cfg80211.c 178 KB
Newer Older
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
/*
 * Copyright (c) 2010 Broadcom Corporation
 *
 * Permission to use, copy, modify, and/or distribute this software for any
 * purpose with or without fee is hereby granted, provided that the above
 * copyright notice and this permission notice appear in all copies.
 *
 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY
 * SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION
 * OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN
 * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
 */

/* Toplevel file. Relies on dhd_linux.c to send commands to the dongle. */

#include <linux/kernel.h>
#include <linux/etherdevice.h>
21
#include <linux/module.h>
22
#include <linux/vmalloc.h>
23
#include <net/cfg80211.h>
24
#include <net/netlink.h>
25 26 27 28

#include <brcmu_utils.h>
#include <defs.h>
#include <brcmu_wifi.h>
29
#include "core.h"
30
#include "debug.h"
31
#include "tracepoint.h"
32
#include "fwil_types.h"
33
#include "p2p.h"
34
#include "btcoex.h"
35
#include "cfg80211.h"
36
#include "feature.h"
37
#include "fwil.h"
38
#include "proto.h"
39
#include "vendor.h"
40
#include "bus.h"
41
#include "common.h"
42

43 44 45 46 47 48 49 50 51 52 53 54
#define BRCMF_SCAN_IE_LEN_MAX		2048
#define BRCMF_PNO_VERSION		2
#define BRCMF_PNO_TIME			30
#define BRCMF_PNO_REPEAT		4
#define BRCMF_PNO_FREQ_EXPO_MAX		3
#define BRCMF_PNO_MAX_PFN_COUNT		16
#define BRCMF_PNO_ENABLE_ADAPTSCAN_BIT	6
#define BRCMF_PNO_HIDDEN_BIT		2
#define BRCMF_PNO_WPA_AUTH_ANY		0xFFFFFFFF
#define BRCMF_PNO_SCAN_COMPLETE		1
#define BRCMF_PNO_SCAN_INCOMPLETE	0

55 56 57 58
#define WPA_OUI				"\x00\x50\xF2"	/* WPA OUI */
#define WPA_OUI_TYPE			1
#define RSN_OUI				"\x00\x0F\xAC"	/* RSN OUI */
#define	WME_OUI_TYPE			2
59
#define WPS_OUI_TYPE			4
60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84

#define VS_IE_FIXED_HDR_LEN		6
#define WPA_IE_VERSION_LEN		2
#define WPA_IE_MIN_OUI_LEN		4
#define WPA_IE_SUITE_COUNT_LEN		2

#define WPA_CIPHER_NONE			0	/* None */
#define WPA_CIPHER_WEP_40		1	/* WEP (40-bit) */
#define WPA_CIPHER_TKIP			2	/* TKIP: default for WPA */
#define WPA_CIPHER_AES_CCM		4	/* AES (CCM) */
#define WPA_CIPHER_WEP_104		5	/* WEP (104-bit) */

#define RSN_AKM_NONE			0	/* None (IBSS) */
#define RSN_AKM_UNSPECIFIED		1	/* Over 802.1x */
#define RSN_AKM_PSK			2	/* Pre-shared Key */
#define RSN_CAP_LEN			2	/* Length of RSN capabilities */
#define RSN_CAP_PTK_REPLAY_CNTR_MASK	0x000C

#define VNDR_IE_CMD_LEN			4	/* length of the set command
						 * string :"add", "del" (+ NUL)
						 */
#define VNDR_IE_COUNT_OFFSET		4
#define VNDR_IE_PKTFLAG_OFFSET		8
#define VNDR_IE_VSIE_OFFSET		12
#define VNDR_IE_HDR_SIZE		12
85
#define VNDR_IE_PARSE_LIMIT		5
86 87 88

#define	DOT11_MGMT_HDR_LEN		24	/* d11 management header len */
#define	DOT11_BCN_PRB_FIXED_LEN		12	/* beacon/probe fixed length */
89

90 91 92 93
#define BRCMF_SCAN_JOIN_ACTIVE_DWELL_TIME_MS	320
#define BRCMF_SCAN_JOIN_PASSIVE_DWELL_TIME_MS	400
#define BRCMF_SCAN_JOIN_PROBE_INTERVAL_MS	20

94 95 96 97
#define BRCMF_SCAN_CHANNEL_TIME		40
#define BRCMF_SCAN_UNASSOC_TIME		40
#define BRCMF_SCAN_PASSIVE_TIME		120

98 99
#define BRCMF_ND_INFO_TIMEOUT		msecs_to_jiffies(2000)

100 101 102
#define BRCMF_ASSOC_PARAMS_FIXED_SIZE \
	(sizeof(struct brcmf_assoc_params_le) - sizeof(u16))

103
static bool check_vif_up(struct brcmf_cfg80211_vif *vif)
104
{
105
	if (!test_bit(BRCMF_VIF_STATUS_READY, &vif->sme_state)) {
106 107
		brcmf_dbg(INFO, "device is not ready : status (%lu)\n",
			  vif->sme_state);
108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136
		return false;
	}
	return true;
}

#define RATE_TO_BASE100KBPS(rate)   (((rate) * 10) / 2)
#define RATETAB_ENT(_rateid, _flags) \
	{                                                               \
		.bitrate        = RATE_TO_BASE100KBPS(_rateid),     \
		.hw_value       = (_rateid),                            \
		.flags          = (_flags),                             \
	}

static struct ieee80211_rate __wl_rates[] = {
	RATETAB_ENT(BRCM_RATE_1M, 0),
	RATETAB_ENT(BRCM_RATE_2M, IEEE80211_RATE_SHORT_PREAMBLE),
	RATETAB_ENT(BRCM_RATE_5M5, IEEE80211_RATE_SHORT_PREAMBLE),
	RATETAB_ENT(BRCM_RATE_11M, IEEE80211_RATE_SHORT_PREAMBLE),
	RATETAB_ENT(BRCM_RATE_6M, 0),
	RATETAB_ENT(BRCM_RATE_9M, 0),
	RATETAB_ENT(BRCM_RATE_12M, 0),
	RATETAB_ENT(BRCM_RATE_18M, 0),
	RATETAB_ENT(BRCM_RATE_24M, 0),
	RATETAB_ENT(BRCM_RATE_36M, 0),
	RATETAB_ENT(BRCM_RATE_48M, 0),
	RATETAB_ENT(BRCM_RATE_54M, 0),
};

#define wl_g_rates		(__wl_rates + 0)
137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173
#define wl_g_rates_size		ARRAY_SIZE(__wl_rates)
#define wl_a_rates		(__wl_rates + 4)
#define wl_a_rates_size		(wl_g_rates_size - 4)

#define CHAN2G(_channel, _freq) {				\
	.band			= IEEE80211_BAND_2GHZ,		\
	.center_freq		= (_freq),			\
	.hw_value		= (_channel),			\
	.flags			= IEEE80211_CHAN_DISABLED,	\
	.max_antenna_gain	= 0,				\
	.max_power		= 30,				\
}

#define CHAN5G(_channel) {					\
	.band			= IEEE80211_BAND_5GHZ,		\
	.center_freq		= 5000 + (5 * (_channel)),	\
	.hw_value		= (_channel),			\
	.flags			= IEEE80211_CHAN_DISABLED,	\
	.max_antenna_gain	= 0,				\
	.max_power		= 30,				\
}

static struct ieee80211_channel __wl_2ghz_channels[] = {
	CHAN2G(1, 2412), CHAN2G(2, 2417), CHAN2G(3, 2422), CHAN2G(4, 2427),
	CHAN2G(5, 2432), CHAN2G(6, 2437), CHAN2G(7, 2442), CHAN2G(8, 2447),
	CHAN2G(9, 2452), CHAN2G(10, 2457), CHAN2G(11, 2462), CHAN2G(12, 2467),
	CHAN2G(13, 2472), CHAN2G(14, 2484)
};

static struct ieee80211_channel __wl_5ghz_channels[] = {
	CHAN5G(34), CHAN5G(36), CHAN5G(38), CHAN5G(40), CHAN5G(42),
	CHAN5G(44), CHAN5G(46), CHAN5G(48), CHAN5G(52), CHAN5G(56),
	CHAN5G(60), CHAN5G(64), CHAN5G(100), CHAN5G(104), CHAN5G(108),
	CHAN5G(112), CHAN5G(116), CHAN5G(120), CHAN5G(124), CHAN5G(128),
	CHAN5G(132), CHAN5G(136), CHAN5G(140), CHAN5G(144), CHAN5G(149),
	CHAN5G(153), CHAN5G(157), CHAN5G(161), CHAN5G(165)
};
174

175
/* Band templates duplicated per wiphy. The channel info
176
 * above is added to the band during setup.
177 178
 */
static const struct ieee80211_supported_band __wl_band_2ghz = {
179 180 181 182 183
	.band = IEEE80211_BAND_2GHZ,
	.bitrates = wl_g_rates,
	.n_bitrates = wl_g_rates_size,
};

184
static const struct ieee80211_supported_band __wl_band_5ghz = {
185 186 187 188 189
	.band = IEEE80211_BAND_5GHZ,
	.bitrates = wl_a_rates,
	.n_bitrates = wl_a_rates_size,
};

190 191
/* This is to override regulatory domains defined in cfg80211 module (reg.c)
 * By default world regulatory domain defined in reg.c puts the flags
192 193 194
 * NL80211_RRF_NO_IR for 5GHz channels (for * 36..48 and 149..165).
 * With respect to these flags, wpa_supplicant doesn't * start p2p
 * operations on 5GHz channels. All the changes in world regulatory
195 196 197 198 199 200 201 202 203 204 205 206 207 208
 * domain are to be done here.
 */
static const struct ieee80211_regdomain brcmf_regdom = {
	.n_reg_rules = 4,
	.alpha2 =  "99",
	.reg_rules = {
		/* IEEE 802.11b/g, channels 1..11 */
		REG_RULE(2412-10, 2472+10, 40, 6, 20, 0),
		/* If any */
		/* IEEE 802.11 channel 14 - Only JP enables
		 * this and for 802.11b only
		 */
		REG_RULE(2484-10, 2484+10, 20, 6, 20, 0),
		/* IEEE 802.11a, channel 36..64 */
209
		REG_RULE(5150-10, 5350+10, 80, 6, 20, 0),
210
		/* IEEE 802.11a, channel 100..165 */
211
		REG_RULE(5470-10, 5850+10, 80, 6, 20, 0), }
212 213 214 215 216 217 218 219 220 221
};

static const u32 __wl_cipher_suites[] = {
	WLAN_CIPHER_SUITE_WEP40,
	WLAN_CIPHER_SUITE_WEP104,
	WLAN_CIPHER_SUITE_TKIP,
	WLAN_CIPHER_SUITE_CCMP,
	WLAN_CIPHER_SUITE_AES_CMAC,
};

222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237
/* Vendor specific ie. id = 221, oui and type defines exact ie */
struct brcmf_vs_tlv {
	u8 id;
	u8 len;
	u8 oui[3];
	u8 oui_type;
};

struct parsed_vndr_ie_info {
	u8 *ie_ptr;
	u32 ie_len;	/* total length including id & length field */
	struct brcmf_vs_tlv vndrie;
};

struct parsed_vndr_ies {
	u32 count;
238
	struct parsed_vndr_ie_info ie_info[VNDR_IE_PARSE_LIMIT];
239 240
};

241 242
static u16 chandef_to_chanspec(struct brcmu_d11inf *d11inf,
			       struct cfg80211_chan_def *ch)
243 244 245 246 247 248 249
{
	struct brcmu_chan ch_inf;
	s32 primary_offset;

	brcmf_dbg(TRACE, "chandef: control %d center %d width %d\n",
		  ch->chan->center_freq, ch->center_freq1, ch->width);
	ch_inf.chnum = ieee80211_frequency_to_channel(ch->center_freq1);
250
	primary_offset = ch->chan->center_freq - ch->center_freq1;
251 252
	switch (ch->width) {
	case NL80211_CHAN_WIDTH_20:
253
	case NL80211_CHAN_WIDTH_20_NOHT:
254 255 256 257 258
		ch_inf.bw = BRCMU_CHAN_BW_20;
		WARN_ON(primary_offset != 0);
		break;
	case NL80211_CHAN_WIDTH_40:
		ch_inf.bw = BRCMU_CHAN_BW_40;
259
		if (primary_offset > 0)
260 261 262 263 264 265
			ch_inf.sb = BRCMU_CHAN_SB_U;
		else
			ch_inf.sb = BRCMU_CHAN_SB_L;
		break;
	case NL80211_CHAN_WIDTH_80:
		ch_inf.bw = BRCMU_CHAN_BW_80;
266 267 268 269 270 271 272 273
		if (primary_offset == -30)
			ch_inf.sb = BRCMU_CHAN_SB_LL;
		else if (primary_offset == -10)
			ch_inf.sb = BRCMU_CHAN_SB_LU;
		else if (primary_offset == 10)
			ch_inf.sb = BRCMU_CHAN_SB_UL;
		else
			ch_inf.sb = BRCMU_CHAN_SB_UU;
274
		break;
275 276 277 278
	case NL80211_CHAN_WIDTH_80P80:
	case NL80211_CHAN_WIDTH_160:
	case NL80211_CHAN_WIDTH_5:
	case NL80211_CHAN_WIDTH_10:
279 280 281 282 283 284 285 286 287 288
	default:
		WARN_ON_ONCE(1);
	}
	switch (ch->chan->band) {
	case IEEE80211_BAND_2GHZ:
		ch_inf.band = BRCMU_CHAN_BAND_2G;
		break;
	case IEEE80211_BAND_5GHZ:
		ch_inf.band = BRCMU_CHAN_BAND_5G;
		break;
289
	case IEEE80211_BAND_60GHZ:
290 291 292 293 294 295 296 297
	default:
		WARN_ON_ONCE(1);
	}
	d11inf->encchspec(&ch_inf);

	return ch_inf.chspec;
}

298 299
u16 channel_to_chanspec(struct brcmu_d11inf *d11inf,
			struct ieee80211_channel *ch)
300
{
301
	struct brcmu_chan ch_inf;
302

303 304 305
	ch_inf.chnum = ieee80211_frequency_to_channel(ch->center_freq);
	ch_inf.bw = BRCMU_CHAN_BW_20;
	d11inf->encchspec(&ch_inf);
306

307
	return ch_inf.chspec;
308 309
}

310 311 312 313
/* Traverse a string of 1-byte tag/1-byte length/variable-length value
 * triples, returning a pointer to the substring whose first element
 * matches tag
 */
314 315
const struct brcmf_tlv *
brcmf_parse_tlvs(const void *buf, int buflen, uint key)
316
{
317 318
	const struct brcmf_tlv *elt = buf;
	int totlen = buflen;
319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338

	/* find tagged parameter */
	while (totlen >= TLV_HDR_LEN) {
		int len = elt->len;

		/* validate remaining totlen */
		if ((elt->id == key) && (totlen >= (len + TLV_HDR_LEN)))
			return elt;

		elt = (struct brcmf_tlv *)((u8 *)elt + (len + TLV_HDR_LEN));
		totlen -= (len + TLV_HDR_LEN);
	}

	return NULL;
}

/* Is any of the tlvs the expected entry? If
 * not update the tlvs buffer pointer/length.
 */
static bool
339 340
brcmf_tlv_has_ie(const u8 *ie, const u8 **tlvs, u32 *tlvs_len,
		 const u8 *oui, u32 oui_len, u8 type)
341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361
{
	/* If the contents match the OUI and the type */
	if (ie[TLV_LEN_OFF] >= oui_len + 1 &&
	    !memcmp(&ie[TLV_BODY_OFF], oui, oui_len) &&
	    type == ie[TLV_BODY_OFF + oui_len]) {
		return true;
	}

	if (tlvs == NULL)
		return false;
	/* point to the next ie */
	ie += ie[TLV_LEN_OFF] + TLV_HDR_LEN;
	/* calculate the length of the rest of the buffer */
	*tlvs_len -= (int)(ie - *tlvs);
	/* update the pointer to the start of the buffer */
	*tlvs = ie;

	return false;
}

static struct brcmf_vs_tlv *
362
brcmf_find_wpaie(const u8 *parse, u32 len)
363
{
364
	const struct brcmf_tlv *ie;
365 366

	while ((ie = brcmf_parse_tlvs(parse, len, WLAN_EID_VENDOR_SPECIFIC))) {
367
		if (brcmf_tlv_has_ie((const u8 *)ie, &parse, &len,
368 369 370 371 372 373 374
				     WPA_OUI, TLV_OUI_LEN, WPA_OUI_TYPE))
			return (struct brcmf_vs_tlv *)ie;
	}
	return NULL;
}

static struct brcmf_vs_tlv *
375
brcmf_find_wpsie(const u8 *parse, u32 len)
376
{
377
	const struct brcmf_tlv *ie;
378 379 380 381 382 383 384 385 386

	while ((ie = brcmf_parse_tlvs(parse, len, WLAN_EID_VENDOR_SPECIFIC))) {
		if (brcmf_tlv_has_ie((u8 *)ie, &parse, &len,
				     WPA_OUI, TLV_OUI_LEN, WPS_OUI_TYPE))
			return (struct brcmf_vs_tlv *)ie;
	}
	return NULL;
}

387 388 389 390 391 392
static int brcmf_vif_change_validate(struct brcmf_cfg80211_info *cfg,
				     struct brcmf_cfg80211_vif *vif,
				     enum nl80211_iftype new_type)
{
	int iftype_num[NUM_NL80211_IFTYPES];
	struct brcmf_cfg80211_vif *pos;
393 394
	bool check_combos = false;
	int ret = 0;
395 396 397

	memset(&iftype_num[0], 0, sizeof(iftype_num));
	list_for_each_entry(pos, &cfg->vif_list, list)
398
		if (pos == vif) {
399
			iftype_num[new_type]++;
400 401 402
		} else {
			/* concurrent interfaces so need check combinations */
			check_combos = true;
403
			iftype_num[pos->wdev.iftype]++;
404 405 406 407
		}

	if (check_combos)
		ret = cfg80211_check_combinations(cfg->wiphy, 1, 0, iftype_num);
408

409
	return ret;
410 411 412 413 414 415 416 417 418 419 420 421 422 423 424
}

static int brcmf_vif_add_validate(struct brcmf_cfg80211_info *cfg,
				  enum nl80211_iftype new_type)
{
	int iftype_num[NUM_NL80211_IFTYPES];
	struct brcmf_cfg80211_vif *pos;

	memset(&iftype_num[0], 0, sizeof(iftype_num));
	list_for_each_entry(pos, &cfg->vif_list, list)
		iftype_num[pos->wdev.iftype]++;

	iftype_num[new_type]++;
	return cfg80211_check_combinations(cfg->wiphy, 1, 0, iftype_num);
}
425

426 427 428 429 430 431 432 433 434 435 436 437 438 439
static void convert_key_from_CPU(struct brcmf_wsec_key *key,
				 struct brcmf_wsec_key_le *key_le)
{
	key_le->index = cpu_to_le32(key->index);
	key_le->len = cpu_to_le32(key->len);
	key_le->algo = cpu_to_le32(key->algo);
	key_le->flags = cpu_to_le32(key->flags);
	key_le->rxiv.hi = cpu_to_le32(key->rxiv.hi);
	key_le->rxiv.lo = cpu_to_le16(key->rxiv.lo);
	key_le->iv_initialized = cpu_to_le32(key->iv_initialized);
	memcpy(key_le->data, key->data, sizeof(key->data));
	memcpy(key_le->ea, key->ea, sizeof(key->ea));
}

440
static int
441
send_key_to_dongle(struct brcmf_if *ifp, struct brcmf_wsec_key *key)
442 443 444 445 446
{
	int err;
	struct brcmf_wsec_key_le key_le;

	convert_key_from_CPU(key, &key_le);
447

448
	brcmf_netdev_wait_pend8021x(ifp);
449

450
	err = brcmf_fil_bsscfg_data_set(ifp, "wsec_key", &key_le,
451
					sizeof(key_le));
452

453
	if (err)
454
		brcmf_err("wsec_key error (%d)\n", err);
455 456 457
	return err;
}

458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489
static s32
brcmf_configure_arp_offload(struct brcmf_if *ifp, bool enable)
{
	s32 err;
	u32 mode;

	if (enable)
		mode = BRCMF_ARP_OL_AGENT | BRCMF_ARP_OL_PEER_AUTO_REPLY;
	else
		mode = 0;

	/* Try to set and enable ARP offload feature, this may fail, then it  */
	/* is simply not supported and err 0 will be returned                 */
	err = brcmf_fil_iovar_int_set(ifp, "arp_ol", mode);
	if (err) {
		brcmf_dbg(TRACE, "failed to set ARP offload mode to 0x%x, err = %d\n",
			  mode, err);
		err = 0;
	} else {
		err = brcmf_fil_iovar_int_set(ifp, "arpoe", enable);
		if (err) {
			brcmf_dbg(TRACE, "failed to configure (%d) ARP offload err = %d\n",
				  enable, err);
			err = 0;
		} else
			brcmf_dbg(TRACE, "successfully configured (%d) ARP offload to 0x%x\n",
				  enable, mode);
	}

	return err;
}

490 491 492
static void
brcmf_cfg80211_update_proto_addr_mode(struct wireless_dev *wdev)
{
493 494 495 496 497
	struct brcmf_cfg80211_vif *vif;
	struct brcmf_if *ifp;

	vif = container_of(wdev, struct brcmf_cfg80211_vif, wdev);
	ifp = vif->ifp;
498 499 500 501 502 503 504 505 506 507 508

	if ((wdev->iftype == NL80211_IFTYPE_ADHOC) ||
	    (wdev->iftype == NL80211_IFTYPE_AP) ||
	    (wdev->iftype == NL80211_IFTYPE_P2P_GO))
		brcmf_proto_configure_addr_mode(ifp->drvr, ifp->ifidx,
						ADDR_DIRECT);
	else
		brcmf_proto_configure_addr_mode(ifp->drvr, ifp->ifidx,
						ADDR_INDIRECT);
}

509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566
static int brcmf_cfg80211_request_ap_if(struct brcmf_if *ifp)
{
	struct brcmf_mbss_ssid_le mbss_ssid_le;
	int bsscfgidx;
	int err;

	memset(&mbss_ssid_le, 0, sizeof(mbss_ssid_le));
	bsscfgidx = brcmf_get_next_free_bsscfgidx(ifp->drvr);
	if (bsscfgidx < 0)
		return bsscfgidx;

	mbss_ssid_le.bsscfgidx = cpu_to_le32(bsscfgidx);
	mbss_ssid_le.SSID_len = cpu_to_le32(5);
	sprintf(mbss_ssid_le.SSID, "ssid%d" , bsscfgidx);

	err = brcmf_fil_bsscfg_data_set(ifp, "bsscfg:ssid", &mbss_ssid_le,
					sizeof(mbss_ssid_le));
	if (err < 0)
		brcmf_err("setting ssid failed %d\n", err);

	return err;
}

/**
 * brcmf_ap_add_vif() - create a new AP virtual interface for multiple BSS
 *
 * @wiphy: wiphy device of new interface.
 * @name: name of the new interface.
 * @flags: not used.
 * @params: contains mac address for AP device.
 */
static
struct wireless_dev *brcmf_ap_add_vif(struct wiphy *wiphy, const char *name,
				      u32 *flags, struct vif_params *params)
{
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
	struct brcmf_if *ifp = netdev_priv(cfg_to_ndev(cfg));
	struct brcmf_cfg80211_vif *vif;
	int err;

	if (brcmf_cfg80211_vif_event_armed(cfg))
		return ERR_PTR(-EBUSY);

	brcmf_dbg(INFO, "Adding vif \"%s\"\n", name);

	vif = brcmf_alloc_vif(cfg, NL80211_IFTYPE_AP, false);
	if (IS_ERR(vif))
		return (struct wireless_dev *)vif;

	brcmf_cfg80211_arm_vif_event(cfg, vif);

	err = brcmf_cfg80211_request_ap_if(ifp);
	if (err) {
		brcmf_cfg80211_arm_vif_event(cfg, NULL);
		goto fail;
	}

	/* wait for firmware event */
567 568
	err = brcmf_cfg80211_wait_vif_event(cfg, BRCMF_E_IF_ADD,
					    BRCMF_VIF_EVENT_TIMEOUT);
569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597
	brcmf_cfg80211_arm_vif_event(cfg, NULL);
	if (!err) {
		brcmf_err("timeout occurred\n");
		err = -EIO;
		goto fail;
	}

	/* interface created in firmware */
	ifp = vif->ifp;
	if (!ifp) {
		brcmf_err("no if pointer provided\n");
		err = -ENOENT;
		goto fail;
	}

	strncpy(ifp->ndev->name, name, sizeof(ifp->ndev->name) - 1);
	err = brcmf_net_attach(ifp, true);
	if (err) {
		brcmf_err("Registering netdevice failed\n");
		goto fail;
	}

	return &ifp->vif->wdev;

fail:
	brcmf_free_vif(vif);
	return ERR_PTR(err);
}

598 599 600 601 602 603 604 605 606 607 608 609 610
static bool brcmf_is_apmode(struct brcmf_cfg80211_vif *vif)
{
	enum nl80211_iftype iftype;

	iftype = vif->wdev.iftype;
	return iftype == NL80211_IFTYPE_AP || iftype == NL80211_IFTYPE_P2P_GO;
}

static bool brcmf_is_ibssmode(struct brcmf_cfg80211_vif *vif)
{
	return vif->wdev.iftype == NL80211_IFTYPE_ADHOC;
}

611 612
static struct wireless_dev *brcmf_cfg80211_add_iface(struct wiphy *wiphy,
						     const char *name,
613
						     unsigned char name_assign_type,
614 615 616 617
						     enum nl80211_iftype type,
						     u32 *flags,
						     struct vif_params *params)
{
618
	struct wireless_dev *wdev;
619
	int err;
620

621
	brcmf_dbg(TRACE, "enter: %s type %d\n", name, type);
622 623 624 625 626
	err = brcmf_vif_add_validate(wiphy_to_cfg(wiphy), type);
	if (err) {
		brcmf_err("iface validation failed: err=%d\n", err);
		return ERR_PTR(err);
	}
627 628 629 630 631 632 633 634
	switch (type) {
	case NL80211_IFTYPE_ADHOC:
	case NL80211_IFTYPE_STATION:
	case NL80211_IFTYPE_AP_VLAN:
	case NL80211_IFTYPE_WDS:
	case NL80211_IFTYPE_MONITOR:
	case NL80211_IFTYPE_MESH_POINT:
		return ERR_PTR(-EOPNOTSUPP);
635 636 637 638 639
	case NL80211_IFTYPE_AP:
		wdev = brcmf_ap_add_vif(wiphy, name, flags, params);
		if (!IS_ERR(wdev))
			brcmf_cfg80211_update_proto_addr_mode(wdev);
		return wdev;
640 641
	case NL80211_IFTYPE_P2P_CLIENT:
	case NL80211_IFTYPE_P2P_GO:
642
	case NL80211_IFTYPE_P2P_DEVICE:
643
		wdev = brcmf_p2p_add_vif(wiphy, name, name_assign_type, type, flags, params);
644 645 646
		if (!IS_ERR(wdev))
			brcmf_cfg80211_update_proto_addr_mode(wdev);
		return wdev;
647 648 649 650 651 652
	case NL80211_IFTYPE_UNSPECIFIED:
	default:
		return ERR_PTR(-EINVAL);
	}
}

653 654
static void brcmf_scan_config_mpc(struct brcmf_if *ifp, int mpc)
{
655
	if (brcmf_feat_is_quirk_enabled(ifp, BRCMF_FEAT_QUIRK_NEED_MPC))
656 657 658
		brcmf_set_mpc(ifp, mpc);
}

659
void brcmf_set_mpc(struct brcmf_if *ifp, int mpc)
660 661 662 663 664 665 666 667 668 669 670 671 672
{
	s32 err = 0;

	if (check_vif_up(ifp->vif)) {
		err = brcmf_fil_iovar_int_set(ifp, "mpc", mpc);
		if (err) {
			brcmf_err("fail to set mpc\n");
			return;
		}
		brcmf_dbg(INFO, "MPC : %d\n", mpc);
	}
}

673 674 675
s32 brcmf_notify_escan_complete(struct brcmf_cfg80211_info *cfg,
				struct brcmf_if *ifp, bool aborted,
				bool fw_abort)
676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694
{
	struct brcmf_scan_params_le params_le;
	struct cfg80211_scan_request *scan_request;
	s32 err = 0;

	brcmf_dbg(SCAN, "Enter\n");

	/* clear scan request, because the FW abort can cause a second call */
	/* to this functon and might cause a double cfg80211_scan_done      */
	scan_request = cfg->scan_request;
	cfg->scan_request = NULL;

	if (timer_pending(&cfg->escan_timeout))
		del_timer_sync(&cfg->escan_timeout);

	if (fw_abort) {
		/* Do a scan abort to stop the driver's scan engine */
		brcmf_dbg(SCAN, "ABORT scan in firmware\n");
		memset(&params_le, 0, sizeof(params_le));
695
		eth_broadcast_addr(params_le.bssid);
696 697 698 699 700 701 702 703 704 705
		params_le.bss_type = DOT11_BSSTYPE_ANY;
		params_le.scan_type = 0;
		params_le.channel_num = cpu_to_le32(1);
		params_le.nprobes = cpu_to_le32(1);
		params_le.active_time = cpu_to_le32(-1);
		params_le.passive_time = cpu_to_le32(-1);
		params_le.home_time = cpu_to_le32(-1);
		/* Scan is aborted by setting channel_list[0] to -1 */
		params_le.channel_list[0] = cpu_to_le16(-1);
		/* E-Scan (or anyother type) can be aborted by SCAN */
706
		err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SCAN,
707 708 709 710
					     &params_le, sizeof(params_le));
		if (err)
			brcmf_err("Scan abort  failed\n");
	}
711

712
	brcmf_scan_config_mpc(ifp, 1);
713

714 715 716 717 718 719 720 721 722 723 724 725 726 727
	/*
	 * e-scan can be initiated by scheduled scan
	 * which takes precedence.
	 */
	if (cfg->sched_escan) {
		brcmf_dbg(SCAN, "scheduled scan completed\n");
		cfg->sched_escan = false;
		if (!aborted)
			cfg80211_sched_scan_results(cfg_to_wiphy(cfg));
	} else if (scan_request) {
		brcmf_dbg(SCAN, "ESCAN Completed scan: %s\n",
			  aborted ? "Aborted" : "Done");
		cfg80211_scan_done(scan_request, aborted);
	}
728 729
	if (!test_and_clear_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status))
		brcmf_dbg(SCAN, "Scan complete, probably P2P scan\n");
730 731 732 733

	return err;
}

734 735 736
static
int brcmf_cfg80211_del_iface(struct wiphy *wiphy, struct wireless_dev *wdev)
{
737 738 739 740 741 742 743 744 745
	struct brcmf_cfg80211_info *cfg = wiphy_priv(wiphy);
	struct net_device *ndev = wdev->netdev;

	/* vif event pending in firmware */
	if (brcmf_cfg80211_vif_event_armed(cfg))
		return -EBUSY;

	if (ndev) {
		if (test_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status) &&
746 747 748
		    cfg->escan_info.ifp == netdev_priv(ndev))
			brcmf_notify_escan_complete(cfg, netdev_priv(ndev),
						    true, true);
749 750 751 752

		brcmf_fil_iovar_int_set(netdev_priv(ndev), "mpc", 1);
	}

753 754 755 756 757 758 759 760 761 762 763
	switch (wdev->iftype) {
	case NL80211_IFTYPE_ADHOC:
	case NL80211_IFTYPE_STATION:
	case NL80211_IFTYPE_AP:
	case NL80211_IFTYPE_AP_VLAN:
	case NL80211_IFTYPE_WDS:
	case NL80211_IFTYPE_MONITOR:
	case NL80211_IFTYPE_MESH_POINT:
		return -EOPNOTSUPP;
	case NL80211_IFTYPE_P2P_CLIENT:
	case NL80211_IFTYPE_P2P_GO:
764
	case NL80211_IFTYPE_P2P_DEVICE:
765 766 767 768 769 770 771 772
		return brcmf_p2p_del_vif(wiphy, wdev);
	case NL80211_IFTYPE_UNSPECIFIED:
	default:
		return -EINVAL;
	}
	return -EOPNOTSUPP;
}

773 774 775 776 777
static s32
brcmf_cfg80211_change_iface(struct wiphy *wiphy, struct net_device *ndev,
			 enum nl80211_iftype type, u32 *flags,
			 struct vif_params *params)
{
778
	struct brcmf_cfg80211_info *cfg = wiphy_priv(wiphy);
779
	struct brcmf_if *ifp = netdev_priv(ndev);
780
	struct brcmf_cfg80211_vif *vif = ifp->vif;
781
	s32 infra = 0;
782
	s32 ap = 0;
783 784
	s32 err = 0;

785 786
	brcmf_dbg(TRACE, "Enter, bsscfgidx=%d, type=%d\n", ifp->bsscfgidx,
		  type);
787 788 789 790 791 792 793 794 795 796 797 798 799 800 801 802 803 804 805 806 807 808 809 810 811 812 813 814 815 816 817

	/* WAR: There are a number of p2p interface related problems which
	 * need to be handled initially (before doing the validate).
	 * wpa_supplicant tends to do iface changes on p2p device/client/go
	 * which are not always possible/allowed. However we need to return
	 * OK otherwise the wpa_supplicant wont start. The situation differs
	 * on configuration and setup (p2pon=1 module param). The first check
	 * is to see if the request is a change to station for p2p iface.
	 */
	if ((type == NL80211_IFTYPE_STATION) &&
	    ((vif->wdev.iftype == NL80211_IFTYPE_P2P_CLIENT) ||
	     (vif->wdev.iftype == NL80211_IFTYPE_P2P_GO) ||
	     (vif->wdev.iftype == NL80211_IFTYPE_P2P_DEVICE))) {
		brcmf_dbg(TRACE, "Ignoring cmd for p2p if\n");
		/* Now depending on whether module param p2pon=1 was used the
		 * response needs to be either 0 or EOPNOTSUPP. The reason is
		 * that if p2pon=1 is used, but a newer supplicant is used then
		 * we should return an error, as this combination wont work.
		 * In other situations 0 is returned and supplicant will start
		 * normally. It will give a trace in cfg80211, but it is the
		 * only way to get it working. Unfortunately this will result
		 * in situation where we wont support new supplicant in
		 * combination with module param p2pon=1, but that is the way
		 * it is. If the user tries this then unloading of driver might
		 * fail/lock.
		 */
		if (cfg->p2p.p2pdev_dynamically)
			return -EOPNOTSUPP;
		else
			return 0;
	}
818 819 820 821 822
	err = brcmf_vif_change_validate(wiphy_to_cfg(wiphy), vif, type);
	if (err) {
		brcmf_err("iface validation failed: err=%d\n", err);
		return err;
	}
823 824 825
	switch (type) {
	case NL80211_IFTYPE_MONITOR:
	case NL80211_IFTYPE_WDS:
826 827
		brcmf_err("type (%d) : currently we do not support this type\n",
			  type);
828 829 830 831 832 833 834
		return -EOPNOTSUPP;
	case NL80211_IFTYPE_ADHOC:
		infra = 0;
		break;
	case NL80211_IFTYPE_STATION:
		infra = 1;
		break;
835
	case NL80211_IFTYPE_AP:
836
	case NL80211_IFTYPE_P2P_GO:
837 838
		ap = 1;
		break;
839 840 841 842 843
	default:
		err = -EINVAL;
		goto done;
	}

844
	if (ap) {
845 846 847 848 849 850 851
		if (type == NL80211_IFTYPE_P2P_GO) {
			brcmf_dbg(INFO, "IF Type = P2P GO\n");
			err = brcmf_p2p_ifchange(cfg, BRCMF_FIL_P2P_IF_GO);
		}
		if (!err) {
			brcmf_dbg(INFO, "IF Type = AP\n");
		}
852
	} else {
853
		err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_INFRA, infra);
854
		if (err) {
855
			brcmf_err("WLC_SET_INFRA error (%d)\n", err);
856 857 858
			err = -EAGAIN;
			goto done;
		}
859
		brcmf_dbg(INFO, "IF Type = %s\n", brcmf_is_ibssmode(vif) ?
860
			  "Adhoc" : "Infra");
861
	}
862
	ndev->ieee80211_ptr->iftype = type;
863

864 865
	brcmf_cfg80211_update_proto_addr_mode(&vif->wdev);

866
done:
867
	brcmf_dbg(TRACE, "Exit\n");
868 869 870 871

	return err;
}

872 873
static void brcmf_escan_prep(struct brcmf_cfg80211_info *cfg,
			     struct brcmf_scan_params_le *params_le,
874 875 876 877 878 879
			     struct cfg80211_scan_request *request)
{
	u32 n_ssids;
	u32 n_channels;
	s32 i;
	s32 offset;
880
	u16 chanspec;
881
	char *ptr;
882
	struct brcmf_ssid_le ssid_le;
883

884
	eth_broadcast_addr(params_le->bssid);
885 886 887 888 889 890 891 892 893 894 895 896 897 898 899 900
	params_le->bss_type = DOT11_BSSTYPE_ANY;
	params_le->scan_type = 0;
	params_le->channel_num = 0;
	params_le->nprobes = cpu_to_le32(-1);
	params_le->active_time = cpu_to_le32(-1);
	params_le->passive_time = cpu_to_le32(-1);
	params_le->home_time = cpu_to_le32(-1);
	memset(&params_le->ssid_le, 0, sizeof(params_le->ssid_le));

