2 * This file is part of wl1271
4 * Copyright (C) 2009-2010 Nokia Corporation
6 * Contact: Luciano Coelho <luciano.coelho@nokia.com>
8 * This program is free software; you can redistribute it and/or
9 * modify it under the terms of the GNU General Public License
10 * version 2 as published by the Free Software Foundation.
12 * This program is distributed in the hope that it will be useful, but
13 * WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
15 * General Public License for more details.
17 * You should have received a copy of the GNU General Public License
18 * along with this program; if not, write to the Free Software
19 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA
24 #include <linux/module.h>
25 #include <linux/platform_device.h>
26 #include <linux/spi/spi.h>
27 #include <linux/etherdevice.h>
28 #include <linux/ieee80211.h>
29 #include <linux/slab.h>
35 #include "wl12xx_80211.h"
41 #define WL1271_CMD_FAST_POLL_COUNT 50
42 #define WL1271_WAIT_EVENT_FAST_POLL_COUNT 20
45 * send command to firmware
49 * @buf: buffer containing the command, must work with dma
50 * @len: length of the buffer
51 * return the cmd status code on success.
53 static int __wlcore_cmd_send(struct wl1271
*wl
, u16 id
, void *buf
,
54 size_t len
, size_t res_len
)
56 struct wl1271_cmd_header
*cmd
;
57 unsigned long timeout
;
63 if (unlikely(wl
->state
== WLCORE_STATE_RESTARTING
&&
64 id
!= CMD_STOP_FWLOGGER
))
67 if (WARN_ON_ONCE(len
< sizeof(*cmd
)))
71 cmd
->id
= cpu_to_le16(id
);
74 WARN_ON(len
% 4 != 0);
75 WARN_ON(test_bit(WL1271_FLAG_IN_ELP
, &wl
->flags
));
77 ret
= wlcore_write(wl
, wl
->cmd_box_addr
, buf
, len
, false);
82 * TODO: we just need this because one bit is in a different
83 * place. Is there any better way?
85 ret
= wl
->ops
->trigger_cmd(wl
, wl
->cmd_box_addr
, buf
, len
);
89 timeout
= jiffies
+ msecs_to_jiffies(WL1271_COMMAND_TIMEOUT
);
91 ret
= wlcore_read_reg(wl
, REG_INTERRUPT_NO_CLEAR
, &intr
);
95 while (!(intr
& WL1271_ACX_INTR_CMD_COMPLETE
)) {
96 if (time_after(jiffies
, timeout
)) {
97 wl1271_error("command complete timeout");
102 if (poll_count
< WL1271_CMD_FAST_POLL_COUNT
)
107 ret
= wlcore_read_reg(wl
, REG_INTERRUPT_NO_CLEAR
, &intr
);
112 /* read back the status code of the command */
114 res_len
= sizeof(struct wl1271_cmd_header
);
116 ret
= wlcore_read(wl
, wl
->cmd_box_addr
, cmd
, res_len
, false);
120 status
= le16_to_cpu(cmd
->status
);
122 ret
= wlcore_write_reg(wl
, REG_INTERRUPT_ACK
,
123 WL1271_ACX_INTR_CMD_COMPLETE
);
131 * send command to fw and return cmd status on success
132 * valid_rets contains a bitmap of allowed error codes
134 static int wlcore_cmd_send_failsafe(struct wl1271
*wl
, u16 id
, void *buf
,
135 size_t len
, size_t res_len
,
136 unsigned long valid_rets
)
138 int ret
= __wlcore_cmd_send(wl
, id
, buf
, len
, res_len
);
143 /* success is always a valid status */
144 valid_rets
|= BIT(CMD_STATUS_SUCCESS
);
146 if (ret
>= MAX_COMMAND_STATUS
||
147 !test_bit(ret
, &valid_rets
)) {
148 wl1271_error("command execute failure %d", ret
);
154 wl12xx_queue_recovery_work(wl
);
159 * wrapper for wlcore_cmd_send that accept only CMD_STATUS_SUCCESS
160 * return 0 on success.
162 int wl1271_cmd_send(struct wl1271
*wl
, u16 id
, void *buf
, size_t len
,
165 int ret
= wlcore_cmd_send_failsafe(wl
, id
, buf
, len
, res_len
, 0);
171 EXPORT_SYMBOL_GPL(wl1271_cmd_send
);
174 * Poll the mailbox event field until any of the bits in the mask is set or a
175 * timeout occurs (WL1271_EVENT_TIMEOUT in msecs)
177 int wlcore_cmd_wait_for_event_or_timeout(struct wl1271
*wl
,
178 u32 mask
, bool *timeout
)
182 unsigned long timeout_time
;
188 events_vector
= kmalloc(sizeof(*events_vector
), GFP_KERNEL
| GFP_DMA
);
192 timeout_time
= jiffies
+ msecs_to_jiffies(WL1271_EVENT_TIMEOUT
);
195 if (time_after(jiffies
, timeout_time
)) {
196 wl1271_debug(DEBUG_CMD
, "timeout waiting for event %d",
203 if (poll_count
< WL1271_WAIT_EVENT_FAST_POLL_COUNT
)
204 usleep_range(50, 51);
206 usleep_range(1000, 5000);
208 /* read from both event fields */
209 ret
= wlcore_read(wl
, wl
->mbox_ptr
[0], events_vector
,
210 sizeof(*events_vector
), false);
214 event
= *events_vector
& mask
;
216 ret
= wlcore_read(wl
, wl
->mbox_ptr
[1], events_vector
,
217 sizeof(*events_vector
), false);
221 event
|= *events_vector
& mask
;
225 kfree(events_vector
);
228 EXPORT_SYMBOL_GPL(wlcore_cmd_wait_for_event_or_timeout
);
230 int wl12xx_cmd_role_enable(struct wl1271
*wl
, u8
*addr
, u8 role_type
,
233 struct wl12xx_cmd_role_enable
*cmd
;
236 wl1271_debug(DEBUG_CMD
, "cmd role enable");
238 if (WARN_ON(*role_id
!= WL12XX_INVALID_ROLE_ID
))
241 cmd
= kzalloc(sizeof(*cmd
), GFP_KERNEL
);
248 cmd
->role_id
= find_first_zero_bit(wl
->roles_map
, WL12XX_MAX_ROLES
);
249 if (cmd
->role_id
>= WL12XX_MAX_ROLES
) {
254 memcpy(cmd
->mac_address
, addr
, ETH_ALEN
);
255 cmd
->role_type
= role_type
;
257 ret
= wl1271_cmd_send(wl
, CMD_ROLE_ENABLE
, cmd
, sizeof(*cmd
), 0);
259 wl1271_error("failed to initiate cmd role enable");
263 __set_bit(cmd
->role_id
, wl
->roles_map
);
264 *role_id
= cmd
->role_id
;
273 int wl12xx_cmd_role_disable(struct wl1271
*wl
, u8
*role_id
)
275 struct wl12xx_cmd_role_disable
*cmd
;
278 wl1271_debug(DEBUG_CMD
, "cmd role disable");
280 if (WARN_ON(*role_id
== WL12XX_INVALID_ROLE_ID
))
283 cmd
= kzalloc(sizeof(*cmd
), GFP_KERNEL
);
288 cmd
->role_id
= *role_id
;
290 ret
= wl1271_cmd_send(wl
, CMD_ROLE_DISABLE
, cmd
, sizeof(*cmd
), 0);
292 wl1271_error("failed to initiate cmd role disable");
296 __clear_bit(*role_id
, wl
->roles_map
);
297 *role_id
= WL12XX_INVALID_ROLE_ID
;
306 static int wlcore_get_new_session_id(struct wl1271
*wl
, u8 hlid
)
308 if (wl
->session_ids
[hlid
] >= SESSION_COUNTER_MAX
)
309 wl
->session_ids
[hlid
] = 0;
311 wl
->session_ids
[hlid
]++;
313 return wl
->session_ids
[hlid
];
316 int wl12xx_allocate_link(struct wl1271
*wl
, struct wl12xx_vif
*wlvif
, u8
*hlid
)
319 u8 link
= find_first_zero_bit(wl
->links_map
, wl
->num_links
);
320 if (link
>= wl
->num_links
)
323 wl
->session_ids
[link
] = wlcore_get_new_session_id(wl
, link
);
325 /* these bits are used by op_tx */
326 spin_lock_irqsave(&wl
->wl_lock
, flags
);
327 __set_bit(link
, wl
->links_map
);
328 __set_bit(link
, wlvif
->links_map
);
329 spin_unlock_irqrestore(&wl
->wl_lock
, flags
);
332 * take the last "freed packets" value from the current FW status.
