| /* |
| * Marvell Wireless LAN device driver: scan ioctl and command handling |
| * |
| * Copyright (C) 2011, Marvell International Ltd. |
| * |
| * This software file (the "File") is distributed by Marvell International |
| * Ltd. under the terms of the GNU General Public License Version 2, June 1991 |
| * (the "License"). You may use, redistribute and/or modify this File in |
| * accordance with the terms and conditions of the License, a copy of which |
| * is available by writing to the Free Software Foundation, Inc., |
| * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA or on the |
| * worldwide web at http://www.gnu.org/licenses/old-licenses/gpl-2.0.txt. |
| * |
| * THE FILE IS DISTRIBUTED AS-IS, WITHOUT WARRANTY OF ANY KIND, AND THE |
| * IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE |
| * ARE EXPRESSLY DISCLAIMED. The License provides additional details about |
| * this warranty disclaimer. |
| */ |
| |
| #include "decl.h" |
| #include "ioctl.h" |
| #include "util.h" |
| #include "fw.h" |
| #include "main.h" |
| #include "11n.h" |
| #include "cfg80211.h" |
| |
| /* The maximum number of channels the firmware can scan per command */ |
| #define MWIFIEX_MAX_CHANNELS_PER_SPECIFIC_SCAN 14 |
| |
| #define MWIFIEX_DEF_CHANNELS_PER_SCAN_CMD 4 |
| #define MWIFIEX_LIMIT_1_CHANNEL_PER_SCAN_CMD 15 |
| #define MWIFIEX_LIMIT_2_CHANNELS_PER_SCAN_CMD 27 |
| #define MWIFIEX_LIMIT_3_CHANNELS_PER_SCAN_CMD 35 |
| |
| /* Memory needed to store a max sized Channel List TLV for a firmware scan */ |
| #define CHAN_TLV_MAX_SIZE (sizeof(struct mwifiex_ie_types_header) \ |
| + (MWIFIEX_MAX_CHANNELS_PER_SPECIFIC_SCAN \ |
| *sizeof(struct mwifiex_chan_scan_param_set))) |
| |
| /* Memory needed to store supported rate */ |
| #define RATE_TLV_MAX_SIZE (sizeof(struct mwifiex_ie_types_rates_param_set) \ |
| + HOSTCMD_SUPPORTED_RATES) |
| |
| /* Memory needed to store a max number/size WildCard SSID TLV for a firmware |
| scan */ |
| #define WILDCARD_SSID_TLV_MAX_SIZE \ |
| (MWIFIEX_MAX_SSID_LIST_LENGTH * \ |
| (sizeof(struct mwifiex_ie_types_wildcard_ssid_params) \ |
| + IEEE80211_MAX_SSID_LEN)) |
| |
| /* Maximum memory needed for a mwifiex_scan_cmd_config with all TLVs at max */ |
| #define MAX_SCAN_CFG_ALLOC (sizeof(struct mwifiex_scan_cmd_config) \ |
| + sizeof(struct mwifiex_ie_types_num_probes) \ |
| + sizeof(struct mwifiex_ie_types_htcap) \ |
| + CHAN_TLV_MAX_SIZE \ |
| + RATE_TLV_MAX_SIZE \ |
| + WILDCARD_SSID_TLV_MAX_SIZE) |
| |
| |
| union mwifiex_scan_cmd_config_tlv { |
| /* Scan configuration (variable length) */ |
| struct mwifiex_scan_cmd_config config; |
| /* Max allocated block */ |
| u8 config_alloc_buf[MAX_SCAN_CFG_ALLOC]; |
| }; |
| |
| enum cipher_suite { |
| CIPHER_SUITE_TKIP, |
| CIPHER_SUITE_CCMP, |
| CIPHER_SUITE_MAX |
| }; |
| static u8 mwifiex_wpa_oui[CIPHER_SUITE_MAX][4] = { |
| { 0x00, 0x50, 0xf2, 0x02 }, /* TKIP */ |
| { 0x00, 0x50, 0xf2, 0x04 }, /* AES */ |
| }; |
| static u8 mwifiex_rsn_oui[CIPHER_SUITE_MAX][4] = { |
| { 0x00, 0x0f, 0xac, 0x02 }, /* TKIP */ |
| { 0x00, 0x0f, 0xac, 0x04 }, /* AES */ |
| }; |
| |
| /* |
| * This function parses a given IE for a given OUI. |
| * |
| * This is used to parse a WPA/RSN IE to find if it has |
| * a given oui in PTK. |
| */ |
| static u8 |
| mwifiex_search_oui_in_ie(struct ie_body *iebody, u8 *oui) |
| { |
| u8 count; |
| |
| count = iebody->ptk_cnt[0]; |
| |
| /* There could be multiple OUIs for PTK hence |
| 1) Take the length. |
| 2) Check all the OUIs for AES. |
| 3) If one of them is AES then pass success. */ |
| while (count) { |
| if (!memcmp(iebody->ptk_body, oui, sizeof(iebody->ptk_body))) |
| return MWIFIEX_OUI_PRESENT; |
| |
| --count; |
| if (count) |
| iebody = (struct ie_body *) ((u8 *) iebody + |
| sizeof(iebody->ptk_body)); |
| } |
| |
| pr_debug("info: %s: OUI is not found in PTK\n", __func__); |
| return MWIFIEX_OUI_NOT_PRESENT; |
| } |
| |
| /* |
| * This function checks if a given OUI is present in a RSN IE. |
| * |
| * The function first checks if a RSN IE is present or not in the |
| * BSS descriptor. It tries to locate the OUI only if such an IE is |
| * present. |
| */ |
| static u8 |
| mwifiex_is_rsn_oui_present(struct mwifiex_bssdescriptor *bss_desc, u32 cipher) |
| { |
| u8 *oui; |
| struct ie_body *iebody; |
| u8 ret = MWIFIEX_OUI_NOT_PRESENT; |
| |
| if (((bss_desc->bcn_rsn_ie) && ((*(bss_desc->bcn_rsn_ie)). |
| ieee_hdr.element_id == WLAN_EID_RSN))) { |
| iebody = (struct ie_body *) |
| (((u8 *) bss_desc->bcn_rsn_ie->data) + |
| RSN_GTK_OUI_OFFSET); |
| oui = &mwifiex_rsn_oui[cipher][0]; |
| ret = mwifiex_search_oui_in_ie(iebody, oui); |
| if (ret) |
| return ret; |
| } |
| return ret; |
| } |
| |
| /* |
| * This function checks if a given OUI is present in a WPA IE. |
| * |
| * The function first checks if a WPA IE is present or not in the |
| * BSS descriptor. It tries to locate the OUI only if such an IE is |
| * present. |
| */ |
| static u8 |
| mwifiex_is_wpa_oui_present(struct mwifiex_bssdescriptor *bss_desc, u32 cipher) |
| { |
| u8 *oui; |
| struct ie_body *iebody; |
| u8 ret = MWIFIEX_OUI_NOT_PRESENT; |
| |
| if (((bss_desc->bcn_wpa_ie) && |
| ((*(bss_desc->bcn_wpa_ie)).vend_hdr.element_id == |
| WLAN_EID_WPA))) { |
| iebody = (struct ie_body *) bss_desc->bcn_wpa_ie->data; |
| oui = &mwifiex_wpa_oui[cipher][0]; |
| ret = mwifiex_search_oui_in_ie(iebody, oui); |
| if (ret) |
| return ret; |
| } |
| return ret; |
| } |
| |
| /* |
| * This function compares two SSIDs and checks if they match. |
| */ |
| s32 |
| mwifiex_ssid_cmp(struct cfg80211_ssid *ssid1, struct cfg80211_ssid *ssid2) |
| { |
| if (!ssid1 || !ssid2 || (ssid1->ssid_len != ssid2->ssid_len)) |
| return -1; |
| return memcmp(ssid1->ssid, ssid2->ssid, ssid1->ssid_len); |
| } |
| |
| /* |
| * This function checks if wapi is enabled in driver and scanned network is |
| * compatible with it. |
| */ |
| static bool |
| mwifiex_is_bss_wapi(struct mwifiex_private *priv, |
| struct mwifiex_bssdescriptor *bss_desc) |
| { |
| if (priv->sec_info.wapi_enabled && |
| (bss_desc->bcn_wapi_ie && |
| ((*(bss_desc->bcn_wapi_ie)).ieee_hdr.element_id == |
| WLAN_EID_BSS_AC_ACCESS_DELAY))) { |
| return true; |
| } |
| return false; |
| } |
| |
| /* |
| * This function checks if driver is configured with no security mode and |
| * scanned network is compatible with it. |
| */ |
| static bool |
| mwifiex_is_bss_no_sec(struct mwifiex_private *priv, |
| struct mwifiex_bssdescriptor *bss_desc) |
| { |
| if (!priv->sec_info.wep_enabled && !priv->sec_info.wpa_enabled && |
| !priv->sec_info.wpa2_enabled && ((!bss_desc->bcn_wpa_ie) || |
| ((*(bss_desc->bcn_wpa_ie)).vend_hdr.element_id != |
| WLAN_EID_WPA)) && |
| ((!bss_desc->bcn_rsn_ie) || |
| ((*(bss_desc->bcn_rsn_ie)).ieee_hdr.element_id != |
| WLAN_EID_RSN)) && |
| !priv->sec_info.encryption_mode && !bss_desc->privacy) { |
| return true; |
| } |
| return false; |
| } |
| |
| /* |
| * This function checks if static WEP is enabled in driver and scanned network |
| * is compatible with it. |
| */ |
| static bool |
| mwifiex_is_bss_static_wep(struct mwifiex_private *priv, |
| struct mwifiex_bssdescriptor *bss_desc) |
| { |
| if (priv->sec_info.wep_enabled && !priv->sec_info.wpa_enabled && |
| !priv->sec_info.wpa2_enabled && bss_desc->privacy) { |
| return true; |
| } |
| return false; |
| } |
| |
| /* |
| * This function checks if wpa is enabled in driver and scanned network is |
| * compatible with it. |
| */ |
| static bool |
| mwifiex_is_bss_wpa(struct mwifiex_private *priv, |
| struct mwifiex_bssdescriptor *bss_desc) |
| { |
| if (!priv->sec_info.wep_enabled && priv->sec_info.wpa_enabled && |
| !priv->sec_info.wpa2_enabled && ((bss_desc->bcn_wpa_ie) && |
| ((*(bss_desc->bcn_wpa_ie)).vend_hdr.element_id == WLAN_EID_WPA)) |
| /* |
| * Privacy bit may NOT be set in some APs like |
| * LinkSys WRT54G && bss_desc->privacy |
| */ |
| ) { |
| dev_dbg(priv->adapter->dev, "info: %s: WPA:" |
| " wpa_ie=%#x wpa2_ie=%#x WEP=%s WPA=%s WPA2=%s " |
| "EncMode=%#x privacy=%#x\n", __func__, |
| (bss_desc->bcn_wpa_ie) ? |
