1 /******************************************************************************
3 * This file is provided under a dual BSD/GPLv2 license. When using or
4 * redistributing this file, you may do so under either license.
8 * Copyright(c) 2012 - 2013 Intel Corporation. All rights reserved.
10 * This program is free software; you can redistribute it and/or modify
11 * it under the terms of version 2 of the GNU General Public License as
12 * published by the Free Software Foundation.
14 * This program is distributed in the hope that it will be useful, but
15 * WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
17 * General Public License for more details.
19 * You should have received a copy of the GNU General Public License
20 * along with this program; if not, write to the Free Software
21 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110,
24 * The full GNU General Public License is included in this distribution
25 * in the file called COPYING.
27 * Contact Information:
28 * Intel Linux Wireless <ilw@linux.intel.com>
29 * Intel Corporation, 5200 N.E. Elam Young Parkway, Hillsboro, OR 97124-6497
33 * Copyright(c) 2012 - 2013 Intel Corporation. All rights reserved.
34 * All rights reserved.
36 * Redistribution and use in source and binary forms, with or without
37 * modification, are permitted provided that the following conditions
40 * * Redistributions of source code must retain the above copyright
41 * notice, this list of conditions and the following disclaimer.
42 * * Redistributions in binary form must reproduce the above copyright
43 * notice, this list of conditions and the following disclaimer in
44 * the documentation and/or other materials provided with the
46 * * Neither the name Intel Corporation nor the names of its
47 * contributors may be used to endorse or promote products derived
48 * from this software without specific prior written permission.
50 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
51 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
52 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
53 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
54 * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
55 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
56 * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
57 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
58 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
59 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
60 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
62 *****************************************************************************/
64 #include <linux/etherdevice.h>
67 #include <net/cfg80211.h>
70 #include "iwl-modparams.h"
74 void iwl_mvm_set_rekey_data(struct ieee80211_hw
*hw
,
75 struct ieee80211_vif
*vif
,
76 struct cfg80211_gtk_rekey_data
*data
)
78 struct iwl_mvm
*mvm
= IWL_MAC80211_GET_MVM(hw
);
79 struct iwl_mvm_vif
*mvmvif
= iwl_mvm_vif_from_mac80211(vif
);
81 if (iwlwifi_mod_params
.sw_crypto
)
84 mutex_lock(&mvm
->mutex
);
86 memcpy(mvmvif
->rekey_data
.kek
, data
->kek
, NL80211_KEK_LEN
);
87 memcpy(mvmvif
->rekey_data
.kck
, data
->kck
, NL80211_KCK_LEN
);
88 mvmvif
->rekey_data
.replay_ctr
=
89 cpu_to_le64(be64_to_cpup((__be64
*)&data
->replay_ctr
));
90 mvmvif
->rekey_data
.valid
= true;
92 mutex_unlock(&mvm
->mutex
);
95 #if IS_ENABLED(CONFIG_IPV6)
96 void iwl_mvm_ipv6_addr_change(struct ieee80211_hw
*hw
,
97 struct ieee80211_vif
*vif
,
98 struct inet6_dev
*idev
)
100 struct iwl_mvm_vif
*mvmvif
= iwl_mvm_vif_from_mac80211(vif
);
101 struct inet6_ifaddr
*ifa
;
104 read_lock_bh(&idev
->lock
);
105 list_for_each_entry(ifa
, &idev
->addr_list
, if_list
) {
106 mvmvif
->target_ipv6_addrs
[idx
] = ifa
->addr
;
108 if (idx
>= IWL_PROTO_OFFLOAD_NUM_IPV6_ADDRS
)
111 read_unlock_bh(&idev
->lock
);
113 mvmvif
->num_target_ipv6_addrs
= idx
;
117 void iwl_mvm_set_default_unicast_key(struct ieee80211_hw
*hw
,
118 struct ieee80211_vif
*vif
, int idx
)
120 struct iwl_mvm_vif
*mvmvif
= iwl_mvm_vif_from_mac80211(vif
);
122 mvmvif
->tx_key_idx
= idx
;
125 static void iwl_mvm_convert_p1k(u16
*p1k
, __le16
*out
)
129 for (i
= 0; i
< IWL_P1K_SIZE
; i
++)
130 out
[i
] = cpu_to_le16(p1k
[i
]);
133 struct wowlan_key_data
{
134 struct iwl_wowlan_rsc_tsc_params_cmd
*rsc_tsc
;
135 struct iwl_wowlan_tkip_params_cmd
*tkip
;
136 bool error
, use_rsc_tsc
, use_tkip
;
140 static void iwl_mvm_wowlan_program_keys(struct ieee80211_hw
*hw
,
141 struct ieee80211_vif
*vif
,
142 struct ieee80211_sta
*sta
,
143 struct ieee80211_key_conf
*key
,
146 struct iwl_mvm
*mvm
= IWL_MAC80211_GET_MVM(hw
);
147 struct iwl_mvm_vif
*mvmvif
= iwl_mvm_vif_from_mac80211(vif
);
148 struct wowlan_key_data
*data
= _data
;
149 struct aes_sc
*aes_sc
, *aes_tx_sc
= NULL
;
150 struct tkip_sc
*tkip_sc
, *tkip_tx_sc
= NULL
;
151 struct iwl_p1k_cache
*rx_p1ks
;
153 struct ieee80211_key_seq seq
;
155 u16 p1k
[IWL_P1K_SIZE
];
158 mutex_lock(&mvm
->mutex
);
160 switch (key
->cipher
) {
161 case WLAN_CIPHER_SUITE_WEP40
:
162 case WLAN_CIPHER_SUITE_WEP104
: { /* hack it for now */
164 struct iwl_mvm_wep_key_cmd wep_key_cmd
;
165 struct iwl_mvm_wep_key wep_key
;
167 .wep_key_cmd
.mac_id_n_color
=
168 cpu_to_le32(FW_CMD_ID_AND_COLOR(mvmvif
->id
,
170 .wep_key_cmd
.num_keys
= 1,
171 /* firmware sets STA_KEY_FLG_WEP_13BYTES */
172 .wep_key_cmd
.decryption_type
= STA_KEY_FLG_WEP
,
173 .wep_key
.key_index
= key
->keyidx
,
174 .wep_key
.key_size
= key
->keylen
,
178 * This will fail -- the key functions don't set support
179 * pairwise WEP keys. However, that's better than silently
180 * failing WoWLAN. Or maybe not?
