1 /*
2 * Marvell Wireless LAN device driver: scan ioctl and command handling
3 *
4 * Copyright (C) 2011, Marvell International Ltd.
5 *
6 * This software file (the "File") is distributed by Marvell International
7 * Ltd. under the terms of the GNU General Public License Version 2, June 1991
8 * (the "License"). You may use, redistribute and/or modify this File in
9 * accordance with the terms and conditions of the License, a copy of which
10 * is available by writing to the Free Software Foundation, Inc.,
11 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA or on the
12 * worldwide web at http://www.gnu.org/licenses/old-licenses/gpl-2.0.txt.
13 *
14 * THE FILE IS DISTRIBUTED AS-IS, WITHOUT WARRANTY OF ANY KIND, AND THE
15 * IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE
16 * ARE EXPRESSLY DISCLAIMED. The License provides additional details about
17 * this warranty disclaimer.
18 */
19
20 #include "decl.h"
21 #include "ioctl.h"
22 #include "util.h"
23 #include "fw.h"
24 #include "main.h"
25 #include "11n.h"
26 #include "cfg80211.h"
27
28 /* The maximum number of channels the firmware can scan per command */
29 #define MWIFIEX_MAX_CHANNELS_PER_SPECIFIC_SCAN 14
30
31 #define MWIFIEX_CHANNELS_PER_SCAN_CMD 4
32
33 /* Memory needed to store a max sized Channel List TLV for a firmware scan */
34 #define CHAN_TLV_MAX_SIZE (sizeof(struct mwifiex_ie_types_header) \
35 + (MWIFIEX_MAX_CHANNELS_PER_SPECIFIC_SCAN \
36 *sizeof(struct mwifiex_chan_scan_param_set)))
37
38 /* Memory needed to store supported rate */
39 #define RATE_TLV_MAX_SIZE (sizeof(struct mwifiex_ie_types_rates_param_set) \
40 + HOSTCMD_SUPPORTED_RATES)
41
42 /* Memory needed to store a max number/size WildCard SSID TLV for a firmware
43 scan */
44 #define WILDCARD_SSID_TLV_MAX_SIZE \
45 (MWIFIEX_MAX_SSID_LIST_LENGTH * \
46 (sizeof(struct mwifiex_ie_types_wildcard_ssid_params) \
47 + IEEE80211_MAX_SSID_LEN))
48
49 /* Maximum memory needed for a mwifiex_scan_cmd_config with all TLVs at max */
50 #define MAX_SCAN_CFG_ALLOC (sizeof(struct mwifiex_scan_cmd_config) \
51 + sizeof(struct mwifiex_ie_types_num_probes) \
52 + sizeof(struct mwifiex_ie_types_htcap) \
53 + CHAN_TLV_MAX_SIZE \
54 + RATE_TLV_MAX_SIZE \
55 + WILDCARD_SSID_TLV_MAX_SIZE)
56
57
58 union mwifiex_scan_cmd_config_tlv {
59 /* Scan configuration (variable length) */
60 struct mwifiex_scan_cmd_config config;
61 /* Max allocated block */
62 u8 config_alloc_buf[MAX_SCAN_CFG_ALLOC];
63 };
64
65 enum cipher_suite {
66 CIPHER_SUITE_TKIP,
67 CIPHER_SUITE_CCMP,
68 CIPHER_SUITE_MAX
69 };
70 static u8 mwifiex_wpa_oui[CIPHER_SUITE_MAX][4] = {
71 { 0x00, 0x50, 0xf2, 0x02 }, /* TKIP */
72 { 0x00, 0x50, 0xf2, 0x04 }, /* AES */
73 };
74 static u8 mwifiex_rsn_oui[CIPHER_SUITE_MAX][4] = {
75 { 0x00, 0x0f, 0xac, 0x02 }, /* TKIP */
76 { 0x00, 0x0f, 0xac, 0x04 }, /* AES */
77 };
78
79 /*
80 * This function parses a given IE for a given OUI.
81 *
82 * This is used to parse a WPA/RSN IE to find if it has
83 * a given oui in PTK.
84 */
85 static u8
mwifiex_search_oui_in_ie(struct ie_body * iebody,u8 * oui)86 mwifiex_search_oui_in_ie(struct ie_body *iebody, u8 *oui)
87 {
88 u8 count;
89
90 count = iebody->ptk_cnt[0];
91
92 /* There could be multiple OUIs for PTK hence
93 1) Take the length.
94 2) Check all the OUIs for AES.
95 3) If one of them is AES then pass success. */
96 while (count) {
97 if (!memcmp(iebody->ptk_body, oui, sizeof(iebody->ptk_body)))
98 return MWIFIEX_OUI_PRESENT;
99
100 --count;
101 if (count)
102 iebody = (struct ie_body *) ((u8 *) iebody +
103 sizeof(iebody->ptk_body));
104 }
105
106 pr_debug("info: %s: OUI is not found in PTK\n", __func__);
107 return MWIFIEX_OUI_NOT_PRESENT;
108 }
109
110 /*
111 * This function checks if a given OUI is present in a RSN IE.
112 *
113 * The function first checks if a RSN IE is present or not in the
114 * BSS descriptor. It tries to locate the OUI only if such an IE is
115 * present.
116 */
117 static u8
mwifiex_is_rsn_oui_present(struct mwifiex_bssdescriptor * bss_desc,u32 cipher)118 mwifiex_is_rsn_oui_present(struct mwifiex_bssdescriptor *bss_desc, u32 cipher)
119 {
120 u8 *oui;
121 struct ie_body *iebody;
122 u8 ret = MWIFIEX_OUI_NOT_PRESENT;
123
124 if (((bss_desc->bcn_rsn_ie) && ((*(bss_desc->bcn_rsn_ie)).
125 ieee_hdr.element_id == WLAN_EID_RSN))) {
126 iebody = (struct ie_body *)
127 (((u8 *) bss_desc->bcn_rsn_ie->data) +
128 RSN_GTK_OUI_OFFSET);
129 oui = &mwifiex_rsn_oui[cipher][0];
130 ret = mwifiex_search_oui_in_ie(iebody, oui);
131 if (ret)
132 return ret;
133 }
134 return ret;
135 }
136
137 /*
138 * This function checks if a given OUI is present in a WPA IE.
139 *
140 * The function first checks if a WPA IE is present or not in the
141 * BSS descriptor. It tries to locate the OUI only if such an IE is
142 * present.
143 */
144 static u8
mwifiex_is_wpa_oui_present(struct mwifiex_bssdescriptor * bss_desc,u32 cipher)145 mwifiex_is_wpa_oui_present(struct mwifiex_bssdescriptor *bss_desc, u32 cipher)
146 {
147 u8 *oui;
148 struct ie_body *iebody;
149 u8 ret = MWIFIEX_OUI_NOT_PRESENT;
150
151 if (((bss_desc->bcn_wpa_ie) &&
152 ((*(bss_desc->bcn_wpa_ie)).vend_hdr.element_id ==
153 WLAN_EID_WPA))) {
154 iebody = (struct ie_body *) bss_desc->bcn_wpa_ie->data;
155 oui = &mwifiex_wpa_oui[cipher][0];
156 ret = mwifiex_search_oui_in_ie(iebody, oui);
157 if (ret)
158 return ret;
159 }
160 return ret;
161 }
162
163 /*
164 * This function compares two SSIDs and checks if they match.
165 */
166 s32
mwifiex_ssid_cmp(struct cfg80211_ssid * ssid1,struct cfg80211_ssid * ssid2)167 mwifiex_ssid_cmp(struct cfg80211_ssid *ssid1, struct cfg80211_ssid *ssid2)
168 {
169 if (!ssid1 || !ssid2 || (ssid1->ssid_len != ssid2->ssid_len))
170 return -1;
171 return memcmp(ssid1->ssid, ssid2->ssid, ssid1->ssid_len);
172 }
173
174 /*
175 * This function checks if wapi is enabled in driver and scanned network is
176 * compatible with it.
177 */
178 static bool
mwifiex_is_bss_wapi(struct mwifiex_private * priv,struct mwifiex_bssdescriptor * bss_desc)179 mwifiex_is_bss_wapi(struct mwifiex_private *priv,
180 struct mwifiex_bssdescriptor *bss_desc)
181 {
182 if (priv->sec_info.wapi_enabled &&
183 (bss_desc->bcn_wapi_ie &&
184 ((*(bss_desc->bcn_wapi_ie)).ieee_hdr.element_id ==
185 WLAN_EID_BSS_AC_ACCESS_DELAY))) {
186 return true;
187 }
188 return false;
189 }
190
191 /*
192 * This function checks if driver is configured with no security mode and
193 * scanned network is compatible with it.
194 */
195 static bool
mwifiex_is_bss_no_sec(struct mwifiex_private * priv,struct mwifiex_bssdescriptor * bss_desc)196 mwifiex_is_bss_no_sec(struct mwifiex_private *priv,
197 struct mwifiex_bssdescriptor *bss_desc)
198 {
199 if (!priv->sec_info.wep_enabled && !priv->sec_info.wpa_enabled &&
200 !priv->sec_info.wpa2_enabled && ((!bss_desc->bcn_wpa_ie) ||
201 ((*(bss_desc->bcn_wpa_ie)).vend_hdr.element_id !=
202 WLAN_EID_WPA)) &&
203 ((!bss_desc->bcn_rsn_ie) ||
204 ((*(bss_desc->bcn_rsn_ie)).ieee_hdr.element_id !=
205 WLAN_EID_RSN)) &&
206 !priv->sec_info.encryption_mode && !bss_desc->privacy) {
207 return true;
208 }
209 return false;
210 }
211
212 /*
213 * This function checks if static WEP is enabled in driver and scanned network
214 * is compatible with it.
215 */
216 static bool
mwifiex_is_bss_static_wep(struct mwifiex_private * priv,struct mwifiex_bssdescriptor * bss_desc)217 mwifiex_is_bss_static_wep(struct mwifiex_private *priv,
218 struct mwifiex_bssdescriptor *bss_desc)
219 {
220 if (priv->sec_info.wep_enabled && !priv->sec_info.wpa_enabled &&
221 !priv->sec_info.wpa2_enabled && bss_desc->privacy) {
222 return true;
223 }
224 return false;
225 }
226
227 /*
228 * This function checks if wpa is enabled in driver and scanned network is
229 * compatible with it.
230 */
231 static bool
mwifiex_is_bss_wpa(struct mwifiex_private * priv,struct mwifiex_bssdescriptor * bss_desc)232 mwifiex_is_bss_wpa(struct mwifiex_private *priv,
233 struct mwifiex_bssdescriptor *bss_desc)
234 {
235 if (!priv->sec_info.wep_enabled && priv->sec_info.wpa_enabled &&
236 !priv->sec_info.wpa2_enabled && ((bss_desc->bcn_wpa_ie) &&
237 ((*(bss_desc->bcn_wpa_ie)).vend_hdr.element_id == WLAN_EID_WPA))
238 /*
239 * Privacy bit may NOT be set in some APs like
240 * LinkSys WRT54G && bss_desc->privacy
241 */
242 ) {
243 dev_dbg(priv->adapter->dev, "info: %s: WPA:"
244 " wpa_ie=%#x wpa2_ie=%#x WEP=%s WPA=%s WPA2=%s "
245 "EncMode=%#x privacy=%#x\n", __func__,
246 (bss_desc->bcn_wpa_ie) ?
