mirror of
https://github.com/AuxXxilium/linux_dsm_epyc7002.git
synced 2024-12-28 11:18:45 +07:00
33190ebfb1
privacy settings might change while AP is running. Inside wil_cfg80211_change_beacon(), detect change in privacy settings and handle it by stopping and re-starting the AP. Firmware cannot handle on-the-fly privacy settings change and so AP restart is required. Signed-off-by: Dedy Lansky <qca_dlansky@qca.qualcomm.com> Signed-off-by: Hamad Kadmany <qca_hkadmany@qca.qualcomm.com> Signed-off-by: Vladimir Kondratiev <qca_vkondrat@qca.qualcomm.com> Signed-off-by: Kalle Valo <kvalo@qca.qualcomm.com>
1193 lines
31 KiB
C
1193 lines
31 KiB
C
/*
|
|
* Copyright (c) 2012-2015 Qualcomm Atheros, Inc.
|
|
*
|
|
* Permission to use, copy, modify, and/or distribute this software for any
|
|
* purpose with or without fee is hereby granted, provided that the above
|
|
* copyright notice and this permission notice appear in all copies.
|
|
*
|
|
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
|
|
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
|
|
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
|
|
* ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
|
|
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
|
|
* ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
|
|
* OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
|
*/
|
|
|
|
#include <linux/etherdevice.h>
|
|
#include "wil6210.h"
|
|
#include "wmi.h"
|
|
|
|
#define CHAN60G(_channel, _flags) { \
|
|
.band = IEEE80211_BAND_60GHZ, \
|
|
.center_freq = 56160 + (2160 * (_channel)), \
|
|
.hw_value = (_channel), \
|
|
.flags = (_flags), \
|
|
.max_antenna_gain = 0, \
|
|
.max_power = 40, \
|
|
}
|
|
|
|
static struct ieee80211_channel wil_60ghz_channels[] = {
|
|
CHAN60G(1, 0),
|
|
CHAN60G(2, 0),
|
|
CHAN60G(3, 0),
|
|
/* channel 4 not supported yet */
|
|
};
|
|
|
|
static struct ieee80211_supported_band wil_band_60ghz = {
|
|
.channels = wil_60ghz_channels,
|
|
.n_channels = ARRAY_SIZE(wil_60ghz_channels),
|
|
.ht_cap = {
|
|
.ht_supported = true,
|
|
.cap = 0, /* TODO */
|
|
.ampdu_factor = IEEE80211_HT_MAX_AMPDU_64K, /* TODO */
|
|
.ampdu_density = IEEE80211_HT_MPDU_DENSITY_8, /* TODO */
|
|
.mcs = {
|
|
/* MCS 1..12 - SC PHY */
|
|
.rx_mask = {0xfe, 0x1f}, /* 1..12 */
|
|
.tx_params = IEEE80211_HT_MCS_TX_DEFINED, /* TODO */
|
|
},
|
|
},
|
|
};
|
|
|
|
static const struct ieee80211_txrx_stypes
|
|
wil_mgmt_stypes[NUM_NL80211_IFTYPES] = {
|
|
[NL80211_IFTYPE_STATION] = {
|
|
.tx = BIT(IEEE80211_STYPE_ACTION >> 4) |
|
|
BIT(IEEE80211_STYPE_PROBE_RESP >> 4),
|
|
.rx = BIT(IEEE80211_STYPE_ACTION >> 4) |
|
|
BIT(IEEE80211_STYPE_PROBE_REQ >> 4)
|
|
},
|
|
[NL80211_IFTYPE_AP] = {
|
|
.tx = BIT(IEEE80211_STYPE_ACTION >> 4) |
|
|
BIT(IEEE80211_STYPE_PROBE_RESP >> 4),
|
|
.rx = BIT(IEEE80211_STYPE_ACTION >> 4) |
|
|
BIT(IEEE80211_STYPE_PROBE_REQ >> 4)
|
|
},
|
|
[NL80211_IFTYPE_P2P_CLIENT] = {
|
|
.tx = BIT(IEEE80211_STYPE_ACTION >> 4) |
|
|
BIT(IEEE80211_STYPE_PROBE_RESP >> 4),
|
|
.rx = BIT(IEEE80211_STYPE_ACTION >> 4) |
|
|
BIT(IEEE80211_STYPE_PROBE_REQ >> 4)
|
|
},
|
|
[NL80211_IFTYPE_P2P_GO] = {
|
|
.tx = BIT(IEEE80211_STYPE_ACTION >> 4) |
|
|
BIT(IEEE80211_STYPE_PROBE_RESP >> 4),
|
|
.rx = BIT(IEEE80211_STYPE_ACTION >> 4) |
|
|
BIT(IEEE80211_STYPE_PROBE_REQ >> 4)
|
|
},
|
|
};
|
|
|
|
static const u32 wil_cipher_suites[] = {
|
|
WLAN_CIPHER_SUITE_GCMP,
|
|
};
|
|
|
|
int wil_iftype_nl2wmi(enum nl80211_iftype type)
|
|
{
|
|
static const struct {
|
|
enum nl80211_iftype nl;
|
|
enum wmi_network_type wmi;
|
|
} __nl2wmi[] = {
|
|
{NL80211_IFTYPE_ADHOC, WMI_NETTYPE_ADHOC},
|
|
{NL80211_IFTYPE_STATION, WMI_NETTYPE_INFRA},
|
|
{NL80211_IFTYPE_AP, WMI_NETTYPE_AP},
|
|
{NL80211_IFTYPE_P2P_CLIENT, WMI_NETTYPE_P2P},
|
|
{NL80211_IFTYPE_P2P_GO, WMI_NETTYPE_P2P},
|
|
{NL80211_IFTYPE_MONITOR, WMI_NETTYPE_ADHOC}, /* FIXME */
|
|
};
|
|
uint i;
|
|
|
|
for (i = 0; i < ARRAY_SIZE(__nl2wmi); i++) {
|
|
if (__nl2wmi[i].nl == type)
|
|
return __nl2wmi[i].wmi;
|
|
}
|
|
|
|
return -EOPNOTSUPP;
|
|
}
|
|
|
|
int wil_cid_fill_sinfo(struct wil6210_priv *wil, int cid,
|
|
struct station_info *sinfo)
|
|
{
|
|
struct wmi_notify_req_cmd cmd = {
|
|
.cid = cid,
|
|
.interval_usec = 0,
|
|
};
|
|
struct {
|
|
struct wil6210_mbox_hdr_wmi wmi;
|
|
struct wmi_notify_req_done_event evt;
|
|
} __packed reply;
|
|
