Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/dtor/input
[linux-btrfs-devel.git] / drivers / net / wireless / mwifiex / scan.c
blobdae8dbb24a03e83352742b20c3320c9819019889
1 /*
2 * Marvell Wireless LAN device driver: scan ioctl and command handling
4 * Copyright (C) 2011, Marvell International Ltd.
6 * This software file (the "File") is distributed by Marvell International
7 * Ltd. under the terms of the GNU General Public License Version 2, June 1991
8 * (the "License"). You may use, redistribute and/or modify this File in
9 * accordance with the terms and conditions of the License, a copy of which
10 * is available by writing to the Free Software Foundation, Inc.,
11 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA or on the
12 * worldwide web at http://www.gnu.org/licenses/old-licenses/gpl-2.0.txt.
14 * THE FILE IS DISTRIBUTED AS-IS, WITHOUT WARRANTY OF ANY KIND, AND THE
15 * IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE
16 * ARE EXPRESSLY DISCLAIMED. The License provides additional details about
17 * this warranty disclaimer.
20 #include "decl.h"
21 #include "ioctl.h"
22 #include "util.h"
23 #include "fw.h"
24 #include "main.h"
25 #include "11n.h"
26 #include "cfg80211.h"
28 /* The maximum number of channels the firmware can scan per command */
29 #define MWIFIEX_MAX_CHANNELS_PER_SPECIFIC_SCAN 14
31 #define MWIFIEX_CHANNELS_PER_SCAN_CMD 4
33 /* Memory needed to store a max sized Channel List TLV for a firmware scan */
34 #define CHAN_TLV_MAX_SIZE (sizeof(struct mwifiex_ie_types_header) \
35 + (MWIFIEX_MAX_CHANNELS_PER_SPECIFIC_SCAN \
36 *sizeof(struct mwifiex_chan_scan_param_set)))
38 /* Memory needed to store supported rate */
39 #define RATE_TLV_MAX_SIZE (sizeof(struct mwifiex_ie_types_rates_param_set) \
40 + HOSTCMD_SUPPORTED_RATES)
42 /* Memory needed to store a max number/size WildCard SSID TLV for a firmware
43 scan */
44 #define WILDCARD_SSID_TLV_MAX_SIZE \
45 (MWIFIEX_MAX_SSID_LIST_LENGTH * \
46 (sizeof(struct mwifiex_ie_types_wildcard_ssid_params) \
47 + IEEE80211_MAX_SSID_LEN))
49 /* Maximum memory needed for a mwifiex_scan_cmd_config with all TLVs at max */
50 #define MAX_SCAN_CFG_ALLOC (sizeof(struct mwifiex_scan_cmd_config) \
51 + sizeof(struct mwifiex_ie_types_num_probes) \
52 + sizeof(struct mwifiex_ie_types_htcap) \
53 + CHAN_TLV_MAX_SIZE \
54 + RATE_TLV_MAX_SIZE \
55 + WILDCARD_SSID_TLV_MAX_SIZE)
58 union mwifiex_scan_cmd_config_tlv {
59 /* Scan configuration (variable length) */
60 struct mwifiex_scan_cmd_config config;
61 /* Max allocated block */
62 u8 config_alloc_buf[MAX_SCAN_CFG_ALLOC];
65 enum cipher_suite {
66 CIPHER_SUITE_TKIP,
67 CIPHER_SUITE_CCMP,
68 CIPHER_SUITE_MAX
70 static u8 mwifiex_wpa_oui[CIPHER_SUITE_MAX][4] = {
71 { 0x00, 0x50, 0xf2, 0x02 }, /* TKIP */
72 { 0x00, 0x50, 0xf2, 0x04 }, /* AES */
74 static u8 mwifiex_rsn_oui[CIPHER_SUITE_MAX][4] = {
75 { 0x00, 0x0f, 0xac, 0x02 }, /* TKIP */
76 { 0x00, 0x0f, 0xac, 0x04 }, /* AES */
80 * This function parses a given IE for a given OUI.
82 * This is used to parse a WPA/RSN IE to find if it has
83 * a given oui in PTK.
85 static u8
86 mwifiex_search_oui_in_ie(struct ie_body *iebody, u8 *oui)
88 u8 count;
90 count = iebody->ptk_cnt[0];
92 /* There could be multiple OUIs for PTK hence
93 1) Take the length.
94 2) Check all the OUIs for AES.
95 3) If one of them is AES then pass success. */
96 while (count) {
97 if (!memcmp(iebody->ptk_body, oui, sizeof(iebody->ptk_body)))
98 return MWIFIEX_OUI_PRESENT;
100 --count;
101 if (count)
102 iebody = (struct ie_body *) ((u8 *) iebody +
103 sizeof(iebody->ptk_body));
106 pr_debug("info: %s: OUI is not found in PTK\n", __func__);
107 return MWIFIEX_OUI_NOT_PRESENT;
111 * This function checks if a given OUI is present in a RSN IE.
113 * The function first checks if a RSN IE is present or not in the
114 * BSS descriptor. It tries to locate the OUI only if such an IE is
115 * present.
117 static u8
118 mwifiex_is_rsn_oui_present(struct mwifiex_bssdescriptor *bss_desc, u32 cipher)
120 u8 *oui;
121 struct ie_body *iebody;
122 u8 ret = MWIFIEX_OUI_NOT_PRESENT;
124 if (((bss_desc->bcn_rsn_ie) && ((*(bss_desc->bcn_rsn_ie)).
125 ieee_hdr.element_id == WLAN_EID_RSN))) {
126 iebody = (struct ie_body *)
127 (((u8 *) bss_desc->bcn_rsn_ie->data) +
128 RSN_GTK_OUI_OFFSET);
129 oui = &mwifiex_rsn_oui[cipher][0];
130 ret = mwifiex_search_oui_in_ie(iebody, oui);
131 if (ret)
132 return ret;
134 return ret;
138 * This function checks if a given OUI is present in a WPA IE.
140 * The function first checks if a WPA IE is present or not in the
141 * BSS descriptor. It tries to locate the OUI only if such an IE is
142 * present.
144 static u8
145 mwifiex_is_wpa_oui_present(struct mwifiex_bssdescriptor *bss_desc, u32 cipher)
147 u8 *oui;
148 struct ie_body *iebody;
149 u8 ret = MWIFIEX_OUI_NOT_PRESENT;
151 if (((bss_desc->bcn_wpa_ie) && ((*(bss_desc->bcn_wpa_ie)).
152 vend_hdr.element_id == WLAN_EID_WPA))) {
153 iebody = (struct ie_body *) bss_desc->bcn_wpa_ie->data;
154 oui = &mwifiex_wpa_oui[cipher][0];
155 ret = mwifiex_search_oui_in_ie(iebody, oui);
156 if (ret)
157 return ret;
159 return ret;
163 * This function compares two SSIDs and checks if they match.
166 mwifiex_ssid_cmp(struct mwifiex_802_11_ssid *ssid1,
167 struct mwifiex_802_11_ssid *ssid2)
169 if (!ssid1 || !ssid2 || (ssid1->ssid_len != ssid2->ssid_len))
170 return -1;
171 return memcmp(ssid1->ssid, ssid2->ssid, ssid1->ssid_len);
175 * This function checks if wapi is enabled in driver and scanned network is
176 * compatible with it.
178 static bool
179 mwifiex_is_network_compatible_for_wapi(struct mwifiex_private *priv,
180 struct mwifiex_bssdescriptor *bss_desc)
182 if (priv->sec_info.wapi_enabled &&
183 (bss_desc->bcn_wapi_ie &&
184 ((*(bss_desc->bcn_wapi_ie)).ieee_hdr.element_id ==
185 WLAN_EID_BSS_AC_ACCESS_DELAY))) {
186 return true;
188 return false;
192 * This function checks if driver is configured with no security mode and
193 * scanned network is compatible with it.
195 static bool
196 mwifiex_is_network_compatible_for_no_sec(struct mwifiex_private *priv,
197 struct mwifiex_bssdescriptor *bss_desc)
199 if (priv->sec_info.wep_status == MWIFIEX_802_11_WEP_DISABLED
200 && !priv->sec_info.wpa_enabled && !priv->sec_info.wpa2_enabled
201 && ((!bss_desc->bcn_wpa_ie) ||
202 ((*(bss_desc->bcn_wpa_ie)).vend_hdr.element_id !=
203 WLAN_EID_WPA))
204 && ((!bss_desc->bcn_rsn_ie) ||
205 ((*(bss_desc->bcn_rsn_ie)).ieee_hdr.element_id !=
206 WLAN_EID_RSN))
207 && !priv->sec_info.encryption_mode
208 && !bss_desc->privacy) {
209 return true;
211 return false;
215 * This function checks if static WEP is enabled in driver and scanned network
216 * is compatible with it.
218 static bool
219 mwifiex_is_network_compatible_for_static_wep(struct mwifiex_private *priv,
220 struct mwifiex_bssdescriptor *bss_desc)
222 if (priv->sec_info.wep_status == MWIFIEX_802_11_WEP_ENABLED
223 && !priv->sec_info.wpa_enabled && !priv->sec_info.wpa2_enabled
224 && bss_desc->privacy) {
225 return true;
227 return false;
231 * This function checks if wpa is enabled in driver and scanned network is
232 * compatible with it.
234 static bool
235 mwifiex_is_network_compatible_for_wpa(struct mwifiex_private *priv,
236 struct mwifiex_bssdescriptor *bss_desc)
238 if (priv->sec_info.wep_status == MWIFIEX_802_11_WEP_DISABLED
239 && priv->sec_info.wpa_enabled && !priv->sec_info.wpa2_enabled
240 && ((bss_desc->bcn_wpa_ie) && ((*(bss_desc->bcn_wpa_ie)).vend_hdr.
241 element_id == WLAN_EID_WPA))
243 * Privacy bit may NOT be set in some APs like
244 * LinkSys WRT54G && bss_desc->privacy
247 dev_dbg(priv->adapter->dev, "info: %s: WPA:"
248 " wpa_ie=%#x wpa2_ie=%#x WEP=%s WPA=%s WPA2=%s "
249 "EncMode=%#x privacy=%#x\n", __func__,
250 (bss_desc->bcn_wpa_ie) ?
