Merge tag 'mac80211-next-for-john-2014-08-29' of git://git.kernel.org/pub/scm/linux...
[firefly-linux-kernel-4.4.55.git] / drivers / net / wireless / brcm80211 / brcmfmac / wl_cfg80211.c
1 /*
2  * Copyright (c) 2010 Broadcom Corporation
3  *
4  * Permission to use, copy, modify, and/or distribute this software for any
5  * purpose with or without fee is hereby granted, provided that the above
6  * copyright notice and this permission notice appear in all copies.
7  *
8  * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
9  * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
10  * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY
11  * SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
12  * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION
13  * OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN
14  * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
15  */
16
17 /* Toplevel file. Relies on dhd_linux.c to send commands to the dongle. */
18
19 #include <linux/kernel.h>
20 #include <linux/etherdevice.h>
21 #include <linux/module.h>
22 #include <linux/vmalloc.h>
23 #include <net/cfg80211.h>
24 #include <net/netlink.h>
25
26 #include <brcmu_utils.h>
27 #include <defs.h>
28 #include <brcmu_wifi.h>
29 #include "dhd.h"
30 #include "dhd_dbg.h"
31 #include "tracepoint.h"
32 #include "fwil_types.h"
33 #include "p2p.h"
34 #include "btcoex.h"
35 #include "wl_cfg80211.h"
36 #include "feature.h"
37 #include "fwil.h"
38 #include "proto.h"
39 #include "vendor.h"
40
41 #define BRCMF_SCAN_IE_LEN_MAX           2048
42 #define BRCMF_PNO_VERSION               2
43 #define BRCMF_PNO_TIME                  30
44 #define BRCMF_PNO_REPEAT                4
45 #define BRCMF_PNO_FREQ_EXPO_MAX         3
46 #define BRCMF_PNO_MAX_PFN_COUNT         16
47 #define BRCMF_PNO_ENABLE_ADAPTSCAN_BIT  6
48 #define BRCMF_PNO_HIDDEN_BIT            2
49 #define BRCMF_PNO_WPA_AUTH_ANY          0xFFFFFFFF
50 #define BRCMF_PNO_SCAN_COMPLETE         1
51 #define BRCMF_PNO_SCAN_INCOMPLETE       0
52
53 #define BRCMF_IFACE_MAX_CNT             3
54
55 #define WPA_OUI                         "\x00\x50\xF2"  /* WPA OUI */
56 #define WPA_OUI_TYPE                    1
57 #define RSN_OUI                         "\x00\x0F\xAC"  /* RSN OUI */
58 #define WME_OUI_TYPE                    2
59 #define WPS_OUI_TYPE                    4
60
61 #define VS_IE_FIXED_HDR_LEN             6
62 #define WPA_IE_VERSION_LEN              2
63 #define WPA_IE_MIN_OUI_LEN              4
64 #define WPA_IE_SUITE_COUNT_LEN          2
65
66 #define WPA_CIPHER_NONE                 0       /* None */
67 #define WPA_CIPHER_WEP_40               1       /* WEP (40-bit) */
68 #define WPA_CIPHER_TKIP                 2       /* TKIP: default for WPA */
69 #define WPA_CIPHER_AES_CCM              4       /* AES (CCM) */
70 #define WPA_CIPHER_WEP_104              5       /* WEP (104-bit) */
71
72 #define RSN_AKM_NONE                    0       /* None (IBSS) */
73 #define RSN_AKM_UNSPECIFIED             1       /* Over 802.1x */
74 #define RSN_AKM_PSK                     2       /* Pre-shared Key */
75 #define RSN_CAP_LEN                     2       /* Length of RSN capabilities */
76 #define RSN_CAP_PTK_REPLAY_CNTR_MASK    0x000C
77
78 #define VNDR_IE_CMD_LEN                 4       /* length of the set command
79                                                  * string :"add", "del" (+ NUL)
80                                                  */
81 #define VNDR_IE_COUNT_OFFSET            4
82 #define VNDR_IE_PKTFLAG_OFFSET          8
83 #define VNDR_IE_VSIE_OFFSET             12
84 #define VNDR_IE_HDR_SIZE                12
85 #define VNDR_IE_PARSE_LIMIT             5
86
87 #define DOT11_MGMT_HDR_LEN              24      /* d11 management header len */
88 #define DOT11_BCN_PRB_FIXED_LEN         12      /* beacon/probe fixed length */
89
90 #define BRCMF_SCAN_JOIN_ACTIVE_DWELL_TIME_MS    320
91 #define BRCMF_SCAN_JOIN_PASSIVE_DWELL_TIME_MS   400
92 #define BRCMF_SCAN_JOIN_PROBE_INTERVAL_MS       20
93
94 #define BRCMF_ASSOC_PARAMS_FIXED_SIZE \
95         (sizeof(struct brcmf_assoc_params_le) - sizeof(u16))
96
97 static bool check_vif_up(struct brcmf_cfg80211_vif *vif)
98 {
99         if (!test_bit(BRCMF_VIF_STATUS_READY, &vif->sme_state)) {
100                 brcmf_dbg(INFO, "device is not ready : status (%lu)\n",
101                           vif->sme_state);
102                 return false;
103         }
104         return true;
105 }
106
107 #define RATE_TO_BASE100KBPS(rate)   (((rate) * 10) / 2)
108 #define RATETAB_ENT(_rateid, _flags) \
109         {                                                               \
110                 .bitrate        = RATE_TO_BASE100KBPS(_rateid),     \
111                 .hw_value       = (_rateid),                            \
112                 .flags          = (_flags),                             \
113         }
114
115 static struct ieee80211_rate __wl_rates[] = {
116         RATETAB_ENT(BRCM_RATE_1M, 0),
117         RATETAB_ENT(BRCM_RATE_2M, IEEE80211_RATE_SHORT_PREAMBLE),
118         RATETAB_ENT(BRCM_RATE_5M5, IEEE80211_RATE_SHORT_PREAMBLE),
119         RATETAB_ENT(BRCM_RATE_11M, IEEE80211_RATE_SHORT_PREAMBLE),
120         RATETAB_ENT(BRCM_RATE_6M, 0),
121         RATETAB_ENT(BRCM_RATE_9M, 0),
122         RATETAB_ENT(BRCM_RATE_12M, 0),
123         RATETAB_ENT(BRCM_RATE_18M, 0),
124         RATETAB_ENT(BRCM_RATE_24M, 0),
125         RATETAB_ENT(BRCM_RATE_36M, 0),
126         RATETAB_ENT(BRCM_RATE_48M, 0),
127         RATETAB_ENT(BRCM_RATE_54M, 0),
128 };
129
130 #define wl_a_rates              (__wl_rates + 4)
131 #define wl_a_rates_size 8
132 #define wl_g_rates              (__wl_rates + 0)
133 #define wl_g_rates_size 12
134
135 /* Band templates duplicated per wiphy. The channel info
136  * is filled in after querying the device.
137  */
138 static const struct ieee80211_supported_band __wl_band_2ghz = {
139         .band = IEEE80211_BAND_2GHZ,
140         .bitrates = wl_g_rates,
141         .n_bitrates = wl_g_rates_size,
142 };
143
144 static const struct ieee80211_supported_band __wl_band_5ghz_a = {
145         .band = IEEE80211_BAND_5GHZ,
146         .bitrates = wl_a_rates,
147         .n_bitrates = wl_a_rates_size,
148 };
149
150 /* This is to override regulatory domains defined in cfg80211 module (reg.c)
151  * By default world regulatory domain defined in reg.c puts the flags
152  * NL80211_RRF_NO_IR for 5GHz channels (for * 36..48 and 149..165).
153  * With respect to these flags, wpa_supplicant doesn't * start p2p
154  * operations on 5GHz channels. All the changes in world regulatory
155  * domain are to be done here.
156  */
157 static const struct ieee80211_regdomain brcmf_regdom = {
158         .n_reg_rules = 4,
159         .alpha2 =  "99",
160         .reg_rules = {
161                 /* IEEE 802.11b/g, channels 1..11 */
162                 REG_RULE(2412-10, 2472+10, 40, 6, 20, 0),
163                 /* If any */
164                 /* IEEE 802.11 channel 14 - Only JP enables
165                  * this and for 802.11b only
166                  */
167                 REG_RULE(2484-10, 2484+10, 20, 6, 20, 0),
168                 /* IEEE 802.11a, channel 36..64 */
169                 REG_RULE(5150-10, 5350+10, 80, 6, 20, 0),
170                 /* IEEE 802.11a, channel 100..165 */
171                 REG_RULE(5470-10, 5850+10, 80, 6, 20, 0), }
172 };
173
174 static const u32 __wl_cipher_suites[] = {
175         WLAN_CIPHER_SUITE_WEP40,
176         WLAN_CIPHER_SUITE_WEP104,
177         WLAN_CIPHER_SUITE_TKIP,
178         WLAN_CIPHER_SUITE_CCMP,
179         WLAN_CIPHER_SUITE_AES_CMAC,
180 };
181
182 /* Vendor specific ie. id = 221, oui and type defines exact ie */
183 struct brcmf_vs_tlv {
184         u8 id;
185         u8 len;
186         u8 oui[3];
187         u8 oui_type;
188 };
189
190 struct parsed_vndr_ie_info {
191         u8 *ie_ptr;
192         u32 ie_len;     /* total length including id & length field */
193         struct brcmf_vs_tlv vndrie;
194 };
195
196 struct parsed_vndr_ies {
197         u32 count;
198         struct parsed_vndr_ie_info ie_info[VNDR_IE_PARSE_LIMIT];
199 };
200
201 static int brcmf_roamoff;
202 module_param_named(roamoff, brcmf_roamoff, int, S_IRUSR);
203 MODULE_PARM_DESC(roamoff, "do not use internal roaming engine");
204
205 /* Quarter dBm units to mW
206  * Table starts at QDBM_OFFSET, so the first entry is mW for qdBm=153
207  * Table is offset so the last entry is largest mW value that fits in
208  * a u16.
209  */
210
211 #define QDBM_OFFSET 153         /* Offset for first entry */
212 #define QDBM_TABLE_LEN 40       /* Table size */
213
214 /* Smallest mW value that will round up to the first table entry, QDBM_OFFSET.
215  * Value is ( mW(QDBM_OFFSET - 1) + mW(QDBM_OFFSET) ) / 2
216  */
217 #define QDBM_TABLE_LOW_BOUND 6493       /* Low bound */
218
219 /* Largest mW value that will round down to the last table entry,
220  * QDBM_OFFSET + QDBM_TABLE_LEN-1.
221  * Value is ( mW(QDBM_OFFSET + QDBM_TABLE_LEN - 1) +
222  * mW(QDBM_OFFSET + QDBM_TABLE_LEN) ) / 2.
223  */
224 #define QDBM_TABLE_HIGH_BOUND 64938     /* High bound */
225
226 static const u16 nqdBm_to_mW_map[QDBM_TABLE_LEN] = {
227 /* qdBm:        +0      +1      +2      +3      +4      +5      +6      +7 */
228 /* 153: */ 6683, 7079, 7499, 7943, 8414, 8913, 9441, 10000,
229 /* 161: */ 10593, 11220, 11885, 12589, 13335, 14125, 14962, 15849,
230 /* 169: */ 16788, 17783, 18836, 19953, 21135, 22387, 23714, 25119,
231 /* 177: */ 26607, 28184, 29854, 31623, 33497, 35481, 37584, 39811,
232 /* 185: */ 42170, 44668, 47315, 50119, 53088, 56234, 59566, 63096
233 };
234
235 static u16 brcmf_qdbm_to_mw(u8 qdbm)
236 {
237         uint factor = 1;
238         int idx = qdbm - QDBM_OFFSET;
239
240         if (idx >= QDBM_TABLE_LEN)
241                 /* clamp to max u16 mW value */
242                 return 0xFFFF;
243
244         /* scale the qdBm index up to the range of the table 0-40
245          * where an offset of 40 qdBm equals a factor of 10 mW.
246          */
247         while (idx < 0) {
248                 idx += 40;
249                 factor *= 10;
250         }
251
252         /* return the mW value scaled down to the correct factor of 10,
253          * adding in factor/2 to get proper rounding.
254          */
255         return (nqdBm_to_mW_map[idx] + factor / 2) / factor;
256 }
257
258 static u8 brcmf_mw_to_qdbm(u16 mw)
259 {
260         u8 qdbm;
261         int offset;
262         uint mw_uint = mw;
263         uint boundary;
264
265         /* handle boundary case */
266         if (mw_uint <= 1)
267                 return 0;
268
269         offset = QDBM_OFFSET;
270
271         /* move mw into the range of the table */
272         while (mw_uint < QDBM_TABLE_LOW_BOUND) {
273                 mw_uint *= 10;
274                 offset -= 40;
275         }
276
277         for (qdbm = 0; qdbm < QDBM_TABLE_LEN - 1; qdbm++) {
278                 boundary = nqdBm_to_mW_map[qdbm] + (nqdBm_to_mW_map[qdbm + 1] -
279                                                     nqdBm_to_mW_map[qdbm]) / 2;
280                 if (mw_uint < boundary)
281                         break;
282         }
283
284         qdbm += (u8) offset;
285
286         return qdbm;
287 }
288
289 static u16 chandef_to_chanspec(struct brcmu_d11inf *d11inf,
290                                struct cfg80211_chan_def *ch)
291 {
292         struct brcmu_chan ch_inf;
293         s32 primary_offset;
294
295         brcmf_dbg(TRACE, "chandef: control %d center %d width %d\n",
296                   ch->chan->center_freq, ch->center_freq1, ch->width);
297         ch_inf.chnum = ieee80211_frequency_to_channel(ch->center_freq1);
298         primary_offset = ch->center_freq1 - ch->chan->center_freq;
299         switch (ch->width) {
300         case NL80211_CHAN_WIDTH_20:
301                 ch_inf.bw = BRCMU_CHAN_BW_20;
302                 WARN_ON(primary_offset != 0);
303                 break;
304         case NL80211_CHAN_WIDTH_40:
305                 ch_inf.bw = BRCMU_CHAN_BW_40;
306                 if (primary_offset < 0)
307                         ch_inf.sb = BRCMU_CHAN_SB_U;
308                 else
309                         ch_inf.sb = BRCMU_CHAN_SB_L;
310                 break;
311         case NL80211_CHAN_WIDTH_80:
312                 ch_inf.bw = BRCMU_CHAN_BW_80;
313                 if (primary_offset < 0) {
314                         if (primary_offset < -CH_10MHZ_APART)
315                                 ch_inf.sb = BRCMU_CHAN_SB_UU;
316                         else
317                                 ch_inf.sb = BRCMU_CHAN_SB_UL;
318                 } else {
319                         if (primary_offset > CH_10MHZ_APART)
320                                 ch_inf.sb = BRCMU_CHAN_SB_LL;
321                         else
322                                 ch_inf.sb = BRCMU_CHAN_SB_LU;
323                 }
324                 break;
325         default:
326                 WARN_ON_ONCE(1);
327         }
328         switch (ch->chan->band) {
329         case IEEE80211_BAND_2GHZ:
330                 ch_inf.band = BRCMU_CHAN_BAND_2G;
331                 break;
332         case IEEE80211_BAND_5GHZ:
333                 ch_inf.band = BRCMU_CHAN_BAND_5G;
334                 break;
335         default:
336                 WARN_ON_ONCE(1);
337         }
338         d11inf->encchspec(&ch_inf);
339
340         return ch_inf.chspec;
341 }
342
343 u16 channel_to_chanspec(struct brcmu_d11inf *d11inf,
344                         struct ieee80211_channel *ch)
345 {
346         struct brcmu_chan ch_inf;
347
348         ch_inf.chnum = ieee80211_frequency_to_channel(ch->center_freq);
349         ch_inf.bw = BRCMU_CHAN_BW_20;
350         d11inf->encchspec(&ch_inf);
351
352         return ch_inf.chspec;
353 }
354
355 /* Traverse a string of 1-byte tag/1-byte length/variable-length value
356  * triples, returning a pointer to the substring whose first element
357  * matches tag
358  */
359 const struct brcmf_tlv *
360 brcmf_parse_tlvs(const void *buf, int buflen, uint key)
361 {
362         const struct brcmf_tlv *elt = buf;
363         int totlen = buflen;
364
365         /* find tagged parameter */
366         while (totlen >= TLV_HDR_LEN) {
367                 int len = elt->len;
368
369                 /* validate remaining totlen */
370                 if ((elt->id == key) && (totlen >= (len + TLV_HDR_LEN)))
371                         return elt;
372
373                 elt = (struct brcmf_tlv *)((u8 *)elt + (len + TLV_HDR_LEN));
374                 totlen -= (len + TLV_HDR_LEN);
375         }
376
377         return NULL;
378 }
379
380 /* Is any of the tlvs the expected entry? If
381  * not update the tlvs buffer pointer/length.
382  */
383 static bool
384 brcmf_tlv_has_ie(const u8 *ie, const u8 **tlvs, u32 *tlvs_len,
385                  const u8 *oui, u32 oui_len, u8 type)
386 {
387         /* If the contents match the OUI and the type */
388         if (ie[TLV_LEN_OFF] >= oui_len + 1 &&
389             !memcmp(&ie[TLV_BODY_OFF], oui, oui_len) &&
390             type == ie[TLV_BODY_OFF + oui_len]) {
391                 return true;
392         }
393
394         if (tlvs == NULL)
395                 return false;
396         /* point to the next ie */
397         ie += ie[TLV_LEN_OFF] + TLV_HDR_LEN;
398         /* calculate the length of the rest of the buffer */
399         *tlvs_len -= (int)(ie - *tlvs);
400         /* update the pointer to the start of the buffer */
401         *tlvs = ie;
402
403         return false;
404 }
405
406 static struct brcmf_vs_tlv *
407 brcmf_find_wpaie(const u8 *parse, u32 len)
408 {
409         const struct brcmf_tlv *ie;
410
411         while ((ie = brcmf_parse_tlvs(parse, len, WLAN_EID_VENDOR_SPECIFIC))) {
412                 if (brcmf_tlv_has_ie((const u8 *)ie, &parse, &len,
413                                      WPA_OUI, TLV_OUI_LEN, WPA_OUI_TYPE))
414                         return (struct brcmf_vs_tlv *)ie;
415         }
416         return NULL;
417 }
418
419 static struct brcmf_vs_tlv *
420 brcmf_find_wpsie(const u8 *parse, u32 len)
421 {
422         const struct brcmf_tlv *ie;
423
424         while ((ie = brcmf_parse_tlvs(parse, len, WLAN_EID_VENDOR_SPECIFIC))) {
425                 if (brcmf_tlv_has_ie((u8 *)ie, &parse, &len,
426                                      WPA_OUI, TLV_OUI_LEN, WPS_OUI_TYPE))
427                         return (struct brcmf_vs_tlv *)ie;
428         }
429         return NULL;
430 }
431
432
433 static void convert_key_from_CPU(struct brcmf_wsec_key *key,
434                                  struct brcmf_wsec_key_le *key_le)
435 {
436         key_le->index = cpu_to_le32(key->index);
437         key_le->len = cpu_to_le32(key->len);
438         key_le->algo = cpu_to_le32(key->algo);
439         key_le->flags = cpu_to_le32(key->flags);
440         key_le->rxiv.hi = cpu_to_le32(key->rxiv.hi);
441         key_le->rxiv.lo = cpu_to_le16(key->rxiv.lo);
442         key_le->iv_initialized = cpu_to_le32(key->iv_initialized);
443         memcpy(key_le->data, key->data, sizeof(key->data));
444         memcpy(key_le->ea, key->ea, sizeof(key->ea));
445 }
446
447 static int
448 send_key_to_dongle(struct net_device *ndev, struct brcmf_wsec_key *key)
449 {
450         int err;
451         struct brcmf_wsec_key_le key_le;
452
453         convert_key_from_CPU(key, &key_le);
454
455         brcmf_netdev_wait_pend8021x(ndev);
456
457         err = brcmf_fil_bsscfg_data_set(netdev_priv(ndev), "wsec_key", &key_le,
458                                         sizeof(key_le));
459
460         if (err)
461                 brcmf_err("wsec_key error (%d)\n", err);
462         return err;
463 }
464
465 static s32
466 brcmf_configure_arp_offload(struct brcmf_if *ifp, bool enable)
467 {
468         s32 err;
469         u32 mode;
470
471         if (enable)
472                 mode = BRCMF_ARP_OL_AGENT | BRCMF_ARP_OL_PEER_AUTO_REPLY;
473         else
474                 mode = 0;
475
476         /* Try to set and enable ARP offload feature, this may fail, then it  */
477         /* is simply not supported and err 0 will be returned                 */
478         err = brcmf_fil_iovar_int_set(ifp, "arp_ol", mode);
479         if (err) {
480                 brcmf_dbg(TRACE, "failed to set ARP offload mode to 0x%x, err = %d\n",
481                           mode, err);
482                 err = 0;
483         } else {
484                 err = brcmf_fil_iovar_int_set(ifp, "arpoe", enable);
485                 if (err) {
486                         brcmf_dbg(TRACE, "failed to configure (%d) ARP offload err = %d\n",
487                                   enable, err);
488                         err = 0;
489                 } else
490                         brcmf_dbg(TRACE, "successfully configured (%d) ARP offload to 0x%x\n",
491                                   enable, mode);
492         }
493
494         return err;
495 }
496
497 static void
498 brcmf_cfg80211_update_proto_addr_mode(struct wireless_dev *wdev)
499 {
500         struct net_device *ndev = wdev->netdev;
501         struct brcmf_if *ifp = netdev_priv(ndev);
502
503         if ((wdev->iftype == NL80211_IFTYPE_ADHOC) ||
504             (wdev->iftype == NL80211_IFTYPE_AP) ||
505             (wdev->iftype == NL80211_IFTYPE_P2P_GO))
506                 brcmf_proto_configure_addr_mode(ifp->drvr, ifp->ifidx,
507                                                 ADDR_DIRECT);
508         else
509                 brcmf_proto_configure_addr_mode(ifp->drvr, ifp->ifidx,
510                                                 ADDR_INDIRECT);
511 }
512
513 static bool brcmf_is_apmode(struct brcmf_cfg80211_vif *vif)
514 {
515         enum nl80211_iftype iftype;
516
517         iftype = vif->wdev.iftype;
518         return iftype == NL80211_IFTYPE_AP || iftype == NL80211_IFTYPE_P2P_GO;
519 }
520
521 static bool brcmf_is_ibssmode(struct brcmf_cfg80211_vif *vif)
522 {
523         return vif->wdev.iftype == NL80211_IFTYPE_ADHOC;
524 }
525
526 static struct wireless_dev *brcmf_cfg80211_add_iface(struct wiphy *wiphy,
527                                                      const char *name,
528                                                      enum nl80211_iftype type,
529                                                      u32 *flags,
530                                                      struct vif_params *params)
531 {
532         struct wireless_dev *wdev;
533
534         brcmf_dbg(TRACE, "enter: %s type %d\n", name, type);
535         switch (type) {
536         case NL80211_IFTYPE_ADHOC:
537         case NL80211_IFTYPE_STATION:
538         case NL80211_IFTYPE_AP:
539         case NL80211_IFTYPE_AP_VLAN:
540         case NL80211_IFTYPE_WDS:
541         case NL80211_IFTYPE_MONITOR:
542         case NL80211_IFTYPE_MESH_POINT:
543                 return ERR_PTR(-EOPNOTSUPP);
544         case NL80211_IFTYPE_P2P_CLIENT:
545         case NL80211_IFTYPE_P2P_GO:
546         case NL80211_IFTYPE_P2P_DEVICE:
547                 wdev = brcmf_p2p_add_vif(wiphy, name, type, flags, params);
548                 if (!IS_ERR(wdev))
549                         brcmf_cfg80211_update_proto_addr_mode(wdev);
550                 return wdev;
551         case NL80211_IFTYPE_UNSPECIFIED:
552         default:
553                 return ERR_PTR(-EINVAL);
554         }
555 }
556
557 static void brcmf_scan_config_mpc(struct brcmf_if *ifp, int mpc)
558 {
559         if (brcmf_feat_is_quirk_enabled(ifp, BRCMF_FEAT_QUIRK_NEED_MPC))
560                 brcmf_set_mpc(ifp, mpc);
561 }
562
563 void brcmf_set_mpc(struct brcmf_if *ifp, int mpc)
564 {
565         s32 err = 0;
566
567         if (check_vif_up(ifp->vif)) {
568                 err = brcmf_fil_iovar_int_set(ifp, "mpc", mpc);
569                 if (err) {
570                         brcmf_err("fail to set mpc\n");
571                         return;
572                 }
573                 brcmf_dbg(INFO, "MPC : %d\n", mpc);
574         }
575 }
576
577 s32 brcmf_notify_escan_complete(struct brcmf_cfg80211_info *cfg,
578                                 struct brcmf_if *ifp, bool aborted,
579                                 bool fw_abort)
580 {
581         struct brcmf_scan_params_le params_le;
582         struct cfg80211_scan_request *scan_request;
583         s32 err = 0;
584
585         brcmf_dbg(SCAN, "Enter\n");
586
587         /* clear scan request, because the FW abort can cause a second call */
588         /* to this functon and might cause a double cfg80211_scan_done      */
589         scan_request = cfg->scan_request;
590         cfg->scan_request = NULL;
591
592         if (timer_pending(&cfg->escan_timeout))
593                 del_timer_sync(&cfg->escan_timeout);
594
595         if (fw_abort) {
596                 /* Do a scan abort to stop the driver's scan engine */
597                 brcmf_dbg(SCAN, "ABORT scan in firmware\n");
598                 memset(&params_le, 0, sizeof(params_le));
599                 memset(params_le.bssid, 0xFF, ETH_ALEN);
600                 params_le.bss_type = DOT11_BSSTYPE_ANY;
601                 params_le.scan_type = 0;
602                 params_le.channel_num = cpu_to_le32(1);
603                 params_le.nprobes = cpu_to_le32(1);
604                 params_le.active_time = cpu_to_le32(-1);
605                 params_le.passive_time = cpu_to_le32(-1);
606                 params_le.home_time = cpu_to_le32(-1);
607                 /* Scan is aborted by setting channel_list[0] to -1 */
608                 params_le.channel_list[0] = cpu_to_le16(-1);
609                 /* E-Scan (or anyother type) can be aborted by SCAN */
610                 err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SCAN,
611                                              &params_le, sizeof(params_le));
612                 if (err)
613                         brcmf_err("Scan abort  failed\n");
614         }
615
616         brcmf_scan_config_mpc(ifp, 1);
617
618         /*
619          * e-scan can be initiated by scheduled scan
620          * which takes precedence.
621          */
622         if (cfg->sched_escan) {
623                 brcmf_dbg(SCAN, "scheduled scan completed\n");
624                 cfg->sched_escan = false;
625                 if (!aborted)
626                         cfg80211_sched_scan_results(cfg_to_wiphy(cfg));
627         } else if (scan_request) {
628                 brcmf_dbg(SCAN, "ESCAN Completed scan: %s\n",
629                           aborted ? "Aborted" : "Done");
630                 cfg80211_scan_done(scan_request, aborted);
631         }
632         if (!test_and_clear_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status))
633                 brcmf_dbg(SCAN, "Scan complete, probably P2P scan\n");
634
635         return err;
636 }
637
638 static
639 int brcmf_cfg80211_del_iface(struct wiphy *wiphy, struct wireless_dev *wdev)
640 {
641         struct brcmf_cfg80211_info *cfg = wiphy_priv(wiphy);
642         struct net_device *ndev = wdev->netdev;
643
644         /* vif event pending in firmware */
645         if (brcmf_cfg80211_vif_event_armed(cfg))
646                 return -EBUSY;
647
648         if (ndev) {
649                 if (test_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status) &&
650                     cfg->escan_info.ifp == netdev_priv(ndev))
651                         brcmf_notify_escan_complete(cfg, netdev_priv(ndev),
652                                                     true, true);
653
654                 brcmf_fil_iovar_int_set(netdev_priv(ndev), "mpc", 1);
655         }
656
657         switch (wdev->iftype) {
658         case NL80211_IFTYPE_ADHOC:
659         case NL80211_IFTYPE_STATION:
660         case NL80211_IFTYPE_AP:
661         case NL80211_IFTYPE_AP_VLAN:
662         case NL80211_IFTYPE_WDS:
663         case NL80211_IFTYPE_MONITOR:
664         case NL80211_IFTYPE_MESH_POINT:
665                 return -EOPNOTSUPP;
666         case NL80211_IFTYPE_P2P_CLIENT:
667         case NL80211_IFTYPE_P2P_GO:
668         case NL80211_IFTYPE_P2P_DEVICE:
669                 return brcmf_p2p_del_vif(wiphy, wdev);
670         case NL80211_IFTYPE_UNSPECIFIED:
671         default:
672                 return -EINVAL;
673         }
674         return -EOPNOTSUPP;
675 }
676
677 static s32
678 brcmf_cfg80211_change_iface(struct wiphy *wiphy, struct net_device *ndev,
679                          enum nl80211_iftype type, u32 *flags,
680                          struct vif_params *params)
681 {
682         struct brcmf_cfg80211_info *cfg = wiphy_priv(wiphy);
683         struct brcmf_if *ifp = netdev_priv(ndev);
684         struct brcmf_cfg80211_vif *vif = ifp->vif;
685         s32 infra = 0;
686         s32 ap = 0;
687         s32 err = 0;
688
689         brcmf_dbg(TRACE, "Enter, ndev=%p, type=%d\n", ndev, type);
690
691         switch (type) {
692         case NL80211_IFTYPE_MONITOR:
693         case NL80211_IFTYPE_WDS:
694                 brcmf_err("type (%d) : currently we do not support this type\n",
695                           type);
696                 return -EOPNOTSUPP;
697         case NL80211_IFTYPE_ADHOC:
698                 infra = 0;
699                 break;
700         case NL80211_IFTYPE_STATION:
701                 /* Ignore change for p2p IF. Unclear why supplicant does this */
702                 if ((vif->wdev.iftype == NL80211_IFTYPE_P2P_CLIENT) ||
703                     (vif->wdev.iftype == NL80211_IFTYPE_P2P_GO)) {
704                         brcmf_dbg(TRACE, "Ignoring cmd for p2p if\n");
705                         /* WAR: It is unexpected to get a change of VIF for P2P
706                          * IF, but it happens. The request can not be handled
707                          * but returning EPERM causes a crash. Returning 0
708                          * without setting ieee80211_ptr->iftype causes trace
709                          * (WARN_ON) but it works with wpa_supplicant
710                          */
711                         return 0;
712                 }
713                 infra = 1;
714                 break;
715         case NL80211_IFTYPE_AP:
716         case NL80211_IFTYPE_P2P_GO:
717                 ap = 1;
718                 break;
719         default:
720                 err = -EINVAL;
721                 goto done;
722         }
723
724         if (ap) {
725                 if (type == NL80211_IFTYPE_P2P_GO) {
726                         brcmf_dbg(INFO, "IF Type = P2P GO\n");
727                         err = brcmf_p2p_ifchange(cfg, BRCMF_FIL_P2P_IF_GO);
728                 }
729                 if (!err) {
730                         set_bit(BRCMF_VIF_STATUS_AP_CREATING, &vif->sme_state);
731                         brcmf_dbg(INFO, "IF Type = AP\n");
732                 }
733         } else {
734                 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_INFRA, infra);
735                 if (err) {
736                         brcmf_err("WLC_SET_INFRA error (%d)\n", err);
737                         err = -EAGAIN;
738                         goto done;
739                 }
740                 brcmf_dbg(INFO, "IF Type = %s\n", brcmf_is_ibssmode(vif) ?
