Add linux-next specific files for 20110831
[linux-2.6/next.git] / drivers / net / wireless / mwifiex / scan.c
blob37ca2f90ad63360486b8e2e7cd441e13931bed12
1 /*
2 * Marvell Wireless LAN device driver: scan ioctl and command handling
4 * Copyright (C) 2011, Marvell International Ltd.
6 * This software file (the "File") is distributed by Marvell International
7 * Ltd. under the terms of the GNU General Public License Version 2, June 1991
8 * (the "License"). You may use, redistribute and/or modify this File in
9 * accordance with the terms and conditions of the License, a copy of which
10 * is available by writing to the Free Software Foundation, Inc.,
11 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA or on the
12 * worldwide web at http://www.gnu.org/licenses/old-licenses/gpl-2.0.txt.
14 * THE FILE IS DISTRIBUTED AS-IS, WITHOUT WARRANTY OF ANY KIND, AND THE
15 * IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE
16 * ARE EXPRESSLY DISCLAIMED. The License provides additional details about
17 * this warranty disclaimer.
20 #include "decl.h"
21 #include "ioctl.h"
22 #include "util.h"
23 #include "fw.h"
24 #include "main.h"
25 #include "11n.h"
26 #include "cfg80211.h"
28 /* The maximum number of channels the firmware can scan per command */
29 #define MWIFIEX_MAX_CHANNELS_PER_SPECIFIC_SCAN 14
31 #define MWIFIEX_CHANNELS_PER_SCAN_CMD 4
33 /* Memory needed to store a max sized Channel List TLV for a firmware scan */
34 #define CHAN_TLV_MAX_SIZE (sizeof(struct mwifiex_ie_types_header) \
35 + (MWIFIEX_MAX_CHANNELS_PER_SPECIFIC_SCAN \
36 *sizeof(struct mwifiex_chan_scan_param_set)))
38 /* Memory needed to store supported rate */
39 #define RATE_TLV_MAX_SIZE (sizeof(struct mwifiex_ie_types_rates_param_set) \
40 + HOSTCMD_SUPPORTED_RATES)
42 /* Memory needed to store a max number/size WildCard SSID TLV for a firmware
43 scan */
44 #define WILDCARD_SSID_TLV_MAX_SIZE \
45 (MWIFIEX_MAX_SSID_LIST_LENGTH * \
46 (sizeof(struct mwifiex_ie_types_wildcard_ssid_params) \
47 + IEEE80211_MAX_SSID_LEN))
49 /* Maximum memory needed for a mwifiex_scan_cmd_config with all TLVs at max */
50 #define MAX_SCAN_CFG_ALLOC (sizeof(struct mwifiex_scan_cmd_config) \
51 + sizeof(struct mwifiex_ie_types_num_probes) \
52 + sizeof(struct mwifiex_ie_types_htcap) \
53 + CHAN_TLV_MAX_SIZE \
54 + RATE_TLV_MAX_SIZE \
55 + WILDCARD_SSID_TLV_MAX_SIZE)
58 union mwifiex_scan_cmd_config_tlv {
59 /* Scan configuration (variable length) */
60 struct mwifiex_scan_cmd_config config;
61 /* Max allocated block */
62 u8 config_alloc_buf[MAX_SCAN_CFG_ALLOC];
65 enum cipher_suite {
66 CIPHER_SUITE_TKIP,
67 CIPHER_SUITE_CCMP,
68 CIPHER_SUITE_MAX
70 static u8 mwifiex_wpa_oui[CIPHER_SUITE_MAX][4] = {
71 { 0x00, 0x50, 0xf2, 0x02 }, /* TKIP */
72 { 0x00, 0x50, 0xf2, 0x04 }, /* AES */
74 static u8 mwifiex_rsn_oui[CIPHER_SUITE_MAX][4] = {
75 { 0x00, 0x0f, 0xac, 0x02 }, /* TKIP */
76 { 0x00, 0x0f, 0xac, 0x04 }, /* AES */
80 * This function parses a given IE for a given OUI.
82 * This is used to parse a WPA/RSN IE to find if it has
83 * a given oui in PTK.
85 static u8
86 mwifiex_search_oui_in_ie(struct ie_body *iebody, u8 *oui)
88 u8 count;
90 count = iebody->ptk_cnt[0];
92 /* There could be multiple OUIs for PTK hence
93 1) Take the length.
94 2) Check all the OUIs for AES.
95 3) If one of them is AES then pass success. */
96 while (count) {
97 if (!memcmp(iebody->ptk_body, oui, sizeof(iebody->ptk_body)))
98 return MWIFIEX_OUI_PRESENT;
100 --count;
101 if (count)
102 iebody = (struct ie_body *) ((u8 *) iebody +
103 sizeof(iebody->ptk_body));
106 pr_debug("info: %s: OUI is not found in PTK\n", __func__);
107 return MWIFIEX_OUI_NOT_PRESENT;
111 * This function checks if a given OUI is present in a RSN IE.
113 * The function first checks if a RSN IE is present or not in the
114 * BSS descriptor. It tries to locate the OUI only if such an IE is
115 * present.
117 static u8
118 mwifiex_is_rsn_oui_present(struct mwifiex_bssdescriptor *bss_desc, u32 cipher)
120 u8 *oui;
121 struct ie_body *iebody;
122 u8 ret = MWIFIEX_OUI_NOT_PRESENT;
124 if (((bss_desc->bcn_rsn_ie) && ((*(bss_desc->bcn_rsn_ie)).
125 ieee_hdr.element_id == WLAN_EID_RSN))) {
126 iebody = (struct ie_body *)
127 (((u8 *) bss_desc->bcn_rsn_ie->data) +
128 RSN_GTK_OUI_OFFSET);
129 oui = &mwifiex_rsn_oui[cipher][0];
130 ret = mwifiex_search_oui_in_ie(iebody, oui);
131 if (ret)
132 return ret;
134 return ret;
138 * This function checks if a given OUI is present in a WPA IE.
140 * The function first checks if a WPA IE is present or not in the
141 * BSS descriptor. It tries to locate the OUI only if such an IE is
142 * present.
144 static u8
145 mwifiex_is_wpa_oui_present(struct mwifiex_bssdescriptor *bss_desc, u32 cipher)
147 u8 *oui;
148 struct ie_body *iebody;
149 u8 ret = MWIFIEX_OUI_NOT_PRESENT;
151 if (((bss_desc->bcn_wpa_ie) && ((*(bss_desc->bcn_wpa_ie)).
152 vend_hdr.element_id == WLAN_EID_WPA))) {
153 iebody = (struct ie_body *) bss_desc->bcn_wpa_ie->data;
154 oui = &mwifiex_wpa_oui[cipher][0];
155 ret = mwifiex_search_oui_in_ie(iebody, oui);
156 if (ret)
157 return ret;
159 return ret;
163 * This function compares two SSIDs and checks if they match.
166 mwifiex_ssid_cmp(struct mwifiex_802_11_ssid *ssid1,
167 struct mwifiex_802_11_ssid *ssid2)
169 if (!ssid1 || !ssid2 || (ssid1->ssid_len != ssid2->ssid_len))
170 return -1;
171 return memcmp(ssid1->ssid, ssid2->ssid, ssid1->ssid_len);
175 * Sends IOCTL request to start a scan with user configurations.
177 * This function allocates the IOCTL request buffer, fills it
178 * with requisite parameters and calls the IOCTL handler.
180 * Upon completion, it also generates a wireless event to notify
181 * applications.
183 int mwifiex_set_user_scan_ioctl(struct mwifiex_private *priv,
184 struct mwifiex_user_scan_cfg *scan_req)
186 int status;
188 priv->adapter->cmd_wait_q.condition = false;
190 status = mwifiex_scan_networks(priv, scan_req);
191 if (!status)
192 status = mwifiex_wait_queue_complete(priv->adapter);
194 return status;
198 * This function checks if wapi is enabled in driver and scanned network is
199 * compatible with it.
201 static bool
202 mwifiex_is_network_compatible_for_wapi(struct mwifiex_private *priv,
203 struct mwifiex_bssdescriptor *bss_desc)
205 if (priv->sec_info.wapi_enabled &&
206 (bss_desc->bcn_wapi_ie &&
207 ((*(bss_desc->bcn_wapi_ie)).ieee_hdr.element_id ==
208 WLAN_EID_BSS_AC_ACCESS_DELAY))) {
209 return true;
211 return false;
215 * This function checks if driver is configured with no security mode and
216 * scanned network is compatible with it.
218 static bool
219 mwifiex_is_network_compatible_for_no_sec(struct mwifiex_private *priv,
220 struct mwifiex_bssdescriptor *bss_desc)
222 if (priv->sec_info.wep_status == MWIFIEX_802_11_WEP_DISABLED
223 && !priv->sec_info.wpa_enabled && !priv->sec_info.wpa2_enabled
224 && ((!bss_desc->bcn_wpa_ie) ||
225 ((*(bss_desc->bcn_wpa_ie)).vend_hdr.element_id !=
226 WLAN_EID_WPA))
227 && ((!bss_desc->bcn_rsn_ie) ||
228 ((*(bss_desc->bcn_rsn_ie)).ieee_hdr.element_id !=
229 WLAN_EID_RSN))
230 && !priv->sec_info.encryption_mode
231 && !bss_desc->privacy) {
232 return true;
234 return false;
238 * This function checks if static WEP is enabled in driver and scanned network
239 * is compatible with it.
241 static bool
242 mwifiex_is_network_compatible_for_static_wep(struct mwifiex_private *priv,
243 struct mwifiex_bssdescriptor *bss_desc)
245 if (priv->sec_info.wep_status == MWIFIEX_802_11_WEP_ENABLED
246 && !priv->sec_info.wpa_enabled && !priv->sec_info.wpa2_enabled
247 && bss_desc->privacy) {
248 return true;
250 return false;
254 * This function checks if wpa is enabled in driver and scanned network is
255 * compatible with it.
257 static bool
258 mwifiex_is_network_compatible_for_wpa(struct mwifiex_private *priv,
259 struct mwifiex_bssdescriptor *bss_desc)
261 if (priv->sec_info.wep_status == MWIFIEX_802_11_WEP_DISABLED
262 && priv->sec_info.wpa_enabled && !priv->sec_info.wpa2_enabled
263 && ((bss_desc->bcn_wpa_ie) && ((*(bss_desc->bcn_wpa_ie)).vend_hdr.
