2 * Marvell Wireless LAN device driver: scan ioctl and command handling
4 * Copyright (C) 2011, Marvell International Ltd.
6 * This software file (the "File") is distributed by Marvell International
7 * Ltd. under the terms of the GNU General Public License Version 2, June 1991
8 * (the "License"). You may use, redistribute and/or modify this File in
9 * accordance with the terms and conditions of the License, a copy of which
10 * is available by writing to the Free Software Foundation, Inc.,
11 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA or on the
12 * worldwide web at http://www.gnu.org/licenses/old-licenses/gpl-2.0.txt.
14 * THE FILE IS DISTRIBUTED AS-IS, WITHOUT WARRANTY OF ANY KIND, AND THE
15 * IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE
16 * ARE EXPRESSLY DISCLAIMED. The License provides additional details about
17 * this warranty disclaimer.
28 /* The maximum number of channels the firmware can scan per command */
29 #define MWIFIEX_MAX_CHANNELS_PER_SPECIFIC_SCAN 14
31 #define MWIFIEX_DEF_CHANNELS_PER_SCAN_CMD 4
32 #define MWIFIEX_LIMIT_1_CHANNEL_PER_SCAN_CMD 15
33 #define MWIFIEX_LIMIT_2_CHANNELS_PER_SCAN_CMD 27
34 #define MWIFIEX_LIMIT_3_CHANNELS_PER_SCAN_CMD 35
36 /* Memory needed to store a max sized Channel List TLV for a firmware scan */
37 #define CHAN_TLV_MAX_SIZE (sizeof(struct mwifiex_ie_types_header) \
38 + (MWIFIEX_MAX_CHANNELS_PER_SPECIFIC_SCAN \
39 *sizeof(struct mwifiex_chan_scan_param_set)))
41 /* Memory needed to store supported rate */
42 #define RATE_TLV_MAX_SIZE (sizeof(struct mwifiex_ie_types_rates_param_set) \
43 + HOSTCMD_SUPPORTED_RATES)
45 /* Memory needed to store a max number/size WildCard SSID TLV for a firmware
47 #define WILDCARD_SSID_TLV_MAX_SIZE \
48 (MWIFIEX_MAX_SSID_LIST_LENGTH * \
49 (sizeof(struct mwifiex_ie_types_wildcard_ssid_params) \
50 + IEEE80211_MAX_SSID_LEN))
52 /* Maximum memory needed for a mwifiex_scan_cmd_config with all TLVs at max */
53 #define MAX_SCAN_CFG_ALLOC (sizeof(struct mwifiex_scan_cmd_config) \
54 + sizeof(struct mwifiex_ie_types_num_probes) \
55 + sizeof(struct mwifiex_ie_types_htcap) \
58 + WILDCARD_SSID_TLV_MAX_SIZE)
61 union mwifiex_scan_cmd_config_tlv {
62 /* Scan configuration (variable length) */
63 struct mwifiex_scan_cmd_config config;
64 /* Max allocated block */
65 u8 config_alloc_buf[MAX_SCAN_CFG_ALLOC];
73 static u8 mwifiex_wpa_oui[CIPHER_SUITE_MAX][4] = {
74 { 0x00, 0x50, 0xf2, 0x02 }, /* TKIP */
75 { 0x00, 0x50, 0xf2, 0x04 }, /* AES */
77 static u8 mwifiex_rsn_oui[CIPHER_SUITE_MAX][4] = {
78 { 0x00, 0x0f, 0xac, 0x02 }, /* TKIP */
79 { 0x00, 0x0f, 0xac, 0x04 }, /* AES */
83 * This function parses a given IE for a given OUI.
85 * This is used to parse a WPA/RSN IE to find if it has
89 mwifiex_search_oui_in_ie(struct ie_body *iebody, u8 *oui)
93 count = iebody->ptk_cnt[0];
95 /* There could be multiple OUIs for PTK hence
97 2) Check all the OUIs for AES.
98 3) If one of them is AES then pass success. */
100 if (!memcmp(iebody->ptk_body, oui, sizeof(iebody->ptk_body)))
101 return MWIFIEX_OUI_PRESENT;
105 iebody = (struct ie_body *) ((u8 *) iebody +
106 sizeof(iebody->ptk_body));
109 pr_debug("info: %s: OUI is not found in PTK\n", __func__);
110 return MWIFIEX_OUI_NOT_PRESENT;
114 * This function checks if a given OUI is present in a RSN IE.
116 * The function first checks if a RSN IE is present or not in the
117 * BSS descriptor. It tries to locate the OUI only if such an IE is
121 mwifiex_is_rsn_oui_present(struct mwifiex_bssdescriptor *bss_desc, u32 cipher)
124 struct ie_body *iebody;
125 u8 ret = MWIFIEX_OUI_NOT_PRESENT;
127 if (((bss_desc->bcn_rsn_ie) && ((*(bss_desc->bcn_rsn_ie)).
128 ieee_hdr.element_id == WLAN_EID_RSN))) {
129 iebody = (struct ie_body *)
130 (((u8 *) bss_desc->bcn_rsn_ie->data) +
132 oui = &mwifiex_rsn_oui[cipher][0];
133 ret = mwifiex_search_oui_in_ie(iebody, oui);
141 * This function checks if a given OUI is present in a WPA IE.
143 * The function first checks if a WPA IE is present or not in the
144 * BSS descriptor. It tries to locate the OUI only if such an IE is
148 mwifiex_is_wpa_oui_present(struct mwifiex_bssdescriptor *bss_desc, u32 cipher)
151 struct ie_body *iebody;
152 u8 ret = MWIFIEX_OUI_NOT_PRESENT;
154 if (((bss_desc->bcn_wpa_ie) &&
155 ((*(bss_desc->bcn_wpa_ie)).vend_hdr.element_id ==
156 WLAN_EID_VENDOR_SPECIFIC))) {
157 iebody = (struct ie_body *) bss_desc->bcn_wpa_ie->data;
158 oui = &mwifiex_wpa_oui[cipher][0];
159 ret = mwifiex_search_oui_in_ie(iebody, oui);
167 * This function compares two SSIDs and checks if they match.
170 mwifiex_ssid_cmp(struct cfg80211_ssid *ssid1, struct cfg80211_ssid *ssid2)
172 if (!ssid1 || !ssid2 || (ssid1->ssid_len != ssid2->ssid_len))
174 return memcmp(ssid1->ssid, ssid2->ssid, ssid1->ssid_len);
178 * This function checks if wapi is enabled in driver and scanned network is
179 * compatible with it.
182 mwifiex_is_bss_wapi(struct mwifiex_private *priv,
183 struct mwifiex_bssdescriptor *bss_desc)
185 if (priv->sec_info.wapi_enabled &&
186 (bss_desc->bcn_wapi_ie &&
187 ((*(bss_desc->bcn_wapi_ie)).ieee_hdr.element_id ==
188 WLAN_EID_BSS_AC_ACCESS_DELAY))) {
195 * This function checks if driver is configured with no security mode and
196 * scanned network is compatible with it.
199 mwifiex_is_bss_no_sec(struct mwifiex_private *priv,
200 struct mwifiex_bssdescriptor *bss_desc)
202 if (!priv->sec_info.wep_enabled && !priv->sec_info.wpa_enabled &&
203 !priv->sec_info.wpa2_enabled && ((!bss_desc->bcn_wpa_ie) ||
204 ((*(bss_desc->bcn_wpa_ie)).vend_hdr.element_id !=
205 WLAN_EID_VENDOR_SPECIFIC)) &&
206 ((!bss_desc->bcn_rsn_ie) ||
207 ((*(bss_desc->bcn_rsn_ie)).ieee_hdr.element_id !=
209 !priv->sec_info.encryption_mode && !bss_desc->privacy) {
216 * This function checks if static WEP is enabled in driver and scanned network
217 * is compatible with it.
220 mwifiex_is_bss_static_wep(struct mwifiex_private *priv,
221 struct mwifiex_bssdescriptor *bss_desc)
223 if (priv->sec_info.wep_enabled && !priv->sec_info.wpa_enabled &&
224 !priv->sec_info.wpa2_enabled && bss_desc->privacy) {
231 * This function checks if wpa is enabled in driver and scanned network is
232 * compatible with it.
235 mwifiex_is_bss_wpa(struct mwifiex_private *priv,
236 struct mwifiex_bssdescriptor *bss_desc)
238 if (!priv->sec_info.wep_enabled && priv->sec_info.wpa_enabled &&
239 !priv->sec_info.wpa2_enabled && ((bss_desc->bcn_wpa_ie) &&
240 ((*(bss_desc->bcn_wpa_ie)).
241 vend_hdr.element_id == WLAN_EID_VENDOR_SPECIFIC))
243 * Privacy bit may NOT be set in some APs like
244 * LinkSys WRT54G && bss_desc->privacy
247 dev_dbg(priv->adapter->dev, "info: %s: WPA:"
248 " wpa_ie=%#x wpa2_ie=%#x WEP=%s WPA=%s WPA2=%s "
249 "EncMode=%#x privacy=%#x\n", __func__,
250 (bss_desc->bcn_wpa_ie) ?
251 (*(bss_desc->bcn_wpa_ie)).
