2009-08-06 21:25:28 +08:00
|
|
|
/*
|
|
|
|
* This file is part of wl1271
|
|
|
|
*
|
2010-03-26 18:53:21 +08:00
|
|
|
* Copyright (C) 2009-2010 Nokia Corporation
|
2009-08-06 21:25:28 +08:00
|
|
|
*
|
|
|
|
* Contact: Luciano Coelho <luciano.coelho@nokia.com>
|
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU General Public License
|
|
|
|
* version 2 as published by the Free Software Foundation.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful, but
|
|
|
|
* WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
* General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
|
|
|
* along with this program; if not, write to the Free Software
|
|
|
|
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA
|
|
|
|
* 02110-1301 USA
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <linux/module.h>
|
|
|
|
#include <linux/platform_device.h>
|
|
|
|
#include <linux/spi/spi.h>
|
|
|
|
#include <linux/etherdevice.h>
|
2010-03-18 18:26:36 +08:00
|
|
|
#include <linux/ieee80211.h>
|
include cleanup: Update gfp.h and slab.h includes to prepare for breaking implicit slab.h inclusion from percpu.h
percpu.h is included by sched.h and module.h and thus ends up being
included when building most .c files. percpu.h includes slab.h which
in turn includes gfp.h making everything defined by the two files
universally available and complicating inclusion dependencies.
percpu.h -> slab.h dependency is about to be removed. Prepare for
this change by updating users of gfp and slab facilities include those
headers directly instead of assuming availability. As this conversion
needs to touch large number of source files, the following script is
used as the basis of conversion.
http://userweb.kernel.org/~tj/misc/slabh-sweep.py
The script does the followings.
* Scan files for gfp and slab usages and update includes such that
only the necessary includes are there. ie. if only gfp is used,
gfp.h, if slab is used, slab.h.
* When the script inserts a new include, it looks at the include
blocks and try to put the new include such that its order conforms
to its surrounding. It's put in the include block which contains
core kernel includes, in the same order that the rest are ordered -
alphabetical, Christmas tree, rev-Xmas-tree or at the end if there
doesn't seem to be any matching order.
* If the script can't find a place to put a new include (mostly
because the file doesn't have fitting include block), it prints out
an error message indicating which .h file needs to be added to the
file.
The conversion was done in the following steps.
1. The initial automatic conversion of all .c files updated slightly
over 4000 files, deleting around 700 includes and adding ~480 gfp.h
and ~3000 slab.h inclusions. The script emitted errors for ~400
files.
2. Each error was manually checked. Some didn't need the inclusion,
some needed manual addition while adding it to implementation .h or
embedding .c file was more appropriate for others. This step added
inclusions to around 150 files.
3. The script was run again and the output was compared to the edits
from #2 to make sure no file was left behind.
4. Several build tests were done and a couple of problems were fixed.
e.g. lib/decompress_*.c used malloc/free() wrappers around slab
APIs requiring slab.h to be added manually.
5. The script was run on all .h files but without automatically
editing them as sprinkling gfp.h and slab.h inclusions around .h
files could easily lead to inclusion dependency hell. Most gfp.h
inclusion directives were ignored as stuff from gfp.h was usually
wildly available and often used in preprocessor macros. Each
slab.h inclusion directive was examined and added manually as
necessary.
6. percpu.h was updated not to include slab.h.
7. Build test were done on the following configurations and failures
were fixed. CONFIG_GCOV_KERNEL was turned off for all tests (as my
distributed build env didn't work with gcov compiles) and a few
more options had to be turned off depending on archs to make things
build (like ipr on powerpc/64 which failed due to missing writeq).
* x86 and x86_64 UP and SMP allmodconfig and a custom test config.
* powerpc and powerpc64 SMP allmodconfig
* sparc and sparc64 SMP allmodconfig
* ia64 SMP allmodconfig
* s390 SMP allmodconfig
* alpha SMP allmodconfig
* um on x86_64 SMP allmodconfig
8. percpu.h modifications were reverted so that it could be applied as
a separate patch and serve as bisection point.
Given the fact that I had only a couple of failures from tests on step
6, I'm fairly confident about the coverage of this conversion patch.
If there is a breakage, it's likely to be something in one of the arch
headers which should be easily discoverable easily on most builds of
the specific arch.
Signed-off-by: Tejun Heo <tj@kernel.org>
Guess-its-ok-by: Christoph Lameter <cl@linux-foundation.org>
Cc: Ingo Molnar <mingo@redhat.com>
Cc: Lee Schermerhorn <Lee.Schermerhorn@hp.com>
2010-03-24 16:04:11 +08:00
|
|
|
#include <linux/slab.h>
|
2009-08-06 21:25:28 +08:00
|
|
|
|
2011-11-22 01:25:24 +08:00
|
|
|
#include "wlcore.h"
|
2011-10-07 16:02:42 +08:00
|
|
|
#include "debug.h"
|
2010-11-08 19:20:10 +08:00
|
|
|
#include "io.h"
|
|
|
|
#include "acx.h"
|
2009-08-06 21:25:28 +08:00
|
|
|
#include "wl12xx_80211.h"
|
2010-11-08 19:20:10 +08:00
|
|
|
#include "cmd.h"
|
|
|
|
#include "event.h"
|
2010-10-17 00:08:58 +08:00
|
|
|
#include "tx.h"
|
2012-05-10 17:14:14 +08:00
|
|
|
#include "hw_ops.h"
|
2009-08-06 21:25:28 +08:00
|
|
|
|
2010-04-28 14:49:59 +08:00
|
|
|
#define WL1271_CMD_FAST_POLL_COUNT 50
|
2009-08-06 21:25:28 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* send command to firmware
|
|
|
|
*
|
|
|
|
* @wl: wl struct
|
|
|
|
* @id: command id
|
|
|
|
* @buf: buffer containing the command, must work with dma
|
|
|
|
* @len: length of the buffer
|
|
|
|
*/
|
2009-11-03 02:22:13 +08:00
|
|
|
int wl1271_cmd_send(struct wl1271 *wl, u16 id, void *buf, size_t len,
|
|
|
|
size_t res_len)
|
2009-08-06 21:25:28 +08:00
|
|
|
{
|
|
|
|
struct wl1271_cmd_header *cmd;
|
|
|
|
unsigned long timeout;
|
|
|
|
u32 intr;
|
|
|
|
int ret = 0;
|
2009-11-03 02:22:12 +08:00
|
|
|
u16 status;
|
2010-03-26 18:53:33 +08:00
|
|
|
u16 poll_count = 0;
|
2009-08-06 21:25:28 +08:00
|
|
|
|
|
|
|
cmd = buf;
|
2009-10-15 15:33:29 +08:00
|
|
|
cmd->id = cpu_to_le16(id);
|
2009-08-06 21:25:28 +08:00
|
|
|
cmd->status = 0;
|
|
|
|
|
|
|
|
WARN_ON(len % 4 != 0);
|
2011-03-01 18:27:26 +08:00
|
|
|
WARN_ON(test_bit(WL1271_FLAG_IN_ELP, &wl->flags));
|
2009-08-06 21:25:28 +08:00
|
|
|
|
2010-02-18 19:25:55 +08:00
|
|
|
wl1271_write(wl, wl->cmd_box_addr, buf, len, false);
|
2009-08-06 21:25:28 +08:00
|
|
|
|
2012-04-11 15:15:46 +08:00
|
|
|
/*
|
|
|
|
* TODO: we just need this because one bit is in a different
|
|
|
|
* place. Is there any better way?
|
|
|
|
*/
|
2011-12-13 18:27:22 +08:00
|
|
|
wl->ops->trigger_cmd(wl, wl->cmd_box_addr, buf, len);
|
2009-08-06 21:25:28 +08:00
|
|
|
|
|
|
|
timeout = jiffies + msecs_to_jiffies(WL1271_COMMAND_TIMEOUT);
|
|
|
|
|
2011-11-29 19:38:37 +08:00
|
|
|
intr = wlcore_read_reg(wl, REG_INTERRUPT_NO_CLEAR);
|
2009-08-06 21:25:28 +08:00
|
|
|
while (!(intr & WL1271_ACX_INTR_CMD_COMPLETE)) {
|
|
|
|
if (time_after(jiffies, timeout)) {
|
|
|
|
wl1271_error("command complete timeout");
|
|
|
|
ret = -ETIMEDOUT;
|
2011-04-18 19:15:23 +08:00
|
|
|
goto fail;
|
2009-08-06 21:25:28 +08:00
|
|
|
}
|
|
|
|
|
2010-03-26 18:53:33 +08:00
|
|
|
poll_count++;
|
2010-04-28 14:49:59 +08:00
|
|
|
if (poll_count < WL1271_CMD_FAST_POLL_COUNT)
|
|
|
|
udelay(10);
|
|
|
|
else
|
|
|
|
msleep(1);
|
2009-08-06 21:25:28 +08:00
|
|
|
|
2011-11-29 19:38:37 +08:00
|
|
|
intr = wlcore_read_reg(wl, REG_INTERRUPT_NO_CLEAR);
|
2009-08-06 21:25:28 +08:00
|
|
|
}
|
|
|
|
|
2009-11-03 02:22:10 +08:00
|
|
|
/* read back the status code of the command */
|
2009-11-03 02:22:13 +08:00
|
|
|
if (res_len == 0)
|
|
|
|
res_len = sizeof(struct wl1271_cmd_header);
|
2010-02-18 19:25:55 +08:00
|
|
|
wl1271_read(wl, wl->cmd_box_addr, cmd, res_len, false);
|
2009-11-03 02:22:10 +08:00
|
|
|
|
2009-11-03 02:22:12 +08:00
|
|
|
status = le16_to_cpu(cmd->status);
|
|
|
|
if (status != CMD_STATUS_SUCCESS) {
|
|
|
|
wl1271_error("command execute failure %d", status);
|
2009-11-03 02:22:10 +08:00
|
|
|
ret = -EIO;
|
2011-04-18 19:15:23 +08:00
|
|
|
goto fail;
|
2009-11-03 02:22:10 +08:00
|
|
|
}
|
|
|
|
|
2011-11-29 19:38:37 +08:00
|
|
|
wlcore_write_reg(wl, REG_INTERRUPT_ACK, WL1271_ACX_INTR_CMD_COMPLETE);
|
2011-04-18 19:15:23 +08:00
|
|
|
return 0;
|
2009-08-06 21:25:28 +08:00
|
|
|
|
2011-04-18 19:15:23 +08:00
|
|
|
fail:
|
|
|
|
WARN_ON(1);
|
2011-06-06 19:57:05 +08:00
|
|
|
wl12xx_queue_recovery_work(wl);
|
2009-08-06 21:25:28 +08:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2010-03-26 18:53:20 +08:00
|
|
|
/*
|
|
|
|
* Poll the mailbox event field until any of the bits in the mask is set or a
|
|
|
|
* timeout occurs (WL1271_EVENT_TIMEOUT in msecs)
|
|
|
|
*/
|
2010-11-12 23:15:03 +08:00
|
|
|
static int wl1271_cmd_wait_for_event_or_timeout(struct wl1271 *wl, u32 mask)
|
2010-03-26 18:53:20 +08:00
|
|
|
{
|
2012-03-18 01:41:53 +08:00
|
|
|
u32 *events_vector;
|
|
|
|
u32 event;
|
2010-03-26 18:53:20 +08:00
|
|
|
unsigned long timeout;
|
2012-03-18 01:41:53 +08:00
|
|
|
int ret = 0;
|
|
|
|
|
2012-04-17 14:28:47 +08:00
