cfg80211.c 190 KB
Newer Older
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
/*
 * Copyright (c) 2010 Broadcom Corporation
 *
 * Permission to use, copy, modify, and/or distribute this software for any
 * purpose with or without fee is hereby granted, provided that the above
 * copyright notice and this permission notice appear in all copies.
 *
 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY
 * SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION
 * OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN
 * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
 */

/* Toplevel file. Relies on dhd_linux.c to send commands to the dongle. */

#include <linux/kernel.h>
#include <linux/etherdevice.h>
21
#include <linux/module.h>
22
#include <linux/vmalloc.h>
23
#include <net/cfg80211.h>
24
#include <net/netlink.h>
25 26 27 28

#include <brcmu_utils.h>
#include <defs.h>
#include <brcmu_wifi.h>
29
#include "core.h"
30
#include "debug.h"
31
#include "tracepoint.h"
32
#include "fwil_types.h"
33
#include "p2p.h"
34
#include "btcoex.h"
35
#include "pno.h"
36
#include "cfg80211.h"
37
#include "feature.h"
38
#include "fwil.h"
39
#include "proto.h"
40
#include "vendor.h"
41
#include "bus.h"
42
#include "common.h"
43

44 45
#define BRCMF_SCAN_IE_LEN_MAX		2048

46 47 48 49
#define WPA_OUI				"\x00\x50\xF2"	/* WPA OUI */
#define WPA_OUI_TYPE			1
#define RSN_OUI				"\x00\x0F\xAC"	/* RSN OUI */
#define	WME_OUI_TYPE			2
50
#define WPS_OUI_TYPE			4
51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

#define VS_IE_FIXED_HDR_LEN		6
#define WPA_IE_VERSION_LEN		2
#define WPA_IE_MIN_OUI_LEN		4
#define WPA_IE_SUITE_COUNT_LEN		2

#define WPA_CIPHER_NONE			0	/* None */
#define WPA_CIPHER_WEP_40		1	/* WEP (40-bit) */
#define WPA_CIPHER_TKIP			2	/* TKIP: default for WPA */
#define WPA_CIPHER_AES_CCM		4	/* AES (CCM) */
#define WPA_CIPHER_WEP_104		5	/* WEP (104-bit) */

#define RSN_AKM_NONE			0	/* None (IBSS) */
#define RSN_AKM_UNSPECIFIED		1	/* Over 802.1x */
#define RSN_AKM_PSK			2	/* Pre-shared Key */
66 67
#define RSN_AKM_SHA256_1X		5	/* SHA256, 802.1X */
#define RSN_AKM_SHA256_PSK		6	/* SHA256, Pre-shared Key */
68
#define RSN_CAP_LEN			2	/* Length of RSN capabilities */
69 70 71 72
#define RSN_CAP_PTK_REPLAY_CNTR_MASK	(BIT(2) | BIT(3))
#define RSN_CAP_MFPR_MASK		BIT(6)
#define RSN_CAP_MFPC_MASK		BIT(7)
#define RSN_PMKID_COUNT_LEN		2
73 74 75 76 77 78 79 80

#define VNDR_IE_CMD_LEN			4	/* length of the set command
						 * string :"add", "del" (+ NUL)
						 */
#define VNDR_IE_COUNT_OFFSET		4
#define VNDR_IE_PKTFLAG_OFFSET		8
#define VNDR_IE_VSIE_OFFSET		12
#define VNDR_IE_HDR_SIZE		12
81
#define VNDR_IE_PARSE_LIMIT		5
82 83 84

#define	DOT11_MGMT_HDR_LEN		24	/* d11 management header len */
#define	DOT11_BCN_PRB_FIXED_LEN		12	/* beacon/probe fixed length */
85

86 87 88 89
#define BRCMF_SCAN_JOIN_ACTIVE_DWELL_TIME_MS	320
#define BRCMF_SCAN_JOIN_PASSIVE_DWELL_TIME_MS	400
#define BRCMF_SCAN_JOIN_PROBE_INTERVAL_MS	20

90 91 92 93
#define BRCMF_SCAN_CHANNEL_TIME		40
#define BRCMF_SCAN_UNASSOC_TIME		40
#define BRCMF_SCAN_PASSIVE_TIME		120

94 95
#define BRCMF_ND_INFO_TIMEOUT		msecs_to_jiffies(2000)

96 97 98
#define BRCMF_ASSOC_PARAMS_FIXED_SIZE \
	(sizeof(struct brcmf_assoc_params_le) - sizeof(u16))

99
static bool check_vif_up(struct brcmf_cfg80211_vif *vif)
100
{
101
	if (!test_bit(BRCMF_VIF_STATUS_READY, &vif->sme_state)) {
102 103
		brcmf_dbg(INFO, "device is not ready : status (%lu)\n",
			  vif->sme_state);
104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132
		return false;
	}
	return true;
}

#define RATE_TO_BASE100KBPS(rate)   (((rate) * 10) / 2)
#define RATETAB_ENT(_rateid, _flags) \
	{                                                               \
		.bitrate        = RATE_TO_BASE100KBPS(_rateid),     \
		.hw_value       = (_rateid),                            \
		.flags          = (_flags),                             \
	}

static struct ieee80211_rate __wl_rates[] = {
	RATETAB_ENT(BRCM_RATE_1M, 0),
	RATETAB_ENT(BRCM_RATE_2M, IEEE80211_RATE_SHORT_PREAMBLE),
	RATETAB_ENT(BRCM_RATE_5M5, IEEE80211_RATE_SHORT_PREAMBLE),
	RATETAB_ENT(BRCM_RATE_11M, IEEE80211_RATE_SHORT_PREAMBLE),
	RATETAB_ENT(BRCM_RATE_6M, 0),
	RATETAB_ENT(BRCM_RATE_9M, 0),
	RATETAB_ENT(BRCM_RATE_12M, 0),
	RATETAB_ENT(BRCM_RATE_18M, 0),
	RATETAB_ENT(BRCM_RATE_24M, 0),
	RATETAB_ENT(BRCM_RATE_36M, 0),
	RATETAB_ENT(BRCM_RATE_48M, 0),
	RATETAB_ENT(BRCM_RATE_54M, 0),
};

#define wl_g_rates		(__wl_rates + 0)
133 134 135 136 137
#define wl_g_rates_size		ARRAY_SIZE(__wl_rates)
#define wl_a_rates		(__wl_rates + 4)
#define wl_a_rates_size		(wl_g_rates_size - 4)

#define CHAN2G(_channel, _freq) {				\
138
	.band			= NL80211_BAND_2GHZ,		\
139 140 141 142 143 144 145
	.center_freq		= (_freq),			\
	.hw_value		= (_channel),			\
	.max_antenna_gain	= 0,				\
	.max_power		= 30,				\
}

#define CHAN5G(_channel) {					\
146
	.band			= NL80211_BAND_5GHZ,		\
147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167
	.center_freq		= 5000 + (5 * (_channel)),	\
	.hw_value		= (_channel),			\
	.max_antenna_gain	= 0,				\
	.max_power		= 30,				\
}

static struct ieee80211_channel __wl_2ghz_channels[] = {
	CHAN2G(1, 2412), CHAN2G(2, 2417), CHAN2G(3, 2422), CHAN2G(4, 2427),
	CHAN2G(5, 2432), CHAN2G(6, 2437), CHAN2G(7, 2442), CHAN2G(8, 2447),
	CHAN2G(9, 2452), CHAN2G(10, 2457), CHAN2G(11, 2462), CHAN2G(12, 2467),
	CHAN2G(13, 2472), CHAN2G(14, 2484)
};

static struct ieee80211_channel __wl_5ghz_channels[] = {
	CHAN5G(34), CHAN5G(36), CHAN5G(38), CHAN5G(40), CHAN5G(42),
	CHAN5G(44), CHAN5G(46), CHAN5G(48), CHAN5G(52), CHAN5G(56),
	CHAN5G(60), CHAN5G(64), CHAN5G(100), CHAN5G(104), CHAN5G(108),
	CHAN5G(112), CHAN5G(116), CHAN5G(120), CHAN5G(124), CHAN5G(128),
	CHAN5G(132), CHAN5G(136), CHAN5G(140), CHAN5G(144), CHAN5G(149),
	CHAN5G(153), CHAN5G(157), CHAN5G(161), CHAN5G(165)
};
168

169
/* Band templates duplicated per wiphy. The channel info
170
 * above is added to the band during setup.
171 172
 */
static const struct ieee80211_supported_band __wl_band_2ghz = {
173
	.band = NL80211_BAND_2GHZ,
174 175 176 177
	.bitrates = wl_g_rates,
	.n_bitrates = wl_g_rates_size,
};

178
static const struct ieee80211_supported_band __wl_band_5ghz = {
179
	.band = NL80211_BAND_5GHZ,
180 181 182 183
	.bitrates = wl_a_rates,
	.n_bitrates = wl_a_rates_size,
};

184 185
/* This is to override regulatory domains defined in cfg80211 module (reg.c)
 * By default world regulatory domain defined in reg.c puts the flags
186 187 188
 * NL80211_RRF_NO_IR for 5GHz channels (for * 36..48 and 149..165).
 * With respect to these flags, wpa_supplicant doesn't * start p2p
 * operations on 5GHz channels. All the changes in world regulatory
189 190 191 192 193 194 195 196 197 198 199 200 201 202
 * domain are to be done here.
 */
static const struct ieee80211_regdomain brcmf_regdom = {
	.n_reg_rules = 4,
	.alpha2 =  "99",
	.reg_rules = {
		/* IEEE 802.11b/g, channels 1..11 */
		REG_RULE(2412-10, 2472+10, 40, 6, 20, 0),
		/* If any */
		/* IEEE 802.11 channel 14 - Only JP enables
		 * this and for 802.11b only
		 */
		REG_RULE(2484-10, 2484+10, 20, 6, 20, 0),
		/* IEEE 802.11a, channel 36..64 */
203
		REG_RULE(5150-10, 5350+10, 80, 6, 20, 0),
204
		/* IEEE 802.11a, channel 100..165 */
205
		REG_RULE(5470-10, 5850+10, 80, 6, 20, 0), }
206 207
};

208 209 210 211 212 213 214
/* Note: brcmf_cipher_suites is an array of int defining which cipher suites
 * are supported. A pointer to this array and the number of entries is passed
 * on to upper layers. AES_CMAC defines whether or not the driver supports MFP.
 * So the cipher suite AES_CMAC has to be the last one in the array, and when
 * device does not support MFP then the number of suites will be decreased by 1
 */
static const u32 brcmf_cipher_suites[] = {
215 216 217 218
	WLAN_CIPHER_SUITE_WEP40,
	WLAN_CIPHER_SUITE_WEP104,
	WLAN_CIPHER_SUITE_TKIP,
	WLAN_CIPHER_SUITE_CCMP,
219 220
	/* Keep as last entry: */
	WLAN_CIPHER_SUITE_AES_CMAC
221 222
};

223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238
/* Vendor specific ie. id = 221, oui and type defines exact ie */
struct brcmf_vs_tlv {
	u8 id;
	u8 len;
	u8 oui[3];
	u8 oui_type;
};

struct parsed_vndr_ie_info {
	u8 *ie_ptr;
	u32 ie_len;	/* total length including id & length field */
	struct brcmf_vs_tlv vndrie;
};

struct parsed_vndr_ies {
	u32 count;
239
	struct parsed_vndr_ie_info ie_info[VNDR_IE_PARSE_LIMIT];
240 241
};

242 243 244 245 246 247 248 249 250 251 252 253 254 255
static u8 nl80211_band_to_fwil(enum nl80211_band band)
{
	switch (band) {
	case NL80211_BAND_2GHZ:
		return WLC_BAND_2G;
	case NL80211_BAND_5GHZ:
		return WLC_BAND_5G;
	default:
		WARN_ON(1);
		break;
	}
	return 0;
}

256 257
static u16 chandef_to_chanspec(struct brcmu_d11inf *d11inf,
			       struct cfg80211_chan_def *ch)
258 259 260 261 262 263 264
{
	struct brcmu_chan ch_inf;
	s32 primary_offset;

	brcmf_dbg(TRACE, "chandef: control %d center %d width %d\n",
		  ch->chan->center_freq, ch->center_freq1, ch->width);
	ch_inf.chnum = ieee80211_frequency_to_channel(ch->center_freq1);
265
	primary_offset = ch->chan->center_freq - ch->center_freq1;
266 267
	switch (ch->width) {
	case NL80211_CHAN_WIDTH_20:
268
	case NL80211_CHAN_WIDTH_20_NOHT:
269 270 271 272 273
		ch_inf.bw = BRCMU_CHAN_BW_20;
		WARN_ON(primary_offset != 0);
		break;
	case NL80211_CHAN_WIDTH_40:
		ch_inf.bw = BRCMU_CHAN_BW_40;
274
		if (primary_offset > 0)
275 276 277 278 279 280
			ch_inf.sb = BRCMU_CHAN_SB_U;
		else
			ch_inf.sb = BRCMU_CHAN_SB_L;
		break;
	case NL80211_CHAN_WIDTH_80:
		ch_inf.bw = BRCMU_CHAN_BW_80;
281 282 283 284 285 286 287 288
		if (primary_offset == -30)
			ch_inf.sb = BRCMU_CHAN_SB_LL;
		else if (primary_offset == -10)
			ch_inf.sb = BRCMU_CHAN_SB_LU;
		else if (primary_offset == 10)
			ch_inf.sb = BRCMU_CHAN_SB_UL;
		else
			ch_inf.sb = BRCMU_CHAN_SB_UU;
289
		break;
290 291 292 293
	case NL80211_CHAN_WIDTH_80P80:
	case NL80211_CHAN_WIDTH_160:
	case NL80211_CHAN_WIDTH_5:
	case NL80211_CHAN_WIDTH_10:
294 295 296 297
	default:
		WARN_ON_ONCE(1);
	}
	switch (ch->chan->band) {
298
	case NL80211_BAND_2GHZ:
299 300
		ch_inf.band = BRCMU_CHAN_BAND_2G;
		break;
301
	case NL80211_BAND_5GHZ:
302 303
		ch_inf.band = BRCMU_CHAN_BAND_5G;
		break;
304
	case NL80211_BAND_60GHZ:
305 306 307 308 309 310 311 312
	default:
		WARN_ON_ONCE(1);
	}
	d11inf->encchspec(&ch_inf);

	return ch_inf.chspec;
}

313 314
u16 channel_to_chanspec(struct brcmu_d11inf *d11inf,
			struct ieee80211_channel *ch)
315
{
316
	struct brcmu_chan ch_inf;
317

318 319 320
	ch_inf.chnum = ieee80211_frequency_to_channel(ch->center_freq);
	ch_inf.bw = BRCMU_CHAN_BW_20;
	d11inf->encchspec(&ch_inf);
321

322
	return ch_inf.chspec;
323 324
}

325 326 327 328
/* Traverse a string of 1-byte tag/1-byte length/variable-length value
 * triples, returning a pointer to the substring whose first element
 * matches tag
 */
329
static const struct brcmf_tlv *
330
brcmf_parse_tlvs(const void *buf, int buflen, uint key)
331
{
332 333
	const struct brcmf_tlv *elt = buf;
	int totlen = buflen;
334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353

	/* find tagged parameter */
	while (totlen >= TLV_HDR_LEN) {
		int len = elt->len;

		/* validate remaining totlen */
		if ((elt->id == key) && (totlen >= (len + TLV_HDR_LEN)))
			return elt;

		elt = (struct brcmf_tlv *)((u8 *)elt + (len + TLV_HDR_LEN));
		totlen -= (len + TLV_HDR_LEN);
	}

	return NULL;
}

/* Is any of the tlvs the expected entry? If
 * not update the tlvs buffer pointer/length.
 */
static bool
354 355
brcmf_tlv_has_ie(const u8 *ie, const u8 **tlvs, u32 *tlvs_len,
		 const u8 *oui, u32 oui_len, u8 type)
356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376
{
	/* If the contents match the OUI and the type */
	if (ie[TLV_LEN_OFF] >= oui_len + 1 &&
	    !memcmp(&ie[TLV_BODY_OFF], oui, oui_len) &&
	    type == ie[TLV_BODY_OFF + oui_len]) {
		return true;
	}

	if (tlvs == NULL)
		return false;
	/* point to the next ie */
	ie += ie[TLV_LEN_OFF] + TLV_HDR_LEN;
	/* calculate the length of the rest of the buffer */
	*tlvs_len -= (int)(ie - *tlvs);
	/* update the pointer to the start of the buffer */
	*tlvs = ie;

	return false;
}

static struct brcmf_vs_tlv *
377
brcmf_find_wpaie(const u8 *parse, u32 len)
378
{
379
	const struct brcmf_tlv *ie;
380 381

	while ((ie = brcmf_parse_tlvs(parse, len, WLAN_EID_VENDOR_SPECIFIC))) {
382
		if (brcmf_tlv_has_ie((const u8 *)ie, &parse, &len,
383 384 385 386 387 388 389
				     WPA_OUI, TLV_OUI_LEN, WPA_OUI_TYPE))
			return (struct brcmf_vs_tlv *)ie;
	}
	return NULL;
}

static struct brcmf_vs_tlv *
390
brcmf_find_wpsie(const u8 *parse, u32 len)
391
{
392
	const struct brcmf_tlv *ie;
393 394 395 396 397 398 399 400 401

	while ((ie = brcmf_parse_tlvs(parse, len, WLAN_EID_VENDOR_SPECIFIC))) {
		if (brcmf_tlv_has_ie((u8 *)ie, &parse, &len,
				     WPA_OUI, TLV_OUI_LEN, WPS_OUI_TYPE))
			return (struct brcmf_vs_tlv *)ie;
	}
	return NULL;
}

402 403 404 405 406
static int brcmf_vif_change_validate(struct brcmf_cfg80211_info *cfg,
				     struct brcmf_cfg80211_vif *vif,
				     enum nl80211_iftype new_type)
{
	struct brcmf_cfg80211_vif *pos;
407 408
	bool check_combos = false;
	int ret = 0;
409 410 411
	struct iface_combination_params params = {
		.num_different_channels = 1,
	};
412 413

	list_for_each_entry(pos, &cfg->vif_list, list)
414
		if (pos == vif) {
415
			params.iftype_num[new_type]++;
416 417 418
		} else {
			/* concurrent interfaces so need check combinations */
			check_combos = true;
419
			params.iftype_num[pos->wdev.iftype]++;
420 421 422
		}

	if (check_combos)
423
		ret = cfg80211_check_combinations(cfg->wiphy, &params);
424

425
	return ret;
426 427 428 429 430 431
}

static int brcmf_vif_add_validate(struct brcmf_cfg80211_info *cfg,
				  enum nl80211_iftype new_type)
{
	struct brcmf_cfg80211_vif *pos;
432 433 434
	struct iface_combination_params params = {
		.num_different_channels = 1,
	};
435 436

	list_for_each_entry(pos, &cfg->vif_list, list)
437
		params.iftype_num[pos->wdev.iftype]++;
438

439 440
	params.iftype_num[new_type]++;
	return cfg80211_check_combinations(cfg->wiphy, &params);
441
}
442

443 444 445 446 447 448 449 450 451 452 453 454 455 456
static void convert_key_from_CPU(struct brcmf_wsec_key *key,
				 struct brcmf_wsec_key_le *key_le)
{
	key_le->index = cpu_to_le32(key->index);
	key_le->len = cpu_to_le32(key->len);
	key_le->algo = cpu_to_le32(key->algo);
	key_le->flags = cpu_to_le32(key->flags);
	key_le->rxiv.hi = cpu_to_le32(key->rxiv.hi);
	key_le->rxiv.lo = cpu_to_le16(key->rxiv.lo);
	key_le->iv_initialized = cpu_to_le32(key->iv_initialized);
	memcpy(key_le->data, key->data, sizeof(key->data));
	memcpy(key_le->ea, key->ea, sizeof(key->ea));
}

457
static int
458
send_key_to_dongle(struct brcmf_if *ifp, struct brcmf_wsec_key *key)
459 460 461 462 463
{
	int err;
	struct brcmf_wsec_key_le key_le;

	convert_key_from_CPU(key, &key_le);
464

465
	brcmf_netdev_wait_pend8021x(ifp);
466

467
	err = brcmf_fil_bsscfg_data_set(ifp, "wsec_key", &key_le,
468
					sizeof(key_le));
469

470
	if (err)
471
		brcmf_err("wsec_key error (%d)\n", err);
472 473 474
	return err;
}

475 476 477
static void
brcmf_cfg80211_update_proto_addr_mode(struct wireless_dev *wdev)
{
478 479 480 481 482
	struct brcmf_cfg80211_vif *vif;
	struct brcmf_if *ifp;

	vif = container_of(wdev, struct brcmf_cfg80211_vif, wdev);
	ifp = vif->ifp;
483 484 485 486 487 488 489 490 491 492 493

	if ((wdev->iftype == NL80211_IFTYPE_ADHOC) ||
	    (wdev->iftype == NL80211_IFTYPE_AP) ||
	    (wdev->iftype == NL80211_IFTYPE_P2P_GO))
		brcmf_proto_configure_addr_mode(ifp->drvr, ifp->ifidx,
						ADDR_DIRECT);
	else
		brcmf_proto_configure_addr_mode(ifp->drvr, ifp->ifidx,
						ADDR_INDIRECT);
}

494 495 496 497 498 499 500 501 502 503 504 505 506 507 508
static int brcmf_get_first_free_bsscfgidx(struct brcmf_pub *drvr)
{
	int bsscfgidx;

	for (bsscfgidx = 0; bsscfgidx < BRCMF_MAX_IFS; bsscfgidx++) {
		/* bsscfgidx 1 is reserved for legacy P2P */
		if (bsscfgidx == 1)
			continue;
		if (!drvr->iflist[bsscfgidx])
			return bsscfgidx;
	}

	return -ENOMEM;
}

509 510 511 512 513 514 515
static int brcmf_cfg80211_request_ap_if(struct brcmf_if *ifp)
{
	struct brcmf_mbss_ssid_le mbss_ssid_le;
	int bsscfgidx;
	int err;

	memset(&mbss_ssid_le, 0, sizeof(mbss_ssid_le));
516
	bsscfgidx = brcmf_get_first_free_bsscfgidx(ifp->drvr);
517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540
	if (bsscfgidx < 0)
		return bsscfgidx;

	mbss_ssid_le.bsscfgidx = cpu_to_le32(bsscfgidx);
	mbss_ssid_le.SSID_len = cpu_to_le32(5);
	sprintf(mbss_ssid_le.SSID, "ssid%d" , bsscfgidx);

	err = brcmf_fil_bsscfg_data_set(ifp, "bsscfg:ssid", &mbss_ssid_le,
					sizeof(mbss_ssid_le));
	if (err < 0)
		brcmf_err("setting ssid failed %d\n", err);

	return err;
}

/**
 * brcmf_ap_add_vif() - create a new AP virtual interface for multiple BSS
 *
 * @wiphy: wiphy device of new interface.
 * @name: name of the new interface.
 * @params: contains mac address for AP device.
 */
static
struct wireless_dev *brcmf_ap_add_vif(struct wiphy *wiphy, const char *name,
541
				      struct vif_params *params)
542 543 544 545 546 547 548 549 550 551 552
{
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
	struct brcmf_if *ifp = netdev_priv(cfg_to_ndev(cfg));
	struct brcmf_cfg80211_vif *vif;
	int err;

	if (brcmf_cfg80211_vif_event_armed(cfg))
		return ERR_PTR(-EBUSY);

	brcmf_dbg(INFO, "Adding vif \"%s\"\n", name);

553
	vif = brcmf_alloc_vif(cfg, NL80211_IFTYPE_AP);
554 555 556 557 558 559 560 561 562 563 564 565
	if (IS_ERR(vif))
		return (struct wireless_dev *)vif;

	brcmf_cfg80211_arm_vif_event(cfg, vif);

	err = brcmf_cfg80211_request_ap_if(ifp);
	if (err) {
		brcmf_cfg80211_arm_vif_event(cfg, NULL);
		goto fail;
	}

	/* wait for firmware event */
566 567
	err = brcmf_cfg80211_wait_vif_event(cfg, BRCMF_E_IF_ADD,
					    BRCMF_VIF_EVENT_TIMEOUT);
568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586
	brcmf_cfg80211_arm_vif_event(cfg, NULL);
	if (!err) {
		brcmf_err("timeout occurred\n");
		err = -EIO;
		goto fail;
	}

	/* interface created in firmware */
	ifp = vif->ifp;
	if (!ifp) {
		brcmf_err("no if pointer provided\n");
		err = -ENOENT;
		goto fail;
	}

	strncpy(ifp->ndev->name, name, sizeof(ifp->ndev->name) - 1);
	err = brcmf_net_attach(ifp, true);
	if (err) {
		brcmf_err("Registering netdevice failed\n");
587
		free_netdev(ifp->ndev);
588 589 590 591 592 593 594 595 596 597
		goto fail;
	}

	return &ifp->vif->wdev;

fail:
	brcmf_free_vif(vif);
	return ERR_PTR(err);
}

598 599 600 601 602 603 604 605 606 607 608 609 610
static bool brcmf_is_apmode(struct brcmf_cfg80211_vif *vif)
{
	enum nl80211_iftype iftype;

	iftype = vif->wdev.iftype;
	return iftype == NL80211_IFTYPE_AP || iftype == NL80211_IFTYPE_P2P_GO;
}

static bool brcmf_is_ibssmode(struct brcmf_cfg80211_vif *vif)
{
	return vif->wdev.iftype == NL80211_IFTYPE_ADHOC;
}

611 612
static struct wireless_dev *brcmf_cfg80211_add_iface(struct wiphy *wiphy,
						     const char *name,
613
						     unsigned char name_assign_type,
614 615 616
						     enum nl80211_iftype type,
						     struct vif_params *params)
{
617
	struct wireless_dev *wdev;
618
	int err;
619

620
	brcmf_dbg(TRACE, "enter: %s type %d\n", name, type);
621 622 623 624 625
	err = brcmf_vif_add_validate(wiphy_to_cfg(wiphy), type);
	if (err) {
		brcmf_err("iface validation failed: err=%d\n", err);
		return ERR_PTR(err);
	}
626 627 628 629 630 631 632 633
	switch (type) {
	case NL80211_IFTYPE_ADHOC:
	case NL80211_IFTYPE_STATION:
	case NL80211_IFTYPE_AP_VLAN:
	case NL80211_IFTYPE_WDS:
	case NL80211_IFTYPE_MONITOR:
	case NL80211_IFTYPE_MESH_POINT:
		return ERR_PTR(-EOPNOTSUPP);
634
	case NL80211_IFTYPE_AP:
635
		wdev = brcmf_ap_add_vif(wiphy, name, params);
636
		break;
637 638
	case NL80211_IFTYPE_P2P_CLIENT:
	case NL80211_IFTYPE_P2P_GO:
639
	case NL80211_IFTYPE_P2P_DEVICE:
640
		wdev = brcmf_p2p_add_vif(wiphy, name, name_assign_type, type, params);
641
		break;
642 643 644 645
	case NL80211_IFTYPE_UNSPECIFIED:
	default:
		return ERR_PTR(-EINVAL);
	}
646 647 648 649 650 651 652 653

	if (IS_ERR(wdev))
		brcmf_err("add iface %s type %d failed: err=%d\n",
			  name, type, (int)PTR_ERR(wdev));
	else
		brcmf_cfg80211_update_proto_addr_mode(wdev);

	return wdev;
654 655
}

656 657
static void brcmf_scan_config_mpc(struct brcmf_if *ifp, int mpc)
{
658
	if (brcmf_feat_is_quirk_enabled(ifp, BRCMF_FEAT_QUIRK_NEED_MPC))
659 660 661
		brcmf_set_mpc(ifp, mpc);
}

662
void brcmf_set_mpc(struct brcmf_if *ifp, int mpc)
663 664 665 666 667 668 669 670 671 672 673 674 675
{
	s32 err = 0;

	if (check_vif_up(ifp->vif)) {
		err = brcmf_fil_iovar_int_set(ifp, "mpc", mpc);
		if (err) {
			brcmf_err("fail to set mpc\n");
			return;
		}
		brcmf_dbg(INFO, "MPC : %d\n", mpc);
	}
}

676 677 678
s32 brcmf_notify_escan_complete(struct brcmf_cfg80211_info *cfg,
				struct brcmf_if *ifp, bool aborted,
				bool fw_abort)
679 680 681
{
	struct brcmf_scan_params_le params_le;
	struct cfg80211_scan_request *scan_request;
682 683
	u64 reqid;
	u32 bucket;
684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699
	s32 err = 0;

	brcmf_dbg(SCAN, "Enter\n");

	/* clear scan request, because the FW abort can cause a second call */
	/* to this functon and might cause a double cfg80211_scan_done      */
	scan_request = cfg->scan_request;
	cfg->scan_request = NULL;

	if (timer_pending(&cfg->escan_timeout))
		del_timer_sync(&cfg->escan_timeout);

	if (fw_abort) {
		/* Do a scan abort to stop the driver's scan engine */
		brcmf_dbg(SCAN, "ABORT scan in firmware\n");
		memset(&params_le, 0, sizeof(params_le));
700
		eth_broadcast_addr(params_le.bssid);
701 702 703 704 705 706 707 708 709 710
		params_le.bss_type = DOT11_BSSTYPE_ANY;
		params_le.scan_type = 0;
		params_le.channel_num = cpu_to_le32(1);
		params_le.nprobes = cpu_to_le32(1);
		params_le.active_time = cpu_to_le32(-1);
		params_le.passive_time = cpu_to_le32(-1);
		params_le.home_time = cpu_to_le32(-1);
		/* Scan is aborted by setting channel_list[0] to -1 */
		params_le.channel_list[0] = cpu_to_le16(-1);
		/* E-Scan (or anyother type) can be aborted by SCAN */
711
		err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SCAN,
712 713
					     &params_le, sizeof(params_le));
		if (err)
714
			brcmf_err("Scan abort failed\n");
715
	}
716

717
	brcmf_scan_config_mpc(ifp, 1);
718

719
	/*
720
	 * e-scan can be initiated internally
721 722
	 * which takes precedence.
	 */
723 724 725 726 727 728 729 730 731 732 733 734 735 736 737
	if (cfg->int_escan_map) {
		brcmf_dbg(SCAN, "scheduled scan completed (%x)\n",
			  cfg->int_escan_map);
		while (cfg->int_escan_map) {
			bucket = __ffs(cfg->int_escan_map);
			cfg->int_escan_map &= ~BIT(bucket);
			reqid = brcmf_pno_find_reqid_by_bucket(cfg->pno,
							       bucket);
			if (!aborted) {
				brcmf_dbg(SCAN, "report results: reqid=%llu\n",
					  reqid);
				cfg80211_sched_scan_results(cfg_to_wiphy(cfg),
							    reqid);
			}
		}
738
	} else if (scan_request) {
739 740 741 742
		struct cfg80211_scan_info info = {
			.aborted = aborted,
		};

743 744
		brcmf_dbg(SCAN, "ESCAN Completed scan: %s\n",
			  aborted ? "Aborted" : "Done");
745
		cfg80211_scan_done(scan_request, &info);
746
	}
747 748
	if (!test_and_clear_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status))
		brcmf_dbg(SCAN, "Scan complete, probably P2P scan\n");
749 750 751 752

	return err;
}

753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 771 772 773 774 775 776 777 778 779 780 781 782 783 784 785
static int brcmf_cfg80211_del_ap_iface(struct wiphy *wiphy,
				       struct wireless_dev *wdev)
{
	struct brcmf_cfg80211_info *cfg = wiphy_priv(wiphy);
	struct net_device *ndev = wdev->netdev;
	struct brcmf_if *ifp = netdev_priv(ndev);
	int ret;
	int err;

	brcmf_cfg80211_arm_vif_event(cfg, ifp->vif);

	err = brcmf_fil_bsscfg_data_set(ifp, "interface_remove", NULL, 0);
	if (err) {
		brcmf_err("interface_remove failed %d\n", err);
		goto err_unarm;
	}

	/* wait for firmware event */
	ret = brcmf_cfg80211_wait_vif_event(cfg, BRCMF_E_IF_DEL,
					    BRCMF_VIF_EVENT_TIMEOUT);
	if (!ret) {
		brcmf_err("timeout occurred\n");
		err = -EIO;
		goto err_unarm;
	}

	brcmf_remove_interface(ifp, true);

err_unarm:
	brcmf_cfg80211_arm_vif_event(cfg, NULL);
	return err;
}

786 787 788
static
int brcmf_cfg80211_del_iface(struct wiphy *wiphy, struct wireless_dev *wdev)
{
789 790 791
	struct brcmf_cfg80211_info *cfg = wiphy_priv(wiphy);
	struct net_device *ndev = wdev->netdev;

792 793 794
	if (ndev && ndev == cfg_to_ndev(cfg))
		return -ENOTSUPP;

795 796 797 798 799 800
	/* vif event pending in firmware */
	if (brcmf_cfg80211_vif_event_armed(cfg))
		return -EBUSY;

	if (ndev) {
		if (test_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status) &&
801 802 803
		    cfg->escan_info.ifp == netdev_priv(ndev))
			brcmf_notify_escan_complete(cfg, netdev_priv(ndev),
						    true, true);
804 805 806 807

		brcmf_fil_iovar_int_set(netdev_priv(ndev), "mpc", 1);
	}

808 809 810 811 812 813 814 815
	switch (wdev->iftype) {
	case NL80211_IFTYPE_ADHOC:
	case NL80211_IFTYPE_STATION:
	case NL80211_IFTYPE_AP_VLAN:
	case NL80211_IFTYPE_WDS:
	case NL80211_IFTYPE_MONITOR:
	case NL80211_IFTYPE_MESH_POINT:
		return -EOPNOTSUPP;
816 817
	case NL80211_IFTYPE_AP:
		return brcmf_cfg80211_del_ap_iface(wiphy, wdev);
818 819
	case NL80211_IFTYPE_P2P_CLIENT:
	case NL80211_IFTYPE_P2P_GO:
820
	case NL80211_IFTYPE_P2P_DEVICE:
821 822 823 824 825 826 827 828
		return brcmf_p2p_del_vif(wiphy, wdev);
	case NL80211_IFTYPE_UNSPECIFIED:
	default:
		return -EINVAL;
	}
	return -EOPNOTSUPP;
}

829 830
static s32
brcmf_cfg80211_change_iface(struct wiphy *wiphy, struct net_device *ndev,
831
			 enum nl80211_iftype type,
832 833
			 struct vif_params *params)
{
834
	struct brcmf_cfg80211_info *cfg = wiphy_priv(wiphy);
835
	struct brcmf_if *ifp = netdev_priv(ndev);
836
	struct brcmf_cfg80211_vif *vif = ifp->vif;
837
	s32 infra = 0;
838
	s32 ap = 0;
839 840
	s32 err = 0;

841 842
	brcmf_dbg(TRACE, "Enter, bsscfgidx=%d, type=%d\n", ifp->bsscfgidx,
		  type);
843 844 845 846 847 848 849 850 851 852 853 854 855 856 857 858 859 860 861 862 863 864 865 866 867 868 869 870 871 872 873

	/* WAR: There are a number of p2p interface related problems which
	 * need to be handled initially (before doing the validate).
	 * wpa_supplicant tends to do iface changes on p2p device/client/go
	 * which are not always possible/allowed. However we need to return
	 * OK otherwise the wpa_supplicant wont start. The situation differs
	 * on configuration and setup (p2pon=1 module param). The first check
	 * is to see if the request is a change to station for p2p iface.
	 */
	if ((type == NL80211_IFTYPE_STATION) &&
	    ((vif->wdev.iftype == NL80211_IFTYPE_P2P_CLIENT) ||
	     (vif->wdev.iftype == NL80211_IFTYPE_P2P_GO) ||
	     (vif->wdev.iftype == NL80211_IFTYPE_P2P_DEVICE))) {
		brcmf_dbg(TRACE, "Ignoring cmd for p2p if\n");
		/* Now depending on whether module param p2pon=1 was used the
		 * response needs to be either 0 or EOPNOTSUPP. The reason is
		 * that if p2pon=1 is used, but a newer supplicant is used then
		 * we should return an error, as this combination wont work.
		 * In other situations 0 is returned and supplicant will start
		 * normally. It will give a trace in cfg80211, but it is the
		 * only way to get it working. Unfortunately this will result
		 * in situation where we wont support new supplicant in
		 * combination with module param p2pon=1, but that is the way
		 * it is. If the user tries this then unloading of driver might
		 * fail/lock.
		 */
		if (cfg->p2p.p2pdev_dynamically)
			return -EOPNOTSUPP;
		else
			return 0;
	}
874 875 876 877 878
	err = brcmf_vif_change_validate(wiphy_to_cfg(wiphy), vif, type);
	if (err) {
		brcmf_err("iface validation failed: err=%d\n", err);
		return err;
	}
879 880 881
	switch (type) {
	case NL80211_IFTYPE_MONITOR:
	case NL80211_IFTYPE_WDS:
882 883
		brcmf_err("type (%d) : currently we do not support this type\n",
			  type);
884 885 886 887 888 889 890
		return -EOPNOTSUPP;
	case NL80211_IFTYPE_ADHOC:
		infra = 0;
		break;
	case NL80211_IFTYPE_STATION:
		infra = 1;
		break;
891
	case NL80211_IFTYPE_AP:
892
	case NL80211_IFTYPE_P2P_GO:
893 894
		ap = 1;
		break;
895 896 897 898 899
	default:
		err = -EINVAL;
		goto done;
	}

900
	if (ap) {
901 902 903 904 905 906 907
		if (type == NL80211_IFTYPE_P2P_GO) {
			brcmf_dbg(INFO, "IF Type = P2P GO\n");
			err = brcmf_p2p_ifchange(cfg, BRCMF_FIL_P2P_IF_GO);
		}
		if (!err) {
			brcmf_dbg(INFO, "IF Type = AP\n");
		}
908
	} else {
909
		err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_INFRA, infra);
910
		if (err) {
911
			brcmf_err("WLC_SET_INFRA error (%d)\n", err);
912 913 914
			err = -EAGAIN;
			goto done;
		}
915
		brcmf_dbg(INFO, "IF Type = %s\n", brcmf_is_ibssmode(vif) ?
916
			  "Adhoc" : "Infra");
917
	}
918
	ndev->ieee80211_ptr->iftype = type;
919

920 921
	brcmf_cfg80211_update_proto_addr_mode(&vif->wdev);

922
done:
923
	brcmf_dbg(TRACE, "Exit\n");
924 925 926 927

	return err;
}

928 929
static void brcmf_escan_prep(struct brcmf_cfg80211_info *cfg,
			     struct brcmf_scan_params_le *params_le,
930 931 932 933 934 935
			     struct cfg80211_scan_request *request)
{
	u32 n_ssids;
	u32 n_channels;
	s32 i;
	s32 offset;
936
	u16 chanspec;
937
	char *ptr;
938
	struct brcmf_ssid_le ssid_le;
939

