i2c-eg20t: change timeout value 50msec to 1000msec
[zen-stable.git] / drivers / staging / wlan-ng / prism2sta.c
blob417aea5e01cd6b08fac4f235b8443d55678d6e9b
1 /* src/prism2/driver/prism2sta.c
3 * Implements the station functionality for prism2
5 * Copyright (C) 1999 AbsoluteValue Systems, Inc. All Rights Reserved.
6 * --------------------------------------------------------------------
8 * linux-wlan
10 * The contents of this file are subject to the Mozilla Public
11 * License Version 1.1 (the "License"); you may not use this file
12 * except in compliance with the License. You may obtain a copy of
13 * the License at http://www.mozilla.org/MPL/
15 * Software distributed under the License is distributed on an "AS
16 * IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or
17 * implied. See the License for the specific language governing
18 * rights and limitations under the License.
20 * Alternatively, the contents of this file may be used under the
21 * terms of the GNU Public License version 2 (the "GPL"), in which
22 * case the provisions of the GPL are applicable instead of the
23 * above. If you wish to allow the use of your version of this file
24 * only under the terms of the GPL and not to allow others to use
25 * your version of this file under the MPL, indicate your decision
26 * by deleting the provisions above and replace them with the notice
27 * and other provisions required by the GPL. If you do not delete
28 * the provisions above, a recipient may use your version of this
29 * file under either the MPL or the GPL.
31 * --------------------------------------------------------------------
33 * Inquiries regarding the linux-wlan Open Source project can be
34 * made directly to:
36 * AbsoluteValue Systems Inc.
37 * info@linux-wlan.com
38 * http://www.linux-wlan.com
40 * --------------------------------------------------------------------
42 * Portions of the development of this software were funded by
43 * Intersil Corporation as part of PRISM(R) chipset product development.
45 * --------------------------------------------------------------------
47 * This file implements the module and linux pcmcia routines for the
48 * prism2 driver.
50 * --------------------------------------------------------------------
53 #include <linux/module.h>
54 #include <linux/moduleparam.h>
55 #include <linux/kernel.h>
56 #include <linux/sched.h>
57 #include <linux/types.h>
58 #include <linux/init.h>
59 #include <linux/slab.h>
60 #include <linux/wireless.h>
61 #include <linux/netdevice.h>
62 #include <linux/workqueue.h>
63 #include <linux/byteorder/generic.h>
64 #include <linux/ctype.h>
66 #include <linux/io.h>
67 #include <linux/delay.h>
68 #include <asm/byteorder.h>
69 #include <linux/if_arp.h>
70 #include <linux/if_ether.h>
71 #include <linux/bitops.h>
73 #include "p80211types.h"
74 #include "p80211hdr.h"
75 #include "p80211mgmt.h"
76 #include "p80211conv.h"
77 #include "p80211msg.h"
78 #include "p80211netdev.h"
79 #include "p80211req.h"
80 #include "p80211metadef.h"
81 #include "p80211metastruct.h"
82 #include "hfa384x.h"
83 #include "prism2mgmt.h"
85 /* Create a string of printable chars from something that might not be */
86 /* It's recommended that the str be 4*len + 1 bytes long */
87 #define wlan_mkprintstr(buf, buflen, str, strlen) \
88 { \
89 int i = 0; \
90 int j = 0; \
91 memset(str, 0, (strlen)); \
92 for (i = 0; i < (buflen); i++) { \
93 if (isprint((buf)[i])) { \
94 (str)[j] = (buf)[i]; \
95 j++; \
96 } else { \
97 (str)[j] = '\\'; \
98 (str)[j+1] = 'x'; \
99 (str)[j+2] = hex_asc_hi((buf)[i]); \
100 (str)[j+3] = hex_asc_lo((buf)[i]); \
101 j += 4; \
106 static char *dev_info = "prism2_usb";
107 static wlandevice_t *create_wlan(void);
109 int prism2_reset_holdtime = 30; /* Reset hold time in ms */
110 int prism2_reset_settletime = 100; /* Reset settle time in ms */
112 static int prism2_doreset; /* Do a reset at init? */
114 module_param(prism2_doreset, int, 0644);
115 MODULE_PARM_DESC(prism2_doreset, "Issue a reset on initialization");
117 module_param(prism2_reset_holdtime, int, 0644);
118 MODULE_PARM_DESC(prism2_reset_holdtime, "reset hold time in ms");
119 module_param(prism2_reset_settletime, int, 0644);
120 MODULE_PARM_DESC(prism2_reset_settletime, "reset settle time in ms");
122 MODULE_LICENSE("Dual MPL/GPL");
124 void prism2_connect_result(wlandevice_t *wlandev, u8 failed);
125 void prism2_disconnected(wlandevice_t *wlandev);
126 void prism2_roamed(wlandevice_t *wlandev);
128 static int prism2sta_open(wlandevice_t *wlandev);
129 static int prism2sta_close(wlandevice_t *wlandev);
130 static void prism2sta_reset(wlandevice_t *wlandev);
131 static int prism2sta_txframe(wlandevice_t *wlandev, struct sk_buff *skb,
132 union p80211_hdr *p80211_hdr,
133 struct p80211_metawep *p80211_wep);
134 static int prism2sta_mlmerequest(wlandevice_t *wlandev, struct p80211msg *msg);
135 static int prism2sta_getcardinfo(wlandevice_t *wlandev);
136 static int prism2sta_globalsetup(wlandevice_t *wlandev);
137 static int prism2sta_setmulticast(wlandevice_t *wlandev, netdevice_t *dev);
139 static void prism2sta_inf_handover(wlandevice_t *wlandev,
140 hfa384x_InfFrame_t *inf);
141 static void prism2sta_inf_tallies(wlandevice_t *wlandev,
142 hfa384x_InfFrame_t *inf);
143 static void prism2sta_inf_hostscanresults(wlandevice_t *wlandev,
144 hfa384x_InfFrame_t *inf);
145 static void prism2sta_inf_scanresults(wlandevice_t *wlandev,
146 hfa384x_InfFrame_t *inf);
147 static void prism2sta_inf_chinforesults(wlandevice_t *wlandev,
148 hfa384x_InfFrame_t *inf);
149 static void prism2sta_inf_linkstatus(wlandevice_t *wlandev,
150 hfa384x_InfFrame_t *inf);
151 static void prism2sta_inf_assocstatus(wlandevice_t *wlandev,
152 hfa384x_InfFrame_t *inf);
153 static void prism2sta_inf_authreq(wlandevice_t *wlandev,
154 hfa384x_InfFrame_t *inf);
155 static void prism2sta_inf_authreq_defer(wlandevice_t *wlandev,
156 hfa384x_InfFrame_t *inf);
157 static void prism2sta_inf_psusercnt(wlandevice_t *wlandev,
158 hfa384x_InfFrame_t *inf);
160 /*----------------------------------------------------------------
161 * prism2sta_open
163 * WLAN device open method. Called from p80211netdev when kernel
164 * device open (start) method is called in response to the
165 * SIOCSIIFFLAGS ioctl changing the flags bit IFF_UP
166 * from clear to set.