251 (*(bss_desc->bcn_wpa_ie)).
252 vend_hdr.element_id : 0,
253 (bss_desc->bcn_rsn_ie) ?
254 (*(bss_desc->bcn_rsn_ie)).
255 ieee_hdr.element_id : 0,
256 (priv->sec_info.wep_status ==
257 MWIFIEX_802_11_WEP_ENABLED) ? "e" : "d",
258 (priv->sec_info.wpa_enabled) ? "e" : "d",
259 (priv->sec_info.wpa2_enabled) ? "e" : "d",
260 priv->sec_info.encryption_mode,
261 bss_desc->privacy);
262 return true;
264 return false;
268 * This function checks if wpa2 is enabled in driver and scanned network is
269 * compatible with it.
271 static bool
272 mwifiex_is_network_compatible_for_wpa2(struct mwifiex_private *priv,
273 struct mwifiex_bssdescriptor *bss_desc)
275 if (priv->sec_info.wep_status == MWIFIEX_802_11_WEP_DISABLED
276 && !priv->sec_info.wpa_enabled && priv->sec_info.wpa2_enabled
277 && ((bss_desc->bcn_rsn_ie) && ((*(bss_desc->bcn_rsn_ie)).ieee_hdr.
278 element_id == WLAN_EID_RSN))
280 * Privacy bit may NOT be set in some APs like
281 * LinkSys WRT54G && bss_desc->privacy
284 dev_dbg(priv->adapter->dev, "info: %s: WPA2: "
285 " wpa_ie=%#x wpa2_ie=%#x WEP=%s WPA=%s WPA2=%s "
286 "EncMode=%#x privacy=%#x\n", __func__,
287 (bss_desc->bcn_wpa_ie) ?
288 (*(bss_desc->bcn_wpa_ie)).
289 vend_hdr.element_id : 0,
290 (bss_desc->bcn_rsn_ie) ?
291 (*(bss_desc->bcn_rsn_ie)).
292 ieee_hdr.element_id : 0,
293 (priv->sec_info.wep_status ==
294 MWIFIEX_802_11_WEP_ENABLED) ? "e" : "d",
295 (priv->sec_info.wpa_enabled) ? "e" : "d",
296 (priv->sec_info.wpa2_enabled) ? "e" : "d",
297 priv->sec_info.encryption_mode,
298 bss_desc->privacy);
299 return true;
301 return false;
305 * This function checks if adhoc AES is enabled in driver and scanned network is
306 * compatible with it.
308 static bool
309 mwifiex_is_network_compatible_for_adhoc_aes(struct mwifiex_private *priv,
310 struct mwifiex_bssdescriptor *bss_desc)
312 if (priv->sec_info.wep_status == MWIFIEX_802_11_WEP_DISABLED
313 && !priv->sec_info.wpa_enabled && !priv->sec_info.wpa2_enabled
314 && ((!bss_desc->bcn_wpa_ie) || ((*(bss_desc->bcn_wpa_ie)).vend_hdr.
315 element_id != WLAN_EID_WPA))
316 && ((!bss_desc->bcn_rsn_ie) || ((*(bss_desc->bcn_rsn_ie)).ieee_hdr.
317 element_id != WLAN_EID_RSN))
318 && !priv->sec_info.encryption_mode
319 && bss_desc->privacy) {
320 return true;
322 return false;
326 * This function checks if dynamic WEP is enabled in driver and scanned network
327 * is compatible with it.
329 static bool
330 mwifiex_is_network_compatible_for_dynamic_wep(struct mwifiex_private *priv,
331 struct mwifiex_bssdescriptor *bss_desc)
333 if (priv->sec_info.wep_status == MWIFIEX_802_11_WEP_DISABLED
334 && !priv->sec_info.wpa_enabled && !priv->sec_info.wpa2_enabled
335 && ((!bss_desc->bcn_wpa_ie) || ((*(bss_desc->bcn_wpa_ie)).vend_hdr.
336 element_id != WLAN_EID_WPA))
337 && ((!bss_desc->bcn_rsn_ie) || ((*(bss_desc->bcn_rsn_ie)).ieee_hdr.
338 element_id != WLAN_EID_RSN))
339 && priv->sec_info.encryption_mode
340 && bss_desc->privacy) {
341 dev_dbg(priv->adapter->dev, "info: %s: dynamic "
342 "WEP: wpa_ie=%#x wpa2_ie=%#x "
343 "EncMode=%#x privacy=%#x\n",
344 __func__,
345 (bss_desc->bcn_wpa_ie) ?
346 (*(bss_desc->bcn_wpa_ie)).
347 vend_hdr.element_id : 0,
348 (bss_desc->bcn_rsn_ie) ?
349 (*(bss_desc->bcn_rsn_ie)).
350 ieee_hdr.element_id : 0,
351 priv->sec_info.encryption_mode,
352 bss_desc->privacy);
353 return true;
355 return false;
359 * This function checks if a scanned network is compatible with the driver
360 * settings.
362 * WEP WPA WPA2 ad-hoc encrypt Network
363 * enabled enabled enabled AES mode Privacy WPA WPA2 Compatible
364 * 0 0 0 0 NONE 0 0 0 yes No security
365 * 0 1 0 0 x 1x 1 x yes WPA (disable
366 * HT if no AES)
367 * 0 0 1 0 x 1x x 1 yes WPA2 (disable
368 * HT if no AES)
369 * 0 0 0 1 NONE 1 0 0 yes Ad-hoc AES
370 * 1 0 0 0 NONE 1 0 0 yes Static WEP
371 * (disable HT)
372 * 0 0 0 0 !=NONE 1 0 0 yes Dynamic WEP
374 * Compatibility is not matched while roaming, except for mode.
376 static s32
377 mwifiex_is_network_compatible(struct mwifiex_private *priv,
378 struct mwifiex_bssdescriptor *bss_desc, u32 mode)
380 struct mwifiex_adapter *adapter = priv->adapter;
382 bss_desc->disable_11n = false;
384 /* Don't check for compatibility if roaming */
385 if (priv->media_connected && (priv->bss_mode == NL80211_IFTYPE_STATION)
386 && (bss_desc->bss_mode == NL80211_IFTYPE_STATION))
387 return 0;
389 if (priv->wps.session_enable) {
390 dev_dbg(adapter->dev,
391 "info: return success directly in WPS period\n");
392 return 0;
395 if (mwifiex_is_network_compatible_for_wapi(priv, bss_desc)) {
396 dev_dbg(adapter->dev, "info: return success for WAPI AP\n");
397 return 0;
400 if (bss_desc->bss_mode == mode) {
401 if (mwifiex_is_network_compatible_for_no_sec(priv, bss_desc)) {
402 /* No security */
403 return 0;
404 } else if (mwifiex_is_network_compatible_for_static_wep(priv,
405 bss_desc)) {
406 /* Static WEP enabled */
407 dev_dbg(adapter->dev, "info: Disable 11n in WEP mode.\n");
408 bss_desc->disable_11n = true;
409 return 0;
410 } else if (mwifiex_is_network_compatible_for_wpa(priv,
411 bss_desc)) {
412 /* WPA enabled */
413 if (((priv->adapter->config_bands & BAND_GN
414 || priv->adapter->config_bands & BAND_AN)
415 && bss_desc->bcn_ht_cap)
416 && !mwifiex_is_wpa_oui_present(bss_desc,
417 CIPHER_SUITE_CCMP)) {
419 if (mwifiex_is_wpa_oui_present(bss_desc,
420 CIPHER_SUITE_TKIP)) {
421 dev_dbg(adapter->dev,
422 "info: Disable 11n if AES "
423 "is not supported by AP\n");
424 bss_desc->disable_11n = true;
425 } else {
426 return -1;
429 return 0;
430 } else if (mwifiex_is_network_compatible_for_wpa2(priv,
431 bss_desc)) {
432 /* WPA2 enabled */
433 if (((priv->adapter->config_bands & BAND_GN
434 || priv->adapter->config_bands & BAND_AN)
435 && bss_desc->bcn_ht_cap)
436 && !mwifiex_is_rsn_oui_present(bss_desc,
437 CIPHER_SUITE_CCMP)) {
439 if (mwifiex_is_rsn_oui_present(bss_desc,
440 CIPHER_SUITE_TKIP)) {
441 dev_dbg(adapter->dev,
442 "info: Disable 11n if AES "
443 "is not supported by AP\n");
444 bss_desc->disable_11n = true;
445 } else {
446 return -1;
449 return 0;
450 } else if (mwifiex_is_network_compatible_for_adhoc_aes(priv,
451 bss_desc)) {
452 /* Ad-hoc AES enabled */
453 return 0;
454 } else if (mwifiex_is_network_compatible_for_dynamic_wep(priv,
455 bss_desc)) {
456 /* Dynamic WEP enabled */
457 return 0;
460 /* Security doesn't match */
461 dev_dbg(adapter->dev, "info: %s: failed: "
462 "wpa_ie=%#x wpa2_ie=%#x WEP=%s WPA=%s WPA2=%s EncMode"
463 "=%#x privacy=%#x\n",
464 __func__,
465 (bss_desc->bcn_wpa_ie) ?
466 (*(bss_desc->bcn_wpa_ie)).vend_hdr.
467 element_id : 0,
468 (bss_desc->bcn_rsn_ie) ?
469 (*(bss_desc->bcn_rsn_ie)).ieee_hdr.
470 element_id : 0,
471 (priv->sec_info.wep_status ==
472 MWIFIEX_802_11_WEP_ENABLED) ? "e" : "d",
473 (priv->sec_info.wpa_enabled) ? "e" : "d",
474 (priv->sec_info.wpa2_enabled) ? "e" : "d",
475 priv->sec_info.encryption_mode, bss_desc->privacy);
476 return -1;
479 /* Mode doesn't match */
480 return -1;
484 * This function creates a channel list for the driver to scan, based
485 * on region/band information.
487 * This routine is used for any scan that is not provided with a
488 * specific channel list to scan.