| (*(bss_desc->bcn_wpa_ie)). |
| vend_hdr.element_id : 0, |
| (bss_desc->bcn_rsn_ie) ? |
| (*(bss_desc->bcn_rsn_ie)). |
| ieee_hdr.element_id : 0, |
| (priv->sec_info.wep_enabled) ? "e" : "d", |
| (priv->sec_info.wpa_enabled) ? "e" : "d", |
| (priv->sec_info.wpa2_enabled) ? "e" : "d", |
| priv->sec_info.encryption_mode, |
| bss_desc->privacy); |
| return true; |
| } |
| return false; |
| } |
| |
| /* |
| * This function checks if wpa2 is enabled in driver and scanned network is |
| * compatible with it. |
| */ |
| static bool |
| mwifiex_is_bss_wpa2(struct mwifiex_private *priv, |
| struct mwifiex_bssdescriptor *bss_desc) |
| { |
| if (!priv->sec_info.wep_enabled && |
| !priv->sec_info.wpa_enabled && |
| priv->sec_info.wpa2_enabled && |
| ((bss_desc->bcn_rsn_ie) && |
| ((*(bss_desc->bcn_rsn_ie)).ieee_hdr.element_id == WLAN_EID_RSN))) { |
| /* |
| * Privacy bit may NOT be set in some APs like |
| * LinkSys WRT54G && bss_desc->privacy |
| */ |
| dev_dbg(priv->adapter->dev, "info: %s: WPA2: " |
| " wpa_ie=%#x wpa2_ie=%#x WEP=%s WPA=%s WPA2=%s " |
| "EncMode=%#x privacy=%#x\n", __func__, |
| (bss_desc->bcn_wpa_ie) ? |
| (*(bss_desc->bcn_wpa_ie)). |
| vend_hdr.element_id : 0, |
| (bss_desc->bcn_rsn_ie) ? |
| (*(bss_desc->bcn_rsn_ie)). |
| ieee_hdr.element_id : 0, |
| (priv->sec_info.wep_enabled) ? "e" : "d", |
| (priv->sec_info.wpa_enabled) ? "e" : "d", |
| (priv->sec_info.wpa2_enabled) ? "e" : "d", |
| priv->sec_info.encryption_mode, |
| bss_desc->privacy); |
| return true; |
| } |
| return false; |
| } |
| |
| /* |
| * This function checks if adhoc AES is enabled in driver and scanned network is |
| * compatible with it. |
| */ |
| static bool |
| mwifiex_is_bss_adhoc_aes(struct mwifiex_private *priv, |
| struct mwifiex_bssdescriptor *bss_desc) |
| { |
| if (!priv->sec_info.wep_enabled && !priv->sec_info.wpa_enabled && |
| !priv->sec_info.wpa2_enabled && |
| ((!bss_desc->bcn_wpa_ie) || |
| ((*(bss_desc->bcn_wpa_ie)).vend_hdr.element_id != WLAN_EID_WPA)) && |
| ((!bss_desc->bcn_rsn_ie) || |
| ((*(bss_desc->bcn_rsn_ie)).ieee_hdr.element_id != WLAN_EID_RSN)) && |
| !priv->sec_info.encryption_mode && bss_desc->privacy) { |
| return true; |
| } |
| return false; |
| } |
| |
| /* |
| * This function checks if dynamic WEP is enabled in driver and scanned network |
| * is compatible with it. |
| */ |
| static bool |
| mwifiex_is_bss_dynamic_wep(struct mwifiex_private *priv, |
| struct mwifiex_bssdescriptor *bss_desc) |
| { |
| if (!priv->sec_info.wep_enabled && !priv->sec_info.wpa_enabled && |
| !priv->sec_info.wpa2_enabled && |
| ((!bss_desc->bcn_wpa_ie) || |
| ((*(bss_desc->bcn_wpa_ie)).vend_hdr.element_id != WLAN_EID_WPA)) && |
| ((!bss_desc->bcn_rsn_ie) || |
| ((*(bss_desc->bcn_rsn_ie)).ieee_hdr.element_id != WLAN_EID_RSN)) && |
| priv->sec_info.encryption_mode && bss_desc->privacy) { |
| dev_dbg(priv->adapter->dev, "info: %s: dynamic " |
| "WEP: wpa_ie=%#x wpa2_ie=%#x " |
| "EncMode=%#x privacy=%#x\n", |
| __func__, |
| (bss_desc->bcn_wpa_ie) ? |
| (*(bss_desc->bcn_wpa_ie)). |
| vend_hdr.element_id : 0, |
| (bss_desc->bcn_rsn_ie) ? |
| (*(bss_desc->bcn_rsn_ie)). |
| ieee_hdr.element_id : 0, |
| priv->sec_info.encryption_mode, |
| bss_desc->privacy); |
| return true; |
| } |
| return false; |
| } |
| |
| /* |
| * This function checks if a scanned network is compatible with the driver |
| * settings. |
| * |
| * WEP WPA WPA2 ad-hoc encrypt Network |
| * enabled enabled enabled AES mode Privacy WPA WPA2 Compatible |
| * 0 0 0 0 NONE 0 0 0 yes No security |
| * 0 1 0 0 x 1x 1 x yes WPA (disable |
| * HT if no AES) |
| * 0 0 1 0 x 1x x 1 yes WPA2 (disable |
| * HT if no AES) |
| * 0 0 0 1 NONE 1 0 0 yes Ad-hoc AES |
| * 1 0 0 0 NONE 1 0 0 yes Static WEP |
| * (disable HT) |
| * 0 0 0 0 !=NONE 1 0 0 yes Dynamic WEP |
| * |
| * Compatibility is not matched while roaming, except for mode. |
| */ |
| static s32 |
| mwifiex_is_network_compatible(struct mwifiex_private *priv, |
| struct mwifiex_bssdescriptor *bss_desc, u32 mode) |
| { |
| struct mwifiex_adapter *adapter = priv->adapter; |
| |
| bss_desc->disable_11n = false; |
| |
| /* Don't check for compatibility if roaming */ |
| if (priv->media_connected && |
| (priv->bss_mode == NL80211_IFTYPE_STATION) && |
| (bss_desc->bss_mode == NL80211_IFTYPE_STATION)) |
| return 0; |
| |
| if (priv->wps.session_enable) { |
| dev_dbg(adapter->dev, |
| "info: return success directly in WPS period\n"); |
| return 0; |
| } |
| |
| if (mwifiex_is_bss_wapi(priv, bss_desc)) { |
| dev_dbg(adapter->dev, "info: return success for WAPI AP\n"); |
| return 0; |
| } |
| |
| if (bss_desc->bss_mode == mode) { |
| if (mwifiex_is_bss_no_sec(priv, bss_desc)) { |
| /* No security */ |
| return 0; |
| } else if (mwifiex_is_bss_static_wep(priv, bss_desc)) { |
| /* Static WEP enabled */ |
| dev_dbg(adapter->dev, "info: Disable 11n in WEP mode.\n"); |
| bss_desc->disable_11n = true; |
| return 0; |
| } else if (mwifiex_is_bss_wpa(priv, bss_desc)) { |
| /* WPA enabled */ |
| if (((priv->adapter->config_bands & BAND_GN || |
| priv->adapter->config_bands & BAND_AN) && |
| bss_desc->bcn_ht_cap) && |
| !mwifiex_is_wpa_oui_present(bss_desc, |
| CIPHER_SUITE_CCMP)) { |
| |
| if (mwifiex_is_wpa_oui_present |
| (bss_desc, CIPHER_SUITE_TKIP)) { |
| dev_dbg(adapter->dev, |
| "info: Disable 11n if AES " |
| "is not supported by AP\n"); |
| bss_desc->disable_11n = true; |
| } else { |
| return -1; |
| } |
| } |
| return 0; |
| } else if (mwifiex_is_bss_wpa2(priv, bss_desc)) { |
| /* WPA2 enabled */ |
| if (((priv->adapter->config_bands & BAND_GN || |
| priv->adapter->config_bands & BAND_AN) && |
| bss_desc->bcn_ht_cap) && |
| !mwifiex_is_rsn_oui_present(bss_desc, |
| CIPHER_SUITE_CCMP)) { |
| |
| if (mwifiex_is_rsn_oui_present |
| (bss_desc, CIPHER_SUITE_TKIP)) { |
| dev_dbg(adapter->dev, |
| "info: Disable 11n if AES " |
| "is not supported by AP\n"); |
| bss_desc->disable_11n = true; |
| } else { |
| return -1; |
| } |
| } |
| return 0; |
| } else if (mwifiex_is_bss_adhoc_aes(priv, bss_desc)) { |
| /* Ad-hoc AES enabled */ |
| return 0; |
| } else if (mwifiex_is_bss_dynamic_wep(priv, bss_desc)) { |
| /* Dynamic WEP enabled */ |
| return 0; |
| } |
| |
| /* Security doesn't match */ |
| dev_dbg(adapter->dev, |
| "info: %s: failed: wpa_ie=%#x wpa2_ie=%#x WEP=%s " |
| "WPA=%s WPA2=%s EncMode=%#x privacy=%#x\n", __func__, |
| (bss_desc->bcn_wpa_ie) ? |
| (*(bss_desc->bcn_wpa_ie)).vend_hdr.element_id : 0, |
| (bss_desc->bcn_rsn_ie) ? |
| (*(bss_desc->bcn_rsn_ie)).ieee_hdr.element_id : 0, |
| (priv->sec_info.wep_enabled) ? "e" : "d", |
| (priv->sec_info.wpa_enabled) ? "e" : "d", |
| (priv->sec_info.wpa2_enabled) ? "e" : "d", |
| priv->sec_info.encryption_mode, bss_desc->privacy); |
| return -1; |
| } |
| |
| /* Mode doesn't match */ |
| return -1; |
| } |
| |
| /* |
| * This function creates a channel list for the driver to scan, based |
| * on region/band information. |
| * |
| * This routine is used for any scan that is not provided with a |
| * specific channel list to scan. |
| */ |
| static int |
| mwifiex_scan_create_channel_list(struct mwifiex_private *priv, |
| const struct mwifiex_user_scan_cfg |
| *user_scan_in, |
| struct mwifiex_chan_scan_param_set |
| *scan_chan_list, |
| u8 filtered_scan) |
| { |
| enum ieee80211_band band; |
| struct ieee80211_supported_band *sband; |
| struct ieee80211_channel *ch; |
| struct mwifiex_adapter *adapter = priv->adapter; |
| int chan_idx = 0, i; |
| |
| for (band = 0; (band < IEEE80211_NUM_BANDS) ; band++) { |
| |
| if (!priv->wdev->wiphy->bands[band]) |
| continue; |
| |
| sband = priv->wdev->wiphy->bands[band]; |
| |
| for (i = 0; (i < sband->n_channels) ; i++) { |
| ch = &sband->channels[i]; |
| if (ch->flags & IEEE80211_CHAN_DISABLED) |
| continue; |
| scan_chan_list[chan_idx].radio_type = band; |
| |
| if (user_scan_in && |
| user_scan_in->chan_list[0].scan_time) |
| scan_chan_list[chan_idx].max_scan_time = |
| cpu_to_le16((u16) user_scan_in-> |
| chan_list[0].scan_time); |
| else if (ch->flags & IEEE80211_CHAN_PASSIVE_SCAN) |
| scan_chan_list[chan_idx].max_scan_time = |