struct wil_net_stats *stats = &wil->sta[cid].stats;
|
|
int rc;
|
|
|
|
rc = wmi_call(wil, WMI_NOTIFY_REQ_CMDID, &cmd, sizeof(cmd),
|
|
WMI_NOTIFY_REQ_DONE_EVENTID, &reply, sizeof(reply), 20);
|
|
if (rc)
|
|
return rc;
|
|
|
|
wil_dbg_wmi(wil, "Link status for CID %d: {\n"
|
|
" MCS %d TSF 0x%016llx\n"
|
|
" BF status 0x%08x SNR 0x%08x SQI %d%%\n"
|
|
" Tx Tpt %d goodput %d Rx goodput %d\n"
|
|
" Sectors(rx:tx) my %d:%d peer %d:%d\n""}\n",
|
|
cid, le16_to_cpu(reply.evt.bf_mcs),
|
|
le64_to_cpu(reply.evt.tsf), reply.evt.status,
|
|
le32_to_cpu(reply.evt.snr_val),
|
|
reply.evt.sqi,
|
|
le32_to_cpu(reply.evt.tx_tpt),
|
|
le32_to_cpu(reply.evt.tx_goodput),
|
|
le32_to_cpu(reply.evt.rx_goodput),
|
|
le16_to_cpu(reply.evt.my_rx_sector),
|
|
le16_to_cpu(reply.evt.my_tx_sector),
|
|
le16_to_cpu(reply.evt.other_rx_sector),
|
|
le16_to_cpu(reply.evt.other_tx_sector));
|
|
|
|
sinfo->generation = wil->sinfo_gen;
|
|
|
|
sinfo->filled = BIT(NL80211_STA_INFO_RX_BYTES) |
|
|
BIT(NL80211_STA_INFO_TX_BYTES) |
|
|
BIT(NL80211_STA_INFO_RX_PACKETS) |
|
|
BIT(NL80211_STA_INFO_TX_PACKETS) |
|
|
BIT(NL80211_STA_INFO_RX_BITRATE) |
|
|
BIT(NL80211_STA_INFO_TX_BITRATE) |
|
|
BIT(NL80211_STA_INFO_RX_DROP_MISC) |
|
|
BIT(NL80211_STA_INFO_TX_FAILED);
|
|
|
|
sinfo->txrate.flags = RATE_INFO_FLAGS_MCS | RATE_INFO_FLAGS_60G;
|
|
sinfo->txrate.mcs = le16_to_cpu(reply.evt.bf_mcs);
|
|
sinfo->rxrate.flags = RATE_INFO_FLAGS_MCS | RATE_INFO_FLAGS_60G;
|
|
sinfo->rxrate.mcs = stats->last_mcs_rx;
|
|
sinfo->rx_bytes = stats->rx_bytes;
|
|
sinfo->rx_packets = stats->rx_packets;
|
|
sinfo->rx_dropped_misc = stats->rx_dropped;
|
|
sinfo->tx_bytes = stats->tx_bytes;
|
|
sinfo->tx_packets = stats->tx_packets;
|
|
sinfo->tx_failed = stats->tx_errors;
|
|
|
|
if (test_bit(wil_status_fwconnected, wil->status)) {
|
|
sinfo->filled |= BIT(NL80211_STA_INFO_SIGNAL);
|
|
sinfo->signal = reply.evt.sqi;
|
|
}
|
|
|
|
return rc;
|
|
}
|
|
|
|
static int wil_cfg80211_get_station(struct wiphy *wiphy,
|
|
struct net_device *ndev,
|
|
const u8 *mac, struct station_info *sinfo)
|
|
{
|
|
struct wil6210_priv *wil = wiphy_to_wil(wiphy);
|
|
int rc;
|
|
|
|
int cid = wil_find_cid(wil, mac);
|
|
|
|
wil_dbg_misc(wil, "%s(%pM) CID %d\n", __func__, mac, cid);
|
|
if (cid < 0)
|
|
return cid;
|
|
|
|
rc = wil_cid_fill_sinfo(wil, cid, sinfo);
|
|
|
|
return rc;
|
|
}
|
|
|
|
/*
|
|
* Find @idx-th active STA for station dump.
|
|
*/
|
|
static int wil_find_cid_by_idx(struct wil6210_priv *wil, int idx)
|
|
{
|
|
int i;
|
|
|
|
for (i = 0; i < ARRAY_SIZE(wil->sta); i++) {
|
|
if (wil->sta[i].status == wil_sta_unused)
|
|
continue;
|
|
if (idx == 0)
|
|
return i;
|
|
idx--;
|
|
}
|
|
|
|
return -ENOENT;
|
|
}
|
|
|
|
static int wil_cfg80211_dump_station(struct wiphy *wiphy,
|
|
struct net_device *dev, int idx,
|
|
u8 *mac, struct station_info *sinfo)
|
|
{
|
|
struct wil6210_priv *wil = wiphy_to_wil(wiphy);
|
|
int rc;
|
|
int cid = wil_find_cid_by_idx(wil, idx);
|
|
|
|
if (cid < 0)
|
|
return -ENOENT;
|
|
|
|
ether_addr_copy(mac, wil->sta[cid].addr);
|
|
wil_dbg_misc(wil, "%s(%pM) CID %d\n", __func__, mac, cid);
|
|
|
|
rc = wil_cid_fill_sinfo(wil, cid, sinfo);
|
|
|
|
return rc;
|
|
}
|
|
|
|
static int wil_cfg80211_change_iface(struct wiphy *wiphy,
|
|
struct net_device *ndev,
|
|
enum nl80211_iftype type, u32 *flags,
|
|
struct vif_params *params)
|
|
{
|
|
struct wil6210_priv *wil = wiphy_to_wil(wiphy);
|
|
struct wireless_dev *wdev = wil->wdev;
|
|
|
|
switch (type) {
|
|
case NL80211_IFTYPE_STATION:
|
|
case NL80211_IFTYPE_AP:
|
|
case NL80211_IFTYPE_P2P_CLIENT:
|
|
case NL80211_IFTYPE_P2P_GO:
|
|
break;
|
|
case NL80211_IFTYPE_MONITOR:
|
|
if (flags)
|
|
wil->monitor_flags = *flags;
|
|
else
|
|
wil->monitor_flags = 0;
|
|
|
|
break;
|
|
default:
|
|
return -EOPNOTSUPP;
|
|
}
|
|
|
|
wdev->iftype = type;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int wil_cfg80211_scan(struct wiphy *wiphy,
|
|
struct cfg80211_scan_request *request)
|
|
{
|
|
struct wil6210_priv *wil = wiphy_to_wil(wiphy);
|
|
struct wireless_dev *wdev = wil->wdev;
|
|
struct {
|
|
struct wmi_start_scan_cmd cmd;
|
|
u16 chnl[4];
|
|
} __packed cmd;
|
|
uint i, n;
|
|
int rc;
|
|
|
|
if (wil->scan_request) {
|
|
wil_err(wil, "Already scanning\n");
|
|
return -EAGAIN;
|
|
}
|
|
|
|
/* check we are client side */
|
|
switch (wdev->iftype) {
|
|
