mfd: wm8350-i2c: Make sure the i2c regmap functions are compiled
[linux/fpc-iii.git] / drivers / staging / wlan-ng / prism2sta.c
blob76374b2202285b201981fd6c618c7fc744e72ff0
1 /* src/prism2/driver/prism2sta.c
3 * Implements the station functionality for prism2
5 * Copyright (C) 1999 AbsoluteValue Systems, Inc. All Rights Reserved.
6 * --------------------------------------------------------------------
8 * linux-wlan
10 * The contents of this file are subject to the Mozilla Public
11 * License Version 1.1 (the "License"); you may not use this file
12 * except in compliance with the License. You may obtain a copy of
13 * the License at http://www.mozilla.org/MPL/
15 * Software distributed under the License is distributed on an "AS
16 * IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or
17 * implied. See the License for the specific language governing
18 * rights and limitations under the License.
20 * Alternatively, the contents of this file may be used under the
21 * terms of the GNU Public License version 2 (the "GPL"), in which
22 * case the provisions of the GPL are applicable instead of the
23 * above. If you wish to allow the use of your version of this file
24 * only under the terms of the GPL and not to allow others to use
25 * your version of this file under the MPL, indicate your decision
26 * by deleting the provisions above and replace them with the notice
27 * and other provisions required by the GPL. If you do not delete
28 * the provisions above, a recipient may use your version of this
29 * file under either the MPL or the GPL.
31 * --------------------------------------------------------------------
33 * Inquiries regarding the linux-wlan Open Source project can be
34 * made directly to:
36 * AbsoluteValue Systems Inc.
37 * info@linux-wlan.com
38 * http://www.linux-wlan.com
40 * --------------------------------------------------------------------
42 * Portions of the development of this software were funded by
43 * Intersil Corporation as part of PRISM(R) chipset product development.
45 * --------------------------------------------------------------------
47 * This file implements the module and linux pcmcia routines for the
48 * prism2 driver.
50 * --------------------------------------------------------------------
53 #include <linux/module.h>
54 #include <linux/moduleparam.h>
55 #include <linux/kernel.h>
56 #include <linux/sched.h>
57 #include <linux/types.h>
58 #include <linux/init.h>
59 #include <linux/slab.h>
60 #include <linux/wireless.h>
61 #include <linux/netdevice.h>
62 #include <linux/workqueue.h>
63 #include <linux/byteorder/generic.h>
64 #include <linux/ctype.h>
66 #include <linux/io.h>
67 #include <linux/delay.h>
68 #include <asm/byteorder.h>
69 #include <linux/if_arp.h>
70 #include <linux/if_ether.h>
71 #include <linux/bitops.h>
73 #include "p80211types.h"
74 #include "p80211hdr.h"
75 #include "p80211mgmt.h"
76 #include "p80211conv.h"
77 #include "p80211msg.h"
78 #include "p80211netdev.h"
79 #include "p80211req.h"
80 #include "p80211metadef.h"
81 #include "p80211metastruct.h"
82 #include "hfa384x.h"
83 #include "prism2mgmt.h"
85 /* Create a string of printable chars from something that might not be */
86 /* It's recommended that the str be 4*len + 1 bytes long */
87 #define wlan_mkprintstr(buf, buflen, str, strlen) \
88 { \
89 int i = 0; \
90 int j = 0; \
91 memset(str, 0, (strlen)); \
92 for (i = 0; i < (buflen); i++) { \
93 if (isprint((buf)[i])) { \
94 (str)[j] = (buf)[i]; \
95 j++; \
96 } else { \
97 (str)[j] = '\\'; \
98 (str)[j+1] = 'x'; \
99 (str)[j+2] = hex_asc_hi((buf)[i]); \
100 (str)[j+3] = hex_asc_lo((buf)[i]); \
101 j += 4; \
106 static char *dev_info = "prism2_usb";
107 static wlandevice_t *create_wlan(void);
109 int prism2_reset_holdtime = 30; /* Reset hold time in ms */
110 int prism2_reset_settletime = 100; /* Reset settle time in ms */
112 static int prism2_doreset; /* Do a reset at init? */
114 module_param(prism2_doreset, int, 0644);
115 MODULE_PARM_DESC(prism2_doreset, "Issue a reset on initialization");
117 module_param(prism2_reset_holdtime, int, 0644);
118 MODULE_PARM_DESC(prism2_reset_holdtime, "reset hold time in ms");
119 module_param(prism2_reset_settletime, int, 0644);
120 MODULE_PARM_DESC(prism2_reset_settletime, "reset settle time in ms");
122 MODULE_LICENSE("Dual MPL/GPL");
124 void prism2_connect_result(wlandevice_t *wlandev, u8 failed);
125 void prism2_disconnected(wlandevice_t *wlandev);
126 void prism2_roamed(wlandevice_t *wlandev);
128 static int prism2sta_open(wlandevice_t *wlandev);
129 static int prism2sta_close(wlandevice_t *wlandev);
130 static void prism2sta_reset(wlandevice_t *wlandev);
131 static int prism2sta_txframe(wlandevice_t *wlandev, struct sk_buff *skb,
132 union p80211_hdr *p80211_hdr,
133 struct p80211_metawep *p80211_wep);
134 static int prism2sta_mlmerequest(wlandevice_t *wlandev, struct p80211msg *msg);
135 static int prism2sta_getcardinfo(wlandevice_t *wlandev);
136 static int prism2sta_globalsetup(wlandevice_t *wlandev);
137 static int prism2sta_setmulticast(wlandevice_t *wlandev, netdevice_t *dev);
139 static void prism2sta_inf_handover(wlandevice_t *wlandev,
140 hfa384x_InfFrame_t *inf);
141 static void prism2sta_inf_tallies(wlandevice_t *wlandev,
142 hfa384x_InfFrame_t *inf);
143 static void prism2sta_inf_hostscanresults(wlandevice_t *wlandev,
144 hfa384x_InfFrame_t *inf);
145 static void prism2sta_inf_scanresults(wlandevice_t *wlandev,
146 hfa384x_InfFrame_t *inf);
147 static void prism2sta_inf_chinforesults(wlandevice_t *wlandev,
148 hfa384x_InfFrame_t *inf);
149 static void prism2sta_inf_linkstatus(wlandevice_t *wlandev,
150 hfa384x_InfFrame_t *inf);
151 static void prism2sta_inf_assocstatus(wlandevice_t *wlandev,
152 hfa384x_InfFrame_t *inf);
153 static void prism2sta_inf_authreq(wlandevice_t *wlandev,
154 hfa384x_InfFrame_t *inf);
155 static void prism2sta_inf_authreq_defer(wlandevice_t *wlandev,
156 hfa384x_InfFrame_t *inf);
157 static void prism2sta_inf_psusercnt(wlandevice_t *wlandev,
158 hfa384x_InfFrame_t *inf);
160 /*----------------------------------------------------------------
161 * prism2sta_open
163 * WLAN device open method. Called from p80211netdev when kernel
164 * device open (start) method is called in response to the
165 * SIOCSIIFFLAGS ioctl changing the flags bit IFF_UP
166 * from clear to set.
168 * Arguments:
169 * wlandev wlan device structure
171 * Returns:
172 * 0 success
173 * >0 f/w reported error
174 * <0 driver reported error
176 * Side effects:
178 * Call context:
179 * process thread
180 ----------------------------------------------------------------*/
181 static int prism2sta_open(wlandevice_t *wlandev)
183 /* We don't currently have to do anything else.
184 * The setup of the MAC should be subsequently completed via
185 * the mlme commands.
186 * Higher layers know we're ready from dev->start==1 and
187 * dev->tbusy==0. Our rx path knows to pass up received/
188 * frames because of dev->flags&IFF_UP is true.
191 return 0;
194 /*----------------------------------------------------------------
195 * prism2sta_close
197 * WLAN device close method. Called from p80211netdev when kernel
198 * device close method is called in response to the
199 * SIOCSIIFFLAGS ioctl changing the flags bit IFF_UP
200 * from set to clear.
202 * Arguments:
203 * wlandev wlan device structure
205 * Returns:
206 * 0 success
207 * >0 f/w reported error
208 * <0 driver reported error
210 * Side effects:
212 * Call context:
213 * process thread
214 ----------------------------------------------------------------*/
215 static int prism2sta_close(wlandevice_t *wlandev)
217 /* We don't currently have to do anything else.
218 * Higher layers know we're not ready from dev->start==0 and
219 * dev->tbusy==1. Our rx path knows to not pass up received
220 * frames because of dev->flags&IFF_UP is false.
223 return 0;
226 /*----------------------------------------------------------------
227 * prism2sta_reset
229 * Not currently implented.
231 * Arguments:
232 * wlandev wlan device structure
233 * none
235 * Returns:
236 * nothing
238 * Side effects:
240 * Call context:
241 * process thread
242 ----------------------------------------------------------------*/
243 static void prism2sta_reset(wlandevice_t *wlandev)
247 /*----------------------------------------------------------------
248 * prism2sta_txframe
250 * Takes a frame from p80211 and queues it for transmission.
252 * Arguments:
253 * wlandev wlan device structure
254 * pb packet buffer struct. Contains an 802.11
255 * data frame.
256 * p80211_hdr points to the 802.11 header for the packet.
