mirror of
https://github.com/AuxXxilium/linux_dsm_epyc7002.git
synced 2024-12-16 19:36:44 +07:00
de15fd31fc
The device sends connection terminated and [re]association success (or failure) events when roaming occours. The patch uses cfg80211_roamed instead of cfg80211_connect_result to notify SME for roaming. Signed-off-by: Zhu Yi <yi.zhu@intel.com> Signed-off-by: Samuel Ortiz <sameo@linux.intel.com> Signed-off-by: John W. Linville <linville@tuxdriver.com>
902 lines
25 KiB
C
902 lines
25 KiB
C
/*
|
|
* Intel Wireless Multicomm 3200 WiFi driver
|
|
*
|
|
* Copyright (C) 2009 Intel Corporation. All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
*
|
|
* * Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* * Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in
|
|
* the documentation and/or other materials provided with the
|
|
* distribution.
|
|
* * Neither the name of Intel Corporation nor the names of its
|
|
* contributors may be used to endorse or promote products derived
|
|
* from this software without specific prior written permission.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
|
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
|
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
|
|
* A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
|
|
* OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
|
|
* LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
|
|
* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
*
|
|
*
|
|
* Intel Corporation <ilw@linux.intel.com>
|
|
* Samuel Ortiz <samuel.ortiz@intel.com>
|
|
* Zhu Yi <yi.zhu@intel.com>
|
|
*
|
|
*/
|
|
|
|
#include <linux/kernel.h>
|
|
#include <linux/wireless.h>
|
|
#include <linux/etherdevice.h>
|
|
#include <linux/ieee80211.h>
|
|
|
|
#include "iwm.h"
|
|
#include "bus.h"
|
|
#include "hal.h"
|
|
#include "umac.h"
|
|
#include "commands.h"
|
|
#include "debug.h"
|
|
|
|
static int iwm_send_lmac_ptrough_cmd(struct iwm_priv *iwm,
|
|
u8 lmac_cmd_id,
|
|
const void *lmac_payload,
|
|
u16 lmac_payload_size,
|
|
u8 resp)
|
|
{
|
|
struct iwm_udma_wifi_cmd udma_cmd = UDMA_LMAC_INIT;
|
|
struct iwm_umac_cmd umac_cmd;
|
|
struct iwm_lmac_cmd lmac_cmd;
|
|
|
|
lmac_cmd.id = lmac_cmd_id;
|
|
|
|
umac_cmd.id = UMAC_CMD_OPCODE_WIFI_PASS_THROUGH;
|
|
umac_cmd.resp = resp;
|
|
|
|
return iwm_hal_send_host_cmd(iwm, &udma_cmd, &umac_cmd, &lmac_cmd,
|
|
lmac_payload, lmac_payload_size);
|
|
}
|
|
|
|
int iwm_send_wifi_if_cmd(struct iwm_priv *iwm, void *payload, u16 payload_size,
|
|
bool resp)
|
|
{
|
|
struct iwm_umac_wifi_if *hdr = (struct iwm_umac_wifi_if *)payload;
|
|
struct iwm_udma_wifi_cmd udma_cmd = UDMA_UMAC_INIT;
|
|
struct iwm_umac_cmd umac_cmd;
|
|
int ret;
|
|
u8 oid = hdr->oid;
|
|
|
|
umac_cmd.id = UMAC_CMD_OPCODE_WIFI_IF_WRAPPER;
|
|
umac_cmd.resp = resp;
|
|
|
|
ret = iwm_hal_send_umac_cmd(iwm, &udma_cmd, &umac_cmd,
|
|
payload, payload_size);
|
|
|
|
if (resp) {
|
|
ret = wait_event_interruptible_timeout(iwm->wifi_ntfy_queue,
|
|
test_and_clear_bit(oid, &iwm->wifi_ntfy[0]),
|
|
3 * HZ);
|
|
|
|
return ret ? 0 : -EBUSY;
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
static struct coex_event iwm_sta_xor_prio_tbl[COEX_EVENTS_NUM] =
|
|
{
|
|
{4, 3, 0, COEX_UNASSOC_IDLE_FLAGS},
|
|
{4, 3, 0, COEX_UNASSOC_MANUAL_SCAN_FLAGS},
|
|
{4, 3, 0, COEX_UNASSOC_AUTO_SCAN_FLAGS},
|
|
{4, 3, 0, COEX_CALIBRATION_FLAGS},
|
|
{4, 3, 0, COEX_PERIODIC_CALIBRATION_FLAGS},