|
|
|
events_vector = kmalloc(sizeof(*events_vector), GFP_KERNEL | GFP_DMA);
|
|
|
|
if (!events_vector)
|
|
|
|
return -ENOMEM;
|
2010-03-26 18:53:20 +08:00
|
|
|
|
|
|
|
timeout = jiffies + msecs_to_jiffies(WL1271_EVENT_TIMEOUT);
|
|
|
|
|
|
|
|
do {
|
2010-09-21 12:23:31 +08:00
|
|
|
if (time_after(jiffies, timeout)) {
|
2010-11-12 23:15:03 +08:00
|
|
|
wl1271_debug(DEBUG_CMD, "timeout waiting for event %d",
|
|
|
|
(int)mask);
|
2012-03-18 01:41:53 +08:00
|
|
|
ret = -ETIMEDOUT;
|
|
|
|
goto out;
|
2010-09-21 12:23:31 +08:00
|
|
|
}
|
2010-03-26 18:53:20 +08:00
|
|
|
|
|
|
|
msleep(1);
|
|
|
|
|
|
|
|
/* read from both event fields */
|
2012-03-18 01:41:53 +08:00
|
|
|
wl1271_read(wl, wl->mbox_ptr[0], events_vector,
|
|
|
|
sizeof(*events_vector), false);
|
|
|
|
event = *events_vector & mask;
|
|
|
|
wl1271_read(wl, wl->mbox_ptr[1], events_vector,
|
|
|
|
sizeof(*events_vector), false);
|
|
|
|
event |= *events_vector & mask;
|
2010-03-26 18:53:20 +08:00
|
|
|
} while (!event);
|
|
|
|
|
2012-03-18 01:41:53 +08:00
|
|
|
out:
|
|
|
|
kfree(events_vector);
|
|
|
|
return ret;
|
2010-03-26 18:53:20 +08:00
|
|
|
}
|
|
|
|
|
2010-11-12 23:15:03 +08:00
|
|
|
static int wl1271_cmd_wait_for_event(struct wl1271 *wl, u32 mask)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
ret = wl1271_cmd_wait_for_event_or_timeout(wl, mask);
|
|
|
|
if (ret != 0) {
|
2011-06-06 19:57:05 +08:00
|
|
|
wl12xx_queue_recovery_work(wl);
|
2010-11-12 23:15:03 +08:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2011-10-05 17:55:39 +08:00
|
|
|
int wl12xx_cmd_role_enable(struct wl1271 *wl, u8 *addr, u8 role_type,
|
|
|
|
u8 *role_id)
|
2009-08-06 21:25:28 +08:00
|
|
|
{
|
2011-08-14 18:17:07 +08:00
|
|
|
struct wl12xx_cmd_role_enable *cmd;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
wl1271_debug(DEBUG_CMD, "cmd role enable");
|
|
|
|
|
|
|
|
if (WARN_ON(*role_id != WL12XX_INVALID_ROLE_ID))
|
|
|
|
return -EBUSY;
|
|
|
|
|
|
|
|
cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
|
|
|
|
if (!cmd) {
|
|
|
|
ret = -ENOMEM;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* get role id */
|
|
|
|
cmd->role_id = find_first_zero_bit(wl->roles_map, WL12XX_MAX_ROLES);
|
|
|
|
if (cmd->role_id >= WL12XX_MAX_ROLES) {
|
|
|
|
ret = -EBUSY;
|
|
|
|
goto out_free;
|
|
|
|
}
|
|
|
|
|
2011-10-05 17:55:39 +08:00
|
|
|
memcpy(cmd->mac_address, addr, ETH_ALEN);
|
2011-08-14 18:17:07 +08:00
|
|
|
cmd->role_type = role_type;
|
|
|
|
|
|
|
|
ret = wl1271_cmd_send(wl, CMD_ROLE_ENABLE, cmd, sizeof(*cmd), 0);
|
|
|
|
if (ret < 0) {
|
|
|
|
wl1271_error("failed to initiate cmd role enable");
|
|
|
|
goto out_free;
|
|
|
|
}
|
|
|
|
|
|
|
|
__set_bit(cmd->role_id, wl->roles_map);
|
|
|
|
*role_id = cmd->role_id;
|
2009-08-06 21:25:28 +08:00
|
|
|
|
2011-08-14 18:17:07 +08:00
|
|
|
out_free:
|
|
|
|
kfree(cmd);
|
|
|
|
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
int wl12xx_cmd_role_disable(struct wl1271 *wl, u8 *role_id)
|
|
|
|
{
|
|
|
|
struct wl12xx_cmd_role_disable *cmd;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
wl1271_debug(DEBUG_CMD, "cmd role disable");
|
|
|
|
|
|
|
|
if (WARN_ON(*role_id == WL12XX_INVALID_ROLE_ID))
|
|
|
|
return -ENOENT;
|
|
|
|
|
|
|
|
cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
|
|
|
|
if (!cmd) {
|
2009-08-06 21:25:28 +08:00
|
|
|
ret = -ENOMEM;
|
|
|
|
goto out;
|
|
|
|
}
|
2011-08-14 18:17:07 +08:00
|
|
|
cmd->role_id = *role_id;
|
|
|
|
|
|
|
|
ret = wl1271_cmd_send(wl, CMD_ROLE_DISABLE, cmd, sizeof(*cmd), 0);
|
|
|
|
if (ret < 0) {
|
|
|
|
wl1271_error("failed to initiate cmd role disable");
|
|
|
|
goto out_free;
|
|
|
|
}
|
2009-08-06 21:25:28 +08:00
|
|
|
|
2011-08-14 18:17:07 +08:00
|
|
|
__clear_bit(*role_id, wl->roles_map);
|
|
|
|
*role_id = WL12XX_INVALID_ROLE_ID;
|
2009-08-06 21:25:28 +08:00
|
|
|
|
2011-08-14 18:17:07 +08:00
|
|
|
out_free:
|
|
|
|
kfree(cmd);
|
|
|
|
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2011-10-05 17:56:05 +08:00
|
|
|
int wl12xx_allocate_link(struct wl1271 *wl, struct wl12xx_vif *wlvif, u8 *hlid)
|
2011-08-14 18:17:07 +08:00
|
|
|
{
|
2012-02-28 06:41:29 +08:00
|
|
|
unsigned long flags;
|
2011-08-14 18:17:07 +08:00
|
|
|
u8 link = find_first_zero_bit(wl->links_map, WL12XX_MAX_LINKS);
|
|
|
|
if (link >= WL12XX_MAX_LINKS)
|
|
|
|
return -EBUSY;
|
|
|
|
|
2012-02-28 06:41:29 +08:00
|
|
|
/* these bits are used by op_tx */
|
|
|
|
spin_lock_irqsave(&wl->wl_lock, flags);
|
2011-08-14 18:17:07 +08:00
|
|
|
__set_bit(link, wl->links_map);
|
2011-10-05 17:56:05 +08:00
|
|
|
__set_bit(link, wlvif->links_map);
|
2012-02-28 06:41:29 +08:00
|
|
|
spin_unlock_irqrestore(&wl->wl_lock, flags);
|
2011-08-14 18:17:07 +08:00
|
|
|
*hlid = link;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2011-10-05 17:56:05 +08:00
|
|
|
void wl12xx_free_link(struct wl1271 *wl, struct wl12xx_vif *wlvif, u8 *hlid)
|
2011-08-14 18:17:07 +08:00
|
|
|
{
|
2012-02-28 06:41:29 +08:00
|
|
|
unsigned long flags;
|
|
|
|
|
2011-08-14 18:17:07 +08:00
|
|
|
if (*hlid == WL12XX_INVALID_LINK_ID)
|
|
|
|
return;
|
|
|
|
|
2012-02-28 06:41:29 +08:00
|
|
|
/* these bits are used by op_tx */
|
|
|
|
spin_lock_irqsave(&wl->wl_lock, flags);
|
2011-08-14 18:17:07 +08:00
|
|
|
__clear_bit(*hlid, wl->links_map);
|
2011-10-05 17:56:05 +08:00
|
|
|
__clear_bit(*hlid, wlvif->links_map);
|
2012-02-28 06:41:29 +08:00
|
|
|
spin_unlock_irqrestore(&wl->wl_lock, flags);
|
2012-02-28 06:41:30 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* At this point op_tx() will not add more packets to the queues. We
|
|
|
|
* can purge them.
|
|
|
|
*/
|
|
|
|
wl1271_tx_reset_link_queues(wl, *hlid);
|
|
|
|
|
2011-08-14 18:17:07 +08:00
|
|
|
*hlid = WL12XX_INVALID_LINK_ID;
|
|
|
|
}
|
|
|
|
|
2011-10-05 17:55:55 +08:00
|
|
|
static int wl12xx_get_new_session_id(struct wl1271 *wl,
|
|
|
|
struct wl12xx_vif *wlvif)
|
2011-08-14 18:17:20 +08:00
|
|
|
{
|
2011-10-05 17:55:55 +08:00
|
|
|
if (wlvif->session_counter >= SESSION_COUNTER_MAX)
|
|
|
|
wlvif->session_counter = 0;
|
2011-08-14 18:17:20 +08:00
|
|
|
|
2011-10-05 17:55:55 +08:00
|
|
|
wlvif->session_counter++;
|
2011-08-14 18:17:20 +08:00
|
|
|
|
2011-10-05 17:55:55 +08:00
|
|
|
return wlvif->session_counter;
|
2011-08-14 18:17:20 +08:00
|
|
|
}
|
|
|
|
|
2012-05-10 17:13:31 +08:00
|
|
|
static u8 wlcore_get_native_channel_type(u8 nl_channel_type)
|
|
|
|
{
|
|
|
|
switch (nl_channel_type) {
|
|
|
|
case NL80211_CHAN_NO_HT:
|
|
|
|
return WLCORE_CHAN_NO_HT;
|
|
|
|
case NL80211_CHAN_HT20:
|
|
|
|
return WLCORE_CHAN_HT20;
|
|
|
|
case NL80211_CHAN_HT40MINUS:
|
|
|
|
return WLCORE_CHAN_HT40MINUS;
|
|
|
|
case NL80211_CHAN_HT40PLUS:
|
|
|
|
return WLCORE_CHAN_HT40PLUS;
|
|
|
|
default:
|
|
|
|
WARN_ON(1);
|
|
|
|
return WLCORE_CHAN_NO_HT;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-10-11 17:55:44 +08:00
|
|
|
static int wl12xx_cmd_role_start_dev(struct wl1271 *wl,
|
|
|
|
struct wl12xx_vif *wlvif)
|
2011-08-14 18:17:09 +08:00
|
|
|
{
|
|
|
|
struct wl12xx_cmd_role_start *cmd;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
|
|
|
|
if (!cmd) {
|
|
|
|
ret = -ENOMEM;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2011-10-05 17:55:52 +08:00
|
|
|
wl1271_debug(DEBUG_CMD, "cmd role start dev %d", wlvif->dev_role_id);
|
2011-08-14 18:17:09 +08:00
|
|
|
|
2011-10-05 17:55:52 +08:00
|
|
|
cmd->role_id = wlvif->dev_role_id;
|
2011-10-10 16:13:09 +08:00
|
|
|
if (wlvif->band == IEEE80211_BAND_5GHZ)
|
2011-11-29 19:38:37 +08:00
|
|
|
cmd->band = WLCORE_BAND_5GHZ;
|
2011-10-10 16:13:10 +08:00
|
|
|
cmd->channel = wlvif->channel;
|
2011-08-14 18:17:09 +08:00
|
|
|
|
2011-10-05 17:55:57 +08:00
|
|
|
if (wlvif->dev_hlid == WL12XX_INVALID_LINK_ID) {
|
2011-10-05 17:56:05 +08:00
|
|
|
ret = wl12xx_allocate_link(wl, wlvif, &wlvif->dev_hlid);
|
2011-08-14 18:17:09 +08:00
|
|
|
if (ret)
|
|
|
|
goto out_free;
|
|
|
|
}
|
2011-10-05 17:55:57 +08:00
|
|
|
cmd->device.hlid = wlvif->dev_hlid;
|
2012-03-04 16:55:49 +08:00
|
|
|
cmd->device.session = wl12xx_get_new_session_id(wl, wlvif);
|
2011-08-14 18:17:09 +08:00
|
|
|
|
|
|
|
wl1271_debug(DEBUG_CMD, "role start: roleid=%d, hlid=%d, session=%d",
|
|
|
|
cmd->role_id, cmd->device.hlid, cmd->device.session);
|
|
|
|
|
|
|
|
ret = wl1271_cmd_send(wl, CMD_ROLE_START, cmd, sizeof(*cmd), 0);
|
|
|
|
if (ret < 0) {
|
|
|
|
wl1271_error("failed to initiate cmd role enable");
|
|
|
|
goto err_hlid;
|
|
|
|
}
|
|
|
|
|
|
|
|
goto out_free;
|
|
|
|
|
|
|
|
err_hlid:
|
|
|
|
/* clear links on error */
|
2011-10-05 17:56:05 +08:00
|
|
|
wl12xx_free_link(wl, wlvif, &wlvif->dev_hlid);
|
2011-08-14 18:17:09 +08:00
|
|
|
|
|
|
|
out_free:
|
|
|
|
kfree(cmd);
|
|
|
|
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2011-10-11 17:55:44 +08:00
|
|
|
static int wl12xx_cmd_role_stop_dev(struct wl1271 *wl,
|
|
|
|
struct wl12xx_vif *wlvif)
|
2011-08-14 18:17:09 +08:00
|
|
|
{
|
|
|
|
struct wl12xx_cmd_role_stop *cmd;
|
|
|
|
int ret;
|
|
|
|
|
2011-10-05 17:55:57 +08:00
|
|
|
if (WARN_ON(wlvif->dev_hlid == WL12XX_INVALID_LINK_ID))
|
2011-08-14 18:17:09 +08:00
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
|
|
|
|
if (!cmd) {
|
|
|
|
ret = -ENOMEM;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
wl1271_debug(DEBUG_CMD, "cmd role stop dev");
|
|
|
|
|
2011-10-05 17:55:52 +08:00
|
|
|
cmd->role_id = wlvif->dev_role_id;
|