741                           "Adhoc" : "Infra");
742         }
743         ndev->ieee80211_ptr->iftype = type;
744
745         brcmf_cfg80211_update_proto_addr_mode(&vif->wdev);
746
747 done:
748         brcmf_dbg(TRACE, "Exit\n");
749
750         return err;
751 }
752
753 static void brcmf_escan_prep(struct brcmf_cfg80211_info *cfg,
754                              struct brcmf_scan_params_le *params_le,
755                              struct cfg80211_scan_request *request)
756 {
757         u32 n_ssids;
758         u32 n_channels;
759         s32 i;
760         s32 offset;
761         u16 chanspec;
762         char *ptr;
763         struct brcmf_ssid_le ssid_le;
764
765         memset(params_le->bssid, 0xFF, ETH_ALEN);
766         params_le->bss_type = DOT11_BSSTYPE_ANY;
767         params_le->scan_type = 0;
768         params_le->channel_num = 0;
769         params_le->nprobes = cpu_to_le32(-1);
770         params_le->active_time = cpu_to_le32(-1);
771         params_le->passive_time = cpu_to_le32(-1);
772         params_le->home_time = cpu_to_le32(-1);
773         memset(&params_le->ssid_le, 0, sizeof(params_le->ssid_le));
774
775         /* if request is null exit so it will be all channel broadcast scan */
776         if (!request)
777                 return;
778
779         n_ssids = request->n_ssids;
780         n_channels = request->n_channels;
781         /* Copy channel array if applicable */
782         brcmf_dbg(SCAN, "### List of channelspecs to scan ### %d\n",
783                   n_channels);
784         if (n_channels > 0) {
785                 for (i = 0; i < n_channels; i++) {
786                         chanspec = channel_to_chanspec(&cfg->d11inf,
787                                                        request->channels[i]);
788                         brcmf_dbg(SCAN, "Chan : %d, Channel spec: %x\n",
789                                   request->channels[i]->hw_value, chanspec);
790                         params_le->channel_list[i] = cpu_to_le16(chanspec);
791                 }
792         } else {
793                 brcmf_dbg(SCAN, "Scanning all channels\n");
794         }
795         /* Copy ssid array if applicable */
796         brcmf_dbg(SCAN, "### List of SSIDs to scan ### %d\n", n_ssids);
797         if (n_ssids > 0) {
798                 offset = offsetof(struct brcmf_scan_params_le, channel_list) +
799                                 n_channels * sizeof(u16);
800                 offset = roundup(offset, sizeof(u32));
801                 ptr = (char *)params_le + offset;
802                 for (i = 0; i < n_ssids; i++) {
803                         memset(&ssid_le, 0, sizeof(ssid_le));
804                         ssid_le.SSID_len =
805                                         cpu_to_le32(request->ssids[i].ssid_len);
806                         memcpy(ssid_le.SSID, request->ssids[i].ssid,
807                                request->ssids[i].ssid_len);
808                         if (!ssid_le.SSID_len)
809                                 brcmf_dbg(SCAN, "%d: Broadcast scan\n", i);
810                         else
811                                 brcmf_dbg(SCAN, "%d: scan for  %s size =%d\n",
812                                           i, ssid_le.SSID, ssid_le.SSID_len);
813                         memcpy(ptr, &ssid_le, sizeof(ssid_le));
814                         ptr += sizeof(ssid_le);
815                 }
816         } else {
817                 brcmf_dbg(SCAN, "Broadcast scan %p\n", request->ssids);
818                 if ((request->ssids) && request->ssids->ssid_len) {
819                         brcmf_dbg(SCAN, "SSID %s len=%d\n",
820                                   params_le->ssid_le.SSID,
821                                   request->ssids->ssid_len);
822                         params_le->ssid_le.SSID_len =
823                                 cpu_to_le32(request->ssids->ssid_len);
824                         memcpy(&params_le->ssid_le.SSID, request->ssids->ssid,
825                                 request->ssids->ssid_len);
826                 }
827         }
828         /* Adding mask to channel numbers */
829         params_le->channel_num =
830                 cpu_to_le32((n_ssids << BRCMF_SCAN_PARAMS_NSSID_SHIFT) |
831                         (n_channels & BRCMF_SCAN_PARAMS_COUNT_MASK));
832 }
833
834 static s32
835 brcmf_run_escan(struct brcmf_cfg80211_info *cfg, struct brcmf_if *ifp,
836                 struct cfg80211_scan_request *request, u16 action)
837 {
838         s32 params_size = BRCMF_SCAN_PARAMS_FIXED_SIZE +
839                           offsetof(struct brcmf_escan_params_le, params_le);
840         struct brcmf_escan_params_le *params;
841         s32 err = 0;
842
843         brcmf_dbg(SCAN, "E-SCAN START\n");
844
845         if (request != NULL) {
846                 /* Allocate space for populating ssids in struct */
847                 params_size += sizeof(u32) * ((request->n_channels + 1) / 2);
848
849                 /* Allocate space for populating ssids in struct */
850                 params_size += sizeof(struct brcmf_ssid) * request->n_ssids;
851         }
852
853         params = kzalloc(params_size, GFP_KERNEL);
854         if (!params) {
855                 err = -ENOMEM;
856                 goto exit;
857         }
858         BUG_ON(params_size + sizeof("escan") >= BRCMF_DCMD_MEDLEN);
859         brcmf_escan_prep(cfg, &params->params_le, request);
860         params->version = cpu_to_le32(BRCMF_ESCAN_REQ_VERSION);
861         params->action = cpu_to_le16(action);
862         params->sync_id = cpu_to_le16(0x1234);
863
864         err = brcmf_fil_iovar_data_set(ifp, "escan", params, params_size);
865         if (err) {
866                 if (err == -EBUSY)
867                         brcmf_dbg(INFO, "system busy : escan canceled\n");
868                 else
869                         brcmf_err("error (%d)\n", err);
870         }
871
872         kfree(params);
873 exit:
874         return err;
875 }
876
877 static s32
878 brcmf_do_escan(struct brcmf_cfg80211_info *cfg, struct wiphy *wiphy,
879                struct brcmf_if *ifp, struct cfg80211_scan_request *request)
880 {
881         s32 err;
882         u32 passive_scan;
883         struct brcmf_scan_results *results;
884         struct escan_info *escan = &cfg->escan_info;
885
886         brcmf_dbg(SCAN, "Enter\n");
887         escan->ifp = ifp;
888         escan->wiphy = wiphy;
889         escan->escan_state = WL_ESCAN_STATE_SCANNING;
890         passive_scan = cfg->active_scan ? 0 : 1;
891         err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_PASSIVE_SCAN,
892                                     passive_scan);
893         if (err) {
894                 brcmf_err("error (%d)\n", err);
895                 return err;
896         }
897         brcmf_scan_config_mpc(ifp, 0);
898         results = (struct brcmf_scan_results *)cfg->escan_info.escan_buf;
899         results->version = 0;
900         results->count = 0;
901         results->buflen = WL_ESCAN_RESULTS_FIXED_SIZE;
902
903         err = escan->run(cfg, ifp, request, WL_ESCAN_ACTION_START);
904         if (err)
905                 brcmf_scan_config_mpc(ifp, 1);
906         return err;
907 }
908
909 static s32
910 brcmf_cfg80211_escan(struct wiphy *wiphy, struct brcmf_cfg80211_vif *vif,
911                      struct cfg80211_scan_request *request,
912                      struct cfg80211_ssid *this_ssid)
913 {
914         struct brcmf_if *ifp = vif->ifp;
915         struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
916         struct cfg80211_ssid *ssids;
917         struct brcmf_cfg80211_scan_req *sr = &cfg->scan_req_int;
918         u32 passive_scan;
919         bool escan_req;
920         bool spec_scan;
921         s32 err;
922         u32 SSID_len;
923
924         brcmf_dbg(SCAN, "START ESCAN\n");
925
926         if (test_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status)) {
927                 brcmf_err("Scanning already: status (%lu)\n", cfg->scan_status);
928                 return -EAGAIN;
929         }
930         if (test_bit(BRCMF_SCAN_STATUS_ABORT, &cfg->scan_status)) {
931                 brcmf_err("Scanning being aborted: status (%lu)\n",
932                           cfg->scan_status);
933                 return -EAGAIN;
934         }
935         if (test_bit(BRCMF_SCAN_STATUS_SUPPRESS, &cfg->scan_status)) {
936                 brcmf_err("Scanning suppressed: status (%lu)\n",
937                           cfg->scan_status);
938                 return -EAGAIN;
939         }
940         if (test_bit(BRCMF_VIF_STATUS_CONNECTING, &ifp->vif->sme_state)) {
941                 brcmf_err("Connecting: status (%lu)\n", ifp->vif->sme_state);
942                 return -EAGAIN;
943         }
944
945         /* If scan req comes for p2p0, send it over primary I/F */
946         if (vif == cfg->p2p.bss_idx[P2PAPI_BSSCFG_DEVICE].vif)
947                 vif = cfg->p2p.bss_idx[P2PAPI_BSSCFG_PRIMARY].vif;
948
949         /* Arm scan timeout timer */
950         mod_timer(&cfg->escan_timeout, jiffies +
951                         WL_ESCAN_TIMER_INTERVAL_MS * HZ / 1000);
952
953         escan_req = false;
954         if (request) {
955                 /* scan bss */
956                 ssids = request->ssids;
957                 escan_req = true;
958         } else {
959                 /* scan in ibss */
960                 /* we don't do escan in ibss */
961                 ssids = this_ssid;
962         }
963
964         cfg->scan_request = request;
965         set_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status);
966         if (escan_req) {
967                 cfg->escan_info.run = brcmf_run_escan;
968                 err = brcmf_p2p_scan_prep(wiphy, request, vif);
969                 if (err)
970                         goto scan_out;
971
972                 err = brcmf_do_escan(cfg, wiphy, vif->ifp, request);
973                 if (err)
974                         goto scan_out;
975         } else {
976                 brcmf_dbg(SCAN, "ssid \"%s\", ssid_len (%d)\n",
977                           ssids->ssid, ssids->ssid_len);
978                 memset(&sr->ssid_le, 0, sizeof(sr->ssid_le));
979                 SSID_len = min_t(u8, sizeof(sr->ssid_le.SSID), ssids->ssid_len);
980                 sr->ssid_le.SSID_len = cpu_to_le32(0);
981                 spec_scan = false;
982                 if (SSID_len) {
983                         memcpy(sr->ssid_le.SSID, ssids->ssid, SSID_len);
984                         sr->ssid_le.SSID_len = cpu_to_le32(SSID_len);
985                         spec_scan = true;
986                 } else
987                         brcmf_dbg(SCAN, "Broadcast scan\n");
988
989                 passive_scan = cfg->active_scan ? 0 : 1;
990                 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_PASSIVE_SCAN,
991                                             passive_scan);
992                 if (err) {
993                         brcmf_err("WLC_SET_PASSIVE_SCAN error (%d)\n", err);
994                         goto scan_out;
995                 }
996                 brcmf_scan_config_mpc(ifp, 0);
997                 err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SCAN,
998                                              &sr->ssid_le, sizeof(sr->ssid_le));
999                 if (err) {
1000                         if (err == -EBUSY)
1001                                 brcmf_dbg(INFO, "BUSY: scan for \"%s\" canceled\n",
1002                                           sr->ssid_le.SSID);
1003                         else
1004                                 brcmf_err("WLC_SCAN error (%d)\n", err);
1005
1006                         brcmf_scan_config_mpc(ifp, 1);
1007                         goto scan_out;
1008                 }
1009         }
1010
1011         return 0;
1012
1013 scan_out:
1014         clear_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status);
1015         if (timer_pending(&cfg->escan_timeout))
1016                 del_timer_sync(&cfg->escan_timeout);
1017         cfg->scan_request = NULL;
1018         return err;
1019 }
1020
1021 static s32
1022 brcmf_cfg80211_scan(struct wiphy *wiphy, struct cfg80211_scan_request *request)
1023 {
1024         struct brcmf_cfg80211_vif *vif;
1025         s32 err = 0;
1026
1027         brcmf_dbg(TRACE, "Enter\n");
1028         vif = container_of(request->wdev, struct brcmf_cfg80211_vif, wdev);
1029         if (!check_vif_up(vif))
1030                 return -EIO;
1031
1032         err = brcmf_cfg80211_escan(wiphy, vif, request, NULL);
1033
1034         if (err)
1035                 brcmf_err("scan error (%d)\n", err);
1036
1037         brcmf_dbg(TRACE, "Exit\n");
1038         return err;
1039 }
1040
1041 static s32 brcmf_set_rts(struct net_device *ndev, u32 rts_threshold)
1042 {
1043         s32 err = 0;
1044
1045         err = brcmf_fil_iovar_int_set(netdev_priv(ndev), "rtsthresh",
1046                                       rts_threshold);
1047         if (err)
1048                 brcmf_err("Error (%d)\n", err);
1049
1050         return err;
1051 }
1052
1053 static s32 brcmf_set_frag(struct net_device *ndev, u32 frag_threshold)
1054 {
1055         s32 err = 0;
1056
1057         err = brcmf_fil_iovar_int_set(netdev_priv(ndev), "fragthresh",
1058                                       frag_threshold);
1059         if (err)
1060                 brcmf_err("Error (%d)\n", err);
1061
1062         return err;
1063 }
1064
1065 static s32 brcmf_set_retry(struct net_device *ndev, u32 retry, bool l)
1066 {
1067         s32 err = 0;
1068         u32 cmd = (l ? BRCMF_C_SET_LRL : BRCMF_C_SET_SRL);
1069
1070         err = brcmf_fil_cmd_int_set(netdev_priv(ndev), cmd, retry);
1071         if (err) {
1072                 brcmf_err("cmd (%d) , error (%d)\n", cmd, err);
1073                 return err;
1074         }
1075         return err;
1076 }
1077
1078 static s32 brcmf_cfg80211_set_wiphy_params(struct wiphy *wiphy, u32 changed)
1079 {
1080         struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
1081         struct net_device *ndev = cfg_to_ndev(cfg);
1082         struct brcmf_if *ifp = netdev_priv(ndev);
1083         s32 err = 0;
1084
1085         brcmf_dbg(TRACE, "Enter\n");
1086         if (!check_vif_up(ifp->vif))
1087                 return -EIO;
1088
1089         if (changed & WIPHY_PARAM_RTS_THRESHOLD &&
1090             (cfg->conf->rts_threshold != wiphy->rts_threshold)) {
1091                 cfg->conf->rts_threshold = wiphy->rts_threshold;
1092                 err = brcmf_set_rts(ndev, cfg->conf->rts_threshold);
1093                 if (!err)
1094                         goto done;
1095         }
1096         if (changed & WIPHY_PARAM_FRAG_THRESHOLD &&
1097             (cfg->conf->frag_threshold != wiphy->frag_threshold)) {
1098                 cfg->conf->frag_threshold = wiphy->frag_threshold;
1099                 err = brcmf_set_frag(ndev, cfg->conf->frag_threshold);
1100                 if (!err)
1101                         goto done;
1102         }
1103         if (changed & WIPHY_PARAM_RETRY_LONG
1104             && (cfg->conf->retry_long != wiphy->retry_long)) {
1105                 cfg->conf->retry_long = wiphy->retry_long;
1106                 err = brcmf_set_retry(ndev, cfg->conf->retry_long, true);
1107                 if (!err)
1108                         goto done;
1109         }
1110         if (changed & WIPHY_PARAM_RETRY_SHORT
1111             && (cfg->conf->retry_short != wiphy->retry_short)) {
1112                 cfg->conf->retry_short = wiphy->retry_short;
1113                 err = brcmf_set_retry(ndev, cfg->conf->retry_short, false);
1114                 if (!err)
1115                         goto done;
1116         }
1117
1118 done:
1119         brcmf_dbg(TRACE, "Exit\n");
1120         return err;
1121 }
1122
1123 static void brcmf_init_prof(struct brcmf_cfg80211_profile *prof)
1124 {
1125         memset(prof, 0, sizeof(*prof));
1126 }
1127
1128 static void brcmf_link_down(struct brcmf_cfg80211_vif *vif)
1129 {
1130         struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(vif->wdev.wiphy);
1131         s32 err = 0;
1132
1133         brcmf_dbg(TRACE, "Enter\n");
1134
1135         if (test_bit(BRCMF_VIF_STATUS_CONNECTED, &vif->sme_state)) {
1136                 brcmf_dbg(INFO, "Call WLC_DISASSOC to stop excess roaming\n ");
1137                 err = brcmf_fil_cmd_data_set(vif->ifp,
1138                                              BRCMF_C_DISASSOC, NULL, 0);
1139                 if (err) {
1140                         brcmf_err("WLC_DISASSOC failed (%d)\n", err);
1141                 }
1142                 clear_bit(BRCMF_VIF_STATUS_CONNECTED, &vif->sme_state);
1143                 cfg80211_disconnected(vif->wdev.netdev, 0, NULL, 0, GFP_KERNEL);
1144
1145         }
1146         clear_bit(BRCMF_VIF_STATUS_CONNECTING, &vif->sme_state);
1147         clear_bit(BRCMF_SCAN_STATUS_SUPPRESS, &cfg->scan_status);
1148         brcmf_btcoex_set_mode(vif, BRCMF_BTCOEX_ENABLED, 0);
1149         brcmf_dbg(TRACE, "Exit\n");
1150 }
1151
1152 static s32
1153 brcmf_cfg80211_join_ibss(struct wiphy *wiphy, struct net_device *ndev,
1154                       struct cfg80211_ibss_params *params)
1155 {
1156         struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
1157         struct brcmf_if *ifp = netdev_priv(ndev);
1158         struct brcmf_cfg80211_profile *profile = &ifp->vif->profile;
1159         struct brcmf_join_params join_params;
1160         size_t join_params_size = 0;
1161         s32 err = 0;
1162         s32 wsec = 0;
1163         s32 bcnprd;
1164         u16 chanspec;
1165
1166         brcmf_dbg(TRACE, "Enter\n");
1167         if (!check_vif_up(ifp->vif))
1168                 return -EIO;
1169
1170         if (params->ssid)
1171                 brcmf_dbg(CONN, "SSID: %s\n", params->ssid);
1172         else {
1173                 brcmf_dbg(CONN, "SSID: NULL, Not supported\n");
1174                 return -EOPNOTSUPP;
1175         }
1176
1177         set_bit(BRCMF_VIF_STATUS_CONNECTING, &ifp->vif->sme_state);
1178
1179         if (params->bssid)
1180                 brcmf_dbg(CONN, "BSSID: %pM\n", params->bssid);
1181         else
1182                 brcmf_dbg(CONN, "No BSSID specified\n");
1183
1184         if (params->chandef.chan)
1185                 brcmf_dbg(CONN, "channel: %d\n",
1186                           params->chandef.chan->center_freq);
1187         else
1188                 brcmf_dbg(CONN, "no channel specified\n");
1189
1190         if (params->channel_fixed)
1191                 brcmf_dbg(CONN, "fixed channel required\n");
1192         else
1193                 brcmf_dbg(CONN, "no fixed channel required\n");
1194
1195         if (params->ie && params->ie_len)
1196                 brcmf_dbg(CONN, "ie len: %d\n", params->ie_len);
1197         else
1198                 brcmf_dbg(CONN, "no ie specified\n");
1199
1200         if (params->beacon_interval)
1201                 brcmf_dbg(CONN, "beacon interval: %d\n",
1202                           params->beacon_interval);
1203         else
1204                 brcmf_dbg(CONN, "no beacon interval specified\n");
1205
1206         if (params->basic_rates)
1207                 brcmf_dbg(CONN, "basic rates: %08X\n", params->basic_rates);
1208         else
1209                 brcmf_dbg(CONN, "no basic rates specified\n");
1210
1211         if (params->privacy)
1212                 brcmf_dbg(CONN, "privacy required\n");
1213         else
1214                 brcmf_dbg(CONN, "no privacy required\n");
1215
1216         /* Configure Privacy for starter */
1217         if (params->privacy)
1218                 wsec |= WEP_ENABLED;
1219
1220         err = brcmf_fil_iovar_int_set(ifp, "wsec", wsec);
1221         if (err) {
1222                 brcmf_err("wsec failed (%d)\n", err);
1223                 goto done;
1224         }
1225
1226         /* Configure Beacon Interval for starter */
1227         if (params->beacon_interval)
1228                 bcnprd = params->beacon_interval;
1229         else
1230                 bcnprd = 100;
1231
1232         err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_BCNPRD, bcnprd);
1233         if (err) {
1234                 brcmf_err("WLC_SET_BCNPRD failed (%d)\n", err);
1235                 goto done;
1236         }
1237
1238         /* Configure required join parameter */
1239         memset(&join_params, 0, sizeof(struct brcmf_join_params));
1240
1241         /* SSID */
1242         profile->ssid.SSID_len = min_t(u32, params->ssid_len, 32);
1243         memcpy(profile->ssid.SSID, params->ssid, profile->ssid.SSID_len);
1244         memcpy(join_params.ssid_le.SSID, params->ssid, profile->ssid.SSID_len);
1245         join_params.ssid_le.SSID_len = cpu_to_le32(profile->ssid.SSID_len);
1246         join_params_size = sizeof(join_params.ssid_le);
1247
1248         /* BSSID */
1249         if (params->bssid) {
1250                 memcpy(join_params.params_le.bssid, params->bssid, ETH_ALEN);
1251                 join_params_size = sizeof(join_params.ssid_le) +
1252                                    BRCMF_ASSOC_PARAMS_FIXED_SIZE;
1253                 memcpy(profile->bssid, params->bssid, ETH_ALEN);
1254         } else {
1255                 memset(join_params.params_le.bssid, 0xFF, ETH_ALEN);
1256                 memset(profile->bssid, 0, ETH_ALEN);
1257         }
1258
1259         /* Channel */
1260         if (params->chandef.chan) {
1261                 u32 target_channel;
1262
1263                 cfg->channel =
1264                         ieee80211_frequency_to_channel(
1265                                 params->chandef.chan->center_freq);
1266                 if (params->channel_fixed) {
1267                         /* adding chanspec */
1268                         chanspec = chandef_to_chanspec(&cfg->d11inf,
1269                                                        &params->chandef);
1270                         join_params.params_le.chanspec_list[0] =
1271                                 cpu_to_le16(chanspec);
1272                         join_params.params_le.chanspec_num = cpu_to_le32(1);
1273                         join_params_size += sizeof(join_params.params_le);
1274                 }
1275
1276                 /* set channel for starter */
1277                 target_channel = cfg->channel;
1278                 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_CHANNEL,
1279                                             target_channel);
1280                 if (err) {
1281                         brcmf_err("WLC_SET_CHANNEL failed (%d)\n", err);
1282                         goto done;
1283                 }
1284         } else
1285                 cfg->channel = 0;
1286
1287         cfg->ibss_starter = false;
1288
1289
1290         err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_SSID,
1291                                      &join_params, join_params_size);
1292         if (err) {
1293                 brcmf_err("WLC_SET_SSID failed (%d)\n", err);
1294                 goto done;
1295         }
1296
1297 done:
1298         if (err)
1299                 clear_bit(BRCMF_VIF_STATUS_CONNECTING, &ifp->vif->sme_state);
1300         brcmf_dbg(TRACE, "Exit\n");
1301         return err;
1302 }
1303
1304 static s32
1305 brcmf_cfg80211_leave_ibss(struct wiphy *wiphy, struct net_device *ndev)
1306 {
1307         struct brcmf_if *ifp = netdev_priv(ndev);
1308
1309         brcmf_dbg(TRACE, "Enter\n");
1310         if (!check_vif_up(ifp->vif))
1311                 return -EIO;
1312
1313         brcmf_link_down(ifp->vif);
1314
1315         brcmf_dbg(TRACE, "Exit\n");
1316
1317         return 0;
1318 }
1319
1320 static s32 brcmf_set_wpa_version(struct net_device *ndev,
1321                                  struct cfg80211_connect_params *sme)
1322 {
1323         struct brcmf_cfg80211_profile *profile = ndev_to_prof(ndev);
1324         struct brcmf_cfg80211_security *sec;
1325         s32 val = 0;
1326         s32 err = 0;
1327
1328         if (sme->crypto.wpa_versions & NL80211_WPA_VERSION_1)
1329                 val = WPA_AUTH_PSK | WPA_AUTH_UNSPECIFIED;
1330         else if (sme->crypto.wpa_versions & NL80211_WPA_VERSION_2)
1331                 val = WPA2_AUTH_PSK | WPA2_AUTH_UNSPECIFIED;
1332         else
1333                 val = WPA_AUTH_DISABLED;
1334         brcmf_dbg(CONN, "setting wpa_auth to 0x%0x\n", val);
1335         err = brcmf_fil_bsscfg_int_set(netdev_priv(ndev), "wpa_auth", val);
1336         if (err) {
1337                 brcmf_err("set wpa_auth failed (%d)\n", err);
1338                 return err;
1339         }
1340         sec = &profile->sec;
1341         sec->wpa_versions = sme->crypto.wpa_versions;
1342         return err;
1343 }
1344
1345 static s32 brcmf_set_auth_type(struct net_device *ndev,
1346                                struct cfg80211_connect_params *sme)
1347 {
1348         struct brcmf_cfg80211_profile *profile = ndev_to_prof(ndev);
1349         struct brcmf_cfg80211_security *sec;
1350         s32 val = 0;
1351         s32 err = 0;
1352
1353         switch (sme->auth_type) {
1354         case NL80211_AUTHTYPE_OPEN_SYSTEM:
1355                 val = 0;
1356                 brcmf_dbg(CONN, "open system\n");
1357                 break;
1358         case NL80211_AUTHTYPE_SHARED_KEY:
1359                 val = 1;
1360                 brcmf_dbg(CONN, "shared key\n");
1361                 break;
1362         case NL80211_AUTHTYPE_AUTOMATIC:
1363                 val = 2;
1364                 brcmf_dbg(CONN, "automatic\n");
1365                 break;
1366         case NL80211_AUTHTYPE_NETWORK_EAP:
1367                 brcmf_dbg(CONN, "network eap\n");
1368         default:
1369                 val = 2;
1370                 brcmf_err("invalid auth type (%d)\n", sme->auth_type);
1371                 break;
1372         }
1373
1374         err = brcmf_fil_bsscfg_int_set(netdev_priv(ndev), "auth", val);
1375         if (err) {
1376                 brcmf_err("set auth failed (%d)\n", err);
1377                 return err;
1378         }
1379         sec = &profile->sec;
1380         sec->auth_type = sme->auth_type;
1381         return err;
1382 }
1383
1384 static s32
1385 brcmf_set_wsec_mode(struct net_device *ndev,
1386                      struct cfg80211_connect_params *sme, bool mfp)
1387 {
1388         struct brcmf_cfg80211_profile *profile = ndev_to_prof(ndev);
1389         struct brcmf_cfg80211_security *sec;
1390         s32 pval = 0;
1391         s32 gval = 0;
1392         s32 wsec;
1393         s32 err = 0;
1394
1395         if (sme->crypto.n_ciphers_pairwise) {
1396                 switch (sme->crypto.ciphers_pairwise[0]) {
1397                 case WLAN_CIPHER_SUITE_WEP40:
1398                 case WLAN_CIPHER_SUITE_WEP104:
1399                         pval = WEP_ENABLED;
1400                         break;
1401                 case WLAN_CIPHER_SUITE_TKIP:
1402                         pval = TKIP_ENABLED;
1403                         break;
1404                 case WLAN_CIPHER_SUITE_CCMP:
1405                         pval = AES_ENABLED;
1406                         break;
1407                 case WLAN_CIPHER_SUITE_AES_CMAC:
1408                         pval = AES_ENABLED;
1409                         break;
1410                 default:
1411                         brcmf_err("invalid cipher pairwise (%d)\n",
1412                                   sme->crypto.ciphers_pairwise[0]);
1413                         return -EINVAL;
1414                 }
1415         }
1416         if (sme->crypto.cipher_group) {
1417                 switch (sme->crypto.cipher_group) {
1418                 case WLAN_CIPHER_SUITE_WEP40:
1419                 case WLAN_CIPHER_SUITE_WEP104:
1420                         gval = WEP_ENABLED;
1421                         break;
1422                 case WLAN_CIPHER_SUITE_TKIP:
1423                         gval = TKIP_ENABLED;
1424                         break;
1425                 case WLAN_CIPHER_SUITE_CCMP:
1426                         gval = AES_ENABLED;
1427                         break;
1428                 case WLAN_CIPHER_SUITE_AES_CMAC:
1429                         gval = AES_ENABLED;
1430                         break;
1431                 default:
1432                         brcmf_err("invalid cipher group (%d)\n",
1433                                   sme->crypto.cipher_group);
1434                         return -EINVAL;
1435                 }
1436         }
1437
1438         brcmf_dbg(CONN, "pval (%d) gval (%d)\n", pval, gval);
1439         /* In case of privacy, but no security and WPS then simulate */
1440         /* setting AES. WPS-2.0 allows no security                   */
1441         if (brcmf_find_wpsie(sme->ie, sme->ie_len) && !pval && !gval &&
1442             sme->privacy)
1443                 pval = AES_ENABLED;
1444
1445         if (mfp)
1446                 wsec = pval | gval | MFP_CAPABLE;
1447         else
1448                 wsec = pval | gval;
1449         err = brcmf_fil_bsscfg_int_set(netdev_priv(ndev), "wsec", wsec);
1450         if (err) {
1451                 brcmf_err("error (%d)\n", err);
1452                 return err;
1453         }
1454
1455         sec = &profile->sec;
1456         sec->cipher_pairwise = sme->crypto.ciphers_pairwise[0];
1457         sec->cipher_group = sme->crypto.cipher_group;
1458
1459         return err;
1460 }
1461
1462 static s32
1463 brcmf_set_key_mgmt(struct net_device *ndev, struct cfg80211_connect_params *sme)
1464 {
1465         struct brcmf_cfg80211_profile *profile = ndev_to_prof(ndev);
1466         struct brcmf_cfg80211_security *sec;
1467         s32 val = 0;
1468         s32 err = 0;
1469
1470         if (sme->crypto.n_akm_suites) {
1471                 err = brcmf_fil_bsscfg_int_get(netdev_priv(ndev),
1472                                                "wpa_auth", &val);
1473                 if (err) {
1474                         brcmf_err("could not get wpa_auth (%d)\n", err);
1475                         return err;
1476                 }
1477                 if (val & (WPA_AUTH_PSK | WPA_AUTH_UNSPECIFIED)) {
1478                         switch (sme->crypto.akm_suites[0]) {
1479                         case WLAN_AKM_SUITE_8021X:
1480                                 val = WPA_AUTH_UNSPECIFIED;
1481                                 break;
1482                         case WLAN_AKM_SUITE_PSK:
1483                                 val = WPA_AUTH_PSK;
1484                                 break;
1485                         default:
1486                                 brcmf_err("invalid cipher group (%d)\n",
1487                                           sme->crypto.cipher_group);
1488                                 return -EINVAL;
1489                         }
1490                 } else if (val & (WPA2_AUTH_PSK | WPA2_AUTH_UNSPECIFIED)) {
1491                         switch (sme->crypto.akm_suites[0]) {
1492                         case WLAN_AKM_SUITE_8021X:
1493                                 val = WPA2_AUTH_UNSPECIFIED;
1494                                 break;
