main.c revision c71114959dc952a509822f22251d01004b3b94cc
1/* 2 * Copyright (c) 2004-2011 Atheros Communications Inc. 3 * 4 * Permission to use, copy, modify, and/or distribute this software for any 5 * purpose with or without fee is hereby granted, provided that the above 6 * copyright notice and this permission notice appear in all copies. 7 * 8 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES 9 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF 10 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR 11 * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES 12 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN 13 * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF 14 * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. 15 */ 16 17#include "core.h" 18#include "hif-ops.h" 19#include "cfg80211.h" 20#include "target.h" 21#include "debug.h" 22 23struct ath6kl_sta *ath6kl_find_sta(struct ath6kl_vif *vif, u8 *node_addr) 24{ 25 struct ath6kl *ar = vif->ar; 26 struct ath6kl_sta *conn = NULL; 27 u8 i, max_conn; 28 29 max_conn = (vif->nw_type == AP_NETWORK) ? AP_MAX_NUM_STA : 0; 30 31 for (i = 0; i < max_conn; i++) { 32 if (memcmp(node_addr, ar->sta_list[i].mac, ETH_ALEN) == 0) { 33 conn = &ar->sta_list[i]; 34 break; 35 } 36 } 37 38 return conn; 39} 40 41struct ath6kl_sta *ath6kl_find_sta_by_aid(struct ath6kl *ar, u8 aid) 42{ 43 struct ath6kl_sta *conn = NULL; 44 u8 ctr; 45 46 for (ctr = 0; ctr < AP_MAX_NUM_STA; ctr++) { 47 if (ar->sta_list[ctr].aid == aid) { 48 conn = &ar->sta_list[ctr]; 49 break; 50 } 51 } 52 return conn; 53} 54 55static void ath6kl_add_new_sta(struct ath6kl *ar, u8 *mac, u16 aid, u8 *wpaie, 56 u8 ielen, u8 keymgmt, u8 ucipher, u8 auth) 57{ 58 struct ath6kl_sta *sta; 59 u8 free_slot; 60 61 free_slot = aid - 1; 62 63 sta = &ar->sta_list[free_slot]; 64 memcpy(sta->mac, mac, ETH_ALEN); 65 if (ielen <= ATH6KL_MAX_IE) 66 memcpy(sta->wpa_ie, wpaie, ielen); 67 sta->aid = aid; 68 sta->keymgmt = keymgmt; 69 sta->ucipher = ucipher; 70 sta->auth = auth; 71 72 ar->sta_list_index = ar->sta_list_index | (1 << free_slot); 73 ar->ap_stats.sta[free_slot].aid = cpu_to_le32(aid); 74} 75 76static void ath6kl_sta_cleanup(struct ath6kl *ar, u8 i) 77{ 78 struct ath6kl_sta *sta = &ar->sta_list[i]; 79 80 /* empty the queued pkts in the PS queue if any */ 81 spin_lock_bh(&sta->psq_lock); 82 skb_queue_purge(&sta->psq); 83 spin_unlock_bh(&sta->psq_lock); 84 85 memset(&ar->ap_stats.sta[sta->aid - 1], 0, 86 sizeof(struct wmi_per_sta_stat)); 87 memset(sta->mac, 0, ETH_ALEN); 88 memset(sta->wpa_ie, 0, ATH6KL_MAX_IE); 89 sta->aid = 0; 90 sta->sta_flags = 0; 91 92 ar->sta_list_index = ar->sta_list_index & ~(1 << i); 93 94} 95 96static u8 ath6kl_remove_sta(struct ath6kl *ar, u8 *mac, u16 reason) 97{ 98 u8 i, removed = 0; 99 100 if (is_zero_ether_addr(mac)) 101 return removed; 102 103 if (is_broadcast_ether_addr(mac)) { 104 ath6kl_dbg(ATH6KL_DBG_TRC, "deleting all station\n"); 105 106 for (i = 0; i < AP_MAX_NUM_STA; i++) { 107 if (!is_zero_ether_addr(ar->sta_list[i].mac)) { 108 ath6kl_sta_cleanup(ar, i); 109 removed = 1; 110 } 111 } 112 } else { 113 for (i = 0; i < AP_MAX_NUM_STA; i++) { 114 if (memcmp(ar->sta_list[i].mac, mac, ETH_ALEN) == 0) { 115 ath6kl_dbg(ATH6KL_DBG_TRC, 116 "deleting station %pM aid=%d reason=%d\n", 117 mac, ar->sta_list[i].aid, reason); 118 ath6kl_sta_cleanup(ar, i); 119 removed = 1; 120 break; 121 } 122 } 123 } 124 125 return removed; 126} 127 128enum htc_endpoint_id ath6kl_ac2_endpoint_id(void *devt, u8 ac) 129{ 130 struct ath6kl *ar = devt; 131 return ar->ac2ep_map[ac]; 132} 133 134struct ath6kl_cookie *ath6kl_alloc_cookie(struct ath6kl *ar) 135{ 136 struct ath6kl_cookie *cookie; 137 138 cookie = ar->cookie_list; 139 if (cookie != NULL) { 140 ar->cookie_list = cookie->arc_list_next; 141 ar->cookie_count--; 142 } 143 144 return