       struct net_device *ndev,
		       const struct brcmf_event_msg *e)
{
5498 5499
	struct brcmf_if *ifp = netdev_priv(ndev);
	struct brcmf_cfg80211_profile *profile = &ifp->vif->profile;
5500 5501
	struct brcmf_cfg80211_connect_info *conn_info = cfg_to_conn(cfg);
	struct wiphy *wiphy = cfg_to_wiphy(cfg);
5502
	struct ieee80211_channel *notify_channel = NULL;
5503
	struct ieee80211_supported_band *band;
5504
	struct brcmf_bss_info_le *bi;
5505
	struct brcmu_chan ch;
5506
	struct cfg80211_roam_info roam_info = {};
5507 5508
	u32 freq;
	s32 err = 0;
5509
	u8 *buf;
5510

5511
	brcmf_dbg(TRACE, "Enter\n");
5512

5513
	brcmf_get_assoc_ies(cfg, ifp);
5514
	memcpy(profile->bssid, e->addr, ETH_ALEN);
5515
	brcmf_update_bss_info(cfg, ifp);
5516

5517 5518 5519 5520 5521 5522 5523 5524
	buf = kzalloc(WL_BSS_INFO_MAX, GFP_KERNEL);
	if (buf == NULL) {
		err = -ENOMEM;
		goto done;
	}

	/* data sent to dongle has to be little endian */
	*(__le32 *)buf = cpu_to_le32(WL_BSS_INFO_MAX);
5525
	err = brcmf_fil_cmd_data_get(ifp, BRCMF_C_GET_BSS_INFO,
5526
				     buf, WL_BSS_INFO_MAX);
5527 5528 5529

	if (err)
		goto done;
5530

5531
	bi = (struct brcmf_bss_info_le *)(buf + 4);
5532 5533
	ch.chspec = le16_to_cpu(bi->chanspec);
	cfg->d11inf.decchspec(&ch);
5534

5535
	if (ch.band == BRCMU_CHAN_BAND_2G)
5536
		band = wiphy->bands[NL80211_BAND_2GHZ];
5537
	else
5538
		band = wiphy->bands[NL80211_BAND_5GHZ];
5539

5540
	freq = ieee80211_channel_to_frequency(ch.control_ch_num, band->band);
5541 5542
	notify_channel = ieee80211_get_channel(wiphy, freq);

5543 5544
done:
	kfree(buf);
5545 5546 5547 5548 5549 5550 5551 5552 5553

	roam_info.channel = notify_channel;
	roam_info.bssid = profile->bssid;
	roam_info.req_ie = conn_info->req_ie;
	roam_info.req_ie_len = conn_info->req_ie_len;
	roam_info.resp_ie = conn_info->resp_ie;
	roam_info.resp_ie_len = conn_info->resp_ie_len;

	cfg80211_roamed(ndev, &roam_info, GFP_KERNEL);
5554
	brcmf_dbg(CONN, "Report roaming result\n");
5555

5556
	set_bit(BRCMF_VIF_STATUS_CONNECTED, &ifp->vif->sme_state);
5557
	brcmf_dbg(TRACE, "Exit\n");
5558 5559 5560 5561
	return err;
}

static s32
5562
brcmf_bss_connect_done(struct brcmf_cfg80211_info *cfg,
5563 5564 5565
		       struct net_device *ndev, const struct brcmf_event_msg *e,
		       bool completed)
{
5566 5567
	struct brcmf_if *ifp = netdev_priv(ndev);
	struct brcmf_cfg80211_profile *profile = &ifp->vif->profile;
5568
	struct brcmf_cfg80211_connect_info *conn_info = cfg_to_conn(cfg);
5569
	struct cfg80211_connect_resp_params conn_params;
5570

5571
	brcmf_dbg(TRACE, "Enter\n");
5572

5573 5574
	if (test_and_clear_bit(BRCMF_VIF_STATUS_CONNECTING,
			       &ifp->vif->sme_state)) {
5575
		memset(&conn_params, 0, sizeof(conn_params));
5576
		if (completed) {
5577 5578 5579 5580
			brcmf_get_assoc_ies(cfg, ifp);
			brcmf_update_bss_info(cfg, ifp);
			set_bit(BRCMF_VIF_STATUS_CONNECTED,
				&ifp->vif->sme_state);
5581 5582 5583
			conn_params.status = WLAN_STATUS_SUCCESS;
		} else {
			conn_params.status = WLAN_STATUS_AUTH_TIMEOUT;
5584
		}
5585 5586 5587 5588 5589 5590
		conn_params.bssid = profile->bssid;
		conn_params.req_ie = conn_info->req_ie;
		conn_params.req_ie_len = conn_info->req_ie_len;
		conn_params.resp_ie = conn_info->resp_ie;
		conn_params.resp_ie_len = conn_info->resp_ie_len;
		cfg80211_connect_done(ndev, &conn_params, GFP_KERNEL);
5591 5592
		brcmf_dbg(CONN, "Report connect result - connection %s\n",
			  completed ? "succeeded" : "failed");
5593
	}
5594
	brcmf_dbg(TRACE, "Exit\n");
5595
	return 0;
5596 5597 5598
}

static s32
5599
brcmf_notify_connect_status_ap(struct brcmf_cfg80211_info *cfg,
5600 5601 5602
			       struct net_device *ndev,
			       const struct brcmf_event_msg *e, void *data)
{
5603
	struct brcmf_pub *drvr = cfg->pub;
5604
	static int generation;
5605 5606
	u32 event = e->event_code;
	u32 reason = e->reason;
5607
	struct station_info *sinfo;
5608

5609 5610
	brcmf_dbg(CONN, "event %s (%u), reason %d\n",
		  brcmf_fweh_event_name(event), event, reason);
5611 5612 5613 5614 5615 5616
	if (event == BRCMF_E_LINK && reason == BRCMF_E_REASON_LINK_BSSCFG_DIS &&
	    ndev != cfg_to_ndev(cfg)) {
		brcmf_dbg(CONN, "AP mode link down\n");
		complete(&cfg->vif_disabled);
		return 0;
	}
5617 5618

	if (((event == BRCMF_E_ASSOC_IND) || (event == BRCMF_E_REASSOC_IND)) &&
5619
	    (reason == BRCMF_E_STATUS_SUCCESS)) {
5620
		if (!data) {
5621
			bphy_err(drvr, "No IEs present in ASSOC/REASSOC_IND\n");
5622 5623
			return -EINVAL;
		}
5624 5625 5626 5627 5628 5629 5630

		sinfo = kzalloc(sizeof(*sinfo), GFP_KERNEL);
		if (!sinfo)
			return -ENOMEM;

		sinfo->assoc_req_ies = data;
		sinfo->assoc_req_ies_len = e->datalen;
5631
		generation++;
5632 5633 5634 5635
		sinfo->generation = generation;
		cfg80211_new_sta(ndev, e->addr, sinfo, GFP_KERNEL);

		kfree(sinfo);
5636 5637 5638
	} else if ((event == BRCMF_E_DISASSOC_IND) ||
		   (event == BRCMF_E_DEAUTH_IND) ||
		   (event == BRCMF_E_DEAUTH)) {
5639
		cfg80211_del_sta(ndev, e->addr, GFP_KERNEL);
5640
	}
5641
	return 0;
5642 5643
}

5644
static s32
5645
brcmf_notify_connect_status(struct brcmf_if *ifp,
5646 5647
			    const struct brcmf_event_msg *e, void *data)
{
5648 5649
	struct brcmf_cfg80211_info *cfg = ifp->drvr->config;
	struct net_device *ndev = ifp->ndev;
5650
	struct brcmf_cfg80211_profile *profile = &ifp->vif->profile;
5651
	struct ieee80211_channel *chan;
5652 5653
	s32 err = 0;

5654 5655 5656 5657 5658 5659 5660
	if ((e->event_code == BRCMF_E_DEAUTH) ||
	    (e->event_code == BRCMF_E_DEAUTH_IND) ||
	    (e->event_code == BRCMF_E_DISASSOC_IND) ||
	    ((e->event_code == BRCMF_E_LINK) && (!e->flags))) {
		brcmf_proto_delete_peer(ifp->drvr, ifp->ifidx, (u8 *)e->addr);
	}

5661
	if (brcmf_is_apmode(ifp->vif)) {
5662
		err = brcmf_notify_connect_status_ap(cfg, ndev, e, data);
5663
	} else if (brcmf_is_linkup(ifp->vif, e)) {
5664
		brcmf_dbg(CONN, "Linkup\n");
5665
		if (brcmf_is_ibssmode(ifp->vif)) {
Hante Meuleman's avatar
Hante Meuleman committed
5666
			brcmf_inform_ibss(cfg, ndev, e->addr);
5667
			chan = ieee80211_get_channel(cfg->wiphy, cfg->channel);
5668
			memcpy(profile->bssid, e->addr, ETH_ALEN);
5669
			cfg80211_ibss_joined(ndev, e->addr, chan, GFP_KERNEL);
5670 5671 5672 5673
			clear_bit(BRCMF_VIF_STATUS_CONNECTING,
				  &ifp->vif->sme_state);
			set_bit(BRCMF_VIF_STATUS_CONNECTED,
				&ifp->vif->sme_state);
5674
		} else
5675
			brcmf_bss_connect_done(cfg, ndev, e, true);
5676
		brcmf_net_setcarrier(ifp, true);
5677
	} else if (brcmf_is_linkdown(e)) {
5678
		brcmf_dbg(CONN, "Linkdown\n");
5679
		if (!brcmf_is_ibssmode(ifp->vif)) {
5680
			brcmf_bss_connect_done(cfg, ndev, e, false);
5681 5682 5683 5684 5685 5686
			brcmf_link_down(ifp->vif,
					brcmf_map_fw_linkdown_reason(e));
			brcmf_init_prof(ndev_to_prof(ndev));
			if (ndev != cfg_to_ndev(cfg))
				complete(&cfg->vif_disabled);
			brcmf_net_setcarrier(ifp, false);
5687
		}
5688
	} else if (brcmf_is_nonetwork(cfg, e)) {
5689
		if (brcmf_is_ibssmode(ifp->vif))
5690 5691
			clear_bit(BRCMF_VIF_STATUS_CONNECTING,
				  &ifp->vif->sme_state);
5692
		else
5693
			brcmf_bss_connect_done(cfg, ndev, e, false);
5694 5695 5696 5697 5698 5699
	}

	return err;
}

static s32
5700
brcmf_notify_roaming_status(struct brcmf_if *ifp,
5701 5702
			    const struct brcmf_event_msg *e, void *data)
{
5703
	struct brcmf_cfg80211_info *cfg = ifp->drvr->config;
5704 5705
	u32 event = e->event_code;
	u32 status = e->status;
5706 5707

	if (event == BRCMF_E_ROAM && status == BRCMF_E_STATUS_SUCCESS) {
5708 5709
		if (test_bit(BRCMF_VIF_STATUS_CONNECTED,
			     &ifp->vif->sme_state)) {
5710
			brcmf_bss_roaming_done(cfg, ifp->ndev, e);
5711
		} else {
5712
			brcmf_bss_connect_done(cfg, ifp->ndev, e, true);
5713 5714
			brcmf_net_setcarrier(ifp, true);
		}
5715 5716
	}