257 * Returns:
258 * 0 Success and more buffs available
259 * 1 Success but no more buffs
260 * 2 Allocation failure
261 * 4 Buffer full or queue busy
263 * Side effects:
265 * Call context:
266 * process thread
267 ----------------------------------------------------------------*/
268 static int prism2sta_txframe(wlandevice_t *wlandev, struct sk_buff *skb,
269 union p80211_hdr *p80211_hdr,
270 struct p80211_metawep *p80211_wep)
272 hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
273 int result;
275 /* If necessary, set the 802.11 WEP bit */
276 if ((wlandev->hostwep & (HOSTWEP_PRIVACYINVOKED | HOSTWEP_ENCRYPT)) ==
277 HOSTWEP_PRIVACYINVOKED) {
278 p80211_hdr->a3.fc |= cpu_to_le16(WLAN_SET_FC_ISWEP(1));
281 result = hfa384x_drvr_txframe(hw, skb, p80211_hdr, p80211_wep);
283 return result;
286 /*----------------------------------------------------------------
287 * prism2sta_mlmerequest
289 * wlan command message handler. All we do here is pass the message
290 * over to the prism2sta_mgmt_handler.
292 * Arguments:
293 * wlandev wlan device structure
294 * msg wlan command message
295 * Returns:
296 * 0 success
297 * <0 successful acceptance of message, but we're
298 * waiting for an async process to finish before
299 * we're done with the msg. When the asynch
300 * process is done, we'll call the p80211
301 * function p80211req_confirm() .
302 * >0 An error occurred while we were handling
303 * the message.
305 * Side effects:
307 * Call context:
308 * process thread
309 ----------------------------------------------------------------*/
310 static int prism2sta_mlmerequest(wlandevice_t *wlandev, struct p80211msg *msg)
312 hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
314 int result = 0;
316 switch (msg->msgcode) {
317 case DIDmsg_dot11req_mibget:
318 pr_debug("Received mibget request\n");
319 result = prism2mgmt_mibset_mibget(wlandev, msg);
320 break;
321 case DIDmsg_dot11req_mibset:
322 pr_debug("Received mibset request\n");
323 result = prism2mgmt_mibset_mibget(wlandev, msg);
324 break;
325 case DIDmsg_dot11req_scan:
326 pr_debug("Received scan request\n");
327 result = prism2mgmt_scan(wlandev, msg);
328 break;
329 case DIDmsg_dot11req_scan_results:
330 pr_debug("Received scan_results request\n");
331 result = prism2mgmt_scan_results(wlandev, msg);
332 break;
333 case DIDmsg_dot11req_start:
334 pr_debug("Received mlme start request\n");
335 result = prism2mgmt_start(wlandev, msg);
336 break;
338 * Prism2 specific messages
340 case DIDmsg_p2req_readpda:
341 pr_debug("Received mlme readpda request\n");
342 result = prism2mgmt_readpda(wlandev, msg);
343 break;
344 case DIDmsg_p2req_ramdl_state:
345 pr_debug("Received mlme ramdl_state request\n");
346 result = prism2mgmt_ramdl_state(wlandev, msg);
347 break;
348 case DIDmsg_p2req_ramdl_write:
349 pr_debug("Received mlme ramdl_write request\n");
350 result = prism2mgmt_ramdl_write(wlandev, msg);
351 break;
352 case DIDmsg_p2req_flashdl_state:
353 pr_debug("Received mlme flashdl_state request\n");
354 result = prism2mgmt_flashdl_state(wlandev, msg);
355 break;
356 case DIDmsg_p2req_flashdl_write:
357 pr_debug("Received mlme flashdl_write request\n");
358 result = prism2mgmt_flashdl_write(wlandev, msg);
359 break;
361 * Linux specific messages
363 case DIDmsg_lnxreq_hostwep:
364 break; /* ignore me. */
365 case DIDmsg_lnxreq_ifstate:
367 struct p80211msg_lnxreq_ifstate *ifstatemsg;
368 pr_debug("Received mlme ifstate request\n");
369 ifstatemsg = (struct p80211msg_lnxreq_ifstate *) msg;
370 result =
371 prism2sta_ifstate(wlandev,
372 ifstatemsg->ifstate.data);
373 ifstatemsg->resultcode.status =
374 P80211ENUM_msgitem_status_data_ok;
375 ifstatemsg->resultcode.data = result;
376 result = 0;
378 break;
379 case DIDmsg_lnxreq_wlansniff:
380 pr_debug("Received mlme wlansniff request\n");
381 result = prism2mgmt_wlansniff(wlandev, msg);
382 break;
383 case DIDmsg_lnxreq_autojoin:
384 pr_debug("Received mlme autojoin request\n");
385 result = prism2mgmt_autojoin(wlandev, msg);
386 break;
387 case DIDmsg_lnxreq_commsquality:{
388 struct p80211msg_lnxreq_commsquality *qualmsg;
390 pr_debug("Received commsquality request\n");
392 qualmsg = (struct p80211msg_lnxreq_commsquality *) msg;
394 qualmsg->link.status =
395 P80211ENUM_msgitem_status_data_ok;
396 qualmsg->level.status =
397 P80211ENUM_msgitem_status_data_ok;
398 qualmsg->noise.status =
399 P80211ENUM_msgitem_status_data_ok;
401 qualmsg->link.data = le16_to_cpu(hw->qual.CQ_currBSS);
402 qualmsg->level.data = le16_to_cpu(hw->qual.ASL_currBSS);
403 qualmsg->noise.data = le16_to_cpu(hw->qual.ANL_currFC);
404 qualmsg->txrate.data = hw->txrate;
406 break;
408 default:
409 printk(KERN_WARNING "Unknown mgmt request message 0x%08x",
410 msg->msgcode);
411 break;
414 return result;
417 /*----------------------------------------------------------------
418 * prism2sta_ifstate
420 * Interface state. This is the primary WLAN interface enable/disable
421 * handler. Following the driver/load/deviceprobe sequence, this
422 * function must be called with a state of "enable" before any other
423 * commands will be accepted.
425 * Arguments:
426 * wlandev wlan device structure
427 * msgp ptr to msg buffer
429 * Returns:
430 * A p80211 message resultcode value.
432 * Side effects:
434 * Call context:
435 * process thread (usually)
436 * interrupt
437 ----------------------------------------------------------------*/
438 u32 prism2sta_ifstate(wlandevice_t *wlandev, u32 ifstate)
440 hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
441 u32 result;
443 result = P80211ENUM_resultcode_implementation_failure;
445 pr_debug("Current MSD state(%d), requesting(%d)\n",
446 wlandev->msdstate, ifstate);
447 switch (ifstate) {
448 case P80211ENUM_ifstate_fwload:
449 switch (wlandev->msdstate) {
450 case WLAN_MSD_HWPRESENT:
451 wlandev->msdstate = WLAN_MSD_FWLOAD_PENDING;
453 * Initialize the device+driver sufficiently
454 * for firmware loading.
456 result = hfa384x_drvr_start(hw);
457 if (result) {
458 printk(KERN_ERR
459 "hfa384x_drvr_start() failed,"
460 "result=%d\n", (int)result);
461 result =
462 P80211ENUM_resultcode_implementation_failure;
463 wlandev->msdstate = WLAN_MSD_HWPRESENT;
464 break;
466 wlandev->msdstate = WLAN_MSD_FWLOAD;
467 result = P80211ENUM_resultcode_success;
468 break;
469 case WLAN_MSD_FWLOAD:
470 hfa384x_cmd_initialize(hw);
471 result = P80211ENUM_resultcode_success;
472 break;
473 case WLAN_MSD_RUNNING:
474 printk(KERN_WARNING
475 "Cannot enter fwload state from enable state,"
476 "you must disable first.\n");
477 result = P80211ENUM_resultcode_invalid_parameters;
478 break;
479 case WLAN_MSD_HWFAIL:
480 default:
481 /* probe() had a problem or the msdstate contains
482 * an unrecognized value, there's nothing we can do.
484 result = P80211ENUM_resultcode_implementation_failure;
485 break;
487 break;
488 case P80211ENUM_ifstate_enable:
489 switch (wlandev->msdstate) {
490 case WLAN_MSD_HWPRESENT:
491 case WLAN_MSD_FWLOAD:
492 wlandev->msdstate = WLAN_MSD_RUNNING_PENDING;
493 /* Initialize the device+driver for full
494 * operation. Note that this might me an FWLOAD to
495 * to RUNNING transition so we must not do a chip
496 * or board level reset. Note that on failure,
497 * the MSD state is set to HWPRESENT because we
498 * can't make any assumptions about the state
499 * of the hardware or a previous firmware load.