case NL80211_IFTYPE_STATION:
|
|
case NL80211_IFTYPE_P2P_CLIENT:
|
|
break;
|
|
default:
|
|
return -EOPNOTSUPP;
|
|
}
|
|
|
|
/* FW don't support scan after connection attempt */
|
|
if (test_bit(wil_status_dontscan, wil->status)) {
|
|
wil_err(wil, "Can't scan now\n");
|
|
return -EBUSY;
|
|
}
|
|
|
|
wil_dbg_misc(wil, "Start scan_request 0x%p\n", request);
|
|
wil_dbg_misc(wil, "SSID count: %d", request->n_ssids);
|
|
|
|
for (i = 0; i < request->n_ssids; i++) {
|
|
wil_dbg_misc(wil, "SSID[%d]", i);
|
|
print_hex_dump_bytes("SSID ", DUMP_PREFIX_OFFSET,
|
|
request->ssids[i].ssid,
|
|
request->ssids[i].ssid_len);
|
|
}
|
|
|
|
if (request->n_ssids)
|
|
rc = wmi_set_ssid(wil, request->ssids[0].ssid_len,
|
|
request->ssids[0].ssid);
|
|
else
|
|
rc = wmi_set_ssid(wil, 0, NULL);
|
|
|
|
if (rc) {
|
|
wil_err(wil, "set SSID for scan request failed: %d\n", rc);
|
|
return rc;
|
|
}
|
|
|
|
wil->scan_request = request;
|
|
mod_timer(&wil->scan_timer, jiffies + WIL6210_SCAN_TO);
|
|
|
|
memset(&cmd, 0, sizeof(cmd));
|
|
cmd.cmd.num_channels = 0;
|
|
n = min(request->n_channels, 4U);
|
|
for (i = 0; i < n; i++) {
|
|
int ch = request->channels[i]->hw_value;
|
|
|
|
if (ch == 0) {
|
|
wil_err(wil,
|
|
"Scan requested for unknown frequency %dMhz\n",
|
|
request->channels[i]->center_freq);
|
|
continue;
|
|
}
|
|
/* 0-based channel indexes */
|
|
cmd.cmd.channel_list[cmd.cmd.num_channels++].channel = ch - 1;
|
|
wil_dbg_misc(wil, "Scan for ch %d : %d MHz\n", ch,
|
|
request->channels[i]->center_freq);
|
|
}
|
|
|
|
if (request->ie_len)
|
|
print_hex_dump_bytes("Scan IE ", DUMP_PREFIX_OFFSET,
|
|
request->ie, request->ie_len);
|
|
else
|
|
wil_dbg_misc(wil, "Scan has no IE's\n");
|
|
|
|
rc = wmi_set_ie(wil, WMI_FRAME_PROBE_REQ, request->ie_len,
|
|
request->ie);
|
|
if (rc) {
|
|
wil_err(wil, "Aborting scan, set_ie failed: %d\n", rc);
|
|
goto out;
|
|
}
|
|
|
|
rc = wmi_send(wil, WMI_START_SCAN_CMDID, &cmd, sizeof(cmd.cmd) +
|
|
cmd.cmd.num_channels * sizeof(cmd.cmd.channel_list[0]));
|
|
|
|
out:
|
|
if (rc) {
|
|
del_timer_sync(&wil->scan_timer);
|
|
wil->scan_request = NULL;
|
|
}
|
|
|
|
return rc;
|
|
}
|
|
|
|
static void wil_print_crypto(struct wil6210_priv *wil,
|
|
struct cfg80211_crypto_settings *c)
|
|
{
|
|
int i, n;
|
|
|
|
wil_dbg_misc(wil, "WPA versions: 0x%08x cipher group 0x%08x\n",
|
|
c->wpa_versions, c->cipher_group);
|
|
wil_dbg_misc(wil, "Pairwise ciphers [%d] {\n", c->n_ciphers_pairwise);
|
|
n = min_t(int, c->n_ciphers_pairwise, ARRAY_SIZE(c->ciphers_pairwise));
|
|
for (i = 0; i < n; i++)
|
|
wil_dbg_misc(wil, " [%d] = 0x%08x\n", i,
|
|
c->ciphers_pairwise[i]);
|
|
wil_dbg_misc(wil, "}\n");
|
|
wil_dbg_misc(wil, "AKM suites [%d] {\n", c->n_akm_suites);
|
|
n = min_t(int, c->n_akm_suites, ARRAY_SIZE(c->akm_suites));
|
|
for (i = 0; i < n; i++)
|
|
wil_dbg_misc(wil, " [%d] = 0x%08x\n", i,
|
|
c->akm_suites[i]);
|
|
wil_dbg_misc(wil, "}\n");
|
|
wil_dbg_misc(wil, "Control port : %d, eth_type 0x%04x no_encrypt %d\n",
|
|
c->control_port, be16_to_cpu(c->control_port_ethertype),
|
|
c->control_port_no_encrypt);
|
|
}
|
|
|
|
static void wil_print_connect_params(struct wil6210_priv *wil,
|
|
struct cfg80211_connect_params *sme)
|
|
{
|
|
wil_info(wil, "Connecting to:\n");
|
|
if (sme->channel) {
|
|
wil_info(wil, " Channel: %d freq %d\n",
|
|
sme->channel->hw_value, sme->channel->center_freq);
|
|
}
|
|
if (sme->bssid)
|
|
wil_info(wil, " BSSID: %pM\n", sme->bssid);
|
|
if (sme->ssid)
|
|
print_hex_dump(KERN_INFO, " SSID: ", DUMP_PREFIX_OFFSET,
|
|
16, 1, sme->ssid, sme->ssid_len, true);
|
|
wil_info(wil, " Privacy: %s\n", sme->privacy ? "secure" : "open");
|
|
wil_print_crypto(wil, &sme->crypto);
|
|
}
|
|
|
|
static int wil_cfg80211_connect(struct wiphy *wiphy,
|
|
struct net_device *ndev,
|
|
struct cfg80211_connect_params *sme)
|
|
{
|
|
struct wil6210_priv *wil = wiphy_to_wil(wiphy);
|
|
struct cfg80211_bss *bss;
|
|
struct wmi_connect_cmd conn;
|
|
const u8 *ssid_eid;
|
|
const u8 *rsn_eid;
|
|
int ch;
|
|
int rc = 0;
|
|
|
|
wil_print_connect_params(wil, sme);
|
|
|
|
if (test_bit(wil_status_fwconnecting, wil->status) ||
|
|
test_bit(wil_status_fwconnected, wil->status))
|
|
return -EALREADY;
|
|
|
|
if (sme->ie_len > WMI_MAX_IE_LEN) {
|
|
wil_err(wil, "IE too large (%td bytes)\n", sme->ie_len);
|
|
return -ERANGE;
|
|
}
|
|
|
|
rsn_eid = sme->ie ?