490 static void
491 mwifiex_scan_create_channel_list(struct mwifiex_private *priv,
492 const struct mwifiex_user_scan_cfg
493 *user_scan_in,
494 struct mwifiex_chan_scan_param_set
495 *scan_chan_list,
496 u8 filtered_scan)
498 enum ieee80211_band band;
499 struct ieee80211_supported_band *sband;
500 struct ieee80211_channel *ch;
501 struct mwifiex_adapter *adapter = priv->adapter;
502 int chan_idx = 0, i;
503 u8 scan_type;
505 for (band = 0; (band < IEEE80211_NUM_BANDS) ; band++) {
507 if (!priv->wdev->wiphy->bands[band])
508 continue;
510 sband = priv->wdev->wiphy->bands[band];
512 for (i = 0; (i < sband->n_channels) ; i++) {
513 ch = &sband->channels[i];
514 if (ch->flags & IEEE80211_CHAN_DISABLED)
515 continue;
516 scan_chan_list[chan_idx].radio_type = band;
517 scan_type = ch->flags & IEEE80211_CHAN_PASSIVE_SCAN;
518 if (user_scan_in &&
519 user_scan_in->chan_list[0].scan_time)
520 scan_chan_list[chan_idx].max_scan_time =
521 cpu_to_le16((u16) user_scan_in->
522 chan_list[0].scan_time);
523 else if (scan_type == MWIFIEX_SCAN_TYPE_PASSIVE)
524 scan_chan_list[chan_idx].max_scan_time =
525 cpu_to_le16(adapter->passive_scan_time);
526 else
527 scan_chan_list[chan_idx].max_scan_time =
528 cpu_to_le16(adapter->active_scan_time);
529 if (scan_type == MWIFIEX_SCAN_TYPE_PASSIVE)
530 scan_chan_list[chan_idx].chan_scan_mode_bitmap
531 |= MWIFIEX_PASSIVE_SCAN;
532 else
533 scan_chan_list[chan_idx].chan_scan_mode_bitmap
534 &= ~MWIFIEX_PASSIVE_SCAN;
535 scan_chan_list[chan_idx].chan_number =
536 (u32) ch->hw_value;
537 if (filtered_scan) {
538 scan_chan_list[chan_idx].max_scan_time =
539 cpu_to_le16(adapter->specific_scan_time);
540 scan_chan_list[chan_idx].chan_scan_mode_bitmap
541 |= MWIFIEX_DISABLE_CHAN_FILT;
543 chan_idx++;
550 * This function constructs and sends multiple scan config commands to
551 * the firmware.
553 * Previous routines in the code flow have created a scan command configuration
554 * with any requested TLVs. This function splits the channel TLV into maximum
555 * channels supported per scan lists and sends the portion of the channel TLV,
556 * along with the other TLVs, to the firmware.
558 static int
559 mwifiex_scan_channel_list(struct mwifiex_private *priv,
560 u32 max_chan_per_scan, u8 filtered_scan,
561 struct mwifiex_scan_cmd_config *scan_cfg_out,
562 struct mwifiex_ie_types_chan_list_param_set
563 *chan_tlv_out,
564 struct mwifiex_chan_scan_param_set *scan_chan_list)
566 int ret = 0;
567 struct mwifiex_chan_scan_param_set *tmp_chan_list;
568 struct mwifiex_chan_scan_param_set *start_chan;
570 u32 tlv_idx;
571 u32 total_scan_time;
572 u32 done_early;
574 if (!scan_cfg_out || !chan_tlv_out || !scan_chan_list) {
575 dev_dbg(priv->adapter->dev,
576 "info: Scan: Null detect: %p, %p, %p\n",
577 scan_cfg_out, chan_tlv_out, scan_chan_list);
578 return -1;
581 chan_tlv_out->header.type = cpu_to_le16(TLV_TYPE_CHANLIST);
583 /* Set the temp channel struct pointer to the start of the desired
584 list */
585 tmp_chan_list = scan_chan_list;
587 /* Loop through the desired channel list, sending a new firmware scan
588 commands for each max_chan_per_scan channels (or for 1,6,11
589 individually if configured accordingly) */
590 while (tmp_chan_list->chan_number) {
592 tlv_idx = 0;
593 total_scan_time = 0;
594 chan_tlv_out->header.len = 0;
595 start_chan = tmp_chan_list;
596 done_early = false;
599 * Construct the Channel TLV for the scan command. Continue to
600 * insert channel TLVs until:
601 * - the tlv_idx hits the maximum configured per scan command
602 * - the next channel to insert is 0 (end of desired channel
603 * list)
604 * - done_early is set (controlling individual scanning of
605 * 1,6,11)
607 while (tlv_idx < max_chan_per_scan
608 && tmp_chan_list->chan_number && !done_early) {
610 dev_dbg(priv->adapter->dev,
611 "info: Scan: Chan(%3d), Radio(%d),"
612 " Mode(%d, %d), Dur(%d)\n",
613 tmp_chan_list->chan_number,
614 tmp_chan_list->radio_type,
615 tmp_chan_list->chan_scan_mode_bitmap
616 & MWIFIEX_PASSIVE_SCAN,
617 (tmp_chan_list->chan_scan_mode_bitmap
618 & MWIFIEX_DISABLE_CHAN_FILT) >> 1,
619 le16_to_cpu(tmp_chan_list->max_scan_time));
621 /* Copy the current channel TLV to the command being
622 prepared */
623 memcpy(chan_tlv_out->chan_scan_param + tlv_idx,
624 tmp_chan_list,
625 sizeof(chan_tlv_out->chan_scan_param));
627 /* Increment the TLV header length by the size
628 appended */
629 chan_tlv_out->header.len =
630 cpu_to_le16(le16_to_cpu(chan_tlv_out->header.len) +
631 (sizeof(chan_tlv_out->chan_scan_param)));
634 * The tlv buffer length is set to the number of bytes
635 * of the between the channel tlv pointer and the start
636 * of the tlv buffer. This compensates for any TLVs
637 * that were appended before the channel list.
639 scan_cfg_out->tlv_buf_len = (u32) ((u8 *) chan_tlv_out -
640 scan_cfg_out->tlv_buf);
642 /* Add the size of the channel tlv header and the data
643 length */
644 scan_cfg_out->tlv_buf_len +=
645 (sizeof(chan_tlv_out->header)
646 + le16_to_cpu(chan_tlv_out->header.len));
648 /* Increment the index to the channel tlv we are
649 constructing */
650 tlv_idx++;
652 /* Count the total scan time per command */
653 total_scan_time +=
654 le16_to_cpu(tmp_chan_list->max_scan_time);
656 done_early = false;
658 /* Stop the loop if the *current* channel is in the
659 1,6,11 set and we are not filtering on a BSSID
660 or SSID. */
661 if (!filtered_scan && (tmp_chan_list->chan_number == 1
662 || tmp_chan_list->chan_number == 6
663 || tmp_chan_list->chan_number == 11))
664 done_early = true;
666 /* Increment the tmp pointer to the next channel to
667 be scanned */
668 tmp_chan_list++;
670 /* Stop the loop if the *next* channel is in the 1,6,11
671 set. This will cause it to be the only channel
672 scanned on the next interation */
673 if (!filtered_scan && (tmp_chan_list->chan_number == 1
674 || tmp_chan_list->chan_number == 6
675 || tmp_chan_list->chan_number == 11))
676 done_early = true;
679 /* The total scan time should be less than scan command timeout
680 value */
681 if (total_scan_time > MWIFIEX_MAX_TOTAL_SCAN_TIME) {
682 dev_err(priv->adapter->dev, "total scan time %dms"
683 " is over limit (%dms), scan skipped\n",
684 total_scan_time, MWIFIEX_MAX_TOTAL_SCAN_TIME);
685 ret = -1;
686 break;
689 priv->adapter->scan_channels = start_chan;
691 /* Send the scan command to the firmware with the specified
692 cfg */
693 ret = mwifiex_send_cmd_async(priv, HostCmd_CMD_802_11_SCAN,
694 HostCmd_ACT_GEN_SET, 0,
695 scan_cfg_out);
696 if (ret)
697 break;
700 if (ret)
701 return -1;
703 return 0;
707 * This function constructs a scan command configuration structure to use
708 * in scan commands.
710 * Application layer or other functions can invoke network scanning
711 * with a scan configuration supplied in a user scan configuration structure.
712 * This structure is used as the basis of one or many scan command configuration
713 * commands that are sent to the command processing module and eventually to the
714 * firmware.
716 * This function creates a scan command configuration structure based on the
717 * following user supplied parameters (if present):
718 * - SSID filter
719 * - BSSID filter
720 * - Number of Probes to be sent
721 * - Channel list
723 * If the SSID or BSSID filter is not present, the filter is disabled/cleared.
724 * If the number of probes is not set, adapter default setting is used.
726 static void
727 mwifiex_scan_setup_scan_config(struct mwifiex_private *priv,
728 const struct mwifiex_user_scan_cfg *user_scan_in,
729 struct mwifiex_scan_cmd_config *scan_cfg_out,
730 struct mwifiex_ie_types_chan_list_param_set
731 **chan_list_out,
732 struct mwifiex_chan_scan_param_set
733 *scan_chan_list,
734 u8 *max_chan_per_scan, u8 *filtered_scan,
735 u8 *scan_current_only)
737 struct mwifiex_adapter *adapter = priv->adapter;
738 struct mwifiex_ie_types_num_probes *num_probes_tlv;
739 struct mwifiex_ie_types_wildcard_ssid_params *wildcard_ssid_tlv;
740 struct mwifiex_ie_types_rates_param_set *rates_tlv;
741 const u8 zero_mac[ETH_ALEN] = { 0, 0, 0, 0, 0, 0 };
742 u8 *tlv_pos;
743 u32 num_probes;
744 u32 ssid_len;
745 u32 chan_idx;
746 u32 scan_type;
747 u16 scan_dur;
748 u8 channel;
749 u8 radio_type;
750 u32 ssid_idx;
751 u8 ssid_filter;
752 u8 rates[MWIFIEX_SUPPORTED_RATES];
753 u32 rates_size;
754 struct mwifiex_ie_types_htcap *ht_cap;
756 /* The tlv_buf_len is calculated for each scan command. The TLVs added
757 in this routine will be preserved since the routine that sends the
758 command will append channelTLVs at *chan_list_out. The difference
759 between the *chan_list_out and the tlv_buf start will be used to
760 calculate the size of anything we add in this routine. */
761 scan_cfg_out->tlv_buf_len = 0;
763 /* Running tlv pointer. Assigned to chan_list_out at end of function
764 so later routines know where channels can be added to the command
765 buf */
766 tlv_pos = scan_cfg_out->tlv_buf;
768 /* Initialize the scan as un-filtered; the flag is later set to TRUE
769 below if a SSID or BSSID filter is sent in the command */
770 *filtered_scan = false;
772 /* Initialize the scan as not being only on the current channel. If
773 the channel list is customized, only contains one channel, and is
774 the active channel, this is set true and data flow is not halted. */
775 *scan_current_only = false;
777 if (user_scan_in) {
779 /* Default the ssid_filter flag to TRUE, set false under
780 certain wildcard conditions and qualified by the existence
781 of an SSID list before marking the scan as filtered */
782 ssid_filter = true;
784 /* Set the BSS type scan filter, use Adapter setting if
785 unset */
786 scan_cfg_out->bss_mode =
787 (user_scan_in->bss_mode ? (u8) user_scan_in->
788 bss_mode : (u8) adapter->scan_mode);
790 /* Set the number of probes to send, use Adapter setting
791 if unset */
792 num_probes =
793 (user_scan_in->num_probes ? user_scan_in->
794 num_probes : adapter->scan_probes);
797 * Set the BSSID filter to the incoming configuration,
798 * if non-zero. If not set, it will remain disabled
799 * (all zeros).