cookie; 145} 146 147void ath6kl_cookie_init(struct ath6kl *ar) 148{ 149 u32 i; 150 151 ar->cookie_list = NULL; 152 ar->cookie_count = 0; 153 154 memset(ar->cookie_mem, 0, sizeof(ar->cookie_mem)); 155 156 for (i = 0; i < MAX_COOKIE_NUM; i++) 157 ath6kl_free_cookie(ar, &ar->cookie_mem[i]); 158} 159 160void ath6kl_cookie_cleanup(struct ath6kl *ar) 161{ 162 ar->cookie_list = NULL; 163 ar->cookie_count = 0; 164} 165 166void ath6kl_free_cookie(struct ath6kl *ar, struct ath6kl_cookie *cookie) 167{ 168 /* Insert first */ 169 170 if (!ar || !cookie) 171 return; 172 173 cookie->arc_list_next = ar->cookie_list; 174 ar->cookie_list = cookie; 175 ar->cookie_count++; 176} 177 178/* 179 * Read from the hardware through its diagnostic window. No cooperation 180 * from the firmware is required for this. 181 */ 182int ath6kl_diag_read32(struct ath6kl *ar, u32 address, u32 *value) 183{ 184 int ret; 185 186 ret = ath6kl_hif_diag_read32(ar, address, value); 187 if (ret) { 188 ath6kl_warn("failed to read32 through diagnose window: %d\n", 189 ret); 190 return ret; 191 } 192 193 return 0; 194} 195 196/* 197 * Write to the ATH6KL through its diagnostic window. No cooperation from 198 * the Target is required for this. 199 */ 200int ath6kl_diag_write32(struct ath6kl *ar, u32 address, __le32 value) 201{ 202 int ret; 203 204 ret = ath6kl_hif_diag_write32(ar, address, value); 205 206 if (ret) { 207 ath6kl_err("failed to write 0x%x during diagnose window to 0x%d\n", 208 address, value); 209 return ret; 210 } 211 212 return 0; 213} 214 215int ath6kl_diag_read(struct ath6kl *ar, u32 address, void *data, u32 length) 216{ 217 u32 count, *buf = data; 218 int ret; 219 220 if (WARN_ON(length % 4)) 221 return -EINVAL; 222 223 for (count = 0; count < length / 4; count++, address += 4) { 224 ret = ath6kl_diag_read32(ar, address, &buf[count]); 225 if (ret) 226 return ret; 227 } 228 229 return 0; 230} 231 232int ath6kl_diag_write(struct ath6kl *ar, u32 address, void *data, u32 length) 233{ 234 u32 count; 235 __le32 *buf = data; 236 int ret; 237 238 if (WARN_ON(length % 4)) 239 return -EINVAL; 240 241 for (count = 0; count < length / 4; count++, address += 4) { 242 ret = ath6kl_diag_write32(ar, address, buf[count]); 243 if (ret) 244 return ret; 245 } 246 247 return 0; 248} 249 250int ath6kl_read_fwlogs(struct ath6kl *ar) 251{ 252 struct ath6kl_dbglog_hdr debug_hdr; 253 struct ath6kl_dbglog_buf debug_buf; 254 u32 address, length, dropped, firstbuf, debug_hdr_addr; 255 int ret = 0, loop; 256 u8 *buf; 257 258 buf = kmalloc(ATH6KL_FWLOG_PAYLOAD_SIZE, GFP_KERNEL); 259 if (!buf) 260 return -ENOMEM; 261 262 address = TARG_VTOP(ar->target_type, 263 ath6kl_get_hi_item_addr(ar, 264 HI_ITEM(hi_dbglog_hdr))); 265 266 ret = ath6kl_diag_read32(ar, address, &debug_hdr_addr); 267 if (ret) 268 goto out; 269 270 /* Get the contents of the ring buffer */ 271 if (debug_hdr_addr == 0) { 272 ath6kl_warn("Invalid address for debug_hdr_addr\n"); 273 ret = -EINVAL; 274 goto out; 275 } 276 277 address = TARG_VTOP(ar->target_type, debug_hdr_addr); 278 ath6kl_diag_read(ar, address, &debug_hdr, sizeof(debug_hdr)); 279 280 address = TARG_VTOP(ar->target_type, 281 le32_to_cpu(debug_hdr.dbuf_addr)); 282 firstbuf = address; 283 dropped = le32_to_cpu(debug_hdr.dropped); 284 ath6kl_diag_read(ar, address, &debug_buf, sizeof(debug_buf)); 285 286 loop = 100; 287 288 do { 289 address = TARG_VTOP(ar->target_type, 290 le32_to_cpu(debug_buf.buffer_addr)); 291 length = le32_to_cpu(debug_buf.length); 292 293 if (length != 0 && (le32_to_cpu(debug_buf.length) <= 294 le32_to_cpu(debug_buf.bufsize))) { 295 length = ALIGN(length, 4); 296 297 ret = ath6kl_diag_read(ar, address, 298 buf, length); 299 if (ret) 300 goto out; 301 302 ath6kl_debug_fwlog_event(ar, buf, length); 303 } 304 305 address = TARG_VTOP(ar->target_type, 306 le32_to_cpu(debug_buf.next)); 