1495                         case WLAN_AKM_SUITE_PSK:
1496                                 val = WPA2_AUTH_PSK;
1497                                 break;
1498                         default:
1499                                 brcmf_err("invalid cipher group (%d)\n",
1500                                           sme->crypto.cipher_group);
1501                                 return -EINVAL;
1502                         }
1503                 }
1504
1505                 brcmf_dbg(CONN, "setting wpa_auth to %d\n", val);
1506                 err = brcmf_fil_bsscfg_int_set(netdev_priv(ndev),
1507                                                "wpa_auth", val);
1508                 if (err) {
1509                         brcmf_err("could not set wpa_auth (%d)\n", err);
1510                         return err;
1511                 }
1512         }
1513         sec = &profile->sec;
1514         sec->wpa_auth = sme->crypto.akm_suites[0];
1515
1516         return err;
1517 }
1518
1519 static s32
1520 brcmf_set_sharedkey(struct net_device *ndev,
1521                     struct cfg80211_connect_params *sme)
1522 {
1523         struct brcmf_cfg80211_profile *profile = ndev_to_prof(ndev);
1524         struct brcmf_cfg80211_security *sec;
1525         struct brcmf_wsec_key key;
1526         s32 val;
1527         s32 err = 0;
1528
1529         brcmf_dbg(CONN, "key len (%d)\n", sme->key_len);
1530
1531         if (sme->key_len == 0)
1532                 return 0;
1533
1534         sec = &profile->sec;
1535         brcmf_dbg(CONN, "wpa_versions 0x%x cipher_pairwise 0x%x\n",
1536                   sec->wpa_versions, sec->cipher_pairwise);
1537
1538         if (sec->wpa_versions & (NL80211_WPA_VERSION_1 | NL80211_WPA_VERSION_2))
1539                 return 0;
1540
1541         if (!(sec->cipher_pairwise &
1542             (WLAN_CIPHER_SUITE_WEP40 | WLAN_CIPHER_SUITE_WEP104)))
1543                 return 0;
1544
1545         memset(&key, 0, sizeof(key));
1546         key.len = (u32) sme->key_len;
1547         key.index = (u32) sme->key_idx;
1548         if (key.len > sizeof(key.data)) {
1549                 brcmf_err("Too long key length (%u)\n", key.len);
1550                 return -EINVAL;
1551         }
1552         memcpy(key.data, sme->key, key.len);
1553         key.flags = BRCMF_PRIMARY_KEY;
1554         switch (sec->cipher_pairwise) {
1555         case WLAN_CIPHER_SUITE_WEP40:
1556                 key.algo = CRYPTO_ALGO_WEP1;
1557                 break;
1558         case WLAN_CIPHER_SUITE_WEP104:
1559                 key.algo = CRYPTO_ALGO_WEP128;
1560                 break;
1561         default:
1562                 brcmf_err("Invalid algorithm (%d)\n",
1563                           sme->crypto.ciphers_pairwise[0]);
1564                 return -EINVAL;
1565         }
1566         /* Set the new key/index */
1567         brcmf_dbg(CONN, "key length (%d) key index (%d) algo (%d)\n",
1568                   key.len, key.index, key.algo);
1569         brcmf_dbg(CONN, "key \"%s\"\n", key.data);
1570         err = send_key_to_dongle(ndev, &key);
1571         if (err)
1572                 return err;
1573
1574         if (sec->auth_type == NL80211_AUTHTYPE_SHARED_KEY) {
1575                 brcmf_dbg(CONN, "set auth_type to shared key\n");
1576                 val = WL_AUTH_SHARED_KEY;       /* shared key */
1577                 err = brcmf_fil_bsscfg_int_set(netdev_priv(ndev), "auth", val);
1578                 if (err)
1579                         brcmf_err("set auth failed (%d)\n", err);
1580         }
1581         return err;
1582 }
1583
1584 static
1585 enum nl80211_auth_type brcmf_war_auth_type(struct brcmf_if *ifp,
1586                                            enum nl80211_auth_type type)
1587 {
1588         if (type == NL80211_AUTHTYPE_AUTOMATIC &&
1589             brcmf_feat_is_quirk_enabled(ifp, BRCMF_FEAT_QUIRK_AUTO_AUTH)) {
1590                 brcmf_dbg(CONN, "WAR: use OPEN instead of AUTO\n");
1591                 type = NL80211_AUTHTYPE_OPEN_SYSTEM;
1592         }
1593         return type;
1594 }
1595
1596 static s32
1597 brcmf_cfg80211_connect(struct wiphy *wiphy, struct net_device *ndev,
1598                        struct cfg80211_connect_params *sme)
1599 {
1600         struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
1601         struct brcmf_if *ifp = netdev_priv(ndev);
1602         struct brcmf_cfg80211_profile *profile = &ifp->vif->profile;
1603         struct ieee80211_channel *chan = sme->channel;
1604         struct brcmf_join_params join_params;
1605         size_t join_params_size;
1606         const struct brcmf_tlv *rsn_ie;
1607         const struct brcmf_vs_tlv *wpa_ie;
1608         const void *ie;
1609         u32 ie_len;
1610         struct brcmf_ext_join_params_le *ext_join_params;
1611         u16 chanspec;
1612         s32 err = 0;
1613
1614         brcmf_dbg(TRACE, "Enter\n");
1615         if (!check_vif_up(ifp->vif))
1616                 return -EIO;
1617
1618         if (!sme->ssid) {
1619                 brcmf_err("Invalid ssid\n");
1620                 return -EOPNOTSUPP;
1621         }
1622
1623         if (ifp->vif == cfg->p2p.bss_idx[P2PAPI_BSSCFG_PRIMARY].vif) {
1624                 /* A normal (non P2P) connection request setup. */
1625                 ie = NULL;
1626                 ie_len = 0;
1627                 /* find the WPA_IE */
1628                 wpa_ie = brcmf_find_wpaie((u8 *)sme->ie, sme->ie_len);
1629                 if (wpa_ie) {
1630                         ie = wpa_ie;
1631                         ie_len = wpa_ie->len + TLV_HDR_LEN;
1632                 } else {
1633                         /* find the RSN_IE */
1634                         rsn_ie = brcmf_parse_tlvs((const u8 *)sme->ie,
1635                                                   sme->ie_len,
1636                                                   WLAN_EID_RSN);
1637                         if (rsn_ie) {
1638                                 ie = rsn_ie;
1639                                 ie_len = rsn_ie->len + TLV_HDR_LEN;
1640                         }
1641                 }
1642                 brcmf_fil_iovar_data_set(ifp, "wpaie", ie, ie_len);
1643         }
1644
1645         err = brcmf_vif_set_mgmt_ie(ifp->vif, BRCMF_VNDR_IE_ASSOCREQ_FLAG,
1646                                     sme->ie, sme->ie_len);
1647         if (err)
1648                 brcmf_err("Set Assoc REQ IE Failed\n");
1649         else
1650                 brcmf_dbg(TRACE, "Applied Vndr IEs for Assoc request\n");
1651
1652         set_bit(BRCMF_VIF_STATUS_CONNECTING, &ifp->vif->sme_state);
1653
1654         if (chan) {
1655                 cfg->channel =
1656                         ieee80211_frequency_to_channel(chan->center_freq);
1657                 chanspec = channel_to_chanspec(&cfg->d11inf, chan);
1658                 brcmf_dbg(CONN, "channel=%d, center_req=%d, chanspec=0x%04x\n",
1659                           cfg->channel, chan->center_freq, chanspec);
1660         } else {
1661                 cfg->channel = 0;
1662                 chanspec = 0;
1663         }
1664
1665         brcmf_dbg(INFO, "ie (%p), ie_len (%zd)\n", sme->ie, sme->ie_len);
1666
1667         err = brcmf_set_wpa_version(ndev, sme);
1668         if (err) {
1669                 brcmf_err("wl_set_wpa_version failed (%d)\n", err);
1670                 goto done;
1671         }
1672
1673         sme->auth_type = brcmf_war_auth_type(ifp, sme->auth_type);
1674         err = brcmf_set_auth_type(ndev, sme);
1675         if (err) {
1676                 brcmf_err("wl_set_auth_type failed (%d)\n", err);
1677                 goto done;
1678         }
1679
1680         err = brcmf_set_wsec_mode(ndev, sme, sme->mfp == NL80211_MFP_REQUIRED);
1681         if (err) {
1682                 brcmf_err("wl_set_set_cipher failed (%d)\n", err);
1683                 goto done;
1684         }
1685
1686         err = brcmf_set_key_mgmt(ndev, sme);
1687         if (err) {
1688                 brcmf_err("wl_set_key_mgmt failed (%d)\n", err);
1689                 goto done;
1690         }
1691
1692         err = brcmf_set_sharedkey(ndev, sme);
1693         if (err) {
1694                 brcmf_err("brcmf_set_sharedkey failed (%d)\n", err);
1695                 goto done;
1696         }
1697
1698         profile->ssid.SSID_len = min_t(u32, (u32)sizeof(profile->ssid.SSID),
1699                                        (u32)sme->ssid_len);
1700         memcpy(&profile->ssid.SSID, sme->ssid, profile->ssid.SSID_len);
1701         if (profile->ssid.SSID_len < IEEE80211_MAX_SSID_LEN) {
1702                 profile->ssid.SSID[profile->ssid.SSID_len] = 0;
1703                 brcmf_dbg(CONN, "SSID \"%s\", len (%d)\n", profile->ssid.SSID,
1704                           profile->ssid.SSID_len);
1705         }
1706
1707         /* Join with specific BSSID and cached SSID
1708          * If SSID is zero join based on BSSID only
1709          */
1710         join_params_size = offsetof(struct brcmf_ext_join_params_le, assoc_le) +
1711                 offsetof(struct brcmf_assoc_params_le, chanspec_list);
1712         if (cfg->channel)
1713                 join_params_size += sizeof(u16);
1714         ext_join_params = kzalloc(join_params_size, GFP_KERNEL);
1715         if (ext_join_params == NULL) {
1716                 err = -ENOMEM;
1717                 goto done;
1718         }
1719         ext_join_params->ssid_le.SSID_len = cpu_to_le32(profile->ssid.SSID_len);
1720         memcpy(&ext_join_params->ssid_le.SSID, sme->ssid,
1721                profile->ssid.SSID_len);
1722
1723         /* Set up join scan parameters */
1724         ext_join_params->scan_le.scan_type = -1;
1725         ext_join_params->scan_le.home_time = cpu_to_le32(-1);
1726
1727         if (sme->bssid)
1728                 memcpy(&ext_join_params->assoc_le.bssid, sme->bssid, ETH_ALEN);
1729         else
1730                 memset(&ext_join_params->assoc_le.bssid, 0xFF, ETH_ALEN);
1731
1732         if (cfg->channel) {
1733                 ext_join_params->assoc_le.chanspec_num = cpu_to_le32(1);
1734
1735                 ext_join_params->assoc_le.chanspec_list[0] =
1736                         cpu_to_le16(chanspec);
1737                 /* Increase dwell time to receive probe response or detect
1738                  * beacon from target AP at a noisy air only during connect
1739                  * command.
1740                  */
1741                 ext_join_params->scan_le.active_time =
1742                         cpu_to_le32(BRCMF_SCAN_JOIN_ACTIVE_DWELL_TIME_MS);
1743                 ext_join_params->scan_le.passive_time =
1744                         cpu_to_le32(BRCMF_SCAN_JOIN_PASSIVE_DWELL_TIME_MS);
1745                 /* To sync with presence period of VSDB GO send probe request
1746                  * more frequently. Probe request will be stopped when it gets
1747                  * probe response from target AP/GO.
1748                  */
1749                 ext_join_params->scan_le.nprobes =
1750                         cpu_to_le32(BRCMF_SCAN_JOIN_ACTIVE_DWELL_TIME_MS /
1751                                     BRCMF_SCAN_JOIN_PROBE_INTERVAL_MS);
1752         } else {
1753                 ext_join_params->scan_le.active_time = cpu_to_le32(-1);
1754                 ext_join_params->scan_le.passive_time = cpu_to_le32(-1);
1755                 ext_join_params->scan_le.nprobes = cpu_to_le32(-1);
1756         }
1757
1758         err  = brcmf_fil_bsscfg_data_set(ifp, "join", ext_join_params,
1759                                          join_params_size);
1760         kfree(ext_join_params);
1761         if (!err)
1762                 /* This is it. join command worked, we are done */
1763                 goto done;
1764
1765         /* join command failed, fallback to set ssid */
1766         memset(&join_params, 0, sizeof(join_params));
1767         join_params_size = sizeof(join_params.ssid_le);
1768
1769         memcpy(&join_params.ssid_le.SSID, sme->ssid, profile->ssid.SSID_len);
1770         join_params.ssid_le.SSID_len = cpu_to_le32(profile->ssid.SSID_len);
1771
1772         if (sme->bssid)
1773                 memcpy(join_params.params_le.bssid, sme->bssid, ETH_ALEN);
1774         else
1775                 memset(join_params.params_le.bssid, 0xFF, ETH_ALEN);
1776
1777         if (cfg->channel) {
1778                 join_params.params_le.chanspec_list[0] = cpu_to_le16(chanspec);
1779                 join_params.params_le.chanspec_num = cpu_to_le32(1);
1780                 join_params_size += sizeof(join_params.params_le);
1781         }
1782         err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_SSID,
1783                                      &join_params, join_params_size);
1784         if (err)
1785                 brcmf_err("BRCMF_C_SET_SSID failed (%d)\n", err);
1786
1787 done:
1788         if (err)
1789                 clear_bit(BRCMF_VIF_STATUS_CONNECTING, &ifp->vif->sme_state);
1790         brcmf_dbg(TRACE, "Exit\n");
1791         return err;
1792 }
1793
1794 static s32
1795 brcmf_cfg80211_disconnect(struct wiphy *wiphy, struct net_device *ndev,
1796                        u16 reason_code)
1797 {
1798         struct brcmf_if *ifp = netdev_priv(ndev);
1799         struct brcmf_cfg80211_profile *profile = &ifp->vif->profile;
1800         struct brcmf_scb_val_le scbval;
1801         s32 err = 0;
1802
1803         brcmf_dbg(TRACE, "Enter. Reason code = %d\n", reason_code);
1804         if (!check_vif_up(ifp->vif))
1805                 return -EIO;
1806
1807         clear_bit(BRCMF_VIF_STATUS_CONNECTED, &ifp->vif->sme_state);
1808         cfg80211_disconnected(ndev, reason_code, NULL, 0, GFP_KERNEL);
1809
1810         memcpy(&scbval.ea, &profile->bssid, ETH_ALEN);
1811         scbval.val = cpu_to_le32(reason_code);
1812         err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_DISASSOC,
1813                                      &scbval, sizeof(scbval));
1814         if (err)
1815                 brcmf_err("error (%d)\n", err);
1816
1817         brcmf_dbg(TRACE, "Exit\n");
1818         return err;
1819 }
1820
1821 static s32
1822 brcmf_cfg80211_set_tx_power(struct wiphy *wiphy, struct wireless_dev *wdev,
1823                             enum nl80211_tx_power_setting type, s32 mbm)
1824 {
1825
1826         struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
1827         struct net_device *ndev = cfg_to_ndev(cfg);
1828         struct brcmf_if *ifp = netdev_priv(ndev);
1829         u16 txpwrmw;
1830         s32 err = 0;
1831         s32 disable = 0;
1832         s32 dbm = MBM_TO_DBM(mbm);
1833
1834         brcmf_dbg(TRACE, "Enter\n");
1835         if (!check_vif_up(ifp->vif))
1836                 return -EIO;
1837
1838         switch (type) {
1839         case NL80211_TX_POWER_AUTOMATIC:
1840                 break;
1841         case NL80211_TX_POWER_LIMITED:
1842         case NL80211_TX_POWER_FIXED:
1843                 if (dbm < 0) {
1844                         brcmf_err("TX_POWER_FIXED - dbm is negative\n");
1845                         err = -EINVAL;
1846                         goto done;
1847                 }
1848                 break;
1849         }
1850         /* Make sure radio is off or on as far as software is concerned */
1851         disable = WL_RADIO_SW_DISABLE << 16;
1852         err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_RADIO, disable);
1853         if (err)
1854                 brcmf_err("WLC_SET_RADIO error (%d)\n", err);
1855
1856         if (dbm > 0xffff)
1857                 txpwrmw = 0xffff;
1858         else
1859                 txpwrmw = (u16) dbm;
1860         err = brcmf_fil_iovar_int_set(ifp, "qtxpower",
1861                                       (s32)brcmf_mw_to_qdbm(txpwrmw));
1862         if (err)
1863                 brcmf_err("qtxpower error (%d)\n", err);
1864         cfg->conf->tx_power = dbm;
1865
1866 done:
1867         brcmf_dbg(TRACE, "Exit\n");
1868         return err;
1869 }
1870
1871 static s32 brcmf_cfg80211_get_tx_power(struct wiphy *wiphy,
1872                                        struct wireless_dev *wdev,
1873                                        s32 *dbm)
1874 {
1875         struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
1876         struct brcmf_if *ifp = netdev_priv(cfg_to_ndev(cfg));
1877         s32 txpwrdbm;
1878         u8 result;
1879         s32 err = 0;
1880
1881         brcmf_dbg(TRACE, "Enter\n");
1882         if (!check_vif_up(ifp->vif))
1883                 return -EIO;
1884
1885         err = brcmf_fil_iovar_int_get(ifp, "qtxpower", &txpwrdbm);
1886         if (err) {
1887                 brcmf_err("error (%d)\n", err);
1888                 goto done;
1889         }
1890
1891         result = (u8) (txpwrdbm & ~WL_TXPWR_OVERRIDE);
1892         *dbm = (s32) brcmf_qdbm_to_mw(result);
1893
1894 done:
1895         brcmf_dbg(TRACE, "Exit\n");
1896         return err;
1897 }
1898
1899 static s32
1900 brcmf_cfg80211_config_default_key(struct wiphy *wiphy, struct net_device *ndev,
1901                                u8 key_idx, bool unicast, bool multicast)
1902 {
1903         struct brcmf_if *ifp = netdev_priv(ndev);
1904         u32 index;
1905         u32 wsec;
1906         s32 err = 0;
1907
1908         brcmf_dbg(TRACE, "Enter\n");
1909         brcmf_dbg(CONN, "key index (%d)\n", key_idx);
1910         if (!check_vif_up(ifp->vif))
1911                 return -EIO;
1912
1913         err = brcmf_fil_bsscfg_int_get(ifp, "wsec", &wsec);
1914         if (err) {
1915                 brcmf_err("WLC_GET_WSEC error (%d)\n", err);
1916                 goto done;
1917         }
1918
1919         if (wsec & WEP_ENABLED) {
1920                 /* Just select a new current key */
1921                 index = key_idx;
1922                 err = brcmf_fil_cmd_int_set(ifp,
1923                                             BRCMF_C_SET_KEY_PRIMARY, index);
1924                 if (err)
1925                         brcmf_err("error (%d)\n", err);
1926         }
1927 done:
1928         brcmf_dbg(TRACE, "Exit\n");
1929         return err;
1930 }
1931
1932 static s32
1933 brcmf_add_keyext(struct wiphy *wiphy, struct net_device *ndev,
1934               u8 key_idx, const u8 *mac_addr, struct key_params *params)
1935 {
1936         struct brcmf_if *ifp = netdev_priv(ndev);
1937         struct brcmf_wsec_key key;
1938         s32 err = 0;
1939         u8 keybuf[8];
1940
1941         memset(&key, 0, sizeof(key));
1942         key.index = (u32) key_idx;
1943         /* Instead of bcast for ea address for default wep keys,
1944                  driver needs it to be Null */
1945         if (!is_multicast_ether_addr(mac_addr))
1946                 memcpy((char *)&key.ea, (void *)mac_addr, ETH_ALEN);
1947         key.len = (u32) params->key_len;
1948         /* check for key index change */
1949         if (key.len == 0) {
1950                 /* key delete */
1951                 err = send_key_to_dongle(ndev, &key);
1952                 if (err)
1953                         brcmf_err("key delete error (%d)\n", err);
1954         } else {
1955                 if (key.len > sizeof(key.data)) {
1956                         brcmf_err("Invalid key length (%d)\n", key.len);
1957                         return -EINVAL;
1958                 }
1959
1960                 brcmf_dbg(CONN, "Setting the key index %d\n", key.index);
1961                 memcpy(key.data, params->key, key.len);
1962
1963                 if (!brcmf_is_apmode(ifp->vif) &&
1964                     (params->cipher == WLAN_CIPHER_SUITE_TKIP)) {
1965                         brcmf_dbg(CONN, "Swapping RX/TX MIC key\n");
1966                         memcpy(keybuf, &key.data[24], sizeof(keybuf));
1967                         memcpy(&key.data[24], &key.data[16], sizeof(keybuf));
1968                         memcpy(&key.data[16], keybuf, sizeof(keybuf));
1969                 }
1970
1971                 /* if IW_ENCODE_EXT_RX_SEQ_VALID set */
1972                 if (params->seq && params->seq_len == 6) {
1973                         /* rx iv */
1974                         u8 *ivptr;
1975                         ivptr = (u8 *) params->seq;
1976                         key.rxiv.hi = (ivptr[5] << 24) | (ivptr[4] << 16) |
1977                             (ivptr[3] << 8) | ivptr[2];
1978                         key.rxiv.lo = (ivptr[1] << 8) | ivptr[0];
1979                         key.iv_initialized = true;
1980                 }
1981
1982                 switch (params->cipher) {
1983                 case WLAN_CIPHER_SUITE_WEP40:
1984                         key.algo = CRYPTO_ALGO_WEP1;
1985                         brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_WEP40\n");
1986                         break;
1987                 case WLAN_CIPHER_SUITE_WEP104:
1988                         key.algo = CRYPTO_ALGO_WEP128;
1989                         brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_WEP104\n");
1990                         break;
1991                 case WLAN_CIPHER_SUITE_TKIP:
1992                         key.algo = CRYPTO_ALGO_TKIP;
1993                         brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_TKIP\n");
1994                         break;
1995                 case WLAN_CIPHER_SUITE_AES_CMAC:
1996                         key.algo = CRYPTO_ALGO_AES_CCM;
1997                         brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_AES_CMAC\n");
1998                         break;
1999                 case WLAN_CIPHER_SUITE_CCMP:
2000                         key.algo = CRYPTO_ALGO_AES_CCM;
2001                         brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_CCMP\n");
2002                         break;
2003                 default:
2004                         brcmf_err("Invalid cipher (0x%x)\n", params->cipher);
2005                         return -EINVAL;
2006                 }
2007                 err = send_key_to_dongle(ndev, &key);
2008                 if (err)
2009                         brcmf_err("wsec_key error (%d)\n", err);
2010         }
2011         return err;
2012 }
2013
2014 static s32
2015 brcmf_cfg80211_add_key(struct wiphy *wiphy, struct net_device *ndev,
2016                     u8 key_idx, bool pairwise, const u8 *mac_addr,
2017                     struct key_params *params)
2018 {
2019         struct brcmf_if *ifp = netdev_priv(ndev);
2020         struct brcmf_wsec_key key;
2021         s32 val;
2022         s32 wsec;
2023         s32 err = 0;
2024         u8 keybuf[8];
2025
2026         brcmf_dbg(TRACE, "Enter\n");
2027         brcmf_dbg(CONN, "key index (%d)\n", key_idx);
2028         if (!check_vif_up(ifp->vif))
2029                 return -EIO;
2030
2031         if (mac_addr &&
2032                 (params->cipher != WLAN_CIPHER_SUITE_WEP40) &&
2033                 (params->cipher != WLAN_CIPHER_SUITE_WEP104)) {
2034                 brcmf_dbg(TRACE, "Exit");
2035                 return brcmf_add_keyext(wiphy, ndev, key_idx, mac_addr, params);
2036         }
2037         memset(&key, 0, sizeof(key));
2038
2039         key.len = (u32) params->key_len;
2040         key.index = (u32) key_idx;
2041
2042         if (key.len > sizeof(key.data)) {
2043                 brcmf_err("Too long key length (%u)\n", key.len);
2044                 err = -EINVAL;
2045                 goto done;
2046         }
2047         memcpy(key.data, params->key, key.len);
2048
2049         key.flags = BRCMF_PRIMARY_KEY;
2050         switch (params->cipher) {
2051         case WLAN_CIPHER_SUITE_WEP40:
2052                 key.algo = CRYPTO_ALGO_WEP1;
2053                 val = WEP_ENABLED;
2054                 brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_WEP40\n");
2055                 break;
2056         case WLAN_CIPHER_SUITE_WEP104:
2057                 key.algo = CRYPTO_ALGO_WEP128;
2058                 val = WEP_ENABLED;
2059                 brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_WEP104\n");
2060                 break;
2061         case WLAN_CIPHER_SUITE_TKIP:
2062                 if (!brcmf_is_apmode(ifp->vif)) {
2063                         brcmf_dbg(CONN, "Swapping RX/TX MIC key\n");
2064                         memcpy(keybuf, &key.data[24], sizeof(keybuf));
2065                         memcpy(&key.data[24], &key.data[16], sizeof(keybuf));
2066                         memcpy(&key.data[16], keybuf, sizeof(keybuf));
2067                 }
2068                 key.algo = CRYPTO_ALGO_TKIP;
2069                 val = TKIP_ENABLED;
2070                 brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_TKIP\n");
2071                 break;
2072         case WLAN_CIPHER_SUITE_AES_CMAC:
2073                 key.algo = CRYPTO_ALGO_AES_CCM;
2074                 val = AES_ENABLED;
2075                 brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_AES_CMAC\n");
2076                 break;
2077         case WLAN_CIPHER_SUITE_CCMP:
2078                 key.algo = CRYPTO_ALGO_AES_CCM;
2079                 val = AES_ENABLED;
2080                 brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_CCMP\n");
2081                 break;
2082         default:
2083                 brcmf_err("Invalid cipher (0x%x)\n", params->cipher);
2084                 err = -EINVAL;
2085                 goto done;
2086         }
2087
2088         err = send_key_to_dongle(ndev, &key);
2089         if (err)
2090                 goto done;
2091
2092         err = brcmf_fil_bsscfg_int_get(ifp, "wsec", &wsec);
2093         if (err) {
2094                 brcmf_err("get wsec error (%d)\n", err);
2095                 goto done;
2096         }
2097         wsec |= val;
2098         err = brcmf_fil_bsscfg_int_set(ifp, "wsec", wsec);
2099         if (err) {
2100                 brcmf_err("set wsec error (%d)\n", err);
2101                 goto done;
2102         }
2103
2104 done:
2105         brcmf_dbg(TRACE, "Exit\n");
2106         return err;
2107 }
2108
2109 static s32
2110 brcmf_cfg80211_del_key(struct wiphy *wiphy, struct net_device *ndev,
2111                     u8 key_idx, bool pairwise, const u8 *mac_addr)
2112 {
2113         struct brcmf_if *ifp = netdev_priv(ndev);
2114         struct brcmf_wsec_key key;
2115         s32 err = 0;
2116
2117         brcmf_dbg(TRACE, "Enter\n");
2118         if (!check_vif_up(ifp->vif))
2119                 return -EIO;
2120
2121         if (key_idx >= DOT11_MAX_DEFAULT_KEYS) {
2122                 /* we ignore this key index in this case */
2123                 brcmf_err("invalid key index (%d)\n", key_idx);
2124                 return -EINVAL;
2125         }
2126
2127         memset(&key, 0, sizeof(key));
2128
2129         key.index = (u32) key_idx;
2130         key.flags = BRCMF_PRIMARY_KEY;
2131         key.algo = CRYPTO_ALGO_OFF;
2132
2133         brcmf_dbg(CONN, "key index (%d)\n", key_idx);
2134
2135         /* Set the new key/index */
2136         err = send_key_to_dongle(ndev, &key);
2137
2138         brcmf_dbg(TRACE, "Exit\n");
2139         return err;
2140 }
2141
2142 static s32
2143 brcmf_cfg80211_get_key(struct wiphy *wiphy, struct net_device *ndev,
2144                     u8 key_idx, bool pairwise, const u8 *mac_addr, void *cookie,
2145                     void (*callback) (void *cookie, struct key_params * params))
2146 {
2147         struct key_params params;
2148         struct brcmf_if *ifp = netdev_priv(ndev);
2149         struct brcmf_cfg80211_profile *profile = &ifp->vif->profile;
2150         struct brcmf_cfg80211_security *sec;
2151         s32 wsec;
2152         s32 err = 0;
2153
2154         brcmf_dbg(TRACE, "Enter\n");
2155         brcmf_dbg(CONN, "key index (%d)\n", key_idx);
2156         if (!check_vif_up(ifp->vif))
2157                 return -EIO;
2158
2159         memset(&params, 0, sizeof(params));
2160
2161         err = brcmf_fil_bsscfg_int_get(ifp, "wsec", &wsec);
2162         if (err) {
2163                 brcmf_err("WLC_GET_WSEC error (%d)\n", err);
2164                 /* Ignore this error, may happen during DISASSOC */
2165                 err = -EAGAIN;
2166                 goto done;
2167         }
2168         if (wsec & WEP_ENABLED) {
2169                 sec = &profile->sec;
2170                 if (sec->cipher_pairwise & WLAN_CIPHER_SUITE_WEP40) {
2171                         params.cipher = WLAN_CIPHER_SUITE_WEP40;
2172                         brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_WEP40\n");
2173                 } else if (sec->cipher_pairwise & WLAN_CIPHER_SUITE_WEP104) {
2174                         params.cipher = WLAN_CIPHER_SUITE_WEP104;
2175                         brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_WEP104\n");
2176                 }
2177         } else if (wsec & TKIP_ENABLED) {
2178                 params.cipher = WLAN_CIPHER_SUITE_TKIP;
2179                 brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_TKIP\n");
2180         } else if (wsec & AES_ENABLED) {
2181                 params.cipher = WLAN_CIPHER_SUITE_AES_CMAC;
2182                 brcmf_dbg(CONN, "WLAN_CIPHER_SUITE_AES_CMAC\n");
2183         } else  {
2184                 brcmf_err("Invalid algo (0x%x)\n", wsec);
2185                 err = -EINVAL;
2186                 goto done;
2187         }
2188         callback(cookie, &params);
2189
2190 done:
2191         brcmf_dbg(TRACE, "Exit\n");
2192         return err;
2193 }
2194
2195 static s32
2196 brcmf_cfg80211_config_default_mgmt_key(struct wiphy *wiphy,
2197                                     struct net_device *ndev, u8 key_idx)
2198 {
2199         brcmf_dbg(INFO, "Not supported\n");
2200
2201         return -EOPNOTSUPP;
2202 }
2203
2204 static s32
2205 brcmf_cfg80211_get_station(struct wiphy *wiphy, struct net_device *ndev,
2206                            const u8 *mac, struct station_info *sinfo)
2207 {
2208         struct brcmf_if *ifp = netdev_priv(ndev);
2209         struct brcmf_cfg80211_profile *profile = &ifp->vif->profile;
2210         struct brcmf_scb_val_le scb_val;
2211         int rssi;
2212         s32 rate;
2213         s32 err = 0;
2214         u8 *bssid = profile->bssid;
2215         struct brcmf_sta_info_le sta_info_le;
2216         u32 beacon_period;
2217         u32 dtim_period;
2218
2219         brcmf_dbg(TRACE, "Enter, MAC %pM\n", mac);
2220         if (!check_vif_up(ifp->vif))
2221                 return -EIO;
2222
2223         if (brcmf_is_apmode(ifp->vif)) {
2224                 memcpy(&sta_info_le, mac, ETH_ALEN);
2225                 err = brcmf_fil_iovar_data_get(ifp, "sta_info",
2226                                                &sta_info_le,
2227                                                sizeof(sta_info_le));
2228                 if (err < 0) {
2229                         brcmf_err("GET STA INFO failed, %d\n", err);
2230                         goto done;
2231                 }
2232                 sinfo->filled = STATION_INFO_INACTIVE_TIME;
2233                 sinfo->inactive_time = le32_to_cpu(sta_info_le.idle) * 1000;
2234                 if (le32_to_cpu(sta_info_le.flags) & BRCMF_STA_ASSOC) {
2235                         sinfo->filled |= STATION_INFO_CONNECTED_TIME;
2236                         sinfo->connected_time = le32_to_cpu(sta_info_le.in);