5717
	return 0;
5718 5719 5720
}

static s32
5721
brcmf_notify_mic_status(struct brcmf_if *ifp,
5722 5723
			const struct brcmf_event_msg *e, void *data)
{
5724
	u16 flags = e->flags;
5725 5726 5727 5728 5729 5730 5731
	enum nl80211_key_type key_type;

	if (flags & BRCMF_EVENT_MSG_GROUP)
		key_type = NL80211_KEYTYPE_GROUP;
	else
		key_type = NL80211_KEYTYPE_PAIRWISE;

5732
	cfg80211_michael_mic_failure(ifp->ndev, (u8 *)&e->addr, key_type, -1,
5733 5734 5735 5736 5737
				     NULL, GFP_KERNEL);

	return 0;
}

5738 5739 5740 5741 5742 5743 5744 5745
static s32 brcmf_notify_vif_event(struct brcmf_if *ifp,
				  const struct brcmf_event_msg *e, void *data)
{
	struct brcmf_cfg80211_info *cfg = ifp->drvr->config;
	struct brcmf_if_event *ifevent = (struct brcmf_if_event *)data;
	struct brcmf_cfg80211_vif_event *event = &cfg->vif_event;
	struct brcmf_cfg80211_vif *vif;

5746
	brcmf_dbg(TRACE, "Enter: action %u flags %u ifidx %u bsscfgidx %u\n",
5747
		  ifevent->action, ifevent->flags, ifevent->ifidx,
5748
		  ifevent->bsscfgidx);
5749

5750
	spin_lock(&event->vif_event_lock);
5751 5752 5753 5754 5755 5756
	event->action = ifevent->action;
	vif = event->vif;

	switch (ifevent->action) {
	case BRCMF_E_IF_ADD:
		/* waiting process may have timed out */
5757
		if (!cfg->vif_event.vif) {
5758
			spin_unlock(&event->vif_event_lock);
5759
			return -EBADF;
5760
		}
5761 5762 5763

		ifp->vif = vif;
		vif->ifp = ifp;
5764 5765 5766 5767 5768
		if (ifp->ndev) {
			vif->wdev.netdev = ifp->ndev;
			ifp->ndev->ieee80211_ptr = &vif->wdev;
			SET_NETDEV_DEV(ifp->ndev, wiphy_dev(cfg->wiphy));
		}
5769
		spin_unlock(&event->vif_event_lock);
5770
		wake_up(&event->vif_wq);
5771
		return 0;
5772 5773

	case BRCMF_E_IF_DEL:
5774
		spin_unlock(&event->vif_event_lock);
5775 5776 5777 5778 5779
		/* event may not be upon user request */
		if (brcmf_cfg80211_vif_event_armed(cfg))
			wake_up(&event->vif_wq);
		return 0;

5780
	case BRCMF_E_IF_CHANGE:
5781
		spin_unlock(&event->vif_event_lock);
5782 5783 5784
		wake_up(&event->vif_wq);
		return 0;

5785
	default:
5786
		spin_unlock(&event->vif_event_lock);
5787 5788 5789 5790 5791
		break;
	}
	return -EINVAL;
}

5792 5793 5794 5795 5796 5797 5798 5799
static void brcmf_init_conf(struct brcmf_cfg80211_conf *conf)
{
	conf->frag_threshold = (u32)-1;
	conf->rts_threshold = (u32)-1;
	conf->retry_short = (u32)-1;
	conf->retry_long = (u32)-1;
}

5800
static void brcmf_register_event_handlers(struct brcmf_cfg80211_info *cfg)
5801
{
5802 5803 5804 5805 5806 5807 5808 5809 5810 5811 5812 5813 5814 5815 5816 5817 5818 5819 5820 5821
	brcmf_fweh_register(cfg->pub, BRCMF_E_LINK,
			    brcmf_notify_connect_status);
	brcmf_fweh_register(cfg->pub, BRCMF_E_DEAUTH_IND,
			    brcmf_notify_connect_status);
	brcmf_fweh_register(cfg->pub, BRCMF_E_DEAUTH,
			    brcmf_notify_connect_status);
	brcmf_fweh_register(cfg->pub, BRCMF_E_DISASSOC_IND,
			    brcmf_notify_connect_status);
	brcmf_fweh_register(cfg->pub, BRCMF_E_ASSOC_IND,
			    brcmf_notify_connect_status);
	brcmf_fweh_register(cfg->pub, BRCMF_E_REASSOC_IND,
			    brcmf_notify_connect_status);
	brcmf_fweh_register(cfg->pub, BRCMF_E_ROAM,
			    brcmf_notify_roaming_status);
	brcmf_fweh_register(cfg->pub, BRCMF_E_MIC_ERROR,
			    brcmf_notify_mic_status);
	brcmf_fweh_register(cfg->pub, BRCMF_E_SET_SSID,
			    brcmf_notify_connect_status);
	brcmf_fweh_register(cfg->pub, BRCMF_E_PFN_NET_FOUND,
			    brcmf_notify_sched_scan_results);
5822 5823
	brcmf_fweh_register(cfg->pub, BRCMF_E_IF,
			    brcmf_notify_vif_event);
5824
	brcmf_fweh_register(cfg->pub, BRCMF_E_P2P_PROBEREQ_MSG,
5825
			    brcmf_p2p_notify_rx_mgmt_p2p_probereq);
5826 5827
	brcmf_fweh_register(cfg->pub, BRCMF_E_P2P_DISC_LISTEN_COMPLETE,
			    brcmf_p2p_notify_listen_complete);
5828 5829
	brcmf_fweh_register(cfg->pub, BRCMF_E_ACTION_FRAME_RX,
			    brcmf_p2p_notify_action_frame_rx);
5830 5831
	brcmf_fweh_register(cfg->pub, BRCMF_E_ACTION_FRAME_COMPLETE,
			    brcmf_p2p_notify_action_tx_complete);
5832 5833
	brcmf_fweh_register(cfg->pub, BRCMF_E_ACTION_FRAME_OFF_CHAN_COMPLETE,
			    brcmf_p2p_notify_action_tx_complete);
5834 5835
	brcmf_fweh_register(cfg->pub, BRCMF_E_PSK_SUP,
			    brcmf_notify_connect_status);
5836 5837
}

5838 5839 5840 5841 5842 5843
static void brcmf_deinit_priv_mem(struct brcmf_cfg80211_info *cfg)
{
	kfree(cfg->conf);
	cfg->conf = NULL;
	kfree(cfg->extra_buf);
	cfg->extra_buf = NULL;
5844 5845 5846 5847
	kfree(cfg->wowl.nd);
	cfg->wowl.nd = NULL;
	kfree(cfg->wowl.nd_info);
	cfg->wowl.nd_info = NULL;
5848 5849
	kfree(cfg->escan_info.escan_buf);
	cfg->escan_info.escan_buf = NULL;
5850 5851 5852 5853 5854 5855
}

static s32 brcmf_init_priv_mem(struct brcmf_cfg80211_info *cfg)
{
	cfg->conf = kzalloc(sizeof(*cfg->conf), GFP_KERNEL);
	if (!cfg->conf)
5856
		goto init_priv_mem_out;
5857 5858
	cfg->extra_buf = kzalloc(WL_EXTRA_BUF_MAX, GFP_KERNEL);
	if (!cfg->extra_buf)
5859
		goto init_priv_mem_out;
5860 5861 5862 5863 5864 5865 5866 5867
	cfg->wowl.nd = kzalloc(sizeof(*cfg->wowl.nd) + sizeof(u32), GFP_KERNEL);
	if (!cfg->wowl.nd)
		goto init_priv_mem_out;
	cfg->wowl.nd_info = kzalloc(sizeof(*cfg->wowl.nd_info) +
				    sizeof(struct cfg80211_wowlan_nd_match *),
				    GFP_KERNEL);
	if (!cfg->wowl.nd_info)
		goto init_priv_mem_out;
5868 5869 5870
	cfg->escan_info.escan_buf = kzalloc(BRCMF_ESCAN_BUF_SIZE, GFP_KERNEL);
	if (!cfg->escan_info.escan_buf)
		goto init_priv_mem_out;
5871 5872 5873 5874

	return 0;

init_priv_mem_out:
5875
	brcmf_deinit_priv_mem(cfg);
5876 5877 5878 5879

	return -ENOMEM;
}

5880
static s32 wl_init_priv(struct brcmf_cfg80211_info *cfg)
5881 5882 5883
{
	s32 err = 0;

5884 5885
	cfg->scan_request = NULL;
	cfg->pwr_save = true;
5886
	cfg->dongle_up = false;		/* dongle is not up yet */
5887
	err = brcmf_init_priv_mem(cfg);
5888 5889
	if (err)
		return err;
5890
	brcmf_register_event_handlers(cfg);
5891 5892 5893
	mutex_init(&cfg->usr_sync);
	brcmf_init_escan(cfg);
	brcmf_init_conf(cfg->conf);
5894
	init_completion(&cfg->vif_disabled);
5895 5896 5897
	return err;
}

5898
static void wl_deinit_priv(struct brcmf_cfg80211_info *cfg)
5899
{
5900 5901 5902
	cfg->dongle_up = false;	/* dongle down */
	brcmf_abort_scanning(cfg);
	brcmf_deinit_priv_mem(cfg);
5903 5904
}