264 element_id == WLAN_EID_WPA))
266 * Privacy bit may NOT be set in some APs like
267 * LinkSys WRT54G && bss_desc->privacy
270 dev_dbg(priv->adapter->dev, "info: %s: WPA:"
271 " wpa_ie=%#x wpa2_ie=%#x WEP=%s WPA=%s WPA2=%s "
272 "EncMode=%#x privacy=%#x\n", __func__,
273 (bss_desc->bcn_wpa_ie) ?
274 (*(bss_desc->bcn_wpa_ie)).
275 vend_hdr.element_id : 0,
276 (bss_desc->bcn_rsn_ie) ?
277 (*(bss_desc->bcn_rsn_ie)).
278 ieee_hdr.element_id : 0,
279 (priv->sec_info.wep_status ==
280 MWIFIEX_802_11_WEP_ENABLED) ? "e" : "d",
281 (priv->sec_info.wpa_enabled) ? "e" : "d",
282 (priv->sec_info.wpa2_enabled) ? "e" : "d",
283 priv->sec_info.encryption_mode,
284 bss_desc->privacy);
285 return true;
287 return false;
291 * This function checks if wpa2 is enabled in driver and scanned network is
292 * compatible with it.
294 static bool
295 mwifiex_is_network_compatible_for_wpa2(struct mwifiex_private *priv,
296 struct mwifiex_bssdescriptor *bss_desc)
298 if (priv->sec_info.wep_status == MWIFIEX_802_11_WEP_DISABLED
299 && !priv->sec_info.wpa_enabled && priv->sec_info.wpa2_enabled
300 && ((bss_desc->bcn_rsn_ie) && ((*(bss_desc->bcn_rsn_ie)).ieee_hdr.
301 element_id == WLAN_EID_RSN))
303 * Privacy bit may NOT be set in some APs like
304 * LinkSys WRT54G && bss_desc->privacy
307 dev_dbg(priv->adapter->dev, "info: %s: WPA2: "
308 " wpa_ie=%#x wpa2_ie=%#x WEP=%s WPA=%s WPA2=%s "
309 "EncMode=%#x privacy=%#x\n", __func__,
310 (bss_desc->bcn_wpa_ie) ?
311 (*(bss_desc->bcn_wpa_ie)).
312 vend_hdr.element_id : 0,
313 (bss_desc->bcn_rsn_ie) ?
314 (*(bss_desc->bcn_rsn_ie)).
315 ieee_hdr.element_id : 0,
316 (priv->sec_info.wep_status ==
317 MWIFIEX_802_11_WEP_ENABLED) ? "e" : "d",
318 (priv->sec_info.wpa_enabled) ? "e" : "d",
319 (priv->sec_info.wpa2_enabled) ? "e" : "d",
320 priv->sec_info.encryption_mode,
321 bss_desc->privacy);
322 return true;
324 return false;
328 * This function checks if adhoc AES is enabled in driver and scanned network is
329 * compatible with it.
331 static bool
332 mwifiex_is_network_compatible_for_adhoc_aes(struct mwifiex_private *priv,
333 struct mwifiex_bssdescriptor *bss_desc)
335 if (priv->sec_info.wep_status == MWIFIEX_802_11_WEP_DISABLED
336 && !priv->sec_info.wpa_enabled && !priv->sec_info.wpa2_enabled
337 && ((!bss_desc->bcn_wpa_ie) || ((*(bss_desc->bcn_wpa_ie)).vend_hdr.
338 element_id != WLAN_EID_WPA))
339 && ((!bss_desc->bcn_rsn_ie) || ((*(bss_desc->bcn_rsn_ie)).ieee_hdr.
340 element_id != WLAN_EID_RSN))
341 && !priv->sec_info.encryption_mode
342 && bss_desc->privacy) {
343 return true;
345 return false;
349 * This function checks if dynamic WEP is enabled in driver and scanned network
350 * is compatible with it.
352 static bool
353 mwifiex_is_network_compatible_for_dynamic_wep(struct mwifiex_private *priv,
354 struct mwifiex_bssdescriptor *bss_desc)
356 if (priv->sec_info.wep_status == MWIFIEX_802_11_WEP_DISABLED
357 && !priv->sec_info.wpa_enabled && !priv->sec_info.wpa2_enabled
358 && ((!bss_desc->bcn_wpa_ie) || ((*(bss_desc->bcn_wpa_ie)).vend_hdr.
359 element_id != WLAN_EID_WPA))
360 && ((!bss_desc->bcn_rsn_ie) || ((*(bss_desc->bcn_rsn_ie)).ieee_hdr.
361 element_id != WLAN_EID_RSN))
362 && priv->sec_info.encryption_mode
363 && bss_desc->privacy) {
364 dev_dbg(priv->adapter->dev, "info: %s: dynamic "
365 "WEP: wpa_ie=%#x wpa2_ie=%#x "
366 "EncMode=%#x privacy=%#x\n",
367 __func__,
368 (bss_desc->bcn_wpa_ie) ?
369 (*(bss_desc->bcn_wpa_ie)).
370 vend_hdr.element_id : 0,
371 (bss_desc->bcn_rsn_ie) ?
372 (*(bss_desc->bcn_rsn_ie)).
373 ieee_hdr.element_id : 0,
374 priv->sec_info.encryption_mode,
375 bss_desc->privacy);
376 return true;
378 return false;
382 * This function checks if a scanned network is compatible with the driver
383 * settings.
385 * WEP WPA WPA2 ad-hoc encrypt Network
386 * enabled enabled enabled AES mode Privacy WPA WPA2 Compatible
387 * 0 0 0 0 NONE 0 0 0 yes No security
388 * 0 1 0 0 x 1x 1 x yes WPA (disable
389 * HT if no AES)
390 * 0 0 1 0 x 1x x 1 yes WPA2 (disable
391 * HT if no AES)
392 * 0 0 0 1 NONE 1 0 0 yes Ad-hoc AES
393 * 1 0 0 0 NONE 1 0 0 yes Static WEP
394 * (disable HT)
395 * 0 0 0 0 !=NONE 1 0 0 yes Dynamic WEP
397 * Compatibility is not matched while roaming, except for mode.
399 static s32
400 mwifiex_is_network_compatible(struct mwifiex_private *priv,
401 struct mwifiex_bssdescriptor *bss_desc, u32 mode)
403 struct mwifiex_adapter *adapter = priv->adapter;
405 bss_desc->disable_11n = false;
407 /* Don't check for compatibility if roaming */
408 if (priv->media_connected && (priv->bss_mode == NL80211_IFTYPE_STATION)
409 && (bss_desc->bss_mode == NL80211_IFTYPE_STATION))
410 return 0;
412 if (priv->wps.session_enable) {
413 dev_dbg(adapter->dev,
414 "info: return success directly in WPS period\n");
415 return 0;
418 if (mwifiex_is_network_compatible_for_wapi(priv, bss_desc)) {
419 dev_dbg(adapter->dev, "info: return success for WAPI AP\n");
420 return 0;
423 if (bss_desc->bss_mode == mode) {
424 if (mwifiex_is_network_compatible_for_no_sec(priv, bss_desc)) {
425 /* No security */
426 return 0;
427 } else if (mwifiex_is_network_compatible_for_static_wep(priv,
428 bss_desc)) {
429 /* Static WEP enabled */
430 dev_dbg(adapter->dev, "info: Disable 11n in WEP mode.\n");
431 bss_desc->disable_11n = true;
432 return 0;
433 } else if (mwifiex_is_network_compatible_for_wpa(priv,
434 bss_desc)) {
435 /* WPA enabled */
436 if (((priv->adapter->config_bands & BAND_GN
437 || priv->adapter->config_bands & BAND_AN)
438 && bss_desc->bcn_ht_cap)
439 && !mwifiex_is_wpa_oui_present(bss_desc,
440 CIPHER_SUITE_CCMP)) {
442 if (mwifiex_is_wpa_oui_present(bss_desc,
443 CIPHER_SUITE_TKIP)) {
444 dev_dbg(adapter->dev,
445 "info: Disable 11n if AES "
446 "is not supported by AP\n");
447 bss_desc->disable_11n = true;
448 } else {
449 return -1;
452 return 0;
453 } else if (mwifiex_is_network_compatible_for_wpa2(priv,
454 bss_desc)) {
455 /* WPA2 enabled */
456 if (((priv->adapter->config_bands & BAND_GN
457 || priv->adapter->config_bands & BAND_AN)
458 && bss_desc->bcn_ht_cap)
459 && !mwifiex_is_rsn_oui_present(bss_desc,
460 CIPHER_SUITE_CCMP)) {
462 if (mwifiex_is_rsn_oui_present(bss_desc,
463 CIPHER_SUITE_TKIP)) {
464 dev_dbg(adapter->dev,
465 "info: Disable 11n if AES "
466 "is not supported by AP\n");
467 bss_desc->disable_11n = true;
468 } else {
469 return -1;
472 return 0;
473 } else if (mwifiex_is_network_compatible_for_adhoc_aes(priv,
474 bss_desc)) {
475 /* Ad-hoc AES enabled */
476 return 0;
477 } else if (mwifiex_is_network_compatible_for_dynamic_wep(priv,
478 bss_desc)) {
479 /* Dynamic WEP enabled */
480 return 0;
483 /* Security doesn't match */
484 dev_dbg(adapter->dev, "info: %s: failed: "
485 "wpa_ie=%#x wpa2_ie=%#x WEP=%s WPA=%s WPA2=%s EncMode"
486 "=%#x privacy=%#x\n",
487 __func__,
488 (bss_desc->bcn_wpa_ie) ?
489 (*(bss_desc->bcn_wpa_ie)).vend_hdr.
490 element_id : 0,
491 (bss_desc->bcn_rsn_ie) ?
492 (*(bss_desc->bcn_rsn_ie)).ieee_hdr.