333 * on recovery, we might not have fw_status yet, and
334 * tx_lnk_free_pkts will be NULL. check for it.
336 if (wl
->fw_status
->counters
.tx_lnk_free_pkts
)
337 wl
->links
[link
].prev_freed_pkts
=
338 wl
->fw_status
->counters
.tx_lnk_free_pkts
[link
];
339 wl
->links
[link
].wlvif
= wlvif
;
342 * Take saved value for total freed packets from wlvif, in case this is
345 if (wlvif
->bss_type
!= BSS_TYPE_AP_BSS
)
346 wl
->links
[link
].total_freed_pkts
= wlvif
->total_freed_pkts
;
350 wl
->active_link_count
++;
354 void wl12xx_free_link(struct wl1271
*wl
, struct wl12xx_vif
*wlvif
, u8
*hlid
)
358 if (*hlid
== WL12XX_INVALID_LINK_ID
)
361 /* these bits are used by op_tx */
362 spin_lock_irqsave(&wl
->wl_lock
, flags
);
363 __clear_bit(*hlid
, wl
->links_map
);
364 __clear_bit(*hlid
, wlvif
->links_map
);
365 spin_unlock_irqrestore(&wl
->wl_lock
, flags
);
367 wl
->links
[*hlid
].allocated_pkts
= 0;
368 wl
->links
[*hlid
].prev_freed_pkts
= 0;
369 wl
->links
[*hlid
].ba_bitmap
= 0;
370 eth_zero_addr(wl
->links
[*hlid
].addr
);
373 * At this point op_tx() will not add more packets to the queues. We
376 wl1271_tx_reset_link_queues(wl
, *hlid
);
377 wl
->links
[*hlid
].wlvif
= NULL
;
379 if (wlvif
->bss_type
== BSS_TYPE_AP_BSS
&&
380 *hlid
== wlvif
->ap
.bcast_hlid
) {
381 u32 sqn_padding
= WL1271_TX_SQN_POST_RECOVERY_PADDING
;
383 * save the total freed packets in the wlvif, in case this is
384 * recovery or suspend
386 wlvif
->total_freed_pkts
= wl
->links
[*hlid
].total_freed_pkts
;
389 * increment the initial seq number on recovery to account for
390 * transmitted packets that we haven't yet got in the FW status
392 if (wlvif
->encryption_type
== KEY_GEM
)
393 sqn_padding
= WL1271_TX_SQN_POST_RECOVERY_PADDING_GEM
;
395 if (test_bit(WL1271_FLAG_RECOVERY_IN_PROGRESS
, &wl
->flags
))
396 wlvif
->total_freed_pkts
+= sqn_padding
;
399 wl
->links
[*hlid
].total_freed_pkts
= 0;
401 *hlid
= WL12XX_INVALID_LINK_ID
;
402 wl
->active_link_count
--;
403 WARN_ON_ONCE(wl
->active_link_count
< 0);
406 u8
wlcore_get_native_channel_type(u8 nl_channel_type
)
408 switch (nl_channel_type
) {
409 case NL80211_CHAN_NO_HT
:
410 return WLCORE_CHAN_NO_HT
;
411 case NL80211_CHAN_HT20
:
412 return WLCORE_CHAN_HT20
;
413 case NL80211_CHAN_HT40MINUS
:
414 return WLCORE_CHAN_HT40MINUS
;
415 case NL80211_CHAN_HT40PLUS
:
416 return WLCORE_CHAN_HT40PLUS
;
419 return WLCORE_CHAN_NO_HT
;
422 EXPORT_SYMBOL_GPL(wlcore_get_native_channel_type
);
424 static int wl12xx_cmd_role_start_dev(struct wl1271
*wl
,
425 struct wl12xx_vif
*wlvif
,
426 enum nl80211_band band
,
429 struct wl12xx_cmd_role_start
*cmd
;
432 cmd
= kzalloc(sizeof(*cmd
), GFP_KERNEL
);
438 wl1271_debug(DEBUG_CMD
, "cmd role start dev %d", wlvif
->dev_role_id
);
440 cmd
->role_id
= wlvif
->dev_role_id
;
441 if (band
== NL80211_BAND_5GHZ
)
442 cmd
->band
= WLCORE_BAND_5GHZ
;
443 cmd
->channel
= channel
;
445 if (wlvif
->dev_hlid
== WL12XX_INVALID_LINK_ID
) {
446 ret
= wl12xx_allocate_link(wl
, wlvif
, &wlvif
->dev_hlid
);
450 cmd
->device
.hlid
= wlvif
->dev_hlid
;
451 cmd
->device
.session
= wl
->session_ids
[wlvif
->dev_hlid
];
453 wl1271_debug(DEBUG_CMD
, "role start: roleid=%d, hlid=%d, session=%d",
454 cmd
->role_id
, cmd
->device
.hlid
, cmd
->device
.session
);
456 ret
= wl1271_cmd_send(wl
, CMD_ROLE_START
, cmd
, sizeof(*cmd
), 0);
458 wl1271_error("failed to initiate cmd role enable");
465 /* clear links on error */
466 wl12xx_free_link(wl
, wlvif
, &wlvif
->dev_hlid
);
475 static int wl12xx_cmd_role_stop_dev(struct wl1271
*wl
,
476 struct wl12xx_vif
*wlvif
)
478 struct wl12xx_cmd_role_stop
*cmd
;
481 if (WARN_ON(wlvif
->dev_hlid
== WL12XX_INVALID_LINK_ID
))
484 cmd
= kzalloc(sizeof(*cmd
), GFP_KERNEL
);
490 wl1271_debug(DEBUG_CMD
, "cmd role stop dev");
492 cmd
->role_id
= wlvif
->dev_role_id
;
493 cmd
->disc_type
= DISCONNECT_IMMEDIATE
;
494 cmd
->reason
= cpu_to_le16(WLAN_REASON_UNSPECIFIED
);
496 ret
= wl1271_cmd_send(wl
, CMD_ROLE_STOP
, cmd
, sizeof(*cmd
), 0);
498 wl1271_error("failed to initiate cmd role stop");
502 wl12xx_free_link(wl
, wlvif
, &wlvif
->dev_hlid
);
511 int wl12xx_cmd_role_start_sta(struct wl1271
*wl
, struct wl12xx_vif
*wlvif
)
513 struct ieee80211_vif
*vif
= wl12xx_wlvif_to_vif(wlvif
);
514 struct wl12xx_cmd_role_start
*cmd
;
518 cmd
= kzalloc(sizeof(*cmd
), GFP_KERNEL
);
524 wl1271_debug(DEBUG_CMD
, "cmd role start sta %d", wlvif
->role_id
);
526 cmd
->role_id
= wlvif
->role_id
;
527 if (wlvif
->band
== NL80211_BAND_5GHZ
)
528 cmd
->band
= WLCORE_BAND_5GHZ
;
529 cmd
->channel
= wlvif
->channel
;
530 cmd
->sta
.basic_rate_set
= cpu_to_le32(wlvif
->basic_rate_set
);
531 cmd
->sta
.beacon_interval
= cpu_to_le16(wlvif
->beacon_int
);
532 cmd
->sta
.ssid_type
= WL12XX_SSID_TYPE_ANY
;
533 cmd
->sta
.ssid_len
= wlvif
->ssid_len
;
534 memcpy(cmd
->sta
.ssid
, wlvif
->ssid
, wlvif
->ssid_len
);
535 memcpy(cmd
->sta
.bssid
, vif
->bss_conf
.bssid
, ETH_ALEN
);
537 supported_rates
= CONF_TX_ENABLED_RATES
| CONF_TX_MCS_RATES
|
538 wlcore_hw_sta_get_ap_rate_mask(wl
, wlvif
);
540 supported_rates
&= ~CONF_TX_CCK_RATES
;
542 cmd
->sta
.local_rates
= cpu_to_le32(supported_rates
);
544 cmd
->channel_type
= wlcore_get_native_channel_type(wlvif
->channel_type
);
546 if (wlvif
->sta
.hlid
== WL12XX_INVALID_LINK_ID
) {
547 ret
= wl12xx_allocate_link(wl
, wlvif
, &wlvif
->sta
.hlid
);
551 cmd
->sta
.hlid
= wlvif
->sta
.hlid
;
552 cmd
->sta
.session
= wl
->session_ids
[wlvif
->sta
.hlid
];
554 * We don't have the correct remote rates in this stage. The
555 * rates will be reconfigured later, after association, if the
556 * firmware supports ACX_PEER_CAP. Otherwise, there's nothing
557 * we can do, so use all supported_rates here.