940
	eth_broadcast_addr(params_le->bssid);
941
	params_le->bss_type = DOT11_BSSTYPE_ANY;
942
	params_le->scan_type = BRCMF_SCANTYPE_ACTIVE;
943 944 945 946 947 948 949 950 951
	params_le->channel_num = 0;
	params_le->nprobes = cpu_to_le32(-1);
	params_le->active_time = cpu_to_le32(-1);
	params_le->passive_time = cpu_to_le32(-1);
	params_le->home_time = cpu_to_le32(-1);
	memset(&params_le->ssid_le, 0, sizeof(params_le->ssid_le));

	n_ssids = request->n_ssids;
	n_channels = request->n_channels;
952

953
	/* Copy channel array if applicable */
954 955
	brcmf_dbg(SCAN, "### List of channelspecs to scan ### %d\n",
		  n_channels);
956 957
	if (n_channels > 0) {
		for (i = 0; i < n_channels; i++) {
958 959
			chanspec = channel_to_chanspec(&cfg->d11inf,
						       request->channels[i]);
960 961
			brcmf_dbg(SCAN, "Chan : %d, Channel spec: %x\n",
				  request->channels[i]->hw_value, chanspec);
962
			params_le->channel_list[i] = cpu_to_le16(chanspec);
963 964
		}
	} else {
965
		brcmf_dbg(SCAN, "Scanning all channels\n");
966 967
	}
	/* Copy ssid array if applicable */
968
	brcmf_dbg(SCAN, "### List of SSIDs to scan ### %d\n", n_ssids);
969 970 971 972 973 974
	if (n_ssids > 0) {
		offset = offsetof(struct brcmf_scan_params_le, channel_list) +
				n_channels * sizeof(u16);
		offset = roundup(offset, sizeof(u32));
		ptr = (char *)params_le + offset;
		for (i = 0; i < n_ssids; i++) {
975 976 977 978 979 980
			memset(&ssid_le, 0, sizeof(ssid_le));
			ssid_le.SSID_len =
					cpu_to_le32(request->ssids[i].ssid_len);
			memcpy(ssid_le.SSID, request->ssids[i].ssid,
			       request->ssids[i].ssid_len);
			if (!ssid_le.SSID_len)
981
				brcmf_dbg(SCAN, "%d: Broadcast scan\n", i);
982
			else
983
				brcmf_dbg(SCAN, "%d: scan for  %.32s size=%d\n",
984
					  i, ssid_le.SSID, ssid_le.SSID_len);
985 986
			memcpy(ptr, &ssid_le, sizeof(ssid_le));
			ptr += sizeof(ssid_le);
987 988
		}
	} else {
989 990
		brcmf_dbg(SCAN, "Performing passive scan\n");
		params_le->scan_type = BRCMF_SCANTYPE_PASSIVE;
991 992 993 994 995 996 997 998
	}
	/* Adding mask to channel numbers */
	params_le->channel_num =
		cpu_to_le32((n_ssids << BRCMF_SCAN_PARAMS_NSSID_SHIFT) |
			(n_channels & BRCMF_SCAN_PARAMS_COUNT_MASK));
}

static s32
999
brcmf_run_escan(struct brcmf_cfg80211_info *cfg, struct brcmf_if *ifp,
1000
		struct cfg80211_scan_request *request)
1001 1002 1003 1004 1005 1006
{
	s32 params_size = BRCMF_SCAN_PARAMS_FIXED_SIZE +
			  offsetof(struct brcmf_escan_params_le, params_le);
	struct brcmf_escan_params_le *params;
	s32 err = 0;

1007
	brcmf_dbg(SCAN, "E-SCAN START\n");
1008 1009 1010 1011 1012 1013

	if (request != NULL) {
		/* Allocate space for populating ssids in struct */
		params_size += sizeof(u32) * ((request->n_channels + 1) / 2);

		/* Allocate space for populating ssids in struct */
1014
		params_size += sizeof(struct brcmf_ssid_le) * request->n_ssids;
1015 1016 1017 1018 1019 1020 1021 1022
	}

	params = kzalloc(params_size, GFP_KERNEL);
	if (!params) {
		err = -ENOMEM;
		goto exit;
	}
	BUG_ON(params_size + sizeof("escan") >= BRCMF_DCMD_MEDLEN);
1023
	brcmf_escan_prep(cfg, &params->params_le, request);
1024
	params->version = cpu_to_le32(BRCMF_ESCAN_REQ_VERSION);
1025
	params->action = cpu_to_le16(WL_ESCAN_ACTION_START);
1026 1027
	params->sync_id = cpu_to_le16(0x1234);

1028
	err = brcmf_fil_iovar_data_set(ifp, "escan", params, params_size);
1029 1030
	if (err) {
		if (err == -EBUSY)
1031
			brcmf_dbg(INFO, "system busy : escan canceled\n");
1032
		else
1033
			brcmf_err("error (%d)\n", err);
1034 1035 1036 1037 1038 1039 1040 1041
	}

	kfree(params);
exit:
	return err;
}

static s32
1042
brcmf_do_escan(struct brcmf_if *ifp, struct cfg80211_scan_request *request)
1043
{
1044
	struct brcmf_cfg80211_info *cfg = ifp->drvr->config;
1045 1046
	s32 err;
	struct brcmf_scan_results *results;
1047
	struct escan_info *escan = &cfg->escan_info;
1048

1049
	brcmf_dbg(SCAN, "Enter\n");
1050
	escan->ifp = ifp;
1051
	escan->wiphy = cfg->wiphy;
1052
	escan->escan_state = WL_ESCAN_STATE_SCANNING;
1053

1054
	brcmf_scan_config_mpc(ifp, 0);
1055
	results = (struct brcmf_scan_results *)cfg->escan_info.escan_buf;
1056 1057 1058 1059
	results->version = 0;
	results->count = 0;
	results->buflen = WL_ESCAN_RESULTS_FIXED_SIZE;

1060
	err = escan->run(cfg, ifp, request);
1061
	if (err)
1062
		brcmf_scan_config_mpc(ifp, 1);
1063 1064 1065 1066
	return err;
}

static s32
1067
brcmf_cfg80211_scan(struct wiphy *wiphy, struct cfg80211_scan_request *request)
1068
{
1069
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
1070 1071
	struct brcmf_cfg80211_vif *vif;
	s32 err = 0;
1072

1073 1074 1075 1076
	brcmf_dbg(TRACE, "Enter\n");
	vif = container_of(request->wdev, struct brcmf_cfg80211_vif, wdev);
	if (!check_vif_up(vif))
		return -EIO;
1077

1078
	if (test_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status)) {
1079
		brcmf_err("Scanning already: status (%lu)\n", cfg->scan_status);
1080 1081
		return -EAGAIN;
	}
1082
	if (test_bit(BRCMF_SCAN_STATUS_ABORT, &cfg->scan_status)) {
1083 1084
		brcmf_err("Scanning being aborted: status (%lu)\n",
			  cfg->scan_status);
1085 1086
		return -EAGAIN;
	}
1087 1088 1089 1090 1091
	if (test_bit(BRCMF_SCAN_STATUS_SUPPRESS, &cfg->scan_status)) {
		brcmf_err("Scanning suppressed: status (%lu)\n",
			  cfg->scan_status);
		return -EAGAIN;
	}
1092 1093
	if (test_bit(BRCMF_VIF_STATUS_CONNECTING, &vif->sme_state)) {
		brcmf_err("Connecting: status (%lu)\n", vif->sme_state);
1094 1095 1096
		return -EAGAIN;
	}

1097
	/* If scan req comes for p2p0, send it over primary I/F */
1098 1099
	if (vif == cfg->p2p.bss_idx[P2PAPI_BSSCFG_DEVICE].vif)
		vif = cfg->p2p.bss_idx[P2PAPI_BSSCFG_PRIMARY].vif;
1100

1101 1102
	brcmf_dbg(SCAN, "START ESCAN\n");

1103
	cfg->scan_request = request;
1104
	set_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status);
1105

1106 1107 1108 1109
	cfg->escan_info.run = brcmf_run_escan;
	err = brcmf_p2p_scan_prep(wiphy, request, vif);
	if (err)
		goto scan_out;
1110

1111 1112 1113 1114 1115
	err = brcmf_vif_set_mgmt_ie(vif, BRCMF_VNDR_IE_PRBREQ_FLAG,
				    request->ie, request->ie_len);
	if (err)
		goto scan_out;

1116 1117 1118
	err = brcmf_do_escan(vif->ifp, request);
	if (err)
		goto scan_out;
1119

1120
	/* Arm scan timeout timer */
1121 1122
	mod_timer(&cfg->escan_timeout,
		  jiffies + msecs_to_jiffies(BRCMF_ESCAN_TIMER_INTERVAL_MS));
1123

1124 1125 1126
	return 0;

scan_out:
1127
	brcmf_err("scan error (%d)\n", err);
1128
	clear_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status);
1129
	cfg->scan_request = NULL;
1130 1131 1132
	return err;
}

1133 1134 1135 1136
static s32 brcmf_set_rts(struct net_device *ndev, u32 rts_threshold)
{
	s32 err = 0;

1137 1138
	err = brcmf_fil_iovar_int_set(netdev_priv(ndev), "rtsthresh",
				      rts_threshold);
1139
	if (err)
1140
		brcmf_err("Error (%d)\n", err);
1141 1142 1143 1144 1145 1146 1147 1148

	return err;
}

static s32 brcmf_set_frag(struct net_device *ndev, u32 frag_threshold)
{
	s32 err = 0;

1149 1150
	err = brcmf_fil_iovar_int_set(netdev_priv(ndev), "fragthresh",
				      frag_threshold);
1151
	if (err)
1152
		brcmf_err("Error (%d)\n", err);
1153 1154 1155 1156 1157 1158 1159

	return err;
}

static s32 brcmf_set_retry(struct net_device *ndev, u32 retry, bool l)
{
	s32 err = 0;
Hante Meuleman's avatar
Hante Meuleman committed
1160
	u32 cmd = (l ? BRCMF_C_SET_LRL : BRCMF_C_SET_SRL);
1161

1162
	err = brcmf_fil_cmd_int_set(netdev_priv(ndev), cmd, retry);
1163
	if (err) {
1164
		brcmf_err("cmd (%d) , error (%d)\n", cmd, err);
1165 1166 1167 1168 1169 1170 1171
		return err;
	}
	return err;
}

static s32 brcmf_cfg80211_set_wiphy_params(struct wiphy *wiphy, u32 changed)
{
1172 1173
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
	struct net_device *ndev = cfg_to_ndev(cfg);
1174
	struct brcmf_if *ifp = netdev_priv(ndev);
1175 1176
	s32 err = 0;

1177
	brcmf_dbg(TRACE, "Enter\n");
1178
	if (!check_vif_up(ifp->vif))
1179 1180 1181
		return -EIO;

	if (changed & WIPHY_PARAM_RTS_THRESHOLD &&
1182 1183 1184
	    (cfg->conf->rts_threshold != wiphy->rts_threshold)) {
		cfg->conf->rts_threshold = wiphy->rts_threshold;
		err = brcmf_set_rts(ndev, cfg->conf->rts_threshold);
1185 1186 1187 1188
		if (!err)
			goto done;
	}
	if (changed & WIPHY_PARAM_FRAG_THRESHOLD &&
1189 1190 1191
	    (cfg->conf->frag_threshold != wiphy->frag_threshold)) {
		cfg->conf->frag_threshold = wiphy->frag_threshold;
		err = brcmf_set_frag(ndev, cfg->conf->frag_threshold);
1192 1193 1194 1195
		if (!err)
			goto done;
	}
	if (changed & WIPHY_PARAM_RETRY_LONG
1196 1197 1198
	    && (cfg->conf->retry_long != wiphy->retry_long)) {
		cfg->conf->retry_long = wiphy->retry_long;
		err = brcmf_set_retry(ndev, cfg->conf->retry_long, true);
1199 1200 1201 1202
		if (!err)
			goto done;
	}
	if (changed & WIPHY_PARAM_RETRY_SHORT
1203 1204 1205
	    && (cfg->conf->retry_short != wiphy->retry_short)) {
		cfg->conf->retry_short = wiphy->retry_short;
		err = brcmf_set_retry(ndev, cfg->conf->retry_short, false);
1206 1207 1208 1209 1210
		if (!err)
			goto done;
	}

done:
1211
	brcmf_dbg(TRACE, "Exit\n");
1212 1213 1214 1215 1216 1217 1218 1219
	return err;
}

static void brcmf_init_prof(struct brcmf_cfg80211_profile *prof)
{
	memset(prof, 0, sizeof(*prof));
}

1220 1221 1222 1223 1224 1225 1226 1227 1228 1229 1230 1231 1232 1233 1234 1235 1236 1237
static u16 brcmf_map_fw_linkdown_reason(const struct brcmf_event_msg *e)
{
	u16 reason;

	switch (e->event_code) {
	case BRCMF_E_DEAUTH:
	case BRCMF_E_DEAUTH_IND:
	case BRCMF_E_DISASSOC_IND:
		reason = e->reason;
		break;
	case BRCMF_E_LINK:
	default:
		reason = 0;
		break;
	}
	return reason;
}

1238 1239 1240 1241 1242 1243 1244 1245 1246 1247 1248 1249 1250 1251 1252 1253 1254 1255 1256 1257 1258
static int brcmf_set_pmk(struct brcmf_if *ifp, const u8 *pmk_data, u16 pmk_len)
{
	struct brcmf_wsec_pmk_le pmk;
	int i, err;

	/* convert to firmware key format */
	pmk.key_len = cpu_to_le16(pmk_len << 1);
	pmk.flags = cpu_to_le16(BRCMF_WSEC_PASSPHRASE);
	for (i = 0; i < pmk_len; i++)
		snprintf(&pmk.key[2 * i], 3, "%02x", pmk_data[i]);

	/* store psk in firmware */
	err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_WSEC_PMK,
				     &pmk, sizeof(pmk));
	if (err < 0)
		brcmf_err("failed to change PSK in firmware (len=%u)\n",
			  pmk_len);

	return err;
}

1259
static void brcmf_link_down(struct brcmf_cfg80211_vif *vif, u16 reason)
1260
{
1261
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(vif->wdev.wiphy);
1262 1263
	s32 err = 0;

1264
	brcmf_dbg(TRACE, "Enter\n");
1265

Hante Meuleman's avatar
Hante Meuleman committed
1266
	if (test_and_clear_bit(BRCMF_VIF_STATUS_CONNECTED, &vif->sme_state)) {
1267
		brcmf_dbg(INFO, "Call WLC_DISASSOC to stop excess roaming\n ");
1268
		err = brcmf_fil_cmd_data_set(vif->ifp,
1269
					     BRCMF_C_DISASSOC, NULL, 0);
1270
		if (err) {
1271
			brcmf_err("WLC_DISASSOC failed (%d)\n", err);
1272
		}
Hante Meuleman's avatar
Hante Meuleman committed
1273 1274 1275 1276
		if ((vif->wdev.iftype == NL80211_IFTYPE_STATION) ||
		    (vif->wdev.iftype == NL80211_IFTYPE_P2P_CLIENT))
			cfg80211_disconnected(vif->wdev.netdev, reason, NULL, 0,
					      true, GFP_KERNEL);
1277
	}
1278
	clear_bit(BRCMF_VIF_STATUS_CONNECTING, &vif->sme_state);
1279 1280
	clear_bit(BRCMF_SCAN_STATUS_SUPPRESS, &cfg->scan_status);
	brcmf_btcoex_set_mode(vif, BRCMF_BTCOEX_ENABLED, 0);
1281 1282 1283 1284
	if (vif->profile.use_fwsup != BRCMF_PROFILE_FWSUP_NONE) {
		brcmf_set_pmk(vif->ifp, NULL, 0);
		vif->profile.use_fwsup = BRCMF_PROFILE_FWSUP_NONE;
	}
1285
	brcmf_dbg(TRACE, "Exit\n");
1286 1287 1288 1289 1290 1291
}

static s32
brcmf_cfg80211_join_ibss(struct wiphy *wiphy, struct net_device *ndev,
		      struct cfg80211_ibss_params *params)
{
1292
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
1293 1294
	struct brcmf_if *ifp = netdev_priv(ndev);
	struct brcmf_cfg80211_profile *profile = &ifp->vif->profile;
1295 1296 1297 1298 1299
	struct brcmf_join_params join_params;
	size_t join_params_size = 0;
	s32 err = 0;
	s32 wsec = 0;
	s32 bcnprd;
1300
	u16 chanspec;
1301
	u32 ssid_len;
1302

1303
	brcmf_dbg(TRACE, "Enter\n");
1304
	if (!check_vif_up(ifp->vif))
1305 1306 1307
		return -EIO;

	if (params->ssid)
1308
		brcmf_dbg(CONN, "SSID: %s\n", params->ssid);
1309
	else {
1310
		brcmf_dbg(CONN, "SSID: NULL, Not supported\n");
1311 1312 1313
		return -EOPNOTSUPP;
	}

1314
	set_bit(BRCMF_VIF_STATUS_CONNECTING, &ifp->vif->sme_state);
1315 1316

	if (params->bssid)
1317
		brcmf_dbg(CONN, "BSSID: %pM\n", params->bssid);
1318
	else
1319
		brcmf_dbg(CONN, "No BSSID specified\n");
1320

1321
	if (params->chandef.chan)
1322 1323
		brcmf_dbg(CONN, "channel: %d\n",
			  params->chandef.chan->center_freq);
1324
	else
1325
		brcmf_dbg(CONN, "no channel specified\n");
1326 1327

	if (params->channel_fixed)
1328
		brcmf_dbg(CONN, "fixed channel required\n");
1329
	else
1330
		brcmf_dbg(CONN, "no fixed channel required\n");
1331 1332

	if (params->ie && params->ie_len)
1333
		brcmf_dbg(CONN, "ie len: %d\n", params->ie_len);
1334
	else
1335
		brcmf_dbg(CONN, "no ie specified\n");
1336 1337

	if (params->beacon_interval)
1338 1339
		brcmf_dbg(CONN, "beacon interval: %d\n",
			  params->beacon_interval);
1340
	else
1341
		brcmf_dbg(CONN, "no beacon interval specified\n");
1342 1343

	if (params->basic_rates)
1344
		brcmf_dbg(CONN, "basic rates: %08X\n", params->basic_rates);
1345
	else
1346
		brcmf_dbg(CONN, "no basic rates specified\n");
1347 1348

	if (params->privacy)
1349
		brcmf_dbg(CONN, "privacy required\n");
1350
	else
1351
		brcmf_dbg(CONN, "no privacy required\n");
1352 1353 1354 1355 1356

	/* Configure Privacy for starter */
	if (params->privacy)
		wsec |= WEP_ENABLED;

1357
	err = brcmf_fil_iovar_int_set(ifp, "wsec", wsec);
1358
	if (err) {
1359
		brcmf_err("wsec failed (%d)\n", err);
1360 1361 1362 1363 1364 1365 1366 1367 1368
		goto done;
	}

	/* Configure Beacon Interval for starter */
	if (params->beacon_interval)
		bcnprd = params->beacon_interval;
	else
		bcnprd = 100;

Hante Meuleman's avatar
Hante Meuleman committed
1369
	err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_BCNPRD, bcnprd);
1370
	if (err) {
1371
		brcmf_err("WLC_SET_BCNPRD failed (%d)\n", err);
1372 1373 1374 1375 1376 1377 1378
		goto done;
	}

	/* Configure required join parameter */
	memset(&join_params, 0, sizeof(struct brcmf_join_params));

	/* SSID */
1379 1380 1381
	ssid_len = min_t(u32, params->ssid_len, IEEE80211_MAX_SSID_LEN);
	memcpy(join_params.ssid_le.SSID, params->ssid, ssid_len);
	join_params.ssid_le.SSID_len = cpu_to_le32(ssid_len);
1382 1383 1384 1385 1386
	join_params_size = sizeof(join_params.ssid_le);

	/* BSSID */
	if (params->bssid) {
		memcpy(join_params.params_le.bssid, params->bssid, ETH_ALEN);
1387
		join_params_size += BRCMF_ASSOC_PARAMS_FIXED_SIZE;
1388
		memcpy(profile->bssid, params->bssid, ETH_ALEN);
1389
	} else {
1390 1391
		eth_broadcast_addr(join_params.params_le.bssid);
		eth_zero_addr(profile->bssid);
1392 1393 1394
	}

	/* Channel */
1395
	if (params->chandef.chan) {
1396 1397
		u32 target_channel;

1398
		cfg->channel =
1399
			ieee80211_frequency_to_channel(
1400
				params->chandef.chan->center_freq);
1401 1402
		if (params->channel_fixed) {
			/* adding chanspec */
1403 1404
			chanspec = chandef_to_chanspec(&cfg->d11inf,
						       &params->chandef);
1405 1406 1407 1408
			join_params.params_le.chanspec_list[0] =
				cpu_to_le16(chanspec);
			join_params.params_le.chanspec_num = cpu_to_le32(1);
			join_params_size += sizeof(join_params.params_le);
1409 1410 1411
		}

		/* set channel for starter */
1412
		target_channel = cfg->channel;
Hante Meuleman's avatar
Hante Meuleman committed
1413
		err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_CHANNEL,
1414
					    target_channel);
1415
		if (err) {
1416
			brcmf_err("WLC_SET_CHANNEL failed (%d)\n", err);
1417 1418 1419
			goto done;
		}
	} else
1420
		cfg->channel = 0;
1421

1422
	cfg->ibss_starter = false;
1423 1424


1425
	err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_SSID,
1426
				     &join_params, join_params_size);
1427
	if (err) {
1428
		brcmf_err("WLC_SET_SSID failed (%d)\n", err);
1429 1430 1431 1432 1433
		goto done;
	}

done:
	if (err)
1434
		clear_bit(BRCMF_VIF_STATUS_CONNECTING, &ifp->vif->sme_state);
1435
	brcmf_dbg(TRACE, "Exit\n");
1436 1437 1438 1439 1440 1441
	return err;
}

static s32
brcmf_cfg80211_leave_ibss(struct wiphy *wiphy, struct net_device *ndev)
{
1442
	struct brcmf_if *ifp = netdev_priv(ndev);
1443

1444
	brcmf_dbg(TRACE, "Enter\n");
1445 1446 1447 1448 1449 1450 1451
	if (!check_vif_up(ifp->vif)) {
		/* When driver is being unloaded, it can end up here. If an
		 * error is returned then later on a debug trace in the wireless
		 * core module will be printed. To avoid this 0 is returned.
		 */
		return 0;
	}
1452

1453
	brcmf_link_down(ifp->vif, WLAN_REASON_DEAUTH_LEAVING);
1454
	brcmf_net_setcarrier(ifp, false);
1455

1456
	brcmf_dbg(TRACE, "Exit\n");
1457

1458
	return 0;
1459 1460 1461 1462 1463
}

static s32 brcmf_set_wpa_version(struct net_device *ndev,
				 struct cfg80211_connect_params *sme)
{
1464
	struct brcmf_cfg80211_profile *profile = ndev_to_prof(ndev);
1465 1466 1467 1468 1469 1470 1471 1472 1473 1474
	struct brcmf_cfg80211_security *sec;
	s32 val = 0;
	s32 err = 0;

	if (sme->crypto.wpa_versions & NL80211_WPA_VERSION_1)
		val = WPA_AUTH_PSK | WPA_AUTH_UNSPECIFIED;
	else if (sme->crypto.wpa_versions & NL80211_WPA_VERSION_2)
		val = WPA2_AUTH_PSK | WPA2_AUTH_UNSPECIFIED;
	else
		val = WPA_AUTH_DISABLED;
1475
	brcmf_dbg(CONN, "setting wpa_auth to 0x%0x\n", val);
1476
	err = brcmf_fil_bsscfg_int_set(netdev_priv(ndev), "wpa_auth", val);
1477
	if (err) {
1478
		brcmf_err("set wpa_auth failed (%d)\n", err);
1479 1480
		return err;
	}
1481
	sec = &profile->sec;
1482 1483 1484 1485 1486 1487 1488
	sec->wpa_versions = sme->crypto.wpa_versions;
	return err;
}

static s32 brcmf_set_auth_type(struct net_device *ndev,
			       struct cfg80211_connect_params *sme)
{
1489
	struct brcmf_cfg80211_profile *profile = ndev_to_prof(ndev);
1490 1491 1492 1493 1494 1495 1496
	struct brcmf_cfg80211_security *sec;
	s32 val = 0;
	s32 err = 0;

	switch (sme->auth_type) {
	case NL80211_AUTHTYPE_OPEN_SYSTEM:
		val = 0;
1497
		brcmf_dbg(CONN, "open system\n");
1498 1499 1500
		break;
	case NL80211_AUTHTYPE_SHARED_KEY:
		val = 1;
1501
		brcmf_dbg(CONN, "shared key\n");
1502 1503 1504
		break;
	default:
		val = 2;
1505
		brcmf_dbg(CONN, "automatic, auth type (%d)\n", sme->auth_type);
1506 1507 1508
		break;
	}

1509
	err = brcmf_fil_bsscfg_int_set(netdev_priv(ndev), "auth", val);
1510
	if (err) {
1511
		brcmf_err("set auth failed (%d)\n", err);
1512 1513
		return err;
	}
1514
	sec = &profile->sec;
1515 1516 1517 1518 1519
	sec->auth_type = sme->auth_type;
	return err;
}

static s32
1520
brcmf_set_wsec_mode(struct net_device *ndev,
1521
		    struct cfg80211_connect_params *sme)
1522
{
1523
	struct brcmf_cfg80211_profile *profile = ndev_to_prof(ndev);
1524 1525 1526
	struct brcmf_cfg80211_security *sec;
	s32 pval = 0;
	s32 gval = 0;
1527
	s32 wsec;
1528 1529 1530 1531 1532 1533 1534 1535 1536 1537 1538 1539 1540 1541 1542 1543 1544 1545
	s32 err = 0;

	if (sme->crypto.n_ciphers_pairwise) {
		switch (sme->crypto.ciphers_pairwise[0]) {
		case WLAN_CIPHER_SUITE_WEP40:
		case WLAN_CIPHER_SUITE_WEP104:
			pval = WEP_ENABLED;
			break;
		case WLAN_CIPHER_SUITE_TKIP:
			pval = TKIP_ENABLED;
			break;
		case WLAN_CIPHER_SUITE_CCMP:
			pval = AES_ENABLED;
			break;
		case WLAN_CIPHER_SUITE_AES_CMAC:
			pval = AES_ENABLED;
			break;
		default:
1546 1547
			brcmf_err("invalid cipher pairwise (%d)\n",
				  sme->crypto.ciphers_pairwise[0]);
1548 1549 1550 1551 1552 1553 1554 1555 1556 1557 1558 1559 1560 1561 1562 1563 1564 1565 1566
			return -EINVAL;
		}
	}
	if (sme->crypto.cipher_group) {
		switch (sme->crypto.cipher_group) {
		case WLAN_CIPHER_SUITE_WEP40:
		case WLAN_CIPHER_SUITE_WEP104:
			gval = WEP_ENABLED;
			break;
		case WLAN_CIPHER_SUITE_TKIP:
			gval = TKIP_ENABLED;
			break;
		case WLAN_CIPHER_SUITE_CCMP:
			gval = AES_ENABLED;
			break;
		case WLAN_CIPHER_SUITE_AES_CMAC:
			gval = AES_ENABLED;
			break;
		default:
1567 1568
			brcmf_err("invalid cipher group (%d)\n",
				  sme->crypto.cipher_group);
1569 1570 1571 1572
			return -EINVAL;
		}
	}

1573
	brcmf_dbg(CONN, "pval (%d) gval (%d)\n", pval, gval);
1574 1575 1576 1577 1578
	/* In case of privacy, but no security and WPS then simulate */
	/* setting AES. WPS-2.0 allows no security                   */
	if (brcmf_find_wpsie(sme->ie, sme->ie_len) && !pval && !gval &&
	    sme->privacy)
		pval = AES_ENABLED;
1579

1580
	wsec = pval | gval;
1581
	err = brcmf_fil_bsscfg_int_set(netdev_priv(ndev), "wsec", wsec);
1582
	if (err) {
1583
		brcmf_err("error (%d)\n", err);
1584 1585 1586
		return err;
	}

1587
	sec = &profile->sec;
1588 1589 1590 1591 1592 1593 1594 1595 1596
	sec->cipher_pairwise = sme->crypto.ciphers_pairwise[0];
	sec->cipher_group = sme->crypto.cipher_group;

	return err;
}

static s32
brcmf_set_key_mgmt(struct net_device *ndev, struct cfg80211_connect_params *sme)
{
1597
	struct brcmf_if *ifp = netdev_priv(ndev);
1598
	struct brcmf_cfg80211_profile *profile = &ifp->vif->profile;
1599 1600 1601 1602 1603 1604 1605 1606 1607
	s32 val;
	s32 err;
	const struct brcmf_tlv *rsn_ie;
	const u8 *ie;
	u32 ie_len;
	u32 offset;
	u16 rsn_cap;
	u32 mfp;
	u16 count;
1608

1609 1610
	profile->use_fwsup = BRCMF_PROFILE_FWSUP_NONE;

1611 1612 1613 1614 1615 1616 1617 1618 1619 1620 1621 1622
	if (!sme->crypto.n_akm_suites)
		return 0;

	err = brcmf_fil_bsscfg_int_get(netdev_priv(ndev), "wpa_auth", &val);
	if (err) {
		brcmf_err("could not get wpa_auth (%d)\n", err);
		return err;
	}
	if (val & (WPA_AUTH_PSK | WPA_AUTH_UNSPECIFIED)) {
		switch (sme->crypto.akm_suites[0]) {
		case WLAN_AKM_SUITE_8021X:
			val = WPA_AUTH_UNSPECIFIED;
1623 1624
			if (sme->want_1x)
				profile->use_fwsup = BRCMF_PROFILE_FWSUP_1X;
1625 1626 1627 1628 1629 1630 1631 1632
			break;
		case WLAN_AKM_SUITE_PSK:
			val = WPA_AUTH_PSK;
			break;
		default:
			brcmf_err("invalid cipher group (%d)\n",
				  sme->crypto.cipher_group);
			return -EINVAL;
1633
		}
1634 1635 1636 1637
	} else if (val & (WPA2_AUTH_PSK | WPA2_AUTH_UNSPECIFIED)) {
		switch (sme->crypto.akm_suites[0]) {
		case WLAN_AKM_SUITE_8021X:
			val = WPA2_AUTH_UNSPECIFIED;
1638 1639
			if (sme->want_1x)
				profile->use_fwsup = BRCMF_PROFILE_FWSUP_1X;
1640 1641 1642
			break;
		case WLAN_AKM_SUITE_8021X_SHA256:
			val = WPA2_AUTH_1X_SHA256;
1643 1644
			if (sme->want_1x)
				profile->use_fwsup = BRCMF_PROFILE_FWSUP_1X;
1645 1646 1647 1648 1649 1650 1651 1652 1653 1654 1655
			break;
		case WLAN_AKM_SUITE_PSK_SHA256:
			val = WPA2_AUTH_PSK_SHA256;
			break;
		case WLAN_AKM_SUITE_PSK:
			val = WPA2_AUTH_PSK;
			break;
		default:
			brcmf_err("invalid cipher group (%d)\n",
				  sme->crypto.cipher_group);
			return -EINVAL;
1656
		}
1657
	}
1658

1659 1660 1661
	if (profile->use_fwsup == BRCMF_PROFILE_FWSUP_1X)
		brcmf_dbg(INFO, "using 1X offload\n");

1662 1663 1664 1665 1666 1667 1668 1669 1670 1671 1672 1673 1674 1675 1676 1677 1678 1679 1680 1681 1682 1683 1684 1685 1686 1687 1688 1689 1690 1691 1692 1693 1694 1695 1696 1697 1698 1699 1700 1701
	if (!brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MFP))
		goto skip_mfp_config;
	/* The MFP mode (1 or 2) needs to be determined, parse IEs. The
	 * IE will not be verified, just a quick search for MFP config
	 */
	rsn_ie = brcmf_parse_tlvs((const u8 *)sme->ie, sme->ie_len,
				  WLAN_EID_RSN);
	if (!rsn_ie)
		goto skip_mfp_config;
	ie = (const u8 *)rsn_ie;
	ie_len = rsn_ie->len + TLV_HDR_LEN;
	/* Skip unicast suite */
	offset = TLV_HDR_LEN + WPA_IE_VERSION_LEN + WPA_IE_MIN_OUI_LEN;
	if (offset + WPA_IE_SUITE_COUNT_LEN >= ie_len)
		goto skip_mfp_config;
	/* Skip multicast suite */
	count = ie[offset] + (ie[offset + 1] << 8);
	offset += WPA_IE_SUITE_COUNT_LEN + (count * WPA_IE_MIN_OUI_LEN);
	if (offset + WPA_IE_SUITE_COUNT_LEN >= ie_len)
		goto skip_mfp_config;
	/* Skip auth key management suite(s) */
	count = ie[offset] + (ie[offset + 1] << 8);
	offset += WPA_IE_SUITE_COUNT_LEN + (count * WPA_IE_MIN_OUI_LEN);
	if (offset + WPA_IE_SUITE_COUNT_LEN > ie_len)
		goto skip_mfp_config;
	/* Ready to read capabilities */
	mfp = BRCMF_MFP_NONE;
	rsn_cap = ie[offset] + (ie[offset + 1] << 8);
	if (rsn_cap & RSN_CAP_MFPR_MASK)
		mfp = BRCMF_MFP_REQUIRED;
	else if (rsn_cap & RSN_CAP_MFPC_MASK)
		mfp = BRCMF_MFP_CAPABLE;
	brcmf_fil_bsscfg_int_set(netdev_priv(ndev), "mfp", mfp);

skip_mfp_config:
	brcmf_dbg(CONN, "setting wpa_auth to %d\n", val);
	err = brcmf_fil_bsscfg_int_set(netdev_priv(ndev), "wpa_auth", val);
	if (err) {
		brcmf_err("could not set wpa_auth (%d)\n", err);
		return err;
1702 1703 1704 1705 1706 1707
	}

	return err;
}

static s32
1708 1709
brcmf_set_sharedkey(struct net_device *ndev,
		    struct cfg80211_connect_params *sme)
1710
{
1711
	struct brcmf_cfg80211_profile *profile = ndev_to_prof(ndev);
1712 1713 1714 1715 1716
	struct brcmf_cfg80211_security *sec;
	struct brcmf_wsec_key key;
	s32 val;
	s32 err = 0;

1717
	brcmf_dbg(CONN, "key len (%d)\n", sme->key_len);
1718

1719 1720 1721
	if (sme->key_len == 0)
		return 0;

1722
	sec = &profile->sec;
1723 1724
	brcmf_dbg(CONN, "wpa_versions 0x%x cipher_pairwise 0x%x\n",
		  sec->wpa_versions, sec->cipher_pairwise);
1725 1726 1727 1728

	if (sec->wpa_versions & (NL80211_WPA_VERSION_1 | NL80211_WPA_VERSION_2))
		return 0;

1729 1730 1731
	if (!(sec->cipher_pairwise &
	    (WLAN_CIPHER_SUITE_WEP40 | WLAN_CIPHER_SUITE_WEP104)))
		return 0;
1732

1733 1734 1735 1736
	memset(&key, 0, sizeof(key));
	key.len = (u32) sme->key_len;
	key.index = (u32) sme->key_idx;
	if (key.len > sizeof(key.data)) {
1737
		brcmf_err("Too long key length (%u)\n", key.len);
1738 1739 1740 1741 1742 1743 1744 1745 1746 1747 1748 1749
		return -EINVAL;
	}
	memcpy(key.data, sme->key, key.len);
	key.flags = BRCMF_PRIMARY_KEY;
	switch (sec->cipher_pairwise) {
	case WLAN_CIPHER_SUITE_WEP40:
		key.algo = CRYPTO_ALGO_WEP1;
		break;
	case WLAN_CIPHER_SUITE_WEP104:
		key.algo = CRYPTO_ALGO_WEP128;
		break;
	default:
1750 1751
		brcmf_err("Invalid algorithm (%d)\n",
			  sme->crypto.ciphers_pairwise[0]);
1752 1753 1754
		return -EINVAL;
	}
	/* Set the new key/index */
1755 1756 1757
	brcmf_dbg(CONN, "key length (%d) key index (%d) algo (%d)\n",
		  key.len, key.index, key.algo);
	brcmf_dbg(CONN, "key \"%s\"\n", key.data);
1758
	err = send_key_to_dongle(netdev_priv(ndev), &key);
1759 1760 1761 1762
	if (err)
		return err;

	if (sec->auth_type == NL80211_AUTHTYPE_SHARED_KEY) {
1763
		brcmf_dbg(CONN, "set auth_type to shared key\n");
1764
		val = WL_AUTH_SHARED_KEY;	/* shared key */
1765
		err = brcmf_fil_bsscfg_int_set(netdev_priv(ndev), "auth", val);
1766
		if (err)
1767
			brcmf_err("set auth failed (%d)\n", err);
1768 1769 1770 1771
	}
	return err;
}

1772 1773 1774 1775
static
enum nl80211_auth_type brcmf_war_auth_type(struct brcmf_if *ifp,
					   enum nl80211_auth_type type)
{
1776 1777 1778 1779
	if (type == NL80211_AUTHTYPE_AUTOMATIC &&
	    brcmf_feat_is_quirk_enabled(ifp, BRCMF_FEAT_QUIRK_AUTO_AUTH)) {
		brcmf_dbg(CONN, "WAR: use OPEN instead of AUTO\n");
		type = NL80211_AUTHTYPE_OPEN_SYSTEM;
1780 1781 1782 1783
	}
	return type;
}

1784 1785 1786 1787 1788 1789 1790 1791 1792 1793 1794 1795 1796 1797 1798 1799 1800 1801 1802 1803 1804 1805 1806 1807 1808 1809 1810 1811 1812 1813 1814 1815 1816 1817 1818 1819 1820 1821 1822 1823 1824 1825 1826 1827
static void brcmf_set_join_pref(struct brcmf_if *ifp,
				struct cfg80211_bss_selection *bss_select)
{
	struct brcmf_join_pref_params join_pref_params[2];
	enum nl80211_band band;
	int err, i = 0;

	join_pref_params[i].len = 2;
	join_pref_params[i].rssi_gain = 0;

	if (bss_select->behaviour != NL80211_BSS_SELECT_ATTR_BAND_PREF)
		brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_ASSOC_PREFER, WLC_BAND_AUTO);

	switch (bss_select->behaviour) {
	case __NL80211_BSS_SELECT_ATTR_INVALID:
		brcmf_c_set_joinpref_default(ifp);
		return;
	case NL80211_BSS_SELECT_ATTR_BAND_PREF:
		join_pref_params[i].type = BRCMF_JOIN_PREF_BAND;
		band = bss_select->param.band_pref;
		join_pref_params[i].band = nl80211_band_to_fwil(band);
		i++;
		break;
	case NL80211_BSS_SELECT_ATTR_RSSI_ADJUST:
		join_pref_params[i].type = BRCMF_JOIN_PREF_RSSI_DELTA;
		band = bss_select->param.adjust.band;
		join_pref_params[i].band = nl80211_band_to_fwil(band);
		join_pref_params[i].rssi_gain = bss_select->param.adjust.delta;
		i++;
		break;
	case NL80211_BSS_SELECT_ATTR_RSSI:
	default:
		break;
	}
	join_pref_params[i].type = BRCMF_JOIN_PREF_RSSI;
	join_pref_params[i].len = 2;
	join_pref_params[i].rssi_gain = 0;
	join_pref_params[i].band = 0;
	err = brcmf_fil_iovar_data_set(ifp, "join_pref", join_pref_params,
				       sizeof(join_pref_params));
	if (err)
		brcmf_err("Set join_pref error (%d)\n", err);
}

1828 1829
static s32
brcmf_cfg80211_connect(struct wiphy *wiphy, struct net_device *ndev,
1830
		       struct cfg80211_connect_params *sme)
1831
{
1832
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
1833
	struct brcmf_if *ifp = netdev_priv(ndev);
1834
	struct brcmf_cfg80211_profile *profile = &ifp->vif->profile;
1835 1836 1837
	struct ieee80211_channel *chan = sme->channel;
	struct brcmf_join_params join_params;
	size_t join_params_size;
1838 1839 1840
	const struct brcmf_tlv *rsn_ie;
	const struct brcmf_vs_tlv *wpa_ie;
	const void *ie;
1841 1842
	u32 ie_len;
	struct brcmf_ext_join_params_le *ext_join_params;
1843
	u16 chanspec;
1844
	s32 err = 0;
1845
	u32 ssid_len;
1846

1847
	brcmf_dbg(TRACE, "Enter\n");
1848
	if (!check_vif_up(ifp->vif))
1849 1850 1851
		return -EIO;

	if (!sme->ssid) {
1852
		brcmf_err("Invalid ssid\n");
1853 1854 1855
		return -EOPNOTSUPP;
	}