247 (*(bss_desc->bcn_wpa_ie)).
248 vend_hdr.element_id : 0,
249 (bss_desc->bcn_rsn_ie) ?
250 (*(bss_desc->bcn_rsn_ie)).
251 ieee_hdr.element_id : 0,
252 (priv->sec_info.wep_enabled) ? "e" : "d",
253 (priv->sec_info.wpa_enabled) ? "e" : "d",
254 (priv->sec_info.wpa2_enabled) ? "e" : "d",
255 priv->sec_info.encryption_mode,
256 bss_desc->privacy);
257 return true;
258 }
259 return false;
260 }
261
262 /*
263 * This function checks if wpa2 is enabled in driver and scanned network is
264 * compatible with it.
265 */
266 static bool
mwifiex_is_bss_wpa2(struct mwifiex_private * priv,struct mwifiex_bssdescriptor * bss_desc)267 mwifiex_is_bss_wpa2(struct mwifiex_private *priv,
268 struct mwifiex_bssdescriptor *bss_desc)
269 {
270 if (!priv->sec_info.wep_enabled &&
271 !priv->sec_info.wpa_enabled &&
272 priv->sec_info.wpa2_enabled &&
273 ((bss_desc->bcn_rsn_ie) &&
274 ((*(bss_desc->bcn_rsn_ie)).ieee_hdr.element_id == WLAN_EID_RSN))) {
275 /*
276 * Privacy bit may NOT be set in some APs like
277 * LinkSys WRT54G && bss_desc->privacy
278 */
279 dev_dbg(priv->adapter->dev, "info: %s: WPA2: "
280 " wpa_ie=%#x wpa2_ie=%#x WEP=%s WPA=%s WPA2=%s "
281 "EncMode=%#x privacy=%#x\n", __func__,
282 (bss_desc->bcn_wpa_ie) ?
283 (*(bss_desc->bcn_wpa_ie)).
284 vend_hdr.element_id : 0,
285 (bss_desc->bcn_rsn_ie) ?
286 (*(bss_desc->bcn_rsn_ie)).
287 ieee_hdr.element_id : 0,
288 (priv->sec_info.wep_enabled) ? "e" : "d",
289 (priv->sec_info.wpa_enabled) ? "e" : "d",
290 (priv->sec_info.wpa2_enabled) ? "e" : "d",
291 priv->sec_info.encryption_mode,
292 bss_desc->privacy);
293 return true;
294 }
295 return false;
296 }
297
298 /*
299 * This function checks if adhoc AES is enabled in driver and scanned network is
300 * compatible with it.
301 */
302 static bool
mwifiex_is_bss_adhoc_aes(struct mwifiex_private * priv,struct mwifiex_bssdescriptor * bss_desc)303 mwifiex_is_bss_adhoc_aes(struct mwifiex_private *priv,
304 struct mwifiex_bssdescriptor *bss_desc)
305 {
306 if (!priv->sec_info.wep_enabled && !priv->sec_info.wpa_enabled &&
307 !priv->sec_info.wpa2_enabled &&
308 ((!bss_desc->bcn_wpa_ie) ||
309 ((*(bss_desc->bcn_wpa_ie)).vend_hdr.element_id != WLAN_EID_WPA)) &&
310 ((!bss_desc->bcn_rsn_ie) ||
311 ((*(bss_desc->bcn_rsn_ie)).ieee_hdr.element_id != WLAN_EID_RSN)) &&
312 !priv->sec_info.encryption_mode && bss_desc->privacy) {
313 return true;
314 }
315 return false;
316 }
317
318 /*
319 * This function checks if dynamic WEP is enabled in driver and scanned network
320 * is compatible with it.
321 */
322 static bool
mwifiex_is_bss_dynamic_wep(struct mwifiex_private * priv,struct mwifiex_bssdescriptor * bss_desc)323 mwifiex_is_bss_dynamic_wep(struct mwifiex_private *priv,
324 struct mwifiex_bssdescriptor *bss_desc)
325 {
326 if (!priv->sec_info.wep_enabled && !priv->sec_info.wpa_enabled &&
327 !priv->sec_info.wpa2_enabled &&
328 ((!bss_desc->bcn_wpa_ie) ||
329 ((*(bss_desc->bcn_wpa_ie)).vend_hdr.element_id != WLAN_EID_WPA)) &&
330 ((!bss_desc->bcn_rsn_ie) ||
331 ((*(bss_desc->bcn_rsn_ie)).ieee_hdr.element_id != WLAN_EID_RSN)) &&
332 priv->sec_info.encryption_mode && bss_desc->privacy) {
333 dev_dbg(priv->adapter->dev, "info: %s: dynamic "
334 "WEP: wpa_ie=%#x wpa2_ie=%#x "
335 "EncMode=%#x privacy=%#x\n",
336 __func__,
337 (bss_desc->bcn_wpa_ie) ?
338 (*(bss_desc->bcn_wpa_ie)).
339 vend_hdr.element_id : 0,
340 (bss_desc->bcn_rsn_ie) ?
341 (*(bss_desc->bcn_rsn_ie)).
342 ieee_hdr.element_id : 0,
343 priv->sec_info.encryption_mode,
344 bss_desc->privacy);
345 return true;
346 }
347 return false;
348 }
349
350 /*
351 * This function checks if a scanned network is compatible with the driver
352 * settings.
353 *
354 * WEP WPA WPA2 ad-hoc encrypt Network
355 * enabled enabled enabled AES mode Privacy WPA WPA2 Compatible
356 * 0 0 0 0 NONE 0 0 0 yes No security
357 * 0 1 0 0 x 1x 1 x yes WPA (disable
358 * HT if no AES)
359 * 0 0 1 0 x 1x x 1 yes WPA2 (disable
360 * HT if no AES)
361 * 0 0 0 1 NONE 1 0 0 yes Ad-hoc AES
362 * 1 0 0 0 NONE 1 0 0 yes Static WEP
363 * (disable HT)
364 * 0 0 0 0 !=NONE 1 0 0 yes Dynamic WEP
365 *
366 * Compatibility is not matched while roaming, except for mode.
367 */
368 static s32
mwifiex_is_network_compatible(struct mwifiex_private * priv,struct mwifiex_bssdescriptor * bss_desc,u32 mode)369 mwifiex_is_network_compatible(struct mwifiex_private *priv,
370 struct mwifiex_bssdescriptor *bss_desc, u32 mode)
371 {
372 struct mwifiex_adapter *adapter = priv->adapter;
373
374 bss_desc->disable_11n = false;
375
376 /* Don't check for compatibility if roaming */
377 if (priv->media_connected &&
378 (priv->bss_mode == NL80211_IFTYPE_STATION) &&
379 (bss_desc->bss_mode == NL80211_IFTYPE_STATION))
380 return 0;
381
382 if (priv->wps.session_enable) {
383 dev_dbg(adapter->dev,
384 "info: return success directly in WPS period\n");
385 return 0;
386 }
387
388 if (mwifiex_is_bss_wapi(priv, bss_desc)) {
389 dev_dbg(adapter->dev, "info: return success for WAPI AP\n");
390 return 0;
391 }
392
393 if (bss_desc->bss_mode == mode) {
394 if (mwifiex_is_bss_no_sec(priv, bss_desc)) {
395 /* No security */
396 return 0;
397 } else if (mwifiex_is_bss_static_wep(priv, bss_desc)) {
398 /* Static WEP enabled */
399 dev_dbg(adapter->dev, "info: Disable 11n in WEP mode.\n");
400 bss_desc->disable_11n = true;
401 return 0;
402 } else if (mwifiex_is_bss_wpa(priv, bss_desc)) {
403 /* WPA enabled */
404 if (((priv->adapter->config_bands & BAND_GN ||
405 priv->adapter->config_bands & BAND_AN) &&
406 bss_desc->bcn_ht_cap) &&
407 !mwifiex_is_wpa_oui_present(bss_desc,
408 CIPHER_SUITE_CCMP)) {
409
410 if (mwifiex_is_wpa_oui_present
411 (bss_desc, CIPHER_SUITE_TKIP)) {
412 dev_dbg(adapter->dev,
413 "info: Disable 11n if AES "
414 "is not supported by AP\n");
415 bss_desc->disable_11n = true;
416 } else {
417 return -1;
418 }
419 }
420 return 0;
421 } else if (mwifiex_is_bss_wpa2(priv, bss_desc)) {
422 /* WPA2 enabled */
423 if (((priv->adapter->config_bands & BAND_GN ||
424 priv->adapter->config_bands & BAND_AN) &&
425 bss_desc->bcn_ht_cap) &&
426 !mwifiex_is_rsn_oui_present(bss_desc,
427 CIPHER_SUITE_CCMP)) {
428
429 if (mwifiex_is_rsn_oui_present
430 (bss_desc, CIPHER_SUITE_TKIP)) {
431 dev_dbg(adapter->dev,
432 "info: Disable 11n if AES "
433 "is not supported by AP\n");
434 bss_desc->disable_11n = true;
435 } else {
436 return -1;
437 }
438 }
439 return 0;
440 } else if (mwifiex_is_bss_adhoc_aes(priv, bss_desc)) {
441 /* Ad-hoc AES enabled */
442 return 0;
443 } else if (mwifiex_is_bss_dynamic_wep(priv, bss_desc)) {
444 /* Dynamic WEP enabled */
445 return 0;
446 }
447
448 /* Security doesn't match */
449 dev_dbg(adapter->dev,
450 "info: %s: failed: wpa_ie=%#x wpa2_ie=%#x WEP=%s "
451 "WPA=%s WPA2=%s EncMode=%#x privacy=%#x\n", __func__,
452 (bss_desc->bcn_wpa_ie) ?
453 (*(bss_desc->bcn_wpa_ie)).vend_hdr.element_id : 0,
454 (bss_desc->bcn_rsn_ie) ?
455 (*(bss_desc->bcn_rsn_ie)).ieee_hdr.element_id : 0,
456 (priv->sec_info.wep_enabled) ? "e" : "d",
457 (priv->sec_info.wpa_enabled) ? "e" : "d",
458 (priv->sec_info.wpa2_enabled) ? "e" : "d",
459 priv->sec_info.encryption_mode, bss_desc->privacy);
460 return -1;
461 }
462
463 /* Mode doesn't match */
464 return -1;
465 }
466
467 /*
468 * This function creates a channel list for the driver to scan, based
469 * on region/band information.
470 *
471 * This routine is used for any scan that is not provided with a
472 * specific channel list to scan.