168 * Arguments:
169 * wlandev wlan device structure
171 * Returns:
172 * 0 success
173 * >0 f/w reported error
174 * <0 driver reported error
176 * Side effects:
178 * Call context:
179 * process thread
180 ----------------------------------------------------------------*/
181 static int prism2sta_open(wlandevice_t *wlandev)
183 /* We don't currently have to do anything else.
184 * The setup of the MAC should be subsequently completed via
185 * the mlme commands.
186 * Higher layers know we're ready from dev->start==1 and
187 * dev->tbusy==0. Our rx path knows to pass up received/
188 * frames because of dev->flags&IFF_UP is true.
191 return 0;
194 /*----------------------------------------------------------------
195 * prism2sta_close
197 * WLAN device close method. Called from p80211netdev when kernel
198 * device close method is called in response to the
199 * SIOCSIIFFLAGS ioctl changing the flags bit IFF_UP
200 * from set to clear.
202 * Arguments:
203 * wlandev wlan device structure
205 * Returns:
206 * 0 success
207 * >0 f/w reported error
208 * <0 driver reported error
210 * Side effects:
212 * Call context:
213 * process thread
214 ----------------------------------------------------------------*/
215 static int prism2sta_close(wlandevice_t *wlandev)
217 /* We don't currently have to do anything else.
218 * Higher layers know we're not ready from dev->start==0 and
219 * dev->tbusy==1. Our rx path knows to not pass up received
220 * frames because of dev->flags&IFF_UP is false.
223 return 0;
226 /*----------------------------------------------------------------
227 * prism2sta_reset
229 * Not currently implented.
231 * Arguments:
232 * wlandev wlan device structure
233 * none
235 * Returns:
236 * nothing
238 * Side effects:
240 * Call context:
241 * process thread
242 ----------------------------------------------------------------*/
243 static void prism2sta_reset(wlandevice_t *wlandev)
245 return;
248 /*----------------------------------------------------------------
249 * prism2sta_txframe
251 * Takes a frame from p80211 and queues it for transmission.
253 * Arguments:
254 * wlandev wlan device structure
255 * pb packet buffer struct. Contains an 802.11
256 * data frame.
257 * p80211_hdr points to the 802.11 header for the packet.
258 * Returns:
259 * 0 Success and more buffs available
260 * 1 Success but no more buffs
261 * 2 Allocation failure
262 * 4 Buffer full or queue busy
264 * Side effects:
266 * Call context:
267 * process thread
268 ----------------------------------------------------------------*/
269 static int prism2sta_txframe(wlandevice_t *wlandev, struct sk_buff *skb,
270 union p80211_hdr *p80211_hdr,
271 struct p80211_metawep *p80211_wep)
273 hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
274 int result;
276 /* If necessary, set the 802.11 WEP bit */
277 if ((wlandev->hostwep & (HOSTWEP_PRIVACYINVOKED | HOSTWEP_ENCRYPT)) ==
278 HOSTWEP_PRIVACYINVOKED) {
279 p80211_hdr->a3.fc |= cpu_to_le16(WLAN_SET_FC_ISWEP(1));
282 result = hfa384x_drvr_txframe(hw, skb, p80211_hdr, p80211_wep);
284 return result;
287 /*----------------------------------------------------------------
288 * prism2sta_mlmerequest
290 * wlan command message handler. All we do here is pass the message
291 * over to the prism2sta_mgmt_handler.
293 * Arguments:
294 * wlandev wlan device structure
295 * msg wlan command message
296 * Returns:
297 * 0 success
298 * <0 successful acceptance of message, but we're
299 * waiting for an async process to finish before
300 * we're done with the msg. When the asynch
301 * process is done, we'll call the p80211
302 * function p80211req_confirm() .
303 * >0 An error occurred while we were handling
304 * the message.
306 * Side effects:
308 * Call context:
309 * process thread
310 ----------------------------------------------------------------*/
311 static int prism2sta_mlmerequest(wlandevice_t *wlandev, struct p80211msg *msg)
313 hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
315 int result = 0;
317 switch (msg->msgcode) {
318 case DIDmsg_dot11req_mibget:
319 pr_debug("Received mibget request\n");
320 result = prism2mgmt_mibset_mibget(wlandev, msg);
321 break;
322 case DIDmsg_dot11req_mibset:
323 pr_debug("Received mibset request\n");
324 result = prism2mgmt_mibset_mibget(wlandev, msg);
325 break;
326 case DIDmsg_dot11req_scan:
327 pr_debug("Received scan request\n");
328 result = prism2mgmt_scan(wlandev, msg);
329 break;
330 case DIDmsg_dot11req_scan_results:
331 pr_debug("Received scan_results request\n");
332 result = prism2mgmt_scan_results(wlandev, msg);
333 break;
334 case DIDmsg_dot11req_start:
335 pr_debug("Received mlme start request\n");
336 result = prism2mgmt_start(wlandev, msg);
337 break;
339 * Prism2 specific messages
341 case DIDmsg_p2req_readpda:
342 pr_debug("Received mlme readpda request\n");
343 result = prism2mgmt_readpda(wlandev, msg);
344 break;
345 case DIDmsg_p2req_ramdl_state:
346 pr_debug("Received mlme ramdl_state request\n");
347 result = prism2mgmt_ramdl_state(wlandev, msg);
348 break;
349 case DIDmsg_p2req_ramdl_write:
350 pr_debug("Received mlme ramdl_write request\n");
351 result = prism2mgmt_ramdl_write(wlandev, msg);
352 break;
353 case DIDmsg_p2req_flashdl_state:
354 pr_debug("Received mlme flashdl_state request\n");
355 result = prism2mgmt_flashdl_state(wlandev, msg);
356 break;
357 case DIDmsg_p2req_flashdl_write:
358 pr_debug("Received mlme flashdl_write request\n");
359 result = prism2mgmt_flashdl_write(wlandev, msg);
360 break;
362 * Linux specific messages
364 case DIDmsg_lnxreq_hostwep:
365 break; /* ignore me. */
366 case DIDmsg_lnxreq_ifstate:
368 struct p80211msg_lnxreq_ifstate *ifstatemsg;
369 pr_debug("Received mlme ifstate request\n");
370 ifstatemsg = (struct p80211msg_lnxreq_ifstate *) msg;
371 result =
372 prism2sta_ifstate(wlandev,
373 ifstatemsg->ifstate.data);
374 ifstatemsg->resultcode.status =
375 P80211ENUM_msgitem_status_data_ok;
376 ifstatemsg->resultcode.data = result;
377 result = 0;
379 break;
380 case DIDmsg_lnxreq_wlansniff:
381 pr_debug("Received mlme wlansniff request\n");
382 result = prism2mgmt_wlansniff(wlandev, msg);
383 break;
384 case DIDmsg_lnxreq_autojoin:
385 pr_debug("Received mlme autojoin request\n");
386 result = prism2mgmt_autojoin(wlandev, msg);
387 break;
388 case DIDmsg_lnxreq_commsquality:{
389 struct p80211msg_lnxreq_commsquality *qualmsg;
391 pr_debug("Received commsquality request\n");
393 qualmsg = (struct p80211msg_lnxreq_commsquality *) msg;
395 qualmsg->link.status =
396 P80211ENUM_msgitem_status_data_ok;
397 qualmsg->level.status =
398 P80211ENUM_msgitem_status_data_ok;
399 qualmsg->noise.status =
400 P80211ENUM_msgitem_status_data_ok;
402 qualmsg->link.data = le16_to_cpu(hw->qual.CQ_currBSS);
403 qualmsg->level.data = le16_to_cpu(hw->qual.ASL_currBSS);
404 qualmsg->noise.data = le16_to_cpu(hw->qual.ANL_currFC);
405 qualmsg->txrate.data = hw->txrate;
407 break;
409 default:
410 printk(KERN_WARNING "Unknown mgmt request message 0x%08x",
411 msg->msgcode);
412 break;
415 return result;
418 /*----------------------------------------------------------------
419 * prism2sta_ifstate
421 * Interface state. This is the primary WLAN interface enable/disable
422 * handler. Following the driver/load/deviceprobe sequence, this
423 * function must be called with a state of "enable" before any other
424 * commands will be accepted.