801 memcpy(scan_cfg_out->specific_bssid,
802 user_scan_in->specific_bssid,
803 sizeof(scan_cfg_out->specific_bssid));
805 for (ssid_idx = 0;
806 ((ssid_idx < ARRAY_SIZE(user_scan_in->ssid_list))
807 && (*user_scan_in->ssid_list[ssid_idx].ssid
808 || user_scan_in->ssid_list[ssid_idx].max_len));
809 ssid_idx++) {
811 ssid_len = strlen(user_scan_in->ssid_list[ssid_idx].
812 ssid) + 1;
814 wildcard_ssid_tlv =
815 (struct mwifiex_ie_types_wildcard_ssid_params *)
816 tlv_pos;
817 wildcard_ssid_tlv->header.type =
818 cpu_to_le16(TLV_TYPE_WILDCARDSSID);
819 wildcard_ssid_tlv->header.len = cpu_to_le16(
820 (u16) (ssid_len + sizeof(wildcard_ssid_tlv->
821 max_ssid_length)));
822 wildcard_ssid_tlv->max_ssid_length =
823 user_scan_in->ssid_list[ssid_idx].max_len;
825 memcpy(wildcard_ssid_tlv->ssid,
826 user_scan_in->ssid_list[ssid_idx].ssid,
827 ssid_len);
829 tlv_pos += (sizeof(wildcard_ssid_tlv->header)
830 + le16_to_cpu(wildcard_ssid_tlv->header.len));
832 dev_dbg(adapter->dev, "info: scan: ssid_list[%d]: %s, %d\n",
833 ssid_idx, wildcard_ssid_tlv->ssid,
834 wildcard_ssid_tlv->max_ssid_length);
836 /* Empty wildcard ssid with a maxlen will match many or
837 potentially all SSIDs (maxlen == 32), therefore do
838 not treat the scan as
839 filtered. */
840 if (!ssid_len && wildcard_ssid_tlv->max_ssid_length)
841 ssid_filter = false;
846 * The default number of channels sent in the command is low to
847 * ensure the response buffer from the firmware does not
848 * truncate scan results. That is not an issue with an SSID
849 * or BSSID filter applied to the scan results in the firmware.
851 if ((ssid_idx && ssid_filter)
852 || memcmp(scan_cfg_out->specific_bssid, &zero_mac,
853 sizeof(zero_mac)))
854 *filtered_scan = true;
855 } else {
856 scan_cfg_out->bss_mode = (u8) adapter->scan_mode;
857 num_probes = adapter->scan_probes;
861 * If a specific BSSID or SSID is used, the number of channels in the
862 * scan command will be increased to the absolute maximum.
864 if (*filtered_scan)
865 *max_chan_per_scan = MWIFIEX_MAX_CHANNELS_PER_SPECIFIC_SCAN;
866 else
867 *max_chan_per_scan = MWIFIEX_CHANNELS_PER_SCAN_CMD;
869 /* If the input config or adapter has the number of Probes set,
870 add tlv */
871 if (num_probes) {
873 dev_dbg(adapter->dev, "info: scan: num_probes = %d\n",
874 num_probes);
876 num_probes_tlv = (struct mwifiex_ie_types_num_probes *) tlv_pos;
877 num_probes_tlv->header.type = cpu_to_le16(TLV_TYPE_NUMPROBES);
878 num_probes_tlv->header.len =
879 cpu_to_le16(sizeof(num_probes_tlv->num_probes));
880 num_probes_tlv->num_probes = cpu_to_le16((u16) num_probes);
882 tlv_pos += sizeof(num_probes_tlv->header) +
883 le16_to_cpu(num_probes_tlv->header.len);
887 /* Append rates tlv */
888 memset(rates, 0, sizeof(rates));
890 rates_size = mwifiex_get_supported_rates(priv, rates);
892 rates_tlv = (struct mwifiex_ie_types_rates_param_set *) tlv_pos;
893 rates_tlv->header.type = cpu_to_le16(WLAN_EID_SUPP_RATES);
894 rates_tlv->header.len = cpu_to_le16((u16) rates_size);
895 memcpy(rates_tlv->rates, rates, rates_size);
896 tlv_pos += sizeof(rates_tlv->header) + rates_size;
898 dev_dbg(adapter->dev, "info: SCAN_CMD: Rates size = %d\n", rates_size);
900 if (ISSUPP_11NENABLED(priv->adapter->fw_cap_info)
901 && (priv->adapter->config_bands & BAND_GN
902 || priv->adapter->config_bands & BAND_AN)) {
903 ht_cap = (struct mwifiex_ie_types_htcap *) tlv_pos;
904 memset(ht_cap, 0, sizeof(struct mwifiex_ie_types_htcap));
905 ht_cap->header.type = cpu_to_le16(WLAN_EID_HT_CAPABILITY);
906 ht_cap->header.len =
907 cpu_to_le16(sizeof(struct ieee80211_ht_cap));
908 radio_type =
909 mwifiex_band_to_radio_type(priv->adapter->config_bands);
910 mwifiex_fill_cap_info(priv, radio_type, ht_cap);
911 tlv_pos += sizeof(struct mwifiex_ie_types_htcap);
914 /* Append vendor specific IE TLV */
915 mwifiex_cmd_append_vsie_tlv(priv, MWIFIEX_VSIE_MASK_SCAN, &tlv_pos);
918 * Set the output for the channel TLV to the address in the tlv buffer
919 * past any TLVs that were added in this function (SSID, num_probes).
920 * Channel TLVs will be added past this for each scan command,
921 * preserving the TLVs that were previously added.
923 *chan_list_out =
924 (struct mwifiex_ie_types_chan_list_param_set *) tlv_pos;
926 if (user_scan_in && user_scan_in->chan_list[0].chan_number) {
928 dev_dbg(adapter->dev, "info: Scan: Using supplied channel list\n");
930 for (chan_idx = 0;
931 chan_idx < MWIFIEX_USER_SCAN_CHAN_MAX
932 && user_scan_in->chan_list[chan_idx].chan_number;
933 chan_idx++) {
935 channel = user_scan_in->chan_list[chan_idx].chan_number;
936 (scan_chan_list + chan_idx)->chan_number = channel;
938 radio_type =
939 user_scan_in->chan_list[chan_idx].radio_type;
940 (scan_chan_list + chan_idx)->radio_type = radio_type;
942 scan_type = user_scan_in->chan_list[chan_idx].scan_type;
944 if (scan_type == MWIFIEX_SCAN_TYPE_PASSIVE)
945 (scan_chan_list +
946 chan_idx)->chan_scan_mode_bitmap
947 |= MWIFIEX_PASSIVE_SCAN;
948 else
949 (scan_chan_list +
950 chan_idx)->chan_scan_mode_bitmap
951 &= ~MWIFIEX_PASSIVE_SCAN;
953 if (user_scan_in->chan_list[chan_idx].scan_time) {
954 scan_dur = (u16) user_scan_in->
955 chan_list[chan_idx].scan_time;
956 } else {
957 if (scan_type == MWIFIEX_SCAN_TYPE_PASSIVE)
958 scan_dur = adapter->passive_scan_time;
959 else if (*filtered_scan)
960 scan_dur = adapter->specific_scan_time;
961 else
962 scan_dur = adapter->active_scan_time;
965 (scan_chan_list + chan_idx)->min_scan_time =
966 cpu_to_le16(scan_dur);
967 (scan_chan_list + chan_idx)->max_scan_time =
968 cpu_to_le16(scan_dur);
971 /* Check if we are only scanning the current channel */
972 if ((chan_idx == 1)
973 && (user_scan_in->chan_list[0].chan_number
974 == priv->curr_bss_params.bss_descriptor.channel)) {
975 *scan_current_only = true;
976 dev_dbg(adapter->dev,
977 "info: Scan: Scanning current channel only\n");
980 } else {
981 dev_dbg(adapter->dev,
982 "info: Scan: Creating full region channel list\n");
983 mwifiex_scan_create_channel_list(priv, user_scan_in,
984 scan_chan_list,
985 *filtered_scan);
990 * This function inspects the scan response buffer for pointers to
991 * expected TLVs.
993 * TLVs can be included at the end of the scan response BSS information.
995 * Data in the buffer is parsed pointers to TLVs that can potentially
996 * be passed back in the response.