307 ath6kl_diag_read(ar, address, &debug_buf, sizeof(debug_buf)); 308 if (ret) 309 goto out; 310 311 loop--; 312 313 if (WARN_ON(loop == 0)) { 314 ret = -ETIMEDOUT; 315 goto out; 316 } 317 } while (address != firstbuf); 318 319out: 320 kfree(buf); 321 322 return ret; 323} 324 325/* FIXME: move to a better place, target.h? */ 326#define AR6003_RESET_CONTROL_ADDRESS 0x00004000 327#define AR6004_RESET_CONTROL_ADDRESS 0x00004000 328 329void ath6kl_reset_device(struct ath6kl *ar, u32 target_type, 330 bool wait_fot_compltn, bool cold_reset) 331{ 332 int status = 0; 333 u32 address; 334 __le32 data; 335 336 if (target_type != TARGET_TYPE_AR6003 && 337 target_type != TARGET_TYPE_AR6004) 338 return; 339 340 data = cold_reset ? cpu_to_le32(RESET_CONTROL_COLD_RST) : 341 cpu_to_le32(RESET_CONTROL_MBOX_RST); 342 343 switch (target_type) { 344 case TARGET_TYPE_AR6003: 345 address = AR6003_RESET_CONTROL_ADDRESS; 346 break; 347 case TARGET_TYPE_AR6004: 348 address = AR6004_RESET_CONTROL_ADDRESS; 349 break; 350 default: 351 address = AR6003_RESET_CONTROL_ADDRESS; 352 break; 353 } 354 355 status = ath6kl_diag_write32(ar, address, data); 356 357 if (status) 358 ath6kl_err("failed to reset target\n"); 359} 360 361static void ath6kl_install_static_wep_keys(struct ath6kl_vif *vif) 362{ 363 u8 index; 364 u8 keyusage; 365 366 for (index = WMI_MIN_KEY_INDEX; index <= WMI_MAX_KEY_INDEX; index++) { 367 if (vif->wep_key_list[index].key_len) { 368 keyusage = GROUP_USAGE; 369 if (index == vif->def_txkey_index) 370 keyusage |= TX_USAGE; 371 372 ath6kl_wmi_addkey_cmd(vif->ar->wmi, vif->fw_vif_idx, 373 index, 374 WEP_CRYPT, 375 keyusage, 376 vif->wep_key_list[index].key_len, 377 NULL, 0, 378 vif->wep_key_list[index].key, 379 KEY_OP_INIT_VAL, NULL, 380 NO_SYNC_WMIFLAG); 381 } 382 } 383} 384 385void ath6kl_connect_ap_mode_bss(struct ath6kl_vif *vif, u16 channel) 386{ 387 struct ath6kl *ar = vif->ar; 388 struct ath6kl_req_key *ik; 389 int res; 390 u8 key_rsc[ATH6KL_KEY_SEQ_LEN]; 391 392 ik = &ar->ap_mode_bkey; 393 394 ath6kl_dbg(ATH6KL_DBG_WLAN_CFG, "AP mode started on %u MHz\n", channel); 395 396 switch (vif->auth_mode) { 397 case NONE_AUTH: 398 if (vif->prwise_crypto == WEP_CRYPT) 399 ath6kl_install_static_wep_keys(vif); 400 break; 401 case WPA_PSK_AUTH: 402 case WPA2_PSK_AUTH: 403 case (WPA_PSK_AUTH | WPA2_PSK_AUTH): 404 if (!ik->valid) 405 break; 406 407 ath6kl_dbg(ATH6KL_DBG_WLAN_CFG, "Delayed addkey for " 408 "the initial group key for AP mode\n"); 409 memset(key_rsc, 0, sizeof(key_rsc)); 410 res = ath6kl_wmi_addkey_cmd( 411 ar->wmi, vif->fw_vif_idx, ik->key_index, ik->key_type, 412 GROUP_USAGE, ik->key_len, key_rsc, ATH6KL_KEY_SEQ_LEN, 413 ik->key, 414 KEY_OP_INIT_VAL, NULL, SYNC_BOTH_WMIFLAG); 415 if (res) { 416 ath6kl_dbg(ATH6KL_DBG_WLAN_CFG, "Delayed " 417 "addkey failed: %d\n", res); 418 } 419 break; 420 } 421 422 ath6kl_wmi_bssfilter_cmd(ar->wmi, vif->fw_vif_idx, NONE_BSS_FILTER, 0); 423 set_bit(CONNECTED, &vif->flags); 424 netif_carrier_on(vif->ndev); 425} 426 427void ath6kl_connect_ap_mode_sta(struct ath6kl_vif *vif, u16 aid, u8 *mac_addr, 428 u8 keymgmt, u8 ucipher, u8 auth, 429 u8 assoc_req_len, u8 *assoc_info) 430{ 431 struct ath6kl *ar = vif->ar; 432 u8 *ies = NULL, *wpa_ie = NULL, *pos; 433 size_t ies_len = 0; 434 struct station_info sinfo; 435 436 ath6kl_dbg(ATH6KL_DBG_TRC, "new station %pM aid=%d\n", mac_addr, aid); 437 438 if (assoc_req_len > sizeof(struct ieee80211_hdr_3addr)) { 439 struct ieee80211_mgmt *mgmt = 440 (struct ieee80211_mgmt *) assoc_info; 441 if (ieee80211_is_assoc_req(mgmt->frame_control) && 442 assoc_req_len >= sizeof(struct ieee80211_hdr_3addr) + 443 sizeof(mgmt->u.assoc_req)) { 444 ies = mgmt->u.assoc_req.variable; 445 ies_len = assoc_info + assoc_req_len - ies; 446 } else if (ieee80211_is_reassoc_req(mgmt->frame_control) && 447 assoc_req_len >= sizeof(struct ieee80211_hdr_3addr) 448 + sizeof(mgmt->u.reassoc_req)) { 449 ies = mgmt->u.reassoc_req.variable; 450 ies_len = assoc_info + assoc_req_len - ies; 451 } 452 } 453 454 pos = ies; 455 while (pos && pos + 1 < ies + ies_len) { 456 if (pos + 2 + pos[1] > ies + ies_len) 457 break; 458 if (pos[0] == WLAN_EID_RSN) 459 wpa_ie = pos; /* RSN IE */ 460 else if (pos[0] == WLAN_EID_VENDOR_SPECIFIC && 461 pos[1] >= 4 && 462 pos[2] == 0x00 && pos[3] == 0x50 && pos[4] == 0xf2) { 463 if (pos[5] == 0x01) 464 wpa_ie = pos; /* WPA IE */ 465 else if (pos[5] == 0x04) { 466 wpa_ie = pos; /* WPS IE */ 467 break; /* overrides WPA/RSN IE */ 468 } 469 } else if (pos[0] == 0x44 && wpa_ie == NULL) { 470 /* 471 * Note: WAPI Parameter Set IE re-uses Element ID that 472 * was officially allocated for BSS AC Access Delay. As 473 * such, we need to be a bit more careful on when 474 * parsing the frame. However, BSS AC Access Delay 475 * element is not supposed to be included in 476 * (Re)Association Request frames, so this should not 477 * cause problems. 478 */ 479 wpa_ie = pos; /* WAPI IE */ 480 break; 481 } 482 pos += 2 + pos[1]; 483 } 484 485 ath6kl_add_new_sta(ar, mac_addr, aid, wpa_ie, 486 wpa_ie ? 2 + wpa_ie[1] : 0, 487 keymgmt, ucipher, auth); 488 489 /* send event to application */ 490 memset(&sinfo, 0, sizeof(sinfo)); 491 492 /* TODO: sinfo.generation */ 493 494 sinfo.assoc_req_ies = ies; 495 sinfo.assoc_req_ies_len = ies_len; 496 sinfo.filled |= STATION_INFO_ASSOC_REQ_IES; 497 498 cfg80211_new_sta(vif->ndev, mac_addr, &sinfo, GFP_KERNEL); 499 500 netif_wake_queue(vif->ndev); 501} 502 503void disconnect_timer_handler(unsigned long ptr) 504{ 505 struct net_device *dev = (struct net_device *)ptr; 506 struct ath6kl_vif *vif = netdev_priv(dev); 507 508 ath6kl_init_profile_info(vif); 509 ath6kl_disconnect(vif); 510} 511 512void ath6kl_disconnect(struct ath6kl_vif *vif) 513{ 514 if (test_bit(CONNECTED, &vif->flags) || 515 test_bit(CONNECT_PEND, &vif->flags)) { 516 ath6kl_wmi_disconnect_cmd(vif->ar->wmi, vif->fw_vif_idx); 517 /* 518 * Disconnect command is issued, clear the connect pending 519 * flag. The connected flag will be cleared in 520 * disconnect event notification. 521 */ 522 clear_bit(CONNECT_PEND, &vif->flags); 523 } 524} 525 526/* WMI Event handlers */ 527 528static const char *get_hw_id_string(u32 id) 529{ 530 switch (id) { 531 case AR6003_REV1_VERSION: 532 return "1.0"; 533 case AR6003_REV2_VERSION: 534 return "2.0"; 535 case AR6003_REV3_VERSION: 536 return "2.1.1"; 537 default: 538 return "unknown"; 539 } 540} 541 542void ath6kl_ready_event(void *devt, u8 *datap, u32 sw_ver, u32 abi_ver) 543{ 544 struct ath6kl *ar = devt; 545 546 memcpy(ar->mac_addr, datap, ETH_ALEN); 547 ath6kl_dbg(ATH6KL_DBG_TRC, "%s: mac addr = %pM\n", 548 __func__, ar->mac_addr); 549 550 ar->version.wlan_ver = sw_ver; 551 ar->version.abi_ver = abi_ver; 552 553 snprintf(ar->wiphy->fw_version, 554 sizeof(ar->wiphy->fw_version), 555 "%u.%u.%u.%u", 556 (ar->version.wlan_ver & 0xf0000000) >> 28, 557 (ar->version.wlan_ver & 0x0f000000) >> 24, 558 (ar->version.wlan_ver & 0x00ff0000) >> 16, 559 (ar->version.wlan_ver & 0x0000ffff)); 560 561 /* indicate to the waiting thread that the ready event was received */ 562 set_bit(WMI_READY, &ar->flag); 563 wake_up(&ar->event_wq); 564 565 if (test_and_clear_bit(FIRST_BOOT, &ar->flag)) { 566 ath6kl_info("hw %s fw %s%s\n", 567 get_hw_id_string(ar->wiphy->hw_version), 568 ar->wiphy->fw_version, 569 test_bit(TESTMODE, &ar->flag) ? " testmode" : ""); 570 } 571} 572 573void ath6kl_scan_complete_evt(struct ath6kl_vif *vif, int status) 574{ 575 struct ath6kl *ar = vif->ar; 576 bool aborted = false; 577 578 if (status != WMI_SCAN_STATUS_SUCCESS) 579 aborted = true; 580 581 ath6kl_cfg80211_scan_complete_event(vif, aborted); 582 583 if (!ar->usr_bss_filter) { 584 