501 result = hfa384x_drvr_start(hw);
502 if (result) {
503 printk(KERN_ERR
504 "hfa384x_drvr_start() failed,"
505 "result=%d\n", (int)result);
506 result =
507 P80211ENUM_resultcode_implementation_failure;
508 wlandev->msdstate = WLAN_MSD_HWPRESENT;
509 break;
512 result = prism2sta_getcardinfo(wlandev);
513 if (result) {
514 printk(KERN_ERR
515 "prism2sta_getcardinfo() failed,"
516 "result=%d\n", (int)result);
517 result =
518 P80211ENUM_resultcode_implementation_failure;
519 hfa384x_drvr_stop(hw);
520 wlandev->msdstate = WLAN_MSD_HWPRESENT;
521 break;
523 result = prism2sta_globalsetup(wlandev);
524 if (result) {
525 printk(KERN_ERR
526 "prism2sta_globalsetup() failed,"
527 "result=%d\n", (int)result);
528 result =
529 P80211ENUM_resultcode_implementation_failure;
530 hfa384x_drvr_stop(hw);
531 wlandev->msdstate = WLAN_MSD_HWPRESENT;
532 break;
534 wlandev->msdstate = WLAN_MSD_RUNNING;
535 hw->join_ap = 0;
536 hw->join_retries = 60;
537 result = P80211ENUM_resultcode_success;
538 break;
539 case WLAN_MSD_RUNNING:
540 /* Do nothing, we're already in this state. */
541 result = P80211ENUM_resultcode_success;
542 break;
543 case WLAN_MSD_HWFAIL:
544 default:
545 /* probe() had a problem or the msdstate contains
546 * an unrecognized value, there's nothing we can do.
548 result = P80211ENUM_resultcode_implementation_failure;
549 break;
551 break;
552 case P80211ENUM_ifstate_disable:
553 switch (wlandev->msdstate) {
554 case WLAN_MSD_HWPRESENT:
555 /* Do nothing, we're already in this state. */
556 result = P80211ENUM_resultcode_success;
557 break;
558 case WLAN_MSD_FWLOAD:
559 case WLAN_MSD_RUNNING:
560 wlandev->msdstate = WLAN_MSD_HWPRESENT_PENDING;
562 * TODO: Shut down the MAC completely. Here a chip
563 * or board level reset is probably called for.
564 * After a "disable" _all_ results are lost, even
565 * those from a fwload.
567 if (!wlandev->hwremoved)
568 netif_carrier_off(wlandev->netdev);
570 hfa384x_drvr_stop(hw);
572 wlandev->macmode = WLAN_MACMODE_NONE;
573 wlandev->msdstate = WLAN_MSD_HWPRESENT;
574 result = P80211ENUM_resultcode_success;
575 break;
576 case WLAN_MSD_HWFAIL:
577 default:
578 /* probe() had a problem or the msdstate contains
579 * an unrecognized value, there's nothing we can do.
581 result = P80211ENUM_resultcode_implementation_failure;
582 break;
584 break;
585 default:
586 result = P80211ENUM_resultcode_invalid_parameters;
587 break;
590 return result;
593 /*----------------------------------------------------------------
594 * prism2sta_getcardinfo
596 * Collect the NICID, firmware version and any other identifiers
597 * we'd like to have in host-side data structures.
599 * Arguments:
600 * wlandev wlan device structure
602 * Returns:
603 * 0 success
604 * >0 f/w reported error
605 * <0 driver reported error
607 * Side effects:
609 * Call context:
610 * Either.
611 ----------------------------------------------------------------*/
612 static int prism2sta_getcardinfo(wlandevice_t *wlandev)
614 int result = 0;
615 hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
616 u16 temp;
617 u8 snum[HFA384x_RID_NICSERIALNUMBER_LEN];
618 char pstr[(HFA384x_RID_NICSERIALNUMBER_LEN * 4) + 1];
620 /* Collect version and compatibility info */
621 /* Some are critical, some are not */
622 /* NIC identity */
623 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_NICIDENTITY,
624 &hw->ident_nic,
625 sizeof(hfa384x_compident_t));
626 if (result) {
627 printk(KERN_ERR "Failed to retrieve NICIDENTITY\n");
628 goto failed;
631 /* get all the nic id fields in host byte order */
632 hw->ident_nic.id = le16_to_cpu(hw->ident_nic.id);
633 hw->ident_nic.variant = le16_to_cpu(hw->ident_nic.variant);
634 hw->ident_nic.major = le16_to_cpu(hw->ident_nic.major);
635 hw->ident_nic.minor = le16_to_cpu(hw->ident_nic.minor);
637 printk(KERN_INFO "ident: nic h/w: id=0x%02x %d.%d.%d\n",
638 hw->ident_nic.id, hw->ident_nic.major,
639 hw->ident_nic.minor, hw->ident_nic.variant);
641 /* Primary f/w identity */
642 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_PRIIDENTITY,
643 &hw->ident_pri_fw,
644 sizeof(hfa384x_compident_t));
645 if (result) {
646 printk(KERN_ERR "Failed to retrieve PRIIDENTITY\n");
647 goto failed;
650 /* get all the private fw id fields in host byte order */
651 hw->ident_pri_fw.id = le16_to_cpu(hw->ident_pri_fw.id);
652 hw->ident_pri_fw.variant = le16_to_cpu(hw->ident_pri_fw.variant);
653 hw->ident_pri_fw.major = le16_to_cpu(hw->ident_pri_fw.major);
654 hw->ident_pri_fw.minor = le16_to_cpu(hw->ident_pri_fw.minor);
656 printk(KERN_INFO "ident: pri f/w: id=0x%02x %d.%d.%d\n",
657 hw->ident_pri_fw.id, hw->ident_pri_fw.major,
658 hw->ident_pri_fw.minor, hw->ident_pri_fw.variant);
660 /* Station (Secondary?) f/w identity */
661 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_STAIDENTITY,
662 &hw->ident_sta_fw,
663 sizeof(hfa384x_compident_t));
664 if (result) {
665 printk(KERN_ERR "Failed to retrieve STAIDENTITY\n");
666 goto failed;
669 if (hw->ident_nic.id < 0x8000) {
670 printk(KERN_ERR
671 "FATAL: Card is not an Intersil Prism2/2.5/3\n");
672 result = -1;
673 goto failed;
676 /* get all the station fw id fields in host byte order */
677 hw->ident_sta_fw.id = le16_to_cpu(hw->ident_sta_fw.id);
678 hw->ident_sta_fw.variant = le16_to_cpu(hw->ident_sta_fw.variant);
679 hw->ident_sta_fw.major = le16_to_cpu(hw->ident_sta_fw.major);
680 hw->ident_sta_fw.minor = le16_to_cpu(hw->ident_sta_fw.minor);
682 /* strip out the 'special' variant bits */
683 hw->mm_mods = hw->ident_sta_fw.variant & (BIT(14) | BIT(15));
684 hw->ident_sta_fw.variant &= ~((u16) (BIT(14) | BIT(15)));
686 if (hw->ident_sta_fw.id == 0x1f) {
687 printk(KERN_INFO
688 "ident: sta f/w: id=0x%02x %d.%d.%d\n",
689 hw->ident_sta_fw.id, hw->ident_sta_fw.major,
690 hw->ident_sta_fw.minor, hw->ident_sta_fw.variant);
691 } else {
692 printk(KERN_INFO
693 "ident: ap f/w: id=0x%02x %d.%d.%d\n",
694 hw->ident_sta_fw.id, hw->ident_sta_fw.major,
695 hw->ident_sta_fw.minor, hw->ident_sta_fw.variant);
696 printk(KERN_ERR "Unsupported Tertiary AP firmeare loaded!\n");
697 goto failed;
700 /* Compatibility range, Modem supplier */
701 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_MFISUPRANGE,
702 &hw->cap_sup_mfi,
703 sizeof(hfa384x_caplevel_t));
704 if (result) {
705 printk(KERN_ERR "Failed to retrieve MFISUPRANGE\n");
706 goto failed;
709 /* get all the Compatibility range, modem interface supplier
710 fields in byte order */
711 hw->cap_sup_mfi.role = le16_to_cpu(hw->cap_sup_mfi.role);
712 hw->cap_sup_mfi.id = le16_to_cpu(hw->cap_sup_mfi.id);
713 hw->cap_sup_mfi.variant = le16_to_cpu(hw->cap_sup_mfi.variant);
714 hw->cap_sup_mfi.bottom = le16_to_cpu(hw->cap_sup_mfi.bottom);
715 hw->cap_sup_mfi.top = le16_to_cpu(hw->cap_sup_mfi.top);
717 printk(KERN_INFO
718 "MFI:SUP:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n",
719 hw->cap_sup_mfi.role, hw->cap_sup_mfi.id,
720 hw->cap_sup_mfi.variant, hw->cap_sup_mfi.bottom,
721 hw->cap_sup_mfi.top);
723 /* Compatibility range, Controller supplier */
724 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_CFISUPRANGE,
725 &hw->cap_sup_cfi,
726 sizeof(hfa384x_caplevel_t));
727 if (result) {
728 printk(KERN_ERR "Failed to retrieve CFISUPRANGE\n");
729 goto failed;