559 cmd
->sta
.remote_rates
= cpu_to_le32(supported_rates
);
561 wl1271_debug(DEBUG_CMD
, "role start: roleid=%d, hlid=%d, session=%d "
562 "basic_rate_set: 0x%x, remote_rates: 0x%x",
563 wlvif
->role_id
, cmd
->sta
.hlid
, cmd
->sta
.session
,
564 wlvif
->basic_rate_set
, wlvif
->rate_set
);
566 ret
= wl1271_cmd_send(wl
, CMD_ROLE_START
, cmd
, sizeof(*cmd
), 0);
568 wl1271_error("failed to initiate cmd role start sta");
572 wlvif
->sta
.role_chan_type
= wlvif
->channel_type
;
576 /* clear links on error. */
577 wl12xx_free_link(wl
, wlvif
, &wlvif
->sta
.hlid
);
586 /* use this function to stop ibss as well */
587 int wl12xx_cmd_role_stop_sta(struct wl1271
*wl
, struct wl12xx_vif
*wlvif
)
589 struct wl12xx_cmd_role_stop
*cmd
;
592 if (WARN_ON(wlvif
->sta
.hlid
== WL12XX_INVALID_LINK_ID
))
595 cmd
= kzalloc(sizeof(*cmd
), GFP_KERNEL
);
601 wl1271_debug(DEBUG_CMD
, "cmd role stop sta %d", wlvif
->role_id
);
603 cmd
->role_id
= wlvif
->role_id
;
604 cmd
->disc_type
= DISCONNECT_IMMEDIATE
;
605 cmd
->reason
= cpu_to_le16(WLAN_REASON_UNSPECIFIED
);
607 ret
= wl1271_cmd_send(wl
, CMD_ROLE_STOP
, cmd
, sizeof(*cmd
), 0);
609 wl1271_error("failed to initiate cmd role stop sta");
613 wl12xx_free_link(wl
, wlvif
, &wlvif
->sta
.hlid
);
622 int wl12xx_cmd_role_start_ap(struct wl1271
*wl
, struct wl12xx_vif
*wlvif
)
624 struct wl12xx_cmd_role_start
*cmd
;
625 struct ieee80211_vif
*vif
= wl12xx_wlvif_to_vif(wlvif
);
626 struct ieee80211_bss_conf
*bss_conf
= &vif
->bss_conf
;
630 wl1271_debug(DEBUG_CMD
, "cmd role start ap %d", wlvif
->role_id
);
632 /* If MESH --> ssid_len is always 0 */
633 if (!ieee80211_vif_is_mesh(vif
)) {
634 /* trying to use hidden SSID with an old hostapd version */
635 if (wlvif
->ssid_len
== 0 && !bss_conf
->hidden_ssid
) {
636 wl1271_error("got a null SSID from beacon/bss");
642 cmd
= kzalloc(sizeof(*cmd
), GFP_KERNEL
);
648 ret
= wl12xx_allocate_link(wl
, wlvif
, &wlvif
->ap
.global_hlid
);
652 ret
= wl12xx_allocate_link(wl
, wlvif
, &wlvif
->ap
.bcast_hlid
);
654 goto out_free_global
;
656 /* use the previous security seq, if this is a recovery/resume */
657 wl
->links
[wlvif
->ap
.bcast_hlid
].total_freed_pkts
=
658 wlvif
->total_freed_pkts
;
660 cmd
->role_id
= wlvif
->role_id
;
661 cmd
->ap
.aging_period
= cpu_to_le16(wl
->conf
.tx
.ap_aging_period
);
662 cmd
->ap
.bss_index
= WL1271_AP_BSS_INDEX
;
663 cmd
->ap
.global_hlid
= wlvif
->ap
.global_hlid
;
664 cmd
->ap
.broadcast_hlid
= wlvif
->ap
.bcast_hlid
;
665 cmd
->ap
.global_session_id
= wl
->session_ids
[wlvif
->ap
.global_hlid
];
666 cmd
->ap
.bcast_session_id
= wl
->session_ids
[wlvif
->ap
.bcast_hlid
];
667 cmd
->ap
.basic_rate_set
= cpu_to_le32(wlvif
->basic_rate_set
);
668 cmd
->ap
.beacon_interval
= cpu_to_le16(wlvif
->beacon_int
);
669 cmd
->ap
.dtim_interval
= bss_conf
->dtim_period
;
670 cmd
->ap
.beacon_expiry
= WL1271_AP_DEF_BEACON_EXP
;
671 /* FIXME: Change when adding DFS */
672 cmd
->ap
.reset_tsf
= 1; /* By default reset AP TSF */
673 cmd
->ap
.wmm
= wlvif
->wmm_enabled
;
674 cmd
->channel
= wlvif
->channel
;
675 cmd
->channel_type
= wlcore_get_native_channel_type(wlvif
->channel_type
);
677 if (!bss_conf
->hidden_ssid
) {
678 /* take the SSID from the beacon for backward compatibility */
679 cmd
->ap
.ssid_type
= WL12XX_SSID_TYPE_PUBLIC
;
680 cmd
->ap
.ssid_len
= wlvif
->ssid_len
;
681 memcpy(cmd
->ap
.ssid
, wlvif
->ssid
, wlvif
->ssid_len
);
683 cmd
->ap
.ssid_type
= WL12XX_SSID_TYPE_HIDDEN
;
684 cmd
->ap
.ssid_len
= bss_conf
->ssid_len
;
685 memcpy(cmd
->ap
.ssid
, bss_conf
->ssid
, bss_conf
->ssid_len
);
688 supported_rates
= CONF_TX_ENABLED_RATES
| CONF_TX_MCS_RATES
|
689 wlcore_hw_ap_get_mimo_wide_rate_mask(wl
, wlvif
);
691 supported_rates
&= ~CONF_TX_CCK_RATES
;
693 wl1271_debug(DEBUG_CMD
, "cmd role start ap with supported_rates 0x%08x",
696 cmd
->ap
.local_rates
= cpu_to_le32(supported_rates
);
698 switch (wlvif
->band
) {
699 case NL80211_BAND_2GHZ
:
700 cmd
->band
= WLCORE_BAND_2_4GHZ
;
702 case NL80211_BAND_5GHZ
:
703 cmd
->band
= WLCORE_BAND_5GHZ
;
706 wl1271_warning("ap start - unknown band: %d", (int)wlvif
->band
);
707 cmd
->band
= WLCORE_BAND_2_4GHZ
;
711 ret
= wl1271_cmd_send(wl
, CMD_ROLE_START
, cmd
, sizeof(*cmd
), 0);
713 wl1271_error("failed to initiate cmd role start ap");
720 wl12xx_free_link(wl
, wlvif
, &wlvif
->ap
.bcast_hlid
);
723 wl12xx_free_link(wl
, wlvif
, &wlvif
->ap
.global_hlid
);
732 int wl12xx_cmd_role_stop_ap(struct wl1271
*wl
, struct wl12xx_vif
*wlvif
)
734 struct wl12xx_cmd_role_stop
*cmd
;
737 cmd
= kzalloc(sizeof(*cmd
), GFP_KERNEL
);
743 wl1271_debug(DEBUG_CMD
, "cmd role stop ap %d", wlvif
->role_id
);
745 cmd
->role_id
= wlvif
->role_id
;
747 ret
= wl1271_cmd_send(wl
, CMD_ROLE_STOP
, cmd
, sizeof(*cmd
), 0);
749 wl1271_error("failed to initiate cmd role stop ap");
753 wl12xx_free_link(wl
, wlvif
, &wlvif
->ap
.bcast_hlid
);
754 wl12xx_free_link(wl
, wlvif
, &wlvif
->ap
.global_hlid
);
763 int wl12xx_cmd_role_start_ibss(struct wl1271
*wl
, struct wl12xx_vif
*wlvif
)
765 struct ieee80211_vif
*vif
= wl12xx_wlvif_to_vif(wlvif
);
766 struct wl12xx_cmd_role_start
*cmd
;
767 struct ieee80211_bss_conf
*bss_conf
= &vif
->bss_conf
;
770 cmd
= kzalloc(sizeof(*cmd
), GFP_KERNEL
);
776 wl1271_debug(DEBUG_CMD
, "cmd role start ibss %d", wlvif
->role_id
);
778 cmd
->role_id
= wlvif
->role_id
;
779 if (wlvif
->band
== NL80211_BAND_5GHZ
)
780 cmd
->band
= WLCORE_BAND_5GHZ
;
781 cmd
->channel
= wlvif
->channel
;
782 cmd
->ibss