2237                 }
2238                 brcmf_dbg(TRACE, "STA idle time : %d ms, connected time :%d sec\n",
2239                           sinfo->inactive_time, sinfo->connected_time);
2240         } else if (ifp->vif->wdev.iftype == NL80211_IFTYPE_STATION) {
2241                 if (memcmp(mac, bssid, ETH_ALEN)) {
2242                         brcmf_err("Wrong Mac address cfg_mac-%pM wl_bssid-%pM\n",
2243                                   mac, bssid);
2244                         err = -ENOENT;
2245                         goto done;
2246                 }
2247                 /* Report the current tx rate */
2248                 err = brcmf_fil_cmd_int_get(ifp, BRCMF_C_GET_RATE, &rate);
2249                 if (err) {
2250                         brcmf_err("Could not get rate (%d)\n", err);
2251                         goto done;
2252                 } else {
2253                         sinfo->filled |= STATION_INFO_TX_BITRATE;
2254                         sinfo->txrate.legacy = rate * 5;
2255                         brcmf_dbg(CONN, "Rate %d Mbps\n", rate / 2);
2256                 }
2257
2258                 if (test_bit(BRCMF_VIF_STATUS_CONNECTED,
2259                              &ifp->vif->sme_state)) {
2260                         memset(&scb_val, 0, sizeof(scb_val));
2261                         err = brcmf_fil_cmd_data_get(ifp, BRCMF_C_GET_RSSI,
2262                                                      &scb_val, sizeof(scb_val));
2263                         if (err) {
2264                                 brcmf_err("Could not get rssi (%d)\n", err);
2265                                 goto done;
2266                         } else {
2267                                 rssi = le32_to_cpu(scb_val.val);
2268                                 sinfo->filled |= STATION_INFO_SIGNAL;
2269                                 sinfo->signal = rssi;
2270                                 brcmf_dbg(CONN, "RSSI %d dBm\n", rssi);
2271                         }
2272                         err = brcmf_fil_cmd_int_get(ifp, BRCMF_C_GET_BCNPRD,
2273                                                     &beacon_period);
2274                         if (err) {
2275                                 brcmf_err("Could not get beacon period (%d)\n",
2276                                           err);
2277                                 goto done;
2278                         } else {
2279                                 sinfo->bss_param.beacon_interval =
2280                                         beacon_period;
2281                                 brcmf_dbg(CONN, "Beacon peroid %d\n",
2282                                           beacon_period);
2283                         }
2284                         err = brcmf_fil_cmd_int_get(ifp, BRCMF_C_GET_DTIMPRD,
2285                                                     &dtim_period);
2286                         if (err) {
2287                                 brcmf_err("Could not get DTIM period (%d)\n",
2288                                           err);
2289                                 goto done;
2290                         } else {
2291                                 sinfo->bss_param.dtim_period = dtim_period;
2292                                 brcmf_dbg(CONN, "DTIM peroid %d\n",
2293                                           dtim_period);
2294                         }
2295                         sinfo->filled |= STATION_INFO_BSS_PARAM;
2296                 }
2297         } else
2298                 err = -EPERM;
2299 done:
2300         brcmf_dbg(TRACE, "Exit\n");
2301         return err;
2302 }
2303
2304 static s32
2305 brcmf_cfg80211_set_power_mgmt(struct wiphy *wiphy, struct net_device *ndev,
2306                            bool enabled, s32 timeout)
2307 {
2308         s32 pm;
2309         s32 err = 0;
2310         struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
2311         struct brcmf_if *ifp = netdev_priv(ndev);
2312
2313         brcmf_dbg(TRACE, "Enter\n");
2314
2315         /*
2316          * Powersave enable/disable request is coming from the
2317          * cfg80211 even before the interface is up. In that
2318          * scenario, driver will be storing the power save
2319          * preference in cfg struct to apply this to
2320          * FW later while initializing the dongle
2321          */
2322         cfg->pwr_save = enabled;
2323         if (!check_vif_up(ifp->vif)) {
2324
2325                 brcmf_dbg(INFO, "Device is not ready, storing the value in cfg_info struct\n");
2326                 goto done;
2327         }
2328
2329         pm = enabled ? PM_FAST : PM_OFF;
2330         /* Do not enable the power save after assoc if it is a p2p interface */
2331         if (ifp->vif->wdev.iftype == NL80211_IFTYPE_P2P_CLIENT) {
2332                 brcmf_dbg(INFO, "Do not enable power save for P2P clients\n");
2333                 pm = PM_OFF;
2334         }
2335         brcmf_dbg(INFO, "power save %s\n", (pm ? "enabled" : "disabled"));
2336
2337         err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_PM, pm);
2338         if (err) {
2339                 if (err == -ENODEV)
2340                         brcmf_err("net_device is not ready yet\n");
2341                 else
2342                         brcmf_err("error (%d)\n", err);
2343         }
2344 done:
2345         brcmf_dbg(TRACE, "Exit\n");
2346         return err;
2347 }
2348
2349 static s32 brcmf_inform_single_bss(struct brcmf_cfg80211_info *cfg,
2350                                    struct brcmf_bss_info_le *bi)
2351 {
2352         struct wiphy *wiphy = cfg_to_wiphy(cfg);
2353         struct ieee80211_channel *notify_channel;
2354         struct cfg80211_bss *bss;
2355         struct ieee80211_supported_band *band;
2356         struct brcmu_chan ch;
2357         u16 channel;
2358         u32 freq;
2359         u16 notify_capability;
2360         u16 notify_interval;
2361         u8 *notify_ie;
2362         size_t notify_ielen;
2363         s32 notify_signal;
2364
2365         if (le32_to_cpu(bi->length) > WL_BSS_INFO_MAX) {
2366                 brcmf_err("Bss info is larger than buffer. Discarding\n");
2367                 return 0;
2368         }
2369
2370         if (!bi->ctl_ch) {
2371                 ch.chspec = le16_to_cpu(bi->chanspec);
2372                 cfg->d11inf.decchspec(&ch);
2373                 bi->ctl_ch = ch.chnum;
2374         }
2375         channel = bi->ctl_ch;
2376
2377         if (channel <= CH_MAX_2G_CHANNEL)
2378                 band = wiphy->bands[IEEE80211_BAND_2GHZ];
2379         else
2380                 band = wiphy->bands[IEEE80211_BAND_5GHZ];
2381
2382         freq = ieee80211_channel_to_frequency(channel, band->band);
2383         notify_channel = ieee80211_get_channel(wiphy, freq);
2384
2385         notify_capability = le16_to_cpu(bi->capability);
2386         notify_interval = le16_to_cpu(bi->beacon_period);
2387         notify_ie = (u8 *)bi + le16_to_cpu(bi->ie_offset);
2388         notify_ielen = le32_to_cpu(bi->ie_length);
2389         notify_signal = (s16)le16_to_cpu(bi->RSSI) * 100;
2390
2391         brcmf_dbg(CONN, "bssid: %pM\n", bi->BSSID);
2392         brcmf_dbg(CONN, "Channel: %d(%d)\n", channel, freq);
2393         brcmf_dbg(CONN, "Capability: %X\n", notify_capability);
2394         brcmf_dbg(CONN, "Beacon interval: %d\n", notify_interval);
2395         brcmf_dbg(CONN, "Signal: %d\n", notify_signal);
2396
2397         bss = cfg80211_inform_bss(wiphy, notify_channel,
2398                                   CFG80211_BSS_FTYPE_UNKNOWN,
2399                                   (const u8 *)bi->BSSID,
2400                                   0, notify_capability,
2401                                   notify_interval, notify_ie,
2402                                   notify_ielen, notify_signal,
2403                                   GFP_KERNEL);
2404
2405         if (!bss)
2406                 return -ENOMEM;
2407
2408         cfg80211_put_bss(wiphy, bss);
2409
2410         return 0;
2411 }
2412
2413 static struct brcmf_bss_info_le *
2414 next_bss_le(struct brcmf_scan_results *list, struct brcmf_bss_info_le *bss)
2415 {
2416         if (bss == NULL)
2417                 return list->bss_info_le;
2418         return (struct brcmf_bss_info_le *)((unsigned long)bss +
2419                                             le32_to_cpu(bss->length));
2420 }
2421
2422 static s32 brcmf_inform_bss(struct brcmf_cfg80211_info *cfg)
2423 {
2424         struct brcmf_scan_results *bss_list;
2425         struct brcmf_bss_info_le *bi = NULL;    /* must be initialized */
2426         s32 err = 0;
2427         int i;
2428
2429         bss_list = cfg->bss_list;
2430         if (bss_list->count != 0 &&
2431             bss_list->version != BRCMF_BSS_INFO_VERSION) {
2432                 brcmf_err("Version %d != WL_BSS_INFO_VERSION\n",
2433                           bss_list->version);
2434                 return -EOPNOTSUPP;
2435         }
2436         brcmf_dbg(SCAN, "scanned AP count (%d)\n", bss_list->count);
2437         for (i = 0; i < bss_list->count; i++) {
2438                 bi = next_bss_le(bss_list, bi);
2439                 err = brcmf_inform_single_bss(cfg, bi);
2440                 if (err)
2441                         break;
2442         }
2443         return err;
2444 }
2445
2446 static s32 wl_inform_ibss(struct brcmf_cfg80211_info *cfg,
2447                           struct net_device *ndev, const u8 *bssid)
2448 {
2449         struct wiphy *wiphy = cfg_to_wiphy(cfg);
2450         struct ieee80211_channel *notify_channel;
2451         struct brcmf_bss_info_le *bi = NULL;
2452         struct ieee80211_supported_band *band;
2453         struct cfg80211_bss *bss;
2454         struct brcmu_chan ch;
2455         u8 *buf = NULL;
2456         s32 err = 0;
2457         u32 freq;
2458         u16 notify_capability;
2459         u16 notify_interval;
2460         u8 *notify_ie;
2461         size_t notify_ielen;
2462         s32 notify_signal;
2463
2464         brcmf_dbg(TRACE, "Enter\n");
2465
2466         buf = kzalloc(WL_BSS_INFO_MAX, GFP_KERNEL);
2467         if (buf == NULL) {
2468                 err = -ENOMEM;
2469                 goto CleanUp;
2470         }
2471
2472         *(__le32 *)buf = cpu_to_le32(WL_BSS_INFO_MAX);
2473
2474         err = brcmf_fil_cmd_data_get(netdev_priv(ndev), BRCMF_C_GET_BSS_INFO,
2475                                      buf, WL_BSS_INFO_MAX);
2476         if (err) {
2477                 brcmf_err("WLC_GET_BSS_INFO failed: %d\n", err);
2478                 goto CleanUp;
2479         }
2480
2481         bi = (struct brcmf_bss_info_le *)(buf + 4);
2482
2483         ch.chspec = le16_to_cpu(bi->chanspec);
2484         cfg->d11inf.decchspec(&ch);
2485
2486         if (ch.band == BRCMU_CHAN_BAND_2G)
2487                 band = wiphy->bands[IEEE80211_BAND_2GHZ];
2488         else
2489                 band = wiphy->bands[IEEE80211_BAND_5GHZ];
2490
2491         freq = ieee80211_channel_to_frequency(ch.chnum, band->band);
2492         notify_channel = ieee80211_get_channel(wiphy, freq);
2493
2494         notify_capability = le16_to_cpu(bi->capability);
2495         notify_interval = le16_to_cpu(bi->beacon_period);
2496         notify_ie = (u8 *)bi + le16_to_cpu(bi->ie_offset);
2497         notify_ielen = le32_to_cpu(bi->ie_length);
2498         notify_signal = (s16)le16_to_cpu(bi->RSSI) * 100;
2499
2500         brcmf_dbg(CONN, "channel: %d(%d)\n", ch.chnum, freq);
2501         brcmf_dbg(CONN, "capability: %X\n", notify_capability);
2502         brcmf_dbg(CONN, "beacon interval: %d\n", notify_interval);
2503         brcmf_dbg(CONN, "signal: %d\n", notify_signal);
2504
2505         bss = cfg80211_inform_bss(wiphy, notify_channel,
2506                                   CFG80211_BSS_FTYPE_UNKNOWN, bssid, 0,
2507                                   notify_capability, notify_interval,
2508                                   notify_ie, notify_ielen, notify_signal,
2509                                   GFP_KERNEL);
2510
2511         if (!bss) {
2512                 err = -ENOMEM;
2513                 goto CleanUp;
2514         }
2515
2516         cfg80211_put_bss(wiphy, bss);
2517
2518 CleanUp:
2519
2520         kfree(buf);
2521
2522         brcmf_dbg(TRACE, "Exit\n");
2523
2524         return err;
2525 }
2526
2527 static s32 brcmf_update_bss_info(struct brcmf_cfg80211_info *cfg,
2528                                  struct brcmf_if *ifp)
2529 {
2530         struct brcmf_cfg80211_profile *profile = ndev_to_prof(ifp->ndev);
2531         struct brcmf_bss_info_le *bi;
2532         struct brcmf_ssid *ssid;
2533         const struct brcmf_tlv *tim;
2534         u16 beacon_interval;
2535         u8 dtim_period;
2536         size_t ie_len;
2537         u8 *ie;
2538         s32 err = 0;
2539
2540         brcmf_dbg(TRACE, "Enter\n");
2541         if (brcmf_is_ibssmode(ifp->vif))
2542                 return err;
2543
2544         ssid = &profile->ssid;
2545
2546         *(__le32 *)cfg->extra_buf = cpu_to_le32(WL_EXTRA_BUF_MAX);
2547         err = brcmf_fil_cmd_data_get(ifp, BRCMF_C_GET_BSS_INFO,
2548                                      cfg->extra_buf, WL_EXTRA_BUF_MAX);
2549         if (err) {
2550                 brcmf_err("Could not get bss info %d\n", err);
2551                 goto update_bss_info_out;
2552         }
2553
2554         bi = (struct brcmf_bss_info_le *)(cfg->extra_buf + 4);
2555         err = brcmf_inform_single_bss(cfg, bi);
2556         if (err)
2557                 goto update_bss_info_out;
2558
2559         ie = ((u8 *)bi) + le16_to_cpu(bi->ie_offset);
2560         ie_len = le32_to_cpu(bi->ie_length);
2561         beacon_interval = le16_to_cpu(bi->beacon_period);
2562
2563         tim = brcmf_parse_tlvs(ie, ie_len, WLAN_EID_TIM);
2564         if (tim)
2565                 dtim_period = tim->data[1];
2566         else {
2567                 /*
2568                 * active scan was done so we could not get dtim
2569                 * information out of probe response.
2570                 * so we speficially query dtim information to dongle.
2571                 */
2572                 u32 var;
2573                 err = brcmf_fil_iovar_int_get(ifp, "dtim_assoc", &var);
2574                 if (err) {
2575                         brcmf_err("wl dtim_assoc failed (%d)\n", err);
2576                         goto update_bss_info_out;
2577                 }
2578                 dtim_period = (u8)var;
2579         }
2580
2581 update_bss_info_out:
2582         brcmf_dbg(TRACE, "Exit");
2583         return err;
2584 }
2585
2586 void brcmf_abort_scanning(struct brcmf_cfg80211_info *cfg)
2587 {
2588         struct escan_info *escan = &cfg->escan_info;
2589
2590         set_bit(BRCMF_SCAN_STATUS_ABORT, &cfg->scan_status);
2591         if (cfg->scan_request) {
2592                 escan->escan_state = WL_ESCAN_STATE_IDLE;
2593                 brcmf_notify_escan_complete(cfg, escan->ifp, true, true);
2594         }
2595         clear_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status);
2596         clear_bit(BRCMF_SCAN_STATUS_ABORT, &cfg->scan_status);
2597 }
2598
2599 static void brcmf_cfg80211_escan_timeout_worker(struct work_struct *work)
2600 {
2601         struct brcmf_cfg80211_info *cfg =
2602                         container_of(work, struct brcmf_cfg80211_info,
2603                                      escan_timeout_work);
2604
2605         brcmf_notify_escan_complete(cfg, cfg->escan_info.ifp, true, true);
2606 }
2607
2608 static void brcmf_escan_timeout(unsigned long data)
2609 {
2610         struct brcmf_cfg80211_info *cfg =
2611                         (struct brcmf_cfg80211_info *)data;
2612
2613         if (cfg->scan_request) {
2614                 brcmf_err("timer expired\n");
2615                 schedule_work(&cfg->escan_timeout_work);
2616         }
2617 }
2618
2619 static s32
2620 brcmf_compare_update_same_bss(struct brcmf_cfg80211_info *cfg,
2621                               struct brcmf_bss_info_le *bss,
2622                               struct brcmf_bss_info_le *bss_info_le)
2623 {
2624         struct brcmu_chan ch_bss, ch_bss_info_le;
2625
2626         ch_bss.chspec = le16_to_cpu(bss->chanspec);
2627         cfg->d11inf.decchspec(&ch_bss);
2628         ch_bss_info_le.chspec = le16_to_cpu(bss_info_le->chanspec);
2629         cfg->d11inf.decchspec(&ch_bss_info_le);
2630
2631         if (!memcmp(&bss_info_le->BSSID, &bss->BSSID, ETH_ALEN) &&
2632                 ch_bss.band == ch_bss_info_le.band &&
2633                 bss_info_le->SSID_len == bss->SSID_len &&
2634                 !memcmp(bss_info_le->SSID, bss->SSID, bss_info_le->SSID_len)) {
2635                 if ((bss->flags & BRCMF_BSS_RSSI_ON_CHANNEL) ==
2636                         (bss_info_le->flags & BRCMF_BSS_RSSI_ON_CHANNEL)) {
2637                         s16 bss_rssi = le16_to_cpu(bss->RSSI);
2638                         s16 bss_info_rssi = le16_to_cpu(bss_info_le->RSSI);
2639
2640                         /* preserve max RSSI if the measurements are
2641                         * both on-channel or both off-channel
2642                         */
2643                         if (bss_info_rssi > bss_rssi)
2644                                 bss->RSSI = bss_info_le->RSSI;
2645                 } else if ((bss->flags & BRCMF_BSS_RSSI_ON_CHANNEL) &&
2646                         (bss_info_le->flags & BRCMF_BSS_RSSI_ON_CHANNEL) == 0) {
2647                         /* preserve the on-channel rssi measurement
2648                         * if the new measurement is off channel
2649                         */
2650                         bss->RSSI = bss_info_le->RSSI;
2651                         bss->flags |= BRCMF_BSS_RSSI_ON_CHANNEL;
2652                 }
2653                 return 1;
2654         }
2655         return 0;
2656 }
2657
2658 static s32
2659 brcmf_cfg80211_escan_handler(struct brcmf_if *ifp,
2660                              const struct brcmf_event_msg *e, void *data)
2661 {
2662         struct brcmf_cfg80211_info *cfg = ifp->drvr->config;
2663         s32 status;
2664         struct brcmf_escan_result_le *escan_result_le;
2665         struct brcmf_bss_info_le *bss_info_le;
2666         struct brcmf_bss_info_le *bss = NULL;
2667         u32 bi_length;
2668         struct brcmf_scan_results *list;
2669         u32 i;
2670         bool aborted;
2671
2672         status = e->status;
2673
2674         if (!test_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status)) {
2675                 brcmf_err("scan not ready, bssidx=%d\n", ifp->bssidx);
2676                 return -EPERM;
2677         }
2678
2679         if (status == BRCMF_E_STATUS_PARTIAL) {
2680                 brcmf_dbg(SCAN, "ESCAN Partial result\n");
2681                 escan_result_le = (struct brcmf_escan_result_le *) data;
2682                 if (!escan_result_le) {
2683                         brcmf_err("Invalid escan result (NULL pointer)\n");
2684                         goto exit;
2685                 }
2686                 if (le16_to_cpu(escan_result_le->bss_count) != 1) {
2687                         brcmf_err("Invalid bss_count %d: ignoring\n",
2688                                   escan_result_le->bss_count);
2689                         goto exit;
2690                 }
2691                 bss_info_le = &escan_result_le->bss_info_le;
2692
2693                 if (brcmf_p2p_scan_finding_common_channel(cfg, bss_info_le))
2694                         goto exit;
2695
2696                 if (!cfg->scan_request) {
2697                         brcmf_dbg(SCAN, "result without cfg80211 request\n");
2698                         goto exit;
2699                 }
2700
2701                 bi_length = le32_to_cpu(bss_info_le->length);
2702                 if (bi_length != (le32_to_cpu(escan_result_le->buflen) -
2703                                         WL_ESCAN_RESULTS_FIXED_SIZE)) {
2704                         brcmf_err("Invalid bss_info length %d: ignoring\n",
2705                                   bi_length);
2706                         goto exit;
2707                 }
2708
2709                 if (!(cfg_to_wiphy(cfg)->interface_modes &
2710                                         BIT(NL80211_IFTYPE_ADHOC))) {
2711                         if (le16_to_cpu(bss_info_le->capability) &
2712                                                 WLAN_CAPABILITY_IBSS) {
2713                                 brcmf_err("Ignoring IBSS result\n");
2714                                 goto exit;
2715                         }
2716                 }
2717
2718                 list = (struct brcmf_scan_results *)
2719                                 cfg->escan_info.escan_buf;
2720                 if (bi_length > WL_ESCAN_BUF_SIZE - list->buflen) {
2721                         brcmf_err("Buffer is too small: ignoring\n");
2722                         goto exit;
2723                 }
2724
2725                 for (i = 0; i < list->count; i++) {
2726                         bss = bss ? (struct brcmf_bss_info_le *)
2727                                 ((unsigned char *)bss +
2728                                 le32_to_cpu(bss->length)) : list->bss_info_le;
2729                         if (brcmf_compare_update_same_bss(cfg, bss,
2730                                                           bss_info_le))
2731                                 goto exit;
2732                 }
2733                 memcpy(&(cfg->escan_info.escan_buf[list->buflen]),
2734                         bss_info_le, bi_length);
2735                 list->version = le32_to_cpu(bss_info_le->version);
2736                 list->buflen += bi_length;
2737                 list->count++;
2738         } else {
2739                 cfg->escan_info.escan_state = WL_ESCAN_STATE_IDLE;
2740                 if (brcmf_p2p_scan_finding_common_channel(cfg, NULL))
2741                         goto exit;
2742                 if (cfg->scan_request) {
2743                         cfg->bss_list = (struct brcmf_scan_results *)
2744                                 cfg->escan_info.escan_buf;
2745                         brcmf_inform_bss(cfg);
2746                         aborted = status != BRCMF_E_STATUS_SUCCESS;
2747                         brcmf_notify_escan_complete(cfg, ifp, aborted,
2748                                                     false);
2749                 } else
2750                         brcmf_dbg(SCAN, "Ignored scan complete result 0x%x\n",
2751                                   status);
2752         }
2753 exit:
2754         return 0;
2755 }
2756
2757 static void brcmf_init_escan(struct brcmf_cfg80211_info *cfg)
2758 {
2759         brcmf_fweh_register(cfg->pub, BRCMF_E_ESCAN_RESULT,
2760                             brcmf_cfg80211_escan_handler);
2761         cfg->escan_info.escan_state = WL_ESCAN_STATE_IDLE;
2762         /* Init scan_timeout timer */
2763         init_timer(&cfg->escan_timeout);
2764         cfg->escan_timeout.data = (unsigned long) cfg;
2765         cfg->escan_timeout.function = brcmf_escan_timeout;
2766         INIT_WORK(&cfg->escan_timeout_work,
2767                   brcmf_cfg80211_escan_timeout_worker);
2768 }
2769
2770 static __always_inline void brcmf_delay(u32 ms)
2771 {
2772         if (ms < 1000 / HZ) {
2773                 cond_resched();
2774                 mdelay(ms);
2775         } else {
2776                 msleep(ms);
2777         }
2778 }
2779
2780 static s32 brcmf_cfg80211_resume(struct wiphy *wiphy)
2781 {
2782         brcmf_dbg(TRACE, "Enter\n");
2783
2784         return 0;
2785 }
2786
2787 static s32 brcmf_cfg80211_suspend(struct wiphy *wiphy,
2788                                   struct cfg80211_wowlan *wow)
2789 {
2790         struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
2791         struct net_device *ndev = cfg_to_ndev(cfg);
2792         struct brcmf_cfg80211_vif *vif;
2793
2794         brcmf_dbg(TRACE, "Enter\n");
2795
2796         /*
2797          * if the primary net_device is not READY there is nothing
2798          * we can do but pray resume goes smoothly.
2799          */
2800         vif = ((struct brcmf_if *)netdev_priv(ndev))->vif;
2801         if (!check_vif_up(vif))
2802                 goto exit;
2803
2804         list_for_each_entry(vif, &cfg->vif_list, list) {
2805                 if (!test_bit(BRCMF_VIF_STATUS_READY, &vif->sme_state))
2806                         continue;
2807                 /*
2808                  * While going to suspend if associated with AP disassociate
2809                  * from AP to save power while system is in suspended state
2810                  */
2811                 brcmf_link_down(vif);
2812
2813                 /* Make sure WPA_Supplicant receives all the event
2814                  * generated due to DISASSOC call to the fw to keep
2815                  * the state fw and WPA_Supplicant state consistent
2816                  */
2817                 brcmf_delay(500);
2818         }
2819
2820         /* end any scanning */
2821         if (test_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status))
2822                 brcmf_abort_scanning(cfg);
2823
2824         /* Turn off watchdog timer */
2825         brcmf_set_mpc(netdev_priv(ndev), 1);
2826
2827 exit:
2828         brcmf_dbg(TRACE, "Exit\n");
2829         /* clear any scanning activity */
2830         cfg->scan_status = 0;
2831         return 0;
2832 }
2833
2834 static __used s32
2835 brcmf_update_pmklist(struct net_device *ndev,
2836                      struct brcmf_cfg80211_pmk_list *pmk_list, s32 err)
2837 {
2838         int i, j;
2839         int pmkid_len;
2840
2841         pmkid_len = le32_to_cpu(pmk_list->pmkids.npmkid);
2842
2843         brcmf_dbg(CONN, "No of elements %d\n", pmkid_len);
2844         for (i = 0; i < pmkid_len; i++) {
2845                 brcmf_dbg(CONN, "PMKID[%d]: %pM =\n", i,
2846                           &pmk_list->pmkids.pmkid[i].BSSID);
2847                 for (j = 0; j < WLAN_PMKID_LEN; j++)
2848                         brcmf_dbg(CONN, "%02x\n",
2849                                   pmk_list->pmkids.pmkid[i].PMKID[j]);
2850         }
2851
2852         if (!err)
2853                 brcmf_fil_iovar_data_set(netdev_priv(ndev), "pmkid_info",
2854                                          (char *)pmk_list, sizeof(*pmk_list));
2855
2856         return err;
2857 }
2858
2859 static s32
2860 brcmf_cfg80211_set_pmksa(struct wiphy *wiphy, struct net_device *ndev,
2861                          struct cfg80211_pmksa *pmksa)
2862 {
2863         struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
2864         struct brcmf_if *ifp = netdev_priv(ndev);
2865         struct pmkid_list *pmkids = &cfg->pmk_list->pmkids;
2866         s32 err = 0;
2867         int i;
2868         int pmkid_len;
2869
2870         brcmf_dbg(TRACE, "Enter\n");
2871         if (!check_vif_up(ifp->vif))
2872                 return -EIO;
2873
2874         pmkid_len = le32_to_cpu(pmkids->npmkid);
2875         for (i = 0; i < pmkid_len; i++)
2876                 if (!memcmp(pmksa->bssid, pmkids->pmkid[i].BSSID, ETH_ALEN))
2877                         break;
2878         if (i < WL_NUM_PMKIDS_MAX) {
2879                 memcpy(pmkids->pmkid[i].BSSID, pmksa->bssid, ETH_ALEN);
2880                 memcpy(pmkids->pmkid[i].PMKID, pmksa->pmkid, WLAN_PMKID_LEN);
2881                 if (i == pmkid_len) {
2882                         pmkid_len++;
2883                         pmkids->npmkid = cpu_to_le32(pmkid_len);
2884                 }
2885         } else
2886                 err = -EINVAL;
2887
2888         brcmf_dbg(CONN, "set_pmksa,IW_PMKSA_ADD - PMKID: %pM =\n",
2889                   pmkids->pmkid[pmkid_len].BSSID);
2890         for (i = 0; i < WLAN_PMKID_LEN; i++)
2891                 brcmf_dbg(CONN, "%02x\n", pmkids->pmkid[pmkid_len].PMKID[i]);
2892
2893         err = brcmf_update_pmklist(ndev, cfg->pmk_list, err);
2894
2895         brcmf_dbg(TRACE, "Exit\n");
2896         return err;
2897 }
2898
2899 static s32
2900 brcmf_cfg80211_del_pmksa(struct wiphy *wiphy, struct net_device *ndev,
2901                       struct cfg80211_pmksa *pmksa)
2902 {
2903         struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
2904         struct brcmf_if *ifp = netdev_priv(ndev);
2905         struct pmkid_list pmkid;
2906         s32 err = 0;
2907         int i, pmkid_len;
2908
2909         brcmf_dbg(TRACE, "Enter\n");
2910         if (!check_vif_up(ifp->vif))
2911                 return -EIO;
2912
2913         memcpy(&pmkid.pmkid[0].BSSID, pmksa->bssid, ETH_ALEN);
2914         memcpy(&pmkid.pmkid[0].PMKID, pmksa->pmkid, WLAN_PMKID_LEN);
2915
2916         brcmf_dbg(CONN, "del_pmksa,IW_PMKSA_REMOVE - PMKID: %pM =\n",
2917                   &pmkid.pmkid[0].BSSID);
2918         for (i = 0; i < WLAN_PMKID_LEN; i++)
2919                 brcmf_dbg(CONN, "%02x\n", pmkid.pmkid[0].PMKID[i]);
2920
2921         pmkid_len = le32_to_cpu(cfg->pmk_list->pmkids.npmkid);
2922         for (i = 0; i < pmkid_len; i++)
2923                 if (!memcmp
2924                     (pmksa->bssid, &cfg->pmk_list->pmkids.pmkid[i].BSSID,
2925                      ETH_ALEN))
2926                         break;
2927
2928         if ((pmkid_len > 0)
2929             && (i < pmkid_len)) {
2930                 memset(&cfg->pmk_list->pmkids.pmkid[i], 0,
2931                        sizeof(struct pmkid));
2932                 for (; i < (pmkid_len - 1); i++) {
2933                         memcpy(&cfg->pmk_list->pmkids.pmkid[i].BSSID,
2934                                &cfg->pmk_list->pmkids.pmkid[i + 1].BSSID,
2935                                ETH_ALEN);
2936                         memcpy(&cfg->pmk_list->pmkids.pmkid[i].PMKID,
2937                                &cfg->pmk_list->pmkids.pmkid[i + 1].PMKID,
2938                                WLAN_PMKID_LEN);
2939                 }
2940                 cfg->pmk_list->pmkids.npmkid = cpu_to_le32(pmkid_len - 1);
2941         } else
2942                 err = -EINVAL;
2943
2944         err = brcmf_update_pmklist(ndev, cfg->pmk_list, err);
2945
2946         brcmf_dbg(TRACE, "Exit\n");
2947         return err;
2948
2949 }
2950
2951 static s32
2952 brcmf_cfg80211_flush_pmksa(struct wiphy *wiphy, struct net_device *ndev)
2953 {
2954         struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
2955         struct brcmf_if *ifp = netdev_priv(ndev);
2956         s32 err = 0;
2957
2958         brcmf_dbg(TRACE, "Enter\n");
2959         if (!check_vif_up(ifp->vif))
2960                 return -EIO;
2961
2962         memset(cfg->pmk_list, 0, sizeof(*cfg->pmk_list));
2963         err = brcmf_update_pmklist(ndev, cfg->pmk_list, err);
2964
2965         brcmf_dbg(TRACE, "Exit\n");
2966         return err;
2967
2968 }
2969
2970 /*
2971  * PFN result doesn't have all the info which are
2972  * required by the supplicant
2973  * (For e.g IEs) Do a target Escan so that sched scan results are reported
2974  * via wl_inform_single_bss in the required format. Escan does require the
2975  * scan request in the form of cfg80211_scan_request. For timebeing, create
2976  * cfg80211_scan_request one out of the received PNO event.