252 vend_hdr.element_id : 0,
253 (bss_desc->bcn_rsn_ie) ?
254 (*(bss_desc->bcn_rsn_ie)).
255 ieee_hdr.element_id : 0,
256 (priv->sec_info.wep_enabled) ? "e" : "d",
257 (priv->sec_info.wpa_enabled) ? "e" : "d",
258 (priv->sec_info.wpa2_enabled) ? "e" : "d",
259 priv->sec_info.encryption_mode,
267 * This function checks if wpa2 is enabled in driver and scanned network is
268 * compatible with it.
271 mwifiex_is_bss_wpa2(struct mwifiex_private *priv,
272 struct mwifiex_bssdescriptor *bss_desc)
274 if (!priv->sec_info.wep_enabled &&
275 !priv->sec_info.wpa_enabled &&
276 priv->sec_info.wpa2_enabled &&
277 ((bss_desc->bcn_rsn_ie) &&
278 ((*(bss_desc->bcn_rsn_ie)).ieee_hdr.element_id == WLAN_EID_RSN))) {
280 * Privacy bit may NOT be set in some APs like
281 * LinkSys WRT54G && bss_desc->privacy
283 dev_dbg(priv->adapter->dev, "info: %s: WPA2: "
284 " wpa_ie=%#x wpa2_ie=%#x WEP=%s WPA=%s WPA2=%s "
285 "EncMode=%#x privacy=%#x\n", __func__,
286 (bss_desc->bcn_wpa_ie) ?
287 (*(bss_desc->bcn_wpa_ie)).
288 vend_hdr.element_id : 0,
289 (bss_desc->bcn_rsn_ie) ?
290 (*(bss_desc->bcn_rsn_ie)).
291 ieee_hdr.element_id : 0,
292 (priv->sec_info.wep_enabled) ? "e" : "d",
293 (priv->sec_info.wpa_enabled) ? "e" : "d",
294 (priv->sec_info.wpa2_enabled) ? "e" : "d",
295 priv->sec_info.encryption_mode,
303 * This function checks if adhoc AES is enabled in driver and scanned network is
304 * compatible with it.
307 mwifiex_is_bss_adhoc_aes(struct mwifiex_private *priv,
308 struct mwifiex_bssdescriptor *bss_desc)
310 if (!priv->sec_info.wep_enabled && !priv->sec_info.wpa_enabled &&
311 !priv->sec_info.wpa2_enabled &&
312 ((!bss_desc->bcn_wpa_ie) ||
313 ((*(bss_desc->bcn_wpa_ie)).
314 vend_hdr.element_id != WLAN_EID_VENDOR_SPECIFIC)) &&
315 ((!bss_desc->bcn_rsn_ie) ||
316 ((*(bss_desc->bcn_rsn_ie)).ieee_hdr.element_id != WLAN_EID_RSN)) &&
317 !priv->sec_info.encryption_mode && bss_desc->privacy) {
324 * This function checks if dynamic WEP is enabled in driver and scanned network
325 * is compatible with it.
328 mwifiex_is_bss_dynamic_wep(struct mwifiex_private *priv,
329 struct mwifiex_bssdescriptor *bss_desc)
331 if (!priv->sec_info.wep_enabled && !priv->sec_info.wpa_enabled &&
332 !priv->sec_info.wpa2_enabled &&
333 ((!bss_desc->bcn_wpa_ie) ||
334 ((*(bss_desc->bcn_wpa_ie)).
335 vend_hdr.element_id != WLAN_EID_VENDOR_SPECIFIC)) &&
336 ((!bss_desc->bcn_rsn_ie) ||
337 ((*(bss_desc->bcn_rsn_ie)).ieee_hdr.element_id != WLAN_EID_RSN)) &&
338 priv->sec_info.encryption_mode && bss_desc->privacy) {
339 dev_dbg(priv->adapter->dev, "info: %s: dynamic "
340 "WEP: wpa_ie=%#x wpa2_ie=%#x "
341 "EncMode=%#x privacy=%#x\n",
343 (bss_desc->bcn_wpa_ie) ?
344 (*(bss_desc->bcn_wpa_ie)).
345 vend_hdr.element_id : 0,
346 (bss_desc->bcn_rsn_ie) ?
347 (*(bss_desc->bcn_rsn_ie)).
348 ieee_hdr.element_id : 0,
349 priv->sec_info.encryption_mode,
357 * This function checks if a scanned network is compatible with the driver
360 * WEP WPA WPA2 ad-hoc encrypt Network
361 * enabled enabled enabled AES mode Privacy WPA WPA2 Compatible
362 * 0 0 0 0 NONE 0 0 0 yes No security
363 * 0 1 0 0 x 1x 1 x yes WPA (disable
365 * 0 0 1 0 x 1x x 1 yes WPA2 (disable
367 * 0 0 0 1 NONE 1 0 0 yes Ad-hoc AES
368 * 1 0 0 0 NONE 1 0 0 yes Static WEP
370 * 0 0 0 0 !=NONE 1 0 0 yes Dynamic WEP
372 * Compatibility is not matched while roaming, except for mode.
375 mwifiex_is_network_compatible(struct mwifiex_private *priv,
376 struct mwifiex_bssdescriptor *bss_desc, u32 mode)
378 struct mwifiex_adapter *adapter = priv->adapter;
380 bss_desc->disable_11n = false;
382 /* Don't check for compatibility if roaming */
383 if (priv->media_connected &&
384 (priv->bss_mode == NL80211_IFTYPE_STATION) &&
385 (bss_desc->bss_mode == NL80211_IFTYPE_STATION))
388 if (priv->wps.session_enable) {
389 dev_dbg(adapter->dev,
390 "info: return success directly in WPS period\n");
394 if (bss_desc->chan_sw_ie_present) {
395 dev_err(adapter->dev,
396 "Don't connect to AP with WLAN_EID_CHANNEL_SWITCH\n");
400 if (mwifiex_is_bss_wapi(priv, bss_desc)) {
401 dev_dbg(adapter->dev, "info: return success for WAPI AP\n");
405 if (bss_desc->bss_mode == mode) {
406 if (mwifiex_is_bss_no_sec(priv, bss_desc)) {
409 } else if (mwifiex_is_bss_static_wep(priv, bss_desc)) {
410 /* Static WEP enabled */
411 dev_dbg(adapter->dev, "info: Disable 11n in WEP mode.\n");
412 bss_desc->disable_11n = true;
414 } else if (mwifiex_is_bss_wpa(priv, bss_desc)) {
416 if (((priv->adapter->config_bands & BAND_GN ||
417 priv->adapter->config_bands & BAND_AN) &&
418 bss_desc->bcn_ht_cap) &&
419 !mwifiex_is_wpa_oui_present(bss_desc,
420 CIPHER_SUITE_CCMP)) {
422 if (mwifiex_is_wpa_oui_present
423 (bss_desc, CIPHER_SUITE_TKIP)) {
424 dev_dbg(adapter->dev,
425 "info: Disable 11n if AES "
426 "is not supported by AP\n");
427 bss_desc->disable_11n = true;
433 } else if (mwifiex_is_bss_wpa2(priv, bss_desc)) {
435 if (((priv->adapter->config_bands & BAND_GN ||
436 priv->adapter->config_bands & BAND_AN) &&
437 bss_desc->bcn_ht_cap) &&
438 !mwifiex_is_rsn_oui_present(bss_desc,
439 CIPHER_SUITE_CCMP)) {
441 if (mwifiex_is_rsn_oui_present
442 (bss_desc, CIPHER_SUITE_TKIP)) {
443 dev_dbg(adapter->dev,
444 "info: Disable 11n if AES "
445 "is not supported by AP\n");
446 bss_desc->disable_11n = true;
452 } else if (mwifiex_is_bss_adhoc_aes(priv, bss_desc)) {
453 /* Ad-hoc AES enabled */
455 } else if (mwifiex_is_bss_dynamic_wep(priv, bss_desc)) {
456 /* Dynamic WEP enabled */
460 /* Security doesn't match */
461 dev_dbg(adapter->dev,
462 "info: %s: failed: wpa_ie=%#x wpa2_ie=%#x WEP=%s "
463 "WPA=%s WPA2=%s EncMode=%#x privacy=%#x\n", __func__,
464 (bss_desc->bcn_wpa_ie) ?
465 (*(bss_desc->bcn_wpa_ie)).vend_hdr.element_id : 0,
466 (bss_desc->bcn_rsn_ie) ?
467 (*(bss_desc->bcn_rsn_ie)).ieee_hdr.element_id : 0,
468 (priv->sec_info.wep_enabled) ? "e" : "d",
469 (priv->sec_info.wpa_enabled) ? "e" : "d",
470 (priv->sec_info.wpa2_enabled) ? "e" : "d",
471 priv->sec_info.encryption_mode, bss_desc->privacy);
475 /* Mode doesn't match */
480 * This function creates a channel list for the driver to scan, based
481 * on region/band information.
483 * This routine is used for any scan that is not provided with a
484 * specific channel list to scan.