473 */
474 static void
mwifiex_scan_create_channel_list(struct mwifiex_private * priv,const struct mwifiex_user_scan_cfg * user_scan_in,struct mwifiex_chan_scan_param_set * scan_chan_list,u8 filtered_scan)475 mwifiex_scan_create_channel_list(struct mwifiex_private *priv,
476 const struct mwifiex_user_scan_cfg
477 *user_scan_in,
478 struct mwifiex_chan_scan_param_set
479 *scan_chan_list,
480 u8 filtered_scan)
481 {
482 enum ieee80211_band band;
483 struct ieee80211_supported_band *sband;
484 struct ieee80211_channel *ch;
485 struct mwifiex_adapter *adapter = priv->adapter;
486 int chan_idx = 0, i;
487
488 for (band = 0; (band < IEEE80211_NUM_BANDS) ; band++) {
489
490 if (!priv->wdev->wiphy->bands[band])
491 continue;
492
493 sband = priv->wdev->wiphy->bands[band];
494
495 for (i = 0; (i < sband->n_channels) ; i++) {
496 ch = &sband->channels[i];
497 if (ch->flags & IEEE80211_CHAN_DISABLED)
498 continue;
499 scan_chan_list[chan_idx].radio_type = band;
500
501 if (user_scan_in &&
502 user_scan_in->chan_list[0].scan_time)
503 scan_chan_list[chan_idx].max_scan_time =
504 cpu_to_le16((u16) user_scan_in->
505 chan_list[0].scan_time);
506 else if (ch->flags & IEEE80211_CHAN_PASSIVE_SCAN)
507 scan_chan_list[chan_idx].max_scan_time =
508 cpu_to_le16(adapter->passive_scan_time);
509 else
510 scan_chan_list[chan_idx].max_scan_time =
511 cpu_to_le16(adapter->active_scan_time);
512
513 if (ch->flags & IEEE80211_CHAN_PASSIVE_SCAN)
514 scan_chan_list[chan_idx].chan_scan_mode_bitmap
515 |= MWIFIEX_PASSIVE_SCAN;
516 else
517 scan_chan_list[chan_idx].chan_scan_mode_bitmap
518 &= ~MWIFIEX_PASSIVE_SCAN;
519 scan_chan_list[chan_idx].chan_number =
520 (u32) ch->hw_value;
521 if (filtered_scan) {
522 scan_chan_list[chan_idx].max_scan_time =
523 cpu_to_le16(adapter->specific_scan_time);
524 scan_chan_list[chan_idx].chan_scan_mode_bitmap
525 |= MWIFIEX_DISABLE_CHAN_FILT;
526 }
527 chan_idx++;
528 }
529
530 }
531 }
532
533 /*
534 * This function constructs and sends multiple scan config commands to
535 * the firmware.
536 *
537 * Previous routines in the code flow have created a scan command configuration
538 * with any requested TLVs. This function splits the channel TLV into maximum
539 * channels supported per scan lists and sends the portion of the channel TLV,
540 * along with the other TLVs, to the firmware.
541 */
542 static int
mwifiex_scan_channel_list(struct mwifiex_private * priv,u32 max_chan_per_scan,u8 filtered_scan,struct mwifiex_scan_cmd_config * scan_cfg_out,struct mwifiex_ie_types_chan_list_param_set * chan_tlv_out,struct mwifiex_chan_scan_param_set * scan_chan_list)543 mwifiex_scan_channel_list(struct mwifiex_private *priv,
544 u32 max_chan_per_scan, u8 filtered_scan,
545 struct mwifiex_scan_cmd_config *scan_cfg_out,
546 struct mwifiex_ie_types_chan_list_param_set
547 *chan_tlv_out,
548 struct mwifiex_chan_scan_param_set *scan_chan_list)
549 {
550 int ret = 0;
551 struct mwifiex_chan_scan_param_set *tmp_chan_list;
552 struct mwifiex_chan_scan_param_set *start_chan;
553
554 u32 tlv_idx;
555 u32 total_scan_time;
556 u32 done_early;
557
558 if (!scan_cfg_out || !chan_tlv_out || !scan_chan_list) {
559 dev_dbg(priv->adapter->dev,
560 "info: Scan: Null detect: %p, %p, %p\n",
561 scan_cfg_out, chan_tlv_out, scan_chan_list);
562 return -1;
563 }
564
565 chan_tlv_out->header.type = cpu_to_le16(TLV_TYPE_CHANLIST);
566
567 /* Set the temp channel struct pointer to the start of the desired
568 list */
569 tmp_chan_list = scan_chan_list;
570
571 /* Loop through the desired channel list, sending a new firmware scan
572 commands for each max_chan_per_scan channels (or for 1,6,11
573 individually if configured accordingly) */
574 while (tmp_chan_list->chan_number) {
575
576 tlv_idx = 0;
577 total_scan_time = 0;
578 chan_tlv_out->header.len = 0;
579 start_chan = tmp_chan_list;
580 done_early = false;
581
582 /*
583 * Construct the Channel TLV for the scan command. Continue to
584 * insert channel TLVs until:
585 * - the tlv_idx hits the maximum configured per scan command
586 * - the next channel to insert is 0 (end of desired channel
587 * list)
588 * - done_early is set (controlling individual scanning of
589 * 1,6,11)
590 */
591 while (tlv_idx < max_chan_per_scan &&
592 tmp_chan_list->chan_number && !done_early) {
593
594 dev_dbg(priv->adapter->dev,
595 "info: Scan: Chan(%3d), Radio(%d),"
596 " Mode(%d, %d), Dur(%d)\n",
597 tmp_chan_list->chan_number,
598 tmp_chan_list->radio_type,
599 tmp_chan_list->chan_scan_mode_bitmap
600 & MWIFIEX_PASSIVE_SCAN,
601 (tmp_chan_list->chan_scan_mode_bitmap
602 & MWIFIEX_DISABLE_CHAN_FILT) >> 1,
603 le16_to_cpu(tmp_chan_list->max_scan_time));
604
605 /* Copy the current channel TLV to the command being
606 prepared */
607 memcpy(chan_tlv_out->chan_scan_param + tlv_idx,
608 tmp_chan_list,
609 sizeof(chan_tlv_out->chan_scan_param));
610
611 /* Increment the TLV header length by the size
612 appended */
613 chan_tlv_out->header.len =
614 cpu_to_le16(le16_to_cpu(chan_tlv_out->header.len) +
615 (sizeof(chan_tlv_out->chan_scan_param)));
616
617 /*
618 * The tlv buffer length is set to the number of bytes
619 * of the between the channel tlv pointer and the start
620 * of the tlv buffer. This compensates for any TLVs
621 * that were appended before the channel list.
622 */
623 scan_cfg_out->tlv_buf_len = (u32) ((u8 *) chan_tlv_out -
624 scan_cfg_out->tlv_buf);
625
626 /* Add the size of the channel tlv header and the data
627 length */
628 scan_cfg_out->tlv_buf_len +=
629 (sizeof(chan_tlv_out->header)
630 + le16_to_cpu(chan_tlv_out->header.len));
631
632 /* Increment the index to the channel tlv we are
633 constructing */
634 tlv_idx++;
635
636 /* Count the total scan time per command */
637 total_scan_time +=
638 le16_to_cpu(tmp_chan_list->max_scan_time);
639
640 done_early = false;
641
642 /* Stop the loop if the *current* channel is in the
643 1,6,11 set and we are not filtering on a BSSID
644 or SSID. */
645 if (!filtered_scan &&
646 (tmp_chan_list->chan_number == 1 ||
647 tmp_chan_list->chan_number == 6 ||
648 tmp_chan_list->chan_number == 11))
649 done_early = true;
650
651 /* Increment the tmp pointer to the next channel to
652 be scanned */
653 tmp_chan_list++;
654
655 /* Stop the loop if the *next* channel is in the 1,6,11
656 set. This will cause it to be the only channel
657 scanned on the next interation */
658 if (!filtered_scan &&
659 (tmp_chan_list->chan_number == 1 ||
660 tmp_chan_list->chan_number == 6 ||
661 tmp_chan_list->chan_number == 11))
662 done_early = true;
663 }
664
665 /* The total scan time should be less than scan command timeout
666 value */
667 if (total_scan_time > MWIFIEX_MAX_TOTAL_SCAN_TIME) {
668 dev_err(priv->adapter->dev, "total scan time %dms"
669 " is over limit (%dms), scan skipped\n",
670 total_scan_time, MWIFIEX_MAX_TOTAL_SCAN_TIME);
671 ret = -1;
672 break;
673 }
674
675 priv->adapter->scan_channels = start_chan;
676
677 /* Send the scan command to the firmware with the specified
678 cfg */
679 ret = mwifiex_send_cmd_async(priv, HostCmd_CMD_802_11_SCAN,
680 HostCmd_ACT_GEN_SET, 0,
681 scan_cfg_out);
682 if (ret)
683 break;
684 }
685
686 if (ret)
687 return -1;
688
689 return 0;
690 }
691
692 /*
693 * This function constructs a scan command configuration structure to use
694 * in scan commands.
695 *
696 * Application layer or other functions can invoke network scanning
697 * with a scan configuration supplied in a user scan configuration structure.
698 * This structure is used as the basis of one or many scan command configuration
699 * commands that are sent to the command processing module and eventually to the
700 * firmware.
701 *
702 * This function creates a scan command configuration structure based on the
703 * following user supplied parameters (if present):
704 * - SSID filter
705 * - BSSID filter
706 * - Number of Probes to be sent
707 * - Channel list
708 *
709 * If the SSID or BSSID filter is not present, the filter is disabled/cleared.
710 * If the number of probes is not set, adapter default setting is used.
711 */
712 static void
mwifiex_config_scan(struct mwifiex_private * priv,const struct mwifiex_user_scan_cfg * user_scan_in,struct mwifiex_scan_cmd_config * scan_cfg_out,struct mwifiex_ie_types_chan_list_param_set ** chan_list_out,struct mwifiex_chan_scan_param_set * scan_chan_list,u8 * max_chan_per_scan,u8 * filtered_scan,u8 * scan_current_only)713 mwifiex_config_scan(struct mwifiex_private *priv,
714 const struct mwifiex_user_scan_cfg *user_scan_in,
715 struct mwifiex_scan_cmd_config *scan_cfg_out,
716 struct mwifiex_ie_types_chan_list_param_set **chan_list_out,
717 struct mwifiex_chan_scan_param_set *scan_chan_list,
718 u8 *max_chan_per_scan, u8 *filtered_scan,
719 u8 *scan_current_only)
720 {
721 struct mwifiex_adapter *adapter = priv->adapter;
722 struct mwifiex_ie_types_num_probes *num_probes_tlv;
723 struct mwifiex_ie_types_wildcard_ssid_params *wildcard_ssid_tlv;
724 struct mwifiex_ie_types_rates_param_set *rates_tlv;
725 const u8 zero_mac[ETH_ALEN] = { 0, 0, 0, 0, 0, 0 };
726 u8 *tlv_pos;
727 u32 num_probes;
728 u32 ssid_len;
729 u32 chan_idx;
730 u32 scan_type;
731 u16 scan_dur;
732 u8 channel;
733 u8 radio_type;
734 int i;
735 u8 ssid_filter;
736 u8 rates[MWIFIEX_SUPPORTED_RATES];
737 u32 rates_size;
738 struct mwifiex_ie_types_htcap *ht_cap;
739
740 /* The tlv_buf_len is calculated for each scan command. The TLVs added
741 in this routine will be preserved since the routine that sends the
742 command will append channelTLVs at *chan_list_out. The difference
743 between the *chan_list_out and the tlv_buf start will be used to
744 calculate the size of anything we add in this routine. */
745 scan_cfg_out->tlv_buf_len = 0;
746
747 /* Running tlv pointer. Assigned to chan_list_out at end of function
748 so later routines know where channels can be added to the command
749 buf */
750 tlv_pos = scan_cfg_out->tlv_buf;
751
752 /* Initialize the scan as un-filtered; the flag is later set to TRUE
753 below if a SSID or BSSID filter is sent in the command */
754 *filtered_scan = false;
755
756 /* Initialize the scan as not being only on the current channel. If
757 the channel list is customized, only contains one channel, and is
758 the active channel, this is set true and data flow is not halted. */
759 *scan_current_only = false;
760
761 if (user_scan_in) {
762
763 /* Default the ssid_filter flag to TRUE, set false under
764 certain wildcard conditions and qualified by the existence
765 of an SSID list before marking the scan as filtered */
766 ssid_filter = true;
767
768 /* Set the BSS type scan filter, use Adapter setting if
769 unset */
770 scan_cfg_out->bss_mode =
771 (user_scan_in->bss_mode ? (u8) user_scan_in->
772 bss_mode : (u8) adapter->scan_mode);
773
774 /* Set the number of probes to send, use Adapter setting
775 if unset */
776 num_probes =
777 (user_scan_in->num_probes ? user_scan_in->
778 num_probes : adapter->scan_probes);
779
780 /*
781 * Set the BSSID filter to the incoming configuration,
782 * if non-zero. If not set, it will remain disabled
783 * (all zeros).