clear_bit(CLEAR_BSSFILTER_ON_BEACON, &vif->flags); 585 ath6kl_wmi_bssfilter_cmd(ar->wmi, vif->fw_vif_idx, 586 NONE_BSS_FILTER, 0); 587 } 588 589 ath6kl_dbg(ATH6KL_DBG_WLAN_CFG, "scan complete: %d\n", status); 590} 591 592void ath6kl_connect_event(struct ath6kl_vif *vif, u16 channel, u8 *bssid, 593 u16 listen_int, u16 beacon_int, 594 enum network_type net_type, u8 beacon_ie_len, 595 u8 assoc_req_len, u8 assoc_resp_len, 596 u8 *assoc_info) 597{ 598 struct ath6kl *ar = vif->ar; 599 600 ath6kl_cfg80211_connect_event(vif, channel, bssid, 601 listen_int, beacon_int, 602 net_type, beacon_ie_len, 603 assoc_req_len, assoc_resp_len, 604 assoc_info); 605 606 memcpy(vif->bssid, bssid, sizeof(vif->bssid)); 607 vif->bss_ch = channel; 608 609 if ((vif->nw_type == INFRA_NETWORK)) 610 ath6kl_wmi_listeninterval_cmd(ar->wmi, vif->fw_vif_idx, 611 ar->listen_intvl_t, 612 ar->listen_intvl_b); 613 614 netif_wake_queue(vif->ndev); 615 616 /* Update connect & link status atomically */ 617 spin_lock_bh(&vif->if_lock); 618 set_bit(CONNECTED, &vif->flags); 619 clear_bit(CONNECT_PEND, &vif->flags); 620 netif_carrier_on(vif->ndev); 621 spin_unlock_bh(&vif->if_lock); 622 623 aggr_reset_state(vif->aggr_cntxt); 624 vif->reconnect_flag = 0; 625 626 if ((vif->nw_type == ADHOC_NETWORK) && ar->ibss_ps_enable) { 627 memset(ar->node_map, 0, sizeof(ar->node_map)); 628 ar->node_num = 0; 629 ar->next_ep_id = ENDPOINT_2; 630 } 631 632 if (!ar->usr_bss_filter) { 633 set_bit(CLEAR_BSSFILTER_ON_BEACON, &vif->flags); 634 ath6kl_wmi_bssfilter_cmd(ar->wmi, vif->fw_vif_idx, 635 CURRENT_BSS_FILTER, 0); 636 } 637} 638 639void ath6kl_tkip_micerr_event(struct ath6kl_vif *vif, u8 keyid, bool ismcast) 640{ 641 struct ath6kl_sta *sta; 642 struct ath6kl *ar = vif->ar; 643 u8 tsc[6]; 644 645 /* 646 * For AP case, keyid will have aid of STA which sent pkt with 647 * MIC error. Use this aid to get MAC & send it to hostapd. 648 */ 649 if (vif->nw_type == AP_NETWORK) { 650 sta = ath6kl_find_sta_by_aid(ar, (keyid >> 2)); 651 if (!sta) 652 return; 653 654 ath6kl_dbg(ATH6KL_DBG_TRC, 655 "ap tkip mic error received from aid=%d\n", keyid); 656 657 memset(tsc, 0, sizeof(tsc)); /* FIX: get correct TSC */ 658 cfg80211_michael_mic_failure(vif->ndev, sta->mac, 659 NL80211_KEYTYPE_PAIRWISE, keyid, 660 tsc, GFP_KERNEL); 661 } else 662 ath6kl_cfg80211_tkip_micerr_event(vif, keyid, ismcast); 663 664} 665 666static void ath6kl_update_target_stats(struct ath6kl_vif *vif, u8 *ptr, u32 len) 667{ 668 struct wmi_target_stats *tgt_stats = 669 (struct wmi_target_stats *) ptr; 670 struct ath6kl *ar = vif->ar; 671 struct target_stats *stats = &vif->target_stats; 672 struct tkip_ccmp_stats *ccmp_stats; 673 u8 ac; 674 675 if (len < sizeof(*tgt_stats)) 676 return; 677 678 ath6kl_dbg(ATH6KL_DBG_TRC, "updating target stats\n"); 679 680 stats->tx_pkt += le32_to_cpu(tgt_stats->stats.tx.pkt); 681 stats->tx_byte += le32_to_cpu(tgt_stats->stats.tx.byte); 682 stats->tx_ucast_pkt += le32_to_cpu(tgt_stats->stats.tx.ucast_pkt); 683 stats->tx_ucast_byte += le32_to_cpu(tgt_stats->stats.tx.ucast_byte); 684 stats->tx_mcast_pkt += le32_to_cpu(tgt_stats->stats.tx.mcast_pkt); 685 stats->tx_mcast_byte += le32_to_cpu(tgt_stats->stats.tx.mcast_byte); 686 stats->tx_bcast_pkt += le32_to_cpu(tgt_stats->stats.tx.bcast_pkt); 687 stats->tx_bcast_byte += le32_to_cpu(tgt_stats->stats.tx.bcast_byte); 688 stats->tx_rts_success_cnt += 689 le32_to_cpu(tgt_stats->stats.tx.rts_success_cnt); 690 691 for (ac = 0; ac < WMM_NUM_AC; ac++) 692 stats->tx_pkt_per_ac[ac] += 693 le32_to_cpu(tgt_stats->stats.tx.pkt_per_ac[ac]); 694 695 stats->tx_err += le32_to_cpu(tgt_stats->stats.tx.err); 696 stats->tx_fail_cnt += le32_to_cpu(tgt_stats->stats.tx.fail_cnt); 697 stats->tx_retry_cnt += le32_to_cpu(tgt_stats->stats.tx.retry_cnt); 698 stats->tx_mult_retry_cnt += 699 le32_to_cpu(tgt_stats->stats.tx.mult_retry_cnt); 