487 mwifiex_scan_create_channel_list(struct mwifiex_private *priv,
488 const struct mwifiex_user_scan_cfg
490 struct mwifiex_chan_scan_param_set
494 enum ieee80211_band band;
495 struct ieee80211_supported_band *sband;
496 struct ieee80211_channel *ch;
497 struct mwifiex_adapter *adapter = priv->adapter;
500 for (band = 0; (band < IEEE80211_NUM_BANDS) ; band++) {
502 if (!priv->wdev->wiphy->bands[band])
505 sband = priv->wdev->wiphy->bands[band];
507 for (i = 0; (i < sband->n_channels) ; i++) {
508 ch = &sband->channels[i];
509 if (ch->flags & IEEE80211_CHAN_DISABLED)
511 scan_chan_list[chan_idx].radio_type = band;
514 user_scan_in->chan_list[0].scan_time)
515 scan_chan_list[chan_idx].max_scan_time =
516 cpu_to_le16((u16) user_scan_in->
517 chan_list[0].scan_time);
518 else if (ch->flags & IEEE80211_CHAN_PASSIVE_SCAN)
519 scan_chan_list[chan_idx].max_scan_time =
520 cpu_to_le16(adapter->passive_scan_time);
522 scan_chan_list[chan_idx].max_scan_time =
523 cpu_to_le16(adapter->active_scan_time);
525 if (ch->flags & IEEE80211_CHAN_PASSIVE_SCAN)
526 scan_chan_list[chan_idx].chan_scan_mode_bitmap
527 |= MWIFIEX_PASSIVE_SCAN;
529 scan_chan_list[chan_idx].chan_scan_mode_bitmap
530 &= ~MWIFIEX_PASSIVE_SCAN;
531 scan_chan_list[chan_idx].chan_number =
534 scan_chan_list[chan_idx].max_scan_time =
535 cpu_to_le16(adapter->specific_scan_time);
536 scan_chan_list[chan_idx].chan_scan_mode_bitmap
537 |= MWIFIEX_DISABLE_CHAN_FILT;
547 * This function constructs and sends multiple scan config commands to
550 * Previous routines in the code flow have created a scan command configuration
551 * with any requested TLVs. This function splits the channel TLV into maximum
552 * channels supported per scan lists and sends the portion of the channel TLV,
553 * along with the other TLVs, to the firmware.
556 mwifiex_scan_channel_list(struct mwifiex_private *priv,
557 u32 max_chan_per_scan, u8 filtered_scan,
558 struct mwifiex_scan_cmd_config *scan_cfg_out,
559 struct mwifiex_ie_types_chan_list_param_set
561 struct mwifiex_chan_scan_param_set *scan_chan_list)
564 struct mwifiex_chan_scan_param_set *tmp_chan_list;
565 struct mwifiex_chan_scan_param_set *start_chan;
571 if (!scan_cfg_out || !chan_tlv_out || !scan_chan_list) {
572 dev_dbg(priv->adapter->dev,
573 "info: Scan: Null detect: %p, %p, %p\n",
574 scan_cfg_out, chan_tlv_out, scan_chan_list);
578 chan_tlv_out->header.type = cpu_to_le16(TLV_TYPE_CHANLIST);
580 /* Set the temp channel struct pointer to the start of the desired
582 tmp_chan_list = scan_chan_list;
584 /* Loop through the desired channel list, sending a new firmware scan
585 commands for each max_chan_per_scan channels (or for 1,6,11
586 individually if configured accordingly) */
587 while (tmp_chan_list->chan_number) {
591 chan_tlv_out->header.len = 0;
592 start_chan = tmp_chan_list;
596 * Construct the Channel TLV for the scan command. Continue to
597 * insert channel TLVs until:
598 * - the tlv_idx hits the maximum configured per scan command
599 * - the next channel to insert is 0 (end of desired channel
601 * - done_early is set (controlling individual scanning of
604 while (tlv_idx < max_chan_per_scan &&
605 tmp_chan_list->chan_number && !done_early) {
607 dev_dbg(priv->adapter->dev,
608 "info: Scan: Chan(%3d), Radio(%d),"
609 " Mode(%d, %d), Dur(%d)\n",
610 tmp_chan_list->chan_number,
611 tmp_chan_list->radio_type,
612 tmp_chan_list->chan_scan_mode_bitmap
613 & MWIFIEX_PASSIVE_SCAN,
614 (tmp_chan_list->chan_scan_mode_bitmap
615 & MWIFIEX_DISABLE_CHAN_FILT) >> 1,
616 le16_to_cpu(tmp_chan_list->max_scan_time));
618 /* Copy the current channel TLV to the command being
620 memcpy(chan_tlv_out->chan_scan_param + tlv_idx,
622 sizeof(chan_tlv_out->chan_scan_param));
624 /* Increment the TLV header length by the size
626 le16_add_cpu(&chan_tlv_out->header.len,
627 sizeof(chan_tlv_out->chan_scan_param));
630 * The tlv buffer length is set to the number of bytes
631 * of the between the channel tlv pointer and the start
632 * of the tlv buffer. This compensates for any TLVs
633 * that were appended before the channel list.
635 scan_cfg_out->tlv_buf_len = (u32) ((u8 *) chan_tlv_out -
636 scan_cfg_out->tlv_buf);
638 /* Add the size of the channel tlv header and the data
640 scan_cfg_out->tlv_buf_len +=
641 (sizeof(chan_tlv_out->header)
642 + le16_to_cpu(chan_tlv_out->header.len));
644 /* Increment the index to the channel tlv we are
648 /* Count the total scan time per command */
650 le16_to_cpu(tmp_chan_list->max_scan_time);
654 /* Stop the loop if the *current* channel is in the
655 1,6,11 set and we are not filtering on a BSSID
657 if (!filtered_scan &&
658 (tmp_chan_list->chan_number == 1 ||
659 tmp_chan_list->chan_number == 6 ||
660 tmp_chan_list->chan_number == 11))
663 /* Increment the tmp pointer to the next channel to
667 /* Stop the loop if the *next* channel is in the 1,6,11
668 set. This will cause it to be the only channel
669 scanned on the next interation */
670 if (!filtered_scan &&
671 (tmp_chan_list->chan_number == 1 ||
672 tmp_chan_list->chan_number == 6 ||
673 tmp_chan_list->chan_number == 11))
677 /* The total scan time should be less than scan command timeout
679 if (total_scan_time > MWIFIEX_MAX_TOTAL_SCAN_TIME) {
680 dev_err(priv->adapter->dev, "total scan time %dms"
681 " is over limit (%dms), scan skipped\n",
682 total_scan_time, MWIFIEX_MAX_TOTAL_SCAN_TIME);
687 priv->adapter->scan_channels = start_chan;
689 /* Send the scan command to the firmware with the specified
691 ret = mwifiex_send_cmd_async(priv, HostCmd_CMD_802_11_SCAN,
692 HostCmd_ACT_GEN_SET, 0,
705 * This function constructs a scan command configuration structure to use
708 * Application layer or other functions can invoke network scanning
709 * with a scan configuration supplied in a user scan configuration structure.
710 * This structure is used as the basis of one or many scan command configuration
711 * commands that are sent to the command processing module and eventually to the
714 * This function creates a scan command configuration structure based on the
715 * following user supplied parameters (if present):
718 * - Number of Probes to be sent
721 * If the SSID or BSSID filter is not present, the filter is disabled/cleared.
722 * If the number of probes is not set, adapter default setting is used.