.basic_rate_set
= cpu_to_le32(wlvif
->basic_rate_set
);
783 cmd
->ibss
.beacon_interval
= cpu_to_le16(wlvif
->beacon_int
);
784 cmd
->ibss
.dtim_interval
= bss_conf
->dtim_period
;
785 cmd
->ibss
.ssid_type
= WL12XX_SSID_TYPE_ANY
;
786 cmd
->ibss
.ssid_len
= wlvif
->ssid_len
;
787 memcpy(cmd
->ibss
.ssid
, wlvif
->ssid
, wlvif
->ssid_len
);
788 memcpy(cmd
->ibss
.bssid
, vif
->bss_conf
.bssid
, ETH_ALEN
);
789 cmd
->sta
.local_rates
= cpu_to_le32(wlvif
->rate_set
);
791 if (wlvif
->sta
.hlid
== WL12XX_INVALID_LINK_ID
) {
792 ret
= wl12xx_allocate_link(wl
, wlvif
, &wlvif
->sta
.hlid
);
796 cmd
->ibss
.hlid
= wlvif
->sta
.hlid
;
797 cmd
->ibss
.remote_rates
= cpu_to_le32(wlvif
->rate_set
);
799 wl1271_debug(DEBUG_CMD
, "role start: roleid=%d, hlid=%d, session=%d "
800 "basic_rate_set: 0x%x, remote_rates: 0x%x",
801 wlvif
->role_id
, cmd
->sta
.hlid
, cmd
->sta
.session
,
802 wlvif
->basic_rate_set
, wlvif
->rate_set
);
804 wl1271_debug(DEBUG_CMD
, "vif->bss_conf.bssid = %pM",
805 vif
->bss_conf
.bssid
);
807 ret
= wl1271_cmd_send(wl
, CMD_ROLE_START
, cmd
, sizeof(*cmd
), 0);
809 wl1271_error("failed to initiate cmd role enable");
816 /* clear links on error. */
817 wl12xx_free_link(wl
, wlvif
, &wlvif
->sta
.hlid
);
828 * send test command to firmware
831 * @buf: buffer containing the command, with all headers, must work with dma
832 * @len: length of the buffer
833 * @answer: is answer needed
835 int wl1271_cmd_test(struct wl1271
*wl
, void *buf
, size_t buf_len
, u8 answer
)
840 wl1271_debug(DEBUG_CMD
, "cmd test");
845 ret
= wl1271_cmd_send(wl
, CMD_TEST
, buf
, buf_len
, res_len
);
848 wl1271_warning("TEST command failed");
854 EXPORT_SYMBOL_GPL(wl1271_cmd_test
);
857 * read acx from firmware
861 * @buf: buffer for the response, including all headers, must work with dma
862 * @len: length of buf
864 int wl1271_cmd_interrogate(struct wl1271
*wl
, u16 id
, void *buf
,
865 size_t cmd_len
, size_t res_len
)
867 struct acx_header
*acx
= buf
;
870 wl1271_debug(DEBUG_CMD
, "cmd interrogate");
872 acx
->id
= cpu_to_le16(id
);
874 /* response payload length, does not include any headers */
875 acx
->len
= cpu_to_le16(res_len
- sizeof(*acx
));
877 ret
= wl1271_cmd_send(wl
, CMD_INTERROGATE
, acx
, cmd_len
, res_len
);
879 wl1271_error("INTERROGATE command failed");
885 * write acx value to firmware
889 * @buf: buffer containing acx, including all headers, must work with dma
890 * @len: length of buf
891 * @valid_rets: bitmap of valid cmd status codes (i.e. return values).
892 * return the cmd status on success.
894 int wlcore_cmd_configure_failsafe(struct wl1271
*wl
, u16 id
, void *buf
,
895 size_t len
, unsigned long valid_rets
)
897 struct acx_header
*acx
= buf
;
900 wl1271_debug(DEBUG_CMD
, "cmd configure (%d)", id
);
902 if (WARN_ON_ONCE(len
< sizeof(*acx
)))
905 acx
->id
= cpu_to_le16(id
);
907 /* payload length, does not include any headers */
908 acx
->len
= cpu_to_le16(len
- sizeof(*acx
));
910 ret
= wlcore_cmd_send_failsafe(wl
, CMD_CONFIGURE
, acx
, len
, 0,
913 wl1271_warning("CONFIGURE command NOK");
921 * wrapper for wlcore_cmd_configure that accepts only success status.
922 * return 0 on success
924 int wl1271_cmd_configure(struct wl1271
*wl
, u16 id
, void *buf
, size_t len
)
926 int ret
= wlcore_cmd_configure_failsafe(wl
, id
, buf
, len
, 0);
932 EXPORT_SYMBOL_GPL(wl1271_cmd_configure
);
934 int wl1271_cmd_data_path(struct wl1271
*wl
, bool enable
)
936 struct cmd_enabledisable_path
*cmd
;
940 wl1271_debug(DEBUG_CMD
, "cmd data path");
942 cmd
= kzalloc(sizeof(*cmd
), GFP_KERNEL
);
948 /* the channel here is only used for calibration, so hardcoded to 1 */
952 cmd_rx
= CMD_ENABLE_RX
;
953 cmd_tx
= CMD_ENABLE_TX
;
955 cmd_rx
= CMD_DISABLE_RX
;
956 cmd_tx
= CMD_DISABLE_TX
;
959 ret
= wl1271_cmd_send(wl
, cmd_rx
, cmd
, sizeof(*cmd
), 0);
961 wl1271_error("rx %s cmd for channel %d failed",
962 enable
? "start" : "stop", cmd
->channel
);
966 wl1271_debug(DEBUG_BOOT
, "rx %s cmd channel %d",
967 enable
? "start" : "stop", cmd
->channel
);
969 ret
= wl1271_cmd_send(wl
, cmd_tx
, cmd
, sizeof(*cmd
), 0);
971 wl1271_error("tx %s cmd for channel %d failed",
972 enable
? "start" : "stop", cmd
->channel
);
976 wl1271_debug(DEBUG_BOOT
, "tx %s cmd channel %d",
977 enable
? "start" : "stop", cmd
->channel
);
983 EXPORT_SYMBOL_GPL(wl1271_cmd_data_path
);
985 int wl1271_cmd_ps_mode(struct wl1271
*wl
, struct wl12xx_vif
*wlvif
,
986 u8 ps_mode
, u16 auto_ps_timeout
)
988 struct wl1271_cmd_ps_params
*ps_params
= NULL
;
991 wl1271_debug(DEBUG_CMD
, "cmd set ps mode");
993 ps_params
= kzalloc(sizeof(*ps_params
), GFP_KERNEL
);
999 ps_params
->role_id
= wlvif
->role_id
;
1000 ps_params
->ps_mode
= ps_mode
;
1001 ps_params
->auto_ps_timeout
= auto_ps_timeout
;
1003 ret
= wl1271_cmd_send(wl
, CMD_SET_PS_MODE
, ps_params
,
1004 sizeof(*ps_params
), 0);
1006 wl1271_error("cmd set_ps_mode failed");
1015 int wl1271_cmd_template_set(struct wl1271
*wl
, u8 role_id
,
1016 u16 template_id
, void *buf
, size_t buf_len
,
1017 int index
, u32 rates
)
1019 struct wl1271_cmd_template_set
*cmd
;
1022 wl1271_debug(DEBUG_CMD
, "cmd template_set %d (role %d)",
1023 template_id
, role_id
);
1025 WARN_ON(buf_len
> WL1271_CMD_TEMPL_MAX_SIZE
);
1026 buf_len
= min_t(size_t, buf_len
, WL1271_CMD_TEMPL_MAX_SIZE
);
1028 cmd
= kzalloc(sizeof(*cmd
), GFP_KERNEL
);
1034 /* during initialization wlvif is NULL */
1035 cmd
->role_id
= role_id
;
1036 cmd
->len
= cpu_to_le16(buf_len
);
1037 cmd