	/* if request is null exit so it will be all channel broadcast scan */
	if (!request)
		return;

	n_ssids = request->n_ssids;
	n_channels = request->n_channels;
	/* Copy channel array if applicable */
901 902
	brcmf_dbg(SCAN, "### List of channelspecs to scan ### %d\n",
		  n_channels);
903 904
	if (n_channels > 0) {
		for (i = 0; i < n_channels; i++) {
905 906
			chanspec = channel_to_chanspec(&cfg->d11inf,
						       request->channels[i]);
907 908
			brcmf_dbg(SCAN, "Chan : %d, Channel spec: %x\n",
				  request->channels[i]->hw_value, chanspec);
909
			params_le->channel_list[i] = cpu_to_le16(chanspec);
910 911
		}
	} else {
912
		brcmf_dbg(SCAN, "Scanning all channels\n");
913 914
	}
	/* Copy ssid array if applicable */
915
	brcmf_dbg(SCAN, "### List of SSIDs to scan ### %d\n", n_ssids);
916 917 918 919 920 921
	if (n_ssids > 0) {
		offset = offsetof(struct brcmf_scan_params_le, channel_list) +
				n_channels * sizeof(u16);
		offset = roundup(offset, sizeof(u32));
		ptr = (char *)params_le + offset;
		for (i = 0; i < n_ssids; i++) {
922 923 924 925 926 927
			memset(&ssid_le, 0, sizeof(ssid_le));
			ssid_le.SSID_len =
					cpu_to_le32(request->ssids[i].ssid_len);
			memcpy(ssid_le.SSID, request->ssids[i].ssid,
			       request->ssids[i].ssid_len);
			if (!ssid_le.SSID_len)
928
				brcmf_dbg(SCAN, "%d: Broadcast scan\n", i);
929
			else
930 931
				brcmf_dbg(SCAN, "%d: scan for  %s size =%d\n",
					  i, ssid_le.SSID, ssid_le.SSID_len);
932 933
			memcpy(ptr, &ssid_le, sizeof(ssid_le));
			ptr += sizeof(ssid_le);
934 935
		}
	} else {
936
		brcmf_dbg(SCAN, "Broadcast scan %p\n", request->ssids);
937
		if ((request->ssids) && request->ssids->ssid_len) {
938 939 940
			brcmf_dbg(SCAN, "SSID %s len=%d\n",
				  params_le->ssid_le.SSID,
				  request->ssids->ssid_len);
941 942 943 944 945 946 947 948 949 950 951 952 953
			params_le->ssid_le.SSID_len =
				cpu_to_le32(request->ssids->ssid_len);
			memcpy(&params_le->ssid_le.SSID, request->ssids->ssid,
				request->ssids->ssid_len);
		}
	}
	/* Adding mask to channel numbers */
	params_le->channel_num =
		cpu_to_le32((n_ssids << BRCMF_SCAN_PARAMS_NSSID_SHIFT) |
			(n_channels & BRCMF_SCAN_PARAMS_COUNT_MASK));
}

static s32
954
brcmf_run_escan(struct brcmf_cfg80211_info *cfg, struct brcmf_if *ifp,
955
		struct cfg80211_scan_request *request)
956 957 958 959 960 961
{
	s32 params_size = BRCMF_SCAN_PARAMS_FIXED_SIZE +
			  offsetof(struct brcmf_escan_params_le, params_le);
	struct brcmf_escan_params_le *params;
	s32 err = 0;

962
	brcmf_dbg(SCAN, "E-SCAN START\n");
963 964 965 966 967 968

	if (request != NULL) {
		/* Allocate space for populating ssids in struct */
		params_size += sizeof(u32) * ((request->n_channels + 1) / 2);

		/* Allocate space for populating ssids in struct */
969
		params_size += sizeof(struct brcmf_ssid_le) * request->n_ssids;
970 971 972 973 974 975 976 977
	}

	params = kzalloc(params_size, GFP_KERNEL);
	if (!params) {
		err = -ENOMEM;
		goto exit;
	}
	BUG_ON(params_size + sizeof("escan") >= BRCMF_DCMD_MEDLEN);
978
	brcmf_escan_prep(cfg, &params->params_le, request);
979
	params->version = cpu_to_le32(BRCMF_ESCAN_REQ_VERSION);
980
	params->action = cpu_to_le16(WL_ESCAN_ACTION_START);
981 982
	params->sync_id = cpu_to_le16(0x1234);

983
	err = brcmf_fil_iovar_data_set(ifp, "escan", params, params_size);
984 985
	if (err) {
		if (err == -EBUSY)
986
			brcmf_dbg(INFO, "system busy : escan canceled\n");
987
		else
988
			brcmf_err("error (%d)\n", err);
989 990 991 992 993 994 995 996
	}

	kfree(params);
exit:
	return err;
}

static s32
997
brcmf_do_escan(struct brcmf_cfg80211_info *cfg, struct wiphy *wiphy,
998
	       struct brcmf_if *ifp, struct cfg80211_scan_request *request)
999 1000
{
	s32 err;
1001
	u32 passive_scan;
1002
	struct brcmf_scan_results *results;
1003
	struct escan_info *escan = &cfg->escan_info;
1004

1005
	brcmf_dbg(SCAN, "Enter\n");
1006
	escan->ifp = ifp;
1007 1008
	escan->wiphy = wiphy;
	escan->escan_state = WL_ESCAN_STATE_SCANNING;
1009
	passive_scan = cfg->active_scan ? 0 : 1;
1010
	err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_PASSIVE_SCAN,
1011
				    passive_scan);
1012
	if (err) {
1013
		brcmf_err("error (%d)\n", err);
1014 1015
		return err;
	}
1016
	brcmf_scan_config_mpc(ifp, 0);
1017
	results = (struct brcmf_scan_results *)cfg->escan_info.escan_buf;
1018 1019 1020 1021
	results->version = 0;
	results->count = 0;
	results->buflen = WL_ESCAN_RESULTS_FIXED_SIZE;

1022
	err = escan->run(cfg, ifp, request);
1023
	if (err)
1024
		brcmf_scan_config_mpc(ifp, 1);
1025 1026 1027 1028
	return err;
}

static s32
1029
brcmf_cfg80211_escan(struct wiphy *wiphy, struct brcmf_cfg80211_vif *vif,
1030 1031 1032
		     struct cfg80211_scan_request *request,
		     struct cfg80211_ssid *this_ssid)
{
1033 1034
	struct brcmf_if *ifp = vif->ifp;
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
1035
	struct cfg80211_ssid *ssids;
1036
	u32 passive_scan;
1037 1038 1039
	bool escan_req;
	bool spec_scan;
	s32 err;
1040
	struct brcmf_ssid_le ssid_le;
1041 1042
	u32 SSID_len;

1043
	brcmf_dbg(SCAN, "START ESCAN\n");
1044

1045
	if (test_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status)) {
1046
		brcmf_err("Scanning already: status (%lu)\n", cfg->scan_status);
1047 1048
		return -EAGAIN;
	}
1049
	if (test_bit(BRCMF_SCAN_STATUS_ABORT, &cfg->scan_status)) {
1050 1051
		brcmf_err("Scanning being aborted: status (%lu)\n",
			  cfg->scan_status);
1052 1053
		return -EAGAIN;
	}
1054 1055 1056 1057 1058
	if (test_bit(BRCMF_SCAN_STATUS_SUPPRESS, &cfg->scan_status)) {
		brcmf_err("Scanning suppressed: status (%lu)\n",
			  cfg->scan_status);
		return -EAGAIN;
	}
1059
	if (test_bit(BRCMF_VIF_STATUS_CONNECTING, &ifp->vif->sme_state)) {
1060
		brcmf_err("Connecting: status (%lu)\n", ifp->vif->sme_state);
1061 1062 1063
		return -EAGAIN;
	}

1064
	/* If scan req comes for p2p0, send it over primary I/F */
1065 1066
	if (vif == cfg->p2p.bss_idx[P2PAPI_BSSCFG_DEVICE].vif)
		vif = cfg->p2p.bss_idx[P2PAPI_BSSCFG_PRIMARY].vif;
1067

1068 1069 1070 1071 1072 1073 1074 1075 1076 1077 1078
	escan_req = false;
	if (request) {
		/* scan bss */
		ssids = request->ssids;
		escan_req = true;
	} else {
		/* scan in ibss */
		/* we don't do escan in ibss */
		ssids = this_ssid;
	}

1079
	cfg->scan_request = request;
1080
	set_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status);
1081
	if (escan_req) {
1082
		cfg->escan_info.run = brcmf_run_escan;
1083
		err = brcmf_p2p_scan_prep(wiphy, request, vif);
1084 1085 1086
		if (err)
			goto scan_out;

1087
		err = brcmf_do_escan(cfg, wiphy, vif->ifp, request);
1088
		if (err)
1089 1090
			goto scan_out;
	} else {
1091 1092
		brcmf_dbg(SCAN, "ssid \"%s\", ssid_len (%d)\n",
			  ssids->ssid, ssids->ssid_len);
1093 1094 1095
		memset(&ssid_le, 0, sizeof(ssid_le));
		SSID_len = min_t(u8, sizeof(ssid_le.SSID), ssids->ssid_len);
		ssid_le.SSID_len = cpu_to_le32(0);
1096 1097
		spec_scan = false;
		if (SSID_len) {
1098 1099
			memcpy(ssid_le.SSID, ssids->ssid, SSID_len);
			ssid_le.SSID_len = cpu_to_le32(SSID_len);
1100 1101
			spec_scan = true;
		} else
1102
			brcmf_dbg(SCAN, "Broadcast scan\n");
1103

1104
		passive_scan = cfg->active_scan ? 0 : 1;
1105
		err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_PASSIVE_SCAN,
1106
					    passive_scan);
1107
		if (err) {
1108
			brcmf_err("WLC_SET_PASSIVE_SCAN error (%d)\n", err);
1109 1110
			goto scan_out;
		}
1111
		brcmf_scan_config_mpc(ifp, 0);
1112 1113
		err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SCAN, &ssid_le,
					     sizeof(ssid_le));
1114 1115
		if (err) {
			if (err == -EBUSY)
1116
				brcmf_dbg(INFO, "BUSY: scan for \"%s\" canceled\n",
1117
					  ssid_le.SSID);
1118
			else
1119
				brcmf_err("WLC_SCAN error (%d)\n", err);
1120

1121
			brcmf_scan_config_mpc(ifp, 1);
1122 1123 1124 1125
			goto scan_out;
		}
	}

1126 1127
	/* Arm scan timeout timer */
	mod_timer(&cfg->escan_timeout, jiffies +
1128
			BRCMF_ESCAN_TIMER_INTERVAL_MS * HZ / 1000);
1129

1130 1131 1132
	return 0;

scan_out:
1133
	clear_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status);
1134
	cfg->scan_request = NULL;
1135 1136 1137
	return err;
}

1138
static s32
1139
brcmf_cfg80211_scan(struct wiphy *wiphy, struct cfg80211_scan_request *request)
1140
{
1141
	struct brcmf_cfg80211_vif *vif;
1142 1143
	s32 err = 0;

1144
	brcmf_dbg(TRACE, "Enter\n");
1145 1146
	vif = container_of(request->wdev, struct brcmf_cfg80211_vif, wdev);
	if (!check_vif_up(vif))
1147 1148
		return -EIO;

1149
	err = brcmf_cfg80211_escan(wiphy, vif, request, NULL);
1150

1151
	if (err)
1152
		brcmf_err("scan error (%d)\n", err);
1153

1154
	brcmf_dbg(TRACE, "Exit\n");
1155 1156 1157 1158 1159 1160 1161
	return err;
}

static s32 brcmf_set_rts(struct net_device *ndev, u32 rts_threshold)
{
	s32 err = 0;

1162 1163
	err = brcmf_fil_iovar_int_set(netdev_priv(ndev), "rtsthresh",
				      rts_threshold);
1164
	if (err)
1165
		brcmf_err("Error (%d)\n", err);
1166 1167 1168 1169 1170 1171 1172 1173

	return err;
}

static s32 brcmf_set_frag(struct net_device *ndev, u32 frag_threshold)
{
	s32 err = 0;

1174 1175
	err = brcmf_fil_iovar_int_set(netdev_priv(ndev), "fragthresh",
				      frag_threshold);
1176
	if (err)
1177
		brcmf_err("Error (%d)\n", err);
1178 1179 1180 1181 1182 1183 1184

	return err;
}

static s32 brcmf_set_retry(struct net_device *ndev, u32 retry, bool l)
{
	s32 err = 0;
Hante Meuleman's avatar
Hante Meuleman committed
1185
	u32 cmd = (l ? BRCMF_C_SET_LRL : BRCMF_C_SET_SRL);
1186

1187
	err = brcmf_fil_cmd_int_set(netdev_priv(ndev), cmd, retry);
1188
	if (err) {
1189
		brcmf_err("cmd (%d) , error (%d)\n", cmd, err);
1190 1191 1192 1193 1194 1195 1196
		return err;
	}
	return err;
}

static s32 brcmf_cfg80211_set_wiphy_params(struct wiphy *wiphy, u32 changed)
{
1197 1198
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
	struct net_device *ndev = cfg_to_ndev(cfg);
1199
	struct brcmf_if *ifp = netdev_priv(ndev);
1200 1201
	s32 err = 0;

1202
	brcmf_dbg(TRACE, "Enter\n");
1203
	if (!check_vif_up(ifp->vif))
1204 1205 1206
		return -EIO;

	if (changed & WIPHY_PARAM_RTS_THRESHOLD &&
1207 1208 1209
	    (cfg->conf->rts_threshold != wiphy->rts_threshold)) {
		cfg->conf->rts_threshold = wiphy->rts_threshold;
		err = brcmf_set_rts(ndev, cfg->conf->rts_threshold);
1210 1211 1212 1213
		if (!err)
			goto done;
	}
	if (changed & WIPHY_PARAM_FRAG_THRESHOLD &&
1214 1215 1216
	    (cfg->conf->frag_threshold != wiphy->frag_threshold)) {
		cfg->conf->frag_threshold = wiphy->frag_threshold;
		err = brcmf_set_frag(ndev, cfg->conf->frag_threshold);
1217 1218 1219 1220
		if (!err)
			goto done;
	}
	if (changed & WIPHY_PARAM_RETRY_LONG
1221 1222 1223
	    && (cfg->conf->retry_long != wiphy->retry_long)) {
		cfg->conf->retry_long = wiphy->retry_long;
		err = brcmf_set_retry(ndev, cfg->conf->retry_long, true);
1224 1225 1226 1227
		if (!err)
			goto done;
	}
	if (changed & WIPHY_PARAM_RETRY_SHORT
1228 1229 1230
	    && (cfg->conf->retry_short != wiphy->retry_short)) {
		cfg->conf->retry_short = wiphy->retry_short;
		err = brcmf_set_retry(ndev, cfg->conf->retry_short, false);
1231 1232 1233 1234 1235
		if (!err)
			goto done;
	}

done:
1236
	brcmf_dbg(TRACE, "Exit\n");
1237 1238 1239 1240 1241 1242 1243 1244
	return err;
}

static void brcmf_init_prof(struct brcmf_cfg80211_profile *prof)
{
	memset(prof, 0, sizeof(*prof));
}

1245 1246 1247 1248 1249 1250 1251 1252 1253 1254 1255 1256 1257 1258 1259 1260 1261 1262 1263
static u16 brcmf_map_fw_linkdown_reason(const struct brcmf_event_msg *e)
{
	u16 reason;

	switch (e->event_code) {
	case BRCMF_E_DEAUTH:
	case BRCMF_E_DEAUTH_IND:
	case BRCMF_E_DISASSOC_IND:
		reason = e->reason;
		break;
	case BRCMF_E_LINK:
	default:
		reason = 0;
		break;
	}
	return reason;
}

static void brcmf_link_down(struct brcmf_cfg80211_vif *vif, u16 reason)
1264
{
1265
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(vif->wdev.wiphy);
1266 1267
	s32 err = 0;

1268
	brcmf_dbg(TRACE, "Enter\n");
1269

Hante Meuleman's avatar
Hante Meuleman committed
1270
	if (test_and_clear_bit(BRCMF_VIF_STATUS_CONNECTED, &vif->sme_state)) {
1271
		brcmf_dbg(INFO, "Call WLC_DISASSOC to stop excess roaming\n ");
1272
		err = brcmf_fil_cmd_data_set(vif->ifp,
1273
					     BRCMF_C_DISASSOC, NULL, 0);
1274
		if (err) {
1275
			brcmf_err("WLC_DISASSOC failed (%d)\n", err);
1276
		}
Hante Meuleman's avatar
Hante Meuleman committed
1277 1278 1279 1280
		if ((vif->wdev.iftype == NL80211_IFTYPE_STATION) ||
		    (vif->wdev.iftype == NL80211_IFTYPE_P2P_CLIENT))
			cfg80211_disconnected(vif->wdev.netdev, reason, NULL, 0,
					      true, GFP_KERNEL);
1281
	}
1282
	clear_bit(BRCMF_VIF_STATUS_CONNECTING, &vif->sme_state);
1283 1284
	clear_bit(BRCMF_SCAN_STATUS_SUPPRESS, &cfg->scan_status);
	brcmf_btcoex_set_mode(vif, BRCMF_BTCOEX_ENABLED, 0);
1285
	brcmf_dbg(TRACE, "Exit\n");
1286 1287 1288 1289 1290 1291
}

static s32
brcmf_cfg80211_join_ibss(struct wiphy *wiphy, struct net_device *ndev,
		      struct cfg80211_ibss_params *params)
{
1292
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
1293 1294
	struct brcmf_if *ifp = netdev_priv(ndev);
	struct brcmf_cfg80211_profile *profile = &ifp->vif->profile;
1295 1296 1297 1298 1299
	struct brcmf_join_params join_params;
	size_t join_params_size = 0;
	s32 err = 0;
	s32 wsec = 0;
	s32 bcnprd;
1300
	u16 chanspec;
1301
	u32 ssid_len;
1302

1303
	brcmf_dbg(TRACE, "Enter\n");
1304
	if (!check_vif_up(ifp->vif))
1305 1306 1307
		return -EIO;

	if (params->ssid)
1308
		brcmf_dbg(CONN, "SSID: %s\n", params->ssid);
1309
	else {
1310
		brcmf_dbg(CONN, "SSID: NULL, Not supported\n");
1311 1312 1313
		return -EOPNOTSUPP;
	}

1314
	set_bit(BRCMF_VIF_STATUS_CONNECTING, &ifp->vif->sme_state);
1315 1316

	if (params->bssid)
1317
		brcmf_dbg(CONN, "BSSID: %pM\n", params->bssid);
1318
	else
1319
		brcmf_dbg(CONN, "No BSSID specified\n");
1320

1321
	if (params->chandef.chan)
1322 1323
		brcmf_dbg(CONN, "channel: %d\n",
			  params->chandef.chan->center_freq);
1324
	else
1325
		brcmf_dbg(CONN, "no channel specified\n");
1326 1327

	if (params->channel_fixed)
1328
		brcmf_dbg(CONN, "fixed channel required\n");
1329
	else
1330
		brcmf_dbg(CONN, "no fixed channel required\n");
1331 1332

	if (params->ie && params->ie_len)
1333
		brcmf_dbg(CONN, "ie len: %d\n", params->ie_len);
1334
	else
1335
		brcmf_dbg(CONN, "no ie specified\n");
1336 1337

	if (params->beacon_interval)
1338 1339
		brcmf_dbg(CONN, "beacon interval: %d\n",
			  params->beacon_interval);
1340
	else
1341
		brcmf_dbg(CONN, "no beacon interval specified\n");
1342 1343

	if (params->basic_rates)
1344
		brcmf_dbg(CONN, "basic rates: %08X\n", params->basic_rates);
1345
	else
1346
		brcmf_dbg(CONN, "no basic rates specified\n");
1347 1348

	if (params->privacy)
1349
		brcmf_dbg(CONN, "privacy required\n");
1350
	else
1351
		brcmf_dbg(CONN, "no privacy required\n");
1352 1353 1354 1355 1356

	/* Configure Privacy for starter */
	if (params->privacy)
		wsec |= WEP_ENABLED;

1357
	err = brcmf_fil_iovar_int_set(ifp, "wsec", wsec);
1358
	if (err) {
1359
		brcmf_err("wsec failed (%d)\n", err);
1360 1361 1362 1363 1364 1365 1366 1367 1368
		goto done;
	}

	/* Configure Beacon Interval for starter */
	if (params->beacon_interval)
		bcnprd = params->beacon_interval;
	else
		bcnprd = 100;

Hante Meuleman's avatar
Hante Meuleman committed
1369
	err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_BCNPRD, bcnprd);
1370
	if (err) {
1371
		brcmf_err("WLC_SET_BCNPRD failed (%d)\n", err);
1372 1373 1374 1375 1376 1377 1378
		goto done;
	}

	/* Configure required join parameter */
	memset(&join_params, 0, sizeof(struct brcmf_join_params));

	/* SSID */
1379 1380 1381
	ssid_len = min_t(u32, params->ssid_len, IEEE80211_MAX_SSID_LEN);
	memcpy(join_params.ssid_le.SSID, params->ssid, ssid_len);
	join_params.ssid_le.SSID_len = cpu_to_le32(ssid_len);
1382 1383 1384 1385 1386
	join_params_size = sizeof(join_params.ssid_le);

	/* BSSID */
	if (params->bssid) {
		memcpy(join_params.params_le.bssid, params->bssid, ETH_ALEN);
1387
		join_params_size += BRCMF_ASSOC_PARAMS_FIXED_SIZE;
1388
		memcpy(profile->bssid, params->bssid, ETH_ALEN);
1389
	} else {
1390 1391
		eth_broadcast_addr(join_params.params_le.bssid);
		eth_zero_addr(profile->bssid);
1392 1393 1394
	}

	/* Channel */
1395
	if (params->chandef.chan) {
1396 1397
		u32 target_channel;

1398
		cfg->channel =
1399
			ieee80211_frequency_to_channel(
1400
				params->chandef.chan->center_freq);
1401 1402
		if (params->channel_fixed) {
			/* adding chanspec */
1403 1404
			chanspec = chandef_to_chanspec(&cfg->d11inf,
						       &params->chandef);
1405 1406 1407 1408
			join_params.params_le.chanspec_list[0] =
				cpu_to_le16(chanspec);
			join_params.params_le.chanspec_num = cpu_to_le32(1);
			join_params_size += sizeof(join_params.params_le);
1409 1410 1411
		}

		/* set channel for starter */
1412
		target_channel = cfg->channel;
Hante Meuleman's avatar
Hante Meuleman committed
1413
		err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_CHANNEL,
1414
					    target_channel);
1415
		if (err) {
1416
			brcmf_err("WLC_SET_CHANNEL failed (%d)\n", err);
1417 1418 1419
			goto done;
		}
	} else
1420
		cfg->channel = 0;
1421

1422
	cfg->ibss_starter = false;
1423 1424


1425
	err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_SSID,
1426
				     &join_params, join_params_size);
1427
	if (err) {
1428
		brcmf_err("WLC_SET_SSID failed (%d)\n", err);
1429 1430 1431 1432 1433
		goto done;
	}

done:
	if (err)
1434
		clear_bit(BRCMF_VIF_STATUS_CONNECTING, &ifp->vif->sme_state);
1435
	brcmf_dbg(TRACE, "Exit\n");
1436 1437 1438 1439 1440 1441
	return err;
}

static s32
brcmf_cfg80211_leave_ibss(struct wiphy *wiphy, struct net_device *ndev)
{
1442
	struct brcmf_if *ifp = netdev_priv(ndev);
1443

1444
	brcmf_dbg(TRACE, "Enter\n");
1445 1446 1447 1448 1449 1450 1451
	if (!check_vif_up(ifp->vif)) {
		/* When driver is being unloaded, it can end up here. If an
		 * error is returned then later on a debug trace in the wireless
		 * core module will be printed. To avoid this 0 is returned.
		 */
		return 0;
	}
1452

1453
	brcmf_link_down(ifp->vif, WLAN_REASON_DEAUTH_LEAVING);
1454
	brcmf_net_setcarrier(ifp, false);
1455

1456
	brcmf_dbg(TRACE, "Exit\n");
1457

1458
	return 0;
1459 1460 1461 1462 1463
}

static s32 brcmf_set_wpa_version(struct net_device *ndev,
				 struct cfg80211_connect_params *sme)
{
1464
	struct brcmf_cfg80211_profile *profile = ndev_to_prof(ndev);
1465 1466 1467 1468 1469 1470 1471 1472 1473 1474
	struct brcmf_cfg80211_security *sec;
	s32 val = 0;
	s32 err = 0;

	if (sme->crypto.wpa_versions & NL80211_WPA_VERSION_1)
		val = WPA_AUTH_PSK | WPA_AUTH_UNSPECIFIED;
	else if (sme->crypto.wpa_versions & NL80211_WPA_VERSION_2)
		val = WPA2_AUTH_PSK | WPA2_AUTH_UNSPECIFIED;
	else
		val = WPA_AUTH_DISABLED;
1475
	brcmf_dbg(CONN, "setting wpa_auth to 0x%0x\n", val);
1476
	err = brcmf_fil_bsscfg_int_set(netdev_priv(ndev), "wpa_auth", val);
1477
	if (err) {
1478
		brcmf_err("set wpa_auth failed (%d)\n", err);
1479 1480
		return err;
	}
1481
	sec = &profile->sec;
1482 1483 1484 1485 1486 1487 1488
	sec->wpa_versions = sme->crypto.wpa_versions;
	return err;
}

static s32 brcmf_set_auth_type(struct net_device *ndev,
			       struct cfg80211_connect_params *sme)
{
1489
	struct brcmf_cfg80211_profile *profile = ndev_to_prof(ndev);
1490 1491 1492 1493 1494 1495 1496
	struct brcmf_cfg80211_security *sec;
	s32 val = 0;
	s32 err = 0;

	switch (sme->auth_type) {
	case NL80211_AUTHTYPE_OPEN_SYSTEM:
		val = 0;
1497
		brcmf_dbg(CONN, "open system\n");
1498 1499 1500
		break;
	case NL80211_AUTHTYPE_SHARED_KEY:
		val = 1;
1501
		brcmf_dbg(CONN, "shared key\n");
1502 1503 1504
		break;
	case NL80211_AUTHTYPE_AUTOMATIC:
		val = 2;
1505
		brcmf_dbg(CONN, "automatic\n");
1506 1507
		break;
	case NL80211_AUTHTYPE_NETWORK_EAP:
1508
		brcmf_dbg(CONN, "network eap\n");
1509 1510
	default:
		val = 2;
1511
		brcmf_err("invalid auth type (%d)\n", sme->auth_type);
1512 1513 1514
		break;
	}

1515
	err = brcmf_fil_bsscfg_int_set(netdev_priv(ndev), "auth", val);
1516
	if (err) {
1517
		brcmf_err("set auth failed (%d)\n", err);
1518 1519
		return err;
	}
1520
	sec = &profile->sec;
1521 1522 1523 1524 1525
	sec->auth_type = sme->auth_type;
	return err;
}

static s32
1526 1527
brcmf_set_wsec_mode(struct net_device *ndev,
		     struct cfg80211_connect_params *sme, bool mfp)
1528
{
1529
	struct brcmf_cfg80211_profile *profile = ndev_to_prof(ndev);
1530 1531 1532
	struct brcmf_cfg80211_security *sec;
	s32 pval = 0;
	s32 gval = 0;
1533
	s32 wsec;
1534 1535 1536 1537 1538 1539 1540 1541 1542 1543 1544 1545 1546 1547 1548 1549 1550 1551
	s32 err = 0;

	if (sme->crypto.n_ciphers_pairwise) {
		switch (sme->crypto.ciphers_pairwise[0]) {
		case WLAN_CIPHER_SUITE_WEP40:
		case WLAN_CIPHER_SUITE_WEP104:
			pval = WEP_ENABLED;
			break;
		case WLAN_CIPHER_SUITE_TKIP:
			pval = TKIP_ENABLED;
			break;
		case WLAN_CIPHER_SUITE_CCMP:
			pval = AES_ENABLED;
			break;
		case WLAN_CIPHER_SUITE_AES_CMAC:
			pval = AES_ENABLED;
			break;
		default:
1552 1553
			brcmf_err("invalid cipher pairwise (%d)\n",
				  sme->crypto.ciphers_pairwise[0]);
1554 1555 1556 1557 1558 1559 1560 1561 1562 1563 1564 1565 1566 1567 1568 1569 1570 1571 1572
			return -EINVAL;
		}
	}
	if (sme->crypto.cipher_group) {
		switch (sme->crypto.cipher_group) {
		case WLAN_CIPHER_SUITE_WEP40:
		case WLAN_CIPHER_SUITE_WEP104:
			gval = WEP_ENABLED;
			break;
		case WLAN_CIPHER_SUITE_TKIP:
			gval = TKIP_ENABLED;
			break;
		case WLAN_CIPHER_SUITE_CCMP:
			gval = AES_ENABLED;
			break;
		case WLAN_CIPHER_SUITE_AES_CMAC:
			gval = AES_ENABLED;
			break;
		default:
1573 1574
			brcmf_err("invalid cipher group (%d)\n",
				  sme->crypto.cipher_group);
1575 1576 1577 1578
			return -EINVAL;
		}
	}

1579
	brcmf_dbg(CONN, "pval (%d) gval (%d)\n", pval, gval);
1580 1581 1582 1583 1584
	/* In case of privacy, but no security and WPS then simulate */
	/* setting AES. WPS-2.0 allows no security                   */
	if (brcmf_find_wpsie(sme->ie, sme->ie_len) && !pval && !gval &&
	    sme->privacy)
		pval = AES_ENABLED;
1585 1586 1587 1588 1589 1590

	if (mfp)
		wsec = pval | gval | MFP_CAPABLE;
	else
		wsec = pval | gval;
	err = brcmf_fil_bsscfg_int_set(netdev_priv(ndev), "wsec", wsec);
1591
	if (err) {
1592
		brcmf_err("error (%d)\n", err);
1593 1594 1595
		return err;
	}

1596
	sec = &profile->sec;
1597 1598 1599 1600 1601 1602 1603 1604 1605
	sec->cipher_pairwise = sme->crypto.ciphers_pairwise[0];
	sec->cipher_group = sme->crypto.cipher_group;

	return err;
}

static s32
brcmf_set_key_mgmt(struct net_device *ndev, struct cfg80211_connect_params *sme)
{
1606
	struct brcmf_cfg80211_profile *profile = ndev_to_prof(ndev);
1607 1608 1609 1610 1611
	struct brcmf_cfg80211_security *sec;
	s32 val = 0;
	s32 err = 0;

	if (sme->crypto.n_akm_suites) {
1612 1613
		err = brcmf_fil_bsscfg_int_get(netdev_priv(ndev),
					       "wpa_auth", &val);
1614
		if (err) {
1615
			brcmf_err("could not get wpa_auth (%d)\n", err);
1616 1617 1618 1619 1620 1621 1622 1623 1624 1625 1626
			return err;
		}
		if (val & (WPA_AUTH_PSK | WPA_AUTH_UNSPECIFIED)) {
			switch (sme->crypto.akm_suites[0]) {
			case WLAN_AKM_SUITE_8021X:
				val = WPA_AUTH_UNSPECIFIED;
				break;
			case WLAN_AKM_SUITE_PSK:
				val = WPA_AUTH_PSK;
				break;
			default:
1627 1628
				brcmf_err("invalid cipher group (%d)\n",
					  sme->crypto.cipher_group);
1629 1630 1631 1632 1633 1634 1635 1636 1637 1638 1639
				return -EINVAL;
			}
		} else if (val & (WPA2_AUTH_PSK | WPA2_AUTH_UNSPECIFIED)) {
			switch (sme->crypto.akm_suites[0]) {
			case WLAN_AKM_SUITE_8021X:
				val = WPA2_AUTH_UNSPECIFIED;
				break;
			case WLAN_AKM_SUITE_PSK:
				val = WPA2_AUTH_PSK;
				break;
			default:
1640 1641
				brcmf_err("invalid cipher group (%d)\n",
					  sme->crypto.cipher_group);
1642 1643 1644 1645
				return -EINVAL;
			}
		}

1646
		brcmf_dbg(CONN, "setting wpa_auth to %d\n", val);
1647 1648
		err = brcmf_fil_bsscfg_int_set(netdev_priv(ndev),
					       "wpa_auth", val);
1649
		if (err) {
1650
			brcmf_err("could not set wpa_auth (%d)\n", err);
1651 1652 1653
			return err;
		}
	}
1654
	sec = &profile->sec;
1655 1656 1657 1658 1659 1660
	sec->wpa_auth = sme->crypto.akm_suites[0];

	return err;
}

static s32
1661 1662
brcmf_set_sharedkey(struct net_device *ndev,
		    struct cfg80211_connect_params *sme)
1663
{
1664
	struct brcmf_cfg80211_profile *profile = ndev_to_prof(ndev);
1665 1666 1667 1668 1669
	struct brcmf_cfg80211_security *sec;
	struct brcmf_wsec_key key;
	s32 val;
	s32 err = 0;

1670
	brcmf_dbg(CONN, "key len (%d)\n", sme->key_len);
1671

1672 1673 1674
	if (sme->key_len == 0)
		return 0;

1675
	sec = &profile->sec;
1676 1677
	brcmf_dbg(CONN, "wpa_versions 0x%x cipher_pairwise 0x%x\n",
		  sec->wpa_versions, sec->cipher_pairwise);
1678 1679 1680 1681

	if (sec->wpa_versions & (NL80211_WPA_VERSION_1 | NL80211_WPA_VERSION_2))
		return 0;

1682 1683 1684
	if (!(sec->cipher_pairwise &
	    (WLAN_CIPHER_SUITE_WEP40 | WLAN_CIPHER_SUITE_WEP104)))
		return 0;
1685

1686 1687 1688 1689
	memset(&key, 0, sizeof(key));
	key.len = (u32) sme->key_len;
	key.index = (u32) sme->key_idx;
	if (key.len > sizeof(key.data)) {
1690
		brcmf_err("Too long key length (%u)\n", key.len);
1691 1692 1693 1694 1695 1696 1697 1698 1699 1700 1701 1702
		return -EINVAL;
	}
	memcpy(key.data, sme->key, key.len);
	key.flags = BRCMF_PRIMARY_KEY;
	switch (sec->cipher_pairwise) {
	case WLAN_CIPHER_SUITE_WEP40:
		key.algo = CRYPTO_ALGO_WEP1;
		break;
	case WLAN_CIPHER_SUITE_WEP104:
		key.algo = CRYPTO_ALGO_WEP128;
		break;
	default:
1703 1704
		brcmf_err("Invalid algorithm (%d)\n",
			  sme->crypto.ciphers_pairwise[0]);
1705 1706 1707
		return -EINVAL;
	}
	/* Set the new key/index */
1708 1709 1710
	brcmf_dbg(CONN, "key length (%d) key index (%d) algo (%d)\n",
		  key.len, key.index, key.algo);
	brcmf_dbg(CONN, "key \"%s\"\n", key.data);
1711
	err = send_key_to_dongle(netdev_priv(ndev), &key);
1712 1713 1714 1715
	if (err)
		return err;

	if (sec->auth_type == NL80211_AUTHTYPE_SHARED_KEY) {
1716
		brcmf_dbg(CONN, "set auth_type to shared key\n");
1717
		val = WL_AUTH_SHARED_KEY;	/* shared key */
1718
		err = brcmf_fil_bsscfg_int_set(netdev_priv(ndev), "auth", val);
1719
		if (err)
1720
			brcmf_err("set auth failed (%d)\n", err);
1721 1722 1723 1724
	}
	return err;
}

1725 1726 1727 1728
static
enum nl80211_auth_type brcmf_war_auth_type(struct brcmf_if *ifp,
					   enum nl80211_auth_type type)
{
1729 1730 1731 1732
	if (type == NL80211_AUTHTYPE_AUTOMATIC &&
	    brcmf_feat_is_quirk_enabled(ifp, BRCMF_FEAT_QUIRK_AUTO_AUTH)) {
		brcmf_dbg(CONN, "WAR: use OPEN instead of AUTO\n");
		type = NL80211_AUTHTYPE_OPEN_SYSTEM;
1733 1734 1735 1736
	}
	return type;
}

1737 1738
static s32
brcmf_cfg80211_connect(struct wiphy *wiphy, struct net_device *ndev,
1739
		       struct cfg80211_connect_params *sme)
1740
{
1741
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
1742
	struct brcmf_if *ifp = netdev_priv(ndev);
1743 1744 1745
	struct ieee80211_channel *chan = sme->channel;
	struct brcmf_join_params join_params;
	size_t join_params_size;
1746 1747 1748
	const struct brcmf_tlv *rsn_ie;
	const struct brcmf_vs_tlv *wpa_ie;
	const void *ie;
1749 1750
	u32 ie_len;
	struct brcmf_ext_join_params_le *ext_join_params;
1751
	u16 chanspec;
1752
	s32 err = 0;
1753
	u32 ssid_len;
1754

1755
	brcmf_dbg(TRACE, "Enter\n");
1756
	if (!check_vif_up(ifp->vif))
1757 1758 1759
		return -EIO;

	if (!sme->ssid) {
1760
		brcmf_err("Invalid ssid\n");
1761 1762 1763
		return -EOPNOTSUPP;
	}