182 if (key
->flags
& IEEE80211_KEY_FLAG_PAIRWISE
)
185 memcpy(&wkc
.wep_key
.key
[3], key
->key
, key
->keylen
);
186 if (key
->keyidx
== mvmvif
->tx_key_idx
) {
187 /* TX key must be at offset 0 */
188 wkc
.wep_key
.key_offset
= 0;
190 /* others start at 1 */
192 wkc
.wep_key
.key_offset
= data
->gtk_key_idx
;
195 ret
= iwl_mvm_send_cmd_pdu(mvm
, WEP_KEY
, CMD_SYNC
,
197 data
->error
= ret
!= 0;
199 mvm
->ptk_ivlen
= key
->iv_len
;
200 mvm
->ptk_icvlen
= key
->icv_len
;
201 mvm
->gtk_ivlen
= key
->iv_len
;
202 mvm
->gtk_icvlen
= key
->icv_len
;
204 /* don't upload key again */
210 case WLAN_CIPHER_SUITE_AES_CMAC
:
212 * Ignore CMAC keys -- the WoWLAN firmware doesn't support them
213 * but we also shouldn't abort suspend due to that. It does have
214 * support for the IGTK key renewal, but doesn't really use the
215 * IGTK for anything. This means we could spuriously wake up or
216 * be deauthenticated, but that was considered acceptable.
219 case WLAN_CIPHER_SUITE_TKIP
:
221 tkip_sc
= data
->rsc_tsc
->all_tsc_rsc
.tkip
.unicast_rsc
;
222 tkip_tx_sc
= &data
->rsc_tsc
->all_tsc_rsc
.tkip
.tsc
;
224 rx_p1ks
= data
->tkip
->rx_uni
;
226 ieee80211_get_key_tx_seq(key
, &seq
);
227 tkip_tx_sc
->iv16
= cpu_to_le16(seq
.tkip
.iv16
);
228 tkip_tx_sc
->iv32
= cpu_to_le32(seq
.tkip
.iv32
);
230 ieee80211_get_tkip_p1k_iv(key
, seq
.tkip
.iv32
, p1k
);
231 iwl_mvm_convert_p1k(p1k
, data
->tkip
->tx
.p1k
);
233 memcpy(data
->tkip
->mic_keys
.tx
,
234 &key
->key
[NL80211_TKIP_DATA_OFFSET_TX_MIC_KEY
],
237 rx_mic_key
= data
->tkip
->mic_keys
.rx_unicast
;
240 data
->rsc_tsc
->all_tsc_rsc
.tkip
.multicast_rsc
;
241 rx_p1ks
= data
->tkip
->rx_multi
;
242 rx_mic_key
= data
->tkip
->mic_keys
.rx_mcast
;
246 * For non-QoS this relies on the fact that both the uCode and
247 * mac80211 use TID 0 (as they need to to avoid replay attacks)
248 * for checking the IV in the frames.
250 for (i
= 0; i
< IWL_NUM_RSC
; i
++) {
251 ieee80211_get_key_rx_seq(key
, i
, &seq
);
252 tkip_sc
[i
].iv16
= cpu_to_le16(seq
.tkip
.iv16
);
253 tkip_sc
[i
].iv32
= cpu_to_le32(seq
.tkip
.iv32
);
254 /* wrapping isn't allowed, AP must rekey */
255 if (seq
.tkip
.iv32
> cur_rx_iv32
)
256 cur_rx_iv32
= seq
.tkip
.iv32
;
259 ieee80211_get_tkip_rx_p1k(key
, vif
->bss_conf
.bssid
,
261 iwl_mvm_convert_p1k(p1k
, rx_p1ks
[0].p1k
);
262 ieee80211_get_tkip_rx_p1k(key
, vif
->bss_conf
.bssid
,
263 cur_rx_iv32
+ 1, p1k
);
264 iwl_mvm_convert_p1k(p1k
, rx_p1ks
[1].p1k
);
267 &key
->key
[NL80211_TKIP_DATA_OFFSET_RX_MIC_KEY
],
270 data
->use_tkip
= true;
271 data
->use_rsc_tsc
= true;
273 case WLAN_CIPHER_SUITE_CCMP
:
275 u8
*pn
= seq
.ccmp
.pn
;
277 aes_sc
= data
->rsc_tsc
->all_tsc_rsc
.aes
.unicast_rsc
;
278 aes_tx_sc
= &data
->rsc_tsc
->all_tsc_rsc
.aes
.tsc
;
280 ieee80211_get_key_tx_seq(key
, &seq
);
281 aes_tx_sc
->pn
= cpu_to_le64((u64
)pn
[5] |
288 aes_sc
= data
->rsc_tsc
->all_tsc_rsc
.aes
.multicast_rsc
;
292 * For non-QoS this relies on the fact that both the uCode and
293 * mac80211 use TID 0 for checking the IV in the frames.
295 for (i
= 0; i
< IWL_NUM_RSC
; i
++) {
296 u8
*pn
= seq
.ccmp
.pn
;
298 ieee80211_get_key_rx_seq(key
, i
, &seq
);
299 aes_sc
->pn
= cpu_to_le64((u64
)pn
[5] |
306 data
->use_rsc_tsc
= true;
311 * The D3 firmware hardcodes the key offset 0 as the key it uses
312 * to transmit packets to the AP, i.e. the PTK.