784 */
785 memcpy(scan_cfg_out->specific_bssid,
786 user_scan_in->specific_bssid,
787 sizeof(scan_cfg_out->specific_bssid));
788
789 for (i = 0; i < user_scan_in->num_ssids; i++) {
790 ssid_len = user_scan_in->ssid_list[i].ssid_len;
791
792 wildcard_ssid_tlv =
793 (struct mwifiex_ie_types_wildcard_ssid_params *)
794 tlv_pos;
795 wildcard_ssid_tlv->header.type =
796 cpu_to_le16(TLV_TYPE_WILDCARDSSID);
797 wildcard_ssid_tlv->header.len = cpu_to_le16(
798 (u16) (ssid_len + sizeof(wildcard_ssid_tlv->
799 max_ssid_length)));
800
801 /*
802 * max_ssid_length = 0 tells firmware to perform
803 * specific scan for the SSID filled, whereas
804 * max_ssid_length = IEEE80211_MAX_SSID_LEN is for
805 * wildcard scan.
806 */
807 if (ssid_len)
808 wildcard_ssid_tlv->max_ssid_length = 0;
809 else
810 wildcard_ssid_tlv->max_ssid_length =
811 IEEE80211_MAX_SSID_LEN;
812
813 memcpy(wildcard_ssid_tlv->ssid,
814 user_scan_in->ssid_list[i].ssid, ssid_len);
815
816 tlv_pos += (sizeof(wildcard_ssid_tlv->header)
817 + le16_to_cpu(wildcard_ssid_tlv->header.len));
818
819 dev_dbg(adapter->dev, "info: scan: ssid[%d]: %s, %d\n",
820 i, wildcard_ssid_tlv->ssid,
821 wildcard_ssid_tlv->max_ssid_length);
822
823 /* Empty wildcard ssid with a maxlen will match many or
824 potentially all SSIDs (maxlen == 32), therefore do
825 not treat the scan as
826 filtered. */
827 if (!ssid_len && wildcard_ssid_tlv->max_ssid_length)
828 ssid_filter = false;
829 }
830
831 /*
832 * The default number of channels sent in the command is low to
833 * ensure the response buffer from the firmware does not
834 * truncate scan results. That is not an issue with an SSID
835 * or BSSID filter applied to the scan results in the firmware.
836 */
837 if ((i && ssid_filter) ||
838 memcmp(scan_cfg_out->specific_bssid, &zero_mac,
839 sizeof(zero_mac)))
840 *filtered_scan = true;
841 } else {
842 scan_cfg_out->bss_mode = (u8) adapter->scan_mode;
843 num_probes = adapter->scan_probes;
844 }
845
846 /*
847 * If a specific BSSID or SSID is used, the number of channels in the
848 * scan command will be increased to the absolute maximum.
849 */
850 if (*filtered_scan)
851 *max_chan_per_scan = MWIFIEX_MAX_CHANNELS_PER_SPECIFIC_SCAN;
852 else
853 *max_chan_per_scan = MWIFIEX_CHANNELS_PER_SCAN_CMD;
854
855 /* If the input config or adapter has the number of Probes set,
856 add tlv */
857 if (num_probes) {
858
859 dev_dbg(adapter->dev, "info: scan: num_probes = %d\n",
860 num_probes);
861
862 num_probes_tlv = (struct mwifiex_ie_types_num_probes *) tlv_pos;
863 num_probes_tlv->header.type = cpu_to_le16(TLV_TYPE_NUMPROBES);
864 num_probes_tlv->header.len =
865 cpu_to_le16(sizeof(num_probes_tlv->num_probes));
866 num_probes_tlv->num_probes = cpu_to_le16((u16) num_probes);
867
868 tlv_pos += sizeof(num_probes_tlv->header) +
869 le16_to_cpu(num_probes_tlv->header.len);
870
871 }
872
873 /* Append rates tlv */
874 memset(rates, 0, sizeof(rates));
875
876 rates_size = mwifiex_get_supported_rates(priv, rates);
877
878 rates_tlv = (struct mwifiex_ie_types_rates_param_set *) tlv_pos;
879 rates_tlv->header.type = cpu_to_le16(WLAN_EID_SUPP_RATES);
880 rates_tlv->header.len = cpu_to_le16((u16) rates_size);
881 memcpy(rates_tlv->rates, rates, rates_size);
882 tlv_pos += sizeof(rates_tlv->header) + rates_size;
883
884 dev_dbg(adapter->dev, "info: SCAN_CMD: Rates size = %d\n", rates_size);
885
886 if (ISSUPP_11NENABLED(priv->adapter->fw_cap_info) &&
887 (priv->adapter->config_bands & BAND_GN ||
888 priv->adapter->config_bands & BAND_AN)) {
889 ht_cap = (struct mwifiex_ie_types_htcap *) tlv_pos;
890 memset(ht_cap, 0, sizeof(struct mwifiex_ie_types_htcap));
891 ht_cap->header.type = cpu_to_le16(WLAN_EID_HT_CAPABILITY);
892 ht_cap->header.len =
893 cpu_to_le16(sizeof(struct ieee80211_ht_cap));
894 radio_type =
895 mwifiex_band_to_radio_type(priv->adapter->config_bands);
896 mwifiex_fill_cap_info(priv, radio_type, ht_cap);
897 tlv_pos += sizeof(struct mwifiex_ie_types_htcap);
898 }
899
900 /* Append vendor specific IE TLV */
901 mwifiex_cmd_append_vsie_tlv(priv, MWIFIEX_VSIE_MASK_SCAN, &tlv_pos);
902
903 /*
904 * Set the output for the channel TLV to the address in the tlv buffer
905 * past any TLVs that were added in this function (SSID, num_probes).
906 * Channel TLVs will be added past this for each scan command,
907 * preserving the TLVs that were previously added.
908 */
909 *chan_list_out =
910 (struct mwifiex_ie_types_chan_list_param_set *) tlv_pos;
911
912 if (user_scan_in && user_scan_in->chan_list[0].chan_number) {
913
914 dev_dbg(adapter->dev, "info: Scan: Using supplied channel list\n");
915
916 for (chan_idx = 0;
917 chan_idx < MWIFIEX_USER_SCAN_CHAN_MAX &&
918 user_scan_in->chan_list[chan_idx].chan_number;
919 chan_idx++) {
920
921 channel = user_scan_in->chan_list[chan_idx].chan_number;
922 (scan_chan_list + chan_idx)->chan_number = channel;
923
924 radio_type =
925 user_scan_in->chan_list[chan_idx].radio_type;
926 (scan_chan_list + chan_idx)->radio_type = radio_type;
927
928 scan_type = user_scan_in->chan_list[chan_idx].scan_type;
929
930 if (scan_type == MWIFIEX_SCAN_TYPE_PASSIVE)
931 (scan_chan_list +
932 chan_idx)->chan_scan_mode_bitmap
933 |= MWIFIEX_PASSIVE_SCAN;
934 else
935 (scan_chan_list +
936 chan_idx)->chan_scan_mode_bitmap
937 &= ~MWIFIEX_PASSIVE_SCAN;
938
939 if (user_scan_in->chan_list[chan_idx].scan_time) {
940 scan_dur = (u16) user_scan_in->
941 chan_list[chan_idx].scan_time;
942 } else {
943 if (scan_type == MWIFIEX_SCAN_TYPE_PASSIVE)
944 scan_dur = adapter->passive_scan_time;
945 else if (*filtered_scan)
946 scan_dur = adapter->specific_scan_time;
947 else
948 scan_dur = adapter->active_scan_time;
949 }
950
951 (scan_chan_list + chan_idx)->min_scan_time =
952 cpu_to_le16(scan_dur);
953 (scan_chan_list + chan_idx)->max_scan_time =
954 cpu_to_le16(scan_dur);
955 }
956
957 /* Check if we are only scanning the current channel */
958 if ((chan_idx == 1) &&
959 (user_scan_in->chan_list[0].chan_number ==
960 priv->curr_bss_params.bss_descriptor.channel)) {
961 *scan_current_only = true;
962 dev_dbg(adapter->dev,
963 "info: Scan: Scanning current channel only\n");
964 }
965
966 } else {
967 dev_dbg(adapter->dev,
968 "info: Scan: Creating full region channel list\n");
969 mwifiex_scan_create_channel_list(priv, user_scan_in,
970 scan_chan_list,
971 *filtered_scan);
972 }
973 }
974
975 /*
976 * This function inspects the scan response buffer for pointers to
977 * expected TLVs.
978 *
979 * TLVs can be included at the end of the scan response BSS information.
980 *
981 * Data in the buffer is parsed pointers to TLVs that can potentially
982 * be passed back in the response.