->template_type
= template_id
;
1038 cmd
->enabled_rates
= cpu_to_le32(rates
);
1039 cmd
->short_retry_limit
= wl
->conf
.tx
.tmpl_short_retry_limit
;
1040 cmd
->long_retry_limit
= wl
->conf
.tx
.tmpl_long_retry_limit
;
1044 memcpy(cmd
->template_data
, buf
, buf_len
);
1046 ret
= wl1271_cmd_send(wl
, CMD_SET_TEMPLATE
, cmd
, sizeof(*cmd
), 0);
1048 wl1271_warning("cmd set_template failed: %d", ret
);
1059 int wl12xx_cmd_build_null_data(struct wl1271
*wl
, struct wl12xx_vif
*wlvif
)
1061 struct sk_buff
*skb
= NULL
;
1067 if (wlvif
->bss_type
== BSS_TYPE_IBSS
) {
1068 size
= sizeof(struct wl12xx_null_data_template
);
1071 skb
= ieee80211_nullfunc_get(wl
->hw
,
1072 wl12xx_wlvif_to_vif(wlvif
));
1079 ret
= wl1271_cmd_template_set(wl
, wlvif
->role_id
,
1080 CMD_TEMPL_NULL_DATA
, ptr
, size
, 0,
1086 wl1271_warning("cmd buld null data failed %d", ret
);
1092 int wl12xx_cmd_build_klv_null_data(struct wl1271
*wl
,
1093 struct wl12xx_vif
*wlvif
)
1095 struct ieee80211_vif
*vif
= wl12xx_wlvif_to_vif(wlvif
);
1096 struct sk_buff
*skb
= NULL
;
1099 skb
= ieee80211_nullfunc_get(wl
->hw
, vif
);
1103 ret
= wl1271_cmd_template_set(wl
, wlvif
->role_id
, CMD_TEMPL_KLV
,
1104 skb
->data
, skb
->len
,
1105 wlvif
->sta
.klv_template_id
,
1111 wl1271_warning("cmd build klv null data failed %d", ret
);
1117 int wl1271_cmd_build_ps_poll(struct wl1271
*wl
, struct wl12xx_vif
*wlvif
,
1120 struct ieee80211_vif
*vif
= wl12xx_wlvif_to_vif(wlvif
);
1121 struct sk_buff
*skb
;
1124 skb
= ieee80211_pspoll_get(wl
->hw
, vif
);
1128 ret
= wl1271_cmd_template_set(wl
, wlvif
->role_id
,
1129 CMD_TEMPL_PS_POLL
, skb
->data
,
1130 skb
->len
, 0, wlvif
->basic_rate_set
);
1137 int wl12xx_cmd_build_probe_req(struct wl1271
*wl
, struct wl12xx_vif
*wlvif
,
1138 u8 role_id
, u8 band
,
1139 const u8
*ssid
, size_t ssid_len
,
1140 const u8
*ie0
, size_t ie0_len
, const u8
*ie1
,
1141 size_t ie1_len
, bool sched_scan
)
1143 struct ieee80211_vif
*vif
= wl12xx_wlvif_to_vif(wlvif
);
1144 struct sk_buff
*skb
;
1147 u16 template_id_2_4
= wl
->scan_templ_id_2_4
;
1148 u16 template_id_5
= wl
->scan_templ_id_5
;
1150 wl1271_debug(DEBUG_SCAN
, "build probe request band %d", band
);
1152 skb
= ieee80211_probereq_get(wl
->hw
, vif
->addr
, ssid
, ssid_len
,
1159 memcpy(skb_put(skb
, ie0_len
), ie0
, ie0_len
);
1161 memcpy(skb_put(skb
, ie1_len
), ie1
, ie1_len
);
1164 (wl
->quirks
& WLCORE_QUIRK_DUAL_PROBE_TMPL
)) {
1165 template_id_2_4
= wl
->sched_scan_templ_id_2_4
;
1166 template_id_5
= wl
->sched_scan_templ_id_5
;
1169 rate
= wl1271_tx_min_rate_get(wl
, wlvif
->bitrate_masks
[band
]);
1170 if (band
== NL80211_BAND_2GHZ
)
1171 ret
= wl1271_cmd_template_set(wl
, role_id
,
1173 skb
->data
, skb
->len
, 0, rate
);
1175 ret
= wl1271_cmd_template_set(wl
, role_id
,
1177 skb
->data
, skb
->len
, 0, rate
);
1183 EXPORT_SYMBOL_GPL(wl12xx_cmd_build_probe_req
);
1185 struct sk_buff
*wl1271_cmd_build_ap_probe_req(struct wl1271
*wl
,
1186 struct wl12xx_vif
*wlvif
,
1187 struct sk_buff
*skb
)
1189 struct ieee80211_vif
*vif
= wl12xx_wlvif_to_vif(wlvif
);
1194 skb
= ieee80211_ap_probereq_get(wl
->hw
, vif
);
1198 wl1271_debug(DEBUG_SCAN
, "set ap probe request template");
1200 rate
= wl1271_tx_min_rate_get(wl
, wlvif
->bitrate_masks
[wlvif
->band
]);
1201 if (wlvif
->band
== NL80211_BAND_2GHZ
)
1202 ret
= wl1271_cmd_template_set(wl
, wlvif
->role_id
,
1203 CMD_TEMPL_CFG_PROBE_REQ_2_4
,
1204 skb
->data
, skb
->len
, 0, rate
);
1206 ret
= wl1271_cmd_template_set(wl
, wlvif
->role_id
,
1207 CMD_TEMPL_CFG_PROBE_REQ_5
,
1208 skb
->data
, skb
->len
, 0, rate
);
1211 wl1271_error("Unable to set ap probe request template.");
1217 int wl1271_cmd_build_arp_rsp(struct wl1271
*wl
, struct wl12xx_vif
*wlvif
)
1221 struct ieee80211_vif
*vif
= wl12xx_wlvif_to_vif(wlvif
);
1222 struct sk_buff
*skb
;
1223 struct wl12xx_arp_rsp_template
*tmpl
;
1224 struct ieee80211_hdr_3addr
*hdr
;
1225 struct arphdr
*arp_hdr
;
1227 skb
= dev_alloc_skb(sizeof(*hdr
) + sizeof(__le16
) + sizeof(*tmpl
) +
1228 WL1271_EXTRA_SPACE_MAX
);
1230 wl1271_error("failed to allocate buffer for arp rsp template");
1234 skb_reserve(skb
, sizeof(*hdr
) + WL1271_EXTRA_SPACE_MAX
);
1236 tmpl
= (struct wl12xx_arp_rsp_template
*)skb_put(skb
, sizeof(*tmpl
));
1237 memset(tmpl
, 0, sizeof(*tmpl
));
1240 memcpy(tmpl
->llc_hdr
, rfc1042_header
, sizeof(rfc1042_header
));
1241 tmpl
->llc_type
= cpu_to_be16(ETH_P_ARP
);
1244 arp_hdr
= &tmpl
->arp_hdr
;
1245 arp_hdr
->ar_hrd
= cpu_to_be16(ARPHRD_ETHER
);
1246 arp_hdr
->ar_pro
= cpu_to_be16(ETH_P_IP
);
1247 arp_hdr
->ar_hln
= ETH_ALEN
;
1248 arp_hdr
->ar_pln
= 4;
1249 arp_hdr
->ar_op
= cpu_to_be16(ARPOP_REPLY
);
1252 memcpy(tmpl
->sender_hw
, vif
->addr
, ETH_ALEN
);
1253 tmpl
->sender_ip
= wlvif
->ip_addr
;
1255 /* encryption space */
1256 switch (wlvif
->encryption_type
) {
1258 if (wl
->quirks
& WLCORE_QUIRK_TKIP_HEADER_SPACE
)
1259 extra
= WL1271_EXTRA_SPACE_TKIP
;
1262 extra
= WL1271_EXTRA_SPACE_AES
;
1270 wl1271_warning("Unknown encryption type: %d",
1271 wlvif
->encryption_type
);
1277 u8
*space
= skb_push(skb
, extra
);
1278 memset(space
, 0, extra
);
1281 /* QoS header - BE */
1283 memset(skb_push(skb
, sizeof(__le16
)), 0, sizeof(__le16
));
1285 /* mac80211 header */
1286 hdr
= (struct ieee80211_hdr_3addr
*)skb_push(skb
, sizeof(*hdr
));
1287 memset(hdr
, 0, sizeof(*hdr
));
1288 fc
= IEEE80211_FTYPE_DATA
| IEEE80211_FCTL_TODS
;
1290 fc
|= IEEE80211_STYPE_QOS_DATA
;
1292 fc
|= IEEE80211_STYPE_DATA
;
1293 if (wlvif