|
|
{4, 3, 0, COEX_CONNECTION_ESTAB_FLAGS},
|
|
{4, 3, 0, COEX_ASSOCIATED_IDLE_FLAGS},
|
|
{4, 3, 0, COEX_ASSOC_MANUAL_SCAN_FLAGS},
|
|
{4, 3, 0, COEX_ASSOC_AUTO_SCAN_FLAGS},
|
|
{4, 3, 0, COEX_ASSOC_ACTIVE_LEVEL_FLAGS},
|
|
{6, 3, 0, COEX_XOR_RF_ON_FLAGS},
|
|
{4, 3, 0, COEX_RF_OFF_FLAGS},
|
|
{6, 6, 0, COEX_STAND_ALONE_DEBUG_FLAGS},
|
|
{4, 3, 0, COEX_IPAN_ASSOC_LEVEL_FLAGS},
|
|
{4, 3, 0, COEX_RSRVD1_FLAGS},
|
|
{4, 3, 0, COEX_RSRVD2_FLAGS}
|
|
};
|
|
|
|
static struct coex_event iwm_sta_cm_prio_tbl[COEX_EVENTS_NUM] =
|
|
{
|
|
{1, 1, 0, COEX_UNASSOC_IDLE_FLAGS},
|
|
{4, 3, 0, COEX_UNASSOC_MANUAL_SCAN_FLAGS},
|
|
{3, 3, 0, COEX_UNASSOC_AUTO_SCAN_FLAGS},
|
|
{5, 5, 0, COEX_CALIBRATION_FLAGS},
|
|
{3, 3, 0, COEX_PERIODIC_CALIBRATION_FLAGS},
|
|
{5, 4, 0, COEX_CONNECTION_ESTAB_FLAGS},
|
|
{4, 4, 0, COEX_ASSOCIATED_IDLE_FLAGS},
|
|
{4, 4, 0, COEX_ASSOC_MANUAL_SCAN_FLAGS},
|
|
{4, 4, 0, COEX_ASSOC_AUTO_SCAN_FLAGS},
|
|
{4, 4, 0, COEX_ASSOC_ACTIVE_LEVEL_FLAGS},
|
|
{1, 1, 0, COEX_RF_ON_FLAGS},
|
|
{1, 1, 0, COEX_RF_OFF_FLAGS},
|
|
{6, 6, 0, COEX_STAND_ALONE_DEBUG_FLAGS},
|
|
{5, 4, 0, COEX_IPAN_ASSOC_LEVEL_FLAGS},
|
|
{1, 1, 0, COEX_RSRVD1_FLAGS},
|
|
{1, 1, 0, COEX_RSRVD2_FLAGS}
|
|
};
|
|
|
|
int iwm_send_prio_table(struct iwm_priv *iwm)
|
|
{
|
|
struct iwm_coex_prio_table_cmd coex_table_cmd;
|
|
u32 coex_enabled, mode_enabled;
|
|
|
|
memset(&coex_table_cmd, 0, sizeof(struct iwm_coex_prio_table_cmd));
|
|
|
|
coex_table_cmd.flags = COEX_FLAGS_STA_TABLE_VALID_MSK;
|
|
|
|
switch (iwm->conf.coexist_mode) {
|
|
case COEX_MODE_XOR:
|
|
case COEX_MODE_CM:
|
|
coex_enabled = 1;
|
|
break;
|
|
default:
|
|
coex_enabled = 0;
|
|
break;
|
|
}
|
|
|
|
switch (iwm->conf.mode) {
|
|
case UMAC_MODE_BSS:
|
|
case UMAC_MODE_IBSS:
|
|
mode_enabled = 1;
|
|
break;
|
|
default:
|
|
mode_enabled = 0;
|
|
break;
|
|
}
|
|
|
|
if (coex_enabled && mode_enabled) {
|
|
coex_table_cmd.flags |= COEX_FLAGS_COEX_ENABLE_MSK |
|
|
COEX_FLAGS_ASSOC_WAKEUP_UMASK_MSK |
|
|
COEX_FLAGS_UNASSOC_WAKEUP_UMASK_MSK;
|
|
|
|
switch (iwm->conf.coexist_mode) {
|
|
case COEX_MODE_XOR:
|
|
memcpy(coex_table_cmd.sta_prio, iwm_sta_xor_prio_tbl,
|
|
sizeof(iwm_sta_xor_prio_tbl));
|
|
break;
|
|
case COEX_MODE_CM:
|
|
memcpy(coex_table_cmd.sta_prio, iwm_sta_cm_prio_tbl,
|
|
sizeof(iwm_sta_cm_prio_tbl));
|
|
break;
|
|
default:
|
|
IWM_ERR(iwm, "Invalid coex_mode 0x%x\n",
|
|
iwm->conf.coexist_mode);
|
|
break;
|
|
}
|
|
} else
|
|
IWM_WARN(iwm, "coexistense disabled\n");
|
|
|
|
return iwm_send_lmac_ptrough_cmd(iwm, COEX_PRIORITY_TABLE_CMD,
|
|
&coex_table_cmd,
|
|
sizeof(struct iwm_coex_prio_table_cmd), 1);
|
|
}
|
|
|
|
int iwm_send_init_calib_cfg(struct iwm_priv *iwm, u8 calib_requested)
|
|
{
|
|
struct iwm_lmac_cal_cfg_cmd cal_cfg_cmd;
|
|
|
|
memset(&cal_cfg_cmd, 0, sizeof(struct iwm_lmac_cal_cfg_cmd));
|
|
|
|
cal_cfg_cmd.ucode_cfg.init.enable = cpu_to_le32(calib_requested);
|
|
cal_cfg_cmd.ucode_cfg.init.start = cpu_to_le32(calib_requested);
|
|
cal_cfg_cmd.ucode_cfg.init.send_res = cpu_to_le32(calib_requested);
|
|
cal_cfg_cmd.ucode_cfg.flags =
|
|
cpu_to_le32(CALIB_CFG_FLAG_SEND_COMPLETE_NTFY_AFTER_MSK);
|
|
|
|
return iwm_send_lmac_ptrough_cmd(iwm, CALIBRATION_CFG_CMD, &cal_cfg_cmd,
|
|
sizeof(struct iwm_lmac_cal_cfg_cmd), 1);
|
|
}
|
|
|
|
int iwm_send_periodic_calib_cfg(struct iwm_priv *iwm, u8 calib_requested)
|
|
{
|
|
struct iwm_lmac_cal_cfg_cmd cal_cfg_cmd;
|
|