725 mwifiex_config_scan(struct mwifiex_private *priv,
726 const struct mwifiex_user_scan_cfg *user_scan_in,
727 struct mwifiex_scan_cmd_config *scan_cfg_out,
728 struct mwifiex_ie_types_chan_list_param_set **chan_list_out,
729 struct mwifiex_chan_scan_param_set *scan_chan_list,
730 u8 *max_chan_per_scan, u8 *filtered_scan,
731 u8 *scan_current_only)
733 struct mwifiex_adapter *adapter = priv->adapter;
734 struct mwifiex_ie_types_num_probes *num_probes_tlv;
735 struct mwifiex_ie_types_wildcard_ssid_params *wildcard_ssid_tlv;
736 struct mwifiex_ie_types_rates_param_set *rates_tlv;
748 u8 rates[MWIFIEX_SUPPORTED_RATES];
750 struct mwifiex_ie_types_htcap *ht_cap;
752 /* The tlv_buf_len is calculated for each scan command. The TLVs added
753 in this routine will be preserved since the routine that sends the
754 command will append channelTLVs at *chan_list_out. The difference
755 between the *chan_list_out and the tlv_buf start will be used to
756 calculate the size of anything we add in this routine. */
757 scan_cfg_out->tlv_buf_len = 0;
759 /* Running tlv pointer. Assigned to chan_list_out at end of function
760 so later routines know where channels can be added to the command
762 tlv_pos = scan_cfg_out->tlv_buf;
764 /* Initialize the scan as un-filtered; the flag is later set to TRUE
765 below if a SSID or BSSID filter is sent in the command */
766 *filtered_scan = false;
768 /* Initialize the scan as not being only on the current channel. If
769 the channel list is customized, only contains one channel, and is
770 the active channel, this is set true and data flow is not halted. */
771 *scan_current_only = false;
775 /* Default the ssid_filter flag to TRUE, set false under
776 certain wildcard conditions and qualified by the existence
777 of an SSID list before marking the scan as filtered */
780 /* Set the BSS type scan filter, use Adapter setting if
782 scan_cfg_out->bss_mode =
783 (user_scan_in->bss_mode ? (u8) user_scan_in->
784 bss_mode : (u8) adapter->scan_mode);
786 /* Set the number of probes to send, use Adapter setting
789 (user_scan_in->num_probes ? user_scan_in->
790 num_probes : adapter->scan_probes);
793 * Set the BSSID filter to the incoming configuration,
794 * if non-zero. If not set, it will remain disabled
797 memcpy(scan_cfg_out->specific_bssid,
798 user_scan_in->specific_bssid,
799 sizeof(scan_cfg_out->specific_bssid));
801 for (i = 0; i < user_scan_in->num_ssids; i++) {
802 ssid_len = user_scan_in->ssid_list[i].ssid_len;
805 (struct mwifiex_ie_types_wildcard_ssid_params *)
807 wildcard_ssid_tlv->header.type =
808 cpu_to_le16(TLV_TYPE_WILDCARDSSID);
809 wildcard_ssid_tlv->header.len = cpu_to_le16(
810 (u16) (ssid_len + sizeof(wildcard_ssid_tlv->
814 * max_ssid_length = 0 tells firmware to perform
815 * specific scan for the SSID filled, whereas
816 * max_ssid_length = IEEE80211_MAX_SSID_LEN is for
820 wildcard_ssid_tlv->max_ssid_length = 0;
822 wildcard_ssid_tlv->max_ssid_length =
823 IEEE80211_MAX_SSID_LEN;
825 memcpy(wildcard_ssid_tlv->ssid,
826 user_scan_in->ssid_list[i].ssid, ssid_len);
828 tlv_pos += (sizeof(wildcard_ssid_tlv->header)
829 + le16_to_cpu(wildcard_ssid_tlv->header.len));
831 dev_dbg(adapter->dev, "info: scan: ssid[%d]: %s, %d\n",
832 i, wildcard_ssid_tlv->ssid,
833 wildcard_ssid_tlv->max_ssid_length);
835 /* Empty wildcard ssid with a maxlen will match many or
836 potentially all SSIDs (maxlen == 32), therefore do
837 not treat the scan as
839 if (!ssid_len && wildcard_ssid_tlv->max_ssid_length)
844 * The default number of channels sent in the command is low to
845 * ensure the response buffer from the firmware does not
846 * truncate scan results. That is not an issue with an SSID
847 * or BSSID filter applied to the scan results in the firmware.
849 if ((i && ssid_filter) ||
850 !is_zero_ether_addr(scan_cfg_out->specific_bssid))
851 *filtered_scan = true;
853 scan_cfg_out->bss_mode = (u8) adapter->scan_mode;
854 num_probes = adapter->scan_probes;
858 * If a specific BSSID or SSID is used, the number of channels in the
859 * scan command will be increased to the absolute maximum.
862 *max_chan_per_scan = MWIFIEX_MAX_CHANNELS_PER_SPECIFIC_SCAN;
864 *max_chan_per_scan = MWIFIEX_DEF_CHANNELS_PER_SCAN_CMD;
866 /* If the input config or adapter has the number of Probes set,
870 dev_dbg(adapter->dev, "info: scan: num_probes = %d\n",
873 num_probes_tlv = (struct mwifiex_ie_types_num_probes *) tlv_pos;
874 num_probes_tlv->header.type = cpu_to_le16(TLV_TYPE_NUMPROBES);
875 num_probes_tlv->header.len =
876 cpu_to_le16(sizeof(num_probes_tlv->num_probes));
877 num_probes_tlv->num_probes = cpu_to_le16((u16) num_probes);
879 tlv_pos += sizeof(num_probes_tlv->header) +
880 le16_to_cpu(num_probes_tlv->header.len);
884 /* Append rates tlv */
885 memset(rates, 0, sizeof(rates));
887 rates_size = mwifiex_get_supported_rates(priv, rates);
889 rates_tlv = (struct mwifiex_ie_types_rates_param_set *) tlv_pos;
890 rates_tlv->header.type = cpu_to_le16(WLAN_EID_SUPP_RATES);
891 rates_tlv->header.len = cpu_to_le16((u16) rates_size);
892 memcpy(rates_tlv->rates, rates, rates_size);
893 tlv_pos += sizeof(rates_tlv->header) + rates_size;
895 dev_dbg(adapter->dev, "info: SCAN_CMD: Rates size = %d\n", rates_size);
897 if (ISSUPP_11NENABLED(priv->adapter->fw_cap_info) &&
898 (priv->adapter->config_bands & BAND_GN ||
899 priv->adapter->config_bands & BAND_AN)) {
900 ht_cap = (struct mwifiex_ie_types_htcap *) tlv_pos;
901 memset(ht_cap, 0, sizeof(struct mwifiex_ie_types_htcap));
902 ht_cap->header.type = cpu_to_le16(WLAN_EID_HT_CAPABILITY);
904 cpu_to_le16(sizeof(struct ieee80211_ht_cap));
906 mwifiex_band_to_radio_type(priv->adapter->config_bands);
907 mwifiex_fill_cap_info(priv, radio_type, ht_cap);
908 tlv_pos += sizeof(struct mwifiex_ie_types_htcap);
911 /* Append vendor specific IE TLV */
912 mwifiex_cmd_append_vsie_tlv(priv, MWIFIEX_VSIE_MASK_SCAN, &tlv_pos);
915 * Set the output for the channel TLV to the address in the tlv buffer
916 * past any TLVs that were added in this function (SSID, num_probes).
917 * Channel TLVs will be added past this for each scan command,
918 * preserving the TLVs that were previously added.
921 (struct mwifiex_ie_types_chan_list_param_set *) tlv_pos;
923 if (user_scan_in && user_scan_in->chan_list[0].chan_number) {
925 dev_dbg(adapter->dev, "info: Scan: Using supplied channel list\n");
928 chan_idx < MWIFIEX_USER_SCAN_CHAN_MAX &&
929 user_scan_in->chan_list[chan_idx].chan_number;
932 channel = user_scan_in->chan_list[chan_idx].chan_number;
933 (scan_chan_list + chan_idx)->chan_number = channel;
936 user_scan_in->chan_list[chan_idx].radio_type;
937 (scan_chan_list + chan_idx)->radio_type = radio_type;
939 scan_type = user_scan_in->chan_list[chan_idx].scan_type;
941 if (scan_type == MWIFIEX_SCAN_TYPE_PASSIVE)
943 chan_idx)->chan_scan_mode_bitmap
944 |= MWIFIEX_PASSIVE_SCAN;
947 chan_idx)->chan_scan_mode_bitmap
948 &= ~MWIFIEX_PASSIVE_SCAN;
952 chan_idx)->chan_scan_mode_bitmap
953 |= MWIFIEX_DISABLE_CHAN_FILT;
955 if (user_scan_in->chan_list[chan_idx].scan_time) {
956 scan_dur = (u16) user_scan_in->
957 chan_list[chan_idx].scan_time;
959 if (scan_type == MWIFIEX_SCAN_TYPE_PASSIVE)
960 scan_dur = adapter->passive_scan_time;
961 else if (*filtered_scan)
962 scan_dur = adapter->specific_scan_time;
964 scan_dur = adapter->active_scan_time;
967 (scan_chan_list + chan_idx)->min_scan_time =
968 cpu_to_le16(scan_dur);
969 (scan_chan_list + chan_idx)->max_scan_time =
970 cpu_to_le16(scan_dur);
973 /* Check if we are only scanning the current channel */
974 if ((chan_idx == 1) &&
975 (user_scan_in->chan_list[0].chan_number ==
976 priv->curr_bss_params.bss_descriptor.channel)) {
977 *scan_current_only = true;
978 dev_dbg(adapter->dev,
979 "info: Scan: Scanning current channel only\n");
983 dev_dbg(adapter->dev,
984 "info: Scan: Creating full region channel list\n");
985 chan_num = mwifiex_scan_create_channel_list(priv, user_scan_in,
991 * In associated state we will reduce the number of channels scanned per
992 * scan command to avoid any traffic delay/loss. This number is decided
993 * based on total number of channels to be scanned due to constraints
994 * of command buffers.
996 if (priv->media_connected) {
997 if (chan_num < MWIFIEX_LIMIT_1_CHANNEL_PER_SCAN_CMD)
998 *max_chan_per_scan = 1;
999 else if (chan_num < MWIFIEX_LIMIT_2_CHANNELS_PER_SCAN_CMD)
1000 *max_chan_per_scan = 2;
1001 else if (chan_num < MWIFIEX_LIMIT_3_CHANNELS_PER_SCAN_CMD)
1002 *max_chan_per_scan = 3;
1004 *max_chan_per_scan = 4;
1009 * This function inspects the scan response buffer for pointers to
1012 * TLVs can be included at the end of the scan response BSS information.
1014 * Data in the buffer is parsed pointers to TLVs that can potentially
1015 * be passed back in the response.