1764 1765 1766 1767 1768 1769 1770 1771 1772 1773 1774
	if (ifp->vif == cfg->p2p.bss_idx[P2PAPI_BSSCFG_PRIMARY].vif) {
		/* A normal (non P2P) connection request setup. */
		ie = NULL;
		ie_len = 0;
		/* find the WPA_IE */
		wpa_ie = brcmf_find_wpaie((u8 *)sme->ie, sme->ie_len);
		if (wpa_ie) {
			ie = wpa_ie;
			ie_len = wpa_ie->len + TLV_HDR_LEN;
		} else {
			/* find the RSN_IE */
1775 1776
			rsn_ie = brcmf_parse_tlvs((const u8 *)sme->ie,
						  sme->ie_len,
1777 1778 1779 1780 1781 1782 1783 1784 1785 1786 1787 1788 1789 1790 1791 1792
						  WLAN_EID_RSN);
			if (rsn_ie) {
				ie = rsn_ie;
				ie_len = rsn_ie->len + TLV_HDR_LEN;
			}
		}
		brcmf_fil_iovar_data_set(ifp, "wpaie", ie, ie_len);
	}

	err = brcmf_vif_set_mgmt_ie(ifp->vif, BRCMF_VNDR_IE_ASSOCREQ_FLAG,
				    sme->ie, sme->ie_len);
	if (err)
		brcmf_err("Set Assoc REQ IE Failed\n");
	else
		brcmf_dbg(TRACE, "Applied Vndr IEs for Assoc request\n");

1793
	set_bit(BRCMF_VIF_STATUS_CONNECTING, &ifp->vif->sme_state);
1794 1795

	if (chan) {
1796
		cfg->channel =
1797
			ieee80211_frequency_to_channel(chan->center_freq);
1798
		chanspec = channel_to_chanspec(&cfg->d11inf, chan);
1799 1800 1801
		brcmf_dbg(CONN, "channel=%d, center_req=%d, chanspec=0x%04x\n",
			  cfg->channel, chan->center_freq, chanspec);
	} else {
1802
		cfg->channel = 0;
1803 1804
		chanspec = 0;
	}
1805

1806
	brcmf_dbg(INFO, "ie (%p), ie_len (%zd)\n", sme->ie, sme->ie_len);
1807 1808 1809

	err = brcmf_set_wpa_version(ndev, sme);
	if (err) {
1810
		brcmf_err("wl_set_wpa_version failed (%d)\n", err);
1811 1812 1813
		goto done;
	}

1814
	sme->auth_type = brcmf_war_auth_type(ifp, sme->auth_type);
1815 1816
	err = brcmf_set_auth_type(ndev, sme);
	if (err) {
1817
		brcmf_err("wl_set_auth_type failed (%d)\n", err);
1818 1819 1820
		goto done;
	}

1821
	err = brcmf_set_wsec_mode(ndev, sme, sme->mfp == NL80211_MFP_REQUIRED);
1822
	if (err) {
1823
		brcmf_err("wl_set_set_cipher failed (%d)\n", err);
1824 1825 1826 1827 1828
		goto done;
	}

	err = brcmf_set_key_mgmt(ndev, sme);
	if (err) {
1829
		brcmf_err("wl_set_key_mgmt failed (%d)\n", err);
1830 1831 1832
		goto done;
	}

1833
	err = brcmf_set_sharedkey(ndev, sme);
1834
	if (err) {
1835
		brcmf_err("brcmf_set_sharedkey failed (%d)\n", err);
1836 1837 1838
		goto done;
	}

1839 1840 1841 1842 1843 1844 1845 1846 1847 1848 1849 1850
	/* Join with specific BSSID and cached SSID
	 * If SSID is zero join based on BSSID only
	 */
	join_params_size = offsetof(struct brcmf_ext_join_params_le, assoc_le) +
		offsetof(struct brcmf_assoc_params_le, chanspec_list);
	if (cfg->channel)
		join_params_size += sizeof(u16);
	ext_join_params = kzalloc(join_params_size, GFP_KERNEL);
	if (ext_join_params == NULL) {
		err = -ENOMEM;
		goto done;
	}
1851 1852 1853 1854 1855 1856
	ssid_len = min_t(u32, sme->ssid_len, IEEE80211_MAX_SSID_LEN);
	ext_join_params->ssid_le.SSID_len = cpu_to_le32(ssid_len);
	memcpy(&ext_join_params->ssid_le.SSID, sme->ssid, ssid_len);
	if (ssid_len < IEEE80211_MAX_SSID_LEN)
		brcmf_dbg(CONN, "SSID \"%s\", len (%d)\n",
			  ext_join_params->ssid_le.SSID, ssid_len);
1857

1858 1859 1860 1861 1862 1863 1864
	/* Set up join scan parameters */
	ext_join_params->scan_le.scan_type = -1;
	ext_join_params->scan_le.home_time = cpu_to_le32(-1);

	if (sme->bssid)
		memcpy(&ext_join_params->assoc_le.bssid, sme->bssid, ETH_ALEN);
	else
1865
		eth_broadcast_addr(ext_join_params->assoc_le.bssid);
1866 1867 1868 1869 1870 1871

	if (cfg->channel) {
		ext_join_params->assoc_le.chanspec_num = cpu_to_le32(1);

		ext_join_params->assoc_le.chanspec_list[0] =
			cpu_to_le16(chanspec);
1872 1873 1874 1875 1876 1877 1878 1879 1880 1881 1882 1883 1884 1885 1886 1887 1888 1889 1890
		/* Increase dwell time to receive probe response or detect
		 * beacon from target AP at a noisy air only during connect
		 * command.
		 */
		ext_join_params->scan_le.active_time =
			cpu_to_le32(BRCMF_SCAN_JOIN_ACTIVE_DWELL_TIME_MS);
		ext_join_params->scan_le.passive_time =
			cpu_to_le32(BRCMF_SCAN_JOIN_PASSIVE_DWELL_TIME_MS);
		/* To sync with presence period of VSDB GO send probe request
		 * more frequently. Probe request will be stopped when it gets
		 * probe response from target AP/GO.
		 */
		ext_join_params->scan_le.nprobes =
			cpu_to_le32(BRCMF_SCAN_JOIN_ACTIVE_DWELL_TIME_MS /
				    BRCMF_SCAN_JOIN_PROBE_INTERVAL_MS);
	} else {
		ext_join_params->scan_le.active_time = cpu_to_le32(-1);
		ext_join_params->scan_le.passive_time = cpu_to_le32(-1);
		ext_join_params->scan_le.nprobes = cpu_to_le32(-1);
1891 1892 1893 1894 1895 1896 1897 1898 1899 1900
	}

	err  = brcmf_fil_bsscfg_data_set(ifp, "join", ext_join_params,
					 join_params_size);
	kfree(ext_join_params);
	if (!err)
		/* This is it. join command worked, we are done */
		goto done;

	/* join command failed, fallback to set ssid */
1901 1902 1903
	memset(&join_params, 0, sizeof(join_params));
	join_params_size = sizeof(join_params.ssid_le);

1904 1905
	memcpy(&join_params.ssid_le.SSID, sme->ssid, ssid_len);
	join_params.ssid_le.SSID_len = cpu_to_le32(ssid_len);
1906

1907 1908 1909
	if (sme->bssid)
		memcpy(join_params.params_le.bssid, sme->bssid, ETH_ALEN);
	else
1910
		eth_broadcast_addr(join_params.params_le.bssid);
1911

1912 1913 1914 1915 1916
	if (cfg->channel) {
		join_params.params_le.chanspec_list[0] = cpu_to_le16(chanspec);
		join_params.params_le.chanspec_num = cpu_to_le32(1);
		join_params_size += sizeof(join_params.params_le);
	}
1917
	err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_SSID,
1918
				     &join_params, join_params_size);
1919
	if (err)
1920
		brcmf_err("BRCMF_C_SET_SSID failed (%d)\n", err);
1921 1922 1923

done:
	if (err)
1924
		clear_bit(BRCMF_VIF_STATUS_CONNECTING, &ifp->vif->sme_state);
1925
	brcmf_dbg(TRACE, "Exit\n");
1926 1927 1928 1929 1930 1931 1932
	return err;
}

static s32
brcmf_cfg80211_disconnect(struct wiphy *wiphy, struct net_device *ndev,
		       u16 reason_code)
{
1933 1934
	struct brcmf_if *ifp = netdev_priv(ndev);
	struct brcmf_cfg80211_profile *profile = &ifp->vif->profile;
1935 1936 1937
	struct brcmf_scb_val_le scbval;
	s32 err = 0;

1938
	brcmf_dbg(TRACE, "Enter. Reason code = %d\n", reason_code);
1939
	if (!check_vif_up(ifp->vif))
1940 1941
		return -EIO;

1942
	clear_bit(BRCMF_VIF_STATUS_CONNECTED, &ifp->vif->sme_state);
1943
	clear_bit(BRCMF_VIF_STATUS_CONNECTING, &ifp->vif->sme_state);
1944
	cfg80211_disconnected(ndev, reason_code, NULL, 0, true, GFP_KERNEL);
1945

1946
	memcpy(&scbval.ea, &profile->bssid, ETH_ALEN);
1947
	scbval.val = cpu_to_le32(reason_code);
1948
	err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_DISASSOC,
1949
				     &scbval, sizeof(scbval));
1950
	if (err)
1951
		brcmf_err("error (%d)\n", err);
1952

1953
	brcmf_dbg(TRACE, "Exit\n");
1954 1955 1956 1957
	return err;
}

static s32
1958
brcmf_cfg80211_set_tx_power(struct wiphy *wiphy, struct wireless_dev *wdev,
1959
			    enum nl80211_tx_power_setting type, s32 mbm)
1960
{
1961
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
1962 1963
	struct net_device *ndev = cfg_to_ndev(cfg);
	struct brcmf_if *ifp = netdev_priv(ndev);
1964 1965 1966
	s32 err;
	s32 disable;
	u32 qdbm = 127;
1967

1968
	brcmf_dbg(TRACE, "Enter %d %d\n", type, mbm);
1969
	if (!check_vif_up(ifp->vif))
1970 1971 1972 1973 1974 1975 1976
		return -EIO;

	switch (type) {
	case NL80211_TX_POWER_AUTOMATIC:
		break;
	case NL80211_TX_POWER_LIMITED:
	case NL80211_TX_POWER_FIXED:
1977
		if (mbm < 0) {
1978
			brcmf_err("TX_POWER_FIXED - dbm is negative\n");
1979 1980 1981
			err = -EINVAL;
			goto done;
		}
1982 1983 1984 1985
		qdbm =  MBM_TO_DBM(4 * mbm);
		if (qdbm > 127)
			qdbm = 127;
		qdbm |= WL_TXPWR_OVERRIDE;
1986
		break;
1987 1988 1989 1990
	default:
		brcmf_err("Unsupported type %d\n", type);
		err = -EINVAL;
		goto done;
1991 1992 1993
	}
	/* Make sure radio is off or on as far as software is concerned */
	disable = WL_RADIO_SW_DISABLE << 16;
1994
	err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_RADIO, disable);
1995
	if (err)
1996
		brcmf_err("WLC_SET_RADIO error (%d)\n", err);
1997

1998
	err = brcmf_fil_iovar_int_set(ifp, "qtxpower", qdbm);
1999
	if (err)
2000
		brcmf_err("qtxpower error (%d)\n", err);
2001 2002

done:
2003
	brcmf_dbg(TRACE, "Exit %d (qdbm)\n", qdbm & ~WL_TXPWR_OVERRIDE);
2004 2005 2006
	return err;
}

2007 2008 2009
static s32
brcmf_cfg80211_get_tx_power(struct wiphy *wiphy, struct wireless_dev *wdev,
			    s32 *dbm)
2010
{
2011
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
2012 2013 2014 2015
	struct net_device *ndev = cfg_to_ndev(cfg);
	struct brcmf_if *ifp = netdev_priv(ndev);
	s32 qdbm = 0;
	s32 err;
2016

2017
	brcmf_dbg(TRACE, "Enter\n");
2018
	if (!check_vif_up(ifp->vif))
2019 2020
		return -EIO;

2021
	err = brcmf_fil_iovar_int_get(ifp, "qtxpower", &qdbm);
2022
	if (err) {
2023
		brcmf_err("error (%d)\n", err);
2024 2025
		goto done;
	}
2026
	*dbm = (qdbm & ~WL_TXPWR_OVERRIDE) / 4;
2027 2028

done:
2029
	brcmf_dbg(TRACE, "Exit (0x%x %d)\n", qdbm, *dbm);
2030 2031 2032 2033 2034
	return err;
}

static s32
brcmf_cfg80211_config_default_key(struct wiphy *wiphy, struct net_device *ndev,
2035
				  u8 key_idx, bool unicast, bool multicast)
2036
{
2037
	struct brcmf_if *ifp = netdev_priv(ndev);
2038 2039 2040 2041
	u32 index;
	u32 wsec;
	s32 err = 0;

2042
	brcmf_dbg(TRACE, "Enter\n");
2043
	brcmf_dbg(CONN, "key index (%d)\n", key_idx);
2044
	if (!check_vif_up(ifp->vif))
2045 2046
		return -EIO;

2047
	err = brcmf_fil_bsscfg_int_get(ifp, "wsec", &wsec);
2048
	if (err) {
2049
		brcmf_err("WLC_GET_WSEC error (%d)\n", err);
2050 2051 2052 2053 2054 2055
		goto done;
	}

	if (wsec & WEP_ENABLED) {
		/* Just select a new current key */
		index = key_idx;
2056
		err = brcmf_fil_cmd_int_set(ifp,
2057
					    BRCMF_C_SET_KEY_PRIMARY, index);
2058
		if (err)
2059
			brcmf_err("error (%d)\n", err);
2060 2061
	}
done:
2062
	brcmf_dbg(TRACE, "Exit\n");
2063 2064 2065 2066 2067 2068 2069
	return err;
}

static s32
brcmf_add_keyext(struct wiphy *wiphy, struct net_device *ndev,
	      u8 key_idx, const u8 *mac_addr, struct key_params *params)
{
2070
	struct brcmf_if *ifp = netdev_priv(ndev);
2071 2072
	struct brcmf_wsec_key key;
	s32 err = 0;
2073
	u8 keybuf[8];
2074 2075 2076 2077 2078 2079 2080 2081 2082 2083 2084

	memset(&key, 0, sizeof(key));
	key.index = (u32) key_idx;
	/* Instead of bcast for ea address for default wep keys,
		 driver needs it to be Null */
	if (!is_multicast_ether_addr(mac_addr))
		memcpy((char *)&key.ea, (void *)mac_addr, ETH_ALEN);
	key.len = (u32) params->key_len;
	/* check for key index change */
	if (key.len == 0) {
		/* key delete */
2085
		err = send_key_to_dongle(ifp, &key);
2086
		if (err)
2087
			brcmf_err("key delete error (%d)\n", err);
2088 2089
	} else {
		if (key.len > sizeof(key.data)) {
2090
			brcmf_err("Invalid key length (%d)\n", key.len);
2091 2092 2093
			return -EINVAL;
		}

2094
		brcmf_dbg(CONN, "Setting the key index %d\n", key.index);
2095 2096
		memcpy(key.data, params->key, key.len);

2097
		if (!brcmf_is_apmode(ifp->vif) &&
2098 2099
		    (params->cipher == WLAN_CIPHER_SUITE_TKIP)) {
			brcmf_dbg(CONN, "Swapping RX/TX MIC key\n");
2100 2101 2102 2103 2104 2105 2106 2107 2108 2109 2110 2111 2112 2113 2114 2115 2116 2117 2118
			memcpy(keybuf, &key.data[24], sizeof(keybuf));
			memcpy(&key.data[24], &key.data[16], sizeof(keybuf));
			memcpy(&key.data[16], keybuf, sizeof(keybuf));
		}

		/* if IW_ENCODE_EXT_RX_SEQ_VALID set */
		if (params->seq && params->seq_len == 6) {
			/* rx iv */
			u8 *ivptr;
			ivptr = (u8 *) params->seq;
			key.rxiv.hi = (ivptr[5] << 24) | (ivptr[4] << 16) |
			    (ivptr[3] << 8) | ivptr[2];
			key.rxiv.lo = (ivptr[1] << 8) | ivptr[0];
			key.iv_initialized = true;
		}

		switch (params->cipher) {
		case WLAN_CIPHER_SUITE_WEP40:
			key.algo = CRYPTO_ALGO_WEP1;
2119
			brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_WEP40\n");
2120 2121 2122
			break;
		case WLAN_CIPHER_SUITE_WEP104:
			key.algo = CRYPTO_ALGO_WEP128;
2123
			brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_WEP104\n");
2124 2125 2126
			break;
		case WLAN_CIPHER_SUITE_TKIP:
			key.algo = CRYPTO_ALGO_TKIP;
2127
			brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_TKIP\n");
2128 2129 2130
			break;
		case WLAN_CIPHER_SUITE_AES_CMAC:
			key.algo = CRYPTO_ALGO_AES_CCM;
2131
			brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_AES_CMAC\n");
2132 2133 2134
			break;
		case WLAN_CIPHER_SUITE_CCMP:
			key.algo = CRYPTO_ALGO_AES_CCM;
2135
			brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_CCMP\n");
2136 2137
			break;
		default:
2138
			brcmf_err("Invalid cipher (0x%x)\n", params->cipher);
2139 2140
			return -EINVAL;
		}
2141
		err = send_key_to_dongle(ifp, &key);
2142
		if (err)
2143
			brcmf_err("wsec_key error (%d)\n", err);
2144 2145 2146 2147 2148 2149 2150 2151 2152
	}
	return err;
}

static s32
brcmf_cfg80211_add_key(struct wiphy *wiphy, struct net_device *ndev,
		    u8 key_idx, bool pairwise, const u8 *mac_addr,
		    struct key_params *params)
{
2153
	struct brcmf_if *ifp = netdev_priv(ndev);
2154
	struct brcmf_wsec_key *key;
2155 2156 2157 2158 2159
	s32 val;
	s32 wsec;
	s32 err = 0;
	u8 keybuf[8];

2160
	brcmf_dbg(TRACE, "Enter\n");
2161
	brcmf_dbg(CONN, "key index (%d)\n", key_idx);
2162
	if (!check_vif_up(ifp->vif))
2163 2164
		return -EIO;

2165 2166 2167 2168 2169 2170
	if (key_idx >= BRCMF_MAX_DEFAULT_KEYS) {
		/* we ignore this key index in this case */
		brcmf_err("invalid key index (%d)\n", key_idx);
		return -EINVAL;
	}

2171 2172 2173
	if (mac_addr &&
		(params->cipher != WLAN_CIPHER_SUITE_WEP40) &&
		(params->cipher != WLAN_CIPHER_SUITE_WEP104)) {
2174
		brcmf_dbg(TRACE, "Exit");
2175 2176 2177
		return brcmf_add_keyext(wiphy, ndev, key_idx, mac_addr, params);
	}

2178 2179
	key = &ifp->vif->profile.key[key_idx];
	memset(key, 0, sizeof(*key));
2180

2181 2182
	if (params->key_len > sizeof(key->data)) {
		brcmf_err("Too long key length (%u)\n", params->key_len);
2183 2184 2185
		err = -EINVAL;
		goto done;
	}
2186 2187
	key->len = params->key_len;
	key->index = key_idx;
2188

2189 2190 2191
	memcpy(key->data, params->key, key->len);

	key->flags = BRCMF_PRIMARY_KEY;
2192 2193
	switch (params->cipher) {
	case WLAN_CIPHER_SUITE_WEP40:
2194
		key->algo = CRYPTO_ALGO_WEP1;
2195
		val = WEP_ENABLED;
2196
		brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_WEP40\n");
2197 2198
		break;
	case WLAN_CIPHER_SUITE_WEP104:
2199
		key->algo = CRYPTO_ALGO_WEP128;
2200
		val = WEP_ENABLED;
2201
		brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_WEP104\n");
2202 2203
		break;
	case WLAN_CIPHER_SUITE_TKIP:
2204
		if (!brcmf_is_apmode(ifp->vif)) {
2205
			brcmf_dbg(CONN, "Swapping RX/TX MIC key\n");
2206 2207 2208
			memcpy(keybuf, &key->data[24], sizeof(keybuf));
			memcpy(&key->data[24], &key->data[16], sizeof(keybuf));
			memcpy(&key->data[16], keybuf, sizeof(keybuf));
2209
		}
2210
		key->algo = CRYPTO_ALGO_TKIP;
2211
		val = TKIP_ENABLED;
2212
		brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_TKIP\n");
2213 2214
		break;
	case WLAN_CIPHER_SUITE_AES_CMAC:
2215
		key->algo = CRYPTO_ALGO_AES_CCM;
2216
		val = AES_ENABLED;
2217
		brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_AES_CMAC\n");
2218 2219
		break;
	case WLAN_CIPHER_SUITE_CCMP:
2220
		key->algo = CRYPTO_ALGO_AES_CCM;
2221
		val = AES_ENABLED;
2222
		brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_CCMP\n");
2223 2224
		break;
	default:
2225
		brcmf_err("Invalid cipher (0x%x)\n", params->cipher);
2226 2227 2228 2229
		err = -EINVAL;
		goto done;
	}

2230
	err = send_key_to_dongle(ifp, key);
2231 2232 2233
	if (err)
		goto done;

2234
	err = brcmf_fil_bsscfg_int_get(ifp, "wsec", &wsec);
2235
	if (err) {
2236
		brcmf_err("get wsec error (%d)\n", err);
2237 2238 2239
		goto done;
	}
	wsec |= val;
2240
	err = brcmf_fil_bsscfg_int_set(ifp, "wsec", wsec);
2241
	if (err) {
2242
		brcmf_err("set wsec error (%d)\n", err);
2243 2244 2245 2246
		goto done;
	}

done:
2247
	brcmf_dbg(TRACE, "Exit\n");
2248 2249 2250 2251 2252 2253 2254
	return err;
}

static s32
brcmf_cfg80211_del_key(struct wiphy *wiphy, struct net_device *ndev,
		    u8 key_idx, bool pairwise, const u8 *mac_addr)
{
2255
	struct brcmf_if *ifp = netdev_priv(ndev);
2256 2257 2258
	struct brcmf_wsec_key key;
	s32 err = 0;

2259
	brcmf_dbg(TRACE, "Enter\n");
2260
	if (!check_vif_up(ifp->vif))
2261 2262
		return -EIO;

2263
	if (key_idx >= BRCMF_MAX_DEFAULT_KEYS) {
2264 2265 2266 2267
		/* we ignore this key index in this case */
		return -EINVAL;
	}

2268 2269 2270 2271 2272 2273
	memset(&key, 0, sizeof(key));

	key.index = (u32) key_idx;
	key.flags = BRCMF_PRIMARY_KEY;
	key.algo = CRYPTO_ALGO_OFF;

2274
	brcmf_dbg(CONN, "key index (%d)\n", key_idx);
2275 2276

	/* Set the new key/index */
2277
	err = send_key_to_dongle(ifp, &key);
2278

2279
	brcmf_dbg(TRACE, "Exit\n");
2280 2281 2282 2283 2284 2285 2286 2287 2288
	return err;
}

static s32
brcmf_cfg80211_get_key(struct wiphy *wiphy, struct net_device *ndev,
		    u8 key_idx, bool pairwise, const u8 *mac_addr, void *cookie,
		    void (*callback) (void *cookie, struct key_params * params))
{
	struct key_params params;
2289 2290
	struct brcmf_if *ifp = netdev_priv(ndev);
	struct brcmf_cfg80211_profile *profile = &ifp->vif->profile;
2291 2292 2293 2294
	struct brcmf_cfg80211_security *sec;
	s32 wsec;
	s32 err = 0;

2295
	brcmf_dbg(TRACE, "Enter\n");
2296
	brcmf_dbg(CONN, "key index (%d)\n", key_idx);
2297
	if (!check_vif_up(ifp->vif))
2298 2299 2300 2301
		return -EIO;

	memset(&params, 0, sizeof(params));

2302
	err = brcmf_fil_bsscfg_int_get(ifp, "wsec", &wsec);
2303
	if (err) {
2304
		brcmf_err("WLC_GET_WSEC error (%d)\n", err);
2305 2306 2307 2308
		/* Ignore this error, may happen during DISASSOC */
		err = -EAGAIN;
		goto done;
	}
2309
	if (wsec & WEP_ENABLED) {
2310
		sec = &profile->sec;
2311 2312
		if (sec->cipher_pairwise & WLAN_CIPHER_SUITE_WEP40) {
			params.cipher = WLAN_CIPHER_SUITE_WEP40;
2313
			brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_WEP40\n");
2314 2315
		} else if (sec->cipher_pairwise & WLAN_CIPHER_SUITE_WEP104) {
			params.cipher = WLAN_CIPHER_SUITE_WEP104;
2316
			brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_WEP104\n");
2317
		}
2318
	} else if (wsec & TKIP_ENABLED) {
2319
		params.cipher = WLAN_CIPHER_SUITE_TKIP;
2320
		brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_TKIP\n");
2321
	} else if (wsec & AES_ENABLED) {
2322
		params.cipher = WLAN_CIPHER_SUITE_AES_CMAC;
2323
		brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_AES_CMAC\n");
2324
	} else  {
2325
		brcmf_err("Invalid algo (0x%x)\n", wsec);
2326 2327 2328 2329 2330 2331
		err = -EINVAL;
		goto done;
	}
	callback(cookie, &params);

done:
2332
	brcmf_dbg(TRACE, "Exit\n");
2333 2334 2335 2336 2337 2338 2339
	return err;
}

static s32
brcmf_cfg80211_config_default_mgmt_key(struct wiphy *wiphy,
				    struct net_device *ndev, u8 key_idx)
{
2340
	brcmf_dbg(INFO, "Not supported\n");
2341 2342 2343 2344

	return -EOPNOTSUPP;
}

2345 2346 2347 2348 2349 2350 2351 2352 2353 2354 2355 2356 2357 2358 2359 2360 2361 2362 2363 2364 2365 2366 2367 2368 2369 2370 2371 2372 2373 2374 2375 2376 2377
static void
brcmf_cfg80211_reconfigure_wep(struct brcmf_if *ifp)
{
	s32 err;
	u8 key_idx;
	struct brcmf_wsec_key *key;
	s32 wsec;

	for (key_idx = 0; key_idx < BRCMF_MAX_DEFAULT_KEYS; key_idx++) {
		key = &ifp->vif->profile.key[key_idx];
		if ((key->algo == CRYPTO_ALGO_WEP1) ||
		    (key->algo == CRYPTO_ALGO_WEP128))
			break;
	}
	if (key_idx == BRCMF_MAX_DEFAULT_KEYS)
		return;

	err = send_key_to_dongle(ifp, key);
	if (err) {
		brcmf_err("Setting WEP key failed (%d)\n", err);
		return;
	}
	err = brcmf_fil_bsscfg_int_get(ifp, "wsec", &wsec);
	if (err) {
		brcmf_err("get wsec error (%d)\n", err);
		return;
	}
	wsec |= WEP_ENABLED;
	err = brcmf_fil_bsscfg_int_set(ifp, "wsec", wsec);
	if (err)
		brcmf_err("set wsec error (%d)\n", err);
}

2378 2379 2380 2381 2382 2383 2384 2385 2386 2387 2388 2389 2390 2391 2392 2393 2394 2395 2396 2397 2398 2399 2400 2401 2402 2403 2404 2405 2406 2407 2408 2409 2410 2411 2412 2413 2414 2415 2416 2417 2418 2419 2420 2421 2422 2423 2424 2425 2426 2427 2428 2429 2430
static void brcmf_convert_sta_flags(u32 fw_sta_flags, struct station_info *si)
{
	struct nl80211_sta_flag_update *sfu;

	brcmf_dbg(TRACE, "flags %08x\n", fw_sta_flags);
	si->filled |= BIT(NL80211_STA_INFO_STA_FLAGS);
	sfu = &si->sta_flags;
	sfu->mask = BIT(NL80211_STA_FLAG_WME) |
		    BIT(NL80211_STA_FLAG_AUTHENTICATED) |
		    BIT(NL80211_STA_FLAG_ASSOCIATED) |
		    BIT(NL80211_STA_FLAG_AUTHORIZED);
	if (fw_sta_flags & BRCMF_STA_WME)
		sfu->set |= BIT(NL80211_STA_FLAG_WME);
	if (fw_sta_flags & BRCMF_STA_AUTHE)
		sfu->set |= BIT(NL80211_STA_FLAG_AUTHENTICATED);
	if (fw_sta_flags & BRCMF_STA_ASSOC)
		sfu->set |= BIT(NL80211_STA_FLAG_ASSOCIATED);
	if (fw_sta_flags & BRCMF_STA_AUTHO)
		sfu->set |= BIT(NL80211_STA_FLAG_AUTHORIZED);
}

static void brcmf_fill_bss_param(struct brcmf_if *ifp, struct station_info *si)
{
	struct {
		__le32 len;
		struct brcmf_bss_info_le bss_le;
	} *buf;
	u16 capability;
	int err;

	buf = kzalloc(WL_BSS_INFO_MAX, GFP_KERNEL);
	if (!buf)
		return;

	buf->len = cpu_to_le32(WL_BSS_INFO_MAX);
	err = brcmf_fil_cmd_data_get(ifp, BRCMF_C_GET_BSS_INFO, buf,
				     WL_BSS_INFO_MAX);
	if (err) {
		brcmf_err("Failed to get bss info (%d)\n", err);
		return;
	}
	si->filled |= BIT(NL80211_STA_INFO_BSS_PARAM);
	si->bss_param.beacon_interval = le16_to_cpu(buf->bss_le.beacon_period);
	si->bss_param.dtim_period = buf->bss_le.dtim_period;
	capability = le16_to_cpu(buf->bss_le.capability);
	if (capability & IEEE80211_HT_STBC_PARAM_DUAL_CTS_PROT)
		si->bss_param.flags |= BSS_PARAM_FLAGS_CTS_PROT;
	if (capability & WLAN_CAPABILITY_SHORT_PREAMBLE)
		si->bss_param.flags |= BSS_PARAM_FLAGS_SHORT_PREAMBLE;
	if (capability & WLAN_CAPABILITY_SHORT_SLOT_TIME)
		si->bss_param.flags |= BSS_PARAM_FLAGS_SHORT_SLOT_TIME;
}

2431 2432 2433 2434 2435 2436 2437 2438 2439 2440 2441 2442 2443 2444 2445 2446 2447 2448 2449 2450 2451 2452 2453 2454 2455 2456 2457 2458 2459 2460 2461 2462 2463 2464 2465 2466 2467 2468 2469 2470 2471 2472 2473 2474 2475 2476 2477 2478
static s32
brcmf_cfg80211_get_station_ibss(struct brcmf_if *ifp,
				struct station_info *sinfo)
{
	struct brcmf_scb_val_le scbval;
	struct brcmf_pktcnt_le pktcnt;
	s32 err;
	u32 rate;
	u32 rssi;

	/* Get the current tx rate */
	err = brcmf_fil_cmd_int_get(ifp, BRCMF_C_GET_RATE, &rate);
	if (err < 0) {
		brcmf_err("BRCMF_C_GET_RATE error (%d)\n", err);
		return err;
	}
	sinfo->filled |= BIT(NL80211_STA_INFO_TX_BITRATE);
	sinfo->txrate.legacy = rate * 5;

	memset(&scbval, 0, sizeof(scbval));
	err = brcmf_fil_cmd_data_get(ifp, BRCMF_C_GET_RSSI, &scbval,
				     sizeof(scbval));
	if (err) {
		brcmf_err("BRCMF_C_GET_RSSI error (%d)\n", err);
		return err;
	}
	rssi = le32_to_cpu(scbval.val);
	sinfo->filled |= BIT(NL80211_STA_INFO_SIGNAL);
	sinfo->signal = rssi;

	err = brcmf_fil_cmd_data_get(ifp, BRCMF_C_GET_GET_PKTCNTS, &pktcnt,
				     sizeof(pktcnt));
	if (err) {
		brcmf_err("BRCMF_C_GET_GET_PKTCNTS error (%d)\n", err);
		return err;
	}
	sinfo->filled |= BIT(NL80211_STA_INFO_RX_PACKETS) |
			 BIT(NL80211_STA_INFO_RX_DROP_MISC) |
			 BIT(NL80211_STA_INFO_TX_PACKETS) |
			 BIT(NL80211_STA_INFO_TX_FAILED);
	sinfo->rx_packets = le32_to_cpu(pktcnt.rx_good_pkt);
	sinfo->rx_dropped_misc = le32_to_cpu(pktcnt.rx_bad_pkt);
	sinfo->tx_packets = le32_to_cpu(pktcnt.tx_good_pkt);
	sinfo->tx_failed  = le32_to_cpu(pktcnt.tx_bad_pkt);

	return 0;
}

2479 2480
static s32
brcmf_cfg80211_get_station(struct wiphy *wiphy, struct net_device *ndev,
2481
			   const u8 *mac, struct station_info *sinfo)
2482
{
2483
	struct brcmf_if *ifp = netdev_priv(ndev);
2484
	s32 err = 0;
2485
	struct brcmf_sta_info_le sta_info_le;
2486 2487
	u32 sta_flags;
	u32 is_tdls_peer;
2488 2489 2490
	s32 total_rssi;
	s32 count_rssi;
	u32 i;
2491

2492
	brcmf_dbg(TRACE, "Enter, MAC %pM\n", mac);
2493
	if (!check_vif_up(ifp->vif))
2494 2495
		return -EIO;

2496 2497 2498
	if (brcmf_is_ibssmode(ifp->vif))
		return brcmf_cfg80211_get_station_ibss(ifp, sinfo);

2499 2500 2501 2502 2503 2504 2505
	memset(&sta_info_le, 0, sizeof(sta_info_le));
	memcpy(&sta_info_le, mac, ETH_ALEN);
	err = brcmf_fil_iovar_data_get(ifp, "tdls_sta_info",
				       &sta_info_le,
				       sizeof(sta_info_le));
	is_tdls_peer = !err;
	if (err) {
2506
		err = brcmf_fil_iovar_data_get(ifp, "sta_info",
2507
					       &sta_info_le,
2508
					       sizeof(sta_info_le));
2509
		if (err < 0) {
2510
			brcmf_err("GET STA INFO failed, %d\n", err);
2511 2512
			goto done;
		}
2513 2514 2515 2516 2517 2518 2519 2520 2521 2522 2523 2524 2525 2526 2527 2528 2529 2530 2531 2532 2533 2534 2535 2536 2537 2538
	}
	brcmf_dbg(TRACE, "version %d\n", le16_to_cpu(sta_info_le.ver));
	sinfo->filled = BIT(NL80211_STA_INFO_INACTIVE_TIME);
	sinfo->inactive_time = le32_to_cpu(sta_info_le.idle) * 1000;
	sta_flags = le32_to_cpu(sta_info_le.flags);
	brcmf_convert_sta_flags(sta_flags, sinfo);
	sinfo->sta_flags.mask |= BIT(NL80211_STA_FLAG_TDLS_PEER);
	if (is_tdls_peer)
		sinfo->sta_flags.set |= BIT(NL80211_STA_FLAG_TDLS_PEER);
	else
		sinfo->sta_flags.set &= ~BIT(NL80211_STA_FLAG_TDLS_PEER);
	if (sta_flags & BRCMF_STA_ASSOC) {
		sinfo->filled |= BIT(NL80211_STA_INFO_CONNECTED_TIME);
		sinfo->connected_time = le32_to_cpu(sta_info_le.in);
		brcmf_fill_bss_param(ifp, sinfo);
	}
	if (sta_flags & BRCMF_STA_SCBSTATS) {
		sinfo->filled |= BIT(NL80211_STA_INFO_TX_FAILED);
		sinfo->tx_failed = le32_to_cpu(sta_info_le.tx_failures);
		sinfo->filled |= BIT(NL80211_STA_INFO_TX_PACKETS);
		sinfo->tx_packets = le32_to_cpu(sta_info_le.tx_pkts);
		sinfo->tx_packets += le32_to_cpu(sta_info_le.tx_mcast_pkts);
		sinfo->filled |= BIT(NL80211_STA_INFO_RX_PACKETS);
		sinfo->rx_packets = le32_to_cpu(sta_info_le.rx_ucast_pkts);
		sinfo->rx_packets += le32_to_cpu(sta_info_le.rx_mcast_pkts);
		if (sinfo->tx_packets) {
2539
			sinfo->filled |= BIT(NL80211_STA_INFO_TX_BITRATE);
2540 2541
			sinfo->txrate.legacy =
				le32_to_cpu(sta_info_le.tx_rate) / 100;
2542
		}
2543 2544
		if (sinfo->rx_packets) {
			sinfo->filled |= BIT(NL80211_STA_INFO_RX_BITRATE);
2545 2546
			sinfo->rxrate.legacy =
				le32_to_cpu(sta_info_le.rx_rate) / 100;
2547
		}
2548 2549 2550 2551 2552 2553
		if (le16_to_cpu(sta_info_le.ver) >= 4) {
			sinfo->filled |= BIT(NL80211_STA_INFO_TX_BYTES);
			sinfo->tx_bytes = le64_to_cpu(sta_info_le.tx_tot_bytes);
			sinfo->filled |= BIT(NL80211_STA_INFO_RX_BYTES);
			sinfo->rx_bytes = le64_to_cpu(sta_info_le.rx_tot_bytes);
		}
2554 2555 2556 2557 2558 2559 2560 2561 2562 2563 2564 2565 2566 2567 2568 2569 2570 2571 2572 2573
		total_rssi = 0;
		count_rssi = 0;
		for (i = 0; i < BRCMF_ANT_MAX; i++) {
			if (sta_info_le.rssi[i]) {
				sinfo->chain_signal_avg[count_rssi] =
					sta_info_le.rssi[i];
				sinfo->chain_signal[count_rssi] =
					sta_info_le.rssi[i];
				total_rssi += sta_info_le.rssi[i];
				count_rssi++;
			}
		}
		if (count_rssi) {
			sinfo->filled |= BIT(NL80211_STA_INFO_CHAIN_SIGNAL);
			sinfo->chains = count_rssi;

			sinfo->filled |= BIT(NL80211_STA_INFO_SIGNAL);
			total_rssi /= count_rssi;
			sinfo->signal = total_rssi;
		}
2574
	}
2575
done:
2576
	brcmf_dbg(TRACE, "Exit\n");
2577 2578 2579
	return err;
}