->encryption_type
!= KEY_NONE
)
1294 fc
|= IEEE80211_FCTL_PROTECTED
;
1296 hdr
->frame_control
= cpu_to_le16(fc
);
1297 memcpy(hdr
->addr1
, vif
->bss_conf
.bssid
, ETH_ALEN
);
1298 memcpy(hdr
->addr2
, vif
->addr
, ETH_ALEN
);
1299 eth_broadcast_addr(hdr
->addr3
);
1301 ret
= wl1271_cmd_template_set(wl
, wlvif
->role_id
, CMD_TEMPL_ARP_RSP
,
1302 skb
->data
, skb
->len
, 0,
1309 int wl1271_build_qos_null_data(struct wl1271
*wl
, struct ieee80211_vif
*vif
)
1311 struct wl12xx_vif
*wlvif
= wl12xx_vif_to_data(vif
);
1312 struct ieee80211_qos_hdr
template;
1314 memset(&template, 0, sizeof(template));
1316 memcpy(template.addr1
, vif
->bss_conf
.bssid
, ETH_ALEN
);
1317 memcpy(template.addr2
, vif
->addr
, ETH_ALEN
);
1318 memcpy(template.addr3
, vif
->bss_conf
.bssid
, ETH_ALEN
);
1320 template.frame_control
= cpu_to_le16(IEEE80211_FTYPE_DATA
|
1321 IEEE80211_STYPE_QOS_NULLFUNC
|
1322 IEEE80211_FCTL_TODS
);
1324 /* FIXME: not sure what priority to use here */
1325 template.qos_ctrl
= cpu_to_le16(0);
1327 return wl1271_cmd_template_set(wl
, wlvif
->role_id
,
1328 CMD_TEMPL_QOS_NULL_DATA
, &template,
1329 sizeof(template), 0,
1333 int wl12xx_cmd_set_default_wep_key(struct wl1271
*wl
, u8 id
, u8 hlid
)
1335 struct wl1271_cmd_set_keys
*cmd
;
1338 wl1271_debug(DEBUG_CMD
, "cmd set_default_wep_key %d", id
);
1340 cmd
= kzalloc(sizeof(*cmd
), GFP_KERNEL
);
1348 cmd
->lid_key_type
= WEP_DEFAULT_LID_TYPE
;
1349 cmd
->key_action
= cpu_to_le16(KEY_SET_ID
);
1350 cmd
->key_type
= KEY_WEP
;
1352 ret
= wl1271_cmd_send(wl
, CMD_SET_KEYS
, cmd
, sizeof(*cmd
), 0);
1354 wl1271_warning("cmd set_default_wep_key failed: %d", ret
);
1364 int wl1271_cmd_set_sta_key(struct wl1271
*wl
, struct wl12xx_vif
*wlvif
,
1365 u16 action
, u8 id
, u8 key_type
,
1366 u8 key_size
, const u8
*key
, const u8
*addr
,
1367 u32 tx_seq_32
, u16 tx_seq_16
)
1369 struct wl1271_cmd_set_keys
*cmd
;
1372 /* hlid might have already been deleted */
1373 if (wlvif
->sta
.hlid
== WL12XX_INVALID_LINK_ID
)
1376 cmd
= kzalloc(sizeof(*cmd
), GFP_KERNEL
);
1382 cmd
->hlid
= wlvif
->sta
.hlid
;
1384 if (key_type
== KEY_WEP
)
1385 cmd
->lid_key_type
= WEP_DEFAULT_LID_TYPE
;
1386 else if (is_broadcast_ether_addr(addr
))
1387 cmd
->lid_key_type
= BROADCAST_LID_TYPE
;
1389 cmd
->lid_key_type
= UNICAST_LID_TYPE
;
1391 cmd
->key_action
= cpu_to_le16(action
);
1392 cmd
->key_size
= key_size
;
1393 cmd
->key_type
= key_type
;
1395 cmd
->ac_seq_num16
[0] = cpu_to_le16(tx_seq_16
);
1396 cmd
->ac_seq_num32
[0] = cpu_to_le32(tx_seq_32
);
1400 if (key_type
== KEY_TKIP
) {
1402 * We get the key in the following form:
1403 * TKIP (16 bytes) - TX MIC (8 bytes) - RX MIC (8 bytes)
1404 * but the target is expecting:
1405 * TKIP - RX MIC - TX MIC
1407 memcpy(cmd
->key
, key
, 16);
1408 memcpy(cmd
->key
+ 16, key
+ 24, 8);
1409 memcpy(cmd
->key
+ 24, key
+ 16, 8);
1412 memcpy(cmd
->key
, key
, key_size
);
1415 wl1271_dump(DEBUG_CRYPT
, "TARGET KEY: ", cmd
, sizeof(*cmd
));
1417 ret
= wl1271_cmd_send(wl
, CMD_SET_KEYS
, cmd
, sizeof(*cmd
), 0);
1419 wl1271_warning("could not set keys");
1430 * TODO: merge with sta/ibss into 1 set_key function.
1431 * note there are slight diffs
1433 int wl1271_cmd_set_ap_key(struct wl1271
*wl
, struct wl12xx_vif
*wlvif
,
1434 u16 action
, u8 id
, u8 key_type
,
1435 u8 key_size
, const u8
*key
, u8 hlid
, u32 tx_seq_32
,
1438 struct wl1271_cmd_set_keys
*cmd
;
1442 cmd
= kzalloc(sizeof(*cmd
), GFP_KERNEL
);
1446 if (hlid
== wlvif
->ap
.bcast_hlid
) {
1447 if (key_type
== KEY_WEP
)
1448 lid_type
= WEP_DEFAULT_LID_TYPE
;
1450 lid_type
= BROADCAST_LID_TYPE
;
1452 lid_type
= UNICAST_LID_TYPE
;
1455 wl1271_debug(DEBUG_CRYPT
, "ap key action: %d id: %d lid: %d type: %d"
1456 " hlid: %d", (int)action
, (int)id
, (int)lid_type
,
1457 (int)key_type
, (int)hlid
);
1459 cmd
->lid_key_type
= lid_type
;
1461 cmd
->key_action
= cpu_to_le16(action
);
1462 cmd
->key_size
= key_size
;
1463 cmd
->key_type
= key_type
;
1465 cmd
->ac_seq_num16
[0] = cpu_to_le16(tx_seq_16
);
1466 cmd
->ac_seq_num32
[0] = cpu_to_le32(tx_seq_32
);
1468 if (key_type
== KEY_TKIP
) {
1470 * We get the key in the following form:
1471 * TKIP (16 bytes) - TX MIC (8 bytes) - RX MIC (8 bytes)
1472 * but the target is expecting:
1473 * TKIP - RX MIC - TX MIC
1475 memcpy(cmd
->key
, key
, 16);
1476 memcpy(cmd
->key
+ 16, key
+ 24, 8);
1477 memcpy(cmd
->key
+ 24, key
+ 16, 8);
1479 memcpy(cmd
->key
, key
, key_size
);
1482 wl1271_dump(DEBUG_CRYPT
, "TARGET AP KEY: ", cmd
, sizeof(*cmd
));
1484 ret
= wl1271_cmd_send(wl
, CMD_SET_KEYS
, cmd
, sizeof(*cmd
), 0);
1486 wl1271_warning("could not set ap keys");
1495 int wl12xx_cmd_set_peer_state(struct wl1271
*wl
, struct wl12xx_vif
*wlvif
,
1498 struct wl12xx_cmd_set_peer_state
*cmd
;
1501 wl1271_debug(DEBUG_CMD
, "cmd set peer state (hlid=%d)", hlid
);
1503 cmd
= kzalloc(sizeof(*cmd
), GFP_KERNEL
);
1510 cmd
->state
= WL1271_CMD_STA_STATE_CONNECTED
;
1512 /* wmm param is valid only for station role */
1513 if (wlvif
->bss_type
== BSS_TYPE_STA_BSS
)
1514 cmd
->wmm
= wlvif
->wmm_enabled
;
1516 ret
= wl1271_cmd_send(wl
, CMD_SET_PEER_STATE
, cmd
, sizeof(*cmd
), 0);
1518 wl1271_error("failed to send set peer state command");
1529 int wl12xx_cmd_add_peer(struct wl1271
*wl
, struct wl12xx_vif
*wlvif
,
1530 struct ieee80211_sta
*sta
, u8 hlid
)
1532 struct wl12xx_cmd_add_peer
*cmd
;
1536 wl1271_debug(DEBUG_CMD
, "cmd add peer %d", (int)hlid
);
1538 cmd
= kzalloc(sizeof(*cmd
), GFP_KERNEL
);
1544 memcpy(cmd