|
|
memset(&cal_cfg_cmd, 0, sizeof(struct iwm_lmac_cal_cfg_cmd));
|
|
|
|
cal_cfg_cmd.ucode_cfg.periodic.enable = cpu_to_le32(calib_requested);
|
|
cal_cfg_cmd.ucode_cfg.periodic.start = cpu_to_le32(calib_requested);
|
|
|
|
return iwm_send_lmac_ptrough_cmd(iwm, CALIBRATION_CFG_CMD, &cal_cfg_cmd,
|
|
sizeof(struct iwm_lmac_cal_cfg_cmd), 0);
|
|
}
|
|
|
|
int iwm_store_rxiq_calib_result(struct iwm_priv *iwm)
|
|
{
|
|
struct iwm_calib_rxiq *rxiq;
|
|
u8 *eeprom_rxiq = iwm_eeprom_access(iwm, IWM_EEPROM_CALIB_RXIQ);
|
|
int grplen = sizeof(struct iwm_calib_rxiq_group);
|
|
|
|
rxiq = kzalloc(sizeof(struct iwm_calib_rxiq), GFP_KERNEL);
|
|
if (!rxiq) {
|
|
IWM_ERR(iwm, "Couldn't alloc memory for RX IQ\n");
|
|
return -ENOMEM;
|
|
}
|
|
|
|
eeprom_rxiq = iwm_eeprom_access(iwm, IWM_EEPROM_CALIB_RXIQ);
|
|
if (IS_ERR(eeprom_rxiq)) {
|
|
IWM_ERR(iwm, "Couldn't access EEPROM RX IQ entry\n");
|
|
kfree(rxiq);
|
|
return PTR_ERR(eeprom_rxiq);
|
|
}
|
|
|
|
iwm->calib_res[SHILOH_PHY_CALIBRATE_RX_IQ_CMD].buf = (u8 *)rxiq;
|
|
iwm->calib_res[SHILOH_PHY_CALIBRATE_RX_IQ_CMD].size = sizeof(*rxiq);
|
|
|
|
rxiq->hdr.opcode = SHILOH_PHY_CALIBRATE_RX_IQ_CMD;
|
|
rxiq->hdr.first_grp = 0;
|
|
rxiq->hdr.grp_num = 1;
|
|
rxiq->hdr.all_data_valid = 1;
|
|
|
|
memcpy(&rxiq->group[0], eeprom_rxiq, 4 * grplen);
|
|
memcpy(&rxiq->group[4], eeprom_rxiq + 6 * grplen, grplen);
|
|
|
|
return 0;
|
|
}
|
|
|
|
int iwm_send_calib_results(struct iwm_priv *iwm)
|
|
{
|
|
int i, ret = 0;
|
|
|
|
for (i = PHY_CALIBRATE_OPCODES_NUM; i < CALIBRATION_CMD_NUM; i++) {
|
|
if (test_bit(i - PHY_CALIBRATE_OPCODES_NUM,
|
|
&iwm->calib_done_map)) {
|
|
IWM_DBG_CMD(iwm, DBG,
|
|
"Send calibration %d result\n", i);
|
|
ret |= iwm_send_lmac_ptrough_cmd(iwm,
|
|
REPLY_PHY_CALIBRATION_CMD,
|
|
iwm->calib_res[i].buf,
|
|
iwm->calib_res[i].size, 0);
|
|
|
|
kfree(iwm->calib_res[i].buf);
|
|
iwm->calib_res[i].buf = NULL;
|
|
iwm->calib_res[i].size = 0;
|
|
}
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
int iwm_send_umac_reset(struct iwm_priv *iwm, __le32 reset_flags, bool resp)
|
|
{
|
|
struct iwm_udma_wifi_cmd udma_cmd = UDMA_UMAC_INIT;
|
|
struct iwm_umac_cmd umac_cmd;
|
|
struct iwm_umac_cmd_reset reset;
|
|
|
|
reset.flags = reset_flags;
|
|
|
|
umac_cmd.id = UMAC_CMD_OPCODE_RESET;
|
|
umac_cmd.resp = resp;
|
|
|
|
return iwm_hal_send_umac_cmd(iwm, &udma_cmd, &umac_cmd, &reset,
|
|
sizeof(struct iwm_umac_cmd_reset));
|
|
}
|
|
|
|
int iwm_umac_set_config_fix(struct iwm_priv *iwm, u16 tbl, u16 key, u32 value)
|
|
{
|
|
struct iwm_udma_wifi_cmd udma_cmd = UDMA_UMAC_INIT;
|
|
struct iwm_umac_cmd umac_cmd;
|
|
struct iwm_umac_cmd_set_param_fix param;
|
|
|
|
if ((tbl != UMAC_PARAM_TBL_CFG_FIX) &&
|
|
(tbl != UMAC_PARAM_TBL_FA_CFG_FIX))
|
|
return -EINVAL;
|
|
|
|
umac_cmd.id = UMAC_CMD_OPCODE_SET_PARAM_FIX;
|
|
umac_cmd.resp = 0;
|
|
|
|
param.tbl = cpu_to_le16(tbl);
|
|
param.key = cpu_to_le16(key);
|
|
param.value = cpu_to_le32(value);
|
|
|
|
return iwm_hal_send_umac_cmd(iwm, &udma_cmd, &umac_cmd, ¶m,
|
|
sizeof(struct iwm_umac_cmd_set_param_fix));
|
|
}
|
|
|
|
int iwm_umac_set_config_var(struct iwm_priv *iwm, u16 key,
|
|
void *payload, u16 payload_size)
|
|
{
|
|
struct iwm_udma_wifi_cmd udma_cmd = UDMA_UMAC_INIT;
|
|
struct iwm_umac_cmd umac_cmd;
|
|
struct iwm_umac_cmd_set_param_var *param_hdr;
|
|
u8 *param;
|
|
int ret;
|
|
|
|
param = kzalloc(payload_size +
|
|