998 static void
999 mwifiex_ret_802_11_scan_get_tlv_ptrs(struct mwifiex_adapter *adapter,
1000 struct mwifiex_ie_types_data *tlv,
1001 u32 tlv_buf_size, u32 req_tlv_type,
1002 struct mwifiex_ie_types_data **tlv_data)
1004 struct mwifiex_ie_types_data *current_tlv;
1005 u32 tlv_buf_left;
1006 u32 tlv_type;
1007 u32 tlv_len;
1009 current_tlv = tlv;
1010 tlv_buf_left = tlv_buf_size;
1011 *tlv_data = NULL;
1013 dev_dbg(adapter->dev, "info: SCAN_RESP: tlv_buf_size = %d\n",
1014 tlv_buf_size);
1016 while (tlv_buf_left >= sizeof(struct mwifiex_ie_types_header)) {
1018 tlv_type = le16_to_cpu(current_tlv->header.type);
1019 tlv_len = le16_to_cpu(current_tlv->header.len);
1021 if (sizeof(tlv->header) + tlv_len > tlv_buf_left) {
1022 dev_err(adapter->dev, "SCAN_RESP: TLV buffer corrupt\n");
1023 break;
1026 if (req_tlv_type == tlv_type) {
1027 switch (tlv_type) {
1028 case TLV_TYPE_TSFTIMESTAMP:
1029 dev_dbg(adapter->dev, "info: SCAN_RESP: TSF "
1030 "timestamp TLV, len = %d\n", tlv_len);
1031 *tlv_data = (struct mwifiex_ie_types_data *)
1032 current_tlv;
1033 break;
1034 case TLV_TYPE_CHANNELBANDLIST:
1035 dev_dbg(adapter->dev, "info: SCAN_RESP: channel"
1036 " band list TLV, len = %d\n", tlv_len);
1037 *tlv_data = (struct mwifiex_ie_types_data *)
1038 current_tlv;
1039 break;
1040 default:
1041 dev_err(adapter->dev,
1042 "SCAN_RESP: unhandled TLV = %d\n",
1043 tlv_type);
1044 /* Give up, this seems corrupted */
1045 return;
1049 if (*tlv_data)
1050 break;
1053 tlv_buf_left -= (sizeof(tlv->header) + tlv_len);
1054 current_tlv =
1055 (struct mwifiex_ie_types_data *) (current_tlv->data +
1056 tlv_len);
1058 } /* while */
1062 * This function parses provided beacon buffer and updates
1063 * respective fields in bss descriptor structure.
1066 mwifiex_update_bss_desc_with_ie(struct mwifiex_adapter *adapter,
1067 struct mwifiex_bssdescriptor *bss_entry,
1068 u8 *ie_buf, u32 ie_len)
1070 int ret = 0;
1071 u8 element_id;
1072 struct ieee_types_fh_param_set *fh_param_set;
1073 struct ieee_types_ds_param_set *ds_param_set;
1074 struct ieee_types_cf_param_set *cf_param_set;
1075 struct ieee_types_ibss_param_set *ibss_param_set;
1076 u8 *current_ptr;
1077 u8 *rate;
1078 u8 element_len;
1079 u16 total_ie_len;
1080 u8 bytes_to_copy;
1081 u8 rate_size;
1082 u8 found_data_rate_ie;
1083 u32 bytes_left;
1084 struct ieee_types_vendor_specific *vendor_ie;
1085 const u8 wpa_oui[4] = { 0x00, 0x50, 0xf2, 0x01 };
1086 const u8 wmm_oui[4] = { 0x00, 0x50, 0xf2, 0x02 };
1088 found_data_rate_ie = false;
1089 rate_size = 0;
1090 current_ptr = ie_buf;
1091 bytes_left = ie_len;
1092 bss_entry->beacon_buf = ie_buf;
1093 bss_entry->beacon_buf_size = ie_len;
1095 /* Process variable IE */
1096 while (bytes_left >= 2) {
1097 element_id = *current_ptr;
1098 element_len = *(current_ptr + 1);
1099 total_ie_len = element_len + sizeof(struct ieee_types_header);
1101 if (bytes_left < total_ie_len) {
1102 dev_err(adapter->dev, "err: InterpretIE: in processing"
1103 " IE, bytes left < IE length\n");
1104 return -1;
1106 switch (element_id) {
1107 case WLAN_EID_SSID:
1108 bss_entry->ssid.ssid_len = element_len;
1109 memcpy(bss_entry->ssid.ssid, (current_ptr + 2),
1110 element_len);
1111 dev_dbg(adapter->dev, "info: InterpretIE: ssid: "
1112 "%-32s\n", bss_entry->ssid.ssid);
1113 break;
1115 case WLAN_EID_SUPP_RATES:
1116 memcpy(bss_entry->data_rates, current_ptr + 2,
1117 element_len);
1118 memcpy(bss_entry->supported_rates, current_ptr + 2,
1119 element_len);
1120 rate_size = element_len;
1121 found_data_rate_ie = true;
1122 break;
1124 case WLAN_EID_FH_PARAMS:
1125 fh_param_set =
1126 (struct ieee_types_fh_param_set *) current_ptr;
1127 memcpy(&bss_entry->phy_param_set.fh_param_set,
1128 fh_param_set,
1129 sizeof(struct ieee_types_fh_param_set));
1130 break;
1132 case WLAN_EID_DS_PARAMS:
1133 ds_param_set =
1134 (struct ieee_types_ds_param_set *) current_ptr;
1136 bss_entry->channel = ds_param_set->current_chan;
1138 memcpy(&bss_entry->phy_param_set.ds_param_set,
1139 ds_param_set,
1140 sizeof(struct ieee_types_ds_param_set));
1141 break;
1143 case WLAN_EID_CF_PARAMS:
1144 cf_param_set =
1145 (struct ieee_types_cf_param_set *) current_ptr;
1146 memcpy(&bss_entry->ss_param_set.cf_param_set,
1147 cf_param_set,
1148 sizeof(struct ieee_types_cf_param_set));
1149 break;
1151 case WLAN_EID_IBSS_PARAMS:
1152 ibss_param_set =
1153 (struct ieee_types_ibss_param_set *)
1154 current_ptr;
1155 memcpy(&bss_entry->ss_param_set.ibss_param_set,
1156 ibss_param_set,
1157 sizeof(struct ieee_types_ibss_param_set));
1158 break;
1160 case WLAN_EID_ERP_INFO:
1161 bss_entry->erp_flags = *(current_ptr + 2);
1162 break;
1164 case WLAN_EID_EXT_SUPP_RATES:
1166 * Only process extended supported rate
1167 * if data rate is already found.
1168 * Data rate IE should come before
1169 * extended supported rate IE
1171 if (found_data_rate_ie) {
1172 if ((element_len + rate_size) >
1173 MWIFIEX_SUPPORTED_RATES)
1174 bytes_to_copy =
1175 (MWIFIEX_SUPPORTED_RATES -
1176 rate_size);
1177 else
1178 bytes_to_copy = element_len;
1180 rate = (u8 *) bss_entry->data_rates;
1181 rate += rate_size;
1182 memcpy(rate, current_ptr + 2, bytes_to_copy);
1184 rate = (u8 *) bss_entry->supported_rates;
1185 rate += rate_size;
1186 memcpy(rate, current_ptr + 2, bytes_to_copy);
1188 break;
1190 case WLAN_EID_VENDOR_SPECIFIC:
1191 vendor_ie = (struct ieee_types_vendor_specific *)
1192 current_ptr;
1194 if (!memcmp
1195 (vendor_ie->vend_hdr.oui, wpa_oui,
1196 sizeof(wpa_oui))) {
1197 bss_entry->bcn_wpa_ie =
1198 (struct ieee_types_vendor_specific *)
1199 current_ptr;
1200 bss_entry->wpa_offset = (u16) (current_ptr -
1201 bss_entry->beacon_buf);
1202 } else if (!memcmp(vendor_ie->vend_hdr.oui, wmm_oui,
1203 sizeof(wmm_oui))) {
1204 if (total_ie_len ==
1205 sizeof(struct ieee_types_wmm_parameter)
1206 || total_ie_len ==
1207 sizeof(struct ieee_types_wmm_info))
1209 * Only accept and copy the WMM IE if
1210 * it matches the size expected for the
1211 * WMM Info IE or the WMM Parameter IE.
1213 memcpy((u8 *) &bss_entry->wmm_ie,
1214 current_ptr, total_ie_len);
1216 break;
1217 case WLAN_EID_RSN:
1218 bss_entry->bcn_rsn_ie =
1219 (struct ieee_types_generic *) current_ptr;
1220 bss_entry->rsn_offset = (u16) (current_ptr -
1221 bss_entry->beacon_buf);
1222 break;
1223 case WLAN_EID_BSS_AC_ACCESS_DELAY:
1224 bss_entry->bcn_wapi_ie =
1225 (struct ieee_types_generic *) current_ptr;
1226 bss_entry->wapi_offset = (u16) (current_ptr -
1227 bss_entry->beacon_buf);
1228 break;
1229 case WLAN_EID_HT_CAPABILITY:
1230 bss_entry->bcn_ht_cap = (struct ieee80211_ht_cap *)
1231 (current_ptr +
1232 sizeof(struct ieee_types_header));
1233 bss_entry->ht_cap_offset = (u16) (current_ptr +
1234 sizeof(struct ieee_types_header) -
1235 bss_entry->beacon_buf);
1236 break;
1237 case WLAN_EID_HT_INFORMATION:
1238 bss_entry->bcn_ht_info = (struct ieee80211_ht_info *)
1239 (current_ptr +
1240 sizeof(struct ieee_types_header));
1241 bss_entry->ht_info_offset = (u16) (current_ptr +
1242 sizeof(struct ieee_types_header) -
1243 bss_entry->beacon_buf);
1244 break;
1245 case WLAN_EID_BSS_COEX_2040:
1246 bss_entry->bcn_bss_co_2040 = (u8 *) (current_ptr +
1247 sizeof(struct ieee_types_header));
1248 bss_entry->bss_co_2040_offset = (u16) (current_ptr +
1249 sizeof(struct ieee_types_header) -
1250 bss_entry->beacon_buf);
1251 break;
1252 case WLAN_EID_EXT_CAPABILITY:
1253 bss_entry->bcn_ext_cap = (u8 *) (current_ptr +
1254 sizeof(struct ieee_types_header));
1255 bss_entry->ext_cap_offset = (u16) (current_ptr +
1256 sizeof(struct ieee_types_header) -
1257 bss_entry->beacon_buf);
1258 break;
1259 default:
1260 break;
1263 current_ptr += element_len + 2;
1265 /* Need to account for IE ID and IE Len */
1266 bytes_left -= (element_len + 2);
1268 } /* while (bytes_left > 2) */
1269 return ret;
1273 * This function converts radio type scan parameter to a band configuration
1274 * to be used in join command.