| cpu_to_le16(adapter->passive_scan_time); |
| else |
| scan_chan_list[chan_idx].max_scan_time = |
| cpu_to_le16(adapter->active_scan_time); |
| |
| if (ch->flags & IEEE80211_CHAN_PASSIVE_SCAN) |
| scan_chan_list[chan_idx].chan_scan_mode_bitmap |
| |= MWIFIEX_PASSIVE_SCAN; |
| else |
| scan_chan_list[chan_idx].chan_scan_mode_bitmap |
| &= ~MWIFIEX_PASSIVE_SCAN; |
| scan_chan_list[chan_idx].chan_number = |
| (u32) ch->hw_value; |
| if (filtered_scan) { |
| scan_chan_list[chan_idx].max_scan_time = |
| cpu_to_le16(adapter->specific_scan_time); |
| scan_chan_list[chan_idx].chan_scan_mode_bitmap |
| |= MWIFIEX_DISABLE_CHAN_FILT; |
| } |
| chan_idx++; |
| } |
| |
| } |
| return chan_idx; |
| } |
| |
| /* |
| * This function constructs and sends multiple scan config commands to |
| * the firmware. |
| * |
| * Previous routines in the code flow have created a scan command configuration |
| * with any requested TLVs. This function splits the channel TLV into maximum |
| * channels supported per scan lists and sends the portion of the channel TLV, |
| * along with the other TLVs, to the firmware. |
| */ |
| static int |
| mwifiex_scan_channel_list(struct mwifiex_private *priv, |
| u32 max_chan_per_scan, u8 filtered_scan, |
| struct mwifiex_scan_cmd_config *scan_cfg_out, |
| struct mwifiex_ie_types_chan_list_param_set |
| *chan_tlv_out, |
| struct mwifiex_chan_scan_param_set *scan_chan_list) |
| { |
| int ret = 0; |
| struct mwifiex_chan_scan_param_set *tmp_chan_list; |
| struct mwifiex_chan_scan_param_set *start_chan; |
| |
| u32 tlv_idx; |
| u32 total_scan_time; |
| u32 done_early; |
| |
| if (!scan_cfg_out || !chan_tlv_out || !scan_chan_list) { |
| dev_dbg(priv->adapter->dev, |
| "info: Scan: Null detect: %p, %p, %p\n", |
| scan_cfg_out, chan_tlv_out, scan_chan_list); |
| return -1; |
| } |
| |
| chan_tlv_out->header.type = cpu_to_le16(TLV_TYPE_CHANLIST); |
| |
| /* Set the temp channel struct pointer to the start of the desired |
| list */ |
| tmp_chan_list = scan_chan_list; |
| |
| /* Loop through the desired channel list, sending a new firmware scan |
| commands for each max_chan_per_scan channels (or for 1,6,11 |
| individually if configured accordingly) */ |
| while (tmp_chan_list->chan_number) { |
| |
| tlv_idx = 0; |
| total_scan_time = 0; |
| chan_tlv_out->header.len = 0; |
| start_chan = tmp_chan_list; |
| done_early = false; |
| |
| /* |
| * Construct the Channel TLV for the scan command. Continue to |
| * insert channel TLVs until: |
| * - the tlv_idx hits the maximum configured per scan command |
| * - the next channel to insert is 0 (end of desired channel |
| * list) |
| * - done_early is set (controlling individual scanning of |
| * 1,6,11) |
| */ |
| while (tlv_idx < max_chan_per_scan && |
| tmp_chan_list->chan_number && !done_early) { |
| |
| dev_dbg(priv->adapter->dev, |
| "info: Scan: Chan(%3d), Radio(%d)," |
| " Mode(%d, %d), Dur(%d)\n", |
| tmp_chan_list->chan_number, |
| tmp_chan_list->radio_type, |
| tmp_chan_list->chan_scan_mode_bitmap |
| & MWIFIEX_PASSIVE_SCAN, |
| (tmp_chan_list->chan_scan_mode_bitmap |
| & MWIFIEX_DISABLE_CHAN_FILT) >> 1, |
| le16_to_cpu(tmp_chan_list->max_scan_time)); |
| |
| /* Copy the current channel TLV to the command being |
| prepared */ |
| memcpy(chan_tlv_out->chan_scan_param + tlv_idx, |
| tmp_chan_list, |
| sizeof(chan_tlv_out->chan_scan_param)); |
| |
| /* Increment the TLV header length by the size |
| appended */ |
| chan_tlv_out->header.len = |
| cpu_to_le16(le16_to_cpu(chan_tlv_out->header.len) + |
| (sizeof(chan_tlv_out->chan_scan_param))); |
| |
| /* |
| * The tlv buffer length is set to the number of bytes |
| * of the between the channel tlv pointer and the start |
| * of the tlv buffer. This compensates for any TLVs |
| * that were appended before the channel list. |
| */ |
| scan_cfg_out->tlv_buf_len = (u32) ((u8 *) chan_tlv_out - |
| scan_cfg_out->tlv_buf); |
| |
| /* Add the size of the channel tlv header and the data |
| length */ |
| scan_cfg_out->tlv_buf_len += |
| (sizeof(chan_tlv_out->header) |
| + le16_to_cpu(chan_tlv_out->header.len)); |
| |
| /* Increment the index to the channel tlv we are |
| constructing */ |
| tlv_idx++; |
| |
| /* Count the total scan time per command */ |
| total_scan_time += |
| le16_to_cpu(tmp_chan_list->max_scan_time); |
| |
| done_early = false; |
| |
| /* Stop the loop if the *current* channel is in the |
| 1,6,11 set and we are not filtering on a BSSID |
| or SSID. */ |
| if (!filtered_scan && |
| (tmp_chan_list->chan_number == 1 || |
| tmp_chan_list->chan_number == 6 || |
| tmp_chan_list->chan_number == 11)) |
| done_early = true; |
| |
| /* Increment the tmp pointer to the next channel to |
| be scanned */ |
| tmp_chan_list++; |
| |
| /* Stop the loop if the *next* channel is in the 1,6,11 |
| set. This will cause it to be the only channel |
| scanned on the next interation */ |
| if (!filtered_scan && |
| (tmp_chan_list->chan_number == 1 || |
| tmp_chan_list->chan_number == 6 || |
| tmp_chan_list->chan_number == 11)) |
| done_early = true; |
| } |
| |
| /* The total scan time should be less than scan command timeout |
| value */ |
| if (total_scan_time > MWIFIEX_MAX_TOTAL_SCAN_TIME) { |
| dev_err(priv->adapter->dev, "total scan time %dms" |
| " is over limit (%dms), scan skipped\n", |
| total_scan_time, MWIFIEX_MAX_TOTAL_SCAN_TIME); |
| ret = -1; |
| break; |
| } |
| |
| priv->adapter->scan_channels = start_chan; |
| |
| /* Send the scan command to the firmware with the specified |
| cfg */ |
| ret = mwifiex_send_cmd_async(priv, HostCmd_CMD_802_11_SCAN, |
| HostCmd_ACT_GEN_SET, 0, |
| scan_cfg_out); |
| if (ret) |
| break; |
| } |
| |
| if (ret) |
| return -1; |
| |
| return 0; |
| } |
| |
| /* |
| * This function constructs a scan command configuration structure to use |
| * in scan commands. |
| * |
| * Application layer or other functions can invoke network scanning |
| * with a scan configuration supplied in a user scan configuration structure. |
| * This structure is used as the basis of one or many scan command configuration |
| * commands that are sent to the command processing module and eventually to the |
| * firmware. |
| * |
| * This function creates a scan command configuration structure based on the |
| * following user supplied parameters (if present): |
| * - SSID filter |
| * - BSSID filter |
| * - Number of Probes to be sent |
| * - Channel list |
| * |
| * If the SSID or BSSID filter is not present, the filter is disabled/cleared. |
| * If the number of probes is not set, adapter default setting is used. |
| */ |
| static void |
| mwifiex_config_scan(struct mwifiex_private *priv, |
| const struct mwifiex_user_scan_cfg *user_scan_in, |
| struct mwifiex_scan_cmd_config *scan_cfg_out, |
| struct mwifiex_ie_types_chan_list_param_set **chan_list_out, |
| struct mwifiex_chan_scan_param_set *scan_chan_list, |
| u8 *max_chan_per_scan, u8 *filtered_scan, |
| u8 *scan_current_only) |
| { |
| struct mwifiex_adapter *adapter = priv->adapter; |
| struct mwifiex_ie_types_num_probes *num_probes_tlv; |
| struct mwifiex_ie_types_wildcard_ssid_params *wildcard_ssid_tlv; |
| struct mwifiex_ie_types_rates_param_set *rates_tlv; |
| const u8 zero_mac[ETH_ALEN] = { 0, 0, 0, 0, 0, 0 }; |
| u8 *tlv_pos; |
| u32 num_probes; |
| u32 ssid_len; |
| u32 chan_idx; |
| u32 chan_num; |
| u32 scan_type; |
| u16 scan_dur; |
| u8 channel; |
| u8 radio_type; |
| int i; |
| u8 ssid_filter; |
| u8 rates[MWIFIEX_SUPPORTED_RATES]; |
| u32 rates_size; |
| struct mwifiex_ie_types_htcap *ht_cap; |
| |
| /* The tlv_buf_len is calculated for each scan command. The TLVs added |
| in this routine will be preserved since the routine that sends the |
| command will append channelTLVs at *chan_list_out. The difference |
| between the *chan_list_out and the tlv_buf start will be used to |
| calculate the size of anything we add in this routine. */ |
| scan_cfg_out->tlv_buf_len = 0; |
| |
| /* Running tlv pointer. Assigned to chan_list_out at end of function |
| so later routines know where channels can be added to the command |