314 if (key
->flags
& IEEE80211_KEY_FLAG_PAIRWISE
) {
316 mvm
->ptk_ivlen
= key
->iv_len
;
317 mvm
->ptk_icvlen
= key
->icv_len
;
320 key
->hw_key_idx
= data
->gtk_key_idx
;
321 mvm
->gtk_ivlen
= key
->iv_len
;
322 mvm
->gtk_icvlen
= key
->icv_len
;
325 ret
= iwl_mvm_set_sta_key(mvm
, vif
, sta
, key
, true);
326 data
->error
= ret
!= 0;
328 mutex_unlock(&mvm
->mutex
);
331 static int iwl_mvm_send_patterns(struct iwl_mvm
*mvm
,
332 struct cfg80211_wowlan
*wowlan
)
334 struct iwl_wowlan_patterns_cmd
*pattern_cmd
;
335 struct iwl_host_cmd cmd
= {
336 .id
= WOWLAN_PATTERNS
,
337 .dataflags
[0] = IWL_HCMD_DFL_NOCOPY
,
342 if (!wowlan
->n_patterns
)
345 cmd
.len
[0] = sizeof(*pattern_cmd
) +
346 wowlan
->n_patterns
* sizeof(struct iwl_wowlan_pattern
);
348 pattern_cmd
= kmalloc(cmd
.len
[0], GFP_KERNEL
);
352 pattern_cmd
->n_patterns
= cpu_to_le32(wowlan
->n_patterns
);
354 for (i
= 0; i
< wowlan
->n_patterns
; i
++) {
355 int mask_len
= DIV_ROUND_UP(wowlan
->patterns
[i
].pattern_len
, 8);
357 memcpy(&pattern_cmd
->patterns
[i
].mask
,
358 wowlan
->patterns
[i
].mask
, mask_len
);
359 memcpy(&pattern_cmd
->patterns
[i
].pattern
,
360 wowlan
->patterns
[i
].pattern
,
361 wowlan
->patterns
[i
].pattern_len
);
362 pattern_cmd
->patterns
[i
].mask_size
= mask_len
;
363 pattern_cmd
->patterns
[i
].pattern_size
=
364 wowlan
->patterns
[i
].pattern_len
;
367 cmd
.data
[0] = pattern_cmd
;
368 err
= iwl_mvm_send_cmd(mvm
, &cmd
);
373 static int iwl_mvm_send_proto_offload(struct iwl_mvm
*mvm
,
374 struct ieee80211_vif
*vif
)
376 struct iwl_proto_offload_cmd cmd
= {};
377 #if IS_ENABLED(CONFIG_IPV6)
378 struct iwl_mvm_vif
*mvmvif
= iwl_mvm_vif_from_mac80211(vif
);
381 if (mvmvif
->num_target_ipv6_addrs
) {
382 cmd
.enabled
|= cpu_to_le32(IWL_D3_PROTO_OFFLOAD_NS
);
383 memcpy(cmd
.ndp_mac_addr
, vif
->addr
, ETH_ALEN
);
386 BUILD_BUG_ON(sizeof(cmd
.target_ipv6_addr
[i
]) !=
387 sizeof(mvmvif
->target_ipv6_addrs
[i
]));
389 for (i
= 0; i
< mvmvif
->num_target_ipv6_addrs
; i
++)
390 memcpy(cmd
.target_ipv6_addr
[i
],
391 &mvmvif
->target_ipv6_addrs
[i
],
392 sizeof(cmd
.target_ipv6_addr
[i
]));
395 if (vif
->bss_conf
.arp_addr_cnt
) {
396 cmd
.enabled
|= cpu_to_le32(IWL_D3_PROTO_OFFLOAD_ARP
);
397 cmd
.host_ipv4_addr
= vif
->bss_conf
.arp_addr_list
[0];
398 memcpy(cmd
.arp_mac_addr
, vif
->addr
, ETH_ALEN
);
404 return iwl_mvm_send_cmd_pdu(mvm
, PROT_OFFLOAD_CONFIG_CMD
, CMD_SYNC
,
408 enum iwl_mvm_tcp_packet_type
{
417 static __le16
pseudo_hdr_check(int len
, __be32 saddr
, __be32 daddr
)
419 __sum16 check
= tcp_v4_check(len
, saddr
, daddr
, 0);
420 return cpu_to_le16(be16_to_cpu((__force __be16
)check
));
423 static void iwl_mvm_build_tcp_packet(struct ieee80211_vif
*vif
,
424 struct cfg80211_wowlan_tcp
*tcp
,
425 void *_pkt
, u8
*mask
,
426 __le16
*pseudo_hdr_csum
,
427 enum iwl_mvm_tcp_packet_type ptype
)
434 } __packed
*pkt
= _pkt
;
435 u16 ip_tot_len
= sizeof(struct iphdr
) + sizeof(struct tcphdr
);
438 pkt
->eth
.h_proto
= cpu_to_be16(ETH_P_IP
),
441 pkt
->ip
.protocol
= IPPROTO_TCP
;
445 case MVM_TCP_TX_DATA
:
447 memcpy(pkt
->eth
.h_dest
, tcp
->dst_mac
, ETH_ALEN
);
448 memcpy(pkt
->eth
.h_source
, vif
->addr
, ETH_ALEN
);
450 pkt
->ip
.saddr
= tcp
->src
;
451 pkt
->ip
.daddr
= tcp
->dst
;
452 pkt
->tcp
.source
= cpu_to_be16(tcp
->src_port
);
453 pkt
->tcp
.dest
= cpu_to_be16(tcp
->dst_port
);
454 /* overwritten for TX SYN later */
455 pkt
->tcp
.doff
= sizeof(struct tcphdr
) / 4;
456 pkt
->tcp
.window
= cpu_to_be16(65000);
458 case MVM_TCP_RX_SYNACK
:
460 case MVM_TCP_RX_WAKE
:
461 memcpy(pkt
->eth
.h_dest
, vif
->addr
, ETH_ALEN
);
462 memcpy(pkt
->eth
.h_source
, tcp
->dst_mac
, ETH_ALEN
);
463 pkt
->ip
.saddr
= tcp
->dst
;
464 pkt
->ip
.daddr
= tcp
->src
;
465 pkt
->tcp
.source
= cpu_to_be16(tcp
->dst_port
);
466 pkt
->tcp
.dest
= cpu_to_be16(tcp
->src_port
);
475 /* firmware assumes 8 option bytes - 8 NOPs for now */
476 memset(pkt
->data
, 0x01, 8);
478 pkt
->tcp
.doff
= (sizeof(struct tcphdr
) + 8) / 4;
481 case MVM_TCP_TX_DATA
:
482 ip_tot_len
+= tcp
->payload_len
;
483 memcpy(pkt
->data
, tcp
->payload
, tcp
->payload_len
);
491 case MVM_TCP_RX_SYNACK
:
498 case MVM_TCP_RX_WAKE
:
499 ip_tot_len
+= tcp
->wake_len
;
502 memcpy(pkt
->data
, tcp
->wake_data
, tcp
->wake_len
);
508 case MVM_TCP_TX_DATA
:
510 pkt
->ip
.tot_len
= cpu_to_be16(ip_tot_len
);
511 pkt
->ip
.check
= ip_fast_csum(&pkt
->ip
, pkt
->ip
.ihl
);
513 case MVM_TCP_RX_WAKE
:
514 for (i
= 0; i
< DIV_ROUND_UP(tcp
->wake_len