983 */
984 static void
mwifiex_ret_802_11_scan_get_tlv_ptrs(struct mwifiex_adapter * adapter,struct mwifiex_ie_types_data * tlv,u32 tlv_buf_size,u32 req_tlv_type,struct mwifiex_ie_types_data ** tlv_data)985 mwifiex_ret_802_11_scan_get_tlv_ptrs(struct mwifiex_adapter *adapter,
986 struct mwifiex_ie_types_data *tlv,
987 u32 tlv_buf_size, u32 req_tlv_type,
988 struct mwifiex_ie_types_data **tlv_data)
989 {
990 struct mwifiex_ie_types_data *current_tlv;
991 u32 tlv_buf_left;
992 u32 tlv_type;
993 u32 tlv_len;
994
995 current_tlv = tlv;
996 tlv_buf_left = tlv_buf_size;
997 *tlv_data = NULL;
998
999 dev_dbg(adapter->dev, "info: SCAN_RESP: tlv_buf_size = %d\n",
1000 tlv_buf_size);
1001
1002 while (tlv_buf_left >= sizeof(struct mwifiex_ie_types_header)) {
1003
1004 tlv_type = le16_to_cpu(current_tlv->header.type);
1005 tlv_len = le16_to_cpu(current_tlv->header.len);
1006
1007 if (sizeof(tlv->header) + tlv_len > tlv_buf_left) {
1008 dev_err(adapter->dev, "SCAN_RESP: TLV buffer corrupt\n");
1009 break;
1010 }
1011
1012 if (req_tlv_type == tlv_type) {
1013 switch (tlv_type) {
1014 case TLV_TYPE_TSFTIMESTAMP:
1015 dev_dbg(adapter->dev, "info: SCAN_RESP: TSF "
1016 "timestamp TLV, len = %d\n", tlv_len);
1017 *tlv_data = (struct mwifiex_ie_types_data *)
1018 current_tlv;
1019 break;
1020 case TLV_TYPE_CHANNELBANDLIST:
1021 dev_dbg(adapter->dev, "info: SCAN_RESP: channel"
1022 " band list TLV, len = %d\n", tlv_len);
1023 *tlv_data = (struct mwifiex_ie_types_data *)
1024 current_tlv;
1025 break;
1026 default:
1027 dev_err(adapter->dev,
1028 "SCAN_RESP: unhandled TLV = %d\n",
1029 tlv_type);
1030 /* Give up, this seems corrupted */
1031 return;
1032 }
1033 }
1034
1035 if (*tlv_data)
1036 break;
1037
1038
1039 tlv_buf_left -= (sizeof(tlv->header) + tlv_len);
1040 current_tlv =
1041 (struct mwifiex_ie_types_data *) (current_tlv->data +
1042 tlv_len);
1043
1044 } /* while */
1045 }
1046
1047 /*
1048 * This function parses provided beacon buffer and updates
1049 * respective fields in bss descriptor structure.
1050 */
1051 int
mwifiex_update_bss_desc_with_ie(struct mwifiex_adapter * adapter,struct mwifiex_bssdescriptor * bss_entry,u8 * ie_buf,u32 ie_len)1052 mwifiex_update_bss_desc_with_ie(struct mwifiex_adapter *adapter,
1053 struct mwifiex_bssdescriptor *bss_entry,
1054 u8 *ie_buf, u32 ie_len)
1055 {
1056 int ret = 0;
1057 u8 element_id;
1058 struct ieee_types_fh_param_set *fh_param_set;
1059 struct ieee_types_ds_param_set *ds_param_set;
1060 struct ieee_types_cf_param_set *cf_param_set;
1061 struct ieee_types_ibss_param_set *ibss_param_set;
1062 u8 *current_ptr;
1063 u8 *rate;
1064 u8 element_len;
1065 u16 total_ie_len;
1066 u8 bytes_to_copy;
1067 u8 rate_size;
1068 u8 found_data_rate_ie;
1069 u32 bytes_left;
1070 struct ieee_types_vendor_specific *vendor_ie;
1071 const u8 wpa_oui[4] = { 0x00, 0x50, 0xf2, 0x01 };
1072 const u8 wmm_oui[4] = { 0x00, 0x50, 0xf2, 0x02 };
1073
1074 found_data_rate_ie = false;
1075 rate_size = 0;
1076 current_ptr = ie_buf;
1077 bytes_left = ie_len;
1078 bss_entry->beacon_buf = ie_buf;
1079 bss_entry->beacon_buf_size = ie_len;
1080
1081 /* Process variable IE */
1082 while (bytes_left >= 2) {
1083 element_id = *current_ptr;
1084 element_len = *(current_ptr + 1);
1085 total_ie_len = element_len + sizeof(struct ieee_types_header);
1086
1087 if (bytes_left < total_ie_len) {
1088 dev_err(adapter->dev, "err: InterpretIE: in processing"
1089 " IE, bytes left < IE length\n");
1090 return -1;
1091 }
1092 switch (element_id) {
1093 case WLAN_EID_SSID:
1094 bss_entry->ssid.ssid_len = element_len;
1095 memcpy(bss_entry->ssid.ssid, (current_ptr + 2),
1096 element_len);
1097 dev_dbg(adapter->dev,
1098 "info: InterpretIE: ssid: %-32s\n",
1099 bss_entry->ssid.ssid);
1100 break;
1101
1102 case WLAN_EID_SUPP_RATES:
1103 memcpy(bss_entry->data_rates, current_ptr + 2,
1104 element_len);
1105 memcpy(bss_entry->supported_rates, current_ptr + 2,
1106 element_len);
1107 rate_size = element_len;
1108 found_data_rate_ie = true;
1109 break;
1110
1111 case WLAN_EID_FH_PARAMS:
1112 fh_param_set =
1113 (struct ieee_types_fh_param_set *) current_ptr;
1114 memcpy(&bss_entry->phy_param_set.fh_param_set,
1115 fh_param_set,
1116 sizeof(struct ieee_types_fh_param_set));
1117 break;
1118
1119 case WLAN_EID_DS_PARAMS:
1120 ds_param_set =
1121 (struct ieee_types_ds_param_set *) current_ptr;
1122
1123 bss_entry->channel = ds_param_set->current_chan;
1124
1125 memcpy(&bss_entry->phy_param_set.ds_param_set,
1126 ds_param_set,
1127 sizeof(struct ieee_types_ds_param_set));
1128 break;
1129
1130 case WLAN_EID_CF_PARAMS:
1131 cf_param_set =
1132 (struct ieee_types_cf_param_set *) current_ptr;
1133 memcpy(&bss_entry->ss_param_set.cf_param_set,
1134 cf_param_set,
1135 sizeof(struct ieee_types_cf_param_set));
1136 break;
1137
1138 case WLAN_EID_IBSS_PARAMS:
1139 ibss_param_set =
1140 (struct ieee_types_ibss_param_set *)
1141 current_ptr;
1142 memcpy(&bss_entry->ss_param_set.ibss_param_set,
1143 ibss_param_set,
1144 sizeof(struct ieee_types_ibss_param_set));
1145 break;
1146
1147 case WLAN_EID_ERP_INFO:
1148 bss_entry->erp_flags = *(current_ptr + 2);
1149 break;
1150
1151 case WLAN_EID_EXT_SUPP_RATES:
1152 /*
1153 * Only process extended supported rate
1154 * if data rate is already found.
1155 * Data rate IE should come before
1156 * extended supported rate IE
1157 */
1158 if (found_data_rate_ie) {
1159 if ((element_len + rate_size) >
1160 MWIFIEX_SUPPORTED_RATES)
1161 bytes_to_copy =
1162 (MWIFIEX_SUPPORTED_RATES -
1163 rate_size);
1164 else
1165 bytes_to_copy = element_len;
1166
1167 rate = (u8 *) bss_entry->data_rates;
1168 rate += rate_size;
1169 memcpy(rate, current_ptr + 2, bytes_to_copy);
1170
1171 rate = (u8 *) bss_entry->supported_rates;
1172 rate += rate_size;
1173 memcpy(rate, current_ptr + 2, bytes_to_copy);
1174 }
1175 break;
1176
1177 case WLAN_EID_VENDOR_SPECIFIC:
1178 vendor_ie = (struct ieee_types_vendor_specific *)
1179 current_ptr;
1180
1181 if (!memcmp
1182 (vendor_ie->vend_hdr.oui, wpa_oui,
1183 sizeof(wpa_oui))) {
1184 bss_entry->bcn_wpa_ie =
1185 (struct ieee_types_vendor_specific *)
1186 current_ptr;
1187 bss_entry->wpa_offset = (u16)
1188 (current_ptr - bss_entry->beacon_buf);
1189 } else if (!memcmp(vendor_ie->vend_hdr.oui, wmm_oui,
1190 sizeof(wmm_oui))) {
1191 if (total_ie_len ==
1192 sizeof(struct ieee_types_wmm_parameter) ||
1193 total_ie_len ==
1194 sizeof(struct ieee_types_wmm_info))
1195 /*
1196 * Only accept and copy the WMM IE if
1197 * it matches the size expected for the
1198 * WMM Info IE or the WMM Parameter IE.
1199 */
1200 memcpy((u8 *) &bss_entry->wmm_ie,
1201 current_ptr, total_ie_len);
1202 }
1203 break;
1204 case WLAN_EID_RSN:
1205 bss_entry->bcn_rsn_ie =
1206 (struct ieee_types_generic *) current_ptr;
1207 bss_entry->rsn_offset = (u16) (current_ptr -
1208 bss_entry->beacon_buf);
1209 break;
1210 case WLAN_EID_BSS_AC_ACCESS_DELAY:
1211 bss_entry->bcn_wapi_ie =
1212 (struct ieee_types_generic *) current_ptr;
1213 bss_entry->wapi_offset = (u16) (current_ptr -
1214 bss_entry->beacon_buf);
1215 break;
1216 case WLAN_EID_HT_CAPABILITY:
1217 bss_entry->bcn_ht_cap = (struct ieee80211_ht_cap *)
1218 (current_ptr +
1219 sizeof(struct ieee_types_header));
1220 bss_entry->ht_cap_offset = (u16) (current_ptr +
1221 sizeof(struct ieee_types_header) -
1222 bss_entry->beacon_buf);
1223 break;
1224 case WLAN_EID_HT_INFORMATION:
1225 bss_entry->bcn_ht_info = (struct ieee80211_ht_info *)
1226 (current_ptr +
1227 sizeof(struct ieee_types_header));
1228 bss_entry->ht_info_offset = (u16) (current_ptr +
1229 sizeof(struct ieee_types_header) -
1230 bss_entry->beacon_buf);
1231 break;
1232 case WLAN_EID_BSS_COEX_2040:
1233 bss_entry->bcn_bss_co_2040 = (u8 *) (current_ptr +
1234 sizeof(struct ieee_types_header));
1235 bss_entry->bss_co_2040_offset = (u16) (current_ptr +
1236 sizeof(struct ieee_types_header) -
1237 bss_entry->beacon_buf);
1238 break;
1239 case WLAN_EID_EXT_CAPABILITY:
1240 bss_entry->bcn_ext_cap = (u8 *) (current_ptr +
1241 sizeof(struct ieee_types_header));
1242 bss_entry->ext_cap_offset = (u16) (current_ptr +
1243 sizeof(struct ieee_types_header) -
1244 bss_entry->beacon_buf);
1245 break;
1246 default:
1247 break;
1248 }
1249
1250 current_ptr += element_len + 2;
1251
1252 /* Need to account for IE ID and IE Len */
1253 bytes_left -= (element_len + 2);
1254
1255 } /* while (bytes_left > 2) */
1256 return ret;
1257 }
1258
1259 /*
1260 * This function converts radio type scan parameter to a band configuration
1261 * to be used in join command.
1262 */
1263 static u8
mwifiex_radio_type_to_band(u8 radio_type)1264 mwifiex_radio_type_to_band(u8 radio_type)
1265 {
1266 switch (radio_type) {
1267 case HostCmd_SCAN_RADIO_TYPE_A:
1268 return BAND_A;
1269 case HostCmd_SCAN_RADIO_TYPE_BG:
1270 default:
1271 return BAND_G;
1272 }
1273 }
1274
1275 /*
1276 * This is an internal function used to start a scan based on an input
1277 * configuration.
1278 *
1279 * This uses the input user scan configuration information when provided in
1280 * order to send the appropriate scan commands to firmware to populate or
1281 * update the internal driver scan table.
