]> bbs.cooldavid.org Git - net-next-2.6.git/blame - drivers/staging/brcm80211/brcmfmac/dhd_common.c
Staging: brcm80211: s/int32/s32/
[net-next-2.6.git] / drivers / staging / brcm80211 / brcmfmac / dhd_common.c
CommitLineData
cf2b4488
HP
1/*
2 * Copyright (c) 2010 Broadcom Corporation
3 *
4 * Permission to use, copy, modify, and/or distribute this software for any
5 * purpose with or without fee is hereby granted, provided that the above
6 * copyright notice and this permission notice appear in all copies.
7 *
8 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
9 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
10 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY
11 * SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
12 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION
13 * OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN
14 * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
15 */
16#include <typedefs.h>
17#include <osl.h>
18#include <bcmutils.h>
19#include <bcmendian.h>
20#include <dngl_stats.h>
21#include <dhd.h>
22#include <dhd_bus.h>
23#include <dhd_proto.h>
24#include <dhd_dbg.h>
25#include <msgtrace.h>
26#include <wlioctl.h>
27
28int dhd_msg_level;
29char fw_path[MOD_PARAM_PATHLEN];
30char nv_path[MOD_PARAM_PATHLEN];
31
32/* Last connection success/failure status */
66cbd3ab
GKH
33u32 dhd_conn_event;
34u32 dhd_conn_status;
35u32 dhd_conn_reason;
cf2b4488
HP
36
37#define htod32(i) i
38#define htod16(i) i
39#define dtoh32(i) i
40#define dtoh16(i) i
41
42extern int dhdcdc_set_ioctl(dhd_pub_t *dhd, int ifidx, uint cmd, void *buf,
43 uint len);
44extern void dhd_ind_scan_confirm(void *h, bool status);
45extern int dhd_wl_ioctl(dhd_pub_t *dhd, uint cmd, char *buf, uint buflen);
46void dhd_iscan_lock(void);
47void dhd_iscan_unlock(void);
48
49/* Packet alignment for most efficient SDIO (can change based on platform) */
50#ifndef DHD_SDALIGN
51#define DHD_SDALIGN 32
52#endif
53#if !ISPOWEROF2(DHD_SDALIGN)
54#error DHD_SDALIGN is not a power of 2!
55#endif
56
57#ifdef DHD_DEBUG
58#define EPI_VERSION_STR "4.218.248.5"
59const char dhd_version[] =
60"Dongle Host Driver, version " EPI_VERSION_STR "\nCompiled on " __DATE__
61" at " __TIME__;
62#else
63const char dhd_version[] = "Dongle Host Driver, version " EPI_VERSION_STR;
64#endif
65
66void dhd_set_timer(void *bus, uint wdtick);
67
68/* IOVar table */
69enum {
70 IOV_VERSION = 1,
71 IOV_MSGLEVEL,
72 IOV_BCMERRORSTR,
73 IOV_BCMERROR,
74 IOV_WDTICK,
75 IOV_DUMP,
76#ifdef DHD_DEBUG
77 IOV_CONS,
78 IOV_DCONSOLE_POLL,
79#endif
80 IOV_CLEARCOUNTS,
81 IOV_LOGDUMP,
82 IOV_LOGCAL,
83 IOV_LOGSTAMP,
84 IOV_GPIOOB,
85 IOV_IOCTLTIMEOUT,
86 IOV_LAST
87};
88
89const bcm_iovar_t dhd_iovars[] = {
90 {"version", IOV_VERSION, 0, IOVT_BUFFER, sizeof(dhd_version)}
91 ,
92#ifdef DHD_DEBUG
93 {"msglevel", IOV_MSGLEVEL, 0, IOVT_UINT32, 0}
94 ,
95#endif /* DHD_DEBUG */
96 {"bcmerrorstr", IOV_BCMERRORSTR, 0, IOVT_BUFFER, BCME_STRLEN}
97 ,
98 {"bcmerror", IOV_BCMERROR, 0, IOVT_INT8, 0}
99 ,
100 {"wdtick", IOV_WDTICK, 0, IOVT_UINT32, 0}
101 ,
102 {"dump", IOV_DUMP, 0, IOVT_BUFFER, DHD_IOCTL_MAXLEN}
103 ,
104#ifdef DHD_DEBUG
105 {"dconpoll", IOV_DCONSOLE_POLL, 0, IOVT_UINT32, 0}
106 ,
107 {"cons", IOV_CONS, 0, IOVT_BUFFER, 0}
108 ,
109#endif
110 {"clearcounts", IOV_CLEARCOUNTS, 0, IOVT_VOID, 0}
111 ,
112 {"gpioob", IOV_GPIOOB, 0, IOVT_UINT32, 0}
113 ,
114 {"ioctl_timeout", IOV_IOCTLTIMEOUT, 0, IOVT_UINT32, 0}
115 ,
116 {NULL, 0, 0, 0, 0}
117};
118
119void dhd_common_init(void)
120{
121 /* Init global variables at run-time, not as part of the declaration.
122 * This is required to support init/de-init of the driver.
123 * Initialization
124 * of globals as part of the declaration results in non-deterministic
125 * behaviour since the value of the globals may be different on the
126 * first time that the driver is initialized vs subsequent
127 * initializations.
128 */
129 dhd_msg_level = DHD_ERROR_VAL;
130#ifdef CONFIG_BCM4329_FW_PATH
131 strncpy(fw_path, CONFIG_BCM4329_FW_PATH, MOD_PARAM_PATHLEN - 1);
132#else
133 fw_path[0] = '\0';
134#endif
135#ifdef CONFIG_BCM4329_NVRAM_PATH
136 strncpy(nv_path, CONFIG_BCM4329_NVRAM_PATH, MOD_PARAM_PATHLEN - 1);
137#else
138 nv_path[0] = '\0';
139#endif
140}
141
142static int dhd_dump(dhd_pub_t *dhdp, char *buf, int buflen)
143{
144 char eabuf[ETHER_ADDR_STR_LEN];
145
146 struct bcmstrbuf b;
147 struct bcmstrbuf *strbuf = &b;
148
149 bcm_binit(strbuf, buf, buflen);
150
151 /* Base DHD info */
152 bcm_bprintf(strbuf, "%s\n", dhd_version);
153 bcm_bprintf(strbuf, "\n");
154 bcm_bprintf(strbuf, "pub.up %d pub.txoff %d pub.busstate %d\n",
155 dhdp->up, dhdp->txoff, dhdp->busstate);
156 bcm_bprintf(strbuf, "pub.hdrlen %d pub.maxctl %d pub.rxsz %d\n",
157 dhdp->hdrlen, dhdp->maxctl, dhdp->rxsz);
158 bcm_bprintf(strbuf, "pub.iswl %d pub.drv_version %ld pub.mac %s\n",
159 dhdp->iswl, dhdp->drv_version, bcm_ether_ntoa(&dhdp->mac,
160 eabuf));
161 bcm_bprintf(strbuf, "pub.bcmerror %d tickcnt %d\n", dhdp->bcmerror,
162 dhdp->tickcnt);
163
164 bcm_bprintf(strbuf, "dongle stats:\n");
165 bcm_bprintf(strbuf,
166 "tx_packets %ld tx_bytes %ld tx_errors %ld tx_dropped %ld\n",
167 dhdp->dstats.tx_packets, dhdp->dstats.tx_bytes,
168 dhdp->dstats.tx_errors, dhdp->dstats.tx_dropped);
169 bcm_bprintf(strbuf,
170 "rx_packets %ld rx_bytes %ld rx_errors %ld rx_dropped %ld\n",
171 dhdp->dstats.rx_packets, dhdp->dstats.rx_bytes,
172 dhdp->dstats.rx_errors, dhdp->dstats.rx_dropped);
173 bcm_bprintf(strbuf, "multicast %ld\n", dhdp->dstats.multicast);
174
175 bcm_bprintf(strbuf, "bus stats:\n");
176 bcm_bprintf(strbuf, "tx_packets %ld tx_multicast %ld tx_errors %ld\n",
177 dhdp->tx_packets, dhdp->tx_multicast, dhdp->tx_errors);
178 bcm_bprintf(strbuf, "tx_ctlpkts %ld tx_ctlerrs %ld\n",
179 dhdp->tx_ctlpkts, dhdp->tx_ctlerrs);
180 bcm_bprintf(strbuf, "rx_packets %ld rx_multicast %ld rx_errors %ld\n",
181 dhdp->rx_packets, dhdp->rx_multicast, dhdp->rx_errors);
182 bcm_bprintf(strbuf,
183 "rx_ctlpkts %ld rx_ctlerrs %ld rx_dropped %ld rx_flushed %ld\n",
184 dhdp->rx_ctlpkts, dhdp->rx_ctlerrs, dhdp->rx_dropped,
185 dhdp->rx_flushed);
186 bcm_bprintf(strbuf,
187 "rx_readahead_cnt %ld tx_realloc %ld fc_packets %ld\n",
188 dhdp->rx_readahead_cnt, dhdp->tx_realloc, dhdp->fc_packets);
189 bcm_bprintf(strbuf, "wd_dpc_sched %ld\n", dhdp->wd_dpc_sched);
190 bcm_bprintf(strbuf, "\n");
191
192 /* Add any prot info */
193 dhd_prot_dump(dhdp, strbuf);
194 bcm_bprintf(strbuf, "\n");
195
196 /* Add any bus info */
197 dhd_bus_dump(dhdp, strbuf);
198
199 return !strbuf->size ? BCME_BUFTOOSHORT : 0;
200}
201
202static int
66cbd3ab 203dhd_doiovar(dhd_pub_t *dhd_pub, const bcm_iovar_t *vi, u32 actionid,
cf2b4488
HP
204 const char *name, void *params, int plen, void *arg, int len,
205 int val_size)
206{
207 int bcmerror = 0;
3e26416e 208 s32 int_val = 0;
cf2b4488
HP
209
210 DHD_TRACE(("%s: Enter\n", __func__));