|
|
cfg80211_find_ie(WLAN_EID_RSN, sme->ie, sme->ie_len) :
|
|
NULL;
|
|
if (sme->privacy && !rsn_eid)
|
|
wil_info(wil, "WSC connection\n");
|
|
|
|
bss = cfg80211_get_bss(wiphy, sme->channel, sme->bssid,
|
|
sme->ssid, sme->ssid_len,
|
|
IEEE80211_BSS_TYPE_ESS, IEEE80211_PRIVACY_ANY);
|
|
if (!bss) {
|
|
wil_err(wil, "Unable to find BSS\n");
|
|
return -ENOENT;
|
|
}
|
|
|
|
ssid_eid = ieee80211_bss_get_ie(bss, WLAN_EID_SSID);
|
|
if (!ssid_eid) {
|
|
wil_err(wil, "No SSID\n");
|
|
rc = -ENOENT;
|
|
goto out;
|
|
}
|
|
wil->privacy = sme->privacy;
|
|
|
|
if (wil->privacy) {
|
|
/* For secure assoc, remove old keys */
|
|
rc = wmi_del_cipher_key(wil, 0, bss->bssid,
|
|
WMI_KEY_USE_PAIRWISE);
|
|
if (rc) {
|
|
wil_err(wil, "WMI_DELETE_CIPHER_KEY_CMD(PTK) failed\n");
|
|
goto out;
|
|
}
|
|
rc = wmi_del_cipher_key(wil, 0, bss->bssid,
|
|
WMI_KEY_USE_RX_GROUP);
|
|
if (rc) {
|
|
wil_err(wil, "WMI_DELETE_CIPHER_KEY_CMD(GTK) failed\n");
|
|
goto out;
|
|
}
|
|
}
|
|
|
|
/* WMI_SET_APPIE_CMD. ie may contain rsn info as well as other info
|
|
* elements. Send it also in case it's empty, to erase previously set
|
|
* ies in FW.
|
|
*/
|
|
rc = wmi_set_ie(wil, WMI_FRAME_ASSOC_REQ, sme->ie_len, sme->ie);
|
|
if (rc) {
|
|
wil_err(wil, "WMI_SET_APPIE_CMD failed\n");
|
|
goto out;
|
|
}
|
|
|
|
/* WMI_CONNECT_CMD */
|
|
memset(&conn, 0, sizeof(conn));
|
|
switch (bss->capability & WLAN_CAPABILITY_DMG_TYPE_MASK) {
|
|
case WLAN_CAPABILITY_DMG_TYPE_AP:
|
|
conn.network_type = WMI_NETTYPE_INFRA;
|
|
break;
|
|
case WLAN_CAPABILITY_DMG_TYPE_PBSS:
|
|
conn.network_type = WMI_NETTYPE_P2P;
|
|
break;
|
|
default:
|
|
wil_err(wil, "Unsupported BSS type, capability= 0x%04x\n",
|
|
bss->capability);
|
|
goto out;
|
|
}
|
|
if (wil->privacy) {
|
|
if (rsn_eid) { /* regular secure connection */
|
|
conn.dot11_auth_mode = WMI_AUTH11_SHARED;
|
|
conn.auth_mode = WMI_AUTH_WPA2_PSK;
|
|
conn.pairwise_crypto_type = WMI_CRYPT_AES_GCMP;
|
|
conn.pairwise_crypto_len = 16;
|
|
conn.group_crypto_type = WMI_CRYPT_AES_GCMP;
|
|
conn.group_crypto_len = 16;
|
|
} else { /* WSC */
|
|
conn.dot11_auth_mode = WMI_AUTH11_WSC;
|
|
conn.auth_mode = WMI_AUTH_NONE;
|
|
}
|
|
} else { /* insecure connection */
|
|
conn.dot11_auth_mode = WMI_AUTH11_OPEN;
|
|
conn.auth_mode = WMI_AUTH_NONE;
|
|
}
|
|
|
|
conn.ssid_len = min_t(u8, ssid_eid[1], 32);
|
|
memcpy(conn.ssid, ssid_eid+2, conn.ssid_len);
|
|
|
|
ch = bss->channel->hw_value;
|
|
if (ch == 0) {
|
|
wil_err(wil, "BSS at unknown frequency %dMhz\n",
|
|
bss->channel->center_freq);
|
|
rc = -EOPNOTSUPP;
|
|
goto out;
|
|
}
|
|
conn.channel = ch - 1;
|
|
|
|
ether_addr_copy(conn.bssid, bss->bssid);
|
|
ether_addr_copy(conn.dst_mac, bss->bssid);
|
|
|
|
set_bit(wil_status_fwconnecting, wil->status);
|
|
|
|
rc = wmi_send(wil, WMI_CONNECT_CMDID, &conn, sizeof(conn));
|
|
if (rc == 0) {
|
|
netif_carrier_on(ndev);
|
|
/* Connect can take lots of time */
|
|
mod_timer(&wil->connect_timer,
|
|
jiffies + msecs_to_jiffies(2000));
|
|
} else {
|
|
clear_bit(wil_status_fwconnecting, wil->status);
|
|
}
|
|
|
|
out:
|
|
cfg80211_put_bss(wiphy, bss);
|
|
|
|
return rc;
|
|
}
|
|
|
|
static int wil_cfg80211_disconnect(struct wiphy *wiphy,
|
|
struct net_device *ndev,
|
|
u16 reason_code)
|
|
{
|
|
int rc;
|
|
struct wil6210_priv *wil = wiphy_to_wil(wiphy);
|
|
|
|
wil_dbg_misc(wil, "%s(reason=%d)\n", __func__, reason_code);
|
|
|
|
rc = wmi_send(wil, WMI_DISCONNECT_CMDID, NULL, 0);
|
|
|
|
return rc;
|
|
}
|
|
|
|
int wil_cfg80211_mgmt_tx(struct wiphy *wiphy, struct wireless_dev *wdev,
|
|
struct cfg80211_mgmt_tx_params *params,
|
|
u64 *cookie)
|
|
{
|
|
const u8 *buf = params->buf;
|
|
size_t len = params->len;
|
|
struct wil6210_priv *wil = wiphy_to_wil(wiphy);
|
|
int rc;
|
|
bool tx_status = false;
|
|
struct ieee80211_mgmt *mgmt_frame = (void *)buf;
|
|
struct wmi_sw_tx_req_cmd *cmd;
|
|
struct {
|
|
struct wil6210_mbox_hdr_wmi wmi;
|
|
struct wmi_sw_tx_complete_event evt;
|
|
} __packed evt;
|
|
|
|
cmd = kmalloc(sizeof(*cmd) + len, GFP_KERNEL);
|
|
if (!cmd) {
|
|
rc = -ENOMEM;
|
|
goto out;
|
|
}
|
|
|
|
memcpy(cmd->dst_mac, mgmt_frame->da, WMI_MAC_LEN);
|
|
cmd->len = cpu_to_le16(len);
|
|
memcpy(cmd->payload, buf, len);
|
|
|
|
rc = wmi_call(wil, WMI_SW_TX_REQ_CMDID, cmd, sizeof(*cmd) + len,
|
|