1282 */
mwifiex_scan_networks(struct mwifiex_private * priv,const struct mwifiex_user_scan_cfg * user_scan_in)1283 static int mwifiex_scan_networks(struct mwifiex_private *priv,
1284 const struct mwifiex_user_scan_cfg *user_scan_in)
1285 {
1286 int ret = 0;
1287 struct mwifiex_adapter *adapter = priv->adapter;
1288 struct cmd_ctrl_node *cmd_node;
1289 union mwifiex_scan_cmd_config_tlv *scan_cfg_out;
1290 struct mwifiex_ie_types_chan_list_param_set *chan_list_out;
1291 u32 buf_size;
1292 struct mwifiex_chan_scan_param_set *scan_chan_list;
1293 u8 filtered_scan;
1294 u8 scan_current_chan_only;
1295 u8 max_chan_per_scan;
1296 unsigned long flags;
1297
1298 if (adapter->scan_processing) {
1299 dev_dbg(adapter->dev, "cmd: Scan already in process...\n");
1300 return ret;
1301 }
1302
1303 spin_lock_irqsave(&adapter->mwifiex_cmd_lock, flags);
1304 adapter->scan_processing = true;
1305 spin_unlock_irqrestore(&adapter->mwifiex_cmd_lock, flags);
1306
1307 if (priv->scan_block) {
1308 dev_dbg(adapter->dev,
1309 "cmd: Scan is blocked during association...\n");
1310 return ret;
1311 }
1312
1313 scan_cfg_out = kzalloc(sizeof(union mwifiex_scan_cmd_config_tlv),
1314 GFP_KERNEL);
1315 if (!scan_cfg_out) {
1316 dev_err(adapter->dev, "failed to alloc scan_cfg_out\n");
1317 return -ENOMEM;
1318 }
1319
1320 buf_size = sizeof(struct mwifiex_chan_scan_param_set) *
1321 MWIFIEX_USER_SCAN_CHAN_MAX;
1322 scan_chan_list = kzalloc(buf_size, GFP_KERNEL);
1323 if (!scan_chan_list) {
1324 dev_err(adapter->dev, "failed to alloc scan_chan_list\n");
1325 kfree(scan_cfg_out);
1326 return -ENOMEM;
1327 }
1328
1329 mwifiex_config_scan(priv, user_scan_in, &scan_cfg_out->config,
1330 &chan_list_out, scan_chan_list, &max_chan_per_scan,
1331 &filtered_scan, &scan_current_chan_only);
1332
1333 ret = mwifiex_scan_channel_list(priv, max_chan_per_scan, filtered_scan,
1334 &scan_cfg_out->config, chan_list_out,
1335 scan_chan_list);
1336
1337 /* Get scan command from scan_pending_q and put to cmd_pending_q */
1338 if (!ret) {
1339 spin_lock_irqsave(&adapter->scan_pending_q_lock, flags);
1340 if (!list_empty(&adapter->scan_pending_q)) {
1341 cmd_node = list_first_entry(&adapter->scan_pending_q,
1342 struct cmd_ctrl_node, list);
1343 list_del(&cmd_node->list);
1344 spin_unlock_irqrestore(&adapter->scan_pending_q_lock,
1345 flags);
1346 adapter->cmd_queued = cmd_node;
1347 mwifiex_insert_cmd_to_pending_q(adapter, cmd_node,
1348 true);
1349 } else {
1350 spin_unlock_irqrestore(&adapter->scan_pending_q_lock,
1351 flags);
1352 }
1353 } else {
1354 spin_lock_irqsave(&adapter->mwifiex_cmd_lock, flags);
1355 adapter->scan_processing = true;
1356 spin_unlock_irqrestore(&adapter->mwifiex_cmd_lock, flags);
1357 }
1358
1359 kfree(scan_cfg_out);
1360 kfree(scan_chan_list);
1361 return ret;
1362 }
1363
1364 /*
1365 * Sends IOCTL request to start a scan with user configurations.
1366 *
1367 * This function allocates the IOCTL request buffer, fills it
1368 * with requisite parameters and calls the IOCTL handler.
1369 *
1370 * Upon completion, it also generates a wireless event to notify
1371 * applications.
1372 */
mwifiex_set_user_scan_ioctl(struct mwifiex_private * priv,struct mwifiex_user_scan_cfg * scan_req)1373 int mwifiex_set_user_scan_ioctl(struct mwifiex_private *priv,
1374 struct mwifiex_user_scan_cfg *scan_req)
1375 {
1376 int status;
1377
1378 status = mwifiex_scan_networks(priv, scan_req);
1379 queue_work(priv->adapter->workqueue, &priv->adapter->main_work);
1380
1381 return status;
1382 }
1383
1384 /*
1385 * This function prepares a scan command to be sent to the firmware.
1386 *
1387 * This uses the scan command configuration sent to the command processing
1388 * module in command preparation stage to configure a scan command structure
1389 * to send to firmware.
1390 *
1391 * The fixed fields specifying the BSS type and BSSID filters as well as a
1392 * variable number/length of TLVs are sent in the command to firmware.
1393 *
1394 * Preparation also includes -
1395 * - Setting command ID, and proper size
1396 * - Ensuring correct endian-ness
1397 */
mwifiex_cmd_802_11_scan(struct host_cmd_ds_command * cmd,struct mwifiex_scan_cmd_config * scan_cfg)1398 int mwifiex_cmd_802_11_scan(struct host_cmd_ds_command *cmd,
1399 struct mwifiex_scan_cmd_config *scan_cfg)
1400 {
1401 struct host_cmd_ds_802_11_scan *scan_cmd = &cmd->params.scan;
1402
1403 /* Set fixed field variables in scan command */
1404 scan_cmd->bss_mode = scan_cfg->bss_mode;
1405 memcpy(scan_cmd->bssid, scan_cfg->specific_bssid,
1406 sizeof(scan_cmd->bssid));
1407 memcpy(scan_cmd->tlv_buffer, scan_cfg->tlv_buf, scan_cfg->tlv_buf_len);
1408
1409 cmd->command = cpu_to_le16(HostCmd_CMD_802_11_SCAN);
1410
1411 /* Size is equal to the sizeof(fixed portions) + the TLV len + header */
1412 cmd->size = cpu_to_le16((u16) (sizeof(scan_cmd->bss_mode)
1413 + sizeof(scan_cmd->bssid)
1414 + scan_cfg->tlv_buf_len + S_DS_GEN));
1415
1416 return 0;
1417 }
1418
1419 /*
1420 * This function checks compatibility of requested network with current
1421 * driver settings.
1422 */
mwifiex_check_network_compatibility(struct mwifiex_private * priv,struct mwifiex_bssdescriptor * bss_desc)1423 int mwifiex_check_network_compatibility(struct mwifiex_private *priv,
1424 struct mwifiex_bssdescriptor *bss_desc)
1425 {
1426 int ret = -1;
1427
1428 if (!bss_desc)
1429 return -1;
1430
1431 if ((mwifiex_get_cfp(priv, (u8) bss_desc->bss_band,
1432 (u16) bss_desc->channel, 0))) {
1433 switch (priv->bss_mode) {
1434 case NL80211_IFTYPE_STATION:
1435 case NL80211_IFTYPE_ADHOC:
1436 ret = mwifiex_is_network_compatible(priv, bss_desc,
1437 priv->bss_mode);
1438 if (ret)
1439 dev_err(priv->adapter->dev, "cannot find ssid "
1440 "%s\n", bss_desc->ssid.ssid);
1441 break;
1442 default:
1443 ret = 0;
1444 }
1445 }
1446
1447 return ret;
1448 }
1449
1450 static int
mwifiex_update_curr_bss_params(struct mwifiex_private * priv,u8 * bssid,s32 rssi,const u8 * ie_buf,size_t ie_len,u16 beacon_period,u16 cap_info_bitmap,u8 band)1451 mwifiex_update_curr_bss_params(struct mwifiex_private *priv, u8 *bssid,
1452 s32 rssi, const u8 *ie_buf, size_t ie_len,
1453 u16 beacon_period, u16 cap_info_bitmap, u8 band)
1454 {
1455 struct mwifiex_bssdescriptor *bss_desc;
1456 int ret;
1457 unsigned long flags;
1458 u8 *beacon_ie;
1459
1460 /* Allocate and fill new bss descriptor */
1461 bss_desc = kzalloc(sizeof(struct mwifiex_bssdescriptor),
1462 GFP_KERNEL);
1463 if (!bss_desc) {
1464 dev_err(priv->adapter->dev, " failed to alloc bss_desc\n");
1465 return -ENOMEM;
1466 }
1467
1468 beacon_ie = kmemdup(ie_buf, ie_len, GFP_KERNEL);
1469 if (!beacon_ie) {
1470 kfree(bss_desc);
1471 dev_err(priv->adapter->dev, " failed to alloc beacon_ie\n");
1472 return -ENOMEM;
1473 }
1474
1475 ret = mwifiex_fill_new_bss_desc(priv, bssid, rssi, beacon_ie,
1476 ie_len, beacon_period,
1477 cap_info_bitmap, band, bss_desc);
1478 if (ret)
1479 goto done;
1480
1481 ret = mwifiex_check_network_compatibility(priv, bss_desc);
1482 if (ret)
1483 goto done;
1484
1485 /* Update current bss descriptor parameters */
1486 spin_lock_irqsave(&priv->curr_bcn_buf_lock, flags);
1487 priv->curr_bss_params.bss_descriptor.bcn_wpa_ie = NULL;
1488 priv->curr_bss_params.bss_descriptor.wpa_offset = 0;
1489 priv->curr_bss_params.bss_descriptor.bcn_rsn_ie = NULL;
1490 priv->curr_bss_params.bss_descriptor.rsn_offset = 0;
1491 priv->curr_bss_params.bss_descriptor.bcn_wapi_ie = NULL;
1492 priv->curr_bss_params.bss_descriptor.wapi_offset = 0;
1493 priv->curr_bss_params.bss_descriptor.bcn_ht_cap = NULL;
1494 priv->curr_bss_params.bss_descriptor.ht_cap_offset =
1495 0;
1496 priv->curr_bss_params.bss_descriptor.bcn_ht_info = NULL;
1497 priv->curr_bss_params.bss_descriptor.ht_info_offset =
1498 0;
1499 priv->curr_bss_params.bss_descriptor.bcn_bss_co_2040 =
1500 NULL;
1501 priv->curr_bss_params.bss_descriptor.
1502 bss_co_2040_offset = 0;
1503 priv->curr_bss_params.bss_descriptor.bcn_ext_cap = NULL;
1504 priv->curr_bss_params.bss_descriptor.ext_cap_offset = 0;
1505 priv->curr_bss_params.bss_descriptor.beacon_buf = NULL;
1506 priv->curr_bss_params.bss_descriptor.beacon_buf_size =
1507 0;
1508
1509 /* Make a copy of current BSSID descriptor */
1510 memcpy(&priv->curr_bss_params.bss_descriptor, bss_desc,
1511 sizeof(priv->curr_bss_params.bss_descriptor));
1512 mwifiex_save_curr_bcn(priv);
1513 spin_unlock_irqrestore(&priv->curr_bcn_buf_lock, flags);
1514
1515 done:
1516 kfree(bss_desc);
1517 kfree(beacon_ie);
1518 return 0;
1519 }
1520
1521 /*
1522 * This function handles the command response of scan.