2011-08-14 18:17:09 +08:00
|
|
|
cmd->disc_type = DISCONNECT_IMMEDIATE;
|
|
|
|
cmd->reason = cpu_to_le16(WLAN_REASON_UNSPECIFIED);
|
|
|
|
|
|
|
|
ret = wl1271_cmd_send(wl, CMD_ROLE_STOP, cmd, sizeof(*cmd), 0);
|
|
|
|
if (ret < 0) {
|
|
|
|
wl1271_error("failed to initiate cmd role stop");
|
|
|
|
goto out_free;
|
|
|
|
}
|
|
|
|
|
2012-01-31 17:57:19 +08:00
|
|
|
ret = wl1271_cmd_wait_for_event(wl, ROLE_STOP_COMPLETE_EVENT_ID);
|
2011-08-14 18:17:09 +08:00
|
|
|
if (ret < 0) {
|
|
|
|
wl1271_error("cmd role stop dev event completion error");
|
|
|
|
goto out_free;
|
|
|
|
}
|
|
|
|
|
2011-10-05 17:56:05 +08:00
|
|
|
wl12xx_free_link(wl, wlvif, &wlvif->dev_hlid);
|
2011-08-14 18:17:09 +08:00
|
|
|
|
|
|
|
out_free:
|
|
|
|
kfree(cmd);
|
|
|
|
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2011-10-05 17:55:41 +08:00
|
|
|
int wl12xx_cmd_role_start_sta(struct wl1271 *wl, struct wl12xx_vif *wlvif)
|
2011-08-14 18:17:07 +08:00
|
|
|
{
|
2011-10-05 17:55:44 +08:00
|
|
|
struct ieee80211_vif *vif = wl12xx_wlvif_to_vif(wlvif);
|
2011-08-14 18:17:07 +08:00
|
|
|
struct wl12xx_cmd_role_start *cmd;
|
|
|
|
int ret;
|
2009-08-06 21:25:28 +08:00
|
|
|
|
2011-08-14 18:17:07 +08:00
|
|
|
cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
|
|
|
|
if (!cmd) {
|
|
|
|
ret = -ENOMEM;
|
|
|
|
goto out;
|
|
|
|
}
|
2009-08-06 21:25:28 +08:00
|
|
|
|
2011-10-05 17:55:51 +08:00
|
|
|
wl1271_debug(DEBUG_CMD, "cmd role start sta %d", wlvif->role_id);
|
2011-08-14 18:17:07 +08:00
|
|
|
|
2011-10-05 17:55:51 +08:00
|
|
|
cmd->role_id = wlvif->role_id;
|
2011-10-10 16:13:09 +08:00
|
|
|
if (wlvif->band == IEEE80211_BAND_5GHZ)
|
2011-11-29 19:38:37 +08:00
|
|
|
cmd->band = WLCORE_BAND_5GHZ;
|
2011-10-10 16:13:10 +08:00
|
|
|
cmd->channel = wlvif->channel;
|
2011-10-05 17:55:41 +08:00
|
|
|
cmd->sta.basic_rate_set = cpu_to_le32(wlvif->basic_rate_set);
|
2011-10-05 17:55:58 +08:00
|
|
|
cmd->sta.beacon_interval = cpu_to_le16(wlvif->beacon_int);
|
2011-08-14 18:17:07 +08:00
|
|
|
cmd->sta.ssid_type = WL12XX_SSID_TYPE_ANY;
|
2011-10-05 17:55:48 +08:00
|
|
|
cmd->sta.ssid_len = wlvif->ssid_len;
|
|
|
|
memcpy(cmd->sta.ssid, wlvif->ssid, wlvif->ssid_len);
|
2011-10-05 17:55:44 +08:00
|
|
|
memcpy(cmd->sta.bssid, vif->bss_conf.bssid, ETH_ALEN);
|
2011-10-05 17:55:42 +08:00
|
|
|
cmd->sta.local_rates = cpu_to_le32(wlvif->rate_set);
|
2012-05-10 17:13:31 +08:00
|
|
|
cmd->channel_type = wlcore_get_native_channel_type(wlvif->channel_type);
|
2011-08-14 18:17:07 +08:00
|
|
|
|
2011-10-05 17:55:53 +08:00
|
|
|
if (wlvif->sta.hlid == WL12XX_INVALID_LINK_ID) {
|
2011-10-05 17:56:05 +08:00
|
|
|
ret = wl12xx_allocate_link(wl, wlvif, &wlvif->sta.hlid);
|
2011-08-14 18:17:07 +08:00
|
|
|
if (ret)
|
|
|
|
goto out_free;
|
|
|
|
}
|
2011-10-05 17:55:53 +08:00
|
|
|
cmd->sta.hlid = wlvif->sta.hlid;
|
2011-10-05 17:55:55 +08:00
|
|
|
cmd->sta.session = wl12xx_get_new_session_id(wl, wlvif);
|
2011-10-05 17:55:42 +08:00
|
|
|
cmd->sta.remote_rates = cpu_to_le32(wlvif->rate_set);
|
2011-08-14 18:17:07 +08:00
|
|
|
|
|
|
|
wl1271_debug(DEBUG_CMD, "role start: roleid=%d, hlid=%d, session=%d "
|
|
|
|
"basic_rate_set: 0x%x, remote_rates: 0x%x",
|
2011-10-05 17:55:51 +08:00
|
|
|
wlvif->role_id, cmd->sta.hlid, cmd->sta.session,
|
2011-10-05 17:55:42 +08:00
|
|
|
wlvif->basic_rate_set, wlvif->rate_set);
|
2011-08-14 18:17:07 +08:00
|
|
|
|
|
|
|
ret = wl1271_cmd_send(wl, CMD_ROLE_START, cmd, sizeof(*cmd), 0);
|
|
|
|
if (ret < 0) {
|
|
|
|
wl1271_error("failed to initiate cmd role start sta");
|
|
|
|
goto err_hlid;
|
|
|
|
}
|
|
|
|
|
|
|
|
goto out_free;
|
|
|
|
|
|
|
|
err_hlid:
|
|
|
|
/* clear links on error. */
|
2011-10-05 17:56:05 +08:00
|
|
|
wl12xx_free_link(wl, wlvif, &wlvif->sta.hlid);
|
2011-08-14 18:17:07 +08:00
|
|
|
|
|
|
|
out_free:
|
|
|
|
kfree(cmd);
|
|
|
|
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
2009-08-06 21:25:28 +08:00
|
|
|
|
2011-08-14 18:17:25 +08:00
|
|
|
/* use this function to stop ibss as well */
|
2011-10-05 17:55:51 +08:00
|
|
|
int wl12xx_cmd_role_stop_sta(struct wl1271 *wl, struct wl12xx_vif *wlvif)
|
2011-08-14 18:17:07 +08:00
|
|
|
{
|
|
|
|
struct wl12xx_cmd_role_stop *cmd;
|
|
|
|
int ret;
|
|
|
|
|
2011-10-05 17:55:53 +08:00
|
|
|
if (WARN_ON(wlvif->sta.hlid == WL12XX_INVALID_LINK_ID))
|
2011-08-14 18:17:07 +08:00
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
|
|
|
|
if (!cmd) {
|
|
|
|
ret = -ENOMEM;
|
|
|
|
goto out;
|
|
|
|
}
|
2009-10-13 17:47:51 +08:00
|
|
|
|
2011-10-05 17:55:51 +08:00
|
|
|
wl1271_debug(DEBUG_CMD, "cmd role stop sta %d", wlvif->role_id);
|
2009-08-06 21:25:28 +08:00
|
|
|
|
2011-10-05 17:55:51 +08:00
|
|
|
cmd->role_id = wlvif->role_id;
|
2011-08-14 18:17:07 +08:00
|
|
|
cmd->disc_type = DISCONNECT_IMMEDIATE;
|
|
|
|
cmd->reason = cpu_to_le16(WLAN_REASON_UNSPECIFIED);
|
2009-08-06 21:25:28 +08:00
|
|
|
|
2011-08-14 18:17:07 +08:00
|
|
|
ret = wl1271_cmd_send(wl, CMD_ROLE_STOP, cmd, sizeof(*cmd), 0);
|
|
|
|
if (ret < 0) {
|
|
|
|
wl1271_error("failed to initiate cmd role stop sta");
|
|
|
|
goto out_free;
|
|
|
|
}
|
2011-02-02 15:59:37 +08:00
|
|
|
|
2011-10-05 17:56:05 +08:00
|
|
|
wl12xx_free_link(wl, wlvif, &wlvif->sta.hlid);
|
2011-08-14 18:17:07 +08:00
|
|
|
|
|
|
|
out_free:
|
|
|
|
kfree(cmd);
|
|
|
|
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2011-10-05 17:55:41 +08:00
|
|
|
int wl12xx_cmd_role_start_ap(struct wl1271 *wl, struct wl12xx_vif *wlvif)
|
2011-08-14 18:17:07 +08:00
|
|
|
{
|
|
|
|
struct wl12xx_cmd_role_start *cmd;
|
2011-10-10 16:13:13 +08:00
|
|
|
struct ieee80211_vif *vif = wl12xx_wlvif_to_vif(wlvif);
|
|
|
|
struct ieee80211_bss_conf *bss_conf = &vif->bss_conf;
|
2012-05-10 17:14:14 +08:00
|
|
|
u32 supported_rates;
|
2011-08-14 18:17:07 +08:00
|
|
|
int ret;
|
|
|
|
|
2011-10-05 17:55:51 +08:00
|
|
|
wl1271_debug(DEBUG_CMD, "cmd role start ap %d", wlvif->role_id);
|
2011-08-14 18:17:07 +08:00
|
|
|
|
2011-09-04 01:22:03 +08:00
|
|
|
/* trying to use hidden SSID with an old hostapd version */
|
2011-10-05 17:55:48 +08:00
|
|
|
if (wlvif->ssid_len == 0 && !bss_conf->hidden_ssid) {
|
2011-09-04 01:22:03 +08:00
|
|
|
wl1271_error("got a null SSID from beacon/bss");
|
2011-08-14 18:17:07 +08:00
|
|
|
ret = -EINVAL;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
|
|
|
|
if (!cmd) {
|
|
|
|
ret = -ENOMEM;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2011-10-05 17:56:05 +08:00
|
|
|
ret = wl12xx_allocate_link(wl, wlvif, &wlvif->ap.global_hlid);
|
2011-08-14 18:17:21 +08:00
|
|
|
if (ret < 0)
|
|
|
|
goto out_free;
|
|
|
|
|
2011-10-05 17:56:05 +08:00
|
|
|
ret = wl12xx_allocate_link(wl, wlvif, &wlvif->ap.bcast_hlid);
|
2011-08-14 18:17:21 +08:00
|
|
|
if (ret < 0)
|
|
|
|
goto out_free_global;
|
|
|
|
|
2011-10-05 17:55:51 +08:00
|
|
|
cmd->role_id = wlvif->role_id;
|
2011-08-14 18:17:07 +08:00
|
|
|
cmd->ap.aging_period = cpu_to_le16(wl->conf.tx.ap_aging_period);
|
|
|
|
cmd->ap.bss_index = WL1271_AP_BSS_INDEX;
|
2011-10-05 17:55:54 +08:00
|
|
|
cmd->ap.global_hlid = wlvif->ap.global_hlid;
|
|
|
|
cmd->ap.broadcast_hlid = wlvif->ap.bcast_hlid;
|
2011-10-05 17:55:41 +08:00
|
|
|
cmd->ap.basic_rate_set = cpu_to_le32(wlvif->basic_rate_set);
|
2011-10-05 17:55:58 +08:00
|
|
|
cmd->ap.beacon_interval = cpu_to_le16(wlvif->beacon_int);
|
2011-08-14 18:17:07 +08:00
|
|
|
cmd->ap.dtim_interval = bss_conf->dtim_period;
|
|
|
|
cmd->ap.beacon_expiry = WL1271_AP_DEF_BEACON_EXP;
|
2012-01-31 17:57:19 +08:00
|
|
|
/* FIXME: Change when adding DFS */
|
|
|
|
cmd->ap.reset_tsf = 1; /* By default reset AP TSF */
|
2011-10-10 16:13:10 +08:00
|
|
|
cmd->channel = wlvif->channel;
|
2012-05-10 17:13:31 +08:00
|
|
|
cmd->channel_type = wlcore_get_native_channel_type(wlvif->channel_type);
|
2011-09-04 01:22:03 +08:00
|
|
|
|
|
|
|
if (!bss_conf->hidden_ssid) {
|
|
|
|
/* take the SSID from the beacon for backward compatibility */
|
|
|
|
cmd->ap.ssid_type = WL12XX_SSID_TYPE_PUBLIC;
|
2011-10-05 17:55:48 +08:00
|
|
|
cmd->ap.ssid_len = wlvif->ssid_len;
|
|
|
|
memcpy(cmd->ap.ssid, wlvif->ssid, wlvif->ssid_len);
|
2011-09-04 01:22:03 +08:00
|
|
|
} else {
|
|
|
|
cmd->ap.ssid_type = WL12XX_SSID_TYPE_HIDDEN;
|
|
|
|
cmd->ap.ssid_len = bss_conf->ssid_len;
|
|
|
|
memcpy(cmd->ap.ssid, bss_conf->ssid, bss_conf->ssid_len);
|
|
|
|
}
|
|
|
|
|
2012-05-10 17:14:14 +08:00
|
|
|
supported_rates = CONF_TX_AP_ENABLED_RATES | CONF_TX_MCS_RATES |
|
|
|
|
wlcore_hw_ap_get_mimo_wide_rate_mask(wl, wlvif);
|
|
|
|
|
|
|
|
wl1271_debug(DEBUG_CMD, "cmd role start ap with supported_rates 0x%08x",
|
|
|
|
supported_rates);
|
|
|
|
|
|
|
|
cmd->ap.local_rates = cpu_to_le32(supported_rates);
|
2011-08-14 18:17:07 +08:00
|
|
|
|
2011-10-10 16:13:09 +08:00
|
|
|
switch (wlvif->band) {
|
2011-08-14 18:17:07 +08:00
|
|
|
case IEEE80211_BAND_2GHZ:
|
2011-11-29 19:38:37 +08:00
|
|
|
cmd->band = WLCORE_BAND_2_4GHZ;
|
2011-08-14 18:17:07 +08:00
|
|
|
break;
|
|
|
|
case IEEE80211_BAND_5GHZ:
|
2011-11-29 19:38:37 +08:00
|
|
|
cmd->band = WLCORE_BAND_5GHZ;
|
2011-08-14 18:17:07 +08:00
|
|
|
break;
|
|
|
|
default:
|
2011-10-10 16:13:09 +08:00
|
|
|
wl1271_warning("ap start - unknown band: %d", (int)wlvif->band);
|
2011-11-29 19:38:37 +08:00
|
|
|
cmd->band = WLCORE_BAND_2_4GHZ;
|
2011-08-14 18:17:07 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = wl1271_cmd_send(wl, CMD_ROLE_START, cmd, sizeof(*cmd), 0);
|
|
|
|