5905 5906 5907
static void init_vif_event(struct brcmf_cfg80211_vif_event *event)
{
	init_waitqueue_head(&event->vif_wq);
5908
	spin_lock_init(&event->vif_event_lock);
5909 5910
}

5911
static s32 brcmf_dongle_roam(struct brcmf_if *ifp)
5912
{
5913
	struct brcmf_pub *drvr = ifp->drvr;
5914 5915
	s32 err;
	u32 bcn_timeout;
5916 5917
	__le32 roamtrigger[2];
	__le32 roam_delta[2];
5918

5919
	/* Configure beacon timeout value based upon roaming setting */
5920
	if (ifp->drvr->settings->roamoff)
5921 5922 5923 5924 5925
		bcn_timeout = BRCMF_DEFAULT_BCN_TIMEOUT_ROAM_OFF;
	else
		bcn_timeout = BRCMF_DEFAULT_BCN_TIMEOUT_ROAM_ON;
	err = brcmf_fil_iovar_int_set(ifp, "bcn_timeout", bcn_timeout);
	if (err) {
5926
		bphy_err(drvr, "bcn_timeout error (%d)\n", err);
5927
		goto roam_setup_done;
5928 5929
	}

5930 5931
	/* Enable/Disable built-in roaming to allow supplicant to take care of
	 * roaming.
5932
	 */
5933
	brcmf_dbg(INFO, "Internal Roaming = %s\n",
5934 5935 5936
		  ifp->drvr->settings->roamoff ? "Off" : "On");
	err = brcmf_fil_iovar_int_set(ifp, "roam_off",
				      ifp->drvr->settings->roamoff);
5937
	if (err) {
5938
		bphy_err(drvr, "roam_off error (%d)\n", err);
5939
		goto roam_setup_done;
5940 5941
	}

5942 5943
	roamtrigger[0] = cpu_to_le32(WL_ROAM_TRIGGER_LEVEL);
	roamtrigger[1] = cpu_to_le32(BRCM_BAND_ALL);
5944
	err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_ROAM_TRIGGER,
5945
				     (void *)roamtrigger, sizeof(roamtrigger));
5946
	if (err) {
5947
		bphy_err(drvr, "WLC_SET_ROAM_TRIGGER error (%d)\n", err);
5948
		goto roam_setup_done;
5949 5950
	}

5951 5952
	roam_delta[0] = cpu_to_le32(WL_ROAM_DELTA);
	roam_delta[1] = cpu_to_le32(BRCM_BAND_ALL);
5953
	err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_ROAM_DELTA,
5954
				     (void *)roam_delta, sizeof(roam_delta));
5955
	if (err) {
5956
		bphy_err(drvr, "WLC_SET_ROAM_DELTA error (%d)\n", err);
5957
		goto roam_setup_done;
5958 5959
	}

5960
roam_setup_done:
5961 5962 5963 5964
	return err;
}

static s32
5965
brcmf_dongle_scantime(struct brcmf_if *ifp)
5966
{
5967
	struct brcmf_pub *drvr = ifp->drvr;
5968 5969
	s32 err = 0;

5970
	err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_SCAN_CHANNEL_TIME,
5971
				    BRCMF_SCAN_CHANNEL_TIME);
5972
	if (err) {
5973
		bphy_err(drvr, "Scan assoc time error (%d)\n", err);
5974 5975
		goto dongle_scantime_out;
	}
5976
	err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_SCAN_UNASSOC_TIME,
5977
				    BRCMF_SCAN_UNASSOC_TIME);
5978
	if (err) {
5979
		bphy_err(drvr, "Scan unassoc time error (%d)\n", err);
5980 5981 5982
		goto dongle_scantime_out;
	}

5983
	err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_SCAN_PASSIVE_TIME,
5984
				    BRCMF_SCAN_PASSIVE_TIME);
5985
	if (err) {
5986
		bphy_err(drvr, "Scan passive time error (%d)\n", err);
5987 5988 5989 5990 5991 5992 5993
		goto dongle_scantime_out;
	}

dongle_scantime_out:
	return err;
}

5994 5995 5996 5997
static void brcmf_update_bw40_channel_flag(struct ieee80211_channel *channel,
					   struct brcmu_chan *ch)
{
	u32 ht40_flag;
5998

5999 6000 6001 6002 6003 6004 6005 6006 6007 6008 6009 6010 6011 6012 6013 6014 6015 6016
	ht40_flag = channel->flags & IEEE80211_CHAN_NO_HT40;
	if (ch->sb == BRCMU_CHAN_SB_U) {
		if (ht40_flag == IEEE80211_CHAN_NO_HT40)
			channel->flags &= ~IEEE80211_CHAN_NO_HT40;
		channel->flags |= IEEE80211_CHAN_NO_HT40PLUS;
	} else {
		/* It should be one of
		 * IEEE80211_CHAN_NO_HT40 or
		 * IEEE80211_CHAN_NO_HT40PLUS
		 */
		channel->flags &= ~IEEE80211_CHAN_NO_HT40;
		if (ht40_flag == IEEE80211_CHAN_NO_HT40)
			channel->flags |= IEEE80211_CHAN_NO_HT40MINUS;
	}
}

static int brcmf_construct_chaninfo(struct brcmf_cfg80211_info *cfg,
				    u32 bw_cap[])
6017
{
6018
	struct wiphy *wiphy = cfg_to_wiphy(cfg);
6019 6020
	struct brcmf_pub *drvr = cfg->pub;
	struct brcmf_if *ifp = brcmf_get_ifp(drvr, 0);
6021 6022
	struct ieee80211_supported_band *band;
	struct ieee80211_channel *channel;
6023
	struct brcmf_chanspec_list *list;
6024
	struct brcmu_chan ch;
6025
	int err;
6026 6027 6028
	u8 *pbuf;
	u32 i, j;
	u32 total;
6029
	u32 chaninfo;
6030 6031 6032 6033 6034 6035 6036 6037 6038 6039 6040

	pbuf = kzalloc(BRCMF_DCMD_MEDLEN, GFP_KERNEL);

	if (pbuf == NULL)
		return -ENOMEM;

	list = (struct brcmf_chanspec_list *)pbuf;

	err = brcmf_fil_iovar_data_get(ifp, "chanspecs", pbuf,
				       BRCMF_DCMD_MEDLEN);
	if (err) {
6041
		bphy_err(drvr, "get chanspecs error (%d)\n", err);
6042
		goto fail_pbuf;
6043 6044
	}

6045
	band = wiphy->bands[NL80211_BAND_2GHZ];
6046 6047 6048
	if (band)
		for (i = 0; i < band->n_channels; i++)
			band->channels[i].flags = IEEE80211_CHAN_DISABLED;
6049
	band = wiphy->bands[NL80211_BAND_5GHZ];
6050 6051 6052
	if (band)
		for (i = 0; i < band->n_channels; i++)
			band->channels[i].flags = IEEE80211_CHAN_DISABLED;
6053 6054 6055

	total = le32_to_cpu(list->count);
	for (i = 0; i < total; i++) {
6056 6057
		ch.chspec = (u16)le32_to_cpu(list->element[i]);
		cfg->d11inf.decchspec(&ch);
6058

6059
		if (ch.band == BRCMU_CHAN_BAND_2G) {
6060
			band = wiphy->bands[NL80211_BAND_2GHZ];
6061
		} else if (ch.band == BRCMU_CHAN_BAND_5G) {
6062
			band = wiphy->bands[NL80211_BAND_5GHZ];
6063
		} else {
6064
			bphy_err(drvr, "Invalid channel Spec. 0x%x.\n",
6065
				 ch.chspec);
6066 6067
			continue;
		}
6068 6069
		if (!band)
			continue;
6070
		if (!(bw_cap[band->band] & WLC_BW_40MHZ_BIT) &&
6071
		    ch.bw == BRCMU_CHAN_BW_40)
6072
			continue;
6073
		if (!(bw_cap[band->band] & WLC_BW_80MHZ_BIT) &&
6074 6075
		    ch.bw == BRCMU_CHAN_BW_80)
			continue;
6076

6077
		channel = NULL;
6078
		for (j = 0; j < band->n_channels; j++) {
6079 6080
			if (band->channels[j].hw_value == ch.control_ch_num) {
				channel = &band->channels[j];
6081 6082 6083
				break;
			}
		}
6084 6085 6086 6087
		if (!channel) {
			/* It seems firmware supports some channel we never
			 * considered. Something new in IEEE standard?
			 */
6088
			bphy_err(drvr, "Ignoring unexpected firmware channel %d\n",
6089
				 ch.control_ch_num);
6090 6091
			continue;
		}
6092

6093 6094 6095
		if (channel->orig_flags & IEEE80211_CHAN_DISABLED)
			continue;

6096 6097 6098
		/* assuming the chanspecs order is HT20,
		 * HT40 upper, HT40 lower, and VHT80.
		 */
6099
		switch (ch.bw) {
6100 6101 6102
		case BRCMU_CHAN_BW_160:
			channel->flags &= ~IEEE80211_CHAN_NO_160MHZ;
			break;
6103
		case BRCMU_CHAN_BW_80:
6104
			channel->flags &= ~IEEE80211_CHAN_NO_80MHZ;
6105 6106
			break;
		case BRCMU_CHAN_BW_40:
6107
			brcmf_update_bw40_channel_flag(channel, &ch);
6108 6109 6110 6111 6112 6113
			break;
		default:
			wiphy_warn(wiphy, "Firmware reported unsupported bandwidth %d\n",
				   ch.bw);
			/* fall through */
		case BRCMU_CHAN_BW_20:
6114 6115 6116
			/* enable the channel and disable other bandwidths
			 * for now as mentioned order assure they are enabled
			 * for subsequent chanspecs.
6117
			 */
6118
			channel->flags = IEEE80211_CHAN_NO_HT40 |
6119 6120
					 IEEE80211_CHAN_NO_80MHZ |
					 IEEE80211_CHAN_NO_160MHZ;
6121 6122 6123 6124 6125 6126 6127
			ch.bw = BRCMU_CHAN_BW_20;
			cfg->d11inf.encchspec(&ch);
			chaninfo = ch.chspec;
			err = brcmf_fil_bsscfg_int_get(ifp, "per_chan_info",
						       &chaninfo);
			if (!err) {
				if (chaninfo & WL_CHAN_RADAR)
6128
					channel->flags |=
6129 6130 6131
						(IEEE80211_CHAN_RADAR |
						 IEEE80211_CHAN_NO_IR);
				if (chaninfo & WL_CHAN_PASSIVE)
6132
					channel->flags |=
6133
						IEEE80211_CHAN_NO_IR;
6134 6135 6136
			}
		}
	}
6137 6138

fail_pbuf:
6139 6140 6141 6142
	kfree(pbuf);
	return err;
}

6143
static int brcmf_enable_bw40_2g(struct brcmf_cfg80211_info *cfg)
6144
{
6145 6146
	struct brcmf_pub *drvr = cfg->pub;
	struct brcmf_if *ifp = brcmf_get_ifp(drvr, 0);
6147
	struct ieee80211_supported_band *band;
6148
	struct brcmf_fil_bwcap_le band_bwcap;
6149 6150
	struct brcmf_chanspec_list *list;
	u8 *pbuf;
6151 6152
	u32 val;
	int err;
6153 6154 6155
	struct brcmu_chan ch;
	u32 num_chan;
	int i, j;
6156 6157 6158 6159 6160 6161 6162 6163 6164 6165 6166 6167 6168 6169 6170 6171