426 * Arguments:
427 * wlandev wlan device structure
428 * msgp ptr to msg buffer
430 * Returns:
431 * A p80211 message resultcode value.
433 * Side effects:
435 * Call context:
436 * process thread (usually)
437 * interrupt
438 ----------------------------------------------------------------*/
439 u32 prism2sta_ifstate(wlandevice_t *wlandev, u32 ifstate)
441 hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
442 u32 result;
444 result = P80211ENUM_resultcode_implementation_failure;
446 pr_debug("Current MSD state(%d), requesting(%d)\n",
447 wlandev->msdstate, ifstate);
448 switch (ifstate) {
449 case P80211ENUM_ifstate_fwload:
450 switch (wlandev->msdstate) {
451 case WLAN_MSD_HWPRESENT:
452 wlandev->msdstate = WLAN_MSD_FWLOAD_PENDING;
454 * Initialize the device+driver sufficiently
455 * for firmware loading.
457 result = hfa384x_drvr_start(hw);
458 if (result) {
459 printk(KERN_ERR
460 "hfa384x_drvr_start() failed,"
461 "result=%d\n", (int)result);
462 result =
463 P80211ENUM_resultcode_implementation_failure;
464 wlandev->msdstate = WLAN_MSD_HWPRESENT;
465 break;
467 wlandev->msdstate = WLAN_MSD_FWLOAD;
468 result = P80211ENUM_resultcode_success;
469 break;
470 case WLAN_MSD_FWLOAD:
471 hfa384x_cmd_initialize(hw);
472 result = P80211ENUM_resultcode_success;
473 break;
474 case WLAN_MSD_RUNNING:
475 printk(KERN_WARNING
476 "Cannot enter fwload state from enable state,"
477 "you must disable first.\n");
478 result = P80211ENUM_resultcode_invalid_parameters;
479 break;
480 case WLAN_MSD_HWFAIL:
481 default:
482 /* probe() had a problem or the msdstate contains
483 * an unrecognized value, there's nothing we can do.
485 result = P80211ENUM_resultcode_implementation_failure;
486 break;
488 break;
489 case P80211ENUM_ifstate_enable:
490 switch (wlandev->msdstate) {
491 case WLAN_MSD_HWPRESENT:
492 case WLAN_MSD_FWLOAD:
493 wlandev->msdstate = WLAN_MSD_RUNNING_PENDING;
494 /* Initialize the device+driver for full
495 * operation. Note that this might me an FWLOAD to
496 * to RUNNING transition so we must not do a chip
497 * or board level reset. Note that on failure,
498 * the MSD state is set to HWPRESENT because we
499 * can't make any assumptions about the state
500 * of the hardware or a previous firmware load.
502 result = hfa384x_drvr_start(hw);
503 if (result) {
504 printk(KERN_ERR
505 "hfa384x_drvr_start() failed,"
506 "result=%d\n", (int)result);
507 result =
508 P80211ENUM_resultcode_implementation_failure;
509 wlandev->msdstate = WLAN_MSD_HWPRESENT;
510 break;
513 result = prism2sta_getcardinfo(wlandev);
514 if (result) {
515 printk(KERN_ERR
516 "prism2sta_getcardinfo() failed,"
517 "result=%d\n", (int)result);
518 result =
519 P80211ENUM_resultcode_implementation_failure;
520 hfa384x_drvr_stop(hw);
521 wlandev->msdstate = WLAN_MSD_HWPRESENT;
522 break;
524 result = prism2sta_globalsetup(wlandev);
525 if (result) {
526 printk(KERN_ERR
527 "prism2sta_globalsetup() failed,"
528 "result=%d\n", (int)result);
529 result =
530 P80211ENUM_resultcode_implementation_failure;
531 hfa384x_drvr_stop(hw);
532 wlandev->msdstate = WLAN_MSD_HWPRESENT;
533 break;
535 wlandev->msdstate = WLAN_MSD_RUNNING;
536 hw->join_ap = 0;
537 hw->join_retries = 60;
538 result = P80211ENUM_resultcode_success;
539 break;
540 case WLAN_MSD_RUNNING:
541 /* Do nothing, we're already in this state. */
542 result = P80211ENUM_resultcode_success;
543 break;
544 case WLAN_MSD_HWFAIL:
545 default:
546 /* probe() had a problem or the msdstate contains
547 * an unrecognized value, there's nothing we can do.
549 result = P80211ENUM_resultcode_implementation_failure;
550 break;
552 break;
553 case P80211ENUM_ifstate_disable:
554 switch (wlandev->msdstate) {
555 case WLAN_MSD_HWPRESENT:
556 /* Do nothing, we're already in this state. */
557 result = P80211ENUM_resultcode_success;
558 break;
559 case WLAN_MSD_FWLOAD:
560 case WLAN_MSD_RUNNING:
561 wlandev->msdstate = WLAN_MSD_HWPRESENT_PENDING;
563 * TODO: Shut down the MAC completely. Here a chip
564 * or board level reset is probably called for.