1276 static u8
1277 mwifiex_radio_type_to_band(u8 radio_type)
1279 switch (radio_type) {
1280 case HostCmd_SCAN_RADIO_TYPE_A:
1281 return BAND_A;
1282 case HostCmd_SCAN_RADIO_TYPE_BG:
1283 default:
1284 return BAND_G;
1289 * This is an internal function used to start a scan based on an input
1290 * configuration.
1292 * This uses the input user scan configuration information when provided in
1293 * order to send the appropriate scan commands to firmware to populate or
1294 * update the internal driver scan table.
1296 static int mwifiex_scan_networks(struct mwifiex_private *priv,
1297 const struct mwifiex_user_scan_cfg *user_scan_in)
1299 int ret = 0;
1300 struct mwifiex_adapter *adapter = priv->adapter;
1301 struct cmd_ctrl_node *cmd_node;
1302 union mwifiex_scan_cmd_config_tlv *scan_cfg_out;
1303 struct mwifiex_ie_types_chan_list_param_set *chan_list_out;
1304 u32 buf_size;
1305 struct mwifiex_chan_scan_param_set *scan_chan_list;
1306 u8 filtered_scan;
1307 u8 scan_current_chan_only;
1308 u8 max_chan_per_scan;
1309 unsigned long flags;
1311 if (adapter->scan_processing) {
1312 dev_dbg(adapter->dev, "cmd: Scan already in process...\n");
1313 return ret;
1316 spin_lock_irqsave(&adapter->mwifiex_cmd_lock, flags);
1317 adapter->scan_processing = true;
1318 spin_unlock_irqrestore(&adapter->mwifiex_cmd_lock, flags);
1320 if (priv->scan_block) {
1321 dev_dbg(adapter->dev,
1322 "cmd: Scan is blocked during association...\n");
1323 return ret;
1326 scan_cfg_out = kzalloc(sizeof(union mwifiex_scan_cmd_config_tlv),
1327 GFP_KERNEL);
1328 if (!scan_cfg_out) {
1329 dev_err(adapter->dev, "failed to alloc scan_cfg_out\n");
1330 return -ENOMEM;
1333 buf_size = sizeof(struct mwifiex_chan_scan_param_set) *
1334 MWIFIEX_USER_SCAN_CHAN_MAX;
1335 scan_chan_list = kzalloc(buf_size, GFP_KERNEL);
1336 if (!scan_chan_list) {
1337 dev_err(adapter->dev, "failed to alloc scan_chan_list\n");
1338 kfree(scan_cfg_out);
1339 return -ENOMEM;
1342 mwifiex_scan_setup_scan_config(priv, user_scan_in,
1343 &scan_cfg_out->config, &chan_list_out,
1344 scan_chan_list, &max_chan_per_scan,
1345 &filtered_scan, &scan_current_chan_only);
1347 ret = mwifiex_scan_channel_list(priv, max_chan_per_scan, filtered_scan,
1348 &scan_cfg_out->config, chan_list_out,
1349 scan_chan_list);
1351 /* Get scan command from scan_pending_q and put to cmd_pending_q */
1352 if (!ret) {
1353 spin_lock_irqsave(&adapter->scan_pending_q_lock, flags);
1354 if (!list_empty(&adapter->scan_pending_q)) {
1355 cmd_node = list_first_entry(&adapter->scan_pending_q,
1356 struct cmd_ctrl_node, list);
1357 list_del(&cmd_node->list);
1358 spin_unlock_irqrestore(&adapter->scan_pending_q_lock,
1359 flags);
1360 adapter->cmd_queued = cmd_node;
1361 mwifiex_insert_cmd_to_pending_q(adapter, cmd_node,
1362 true);
1363 } else {
1364 spin_unlock_irqrestore(&adapter->scan_pending_q_lock,
1365 flags);
1367 } else {
1368 spin_lock_irqsave(&adapter->mwifiex_cmd_lock, flags);
1369 adapter->scan_processing = true;
1370 spin_unlock_irqrestore(&adapter->mwifiex_cmd_lock, flags);
1373 kfree(scan_cfg_out);
1374 kfree(scan_chan_list);
1375 return ret;
1379 * Sends IOCTL request to start a scan with user configurations.
1381 * This function allocates the IOCTL request buffer, fills it
1382 * with requisite parameters and calls the IOCTL handler.
1384 * Upon completion, it also generates a wireless event to notify
1385 * applications.
1387 int mwifiex_set_user_scan_ioctl(struct mwifiex_private *priv,
1388 struct mwifiex_user_scan_cfg *scan_req)
1390 int status;
1392 priv->adapter->scan_wait_q_woken = false;
1394 status = mwifiex_scan_networks(priv, scan_req);
1395 if (!status)
1396 status = mwifiex_wait_queue_complete(priv->adapter);
1398 return status;
1402 * This function prepares a scan command to be sent to the firmware.
1404 * This uses the scan command configuration sent to the command processing
1405 * module in command preparation stage to configure a scan command structure
1406 * to send to firmware.
1408 * The fixed fields specifying the BSS type and BSSID filters as well as a
1409 * variable number/length of TLVs are sent in the command to firmware.
1411 * Preparation also includes -
1412 * - Setting command ID, and proper size
1413 * - Ensuring correct endian-ness
1415 int mwifiex_cmd_802_11_scan(struct host_cmd_ds_command *cmd,
1416 struct mwifiex_scan_cmd_config *scan_cfg)
1418 struct host_cmd_ds_802_11_scan *scan_cmd = &cmd->params.scan;
1420 /* Set fixed field variables in scan command */
1421 scan_cmd->bss_mode = scan_cfg->bss_mode;
1422 memcpy(scan_cmd->bssid, scan_cfg->specific_bssid,
1423 sizeof(scan_cmd->bssid));
1424 memcpy(scan_cmd->tlv_buffer, scan_cfg->tlv_buf, scan_cfg->tlv_buf_len);
1426 cmd->command = cpu_to_le16(HostCmd_CMD_802_11_SCAN);
1428 /* Size is equal to the sizeof(fixed portions) + the TLV len + header */
1429 cmd->size = cpu_to_le16((u16) (sizeof(scan_cmd->bss_mode)
1430 + sizeof(scan_cmd->bssid)
1431 + scan_cfg->tlv_buf_len + S_DS_GEN));
1433 return 0;
1437 * This function checks compatibility of requested network with current
1438 * driver settings.
1440 int mwifiex_check_network_compatibility(struct mwifiex_private *priv,
1441 struct mwifiex_bssdescriptor *bss_desc)
1443 int ret = -1;
1445 if (!bss_desc)
1446 return -1;
1448 if ((mwifiex_get_cfp_by_band_and_channel_from_cfg80211(priv,
1449 (u8) bss_desc->bss_band, (u16) bss_desc->channel))) {
1450 switch (priv->bss_mode) {
1451 case NL80211_IFTYPE_STATION:
1452 case NL80211_IFTYPE_ADHOC:
1453 ret = mwifiex_is_network_compatible(priv, bss_desc,
1454 priv->bss_mode);
1455 if (ret)
1456 dev_err(priv->adapter->dev, "cannot find ssid "
1457 "%s\n", bss_desc->ssid.ssid);
1458 break;
1459 default:
1460 ret = 0;
1464 return ret;
1467 static int
1468 mwifiex_update_curr_bss_params(struct mwifiex_private *priv, u8 *bssid,
1469 s32 rssi, const u8 *ie_buf, size_t ie_len,
1470 u16 beacon_period, u16 cap_info_bitmap, u8 band)
1472 struct mwifiex_bssdescriptor *bss_desc = NULL;
1473 int ret;
1474 unsigned long flags;
1475 u8 *beacon_ie;
1477 /* Allocate and fill new bss descriptor */
1478 bss_desc = kzalloc(sizeof(struct mwifiex_bssdescriptor),
1479 GFP_KERNEL);
1480 if (!bss_desc) {
1481 dev_err(priv->adapter->dev, " failed to alloc bss_desc\n");
1482 return -ENOMEM;
1485 beacon_ie = kmemdup(ie_buf, ie_len, GFP_KERNEL);
1486 if (!beacon_ie) {
1487 dev_err(priv->adapter->dev, " failed to alloc beacon_ie\n");
1488 return -ENOMEM;
1491 ret = mwifiex_fill_new_bss_desc(priv, bssid, rssi, beacon_ie,
1492 ie_len, beacon_period,
1493 cap_info_bitmap, band, bss_desc);
1494 if (ret)
1495 goto done;
1497 ret = mwifiex_check_network_compatibility(priv, bss_desc);
1498 if (ret)
1499 goto done;
1501 /* Update current bss descriptor parameters */
1502 spin_lock_irqsave(&priv->curr_bcn_buf_lock, flags);
1503 priv->curr_bss_params.bss_descriptor.bcn_wpa_ie = NULL;
1504 priv->curr_bss_params.bss_descriptor.wpa_offset = 0;
1505 priv->curr_bss_params.bss_descriptor.bcn_rsn_ie = NULL;
1506 priv->curr_bss_params.bss_descriptor.rsn_offset = 0;
1507 priv->curr_bss_params.bss_descriptor.bcn_wapi_ie = NULL;
1508 priv->curr_bss_params.bss_descriptor.wapi_offset = 0;
1509 priv->curr_bss_params.bss_descriptor.bcn_ht_cap = NULL;
1510 priv->curr_bss_params.bss_descriptor.ht_cap_offset =
1512 priv->curr_bss_params.bss_descriptor.bcn_ht_info = NULL;
1513 priv->curr_bss_params.bss_descriptor.ht_info_offset =
1515 priv->curr_bss_params.bss_descriptor.bcn_bss_co_2040 =
1516 NULL;
1517 priv->curr_bss_params.bss_descriptor.