	/* verify support for bw_cap command */
	val = WLC_BAND_5G;
	err = brcmf_fil_iovar_int_get(ifp, "bw_cap", &val);

	if (!err) {
		/* only set 2G bandwidth using bw_cap command */
		band_bwcap.band = cpu_to_le32(WLC_BAND_2G);
		band_bwcap.bw_cap = cpu_to_le32(WLC_BW_CAP_40MHZ);
		err = brcmf_fil_iovar_data_set(ifp, "bw_cap", &band_bwcap,
					       sizeof(band_bwcap));
	} else {
		brcmf_dbg(INFO, "fallback to mimo_bw_cap\n");
		val = WLC_N_BW_40ALL;
		err = brcmf_fil_iovar_int_set(ifp, "mimo_bw_cap", val);
	}
6172 6173 6174 6175 6176 6177 6178 6179 6180 6181

	if (!err) {
		/* update channel info in 2G band */
		pbuf = kzalloc(BRCMF_DCMD_MEDLEN, GFP_KERNEL);

		if (pbuf == NULL)
			return -ENOMEM;

		ch.band = BRCMU_CHAN_BAND_2G;
		ch.bw = BRCMU_CHAN_BW_40;
6182
		ch.sb = BRCMU_CHAN_SB_NONE;
6183 6184 6185 6186 6187 6188 6189 6190 6191
		ch.chnum = 0;
		cfg->d11inf.encchspec(&ch);

		/* pass encoded chanspec in query */
		*(__le16 *)pbuf = cpu_to_le16(ch.chspec);

		err = brcmf_fil_iovar_data_get(ifp, "chanspecs", pbuf,
					       BRCMF_DCMD_MEDLEN);
		if (err) {
6192
			bphy_err(drvr, "get chanspecs error (%d)\n", err);
6193 6194 6195 6196
			kfree(pbuf);
			return err;
		}

6197
		band = cfg_to_wiphy(cfg)->bands[NL80211_BAND_2GHZ];
6198 6199 6200 6201 6202 6203 6204 6205 6206 6207
		list = (struct brcmf_chanspec_list *)pbuf;
		num_chan = le32_to_cpu(list->count);
		for (i = 0; i < num_chan; i++) {
			ch.chspec = (u16)le32_to_cpu(list->element[i]);
			cfg->d11inf.decchspec(&ch);
			if (WARN_ON(ch.band != BRCMU_CHAN_BAND_2G))
				continue;
			if (WARN_ON(ch.bw != BRCMU_CHAN_BW_40))
				continue;
			for (j = 0; j < band->n_channels; j++) {
6208
				if (band->channels[j].hw_value == ch.control_ch_num)
6209 6210 6211 6212 6213 6214 6215
					break;
			}
			if (WARN_ON(j == band->n_channels))
				continue;

			brcmf_update_bw40_channel_flag(&band->channels[j], &ch);
		}
6216
		kfree(pbuf);
6217
	}
6218 6219 6220
	return err;
}

6221 6222
static void brcmf_get_bwcap(struct brcmf_if *ifp, u32 bw_cap[])
{
6223
	struct brcmf_pub *drvr = ifp->drvr;
6224 6225 6226 6227 6228 6229
	u32 band, mimo_bwcap;
	int err;

	band = WLC_BAND_2G;
	err = brcmf_fil_iovar_int_get(ifp, "bw_cap", &band);
	if (!err) {
6230
		bw_cap[NL80211_BAND_2GHZ] = band;
6231 6232 6233
		band = WLC_BAND_5G;
		err = brcmf_fil_iovar_int_get(ifp, "bw_cap", &band);
		if (!err) {
6234
			bw_cap[NL80211_BAND_5GHZ] = band;
6235 6236 6237 6238 6239 6240 6241 6242 6243 6244 6245 6246 6247 6248
			return;
		}
		WARN_ON(1);
		return;
	}
	brcmf_dbg(INFO, "fallback to mimo_bw_cap info\n");
	mimo_bwcap = 0;
	err = brcmf_fil_iovar_int_get(ifp, "mimo_bw_cap", &mimo_bwcap);
	if (err)
		/* assume 20MHz if firmware does not give a clue */
		mimo_bwcap = WLC_N_BW_20ALL;

	switch (mimo_bwcap) {
	case WLC_N_BW_40ALL:
6249
		bw_cap[NL80211_BAND_2GHZ] |= WLC_BW_40MHZ_BIT;
6250 6251
		/* fall-thru */
	case WLC_N_BW_20IN2G_40IN5G:
6252
		bw_cap[NL80211_BAND_5GHZ] |= WLC_BW_40MHZ_BIT;
6253 6254
		/* fall-thru */
	case WLC_N_BW_20ALL:
6255 6256
		bw_cap[NL80211_BAND_2GHZ] |= WLC_BW_20MHZ_BIT;
		bw_cap[NL80211_BAND_5GHZ] |= WLC_BW_20MHZ_BIT;
6257 6258
		break;
	default:
6259
		bphy_err(drvr, "invalid mimo_bw_cap value\n");
6260 6261
	}
}
6262

6263 6264 6265 6266 6267 6268 6269 6270 6271 6272 6273 6274 6275 6276 6277 6278 6279 6280 6281 6282 6283 6284 6285 6286 6287 6288 6289 6290
static void brcmf_update_ht_cap(struct ieee80211_supported_band *band,
				u32 bw_cap[2], u32 nchain)
{
	band->ht_cap.ht_supported = true;
	if (bw_cap[band->band] & WLC_BW_40MHZ_BIT) {
		band->ht_cap.cap |= IEEE80211_HT_CAP_SGI_40;
		band->ht_cap.cap |= IEEE80211_HT_CAP_SUP_WIDTH_20_40;
	}
	band->ht_cap.cap |= IEEE80211_HT_CAP_SGI_20;
	band->ht_cap.cap |= IEEE80211_HT_CAP_DSSSCCK40;
	band->ht_cap.ampdu_factor = IEEE80211_HT_MAX_AMPDU_64K;
	band->ht_cap.ampdu_density = IEEE80211_HT_MPDU_DENSITY_16;
	memset(band->ht_cap.mcs.rx_mask, 0xff, nchain);
	band->ht_cap.mcs.tx_params = IEEE80211_HT_MCS_TX_DEFINED;
}

static __le16 brcmf_get_mcs_map(u32 nchain, enum ieee80211_vht_mcs_support supp)
{
	u16 mcs_map;
	int i;

	for (i = 0, mcs_map = 0xFFFF; i < nchain; i++)
		mcs_map = (mcs_map << 2) | supp;

	return cpu_to_le16(mcs_map);
}

static void brcmf_update_vht_cap(struct ieee80211_supported_band *band,
6291 6292
				 u32 bw_cap[2], u32 nchain, u32 txstreams,
				 u32 txbf_bfe_cap, u32 txbf_bfr_cap)
6293 6294 6295 6296
{
	__le16 mcs_map;

	/* not allowed in 2.4G band */
6297
	if (band->band == NL80211_BAND_2GHZ)
6298 6299 6300 6301 6302 6303 6304 6305 6306 6307 6308 6309 6310
		return;

	band->vht_cap.vht_supported = true;
	/* 80MHz is mandatory */
	band->vht_cap.cap |= IEEE80211_VHT_CAP_SHORT_GI_80;
	if (bw_cap[band->band] & WLC_BW_160MHZ_BIT) {
		band->vht_cap.cap |= IEEE80211_VHT_CAP_SUPP_CHAN_WIDTH_160MHZ;
		band->vht_cap.cap |= IEEE80211_VHT_CAP_SHORT_GI_160;
	}
	/* all support 256-QAM */
	mcs_map = brcmf_get_mcs_map(nchain, IEEE80211_VHT_MCS_SUPPORT_0_9);
	band->vht_cap.vht_mcs.rx_mcs_map = mcs_map;
	band->vht_cap.vht_mcs.tx_mcs_map = mcs_map;
6311 6312 6313 6314 6315 6316 6317 6318 6319 6320 6321 6322 6323 6324 6325 6326 6327 6328 6329

	/* Beamforming support information */
	if (txbf_bfe_cap & BRCMF_TXBF_SU_BFE_CAP)
		band->vht_cap.cap |= IEEE80211_VHT_CAP_SU_BEAMFORMEE_CAPABLE;
	if (txbf_bfe_cap & BRCMF_TXBF_MU_BFE_CAP)
		band->vht_cap.cap |= IEEE80211_VHT_CAP_MU_BEAMFORMEE_CAPABLE;
	if (txbf_bfr_cap & BRCMF_TXBF_SU_BFR_CAP)
		band->vht_cap.cap |= IEEE80211_VHT_CAP_SU_BEAMFORMER_CAPABLE;
	if (txbf_bfr_cap & BRCMF_TXBF_MU_BFR_CAP)
		band->vht_cap.cap |= IEEE80211_VHT_CAP_MU_BEAMFORMER_CAPABLE;

	if ((txbf_bfe_cap || txbf_bfr_cap) && (txstreams > 1)) {
		band->vht_cap.cap |=
			(2 << IEEE80211_VHT_CAP_BEAMFORMEE_STS_SHIFT);
		band->vht_cap.cap |= ((txstreams - 1) <<
				IEEE80211_VHT_CAP_SOUNDING_DIMENSIONS_SHIFT);
		band->vht_cap.cap |=
			IEEE80211_VHT_CAP_VHT_LINK_ADAPTATION_VHT_MRQ_MFB;
	}
6330 6331
}