if (ret < 0) {
|
|
|
|
wl1271_error("failed to initiate cmd role start ap");
|
2011-08-14 18:17:21 +08:00
|
|
|
goto out_free_bcast;
|
2011-08-14 18:17:07 +08:00
|
|
|
}
|
2009-08-06 21:25:28 +08:00
|
|
|
|
2011-08-14 18:17:21 +08:00
|
|
|
goto out_free;
|
|
|
|
|
|
|
|
out_free_bcast:
|
2011-10-05 17:56:05 +08:00
|
|
|
wl12xx_free_link(wl, wlvif, &wlvif->ap.bcast_hlid);
|
2011-08-14 18:17:21 +08:00
|
|
|
|
|
|
|
out_free_global:
|
2011-10-05 17:56:05 +08:00
|
|
|
wl12xx_free_link(wl, wlvif, &wlvif->ap.global_hlid);
|
2011-08-14 18:17:21 +08:00
|
|
|
|
2009-08-06 21:25:28 +08:00
|
|
|
out_free:
|
2011-08-14 18:17:07 +08:00
|
|
|
kfree(cmd);
|
2009-08-06 21:25:28 +08:00
|
|
|
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2011-10-05 17:55:51 +08:00
|
|
|
int wl12xx_cmd_role_stop_ap(struct wl1271 *wl, struct wl12xx_vif *wlvif)
|
2011-08-14 18:17:07 +08:00
|
|
|
{
|
|
|
|
struct wl12xx_cmd_role_stop *cmd;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
|
|
|
|
if (!cmd) {
|
|
|
|
ret = -ENOMEM;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2011-10-05 17:55:51 +08:00
|
|
|
wl1271_debug(DEBUG_CMD, "cmd role stop ap %d", wlvif->role_id);
|
2011-08-14 18:17:07 +08:00
|
|
|
|
2011-10-05 17:55:51 +08:00
|
|
|
cmd->role_id = wlvif->role_id;
|
2011-08-14 18:17:07 +08:00
|
|
|
|
|
|
|
ret = wl1271_cmd_send(wl, CMD_ROLE_STOP, cmd, sizeof(*cmd), 0);
|
|
|
|
if (ret < 0) {
|
|
|
|
wl1271_error("failed to initiate cmd role stop ap");
|
|
|
|
goto out_free;
|
|
|
|
}
|
|
|
|
|
2011-10-05 17:56:05 +08:00
|
|
|
wl12xx_free_link(wl, wlvif, &wlvif->ap.bcast_hlid);
|
|
|
|
wl12xx_free_link(wl, wlvif, &wlvif->ap.global_hlid);
|
2011-08-14 18:17:21 +08:00
|
|
|
|
2011-08-14 18:17:07 +08:00
|
|
|
out_free:
|
|
|
|
kfree(cmd);
|
|
|
|
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2011-10-05 17:55:41 +08:00
|
|
|
int wl12xx_cmd_role_start_ibss(struct wl1271 *wl, struct wl12xx_vif *wlvif)
|
2011-08-14 18:17:25 +08:00
|
|
|
{
|
2011-10-05 17:55:44 +08:00
|
|
|
struct ieee80211_vif *vif = wl12xx_wlvif_to_vif(wlvif);
|
2011-08-14 18:17:25 +08:00
|
|
|
struct wl12xx_cmd_role_start *cmd;
|
2011-10-10 16:13:13 +08:00
|
|
|
struct ieee80211_bss_conf *bss_conf = &vif->bss_conf;
|
2011-08-14 18:17:25 +08:00
|
|
|
int ret;
|
|
|
|
|
|
|
|
cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
|
|
|
|
if (!cmd) {
|
|
|
|
ret = -ENOMEM;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2011-10-05 17:55:51 +08:00
|
|
|
wl1271_debug(DEBUG_CMD, "cmd role start ibss %d", wlvif->role_id);
|
2011-08-14 18:17:25 +08:00
|
|
|
|
2011-10-05 17:55:51 +08:00
|
|
|
cmd->role_id = wlvif->role_id;
|
2011-10-10 16:13:09 +08:00
|
|
|
if (wlvif->band == IEEE80211_BAND_5GHZ)
|
2011-11-29 19:38:37 +08:00
|
|
|
cmd->band = WLCORE_BAND_5GHZ;
|
2011-10-10 16:13:10 +08:00
|
|
|
cmd->channel = wlvif->channel;
|
2011-10-05 17:55:41 +08:00
|
|
|
cmd->ibss.basic_rate_set = cpu_to_le32(wlvif->basic_rate_set);
|
2011-10-05 17:55:58 +08:00
|
|
|
cmd->ibss.beacon_interval = cpu_to_le16(wlvif->beacon_int);
|
2011-08-14 18:17:25 +08:00
|
|
|
cmd->ibss.dtim_interval = bss_conf->dtim_period;
|
|
|
|
cmd->ibss.ssid_type = WL12XX_SSID_TYPE_ANY;
|
2011-10-05 17:55:48 +08:00
|
|
|
cmd->ibss.ssid_len = wlvif->ssid_len;
|
|
|
|
memcpy(cmd->ibss.ssid, wlvif->ssid, wlvif->ssid_len);
|
2011-10-05 17:55:44 +08:00
|
|
|
memcpy(cmd->ibss.bssid, vif->bss_conf.bssid, ETH_ALEN);
|
2011-10-05 17:55:42 +08:00
|
|
|
cmd->sta.local_rates = cpu_to_le32(wlvif->rate_set);
|
2011-08-14 18:17:25 +08:00
|
|
|
|
2011-10-05 17:55:53 +08:00
|
|
|
if (wlvif->sta.hlid == WL12XX_INVALID_LINK_ID) {
|
2011-10-05 17:56:05 +08:00
|
|
|
ret = wl12xx_allocate_link(wl, wlvif, &wlvif->sta.hlid);
|
2011-08-14 18:17:25 +08:00
|
|
|
if (ret)
|
|
|
|
goto out_free;
|
|
|
|
}
|
2011-10-05 17:55:53 +08:00
|
|
|
cmd->ibss.hlid = wlvif->sta.hlid;
|
2011-10-05 17:55:42 +08:00
|
|
|
cmd->ibss.remote_rates = cpu_to_le32(wlvif->rate_set);
|
2011-08-14 18:17:25 +08:00
|
|
|
|
|
|
|
wl1271_debug(DEBUG_CMD, "role start: roleid=%d, hlid=%d, session=%d "
|
|
|
|
"basic_rate_set: 0x%x, remote_rates: 0x%x",
|
2011-10-05 17:55:51 +08:00
|
|
|
wlvif->role_id, cmd->sta.hlid, cmd->sta.session,
|
2011-10-05 17:55:42 +08:00
|
|
|
wlvif->basic_rate_set, wlvif->rate_set);
|
2011-08-14 18:17:25 +08:00
|
|
|
|
2011-10-05 17:55:44 +08:00
|
|
|
wl1271_debug(DEBUG_CMD, "vif->bss_conf.bssid = %pM",
|
|
|
|
vif->bss_conf.bssid);
|
2011-08-14 18:17:25 +08:00
|
|
|
|
|
|
|
ret = wl1271_cmd_send(wl, CMD_ROLE_START, cmd, sizeof(*cmd), 0);
|
|
|
|
if (ret < 0) {
|
|
|
|
wl1271_error("failed to initiate cmd role enable");
|
|
|
|
goto err_hlid;
|
|
|
|
}
|
|
|
|
|
|
|
|
goto out_free;
|
|
|
|
|
|
|
|
err_hlid:
|
|
|
|
/* clear links on error. */
|
2011-10-05 17:56:05 +08:00
|
|
|
wl12xx_free_link(wl, wlvif, &wlvif->sta.hlid);
|
2011-08-14 18:17:25 +08:00
|
|
|
|
|
|
|
out_free:
|
|
|
|
kfree(cmd);
|
|
|
|
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2011-08-14 18:17:07 +08:00
|
|
|
|
2009-08-06 21:25:28 +08:00
|
|
|
/**
|
|
|
|
* send test command to firmware
|
|
|
|
*
|
|
|
|
* @wl: wl struct
|
|
|
|
* @buf: buffer containing the command, with all headers, must work with dma
|
|
|
|
* @len: length of the buffer
|
|
|
|
* @answer: is answer needed
|
|
|
|
*/
|
|
|
|
int wl1271_cmd_test(struct wl1271 *wl, void *buf, size_t buf_len, u8 answer)
|
|
|
|
{
|
|
|
|
int ret;
|
2009-11-03 02:22:13 +08:00
|
|
|
size_t res_len = 0;
|
2009-08-06 21:25:28 +08:00
|
|
|
|
|
|
|
wl1271_debug(DEBUG_CMD, "cmd test");
|
|
|
|
|
2009-11-03 02:22:13 +08:00
|
|
|
if (answer)
|
|
|
|
res_len = buf_len;
|
|
|
|
|
|
|
|
ret = wl1271_cmd_send(wl, CMD_TEST, buf, buf_len, res_len);
|
2009-08-06 21:25:28 +08:00
|
|
|
|
|
|
|
if (ret < 0) {
|
|
|
|
wl1271_warning("TEST command failed");
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2009-11-03 02:22:13 +08:00
|
|
|
return ret;
|
2009-08-06 21:25:28 +08:00
|
|
|
}
|
2011-12-02 06:47:45 +08:00
|
|
|
EXPORT_SYMBOL_GPL(wl1271_cmd_test);
|
2009-08-06 21:25:28 +08:00
|
|
|
|
|
|
|
/**
|
|
|
|
* read acx from firmware
|
|
|
|
*
|
|
|
|
* @wl: wl struct
|
|
|
|
* @id: acx id
|
|
|
|
* @buf: buffer for the response, including all headers, must work with dma
|
2011-03-31 09:57:33 +08:00
|
|
|
* @len: length of buf
|
2009-08-06 21:25:28 +08:00
|
|
|
*/
|
|
|
|
int wl1271_cmd_interrogate(struct wl1271 *wl, u16 id, void *buf, size_t len)
|
|
|
|
{
|
|
|
|
struct acx_header *acx = buf;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
wl1271_debug(DEBUG_CMD, "cmd interrogate");
|
|
|
|
|
2009-10-15 15:33:29 +08:00
|
|
|
acx->id = cpu_to_le16(id);
|
2009-08-06 21:25:28 +08:00
|
|
|
|
|
|
|
/* payload length, does not include any headers */
|
2009-10-15 15:33:29 +08:00
|
|
|
acx->len = cpu_to_le16(len - sizeof(*acx));
|
2009-08-06 21:25:28 +08:00
|
|
|
|
2009-11-03 02:22:13 +08:00
|
|
|
ret = wl1271_cmd_send(wl, CMD_INTERROGATE, acx, sizeof(*acx), len);
|
|
|
|
if (ret < 0)
|
2009-08-06 21:25:28 +08:00
|
|
|
wl1271_error("INTERROGATE command failed");
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* write acx value to firmware
|
|
|
|
*
|
|
|
|
* @wl: wl struct
|
|
|
|
* @id: acx id
|
|
|
|
* @buf: buffer containing acx, including all headers, must work with dma
|
|
|
|
* @len: length of buf
|
|
|
|
*/
|
|
|
|
int wl1271_cmd_configure(struct wl1271 *wl, u16 id, void *buf, size_t len)
|
|
|
|
{
|
|
|
|
struct acx_header *acx = buf;
|
|
|
|
int ret;
|
|
|
|
|
2011-08-25 23:10:57 +08:00
|
|
|
wl1271_debug(DEBUG_CMD, "cmd configure (%d)", id);
|
2009-08-06 21:25:28 +08:00
|
|
|
|
2009-10-15 15:33:29 +08:00
|
|
|
acx->id = cpu_to_le16(id);
|
2009-08-06 21:25:28 +08:00
|
|
|
|
|
|
|
/* payload length, does not include any headers */
|
2009-10-15 15:33:29 +08:00
|
|
|
acx->len = cpu_to_le16(len - sizeof(*acx));
|
2009-08-06 21:25:28 +08:00
|
|
|
|
2009-11-03 02:22:13 +08:00
|
|
|
ret = wl1271_cmd_send(wl, CMD_CONFIGURE, acx, len, 0);
|
2009-08-06 21:25:28 +08:00
|
|
|
if (ret < 0) {
|
|
|
|
wl1271_warning("CONFIGURE command NOK");
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
2011-12-02 06:47:45 +08:00
|
|
|
EXPORT_SYMBOL_GPL(wl1271_cmd_configure);
|
2009-08-06 21:25:28 +08:00
|
|
|
|
2009-12-11 21:40:55 +08:00
|
|
|
int wl1271_cmd_data_path(struct wl1271 *wl, bool enable)
|
2009-08-06 21:25:28 +08:00
|
|
|
{
|
|
|
|
struct cmd_enabledisable_path *cmd;
|
|
|
|
int ret;
|
|
|
|
u16 cmd_rx, cmd_tx;
|
|
|
|
|
|
|
|
wl1271_debug(DEBUG_CMD, "cmd data path");
|
|
|
|
|
|
|
|
cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
|
|
|
|
if (!cmd) {
|
|
|
|
ret = -ENOMEM;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2009-12-11 21:40:55 +08:00
|
|
|
/* the channel here is only used for calibration, so hardcoded to 1 */
|
|
|
|
cmd->channel = 1;
|
2009-08-06 21:25:28 +08:00
|
|
|
|
|
|
|
if (enable) {
|
|
|
|
cmd_rx = CMD_ENABLE_RX;
|
|
|
|
cmd_tx = CMD_ENABLE_TX;
|
|
|
|
} else {
|
|
|
|
cmd_rx = CMD_DISABLE_RX;
|
|
|
|
cmd_tx = CMD_DISABLE_TX;
|
|
|
|
}
|
|
|
|
|
2009-11-03 02:22:13 +08:00
|
|
|
ret = wl1271_cmd_send(wl, cmd_rx, cmd, sizeof(*cmd), 0);
|
2009-08-06 21:25:28 +08:00
|
|
|
if (ret < 0) {
|
|
|
|
wl1271_error("rx %s cmd for channel %d failed",
|
2009-12-11 21:40:55 +08:00
|
|
|
enable ? "start" : "stop", cmd->channel);
|
2009-08-06 21:25:28 +08:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
wl1271_debug(DEBUG_BOOT, "rx %s cmd channel %d",