1856 1857 1858 1859 1860 1861 1862 1863 1864 1865 1866
	if (ifp->vif == cfg->p2p.bss_idx[P2PAPI_BSSCFG_PRIMARY].vif) {
		/* A normal (non P2P) connection request setup. */
		ie = NULL;
		ie_len = 0;
		/* find the WPA_IE */
		wpa_ie = brcmf_find_wpaie((u8 *)sme->ie, sme->ie_len);
		if (wpa_ie) {
			ie = wpa_ie;
			ie_len = wpa_ie->len + TLV_HDR_LEN;
		} else {
			/* find the RSN_IE */
1867 1868
			rsn_ie = brcmf_parse_tlvs((const u8 *)sme->ie,
						  sme->ie_len,
1869 1870 1871 1872 1873 1874 1875 1876 1877 1878 1879 1880 1881 1882 1883 1884
						  WLAN_EID_RSN);
			if (rsn_ie) {
				ie = rsn_ie;
				ie_len = rsn_ie->len + TLV_HDR_LEN;
			}
		}
		brcmf_fil_iovar_data_set(ifp, "wpaie", ie, ie_len);
	}

	err = brcmf_vif_set_mgmt_ie(ifp->vif, BRCMF_VNDR_IE_ASSOCREQ_FLAG,
				    sme->ie, sme->ie_len);
	if (err)
		brcmf_err("Set Assoc REQ IE Failed\n");
	else
		brcmf_dbg(TRACE, "Applied Vndr IEs for Assoc request\n");

1885
	set_bit(BRCMF_VIF_STATUS_CONNECTING, &ifp->vif->sme_state);
1886 1887

	if (chan) {
1888
		cfg->channel =
1889
			ieee80211_frequency_to_channel(chan->center_freq);
1890
		chanspec = channel_to_chanspec(&cfg->d11inf, chan);
1891 1892 1893
		brcmf_dbg(CONN, "channel=%d, center_req=%d, chanspec=0x%04x\n",
			  cfg->channel, chan->center_freq, chanspec);
	} else {
1894
		cfg->channel = 0;
1895 1896
		chanspec = 0;
	}
1897

1898
	brcmf_dbg(INFO, "ie (%p), ie_len (%zd)\n", sme->ie, sme->ie_len);
1899 1900 1901

	err = brcmf_set_wpa_version(ndev, sme);
	if (err) {
1902
		brcmf_err("wl_set_wpa_version failed (%d)\n", err);
1903 1904 1905
		goto done;
	}

1906
	sme->auth_type = brcmf_war_auth_type(ifp, sme->auth_type);
1907 1908
	err = brcmf_set_auth_type(ndev, sme);
	if (err) {
1909
		brcmf_err("wl_set_auth_type failed (%d)\n", err);
1910 1911 1912
		goto done;
	}

1913
	err = brcmf_set_wsec_mode(ndev, sme);
1914
	if (err) {
1915
		brcmf_err("wl_set_set_cipher failed (%d)\n", err);
1916 1917 1918 1919 1920
		goto done;
	}

	err = brcmf_set_key_mgmt(ndev, sme);
	if (err) {
1921
		brcmf_err("wl_set_key_mgmt failed (%d)\n", err);
1922 1923 1924
		goto done;
	}

1925
	err = brcmf_set_sharedkey(ndev, sme);
1926
	if (err) {
1927
		brcmf_err("brcmf_set_sharedkey failed (%d)\n", err);
1928 1929 1930
		goto done;
	}

1931
	if (sme->crypto.psk) {
1932 1933 1934 1935
		if (WARN_ON(profile->use_fwsup != BRCMF_PROFILE_FWSUP_NONE)) {
			err = -EINVAL;
			goto done;
		}
1936
		brcmf_dbg(INFO, "using PSK offload\n");
1937 1938
		profile->use_fwsup = BRCMF_PROFILE_FWSUP_PSK;
	}
1939

1940
	if (profile->use_fwsup != BRCMF_PROFILE_FWSUP_NONE) {
1941 1942 1943 1944 1945 1946
		/* enable firmware supplicant for this interface */
		err = brcmf_fil_iovar_int_set(ifp, "sup_wpa", 1);
		if (err < 0) {
			brcmf_err("failed to enable fw supplicant\n");
			goto done;
		}
1947
	}
1948

1949
	if (profile->use_fwsup == BRCMF_PROFILE_FWSUP_PSK) {
1950 1951 1952 1953 1954 1955
		err = brcmf_set_pmk(ifp, sme->crypto.psk,
				    BRCMF_WSEC_MAX_PSK_LEN);
		if (err)
			goto done;
	}

1956 1957 1958 1959 1960 1961 1962 1963 1964 1965 1966 1967
	/* Join with specific BSSID and cached SSID
	 * If SSID is zero join based on BSSID only
	 */
	join_params_size = offsetof(struct brcmf_ext_join_params_le, assoc_le) +
		offsetof(struct brcmf_assoc_params_le, chanspec_list);
	if (cfg->channel)
		join_params_size += sizeof(u16);
	ext_join_params = kzalloc(join_params_size, GFP_KERNEL);
	if (ext_join_params == NULL) {
		err = -ENOMEM;
		goto done;
	}
1968 1969 1970 1971 1972 1973
	ssid_len = min_t(u32, sme->ssid_len, IEEE80211_MAX_SSID_LEN);
	ext_join_params->ssid_le.SSID_len = cpu_to_le32(ssid_len);
	memcpy(&ext_join_params->ssid_le.SSID, sme->ssid, ssid_len);
	if (ssid_len < IEEE80211_MAX_SSID_LEN)
		brcmf_dbg(CONN, "SSID \"%s\", len (%d)\n",
			  ext_join_params->ssid_le.SSID, ssid_len);
1974

1975 1976 1977 1978 1979 1980 1981
	/* Set up join scan parameters */
	ext_join_params->scan_le.scan_type = -1;
	ext_join_params->scan_le.home_time = cpu_to_le32(-1);

	if (sme->bssid)
		memcpy(&ext_join_params->assoc_le.bssid, sme->bssid, ETH_ALEN);
	else
1982
		eth_broadcast_addr(ext_join_params->assoc_le.bssid);
1983 1984 1985 1986 1987 1988

	if (cfg->channel) {
		ext_join_params->assoc_le.chanspec_num = cpu_to_le32(1);

		ext_join_params->assoc_le.chanspec_list[0] =
			cpu_to_le16(chanspec);
1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007
		/* Increase dwell time to receive probe response or detect
		 * beacon from target AP at a noisy air only during connect
		 * command.
		 */
		ext_join_params->scan_le.active_time =
			cpu_to_le32(BRCMF_SCAN_JOIN_ACTIVE_DWELL_TIME_MS);
		ext_join_params->scan_le.passive_time =
			cpu_to_le32(BRCMF_SCAN_JOIN_PASSIVE_DWELL_TIME_MS);
		/* To sync with presence period of VSDB GO send probe request
		 * more frequently. Probe request will be stopped when it gets
		 * probe response from target AP/GO.
		 */
		ext_join_params->scan_le.nprobes =
			cpu_to_le32(BRCMF_SCAN_JOIN_ACTIVE_DWELL_TIME_MS /
				    BRCMF_SCAN_JOIN_PROBE_INTERVAL_MS);
	} else {
		ext_join_params->scan_le.active_time = cpu_to_le32(-1);
		ext_join_params->scan_le.passive_time = cpu_to_le32(-1);
		ext_join_params->scan_le.nprobes = cpu_to_le32(-1);
2008 2009
	}

2010 2011
	brcmf_set_join_pref(ifp, &sme->bss_select);

2012 2013 2014 2015 2016 2017 2018 2019
	err  = brcmf_fil_bsscfg_data_set(ifp, "join", ext_join_params,
					 join_params_size);
	kfree(ext_join_params);
	if (!err)
		/* This is it. join command worked, we are done */
		goto done;

	/* join command failed, fallback to set ssid */
2020 2021 2022
	memset(&join_params, 0, sizeof(join_params));
	join_params_size = sizeof(join_params.ssid_le);

2023 2024
	memcpy(&join_params.ssid_le.SSID, sme->ssid, ssid_len);
	join_params.ssid_le.SSID_len = cpu_to_le32(ssid_len);
2025

2026 2027 2028
	if (sme->bssid)
		memcpy(join_params.params_le.bssid, sme->bssid, ETH_ALEN);
	else
2029
		eth_broadcast_addr(join_params.params_le.bssid);
2030

2031 2032 2033 2034 2035
	if (cfg->channel) {
		join_params.params_le.chanspec_list[0] = cpu_to_le16(chanspec);
		join_params.params_le.chanspec_num = cpu_to_le32(1);
		join_params_size += sizeof(join_params.params_le);
	}
2036
	err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_SSID,
2037
				     &join_params, join_params_size);
2038
	if (err)
2039
		brcmf_err("BRCMF_C_SET_SSID failed (%d)\n", err);
2040 2041 2042

done:
	if (err)
2043
		clear_bit(BRCMF_VIF_STATUS_CONNECTING, &ifp->vif->sme_state);
2044
	brcmf_dbg(TRACE, "Exit\n");
2045 2046 2047 2048 2049 2050 2051
	return err;
}

static s32
brcmf_cfg80211_disconnect(struct wiphy *wiphy, struct net_device *ndev,
		       u16 reason_code)
{
2052 2053
	struct brcmf_if *ifp = netdev_priv(ndev);
	struct brcmf_cfg80211_profile *profile = &ifp->vif->profile;
2054 2055 2056
	struct brcmf_scb_val_le scbval;
	s32 err = 0;

2057
	brcmf_dbg(TRACE, "Enter. Reason code = %d\n", reason_code);
2058
	if (!check_vif_up(ifp->vif))
2059 2060
		return -EIO;

2061
	clear_bit(BRCMF_VIF_STATUS_CONNECTED, &ifp->vif->sme_state);
2062
	clear_bit(BRCMF_VIF_STATUS_CONNECTING, &ifp->vif->sme_state);
2063
	cfg80211_disconnected(ndev, reason_code, NULL, 0, true, GFP_KERNEL);
2064

2065
	memcpy(&scbval.ea, &profile->bssid, ETH_ALEN);
2066
	scbval.val = cpu_to_le32(reason_code);
2067
	err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_DISASSOC,
2068
				     &scbval, sizeof(scbval));
2069
	if (err)
2070
		brcmf_err("error (%d)\n", err);
2071

2072
	brcmf_dbg(TRACE, "Exit\n");
2073 2074 2075 2076
	return err;
}

static s32
2077
brcmf_cfg80211_set_tx_power(struct wiphy *wiphy, struct wireless_dev *wdev,
2078
			    enum nl80211_tx_power_setting type, s32 mbm)
2079
{
2080
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
2081 2082
	struct net_device *ndev = cfg_to_ndev(cfg);
	struct brcmf_if *ifp = netdev_priv(ndev);
2083 2084 2085
	s32 err;
	s32 disable;
	u32 qdbm = 127;
2086

2087
	brcmf_dbg(TRACE, "Enter %d %d\n", type, mbm);
2088
	if (!check_vif_up(ifp->vif))
2089 2090 2091 2092 2093 2094 2095
		return -EIO;

	switch (type) {
	case NL80211_TX_POWER_AUTOMATIC:
		break;
	case NL80211_TX_POWER_LIMITED:
	case NL80211_TX_POWER_FIXED:
2096
		if (mbm < 0) {
2097
			brcmf_err("TX_POWER_FIXED - dbm is negative\n");
2098 2099 2100
			err = -EINVAL;
			goto done;
		}
2101 2102 2103 2104
		qdbm =  MBM_TO_DBM(4 * mbm);
		if (qdbm > 127)
			qdbm = 127;
		qdbm |= WL_TXPWR_OVERRIDE;
2105
		break;
2106 2107 2108 2109
	default:
		brcmf_err("Unsupported type %d\n", type);
		err = -EINVAL;
		goto done;
2110 2111 2112
	}
	/* Make sure radio is off or on as far as software is concerned */
	disable = WL_RADIO_SW_DISABLE << 16;
2113
	err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_RADIO, disable);
2114
	if (err)
2115
		brcmf_err("WLC_SET_RADIO error (%d)\n", err);
2116

2117
	err = brcmf_fil_iovar_int_set(ifp, "qtxpower", qdbm);
2118
	if (err)
2119
		brcmf_err("qtxpower error (%d)\n", err);
2120 2121

done:
2122
	brcmf_dbg(TRACE, "Exit %d (qdbm)\n", qdbm & ~WL_TXPWR_OVERRIDE);
2123 2124 2125
	return err;
}

2126 2127 2128
static s32
brcmf_cfg80211_get_tx_power(struct wiphy *wiphy, struct wireless_dev *wdev,
			    s32 *dbm)
2129
{
2130
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
2131 2132 2133 2134
	struct net_device *ndev = cfg_to_ndev(cfg);
	struct brcmf_if *ifp = netdev_priv(ndev);
	s32 qdbm = 0;
	s32 err;
2135

2136
	brcmf_dbg(TRACE, "Enter\n");
2137
	if (!check_vif_up(ifp->vif))
2138 2139
		return -EIO;

2140
	err = brcmf_fil_iovar_int_get(ifp, "qtxpower", &qdbm);
2141
	if (err) {
2142
		brcmf_err("error (%d)\n", err);
2143 2144
		goto done;
	}
2145
	*dbm = (qdbm & ~WL_TXPWR_OVERRIDE) / 4;
2146 2147

done:
2148
	brcmf_dbg(TRACE, "Exit (0x%x %d)\n", qdbm, *dbm);
2149 2150 2151 2152 2153
	return err;
}

static s32
brcmf_cfg80211_config_default_key(struct wiphy *wiphy, struct net_device *ndev,
2154
				  u8 key_idx, bool unicast, bool multicast)
2155
{
2156
	struct brcmf_if *ifp = netdev_priv(ndev);
2157 2158 2159 2160
	u32 index;
	u32 wsec;
	s32 err = 0;

2161
	brcmf_dbg(TRACE, "Enter\n");
2162
	brcmf_dbg(CONN, "key index (%d)\n", key_idx);
2163
	if (!check_vif_up(ifp->vif))
2164 2165
		return -EIO;

2166
	err = brcmf_fil_bsscfg_int_get(ifp, "wsec", &wsec);
2167
	if (err) {
2168
		brcmf_err("WLC_GET_WSEC error (%d)\n", err);
2169 2170 2171 2172 2173 2174
		goto done;
	}

	if (wsec & WEP_ENABLED) {
		/* Just select a new current key */
		index = key_idx;
2175
		err = brcmf_fil_cmd_int_set(ifp,
2176
					    BRCMF_C_SET_KEY_PRIMARY, index);
2177
		if (err)
2178
			brcmf_err("error (%d)\n", err);
2179 2180
	}
done:
2181
	brcmf_dbg(TRACE, "Exit\n");
2182 2183 2184 2185
	return err;
}

static s32
2186 2187
brcmf_cfg80211_del_key(struct wiphy *wiphy, struct net_device *ndev,
		       u8 key_idx, bool pairwise, const u8 *mac_addr)
2188
{
2189
	struct brcmf_if *ifp = netdev_priv(ndev);
2190 2191
	struct brcmf_wsec_key *key;
	s32 err;
2192 2193

	brcmf_dbg(TRACE, "Enter\n");
2194 2195
	brcmf_dbg(CONN, "key index (%d)\n", key_idx);

2196 2197 2198 2199 2200 2201 2202
	if (!check_vif_up(ifp->vif))
		return -EIO;

	if (key_idx >= BRCMF_MAX_DEFAULT_KEYS) {
		/* we ignore this key index in this case */
		return -EINVAL;
	}
2203

2204
	key = &ifp->vif->profile.key[key_idx];
2205

2206 2207 2208 2209
	if (key->algo == CRYPTO_ALGO_OFF) {
		brcmf_dbg(CONN, "Ignore clearing of (never configured) key\n");
		return -EINVAL;
	}
2210

2211 2212 2213
	memset(key, 0, sizeof(*key));
	key->index = (u32)key_idx;
	key->flags = BRCMF_PRIMARY_KEY;
2214

2215 2216
	/* Clear the key/index */
	err = send_key_to_dongle(ifp, key);
2217

2218
	brcmf_dbg(TRACE, "Exit\n");
2219 2220 2221 2222 2223
	return err;
}

static s32
brcmf_cfg80211_add_key(struct wiphy *wiphy, struct net_device *ndev,
2224 2225
		       u8 key_idx, bool pairwise, const u8 *mac_addr,
		       struct key_params *params)
2226
{
2227
	struct brcmf_if *ifp = netdev_priv(ndev);
2228
	struct brcmf_wsec_key *key;
2229 2230
	s32 val;
	s32 wsec;
2231
	s32 err;
2232
	u8 keybuf[8];
2233
	bool ext_key;
2234

2235
	brcmf_dbg(TRACE, "Enter\n");
2236
	brcmf_dbg(CONN, "key index (%d)\n", key_idx);
2237
	if (!check_vif_up(ifp->vif))
2238 2239
		return -EIO;

2240 2241 2242 2243 2244 2245
	if (key_idx >= BRCMF_MAX_DEFAULT_KEYS) {
		/* we ignore this key index in this case */
		brcmf_err("invalid key index (%d)\n", key_idx);
		return -EINVAL;
	}

2246 2247 2248
	if (params->key_len == 0)
		return brcmf_cfg80211_del_key(wiphy, ndev, key_idx, pairwise,
					      mac_addr);
2249

2250 2251
	if (params->key_len > sizeof(key->data)) {
		brcmf_err("Too long key length (%u)\n", params->key_len);
2252
		return -EINVAL;
2253
	}
2254 2255 2256 2257 2258 2259 2260 2261 2262 2263 2264 2265

	ext_key = false;
	if (mac_addr && (params->cipher != WLAN_CIPHER_SUITE_WEP40) &&
	    (params->cipher != WLAN_CIPHER_SUITE_WEP104)) {
		brcmf_dbg(TRACE, "Ext key, mac %pM", mac_addr);
		ext_key = true;
	}

	key = &ifp->vif->profile.key[key_idx];
	memset(key, 0, sizeof(*key));
	if ((ext_key) && (!is_multicast_ether_addr(mac_addr)))
		memcpy((char *)&key->ea, (void *)mac_addr, ETH_ALEN);
2266 2267 2268
	key->len = params->key_len;
	key->index = key_idx;
	memcpy(key->data, params->key, key->len);
2269 2270
	if (!ext_key)
		key->flags = BRCMF_PRIMARY_KEY;
2271

2272 2273
	switch (params->cipher) {
	case WLAN_CIPHER_SUITE_WEP40:
2274
		key->algo = CRYPTO_ALGO_WEP1;
2275
		val = WEP_ENABLED;
2276
		brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_WEP40\n");
2277 2278
		break;
	case WLAN_CIPHER_SUITE_WEP104:
2279
		key->algo = CRYPTO_ALGO_WEP128;
2280
		val = WEP_ENABLED;
2281
		brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_WEP104\n");
2282 2283
		break;
	case WLAN_CIPHER_SUITE_TKIP:
2284
		if (!brcmf_is_apmode(ifp->vif)) {
2285
			brcmf_dbg(CONN, "Swapping RX/TX MIC key\n");
2286 2287 2288
			memcpy(keybuf, &key->data[24], sizeof(keybuf));
			memcpy(&key->data[24], &key->data[16], sizeof(keybuf));
			memcpy(&key->data[16], keybuf, sizeof(keybuf));
2289
		}
2290
		key->algo = CRYPTO_ALGO_TKIP;
2291
		val = TKIP_ENABLED;
2292
		brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_TKIP\n");
2293 2294
		break;
	case WLAN_CIPHER_SUITE_AES_CMAC:
2295
		key->algo = CRYPTO_ALGO_AES_CCM;
2296
		val = AES_ENABLED;
2297
		brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_AES_CMAC\n");
2298 2299
		break;
	case WLAN_CIPHER_SUITE_CCMP:
2300
		key->algo = CRYPTO_ALGO_AES_CCM;
2301
		val = AES_ENABLED;
2302
		brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_CCMP\n");
2303 2304
		break;
	default:
2305
		brcmf_err("Invalid cipher (0x%x)\n", params->cipher);
2306 2307 2308 2309
		err = -EINVAL;
		goto done;
	}

2310
	err = send_key_to_dongle(ifp, key);
2311
	if (ext_key || err)
2312 2313
		goto done;

2314
	err = brcmf_fil_bsscfg_int_get(ifp, "wsec", &wsec);
2315
	if (err) {
2316
		brcmf_err("get wsec error (%d)\n", err);
2317 2318 2319
		goto done;
	}
	wsec |= val;
2320
	err = brcmf_fil_bsscfg_int_set(ifp, "wsec", wsec);
2321
	if (err) {
2322
		brcmf_err("set wsec error (%d)\n", err);
2323 2324 2325 2326
		goto done;
	}

done:
2327
	brcmf_dbg(TRACE, "Exit\n");
2328 2329 2330 2331
	return err;
}

static s32
2332 2333 2334 2335
brcmf_cfg80211_get_key(struct wiphy *wiphy, struct net_device *ndev, u8 key_idx,
		       bool pairwise, const u8 *mac_addr, void *cookie,
		       void (*callback)(void *cookie,
					struct key_params *params))
2336 2337
{
	struct key_params params;
2338 2339
	struct brcmf_if *ifp = netdev_priv(ndev);
	struct brcmf_cfg80211_profile *profile = &ifp->vif->profile;
2340 2341 2342 2343
	struct brcmf_cfg80211_security *sec;
	s32 wsec;
	s32 err = 0;

2344
	brcmf_dbg(TRACE, "Enter\n");
2345
	brcmf_dbg(CONN, "key index (%d)\n", key_idx);
2346
	if (!check_vif_up(ifp->vif))
2347 2348 2349 2350
		return -EIO;

	memset(&params, 0, sizeof(params));

2351
	err = brcmf_fil_bsscfg_int_get(ifp, "wsec", &wsec);
2352
	if (err) {
2353
		brcmf_err("WLC_GET_WSEC error (%d)\n", err);
2354 2355 2356 2357
		/* Ignore this error, may happen during DISASSOC */
		err = -EAGAIN;
		goto done;
	}
2358
	if (wsec & WEP_ENABLED) {
2359
		sec = &profile->sec;
2360 2361
		if (sec->cipher_pairwise & WLAN_CIPHER_SUITE_WEP40) {
			params.cipher = WLAN_CIPHER_SUITE_WEP40;
2362
			brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_WEP40\n");
2363 2364
		} else if (sec->cipher_pairwise & WLAN_CIPHER_SUITE_WEP104) {
			params.cipher = WLAN_CIPHER_SUITE_WEP104;
2365
			brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_WEP104\n");
2366
		}
2367
	} else if (wsec & TKIP_ENABLED) {
2368
		params.cipher = WLAN_CIPHER_SUITE_TKIP;
2369
		brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_TKIP\n");
2370
	} else if (wsec & AES_ENABLED) {
2371
		params.cipher = WLAN_CIPHER_SUITE_AES_CMAC;
2372
		brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_AES_CMAC\n");
2373
	} else  {
2374
		brcmf_err("Invalid algo (0x%x)\n", wsec);
2375 2376 2377 2378 2379 2380
		err = -EINVAL;
		goto done;
	}
	callback(cookie, &params);

done:
2381
	brcmf_dbg(TRACE, "Exit\n");
2382 2383 2384 2385 2386
	return err;
}

static s32
brcmf_cfg80211_config_default_mgmt_key(struct wiphy *wiphy,
2387
				       struct net_device *ndev, u8 key_idx)
2388
{
2389 2390 2391 2392 2393 2394 2395
	struct brcmf_if *ifp = netdev_priv(ndev);

	brcmf_dbg(TRACE, "Enter key_idx %d\n", key_idx);

	if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MFP))
		return 0;

2396
	brcmf_dbg(INFO, "Not supported\n");
2397 2398 2399 2400

	return -EOPNOTSUPP;
}

2401 2402 2403 2404 2405 2406 2407 2408 2409 2410 2411 2412 2413 2414 2415 2416 2417 2418 2419 2420 2421 2422 2423 2424 2425 2426 2427 2428 2429 2430 2431 2432 2433
static void
brcmf_cfg80211_reconfigure_wep(struct brcmf_if *ifp)
{
	s32 err;
	u8 key_idx;
	struct brcmf_wsec_key *key;
	s32 wsec;

	for (key_idx = 0; key_idx < BRCMF_MAX_DEFAULT_KEYS; key_idx++) {
		key = &ifp->vif->profile.key[key_idx];
		if ((key->algo == CRYPTO_ALGO_WEP1) ||
		    (key->algo == CRYPTO_ALGO_WEP128))
			break;
	}
	if (key_idx == BRCMF_MAX_DEFAULT_KEYS)
		return;

	err = send_key_to_dongle(ifp, key);
	if (err) {
		brcmf_err("Setting WEP key failed (%d)\n", err);
		return;
	}
	err = brcmf_fil_bsscfg_int_get(ifp, "wsec", &wsec);
	if (err) {
		brcmf_err("get wsec error (%d)\n", err);
		return;
	}
	wsec |= WEP_ENABLED;
	err = brcmf_fil_bsscfg_int_set(ifp, "wsec", wsec);
	if (err)
		brcmf_err("set wsec error (%d)\n", err);
}

2434 2435 2436 2437 2438 2439 2440 2441 2442 2443 2444 2445 2446 2447 2448 2449 2450 2451 2452 2453 2454 2455 2456 2457 2458 2459 2460 2461 2462 2463 2464 2465 2466 2467 2468 2469 2470 2471 2472
static void brcmf_convert_sta_flags(u32 fw_sta_flags, struct station_info *si)
{
	struct nl80211_sta_flag_update *sfu;

	brcmf_dbg(TRACE, "flags %08x\n", fw_sta_flags);
	si->filled |= BIT(NL80211_STA_INFO_STA_FLAGS);
	sfu = &si->sta_flags;
	sfu->mask = BIT(NL80211_STA_FLAG_WME) |
		    BIT(NL80211_STA_FLAG_AUTHENTICATED) |
		    BIT(NL80211_STA_FLAG_ASSOCIATED) |
		    BIT(NL80211_STA_FLAG_AUTHORIZED);
	if (fw_sta_flags & BRCMF_STA_WME)
		sfu->set |= BIT(NL80211_STA_FLAG_WME);
	if (fw_sta_flags & BRCMF_STA_AUTHE)
		sfu->set |= BIT(NL80211_STA_FLAG_AUTHENTICATED);
	if (fw_sta_flags & BRCMF_STA_ASSOC)
		sfu->set |= BIT(NL80211_STA_FLAG_ASSOCIATED);
	if (fw_sta_flags & BRCMF_STA_AUTHO)
		sfu->set |= BIT(NL80211_STA_FLAG_AUTHORIZED);
}

static void brcmf_fill_bss_param(struct brcmf_if *ifp, struct station_info *si)
{
	struct {
		__le32 len;
		struct brcmf_bss_info_le bss_le;
	} *buf;
	u16 capability;
	int err;

	buf = kzalloc(WL_BSS_INFO_MAX, GFP_KERNEL);
	if (!buf)
		return;

	buf->len = cpu_to_le32(WL_BSS_INFO_MAX);
	err = brcmf_fil_cmd_data_get(ifp, BRCMF_C_GET_BSS_INFO, buf,
				     WL_BSS_INFO_MAX);
	if (err) {
		brcmf_err("Failed to get bss info (%d)\n", err);
2473
		goto out_kfree;
2474 2475 2476 2477 2478 2479 2480 2481 2482 2483 2484
	}
	si->filled |= BIT(NL80211_STA_INFO_BSS_PARAM);
	si->bss_param.beacon_interval = le16_to_cpu(buf->bss_le.beacon_period);
	si->bss_param.dtim_period = buf->bss_le.dtim_period;
	capability = le16_to_cpu(buf->bss_le.capability);
	if (capability & IEEE80211_HT_STBC_PARAM_DUAL_CTS_PROT)
		si->bss_param.flags |= BSS_PARAM_FLAGS_CTS_PROT;
	if (capability & WLAN_CAPABILITY_SHORT_PREAMBLE)
		si->bss_param.flags |= BSS_PARAM_FLAGS_SHORT_PREAMBLE;
	if (capability & WLAN_CAPABILITY_SHORT_SLOT_TIME)
		si->bss_param.flags |= BSS_PARAM_FLAGS_SHORT_SLOT_TIME;
2485 2486 2487

out_kfree:
	kfree(buf);
2488 2489
}

2490 2491 2492 2493 2494 2495 2496 2497 2498 2499 2500 2501 2502 2503 2504 2505 2506 2507 2508 2509 2510 2511 2512 2513 2514 2515 2516 2517 2518 2519 2520 2521 2522 2523 2524 2525 2526 2527 2528 2529 2530 2531 2532 2533 2534 2535 2536 2537
static s32
brcmf_cfg80211_get_station_ibss(struct brcmf_if *ifp,
				struct station_info *sinfo)
{
	struct brcmf_scb_val_le scbval;
	struct brcmf_pktcnt_le pktcnt;
	s32 err;
	u32 rate;
	u32 rssi;

	/* Get the current tx rate */
	err = brcmf_fil_cmd_int_get(ifp, BRCMF_C_GET_RATE, &rate);
	if (err < 0) {
		brcmf_err("BRCMF_C_GET_RATE error (%d)\n", err);
		return err;
	}
	sinfo->filled |= BIT(NL80211_STA_INFO_TX_BITRATE);
	sinfo->txrate.legacy = rate * 5;

	memset(&scbval, 0, sizeof(scbval));
	err = brcmf_fil_cmd_data_get(ifp, BRCMF_C_GET_RSSI, &scbval,
				     sizeof(scbval));
	if (err) {
		brcmf_err("BRCMF_C_GET_RSSI error (%d)\n", err);
		return err;
	}
	rssi = le32_to_cpu(scbval.val);
	sinfo->filled |= BIT(NL80211_STA_INFO_SIGNAL);
	sinfo->signal = rssi;

	err = brcmf_fil_cmd_data_get(ifp, BRCMF_C_GET_GET_PKTCNTS, &pktcnt,
				     sizeof(pktcnt));
	if (err) {
		brcmf_err("BRCMF_C_GET_GET_PKTCNTS error (%d)\n", err);
		return err;
	}
	sinfo->filled |= BIT(NL80211_STA_INFO_RX_PACKETS) |
			 BIT(NL80211_STA_INFO_RX_DROP_MISC) |
			 BIT(NL80211_STA_INFO_TX_PACKETS) |
			 BIT(NL80211_STA_INFO_TX_FAILED);
	sinfo->rx_packets = le32_to_cpu(pktcnt.rx_good_pkt);
	sinfo->rx_dropped_misc = le32_to_cpu(pktcnt.rx_bad_pkt);
	sinfo->tx_packets = le32_to_cpu(pktcnt.tx_good_pkt);
	sinfo->tx_failed  = le32_to_cpu(pktcnt.tx_bad_pkt);

	return 0;
}

2538 2539
static s32
brcmf_cfg80211_get_station(struct wiphy *wiphy, struct net_device *ndev,
2540
			   const u8 *mac, struct station_info *sinfo)
2541
{
2542
	struct brcmf_if *ifp = netdev_priv(ndev);
2543
	struct brcmf_scb_val_le scb_val;
2544
	s32 err = 0;
2545
	struct brcmf_sta_info_le sta_info_le;
2546 2547
	u32 sta_flags;
	u32 is_tdls_peer;
2548 2549
	s32 total_rssi;
	s32 count_rssi;
2550
	int rssi;
2551
	u32 i;
2552

2553
	brcmf_dbg(TRACE, "Enter, MAC %pM\n", mac);
2554
	if (!check_vif_up(ifp->vif))
2555 2556
		return -EIO;

2557 2558 2559
	if (brcmf_is_ibssmode(ifp->vif))
		return brcmf_cfg80211_get_station_ibss(ifp, sinfo);

2560 2561 2562 2563 2564 2565 2566
	memset(&sta_info_le, 0, sizeof(sta_info_le));
	memcpy(&sta_info_le, mac, ETH_ALEN);
	err = brcmf_fil_iovar_data_get(ifp, "tdls_sta_info",
				       &sta_info_le,
				       sizeof(sta_info_le));
	is_tdls_peer = !err;
	if (err) {
2567
		err = brcmf_fil_iovar_data_get(ifp, "sta_info",
2568
					       &sta_info_le,
2569
					       sizeof(sta_info_le));
2570
		if (err < 0) {
2571
			brcmf_err("GET STA INFO failed, %d\n", err);
2572 2573
			goto done;
		}
2574 2575 2576 2577 2578 2579 2580 2581 2582 2583 2584 2585 2586 2587 2588 2589 2590 2591 2592 2593 2594 2595 2596 2597 2598 2599
	}
	brcmf_dbg(TRACE, "version %d\n", le16_to_cpu(sta_info_le.ver));
	sinfo->filled = BIT(NL80211_STA_INFO_INACTIVE_TIME);
	sinfo->inactive_time = le32_to_cpu(sta_info_le.idle) * 1000;
	sta_flags = le32_to_cpu(sta_info_le.flags);
	brcmf_convert_sta_flags(sta_flags, sinfo);
	sinfo->sta_flags.mask |= BIT(NL80211_STA_FLAG_TDLS_PEER);
	if (is_tdls_peer)
		sinfo->sta_flags.set |= BIT(NL80211_STA_FLAG_TDLS_PEER);
	else
		sinfo->sta_flags.set &= ~BIT(NL80211_STA_FLAG_TDLS_PEER);
	if (sta_flags & BRCMF_STA_ASSOC) {
		sinfo->filled |= BIT(NL80211_STA_INFO_CONNECTED_TIME);
		sinfo->connected_time = le32_to_cpu(sta_info_le.in);
		brcmf_fill_bss_param(ifp, sinfo);
	}
	if (sta_flags & BRCMF_STA_SCBSTATS) {
		sinfo->filled |= BIT(NL80211_STA_INFO_TX_FAILED);
		sinfo->tx_failed = le32_to_cpu(sta_info_le.tx_failures);
		sinfo->filled |= BIT(NL80211_STA_INFO_TX_PACKETS);
		sinfo->tx_packets = le32_to_cpu(sta_info_le.tx_pkts);
		sinfo->tx_packets += le32_to_cpu(sta_info_le.tx_mcast_pkts);
		sinfo->filled |= BIT(NL80211_STA_INFO_RX_PACKETS);
		sinfo->rx_packets = le32_to_cpu(sta_info_le.rx_ucast_pkts);
		sinfo->rx_packets += le32_to_cpu(sta_info_le.rx_mcast_pkts);
		if (sinfo->tx_packets) {
2600
			sinfo->filled |= BIT(NL80211_STA_INFO_TX_BITRATE);
2601 2602
			sinfo->txrate.legacy =
				le32_to_cpu(sta_info_le.tx_rate) / 100;
2603
		}
2604 2605
		if (sinfo->rx_packets) {
			sinfo->filled |= BIT(NL80211_STA_INFO_RX_BITRATE);
2606 2607
			sinfo->rxrate.legacy =
				le32_to_cpu(sta_info_le.rx_rate) / 100;
2608
		}
2609 2610 2611 2612 2613 2614
		if (le16_to_cpu(sta_info_le.ver) >= 4) {
			sinfo->filled |= BIT(NL80211_STA_INFO_TX_BYTES);
			sinfo->tx_bytes = le64_to_cpu(sta_info_le.tx_tot_bytes);
			sinfo->filled |= BIT(NL80211_STA_INFO_RX_BYTES);
			sinfo->rx_bytes = le64_to_cpu(sta_info_le.rx_tot_bytes);
		}
2615 2616 2617 2618 2619 2620 2621 2622 2623 2624 2625 2626 2627 2628 2629 2630 2631 2632 2633
		total_rssi = 0;
		count_rssi = 0;
		for (i = 0; i < BRCMF_ANT_MAX; i++) {
			if (sta_info_le.rssi[i]) {
				sinfo->chain_signal_avg[count_rssi] =
					sta_info_le.rssi[i];
				sinfo->chain_signal[count_rssi] =
					sta_info_le.rssi[i];
				total_rssi += sta_info_le.rssi[i];
				count_rssi++;
			}
		}
		if (count_rssi) {
			sinfo->filled |= BIT(NL80211_STA_INFO_CHAIN_SIGNAL);
			sinfo->chains = count_rssi;

			sinfo->filled |= BIT(NL80211_STA_INFO_SIGNAL);
			total_rssi /= count_rssi;
			sinfo->signal = total_rssi;
2634 2635 2636 2637 2638 2639 2640 2641 2642 2643 2644 2645 2646 2647
		} else if (test_bit(BRCMF_VIF_STATUS_CONNECTED,
			&ifp->vif->sme_state)) {
			memset(&scb_val, 0, sizeof(scb_val));
			err = brcmf_fil_cmd_data_get(ifp, BRCMF_C_GET_RSSI,
						     &scb_val, sizeof(scb_val));
			if (err) {
				brcmf_err("Could not get rssi (%d)\n", err);
				goto done;
			} else {
				rssi = le32_to_cpu(scb_val.val);
				sinfo->filled |= BIT(NL80211_STA_INFO_SIGNAL);
				sinfo->signal = rssi;
				brcmf_dbg(CONN, "RSSI %d dBm\n", rssi);
			}
2648
		}
2649
	}
2650
done:
2651
	brcmf_dbg(TRACE, "Exit\n");
2652 2653 2654
	return err;
}

2655 2656 2657 2658 2659 2660 2661 2662 2663 2664 2665 2666 2667 2668 2669 2670 2671 2672 2673 2674 2675 2676 2677 2678 2679 2680 2681 2682 2683
static int
brcmf_cfg80211_dump_station(struct wiphy *wiphy, struct net_device *ndev,
			    int idx, u8 *mac, struct station_info *sinfo)
{
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
	struct brcmf_if *ifp = netdev_priv(ndev);
	s32 err;

	brcmf_dbg(TRACE, "Enter, idx %d\n", idx);

	if (idx == 0) {
		cfg->assoclist.count = cpu_to_le32(BRCMF_MAX_ASSOCLIST);
		err = brcmf_fil_cmd_data_get(ifp, BRCMF_C_GET_ASSOCLIST,
					     &cfg->assoclist,
					     sizeof(cfg->assoclist));
		if (err) {
			brcmf_err("BRCMF_C_GET_ASSOCLIST unsupported, err=%d\n",
				  err);
			cfg->assoclist.count = 0;
			return -EOPNOTSUPP;
		}
	}
	if (idx < le32_to_cpu(cfg->assoclist.count)) {
		memcpy(mac, cfg->assoclist.mac[idx], ETH_ALEN);
		return brcmf_cfg80211_get_station(wiphy, ndev, mac, sinfo);
	}
	return -ENOENT;
}

2684 2685 2686 2687 2688 2689
static s32
brcmf_cfg80211_set_power_mgmt(struct wiphy *wiphy, struct net_device *ndev,
			   bool enabled, s32 timeout)
{
	s32 pm;
	s32 err = 0;
2690
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
2691
	struct brcmf_if *ifp = netdev_priv(ndev);
2692

2693
	brcmf_dbg(TRACE, "Enter\n");
2694 2695 2696 2697 2698

	/*
	 * Powersave enable/disable request is coming from the
	 * cfg80211 even before the interface is up. In that
	 * scenario, driver will be storing the power save
2699
	 * preference in cfg struct to apply this to
2700 2701
	 * FW later while initializing the dongle
	 */
2702
	cfg->pwr_save = enabled;
2703
	if (!check_vif_up(ifp->vif)) {
2704

2705
		brcmf_dbg(INFO, "Device is not ready, storing the value in cfg_info struct\n");
2706 2707 2708 2709
		goto done;
	}

	pm = enabled ? PM_FAST : PM_OFF;
2710 2711 2712 2713 2714
	/* Do not enable the power save after assoc if it is a p2p interface */
	if (ifp->vif->wdev.iftype == NL80211_IFTYPE_P2P_CLIENT) {
		brcmf_dbg(INFO, "Do not enable power save for P2P clients\n");
		pm = PM_OFF;
	}
2715
	brcmf_dbg(INFO, "power save %s\n", (pm ? "enabled" : "disabled"));
2716