2580 2581 2582 2583 2584 2585 2586 2587 2588 2589 2590 2591 2592 2593 2594 2595 2596 2597 2598 2599 2600 2601 2602 2603 2604 2605 2606 2607 2608
static int
brcmf_cfg80211_dump_station(struct wiphy *wiphy, struct net_device *ndev,
			    int idx, u8 *mac, struct station_info *sinfo)
{
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
	struct brcmf_if *ifp = netdev_priv(ndev);
	s32 err;

	brcmf_dbg(TRACE, "Enter, idx %d\n", idx);

	if (idx == 0) {
		cfg->assoclist.count = cpu_to_le32(BRCMF_MAX_ASSOCLIST);
		err = brcmf_fil_cmd_data_get(ifp, BRCMF_C_GET_ASSOCLIST,
					     &cfg->assoclist,
					     sizeof(cfg->assoclist));
		if (err) {
			brcmf_err("BRCMF_C_GET_ASSOCLIST unsupported, err=%d\n",
				  err);
			cfg->assoclist.count = 0;
			return -EOPNOTSUPP;
		}
	}
	if (idx < le32_to_cpu(cfg->assoclist.count)) {
		memcpy(mac, cfg->assoclist.mac[idx], ETH_ALEN);
		return brcmf_cfg80211_get_station(wiphy, ndev, mac, sinfo);
	}
	return -ENOENT;
}

2609 2610 2611 2612 2613 2614
static s32
brcmf_cfg80211_set_power_mgmt(struct wiphy *wiphy, struct net_device *ndev,
			   bool enabled, s32 timeout)
{
	s32 pm;
	s32 err = 0;
2615
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
2616
	struct brcmf_if *ifp = netdev_priv(ndev);
2617

2618
	brcmf_dbg(TRACE, "Enter\n");
2619 2620 2621 2622 2623

	/*
	 * Powersave enable/disable request is coming from the
	 * cfg80211 even before the interface is up. In that
	 * scenario, driver will be storing the power save
2624
	 * preference in cfg struct to apply this to
2625 2626
	 * FW later while initializing the dongle
	 */
2627
	cfg->pwr_save = enabled;
2628
	if (!check_vif_up(ifp->vif)) {
2629

2630
		brcmf_dbg(INFO, "Device is not ready, storing the value in cfg_info struct\n");
2631 2632 2633 2634
		goto done;
	}

	pm = enabled ? PM_FAST : PM_OFF;
2635 2636 2637 2638 2639
	/* Do not enable the power save after assoc if it is a p2p interface */
	if (ifp->vif->wdev.iftype == NL80211_IFTYPE_P2P_CLIENT) {
		brcmf_dbg(INFO, "Do not enable power save for P2P clients\n");
		pm = PM_OFF;
	}
2640
	brcmf_dbg(INFO, "power save %s\n", (pm ? "enabled" : "disabled"));
2641

2642
	err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_PM, pm);
2643 2644
	if (err) {
		if (err == -ENODEV)
2645
			brcmf_err("net_device is not ready yet\n");
2646
		else
2647
			brcmf_err("error (%d)\n", err);
2648 2649
	}
done:
2650
	brcmf_dbg(TRACE, "Exit\n");
2651 2652 2653
	return err;
}

2654
static s32 brcmf_inform_single_bss(struct brcmf_cfg80211_info *cfg,
2655
				   struct brcmf_bss_info_le *bi)
2656
{
2657
	struct wiphy *wiphy = cfg_to_wiphy(cfg);
2658 2659 2660
	struct ieee80211_channel *notify_channel;
	struct cfg80211_bss *bss;
	struct ieee80211_supported_band *band;
2661
	struct brcmu_chan ch;
2662 2663 2664 2665 2666 2667 2668 2669 2670
	u16 channel;
	u32 freq;
	u16 notify_capability;
	u16 notify_interval;
	u8 *notify_ie;
	size_t notify_ielen;
	s32 notify_signal;

	if (le32_to_cpu(bi->length) > WL_BSS_INFO_MAX) {
2671
		brcmf_err("Bss info is larger than buffer. Discarding\n");
2672 2673 2674
		return 0;
	}

2675 2676 2677 2678 2679 2680
	if (!bi->ctl_ch) {
		ch.chspec = le16_to_cpu(bi->chanspec);
		cfg->d11inf.decchspec(&ch);
		bi->ctl_ch = ch.chnum;
	}
	channel = bi->ctl_ch;
2681 2682 2683 2684 2685 2686 2687 2688 2689 2690 2691 2692 2693 2694 2695

	if (channel <= CH_MAX_2G_CHANNEL)
		band = wiphy->bands[IEEE80211_BAND_2GHZ];
	else
		band = wiphy->bands[IEEE80211_BAND_5GHZ];

	freq = ieee80211_channel_to_frequency(channel, band->band);
	notify_channel = ieee80211_get_channel(wiphy, freq);

	notify_capability = le16_to_cpu(bi->capability);
	notify_interval = le16_to_cpu(bi->beacon_period);
	notify_ie = (u8 *)bi + le16_to_cpu(bi->ie_offset);
	notify_ielen = le32_to_cpu(bi->ie_length);
	notify_signal = (s16)le16_to_cpu(bi->RSSI) * 100;

2696 2697 2698 2699 2700
	brcmf_dbg(CONN, "bssid: %pM\n", bi->BSSID);
	brcmf_dbg(CONN, "Channel: %d(%d)\n", channel, freq);
	brcmf_dbg(CONN, "Capability: %X\n", notify_capability);
	brcmf_dbg(CONN, "Beacon interval: %d\n", notify_interval);
	brcmf_dbg(CONN, "Signal: %d\n", notify_signal);
2701

2702 2703 2704 2705 2706 2707 2708
	bss = cfg80211_inform_bss(wiphy, notify_channel,
				  CFG80211_BSS_FTYPE_UNKNOWN,
				  (const u8 *)bi->BSSID,
				  0, notify_capability,
				  notify_interval, notify_ie,
				  notify_ielen, notify_signal,
				  GFP_KERNEL);
2709

2710 2711 2712
	if (!bss)
		return -ENOMEM;

2713
	cfg80211_put_bss(wiphy, bss);
2714

2715
	return 0;
2716 2717
}

2718 2719 2720 2721 2722 2723 2724 2725 2726
static struct brcmf_bss_info_le *
next_bss_le(struct brcmf_scan_results *list, struct brcmf_bss_info_le *bss)
{
	if (bss == NULL)
		return list->bss_info_le;
	return (struct brcmf_bss_info_le *)((unsigned long)bss +
					    le32_to_cpu(bss->length));
}

2727
static s32 brcmf_inform_bss(struct brcmf_cfg80211_info *cfg)
2728 2729
{
	struct brcmf_scan_results *bss_list;
2730
	struct brcmf_bss_info_le *bi = NULL;	/* must be initialized */
2731 2732 2733
	s32 err = 0;
	int i;

2734
	bss_list = (struct brcmf_scan_results *)cfg->escan_info.escan_buf;
2735 2736
	if (bss_list->count != 0 &&
	    bss_list->version != BRCMF_BSS_INFO_VERSION) {
2737 2738
		brcmf_err("Version %d != WL_BSS_INFO_VERSION\n",
			  bss_list->version);
2739 2740
		return -EOPNOTSUPP;
	}
2741
	brcmf_dbg(SCAN, "scanned AP count (%d)\n", bss_list->count);
2742
	for (i = 0; i < bss_list->count; i++) {
2743
		bi = next_bss_le(bss_list, bi);
2744
		err = brcmf_inform_single_bss(cfg, bi);
2745 2746 2747 2748 2749 2750
		if (err)
			break;
	}
	return err;
}

Hante Meuleman's avatar
Hante Meuleman committed
2751 2752
static s32 brcmf_inform_ibss(struct brcmf_cfg80211_info *cfg,
			     struct net_device *ndev, const u8 *bssid)
2753
{
2754
	struct wiphy *wiphy = cfg_to_wiphy(cfg);
2755
	struct ieee80211_channel *notify_channel;
2756
	struct brcmf_bss_info_le *bi = NULL;
2757
	struct ieee80211_supported_band *band;
2758
	struct cfg80211_bss *bss;
2759
	struct brcmu_chan ch;
2760 2761 2762 2763 2764 2765 2766 2767 2768
	u8 *buf = NULL;
	s32 err = 0;
	u32 freq;
	u16 notify_capability;
	u16 notify_interval;
	u8 *notify_ie;
	size_t notify_ielen;
	s32 notify_signal;

2769
	brcmf_dbg(TRACE, "Enter\n");
2770 2771 2772 2773 2774 2775 2776 2777 2778

	buf = kzalloc(WL_BSS_INFO_MAX, GFP_KERNEL);
	if (buf == NULL) {
		err = -ENOMEM;
		goto CleanUp;
	}

	*(__le32 *)buf = cpu_to_le32(WL_BSS_INFO_MAX);

2779 2780
	err = brcmf_fil_cmd_data_get(netdev_priv(ndev), BRCMF_C_GET_BSS_INFO,
				     buf, WL_BSS_INFO_MAX);
2781
	if (err) {
2782
		brcmf_err("WLC_GET_BSS_INFO failed: %d\n", err);
2783 2784 2785
		goto CleanUp;
	}

2786
	bi = (struct brcmf_bss_info_le *)(buf + 4);
2787

2788 2789
	ch.chspec = le16_to_cpu(bi->chanspec);
	cfg->d11inf.decchspec(&ch);
2790

2791
	if (ch.band == BRCMU_CHAN_BAND_2G)
2792 2793 2794 2795
		band = wiphy->bands[IEEE80211_BAND_2GHZ];
	else
		band = wiphy->bands[IEEE80211_BAND_5GHZ];

2796
	freq = ieee80211_channel_to_frequency(ch.chnum, band->band);
Hante Meuleman's avatar
Hante Meuleman committed
2797
	cfg->channel = freq;
2798 2799 2800 2801 2802 2803 2804 2805
	notify_channel = ieee80211_get_channel(wiphy, freq);

	notify_capability = le16_to_cpu(bi->capability);
	notify_interval = le16_to_cpu(bi->beacon_period);
	notify_ie = (u8 *)bi + le16_to_cpu(bi->ie_offset);
	notify_ielen = le32_to_cpu(bi->ie_length);
	notify_signal = (s16)le16_to_cpu(bi->RSSI) * 100;

2806
	brcmf_dbg(CONN, "channel: %d(%d)\n", ch.chnum, freq);
2807 2808 2809
	brcmf_dbg(CONN, "capability: %X\n", notify_capability);
	brcmf_dbg(CONN, "beacon interval: %d\n", notify_interval);
	brcmf_dbg(CONN, "signal: %d\n", notify_signal);
2810

2811 2812 2813 2814 2815
	bss = cfg80211_inform_bss(wiphy, notify_channel,
				  CFG80211_BSS_FTYPE_UNKNOWN, bssid, 0,
				  notify_capability, notify_interval,
				  notify_ie, notify_ielen, notify_signal,
				  GFP_KERNEL);
2816

2817 2818 2819 2820 2821
	if (!bss) {
		err = -ENOMEM;
		goto CleanUp;
	}

2822
	cfg80211_put_bss(wiphy, bss);
2823

2824 2825 2826 2827
CleanUp:

	kfree(buf);

2828
	brcmf_dbg(TRACE, "Exit\n");
2829 2830 2831 2832

	return err;
}

2833 2834
static s32 brcmf_update_bss_info(struct brcmf_cfg80211_info *cfg,
				 struct brcmf_if *ifp)
2835
{
2836
	struct brcmf_bss_info_le *bi;
2837
	const struct brcmf_tlv *tim;
2838 2839 2840 2841 2842 2843
	u16 beacon_interval;
	u8 dtim_period;
	size_t ie_len;
	u8 *ie;
	s32 err = 0;

2844
	brcmf_dbg(TRACE, "Enter\n");
2845
	if (brcmf_is_ibssmode(ifp->vif))
2846 2847
		return err;

2848
	*(__le32 *)cfg->extra_buf = cpu_to_le32(WL_EXTRA_BUF_MAX);
2849
	err = brcmf_fil_cmd_data_get(ifp, BRCMF_C_GET_BSS_INFO,
2850
				     cfg->extra_buf, WL_EXTRA_BUF_MAX);
2851
	if (err) {
2852
		brcmf_err("Could not get bss info %d\n", err);
2853 2854 2855
		goto update_bss_info_out;
	}

2856 2857
	bi = (struct brcmf_bss_info_le *)(cfg->extra_buf + 4);
	err = brcmf_inform_single_bss(cfg, bi);
2858 2859 2860 2861 2862 2863 2864
	if (err)
		goto update_bss_info_out;

	ie = ((u8 *)bi) + le16_to_cpu(bi->ie_offset);
	ie_len = le32_to_cpu(bi->ie_length);
	beacon_interval = le16_to_cpu(bi->beacon_period);

2865
	tim = brcmf_parse_tlvs(ie, ie_len, WLAN_EID_TIM);
2866 2867 2868 2869 2870 2871 2872 2873 2874
	if (tim)
		dtim_period = tim->data[1];
	else {
		/*
		* active scan was done so we could not get dtim
		* information out of probe response.
		* so we speficially query dtim information to dongle.
		*/
		u32 var;
2875
		err = brcmf_fil_iovar_int_get(ifp, "dtim_assoc", &var);
2876
		if (err) {
2877
			brcmf_err("wl dtim_assoc failed (%d)\n", err);
2878 2879 2880 2881 2882 2883
			goto update_bss_info_out;
		}
		dtim_period = (u8)var;
	}

update_bss_info_out:
2884
	brcmf_dbg(TRACE, "Exit");
2885 2886 2887
	return err;
}

2888
void brcmf_abort_scanning(struct brcmf_cfg80211_info *cfg)
2889
{
2890
	struct escan_info *escan = &cfg->escan_info;
2891

2892
	set_bit(BRCMF_SCAN_STATUS_ABORT, &cfg->scan_status);
2893
	if (cfg->scan_request) {
2894
		escan->escan_state = WL_ESCAN_STATE_IDLE;
2895
		brcmf_notify_escan_complete(cfg, escan->ifp, true, true);
2896
	}
2897 2898
	clear_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status);
	clear_bit(BRCMF_SCAN_STATUS_ABORT, &cfg->scan_status);
2899 2900
}

2901 2902
static void brcmf_cfg80211_escan_timeout_worker(struct work_struct *work)
{
2903 2904
	struct brcmf_cfg80211_info *cfg =
			container_of(work, struct brcmf_cfg80211_info,
2905 2906
				     escan_timeout_work);

2907
	brcmf_inform_bss(cfg);
2908
	brcmf_notify_escan_complete(cfg, cfg->escan_info.ifp, true, true);
2909 2910 2911 2912
}

static void brcmf_escan_timeout(unsigned long data)
{
2913 2914
	struct brcmf_cfg80211_info *cfg =
			(struct brcmf_cfg80211_info *)data;
2915

2916
	if (cfg->scan_request) {
2917
		brcmf_err("timer expired\n");
2918
		schedule_work(&cfg->escan_timeout_work);
2919 2920 2921 2922
	}
}

static s32
2923 2924
brcmf_compare_update_same_bss(struct brcmf_cfg80211_info *cfg,
			      struct brcmf_bss_info_le *bss,
2925 2926
			      struct brcmf_bss_info_le *bss_info_le)
{
2927 2928 2929 2930 2931 2932 2933
	struct brcmu_chan ch_bss, ch_bss_info_le;

	ch_bss.chspec = le16_to_cpu(bss->chanspec);
	cfg->d11inf.decchspec(&ch_bss);
	ch_bss_info_le.chspec = le16_to_cpu(bss_info_le->chanspec);
	cfg->d11inf.decchspec(&ch_bss_info_le);

2934
	if (!memcmp(&bss_info_le->BSSID, &bss->BSSID, ETH_ALEN) &&
2935
		ch_bss.band == ch_bss_info_le.band &&
2936 2937
		bss_info_le->SSID_len == bss->SSID_len &&
		!memcmp(bss_info_le->SSID, bss->SSID, bss_info_le->SSID_len)) {
2938 2939
		if ((bss->flags & BRCMF_BSS_RSSI_ON_CHANNEL) ==
			(bss_info_le->flags & BRCMF_BSS_RSSI_ON_CHANNEL)) {
2940 2941 2942
			s16 bss_rssi = le16_to_cpu(bss->RSSI);
			s16 bss_info_rssi = le16_to_cpu(bss_info_le->RSSI);

2943 2944 2945
			/* preserve max RSSI if the measurements are
			* both on-channel or both off-channel
			*/
2946
			if (bss_info_rssi > bss_rssi)
2947
				bss->RSSI = bss_info_le->RSSI;
2948 2949
		} else if ((bss->flags & BRCMF_BSS_RSSI_ON_CHANNEL) &&
			(bss_info_le->flags & BRCMF_BSS_RSSI_ON_CHANNEL) == 0) {
2950 2951 2952 2953
			/* preserve the on-channel rssi measurement
			* if the new measurement is off channel
			*/
			bss->RSSI = bss_info_le->RSSI;
2954
			bss->flags |= BRCMF_BSS_RSSI_ON_CHANNEL;
2955 2956 2957 2958 2959 2960 2961
		}
		return 1;
	}
	return 0;
}

static s32
2962
brcmf_cfg80211_escan_handler(struct brcmf_if *ifp,
2963 2964
			     const struct brcmf_event_msg *e, void *data)
{
2965
	struct brcmf_cfg80211_info *cfg = ifp->drvr->config;
2966 2967 2968 2969 2970 2971 2972
	s32 status;
	struct brcmf_escan_result_le *escan_result_le;
	struct brcmf_bss_info_le *bss_info_le;
	struct brcmf_bss_info_le *bss = NULL;
	u32 bi_length;
	struct brcmf_scan_results *list;
	u32 i;
2973
	bool aborted;
2974

2975
	status = e->status;
2976

2977
	if (!test_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status)) {
2978
		brcmf_err("scan not ready, bsscfgidx=%d\n", ifp->bsscfgidx);
2979 2980 2981 2982
		return -EPERM;
	}

	if (status == BRCMF_E_STATUS_PARTIAL) {
2983
		brcmf_dbg(SCAN, "ESCAN Partial result\n");
2984 2985
		escan_result_le = (struct brcmf_escan_result_le *) data;
		if (!escan_result_le) {
2986
			brcmf_err("Invalid escan result (NULL pointer)\n");
2987 2988 2989
			goto exit;
		}
		if (le16_to_cpu(escan_result_le->bss_count) != 1) {
2990 2991
			brcmf_err("Invalid bss_count %d: ignoring\n",
				  escan_result_le->bss_count);
2992 2993 2994 2995
			goto exit;
		}
		bss_info_le = &escan_result_le->bss_info_le;

2996 2997 2998 2999 3000 3001 3002 3003
		if (brcmf_p2p_scan_finding_common_channel(cfg, bss_info_le))
			goto exit;

		if (!cfg->scan_request) {
			brcmf_dbg(SCAN, "result without cfg80211 request\n");
			goto exit;
		}

3004 3005 3006
		bi_length = le32_to_cpu(bss_info_le->length);
		if (bi_length != (le32_to_cpu(escan_result_le->buflen) -
					WL_ESCAN_RESULTS_FIXED_SIZE)) {
3007 3008
			brcmf_err("Invalid bss_info length %d: ignoring\n",
				  bi_length);
3009 3010 3011
			goto exit;
		}

3012
		if (!(cfg_to_wiphy(cfg)->interface_modes &
3013 3014 3015
					BIT(NL80211_IFTYPE_ADHOC))) {
			if (le16_to_cpu(bss_info_le->capability) &
						WLAN_CAPABILITY_IBSS) {
3016
				brcmf_err("Ignoring IBSS result\n");
3017 3018 3019 3020 3021
				goto exit;
			}
		}

		list = (struct brcmf_scan_results *)
3022
				cfg->escan_info.escan_buf;
3023
		if (bi_length > BRCMF_ESCAN_BUF_SIZE - list->buflen) {
3024
			brcmf_err("Buffer is too small: ignoring\n");
3025 3026 3027 3028 3029 3030 3031
			goto exit;
		}

		for (i = 0; i < list->count; i++) {
			bss = bss ? (struct brcmf_bss_info_le *)
				((unsigned char *)bss +
				le32_to_cpu(bss->length)) : list->bss_info_le;
3032 3033
			if (brcmf_compare_update_same_bss(cfg, bss,
							  bss_info_le))
3034 3035
				goto exit;
		}
3036 3037
		memcpy(&cfg->escan_info.escan_buf[list->buflen], bss_info_le,
		       bi_length);
3038 3039 3040 3041
		list->version = le32_to_cpu(bss_info_le->version);
		list->buflen += bi_length;
		list->count++;
	} else {
3042
		cfg->escan_info.escan_state = WL_ESCAN_STATE_IDLE;
3043 3044
		if (brcmf_p2p_scan_finding_common_channel(cfg, NULL))
			goto exit;
3045 3046
		if (cfg->scan_request) {
			brcmf_inform_bss(cfg);
3047
			aborted = status != BRCMF_E_STATUS_SUCCESS;
3048
			brcmf_notify_escan_complete(cfg, ifp, aborted, false);
3049
		} else
3050 3051
			brcmf_dbg(SCAN, "Ignored scan complete result 0x%x\n",
				  status);
3052 3053
	}
exit:
3054
	return 0;
3055 3056
}

3057
static void brcmf_init_escan(struct brcmf_cfg80211_info *cfg)
3058
{
3059 3060
	brcmf_fweh_register(cfg->pub, BRCMF_E_ESCAN_RESULT,
			    brcmf_cfg80211_escan_handler);
3061 3062 3063 3064 3065 3066 3067
	cfg->escan_info.escan_state = WL_ESCAN_STATE_IDLE;
	/* Init scan_timeout timer */
	init_timer(&cfg->escan_timeout);
	cfg->escan_timeout.data = (unsigned long) cfg;
	cfg->escan_timeout.function = brcmf_escan_timeout;
	INIT_WORK(&cfg->escan_timeout_work,
		  brcmf_cfg80211_escan_timeout_worker);
3068 3069
}

3070 3071 3072 3073 3074 3075
/* PFN result doesn't have all the info which are required by the supplicant
 * (For e.g IEs) Do a target Escan so that sched scan results are reported
 * via wl_inform_single_bss in the required format. Escan does require the
 * scan request in the form of cfg80211_scan_request. For timebeing, create
 * cfg80211_scan_request one out of the received PNO event.
 */
3076
static s32
3077 3078
brcmf_notify_sched_scan_results(struct brcmf_if *ifp,
				const struct brcmf_event_msg *e, void *data)
3079 3080
{
	struct brcmf_cfg80211_info *cfg = ifp->drvr->config;
3081 3082 3083 3084 3085 3086 3087 3088
	struct brcmf_pno_net_info_le *netinfo, *netinfo_start;
	struct cfg80211_scan_request *request = NULL;
	struct cfg80211_ssid *ssid = NULL;
	struct ieee80211_channel *channel = NULL;
	struct wiphy *wiphy = cfg_to_wiphy(cfg);
	int err = 0;
	int channel_req = 0;
	int band = 0;
3089
	struct brcmf_pno_scanresults_le *pfn_result;
3090 3091
	u32 result_count;
	u32 status;
3092 3093 3094 3095

	brcmf_dbg(SCAN, "Enter\n");

	if (e->event_code == BRCMF_E_PFN_NET_LOST) {
3096
		brcmf_dbg(SCAN, "PFN NET LOST event. Do Nothing\n");
3097 3098 3099
		return 0;
	}

3100 3101 3102
	pfn_result = (struct brcmf_pno_scanresults_le *)data;
	result_count = le32_to_cpu(pfn_result->count);
	status = le32_to_cpu(pfn_result->status);
3103

3104 3105 3106 3107 3108 3109 3110
	/* PFN event is limited to fit 512 bytes so we may get
	 * multiple NET_FOUND events. For now place a warning here.
	 */
	WARN_ON(status != BRCMF_PNO_SCAN_COMPLETE);
	brcmf_dbg(SCAN, "PFN NET FOUND event. count: %d\n", result_count);
	if (result_count > 0) {
		int i;
3111

3112 3113 3114 3115 3116 3117 3118
		request = kzalloc(sizeof(*request), GFP_KERNEL);
		ssid = kcalloc(result_count, sizeof(*ssid), GFP_KERNEL);
		channel = kcalloc(result_count, sizeof(*channel), GFP_KERNEL);
		if (!request || !ssid || !channel) {
			err = -ENOMEM;
			goto out_err;
		}
3119

3120 3121 3122
		request->wiphy = wiphy;
		data += sizeof(struct brcmf_pno_scanresults_le);
		netinfo_start = (struct brcmf_pno_net_info_le *)data;
3123

3124 3125 3126 3127 3128 3129 3130 3131
		for (i = 0; i < result_count; i++) {
			netinfo = &netinfo_start[i];
			if (!netinfo) {
				brcmf_err("Invalid netinfo ptr. index: %d\n",
					  i);
				err = -EINVAL;
				goto out_err;
			}
3132

3133 3134 3135 3136 3137
			brcmf_dbg(SCAN, "SSID:%s Channel:%d\n",
				  netinfo->SSID, netinfo->channel);
			memcpy(ssid[i].ssid, netinfo->SSID, netinfo->SSID_len);
			ssid[i].ssid_len = netinfo->SSID_len;
			request->n_ssids++;
3138

3139 3140 3141 3142 3143 3144 3145 3146 3147 3148 3149 3150 3151
			channel_req = netinfo->channel;
			if (channel_req <= CH_MAX_2G_CHANNEL)
				band = NL80211_BAND_2GHZ;
			else
				band = NL80211_BAND_5GHZ;
			channel[i].center_freq =
				ieee80211_channel_to_frequency(channel_req,
							       band);
			channel[i].band = band;
			channel[i].flags |= IEEE80211_CHAN_NO_HT40;
			request->channels[i] = &channel[i];
			request->n_channels++;
		}
3152

3153 3154 3155
		/* assign parsed ssid array */
		if (request->n_ssids)
			request->ssids = &ssid[0];
3156

3157 3158 3159
		if (test_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status)) {
			/* Abort any on-going scan */
			brcmf_abort_scanning(cfg);
3160
		}
3161 3162 3163 3164 3165 3166 3167

		set_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status);
		cfg->escan_info.run = brcmf_run_escan;
		err = brcmf_do_escan(cfg, wiphy, ifp, request);
		if (err) {
			clear_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status);
			goto out_err;
3168
		}
3169 3170
		cfg->sched_escan = true;
		cfg->scan_request = request;
3171
	} else {
3172 3173
		brcmf_err("FALSE PNO Event. (pfn_count == 0)\n");
		goto out_err;
3174 3175
	}

3176 3177 3178 3179
	kfree(ssid);
	kfree(channel);
	kfree(request);
	return 0;
3180

3181 3182 3183 3184 3185 3186
out_err:
	kfree(ssid);
	kfree(channel);
	kfree(request);
	cfg80211_sched_scan_stopped(wiphy);
	return err;
3187 3188
}

3189
static int brcmf_dev_pno_clean(struct net_device *ndev)
3190
{
3191
	int ret;
3192

3193 3194 3195 3196 3197 3198 3199 3200 3201
	/* Disable pfn */
	ret = brcmf_fil_iovar_int_set(netdev_priv(ndev), "pfn", 0);
	if (ret == 0) {
		/* clear pfn */
		ret = brcmf_fil_iovar_data_set(netdev_priv(ndev), "pfnclear",
					       NULL, 0);
	}
	if (ret < 0)
		brcmf_err("failed code %d\n", ret);
3202

3203 3204 3205 3206 3207 3208 3209 3210 3211 3212 3213 3214 3215 3216 3217 3218 3219 3220 3221 3222 3223 3224 3225 3226 3227 3228 3229 3230 3231 3232 3233 3234 3235 3236 3237 3238 3239 3240 3241 3242 3243 3244 3245 3246 3247 3248 3249 3250 3251 3252 3253 3254 3255 3256 3257 3258 3259 3260 3261 3262 3263 3264 3265 3266 3267 3268 3269 3270 3271 3272 3273 3274 3275 3276 3277 3278 3279 3280 3281 3282 3283 3284 3285 3286 3287 3288 3289 3290 3291 3292 3293 3294 3295 3296 3297 3298 3299 3300 3301 3302 3303 3304 3305 3306 3307 3308 3309 3310 3311 3312 3313 3314 3315 3316 3317 3318 3319 3320 3321 3322 3323 3324 3325 3326 3327 3328 3329 3330 3331 3332 3333 3334 3335 3336 3337 3338 3339 3340 3341 3342 3343 3344 3345 3346 3347 3348 3349 3350 3351 3352 3353 3354 3355 3356 3357 3358 3359 3360 3361 3362 3363 3364 3365 3366 3367 3368 3369 3370 3371 3372 3373 3374 3375 3376 3377 3378 3379 3380 3381 3382 3383 3384 3385 3386 3387 3388 3389 3390 3391 3392 3393 3394 3395 3396 3397 3398 3399 3400 3401 3402 3403 3404 3405 3406 3407 3408 3409 3410 3411 3412 3413 3414 3415 3416 3417 3418 3419 3420 3421 3422 3423 3424 3425 3426 3427 3428 3429 3430 3431 3432 3433 3434 3435 3436 3437 3438 3439 3440 3441 3442 3443 3444 3445 3446 3447 3448 3449 3450 3451 3452 3453 3454 3455 3456 3457 3458 3459 3460 3461 3462 3463 3464 3465 3466 3467 3468 3469 3470 3471 3472 3473 3474 3475 3476 3477 3478 3479 3480 3481 3482 3483 3484 3485 3486 3487 3488 3489 3490 3491 3492 3493 3494 3495 3496 3497 3498 3499 3500 3501 3502 3503 3504 3505 3506 3507 3508 3509 3510 3511 3512 3513 3514 3515 3516 3517 3518 3519 3520 3521 3522 3523 3524 3525 3526 3527 3528 3529 3530 3531 3532 3533 3534 3535 3536
	return ret;
}

static int brcmf_dev_pno_config(struct brcmf_if *ifp,
				struct cfg80211_sched_scan_request *request)
{
	struct brcmf_pno_param_le pfn_param;
	struct brcmf_pno_macaddr_le pfn_mac;
	s32 err;
	u8 *mac_mask;
	int i;

	memset(&pfn_param, 0, sizeof(pfn_param));
	pfn_param.version = cpu_to_le32(BRCMF_PNO_VERSION);

	/* set extra pno params */
	pfn_param.flags = cpu_to_le16(1 << BRCMF_PNO_ENABLE_ADAPTSCAN_BIT);
	pfn_param.repeat = BRCMF_PNO_REPEAT;
	pfn_param.exp = BRCMF_PNO_FREQ_EXPO_MAX;

	/* set up pno scan fr */
	pfn_param.scan_freq = cpu_to_le32(BRCMF_PNO_TIME);

	err = brcmf_fil_iovar_data_set(ifp, "pfn_set", &pfn_param,
				       sizeof(pfn_param));
	if (err) {
		brcmf_err("pfn_set failed, err=%d\n", err);
		return err;
	}

	/* Find out if mac randomization should be turned on */
	if (!(request->flags & NL80211_SCAN_FLAG_RANDOM_ADDR))
		return 0;

	pfn_mac.version = BRCMF_PFN_MACADDR_CFG_VER;
	pfn_mac.flags = BRCMF_PFN_MAC_OUI_ONLY | BRCMF_PFN_SET_MAC_UNASSOC;

	memcpy(pfn_mac.mac, request->mac_addr, ETH_ALEN);
	mac_mask = request->mac_addr_mask;
	for (i = 0; i < ETH_ALEN; i++) {
		pfn_mac.mac[i] &= mac_mask[i];
		pfn_mac.mac[i] |= get_random_int() & ~(mac_mask[i]);
	}
	/* Clear multi bit */
	pfn_mac.mac[0] &= 0xFE;
	/* Set locally administered */
	pfn_mac.mac[0] |= 0x02;

	err = brcmf_fil_iovar_data_set(ifp, "pfn_macaddr", &pfn_mac,
				       sizeof(pfn_mac));
	if (err)
		brcmf_err("pfn_macaddr failed, err=%d\n", err);

	return err;
}

static int
brcmf_cfg80211_sched_scan_start(struct wiphy *wiphy,
				struct net_device *ndev,
				struct cfg80211_sched_scan_request *request)
{
	struct brcmf_if *ifp = netdev_priv(ndev);
	struct brcmf_cfg80211_info *cfg = wiphy_priv(wiphy);
	struct brcmf_pno_net_param_le pfn;
	int i;
	int ret = 0;

	brcmf_dbg(SCAN, "Enter n_match_sets:%d n_ssids:%d\n",
		  request->n_match_sets, request->n_ssids);
	if (test_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status)) {
		brcmf_err("Scanning already: status (%lu)\n", cfg->scan_status);
		return -EAGAIN;
	}
	if (test_bit(BRCMF_SCAN_STATUS_SUPPRESS, &cfg->scan_status)) {
		brcmf_err("Scanning suppressed: status (%lu)\n",
			  cfg->scan_status);
		return -EAGAIN;
	}

	if (!request->n_ssids || !request->n_match_sets) {
		brcmf_dbg(SCAN, "Invalid sched scan req!! n_ssids:%d\n",
			  request->n_ssids);
		return -EINVAL;
	}

	if (request->n_ssids > 0) {
		for (i = 0; i < request->n_ssids; i++) {
			/* Active scan req for ssids */
			brcmf_dbg(SCAN, ">>> Active scan req for ssid (%s)\n",
				  request->ssids[i].ssid);

			/* match_set ssids is a supert set of n_ssid list,
			 * so we need not add these set separately.
			 */
		}
	}

	if (request->n_match_sets > 0) {
		/* clean up everything */
		ret = brcmf_dev_pno_clean(ndev);
		if  (ret < 0) {
			brcmf_err("failed error=%d\n", ret);
			return ret;
		}

		/* configure pno */
		if (brcmf_dev_pno_config(ifp, request))
			return -EINVAL;