211
b229fad2
JC
212 bcmerror = bcm_iovar_lencheck(vi, arg, len, IOV_ISSET(actionid));
213 if (bcmerror != 0)
cf2b4488
HP
214 goto exit;
215
216 if (plen >= (int)sizeof(int_val))
217 bcopy(params, &int_val, sizeof(int_val));
218
219 switch (actionid) {
220 case IOV_GVAL(IOV_VERSION):
221 /* Need to have checked buffer length */
222 strncpy((char *)arg, dhd_version, len);
223 break;
224
225 case IOV_GVAL(IOV_MSGLEVEL):
3e26416e 226 int_val = (s32) dhd_msg_level;
cf2b4488
HP
227 bcopy(&int_val, arg, val_size);
228 break;
229
230 case IOV_SVAL(IOV_MSGLEVEL):
231 dhd_msg_level = int_val;
232 break;
233
234 case IOV_GVAL(IOV_BCMERRORSTR):
235 strncpy((char *)arg, bcmerrorstr(dhd_pub->bcmerror),
236 BCME_STRLEN);
237 ((char *)arg)[BCME_STRLEN - 1] = 0x00;
238 break;
239
240 case IOV_GVAL(IOV_BCMERROR):
3e26416e 241 int_val = (s32) dhd_pub->bcmerror;
cf2b4488
HP
242 bcopy(&int_val, arg, val_size);
243 break;
244
245 case IOV_GVAL(IOV_WDTICK):
3e26416e 246 int_val = (s32) dhd_watchdog_ms;
cf2b4488
HP
247 bcopy(&int_val, arg, val_size);
248 break;
249
250 case IOV_SVAL(IOV_WDTICK):
251 if (!dhd_pub->up) {
252 bcmerror = BCME_NOTUP;
253 break;
254 }
255 dhd_os_wd_timer(dhd_pub, (uint) int_val);
256 break;
257
258 case IOV_GVAL(IOV_DUMP):
259 bcmerror = dhd_dump(dhd_pub, arg, len);
260 break;
261
262#ifdef DHD_DEBUG
263 case IOV_GVAL(IOV_DCONSOLE_POLL):
3e26416e 264 int_val = (s32) dhd_console_ms;
cf2b4488
HP
265 bcopy(&int_val, arg, val_size);
266 break;
267
268 case IOV_SVAL(IOV_DCONSOLE_POLL):
269 dhd_console_ms = (uint) int_val;
270 break;
271
272 case IOV_SVAL(IOV_CONS):
273 if (len > 0)
274 bcmerror = dhd_bus_console_in(dhd_pub, arg, len - 1);
275 break;
276#endif
277
278 case IOV_SVAL(IOV_CLEARCOUNTS):
279 dhd_pub->tx_packets = dhd_pub->rx_packets = 0;
280 dhd_pub->tx_errors = dhd_pub->rx_errors = 0;
281 dhd_pub->tx_ctlpkts = dhd_pub->rx_ctlpkts = 0;
282 dhd_pub->tx_ctlerrs = dhd_pub->rx_ctlerrs = 0;
283 dhd_pub->rx_dropped = 0;
284 dhd_pub->rx_readahead_cnt = 0;
285 dhd_pub->tx_realloc = 0;
286 dhd_pub->wd_dpc_sched = 0;
287 memset(&dhd_pub->dstats, 0, sizeof(dhd_pub->dstats));
288 dhd_bus_clearcounts(dhd_pub);
289 break;
290
291 case IOV_GVAL(IOV_IOCTLTIMEOUT):{
3e26416e 292 int_val = (s32) dhd_os_get_ioctl_resp_timeout();
cf2b4488
HP
293 bcopy(&int_val, arg, sizeof(int_val));
294 break;
295 }
296
297 case IOV_SVAL(IOV_IOCTLTIMEOUT):{
298 if (int_val <= 0)
299 bcmerror = BCME_BADARG;
300 else
301 dhd_os_set_ioctl_resp_timeout((unsigned int)
302 int_val);
303 break;
304 }
305
306 default:
307 bcmerror = BCME_UNSUPPORTED;
308 break;
309 }
310
311exit:
312 return bcmerror;
313}
314
315/* Store the status of a connection attempt for later retrieval by an iovar */
66cbd3ab 316void dhd_store_conn_status(u32 event, u32 status, u32 reason)
cf2b4488
HP
317{
318 /* Do not overwrite a WLC_E_PRUNE with a WLC_E_SET_SSID
319 * because an encryption/rsn mismatch results in both events, and
320 * the important information is in the WLC_E_PRUNE.
321 */
322 if (!(event == WLC_E_SET_SSID && status == WLC_E_STATUS_FAIL &&
323 dhd_conn_event == WLC_E_PRUNE)) {
324 dhd_conn_event = event;
325 dhd_conn_status = status;
326 dhd_conn_reason = reason;
327 }
328}
329
330bool dhd_prec_enq(dhd_pub_t *dhdp, struct pktq *q, void *pkt, int prec)
331{
332 void *p;
333 int eprec = -1; /* precedence to evict from */
334 bool discard_oldest;
335
336 /* Fast case, precedence queue is not full and we are also not
337 * exceeding total queue length
338 */
339 if (!pktq_pfull(q, prec) && !pktq_full(q)) {
340 pktq_penq(q, prec, pkt);
341 return TRUE;
342 }
343
344 /* Determine precedence from which to evict packet, if any */
345 if (pktq_pfull(q, prec))
346 eprec = prec;
347 else if (pktq_full(q)) {
348 p = pktq_peek_tail(q, &eprec);
349 ASSERT(p);
350 if (eprec > prec)
351 return FALSE;
352 }
353
354 /* Evict if needed */
355 if (eprec >= 0) {
356 /* Detect queueing to unconfigured precedence */
357 ASSERT(!pktq_pempty(q, eprec));
358 discard_oldest = AC_BITMAP_TST(dhdp->wme_dp, eprec);
359 if (eprec == prec && !discard_oldest)
360 return FALSE; /* refuse newer (incoming) packet */
361 /* Evict packet according to discard policy */
362 p = discard_oldest ? pktq_pdeq(q, eprec) : pktq_pdeq_tail(q,
363 eprec);
364 if (p == NULL) {
365 DHD_ERROR(("%s: pktq_penq() failed, oldest %d.",
366 __func__, discard_oldest));
367 ASSERT(p);
368 }
369
370 PKTFREE(dhdp->osh, p, TRUE);
371 }
372
373 /* Enqueue */
374 p = pktq_penq(q, prec, pkt);
375 if (p == NULL) {
376 DHD_ERROR(("%s: pktq_penq() failed.", __func__));
377 ASSERT(p);
378 }
379
380 return TRUE;
381}
382
383static int
384dhd_iovar_op(dhd_pub_t *dhd_pub, const char *name,
385 void *params, int plen, void *arg, int len, bool set)
386{
387 int bcmerror = 0;
388 int val_size;
389 const bcm_iovar_t *vi = NULL;
66cbd3ab 390 u32 actionid;
cf2b4488
HP
391
392 DHD_TRACE(("%s: Enter\n", __func__));
393
394 ASSERT(name);
395 ASSERT(len >= 0);
396
397 /* Get MUST have return space */
398 ASSERT(set || (arg && len));
399
400 /* Set does NOT take qualifiers */
401 ASSERT(!set || (!params && !plen));
402
b229fad2
JC
403 vi = bcm_iovar_lookup(dhd_iovars, name);
404 if (vi == NULL) {
cf2b4488
HP
405 bcmerror = BCME_UNSUPPORTED;
406 goto exit;
407 }
408
409 DHD_CTL(("%s: %s %s, len %d plen %d\n", __func__,
410 name, (set ? "set" : "get"), len, plen));
411
412 /* set up 'params' pointer in case this is a set command so that
413 * the convenience int and bool code can be common to set and get
414 */
415 if (params == NULL) {
416 params = arg;
417 plen = len;
418 }
419
420 if (vi->type == IOVT_VOID)
421 val_size = 0;
422 else if (vi->type == IOVT_BUFFER)
423 val_size = len;
424 else
425 /* all other types are integer sized */
426 val_size = sizeof(int);
427
428 actionid = set ? IOV_SVAL(vi->varid) : IOV_GVAL(vi->varid);
429 bcmerror =
430 dhd_doiovar(dhd_pub, vi, actionid, name, params, plen, arg, len,
431 val_size);
432
433exit:
434 return bcmerror;
435}
436
437int dhd_ioctl(dhd_pub_t *dhd_pub, dhd_ioctl_t *ioc, void *buf, uint buflen)
438{
439 int bcmerror = 0;
440
441 DHD_TRACE(("%s: Enter\n", __func__));
442
443 if (!buf)
444 return BCME_BADARG;
445
446 switch (ioc->cmd) {
447 case DHD_GET_MAGIC:
448 if (buflen < sizeof(int))
449 bcmerror = BCME_BUFTOOSHORT;
450 else
451 *(int *)buf = DHD_IOCTL_MAGIC;
452 break;
453
454 case DHD_GET_VERSION:
455 if (buflen < sizeof(int))
456 bcmerror = -BCME_BUFTOOSHORT;
457 else
458 *(int *)buf = DHD_IOCTL_VERSION;
459 break;
460
461 case DHD_GET_VAR:
462 case DHD_SET_VAR:{
463 char *arg;
464 uint arglen;
465
466 /* scan past the name to any arguments */
467 for (arg = buf, arglen = buflen; *arg && arglen;
468 arg++, arglen--)
469 ;
470
471 if (*arg) {
472 bcmerror = BCME_BUFTOOSHORT;
473 break;
474 }
475
476 /* account for the NUL terminator */
477 arg++, arglen--;
478
479 /* call with the appropriate arguments */