565 * After a "disable" _all_ results are lost, even
566 * those from a fwload.
568 if (!wlandev->hwremoved)
569 netif_carrier_off(wlandev->netdev);
571 hfa384x_drvr_stop(hw);
573 wlandev->macmode = WLAN_MACMODE_NONE;
574 wlandev->msdstate = WLAN_MSD_HWPRESENT;
575 result = P80211ENUM_resultcode_success;
576 break;
577 case WLAN_MSD_HWFAIL:
578 default:
579 /* probe() had a problem or the msdstate contains
580 * an unrecognized value, there's nothing we can do.
582 result = P80211ENUM_resultcode_implementation_failure;
583 break;
585 break;
586 default:
587 result = P80211ENUM_resultcode_invalid_parameters;
588 break;
591 return result;
594 /*----------------------------------------------------------------
595 * prism2sta_getcardinfo
597 * Collect the NICID, firmware version and any other identifiers
598 * we'd like to have in host-side data structures.
600 * Arguments:
601 * wlandev wlan device structure
603 * Returns:
604 * 0 success
605 * >0 f/w reported error
606 * <0 driver reported error
608 * Side effects:
610 * Call context:
611 * Either.
612 ----------------------------------------------------------------*/
613 static int prism2sta_getcardinfo(wlandevice_t *wlandev)
615 int result = 0;
616 hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
617 u16 temp;
618 u8 snum[HFA384x_RID_NICSERIALNUMBER_LEN];
619 char pstr[(HFA384x_RID_NICSERIALNUMBER_LEN * 4) + 1];
621 /* Collect version and compatibility info */
622 /* Some are critical, some are not */
623 /* NIC identity */
624 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_NICIDENTITY,
625 &hw->ident_nic,
626 sizeof(hfa384x_compident_t));
627 if (result) {
628 printk(KERN_ERR "Failed to retrieve NICIDENTITY\n");
629 goto failed;
632 /* get all the nic id fields in host byte order */
633 hw->ident_nic.id = le16_to_cpu(hw->ident_nic.id);
634 hw->ident_nic.variant = le16_to_cpu(hw->ident_nic.variant);
635 hw->ident_nic.major = le16_to_cpu(hw->ident_nic.major);
636 hw->ident_nic.minor = le16_to_cpu(hw->ident_nic.minor);
638 printk(KERN_INFO "ident: nic h/w: id=0x%02x %d.%d.%d\n",
639 hw->ident_nic.id, hw->ident_nic.major,
640 hw->ident_nic.minor, hw->ident_nic.variant);
642 /* Primary f/w identity */
643 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_PRIIDENTITY,
644 &hw->ident_pri_fw,
645 sizeof(hfa384x_compident_t));
646 if (result) {
647 printk(KERN_ERR "Failed to retrieve PRIIDENTITY\n");
648 goto failed;
651 /* get all the private fw id fields in host byte order */
652 hw->ident_pri_fw.id = le16_to_cpu(hw->ident_pri_fw.id);
653 hw->ident_pri_fw.variant = le16_to_cpu(hw->ident_pri_fw.variant);
654 hw->ident_pri_fw.major = le16_to_cpu(hw->ident_pri_fw.major);
655 hw->ident_pri_fw.minor = le16_to_cpu(hw->ident_pri_fw.minor);
657 printk(KERN_INFO "ident: pri f/w: id=0x%02x %d.%d.%d\n",
658 hw->ident_pri_fw.id, hw->ident_pri_fw.major,
659 hw->ident_pri_fw.minor, hw->ident_pri_fw.variant);
661 /* Station (Secondary?) f/w identity */
662 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_STAIDENTITY,
663 &hw->ident_sta_fw,
664 sizeof(hfa384x_compident_t));
665 if (result) {
666 printk(KERN_ERR "Failed to retrieve STAIDENTITY\n");
667 goto failed;
670 if (hw->ident_nic.id < 0x8000) {
671 printk(KERN_ERR
672 "FATAL: Card is not an Intersil Prism2/2.5/3\n");
673 result = -1;
674 goto failed;
677 /* get all the station fw id fields in host byte order */
678 hw->ident_sta_fw.id = le16_to_cpu(hw->ident_sta_fw.id);
679 hw->ident_sta_fw.variant = le16_to_cpu(hw->ident_sta_fw.variant);
680 hw->ident_sta_fw.major = le16_to_cpu(hw->ident_sta_fw.major);
681 hw->ident_sta_fw.minor = le16_to_cpu(hw->ident_sta_fw.minor);
683 /* strip out the 'special' variant bits */
684 hw->mm_mods = hw->ident_sta_fw.variant & (BIT(14) | BIT(15));
685 hw->ident_sta_fw.variant &= ~((u16) (BIT(14) | BIT(15)));
687 if (hw->ident_sta_fw.id == 0x1f) {
688 printk(KERN_INFO
689 "ident: sta f/w: id=0x%02x %d.%d.%d\n",
690 hw->ident_sta_fw.id, hw->ident_sta_fw.major,
691 hw->ident_sta_fw.minor, hw->ident_sta_fw.variant);
692 } else {
693 printk(KERN_INFO
694 "ident: ap f/w: id=0x%02x %d.%d.%d\n",
695 hw->ident_sta_fw.id, hw->ident_sta_fw.major,
696 hw->ident_sta_fw.minor, hw->ident_sta_fw.variant);
697 printk(KERN_ERR "Unsupported Tertiary AP firmeare loaded!\n");
698 goto failed;
701 /* Compatibility range, Modem supplier */
702 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_MFISUPRANGE,
703 &hw->cap_sup_mfi,
704 sizeof(hfa384x_caplevel_t));
705 if (result) {
706 printk(KERN_ERR "Failed to retrieve MFISUPRANGE\n");
707 goto failed;
710 /* get all the Compatibility range, modem interface supplier
711 fields in byte order */
712 hw->cap_sup_mfi.role = le16_to_cpu(hw->cap_sup_mfi.role);
713 hw->cap_sup_mfi.id = le16_to_cpu(hw->cap_sup_mfi.id);
714 hw->cap_sup_mfi.variant = le16_to_cpu(hw->cap_sup_mfi.variant);
715 hw->cap_sup_mfi.bottom = le16_to_cpu(hw->cap_sup_mfi.bottom);
716 hw->cap_sup_mfi.top = le16_to_cpu(hw->cap_sup_mfi.top);
718 printk(KERN_INFO
719 "MFI:SUP:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n",
720 hw->cap_sup_mfi.role, hw->cap_sup_mfi.id,
721 hw->cap_sup_mfi.variant, hw->cap_sup_mfi.bottom,
722 hw->cap_sup_mfi.top);
724 /* Compatibility range, Controller supplier */