		/* configure each match set */
		for (i = 0; i < request->n_match_sets; i++) {
			struct cfg80211_ssid *ssid;
			u32 ssid_len;

			ssid = &request->match_sets[i].ssid;
			ssid_len = ssid->ssid_len;

			if (!ssid_len) {
				brcmf_err("skip broadcast ssid\n");
				continue;
			}
			pfn.auth = cpu_to_le32(WLAN_AUTH_OPEN);
			pfn.wpa_auth = cpu_to_le32(BRCMF_PNO_WPA_AUTH_ANY);
			pfn.wsec = cpu_to_le32(0);
			pfn.infra = cpu_to_le32(1);
			pfn.flags = cpu_to_le32(1 << BRCMF_PNO_HIDDEN_BIT);
			pfn.ssid.SSID_len = cpu_to_le32(ssid_len);
			memcpy(pfn.ssid.SSID, ssid->ssid, ssid_len);
			ret = brcmf_fil_iovar_data_set(ifp, "pfn_add", &pfn,
						       sizeof(pfn));
			brcmf_dbg(SCAN, ">>> PNO filter %s for ssid (%s)\n",
				  ret == 0 ? "set" : "failed", ssid->ssid);
		}
		/* Enable the PNO */
		if (brcmf_fil_iovar_int_set(ifp, "pfn", 1) < 0) {
			brcmf_err("PNO enable failed!! ret=%d\n", ret);
			return -EINVAL;
		}
	} else {
		return -EINVAL;
	}

	return 0;
}

static int brcmf_cfg80211_sched_scan_stop(struct wiphy *wiphy,
					  struct net_device *ndev)
{
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);

	brcmf_dbg(SCAN, "enter\n");
	brcmf_dev_pno_clean(ndev);
	if (cfg->sched_escan)
		brcmf_notify_escan_complete(cfg, netdev_priv(ndev), true, true);
	return 0;
}

static __always_inline void brcmf_delay(u32 ms)
{
	if (ms < 1000 / HZ) {
		cond_resched();
		mdelay(ms);
	} else {
		msleep(ms);
	}
}

static s32 brcmf_config_wowl_pattern(struct brcmf_if *ifp, u8 cmd[4],
				     u8 *pattern, u32 patternsize, u8 *mask,
				     u32 packet_offset)
{
	struct brcmf_fil_wowl_pattern_le *filter;
	u32 masksize;
	u32 patternoffset;
	u8 *buf;
	u32 bufsize;
	s32 ret;

	masksize = (patternsize + 7) / 8;
	patternoffset = sizeof(*filter) - sizeof(filter->cmd) + masksize;

	bufsize = sizeof(*filter) + patternsize + masksize;
	buf = kzalloc(bufsize, GFP_KERNEL);
	if (!buf)
		return -ENOMEM;
	filter = (struct brcmf_fil_wowl_pattern_le *)buf;

	memcpy(filter->cmd, cmd, 4);
	filter->masksize = cpu_to_le32(masksize);
	filter->offset = cpu_to_le32(packet_offset);
	filter->patternoffset = cpu_to_le32(patternoffset);
	filter->patternsize = cpu_to_le32(patternsize);
	filter->type = cpu_to_le32(BRCMF_WOWL_PATTERN_TYPE_BITMAP);

	if ((mask) && (masksize))
		memcpy(buf + sizeof(*filter), mask, masksize);
	if ((pattern) && (patternsize))
		memcpy(buf + sizeof(*filter) + masksize, pattern, patternsize);

	ret = brcmf_fil_iovar_data_set(ifp, "wowl_pattern", buf, bufsize);

	kfree(buf);
	return ret;
}

static s32
brcmf_wowl_nd_results(struct brcmf_if *ifp, const struct brcmf_event_msg *e,
		      void *data)
{
	struct brcmf_cfg80211_info *cfg = ifp->drvr->config;
	struct brcmf_pno_scanresults_le *pfn_result;
	struct brcmf_pno_net_info_le *netinfo;

	brcmf_dbg(SCAN, "Enter\n");

	pfn_result = (struct brcmf_pno_scanresults_le *)data;

	if (e->event_code == BRCMF_E_PFN_NET_LOST) {
		brcmf_dbg(SCAN, "PFN NET LOST event. Ignore\n");
		return 0;
	}

	if (le32_to_cpu(pfn_result->count) < 1) {
		brcmf_err("Invalid result count, expected 1 (%d)\n",
			  le32_to_cpu(pfn_result->count));
		return -EINVAL;
	}

	data += sizeof(struct brcmf_pno_scanresults_le);
	netinfo = (struct brcmf_pno_net_info_le *)data;
	memcpy(cfg->wowl.nd->ssid.ssid, netinfo->SSID, netinfo->SSID_len);
	cfg->wowl.nd->ssid.ssid_len = netinfo->SSID_len;
	cfg->wowl.nd->n_channels = 1;
	cfg->wowl.nd->channels[0] =
		ieee80211_channel_to_frequency(netinfo->channel,
			netinfo->channel <= CH_MAX_2G_CHANNEL ?
					NL80211_BAND_2GHZ : NL80211_BAND_5GHZ);
	cfg->wowl.nd_info->n_matches = 1;
	cfg->wowl.nd_info->matches[0] = cfg->wowl.nd;

	/* Inform (the resume task) that the net detect information was recvd */
	cfg->wowl.nd_data_completed = true;
	wake_up(&cfg->wowl.nd_data_wait);

	return 0;
}

#ifdef CONFIG_PM

static void brcmf_report_wowl_wakeind(struct wiphy *wiphy, struct brcmf_if *ifp)
{
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
	struct brcmf_wowl_wakeind_le wake_ind_le;
	struct cfg80211_wowlan_wakeup wakeup_data;
	struct cfg80211_wowlan_wakeup *wakeup;
	u32 wakeind;
	s32 err;
	int timeout;

	err = brcmf_fil_iovar_data_get(ifp, "wowl_wakeind", &wake_ind_le,
				       sizeof(wake_ind_le));
	if (err) {
		brcmf_err("Get wowl_wakeind failed, err = %d\n", err);
		return;
	}

	wakeind = le32_to_cpu(wake_ind_le.ucode_wakeind);
	if (wakeind & (BRCMF_WOWL_MAGIC | BRCMF_WOWL_DIS | BRCMF_WOWL_BCN |
		       BRCMF_WOWL_RETR | BRCMF_WOWL_NET |
		       BRCMF_WOWL_PFN_FOUND)) {
		wakeup = &wakeup_data;
		memset(&wakeup_data, 0, sizeof(wakeup_data));
		wakeup_data.pattern_idx = -1;

		if (wakeind & BRCMF_WOWL_MAGIC) {
			brcmf_dbg(INFO, "WOWL Wake indicator: BRCMF_WOWL_MAGIC\n");
			wakeup_data.magic_pkt = true;
		}
		if (wakeind & BRCMF_WOWL_DIS) {
			brcmf_dbg(INFO, "WOWL Wake indicator: BRCMF_WOWL_DIS\n");
			wakeup_data.disconnect = true;
		}
		if (wakeind & BRCMF_WOWL_BCN) {
			brcmf_dbg(INFO, "WOWL Wake indicator: BRCMF_WOWL_BCN\n");
			wakeup_data.disconnect = true;
		}
		if (wakeind & BRCMF_WOWL_RETR) {
			brcmf_dbg(INFO, "WOWL Wake indicator: BRCMF_WOWL_RETR\n");
			wakeup_data.disconnect = true;
		}
		if (wakeind & BRCMF_WOWL_NET) {
			brcmf_dbg(INFO, "WOWL Wake indicator: BRCMF_WOWL_NET\n");
			/* For now always map to pattern 0, no API to get
			 * correct information available at the moment.
			 */
			wakeup_data.pattern_idx = 0;
		}
		if (wakeind & BRCMF_WOWL_PFN_FOUND) {
			brcmf_dbg(INFO, "WOWL Wake indicator: BRCMF_WOWL_PFN_FOUND\n");
			timeout = wait_event_timeout(cfg->wowl.nd_data_wait,
				cfg->wowl.nd_data_completed,
				BRCMF_ND_INFO_TIMEOUT);
			if (!timeout)
				brcmf_err("No result for wowl net detect\n");
			else
				wakeup_data.net_detect = cfg->wowl.nd_info;
		}
	} else {
		wakeup = NULL;
	}
	cfg80211_report_wowlan_wakeup(&ifp->vif->wdev, wakeup, GFP_KERNEL);
}

#else

static void brcmf_report_wowl_wakeind(struct wiphy *wiphy, struct brcmf_if *ifp)
{
}

#endif /* CONFIG_PM */

static s32 brcmf_cfg80211_resume(struct wiphy *wiphy)
{
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
	struct net_device *ndev = cfg_to_ndev(cfg);
	struct brcmf_if *ifp = netdev_priv(ndev);

	brcmf_dbg(TRACE, "Enter\n");

	if (cfg->wowl.active) {
		brcmf_report_wowl_wakeind(wiphy, ifp);
		brcmf_fil_iovar_int_set(ifp, "wowl_clear", 0);
		brcmf_config_wowl_pattern(ifp, "clr", NULL, 0, NULL, 0);
		brcmf_configure_arp_offload(ifp, true);
3537
		brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_PM,
3538 3539 3540 3541 3542 3543 3544 3545 3546
				      cfg->wowl.pre_pmmode);
		cfg->wowl.active = false;
		if (cfg->wowl.nd_enabled) {
			brcmf_cfg80211_sched_scan_stop(cfg->wiphy, ifp->ndev);
			brcmf_fweh_unregister(cfg->pub, BRCMF_E_PFN_NET_FOUND);
			brcmf_fweh_register(cfg->pub, BRCMF_E_PFN_NET_FOUND,
					    brcmf_notify_sched_scan_results);
			cfg->wowl.nd_enabled = false;
		}
3547
	}
3548 3549 3550
	return 0;
}

3551 3552 3553 3554 3555
static void brcmf_configure_wowl(struct brcmf_cfg80211_info *cfg,
				 struct brcmf_if *ifp,
				 struct cfg80211_wowlan *wowl)
{
	u32 wowl_config;
3556
	u32 i;
3557 3558 3559

	brcmf_dbg(TRACE, "Suspend, wowl config.\n");

3560
	brcmf_configure_arp_offload(ifp, false);
3561
	brcmf_fil_cmd_int_get(ifp, BRCMF_C_GET_PM, &cfg->wowl.pre_pmmode);
3562 3563 3564 3565
	brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_PM, PM_MAX);

	wowl_config = 0;
	if (wowl->disconnect)
3566
		wowl_config = BRCMF_WOWL_DIS | BRCMF_WOWL_BCN | BRCMF_WOWL_RETR;
3567
	if (wowl->magic_pkt)
3568 3569 3570 3571 3572 3573 3574 3575 3576 3577 3578
		wowl_config |= BRCMF_WOWL_MAGIC;
	if ((wowl->patterns) && (wowl->n_patterns)) {
		wowl_config |= BRCMF_WOWL_NET;
		for (i = 0; i < wowl->n_patterns; i++) {
			brcmf_config_wowl_pattern(ifp, "add",
				(u8 *)wowl->patterns[i].pattern,
				wowl->patterns[i].pattern_len,
				(u8 *)wowl->patterns[i].mask,
				wowl->patterns[i].pkt_offset);
		}
	}
3579 3580 3581 3582 3583 3584 3585 3586 3587 3588 3589 3590 3591 3592 3593
	if (wowl->nd_config) {
		brcmf_cfg80211_sched_scan_start(cfg->wiphy, ifp->ndev,
						wowl->nd_config);
		wowl_config |= BRCMF_WOWL_PFN_FOUND;

		cfg->wowl.nd_data_completed = false;
		cfg->wowl.nd_enabled = true;
		/* Now reroute the event for PFN to the wowl function. */
		brcmf_fweh_unregister(cfg->pub, BRCMF_E_PFN_NET_FOUND);
		brcmf_fweh_register(cfg->pub, BRCMF_E_PFN_NET_FOUND,
				    brcmf_wowl_nd_results);
	}
	if (!test_bit(BRCMF_VIF_STATUS_CONNECTED, &ifp->vif->sme_state))
		wowl_config |= BRCMF_WOWL_UNASSOC;

3594
	brcmf_fil_iovar_data_set(ifp, "wowl_wakeind", "clear", strlen("clear"));
3595 3596 3597
	brcmf_fil_iovar_int_set(ifp, "wowl", wowl_config);
	brcmf_fil_iovar_int_set(ifp, "wowl_activate", 1);
	brcmf_bus_wowl_config(cfg->pub->bus_if, true);
3598
	cfg->wowl.active = true;
3599 3600
}

3601
static s32 brcmf_cfg80211_suspend(struct wiphy *wiphy,
3602
				  struct cfg80211_wowlan *wowl)
3603
{
3604 3605
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
	struct net_device *ndev = cfg_to_ndev(cfg);
3606
	struct brcmf_if *ifp = netdev_priv(ndev);
3607
	struct brcmf_cfg80211_vif *vif;
3608

3609
	brcmf_dbg(TRACE, "Enter\n");
3610

3611
	/* if the primary net_device is not READY there is nothing
3612
	 * we can do but pray resume goes smoothly.
3613
	 */
3614
	if (!check_vif_up(ifp->vif))
3615
		goto exit;
3616

3617 3618 3619 3620
	/* Stop scheduled scan */
	if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_PNO))
		brcmf_cfg80211_sched_scan_stop(wiphy, ndev);

3621 3622
	/* end any scanning */
	if (test_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status))
3623
		brcmf_abort_scanning(cfg);
3624

3625 3626 3627 3628 3629 3630 3631 3632 3633
	if (wowl == NULL) {
		brcmf_bus_wowl_config(cfg->pub->bus_if, false);
		list_for_each_entry(vif, &cfg->vif_list, list) {
			if (!test_bit(BRCMF_VIF_STATUS_READY, &vif->sme_state))
				continue;
			/* While going to suspend if associated with AP
			 * disassociate from AP to save power while system is
			 * in suspended state
			 */
3634
			brcmf_link_down(vif, WLAN_REASON_UNSPECIFIED);
3635 3636
			/* Make sure WPA_Supplicant receives all the event
			 * generated due to DISASSOC call to the fw to keep
3637 3638 3639
			 * the state fw and WPA_Supplicant state consistent
			 */
			brcmf_delay(500);
3640
		}
3641 3642
		/* Configure MPC */
		brcmf_set_mpc(ifp, 1);
3643 3644

	} else {
3645 3646
		/* Configure WOWL paramaters */
		brcmf_configure_wowl(cfg, ifp, wowl);
3647 3648
	}

3649 3650 3651 3652
exit:
	brcmf_dbg(TRACE, "Exit\n");
	/* clear any scanning activity */
	cfg->scan_status = 0;
3653 3654 3655
	return 0;
}

3656 3657
static __used s32
brcmf_update_pmklist(struct brcmf_cfg80211_info *cfg, struct brcmf_if *ifp)
3658
{
3659
	struct brcmf_pmk_list_le *pmk_list;
3660
	int i;
3661 3662
	u32 npmk;
	s32 err;
3663

3664 3665
	pmk_list = &cfg->pmk_list;
	npmk = le32_to_cpu(pmk_list->npmk);
3666

3667 3668 3669
	brcmf_dbg(CONN, "No of elements %d\n", npmk);
	for (i = 0; i < npmk; i++)
		brcmf_dbg(CONN, "PMK[%d]: %pM\n", i, &pmk_list->pmk[i].bssid);
3670

3671 3672
	err = brcmf_fil_iovar_data_set(ifp, "pmkid_info", pmk_list,
				       sizeof(*pmk_list));
3673 3674

	return err;
3675 3676
}

3677 3678 3679
static s32
brcmf_cfg80211_set_pmksa(struct wiphy *wiphy, struct net_device *ndev,
			 struct cfg80211_pmksa *pmksa)
3680
{
3681
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
3682
	struct brcmf_if *ifp = netdev_priv(ndev);
3683 3684 3685
	struct brcmf_pmksa *pmk = &cfg->pmk_list.pmk[0];
	s32 err;
	u32 npmk, i;
3686

3687 3688 3689
	brcmf_dbg(TRACE, "Enter\n");
	if (!check_vif_up(ifp->vif))
		return -EIO;
3690

3691 3692 3693 3694 3695 3696 3697 3698 3699 3700 3701 3702 3703
	npmk = le32_to_cpu(cfg->pmk_list.npmk);
	for (i = 0; i < npmk; i++)
		if (!memcmp(pmksa->bssid, pmk[i].bssid, ETH_ALEN))
			break;
	if (i < BRCMF_MAXPMKID) {
		memcpy(pmk[i].bssid, pmksa->bssid, ETH_ALEN);
		memcpy(pmk[i].pmkid, pmksa->pmkid, WLAN_PMKID_LEN);
		if (i == npmk) {
			npmk++;
			cfg->pmk_list.npmk = cpu_to_le32(npmk);
		}
	} else {
		brcmf_err("Too many PMKSA entries cached %d\n", npmk);
3704 3705 3706
		return -EINVAL;
	}

3707 3708 3709 3710 3711
	brcmf_dbg(CONN, "set_pmksa - PMK bssid: %pM =\n", pmk[npmk].bssid);
	for (i = 0; i < WLAN_PMKID_LEN; i += 4)
		brcmf_dbg(CONN, "%02x %02x %02x %02x\n", pmk[npmk].pmkid[i],
			  pmk[npmk].pmkid[i + 1], pmk[npmk].pmkid[i + 2],
			  pmk[npmk].pmkid[i + 3]);
3712

3713
	err = brcmf_update_pmklist(cfg, ifp);
3714

3715 3716 3717
	brcmf_dbg(TRACE, "Exit\n");
	return err;
}
3718

3719 3720 3721 3722 3723 3724 3725 3726 3727
static s32
brcmf_cfg80211_del_pmksa(struct wiphy *wiphy, struct net_device *ndev,
			 struct cfg80211_pmksa *pmksa)
{
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
	struct brcmf_if *ifp = netdev_priv(ndev);
	struct brcmf_pmksa *pmk = &cfg->pmk_list.pmk[0];
	s32 err;
	u32 npmk, i;
3728

3729 3730 3731
	brcmf_dbg(TRACE, "Enter\n");
	if (!check_vif_up(ifp->vif))
		return -EIO;
3732

3733
	brcmf_dbg(CONN, "del_pmksa - PMK bssid = %pM\n", &pmksa->bssid);
3734

3735 3736 3737 3738 3739 3740 3741 3742 3743 3744
	npmk = le32_to_cpu(cfg->pmk_list.npmk);
	for (i = 0; i < npmk; i++)
		if (!memcmp(&pmksa->bssid, &pmk[i].bssid, ETH_ALEN))
			break;

	if ((npmk > 0) && (i < npmk)) {
		for (; i < (npmk - 1); i++) {
			memcpy(&pmk[i].bssid, &pmk[i + 1].bssid, ETH_ALEN);
			memcpy(&pmk[i].pmkid, &pmk[i + 1].pmkid,
			       WLAN_PMKID_LEN);
3745
		}
3746 3747
		memset(&pmk[i], 0, sizeof(*pmk));
		cfg->pmk_list.npmk = cpu_to_le32(npmk - 1);
3748
	} else {
3749
		brcmf_err("Cache entry not found\n");
3750 3751 3752
		return -EINVAL;
	}

3753 3754 3755 3756 3757
	err = brcmf_update_pmklist(cfg, ifp);

	brcmf_dbg(TRACE, "Exit\n");
	return err;

3758 3759
}

3760 3761
static s32
brcmf_cfg80211_flush_pmksa(struct wiphy *wiphy, struct net_device *ndev)
3762
{
3763
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
3764 3765 3766 3767 3768 3769 3770 3771 3772 3773 3774 3775
	struct brcmf_if *ifp = netdev_priv(ndev);
	s32 err;

	brcmf_dbg(TRACE, "Enter\n");
	if (!check_vif_up(ifp->vif))
		return -EIO;

	memset(&cfg->pmk_list, 0, sizeof(cfg->pmk_list));
	err = brcmf_update_pmklist(cfg, ifp);

	brcmf_dbg(TRACE, "Exit\n");
	return err;
3776 3777 3778

}

3779
static s32 brcmf_configure_opensecurity(struct brcmf_if *ifp)
3780 3781 3782 3783
{
	s32 err;

	/* set auth */
3784
	err = brcmf_fil_bsscfg_int_set(ifp, "auth", 0);
3785
	if (err < 0) {
3786
		brcmf_err("auth error %d\n", err);
3787 3788 3789
		return err;
	}
	/* set wsec */
3790
	err = brcmf_fil_bsscfg_int_set(ifp, "wsec", 0);
3791
	if (err < 0) {
3792
		brcmf_err("wsec error %d\n", err);
3793 3794 3795
		return err;
	}
	/* set upper-layer auth */
3796
	err = brcmf_fil_bsscfg_int_set(ifp, "wpa_auth", WPA_AUTH_NONE);
3797
	if (err < 0) {
3798
		brcmf_err("wpa_auth error %d\n", err);
3799 3800 3801 3802 3803 3804 3805 3806 3807 3808 3809 3810 3811 3812 3813
		return err;
	}

	return 0;
}

static bool brcmf_valid_wpa_oui(u8 *oui, bool is_rsn_ie)
{
	if (is_rsn_ie)
		return (memcmp(oui, RSN_OUI, TLV_OUI_LEN) == 0);

	return (memcmp(oui, WPA_OUI, TLV_OUI_LEN) == 0);
}

static s32
3814
brcmf_configure_wpaie(struct brcmf_if *ifp,
3815 3816
		      const struct brcmf_vs_tlv *wpa_ie,
		      bool is_rsn_ie)
3817 3818 3819 3820 3821 3822 3823 3824 3825 3826 3827 3828 3829 3830 3831
{
	u32 auth = 0; /* d11 open authentication */
	u16 count;
	s32 err = 0;
	s32 len = 0;
	u32 i;
	u32 wsec;
	u32 pval = 0;
	u32 gval = 0;
	u32 wpa_auth = 0;
	u32 offset;
	u8 *data;
	u16 rsn_cap;
	u32 wme_bss_disable;

3832
	brcmf_dbg(TRACE, "Enter\n");
3833 3834 3835 3836 3837
	if (wpa_ie == NULL)
		goto exit;

	len = wpa_ie->len + TLV_HDR_LEN;
	data = (u8 *)wpa_ie;
3838
	offset = TLV_HDR_LEN;
3839 3840
	if (!is_rsn_ie)
		offset += VS_IE_FIXED_HDR_LEN;
3841 3842
	else
		offset += WPA_IE_VERSION_LEN;
3843 3844 3845 3846

	/* check for multicast cipher suite */
	if (offset + WPA_IE_MIN_OUI_LEN > len) {
		err = -EINVAL;
3847
		brcmf_err("no multicast cipher suite\n");
3848 3849 3850 3851 3852
		goto exit;
	}

	if (!brcmf_valid_wpa_oui(&data[offset], is_rsn_ie)) {
		err = -EINVAL;
3853
		brcmf_err("ivalid OUI\n");
3854 3855 3856 3857 3858 3859 3860 3861 3862 3863 3864 3865 3866 3867 3868 3869 3870 3871 3872 3873 3874
		goto exit;
	}
	offset += TLV_OUI_LEN;

	/* pick up multicast cipher */
	switch (data[offset]) {
	case WPA_CIPHER_NONE:
		gval = 0;
		break;
	case WPA_CIPHER_WEP_40:
	case WPA_CIPHER_WEP_104:
		gval = WEP_ENABLED;
		break;
	case WPA_CIPHER_TKIP:
		gval = TKIP_ENABLED;
		break;
	case WPA_CIPHER_AES_CCM:
		gval = AES_ENABLED;
		break;
	default:
		err = -EINVAL;
3875
		brcmf_err("Invalid multi cast cipher info\n");
3876 3877 3878 3879 3880 3881 3882 3883 3884 3885
		goto exit;
	}

	offset++;
	/* walk thru unicast cipher list and pick up what we recognize */
	count = data[offset] + (data[offset + 1] << 8);
	offset += WPA_IE_SUITE_COUNT_LEN;
	/* Check for unicast suite(s) */
	if (offset + (WPA_IE_MIN_OUI_LEN * count) > len) {
		err = -EINVAL;
3886
		brcmf_err("no unicast cipher suite\n");
3887 3888 3889 3890 3891
		goto exit;
	}
	for (i = 0; i < count; i++) {
		if (!brcmf_valid_wpa_oui(&data[offset], is_rsn_ie)) {
			err = -EINVAL;
3892
			brcmf_err("ivalid OUI\n");
3893 3894 3895 3896 3897 3898 3899 3900 3901 3902 3903 3904 3905 3906 3907 3908 3909
			goto exit;
		}
		offset += TLV_OUI_LEN;
		switch (data[offset]) {
		case WPA_CIPHER_NONE:
			break;
		case WPA_CIPHER_WEP_40:
		case WPA_CIPHER_WEP_104:
			pval |= WEP_ENABLED;
			break;
		case WPA_CIPHER_TKIP:
			pval |= TKIP_ENABLED;
			break;
		case WPA_CIPHER_AES_CCM:
			pval |= AES_ENABLED;
			break;
		default:
3910
			brcmf_err("Ivalid unicast security info\n");
3911 3912 3913 3914 3915 3916 3917 3918 3919
		}
		offset++;
	}
	/* walk thru auth management suite list and pick up what we recognize */
	count = data[offset] + (data[offset + 1] << 8);
	offset += WPA_IE_SUITE_COUNT_LEN;
	/* Check for auth key management suite(s) */
	if (offset + (WPA_IE_MIN_OUI_LEN * count) > len) {
		err = -EINVAL;
3920
		brcmf_err("no auth key mgmt suite\n");
3921 3922 3923 3924 3925
		goto exit;
	}
	for (i = 0; i < count; i++) {
		if (!brcmf_valid_wpa_oui(&data[offset], is_rsn_ie)) {
			err = -EINVAL;
3926
			brcmf_err("ivalid OUI\n");
3927 3928 3929 3930 3931
			goto exit;
		}
		offset += TLV_OUI_LEN;
		switch (data[offset]) {
		case RSN_AKM_NONE:
3932
			brcmf_dbg(TRACE, "RSN_AKM_NONE\n");
3933 3934 3935
			wpa_auth |= WPA_AUTH_NONE;
			break;
		case RSN_AKM_UNSPECIFIED:
3936
			brcmf_dbg(TRACE, "RSN_AKM_UNSPECIFIED\n");
3937 3938 3939 3940
			is_rsn_ie ? (wpa_auth |= WPA2_AUTH_UNSPECIFIED) :
				    (wpa_auth |= WPA_AUTH_UNSPECIFIED);
			break;
		case RSN_AKM_PSK:
3941
			brcmf_dbg(TRACE, "RSN_AKM_PSK\n");
3942 3943 3944 3945
			is_rsn_ie ? (wpa_auth |= WPA2_AUTH_PSK) :
				    (wpa_auth |= WPA_AUTH_PSK);
			break;
		default:
3946
			brcmf_err("Ivalid key mgmt info\n");
3947 3948 3949 3950 3951 3952 3953 3954 3955 3956 3957 3958
		}
		offset++;
	}

	if (is_rsn_ie) {
		wme_bss_disable = 1;
		if ((offset + RSN_CAP_LEN) <= len) {
			rsn_cap = data[offset] + (data[offset + 1] << 8);
			if (rsn_cap & RSN_CAP_PTK_REPLAY_CNTR_MASK)
				wme_bss_disable = 0;
		}
		/* set wme_bss_disable to sync RSN Capabilities */
3959
		err = brcmf_fil_bsscfg_int_set(ifp, "wme_bss_disable",
3960
					       wme_bss_disable);
3961
		if (err < 0) {
3962
			brcmf_err("wme_bss_disable error %d\n", err);
3963 3964 3965 3966 3967 3968 3969
			goto exit;
		}
	}
	/* FOR WPS , set SES_OW_ENABLED */
	wsec = (pval | gval | SES_OW_ENABLED);

	/* set auth */
3970
	err = brcmf_fil_bsscfg_int_set(ifp, "auth", auth);
3971
	if (err < 0) {
3972
		brcmf_err("auth error %d\n", err);
3973 3974 3975
		goto exit;
	}
	/* set wsec */
3976
	err = brcmf_fil_bsscfg_int_set(ifp, "wsec", wsec);
3977
	if (err < 0) {
3978
		brcmf_err("wsec error %d\n", err);
3979 3980 3981
		goto exit;
	}
	/* set upper-layer auth */
3982
	err = brcmf_fil_bsscfg_int_set(ifp, "wpa_auth", wpa_auth);
3983
	if (err < 0) {
3984
		brcmf_err("wpa_auth error %d\n", err);
3985 3986 3987 3988 3989 3990 3991 3992
		goto exit;
	}

exit:
	return err;
}

static s32
3993
brcmf_parse_vndr_ies(const u8 *vndr_ie_buf, u32 vndr_ie_len,
3994 3995 3996 3997 3998 3999 4000 4001 4002 4003 4004 4005 4006 4007 4008 4009 4010
		     struct parsed_vndr_ies *vndr_ies)
{
	struct brcmf_vs_tlv *vndrie;
	struct brcmf_tlv *ie;
	struct parsed_vndr_ie_info *parsed_info;
	s32 remaining_len;

	remaining_len = (s32)vndr_ie_len;
	memset(vndr_ies, 0, sizeof(*vndr_ies));

	ie = (struct brcmf_tlv *)vndr_ie_buf;
	while (ie) {
		if (ie->id != WLAN_EID_VENDOR_SPECIFIC)
			goto next;
		vndrie = (struct brcmf_vs_tlv *)ie;
		/* len should be bigger than OUI length + one */
		if (vndrie->len < (VS_IE_FIXED_HDR_LEN - TLV_HDR_LEN + 1)) {
4011 4012
			brcmf_err("invalid vndr ie. length is too small %d\n",
				  vndrie->len);
4013 4014 4015 4016 4017 4018
			goto next;
		}
		/* if wpa or wme ie, do not add ie */
		if (!memcmp(vndrie->oui, (u8 *)WPA_OUI, TLV_OUI_LEN) &&
		    ((vndrie->oui_type == WPA_OUI_TYPE) ||
		    (vndrie->oui_type == WME_OUI_TYPE))) {
4019
			brcmf_dbg(TRACE, "Found WPA/WME oui. Do not add it\n");
4020 4021 4022 4023 4024 4025 4026 4027 4028 4029 4030 4031
			goto next;
		}

		parsed_info = &vndr_ies->ie_info[vndr_ies->count];

		/* save vndr ie information */
		parsed_info->ie_ptr = (char *)vndrie;
		parsed_info->ie_len = vndrie->len + TLV_HDR_LEN;
		memcpy(&parsed_info->vndrie, vndrie, sizeof(*vndrie));

		vndr_ies->count++;

4032 4033 4034 4035 4036
		brcmf_dbg(TRACE, "** OUI %02x %02x %02x, type 0x%02x\n",
			  parsed_info->vndrie.oui[0],
			  parsed_info->vndrie.oui[1],
			  parsed_info->vndrie.oui[2],
			  parsed_info->vndrie.oui_type);
4037

4038
		if (vndr_ies->count >= VNDR_IE_PARSE_LIMIT)
4039 4040
			break;
next:
4041 4042
		remaining_len -= (ie->len + TLV_HDR_LEN);
		if (remaining_len <= TLV_HDR_LEN)
4043 4044
			ie = NULL;
		else
4045 4046
			ie = (struct brcmf_tlv *)(((u8 *)ie) + ie->len +
				TLV_HDR_LEN);
4047
	}
4048
	return 0;
4049 4050 4051 4052 4053 4054 4055 4056 4057
}

static u32
brcmf_vndr_ie(u8 *iebuf, s32 pktflag, u8 *ie_ptr, u32 ie_len, s8 *add_del_cmd)
{

	strncpy(iebuf, add_del_cmd, VNDR_IE_CMD_LEN - 1);
	iebuf[VNDR_IE_CMD_LEN - 1] = '\0';

4058
	put_unaligned_le32(1, &iebuf[VNDR_IE_COUNT_OFFSET]);
4059

4060
	put_unaligned_le32(pktflag, &iebuf[VNDR_IE_PKTFLAG_OFFSET]);
4061 4062 4063 4064 4065 4066

	memcpy(&iebuf[VNDR_IE_VSIE_OFFSET], ie_ptr, ie_len);

	return ie_len + VNDR_IE_HDR_SIZE;
}

4067 4068
s32 brcmf_vif_set_mgmt_ie(struct brcmf_cfg80211_vif *vif, s32 pktflag,
			  const u8 *vndr_ie_buf, u32 vndr_ie_len)
4069
{
4070 4071
	struct brcmf_if *ifp;
	struct vif_saved_ie *saved_ie;
4072 4073 4074 4075
	s32 err = 0;
	u8  *iovar_ie_buf;
	u8  *curr_ie_buf;
	u8  *mgmt_ie_buf = NULL;
4076
	int mgmt_ie_buf_len;
4077
	u32 *mgmt_ie_len;
4078 4079 4080 4081 4082 4083 4084 4085
	u32 del_add_ie_buf_len = 0;
	u32 total_ie_buf_len = 0;
	u32 parsed_ie_buf_len = 0;
	struct parsed_vndr_ies old_vndr_ies;
	struct parsed_vndr_ies new_vndr_ies;
	struct parsed_vndr_ie_info *vndrie_info;
	s32 i;
	u8 *ptr;
4086
	int remained_buf_len;
4087

4088 4089 4090 4091 4092
	if (!vif)
		return -ENODEV;
	ifp = vif->ifp;
	saved_ie = &vif->saved_ie;

4093 4094
	brcmf_dbg(TRACE, "bsscfgidx %d, pktflag : 0x%02X\n", ifp->bsscfgidx,
		  pktflag);
4095 4096 4097 4098
	iovar_ie_buf = kzalloc(WL_EXTRA_BUF_MAX, GFP_KERNEL);
	if (!iovar_ie_buf)
		return -ENOMEM;
	curr_ie_buf = iovar_ie_buf;
4099 4100 4101 4102 4103 4104 4105 4106 4107 4108 4109 4110 4111 4112 4113 4114 4115 4116 4117 4118 4119 4120 4121 4122 4123
	switch (pktflag) {
	case BRCMF_VNDR_IE_PRBREQ_FLAG:
		mgmt_ie_buf = saved_ie->probe_req_ie;
		mgmt_ie_len = &saved_ie->probe_req_ie_len;
		mgmt_ie_buf_len = sizeof(saved_ie->probe_req_ie);
		break;
	case BRCMF_VNDR_IE_PRBRSP_FLAG:
		mgmt_ie_buf = saved_ie->probe_res_ie;
		mgmt_ie_len = &saved_ie->probe_res_ie_len;
		mgmt_ie_buf_len = sizeof(saved_ie->probe_res_ie);
		break;
	case BRCMF_VNDR_IE_BEACON_FLAG:
		mgmt_ie_buf = saved_ie->beacon_ie;
		mgmt_ie_len = &saved_ie->beacon_ie_len;
		mgmt_ie_buf_len = sizeof(saved_ie->beacon_ie);
		break;
	case BRCMF_VNDR_IE_ASSOCREQ_FLAG:
		mgmt_ie_buf = saved_ie->assoc_req_ie;
		mgmt_ie_len = &saved_ie->assoc_req_ie_len;
		mgmt_ie_buf_len = sizeof(saved_ie->assoc_req_ie);
		break;
	default:
		err = -EPERM;
		brcmf_err("not suitable type\n");
		goto exit;
4124 4125 4126 4127
	}

	if (vndr_ie_len > mgmt_ie_buf_len) {
		err = -ENOMEM;
4128
		brcmf_err("extra IE size too big\n");
4129 4130 4131 4132 4133 4134 4135 4136 4137 4138 4139 4140 4141 4142 4143
		goto exit;
	}

	/* parse and save new vndr_ie in curr_ie_buff before comparing it */
	if (vndr_ie_buf && vndr_ie_len && curr_ie_buf) {
		ptr = curr_ie_buf;
		brcmf_parse_vndr_ies(vndr_ie_buf, vndr_ie_len, &new_vndr_ies);
		for (i = 0; i < new_vndr_ies.count; i++) {
			vndrie_info = &new_vndr_ies.ie_info[i];
			memcpy(ptr + parsed_ie_buf_len, vndrie_info->ie_ptr,
			       vndrie_info->ie_len);
			parsed_ie_buf_len += vndrie_info->ie_len;
		}
	}

4144
	if (mgmt_ie_buf && *mgmt_ie_len) {
4145 4146 4147
		if (parsed_ie_buf_len && (parsed_ie_buf_len == *mgmt_ie_len) &&
		    (memcmp(mgmt_ie_buf, curr_ie_buf,
			    parsed_ie_buf_len) == 0)) {
4148
			brcmf_dbg(TRACE, "Previous mgmt IE equals to current IE\n");
4149 4150 4151 4152 4153 4154 4155 4156 4157 4158
			goto exit;
		}

		/* parse old vndr_ie */
		brcmf_parse_vndr_ies(mgmt_ie_buf, *mgmt_ie_len, &old_vndr_ies);

		/* make a command to delete old ie */
		for (i = 0; i < old_vndr_ies.count; i++) {
			vndrie_info = &old_vndr_ies.ie_info[i];

4159 4160 4161 4162 4163 4164
			brcmf_dbg(TRACE, "DEL ID : %d, Len: %d , OUI:%02x:%02x:%02x\n",
				  vndrie_info->vndrie.id,
				  vndrie_info->vndrie.len,
				  vndrie_info->vndrie.oui[0],
				  vndrie_info->vndrie.oui[1],
				  vndrie_info->vndrie.oui[2]);
4165 4166 4167 4168 4169 4170 4171 4172 4173 4174 4175 4176 4177 4178 4179 4180 4181 4182 4183 4184 4185

			del_add_ie_buf_len = brcmf_vndr_ie(curr_ie_buf, pktflag,
							   vndrie_info->ie_ptr,
							   vndrie_info->ie_len,
							   "del");
			curr_ie_buf += del_add_ie_buf_len;
			total_ie_buf_len += del_add_ie_buf_len;
		}
	}

	*mgmt_ie_len = 0;
	/* Add if there is any extra IE */
	if (mgmt_ie_buf && parsed_ie_buf_len) {
		ptr = mgmt_ie_buf;

		remained_buf_len = mgmt_ie_buf_len;

		/* make a command to add new ie */
		for (i = 0; i < new_vndr_ies.count; i++) {
			vndrie_info = &new_vndr_ies.ie_info[i];

4186 4187 4188
			/* verify remained buf size before copy data */
			if (remained_buf_len < (vndrie_info->vndrie.len +
							VNDR_IE_VSIE_OFFSET)) {
4189 4190
				brcmf_err("no space in mgmt_ie_buf: len left %d",
					  remained_buf_len);
4191 4192 4193 4194 4195
				break;
			}
			remained_buf_len -= (vndrie_info->ie_len +
					     VNDR_IE_VSIE_OFFSET);

4196 4197 4198 4199 4200 4201
			brcmf_dbg(TRACE, "ADDED ID : %d, Len: %d, OUI:%02x:%02x:%02x\n",
				  vndrie_info->vndrie.id,
				  vndrie_info->vndrie.len,
				  vndrie_info->vndrie.oui[0],
				  vndrie_info->vndrie.oui[1],
				  vndrie_info->vndrie.oui[2]);
4202 4203 4204 4205 4206 4207 4208 4209 4210 4211 4212 4213 4214 4215 4216 4217

			del_add_ie_buf_len = brcmf_vndr_ie(curr_ie_buf, pktflag,
							   vndrie_info->ie_ptr,
							   vndrie_info->ie_len,
							   "add");