2717
	err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_PM, pm);
2718 2719
	if (err) {
		if (err == -ENODEV)
2720
			brcmf_err("net_device is not ready yet\n");
2721
		else
2722
			brcmf_err("error (%d)\n", err);
2723 2724
	}
done:
2725
	brcmf_dbg(TRACE, "Exit\n");
2726 2727 2728
	return err;
}

2729
static s32 brcmf_inform_single_bss(struct brcmf_cfg80211_info *cfg,
2730
				   struct brcmf_bss_info_le *bi)
2731
{
2732
	struct wiphy *wiphy = cfg_to_wiphy(cfg);
2733 2734 2735
	struct ieee80211_channel *notify_channel;
	struct cfg80211_bss *bss;
	struct ieee80211_supported_band *band;
2736
	struct brcmu_chan ch;
2737 2738 2739 2740 2741 2742 2743 2744 2745
	u16 channel;
	u32 freq;
	u16 notify_capability;
	u16 notify_interval;
	u8 *notify_ie;
	size_t notify_ielen;
	s32 notify_signal;

	if (le32_to_cpu(bi->length) > WL_BSS_INFO_MAX) {
2746
		brcmf_err("Bss info is larger than buffer. Discarding\n");
2747 2748 2749
		return 0;
	}

2750 2751 2752
	if (!bi->ctl_ch) {
		ch.chspec = le16_to_cpu(bi->chanspec);
		cfg->d11inf.decchspec(&ch);
2753
		bi->ctl_ch = ch.control_ch_num;
2754 2755
	}
	channel = bi->ctl_ch;
2756 2757

	if (channel <= CH_MAX_2G_CHANNEL)
2758
		band = wiphy->bands[NL80211_BAND_2GHZ];
2759
	else
2760
		band = wiphy->bands[NL80211_BAND_5GHZ];
2761 2762 2763 2764 2765 2766 2767 2768 2769 2770

	freq = ieee80211_channel_to_frequency(channel, band->band);
	notify_channel = ieee80211_get_channel(wiphy, freq);

	notify_capability = le16_to_cpu(bi->capability);
	notify_interval = le16_to_cpu(bi->beacon_period);
	notify_ie = (u8 *)bi + le16_to_cpu(bi->ie_offset);
	notify_ielen = le32_to_cpu(bi->ie_length);
	notify_signal = (s16)le16_to_cpu(bi->RSSI) * 100;

2771 2772 2773 2774 2775
	brcmf_dbg(CONN, "bssid: %pM\n", bi->BSSID);
	brcmf_dbg(CONN, "Channel: %d(%d)\n", channel, freq);
	brcmf_dbg(CONN, "Capability: %X\n", notify_capability);
	brcmf_dbg(CONN, "Beacon interval: %d\n", notify_interval);
	brcmf_dbg(CONN, "Signal: %d\n", notify_signal);
2776

2777 2778 2779 2780 2781 2782 2783
	bss = cfg80211_inform_bss(wiphy, notify_channel,
				  CFG80211_BSS_FTYPE_UNKNOWN,
				  (const u8 *)bi->BSSID,
				  0, notify_capability,
				  notify_interval, notify_ie,
				  notify_ielen, notify_signal,
				  GFP_KERNEL);
2784

2785 2786 2787
	if (!bss)
		return -ENOMEM;

2788
	cfg80211_put_bss(wiphy, bss);
2789

2790
	return 0;
2791 2792
}

2793 2794 2795 2796 2797 2798 2799 2800 2801
static struct brcmf_bss_info_le *
next_bss_le(struct brcmf_scan_results *list, struct brcmf_bss_info_le *bss)
{
	if (bss == NULL)
		return list->bss_info_le;
	return (struct brcmf_bss_info_le *)((unsigned long)bss +
					    le32_to_cpu(bss->length));
}

2802
static s32 brcmf_inform_bss(struct brcmf_cfg80211_info *cfg)
2803 2804
{
	struct brcmf_scan_results *bss_list;
2805
	struct brcmf_bss_info_le *bi = NULL;	/* must be initialized */
2806 2807 2808
	s32 err = 0;
	int i;

2809
	bss_list = (struct brcmf_scan_results *)cfg->escan_info.escan_buf;
2810 2811
	if (bss_list->count != 0 &&
	    bss_list->version != BRCMF_BSS_INFO_VERSION) {
2812 2813
		brcmf_err("Version %d != WL_BSS_INFO_VERSION\n",
			  bss_list->version);
2814 2815
		return -EOPNOTSUPP;
	}
2816
	brcmf_dbg(SCAN, "scanned AP count (%d)\n", bss_list->count);
2817
	for (i = 0; i < bss_list->count; i++) {
2818
		bi = next_bss_le(bss_list, bi);
2819
		err = brcmf_inform_single_bss(cfg, bi);
2820 2821 2822 2823 2824 2825
		if (err)
			break;
	}
	return err;
}

Hante Meuleman's avatar
Hante Meuleman committed
2826 2827
static s32 brcmf_inform_ibss(struct brcmf_cfg80211_info *cfg,
			     struct net_device *ndev, const u8 *bssid)
2828
{
2829
	struct wiphy *wiphy = cfg_to_wiphy(cfg);
2830
	struct ieee80211_channel *notify_channel;
2831
	struct brcmf_bss_info_le *bi = NULL;
2832
	struct ieee80211_supported_band *band;
2833
	struct cfg80211_bss *bss;
2834
	struct brcmu_chan ch;
2835 2836 2837 2838 2839 2840 2841 2842 2843
	u8 *buf = NULL;
	s32 err = 0;
	u32 freq;
	u16 notify_capability;
	u16 notify_interval;
	u8 *notify_ie;
	size_t notify_ielen;
	s32 notify_signal;

2844
	brcmf_dbg(TRACE, "Enter\n");
2845 2846 2847 2848 2849 2850 2851 2852 2853

	buf = kzalloc(WL_BSS_INFO_MAX, GFP_KERNEL);
	if (buf == NULL) {
		err = -ENOMEM;
		goto CleanUp;
	}

	*(__le32 *)buf = cpu_to_le32(WL_BSS_INFO_MAX);

2854 2855
	err = brcmf_fil_cmd_data_get(netdev_priv(ndev), BRCMF_C_GET_BSS_INFO,
				     buf, WL_BSS_INFO_MAX);
2856
	if (err) {
2857
		brcmf_err("WLC_GET_BSS_INFO failed: %d\n", err);
2858 2859 2860
		goto CleanUp;
	}

2861
	bi = (struct brcmf_bss_info_le *)(buf + 4);
2862

2863 2864
	ch.chspec = le16_to_cpu(bi->chanspec);
	cfg->d11inf.decchspec(&ch);
2865

2866
	if (ch.band == BRCMU_CHAN_BAND_2G)
2867
		band = wiphy->bands[NL80211_BAND_2GHZ];
2868
	else
2869
		band = wiphy->bands[NL80211_BAND_5GHZ];
2870

2871
	freq = ieee80211_channel_to_frequency(ch.control_ch_num, band->band);
Hante Meuleman's avatar
Hante Meuleman committed
2872
	cfg->channel = freq;
2873 2874 2875 2876 2877 2878 2879 2880
	notify_channel = ieee80211_get_channel(wiphy, freq);

	notify_capability = le16_to_cpu(bi->capability);
	notify_interval = le16_to_cpu(bi->beacon_period);
	notify_ie = (u8 *)bi + le16_to_cpu(bi->ie_offset);
	notify_ielen = le32_to_cpu(bi->ie_length);
	notify_signal = (s16)le16_to_cpu(bi->RSSI) * 100;

2881
	brcmf_dbg(CONN, "channel: %d(%d)\n", ch.control_ch_num, freq);
2882 2883 2884
	brcmf_dbg(CONN, "capability: %X\n", notify_capability);
	brcmf_dbg(CONN, "beacon interval: %d\n", notify_interval);
	brcmf_dbg(CONN, "signal: %d\n", notify_signal);
2885

2886 2887 2888 2889 2890
	bss = cfg80211_inform_bss(wiphy, notify_channel,
				  CFG80211_BSS_FTYPE_UNKNOWN, bssid, 0,
				  notify_capability, notify_interval,
				  notify_ie, notify_ielen, notify_signal,
				  GFP_KERNEL);
2891

2892 2893 2894 2895 2896
	if (!bss) {
		err = -ENOMEM;
		goto CleanUp;
	}

2897
	cfg80211_put_bss(wiphy, bss);
2898

2899 2900 2901 2902
CleanUp:

	kfree(buf);

2903
	brcmf_dbg(TRACE, "Exit\n");
2904 2905 2906 2907

	return err;
}

2908 2909
static s32 brcmf_update_bss_info(struct brcmf_cfg80211_info *cfg,
				 struct brcmf_if *ifp)
2910
{
2911
	struct brcmf_bss_info_le *bi;
2912
	const struct brcmf_tlv *tim;
2913 2914 2915 2916 2917 2918
	u16 beacon_interval;
	u8 dtim_period;
	size_t ie_len;
	u8 *ie;
	s32 err = 0;

2919
	brcmf_dbg(TRACE, "Enter\n");
2920
	if (brcmf_is_ibssmode(ifp->vif))
2921 2922
		return err;

2923
	*(__le32 *)cfg->extra_buf = cpu_to_le32(WL_EXTRA_BUF_MAX);
2924
	err = brcmf_fil_cmd_data_get(ifp, BRCMF_C_GET_BSS_INFO,
2925
				     cfg->extra_buf, WL_EXTRA_BUF_MAX);
2926
	if (err) {
2927
		brcmf_err("Could not get bss info %d\n", err);
2928 2929 2930
		goto update_bss_info_out;
	}

2931 2932
	bi = (struct brcmf_bss_info_le *)(cfg->extra_buf + 4);
	err = brcmf_inform_single_bss(cfg, bi);
2933 2934 2935 2936 2937 2938 2939
	if (err)
		goto update_bss_info_out;

	ie = ((u8 *)bi) + le16_to_cpu(bi->ie_offset);
	ie_len = le32_to_cpu(bi->ie_length);
	beacon_interval = le16_to_cpu(bi->beacon_period);

2940
	tim = brcmf_parse_tlvs(ie, ie_len, WLAN_EID_TIM);
2941 2942 2943 2944 2945 2946 2947 2948 2949
	if (tim)
		dtim_period = tim->data[1];
	else {
		/*
		* active scan was done so we could not get dtim
		* information out of probe response.
		* so we speficially query dtim information to dongle.
		*/
		u32 var;
2950
		err = brcmf_fil_iovar_int_get(ifp, "dtim_assoc", &var);
2951
		if (err) {
2952
			brcmf_err("wl dtim_assoc failed (%d)\n", err);
2953 2954 2955 2956 2957 2958
			goto update_bss_info_out;
		}
		dtim_period = (u8)var;
	}

update_bss_info_out:
2959
	brcmf_dbg(TRACE, "Exit");
2960 2961 2962
	return err;
}

2963
void brcmf_abort_scanning(struct brcmf_cfg80211_info *cfg)
2964
{
2965
	struct escan_info *escan = &cfg->escan_info;
2966

2967
	set_bit(BRCMF_SCAN_STATUS_ABORT, &cfg->scan_status);
2968
	if (cfg->int_escan_map || cfg->scan_request) {
2969
		escan->escan_state = WL_ESCAN_STATE_IDLE;
2970
		brcmf_notify_escan_complete(cfg, escan->ifp, true, true);
2971
	}
2972 2973
	clear_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status);
	clear_bit(BRCMF_SCAN_STATUS_ABORT, &cfg->scan_status);
2974 2975
}

2976 2977
static void brcmf_cfg80211_escan_timeout_worker(struct work_struct *work)
{
2978 2979
	struct brcmf_cfg80211_info *cfg =
			container_of(work, struct brcmf_cfg80211_info,
2980 2981
				     escan_timeout_work);

2982
	brcmf_inform_bss(cfg);
2983
	brcmf_notify_escan_complete(cfg, cfg->escan_info.ifp, true, true);
2984 2985
}

2986
static void brcmf_escan_timeout(struct timer_list *t)
2987
{
2988
	struct brcmf_cfg80211_info *cfg =
2989
			from_timer(cfg, t, escan_timeout);
2990

2991
	if (cfg->int_escan_map || cfg->scan_request) {
2992
		brcmf_err("timer expired\n");
2993
		schedule_work(&cfg->escan_timeout_work);
2994 2995 2996 2997
	}
}

static s32
2998 2999
brcmf_compare_update_same_bss(struct brcmf_cfg80211_info *cfg,
			      struct brcmf_bss_info_le *bss,
3000 3001
			      struct brcmf_bss_info_le *bss_info_le)
{
3002 3003 3004 3005 3006 3007 3008
	struct brcmu_chan ch_bss, ch_bss_info_le;

	ch_bss.chspec = le16_to_cpu(bss->chanspec);
	cfg->d11inf.decchspec(&ch_bss);
	ch_bss_info_le.chspec = le16_to_cpu(bss_info_le->chanspec);
	cfg->d11inf.decchspec(&ch_bss_info_le);

3009
	if (!memcmp(&bss_info_le->BSSID, &bss->BSSID, ETH_ALEN) &&
3010
		ch_bss.band == ch_bss_info_le.band &&
3011 3012
		bss_info_le->SSID_len == bss->SSID_len &&
		!memcmp(bss_info_le->SSID, bss->SSID, bss_info_le->SSID_len)) {
3013 3014
		if ((bss->flags & BRCMF_BSS_RSSI_ON_CHANNEL) ==
			(bss_info_le->flags & BRCMF_BSS_RSSI_ON_CHANNEL)) {
3015 3016 3017
			s16 bss_rssi = le16_to_cpu(bss->RSSI);
			s16 bss_info_rssi = le16_to_cpu(bss_info_le->RSSI);

3018 3019 3020
			/* preserve max RSSI if the measurements are
			* both on-channel or both off-channel
			*/
3021
			if (bss_info_rssi > bss_rssi)
3022
				bss->RSSI = bss_info_le->RSSI;
3023 3024
		} else if ((bss->flags & BRCMF_BSS_RSSI_ON_CHANNEL) &&
			(bss_info_le->flags & BRCMF_BSS_RSSI_ON_CHANNEL) == 0) {
3025 3026 3027 3028
			/* preserve the on-channel rssi measurement
			* if the new measurement is off channel
			*/
			bss->RSSI = bss_info_le->RSSI;
3029
			bss->flags |= BRCMF_BSS_RSSI_ON_CHANNEL;
3030 3031 3032 3033 3034 3035 3036
		}
		return 1;
	}
	return 0;
}

static s32
3037
brcmf_cfg80211_escan_handler(struct brcmf_if *ifp,
3038 3039
			     const struct brcmf_event_msg *e, void *data)
{
3040
	struct brcmf_cfg80211_info *cfg = ifp->drvr->config;
3041 3042
	s32 status;
	struct brcmf_escan_result_le *escan_result_le;
3043
	u32 escan_buflen;
3044 3045 3046 3047 3048
	struct brcmf_bss_info_le *bss_info_le;
	struct brcmf_bss_info_le *bss = NULL;
	u32 bi_length;
	struct brcmf_scan_results *list;
	u32 i;
3049
	bool aborted;
3050

3051
	status = e->status;
3052

3053 3054 3055
	if (status == BRCMF_E_STATUS_ABORT)
		goto exit;

3056
	if (!test_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status)) {
3057
		brcmf_err("scan not ready, bsscfgidx=%d\n", ifp->bsscfgidx);
3058 3059 3060 3061
		return -EPERM;
	}

	if (status == BRCMF_E_STATUS_PARTIAL) {
3062
		brcmf_dbg(SCAN, "ESCAN Partial result\n");
3063 3064 3065 3066
		if (e->datalen < sizeof(*escan_result_le)) {
			brcmf_err("invalid event data length\n");
			goto exit;
		}
3067 3068
		escan_result_le = (struct brcmf_escan_result_le *) data;
		if (!escan_result_le) {
3069
			brcmf_err("Invalid escan result (NULL pointer)\n");
3070 3071
			goto exit;
		}
3072 3073 3074 3075 3076 3077 3078 3079
		escan_buflen = le32_to_cpu(escan_result_le->buflen);
		if (escan_buflen > BRCMF_ESCAN_BUF_SIZE ||
		    escan_buflen > e->datalen ||
		    escan_buflen < sizeof(*escan_result_le)) {
			brcmf_err("Invalid escan buffer length: %d\n",
				  escan_buflen);
			goto exit;
		}
3080
		if (le16_to_cpu(escan_result_le->bss_count) != 1) {
3081 3082
			brcmf_err("Invalid bss_count %d: ignoring\n",
				  escan_result_le->bss_count);
3083 3084 3085 3086
			goto exit;
		}
		bss_info_le = &escan_result_le->bss_info_le;

3087 3088 3089
		if (brcmf_p2p_scan_finding_common_channel(cfg, bss_info_le))
			goto exit;

3090
		if (!cfg->int_escan_map && !cfg->scan_request) {
3091 3092 3093 3094
			brcmf_dbg(SCAN, "result without cfg80211 request\n");
			goto exit;
		}

3095
		bi_length = le32_to_cpu(bss_info_le->length);
3096 3097
		if (bi_length != escan_buflen -	WL_ESCAN_RESULTS_FIXED_SIZE) {
			brcmf_err("Ignoring invalid bss_info length: %d\n",
3098
				  bi_length);
3099 3100 3101
			goto exit;
		}

3102
		if (!(cfg_to_wiphy(cfg)->interface_modes &
3103 3104 3105
					BIT(NL80211_IFTYPE_ADHOC))) {
			if (le16_to_cpu(bss_info_le->capability) &
						WLAN_CAPABILITY_IBSS) {
3106
				brcmf_err("Ignoring IBSS result\n");
3107 3108 3109 3110 3111
				goto exit;
			}
		}

		list = (struct brcmf_scan_results *)
3112
				cfg->escan_info.escan_buf;
3113
		if (bi_length > BRCMF_ESCAN_BUF_SIZE - list->buflen) {
3114
			brcmf_err("Buffer is too small: ignoring\n");
3115 3116 3117 3118 3119 3120 3121
			goto exit;
		}

		for (i = 0; i < list->count; i++) {
			bss = bss ? (struct brcmf_bss_info_le *)
				((unsigned char *)bss +
				le32_to_cpu(bss->length)) : list->bss_info_le;
3122 3123
			if (brcmf_compare_update_same_bss(cfg, bss,
							  bss_info_le))
3124 3125
				goto exit;
		}
3126 3127
		memcpy(&cfg->escan_info.escan_buf[list->buflen], bss_info_le,
		       bi_length);
3128 3129 3130 3131
		list->version = le32_to_cpu(bss_info_le->version);
		list->buflen += bi_length;
		list->count++;
	} else {
3132
		cfg->escan_info.escan_state = WL_ESCAN_STATE_IDLE;
3133 3134
		if (brcmf_p2p_scan_finding_common_channel(cfg, NULL))
			goto exit;
3135
		if (cfg->int_escan_map || cfg->scan_request) {
3136
			brcmf_inform_bss(cfg);
3137
			aborted = status != BRCMF_E_STATUS_SUCCESS;
3138
			brcmf_notify_escan_complete(cfg, ifp, aborted, false);
3139
		} else
3140 3141
			brcmf_dbg(SCAN, "Ignored scan complete result 0x%x\n",
				  status);
3142 3143
	}
exit:
3144
	return 0;
3145 3146
}

3147
static void brcmf_init_escan(struct brcmf_cfg80211_info *cfg)
3148
{
3149 3150
	brcmf_fweh_register(cfg->pub, BRCMF_E_ESCAN_RESULT,
			    brcmf_cfg80211_escan_handler);
3151 3152
	cfg->escan_info.escan_state = WL_ESCAN_STATE_IDLE;
	/* Init scan_timeout timer */
3153
	timer_setup(&cfg->escan_timeout, brcmf_escan_timeout, 0);
3154 3155
	INIT_WORK(&cfg->escan_timeout_work,
		  brcmf_cfg80211_escan_timeout_worker);
3156 3157
}

3158 3159 3160 3161 3162 3163 3164 3165 3166 3167 3168 3169 3170 3171 3172 3173 3174 3175 3176 3177 3178 3179 3180
static struct cfg80211_scan_request *
brcmf_alloc_internal_escan_request(struct wiphy *wiphy, u32 n_netinfo) {
	struct cfg80211_scan_request *req;
	size_t req_size;

	req_size = sizeof(*req) +
		   n_netinfo * sizeof(req->channels[0]) +
		   n_netinfo * sizeof(*req->ssids);

	req = kzalloc(req_size, GFP_KERNEL);
	if (req) {
		req->wiphy = wiphy;
		req->ssids = (void *)(&req->channels[0]) +
			     n_netinfo * sizeof(req->channels[0]);
	}
	return req;
}

static int brcmf_internal_escan_add_info(struct cfg80211_scan_request *req,
					 u8 *ssid, u8 ssid_len, u8 channel)
{
	struct ieee80211_channel *chan;
	enum nl80211_band band;
3181
	int freq, i;
3182 3183 3184 3185 3186 3187 3188 3189 3190 3191 3192 3193 3194 3195

	if (channel <= CH_MAX_2G_CHANNEL)
		band = NL80211_BAND_2GHZ;
	else
		band = NL80211_BAND_5GHZ;

	freq = ieee80211_channel_to_frequency(channel, band);
	if (!freq)
		return -EINVAL;

	chan = ieee80211_get_channel(req->wiphy, freq);
	if (!chan)
		return -EINVAL;

3196 3197 3198 3199 3200 3201
	for (i = 0; i < req->n_channels; i++) {
		if (req->channels[i] == chan)
			break;
	}
	if (i == req->n_channels)
		req->channels[req->n_channels++] = chan;
3202

3203 3204 3205 3206 3207 3208 3209 3210 3211
	for (i = 0; i < req->n_ssids; i++) {
		if (req->ssids[i].ssid_len == ssid_len &&
		    !memcmp(req->ssids[i].ssid, ssid, ssid_len))
			break;
	}
	if (i == req->n_ssids) {
		memcpy(req->ssids[req->n_ssids].ssid, ssid, ssid_len);
		req->ssids[req->n_ssids++].ssid_len = ssid_len;
	}
3212 3213 3214
	return 0;
}

3215
static int brcmf_start_internal_escan(struct brcmf_if *ifp, u32 fwmap,
3216 3217 3218 3219 3220 3221
				      struct cfg80211_scan_request *request)
{
	struct brcmf_cfg80211_info *cfg = ifp->drvr->config;
	int err;

	if (test_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status)) {
3222 3223 3224
		if (cfg->int_escan_map)
			brcmf_dbg(SCAN, "aborting internal scan: map=%u\n",
				  cfg->int_escan_map);
3225 3226 3227 3228
		/* Abort any on-going scan */
		brcmf_abort_scanning(cfg);
	}

3229
	brcmf_dbg(SCAN, "start internal scan: map=%u\n", fwmap);
3230 3231 3232 3233 3234 3235 3236
	set_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status);
	cfg->escan_info.run = brcmf_run_escan;
	err = brcmf_do_escan(ifp, request);
	if (err) {
		clear_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status);
		return err;
	}
3237
	cfg->int_escan_map = fwmap;
3238 3239 3240
	return 0;
}

3241 3242 3243 3244 3245 3246 3247 3248 3249 3250 3251 3252 3253 3254 3255 3256 3257 3258 3259 3260 3261 3262
static struct brcmf_pno_net_info_le *
brcmf_get_netinfo_array(struct brcmf_pno_scanresults_le *pfn_v1)
{
	struct brcmf_pno_scanresults_v2_le *pfn_v2;
	struct brcmf_pno_net_info_le *netinfo;

	switch (pfn_v1->version) {
	default:
		WARN_ON(1);
		/* fall-thru */
	case cpu_to_le32(1):
		netinfo = (struct brcmf_pno_net_info_le *)(pfn_v1 + 1);
		break;
	case cpu_to_le32(2):
		pfn_v2 = (struct brcmf_pno_scanresults_v2_le *)pfn_v1;
		netinfo = (struct brcmf_pno_net_info_le *)(pfn_v2 + 1);
		break;
	}

	return netinfo;
}

3263 3264 3265 3266 3267 3268
/* PFN result doesn't have all the info which are required by the supplicant
 * (For e.g IEs) Do a target Escan so that sched scan results are reported
 * via wl_inform_single_bss in the required format. Escan does require the
 * scan request in the form of cfg80211_scan_request. For timebeing, create
 * cfg80211_scan_request one out of the received PNO event.
 */
3269
static s32
3270 3271
brcmf_notify_sched_scan_results(struct brcmf_if *ifp,
				const struct brcmf_event_msg *e, void *data)
3272 3273
{
	struct brcmf_cfg80211_info *cfg = ifp->drvr->config;
3274 3275 3276
	struct brcmf_pno_net_info_le *netinfo, *netinfo_start;
	struct cfg80211_scan_request *request = NULL;
	struct wiphy *wiphy = cfg_to_wiphy(cfg);
3277
	int i, err = 0;
3278
	struct brcmf_pno_scanresults_le *pfn_result;
3279
	u32 bucket_map;
3280 3281
	u32 result_count;
	u32 status;
3282
	u32 datalen;
3283 3284 3285

	brcmf_dbg(SCAN, "Enter\n");

3286 3287 3288 3289 3290
	if (e->datalen < (sizeof(*pfn_result) + sizeof(*netinfo))) {
		brcmf_dbg(SCAN, "Event data to small. Ignore\n");
		return 0;
	}

3291
	if (e->event_code == BRCMF_E_PFN_NET_LOST) {
3292
		brcmf_dbg(SCAN, "PFN NET LOST event. Do Nothing\n");
3293 3294 3295
		return 0;
	}

3296 3297 3298
	pfn_result = (struct brcmf_pno_scanresults_le *)data;
	result_count = le32_to_cpu(pfn_result->count);
	status = le32_to_cpu(pfn_result->status);
3299

3300 3301 3302 3303 3304
	/* PFN event is limited to fit 512 bytes so we may get
	 * multiple NET_FOUND events. For now place a warning here.
	 */
	WARN_ON(status != BRCMF_PNO_SCAN_COMPLETE);
	brcmf_dbg(SCAN, "PFN NET FOUND event. count: %d\n", result_count);
3305
	if (!result_count) {
3306 3307
		brcmf_err("FALSE PNO Event. (pfn_count == 0)\n");
		goto out_err;
3308
	}
3309 3310 3311 3312 3313 3314 3315 3316

	netinfo_start = brcmf_get_netinfo_array(pfn_result);
	datalen = e->datalen - ((void *)netinfo_start - (void *)pfn_result);
	if (datalen < result_count * sizeof(*netinfo)) {
		brcmf_err("insufficient event data\n");
		goto out_err;
	}

3317 3318 3319 3320 3321
	request = brcmf_alloc_internal_escan_request(wiphy,
						     result_count);
	if (!request) {
		err = -ENOMEM;
		goto out_err;
3322 3323
	}

3324
	bucket_map = 0;
3325 3326
	for (i = 0; i < result_count; i++) {
		netinfo = &netinfo_start[i];
3327

3328 3329
		if (netinfo->SSID_len > IEEE80211_MAX_SSID_LEN)
			netinfo->SSID_len = IEEE80211_MAX_SSID_LEN;
3330 3331
		brcmf_dbg(SCAN, "SSID:%.32s Channel:%d\n",
			  netinfo->SSID, netinfo->channel);
3332
		bucket_map |= brcmf_pno_get_bucket_map(cfg->pno, netinfo);
3333 3334 3335 3336 3337
		err = brcmf_internal_escan_add_info(request,
						    netinfo->SSID,
						    netinfo->SSID_len,
						    netinfo->channel);
		if (err)
3338 3339 3340
			goto out_err;
	}

3341 3342 3343 3344
	if (!bucket_map)
		goto free_req;

	err = brcmf_start_internal_escan(ifp, bucket_map, request);
3345 3346
	if (!err)
		goto free_req;
3347 3348

out_err:
3349
	cfg80211_sched_scan_stopped(wiphy, 0);
3350 3351
free_req:
	kfree(request);
3352 3353 3354 3355 3356 3357
	return err;
}

static int
brcmf_cfg80211_sched_scan_start(struct wiphy *wiphy,
				struct net_device *ndev,
3358
				struct cfg80211_sched_scan_request *req)
3359 3360 3361 3362
{
	struct brcmf_if *ifp = netdev_priv(ndev);
	struct brcmf_cfg80211_info *cfg = wiphy_priv(wiphy);

3363
	brcmf_dbg(SCAN, "Enter: n_match_sets=%d n_ssids=%d\n",
3364
		  req->n_match_sets, req->n_ssids);
3365

3366
	if (test_bit(BRCMF_SCAN_STATUS_SUPPRESS, &cfg->scan_status)) {
3367
		brcmf_err("Scanning suppressed: status=%lu\n",
3368 3369 3370 3371
			  cfg->scan_status);
		return -EAGAIN;
	}

3372 3373 3374
	if (req->n_match_sets <= 0) {
		brcmf_dbg(SCAN, "invalid number of matchsets specified: %d\n",
			  req->n_match_sets);
3375 3376 3377
		return -EINVAL;
	}

3378
	return brcmf_pno_start_sched_scan(ifp, req);
3379 3380 3381
}

static int brcmf_cfg80211_sched_scan_stop(struct wiphy *wiphy,
3382
					  struct net_device *ndev, u64 reqid)
3383 3384
{
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
3385
	struct brcmf_if *ifp = netdev_priv(ndev);
3386 3387

	brcmf_dbg(SCAN, "enter\n");
3388 3389
	brcmf_pno_stop_sched_scan(ifp, reqid);
	if (cfg->int_escan_map)
3390
		brcmf_notify_escan_complete(cfg, ifp, true, true);
3391 3392 3393 3394 3395 3396 3397 3398 3399 3400 3401 3402 3403 3404 3405 3406 3407 3408 3409 3410 3411 3412 3413 3414 3415 3416 3417 3418 3419 3420 3421 3422 3423 3424 3425 3426 3427 3428 3429 3430 3431 3432 3433 3434 3435 3436 3437 3438 3439 3440 3441 3442 3443 3444 3445 3446 3447 3448 3449 3450 3451
	return 0;
}

static __always_inline void brcmf_delay(u32 ms)
{
	if (ms < 1000 / HZ) {
		cond_resched();
		mdelay(ms);
	} else {
		msleep(ms);
	}
}

static s32 brcmf_config_wowl_pattern(struct brcmf_if *ifp, u8 cmd[4],
				     u8 *pattern, u32 patternsize, u8 *mask,
				     u32 packet_offset)
{
	struct brcmf_fil_wowl_pattern_le *filter;
	u32 masksize;
	u32 patternoffset;
	u8 *buf;
	u32 bufsize;
	s32 ret;

	masksize = (patternsize + 7) / 8;
	patternoffset = sizeof(*filter) - sizeof(filter->cmd) + masksize;

	bufsize = sizeof(*filter) + patternsize + masksize;
	buf = kzalloc(bufsize, GFP_KERNEL);
	if (!buf)
		return -ENOMEM;
	filter = (struct brcmf_fil_wowl_pattern_le *)buf;

	memcpy(filter->cmd, cmd, 4);
	filter->masksize = cpu_to_le32(masksize);
	filter->offset = cpu_to_le32(packet_offset);
	filter->patternoffset = cpu_to_le32(patternoffset);
	filter->patternsize = cpu_to_le32(patternsize);
	filter->type = cpu_to_le32(BRCMF_WOWL_PATTERN_TYPE_BITMAP);

	if ((mask) && (masksize))
		memcpy(buf + sizeof(*filter), mask, masksize);
	if ((pattern) && (patternsize))
		memcpy(buf + sizeof(*filter) + masksize, pattern, patternsize);

	ret = brcmf_fil_iovar_data_set(ifp, "wowl_pattern", buf, bufsize);

	kfree(buf);
	return ret;
}

static s32
brcmf_wowl_nd_results(struct brcmf_if *ifp, const struct brcmf_event_msg *e,
		      void *data)
{
	struct brcmf_cfg80211_info *cfg = ifp->drvr->config;
	struct brcmf_pno_scanresults_le *pfn_result;
	struct brcmf_pno_net_info_le *netinfo;

	brcmf_dbg(SCAN, "Enter\n");

3452 3453 3454 3455 3456
	if (e->datalen < (sizeof(*pfn_result) + sizeof(*netinfo))) {
		brcmf_dbg(SCAN, "Event data to small. Ignore\n");
		return 0;
	}

3457 3458 3459 3460 3461 3462 3463 3464 3465 3466 3467 3468 3469
	pfn_result = (struct brcmf_pno_scanresults_le *)data;

	if (e->event_code == BRCMF_E_PFN_NET_LOST) {
		brcmf_dbg(SCAN, "PFN NET LOST event. Ignore\n");
		return 0;
	}

	if (le32_to_cpu(pfn_result->count) < 1) {
		brcmf_err("Invalid result count, expected 1 (%d)\n",
			  le32_to_cpu(pfn_result->count));
		return -EINVAL;
	}

3470
	netinfo = brcmf_get_netinfo_array(pfn_result);
3471 3472 3473 3474 3475 3476 3477 3478 3479 3480 3481 3482 3483 3484 3485 3486 3487 3488 3489 3490 3491 3492 3493 3494 3495 3496 3497 3498 3499 3500 3501 3502 3503 3504 3505 3506 3507 3508 3509 3510 3511 3512 3513 3514 3515 3516 3517 3518 3519 3520 3521 3522 3523 3524 3525 3526 3527 3528 3529 3530 3531 3532 3533 3534 3535 3536 3537 3538 3539 3540 3541 3542 3543 3544 3545 3546 3547
	memcpy(cfg->wowl.nd->ssid.ssid, netinfo->SSID, netinfo->SSID_len);
	cfg->wowl.nd->ssid.ssid_len = netinfo->SSID_len;
	cfg->wowl.nd->n_channels = 1;
	cfg->wowl.nd->channels[0] =
		ieee80211_channel_to_frequency(netinfo->channel,
			netinfo->channel <= CH_MAX_2G_CHANNEL ?
					NL80211_BAND_2GHZ : NL80211_BAND_5GHZ);
	cfg->wowl.nd_info->n_matches = 1;
	cfg->wowl.nd_info->matches[0] = cfg->wowl.nd;

	/* Inform (the resume task) that the net detect information was recvd */
	cfg->wowl.nd_data_completed = true;
	wake_up(&cfg->wowl.nd_data_wait);

	return 0;
}

#ifdef CONFIG_PM

static void brcmf_report_wowl_wakeind(struct wiphy *wiphy, struct brcmf_if *ifp)
{
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
	struct brcmf_wowl_wakeind_le wake_ind_le;
	struct cfg80211_wowlan_wakeup wakeup_data;
	struct cfg80211_wowlan_wakeup *wakeup;
	u32 wakeind;
	s32 err;
	int timeout;

	err = brcmf_fil_iovar_data_get(ifp, "wowl_wakeind", &wake_ind_le,
				       sizeof(wake_ind_le));
	if (err) {
		brcmf_err("Get wowl_wakeind failed, err = %d\n", err);
		return;
	}

	wakeind = le32_to_cpu(wake_ind_le.ucode_wakeind);
	if (wakeind & (BRCMF_WOWL_MAGIC | BRCMF_WOWL_DIS | BRCMF_WOWL_BCN |
		       BRCMF_WOWL_RETR | BRCMF_WOWL_NET |
		       BRCMF_WOWL_PFN_FOUND)) {
		wakeup = &wakeup_data;
		memset(&wakeup_data, 0, sizeof(wakeup_data));
		wakeup_data.pattern_idx = -1;

		if (wakeind & BRCMF_WOWL_MAGIC) {
			brcmf_dbg(INFO, "WOWL Wake indicator: BRCMF_WOWL_MAGIC\n");
			wakeup_data.magic_pkt = true;
		}
		if (wakeind & BRCMF_WOWL_DIS) {
			brcmf_dbg(INFO, "WOWL Wake indicator: BRCMF_WOWL_DIS\n");
			wakeup_data.disconnect = true;
		}
		if (wakeind & BRCMF_WOWL_BCN) {
			brcmf_dbg(INFO, "WOWL Wake indicator: BRCMF_WOWL_BCN\n");
			wakeup_data.disconnect = true;
		}
		if (wakeind & BRCMF_WOWL_RETR) {
			brcmf_dbg(INFO, "WOWL Wake indicator: BRCMF_WOWL_RETR\n");
			wakeup_data.disconnect = true;
		}
		if (wakeind & BRCMF_WOWL_NET) {
			brcmf_dbg(INFO, "WOWL Wake indicator: BRCMF_WOWL_NET\n");
			/* For now always map to pattern 0, no API to get
			 * correct information available at the moment.
			 */
			wakeup_data.pattern_idx = 0;
		}
		if (wakeind & BRCMF_WOWL_PFN_FOUND) {
			brcmf_dbg(INFO, "WOWL Wake indicator: BRCMF_WOWL_PFN_FOUND\n");
			timeout = wait_event_timeout(cfg->wowl.nd_data_wait,
				cfg->wowl.nd_data_completed,
				BRCMF_ND_INFO_TIMEOUT);
			if (!timeout)
				brcmf_err("No result for wowl net detect\n");
			else
				wakeup_data.net_detect = cfg->wowl.nd_info;
		}
3548 3549 3550 3551
		if (wakeind & BRCMF_WOWL_GTK_FAILURE) {
			brcmf_dbg(INFO, "WOWL Wake indicator: BRCMF_WOWL_GTK_FAILURE\n");
			wakeup_data.gtk_rekey_failure = true;
		}
3552 3553 3554 3555 3556 3557 3558 3559 3560 3561 3562 3563 3564 3565 3566 3567 3568 3569 3570 3571 3572 3573 3574 3575 3576 3577
	} else {
		wakeup = NULL;
	}
	cfg80211_report_wowlan_wakeup(&ifp->vif->wdev, wakeup, GFP_KERNEL);
}

#else

static void brcmf_report_wowl_wakeind(struct wiphy *wiphy, struct brcmf_if *ifp)
{
}

#endif /* CONFIG_PM */

static s32 brcmf_cfg80211_resume(struct wiphy *wiphy)
{
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
	struct net_device *ndev = cfg_to_ndev(cfg);
	struct brcmf_if *ifp = netdev_priv(ndev);

	brcmf_dbg(TRACE, "Enter\n");

	if (cfg->wowl.active) {
		brcmf_report_wowl_wakeind(wiphy, ifp);
		brcmf_fil_iovar_int_set(ifp, "wowl_clear", 0);
		brcmf_config_wowl_pattern(ifp, "clr", NULL, 0, NULL, 0);
3578 3579
		if (!brcmf_feat_is_enabled(ifp, BRCMF_FEAT_WOWL_ARP_ND))
			brcmf_configure_arp_nd_offload(ifp, true);
3580
		brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_PM,
3581 3582 3583
				      cfg->wowl.pre_pmmode);
		cfg->wowl.active = false;
		if (cfg->wowl.nd_enabled) {
3584
			brcmf_cfg80211_sched_scan_stop(cfg->wiphy, ifp->ndev, 0);
3585 3586 3587 3588 3589
			brcmf_fweh_unregister(cfg->pub, BRCMF_E_PFN_NET_FOUND);
			brcmf_fweh_register(cfg->pub, BRCMF_E_PFN_NET_FOUND,
					    brcmf_notify_sched_scan_results);
			cfg->wowl.nd_enabled = false;
		}
3590
	}
3591 3592 3593
	return 0;
}

3594 3595 3596 3597 3598
static void brcmf_configure_wowl(struct brcmf_cfg80211_info *cfg,
				 struct brcmf_if *ifp,
				 struct cfg80211_wowlan *wowl)
{
	u32 wowl_config;
3599
	struct brcmf_wowl_wakeind_le wowl_wakeind;
3600
	u32 i;
3601 3602 3603

	brcmf_dbg(TRACE, "Suspend, wowl config.\n");