1018 mwifiex_ret_802_11_scan_get_tlv_ptrs(struct mwifiex_adapter *adapter,
1019 struct mwifiex_ie_types_data *tlv,
1020 u32 tlv_buf_size, u32 req_tlv_type,
1021 struct mwifiex_ie_types_data **tlv_data)
1023 struct mwifiex_ie_types_data *current_tlv;
1029 tlv_buf_left = tlv_buf_size;
1032 dev_dbg(adapter->dev, "info: SCAN_RESP: tlv_buf_size = %d\n",
1035 while (tlv_buf_left >= sizeof(struct mwifiex_ie_types_header)) {
1037 tlv_type = le16_to_cpu(current_tlv->header.type);
1038 tlv_len = le16_to_cpu(current_tlv->header.len);
1040 if (sizeof(tlv->header) + tlv_len > tlv_buf_left) {
1041 dev_err(adapter->dev, "SCAN_RESP: TLV buffer corrupt\n");
1045 if (req_tlv_type == tlv_type) {
1047 case TLV_TYPE_TSFTIMESTAMP:
1048 dev_dbg(adapter->dev, "info: SCAN_RESP: TSF "
1049 "timestamp TLV, len = %d\n", tlv_len);
1050 *tlv_data = current_tlv;
1052 case TLV_TYPE_CHANNELBANDLIST:
1053 dev_dbg(adapter->dev, "info: SCAN_RESP: channel"
1054 " band list TLV, len = %d\n", tlv_len);
1055 *tlv_data = current_tlv;
1058 dev_err(adapter->dev,
1059 "SCAN_RESP: unhandled TLV = %d\n",
1061 /* Give up, this seems corrupted */
1070 tlv_buf_left -= (sizeof(tlv->header) + tlv_len);
1072 (struct mwifiex_ie_types_data *) (current_tlv->data +
1079 * This function parses provided beacon buffer and updates
1080 * respective fields in bss descriptor structure.
1082 int mwifiex_update_bss_desc_with_ie(struct mwifiex_adapter *adapter,
1083 struct mwifiex_bssdescriptor *bss_entry)
1087 struct ieee_types_fh_param_set *fh_param_set;
1088 struct ieee_types_ds_param_set *ds_param_set;
1089 struct ieee_types_cf_param_set *cf_param_set;
1090 struct ieee_types_ibss_param_set *ibss_param_set;
1097 u8 found_data_rate_ie;
1099 struct ieee_types_vendor_specific *vendor_ie;
1100 const u8 wpa_oui[4] = { 0x00, 0x50, 0xf2, 0x01 };
1101 const u8 wmm_oui[4] = { 0x00, 0x50, 0xf2, 0x02 };
1103 found_data_rate_ie = false;
1105 current_ptr = bss_entry->beacon_buf;
1106 bytes_left = bss_entry->beacon_buf_size;
1108 /* Process variable IE */
1109 while (bytes_left >= 2) {
1110 element_id = *current_ptr;
1111 element_len = *(current_ptr + 1);
1112 total_ie_len = element_len + sizeof(struct ieee_types_header);
1114 if (bytes_left < total_ie_len) {
1115 dev_err(adapter->dev, "err: InterpretIE: in processing"
1116 " IE, bytes left < IE length\n");
1119 switch (element_id) {
1121 bss_entry->ssid.ssid_len = element_len;
1122 memcpy(bss_entry->ssid.ssid, (current_ptr + 2),
1124 dev_dbg(adapter->dev,
1125 "info: InterpretIE: ssid: %-32s\n",
1126 bss_entry->ssid.ssid);
1129 case WLAN_EID_SUPP_RATES:
1130 memcpy(bss_entry->data_rates, current_ptr + 2,
1132 memcpy(bss_entry->supported_rates, current_ptr + 2,
1134 rate_size = element_len;
1135 found_data_rate_ie = true;
1138 case WLAN_EID_FH_PARAMS:
1140 (struct ieee_types_fh_param_set *) current_ptr;
1141 memcpy(&bss_entry->phy_param_set.fh_param_set,
1143 sizeof(struct ieee_types_fh_param_set));
1146 case WLAN_EID_DS_PARAMS:
1148 (struct ieee_types_ds_param_set *) current_ptr;
1150 bss_entry->channel = ds_param_set->current_chan;
1152 memcpy(&bss_entry->phy_param_set.ds_param_set,
1154 sizeof(struct ieee_types_ds_param_set));
1157 case WLAN_EID_CF_PARAMS:
1159 (struct ieee_types_cf_param_set *) current_ptr;
1160 memcpy(&bss_entry->ss_param_set.cf_param_set,
1162 sizeof(struct ieee_types_cf_param_set));
1165 case WLAN_EID_IBSS_PARAMS:
1167 (struct ieee_types_ibss_param_set *)
1169 memcpy(&bss_entry->ss_param_set.ibss_param_set,
1171 sizeof(struct ieee_types_ibss_param_set));
1174 case WLAN_EID_ERP_INFO:
1175 bss_entry->erp_flags = *(current_ptr + 2);
1178 case WLAN_EID_PWR_CONSTRAINT:
1179 bss_entry->local_constraint = *(current_ptr + 2);
1180 bss_entry->sensed_11h = true;
1183 case WLAN_EID_CHANNEL_SWITCH:
1184 bss_entry->chan_sw_ie_present = true;
1185 case WLAN_EID_PWR_CAPABILITY:
1186 case WLAN_EID_TPC_REPORT:
1187 case WLAN_EID_QUIET:
1188 bss_entry->sensed_11h = true;
1191 case WLAN_EID_EXT_SUPP_RATES:
1193 * Only process extended supported rate
1194 * if data rate is already found.
1195 * Data rate IE should come before
1196 * extended supported rate IE
1198 if (found_data_rate_ie) {
1199 if ((element_len + rate_size) >
1200 MWIFIEX_SUPPORTED_RATES)
1202 (MWIFIEX_SUPPORTED_RATES -
1205 bytes_to_copy = element_len;
1207 rate = (u8 *) bss_entry->data_rates;
1209 memcpy(rate, current_ptr + 2, bytes_to_copy);
1211 rate = (u8 *) bss_entry->supported_rates;
1213 memcpy(rate, current_ptr + 2, bytes_to_copy);
1217 case WLAN_EID_VENDOR_SPECIFIC:
1218 vendor_ie = (struct ieee_types_vendor_specific *)
1222 (vendor_ie->vend_hdr.oui, wpa_oui,
1224 bss_entry->bcn_wpa_ie =
1225 (struct ieee_types_vendor_specific *)
1227 bss_entry->wpa_offset = (u16)
1228 (current_ptr - bss_entry->beacon_buf);
1229 } else if (!memcmp(vendor_ie->vend_hdr.oui, wmm_oui,
1232 sizeof(struct ieee_types_wmm_parameter) ||
1234 sizeof(struct ieee_types_wmm_info))
1236 * Only accept and copy the WMM IE if
1237 * it matches the size expected for the
1238 * WMM Info IE or the WMM Parameter IE.
1240 memcpy((u8 *) &bss_entry->wmm_ie,
1241 current_ptr, total_ie_len);
1245 bss_entry->bcn_rsn_ie =
1246 (struct ieee_types_generic *) current_ptr;
1247 bss_entry->rsn_offset = (u16) (current_ptr -
1248 bss_entry->beacon_buf);
1250 case WLAN_EID_BSS_AC_ACCESS_DELAY:
1251 bss_entry->bcn_wapi_ie =
1252 (struct ieee_types_generic *) current_ptr;
1253 bss_entry->wapi_offset = (u16) (current_ptr -
1254 bss_entry->beacon_buf);
1256 case WLAN_EID_HT_CAPABILITY:
1257 bss_entry->bcn_ht_cap = (struct ieee80211_ht_cap *)
1259 sizeof(struct ieee_types_header));
1260 bss_entry->ht_cap_offset = (u16) (current_ptr +
1261 sizeof(struct ieee_types_header) -
1262 bss_entry->beacon_buf);
1264 case WLAN_EID_HT_OPERATION:
1265 bss_entry->bcn_ht_oper =
1266 (struct ieee80211_ht_operation *)(current_ptr +
1267 sizeof(struct ieee_types_header));
1268 bss_entry->ht_info_offset = (u16) (current_ptr +
1269 sizeof(struct ieee_types_header) -
1270 bss_entry->beacon_buf);
1272 case WLAN_EID_VHT_CAPABILITY:
1273 bss_entry->disable_11ac = false;
1274 bss_entry->bcn_vht_cap =
1275 (void *)(current_ptr +
1276 sizeof(struct ieee_types_header));
1277 bss_entry->vht_cap_offset =
1278 (u16)((u8 *)bss_entry->bcn_vht_cap -
1279 bss_entry->beacon_buf);
1281 case WLAN_EID_VHT_OPERATION:
1282 bss_entry->bcn_vht_oper =
1283 (void *)(current_ptr +
1284 sizeof(struct ieee_types_header));
1285 bss_entry->vht_info_offset =
1286 (u16)((u8 *)bss_entry->bcn_vht_oper -
1287 bss_entry->beacon_buf);
1289 case WLAN_EID_BSS_COEX_2040:
1290 bss_entry->bcn_bss_co_2040 = current_ptr +
1291 sizeof(struct ieee_types_header);
1292 bss_entry->bss_co_2040_offset = (u16) (current_ptr +
1293 sizeof(struct ieee_types_header) -
1294 bss_entry->beacon_buf);
1296 case WLAN_EID_EXT_CAPABILITY:
1297 bss_entry->bcn_ext_cap = current_ptr +
1298 sizeof(struct ieee_types_header);
1299 bss_entry->ext_cap_offset = (u16) (current_ptr +
1300 sizeof(struct ieee_types_header) -
1301 bss_entry->beacon_buf);
1303 case WLAN_EID_OPMODE_NOTIF:
1304 bss_entry->oper_mode =
1305 (void *)(current_ptr +
1306 sizeof(struct ieee_types_header));
1307 bss_entry->oper_mode_offset =
1308 (u16)((u8 *)bss_entry->oper_mode -
1309 bss_entry->beacon_buf);
1315 current_ptr += element_len + 2;
1317 /* Need to account for IE ID and IE Len */
1318 bytes_left -= (element_len + 2);
1320 } /* while (bytes_left > 2) */
1325 * This function converts radio type scan parameter to a band configuration
1326 * to be used in join command.