WMI_SW_TX_COMPLETE_EVENTID, &evt, sizeof(evt), 2000);
|
|
if (rc == 0)
|
|
tx_status = !evt.evt.status;
|
|
|
|
kfree(cmd);
|
|
out:
|
|
cfg80211_mgmt_tx_status(wdev, cookie ? *cookie : 0, buf, len,
|
|
tx_status, GFP_KERNEL);
|
|
return rc;
|
|
}
|
|
|
|
static int wil_cfg80211_set_channel(struct wiphy *wiphy,
|
|
struct cfg80211_chan_def *chandef)
|
|
{
|
|
struct wil6210_priv *wil = wiphy_to_wil(wiphy);
|
|
struct wireless_dev *wdev = wil->wdev;
|
|
|
|
wdev->preset_chandef = *chandef;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static enum wmi_key_usage wil_detect_key_usage(struct wil6210_priv *wil,
|
|
bool pairwise)
|
|
{
|
|
struct wireless_dev *wdev = wil->wdev;
|
|
enum wmi_key_usage rc;
|
|
static const char * const key_usage_str[] = {
|
|
[WMI_KEY_USE_PAIRWISE] = "WMI_KEY_USE_PAIRWISE",
|
|
[WMI_KEY_USE_RX_GROUP] = "WMI_KEY_USE_RX_GROUP",
|
|
[WMI_KEY_USE_TX_GROUP] = "WMI_KEY_USE_TX_GROUP",
|
|
};
|
|
|
|
if (pairwise) {
|
|
rc = WMI_KEY_USE_PAIRWISE;
|
|
} else {
|
|
switch (wdev->iftype) {
|
|
case NL80211_IFTYPE_STATION:
|
|
rc = WMI_KEY_USE_RX_GROUP;
|
|
break;
|
|
case NL80211_IFTYPE_AP:
|
|
rc = WMI_KEY_USE_TX_GROUP;
|
|
break;
|
|
default:
|
|
/* TODO: Rx GTK or Tx GTK? */
|
|
wil_err(wil, "Can't determine GTK type\n");
|
|
rc = WMI_KEY_USE_RX_GROUP;
|
|
break;
|
|
}
|
|
}
|
|
wil_dbg_misc(wil, "%s() -> %s\n", __func__, key_usage_str[rc]);
|
|
|
|
return rc;
|
|
}
|
|
|
|
static int wil_cfg80211_add_key(struct wiphy *wiphy,
|
|
struct net_device *ndev,
|
|
u8 key_index, bool pairwise,
|
|
const u8 *mac_addr,
|
|
struct key_params *params)
|
|
{
|
|
struct wil6210_priv *wil = wiphy_to_wil(wiphy);
|
|
enum wmi_key_usage key_usage = wil_detect_key_usage(wil, pairwise);
|
|
|
|
wil_dbg_misc(wil, "%s(%pM[%d] %s)\n", __func__, mac_addr, key_index,
|
|
pairwise ? "PTK" : "GTK");
|
|
|
|
return wmi_add_cipher_key(wil, key_index, mac_addr, params->key_len,
|
|
params->key, key_usage);
|
|
}
|
|
|
|
static int wil_cfg80211_del_key(struct wiphy *wiphy,
|
|
struct net_device *ndev,
|
|
u8 key_index, bool pairwise,
|
|
const u8 *mac_addr)
|
|
{
|
|
struct wil6210_priv *wil = wiphy_to_wil(wiphy);
|
|
enum wmi_key_usage key_usage = wil_detect_key_usage(wil, pairwise);
|
|
|
|
wil_dbg_misc(wil, "%s(%pM[%d] %s)\n", __func__, mac_addr, key_index,
|
|
pairwise ? "PTK" : "GTK");
|
|
|
|
return wmi_del_cipher_key(wil, key_index, mac_addr, key_usage);
|
|
}
|
|
|
|
/* Need to be present or wiphy_new() will WARN */
|
|
static int wil_cfg80211_set_default_key(struct wiphy *wiphy,
|
|
struct net_device *ndev,
|
|
u8 key_index, bool unicast,
|
|
bool multicast)
|
|
{
|
|
return 0;
|
|
}
|
|
|
|
static int wil_remain_on_channel(struct wiphy *wiphy,
|
|
struct wireless_dev *wdev,
|
|
struct ieee80211_channel *chan,
|
|
unsigned int duration,
|
|
u64 *cookie)
|
|
{
|
|
struct wil6210_priv *wil = wiphy_to_wil(wiphy);
|
|
int rc;
|
|
|
|
/* TODO: handle duration */
|
|
wil_info(wil, "%s(%d, %d ms)\n", __func__, chan->center_freq, duration);
|
|
|
|
rc = wmi_set_channel(wil, chan->hw_value);
|
|
if (rc)
|
|
return rc;
|
|
|
|
rc = wmi_rxon(wil, true);
|
|
|
|
return rc;
|
|
}
|
|
|
|
static int wil_cancel_remain_on_channel(struct wiphy *wiphy,
|
|
struct wireless_dev *wdev,
|
|
u64 cookie)
|
|
{
|
|
struct wil6210_priv *wil = wiphy_to_wil(wiphy);
|
|
int rc;
|
|
|
|
wil_info(wil, "%s()\n", __func__);
|
|
|
|
rc = wmi_rxon(wil, false);
|
|
|
|
return rc;
|
|
}
|
|
|
|
static void wil_print_bcon_data(struct cfg80211_beacon_data *b)
|
|
{
|
|
print_hex_dump_bytes("head ", DUMP_PREFIX_OFFSET,
|
|
b->head, b->head_len);
|
|
print_hex_dump_bytes("tail ", DUMP_PREFIX_OFFSET,
|
|
b->tail, b->tail_len);
|
|
print_hex_dump_bytes("BCON IE ", DUMP_PREFIX_OFFSET,
|
|
b->beacon_ies, b->beacon_ies_len);
|
|
print_hex_dump_bytes("PROBE ", DUMP_PREFIX_OFFSET,
|
|
b->probe_resp, b->probe_resp_len);
|
|
print_hex_dump_bytes("PROBE IE ", DUMP_PREFIX_OFFSET,
|
|
b->proberesp_ies, b->proberesp_ies_len);
|
|
print_hex_dump_bytes("ASSOC IE ", DUMP_PREFIX_OFFSET,
|
|
b->assocresp_ies, b->assocresp_ies_len);
|
|
}
|
|
|
|
static int wil_fix_bcon(struct wil6210_priv *wil,
|
|
struct cfg80211_beacon_data *bcon)
|
|
{
|
|
struct ieee80211_mgmt *f = (struct ieee80211_mgmt *)bcon->probe_resp;
|
|
size_t hlen = offsetof(struct ieee80211_mgmt, u.probe_resp.variable);
|
|
int rc = 0;