| buf */ |
| tlv_pos = scan_cfg_out->tlv_buf; |
| |
| /* Initialize the scan as un-filtered; the flag is later set to TRUE |
| below if a SSID or BSSID filter is sent in the command */ |
| *filtered_scan = false; |
| |
| /* Initialize the scan as not being only on the current channel. If |
| the channel list is customized, only contains one channel, and is |
| the active channel, this is set true and data flow is not halted. */ |
| *scan_current_only = false; |
| |
| if (user_scan_in) { |
| |
| /* Default the ssid_filter flag to TRUE, set false under |
| certain wildcard conditions and qualified by the existence |
| of an SSID list before marking the scan as filtered */ |
| ssid_filter = true; |
| |
| /* Set the BSS type scan filter, use Adapter setting if |
| unset */ |
| scan_cfg_out->bss_mode = |
| (user_scan_in->bss_mode ? (u8) user_scan_in-> |
| bss_mode : (u8) adapter->scan_mode); |
| |
| /* Set the number of probes to send, use Adapter setting |
| if unset */ |
| num_probes = |
| (user_scan_in->num_probes ? user_scan_in-> |
| num_probes : adapter->scan_probes); |
| |
| /* |
| * Set the BSSID filter to the incoming configuration, |
| * if non-zero. If not set, it will remain disabled |
| * (all zeros). |
| */ |
| memcpy(scan_cfg_out->specific_bssid, |
| user_scan_in->specific_bssid, |
| sizeof(scan_cfg_out->specific_bssid)); |
| |
| for (i = 0; i < user_scan_in->num_ssids; i++) { |
| ssid_len = user_scan_in->ssid_list[i].ssid_len; |
| |
| wildcard_ssid_tlv = |
| (struct mwifiex_ie_types_wildcard_ssid_params *) |
| tlv_pos; |
| wildcard_ssid_tlv->header.type = |
| cpu_to_le16(TLV_TYPE_WILDCARDSSID); |
| wildcard_ssid_tlv->header.len = cpu_to_le16( |
| (u16) (ssid_len + sizeof(wildcard_ssid_tlv-> |
| max_ssid_length))); |
| |
| /* |
| * max_ssid_length = 0 tells firmware to perform |
| * specific scan for the SSID filled, whereas |
| * max_ssid_length = IEEE80211_MAX_SSID_LEN is for |
| * wildcard scan. |
| */ |
| if (ssid_len) |
| wildcard_ssid_tlv->max_ssid_length = 0; |
| else |
| wildcard_ssid_tlv->max_ssid_length = |
| IEEE80211_MAX_SSID_LEN; |
| |
| memcpy(wildcard_ssid_tlv->ssid, |
| user_scan_in->ssid_list[i].ssid, ssid_len); |
| |
| tlv_pos += (sizeof(wildcard_ssid_tlv->header) |
| + le16_to_cpu(wildcard_ssid_tlv->header.len)); |
| |
| dev_dbg(adapter->dev, "info: scan: ssid[%d]: %s, %d\n", |
| i, wildcard_ssid_tlv->ssid, |
| wildcard_ssid_tlv->max_ssid_length); |
| |
| /* Empty wildcard ssid with a maxlen will match many or |
| potentially all SSIDs (maxlen == 32), therefore do |
| not treat the scan as |
| filtered. */ |
| if (!ssid_len && wildcard_ssid_tlv->max_ssid_length) |
| ssid_filter = false; |
| } |
| |
| /* |
| * The default number of channels sent in the command is low to |
| * ensure the response buffer from the firmware does not |
| * truncate scan results. That is not an issue with an SSID |
| * or BSSID filter applied to the scan results in the firmware. |
| */ |
| if ((i && ssid_filter) || |
| memcmp(scan_cfg_out->specific_bssid, &zero_mac, |
| sizeof(zero_mac))) |
| *filtered_scan = true; |
| } else { |
| scan_cfg_out->bss_mode = (u8) adapter->scan_mode; |
| num_probes = adapter->scan_probes; |
| } |
| |
| /* |
| * If a specific BSSID or SSID is used, the number of channels in the |
| * scan command will be increased to the absolute maximum. |
| */ |
| if (*filtered_scan) |
| *max_chan_per_scan = MWIFIEX_MAX_CHANNELS_PER_SPECIFIC_SCAN; |
| else |
| *max_chan_per_scan = MWIFIEX_DEF_CHANNELS_PER_SCAN_CMD; |
| |
| /* If the input config or adapter has the number of Probes set, |
| add tlv */ |
| if (num_probes) { |
| |
| dev_dbg(adapter->dev, "info: scan: num_probes = %d\n", |
| num_probes); |
| |
| num_probes_tlv = (struct mwifiex_ie_types_num_probes *) tlv_pos; |
| num_probes_tlv->header.type = cpu_to_le16(TLV_TYPE_NUMPROBES); |
| num_probes_tlv->header.len = |
| cpu_to_le16(sizeof(num_probes_tlv->num_probes)); |
| num_probes_tlv->num_probes = cpu_to_le16((u16) num_probes); |
| |
| tlv_pos += sizeof(num_probes_tlv->header) + |
| le16_to_cpu(num_probes_tlv->header.len); |
| |
| } |
| |
| /* Append rates tlv */ |
| memset(rates, 0, sizeof(rates)); |
| |
| rates_size = mwifiex_get_supported_rates(priv, rates); |
| |
| rates_tlv = (struct mwifiex_ie_types_rates_param_set *) tlv_pos; |
| rates_tlv->header.type = cpu_to_le16(WLAN_EID_SUPP_RATES); |
| rates_tlv->header.len = cpu_to_le16((u16) rates_size); |
| memcpy(rates_tlv->rates, rates, rates_size); |
| tlv_pos += sizeof(rates_tlv->header) + rates_size; |
| |
| dev_dbg(adapter->dev, "info: SCAN_CMD: Rates size = %d\n", rates_size); |
| |
| if (ISSUPP_11NENABLED(priv->adapter->fw_cap_info) && |
| (priv->adapter->config_bands & BAND_GN || |
| priv->adapter->config_bands & BAND_AN)) { |
| ht_cap = (struct mwifiex_ie_types_htcap *) tlv_pos; |
| memset(ht_cap, 0, sizeof(struct mwifiex_ie_types_htcap)); |
| ht_cap->header.type = cpu_to_le16(WLAN_EID_HT_CAPABILITY); |
| ht_cap->header.len = |
| cpu_to_le16(sizeof(struct ieee80211_ht_cap)); |
| radio_type = |
| mwifiex_band_to_radio_type(priv->adapter->config_bands); |
| mwifiex_fill_cap_info(priv, radio_type, ht_cap); |
| tlv_pos += sizeof(struct mwifiex_ie_types_htcap); |
| } |
| |
| /* Append vendor specific IE TLV */ |
| mwifiex_cmd_append_vsie_tlv(priv, MWIFIEX_VSIE_MASK_SCAN, &tlv_pos); |
| |
| /* |
| * Set the output for the channel TLV to the address in the tlv buffer |
| * past any TLVs that were added in this function (SSID, num_probes). |
| * Channel TLVs will be added past this for each scan command, |
| * preserving the TLVs that were previously added. |
| */ |
| *chan_list_out = |
| (struct mwifiex_ie_types_chan_list_param_set *) tlv_pos; |
| |
| if (user_scan_in && user_scan_in->chan_list[0].chan_number) { |
| |
| dev_dbg(adapter->dev, "info: Scan: Using supplied channel list\n"); |
| |
| for (chan_idx = 0; |
| chan_idx < MWIFIEX_USER_SCAN_CHAN_MAX && |
| user_scan_in->chan_list[chan_idx].chan_number; |
| chan_idx++) { |
| |
| channel = user_scan_in->chan_list[chan_idx].chan_number; |
| (scan_chan_list + chan_idx)->chan_number = channel; |
| |
| radio_type = |
| user_scan_in->chan_list[chan_idx].radio_type; |
| (scan_chan_list + chan_idx)->radio_type = radio_type; |
| |
| scan_type = user_scan_in->chan_list[chan_idx].scan_type; |
| |
| if (scan_type == MWIFIEX_SCAN_TYPE_PASSIVE) |
| (scan_chan_list + |
| chan_idx)->chan_scan_mode_bitmap |
| |= MWIFIEX_PASSIVE_SCAN; |
| else |
| (scan_chan_list + |
| chan_idx)->chan_scan_mode_bitmap |
| &= ~MWIFIEX_PASSIVE_SCAN; |
| |
| if (user_scan_in->chan_list[chan_idx].scan_time) { |
| scan_dur = (u16) user_scan_in-> |
| chan_list[chan_idx].scan_time; |
| } else { |
| if (scan_type == MWIFIEX_SCAN_TYPE_PASSIVE) |
| scan_dur = adapter->passive_scan_time; |
| else if (*filtered_scan) |
| scan_dur = adapter->specific_scan_time; |
| else |
| scan_dur = adapter->active_scan_time; |
| } |
| |
| (scan_chan_list + chan_idx)->min_scan_time = |
| cpu_to_le16(scan_dur); |
| (scan_chan_list + chan_idx)->max_scan_time = |
| cpu_to_le16(scan_dur); |
| } |
| |
| /* Check if we are only scanning the current channel */ |
| if ((chan_idx == 1) && |
| (user_scan_in->chan_list[0].chan_number == |
| priv->curr_bss_params.bss_descriptor.channel)) { |
| *scan_current_only = true; |
| dev_dbg(adapter->dev, |
| "info: Scan: Scanning current channel only\n"); |
| } |
| chan_num = chan_idx; |
| } else { |
| dev_dbg(adapter->dev, |
| "info: Scan: Creating full region channel list\n"); |
| chan_num = mwifiex_scan_create_channel_list(priv, user_scan_in, |
| scan_chan_list, |
| *filtered_scan); |
| } |
| |
| /* |
| * In associated state we will reduce the number of channels scanned per |
| * scan command to avoid any traffic delay/loss. This number is decided |
| * based on total number of channels to be scanned due to constraints |
| * of command buffers. |
| */ |
| if (priv->media_connected) { |
| if (chan_num < MWIFIEX_LIMIT_1_CHANNEL_PER_SCAN_CMD) |
| *max_chan_per_scan = 1; |
| else if (chan_num < MWIFIEX_LIMIT_2_CHANNELS_PER_SCAN_CMD) |
| *max_chan_per_scan = 2; |