, 8); i
++) {
515 u8 tmp
= tcp
->wake_mask
[i
];
516 mask
[i
+ 6] |= tmp
<< 6;
517 if (i
+ 1 < DIV_ROUND_UP(tcp
->wake_len
, 8))
518 mask
[i
+ 7] = tmp
>> 2;
520 /* fall through for ethernet/IP/TCP headers mask */
521 case MVM_TCP_RX_SYNACK
:
523 mask
[0] = 0xff; /* match ethernet */
525 * match ethernet, ip.version, ip.ihl
526 * the ip.ihl half byte is really masked out by firmware
529 mask
[2] = 0x80; /* match ip.protocol */
530 mask
[3] = 0xfc; /* match ip.saddr, ip.daddr */
531 mask
[4] = 0x3f; /* match ip.daddr, tcp.source, tcp.dest */
532 mask
[5] = 0x80; /* match tcp flags */
533 /* leave rest (0 or set for MVM_TCP_RX_WAKE) */
537 *pseudo_hdr_csum
= pseudo_hdr_check(ip_tot_len
- sizeof(struct iphdr
),
538 pkt
->ip
.saddr
, pkt
->ip
.daddr
);
541 static int iwl_mvm_send_remote_wake_cfg(struct iwl_mvm
*mvm
,
542 struct ieee80211_vif
*vif
,
543 struct cfg80211_wowlan_tcp
*tcp
)
545 struct iwl_wowlan_remote_wake_config
*cfg
;
546 struct iwl_host_cmd cmd
= {
547 .id
= REMOTE_WAKE_CONFIG_CMD
,
548 .len
= { sizeof(*cfg
), },
549 .dataflags
= { IWL_HCMD_DFL_NOCOPY
, },
557 cfg
= kzalloc(sizeof(*cfg
), GFP_KERNEL
);
562 cfg
->max_syn_retries
= 10;
563 cfg
->max_data_retries
= 10;
564 cfg
->tcp_syn_ack_timeout
= 1; /* seconds */
565 cfg
->tcp_ack_timeout
= 1; /* seconds */
568 iwl_mvm_build_tcp_packet(
569 vif
, tcp
, cfg
->syn_tx
.data
, NULL
,
570 &cfg
->syn_tx
.info
.tcp_pseudo_header_checksum
,
572 cfg
->syn_tx
.info
.tcp_payload_length
= 0;
575 iwl_mvm_build_tcp_packet(
576 vif
, tcp
, cfg
->synack_rx
.data
, cfg
->synack_rx
.rx_mask
,
577 &cfg
->synack_rx
.info
.tcp_pseudo_header_checksum
,
579 cfg
->synack_rx
.info
.tcp_payload_length
= 0;
581 /* KEEPALIVE/ACK (TX) */
582 iwl_mvm_build_tcp_packet(
583 vif
, tcp
, cfg
->keepalive_tx
.data
, NULL
,
584 &cfg
->keepalive_tx
.info
.tcp_pseudo_header_checksum
,
586 cfg
->keepalive_tx
.info
.tcp_payload_length
=
587 cpu_to_le16(tcp
->payload_len
);
588 cfg
->sequence_number_offset
= tcp
->payload_seq
.offset
;
589 /* length must be 0..4, the field is little endian */
590 cfg
->sequence_number_length
= tcp
->payload_seq
.len
;
591 cfg
->initial_sequence_number
= cpu_to_le32(tcp
->payload_seq
.start
);
592 cfg
->keepalive_interval
= cpu_to_le16(tcp
->data_interval
);
593 if (tcp
->payload_tok
.len
) {
594 cfg
->token_offset
= tcp
->payload_tok
.offset
;
595 cfg
->token_length
= tcp
->payload_tok
.len
;
597 cpu_to_le16(tcp
->tokens_size
% tcp
->payload_tok
.len
);
598 memcpy(cfg
->tokens
, tcp
->payload_tok
.token_stream
,
601 /* set tokens to max value to almost never run out */
602 cfg
->num_tokens
= cpu_to_le16(65535);
606 iwl_mvm_build_tcp_packet(
607 vif
, tcp
, cfg
->keepalive_ack_rx
.data
,
608 cfg
->keepalive_ack_rx
.rx_mask
,
609 &cfg
->keepalive_ack_rx
.info
.tcp_pseudo_header_checksum
,
611 cfg
->keepalive_ack_rx
.info
.tcp_payload_length
= 0;
614 iwl_mvm_build_tcp_packet(
615 vif
, tcp
, cfg
->wake_rx
.data
, cfg
->wake_rx
.rx_mask
,
616 &cfg
->wake_rx
.info
.tcp_pseudo_header_checksum
,
618 cfg
->wake_rx
.info
.tcp_payload_length
=
619 cpu_to_le16(tcp
->wake_len
);
622 iwl_mvm_build_tcp_packet(
623 vif
, tcp
, cfg
->fin_tx
.data
, NULL
,
624 &cfg
->fin_tx
.info
.tcp_pseudo_header_checksum
,
626 cfg
->fin_tx
.info
.tcp_payload_length
= 0;
628 ret
= iwl_mvm_send_cmd(mvm
, &cmd
);
634 struct iwl_d3_iter_data
{
636 struct ieee80211_vif
*vif
;
640 static void iwl_mvm_d3_iface_iterator(void *_data
, u8
*mac
,
641 struct ieee80211_vif
*vif
)
643 struct iwl_d3_iter_data
*data
= _data
;
644 struct iwl_mvm_vif
*mvmvif
= iwl_mvm_vif_from_mac80211(vif
);
646 if (vif
->type
!= NL80211_IFTYPE_STATION
|| vif
->p2p
)
649 if (mvmvif
->ap_sta_id
== IWL_MVM_STATION_COUNT
)
653 IWL_ERR(data
->mvm
, "More than one managed interface active!\n");
661 static int iwl_mvm_d3_reprogram(struct iwl_mvm
*mvm
, struct ieee80211_vif
*vif
,
662 struct ieee80211_sta
*ap_sta
)
664 struct iwl_mvm_vif
*mvmvif
= iwl_mvm_vif_from_mac80211(vif
);
665 struct ieee80211_chanctx_conf
*ctx
;
666 u8 chains_static
, chains_dynamic
;
667 struct cfg80211_chan_def chandef
;
669 struct iwl_binding_cmd binding_cmd
= {};
670 struct iwl_time_quota_cmd quota_cmd
= {};
673 /* add back the PHY */
674 if (WARN_ON(!mvmvif
->phy_ctxt
))
678 ctx
= rcu_dereference(vif
->chanctx_conf
);
684 chains_static
= ctx
->rx_chains_static
;
685 chains_dynamic
= ctx
->rx_chains_dynamic
;
688 ret
= iwl_mvm_phy_ctxt_add(mvm
, mvmvif
->phy_ctxt
, &chandef
,
689 chains_static
, chains_dynamic
);
693 /* add back the MAC */