			/* save the parsed IE in wl struct */
			memcpy(ptr + (*mgmt_ie_len), vndrie_info->ie_ptr,
			       vndrie_info->ie_len);
			*mgmt_ie_len += vndrie_info->ie_len;

			curr_ie_buf += del_add_ie_buf_len;
			total_ie_buf_len += del_add_ie_buf_len;
		}
	}
	if (total_ie_buf_len) {
4218
		err  = brcmf_fil_bsscfg_data_set(ifp, "vndr_ie", iovar_ie_buf,
4219
						 total_ie_buf_len);
4220
		if (err)
4221
			brcmf_err("vndr ie set error : %d\n", err);
4222 4223 4224 4225 4226 4227 4228
	}

exit:
	kfree(iovar_ie_buf);
	return err;
}

4229 4230 4231 4232 4233 4234 4235 4236 4237 4238 4239 4240 4241 4242 4243 4244
s32 brcmf_vif_clear_mgmt_ies(struct brcmf_cfg80211_vif *vif)
{
	s32 pktflags[] = {
		BRCMF_VNDR_IE_PRBREQ_FLAG,
		BRCMF_VNDR_IE_PRBRSP_FLAG,
		BRCMF_VNDR_IE_BEACON_FLAG
	};
	int i;

	for (i = 0; i < ARRAY_SIZE(pktflags); i++)
		brcmf_vif_set_mgmt_ie(vif, pktflags[i], NULL, 0);

	memset(&vif->saved_ie, 0, sizeof(vif->saved_ie));
	return 0;
}

4245 4246 4247 4248 4249 4250 4251 4252 4253 4254 4255 4256 4257 4258 4259 4260 4261 4262 4263 4264 4265 4266 4267 4268 4269 4270 4271
static s32
brcmf_config_ap_mgmt_ie(struct brcmf_cfg80211_vif *vif,
			struct cfg80211_beacon_data *beacon)
{
	s32 err;

	/* Set Beacon IEs to FW */
	err = brcmf_vif_set_mgmt_ie(vif, BRCMF_VNDR_IE_BEACON_FLAG,
				    beacon->tail, beacon->tail_len);
	if (err) {
		brcmf_err("Set Beacon IE Failed\n");
		return err;
	}
	brcmf_dbg(TRACE, "Applied Vndr IEs for Beacon\n");

	/* Set Probe Response IEs to FW */
	err = brcmf_vif_set_mgmt_ie(vif, BRCMF_VNDR_IE_PRBRSP_FLAG,
				    beacon->proberesp_ies,
				    beacon->proberesp_ies_len);
	if (err)
		brcmf_err("Set Probe Resp IE Failed\n");
	else
		brcmf_dbg(TRACE, "Applied Vndr IEs for Probe Resp\n");

	return err;
}

4272 4273 4274 4275 4276
static s32
brcmf_cfg80211_start_ap(struct wiphy *wiphy, struct net_device *ndev,
			struct cfg80211_ap_settings *settings)
{
	s32 ie_offset;
4277
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
4278
	struct brcmf_if *ifp = netdev_priv(ndev);
4279
	const struct brcmf_tlv *ssid_ie;
4280
	const struct brcmf_tlv *country_ie;
4281 4282
	struct brcmf_ssid_le ssid_le;
	s32 err = -EPERM;
4283 4284
	const struct brcmf_tlv *rsn_ie;
	const struct brcmf_vs_tlv *wpa_ie;
4285
	struct brcmf_join_params join_params;
4286 4287
	enum nl80211_iftype dev_role;
	struct brcmf_fil_bss_enable_le bss_enable;
4288
	u16 chanspec;
4289
	bool mbss;
4290
	int is_11d;
4291

4292 4293 4294
	brcmf_dbg(TRACE, "ctrlchn=%d, center=%d, bw=%d, beacon_interval=%d, dtim_period=%d,\n",
		  settings->chandef.chan->hw_value,
		  settings->chandef.center_freq1, settings->chandef.width,
4295
		  settings->beacon_interval, settings->dtim_period);
4296 4297 4298
	brcmf_dbg(TRACE, "ssid=%s(%zu), auth_type=%d, inactivity_timeout=%d\n",
		  settings->ssid, settings->ssid_len, settings->auth_type,
		  settings->inactivity_timeout);
4299
	dev_role = ifp->vif->wdev.iftype;
4300
	mbss = ifp->vif->mbss;
4301

4302 4303 4304 4305 4306 4307 4308
	/* store current 11d setting */
	brcmf_fil_cmd_int_get(ifp, BRCMF_C_GET_REGULATORY, &ifp->vif->is_11d);
	country_ie = brcmf_parse_tlvs((u8 *)settings->beacon.tail,
				      settings->beacon.tail_len,
				      WLAN_EID_COUNTRY);
	is_11d = country_ie ? 1 : 0;

4309 4310 4311 4312 4313 4314 4315 4316 4317 4318 4319 4320
	memset(&ssid_le, 0, sizeof(ssid_le));
	if (settings->ssid == NULL || settings->ssid_len == 0) {
		ie_offset = DOT11_MGMT_HDR_LEN + DOT11_BCN_PRB_FIXED_LEN;
		ssid_ie = brcmf_parse_tlvs(
				(u8 *)&settings->beacon.head[ie_offset],
				settings->beacon.head_len - ie_offset,
				WLAN_EID_SSID);
		if (!ssid_ie)
			return -EINVAL;

		memcpy(ssid_le.SSID, ssid_ie->data, ssid_ie->len);
		ssid_le.SSID_len = cpu_to_le32(ssid_ie->len);
4321
		brcmf_dbg(TRACE, "SSID is (%s) in Head\n", ssid_le.SSID);
4322 4323 4324 4325 4326
	} else {
		memcpy(ssid_le.SSID, settings->ssid, settings->ssid_len);
		ssid_le.SSID_len = cpu_to_le32((u32)settings->ssid_len);
	}

4327 4328 4329 4330
	if (!mbss) {
		brcmf_set_mpc(ifp, 0);
		brcmf_configure_arp_offload(ifp, false);
	}
4331 4332 4333 4334 4335 4336 4337 4338 4339 4340

	/* find the RSN_IE */
	rsn_ie = brcmf_parse_tlvs((u8 *)settings->beacon.tail,
				  settings->beacon.tail_len, WLAN_EID_RSN);

	/* find the WPA_IE */
	wpa_ie = brcmf_find_wpaie((u8 *)settings->beacon.tail,
				  settings->beacon.tail_len);

	if ((wpa_ie != NULL || rsn_ie != NULL)) {
4341
		brcmf_dbg(TRACE, "WPA(2) IE is found\n");
4342 4343
		if (wpa_ie != NULL) {
			/* WPA IE */
4344
			err = brcmf_configure_wpaie(ifp, wpa_ie, false);
4345 4346 4347
			if (err < 0)
				goto exit;
		} else {
4348 4349 4350 4351
			struct brcmf_vs_tlv *tmp_ie;

			tmp_ie = (struct brcmf_vs_tlv *)rsn_ie;

4352
			/* RSN IE */
4353
			err = brcmf_configure_wpaie(ifp, tmp_ie, true);
4354 4355 4356 4357
			if (err < 0)
				goto exit;
		}
	} else {
4358
		brcmf_dbg(TRACE, "No WPA(2) IEs found\n");
4359
		brcmf_configure_opensecurity(ifp);
4360 4361
	}

4362
	brcmf_config_ap_mgmt_ie(ifp->vif, &settings->beacon);
4363

4364 4365 4366 4367
	if (!mbss) {
		chanspec = chandef_to_chanspec(&cfg->d11inf,
					       &settings->chandef);
		err = brcmf_fil_iovar_int_set(ifp, "chanspec", chanspec);
4368
		if (err < 0) {
4369 4370
			brcmf_err("Set Channel failed: chspec=%d, %d\n",
				  chanspec, err);
4371 4372
			goto exit;
		}
4373

4374 4375 4376 4377 4378 4379 4380 4381
		if (is_11d != ifp->vif->is_11d) {
			err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_REGULATORY,
						    is_11d);
			if (err < 0) {
				brcmf_err("Regulatory Set Error, %d\n", err);
				goto exit;
			}
		}
4382 4383 4384 4385 4386 4387 4388 4389 4390 4391 4392 4393 4394 4395 4396 4397
		if (settings->beacon_interval) {
			err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_BCNPRD,
						    settings->beacon_interval);
			if (err < 0) {
				brcmf_err("Beacon Interval Set Error, %d\n",
					  err);
				goto exit;
			}
		}
		if (settings->dtim_period) {
			err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_DTIMPRD,
						    settings->dtim_period);
			if (err < 0) {
				brcmf_err("DTIM Interval Set Error, %d\n", err);
				goto exit;
			}
4398
		}
4399

4400 4401 4402
		if ((dev_role == NL80211_IFTYPE_AP) &&
		    ((ifp->ifidx == 0) ||
		     !brcmf_feat_is_enabled(ifp, BRCMF_FEAT_RSDB))) {
4403 4404 4405 4406 4407 4408 4409 4410 4411
			err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_DOWN, 1);
			if (err < 0) {
				brcmf_err("BRCMF_C_DOWN error %d\n", err);
				goto exit;
			}
			brcmf_fil_iovar_int_set(ifp, "apsta", 0);
		}

		err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_INFRA, 1);
4412
		if (err < 0) {
4413
			brcmf_err("SET INFRA error %d\n", err);
4414 4415
			goto exit;
		}
4416 4417 4418 4419
	} else if (WARN_ON(is_11d != ifp->vif->is_11d)) {
		/* Multiple-BSS should use same 11d configuration */
		err = -EINVAL;
		goto exit;
4420
	}
4421
	if (dev_role == NL80211_IFTYPE_AP) {
4422 4423 4424
		if ((brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MBSS)) && (!mbss))
			brcmf_fil_iovar_int_set(ifp, "mbss", 1);

4425 4426 4427 4428 4429 4430 4431 4432 4433 4434
		err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_AP, 1);
		if (err < 0) {
			brcmf_err("setting AP mode failed %d\n", err);
			goto exit;
		}
		err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_UP, 1);
		if (err < 0) {
			brcmf_err("BRCMF_C_UP error (%d)\n", err);
			goto exit;
		}
4435 4436 4437 4438
		/* On DOWN the firmware removes the WEP keys, reconfigure
		 * them if they were set.
		 */
		brcmf_cfg80211_reconfigure_wep(ifp);
4439 4440 4441 4442 4443 4444 4445 4446 4447 4448 4449 4450 4451 4452 4453 4454 4455 4456 4457

		memset(&join_params, 0, sizeof(join_params));
		/* join parameters starts with ssid */
		memcpy(&join_params.ssid_le, &ssid_le, sizeof(ssid_le));
		/* create softap */
		err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_SSID,
					     &join_params, sizeof(join_params));
		if (err < 0) {
			brcmf_err("SET SSID error (%d)\n", err);
			goto exit;
		}
		brcmf_dbg(TRACE, "AP mode configuration complete\n");
	} else {
		err = brcmf_fil_bsscfg_data_set(ifp, "ssid", &ssid_le,
						sizeof(ssid_le));
		if (err < 0) {
			brcmf_err("setting ssid failed %d\n", err);
			goto exit;
		}
4458
		bss_enable.bsscfgidx = cpu_to_le32(ifp->bsscfgidx);
4459 4460 4461 4462 4463 4464 4465 4466 4467 4468
		bss_enable.enable = cpu_to_le32(1);
		err = brcmf_fil_iovar_data_set(ifp, "bss", &bss_enable,
					       sizeof(bss_enable));
		if (err < 0) {
			brcmf_err("bss_enable config failed %d\n", err);
			goto exit;
		}

		brcmf_dbg(TRACE, "GO mode configuration complete\n");
	}
4469
	set_bit(BRCMF_VIF_STATUS_AP_CREATED, &ifp->vif->sme_state);
4470
	brcmf_net_setcarrier(ifp, true);
4471 4472

exit:
4473
	if ((err) && (!mbss)) {
4474
		brcmf_set_mpc(ifp, 1);
4475 4476
		brcmf_configure_arp_offload(ifp, true);
	}
4477 4478 4479 4480 4481
	return err;
}

static int brcmf_cfg80211_stop_ap(struct wiphy *wiphy, struct net_device *ndev)
{
4482
	struct brcmf_if *ifp = netdev_priv(ndev);
Hante Meuleman's avatar
Hante Meuleman committed
4483
	s32 err;
4484
	struct brcmf_fil_bss_enable_le bss_enable;
Hante Meuleman's avatar
Hante Meuleman committed
4485
	struct brcmf_join_params join_params;
4486

4487
	brcmf_dbg(TRACE, "Enter\n");
4488

4489
	if (ifp->vif->wdev.iftype == NL80211_IFTYPE_AP) {
4490 4491 4492
		/* Due to most likely deauths outstanding we sleep */
		/* first to make sure they get processed by fw. */
		msleep(400);
Hante Meuleman's avatar
Hante Meuleman committed
4493

4494 4495 4496 4497 4498
		if (ifp->vif->mbss) {
			err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_DOWN, 1);
			return err;
		}

Hante Meuleman's avatar
Hante Meuleman committed
4499 4500 4501 4502 4503
		memset(&join_params, 0, sizeof(join_params));
		err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_SSID,
					     &join_params, sizeof(join_params));
		if (err < 0)
			brcmf_err("SET SSID error (%d)\n", err);
4504
		err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_DOWN, 1);
Hante Meuleman's avatar
Hante Meuleman committed
4505
		if (err < 0)
4506
			brcmf_err("BRCMF_C_DOWN error %d\n", err);
Hante Meuleman's avatar
Hante Meuleman committed
4507 4508 4509 4510 4511 4512
		err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_AP, 0);
		if (err < 0)
			brcmf_err("setting AP mode failed %d\n", err);
		err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_INFRA, 0);
		if (err < 0)
			brcmf_err("setting INFRA mode failed %d\n", err);
4513 4514
		if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MBSS))
			brcmf_fil_iovar_int_set(ifp, "mbss", 0);
4515 4516 4517 4518 4519
		err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_REGULATORY,
					    ifp->vif->is_11d);
		if (err < 0)
			brcmf_err("restoring REGULATORY setting failed %d\n",
				  err);
4520 4521 4522 4523
		/* Bring device back up so it can be used again */
		err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_UP, 1);
		if (err < 0)
			brcmf_err("BRCMF_C_UP error %d\n", err);
4524
	} else {
4525
		bss_enable.bsscfgidx = cpu_to_le32(ifp->bsscfgidx);
4526 4527 4528 4529 4530
		bss_enable.enable = cpu_to_le32(0);
		err = brcmf_fil_iovar_data_set(ifp, "bss", &bss_enable,
					       sizeof(bss_enable));
		if (err < 0)
			brcmf_err("bss_enable config failed %d\n", err);
4531
	}
4532
	brcmf_set_mpc(ifp, 1);
4533
	brcmf_configure_arp_offload(ifp, true);
4534
	clear_bit(BRCMF_VIF_STATUS_AP_CREATED, &ifp->vif->sme_state);
4535
	brcmf_net_setcarrier(ifp, false);
4536

4537 4538 4539
	return err;
}

4540 4541 4542 4543 4544 4545 4546 4547 4548 4549 4550 4551 4552 4553
static s32
brcmf_cfg80211_change_beacon(struct wiphy *wiphy, struct net_device *ndev,
			     struct cfg80211_beacon_data *info)
{
	struct brcmf_if *ifp = netdev_priv(ndev);
	s32 err;

	brcmf_dbg(TRACE, "Enter\n");

	err = brcmf_config_ap_mgmt_ie(ifp->vif, info);

	return err;
}

4554 4555
static int
brcmf_cfg80211_del_station(struct wiphy *wiphy, struct net_device *ndev,
4556
			   struct station_del_parameters *params)
4557
{
4558
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
4559
	struct brcmf_scb_val_le scbval;
4560
	struct brcmf_if *ifp = netdev_priv(ndev);
4561 4562
	s32 err;

4563
	if (!params->mac)
4564 4565
		return -EFAULT;

4566
	brcmf_dbg(TRACE, "Enter %pM\n", params->mac);
4567

4568 4569
	if (ifp->vif == cfg->p2p.bss_idx[P2PAPI_BSSCFG_DEVICE].vif)
		ifp = cfg->p2p.bss_idx[P2PAPI_BSSCFG_PRIMARY].vif->ifp;
4570
	if (!check_vif_up(ifp->vif))
4571 4572
		return -EIO;

4573
	memcpy(&scbval.ea, params->mac, ETH_ALEN);
4574
	scbval.val = cpu_to_le32(params->reason_code);
4575
	err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SCB_DEAUTHENTICATE_FOR_REASON,
4576
				     &scbval, sizeof(scbval));
4577
	if (err)
4578
		brcmf_err("SCB_DEAUTHENTICATE_FOR_REASON failed %d\n", err);
4579

4580
	brcmf_dbg(TRACE, "Exit\n");
4581 4582 4583
	return err;
}

4584 4585 4586 4587 4588 4589 4590 4591 4592 4593 4594 4595 4596 4597 4598 4599 4600 4601 4602 4603 4604 4605 4606 4607 4608 4609 4610 4611
static int
brcmf_cfg80211_change_station(struct wiphy *wiphy, struct net_device *ndev,
			      const u8 *mac, struct station_parameters *params)
{
	struct brcmf_if *ifp = netdev_priv(ndev);
	s32 err;

	brcmf_dbg(TRACE, "Enter, MAC %pM, mask 0x%04x set 0x%04x\n", mac,
		  params->sta_flags_mask, params->sta_flags_set);

	/* Ignore all 00 MAC */
	if (is_zero_ether_addr(mac))
		return 0;

	if (!(params->sta_flags_mask & BIT(NL80211_STA_FLAG_AUTHORIZED)))
		return 0;

	if (params->sta_flags_set & BIT(NL80211_STA_FLAG_AUTHORIZED))
		err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_SCB_AUTHORIZE,
					     (void *)mac, ETH_ALEN);
	else
		err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_SCB_DEAUTHORIZE,
					     (void *)mac, ETH_ALEN);
	if (err < 0)
		brcmf_err("Setting SCB (de-)authorize failed, %d\n", err);

	return err;
}
4612 4613 4614 4615 4616 4617

static void
brcmf_cfg80211_mgmt_frame_register(struct wiphy *wiphy,
				   struct wireless_dev *wdev,
				   u16 frame_type, bool reg)
{
4618
	struct brcmf_cfg80211_vif *vif;
4619 4620 4621 4622 4623
	u16 mgmt_type;

	brcmf_dbg(TRACE, "Enter, frame_type %04x, reg=%d\n", frame_type, reg);

	mgmt_type = (frame_type & IEEE80211_FCTL_STYPE) >> 4;
4624
	vif = container_of(wdev, struct brcmf_cfg80211_vif, wdev);
4625 4626 4627
	if (reg)
		vif->mgmt_rx_reg |= BIT(mgmt_type);
	else
4628
		vif->mgmt_rx_reg &= ~BIT(mgmt_type);
4629 4630 4631 4632 4633
}


static int
brcmf_cfg80211_mgmt_tx(struct wiphy *wiphy, struct wireless_dev *wdev,
4634
		       struct cfg80211_mgmt_tx_params *params, u64 *cookie)
4635 4636
{
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
4637 4638 4639
	struct ieee80211_channel *chan = params->chan;
	const u8 *buf = params->buf;
	size_t len = params->len;
4640 4641 4642 4643 4644
	const struct ieee80211_mgmt *mgmt;
	struct brcmf_cfg80211_vif *vif;
	s32 err = 0;
	s32 ie_offset;
	s32 ie_len;
4645 4646 4647 4648
	struct brcmf_fil_action_frame_le *action_frame;
	struct brcmf_fil_af_params_le *af_params;
	bool ack;
	s32 chan_nr;
4649
	u32 freq;
4650 4651 4652 4653 4654 4655 4656

	brcmf_dbg(TRACE, "Enter\n");

	*cookie = 0;

	mgmt = (const struct ieee80211_mgmt *)buf;

4657 4658 4659 4660
	if (!ieee80211_is_mgmt(mgmt->frame_control)) {
		brcmf_err("Driver only allows MGMT packet type\n");
		return -EPERM;
	}
4661

4662 4663
	vif = container_of(wdev, struct brcmf_cfg80211_vif, wdev);

4664 4665 4666 4667 4668 4669 4670 4671 4672 4673 4674 4675 4676 4677 4678 4679
	if (ieee80211_is_probe_resp(mgmt->frame_control)) {
		/* Right now the only reason to get a probe response */
		/* is for p2p listen response or for p2p GO from     */
		/* wpa_supplicant. Unfortunately the probe is send   */
		/* on primary ndev, while dongle wants it on the p2p */
		/* vif. Since this is only reason for a probe        */
		/* response to be sent, the vif is taken from cfg.   */
		/* If ever desired to send proberesp for non p2p     */
		/* response then data should be checked for          */
		/* "DIRECT-". Note in future supplicant will take    */
		/* dedicated p2p wdev to do this and then this 'hack'*/
		/* is not needed anymore.                            */
		ie_offset =  DOT11_MGMT_HDR_LEN +
			     DOT11_BCN_PRB_FIXED_LEN;
		ie_len = len - ie_offset;
		if (vif == cfg->p2p.bss_idx[P2PAPI_BSSCFG_PRIMARY].vif)
4680
			vif = cfg->p2p.bss_idx[P2PAPI_BSSCFG_DEVICE].vif;
4681 4682 4683 4684 4685 4686
		err = brcmf_vif_set_mgmt_ie(vif,
					    BRCMF_VNDR_IE_PRBRSP_FLAG,
					    &buf[ie_offset],
					    ie_len);
		cfg80211_mgmt_tx_status(wdev, *cookie, buf, len, true,
					GFP_KERNEL);
4687 4688 4689 4690 4691 4692 4693 4694 4695 4696 4697 4698 4699 4700 4701
	} else if (ieee80211_is_action(mgmt->frame_control)) {
		af_params = kzalloc(sizeof(*af_params), GFP_KERNEL);
		if (af_params == NULL) {
			brcmf_err("unable to allocate frame\n");
			err = -ENOMEM;
			goto exit;
		}
		action_frame = &af_params->action_frame;
		/* Add the packet Id */
		action_frame->packet_id = cpu_to_le32(*cookie);
		/* Add BSSID */
		memcpy(&action_frame->da[0], &mgmt->da[0], ETH_ALEN);
		memcpy(&af_params->bssid[0], &mgmt->bssid[0], ETH_ALEN);
		/* Add the length exepted for 802.11 header  */
		action_frame->len = cpu_to_le16(len - DOT11_MGMT_HDR_LEN);
4702 4703 4704 4705 4706 4707 4708 4709 4710
		/* Add the channel. Use the one specified as parameter if any or
		 * the current one (got from the firmware) otherwise
		 */
		if (chan)
			freq = chan->center_freq;
		else
			brcmf_fil_cmd_int_get(vif->ifp, BRCMF_C_GET_CHANNEL,
					      &freq);
		chan_nr = ieee80211_frequency_to_channel(freq);
4711 4712 4713 4714 4715 4716
		af_params->channel = cpu_to_le32(chan_nr);

		memcpy(action_frame->data, &buf[DOT11_MGMT_HDR_LEN],
		       le16_to_cpu(action_frame->len));

		brcmf_dbg(TRACE, "Action frame, cookie=%lld, len=%d, freq=%d\n",
4717
			  *cookie, le16_to_cpu(action_frame->len), freq);
4718

4719
		ack = brcmf_p2p_send_action_frame(cfg, cfg_to_ndev(cfg),
4720 4721 4722 4723 4724
						  af_params);

		cfg80211_mgmt_tx_status(wdev, *cookie, buf, len, ack,
					GFP_KERNEL);
		kfree(af_params);
4725 4726 4727
	} else {
		brcmf_dbg(TRACE, "Unhandled, fc=%04x!!\n", mgmt->frame_control);
		brcmf_dbg_hex_dump(true, buf, len, "payload, len=%Zu\n", len);
4728
	}
4729

4730
exit:
4731 4732 4733 4734 4735 4736 4737 4738 4739 4740 4741 4742 4743 4744 4745 4746 4747 4748 4749 4750 4751 4752 4753 4754 4755 4756
	return err;
}


static int
brcmf_cfg80211_cancel_remain_on_channel(struct wiphy *wiphy,
					struct wireless_dev *wdev,
					u64 cookie)
{
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
	struct brcmf_cfg80211_vif *vif;
	int err = 0;

	brcmf_dbg(TRACE, "Enter p2p listen cancel\n");

	vif = cfg->p2p.bss_idx[P2PAPI_BSSCFG_DEVICE].vif;
	if (vif == NULL) {
		brcmf_err("No p2p device available for probe response\n");
		err = -ENODEV;
		goto exit;
	}
	brcmf_p2p_cancel_remain_on_channel(vif->ifp);
exit:
	return err;
}

4757 4758 4759 4760 4761 4762 4763 4764 4765 4766 4767 4768 4769 4770 4771 4772 4773 4774 4775 4776 4777 4778 4779 4780 4781 4782 4783 4784 4785 4786 4787 4788 4789
static int brcmf_cfg80211_crit_proto_start(struct wiphy *wiphy,
					   struct wireless_dev *wdev,
					   enum nl80211_crit_proto_id proto,
					   u16 duration)
{
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
	struct brcmf_cfg80211_vif *vif;

	vif = container_of(wdev, struct brcmf_cfg80211_vif, wdev);

	/* only DHCP support for now */
	if (proto != NL80211_CRIT_PROTO_DHCP)
		return -EINVAL;

	/* suppress and abort scanning */
	set_bit(BRCMF_SCAN_STATUS_SUPPRESS, &cfg->scan_status);
	brcmf_abort_scanning(cfg);

	return brcmf_btcoex_set_mode(vif, BRCMF_BTCOEX_DISABLED, duration);
}

static void brcmf_cfg80211_crit_proto_stop(struct wiphy *wiphy,
					   struct wireless_dev *wdev)
{
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
	struct brcmf_cfg80211_vif *vif;

	vif = container_of(wdev, struct brcmf_cfg80211_vif, wdev);

	brcmf_btcoex_set_mode(vif, BRCMF_BTCOEX_ENABLED, 0);
	clear_bit(BRCMF_SCAN_STATUS_SUPPRESS, &cfg->scan_status);
}

4790 4791 4792 4793 4794 4795 4796 4797 4798 4799 4800 4801 4802 4803 4804 4805 4806 4807 4808 4809 4810
static s32
brcmf_notify_tdls_peer_event(struct brcmf_if *ifp,
			     const struct brcmf_event_msg *e, void *data)
{
	switch (e->reason) {
	case BRCMF_E_REASON_TDLS_PEER_DISCOVERED:
		brcmf_dbg(TRACE, "TDLS Peer Discovered\n");
		break;
	case BRCMF_E_REASON_TDLS_PEER_CONNECTED:
		brcmf_dbg(TRACE, "TDLS Peer Connected\n");
		brcmf_proto_add_tdls_peer(ifp->drvr, ifp->ifidx, (u8 *)e->addr);
		break;
	case BRCMF_E_REASON_TDLS_PEER_DISCONNECTED:
		brcmf_dbg(TRACE, "TDLS Peer Disconnected\n");
		brcmf_proto_delete_peer(ifp->drvr, ifp->ifidx, (u8 *)e->addr);
		break;
	}

	return 0;
}

4811 4812 4813 4814 4815 4816 4817 4818 4819 4820 4821 4822 4823 4824 4825 4826 4827 4828 4829 4830 4831 4832
static int brcmf_convert_nl80211_tdls_oper(enum nl80211_tdls_operation oper)
{
	int ret;

	switch (oper) {
	case NL80211_TDLS_DISCOVERY_REQ:
		ret = BRCMF_TDLS_MANUAL_EP_DISCOVERY;
		break;
	case NL80211_TDLS_SETUP:
		ret = BRCMF_TDLS_MANUAL_EP_CREATE;
		break;
	case NL80211_TDLS_TEARDOWN:
		ret = BRCMF_TDLS_MANUAL_EP_DELETE;
		break;
	default:
		brcmf_err("unsupported operation: %d\n", oper);
		ret = -EOPNOTSUPP;
	}
	return ret;
}

static int brcmf_cfg80211_tdls_oper(struct wiphy *wiphy,
4833
				    struct net_device *ndev, const u8 *peer,
4834 4835 4836 4837 4838 4839 4840 4841 4842 4843 4844 4845 4846 4847 4848 4849 4850 4851 4852 4853 4854 4855 4856 4857
				    enum nl80211_tdls_operation oper)
{
	struct brcmf_if *ifp;
	struct brcmf_tdls_iovar_le info;
	int ret = 0;

	ret = brcmf_convert_nl80211_tdls_oper(oper);
	if (ret < 0)
		return ret;

	ifp = netdev_priv(ndev);
	memset(&info, 0, sizeof(info));
	info.mode = (u8)ret;
	if (peer)
		memcpy(info.ea, peer, ETH_ALEN);

	ret = brcmf_fil_iovar_data_set(ifp, "tdls_endpoint",
				       &info, sizeof(info));
	if (ret < 0)
		brcmf_err("tdls_endpoint iovar failed: ret=%d\n", ret);

	return ret;
}

4858
static struct cfg80211_ops wl_cfg80211_ops = {
4859 4860
	.add_virtual_intf = brcmf_cfg80211_add_iface,
	.del_virtual_intf = brcmf_cfg80211_del_iface,
4861 4862 4863 4864 4865 4866
	.change_virtual_intf = brcmf_cfg80211_change_iface,
	.scan = brcmf_cfg80211_scan,
	.set_wiphy_params = brcmf_cfg80211_set_wiphy_params,
	.join_ibss = brcmf_cfg80211_join_ibss,
	.leave_ibss = brcmf_cfg80211_leave_ibss,
	.get_station = brcmf_cfg80211_get_station,
4867
	.dump_station = brcmf_cfg80211_dump_station,
4868 4869 4870 4871 4872 4873 4874 4875 4876 4877 4878 4879 4880 4881
	.set_tx_power = brcmf_cfg80211_set_tx_power,
	.get_tx_power = brcmf_cfg80211_get_tx_power,
	.add_key = brcmf_cfg80211_add_key,
	.del_key = brcmf_cfg80211_del_key,
	.get_key = brcmf_cfg80211_get_key,
	.set_default_key = brcmf_cfg80211_config_default_key,
	.set_default_mgmt_key = brcmf_cfg80211_config_default_mgmt_key,
	.set_power_mgmt = brcmf_cfg80211_set_power_mgmt,
	.connect = brcmf_cfg80211_connect,
	.disconnect = brcmf_cfg80211_disconnect,
	.suspend = brcmf_cfg80211_suspend,
	.resume = brcmf_cfg80211_resume,
	.set_pmksa = brcmf_cfg80211_set_pmksa,
	.del_pmksa = brcmf_cfg80211_del_pmksa,
4882
	.flush_pmksa = brcmf_cfg80211_flush_pmksa,
4883 4884
	.start_ap = brcmf_cfg80211_start_ap,
	.stop_ap = brcmf_cfg80211_stop_ap,
4885
	.change_beacon = brcmf_cfg80211_change_beacon,
4886
	.del_station = brcmf_cfg80211_del_station,
4887
	.change_station = brcmf_cfg80211_change_station,
4888 4889
	.sched_scan_start = brcmf_cfg80211_sched_scan_start,
	.sched_scan_stop = brcmf_cfg80211_sched_scan_stop,
4890 4891 4892 4893
	.mgmt_frame_register = brcmf_cfg80211_mgmt_frame_register,
	.mgmt_tx = brcmf_cfg80211_mgmt_tx,
	.remain_on_channel = brcmf_p2p_remain_on_channel,
	.cancel_remain_on_channel = brcmf_cfg80211_cancel_remain_on_channel,
4894 4895
	.start_p2p_device = brcmf_p2p_start_device,
	.stop_p2p_device = brcmf_p2p_stop_device,
4896 4897
	.crit_proto_start = brcmf_cfg80211_crit_proto_start,
	.crit_proto_stop = brcmf_cfg80211_crit_proto_stop,
4898
	.tdls_oper = brcmf_cfg80211_tdls_oper,
4899 4900
};

4901
struct brcmf_cfg80211_vif *brcmf_alloc_vif(struct brcmf_cfg80211_info *cfg,
4902 4903
					   enum nl80211_iftype type,
					   bool pm_block)
4904
{
4905
	struct brcmf_cfg80211_vif *vif_walk;
4906
	struct brcmf_cfg80211_vif *vif;
4907
	bool mbss;
4908

4909
	brcmf_dbg(TRACE, "allocating virtual interface (size=%zu)\n",
4910
		  sizeof(*vif));
4911 4912 4913 4914 4915
	vif = kzalloc(sizeof(*vif), GFP_KERNEL);
	if (!vif)
		return ERR_PTR(-ENOMEM);

	vif->wdev.wiphy = cfg->wiphy;
4916
	vif->wdev.iftype = type;
4917

4918 4919
	vif->pm_block = pm_block;

4920 4921
	brcmf_init_prof(&vif->profile);

4922 4923 4924 4925 4926 4927 4928 4929 4930 4931 4932
	if (type == NL80211_IFTYPE_AP) {
		mbss = false;
		list_for_each_entry(vif_walk, &cfg->vif_list, list) {
			if (vif_walk->wdev.iftype == NL80211_IFTYPE_AP) {
				mbss = true;
				break;
			}
		}
		vif->mbss = mbss;
	}

4933 4934
	list_add_tail(&vif->list, &cfg->vif_list);
	return vif;
4935 4936
}

4937
void brcmf_free_vif(struct brcmf_cfg80211_vif *vif)
4938
{
4939 4940
	list_del(&vif->list);
	kfree(vif);
4941 4942
}

4943 4944 4945 4946 4947 4948 4949 4950
void brcmf_cfg80211_free_netdev(struct net_device *ndev)
{
	struct brcmf_cfg80211_vif *vif;
	struct brcmf_if *ifp;

	ifp = netdev_priv(ndev);
	vif = ifp->vif;

4951 4952
	if (vif)
		brcmf_free_vif(vif);
4953 4954 4955
	free_netdev(ndev);
}

4956
static bool brcmf_is_linkup(const struct brcmf_event_msg *e)
4957
{
4958 4959
	u32 event = e->event_code;
	u32 status = e->status;
4960 4961

	if (event == BRCMF_E_SET_SSID && status == BRCMF_E_STATUS_SUCCESS) {
4962
		brcmf_dbg(CONN, "Processing set ssid\n");
4963 4964 4965 4966 4967 4968
		return true;
	}

	return false;
}

4969
static bool brcmf_is_linkdown(const struct brcmf_event_msg *e)
4970
{
4971 4972
	u32 event = e->event_code;
	u16 flags = e->flags;
4973

4974 4975 4976
	if ((event == BRCMF_E_DEAUTH) || (event == BRCMF_E_DEAUTH_IND) ||
	    (event == BRCMF_E_DISASSOC_IND) ||
	    ((event == BRCMF_E_LINK) && (!(flags & BRCMF_EVENT_MSG_LINK)))) {
4977
		brcmf_dbg(CONN, "Processing link down\n");
4978 4979 4980 4981 4982
		return true;
	}
	return false;
}

4983
static bool brcmf_is_nonetwork(struct brcmf_cfg80211_info *cfg,
4984 4985
			       const struct brcmf_event_msg *e)
{
4986 4987
	u32 event = e->event_code;
	u32 status = e->status;
4988 4989

	if (event == BRCMF_E_LINK && status == BRCMF_E_STATUS_NO_NETWORKS) {
4990 4991
		brcmf_dbg(CONN, "Processing Link %s & no network found\n",
			  e->flags & BRCMF_EVENT_MSG_LINK ? "up" : "down");
4992 4993 4994 4995
		return true;
	}

	if (event == BRCMF_E_SET_SSID && status != BRCMF_E_STATUS_SUCCESS) {
4996
		brcmf_dbg(CONN, "Processing connecting & no network found\n");
4997 4998 4999 5000 5001 5002
		return true;
	}

	return false;
}

5003
static void brcmf_clear_assoc_ies(struct brcmf_cfg80211_info *cfg)
5004
{
5005
	struct brcmf_cfg80211_connect_info *conn_info = cfg_to_conn(cfg);
5006 5007 5008 5009 5010 5011 5012 5013 5014

	kfree(conn_info->req_ie);
	conn_info->req_ie = NULL;
	conn_info->req_ie_len = 0;
	kfree(conn_info->resp_ie);
	conn_info->resp_ie = NULL;
	conn_info->resp_ie_len = 0;
}

5015 5016
static s32 brcmf_get_assoc_ies(struct brcmf_cfg80211_info *cfg,
			       struct brcmf_if *ifp)
5017
{
5018
	struct brcmf_cfg80211_assoc_ielen_le *assoc_info;
5019
	struct brcmf_cfg80211_connect_info *conn_info = cfg_to_conn(cfg);
5020 5021 5022 5023
	u32 req_len;
	u32 resp_len;
	s32 err = 0;