493 element_id : 0,
494 (priv->sec_info.wep_status ==
495 MWIFIEX_802_11_WEP_ENABLED) ? "e" : "d",
496 (priv->sec_info.wpa_enabled) ? "e" : "d",
497 (priv->sec_info.wpa2_enabled) ? "e" : "d",
498 priv->sec_info.encryption_mode, bss_desc->privacy);
499 return -1;
502 /* Mode doesn't match */
503 return -1;
507 * This function creates a channel list for the driver to scan, based
508 * on region/band information.
510 * This routine is used for any scan that is not provided with a
511 * specific channel list to scan.
513 static void
514 mwifiex_scan_create_channel_list(struct mwifiex_private *priv,
515 const struct mwifiex_user_scan_cfg
516 *user_scan_in,
517 struct mwifiex_chan_scan_param_set
518 *scan_chan_list,
519 u8 filtered_scan)
521 enum ieee80211_band band;
522 struct ieee80211_supported_band *sband;
523 struct ieee80211_channel *ch;
524 struct mwifiex_adapter *adapter = priv->adapter;
525 int chan_idx = 0, i;
526 u8 scan_type;
528 for (band = 0; (band < IEEE80211_NUM_BANDS) ; band++) {
530 if (!priv->wdev->wiphy->bands[band])
531 continue;
533 sband = priv->wdev->wiphy->bands[band];
535 for (i = 0; (i < sband->n_channels) ; i++, chan_idx++) {
536 ch = &sband->channels[i];
537 if (ch->flags & IEEE80211_CHAN_DISABLED)
538 continue;
539 scan_chan_list[chan_idx].radio_type = band;
540 scan_type = ch->flags & IEEE80211_CHAN_PASSIVE_SCAN;
541 if (user_scan_in &&
542 user_scan_in->chan_list[0].scan_time)
543 scan_chan_list[chan_idx].max_scan_time =
544 cpu_to_le16((u16) user_scan_in->
545 chan_list[0].scan_time);
546 else if (scan_type == MWIFIEX_SCAN_TYPE_PASSIVE)
547 scan_chan_list[chan_idx].max_scan_time =
548 cpu_to_le16(adapter->passive_scan_time);
549 else
550 scan_chan_list[chan_idx].max_scan_time =
551 cpu_to_le16(adapter->active_scan_time);
552 if (scan_type == MWIFIEX_SCAN_TYPE_PASSIVE)
553 scan_chan_list[chan_idx].chan_scan_mode_bitmap
554 |= MWIFIEX_PASSIVE_SCAN;
555 else
556 scan_chan_list[chan_idx].chan_scan_mode_bitmap
557 &= ~MWIFIEX_PASSIVE_SCAN;
558 scan_chan_list[chan_idx].chan_number =
559 (u32) ch->hw_value;
560 if (filtered_scan) {
561 scan_chan_list[chan_idx].max_scan_time =
562 cpu_to_le16(adapter->specific_scan_time);
563 scan_chan_list[chan_idx].chan_scan_mode_bitmap
564 |= MWIFIEX_DISABLE_CHAN_FILT;
572 * This function constructs and sends multiple scan config commands to
573 * the firmware.
575 * Previous routines in the code flow have created a scan command configuration
576 * with any requested TLVs. This function splits the channel TLV into maximum
577 * channels supported per scan lists and sends the portion of the channel TLV,
578 * along with the other TLVs, to the firmware.
580 static int
581 mwifiex_scan_channel_list(struct mwifiex_private *priv,
582 u32 max_chan_per_scan, u8 filtered_scan,
583 struct mwifiex_scan_cmd_config *scan_cfg_out,
584 struct mwifiex_ie_types_chan_list_param_set
585 *chan_tlv_out,
586 struct mwifiex_chan_scan_param_set *scan_chan_list)
588 int ret = 0;
589 struct mwifiex_chan_scan_param_set *tmp_chan_list;
590 struct mwifiex_chan_scan_param_set *start_chan;
592 u32 tlv_idx;
593 u32 total_scan_time;
594 u32 done_early;
596 if (!scan_cfg_out || !chan_tlv_out || !scan_chan_list) {
597 dev_dbg(priv->adapter->dev,
598 "info: Scan: Null detect: %p, %p, %p\n",
599 scan_cfg_out, chan_tlv_out, scan_chan_list);
600 return -1;
603 chan_tlv_out->header.type = cpu_to_le16(TLV_TYPE_CHANLIST);
605 /* Set the temp channel struct pointer to the start of the desired
606 list */
607 tmp_chan_list = scan_chan_list;
609 /* Loop through the desired channel list, sending a new firmware scan
610 commands for each max_chan_per_scan channels (or for 1,6,11
611 individually if configured accordingly) */
612 while (tmp_chan_list->chan_number) {
614 tlv_idx = 0;
615 total_scan_time = 0;
616 chan_tlv_out->header.len = 0;
617 start_chan = tmp_chan_list;
618 done_early = false;
621 * Construct the Channel TLV for the scan command. Continue to
622 * insert channel TLVs until:
623 * - the tlv_idx hits the maximum configured per scan command
624 * - the next channel to insert is 0 (end of desired channel
625 * list)
626 * - done_early is set (controlling individual scanning of
627 * 1,6,11)
629 while (tlv_idx < max_chan_per_scan
630 && tmp_chan_list->chan_number && !done_early) {
632 dev_dbg(priv->adapter->dev,
633 "info: Scan: Chan(%3d), Radio(%d),"
634 " Mode(%d, %d), Dur(%d)\n",
635 tmp_chan_list->chan_number,
636 tmp_chan_list->radio_type,
637 tmp_chan_list->chan_scan_mode_bitmap
638 & MWIFIEX_PASSIVE_SCAN,
639 (tmp_chan_list->chan_scan_mode_bitmap
640 & MWIFIEX_DISABLE_CHAN_FILT) >> 1,
641 le16_to_cpu(tmp_chan_list->max_scan_time));
643 /* Copy the current channel TLV to the command being
644 prepared */
645 memcpy(chan_tlv_out->chan_scan_param + tlv_idx,
646 tmp_chan_list,
647 sizeof(chan_tlv_out->chan_scan_param));
649 /* Increment the TLV header length by the size
650 appended */
651 chan_tlv_out->header.len =
652 cpu_to_le16(le16_to_cpu(chan_tlv_out->header.len) +
653 (sizeof(chan_tlv_out->chan_scan_param)));
656 * The tlv buffer length is set to the number of bytes
657 * of the between the channel tlv pointer and the start
658 * of the tlv buffer. This compensates for any TLVs
659 * that were appended before the channel list.
661 scan_cfg_out->tlv_buf_len = (u32) ((u8 *) chan_tlv_out -
662 scan_cfg_out->tlv_buf);
664 /* Add the size of the channel tlv header and the data
665 length */
666 scan_cfg_out->tlv_buf_len +=
667 (sizeof(chan_tlv_out->header)
668 + le16_to_cpu(chan_tlv_out->header.len));
670 /* Increment the index to the channel tlv we are
671 constructing */
672 tlv_idx++;
674 /* Count the total scan time per command */
675 total_scan_time +=
676 le16_to_cpu(tmp_chan_list->max_scan_time);
678 done_early = false;
680 /* Stop the loop if the *current* channel is in the
681 1,6,11 set and we are not filtering on a BSSID
682 or SSID. */
683 if (!filtered_scan && (tmp_chan_list->chan_number == 1
684 || tmp_chan_list->chan_number == 6
685 || tmp_chan_list->chan_number == 11))
686 done_early = true;
688 /* Increment the tmp pointer to the next channel to
689 be scanned */
690 tmp_chan_list++;
692 /* Stop the loop if the *next* channel is in the 1,6,11
693 set. This will cause it to be the only channel
694 scanned on the next interation */
695 if (!filtered_scan && (tmp_chan_list->chan_number == 1
696 || tmp_chan_list->chan_number == 6
697 || tmp_chan_list->chan_number == 11))
698 done_early = true;
701 /* The total scan time should be less than scan command timeout
702 value */
703 if (total_scan_time > MWIFIEX_MAX_TOTAL_SCAN_TIME) {
704 dev_err(priv->adapter->dev, "total scan time %dms"
705 " is over limit (%dms), scan skipped\n",
706 total_scan_time, MWIFIEX_MAX_TOTAL_SCAN_TIME);
707 ret = -1;
708 break;
711 priv->adapter->scan_channels = start_chan;
713 /* Send the scan command to the firmware with the specified
714 cfg */
715 ret = mwifiex_send_cmd_async(priv, HostCmd_CMD_802_11_SCAN,
716 HostCmd_ACT_GEN_SET, 0,
717 scan_cfg_out);
718 if (ret)
719 break;
722 if (ret)
723 return -1;
725 return 0;
729 * This function constructs a scan command configuration structure to use
730 * in scan commands.
732 * Application layer or other functions can invoke network scanning
733 * with a scan configuration supplied in a user scan configuration structure.
734 * This structure is used as the basis of one or many scan command configuration
735 * commands that are sent to the command processing module and eventually to the
736 * firmware.
738 * This function creates a scan command configuration structure based on the
739 * following user supplied parameters (if present):
740 * - SSID filter
741 * - BSSID filter
742 * - Number of Probes to be sent
743 * - Channel list
745 * If the SSID or BSSID filter is not present, the filter is disabled/cleared.
746 * If the number of probes is not set, adapter default setting is used.