| else if (chan_num < MWIFIEX_LIMIT_3_CHANNELS_PER_SCAN_CMD) |
| *max_chan_per_scan = 3; |
| } |
| } |
| |
| /* |
| * This function inspects the scan response buffer for pointers to |
| * expected TLVs. |
| * |
| * TLVs can be included at the end of the scan response BSS information. |
| * |
| * Data in the buffer is parsed pointers to TLVs that can potentially |
| * be passed back in the response. |
| */ |
| static void |
| mwifiex_ret_802_11_scan_get_tlv_ptrs(struct mwifiex_adapter *adapter, |
| struct mwifiex_ie_types_data *tlv, |
| u32 tlv_buf_size, u32 req_tlv_type, |
| struct mwifiex_ie_types_data **tlv_data) |
| { |
| struct mwifiex_ie_types_data *current_tlv; |
| u32 tlv_buf_left; |
| u32 tlv_type; |
| u32 tlv_len; |
| |
| current_tlv = tlv; |
| tlv_buf_left = tlv_buf_size; |
| *tlv_data = NULL; |
| |
| dev_dbg(adapter->dev, "info: SCAN_RESP: tlv_buf_size = %d\n", |
| tlv_buf_size); |
| |
| while (tlv_buf_left >= sizeof(struct mwifiex_ie_types_header)) { |
| |
| tlv_type = le16_to_cpu(current_tlv->header.type); |
| tlv_len = le16_to_cpu(current_tlv->header.len); |
| |
| if (sizeof(tlv->header) + tlv_len > tlv_buf_left) { |
| dev_err(adapter->dev, "SCAN_RESP: TLV buffer corrupt\n"); |
| break; |
| } |
| |
| if (req_tlv_type == tlv_type) { |
| switch (tlv_type) { |
| case TLV_TYPE_TSFTIMESTAMP: |
| dev_dbg(adapter->dev, "info: SCAN_RESP: TSF " |
| "timestamp TLV, len = %d\n", tlv_len); |
| *tlv_data = current_tlv; |
| break; |
| case TLV_TYPE_CHANNELBANDLIST: |
| dev_dbg(adapter->dev, "info: SCAN_RESP: channel" |
| " band list TLV, len = %d\n", tlv_len); |
| *tlv_data = current_tlv; |
| break; |
| default: |
| dev_err(adapter->dev, |
| "SCAN_RESP: unhandled TLV = %d\n", |
| tlv_type); |
| /* Give up, this seems corrupted */ |
| return; |
| } |
| } |
| |
| if (*tlv_data) |
| break; |
| |
| |
| tlv_buf_left -= (sizeof(tlv->header) + tlv_len); |
| current_tlv = |
| (struct mwifiex_ie_types_data *) (current_tlv->data + |
| tlv_len); |
| |
| } /* while */ |
| } |
| |
| /* |
| * This function parses provided beacon buffer and updates |
| * respective fields in bss descriptor structure. |
| */ |
| int mwifiex_update_bss_desc_with_ie(struct mwifiex_adapter *adapter, |
| struct mwifiex_bssdescriptor *bss_entry) |
| { |
| int ret = 0; |
| u8 element_id; |
| struct ieee_types_fh_param_set *fh_param_set; |
| struct ieee_types_ds_param_set *ds_param_set; |
| struct ieee_types_cf_param_set *cf_param_set; |
| struct ieee_types_ibss_param_set *ibss_param_set; |
| u8 *current_ptr; |
| u8 *rate; |
| u8 element_len; |
| u16 total_ie_len; |
| u8 bytes_to_copy; |
| u8 rate_size; |
| u8 found_data_rate_ie; |
| u32 bytes_left; |
| struct ieee_types_vendor_specific *vendor_ie; |
| const u8 wpa_oui[4] = { 0x00, 0x50, 0xf2, 0x01 }; |
| const u8 wmm_oui[4] = { 0x00, 0x50, 0xf2, 0x02 }; |
| |
| found_data_rate_ie = false; |
| rate_size = 0; |
| current_ptr = bss_entry->beacon_buf; |
| bytes_left = bss_entry->beacon_buf_size; |
| |
| /* Process variable IE */ |
| while (bytes_left >= 2) { |
| element_id = *current_ptr; |
| element_len = *(current_ptr + 1); |
| total_ie_len = element_len + sizeof(struct ieee_types_header); |
| |
| if (bytes_left < total_ie_len) { |
| dev_err(adapter->dev, "err: InterpretIE: in processing" |
| " IE, bytes left < IE length\n"); |
| return -1; |
| } |
| switch (element_id) { |
| case WLAN_EID_SSID: |
| bss_entry->ssid.ssid_len = element_len; |
| memcpy(bss_entry->ssid.ssid, (current_ptr + 2), |
| element_len); |
| dev_dbg(adapter->dev, |
| "info: InterpretIE: ssid: %-32s\n", |
| bss_entry->ssid.ssid); |
| break; |
| |
| case WLAN_EID_SUPP_RATES: |
| memcpy(bss_entry->data_rates, current_ptr + 2, |
| element_len); |
| memcpy(bss_entry->supported_rates, current_ptr + 2, |
| element_len); |
| rate_size = element_len; |
| found_data_rate_ie = true; |
| break; |
| |
| case WLAN_EID_FH_PARAMS: |
| fh_param_set = |
| (struct ieee_types_fh_param_set *) current_ptr; |
| memcpy(&bss_entry->phy_param_set.fh_param_set, |
| fh_param_set, |
| sizeof(struct ieee_types_fh_param_set)); |
| break; |
| |
| case WLAN_EID_DS_PARAMS: |
| ds_param_set = |
| (struct ieee_types_ds_param_set *) current_ptr; |
| |
| bss_entry->channel = ds_param_set->current_chan; |
| |
| memcpy(&bss_entry->phy_param_set.ds_param_set, |
| ds_param_set, |
| sizeof(struct ieee_types_ds_param_set)); |
| break; |
| |
| case WLAN_EID_CF_PARAMS: |
| cf_param_set = |
| (struct ieee_types_cf_param_set *) current_ptr; |
| memcpy(&bss_entry->ss_param_set.cf_param_set, |
| cf_param_set, |
| sizeof(struct ieee_types_cf_param_set)); |
| break; |
| |
| case WLAN_EID_IBSS_PARAMS: |
| ibss_param_set = |
| (struct ieee_types_ibss_param_set *) |
| current_ptr; |
| memcpy(&bss_entry->ss_param_set.ibss_param_set, |
| ibss_param_set, |
| sizeof(struct ieee_types_ibss_param_set)); |
| break; |
| |
| case WLAN_EID_ERP_INFO: |
| bss_entry->erp_flags = *(current_ptr + 2); |
| break; |
| |
| case WLAN_EID_EXT_SUPP_RATES: |
| /* |
| * Only process extended supported rate |
| * if data rate is already found. |
| * Data rate IE should come before |
| * extended supported rate IE |
| */ |
| if (found_data_rate_ie) { |
| if ((element_len + rate_size) > |
| MWIFIEX_SUPPORTED_RATES) |
| bytes_to_copy = |
| (MWIFIEX_SUPPORTED_RATES - |
| rate_size); |
| else |
| bytes_to_copy = element_len; |
| |
| rate = (u8 *) bss_entry->data_rates; |
| rate += rate_size; |
| memcpy(rate, current_ptr + 2, bytes_to_copy); |
| |
| rate = (u8 *) bss_entry->supported_rates; |
| rate += rate_size; |
| memcpy(rate, current_ptr + 2, bytes_to_copy); |
| } |
| break; |
| |
| case WLAN_EID_VENDOR_SPECIFIC: |
| vendor_ie = (struct ieee_types_vendor_specific *) |
| current_ptr; |
| |
| if (!memcmp |
| (vendor_ie->vend_hdr.oui, wpa_oui, |
| sizeof(wpa_oui))) { |
| bss_entry->bcn_wpa_ie = |
| (struct ieee_types_vendor_specific *) |
| current_ptr; |
| bss_entry->wpa_offset = (u16) |
| (current_ptr - bss_entry->beacon_buf); |
| } else if (!memcmp(vendor_ie->vend_hdr.oui, wmm_oui, |
| sizeof(wmm_oui))) { |
| if (total_ie_len == |
| sizeof(struct ieee_types_wmm_parameter) || |
| total_ie_len == |
| sizeof(struct ieee_types_wmm_info)) |
| /* |
| * Only accept and copy the WMM IE if |
| * it matches the size expected for the |
| * WMM Info IE or the WMM Parameter IE. |
| */ |
| memcpy((u8 *) &bss_entry->wmm_ie, |
| current_ptr, total_ie_len); |
| } |
| break; |
| case WLAN_EID_RSN: |
| bss_entry->bcn_rsn_ie = |
| (struct ieee_types_generic *) current_ptr; |
| bss_entry->rsn_offset = (u16) (current_ptr - |
| bss_entry->beacon_buf); |
| break; |
| case WLAN_EID_BSS_AC_ACCESS_DELAY: |
| bss_entry->bcn_wapi_ie = |
| (struct ieee_types_generic *) current_ptr; |
| bss_entry->wapi_offset = (u16) (current_ptr - |
| bss_entry->beacon_buf); |
| break; |
| case WLAN_EID_HT_CAPABILITY: |
| bss_entry->bcn_ht_cap = (struct ieee80211_ht_cap *) |
| (current_ptr + |
| sizeof(struct ieee_types_header)); |
| bss_entry->ht_cap_offset = (u16) (current_ptr + |
| sizeof(struct ieee_types_header) - |
| bss_entry->beacon_buf); |
| break; |
| case WLAN_EID_HT_OPERATION: |
| bss_entry->bcn_ht_oper = |
| (struct ieee80211_ht_operation *)(current_ptr + |
| sizeof(struct ieee_types_header)); |
| bss_entry->ht_info_offset = (u16) (current_ptr + |
| sizeof(struct ieee_types_header) - |
| bss_entry->beacon_buf); |
| break; |
| case WLAN_EID_BSS_COEX_2040: |
| bss_entry->bcn_bss_co_2040 = current_ptr + |
| sizeof(struct ieee_types_header); |
| bss_entry->bss_co_2040_offset = (u16) (current_ptr + |
| sizeof(struct ieee_types_header) - |
| bss_entry->beacon_buf); |
| break; |
| case WLAN_EID_EXT_CAPABILITY: |
| bss_entry->bcn_ext_cap = current_ptr + |
| sizeof(struct ieee_types_header); |
| bss_entry->ext_cap_offset = (u16) (current_ptr + |
| sizeof(struct ieee_types_header) - |
| bss_entry->beacon_buf); |
| break; |
| default: |
| break; |
| } |
| |
| current_ptr += element_len + 2; |
| |
| /* Need to account for IE ID and IE Len */ |
| bytes_left -= (element_len + 2); |
| |
| } /* while (bytes_left > 2) */ |
| return ret; |