|
2009-12-11 21:40:55 +08:00
|
|
|
enable ? "start" : "stop", cmd->channel);
|
2009-08-06 21:25:28 +08:00
|
|
|
|
2009-11-03 02:22:13 +08:00
|
|
|
ret = wl1271_cmd_send(wl, cmd_tx, cmd, sizeof(*cmd), 0);
|
2009-08-06 21:25:28 +08:00
|
|
|
if (ret < 0) {
|
|
|
|
wl1271_error("tx %s cmd for channel %d failed",
|
2009-12-11 21:40:55 +08:00
|
|
|
enable ? "start" : "stop", cmd->channel);
|
2010-03-26 18:53:17 +08:00
|
|
|
goto out;
|
2009-08-06 21:25:28 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
wl1271_debug(DEBUG_BOOT, "tx %s cmd channel %d",
|
2009-12-11 21:40:55 +08:00
|
|
|
enable ? "start" : "stop", cmd->channel);
|
2009-08-06 21:25:28 +08:00
|
|
|
|
|
|
|
out:
|
|
|
|
kfree(cmd);
|
|
|
|
return ret;
|
|
|
|
}
|
2012-05-10 17:13:49 +08:00
|
|
|
EXPORT_SYMBOL_GPL(wl1271_cmd_data_path);
|
2009-08-06 21:25:28 +08:00
|
|
|
|
2011-10-05 17:55:51 +08:00
|
|
|
int wl1271_cmd_ps_mode(struct wl1271 *wl, struct wl12xx_vif *wlvif,
|
2012-01-31 17:57:21 +08:00
|
|
|
u8 ps_mode, u16 auto_ps_timeout)
|
2009-08-06 21:25:28 +08:00
|
|
|
{
|
|
|
|
struct wl1271_cmd_ps_params *ps_params = NULL;
|
|
|
|
int ret = 0;
|
|
|
|
|
|
|
|
wl1271_debug(DEBUG_CMD, "cmd set ps mode");
|
|
|
|
|
|
|
|
ps_params = kzalloc(sizeof(*ps_params), GFP_KERNEL);
|
|
|
|
if (!ps_params) {
|
|
|
|
ret = -ENOMEM;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2011-10-05 17:55:51 +08:00
|
|
|
ps_params->role_id = wlvif->role_id;
|
2009-08-06 21:25:28 +08:00
|
|
|
ps_params->ps_mode = ps_mode;
|
2012-01-31 17:57:21 +08:00
|
|
|
ps_params->auto_ps_timeout = auto_ps_timeout;
|
2009-08-06 21:25:28 +08:00
|
|
|
|
|
|
|
ret = wl1271_cmd_send(wl, CMD_SET_PS_MODE, ps_params,
|
2009-11-03 02:22:13 +08:00
|
|
|
sizeof(*ps_params), 0);
|
2009-08-06 21:25:28 +08:00
|
|
|
if (ret < 0) {
|
|
|
|
wl1271_error("cmd set_ps_mode failed");
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
|
|
|
kfree(ps_params);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2012-01-31 17:57:16 +08:00
|
|
|
int wl1271_cmd_template_set(struct wl1271 *wl, u8 role_id,
|
|
|
|
u16 template_id, void *buf, size_t buf_len,
|
|
|
|
int index, u32 rates)
|
2009-08-06 21:25:28 +08:00
|
|
|
{
|
|
|
|
struct wl1271_cmd_template_set *cmd;
|
|
|
|
int ret = 0;
|
|
|
|
|
2012-01-31 17:57:17 +08:00
|
|
|
wl1271_debug(DEBUG_CMD, "cmd template_set %d (role %d)",
|
|
|
|
template_id, role_id);
|
2009-08-06 21:25:28 +08:00
|
|
|
|
|
|
|
WARN_ON(buf_len > WL1271_CMD_TEMPL_MAX_SIZE);
|
|
|
|
buf_len = min_t(size_t, buf_len, WL1271_CMD_TEMPL_MAX_SIZE);
|
|
|
|
|
|
|
|
cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
|
|
|
|
if (!cmd) {
|
|
|
|
ret = -ENOMEM;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2012-01-31 17:57:16 +08:00
|
|
|
/* during initialization wlvif is NULL */
|
|
|
|
cmd->role_id = role_id;
|
2009-08-06 21:25:28 +08:00
|
|
|
cmd->len = cpu_to_le16(buf_len);
|
|
|
|
cmd->template_type = template_id;
|
2010-04-01 16:38:21 +08:00
|
|
|
cmd->enabled_rates = cpu_to_le32(rates);
|
2010-10-16 23:44:51 +08:00
|
|
|
cmd->short_retry_limit = wl->conf.tx.tmpl_short_retry_limit;
|
|
|
|
cmd->long_retry_limit = wl->conf.tx.tmpl_long_retry_limit;
|
2010-03-26 18:53:31 +08:00
|
|
|
cmd->index = index;
|
2009-08-06 21:25:28 +08:00
|
|
|
|
|
|
|
if (buf)
|
|
|
|
memcpy(cmd->template_data, buf, buf_len);
|
|
|
|
|
2009-11-03 02:22:13 +08:00
|
|
|
ret = wl1271_cmd_send(wl, CMD_SET_TEMPLATE, cmd, sizeof(*cmd), 0);
|
2009-08-06 21:25:28 +08:00
|
|
|
if (ret < 0) {
|
|
|
|
wl1271_warning("cmd set_template failed: %d", ret);
|
|
|
|
goto out_free;
|
|
|
|
}
|
|
|
|
|
|
|
|
out_free:
|
|
|
|
kfree(cmd);
|
|
|
|
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2011-10-05 17:55:43 +08:00
|
|
|
int wl12xx_cmd_build_null_data(struct wl1271 *wl, struct wl12xx_vif *wlvif)
|
2009-08-06 21:25:28 +08:00
|
|
|
{
|
2010-03-18 18:26:44 +08:00
|
|
|
struct sk_buff *skb = NULL;
|
|
|
|
int size;
|
|
|
|
void *ptr;
|
|
|
|
int ret = -ENOMEM;
|
2009-08-06 21:25:28 +08:00
|
|
|
|
|
|
|
|
2011-10-05 17:55:45 +08:00
|
|
|
if (wlvif->bss_type == BSS_TYPE_IBSS) {
|
2010-03-18 18:26:44 +08:00
|
|
|
size = sizeof(struct wl12xx_null_data_template);
|
|
|
|
ptr = NULL;
|
|
|
|
} else {
|
2011-10-05 17:55:43 +08:00
|
|
|
skb = ieee80211_nullfunc_get(wl->hw,
|
|
|
|
wl12xx_wlvif_to_vif(wlvif));
|
2010-03-18 18:26:44 +08:00
|
|
|
if (!skb)
|
|
|
|
goto out;
|
|
|
|
size = skb->len;
|
|
|
|
ptr = skb->data;
|
|
|
|
}
|
|
|
|
|
2012-01-31 17:57:16 +08:00
|
|
|
ret = wl1271_cmd_template_set(wl, wlvif->role_id,
|
|
|
|
CMD_TEMPL_NULL_DATA, ptr, size, 0,
|
2011-10-05 17:55:43 +08:00
|
|
|
wlvif->basic_rate);
|
2009-08-06 21:25:28 +08:00
|
|
|
|
2010-03-18 18:26:34 +08:00
|
|
|
out:
|
|
|
|
dev_kfree_skb(skb);
|
2010-03-18 18:26:44 +08:00
|
|
|
if (ret)
|
|
|
|
wl1271_warning("cmd buld null data failed %d", ret);
|
|
|
|
|
2010-03-18 18:26:34 +08:00
|
|
|
return ret;
|
2009-08-06 21:25:28 +08:00
|
|
|
|
|
|
|
}
|
|
|
|
|
2011-10-05 17:55:43 +08:00
|
|
|
int wl12xx_cmd_build_klv_null_data(struct wl1271 *wl,
|
|
|
|
struct wl12xx_vif *wlvif)
|
2010-03-26 18:53:31 +08:00
|
|
|
{
|
2011-10-05 17:55:43 +08:00
|
|
|
struct ieee80211_vif *vif = wl12xx_wlvif_to_vif(wlvif);
|
2010-03-26 18:53:31 +08:00
|
|
|
struct sk_buff *skb = NULL;
|
|
|
|
int ret = -ENOMEM;
|
|
|
|
|
2011-10-05 17:55:43 +08:00
|
|
|
skb = ieee80211_nullfunc_get(wl->hw, vif);
|
2010-03-26 18:53:31 +08:00
|
|
|
if (!skb)
|
|
|
|
goto out;
|
|
|
|
|
2012-01-31 17:57:16 +08:00
|
|
|
ret = wl1271_cmd_template_set(wl, wlvif->role_id, CMD_TEMPL_KLV,
|
2010-03-26 18:53:31 +08:00
|
|
|
skb->data, skb->len,
|
2010-04-01 16:38:21 +08:00
|
|
|
CMD_TEMPL_KLV_IDX_NULL_DATA,
|
2011-10-05 17:55:43 +08:00
|
|
|
wlvif->basic_rate);
|
2010-03-26 18:53:31 +08:00
|
|
|
|
|
|
|
out:
|
|
|
|
dev_kfree_skb(skb);
|
|
|
|
if (ret)
|
|
|
|
wl1271_warning("cmd build klv null data failed %d", ret);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2011-10-05 17:55:41 +08:00
|
|
|
int wl1271_cmd_build_ps_poll(struct wl1271 *wl, struct wl12xx_vif *wlvif,
|
|
|
|
u16 aid)
|
2009-08-06 21:25:28 +08:00
|
|
|
{
|
2011-10-10 16:13:13 +08:00
|
|
|
struct ieee80211_vif *vif = wl12xx_wlvif_to_vif(wlvif);
|
2010-03-18 18:26:34 +08:00
|
|
|
struct sk_buff *skb;
|
|
|
|
int ret = 0;
|
2009-10-09 02:56:22 +08:00
|
|
|
|
2011-10-10 16:13:13 +08:00
|
|
|
skb = ieee80211_pspoll_get(wl->hw, vif);
|
2010-03-18 18:26:34 +08:00
|
|
|
if (!skb)
|
|
|
|
goto out;
|
2009-08-06 21:25:28 +08:00
|
|
|
|
2012-01-31 17:57:16 +08:00
|
|
|
ret = wl1271_cmd_template_set(wl, wlvif->role_id,
|
|
|
|
CMD_TEMPL_PS_POLL, skb->data,
|
2011-10-05 17:55:41 +08:00
|
|
|
skb->len, 0, wlvif->basic_rate_set);
|
2009-08-06 21:25:28 +08:00
|
|
|
|
2010-03-18 18:26:34 +08:00
|
|
|
out:
|
|
|
|
dev_kfree_skb(skb);
|
|
|
|
return ret;
|
2009-08-06 21:25:28 +08:00
|
|
|
}
|
|
|
|
|
2012-01-31 17:57:16 +08:00
|
|
|
int wl12xx_cmd_build_probe_req(struct wl1271 *wl, struct wl12xx_vif *wlvif,
|
|
|
|
u8 role_id, u8 band,
|
2010-03-18 18:26:35 +08:00
|
|
|
const u8 *ssid, size_t ssid_len,
|
2012-01-31 17:57:16 +08:00
|
|
|
const u8 *ie, size_t ie_len)
|
2009-08-06 21:25:28 +08:00
|
|
|
{
|
2011-10-10 16:12:53 +08:00
|
|
|
struct ieee80211_vif *vif = wl12xx_wlvif_to_vif(wlvif);
|
2010-03-18 18:26:35 +08:00
|
|
|
struct sk_buff *skb;
|
2009-10-13 17:47:50 +08:00
|
|
|
int ret;
|
2011-09-19 18:51:42 +08:00
|
|
|
u32 rate;
|
2009-08-06 21:25:28 +08:00
|
|
|
|
2011-10-10 16:12:53 +08:00
|
|
|
skb = ieee80211_probereq_get(wl->hw, vif, ssid, ssid_len,
|
2010-03-18 18:26:35 +08:00
|
|
|
ie, ie_len);
|
|
|
|
if (!skb) {
|
|
|
|
ret = -ENOMEM;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
wl1271_dump(DEBUG_SCAN, "PROBE REQ: ", skb->data, skb->len);
|
2009-08-06 21:25:28 +08:00
|
|
|
|
2011-10-10 16:12:53 +08:00
|
|
|
rate = wl1271_tx_min_rate_get(wl, wlvif->bitrate_masks[band]);
|
2009-10-13 17:47:50 +08:00
|
|
|
if (band == IEEE80211_BAND_2GHZ)
|
2012-01-31 17:57:16 +08:00
|
|
|
ret = wl1271_cmd_template_set(wl, role_id,
|
|
|
|
CMD_TEMPL_CFG_PROBE_REQ_2_4,
|
2011-09-19 18:51:42 +08:00
|
|
|
skb->data, skb->len, 0, rate);
|
2009-10-13 17:47:50 +08:00
|
|
|
else
|
2012-01-31 17:57:16 +08:00
|
|
|
ret = wl1271_cmd_template_set(wl, role_id,
|
|
|
|
CMD_TEMPL_CFG_PROBE_REQ_5,
|
2011-09-19 18:51:42 +08:00
|
|
|
skb->data, skb->len, 0, rate);
|
2010-03-18 18:26:35 +08:00
|
|
|
|
|
|
|
out:
|
|
|
|
dev_kfree_skb(skb);
|
2009-10-13 17:47:50 +08:00
|
|
|
return ret;
|
2009-08-06 21:25:28 +08:00
|
|
|
}
|
|
|
|
|
2010-11-24 14:16:57 +08:00
|
|
|
struct sk_buff *wl1271_cmd_build_ap_probe_req(struct wl1271 *wl,
|
2011-10-10 16:12:53 +08:00
|
|
|
struct wl12xx_vif *wlvif,
|
2010-11-24 14:16:57 +08:00
|
|
|
struct sk_buff *skb)
|
|
|
|
{
|
2011-10-10 16:12:53 +08:00
|
|
|
struct ieee80211_vif *vif = wl12xx_wlvif_to_vif(wlvif);
|
2010-11-24 14:16:57 +08:00
|
|
|
int ret;
|
2011-09-19 18:51:42 +08:00
|
|
|
u32 rate;
|
2010-11-24 14:16:57 +08:00
|
|
|
|
|
|
|
if (!skb)
|
2011-10-10 16:12:53 +08:00
|
|
|
skb = ieee80211_ap_probereq_get(wl->hw, vif);
|
2010-11-24 14:16:57 +08:00
|
|
|
if (!skb)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
wl1271_dump(DEBUG_SCAN, "AP PROBE REQ: ", skb->data, skb->len);
|
|
|
|
|
2011-10-10 16:13:09 +08:00
|
|
|
rate = wl1271_tx_min_rate_get(wl, wlvif->bitrate_masks[wlvif->band]);
|
|
|
|
if (wlvif->band == IEEE80211_BAND_2GHZ)