480 if (ioc->cmd == DHD_GET_VAR)
481 bcmerror =
482 dhd_iovar_op(dhd_pub, buf, arg, arglen, buf,
483 buflen, IOV_GET);
484 else
485 bcmerror =
486 dhd_iovar_op(dhd_pub, buf, NULL, 0, arg,
487 arglen, IOV_SET);
488 if (bcmerror != BCME_UNSUPPORTED)
489 break;
490
491 /* not in generic table, try protocol module */
492 if (ioc->cmd == DHD_GET_VAR)
493 bcmerror = dhd_prot_iovar_op(dhd_pub, buf, arg,
494 arglen, buf,
495 buflen, IOV_GET);
496 else
497 bcmerror = dhd_prot_iovar_op(dhd_pub, buf,
498 NULL, 0, arg,
499 arglen, IOV_SET);
500 if (bcmerror != BCME_UNSUPPORTED)
501 break;
502
503 /* if still not found, try bus module */
504 if (ioc->cmd == DHD_GET_VAR)
505 bcmerror = dhd_bus_iovar_op(dhd_pub, buf,
506 arg, arglen, buf,
507 buflen, IOV_GET);
508 else
509 bcmerror = dhd_bus_iovar_op(dhd_pub, buf,
510 NULL, 0, arg,
511 arglen, IOV_SET);
512
513 break;
514 }
515
516 default:
517 bcmerror = BCME_UNSUPPORTED;
518 }
519
520 return bcmerror;
521}
522
523#ifdef SHOW_EVENTS
524static void wl_show_host_event(wl_event_msg_t *event, void *event_data)
525{
526 uint i, status, reason;
527 bool group = FALSE, flush_txq = FALSE, link = FALSE;
528 char *auth_str, *event_name;
580a0bd9 529 unsigned char *buf;
cf2b4488
HP
530 char err_msg[256], eabuf[ETHER_ADDR_STR_LEN];
531 static struct {
532 uint event;
533 char *event_name;
534 } event_names[] = {
535 {
536 WLC_E_SET_SSID, "SET_SSID"}, {
537 WLC_E_JOIN, "JOIN"}, {
538 WLC_E_START, "START"}, {
539 WLC_E_AUTH, "AUTH"}, {
540 WLC_E_AUTH_IND, "AUTH_IND"}, {
541 WLC_E_DEAUTH, "DEAUTH"}, {
542 WLC_E_DEAUTH_IND, "DEAUTH_IND"}, {
543 WLC_E_ASSOC, "ASSOC"}, {
544 WLC_E_ASSOC_IND, "ASSOC_IND"}, {
545 WLC_E_REASSOC, "REASSOC"}, {
546 WLC_E_REASSOC_IND, "REASSOC_IND"}, {
547 WLC_E_DISASSOC, "DISASSOC"}, {
548 WLC_E_DISASSOC_IND, "DISASSOC_IND"}, {
549 WLC_E_QUIET_START, "START_QUIET"}, {
550 WLC_E_QUIET_END, "END_QUIET"}, {
551 WLC_E_BEACON_RX, "BEACON_RX"}, {
552 WLC_E_LINK, "LINK"}, {
553 WLC_E_MIC_ERROR, "MIC_ERROR"}, {
554 WLC_E_NDIS_LINK, "NDIS_LINK"}, {
555 WLC_E_ROAM, "ROAM"}, {
556 WLC_E_TXFAIL, "TXFAIL"}, {
557 WLC_E_PMKID_CACHE, "PMKID_CACHE"}, {
558 WLC_E_RETROGRADE_TSF, "RETROGRADE_TSF"}, {
559 WLC_E_PRUNE, "PRUNE"}, {
560 WLC_E_AUTOAUTH, "AUTOAUTH"}, {
561 WLC_E_EAPOL_MSG, "EAPOL_MSG"}, {
562 WLC_E_SCAN_COMPLETE, "SCAN_COMPLETE"}, {
563 WLC_E_ADDTS_IND, "ADDTS_IND"}, {
564 WLC_E_DELTS_IND, "DELTS_IND"}, {
565 WLC_E_BCNSENT_IND, "BCNSENT_IND"}, {
566 WLC_E_BCNRX_MSG, "BCNRX_MSG"}, {
567 WLC_E_BCNLOST_MSG, "BCNLOST_MSG"}, {
568 WLC_E_ROAM_PREP, "ROAM_PREP"}, {
569 WLC_E_PFN_NET_FOUND, "PNO_NET_FOUND"}, {
570 WLC_E_PFN_NET_LOST, "PNO_NET_LOST"}, {
571 WLC_E_RESET_COMPLETE, "RESET_COMPLETE"}, {
572 WLC_E_JOIN_START, "JOIN_START"}, {
573 WLC_E_ROAM_START, "ROAM_START"}, {
574 WLC_E_ASSOC_START, "ASSOC_START"}, {
575 WLC_E_IBSS_ASSOC, "IBSS_ASSOC"}, {
576 WLC_E_RADIO, "RADIO"}, {
577 WLC_E_PSM_WATCHDOG, "PSM_WATCHDOG"}, {
578 WLC_E_PROBREQ_MSG, "PROBREQ_MSG"}, {
579 WLC_E_SCAN_CONFIRM_IND, "SCAN_CONFIRM_IND"}, {
580 WLC_E_PSK_SUP, "PSK_SUP"}, {
581 WLC_E_COUNTRY_CODE_CHANGED, "COUNTRY_CODE_CHANGED"}, {
582 WLC_E_EXCEEDED_MEDIUM_TIME, "EXCEEDED_MEDIUM_TIME"}, {
583 WLC_E_ICV_ERROR, "ICV_ERROR"}, {
584 WLC_E_UNICAST_DECODE_ERROR, "UNICAST_DECODE_ERROR"}, {
585 WLC_E_MULTICAST_DECODE_ERROR, "MULTICAST_DECODE_ERROR"}, {
586 WLC_E_TRACE, "TRACE"}, {
587 WLC_E_ACTION_FRAME, "ACTION FRAME"}, {
588 WLC_E_ACTION_FRAME_COMPLETE, "ACTION FRAME TX COMPLETE"}, {
589 WLC_E_IF, "IF"}, {
590 WLC_E_RSSI, "RSSI"}, {
591 WLC_E_PFN_SCAN_COMPLETE, "SCAN_COMPLETE"}
592 };
593 uint event_type, flags, auth_type, datalen;
594 event_type = ntoh32(event->event_type);
595 flags = ntoh16(event->flags);
596 status = ntoh32(event->status);
597 reason = ntoh32(event->reason);
598 auth_type = ntoh32(event->auth_type);
599 datalen = ntoh32(event->datalen);
600 /* debug dump of event messages */
601 sprintf(eabuf, "%02x:%02x:%02x:%02x:%02x:%02x",
580a0bd9
GKH
602 (unsigned char) event->addr.octet[0] & 0xff,
603 (unsigned char) event->addr.octet[1] & 0xff,
604 (unsigned char) event->addr.octet[2] & 0xff,
605 (unsigned char) event->addr.octet[3] & 0xff,
606 (unsigned char) event->addr.octet[4] & 0xff,
607 (unsigned char) event->addr.octet[5] & 0xff);
cf2b4488
HP
608
609 event_name = "UNKNOWN";
610 for (i = 0; i < ARRAYSIZE(event_names); i++) {
611 if (event_names[i].event == event_type)
612 event_name = event_names[i].event_name;
613 }
614
615 DHD_EVENT(("EVENT: %s, event ID = %d\n", event_name, event_type));
616
617 if (flags & WLC_EVENT_MSG_LINK)
618 link = TRUE;
619 if (flags & WLC_EVENT_MSG_GROUP)
620 group = TRUE;
621 if (flags & WLC_EVENT_MSG_FLUSHTXQ)
622 flush_txq = TRUE;
623
624 switch (event_type) {
625 case WLC_E_START:
626 case WLC_E_DEAUTH:
627 case WLC_E_DISASSOC:
628 DHD_EVENT(("MACEVENT: %s, MAC %s\n", event_name, eabuf));
629 break;
630
631 case WLC_E_ASSOC_IND:
632 case WLC_E_REASSOC_IND:
633 DHD_EVENT(("MACEVENT: %s, MAC %s\n", event_name, eabuf));
634 break;
635
636 case WLC_E_ASSOC:
637 case WLC_E_REASSOC:
638 if (status == WLC_E_STATUS_SUCCESS) {
639 DHD_EVENT(("MACEVENT: %s, MAC %s, SUCCESS\n",
640 event_name, eabuf));
641 } else if (status == WLC_E_STATUS_TIMEOUT) {
642 DHD_EVENT(("MACEVENT: %s, MAC %s, TIMEOUT\n",
643 event_name, eabuf));
644 } else if (status == WLC_E_STATUS_FAIL) {
645 DHD_EVENT(("MACEVENT: %s, MAC %s, FAILURE, reason %d\n",
646 event_name, eabuf, (int)reason));
647 } else {
648 DHD_EVENT(("MACEVENT: %s, MAC %s, unexpected status "
649 "%d\n", event_name, eabuf, (int)status));
650 }
651 break;
652
653 case WLC_E_DEAUTH_IND:
654 case WLC_E_DISASSOC_IND:
655 DHD_EVENT(("MACEVENT: %s, MAC %s, reason %d\n", event_name,
656 eabuf, (int)reason));
657 break;
658
659 case WLC_E_AUTH:
660 case WLC_E_AUTH_IND:
661 if (auth_type == DOT11_OPEN_SYSTEM)
662 auth_str = "Open System";
663 else if (auth_type == DOT11_SHARED_KEY)
664 auth_str = "Shared Key";
665 else {
666 sprintf(err_msg, "AUTH unknown: %d", (int)auth_type);
667 auth_str = err_msg;
668 }
669 if (event_type == WLC_E_AUTH_IND) {
670 DHD_EVENT(("MACEVENT: %s, MAC %s, %s\n", event_name,
671 eabuf, auth_str));
672 } else if (status == WLC_E_STATUS_SUCCESS) {
673 DHD_EVENT(("MACEVENT: %s, MAC %s, %s, SUCCESS\n",
674 event_name, eabuf, auth_str));
675 } else if (status == WLC_E_STATUS_TIMEOUT) {
676 DHD_EVENT(("MACEVENT: %s, MAC %s, %s, TIMEOUT\n",
677 event_name, eabuf, auth_str));
678 } else if (status == WLC_E_STATUS_FAIL) {
679 DHD_EVENT(("MACEVENT: %s, MAC %s, %s, FAILURE, "
680 "reason %d\n",
681 event_name, eabuf, auth_str, (int)reason));
682 }
683
684 break;
685
686 case WLC_E_JOIN:
687 case WLC_E_ROAM:
688 case WLC_E_SET_SSID:
689 if (status == WLC_E_STATUS_SUCCESS) {
690 DHD_EVENT(("MACEVENT: %s, MAC %s\n", event_name,
691 eabuf));
692 } else if (status == WLC_E_STATUS_FAIL) {
693 DHD_EVENT(("MACEVENT: %s, failed\n", event_name));
694 } else if (status == WLC_E_STATUS_NO_NETWORKS) {