694 mvmvif
->uploaded
= false;
696 if (WARN_ON(!vif
->bss_conf
.assoc
))
699 vif
->bss_conf
.assoc
= false;
700 ret
= iwl_mvm_mac_ctxt_add(mvm
, vif
);
701 vif
->bss_conf
.assoc
= true;
705 /* add back binding - XXX refactor? */
706 binding_cmd
.id_and_color
=
707 cpu_to_le32(FW_CMD_ID_AND_COLOR(mvmvif
->phy_ctxt
->id
,
708 mvmvif
->phy_ctxt
->color
));
709 binding_cmd
.action
= cpu_to_le32(FW_CTXT_ACTION_ADD
);
711 cpu_to_le32(FW_CMD_ID_AND_COLOR(mvmvif
->phy_ctxt
->id
,
712 mvmvif
->phy_ctxt
->color
));
713 binding_cmd
.macs
[0] = cpu_to_le32(FW_CMD_ID_AND_COLOR(mvmvif
->id
,
715 for (i
= 1; i
< MAX_MACS_IN_BINDING
; i
++)
716 binding_cmd
.macs
[i
] = cpu_to_le32(FW_CTXT_INVALID
);
719 ret
= iwl_mvm_send_cmd_pdu_status(mvm
, BINDING_CONTEXT_CMD
,
720 sizeof(binding_cmd
), &binding_cmd
,
723 IWL_ERR(mvm
, "Failed to add binding: %d\n", ret
);
728 IWL_ERR(mvm
, "Binding command failed: %u\n", status
);
732 ret
= iwl_mvm_sta_send_to_fw(mvm
, ap_sta
, false);
735 rcu_assign_pointer(mvm
->fw_id_to_mac_id
[mvmvif
->ap_sta_id
], ap_sta
);
737 ret
= iwl_mvm_mac_ctxt_changed(mvm
, vif
);
742 quota_cmd
.quotas
[0].id_and_color
=
743 cpu_to_le32(FW_CMD_ID_AND_COLOR(mvmvif
->phy_ctxt
->id
,
744 mvmvif
->phy_ctxt
->color
));
745 quota_cmd
.quotas
[0].quota
= cpu_to_le32(100);
746 quota_cmd
.quotas
[0].max_duration
= cpu_to_le32(1000);
748 for (i
= 1; i
< MAX_BINDINGS
; i
++)
749 quota_cmd
.quotas
[i
].id_and_color
= cpu_to_le32(FW_CTXT_INVALID
);
751 ret
= iwl_mvm_send_cmd_pdu(mvm
, TIME_QUOTA_CMD
, CMD_SYNC
,
752 sizeof(quota_cmd
), "a_cmd
);
754 IWL_ERR(mvm
, "Failed to send quota: %d\n", ret
);
759 static int __iwl_mvm_suspend(struct ieee80211_hw
*hw
,
760 struct cfg80211_wowlan
*wowlan
,
763 struct iwl_mvm
*mvm
= IWL_MAC80211_GET_MVM(hw
);
764 struct iwl_d3_iter_data suspend_iter_data
= {
767 struct ieee80211_vif
*vif
;
768 struct iwl_mvm_vif
*mvmvif
;
769 struct ieee80211_sta
*ap_sta
;
770 struct iwl_mvm_sta
*mvm_ap_sta
;
771 struct iwl_wowlan_config_cmd wowlan_config_cmd
= {};
772 struct iwl_wowlan_kek_kck_material_cmd kek_kck_cmd
= {};
773 struct iwl_wowlan_tkip_params_cmd tkip_cmd
= {};
774 struct iwl_d3_manager_config d3_cfg_cmd_data
= {
776 * Program the minimum sleep time to 10 seconds, as many
777 * platforms have issues processing a wakeup signal while
778 * still being in the process of suspending.
780 .min_sleep_time
= cpu_to_le32(10 * 1000 * 1000),
782 struct iwl_host_cmd d3_cfg_cmd
= {
784 .flags
= CMD_SYNC
| CMD_WANT_SKB
,
785 .data
[0] = &d3_cfg_cmd_data
,
786 .len
[0] = sizeof(d3_cfg_cmd_data
),
788 struct wowlan_key_data key_data
= {
789 .use_rsc_tsc
= false,
794 int len __maybe_unused
;
796 u8 old_aux_sta_id
, old_ap_sta_id
= IWL_MVM_STATION_COUNT
;
800 * mac80211 shouldn't get here, but for D3 test
801 * it doesn't warrant a warning
807 key_data
.rsc_tsc
= kzalloc(sizeof(*key_data
.rsc_tsc
), GFP_KERNEL
);
808 if (!key_data
.rsc_tsc
)
811 mutex_lock(&mvm
->mutex
);
813 old_aux_sta_id
= mvm
->aux_sta
.sta_id
;
815 /* see if there's only a single BSS vif and it's associated */
816 ieee80211_iterate_active_interfaces_atomic(
817 mvm
->hw
, IEEE80211_IFACE_ITER_NORMAL
,
818 iwl_mvm_d3_iface_iterator
, &suspend_iter_data
);
820 if (suspend_iter_data
.error
|| !suspend_iter_data
.vif
) {
825 vif
= suspend_iter_data
.vif
;
826 mvmvif
= iwl_mvm_vif_from_mac80211(vif
);
828 ap_sta
= rcu_dereference_protected(
829 mvm
->fw_id_to_mac_id
[mvmvif
->ap_sta_id
],
830 lockdep_is_held(&mvm
->mutex
));
831 if (IS_ERR_OR_NULL(ap_sta
)) {
836 mvm_ap_sta
= (struct iwl_mvm_sta
*)ap_sta
->drv_priv
;
839 * The D3 firmware still hardcodes the AP station ID for the
840 * BSS we're associated with as 0. Store the real STA ID here
841 * and assign 0. When we leave this function, we'll restore
842 * the original value for the resume code.
844 old_ap_sta_id
= mvm_ap_sta
->sta_id
;
845 mvm_ap_sta
->sta_id
= 0;
846 mvmvif
->ap_sta_id
= 0;
848 /* TODO: wowlan_config_cmd.wowlan_ba_teardown_tids */
850 wowlan_config_cmd
.is_11n_connection
= ap_sta
->ht_cap
.ht_supported
;
853 * We know the last used seqno, and the uCode expects to know that
854 * one, it will increment before TX.
856 seq
= mvm_ap_sta
->last_seq_ctl
& IEEE80211_SCTL_SEQ
;
857 wowlan_config_cmd
.non_qos_seq
= cpu_to_le16(seq
);
860 * For QoS counters, we store the one to use next, so subtract 0x10
861 * since the uCode will add 0x10 *before* using the value while we
862 * increment after using the value (i.e. store the next value to use).