1329 mwifiex_radio_type_to_band(u8 radio_type)
1331 switch (radio_type) {
1332 case HostCmd_SCAN_RADIO_TYPE_A:
1334 case HostCmd_SCAN_RADIO_TYPE_BG:
1341 * This is an internal function used to start a scan based on an input
1344 * This uses the input user scan configuration information when provided in
1345 * order to send the appropriate scan commands to firmware to populate or
1346 * update the internal driver scan table.
1348 int mwifiex_scan_networks(struct mwifiex_private *priv,
1349 const struct mwifiex_user_scan_cfg *user_scan_in)
1352 struct mwifiex_adapter *adapter = priv->adapter;
1353 struct cmd_ctrl_node *cmd_node;
1354 union mwifiex_scan_cmd_config_tlv *scan_cfg_out;
1355 struct mwifiex_ie_types_chan_list_param_set *chan_list_out;
1356 struct mwifiex_chan_scan_param_set *scan_chan_list;
1358 u8 scan_current_chan_only;
1359 u8 max_chan_per_scan;
1360 unsigned long flags;
1362 if (adapter->scan_processing) {
1363 dev_err(adapter->dev, "cmd: Scan already in process...\n");
1367 if (priv->scan_block) {
1368 dev_err(adapter->dev,
1369 "cmd: Scan is blocked during association...\n");
1373 spin_lock_irqsave(&adapter->mwifiex_cmd_lock, flags);
1374 adapter->scan_processing = true;
1375 spin_unlock_irqrestore(&adapter->mwifiex_cmd_lock, flags);
1377 scan_cfg_out = kzalloc(sizeof(union mwifiex_scan_cmd_config_tlv),
1379 if (!scan_cfg_out) {
1384 scan_chan_list = kcalloc(MWIFIEX_USER_SCAN_CHAN_MAX,
1385 sizeof(struct mwifiex_chan_scan_param_set),
1387 if (!scan_chan_list) {
1388 kfree(scan_cfg_out);
1393 mwifiex_config_scan(priv, user_scan_in, &scan_cfg_out->config,
1394 &chan_list_out, scan_chan_list, &max_chan_per_scan,
1395 &filtered_scan, &scan_current_chan_only);
1397 ret = mwifiex_scan_channel_list(priv, max_chan_per_scan, filtered_scan,
1398 &scan_cfg_out->config, chan_list_out,
1401 /* Get scan command from scan_pending_q and put to cmd_pending_q */
1403 spin_lock_irqsave(&adapter->scan_pending_q_lock, flags);
1404 if (!list_empty(&adapter->scan_pending_q)) {
1405 cmd_node = list_first_entry(&adapter->scan_pending_q,
1406 struct cmd_ctrl_node, list);
1407 list_del(&cmd_node->list);
1408 spin_unlock_irqrestore(&adapter->scan_pending_q_lock,
1410 mwifiex_insert_cmd_to_pending_q(adapter, cmd_node,
1412 queue_work(adapter->workqueue, &adapter->main_work);
1414 /* Perform internal scan synchronously */
1415 if (!priv->scan_request) {
1416 dev_dbg(adapter->dev, "wait internal scan\n");
1417 mwifiex_wait_queue_complete(adapter, cmd_node);
1420 spin_unlock_irqrestore(&adapter->scan_pending_q_lock,
1425 kfree(scan_cfg_out);
1426 kfree(scan_chan_list);
1429 spin_lock_irqsave(&adapter->mwifiex_cmd_lock, flags);
1430 adapter->scan_processing = false;
1431 spin_unlock_irqrestore(&adapter->mwifiex_cmd_lock, flags);
1437 * This function prepares a scan command to be sent to the firmware.
1439 * This uses the scan command configuration sent to the command processing
1440 * module in command preparation stage to configure a scan command structure
1441 * to send to firmware.
1443 * The fixed fields specifying the BSS type and BSSID filters as well as a
1444 * variable number/length of TLVs are sent in the command to firmware.
1446 * Preparation also includes -
1447 * - Setting command ID, and proper size
1448 * - Ensuring correct endian-ness
1450 int mwifiex_cmd_802_11_scan(struct host_cmd_ds_command *cmd,
1451 struct mwifiex_scan_cmd_config *scan_cfg)
1453 struct host_cmd_ds_802_11_scan *scan_cmd = &cmd->params.scan;
1455 /* Set fixed field variables in scan command */
1456 scan_cmd->bss_mode = scan_cfg->bss_mode;
1457 memcpy(scan_cmd->bssid, scan_cfg->specific_bssid,
1458 sizeof(scan_cmd->bssid));
1459 memcpy(scan_cmd->tlv_buffer, scan_cfg->tlv_buf, scan_cfg->tlv_buf_len);
1461 cmd->command = cpu_to_le16(HostCmd_CMD_802_11_SCAN);
1463 /* Size is equal to the sizeof(fixed portions) + the TLV len + header */
1464 cmd->size = cpu_to_le16((u16) (sizeof(scan_cmd->bss_mode)
1465 + sizeof(scan_cmd->bssid)
1466 + scan_cfg->tlv_buf_len + S_DS_GEN));
1472 * This function checks compatibility of requested network with current
1475 int mwifiex_check_network_compatibility(struct mwifiex_private *priv,
1476 struct mwifiex_bssdescriptor *bss_desc)
1483 if ((mwifiex_get_cfp(priv, (u8) bss_desc->bss_band,
1484 (u16) bss_desc->channel, 0))) {
1485 switch (priv->bss_mode) {
1486 case NL80211_IFTYPE_STATION:
1487 case NL80211_IFTYPE_ADHOC:
1488 ret = mwifiex_is_network_compatible(priv, bss_desc,
1491 dev_err(priv->adapter->dev,
1492 "Incompatible network settings\n");
1502 static int mwifiex_update_curr_bss_params(struct mwifiex_private *priv,
1503 struct cfg80211_bss *bss)
1505 struct mwifiex_bssdescriptor *bss_desc;
1507 unsigned long flags;
1509 /* Allocate and fill new bss descriptor */
1510 bss_desc = kzalloc(sizeof(struct mwifiex_bssdescriptor), GFP_KERNEL);
1514 ret = mwifiex_fill_new_bss_desc(priv, bss, bss_desc);
1518 ret = mwifiex_check_network_compatibility(priv, bss_desc);
1522 spin_lock_irqsave(&priv->curr_bcn_buf_lock, flags);
1523 /* Make a copy of current BSSID descriptor */
1524 memcpy(&priv->curr_bss_params.bss_descriptor, bss_desc,
1525 sizeof(priv->curr_bss_params.bss_descriptor));
1527 /* The contents of beacon_ie will be copied to its own buffer
1528 * in mwifiex_save_curr_bcn()
1530 mwifiex_save_curr_bcn(priv);
1531 spin_unlock_irqrestore(&priv->curr_bcn_buf_lock, flags);
1534 /* beacon_ie buffer was allocated in function
1535 * mwifiex_fill_new_bss_desc(). Free it now.
1537 kfree(bss_desc->beacon_buf);
1543 * This function handles the command response of scan.
1545 * The response buffer for the scan command has the following
1548 * .-------------------------------------------------------------.
1549 * | Header (4 * sizeof(t_u16)): Standard command response hdr |
1550 * .-------------------------------------------------------------.
1551 * | BufSize (t_u16) : sizeof the BSS Description data |
1552 * .-------------------------------------------------------------.
1553 * | NumOfSet (t_u8) : Number of BSS Descs returned |
1554 * .-------------------------------------------------------------.
1555 * | BSSDescription data (variable, size given in BufSize) |
1556 * .-------------------------------------------------------------.
1557 * | TLV data (variable, size calculated using Header->Size, |
1558 * | BufSize and sizeof the fixed fields above) |
1559 * .-------------------------------------------------------------.