748 static void
749 mwifiex_scan_setup_scan_config(struct mwifiex_private *priv,
750 const struct mwifiex_user_scan_cfg *user_scan_in,
751 struct mwifiex_scan_cmd_config *scan_cfg_out,
752 struct mwifiex_ie_types_chan_list_param_set
753 **chan_list_out,
754 struct mwifiex_chan_scan_param_set
755 *scan_chan_list,
756 u8 *max_chan_per_scan, u8 *filtered_scan,
757 u8 *scan_current_only)
759 struct mwifiex_adapter *adapter = priv->adapter;
760 struct mwifiex_ie_types_num_probes *num_probes_tlv;
761 struct mwifiex_ie_types_wildcard_ssid_params *wildcard_ssid_tlv;
762 struct mwifiex_ie_types_rates_param_set *rates_tlv;
763 const u8 zero_mac[ETH_ALEN] = { 0, 0, 0, 0, 0, 0 };
764 u8 *tlv_pos;
765 u32 num_probes;
766 u32 ssid_len;
767 u32 chan_idx;
768 u32 scan_type;
769 u16 scan_dur;
770 u8 channel;
771 u8 radio_type;
772 u32 ssid_idx;
773 u8 ssid_filter;
774 u8 rates[MWIFIEX_SUPPORTED_RATES];
775 u32 rates_size;
776 struct mwifiex_ie_types_htcap *ht_cap;
778 /* The tlv_buf_len is calculated for each scan command. The TLVs added
779 in this routine will be preserved since the routine that sends the
780 command will append channelTLVs at *chan_list_out. The difference
781 between the *chan_list_out and the tlv_buf start will be used to
782 calculate the size of anything we add in this routine. */
783 scan_cfg_out->tlv_buf_len = 0;
785 /* Running tlv pointer. Assigned to chan_list_out at end of function
786 so later routines know where channels can be added to the command
787 buf */
788 tlv_pos = scan_cfg_out->tlv_buf;
790 /* Initialize the scan as un-filtered; the flag is later set to TRUE
791 below if a SSID or BSSID filter is sent in the command */
792 *filtered_scan = false;
794 /* Initialize the scan as not being only on the current channel. If
795 the channel list is customized, only contains one channel, and is
796 the active channel, this is set true and data flow is not halted. */
797 *scan_current_only = false;
799 if (user_scan_in) {
801 /* Default the ssid_filter flag to TRUE, set false under
802 certain wildcard conditions and qualified by the existence
803 of an SSID list before marking the scan as filtered */
804 ssid_filter = true;
806 /* Set the BSS type scan filter, use Adapter setting if
807 unset */
808 scan_cfg_out->bss_mode =
809 (user_scan_in->bss_mode ? (u8) user_scan_in->
810 bss_mode : (u8) adapter->scan_mode);
812 /* Set the number of probes to send, use Adapter setting
813 if unset */
814 num_probes =
815 (user_scan_in->num_probes ? user_scan_in->
816 num_probes : adapter->scan_probes);
819 * Set the BSSID filter to the incoming configuration,
820 * if non-zero. If not set, it will remain disabled
821 * (all zeros).
823 memcpy(scan_cfg_out->specific_bssid,
824 user_scan_in->specific_bssid,
825 sizeof(scan_cfg_out->specific_bssid));
827 for (ssid_idx = 0;
828 ((ssid_idx < ARRAY_SIZE(user_scan_in->ssid_list))
829 && (*user_scan_in->ssid_list[ssid_idx].ssid
830 || user_scan_in->ssid_list[ssid_idx].max_len));
831 ssid_idx++) {
833 ssid_len = strlen(user_scan_in->ssid_list[ssid_idx].
834 ssid) + 1;
836 wildcard_ssid_tlv =
837 (struct mwifiex_ie_types_wildcard_ssid_params *)
838 tlv_pos;
839 wildcard_ssid_tlv->header.type =
840 cpu_to_le16(TLV_TYPE_WILDCARDSSID);
841 wildcard_ssid_tlv->header.len = cpu_to_le16(
842 (u16) (ssid_len + sizeof(wildcard_ssid_tlv->
843 max_ssid_length)));
844 wildcard_ssid_tlv->max_ssid_length =
845 user_scan_in->ssid_list[ssid_idx].max_len;
847 memcpy(wildcard_ssid_tlv->ssid,
848 user_scan_in->ssid_list[ssid_idx].ssid,
849 ssid_len);
851 tlv_pos += (sizeof(wildcard_ssid_tlv->header)
852 + le16_to_cpu(wildcard_ssid_tlv->header.len));
854 dev_dbg(adapter->dev, "info: scan: ssid_list[%d]: %s, %d\n",
855 ssid_idx, wildcard_ssid_tlv->ssid,
856 wildcard_ssid_tlv->max_ssid_length);
858 /* Empty wildcard ssid with a maxlen will match many or
859 potentially all SSIDs (maxlen == 32), therefore do
860 not treat the scan as
861 filtered. */
862 if (!ssid_len && wildcard_ssid_tlv->max_ssid_length)
863 ssid_filter = false;
868 * The default number of channels sent in the command is low to
869 * ensure the response buffer from the firmware does not
870 * truncate scan results. That is not an issue with an SSID
871 * or BSSID filter applied to the scan results in the firmware.
873 if ((ssid_idx && ssid_filter)
874 || memcmp(scan_cfg_out->specific_bssid, &zero_mac,
875 sizeof(zero_mac)))
876 *filtered_scan = true;
877 } else {
878 scan_cfg_out->bss_mode = (u8) adapter->scan_mode;
879 num_probes = adapter->scan_probes;
883 * If a specific BSSID or SSID is used, the number of channels in the
884 * scan command will be increased to the absolute maximum.
886 if (*filtered_scan)
887 *max_chan_per_scan = MWIFIEX_MAX_CHANNELS_PER_SPECIFIC_SCAN;
888 else
889 *max_chan_per_scan = MWIFIEX_CHANNELS_PER_SCAN_CMD;
891 /* If the input config or adapter has the number of Probes set,
892 add tlv */
893 if (num_probes) {
895 dev_dbg(adapter->dev, "info: scan: num_probes = %d\n",
896 num_probes);
898 num_probes_tlv = (struct mwifiex_ie_types_num_probes *) tlv_pos;
899 num_probes_tlv->header.type = cpu_to_le16(TLV_TYPE_NUMPROBES);
900 num_probes_tlv->header.len =
901 cpu_to_le16(sizeof(num_probes_tlv->num_probes));
902 num_probes_tlv->num_probes = cpu_to_le16((u16) num_probes);
904 tlv_pos += sizeof(num_probes_tlv->header) +
905 le16_to_cpu(num_probes_tlv->header.len);
909 /* Append rates tlv */
910 memset(rates, 0, sizeof(rates));
912 rates_size = mwifiex_get_supported_rates(priv, rates);
914 rates_tlv = (struct mwifiex_ie_types_rates_param_set *) tlv_pos;
915 rates_tlv->header.type = cpu_to_le16(WLAN_EID_SUPP_RATES);
916 rates_tlv->header.len = cpu_to_le16((u16) rates_size);
917 memcpy(rates_tlv->rates, rates, rates_size);
918 tlv_pos += sizeof(rates_tlv->header) + rates_size;
920 dev_dbg(adapter->dev, "info: SCAN_CMD: Rates size = %d\n", rates_size);
922 if (ISSUPP_11NENABLED(priv->adapter->fw_cap_info)
923 && (priv->adapter->config_bands & BAND_GN
924 || priv->adapter->config_bands & BAND_AN)) {
925 ht_cap = (struct mwifiex_ie_types_htcap *) tlv_pos;
926 memset(ht_cap, 0, sizeof(struct mwifiex_ie_types_htcap));
927 ht_cap->header.type = cpu_to_le16(WLAN_EID_HT_CAPABILITY);
928 ht_cap->header.len =
929 cpu_to_le16(sizeof(struct ieee80211_ht_cap));
930 radio_type =
931 mwifiex_band_to_radio_type(priv->adapter->config_bands);
932 mwifiex_fill_cap_info(priv, radio_type, ht_cap);
933 tlv_pos += sizeof(struct mwifiex_ie_types_htcap);
936 /* Append vendor specific IE TLV */
937 mwifiex_cmd_append_vsie_tlv(priv, MWIFIEX_VSIE_MASK_SCAN, &tlv_pos);
940 * Set the output for the channel TLV to the address in the tlv buffer
941 * past any TLVs that were added in this function (SSID, num_probes).
942 * Channel TLVs will be added past this for each scan command,
943 * preserving the TLVs that were previously added.
945 *chan_list_out =
946 (struct mwifiex_ie_types_chan_list_param_set *) tlv_pos;
948 if (user_scan_in && user_scan_in->chan_list[0].chan_number) {
950 dev_dbg(adapter->dev, "info: Scan: Using supplied channel list\n");
952 for (chan_idx = 0;
953 chan_idx < MWIFIEX_USER_SCAN_CHAN_MAX
954 && user_scan_in->chan_list[chan_idx].chan_number;
955 chan_idx++) {
957 channel = user_scan_in->chan_list[chan_idx].chan_number;
958 (scan_chan_list + chan_idx)->chan_number = channel;
960 radio_type =
961 user_scan_in->chan_list[chan_idx].radio_type;
962 (scan_chan_list + chan_idx)->radio_type = radio_type;
964 scan_type = user_scan_in->chan_list[chan_idx].scan_type;
966 if (scan_type == MWIFIEX_SCAN_TYPE_PASSIVE)
967 (scan_chan_list +
968 chan_idx)->chan_scan_mode_bitmap
969 |= MWIFIEX_PASSIVE_SCAN;
970 else
971 (scan_chan_list +
972 chan_idx)->chan_scan_mode_bitmap
973 &= ~MWIFIEX_PASSIVE_SCAN;
975 if (user_scan_in->chan_list[chan_idx].scan_time) {
976 scan_dur = (u16) user_scan_in->
977 chan_list[chan_idx].scan_time;
978 } else {
979 if (scan_type == MWIFIEX_SCAN_TYPE_PASSIVE)
980 scan_dur = adapter->passive_scan_time;
981 else if (*filtered_scan)
982 scan_dur = adapter->specific_scan_time;
983 else
984 scan_dur = adapter->active_scan_time;
987 (scan_chan_list + chan_idx)->min_scan_time =
988 cpu_to_le16(scan_dur);
989 (scan_chan_list + chan_idx)->max_scan_time =
990 cpu_to_le16(scan_dur);
993 /* Check if we are only scanning the current channel */
994 if ((chan_idx == 1)
995 && (user_scan_in->chan_list[0].chan_number
996 == priv->curr_bss_params.bss_descriptor.channel)) {
997 *scan_current_only = true;
998 dev_dbg(adapter->dev,
999 "info: Scan: Scanning current channel only\n");
1002 } else {
1003 dev_dbg(adapter->dev,
1004 "info: Scan: Creating full region channel list\n");
1005 mwifiex_scan_create_channel_list(priv, user_scan_in,
1006 scan_chan_list,
1007 *filtered_scan);
1012 * This function inspects the scan response buffer for pointers to
1013 * expected TLVs.