2977  */
2978 static s32
2979 brcmf_notify_sched_scan_results(struct brcmf_if *ifp,
2980                                 const struct brcmf_event_msg *e, void *data)
2981 {
2982         struct brcmf_cfg80211_info *cfg = ifp->drvr->config;
2983         struct brcmf_pno_net_info_le *netinfo, *netinfo_start;
2984         struct cfg80211_scan_request *request = NULL;
2985         struct cfg80211_ssid *ssid = NULL;
2986         struct ieee80211_channel *channel = NULL;
2987         struct wiphy *wiphy = cfg_to_wiphy(cfg);
2988         int err = 0;
2989         int channel_req = 0;
2990         int band = 0;
2991         struct brcmf_pno_scanresults_le *pfn_result;
2992         u32 result_count;
2993         u32 status;
2994
2995         brcmf_dbg(SCAN, "Enter\n");
2996
2997         if (e->event_code == BRCMF_E_PFN_NET_LOST) {
2998                 brcmf_dbg(SCAN, "PFN NET LOST event. Do Nothing\n");
2999                 return 0;
3000         }
3001
3002         pfn_result = (struct brcmf_pno_scanresults_le *)data;
3003         result_count = le32_to_cpu(pfn_result->count);
3004         status = le32_to_cpu(pfn_result->status);
3005
3006         /*
3007          * PFN event is limited to fit 512 bytes so we may get
3008          * multiple NET_FOUND events. For now place a warning here.
3009          */
3010         WARN_ON(status != BRCMF_PNO_SCAN_COMPLETE);
3011         brcmf_dbg(SCAN, "PFN NET FOUND event. count: %d\n", result_count);
3012         if (result_count > 0) {
3013                 int i;
3014
3015                 request = kzalloc(sizeof(*request), GFP_KERNEL);
3016                 ssid = kcalloc(result_count, sizeof(*ssid), GFP_KERNEL);
3017                 channel = kcalloc(result_count, sizeof(*channel), GFP_KERNEL);
3018                 if (!request || !ssid || !channel) {
3019                         err = -ENOMEM;
3020                         goto out_err;
3021                 }
3022
3023                 request->wiphy = wiphy;
3024                 data += sizeof(struct brcmf_pno_scanresults_le);
3025                 netinfo_start = (struct brcmf_pno_net_info_le *)data;
3026
3027                 for (i = 0; i < result_count; i++) {
3028                         netinfo = &netinfo_start[i];
3029                         if (!netinfo) {
3030                                 brcmf_err("Invalid netinfo ptr. index: %d\n",
3031                                           i);
3032                                 err = -EINVAL;
3033                                 goto out_err;
3034                         }
3035
3036                         brcmf_dbg(SCAN, "SSID:%s Channel:%d\n",
3037                                   netinfo->SSID, netinfo->channel);
3038                         memcpy(ssid[i].ssid, netinfo->SSID, netinfo->SSID_len);
3039                         ssid[i].ssid_len = netinfo->SSID_len;
3040                         request->n_ssids++;
3041
3042                         channel_req = netinfo->channel;
3043                         if (channel_req <= CH_MAX_2G_CHANNEL)
3044                                 band = NL80211_BAND_2GHZ;
3045                         else
3046                                 band = NL80211_BAND_5GHZ;
3047                         channel[i].center_freq =
3048                                 ieee80211_channel_to_frequency(channel_req,
3049                                                                band);
3050                         channel[i].band = band;
3051                         channel[i].flags |= IEEE80211_CHAN_NO_HT40;
3052                         request->channels[i] = &channel[i];
3053                         request->n_channels++;
3054                 }
3055
3056                 /* assign parsed ssid array */
3057                 if (request->n_ssids)
3058                         request->ssids = &ssid[0];
3059
3060                 if (test_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status)) {
3061                         /* Abort any on-going scan */
3062                         brcmf_abort_scanning(cfg);
3063                 }
3064
3065                 set_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status);
3066                 cfg->escan_info.run = brcmf_run_escan;
3067                 err = brcmf_do_escan(cfg, wiphy, ifp, request);
3068                 if (err) {
3069                         clear_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status);
3070                         goto out_err;
3071                 }
3072                 cfg->sched_escan = true;
3073                 cfg->scan_request = request;
3074         } else {
3075                 brcmf_err("FALSE PNO Event. (pfn_count == 0)\n");
3076                 goto out_err;
3077         }
3078
3079         kfree(ssid);
3080         kfree(channel);
3081         kfree(request);
3082         return 0;
3083
3084 out_err:
3085         kfree(ssid);
3086         kfree(channel);
3087         kfree(request);
3088         cfg80211_sched_scan_stopped(wiphy);
3089         return err;
3090 }
3091
3092 static int brcmf_dev_pno_clean(struct net_device *ndev)
3093 {
3094         int ret;
3095
3096         /* Disable pfn */
3097         ret = brcmf_fil_iovar_int_set(netdev_priv(ndev), "pfn", 0);
3098         if (ret == 0) {
3099                 /* clear pfn */
3100                 ret = brcmf_fil_iovar_data_set(netdev_priv(ndev), "pfnclear",
3101                                                NULL, 0);
3102         }
3103         if (ret < 0)
3104                 brcmf_err("failed code %d\n", ret);
3105
3106         return ret;
3107 }
3108
3109 static int brcmf_dev_pno_config(struct net_device *ndev)
3110 {
3111         struct brcmf_pno_param_le pfn_param;
3112
3113         memset(&pfn_param, 0, sizeof(pfn_param));
3114         pfn_param.version = cpu_to_le32(BRCMF_PNO_VERSION);
3115
3116         /* set extra pno params */
3117         pfn_param.flags = cpu_to_le16(1 << BRCMF_PNO_ENABLE_ADAPTSCAN_BIT);
3118         pfn_param.repeat = BRCMF_PNO_REPEAT;
3119         pfn_param.exp = BRCMF_PNO_FREQ_EXPO_MAX;
3120
3121         /* set up pno scan fr */
3122         pfn_param.scan_freq = cpu_to_le32(BRCMF_PNO_TIME);
3123
3124         return brcmf_fil_iovar_data_set(netdev_priv(ndev), "pfn_set",
3125                                         &pfn_param, sizeof(pfn_param));
3126 }
3127
3128 static int
3129 brcmf_cfg80211_sched_scan_start(struct wiphy *wiphy,
3130                                 struct net_device *ndev,
3131                                 struct cfg80211_sched_scan_request *request)
3132 {
3133         struct brcmf_if *ifp = netdev_priv(ndev);
3134         struct brcmf_cfg80211_info *cfg = wiphy_priv(wiphy);
3135         struct brcmf_pno_net_param_le pfn;
3136         int i;
3137         int ret = 0;
3138
3139         brcmf_dbg(SCAN, "Enter n_match_sets:%d n_ssids:%d\n",
3140                   request->n_match_sets, request->n_ssids);
3141         if (test_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status)) {
3142                 brcmf_err("Scanning already: status (%lu)\n", cfg->scan_status);
3143                 return -EAGAIN;
3144         }
3145         if (test_bit(BRCMF_SCAN_STATUS_SUPPRESS, &cfg->scan_status)) {
3146                 brcmf_err("Scanning suppressed: status (%lu)\n",
3147                           cfg->scan_status);
3148                 return -EAGAIN;
3149         }
3150
3151         if (!request->n_ssids || !request->n_match_sets) {
3152                 brcmf_dbg(SCAN, "Invalid sched scan req!! n_ssids:%d\n",
3153                           request->n_ssids);
3154                 return -EINVAL;
3155         }
3156
3157         if (request->n_ssids > 0) {
3158                 for (i = 0; i < request->n_ssids; i++) {
3159                         /* Active scan req for ssids */
3160                         brcmf_dbg(SCAN, ">>> Active scan req for ssid (%s)\n",
3161                                   request->ssids[i].ssid);
3162
3163                         /*
3164                          * match_set ssids is a supert set of n_ssid list,
3165                          * so we need not add these set seperately.
3166                          */
3167                 }
3168         }
3169
3170         if (request->n_match_sets > 0) {
3171                 /* clean up everything */
3172                 ret = brcmf_dev_pno_clean(ndev);
3173                 if  (ret < 0) {
3174                         brcmf_err("failed error=%d\n", ret);
3175                         return ret;
3176                 }
3177
3178                 /* configure pno */
3179                 ret = brcmf_dev_pno_config(ndev);
3180                 if (ret < 0) {
3181                         brcmf_err("PNO setup failed!! ret=%d\n", ret);
3182                         return -EINVAL;
3183                 }
3184
3185                 /* configure each match set */
3186                 for (i = 0; i < request->n_match_sets; i++) {
3187                         struct cfg80211_ssid *ssid;
3188                         u32 ssid_len;
3189
3190                         ssid = &request->match_sets[i].ssid;
3191                         ssid_len = ssid->ssid_len;
3192
3193                         if (!ssid_len) {
3194                                 brcmf_err("skip broadcast ssid\n");
3195                                 continue;
3196                         }
3197                         pfn.auth = cpu_to_le32(WLAN_AUTH_OPEN);
3198                         pfn.wpa_auth = cpu_to_le32(BRCMF_PNO_WPA_AUTH_ANY);
3199                         pfn.wsec = cpu_to_le32(0);
3200                         pfn.infra = cpu_to_le32(1);
3201                         pfn.flags = cpu_to_le32(1 << BRCMF_PNO_HIDDEN_BIT);
3202                         pfn.ssid.SSID_len = cpu_to_le32(ssid_len);
3203                         memcpy(pfn.ssid.SSID, ssid->ssid, ssid_len);
3204                         ret = brcmf_fil_iovar_data_set(ifp, "pfn_add", &pfn,
3205                                                        sizeof(pfn));
3206                         brcmf_dbg(SCAN, ">>> PNO filter %s for ssid (%s)\n",
3207                                   ret == 0 ? "set" : "failed", ssid->ssid);
3208                 }
3209                 /* Enable the PNO */
3210                 if (brcmf_fil_iovar_int_set(ifp, "pfn", 1) < 0) {
3211                         brcmf_err("PNO enable failed!! ret=%d\n", ret);
3212                         return -EINVAL;
3213                 }
3214         } else {
3215                 return -EINVAL;
3216         }
3217
3218         return 0;
3219 }
3220
3221 static int brcmf_cfg80211_sched_scan_stop(struct wiphy *wiphy,
3222                                           struct net_device *ndev)
3223 {
3224         struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
3225
3226         brcmf_dbg(SCAN, "enter\n");
3227         brcmf_dev_pno_clean(ndev);
3228         if (cfg->sched_escan)
3229                 brcmf_notify_escan_complete(cfg, netdev_priv(ndev), true, true);
3230         return 0;
3231 }
3232
3233 static s32 brcmf_configure_opensecurity(struct brcmf_if *ifp)
3234 {
3235         s32 err;
3236
3237         /* set auth */
3238         err = brcmf_fil_bsscfg_int_set(ifp, "auth", 0);
3239         if (err < 0) {
3240                 brcmf_err("auth error %d\n", err);
3241                 return err;
3242         }
3243         /* set wsec */
3244         err = brcmf_fil_bsscfg_int_set(ifp, "wsec", 0);
3245         if (err < 0) {
3246                 brcmf_err("wsec error %d\n", err);
3247                 return err;
3248         }
3249         /* set upper-layer auth */
3250         err = brcmf_fil_bsscfg_int_set(ifp, "wpa_auth", WPA_AUTH_NONE);
3251         if (err < 0) {
3252                 brcmf_err("wpa_auth error %d\n", err);
3253                 return err;
3254         }
3255
3256         return 0;
3257 }
3258
3259 static bool brcmf_valid_wpa_oui(u8 *oui, bool is_rsn_ie)
3260 {
3261         if (is_rsn_ie)
3262                 return (memcmp(oui, RSN_OUI, TLV_OUI_LEN) == 0);
3263
3264         return (memcmp(oui, WPA_OUI, TLV_OUI_LEN) == 0);
3265 }
3266
3267 static s32
3268 brcmf_configure_wpaie(struct net_device *ndev,
3269                       const struct brcmf_vs_tlv *wpa_ie,
3270                       bool is_rsn_ie)
3271 {
3272         struct brcmf_if *ifp = netdev_priv(ndev);
3273         u32 auth = 0; /* d11 open authentication */
3274         u16 count;
3275         s32 err = 0;
3276         s32 len = 0;
3277         u32 i;
3278         u32 wsec;
3279         u32 pval = 0;
3280         u32 gval = 0;
3281         u32 wpa_auth = 0;
3282         u32 offset;
3283         u8 *data;
3284         u16 rsn_cap;
3285         u32 wme_bss_disable;
3286
3287         brcmf_dbg(TRACE, "Enter\n");
3288         if (wpa_ie == NULL)
3289                 goto exit;
3290
3291         len = wpa_ie->len + TLV_HDR_LEN;
3292         data = (u8 *)wpa_ie;
3293         offset = TLV_HDR_LEN;
3294         if (!is_rsn_ie)
3295                 offset += VS_IE_FIXED_HDR_LEN;
3296         else
3297                 offset += WPA_IE_VERSION_LEN;
3298
3299         /* check for multicast cipher suite */
3300         if (offset + WPA_IE_MIN_OUI_LEN > len) {
3301                 err = -EINVAL;
3302                 brcmf_err("no multicast cipher suite\n");
3303                 goto exit;
3304         }
3305
3306         if (!brcmf_valid_wpa_oui(&data[offset], is_rsn_ie)) {
3307                 err = -EINVAL;
3308                 brcmf_err("ivalid OUI\n");
3309                 goto exit;
3310         }
3311         offset += TLV_OUI_LEN;
3312
3313         /* pick up multicast cipher */
3314         switch (data[offset]) {
3315         case WPA_CIPHER_NONE:
3316                 gval = 0;
3317                 break;
3318         case WPA_CIPHER_WEP_40:
3319         case WPA_CIPHER_WEP_104:
3320                 gval = WEP_ENABLED;
3321                 break;
3322         case WPA_CIPHER_TKIP:
3323                 gval = TKIP_ENABLED;
3324                 break;
3325         case WPA_CIPHER_AES_CCM:
3326                 gval = AES_ENABLED;
3327                 break;
3328         default:
3329                 err = -EINVAL;
3330                 brcmf_err("Invalid multi cast cipher info\n");
3331                 goto exit;
3332         }
3333
3334         offset++;
3335         /* walk thru unicast cipher list and pick up what we recognize */
3336         count = data[offset] + (data[offset + 1] << 8);
3337         offset += WPA_IE_SUITE_COUNT_LEN;
3338         /* Check for unicast suite(s) */
3339         if (offset + (WPA_IE_MIN_OUI_LEN * count) > len) {
3340                 err = -EINVAL;
3341                 brcmf_err("no unicast cipher suite\n");
3342                 goto exit;
3343         }
3344         for (i = 0; i < count; i++) {
3345                 if (!brcmf_valid_wpa_oui(&data[offset], is_rsn_ie)) {
3346                         err = -EINVAL;
3347                         brcmf_err("ivalid OUI\n");
3348                         goto exit;
3349                 }
3350                 offset += TLV_OUI_LEN;
3351                 switch (data[offset]) {
3352                 case WPA_CIPHER_NONE:
3353                         break;
3354                 case WPA_CIPHER_WEP_40:
3355                 case WPA_CIPHER_WEP_104:
3356                         pval |= WEP_ENABLED;
3357                         break;
3358                 case WPA_CIPHER_TKIP:
3359                         pval |= TKIP_ENABLED;
3360                         break;
3361                 case WPA_CIPHER_AES_CCM:
3362                         pval |= AES_ENABLED;
3363                         break;
3364                 default:
3365                         brcmf_err("Ivalid unicast security info\n");
3366                 }
3367                 offset++;
3368         }
3369         /* walk thru auth management suite list and pick up what we recognize */
3370         count = data[offset] + (data[offset + 1] << 8);
3371         offset += WPA_IE_SUITE_COUNT_LEN;
3372         /* Check for auth key management suite(s) */
3373         if (offset + (WPA_IE_MIN_OUI_LEN * count) > len) {
3374                 err = -EINVAL;
3375                 brcmf_err("no auth key mgmt suite\n");
3376                 goto exit;
3377         }
3378         for (i = 0; i < count; i++) {
3379                 if (!brcmf_valid_wpa_oui(&data[offset], is_rsn_ie)) {
3380                         err = -EINVAL;
3381                         brcmf_err("ivalid OUI\n");
3382                         goto exit;
3383                 }
3384                 offset += TLV_OUI_LEN;
3385                 switch (data[offset]) {
3386                 case RSN_AKM_NONE:
3387                         brcmf_dbg(TRACE, "RSN_AKM_NONE\n");
3388                         wpa_auth |= WPA_AUTH_NONE;
3389                         break;
3390                 case RSN_AKM_UNSPECIFIED:
3391                         brcmf_dbg(TRACE, "RSN_AKM_UNSPECIFIED\n");
3392                         is_rsn_ie ? (wpa_auth |= WPA2_AUTH_UNSPECIFIED) :
3393                                     (wpa_auth |= WPA_AUTH_UNSPECIFIED);
3394                         break;
3395                 case RSN_AKM_PSK:
3396                         brcmf_dbg(TRACE, "RSN_AKM_PSK\n");
3397                         is_rsn_ie ? (wpa_auth |= WPA2_AUTH_PSK) :
3398                                     (wpa_auth |= WPA_AUTH_PSK);
3399                         break;
3400                 default:
3401                         brcmf_err("Ivalid key mgmt info\n");
3402                 }
3403                 offset++;
3404         }
3405
3406         if (is_rsn_ie) {
3407                 wme_bss_disable = 1;
3408                 if ((offset + RSN_CAP_LEN) <= len) {
3409                         rsn_cap = data[offset] + (data[offset + 1] << 8);
3410                         if (rsn_cap & RSN_CAP_PTK_REPLAY_CNTR_MASK)
3411                                 wme_bss_disable = 0;
3412                 }
3413                 /* set wme_bss_disable to sync RSN Capabilities */
3414                 err = brcmf_fil_bsscfg_int_set(ifp, "wme_bss_disable",
3415                                                wme_bss_disable);
3416                 if (err < 0) {
3417                         brcmf_err("wme_bss_disable error %d\n", err);
3418                         goto exit;
3419                 }
3420         }
3421         /* FOR WPS , set SES_OW_ENABLED */
3422         wsec = (pval | gval | SES_OW_ENABLED);
3423
3424         /* set auth */
3425         err = brcmf_fil_bsscfg_int_set(ifp, "auth", auth);
3426         if (err < 0) {
3427                 brcmf_err("auth error %d\n", err);
3428                 goto exit;
3429         }
3430         /* set wsec */
3431         err = brcmf_fil_bsscfg_int_set(ifp, "wsec", wsec);
3432         if (err < 0) {
3433                 brcmf_err("wsec error %d\n", err);
3434                 goto exit;
3435         }
3436         /* set upper-layer auth */
3437         err = brcmf_fil_bsscfg_int_set(ifp, "wpa_auth", wpa_auth);
3438         if (err < 0) {
3439                 brcmf_err("wpa_auth error %d\n", err);
3440                 goto exit;
3441         }
3442
3443 exit:
3444         return err;
3445 }
3446
3447 static s32
3448 brcmf_parse_vndr_ies(const u8 *vndr_ie_buf, u32 vndr_ie_len,
3449                      struct parsed_vndr_ies *vndr_ies)
3450 {
3451         struct brcmf_vs_tlv *vndrie;
3452         struct brcmf_tlv *ie;
3453         struct parsed_vndr_ie_info *parsed_info;
3454         s32 remaining_len;
3455
3456         remaining_len = (s32)vndr_ie_len;
3457         memset(vndr_ies, 0, sizeof(*vndr_ies));
3458
3459         ie = (struct brcmf_tlv *)vndr_ie_buf;
3460         while (ie) {
3461                 if (ie->id != WLAN_EID_VENDOR_SPECIFIC)
3462                         goto next;
3463                 vndrie = (struct brcmf_vs_tlv *)ie;
3464                 /* len should be bigger than OUI length + one */
3465                 if (vndrie->len < (VS_IE_FIXED_HDR_LEN - TLV_HDR_LEN + 1)) {
3466                         brcmf_err("invalid vndr ie. length is too small %d\n",
3467                                   vndrie->len);
3468                         goto next;
3469                 }
3470                 /* if wpa or wme ie, do not add ie */
3471                 if (!memcmp(vndrie->oui, (u8 *)WPA_OUI, TLV_OUI_LEN) &&
3472                     ((vndrie->oui_type == WPA_OUI_TYPE) ||
3473                     (vndrie->oui_type == WME_OUI_TYPE))) {
3474                         brcmf_dbg(TRACE, "Found WPA/WME oui. Do not add it\n");
3475                         goto next;
3476                 }
3477
3478                 parsed_info = &vndr_ies->ie_info[vndr_ies->count];
3479
3480                 /* save vndr ie information */
3481                 parsed_info->ie_ptr = (char *)vndrie;
3482                 parsed_info->ie_len = vndrie->len + TLV_HDR_LEN;
3483                 memcpy(&parsed_info->vndrie, vndrie, sizeof(*vndrie));
3484
3485                 vndr_ies->count++;
3486
3487                 brcmf_dbg(TRACE, "** OUI %02x %02x %02x, type 0x%02x\n",
3488                           parsed_info->vndrie.oui[0],
3489                           parsed_info->vndrie.oui[1],
3490                           parsed_info->vndrie.oui[2],
3491                           parsed_info->vndrie.oui_type);
3492
3493                 if (vndr_ies->count >= VNDR_IE_PARSE_LIMIT)
3494                         break;
3495 next:
3496                 remaining_len -= (ie->len + TLV_HDR_LEN);
3497                 if (remaining_len <= TLV_HDR_LEN)
3498                         ie = NULL;
3499                 else
3500                         ie = (struct brcmf_tlv *)(((u8 *)ie) + ie->len +
3501                                 TLV_HDR_LEN);
3502         }
3503         return 0;
3504 }
3505
3506 static u32
3507 brcmf_vndr_ie(u8 *iebuf, s32 pktflag, u8 *ie_ptr, u32 ie_len, s8 *add_del_cmd)
3508 {
3509
3510         __le32 iecount_le;
3511         __le32 pktflag_le;
3512
3513         strncpy(iebuf, add_del_cmd, VNDR_IE_CMD_LEN - 1);
3514         iebuf[VNDR_IE_CMD_LEN - 1] = '\0';
3515
3516         iecount_le = cpu_to_le32(1);
3517         memcpy(&iebuf[VNDR_IE_COUNT_OFFSET], &iecount_le, sizeof(iecount_le));
3518
3519         pktflag_le = cpu_to_le32(pktflag);
3520         memcpy(&iebuf[VNDR_IE_PKTFLAG_OFFSET], &pktflag_le, sizeof(pktflag_le));
3521
3522         memcpy(&iebuf[VNDR_IE_VSIE_OFFSET], ie_ptr, ie_len);
3523
3524         return ie_len + VNDR_IE_HDR_SIZE;
3525 }
3526
3527 s32 brcmf_vif_set_mgmt_ie(struct brcmf_cfg80211_vif *vif, s32 pktflag,
3528                           const u8 *vndr_ie_buf, u32 vndr_ie_len)
3529 {
3530         struct brcmf_if *ifp;
3531         struct vif_saved_ie *saved_ie;
3532         s32 err = 0;
3533         u8  *iovar_ie_buf;
3534         u8  *curr_ie_buf;
3535         u8  *mgmt_ie_buf = NULL;
3536         int mgmt_ie_buf_len;
3537         u32 *mgmt_ie_len;
3538         u32 del_add_ie_buf_len = 0;
3539         u32 total_ie_buf_len = 0;
3540         u32 parsed_ie_buf_len = 0;
3541         struct parsed_vndr_ies old_vndr_ies;
3542         struct parsed_vndr_ies new_vndr_ies;
3543         struct parsed_vndr_ie_info *vndrie_info;
3544         s32 i;
3545         u8 *ptr;
3546         int remained_buf_len;
3547
3548         if (!vif)
3549                 return -ENODEV;
3550         ifp = vif->ifp;
3551         saved_ie = &vif->saved_ie;
3552
3553         brcmf_dbg(TRACE, "bssidx %d, pktflag : 0x%02X\n", ifp->bssidx, pktflag);
3554         iovar_ie_buf = kzalloc(WL_EXTRA_BUF_MAX, GFP_KERNEL);
3555         if (!iovar_ie_buf)
3556                 return -ENOMEM;
3557         curr_ie_buf = iovar_ie_buf;
3558         switch (pktflag) {
3559         case BRCMF_VNDR_IE_PRBREQ_FLAG:
3560                 mgmt_ie_buf = saved_ie->probe_req_ie;
3561                 mgmt_ie_len = &saved_ie->probe_req_ie_len;
3562                 mgmt_ie_buf_len = sizeof(saved_ie->probe_req_ie);
3563                 break;
3564         case BRCMF_VNDR_IE_PRBRSP_FLAG:
3565                 mgmt_ie_buf = saved_ie->probe_res_ie;
3566                 mgmt_ie_len = &saved_ie->probe_res_ie_len;
3567                 mgmt_ie_buf_len = sizeof(saved_ie->probe_res_ie);
3568                 break;
3569         case BRCMF_VNDR_IE_BEACON_FLAG:
3570                 mgmt_ie_buf = saved_ie->beacon_ie;
3571                 mgmt_ie_len = &saved_ie->beacon_ie_len;
3572                 mgmt_ie_buf_len = sizeof(saved_ie->beacon_ie);
3573                 break;
3574         case BRCMF_VNDR_IE_ASSOCREQ_FLAG:
3575                 mgmt_ie_buf = saved_ie->assoc_req_ie;
3576                 mgmt_ie_len = &saved_ie->assoc_req_ie_len;
3577                 mgmt_ie_buf_len = sizeof(saved_ie->assoc_req_ie);
3578                 break;
3579         default:
3580                 err = -EPERM;
3581                 brcmf_err("not suitable type\n");
3582                 goto exit;
3583         }
3584
3585         if (vndr_ie_len > mgmt_ie_buf_len) {
3586                 err = -ENOMEM;
3587                 brcmf_err("extra IE size too big\n");
3588                 goto exit;
3589         }
3590
3591         /* parse and save new vndr_ie in curr_ie_buff before comparing it */
3592         if (vndr_ie_buf && vndr_ie_len && curr_ie_buf) {
3593                 ptr = curr_ie_buf;
3594                 brcmf_parse_vndr_ies(vndr_ie_buf, vndr_ie_len, &new_vndr_ies);
3595                 for (i = 0; i < new_vndr_ies.count; i++) {
3596                         vndrie_info = &new_vndr_ies.ie_info[i];
3597                         memcpy(ptr + parsed_ie_buf_len, vndrie_info->ie_ptr,
3598                                vndrie_info->ie_len);
3599                         parsed_ie_buf_len += vndrie_info->ie_len;
3600                 }
3601         }
3602
3603         if (mgmt_ie_buf && *mgmt_ie_len) {
3604                 if (parsed_ie_buf_len && (parsed_ie_buf_len == *mgmt_ie_len) &&
3605                     (memcmp(mgmt_ie_buf, curr_ie_buf,
3606                             parsed_ie_buf_len) == 0)) {
3607                         brcmf_dbg(TRACE, "Previous mgmt IE equals to current IE\n");
3608                         goto exit;
3609                 }
3610
3611                 /* parse old vndr_ie */
3612                 brcmf_parse_vndr_ies(mgmt_ie_buf, *mgmt_ie_len, &old_vndr_ies);
3613
3614                 /* make a command to delete old ie */
3615                 for (i = 0; i < old_vndr_ies.count; i++) {
3616                         vndrie_info = &old_vndr_ies.ie_info[i];
3617
3618                         brcmf_dbg(TRACE, "DEL ID : %d, Len: %d , OUI:%02x:%02x:%02x\n",
3619                                   vndrie_info->vndrie.id,
3620                                   vndrie_info->vndrie.len,
3621                                   vndrie_info->vndrie.oui[0],
3622                                   vndrie_info->vndrie.oui[1],
3623                                   vndrie_info->vndrie.oui[2]);
3624
3625                         del_add_ie_buf_len = brcmf_vndr_ie(curr_ie_buf, pktflag,
3626                                                            vndrie_info->ie_ptr,
3627                                                            vndrie_info->ie_len,
3628                                                            "del");
3629                         curr_ie_buf += del_add_ie_buf_len;
3630                         total_ie_buf_len += del_add_ie_buf_len;
3631                 }
3632         }
3633
3634         *mgmt_ie_len = 0;
3635         /* Add if there is any extra IE */
3636         if (mgmt_ie_buf && parsed_ie_buf_len) {
3637                 ptr = mgmt_ie_buf;
3638
3639                 remained_buf_len = mgmt_ie_buf_len;
3640
3641                 /* make a command to add new ie */
3642                 for (i = 0; i < new_vndr_ies.count; i++) {
3643                         vndrie_info = &new_vndr_ies.ie_info[i];
3644
3645                         /* verify remained buf size before copy data */
3646                         if (remained_buf_len < (vndrie_info->vndrie.len +
3647                                                         VNDR_IE_VSIE_OFFSET)) {
3648                                 brcmf_err("no space in mgmt_ie_buf: len left %d",
3649                                           remained_buf_len);
3650                                 break;
3651                         }
3652                         remained_buf_len -= (vndrie_info->ie_len +
3653                                              VNDR_IE_VSIE_OFFSET);
3654
3655                         brcmf_dbg(TRACE, "ADDED ID : %d, Len: %d, OUI:%02x:%02x:%02x\n",
3656                                   vndrie_info->vndrie.id,
3657                                   vndrie_info->vndrie.len,
3658                                   vndrie_info->vndrie.oui[0],
3659                                   vndrie_info->vndrie.oui[1],
3660                                   vndrie_info->vndrie.oui[2]);
3661
3662                         del_add_ie_buf_len = brcmf_vndr_ie(curr_ie_buf, pktflag,
3663                                                            vndrie_info->ie_ptr,
3664                                                            vndrie_info->ie_len,
3665                                                            "add");
3666
3667                         /* save the parsed IE in wl struct */
3668                         memcpy(ptr + (*mgmt_ie_len), vndrie_info->ie_ptr,
3669                                vndrie_info->ie_len);
3670                         *mgmt_ie_len += vndrie_info->ie_len;
3671
3672                         curr_ie_buf += del_add_ie_buf_len;
3673                         total_ie_buf_len += del_add_ie_buf_len;
3674                 }
3675         }
3676         if (total_ie_buf_len) {