1561 int mwifiex_ret_802_11_scan(struct mwifiex_private *priv,
1562 struct host_cmd_ds_command *resp)
1565 struct mwifiex_adapter *adapter = priv->adapter;
1566 struct cmd_ctrl_node *cmd_node;
1567 struct host_cmd_ds_802_11_scan_rsp *scan_rsp;
1568 struct mwifiex_ie_types_data *tlv_data;
1569 struct mwifiex_ie_types_tsf_timestamp *tsf_tlv;
1575 struct mwifiex_chan_freq_power *cfp;
1576 struct mwifiex_ie_types_chan_band_list_param_set *chan_band_tlv;
1577 struct chan_band_param_set *chan_band;
1579 unsigned long flags;
1580 struct cfg80211_bss *bss;
1582 is_bgscan_resp = (le16_to_cpu(resp->command)
1583 == HostCmd_CMD_802_11_BG_SCAN_QUERY);
1585 scan_rsp = &resp->params.bg_scan_query_resp.scan_resp;
1587 scan_rsp = &resp->params.scan_resp;
1590 if (scan_rsp->number_of_sets > MWIFIEX_MAX_AP) {
1591 dev_err(adapter->dev, "SCAN_RESP: too many AP returned (%d)\n",
1592 scan_rsp->number_of_sets);
1594 goto check_next_scan;
1597 bytes_left = le16_to_cpu(scan_rsp->bss_descript_size);
1598 dev_dbg(adapter->dev, "info: SCAN_RESP: bss_descript_size %d\n",
1601 scan_resp_size = le16_to_cpu(resp->size);
1603 dev_dbg(adapter->dev,
1604 "info: SCAN_RESP: returned %d APs before parsing\n",
1605 scan_rsp->number_of_sets);
1607 bss_info = scan_rsp->bss_desc_and_tlv_buffer;
1610 * The size of the TLV buffer is equal to the entire command response
1611 * size (scan_resp_size) minus the fixed fields (sizeof()'s), the
1612 * BSS Descriptions (bss_descript_size as bytesLef) and the command
1613 * response header (S_DS_GEN)
1615 tlv_buf_size = scan_resp_size - (bytes_left
1616 + sizeof(scan_rsp->bss_descript_size)
1617 + sizeof(scan_rsp->number_of_sets)
1620 tlv_data = (struct mwifiex_ie_types_data *) (scan_rsp->
1621 bss_desc_and_tlv_buffer +
1624 /* Search the TLV buffer space in the scan response for any valid
1626 mwifiex_ret_802_11_scan_get_tlv_ptrs(adapter, tlv_data, tlv_buf_size,
1627 TLV_TYPE_TSFTIMESTAMP,
1628 (struct mwifiex_ie_types_data **)
1631 /* Search the TLV buffer space in the scan response for any valid
1633 mwifiex_ret_802_11_scan_get_tlv_ptrs(adapter, tlv_data, tlv_buf_size,
1634 TLV_TYPE_CHANNELBANDLIST,
1635 (struct mwifiex_ie_types_data **)
1638 for (idx = 0; idx < scan_rsp->number_of_sets && bytes_left; idx++) {
1645 u16 beacon_size = 0;
1649 u16 cap_info_bitmap;
1652 struct mwifiex_bcn_param *bcn_param;
1653 struct mwifiex_bss_priv *bss_priv;
1655 if (bytes_left >= sizeof(beacon_size)) {
1656 /* Extract & convert beacon size from command buffer */
1657 memcpy(&beacon_size, bss_info, sizeof(beacon_size));
1658 bytes_left -= sizeof(beacon_size);
1659 bss_info += sizeof(beacon_size);
1662 if (!beacon_size || beacon_size > bytes_left) {
1663 bss_info += bytes_left;
1666 goto check_next_scan;
1669 /* Initialize the current working beacon pointer for this BSS
1671 current_ptr = bss_info;
1673 /* Advance the return beacon pointer past the current beacon */
1674 bss_info += beacon_size;
1675 bytes_left -= beacon_size;
1677 curr_bcn_bytes = beacon_size;
1680 * First 5 fields are bssid, RSSI, time stamp, beacon interval,
1681 * and capability information
1683 if (curr_bcn_bytes < sizeof(struct mwifiex_bcn_param)) {
1684 dev_err(adapter->dev,
1685 "InterpretIE: not enough bytes left\n");
1688 bcn_param = (struct mwifiex_bcn_param *)current_ptr;
1689 current_ptr += sizeof(*bcn_param);
1690 curr_bcn_bytes -= sizeof(*bcn_param);
1692 memcpy(bssid, bcn_param->bssid, ETH_ALEN);
1694 rssi = (s32) bcn_param->rssi;
1695 rssi = (-rssi) * 100; /* Convert dBm to mBm */
1696 dev_dbg(adapter->dev, "info: InterpretIE: RSSI=%d\n", rssi);
1698 timestamp = le64_to_cpu(bcn_param->timestamp);
1699 beacon_period = le16_to_cpu(bcn_param->beacon_period);
1701 cap_info_bitmap = le16_to_cpu(bcn_param->cap_info_bitmap);
1702 dev_dbg(adapter->dev, "info: InterpretIE: capabilities=0x%X\n",
1705 /* Rest of the current buffer are IE's */
1706 ie_buf = current_ptr;
1707 ie_len = curr_bcn_bytes;
1708 dev_dbg(adapter->dev,
1709 "info: InterpretIE: IELength for this AP = %d\n",
1712 while (curr_bcn_bytes >= sizeof(struct ieee_types_header)) {
1713 u8 element_id, element_len;
1715 element_id = *current_ptr;
1716 element_len = *(current_ptr + 1);
1717 if (curr_bcn_bytes < element_len +
1718 sizeof(struct ieee_types_header)) {
1719 dev_err(priv->adapter->dev,
1720 "%s: bytes left < IE length\n",
1722 goto check_next_scan;
1724 if (element_id == WLAN_EID_DS_PARAMS) {
1725 channel = *(current_ptr + sizeof(struct ieee_types_header));
1729 current_ptr += element_len +
1730 sizeof(struct ieee_types_header);
1731 curr_bcn_bytes -= element_len +
1732 sizeof(struct ieee_types_header);
1736 * If the TSF TLV was appended to the scan results, save this
1737 * entry's TSF value in the fw_tsf field. It is the firmware's
1738 * TSF value at the time the beacon or probe response was
1742 memcpy(&fw_tsf, &tsf_tlv->tsf_data[idx * TSF_DATA_SIZE],
1746 struct ieee80211_channel *chan;
1750 if (chan_band_tlv) {
1752 &chan_band_tlv->chan_band_param[idx];
1753 band = mwifiex_radio_type_to_band(
1754 chan_band->radio_type
1755 & (BIT(0) | BIT(1)));
1758 cfp = mwifiex_get_cfp(priv, band, channel, 0);
1760 freq = cfp ? cfp->freq : 0;
1762 chan = ieee80211_get_channel(priv->wdev->wiphy, freq);
1764 if (chan && !(chan->flags & IEEE80211_CHAN_DISABLED)) {
1765 bss = cfg80211_inform_bss(priv->wdev->wiphy,
1766 chan, bssid, timestamp,
1767 cap_info_bitmap, beacon_period,
1768 ie_buf, ie_len, rssi, GFP_KERNEL);
1769 bss_priv = (struct mwifiex_bss_priv *)bss->priv;
1770 bss_priv->band = band;
1771 bss_priv->fw_tsf = fw_tsf;
1772 if (priv->media_connected &&
1774 priv->curr_bss_params.bss_descriptor
1775 .mac_address, ETH_ALEN))
1776 mwifiex_update_curr_bss_params(priv,
1778 cfg80211_put_bss(priv->wdev->wiphy, bss);
1781 dev_dbg(adapter->dev, "missing BSS channel IE\n");
1786 spin_lock_irqsave(&adapter->scan_pending_q_lock, flags);
1787 if (list_empty(&adapter->scan_pending_q)) {
1788 spin_unlock_irqrestore(&adapter->scan_pending_q_lock, flags);
1789 spin_lock_irqsave(&adapter->mwifiex_cmd_lock, flags);
1790 adapter->scan_processing = false;
1791 spin_unlock_irqrestore(&adapter->mwifiex_cmd_lock, flags);
1793 /* Need to indicate IOCTL complete */
1794 if (adapter->curr_cmd->wait_q_enabled) {
1795 adapter->cmd_wait_q.status = 0;
1796 if (!priv->scan_request) {
1797 dev_dbg(adapter->dev,
1798 "complete internal scan\n");
1799 mwifiex_complete_cmd(adapter,
1803 if (priv->report_scan_result)
1804 priv->report_scan_result = false;
1806 if (priv->scan_request) {
1807 dev_dbg(adapter->dev, "info: notifying scan done\n");
1808 cfg80211_scan_done(priv->scan_request, 0);
1809 priv->scan_request = NULL;
1811 priv->scan_aborting = false;
1812 dev_dbg(adapter->dev, "info: scan already aborted\n");
1815 if ((priv->scan_aborting && !priv->scan_request) ||
1817 spin_unlock_irqrestore(&adapter->scan_pending_q_lock,
1819 adapter->scan_delay_cnt = MWIFIEX_MAX_SCAN_DELAY_CNT;
1820 mod_timer(&priv->scan_delay_timer, jiffies);
1821 dev_dbg(priv->adapter->dev,
1822 "info: %s: triggerring scan abort\n", __func__);
1823 } else if (!mwifiex_wmm_lists_empty(adapter) &&
1824 (priv->scan_request && (priv->scan_request->flags &
1825 NL80211_SCAN_FLAG_LOW_PRIORITY))) {
1826 spin_unlock_irqrestore(&adapter->scan_pending_q_lock,
1828 adapter->scan_delay_cnt = 1;
1829 mod_timer(&priv->scan_delay_timer, jiffies +
1830 msecs_to_jiffies(MWIFIEX_SCAN_DELAY_MSEC));
1831 dev_dbg(priv->adapter->dev,
1832 "info: %s: deferring scan\n", __func__);
1834 /* Get scan command from scan_pending_q and put to
1836 cmd_node = list_first_entry(&adapter->scan_pending_q,
1837 struct cmd_ctrl_node, list);
1838 list_del(&cmd_node->list);
1839 spin_unlock_irqrestore(&adapter->scan_pending_q_lock,
1841 mwifiex_insert_cmd_to_pending_q(adapter, cmd_node,
1850 * This function prepares command for background scan query.