725 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_CFISUPRANGE,
726 &hw->cap_sup_cfi,
727 sizeof(hfa384x_caplevel_t));
728 if (result) {
729 printk(KERN_ERR "Failed to retrieve CFISUPRANGE\n");
730 goto failed;
733 /* get all the Compatibility range, controller interface supplier
734 fields in byte order */
735 hw->cap_sup_cfi.role = le16_to_cpu(hw->cap_sup_cfi.role);
736 hw->cap_sup_cfi.id = le16_to_cpu(hw->cap_sup_cfi.id);
737 hw->cap_sup_cfi.variant = le16_to_cpu(hw->cap_sup_cfi.variant);
738 hw->cap_sup_cfi.bottom = le16_to_cpu(hw->cap_sup_cfi.bottom);
739 hw->cap_sup_cfi.top = le16_to_cpu(hw->cap_sup_cfi.top);
741 printk(KERN_INFO
742 "CFI:SUP:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n",
743 hw->cap_sup_cfi.role, hw->cap_sup_cfi.id,
744 hw->cap_sup_cfi.variant, hw->cap_sup_cfi.bottom,
745 hw->cap_sup_cfi.top);
747 /* Compatibility range, Primary f/w supplier */
748 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_PRISUPRANGE,
749 &hw->cap_sup_pri,
750 sizeof(hfa384x_caplevel_t));
751 if (result) {
752 printk(KERN_ERR "Failed to retrieve PRISUPRANGE\n");
753 goto failed;
756 /* get all the Compatibility range, primary firmware supplier
757 fields in byte order */
758 hw->cap_sup_pri.role = le16_to_cpu(hw->cap_sup_pri.role);
759 hw->cap_sup_pri.id = le16_to_cpu(hw->cap_sup_pri.id);
760 hw->cap_sup_pri.variant = le16_to_cpu(hw->cap_sup_pri.variant);
761 hw->cap_sup_pri.bottom = le16_to_cpu(hw->cap_sup_pri.bottom);
762 hw->cap_sup_pri.top = le16_to_cpu(hw->cap_sup_pri.top);
764 printk(KERN_INFO
765 "PRI:SUP:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n",
766 hw->cap_sup_pri.role, hw->cap_sup_pri.id,
767 hw->cap_sup_pri.variant, hw->cap_sup_pri.bottom,
768 hw->cap_sup_pri.top);
770 /* Compatibility range, Station f/w supplier */
771 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_STASUPRANGE,
772 &hw->cap_sup_sta,
773 sizeof(hfa384x_caplevel_t));
774 if (result) {
775 printk(KERN_ERR "Failed to retrieve STASUPRANGE\n");
776 goto failed;
779 /* get all the Compatibility range, station firmware supplier
780 fields in byte order */
781 hw->cap_sup_sta.role = le16_to_cpu(hw->cap_sup_sta.role);
782 hw->cap_sup_sta.id = le16_to_cpu(hw->cap_sup_sta.id);
783 hw->cap_sup_sta.variant = le16_to_cpu(hw->cap_sup_sta.variant);
784 hw->cap_sup_sta.bottom = le16_to_cpu(hw->cap_sup_sta.bottom);
785 hw->cap_sup_sta.top = le16_to_cpu(hw->cap_sup_sta.top);
787 if (hw->cap_sup_sta.id == 0x04) {
788 printk(KERN_INFO
789 "STA:SUP:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n",
790 hw->cap_sup_sta.role, hw->cap_sup_sta.id,
791 hw->cap_sup_sta.variant, hw->cap_sup_sta.bottom,
792 hw->cap_sup_sta.top);
793 } else {
794 printk(KERN_INFO
795 "AP:SUP:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n",
796 hw->cap_sup_sta.role, hw->cap_sup_sta.id,
797 hw->cap_sup_sta.variant, hw->cap_sup_sta.bottom,
798 hw->cap_sup_sta.top);
801 /* Compatibility range, primary f/w actor, CFI supplier */
802 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_PRI_CFIACTRANGES,
803 &hw->cap_act_pri_cfi,
804 sizeof(hfa384x_caplevel_t));
805 if (result) {
806 printk(KERN_ERR "Failed to retrieve PRI_CFIACTRANGES\n");
807 goto failed;
810 /* get all the Compatibility range, primary f/w actor, CFI supplier
811 fields in byte order */
812 hw->cap_act_pri_cfi.role = le16_to_cpu(hw->cap_act_pri_cfi.role);
813 hw->cap_act_pri_cfi.id = le16_to_cpu(hw->cap_act_pri_cfi.id);
814 hw->cap_act_pri_cfi.variant = le16_to_cpu(hw->cap_act_pri_cfi.variant);
815 hw->cap_act_pri_cfi.bottom = le16_to_cpu(hw->cap_act_pri_cfi.bottom);
816 hw->cap_act_pri_cfi.top = le16_to_cpu(hw->cap_act_pri_cfi.top);
818 printk(KERN_INFO
819 "PRI-CFI:ACT:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n",
820 hw->cap_act_pri_cfi.role, hw->cap_act_pri_cfi.id,
821 hw->cap_act_pri_cfi.variant, hw->cap_act_pri_cfi.bottom,
822 hw->cap_act_pri_cfi.top);
824 /* Compatibility range, sta f/w actor, CFI supplier */
825 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_STA_CFIACTRANGES,
826 &hw->cap_act_sta_cfi,
827 sizeof(hfa384x_caplevel_t));
828 if (result) {
829 printk(KERN_ERR "Failed to retrieve STA_CFIACTRANGES\n");
830 goto failed;
833 /* get all the Compatibility range, station f/w actor, CFI supplier
834 fields in byte order */
835 hw->cap_act_sta_cfi.role = le16_to_cpu(hw->cap_act_sta_cfi.role);
836 hw->cap_act_sta_cfi.id = le16_to_cpu(hw->cap_act_sta_cfi.id);
837 hw->cap_act_sta_cfi.variant = le16_to_cpu(hw->cap_act_sta_cfi.variant);
838 hw->cap_act_sta_cfi.bottom = le16_to_cpu(hw->cap_act_sta_cfi.bottom);
839 hw->cap_act_sta_cfi.top = le16_to_cpu(hw->cap_act_sta_cfi.top);
841 printk(KERN_INFO
842 "STA-CFI:ACT:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n",
843 hw->cap_act_sta_cfi.role, hw->cap_act_sta_cfi.id,
844 hw->cap_act_sta_cfi.variant, hw->cap_act_sta_cfi.bottom,
845 hw->cap_act_sta_cfi.top);
847 /* Compatibility range, sta f/w actor, MFI supplier */
848 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_STA_MFIACTRANGES,
849 &hw->cap_act_sta_mfi,
850 sizeof(hfa384x_caplevel_t));
851 if (result) {
852 printk(KERN_ERR "Failed to retrieve STA_MFIACTRANGES\n");
853 goto failed;
856 /* get all the Compatibility range, station f/w actor, MFI supplier
857 fields in byte order */