3677                 err  = brcmf_fil_bsscfg_data_set(ifp, "vndr_ie", iovar_ie_buf,
3678                                                  total_ie_buf_len);
3679                 if (err)
3680                         brcmf_err("vndr ie set error : %d\n", err);
3681         }
3682
3683 exit:
3684         kfree(iovar_ie_buf);
3685         return err;
3686 }
3687
3688 s32 brcmf_vif_clear_mgmt_ies(struct brcmf_cfg80211_vif *vif)
3689 {
3690         s32 pktflags[] = {
3691                 BRCMF_VNDR_IE_PRBREQ_FLAG,
3692                 BRCMF_VNDR_IE_PRBRSP_FLAG,
3693                 BRCMF_VNDR_IE_BEACON_FLAG
3694         };
3695         int i;
3696
3697         for (i = 0; i < ARRAY_SIZE(pktflags); i++)
3698                 brcmf_vif_set_mgmt_ie(vif, pktflags[i], NULL, 0);
3699
3700         memset(&vif->saved_ie, 0, sizeof(vif->saved_ie));
3701         return 0;
3702 }
3703
3704 static s32
3705 brcmf_config_ap_mgmt_ie(struct brcmf_cfg80211_vif *vif,
3706                         struct cfg80211_beacon_data *beacon)
3707 {
3708         s32 err;
3709
3710         /* Set Beacon IEs to FW */
3711         err = brcmf_vif_set_mgmt_ie(vif, BRCMF_VNDR_IE_BEACON_FLAG,
3712                                     beacon->tail, beacon->tail_len);
3713         if (err) {
3714                 brcmf_err("Set Beacon IE Failed\n");
3715                 return err;
3716         }
3717         brcmf_dbg(TRACE, "Applied Vndr IEs for Beacon\n");
3718
3719         /* Set Probe Response IEs to FW */
3720         err = brcmf_vif_set_mgmt_ie(vif, BRCMF_VNDR_IE_PRBRSP_FLAG,
3721                                     beacon->proberesp_ies,
3722                                     beacon->proberesp_ies_len);
3723         if (err)
3724                 brcmf_err("Set Probe Resp IE Failed\n");
3725         else
3726                 brcmf_dbg(TRACE, "Applied Vndr IEs for Probe Resp\n");
3727
3728         return err;
3729 }
3730
3731 static s32
3732 brcmf_cfg80211_start_ap(struct wiphy *wiphy, struct net_device *ndev,
3733                         struct cfg80211_ap_settings *settings)
3734 {
3735         s32 ie_offset;
3736         struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
3737         struct brcmf_if *ifp = netdev_priv(ndev);
3738         const struct brcmf_tlv *ssid_ie;
3739         struct brcmf_ssid_le ssid_le;
3740         s32 err = -EPERM;
3741         const struct brcmf_tlv *rsn_ie;
3742         const struct brcmf_vs_tlv *wpa_ie;
3743         struct brcmf_join_params join_params;
3744         enum nl80211_iftype dev_role;
3745         struct brcmf_fil_bss_enable_le bss_enable;
3746         u16 chanspec;
3747
3748         brcmf_dbg(TRACE, "ctrlchn=%d, center=%d, bw=%d, beacon_interval=%d, dtim_period=%d,\n",
3749                   settings->chandef.chan->hw_value,
3750                   settings->chandef.center_freq1, settings->chandef.width,
3751                   settings->beacon_interval, settings->dtim_period);
3752         brcmf_dbg(TRACE, "ssid=%s(%zu), auth_type=%d, inactivity_timeout=%d\n",
3753                   settings->ssid, settings->ssid_len, settings->auth_type,
3754                   settings->inactivity_timeout);
3755
3756         dev_role = ifp->vif->wdev.iftype;
3757
3758         memset(&ssid_le, 0, sizeof(ssid_le));
3759         if (settings->ssid == NULL || settings->ssid_len == 0) {
3760                 ie_offset = DOT11_MGMT_HDR_LEN + DOT11_BCN_PRB_FIXED_LEN;
3761                 ssid_ie = brcmf_parse_tlvs(
3762                                 (u8 *)&settings->beacon.head[ie_offset],
3763                                 settings->beacon.head_len - ie_offset,
3764                                 WLAN_EID_SSID);
3765                 if (!ssid_ie)
3766                         return -EINVAL;
3767
3768                 memcpy(ssid_le.SSID, ssid_ie->data, ssid_ie->len);
3769                 ssid_le.SSID_len = cpu_to_le32(ssid_ie->len);
3770                 brcmf_dbg(TRACE, "SSID is (%s) in Head\n", ssid_le.SSID);
3771         } else {
3772                 memcpy(ssid_le.SSID, settings->ssid, settings->ssid_len);
3773                 ssid_le.SSID_len = cpu_to_le32((u32)settings->ssid_len);
3774         }
3775
3776         brcmf_set_mpc(ifp, 0);
3777         brcmf_configure_arp_offload(ifp, false);
3778
3779         /* find the RSN_IE */
3780         rsn_ie = brcmf_parse_tlvs((u8 *)settings->beacon.tail,
3781                                   settings->beacon.tail_len, WLAN_EID_RSN);
3782
3783         /* find the WPA_IE */
3784         wpa_ie = brcmf_find_wpaie((u8 *)settings->beacon.tail,
3785                                   settings->beacon.tail_len);
3786
3787         if ((wpa_ie != NULL || rsn_ie != NULL)) {
3788                 brcmf_dbg(TRACE, "WPA(2) IE is found\n");
3789                 if (wpa_ie != NULL) {
3790                         /* WPA IE */
3791                         err = brcmf_configure_wpaie(ndev, wpa_ie, false);
3792                         if (err < 0)
3793                                 goto exit;
3794                 } else {
3795                         /* RSN IE */
3796                         err = brcmf_configure_wpaie(ndev,
3797                                 (struct brcmf_vs_tlv *)rsn_ie, true);
3798                         if (err < 0)
3799                                 goto exit;
3800                 }
3801         } else {
3802                 brcmf_dbg(TRACE, "No WPA(2) IEs found\n");
3803                 brcmf_configure_opensecurity(ifp);
3804         }
3805
3806         brcmf_config_ap_mgmt_ie(ifp->vif, &settings->beacon);
3807
3808         chanspec = chandef_to_chanspec(&cfg->d11inf, &settings->chandef);
3809         err = brcmf_fil_iovar_int_set(ifp, "chanspec", chanspec);
3810         if (err < 0) {
3811                 brcmf_err("Set Channel failed: chspec=%d, %d\n", chanspec, err);
3812                 goto exit;
3813         }
3814
3815         if (settings->beacon_interval) {
3816                 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_BCNPRD,
3817                                             settings->beacon_interval);
3818                 if (err < 0) {
3819                         brcmf_err("Beacon Interval Set Error, %d\n", err);
3820                         goto exit;
3821                 }
3822         }
3823         if (settings->dtim_period) {
3824                 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_DTIMPRD,
3825                                             settings->dtim_period);
3826                 if (err < 0) {
3827                         brcmf_err("DTIM Interval Set Error, %d\n", err);
3828                         goto exit;
3829                 }
3830         }
3831
3832         if (dev_role == NL80211_IFTYPE_AP) {
3833                 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_DOWN, 1);
3834                 if (err < 0) {
3835                         brcmf_err("BRCMF_C_DOWN error %d\n", err);
3836                         goto exit;
3837                 }
3838                 brcmf_fil_iovar_int_set(ifp, "apsta", 0);
3839         }
3840
3841         err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_INFRA, 1);
3842         if (err < 0) {
3843                 brcmf_err("SET INFRA error %d\n", err);
3844                 goto exit;
3845         }
3846         if (dev_role == NL80211_IFTYPE_AP) {
3847                 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_AP, 1);
3848                 if (err < 0) {
3849                         brcmf_err("setting AP mode failed %d\n", err);
3850                         goto exit;
3851                 }
3852                 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_UP, 1);
3853                 if (err < 0) {
3854                         brcmf_err("BRCMF_C_UP error (%d)\n", err);
3855                         goto exit;
3856                 }
3857
3858                 memset(&join_params, 0, sizeof(join_params));
3859                 /* join parameters starts with ssid */
3860                 memcpy(&join_params.ssid_le, &ssid_le, sizeof(ssid_le));
3861                 /* create softap */
3862                 err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_SSID,
3863                                              &join_params, sizeof(join_params));
3864                 if (err < 0) {
3865                         brcmf_err("SET SSID error (%d)\n", err);
3866                         goto exit;
3867                 }
3868                 brcmf_dbg(TRACE, "AP mode configuration complete\n");
3869         } else {
3870                 err = brcmf_fil_bsscfg_data_set(ifp, "ssid", &ssid_le,
3871                                                 sizeof(ssid_le));
3872                 if (err < 0) {
3873                         brcmf_err("setting ssid failed %d\n", err);
3874                         goto exit;
3875                 }
3876                 bss_enable.bsscfg_idx = cpu_to_le32(ifp->bssidx);
3877                 bss_enable.enable = cpu_to_le32(1);
3878                 err = brcmf_fil_iovar_data_set(ifp, "bss", &bss_enable,
3879                                                sizeof(bss_enable));
3880                 if (err < 0) {
3881                         brcmf_err("bss_enable config failed %d\n", err);
3882                         goto exit;
3883                 }
3884
3885                 brcmf_dbg(TRACE, "GO mode configuration complete\n");
3886         }
3887         clear_bit(BRCMF_VIF_STATUS_AP_CREATING, &ifp->vif->sme_state);
3888         set_bit(BRCMF_VIF_STATUS_AP_CREATED, &ifp->vif->sme_state);
3889
3890 exit:
3891         if (err) {
3892                 brcmf_set_mpc(ifp, 1);
3893                 brcmf_configure_arp_offload(ifp, true);
3894         }
3895         return err;
3896 }
3897
3898 static int brcmf_cfg80211_stop_ap(struct wiphy *wiphy, struct net_device *ndev)
3899 {
3900         struct brcmf_if *ifp = netdev_priv(ndev);
3901         s32 err;
3902         struct brcmf_fil_bss_enable_le bss_enable;
3903         struct brcmf_join_params join_params;
3904
3905         brcmf_dbg(TRACE, "Enter\n");
3906
3907         if (ifp->vif->wdev.iftype == NL80211_IFTYPE_AP) {
3908                 /* Due to most likely deauths outstanding we sleep */
3909                 /* first to make sure they get processed by fw. */
3910                 msleep(400);
3911
3912                 memset(&join_params, 0, sizeof(join_params));
3913                 err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_SSID,
3914                                              &join_params, sizeof(join_params));
3915                 if (err < 0)
3916                         brcmf_err("SET SSID error (%d)\n", err);
3917                 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_UP, 0);
3918                 if (err < 0)
3919                         brcmf_err("BRCMF_C_UP error %d\n", err);
3920                 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_AP, 0);
3921                 if (err < 0)
3922                         brcmf_err("setting AP mode failed %d\n", err);
3923                 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_INFRA, 0);
3924                 if (err < 0)
3925                         brcmf_err("setting INFRA mode failed %d\n", err);
3926         } else {
3927                 bss_enable.bsscfg_idx = cpu_to_le32(ifp->bssidx);
3928                 bss_enable.enable = cpu_to_le32(0);
3929                 err = brcmf_fil_iovar_data_set(ifp, "bss", &bss_enable,
3930                                                sizeof(bss_enable));
3931                 if (err < 0)
3932                         brcmf_err("bss_enable config failed %d\n", err);
3933         }
3934         brcmf_set_mpc(ifp, 1);
3935         brcmf_configure_arp_offload(ifp, true);
3936         set_bit(BRCMF_VIF_STATUS_AP_CREATING, &ifp->vif->sme_state);
3937         clear_bit(BRCMF_VIF_STATUS_AP_CREATED, &ifp->vif->sme_state);
3938
3939         return err;
3940 }
3941
3942 static s32
3943 brcmf_cfg80211_change_beacon(struct wiphy *wiphy, struct net_device *ndev,
3944                              struct cfg80211_beacon_data *info)
3945 {
3946         struct brcmf_if *ifp = netdev_priv(ndev);
3947         s32 err;
3948
3949         brcmf_dbg(TRACE, "Enter\n");
3950
3951         err = brcmf_config_ap_mgmt_ie(ifp->vif, info);
3952
3953         return err;
3954 }
3955
3956 static int
3957 brcmf_cfg80211_del_station(struct wiphy *wiphy, struct net_device *ndev,
3958                            const u8 *mac)
3959 {
3960         struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
3961         struct brcmf_scb_val_le scbval;
3962         struct brcmf_if *ifp = netdev_priv(ndev);
3963         s32 err;
3964
3965         if (!mac)
3966                 return -EFAULT;
3967
3968         brcmf_dbg(TRACE, "Enter %pM\n", mac);
3969
3970         if (ifp->vif == cfg->p2p.bss_idx[P2PAPI_BSSCFG_DEVICE].vif)
3971                 ifp = cfg->p2p.bss_idx[P2PAPI_BSSCFG_PRIMARY].vif->ifp;
3972         if (!check_vif_up(ifp->vif))
3973                 return -EIO;
3974
3975         memcpy(&scbval.ea, mac, ETH_ALEN);
3976         scbval.val = cpu_to_le32(WLAN_REASON_DEAUTH_LEAVING);
3977         err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SCB_DEAUTHENTICATE_FOR_REASON,
3978                                      &scbval, sizeof(scbval));
3979         if (err)
3980                 brcmf_err("SCB_DEAUTHENTICATE_FOR_REASON failed %d\n", err);
3981
3982         brcmf_dbg(TRACE, "Exit\n");
3983         return err;
3984 }
3985
3986
3987 static void
3988 brcmf_cfg80211_mgmt_frame_register(struct wiphy *wiphy,
3989                                    struct wireless_dev *wdev,
3990                                    u16 frame_type, bool reg)
3991 {
3992         struct brcmf_cfg80211_vif *vif;
3993         u16 mgmt_type;
3994
3995         brcmf_dbg(TRACE, "Enter, frame_type %04x, reg=%d\n", frame_type, reg);
3996
3997         mgmt_type = (frame_type & IEEE80211_FCTL_STYPE) >> 4;
3998         vif = container_of(wdev, struct brcmf_cfg80211_vif, wdev);
3999         if (reg)
4000                 vif->mgmt_rx_reg |= BIT(mgmt_type);
4001         else
4002                 vif->mgmt_rx_reg &= ~BIT(mgmt_type);
4003 }
4004
4005
4006 static int
4007 brcmf_cfg80211_mgmt_tx(struct wiphy *wiphy, struct wireless_dev *wdev,
4008                        struct cfg80211_mgmt_tx_params *params, u64 *cookie)
4009 {
4010         struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
4011         struct ieee80211_channel *chan = params->chan;
4012         const u8 *buf = params->buf;
4013         size_t len = params->len;
4014         const struct ieee80211_mgmt *mgmt;
4015         struct brcmf_cfg80211_vif *vif;
4016         s32 err = 0;
4017         s32 ie_offset;
4018         s32 ie_len;
4019         struct brcmf_fil_action_frame_le *action_frame;
4020         struct brcmf_fil_af_params_le *af_params;
4021         bool ack;
4022         s32 chan_nr;
4023         u32 freq;
4024
4025         brcmf_dbg(TRACE, "Enter\n");
4026
4027         *cookie = 0;
4028
4029         mgmt = (const struct ieee80211_mgmt *)buf;
4030
4031         if (!ieee80211_is_mgmt(mgmt->frame_control)) {
4032                 brcmf_err("Driver only allows MGMT packet type\n");
4033                 return -EPERM;
4034         }
4035
4036         vif = container_of(wdev, struct brcmf_cfg80211_vif, wdev);
4037
4038         if (ieee80211_is_probe_resp(mgmt->frame_control)) {
4039                 /* Right now the only reason to get a probe response */
4040                 /* is for p2p listen response or for p2p GO from     */
4041                 /* wpa_supplicant. Unfortunately the probe is send   */
4042                 /* on primary ndev, while dongle wants it on the p2p */
4043                 /* vif. Since this is only reason for a probe        */
4044                 /* response to be sent, the vif is taken from cfg.   */
4045                 /* If ever desired to send proberesp for non p2p     */
4046                 /* response then data should be checked for          */
4047                 /* "DIRECT-". Note in future supplicant will take    */
4048                 /* dedicated p2p wdev to do this and then this 'hack'*/
4049                 /* is not needed anymore.                            */
4050                 ie_offset =  DOT11_MGMT_HDR_LEN +
4051                              DOT11_BCN_PRB_FIXED_LEN;
4052                 ie_len = len - ie_offset;
4053                 if (vif == cfg->p2p.bss_idx[P2PAPI_BSSCFG_PRIMARY].vif)
4054                         vif = cfg->p2p.bss_idx[P2PAPI_BSSCFG_DEVICE].vif;
4055                 err = brcmf_vif_set_mgmt_ie(vif,
4056                                             BRCMF_VNDR_IE_PRBRSP_FLAG,
4057                                             &buf[ie_offset],
4058                                             ie_len);
4059                 cfg80211_mgmt_tx_status(wdev, *cookie, buf, len, true,
4060                                         GFP_KERNEL);
4061         } else if (ieee80211_is_action(mgmt->frame_control)) {
4062                 af_params = kzalloc(sizeof(*af_params), GFP_KERNEL);
4063                 if (af_params == NULL) {
4064                         brcmf_err("unable to allocate frame\n");
4065                         err = -ENOMEM;
4066                         goto exit;
4067                 }
4068                 action_frame = &af_params->action_frame;
4069                 /* Add the packet Id */
4070                 action_frame->packet_id = cpu_to_le32(*cookie);
4071                 /* Add BSSID */
4072                 memcpy(&action_frame->da[0], &mgmt->da[0], ETH_ALEN);
4073                 memcpy(&af_params->bssid[0], &mgmt->bssid[0], ETH_ALEN);
4074                 /* Add the length exepted for 802.11 header  */
4075                 action_frame->len = cpu_to_le16(len - DOT11_MGMT_HDR_LEN);
4076                 /* Add the channel. Use the one specified as parameter if any or
4077                  * the current one (got from the firmware) otherwise
4078                  */
4079                 if (chan)
4080                         freq = chan->center_freq;
4081                 else
4082                         brcmf_fil_cmd_int_get(vif->ifp, BRCMF_C_GET_CHANNEL,
4083                                               &freq);
4084                 chan_nr = ieee80211_frequency_to_channel(freq);
4085                 af_params->channel = cpu_to_le32(chan_nr);
4086
4087                 memcpy(action_frame->data, &buf[DOT11_MGMT_HDR_LEN],
4088                        le16_to_cpu(action_frame->len));
4089
4090                 brcmf_dbg(TRACE, "Action frame, cookie=%lld, len=%d, freq=%d\n",
4091                           *cookie, le16_to_cpu(action_frame->len), freq);
4092
4093                 ack = brcmf_p2p_send_action_frame(cfg, cfg_to_ndev(cfg),
4094                                                   af_params);
4095
4096                 cfg80211_mgmt_tx_status(wdev, *cookie, buf, len, ack,
4097                                         GFP_KERNEL);
4098                 kfree(af_params);
4099         } else {
4100                 brcmf_dbg(TRACE, "Unhandled, fc=%04x!!\n", mgmt->frame_control);
4101                 brcmf_dbg_hex_dump(true, buf, len, "payload, len=%Zu\n", len);
4102         }
4103
4104 exit:
4105         return err;
4106 }
4107
4108
4109 static int
4110 brcmf_cfg80211_cancel_remain_on_channel(struct wiphy *wiphy,
4111                                         struct wireless_dev *wdev,
4112                                         u64 cookie)
4113 {
4114         struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
4115         struct brcmf_cfg80211_vif *vif;
4116         int err = 0;
4117
4118         brcmf_dbg(TRACE, "Enter p2p listen cancel\n");
4119
4120         vif = cfg->p2p.bss_idx[P2PAPI_BSSCFG_DEVICE].vif;
4121         if (vif == NULL) {
4122                 brcmf_err("No p2p device available for probe response\n");
4123                 err = -ENODEV;
4124                 goto exit;
4125         }
4126         brcmf_p2p_cancel_remain_on_channel(vif->ifp);
4127 exit:
4128         return err;
4129 }
4130
4131 static int brcmf_cfg80211_crit_proto_start(struct wiphy *wiphy,
4132                                            struct wireless_dev *wdev,
4133                                            enum nl80211_crit_proto_id proto,
4134                                            u16 duration)
4135 {
4136         struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
4137         struct brcmf_cfg80211_vif *vif;
4138
4139         vif = container_of(wdev, struct brcmf_cfg80211_vif, wdev);
4140
4141         /* only DHCP support for now */
4142         if (proto != NL80211_CRIT_PROTO_DHCP)
4143                 return -EINVAL;
4144
4145         /* suppress and abort scanning */
4146         set_bit(BRCMF_SCAN_STATUS_SUPPRESS, &cfg->scan_status);
4147         brcmf_abort_scanning(cfg);
4148
4149         return brcmf_btcoex_set_mode(vif, BRCMF_BTCOEX_DISABLED, duration);
4150 }
4151
4152 static void brcmf_cfg80211_crit_proto_stop(struct wiphy *wiphy,
4153                                            struct wireless_dev *wdev)
4154 {
4155         struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
4156         struct brcmf_cfg80211_vif *vif;
4157
4158         vif = container_of(wdev, struct brcmf_cfg80211_vif, wdev);
4159
4160         brcmf_btcoex_set_mode(vif, BRCMF_BTCOEX_ENABLED, 0);
4161         clear_bit(BRCMF_SCAN_STATUS_SUPPRESS, &cfg->scan_status);
4162 }
4163
4164 static s32
4165 brcmf_notify_tdls_peer_event(struct brcmf_if *ifp,
4166                              const struct brcmf_event_msg *e, void *data)
4167 {
4168         switch (e->reason) {
4169         case BRCMF_E_REASON_TDLS_PEER_DISCOVERED:
4170                 brcmf_dbg(TRACE, "TDLS Peer Discovered\n");
4171                 break;
4172         case BRCMF_E_REASON_TDLS_PEER_CONNECTED:
4173                 brcmf_dbg(TRACE, "TDLS Peer Connected\n");
4174                 brcmf_proto_add_tdls_peer(ifp->drvr, ifp->ifidx, (u8 *)e->addr);
4175                 break;
4176         case BRCMF_E_REASON_TDLS_PEER_DISCONNECTED:
4177                 brcmf_dbg(TRACE, "TDLS Peer Disconnected\n");
4178                 brcmf_proto_delete_peer(ifp->drvr, ifp->ifidx, (u8 *)e->addr);
4179                 break;
4180         }
4181
4182         return 0;
4183 }
4184
4185 static int brcmf_convert_nl80211_tdls_oper(enum nl80211_tdls_operation oper)
4186 {
4187         int ret;
4188
4189         switch (oper) {
4190         case NL80211_TDLS_DISCOVERY_REQ:
4191                 ret = BRCMF_TDLS_MANUAL_EP_DISCOVERY;
4192                 break;
4193         case NL80211_TDLS_SETUP:
4194                 ret = BRCMF_TDLS_MANUAL_EP_CREATE;
4195                 break;
4196         case NL80211_TDLS_TEARDOWN:
4197                 ret = BRCMF_TDLS_MANUAL_EP_DELETE;
4198                 break;
4199         default:
4200                 brcmf_err("unsupported operation: %d\n", oper);
4201                 ret = -EOPNOTSUPP;
4202         }
4203         return ret;
4204 }
4205
4206 static int brcmf_cfg80211_tdls_oper(struct wiphy *wiphy,
4207                                     struct net_device *ndev, const u8 *peer,
4208                                     enum nl80211_tdls_operation oper)
4209 {
4210         struct brcmf_if *ifp;
4211         struct brcmf_tdls_iovar_le info;
4212         int ret = 0;
4213
4214         ret = brcmf_convert_nl80211_tdls_oper(oper);
4215         if (ret < 0)
4216                 return ret;
4217
4218         ifp = netdev_priv(ndev);
4219         memset(&info, 0, sizeof(info));
4220         info.mode = (u8)ret;
4221         if (peer)
4222                 memcpy(info.ea, peer, ETH_ALEN);
4223
4224         ret = brcmf_fil_iovar_data_set(ifp, "tdls_endpoint",
4225                                        &info, sizeof(info));
4226         if (ret < 0)
4227                 brcmf_err("tdls_endpoint iovar failed: ret=%d\n", ret);
4228
4229         return ret;
4230 }
4231
4232 static struct cfg80211_ops wl_cfg80211_ops = {
4233         .add_virtual_intf = brcmf_cfg80211_add_iface,
4234         .del_virtual_intf = brcmf_cfg80211_del_iface,
4235         .change_virtual_intf = brcmf_cfg80211_change_iface,
4236         .scan = brcmf_cfg80211_scan,
4237         .set_wiphy_params = brcmf_cfg80211_set_wiphy_params,
4238         .join_ibss = brcmf_cfg80211_join_ibss,
4239         .leave_ibss = brcmf_cfg80211_leave_ibss,
4240         .get_station = brcmf_cfg80211_get_station,
4241         .set_tx_power = brcmf_cfg80211_set_tx_power,
4242         .get_tx_power = brcmf_cfg80211_get_tx_power,
4243         .add_key = brcmf_cfg80211_add_key,
4244         .del_key = brcmf_cfg80211_del_key,
4245         .get_key = brcmf_cfg80211_get_key,
4246         .set_default_key = brcmf_cfg80211_config_default_key,
4247         .set_default_mgmt_key = brcmf_cfg80211_config_default_mgmt_key,
4248         .set_power_mgmt = brcmf_cfg80211_set_power_mgmt,
4249         .connect = brcmf_cfg80211_connect,
4250         .disconnect = brcmf_cfg80211_disconnect,
4251         .suspend = brcmf_cfg80211_suspend,
4252         .resume = brcmf_cfg80211_resume,
4253         .set_pmksa = brcmf_cfg80211_set_pmksa,
4254         .del_pmksa = brcmf_cfg80211_del_pmksa,
4255         .flush_pmksa = brcmf_cfg80211_flush_pmksa,
4256         .start_ap = brcmf_cfg80211_start_ap,
4257         .stop_ap = brcmf_cfg80211_stop_ap,
4258         .change_beacon = brcmf_cfg80211_change_beacon,
4259         .del_station = brcmf_cfg80211_del_station,
4260         .sched_scan_start = brcmf_cfg80211_sched_scan_start,
4261         .sched_scan_stop = brcmf_cfg80211_sched_scan_stop,
4262         .mgmt_frame_register = brcmf_cfg80211_mgmt_frame_register,
4263         .mgmt_tx = brcmf_cfg80211_mgmt_tx,
4264         .remain_on_channel = brcmf_p2p_remain_on_channel,
4265         .cancel_remain_on_channel = brcmf_cfg80211_cancel_remain_on_channel,
4266         .start_p2p_device = brcmf_p2p_start_device,
4267         .stop_p2p_device = brcmf_p2p_stop_device,
4268         .crit_proto_start = brcmf_cfg80211_crit_proto_start,
4269         .crit_proto_stop = brcmf_cfg80211_crit_proto_stop,
4270         .tdls_oper = brcmf_cfg80211_tdls_oper,
4271 };
4272
4273 struct brcmf_cfg80211_vif *brcmf_alloc_vif(struct brcmf_cfg80211_info *cfg,
4274                                            enum nl80211_iftype type,
4275                                            bool pm_block)
4276 {
4277         struct brcmf_cfg80211_vif *vif;
4278
4279         brcmf_dbg(TRACE, "allocating virtual interface (size=%zu)\n",
4280                   sizeof(*vif));
4281         vif = kzalloc(sizeof(*vif), GFP_KERNEL);
4282         if (!vif)
4283                 return ERR_PTR(-ENOMEM);
4284
4285         vif->wdev.wiphy = cfg->wiphy;
4286         vif->wdev.iftype = type;
4287
4288         vif->pm_block = pm_block;
4289         vif->roam_off = -1;
4290
4291         brcmf_init_prof(&vif->profile);
4292
4293         list_add_tail(&vif->list, &cfg->vif_list);
4294         return vif;
4295 }
4296
4297 void brcmf_free_vif(struct brcmf_cfg80211_vif *vif)
4298 {
4299         list_del(&vif->list);
4300         kfree(vif);
4301 }
4302
4303 void brcmf_cfg80211_free_netdev(struct net_device *ndev)
4304 {
4305         struct brcmf_cfg80211_vif *vif;
4306         struct brcmf_if *ifp;
4307
4308         ifp = netdev_priv(ndev);
4309         vif = ifp->vif;
4310
4311         brcmf_free_vif(vif);
4312         free_netdev(ndev);
4313 }
4314
4315 static bool brcmf_is_linkup(const struct brcmf_event_msg *e)
4316 {
4317         u32 event = e->event_code;
4318         u32 status = e->status;
4319
4320         if (event == BRCMF_E_SET_SSID && status == BRCMF_E_STATUS_SUCCESS) {
4321                 brcmf_dbg(CONN, "Processing set ssid\n");
4322                 return true;
4323         }
4324
4325         return false;
4326 }
4327
4328 static bool brcmf_is_linkdown(const struct brcmf_event_msg *e)
4329 {
4330         u32 event = e->event_code;
4331         u16 flags = e->flags;
4332
4333         if ((event == BRCMF_E_DEAUTH) || (event == BRCMF_E_DEAUTH_IND) ||
4334             (event == BRCMF_E_DISASSOC_IND) ||
4335             ((event == BRCMF_E_LINK) && (!(flags & BRCMF_EVENT_MSG_LINK)))) {
4336                 brcmf_dbg(CONN, "Processing link down\n");
4337                 return true;
4338         }
4339         return false;
4340 }
4341
4342 static bool brcmf_is_nonetwork(struct brcmf_cfg80211_info *cfg,
4343                                const struct brcmf_event_msg *e)
4344 {
4345         u32 event = e->event_code;
4346         u32 status = e->status;
4347
4348         if (event == BRCMF_E_LINK && status == BRCMF_E_STATUS_NO_NETWORKS) {
4349                 brcmf_dbg(CONN, "Processing Link %s & no network found\n",
4350                           e->flags & BRCMF_EVENT_MSG_LINK ? "up" : "down");
4351                 return true;
4352         }
4353
4354         if (event == BRCMF_E_SET_SSID && status != BRCMF_E_STATUS_SUCCESS) {
4355                 brcmf_dbg(CONN, "Processing connecting & no network found\n");
4356                 return true;
4357         }
4358
4359         return false;
4360 }
4361
4362 static void brcmf_clear_assoc_ies(struct brcmf_cfg80211_info *cfg)
4363 {
4364         struct brcmf_cfg80211_connect_info *conn_info = cfg_to_conn(cfg);
4365
4366         kfree(conn_info->req_ie);
4367         conn_info->req_ie = NULL;
4368         conn_info->req_ie_len = 0;
4369         kfree(conn_info->resp_ie);
4370         conn_info->resp_ie = NULL;
4371         conn_info->resp_ie_len = 0;
4372 }
4373
4374 static s32 brcmf_get_assoc_ies(struct brcmf_cfg80211_info *cfg,
4375                                struct brcmf_if *ifp)
4376 {