1518 bss_co_2040_offset = 0;
1519 priv->curr_bss_params.bss_descriptor.bcn_ext_cap = NULL;
1520 priv->curr_bss_params.bss_descriptor.ext_cap_offset = 0;
1521 priv->curr_bss_params.bss_descriptor.beacon_buf = NULL;
1522 priv->curr_bss_params.bss_descriptor.beacon_buf_size =
1525 /* Make a copy of current BSSID descriptor */
1526 memcpy(&priv->curr_bss_params.bss_descriptor, bss_desc,
1527 sizeof(priv->curr_bss_params.bss_descriptor));
1528 mwifiex_save_curr_bcn(priv);
1529 spin_unlock_irqrestore(&priv->curr_bcn_buf_lock, flags);
1531 done:
1532 kfree(bss_desc);
1533 kfree(beacon_ie);
1534 return 0;
1537 static void mwifiex_free_bss_priv(struct cfg80211_bss *bss)
1539 kfree(bss->priv);
1543 * This function handles the command response of scan.
1545 * The response buffer for the scan command has the following
1546 * memory layout:
1548 * .-------------------------------------------------------------.
1549 * | Header (4 * sizeof(t_u16)): Standard command response hdr |
1550 * .-------------------------------------------------------------.
1551 * | BufSize (t_u16) : sizeof the BSS Description data |
1552 * .-------------------------------------------------------------.
1553 * | NumOfSet (t_u8) : Number of BSS Descs returned |
1554 * .-------------------------------------------------------------.
1555 * | BSSDescription data (variable, size given in BufSize) |
1556 * .-------------------------------------------------------------.
1557 * | TLV data (variable, size calculated using Header->Size, |
1558 * | BufSize and sizeof the fixed fields above) |
1559 * .-------------------------------------------------------------.
1561 int mwifiex_ret_802_11_scan(struct mwifiex_private *priv,
1562 struct host_cmd_ds_command *resp)
1564 int ret = 0;
1565 struct mwifiex_adapter *adapter = priv->adapter;
1566 struct cmd_ctrl_node *cmd_node;
1567 struct host_cmd_ds_802_11_scan_rsp *scan_rsp;
1568 struct mwifiex_ie_types_data *tlv_data;
1569 struct mwifiex_ie_types_tsf_timestamp *tsf_tlv;
1570 u8 *bss_info;
1571 u32 scan_resp_size;
1572 u32 bytes_left;
1573 u32 idx;
1574 u32 tlv_buf_size;
1575 struct mwifiex_chan_freq_power *cfp;
1576 struct mwifiex_ie_types_chan_band_list_param_set *chan_band_tlv;
1577 struct chan_band_param_set *chan_band;
1578 u8 is_bgscan_resp;
1579 unsigned long flags;
1580 struct cfg80211_bss *bss;
1582 is_bgscan_resp = (le16_to_cpu(resp->command)
1583 == HostCmd_CMD_802_11_BG_SCAN_QUERY);
1584 if (is_bgscan_resp)
1585 scan_rsp = &resp->params.bg_scan_query_resp.scan_resp;
1586 else
1587 scan_rsp = &resp->params.scan_resp;
1590 if (scan_rsp->number_of_sets > MWIFIEX_MAX_AP) {
1591 dev_err(adapter->dev, "SCAN_RESP: too many AP returned (%d)\n",
1592 scan_rsp->number_of_sets);
1593 ret = -1;
1594 goto done;
1597 bytes_left = le16_to_cpu(scan_rsp->bss_descript_size);
1598 dev_dbg(adapter->dev, "info: SCAN_RESP: bss_descript_size %d\n",
1599 bytes_left);
1601 scan_resp_size = le16_to_cpu(resp->size);
1603 dev_dbg(adapter->dev,
1604 "info: SCAN_RESP: returned %d APs before parsing\n",
1605 scan_rsp->number_of_sets);
1607 bss_info = scan_rsp->bss_desc_and_tlv_buffer;
1610 * The size of the TLV buffer is equal to the entire command response
1611 * size (scan_resp_size) minus the fixed fields (sizeof()'s), the
1612 * BSS Descriptions (bss_descript_size as bytesLef) and the command
1613 * response header (S_DS_GEN)
1615 tlv_buf_size = scan_resp_size - (bytes_left
1616 + sizeof(scan_rsp->bss_descript_size)
1617 + sizeof(scan_rsp->number_of_sets)
1618 + S_DS_GEN);
1620 tlv_data = (struct mwifiex_ie_types_data *) (scan_rsp->
1621 bss_desc_and_tlv_buffer +
1622 bytes_left);
1624 /* Search the TLV buffer space in the scan response for any valid
1625 TLVs */
1626 mwifiex_ret_802_11_scan_get_tlv_ptrs(adapter, tlv_data, tlv_buf_size,
1627 TLV_TYPE_TSFTIMESTAMP,
1628 (struct mwifiex_ie_types_data **)
1629 &tsf_tlv);
1631 /* Search the TLV buffer space in the scan response for any valid
1632 TLVs */
1633 mwifiex_ret_802_11_scan_get_tlv_ptrs(adapter, tlv_data, tlv_buf_size,
1634 TLV_TYPE_CHANNELBANDLIST,
1635 (struct mwifiex_ie_types_data **)
1636 &chan_band_tlv);
1638 for (idx = 0; idx < scan_rsp->number_of_sets && bytes_left; idx++) {
1639 u8 bssid[ETH_ALEN];
1640 s32 rssi;
1641 const u8 *ie_buf;
1642 size_t ie_len;
1643 int channel = -1;
1644 u64 network_tsf = 0;
1645 u16 beacon_size = 0;
1646 u32 curr_bcn_bytes;
1647 u32 freq;
1648 u16 beacon_period;
1649 u16 cap_info_bitmap;
1650 u8 *current_ptr;
1651 struct mwifiex_bcn_param *bcn_param;
1653 if (bytes_left >= sizeof(beacon_size)) {
1654 /* Extract & convert beacon size from command buffer */
1655 memcpy(&beacon_size, bss_info, sizeof(beacon_size));
1656 bytes_left -= sizeof(beacon_size);
1657 bss_info += sizeof(beacon_size);
1660 if (!beacon_size || beacon_size > bytes_left) {
1661 bss_info += bytes_left;
1662 bytes_left = 0;
1663 return -1;
1666 /* Initialize the current working beacon pointer for this BSS
1667 * iteration */
1668 current_ptr = bss_info;
1670 /* Advance the return beacon pointer past the current beacon */
1671 bss_info += beacon_size;
1672 bytes_left -= beacon_size;
1674 curr_bcn_bytes = beacon_size;
1677 * First 5 fields are bssid, RSSI, time stamp, beacon interval,
1678 * and capability information
1680 if (curr_bcn_bytes < sizeof(struct mwifiex_bcn_param)) {
1681 dev_err(adapter->dev, "InterpretIE: not enough bytes left\n");
1682 continue;
1684 bcn_param = (struct mwifiex_bcn_param *)current_ptr;
1685 current_ptr += sizeof(*bcn_param);
1686 curr_bcn_bytes -= sizeof(*bcn_param);
1688 memcpy(bssid, bcn_param->bssid, ETH_ALEN);
1690 rssi = (s32) (bcn_param->rssi);
1691 dev_dbg(adapter->dev, "info: InterpretIE: RSSI=%02X\n",
1692 rssi);
1694 beacon_period = le16_to_cpu(bcn_param->beacon_period);
1696 cap_info_bitmap = le16_to_cpu(bcn_param->cap_info_bitmap);
1697 dev_dbg(adapter->dev, "info: InterpretIE: capabilities=0x%X\n",
1698 cap_info_bitmap);
1700 /* Rest of the current buffer are IE's */
1701 ie_buf = current_ptr;
1702 ie_len = curr_bcn_bytes;
1703 dev_dbg(adapter->dev, "info: InterpretIE: IELength for this AP"
1704 " = %d\n", curr_bcn_bytes);
1706 while (curr_bcn_bytes >= sizeof(struct ieee_types_header)) {
1707 u8 element_id, element_len;
1709 element_id = *current_ptr;
1710 element_len = *(current_ptr + 1);
1711 if (curr_bcn_bytes < element_len +
1712 sizeof(struct ieee_types_header)) {
1713 dev_err(priv->adapter->dev, "%s: in processing"
1714 " IE, bytes left < IE length\n",
1715 __func__);
1716 goto done;
1718 if (element_id == WLAN_EID_DS_PARAMS) {
1719 channel = *(u8 *) (current_ptr +
1720 sizeof(struct ieee_types_header));
1721 break;
1724 current_ptr += element_len +
1725 sizeof(struct ieee_types_header);
1726 curr_bcn_bytes -= element_len +
1727 sizeof(struct ieee_types_header);
1731 * If the TSF TLV was appended to the scan results, save this
1732 * entry's TSF value in the networkTSF field.The networkTSF is
1733 * the firmware's TSF value at the time the beacon or probe
1734 * response was received.
1736 if (tsf_tlv)
1737 memcpy(&network_tsf,
1738 &tsf_tlv->tsf_data[idx * TSF_DATA_SIZE],
1739 sizeof(network_tsf));
1741 if (channel != -1) {
1742 struct ieee80211_channel *chan;
1743 u8 band;
1745 band = BAND_G;
1746 if (chan_band_tlv) {
1747 chan_band =
1748 &chan_band_tlv->chan_band_param[idx];
1749 band = mwifiex_radio_type_to_band(
1750 chan_band->radio_type
1751 & (BIT(0) | BIT(1)));
1754 cfp = mwifiex_get_cfp_by_band_and_channel_from_cfg80211(
1755 priv, (u8)band, (u16)channel);
1757 freq = cfp ? cfp->freq : 0;
1759 chan = ieee80211_get_channel(priv->wdev->wiphy, freq);
1761 if (chan && !(chan->flags & IEEE80211_CHAN_DISABLED)) {
1762 bss = cfg80211_inform_bss(priv->wdev->wiphy,
1763 chan, bssid, network_tsf,
1764 cap_info_bitmap, beacon_period,
1765 ie_buf, ie_len, rssi, GFP_KERNEL);
1766 *(u8 *)bss->priv = band;
1767 bss->free_priv = mwifiex_free_bss_priv;
1769 if (priv->media_connected && !memcmp(bssid,
1770 priv->curr_bss_params.bss_descriptor
1771 .mac_address, ETH_ALEN))
1772 mwifiex_update_curr_bss_params(priv,
1773 bssid, rssi, ie_buf,
1774 ie_len, beacon_period,
1775 cap_info_bitmap, band);
1777 } else {
1778 dev_dbg(adapter->dev, "missing BSS channel IE\n");
1782 spin_lock_irqsave(&adapter->scan_pending_q_lock, flags);
1783 if (list_empty(&adapter->scan_pending_q)) {
1784 spin_unlock_irqrestore(&adapter->scan_pending_q_lock, flags);
1785 spin_lock_irqsave(&adapter->mwifiex_cmd_lock, flags);
1786 adapter->scan_processing = false;
1787 spin_unlock_irqrestore(&adapter->mwifiex_cmd_lock, flags);
1789 /* Need to indicate IOCTL complete */
1790 if (adapter->curr_cmd->wait_q_enabled) {
1791 adapter->cmd_wait_q.status = 0;
1792 mwifiex_complete_cmd(adapter, adapter->curr_cmd);
1794 if (priv->report_scan_result)
1795 priv->report_scan_result = false;
1796 if (priv->scan_pending_on_block) {
1797 priv->scan_pending_on_block = false;
1798 up(&priv->async_sem);
1801 } else {
1802 /* Get scan command from scan_pending_q and put to
1803 cmd_pending_q */
1804 cmd_node = list_first_entry(&adapter->scan_pending_q,
1805 struct cmd_ctrl_node, list);
1806 list_del(&cmd_node->list);
1807 spin_unlock_irqrestore(&adapter->scan_pending_q_lock, flags);
1809 mwifiex_insert_cmd_to_pending_q(adapter, cmd_node, true);
1812 done:
1813 return ret;
1817 * This function prepares command for background scan query.