6332
static int brcmf_setup_wiphybands(struct brcmf_cfg80211_info *cfg)
6333
{
6334 6335
	struct brcmf_pub *drvr = cfg->pub;
	struct brcmf_if *ifp = brcmf_get_ifp(drvr, 0);
6336
	struct wiphy *wiphy = cfg_to_wiphy(cfg);
6337 6338
	u32 nmode = 0;
	u32 vhtmode = 0;
6339
	u32 bw_cap[2] = { WLC_BW_20MHZ_BIT, WLC_BW_20MHZ_BIT };
6340 6341
	u32 rxchain;
	u32 nchain;
6342
	int err;
6343
	s32 i;
6344
	struct ieee80211_supported_band *band;
6345 6346 6347
	u32 txstreams = 0;
	u32 txbf_bfe_cap = 0;
	u32 txbf_bfr_cap = 0;
6348

6349
	(void)brcmf_fil_iovar_int_get(ifp, "vhtmode", &vhtmode);
6350 6351
	err = brcmf_fil_iovar_int_get(ifp, "nmode", &nmode);
	if (err) {
6352
		bphy_err(drvr, "nmode error (%d)\n", err);
6353
	} else {
6354
		brcmf_get_bwcap(ifp, bw_cap);
6355
	}
6356
	brcmf_dbg(INFO, "nmode=%d, vhtmode=%d, bw_cap=(%d, %d)\n",
6357 6358
		  nmode, vhtmode, bw_cap[NL80211_BAND_2GHZ],
		  bw_cap[NL80211_BAND_5GHZ]);
6359

6360 6361
	err = brcmf_fil_iovar_int_get(ifp, "rxchain", &rxchain);
	if (err) {
6362
		bphy_err(drvr, "rxchain error (%d)\n", err);
6363 6364 6365 6366 6367 6368 6369
		nchain = 1;
	} else {
		for (nchain = 0; rxchain; nchain++)
			rxchain = rxchain & (rxchain - 1);
	}
	brcmf_dbg(INFO, "nchain=%d\n", nchain);

6370
	err = brcmf_construct_chaninfo(cfg, bw_cap);
6371
	if (err) {
6372
		bphy_err(drvr, "brcmf_construct_chaninfo failed (%d)\n", err);
6373 6374 6375
		return err;
	}

6376 6377 6378 6379 6380 6381 6382 6383
	if (vhtmode) {
		(void)brcmf_fil_iovar_int_get(ifp, "txstreams", &txstreams);
		(void)brcmf_fil_iovar_int_get(ifp, "txbf_bfe_cap",
					      &txbf_bfe_cap);
		(void)brcmf_fil_iovar_int_get(ifp, "txbf_bfr_cap",
					      &txbf_bfr_cap);
	}

6384 6385 6386
	for (i = 0; i < ARRAY_SIZE(wiphy->bands); i++) {
		band = wiphy->bands[i];
		if (band == NULL)
6387
			continue;
6388

6389 6390 6391
		if (nmode)
			brcmf_update_ht_cap(band, bw_cap, nchain);
		if (vhtmode)
6392 6393
			brcmf_update_vht_cap(band, bw_cap, nchain, txstreams,
					     txbf_bfe_cap, txbf_bfr_cap);
6394 6395
	}

6396
	return 0;
6397 6398
}

6399 6400 6401 6402 6403 6404 6405 6406 6407 6408 6409 6410 6411 6412 6413 6414 6415 6416 6417 6418 6419 6420 6421 6422 6423 6424
static const struct ieee80211_txrx_stypes
brcmf_txrx_stypes[NUM_NL80211_IFTYPES] = {
	[NL80211_IFTYPE_STATION] = {
		.tx = 0xffff,
		.rx = BIT(IEEE80211_STYPE_ACTION >> 4) |
		      BIT(IEEE80211_STYPE_PROBE_REQ >> 4)
	},
	[NL80211_IFTYPE_P2P_CLIENT] = {
		.tx = 0xffff,
		.rx = BIT(IEEE80211_STYPE_ACTION >> 4) |
		      BIT(IEEE80211_STYPE_PROBE_REQ >> 4)
	},
	[NL80211_IFTYPE_P2P_GO] = {
		.tx = 0xffff,
		.rx = BIT(IEEE80211_STYPE_ASSOC_REQ >> 4) |
		      BIT(IEEE80211_STYPE_REASSOC_REQ >> 4) |
		      BIT(IEEE80211_STYPE_PROBE_REQ >> 4) |
		      BIT(IEEE80211_STYPE_DISASSOC >> 4) |
		      BIT(IEEE80211_STYPE_AUTH >> 4) |
		      BIT(IEEE80211_STYPE_DEAUTH >> 4) |
		      BIT(IEEE80211_STYPE_ACTION >> 4)
	},
	[NL80211_IFTYPE_P2P_DEVICE] = {
		.tx = 0xffff,
		.rx = BIT(IEEE80211_STYPE_ACTION >> 4) |
		      BIT(IEEE80211_STYPE_PROBE_REQ >> 4)
6425 6426 6427 6428 6429 6430 6431 6432 6433 6434
	},
	[NL80211_IFTYPE_AP] = {
		.tx = 0xffff,
		.rx = BIT(IEEE80211_STYPE_ASSOC_REQ >> 4) |
		      BIT(IEEE80211_STYPE_REASSOC_REQ >> 4) |
		      BIT(IEEE80211_STYPE_PROBE_REQ >> 4) |
		      BIT(IEEE80211_STYPE_DISASSOC >> 4) |
		      BIT(IEEE80211_STYPE_AUTH >> 4) |
		      BIT(IEEE80211_STYPE_DEAUTH >> 4) |
		      BIT(IEEE80211_STYPE_ACTION >> 4)
6435 6436 6437
	}
};

6438 6439 6440 6441 6442 6443 6444 6445 6446 6447 6448 6449 6450 6451 6452 6453 6454 6455 6456 6457 6458 6459 6460 6461 6462 6463 6464 6465 6466 6467
/**
 * brcmf_setup_ifmodes() - determine interface modes and combinations.
 *
 * @wiphy: wiphy object.
 * @ifp: interface object needed for feat module api.
 *
 * The interface modes and combinations are determined dynamically here
 * based on firmware functionality.
 *
 * no p2p and no mbss:
 *
 *	#STA <= 1, #AP <= 1, channels = 1, 2 total
 *
 * no p2p and mbss:
 *
 *	#STA <= 1, #AP <= 1, channels = 1, 2 total
 *	#AP <= 4, matching BI, channels = 1, 4 total
 *
 * p2p, no mchan, and mbss:
 *
 *	#STA <= 1, #P2P-DEV <= 1, #{P2P-CL, P2P-GO} <= 1, channels = 1, 3 total
 *	#STA <= 1, #P2P-DEV <= 1, #AP <= 1, #P2P-CL <= 1, channels = 1, 4 total
 *	#AP <= 4, matching BI, channels = 1, 4 total
 *
 * p2p, mchan, and mbss:
 *
 *	#STA <= 1, #P2P-DEV <= 1, #{P2P-CL, P2P-GO} <= 1, channels = 2, 3 total
 *	#STA <= 1, #P2P-DEV <= 1, #AP <= 1, #P2P-CL <= 1, channels = 1, 4 total
 *	#AP <= 4, matching BI, channels = 1, 4 total
 */
6468 6469 6470
static int brcmf_setup_ifmodes(struct wiphy *wiphy, struct brcmf_if *ifp)
{
	struct ieee80211_iface_combination *combo = NULL;
6471 6472 6473 6474 6475 6476 6477 6478
	struct ieee80211_iface_limit *c0_limits = NULL;
	struct ieee80211_iface_limit *p2p_limits = NULL;
	struct ieee80211_iface_limit *mbss_limits = NULL;
	bool mbss, p2p;
	int i, c, n_combos;

	mbss = brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MBSS);
	p2p = brcmf_feat_is_enabled(ifp, BRCMF_FEAT_P2P);
6479

6480 6481
	n_combos = 1 + !!p2p + !!mbss;
	combo = kcalloc(n_combos, sizeof(*combo), GFP_KERNEL);
6482 6483 6484 6485 6486 6487 6488
	if (!combo)
		goto err;

	wiphy->interface_modes = BIT(NL80211_IFTYPE_STATION) |
				 BIT(NL80211_IFTYPE_ADHOC) |
				 BIT(NL80211_IFTYPE_AP);