| } |
| |
| /* |
| * This function converts radio type scan parameter to a band configuration |
| * to be used in join command. |
| */ |
| static u8 |
| mwifiex_radio_type_to_band(u8 radio_type) |
| { |
| switch (radio_type) { |
| case HostCmd_SCAN_RADIO_TYPE_A: |
| return BAND_A; |
| case HostCmd_SCAN_RADIO_TYPE_BG: |
| default: |
| return BAND_G; |
| } |
| } |
| |
| /* |
| * This is an internal function used to start a scan based on an input |
| * configuration. |
| * |
| * This uses the input user scan configuration information when provided in |
| * order to send the appropriate scan commands to firmware to populate or |
| * update the internal driver scan table. |
| */ |
| static int mwifiex_scan_networks(struct mwifiex_private *priv, |
| const struct mwifiex_user_scan_cfg *user_scan_in) |
| { |
| int ret = 0; |
| struct mwifiex_adapter *adapter = priv->adapter; |
| struct cmd_ctrl_node *cmd_node; |
| union mwifiex_scan_cmd_config_tlv *scan_cfg_out; |
| struct mwifiex_ie_types_chan_list_param_set *chan_list_out; |
| u32 buf_size; |
| struct mwifiex_chan_scan_param_set *scan_chan_list; |
| u8 filtered_scan; |
| u8 scan_current_chan_only; |
| u8 max_chan_per_scan; |
| unsigned long flags; |
| |
| if (adapter->scan_processing) { |
| dev_dbg(adapter->dev, "cmd: Scan already in process...\n"); |
| return ret; |
| } |
| |
| spin_lock_irqsave(&adapter->mwifiex_cmd_lock, flags); |
| adapter->scan_processing = true; |
| spin_unlock_irqrestore(&adapter->mwifiex_cmd_lock, flags); |
| |
| if (priv->scan_block) { |
| dev_dbg(adapter->dev, |
| "cmd: Scan is blocked during association...\n"); |
| return ret; |
| } |
| |
| scan_cfg_out = kzalloc(sizeof(union mwifiex_scan_cmd_config_tlv), |
| GFP_KERNEL); |
| if (!scan_cfg_out) { |
| dev_err(adapter->dev, "failed to alloc scan_cfg_out\n"); |
| return -ENOMEM; |
| } |
| |
| buf_size = sizeof(struct mwifiex_chan_scan_param_set) * |
| MWIFIEX_USER_SCAN_CHAN_MAX; |
| scan_chan_list = kzalloc(buf_size, GFP_KERNEL); |
| if (!scan_chan_list) { |
| dev_err(adapter->dev, "failed to alloc scan_chan_list\n"); |
| kfree(scan_cfg_out); |
| return -ENOMEM; |
| } |
| |
| mwifiex_config_scan(priv, user_scan_in, &scan_cfg_out->config, |
| &chan_list_out, scan_chan_list, &max_chan_per_scan, |
| &filtered_scan, &scan_current_chan_only); |
| |
| ret = mwifiex_scan_channel_list(priv, max_chan_per_scan, filtered_scan, |
| &scan_cfg_out->config, chan_list_out, |
| scan_chan_list); |
| |
| /* Get scan command from scan_pending_q and put to cmd_pending_q */ |
| if (!ret) { |
| spin_lock_irqsave(&adapter->scan_pending_q_lock, flags); |
| if (!list_empty(&adapter->scan_pending_q)) { |
| cmd_node = list_first_entry(&adapter->scan_pending_q, |
| struct cmd_ctrl_node, list); |
| list_del(&cmd_node->list); |
| spin_unlock_irqrestore(&adapter->scan_pending_q_lock, |
| flags); |
| adapter->cmd_queued = cmd_node; |
| mwifiex_insert_cmd_to_pending_q(adapter, cmd_node, |
| true); |
| } else { |
| spin_unlock_irqrestore(&adapter->scan_pending_q_lock, |
| flags); |
| } |
| } else { |
| spin_lock_irqsave(&adapter->mwifiex_cmd_lock, flags); |
| adapter->scan_processing = true; |
| spin_unlock_irqrestore(&adapter->mwifiex_cmd_lock, flags); |
| } |
| |
| kfree(scan_cfg_out); |
| kfree(scan_chan_list); |
| return ret; |
| } |
| |
| /* |
| * Sends IOCTL request to start a scan with user configurations. |
| * |
| * This function allocates the IOCTL request buffer, fills it |
| * with requisite parameters and calls the IOCTL handler. |
| * |
| * Upon completion, it also generates a wireless event to notify |
| * applications. |
| */ |
| int mwifiex_set_user_scan_ioctl(struct mwifiex_private *priv, |
| struct mwifiex_user_scan_cfg *scan_req) |
| { |
| int status; |
| |
| status = mwifiex_scan_networks(priv, scan_req); |
| queue_work(priv->adapter->workqueue, &priv->adapter->main_work); |
| |
| return status; |
| } |
| |
| /* |
| * This function prepares a scan command to be sent to the firmware. |
| * |
| * This uses the scan command configuration sent to the command processing |
| * module in command preparation stage to configure a scan command structure |
| * to send to firmware. |
| * |
| * The fixed fields specifying the BSS type and BSSID filters as well as a |
| * variable number/length of TLVs are sent in the command to firmware. |
| * |
| * Preparation also includes - |
| * - Setting command ID, and proper size |
| * - Ensuring correct endian-ness |
| */ |
| int mwifiex_cmd_802_11_scan(struct host_cmd_ds_command *cmd, |
| struct mwifiex_scan_cmd_config *scan_cfg) |
| { |
| struct host_cmd_ds_802_11_scan *scan_cmd = &cmd->params.scan; |
| |
| /* Set fixed field variables in scan command */ |
| scan_cmd->bss_mode = scan_cfg->bss_mode; |
| memcpy(scan_cmd->bssid, scan_cfg->specific_bssid, |
| sizeof(scan_cmd->bssid)); |
| memcpy(scan_cmd->tlv_buffer, scan_cfg->tlv_buf, scan_cfg->tlv_buf_len); |
| |
| cmd->command = cpu_to_le16(HostCmd_CMD_802_11_SCAN); |
| |
| /* Size is equal to the sizeof(fixed portions) + the TLV len + header */ |
| cmd->size = cpu_to_le16((u16) (sizeof(scan_cmd->bss_mode) |
| + sizeof(scan_cmd->bssid) |
| + scan_cfg->tlv_buf_len + S_DS_GEN)); |
| |
| return 0; |
| } |
| |
| /* |
| * This function checks compatibility of requested network with current |
| * driver settings. |
| */ |
| int mwifiex_check_network_compatibility(struct mwifiex_private *priv, |
| struct mwifiex_bssdescriptor *bss_desc) |
| { |
| int ret = -1; |
| |
| if (!bss_desc) |
| return -1; |
| |
| if ((mwifiex_get_cfp(priv, (u8) bss_desc->bss_band, |
| (u16) bss_desc->channel, 0))) { |
| switch (priv->bss_mode) { |
| case NL80211_IFTYPE_STATION: |
| case NL80211_IFTYPE_ADHOC: |
| ret = mwifiex_is_network_compatible(priv, bss_desc, |
| priv->bss_mode); |
| if (ret) |
| dev_err(priv->adapter->dev, "cannot find ssid " |
| "%s\n", bss_desc->ssid.ssid); |
| break; |
| default: |
| ret = 0; |
| } |
| } |
| |
| return ret; |
| } |
| |
| static int mwifiex_update_curr_bss_params(struct mwifiex_private *priv, |
| struct cfg80211_bss *bss) |
| { |
| struct mwifiex_bssdescriptor *bss_desc; |
| int ret; |
| unsigned long flags; |
| |
| /* Allocate and fill new bss descriptor */ |
| bss_desc = kzalloc(sizeof(struct mwifiex_bssdescriptor), |
| GFP_KERNEL); |
| if (!bss_desc) { |
| dev_err(priv->adapter->dev, " failed to alloc bss_desc\n"); |
| return -ENOMEM; |
| } |
| |
| ret = mwifiex_fill_new_bss_desc(priv, bss, bss_desc); |
| if (ret) |
| goto done; |
| |
| ret = mwifiex_check_network_compatibility(priv, bss_desc); |
| if (ret) |
| goto done; |
| |
| /* Update current bss descriptor parameters */ |
| spin_lock_irqsave(&priv->curr_bcn_buf_lock, flags); |
| priv->curr_bss_params.bss_descriptor.bcn_wpa_ie = NULL; |
| priv->curr_bss_params.bss_descriptor.wpa_offset = 0; |
| priv->curr_bss_params.bss_descriptor.bcn_rsn_ie = NULL; |
| priv->curr_bss_params.bss_descriptor.rsn_offset = 0; |
| priv->curr_bss_params.bss_descriptor.bcn_wapi_ie = NULL; |
| priv->curr_bss_params.bss_descriptor.wapi_offset = 0; |
| priv->curr_bss_params.bss_descriptor.bcn_ht_cap = NULL; |
| priv->curr_bss_params.bss_descriptor.ht_cap_offset = |
| 0; |
| priv->curr_bss_params.bss_descriptor.bcn_ht_oper = NULL; |
| priv->curr_bss_params.bss_descriptor.ht_info_offset = |
| 0; |
| priv->curr_bss_params.bss_descriptor.bcn_bss_co_2040 = |
| NULL; |
| priv->curr_bss_params.bss_descriptor. |
| bss_co_2040_offset = 0; |
| priv->curr_bss_params.bss_descriptor.bcn_ext_cap = NULL; |
| priv->curr_bss_params.bss_descriptor.ext_cap_offset = 0; |
| priv->curr_bss_params.bss_descriptor.beacon_buf = NULL; |
| priv->curr_bss_params.bss_descriptor.beacon_buf_size = |
| 0; |
| |
| /* Make a copy of current BSSID descriptor */ |
| memcpy(&priv->curr_bss_params.bss_descriptor, bss_desc, |
| sizeof(priv->curr_bss_params.bss_descriptor)); |
| mwifiex_save_curr_bcn(priv); |
| spin_unlock_irqrestore(&priv->curr_bcn_buf_lock, flags); |
| |
| done: |
| kfree(bss_desc); |
| return 0; |
| } |
| |
| /* |
| * This function handles the command response of scan. |
| * |