864 for (i
= 0; i
< IWL_MAX_TID_COUNT
; i
++) {
865 seq
= mvm_ap_sta
->tid_data
[i
].seq_number
;
867 wowlan_config_cmd
.qos_seq
[i
] = cpu_to_le16(seq
);
870 if (wowlan
->disconnect
)
871 wowlan_config_cmd
.wakeup_filter
|=
872 cpu_to_le32(IWL_WOWLAN_WAKEUP_BEACON_MISS
|
873 IWL_WOWLAN_WAKEUP_LINK_CHANGE
);
874 if (wowlan
->magic_pkt
)
875 wowlan_config_cmd
.wakeup_filter
|=
876 cpu_to_le32(IWL_WOWLAN_WAKEUP_MAGIC_PACKET
);
877 if (wowlan
->gtk_rekey_failure
)
878 wowlan_config_cmd
.wakeup_filter
|=
879 cpu_to_le32(IWL_WOWLAN_WAKEUP_GTK_REKEY_FAIL
);
880 if (wowlan
->eap_identity_req
)
881 wowlan_config_cmd
.wakeup_filter
|=
882 cpu_to_le32(IWL_WOWLAN_WAKEUP_EAP_IDENT_REQ
);
883 if (wowlan
->four_way_handshake
)
884 wowlan_config_cmd
.wakeup_filter
|=
885 cpu_to_le32(IWL_WOWLAN_WAKEUP_4WAY_HANDSHAKE
);
886 if (wowlan
->n_patterns
)
887 wowlan_config_cmd
.wakeup_filter
|=
888 cpu_to_le32(IWL_WOWLAN_WAKEUP_PATTERN_MATCH
);
890 if (wowlan
->rfkill_release
)
891 wowlan_config_cmd
.wakeup_filter
|=
892 cpu_to_le32(IWL_WOWLAN_WAKEUP_RF_KILL_DEASSERT
);
896 * Set the "link change" (really "link lost") flag as well
897 * since that implies losing the TCP connection.
899 wowlan_config_cmd
.wakeup_filter
|=
900 cpu_to_le32(IWL_WOWLAN_WAKEUP_REMOTE_LINK_LOSS
|
901 IWL_WOWLAN_WAKEUP_REMOTE_SIGNATURE_TABLE
|
902 IWL_WOWLAN_WAKEUP_REMOTE_WAKEUP_PACKET
|
903 IWL_WOWLAN_WAKEUP_LINK_CHANGE
);
906 iwl_mvm_cancel_scan(mvm
);
908 iwl_trans_stop_device(mvm
->trans
);
911 * Set the HW restart bit -- this is mostly true as we're
912 * going to load new firmware and reprogram that, though
913 * the reprogramming is going to be manual to avoid adding
914 * all the MACs that aren't support.
915 * We don't have to clear up everything though because the
916 * reprogramming is manual. When we resume, we'll actually
917 * go through a proper restart sequence again to switch
918 * back to the runtime firmware image.
920 set_bit(IWL_MVM_STATUS_IN_HW_RESTART
, &mvm
->status
);
922 /* We reprogram keys and shouldn't allocate new key indices */
923 memset(mvm
->fw_key_table
, 0, sizeof(mvm
->fw_key_table
));
931 * The D3 firmware still hardcodes the AP station ID for the
932 * BSS we're associated with as 0. As a result, we have to move
933 * the auxiliary station to ID 1 so the ID 0 remains free for
934 * the AP station for later.
935 * We set the sta_id to 1 here, and reset it to its previous
936 * value (that we stored above) later.
938 mvm
->aux_sta
.sta_id
= 1;
940 ret
= iwl_mvm_load_d3_fw(mvm
);
944 ret
= iwl_mvm_d3_reprogram(mvm
, vif
, ap_sta
);
948 if (!iwlwifi_mod_params
.sw_crypto
) {
950 * This needs to be unlocked due to lock ordering
951 * constraints. Since we're in the suspend path
952 * that isn't really a problem though.
954 mutex_unlock(&mvm
->mutex
);
955 ieee80211_iter_keys(mvm
->hw
, vif
,
956 iwl_mvm_wowlan_program_keys
,
958 mutex_lock(&mvm
->mutex
);
959 if (key_data
.error
) {
964 if (key_data
.use_rsc_tsc
) {
965 struct iwl_host_cmd rsc_tsc_cmd
= {
966 .id
= WOWLAN_TSC_RSC_PARAM
,
968 .data
[0] = key_data
.rsc_tsc
,
969 .dataflags
[0] = IWL_HCMD_DFL_NOCOPY
,
970 .len
[0] = sizeof(*key_data
.rsc_tsc
),
973 ret
= iwl_mvm_send_cmd(mvm
, &rsc_tsc_cmd
);
978 if (key_data
.use_tkip
) {
979 ret
= iwl_mvm_send_cmd_pdu(mvm
,
981 CMD_SYNC
, sizeof(tkip_cmd
),
987 if (mvmvif
->rekey_data
.valid
) {
988 memset(&kek_kck_cmd
, 0, sizeof(kek_kck_cmd
));
989 memcpy(kek_kck_cmd
.kck
, mvmvif
->rekey_data
.kck
,
991 kek_kck_cmd
.kck_len
= cpu_to_le16(NL80211_KCK_LEN
);
992 memcpy(kek_kck_cmd
.kek
, mvmvif
->rekey_data
.kek
,
994 kek_kck_cmd
.kek_len
= cpu_to_le16(NL80211_KEK_LEN
);
995 kek_kck_cmd
.replay_ctr
= mvmvif
->rekey_data
.replay_ctr
;
997 ret
= iwl_mvm_send_cmd_pdu(mvm
,
998 WOWLAN_KEK_KCK_MATERIAL
,
1000 sizeof(kek_kck_cmd
),
1007 ret
= iwl_mvm_send_cmd_pdu(mvm
, WOWLAN_CONFIGURATION
,
1008 CMD_SYNC
, sizeof(wowlan_config_cmd
),
1009 &wowlan_config_cmd
);
1013 ret
= iwl_mvm_send_patterns(mvm
, wowlan
);
1017 ret
= iwl_mvm_send_proto_offload(mvm
, vif
);
1021 ret
= iwl_mvm_send_remote_wake_cfg(mvm
, vif
, wowlan
->tcp
);
1025 ret
= iwl_mvm_power_update_mode(mvm
, vif
);
1029 #ifdef CONFIG_IWLWIFI_DEBUGFS
1030 if (mvm
->d3_wake_sysassert
)
1031 d3_cfg_cmd_data
.wakeup_flags
|=
1032 cpu_to_le32(IWL_WAKEUP_D3_CONFIG_FW_ERROR
);
1035 /* must be last -- this switches firmware state */
1036 ret
= iwl_mvm_send_cmd(mvm
, &d3_cfg_cmd
);
1039 #ifdef CONFIG_IWLWIFI_DEBUGFS
1040 len
= le32_to_cpu(d3_cfg_cmd
.resp_pkt