sizeof(struct iwm_umac_cmd_set_param_var), GFP_KERNEL);
|
|
if (!param) {
|
|
IWM_ERR(iwm, "Couldn't allocate param\n");
|
|
return -ENOMEM;
|
|
}
|
|
|
|
param_hdr = (struct iwm_umac_cmd_set_param_var *)param;
|
|
|
|
umac_cmd.id = UMAC_CMD_OPCODE_SET_PARAM_VAR;
|
|
umac_cmd.resp = 0;
|
|
|
|
param_hdr->tbl = cpu_to_le16(UMAC_PARAM_TBL_CFG_VAR);
|
|
param_hdr->key = cpu_to_le16(key);
|
|
param_hdr->len = cpu_to_le16(payload_size);
|
|
memcpy(param + sizeof(struct iwm_umac_cmd_set_param_var),
|
|
payload, payload_size);
|
|
|
|
ret = iwm_hal_send_umac_cmd(iwm, &udma_cmd, &umac_cmd, param,
|
|
sizeof(struct iwm_umac_cmd_set_param_var) +
|
|
payload_size);
|
|
kfree(param);
|
|
|
|
return ret;
|
|
}
|
|
|
|
int iwm_send_umac_config(struct iwm_priv *iwm, __le32 reset_flags)
|
|
{
|
|
int ret;
|
|
|
|
/* Use UMAC default values */
|
|
ret = iwm_umac_set_config_fix(iwm, UMAC_PARAM_TBL_CFG_FIX,
|
|
CFG_POWER_INDEX, iwm->conf.power_index);
|
|
if (ret < 0)
|
|
return ret;
|
|
|
|
ret = iwm_umac_set_config_fix(iwm, UMAC_PARAM_TBL_FA_CFG_FIX,
|
|
CFG_FRAG_THRESHOLD,
|
|
iwm->conf.frag_threshold);
|
|
if (ret < 0)
|
|
return ret;
|
|
|
|
ret = iwm_umac_set_config_fix(iwm, UMAC_PARAM_TBL_CFG_FIX,
|
|
CFG_RTS_THRESHOLD,
|
|
iwm->conf.rts_threshold);
|
|
if (ret < 0)
|
|
return ret;
|
|
|
|
ret = iwm_umac_set_config_fix(iwm, UMAC_PARAM_TBL_CFG_FIX,
|
|
CFG_CTS_TO_SELF, iwm->conf.cts_to_self);
|
|
if (ret < 0)
|
|
return ret;
|
|
|
|
ret = iwm_umac_set_config_fix(iwm, UMAC_PARAM_TBL_CFG_FIX,
|
|
CFG_WIRELESS_MODE,
|
|
iwm->conf.wireless_mode);
|
|
if (ret < 0)
|
|
return ret;
|
|
|
|
ret = iwm_umac_set_config_fix(iwm, UMAC_PARAM_TBL_CFG_FIX,
|
|
CFG_COEX_MODE, iwm->conf.coexist_mode);
|
|
if (ret < 0)
|
|
return ret;
|
|
|
|
/*
|
|
ret = iwm_umac_set_config_fix(iwm, UMAC_PARAM_TBL_CFG_FIX,
|
|
CFG_ASSOCIATION_TIMEOUT,
|
|
iwm->conf.assoc_timeout);
|
|
if (ret < 0)
|
|
return ret;
|
|
|
|
ret = iwm_umac_set_config_fix(iwm, UMAC_PARAM_TBL_CFG_FIX,
|
|
CFG_ROAM_TIMEOUT,
|
|
iwm->conf.roam_timeout);
|
|
if (ret < 0)
|
|
return ret;
|
|
|
|
ret = iwm_umac_set_config_fix(iwm, UMAC_PARAM_TBL_CFG_FIX,
|
|
CFG_WIRELESS_MODE,
|
|
WIRELESS_MODE_11A | WIRELESS_MODE_11G);
|
|
if (ret < 0)
|
|
return ret;
|
|
*/
|
|
|
|
ret = iwm_umac_set_config_var(iwm, CFG_NET_ADDR,
|
|
iwm_to_ndev(iwm)->dev_addr, ETH_ALEN);
|
|
if (ret < 0)
|
|
return ret;
|
|
|
|
/* UMAC PM static configurations */
|
|
ret = iwm_umac_set_config_fix(iwm, UMAC_PARAM_TBL_CFG_FIX,
|
|
CFG_PM_LEGACY_RX_TIMEOUT, 0x12C);
|
|
if (ret < 0)
|
|
return ret;
|
|
|
|
ret = iwm_umac_set_config_fix(iwm, UMAC_PARAM_TBL_CFG_FIX,
|
|
CFG_PM_LEGACY_TX_TIMEOUT, 0x15E);
|
|
if (ret < 0)
|
|
return ret;
|
|
|
|
ret = iwm_umac_set_config_fix(iwm, UMAC_PARAM_TBL_CFG_FIX,
|
|
CFG_PM_CTRL_FLAGS, 0x1);
|
|
if (ret < 0)
|
|
return ret;
|
|
|
|
ret = iwm_umac_set_config_fix(iwm, UMAC_PARAM_TBL_CFG_FIX,
|
|
CFG_PM_KEEP_ALIVE_IN_BEACONS, 0x80);
|
|
if (ret < 0)
|
|
return ret;
|
|
|
|
/* reset UMAC */
|
|
ret = iwm_send_umac_reset(iwm, reset_flags, 1);
|
|
if (ret < 0)
|
|
return ret;
|
|
|
|
ret = iwm_notif_handle(iwm, UMAC_CMD_OPCODE_RESET, IWM_SRC_UMAC,
|
|
WAIT_NOTIF_TIMEOUT);
|
|
if (ret) {
|
|
IWM_ERR(iwm, "Wait for UMAC RESET timeout\n");
|
|
return ret;
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
int iwm_send_packet(struct iwm_priv *iwm, struct sk_buff *skb, int pool_id)
|
|
{
|
|
struct iwm_udma_wifi_cmd udma_cmd;
|
|