695 DHD_EVENT(("MACEVENT: %s, no networks found\n",
696 event_name));
697 } else {
698 DHD_EVENT(("MACEVENT: %s, unexpected status %d\n",
699 event_name, (int)status));
700 }
701 break;
702
703 case WLC_E_BEACON_RX:
704 if (status == WLC_E_STATUS_SUCCESS) {
705 DHD_EVENT(("MACEVENT: %s, SUCCESS\n", event_name));
706 } else if (status == WLC_E_STATUS_FAIL) {
707 DHD_EVENT(("MACEVENT: %s, FAIL\n", event_name));
708 } else {
709 DHD_EVENT(("MACEVENT: %s, status %d\n", event_name,
710 status));
711 }
712 break;
713
714 case WLC_E_LINK:
715 DHD_EVENT(("MACEVENT: %s %s\n", event_name,
716 link ? "UP" : "DOWN"));
717 break;
718
719 case WLC_E_MIC_ERROR:
720 DHD_EVENT(("MACEVENT: %s, MAC %s, Group %d, Flush %d\n",
721 event_name, eabuf, group, flush_txq));
722 break;
723
724 case WLC_E_ICV_ERROR:
725 case WLC_E_UNICAST_DECODE_ERROR:
726 case WLC_E_MULTICAST_DECODE_ERROR:
727 DHD_EVENT(("MACEVENT: %s, MAC %s\n", event_name, eabuf));
728 break;
729
730 case WLC_E_TXFAIL:
731 DHD_EVENT(("MACEVENT: %s, RA %s\n", event_name, eabuf));
732 break;
733
734 case WLC_E_SCAN_COMPLETE:
735 case WLC_E_PMKID_CACHE:
736 DHD_EVENT(("MACEVENT: %s\n", event_name));
737 break;
738
739 case WLC_E_PFN_NET_FOUND:
740 case WLC_E_PFN_NET_LOST:
741 case WLC_E_PFN_SCAN_COMPLETE:
742 DHD_EVENT(("PNOEVENT: %s\n", event_name));
743 break;
744
745 case WLC_E_PSK_SUP:
746 case WLC_E_PRUNE:
747 DHD_EVENT(("MACEVENT: %s, status %d, reason %d\n",
748 event_name, (int)status, (int)reason));
749 break;
750
751 case WLC_E_TRACE:
752 {
66cbd3ab 753 static u32 seqnum_prev;
cf2b4488 754 msgtrace_hdr_t hdr;
66cbd3ab 755 u32 nblost;
cf2b4488
HP
756 char *s, *p;
757
580a0bd9 758 buf = (unsigned char *) event_data;
cf2b4488
HP
759 memcpy(&hdr, buf, MSGTRACE_HDRLEN);
760
761 if (hdr.version != MSGTRACE_VERSION) {
762 printf
763 ("\nMACEVENT: %s [unsupported version --> "
764 "dhd version:%d dongle version:%d]\n",
765 event_name, MSGTRACE_VERSION, hdr.version);
766 /* Reset datalen to avoid display below */
767 datalen = 0;
768 break;
769 }
770
771 /* There are 2 bytes available at the end of data */
772 buf[MSGTRACE_HDRLEN + ntoh16(hdr.len)] = '\0';
773
774 if (ntoh32(hdr.discarded_bytes)
775 || ntoh32(hdr.discarded_printf)) {
776 printf
777 ("\nWLC_E_TRACE: [Discarded traces in dongle -->"
778 "discarded_bytes %d discarded_printf %d]\n",
779 ntoh32(hdr.discarded_bytes),
780 ntoh32(hdr.discarded_printf));
781 }
782
783 nblost = ntoh32(hdr.seqnum) - seqnum_prev - 1;
784 if (nblost > 0) {
785 printf
786 ("\nWLC_E_TRACE: [Event lost --> seqnum %d nblost %d\n",
787 ntoh32(hdr.seqnum), nblost);
788 }
789 seqnum_prev = ntoh32(hdr.seqnum);
790
791 /* Display the trace buffer. Advance from \n to \n to
792 * avoid display big
793 * printf (issue with Linux printk )
794 */
795 p = (char *)&buf[MSGTRACE_HDRLEN];
796 while ((s = strstr(p, "\n")) != NULL) {
797 *s = '\0';
798 printf("%s\n", p);
799 p = s + 1;
800 }
801 printf("%s\n", p);
802
803 /* Reset datalen to avoid display below */
804 datalen = 0;
805 }
806 break;
807
808 case WLC_E_RSSI:
809 DHD_EVENT(("MACEVENT: %s %d\n", event_name,
810 ntoh32(*((int *)event_data))));
811 break;
812
813 default:
814 DHD_EVENT(("MACEVENT: %s %d, MAC %s, status %d, reason %d, "
815 "auth %d\n", event_name, event_type, eabuf,
816 (int)status, (int)reason, (int)auth_type));
817 break;
818 }
819
820 /* show any appended data */
821 if (datalen) {
580a0bd9 822 buf = (unsigned char *) event_data;
cf2b4488
HP
823 DHD_EVENT((" data (%d) : ", datalen));
824 for (i = 0; i < datalen; i++)
825 DHD_EVENT((" 0x%02x ", *buf++));
826 DHD_EVENT(("\n"));
827 }
828}
829#endif /* SHOW_EVENTS */
830
831int
832wl_host_event(struct dhd_info *dhd, int *ifidx, void *pktdata,
833 wl_event_msg_t *event, void **data_ptr)
834{
835 /* check whether packet is a BRCM event pkt */
836 bcm_event_t *pvt_data = (bcm_event_t *) pktdata;
837 char *event_data;
66cbd3ab 838 u32 type, status;
7d4df48e 839 u16 flags;
cf2b4488
HP
840 int evlen;
841
842 if (bcmp(BRCM_OUI, &pvt_data->bcm_hdr.oui[0], DOT11_OUI_LEN)) {
843 DHD_ERROR(("%s: mismatched OUI, bailing\n", __func__));
844 return BCME_ERROR;
845 }
846
847 /* BRCM event pkt may be unaligned - use xxx_ua to load user_subtype. */
848 if (ntoh16_ua((void *)&pvt_data->bcm_hdr.usr_subtype) !=
849 BCMILCP_BCM_SUBTYPE_EVENT) {
850 DHD_ERROR(("%s: mismatched subtype, bailing\n", __func__));
851 return BCME_ERROR;
852 }
853
854 *data_ptr = &pvt_data[1];
855 event_data = *data_ptr;
856
857 /* memcpy since BRCM event pkt may be unaligned. */
858 memcpy(event, &pvt_data->event, sizeof(wl_event_msg_t));
859
860 type = ntoh32_ua((void *)&event->event_type);
861 flags = ntoh16_ua((void *)&event->flags);
862 status = ntoh32_ua((void *)&event->status);
863 evlen = ntoh32_ua((void *)&event->datalen) + sizeof(bcm_event_t);
864
865 switch (type) {
866 case WLC_E_IF:
867 {
868 dhd_if_event_t *ifevent = (dhd_if_event_t *) event_data;
869 DHD_TRACE(("%s: if event\n", __func__));
870
871 if (ifevent->ifidx > 0 &&
872 ifevent->ifidx < DHD_MAX_IFS) {
873 if (ifevent->action == WLC_E_IF_ADD)
874 dhd_add_if(dhd, ifevent->ifidx,
875 NULL, event->ifname,
876 pvt_data->eth.ether_dhost,
877 ifevent->flags,
878 ifevent->bssidx);
879 else
880 dhd_del_if(dhd, ifevent->ifidx);
881 } else {
882 DHD_ERROR(("%s: Invalid ifidx %d for %s\n",
883 __func__, ifevent->ifidx,
884 event->ifname));
885 }
886 }
887 /* send up the if event: btamp user needs it */
888 *ifidx = dhd_ifname2idx(dhd, event->ifname);
889 /* push up to external supp/auth */
890 dhd_event(dhd, (char *)pvt_data, evlen, *ifidx);
891 break;
892
893#ifdef P2P
894 case WLC_E_NDIS_LINK:
895 break;
896#endif
897 /* fall through */
898 /* These are what external supplicant/authenticator wants */
899 case WLC_E_LINK:
900 case WLC_E_ASSOC_IND:
901 case WLC_E_REASSOC_IND:
902 case WLC_E_DISASSOC_IND:
903 case WLC_E_MIC_ERROR:
904 default:
905 /* Fall through: this should get _everything_ */
906
907 *ifidx = dhd_ifname2idx(dhd, event->ifname);
908 /* push up to external supp/auth */
909 dhd_event(dhd, (char *)pvt_data, evlen, *ifidx);
910 DHD_TRACE(("%s: MAC event %d, flags %x, status %x\n",
911 __func__, type, flags, status));
912
913 /* put it back to WLC_E_NDIS_LINK */
914 if (type == WLC_E_NDIS_LINK) {
66cbd3ab 915 u32 temp;
cf2b4488
HP
916
917 temp = ntoh32_ua((void *)&event->event_type);
918 DHD_TRACE(("Converted to WLC_E_LINK type %d\n", temp));
919
920 temp = ntoh32(WLC_E_NDIS_LINK);
921 memcpy((void *)(&pvt_data->event.event_type), &temp,
922 sizeof(pvt_data->event.event_type));
923 }
924 break;
925 }
926
927#ifdef SHOW_EVENTS
928 wl_show_host_event(event, event_data);
929#endif /* SHOW_EVENTS */
930
931 return BCME_OK;
932}
933
934void wl_event_to_host_order(wl_event_msg_t *evt)
935{
936 /* Event struct members passed from dongle to host are stored
937 * in network
938 * byte order. Convert all members to host-order.