858 hw->cap_act_sta_mfi.role = le16_to_cpu(hw->cap_act_sta_mfi.role);
859 hw->cap_act_sta_mfi.id = le16_to_cpu(hw->cap_act_sta_mfi.id);
860 hw->cap_act_sta_mfi.variant = le16_to_cpu(hw->cap_act_sta_mfi.variant);
861 hw->cap_act_sta_mfi.bottom = le16_to_cpu(hw->cap_act_sta_mfi.bottom);
862 hw->cap_act_sta_mfi.top = le16_to_cpu(hw->cap_act_sta_mfi.top);
864 printk(KERN_INFO
865 "STA-MFI:ACT:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n",
866 hw->cap_act_sta_mfi.role, hw->cap_act_sta_mfi.id,
867 hw->cap_act_sta_mfi.variant, hw->cap_act_sta_mfi.bottom,
868 hw->cap_act_sta_mfi.top);
870 /* Serial Number */
871 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_NICSERIALNUMBER,
872 snum, HFA384x_RID_NICSERIALNUMBER_LEN);
873 if (!result) {
874 wlan_mkprintstr(snum, HFA384x_RID_NICSERIALNUMBER_LEN,
875 pstr, sizeof(pstr));
876 printk(KERN_INFO "Prism2 card SN: %s\n", pstr);
877 } else {
878 printk(KERN_ERR "Failed to retrieve Prism2 Card SN\n");
879 goto failed;
882 /* Collect the MAC address */
883 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_CNFOWNMACADDR,
884 wlandev->netdev->dev_addr, ETH_ALEN);
885 if (result != 0) {
886 printk(KERN_ERR "Failed to retrieve mac address\n");
887 goto failed;
890 /* short preamble is always implemented */
891 wlandev->nsdcaps |= P80211_NSDCAP_SHORT_PREAMBLE;
893 /* find out if hardware wep is implemented */
894 hfa384x_drvr_getconfig16(hw, HFA384x_RID_PRIVACYOPTIMP, &temp);
895 if (temp)
896 wlandev->nsdcaps |= P80211_NSDCAP_HARDWAREWEP;
898 /* get the dBm Scaling constant */
899 hfa384x_drvr_getconfig16(hw, HFA384x_RID_CNFDBMADJUST, &temp);
900 hw->dbmadjust = temp;
902 /* Only enable scan by default on newer firmware */
903 if (HFA384x_FIRMWARE_VERSION(hw->ident_sta_fw.major,
904 hw->ident_sta_fw.minor,
905 hw->ident_sta_fw.variant) <
906 HFA384x_FIRMWARE_VERSION(1, 5, 5)) {
907 wlandev->nsdcaps |= P80211_NSDCAP_NOSCAN;
910 /* TODO: Set any internally managed config items */
912 goto done;
913 failed:
914 printk(KERN_ERR "Failed, result=%d\n", result);
915 done:
916 return result;
919 /*----------------------------------------------------------------
920 * prism2sta_globalsetup
922 * Set any global RIDs that we want to set at device activation.
924 * Arguments:
925 * wlandev wlan device structure
927 * Returns:
928 * 0 success
929 * >0 f/w reported error
930 * <0 driver reported error
932 * Side effects:
934 * Call context:
935 * process thread
936 ----------------------------------------------------------------*/
937 static int prism2sta_globalsetup(wlandevice_t *wlandev)
939 hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
941 /* Set the maximum frame size */
942 return hfa384x_drvr_setconfig16(hw, HFA384x_RID_CNFMAXDATALEN,
943 WLAN_DATA_MAXLEN);
946 static int prism2sta_setmulticast(wlandevice_t *wlandev, netdevice_t *dev)
948 int result = 0;
949 hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
951 u16 promisc;
953 /* If we're not ready, what's the point? */
954 if (hw->state != HFA384x_STATE_RUNNING)
955 goto exit;
957 if ((dev->flags & (IFF_PROMISC | IFF_ALLMULTI)) != 0)
958 promisc = P80211ENUM_truth_true;
959 else
960 promisc = P80211ENUM_truth_false;
962 result =
963 hfa384x_drvr_setconfig16_async(hw, HFA384x_RID_PROMISCMODE,
964 promisc);
965 exit:
966 return result;
969 /*----------------------------------------------------------------
970 * prism2sta_inf_handover
972 * Handles the receipt of a Handover info frame. Should only be present
973 * in APs only.
975 * Arguments:
976 * wlandev wlan device structure
977 * inf ptr to info frame (contents in hfa384x order)
979 * Returns:
980 * nothing
982 * Side effects:
984 * Call context:
985 * interrupt
986 ----------------------------------------------------------------*/
987 static void prism2sta_inf_handover(wlandevice_t *wlandev,
988 hfa384x_InfFrame_t *inf)
990 pr_debug("received infoframe:HANDOVER (unhandled)\n");
991 return;
994 /*----------------------------------------------------------------
995 * prism2sta_inf_tallies
997 * Handles the receipt of a CommTallies info frame.
999 * Arguments:
1000 * wlandev wlan device structure
1001 * inf ptr to info frame (contents in hfa384x order)
1003 * Returns:
1004 * nothing
1006 * Side effects:
1008 * Call context:
1009 * interrupt
1010 ----------------------------------------------------------------*/
1011 static void prism2sta_inf_tallies(wlandevice_t *wlandev,
1012 hfa384x_InfFrame_t *inf)
1014 hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
1015 u16 *src16;
1016 u32 *dst;
1017 u32 *src32;
1018 int i;
1019 int cnt;
1022 ** Determine if these are 16-bit or 32-bit tallies, based on the
1023 ** record length of the info record.
1026 cnt = sizeof(hfa384x_CommTallies32_t) / sizeof(u32);
1027 if (inf->framelen > 22) {
1028 dst = (u32 *) &hw->tallies;
1029 src32 = (u32 *) &inf->info.commtallies32;
1030 for (i = 0; i < cnt; i++, dst++, src32++)
1031 *dst += le32_to_cpu(*src32);
1032 } else {
1033 dst = (u32 *) &hw->tallies;
1034 src16 = (u16 *) &inf->info.commtallies16;
1035 for (i = 0; i < cnt; i++, dst++, src16++)
1036 *dst += le16_to_cpu(*src16);
1039 return;
1042 /*----------------------------------------------------------------
1043 * prism2sta_inf_scanresults
1045 * Handles the receipt of a Scan Results info frame.