3604 3605
	if (!brcmf_feat_is_enabled(ifp, BRCMF_FEAT_WOWL_ARP_ND))
		brcmf_configure_arp_nd_offload(ifp, false);
3606
	brcmf_fil_cmd_int_get(ifp, BRCMF_C_GET_PM, &cfg->wowl.pre_pmmode);
3607 3608 3609 3610
	brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_PM, PM_MAX);

	wowl_config = 0;
	if (wowl->disconnect)
3611
		wowl_config = BRCMF_WOWL_DIS | BRCMF_WOWL_BCN | BRCMF_WOWL_RETR;
3612
	if (wowl->magic_pkt)
3613 3614 3615 3616 3617 3618 3619 3620 3621 3622 3623
		wowl_config |= BRCMF_WOWL_MAGIC;
	if ((wowl->patterns) && (wowl->n_patterns)) {
		wowl_config |= BRCMF_WOWL_NET;
		for (i = 0; i < wowl->n_patterns; i++) {
			brcmf_config_wowl_pattern(ifp, "add",
				(u8 *)wowl->patterns[i].pattern,
				wowl->patterns[i].pattern_len,
				(u8 *)wowl->patterns[i].mask,
				wowl->patterns[i].pkt_offset);
		}
	}
3624 3625 3626 3627 3628 3629 3630 3631 3632 3633 3634 3635
	if (wowl->nd_config) {
		brcmf_cfg80211_sched_scan_start(cfg->wiphy, ifp->ndev,
						wowl->nd_config);
		wowl_config |= BRCMF_WOWL_PFN_FOUND;

		cfg->wowl.nd_data_completed = false;
		cfg->wowl.nd_enabled = true;
		/* Now reroute the event for PFN to the wowl function. */
		brcmf_fweh_unregister(cfg->pub, BRCMF_E_PFN_NET_FOUND);
		brcmf_fweh_register(cfg->pub, BRCMF_E_PFN_NET_FOUND,
				    brcmf_wowl_nd_results);
	}
3636 3637
	if (wowl->gtk_rekey_failure)
		wowl_config |= BRCMF_WOWL_GTK_FAILURE;
3638 3639 3640
	if (!test_bit(BRCMF_VIF_STATUS_CONNECTED, &ifp->vif->sme_state))
		wowl_config |= BRCMF_WOWL_UNASSOC;

3641 3642 3643
	memcpy(&wowl_wakeind, "clear", 6);
	brcmf_fil_iovar_data_set(ifp, "wowl_wakeind", &wowl_wakeind,
				 sizeof(wowl_wakeind));
3644 3645 3646
	brcmf_fil_iovar_int_set(ifp, "wowl", wowl_config);
	brcmf_fil_iovar_int_set(ifp, "wowl_activate", 1);
	brcmf_bus_wowl_config(cfg->pub->bus_if, true);
3647
	cfg->wowl.active = true;
3648 3649
}

3650
static s32 brcmf_cfg80211_suspend(struct wiphy *wiphy,
3651
				  struct cfg80211_wowlan *wowl)
3652
{
3653 3654
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
	struct net_device *ndev = cfg_to_ndev(cfg);
3655
	struct brcmf_if *ifp = netdev_priv(ndev);
3656
	struct brcmf_cfg80211_vif *vif;
3657

3658
	brcmf_dbg(TRACE, "Enter\n");
3659

3660
	/* if the primary net_device is not READY there is nothing
3661
	 * we can do but pray resume goes smoothly.
3662
	 */
3663
	if (!check_vif_up(ifp->vif))
3664
		goto exit;
3665

3666 3667
	/* Stop scheduled scan */
	if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_PNO))
3668
		brcmf_cfg80211_sched_scan_stop(wiphy, ndev, 0);
3669

3670 3671
	/* end any scanning */
	if (test_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status))
3672
		brcmf_abort_scanning(cfg);
3673

3674 3675 3676 3677 3678 3679 3680 3681 3682
	if (wowl == NULL) {
		brcmf_bus_wowl_config(cfg->pub->bus_if, false);
		list_for_each_entry(vif, &cfg->vif_list, list) {
			if (!test_bit(BRCMF_VIF_STATUS_READY, &vif->sme_state))
				continue;
			/* While going to suspend if associated with AP
			 * disassociate from AP to save power while system is
			 * in suspended state
			 */
3683
			brcmf_link_down(vif, WLAN_REASON_UNSPECIFIED);
3684 3685
			/* Make sure WPA_Supplicant receives all the event
			 * generated due to DISASSOC call to the fw to keep
3686 3687 3688
			 * the state fw and WPA_Supplicant state consistent
			 */
			brcmf_delay(500);
3689
		}
3690 3691
		/* Configure MPC */
		brcmf_set_mpc(ifp, 1);
3692 3693

	} else {
3694 3695
		/* Configure WOWL paramaters */
		brcmf_configure_wowl(cfg, ifp, wowl);
3696 3697
	}

3698 3699 3700 3701
exit:
	brcmf_dbg(TRACE, "Exit\n");
	/* clear any scanning activity */
	cfg->scan_status = 0;
3702 3703 3704
	return 0;
}

3705 3706
static __used s32
brcmf_update_pmklist(struct brcmf_cfg80211_info *cfg, struct brcmf_if *ifp)
3707
{
3708
	struct brcmf_pmk_list_le *pmk_list;
3709
	int i;
3710 3711
	u32 npmk;
	s32 err;
3712

3713 3714
	pmk_list = &cfg->pmk_list;
	npmk = le32_to_cpu(pmk_list->npmk);
3715

3716 3717 3718
	brcmf_dbg(CONN, "No of elements %d\n", npmk);
	for (i = 0; i < npmk; i++)
		brcmf_dbg(CONN, "PMK[%d]: %pM\n", i, &pmk_list->pmk[i].bssid);
3719

3720 3721
	err = brcmf_fil_iovar_data_set(ifp, "pmkid_info", pmk_list,
				       sizeof(*pmk_list));
3722 3723

	return err;
3724 3725
}

3726 3727 3728
static s32
brcmf_cfg80211_set_pmksa(struct wiphy *wiphy, struct net_device *ndev,
			 struct cfg80211_pmksa *pmksa)
3729
{
3730
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
3731
	struct brcmf_if *ifp = netdev_priv(ndev);
3732 3733 3734
	struct brcmf_pmksa *pmk = &cfg->pmk_list.pmk[0];
	s32 err;
	u32 npmk, i;
3735

3736 3737 3738
	brcmf_dbg(TRACE, "Enter\n");
	if (!check_vif_up(ifp->vif))
		return -EIO;
3739

3740 3741 3742 3743 3744 3745 3746 3747 3748 3749 3750 3751 3752
	npmk = le32_to_cpu(cfg->pmk_list.npmk);
	for (i = 0; i < npmk; i++)
		if (!memcmp(pmksa->bssid, pmk[i].bssid, ETH_ALEN))
			break;
	if (i < BRCMF_MAXPMKID) {
		memcpy(pmk[i].bssid, pmksa->bssid, ETH_ALEN);
		memcpy(pmk[i].pmkid, pmksa->pmkid, WLAN_PMKID_LEN);
		if (i == npmk) {
			npmk++;
			cfg->pmk_list.npmk = cpu_to_le32(npmk);
		}
	} else {
		brcmf_err("Too many PMKSA entries cached %d\n", npmk);
3753 3754 3755
		return -EINVAL;
	}

3756 3757 3758 3759 3760
	brcmf_dbg(CONN, "set_pmksa - PMK bssid: %pM =\n", pmk[npmk].bssid);
	for (i = 0; i < WLAN_PMKID_LEN; i += 4)
		brcmf_dbg(CONN, "%02x %02x %02x %02x\n", pmk[npmk].pmkid[i],
			  pmk[npmk].pmkid[i + 1], pmk[npmk].pmkid[i + 2],
			  pmk[npmk].pmkid[i + 3]);
3761

3762
	err = brcmf_update_pmklist(cfg, ifp);
3763

3764 3765 3766
	brcmf_dbg(TRACE, "Exit\n");
	return err;
}
3767

3768 3769 3770 3771 3772 3773 3774 3775 3776
static s32
brcmf_cfg80211_del_pmksa(struct wiphy *wiphy, struct net_device *ndev,
			 struct cfg80211_pmksa *pmksa)
{
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
	struct brcmf_if *ifp = netdev_priv(ndev);
	struct brcmf_pmksa *pmk = &cfg->pmk_list.pmk[0];
	s32 err;
	u32 npmk, i;
3777

3778 3779 3780
	brcmf_dbg(TRACE, "Enter\n");
	if (!check_vif_up(ifp->vif))
		return -EIO;
3781

3782
	brcmf_dbg(CONN, "del_pmksa - PMK bssid = %pM\n", pmksa->bssid);
3783

3784 3785
	npmk = le32_to_cpu(cfg->pmk_list.npmk);
	for (i = 0; i < npmk; i++)
3786
		if (!memcmp(pmksa->bssid, pmk[i].bssid, ETH_ALEN))
3787 3788 3789 3790 3791 3792 3793
			break;

	if ((npmk > 0) && (i < npmk)) {
		for (; i < (npmk - 1); i++) {
			memcpy(&pmk[i].bssid, &pmk[i + 1].bssid, ETH_ALEN);
			memcpy(&pmk[i].pmkid, &pmk[i + 1].pmkid,
			       WLAN_PMKID_LEN);
3794
		}
3795 3796
		memset(&pmk[i], 0, sizeof(*pmk));
		cfg->pmk_list.npmk = cpu_to_le32(npmk - 1);
3797
	} else {
3798
		brcmf_err("Cache entry not found\n");
3799 3800 3801
		return -EINVAL;
	}

3802 3803 3804 3805 3806
	err = brcmf_update_pmklist(cfg, ifp);

	brcmf_dbg(TRACE, "Exit\n");
	return err;

3807 3808
}

3809 3810
static s32
brcmf_cfg80211_flush_pmksa(struct wiphy *wiphy, struct net_device *ndev)
3811
{
3812
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
3813 3814 3815 3816 3817 3818 3819 3820 3821 3822 3823 3824
	struct brcmf_if *ifp = netdev_priv(ndev);
	s32 err;

	brcmf_dbg(TRACE, "Enter\n");
	if (!check_vif_up(ifp->vif))
		return -EIO;

	memset(&cfg->pmk_list, 0, sizeof(cfg->pmk_list));
	err = brcmf_update_pmklist(cfg, ifp);

	brcmf_dbg(TRACE, "Exit\n");
	return err;
3825 3826 3827

}

3828
static s32 brcmf_configure_opensecurity(struct brcmf_if *ifp)
3829 3830
{
	s32 err;
3831
	s32 wpa_val;
3832 3833

	/* set auth */
3834
	err = brcmf_fil_bsscfg_int_set(ifp, "auth", 0);
3835
	if (err < 0) {
3836
		brcmf_err("auth error %d\n", err);
3837 3838 3839
		return err;
	}
	/* set wsec */
3840
	err = brcmf_fil_bsscfg_int_set(ifp, "wsec", 0);
3841
	if (err < 0) {
3842
		brcmf_err("wsec error %d\n", err);
3843 3844 3845
		return err;
	}
	/* set upper-layer auth */
3846 3847 3848 3849 3850
	if (brcmf_is_ibssmode(ifp->vif))
		wpa_val = WPA_AUTH_NONE;
	else
		wpa_val = WPA_AUTH_DISABLED;
	err = brcmf_fil_bsscfg_int_set(ifp, "wpa_auth", wpa_val);
3851
	if (err < 0) {
3852
		brcmf_err("wpa_auth error %d\n", err);
3853 3854 3855 3856 3857 3858 3859 3860 3861 3862 3863 3864 3865 3866 3867
		return err;
	}

	return 0;
}

static bool brcmf_valid_wpa_oui(u8 *oui, bool is_rsn_ie)
{
	if (is_rsn_ie)
		return (memcmp(oui, RSN_OUI, TLV_OUI_LEN) == 0);

	return (memcmp(oui, WPA_OUI, TLV_OUI_LEN) == 0);
}

static s32
3868
brcmf_configure_wpaie(struct brcmf_if *ifp,
3869 3870
		      const struct brcmf_vs_tlv *wpa_ie,
		      bool is_rsn_ie)
3871 3872 3873 3874
{
	u32 auth = 0; /* d11 open authentication */
	u16 count;
	s32 err = 0;
3875
	s32 len;
3876 3877 3878 3879 3880 3881 3882 3883 3884
	u32 i;
	u32 wsec;
	u32 pval = 0;
	u32 gval = 0;
	u32 wpa_auth = 0;
	u32 offset;
	u8 *data;
	u16 rsn_cap;
	u32 wme_bss_disable;
3885
	u32 mfp;
3886

3887
	brcmf_dbg(TRACE, "Enter\n");
3888 3889 3890 3891 3892
	if (wpa_ie == NULL)
		goto exit;

	len = wpa_ie->len + TLV_HDR_LEN;
	data = (u8 *)wpa_ie;
3893
	offset = TLV_HDR_LEN;
3894 3895
	if (!is_rsn_ie)
		offset += VS_IE_FIXED_HDR_LEN;
3896 3897
	else
		offset += WPA_IE_VERSION_LEN;
3898 3899 3900 3901

	/* check for multicast cipher suite */
	if (offset + WPA_IE_MIN_OUI_LEN > len) {
		err = -EINVAL;
3902
		brcmf_err("no multicast cipher suite\n");
3903 3904 3905 3906 3907
		goto exit;
	}

	if (!brcmf_valid_wpa_oui(&data[offset], is_rsn_ie)) {
		err = -EINVAL;
3908
		brcmf_err("ivalid OUI\n");
3909 3910 3911 3912 3913 3914 3915 3916 3917 3918 3919 3920 3921 3922 3923 3924 3925 3926 3927 3928 3929
		goto exit;
	}
	offset += TLV_OUI_LEN;

	/* pick up multicast cipher */
	switch (data[offset]) {
	case WPA_CIPHER_NONE:
		gval = 0;
		break;
	case WPA_CIPHER_WEP_40:
	case WPA_CIPHER_WEP_104:
		gval = WEP_ENABLED;
		break;
	case WPA_CIPHER_TKIP:
		gval = TKIP_ENABLED;
		break;
	case WPA_CIPHER_AES_CCM:
		gval = AES_ENABLED;
		break;
	default:
		err = -EINVAL;
3930
		brcmf_err("Invalid multi cast cipher info\n");
3931 3932 3933 3934 3935 3936 3937 3938 3939 3940
		goto exit;
	}

	offset++;
	/* walk thru unicast cipher list and pick up what we recognize */
	count = data[offset] + (data[offset + 1] << 8);
	offset += WPA_IE_SUITE_COUNT_LEN;
	/* Check for unicast suite(s) */
	if (offset + (WPA_IE_MIN_OUI_LEN * count) > len) {
		err = -EINVAL;
3941
		brcmf_err("no unicast cipher suite\n");
3942 3943 3944 3945 3946
		goto exit;
	}
	for (i = 0; i < count; i++) {
		if (!brcmf_valid_wpa_oui(&data[offset], is_rsn_ie)) {
			err = -EINVAL;
3947
			brcmf_err("ivalid OUI\n");
3948 3949 3950 3951 3952 3953 3954 3955 3956 3957 3958 3959 3960 3961 3962 3963 3964
			goto exit;
		}
		offset += TLV_OUI_LEN;
		switch (data[offset]) {
		case WPA_CIPHER_NONE:
			break;
		case WPA_CIPHER_WEP_40:
		case WPA_CIPHER_WEP_104:
			pval |= WEP_ENABLED;
			break;
		case WPA_CIPHER_TKIP:
			pval |= TKIP_ENABLED;
			break;
		case WPA_CIPHER_AES_CCM:
			pval |= AES_ENABLED;
			break;
		default:
3965
			brcmf_err("Invalid unicast security info\n");
3966 3967 3968 3969 3970 3971 3972 3973 3974
		}
		offset++;
	}
	/* walk thru auth management suite list and pick up what we recognize */
	count = data[offset] + (data[offset + 1] << 8);
	offset += WPA_IE_SUITE_COUNT_LEN;
	/* Check for auth key management suite(s) */
	if (offset + (WPA_IE_MIN_OUI_LEN * count) > len) {
		err = -EINVAL;
3975
		brcmf_err("no auth key mgmt suite\n");
3976 3977 3978 3979 3980
		goto exit;
	}
	for (i = 0; i < count; i++) {
		if (!brcmf_valid_wpa_oui(&data[offset], is_rsn_ie)) {
			err = -EINVAL;
3981
			brcmf_err("ivalid OUI\n");
3982 3983 3984 3985 3986
			goto exit;
		}
		offset += TLV_OUI_LEN;
		switch (data[offset]) {
		case RSN_AKM_NONE:
3987
			brcmf_dbg(TRACE, "RSN_AKM_NONE\n");
3988 3989 3990
			wpa_auth |= WPA_AUTH_NONE;
			break;
		case RSN_AKM_UNSPECIFIED:
3991
			brcmf_dbg(TRACE, "RSN_AKM_UNSPECIFIED\n");
3992 3993 3994 3995
			is_rsn_ie ? (wpa_auth |= WPA2_AUTH_UNSPECIFIED) :
				    (wpa_auth |= WPA_AUTH_UNSPECIFIED);
			break;
		case RSN_AKM_PSK:
3996
			brcmf_dbg(TRACE, "RSN_AKM_PSK\n");
3997 3998 3999
			is_rsn_ie ? (wpa_auth |= WPA2_AUTH_PSK) :
				    (wpa_auth |= WPA_AUTH_PSK);
			break;
4000 4001 4002 4003 4004 4005 4006 4007
		case RSN_AKM_SHA256_PSK:
			brcmf_dbg(TRACE, "RSN_AKM_MFP_PSK\n");
			wpa_auth |= WPA2_AUTH_PSK_SHA256;
			break;
		case RSN_AKM_SHA256_1X:
			brcmf_dbg(TRACE, "RSN_AKM_MFP_1X\n");
			wpa_auth |= WPA2_AUTH_1X_SHA256;
			break;
4008
		default:
4009
			brcmf_err("Invalid key mgmt info\n");
4010 4011 4012 4013
		}
		offset++;
	}

4014
	mfp = BRCMF_MFP_NONE;
4015 4016 4017 4018 4019 4020
	if (is_rsn_ie) {
		wme_bss_disable = 1;
		if ((offset + RSN_CAP_LEN) <= len) {
			rsn_cap = data[offset] + (data[offset + 1] << 8);
			if (rsn_cap & RSN_CAP_PTK_REPLAY_CNTR_MASK)
				wme_bss_disable = 0;
4021 4022 4023 4024 4025 4026 4027 4028 4029 4030 4031 4032 4033 4034 4035 4036 4037 4038 4039 4040 4041 4042 4043 4044
			if (rsn_cap & RSN_CAP_MFPR_MASK) {
				brcmf_dbg(TRACE, "MFP Required\n");
				mfp = BRCMF_MFP_REQUIRED;
				/* Firmware only supports mfp required in
				 * combination with WPA2_AUTH_PSK_SHA256 or
				 * WPA2_AUTH_1X_SHA256.
				 */
				if (!(wpa_auth & (WPA2_AUTH_PSK_SHA256 |
						  WPA2_AUTH_1X_SHA256))) {
					err = -EINVAL;
					goto exit;
				}
				/* Firmware has requirement that WPA2_AUTH_PSK/
				 * WPA2_AUTH_UNSPECIFIED be set, if SHA256 OUI
				 * is to be included in the rsn ie.
				 */
				if (wpa_auth & WPA2_AUTH_PSK_SHA256)
					wpa_auth |= WPA2_AUTH_PSK;
				else if (wpa_auth & WPA2_AUTH_1X_SHA256)
					wpa_auth |= WPA2_AUTH_UNSPECIFIED;
			} else if (rsn_cap & RSN_CAP_MFPC_MASK) {
				brcmf_dbg(TRACE, "MFP Capable\n");
				mfp = BRCMF_MFP_CAPABLE;
			}
4045
		}
4046
		offset += RSN_CAP_LEN;
4047
		/* set wme_bss_disable to sync RSN Capabilities */
4048
		err = brcmf_fil_bsscfg_int_set(ifp, "wme_bss_disable",
4049
					       wme_bss_disable);
4050
		if (err < 0) {
4051
			brcmf_err("wme_bss_disable error %d\n", err);
4052 4053
			goto exit;
		}
4054 4055 4056 4057 4058 4059 4060 4061 4062 4063 4064 4065 4066 4067 4068

		/* Skip PMKID cnt as it is know to be 0 for AP. */
		offset += RSN_PMKID_COUNT_LEN;

		/* See if there is BIP wpa suite left for MFP */
		if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MFP) &&
		    ((offset + WPA_IE_MIN_OUI_LEN) <= len)) {
			err = brcmf_fil_bsscfg_data_set(ifp, "bip",
							&data[offset],
							WPA_IE_MIN_OUI_LEN);
			if (err < 0) {
				brcmf_err("bip error %d\n", err);
				goto exit;
			}
		}
4069 4070 4071 4072 4073
	}
	/* FOR WPS , set SES_OW_ENABLED */
	wsec = (pval | gval | SES_OW_ENABLED);

	/* set auth */
4074
	err = brcmf_fil_bsscfg_int_set(ifp, "auth", auth);
4075
	if (err < 0) {
4076
		brcmf_err("auth error %d\n", err);
4077 4078 4079
		goto exit;
	}
	/* set wsec */
4080
	err = brcmf_fil_bsscfg_int_set(ifp, "wsec", wsec);
4081
	if (err < 0) {
4082
		brcmf_err("wsec error %d\n", err);
4083 4084
		goto exit;
	}
4085 4086 4087 4088 4089 4090 4091 4092 4093 4094
	/* Configure MFP, this needs to go after wsec otherwise the wsec command
	 * will overwrite the values set by MFP
	 */
	if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MFP)) {
		err = brcmf_fil_bsscfg_int_set(ifp, "mfp", mfp);
		if (err < 0) {
			brcmf_err("mfp error %d\n", err);
			goto exit;
		}
	}
4095
	/* set upper-layer auth */
4096
	err = brcmf_fil_bsscfg_int_set(ifp, "wpa_auth", wpa_auth);
4097
	if (err < 0) {
4098
		brcmf_err("wpa_auth error %d\n", err);
4099 4100 4101 4102 4103 4104 4105 4106
		goto exit;
	}

exit:
	return err;
}

static s32
4107
brcmf_parse_vndr_ies(const u8 *vndr_ie_buf, u32 vndr_ie_len,
4108 4109 4110 4111 4112 4113 4114 4115 4116 4117 4118 4119 4120 4121 4122 4123 4124
		     struct parsed_vndr_ies *vndr_ies)
{
	struct brcmf_vs_tlv *vndrie;
	struct brcmf_tlv *ie;
	struct parsed_vndr_ie_info *parsed_info;
	s32 remaining_len;

	remaining_len = (s32)vndr_ie_len;
	memset(vndr_ies, 0, sizeof(*vndr_ies));

	ie = (struct brcmf_tlv *)vndr_ie_buf;
	while (ie) {
		if (ie->id != WLAN_EID_VENDOR_SPECIFIC)
			goto next;
		vndrie = (struct brcmf_vs_tlv *)ie;
		/* len should be bigger than OUI length + one */
		if (vndrie->len < (VS_IE_FIXED_HDR_LEN - TLV_HDR_LEN + 1)) {
4125 4126
			brcmf_err("invalid vndr ie. length is too small %d\n",
				  vndrie->len);
4127 4128 4129 4130 4131 4132
			goto next;
		}
		/* if wpa or wme ie, do not add ie */
		if (!memcmp(vndrie->oui, (u8 *)WPA_OUI, TLV_OUI_LEN) &&
		    ((vndrie->oui_type == WPA_OUI_TYPE) ||
		    (vndrie->oui_type == WME_OUI_TYPE))) {
4133
			brcmf_dbg(TRACE, "Found WPA/WME oui. Do not add it\n");
4134 4135 4136 4137 4138 4139 4140 4141 4142 4143 4144 4145
			goto next;
		}

		parsed_info = &vndr_ies->ie_info[vndr_ies->count];

		/* save vndr ie information */
		parsed_info->ie_ptr = (char *)vndrie;
		parsed_info->ie_len = vndrie->len + TLV_HDR_LEN;
		memcpy(&parsed_info->vndrie, vndrie, sizeof(*vndrie));

		vndr_ies->count++;

4146 4147 4148 4149 4150
		brcmf_dbg(TRACE, "** OUI %02x %02x %02x, type 0x%02x\n",
			  parsed_info->vndrie.oui[0],
			  parsed_info->vndrie.oui[1],
			  parsed_info->vndrie.oui[2],
			  parsed_info->vndrie.oui_type);
4151

4152
		if (vndr_ies->count >= VNDR_IE_PARSE_LIMIT)
4153 4154
			break;
next:
4155 4156
		remaining_len -= (ie->len + TLV_HDR_LEN);
		if (remaining_len <= TLV_HDR_LEN)
4157 4158
			ie = NULL;
		else
4159 4160
			ie = (struct brcmf_tlv *)(((u8 *)ie) + ie->len +
				TLV_HDR_LEN);
4161
	}
4162
	return 0;
4163 4164 4165 4166 4167 4168 4169 4170 4171
}

static u32
brcmf_vndr_ie(u8 *iebuf, s32 pktflag, u8 *ie_ptr, u32 ie_len, s8 *add_del_cmd)
{

	strncpy(iebuf, add_del_cmd, VNDR_IE_CMD_LEN - 1);
	iebuf[VNDR_IE_CMD_LEN - 1] = '\0';

4172
	put_unaligned_le32(1, &iebuf[VNDR_IE_COUNT_OFFSET]);
4173

4174
	put_unaligned_le32(pktflag, &iebuf[VNDR_IE_PKTFLAG_OFFSET]);
4175 4176 4177 4178 4179 4180

	memcpy(&iebuf[VNDR_IE_VSIE_OFFSET], ie_ptr, ie_len);

	return ie_len + VNDR_IE_HDR_SIZE;
}

4181 4182
s32 brcmf_vif_set_mgmt_ie(struct brcmf_cfg80211_vif *vif, s32 pktflag,
			  const u8 *vndr_ie_buf, u32 vndr_ie_len)
4183
{
4184 4185
	struct brcmf_if *ifp;
	struct vif_saved_ie *saved_ie;
4186 4187 4188 4189
	s32 err = 0;
	u8  *iovar_ie_buf;
	u8  *curr_ie_buf;
	u8  *mgmt_ie_buf = NULL;
4190
	int mgmt_ie_buf_len;
4191
	u32 *mgmt_ie_len;
4192 4193 4194 4195 4196 4197 4198 4199
	u32 del_add_ie_buf_len = 0;
	u32 total_ie_buf_len = 0;
	u32 parsed_ie_buf_len = 0;
	struct parsed_vndr_ies old_vndr_ies;
	struct parsed_vndr_ies new_vndr_ies;
	struct parsed_vndr_ie_info *vndrie_info;
	s32 i;
	u8 *ptr;
4200
	int remained_buf_len;
4201

4202 4203 4204 4205 4206
	if (!vif)
		return -ENODEV;
	ifp = vif->ifp;
	saved_ie = &vif->saved_ie;

4207 4208
	brcmf_dbg(TRACE, "bsscfgidx %d, pktflag : 0x%02X\n", ifp->bsscfgidx,
		  pktflag);
4209 4210 4211 4212
	iovar_ie_buf = kzalloc(WL_EXTRA_BUF_MAX, GFP_KERNEL);
	if (!iovar_ie_buf)
		return -ENOMEM;
	curr_ie_buf = iovar_ie_buf;
4213 4214 4215 4216 4217 4218 4219 4220 4221 4222 4223 4224 4225 4226 4227 4228 4229 4230 4231 4232 4233 4234 4235 4236 4237
	switch (pktflag) {
	case BRCMF_VNDR_IE_PRBREQ_FLAG:
		mgmt_ie_buf = saved_ie->probe_req_ie;
		mgmt_ie_len = &saved_ie->probe_req_ie_len;
		mgmt_ie_buf_len = sizeof(saved_ie->probe_req_ie);
		break;
	case BRCMF_VNDR_IE_PRBRSP_FLAG:
		mgmt_ie_buf = saved_ie->probe_res_ie;
		mgmt_ie_len = &saved_ie->probe_res_ie_len;
		mgmt_ie_buf_len = sizeof(saved_ie->probe_res_ie);
		break;
	case BRCMF_VNDR_IE_BEACON_FLAG:
		mgmt_ie_buf = saved_ie->beacon_ie;
		mgmt_ie_len = &saved_ie->beacon_ie_len;
		mgmt_ie_buf_len = sizeof(saved_ie->beacon_ie);
		break;
	case BRCMF_VNDR_IE_ASSOCREQ_FLAG:
		mgmt_ie_buf = saved_ie->assoc_req_ie;
		mgmt_ie_len = &saved_ie->assoc_req_ie_len;
		mgmt_ie_buf_len = sizeof(saved_ie->assoc_req_ie);
		break;
	default:
		err = -EPERM;
		brcmf_err("not suitable type\n");
		goto exit;
4238 4239 4240 4241
	}

	if (vndr_ie_len > mgmt_ie_buf_len) {
		err = -ENOMEM;
4242
		brcmf_err("extra IE size too big\n");
4243 4244 4245 4246 4247 4248 4249 4250 4251 4252 4253 4254 4255 4256 4257
		goto exit;
	}

	/* parse and save new vndr_ie in curr_ie_buff before comparing it */
	if (vndr_ie_buf && vndr_ie_len && curr_ie_buf) {
		ptr = curr_ie_buf;
		brcmf_parse_vndr_ies(vndr_ie_buf, vndr_ie_len, &new_vndr_ies);
		for (i = 0; i < new_vndr_ies.count; i++) {
			vndrie_info = &new_vndr_ies.ie_info[i];
			memcpy(ptr + parsed_ie_buf_len, vndrie_info->ie_ptr,
			       vndrie_info->ie_len);
			parsed_ie_buf_len += vndrie_info->ie_len;
		}
	}

4258
	if (mgmt_ie_buf && *mgmt_ie_len) {
4259 4260 4261
		if (parsed_ie_buf_len && (parsed_ie_buf_len == *mgmt_ie_len) &&
		    (memcmp(mgmt_ie_buf, curr_ie_buf,
			    parsed_ie_buf_len) == 0)) {
4262
			brcmf_dbg(TRACE, "Previous mgmt IE equals to current IE\n");
4263 4264 4265 4266 4267 4268 4269 4270 4271 4272
			goto exit;
		}

		/* parse old vndr_ie */
		brcmf_parse_vndr_ies(mgmt_ie_buf, *mgmt_ie_len, &old_vndr_ies);

		/* make a command to delete old ie */
		for (i = 0; i < old_vndr_ies.count; i++) {
			vndrie_info = &old_vndr_ies.ie_info[i];

4273 4274 4275 4276 4277 4278
			brcmf_dbg(TRACE, "DEL ID : %d, Len: %d , OUI:%02x:%02x:%02x\n",
				  vndrie_info->vndrie.id,
				  vndrie_info->vndrie.len,
				  vndrie_info->vndrie.oui[0],
				  vndrie_info->vndrie.oui[1],
				  vndrie_info->vndrie.oui[2]);
4279 4280 4281 4282 4283 4284 4285 4286 4287 4288 4289 4290 4291 4292 4293 4294 4295 4296 4297 4298 4299

			del_add_ie_buf_len = brcmf_vndr_ie(curr_ie_buf, pktflag,
							   vndrie_info->ie_ptr,
							   vndrie_info->ie_len,
							   "del");
			curr_ie_buf += del_add_ie_buf_len;
			total_ie_buf_len += del_add_ie_buf_len;
		}
	}

	*mgmt_ie_len = 0;
	/* Add if there is any extra IE */
	if (mgmt_ie_buf && parsed_ie_buf_len) {
		ptr = mgmt_ie_buf;

		remained_buf_len = mgmt_ie_buf_len;

		/* make a command to add new ie */
		for (i = 0; i < new_vndr_ies.count; i++) {
			vndrie_info = &new_vndr_ies.ie_info[i];

4300 4301 4302
			/* verify remained buf size before copy data */
			if (remained_buf_len < (vndrie_info->vndrie.len +
							VNDR_IE_VSIE_OFFSET)) {
4303 4304
				brcmf_err("no space in mgmt_ie_buf: len left %d",
					  remained_buf_len);
4305 4306 4307 4308 4309
				break;
			}
			remained_buf_len -= (vndrie_info->ie_len +
					     VNDR_IE_VSIE_OFFSET);

4310 4311 4312 4313 4314 4315
			brcmf_dbg(TRACE, "ADDED ID : %d, Len: %d, OUI:%02x:%02x:%02x\n",
				  vndrie_info->vndrie.id,
				  vndrie_info->vndrie.len,
				  vndrie_info->vndrie.oui[0],
				  vndrie_info->vndrie.oui[1],
				  vndrie_info->vndrie.oui[2]);
4316 4317 4318 4319 4320 4321 4322 4323 4324 4325 4326 4327 4328 4329 4330 4331

			del_add_ie_buf_len = brcmf_vndr_ie(curr_ie_buf, pktflag,
							   vndrie_info->ie_ptr,
							   vndrie_info->ie_len,
							   "add");

			/* save the parsed IE in wl struct */
			memcpy(ptr + (*mgmt_ie_len), vndrie_info->ie_ptr,
			       vndrie_info->ie_len);
			*mgmt_ie_len += vndrie_info->ie_len;

			curr_ie_buf += del_add_ie_buf_len;
			total_ie_buf_len += del_add_ie_buf_len;
		}
	}
	if (total_ie_buf_len) {
4332
		err  = brcmf_fil_bsscfg_data_set(ifp, "vndr_ie", iovar_ie_buf,
4333
						 total_ie_buf_len);
4334
		if (err)
4335
			brcmf_err("vndr ie set error : %d\n", err);
4336 4337 4338 4339 4340 4341 4342
	}

exit:
	kfree(iovar_ie_buf);
	return err;
}

4343 4344 4345 4346 4347 4348 4349 4350 4351 4352 4353 4354 4355 4356 4357 4358
s32 brcmf_vif_clear_mgmt_ies(struct brcmf_cfg80211_vif *vif)
{
	s32 pktflags[] = {
		BRCMF_VNDR_IE_PRBREQ_FLAG,
		BRCMF_VNDR_IE_PRBRSP_FLAG,
		BRCMF_VNDR_IE_BEACON_FLAG
	};
	int i;

	for (i = 0; i < ARRAY_SIZE(pktflags); i++)
		brcmf_vif_set_mgmt_ie(vif, pktflags[i], NULL, 0);

	memset(&vif->saved_ie, 0, sizeof(vif->saved_ie));
	return 0;
}

4359 4360 4361 4362 4363 4364 4365 4366 4367 4368 4369 4370 4371 4372 4373 4374 4375 4376 4377 4378 4379 4380 4381 4382 4383 4384 4385
static s32
brcmf_config_ap_mgmt_ie(struct brcmf_cfg80211_vif *vif,
			struct cfg80211_beacon_data *beacon)
{
	s32 err;

	/* Set Beacon IEs to FW */
	err = brcmf_vif_set_mgmt_ie(vif, BRCMF_VNDR_IE_BEACON_FLAG,
				    beacon->tail, beacon->tail_len);
	if (err) {
		brcmf_err("Set Beacon IE Failed\n");
		return err;
	}
	brcmf_dbg(TRACE, "Applied Vndr IEs for Beacon\n");

	/* Set Probe Response IEs to FW */
	err = brcmf_vif_set_mgmt_ie(vif, BRCMF_VNDR_IE_PRBRSP_FLAG,
				    beacon->proberesp_ies,
				    beacon->proberesp_ies_len);
	if (err)
		brcmf_err("Set Probe Resp IE Failed\n");
	else
		brcmf_dbg(TRACE, "Applied Vndr IEs for Probe Resp\n");

	return err;
}

4386 4387 4388 4389 4390
static s32
brcmf_cfg80211_start_ap(struct wiphy *wiphy, struct net_device *ndev,
			struct cfg80211_ap_settings *settings)
{
	s32 ie_offset;
4391
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
4392
	struct brcmf_if *ifp = netdev_priv(ndev);
4393
	const struct brcmf_tlv *ssid_ie;
4394
	const struct brcmf_tlv *country_ie;
4395 4396
	struct brcmf_ssid_le ssid_le;
	s32 err = -EPERM;
4397 4398
	const struct brcmf_tlv *rsn_ie;
	const struct brcmf_vs_tlv *wpa_ie;
4399
	struct brcmf_join_params join_params;
4400 4401
	enum nl80211_iftype dev_role;
	struct brcmf_fil_bss_enable_le bss_enable;
4402
	u16 chanspec = chandef_to_chanspec(&cfg->d11inf, &settings->chandef);
4403
	bool mbss;
4404
	int is_11d;
4405
	bool supports_11d;
4406

4407 4408 4409
	brcmf_dbg(TRACE, "ctrlchn=%d, center=%d, bw=%d, beacon_interval=%d, dtim_period=%d,\n",
		  settings->chandef.chan->hw_value,
		  settings->chandef.center_freq1, settings->chandef.width,
4410
		  settings->beacon_interval, settings->dtim_period);
4411 4412 4413
	brcmf_dbg(TRACE, "ssid=%s(%zu), auth_type=%d, inactivity_timeout=%d\n",
		  settings->ssid, settings->ssid_len, settings->auth_type,
		  settings->inactivity_timeout);
4414
	dev_role = ifp->vif->wdev.iftype;
4415
	mbss = ifp->vif->mbss;
4416

4417
	/* store current 11d setting */
4418 4419
	if (brcmf_fil_cmd_int_get(ifp, BRCMF_C_GET_REGULATORY,
				  &ifp->vif->is_11d)) {
4420
		is_11d = supports_11d = false;
4421 4422 4423 4424 4425 4426 4427
	} else {
		country_ie = brcmf_parse_tlvs((u8 *)settings->beacon.tail,
					      settings->beacon.tail_len,
					      WLAN_EID_COUNTRY);
		is_11d = country_ie ? 1 : 0;
		supports_11d = true;
	}
4428

4429 4430 4431 4432 4433 4434 4435
	memset(&ssid_le, 0, sizeof(ssid_le));
	if (settings->ssid == NULL || settings->ssid_len == 0) {
		ie_offset = DOT11_MGMT_HDR_LEN + DOT11_BCN_PRB_FIXED_LEN;
		ssid_ie = brcmf_parse_tlvs(
				(u8 *)&settings->beacon.head[ie_offset],
				settings->beacon.head_len - ie_offset,
				WLAN_EID_SSID);
4436
		if (!ssid_ie || ssid_ie->len > IEEE80211_MAX_SSID_LEN)
4437 4438 4439 4440
			return -EINVAL;

		memcpy(ssid_le.SSID, ssid_ie->data, ssid_ie->len);
		ssid_le.SSID_len = cpu_to_le32(ssid_ie->len);
4441
		brcmf_dbg(TRACE, "SSID is (%s) in Head\n", ssid_le.SSID);
4442 4443 4444 4445 4446
	} else {
		memcpy(ssid_le.SSID, settings->ssid, settings->ssid_len);
		ssid_le.SSID_len = cpu_to_le32((u32)settings->ssid_len);
	}

4447 4448
	if (!mbss) {
		brcmf_set_mpc(ifp, 0);
4449
		brcmf_configure_arp_nd_offload(ifp, false);
4450
	}
4451 4452 4453 4454 4455 4456 4457 4458 4459 4460

	/* find the RSN_IE */
	rsn_ie = brcmf_parse_tlvs((u8 *)settings->beacon.tail,
				  settings->beacon.tail_len, WLAN_EID_RSN);