struct iwm_umac_cmd umac_cmd;
|
|
struct iwm_tx_info *tx_info = skb_to_tx_info(skb);
|
|
|
|
udma_cmd.eop = 1; /* always set eop for non-concatenated Tx */
|
|
udma_cmd.credit_group = pool_id;
|
|
udma_cmd.ra_tid = tx_info->sta << 4 | tx_info->tid;
|
|
udma_cmd.lmac_offset = 0;
|
|
|
|
umac_cmd.id = REPLY_TX;
|
|
umac_cmd.color = tx_info->color;
|
|
umac_cmd.resp = 0;
|
|
|
|
return iwm_hal_send_umac_cmd(iwm, &udma_cmd, &umac_cmd,
|
|
skb->data, skb->len);
|
|
}
|
|
|
|
static int iwm_target_read(struct iwm_priv *iwm, __le32 address,
|
|
u8 *response, u32 resp_size)
|
|
{
|
|
struct iwm_udma_nonwifi_cmd target_cmd;
|
|
struct iwm_nonwifi_cmd *cmd;
|
|
u16 seq_num;
|
|
int ret = 0;
|
|
|
|
target_cmd.opcode = UMAC_HDI_OUT_OPCODE_READ;
|
|
target_cmd.addr = address;
|
|
target_cmd.op1_sz = cpu_to_le32(resp_size);
|
|
target_cmd.op2 = 0;
|
|
target_cmd.handle_by_hw = 0;
|
|
target_cmd.resp = 1;
|
|
target_cmd.eop = 1;
|
|
|
|
ret = iwm_hal_send_target_cmd(iwm, &target_cmd, NULL);
|
|
if (ret < 0) {
|
|
IWM_ERR(iwm, "Couldn't send READ command\n");
|
|
return ret;
|
|
}
|
|
|
|
/* When succeding, the send_target routine returns the seq number */
|
|
seq_num = ret;
|
|
|
|
ret = wait_event_interruptible_timeout(iwm->nonwifi_queue,
|
|
(cmd = iwm_get_pending_nonwifi_cmd(iwm, seq_num,
|
|
UMAC_HDI_OUT_OPCODE_READ)) != NULL,
|
|
2 * HZ);
|
|
|
|
if (!ret) {
|
|
IWM_ERR(iwm, "Didn't receive a target READ answer\n");
|
|
return ret;
|
|
}
|
|
|
|
memcpy(response, cmd->buf.hdr + sizeof(struct iwm_udma_in_hdr),
|
|
resp_size);
|
|
|
|
kfree(cmd);
|
|
|
|
return 0;
|
|
}
|
|
|
|
int iwm_read_mac(struct iwm_priv *iwm, u8 *mac)
|
|
{
|
|
int ret;
|
|
u8 mac_align[ALIGN(ETH_ALEN, 8)];
|
|
|
|
ret = iwm_target_read(iwm, cpu_to_le32(WICO_MAC_ADDRESS_ADDR),
|
|
mac_align, sizeof(mac_align));
|
|
if (ret)
|
|
return ret;
|
|
|
|
if (is_valid_ether_addr(mac_align))
|
|
memcpy(mac, mac_align, ETH_ALEN);
|
|
else {
|
|
IWM_ERR(iwm, "Invalid EEPROM MAC\n");
|
|
memcpy(mac, iwm->conf.mac_addr, ETH_ALEN);
|
|
get_random_bytes(&mac[3], 3);
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int iwm_check_profile(struct iwm_priv *iwm)
|
|
{
|
|
if (!iwm->umac_profile_active)
|
|
return -EAGAIN;
|
|
|
|
if (iwm->umac_profile->sec.ucast_cipher != UMAC_CIPHER_TYPE_WEP_40 &&
|
|
iwm->umac_profile->sec.ucast_cipher != UMAC_CIPHER_TYPE_WEP_104 &&
|
|
iwm->umac_profile->sec.ucast_cipher != UMAC_CIPHER_TYPE_TKIP &&
|
|
iwm->umac_profile->sec.ucast_cipher != UMAC_CIPHER_TYPE_CCMP) {
|
|
IWM_ERR(iwm, "Wrong unicast cipher: 0x%x\n",
|
|
iwm->umac_profile->sec.ucast_cipher);
|
|
return -EAGAIN;
|
|
}
|
|
|
|
if (iwm->umac_profile->sec.mcast_cipher != UMAC_CIPHER_TYPE_WEP_40 &&
|
|
iwm->umac_profile->sec.mcast_cipher != UMAC_CIPHER_TYPE_WEP_104 &&
|
|
iwm->umac_profile->sec.mcast_cipher != UMAC_CIPHER_TYPE_TKIP &&
|
|
iwm->umac_profile->sec.mcast_cipher != UMAC_CIPHER_TYPE_CCMP) {
|
|
IWM_ERR(iwm, "Wrong multicast cipher: 0x%x\n",
|
|
iwm->umac_profile->sec.mcast_cipher);
|
|
return -EAGAIN;
|
|
}
|
|
|
|
if ((iwm->umac_profile->sec.ucast_cipher == UMAC_CIPHER_TYPE_WEP_40 ||
|
|
iwm->umac_profile->sec.ucast_cipher == UMAC_CIPHER_TYPE_WEP_104) &&
|
|
(iwm->umac_profile->sec.ucast_cipher !=
|
|
iwm->umac_profile->sec.mcast_cipher)) {
|
|
IWM_ERR(iwm, "Unicast and multicast ciphers differ for WEP\n");
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
int iwm_set_tx_key(struct iwm_priv *iwm, u8 key_idx)