1523 *
1524 * The response buffer for the scan command has the following
1525 * memory layout:
1526 *
1527 * .-------------------------------------------------------------.
1528 * | Header (4 * sizeof(t_u16)): Standard command response hdr |
1529 * .-------------------------------------------------------------.
1530 * | BufSize (t_u16) : sizeof the BSS Description data |
1531 * .-------------------------------------------------------------.
1532 * | NumOfSet (t_u8) : Number of BSS Descs returned |
1533 * .-------------------------------------------------------------.
1534 * | BSSDescription data (variable, size given in BufSize) |
1535 * .-------------------------------------------------------------.
1536 * | TLV data (variable, size calculated using Header->Size, |
1537 * | BufSize and sizeof the fixed fields above) |
1538 * .-------------------------------------------------------------.
1539 */
mwifiex_ret_802_11_scan(struct mwifiex_private * priv,struct host_cmd_ds_command * resp)1540 int mwifiex_ret_802_11_scan(struct mwifiex_private *priv,
1541 struct host_cmd_ds_command *resp)
1542 {
1543 int ret = 0;
1544 struct mwifiex_adapter *adapter = priv->adapter;
1545 struct cmd_ctrl_node *cmd_node;
1546 struct host_cmd_ds_802_11_scan_rsp *scan_rsp;
1547 struct mwifiex_ie_types_data *tlv_data;
1548 struct mwifiex_ie_types_tsf_timestamp *tsf_tlv;
1549 u8 *bss_info;
1550 u32 scan_resp_size;
1551 u32 bytes_left;
1552 u32 idx;
1553 u32 tlv_buf_size;
1554 struct mwifiex_chan_freq_power *cfp;
1555 struct mwifiex_ie_types_chan_band_list_param_set *chan_band_tlv;
1556 struct chan_band_param_set *chan_band;
1557 u8 is_bgscan_resp;
1558 unsigned long flags;
1559 struct cfg80211_bss *bss;
1560
1561 is_bgscan_resp = (le16_to_cpu(resp->command)
1562 == HostCmd_CMD_802_11_BG_SCAN_QUERY);
1563 if (is_bgscan_resp)
1564 scan_rsp = &resp->params.bg_scan_query_resp.scan_resp;
1565 else
1566 scan_rsp = &resp->params.scan_resp;
1567
1568
1569 if (scan_rsp->number_of_sets > MWIFIEX_MAX_AP) {
1570 dev_err(adapter->dev, "SCAN_RESP: too many AP returned (%d)\n",
1571 scan_rsp->number_of_sets);
1572 ret = -1;
1573 goto done;
1574 }
1575
1576 bytes_left = le16_to_cpu(scan_rsp->bss_descript_size);
1577 dev_dbg(adapter->dev, "info: SCAN_RESP: bss_descript_size %d\n",
1578 bytes_left);
1579
1580 scan_resp_size = le16_to_cpu(resp->size);
1581
1582 dev_dbg(adapter->dev,
1583 "info: SCAN_RESP: returned %d APs before parsing\n",
1584 scan_rsp->number_of_sets);
1585
1586 bss_info = scan_rsp->bss_desc_and_tlv_buffer;
1587
1588 /*
1589 * The size of the TLV buffer is equal to the entire command response
1590 * size (scan_resp_size) minus the fixed fields (sizeof()'s), the
1591 * BSS Descriptions (bss_descript_size as bytesLef) and the command
1592 * response header (S_DS_GEN)
1593 */
1594 tlv_buf_size = scan_resp_size - (bytes_left
1595 + sizeof(scan_rsp->bss_descript_size)
1596 + sizeof(scan_rsp->number_of_sets)
1597 + S_DS_GEN);
1598
1599 tlv_data = (struct mwifiex_ie_types_data *) (scan_rsp->
1600 bss_desc_and_tlv_buffer +
1601 bytes_left);
1602
1603 /* Search the TLV buffer space in the scan response for any valid
1604 TLVs */
1605 mwifiex_ret_802_11_scan_get_tlv_ptrs(adapter, tlv_data, tlv_buf_size,
1606 TLV_TYPE_TSFTIMESTAMP,
1607 (struct mwifiex_ie_types_data **)
1608 &tsf_tlv);
1609
1610 /* Search the TLV buffer space in the scan response for any valid
1611 TLVs */
1612 mwifiex_ret_802_11_scan_get_tlv_ptrs(adapter, tlv_data, tlv_buf_size,
1613 TLV_TYPE_CHANNELBANDLIST,
1614 (struct mwifiex_ie_types_data **)
1615 &chan_band_tlv);
1616
1617 for (idx = 0; idx < scan_rsp->number_of_sets && bytes_left; idx++) {
1618 u8 bssid[ETH_ALEN];
1619 s32 rssi;
1620 const u8 *ie_buf;
1621 size_t ie_len;
1622 u16 channel = 0;
1623 u64 network_tsf = 0;
1624 u16 beacon_size = 0;
1625 u32 curr_bcn_bytes;
1626 u32 freq;
1627 u16 beacon_period;
1628 u16 cap_info_bitmap;
1629 u8 *current_ptr;
1630 struct mwifiex_bcn_param *bcn_param;
1631
1632 if (bytes_left >= sizeof(beacon_size)) {
1633 /* Extract & convert beacon size from command buffer */
1634 memcpy(&beacon_size, bss_info, sizeof(beacon_size));
1635 bytes_left -= sizeof(beacon_size);
1636 bss_info += sizeof(beacon_size);
1637 }
1638
1639 if (!beacon_size || beacon_size > bytes_left) {
1640 bss_info += bytes_left;
1641 bytes_left = 0;
1642 return -1;
1643 }
1644
1645 /* Initialize the current working beacon pointer for this BSS
1646 * iteration */
1647 current_ptr = bss_info;
1648
1649 /* Advance the return beacon pointer past the current beacon */
1650 bss_info += beacon_size;
1651 bytes_left -= beacon_size;
1652
1653 curr_bcn_bytes = beacon_size;
1654
1655 /*
1656 * First 5 fields are bssid, RSSI, time stamp, beacon interval,
1657 * and capability information
1658 */
1659 if (curr_bcn_bytes < sizeof(struct mwifiex_bcn_param)) {
1660 dev_err(adapter->dev,
1661 "InterpretIE: not enough bytes left\n");
1662 continue;
1663 }
1664 bcn_param = (struct mwifiex_bcn_param *)current_ptr;
1665 current_ptr += sizeof(*bcn_param);
1666 curr_bcn_bytes -= sizeof(*bcn_param);
1667
1668 memcpy(bssid, bcn_param->bssid, ETH_ALEN);
1669
1670 rssi = (s32) (bcn_param->rssi);
1671 dev_dbg(adapter->dev, "info: InterpretIE: RSSI=%02X\n", rssi);
1672
1673 beacon_period = le16_to_cpu(bcn_param->beacon_period);
1674
1675 cap_info_bitmap = le16_to_cpu(bcn_param->cap_info_bitmap);
1676 dev_dbg(adapter->dev, "info: InterpretIE: capabilities=0x%X\n",
1677 cap_info_bitmap);
1678
1679 /* Rest of the current buffer are IE's */
1680 ie_buf = current_ptr;
1681 ie_len = curr_bcn_bytes;
1682 dev_dbg(adapter->dev,
1683 "info: InterpretIE: IELength for this AP = %d\n",
1684 curr_bcn_bytes);
1685
1686 while (curr_bcn_bytes >= sizeof(struct ieee_types_header)) {
1687 u8 element_id, element_len;
1688
1689 element_id = *current_ptr;
1690 element_len = *(current_ptr + 1);
1691 if (curr_bcn_bytes < element_len +
1692 sizeof(struct ieee_types_header)) {
1693 dev_err(priv->adapter->dev,
1694 "%s: bytes left < IE length\n",
1695 __func__);
1696 goto done;
1697 }
1698 if (element_id == WLAN_EID_DS_PARAMS) {
1699 channel = *(u8 *) (current_ptr +
1700 sizeof(struct ieee_types_header));
1701 break;
1702 }
1703
1704 current_ptr += element_len +
1705 sizeof(struct ieee_types_header);
1706 curr_bcn_bytes -= element_len +
1707 sizeof(struct ieee_types_header);
1708 }
1709
1710 /*
1711 * If the TSF TLV was appended to the scan results, save this
1712 * entry's TSF value in the networkTSF field.The networkTSF is
1713 * the firmware's TSF value at the time the beacon or probe
1714 * response was received.
1715 */
1716 if (tsf_tlv)
1717 memcpy(&network_tsf,
1718 &tsf_tlv->tsf_data[idx * TSF_DATA_SIZE],
1719 sizeof(network_tsf));
1720
1721 if (channel) {
1722 struct ieee80211_channel *chan;
1723 u8 band;
1724
1725 band = BAND_G;
1726 if (chan_band_tlv) {
1727 chan_band =
1728 &chan_band_tlv->chan_band_param[idx];
1729 band = mwifiex_radio_type_to_band(
1730 chan_band->radio_type
1731 & (BIT(0) | BIT(1)));
1732 }
1733
1734 cfp = mwifiex_get_cfp(priv, band, channel, 0);
1735
1736 freq = cfp ? cfp->freq : 0;
1737
1738 chan = ieee80211_get_channel(priv->wdev->wiphy, freq);
1739
1740 if (chan && !(chan->flags & IEEE80211_CHAN_DISABLED)) {
1741 bss = cfg80211_inform_bss(priv->wdev->wiphy,
1742 chan, bssid, network_tsf,
1743 cap_info_bitmap, beacon_period,
1744 ie_buf, ie_len, rssi, GFP_KERNEL);
1745 *(u8 *)bss->priv = band;
1746 cfg80211_put_bss(bss);
1747
1748 if (priv->media_connected &&
1749 !memcmp(bssid,
1750 priv->curr_bss_params.bss_descriptor
1751 .mac_address, ETH_ALEN))
1752 mwifiex_update_curr_bss_params
1753 (priv, bssid, rssi,
1754 ie_buf, ie_len,
1755 beacon_period,
1756 cap_info_bitmap, band);
1757 }
1758 } else {
1759 dev_dbg(adapter->dev, "missing BSS channel IE\n");
1760 }
1761 }
1762
1763 spin_lock_irqsave(&adapter->scan_pending_q_lock, flags);
1764 if (list_empty(&adapter->scan_pending_q)) {
1765 spin_unlock_irqrestore(&adapter->scan_pending_q_lock, flags);
1766 spin_lock_irqsave(&adapter->mwifiex_cmd_lock, flags);
1767 adapter->scan_processing = false;
1768 spin_unlock_irqrestore(&adapter->mwifiex_cmd_lock, flags);
1769
1770 /* Need to indicate IOCTL complete */
1771 if (adapter->curr_cmd->wait_q_enabled) {
1772 adapter->cmd_wait_q.status = 0;
1773 mwifiex_complete_cmd(adapter, adapter->curr_cmd);
1774 }
1775 if (priv->report_scan_result)
1776 priv->report_scan_result = false;
1777 if (priv->scan_pending_on_block) {
1778 priv->scan_pending_on_block = false;
1779 up(&priv->async_sem);
1780 }
1781
1782 if (priv->user_scan_cfg) {
1783 dev_dbg(priv->adapter->dev,
1784 "info: %s: sending scan results\n", __func__);
1785 cfg80211_scan_done(priv->scan_request, 0);
1786 priv->scan_request = NULL;
1787 kfree(priv->user_scan_cfg);
1788 priv->user_scan_cfg = NULL;
1789 }
1790 } else {
1791 /* Get scan command from scan_pending_q and put to
1792 cmd_pending_q */
1793 cmd_node = list_first_entry(&adapter->scan_pending_q,
1794 struct cmd_ctrl_node, list);
1795 list_del(&cmd_node->list);
1796 spin_unlock_irqrestore(&adapter->scan_pending_q_lock, flags);
1797
1798 mwifiex_insert_cmd_to_pending_q(adapter, cmd_node, true);
1799 }
1800
1801 done:
1802 return ret;
1803 }
1804
1805 /*
1806 * This function prepares command for background scan query.