->len_n_flags
) &
1041 FH_RSCSR_FRAME_SIZE_MSK
;
1042 if (len
>= sizeof(u32
) * 2) {
1043 mvm
->d3_test_pme_ptr
=
1044 le32_to_cpup((__le32
*)d3_cfg_cmd
.resp_pkt
->data
);
1046 /* in test mode we require the pointer */
1051 iwl_free_resp(&d3_cfg_cmd
);
1053 clear_bit(IWL_MVM_STATUS_IN_HW_RESTART
, &mvm
->status
);
1055 iwl_trans_d3_suspend(mvm
->trans
, test
);
1057 mvm
->aux_sta
.sta_id
= old_aux_sta_id
;
1058 mvm_ap_sta
->sta_id
= old_ap_sta_id
;
1059 mvmvif
->ap_sta_id
= old_ap_sta_id
;
1061 kfree(key_data
.rsc_tsc
);
1063 ieee80211_restart_hw(mvm
->hw
);
1065 mutex_unlock(&mvm
->mutex
);
1070 int iwl_mvm_suspend(struct ieee80211_hw
*hw
, struct cfg80211_wowlan
*wowlan
)
1072 return __iwl_mvm_suspend(hw
, wowlan
, false);
1075 static void iwl_mvm_query_wakeup_reasons(struct iwl_mvm
*mvm
,
1076 struct ieee80211_vif
*vif
)
1078 u32 base
= mvm
->error_event_table
;
1079 struct error_table_start
{
1080 /* cf. struct iwl_error_event_table */
1084 struct cfg80211_wowlan_wakeup wakeup
= {
1087 struct cfg80211_wowlan_wakeup
*wakeup_report
= &wakeup
;
1088 struct iwl_host_cmd cmd
= {
1089 .id
= WOWLAN_GET_STATUSES
,
1090 .flags
= CMD_SYNC
| CMD_WANT_SKB
,
1092 struct iwl_wowlan_status
*status
;
1095 struct sk_buff
*pkt
= NULL
;
1097 iwl_trans_read_mem_bytes(mvm
->trans
, base
,
1098 &err_info
, sizeof(err_info
));
1100 if (err_info
.valid
) {
1101 IWL_INFO(mvm
, "error table is valid (%d)\n",
1103 if (err_info
.error_id
== RF_KILL_INDICATOR_FOR_WOWLAN
) {
1104 wakeup
.rfkill_release
= true;
1105 ieee80211_report_wowlan_wakeup(vif
, &wakeup
,
1111 /* only for tracing for now */
1112 ret
= iwl_mvm_send_cmd_pdu(mvm
, OFFLOADS_QUERY_CMD
, CMD_SYNC
, 0, NULL
);
1114 IWL_ERR(mvm
, "failed to query offload statistics (%d)\n", ret
);
1116 ret
= iwl_mvm_send_cmd(mvm
, &cmd
);
1118 IWL_ERR(mvm
, "failed to query status (%d)\n", ret
);
1122 /* RF-kill already asserted again... */
1126 len
= le32_to_cpu(cmd
.resp_pkt
->len_n_flags
) & FH_RSCSR_FRAME_SIZE_MSK
;
1127 if (len
- sizeof(struct iwl_cmd_header
) < sizeof(*status
)) {
1128 IWL_ERR(mvm
, "Invalid WoWLAN status response!\n");
1132 status
= (void *)cmd
.resp_pkt
->data
;
1134 if (len
- sizeof(struct iwl_cmd_header
) !=
1136 ALIGN(le32_to_cpu(status
->wake_packet_bufsize
), 4)) {
1137 IWL_ERR(mvm
, "Invalid WoWLAN status response!\n");
1141 reasons
= le32_to_cpu(status
->wakeup_reasons
);
1143 if (reasons
== IWL_WOWLAN_WAKEUP_BY_NON_WIRELESS
) {
1144 wakeup_report
= NULL
;
1148 if (reasons
& IWL_WOWLAN_WAKEUP_BY_MAGIC_PACKET
)
1149 wakeup
.magic_pkt
= true;
1151 if (reasons
& IWL_WOWLAN_WAKEUP_BY_PATTERN
)
1152 wakeup
.pattern_idx
=
1153 le16_to_cpu(status
->pattern_number
);
1155 if (reasons
& (IWL_WOWLAN_WAKEUP_BY_DISCONNECTION_ON_MISSED_BEACON
|
1156 IWL_WOWLAN_WAKEUP_BY_DISCONNECTION_ON_DEAUTH
))
1157 wakeup
.disconnect
= true;
1159 if (reasons
& IWL_WOWLAN_WAKEUP_BY_GTK_REKEY_FAILURE
)
1160 wakeup
.gtk_rekey_failure
= true;
1162 if (reasons
& IWL_WOWLAN_WAKEUP_BY_RFKILL_DEASSERTED
)
1163 wakeup
.rfkill_release
= true;
1165 if (reasons
& IWL_WOWLAN_WAKEUP_BY_EAPOL_REQUEST
)
1166 wakeup
.eap_identity_req
= true;
1168 if (reasons
& IWL_WOWLAN_WAKEUP_BY_FOUR_WAY_HANDSHAKE
)
1169 wakeup
.four_way_handshake
= true;
1171 if (reasons
& IWL_WOWLAN_WAKEUP_BY_REM_WAKE_LINK_LOSS
)
1172 wakeup
.tcp_connlost
= true;
1174 if (reasons
& IWL_WOWLAN_WAKEUP_BY_REM_WAKE_SIGNATURE_TABLE
)
1175 wakeup
.tcp_nomoretokens
= true;
1177 if (reasons
& IWL_WOWLAN_WAKEUP_BY_REM_WAKE_WAKEUP_PACKET
)
1178 wakeup
.tcp_match
= true;
1180 if (status
->wake_packet_bufsize
) {
1181 int pktsize
= le32_to_cpu(status
->wake_packet_bufsize
);
1182 int pktlen
= le32_to_cpu(status
->wake_packet_length
);
1183 const u8
*pktdata
= status
->wake_packet
;
1184 struct ieee80211_hdr
*hdr
= (void *)pktdata
;
1185 int truncated
= pktlen
- pktsize
;
1187 /* this would be a firmware bug */
1188 if (WARN_ON_ONCE(truncated
< 0))
1191 if (ieee80211_is_data(hdr
->frame_control
)) {
1192 int hdrlen
= ieee80211_hdrlen(hdr
->frame_control
);
1193 int ivlen
= 0, icvlen
= 4; /* also FCS */
1195 pkt
= alloc_skb(pktsize
, GFP_KERNEL
);
1199 memcpy(skb_put(pkt
, hdrlen
), pktdata
, hdrlen
);
1203 if (ieee80211_has_protected(hdr
->frame_control
)) {
1204 if (is_multicast_ether_addr(hdr
->addr1
)) {
1205 ivlen
= mvm
->gtk_ivlen
;
1206 icvlen
+= mvm
->gtk_icvlen
;
1208 ivlen
= mvm
->ptk_ivlen
;
1209 icvlen
+= mvm
->ptk_icvlen
;
1213 /* if truncated, FCS/ICV is (partially) gone */
1214 if (truncated
>= icvlen
) {