->addr
, sta
->addr
, ETH_ALEN
);
1545 cmd
->bss_index
= WL1271_AP_BSS_INDEX
;
1546 cmd
->aid
= sta
->aid
;
1548 cmd
->sp_len
= sta
->max_sp
;
1549 cmd
->wmm
= sta
->wme
? 1 : 0;
1550 cmd
->session_id
= wl
->session_ids
[hlid
];
1551 cmd
->role_id
= wlvif
->role_id
;
1553 for (i
= 0; i
< NUM_ACCESS_CATEGORIES_COPY
; i
++)
1554 if (sta
->wme
&& (sta
->uapsd_queues
& BIT(i
)))
1555 cmd
->psd_type
[NUM_ACCESS_CATEGORIES_COPY
-1-i
] =
1556 WL1271_PSD_UPSD_TRIGGER
;
1558 cmd
->psd_type
[NUM_ACCESS_CATEGORIES_COPY
-1-i
] =
1562 sta_rates
= sta
->supp_rates
[wlvif
->band
];
1563 if (sta
->ht_cap
.ht_supported
)
1565 (sta
->ht_cap
.mcs
.rx_mask
[0] << HW_HT_RATES_OFFSET
) |
1566 (sta
->ht_cap
.mcs
.rx_mask
[1] << HW_MIMO_RATES_OFFSET
);
1568 cmd
->supported_rates
=
1569 cpu_to_le32(wl1271_tx_enabled_rates_get(wl
, sta_rates
,
1572 if (!cmd
->supported_rates
) {
1573 wl1271_debug(DEBUG_CMD
,
1574 "peer has no supported rates yet, configuring basic rates: 0x%x",
1575 wlvif
->basic_rate_set
);
1576 cmd
->supported_rates
= cpu_to_le32(wlvif
->basic_rate_set
);
1579 wl1271_debug(DEBUG_CMD
, "new peer rates=0x%x queues=0x%x",
1580 cmd
->supported_rates
, sta
->uapsd_queues
);
1582 ret
= wl1271_cmd_send(wl
, CMD_ADD_PEER
, cmd
, sizeof(*cmd
), 0);
1584 wl1271_error("failed to initiate cmd add peer");
1595 int wl12xx_cmd_remove_peer(struct wl1271
*wl
, struct wl12xx_vif
*wlvif
,
1598 struct wl12xx_cmd_remove_peer
*cmd
;
1600 bool timeout
= false;
1602 wl1271_debug(DEBUG_CMD
, "cmd remove peer %d", (int)hlid
);
1604 cmd
= kzalloc(sizeof(*cmd
), GFP_KERNEL
);
1611 /* We never send a deauth, mac80211 is in charge of this */
1612 cmd
->reason_opcode
= 0;
1613 cmd
->send_deauth_flag
= 0;
1614 cmd
->role_id
= wlvif
->role_id
;
1616 ret
= wl1271_cmd_send(wl
, CMD_REMOVE_PEER
, cmd
, sizeof(*cmd
), 0);
1618 wl1271_error("failed to initiate cmd remove peer");
1622 ret
= wl
->ops
->wait_for_event(wl
,
1623 WLCORE_EVENT_PEER_REMOVE_COMPLETE
,
1627 * We are ok with a timeout here. The event is sometimes not sent
1628 * due to a firmware bug. In case of another error (like SDIO timeout)
1632 wl12xx_queue_recovery_work(wl
);
1641 static int wlcore_get_reg_conf_ch_idx(enum nl80211_band band
, u16 ch
)
1644 * map the given band/channel to the respective predefined
1645 * bit expected by the fw
1648 case NL80211_BAND_2GHZ
:
1649 /* channels 1..14 are mapped to 0..13 */
1650 if (ch
>= 1 && ch
<= 14)
1653 case NL80211_BAND_5GHZ
:
1656 /* channels 8,12,16 are mapped to 18,19,20 */
1657 return 18 + (ch
-8)/4;
1659 /* channels 34,36..48 are mapped to 21..28 */
1660 return 21 + (ch
-34)/2;
1662 /* channels 52,56..64 are mapped to 29..32 */
1663 return 29 + (ch
-52)/4;
1665 /* channels 100,104..140 are mapped to 33..43 */
1666 return 33 + (ch
-100)/4;
1668 /* channels 149,153..165 are mapped to 44..48 */
1669 return 44 + (ch
-149)/4;
1678 wl1271_error("%s: unknown band/channel: %d/%d", __func__
, band
, ch
);
1682 void wlcore_set_pending_regdomain_ch(struct wl1271
*wl
, u16 channel
,
1683 enum nl80211_band band
)
1687 if (!(wl
->quirks
& WLCORE_QUIRK_REGDOMAIN_CONF
))
1690 ch_bit_idx
= wlcore_get_reg_conf_ch_idx(band
, channel
);
1692 if (ch_bit_idx
>= 0 && ch_bit_idx
<= WL1271_MAX_CHANNELS
)
1693 set_bit(ch_bit_idx
, (long *)wl
->reg_ch_conf_pending
);
1696 int wlcore_cmd_regdomain_config_locked(struct wl1271
*wl
)
1698 struct wl12xx_cmd_regdomain_dfs_config
*cmd
= NULL
;
1699 int ret
= 0, i
, b
, ch_bit_idx
;
1700 u32 tmp_ch_bitmap
[2];
1701 struct wiphy
*wiphy
= wl
->hw
->wiphy
;
1702 struct ieee80211_supported_band
*band
;
1703 bool timeout
= false;
1705 if (!(wl
->quirks
& WLCORE_QUIRK_REGDOMAIN_CONF
))
1708 wl1271_debug(DEBUG_CMD
, "cmd reg domain config");
1710 memset(tmp_ch_bitmap
, 0, sizeof(tmp_ch_bitmap
));
1712 for (b
= NL80211_BAND_2GHZ
; b
<= NL80211_BAND_5GHZ
; b
++) {
1713 band
= wiphy
->bands
[b
];
1714 for (i
= 0; i
< band
->n_channels
; i
++) {
1715 struct ieee80211_channel
*channel
= &band
->channels
[i
];
1716 u16 ch
= channel
->hw_value
;
1717 u32 flags
= channel
->flags
;
1719 if (flags
& (IEEE80211_CHAN_DISABLED
|
1720 IEEE80211_CHAN_NO_IR
))
1723 if ((flags
& IEEE80211_CHAN_RADAR
) &&
1724 channel
->dfs_state
!= NL80211_DFS_AVAILABLE
)
1727 ch_bit_idx
= wlcore_get_reg_conf_ch_idx(b
, ch
);
1731 set_bit(ch_bit_idx
, (long *)tmp_ch_bitmap
);
1735 tmp_ch_bitmap
[0] |= wl
->reg_ch_conf_pending
[0];
1736 tmp_ch_bitmap
[1] |= wl
->reg_ch_conf_pending
[1];
1738 if (!memcmp(tmp_ch_bitmap
, wl
->reg_ch_conf_last
, sizeof(tmp_ch_bitmap
)))
1741 cmd
= kzalloc(sizeof(*cmd
), GFP_KERNEL
);
1747 cmd
->ch_bit_map1
= cpu_to_le32(tmp_ch_bitmap
[0]);
1748 cmd
->ch_bit_map2
= cpu_to_le32(tmp_ch_bitmap
[1]);
1749 cmd
->dfs_region
= wl
->dfs_region
;
1751 wl1271_debug(DEBUG_CMD
,
1752 "cmd reg domain bitmap1: 0x%08x, bitmap2: 0x%08x",
1753 cmd
->ch_bit_map1
, cmd
->ch_bit_map2
);
1755 ret
= wl1271_cmd_send(wl
, CMD_DFS_CHANNEL_CONFIG
, cmd
, sizeof(*cmd
), 0);
1757 wl1271_error("failed to send reg domain dfs config");
1761 ret
= wl
->ops
->wait_for_event(wl
,
1762 WLCORE_EVENT_DFS_CONFIG_COMPLETE
,
1764 if (ret
< 0 || timeout
) {
1765 wl1271_error("reg domain conf %serror",
1766 timeout
? "completion " : "");
1767 ret
= timeout
? -ETIMEDOUT
: ret
;
1771 memcpy(wl
->reg_ch_conf_last
, tmp_ch_bitmap
, sizeof(tmp_ch_bitmap
));
1772 memset(wl
->reg_ch_conf_pending
, 0, sizeof(wl
->reg_ch_conf_pending
));
1779 int wl12xx_cmd_config_fwlog(struct wl1271
*wl
)
1781 struct wl12xx_cmd_config_fwlog