1047 * Arguments:
1048 * wlandev wlan device structure
1049 * inf ptr to info frame (contents in hfa384x order)
1051 * Returns:
1052 * nothing
1054 * Side effects:
1056 * Call context:
1057 * interrupt
1058 ----------------------------------------------------------------*/
1059 static void prism2sta_inf_scanresults(wlandevice_t *wlandev,
1060 hfa384x_InfFrame_t *inf)
1063 hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
1064 int nbss;
1065 hfa384x_ScanResult_t *sr = &(inf->info.scanresult);
1066 int i;
1067 hfa384x_JoinRequest_data_t joinreq;
1068 int result;
1070 /* Get the number of results, first in bytes, then in results */
1071 nbss = (inf->framelen * sizeof(u16)) -
1072 sizeof(inf->infotype) - sizeof(inf->info.scanresult.scanreason);
1073 nbss /= sizeof(hfa384x_ScanResultSub_t);
1075 /* Print em */
1076 pr_debug("rx scanresults, reason=%d, nbss=%d:\n",
1077 inf->info.scanresult.scanreason, nbss);
1078 for (i = 0; i < nbss; i++) {
1079 pr_debug("chid=%d anl=%d sl=%d bcnint=%d\n",
1080 sr->result[i].chid,
1081 sr->result[i].anl,
1082 sr->result[i].sl, sr->result[i].bcnint);
1083 pr_debug(" capinfo=0x%04x proberesp_rate=%d\n",
1084 sr->result[i].capinfo, sr->result[i].proberesp_rate);
1086 /* issue a join request */
1087 joinreq.channel = sr->result[0].chid;
1088 memcpy(joinreq.bssid, sr->result[0].bssid, WLAN_BSSID_LEN);
1089 result = hfa384x_drvr_setconfig(hw,
1090 HFA384x_RID_JOINREQUEST,
1091 &joinreq, HFA384x_RID_JOINREQUEST_LEN);
1092 if (result) {
1093 printk(KERN_ERR "setconfig(joinreq) failed, result=%d\n",
1094 result);
1097 return;
1100 /*----------------------------------------------------------------
1101 * prism2sta_inf_hostscanresults
1103 * Handles the receipt of a Scan Results info frame.
1105 * Arguments:
1106 * wlandev wlan device structure
1107 * inf ptr to info frame (contents in hfa384x order)
1109 * Returns:
1110 * nothing
1112 * Side effects:
1114 * Call context:
1115 * interrupt
1116 ----------------------------------------------------------------*/
1117 static void prism2sta_inf_hostscanresults(wlandevice_t *wlandev,
1118 hfa384x_InfFrame_t *inf)
1120 hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
1121 int nbss;
1123 nbss = (inf->framelen - 3) / 32;
1124 pr_debug("Received %d hostscan results\n", nbss);
1126 if (nbss > 32)
1127 nbss = 32;
1129 kfree(hw->scanresults);
1131 hw->scanresults = kmalloc(sizeof(hfa384x_InfFrame_t), GFP_ATOMIC);
1132 memcpy(hw->scanresults, inf, sizeof(hfa384x_InfFrame_t));
1134 if (nbss == 0)
1135 nbss = -1;
1137 /* Notify/wake the sleeping caller. */
1138 hw->scanflag = nbss;
1139 wake_up_interruptible(&hw->cmdq);
1142 /*----------------------------------------------------------------
1143 * prism2sta_inf_chinforesults
1145 * Handles the receipt of a Channel Info Results info frame.
1147 * Arguments:
1148 * wlandev wlan device structure
1149 * inf ptr to info frame (contents in hfa384x order)
1151 * Returns:
1152 * nothing
1154 * Side effects:
1156 * Call context:
1157 * interrupt
1158 ----------------------------------------------------------------*/
1159 static void prism2sta_inf_chinforesults(wlandevice_t *wlandev,
1160 hfa384x_InfFrame_t *inf)
1162 hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
1163 unsigned int i, n;
1165 hw->channel_info.results.scanchannels =
1166 le16_to_cpu(inf->info.chinforesult.scanchannels);
1168 for (i = 0, n = 0; i < HFA384x_CHINFORESULT_MAX; i++) {
1169 if (hw->channel_info.results.scanchannels & (1 << i)) {
1170 int channel =
1171 le16_to_cpu(inf->info.chinforesult.result[n].chid) -
1173 hfa384x_ChInfoResultSub_t *chinforesult =
1174 &hw->channel_info.results.result[channel];
1175 chinforesult->chid = channel;
1176 chinforesult->anl =
1177 le16_to_cpu(inf->info.chinforesult.result[n].anl);
1178 chinforesult->pnl =
1179 le16_to_cpu(inf->info.chinforesult.result[n].pnl);
1180 chinforesult->active =
1181 le16_to_cpu(inf->info.chinforesult.result[n].
1182 active);
1183 pr_debug
1184 ("chinfo: channel %d, %s level (avg/peak)=%d/%d dB, pcf %d\n",
1185 channel + 1,
1186 chinforesult->
1187 active & HFA384x_CHINFORESULT_BSSACTIVE ? "signal"
1188 : "noise", chinforesult->anl, chinforesult->pnl,
1189 chinforesult->
1190 active & HFA384x_CHINFORESULT_PCFACTIVE ? 1 : 0);
1191 n++;
1194 atomic_set(&hw->channel_info.done, 2);
1196 hw->channel_info.count = n;
1197 return;
1200 void prism2sta_processing_defer(struct work_struct *data)
1202 hfa384x_t *hw = container_of(data, struct hfa384x, link_bh);
1203 wlandevice_t *wlandev = hw->wlandev;
1204 hfa384x_bytestr32_t ssid;
1205 int result;
1207 /* First let's process the auth frames */
1209 struct sk_buff *skb;
1210 hfa384x_InfFrame_t *inf;
1212 while ((skb = skb_dequeue(&hw->authq))) {
1213 inf = (hfa384x_InfFrame_t *) skb->data;
1214 prism2sta_inf_authreq_defer(wlandev, inf);
1219 /* Now let's handle the linkstatus stuff */
1220 if (hw->link_status == hw->link_status_new)
1221 goto failed;
1223 hw->link_status = hw->link_status_new;
1225 switch (hw->link_status) {
1226 case HFA384x_LINK_NOTCONNECTED:
1227 /* I'm currently assuming that this is the initial link
1228 * state. It should only be possible immediately
1229 * following an Enable command.