1216 truncated
-= icvlen
;
1218 icvlen
-= truncated
;
1222 pktsize
-= ivlen
+ icvlen
;
1225 memcpy(skb_put(pkt
, pktsize
), pktdata
, pktsize
);
1227 if (ieee80211_data_to_8023(pkt
, vif
->addr
, vif
->type
))
1229 wakeup
.packet
= pkt
->data
;
1230 wakeup
.packet_present_len
= pkt
->len
;
1231 wakeup
.packet_len
= pkt
->len
- truncated
;
1232 wakeup
.packet_80211
= false;
1236 if (truncated
>= 4) {
1240 fcslen
-= truncated
;
1244 wakeup
.packet
= status
->wake_packet
;
1245 wakeup
.packet_present_len
= pktsize
;
1246 wakeup
.packet_len
= pktlen
- truncated
;
1247 wakeup
.packet_80211
= true;
1252 ieee80211_report_wowlan_wakeup(vif
, wakeup_report
, GFP_KERNEL
);
1256 iwl_free_resp(&cmd
);
1259 static void iwl_mvm_read_d3_sram(struct iwl_mvm
*mvm
)
1261 #ifdef CONFIG_IWLWIFI_DEBUGFS
1262 const struct fw_img
*img
= &mvm
->fw
->img
[IWL_UCODE_WOWLAN
];
1263 u32 len
= img
->sec
[IWL_UCODE_SECTION_DATA
].len
;
1264 u32 offs
= img
->sec
[IWL_UCODE_SECTION_DATA
].offset
;
1266 if (!mvm
->store_d3_resume_sram
)
1269 if (!mvm
->d3_resume_sram
) {
1270 mvm
->d3_resume_sram
= kzalloc(len
, GFP_KERNEL
);
1271 if (!mvm
->d3_resume_sram
)
1275 iwl_trans_read_mem_bytes(mvm
->trans
, offs
, mvm
->d3_resume_sram
, len
);
1279 static int __iwl_mvm_resume(struct iwl_mvm
*mvm
, bool test
)
1281 struct iwl_d3_iter_data resume_iter_data
= {
1284 struct ieee80211_vif
*vif
= NULL
;
1286 enum iwl_d3_status d3_status
;
1288 mutex_lock(&mvm
->mutex
);
1290 /* get the BSS vif pointer again */
1291 ieee80211_iterate_active_interfaces_atomic(
1292 mvm
->hw
, IEEE80211_IFACE_ITER_NORMAL
,
1293 iwl_mvm_d3_iface_iterator
, &resume_iter_data
);
1295 if (WARN_ON(resume_iter_data
.error
|| !resume_iter_data
.vif
))
1298 vif
= resume_iter_data
.vif
;
1300 ret
= iwl_trans_d3_resume(mvm
->trans
, &d3_status
, test
);
1304 if (d3_status
!= IWL_D3_STATUS_ALIVE
) {
1305 IWL_INFO(mvm
, "Device was reset during suspend\n");
1309 /* query SRAM first in case we want event logging */
1310 iwl_mvm_read_d3_sram(mvm
);
1312 iwl_mvm_query_wakeup_reasons(mvm
, vif
);
1315 mutex_unlock(&mvm
->mutex
);
1318 ieee80211_resume_disconnect(vif
);
1320 /* return 1 to reconfigure the device */
1321 set_bit(IWL_MVM_STATUS_IN_HW_RESTART
, &mvm
->status
);
1325 int iwl_mvm_resume(struct ieee80211_hw
*hw
)
1327 struct iwl_mvm
*mvm
= IWL_MAC80211_GET_MVM(hw
);
1329 return __iwl_mvm_resume(mvm
, false);
1332 void iwl_mvm_set_wakeup(struct ieee80211_hw
*hw
, bool enabled
)
1334 struct iwl_mvm
*mvm
= IWL_MAC80211_GET_MVM(hw
);
1336 device_set_wakeup_enable(mvm
->trans
->dev
, enabled
);
1339 #ifdef CONFIG_IWLWIFI_DEBUGFS
1340 static int iwl_mvm_d3_test_open(struct inode
*inode
, struct file
*file
)
1342 struct iwl_mvm
*mvm
= inode
->i_private
;
1345 if (mvm
->d3_test_active
)
1348 file
->private_data
= inode
->i_private
;
1350 ieee80211_stop_queues(mvm
->hw
);
1353 /* start pseudo D3 */
1355 err
= __iwl_mvm_suspend(mvm
->hw
, mvm
->hw
->wiphy
->wowlan_config
, true);
1360 ieee80211_wake_queues(mvm
->hw
);
1363 mvm
->d3_test_active
= true;
1367 static ssize_t
iwl_mvm_d3_test_read(struct file
*file
, char __user
*user_buf
,
1368 size_t count
, loff_t
*ppos
)
1370 struct iwl_mvm
*mvm
= file
->private_data
;
1374 pme_asserted
= iwl_trans_read_mem32(mvm
->trans
,
1375 mvm
->d3_test_pme_ptr
);
1378 if (msleep_interruptible(100))
1385 static void iwl_mvm_d3_test_disconn_work_iter(void *_data
, u8
*mac
,
1386 struct ieee80211_vif
*vif
)
1388 if (vif
->type
== NL80211_IFTYPE_STATION
)
1389 ieee80211_connection_loss(vif
);
1392 static int iwl_mvm_d3_test_release(struct inode
*inode
, struct file
*file
)
1394 struct iwl_mvm
*mvm
= inode
->i_private
;
1395 int remaining_time
= 10;
1397 mvm
->d3_test_active
= false;
1398 __iwl_mvm_resume(mvm
, true);
1399 iwl_abort_notification_waits(&mvm
->notif_wait
);
1400 ieee80211_restart_hw(mvm
->hw
);
1402 /* wait for restart and disconnect all interfaces */
1403 while (test_bit(IWL_MVM_STATUS_IN_HW_RESTART
, &mvm
->status
) &&
1404 remaining_time
> 0) {
1409 if (remaining_time
== 0)
1410 IWL_ERR(mvm
, "Timed out waiting for HW restart to finish!\n");
1412 ieee80211_iterate_active_interfaces_atomic(
1413 mvm
->hw
, IEEE80211_IFACE_ITER_NORMAL
,
1414 iwl_mvm_d3_test_disconn_work_iter
, NULL
);
1416 ieee80211_wake_queues(mvm
->hw
);
1421 const struct file_operations iwl_dbgfs_d3_test_ops
= {
1422 .llseek
= no_llseek
,
1423 .open
= iwl_mvm_d3_test_open
,
1424 .read
= iwl_mvm_d3_test_read
,
1425 .release
= iwl_mvm_d3_test_release
,