	/* find the WPA_IE */
	wpa_ie = brcmf_find_wpaie((u8 *)settings->beacon.tail,
				  settings->beacon.tail_len);

	if ((wpa_ie != NULL || rsn_ie != NULL)) {
4461
		brcmf_dbg(TRACE, "WPA(2) IE is found\n");
4462 4463
		if (wpa_ie != NULL) {
			/* WPA IE */
4464
			err = brcmf_configure_wpaie(ifp, wpa_ie, false);
4465 4466 4467
			if (err < 0)
				goto exit;
		} else {
4468 4469 4470 4471
			struct brcmf_vs_tlv *tmp_ie;

			tmp_ie = (struct brcmf_vs_tlv *)rsn_ie;

4472
			/* RSN IE */
4473
			err = brcmf_configure_wpaie(ifp, tmp_ie, true);
4474 4475 4476 4477
			if (err < 0)
				goto exit;
		}
	} else {
4478
		brcmf_dbg(TRACE, "No WPA(2) IEs found\n");
4479
		brcmf_configure_opensecurity(ifp);
4480 4481
	}

4482
	/* Parameters shared by all radio interfaces */
4483
	if (!mbss) {
4484
		if ((supports_11d) && (is_11d != ifp->vif->is_11d)) {
4485 4486 4487 4488 4489 4490 4491
			err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_REGULATORY,
						    is_11d);
			if (err < 0) {
				brcmf_err("Regulatory Set Error, %d\n", err);
				goto exit;
			}
		}
4492 4493 4494 4495 4496 4497 4498 4499 4500 4501 4502 4503 4504 4505 4506 4507
		if (settings->beacon_interval) {
			err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_BCNPRD,
						    settings->beacon_interval);
			if (err < 0) {
				brcmf_err("Beacon Interval Set Error, %d\n",
					  err);
				goto exit;
			}
		}
		if (settings->dtim_period) {
			err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_DTIMPRD,
						    settings->dtim_period);
			if (err < 0) {
				brcmf_err("DTIM Interval Set Error, %d\n", err);
				goto exit;
			}
4508
		}
4509

4510 4511 4512
		if ((dev_role == NL80211_IFTYPE_AP) &&
		    ((ifp->ifidx == 0) ||
		     !brcmf_feat_is_enabled(ifp, BRCMF_FEAT_RSDB))) {
4513 4514 4515 4516 4517 4518 4519 4520 4521
			err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_DOWN, 1);
			if (err < 0) {
				brcmf_err("BRCMF_C_DOWN error %d\n", err);
				goto exit;
			}
			brcmf_fil_iovar_int_set(ifp, "apsta", 0);
		}

		err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_INFRA, 1);
4522
		if (err < 0) {
4523
			brcmf_err("SET INFRA error %d\n", err);
4524 4525
			goto exit;
		}
4526
	} else if (WARN_ON(supports_11d && (is_11d != ifp->vif->is_11d))) {
4527 4528 4529
		/* Multiple-BSS should use same 11d configuration */
		err = -EINVAL;
		goto exit;
4530
	}
4531 4532

	/* Interface specific setup */
4533
	if (dev_role == NL80211_IFTYPE_AP) {
4534 4535 4536
		if ((brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MBSS)) && (!mbss))
			brcmf_fil_iovar_int_set(ifp, "mbss", 1);

4537 4538 4539 4540 4541
		err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_AP, 1);
		if (err < 0) {
			brcmf_err("setting AP mode failed %d\n", err);
			goto exit;
		}
4542 4543 4544 4545 4546 4547 4548 4549 4550 4551 4552
		if (!mbss) {
			/* Firmware 10.x requires setting channel after enabling
			 * AP and before bringing interface up.
			 */
			err = brcmf_fil_iovar_int_set(ifp, "chanspec", chanspec);
			if (err < 0) {
				brcmf_err("Set Channel failed: chspec=%d, %d\n",
					  chanspec, err);
				goto exit;
			}
		}
4553 4554 4555 4556 4557
		err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_UP, 1);
		if (err < 0) {
			brcmf_err("BRCMF_C_UP error (%d)\n", err);
			goto exit;
		}
4558 4559 4560 4561
		/* On DOWN the firmware removes the WEP keys, reconfigure
		 * them if they were set.
		 */
		brcmf_cfg80211_reconfigure_wep(ifp);
4562 4563 4564 4565 4566 4567 4568 4569 4570 4571 4572

		memset(&join_params, 0, sizeof(join_params));
		/* join parameters starts with ssid */
		memcpy(&join_params.ssid_le, &ssid_le, sizeof(ssid_le));
		/* create softap */
		err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_SSID,
					     &join_params, sizeof(join_params));
		if (err < 0) {
			brcmf_err("SET SSID error (%d)\n", err);
			goto exit;
		}
4573 4574 4575 4576 4577 4578 4579 4580 4581

		if (settings->hidden_ssid) {
			err = brcmf_fil_iovar_int_set(ifp, "closednet", 1);
			if (err) {
				brcmf_err("closednet error (%d)\n", err);
				goto exit;
			}
		}

4582
		brcmf_dbg(TRACE, "AP mode configuration complete\n");
4583 4584 4585 4586 4587 4588 4589
	} else if (dev_role == NL80211_IFTYPE_P2P_GO) {
		err = brcmf_fil_iovar_int_set(ifp, "chanspec", chanspec);
		if (err < 0) {
			brcmf_err("Set Channel failed: chspec=%d, %d\n",
				  chanspec, err);
			goto exit;
		}
4590 4591 4592 4593 4594 4595
		err = brcmf_fil_bsscfg_data_set(ifp, "ssid", &ssid_le,
						sizeof(ssid_le));
		if (err < 0) {
			brcmf_err("setting ssid failed %d\n", err);
			goto exit;
		}
4596
		bss_enable.bsscfgidx = cpu_to_le32(ifp->bsscfgidx);
4597 4598 4599 4600 4601 4602 4603 4604 4605
		bss_enable.enable = cpu_to_le32(1);
		err = brcmf_fil_iovar_data_set(ifp, "bss", &bss_enable,
					       sizeof(bss_enable));
		if (err < 0) {
			brcmf_err("bss_enable config failed %d\n", err);
			goto exit;
		}

		brcmf_dbg(TRACE, "GO mode configuration complete\n");
4606 4607
	} else {
		WARN_ON(1);
4608
	}
4609

4610
	brcmf_config_ap_mgmt_ie(ifp->vif, &settings->beacon);
4611
	set_bit(BRCMF_VIF_STATUS_AP_CREATED, &ifp->vif->sme_state);
4612
	brcmf_net_setcarrier(ifp, true);
4613 4614

exit:
4615
	if ((err) && (!mbss)) {
4616
		brcmf_set_mpc(ifp, 1);
4617
		brcmf_configure_arp_nd_offload(ifp, true);
4618
	}
4619 4620 4621 4622 4623
	return err;
}

static int brcmf_cfg80211_stop_ap(struct wiphy *wiphy, struct net_device *ndev)
{
4624
	struct brcmf_if *ifp = netdev_priv(ndev);
Hante Meuleman's avatar
Hante Meuleman committed
4625
	s32 err;
4626
	struct brcmf_fil_bss_enable_le bss_enable;
Hante Meuleman's avatar
Hante Meuleman committed
4627
	struct brcmf_join_params join_params;
4628

4629
	brcmf_dbg(TRACE, "Enter\n");
4630

4631
	if (ifp->vif->wdev.iftype == NL80211_IFTYPE_AP) {
4632 4633 4634
		/* Due to most likely deauths outstanding we sleep */
		/* first to make sure they get processed by fw. */
		msleep(400);
Hante Meuleman's avatar
Hante Meuleman committed
4635

4636 4637 4638 4639 4640
		if (ifp->vif->mbss) {
			err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_DOWN, 1);
			return err;
		}

4641 4642 4643 4644
		/* First BSS doesn't get a full reset */
		if (ifp->bsscfgidx == 0)
			brcmf_fil_iovar_int_set(ifp, "closednet", 0);

Hante Meuleman's avatar
Hante Meuleman committed
4645 4646 4647 4648 4649
		memset(&join_params, 0, sizeof(join_params));
		err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_SSID,
					     &join_params, sizeof(join_params));
		if (err < 0)
			brcmf_err("SET SSID error (%d)\n", err);
4650
		err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_DOWN, 1);
Hante Meuleman's avatar
Hante Meuleman committed
4651
		if (err < 0)
4652
			brcmf_err("BRCMF_C_DOWN error %d\n", err);
Hante Meuleman's avatar
Hante Meuleman committed
4653 4654 4655
		err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_AP, 0);
		if (err < 0)
			brcmf_err("setting AP mode failed %d\n", err);
4656 4657
		if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MBSS))
			brcmf_fil_iovar_int_set(ifp, "mbss", 0);
4658 4659
		brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_REGULATORY,
				      ifp->vif->is_11d);
4660 4661 4662 4663
		/* Bring device back up so it can be used again */
		err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_UP, 1);
		if (err < 0)
			brcmf_err("BRCMF_C_UP error %d\n", err);
4664 4665

		brcmf_vif_clear_mgmt_ies(ifp->vif);
4666
	} else {
4667
		bss_enable.bsscfgidx = cpu_to_le32(ifp->bsscfgidx);
4668 4669 4670 4671 4672
		bss_enable.enable = cpu_to_le32(0);
		err = brcmf_fil_iovar_data_set(ifp, "bss", &bss_enable,
					       sizeof(bss_enable));
		if (err < 0)
			brcmf_err("bss_enable config failed %d\n", err);
4673
	}
4674
	brcmf_set_mpc(ifp, 1);
4675
	brcmf_configure_arp_nd_offload(ifp, true);
4676
	clear_bit(BRCMF_VIF_STATUS_AP_CREATED, &ifp->vif->sme_state);
4677
	brcmf_net_setcarrier(ifp, false);
4678

4679 4680 4681
	return err;
}

4682 4683 4684 4685 4686 4687 4688 4689 4690 4691 4692 4693 4694 4695
static s32
brcmf_cfg80211_change_beacon(struct wiphy *wiphy, struct net_device *ndev,
			     struct cfg80211_beacon_data *info)
{
	struct brcmf_if *ifp = netdev_priv(ndev);
	s32 err;

	brcmf_dbg(TRACE, "Enter\n");

	err = brcmf_config_ap_mgmt_ie(ifp->vif, info);

	return err;
}

4696 4697
static int
brcmf_cfg80211_del_station(struct wiphy *wiphy, struct net_device *ndev,
4698
			   struct station_del_parameters *params)
4699
{
4700
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
4701
	struct brcmf_scb_val_le scbval;
4702
	struct brcmf_if *ifp = netdev_priv(ndev);
4703 4704
	s32 err;

4705
	if (!params->mac)
4706 4707
		return -EFAULT;

4708
	brcmf_dbg(TRACE, "Enter %pM\n", params->mac);
4709

4710 4711
	if (ifp->vif == cfg->p2p.bss_idx[P2PAPI_BSSCFG_DEVICE].vif)
		ifp = cfg->p2p.bss_idx[P2PAPI_BSSCFG_PRIMARY].vif->ifp;
4712
	if (!check_vif_up(ifp->vif))
4713 4714
		return -EIO;

4715
	memcpy(&scbval.ea, params->mac, ETH_ALEN);
4716
	scbval.val = cpu_to_le32(params->reason_code);
4717
	err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SCB_DEAUTHENTICATE_FOR_REASON,
4718
				     &scbval, sizeof(scbval));
4719
	if (err)
4720
		brcmf_err("SCB_DEAUTHENTICATE_FOR_REASON failed %d\n", err);
4721

4722
	brcmf_dbg(TRACE, "Exit\n");
4723 4724 4725
	return err;
}

4726 4727 4728 4729 4730 4731 4732 4733 4734 4735 4736 4737 4738 4739 4740 4741 4742 4743 4744 4745 4746 4747 4748 4749 4750 4751 4752 4753
static int
brcmf_cfg80211_change_station(struct wiphy *wiphy, struct net_device *ndev,
			      const u8 *mac, struct station_parameters *params)
{
	struct brcmf_if *ifp = netdev_priv(ndev);
	s32 err;

	brcmf_dbg(TRACE, "Enter, MAC %pM, mask 0x%04x set 0x%04x\n", mac,
		  params->sta_flags_mask, params->sta_flags_set);

	/* Ignore all 00 MAC */
	if (is_zero_ether_addr(mac))
		return 0;

	if (!(params->sta_flags_mask & BIT(NL80211_STA_FLAG_AUTHORIZED)))
		return 0;

	if (params->sta_flags_set & BIT(NL80211_STA_FLAG_AUTHORIZED))
		err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_SCB_AUTHORIZE,
					     (void *)mac, ETH_ALEN);
	else
		err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_SCB_DEAUTHORIZE,
					     (void *)mac, ETH_ALEN);
	if (err < 0)
		brcmf_err("Setting SCB (de-)authorize failed, %d\n", err);

	return err;
}
4754 4755 4756 4757 4758 4759

static void
brcmf_cfg80211_mgmt_frame_register(struct wiphy *wiphy,
				   struct wireless_dev *wdev,
				   u16 frame_type, bool reg)
{
4760
	struct brcmf_cfg80211_vif *vif;
4761 4762 4763 4764 4765
	u16 mgmt_type;

	brcmf_dbg(TRACE, "Enter, frame_type %04x, reg=%d\n", frame_type, reg);

	mgmt_type = (frame_type & IEEE80211_FCTL_STYPE) >> 4;
4766
	vif = container_of(wdev, struct brcmf_cfg80211_vif, wdev);
4767 4768 4769
	if (reg)
		vif->mgmt_rx_reg |= BIT(mgmt_type);
	else
4770
		vif->mgmt_rx_reg &= ~BIT(mgmt_type);
4771 4772 4773 4774 4775
}


static int
brcmf_cfg80211_mgmt_tx(struct wiphy *wiphy, struct wireless_dev *wdev,
4776
		       struct cfg80211_mgmt_tx_params *params, u64 *cookie)
4777 4778
{
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
4779 4780 4781
	struct ieee80211_channel *chan = params->chan;
	const u8 *buf = params->buf;
	size_t len = params->len;
4782 4783 4784 4785 4786
	const struct ieee80211_mgmt *mgmt;
	struct brcmf_cfg80211_vif *vif;
	s32 err = 0;
	s32 ie_offset;
	s32 ie_len;
4787 4788 4789 4790
	struct brcmf_fil_action_frame_le *action_frame;
	struct brcmf_fil_af_params_le *af_params;
	bool ack;
	s32 chan_nr;
4791
	u32 freq;
4792 4793 4794 4795 4796 4797 4798

	brcmf_dbg(TRACE, "Enter\n");

	*cookie = 0;

	mgmt = (const struct ieee80211_mgmt *)buf;

4799 4800 4801 4802
	if (!ieee80211_is_mgmt(mgmt->frame_control)) {
		brcmf_err("Driver only allows MGMT packet type\n");
		return -EPERM;
	}
4803

4804 4805
	vif = container_of(wdev, struct brcmf_cfg80211_vif, wdev);

4806 4807 4808 4809 4810 4811 4812 4813 4814 4815 4816 4817 4818 4819 4820 4821
	if (ieee80211_is_probe_resp(mgmt->frame_control)) {
		/* Right now the only reason to get a probe response */
		/* is for p2p listen response or for p2p GO from     */
		/* wpa_supplicant. Unfortunately the probe is send   */
		/* on primary ndev, while dongle wants it on the p2p */
		/* vif. Since this is only reason for a probe        */
		/* response to be sent, the vif is taken from cfg.   */
		/* If ever desired to send proberesp for non p2p     */
		/* response then data should be checked for          */
		/* "DIRECT-". Note in future supplicant will take    */
		/* dedicated p2p wdev to do this and then this 'hack'*/
		/* is not needed anymore.                            */
		ie_offset =  DOT11_MGMT_HDR_LEN +
			     DOT11_BCN_PRB_FIXED_LEN;
		ie_len = len - ie_offset;
		if (vif == cfg->p2p.bss_idx[P2PAPI_BSSCFG_PRIMARY].vif)
4822
			vif = cfg->p2p.bss_idx[P2PAPI_BSSCFG_DEVICE].vif;
4823 4824 4825 4826 4827 4828
		err = brcmf_vif_set_mgmt_ie(vif,
					    BRCMF_VNDR_IE_PRBRSP_FLAG,
					    &buf[ie_offset],
					    ie_len);
		cfg80211_mgmt_tx_status(wdev, *cookie, buf, len, true,
					GFP_KERNEL);
4829
	} else if (ieee80211_is_action(mgmt->frame_control)) {
4830 4831 4832 4833 4834
		if (len > BRCMF_FIL_ACTION_FRAME_SIZE + DOT11_MGMT_HDR_LEN) {
			brcmf_err("invalid action frame length\n");
			err = -EINVAL;
			goto exit;
		}
4835 4836 4837 4838 4839 4840 4841 4842 4843 4844 4845 4846 4847 4848
		af_params = kzalloc(sizeof(*af_params), GFP_KERNEL);
		if (af_params == NULL) {
			brcmf_err("unable to allocate frame\n");
			err = -ENOMEM;
			goto exit;
		}
		action_frame = &af_params->action_frame;
		/* Add the packet Id */
		action_frame->packet_id = cpu_to_le32(*cookie);
		/* Add BSSID */
		memcpy(&action_frame->da[0], &mgmt->da[0], ETH_ALEN);
		memcpy(&af_params->bssid[0], &mgmt->bssid[0], ETH_ALEN);
		/* Add the length exepted for 802.11 header  */
		action_frame->len = cpu_to_le16(len - DOT11_MGMT_HDR_LEN);
4849 4850 4851 4852 4853 4854 4855 4856 4857
		/* Add the channel. Use the one specified as parameter if any or
		 * the current one (got from the firmware) otherwise
		 */
		if (chan)
			freq = chan->center_freq;
		else
			brcmf_fil_cmd_int_get(vif->ifp, BRCMF_C_GET_CHANNEL,
					      &freq);
		chan_nr = ieee80211_frequency_to_channel(freq);
4858 4859 4860 4861 4862 4863
		af_params->channel = cpu_to_le32(chan_nr);

		memcpy(action_frame->data, &buf[DOT11_MGMT_HDR_LEN],
		       le16_to_cpu(action_frame->len));

		brcmf_dbg(TRACE, "Action frame, cookie=%lld, len=%d, freq=%d\n",
4864
			  *cookie, le16_to_cpu(action_frame->len), freq);
4865

4866
		ack = brcmf_p2p_send_action_frame(cfg, cfg_to_ndev(cfg),
4867 4868 4869 4870 4871
						  af_params);

		cfg80211_mgmt_tx_status(wdev, *cookie, buf, len, ack,
					GFP_KERNEL);
		kfree(af_params);
4872 4873
	} else {
		brcmf_dbg(TRACE, "Unhandled, fc=%04x!!\n", mgmt->frame_control);
4874
		brcmf_dbg_hex_dump(true, buf, len, "payload, len=%zu\n", len);
4875
	}
4876

4877
exit:
4878 4879 4880 4881 4882 4883 4884 4885 4886 4887 4888 4889 4890 4891 4892 4893 4894 4895 4896 4897 4898 4899 4900 4901 4902 4903
	return err;
}


static int
brcmf_cfg80211_cancel_remain_on_channel(struct wiphy *wiphy,
					struct wireless_dev *wdev,
					u64 cookie)
{
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
	struct brcmf_cfg80211_vif *vif;
	int err = 0;

	brcmf_dbg(TRACE, "Enter p2p listen cancel\n");

	vif = cfg->p2p.bss_idx[P2PAPI_BSSCFG_DEVICE].vif;
	if (vif == NULL) {
		brcmf_err("No p2p device available for probe response\n");
		err = -ENODEV;
		goto exit;
	}
	brcmf_p2p_cancel_remain_on_channel(vif->ifp);
exit:
	return err;
}

4904 4905 4906 4907 4908 4909 4910 4911 4912 4913 4914 4915 4916 4917 4918 4919 4920 4921 4922 4923 4924 4925 4926 4927 4928 4929 4930 4931 4932 4933 4934 4935 4936 4937 4938 4939 4940 4941 4942 4943 4944 4945 4946 4947 4948 4949 4950 4951 4952 4953 4954 4955 4956 4957 4958 4959 4960 4961 4962 4963 4964 4965
static int brcmf_cfg80211_get_channel(struct wiphy *wiphy,
				      struct wireless_dev *wdev,
				      struct cfg80211_chan_def *chandef)
{
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
	struct net_device *ndev = wdev->netdev;
	struct brcmf_if *ifp;
	struct brcmu_chan ch;
	enum nl80211_band band = 0;
	enum nl80211_chan_width width = 0;
	u32 chanspec;
	int freq, err;

	if (!ndev)
		return -ENODEV;
	ifp = netdev_priv(ndev);

	err = brcmf_fil_iovar_int_get(ifp, "chanspec", &chanspec);
	if (err) {
		brcmf_err("chanspec failed (%d)\n", err);
		return err;
	}

	ch.chspec = chanspec;
	cfg->d11inf.decchspec(&ch);

	switch (ch.band) {
	case BRCMU_CHAN_BAND_2G:
		band = NL80211_BAND_2GHZ;
		break;
	case BRCMU_CHAN_BAND_5G:
		band = NL80211_BAND_5GHZ;
		break;
	}

	switch (ch.bw) {
	case BRCMU_CHAN_BW_80:
		width = NL80211_CHAN_WIDTH_80;
		break;
	case BRCMU_CHAN_BW_40:
		width = NL80211_CHAN_WIDTH_40;
		break;
	case BRCMU_CHAN_BW_20:
		width = NL80211_CHAN_WIDTH_20;
		break;
	case BRCMU_CHAN_BW_80P80:
		width = NL80211_CHAN_WIDTH_80P80;
		break;
	case BRCMU_CHAN_BW_160:
		width = NL80211_CHAN_WIDTH_160;
		break;
	}

	freq = ieee80211_channel_to_frequency(ch.control_ch_num, band);
	chandef->chan = ieee80211_get_channel(wiphy, freq);
	chandef->width = width;
	chandef->center_freq1 = ieee80211_channel_to_frequency(ch.chnum, band);
	chandef->center_freq2 = 0;

	return 0;
}

4966 4967 4968 4969 4970 4971 4972 4973 4974 4975 4976 4977 4978 4979 4980 4981 4982 4983 4984 4985 4986 4987 4988 4989 4990 4991 4992 4993 4994 4995 4996 4997 4998
static int brcmf_cfg80211_crit_proto_start(struct wiphy *wiphy,
					   struct wireless_dev *wdev,
					   enum nl80211_crit_proto_id proto,
					   u16 duration)
{
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
	struct brcmf_cfg80211_vif *vif;

	vif = container_of(wdev, struct brcmf_cfg80211_vif, wdev);

	/* only DHCP support for now */
	if (proto != NL80211_CRIT_PROTO_DHCP)
		return -EINVAL;

	/* suppress and abort scanning */
	set_bit(BRCMF_SCAN_STATUS_SUPPRESS, &cfg->scan_status);
	brcmf_abort_scanning(cfg);

	return brcmf_btcoex_set_mode(vif, BRCMF_BTCOEX_DISABLED, duration);
}

static void brcmf_cfg80211_crit_proto_stop(struct wiphy *wiphy,
					   struct wireless_dev *wdev)
{
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
	struct brcmf_cfg80211_vif *vif;

	vif = container_of(wdev, struct brcmf_cfg80211_vif, wdev);

	brcmf_btcoex_set_mode(vif, BRCMF_BTCOEX_ENABLED, 0);
	clear_bit(BRCMF_SCAN_STATUS_SUPPRESS, &cfg->scan_status);
}

4999 5000 5001 5002 5003 5004 5005 5006 5007 5008 5009 5010 5011 5012 5013 5014 5015 5016 5017 5018 5019
static s32
brcmf_notify_tdls_peer_event(struct brcmf_if *ifp,
			     const struct brcmf_event_msg *e, void *data)
{
	switch (e->reason) {
	case BRCMF_E_REASON_TDLS_PEER_DISCOVERED:
		brcmf_dbg(TRACE, "TDLS Peer Discovered\n");
		break;
	case BRCMF_E_REASON_TDLS_PEER_CONNECTED:
		brcmf_dbg(TRACE, "TDLS Peer Connected\n");
		brcmf_proto_add_tdls_peer(ifp->drvr, ifp->ifidx, (u8 *)e->addr);
		break;
	case BRCMF_E_REASON_TDLS_PEER_DISCONNECTED:
		brcmf_dbg(TRACE, "TDLS Peer Disconnected\n");
		brcmf_proto_delete_peer(ifp->drvr, ifp->ifidx, (u8 *)e->addr);
		break;
	}

	return 0;
}

5020 5021 5022 5023 5024 5025 5026 5027 5028 5029 5030 5031 5032 5033 5034 5035 5036 5037 5038 5039 5040 5041
static int brcmf_convert_nl80211_tdls_oper(enum nl80211_tdls_operation oper)
{
	int ret;

	switch (oper) {
	case NL80211_TDLS_DISCOVERY_REQ:
		ret = BRCMF_TDLS_MANUAL_EP_DISCOVERY;
		break;
	case NL80211_TDLS_SETUP:
		ret = BRCMF_TDLS_MANUAL_EP_CREATE;
		break;
	case NL80211_TDLS_TEARDOWN:
		ret = BRCMF_TDLS_MANUAL_EP_DELETE;
		break;
	default:
		brcmf_err("unsupported operation: %d\n", oper);
		ret = -EOPNOTSUPP;
	}
	return ret;
}

static int brcmf_cfg80211_tdls_oper(struct wiphy *wiphy,
5042
				    struct net_device *ndev, const u8 *peer,
5043 5044 5045 5046 5047 5048 5049 5050 5051 5052 5053 5054 5055 5056 5057 5058 5059 5060 5061 5062 5063 5064 5065 5066
				    enum nl80211_tdls_operation oper)
{
	struct brcmf_if *ifp;
	struct brcmf_tdls_iovar_le info;
	int ret = 0;

	ret = brcmf_convert_nl80211_tdls_oper(oper);
	if (ret < 0)
		return ret;

	ifp = netdev_priv(ndev);
	memset(&info, 0, sizeof(info));
	info.mode = (u8)ret;
	if (peer)
		memcpy(info.ea, peer, ETH_ALEN);

	ret = brcmf_fil_iovar_data_set(ifp, "tdls_endpoint",
				       &info, sizeof(info));
	if (ret < 0)
		brcmf_err("tdls_endpoint iovar failed: ret=%d\n", ret);

	return ret;
}

5067 5068 5069 5070 5071 5072 5073 5074 5075 5076 5077 5078 5079 5080 5081 5082 5083 5084 5085 5086 5087 5088 5089
static int
brcmf_cfg80211_update_conn_params(struct wiphy *wiphy,
				  struct net_device *ndev,
				  struct cfg80211_connect_params *sme,
				  u32 changed)
{
	struct brcmf_if *ifp;
	int err;

	if (!(changed & UPDATE_ASSOC_IES))
		return 0;

	ifp = netdev_priv(ndev);
	err = brcmf_vif_set_mgmt_ie(ifp->vif, BRCMF_VNDR_IE_ASSOCREQ_FLAG,
				    sme->ie, sme->ie_len);
	if (err)
		brcmf_err("Set Assoc REQ IE Failed\n");
	else
		brcmf_dbg(TRACE, "Applied Vndr IEs for Assoc request\n");

	return err;
}

5090 5091 5092 5093 5094 5095 5096 5097 5098 5099 5100 5101 5102 5103 5104 5105 5106 5107 5108 5109 5110 5111 5112 5113 5114
#ifdef CONFIG_PM
static int
brcmf_cfg80211_set_rekey_data(struct wiphy *wiphy, struct net_device *ndev,
			      struct cfg80211_gtk_rekey_data *gtk)
{
	struct brcmf_if *ifp = netdev_priv(ndev);
	struct brcmf_gtk_keyinfo_le gtk_le;
	int ret;

	brcmf_dbg(TRACE, "Enter, bssidx=%d\n", ifp->bsscfgidx);

	memcpy(gtk_le.kck, gtk->kck, sizeof(gtk_le.kck));
	memcpy(gtk_le.kek, gtk->kek, sizeof(gtk_le.kek));
	memcpy(gtk_le.replay_counter, gtk->replay_ctr,
	       sizeof(gtk_le.replay_counter));

	ret = brcmf_fil_iovar_data_set(ifp, "gtk_key_info", &gtk_le,
				       sizeof(gtk_le));
	if (ret < 0)
		brcmf_err("gtk_key_info iovar failed: ret=%d\n", ret);

	return ret;
}
#endif

5115 5116 5117 5118 5119 5120 5121 5122 5123 5124 5125 5126 5127 5128 5129 5130 5131 5132 5133 5134 5135 5136 5137 5138 5139 5140 5141 5142
static int brcmf_cfg80211_set_pmk(struct wiphy *wiphy, struct net_device *dev,
				  const struct cfg80211_pmk_conf *conf)
{
	struct brcmf_if *ifp;

	brcmf_dbg(TRACE, "enter\n");

	/* expect using firmware supplicant for 1X */
	ifp = netdev_priv(dev);
	if (WARN_ON(ifp->vif->profile.use_fwsup != BRCMF_PROFILE_FWSUP_1X))
		return -EINVAL;

	return brcmf_set_pmk(ifp, conf->pmk, conf->pmk_len);
}

static int brcmf_cfg80211_del_pmk(struct wiphy *wiphy, struct net_device *dev,
				  const u8 *aa)
{
	struct brcmf_if *ifp;

	brcmf_dbg(TRACE, "enter\n");
	ifp = netdev_priv(dev);
	if (WARN_ON(ifp->vif->profile.use_fwsup != BRCMF_PROFILE_FWSUP_1X))
		return -EINVAL;

	return brcmf_set_pmk(ifp, NULL, 0);
}

5143
static struct cfg80211_ops brcmf_cfg80211_ops = {
5144 5145
	.add_virtual_intf = brcmf_cfg80211_add_iface,
	.del_virtual_intf = brcmf_cfg80211_del_iface,
5146 5147 5148 5149 5150 5151
	.change_virtual_intf = brcmf_cfg80211_change_iface,
	.scan = brcmf_cfg80211_scan,
	.set_wiphy_params = brcmf_cfg80211_set_wiphy_params,
	.join_ibss = brcmf_cfg80211_join_ibss,
	.leave_ibss = brcmf_cfg80211_leave_ibss,
	.get_station = brcmf_cfg80211_get_station,
5152
	.dump_station = brcmf_cfg80211_dump_station,
5153 5154 5155 5156 5157 5158 5159 5160 5161 5162 5163 5164 5165 5166
	.set_tx_power = brcmf_cfg80211_set_tx_power,
	.get_tx_power = brcmf_cfg80211_get_tx_power,
	.add_key = brcmf_cfg80211_add_key,
	.del_key = brcmf_cfg80211_del_key,
	.get_key = brcmf_cfg80211_get_key,
	.set_default_key = brcmf_cfg80211_config_default_key,
	.set_default_mgmt_key = brcmf_cfg80211_config_default_mgmt_key,
	.set_power_mgmt = brcmf_cfg80211_set_power_mgmt,
	.connect = brcmf_cfg80211_connect,
	.disconnect = brcmf_cfg80211_disconnect,
	.suspend = brcmf_cfg80211_suspend,
	.resume = brcmf_cfg80211_resume,
	.set_pmksa = brcmf_cfg80211_set_pmksa,
	.del_pmksa = brcmf_cfg80211_del_pmksa,
5167
	.flush_pmksa = brcmf_cfg80211_flush_pmksa,
5168 5169
	.start_ap = brcmf_cfg80211_start_ap,
	.stop_ap = brcmf_cfg80211_stop_ap,
5170
	.change_beacon = brcmf_cfg80211_change_beacon,
5171
	.del_station = brcmf_cfg80211_del_station,
5172
	.change_station = brcmf_cfg80211_change_station,
5173 5174
	.sched_scan_start = brcmf_cfg80211_sched_scan_start,
	.sched_scan_stop = brcmf_cfg80211_sched_scan_stop,
5175 5176 5177 5178
	.mgmt_frame_register = brcmf_cfg80211_mgmt_frame_register,
	.mgmt_tx = brcmf_cfg80211_mgmt_tx,
	.remain_on_channel = brcmf_p2p_remain_on_channel,
	.cancel_remain_on_channel = brcmf_cfg80211_cancel_remain_on_channel,
5179
	.get_channel = brcmf_cfg80211_get_channel,
5180 5181
	.start_p2p_device = brcmf_p2p_start_device,
	.stop_p2p_device = brcmf_p2p_stop_device,
5182 5183
	.crit_proto_start = brcmf_cfg80211_crit_proto_start,
	.crit_proto_stop = brcmf_cfg80211_crit_proto_stop,
5184
	.tdls_oper = brcmf_cfg80211_tdls_oper,
5185
	.update_connect_params = brcmf_cfg80211_update_conn_params,
5186 5187
	.set_pmk = brcmf_cfg80211_set_pmk,
	.del_pmk = brcmf_cfg80211_del_pmk,
5188 5189
};

5190
struct brcmf_cfg80211_vif *brcmf_alloc_vif(struct brcmf_cfg80211_info *cfg,
5191
					   enum nl80211_iftype type)
5192
{
5193
	struct brcmf_cfg80211_vif *vif_walk;
5194
	struct brcmf_cfg80211_vif *vif;
5195
	bool mbss;
5196

5197
	brcmf_dbg(TRACE, "allocating virtual interface (size=%zu)\n",
5198
		  sizeof(*vif));
5199 5200 5201 5202 5203
	vif = kzalloc(sizeof(*vif), GFP_KERNEL);
	if (!vif)
		return ERR_PTR(-ENOMEM);

	vif->wdev.wiphy = cfg->wiphy;
5204
	vif->wdev.iftype = type;
5205

5206 5207
	brcmf_init_prof(&vif->profile);

5208 5209 5210 5211 5212 5213 5214 5215 5216 5217 5218
	if (type == NL80211_IFTYPE_AP) {
		mbss = false;
		list_for_each_entry(vif_walk, &cfg->vif_list, list) {
			if (vif_walk->wdev.iftype == NL80211_IFTYPE_AP) {
				mbss = true;
				break;
			}
		}
		vif->mbss = mbss;
	}

5219 5220
	list_add_tail(&vif->list, &cfg->vif_list);
	return vif;
5221 5222
}

5223
void brcmf_free_vif(struct brcmf_cfg80211_vif *vif)
5224
{
5225 5226
	list_del(&vif->list);
	kfree(vif);
5227 5228
}

5229 5230 5231 5232 5233 5234 5235 5236
void brcmf_cfg80211_free_netdev(struct net_device *ndev)
{
	struct brcmf_cfg80211_vif *vif;
	struct brcmf_if *ifp;

	ifp = netdev_priv(ndev);
	vif = ifp->vif;

5237 5238
	if (vif)
		brcmf_free_vif(vif);
5239 5240
}

5241 5242
static bool brcmf_is_linkup(struct brcmf_cfg80211_vif *vif,
			    const struct brcmf_event_msg *e)
5243
{
5244 5245
	u32 event = e->event_code;
	u32 status = e->status;
5246

5247 5248
	if (vif->profile.use_fwsup == BRCMF_PROFILE_FWSUP_PSK &&
	    event == BRCMF_E_PSK_SUP &&
5249 5250
	    status == BRCMF_E_STATUS_FWSUP_COMPLETED)
		set_bit(BRCMF_VIF_STATUS_EAP_SUCCESS, &vif->sme_state);
5251
	if (event == BRCMF_E_SET_SSID && status == BRCMF_E_STATUS_SUCCESS) {
5252
		brcmf_dbg(CONN, "Processing set ssid\n");
5253 5254 5255 5256 5257
		memcpy(vif->profile.bssid, e->addr, ETH_ALEN);
		if (vif->profile.use_fwsup != BRCMF_PROFILE_FWSUP_PSK)
			return true;

		set_bit(BRCMF_VIF_STATUS_ASSOC_SUCCESS, &vif->sme_state);
5258 5259
	}

5260 5261 5262 5263 5264 5265
	if (test_bit(BRCMF_VIF_STATUS_EAP_SUCCESS, &vif->sme_state) &&
	    test_bit(BRCMF_VIF_STATUS_ASSOC_SUCCESS, &vif->sme_state)) {
		clear_bit(BRCMF_VIF_STATUS_EAP_SUCCESS, &vif->sme_state);
		clear_bit(BRCMF_VIF_STATUS_ASSOC_SUCCESS, &vif->sme_state);
		return true;
	}
5266 5267 5268
	return false;
}

5269
static bool brcmf_is_linkdown(const struct brcmf_event_msg *e)
5270
{
5271 5272
	u32 event = e->event_code;
	u16 flags = e->flags;
5273

5274 5275 5276
	if ((event == BRCMF_E_DEAUTH) || (event == BRCMF_E_DEAUTH_IND) ||
	    (event == BRCMF_E_DISASSOC_IND) ||
	    ((event == BRCMF_E_LINK) && (!(flags & BRCMF_EVENT_MSG_LINK)))) {
5277
		brcmf_dbg(CONN, "Processing link down\n");
5278 5279 5280 5281 5282
		return true;
	}
	return false;
}

5283
static bool brcmf_is_nonetwork(struct brcmf_cfg80211_info *cfg,
5284 5285
			       const struct brcmf_event_msg *e)
{
5286 5287
	u32 event = e->event_code;
	u32 status = e->status;
5288 5289

	if (event == BRCMF_E_LINK && status == BRCMF_E_STATUS_NO_NETWORKS) {
5290 5291
		brcmf_dbg(CONN, "Processing Link %s & no network found\n",
			  e->flags & BRCMF_EVENT_MSG_LINK ? "up" : "down");
5292 5293 5294 5295
		return true;
	}

	if (event == BRCMF_E_SET_SSID && status != BRCMF_E_STATUS_SUCCESS) {
5296
		brcmf_dbg(CONN, "Processing connecting & no network found\n");
5297 5298 5299
		return true;
	}

5300 5301 5302 5303 5304 5305 5306
	if (event == BRCMF_E_PSK_SUP &&
	    status != BRCMF_E_STATUS_FWSUP_COMPLETED) {
		brcmf_dbg(CONN, "Processing failed supplicant state: %u\n",
			  status);
		return true;
	}

5307 5308 5309
	return false;
}

5310
static void brcmf_clear_assoc_ies(struct brcmf_cfg80211_info *cfg)
5311
{
5312
	struct brcmf_cfg80211_connect_info *conn_info = cfg_to_conn(cfg);
5313 5314 5315 5316 5317 5318 5319 5320 5321

	kfree(conn_info->req_ie);
	conn_info->req_ie = NULL;
	conn_info->req_ie_len = 0;
	kfree(conn_info->resp_ie);
	conn_info->resp_ie = NULL;
	conn_info->resp_ie_len = 0;
}

5322 5323
static s32 brcmf_get_assoc_ies(struct brcmf_cfg80211_info *cfg,
			       struct brcmf_if *ifp)
5324
{
5325
	struct brcmf_cfg80211_assoc_ielen_le *assoc_info;
5326
	struct brcmf_cfg80211_connect_info *conn_info = cfg_to_conn(cfg);
5327 5328 5329 5330
	u32 req_len;
	u32 resp_len;
	s32 err = 0;