|
|
|
|
if (bcon->probe_resp_len <= hlen)
|
|
return 0;
|
|
|
|
if (!bcon->assocresp_ies) {
|
|
bcon->assocresp_ies = f->u.probe_resp.variable;
|
|
bcon->assocresp_ies_len = bcon->probe_resp_len - hlen;
|
|
rc = 1;
|
|
}
|
|
|
|
return rc;
|
|
}
|
|
|
|
/* internal functions for device reset and starting AP */
|
|
static int _wil_cfg80211_set_ies(struct wiphy *wiphy,
|
|
size_t probe_ies_len, const u8 *probe_ies,
|
|
size_t assoc_ies_len, const u8 *assoc_ies)
|
|
|
|
{
|
|
int rc;
|
|
struct wil6210_priv *wil = wiphy_to_wil(wiphy);
|
|
|
|
/* FW do not form regular beacon, so bcon IE's are not set
|
|
* For the DMG bcon, when it will be supported, bcon IE's will
|
|
* be reused; add something like:
|
|
* wmi_set_ie(wil, WMI_FRAME_BEACON, bcon->beacon_ies_len,
|
|
* bcon->beacon_ies);
|
|
*/
|
|
rc = wmi_set_ie(wil, WMI_FRAME_PROBE_RESP, probe_ies_len, probe_ies);
|
|
if (rc) {
|
|
wil_err(wil, "set_ie(PROBE_RESP) failed\n");
|
|
return rc;
|
|
}
|
|
|
|
rc = wmi_set_ie(wil, WMI_FRAME_ASSOC_RESP, assoc_ies_len, assoc_ies);
|
|
if (rc) {
|
|
wil_err(wil, "set_ie(ASSOC_RESP) failed\n");
|
|
return rc;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int _wil_cfg80211_start_ap(struct wiphy *wiphy,
|
|
struct net_device *ndev,
|
|
const u8 *ssid, size_t ssid_len, u32 privacy,
|
|
int bi, u8 chan,
|
|
size_t probe_ies_len, const u8 *probe_ies,
|
|
size_t assoc_ies_len, const u8 *assoc_ies,
|
|
u8 hidden_ssid)
|
|
{
|
|
struct wil6210_priv *wil = wiphy_to_wil(wiphy);
|
|
int rc;
|
|
struct wireless_dev *wdev = ndev->ieee80211_ptr;
|
|
u8 wmi_nettype = wil_iftype_nl2wmi(wdev->iftype);
|
|
|
|
wil_set_recovery_state(wil, fw_recovery_idle);
|
|
|
|
mutex_lock(&wil->mutex);
|
|
|
|
__wil_down(wil);
|
|
rc = __wil_up(wil);
|
|
if (rc)
|
|
goto out;
|
|
|
|
rc = wmi_set_ssid(wil, ssid_len, ssid);
|
|
if (rc)
|
|
goto out;
|
|
|
|
rc = _wil_cfg80211_set_ies(wiphy, probe_ies_len, probe_ies,
|
|
assoc_ies_len, assoc_ies);
|
|
if (rc)
|
|
goto out;
|
|
|
|
wil->privacy = privacy;
|
|
wil->channel = chan;
|
|
wil->hidden_ssid = hidden_ssid;
|
|
|
|
netif_carrier_on(ndev);
|
|
|
|
rc = wmi_pcp_start(wil, bi, wmi_nettype, chan, hidden_ssid);
|
|
if (rc)
|
|
goto err_pcp_start;
|
|
|
|
rc = wil_bcast_init(wil);
|
|
if (rc)
|
|
goto err_bcast;
|
|
|
|
goto out; /* success */
|
|
|
|
err_bcast:
|
|
wmi_pcp_stop(wil);
|
|
err_pcp_start:
|
|
netif_carrier_off(ndev);
|
|
out:
|
|
mutex_unlock(&wil->mutex);
|
|
return rc;
|
|
}
|
|
|
|
static int wil_cfg80211_change_beacon(struct wiphy *wiphy,
|
|
struct net_device *ndev,
|
|
struct cfg80211_beacon_data *bcon)
|
|
{
|
|
struct wil6210_priv *wil = wiphy_to_wil(wiphy);
|
|
struct ieee80211_mgmt *f = (struct ieee80211_mgmt *)bcon->probe_resp;
|
|
size_t hlen = offsetof(struct ieee80211_mgmt, u.probe_resp.variable);
|
|
const u8 *pr_ies = NULL;
|
|
size_t pr_ies_len = 0;
|
|
int rc;
|
|
u32 privacy = 0;
|
|
|
|
wil_dbg_misc(wil, "%s()\n", __func__);
|
|
wil_print_bcon_data(bcon);
|
|
|
|
if (bcon->probe_resp_len > hlen) {
|
|
pr_ies = f->u.probe_resp.variable;
|
|
pr_ies_len = bcon->probe_resp_len - hlen;
|
|
}
|
|
|
|
if (wil_fix_bcon(wil, bcon)) {
|
|
wil_dbg_misc(wil, "Fixed bcon\n");
|
|
wil_print_bcon_data(bcon);
|
|
}
|
|
|
|
if (pr_ies && cfg80211_find_ie(WLAN_EID_RSN, pr_ies, pr_ies_len))
|
|
privacy = 1;
|
|
|
|
/* in case privacy has changed, need to restart the AP */
|
|
if (wil->privacy != privacy) {
|
|
struct wireless_dev *wdev = ndev->ieee80211_ptr;
|
|
|
|
wil_dbg_misc(wil, "privacy changed %d=>%d. Restarting AP\n",
|
|
wil->privacy, privacy);
|
|
|
|
rc = _wil_cfg80211_start_ap(wiphy, ndev, wdev->ssid,
|
|
wdev->ssid_len, privacy,
|
|
wdev->beacon_interval,
|
|
wil->channel, pr_ies_len, pr_ies,
|
|
bcon->assocresp_ies_len,
|
|
bcon->assocresp_ies,
|
|
wil->hidden_ssid);
|
|
} else {
|
|
rc = _wil_cfg80211_set_ies(wiphy, pr_ies_len, pr_ies,
|
|
bcon->assocresp_ies_len,
|
|
bcon->assocresp_ies);
|
|
}
|
|
|
|
return rc;
|
|
}
|
|
|
|
static int wil_cfg80211_start_ap(struct wiphy *wiphy,
|
|
struct net_device *ndev,
|
|
struct cfg80211_ap_settings *info)
|
|
{
|
|
int rc;
|
|
struct wil6210_priv *wil = wiphy_to_wil(wiphy);
|
|
struct ieee80211_channel *channel = info->chandef.chan;
|
|
struct cfg80211_beacon_data *bcon = &info->beacon;
|
|
struct cfg80211_crypto_settings *crypto = &info->crypto;