6489 6490
	c = 0;
	i = 0;
6491 6492 6493
	c0_limits = kcalloc(p2p ? 3 : 2, sizeof(*c0_limits), GFP_KERNEL);
	if (!c0_limits)
		goto err;
6494 6495 6496 6497 6498
	c0_limits[i].max = 1;
	c0_limits[i++].types = BIT(NL80211_IFTYPE_STATION);
	if (p2p) {
		if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MCHAN))
			combo[c].num_different_channels = 2;
6499 6500
		else
			combo[c].num_different_channels = 1;
6501 6502 6503
		wiphy->interface_modes |= BIT(NL80211_IFTYPE_P2P_CLIENT) |
					  BIT(NL80211_IFTYPE_P2P_GO) |
					  BIT(NL80211_IFTYPE_P2P_DEVICE);
6504 6505 6506 6507 6508 6509
		c0_limits[i].max = 1;
		c0_limits[i++].types = BIT(NL80211_IFTYPE_P2P_DEVICE);
		c0_limits[i].max = 1;
		c0_limits[i++].types = BIT(NL80211_IFTYPE_P2P_CLIENT) |
				       BIT(NL80211_IFTYPE_P2P_GO);
	} else {
6510
		combo[c].num_different_channels = 1;
6511 6512 6513 6514 6515 6516 6517 6518 6519 6520
		c0_limits[i].max = 1;
		c0_limits[i++].types = BIT(NL80211_IFTYPE_AP);
	}
	combo[c].max_interfaces = i;
	combo[c].n_limits = i;
	combo[c].limits = c0_limits;

	if (p2p) {
		c++;
		i = 0;
6521 6522 6523
		p2p_limits = kcalloc(4, sizeof(*p2p_limits), GFP_KERNEL);
		if (!p2p_limits)
			goto err;
6524 6525 6526 6527 6528 6529 6530 6531
		p2p_limits[i].max = 1;
		p2p_limits[i++].types = BIT(NL80211_IFTYPE_STATION);
		p2p_limits[i].max = 1;
		p2p_limits[i++].types = BIT(NL80211_IFTYPE_AP);
		p2p_limits[i].max = 1;
		p2p_limits[i++].types = BIT(NL80211_IFTYPE_P2P_CLIENT);
		p2p_limits[i].max = 1;
		p2p_limits[i++].types = BIT(NL80211_IFTYPE_P2P_DEVICE);
6532
		combo[c].num_different_channels = 1;
6533 6534 6535 6536 6537 6538 6539
		combo[c].max_interfaces = i;
		combo[c].n_limits = i;
		combo[c].limits = p2p_limits;
	}

	if (mbss) {
		c++;
6540 6541 6542 6543 6544 6545
		i = 0;
		mbss_limits = kcalloc(1, sizeof(*mbss_limits), GFP_KERNEL);
		if (!mbss_limits)
			goto err;
		mbss_limits[i].max = 4;
		mbss_limits[i++].types = BIT(NL80211_IFTYPE_AP);
6546 6547 6548
		combo[c].beacon_int_infra_match = true;
		combo[c].num_different_channels = 1;
		combo[c].max_interfaces = 4;
6549
		combo[c].n_limits = i;
6550 6551
		combo[c].limits = mbss_limits;
	}
6552

6553
	wiphy->n_iface_combinations = n_combos;
6554 6555 6556 6557
	wiphy->iface_combinations = combo;
	return 0;

err:
6558 6559 6560
	kfree(c0_limits);
	kfree(p2p_limits);
	kfree(mbss_limits);
6561 6562 6563 6564
	kfree(combo);
	return -ENOMEM;
}

6565
#ifdef CONFIG_PM
6566
static const struct wiphy_wowlan_support brcmf_wowlan_support = {
6567
	.flags = WIPHY_WOWLAN_MAGIC_PKT | WIPHY_WOWLAN_DISCONNECT,
6568 6569 6570 6571
	.n_patterns = BRCMF_WOWL_MAXPATTERNS,
	.pattern_max_len = BRCMF_WOWL_MAXPATTERNSIZE,
	.pattern_min_len = 1,
	.max_pkt_offset = 1500,
6572 6573 6574
};
#endif

6575
static void brcmf_wiphy_wowl_params(struct wiphy *wiphy, struct brcmf_if *ifp)
6576 6577
{
#ifdef CONFIG_PM
6578
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
6579
	struct brcmf_pub *drvr = cfg->pub;
6580 6581 6582 6583 6584
	struct wiphy_wowlan_support *wowl;

	wowl = kmemdup(&brcmf_wowlan_support, sizeof(brcmf_wowlan_support),
		       GFP_KERNEL);
	if (!wowl) {
6585
		bphy_err(drvr, "only support basic wowlan features\n");
6586 6587 6588
		wiphy->wowlan = &brcmf_wowlan_support;
		return;
	}
6589 6590

	if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_PNO)) {
6591
		if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_WOWL_ND)) {
6592 6593
			wowl->flags |= WIPHY_WOWLAN_NET_DETECT;
			wowl->max_nd_match_sets = BRCMF_PNO_MAX_PFN_COUNT;
6594
			init_waitqueue_head(&cfg->wowl.nd_data_wait);
6595 6596
		}
	}
6597
	if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_WOWL_GTK)) {
6598 6599
		wowl->flags |= WIPHY_WOWLAN_SUPPORTS_GTK_REKEY;
		wowl->flags |= WIPHY_WOWLAN_GTK_REKEY_FAILURE;
6600 6601
	}

6602
	wiphy->wowlan = wowl;
6603 6604 6605
#endif
}

6606
static int brcmf_setup_wiphy(struct wiphy *wiphy, struct brcmf_if *ifp)
6607
{
6608
	struct brcmf_pub *drvr = ifp->drvr;
6609
	const struct ieee80211_iface_combination *combo;
6610
	struct ieee80211_supported_band *band;
6611
	u16 max_interfaces = 0;
6612
	bool gscan;
6613 6614 6615 6616
	__le32 bandlist[3];
	u32 n_bands;
	int err, i;

6617 6618
	wiphy->max_scan_ssids = WL_NUM_SCAN_MAX;
	wiphy->max_scan_ie_len = BRCMF_SCAN_IE_LEN_MAX;
6619
	wiphy->max_num_pmkids = BRCMF_MAXPMKID;
6620 6621 6622 6623 6624

	err = brcmf_setup_ifmodes(wiphy, ifp);
	if (err)
		return err;

6625 6626 6627 6628 6629 6630 6631
	for (i = 0, combo = wiphy->iface_combinations;
	     i < wiphy->n_iface_combinations; i++, combo++) {
		max_interfaces = max(max_interfaces, combo->max_interfaces);
	}

	for (i = 0; i < max_interfaces && i < ARRAY_SIZE(drvr->addresses);
	     i++) {
6632 6633 6634 6635 6636 6637 6638 6639 6640 6641 6642
		u8 *addr = drvr->addresses[i].addr;

		memcpy(addr, drvr->mac, ETH_ALEN);
		if (i) {
			addr[0] |= BIT(1);
			addr[ETH_ALEN - 1] ^= i;
		}
	}
	wiphy->addresses = drvr->addresses;
	wiphy->n_addresses = i;

6643
	wiphy->signal_type = CFG80211_SIGNAL_TYPE_MBM;
6644 6645 6646 6647
	wiphy->cipher_suites = brcmf_cipher_suites;
	wiphy->n_cipher_suites = ARRAY_SIZE(brcmf_cipher_suites);
	if (!brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MFP))
		wiphy->n_cipher_suites--;
6648 6649 6650 6651
	wiphy->bss_select_support = BIT(NL80211_BSS_SELECT_ATTR_RSSI) |
				    BIT(NL80211_BSS_SELECT_ATTR_BAND_PREF) |
				    BIT(NL80211_BSS_SELECT_ATTR_RSSI_ADJUST);

6652 6653
	wiphy->flags |= WIPHY_FLAG_NETNS_OK |
			WIPHY_FLAG_PS_ON_BY_DEFAULT |
6654
			WIPHY_FLAG_HAVE_AP_SME |
6655
			WIPHY_FLAG_OFFCHAN_TX |
6656 6657 6658
			WIPHY_FLAG_HAS_REMAIN_ON_CHANNEL;
	if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_TDLS))
		wiphy->flags |= WIPHY_FLAG_SUPPORTS_TDLS;
6659
	if (!ifp->drvr->settings->roamoff)
6660
		wiphy->flags |= WIPHY_FLAG_SUPPORTS_FW_ROAM;
6661
	if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_FWSUP)) {
6662 6663
		wiphy_ext_feature_set(wiphy,
				      NL80211_EXT_FEATURE_4WAY_HANDSHAKE_STA_PSK);
6664 6665 6666
		wiphy_ext_feature_set(wiphy,
				      NL80211_EXT_FEATURE_4WAY_HANDSHAKE_STA_1X);
	}
6667 6668
	wiphy->mgmt_stypes = brcmf_txrx_stypes;
	wiphy->max_remain_on_channel_duration = 5000;
6669 6670 6671 6672
	if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_PNO)) {
		gscan = brcmf_feat_is_enabled(ifp, BRCMF_FEAT_GSCAN);
		brcmf_pno_wiphy_params(wiphy, gscan);
	}
6673 6674 6675 6676
	/* vendor commands/events support */
	wiphy->vendor_commands = brcmf_vendor_cmds;
	wiphy->n_vendor_commands = BRCMF_VNDR_CMDS_LAST - 1;

6677
	if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_WOWL))
6678
		brcmf_wiphy_wowl_params(wiphy, ifp);
6679 6680 6681
	err = brcmf_fil_cmd_data_get(ifp, BRCMF_C_GET_BANDLIST, &bandlist,
				     sizeof(bandlist));
	if (err) {
6682
		bphy_err(drvr, "could not obtain band info: err=%d\n", err);
6683 6684 6685 6686 6687 6688 6689 6690 6691 6692 6693 6694 6695 6696 6697 6698 6699 6700 6701 6702
		return err;
	}
	/* first entry in bandlist is number of bands */
	n_bands = le32_to_cpu(bandlist[0]);
	for (i = 1; i <= n_bands && i < ARRAY_SIZE(bandlist); i++) {
		if (bandlist[i] == cpu_to_le32(WLC_BAND_2G)) {
			band = kmemdup(&__wl_band_2ghz, sizeof(__wl_band_2ghz),
				       GFP_KERNEL);
			if (!band)
				return -ENOMEM;

			band->channels = kmemdup(&__wl_2ghz_channels,
						 sizeof(__wl_2ghz_channels),
						 GFP_KERNEL);
			if (!band->channels) {
				kfree(band);
				return -ENOMEM;
			}

			band->n_channels = ARRAY_SIZE(__wl_2ghz_channels);
6703
			wiphy->bands[NL80211_BAND_2GHZ] = band;
6704 6705 6706 6707 6708 6709 6710 6711 6712 6713 6714 6715 6716 6717 6718 6719
		}
		if (bandlist[i] == cpu_to_le32(WLC_BAND_5G)) {
			band = kmemdup(&__wl_band_5ghz, sizeof(__wl_band_5ghz),
				       GFP_KERNEL);
			if (!band)
				return -ENOMEM;

			band->channels = kmemdup(&__wl_5ghz_channels,
						 sizeof(__wl_5ghz_channels),
						 GFP_KERNEL);
			if (!band->channels) {
				kfree(band);
				return -ENOMEM;
			}

			band->n_channels = ARRAY_SIZE(__wl_5ghz_channels);
6720
			wiphy->bands[NL80211_BAND_5GHZ] = band;
6721 6722
		}
	}
6723 6724 6725

	wiphy_read_of_freq_limits(wiphy);