5331
	brcmf_clear_assoc_ies(cfg);
5332

5333 5334
	err = brcmf_fil_iovar_data_get(ifp, "assoc_info",
				       cfg->extra_buf, WL_ASSOC_INFO_MAX);
5335
	if (err) {
5336
		brcmf_err("could not get assoc info (%d)\n", err);
5337 5338
		return err;
	}
5339
	assoc_info =
5340
		(struct brcmf_cfg80211_assoc_ielen_le *)cfg->extra_buf;
5341 5342
	req_len = le32_to_cpu(assoc_info->req_len);
	resp_len = le32_to_cpu(assoc_info->resp_len);
5343
	if (req_len) {
5344
		err = brcmf_fil_iovar_data_get(ifp, "assoc_req_ies",
5345 5346
					       cfg->extra_buf,
					       WL_ASSOC_INFO_MAX);
5347
		if (err) {
5348
			brcmf_err("could not get assoc req (%d)\n", err);
5349 5350 5351 5352
			return err;
		}
		conn_info->req_ie_len = req_len;
		conn_info->req_ie =
5353
		    kmemdup(cfg->extra_buf, conn_info->req_ie_len,
5354 5355 5356 5357 5358 5359
			    GFP_KERNEL);
	} else {
		conn_info->req_ie_len = 0;
		conn_info->req_ie = NULL;
	}
	if (resp_len) {
5360
		err = brcmf_fil_iovar_data_get(ifp, "assoc_resp_ies",
5361 5362
					       cfg->extra_buf,
					       WL_ASSOC_INFO_MAX);
5363
		if (err) {
5364
			brcmf_err("could not get assoc resp (%d)\n", err);
5365 5366 5367 5368
			return err;
		}
		conn_info->resp_ie_len = resp_len;
		conn_info->resp_ie =
5369
		    kmemdup(cfg->extra_buf, conn_info->resp_ie_len,
5370 5371 5372 5373 5374
			    GFP_KERNEL);
	} else {
		conn_info->resp_ie_len = 0;
		conn_info->resp_ie = NULL;
	}
5375 5376
	brcmf_dbg(CONN, "req len (%d) resp len (%d)\n",
		  conn_info->req_ie_len, conn_info->resp_ie_len);
5377 5378 5379 5380 5381

	return err;
}

static s32
5382
brcmf_bss_roaming_done(struct brcmf_cfg80211_info *cfg,
5383 5384 5385
		       struct net_device *ndev,
		       const struct brcmf_event_msg *e)
{
5386 5387
	struct brcmf_if *ifp = netdev_priv(ndev);
	struct brcmf_cfg80211_profile *profile = &ifp->vif->profile;
5388 5389
	struct brcmf_cfg80211_connect_info *conn_info = cfg_to_conn(cfg);
	struct wiphy *wiphy = cfg_to_wiphy(cfg);
5390
	struct ieee80211_channel *notify_channel = NULL;
5391
	struct ieee80211_supported_band *band;
5392
	struct brcmf_bss_info_le *bi;
5393
	struct brcmu_chan ch;
5394
	struct cfg80211_roam_info roam_info = {};
5395 5396
	u32 freq;
	s32 err = 0;
5397
	u8 *buf;
5398

5399
	brcmf_dbg(TRACE, "Enter\n");
5400

5401
	brcmf_get_assoc_ies(cfg, ifp);
5402
	memcpy(profile->bssid, e->addr, ETH_ALEN);
5403
	brcmf_update_bss_info(cfg, ifp);
5404

5405 5406 5407 5408 5409 5410 5411 5412
	buf = kzalloc(WL_BSS_INFO_MAX, GFP_KERNEL);
	if (buf == NULL) {
		err = -ENOMEM;
		goto done;
	}

	/* data sent to dongle has to be little endian */
	*(__le32 *)buf = cpu_to_le32(WL_BSS_INFO_MAX);
5413
	err = brcmf_fil_cmd_data_get(ifp, BRCMF_C_GET_BSS_INFO,
5414
				     buf, WL_BSS_INFO_MAX);
5415 5416 5417

	if (err)
		goto done;
5418

5419
	bi = (struct brcmf_bss_info_le *)(buf + 4);
5420 5421
	ch.chspec = le16_to_cpu(bi->chanspec);
	cfg->d11inf.decchspec(&ch);
5422

5423
	if (ch.band == BRCMU_CHAN_BAND_2G)
5424
		band = wiphy->bands[NL80211_BAND_2GHZ];
5425
	else
5426
		band = wiphy->bands[NL80211_BAND_5GHZ];
5427

5428
	freq = ieee80211_channel_to_frequency(ch.control_ch_num, band->band);
5429 5430
	notify_channel = ieee80211_get_channel(wiphy, freq);

5431 5432
done:
	kfree(buf);
5433 5434 5435 5436 5437 5438 5439 5440 5441

	roam_info.channel = notify_channel;
	roam_info.bssid = profile->bssid;
	roam_info.req_ie = conn_info->req_ie;
	roam_info.req_ie_len = conn_info->req_ie_len;
	roam_info.resp_ie = conn_info->resp_ie;
	roam_info.resp_ie_len = conn_info->resp_ie_len;

	cfg80211_roamed(ndev, &roam_info, GFP_KERNEL);
5442
	brcmf_dbg(CONN, "Report roaming result\n");
5443

5444
	set_bit(BRCMF_VIF_STATUS_CONNECTED, &ifp->vif->sme_state);
5445
	brcmf_dbg(TRACE, "Exit\n");
5446 5447 5448 5449
	return err;
}

static s32
5450
brcmf_bss_connect_done(struct brcmf_cfg80211_info *cfg,
5451 5452 5453
		       struct net_device *ndev, const struct brcmf_event_msg *e,
		       bool completed)
{
5454 5455
	struct brcmf_if *ifp = netdev_priv(ndev);
	struct brcmf_cfg80211_profile *profile = &ifp->vif->profile;
5456
	struct brcmf_cfg80211_connect_info *conn_info = cfg_to_conn(cfg);
5457
	struct cfg80211_connect_resp_params conn_params;
5458

5459
	brcmf_dbg(TRACE, "Enter\n");
5460

5461 5462
	if (test_and_clear_bit(BRCMF_VIF_STATUS_CONNECTING,
			       &ifp->vif->sme_state)) {
5463
		memset(&conn_params, 0, sizeof(conn_params));
5464
		if (completed) {
5465 5466 5467 5468
			brcmf_get_assoc_ies(cfg, ifp);
			brcmf_update_bss_info(cfg, ifp);
			set_bit(BRCMF_VIF_STATUS_CONNECTED,
				&ifp->vif->sme_state);
5469 5470 5471
			conn_params.status = WLAN_STATUS_SUCCESS;
		} else {
			conn_params.status = WLAN_STATUS_AUTH_TIMEOUT;
5472
		}
5473 5474 5475 5476 5477 5478
		conn_params.bssid = profile->bssid;
		conn_params.req_ie = conn_info->req_ie;
		conn_params.req_ie_len = conn_info->req_ie_len;
		conn_params.resp_ie = conn_info->resp_ie;
		conn_params.resp_ie_len = conn_info->resp_ie_len;
		cfg80211_connect_done(ndev, &conn_params, GFP_KERNEL);
5479 5480
		brcmf_dbg(CONN, "Report connect result - connection %s\n",
			  completed ? "succeeded" : "failed");
5481
	}
5482
	brcmf_dbg(TRACE, "Exit\n");
5483
	return 0;
5484 5485 5486
}

static s32
5487
brcmf_notify_connect_status_ap(struct brcmf_cfg80211_info *cfg,
5488 5489 5490
			       struct net_device *ndev,
			       const struct brcmf_event_msg *e, void *data)
{
5491
	static int generation;
5492 5493
	u32 event = e->event_code;
	u32 reason = e->reason;
5494 5495
	struct station_info sinfo;

5496 5497
	brcmf_dbg(CONN, "event %s (%u), reason %d\n",
		  brcmf_fweh_event_name(event), event, reason);
5498 5499 5500 5501 5502 5503
	if (event == BRCMF_E_LINK && reason == BRCMF_E_REASON_LINK_BSSCFG_DIS &&
	    ndev != cfg_to_ndev(cfg)) {
		brcmf_dbg(CONN, "AP mode link down\n");
		complete(&cfg->vif_disabled);
		return 0;
	}
5504 5505

	if (((event == BRCMF_E_ASSOC_IND) || (event == BRCMF_E_REASSOC_IND)) &&
5506 5507
	    (reason == BRCMF_E_STATUS_SUCCESS)) {
		memset(&sinfo, 0, sizeof(sinfo));
5508
		if (!data) {
5509
			brcmf_err("No IEs present in ASSOC/REASSOC_IND");
5510 5511 5512
			return -EINVAL;
		}
		sinfo.assoc_req_ies = data;
5513
		sinfo.assoc_req_ies_len = e->datalen;
5514 5515
		generation++;
		sinfo.generation = generation;
5516
		cfg80211_new_sta(ndev, e->addr, &sinfo, GFP_KERNEL);
5517 5518 5519
	} else if ((event == BRCMF_E_DISASSOC_IND) ||
		   (event == BRCMF_E_DEAUTH_IND) ||
		   (event == BRCMF_E_DEAUTH)) {
5520
		cfg80211_del_sta(ndev, e->addr, GFP_KERNEL);
5521
	}
5522
	return 0;
5523 5524
}

5525
static s32
5526
brcmf_notify_connect_status(struct brcmf_if *ifp,
5527 5528
			    const struct brcmf_event_msg *e, void *data)
{
5529 5530
	struct brcmf_cfg80211_info *cfg = ifp->drvr->config;
	struct net_device *ndev = ifp->ndev;
5531
	struct brcmf_cfg80211_profile *profile = &ifp->vif->profile;
5532
	struct ieee80211_channel *chan;
5533 5534
	s32 err = 0;

5535 5536 5537 5538 5539 5540 5541
	if ((e->event_code == BRCMF_E_DEAUTH) ||
	    (e->event_code == BRCMF_E_DEAUTH_IND) ||
	    (e->event_code == BRCMF_E_DISASSOC_IND) ||
	    ((e->event_code == BRCMF_E_LINK) && (!e->flags))) {
		brcmf_proto_delete_peer(ifp->drvr, ifp->ifidx, (u8 *)e->addr);
	}

5542
	if (brcmf_is_apmode(ifp->vif)) {
5543
		err = brcmf_notify_connect_status_ap(cfg, ndev, e, data);
5544
	} else if (brcmf_is_linkup(ifp->vif, e)) {
5545
		brcmf_dbg(CONN, "Linkup\n");
5546
		if (brcmf_is_ibssmode(ifp->vif)) {
Hante Meuleman's avatar
Hante Meuleman committed
5547
			brcmf_inform_ibss(cfg, ndev, e->addr);
5548
			chan = ieee80211_get_channel(cfg->wiphy, cfg->channel);
5549
			memcpy(profile->bssid, e->addr, ETH_ALEN);
5550
			cfg80211_ibss_joined(ndev, e->addr, chan, GFP_KERNEL);
5551 5552 5553 5554
			clear_bit(BRCMF_VIF_STATUS_CONNECTING,
				  &ifp->vif->sme_state);
			set_bit(BRCMF_VIF_STATUS_CONNECTED,
				&ifp->vif->sme_state);
5555
		} else
5556
			brcmf_bss_connect_done(cfg, ndev, e, true);
5557
		brcmf_net_setcarrier(ifp, true);
5558
	} else if (brcmf_is_linkdown(e)) {
5559
		brcmf_dbg(CONN, "Linkdown\n");
5560
		if (!brcmf_is_ibssmode(ifp->vif)) {
5561
			brcmf_bss_connect_done(cfg, ndev, e, false);
5562 5563 5564 5565 5566 5567
			brcmf_link_down(ifp->vif,
					brcmf_map_fw_linkdown_reason(e));
			brcmf_init_prof(ndev_to_prof(ndev));
			if (ndev != cfg_to_ndev(cfg))
				complete(&cfg->vif_disabled);
			brcmf_net_setcarrier(ifp, false);
5568
		}
5569
	} else if (brcmf_is_nonetwork(cfg, e)) {
5570
		if (brcmf_is_ibssmode(ifp->vif))
5571 5572
			clear_bit(BRCMF_VIF_STATUS_CONNECTING,
				  &ifp->vif->sme_state);
5573
		else
5574
			brcmf_bss_connect_done(cfg, ndev, e, false);
5575 5576 5577 5578 5579 5580
	}

	return err;
}

static s32
5581
brcmf_notify_roaming_status(struct brcmf_if *ifp,
5582 5583
			    const struct brcmf_event_msg *e, void *data)
{
5584
	struct brcmf_cfg80211_info *cfg = ifp->drvr->config;
5585 5586
	u32 event = e->event_code;
	u32 status = e->status;
5587 5588

	if (event == BRCMF_E_ROAM && status == BRCMF_E_STATUS_SUCCESS) {
5589 5590
		if (test_bit(BRCMF_VIF_STATUS_CONNECTED,
			     &ifp->vif->sme_state)) {
5591
			brcmf_bss_roaming_done(cfg, ifp->ndev, e);
5592
		} else {
5593
			brcmf_bss_connect_done(cfg, ifp->ndev, e, true);
5594 5595
			brcmf_net_setcarrier(ifp, true);
		}
5596 5597
	}

5598
	return 0;
5599 5600 5601
}

static s32
5602
brcmf_notify_mic_status(struct brcmf_if *ifp,
5603 5604
			const struct brcmf_event_msg *e, void *data)
{
5605
	u16 flags = e->flags;
5606 5607 5608 5609 5610 5611 5612
	enum nl80211_key_type key_type;

	if (flags & BRCMF_EVENT_MSG_GROUP)
		key_type = NL80211_KEYTYPE_GROUP;
	else
		key_type = NL80211_KEYTYPE_PAIRWISE;

5613
	cfg80211_michael_mic_failure(ifp->ndev, (u8 *)&e->addr, key_type, -1,
5614 5615 5616 5617 5618
				     NULL, GFP_KERNEL);

	return 0;
}

5619 5620 5621 5622 5623 5624 5625 5626
static s32 brcmf_notify_vif_event(struct brcmf_if *ifp,
				  const struct brcmf_event_msg *e, void *data)
{
	struct brcmf_cfg80211_info *cfg = ifp->drvr->config;
	struct brcmf_if_event *ifevent = (struct brcmf_if_event *)data;
	struct brcmf_cfg80211_vif_event *event = &cfg->vif_event;
	struct brcmf_cfg80211_vif *vif;

5627
	brcmf_dbg(TRACE, "Enter: action %u flags %u ifidx %u bsscfgidx %u\n",
5628
		  ifevent->action, ifevent->flags, ifevent->ifidx,
5629
		  ifevent->bsscfgidx);
5630

5631
	spin_lock(&event->vif_event_lock);
5632 5633 5634 5635 5636 5637
	event->action = ifevent->action;
	vif = event->vif;

	switch (ifevent->action) {
	case BRCMF_E_IF_ADD:
		/* waiting process may have timed out */
5638
		if (!cfg->vif_event.vif) {
5639
			spin_unlock(&event->vif_event_lock);
5640
			return -EBADF;
5641
		}
5642 5643 5644

		ifp->vif = vif;
		vif->ifp = ifp;
5645 5646 5647 5648 5649
		if (ifp->ndev) {
			vif->wdev.netdev = ifp->ndev;
			ifp->ndev->ieee80211_ptr = &vif->wdev;
			SET_NETDEV_DEV(ifp->ndev, wiphy_dev(cfg->wiphy));
		}
5650
		spin_unlock(&event->vif_event_lock);
5651
		wake_up(&event->vif_wq);
5652
		return 0;
5653 5654

	case BRCMF_E_IF_DEL:
5655
		spin_unlock(&event->vif_event_lock);
5656 5657 5658 5659 5660
		/* event may not be upon user request */
		if (brcmf_cfg80211_vif_event_armed(cfg))
			wake_up(&event->vif_wq);
		return 0;

5661
	case BRCMF_E_IF_CHANGE:
5662
		spin_unlock(&event->vif_event_lock);
5663 5664 5665
		wake_up(&event->vif_wq);
		return 0;

5666
	default:
5667
		spin_unlock(&event->vif_event_lock);
5668 5669 5670 5671 5672
		break;
	}
	return -EINVAL;
}

5673 5674 5675 5676 5677 5678 5679 5680
static void brcmf_init_conf(struct brcmf_cfg80211_conf *conf)
{
	conf->frag_threshold = (u32)-1;
	conf->rts_threshold = (u32)-1;
	conf->retry_short = (u32)-1;
	conf->retry_long = (u32)-1;
}

5681
static void brcmf_register_event_handlers(struct brcmf_cfg80211_info *cfg)
5682
{
5683 5684 5685 5686 5687 5688 5689 5690 5691 5692 5693 5694 5695 5696 5697 5698 5699 5700 5701 5702
	brcmf_fweh_register(cfg->pub, BRCMF_E_LINK,
			    brcmf_notify_connect_status);
	brcmf_fweh_register(cfg->pub, BRCMF_E_DEAUTH_IND,
			    brcmf_notify_connect_status);
	brcmf_fweh_register(cfg->pub, BRCMF_E_DEAUTH,
			    brcmf_notify_connect_status);
	brcmf_fweh_register(cfg->pub, BRCMF_E_DISASSOC_IND,
			    brcmf_notify_connect_status);
	brcmf_fweh_register(cfg->pub, BRCMF_E_ASSOC_IND,
			    brcmf_notify_connect_status);
	brcmf_fweh_register(cfg->pub, BRCMF_E_REASSOC_IND,
			    brcmf_notify_connect_status);
	brcmf_fweh_register(cfg->pub, BRCMF_E_ROAM,
			    brcmf_notify_roaming_status);
	brcmf_fweh_register(cfg->pub, BRCMF_E_MIC_ERROR,
			    brcmf_notify_mic_status);
	brcmf_fweh_register(cfg->pub, BRCMF_E_SET_SSID,
			    brcmf_notify_connect_status);
	brcmf_fweh_register(cfg->pub, BRCMF_E_PFN_NET_FOUND,
			    brcmf_notify_sched_scan_results);
5703 5704
	brcmf_fweh_register(cfg->pub, BRCMF_E_IF,
			    brcmf_notify_vif_event);
5705
	brcmf_fweh_register(cfg->pub, BRCMF_E_P2P_PROBEREQ_MSG,
5706
			    brcmf_p2p_notify_rx_mgmt_p2p_probereq);
5707 5708
	brcmf_fweh_register(cfg->pub, BRCMF_E_P2P_DISC_LISTEN_COMPLETE,
			    brcmf_p2p_notify_listen_complete);
5709 5710
	brcmf_fweh_register(cfg->pub, BRCMF_E_ACTION_FRAME_RX,
			    brcmf_p2p_notify_action_frame_rx);
5711 5712
	brcmf_fweh_register(cfg->pub, BRCMF_E_ACTION_FRAME_COMPLETE,
			    brcmf_p2p_notify_action_tx_complete);
5713 5714
	brcmf_fweh_register(cfg->pub, BRCMF_E_ACTION_FRAME_OFF_CHAN_COMPLETE,
			    brcmf_p2p_notify_action_tx_complete);
5715 5716
	brcmf_fweh_register(cfg->pub, BRCMF_E_PSK_SUP,
			    brcmf_notify_connect_status);
5717 5718
}

5719 5720 5721 5722 5723 5724
static void brcmf_deinit_priv_mem(struct brcmf_cfg80211_info *cfg)
{
	kfree(cfg->conf);
	cfg->conf = NULL;
	kfree(cfg->extra_buf);
	cfg->extra_buf = NULL;
5725 5726 5727 5728
	kfree(cfg->wowl.nd);
	cfg->wowl.nd = NULL;
	kfree(cfg->wowl.nd_info);
	cfg->wowl.nd_info = NULL;
5729 5730
	kfree(cfg->escan_info.escan_buf);
	cfg->escan_info.escan_buf = NULL;
5731 5732 5733 5734 5735 5736
}

static s32 brcmf_init_priv_mem(struct brcmf_cfg80211_info *cfg)
{
	cfg->conf = kzalloc(sizeof(*cfg->conf), GFP_KERNEL);
	if (!cfg->conf)
5737
		goto init_priv_mem_out;
5738 5739
	cfg->extra_buf = kzalloc(WL_EXTRA_BUF_MAX, GFP_KERNEL);
	if (!cfg->extra_buf)
5740
		goto init_priv_mem_out;
5741 5742 5743 5744 5745 5746 5747 5748
	cfg->wowl.nd = kzalloc(sizeof(*cfg->wowl.nd) + sizeof(u32), GFP_KERNEL);
	if (!cfg->wowl.nd)
		goto init_priv_mem_out;
	cfg->wowl.nd_info = kzalloc(sizeof(*cfg->wowl.nd_info) +
				    sizeof(struct cfg80211_wowlan_nd_match *),
				    GFP_KERNEL);
	if (!cfg->wowl.nd_info)
		goto init_priv_mem_out;
5749 5750 5751
	cfg->escan_info.escan_buf = kzalloc(BRCMF_ESCAN_BUF_SIZE, GFP_KERNEL);
	if (!cfg->escan_info.escan_buf)
		goto init_priv_mem_out;
5752 5753 5754 5755

	return 0;

init_priv_mem_out:
5756
	brcmf_deinit_priv_mem(cfg);
5757 5758 5759 5760

	return -ENOMEM;
}

5761
static s32 wl_init_priv(struct brcmf_cfg80211_info *cfg)
5762 5763 5764
{
	s32 err = 0;

5765 5766
	cfg->scan_request = NULL;
	cfg->pwr_save = true;
5767
	cfg->dongle_up = false;		/* dongle is not up yet */
5768
	err = brcmf_init_priv_mem(cfg);
5769 5770
	if (err)
		return err;
5771
	brcmf_register_event_handlers(cfg);
5772 5773 5774
	mutex_init(&cfg->usr_sync);
	brcmf_init_escan(cfg);
	brcmf_init_conf(cfg->conf);
5775
	init_completion(&cfg->vif_disabled);
5776 5777 5778
	return err;
}

5779
static void wl_deinit_priv(struct brcmf_cfg80211_info *cfg)
5780
{
5781 5782 5783
	cfg->dongle_up = false;	/* dongle down */
	brcmf_abort_scanning(cfg);
	brcmf_deinit_priv_mem(cfg);
5784 5785
}

5786 5787 5788
static void init_vif_event(struct brcmf_cfg80211_vif_event *event)
{
	init_waitqueue_head(&event->vif_wq);
5789
	spin_lock_init(&event->vif_event_lock);
5790 5791
}

5792
static s32 brcmf_dongle_roam(struct brcmf_if *ifp)
5793
{
5794 5795
	s32 err;
	u32 bcn_timeout;
5796 5797
	__le32 roamtrigger[2];
	__le32 roam_delta[2];
5798

5799
	/* Configure beacon timeout value based upon roaming setting */
5800
	if (ifp->drvr->settings->roamoff)
5801 5802 5803 5804 5805 5806 5807
		bcn_timeout = BRCMF_DEFAULT_BCN_TIMEOUT_ROAM_OFF;
	else
		bcn_timeout = BRCMF_DEFAULT_BCN_TIMEOUT_ROAM_ON;
	err = brcmf_fil_iovar_int_set(ifp, "bcn_timeout", bcn_timeout);
	if (err) {
		brcmf_err("bcn_timeout error (%d)\n", err);
		goto roam_setup_done;
5808 5809
	}

5810 5811
	/* Enable/Disable built-in roaming to allow supplicant to take care of
	 * roaming.
5812
	 */
5813
	brcmf_dbg(INFO, "Internal Roaming = %s\n",
5814 5815 5816
		  ifp->drvr->settings->roamoff ? "Off" : "On");
	err = brcmf_fil_iovar_int_set(ifp, "roam_off",
				      ifp->drvr->settings->roamoff);
5817
	if (err) {
5818
		brcmf_err("roam_off error (%d)\n", err);
5819
		goto roam_setup_done;
5820 5821
	}

5822 5823
	roamtrigger[0] = cpu_to_le32(WL_ROAM_TRIGGER_LEVEL);
	roamtrigger[1] = cpu_to_le32(BRCM_BAND_ALL);
5824
	err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_ROAM_TRIGGER,
5825
				     (void *)roamtrigger, sizeof(roamtrigger));
5826
	if (err) {
5827
		brcmf_err("WLC_SET_ROAM_TRIGGER error (%d)\n", err);
5828
		goto roam_setup_done;
5829 5830
	}

5831 5832
	roam_delta[0] = cpu_to_le32(WL_ROAM_DELTA);
	roam_delta[1] = cpu_to_le32(BRCM_BAND_ALL);
5833
	err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_ROAM_DELTA,
5834
				     (void *)roam_delta, sizeof(roam_delta));
5835
	if (err) {
5836
		brcmf_err("WLC_SET_ROAM_DELTA error (%d)\n", err);
5837
		goto roam_setup_done;
5838 5839
	}

5840
roam_setup_done:
5841 5842 5843 5844
	return err;
}

static s32
5845
brcmf_dongle_scantime(struct brcmf_if *ifp)
5846 5847 5848
{
	s32 err = 0;

5849
	err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_SCAN_CHANNEL_TIME,
5850
				    BRCMF_SCAN_CHANNEL_TIME);
5851
	if (err) {
5852
		brcmf_err("Scan assoc time error (%d)\n", err);
5853 5854
		goto dongle_scantime_out;
	}
5855
	err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_SCAN_UNASSOC_TIME,
5856
				    BRCMF_SCAN_UNASSOC_TIME);
5857
	if (err) {
5858
		brcmf_err("Scan unassoc time error (%d)\n", err);
5859 5860 5861
		goto dongle_scantime_out;
	}

5862
	err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_SCAN_PASSIVE_TIME,
5863
				    BRCMF_SCAN_PASSIVE_TIME);
5864
	if (err) {
5865
		brcmf_err("Scan passive time error (%d)\n", err);
5866 5867 5868 5869 5870 5871 5872
		goto dongle_scantime_out;
	}

dongle_scantime_out:
	return err;
}

5873 5874 5875 5876
static void brcmf_update_bw40_channel_flag(struct ieee80211_channel *channel,
					   struct brcmu_chan *ch)
{
	u32 ht40_flag;
5877

5878 5879 5880 5881 5882 5883 5884 5885 5886 5887 5888 5889 5890 5891 5892 5893 5894 5895
	ht40_flag = channel->flags & IEEE80211_CHAN_NO_HT40;
	if (ch->sb == BRCMU_CHAN_SB_U) {
		if (ht40_flag == IEEE80211_CHAN_NO_HT40)
			channel->flags &= ~IEEE80211_CHAN_NO_HT40;
		channel->flags |= IEEE80211_CHAN_NO_HT40PLUS;
	} else {
		/* It should be one of
		 * IEEE80211_CHAN_NO_HT40 or
		 * IEEE80211_CHAN_NO_HT40PLUS
		 */
		channel->flags &= ~IEEE80211_CHAN_NO_HT40;
		if (ht40_flag == IEEE80211_CHAN_NO_HT40)
			channel->flags |= IEEE80211_CHAN_NO_HT40MINUS;
	}
}

static int brcmf_construct_chaninfo(struct brcmf_cfg80211_info *cfg,
				    u32 bw_cap[])
5896 5897
{
	struct brcmf_if *ifp = netdev_priv(cfg_to_ndev(cfg));
5898 5899 5900
	struct ieee80211_supported_band *band;
	struct ieee80211_channel *channel;
	struct wiphy *wiphy;
5901
	struct brcmf_chanspec_list *list;
5902
	struct brcmu_chan ch;
5903
	int err;
5904 5905 5906
	u8 *pbuf;
	u32 i, j;
	u32 total;
5907
	u32 chaninfo;
5908 5909 5910 5911 5912 5913 5914 5915 5916 5917 5918 5919

	pbuf = kzalloc(BRCMF_DCMD_MEDLEN, GFP_KERNEL);

	if (pbuf == NULL)
		return -ENOMEM;

	list = (struct brcmf_chanspec_list *)pbuf;

	err = brcmf_fil_iovar_data_get(ifp, "chanspecs", pbuf,
				       BRCMF_DCMD_MEDLEN);
	if (err) {
		brcmf_err("get chanspecs error (%d)\n", err);
5920
		goto fail_pbuf;
5921 5922
	}

5923
	wiphy = cfg_to_wiphy(cfg);
5924
	band = wiphy->bands[NL80211_BAND_2GHZ];
5925 5926 5927
	if (band)
		for (i = 0; i < band->n_channels; i++)
			band->channels[i].flags = IEEE80211_CHAN_DISABLED;
5928
	band = wiphy->bands[NL80211_BAND_5GHZ];
5929 5930 5931
	if (band)
		for (i = 0; i < band->n_channels; i++)
			band->channels[i].flags = IEEE80211_CHAN_DISABLED;
5932 5933 5934

	total = le32_to_cpu(list->count);
	for (i = 0; i < total; i++) {
5935 5936
		ch.chspec = (u16)le32_to_cpu(list->element[i]);
		cfg->d11inf.decchspec(&ch);
5937

5938
		if (ch.band == BRCMU_CHAN_BAND_2G) {
5939
			band = wiphy->bands[NL80211_BAND_2GHZ];
5940
		} else if (ch.band == BRCMU_CHAN_BAND_5G) {
5941
			band = wiphy->bands[NL80211_BAND_5GHZ];
5942
		} else {
5943
			brcmf_err("Invalid channel Spec. 0x%x.\n", ch.chspec);
5944 5945
			continue;
		}
5946 5947
		if (!band)
			continue;
5948
		if (!(bw_cap[band->band] & WLC_BW_40MHZ_BIT) &&
5949
		    ch.bw == BRCMU_CHAN_BW_40)
5950
			continue;
5951
		if (!(bw_cap[band->band] & WLC_BW_80MHZ_BIT) &&
5952 5953
		    ch.bw == BRCMU_CHAN_BW_80)
			continue;
5954

5955
		channel = NULL;
5956
		for (j = 0; j < band->n_channels; j++) {
5957 5958
			if (band->channels[j].hw_value == ch.control_ch_num) {
				channel = &band->channels[j];
5959 5960 5961
				break;
			}
		}
5962 5963 5964 5965 5966 5967 5968 5969
		if (!channel) {
			/* It seems firmware supports some channel we never
			 * considered. Something new in IEEE standard?
			 */
			brcmf_err("Ignoring unexpected firmware channel %d\n",
				  ch.control_ch_num);
			continue;
		}
5970

5971 5972 5973
		if (channel->orig_flags & IEEE80211_CHAN_DISABLED)
			continue;

5974 5975 5976 5977
		/* assuming the chanspecs order is HT20,
		 * HT40 upper, HT40 lower, and VHT80.
		 */
		if (ch.bw == BRCMU_CHAN_BW_80) {
5978
			channel->flags &= ~IEEE80211_CHAN_NO_80MHZ;
5979
		} else if (ch.bw == BRCMU_CHAN_BW_40) {
5980
			brcmf_update_bw40_channel_flag(channel, &ch);
5981
		} else {
5982 5983 5984
			/* enable the channel and disable other bandwidths
			 * for now as mentioned order assure they are enabled
			 * for subsequent chanspecs.
5985
			 */
5986 5987
			channel->flags = IEEE80211_CHAN_NO_HT40 |
					 IEEE80211_CHAN_NO_80MHZ;
5988 5989 5990 5991 5992 5993 5994
			ch.bw = BRCMU_CHAN_BW_20;
			cfg->d11inf.encchspec(&ch);
			chaninfo = ch.chspec;
			err = brcmf_fil_bsscfg_int_get(ifp, "per_chan_info",
						       &chaninfo);
			if (!err) {
				if (chaninfo & WL_CHAN_RADAR)
5995
					channel->flags |=
5996 5997 5998
						(IEEE80211_CHAN_RADAR |
						 IEEE80211_CHAN_NO_IR);
				if (chaninfo & WL_CHAN_PASSIVE)
5999
					channel->flags |=
6000
						IEEE80211_CHAN_NO_IR;
6001 6002 6003
			}
		}
	}
6004 6005

fail_pbuf:
6006 6007 6008 6009
	kfree(pbuf);
	return err;
}

6010
static int brcmf_enable_bw40_2g(struct brcmf_cfg80211_info *cfg)
6011
{
6012 6013
	struct brcmf_if *ifp = netdev_priv(cfg_to_ndev(cfg));
	struct ieee80211_supported_band *band;
6014
	struct brcmf_fil_bwcap_le band_bwcap;
6015 6016
	struct brcmf_chanspec_list *list;
	u8 *pbuf;
6017 6018
	u32 val;
	int err;
6019 6020 6021
	struct brcmu_chan ch;
	u32 num_chan;
	int i, j;
6022 6023 6024 6025 6026 6027 6028 6029 6030 6031 6032 6033 6034 6035 6036 6037

	/* verify support for bw_cap command */
	val = WLC_BAND_5G;
	err = brcmf_fil_iovar_int_get(ifp, "bw_cap", &val);

	if (!err) {
		/* only set 2G bandwidth using bw_cap command */
		band_bwcap.band = cpu_to_le32(WLC_BAND_2G);
		band_bwcap.bw_cap = cpu_to_le32(WLC_BW_CAP_40MHZ);
		err = brcmf_fil_iovar_data_set(ifp, "bw_cap", &band_bwcap,
					       sizeof(band_bwcap));
	} else {
		brcmf_dbg(INFO, "fallback to mimo_bw_cap\n");
		val = WLC_N_BW_40ALL;
		err = brcmf_fil_iovar_int_set(ifp, "mimo_bw_cap", val);
	}
6038 6039 6040 6041 6042 6043 6044 6045 6046 6047

	if (!err) {
		/* update channel info in 2G band */
		pbuf = kzalloc(BRCMF_DCMD_MEDLEN, GFP_KERNEL);

		if (pbuf == NULL)
			return -ENOMEM;

		ch.band = BRCMU_CHAN_BAND_2G;
		ch.bw = BRCMU_CHAN_BW_40;
6048
		ch.sb = BRCMU_CHAN_SB_NONE;
6049 6050 6051 6052 6053 6054 6055 6056 6057 6058 6059 6060 6061 6062
		ch.chnum = 0;
		cfg->d11inf.encchspec(&ch);

		/* pass encoded chanspec in query */
		*(__le16 *)pbuf = cpu_to_le16(ch.chspec);

		err = brcmf_fil_iovar_data_get(ifp, "chanspecs", pbuf,
					       BRCMF_DCMD_MEDLEN);
		if (err) {
			brcmf_err("get chanspecs error (%d)\n", err);
			kfree(pbuf);
			return err;
		}

6063
		band = cfg_to_wiphy(cfg)->bands[NL80211_BAND_2GHZ];
6064 6065 6066 6067 6068 6069 6070 6071 6072 6073
		list = (struct brcmf_chanspec_list *)pbuf;
		num_chan = le32_to_cpu(list->count);
		for (i = 0; i < num_chan; i++) {
			ch.chspec = (u16)le32_to_cpu(list->element[i]);
			cfg->d11inf.decchspec(&ch);
			if (WARN_ON(ch.band != BRCMU_CHAN_BAND_2G))
				continue;
			if (WARN_ON(ch.bw != BRCMU_CHAN_BW_40))
				continue;
			for (j = 0; j < band->n_channels; j++) {
6074
				if (band->channels[j].hw_value == ch.control_ch_num)
6075 6076 6077 6078 6079 6080 6081
					break;
			}
			if (WARN_ON(j == band->n_channels))
				continue;

			brcmf_update_bw40_channel_flag(&band->channels[j], &ch);
		}
6082
		kfree(pbuf);
6083
	}
6084 6085 6086
	return err;
}

6087 6088 6089 6090 6091 6092 6093 6094
static void brcmf_get_bwcap(struct brcmf_if *ifp, u32 bw_cap[])
{
	u32 band, mimo_bwcap;
	int err;

	band = WLC_BAND_2G;
	err = brcmf_fil_iovar_int_get(ifp, "bw_cap", &band);
	if (!err) {
6095
		bw_cap[NL80211_BAND_2GHZ] = band;
6096 6097 6098
		band = WLC_BAND_5G;
		err = brcmf_fil_iovar_int_get(ifp, "bw_cap", &band);
		if (!err) {
6099
			bw_cap[NL80211_BAND_5GHZ] = band;
6100 6101 6102 6103 6104 6105 6106 6107 6108 6109 6110 6111 6112 6113
			return;
		}
		WARN_ON(1);
		return;
	}
	brcmf_dbg(INFO, "fallback to mimo_bw_cap info\n");
	mimo_bwcap = 0;
	err = brcmf_fil_iovar_int_get(ifp, "mimo_bw_cap", &mimo_bwcap);
	if (err)
		/* assume 20MHz if firmware does not give a clue */
		mimo_bwcap = WLC_N_BW_20ALL;

	switch (mimo_bwcap) {
	case WLC_N_BW_40ALL:
6114
		bw_cap[NL80211_BAND_2GHZ] |= WLC_BW_40MHZ_BIT;
6115 6116
		/* fall-thru */
	case WLC_N_BW_20IN2G_40IN5G:
6117
		bw_cap[NL80211_BAND_5GHZ] |= WLC_BW_40MHZ_BIT;
6118 6119
		/* fall-thru */
	case WLC_N_BW_20ALL:
6120 6121
		bw_cap[NL80211_BAND_2GHZ] |= WLC_BW_20MHZ_BIT;
		bw_cap[NL80211_BAND_5GHZ] |= WLC_BW_20MHZ_BIT;
6122 6123 6124 6125 6126
		break;
	default:
		brcmf_err("invalid mimo_bw_cap value\n");
	}
}
6127

6128 6129 6130 6131 6132 6133 6134 6135 6136 6137 6138 6139 6140 6141 6142 6143 6144 6145 6146 6147 6148 6149 6150 6151 6152 6153 6154 6155
static void brcmf_update_ht_cap(struct ieee80211_supported_band *band,
				u32 bw_cap[2], u32 nchain)
{
	band->ht_cap.ht_supported = true;
	if (bw_cap[band->band] & WLC_BW_40MHZ_BIT) {
		band->ht_cap.cap |= IEEE80211_HT_CAP_SGI_40;
		band->ht_cap.cap |= IEEE80211_HT_CAP_SUP_WIDTH_20_40;
	}
	band->ht_cap.cap |= IEEE80211_HT_CAP_SGI_20;
	band->ht_cap.cap |= IEEE80211_HT_CAP_DSSSCCK40;
	band->ht_cap.ampdu_factor = IEEE80211_HT_MAX_AMPDU_64K;
	band->ht_cap.ampdu_density = IEEE80211_HT_MPDU_DENSITY_16;
	memset(band->ht_cap.mcs.rx_mask, 0xff, nchain);
	band->ht_cap.mcs.tx_params = IEEE80211_HT_MCS_TX_DEFINED;
}

static __le16 brcmf_get_mcs_map(u32 nchain, enum ieee80211_vht_mcs_support supp)
{
	u16 mcs_map;
	int i;

	for (i = 0, mcs_map = 0xFFFF; i < nchain; i++)
		mcs_map = (mcs_map << 2) | supp;

	return cpu_to_le16(mcs_map);
}

static void brcmf_update_vht_cap(struct ieee80211_supported_band *band,
6156 6157
				 u32 bw_cap[2], u32 nchain, u32 txstreams,
				 u32 txbf_bfe_cap, u32 txbf_bfr_cap)
6158 6159 6160 6161
{
	__le16 mcs_map;

	/* not allowed in 2.4G band */
6162
	if (band->band == NL80211_BAND_2GHZ)
6163 6164 6165 6166 6167 6168 6169 6170 6171 6172 6173 6174 6175
		return;

	band->vht_cap.vht_supported = true;
	/* 80MHz is mandatory */
	band->vht_cap.cap |= IEEE80211_VHT_CAP_SHORT_GI_80;
	if (bw_cap[band->band] & WLC_BW_160MHZ_BIT) {
		band->vht_cap.cap |= IEEE80211_VHT_CAP_SUPP_CHAN_WIDTH_160MHZ;
		band->vht_cap.cap |= IEEE80211_VHT_CAP_SHORT_GI_160;
	}
	/* all support 256-QAM */
	mcs_map = brcmf_get_mcs_map(nchain, IEEE80211_VHT_MCS_SUPPORT_0_9);
	band->vht_cap.vht_mcs.rx_mcs_map = mcs_map;
	band->vht_cap.vht_mcs.tx_mcs_map = mcs_map;
6176 6177 6178 6179 6180 6181 6182 6183 6184 6185 6186 6187 6188 6189 6190 6191 6192 6193 6194