939 */
940 evt->event_type = ntoh32(evt->event_type);
941 evt->flags = ntoh16(evt->flags);
942 evt->status = ntoh32(evt->status);
943 evt->reason = ntoh32(evt->reason);
944 evt->auth_type = ntoh32(evt->auth_type);
945 evt->datalen = ntoh32(evt->datalen);
946 evt->version = ntoh16(evt->version);
947}
948
949void print_buf(void *pbuf, int len, int bytes_per_line)
950{
951 int i, j = 0;
952 unsigned char *buf = pbuf;
953
954 if (bytes_per_line == 0)
955 bytes_per_line = len;
956
957 for (i = 0; i < len; i++) {
958 printf("%2.2x", *buf++);
959 j++;
960 if (j == bytes_per_line) {
961 printf("\n");
962 j = 0;
963 } else {
964 printf(":");
965 }
966 }
967 printf("\n");
968}
969
970#define strtoul(nptr, endptr, base) bcm_strtoul((nptr), (endptr), (base))
971
972/* Convert user's input in hex pattern to byte-size mask */
973static int wl_pattern_atoh(char *src, char *dst)
974{
975 int i;
976 if (strncmp(src, "0x", 2) != 0 && strncmp(src, "0X", 2) != 0) {
977 DHD_ERROR(("Mask invalid format. Needs to start with 0x\n"));
978 return -1;
979 }
980 src = src + 2; /* Skip past 0x */
981 if (strlen(src) % 2 != 0) {
982 DHD_ERROR(("Mask invalid format. Length must be even.\n"));
983 return -1;
984 }
985 for (i = 0; *src != '\0'; i++) {
986 char num[3];
987 strncpy(num, src, 2);
988 num[2] = '\0';
3fd79f7c 989 dst[i] = (u8) strtoul(num, NULL, 16);
cf2b4488
HP
990 src += 2;
991 }
992 return i;
993}
994
995void
996dhd_pktfilter_offload_enable(dhd_pub_t *dhd, char *arg, int enable,
997 int master_mode)
998{
999 char *argv[8];
1000 int i = 0;
1001 const char *str;
1002 int buf_len;
1003 int str_len;
1004 char *arg_save = 0, *arg_org = 0;
1005 int rc;
1006 char buf[128];
1007 wl_pkt_filter_enable_t enable_parm;
1008 wl_pkt_filter_enable_t *pkt_filterp;
1009
b229fad2
JC
1010 arg_save = MALLOC(dhd->osh, strlen(arg) + 1);
1011 if (!arg_save) {
cf2b4488
HP
1012 DHD_ERROR(("%s: kmalloc failed\n", __func__));
1013 goto fail;
1014 }
1015 arg_org = arg_save;
1016 memcpy(arg_save, arg, strlen(arg) + 1);
1017
1018 argv[i] = bcmstrtok(&arg_save, " ", 0);
1019
1020 i = 0;
1021 if (NULL == argv[i]) {
1022 DHD_ERROR(("No args provided\n"));
1023 goto fail;
1024 }
1025
1026 str = "pkt_filter_enable";
1027 str_len = strlen(str);
1028 strncpy(buf, str, str_len);
1029 buf[str_len] = '\0';
1030 buf_len = str_len + 1;
1031
1032 pkt_filterp = (wl_pkt_filter_enable_t *) (buf + str_len + 1);
1033
1034 /* Parse packet filter id. */
1035 enable_parm.id = htod32(strtoul(argv[i], NULL, 0));
1036
1037 /* Parse enable/disable value. */
1038 enable_parm.enable = htod32(enable);
1039
1040 buf_len += sizeof(enable_parm);
1041 memcpy((char *)pkt_filterp, &enable_parm, sizeof(enable_parm));
1042
1043 /* Enable/disable the specified filter. */
1044 rc = dhdcdc_set_ioctl(dhd, 0, WLC_SET_VAR, buf, buf_len);
1045 rc = rc >= 0 ? 0 : rc;
1046 if (rc)
1047 DHD_TRACE(("%s: failed to add pktfilter %s, retcode = %d\n",
1048 __func__, arg, rc));
1049 else
1050 DHD_TRACE(("%s: successfully added pktfilter %s\n",
1051 __func__, arg));
1052
1053 /* Contorl the master mode */
1054 bcm_mkiovar("pkt_filter_mode", (char *)&master_mode, 4, buf,
1055 sizeof(buf));
1056 rc = dhdcdc_set_ioctl(dhd, 0, WLC_SET_VAR, buf, sizeof(buf));
1057 rc = rc >= 0 ? 0 : rc;
1058 if (rc)
1059 DHD_TRACE(("%s: failed to add pktfilter %s, retcode = %d\n",
1060 __func__, arg, rc));
1061
1062fail:
1063 if (arg_org)
1064 MFREE(dhd->osh, arg_org, strlen(arg) + 1);
1065}
1066
1067void dhd_pktfilter_offload_set(dhd_pub_t *dhd, char *arg)
1068{
1069 const char *str;
1070 wl_pkt_filter_t pkt_filter;
1071 wl_pkt_filter_t *pkt_filterp;
1072 int buf_len;
1073 int str_len;
1074 int rc;
66cbd3ab
GKH
1075 u32 mask_size;
1076 u32 pattern_size;
cf2b4488
HP
1077 char *argv[8], *buf = 0;
1078 int i = 0;
1079 char *arg_save = 0, *arg_org = 0;
1080#define BUF_SIZE 2048
1081
81e95f9d
JC
1082 arg_save = MALLOC(dhd->osh, strlen(arg) + 1);
1083 if (!arg_save) {
cf2b4488
HP
1084 DHD_ERROR(("%s: kmalloc failed\n", __func__));
1085 goto fail;
1086 }
1087
1088 arg_org = arg_save;
1089
81e95f9d
JC
1090 buf = MALLOC(dhd->osh, BUF_SIZE);
1091 if (!buf) {
cf2b4488
HP
1092 DHD_ERROR(("%s: kmalloc failed\n", __func__));
1093 goto fail;
1094 }
1095
1096 memcpy(arg_save, arg, strlen(arg) + 1);
1097
1098 if (strlen(arg) > BUF_SIZE) {
1099 DHD_ERROR(("Not enough buffer %d < %d\n", (int)strlen(arg),
1100 (int)sizeof(buf)));
1101 goto fail;
1102 }
1103
1104 argv[i] = bcmstrtok(&arg_save, " ", 0);
1105 while (argv[i++])
1106 argv[i] = bcmstrtok(&arg_save, " ", 0);
1107
1108 i = 0;
1109 if (NULL == argv[i]) {
1110 DHD_ERROR(("No args provided\n"));
1111 goto fail;
1112 }
1113
1114 str = "pkt_filter_add";
1115 str_len = strlen(str);
1116 strncpy(buf, str, str_len);
1117 buf[str_len] = '\0';
1118 buf_len = str_len + 1;
1119
1120 pkt_filterp = (wl_pkt_filter_t *) (buf + str_len + 1);
1121
1122 /* Parse packet filter id. */
1123 pkt_filter.id = htod32(strtoul(argv[i], NULL, 0));
1124
1125 if (NULL == argv[++i]) {
1126 DHD_ERROR(("Polarity not provided\n"));
1127 goto fail;
1128 }
1129
1130 /* Parse filter polarity. */
1131 pkt_filter.negate_match = htod32(strtoul(argv[i], NULL, 0));
1132
1133 if (NULL == argv[++i]) {
1134 DHD_ERROR(("Filter type not provided\n"));
1135 goto fail;
1136 }
1137
1138 /* Parse filter type. */
1139 pkt_filter.type = htod32(strtoul(argv[i], NULL, 0));
1140
1141 if (NULL == argv[++i]) {
1142 DHD_ERROR(("Offset not provided\n"));
1143 goto fail;
1144 }
1145
1146 /* Parse pattern filter offset. */
1147 pkt_filter.u.pattern.offset = htod32(strtoul(argv[i], NULL, 0));
1148
1149 if (NULL == argv[++i]) {
1150 DHD_ERROR(("Bitmask not provided\n"));
1151 goto fail;
1152 }
1153
1154 /* Parse pattern filter mask. */
1155 mask_size =
1156 htod32(wl_pattern_atoh
1157 (argv[i], (char *)pkt_filterp->u.pattern.mask_and_pattern));
1158
1159 if (NULL == argv[++i]) {
1160 DHD_ERROR(("Pattern not provided\n"));
1161 goto fail;
1162 }
1163
1164 /* Parse pattern filter pattern. */
1165 pattern_size =
1166 htod32(wl_pattern_atoh(argv[i],
1167 (char *)&pkt_filterp->u.pattern.
1168 mask_and_pattern[mask_size]));
1169
1170 if (mask_size != pattern_size) {
1171 DHD_ERROR(("Mask and pattern not the same size\n"));
1172 goto fail;
1173 }
1174
1175 pkt_filter.u.pattern.size_bytes = mask_size;
1176 buf_len += WL_PKT_FILTER_FIXED_LEN;
1177 buf_len += (WL_PKT_FILTER_PATTERN_FIXED_LEN + 2 * mask_size);
1178
1179 /* Keep-alive attributes are set in local
1180 * variable (keep_alive_pkt), and
1181 ** then memcpy'ed into buffer (keep_alive_pktp) since there is no
1182 ** guarantee that the buffer is properly aligned.