| * The response buffer for the scan command has the following |
| * memory layout: |
| * |
| * .-------------------------------------------------------------. |
| * | Header (4 * sizeof(t_u16)): Standard command response hdr | |
| * .-------------------------------------------------------------. |
| * | BufSize (t_u16) : sizeof the BSS Description data | |
| * .-------------------------------------------------------------. |
| * | NumOfSet (t_u8) : Number of BSS Descs returned | |
| * .-------------------------------------------------------------. |
| * | BSSDescription data (variable, size given in BufSize) | |
| * .-------------------------------------------------------------. |
| * | TLV data (variable, size calculated using Header->Size, | |
| * | BufSize and sizeof the fixed fields above) | |
| * .-------------------------------------------------------------. |
| */ |
| int mwifiex_ret_802_11_scan(struct mwifiex_private *priv, |
| struct host_cmd_ds_command *resp) |
| { |
| int ret = 0; |
| struct mwifiex_adapter *adapter = priv->adapter; |
| struct cmd_ctrl_node *cmd_node; |
| struct host_cmd_ds_802_11_scan_rsp *scan_rsp; |
| struct mwifiex_ie_types_data *tlv_data; |
| struct mwifiex_ie_types_tsf_timestamp *tsf_tlv; |
| u8 *bss_info; |
| u32 scan_resp_size; |
| u32 bytes_left; |
| u32 idx; |
| u32 tlv_buf_size; |
| struct mwifiex_chan_freq_power *cfp; |
| struct mwifiex_ie_types_chan_band_list_param_set *chan_band_tlv; |
| struct chan_band_param_set *chan_band; |
| u8 is_bgscan_resp; |
| unsigned long flags; |
| struct cfg80211_bss *bss; |
| |
| is_bgscan_resp = (le16_to_cpu(resp->command) |
| == HostCmd_CMD_802_11_BG_SCAN_QUERY); |
| if (is_bgscan_resp) |
| scan_rsp = &resp->params.bg_scan_query_resp.scan_resp; |
| else |
| scan_rsp = &resp->params.scan_resp; |
| |
| |
| if (scan_rsp->number_of_sets > MWIFIEX_MAX_AP) { |
| dev_err(adapter->dev, "SCAN_RESP: too many AP returned (%d)\n", |
| scan_rsp->number_of_sets); |
| ret = -1; |
| goto done; |
| } |
| |
| bytes_left = le16_to_cpu(scan_rsp->bss_descript_size); |
| dev_dbg(adapter->dev, "info: SCAN_RESP: bss_descript_size %d\n", |
| bytes_left); |
| |
| scan_resp_size = le16_to_cpu(resp->size); |
| |
| dev_dbg(adapter->dev, |
| "info: SCAN_RESP: returned %d APs before parsing\n", |
| scan_rsp->number_of_sets); |
| |
| bss_info = scan_rsp->bss_desc_and_tlv_buffer; |
| |
| /* |
| * The size of the TLV buffer is equal to the entire command response |
| * size (scan_resp_size) minus the fixed fields (sizeof()'s), the |
| * BSS Descriptions (bss_descript_size as bytesLef) and the command |
| * response header (S_DS_GEN) |
| */ |
| tlv_buf_size = scan_resp_size - (bytes_left |
| + sizeof(scan_rsp->bss_descript_size) |
| + sizeof(scan_rsp->number_of_sets) |
| + S_DS_GEN); |
| |
| tlv_data = (struct mwifiex_ie_types_data *) (scan_rsp-> |
| bss_desc_and_tlv_buffer + |
| bytes_left); |
| |
| /* Search the TLV buffer space in the scan response for any valid |
| TLVs */ |
| mwifiex_ret_802_11_scan_get_tlv_ptrs(adapter, tlv_data, tlv_buf_size, |
| TLV_TYPE_TSFTIMESTAMP, |
| (struct mwifiex_ie_types_data **) |
| &tsf_tlv); |
| |
| /* Search the TLV buffer space in the scan response for any valid |
| TLVs */ |
| mwifiex_ret_802_11_scan_get_tlv_ptrs(adapter, tlv_data, tlv_buf_size, |
| TLV_TYPE_CHANNELBANDLIST, |
| (struct mwifiex_ie_types_data **) |
| &chan_band_tlv); |
| |
| for (idx = 0; idx < scan_rsp->number_of_sets && bytes_left; idx++) { |
| u8 bssid[ETH_ALEN]; |
| s32 rssi; |
| const u8 *ie_buf; |
| size_t ie_len; |
| u16 channel = 0; |
| u64 fw_tsf = 0; |
| u16 beacon_size = 0; |
| u32 curr_bcn_bytes; |
| u32 freq; |
| u16 beacon_period; |
| u16 cap_info_bitmap; |
| u8 *current_ptr; |
| u64 timestamp; |
| struct mwifiex_bcn_param *bcn_param; |
| struct mwifiex_bss_priv *bss_priv; |
| |
| if (bytes_left >= sizeof(beacon_size)) { |
| /* Extract & convert beacon size from command buffer */ |
| memcpy(&beacon_size, bss_info, sizeof(beacon_size)); |
| bytes_left -= sizeof(beacon_size); |
| bss_info += sizeof(beacon_size); |
| } |
| |
| if (!beacon_size || beacon_size > bytes_left) { |
| bss_info += bytes_left; |
| bytes_left = 0; |
| return -1; |
| } |
| |
| /* Initialize the current working beacon pointer for this BSS |
| * iteration */ |
| current_ptr = bss_info; |
| |
| /* Advance the return beacon pointer past the current beacon */ |
| bss_info += beacon_size; |
| bytes_left -= beacon_size; |
| |
| curr_bcn_bytes = beacon_size; |
| |
| /* |
| * First 5 fields are bssid, RSSI, time stamp, beacon interval, |
| * and capability information |
| */ |
| if (curr_bcn_bytes < sizeof(struct mwifiex_bcn_param)) { |
| dev_err(adapter->dev, |
| "InterpretIE: not enough bytes left\n"); |
| continue; |
| } |
| bcn_param = (struct mwifiex_bcn_param *)current_ptr; |
| current_ptr += sizeof(*bcn_param); |
| curr_bcn_bytes -= sizeof(*bcn_param); |
| |
| memcpy(bssid, bcn_param->bssid, ETH_ALEN); |
| |
| rssi = (s32) bcn_param->rssi; |
| rssi = (-rssi) * 100; /* Convert dBm to mBm */ |
| dev_dbg(adapter->dev, "info: InterpretIE: RSSI=%d\n", rssi); |
| |
| timestamp = le64_to_cpu(bcn_param->timestamp); |
| beacon_period = le16_to_cpu(bcn_param->beacon_period); |
| |
| cap_info_bitmap = le16_to_cpu(bcn_param->cap_info_bitmap); |
| dev_dbg(adapter->dev, "info: InterpretIE: capabilities=0x%X\n", |
| cap_info_bitmap); |
| |
| /* Rest of the current buffer are IE's */ |
| ie_buf = current_ptr; |
| ie_len = curr_bcn_bytes; |
| dev_dbg(adapter->dev, |
| "info: InterpretIE: IELength for this AP = %d\n", |
| curr_bcn_bytes); |
| |
| while (curr_bcn_bytes >= sizeof(struct ieee_types_header)) { |
| u8 element_id, element_len; |
| |
| element_id = *current_ptr; |
| element_len = *(current_ptr + 1); |
| if (curr_bcn_bytes < element_len + |
| sizeof(struct ieee_types_header)) { |
| dev_err(priv->adapter->dev, |
| "%s: bytes left < IE length\n", |
| __func__); |
| goto done; |
| } |
| if (element_id == WLAN_EID_DS_PARAMS) { |
| channel = *(current_ptr + sizeof(struct ieee_types_header)); |
| break; |
| } |
| |
| current_ptr += element_len + |
| sizeof(struct ieee_types_header); |
| curr_bcn_bytes -= element_len + |
| sizeof(struct ieee_types_header); |
| } |
| |
| /* |
| * If the TSF TLV was appended to the scan results, save this |
| * entry's TSF value in the fw_tsf field. It is the firmware's |
| * TSF value at the time the beacon or probe response was |
| * received. |
| */ |
| if (tsf_tlv) |
| memcpy(&fw_tsf, &tsf_tlv->tsf_data[idx * TSF_DATA_SIZE], |
| sizeof(fw_tsf)); |
| |
| if (channel) { |
| struct ieee80211_channel *chan; |
| u8 band; |
| |
| band = BAND_G; |
| if (chan_band_tlv) { |
| chan_band = |
| &chan_band_tlv->chan_band_param[idx]; |
| band = mwifiex_radio_type_to_band( |
| chan_band->radio_type |
| & (BIT(0) | BIT(1))); |
| } |
| |
| cfp = mwifiex_get_cfp(priv, band, channel, 0); |
| |
| freq = cfp ? cfp->freq : 0; |
| |
| chan = ieee80211_get_channel(priv->wdev->wiphy, freq); |
| |
| if (chan && !(chan->flags & IEEE80211_CHAN_DISABLED)) { |
| bss = cfg80211_inform_bss(priv->wdev->wiphy, |
| chan, bssid, timestamp, |
| cap_info_bitmap, beacon_period, |
| ie_buf, ie_len, rssi, GFP_KERNEL); |
| bss_priv = (struct mwifiex_bss_priv *)bss->priv; |
| bss_priv->band = band; |
| bss_priv->fw_tsf = fw_tsf; |
| if (priv->media_connected && |
| !memcmp(bssid, |
| priv->curr_bss_params.bss_descriptor |
| .mac_address, ETH_ALEN)) |
| mwifiex_update_curr_bss_params(priv, |
| bss); |
| cfg80211_put_bss(bss); |
| } |
| } else { |
| dev_dbg(adapter->dev, "missing BSS channel IE\n"); |
| } |
| } |
| |
| spin_lock_irqsave(&adapter->scan_pending_q_lock, flags); |
| if (list_empty(&adapter->scan_pending_q)) { |
| spin_unlock_irqrestore(&adapter->scan_pending_q_lock, flags); |
| spin_lock_irqsave(&adapter->mwifiex_cmd_lock, flags); |
| adapter->scan_processing = false; |
| spin_unlock_irqrestore(&adapter->mwifiex_cmd_lock, flags); |
| |
| /* Need to indicate IOCTL complete */ |
| if (adapter->curr_cmd->wait_q_enabled) { |
| adapter->cmd_wait_q.status = 0; |
| mwifiex_complete_cmd(adapter, adapter->curr_cmd); |