5024
	brcmf_clear_assoc_ies(cfg);
5025

5026 5027
	err = brcmf_fil_iovar_data_get(ifp, "assoc_info",
				       cfg->extra_buf, WL_ASSOC_INFO_MAX);
5028
	if (err) {
5029
		brcmf_err("could not get assoc info (%d)\n", err);
5030 5031
		return err;
	}
5032
	assoc_info =
5033
		(struct brcmf_cfg80211_assoc_ielen_le *)cfg->extra_buf;
5034 5035
	req_len = le32_to_cpu(assoc_info->req_len);
	resp_len = le32_to_cpu(assoc_info->resp_len);
5036
	if (req_len) {
5037
		err = brcmf_fil_iovar_data_get(ifp, "assoc_req_ies",
5038 5039
					       cfg->extra_buf,
					       WL_ASSOC_INFO_MAX);
5040
		if (err) {
5041
			brcmf_err("could not get assoc req (%d)\n", err);
5042 5043 5044 5045
			return err;
		}
		conn_info->req_ie_len = req_len;
		conn_info->req_ie =
5046
		    kmemdup(cfg->extra_buf, conn_info->req_ie_len,
5047 5048 5049 5050 5051 5052
			    GFP_KERNEL);
	} else {
		conn_info->req_ie_len = 0;
		conn_info->req_ie = NULL;
	}
	if (resp_len) {
5053
		err = brcmf_fil_iovar_data_get(ifp, "assoc_resp_ies",
5054 5055
					       cfg->extra_buf,
					       WL_ASSOC_INFO_MAX);
5056
		if (err) {
5057
			brcmf_err("could not get assoc resp (%d)\n", err);
5058 5059 5060 5061
			return err;
		}
		conn_info->resp_ie_len = resp_len;
		conn_info->resp_ie =
5062
		    kmemdup(cfg->extra_buf, conn_info->resp_ie_len,
5063 5064 5065 5066 5067
			    GFP_KERNEL);
	} else {
		conn_info->resp_ie_len = 0;
		conn_info->resp_ie = NULL;
	}
5068 5069
	brcmf_dbg(CONN, "req len (%d) resp len (%d)\n",
		  conn_info->req_ie_len, conn_info->resp_ie_len);
5070 5071 5072 5073 5074

	return err;
}

static s32
5075
brcmf_bss_roaming_done(struct brcmf_cfg80211_info *cfg,
5076 5077 5078
		       struct net_device *ndev,
		       const struct brcmf_event_msg *e)
{
5079 5080
	struct brcmf_if *ifp = netdev_priv(ndev);
	struct brcmf_cfg80211_profile *profile = &ifp->vif->profile;
5081 5082
	struct brcmf_cfg80211_connect_info *conn_info = cfg_to_conn(cfg);
	struct wiphy *wiphy = cfg_to_wiphy(cfg);
5083
	struct ieee80211_channel *notify_channel = NULL;
5084
	struct ieee80211_supported_band *band;
5085
	struct brcmf_bss_info_le *bi;
5086
	struct brcmu_chan ch;
5087 5088
	u32 freq;
	s32 err = 0;
5089
	u8 *buf;
5090

5091
	brcmf_dbg(TRACE, "Enter\n");
5092

5093
	brcmf_get_assoc_ies(cfg, ifp);
5094
	memcpy(profile->bssid, e->addr, ETH_ALEN);
5095
	brcmf_update_bss_info(cfg, ifp);
5096

5097 5098 5099 5100 5101 5102 5103 5104
	buf = kzalloc(WL_BSS_INFO_MAX, GFP_KERNEL);
	if (buf == NULL) {
		err = -ENOMEM;
		goto done;
	}

	/* data sent to dongle has to be little endian */
	*(__le32 *)buf = cpu_to_le32(WL_BSS_INFO_MAX);
5105
	err = brcmf_fil_cmd_data_get(ifp, BRCMF_C_GET_BSS_INFO,
5106
				     buf, WL_BSS_INFO_MAX);
5107 5108 5109

	if (err)
		goto done;
5110

5111
	bi = (struct brcmf_bss_info_le *)(buf + 4);
5112 5113
	ch.chspec = le16_to_cpu(bi->chanspec);
	cfg->d11inf.decchspec(&ch);
5114

5115
	if (ch.band == BRCMU_CHAN_BAND_2G)
5116 5117 5118 5119
		band = wiphy->bands[IEEE80211_BAND_2GHZ];
	else
		band = wiphy->bands[IEEE80211_BAND_5GHZ];

5120
	freq = ieee80211_channel_to_frequency(ch.chnum, band->band);
5121 5122
	notify_channel = ieee80211_get_channel(wiphy, freq);

5123 5124
done:
	kfree(buf);
5125
	cfg80211_roamed(ndev, notify_channel, (u8 *)profile->bssid,
5126 5127
			conn_info->req_ie, conn_info->req_ie_len,
			conn_info->resp_ie, conn_info->resp_ie_len, GFP_KERNEL);
5128
	brcmf_dbg(CONN, "Report roaming result\n");
5129

5130
	set_bit(BRCMF_VIF_STATUS_CONNECTED, &ifp->vif->sme_state);
5131
	brcmf_dbg(TRACE, "Exit\n");
5132 5133 5134 5135
	return err;
}

static s32
5136
brcmf_bss_connect_done(struct brcmf_cfg80211_info *cfg,
5137 5138 5139
		       struct net_device *ndev, const struct brcmf_event_msg *e,
		       bool completed)
{
5140 5141
	struct brcmf_if *ifp = netdev_priv(ndev);
	struct brcmf_cfg80211_profile *profile = &ifp->vif->profile;
5142
	struct brcmf_cfg80211_connect_info *conn_info = cfg_to_conn(cfg);
5143

5144
	brcmf_dbg(TRACE, "Enter\n");
5145

5146 5147
	if (test_and_clear_bit(BRCMF_VIF_STATUS_CONNECTING,
			       &ifp->vif->sme_state)) {
5148
		if (completed) {
5149
			brcmf_get_assoc_ies(cfg, ifp);
5150
			memcpy(profile->bssid, e->addr, ETH_ALEN);
5151 5152 5153
			brcmf_update_bss_info(cfg, ifp);
			set_bit(BRCMF_VIF_STATUS_CONNECTED,
				&ifp->vif->sme_state);
5154 5155
		}
		cfg80211_connect_result(ndev,
5156
					(u8 *)profile->bssid,
5157 5158 5159 5160 5161 5162 5163
					conn_info->req_ie,
					conn_info->req_ie_len,
					conn_info->resp_ie,
					conn_info->resp_ie_len,
					completed ? WLAN_STATUS_SUCCESS :
						    WLAN_STATUS_AUTH_TIMEOUT,
					GFP_KERNEL);
5164 5165
		brcmf_dbg(CONN, "Report connect result - connection %s\n",
			  completed ? "succeeded" : "failed");
5166
	}
5167
	brcmf_dbg(TRACE, "Exit\n");
5168
	return 0;
5169 5170 5171
}

static s32
5172
brcmf_notify_connect_status_ap(struct brcmf_cfg80211_info *cfg,
5173 5174 5175
			       struct net_device *ndev,
			       const struct brcmf_event_msg *e, void *data)
{
5176
	struct brcmf_if *ifp = netdev_priv(ndev);
5177
	static int generation;
5178 5179
	u32 event = e->event_code;
	u32 reason = e->reason;
5180 5181
	struct station_info sinfo;

5182
	brcmf_dbg(CONN, "event %d, reason %d\n", event, reason);
5183 5184 5185 5186
	if (event == BRCMF_E_LINK && reason == BRCMF_E_REASON_LINK_BSSCFG_DIS &&
	    ndev != cfg_to_ndev(cfg)) {
		brcmf_dbg(CONN, "AP mode link down\n");
		complete(&cfg->vif_disabled);
5187
		if (ifp->vif->mbss)
5188
			brcmf_remove_interface(ifp);
5189 5190
		return 0;
	}
5191 5192

	if (((event == BRCMF_E_ASSOC_IND) || (event == BRCMF_E_REASSOC_IND)) &&
5193 5194
	    (reason == BRCMF_E_STATUS_SUCCESS)) {
		memset(&sinfo, 0, sizeof(sinfo));
5195
		if (!data) {
5196
			brcmf_err("No IEs present in ASSOC/REASSOC_IND");
5197 5198 5199
			return -EINVAL;
		}
		sinfo.assoc_req_ies = data;
5200
		sinfo.assoc_req_ies_len = e->datalen;
5201 5202
		generation++;
		sinfo.generation = generation;
5203
		cfg80211_new_sta(ndev, e->addr, &sinfo, GFP_KERNEL);
5204 5205 5206
	} else if ((event == BRCMF_E_DISASSOC_IND) ||
		   (event == BRCMF_E_DEAUTH_IND) ||
		   (event == BRCMF_E_DEAUTH)) {
5207
		cfg80211_del_sta(ndev, e->addr, GFP_KERNEL);
5208
	}
5209
	return 0;
5210 5211
}

5212
static s32
5213
brcmf_notify_connect_status(struct brcmf_if *ifp,
5214 5215
			    const struct brcmf_event_msg *e, void *data)
{
5216 5217
	struct brcmf_cfg80211_info *cfg = ifp->drvr->config;
	struct net_device *ndev = ifp->ndev;
5218
	struct brcmf_cfg80211_profile *profile = &ifp->vif->profile;
5219
	struct ieee80211_channel *chan;
5220 5221
	s32 err = 0;

5222 5223 5224 5225 5226 5227 5228
	if ((e->event_code == BRCMF_E_DEAUTH) ||
	    (e->event_code == BRCMF_E_DEAUTH_IND) ||
	    (e->event_code == BRCMF_E_DISASSOC_IND) ||
	    ((e->event_code == BRCMF_E_LINK) && (!e->flags))) {
		brcmf_proto_delete_peer(ifp->drvr, ifp->ifidx, (u8 *)e->addr);
	}

5229
	if (brcmf_is_apmode(ifp->vif)) {
5230
		err = brcmf_notify_connect_status_ap(cfg, ndev, e, data);
5231
	} else if (brcmf_is_linkup(e)) {
5232
		brcmf_dbg(CONN, "Linkup\n");
5233
		if (brcmf_is_ibssmode(ifp->vif)) {
Hante Meuleman's avatar
Hante Meuleman committed
5234
			brcmf_inform_ibss(cfg, ndev, e->addr);
5235
			chan = ieee80211_get_channel(cfg->wiphy, cfg->channel);
5236
			memcpy(profile->bssid, e->addr, ETH_ALEN);
5237
			cfg80211_ibss_joined(ndev, e->addr, chan, GFP_KERNEL);
5238 5239 5240 5241
			clear_bit(BRCMF_VIF_STATUS_CONNECTING,
				  &ifp->vif->sme_state);
			set_bit(BRCMF_VIF_STATUS_CONNECTED,
				&ifp->vif->sme_state);
5242
		} else
5243
			brcmf_bss_connect_done(cfg, ndev, e, true);
5244
		brcmf_net_setcarrier(ifp, true);
5245
	} else if (brcmf_is_linkdown(e)) {
5246
		brcmf_dbg(CONN, "Linkdown\n");
5247
		if (!brcmf_is_ibssmode(ifp->vif)) {
5248
			brcmf_bss_connect_done(cfg, ndev, e, false);
5249 5250 5251 5252 5253 5254
			brcmf_link_down(ifp->vif,
					brcmf_map_fw_linkdown_reason(e));
			brcmf_init_prof(ndev_to_prof(ndev));
			if (ndev != cfg_to_ndev(cfg))
				complete(&cfg->vif_disabled);
			brcmf_net_setcarrier(ifp, false);
5255
		}
5256
	} else if (brcmf_is_nonetwork(cfg, e)) {
5257
		if (brcmf_is_ibssmode(ifp->vif))
5258 5259
			clear_bit(BRCMF_VIF_STATUS_CONNECTING,
				  &ifp->vif->sme_state);
5260
		else
5261
			brcmf_bss_connect_done(cfg, ndev, e, false);
5262 5263 5264 5265 5266 5267
	}

	return err;
}

static s32
5268
brcmf_notify_roaming_status(struct brcmf_if *ifp,
5269 5270
			    const struct brcmf_event_msg *e, void *data)
{
5271
	struct brcmf_cfg80211_info *cfg = ifp->drvr->config;
5272 5273
	u32 event = e->event_code;
	u32 status = e->status;
5274 5275

	if (event == BRCMF_E_ROAM && status == BRCMF_E_STATUS_SUCCESS) {
5276
		if (test_bit(BRCMF_VIF_STATUS_CONNECTED, &ifp->vif->sme_state))
5277
			brcmf_bss_roaming_done(cfg, ifp->ndev, e);
5278
		else
5279
			brcmf_bss_connect_done(cfg, ifp->ndev, e, true);
5280 5281
	}

5282
	return 0;
5283 5284 5285
}

static s32
5286
brcmf_notify_mic_status(struct brcmf_if *ifp,
5287 5288
			const struct brcmf_event_msg *e, void *data)
{
5289
	u16 flags = e->flags;
5290 5291 5292 5293 5294 5295 5296
	enum nl80211_key_type key_type;

	if (flags & BRCMF_EVENT_MSG_GROUP)
		key_type = NL80211_KEYTYPE_GROUP;
	else
		key_type = NL80211_KEYTYPE_PAIRWISE;

5297
	cfg80211_michael_mic_failure(ifp->ndev, (u8 *)&e->addr, key_type, -1,
5298 5299 5300 5301 5302
				     NULL, GFP_KERNEL);

	return 0;
}

5303 5304 5305 5306 5307 5308 5309 5310
static s32 brcmf_notify_vif_event(struct brcmf_if *ifp,
				  const struct brcmf_event_msg *e, void *data)
{
	struct brcmf_cfg80211_info *cfg = ifp->drvr->config;
	struct brcmf_if_event *ifevent = (struct brcmf_if_event *)data;
	struct brcmf_cfg80211_vif_event *event = &cfg->vif_event;
	struct brcmf_cfg80211_vif *vif;

5311
	brcmf_dbg(TRACE, "Enter: action %u flags %u ifidx %u bsscfgidx %u\n",
5312
		  ifevent->action, ifevent->flags, ifevent->ifidx,
5313
		  ifevent->bsscfgidx);
5314 5315 5316 5317 5318 5319 5320 5321

	mutex_lock(&event->vif_event_lock);
	event->action = ifevent->action;
	vif = event->vif;

	switch (ifevent->action) {
	case BRCMF_E_IF_ADD:
		/* waiting process may have timed out */
5322 5323
		if (!cfg->vif_event.vif) {
			mutex_unlock(&event->vif_event_lock);
5324
			return -EBADF;
5325
		}
5326 5327 5328

		ifp->vif = vif;
		vif->ifp = ifp;
5329 5330 5331 5332 5333
		if (ifp->ndev) {
			vif->wdev.netdev = ifp->ndev;
			ifp->ndev->ieee80211_ptr = &vif->wdev;
			SET_NETDEV_DEV(ifp->ndev, wiphy_dev(cfg->wiphy));
		}
5334 5335
		mutex_unlock(&event->vif_event_lock);
		wake_up(&event->vif_wq);
5336
		return 0;
5337 5338 5339 5340 5341 5342 5343 5344

	case BRCMF_E_IF_DEL:
		mutex_unlock(&event->vif_event_lock);
		/* event may not be upon user request */
		if (brcmf_cfg80211_vif_event_armed(cfg))
			wake_up(&event->vif_wq);
		return 0;

5345 5346 5347 5348 5349
	case BRCMF_E_IF_CHANGE:
		mutex_unlock(&event->vif_event_lock);
		wake_up(&event->vif_wq);
		return 0;

5350 5351 5352 5353 5354 5355 5356
	default:
		mutex_unlock(&event->vif_event_lock);
		break;
	}
	return -EINVAL;
}

5357 5358 5359 5360 5361 5362 5363 5364
static void brcmf_init_conf(struct brcmf_cfg80211_conf *conf)
{
	conf->frag_threshold = (u32)-1;
	conf->rts_threshold = (u32)-1;
	conf->retry_short = (u32)-1;
	conf->retry_long = (u32)-1;
}

5365
static void brcmf_register_event_handlers(struct brcmf_cfg80211_info *cfg)
5366
{
5367 5368 5369 5370 5371 5372 5373 5374 5375 5376 5377 5378 5379 5380 5381 5382 5383 5384 5385 5386
	brcmf_fweh_register(cfg->pub, BRCMF_E_LINK,
			    brcmf_notify_connect_status);
	brcmf_fweh_register(cfg->pub, BRCMF_E_DEAUTH_IND,
			    brcmf_notify_connect_status);
	brcmf_fweh_register(cfg->pub, BRCMF_E_DEAUTH,
			    brcmf_notify_connect_status);
	brcmf_fweh_register(cfg->pub, BRCMF_E_DISASSOC_IND,
			    brcmf_notify_connect_status);
	brcmf_fweh_register(cfg->pub, BRCMF_E_ASSOC_IND,
			    brcmf_notify_connect_status);
	brcmf_fweh_register(cfg->pub, BRCMF_E_REASSOC_IND,
			    brcmf_notify_connect_status);
	brcmf_fweh_register(cfg->pub, BRCMF_E_ROAM,
			    brcmf_notify_roaming_status);
	brcmf_fweh_register(cfg->pub, BRCMF_E_MIC_ERROR,
			    brcmf_notify_mic_status);
	brcmf_fweh_register(cfg->pub, BRCMF_E_SET_SSID,
			    brcmf_notify_connect_status);
	brcmf_fweh_register(cfg->pub, BRCMF_E_PFN_NET_FOUND,
			    brcmf_notify_sched_scan_results);
5387 5388
	brcmf_fweh_register(cfg->pub, BRCMF_E_IF,
			    brcmf_notify_vif_event);
5389
	brcmf_fweh_register(cfg->pub, BRCMF_E_P2P_PROBEREQ_MSG,
5390
			    brcmf_p2p_notify_rx_mgmt_p2p_probereq);
5391 5392
	brcmf_fweh_register(cfg->pub, BRCMF_E_P2P_DISC_LISTEN_COMPLETE,
			    brcmf_p2p_notify_listen_complete);
5393 5394
	brcmf_fweh_register(cfg->pub, BRCMF_E_ACTION_FRAME_RX,
			    brcmf_p2p_notify_action_frame_rx);
5395 5396
	brcmf_fweh_register(cfg->pub, BRCMF_E_ACTION_FRAME_COMPLETE,
			    brcmf_p2p_notify_action_tx_complete);
5397 5398
	brcmf_fweh_register(cfg->pub, BRCMF_E_ACTION_FRAME_OFF_CHAN_COMPLETE,
			    brcmf_p2p_notify_action_tx_complete);
5399 5400
}

5401 5402 5403 5404 5405 5406
static void brcmf_deinit_priv_mem(struct brcmf_cfg80211_info *cfg)
{
	kfree(cfg->conf);
	cfg->conf = NULL;
	kfree(cfg->extra_buf);
	cfg->extra_buf = NULL;
5407 5408 5409 5410
	kfree(cfg->wowl.nd);
	cfg->wowl.nd = NULL;
	kfree(cfg->wowl.nd_info);
	cfg->wowl.nd_info = NULL;
5411 5412
	kfree(cfg->escan_info.escan_buf);
	cfg->escan_info.escan_buf = NULL;
5413 5414 5415 5416 5417 5418
}

static s32 brcmf_init_priv_mem(struct brcmf_cfg80211_info *cfg)
{
	cfg->conf = kzalloc(sizeof(*cfg->conf), GFP_KERNEL);
	if (!cfg->conf)
5419
		goto init_priv_mem_out;
5420 5421
	cfg->extra_buf = kzalloc(WL_EXTRA_BUF_MAX, GFP_KERNEL);
	if (!cfg->extra_buf)
5422
		goto init_priv_mem_out;
5423 5424 5425 5426 5427 5428 5429 5430
	cfg->wowl.nd = kzalloc(sizeof(*cfg->wowl.nd) + sizeof(u32), GFP_KERNEL);
	if (!cfg->wowl.nd)
		goto init_priv_mem_out;
	cfg->wowl.nd_info = kzalloc(sizeof(*cfg->wowl.nd_info) +
				    sizeof(struct cfg80211_wowlan_nd_match *),
				    GFP_KERNEL);
	if (!cfg->wowl.nd_info)
		goto init_priv_mem_out;
5431 5432 5433
	cfg->escan_info.escan_buf = kzalloc(BRCMF_ESCAN_BUF_SIZE, GFP_KERNEL);
	if (!cfg->escan_info.escan_buf)
		goto init_priv_mem_out;
5434 5435 5436 5437

	return 0;

init_priv_mem_out:
5438
	brcmf_deinit_priv_mem(cfg);
5439 5440 5441 5442

	return -ENOMEM;
}

5443
static s32 wl_init_priv(struct brcmf_cfg80211_info *cfg)
5444 5445 5446
{
	s32 err = 0;

5447 5448
	cfg->scan_request = NULL;
	cfg->pwr_save = true;
5449 5450
	cfg->active_scan = true;	/* we do active scan per default */
	cfg->dongle_up = false;		/* dongle is not up yet */
5451
	err = brcmf_init_priv_mem(cfg);
5452 5453
	if (err)
		return err;
5454
	brcmf_register_event_handlers(cfg);
5455 5456 5457
	mutex_init(&cfg->usr_sync);
	brcmf_init_escan(cfg);
	brcmf_init_conf(cfg->conf);
5458
	init_completion(&cfg->vif_disabled);
5459 5460 5461
	return err;
}

5462
static void wl_deinit_priv(struct brcmf_cfg80211_info *cfg)
5463
{
5464 5465 5466
	cfg->dongle_up = false;	/* dongle down */
	brcmf_abort_scanning(cfg);
	brcmf_deinit_priv_mem(cfg);
5467 5468
}

5469 5470 5471 5472 5473 5474
static void init_vif_event(struct brcmf_cfg80211_vif_event *event)
{
	init_waitqueue_head(&event->vif_wq);
	mutex_init(&event->vif_event_lock);
}

5475
static s32 brcmf_dongle_roam(struct brcmf_if *ifp)
5476
{
5477 5478
	s32 err;
	u32 bcn_timeout;
5479 5480
	__le32 roamtrigger[2];
	__le32 roam_delta[2];
5481

5482
	/* Configure beacon timeout value based upon roaming setting */
5483
	if (ifp->drvr->settings->roamoff)
5484 5485 5486 5487 5488 5489 5490
		bcn_timeout = BRCMF_DEFAULT_BCN_TIMEOUT_ROAM_OFF;
	else
		bcn_timeout = BRCMF_DEFAULT_BCN_TIMEOUT_ROAM_ON;
	err = brcmf_fil_iovar_int_set(ifp, "bcn_timeout", bcn_timeout);
	if (err) {
		brcmf_err("bcn_timeout error (%d)\n", err);
		goto roam_setup_done;
5491 5492
	}

5493 5494
	/* Enable/Disable built-in roaming to allow supplicant to take care of
	 * roaming.
5495
	 */
5496
	brcmf_dbg(INFO, "Internal Roaming = %s\n",
5497 5498 5499
		  ifp->drvr->settings->roamoff ? "Off" : "On");
	err = brcmf_fil_iovar_int_set(ifp, "roam_off",
				      ifp->drvr->settings->roamoff);
5500
	if (err) {
5501
		brcmf_err("roam_off error (%d)\n", err);
5502
		goto roam_setup_done;
5503 5504
	}

5505 5506
	roamtrigger[0] = cpu_to_le32(WL_ROAM_TRIGGER_LEVEL);
	roamtrigger[1] = cpu_to_le32(BRCM_BAND_ALL);
5507
	err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_ROAM_TRIGGER,
5508
				     (void *)roamtrigger, sizeof(roamtrigger));
5509
	if (err) {
5510
		brcmf_err("WLC_SET_ROAM_TRIGGER error (%d)\n", err);
5511
		goto roam_setup_done;
5512 5513
	}

5514 5515
	roam_delta[0] = cpu_to_le32(WL_ROAM_DELTA);
	roam_delta[1] = cpu_to_le32(BRCM_BAND_ALL);
5516
	err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_ROAM_DELTA,
5517
				     (void *)roam_delta, sizeof(roam_delta));
5518
	if (err) {
5519
		brcmf_err("WLC_SET_ROAM_DELTA error (%d)\n", err);
5520
		goto roam_setup_done;
5521 5522
	}

5523
roam_setup_done:
5524 5525 5526 5527
	return err;
}

static s32
5528
brcmf_dongle_scantime(struct brcmf_if *ifp)
5529 5530 5531
{
	s32 err = 0;

5532
	err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_SCAN_CHANNEL_TIME,
5533
				    BRCMF_SCAN_CHANNEL_TIME);
5534
	if (err) {
5535
		brcmf_err("Scan assoc time error (%d)\n", err);
5536 5537
		goto dongle_scantime_out;
	}
5538
	err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_SCAN_UNASSOC_TIME,
5539
				    BRCMF_SCAN_UNASSOC_TIME);
5540
	if (err) {
5541
		brcmf_err("Scan unassoc time error (%d)\n", err);
5542 5543 5544
		goto dongle_scantime_out;
	}

5545
	err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_SCAN_PASSIVE_TIME,
5546
				    BRCMF_SCAN_PASSIVE_TIME);
5547
	if (err) {
5548
		brcmf_err("Scan passive time error (%d)\n", err);
5549 5550 5551 5552 5553 5554 5555
		goto dongle_scantime_out;
	}

dongle_scantime_out:
	return err;
}

5556 5557 5558 5559
static void brcmf_update_bw40_channel_flag(struct ieee80211_channel *channel,
					   struct brcmu_chan *ch)
{
	u32 ht40_flag;
5560

5561 5562 5563 5564 5565 5566 5567 5568 5569 5570 5571 5572 5573 5574 5575 5576 5577 5578
	ht40_flag = channel->flags & IEEE80211_CHAN_NO_HT40;
	if (ch->sb == BRCMU_CHAN_SB_U) {
		if (ht40_flag == IEEE80211_CHAN_NO_HT40)
			channel->flags &= ~IEEE80211_CHAN_NO_HT40;
		channel->flags |= IEEE80211_CHAN_NO_HT40PLUS;
	} else {
		/* It should be one of
		 * IEEE80211_CHAN_NO_HT40 or
		 * IEEE80211_CHAN_NO_HT40PLUS
		 */
		channel->flags &= ~IEEE80211_CHAN_NO_HT40;
		if (ht40_flag == IEEE80211_CHAN_NO_HT40)
			channel->flags |= IEEE80211_CHAN_NO_HT40MINUS;
	}
}

static int brcmf_construct_chaninfo(struct brcmf_cfg80211_info *cfg,
				    u32 bw_cap[])
5579 5580
{
	struct brcmf_if *ifp = netdev_priv(cfg_to_ndev(cfg));
5581 5582 5583
	struct ieee80211_supported_band *band;
	struct ieee80211_channel *channel;
	struct wiphy *wiphy;
5584
	struct brcmf_chanspec_list *list;
5585
	struct brcmu_chan ch;
5586
	int err;
5587 5588 5589
	u8 *pbuf;
	u32 i, j;
	u32 total;
5590
	u32 chaninfo;
5591 5592 5593 5594 5595 5596 5597 5598 5599 5600 5601 5602 5603
	u32 index;

	pbuf = kzalloc(BRCMF_DCMD_MEDLEN, GFP_KERNEL);

	if (pbuf == NULL)
		return -ENOMEM;

	list = (struct brcmf_chanspec_list *)pbuf;

	err = brcmf_fil_iovar_data_get(ifp, "chanspecs", pbuf,
				       BRCMF_DCMD_MEDLEN);
	if (err) {
		brcmf_err("get chanspecs error (%d)\n", err);
5604
		goto fail_pbuf;
5605 5606
	}

5607
	wiphy = cfg_to_wiphy(cfg);
5608 5609 5610 5611 5612 5613 5614 5615
	band = wiphy->bands[IEEE80211_BAND_2GHZ];
	if (band)
		for (i = 0; i < band->n_channels; i++)
			band->channels[i].flags = IEEE80211_CHAN_DISABLED;
	band = wiphy->bands[IEEE80211_BAND_5GHZ];
	if (band)
		for (i = 0; i < band->n_channels; i++)
			band->channels[i].flags = IEEE80211_CHAN_DISABLED;
5616 5617 5618

	total = le32_to_cpu(list->count);
	for (i = 0; i < total; i++) {
5619 5620
		ch.chspec = (u16)le32_to_cpu(list->element[i]);
		cfg->d11inf.decchspec(&ch);
5621

5622
		if (ch.band == BRCMU_CHAN_BAND_2G) {
5623
			band = wiphy->bands[IEEE80211_BAND_2GHZ];
5624
		} else if (ch.band == BRCMU_CHAN_BAND_5G) {
5625
			band = wiphy->bands[IEEE80211_BAND_5GHZ];
5626
		} else {
5627
			brcmf_err("Invalid channel Spec. 0x%x.\n", ch.chspec);
5628 5629
			continue;
		}
5630 5631
		if (!band)
			continue;
5632
		if (!(bw_cap[band->band] & WLC_BW_40MHZ_BIT) &&
5633
		    ch.bw == BRCMU_CHAN_BW_40)
5634
			continue;
5635
		if (!(bw_cap[band->band] & WLC_BW_80MHZ_BIT) &&
5636 5637
		    ch.bw == BRCMU_CHAN_BW_80)
			continue;
5638 5639 5640 5641 5642 5643

		channel = band->channels;
		index = band->n_channels;
		for (j = 0; j < band->n_channels; j++) {
			if (channel[j].hw_value == ch.chnum) {
				index = j;
5644 5645 5646
				break;
			}
		}
5647 5648 5649 5650 5651 5652 5653 5654 5655 5656 5657 5658
		channel[index].center_freq =
			ieee80211_channel_to_frequency(ch.chnum, band->band);
		channel[index].hw_value = ch.chnum;

		/* assuming the chanspecs order is HT20,
		 * HT40 upper, HT40 lower, and VHT80.
		 */
		if (ch.bw == BRCMU_CHAN_BW_80) {
			channel[index].flags &= ~IEEE80211_CHAN_NO_80MHZ;
		} else if (ch.bw == BRCMU_CHAN_BW_40) {
			brcmf_update_bw40_channel_flag(&channel[index], &ch);
		} else {
5659 5660 5661
			/* enable the channel and disable other bandwidths
			 * for now as mentioned order assure they are enabled
			 * for subsequent chanspecs.
5662
			 */
5663 5664 5665 5666 5667 5668 5669 5670 5671 5672 5673 5674 5675 5676 5677
			channel[index].flags = IEEE80211_CHAN_NO_HT40 |
					       IEEE80211_CHAN_NO_80MHZ;
			ch.bw = BRCMU_CHAN_BW_20;
			cfg->d11inf.encchspec(&ch);
			chaninfo = ch.chspec;
			err = brcmf_fil_bsscfg_int_get(ifp, "per_chan_info",
						       &chaninfo);
			if (!err) {
				if (chaninfo & WL_CHAN_RADAR)
					channel[index].flags |=
						(IEEE80211_CHAN_RADAR |
						 IEEE80211_CHAN_NO_IR);
				if (chaninfo & WL_CHAN_PASSIVE)
					channel[index].flags |=
						IEEE80211_CHAN_NO_IR;
5678 5679 5680
			}
		}
	}
5681 5682

fail_pbuf:
5683 5684 5685 5686
	kfree(pbuf);
	return err;
}

5687
static int brcmf_enable_bw40_2g(struct brcmf_cfg80211_info *cfg)
5688
{
5689 5690
	struct brcmf_if *ifp = netdev_priv(cfg_to_ndev(cfg));
	struct ieee80211_supported_band *band;
5691
	struct brcmf_fil_bwcap_le band_bwcap;
5692 5693
	struct brcmf_chanspec_list *list;
	u8 *pbuf;
5694 5695
	u32 val;
	int err;
5696 5697 5698
	struct brcmu_chan ch;
	u32 num_chan;
	int i, j;
5699 5700 5701 5702 5703 5704 5705 5706 5707 5708 5709 5710 5711 5712 5713 5714

	/* verify support for bw_cap command */
	val = WLC_BAND_5G;
	err = brcmf_fil_iovar_int_get(ifp, "bw_cap", &val);

	if (!err) {
		/* only set 2G bandwidth using bw_cap command */
		band_bwcap.band = cpu_to_le32(WLC_BAND_2G);
		band_bwcap.bw_cap = cpu_to_le32(WLC_BW_CAP_40MHZ);
		err = brcmf_fil_iovar_data_set(ifp, "bw_cap", &band_bwcap,
					       sizeof(band_bwcap));
	} else {
		brcmf_dbg(INFO, "fallback to mimo_bw_cap\n");
		val = WLC_N_BW_40ALL;
		err = brcmf_fil_iovar_int_set(ifp, "mimo_bw_cap", val);
	}
5715 5716 5717 5718 5719 5720 5721 5722 5723 5724

	if (!err) {
		/* update channel info in 2G band */
		pbuf = kzalloc(BRCMF_DCMD_MEDLEN, GFP_KERNEL);

		if (pbuf == NULL)
			return -ENOMEM;

		ch.band = BRCMU_CHAN_BAND_2G;
		ch.bw = BRCMU_CHAN_BW_40;
5725
		ch.sb = BRCMU_CHAN_SB_NONE;
5726 5727 5728 5729 5730 5731 5732 5733 5734 5735 5736 5737 5738 5739 5740 5741 5742 5743 5744 5745 5746 5747 5748 5749 5750 5751 5752 5753 5754 5755 5756 5757 5758
		ch.chnum = 0;
		cfg->d11inf.encchspec(&ch);

		/* pass encoded chanspec in query */
		*(__le16 *)pbuf = cpu_to_le16(ch.chspec);

		err = brcmf_fil_iovar_data_get(ifp, "chanspecs", pbuf,
					       BRCMF_DCMD_MEDLEN);
		if (err) {
			brcmf_err("get chanspecs error (%d)\n", err);
			kfree(pbuf);
			return err;
		}

		band = cfg_to_wiphy(cfg)->bands[IEEE80211_BAND_2GHZ];
		list = (struct brcmf_chanspec_list *)pbuf;
		num_chan = le32_to_cpu(list->count);
		for (i = 0; i < num_chan; i++) {
			ch.chspec = (u16)le32_to_cpu(list->element[i]);
			cfg->d11inf.decchspec(&ch);
			if (WARN_ON(ch.band != BRCMU_CHAN_BAND_2G))
				continue;
			if (WARN_ON(ch.bw != BRCMU_CHAN_BW_40))
				continue;
			for (j = 0; j < band->n_channels; j++) {
				if (band->channels[j].hw_value == ch.chnum)
					break;
			}
			if (WARN_ON(j == band->n_channels))
				continue;

			brcmf_update_bw40_channel_flag(&band->channels[j], &ch);
		}
5759
		kfree(pbuf);
5760
	}
5761 5762 5763
	return err;
}

5764 5765 5766 5767 5768 5769 5770 5771 5772 5773 5774 5775 5776 5777 5778 5779 5780 5781 5782 5783 5784 5785 5786 5787 5788 5789 5790 5791 5792 5793 5794 5795 5796 5797 5798 5799 5800 5801 5802 5803
static void brcmf_get_bwcap(struct brcmf_if *ifp, u32 bw_cap[])
{
	u32 band, mimo_bwcap;
	int err;

	band = WLC_BAND_2G;
	err = brcmf_fil_iovar_int_get(ifp, "bw_cap", &band);
	if (!err) {
		bw_cap[IEEE80211_BAND_2GHZ] = band;
		band = WLC_BAND_5G;
		err = brcmf_fil_iovar_int_get(ifp, "bw_cap", &band);
		if (!err) {
			bw_cap[IEEE80211_BAND_5GHZ] = band;
			return;
		}
		WARN_ON(1);
		return;
	}
	brcmf_dbg(INFO, "fallback to mimo_bw_cap info\n");
	mimo_bwcap = 0;
	err = brcmf_fil_iovar_int_get(ifp, "mimo_bw_cap", &mimo_bwcap);
	if (err)
		/* assume 20MHz if firmware does not give a clue */
		mimo_bwcap = WLC_N_BW_20ALL;

	switch (mimo_bwcap) {
	case WLC_N_BW_40ALL:
		bw_cap[IEEE80211_BAND_2GHZ] |= WLC_BW_40MHZ_BIT;
		/* fall-thru */
	case WLC_N_BW_20IN2G_40IN5G:
		bw_cap[IEEE80211_BAND_5GHZ] |= WLC_BW_40MHZ_BIT;
		/* fall-thru */
	case WLC_N_BW_20ALL:
		bw_cap[IEEE80211_BAND_2GHZ] |= WLC_BW_20MHZ_BIT;
		bw_cap[IEEE80211_BAND_5GHZ] |= WLC_BW_20MHZ_BIT;
		break;
	default:
		brcmf_err("invalid mimo_bw_cap value\n");
	}
}
5804

5805 5806 5807 5808 5809 5810 5811 5812 5813 5814 5815 5816 5817 5818 5819 5820 5821 5822 5823 5824 5825 5826 5827 5828 5829 5830 5831 5832
static void brcmf_update_ht_cap(struct ieee80211_supported_band *band,
				u32 bw_cap[2], u32 nchain)
{
	band->ht_cap.ht_supported = true;
	if (bw_cap[band->band] & WLC_BW_40MHZ_BIT) {
		band->ht_cap.cap |= IEEE80211_HT_CAP_SGI_40;
		band->ht_cap.cap |= IEEE80211_HT_CAP_SUP_WIDTH_20_40;
	}
	band->ht_cap.cap |= IEEE80211_HT_CAP_SGI_20;
	band->ht_cap.cap |= IEEE80211_HT_CAP_DSSSCCK40;
	band->ht_cap.ampdu_factor = IEEE80211_HT_MAX_AMPDU_64K;
	band->ht_cap.ampdu_density = IEEE80211_HT_MPDU_DENSITY_16;
	memset(band->ht_cap.mcs.rx_mask, 0xff, nchain);
	band->ht_cap.mcs.tx_params = IEEE80211_HT_MCS_TX_DEFINED;
}

static __le16 brcmf_get_mcs_map(u32 nchain, enum ieee80211_vht_mcs_support supp)
{
	u16 mcs_map;
	int i;

	for (i = 0, mcs_map = 0xFFFF; i < nchain; i++)
		mcs_map = (mcs_map << 2) | supp;

	return cpu_to_le16(mcs_map);
}

static void brcmf_update_vht_cap(struct ieee80211_supported_band *band,
5833 5834
				 u32 bw_cap[2], u32 nchain, u32 txstreams,
				 u32 txbf_bfe_cap, u32 txbf_bfr_cap)
5835 5836 5837 5838 5839 5840 5841 5842 5843 5844 5845 5846 5847 5848 5849 5850 5851 5852
{
	__le16 mcs_map;