1183 */
1184 memcpy((char *)pkt_filterp,
1185 &pkt_filter,
1186 WL_PKT_FILTER_FIXED_LEN + WL_PKT_FILTER_PATTERN_FIXED_LEN);
1187
1188 rc = dhdcdc_set_ioctl(dhd, 0, WLC_SET_VAR, buf, buf_len);
1189 rc = rc >= 0 ? 0 : rc;
1190
1191 if (rc)
1192 DHD_TRACE(("%s: failed to add pktfilter %s, retcode = %d\n",
1193 __func__, arg, rc));
1194 else
1195 DHD_TRACE(("%s: successfully added pktfilter %s\n",
1196 __func__, arg));
1197
1198fail:
1199 if (arg_org)
1200 MFREE(dhd->osh, arg_org, strlen(arg) + 1);
1201
1202 if (buf)
1203 MFREE(dhd->osh, buf, BUF_SIZE);
1204}
1205
1206void dhd_arp_offload_set(dhd_pub_t *dhd, int arp_mode)
1207{
1208 char iovbuf[32];
1209 int retcode;
1210
1211 bcm_mkiovar("arp_ol", (char *)&arp_mode, 4, iovbuf, sizeof(iovbuf));
1212 retcode = dhdcdc_set_ioctl(dhd, 0, WLC_SET_VAR, iovbuf, sizeof(iovbuf));
1213 retcode = retcode >= 0 ? 0 : retcode;
1214 if (retcode)
1215 DHD_TRACE(("%s: failed to set ARP offload mode to 0x%x, "
1216 "retcode = %d\n", __func__, arp_mode, retcode));
1217 else
1218 DHD_TRACE(("%s: successfully set ARP offload mode to 0x%x\n",
1219 __func__, arp_mode));
1220}
1221
1222void dhd_arp_offload_enable(dhd_pub_t *dhd, int arp_enable)
1223{
1224 char iovbuf[32];
1225 int retcode;
1226
1227 bcm_mkiovar("arpoe", (char *)&arp_enable, 4, iovbuf, sizeof(iovbuf));
1228 retcode = dhdcdc_set_ioctl(dhd, 0, WLC_SET_VAR, iovbuf, sizeof(iovbuf));
1229 retcode = retcode >= 0 ? 0 : retcode;
1230 if (retcode)
1231 DHD_TRACE(("%s: failed to enabe ARP offload to %d, "
1232 "retcode = %d\n", __func__, arp_enable, retcode));
1233 else
1234 DHD_TRACE(("%s: successfully enabed ARP offload to %d\n",
1235 __func__, arp_enable));
1236}
1237
1238int dhd_preinit_ioctls(dhd_pub_t *dhd)
1239{
1240 char iovbuf[WL_EVENTING_MASK_LEN + 12]; /* Room for
1241 "event_msgs" + '\0' + bitvec */
1242 uint up = 0;
1243 char buf[128], *ptr;
1244 uint power_mode = PM_FAST;
66cbd3ab
GKH
1245 u32 dongle_align = DHD_SDALIGN;
1246 u32 glom = 0;
cf2b4488
HP
1247 uint bcn_timeout = 3;
1248 int scan_assoc_time = 40;
1249 int scan_unassoc_time = 40;
1250#ifdef GET_CUSTOM_MAC_ENABLE
1251 int ret = 0;
1252 struct ether_addr ea_addr;
1253#endif /* GET_CUSTOM_MAC_ENABLE */
1254
1255 dhd_os_proto_block(dhd);
1256
1257#ifdef GET_CUSTOM_MAC_ENABLE
1258 /* Read MAC address from external customer place
1259 ** NOTE that default mac address has to be present in
1260 ** otp or nvram file to bring up
1261 ** firmware but unique per board mac address maybe provided by
1262 ** customer code
1263 */
1264 ret = dhd_custom_get_mac_address(ea_addr.octet);
1265 if (!ret) {
1266 bcm_mkiovar("cur_etheraddr", (void *)&ea_addr, ETHER_ADDR_LEN,
1267 buf, sizeof(buf));
1268 ret = dhdcdc_set_ioctl(dhd, 0, WLC_SET_VAR, buf, sizeof(buf));
1269 if (ret < 0) {
1270 DHD_ERROR(("%s: can't set MAC address , error=%d\n",
1271 __func__, ret));
1272 } else
1273 memcpy(dhd->mac.octet, (void *)&ea_addr,
1274 ETHER_ADDR_LEN);
1275 }
1276#endif /* GET_CUSTOM_MAC_ENABLE */
1277
1278 /* Set Country code */
1279 if (dhd->country_code[0] != 0) {
1280 if (dhdcdc_set_ioctl(dhd, 0, WLC_SET_COUNTRY,
1281 dhd->country_code,
1282 sizeof(dhd->country_code)) < 0) {
1283 DHD_ERROR(("%s: country code setting failed\n",
1284 __func__));
1285 }
1286 }
1287
1288 /* query for 'ver' to get version info from firmware */
1289 memset(buf, 0, sizeof(buf));
1290 ptr = buf;
1291 bcm_mkiovar("ver", 0, 0, buf, sizeof(buf));
1292 dhdcdc_query_ioctl(dhd, 0, WLC_GET_VAR, buf, sizeof(buf));
1293 bcmstrtok(&ptr, "\n", 0);
1294 /* Print fw version info */
1295 DHD_ERROR(("Firmware version = %s\n", buf));
1296
1297 /* Set PowerSave mode */
1298 dhdcdc_set_ioctl(dhd, 0, WLC_SET_PM, (char *)&power_mode,
1299 sizeof(power_mode));
1300
1301 /* Match Host and Dongle rx alignment */
1302 bcm_mkiovar("bus:txglomalign", (char *)&dongle_align, 4, iovbuf,
1303 sizeof(iovbuf));
1304 dhdcdc_set_ioctl(dhd, 0, WLC_SET_VAR, iovbuf, sizeof(iovbuf));
1305
1306 /* disable glom option per default */
1307 bcm_mkiovar("bus:txglom", (char *)&glom, 4, iovbuf, sizeof(iovbuf));
1308 dhdcdc_set_ioctl(dhd, 0, WLC_SET_VAR, iovbuf, sizeof(iovbuf));
1309
1310 /* Setup timeout if Beacons are lost and roam is off to report
1311 link down */
1312 bcm_mkiovar("bcn_timeout", (char *)&bcn_timeout, 4, iovbuf,
1313 sizeof(iovbuf));
1314 dhdcdc_set_ioctl(dhd, 0, WLC_SET_VAR, iovbuf, sizeof(iovbuf));
1315
1316 /* Enable/Disable build-in roaming to allowed ext supplicant to take
1317 of romaing */
1318 bcm_mkiovar("roam_off", (char *)&dhd_roam, 4, iovbuf, sizeof(iovbuf));
1319 dhdcdc_set_ioctl(dhd, 0, WLC_SET_VAR, iovbuf, sizeof(iovbuf));
1320
1321 /* Force STA UP */
1322 if (dhd_radio_up)
1323 dhdcdc_set_ioctl(dhd, 0, WLC_UP, (char *)&up, sizeof(up));
1324
1325 /* Setup event_msgs */
1326 bcm_mkiovar("event_msgs", dhd->eventmask, WL_EVENTING_MASK_LEN, iovbuf,
1327 sizeof(iovbuf));
1328 dhdcdc_set_ioctl(dhd, 0, WLC_SET_VAR, iovbuf, sizeof(iovbuf));
1329
1330 dhdcdc_set_ioctl(dhd, 0, WLC_SET_SCAN_CHANNEL_TIME,
1331 (char *)&scan_assoc_time, sizeof(scan_assoc_time));
1332 dhdcdc_set_ioctl(dhd, 0, WLC_SET_SCAN_UNASSOC_TIME,
1333 (char *)&scan_unassoc_time, sizeof(scan_unassoc_time));
1334
1335#ifdef ARP_OFFLOAD_SUPPORT
1336 /* Set and enable ARP offload feature */
1337 if (dhd_arp_enable)
1338 dhd_arp_offload_set(dhd, dhd_arp_mode);
1339 dhd_arp_offload_enable(dhd, dhd_arp_enable);
1340#endif /* ARP_OFFLOAD_SUPPORT */
1341
1342#ifdef PKT_FILTER_SUPPORT
1343 {
1344 int i;
1345 /* Set up pkt filter */
1346 if (dhd_pkt_filter_enable) {
1347 for (i = 0; i < dhd->pktfilter_count; i++) {
1348 dhd_pktfilter_offload_set(dhd,
1349 dhd->pktfilter[i]);
1350 dhd_pktfilter_offload_enable(dhd,
1351 dhd->pktfilter[i],
1352 dhd_pkt_filter_init,
1353 dhd_master_mode);
1354 }
1355 }
1356 }
1357#endif /* PKT_FILTER_SUPPORT */
1358
1359 dhd_os_proto_unblock(dhd);
1360
1361 return 0;
1362}
1363
1364#ifdef SIMPLE_ISCAN
1365uint iscan_thread_id;
6998d337 1366iscan_buf_t *iscan_chain;
cf2b4488
HP
1367
1368iscan_buf_t *dhd_iscan_allocate_buf(dhd_pub_t *dhd, iscan_buf_t **iscanbuf)
1369{
1370 iscan_buf_t *iscanbuf_alloc = 0;
1371 iscan_buf_t *iscanbuf_head;
1372
1373 dhd_iscan_lock();
1374
1375 iscanbuf_alloc = (iscan_buf_t *) MALLOC(dhd->osh, sizeof(iscan_buf_t));
1376 if (iscanbuf_alloc == NULL)
1377 goto fail;
1378
1379 iscanbuf_alloc->next = NULL;
1380 iscanbuf_head = *iscanbuf;
1381
1382 DHD_ISCAN(("%s: addr of allocated node = 0x%X"
1383 "addr of iscanbuf_head = 0x%X dhd = 0x%X\n",
1384 __func__, iscanbuf_alloc, iscanbuf_head, dhd));
1385
1386 if (iscanbuf_head == NULL) {
1387 *iscanbuf = iscanbuf_alloc;
1388 DHD_ISCAN(("%s: Head is allocated\n", __func__));
1389 goto fail;
1390 }
1391
1392 while (iscanbuf_head->next)
1393 iscanbuf_head = iscanbuf_head->next;
1394
1395 iscanbuf_head->next = iscanbuf_alloc;
1396
1397fail:
1398 dhd_iscan_unlock();
1399 return iscanbuf_alloc;
1400}
1401
1402void dhd_iscan_free_buf(void *dhdp, iscan_buf_t *iscan_delete)