| } |
| if (priv->report_scan_result) |
| priv->report_scan_result = false; |
| if (priv->scan_pending_on_block) { |
| priv->scan_pending_on_block = false; |
| up(&priv->async_sem); |
| } |
| |
| if (priv->user_scan_cfg) { |
| dev_dbg(priv->adapter->dev, |
| "info: %s: sending scan results\n", __func__); |
| cfg80211_scan_done(priv->scan_request, 0); |
| priv->scan_request = NULL; |
| kfree(priv->user_scan_cfg); |
| priv->user_scan_cfg = NULL; |
| } |
| } else { |
| if (!mwifiex_wmm_lists_empty(adapter)) { |
| spin_unlock_irqrestore(&adapter->scan_pending_q_lock, |
| flags); |
| adapter->scan_delay_cnt = 1; |
| mod_timer(&priv->scan_delay_timer, jiffies + |
| msecs_to_jiffies(MWIFIEX_SCAN_DELAY_MSEC)); |
| } else { |
| /* Get scan command from scan_pending_q and put to |
| cmd_pending_q */ |
| cmd_node = list_first_entry(&adapter->scan_pending_q, |
| struct cmd_ctrl_node, list); |
| list_del(&cmd_node->list); |
| spin_unlock_irqrestore(&adapter->scan_pending_q_lock, |
| flags); |
| mwifiex_insert_cmd_to_pending_q(adapter, cmd_node, |
| true); |
| } |
| } |
| |
| done: |
| return ret; |
| } |
| |
| /* |
| * This function prepares command for background scan query. |
| * |
| * Preparation includes - |
| * - Setting command ID and proper size |
| * - Setting background scan flush parameter |
| * - Ensuring correct endian-ness |
| */ |
| int mwifiex_cmd_802_11_bg_scan_query(struct host_cmd_ds_command *cmd) |
| { |
| struct host_cmd_ds_802_11_bg_scan_query *bg_query = |
| &cmd->params.bg_scan_query; |
| |
| cmd->command = cpu_to_le16(HostCmd_CMD_802_11_BG_SCAN_QUERY); |
| cmd->size = cpu_to_le16(sizeof(struct host_cmd_ds_802_11_bg_scan_query) |
| + S_DS_GEN); |
| |
| bg_query->flush = 1; |
| |
| return 0; |
| } |
| |
| /* |
| * This function inserts scan command node to the scan pending queue. |
| */ |
| void |
| mwifiex_queue_scan_cmd(struct mwifiex_private *priv, |
| struct cmd_ctrl_node *cmd_node) |
| { |
| struct mwifiex_adapter *adapter = priv->adapter; |
| unsigned long flags; |
| |
| cmd_node->wait_q_enabled = true; |
| cmd_node->condition = &adapter->scan_wait_q_woken; |
| spin_lock_irqsave(&adapter->scan_pending_q_lock, flags); |
| list_add_tail(&cmd_node->list, &adapter->scan_pending_q); |
| spin_unlock_irqrestore(&adapter->scan_pending_q_lock, flags); |
| } |
| |
| /* |
| * This function sends a scan command for all available channels to the |
| * firmware, filtered on a specific SSID. |
| */ |
| static int mwifiex_scan_specific_ssid(struct mwifiex_private *priv, |
| struct cfg80211_ssid *req_ssid) |
| { |
| struct mwifiex_adapter *adapter = priv->adapter; |
| int ret = 0; |
| struct mwifiex_user_scan_cfg *scan_cfg; |
| |
| if (!req_ssid) |
| return -1; |
| |
| if (adapter->scan_processing) { |
| dev_dbg(adapter->dev, "cmd: Scan already in process...\n"); |
| return ret; |
| } |
| |
| if (priv->scan_block) { |
| dev_dbg(adapter->dev, |
| "cmd: Scan is blocked during association...\n"); |
| return ret; |
| } |
| |
| scan_cfg = kzalloc(sizeof(struct mwifiex_user_scan_cfg), GFP_KERNEL); |
| if (!scan_cfg) { |
| dev_err(adapter->dev, "failed to alloc scan_cfg\n"); |
| return -ENOMEM; |
| } |
| |
| scan_cfg->ssid_list = req_ssid; |
| scan_cfg->num_ssids = 1; |
| |
| ret = mwifiex_scan_networks(priv, scan_cfg); |
| |
| kfree(scan_cfg); |
| return ret; |
| } |
| |
| /* |
| * Sends IOCTL request to start a scan. |
| * |
| * This function allocates the IOCTL request buffer, fills it |
| * with requisite parameters and calls the IOCTL handler. |
| * |
| * Scan command can be issued for both normal scan and specific SSID |
| * scan, depending upon whether an SSID is provided or not. |
| */ |
| int mwifiex_request_scan(struct mwifiex_private *priv, |
| struct cfg80211_ssid *req_ssid) |
| { |
| int ret; |
| |
| if (down_interruptible(&priv->async_sem)) { |
| dev_err(priv->adapter->dev, "%s: acquire semaphore\n", |
| __func__); |
| return -1; |
| } |
| priv->scan_pending_on_block = true; |
| |
| priv->adapter->scan_wait_q_woken = false; |
| |
| if (req_ssid && req_ssid->ssid_len != 0) |
| /* Specific SSID scan */ |
| ret = mwifiex_scan_specific_ssid(priv, req_ssid); |
| else |
| /* Normal scan */ |
| ret = mwifiex_scan_networks(priv, NULL); |
| |
| if (!ret) |
| ret = mwifiex_wait_queue_complete(priv->adapter); |
| |
| if (ret == -1) { |
| priv->scan_pending_on_block = false; |
| up(&priv->async_sem); |
| } |
| |
| return ret; |
| } |
| |
| /* |
| * This function appends the vendor specific IE TLV to a buffer. |
| */ |
| int |
| mwifiex_cmd_append_vsie_tlv(struct mwifiex_private *priv, |
| u16 vsie_mask, u8 **buffer) |
| { |
| int id, ret_len = 0; |
| struct mwifiex_ie_types_vendor_param_set *vs_param_set; |
| |
| if (!buffer) |
| return 0; |
| if (!(*buffer)) |
| return 0; |
| |
| /* |
| * Traverse through the saved vendor specific IE array and append |
| * the selected(scan/assoc/adhoc) IE as TLV to the command |
| */ |
| for (id = 0; id < MWIFIEX_MAX_VSIE_NUM; id++) { |
| if (priv->vs_ie[id].mask & vsie_mask) { |
| vs_param_set = |
| (struct mwifiex_ie_types_vendor_param_set *) |
| *buffer; |
| vs_param_set->header.type = |
| cpu_to_le16(TLV_TYPE_PASSTHROUGH); |
| vs_param_set->header.len = |
| cpu_to_le16((((u16) priv->vs_ie[id].ie[1]) |
| & 0x00FF) + 2); |
| memcpy(vs_param_set->ie, priv->vs_ie[id].ie, |
| le16_to_cpu(vs_param_set->header.len)); |
| *buffer += le16_to_cpu(vs_param_set->header.len) + |
| sizeof(struct mwifiex_ie_types_header); |
| ret_len += le16_to_cpu(vs_param_set->header.len) + |
| sizeof(struct mwifiex_ie_types_header); |
| } |
| } |
| return ret_len; |
| } |
| |
| /* |
| * This function saves a beacon buffer of the current BSS descriptor. |
| * |
| * The current beacon buffer is saved so that it can be restored in the |
| * following cases that makes the beacon buffer not to contain the current |
| * ssid's beacon buffer. |
| * - The current ssid was not found somehow in the last scan. |
| * - The current ssid was the last entry of the scan table and overloaded. |
| */ |
| void |
| mwifiex_save_curr_bcn(struct mwifiex_private *priv) |
| { |
| struct mwifiex_bssdescriptor *curr_bss = |
| &priv->curr_bss_params.bss_descriptor; |
| |
| if (!curr_bss->beacon_buf_size) |
| return; |
| |
| /* allocate beacon buffer at 1st time; or if it's size has changed */ |
| if (!priv->curr_bcn_buf || |
| priv->curr_bcn_size != curr_bss->beacon_buf_size) { |
| priv->curr_bcn_size = curr_bss->beacon_buf_size; |
| |
| kfree(priv->curr_bcn_buf); |
| priv->curr_bcn_buf = kmalloc(curr_bss->beacon_buf_size, |
| GFP_ATOMIC); |
| if (!priv->curr_bcn_buf) { |
| dev_err(priv->adapter->dev, |
| "failed to alloc curr_bcn_buf\n"); |
| return; |
| } |
| } |
| |
| memcpy(priv->curr_bcn_buf, curr_bss->beacon_buf, |
| curr_bss->beacon_buf_size); |
| dev_dbg(priv->adapter->dev, "info: current beacon saved %d\n", |
| priv->curr_bcn_size); |
| |
| curr_bss->beacon_buf = priv->curr_bcn_buf; |
| |
| /* adjust the pointers in the current BSS descriptor */ |
| if (curr_bss->bcn_wpa_ie) |
| curr_bss->bcn_wpa_ie = |
| (struct ieee_types_vendor_specific *) |
| (curr_bss->beacon_buf + |
| curr_bss->wpa_offset); |
| |
| if (curr_bss->bcn_rsn_ie) |
| curr_bss->bcn_rsn_ie = (struct ieee_types_generic *) |
| (curr_bss->beacon_buf + |
| curr_bss->rsn_offset); |
| |
| if (curr_bss->bcn_ht_cap) |
| curr_bss->bcn_ht_cap = (struct ieee80211_ht_cap *) |
| (curr_bss->beacon_buf + |
| curr_bss->ht_cap_offset); |
| |
| if (curr_bss->bcn_ht_oper) |
| curr_bss->bcn_ht_oper = (struct ieee80211_ht_operation *) |
| (curr_bss->beacon_buf + |
| curr_bss->ht_info_offset); |
| |
| if (curr_bss->bcn_bss_co_2040) |
| curr_bss->bcn_bss_co_2040 = |
| (curr_bss->beacon_buf + curr_bss->bss_co_2040_offset); |
| |
| if (curr_bss->bcn_ext_cap) |
| curr_bss->bcn_ext_cap = curr_bss->beacon_buf + |
| curr_bss->ext_cap_offset; |
| } |
| |
| /* |
| * This function frees the current BSS descriptor beacon buffer. |
| */ |
| void |
| mwifiex_free_curr_bcn(struct mwifiex_private *priv) |
| { |
| kfree(priv->curr_bcn_buf); |
| priv->curr_bcn_buf = NULL; |
| } |