1852 * Preparation includes -
1853 * - Setting command ID and proper size
1854 * - Setting background scan flush parameter
1855 * - Ensuring correct endian-ness
1857 int mwifiex_cmd_802_11_bg_scan_query(struct host_cmd_ds_command *cmd)
1859 struct host_cmd_ds_802_11_bg_scan_query *bg_query =
1860 &cmd->params.bg_scan_query;
1862 cmd->command = cpu_to_le16(HostCmd_CMD_802_11_BG_SCAN_QUERY);
1863 cmd->size = cpu_to_le16(sizeof(struct host_cmd_ds_802_11_bg_scan_query)
1866 bg_query->flush = 1;
1872 * This function inserts scan command node to the scan pending queue.
1875 mwifiex_queue_scan_cmd(struct mwifiex_private *priv,
1876 struct cmd_ctrl_node *cmd_node)
1878 struct mwifiex_adapter *adapter = priv->adapter;
1879 unsigned long flags;
1881 cmd_node->wait_q_enabled = true;
1882 cmd_node->condition = &adapter->scan_wait_q_woken;
1883 spin_lock_irqsave(&adapter->scan_pending_q_lock, flags);
1884 list_add_tail(&cmd_node->list, &adapter->scan_pending_q);
1885 spin_unlock_irqrestore(&adapter->scan_pending_q_lock, flags);
1889 * This function sends a scan command for all available channels to the
1890 * firmware, filtered on a specific SSID.
1892 static int mwifiex_scan_specific_ssid(struct mwifiex_private *priv,
1893 struct cfg80211_ssid *req_ssid)
1895 struct mwifiex_adapter *adapter = priv->adapter;
1897 struct mwifiex_user_scan_cfg *scan_cfg;
1899 if (adapter->scan_processing) {
1900 dev_err(adapter->dev, "cmd: Scan already in process...\n");
1904 if (priv->scan_block) {
1905 dev_err(adapter->dev,
1906 "cmd: Scan is blocked during association...\n");
1910 scan_cfg = kzalloc(sizeof(struct mwifiex_user_scan_cfg), GFP_KERNEL);
1914 scan_cfg->ssid_list = req_ssid;
1915 scan_cfg->num_ssids = 1;
1917 ret = mwifiex_scan_networks(priv, scan_cfg);
1924 * Sends IOCTL request to start a scan.
1926 * This function allocates the IOCTL request buffer, fills it
1927 * with requisite parameters and calls the IOCTL handler.
1929 * Scan command can be issued for both normal scan and specific SSID
1930 * scan, depending upon whether an SSID is provided or not.
1932 int mwifiex_request_scan(struct mwifiex_private *priv,
1933 struct cfg80211_ssid *req_ssid)
1937 if (down_interruptible(&priv->async_sem)) {
1938 dev_err(priv->adapter->dev, "%s: acquire semaphore\n",
1943 priv->adapter->scan_wait_q_woken = false;
1945 if (req_ssid && req_ssid->ssid_len != 0)
1946 /* Specific SSID scan */
1947 ret = mwifiex_scan_specific_ssid(priv, req_ssid);
1950 ret = mwifiex_scan_networks(priv, NULL);
1952 up(&priv->async_sem);
1958 * This function appends the vendor specific IE TLV to a buffer.
1961 mwifiex_cmd_append_vsie_tlv(struct mwifiex_private *priv,
1962 u16 vsie_mask, u8 **buffer)
1964 int id, ret_len = 0;
1965 struct mwifiex_ie_types_vendor_param_set *vs_param_set;
1973 * Traverse through the saved vendor specific IE array and append
1974 * the selected(scan/assoc/adhoc) IE as TLV to the command
1976 for (id = 0; id < MWIFIEX_MAX_VSIE_NUM; id++) {
1977 if (priv->vs_ie[id].mask & vsie_mask) {
1979 (struct mwifiex_ie_types_vendor_param_set *)
1981 vs_param_set->header.type =
1982 cpu_to_le16(TLV_TYPE_PASSTHROUGH);
1983 vs_param_set->header.len =
1984 cpu_to_le16((((u16) priv->vs_ie[id].ie[1])
1986 memcpy(vs_param_set->ie, priv->vs_ie[id].ie,
1987 le16_to_cpu(vs_param_set->header.len));
1988 *buffer += le16_to_cpu(vs_param_set->header.len) +
1989 sizeof(struct mwifiex_ie_types_header);
1990 ret_len += le16_to_cpu(vs_param_set->header.len) +
1991 sizeof(struct mwifiex_ie_types_header);
1998 * This function saves a beacon buffer of the current BSS descriptor.
2000 * The current beacon buffer is saved so that it can be restored in the
2001 * following cases that makes the beacon buffer not to contain the current
2002 * ssid's beacon buffer.
2003 * - The current ssid was not found somehow in the last scan.
2004 * - The current ssid was the last entry of the scan table and overloaded.
2007 mwifiex_save_curr_bcn(struct mwifiex_private *priv)
2009 struct mwifiex_bssdescriptor *curr_bss =
2010 &priv->curr_bss_params.bss_descriptor;
2012 if (!curr_bss->beacon_buf_size)
2015 /* allocate beacon buffer at 1st time; or if it's size has changed */
2016 if (!priv->curr_bcn_buf ||
2017 priv->curr_bcn_size != curr_bss->beacon_buf_size) {
2018 priv->curr_bcn_size = curr_bss->beacon_buf_size;
2020 kfree(priv->curr_bcn_buf);
2021 priv->curr_bcn_buf = kmalloc(curr_bss->beacon_buf_size,
2023 if (!priv->curr_bcn_buf)
2027 memcpy(priv->curr_bcn_buf, curr_bss->beacon_buf,
2028 curr_bss->beacon_buf_size);
2029 dev_dbg(priv->adapter->dev, "info: current beacon saved %d\n",
2030 priv->curr_bcn_size);
2032 curr_bss->beacon_buf = priv->curr_bcn_buf;
2034 /* adjust the pointers in the current BSS descriptor */
2035 if (curr_bss->bcn_wpa_ie)
2036 curr_bss->bcn_wpa_ie =
2037 (struct ieee_types_vendor_specific *)
2038 (curr_bss->beacon_buf +
2039 curr_bss->wpa_offset);
2041 if (curr_bss->bcn_rsn_ie)
2042 curr_bss->bcn_rsn_ie = (struct ieee_types_generic *)
2043 (curr_bss->beacon_buf +
2044 curr_bss->rsn_offset);
2046 if (curr_bss->bcn_ht_cap)
2047 curr_bss->bcn_ht_cap = (struct ieee80211_ht_cap *)
2048 (curr_bss->beacon_buf +
2049 curr_bss->ht_cap_offset);
2051 if (curr_bss->bcn_ht_oper)
2052 curr_bss->bcn_ht_oper = (struct ieee80211_ht_operation *)
2053 (curr_bss->beacon_buf +
2054 curr_bss->ht_info_offset);
2056 if (curr_bss->bcn_vht_cap)
2057 curr_bss->bcn_ht_cap = (void *)(curr_bss->beacon_buf +
2058 curr_bss->vht_cap_offset);
2060 if (curr_bss->bcn_vht_oper)
2061 curr_bss->bcn_ht_oper = (void *)(curr_bss->beacon_buf +
2062 curr_bss->vht_info_offset);
2064 if (curr_bss->bcn_bss_co_2040)
2065 curr_bss->bcn_bss_co_2040 =
2066 (curr_bss->beacon_buf + curr_bss->bss_co_2040_offset);
2068 if (curr_bss->bcn_ext_cap)
2069 curr_bss->bcn_ext_cap = curr_bss->beacon_buf +
2070 curr_bss->ext_cap_offset;
2072 if (curr_bss->oper_mode)
2073 curr_bss->oper_mode = (void *)(curr_bss->beacon_buf +
2074 curr_bss->oper_mode_offset);
2078 * This function frees the current BSS descriptor beacon buffer.
2081 mwifiex_free_curr_bcn(struct mwifiex_private *priv)
2083 kfree(priv->curr_bcn_buf);
2084 priv->curr_bcn_buf = NULL;