4377         struct brcmf_cfg80211_assoc_ielen_le *assoc_info;
4378         struct brcmf_cfg80211_connect_info *conn_info = cfg_to_conn(cfg);
4379         u32 req_len;
4380         u32 resp_len;
4381         s32 err = 0;
4382
4383         brcmf_clear_assoc_ies(cfg);
4384
4385         err = brcmf_fil_iovar_data_get(ifp, "assoc_info",
4386                                        cfg->extra_buf, WL_ASSOC_INFO_MAX);
4387         if (err) {
4388                 brcmf_err("could not get assoc info (%d)\n", err);
4389                 return err;
4390         }
4391         assoc_info =
4392                 (struct brcmf_cfg80211_assoc_ielen_le *)cfg->extra_buf;
4393         req_len = le32_to_cpu(assoc_info->req_len);
4394         resp_len = le32_to_cpu(assoc_info->resp_len);
4395         if (req_len) {
4396                 err = brcmf_fil_iovar_data_get(ifp, "assoc_req_ies",
4397                                                cfg->extra_buf,
4398                                                WL_ASSOC_INFO_MAX);
4399                 if (err) {
4400                         brcmf_err("could not get assoc req (%d)\n", err);
4401                         return err;
4402                 }
4403                 conn_info->req_ie_len = req_len;
4404                 conn_info->req_ie =
4405                     kmemdup(cfg->extra_buf, conn_info->req_ie_len,
4406                             GFP_KERNEL);
4407         } else {
4408                 conn_info->req_ie_len = 0;
4409                 conn_info->req_ie = NULL;
4410         }
4411         if (resp_len) {
4412                 err = brcmf_fil_iovar_data_get(ifp, "assoc_resp_ies",
4413                                                cfg->extra_buf,
4414                                                WL_ASSOC_INFO_MAX);
4415                 if (err) {
4416                         brcmf_err("could not get assoc resp (%d)\n", err);
4417                         return err;
4418                 }
4419                 conn_info->resp_ie_len = resp_len;
4420                 conn_info->resp_ie =
4421                     kmemdup(cfg->extra_buf, conn_info->resp_ie_len,
4422                             GFP_KERNEL);
4423         } else {
4424                 conn_info->resp_ie_len = 0;
4425                 conn_info->resp_ie = NULL;
4426         }
4427         brcmf_dbg(CONN, "req len (%d) resp len (%d)\n",
4428                   conn_info->req_ie_len, conn_info->resp_ie_len);
4429
4430         return err;
4431 }
4432
4433 static s32
4434 brcmf_bss_roaming_done(struct brcmf_cfg80211_info *cfg,
4435                        struct net_device *ndev,
4436                        const struct brcmf_event_msg *e)
4437 {
4438         struct brcmf_if *ifp = netdev_priv(ndev);
4439         struct brcmf_cfg80211_profile *profile = &ifp->vif->profile;
4440         struct brcmf_cfg80211_connect_info *conn_info = cfg_to_conn(cfg);
4441         struct wiphy *wiphy = cfg_to_wiphy(cfg);
4442         struct ieee80211_channel *notify_channel = NULL;
4443         struct ieee80211_supported_band *band;
4444         struct brcmf_bss_info_le *bi;
4445         struct brcmu_chan ch;
4446         u32 freq;
4447         s32 err = 0;
4448         u8 *buf;
4449
4450         brcmf_dbg(TRACE, "Enter\n");
4451
4452         brcmf_get_assoc_ies(cfg, ifp);
4453         memcpy(profile->bssid, e->addr, ETH_ALEN);
4454         brcmf_update_bss_info(cfg, ifp);
4455
4456         buf = kzalloc(WL_BSS_INFO_MAX, GFP_KERNEL);
4457         if (buf == NULL) {
4458                 err = -ENOMEM;
4459                 goto done;
4460         }
4461
4462         /* data sent to dongle has to be little endian */
4463         *(__le32 *)buf = cpu_to_le32(WL_BSS_INFO_MAX);
4464         err = brcmf_fil_cmd_data_get(ifp, BRCMF_C_GET_BSS_INFO,
4465                                      buf, WL_BSS_INFO_MAX);
4466
4467         if (err)
4468                 goto done;
4469
4470         bi = (struct brcmf_bss_info_le *)(buf + 4);
4471         ch.chspec = le16_to_cpu(bi->chanspec);
4472         cfg->d11inf.decchspec(&ch);
4473
4474         if (ch.band == BRCMU_CHAN_BAND_2G)
4475                 band = wiphy->bands[IEEE80211_BAND_2GHZ];
4476         else
4477                 band = wiphy->bands[IEEE80211_BAND_5GHZ];
4478
4479         freq = ieee80211_channel_to_frequency(ch.chnum, band->band);
4480         notify_channel = ieee80211_get_channel(wiphy, freq);
4481
4482 done:
4483         kfree(buf);
4484         cfg80211_roamed(ndev, notify_channel, (u8 *)profile->bssid,
4485                         conn_info->req_ie, conn_info->req_ie_len,
4486                         conn_info->resp_ie, conn_info->resp_ie_len, GFP_KERNEL);
4487         brcmf_dbg(CONN, "Report roaming result\n");
4488
4489         set_bit(BRCMF_VIF_STATUS_CONNECTED, &ifp->vif->sme_state);
4490         brcmf_dbg(TRACE, "Exit\n");
4491         return err;
4492 }
4493
4494 static s32
4495 brcmf_bss_connect_done(struct brcmf_cfg80211_info *cfg,
4496                        struct net_device *ndev, const struct brcmf_event_msg *e,
4497                        bool completed)
4498 {
4499         struct brcmf_if *ifp = netdev_priv(ndev);
4500         struct brcmf_cfg80211_profile *profile = &ifp->vif->profile;
4501         struct brcmf_cfg80211_connect_info *conn_info = cfg_to_conn(cfg);
4502
4503         brcmf_dbg(TRACE, "Enter\n");
4504
4505         if (test_and_clear_bit(BRCMF_VIF_STATUS_CONNECTING,
4506                                &ifp->vif->sme_state)) {
4507                 if (completed) {
4508                         brcmf_get_assoc_ies(cfg, ifp);
4509                         memcpy(profile->bssid, e->addr, ETH_ALEN);
4510                         brcmf_update_bss_info(cfg, ifp);
4511                         set_bit(BRCMF_VIF_STATUS_CONNECTED,
4512                                 &ifp->vif->sme_state);
4513                 }
4514                 cfg80211_connect_result(ndev,
4515                                         (u8 *)profile->bssid,
4516                                         conn_info->req_ie,
4517                                         conn_info->req_ie_len,
4518                                         conn_info->resp_ie,
4519                                         conn_info->resp_ie_len,
4520                                         completed ? WLAN_STATUS_SUCCESS :
4521                                                     WLAN_STATUS_AUTH_TIMEOUT,
4522                                         GFP_KERNEL);
4523                 brcmf_dbg(CONN, "Report connect result - connection %s\n",
4524                           completed ? "succeeded" : "failed");
4525         }
4526         brcmf_dbg(TRACE, "Exit\n");
4527         return 0;
4528 }
4529
4530 static s32
4531 brcmf_notify_connect_status_ap(struct brcmf_cfg80211_info *cfg,
4532                                struct net_device *ndev,
4533                                const struct brcmf_event_msg *e, void *data)
4534 {
4535         static int generation;
4536         u32 event = e->event_code;
4537         u32 reason = e->reason;
4538         struct station_info sinfo;
4539
4540         brcmf_dbg(CONN, "event %d, reason %d\n", event, reason);
4541         if (event == BRCMF_E_LINK && reason == BRCMF_E_REASON_LINK_BSSCFG_DIS &&
4542             ndev != cfg_to_ndev(cfg)) {
4543                 brcmf_dbg(CONN, "AP mode link down\n");
4544                 complete(&cfg->vif_disabled);
4545                 return 0;
4546         }
4547
4548         if (((event == BRCMF_E_ASSOC_IND) || (event == BRCMF_E_REASSOC_IND)) &&
4549             (reason == BRCMF_E_STATUS_SUCCESS)) {
4550                 memset(&sinfo, 0, sizeof(sinfo));
4551                 sinfo.filled = STATION_INFO_ASSOC_REQ_IES;
4552                 if (!data) {
4553                         brcmf_err("No IEs present in ASSOC/REASSOC_IND");
4554                         return -EINVAL;
4555                 }
4556                 sinfo.assoc_req_ies = data;
4557                 sinfo.assoc_req_ies_len = e->datalen;
4558                 generation++;
4559                 sinfo.generation = generation;
4560                 cfg80211_new_sta(ndev, e->addr, &sinfo, GFP_KERNEL);
4561         } else if ((event == BRCMF_E_DISASSOC_IND) ||
4562                    (event == BRCMF_E_DEAUTH_IND) ||
4563                    (event == BRCMF_E_DEAUTH)) {
4564                 cfg80211_del_sta(ndev, e->addr, GFP_KERNEL);
4565         }
4566         return 0;
4567 }
4568
4569 static s32
4570 brcmf_notify_connect_status(struct brcmf_if *ifp,
4571                             const struct brcmf_event_msg *e, void *data)
4572 {
4573         struct brcmf_cfg80211_info *cfg = ifp->drvr->config;
4574         struct net_device *ndev = ifp->ndev;
4575         struct brcmf_cfg80211_profile *profile = &ifp->vif->profile;
4576         struct ieee80211_channel *chan;
4577         s32 err = 0;
4578
4579         if ((e->event_code == BRCMF_E_DEAUTH) ||
4580             (e->event_code == BRCMF_E_DEAUTH_IND) ||
4581             (e->event_code == BRCMF_E_DISASSOC_IND) ||
4582             ((e->event_code == BRCMF_E_LINK) && (!e->flags))) {
4583                 brcmf_proto_delete_peer(ifp->drvr, ifp->ifidx, (u8 *)e->addr);
4584         }
4585
4586         if (brcmf_is_apmode(ifp->vif)) {
4587                 err = brcmf_notify_connect_status_ap(cfg, ndev, e, data);
4588         } else if (brcmf_is_linkup(e)) {
4589                 brcmf_dbg(CONN, "Linkup\n");
4590                 if (brcmf_is_ibssmode(ifp->vif)) {
4591                         chan = ieee80211_get_channel(cfg->wiphy, cfg->channel);
4592                         memcpy(profile->bssid, e->addr, ETH_ALEN);
4593                         wl_inform_ibss(cfg, ndev, e->addr);
4594                         cfg80211_ibss_joined(ndev, e->addr, chan, GFP_KERNEL);
4595                         clear_bit(BRCMF_VIF_STATUS_CONNECTING,
4596                                   &ifp->vif->sme_state);
4597                         set_bit(BRCMF_VIF_STATUS_CONNECTED,
4598                                 &ifp->vif->sme_state);
4599                 } else
4600                         brcmf_bss_connect_done(cfg, ndev, e, true);
4601         } else if (brcmf_is_linkdown(e)) {
4602                 brcmf_dbg(CONN, "Linkdown\n");
4603                 if (!brcmf_is_ibssmode(ifp->vif)) {
4604                         brcmf_bss_connect_done(cfg, ndev, e, false);
4605                 }
4606                 brcmf_link_down(ifp->vif);
4607                 brcmf_init_prof(ndev_to_prof(ndev));
4608                 if (ndev != cfg_to_ndev(cfg))
4609                         complete(&cfg->vif_disabled);
4610         } else if (brcmf_is_nonetwork(cfg, e)) {
4611                 if (brcmf_is_ibssmode(ifp->vif))
4612                         clear_bit(BRCMF_VIF_STATUS_CONNECTING,
4613                                   &ifp->vif->sme_state);
4614                 else
4615                         brcmf_bss_connect_done(cfg, ndev, e, false);
4616         }
4617
4618         return err;
4619 }
4620
4621 static s32
4622 brcmf_notify_roaming_status(struct brcmf_if *ifp,
4623                             const struct brcmf_event_msg *e, void *data)
4624 {
4625         struct brcmf_cfg80211_info *cfg = ifp->drvr->config;
4626         u32 event = e->event_code;
4627         u32 status = e->status;
4628
4629         if (event == BRCMF_E_ROAM && status == BRCMF_E_STATUS_SUCCESS) {
4630                 if (test_bit(BRCMF_VIF_STATUS_CONNECTED, &ifp->vif->sme_state))
4631                         brcmf_bss_roaming_done(cfg, ifp->ndev, e);
4632                 else
4633                         brcmf_bss_connect_done(cfg, ifp->ndev, e, true);
4634         }
4635
4636         return 0;
4637 }
4638
4639 static s32
4640 brcmf_notify_mic_status(struct brcmf_if *ifp,
4641                         const struct brcmf_event_msg *e, void *data)
4642 {
4643         u16 flags = e->flags;
4644         enum nl80211_key_type key_type;
4645
4646         if (flags & BRCMF_EVENT_MSG_GROUP)
4647                 key_type = NL80211_KEYTYPE_GROUP;
4648         else
4649                 key_type = NL80211_KEYTYPE_PAIRWISE;
4650
4651         cfg80211_michael_mic_failure(ifp->ndev, (u8 *)&e->addr, key_type, -1,
4652                                      NULL, GFP_KERNEL);
4653
4654         return 0;
4655 }
4656
4657 static s32 brcmf_notify_vif_event(struct brcmf_if *ifp,
4658                                   const struct brcmf_event_msg *e, void *data)
4659 {
4660         struct brcmf_cfg80211_info *cfg = ifp->drvr->config;
4661         struct brcmf_if_event *ifevent = (struct brcmf_if_event *)data;
4662         struct brcmf_cfg80211_vif_event *event = &cfg->vif_event;
4663         struct brcmf_cfg80211_vif *vif;
4664
4665         brcmf_dbg(TRACE, "Enter: action %u flags %u ifidx %u bsscfg %u\n",
4666                   ifevent->action, ifevent->flags, ifevent->ifidx,
4667                   ifevent->bssidx);
4668
4669         mutex_lock(&event->vif_event_lock);
4670         event->action = ifevent->action;
4671         vif = event->vif;
4672
4673         switch (ifevent->action) {
4674         case BRCMF_E_IF_ADD:
4675                 /* waiting process may have timed out */
4676                 if (!cfg->vif_event.vif) {
4677                         mutex_unlock(&event->vif_event_lock);
4678                         return -EBADF;
4679                 }
4680
4681                 ifp->vif = vif;
4682                 vif->ifp = ifp;
4683                 if (ifp->ndev) {
4684                         vif->wdev.netdev = ifp->ndev;
4685                         ifp->ndev->ieee80211_ptr = &vif->wdev;
4686                         SET_NETDEV_DEV(ifp->ndev, wiphy_dev(cfg->wiphy));
4687                 }
4688                 mutex_unlock(&event->vif_event_lock);
4689                 wake_up(&event->vif_wq);
4690                 return 0;
4691
4692         case BRCMF_E_IF_DEL:
4693                 mutex_unlock(&event->vif_event_lock);
4694                 /* event may not be upon user request */
4695                 if (brcmf_cfg80211_vif_event_armed(cfg))
4696                         wake_up(&event->vif_wq);
4697                 return 0;
4698
4699         case BRCMF_E_IF_CHANGE:
4700                 mutex_unlock(&event->vif_event_lock);
4701                 wake_up(&event->vif_wq);
4702                 return 0;
4703
4704         default:
4705                 mutex_unlock(&event->vif_event_lock);
4706                 break;
4707         }
4708         return -EINVAL;
4709 }
4710
4711 static void brcmf_init_conf(struct brcmf_cfg80211_conf *conf)
4712 {
4713         conf->frag_threshold = (u32)-1;
4714         conf->rts_threshold = (u32)-1;
4715         conf->retry_short = (u32)-1;
4716         conf->retry_long = (u32)-1;
4717         conf->tx_power = -1;
4718 }
4719
4720 static void brcmf_register_event_handlers(struct brcmf_cfg80211_info *cfg)
4721 {
4722         brcmf_fweh_register(cfg->pub, BRCMF_E_LINK,
4723                             brcmf_notify_connect_status);
4724         brcmf_fweh_register(cfg->pub, BRCMF_E_DEAUTH_IND,
4725                             brcmf_notify_connect_status);
4726         brcmf_fweh_register(cfg->pub, BRCMF_E_DEAUTH,
4727                             brcmf_notify_connect_status);
4728         brcmf_fweh_register(cfg->pub, BRCMF_E_DISASSOC_IND,
4729                             brcmf_notify_connect_status);
4730         brcmf_fweh_register(cfg->pub, BRCMF_E_ASSOC_IND,
4731                             brcmf_notify_connect_status);
4732         brcmf_fweh_register(cfg->pub, BRCMF_E_REASSOC_IND,
4733                             brcmf_notify_connect_status);
4734         brcmf_fweh_register(cfg->pub, BRCMF_E_ROAM,
4735                             brcmf_notify_roaming_status);
4736         brcmf_fweh_register(cfg->pub, BRCMF_E_MIC_ERROR,
4737                             brcmf_notify_mic_status);
4738         brcmf_fweh_register(cfg->pub, BRCMF_E_SET_SSID,
4739                             brcmf_notify_connect_status);
4740         brcmf_fweh_register(cfg->pub, BRCMF_E_PFN_NET_FOUND,
4741                             brcmf_notify_sched_scan_results);
4742         brcmf_fweh_register(cfg->pub, BRCMF_E_IF,
4743                             brcmf_notify_vif_event);
4744         brcmf_fweh_register(cfg->pub, BRCMF_E_P2P_PROBEREQ_MSG,
4745                             brcmf_p2p_notify_rx_mgmt_p2p_probereq);
4746         brcmf_fweh_register(cfg->pub, BRCMF_E_P2P_DISC_LISTEN_COMPLETE,
4747                             brcmf_p2p_notify_listen_complete);
4748         brcmf_fweh_register(cfg->pub, BRCMF_E_ACTION_FRAME_RX,
4749                             brcmf_p2p_notify_action_frame_rx);
4750         brcmf_fweh_register(cfg->pub, BRCMF_E_ACTION_FRAME_COMPLETE,
4751                             brcmf_p2p_notify_action_tx_complete);
4752         brcmf_fweh_register(cfg->pub, BRCMF_E_ACTION_FRAME_OFF_CHAN_COMPLETE,
4753                             brcmf_p2p_notify_action_tx_complete);
4754 }
4755
4756 static void brcmf_deinit_priv_mem(struct brcmf_cfg80211_info *cfg)
4757 {
4758         kfree(cfg->conf);
4759         cfg->conf = NULL;
4760         kfree(cfg->escan_ioctl_buf);
4761         cfg->escan_ioctl_buf = NULL;
4762         kfree(cfg->extra_buf);
4763         cfg->extra_buf = NULL;
4764         kfree(cfg->pmk_list);
4765         cfg->pmk_list = NULL;
4766 }
4767
4768 static s32 brcmf_init_priv_mem(struct brcmf_cfg80211_info *cfg)
4769 {
4770         cfg->conf = kzalloc(sizeof(*cfg->conf), GFP_KERNEL);
4771         if (!cfg->conf)
4772                 goto init_priv_mem_out;
4773         cfg->escan_ioctl_buf = kzalloc(BRCMF_DCMD_MEDLEN, GFP_KERNEL);
4774         if (!cfg->escan_ioctl_buf)
4775                 goto init_priv_mem_out;
4776         cfg->extra_buf = kzalloc(WL_EXTRA_BUF_MAX, GFP_KERNEL);
4777         if (!cfg->extra_buf)
4778                 goto init_priv_mem_out;
4779         cfg->pmk_list = kzalloc(sizeof(*cfg->pmk_list), GFP_KERNEL);
4780         if (!cfg->pmk_list)
4781                 goto init_priv_mem_out;
4782
4783         return 0;
4784
4785 init_priv_mem_out:
4786         brcmf_deinit_priv_mem(cfg);
4787
4788         return -ENOMEM;
4789 }
4790
4791 static s32 wl_init_priv(struct brcmf_cfg80211_info *cfg)
4792 {
4793         s32 err = 0;
4794
4795         cfg->scan_request = NULL;
4796         cfg->pwr_save = true;
4797         cfg->active_scan = true;        /* we do active scan per default */
4798         cfg->dongle_up = false;         /* dongle is not up yet */
4799         err = brcmf_init_priv_mem(cfg);
4800         if (err)
4801                 return err;
4802         brcmf_register_event_handlers(cfg);
4803         mutex_init(&cfg->usr_sync);
4804         brcmf_init_escan(cfg);
4805         brcmf_init_conf(cfg->conf);
4806         init_completion(&cfg->vif_disabled);
4807         return err;
4808 }
4809
4810 static void wl_deinit_priv(struct brcmf_cfg80211_info *cfg)
4811 {
4812         cfg->dongle_up = false; /* dongle down */
4813         brcmf_abort_scanning(cfg);
4814         brcmf_deinit_priv_mem(cfg);
4815 }
4816
4817 static void init_vif_event(struct brcmf_cfg80211_vif_event *event)
4818 {
4819         init_waitqueue_head(&event->vif_wq);
4820         mutex_init(&event->vif_event_lock);
4821 }
4822
4823 static s32
4824 brcmf_dongle_roam(struct brcmf_if *ifp, u32 bcn_timeout)
4825 {
4826         s32 err = 0;
4827         __le32 roamtrigger[2];
4828         __le32 roam_delta[2];
4829
4830         /*
4831          * Setup timeout if Beacons are lost and roam is
4832          * off to report link down
4833          */
4834         if (brcmf_roamoff) {
4835                 err = brcmf_fil_iovar_int_set(ifp, "bcn_timeout", bcn_timeout);
4836                 if (err) {
4837                         brcmf_err("bcn_timeout error (%d)\n", err);
4838                         goto dongle_rom_out;
4839                 }
4840         }
4841
4842         /*
4843          * Enable/Disable built-in roaming to allow supplicant
4844          * to take care of roaming
4845          */
4846         brcmf_dbg(INFO, "Internal Roaming = %s\n",
4847                   brcmf_roamoff ? "Off" : "On");
4848         err = brcmf_fil_iovar_int_set(ifp, "roam_off", !!(brcmf_roamoff));
4849         if (err) {
4850                 brcmf_err("roam_off error (%d)\n", err);
4851                 goto dongle_rom_out;
4852         }
4853
4854         roamtrigger[0] = cpu_to_le32(WL_ROAM_TRIGGER_LEVEL);
4855         roamtrigger[1] = cpu_to_le32(BRCM_BAND_ALL);
4856         err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_ROAM_TRIGGER,
4857                                      (void *)roamtrigger, sizeof(roamtrigger));
4858         if (err) {
4859                 brcmf_err("WLC_SET_ROAM_TRIGGER error (%d)\n", err);
4860                 goto dongle_rom_out;
4861         }
4862
4863         roam_delta[0] = cpu_to_le32(WL_ROAM_DELTA);
4864         roam_delta[1] = cpu_to_le32(BRCM_BAND_ALL);
4865         err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_ROAM_DELTA,
4866                                      (void *)roam_delta, sizeof(roam_delta));
4867         if (err) {
4868                 brcmf_err("WLC_SET_ROAM_DELTA error (%d)\n", err);
4869                 goto dongle_rom_out;
4870         }
4871
4872 dongle_rom_out:
4873         return err;
4874 }
4875
4876 static s32
4877 brcmf_dongle_scantime(struct brcmf_if *ifp, s32 scan_assoc_time,
4878                       s32 scan_unassoc_time, s32 scan_passive_time)
4879 {
4880         s32 err = 0;
4881
4882         err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_SCAN_CHANNEL_TIME,
4883                                     scan_assoc_time);
4884         if (err) {
4885                 if (err == -EOPNOTSUPP)
4886                         brcmf_dbg(INFO, "Scan assoc time is not supported\n");
4887                 else
4888                         brcmf_err("Scan assoc time error (%d)\n", err);
4889                 goto dongle_scantime_out;
4890         }
4891         err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_SCAN_UNASSOC_TIME,
4892                                     scan_unassoc_time);
4893         if (err) {
4894                 if (err == -EOPNOTSUPP)
4895                         brcmf_dbg(INFO, "Scan unassoc time is not supported\n");
4896                 else
4897                         brcmf_err("Scan unassoc time error (%d)\n", err);
4898                 goto dongle_scantime_out;
4899         }
4900
4901         err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_SCAN_PASSIVE_TIME,
4902                                     scan_passive_time);
4903         if (err) {
4904                 if (err == -EOPNOTSUPP)
4905                         brcmf_dbg(INFO, "Scan passive time is not supported\n");
4906                 else
4907                         brcmf_err("Scan passive time error (%d)\n", err);
4908                 goto dongle_scantime_out;
4909         }
4910
4911 dongle_scantime_out:
4912         return err;
4913 }
4914
4915 /* Filter the list of channels received from firmware counting only
4916  * the 20MHz channels. The wiphy band data only needs those which get
4917  * flagged to indicate if they can take part in higher bandwidth.
4918  */
4919 static void brcmf_count_20mhz_channels(struct brcmf_cfg80211_info *cfg,
4920                                        struct brcmf_chanspec_list *chlist,
4921                                        u32 chcnt[])
4922 {
4923         u32 total = le32_to_cpu(chlist->count);
4924         struct brcmu_chan ch;
4925         int i;
4926
4927         for (i = 0; i <= total; i++) {
4928                 ch.chspec = (u16)le32_to_cpu(chlist->element[i]);
4929                 cfg->d11inf.decchspec(&ch);
4930
4931                 /* Firmware gives a ordered list. We skip non-20MHz
4932                  * channels is 2G. For 5G we can abort upon reaching
4933                  * a non-20MHz channel in the list.
4934                  */
4935                 if (ch.bw != BRCMU_CHAN_BW_20) {
4936                         if (ch.band == BRCMU_CHAN_BAND_5G)
4937                                 break;
4938                         else
4939                                 continue;
4940                 }
4941
4942                 if (ch.band == BRCMU_CHAN_BAND_2G)
4943                         chcnt[0] += 1;
4944                 else if (ch.band == BRCMU_CHAN_BAND_5G)
4945                         chcnt[1] += 1;
4946         }
4947 }
4948
4949 static void brcmf_update_bw40_channel_flag(struct ieee80211_channel *channel,
4950                                            struct brcmu_chan *ch)
4951 {
4952         u32 ht40_flag;
4953
4954         ht40_flag = channel->flags & IEEE80211_CHAN_NO_HT40;
4955         if (ch->sb == BRCMU_CHAN_SB_U) {
4956                 if (ht40_flag == IEEE80211_CHAN_NO_HT40)
4957                         channel->flags &= ~IEEE80211_CHAN_NO_HT40;
4958                 channel->flags |= IEEE80211_CHAN_NO_HT40PLUS;
4959         } else {
4960                 /* It should be one of
4961                  * IEEE80211_CHAN_NO_HT40 or
4962                  * IEEE80211_CHAN_NO_HT40PLUS
4963                  */
4964                 channel->flags &= ~IEEE80211_CHAN_NO_HT40;
4965                 if (ht40_flag == IEEE80211_CHAN_NO_HT40)
4966                         channel->flags |= IEEE80211_CHAN_NO_HT40MINUS;
4967         }
4968 }
4969
4970 static int brcmf_construct_chaninfo(struct brcmf_cfg80211_info *cfg,
4971                                     u32 bw_cap[])
4972 {
4973         struct brcmf_if *ifp = netdev_priv(cfg_to_ndev(cfg));
4974         struct ieee80211_supported_band *band;
4975         struct ieee80211_channel *channel;
4976         struct wiphy *wiphy;
4977         struct brcmf_chanspec_list *list;
4978         struct brcmu_chan ch;
4979         int err;
4980         u8 *pbuf;
4981         u32 i, j;
4982         u32 total;
4983         u32 chaninfo;
4984         u32 chcnt[2] = { 0, 0 };
4985         u32 index;
4986
4987         pbuf = kzalloc(BRCMF_DCMD_MEDLEN, GFP_KERNEL);
4988
4989         if (pbuf == NULL)
4990                 return -ENOMEM;
4991
4992         list = (struct brcmf_chanspec_list *)pbuf;
4993
4994         err = brcmf_fil_iovar_data_get(ifp, "chanspecs", pbuf,
4995                                        BRCMF_DCMD_MEDLEN);
4996         if (err) {
4997                 brcmf_err("get chanspecs error (%d)\n", err);
4998                 goto fail_pbuf;
4999         }
5000
5001         brcmf_count_20mhz_channels(cfg, list, chcnt);
5002         wiphy = cfg_to_wiphy(cfg);
5003         if (chcnt[0]) {
5004                 band = kmemdup(&__wl_band_2ghz, sizeof(__wl_band_2ghz),
5005                                GFP_KERNEL);
5006                 if (band == NULL) {
5007                         err = -ENOMEM;
5008                         goto fail_pbuf;
5009                 }
5010                 band->channels = kcalloc(chcnt[0], sizeof(*channel),
5011                                          GFP_KERNEL);
5012                 if (band->channels == NULL) {
5013                         kfree(band);
5014                         err = -ENOMEM;
5015                         goto fail_pbuf;
5016                 }
5017                 band->n_channels = 0;
5018                 wiphy->bands[IEEE80211_BAND_2GHZ] = band;
5019         }
5020         if (chcnt[1]) {
5021                 band = kmemdup(&__wl_band_5ghz_a, sizeof(__wl_band_5ghz_a),
5022                                GFP_KERNEL);
5023                 if (band == NULL) {
5024                         err = -ENOMEM;
5025                         goto fail_band2g;
5026                 }
5027                 band->channels = kcalloc(chcnt[1], sizeof(*channel),
5028                                          GFP_KERNEL);
5029                 if (band->channels == NULL) {
5030                         kfree(band);
5031                         err = -ENOMEM;
5032                         goto fail_band2g;
5033                 }
5034                 band->n_channels = 0;
5035                 wiphy->bands[IEEE80211_BAND_5GHZ] = band;
5036         }
5037
5038         total = le32_to_cpu(list->count);
5039         for (i = 0; i < total; i++) {
5040                 ch.chspec = (u16)le32_to_cpu(list->element[i]);
5041                 cfg->d11inf.decchspec(&ch);
5042
5043                 if (ch.band == BRCMU_CHAN_BAND_2G) {
5044                         band = wiphy->bands[IEEE80211_BAND_2GHZ];
5045                 } else if (ch.band == BRCMU_CHAN_BAND_5G) {
5046                         band = wiphy->bands[IEEE80211_BAND_5GHZ];
5047                 } else {
5048                         brcmf_err("Invalid channel Spec. 0x%x.\n", ch.chspec);
5049                         continue;
5050                 }
5051                 if (!(bw_cap[band->band] & WLC_BW_40MHZ_BIT) &&
5052                     ch.bw == BRCMU_CHAN_BW_40)
5053                         continue;
5054                 if (!(bw_cap[band->band] & WLC_BW_80MHZ_BIT) &&
5055                     ch.bw == BRCMU_CHAN_BW_80)
5056                         continue;
5057
5058                 channel = band->channels;
5059                 index = band->n_channels;
5060                 for (j = 0; j < band->n_channels; j++) {
5061                         if (channel[j].hw_value == ch.chnum) {
5062                                 index = j;
5063                                 break;
5064                         }
5065                 }
5066                 channel[index].center_freq =
5067                         ieee80211_channel_to_frequency(ch.chnum, band->band);
5068                 channel[index].hw_value = ch.chnum;
5069
5070                 /* assuming the chanspecs order is HT20,
5071                  * HT40 upper, HT40 lower, and VHT80.