1403{
1404 iscan_buf_t *iscanbuf_free = 0;
1405 iscan_buf_t *iscanbuf_prv = 0;
1406 iscan_buf_t *iscanbuf_cur = iscan_chain;
1407 dhd_pub_t *dhd = dhd_bus_pub(dhdp);
1408
1409 dhd_iscan_lock();
1410 /* If iscan_delete is null then delete the entire
1411 * chain or else delete specific one provided
1412 */
1413 if (!iscan_delete) {
1414 while (iscanbuf_cur) {
1415 iscanbuf_free = iscanbuf_cur;
1416 iscanbuf_cur = iscanbuf_cur->next;
1417 iscanbuf_free->next = 0;
1418 MFREE(dhd->osh, iscanbuf_free, sizeof(iscan_buf_t));
1419 }
1420 iscan_chain = 0;
1421 } else {
1422 while (iscanbuf_cur) {
1423 if (iscanbuf_cur == iscan_delete)
1424 break;
1425 iscanbuf_prv = iscanbuf_cur;
1426 iscanbuf_cur = iscanbuf_cur->next;
1427 }
1428 if (iscanbuf_prv)
1429 iscanbuf_prv->next = iscan_delete->next;
1430
1431 iscan_delete->next = 0;
1432 MFREE(dhd->osh, iscan_delete, sizeof(iscan_buf_t));
1433
1434 if (!iscanbuf_prv)
1435 iscan_chain = 0;
1436 }
1437 dhd_iscan_unlock();
1438}
1439
1440iscan_buf_t *dhd_iscan_result_buf(void)
1441{
1442 return iscan_chain;
1443}
1444
1445/*
1446* print scan cache
1447* print partial iscan_skip list differently
1448*/
1449int dhd_iscan_print_cache(iscan_buf_t *iscan_skip)
1450{
1451 int i = 0, l = 0;
1452 iscan_buf_t *iscan_cur;
1453 wl_iscan_results_t *list;
1454 wl_scan_results_t *results;
1455 wl_bss_info_t UNALIGNED *bi;
1456
1457 dhd_iscan_lock();
1458
1459 iscan_cur = dhd_iscan_result_buf();
1460
1461 while (iscan_cur) {
1462 list = (wl_iscan_results_t *)iscan_cur->iscan_buf;
1463 if (!list)
1464 break;
1465
1466 results = (wl_scan_results_t *)&list->results;
1467 if (!results)
1468 break;
1469
1470 if (results->version != WL_BSS_INFO_VERSION) {
1471 DHD_ISCAN(("%s: results->version %d != "
1472 "WL_BSS_INFO_VERSION\n",
1473 __func__, results->version));
1474 goto done;
1475 }
1476
1477 bi = results->bss_info;
1478 for (i = 0; i < results->count; i++) {
1479 if (!bi)
1480 break;
1481
1482 DHD_ISCAN(("%s[%2.2d:%2.2d] %X:%X:%X:%X:%X:%X\n",
1483 iscan_cur != iscan_skip ? "BSS" : "bss", l,
1484 i, bi->BSSID.octet[0], bi->BSSID.octet[1],
1485 bi->BSSID.octet[2], bi->BSSID.octet[3],
1486 bi->BSSID.octet[4], bi->BSSID.octet[5]));
1487
1488 bi = (wl_bss_info_t *) ((uintptr) bi +
1489 dtoh32(bi->length));
1490 }
1491 iscan_cur = iscan_cur->next;
1492 l++;
1493 }
1494
1495done:
1496 dhd_iscan_unlock();
1497 return 0;
1498}
1499
1500/*
1501* delete disappeared AP from specific scan cache but skip partial
1502* list in iscan_skip
1503*/
1504int dhd_iscan_delete_bss(void *dhdp, void *addr, iscan_buf_t *iscan_skip)
1505{
1506 int i = 0, j = 0, l = 0;
1507 iscan_buf_t *iscan_cur;
1508 wl_iscan_results_t *list;
1509 wl_scan_results_t *results;
1510 wl_bss_info_t UNALIGNED *bi, *bi_new, *bi_next;
1511
580a0bd9 1512 unsigned char *s_addr = addr;
cf2b4488
HP
1513
1514 dhd_iscan_lock();
1515 DHD_ISCAN(("%s: BSS to remove %X:%X:%X:%X:%X:%X\n",
1516 __func__, s_addr[0], s_addr[1], s_addr[2],
1517 s_addr[3], s_addr[4], s_addr[5]));
1518
1519 iscan_cur = dhd_iscan_result_buf();
1520
1521 while (iscan_cur) {
1522 if (iscan_cur != iscan_skip) {
1523 list = (wl_iscan_results_t *)iscan_cur->iscan_buf;
1524 if (!list)
1525 break;
1526
1527 results = (wl_scan_results_t *)&list->results;
1528 if (!results)
1529 break;
1530
1531 if (results->version != WL_BSS_INFO_VERSION) {
1532 DHD_ERROR(("%s: results->version %d != "
1533 "WL_BSS_INFO_VERSION\n",
1534 __func__, results->version));
1535 goto done;
1536 }
1537
1538 bi = results->bss_info;
1539 for (i = 0; i < results->count; i++) {
1540 if (!bi)
1541 break;
1542
1543 if (!memcmp
1544 (bi->BSSID.octet, addr, ETHER_ADDR_LEN)) {
1545 DHD_ISCAN(("%s: Del BSS[%2.2d:%2.2d] "
1546 "%X:%X:%X:%X:%X:%X\n",
1547 __func__, l, i, bi->BSSID.octet[0],
1548 bi->BSSID.octet[1], bi->BSSID.octet[2],
1549 bi->BSSID.octet[3], bi->BSSID.octet[4],
1550 bi->BSSID.octet[5]));
1551
1552 bi_new = bi;
1553 bi = (wl_bss_info_t *) ((uintptr) bi +
1554 dtoh32
1555 (bi->length));
1556/*
1557 if(bi && bi_new) {
1558 bcopy(bi, bi_new, results->buflen -
1559 dtoh32(bi_new->length));
1560 results->buflen -= dtoh32(bi_new->length);
1561 }
1562*/
1563 results->buflen -=
1564 dtoh32(bi_new->length);
1565 results->count--;
1566
1567 for (j = i; j < results->count; j++) {
1568 if (bi && bi_new) {
1569 DHD_ISCAN(("%s: Moved up BSS[%2.2d:%2.2d]" "%X:%X:%X:%X:%X:%X\n",
1570 __func__, l, j,
1571 bi->BSSID.octet[0],
1572 bi->BSSID.octet[1],
1573 bi->BSSID.octet[2],
1574 bi->BSSID.octet[3],
1575 bi->BSSID.octet[4],
1576 bi->BSSID.octet[5]));
1577
1578 bi_next =
1579 (wl_bss_info_t
1580 *) ((uintptr) bi +
1581 dtoh32
1582 (bi->length));
1583 bcopy(bi, bi_new,
1584 dtoh32
1585 (bi->length));
1586 bi_new =
1587 (wl_bss_info_t
1588 *) ((uintptr)
1589 bi_new +
1590 dtoh32
1591 (bi_new->
1592 length));
1593 bi = bi_next;
1594 }
1595 }
1596
1597 if (results->count == 0) {
1598 /* Prune now empty partial
1599 scan list */
1600 dhd_iscan_free_buf(dhdp,
1601 iscan_cur);
1602 goto done;
1603 }
1604 break;
1605 }
1606 bi = (wl_bss_info_t *) ((uintptr) bi +
1607 dtoh32(bi->length));
1608 }
1609 }
1610 iscan_cur = iscan_cur->next;
1611 l++;
1612 }
1613
1614done:
1615 dhd_iscan_unlock();
1616 return 0;
1617}
1618
1619int dhd_iscan_remove_duplicates(void *dhdp, iscan_buf_t *iscan_cur)
1620{
1621 int i = 0;
1622 wl_iscan_results_t *list;
1623 wl_scan_results_t *results;
1624 wl_bss_info_t UNALIGNED *bi, *bi_new, *bi_next;
1625
1626 dhd_iscan_lock();
1627
1628 DHD_ISCAN(("%s: Scan cache before delete\n", __func__));
1629 dhd_iscan_print_cache(iscan_cur);
1630
1631 if (!iscan_cur)
1632 goto done;
1633
1634 list = (wl_iscan_results_t *)iscan_cur->iscan_buf;
1635 if (!list)
1636 goto done;
1637
1638 results = (wl_scan_results_t *)&list->results;
1639 if (!results)
1640 goto done;
1641
1642 if (results->version != WL_BSS_INFO_VERSION) {
1643 DHD_ERROR(("%s: results->version %d != WL_BSS_INFO_VERSION\n",
1644 __func__, results->version));
1645 goto done;
1646 }
1647
1648 bi = results->bss_info;
1649 for (i = 0; i < results->count; i++) {
1650 if (!bi)
1651 break;
1652
1653 DHD_ISCAN(("%s: Find dups for BSS[%2.2d] %X:%X:%X:%X:%X:%X\n",
1654 __func__, i, bi->BSSID.octet[0],
1655 bi->BSSID.octet[1], bi->BSSID.octet[2],
1656 bi->BSSID.octet[3], bi->BSSID.octet[4],
1657 bi->BSSID.octet[5]));
1658
1659 dhd_iscan_delete_bss(dhdp, bi->BSSID.octet, iscan_cur);
1660
1661 bi = (wl_bss_info_t *) ((uintptr) bi + dtoh32(bi->length));
1662 }
1663
1664done:
1665 DHD_ISCAN(("%s: Scan cache after delete\n", __func__));
1666 dhd_iscan_print_cache(iscan_cur);
1667 dhd_iscan_unlock();
1668 return 0;
1669}
1670
1671void dhd_iscan_ind_scan_confirm(void *dhdp, bool status)
1672{
1673
1674 dhd_ind_scan_confirm(dhdp, status);
1675}
1676
7d4df48e 1677int dhd_iscan_request(void *dhdp, u16 action)
cf2b4488
HP
1678{
1679 int rc;
1680 wl_iscan_params_t params;
1681 dhd_pub_t *dhd = dhd_bus_pub(dhdp);
1682 char buf[WLC_IOCTL_SMLEN];
1683