732 /* get all the Compatibility range, controller interface supplier
733 fields in byte order */
734 hw->cap_sup_cfi.role = le16_to_cpu(hw->cap_sup_cfi.role);
735 hw->cap_sup_cfi.id = le16_to_cpu(hw->cap_sup_cfi.id);
736 hw->cap_sup_cfi.variant = le16_to_cpu(hw->cap_sup_cfi.variant);
737 hw->cap_sup_cfi.bottom = le16_to_cpu(hw->cap_sup_cfi.bottom);
738 hw->cap_sup_cfi.top = le16_to_cpu(hw->cap_sup_cfi.top);
740 printk(KERN_INFO
741 "CFI:SUP:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n",
742 hw->cap_sup_cfi.role, hw->cap_sup_cfi.id,
743 hw->cap_sup_cfi.variant, hw->cap_sup_cfi.bottom,
744 hw->cap_sup_cfi.top);
746 /* Compatibility range, Primary f/w supplier */
747 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_PRISUPRANGE,
748 &hw->cap_sup_pri,
749 sizeof(hfa384x_caplevel_t));
750 if (result) {
751 printk(KERN_ERR "Failed to retrieve PRISUPRANGE\n");
752 goto failed;
755 /* get all the Compatibility range, primary firmware supplier
756 fields in byte order */
757 hw->cap_sup_pri.role = le16_to_cpu(hw->cap_sup_pri.role);
758 hw->cap_sup_pri.id = le16_to_cpu(hw->cap_sup_pri.id);
759 hw->cap_sup_pri.variant = le16_to_cpu(hw->cap_sup_pri.variant);
760 hw->cap_sup_pri.bottom = le16_to_cpu(hw->cap_sup_pri.bottom);
761 hw->cap_sup_pri.top = le16_to_cpu(hw->cap_sup_pri.top);
763 printk(KERN_INFO
764 "PRI:SUP:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n",
765 hw->cap_sup_pri.role, hw->cap_sup_pri.id,
766 hw->cap_sup_pri.variant, hw->cap_sup_pri.bottom,
767 hw->cap_sup_pri.top);
769 /* Compatibility range, Station f/w supplier */
770 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_STASUPRANGE,
771 &hw->cap_sup_sta,
772 sizeof(hfa384x_caplevel_t));
773 if (result) {
774 printk(KERN_ERR "Failed to retrieve STASUPRANGE\n");
775 goto failed;
778 /* get all the Compatibility range, station firmware supplier
779 fields in byte order */
780 hw->cap_sup_sta.role = le16_to_cpu(hw->cap_sup_sta.role);
781 hw->cap_sup_sta.id = le16_to_cpu(hw->cap_sup_sta.id);
782 hw->cap_sup_sta.variant = le16_to_cpu(hw->cap_sup_sta.variant);
783 hw->cap_sup_sta.bottom = le16_to_cpu(hw->cap_sup_sta.bottom);
784 hw->cap_sup_sta.top = le16_to_cpu(hw->cap_sup_sta.top);
786 if (hw->cap_sup_sta.id == 0x04) {
787 printk(KERN_INFO
788 "STA:SUP:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n",
789 hw->cap_sup_sta.role, hw->cap_sup_sta.id,
790 hw->cap_sup_sta.variant, hw->cap_sup_sta.bottom,
791 hw->cap_sup_sta.top);
792 } else {
793 printk(KERN_INFO
794 "AP:SUP:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n",
795 hw->cap_sup_sta.role, hw->cap_sup_sta.id,
796 hw->cap_sup_sta.variant, hw->cap_sup_sta.bottom,
797 hw->cap_sup_sta.top);
800 /* Compatibility range, primary f/w actor, CFI supplier */
801 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_PRI_CFIACTRANGES,
802 &hw->cap_act_pri_cfi,
803 sizeof(hfa384x_caplevel_t));
804 if (result) {
805 printk(KERN_ERR "Failed to retrieve PRI_CFIACTRANGES\n");
806 goto failed;
809 /* get all the Compatibility range, primary f/w actor, CFI supplier
810 fields in byte order */
811 hw->cap_act_pri_cfi.role = le16_to_cpu(hw->cap_act_pri_cfi.role);
812 hw->cap_act_pri_cfi.id = le16_to_cpu(hw->cap_act_pri_cfi.id);
813 hw->cap_act_pri_cfi.variant = le16_to_cpu(hw->cap_act_pri_cfi.variant);
814 hw->cap_act_pri_cfi.bottom = le16_to_cpu(hw->cap_act_pri_cfi.bottom);
815 hw->cap_act_pri_cfi.top = le16_to_cpu(hw->cap_act_pri_cfi.top);
817 printk(KERN_INFO
818 "PRI-CFI:ACT:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n",
819 hw->cap_act_pri_cfi.role, hw->cap_act_pri_cfi.id,
820 hw->cap_act_pri_cfi.variant, hw->cap_act_pri_cfi.bottom,
821 hw->cap_act_pri_cfi.top);
823 /* Compatibility range, sta f/w actor, CFI supplier */
824 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_STA_CFIACTRANGES,
825 &hw->cap_act_sta_cfi,
826 sizeof(hfa384x_caplevel_t));
827 if (result) {
828 printk(KERN_ERR "Failed to retrieve STA_CFIACTRANGES\n");
829 goto failed;
832 /* get all the Compatibility range, station f/w actor, CFI supplier
833 fields in byte order */
834 hw->cap_act_sta_cfi.role = le16_to_cpu(hw->cap_act_sta_cfi.role);
835 hw->cap_act_sta_cfi.id = le16_to_cpu(hw->cap_act_sta_cfi.id);
836 hw->cap_act_sta_cfi.variant = le16_to_cpu(hw->cap_act_sta_cfi.variant);
837 hw->cap_act_sta_cfi.bottom = le16_to_cpu(hw->cap_act_sta_cfi.bottom);
838 hw->cap_act_sta_cfi.top = le16_to_cpu(hw->cap_act_sta_cfi.top);
840 printk(KERN_INFO
841 "STA-CFI:ACT:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n",
842 hw->cap_act_sta_cfi.role, hw->cap_act_sta_cfi.id,
843 hw->cap_act_sta_cfi.variant, hw->cap_act_sta_cfi.bottom,
844 hw->cap_act_sta_cfi.top);
846 /* Compatibility range, sta f/w actor, MFI supplier */
847 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_STA_MFIACTRANGES,
848 &hw->cap_act_sta_mfi,
849 sizeof(hfa384x_caplevel_t));
850 if (result) {
851 printk(KERN_ERR "Failed to retrieve STA_MFIACTRANGES\n");
852 goto failed;
855 /* get all the Compatibility range, station f/w actor, MFI supplier
856 fields in byte order */
857 hw->cap_act_sta_mfi.role = le16_to_cpu(hw->cap_act_sta_mfi.role);
858 hw->cap_act_sta_mfi.id = le16_to_cpu(hw->cap_act_sta_mfi.id);
859 hw->cap_act_sta_mfi.variant = le16_to_cpu(hw->cap_act_sta_mfi.variant);
860 hw->cap_act_sta_mfi.bottom = le16_to_cpu(hw->cap_act_sta_mfi.bottom);
861 hw->cap_act_sta_mfi.top = le16_to_cpu(hw->cap_act_sta_mfi.top);
863 printk(KERN_INFO
864 "STA-MFI:ACT:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n",
865 hw->cap_act_sta_mfi.role, hw->cap_act_sta_mfi.id,
866 hw->cap_act_sta_mfi.variant, hw->cap_act_sta_mfi.bottom,
867 hw->cap_act_sta_mfi.top);
869 /* Serial Number */
870 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_NICSERIALNUMBER,
871 snum, HFA384x_RID_NICSERIALNUMBER_LEN);
872 if (!result) {
873 wlan_mkprintstr(snum, HFA384x_RID_NICSERIALNUMBER_LEN,
874 pstr, sizeof(pstr));
875 printk(KERN_INFO "Prism2 card SN: %s\n", pstr);
876 } else {
877 printk(KERN_ERR "Failed to retrieve Prism2 Card SN\n");
878 goto failed;
881 /* Collect the MAC address */
882 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_CNFOWNMACADDR,
883 wlandev->netdev->dev_addr, ETH_ALEN);
884 if (result != 0) {
885 printk(KERN_ERR "Failed to retrieve mac address\n");
886 goto failed;
889 /* short preamble is always implemented */
890 wlandev->nsdcaps |= P80211_NSDCAP_SHORT_PREAMBLE;
892 /* find out if hardware wep is implemented */
893 hfa384x_drvr_getconfig16(hw, HFA384x_RID_PRIVACYOPTIMP, &temp);
894 if (temp)
895 wlandev->nsdcaps |= P80211_NSDCAP_HARDWAREWEP;
897 /* get the dBm Scaling constant */
898 hfa384x_drvr_getconfig16(hw, HFA384x_RID_CNFDBMADJUST, &temp);
899 hw->dbmadjust = temp;
901 /* Only enable scan by default on newer firmware */
902 if (HFA384x_FIRMWARE_VERSION(hw->ident_sta_fw.major,
903 hw->ident_sta_fw.minor,
904 hw->ident_sta_fw.variant) <
905 HFA384x_FIRMWARE_VERSION(1, 5, 5)) {
906 wlandev->nsdcaps |= P80211_NSDCAP_NOSCAN;
909 /* TODO: Set any internally managed config items */
911 goto done;
912 failed:
913 printk(KERN_ERR "Failed, result=%d\n", result);
914 done:
915 return result;
918 /*----------------------------------------------------------------
919 * prism2sta_globalsetup
921 * Set any global RIDs that we want to set at device activation.