1819 * Preparation includes -
1820 * - Setting command ID and proper size
1821 * - Setting background scan flush parameter
1822 * - Ensuring correct endian-ness
1824 int mwifiex_cmd_802_11_bg_scan_query(struct host_cmd_ds_command *cmd)
1826 struct host_cmd_ds_802_11_bg_scan_query *bg_query =
1827 &cmd->params.bg_scan_query;
1829 cmd->command = cpu_to_le16(HostCmd_CMD_802_11_BG_SCAN_QUERY);
1830 cmd->size = cpu_to_le16(sizeof(struct host_cmd_ds_802_11_bg_scan_query)
1831 + S_DS_GEN);
1833 bg_query->flush = 1;
1835 return 0;
1839 * This function inserts scan command node to the scan pending queue.
1841 void
1842 mwifiex_queue_scan_cmd(struct mwifiex_private *priv,
1843 struct cmd_ctrl_node *cmd_node)
1845 struct mwifiex_adapter *adapter = priv->adapter;
1846 unsigned long flags;
1848 cmd_node->wait_q_enabled = true;
1849 cmd_node->condition = &adapter->scan_wait_q_woken;
1850 spin_lock_irqsave(&adapter->scan_pending_q_lock, flags);
1851 list_add_tail(&cmd_node->list, &adapter->scan_pending_q);
1852 spin_unlock_irqrestore(&adapter->scan_pending_q_lock, flags);
1856 * This function sends a scan command for all available channels to the
1857 * firmware, filtered on a specific SSID.
1859 static int mwifiex_scan_specific_ssid(struct mwifiex_private *priv,
1860 struct mwifiex_802_11_ssid *req_ssid)
1862 struct mwifiex_adapter *adapter = priv->adapter;
1863 int ret = 0;
1864 struct mwifiex_user_scan_cfg *scan_cfg;
1866 if (!req_ssid)
1867 return -1;
1869 if (adapter->scan_processing) {
1870 dev_dbg(adapter->dev, "cmd: Scan already in process...\n");
1871 return ret;
1874 if (priv->scan_block) {
1875 dev_dbg(adapter->dev,
1876 "cmd: Scan is blocked during association...\n");
1877 return ret;
1880 scan_cfg = kzalloc(sizeof(struct mwifiex_user_scan_cfg), GFP_KERNEL);
1881 if (!scan_cfg) {
1882 dev_err(adapter->dev, "failed to alloc scan_cfg\n");
1883 return -ENOMEM;
1886 memcpy(scan_cfg->ssid_list[0].ssid, req_ssid->ssid,
1887 req_ssid->ssid_len);
1889 ret = mwifiex_scan_networks(priv, scan_cfg);
1891 kfree(scan_cfg);
1892 return ret;
1896 * Sends IOCTL request to start a scan.
1898 * This function allocates the IOCTL request buffer, fills it
1899 * with requisite parameters and calls the IOCTL handler.
1901 * Scan command can be issued for both normal scan and specific SSID
1902 * scan, depending upon whether an SSID is provided or not.
1904 int mwifiex_request_scan(struct mwifiex_private *priv,
1905 struct mwifiex_802_11_ssid *req_ssid)
1907 int ret;
1909 if (down_interruptible(&priv->async_sem)) {
1910 dev_err(priv->adapter->dev, "%s: acquire semaphore\n",
1911 __func__);
1912 return -1;
1914 priv->scan_pending_on_block = true;
1916 priv->adapter->scan_wait_q_woken = false;
1918 if (req_ssid && req_ssid->ssid_len != 0)
1919 /* Specific SSID scan */
1920 ret = mwifiex_scan_specific_ssid(priv, req_ssid);
1921 else
1922 /* Normal scan */
1923 ret = mwifiex_scan_networks(priv, NULL);
1925 if (!ret)
1926 ret = mwifiex_wait_queue_complete(priv->adapter);
1928 if (ret == -1) {
1929 priv->scan_pending_on_block = false;
1930 up(&priv->async_sem);
1933 return ret;
1937 * This function appends the vendor specific IE TLV to a buffer.
1940 mwifiex_cmd_append_vsie_tlv(struct mwifiex_private *priv,
1941 u16 vsie_mask, u8 **buffer)
1943 int id, ret_len = 0;
1944 struct mwifiex_ie_types_vendor_param_set *vs_param_set;
1946 if (!buffer)
1947 return 0;
1948 if (!(*buffer))
1949 return 0;
1952 * Traverse through the saved vendor specific IE array and append
1953 * the selected(scan/assoc/adhoc) IE as TLV to the command
1955 for (id = 0; id < MWIFIEX_MAX_VSIE_NUM; id++) {
1956 if (priv->vs_ie[id].mask & vsie_mask) {
1957 vs_param_set =
1958 (struct mwifiex_ie_types_vendor_param_set *)
1959 *buffer;
1960 vs_param_set->header.type =
1961 cpu_to_le16(TLV_TYPE_PASSTHROUGH);
1962 vs_param_set->header.len =
1963 cpu_to_le16((((u16) priv->vs_ie[id].ie[1])
1964 & 0x00FF) + 2);
1965 memcpy(vs_param_set->ie, priv->vs_ie[id].ie,
1966 le16_to_cpu(vs_param_set->header.len));
1967 *buffer += le16_to_cpu(vs_param_set->header.len) +
1968 sizeof(struct mwifiex_ie_types_header);
1969 ret_len += le16_to_cpu(vs_param_set->header.len) +
1970 sizeof(struct mwifiex_ie_types_header);
1973 return ret_len;
1977 * This function saves a beacon buffer of the current BSS descriptor.
1979 * The current beacon buffer is saved so that it can be restored in the
1980 * following cases that makes the beacon buffer not to contain the current
1981 * ssid's beacon buffer.
1982 * - The current ssid was not found somehow in the last scan.
1983 * - The current ssid was the last entry of the scan table and overloaded.
1985 void
1986 mwifiex_save_curr_bcn(struct mwifiex_private *priv)
1988 struct mwifiex_bssdescriptor *curr_bss =
1989 &priv->curr_bss_params.bss_descriptor;
1991 if (!curr_bss->beacon_buf_size)
1992 return;
1994 /* allocate beacon buffer at 1st time; or if it's size has changed */
1995 if (!priv->curr_bcn_buf ||
1996 priv->curr_bcn_size != curr_bss->beacon_buf_size) {
1997 priv->curr_bcn_size = curr_bss->beacon_buf_size;
1999 kfree(priv->curr_bcn_buf);
2000 priv->curr_bcn_buf = kmalloc(curr_bss->beacon_buf_size,
2001 GFP_KERNEL);
2002 if (!priv->curr_bcn_buf) {
2003 dev_err(priv->adapter->dev,
2004 "failed to alloc curr_bcn_buf\n");
2005 return;
2009 memcpy(priv->curr_bcn_buf, curr_bss->beacon_buf,
2010 curr_bss->beacon_buf_size);
2011 dev_dbg(priv->adapter->dev, "info: current beacon saved %d\n",
2012 priv->curr_bcn_size);
2014 curr_bss->beacon_buf = priv->curr_bcn_buf;
2016 /* adjust the pointers in the current BSS descriptor */
2017 if (curr_bss->bcn_wpa_ie)
2018 curr_bss->bcn_wpa_ie =
2019 (struct ieee_types_vendor_specific *)
2020 (curr_bss->beacon_buf +
2021 curr_bss->wpa_offset);
2023 if (curr_bss->bcn_rsn_ie)
2024 curr_bss->bcn_rsn_ie = (struct ieee_types_generic *)
2025 (curr_bss->beacon_buf +
2026 curr_bss->rsn_offset);
2028 if (curr_bss->bcn_ht_cap)
2029 curr_bss->bcn_ht_cap = (struct ieee80211_ht_cap *)
2030 (curr_bss->beacon_buf +
2031 curr_bss->ht_cap_offset);
2033 if (curr_bss->bcn_ht_info)
2034 curr_bss->bcn_ht_info = (struct ieee80211_ht_info *)
2035 (curr_bss->beacon_buf +
2036 curr_bss->ht_info_offset);
2038 if (curr_bss->bcn_bss_co_2040)
2039 curr_bss->bcn_bss_co_2040 =
2040 (u8 *) (curr_bss->beacon_buf +
2041 curr_bss->bss_co_2040_offset);
2043 if (curr_bss->bcn_ext_cap)
2044 curr_bss->bcn_ext_cap = (u8 *) (curr_bss->beacon_buf +
2045 curr_bss->ext_cap_offset);
2049 * This function frees the current BSS descriptor beacon buffer.
2051 void
2052 mwifiex_free_curr_bcn(struct mwifiex_private *priv)
2054 kfree(priv->curr_bcn_buf);
2055 priv->curr_bcn_buf = NULL;