|
2012-01-31 17:57:16 +08:00
|
|
|
ret = wl1271_cmd_template_set(wl, wlvif->role_id,
|
|
|
|
CMD_TEMPL_CFG_PROBE_REQ_2_4,
|
2011-09-19 18:51:42 +08:00
|
|
|
skb->data, skb->len, 0, rate);
|
2010-11-24 14:16:57 +08:00
|
|
|
else
|
2012-01-31 17:57:16 +08:00
|
|
|
ret = wl1271_cmd_template_set(wl, wlvif->role_id,
|
|
|
|
CMD_TEMPL_CFG_PROBE_REQ_5,
|
2011-09-19 18:51:42 +08:00
|
|
|
skb->data, skb->len, 0, rate);
|
2010-11-24 14:16:57 +08:00
|
|
|
|
|
|
|
if (ret < 0)
|
|
|
|
wl1271_error("Unable to set ap probe request template.");
|
|
|
|
|
|
|
|
out:
|
|
|
|
return skb;
|
|
|
|
}
|
|
|
|
|
2012-02-02 18:22:09 +08:00
|
|
|
int wl1271_cmd_build_arp_rsp(struct wl1271 *wl, struct wl12xx_vif *wlvif)
|
2010-12-09 17:31:27 +08:00
|
|
|
{
|
2012-02-02 18:22:09 +08:00
|
|
|
int ret, extra;
|
|
|
|
u16 fc;
|
2011-10-10 16:13:13 +08:00
|
|
|
struct ieee80211_vif *vif = wl12xx_wlvif_to_vif(wlvif);
|
2012-02-02 18:22:09 +08:00
|
|
|
struct sk_buff *skb;
|
|
|
|
struct wl12xx_arp_rsp_template *tmpl;
|
2010-12-09 17:31:27 +08:00
|
|
|
struct ieee80211_hdr_3addr *hdr;
|
|
|
|
struct arphdr *arp_hdr;
|
|
|
|
|
2012-02-02 18:22:09 +08:00
|
|
|
skb = dev_alloc_skb(sizeof(*hdr) + sizeof(__le16) + sizeof(*tmpl) +
|
|
|
|
WL1271_EXTRA_SPACE_MAX);
|
|
|
|
if (!skb) {
|
|
|
|
wl1271_error("failed to allocate buffer for arp rsp template");
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
2010-12-09 17:31:27 +08:00
|
|
|
|
2012-02-02 18:22:09 +08:00
|
|
|
skb_reserve(skb, sizeof(*hdr) + WL1271_EXTRA_SPACE_MAX);
|
|
|
|
|
|
|
|
tmpl = (struct wl12xx_arp_rsp_template *)skb_put(skb, sizeof(*tmpl));
|
2012-05-03 15:25:51 +08:00
|
|
|
memset(tmpl, 0, sizeof(*tmpl));
|
2010-12-09 17:31:27 +08:00
|
|
|
|
|
|
|
/* llc layer */
|
2012-02-02 18:22:09 +08:00
|
|
|
memcpy(tmpl->llc_hdr, rfc1042_header, sizeof(rfc1042_header));
|
|
|
|
tmpl->llc_type = cpu_to_be16(ETH_P_ARP);
|
2010-12-09 17:31:27 +08:00
|
|
|
|
|
|
|
/* arp header */
|
2012-02-02 18:22:09 +08:00
|
|
|
arp_hdr = &tmpl->arp_hdr;
|
2010-12-22 19:38:52 +08:00
|
|
|
arp_hdr->ar_hrd = cpu_to_be16(ARPHRD_ETHER);
|
|
|
|
arp_hdr->ar_pro = cpu_to_be16(ETH_P_IP);
|
2010-12-09 17:31:27 +08:00
|
|
|
arp_hdr->ar_hln = ETH_ALEN;
|
|
|
|
arp_hdr->ar_pln = 4;
|
2010-12-22 19:38:52 +08:00
|
|
|
arp_hdr->ar_op = cpu_to_be16(ARPOP_REPLY);
|
2010-12-09 17:31:27 +08:00
|
|
|
|
|
|
|
/* arp payload */
|
2012-02-02 18:22:09 +08:00
|
|
|
memcpy(tmpl->sender_hw, vif->addr, ETH_ALEN);
|
|
|
|
tmpl->sender_ip = wlvif->ip_addr;
|
|
|
|
|
|
|
|
/* encryption space */
|
|
|
|
switch (wlvif->encryption_type) {
|
|
|
|
case KEY_TKIP:
|
|
|
|
extra = WL1271_EXTRA_SPACE_TKIP;
|
|
|
|
break;
|
|
|
|
case KEY_AES:
|
|
|
|
extra = WL1271_EXTRA_SPACE_AES;
|
|
|
|
break;
|
|
|
|
case KEY_NONE:
|
|
|
|
case KEY_WEP:
|
|
|
|
case KEY_GEM:
|
|
|
|
extra = 0;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
wl1271_warning("Unknown encryption type: %d",
|
|
|
|
wlvif->encryption_type);
|
|
|
|
ret = -EINVAL;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (extra) {
|
|
|
|
u8 *space = skb_push(skb, extra);
|
|
|
|
memset(space, 0, extra);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* QoS header - BE */
|
|
|
|
if (wlvif->sta.qos)
|
|
|
|
memset(skb_push(skb, sizeof(__le16)), 0, sizeof(__le16));
|
|
|
|
|
|
|
|
/* mac80211 header */
|
|
|
|
hdr = (struct ieee80211_hdr_3addr *)skb_push(skb, sizeof(*hdr));
|
2012-05-03 15:25:51 +08:00
|
|
|
memset(hdr, 0, sizeof(*hdr));
|
2012-02-02 18:22:09 +08:00
|
|
|
fc = IEEE80211_FTYPE_DATA | IEEE80211_FCTL_TODS;
|
|
|
|
if (wlvif->sta.qos)
|
|
|
|
fc |= IEEE80211_STYPE_QOS_DATA;
|
|
|
|
else
|
|
|
|
fc |= IEEE80211_STYPE_DATA;
|
|
|
|
if (wlvif->encryption_type != KEY_NONE)
|
|
|
|
fc |= IEEE80211_FCTL_PROTECTED;
|
|
|
|
|
|
|
|
hdr->frame_control = cpu_to_le16(fc);
|
|
|
|
memcpy(hdr->addr1, vif->bss_conf.bssid, ETH_ALEN);
|
|
|
|
memcpy(hdr->addr2, vif->addr, ETH_ALEN);
|
|
|
|
memset(hdr->addr3, 0xff, ETH_ALEN);
|
2010-12-09 17:31:27 +08:00
|
|
|
|
2012-01-31 17:57:16 +08:00
|
|
|
ret = wl1271_cmd_template_set(wl, wlvif->role_id, CMD_TEMPL_ARP_RSP,
|
2012-02-02 18:22:09 +08:00
|
|
|
skb->data, skb->len, 0,
|
2011-10-05 17:55:43 +08:00
|
|
|
wlvif->basic_rate);
|
2012-02-02 18:22:09 +08:00
|
|
|
out:
|
|
|
|
dev_kfree_skb(skb);
|
2010-12-09 17:31:27 +08:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2011-10-05 17:55:39 +08:00
|
|
|
int wl1271_build_qos_null_data(struct wl1271 *wl, struct ieee80211_vif *vif)
|
2010-03-18 18:26:36 +08:00
|
|
|
{
|
2011-10-05 17:55:43 +08:00
|
|
|
struct wl12xx_vif *wlvif = wl12xx_vif_to_data(vif);
|
2010-03-18 18:26:36 +08:00
|
|
|
struct ieee80211_qos_hdr template;
|
|
|
|
|
|
|
|
memset(&template, 0, sizeof(template));
|
|
|
|
|
2011-10-05 17:55:44 +08:00
|
|
|
memcpy(template.addr1, vif->bss_conf.bssid, ETH_ALEN);
|
2011-10-05 17:55:39 +08:00
|
|
|
memcpy(template.addr2, vif->addr, ETH_ALEN);
|
2011-10-05 17:55:44 +08:00
|
|
|
memcpy(template.addr3, vif->bss_conf.bssid, ETH_ALEN);
|
2010-03-18 18:26:36 +08:00
|
|
|
|
|
|
|
template.frame_control = cpu_to_le16(IEEE80211_FTYPE_DATA |
|
|
|
|
IEEE80211_STYPE_QOS_NULLFUNC |
|
|
|
|
IEEE80211_FCTL_TODS);
|
|
|
|
|
|
|
|
/* FIXME: not sure what priority to use here */
|
|
|
|
template.qos_ctrl = cpu_to_le16(0);
|
|
|
|
|
2012-01-31 17:57:16 +08:00
|
|
|
return wl1271_cmd_template_set(wl, wlvif->role_id,
|
|
|
|
CMD_TEMPL_QOS_NULL_DATA, &template,
|
2010-04-01 16:38:21 +08:00
|
|
|
sizeof(template), 0,
|
2011-10-05 17:55:43 +08:00
|
|
|
wlvif->basic_rate);
|
2010-03-18 18:26:36 +08:00
|
|
|
}
|
|
|
|
|
2011-08-14 18:17:07 +08:00
|
|
|
int wl12xx_cmd_set_default_wep_key(struct wl1271 *wl, u8 id, u8 hlid)
|
2009-08-06 21:25:28 +08:00
|
|
|
{
|
2011-08-14 18:17:07 +08:00
|
|
|
struct wl1271_cmd_set_keys *cmd;
|
2009-08-06 21:25:28 +08:00
|
|
|
int ret = 0;
|
|
|
|
|
|
|
|
wl1271_debug(DEBUG_CMD, "cmd set_default_wep_key %d", id);
|
|
|
|
|
|
|
|
cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
|
|
|
|
if (!cmd) {
|
|
|
|
ret = -ENOMEM;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2011-08-14 18:17:07 +08:00
|
|
|
cmd->hlid = hlid;
|
2010-10-17 00:08:58 +08:00
|
|
|
cmd->key_id = id;
|
|
|
|
cmd->lid_key_type = WEP_DEFAULT_LID_TYPE;
|
|
|
|
cmd->key_action = cpu_to_le16(KEY_SET_ID);
|
|
|
|
cmd->key_type = KEY_WEP;
|
|
|
|
|
|
|
|
ret = wl1271_cmd_send(wl, CMD_SET_KEYS, cmd, sizeof(*cmd), 0);
|
|
|
|
if (ret < 0) {
|
2011-08-14 18:17:07 +08:00
|
|
|
wl1271_warning("cmd set_default_wep_key failed: %d", ret);
|
2010-10-17 00:08:58 +08:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
|
|
|
kfree(cmd);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2011-10-05 17:55:54 +08:00
|
|
|
int wl1271_cmd_set_sta_key(struct wl1271 *wl, struct wl12xx_vif *wlvif,
|
2011-10-05 17:55:53 +08:00
|
|
|
u16 action, u8 id, u8 key_type,
|
2009-10-09 02:56:19 +08:00
|
|
|
u8 key_size, const u8 *key, const u8 *addr,
|
|
|
|
u32 tx_seq_32, u16 tx_seq_16)
|
2009-08-06 21:25:28 +08:00
|
|
|
{
|
2011-08-14 18:17:07 +08:00
|
|
|
struct wl1271_cmd_set_keys *cmd;
|
2009-08-06 21:25:28 +08:00
|
|
|
int ret = 0;
|
|
|
|
|
2011-08-14 18:17:24 +08:00
|
|
|
/* hlid might have already been deleted */
|
2011-10-05 17:55:53 +08:00
|
|
|
if (wlvif->sta.hlid == WL12XX_INVALID_LINK_ID)
|
2011-08-14 18:17:24 +08:00
|
|
|
return 0;
|
|
|
|
|
2009-08-06 21:25:28 +08:00
|
|
|
cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
|
|
|
|
if (!cmd) {
|
|
|
|
ret = -ENOMEM;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2011-10-05 17:55:53 +08:00
|
|
|
cmd->hlid = wlvif->sta.hlid;
|
2011-08-14 18:17:07 +08:00
|
|
|
|
|
|
|
if (key_type == KEY_WEP)
|
|
|
|
cmd->lid_key_type = WEP_DEFAULT_LID_TYPE;
|
|
|
|
else if (is_broadcast_ether_addr(addr))
|
|
|
|
cmd->lid_key_type = BROADCAST_LID_TYPE;
|
|
|
|
else
|
|
|
|
cmd->lid_key_type = UNICAST_LID_TYPE;
|
2009-08-06 21:25:28 +08:00
|
|
|
|
2009-10-15 15:33:29 +08:00
|
|
|
cmd->key_action = cpu_to_le16(action);
|
2009-08-06 21:25:28 +08:00
|
|
|
cmd->key_size = key_size;
|
|
|
|
cmd->key_type = key_type;
|
|
|
|
|
2009-10-15 15:33:29 +08:00
|
|
|
cmd->ac_seq_num16[0] = cpu_to_le16(tx_seq_16);
|
|
|
|
cmd->ac_seq_num32[0] = cpu_to_le32(tx_seq_32);
|
2009-10-09 02:56:19 +08:00
|
|
|
|
2011-08-14 18:17:07 +08:00
|
|
|
cmd->key_id = id;
|
2009-08-06 21:25:28 +08:00
|
|
|
|
|
|
|
if (key_type == KEY_TKIP) {
|
|
|
|
/*
|
|
|
|
* We get the key in the following form:
|
|
|
|
* TKIP (16 bytes) - TX MIC (8 bytes) - RX MIC (8 bytes)
|
|
|
|
* but the target is expecting:
|
|
|
|
* TKIP - RX MIC - TX MIC
|
|
|
|
*/
|
|
|
|
memcpy(cmd->key, key, 16);
|
|
|
|
memcpy(cmd->key + 16, key + 24, 8);
|
|
|
|
memcpy(cmd->key + 24, key + 16, 8);
|
|
|
|
|
|
|
|
} else {
|
|
|
|
memcpy(cmd->key, key, key_size);
|
|
|
|
}
|
|
|
|
|
|
|
|
wl1271_dump(DEBUG_CRYPT, "TARGET KEY: ", cmd, sizeof(*cmd));
|
|
|
|
|
2009-11-03 02:22:13 +08:00
|
|
|
ret = wl1271_cmd_send(wl, CMD_SET_KEYS, cmd, sizeof(*cmd), 0);
|
2009-08-06 21:25:28 +08:00
|
|
|
if (ret < 0) {
|
|
|
|
wl1271_warning("could not set keys");
|
2010-02-18 19:25:42 +08:00
|
|
|
goto out;
|
2009-08-06 21:25:28 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
|
|
|
kfree(cmd);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
2009-10-12 20:08:42 +08:00
|
|
|
|
2011-08-14 18:17:07 +08:00
|
|
|
/*
|
|
|
|
* TODO: merge with sta/ibss into 1 set_key function.