700 stats->tx_rts_fail_cnt += 701 le32_to_cpu(tgt_stats->stats.tx.rts_fail_cnt); 702 stats->tx_ucast_rate = 703 ath6kl_wmi_get_rate(a_sle32_to_cpu(tgt_stats->stats.tx.ucast_rate)); 704 705 stats->rx_pkt += le32_to_cpu(tgt_stats->stats.rx.pkt); 706 stats->rx_byte += le32_to_cpu(tgt_stats->stats.rx.byte); 707 stats->rx_ucast_pkt += le32_to_cpu(tgt_stats->stats.rx.ucast_pkt); 708 stats->rx_ucast_byte += le32_to_cpu(tgt_stats->stats.rx.ucast_byte); 709 stats->rx_mcast_pkt += le32_to_cpu(tgt_stats->stats.rx.mcast_pkt); 710 stats->rx_mcast_byte += le32_to_cpu(tgt_stats->stats.rx.mcast_byte); 711 stats->rx_bcast_pkt += le32_to_cpu(tgt_stats->stats.rx.bcast_pkt); 712 stats->rx_bcast_byte += le32_to_cpu(tgt_stats->stats.rx.bcast_byte); 713 stats->rx_frgment_pkt += le32_to_cpu(tgt_stats->stats.rx.frgment_pkt); 714 stats->rx_err += le32_to_cpu(tgt_stats->stats.rx.err); 715 stats->rx_crc_err += le32_to_cpu(tgt_stats->stats.rx.crc_err); 716 stats->rx_key_cache_miss += 717 le32_to_cpu(tgt_stats->stats.rx.key_cache_miss); 718 stats->rx_decrypt_err += le32_to_cpu(tgt_stats->stats.rx.decrypt_err); 719 stats->rx_dupl_frame += le32_to_cpu(tgt_stats->stats.rx.dupl_frame); 720 stats->rx_ucast_rate = 721 ath6kl_wmi_get_rate(a_sle32_to_cpu(tgt_stats->stats.rx.ucast_rate)); 722 723 ccmp_stats = &tgt_stats->stats.tkip_ccmp_stats; 724 725 stats->tkip_local_mic_fail += 726 le32_to_cpu(ccmp_stats->tkip_local_mic_fail); 727 stats->tkip_cnter_measures_invoked += 728 le32_to_cpu(ccmp_stats->tkip_cnter_measures_invoked); 729 stats->tkip_fmt_err += le32_to_cpu(ccmp_stats->tkip_fmt_err); 730 731 stats->ccmp_fmt_err += le32_to_cpu(ccmp_stats->ccmp_fmt_err); 732 stats->ccmp_replays += le32_to_cpu(ccmp_stats->ccmp_replays); 733 734 stats->pwr_save_fail_cnt += 735 le32_to_cpu(tgt_stats->pm_stats.pwr_save_failure_cnt); 736 stats->noise_floor_calib = 737 a_sle32_to_cpu(tgt_stats->noise_floor_calib); 738 739 stats->cs_bmiss_cnt += 740 le32_to_cpu(tgt_stats->cserv_stats.cs_bmiss_cnt); 741 stats->cs_low_rssi_cnt += 742 le32_to_cpu(tgt_stats->cserv_stats.cs_low_rssi_cnt); 743 stats->cs_connect_cnt += 744 le16_to_cpu(tgt_stats->cserv_stats.cs_connect_cnt); 745 stats->cs_discon_cnt += 746 le16_to_cpu(tgt_stats->cserv_stats.cs_discon_cnt); 747 748 stats->cs_ave_beacon_rssi = 749 a_sle16_to_cpu(tgt_stats->cserv_stats.cs_ave_beacon_rssi); 750 751 stats->cs_last_roam_msec = 752 tgt_stats->cserv_stats.cs_last_roam_msec; 753 stats->cs_snr = tgt_stats->cserv_stats.cs_snr; 754 stats->cs_rssi = a_sle16_to_cpu(tgt_stats->cserv_stats.cs_rssi); 755 756 stats->lq_val = le32_to_cpu(tgt_stats->lq_val); 757 758 stats->wow_pkt_dropped += 759 le32_to_cpu(tgt_stats->wow_stats.wow_pkt_dropped); 760 stats->wow_host_pkt_wakeups += 761 tgt_stats->wow_stats.wow_host_pkt_wakeups; 762 stats->wow_host_evt_wakeups += 763 tgt_stats->wow_stats.wow_host_evt_wakeups; 764 stats->wow_evt_discarded += 765 le16_to_cpu(tgt_stats->wow_stats.wow_evt_discarded); 766 767 if (test_bit(STATS_UPDATE_PEND, &vif->flags)) { 768 clear_bit(STATS_UPDATE_PEND, &vif->flags); 769 wake_up(&ar->event_wq); 770 } 771} 772 773static void ath6kl_add_le32(__le32 *var, __le32 val) 774{ 775 *var = cpu_to_le32(le32_to_cpu(*var) + le32_to_cpu(val)); 776} 777 778void ath6kl_tgt_stats_event(struct ath6kl_vif *vif, u8 *ptr, u32 len) 779{ 780 struct wmi_ap_mode_stat *p = (struct wmi_ap_mode_stat *) ptr; 781 struct ath6kl *ar = vif->ar; 782 struct wmi_ap_mode_stat *ap = &ar->ap_stats; 783 struct wmi_per_sta_stat *st_ap, *st_p; 784 u8 ac; 785 786 if (vif->nw_type == AP_NETWORK) { 787 if (len < sizeof(*p)) 788 return; 789 790 for (ac = 0; ac < AP_MAX_NUM_STA; ac++) { 791 st_ap = &ap->sta[ac]; 792 st_p = &p->sta[ac]; 793 794 ath6kl_add_le32(&st_ap->tx_bytes, st_p->tx_bytes); 795 ath6kl_add_le32(&st_ap->tx_pkts, st_p->tx_pkts); 796 ath6kl_add_le32(&st_ap->tx_error, st_p->tx_error); 