1684 memset(&params, 0, sizeof(wl_iscan_params_t));
1685 memcpy(&params.params.bssid, &ether_bcast, ETHER_ADDR_LEN);
1686
1687 params.params.bss_type = DOT11_BSSTYPE_ANY;
1688 params.params.scan_type = DOT11_SCANTYPE_ACTIVE;
1689
1690 params.params.nprobes = htod32(-1);
1691 params.params.active_time = htod32(-1);
1692 params.params.passive_time = htod32(-1);
1693 params.params.home_time = htod32(-1);
1694 params.params.channel_num = htod32(0);
1695
1696 params.version = htod32(ISCAN_REQ_VERSION);
1697 params.action = htod16(action);
1698 params.scan_duration = htod16(0);
1699
1700 bcm_mkiovar("iscan", (char *)&params, sizeof(wl_iscan_params_t), buf,
1701 WLC_IOCTL_SMLEN);
1702 rc = dhd_wl_ioctl(dhdp, WLC_SET_VAR, buf, WLC_IOCTL_SMLEN);
1703
1704 return rc;
1705}
1706
1707static int dhd_iscan_get_partial_result(void *dhdp, uint *scan_count)
1708{
1709 wl_iscan_results_t *list_buf;
1710 wl_iscan_results_t list;
1711 wl_scan_results_t *results;
1712 iscan_buf_t *iscan_cur;
1713 int status = -1;
1714 dhd_pub_t *dhd = dhd_bus_pub(dhdp);
1715 int rc;
1716
1717 iscan_cur = dhd_iscan_allocate_buf(dhd, &iscan_chain);
1718 if (!iscan_cur) {
1719 DHD_ERROR(("%s: Failed to allocate node\n", __func__));
1720 dhd_iscan_free_buf(dhdp, 0);
1721 dhd_iscan_request(dhdp, WL_SCAN_ACTION_ABORT);
1722 goto fail;
1723 }
1724
1725 dhd_iscan_lock();
1726
1727 memset(iscan_cur->iscan_buf, 0, WLC_IW_ISCAN_MAXLEN);
1728 list_buf = (wl_iscan_results_t *) iscan_cur->iscan_buf;
1729 results = &list_buf->results;
1730 results->buflen = WL_ISCAN_RESULTS_FIXED_SIZE;
1731 results->version = 0;
1732 results->count = 0;
1733
1734 memset(&list, 0, sizeof(list));
1735 list.results.buflen = htod32(WLC_IW_ISCAN_MAXLEN);
1736 bcm_mkiovar("iscanresults", (char *)&list, WL_ISCAN_RESULTS_FIXED_SIZE,
1737 iscan_cur->iscan_buf, WLC_IW_ISCAN_MAXLEN);
1738 rc = dhd_wl_ioctl(dhdp, WLC_GET_VAR, iscan_cur->iscan_buf,
1739 WLC_IW_ISCAN_MAXLEN);
1740
1741 results->buflen = dtoh32(results->buflen);
1742 results->version = dtoh32(results->version);
1743 *scan_count = results->count = dtoh32(results->count);
1744 status = dtoh32(list_buf->status);
1745
1746 dhd_iscan_unlock();
1747
1748 if (!(*scan_count))
1749 dhd_iscan_free_buf(dhdp, iscan_cur);
1750 else
1751 dhd_iscan_remove_duplicates(dhdp, iscan_cur);
1752
1753fail:
1754 return status;
1755}
1756#endif /* SIMPLE_ISCAN */
1757
1758#ifdef PNO_SUPPORT
1759int dhd_pno_clean(dhd_pub_t *dhd)
1760{
1761 char iovbuf[128];
1762 int pfn_enabled = 0;
1763 int iov_len = 0;
1764 int ret;
1765
1766 /* Disable pfn */
1767 iov_len =
1768 bcm_mkiovar("pfn", (char *)&pfn_enabled, 4, iovbuf, sizeof(iovbuf));
81e95f9d
JC
1769 ret = dhdcdc_set_ioctl(dhd, 0, WLC_SET_VAR, iovbuf, sizeof(iovbuf));
1770 if (ret >= 0) {
cf2b4488
HP
1771 /* clear pfn */
1772 iov_len = bcm_mkiovar("pfnclear", 0, 0, iovbuf, sizeof(iovbuf));
1773 if (iov_len) {
81e95f9d
JC
1774 ret = dhdcdc_set_ioctl(dhd, 0, WLC_SET_VAR, iovbuf,
1775 iov_len);
1776 if (ret < 0) {
cf2b4488
HP
1777 DHD_ERROR(("%s failed code %d\n", __func__,
1778 ret));
1779 }
1780 } else {
1781 ret = -1;
1782 DHD_ERROR(("%s failed code %d\n", __func__, iov_len));
1783 }
1784 } else
1785 DHD_ERROR(("%s failed code %d\n", __func__, ret));
1786
1787 return ret;
1788}
1789
1790int dhd_pno_enable(dhd_pub_t *dhd, int pfn_enabled)
1791{
1792 char iovbuf[128];
1793 int ret = -1;
1794
1795 if ((!dhd) && ((pfn_enabled != 0) || (pfn_enabled != 1))) {
1796 DHD_ERROR(("%s error exit\n", __func__));
1797 return ret;
1798 }
1799
1800 /* Enable/disable PNO */
81e95f9d
JC
1801 ret = bcm_mkiovar("pfn", (char *)&pfn_enabled, 4, iovbuf,
1802 sizeof(iovbuf));
1803 if (ret > 0) {
1804 ret = dhdcdc_set_ioctl(dhd, 0, WLC_SET_VAR, iovbuf,
1805 sizeof(iovbuf));
1806 if (ret < 0) {
cf2b4488
HP
1807 DHD_ERROR(("%s failed for error=%d\n", __func__, ret));
1808 return ret;
1809 } else {
1810 dhd->pno_enable = pfn_enabled;
1811 DHD_TRACE(("%s set pno as %d\n", __func__,
1812 dhd->pno_enable));
1813 }
1814 } else
1815 DHD_ERROR(("%s failed err=%d\n", __func__, ret));
1816
1817 return ret;
1818}
1819
1820/* Function to execute combined scan */
1821int
580a0bd9 1822dhd_pno_set(dhd_pub_t *dhd, wlc_ssid_t *ssids_local, int nssid, unsigned char scan_fr)
cf2b4488
HP
1823{
1824 int err = -1;
1825 char iovbuf[128];
1826 int k, i;
1827 wl_pfn_param_t pfn_param;
1828 wl_pfn_t pfn_element;
1829
1830 DHD_TRACE(("%s nssid=%d nchan=%d\n", __func__, nssid, scan_fr));
1831
1832 if ((!dhd) && (!ssids_local)) {
1833 DHD_ERROR(("%s error exit\n", __func__));
1834 err = -1;
1835 }
1836
1837 /* Check for broadcast ssid */
1838 for (k = 0; k < nssid; k++) {
1839 if (!ssids_local[k].SSID_len) {
1840 DHD_ERROR(("%d: Broadcast SSID is ilegal for PNO "
1841 "setting\n", k));
1842 return err;
1843 }
1844 }
1845/* #define PNO_DUMP 1 */
1846#ifdef PNO_DUMP
1847 {
1848 int j;
1849 for (j = 0; j < nssid; j++) {
1850 DHD_ERROR(("%d: scan for %s size =%d\n", j,
1851 ssids_local[j].SSID,
1852 ssids_local[j].SSID_len));
1853 }
1854 }
1855#endif /* PNO_DUMP */
1856
1857 /* clean up everything */
81e95f9d
JC
1858 err = dhd_pno_clean(dhd);
1859 if (err < 0) {
cf2b4488
HP
1860 DHD_ERROR(("%s failed error=%d\n", __func__, err));
1861 return err;
1862 }
1863 memset(&pfn_param, 0, sizeof(pfn_param));
1864 memset(&pfn_element, 0, sizeof(pfn_element));
1865
1866 /* set pfn parameters */
1867 pfn_param.version = htod32(PFN_VERSION);
1868 pfn_param.flags = htod16((PFN_LIST_ORDER << SORT_CRITERIA_BIT));
1869
1870 /* set up pno scan fr */
1871 if (scan_fr != 0)
1872 pfn_param.scan_freq = htod32(scan_fr);
1873
1874 bcm_mkiovar("pfn_set", (char *)&pfn_param, sizeof(pfn_param), iovbuf,
1875 sizeof(iovbuf));
1876 dhdcdc_set_ioctl(dhd, 0, WLC_SET_VAR, iovbuf, sizeof(iovbuf));
1877
1878 /* set all pfn ssid */
1879 for (i = 0; i < nssid; i++) {
1880
1881 pfn_element.bss_type = htod32(DOT11_BSSTYPE_INFRASTRUCTURE);
1882 pfn_element.auth = (DOT11_OPEN_SYSTEM);
1883 pfn_element.wpa_auth = htod32(WPA_AUTH_PFN_ANY);
1884 pfn_element.wsec = htod32(0);
1885 pfn_element.infra = htod32(1);
1886
1887 memcpy((char *)pfn_element.ssid.SSID, ssids_local[i].SSID,
1888 ssids_local[i].SSID_len);
1889 pfn_element.ssid.SSID_len = ssids_local[i].SSID_len;
1890
81e95f9d
JC
1891 err = bcm_mkiovar("pfn_add", (char *)&pfn_element,
1892 sizeof(pfn_element), iovbuf, sizeof(iovbuf));
1893 if (err > 0) {
1894 err = dhdcdc_set_ioctl(dhd, 0, WLC_SET_VAR, iovbuf,
1895 sizeof(iovbuf));
1896 if (err < 0) {
cf2b4488
HP
1897 DHD_ERROR(("%s failed for i=%d error=%d\n",
1898 __func__, i, err));
1899 return err;
1900 }
1901 } else
1902 DHD_ERROR(("%s failed err=%d\n", __func__, err));
1903 }
1904
1905 /* Enable PNO */
1906 /* dhd_pno_enable(dhd, 1); */
1907 return err;
1908}
1909
1910int dhd_pno_get_status(dhd_pub_t *dhd)
1911{
1912 int ret = -1;
1913
1914 if (!dhd)
1915 return ret;
1916 else
1917 return dhd->pno_enable;
1918}
1919
1920#endif /* PNO_SUPPORT */
1921
1922/* Androd ComboSCAN support */