*cmd
;
1784 wl1271_debug(DEBUG_CMD
, "cmd config firmware logger");
1786 cmd
= kzalloc(sizeof(*cmd
), GFP_KERNEL
);
1792 cmd
->logger_mode
= wl
->conf
.fwlog
.mode
;
1793 cmd
->log_severity
= wl
->conf
.fwlog
.severity
;
1794 cmd
->timestamp
= wl
->conf
.fwlog
.timestamp
;
1795 cmd
->output
= wl
->conf
.fwlog
.output
;
1796 cmd
->threshold
= wl
->conf
.fwlog
.threshold
;
1798 ret
= wl1271_cmd_send(wl
, CMD_CONFIG_FWLOGGER
, cmd
, sizeof(*cmd
), 0);
1800 wl1271_error("failed to send config firmware logger command");
1811 int wl12xx_cmd_start_fwlog(struct wl1271
*wl
)
1813 struct wl12xx_cmd_start_fwlog
*cmd
;
1816 wl1271_debug(DEBUG_CMD
, "cmd start firmware logger");
1818 cmd
= kzalloc(sizeof(*cmd
), GFP_KERNEL
);
1824 ret
= wl1271_cmd_send(wl
, CMD_START_FWLOGGER
, cmd
, sizeof(*cmd
), 0);
1826 wl1271_error("failed to send start firmware logger command");
1837 int wl12xx_cmd_stop_fwlog(struct wl1271
*wl
)
1839 struct wl12xx_cmd_stop_fwlog
*cmd
;
1842 wl1271_debug(DEBUG_CMD
, "cmd stop firmware logger");
1844 cmd
= kzalloc(sizeof(*cmd
), GFP_KERNEL
);
1850 ret
= wl1271_cmd_send(wl
, CMD_STOP_FWLOGGER
, cmd
, sizeof(*cmd
), 0);
1852 wl1271_error("failed to send stop firmware logger command");
1863 static int wl12xx_cmd_roc(struct wl1271
*wl
, struct wl12xx_vif
*wlvif
,
1864 u8 role_id
, enum nl80211_band band
, u8 channel
)
1866 struct wl12xx_cmd_roc
*cmd
;
1869 wl1271_debug(DEBUG_CMD
, "cmd roc %d (%d)", channel
, role_id
);
1871 if (WARN_ON(role_id
== WL12XX_INVALID_ROLE_ID
))
1874 cmd
= kzalloc(sizeof(*cmd
), GFP_KERNEL
);
1880 cmd
->role_id
= role_id
;
1881 cmd
->channel
= channel
;
1883 case NL80211_BAND_2GHZ
:
1884 cmd
->band
= WLCORE_BAND_2_4GHZ
;
1886 case NL80211_BAND_5GHZ
:
1887 cmd
->band
= WLCORE_BAND_5GHZ
;
1890 wl1271_error("roc - unknown band: %d", (int)wlvif
->band
);
1896 ret
= wl1271_cmd_send(wl
, CMD_REMAIN_ON_CHANNEL
, cmd
, sizeof(*cmd
), 0);
1898 wl1271_error("failed to send ROC command");
1909 static int wl12xx_cmd_croc(struct wl1271
*wl
, u8 role_id
)
1911 struct wl12xx_cmd_croc
*cmd
;
1914 wl1271_debug(DEBUG_CMD
, "cmd croc (%d)", role_id
);
1916 cmd
= kzalloc(sizeof(*cmd
), GFP_KERNEL
);
1921 cmd
->role_id
= role_id
;
1923 ret
= wl1271_cmd_send(wl
, CMD_CANCEL_REMAIN_ON_CHANNEL
, cmd
,
1926 wl1271_error("failed to send ROC command");
1937 int wl12xx_roc(struct wl1271
*wl
, struct wl12xx_vif
*wlvif
, u8 role_id
,
1938 enum nl80211_band band
, u8 channel
)
1942 if (WARN_ON(test_bit(role_id
, wl
->roc_map
)))
1945 ret
= wl12xx_cmd_roc(wl
, wlvif
, role_id
, band
, channel
);
1949 __set_bit(role_id
, wl
->roc_map
);
1954 int wl12xx_croc(struct wl1271
*wl
, u8 role_id
)
1958 if (WARN_ON(!test_bit(role_id
, wl
->roc_map
)))
1961 ret
= wl12xx_cmd_croc(wl
, role_id
);
1965 __clear_bit(role_id
, wl
->roc_map
);
1968 * Rearm the tx watchdog when removing the last ROC. This prevents
1969 * recoveries due to just finished ROCs - when Tx hasn't yet had
1970 * a chance to get out.
1972 if (find_first_bit(wl
->roc_map
, WL12XX_MAX_ROLES
) >= WL12XX_MAX_ROLES
)
1973 wl12xx_rearm_tx_watchdog_locked(wl
);
1978 int wl12xx_cmd_stop_channel_switch(struct wl1271
*wl
, struct wl12xx_vif
*wlvif
)
1980 struct wl12xx_cmd_stop_channel_switch
*cmd
;
1983 wl1271_debug(DEBUG_ACX
, "cmd stop channel switch");
1985 cmd
= kzalloc(sizeof(*cmd
), GFP_KERNEL
);
1991 cmd
->role_id
= wlvif
->role_id
;
1993 ret
= wl1271_cmd_send(wl
, CMD_STOP_CHANNEL_SWICTH
, cmd
, sizeof(*cmd
), 0);
1995 wl1271_error("failed to stop channel switch command");
2006 /* start dev role and roc on its channel */
2007 int wl12xx_start_dev(struct wl1271
*wl
, struct wl12xx_vif
*wlvif
,
2008 enum nl80211_band band
, int channel
)
2012 if (WARN_ON(!(wlvif
->bss_type
== BSS_TYPE_STA_BSS
||
2013 wlvif
->bss_type
== BSS_TYPE_IBSS
)))
2016 /* the dev role is already started for p2p mgmt interfaces */
2017 if (!wlcore_is_p2p_mgmt(wlvif
)) {
2018 ret
= wl12xx_cmd_role_enable(wl
,
2019 wl12xx_wlvif_to_vif(wlvif
)->addr
,
2021 &wlvif
->dev_role_id
);
2026 ret
= wl12xx_cmd_role_start_dev(wl
, wlvif
, band
, channel
);
2030 ret
= wl12xx_roc(wl
, wlvif
, wlvif
->dev_role_id
, band
, channel
);
2037 wl12xx_cmd_role_stop_dev(wl
, wlvif
);
2039 if (!wlcore_is_p2p_mgmt(wlvif
))
2040 wl12xx_cmd_role_disable(wl
, &wlvif
->dev_role_id
);
2045 /* croc dev hlid, and stop the role */
2046 int wl12xx_stop_dev(struct wl1271
*wl
, struct wl12xx_vif
*wlvif
)
2050 if (WARN_ON(!(wlvif
->bss_type
== BSS_TYPE_STA_BSS
||
2051 wlvif
->bss_type
== BSS_TYPE_IBSS
)))
2054 /* flush all pending packets */
2055 ret
= wlcore_tx_work_locked(wl
);
2059 if (test_bit(wlvif
->dev_role_id
, wl
->roc_map
)) {
2060 ret
= wl12xx_croc(wl
, wlvif
->dev_role_id
);
2065 ret
= wl12xx_cmd_role_stop_dev(wl
, wlvif
);
2069 if (!wlcore_is_p2p_mgmt(wlvif
)) {
2070 ret
= wl12xx_cmd_role_disable(wl
, &wlvif
->dev_role_id
);
2079 int wlcore_cmd_generic_cfg(struct wl1271
*wl
, struct wl12xx_vif
*wlvif
,
2080 u8 feature
, u8 enable
, u8 value
)
2082 struct wlcore_cmd_generic_cfg
*cmd
;
2085 wl1271_debug(DEBUG_CMD
,
2086 "cmd generic cfg (role %d feature %d enable %d value %d)",
2087 wlvif
->role_id
, feature
, enable
, value
);
2089 cmd
= kzalloc(sizeof(*cmd
), GFP_KERNEL
);
2093 cmd
->role_id
= wlvif
->role_id
;
2094 cmd
->feature
= feature
;
2095 cmd
->enable
= enable
;
2098 ret
= wl1271_cmd_send(wl
, CMD_GENERIC_CFG
, cmd
, sizeof(*cmd
), 0);
2100 wl1271_error("failed to send generic cfg command");
2107 EXPORT_SYMBOL_GPL(wlcore_cmd_generic_cfg
);