|
|
{
|
|
struct iwm_umac_tx_key_id tx_key_id;
|
|
int ret;
|
|
|
|
ret = iwm_check_profile(iwm);
|
|
if (ret < 0)
|
|
return ret;
|
|
|
|
/* UMAC only allows to set default key for WEP and auth type is
|
|
* NOT 802.1X or RSNA. */
|
|
if ((iwm->umac_profile->sec.ucast_cipher != UMAC_CIPHER_TYPE_WEP_40 &&
|
|
iwm->umac_profile->sec.ucast_cipher != UMAC_CIPHER_TYPE_WEP_104) ||
|
|
iwm->umac_profile->sec.auth_type == UMAC_AUTH_TYPE_8021X ||
|
|
iwm->umac_profile->sec.auth_type == UMAC_AUTH_TYPE_RSNA_PSK)
|
|
return 0;
|
|
|
|
tx_key_id.hdr.oid = UMAC_WIFI_IF_CMD_GLOBAL_TX_KEY_ID;
|
|
tx_key_id.hdr.buf_size = cpu_to_le16(sizeof(struct iwm_umac_tx_key_id) -
|
|
sizeof(struct iwm_umac_wifi_if));
|
|
|
|
tx_key_id.key_idx = key_idx;
|
|
|
|
return iwm_send_wifi_if_cmd(iwm, &tx_key_id, sizeof(tx_key_id), 1);
|
|
}
|
|
|
|
int iwm_set_key(struct iwm_priv *iwm, bool remove, struct iwm_key *key)
|
|
{
|
|
int ret = 0;
|
|
u8 cmd[64], *sta_addr, *key_data, key_len;
|
|
s8 key_idx;
|
|
u16 cmd_size = 0;
|
|
struct iwm_umac_key_hdr *key_hdr = &key->hdr;
|
|
struct iwm_umac_key_wep40 *wep40 = (struct iwm_umac_key_wep40 *)cmd;
|
|
struct iwm_umac_key_wep104 *wep104 = (struct iwm_umac_key_wep104 *)cmd;
|
|
struct iwm_umac_key_tkip *tkip = (struct iwm_umac_key_tkip *)cmd;
|
|
struct iwm_umac_key_ccmp *ccmp = (struct iwm_umac_key_ccmp *)cmd;
|
|
|
|
if (!remove) {
|
|
ret = iwm_check_profile(iwm);
|
|
if (ret < 0)
|
|
return ret;
|
|
}
|
|
|
|
sta_addr = key->hdr.mac;
|
|
key_data = key->key;
|
|
key_len = key->key_len;
|
|
key_idx = key->hdr.key_idx;
|
|
|
|
if (!remove) {
|
|
u8 auth_type = iwm->umac_profile->sec.auth_type;
|
|
|
|
IWM_DBG_WEXT(iwm, DBG, "key_idx:%d\n", key_idx);
|
|
IWM_DBG_WEXT(iwm, DBG, "key_len:%d\n", key_len);
|
|
IWM_DBG_WEXT(iwm, DBG, "MAC:%pM, idx:%d, multicast:%d\n",
|
|
key_hdr->mac, key_hdr->key_idx, key_hdr->multicast);
|
|
|
|
IWM_DBG_WEXT(iwm, DBG, "profile: mcast:0x%x, ucast:0x%x\n",
|
|
iwm->umac_profile->sec.mcast_cipher,
|
|
iwm->umac_profile->sec.ucast_cipher);
|
|
IWM_DBG_WEXT(iwm, DBG, "profile: auth_type:0x%x, flags:0x%x\n",
|
|
iwm->umac_profile->sec.auth_type,
|
|
iwm->umac_profile->sec.flags);
|
|
|
|
switch (key->cipher) {
|
|
case WLAN_CIPHER_SUITE_WEP40:
|
|
wep40->hdr.oid = UMAC_WIFI_IF_CMD_ADD_WEP40_KEY;
|
|
wep40->hdr.buf_size =
|
|
cpu_to_le16(sizeof(struct iwm_umac_key_wep40) -
|
|
sizeof(struct iwm_umac_wifi_if));
|
|
|
|
memcpy(&wep40->key_hdr, key_hdr,
|
|
sizeof(struct iwm_umac_key_hdr));
|
|
memcpy(wep40->key, key_data, key_len);
|
|
wep40->static_key =
|
|
!!((auth_type != UMAC_AUTH_TYPE_8021X) &&
|
|
(auth_type != UMAC_AUTH_TYPE_RSNA_PSK));
|
|
|
|
cmd_size = sizeof(struct iwm_umac_key_wep40);
|
|
break;
|
|
|
|
case WLAN_CIPHER_SUITE_WEP104:
|
|
wep104->hdr.oid = UMAC_WIFI_IF_CMD_ADD_WEP104_KEY;
|
|
wep104->hdr.buf_size =
|
|
cpu_to_le16(sizeof(struct iwm_umac_key_wep104) -
|
|
sizeof(struct iwm_umac_wifi_if));
|
|
|
|
memcpy(&wep104->key_hdr, key_hdr,
|
|
sizeof(struct iwm_umac_key_hdr));
|
|
memcpy(wep104->key, key_data, key_len);
|
|
wep104->static_key =
|
|
!!((auth_type != UMAC_AUTH_TYPE_8021X) &&
|
|
(auth_type != UMAC_AUTH_TYPE_RSNA_PSK));
|
|
|
|
cmd_size = sizeof(struct iwm_umac_key_wep104);
|
|
break;
|
|
|
|
case WLAN_CIPHER_SUITE_CCMP:
|
|
key_hdr->key_idx++;
|
|
ccmp->hdr.oid = UMAC_WIFI_IF_CMD_ADD_CCMP_KEY;
|
|
ccmp->hdr.buf_size =
|
|
cpu_to_le16(sizeof(struct iwm_umac_key_ccmp) -