5072                  */
5073                 if (ch.bw == BRCMU_CHAN_BW_80) {
5074                         channel[index].flags &= ~IEEE80211_CHAN_NO_80MHZ;
5075                 } else if (ch.bw == BRCMU_CHAN_BW_40) {
5076                         brcmf_update_bw40_channel_flag(&channel[index], &ch);
5077                 } else {
5078                         /* disable other bandwidths for now as mentioned
5079                          * order assure they are enabled for subsequent
5080                          * chanspecs.
5081                          */
5082                         channel[index].flags = IEEE80211_CHAN_NO_HT40 |
5083                                                IEEE80211_CHAN_NO_80MHZ;
5084                         ch.bw = BRCMU_CHAN_BW_20;
5085                         cfg->d11inf.encchspec(&ch);
5086                         chaninfo = ch.chspec;
5087                         err = brcmf_fil_bsscfg_int_get(ifp, "per_chan_info",
5088                                                        &chaninfo);
5089                         if (!err) {
5090                                 if (chaninfo & WL_CHAN_RADAR)
5091                                         channel[index].flags |=
5092                                                 (IEEE80211_CHAN_RADAR |
5093                                                  IEEE80211_CHAN_NO_IR);
5094                                 if (chaninfo & WL_CHAN_PASSIVE)
5095                                         channel[index].flags |=
5096                                                 IEEE80211_CHAN_NO_IR;
5097                         }
5098                 }
5099                 if (index == band->n_channels)
5100                         band->n_channels++;
5101         }
5102         kfree(pbuf);
5103         return 0;
5104
5105 fail_band2g:
5106         kfree(wiphy->bands[IEEE80211_BAND_2GHZ]->channels);
5107         kfree(wiphy->bands[IEEE80211_BAND_2GHZ]);
5108         wiphy->bands[IEEE80211_BAND_2GHZ] = NULL;
5109 fail_pbuf:
5110         kfree(pbuf);
5111         return err;
5112 }
5113
5114 static int brcmf_enable_bw40_2g(struct brcmf_cfg80211_info *cfg)
5115 {
5116         struct brcmf_if *ifp = netdev_priv(cfg_to_ndev(cfg));
5117         struct ieee80211_supported_band *band;
5118         struct brcmf_fil_bwcap_le band_bwcap;
5119         struct brcmf_chanspec_list *list;
5120         u8 *pbuf;
5121         u32 val;
5122         int err;
5123         struct brcmu_chan ch;
5124         u32 num_chan;
5125         int i, j;
5126
5127         /* verify support for bw_cap command */
5128         val = WLC_BAND_5G;
5129         err = brcmf_fil_iovar_int_get(ifp, "bw_cap", &val);
5130
5131         if (!err) {
5132                 /* only set 2G bandwidth using bw_cap command */
5133                 band_bwcap.band = cpu_to_le32(WLC_BAND_2G);
5134                 band_bwcap.bw_cap = cpu_to_le32(WLC_BW_CAP_40MHZ);
5135                 err = brcmf_fil_iovar_data_set(ifp, "bw_cap", &band_bwcap,
5136                                                sizeof(band_bwcap));
5137         } else {
5138                 brcmf_dbg(INFO, "fallback to mimo_bw_cap\n");
5139                 val = WLC_N_BW_40ALL;
5140                 err = brcmf_fil_iovar_int_set(ifp, "mimo_bw_cap", val);
5141         }
5142
5143         if (!err) {
5144                 /* update channel info in 2G band */
5145                 pbuf = kzalloc(BRCMF_DCMD_MEDLEN, GFP_KERNEL);
5146
5147                 if (pbuf == NULL)
5148                         return -ENOMEM;
5149
5150                 ch.band = BRCMU_CHAN_BAND_2G;
5151                 ch.bw = BRCMU_CHAN_BW_40;
5152                 ch.chnum = 0;
5153                 cfg->d11inf.encchspec(&ch);
5154
5155                 /* pass encoded chanspec in query */
5156                 *(__le16 *)pbuf = cpu_to_le16(ch.chspec);
5157
5158                 err = brcmf_fil_iovar_data_get(ifp, "chanspecs", pbuf,
5159                                                BRCMF_DCMD_MEDLEN);
5160                 if (err) {
5161                         brcmf_err("get chanspecs error (%d)\n", err);
5162                         kfree(pbuf);
5163                         return err;
5164                 }
5165
5166                 band = cfg_to_wiphy(cfg)->bands[IEEE80211_BAND_2GHZ];
5167                 list = (struct brcmf_chanspec_list *)pbuf;
5168                 num_chan = le32_to_cpu(list->count);
5169                 for (i = 0; i < num_chan; i++) {
5170                         ch.chspec = (u16)le32_to_cpu(list->element[i]);
5171                         cfg->d11inf.decchspec(&ch);
5172                         if (WARN_ON(ch.band != BRCMU_CHAN_BAND_2G))
5173                                 continue;
5174                         if (WARN_ON(ch.bw != BRCMU_CHAN_BW_40))
5175                                 continue;
5176                         for (j = 0; j < band->n_channels; j++) {
5177                                 if (band->channels[j].hw_value == ch.chnum)
5178                                         break;
5179                         }
5180                         if (WARN_ON(j == band->n_channels))
5181                                 continue;
5182
5183                         brcmf_update_bw40_channel_flag(&band->channels[j], &ch);
5184                 }
5185         }
5186         return err;
5187 }
5188
5189 static void brcmf_get_bwcap(struct brcmf_if *ifp, u32 bw_cap[])
5190 {
5191         u32 band, mimo_bwcap;
5192         int err;
5193
5194         band = WLC_BAND_2G;
5195         err = brcmf_fil_iovar_int_get(ifp, "bw_cap", &band);
5196         if (!err) {
5197                 bw_cap[IEEE80211_BAND_2GHZ] = band;
5198                 band = WLC_BAND_5G;
5199                 err = brcmf_fil_iovar_int_get(ifp, "bw_cap", &band);
5200                 if (!err) {
5201                         bw_cap[IEEE80211_BAND_5GHZ] = band;
5202                         return;
5203                 }
5204                 WARN_ON(1);
5205                 return;
5206         }
5207         brcmf_dbg(INFO, "fallback to mimo_bw_cap info\n");
5208         mimo_bwcap = 0;
5209         err = brcmf_fil_iovar_int_get(ifp, "mimo_bw_cap", &mimo_bwcap);
5210         if (err)
5211                 /* assume 20MHz if firmware does not give a clue */
5212                 mimo_bwcap = WLC_N_BW_20ALL;
5213
5214         switch (mimo_bwcap) {
5215         case WLC_N_BW_40ALL:
5216                 bw_cap[IEEE80211_BAND_2GHZ] |= WLC_BW_40MHZ_BIT;
5217                 /* fall-thru */
5218         case WLC_N_BW_20IN2G_40IN5G:
5219                 bw_cap[IEEE80211_BAND_5GHZ] |= WLC_BW_40MHZ_BIT;
5220                 /* fall-thru */
5221         case WLC_N_BW_20ALL:
5222                 bw_cap[IEEE80211_BAND_2GHZ] |= WLC_BW_20MHZ_BIT;
5223                 bw_cap[IEEE80211_BAND_5GHZ] |= WLC_BW_20MHZ_BIT;
5224                 break;
5225         default:
5226                 brcmf_err("invalid mimo_bw_cap value\n");
5227         }
5228 }
5229
5230 static void brcmf_update_ht_cap(struct ieee80211_supported_band *band,
5231                                 u32 bw_cap[2], u32 nchain)
5232 {
5233         band->ht_cap.ht_supported = true;
5234         if (bw_cap[band->band] & WLC_BW_40MHZ_BIT) {
5235                 band->ht_cap.cap |= IEEE80211_HT_CAP_SGI_40;
5236                 band->ht_cap.cap |= IEEE80211_HT_CAP_SUP_WIDTH_20_40;
5237         }
5238         band->ht_cap.cap |= IEEE80211_HT_CAP_SGI_20;
5239         band->ht_cap.cap |= IEEE80211_HT_CAP_DSSSCCK40;
5240         band->ht_cap.ampdu_factor = IEEE80211_HT_MAX_AMPDU_64K;
5241         band->ht_cap.ampdu_density = IEEE80211_HT_MPDU_DENSITY_16;
5242         memset(band->ht_cap.mcs.rx_mask, 0xff, nchain);
5243         band->ht_cap.mcs.tx_params = IEEE80211_HT_MCS_TX_DEFINED;
5244 }
5245
5246 static __le16 brcmf_get_mcs_map(u32 nchain, enum ieee80211_vht_mcs_support supp)
5247 {
5248         u16 mcs_map;
5249         int i;
5250
5251         for (i = 0, mcs_map = 0xFFFF; i < nchain; i++)
5252                 mcs_map = (mcs_map << 2) | supp;
5253
5254         return cpu_to_le16(mcs_map);
5255 }
5256
5257 static void brcmf_update_vht_cap(struct ieee80211_supported_band *band,
5258                                  u32 bw_cap[2], u32 nchain)
5259 {
5260         __le16 mcs_map;
5261
5262         /* not allowed in 2.4G band */
5263         if (band->band == IEEE80211_BAND_2GHZ)
5264                 return;
5265
5266         band->vht_cap.vht_supported = true;
5267         /* 80MHz is mandatory */
5268         band->vht_cap.cap |= IEEE80211_VHT_CAP_SHORT_GI_80;
5269         if (bw_cap[band->band] & WLC_BW_160MHZ_BIT) {
5270                 band->vht_cap.cap |= IEEE80211_VHT_CAP_SUPP_CHAN_WIDTH_160MHZ;
5271                 band->vht_cap.cap |= IEEE80211_VHT_CAP_SHORT_GI_160;
5272         }
5273         /* all support 256-QAM */
5274         mcs_map = brcmf_get_mcs_map(nchain, IEEE80211_VHT_MCS_SUPPORT_0_9);
5275         band->vht_cap.vht_mcs.rx_mcs_map = mcs_map;
5276         band->vht_cap.vht_mcs.tx_mcs_map = mcs_map;
5277 }
5278
5279 static int brcmf_setup_wiphybands(struct wiphy *wiphy)
5280 {
5281         struct brcmf_cfg80211_info *cfg = wiphy_priv(wiphy);
5282         struct brcmf_if *ifp = netdev_priv(cfg_to_ndev(cfg));
5283         u32 nmode = 0;
5284         u32 vhtmode = 0;
5285         u32 bw_cap[2] = { WLC_BW_20MHZ_BIT, WLC_BW_20MHZ_BIT };
5286         u32 rxchain;
5287         u32 nchain;
5288         int err;
5289         s32 i;
5290         struct ieee80211_supported_band *band;
5291
5292         (void)brcmf_fil_iovar_int_get(ifp, "vhtmode", &vhtmode);
5293         err = brcmf_fil_iovar_int_get(ifp, "nmode", &nmode);
5294         if (err) {
5295                 brcmf_err("nmode error (%d)\n", err);
5296         } else {
5297                 brcmf_get_bwcap(ifp, bw_cap);
5298         }
5299         brcmf_dbg(INFO, "nmode=%d, vhtmode=%d, bw_cap=(%d, %d)\n",
5300                   nmode, vhtmode, bw_cap[IEEE80211_BAND_2GHZ],
5301                   bw_cap[IEEE80211_BAND_5GHZ]);
5302
5303         err = brcmf_fil_iovar_int_get(ifp, "rxchain", &rxchain);
5304         if (err) {
5305                 brcmf_err("rxchain error (%d)\n", err);
5306                 nchain = 1;
5307         } else {
5308                 for (nchain = 0; rxchain; nchain++)
5309                         rxchain = rxchain & (rxchain - 1);
5310         }
5311         brcmf_dbg(INFO, "nchain=%d\n", nchain);
5312
5313         err = brcmf_construct_chaninfo(cfg, bw_cap);
5314         if (err) {
5315                 brcmf_err("brcmf_construct_chaninfo failed (%d)\n", err);
5316                 return err;
5317         }
5318
5319         wiphy = cfg_to_wiphy(cfg);
5320         for (i = 0; i < ARRAY_SIZE(wiphy->bands); i++) {
5321                 band = wiphy->bands[i];
5322                 if (band == NULL)
5323                         continue;
5324
5325                 if (nmode)
5326                         brcmf_update_ht_cap(band, bw_cap, nchain);
5327                 if (vhtmode)
5328                         brcmf_update_vht_cap(band, bw_cap, nchain);
5329         }
5330
5331         return 0;
5332 }
5333
5334 static const struct ieee80211_iface_limit brcmf_iface_limits[] = {
5335         {
5336                 .max = 2,
5337                 .types = BIT(NL80211_IFTYPE_STATION) |
5338                          BIT(NL80211_IFTYPE_ADHOC) |
5339                          BIT(NL80211_IFTYPE_AP)
5340         },
5341         {
5342                 .max = 1,
5343                 .types = BIT(NL80211_IFTYPE_P2P_CLIENT) |
5344                          BIT(NL80211_IFTYPE_P2P_GO)
5345         },
5346         {
5347                 .max = 1,
5348                 .types = BIT(NL80211_IFTYPE_P2P_DEVICE)
5349         }
5350 };
5351 static struct ieee80211_iface_combination brcmf_iface_combos[] = {
5352         {
5353                  .max_interfaces = BRCMF_IFACE_MAX_CNT,
5354                  .num_different_channels = 1,
5355                  .n_limits = ARRAY_SIZE(brcmf_iface_limits),
5356                  .limits = brcmf_iface_limits
5357         }
5358 };
5359
5360 static const struct ieee80211_txrx_stypes
5361 brcmf_txrx_stypes[NUM_NL80211_IFTYPES] = {
5362         [NL80211_IFTYPE_STATION] = {
5363                 .tx = 0xffff,
5364                 .rx = BIT(IEEE80211_STYPE_ACTION >> 4) |
5365                       BIT(IEEE80211_STYPE_PROBE_REQ >> 4)
5366         },
5367         [NL80211_IFTYPE_P2P_CLIENT] = {
5368                 .tx = 0xffff,
5369                 .rx = BIT(IEEE80211_STYPE_ACTION >> 4) |
5370                       BIT(IEEE80211_STYPE_PROBE_REQ >> 4)
5371         },
5372         [NL80211_IFTYPE_P2P_GO] = {
5373                 .tx = 0xffff,
5374                 .rx = BIT(IEEE80211_STYPE_ASSOC_REQ >> 4) |
5375                       BIT(IEEE80211_STYPE_REASSOC_REQ >> 4) |
5376                       BIT(IEEE80211_STYPE_PROBE_REQ >> 4) |
5377                       BIT(IEEE80211_STYPE_DISASSOC >> 4) |
5378                       BIT(IEEE80211_STYPE_AUTH >> 4) |
5379                       BIT(IEEE80211_STYPE_DEAUTH >> 4) |
5380                       BIT(IEEE80211_STYPE_ACTION >> 4)
5381         },
5382         [NL80211_IFTYPE_P2P_DEVICE] = {
5383                 .tx = 0xffff,
5384                 .rx = BIT(IEEE80211_STYPE_ACTION >> 4) |
5385                       BIT(IEEE80211_STYPE_PROBE_REQ >> 4)
5386         }
5387 };
5388
5389 static void brcmf_wiphy_pno_params(struct wiphy *wiphy)
5390 {
5391         /* scheduled scan settings */
5392         wiphy->max_sched_scan_ssids = BRCMF_PNO_MAX_PFN_COUNT;
5393         wiphy->max_match_sets = BRCMF_PNO_MAX_PFN_COUNT;
5394         wiphy->max_sched_scan_ie_len = BRCMF_SCAN_IE_LEN_MAX;
5395         wiphy->flags |= WIPHY_FLAG_SUPPORTS_SCHED_SCAN;
5396 }
5397
5398 static int brcmf_setup_wiphy(struct wiphy *wiphy, struct brcmf_if *ifp)
5399 {
5400         struct ieee80211_iface_combination ifc_combo;
5401         wiphy->max_scan_ssids = WL_NUM_SCAN_MAX;
5402         wiphy->max_scan_ie_len = BRCMF_SCAN_IE_LEN_MAX;
5403         wiphy->max_num_pmkids = WL_NUM_PMKIDS_MAX;
5404         wiphy->interface_modes = BIT(NL80211_IFTYPE_STATION) |
5405                                  BIT(NL80211_IFTYPE_ADHOC) |
5406                                  BIT(NL80211_IFTYPE_AP) |
5407                                  BIT(NL80211_IFTYPE_P2P_CLIENT) |
5408                                  BIT(NL80211_IFTYPE_P2P_GO) |
5409                                  BIT(NL80211_IFTYPE_P2P_DEVICE);
5410         /* need VSDB firmware feature for concurrent channels */
5411         ifc_combo = brcmf_iface_combos[0];
5412         if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_MCHAN))
5413                 ifc_combo.num_different_channels = 2;
5414         wiphy->iface_combinations = kmemdup(&ifc_combo,
5415                                             sizeof(ifc_combo),
5416                                             GFP_KERNEL);
5417         wiphy->n_iface_combinations = ARRAY_SIZE(brcmf_iface_combos);
5418         wiphy->signal_type = CFG80211_SIGNAL_TYPE_MBM;
5419         wiphy->cipher_suites = __wl_cipher_suites;
5420         wiphy->n_cipher_suites = ARRAY_SIZE(__wl_cipher_suites);
5421         wiphy->flags |= WIPHY_FLAG_PS_ON_BY_DEFAULT |
5422                         WIPHY_FLAG_OFFCHAN_TX |
5423                         WIPHY_FLAG_HAS_REMAIN_ON_CHANNEL |
5424                         WIPHY_FLAG_SUPPORTS_TDLS;
5425         if (!brcmf_roamoff)
5426                 wiphy->flags |= WIPHY_FLAG_SUPPORTS_FW_ROAM;
5427         wiphy->mgmt_stypes = brcmf_txrx_stypes;
5428         wiphy->max_remain_on_channel_duration = 5000;
5429         brcmf_wiphy_pno_params(wiphy);
5430
5431         /* vendor commands/events support */
5432         wiphy->vendor_commands = brcmf_vendor_cmds;
5433         wiphy->n_vendor_commands = BRCMF_VNDR_CMDS_LAST - 1;
5434
5435         return brcmf_setup_wiphybands(wiphy);
5436 }
5437
5438 static s32 brcmf_config_dongle(struct brcmf_cfg80211_info *cfg)
5439 {
5440         struct net_device *ndev;
5441         struct wireless_dev *wdev;
5442         struct brcmf_if *ifp;
5443         s32 power_mode;
5444         s32 err = 0;
5445
5446         if (cfg->dongle_up)
5447                 return err;
5448
5449         ndev = cfg_to_ndev(cfg);
5450         wdev = ndev->ieee80211_ptr;
5451         ifp = netdev_priv(ndev);
5452
5453         /* make sure RF is ready for work */
5454         brcmf_fil_cmd_int_set(ifp, BRCMF_C_UP, 0);
5455
5456         brcmf_dongle_scantime(ifp, WL_SCAN_CHANNEL_TIME,
5457                               WL_SCAN_UNASSOC_TIME, WL_SCAN_PASSIVE_TIME);
5458
5459         power_mode = cfg->pwr_save ? PM_FAST : PM_OFF;
5460         err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_PM, power_mode);
5461         if (err)
5462                 goto default_conf_out;
5463         brcmf_dbg(INFO, "power save set to %s\n",
5464                   (power_mode ? "enabled" : "disabled"));
5465
5466         err = brcmf_dongle_roam(ifp, WL_BEACON_TIMEOUT);
5467         if (err)
5468                 goto default_conf_out;
5469         err = brcmf_cfg80211_change_iface(wdev->wiphy, ndev, wdev->iftype,
5470                                           NULL, NULL);
5471         if (err)
5472                 goto default_conf_out;
5473
5474         brcmf_configure_arp_offload(ifp, true);
5475
5476         cfg->dongle_up = true;
5477 default_conf_out:
5478
5479         return err;
5480
5481 }
5482
5483 static s32 __brcmf_cfg80211_up(struct brcmf_if *ifp)
5484 {
5485         set_bit(BRCMF_VIF_STATUS_READY, &ifp->vif->sme_state);
5486
5487         return brcmf_config_dongle(ifp->drvr->config);
5488 }
5489
5490 static s32 __brcmf_cfg80211_down(struct brcmf_if *ifp)
5491 {
5492         struct brcmf_cfg80211_info *cfg = ifp->drvr->config;
5493
5494         /*
5495          * While going down, if associated with AP disassociate
5496          * from AP to save power
5497          */
5498         if (check_vif_up(ifp->vif)) {
5499                 brcmf_link_down(ifp->vif);
5500
5501                 /* Make sure WPA_Supplicant receives all the event
5502                    generated due to DISASSOC call to the fw to keep
5503                    the state fw and WPA_Supplicant state consistent
5504                  */
5505                 brcmf_delay(500);
5506         }
5507
5508         brcmf_abort_scanning(cfg);
5509         clear_bit(BRCMF_VIF_STATUS_READY, &ifp->vif->sme_state);
5510
5511         return 0;
5512 }
5513
5514 s32 brcmf_cfg80211_up(struct net_device *ndev)
5515 {
5516         struct brcmf_if *ifp = netdev_priv(ndev);
5517         struct brcmf_cfg80211_info *cfg = ifp->drvr->config;
5518         s32 err = 0;
5519
5520         mutex_lock(&cfg->usr_sync);
5521         err = __brcmf_cfg80211_up(ifp);
5522         mutex_unlock(&cfg->usr_sync);
5523
5524         return err;
5525 }
5526
5527 s32 brcmf_cfg80211_down(struct net_device *ndev)
5528 {
5529         struct brcmf_if *ifp = netdev_priv(ndev);
5530         struct brcmf_cfg80211_info *cfg = ifp->drvr->config;
5531         s32 err = 0;
5532
5533         mutex_lock(&cfg->usr_sync);
5534         err = __brcmf_cfg80211_down(ifp);
5535         mutex_unlock(&cfg->usr_sync);
5536
5537         return err;
5538 }
5539
5540 enum nl80211_iftype brcmf_cfg80211_get_iftype(struct brcmf_if *ifp)
5541 {
5542         struct wireless_dev *wdev = &ifp->vif->wdev;
5543
5544         return wdev->iftype;
5545 }
5546
5547 bool brcmf_get_vif_state_any(struct brcmf_cfg80211_info *cfg, unsigned long state)
5548 {
5549         struct brcmf_cfg80211_vif *vif;
5550
5551         list_for_each_entry(vif, &cfg->vif_list, list) {
5552                 if (test_bit(state, &vif->sme_state))
5553                         return true;
5554         }
5555         return false;
5556 }
5557
5558 static inline bool vif_event_equals(struct brcmf_cfg80211_vif_event *event,
5559                                     u8 action)
5560 {
5561         u8 evt_action;
5562
5563         mutex_lock(&event->vif_event_lock);
5564         evt_action = event->action;
5565         mutex_unlock(&event->vif_event_lock);
5566         return evt_action == action;
5567 }
5568
5569 void brcmf_cfg80211_arm_vif_event(struct brcmf_cfg80211_info *cfg,
5570                                   struct brcmf_cfg80211_vif *vif)
5571 {
5572         struct brcmf_cfg80211_vif_event *event = &cfg->vif_event;
5573
5574         mutex_lock(&event->vif_event_lock);
5575         event->vif = vif;
5576         event->action = 0;
5577         mutex_unlock(&event->vif_event_lock);
5578 }
5579
5580 bool brcmf_cfg80211_vif_event_armed(struct brcmf_cfg80211_info *cfg)
5581 {
5582         struct brcmf_cfg80211_vif_event *event = &cfg->vif_event;
5583         bool armed;
5584
5585         mutex_lock(&event->vif_event_lock);
5586         armed = event->vif != NULL;
5587         mutex_unlock(&event->vif_event_lock);
5588
5589         return armed;
5590 }
5591 int brcmf_cfg80211_wait_vif_event_timeout(struct brcmf_cfg80211_info *cfg,
5592                                           u8 action, ulong timeout)
5593 {
5594         struct brcmf_cfg80211_vif_event *event = &cfg->vif_event;
5595
5596         return wait_event_timeout(event->vif_wq,
5597                                   vif_event_equals(event, action), timeout);
5598 }
5599
5600 static void brcmf_free_wiphy(struct wiphy *wiphy)
5601 {
5602         kfree(wiphy->iface_combinations);
5603         if (wiphy->bands[IEEE80211_BAND_2GHZ]) {
5604                 kfree(wiphy->bands[IEEE80211_BAND_2GHZ]->channels);
5605                 kfree(wiphy->bands[IEEE80211_BAND_2GHZ]);
5606         }
5607         if (wiphy->bands[IEEE80211_BAND_5GHZ]) {
5608                 kfree(wiphy->bands[IEEE80211_BAND_5GHZ]->channels);
5609                 kfree(wiphy->bands[IEEE80211_BAND_5GHZ]);
5610         }
5611         wiphy_free(wiphy);
5612 }
5613
5614 struct brcmf_cfg80211_info *brcmf_cfg80211_attach(struct brcmf_pub *drvr,
5615                                                   struct device *busdev)
5616 {
5617         struct net_device *ndev = drvr->iflist[0]->ndev;
5618         struct brcmf_cfg80211_info *cfg;
5619         struct wiphy *wiphy;
5620         struct brcmf_cfg80211_vif *vif;
5621         struct brcmf_if *ifp;
5622         s32 err = 0;
5623         s32 io_type;
5624         u16 *cap = NULL;
5625
5626         if (!ndev) {
5627                 brcmf_err("ndev is invalid\n");
5628                 return NULL;
5629         }
5630
5631         ifp = netdev_priv(ndev);
5632         wiphy = wiphy_new(&wl_cfg80211_ops, sizeof(struct brcmf_cfg80211_info));
5633         if (!wiphy) {
5634                 brcmf_err("Could not allocate wiphy device\n");
5635                 return NULL;
5636         }
5637         set_wiphy_dev(wiphy, busdev);
5638
5639         cfg = wiphy_priv(wiphy);
5640         cfg->wiphy = wiphy;
5641         cfg->pub = drvr;
5642         init_vif_event(&cfg->vif_event);
5643         INIT_LIST_HEAD(&cfg->vif_list);
5644
5645         vif = brcmf_alloc_vif(cfg, NL80211_IFTYPE_STATION, false);
5646         if (IS_ERR(vif))
5647                 goto wiphy_out;
5648
5649         vif->ifp = ifp;
5650         vif->wdev.netdev = ndev;
5651         ndev->ieee80211_ptr = &vif->wdev;
5652         SET_NETDEV_DEV(ndev, wiphy_dev(cfg->wiphy));
5653
5654         err = wl_init_priv(cfg);
5655         if (err) {
5656                 brcmf_err("Failed to init iwm_priv (%d)\n", err);
5657                 brcmf_free_vif(vif);
5658                 goto wiphy_out;
5659         }
5660         ifp->vif = vif;
5661
5662         /* determine d11 io type before wiphy setup */
5663         err = brcmf_fil_cmd_int_get(ifp, BRCMF_C_GET_VERSION, &io_type);
5664         if (err) {
5665                 brcmf_err("Failed to get D11 version (%d)\n", err);
5666                 goto priv_out;
5667         }
5668         cfg->d11inf.io_type = (u8)io_type;
5669         brcmu_d11_attach(&cfg->d11inf);
5670
5671         err = brcmf_setup_wiphy(wiphy, ifp);
5672         if (err < 0)
5673                 goto priv_out;
5674
5675         brcmf_dbg(INFO, "Registering custom regulatory\n");
5676         wiphy->regulatory_flags |= REGULATORY_CUSTOM_REG;
5677         wiphy_apply_custom_regulatory(wiphy, &brcmf_regdom);
5678
5679         /* firmware defaults to 40MHz disabled in 2G band. We signal
5680          * cfg80211 here that we do and have it decide we can enable
5681          * it. But first check if device does support 2G operation.
5682          */
5683         if (wiphy->bands[IEEE80211_BAND_2GHZ]) {
5684                 cap = &wiphy->bands[IEEE80211_BAND_2GHZ]->ht_cap.cap;
5685                 *cap |= IEEE80211_HT_CAP_SUP_WIDTH_20_40;
5686         }
5687         err = wiphy_register(wiphy);
5688         if (err < 0) {
5689                 brcmf_err("Could not register wiphy device (%d)\n", err);
5690                 goto priv_out;
5691         }
5692
5693         /* If cfg80211 didn't disable 40MHz HT CAP in wiphy_register(),
5694          * setup 40MHz in 2GHz band and enable OBSS scanning.
5695          */
5696         if (cap && (*cap & IEEE80211_HT_CAP_SUP_WIDTH_20_40)) {
5697                 err = brcmf_enable_bw40_2g(cfg);
5698                 if (!err)
5699                         err = brcmf_fil_iovar_int_set(ifp, "obss_coex",
5700                                                       BRCMF_OBSS_COEX_AUTO);
5701                 else
5702                         *cap &= ~IEEE80211_HT_CAP_SUP_WIDTH_20_40;
5703         }
5704
5705         err = brcmf_p2p_attach(cfg);
5706         if (err) {
5707                 brcmf_err("P2P initilisation failed (%d)\n", err);
5708                 goto wiphy_unreg_out;
5709         }
5710         err = brcmf_btcoex_attach(cfg);
5711         if (err) {
5712                 brcmf_err("BT-coex initialisation failed (%d)\n", err);
5713                 brcmf_p2p_detach(&cfg->p2p);
5714                 goto wiphy_unreg_out;
5715         }
5716
5717         err = brcmf_fil_iovar_int_set(ifp, "tdls_enable", 1);
5718         if (err) {
5719                 brcmf_dbg(INFO, "TDLS not enabled (%d)\n", err);
5720                 wiphy->flags &= ~WIPHY_FLAG_SUPPORTS_TDLS;
5721         } else {
5722                 brcmf_fweh_register(cfg->pub, BRCMF_E_TDLS_PEER_EVENT,
5723                                     brcmf_notify_tdls_peer_event);
5724         }
5725
5726         return cfg;
5727
5728 wiphy_unreg_out:
5729         wiphy_unregister(cfg->wiphy);
5730 priv_out:
5731         wl_deinit_priv(cfg);
5732         brcmf_free_vif(vif);
5733 wiphy_out:
5734         brcmf_free_wiphy(wiphy);
5735         return NULL;
5736 }
5737
5738 void brcmf_cfg80211_detach(struct brcmf_cfg80211_info *cfg)
5739 {
5740         if (!cfg)
5741                 return;
5742
5743         WARN_ON(!list_empty(&cfg->vif_list));
5744         wiphy_unregister(cfg->wiphy);
5745         brcmf_btcoex_detach(cfg);
5746         brcmf_p2p_detach(&cfg->p2p);
5747         wl_deinit_priv(cfg);
5748         brcmf_free_wiphy(cfg->wiphy);
5749 }