|
|
|
|
* note there are slight diffs
|
|
|
|
*/
|
2011-10-05 17:55:54 +08:00
|
|
|
int wl1271_cmd_set_ap_key(struct wl1271 *wl, struct wl12xx_vif *wlvif,
|
|
|
|
u16 action, u8 id, u8 key_type,
|
|
|
|
u8 key_size, const u8 *key, u8 hlid, u32 tx_seq_32,
|
|
|
|
u16 tx_seq_16)
|
2010-10-17 00:08:58 +08:00
|
|
|
{
|
2011-08-14 18:17:07 +08:00
|
|
|
struct wl1271_cmd_set_keys *cmd;
|
2010-10-17 00:08:58 +08:00
|
|
|
int ret = 0;
|
|
|
|
u8 lid_type;
|
|
|
|
|
|
|
|
cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
|
|
|
|
if (!cmd)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
2011-10-05 17:55:54 +08:00
|
|
|
if (hlid == wlvif->ap.bcast_hlid) {
|
2010-10-17 00:08:58 +08:00
|
|
|
if (key_type == KEY_WEP)
|
|
|
|
lid_type = WEP_DEFAULT_LID_TYPE;
|
|
|
|
else
|
|
|
|
lid_type = BROADCAST_LID_TYPE;
|
|
|
|
} else {
|
|
|
|
lid_type = UNICAST_LID_TYPE;
|
|
|
|
}
|
|
|
|
|
|
|
|
wl1271_debug(DEBUG_CRYPT, "ap key action: %d id: %d lid: %d type: %d"
|
|
|
|
" hlid: %d", (int)action, (int)id, (int)lid_type,
|
|
|
|
(int)key_type, (int)hlid);
|
|
|
|
|
|
|
|
cmd->lid_key_type = lid_type;
|
|
|
|
cmd->hlid = hlid;
|
|
|
|
cmd->key_action = cpu_to_le16(action);
|
|
|
|
cmd->key_size = key_size;
|
|
|
|
cmd->key_type = key_type;
|
|
|
|
cmd->key_id = id;
|
|
|
|
cmd->ac_seq_num16[0] = cpu_to_le16(tx_seq_16);
|
|
|
|
cmd->ac_seq_num32[0] = cpu_to_le32(tx_seq_32);
|
|
|
|
|
|
|
|
if (key_type == KEY_TKIP) {
|
|
|
|
/*
|
|
|
|
* We get the key in the following form:
|
|
|
|
* TKIP (16 bytes) - TX MIC (8 bytes) - RX MIC (8 bytes)
|
|
|
|
* but the target is expecting:
|
|
|
|
* TKIP - RX MIC - TX MIC
|
|
|
|
*/
|
|
|
|
memcpy(cmd->key, key, 16);
|
|
|
|
memcpy(cmd->key + 16, key + 24, 8);
|
|
|
|
memcpy(cmd->key + 24, key + 16, 8);
|
|
|
|
} else {
|
|
|
|
memcpy(cmd->key, key, key_size);
|
|
|
|
}
|
|
|
|
|
|
|
|
wl1271_dump(DEBUG_CRYPT, "TARGET AP KEY: ", cmd, sizeof(*cmd));
|
|
|
|
|
|
|
|
ret = wl1271_cmd_send(wl, CMD_SET_KEYS, cmd, sizeof(*cmd), 0);
|
|
|
|
if (ret < 0) {
|
|
|
|
wl1271_warning("could not set ap keys");
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
|
|
|
kfree(cmd);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2011-08-14 18:17:23 +08:00
|
|
|
int wl12xx_cmd_set_peer_state(struct wl1271 *wl, u8 hlid)
|
2010-05-27 17:53:01 +08:00
|
|
|
{
|
2011-08-14 18:17:07 +08:00
|
|
|
struct wl12xx_cmd_set_peer_state *cmd;
|
2010-05-27 17:53:01 +08:00
|
|
|
int ret = 0;
|
|
|
|
|
2011-08-14 18:17:23 +08:00
|
|
|
wl1271_debug(DEBUG_CMD, "cmd set peer state (hlid=%d)", hlid);
|
2010-05-27 17:53:01 +08:00
|
|
|
|
|
|
|
cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
|
|
|
|
if (!cmd) {
|
|
|
|
ret = -ENOMEM;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2011-08-14 18:17:23 +08:00
|
|
|
cmd->hlid = hlid;
|
2010-05-27 17:53:01 +08:00
|
|
|
cmd->state = WL1271_CMD_STA_STATE_CONNECTED;
|
|
|
|
|
2011-08-14 18:17:07 +08:00
|
|
|
ret = wl1271_cmd_send(wl, CMD_SET_PEER_STATE, cmd, sizeof(*cmd), 0);
|
2010-05-27 17:53:01 +08:00
|
|
|
if (ret < 0) {
|
2011-08-14 18:17:07 +08:00
|
|
|
wl1271_error("failed to send set peer state command");
|
2010-05-27 17:53:01 +08:00
|
|
|
goto out_free;
|
|
|
|
}
|
|
|
|
|
|
|
|
out_free:
|
|
|
|
kfree(cmd);
|
|
|
|
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
2011-08-14 18:17:28 +08:00
|
|
|
|
2011-10-10 16:13:09 +08:00
|
|
|
int wl12xx_cmd_add_peer(struct wl1271 *wl, struct wl12xx_vif *wlvif,
|
|
|
|
struct ieee80211_sta *sta, u8 hlid)
|
2010-10-17 00:08:58 +08:00
|
|
|
{
|
2011-08-14 18:17:07 +08:00
|
|
|
struct wl12xx_cmd_add_peer *cmd;
|
2011-08-25 19:26:54 +08:00
|
|
|
int i, ret;
|
2011-08-14 18:17:28 +08:00
|
|
|
u32 sta_rates;
|
2010-10-17 00:08:58 +08:00
|
|
|
|
2011-08-14 18:17:07 +08:00
|
|
|
wl1271_debug(DEBUG_CMD, "cmd add peer %d", (int)hlid);
|
2010-10-17 00:08:58 +08:00
|
|
|
|
|
|
|
cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
|
|
|
|
if (!cmd) {
|
|
|
|
ret = -ENOMEM;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
memcpy(cmd->addr, sta->addr, ETH_ALEN);
|
|
|
|
cmd->bss_index = WL1271_AP_BSS_INDEX;
|
|
|
|
cmd->aid = sta->aid;
|
|
|
|
cmd->hlid = hlid;
|
2011-08-25 19:26:54 +08:00
|
|
|
cmd->sp_len = sta->max_sp;
|
2011-06-28 04:58:46 +08:00
|
|
|
cmd->wmm = sta->wme ? 1 : 0;
|
2010-10-17 00:08:58 +08:00
|
|
|
|
2011-08-25 19:26:54 +08:00
|
|
|
for (i = 0; i < NUM_ACCESS_CATEGORIES_COPY; i++)
|
|
|
|
if (sta->wme && (sta->uapsd_queues & BIT(i)))
|
2012-05-08 19:02:11 +08:00
|
|
|
cmd->psd_type[NUM_ACCESS_CATEGORIES_COPY-1-i] =
|
|
|
|
WL1271_PSD_UPSD_TRIGGER;
|
2011-08-25 19:26:54 +08:00
|
|
|
else
|
2012-05-08 19:02:11 +08:00
|
|
|
cmd->psd_type[NUM_ACCESS_CATEGORIES_COPY-1-i] =
|
|
|
|
WL1271_PSD_LEGACY;
|
|
|
|
|
2011-08-25 19:26:54 +08:00
|
|
|
|
2011-10-10 16:13:09 +08:00
|
|
|
sta_rates = sta->supp_rates[wlvif->band];
|
2011-08-14 18:17:28 +08:00
|
|
|
if (sta->ht_cap.ht_supported)
|
2012-05-10 17:13:33 +08:00
|
|
|
sta_rates |=
|
|
|
|
(sta->ht_cap.mcs.rx_mask[0] << HW_HT_RATES_OFFSET) |
|
|
|
|
(sta->ht_cap.mcs.rx_mask[1] << HW_MIMO_RATES_OFFSET);
|
2011-08-14 18:17:28 +08:00
|
|
|
|
|
|
|
cmd->supported_rates =
|
2011-09-19 18:51:42 +08:00
|
|
|
cpu_to_le32(wl1271_tx_enabled_rates_get(wl, sta_rates,
|
2011-10-10 16:13:09 +08:00
|
|
|
wlvif->band));
|
2010-10-17 00:08:58 +08:00
|
|
|
|
2011-08-25 19:26:54 +08:00
|
|
|
wl1271_debug(DEBUG_CMD, "new peer rates=0x%x queues=0x%x",
|
|
|
|
cmd->supported_rates, sta->uapsd_queues);
|
2010-10-17 00:08:58 +08:00
|
|
|
|
2011-08-14 18:17:07 +08:00
|
|
|
ret = wl1271_cmd_send(wl, CMD_ADD_PEER, cmd, sizeof(*cmd), 0);
|
2010-10-17 00:08:58 +08:00
|
|
|
if (ret < 0) {
|
2011-08-14 18:17:07 +08:00
|
|
|
wl1271_error("failed to initiate cmd add peer");
|
2010-10-17 00:08:58 +08:00
|
|
|
goto out_free;
|
|
|
|
}
|
|
|
|
|
|
|
|
out_free:
|
|
|
|
kfree(cmd);
|
|
|
|
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2011-08-14 18:17:07 +08:00
|
|
|
int wl12xx_cmd_remove_peer(struct wl1271 *wl, u8 hlid)
|
2010-10-17 00:08:58 +08:00
|
|
|
{
|
2011-08-14 18:17:07 +08:00
|
|
|
struct wl12xx_cmd_remove_peer *cmd;
|
2010-10-17 00:08:58 +08:00
|
|
|
int ret;
|
|
|
|
|
2011-08-14 18:17:07 +08:00
|
|
|
wl1271_debug(DEBUG_CMD, "cmd remove peer %d", (int)hlid);
|
2010-10-17 00:08:58 +08:00
|
|
|
|
|
|
|
cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
|
|
|
|
if (!cmd) {
|
|
|
|
ret = -ENOMEM;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
cmd->hlid = hlid;
|
|
|
|
/* We never send a deauth, mac80211 is in charge of this */
|
|
|
|
cmd->reason_opcode = 0;
|
|
|
|
cmd->send_deauth_flag = 0;
|
|
|
|
|
2011-08-14 18:17:07 +08:00
|
|
|
ret = wl1271_cmd_send(wl, CMD_REMOVE_PEER, cmd, sizeof(*cmd), 0);
|
2010-10-17 00:08:58 +08:00
|
|
|
if (ret < 0) {
|
2011-08-14 18:17:07 +08:00
|
|
|
wl1271_error("failed to initiate cmd remove peer");
|
2010-10-17 00:08:58 +08:00
|
|
|
goto out_free;
|
|
|
|
}
|
|
|
|
|
2010-11-12 23:15:03 +08:00
|
|
|
/*
|
|
|
|
* We are ok with a timeout here. The event is sometimes not sent
|
|
|
|
* due to a firmware bug.
|
|
|
|
*/
|
2011-08-14 18:17:07 +08:00
|
|
|
wl1271_cmd_wait_for_event_or_timeout(wl,
|
|
|
|
PEER_REMOVE_COMPLETE_EVENT_ID);
|
2010-10-17 00:08:58 +08:00
|
|
|
|
|
|
|
out_free:
|
|
|
|
kfree(cmd);
|
|
|
|
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
2011-06-06 19:57:06 +08:00
|
|
|
|
|
|
|
int wl12xx_cmd_config_fwlog(struct wl1271 *wl)
|
|
|
|
{
|
|
|
|
struct wl12xx_cmd_config_fwlog *cmd;
|
|
|
|
int ret = 0;
|
|
|
|
|
|
|
|
wl1271_debug(DEBUG_CMD, "cmd config firmware logger");
|
|
|
|
|
|
|
|
cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
|
|
|
|
if (!cmd) {
|
|
|
|
ret = -ENOMEM;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
cmd->logger_mode = wl->conf.fwlog.mode;
|
|
|
|
cmd->log_severity = wl->conf.fwlog.severity;
|
|
|
|
cmd->timestamp = wl->conf.fwlog.timestamp;
|
|
|
|
cmd->output = wl->conf.fwlog.output;
|
|
|
|
cmd->threshold = wl->conf.fwlog.threshold;
|
|
|
|
|
|
|
|
ret = wl1271_cmd_send(wl, CMD_CONFIG_FWLOGGER, cmd, sizeof(*cmd), 0);
|
|
|
|
if (ret < 0) {
|
|
|
|
wl1271_error("failed to send config firmware logger command");
|
|
|
|
goto out_free;
|
|
|
|
}
|
|
|
|
|
|
|
|
out_free:
|
|
|
|
kfree(cmd);
|
|
|
|
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
int wl12xx_cmd_start_fwlog(struct wl1271 *wl)
|
|
|
|
{
|
|
|
|
struct wl12xx_cmd_start_fwlog *cmd;
|
|
|
|
int ret = 0;
|
|
|
|
|
|
|
|
wl1271_debug(DEBUG_CMD, "cmd start firmware logger");
|
|
|
|
|
|
|
|
cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
|
|
|
|
if (!cmd) {
|
|
|
|
ret = -ENOMEM;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = wl1271_cmd_send(wl, CMD_START_FWLOGGER, cmd, sizeof(*cmd), 0);
|
|
|
|
if (ret < 0) {
|
|
|
|
wl1271_error("failed to send start firmware logger command");
|
|
|
|
goto out_free;
|
|
|
|
}
|
|
|
|
|
|
|
|
out_free:
|
|
|
|
kfree(cmd);
|
|
|
|
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
int wl12xx_cmd_stop_fwlog(struct wl1271 *wl)
|
|
|
|
{
|
|
|
|
struct wl12xx_cmd_stop_fwlog *cmd;
|
|
|
|
int ret = 0;
|
|
|
|
|
|
|
|
wl1271_debug(DEBUG_CMD, "cmd stop firmware logger");
|
|
|
|
|
|
|
|
cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
|
|
|
|
if (!cmd) {
|
|
|
|
ret = -ENOMEM;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = wl1271_cmd_send(wl, CMD_STOP_FWLOGGER, cmd, sizeof(*cmd), 0);
|
|
|
|
if (ret < 0) {
|
|
|
|
wl1271_error("failed to send stop firmware logger command");
|
|
|
|
goto out_free;
|
|
|
|
}
|
|
|
|
|
|
|
|
out_free:
|
|
|
|
kfree(cmd);
|
|
|
|
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
2011-08-14 18:17:16 +08:00
|
|
|
|
2011-10-10 16:13:09 +08:00
|
|
|
static int wl12xx_cmd_roc(struct wl1271 *wl, struct wl12xx_vif *wlvif,
|
|
|
|
u8 role_id)
|
2011-08-14 18:17:16 +08:00
|
|
|
{
|
|
|
|
struct wl12xx_cmd_roc *cmd;
|
|
|
|
int ret = 0;
|
|
|
|
|
2011-10-10 16:13:10 +08:00
|
|
|
wl1271_debug(DEBUG_CMD, "cmd roc %d (%d)", wlvif->channel, role_id);
|
2011-08-14 18:17:16 +08:00
|
|
|
|
|
|
|
if (WARN_ON(role_id == WL12XX_INVALID_ROLE_ID))
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
|
|
|
|
if (!cmd) {
|
|
|
|
ret = -ENOMEM;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
cmd->role_id = role_id;
|
2011-10-10 16:13:10 +08:00
|
|
|
cmd->channel = wlvif->channel;
|
2011-10-10 16:13:09 +08:00
|
|
|
switch (wlvif->band) {
|
2011-08-14 18:17:16 +08:00
|
|
|
case IEEE80211_BAND_2GHZ:
|
2011-11-29 19:38:37 +08:00
|
|
|
cmd->band = WLCORE_BAND_2_4GHZ;
|
2011-08-14 18:17:16 +08:00
|
|
|
break;
|
|
|
|
case IEEE80211_BAND_5GHZ:
|
2011-11-29 19:38:37 +08:00
|
|
|
cmd->band = WLCORE_BAND_5GHZ;
|
2011-08-14 18:17:16 +08:00
|
|
|
break;
|
|
|
|
default:
|
2011-10-10 16:13:09 +08:00
|
|
|
wl1271_error("roc - unknown band: %d", (int)wlvif->band);
|
2011-08-14 18:17:16 +08:00
|
|
|
ret = -EINVAL;
|
|
|
|
goto out_free;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
ret = wl1271_cmd_send(wl, CMD_REMAIN_ON_CHANNEL, cmd, sizeof(*cmd), 0);
|
|
|
|
if (ret < 0) {
|
|
|
|
wl1271_error("failed to send ROC command");
|
|
|
|
goto out_free;
|
|
|
|
}
|
|
|
|
|
|
|
|
out_free:
|
|
|
|
kfree(cmd);
|
|
|
|
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int wl12xx_cmd_croc(struct wl1271 *wl, u8 role_id)
|
|
|
|
{
|
|
|
|
struct wl12xx_cmd_croc *cmd;
|
|
|
|
int ret = 0;
|
|
|
|
|
|
|
|
wl1271_debug(DEBUG_CMD, "cmd croc (%d)", role_id);
|
|
|
|
|
|
|
|
cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
|
|
|
|
if (!cmd) {
|
|
|
|
ret = -ENOMEM;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
cmd->role_id = role_id;
|
|
|
|
|
|
|
|
ret = wl1271_cmd_send(wl, CMD_CANCEL_REMAIN_ON_CHANNEL, cmd,
|
|
|
|
sizeof(*cmd), 0);
|
|
|
|
if (ret < 0) {
|
|
|
|
wl1271_error("failed to send ROC command");
|
|
|
|
goto out_free;
|
|
|
|
}
|
|
|
|
|
|
|
|
out_free:
|
|
|
|
kfree(cmd);
|
|
|
|
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
wl12xx: replace dummy_join with ROC/CROC commands
The ROC command asks the fw stay on the channel of the given
hlid. it currently has 2 primary functions:
1. Allow tx/rx from the device role.
In order to tx/rx packets while the stations is not associated
(e.g. auth req/resp), the device role has to be used, along
with ROC on its link.
Keep the logic similiar to the one used in dummy_join. However,
since we can't scan while we ROC, we add CROC before starting
a scan, and ROC again (if needed) on scan complete.
2. Keeping the antenna for a specific link.
We ROC until the connection was completed (after EAPOLs exchange)
in order to prevent BT coex operations from taking the antenna
and failing the connection (after this stage, psm can be used).
During association, we ROC on the station role, and then CROC
the device role, thus assuring being ROC during all the connection
process.
Delete the WL1271_FLAG_JOINED flag, and use a roc bitmap
to indicate what roles are currently ROCed.
Add wl12xx_roc/croc functions in order to wrap the roc/croc
commands while taking care of the roc bitmap.
The current ROC/CROC state-machine is a bit complicated. In
the future we'll probably want to use wpa_supplicant to control
the ROC during connection.
Signed-off-by: Eliad Peller <eliad@wizery.com>
Signed-off-by: Luciano Coelho <coelho@ti.com>
2011-08-14 18:17:17 +08:00
|
|
|
|
2011-10-10 16:13:09 +08:00
|
|
|
int wl12xx_roc(struct wl1271 *wl, struct wl12xx_vif *wlvif, u8 role_id)
|
wl12xx: replace dummy_join with ROC/CROC commands
The ROC command asks the fw stay on the channel of the given
hlid. it currently has 2 primary functions:
1. Allow tx/rx from the device role.
In order to tx/rx packets while the stations is not associated
(e.g. auth req/resp), the device role has to be used, along
with ROC on its link.
Keep the logic similiar to the one used in dummy_join. However,
since we can't scan while we ROC, we add CROC before starting
a scan, and ROC again (if needed) on scan complete.
2. Keeping the antenna for a specific link.
We ROC until the connection was completed (after EAPOLs exchange)
in order to prevent BT coex operations from taking the antenna
and failing the connection (after this stage, psm can be used).
During association, we ROC on the station role, and then CROC
the device role, thus assuring being ROC during all the connection
process.
Delete the WL1271_FLAG_JOINED flag, and use a roc bitmap
to indicate what roles are currently ROCed.
Add wl12xx_roc/croc functions in order to wrap the roc/croc
commands while taking care of the roc bitmap.
The current ROC/CROC state-machine is a bit complicated. In
the future we'll probably want to use wpa_supplicant to control
the ROC during connection.
Signed-off-by: Eliad Peller <eliad@wizery.com>
Signed-off-by: Luciano Coelho <coelho@ti.com>
2011-08-14 18:17:17 +08:00
|
|
|
{
|
|
|
|
int ret = 0;
|
|
|
|
|
|
|
|
if (WARN_ON(test_bit(role_id, wl->roc_map)))
|
|
|
|
return 0;
|
|
|
|
|
2011-10-10 16:13:09 +08:00
|
|
|
ret = wl12xx_cmd_roc(wl, wlvif, role_id);
|
wl12xx: replace dummy_join with ROC/CROC commands
The ROC command asks the fw stay on the channel of the given
hlid. it currently has 2 primary functions:
1. Allow tx/rx from the device role.
In order to tx/rx packets while the stations is not associated
(e.g. auth req/resp), the device role has to be used, along
with ROC on its link.
Keep the logic similiar to the one used in dummy_join. However,
since we can't scan while we ROC, we add CROC before starting
a scan, and ROC again (if needed) on scan complete.
2. Keeping the antenna for a specific link.
We ROC until the connection was completed (after EAPOLs exchange)
in order to prevent BT coex operations from taking the antenna
and failing the connection (after this stage, psm can be used).
During association, we ROC on the station role, and then CROC
the device role, thus assuring being ROC during all the connection
process.
Delete the WL1271_FLAG_JOINED flag, and use a roc bitmap
to indicate what roles are currently ROCed.
Add wl12xx_roc/croc functions in order to wrap the roc/croc
commands while taking care of the roc bitmap.
The current ROC/CROC state-machine is a bit complicated. In
the future we'll probably want to use wpa_supplicant to control
the ROC during connection.
Signed-off-by: Eliad Peller <eliad@wizery.com>
Signed-off-by: Luciano Coelho <coelho@ti.com>
2011-08-14 18:17:17 +08:00
|
|
|
if (ret < 0)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
ret = wl1271_cmd_wait_for_event(wl,
|
|
|
|
REMAIN_ON_CHANNEL_COMPLETE_EVENT_ID);
|
|
|
|
if (ret < 0) {
|
|
|
|
wl1271_error("cmd roc event completion error");
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
__set_bit(role_id, wl->roc_map);
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
int wl12xx_croc(struct wl1271 *wl, u8 role_id)
|
|
|
|
{
|
|
|
|
int ret = 0;
|
|
|
|
|
|
|
|
if (WARN_ON(!test_bit(role_id, wl->roc_map)))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
ret = wl12xx_cmd_croc(wl, role_id);
|
|
|
|
if (ret < 0)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
__clear_bit(role_id, wl->roc_map);
|
2012-03-04 04:18:00 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Rearm the tx watchdog when removing the last ROC. This prevents
|
|
|
|
* recoveries due to just finished ROCs - when Tx hasn't yet had
|
|
|
|
* a chance to get out.
|
|
|
|
*/
|
|
|
|
if (find_first_bit(wl->roc_map, WL12XX_MAX_ROLES) >= WL12XX_MAX_ROLES)
|
|
|
|
wl12xx_rearm_tx_watchdog_locked(wl);
|
wl12xx: replace dummy_join with ROC/CROC commands
The ROC command asks the fw stay on the channel of the given
hlid. it currently has 2 primary functions:
1. Allow tx/rx from the device role.
In order to tx/rx packets while the stations is not associated
(e.g. auth req/resp), the device role has to be used, along
with ROC on its link.
Keep the logic similiar to the one used in dummy_join. However,
since we can't scan while we ROC, we add CROC before starting
a scan, and ROC again (if needed) on scan complete.
2. Keeping the antenna for a specific link.
We ROC until the connection was completed (after EAPOLs exchange)
in order to prevent BT coex operations from taking the antenna
and failing the connection (after this stage, psm can be used).
During association, we ROC on the station role, and then CROC
the device role, thus assuring being ROC during all the connection
process.
Delete the WL1271_FLAG_JOINED flag, and use a roc bitmap
to indicate what roles are currently ROCed.
Add wl12xx_roc/croc functions in order to wrap the roc/croc
commands while taking care of the roc bitmap.
The current ROC/CROC state-machine is a bit complicated. In
the future we'll probably want to use wpa_supplicant to control
the ROC during connection.
Signed-off-by: Eliad Peller <eliad@wizery.com>
Signed-off-by: Luciano Coelho <coelho@ti.com>
2011-08-14 18:17:17 +08:00
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
2011-09-08 18:01:33 +08:00
|
|
|
|
|
|
|
int wl12xx_cmd_channel_switch(struct wl1271 *wl,
|
2012-01-31 17:57:19 +08:00
|
|
|
struct wl12xx_vif *wlvif,
|
2011-09-08 18:01:33 +08:00
|
|
|
struct ieee80211_channel_switch *ch_switch)
|
|
|
|
{
|
|
|
|
struct wl12xx_cmd_channel_switch *cmd;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
wl1271_debug(DEBUG_ACX, "cmd channel switch");
|
|
|
|
|
|
|
|
cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
|
|
|
|
if (!cmd) {
|
|
|
|
ret = -ENOMEM;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2012-01-31 17:57:19 +08:00
|
|
|
cmd->role_id = wlvif->role_id;
|
2011-09-08 18:01:33 +08:00
|
|
|
cmd->channel = ch_switch->channel->hw_value;
|
|
|
|
cmd->switch_time = ch_switch->count;
|
2012-01-31 17:57:19 +08:00
|
|
|
cmd->stop_tx = ch_switch->block_tx;
|
|
|
|
|
|
|
|
/* FIXME: control from mac80211 in the future */
|
|
|
|
cmd->post_switch_tx_disable = 0; /* Enable TX on the target channel */
|
2011-09-08 18:01:33 +08:00
|
|
|
|
|
|
|
ret = wl1271_cmd_send(wl, CMD_CHANNEL_SWITCH, cmd, sizeof(*cmd), 0);
|
|
|
|
if (ret < 0) {
|
|
|
|
wl1271_error("failed to send channel switch command");
|
|
|
|
goto out_free;
|
|
|
|
}
|
|
|
|
|
|
|
|
out_free:
|
|
|
|
kfree(cmd);
|
|
|
|
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
int wl12xx_cmd_stop_channel_switch(struct wl1271 *wl)
|
|
|
|
{
|
|
|
|
struct wl12xx_cmd_stop_channel_switch *cmd;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
wl1271_debug(DEBUG_ACX, "cmd stop channel switch");
|
|
|
|
|
|
|
|
cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
|
|
|
|
if (!cmd) {
|
|
|
|
ret = -ENOMEM;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = wl1271_cmd_send(wl, CMD_STOP_CHANNEL_SWICTH, cmd, sizeof(*cmd), 0);
|
|
|
|
if (ret < 0) {
|
|
|
|
wl1271_error("failed to stop channel switch command");
|
|
|
|
goto out_free;
|
|
|
|
}
|
|
|
|
|
|
|
|
out_free:
|
|
|
|
kfree(cmd);
|
|
|
|
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
2011-10-11 17:55:44 +08:00
|
|
|
|
|
|
|
/* start dev role and roc on its channel */
|
|
|
|
int wl12xx_start_dev(struct wl1271 *wl, struct wl12xx_vif *wlvif)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
if (WARN_ON(!(wlvif->bss_type == BSS_TYPE_STA_BSS ||
|
|
|
|
wlvif->bss_type == BSS_TYPE_IBSS)))
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
ret = wl12xx_cmd_role_start_dev(wl, wlvif);
|
|
|
|
if (ret < 0)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
ret = wl12xx_roc(wl, wlvif, wlvif->dev_role_id);
|
|
|
|
if (ret < 0)
|
|
|
|
goto out_stop;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
out_stop:
|
|
|
|
wl12xx_cmd_role_stop_dev(wl, wlvif);
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* croc dev hlid, and stop the role */
|
|
|
|
int wl12xx_stop_dev(struct wl1271 *wl, struct wl12xx_vif *wlvif)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
if (WARN_ON(!(wlvif->bss_type == BSS_TYPE_STA_BSS ||
|
|
|
|
wlvif->bss_type == BSS_TYPE_IBSS)))
|
|
|
|
return -EINVAL;
|
|
|
|
|
2011-12-19 02:25:42 +08:00
|
|
|
/* flush all pending packets */
|
|
|
|
wl1271_tx_work_locked(wl);
|
|
|
|
|
2011-10-11 17:55:44 +08:00
|
|
|
if (test_bit(wlvif->dev_role_id, wl->roc_map)) {
|
|
|
|
ret = wl12xx_croc(wl, wlvif->dev_role_id);
|
|
|
|
if (ret < 0)
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = wl12xx_cmd_role_stop_dev(wl, wlvif);
|
|
|
|
if (ret < 0)
|
|
|
|
goto out;
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|