|
|
sizeof(struct iwm_umac_wifi_if));
|
|
|
|
memcpy(&ccmp->key_hdr, key_hdr,
|
|
sizeof(struct iwm_umac_key_hdr));
|
|
|
|
memcpy(ccmp->key, key_data, key_len);
|
|
|
|
if (key->seq_len)
|
|
memcpy(ccmp->iv_count, key->seq, key->seq_len);
|
|
|
|
cmd_size = sizeof(struct iwm_umac_key_ccmp);
|
|
break;
|
|
|
|
case WLAN_CIPHER_SUITE_TKIP:
|
|
key_hdr->key_idx++;
|
|
tkip->hdr.oid = UMAC_WIFI_IF_CMD_ADD_TKIP_KEY;
|
|
tkip->hdr.buf_size =
|
|
cpu_to_le16(sizeof(struct iwm_umac_key_tkip) -
|
|
sizeof(struct iwm_umac_wifi_if));
|
|
|
|
memcpy(&tkip->key_hdr, key_hdr,
|
|
sizeof(struct iwm_umac_key_hdr));
|
|
|
|
memcpy(tkip->tkip_key, key_data, IWM_TKIP_KEY_SIZE);
|
|
memcpy(tkip->mic_tx_key, key_data + IWM_TKIP_KEY_SIZE,
|
|
IWM_TKIP_MIC_SIZE);
|
|
memcpy(tkip->mic_rx_key,
|
|
key_data + IWM_TKIP_KEY_SIZE + IWM_TKIP_MIC_SIZE,
|
|
IWM_TKIP_MIC_SIZE);
|
|
|
|
if (key->seq_len)
|
|
memcpy(ccmp->iv_count, key->seq, key->seq_len);
|
|
|
|
cmd_size = sizeof(struct iwm_umac_key_tkip);
|
|
break;
|
|
|
|
default:
|
|
return -ENOTSUPP;
|
|
}
|
|
|
|
if ((key->cipher == WLAN_CIPHER_SUITE_TKIP) ||
|
|
(key->cipher == WLAN_CIPHER_SUITE_CCMP))
|
|
/*
|
|
* UGLY_UGLY_UGLY
|
|
* Copied HACK from the MWG driver.
|
|
* Without it, the key is set before the second
|
|
* EAPOL frame is sent, and the latter is thus
|
|
* encrypted.
|
|
*/
|
|
schedule_timeout_interruptible(usecs_to_jiffies(300));
|
|
|
|
ret = iwm_send_wifi_if_cmd(iwm, cmd, cmd_size, 1);
|
|
} else {
|
|
struct iwm_umac_key_remove key_remove;
|
|
|
|
IWM_DBG_WEXT(iwm, ERR, "Removing key_idx:%d\n", key_idx);
|
|
|
|
key_remove.hdr.oid = UMAC_WIFI_IF_CMD_REMOVE_KEY;
|
|
key_remove.hdr.buf_size =
|
|
cpu_to_le16(sizeof(struct iwm_umac_key_remove) -
|
|
sizeof(struct iwm_umac_wifi_if));
|
|
memcpy(&key_remove.key_hdr, key_hdr,
|
|
sizeof(struct iwm_umac_key_hdr));
|
|
|
|
ret = iwm_send_wifi_if_cmd(iwm, &key_remove,
|
|
sizeof(struct iwm_umac_key_remove),
|
|
1);
|
|
if (ret)
|
|
return ret;
|
|
|
|
iwm->keys[key_idx].key_len = 0;
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
|
|
int iwm_send_mlme_profile(struct iwm_priv *iwm)
|
|
{
|
|
int ret;
|
|
struct iwm_umac_profile profile;
|
|
|
|
memcpy(&profile, iwm->umac_profile, sizeof(profile));
|
|
|
|
profile.hdr.oid = UMAC_WIFI_IF_CMD_SET_PROFILE;
|
|
profile.hdr.buf_size = cpu_to_le16(sizeof(struct iwm_umac_profile) -
|
|
sizeof(struct iwm_umac_wifi_if));
|
|
|
|
ret = iwm_send_wifi_if_cmd(iwm, &profile, sizeof(profile), 1);
|
|
if (ret) {
|
|
IWM_ERR(iwm, "Send profile command failed\n");
|
|
return ret;
|
|
}
|
|
|
|
set_bit(IWM_STATUS_SME_CONNECTING, &iwm->status);
|
|
return 0;
|
|
}
|
|
|
|
int iwm_invalidate_mlme_profile(struct iwm_priv *iwm)
|
|
{
|
|
struct iwm_umac_invalidate_profile invalid;
|
|
int ret;
|
|
|
|
invalid.hdr.oid = UMAC_WIFI_IF_CMD_INVALIDATE_PROFILE;
|
|
invalid.hdr.buf_size =
|
|
cpu_to_le16(sizeof(struct iwm_umac_invalidate_profile) -
|
|
sizeof(struct iwm_umac_wifi_if));
|
|
|
|
invalid.reason = WLAN_REASON_UNSPECIFIED;
|
|
|
|
ret = iwm_send_wifi_if_cmd(iwm, &invalid, sizeof(invalid), 1);
|
|
if (ret)
|
|
return ret;
|
|
|
|
ret = wait_event_interruptible_timeout(iwm->mlme_queue,
|
|
(iwm->umac_profile_active == 0), 2 * HZ);
|
|
|
|
return ret ? 0 : -EBUSY;
|
|
}
|
|
|
|
int iwm_send_umac_stats_req(struct iwm_priv *iwm, u32 flags)
|
|
{
|
|
struct iwm_udma_wifi_cmd udma_cmd = UDMA_UMAC_INIT;
|
|