6726
	return 0;
6727 6728
}

6729
static s32 brcmf_config_dongle(struct brcmf_cfg80211_info *cfg)
6730
{
6731
	struct brcmf_pub *drvr = cfg->pub;
6732 6733
	struct net_device *ndev;
	struct wireless_dev *wdev;
6734
	struct brcmf_if *ifp;
6735 6736 6737
	s32 power_mode;
	s32 err = 0;

6738
	if (cfg->dongle_up)
6739 6740
		return err;

6741
	ndev = cfg_to_ndev(cfg);
6742
	wdev = ndev->ieee80211_ptr;
6743 6744 6745 6746
	ifp = netdev_priv(ndev);

	/* make sure RF is ready for work */
	brcmf_fil_cmd_int_set(ifp, BRCMF_C_UP, 0);
6747

6748
	brcmf_dongle_scantime(ifp);
6749

6750
	power_mode = cfg->pwr_save ? PM_FAST : PM_OFF;
6751
	err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_PM, power_mode);
6752 6753
	if (err)
		goto default_conf_out;
6754 6755
	brcmf_dbg(INFO, "power save set to %s\n",
		  (power_mode ? "enabled" : "disabled"));
6756

6757
	err = brcmf_dongle_roam(ifp);
6758 6759
	if (err)
		goto default_conf_out;
6760
	err = brcmf_cfg80211_change_iface(wdev->wiphy, ndev, wdev->iftype,
6761
					  NULL);
6762
	if (err)
6763 6764
		goto default_conf_out;

6765
	brcmf_configure_arp_nd_offload(ifp, true);
6766

6767 6768
	err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_FAKEFRAG, 1);
	if (err) {
6769
		bphy_err(drvr, "failed to set frameburst mode\n");
6770 6771 6772
		goto default_conf_out;
	}

6773
	cfg->dongle_up = true;
6774
default_conf_out:
6775 6776 6777 6778 6779

	return err;

}

6780
static s32 __brcmf_cfg80211_up(struct brcmf_if *ifp)
6781
{
6782
	set_bit(BRCMF_VIF_STATUS_READY, &ifp->vif->sme_state);
6783

6784
	return brcmf_config_dongle(ifp->drvr->config);
6785 6786
}

6787
static s32 __brcmf_cfg80211_down(struct brcmf_if *ifp)
6788
{
6789
	struct brcmf_cfg80211_info *cfg = ifp->drvr->config;
6790

6791 6792 6793 6794
	/*
	 * While going down, if associated with AP disassociate
	 * from AP to save power
	 */
6795
	if (check_vif_up(ifp->vif)) {
6796
		brcmf_link_down(ifp->vif, WLAN_REASON_UNSPECIFIED);
6797 6798 6799 6800 6801 6802 6803 6804

		/* Make sure WPA_Supplicant receives all the event
		   generated due to DISASSOC call to the fw to keep
		   the state fw and WPA_Supplicant state consistent
		 */
		brcmf_delay(500);
	}

6805
	brcmf_abort_scanning(cfg);
6806
	clear_bit(BRCMF_VIF_STATUS_READY, &ifp->vif->sme_state);
6807 6808 6809 6810

	return 0;
}

6811
s32 brcmf_cfg80211_up(struct net_device *ndev)
6812
{
6813 6814
	struct brcmf_if *ifp = netdev_priv(ndev);
	struct brcmf_cfg80211_info *cfg = ifp->drvr->config;
6815 6816
	s32 err = 0;

6817
	mutex_lock(&cfg->usr_sync);
6818
	err = __brcmf_cfg80211_up(ifp);
6819
	mutex_unlock(&cfg->usr_sync);
6820 6821 6822 6823

	return err;
}

6824
s32 brcmf_cfg80211_down(struct net_device *ndev)
6825
{
6826 6827
	struct brcmf_if *ifp = netdev_priv(ndev);
	struct brcmf_cfg80211_info *cfg = ifp->drvr->config;
6828 6829
	s32 err = 0;

6830
	mutex_lock(&cfg->usr_sync);
6831
	err = __brcmf_cfg80211_down(ifp);
6832
	mutex_unlock(&cfg->usr_sync);
6833 6834 6835 6836

	return err;
}

6837 6838 6839 6840 6841 6842 6843
enum nl80211_iftype brcmf_cfg80211_get_iftype(struct brcmf_if *ifp)
{
	struct wireless_dev *wdev = &ifp->vif->wdev;

	return wdev->iftype;
}

6844 6845
bool brcmf_get_vif_state_any(struct brcmf_cfg80211_info *cfg,
			     unsigned long state)
6846 6847 6848 6849 6850
{
	struct brcmf_cfg80211_vif *vif;

	list_for_each_entry(vif, &cfg->vif_list, list) {
		if (test_bit(state, &vif->sme_state))
6851
			return true;
6852
	}
6853
	return false;
6854
}
6855 6856 6857 6858 6859 6860

static inline bool vif_event_equals(struct brcmf_cfg80211_vif_event *event,
				    u8 action)
{
	u8 evt_action;

6861
	spin_lock(&event->vif_event_lock);
6862
	evt_action = event->action;
6863
	spin_unlock(&event->vif_event_lock);
6864 6865 6866 6867 6868 6869 6870 6871
	return evt_action == action;
}

void brcmf_cfg80211_arm_vif_event(struct brcmf_cfg80211_info *cfg,
				  struct brcmf_cfg80211_vif *vif)
{
	struct brcmf_cfg80211_vif_event *event = &cfg->vif_event;

6872
	spin_lock(&event->vif_event_lock);
6873 6874
	event->vif = vif;
	event->action = 0;
6875
	spin_unlock(&event->vif_event_lock);
6876 6877 6878 6879 6880 6881 6882
}

bool brcmf_cfg80211_vif_event_armed(struct brcmf_cfg80211_info *cfg)
{
	struct brcmf_cfg80211_vif_event *event = &cfg->vif_event;
	bool armed;

6883
	spin_lock(&event->vif_event_lock);
6884
	armed = event->vif != NULL;
6885
	spin_unlock(&event->vif_event_lock);
6886 6887 6888

	return armed;
}
6889 6890 6891

int brcmf_cfg80211_wait_vif_event(struct brcmf_cfg80211_info *cfg,
				  u8 action, ulong timeout)
6892 6893 6894 6895 6896 6897 6898
{
	struct brcmf_cfg80211_vif_event *event = &cfg->vif_event;

	return wait_event_timeout(event->vif_wq,
				  vif_event_equals(event, action), timeout);
}

6899 6900 6901
static s32 brcmf_translate_country_code(struct brcmf_pub *drvr, char alpha2[2],
					struct brcmf_fil_country_le *ccreq)
{
6902 6903
	struct brcmfmac_pd_cc *country_codes;
	struct brcmfmac_pd_cc_entry *cc;
6904 6905 6906 6907 6908 6909 6910 6911 6912 6913 6914 6915 6916 6917 6918 6919 6920 6921 6922 6923 6924 6925 6926 6927 6928 6929 6930 6931 6932 6933 6934 6935 6936 6937 6938 6939 6940 6941 6942 6943 6944
	s32 found_index;
	int i;

	country_codes = drvr->settings->country_codes;
	if (!country_codes) {
		brcmf_dbg(TRACE, "No country codes configured for device\n");
		return -EINVAL;
	}

	if ((alpha2[0] == ccreq->country_abbrev[0]) &&
	    (alpha2[1] == ccreq->country_abbrev[1])) {
		brcmf_dbg(TRACE, "Country code already set\n");
		return -EAGAIN;
	}

	found_index = -1;
	for (i = 0; i < country_codes->table_size; i++) {
		cc = &country_codes->table[i];
		if ((cc->iso3166[0] == '\0') && (found_index == -1))
			found_index = i;
		if ((cc->iso3166[0] == alpha2[0]) &&
		    (cc->iso3166[1] == alpha2[1])) {
			found_index = i;
			break;
		}
	}
	if (found_index == -1) {
		brcmf_dbg(TRACE, "No country code match found\n");
		return -EINVAL;
	}
	memset(ccreq, 0, sizeof(*ccreq));
	ccreq->rev = cpu_to_le32(country_codes->table[found_index].rev);
	memcpy(ccreq->ccode, country_codes->table[found_index].cc,
	       BRCMF_COUNTRY_BUF_SZ);
	ccreq->country_abbrev[0] = alpha2[0];
	ccreq->country_abbrev[1] = alpha2[1];
	ccreq->country_abbrev[2] = 0;

	return 0;
}

6945 6946 6947
static void brcmf_cfg80211_reg_notifier(struct wiphy *wiphy,
					struct regulatory_request *req)
{
6948 6949
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
	struct brcmf_if *ifp = brcmf_get_ifp(cfg->pub, 0);
6950
	struct brcmf_pub *drvr = cfg->pub;
6951
	struct brcmf_fil_country_le ccreq;
6952
	s32 err;
6953 6954
	int i;

6955 6956 6957 6958
	/* The country code gets set to "00" by default at boot, ignore */
	if (req->alpha2[0] == '0' && req->alpha2[1] == '0')
		return;

6959
	/* ignore non-ISO3166 country codes */
6960
	for (i = 0; i < 2; i++)
6961
		if (req->alpha2[i] < 'A' || req->alpha2[i] > 'Z') {
6962
			bphy_err(drvr, "not an ISO3166 code (0x%02x 0x%02x)\n",
6963
				 req->alpha2[0], req->alpha2[1]);
6964 6965
			return;
		}
6966 6967 6968 6969 6970 6971

	brcmf_dbg(TRACE, "Enter: initiator=%d, alpha=%c%c\n", req->initiator,
		  req->alpha2[0], req->alpha2[1]);

	err = brcmf_fil_iovar_data_get(ifp, "country", &ccreq, sizeof(ccreq));
	if (err) {
6972
		bphy_err(drvr, "Country code iovar returned err = %d\n", err);
6973 6974 6975 6976 6977 6978 6979 6980 6981
		return;
	}

	err = brcmf_translate_country_code(ifp->drvr, req->alpha2, &ccreq);
	if (err)
		return;

	err = brcmf_fil_iovar_data_set(ifp, "country", &ccreq, sizeof(ccreq));
	if (err) {
6982
		bphy_err(drvr, "Firmware rejected country setting\n");
6983 6984
		return;
	}
6985
	brcmf_setup_wiphybands(cfg);
6986 6987
}