|
|
struct ieee80211_mgmt *f = (struct ieee80211_mgmt *)bcon->probe_resp;
|
|
size_t hlen = offsetof(struct ieee80211_mgmt, u.probe_resp.variable);
|
|
const u8 *pr_ies = NULL;
|
|
size_t pr_ies_len = 0;
|
|
u8 hidden_ssid;
|
|
|
|
wil_dbg_misc(wil, "%s()\n", __func__);
|
|
|
|
if (!channel) {
|
|
wil_err(wil, "AP: No channel???\n");
|
|
return -EINVAL;
|
|
}
|
|
|
|
switch (info->hidden_ssid) {
|
|
case NL80211_HIDDEN_SSID_NOT_IN_USE:
|
|
hidden_ssid = WMI_HIDDEN_SSID_DISABLED;
|
|
break;
|
|
|
|
case NL80211_HIDDEN_SSID_ZERO_LEN:
|
|
hidden_ssid = WMI_HIDDEN_SSID_SEND_EMPTY;
|
|
break;
|
|
|
|
case NL80211_HIDDEN_SSID_ZERO_CONTENTS:
|
|
hidden_ssid = WMI_HIDDEN_SSID_CLEAR;
|
|
break;
|
|
|
|
default:
|
|
wil_err(wil, "AP: Invalid hidden SSID %d\n", info->hidden_ssid);
|
|
return -EOPNOTSUPP;
|
|
}
|
|
wil_dbg_misc(wil, "AP on Channel %d %d MHz, %s\n", channel->hw_value,
|
|
channel->center_freq, info->privacy ? "secure" : "open");
|
|
wil_dbg_misc(wil, "Privacy: %d auth_type %d\n",
|
|
info->privacy, info->auth_type);
|
|
wil_dbg_misc(wil, "Hidden SSID mode: %d\n",
|
|
info->hidden_ssid);
|
|
wil_dbg_misc(wil, "BI %d DTIM %d\n", info->beacon_interval,
|
|
info->dtim_period);
|
|
print_hex_dump_bytes("SSID ", DUMP_PREFIX_OFFSET,
|
|
info->ssid, info->ssid_len);
|
|
wil_print_bcon_data(bcon);
|
|
wil_print_crypto(wil, crypto);
|
|
|
|
if (bcon->probe_resp_len > hlen) {
|
|
pr_ies = f->u.probe_resp.variable;
|
|
pr_ies_len = bcon->probe_resp_len - hlen;
|
|
}
|
|
|
|
if (wil_fix_bcon(wil, bcon)) {
|
|
wil_dbg_misc(wil, "Fixed bcon\n");
|
|
wil_print_bcon_data(bcon);
|
|
}
|
|
|
|
rc = _wil_cfg80211_start_ap(wiphy, ndev,
|
|
info->ssid, info->ssid_len, info->privacy,
|
|
info->beacon_interval, channel->hw_value,
|
|
pr_ies_len, pr_ies,
|
|
bcon->assocresp_ies_len,
|
|
bcon->assocresp_ies,
|
|
hidden_ssid);
|
|
|
|
return rc;
|
|
}
|
|
|
|
static int wil_cfg80211_stop_ap(struct wiphy *wiphy,
|
|
struct net_device *ndev)
|
|
{
|
|
struct wil6210_priv *wil = wiphy_to_wil(wiphy);
|
|
|
|
wil_dbg_misc(wil, "%s()\n", __func__);
|
|
|
|
netif_carrier_off(ndev);
|
|
wil_set_recovery_state(wil, fw_recovery_idle);
|
|
|
|
mutex_lock(&wil->mutex);
|
|
|
|
wmi_pcp_stop(wil);
|
|
|
|
__wil_down(wil);
|
|
|
|
mutex_unlock(&wil->mutex);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int wil_cfg80211_del_station(struct wiphy *wiphy,
|
|
struct net_device *dev,
|
|
struct station_del_parameters *params)
|
|
{
|
|
struct wil6210_priv *wil = wiphy_to_wil(wiphy);
|
|
|
|
wil_dbg_misc(wil, "%s(%pM, reason=%d)\n", __func__, params->mac,
|
|
params->reason_code);
|
|
|
|
mutex_lock(&wil->mutex);
|
|
wil6210_disconnect(wil, params->mac, params->reason_code, false);
|
|
mutex_unlock(&wil->mutex);
|
|
|
|
return 0;
|
|
}
|
|
|
|
/* probe_client handling */
|
|
static void wil_probe_client_handle(struct wil6210_priv *wil,
|
|
struct wil_probe_client_req *req)
|
|
{
|
|
struct net_device *ndev = wil_to_ndev(wil);
|
|
struct wil_sta_info *sta = &wil->sta[req->cid];
|
|
/* assume STA is alive if it is still connected,
|
|
* else FW will disconnect it
|
|
*/
|
|
bool alive = (sta->status == wil_sta_connected);
|
|
|
|
cfg80211_probe_status(ndev, sta->addr, req->cookie, alive, GFP_KERNEL);
|
|
}
|
|
|
|
static struct list_head *next_probe_client(struct wil6210_priv *wil)
|
|
{
|
|
struct list_head *ret = NULL;
|
|
|
|
mutex_lock(&wil->probe_client_mutex);
|
|
|
|
if (!list_empty(&wil->probe_client_pending)) {
|
|
ret = wil->probe_client_pending.next;
|
|
list_del(ret);
|
|
}
|
|
|
|
mutex_unlock(&wil->probe_client_mutex);
|
|
|
|
return ret;
|
|
}
|
|
|
|
void wil_probe_client_worker(struct work_struct *work)
|
|
{
|
|
struct wil6210_priv *wil = container_of(work, struct wil6210_priv,
|
|
probe_client_worker);
|
|
struct wil_probe_client_req *req;
|
|
struct list_head *lh;
|
|
|
|
while ((lh = next_probe_client(wil)) != NULL) {
|
|
req = list_entry(lh, struct wil_probe_client_req, list);
|
|
|
|
wil_probe_client_handle(wil, req);
|
|
kfree(req);
|
|
}
|
|
}
|
|
|
|
void wil_probe_client_flush(struct wil6210_priv *wil)
|
|
{
|
|
struct wil_probe_client_req *req, *t;
|
|
|
|
wil_dbg_misc(wil, "%s()\n", __func__);
|
|
|
|
mutex_lock(&wil->probe_client_mutex);
|
|
|
|
list_for_each_entry_safe(req, t, &wil->probe_client_pending, list) {
|
|