923 * Arguments:
924 * wlandev wlan device structure
926 * Returns:
927 * 0 success
928 * >0 f/w reported error
929 * <0 driver reported error
931 * Side effects:
933 * Call context:
934 * process thread
935 ----------------------------------------------------------------*/
936 static int prism2sta_globalsetup(wlandevice_t *wlandev)
938 hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
940 /* Set the maximum frame size */
941 return hfa384x_drvr_setconfig16(hw, HFA384x_RID_CNFMAXDATALEN,
942 WLAN_DATA_MAXLEN);
945 static int prism2sta_setmulticast(wlandevice_t *wlandev, netdevice_t *dev)
947 int result = 0;
948 hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
950 u16 promisc;
952 /* If we're not ready, what's the point? */
953 if (hw->state != HFA384x_STATE_RUNNING)
954 goto exit;
956 if ((dev->flags & (IFF_PROMISC | IFF_ALLMULTI)) != 0)
957 promisc = P80211ENUM_truth_true;
958 else
959 promisc = P80211ENUM_truth_false;
961 result =
962 hfa384x_drvr_setconfig16_async(hw, HFA384x_RID_PROMISCMODE,
963 promisc);
964 exit:
965 return result;
968 /*----------------------------------------------------------------
969 * prism2sta_inf_handover
971 * Handles the receipt of a Handover info frame. Should only be present
972 * in APs only.
974 * Arguments:
975 * wlandev wlan device structure
976 * inf ptr to info frame (contents in hfa384x order)
978 * Returns:
979 * nothing
981 * Side effects:
983 * Call context:
984 * interrupt
985 ----------------------------------------------------------------*/
986 static void prism2sta_inf_handover(wlandevice_t *wlandev,
987 hfa384x_InfFrame_t *inf)
989 pr_debug("received infoframe:HANDOVER (unhandled)\n");
992 /*----------------------------------------------------------------
993 * prism2sta_inf_tallies
995 * Handles the receipt of a CommTallies info frame.
997 * Arguments:
998 * wlandev wlan device structure
999 * inf ptr to info frame (contents in hfa384x order)
1001 * Returns:
1002 * nothing
1004 * Side effects:
1006 * Call context:
1007 * interrupt
1008 ----------------------------------------------------------------*/
1009 static void prism2sta_inf_tallies(wlandevice_t *wlandev,
1010 hfa384x_InfFrame_t *inf)
1012 hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
1013 u16 *src16;
1014 u32 *dst;
1015 u32 *src32;
1016 int i;
1017 int cnt;
1020 ** Determine if these are 16-bit or 32-bit tallies, based on the
1021 ** record length of the info record.
1024 cnt = sizeof(hfa384x_CommTallies32_t) / sizeof(u32);
1025 if (inf->framelen > 22) {
1026 dst = (u32 *) &hw->tallies;
1027 src32 = (u32 *) &inf->info.commtallies32;
1028 for (i = 0; i < cnt; i++, dst++, src32++)
1029 *dst += le32_to_cpu(*src32);
1030 } else {
1031 dst = (u32 *) &hw->tallies;
1032 src16 = (u16 *) &inf->info.commtallies16;
1033 for (i = 0; i < cnt; i++, dst++, src16++)
1034 *dst += le16_to_cpu(*src16);
1038 /*----------------------------------------------------------------
1039 * prism2sta_inf_scanresults
1041 * Handles the receipt of a Scan Results info frame.
1043 * Arguments:
1044 * wlandev wlan device structure
1045 * inf ptr to info frame (contents in hfa384x order)
1047 * Returns:
1048 * nothing
1050 * Side effects:
1052 * Call context:
1053 * interrupt
1054 ----------------------------------------------------------------*/
1055 static void prism2sta_inf_scanresults(wlandevice_t *wlandev,
1056 hfa384x_InfFrame_t *inf)
1059 hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
1060 int nbss;
1061 hfa384x_ScanResult_t *sr = &(inf->info.scanresult);
1062 int i;
1063 hfa384x_JoinRequest_data_t joinreq;
1064 int result;
1066 /* Get the number of results, first in bytes, then in results */
1067 nbss = (inf->framelen * sizeof(u16)) -
1068 sizeof(inf->infotype) - sizeof(inf->info.scanresult.scanreason);
1069 nbss /= sizeof(hfa384x_ScanResultSub_t);
1071 /* Print em */
1072 pr_debug("rx scanresults, reason=%d, nbss=%d:\n",
1073 inf->info.scanresult.scanreason, nbss);
1074 for (i = 0; i < nbss; i++) {
1075 pr_debug("chid=%d anl=%d sl=%d bcnint=%d\n",
1076 sr->result[i].chid,
1077 sr->result[i].anl,
1078 sr->result[i].sl, sr->result[i].bcnint);
1079 pr_debug(" capinfo=0x%04x proberesp_rate=%d\n",
1080 sr->result[i].capinfo, sr->result[i].proberesp_rate);
1082 /* issue a join request */
1083 joinreq.channel = sr->result[0].chid;
1084 memcpy(joinreq.bssid, sr->result[0].bssid, WLAN_BSSID_LEN);
1085 result = hfa384x_drvr_setconfig(hw,
1086 HFA384x_RID_JOINREQUEST,
1087 &joinreq, HFA384x_RID_JOINREQUEST_LEN);
1088 if (result) {
1089 printk(KERN_ERR "setconfig(joinreq) failed, result=%d\n",
1090 result);
1094 /*----------------------------------------------------------------
1095 * prism2sta_inf_hostscanresults
1097 * Handles the receipt of a Scan Results info frame.
1099 * Arguments:
1100 * wlandev wlan device structure
1101 * inf ptr to info frame (contents in hfa384x order)
1103 * Returns:
1104 * nothing
1106 * Side effects:
1108 * Call context:
1109 * interrupt
1110 ----------------------------------------------------------------*/
1111 static void prism2sta_inf_hostscanresults(wlandevice_t *wlandev,
1112 hfa384x_InfFrame_t *inf)
1114 hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
1115 int nbss;
1117 nbss = (inf->framelen - 3) / 32;
1118 pr_debug("Received %d hostscan results\n", nbss);
1120 if (nbss > 32)
1121 nbss = 32;
1123 kfree(hw->scanresults);
1125 hw->scanresults = kmemdup(inf, sizeof(hfa384x_InfFrame_t), GFP_ATOMIC);
1127 if (nbss == 0)
1128 nbss = -1;
1130 /* Notify/wake the sleeping caller. */
1131 hw->scanflag = nbss;
1132 wake_up_interruptible(&hw->cmdq);
1135 /*----------------------------------------------------------------
1136 * prism2sta_inf_chinforesults
1138 * Handles the receipt of a Channel Info Results info frame.
1140 * Arguments:
1141 * wlandev wlan device structure
1142 * inf ptr to info frame (contents in hfa384x order)
1144 * Returns:
1145 * nothing
1147 * Side effects:
1149 * Call context:
1150 * interrupt
1151 ----------------------------------------------------------------*/
1152 static void prism2sta_inf_chinforesults(wlandevice_t *wlandev,
1153 hfa384x_InfFrame_t *inf)
1155 hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
1156 unsigned int i, n;
1158 hw->channel_info.results.scanchannels =
1159 le16_to_cpu(inf->info.chinforesult.scanchannels);
1161 for (i = 0, n = 0; i < HFA384x_CHINFORESULT_MAX; i++) {
1162 hfa384x_ChInfoResultSub_t *result;
1163 hfa384x_ChInfoResultSub_t *chinforesult;
1164 int chan;
1166 if (!(hw->channel_info.results.scanchannels & (1 << i)))
1167 continue;
1169 result = &inf->info.chinforesult.result[n];
1170 chan = le16_to_cpu(result->chid) - 1;
1172 if (chan < 0 || chan >= HFA384x_CHINFORESULT_MAX)
1173 continue;
1175 chinforesult = &hw->channel_info.results.result[chan];
1176 chinforesult->chid = chan;
1177 chinforesult->anl = le16_to_cpu(result->anl);
1178 chinforesult->pnl = le16_to_cpu(result->pnl);
1179 chinforesult->active = le16_to_cpu(result->active);
1181 pr_debug("chinfo: channel %d, %s level (avg/peak)=%d/%d dB, pcf %d\n",
1182 chan + 1,
1183 (chinforesult->active & HFA384x_CHINFORESULT_BSSACTIVE)
1184 ? "signal" : "noise",
1185 chinforesult->anl, chinforesult->pnl,
1186 (chinforesult->active & HFA384x_CHINFORESULT_PCFACTIVE)
1187 ? 1 : 0);
1188 n++;
1190 atomic_set(&hw->channel_info.done, 2);
1192 hw->channel_info.count = n;
1195 void prism2sta_processing_defer(struct work_struct *data)
1197 hfa384x_t *hw = container_of(data, struct hfa384x, link_bh);
1198 wlandevice_t *wlandev = hw->wlandev;
1199 hfa384x_bytestr32_t ssid;
1200 int result;
1202 /* First let's process the auth frames */
1204 struct sk_buff *skb;
1205 hfa384x_InfFrame_t *inf;
1207 while ((skb = skb_dequeue(&hw->authq))) {
1208 inf = (hfa384x_InfFrame_t *) skb->data;
1209 prism2sta_inf_authreq_defer(wlandev, inf);
1214 /* Now let's handle the linkstatus stuff */
1215 if (hw->link_status == hw->link_status_new)
1216 return;
1218 hw->link_status = hw->link_status_new;
1220 switch (hw->link_status) {
1221 case HFA384x_LINK_NOTCONNECTED:
1222 /* I'm currently assuming that this is the initial link
1223 * state. It should only be possible immediately
1224 * following an Enable command.