1015 * TLVs can be included at the end of the scan response BSS information.
1017 * Data in the buffer is parsed pointers to TLVs that can potentially
1018 * be passed back in the response.
1020 static void
1021 mwifiex_ret_802_11_scan_get_tlv_ptrs(struct mwifiex_adapter *adapter,
1022 struct mwifiex_ie_types_data *tlv,
1023 u32 tlv_buf_size, u32 req_tlv_type,
1024 struct mwifiex_ie_types_data **tlv_data)
1026 struct mwifiex_ie_types_data *current_tlv;
1027 u32 tlv_buf_left;
1028 u32 tlv_type;
1029 u32 tlv_len;
1031 current_tlv = tlv;
1032 tlv_buf_left = tlv_buf_size;
1033 *tlv_data = NULL;
1035 dev_dbg(adapter->dev, "info: SCAN_RESP: tlv_buf_size = %d\n",
1036 tlv_buf_size);
1038 while (tlv_buf_left >= sizeof(struct mwifiex_ie_types_header)) {
1040 tlv_type = le16_to_cpu(current_tlv->header.type);
1041 tlv_len = le16_to_cpu(current_tlv->header.len);
1043 if (sizeof(tlv->header) + tlv_len > tlv_buf_left) {
1044 dev_err(adapter->dev, "SCAN_RESP: TLV buffer corrupt\n");
1045 break;
1048 if (req_tlv_type == tlv_type) {
1049 switch (tlv_type) {
1050 case TLV_TYPE_TSFTIMESTAMP:
1051 dev_dbg(adapter->dev, "info: SCAN_RESP: TSF "
1052 "timestamp TLV, len = %d\n", tlv_len);
1053 *tlv_data = (struct mwifiex_ie_types_data *)
1054 current_tlv;
1055 break;
1056 case TLV_TYPE_CHANNELBANDLIST:
1057 dev_dbg(adapter->dev, "info: SCAN_RESP: channel"
1058 " band list TLV, len = %d\n", tlv_len);
1059 *tlv_data = (struct mwifiex_ie_types_data *)
1060 current_tlv;
1061 break;
1062 default:
1063 dev_err(adapter->dev,
1064 "SCAN_RESP: unhandled TLV = %d\n",
1065 tlv_type);
1066 /* Give up, this seems corrupted */
1067 return;
1071 if (*tlv_data)
1072 break;
1075 tlv_buf_left -= (sizeof(tlv->header) + tlv_len);
1076 current_tlv =
1077 (struct mwifiex_ie_types_data *) (current_tlv->data +
1078 tlv_len);
1080 } /* while */
1084 * This function parses provided beacon buffer and updates
1085 * respective fields in bss descriptor structure.
1088 mwifiex_update_bss_desc_with_ie(struct mwifiex_adapter *adapter,
1089 struct mwifiex_bssdescriptor *bss_entry,
1090 u8 *ie_buf, u32 ie_len)
1092 int ret = 0;
1093 u8 element_id;
1094 struct ieee_types_fh_param_set *fh_param_set;
1095 struct ieee_types_ds_param_set *ds_param_set;
1096 struct ieee_types_cf_param_set *cf_param_set;
1097 struct ieee_types_ibss_param_set *ibss_param_set;
1098 u8 *current_ptr;
1099 u8 *rate;
1100 u8 element_len;
1101 u16 total_ie_len;
1102 u8 bytes_to_copy;
1103 u8 rate_size;
1104 u8 found_data_rate_ie;
1105 u32 bytes_left;
1106 struct ieee_types_vendor_specific *vendor_ie;
1107 const u8 wpa_oui[4] = { 0x00, 0x50, 0xf2, 0x01 };
1108 const u8 wmm_oui[4] = { 0x00, 0x50, 0xf2, 0x02 };
1110 found_data_rate_ie = false;
1111 rate_size = 0;
1112 current_ptr = ie_buf;
1113 bytes_left = ie_len;
1114 bss_entry->beacon_buf = ie_buf;
1115 bss_entry->beacon_buf_size = ie_len;
1117 /* Process variable IE */
1118 while (bytes_left >= 2) {
1119 element_id = *current_ptr;
1120 element_len = *(current_ptr + 1);
1121 total_ie_len = element_len + sizeof(struct ieee_types_header);
1123 if (bytes_left < total_ie_len) {
1124 dev_err(adapter->dev, "err: InterpretIE: in processing"
1125 " IE, bytes left < IE length\n");
1126 return -1;
1128 switch (element_id) {
1129 case WLAN_EID_SSID:
1130 bss_entry->ssid.ssid_len = element_len;
1131 memcpy(bss_entry->ssid.ssid, (current_ptr + 2),
1132 element_len);
1133 dev_dbg(adapter->dev, "info: InterpretIE: ssid: "
1134 "%-32s\n", bss_entry->ssid.ssid);
1135 break;
1137 case WLAN_EID_SUPP_RATES:
1138 memcpy(bss_entry->data_rates, current_ptr + 2,
1139 element_len);
1140 memcpy(bss_entry->supported_rates, current_ptr + 2,
1141 element_len);
1142 rate_size = element_len;
1143 found_data_rate_ie = true;
1144 break;
1146 case WLAN_EID_FH_PARAMS:
1147 fh_param_set =
1148 (struct ieee_types_fh_param_set *) current_ptr;
1149 memcpy(&bss_entry->phy_param_set.fh_param_set,
1150 fh_param_set,
1151 sizeof(struct ieee_types_fh_param_set));
1152 break;
1154 case WLAN_EID_DS_PARAMS:
1155 ds_param_set =
1156 (struct ieee_types_ds_param_set *) current_ptr;
1158 bss_entry->channel = ds_param_set->current_chan;
1160 memcpy(&bss_entry->phy_param_set.ds_param_set,
1161 ds_param_set,
1162 sizeof(struct ieee_types_ds_param_set));
1163 break;
1165 case WLAN_EID_CF_PARAMS:
1166 cf_param_set =
1167 (struct ieee_types_cf_param_set *) current_ptr;
1168 memcpy(&bss_entry->ss_param_set.cf_param_set,
1169 cf_param_set,
1170 sizeof(struct ieee_types_cf_param_set));
1171 break;
1173 case WLAN_EID_IBSS_PARAMS:
1174 ibss_param_set =
1175 (struct ieee_types_ibss_param_set *)
1176 current_ptr;
1177 memcpy(&bss_entry->ss_param_set.ibss_param_set,
1178 ibss_param_set,
1179 sizeof(struct ieee_types_ibss_param_set));
1180 break;
1182 case WLAN_EID_ERP_INFO:
1183 bss_entry->erp_flags = *(current_ptr + 2);
1184 break;
1186 case WLAN_EID_EXT_SUPP_RATES:
1188 * Only process extended supported rate
1189 * if data rate is already found.
1190 * Data rate IE should come before
1191 * extended supported rate IE
1193 if (found_data_rate_ie) {
1194 if ((element_len + rate_size) >
1195 MWIFIEX_SUPPORTED_RATES)
1196 bytes_to_copy =
1197 (MWIFIEX_SUPPORTED_RATES -
1198 rate_size);
1199 else
1200 bytes_to_copy = element_len;
1202 rate = (u8 *) bss_entry->data_rates;
1203 rate += rate_size;
1204 memcpy(rate, current_ptr + 2, bytes_to_copy);
1206 rate = (u8 *) bss_entry->supported_rates;
1207 rate += rate_size;
1208 memcpy(rate, current_ptr + 2, bytes_to_copy);
1210 break;
1212 case WLAN_EID_VENDOR_SPECIFIC:
1213 vendor_ie = (struct ieee_types_vendor_specific *)
1214 current_ptr;
1216 if (!memcmp
1217 (vendor_ie->vend_hdr.oui, wpa_oui,
1218 sizeof(wpa_oui))) {
1219 bss_entry->bcn_wpa_ie =
1220 (struct ieee_types_vendor_specific *)
1221 current_ptr;
1222 bss_entry->wpa_offset = (u16) (current_ptr -
1223 bss_entry->beacon_buf);
1224 } else if (!memcmp(vendor_ie->vend_hdr.oui, wmm_oui,
1225 sizeof(wmm_oui))) {
1226 if (total_ie_len ==
1227 sizeof(struct ieee_types_wmm_parameter)
1228 || total_ie_len ==
1229 sizeof(struct ieee_types_wmm_info))
1231 * Only accept and copy the WMM IE if
1232 * it matches the size expected for the
1233 * WMM Info IE or the WMM Parameter IE.
1235 memcpy((u8 *) &bss_entry->wmm_ie,
1236 current_ptr, total_ie_len);
1238 break;
1239 case WLAN_EID_RSN:
1240 bss_entry->bcn_rsn_ie =
1241 (struct ieee_types_generic *) current_ptr;
1242 bss_entry->rsn_offset = (u16) (current_ptr -
1243 bss_entry->beacon_buf);
1244 break;
1245 case WLAN_EID_BSS_AC_ACCESS_DELAY:
1246 bss_entry->bcn_wapi_ie =
1247 (struct ieee_types_generic *) current_ptr;
1248 bss_entry->wapi_offset = (u16) (current_ptr -
1249 bss_entry->beacon_buf);
1250 break;
1251 case WLAN_EID_HT_CAPABILITY:
1252 bss_entry->bcn_ht_cap = (struct ieee80211_ht_cap *)
1253 (current_ptr +
1254 sizeof(struct ieee_types_header));
1255 bss_entry->ht_cap_offset = (u16) (current_ptr +
1256 sizeof(struct ieee_types_header) -
1257 bss_entry->beacon_buf);
1258 break;
1259 case WLAN_EID_HT_INFORMATION:
1260 bss_entry->bcn_ht_info = (struct ieee80211_ht_info *)
1261 (current_ptr +
1262 sizeof(struct ieee_types_header));
1263 bss_entry->ht_info_offset = (u16) (current_ptr +
1264 sizeof(struct ieee_types_header) -
1265 bss_entry->beacon_buf);
1266 break;
1267 case WLAN_EID_BSS_COEX_2040:
1268 bss_entry->bcn_bss_co_2040 = (u8 *) (current_ptr +
1269 sizeof(struct ieee_types_header));
1270 bss_entry->bss_co_2040_offset = (u16) (current_ptr +
1271 sizeof(struct ieee_types_header) -
1272 bss_entry->beacon_buf);
1273 break;
1274 case WLAN_EID_EXT_CAPABILITY:
1275 bss_entry->bcn_ext_cap = (u8 *) (current_ptr +
1276 sizeof(struct ieee_types_header));
1277 bss_entry->ext_cap_offset = (u16) (current_ptr +
1278 sizeof(struct ieee_types_header) -
1279 bss_entry->beacon_buf);
1280 break;
1281 default:
1282 break;
1285 current_ptr += element_len + 2;
1287 /* Need to account for IE ID and IE Len */
1288 bytes_left -= (element_len + 2);
1290 } /* while (bytes_left > 2) */
1291 return ret;
1295 * This function converts radio type scan parameter to a band configuration
1296 * to be used in join command.