list_del(&req->list);
|
|
kfree(req);
|
|
}
|
|
|
|
mutex_unlock(&wil->probe_client_mutex);
|
|
}
|
|
|
|
static int wil_cfg80211_probe_client(struct wiphy *wiphy,
|
|
struct net_device *dev,
|
|
const u8 *peer, u64 *cookie)
|
|
{
|
|
struct wil6210_priv *wil = wiphy_to_wil(wiphy);
|
|
struct wil_probe_client_req *req;
|
|
int cid = wil_find_cid(wil, peer);
|
|
|
|
wil_dbg_misc(wil, "%s(%pM => CID %d)\n", __func__, peer, cid);
|
|
|
|
if (cid < 0)
|
|
return -ENOLINK;
|
|
|
|
req = kzalloc(sizeof(*req), GFP_KERNEL);
|
|
if (!req)
|
|
return -ENOMEM;
|
|
|
|
req->cid = cid;
|
|
req->cookie = cid;
|
|
|
|
mutex_lock(&wil->probe_client_mutex);
|
|
list_add_tail(&req->list, &wil->probe_client_pending);
|
|
mutex_unlock(&wil->probe_client_mutex);
|
|
|
|
*cookie = req->cookie;
|
|
queue_work(wil->wq_service, &wil->probe_client_worker);
|
|
return 0;
|
|
}
|
|
|
|
static int wil_cfg80211_change_bss(struct wiphy *wiphy,
|
|
struct net_device *dev,
|
|
struct bss_parameters *params)
|
|
{
|
|
struct wil6210_priv *wil = wiphy_to_wil(wiphy);
|
|
|
|
if (params->ap_isolate >= 0) {
|
|
wil_dbg_misc(wil, "%s(ap_isolate %d => %d)\n", __func__,
|
|
wil->ap_isolate, params->ap_isolate);
|
|
wil->ap_isolate = params->ap_isolate;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static struct cfg80211_ops wil_cfg80211_ops = {
|
|
.scan = wil_cfg80211_scan,
|
|
.connect = wil_cfg80211_connect,
|
|
.disconnect = wil_cfg80211_disconnect,
|
|
.change_virtual_intf = wil_cfg80211_change_iface,
|
|
.get_station = wil_cfg80211_get_station,
|
|
.dump_station = wil_cfg80211_dump_station,
|
|
.remain_on_channel = wil_remain_on_channel,
|
|
.cancel_remain_on_channel = wil_cancel_remain_on_channel,
|
|
.mgmt_tx = wil_cfg80211_mgmt_tx,
|
|
.set_monitor_channel = wil_cfg80211_set_channel,
|
|
.add_key = wil_cfg80211_add_key,
|
|
.del_key = wil_cfg80211_del_key,
|
|
.set_default_key = wil_cfg80211_set_default_key,
|
|
/* AP mode */
|
|
.change_beacon = wil_cfg80211_change_beacon,
|
|
.start_ap = wil_cfg80211_start_ap,
|
|
.stop_ap = wil_cfg80211_stop_ap,
|
|
.del_station = wil_cfg80211_del_station,
|
|
.probe_client = wil_cfg80211_probe_client,
|
|
.change_bss = wil_cfg80211_change_bss,
|
|
};
|
|
|
|
static void wil_wiphy_init(struct wiphy *wiphy)
|
|
{
|
|
wiphy->max_scan_ssids = 1;
|
|
wiphy->max_scan_ie_len = WMI_MAX_IE_LEN;
|
|
wiphy->max_num_pmkids = 0 /* TODO: */;
|
|
wiphy->interface_modes = BIT(NL80211_IFTYPE_STATION) |
|
|
BIT(NL80211_IFTYPE_AP) |
|
|
BIT(NL80211_IFTYPE_MONITOR);
|
|
/* TODO: enable P2P when integrated with supplicant:
|
|
* BIT(NL80211_IFTYPE_P2P_CLIENT) | BIT(NL80211_IFTYPE_P2P_GO)
|
|
*/
|
|
wiphy->flags |= WIPHY_FLAG_HAVE_AP_SME |
|
|
WIPHY_FLAG_AP_PROBE_RESP_OFFLOAD;
|
|
dev_dbg(wiphy_dev(wiphy), "%s : flags = 0x%08x\n",
|
|
__func__, wiphy->flags);
|
|
wiphy->probe_resp_offload =
|
|
NL80211_PROBE_RESP_OFFLOAD_SUPPORT_WPS |
|
|
NL80211_PROBE_RESP_OFFLOAD_SUPPORT_WPS2 |
|
|
NL80211_PROBE_RESP_OFFLOAD_SUPPORT_P2P;
|
|
|
|
wiphy->bands[IEEE80211_BAND_60GHZ] = &wil_band_60ghz;
|
|
|
|
/* TODO: figure this out */
|
|
wiphy->signal_type = CFG80211_SIGNAL_TYPE_UNSPEC;
|
|
|
|
wiphy->cipher_suites = wil_cipher_suites;
|
|
wiphy->n_cipher_suites = ARRAY_SIZE(wil_cipher_suites);
|
|
wiphy->mgmt_stypes = wil_mgmt_stypes;
|
|
wiphy->features |= NL80211_FEATURE_SK_TX_STATUS;
|
|
}
|
|
|
|
struct wireless_dev *wil_cfg80211_init(struct device *dev)
|
|
{
|
|
int rc = 0;
|
|
struct wireless_dev *wdev;
|
|
|
|
dev_dbg(dev, "%s()\n", __func__);
|
|
|
|
wdev = kzalloc(sizeof(*wdev), GFP_KERNEL);
|
|
if (!wdev)
|
|
return ERR_PTR(-ENOMEM);
|
|
|
|
wdev->wiphy = wiphy_new(&wil_cfg80211_ops,
|
|
sizeof(struct wil6210_priv));
|
|
if (!wdev->wiphy) {
|
|
rc = -ENOMEM;
|
|
goto out;
|
|
}
|
|
|
|
set_wiphy_dev(wdev->wiphy, dev);
|
|
wil_wiphy_init(wdev->wiphy);
|
|
|
|
rc = wiphy_register(wdev->wiphy);
|
|
if (rc < 0)
|
|
goto out_failed_reg;
|
|
|
|
return wdev;
|
|
|
|
out_failed_reg:
|
|
wiphy_free(wdev->wiphy);
|
|
out:
|
|
kfree(wdev);
|
|
|
|
return ERR_PTR(rc);
|
|
}
|
|
|
|
void wil_wdev_free(struct wil6210_priv *wil)
|
|
{
|
|
struct wireless_dev *wdev = wil_to_wdev(wil);
|
|
|
|
dev_dbg(wil_to_dev(wil), "%s()\n", __func__);
|
|
|
|
if (!wdev)
|
|
return;
|
|
|
|
wiphy_unregister(wdev->wiphy);
|
|
wiphy_free(wdev->wiphy);
|
|
kfree(wdev);
|
|
}
|