1225 * Response:
1226 * Block Transmits, Ignore receives of data frames
1228 netif_carrier_off(wlandev->netdev);
1230 printk(KERN_INFO "linkstatus=NOTCONNECTED (unhandled)\n");
1231 break;
1233 case HFA384x_LINK_CONNECTED:
1234 /* This one indicates a successful scan/join/auth/assoc.
1235 * When we have the full MLME complement, this event will
1236 * signify successful completion of both mlme_authenticate
1237 * and mlme_associate. State management will get a little
1238 * ugly here.
1239 * Response:
1240 * Indicate authentication and/or association
1241 * Enable Transmits, Receives and pass up data frames
1244 netif_carrier_on(wlandev->netdev);
1246 /* If we are joining a specific AP, set our
1247 * state and reset retries
1249 if (hw->join_ap == 1)
1250 hw->join_ap = 2;
1251 hw->join_retries = 60;
1253 /* Don't call this in monitor mode */
1254 if (wlandev->netdev->type == ARPHRD_ETHER) {
1255 u16 portstatus;
1257 printk(KERN_INFO "linkstatus=CONNECTED\n");
1259 /* For non-usb devices, we can use the sync versions */
1260 /* Collect the BSSID, and set state to allow tx */
1262 result = hfa384x_drvr_getconfig(hw,
1263 HFA384x_RID_CURRENTBSSID,
1264 wlandev->bssid,
1265 WLAN_BSSID_LEN);
1266 if (result) {
1267 pr_debug
1268 ("getconfig(0x%02x) failed, result = %d\n",
1269 HFA384x_RID_CURRENTBSSID, result);
1270 return;
1273 result = hfa384x_drvr_getconfig(hw,
1274 HFA384x_RID_CURRENTSSID,
1275 &ssid, sizeof(ssid));
1276 if (result) {
1277 pr_debug
1278 ("getconfig(0x%02x) failed, result = %d\n",
1279 HFA384x_RID_CURRENTSSID, result);
1280 return;
1282 prism2mgmt_bytestr2pstr((hfa384x_bytestr_t *) &ssid,
1283 (p80211pstrd_t *) &
1284 wlandev->ssid);
1286 /* Collect the port status */
1287 result = hfa384x_drvr_getconfig16(hw,
1288 HFA384x_RID_PORTSTATUS,
1289 &portstatus);
1290 if (result) {
1291 pr_debug
1292 ("getconfig(0x%02x) failed, result = %d\n",
1293 HFA384x_RID_PORTSTATUS, result);
1294 return;
1296 wlandev->macmode =
1297 (portstatus == HFA384x_PSTATUS_CONN_IBSS) ?
1298 WLAN_MACMODE_IBSS_STA : WLAN_MACMODE_ESS_STA;
1300 /* signal back up to cfg80211 layer */
1301 prism2_connect_result(wlandev, P80211ENUM_truth_false);
1303 /* Get the ball rolling on the comms quality stuff */
1304 prism2sta_commsqual_defer(&hw->commsqual_bh);
1306 break;
1308 case HFA384x_LINK_DISCONNECTED:
1309 /* This one indicates that our association is gone. We've
1310 * lost connection with the AP and/or been disassociated.
1311 * This indicates that the MAC has completely cleared it's
1312 * associated state. We * should send a deauth indication
1313 * (implying disassoc) up * to the MLME.
1314 * Response:
1315 * Indicate Deauthentication
1316 * Block Transmits, Ignore receives of data frames
1318 if (wlandev->netdev->type == ARPHRD_ETHER)
1319 printk(KERN_INFO
1320 "linkstatus=DISCONNECTED (unhandled)\n");
1321 wlandev->macmode = WLAN_MACMODE_NONE;
1323 netif_carrier_off(wlandev->netdev);
1325 /* signal back up to cfg80211 layer */
1326 prism2_disconnected(wlandev);
1328 break;
1330 case HFA384x_LINK_AP_CHANGE:
1331 /* This one indicates that the MAC has decided to and
1332 * successfully completed a change to another AP. We
1333 * should probably implement a reassociation indication
1334 * in response to this one. I'm thinking that the the
1335 * p80211 layer needs to be notified in case of
1336 * buffering/queueing issues. User mode also needs to be
1337 * notified so that any BSS dependent elements can be
1338 * updated.
1339 * associated state. We * should send a deauth indication
1340 * (implying disassoc) up * to the MLME.
1341 * Response:
1342 * Indicate Reassociation
1343 * Enable Transmits, Receives and pass up data frames
1345 printk(KERN_INFO "linkstatus=AP_CHANGE\n");
1347 result = hfa384x_drvr_getconfig(hw,
1348 HFA384x_RID_CURRENTBSSID,
1349 wlandev->bssid, WLAN_BSSID_LEN);
1350 if (result) {
1351 pr_debug("getconfig(0x%02x) failed, result = %d\n",
1352 HFA384x_RID_CURRENTBSSID, result);
1353 return;
1356 result = hfa384x_drvr_getconfig(hw,
1357 HFA384x_RID_CURRENTSSID,
1358 &ssid, sizeof(ssid));
1359 if (result) {
1360 pr_debug("getconfig(0x%02x) failed, result = %d\n",
1361 HFA384x_RID_CURRENTSSID, result);
1362 return;
1364 prism2mgmt_bytestr2pstr((hfa384x_bytestr_t *) &ssid,
1365 (p80211pstrd_t *) &wlandev->ssid);
1367 hw->link_status = HFA384x_LINK_CONNECTED;
1368 netif_carrier_on(wlandev->netdev);
1370 /* signal back up to cfg80211 layer */
1371 prism2_roamed(wlandev);
1373 break;
1375 case HFA384x_LINK_AP_OUTOFRANGE:
1376 /* This one indicates that the MAC has decided that the
1377 * AP is out of range, but hasn't found a better candidate
1378 * so the MAC maintains its "associated" state in case
1379 * we get back in range. We should block transmits and
1380 * receives in this state. Do we need an indication here?
1381 * Probably not since a polling user-mode element would
1382 * get this status from from p2PortStatus(FD40). What about
1383 * p80211?
1384 * Response:
1385 * Block Transmits, Ignore receives of data frames
1387 printk(KERN_INFO "linkstatus=AP_OUTOFRANGE (unhandled)\n");
1389 netif_carrier_off(wlandev->netdev);
1391 break;
1393 case HFA384x_LINK_AP_INRANGE:
1394 /* This one indicates that the MAC has decided that the
1395 * AP is back in range. We continue working with our
1396 * existing association.
1397 * Response:
1398 * Enable Transmits, Receives and pass up data frames
1400 printk(KERN_INFO "linkstatus=AP_INRANGE\n");
1402 hw->link_status = HFA384x_LINK_CONNECTED;
1403 netif_carrier_on(wlandev->netdev);
1405 break;
1407 case HFA384x_LINK_ASSOCFAIL:
1408 /* This one is actually a peer to CONNECTED. We've
1409 * requested a join for a given SSID and optionally BSSID.
1410 * We can use this one to indicate authentication and
1411 * association failures. The trick is going to be
1412 * 1) identifying the failure, and 2) state management.
1413 * Response:
1414 * Disable Transmits, Ignore receives of data frames
1416 if (hw->join_ap && --hw->join_retries > 0) {
1417 hfa384x_JoinRequest_data_t joinreq;
1418 joinreq = hw->joinreq;
1419 /* Send the join request */
1420 hfa384x_drvr_setconfig(hw,
1421 HFA384x_RID_JOINREQUEST,
1422 &joinreq,
1423 HFA384x_RID_JOINREQUEST_LEN);
1424 printk(KERN_INFO
1425 "linkstatus=ASSOCFAIL (re-submitting join)\n");
1426 } else {
1427 printk(KERN_INFO "linkstatus=ASSOCFAIL (unhandled)\n");
1430 netif_carrier_off(wlandev->netdev);
1432 /* signal back up to cfg80211 layer */
1433 prism2_connect_result(wlandev, P80211ENUM_truth_true);
1435 break;
1437 default:
1438 /* This is bad, IO port problems? */
1439 printk(KERN_WARNING
1440 "unknown linkstatus=0x%02x\n", hw->link_status);
1441 return;
1444 wlandev->linkstatus = (hw->link_status == HFA384x_LINK_CONNECTED);
1447 /*----------------------------------------------------------------
1448 * prism2sta_inf_linkstatus
1450 * Handles the receipt of a Link Status info frame.
1452 * Arguments:
1453 * wlandev wlan device structure
1454 * inf ptr to info frame (contents in hfa384x order)
1456 * Returns:
1457 * nothing
1459 * Side effects:
1461 * Call context:
1462 * interrupt
1463 ----------------------------------------------------------------*/
1464 static void prism2sta_inf_linkstatus(wlandevice_t *wlandev,
1465 hfa384x_InfFrame_t *inf)
1467 hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
1469 hw->link_status_new = le16_to_cpu(inf->info.linkstatus.linkstatus);
1471 schedule_work(&hw->link_bh);
1474 /*----------------------------------------------------------------
1475 * prism2sta_inf_assocstatus
1477 * Handles the receipt of an Association Status info frame. Should
1478 * be present in APs only.