1298 static u8
1299 mwifiex_radio_type_to_band(u8 radio_type)
1301 switch (radio_type) {
1302 case HostCmd_SCAN_RADIO_TYPE_A:
1303 return BAND_A;
1304 case HostCmd_SCAN_RADIO_TYPE_BG:
1305 default:
1306 return BAND_G;
1311 * This is an internal function used to start a scan based on an input
1312 * configuration.
1314 * This uses the input user scan configuration information when provided in
1315 * order to send the appropriate scan commands to firmware to populate or
1316 * update the internal driver scan table.
1318 int mwifiex_scan_networks(struct mwifiex_private *priv,
1319 const struct mwifiex_user_scan_cfg *user_scan_in)
1321 int ret = 0;
1322 struct mwifiex_adapter *adapter = priv->adapter;
1323 struct cmd_ctrl_node *cmd_node;
1324 union mwifiex_scan_cmd_config_tlv *scan_cfg_out;
1325 struct mwifiex_ie_types_chan_list_param_set *chan_list_out;
1326 u32 buf_size;
1327 struct mwifiex_chan_scan_param_set *scan_chan_list;
1328 u8 filtered_scan;
1329 u8 scan_current_chan_only;
1330 u8 max_chan_per_scan;
1331 unsigned long flags;
1333 if (adapter->scan_processing) {
1334 dev_dbg(adapter->dev, "cmd: Scan already in process...\n");
1335 return ret;
1338 spin_lock_irqsave(&adapter->mwifiex_cmd_lock, flags);
1339 adapter->scan_processing = true;
1340 spin_unlock_irqrestore(&adapter->mwifiex_cmd_lock, flags);
1342 if (priv->scan_block) {
1343 dev_dbg(adapter->dev,
1344 "cmd: Scan is blocked during association...\n");
1345 return ret;
1348 scan_cfg_out = kzalloc(sizeof(union mwifiex_scan_cmd_config_tlv),
1349 GFP_KERNEL);
1350 if (!scan_cfg_out) {
1351 dev_err(adapter->dev, "failed to alloc scan_cfg_out\n");
1352 return -ENOMEM;
1355 buf_size = sizeof(struct mwifiex_chan_scan_param_set) *
1356 MWIFIEX_USER_SCAN_CHAN_MAX;
1357 scan_chan_list = kzalloc(buf_size, GFP_KERNEL);
1358 if (!scan_chan_list) {
1359 dev_err(adapter->dev, "failed to alloc scan_chan_list\n");
1360 kfree(scan_cfg_out);
1361 return -ENOMEM;
1364 mwifiex_scan_setup_scan_config(priv, user_scan_in,
1365 &scan_cfg_out->config, &chan_list_out,
1366 scan_chan_list, &max_chan_per_scan,
1367 &filtered_scan, &scan_current_chan_only);
1369 ret = mwifiex_scan_channel_list(priv, max_chan_per_scan, filtered_scan,
1370 &scan_cfg_out->config, chan_list_out,
1371 scan_chan_list);
1373 /* Get scan command from scan_pending_q and put to cmd_pending_q */
1374 if (!ret) {
1375 spin_lock_irqsave(&adapter->scan_pending_q_lock, flags);
1376 if (!list_empty(&adapter->scan_pending_q)) {
1377 cmd_node = list_first_entry(&adapter->scan_pending_q,
1378 struct cmd_ctrl_node, list);
1379 list_del(&cmd_node->list);
1380 spin_unlock_irqrestore(&adapter->scan_pending_q_lock,
1381 flags);
1382 mwifiex_insert_cmd_to_pending_q(adapter, cmd_node,
1383 true);
1384 } else {
1385 spin_unlock_irqrestore(&adapter->scan_pending_q_lock,
1386 flags);
1388 } else {
1389 spin_lock_irqsave(&adapter->mwifiex_cmd_lock, flags);
1390 adapter->scan_processing = true;
1391 spin_unlock_irqrestore(&adapter->mwifiex_cmd_lock, flags);
1394 kfree(scan_cfg_out);
1395 kfree(scan_chan_list);
1396 return ret;
1400 * This function prepares a scan command to be sent to the firmware.
1402 * This uses the scan command configuration sent to the command processing
1403 * module in command preparation stage to configure a scan command structure
1404 * to send to firmware.
1406 * The fixed fields specifying the BSS type and BSSID filters as well as a
1407 * variable number/length of TLVs are sent in the command to firmware.
1409 * Preparation also includes -
1410 * - Setting command ID, and proper size
1411 * - Ensuring correct endian-ness
1413 int mwifiex_cmd_802_11_scan(struct host_cmd_ds_command *cmd,
1414 struct mwifiex_scan_cmd_config *scan_cfg)
1416 struct host_cmd_ds_802_11_scan *scan_cmd = &cmd->params.scan;
1418 /* Set fixed field variables in scan command */
1419 scan_cmd->bss_mode = scan_cfg->bss_mode;
1420 memcpy(scan_cmd->bssid, scan_cfg->specific_bssid,
1421 sizeof(scan_cmd->bssid));
1422 memcpy(scan_cmd->tlv_buffer, scan_cfg->tlv_buf, scan_cfg->tlv_buf_len);
1424 cmd->command = cpu_to_le16(HostCmd_CMD_802_11_SCAN);
1426 /* Size is equal to the sizeof(fixed portions) + the TLV len + header */
1427 cmd->size = cpu_to_le16((u16) (sizeof(scan_cmd->bss_mode)
1428 + sizeof(scan_cmd->bssid)
1429 + scan_cfg->tlv_buf_len + S_DS_GEN));
1431 return 0;
1435 * This function checks compatibility of requested network with current
1436 * driver settings.
1438 int mwifiex_check_network_compatibility(struct mwifiex_private *priv,
1439 struct mwifiex_bssdescriptor *bss_desc)
1441 int ret = -1;
1443 if (!bss_desc)
1444 return -1;
1446 if ((mwifiex_get_cfp_by_band_and_channel_from_cfg80211(priv,
1447 (u8) bss_desc->bss_band, (u16) bss_desc->channel))) {
1448 switch (priv->bss_mode) {
1449 case NL80211_IFTYPE_STATION:
1450 case NL80211_IFTYPE_ADHOC:
1451 ret = mwifiex_is_network_compatible(priv, bss_desc,
1452 priv->bss_mode);
1453 if (ret)
1454 dev_err(priv->adapter->dev, "cannot find ssid "
1455 "%s\n", bss_desc->ssid.ssid);
1456 break;
1457 default:
1458 ret = 0;
1462 return ret;
1465 static int
1466 mwifiex_update_curr_bss_params(struct mwifiex_private *priv,
1467 u8 *bssid, s32 rssi, const u8 *ie_buf,
1468 size_t ie_len, u16 beacon_period, u16 cap_info_bitmap)
1470 struct mwifiex_bssdescriptor *bss_desc = NULL;
1471 int ret;
1472 unsigned long flags;
1473 u8 *beacon_ie;
1475 /* Allocate and fill new bss descriptor */
1476 bss_desc = kzalloc(sizeof(struct mwifiex_bssdescriptor),
1477 GFP_KERNEL);
1478 if (!bss_desc) {
1479 dev_err(priv->adapter->dev, " failed to alloc bss_desc\n");
1480 return -ENOMEM;
1482 beacon_ie = kzalloc(ie_len, GFP_KERNEL);
1483 if (!beacon_ie) {
1484 dev_err(priv->adapter->dev, " failed to alloc beacon_ie\n");
1485 return -ENOMEM;
1487 memcpy(beacon_ie, ie_buf, ie_len);
1489 ret = mwifiex_fill_new_bss_desc(priv, bssid, rssi, beacon_ie,
1490 ie_len, beacon_period,
1491 cap_info_bitmap, bss_desc);
1492 if (ret)
1493 goto done;
1495 ret = mwifiex_check_network_compatibility(priv, bss_desc);
1496 if (ret)
1497 goto done;
1499 /* Update current bss descriptor parameters */
1500 spin_lock_irqsave(&priv->curr_bcn_buf_lock, flags);
1501 priv->curr_bss_params.bss_descriptor.bcn_wpa_ie = NULL;
1502 priv->curr_bss_params.bss_descriptor.wpa_offset = 0;
1503 priv->curr_bss_params.bss_descriptor.bcn_rsn_ie = NULL;
1504 priv->curr_bss_params.bss_descriptor.rsn_offset = 0;
1505 priv->curr_bss_params.bss_descriptor.bcn_wapi_ie = NULL;
1506 priv->curr_bss_params.bss_descriptor.wapi_offset = 0;
1507 priv->curr_bss_params.bss_descriptor.bcn_ht_cap = NULL;
1508 priv->curr_bss_params.bss_descriptor.ht_cap_offset =
1510 priv->curr_bss_params.bss_descriptor.bcn_ht_info = NULL;
1511 priv->curr_bss_params.bss_descriptor.ht_info_offset =
1513 priv->curr_bss_params.bss_descriptor.bcn_bss_co_2040 =
1514 NULL;
1515 priv->curr_bss_params.bss_descriptor.