1807 *
1808 * Preparation includes -
1809 * - Setting command ID and proper size
1810 * - Setting background scan flush parameter
1811 * - Ensuring correct endian-ness
1812 */
mwifiex_cmd_802_11_bg_scan_query(struct host_cmd_ds_command * cmd)1813 int mwifiex_cmd_802_11_bg_scan_query(struct host_cmd_ds_command *cmd)
1814 {
1815 struct host_cmd_ds_802_11_bg_scan_query *bg_query =
1816 &cmd->params.bg_scan_query;
1817
1818 cmd->command = cpu_to_le16(HostCmd_CMD_802_11_BG_SCAN_QUERY);
1819 cmd->size = cpu_to_le16(sizeof(struct host_cmd_ds_802_11_bg_scan_query)
1820 + S_DS_GEN);
1821
1822 bg_query->flush = 1;
1823
1824 return 0;
1825 }
1826
1827 /*
1828 * This function inserts scan command node to the scan pending queue.
1829 */
1830 void
mwifiex_queue_scan_cmd(struct mwifiex_private * priv,struct cmd_ctrl_node * cmd_node)1831 mwifiex_queue_scan_cmd(struct mwifiex_private *priv,
1832 struct cmd_ctrl_node *cmd_node)
1833 {
1834 struct mwifiex_adapter *adapter = priv->adapter;
1835 unsigned long flags;
1836
1837 cmd_node->wait_q_enabled = true;
1838 cmd_node->condition = &adapter->scan_wait_q_woken;
1839 spin_lock_irqsave(&adapter->scan_pending_q_lock, flags);
1840 list_add_tail(&cmd_node->list, &adapter->scan_pending_q);
1841 spin_unlock_irqrestore(&adapter->scan_pending_q_lock, flags);
1842 }
1843
1844 /*
1845 * This function sends a scan command for all available channels to the
1846 * firmware, filtered on a specific SSID.
1847 */
mwifiex_scan_specific_ssid(struct mwifiex_private * priv,struct cfg80211_ssid * req_ssid)1848 static int mwifiex_scan_specific_ssid(struct mwifiex_private *priv,
1849 struct cfg80211_ssid *req_ssid)
1850 {
1851 struct mwifiex_adapter *adapter = priv->adapter;
1852 int ret = 0;
1853 struct mwifiex_user_scan_cfg *scan_cfg;
1854
1855 if (!req_ssid)
1856 return -1;
1857
1858 if (adapter->scan_processing) {
1859 dev_dbg(adapter->dev, "cmd: Scan already in process...\n");
1860 return ret;
1861 }
1862
1863 if (priv->scan_block) {
1864 dev_dbg(adapter->dev,
1865 "cmd: Scan is blocked during association...\n");
1866 return ret;
1867 }
1868
1869 scan_cfg = kzalloc(sizeof(struct mwifiex_user_scan_cfg), GFP_KERNEL);
1870 if (!scan_cfg) {
1871 dev_err(adapter->dev, "failed to alloc scan_cfg\n");
1872 return -ENOMEM;
1873 }
1874
1875 scan_cfg->ssid_list = req_ssid;
1876 scan_cfg->num_ssids = 1;
1877
1878 ret = mwifiex_scan_networks(priv, scan_cfg);
1879
1880 kfree(scan_cfg);
1881 return ret;
1882 }
1883
1884 /*
1885 * Sends IOCTL request to start a scan.
1886 *
1887 * This function allocates the IOCTL request buffer, fills it
1888 * with requisite parameters and calls the IOCTL handler.
1889 *
1890 * Scan command can be issued for both normal scan and specific SSID
1891 * scan, depending upon whether an SSID is provided or not.
1892 */
mwifiex_request_scan(struct mwifiex_private * priv,struct cfg80211_ssid * req_ssid)1893 int mwifiex_request_scan(struct mwifiex_private *priv,
1894 struct cfg80211_ssid *req_ssid)
1895 {
1896 int ret;
1897
1898 if (down_interruptible(&priv->async_sem)) {
1899 dev_err(priv->adapter->dev, "%s: acquire semaphore\n",
1900 __func__);
1901 return -1;
1902 }
1903 priv->scan_pending_on_block = true;
1904
1905 priv->adapter->scan_wait_q_woken = false;
1906
1907 if (req_ssid && req_ssid->ssid_len != 0)
1908 /* Specific SSID scan */
1909 ret = mwifiex_scan_specific_ssid(priv, req_ssid);
1910 else
1911 /* Normal scan */
1912 ret = mwifiex_scan_networks(priv, NULL);
1913
1914 if (!ret)
1915 ret = mwifiex_wait_queue_complete(priv->adapter);
1916
1917 if (ret == -1) {
1918 priv->scan_pending_on_block = false;
1919 up(&priv->async_sem);
1920 }
1921
1922 return ret;
1923 }
1924
1925 /*
1926 * This function appends the vendor specific IE TLV to a buffer.
1927 */
1928 int
mwifiex_cmd_append_vsie_tlv(struct mwifiex_private * priv,u16 vsie_mask,u8 ** buffer)1929 mwifiex_cmd_append_vsie_tlv(struct mwifiex_private *priv,
1930 u16 vsie_mask, u8 **buffer)
1931 {
1932 int id, ret_len = 0;
1933 struct mwifiex_ie_types_vendor_param_set *vs_param_set;
1934
1935 if (!buffer)
1936 return 0;
1937 if (!(*buffer))
1938 return 0;
1939
1940 /*
1941 * Traverse through the saved vendor specific IE array and append
1942 * the selected(scan/assoc/adhoc) IE as TLV to the command
1943 */
1944 for (id = 0; id < MWIFIEX_MAX_VSIE_NUM; id++) {
1945 if (priv->vs_ie[id].mask & vsie_mask) {
1946 vs_param_set =
1947 (struct mwifiex_ie_types_vendor_param_set *)
1948 *buffer;
1949 vs_param_set->header.type =
1950 cpu_to_le16(TLV_TYPE_PASSTHROUGH);
1951 vs_param_set->header.len =
1952 cpu_to_le16((((u16) priv->vs_ie[id].ie[1])
1953 & 0x00FF) + 2);
1954 memcpy(vs_param_set->ie, priv->vs_ie[id].ie,
1955 le16_to_cpu(vs_param_set->header.len));
1956 *buffer += le16_to_cpu(vs_param_set->header.len) +
1957 sizeof(struct mwifiex_ie_types_header);
1958 ret_len += le16_to_cpu(vs_param_set->header.len) +
1959 sizeof(struct mwifiex_ie_types_header);
1960 }
1961 }
1962 return ret_len;
1963 }
1964
1965 /*
1966 * This function saves a beacon buffer of the current BSS descriptor.
1967 *
1968 * The current beacon buffer is saved so that it can be restored in the
1969 * following cases that makes the beacon buffer not to contain the current
1970 * ssid's beacon buffer.
1971 * - The current ssid was not found somehow in the last scan.
1972 * - The current ssid was the last entry of the scan table and overloaded.
1973 */
1974 void
mwifiex_save_curr_bcn(struct mwifiex_private * priv)1975 mwifiex_save_curr_bcn(struct mwifiex_private *priv)
1976 {
1977 struct mwifiex_bssdescriptor *curr_bss =
1978 &priv->curr_bss_params.bss_descriptor;
1979
1980 if (!curr_bss->beacon_buf_size)
1981 return;
1982
1983 /* allocate beacon buffer at 1st time; or if it's size has changed */
1984 if (!priv->curr_bcn_buf ||
1985 priv->curr_bcn_size != curr_bss->beacon_buf_size) {
1986 priv->curr_bcn_size = curr_bss->beacon_buf_size;
1987
1988 kfree(priv->curr_bcn_buf);
1989 priv->curr_bcn_buf = kmalloc(curr_bss->beacon_buf_size,
1990 GFP_ATOMIC);
1991 if (!priv->curr_bcn_buf) {
1992 dev_err(priv->adapter->dev,
1993 "failed to alloc curr_bcn_buf\n");
1994 return;
1995 }
1996 }
1997
1998 memcpy(priv->curr_bcn_buf, curr_bss->beacon_buf,
1999 curr_bss->beacon_buf_size);
2000 dev_dbg(priv->adapter->dev, "info: current beacon saved %d\n",
2001 priv->curr_bcn_size);
2002
2003 curr_bss->beacon_buf = priv->curr_bcn_buf;
2004
2005 /* adjust the pointers in the current BSS descriptor */
2006 if (curr_bss->bcn_wpa_ie)
2007 curr_bss->bcn_wpa_ie =
2008 (struct ieee_types_vendor_specific *)
2009 (curr_bss->beacon_buf +
2010 curr_bss->wpa_offset);
2011
2012 if (curr_bss->bcn_rsn_ie)
2013 curr_bss->bcn_rsn_ie = (struct ieee_types_generic *)
2014 (curr_bss->beacon_buf +
2015 curr_bss->rsn_offset);
2016
2017 if (curr_bss->bcn_ht_cap)
2018 curr_bss->bcn_ht_cap = (struct ieee80211_ht_cap *)
2019 (curr_bss->beacon_buf +
2020 curr_bss->ht_cap_offset);
2021
2022 if (curr_bss->bcn_ht_info)
2023 curr_bss->bcn_ht_info = (struct ieee80211_ht_info *)
2024 (curr_bss->beacon_buf +
2025 curr_bss->ht_info_offset);
2026
2027 if (curr_bss->bcn_bss_co_2040)
2028 curr_bss->bcn_bss_co_2040 =
2029 (u8 *) (curr_bss->beacon_buf +
2030 curr_bss->bss_co_2040_offset);
2031
2032 if (curr_bss->bcn_ext_cap)
2033 curr_bss->bcn_ext_cap = (u8 *) (curr_bss->beacon_buf +
2034 curr_bss->ext_cap_offset);
2035 }
2036
2037 /*
2038 * This function frees the current BSS descriptor beacon buffer.
2039 */
2040 void
mwifiex_free_curr_bcn(struct mwifiex_private * priv)2041 mwifiex_free_curr_bcn(struct mwifiex_private *priv)
2042 {
2043 kfree(priv->curr_bcn_buf);
2044 priv->curr_bcn_buf = NULL;
2045 }
2046