797 ath6kl_add_le32(&st_ap->tx_discard, st_p->tx_discard); 798 ath6kl_add_le32(&st_ap->rx_bytes, st_p->rx_bytes); 799 ath6kl_add_le32(&st_ap->rx_pkts, st_p->rx_pkts); 800 ath6kl_add_le32(&st_ap->rx_error, st_p->rx_error); 801 ath6kl_add_le32(&st_ap->rx_discard, st_p->rx_discard); 802 } 803 804 } else { 805 ath6kl_update_target_stats(vif, ptr, len); 806 } 807} 808 809void ath6kl_wakeup_event(void *dev) 810{ 811 struct ath6kl *ar = (struct ath6kl *) dev; 812 813 wake_up(&ar->event_wq); 814} 815 816void ath6kl_txpwr_rx_evt(void *devt, u8 tx_pwr) 817{ 818 struct ath6kl *ar = (struct ath6kl *) devt; 819 820 ar->tx_pwr = tx_pwr; 821 wake_up(&ar->event_wq); 822} 823 824void ath6kl_pspoll_event(struct ath6kl_vif *vif, u8 aid) 825{ 826 struct ath6kl_sta *conn; 827 struct sk_buff *skb; 828 bool psq_empty = false; 829 struct ath6kl *ar = vif->ar; 830 831 conn = ath6kl_find_sta_by_aid(ar, aid); 832 833 if (!conn) 834 return; 835 /* 836 * Send out a packet queued on ps queue. When the ps queue 837 * becomes empty update the PVB for this station. 838 */ 839 spin_lock_bh(&conn->psq_lock); 840 psq_empty = skb_queue_empty(&conn->psq); 841 spin_unlock_bh(&conn->psq_lock); 842 843 if (psq_empty) 844 /* TODO: Send out a NULL data frame */ 845 return; 846 847 spin_lock_bh(&conn->psq_lock); 848 skb = skb_dequeue(&conn->psq); 849 spin_unlock_bh(&conn->psq_lock); 850 851 conn->sta_flags |= STA_PS_POLLED; 852 ath6kl_data_tx(skb, vif->ndev); 853 conn->sta_flags &= ~STA_PS_POLLED; 854 855 spin_lock_bh(&conn->psq_lock); 856 psq_empty = skb_queue_empty(&conn->psq); 857 spin_unlock_bh(&conn->psq_lock); 858 859 if (psq_empty) 860 ath6kl_wmi_set_pvb_cmd(ar->wmi, vif->fw_vif_idx, conn->aid, 0); 861} 862 863void ath6kl_dtimexpiry_event(struct ath6kl_vif *vif) 864{ 865 bool mcastq_empty = false; 866 struct sk_buff *skb; 867 struct ath6kl *ar = vif->ar; 868 869 /* 870 * If there are no associated STAs, ignore the DTIM expiry event. 871 * There can be potential race conditions where the last associated 872 * STA may disconnect & before the host could clear the 'Indicate 873 * DTIM' request to the firmware, the firmware would have just 874 * indicated a DTIM expiry event. The race is between 'clear DTIM 875 * expiry cmd' going from the host to the firmware & the DTIM 876 * expiry event happening from the firmware to the host. 877 */ 878 if (!ar->sta_list_index) 879 return; 880 881 spin_lock_bh(&ar->mcastpsq_lock); 882 mcastq_empty = skb_queue_empty(&ar->mcastpsq); 883 spin_unlock_bh(&ar->mcastpsq_lock); 884 885 if (mcastq_empty) 886 return; 887 888 /* set the STA flag to dtim_expired for the frame to go out */ 889 set_bit(DTIM_EXPIRED, &vif->flags); 890 891 spin_lock_bh(&ar->mcastpsq_lock); 892 while ((skb = skb_dequeue(&ar->mcastpsq)) != NULL) { 893 spin_unlock_bh(&ar->mcastpsq_lock); 894 895 ath6kl_data_tx(skb, vif->ndev); 896 897 spin_lock_bh(&ar->mcastpsq_lock); 898 } 899 spin_unlock_bh(&ar->mcastpsq_lock); 900 901 clear_bit(DTIM_EXPIRED, &vif->flags); 902 903 /* clear the LSB of the BitMapCtl field of the TIM IE */ 904 ath6kl_wmi_set_pvb_cmd(ar->wmi, vif->fw_vif_idx, MCAST_AID, 0); 905} 906 907void ath6kl_disconnect_event(struct ath6kl_vif *vif, u8 reason, u8 *bssid, 908 u8 assoc_resp_len, u8 *assoc_info, 909 u16 prot_reason_status) 910{ 911 struct ath6kl *ar = vif->ar; 912 913 if (vif->nw_type == AP_NETWORK) { 914 if (!ath6kl_remove_sta(ar, bssid, prot_reason_status)) 915 return; 916 917 /* if no more associated STAs, empty the mcast PS q */ 918 if (ar->sta_list_index == 0) { 919 spin_lock_bh(&ar->mcastpsq_lock); 920 skb_queue_purge(&ar->mcastpsq); 921 spin_unlock_bh(&ar->mcastpsq_lock); 922 923 /* clear the LSB of the TIM IE's BitMapCtl field */ 924 if (test_bit(WMI_READY, &ar->flag)) 925 ath6kl_wmi_set_pvb_cmd(ar->wmi, vif->fw_vif_idx, 926 MCAST_AID, 0); 927 } 