1516 bss_co_2040_offset = 0;
1517 priv->curr_bss_params.bss_descriptor.bcn_ext_cap = NULL;
1518 priv->curr_bss_params.bss_descriptor.ext_cap_offset = 0;
1519 priv->curr_bss_params.bss_descriptor.beacon_buf = NULL;
1520 priv->curr_bss_params.bss_descriptor.beacon_buf_size =
1523 /* Make a copy of current BSSID descriptor */
1524 memcpy(&priv->curr_bss_params.bss_descriptor, bss_desc,
1525 sizeof(priv->curr_bss_params.bss_descriptor));
1526 mwifiex_save_curr_bcn(priv);
1527 spin_unlock_irqrestore(&priv->curr_bcn_buf_lock, flags);
1529 done:
1530 kfree(bss_desc);
1531 kfree(beacon_ie);
1532 return 0;
1536 * This function handles the command response of scan.
1538 * The response buffer for the scan command has the following
1539 * memory layout:
1541 * .-------------------------------------------------------------.
1542 * | Header (4 * sizeof(t_u16)): Standard command response hdr |
1543 * .-------------------------------------------------------------.
1544 * | BufSize (t_u16) : sizeof the BSS Description data |
1545 * .-------------------------------------------------------------.
1546 * | NumOfSet (t_u8) : Number of BSS Descs returned |
1547 * .-------------------------------------------------------------.
1548 * | BSSDescription data (variable, size given in BufSize) |
1549 * .-------------------------------------------------------------.
1550 * | TLV data (variable, size calculated using Header->Size, |
1551 * | BufSize and sizeof the fixed fields above) |
1552 * .-------------------------------------------------------------.
1554 int mwifiex_ret_802_11_scan(struct mwifiex_private *priv,
1555 struct host_cmd_ds_command *resp)
1557 int ret = 0;
1558 struct mwifiex_adapter *adapter = priv->adapter;
1559 struct cmd_ctrl_node *cmd_node;
1560 struct host_cmd_ds_802_11_scan_rsp *scan_rsp;
1561 struct mwifiex_ie_types_data *tlv_data;
1562 struct mwifiex_ie_types_tsf_timestamp *tsf_tlv;
1563 u8 *bss_info;
1564 u32 scan_resp_size;
1565 u32 bytes_left;
1566 u32 idx;
1567 u32 tlv_buf_size;
1568 struct mwifiex_chan_freq_power *cfp;
1569 struct mwifiex_ie_types_chan_band_list_param_set *chan_band_tlv;
1570 struct chan_band_param_set *chan_band;
1571 u8 is_bgscan_resp;
1572 unsigned long flags;
1574 is_bgscan_resp = (le16_to_cpu(resp->command)
1575 == HostCmd_CMD_802_11_BG_SCAN_QUERY);
1576 if (is_bgscan_resp)
1577 scan_rsp = &resp->params.bg_scan_query_resp.scan_resp;
1578 else
1579 scan_rsp = &resp->params.scan_resp;
1582 if (scan_rsp->number_of_sets > MWIFIEX_MAX_AP) {
1583 dev_err(adapter->dev, "SCAN_RESP: too many AP returned (%d)\n",
1584 scan_rsp->number_of_sets);
1585 ret = -1;
1586 goto done;
1589 bytes_left = le16_to_cpu(scan_rsp->bss_descript_size);
1590 dev_dbg(adapter->dev, "info: SCAN_RESP: bss_descript_size %d\n",
1591 bytes_left);
1593 scan_resp_size = le16_to_cpu(resp->size);
1595 dev_dbg(adapter->dev,
1596 "info: SCAN_RESP: returned %d APs before parsing\n",
1597 scan_rsp->number_of_sets);
1599 bss_info = scan_rsp->bss_desc_and_tlv_buffer;
1602 * The size of the TLV buffer is equal to the entire command response
1603 * size (scan_resp_size) minus the fixed fields (sizeof()'s), the
1604 * BSS Descriptions (bss_descript_size as bytesLef) and the command
1605 * response header (S_DS_GEN)
1607 tlv_buf_size = scan_resp_size - (bytes_left
1608 + sizeof(scan_rsp->bss_descript_size)
1609 + sizeof(scan_rsp->number_of_sets)
1610 + S_DS_GEN);
1612 tlv_data = (struct mwifiex_ie_types_data *) (scan_rsp->
1613 bss_desc_and_tlv_buffer +
1614 bytes_left);
1616 /* Search the TLV buffer space in the scan response for any valid
1617 TLVs */
1618 mwifiex_ret_802_11_scan_get_tlv_ptrs(adapter, tlv_data, tlv_buf_size,
1619 TLV_TYPE_TSFTIMESTAMP,
1620 (struct mwifiex_ie_types_data **)
1621 &tsf_tlv);
1623 /* Search the TLV buffer space in the scan response for any valid
1624 TLVs */
1625 mwifiex_ret_802_11_scan_get_tlv_ptrs(adapter, tlv_data, tlv_buf_size,
1626 TLV_TYPE_CHANNELBANDLIST,
1627 (struct mwifiex_ie_types_data **)
1628 &chan_band_tlv);
1630 for (idx = 0; idx < scan_rsp->number_of_sets && bytes_left; idx++) {
1631 u8 bssid[ETH_ALEN];
1632 s32 rssi;
1633 const u8 *ie_buf;
1634 size_t ie_len;
1635 int channel = -1;
1636 u64 network_tsf = 0;
1637 u16 beacon_size = 0;
1638 u32 curr_bcn_bytes;
1639 u32 freq;
1640 u16 beacon_period;
1641 u16 cap_info_bitmap;
1642 u8 *current_ptr;
1643 struct mwifiex_bcn_param *bcn_param;
1645 if (bytes_left >= sizeof(beacon_size)) {
1646 /* Extract & convert beacon size from command buffer */
1647 memcpy(&beacon_size, bss_info, sizeof(beacon_size));
1648 bytes_left -= sizeof(beacon_size);
1649 bss_info += sizeof(beacon_size);
1652 if (!beacon_size || beacon_size > bytes_left) {
1653 bss_info += bytes_left;
1654 bytes_left = 0;
1655 return -1;
1658 /* Initialize the current working beacon pointer for this BSS
1659 * iteration */
1660 current_ptr = bss_info;
1662 /* Advance the return beacon pointer past the current beacon */
1663 bss_info += beacon_size;
1664 bytes_left -= beacon_size;
1666 curr_bcn_bytes = beacon_size;
1669 * First 5 fields are bssid, RSSI, time stamp, beacon interval,
1670 * and capability information
1672 if (curr_bcn_bytes < sizeof(struct mwifiex_bcn_param)) {
1673 dev_err(adapter->dev, "InterpretIE: not enough bytes left\n");
1674 continue;
1676 bcn_param = (struct mwifiex_bcn_param *)current_ptr;
1677 current_ptr += sizeof(*bcn_param);
1678 curr_bcn_bytes -= sizeof(*bcn_param);
1680 memcpy(bssid, bcn_param->bssid, ETH_ALEN);
1682 rssi = (s32) (bcn_param->rssi);
1683 dev_dbg(adapter->dev, "info: InterpretIE: RSSI=%02X\n",
1684 rssi);
1686 beacon_period = le16_to_cpu(bcn_param->beacon_period);
1688 cap_info_bitmap = le16_to_cpu(bcn_param->cap_info_bitmap);
1689 dev_dbg(adapter->dev, "info: InterpretIE: capabilities=0x%X\n",
1690 cap_info_bitmap);
1692 /* Rest of the current buffer are IE's */
1693 ie_buf = current_ptr;
1694 ie_len = curr_bcn_bytes;
1695 dev_dbg(adapter->dev, "info: InterpretIE: IELength for this AP"
1696 " = %d\n", curr_bcn_bytes);
1698 while (curr_bcn_bytes >= sizeof(struct ieee_types_header)) {
1699 u8 element_id, element_len;
1701 element_id = *current_ptr;
1702 element_len = *(current_ptr + 1);
1703 if (curr_bcn_bytes < element_len +
1704 sizeof(struct ieee_types_header)) {
1705 dev_err(priv->adapter->dev, "%s: in processing"
1706 " IE, bytes left < IE length\n",
1707 __func__);
1708 goto done;
1710 if (element_id == WLAN_EID_DS_PARAMS) {
1711 channel = *(u8 *) (current_ptr +
1712 sizeof(struct ieee_types_header));
1713 break;
1716 current_ptr += element_len +
1717 sizeof(struct ieee_types_header);
1718 curr_bcn_bytes -= element_len +
1719 sizeof(struct ieee_types_header);
1723 * If the TSF TLV was appended to the scan results, save this
1724 * entry's TSF value in the networkTSF field.The networkTSF is
1725 * the firmware's TSF value at the time the beacon or probe
1726 * response was received.
1728 if (tsf_tlv)
1729 memcpy(&network_tsf,
1730 &tsf_tlv->tsf_data[idx * TSF_DATA_SIZE],
1731 sizeof(network_tsf));
1733 if (channel != -1) {
1734 struct ieee80211_channel *chan;
1735 u8 band;
1737 band = BAND_G;
1738 if (chan_band_tlv) {
1739 chan_band =
1740 &chan_band_tlv->chan_band_param[idx];
1741 band = mwifiex_radio_type_to_band(
1742 chan_band->radio_type
1743 & (BIT(0) | BIT(1)));
1746 cfp = mwifiex_get_cfp_by_band_and_channel_from_cfg80211(
1747 priv, (u8)band, (u16)channel);
1749 freq = cfp ? cfp->freq : 0;
1751 chan = ieee80211_get_channel(priv->wdev->wiphy, freq);
1753 if (chan && !(chan->flags & IEEE80211_CHAN_DISABLED)) {
1754 cfg80211_inform_bss(priv->wdev->wiphy, chan,
1755 bssid, network_tsf, cap_info_bitmap,
1756 beacon_period, ie_buf, ie_len, rssi,
1757 GFP_KERNEL);
1759 if (priv->media_connected && !memcmp(bssid,
1760 priv->curr_bss_params.bss_descriptor
1761 .mac_address, ETH_ALEN))
1762 mwifiex_update_curr_bss_params(priv,
1763 bssid, rssi, ie_buf,
1764 ie_len, beacon_period,
1765 cap_info_bitmap);
1767 } else {
1768 dev_dbg(adapter->dev, "missing BSS channel IE\n");
1772 spin_lock_irqsave(&adapter->scan_pending_q_lock, flags);
1773 if (list_empty(&adapter->scan_pending_q)) {
1774 spin_unlock_irqrestore(&adapter->scan_pending_q_lock, flags);
1775 spin_lock_irqsave(&adapter->mwifiex_cmd_lock, flags);
1776 adapter->scan_processing = false;
1777 spin_unlock_irqrestore(&adapter->mwifiex_cmd_lock, flags);
1779 /* Need to indicate IOCTL complete */
1780 if (adapter->curr_cmd->wait_q_enabled) {
1781 adapter->cmd_wait_q.status = 0;
1782 mwifiex_complete_cmd(adapter);
1784 if (priv->report_scan_result)
1785 priv->report_scan_result = false;
1786 if (priv->scan_pending_on_block) {
1787 priv->scan_pending_on_block = false;
1788 up(&priv->async_sem);
1791 } else {
1792 /* Get scan command from scan_pending_q and put to
1793 cmd_pending_q */
1794 cmd_node = list_first_entry(&adapter->scan_pending_q,
1795 struct cmd_ctrl_node, list);
1796 list_del(&cmd_node->list);
1797 spin_unlock_irqrestore(&adapter->scan_pending_q_lock, flags);
1799 mwifiex_insert_cmd_to_pending_q(adapter, cmd_node, true);
1802 done:
1803 return ret;
1807 * This function prepares command for background scan query.