	/* Beamforming support information */
	if (txbf_bfe_cap & BRCMF_TXBF_SU_BFE_CAP)
		band->vht_cap.cap |= IEEE80211_VHT_CAP_SU_BEAMFORMEE_CAPABLE;
	if (txbf_bfe_cap & BRCMF_TXBF_MU_BFE_CAP)
		band->vht_cap.cap |= IEEE80211_VHT_CAP_MU_BEAMFORMEE_CAPABLE;
	if (txbf_bfr_cap & BRCMF_TXBF_SU_BFR_CAP)
		band->vht_cap.cap |= IEEE80211_VHT_CAP_SU_BEAMFORMER_CAPABLE;
	if (txbf_bfr_cap & BRCMF_TXBF_MU_BFR_CAP)
		band->vht_cap.cap |= IEEE80211_VHT_CAP_MU_BEAMFORMER_CAPABLE;

	if ((txbf_bfe_cap || txbf_bfr_cap) && (txstreams > 1)) {
		band->vht_cap.cap |=
			(2 << IEEE80211_VHT_CAP_BEAMFORMEE_STS_SHIFT);
		band->vht_cap.cap |= ((txstreams - 1) <<
				IEEE80211_VHT_CAP_SOUNDING_DIMENSIONS_SHIFT);
		band->vht_cap.cap |=
			IEEE80211_VHT_CAP_VHT_LINK_ADAPTATION_VHT_MRQ_MFB;
	}
6195 6196
}

6197
static int brcmf_setup_wiphybands(struct wiphy *wiphy)
6198
{
6199
	struct brcmf_cfg80211_info *cfg = wiphy_priv(wiphy);
6200
	struct brcmf_if *ifp = netdev_priv(cfg_to_ndev(cfg));
6201 6202
	u32 nmode = 0;
	u32 vhtmode = 0;
6203
	u32 bw_cap[2] = { WLC_BW_20MHZ_BIT, WLC_BW_20MHZ_BIT };
6204 6205
	u32 rxchain;
	u32 nchain;
6206
	int err;
6207
	s32 i;
6208
	struct ieee80211_supported_band *band;
6209 6210 6211
	u32 txstreams = 0;
	u32 txbf_bfe_cap = 0;
	u32 txbf_bfr_cap = 0;
6212

6213
	(void)brcmf_fil_iovar_int_get(ifp, "vhtmode", &vhtmode);
6214 6215 6216 6217
	err = brcmf_fil_iovar_int_get(ifp, "nmode", &nmode);
	if (err) {
		brcmf_err("nmode error (%d)\n", err);
	} else {
6218
		brcmf_get_bwcap(ifp, bw_cap);
6219
	}
6220
	brcmf_dbg(INFO, "nmode=%d, vhtmode=%d, bw_cap=(%d, %d)\n",
6221 6222
		  nmode, vhtmode, bw_cap[NL80211_BAND_2GHZ],
		  bw_cap[NL80211_BAND_5GHZ]);
6223

6224 6225 6226 6227 6228 6229 6230 6231 6232 6233
	err = brcmf_fil_iovar_int_get(ifp, "rxchain", &rxchain);
	if (err) {
		brcmf_err("rxchain error (%d)\n", err);
		nchain = 1;
	} else {
		for (nchain = 0; rxchain; nchain++)
			rxchain = rxchain & (rxchain - 1);
	}
	brcmf_dbg(INFO, "nchain=%d\n", nchain);

6234
	err = brcmf_construct_chaninfo(cfg, bw_cap);
6235
	if (err) {
6236
		brcmf_err("brcmf_construct_chaninfo failed (%d)\n", err);
6237 6238 6239
		return err;
	}

6240 6241 6242 6243 6244 6245 6246 6247
	if (vhtmode) {
		(void)brcmf_fil_iovar_int_get(ifp, "txstreams", &txstreams);
		(void)brcmf_fil_iovar_int_get(ifp, "txbf_bfe_cap",
					      &txbf_bfe_cap);
		(void)brcmf_fil_iovar_int_get(ifp, "txbf_bfr_cap",
					      &txbf_bfr_cap);
	}

6248 6249 6250 6251
	wiphy = cfg_to_wiphy(cfg);
	for (i = 0; i < ARRAY_SIZE(wiphy->bands); i++) {
		band = wiphy->bands[i];
		if (band == NULL)
6252
			continue;
6253

6254 6255 6256
		if (nmode)
			brcmf_update_ht_cap(band, bw_cap, nchain);
		if (vhtmode)
6257 6258
			brcmf_update_vht_cap(band, bw_cap, nchain, txstreams,
					     txbf_bfe_cap, txbf_bfr_cap);
6259 6260
	}

6261
	return 0;
6262 6263
}

6264 6265 6266 6267 6268 6269 6270 6271 6272 6273 6274 6275 6276 6277 6278 6279 6280 6281 6282 6283 6284 6285 6286 6287 6288 6289 6290 6291 6292
static const struct ieee80211_txrx_stypes
brcmf_txrx_stypes[NUM_NL80211_IFTYPES] = {
	[NL80211_IFTYPE_STATION] = {
		.tx = 0xffff,
		.rx = BIT(IEEE80211_STYPE_ACTION >> 4) |
		      BIT(IEEE80211_STYPE_PROBE_REQ >> 4)
	},
	[NL80211_IFTYPE_P2P_CLIENT] = {
		.tx = 0xffff,
		.rx = BIT(IEEE80211_STYPE_ACTION >> 4) |
		      BIT(IEEE80211_STYPE_PROBE_REQ >> 4)
	},
	[NL80211_IFTYPE_P2P_GO] = {
		.tx = 0xffff,
		.rx = BIT(IEEE80211_STYPE_ASSOC_REQ >> 4) |
		      BIT(IEEE80211_STYPE_REASSOC_REQ >> 4) |
		      BIT(IEEE80211_STYPE_PROBE_REQ >> 4) |
		      BIT(IEEE80211_STYPE_DISASSOC >> 4) |
		      BIT(IEEE80211_STYPE_AUTH >> 4) |
		      BIT(IEEE80211_STYPE_DEAUTH >> 4) |
		      BIT(IEEE80211_STYPE_ACTION >> 4)
	},
	[NL80211_IFTYPE_P2P_DEVICE] = {
		.tx = 0xffff,
		.rx = BIT(IEEE80211_STYPE_ACTION >> 4) |
		      BIT(IEEE80211_STYPE_PROBE_REQ >> 4)
	}
};

6293 6294 6295 6296 6297 6298 6299 6300 6301 6302 6303 6304 6305 6306 6307 6308 6309 6310 6311 6312 6313 6314 6315 6316 6317 6318 6319 6320 6321 6322
/**
 * brcmf_setup_ifmodes() - determine interface modes and combinations.
 *
 * @wiphy: wiphy object.
 * @ifp: interface object needed for feat module api.
 *
 * The interface modes and combinations are determined dynamically here
 * based on firmware functionality.
 *
 * no p2p and no mbss:
 *
 *	#STA <= 1, #AP <= 1, channels = 1, 2 total
 *
 * no p2p and mbss:
 *
 *	#STA <= 1, #AP <= 1, channels = 1, 2 total
 *	#AP <= 4, matching BI, channels = 1, 4 total
 *
 * p2p, no mchan, and mbss:
 *
 *	#STA <= 1, #P2P-DEV <= 1, #{P2P-CL, P2P-GO} <= 1, channels = 1, 3 total
 *	#STA <= 1, #P2P-DEV <= 1, #AP <= 1, #P2P-CL <= 1, channels = 1, 4 total
 *	#AP <= 4, matching BI, channels = 1, 4 total
 *
 * p2p, mchan, and mbss:
 *
 *	#STA <= 1, #P2P-DEV <= 1, #{P2P-CL, P2P-GO} <= 1, channels = 2, 3 total
 *	#STA <= 1, #P2P-DEV <= 1, #AP <= 1, #P2P-CL <= 1, channels = 1, 4 total
 *	#AP <= 4, matching BI, channels = 1, 4 total
 */
6323 6324 6325
static int brcmf_setup_ifmodes(struct wiphy *wiphy, struct brcmf_if *ifp)
{
	struct ieee80211_iface_combination *combo = NULL;
6326 6327 6328 6329 6330 6331 6332 6333
	struct ieee80211_iface_limit *c0_limits = NULL;
	struct ieee80211_iface_limit *p2p_limits = NULL;
	struct ieee80211_iface_limit *mbss_limits = NULL;
	bool mbss, p2p;
	int i, c, n_combos;

	mbss = brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MBSS);
	p2p = brcmf_feat_is_enabled(ifp, BRCMF_FEAT_P2P);
6334

6335 6336
	n_combos = 1 + !!p2p + !!mbss;
	combo = kcalloc(n_combos, sizeof(*combo), GFP_KERNEL);
6337 6338 6339 6340 6341 6342 6343
	if (!combo)
		goto err;

	wiphy->interface_modes = BIT(NL80211_IFTYPE_STATION) |
				 BIT(NL80211_IFTYPE_ADHOC) |
				 BIT(NL80211_IFTYPE_AP);

6344 6345
	c = 0;
	i = 0;
6346 6347 6348
	c0_limits = kcalloc(p2p ? 3 : 2, sizeof(*c0_limits), GFP_KERNEL);
	if (!c0_limits)
		goto err;
6349 6350 6351 6352 6353
	c0_limits[i].max = 1;
	c0_limits[i++].types = BIT(NL80211_IFTYPE_STATION);
	if (p2p) {
		if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MCHAN))
			combo[c].num_different_channels = 2;
6354 6355
		else
			combo[c].num_different_channels = 1;
6356 6357 6358
		wiphy->interface_modes |= BIT(NL80211_IFTYPE_P2P_CLIENT) |
					  BIT(NL80211_IFTYPE_P2P_GO) |
					  BIT(NL80211_IFTYPE_P2P_DEVICE);
6359 6360 6361 6362 6363 6364
		c0_limits[i].max = 1;
		c0_limits[i++].types = BIT(NL80211_IFTYPE_P2P_DEVICE);
		c0_limits[i].max = 1;
		c0_limits[i++].types = BIT(NL80211_IFTYPE_P2P_CLIENT) |
				       BIT(NL80211_IFTYPE_P2P_GO);
	} else {
6365
		combo[c].num_different_channels = 1;
6366 6367 6368 6369 6370 6371 6372 6373 6374 6375
		c0_limits[i].max = 1;
		c0_limits[i++].types = BIT(NL80211_IFTYPE_AP);
	}
	combo[c].max_interfaces = i;
	combo[c].n_limits = i;
	combo[c].limits = c0_limits;

	if (p2p) {
		c++;
		i = 0;
6376 6377 6378
		p2p_limits = kcalloc(4, sizeof(*p2p_limits), GFP_KERNEL);
		if (!p2p_limits)
			goto err;
6379 6380 6381 6382 6383 6384 6385 6386
		p2p_limits[i].max = 1;
		p2p_limits[i++].types = BIT(NL80211_IFTYPE_STATION);
		p2p_limits[i].max = 1;
		p2p_limits[i++].types = BIT(NL80211_IFTYPE_AP);
		p2p_limits[i].max = 1;
		p2p_limits[i++].types = BIT(NL80211_IFTYPE_P2P_CLIENT);
		p2p_limits[i].max = 1;
		p2p_limits[i++].types = BIT(NL80211_IFTYPE_P2P_DEVICE);
6387
		combo[c].num_different_channels = 1;
6388 6389 6390 6391 6392 6393 6394
		combo[c].max_interfaces = i;
		combo[c].n_limits = i;
		combo[c].limits = p2p_limits;
	}

	if (mbss) {
		c++;
6395 6396 6397 6398 6399 6400
		i = 0;
		mbss_limits = kcalloc(1, sizeof(*mbss_limits), GFP_KERNEL);
		if (!mbss_limits)
			goto err;
		mbss_limits[i].max = 4;
		mbss_limits[i++].types = BIT(NL80211_IFTYPE_AP);
6401 6402 6403
		combo[c].beacon_int_infra_match = true;
		combo[c].num_different_channels = 1;
		combo[c].max_interfaces = 4;
6404
		combo[c].n_limits = i;
6405 6406
		combo[c].limits = mbss_limits;
	}
6407

6408
	wiphy->n_iface_combinations = n_combos;
6409 6410 6411 6412
	wiphy->iface_combinations = combo;
	return 0;

err:
6413 6414 6415
	kfree(c0_limits);
	kfree(p2p_limits);
	kfree(mbss_limits);
6416 6417 6418 6419
	kfree(combo);
	return -ENOMEM;
}

6420
#ifdef CONFIG_PM
6421
static const struct wiphy_wowlan_support brcmf_wowlan_support = {
6422
	.flags = WIPHY_WOWLAN_MAGIC_PKT | WIPHY_WOWLAN_DISCONNECT,
6423 6424 6425 6426
	.n_patterns = BRCMF_WOWL_MAXPATTERNS,
	.pattern_max_len = BRCMF_WOWL_MAXPATTERNSIZE,
	.pattern_min_len = 1,
	.max_pkt_offset = 1500,
6427 6428 6429
};
#endif

6430
static void brcmf_wiphy_wowl_params(struct wiphy *wiphy, struct brcmf_if *ifp)
6431 6432
{
#ifdef CONFIG_PM
6433
	struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
6434 6435 6436 6437 6438 6439 6440 6441 6442
	struct wiphy_wowlan_support *wowl;

	wowl = kmemdup(&brcmf_wowlan_support, sizeof(brcmf_wowlan_support),
		       GFP_KERNEL);
	if (!wowl) {
		brcmf_err("only support basic wowlan features\n");
		wiphy->wowlan = &brcmf_wowlan_support;
		return;
	}
6443 6444

	if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_PNO)) {
6445
		if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_WOWL_ND)) {
6446 6447
			wowl->flags |= WIPHY_WOWLAN_NET_DETECT;
			wowl->max_nd_match_sets = BRCMF_PNO_MAX_PFN_COUNT;
6448
			init_waitqueue_head(&cfg->wowl.nd_data_wait);
6449 6450
		}
	}
6451
	if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_WOWL_GTK)) {
6452 6453
		wowl->flags |= WIPHY_WOWLAN_SUPPORTS_GTK_REKEY;
		wowl->flags |= WIPHY_WOWLAN_GTK_REKEY_FAILURE;
6454 6455
	}

6456
	wiphy->wowlan = wowl;
6457 6458 6459
#endif
}

6460
static int brcmf_setup_wiphy(struct wiphy *wiphy, struct brcmf_if *ifp)
6461
{
6462
	struct brcmf_pub *drvr = ifp->drvr;
6463
	const struct ieee80211_iface_combination *combo;
6464
	struct ieee80211_supported_band *band;
6465
	u16 max_interfaces = 0;
6466
	bool gscan;
6467 6468 6469 6470
	__le32 bandlist[3];
	u32 n_bands;
	int err, i;

6471 6472
	wiphy->max_scan_ssids = WL_NUM_SCAN_MAX;
	wiphy->max_scan_ie_len = BRCMF_SCAN_IE_LEN_MAX;
6473
	wiphy->max_num_pmkids = BRCMF_MAXPMKID;
6474 6475 6476 6477 6478

	err = brcmf_setup_ifmodes(wiphy, ifp);
	if (err)
		return err;

6479 6480 6481 6482 6483 6484 6485
	for (i = 0, combo = wiphy->iface_combinations;
	     i < wiphy->n_iface_combinations; i++, combo++) {
		max_interfaces = max(max_interfaces, combo->max_interfaces);
	}

	for (i = 0; i < max_interfaces && i < ARRAY_SIZE(drvr->addresses);
	     i++) {
6486 6487 6488 6489 6490 6491 6492 6493 6494 6495 6496
		u8 *addr = drvr->addresses[i].addr;

		memcpy(addr, drvr->mac, ETH_ALEN);
		if (i) {
			addr[0] |= BIT(1);
			addr[ETH_ALEN - 1] ^= i;
		}
	}
	wiphy->addresses = drvr->addresses;
	wiphy->n_addresses = i;

6497
	wiphy->signal_type = CFG80211_SIGNAL_TYPE_MBM;
6498 6499 6500 6501
	wiphy->cipher_suites = brcmf_cipher_suites;
	wiphy->n_cipher_suites = ARRAY_SIZE(brcmf_cipher_suites);
	if (!brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MFP))
		wiphy->n_cipher_suites--;
6502 6503 6504 6505
	wiphy->bss_select_support = BIT(NL80211_BSS_SELECT_ATTR_RSSI) |
				    BIT(NL80211_BSS_SELECT_ATTR_BAND_PREF) |
				    BIT(NL80211_BSS_SELECT_ATTR_RSSI_ADJUST);

6506 6507
	wiphy->flags |= WIPHY_FLAG_NETNS_OK |
			WIPHY_FLAG_PS_ON_BY_DEFAULT |
6508
			WIPHY_FLAG_OFFCHAN_TX |
6509 6510 6511
			WIPHY_FLAG_HAS_REMAIN_ON_CHANNEL;
	if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_TDLS))
		wiphy->flags |= WIPHY_FLAG_SUPPORTS_TDLS;
6512
	if (!ifp->drvr->settings->roamoff)
6513
		wiphy->flags |= WIPHY_FLAG_SUPPORTS_FW_ROAM;
6514
	if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_FWSUP)) {
6515 6516
		wiphy_ext_feature_set(wiphy,
				      NL80211_EXT_FEATURE_4WAY_HANDSHAKE_STA_PSK);
6517 6518 6519
		wiphy_ext_feature_set(wiphy,
				      NL80211_EXT_FEATURE_4WAY_HANDSHAKE_STA_1X);
	}
6520 6521
	wiphy->mgmt_stypes = brcmf_txrx_stypes;
	wiphy->max_remain_on_channel_duration = 5000;
6522 6523 6524 6525
	if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_PNO)) {
		gscan = brcmf_feat_is_enabled(ifp, BRCMF_FEAT_GSCAN);
		brcmf_pno_wiphy_params(wiphy, gscan);
	}
6526 6527 6528 6529
	/* vendor commands/events support */
	wiphy->vendor_commands = brcmf_vendor_cmds;
	wiphy->n_vendor_commands = BRCMF_VNDR_CMDS_LAST - 1;

6530
	if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_WOWL))
6531
		brcmf_wiphy_wowl_params(wiphy, ifp);
6532 6533 6534 6535 6536 6537 6538 6539 6540 6541 6542 6543 6544 6545 6546 6547 6548 6549 6550 6551 6552 6553 6554 6555
	err = brcmf_fil_cmd_data_get(ifp, BRCMF_C_GET_BANDLIST, &bandlist,
				     sizeof(bandlist));
	if (err) {
		brcmf_err("could not obtain band info: err=%d\n", err);
		return err;
	}
	/* first entry in bandlist is number of bands */
	n_bands = le32_to_cpu(bandlist[0]);
	for (i = 1; i <= n_bands && i < ARRAY_SIZE(bandlist); i++) {
		if (bandlist[i] == cpu_to_le32(WLC_BAND_2G)) {
			band = kmemdup(&__wl_band_2ghz, sizeof(__wl_band_2ghz),
				       GFP_KERNEL);
			if (!band)
				return -ENOMEM;

			band->channels = kmemdup(&__wl_2ghz_channels,
						 sizeof(__wl_2ghz_channels),
						 GFP_KERNEL);
			if (!band->channels) {
				kfree(band);
				return -ENOMEM;
			}

			band->n_channels = ARRAY_SIZE(__wl_2ghz_channels);
6556
			wiphy->bands[NL80211_BAND_2GHZ] = band;
6557 6558 6559 6560 6561 6562 6563 6564 6565 6566 6567 6568 6569 6570 6571 6572
		}
		if (bandlist[i] == cpu_to_le32(WLC_BAND_5G)) {
			band = kmemdup(&__wl_band_5ghz, sizeof(__wl_band_5ghz),
				       GFP_KERNEL);
			if (!band)
				return -ENOMEM;

			band->channels = kmemdup(&__wl_5ghz_channels,
						 sizeof(__wl_5ghz_channels),
						 GFP_KERNEL);
			if (!band->channels) {
				kfree(band);
				return -ENOMEM;
			}

			band->n_channels = ARRAY_SIZE(__wl_5ghz_channels);
6573
			wiphy->bands[NL80211_BAND_5GHZ] = band;
6574 6575
		}
	}
6576 6577 6578

	wiphy_read_of_freq_limits(wiphy);

6579
	return 0;
6580 6581
}

6582
static s32 brcmf_config_dongle(struct brcmf_cfg80211_info *cfg)
6583 6584 6585
{
	struct net_device *ndev;
	struct wireless_dev *wdev;
6586
	struct brcmf_if *ifp;
6587 6588 6589
	s32 power_mode;
	s32 err = 0;

6590
	if (cfg->dongle_up)
6591 6592
		return err;

6593
	ndev = cfg_to_ndev(cfg);
6594
	wdev = ndev->ieee80211_ptr;
6595 6596 6597 6598
	ifp = netdev_priv(ndev);

	/* make sure RF is ready for work */
	brcmf_fil_cmd_int_set(ifp, BRCMF_C_UP, 0);
6599

6600
	brcmf_dongle_scantime(ifp);
6601

6602
	power_mode = cfg->pwr_save ? PM_FAST : PM_OFF;
6603
	err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_PM, power_mode);
6604 6605
	if (err)
		goto default_conf_out;
6606 6607
	brcmf_dbg(INFO, "power save set to %s\n",
		  (power_mode ? "enabled" : "disabled"));
6608

6609
	err = brcmf_dongle_roam(ifp);
6610 6611
	if (err)
		goto default_conf_out;
6612
	err = brcmf_cfg80211_change_iface(wdev->wiphy, ndev, wdev->iftype,
6613
					  NULL);
6614
	if (err)
6615 6616
		goto default_conf_out;

6617
	brcmf_configure_arp_nd_offload(ifp, true);
6618

6619
	cfg->dongle_up = true;
6620
default_conf_out:
6621 6622 6623 6624 6625

	return err;

}

6626
static s32 __brcmf_cfg80211_up(struct brcmf_if *ifp)
6627
{
6628
	set_bit(BRCMF_VIF_STATUS_READY, &ifp->vif->sme_state);
6629

6630
	return brcmf_config_dongle(ifp->drvr->config);
6631 6632
}

6633
static s32 __brcmf_cfg80211_down(struct brcmf_if *ifp)
6634
{
6635
	struct brcmf_cfg80211_info *cfg = ifp->drvr->config;
6636

6637 6638 6639 6640
	/*
	 * While going down, if associated with AP disassociate
	 * from AP to save power
	 */
6641
	if (check_vif_up(ifp->vif)) {
6642
		brcmf_link_down(ifp->vif, WLAN_REASON_UNSPECIFIED);
6643 6644 6645 6646 6647 6648 6649 6650

		/* Make sure WPA_Supplicant receives all the event
		   generated due to DISASSOC call to the fw to keep
		   the state fw and WPA_Supplicant state consistent
		 */
		brcmf_delay(500);
	}

6651
	brcmf_abort_scanning(cfg);
6652
	clear_bit(BRCMF_VIF_STATUS_READY, &ifp->vif->sme_state);
6653 6654 6655 6656

	return 0;
}

6657
s32 brcmf_cfg80211_up(struct net_device *ndev)
6658
{
6659 6660
	struct brcmf_if *ifp = netdev_priv(ndev);
	struct brcmf_cfg80211_info *cfg = ifp->drvr->config;
6661 6662
	s32 err = 0;

6663
	mutex_lock(&cfg->usr_sync);
6664
	err = __brcmf_cfg80211_up(ifp);
6665
	mutex_unlock(&cfg->usr_sync);
6666 6667 6668 6669

	return err;
}

6670
s32 brcmf_cfg80211_down(struct net_device *ndev)
6671
{
6672 6673
	struct brcmf_if *ifp = netdev_priv(ndev);
	struct brcmf_cfg80211_info *cfg = ifp->drvr->config;
6674 6675
	s32 err = 0;

6676
	mutex_lock(&cfg->usr_sync);
6677
	err = __brcmf_cfg80211_down(ifp);
6678
	mutex_unlock(&cfg->usr_sync);
6679 6680 6681 6682

	return err;
}

6683 6684 6685 6686 6687 6688 6689
enum nl80211_iftype brcmf_cfg80211_get_iftype(struct brcmf_if *ifp)
{
	struct wireless_dev *wdev = &ifp->vif->wdev;

	return wdev->iftype;
}

6690 6691
bool brcmf_get_vif_state_any(struct brcmf_cfg80211_info *cfg,
			     unsigned long state)
6692 6693 6694 6695 6696
{
	struct brcmf_cfg80211_vif *vif;

	list_for_each_entry(vif, &cfg->vif_list, list) {
		if (test_bit(state, &vif->sme_state))
6697
			return true;
6698
	}
6699
	return false;
6700
}
6701 6702 6703 6704 6705 6706

static inline bool vif_event_equals(struct brcmf_cfg80211_vif_event *event,
				    u8 action)
{
	u8 evt_action;

6707
	spin_lock(&event->vif_event_lock);
6708
	evt_action = event->action;
6709
	spin_unlock(&event->vif_event_lock);
6710 6711 6712 6713 6714 6715 6716 6717
	return evt_action == action;
}

void brcmf_cfg80211_arm_vif_event(struct brcmf_cfg80211_info *cfg,
				  struct brcmf_cfg80211_vif *vif)
{
	struct brcmf_cfg80211_vif_event *event = &cfg->vif_event;

6718
	spin_lock(&event->vif_event_lock);
6719 6720
	event->vif = vif;
	event->action = 0;
6721
	spin_unlock(&event->vif_event_lock);
6722 6723 6724 6725 6726 6727 6728
}

bool brcmf_cfg80211_vif_event_armed(struct brcmf_cfg80211_info *cfg)
{
	struct brcmf_cfg80211_vif_event *event = &cfg->vif_event;
	bool armed;

6729
	spin_lock(&event->vif_event_lock);
6730
	armed = event->vif != NULL;
6731
	spin_unlock(&event->vif_event_lock);
6732 6733 6734

	return armed;
}
6735 6736 6737

int brcmf_cfg80211_wait_vif_event(struct brcmf_cfg80211_info *cfg,
				  u8 action, ulong timeout)
6738 6739 6740 6741 6742 6743 6744
{
	struct brcmf_cfg80211_vif_event *event = &cfg->vif_event;

	return wait_event_timeout(event->vif_wq,
				  vif_event_equals(event, action), timeout);
}

6745 6746 6747
static s32 brcmf_translate_country_code(struct brcmf_pub *drvr, char alpha2[2],
					struct brcmf_fil_country_le *ccreq)
{
6748 6749
	struct brcmfmac_pd_cc *country_codes;
	struct brcmfmac_pd_cc_entry *cc;
6750 6751 6752 6753 6754 6755 6756 6757 6758 6759 6760 6761 6762 6763 6764 6765 6766 6767 6768 6769 6770 6771 6772 6773 6774 6775 6776 6777 6778 6779 6780 6781 6782 6783 6784 6785 6786 6787 6788 6789 6790
	s32 found_index;
	int i;

	country_codes = drvr->settings->country_codes;
	if (!country_codes) {
		brcmf_dbg(TRACE, "No country codes configured for device\n");
		return -EINVAL;
	}

	if ((alpha2[0] == ccreq->country_abbrev[0]) &&
	    (alpha2[1] == ccreq->country_abbrev[1])) {
		brcmf_dbg(TRACE, "Country code already set\n");
		return -EAGAIN;
	}

	found_index = -1;
	for (i = 0; i < country_codes->table_size; i++) {
		cc = &country_codes->table[i];
		if ((cc->iso3166[0] == '\0') && (found_index == -1))
			found_index = i;
		if ((cc->iso3166[0] == alpha2[0]) &&
		    (cc->iso3166[1] == alpha2[1])) {
			found_index = i;
			break;
		}
	}
	if (found_index == -1) {
		brcmf_dbg(TRACE, "No country code match found\n");
		return -EINVAL;
	}
	memset(ccreq, 0, sizeof(*ccreq));
	ccreq->rev = cpu_to_le32(country_codes->table[found_index].rev);
	memcpy(ccreq->ccode, country_codes->table[found_index].cc,
	       BRCMF_COUNTRY_BUF_SZ);
	ccreq->country_abbrev[0] = alpha2[0];
	ccreq->country_abbrev[1] = alpha2[1];
	ccreq->country_abbrev[2] = 0;

	return 0;
}

6791 6792 6793 6794 6795 6796
static void brcmf_cfg80211_reg_notifier(struct wiphy *wiphy,
					struct regulatory_request *req)
{
	struct brcmf_cfg80211_info *cfg = wiphy_priv(wiphy);
	struct brcmf_if *ifp = netdev_priv(cfg_to_ndev(cfg));
	struct brcmf_fil_country_le ccreq;
6797
	s32 err;
6798 6799
	int i;

6800 6801 6802 6803
	/* The country code gets set to "00" by default at boot, ignore */
	if (req->alpha2[0] == '0' && req->alpha2[1] == '0')
		return;

6804
	/* ignore non-ISO3166 country codes */
6805
	for (i = 0; i < 2; i++)
6806
		if (req->alpha2[i] < 'A' || req->alpha2[i] > 'Z') {
6807
			brcmf_err("not an ISO3166 code (0x%02x 0x%02x)\n",
6808
				  req->alpha2[0], req->alpha2[1]);
6809 6810
			return;
		}
6811 6812 6813 6814 6815 6816 6817 6818 6819 6820 6821 6822 6823 6824 6825 6826 6827

	brcmf_dbg(TRACE, "Enter: initiator=%d, alpha=%c%c\n", req->initiator,
		  req->alpha2[0], req->alpha2[1]);

	err = brcmf_fil_iovar_data_get(ifp, "country", &ccreq, sizeof(ccreq));
	if (err) {
		brcmf_err("Country code iovar returned err = %d\n", err);
		return;
	}

	err = brcmf_translate_country_code(ifp->drvr, req->alpha2, &ccreq);
	if (err)
		return;

	err = brcmf_fil_iovar_data_set(ifp, "country", &ccreq, sizeof(ccreq));
	if (err) {
		brcmf_err("Firmware rejected country setting\n");
6828 6829 6830
		return;
	}
	brcmf_setup_wiphybands(wiphy);
6831 6832
}

6833 6834
static void brcmf_free_wiphy(struct wiphy *wiphy)
{
6835 6836
	int i;

6837 6838 6839
	if (!wiphy)
		return;

6840 6841 6842 6843
	if (wiphy->iface_combinations) {
		for (i = 0; i < wiphy->n_iface_combinations; i++)
			kfree(wiphy->iface_combinations[i].limits);
	}
6844
	kfree(wiphy->iface_combinations);
6845 6846 6847
	if (wiphy->bands[NL80211_BAND_2GHZ]) {
		kfree(wiphy->bands[NL80211_BAND_2GHZ]->channels);
		kfree(wiphy->bands[NL80211_BAND_2GHZ]);
6848
	}
6849 6850 6851
	if (wiphy->bands[NL80211_BAND_5GHZ]) {
		kfree(wiphy->bands[NL80211_BAND_5GHZ]->channels);
		kfree(wiphy->bands[NL80211_BAND_5GHZ]);
6852
	}
6853 6854 6855 6856
#if IS_ENABLED(CONFIG_PM)
	if (wiphy->wowlan != &brcmf_wowlan_support)
		kfree(wiphy->wowlan);
#endif
6857 6858 6859
	wiphy_free(wiphy);
}

6860
struct brcmf_cfg80211_info *brcmf_cfg80211_attach(struct brcmf_pub *drvr,
6861 6862
						  struct device *busdev,
						  bool p2pdev_forced)
6863
{
6864
	struct net_device *ndev = brcmf_get_ifp(drvr, 0)->ndev;
6865 6866
	struct brcmf_cfg80211_info *cfg;
	struct wiphy *wiphy;
6867
	struct cfg80211_ops *ops;
6868 6869 6870 6871
	struct brcmf_cfg80211_vif *vif;
	struct brcmf_if *ifp;
	s32 err = 0;
	s32 io_type;
6872
	u16 *cap = NULL;
6873 6874 6875 6876 6877 6878

	if (!ndev) {
		brcmf_err("ndev is invalid\n");
		return NULL;
	}

6879
	ops = kmemdup(&brcmf_cfg80211_ops, sizeof(*ops), GFP_KERNEL);
6880 6881 6882
	if (!ops)
		return NULL;

6883
	ifp = netdev_priv(ndev);
6884 6885 6886 6887 6888
#ifdef CONFIG_PM
	if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_WOWL_GTK))
		ops->set_rekey_data = brcmf_cfg80211_set_rekey_data;
#endif
	wiphy = wiphy_new(ops, sizeof(struct brcmf_cfg80211_info));
6889 6890
	if (!wiphy) {
		brcmf_err("Could not allocate wiphy device\n");
6891
		goto ops_out;
6892
	}
6893
	memcpy(wiphy->perm_addr, drvr->mac, ETH_ALEN);
6894
	set_wiphy_dev(wiphy, busdev);
6895 6896 6897

	cfg = wiphy_priv(wiphy);
	cfg->wiphy = wiphy;
6898
	cfg->ops = ops;
6899 6900 6901 6902
	cfg->pub = drvr;
	init_vif_event(&cfg->vif_event);
	INIT_LIST_HEAD(&cfg->vif_list);

6903
	vif = brcmf_alloc_vif(cfg, NL80211_IFTYPE_STATION);
6904 6905
	if (IS_ERR(vif))
		goto wiphy_out;
6906 6907 6908 6909 6910 6911 6912 6913 6914

	vif->ifp = ifp;
	vif->wdev.netdev = ndev;
	ndev->ieee80211_ptr = &vif->wdev;
	SET_NETDEV_DEV(ndev, wiphy_dev(cfg->wiphy));

	err = wl_init_priv(cfg);
	if (err) {
		brcmf_err("Failed to init iwm_priv (%d)\n", err);
6915 6916
		brcmf_free_vif(vif);
		goto wiphy_out;
6917 6918 6919
	}
	ifp->vif = vif;

6920 6921
	/* determine d11 io type before wiphy setup */
	err = brcmf_fil_cmd_int_get(ifp, BRCMF_C_GET_VERSION, &io_type);
6922
	if (err) {
6923 6924
		brcmf_err("Failed to get D11 version (%d)\n", err);
		goto priv_out;
6925
	}
6926 6927 6928 6929 6930 6931 6932 6933
	cfg->d11inf.io_type = (u8)io_type;
	brcmu_d11_attach(&cfg->d11inf);

	err = brcmf_setup_wiphy(wiphy, ifp);
	if (err < 0)
		goto priv_out;

	brcmf_dbg(INFO, "Registering custom regulatory\n");
6934
	wiphy->reg_notifier = brcmf_cfg80211_reg_notifier;
6935 6936 6937 6938 6939 6940 6941
	wiphy->regulatory_flags |= REGULATORY_CUSTOM_REG;
	wiphy_apply_custom_regulatory(wiphy, &brcmf_regdom);

	/* firmware defaults to 40MHz disabled in 2G band. We signal
	 * cfg80211 here that we do and have it decide we can enable
	 * it. But first check if device does support 2G operation.
	 */
6942 6943
	if (wiphy->bands[NL80211_BAND_2GHZ]) {
		cap = &wiphy->bands[NL80211_BAND_2GHZ]->ht_cap.cap;
6944 6945 6946 6947 6948 6949
		*cap |= IEEE80211_HT_CAP_SUP_WIDTH_20_40;
	}
	err = wiphy_register(wiphy);
	if (err < 0) {
		brcmf_err("Could not register wiphy device (%d)\n", err);
		goto priv_out;
6950 6951
	}

6952 6953 6954 6955 6956 6957
	err = brcmf_setup_wiphybands(wiphy);
	if (err) {
		brcmf_err("Setting wiphy bands failed (%d)\n", err);
		goto wiphy_unreg_out;
	}

6958 6959 6960
	/* If cfg80211 didn't disable 40MHz HT CAP in wiphy_register(),
	 * setup 40MHz in 2GHz band and enable OBSS scanning.
	 */
6961 6962
	if (cap && (*cap & IEEE80211_HT_CAP_SUP_WIDTH_20_40)) {
		err = brcmf_enable_bw40_2g(cfg);
6963 6964 6965
		if (!err)
			err = brcmf_fil_iovar_int_set(ifp, "obss_coex",
						      BRCMF_OBSS_COEX_AUTO);
6966 6967
		else
			*cap &= ~IEEE80211_HT_CAP_SUP_WIDTH_20_40;
6968
	}
6969 6970 6971 6972 6973 6974 6975 6976 6977 6978 6979
	/* p2p might require that "if-events" get processed by fweh. So
	 * activate the already registered event handlers now and activate
	 * the rest when initialization has completed. drvr->config needs to
	 * be assigned before activating events.
	 */
	drvr->config = cfg;
	err = brcmf_fweh_activate_events(ifp);
	if (err) {
		brcmf_err("FWEH activation failed (%d)\n", err);
		goto wiphy_unreg_out;
	}
6980

6981
	err = brcmf_p2p_attach(cfg, p2pdev_forced);
6982
	if (err) {
6983
		brcmf_err("P2P initialisation failed (%d)\n", err);
6984 6985 6986 6987 6988 6989 6990
		goto wiphy_unreg_out;
	}
	err = brcmf_btcoex_attach(cfg);
	if (err) {
		brcmf_err("BT-coex initialisation failed (%d)\n", err);
		brcmf_p2p_detach(&cfg->p2p);
		goto wiphy_unreg_out;
6991
	}
6992 6993 6994 6995 6996 6997 6998
	err = brcmf_pno_attach(cfg);
	if (err) {
		brcmf_err("PNO initialisation failed (%d)\n", err);
		brcmf_btcoex_detach(cfg);
		brcmf_p2p_detach(&cfg->p2p);
		goto wiphy_unreg_out;
	}
6999

7000 7001 7002 7003 7004 7005 7006 7007 7008
	if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_TDLS)) {
		err = brcmf_fil_iovar_int_set(ifp, "tdls_enable", 1);
		if (err) {
			brcmf_dbg(INFO, "TDLS not enabled (%d)\n", err);
			wiphy->flags &= ~WIPHY_FLAG_SUPPORTS_TDLS;
		} else {
			brcmf_fweh_register(cfg->pub, BRCMF_E_TDLS_PEER_EVENT,
					    brcmf_notify_tdls_peer_event);
		}
7009 7010
	}

7011 7012 7013 7014
	/* (re-) activate FWEH event handling */
	err = brcmf_fweh_activate_events(ifp);
	if (err) {
		brcmf_err("FWEH activation failed (%d)\n", err);
7015
		goto detach;
7016 7017
	}

7018 7019 7020 7021
	/* Fill in some of the advertised nl80211 supported features */
	if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_SCAN_RANDOM_MAC)) {
		wiphy->features |= NL80211_FEATURE_SCHED_SCAN_RANDOM_MAC_ADDR;
#ifdef CONFIG_PM
7022 7023
		if (wiphy->wowlan &&
		    wiphy->wowlan->flags & WIPHY_WOWLAN_NET_DETECT)
7024 7025 7026 7027
			wiphy->features |= NL80211_FEATURE_ND_RANDOM_MAC_ADDR;
#endif
	}

7028 7029
	return cfg;

7030
detach:
7031
	brcmf_pno_detach(cfg);
7032 7033
	brcmf_btcoex_detach(cfg);
	brcmf_p2p_detach(&cfg->p2p);
7034 7035 7036
wiphy_unreg_out:
	wiphy_unregister(cfg->wiphy);
priv_out:
7037 7038
	wl_deinit_priv(cfg);
	brcmf_free_vif(vif);
7039
	ifp->vif = NULL;
7040 7041
wiphy_out:
	brcmf_free_wiphy(wiphy);
7042
ops_out:
7043
	kfree(ops);
7044 7045 7046 7047 7048 7049 7050 7051
	return NULL;
}

void brcmf_cfg80211_detach(struct brcmf_cfg80211_info *cfg)
{
	if (!cfg)
		return;

7052
	brcmf_pno_detach(cfg);
7053
	brcmf_btcoex_detach(cfg);
7054
	wiphy_unregister(cfg->wiphy);
7055
	kfree(cfg->ops);
7056
	wl_deinit_priv(cfg);
7057
	brcmf_free_wiphy(cfg->wiphy);
7058
}