928 929 if (!is_broadcast_ether_addr(bssid)) { 930 /* send event to application */ 931 cfg80211_del_sta(vif->ndev, bssid, GFP_KERNEL); 932 } 933 934 if (memcmp(vif->ndev->dev_addr, bssid, ETH_ALEN) == 0) { 935 memset(vif->wep_key_list, 0, sizeof(vif->wep_key_list)); 936 clear_bit(CONNECTED, &vif->flags); 937 } 938 return; 939 } 940 941 ath6kl_cfg80211_disconnect_event(vif, reason, bssid, 942 assoc_resp_len, assoc_info, 943 prot_reason_status); 944 945 aggr_reset_state(vif->aggr_cntxt); 946 947 del_timer(&vif->disconnect_timer); 948 949 ath6kl_dbg(ATH6KL_DBG_WLAN_CFG, "disconnect reason is %d\n", reason); 950 951 /* 952 * If the event is due to disconnect cmd from the host, only they 953 * the target would stop trying to connect. Under any other 954 * condition, target would keep trying to connect. 955 */ 956 if (reason == DISCONNECT_CMD) { 957 if (!ar->usr_bss_filter && test_bit(WMI_READY, &ar->flag)) 958 ath6kl_wmi_bssfilter_cmd(ar->wmi, vif->fw_vif_idx, 959 NONE_BSS_FILTER, 0); 960 } else { 961 set_bit(CONNECT_PEND, &vif->flags); 962 if (((reason == ASSOC_FAILED) && 963 (prot_reason_status == 0x11)) || 964 ((reason == ASSOC_FAILED) && (prot_reason_status == 0x0) 965 && (vif->reconnect_flag == 1))) { 966 set_bit(CONNECTED, &vif->flags); 967 return; 968 } 969 } 970 971 /* update connect & link status atomically */ 972 spin_lock_bh(&vif->if_lock); 973 clear_bit(CONNECTED, &vif->flags); 974 netif_carrier_off(vif->ndev); 975 spin_unlock_bh(&vif->if_lock); 976 977 if ((reason != CSERV_DISCONNECT) || (vif->reconnect_flag != 1)) 978 vif->reconnect_flag = 0; 979 980 if (reason != CSERV_DISCONNECT) 981 ar->user_key_ctrl = 0; 982 983 netif_stop_queue(vif->ndev); 984 memset(vif->bssid, 0, sizeof(vif->bssid)); 985 vif->bss_ch = 0; 986 987 ath6kl_tx_data_cleanup(ar); 988} 989 990struct ath6kl_vif *ath6kl_vif_first(struct ath6kl *ar) 991{ 992 struct ath6kl_vif *vif; 993 994 spin_lock_bh(&ar->list_lock); 995 if (list_empty(&ar->vif_list)) { 996 spin_unlock_bh(&ar->list_lock); 997 return NULL; 998 } 999 1000 vif = list_first_entry(&ar->vif_list, struct ath6kl_vif, list); 1001 1002 spin_unlock_bh(&ar->list_lock); 1003 1004 return vif; 1005} 1006 1007static int ath6kl_open(struct net_device *dev) 1008{ 1009 struct ath6kl_vif *vif = netdev_priv(dev); 1010 1011 set_bit(WLAN_ENABLED, &vif->flags); 1012 1013 if (test_bit(CONNECTED, &vif->flags)) { 1014 netif_carrier_on(dev); 1015 netif_wake_queue(dev); 1016 } else 1017 netif_carrier_off(dev); 1018 1019 return 0; 1020} 1021 1022static int ath6kl_close(struct net_device *dev) 1023{ 1024 struct ath6kl *ar = ath6kl_priv(dev); 1025 struct ath6kl_vif *vif = netdev_priv(dev); 1026 1027 netif_stop_queue(dev); 1028 1029 ath6kl_disconnect(vif); 1030 1031 if (test_bit(WMI_READY, &ar->flag)) { 1032 if (ath6kl_wmi_scanparams_cmd(ar->wmi, vif->fw_vif_idx, 0xFFFF, 1033 0, 0, 0, 0, 0, 0, 0, 0, 0)) 1034 return -EIO; 1035 1036 } 1037 1038 ath6kl_cfg80211_scan_complete_event(vif, true); 1039 1040 clear_bit(WLAN_ENABLED, &vif->flags); 1041 1042 return 0; 1043} 1044 1045static struct net_device_stats *ath6kl_get_stats(struct net_device *dev) 1046{ 1047 struct ath6kl_vif *vif = netdev_priv(dev); 1048 1049 return &vif->net_stats; 1050} 1051 1052static struct net_device_ops ath6kl_netdev_ops = { 1053 .ndo_open = ath6kl_open, 1054 .ndo_stop = ath6kl_close, 1055 .ndo_start_xmit = ath6kl_data_tx, 1056 .ndo_get_stats = ath6kl_get_stats, 1057}; 1058 1059void init_netdev(struct net_device *dev) 1060{ 1061 dev->netdev_ops = &ath6kl_netdev_ops; 1062 dev->destructor = free_netdev; 1063 dev->watchdog_timeo = ATH6KL_TX_TIMEOUT; 1064 1065 dev->needed_headroom = ETH_HLEN; 1066 dev->needed_headroom += sizeof(struct ath6kl_llc_snap_hdr) + 1067 sizeof(struct wmi_data_hdr) + HTC_HDR_LENGTH 1068 + WMI_MAX_TX_META_SZ + ATH6KL_HTC_ALIGN_BYTES; 1069 1070 return; 1071} 1072