1809 * Preparation includes -
1810 * - Setting command ID and proper size
1811 * - Setting background scan flush parameter
1812 * - Ensuring correct endian-ness
1814 int mwifiex_cmd_802_11_bg_scan_query(struct host_cmd_ds_command *cmd)
1816 struct host_cmd_ds_802_11_bg_scan_query *bg_query =
1817 &cmd->params.bg_scan_query;
1819 cmd->command = cpu_to_le16(HostCmd_CMD_802_11_BG_SCAN_QUERY);
1820 cmd->size = cpu_to_le16(sizeof(struct host_cmd_ds_802_11_bg_scan_query)
1821 + S_DS_GEN);
1823 bg_query->flush = 1;
1825 return 0;
1829 * This function inserts scan command node to the scan pending queue.
1831 void
1832 mwifiex_queue_scan_cmd(struct mwifiex_private *priv,
1833 struct cmd_ctrl_node *cmd_node)
1835 struct mwifiex_adapter *adapter = priv->adapter;
1836 unsigned long flags;
1838 cmd_node->wait_q_enabled = true;
1839 spin_lock_irqsave(&adapter->scan_pending_q_lock, flags);
1840 list_add_tail(&cmd_node->list, &adapter->scan_pending_q);
1841 spin_unlock_irqrestore(&adapter->scan_pending_q_lock, flags);
1845 * This function sends a scan command for all available channels to the
1846 * firmware, filtered on a specific SSID.
1848 static int mwifiex_scan_specific_ssid(struct mwifiex_private *priv,
1849 struct mwifiex_802_11_ssid *req_ssid)
1851 struct mwifiex_adapter *adapter = priv->adapter;
1852 int ret = 0;
1853 struct mwifiex_user_scan_cfg *scan_cfg;
1855 if (!req_ssid)
1856 return -1;
1858 if (adapter->scan_processing) {
1859 dev_dbg(adapter->dev, "cmd: Scan already in process...\n");
1860 return ret;
1863 if (priv->scan_block) {
1864 dev_dbg(adapter->dev,
1865 "cmd: Scan is blocked during association...\n");
1866 return ret;
1869 scan_cfg = kzalloc(sizeof(struct mwifiex_user_scan_cfg), GFP_KERNEL);
1870 if (!scan_cfg) {
1871 dev_err(adapter->dev, "failed to alloc scan_cfg\n");
1872 return -ENOMEM;
1875 memcpy(scan_cfg->ssid_list[0].ssid, req_ssid->ssid,
1876 req_ssid->ssid_len);
1878 ret = mwifiex_scan_networks(priv, scan_cfg);
1880 kfree(scan_cfg);
1881 return ret;
1885 * Sends IOCTL request to start a scan.
1887 * This function allocates the IOCTL request buffer, fills it
1888 * with requisite parameters and calls the IOCTL handler.
1890 * Scan command can be issued for both normal scan and specific SSID
1891 * scan, depending upon whether an SSID is provided or not.
1893 int mwifiex_request_scan(struct mwifiex_private *priv,
1894 struct mwifiex_802_11_ssid *req_ssid)
1896 int ret;
1898 if (down_interruptible(&priv->async_sem)) {
1899 dev_err(priv->adapter->dev, "%s: acquire semaphore\n",
1900 __func__);
1901 return -1;
1903 priv->scan_pending_on_block = true;
1905 priv->adapter->cmd_wait_q.condition = false;
1907 if (req_ssid && req_ssid->ssid_len != 0)
1908 /* Specific SSID scan */
1909 ret = mwifiex_scan_specific_ssid(priv, req_ssid);
1910 else
1911 /* Normal scan */
1912 ret = mwifiex_scan_networks(priv, NULL);
1914 if (!ret)
1915 ret = mwifiex_wait_queue_complete(priv->adapter);
1917 if (ret == -1) {
1918 priv->scan_pending_on_block = false;
1919 up(&priv->async_sem);
1922 return ret;
1926 * This function appends the vendor specific IE TLV to a buffer.
1929 mwifiex_cmd_append_vsie_tlv(struct mwifiex_private *priv,
1930 u16 vsie_mask, u8 **buffer)
1932 int id, ret_len = 0;
1933 struct mwifiex_ie_types_vendor_param_set *vs_param_set;
1935 if (!buffer)
1936 return 0;
1937 if (!(*buffer))
1938 return 0;
1941 * Traverse through the saved vendor specific IE array and append
1942 * the selected(scan/assoc/adhoc) IE as TLV to the command
1944 for (id = 0; id < MWIFIEX_MAX_VSIE_NUM; id++) {
1945 if (priv->vs_ie[id].mask & vsie_mask) {
1946 vs_param_set =
1947 (struct mwifiex_ie_types_vendor_param_set *)
1948 *buffer;
1949 vs_param_set->header.type =
1950 cpu_to_le16(TLV_TYPE_PASSTHROUGH);
1951 vs_param_set->header.len =
1952 cpu_to_le16((((u16) priv->vs_ie[id].ie[1])
1953 & 0x00FF) + 2);
1954 memcpy(vs_param_set->ie, priv->vs_ie[id].ie,
1955 le16_to_cpu(vs_param_set->header.len));
1956 *buffer += le16_to_cpu(vs_param_set->header.len) +
1957 sizeof(struct mwifiex_ie_types_header);
1958 ret_len += le16_to_cpu(vs_param_set->header.len) +
1959 sizeof(struct mwifiex_ie_types_header);
1962 return ret_len;
1966 * This function saves a beacon buffer of the current BSS descriptor.
1968 * The current beacon buffer is saved so that it can be restored in the
1969 * following cases that makes the beacon buffer not to contain the current
1970 * ssid's beacon buffer.
1971 * - The current ssid was not found somehow in the last scan.
1972 * - The current ssid was the last entry of the scan table and overloaded.
1974 void
1975 mwifiex_save_curr_bcn(struct mwifiex_private *priv)
1977 struct mwifiex_bssdescriptor *curr_bss =
1978 &priv->curr_bss_params.bss_descriptor;
1980 if (!curr_bss->beacon_buf_size)
1981 return;
1983 /* allocate beacon buffer at 1st time; or if it's size has changed */
1984 if (!priv->curr_bcn_buf ||
1985 priv->curr_bcn_size != curr_bss->beacon_buf_size) {
1986 priv->curr_bcn_size = curr_bss->beacon_buf_size;
1988 kfree(priv->curr_bcn_buf);
1989 priv->curr_bcn_buf = kzalloc(curr_bss->beacon_buf_size,
1990 GFP_KERNEL);
1991 if (!priv->curr_bcn_buf) {
1992 dev_err(priv->adapter->dev,
1993 "failed to alloc curr_bcn_buf\n");
1994 return;
1998 memcpy(priv->curr_bcn_buf, curr_bss->beacon_buf,
1999 curr_bss->beacon_buf_size);
2000 dev_dbg(priv->adapter->dev, "info: current beacon saved %d\n",
2001 priv->curr_bcn_size);
2003 curr_bss->beacon_buf = priv->curr_bcn_buf;
2005 /* adjust the pointers in the current BSS descriptor */
2006 if (curr_bss->bcn_wpa_ie)
2007 curr_bss->bcn_wpa_ie =
2008 (struct ieee_types_vendor_specific *)
2009 (curr_bss->beacon_buf +
2010 curr_bss->wpa_offset);
2012 if (curr_bss->bcn_rsn_ie)
2013 curr_bss->bcn_rsn_ie = (struct ieee_types_generic *)
2014 (curr_bss->beacon_buf +
2015 curr_bss->rsn_offset);
2017 if (curr_bss->bcn_ht_cap)
2018 curr_bss->bcn_ht_cap = (struct ieee80211_ht_cap *)
2019 (curr_bss->beacon_buf +
2020 curr_bss->ht_cap_offset);
2022 if (curr_bss->bcn_ht_info)
2023 curr_bss->bcn_ht_info = (struct ieee80211_ht_info *)
2024 (curr_bss->beacon_buf +
2025 curr_bss->ht_info_offset);
2027 if (curr_bss->bcn_bss_co_2040)
2028 curr_bss->bcn_bss_co_2040 =
2029 (u8 *) (curr_bss->beacon_buf +
2030 curr_bss->bss_co_2040_offset);
2032 if (curr_bss->bcn_ext_cap)
2033 curr_bss->bcn_ext_cap = (u8 *) (curr_bss->beacon_buf +
2034 curr_bss->ext_cap_offset);
2038 * This function frees the current BSS descriptor beacon buffer.
2040 void
2041 mwifiex_free_curr_bcn(struct mwifiex_private *priv)
2043 kfree(priv->curr_bcn_buf);
2044 priv->curr_bcn_buf = NULL;