1480 * Arguments:
1481 * wlandev wlan device structure
1482 * inf ptr to info frame (contents in hfa384x order)
1484 * Returns:
1485 * nothing
1487 * Side effects:
1489 * Call context:
1490 * interrupt
1491 ----------------------------------------------------------------*/
1492 static void prism2sta_inf_assocstatus(wlandevice_t *wlandev,
1493 hfa384x_InfFrame_t *inf)
1495 hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
1496 hfa384x_AssocStatus_t rec;
1497 int i;
1499 memcpy(&rec, &inf->info.assocstatus, sizeof(rec));
1500 rec.assocstatus = le16_to_cpu(rec.assocstatus);
1501 rec.reason = le16_to_cpu(rec.reason);
1504 ** Find the address in the list of authenticated stations.
1505 ** If it wasn't found, then this address has not been previously
1506 ** authenticated and something weird has happened if this is
1507 ** anything other than an "authentication failed" message.
1508 ** If the address was found, then set the "associated" flag for
1509 ** that station, based on whether the station is associating or
1510 ** losing its association. Something weird has also happened
1511 ** if we find the address in the list of authenticated stations
1512 ** but we are getting an "authentication failed" message.
1515 for (i = 0; i < hw->authlist.cnt; i++)
1516 if (memcmp(rec.sta_addr, hw->authlist.addr[i], ETH_ALEN) == 0)
1517 break;
1519 if (i >= hw->authlist.cnt) {
1520 if (rec.assocstatus != HFA384x_ASSOCSTATUS_AUTHFAIL)
1521 printk(KERN_WARNING
1522 "assocstatus info frame received for non-authenticated station.\n");
1523 } else {
1524 hw->authlist.assoc[i] =
1525 (rec.assocstatus == HFA384x_ASSOCSTATUS_STAASSOC ||
1526 rec.assocstatus == HFA384x_ASSOCSTATUS_REASSOC);
1528 if (rec.assocstatus == HFA384x_ASSOCSTATUS_AUTHFAIL)
1529 printk(KERN_WARNING
1530 "authfail assocstatus info frame received for authenticated station.\n");
1534 /*----------------------------------------------------------------
1535 * prism2sta_inf_authreq
1537 * Handles the receipt of an Authentication Request info frame. Should
1538 * be present in APs only.
1540 * Arguments:
1541 * wlandev wlan device structure
1542 * inf ptr to info frame (contents in hfa384x order)
1544 * Returns:
1545 * nothing
1547 * Side effects:
1549 * Call context:
1550 * interrupt
1552 ----------------------------------------------------------------*/
1553 static void prism2sta_inf_authreq(wlandevice_t *wlandev,
1554 hfa384x_InfFrame_t *inf)
1556 hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
1557 struct sk_buff *skb;
1559 skb = dev_alloc_skb(sizeof(*inf));
1560 if (skb) {
1561 skb_put(skb, sizeof(*inf));
1562 memcpy(skb->data, inf, sizeof(*inf));
1563 skb_queue_tail(&hw->authq, skb);
1564 schedule_work(&hw->link_bh);
1568 static void prism2sta_inf_authreq_defer(wlandevice_t *wlandev,
1569 hfa384x_InfFrame_t *inf)
1571 hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
1572 hfa384x_authenticateStation_data_t rec;
1574 int i, added, result, cnt;
1575 u8 *addr;
1578 ** Build the AuthenticateStation record. Initialize it for denying
1579 ** authentication.
1582 memcpy(rec.address, inf->info.authreq.sta_addr, ETH_ALEN);
1583 rec.status = P80211ENUM_status_unspec_failure;
1586 ** Authenticate based on the access mode.
1589 switch (hw->accessmode) {
1590 case WLAN_ACCESS_NONE:
1593 ** Deny all new authentications. However, if a station
1594 ** is ALREADY authenticated, then accept it.
1597 for (i = 0; i < hw->authlist.cnt; i++)
1598 if (memcmp(rec.address, hw->authlist.addr[i],
1599 ETH_ALEN) == 0) {
1600 rec.status = P80211ENUM_status_successful;
1601 break;
1604 break;
1606 case WLAN_ACCESS_ALL:
1609 ** Allow all authentications.
1612 rec.status = P80211ENUM_status_successful;
1613 break;
1615 case WLAN_ACCESS_ALLOW:
1618 ** Only allow the authentication if the MAC address
1619 ** is in the list of allowed addresses.
1621 ** Since this is the interrupt handler, we may be here
1622 ** while the access list is in the middle of being
1623 ** updated. Choose the list which is currently okay.
1624 ** See "prism2mib_priv_accessallow()" for details.
1627 if (hw->allow.modify == 0) {
1628 cnt = hw->allow.cnt;
1629 addr = hw->allow.addr[0];
1630 } else {
1631 cnt = hw->allow.cnt1;
1632 addr = hw->allow.addr1[0];
1635 for (i = 0; i < cnt; i++, addr += ETH_ALEN)
1636 if (memcmp(rec.address, addr, ETH_ALEN) == 0) {
1637 rec.status = P80211ENUM_status_successful;
1638 break;
1641 break;
1643 case WLAN_ACCESS_DENY:
1646 ** Allow the authentication UNLESS the MAC address is
1647 ** in the list of denied addresses.
1649 ** Since this is the interrupt handler, we may be here
1650 ** while the access list is in the middle of being
1651 ** updated. Choose the list which is currently okay.
1652 ** See "prism2mib_priv_accessdeny()" for details.
1655 if (hw->deny.modify == 0) {
1656 cnt = hw->deny.cnt;
1657 addr = hw->deny.addr[0];
1658 } else {
1659 cnt = hw->deny.cnt1;
1660 addr = hw->deny.addr1[0];
1663 rec.status = P80211ENUM_status_successful;
1665 for (i = 0; i < cnt; i++, addr += ETH_ALEN)
1666 if (memcmp(rec.address, addr, ETH_ALEN) == 0) {
1667 rec.status = P80211ENUM_status_unspec_failure;
1668 break;
1671 break;
1675 ** If the authentication is okay, then add the MAC address to the
1676 ** list of authenticated stations. Don't add the address if it
1677 ** is already in the list. (802.11b does not seem to disallow
1678 ** a station from issuing an authentication request when the
1679 ** station is already authenticated. Does this sort of thing
1680 ** ever happen? We might as well do the check just in case.)
1683 added = 0;
1685 if (rec.status == P80211ENUM_status_successful) {
1686 for (i = 0; i < hw->authlist.cnt; i++)
1687 if (memcmp(rec.address, hw->authlist.addr[i], ETH_ALEN)
1688 == 0)
1689 break;
1691 if (i >= hw->authlist.cnt) {
1692 if (hw->authlist.cnt >= WLAN_AUTH_MAX) {
1693 rec.status = P80211ENUM_status_ap_full;
1694 } else {
1695 memcpy(hw->authlist.addr[hw->authlist.cnt],
1696 rec.address, ETH_ALEN);
1697 hw->authlist.cnt++;
1698 added = 1;
1704 ** Send back the results of the authentication. If this doesn't work,
1705 ** then make sure to remove the address from the authenticated list if
1706 ** it was added.
1709 rec.status = cpu_to_le16(rec.status);
1710 rec.algorithm = inf->info.authreq.algorithm;
1712 result = hfa384x_drvr_setconfig(hw, HFA384x_RID_AUTHENTICATESTA,
1713 &rec, sizeof(rec));
1714 if (result) {
1715 if (added)
1716 hw->authlist.cnt--;
1717 printk(KERN_ERR
1718 "setconfig(authenticatestation) failed, result=%d\n",
1719 result);
1723 /*----------------------------------------------------------------
1724 * prism2sta_inf_psusercnt
1726 * Handles the receipt of a PowerSaveUserCount info frame. Should
1727 * be present in APs only.
1729 * Arguments:
1730 * wlandev wlan device structure
1731 * inf ptr to info frame (contents in hfa384x order)
1733 * Returns:
1734 * nothing
1736 * Side effects:
1738 * Call context:
1739 * interrupt
1740 ----------------------------------------------------------------*/
1741 static void prism2sta_inf_psusercnt(wlandevice_t *wlandev,
1742 hfa384x_InfFrame_t *inf)
1744 hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
1746 hw->psusercount = le16_to_cpu(inf->info.psusercnt.usercnt);
1749 /*----------------------------------------------------------------
1750 * prism2sta_ev_info
1752 * Handles the Info event.