6988 6989
static void brcmf_free_wiphy(struct wiphy *wiphy)
{
6990 6991
	int i;

6992 6993 6994
	if (!wiphy)
		return;

6995 6996 6997 6998
	if (wiphy->iface_combinations) {
		for (i = 0; i < wiphy->n_iface_combinations; i++)
			kfree(wiphy->iface_combinations[i].limits);
	}
6999
	kfree(wiphy->iface_combinations);
7000 7001 7002
	if (wiphy->bands[NL80211_BAND_2GHZ]) {
		kfree(wiphy->bands[NL80211_BAND_2GHZ]->channels);
		kfree(wiphy->bands[NL80211_BAND_2GHZ]);
7003
	}
7004 7005 7006
	if (wiphy->bands[NL80211_BAND_5GHZ]) {
		kfree(wiphy->bands[NL80211_BAND_5GHZ]->channels);
		kfree(wiphy->bands[NL80211_BAND_5GHZ]);
7007
	}
7008 7009 7010 7011
#if IS_ENABLED(CONFIG_PM)
	if (wiphy->wowlan != &brcmf_wowlan_support)
		kfree(wiphy->wowlan);
#endif
7012 7013
}

7014
struct brcmf_cfg80211_info *brcmf_cfg80211_attach(struct brcmf_pub *drvr,
7015
						  struct cfg80211_ops *ops,
7016
						  bool p2pdev_forced)
7017
{
7018
	struct wiphy *wiphy = drvr->wiphy;
7019
	struct net_device *ndev = brcmf_get_ifp(drvr, 0)->ndev;
7020 7021 7022 7023 7024
	struct brcmf_cfg80211_info *cfg;
	struct brcmf_cfg80211_vif *vif;
	struct brcmf_if *ifp;
	s32 err = 0;
	s32 io_type;
7025
	u16 *cap = NULL;
7026 7027

	if (!ndev) {
7028
		bphy_err(drvr, "ndev is invalid\n");
7029 7030 7031
		return NULL;
	}

7032 7033
	cfg = kzalloc(sizeof(*cfg), GFP_KERNEL);
	if (!cfg) {
7034
		bphy_err(drvr, "Could not allocate wiphy device\n");
7035
		return NULL;
7036
	}
7037 7038 7039 7040 7041 7042

	cfg->wiphy = wiphy;
	cfg->pub = drvr;
	init_vif_event(&cfg->vif_event);
	INIT_LIST_HEAD(&cfg->vif_list);

7043
	vif = brcmf_alloc_vif(cfg, NL80211_IFTYPE_STATION);
7044 7045
	if (IS_ERR(vif))
		goto wiphy_out;
7046

7047
	ifp = netdev_priv(ndev);
7048 7049 7050 7051 7052 7053 7054
	vif->ifp = ifp;
	vif->wdev.netdev = ndev;
	ndev->ieee80211_ptr = &vif->wdev;
	SET_NETDEV_DEV(ndev, wiphy_dev(cfg->wiphy));

	err = wl_init_priv(cfg);
	if (err) {
7055
		bphy_err(drvr, "Failed to init iwm_priv (%d)\n", err);
7056 7057
		brcmf_free_vif(vif);
		goto wiphy_out;
7058 7059 7060
	}
	ifp->vif = vif;

7061 7062
	/* determine d11 io type before wiphy setup */
	err = brcmf_fil_cmd_int_get(ifp, BRCMF_C_GET_VERSION, &io_type);
7063
	if (err) {
7064
		bphy_err(drvr, "Failed to get D11 version (%d)\n", err);
7065
		goto priv_out;
7066
	}
7067 7068 7069
	cfg->d11inf.io_type = (u8)io_type;
	brcmu_d11_attach(&cfg->d11inf);

7070 7071 7072 7073 7074
	/* regulatory notifer below needs access to cfg so
	 * assign it now.
	 */
	drvr->config = cfg;

7075 7076 7077 7078
	err = brcmf_setup_wiphy(wiphy, ifp);
	if (err < 0)
		goto priv_out;

7079
	brcmf_dbg(INFO, "Registering custom regulatory\n");
7080
	wiphy->reg_notifier = brcmf_cfg80211_reg_notifier;
7081 7082 7083 7084 7085 7086 7087
	wiphy->regulatory_flags |= REGULATORY_CUSTOM_REG;
	wiphy_apply_custom_regulatory(wiphy, &brcmf_regdom);

	/* firmware defaults to 40MHz disabled in 2G band. We signal
	 * cfg80211 here that we do and have it decide we can enable
	 * it. But first check if device does support 2G operation.
	 */
7088 7089
	if (wiphy->bands[NL80211_BAND_2GHZ]) {
		cap = &wiphy->bands[NL80211_BAND_2GHZ]->ht_cap.cap;
7090 7091
		*cap |= IEEE80211_HT_CAP_SUP_WIDTH_20_40;
	}
7092 7093 7094 7095
#ifdef CONFIG_PM
	if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_WOWL_GTK))
		ops->set_rekey_data = brcmf_cfg80211_set_rekey_data;
#endif
7096 7097
	err = wiphy_register(wiphy);
	if (err < 0) {
7098
		bphy_err(drvr, "Could not register wiphy device (%d)\n", err);
7099
		goto priv_out;
7100 7101
	}

7102
	err = brcmf_setup_wiphybands(cfg);
7103
	if (err) {
7104
		bphy_err(drvr, "Setting wiphy bands failed (%d)\n", err);
7105 7106 7107
		goto wiphy_unreg_out;
	}

7108 7109 7110
	/* If cfg80211 didn't disable 40MHz HT CAP in wiphy_register(),
	 * setup 40MHz in 2GHz band and enable OBSS scanning.
	 */
7111 7112
	if (cap && (*cap & IEEE80211_HT_CAP_SUP_WIDTH_20_40)) {
		err = brcmf_enable_bw40_2g(cfg);
7113 7114 7115
		if (!err)
			err = brcmf_fil_iovar_int_set(ifp, "obss_coex",
						      BRCMF_OBSS_COEX_AUTO);
7116 7117
		else
			*cap &= ~IEEE80211_HT_CAP_SUP_WIDTH_20_40;
7118
	}
7119

7120 7121
	err = brcmf_fweh_activate_events(ifp);
	if (err) {
7122
		bphy_err(drvr, "FWEH activation failed (%d)\n", err);
7123 7124
		goto wiphy_unreg_out;
	}
7125

7126
	err = brcmf_p2p_attach(cfg, p2pdev_forced);
7127
	if (err) {
7128
		bphy_err(drvr, "P2P initialisation failed (%d)\n", err);
7129 7130 7131 7132
		goto wiphy_unreg_out;
	}
	err = brcmf_btcoex_attach(cfg);
	if (err) {
7133
		bphy_err(drvr, "BT-coex initialisation failed (%d)\n", err);
7134 7135
		brcmf_p2p_detach(&cfg->p2p);
		goto wiphy_unreg_out;
7136
	}
7137 7138
	err = brcmf_pno_attach(cfg);
	if (err) {
7139
		bphy_err(drvr, "PNO initialisation failed (%d)\n", err);
7140 7141 7142 7143
		brcmf_btcoex_detach(cfg);
		brcmf_p2p_detach(&cfg->p2p);
		goto wiphy_unreg_out;
	}
7144

7145 7146 7147 7148 7149 7150 7151 7152 7153
	if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_TDLS)) {
		err = brcmf_fil_iovar_int_set(ifp, "tdls_enable", 1);
		if (err) {
			brcmf_dbg(INFO, "TDLS not enabled (%d)\n", err);
			wiphy->flags &= ~WIPHY_FLAG_SUPPORTS_TDLS;
		} else {
			brcmf_fweh_register(cfg->pub, BRCMF_E_TDLS_PEER_EVENT,
					    brcmf_notify_tdls_peer_event);
		}
7154 7155
	}

7156 7157 7158
	/* (re-) activate FWEH event handling */
	err = brcmf_fweh_activate_events(ifp);
	if (err) {
7159
		bphy_err(drvr, "FWEH activation failed (%d)\n", err);
7160
		goto detach;
7161 7162
	}

7163 7164 7165 7166
	/* Fill in some of the advertised nl80211 supported features */
	if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_SCAN_RANDOM_MAC)) {
		wiphy->features |= NL80211_FEATURE_SCHED_SCAN_RANDOM_MAC_ADDR;
#ifdef CONFIG_PM
7167 7168
		if (wiphy->wowlan &&
		    wiphy->wowlan->flags & WIPHY_WOWLAN_NET_DETECT)
7169 7170 7171 7172
			wiphy->features |= NL80211_FEATURE_ND_RANDOM_MAC_ADDR;
#endif
	}

7173 7174
	return cfg;

7175
detach:
7176
	brcmf_pno_detach(cfg);
7177 7178
	brcmf_btcoex_detach(cfg);
	brcmf_p2p_detach(&cfg->p2p);
7179 7180 7181
wiphy_unreg_out:
	wiphy_unregister(cfg->wiphy);
priv_out:
7182 7183
	wl_deinit_priv(cfg);
	brcmf_free_vif(vif);
7184
	ifp->vif = NULL;
7185 7186
wiphy_out:
	brcmf_free_wiphy(wiphy);
7187
	kfree(cfg);
7188 7189 7190 7191 7192 7193 7194 7195
	return NULL;
}

void brcmf_cfg80211_detach(struct brcmf_cfg80211_info *cfg)
{
	if (!cfg)
		return;

7196
	brcmf_pno_detach(cfg);
7197
	brcmf_btcoex_detach(cfg);
7198
	wiphy_unregister(cfg->wiphy);
7199
	kfree(cfg->ops);
7200
	wl_deinit_priv(cfg);
7201
	brcmf_free_wiphy(cfg->wiphy);
7202
	kfree(cfg);
7203
}