	/* not allowed in 2.4G band */
	if (band->band == IEEE80211_BAND_2GHZ)
		return;

	band->vht_cap.vht_supported = true;
	/* 80MHz is mandatory */
	band->vht_cap.cap |= IEEE80211_VHT_CAP_SHORT_GI_80;
	if (bw_cap[band->band] & WLC_BW_160MHZ_BIT) {
		band->vht_cap.cap |= IEEE80211_VHT_CAP_SUPP_CHAN_WIDTH_160MHZ;
		band->vht_cap.cap |= IEEE80211_VHT_CAP_SHORT_GI_160;
	}
	/* all support 256-QAM */
	mcs_map = brcmf_get_mcs_map(nchain, IEEE80211_VHT_MCS_SUPPORT_0_9);
	band->vht_cap.vht_mcs.rx_mcs_map = mcs_map;
	band->vht_cap.vht_mcs.tx_mcs_map = mcs_map;
5853 5854 5855 5856 5857 5858 5859 5860 5861 5862 5863 5864 5865 5866 5867 5868 5869 5870 5871

	/* Beamforming support information */
	if (txbf_bfe_cap & BRCMF_TXBF_SU_BFE_CAP)
		band->vht_cap.cap |= IEEE80211_VHT_CAP_SU_BEAMFORMEE_CAPABLE;
	if (txbf_bfe_cap & BRCMF_TXBF_MU_BFE_CAP)
		band->vht_cap.cap |= IEEE80211_VHT_CAP_MU_BEAMFORMEE_CAPABLE;
	if (txbf_bfr_cap & BRCMF_TXBF_SU_BFR_CAP)
		band->vht_cap.cap |= IEEE80211_VHT_CAP_SU_BEAMFORMER_CAPABLE;
	if (txbf_bfr_cap & BRCMF_TXBF_MU_BFR_CAP)
		band->vht_cap.cap |= IEEE80211_VHT_CAP_MU_BEAMFORMER_CAPABLE;

	if ((txbf_bfe_cap || txbf_bfr_cap) && (txstreams > 1)) {
		band->vht_cap.cap |=
			(2 << IEEE80211_VHT_CAP_BEAMFORMEE_STS_SHIFT);
		band->vht_cap.cap |= ((txstreams - 1) <<
				IEEE80211_VHT_CAP_SOUNDING_DIMENSIONS_SHIFT);
		band->vht_cap.cap |=
			IEEE80211_VHT_CAP_VHT_LINK_ADAPTATION_VHT_MRQ_MFB;
	}
5872 5873
}

5874
static int brcmf_setup_wiphybands(struct wiphy *wiphy)
5875
{
5876
	struct brcmf_cfg80211_info *cfg = wiphy_priv(wiphy);
5877
	struct brcmf_if *ifp = netdev_priv(cfg_to_ndev(cfg));
5878 5879
	u32 nmode = 0;
	u32 vhtmode = 0;
5880
	u32 bw_cap[2] = { WLC_BW_20MHZ_BIT, WLC_BW_20MHZ_BIT };
5881 5882
	u32 rxchain;
	u32 nchain;
5883
	int err;
5884
	s32 i;
5885
	struct ieee80211_supported_band *band;
5886 5887 5888
	u32 txstreams = 0;
	u32 txbf_bfe_cap = 0;
	u32 txbf_bfr_cap = 0;
5889

5890
	(void)brcmf_fil_iovar_int_get(ifp, "vhtmode", &vhtmode);
5891 5892 5893 5894
	err = brcmf_fil_iovar_int_get(ifp, "nmode", &nmode);
	if (err) {
		brcmf_err("nmode error (%d)\n", err);
	} else {
5895
		brcmf_get_bwcap(ifp, bw_cap);
5896
	}
5897 5898 5899
	brcmf_dbg(INFO, "nmode=%d, vhtmode=%d, bw_cap=(%d, %d)\n",
		  nmode, vhtmode, bw_cap[IEEE80211_BAND_2GHZ],
		  bw_cap[IEEE80211_BAND_5GHZ]);
5900

5901 5902 5903 5904 5905 5906 5907 5908 5909 5910
	err = brcmf_fil_iovar_int_get(ifp, "rxchain", &rxchain);
	if (err) {
		brcmf_err("rxchain error (%d)\n", err);
		nchain = 1;
	} else {
		for (nchain = 0; rxchain; nchain++)
			rxchain = rxchain & (rxchain - 1);
	}
	brcmf_dbg(INFO, "nchain=%d\n", nchain);

5911
	err = brcmf_construct_chaninfo(cfg, bw_cap);
5912
	if (err) {
5913
		brcmf_err("brcmf_construct_chaninfo failed (%d)\n", err);
5914 5915 5916
		return err;
	}

5917 5918 5919 5920 5921 5922 5923 5924
	if (vhtmode) {
		(void)brcmf_fil_iovar_int_get(ifp, "txstreams", &txstreams);
		(void)brcmf_fil_iovar_int_get(ifp, "txbf_bfe_cap",
					      &txbf_bfe_cap);
		(void)brcmf_fil_iovar_int_get(ifp, "txbf_bfr_cap",
					      &txbf_bfr_cap);
	}

5925 5926 5927 5928
	wiphy = cfg_to_wiphy(cfg);
	for (i = 0; i < ARRAY_SIZE(wiphy->bands); i++) {
		band = wiphy->bands[i];
		if (band == NULL)
5929
			continue;
5930

5931 5932 5933
		if (nmode)
			brcmf_update_ht_cap(band, bw_cap, nchain);
		if (vhtmode)
5934 5935
			brcmf_update_vht_cap(band, bw_cap, nchain, txstreams,
					     txbf_bfe_cap, txbf_bfr_cap);
5936 5937
	}

5938
	return 0;
5939 5940
}

5941 5942 5943 5944 5945 5946 5947 5948 5949 5950 5951 5952 5953 5954 5955 5956 5957 5958 5959 5960 5961 5962 5963 5964 5965 5966 5967 5968 5969
static const struct ieee80211_txrx_stypes
brcmf_txrx_stypes[NUM_NL80211_IFTYPES] = {
	[NL80211_IFTYPE_STATION] = {
		.tx = 0xffff,
		.rx = BIT(IEEE80211_STYPE_ACTION >> 4) |
		      BIT(IEEE80211_STYPE_PROBE_REQ >> 4)
	},
	[NL80211_IFTYPE_P2P_CLIENT] = {
		.tx = 0xffff,
		.rx = BIT(IEEE80211_STYPE_ACTION >> 4) |
		      BIT(IEEE80211_STYPE_PROBE_REQ >> 4)
	},
	[NL80211_IFTYPE_P2P_GO] = {
		.tx = 0xffff,
		.rx = BIT(IEEE80211_STYPE_ASSOC_REQ >> 4) |
		      BIT(IEEE80211_STYPE_REASSOC_REQ >> 4) |
		      BIT(IEEE80211_STYPE_PROBE_REQ >> 4) |
		      BIT(IEEE80211_STYPE_DISASSOC >> 4) |
		      BIT(IEEE80211_STYPE_AUTH >> 4) |
		      BIT(IEEE80211_STYPE_DEAUTH >> 4) |
		      BIT(IEEE80211_STYPE_ACTION >> 4)
	},
	[NL80211_IFTYPE_P2P_DEVICE] = {
		.tx = 0xffff,
		.rx = BIT(IEEE80211_STYPE_ACTION >> 4) |
		      BIT(IEEE80211_STYPE_PROBE_REQ >> 4)
	}
};

5970 5971 5972 5973 5974 5975 5976 5977 5978 5979 5980 5981 5982 5983 5984 5985 5986 5987 5988 5989 5990 5991 5992 5993 5994 5995 5996 5997 5998 5999
/**
 * brcmf_setup_ifmodes() - determine interface modes and combinations.
 *
 * @wiphy: wiphy object.
 * @ifp: interface object needed for feat module api.
 *
 * The interface modes and combinations are determined dynamically here
 * based on firmware functionality.
 *
 * no p2p and no mbss:
 *
 *	#STA <= 1, #AP <= 1, channels = 1, 2 total
 *
 * no p2p and mbss:
 *
 *	#STA <= 1, #AP <= 1, channels = 1, 2 total
 *	#AP <= 4, matching BI, channels = 1, 4 total
 *
 * p2p, no mchan, and mbss:
 *
 *	#STA <= 1, #P2P-DEV <= 1, #{P2P-CL, P2P-GO} <= 1, channels = 1, 3 total
 *	#STA <= 1, #P2P-DEV <= 1, #AP <= 1, #P2P-CL <= 1, channels = 1, 4 total
 *	#AP <= 4, matching BI, channels = 1, 4 total
 *
 * p2p, mchan, and mbss:
 *
 *	#STA <= 1, #P2P-DEV <= 1, #{P2P-CL, P2P-GO} <= 1, channels = 2, 3 total
 *	#STA <= 1, #P2P-DEV <= 1, #AP <= 1, #P2P-CL <= 1, channels = 1, 4 total
 *	#AP <= 4, matching BI, channels = 1, 4 total
 */
6000 6001 6002
static int brcmf_setup_ifmodes(struct wiphy *wiphy, struct brcmf_if *ifp)
{
	struct ieee80211_iface_combination *combo = NULL;
6003 6004 6005 6006 6007 6008 6009 6010
	struct ieee80211_iface_limit *c0_limits = NULL;
	struct ieee80211_iface_limit *p2p_limits = NULL;
	struct ieee80211_iface_limit *mbss_limits = NULL;
	bool mbss, p2p;
	int i, c, n_combos;

	mbss = brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MBSS);
	p2p = brcmf_feat_is_enabled(ifp, BRCMF_FEAT_P2P);
6011

6012 6013
	n_combos = 1 + !!p2p + !!mbss;
	combo = kcalloc(n_combos, sizeof(*combo), GFP_KERNEL);
6014 6015 6016
	if (!combo)
		goto err;

6017 6018
	c0_limits = kcalloc(p2p ? 3 : 2, sizeof(*c0_limits), GFP_KERNEL);
	if (!c0_limits)
6019 6020
		goto err;

6021 6022 6023 6024 6025 6026 6027 6028 6029 6030 6031 6032
	if (p2p) {
		p2p_limits = kcalloc(4, sizeof(*p2p_limits), GFP_KERNEL);
		if (!p2p_limits)
			goto err;
	}

	if (mbss) {
		mbss_limits = kcalloc(1, sizeof(*mbss_limits), GFP_KERNEL);
		if (!mbss_limits)
			goto err;
	}

6033 6034 6035 6036
	wiphy->interface_modes = BIT(NL80211_IFTYPE_STATION) |
				 BIT(NL80211_IFTYPE_ADHOC) |
				 BIT(NL80211_IFTYPE_AP);

6037 6038 6039 6040 6041 6042 6043 6044
	c = 0;
	i = 0;
	combo[c].num_different_channels = 1;
	c0_limits[i].max = 1;
	c0_limits[i++].types = BIT(NL80211_IFTYPE_STATION);
	if (p2p) {
		if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MCHAN))
			combo[c].num_different_channels = 2;
6045 6046 6047
		wiphy->interface_modes |= BIT(NL80211_IFTYPE_P2P_CLIENT) |
					  BIT(NL80211_IFTYPE_P2P_GO) |
					  BIT(NL80211_IFTYPE_P2P_DEVICE);
6048 6049 6050 6051 6052 6053 6054 6055 6056 6057 6058 6059 6060 6061 6062 6063 6064 6065 6066 6067 6068 6069 6070 6071 6072 6073 6074 6075 6076 6077 6078 6079 6080 6081 6082 6083 6084 6085 6086 6087 6088
		c0_limits[i].max = 1;
		c0_limits[i++].types = BIT(NL80211_IFTYPE_P2P_DEVICE);
		c0_limits[i].max = 1;
		c0_limits[i++].types = BIT(NL80211_IFTYPE_P2P_CLIENT) |
				       BIT(NL80211_IFTYPE_P2P_GO);
	} else {
		c0_limits[i].max = 1;
		c0_limits[i++].types = BIT(NL80211_IFTYPE_AP);
	}
	combo[c].max_interfaces = i;
	combo[c].n_limits = i;
	combo[c].limits = c0_limits;

	if (p2p) {
		c++;
		i = 0;
		combo[c].num_different_channels = 1;
		p2p_limits[i].max = 1;
		p2p_limits[i++].types = BIT(NL80211_IFTYPE_STATION);
		p2p_limits[i].max = 1;
		p2p_limits[i++].types = BIT(NL80211_IFTYPE_AP);
		p2p_limits[i].max = 1;
		p2p_limits[i++].types = BIT(NL80211_IFTYPE_P2P_CLIENT);
		p2p_limits[i].max = 1;
		p2p_limits[i++].types = BIT(NL80211_IFTYPE_P2P_DEVICE);
		combo[c].max_interfaces = i;
		combo[c].n_limits = i;
		combo[c].limits = p2p_limits;
	}

	if (mbss) {
		c++;
		combo[c].beacon_int_infra_match = true;
		combo[c].num_different_channels = 1;
		mbss_limits[0].max = 4;
		mbss_limits[0].types = BIT(NL80211_IFTYPE_AP);
		combo[c].max_interfaces = 4;
		combo[c].n_limits = 1;
		combo[c].limits = mbss_limits;
	}
	wiphy->n_iface_combinations = n_combos;
6089 6090 6091 6092
	wiphy->iface_combinations = combo;
	return 0;

err:
6093 6094 6095
	kfree(c0_limits);
	kfree(p2p_limits);
	kfree(mbss_limits);
6096 6097 6098 6099
	kfree(combo);
	return -ENOMEM;
}

6100 6101 6102 6103 6104 6105 6106 6107 6108
static void brcmf_wiphy_pno_params(struct wiphy *wiphy)
{
	/* scheduled scan settings */
	wiphy->max_sched_scan_ssids = BRCMF_PNO_MAX_PFN_COUNT;
	wiphy->max_match_sets = BRCMF_PNO_MAX_PFN_COUNT;
	wiphy->max_sched_scan_ie_len = BRCMF_SCAN_IE_LEN_MAX;
	wiphy->flags |= WIPHY_FLAG_SUPPORTS_SCHED_SCAN;
}

6109
#ifdef CONFIG_PM
6110
static struct wiphy_wowlan_support brcmf_wowlan_support = {
6111
	.flags = WIPHY_WOWLAN_MAGIC_PKT | WIPHY_WOWLAN_DISCONNECT,
6112 6113 6114 6115
	.n_patterns = BRCMF_WOWL_MAXPATTERNS,
	.pattern_max_len = BRCMF_WOWL_MAXPATTERNSIZE,
	.pattern_min_len = 1,
	.max_pkt_offset = 1500,
6116 6117 6118
};
#endif

6119
static void brcmf_wiphy_wowl_params(struct wiphy *wiphy, struct brcmf_if *ifp)
6120 6121
{
#ifdef CONFIG_PM
6122 6123 6124 6125 6126 6127 6128 6129 6130 6131 6132 6133 6134 6135
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
	s32 err;
	u32 wowl_cap;

	if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_PNO)) {
		err = brcmf_fil_iovar_int_get(ifp, "wowl_cap", &wowl_cap);
		if (!err) {
			if (wowl_cap & BRCMF_WOWL_PFN_FOUND) {
				brcmf_wowlan_support.flags |=
							WIPHY_WOWLAN_NET_DETECT;
				init_waitqueue_head(&cfg->wowl.nd_data_wait);
			}
		}
	}
6136 6137 6138 6139
	wiphy->wowlan = &brcmf_wowlan_support;
#endif
}

6140
static int brcmf_setup_wiphy(struct wiphy *wiphy, struct brcmf_if *ifp)
6141
{
6142
	struct brcmf_pub *drvr = ifp->drvr;
6143
	const struct ieee80211_iface_combination *combo;
6144
	struct ieee80211_supported_band *band;
6145
	u16 max_interfaces = 0;
6146 6147 6148 6149
	__le32 bandlist[3];
	u32 n_bands;
	int err, i;

6150 6151
	wiphy->max_scan_ssids = WL_NUM_SCAN_MAX;
	wiphy->max_scan_ie_len = BRCMF_SCAN_IE_LEN_MAX;
6152
	wiphy->max_num_pmkids = BRCMF_MAXPMKID;
6153 6154 6155 6156 6157

	err = brcmf_setup_ifmodes(wiphy, ifp);
	if (err)
		return err;

6158 6159 6160 6161 6162 6163 6164
	for (i = 0, combo = wiphy->iface_combinations;
	     i < wiphy->n_iface_combinations; i++, combo++) {
		max_interfaces = max(max_interfaces, combo->max_interfaces);
	}

	for (i = 0; i < max_interfaces && i < ARRAY_SIZE(drvr->addresses);
	     i++) {
6165 6166 6167 6168 6169 6170 6171 6172 6173 6174 6175
		u8 *addr = drvr->addresses[i].addr;

		memcpy(addr, drvr->mac, ETH_ALEN);
		if (i) {
			addr[0] |= BIT(1);
			addr[ETH_ALEN - 1] ^= i;
		}
	}
	wiphy->addresses = drvr->addresses;
	wiphy->n_addresses = i;

6176 6177 6178 6179 6180
	wiphy->signal_type = CFG80211_SIGNAL_TYPE_MBM;
	wiphy->cipher_suites = __wl_cipher_suites;
	wiphy->n_cipher_suites = ARRAY_SIZE(__wl_cipher_suites);
	wiphy->flags |= WIPHY_FLAG_PS_ON_BY_DEFAULT |
			WIPHY_FLAG_OFFCHAN_TX |
6181 6182 6183
			WIPHY_FLAG_HAS_REMAIN_ON_CHANNEL;
	if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_TDLS))
		wiphy->flags |= WIPHY_FLAG_SUPPORTS_TDLS;
6184
	if (!ifp->drvr->settings->roamoff)
6185 6186 6187
		wiphy->flags |= WIPHY_FLAG_SUPPORTS_FW_ROAM;
	wiphy->mgmt_stypes = brcmf_txrx_stypes;
	wiphy->max_remain_on_channel_duration = 5000;
6188 6189
	if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_PNO))
		brcmf_wiphy_pno_params(wiphy);
6190 6191 6192 6193 6194

	/* vendor commands/events support */
	wiphy->vendor_commands = brcmf_vendor_cmds;
	wiphy->n_vendor_commands = BRCMF_VNDR_CMDS_LAST - 1;

6195
	if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_WOWL))
6196
		brcmf_wiphy_wowl_params(wiphy, ifp);
6197 6198 6199 6200 6201 6202 6203 6204 6205 6206 6207 6208 6209 6210 6211 6212 6213 6214 6215 6216 6217 6218 6219 6220 6221 6222 6223 6224 6225 6226 6227 6228 6229 6230 6231 6232 6233 6234 6235 6236 6237 6238 6239 6240 6241 6242
	err = brcmf_fil_cmd_data_get(ifp, BRCMF_C_GET_BANDLIST, &bandlist,
				     sizeof(bandlist));
	if (err) {
		brcmf_err("could not obtain band info: err=%d\n", err);
		return err;
	}
	/* first entry in bandlist is number of bands */
	n_bands = le32_to_cpu(bandlist[0]);
	for (i = 1; i <= n_bands && i < ARRAY_SIZE(bandlist); i++) {
		if (bandlist[i] == cpu_to_le32(WLC_BAND_2G)) {
			band = kmemdup(&__wl_band_2ghz, sizeof(__wl_band_2ghz),
				       GFP_KERNEL);
			if (!band)
				return -ENOMEM;

			band->channels = kmemdup(&__wl_2ghz_channels,
						 sizeof(__wl_2ghz_channels),
						 GFP_KERNEL);
			if (!band->channels) {
				kfree(band);
				return -ENOMEM;
			}

			band->n_channels = ARRAY_SIZE(__wl_2ghz_channels);
			wiphy->bands[IEEE80211_BAND_2GHZ] = band;
		}
		if (bandlist[i] == cpu_to_le32(WLC_BAND_5G)) {
			band = kmemdup(&__wl_band_5ghz, sizeof(__wl_band_5ghz),
				       GFP_KERNEL);
			if (!band)
				return -ENOMEM;

			band->channels = kmemdup(&__wl_5ghz_channels,
						 sizeof(__wl_5ghz_channels),
						 GFP_KERNEL);
			if (!band->channels) {
				kfree(band);
				return -ENOMEM;
			}

			band->n_channels = ARRAY_SIZE(__wl_5ghz_channels);
			wiphy->bands[IEEE80211_BAND_5GHZ] = band;
		}
	}
	err = brcmf_setup_wiphybands(wiphy);
	return err;
6243 6244
}

6245
static s32 brcmf_config_dongle(struct brcmf_cfg80211_info *cfg)
6246 6247 6248
{
	struct net_device *ndev;
	struct wireless_dev *wdev;
6249
	struct brcmf_if *ifp;
6250 6251 6252
	s32 power_mode;
	s32 err = 0;

6253
	if (cfg->dongle_up)
6254 6255
		return err;

6256
	ndev = cfg_to_ndev(cfg);
6257
	wdev = ndev->ieee80211_ptr;
6258 6259 6260 6261
	ifp = netdev_priv(ndev);

	/* make sure RF is ready for work */
	brcmf_fil_cmd_int_set(ifp, BRCMF_C_UP, 0);
6262

6263
	brcmf_dongle_scantime(ifp);
6264

6265
	power_mode = cfg->pwr_save ? PM_FAST : PM_OFF;
6266
	err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_PM, power_mode);
6267 6268
	if (err)
		goto default_conf_out;
6269 6270
	brcmf_dbg(INFO, "power save set to %s\n",
		  (power_mode ? "enabled" : "disabled"));
6271

6272
	err = brcmf_dongle_roam(ifp);
6273 6274
	if (err)
		goto default_conf_out;
6275 6276
	err = brcmf_cfg80211_change_iface(wdev->wiphy, ndev, wdev->iftype,
					  NULL, NULL);
6277
	if (err)
6278 6279
		goto default_conf_out;

6280 6281
	brcmf_configure_arp_offload(ifp, true);

6282
	cfg->dongle_up = true;
6283
default_conf_out:
6284 6285 6286 6287 6288

	return err;

}

6289
static s32 __brcmf_cfg80211_up(struct brcmf_if *ifp)
6290
{
6291
	set_bit(BRCMF_VIF_STATUS_READY, &ifp->vif->sme_state);
6292

6293
	return brcmf_config_dongle(ifp->drvr->config);
6294 6295
}

6296
static s32 __brcmf_cfg80211_down(struct brcmf_if *ifp)
6297
{
6298
	struct brcmf_cfg80211_info *cfg = ifp->drvr->config;
6299

6300 6301 6302 6303
	/*
	 * While going down, if associated with AP disassociate
	 * from AP to save power
	 */
6304
	if (check_vif_up(ifp->vif)) {
6305
		brcmf_link_down(ifp->vif, WLAN_REASON_UNSPECIFIED);
6306 6307 6308 6309 6310 6311 6312 6313

		/* Make sure WPA_Supplicant receives all the event
		   generated due to DISASSOC call to the fw to keep
		   the state fw and WPA_Supplicant state consistent
		 */
		brcmf_delay(500);
	}

6314
	brcmf_abort_scanning(cfg);
6315
	clear_bit(BRCMF_VIF_STATUS_READY, &ifp->vif->sme_state);
6316 6317 6318 6319

	return 0;
}

6320
s32 brcmf_cfg80211_up(struct net_device *ndev)
6321
{
6322 6323
	struct brcmf_if *ifp = netdev_priv(ndev);
	struct brcmf_cfg80211_info *cfg = ifp->drvr->config;
6324 6325
	s32 err = 0;

6326
	mutex_lock(&cfg->usr_sync);
6327
	err = __brcmf_cfg80211_up(ifp);
6328
	mutex_unlock(&cfg->usr_sync);
6329 6330 6331 6332

	return err;
}

6333
s32 brcmf_cfg80211_down(struct net_device *ndev)
6334
{
6335 6336
	struct brcmf_if *ifp = netdev_priv(ndev);
	struct brcmf_cfg80211_info *cfg = ifp->drvr->config;
6337 6338
	s32 err = 0;

6339
	mutex_lock(&cfg->usr_sync);
6340
	err = __brcmf_cfg80211_down(ifp);
6341
	mutex_unlock(&cfg->usr_sync);
6342 6343 6344 6345

	return err;
}

6346 6347 6348 6349 6350 6351 6352
enum nl80211_iftype brcmf_cfg80211_get_iftype(struct brcmf_if *ifp)
{
	struct wireless_dev *wdev = &ifp->vif->wdev;

	return wdev->iftype;
}

6353 6354
bool brcmf_get_vif_state_any(struct brcmf_cfg80211_info *cfg,
			     unsigned long state)
6355 6356 6357 6358 6359
{
	struct brcmf_cfg80211_vif *vif;

	list_for_each_entry(vif, &cfg->vif_list, list) {
		if (test_bit(state, &vif->sme_state))
6360
			return true;
6361
	}
6362
	return false;
6363
}
6364 6365 6366 6367 6368 6369 6370 6371 6372 6373 6374 6375 6376 6377 6378 6379 6380 6381 6382 6383 6384 6385 6386 6387 6388 6389 6390 6391 6392 6393 6394 6395 6396 6397

static inline bool vif_event_equals(struct brcmf_cfg80211_vif_event *event,
				    u8 action)
{
	u8 evt_action;

	mutex_lock(&event->vif_event_lock);
	evt_action = event->action;
	mutex_unlock(&event->vif_event_lock);
	return evt_action == action;
}

void brcmf_cfg80211_arm_vif_event(struct brcmf_cfg80211_info *cfg,
				  struct brcmf_cfg80211_vif *vif)
{
	struct brcmf_cfg80211_vif_event *event = &cfg->vif_event;

	mutex_lock(&event->vif_event_lock);
	event->vif = vif;
	event->action = 0;
	mutex_unlock(&event->vif_event_lock);
}

bool brcmf_cfg80211_vif_event_armed(struct brcmf_cfg80211_info *cfg)
{
	struct brcmf_cfg80211_vif_event *event = &cfg->vif_event;
	bool armed;

	mutex_lock(&event->vif_event_lock);
	armed = event->vif != NULL;
	mutex_unlock(&event->vif_event_lock);

	return armed;
}
6398 6399 6400

int brcmf_cfg80211_wait_vif_event(struct brcmf_cfg80211_info *cfg,
				  u8 action, ulong timeout)
6401 6402 6403 6404 6405 6406 6407
{
	struct brcmf_cfg80211_vif_event *event = &cfg->vif_event;

	return wait_event_timeout(event->vif_wq,
				  vif_event_equals(event, action), timeout);
}

6408 6409 6410 6411 6412 6413 6414 6415 6416 6417 6418 6419 6420 6421 6422 6423 6424 6425 6426 6427
static void brcmf_cfg80211_reg_notifier(struct wiphy *wiphy,
					struct regulatory_request *req)
{
	struct brcmf_cfg80211_info *cfg = wiphy_priv(wiphy);
	struct brcmf_if *ifp = netdev_priv(cfg_to_ndev(cfg));
	struct brcmf_fil_country_le ccreq;
	int i;

	brcmf_dbg(TRACE, "enter: initiator=%d, alpha=%c%c\n", req->initiator,
		  req->alpha2[0], req->alpha2[1]);

	/* ignore non-ISO3166 country codes */
	for (i = 0; i < sizeof(req->alpha2); i++)
		if (req->alpha2[i] < 'A' || req->alpha2[i] > 'Z') {
			brcmf_err("not a ISO3166 code\n");
			return;
		}
	memset(&ccreq, 0, sizeof(ccreq));
	ccreq.rev = cpu_to_le32(-1);
	memcpy(ccreq.ccode, req->alpha2, sizeof(req->alpha2));
6428 6429 6430 6431 6432
	if (brcmf_fil_iovar_data_set(ifp, "country", &ccreq, sizeof(ccreq))) {
		brcmf_err("firmware rejected country setting\n");
		return;
	}
	brcmf_setup_wiphybands(wiphy);
6433 6434
}

6435 6436
static void brcmf_free_wiphy(struct wiphy *wiphy)
{
6437 6438
	int i;

6439 6440 6441
	if (!wiphy)
		return;

6442 6443 6444 6445
	if (wiphy->iface_combinations) {
		for (i = 0; i < wiphy->n_iface_combinations; i++)
			kfree(wiphy->iface_combinations[i].limits);
	}
6446 6447 6448 6449 6450 6451 6452 6453 6454 6455 6456 6457
	kfree(wiphy->iface_combinations);
	if (wiphy->bands[IEEE80211_BAND_2GHZ]) {
		kfree(wiphy->bands[IEEE80211_BAND_2GHZ]->channels);
		kfree(wiphy->bands[IEEE80211_BAND_2GHZ]);
	}
	if (wiphy->bands[IEEE80211_BAND_5GHZ]) {
		kfree(wiphy->bands[IEEE80211_BAND_5GHZ]->channels);
		kfree(wiphy->bands[IEEE80211_BAND_5GHZ]);
	}
	wiphy_free(wiphy);
}

6458
struct brcmf_cfg80211_info *brcmf_cfg80211_attach(struct brcmf_pub *drvr,
6459 6460
						  struct device *busdev,
						  bool p2pdev_forced)
6461
{
6462
	struct net_device *ndev = brcmf_get_ifp(drvr, 0)->ndev;
6463 6464 6465 6466 6467 6468
	struct brcmf_cfg80211_info *cfg;
	struct wiphy *wiphy;
	struct brcmf_cfg80211_vif *vif;
	struct brcmf_if *ifp;
	s32 err = 0;
	s32 io_type;
6469
	u16 *cap = NULL;
6470 6471 6472 6473 6474 6475 6476

	if (!ndev) {
		brcmf_err("ndev is invalid\n");
		return NULL;
	}

	ifp = netdev_priv(ndev);
6477 6478 6479
	wiphy = wiphy_new(&wl_cfg80211_ops, sizeof(struct brcmf_cfg80211_info));
	if (!wiphy) {
		brcmf_err("Could not allocate wiphy device\n");
6480
		return NULL;
6481
	}
6482
	memcpy(wiphy->perm_addr, drvr->mac, ETH_ALEN);
6483
	set_wiphy_dev(wiphy, busdev);
6484 6485 6486 6487 6488 6489 6490 6491

	cfg = wiphy_priv(wiphy);
	cfg->wiphy = wiphy;
	cfg->pub = drvr;
	init_vif_event(&cfg->vif_event);
	INIT_LIST_HEAD(&cfg->vif_list);

	vif = brcmf_alloc_vif(cfg, NL80211_IFTYPE_STATION, false);
6492 6493
	if (IS_ERR(vif))
		goto wiphy_out;
6494 6495 6496 6497 6498 6499 6500 6501 6502

	vif->ifp = ifp;
	vif->wdev.netdev = ndev;
	ndev->ieee80211_ptr = &vif->wdev;
	SET_NETDEV_DEV(ndev, wiphy_dev(cfg->wiphy));

	err = wl_init_priv(cfg);
	if (err) {
		brcmf_err("Failed to init iwm_priv (%d)\n", err);
6503 6504
		brcmf_free_vif(vif);
		goto wiphy_out;
6505 6506 6507
	}
	ifp->vif = vif;

6508 6509
	/* determine d11 io type before wiphy setup */
	err = brcmf_fil_cmd_int_get(ifp, BRCMF_C_GET_VERSION, &io_type);
6510
	if (err) {
6511 6512
		brcmf_err("Failed to get D11 version (%d)\n", err);
		goto priv_out;
6513
	}
6514 6515 6516 6517 6518 6519 6520 6521
	cfg->d11inf.io_type = (u8)io_type;
	brcmu_d11_attach(&cfg->d11inf);

	err = brcmf_setup_wiphy(wiphy, ifp);
	if (err < 0)
		goto priv_out;

	brcmf_dbg(INFO, "Registering custom regulatory\n");
6522
	wiphy->reg_notifier = brcmf_cfg80211_reg_notifier;
6523 6524 6525 6526 6527 6528 6529 6530 6531 6532 6533 6534 6535 6536 6537
	wiphy->regulatory_flags |= REGULATORY_CUSTOM_REG;
	wiphy_apply_custom_regulatory(wiphy, &brcmf_regdom);

	/* firmware defaults to 40MHz disabled in 2G band. We signal
	 * cfg80211 here that we do and have it decide we can enable
	 * it. But first check if device does support 2G operation.
	 */
	if (wiphy->bands[IEEE80211_BAND_2GHZ]) {
		cap = &wiphy->bands[IEEE80211_BAND_2GHZ]->ht_cap.cap;
		*cap |= IEEE80211_HT_CAP_SUP_WIDTH_20_40;
	}
	err = wiphy_register(wiphy);
	if (err < 0) {
		brcmf_err("Could not register wiphy device (%d)\n", err);
		goto priv_out;
6538 6539 6540 6541 6542
	}

	/* If cfg80211 didn't disable 40MHz HT CAP in wiphy_register(),
	 * setup 40MHz in 2GHz band and enable OBSS scanning.
	 */
6543 6544
	if (cap && (*cap & IEEE80211_HT_CAP_SUP_WIDTH_20_40)) {
		err = brcmf_enable_bw40_2g(cfg);
6545 6546 6547
		if (!err)
			err = brcmf_fil_iovar_int_set(ifp, "obss_coex",
						      BRCMF_OBSS_COEX_AUTO);
6548 6549
		else
			*cap &= ~IEEE80211_HT_CAP_SUP_WIDTH_20_40;
6550
	}
6551 6552 6553 6554 6555 6556 6557 6558 6559 6560 6561
	/* p2p might require that "if-events" get processed by fweh. So
	 * activate the already registered event handlers now and activate
	 * the rest when initialization has completed. drvr->config needs to
	 * be assigned before activating events.
	 */
	drvr->config = cfg;
	err = brcmf_fweh_activate_events(ifp);
	if (err) {
		brcmf_err("FWEH activation failed (%d)\n", err);
		goto wiphy_unreg_out;
	}
6562

6563
	err = brcmf_p2p_attach(cfg, p2pdev_forced);
6564
	if (err) {
6565 6566 6567 6568 6569 6570 6571 6572
		brcmf_err("P2P initilisation failed (%d)\n", err);
		goto wiphy_unreg_out;
	}
	err = brcmf_btcoex_attach(cfg);
	if (err) {
		brcmf_err("BT-coex initialisation failed (%d)\n", err);
		brcmf_p2p_detach(&cfg->p2p);
		goto wiphy_unreg_out;
6573 6574
	}

6575 6576 6577 6578 6579 6580 6581 6582 6583
	if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_TDLS)) {
		err = brcmf_fil_iovar_int_set(ifp, "tdls_enable", 1);
		if (err) {
			brcmf_dbg(INFO, "TDLS not enabled (%d)\n", err);
			wiphy->flags &= ~WIPHY_FLAG_SUPPORTS_TDLS;
		} else {
			brcmf_fweh_register(cfg->pub, BRCMF_E_TDLS_PEER_EVENT,
					    brcmf_notify_tdls_peer_event);
		}
6584 6585
	}

6586 6587 6588 6589 6590 6591 6592
	/* (re-) activate FWEH event handling */
	err = brcmf_fweh_activate_events(ifp);
	if (err) {
		brcmf_err("FWEH activation failed (%d)\n", err);
		goto wiphy_unreg_out;
	}

6593 6594 6595 6596 6597 6598 6599 6600 6601
	/* Fill in some of the advertised nl80211 supported features */
	if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_SCAN_RANDOM_MAC)) {
		wiphy->features |= NL80211_FEATURE_SCHED_SCAN_RANDOM_MAC_ADDR;
#ifdef CONFIG_PM
		if (wiphy->wowlan->flags & WIPHY_WOWLAN_NET_DETECT)
			wiphy->features |= NL80211_FEATURE_ND_RANDOM_MAC_ADDR;
#endif
	}

6602 6603
	return cfg;

6604 6605 6606
wiphy_unreg_out:
	wiphy_unregister(cfg->wiphy);
priv_out:
6607 6608
	wl_deinit_priv(cfg);
	brcmf_free_vif(vif);
6609
	ifp->vif = NULL;
6610 6611
wiphy_out:
	brcmf_free_wiphy(wiphy);
6612 6613 6614 6615 6616 6617 6618 6619 6620
	return NULL;
}

void brcmf_cfg80211_detach(struct brcmf_cfg80211_info *cfg)
{
	if (!cfg)
		return;

	brcmf_btcoex_detach(cfg);
6621
	wiphy_unregister(cfg->wiphy);
6622
	wl_deinit_priv(cfg);
6623
	brcmf_free_wiphy(cfg->wiphy);
6624
}