1754 * Arguments:
1755 * wlandev wlan device structure
1756 * inf ptr to a generic info frame
1758 * Returns:
1759 * nothing
1761 * Side effects:
1763 * Call context:
1764 * interrupt
1765 ----------------------------------------------------------------*/
1766 void prism2sta_ev_info(wlandevice_t *wlandev, hfa384x_InfFrame_t *inf)
1768 inf->infotype = le16_to_cpu(inf->infotype);
1769 /* Dispatch */
1770 switch (inf->infotype) {
1771 case HFA384x_IT_HANDOVERADDR:
1772 prism2sta_inf_handover(wlandev, inf);
1773 break;
1774 case HFA384x_IT_COMMTALLIES:
1775 prism2sta_inf_tallies(wlandev, inf);
1776 break;
1777 case HFA384x_IT_HOSTSCANRESULTS:
1778 prism2sta_inf_hostscanresults(wlandev, inf);
1779 break;
1780 case HFA384x_IT_SCANRESULTS:
1781 prism2sta_inf_scanresults(wlandev, inf);
1782 break;
1783 case HFA384x_IT_CHINFORESULTS:
1784 prism2sta_inf_chinforesults(wlandev, inf);
1785 break;
1786 case HFA384x_IT_LINKSTATUS:
1787 prism2sta_inf_linkstatus(wlandev, inf);
1788 break;
1789 case HFA384x_IT_ASSOCSTATUS:
1790 prism2sta_inf_assocstatus(wlandev, inf);
1791 break;
1792 case HFA384x_IT_AUTHREQ:
1793 prism2sta_inf_authreq(wlandev, inf);
1794 break;
1795 case HFA384x_IT_PSUSERCNT:
1796 prism2sta_inf_psusercnt(wlandev, inf);
1797 break;
1798 case HFA384x_IT_KEYIDCHANGED:
1799 printk(KERN_WARNING "Unhandled IT_KEYIDCHANGED\n");
1800 break;
1801 case HFA384x_IT_ASSOCREQ:
1802 printk(KERN_WARNING "Unhandled IT_ASSOCREQ\n");
1803 break;
1804 case HFA384x_IT_MICFAILURE:
1805 printk(KERN_WARNING "Unhandled IT_MICFAILURE\n");
1806 break;
1807 default:
1808 printk(KERN_WARNING
1809 "Unknown info type=0x%02x\n", inf->infotype);
1810 break;
1814 /*----------------------------------------------------------------
1815 * prism2sta_ev_txexc
1817 * Handles the TxExc event. A Transmit Exception event indicates
1818 * that the MAC's TX process was unsuccessful - so the packet did
1819 * not get transmitted.
1821 * Arguments:
1822 * wlandev wlan device structure
1823 * status tx frame status word
1825 * Returns:
1826 * nothing
1828 * Side effects:
1830 * Call context:
1831 * interrupt
1832 ----------------------------------------------------------------*/
1833 void prism2sta_ev_txexc(wlandevice_t *wlandev, u16 status)
1835 pr_debug("TxExc status=0x%x.\n", status);
1838 /*----------------------------------------------------------------
1839 * prism2sta_ev_tx
1841 * Handles the Tx event.
1843 * Arguments:
1844 * wlandev wlan device structure
1845 * status tx frame status word
1846 * Returns:
1847 * nothing
1849 * Side effects:
1851 * Call context:
1852 * interrupt
1853 ----------------------------------------------------------------*/
1854 void prism2sta_ev_tx(wlandevice_t *wlandev, u16 status)
1856 pr_debug("Tx Complete, status=0x%04x\n", status);
1857 /* update linux network stats */
1858 wlandev->linux_stats.tx_packets++;
1861 /*----------------------------------------------------------------
1862 * prism2sta_ev_rx
1864 * Handles the Rx event.
1866 * Arguments:
1867 * wlandev wlan device structure
1869 * Returns:
1870 * nothing
1872 * Side effects:
1874 * Call context:
1875 * interrupt
1876 ----------------------------------------------------------------*/
1877 void prism2sta_ev_rx(wlandevice_t *wlandev, struct sk_buff *skb)
1879 p80211netdev_rx(wlandev, skb);
1882 /*----------------------------------------------------------------
1883 * prism2sta_ev_alloc
1885 * Handles the Alloc event.
1887 * Arguments:
1888 * wlandev wlan device structure
1890 * Returns:
1891 * nothing
1893 * Side effects:
1895 * Call context:
1896 * interrupt
1897 ----------------------------------------------------------------*/
1898 void prism2sta_ev_alloc(wlandevice_t *wlandev)
1900 netif_wake_queue(wlandev->netdev);
1903 /*----------------------------------------------------------------
1904 * create_wlan
1906 * Called at module init time. This creates the wlandevice_t structure
1907 * and initializes it with relevant bits.
1909 * Arguments:
1910 * none
1912 * Returns:
1913 * the created wlandevice_t structure.
1915 * Side effects:
1916 * also allocates the priv/hw structures.
1918 * Call context:
1919 * process thread
1921 ----------------------------------------------------------------*/
1922 static wlandevice_t *create_wlan(void)
1924 wlandevice_t *wlandev = NULL;
1925 hfa384x_t *hw = NULL;
1927 /* Alloc our structures */
1928 wlandev = kzalloc(sizeof(wlandevice_t), GFP_KERNEL);
1929 hw = kzalloc(sizeof(hfa384x_t), GFP_KERNEL);
1931 if (!wlandev || !hw) {
1932 printk(KERN_ERR "%s: Memory allocation failure.\n", dev_info);
1933 kfree(wlandev);
1934 kfree(hw);
1935 return NULL;
1938 /* Initialize the network device object. */
1939 wlandev->nsdname = dev_info;
1940 wlandev->msdstate = WLAN_MSD_HWPRESENT_PENDING;
1941 wlandev->priv = hw;
1942 wlandev->open = prism2sta_open;
1943 wlandev->close = prism2sta_close;
1944 wlandev->reset = prism2sta_reset;
1945 wlandev->txframe = prism2sta_txframe;
1946 wlandev->mlmerequest = prism2sta_mlmerequest;
1947 wlandev->set_multicast_list = prism2sta_setmulticast;
1948 wlandev->tx_timeout = hfa384x_tx_timeout;
1950 wlandev->nsdcaps = P80211_NSDCAP_HWFRAGMENT | P80211_NSDCAP_AUTOJOIN;
1952 /* Initialize the device private data structure. */
1953 hw->dot11_desired_bss_type = 1;
1955 return wlandev;
1958 void prism2sta_commsqual_defer(struct work_struct *data)
1960 hfa384x_t *hw = container_of(data, struct hfa384x, commsqual_bh);
1961 wlandevice_t *wlandev = hw->wlandev;
1962 hfa384x_bytestr32_t ssid;
1963 struct p80211msg_dot11req_mibget msg;
1964 p80211item_uint32_t *mibitem = (p80211item_uint32_t *)
1965 &msg.mibattribute.data;
1966 int result = 0;
1968 if (hw->wlandev->hwremoved)
1969 return;
1971 /* we don't care if we're in AP mode */
1972 if ((wlandev->macmode == WLAN_MACMODE_NONE) ||
1973 (wlandev->macmode == WLAN_MACMODE_ESS_AP)) {
1974 return;
1977 /* It only makes sense to poll these in non-IBSS */
1978 if (wlandev->macmode != WLAN_MACMODE_IBSS_STA) {
1979 result = hfa384x_drvr_getconfig(
1980 hw, HFA384x_RID_DBMCOMMSQUALITY,
1981 &hw->qual, HFA384x_RID_DBMCOMMSQUALITY_LEN);
1983 if (result) {
1984 printk(KERN_ERR "error fetching commsqual\n");
1985 return;
1988 pr_debug("commsqual %d %d %d\n",
1989 le16_to_cpu(hw->qual.CQ_currBSS),
1990 le16_to_cpu(hw->qual.ASL_currBSS),
1991 le16_to_cpu(hw->qual.ANL_currFC));
1994 /* Get the signal rate */
1995 msg.msgcode = DIDmsg_dot11req_mibget;
1996 mibitem->did = DIDmib_p2_p2MAC_p2CurrentTxRate;
1997 result = p80211req_dorequest(wlandev, (u8 *) &msg);
1999 if (result) {
2000 pr_debug("get signal rate failed, result = %d\n",
2001 result);
2002 return;
2005 switch (mibitem->data) {
2006 case HFA384x_RATEBIT_1:
2007 hw->txrate = 10;
2008 break;
2009 case HFA384x_RATEBIT_2:
2010 hw->txrate = 20;
2011 break;
2012 case HFA384x_RATEBIT_5dot5:
2013 hw->txrate = 55;
2014 break;
2015 case HFA384x_RATEBIT_11:
2016 hw->txrate = 110;
2017 break;
2018 default:
2019 pr_debug("Bad ratebit (%d)\n", mibitem->data);
2022 /* Lastly, we need to make sure the BSSID didn't change on us */
2023 result = hfa384x_drvr_getconfig(hw,
2024 HFA384x_RID_CURRENTBSSID,
2025 wlandev->bssid, WLAN_BSSID_LEN);
2026 if (result) {
2027 pr_debug("getconfig(0x%02x) failed, result = %d\n",
2028 HFA384x_RID_CURRENTBSSID, result);
2029 return;
2032 result = hfa384x_drvr_getconfig(hw,
2033 HFA384x_RID_CURRENTSSID,
2034 &ssid, sizeof(ssid));
2035 if (result) {
2036 pr_debug("getconfig(0x%02x) failed, result = %d\n",
2037 HFA384x_RID_CURRENTSSID, result);
2038 return;
2040 prism2mgmt_bytestr2pstr((hfa384x_bytestr_t *) &ssid,
2041 (p80211pstrd_t *) &wlandev->ssid);
2043 /* Reschedule timer */
2044 mod_timer(&hw->commsqual_timer, jiffies + HZ);
2047 void prism2sta_commsqual_timer(unsigned long data)
2049 hfa384x_t *hw = (hfa384x_t *) data;
2051 schedule_work(&hw->commsqual_bh);