struct iwm_umac_cmd umac_cmd;
|
|
struct iwm_umac_cmd_stats_req stats_req;
|
|
|
|
stats_req.flags = cpu_to_le32(flags);
|
|
|
|
umac_cmd.id = UMAC_CMD_OPCODE_STATISTIC_REQUEST;
|
|
umac_cmd.resp = 0;
|
|
|
|
return iwm_hal_send_umac_cmd(iwm, &udma_cmd, &umac_cmd, &stats_req,
|
|
sizeof(struct iwm_umac_cmd_stats_req));
|
|
}
|
|
|
|
int iwm_send_umac_channel_list(struct iwm_priv *iwm)
|
|
{
|
|
struct iwm_udma_wifi_cmd udma_cmd = UDMA_UMAC_INIT;
|
|
struct iwm_umac_cmd umac_cmd;
|
|
struct iwm_umac_cmd_get_channel_list *ch_list;
|
|
int size = sizeof(struct iwm_umac_cmd_get_channel_list) +
|
|
sizeof(struct iwm_umac_channel_info) * 4;
|
|
int ret;
|
|
|
|
ch_list = kzalloc(size, GFP_KERNEL);
|
|
if (!ch_list) {
|
|
IWM_ERR(iwm, "Couldn't allocate channel list cmd\n");
|
|
return -ENOMEM;
|
|
}
|
|
|
|
ch_list->ch[0].band = UMAC_BAND_2GHZ;
|
|
ch_list->ch[0].type = UMAC_CHANNEL_WIDTH_20MHZ;
|
|
ch_list->ch[0].flags = UMAC_CHANNEL_FLAG_VALID;
|
|
|
|
ch_list->ch[1].band = UMAC_BAND_5GHZ;
|
|
ch_list->ch[1].type = UMAC_CHANNEL_WIDTH_20MHZ;
|
|
ch_list->ch[1].flags = UMAC_CHANNEL_FLAG_VALID;
|
|
|
|
ch_list->ch[2].band = UMAC_BAND_2GHZ;
|
|
ch_list->ch[2].type = UMAC_CHANNEL_WIDTH_20MHZ;
|
|
ch_list->ch[2].flags = UMAC_CHANNEL_FLAG_VALID | UMAC_CHANNEL_FLAG_IBSS;
|
|
|
|
ch_list->ch[3].band = UMAC_BAND_5GHZ;
|
|
ch_list->ch[3].type = UMAC_CHANNEL_WIDTH_20MHZ;
|
|
ch_list->ch[3].flags = UMAC_CHANNEL_FLAG_VALID | UMAC_CHANNEL_FLAG_IBSS;
|
|
|
|
ch_list->count = cpu_to_le16(4);
|
|
|
|
umac_cmd.id = UMAC_CMD_OPCODE_GET_CHAN_INFO_LIST;
|
|
umac_cmd.resp = 1;
|
|
|
|
ret = iwm_hal_send_umac_cmd(iwm, &udma_cmd, &umac_cmd, ch_list, size);
|
|
|
|
kfree(ch_list);
|
|
|
|
return ret;
|
|
}
|
|
|
|
int iwm_scan_ssids(struct iwm_priv *iwm, struct cfg80211_ssid *ssids,
|
|
int ssid_num)
|
|
{
|
|
struct iwm_umac_cmd_scan_request req;
|
|
int i, ret;
|
|
|
|
memset(&req, 0, sizeof(struct iwm_umac_cmd_scan_request));
|
|
|
|
req.hdr.oid = UMAC_WIFI_IF_CMD_SCAN_REQUEST;
|
|
req.hdr.buf_size = cpu_to_le16(sizeof(struct iwm_umac_cmd_scan_request)
|
|
- sizeof(struct iwm_umac_wifi_if));
|
|
req.type = UMAC_WIFI_IF_SCAN_TYPE_USER;
|
|
req.timeout = 2;
|
|
req.seq_num = iwm->scan_id;
|
|
req.ssid_num = min(ssid_num, UMAC_WIFI_IF_PROBE_OPTION_MAX);
|
|
|
|
for (i = 0; i < req.ssid_num; i++) {
|
|
memcpy(req.ssids[i].ssid, ssids[i].ssid, ssids[i].ssid_len);
|
|
req.ssids[i].ssid_len = ssids[i].ssid_len;
|
|
}
|
|
|
|
ret = iwm_send_wifi_if_cmd(iwm, &req, sizeof(req), 0);
|
|
if (ret) {
|
|
IWM_ERR(iwm, "Couldn't send scan request\n");
|
|
return ret;
|
|
}
|
|
|
|
iwm->scan_id = iwm->scan_id++ % IWM_SCAN_ID_MAX;
|
|
|
|
return 0;
|
|
}
|
|
|
|
int iwm_scan_one_ssid(struct iwm_priv *iwm, u8 *ssid, int ssid_len)
|
|
{
|
|
struct cfg80211_ssid one_ssid;
|
|
|
|
if (test_and_set_bit(IWM_STATUS_SCANNING, &iwm->status))
|
|
return 0;
|
|
|
|
one_ssid.ssid_len = min(ssid_len, IEEE80211_MAX_SSID_LEN);
|
|
memcpy(&one_ssid.ssid, ssid, one_ssid.ssid_len);
|
|
|
|
return iwm_scan_ssids(iwm, &one_ssid, 1);
|
|
}
|
|
|
|
int iwm_target_reset(struct iwm_priv *iwm)
|
|
{
|
|
struct iwm_udma_nonwifi_cmd target_cmd;
|
|
|
|
target_cmd.opcode = UMAC_HDI_OUT_OPCODE_REBOOT;
|
|
target_cmd.addr = 0;
|
|
target_cmd.op1_sz = 0;
|
|
target_cmd.op2 = 0;
|
|
target_cmd.handle_by_hw = 0;
|
|
target_cmd.resp = 0;
|
|
target_cmd.eop = 1;
|
|
|
|
return iwm_hal_send_target_cmd(iwm, &target_cmd, NULL);
|
|
}
|