1230 * Response:
1231 * Block Transmits, Ignore receives of data frames
1233 netif_carrier_off(wlandev->netdev);
1235 printk(KERN_INFO "linkstatus=NOTCONNECTED (unhandled)\n");
1236 break;
1238 case HFA384x_LINK_CONNECTED:
1239 /* This one indicates a successful scan/join/auth/assoc.
1240 * When we have the full MLME complement, this event will
1241 * signify successful completion of both mlme_authenticate
1242 * and mlme_associate. State management will get a little
1243 * ugly here.
1244 * Response:
1245 * Indicate authentication and/or association
1246 * Enable Transmits, Receives and pass up data frames
1249 netif_carrier_on(wlandev->netdev);
1251 /* If we are joining a specific AP, set our
1252 * state and reset retries
1254 if (hw->join_ap == 1)
1255 hw->join_ap = 2;
1256 hw->join_retries = 60;
1258 /* Don't call this in monitor mode */
1259 if (wlandev->netdev->type == ARPHRD_ETHER) {
1260 u16 portstatus;
1262 printk(KERN_INFO "linkstatus=CONNECTED\n");
1264 /* For non-usb devices, we can use the sync versions */
1265 /* Collect the BSSID, and set state to allow tx */
1267 result = hfa384x_drvr_getconfig(hw,
1268 HFA384x_RID_CURRENTBSSID,
1269 wlandev->bssid,
1270 WLAN_BSSID_LEN);
1271 if (result) {
1272 pr_debug
1273 ("getconfig(0x%02x) failed, result = %d\n",
1274 HFA384x_RID_CURRENTBSSID, result);
1275 goto failed;
1278 result = hfa384x_drvr_getconfig(hw,
1279 HFA384x_RID_CURRENTSSID,
1280 &ssid, sizeof(ssid));
1281 if (result) {
1282 pr_debug
1283 ("getconfig(0x%02x) failed, result = %d\n",
1284 HFA384x_RID_CURRENTSSID, result);
1285 goto failed;
1287 prism2mgmt_bytestr2pstr((hfa384x_bytestr_t *) &ssid,
1288 (p80211pstrd_t *) &
1289 wlandev->ssid);
1291 /* Collect the port status */
1292 result = hfa384x_drvr_getconfig16(hw,
1293 HFA384x_RID_PORTSTATUS,
1294 &portstatus);
1295 if (result) {
1296 pr_debug
1297 ("getconfig(0x%02x) failed, result = %d\n",
1298 HFA384x_RID_PORTSTATUS, result);
1299 goto failed;
1301 wlandev->macmode =
1302 (portstatus == HFA384x_PSTATUS_CONN_IBSS) ?
1303 WLAN_MACMODE_IBSS_STA : WLAN_MACMODE_ESS_STA;
1305 /* signal back up to cfg80211 layer */
1306 prism2_connect_result(wlandev, P80211ENUM_truth_false);
1308 /* Get the ball rolling on the comms quality stuff */
1309 prism2sta_commsqual_defer(&hw->commsqual_bh);
1311 break;
1313 case HFA384x_LINK_DISCONNECTED:
1314 /* This one indicates that our association is gone. We've
1315 * lost connection with the AP and/or been disassociated.
1316 * This indicates that the MAC has completely cleared it's
1317 * associated state. We * should send a deauth indication
1318 * (implying disassoc) up * to the MLME.
1319 * Response:
1320 * Indicate Deauthentication
1321 * Block Transmits, Ignore receives of data frames
1323 if (wlandev->netdev->type == ARPHRD_ETHER)
1324 printk(KERN_INFO
1325 "linkstatus=DISCONNECTED (unhandled)\n");
1326 wlandev->macmode = WLAN_MACMODE_NONE;
1328 netif_carrier_off(wlandev->netdev);
1330 /* signal back up to cfg80211 layer */
1331 prism2_disconnected(wlandev);
1333 break;
1335 case HFA384x_LINK_AP_CHANGE:
1336 /* This one indicates that the MAC has decided to and
1337 * successfully completed a change to another AP. We
1338 * should probably implement a reassociation indication
1339 * in response to this one. I'm thinking that the the
1340 * p80211 layer needs to be notified in case of
1341 * buffering/queueing issues. User mode also needs to be
1342 * notified so that any BSS dependent elements can be
1343 * updated.
1344 * associated state. We * should send a deauth indication
1345 * (implying disassoc) up * to the MLME.
1346 * Response:
1347 * Indicate Reassociation
1348 * Enable Transmits, Receives and pass up data frames
1350 printk(KERN_INFO "linkstatus=AP_CHANGE\n");
1352 result = hfa384x_drvr_getconfig(hw,
1353 HFA384x_RID_CURRENTBSSID,
1354 wlandev->bssid, WLAN_BSSID_LEN);
1355 if (result) {
1356 pr_debug("getconfig(0x%02x) failed, result = %d\n",
1357 HFA384x_RID_CURRENTBSSID, result);
1358 goto failed;
1361 result = hfa384x_drvr_getconfig(hw,
1362 HFA384x_RID_CURRENTSSID,
1363 &ssid, sizeof(ssid));
1364 if (result) {
1365 pr_debug("getconfig(0x%02x) failed, result = %d\n",
1366 HFA384x_RID_CURRENTSSID, result);
1367 goto failed;
1369 prism2mgmt_bytestr2pstr((hfa384x_bytestr_t *) &ssid,
1370 (p80211pstrd_t *) &wlandev->ssid);
1372 hw->link_status = HFA384x_LINK_CONNECTED;
1373 netif_carrier_on(wlandev->netdev);
1375 /* signal back up to cfg80211 layer */
1376 prism2_roamed(wlandev);
1378 break;
1380 case HFA384x_LINK_AP_OUTOFRANGE:
1381 /* This one indicates that the MAC has decided that the
1382 * AP is out of range, but hasn't found a better candidate
1383 * so the MAC maintains its "associated" state in case
1384 * we get back in range. We should block transmits and
1385 * receives in this state. Do we need an indication here?
1386 * Probably not since a polling user-mode element would
1387 * get this status from from p2PortStatus(FD40). What about
1388 * p80211?
1389 * Response:
1390 * Block Transmits, Ignore receives of data frames
1392 printk(KERN_INFO "linkstatus=AP_OUTOFRANGE (unhandled)\n");
1394 netif_carrier_off(wlandev->netdev);
1396 break;
1398 case HFA384x_LINK_AP_INRANGE:
1399 /* This one indicates that the MAC has decided that the
1400 * AP is back in range. We continue working with our
1401 * existing association.
1402 * Response:
1403 * Enable Transmits, Receives and pass up data frames
1405 printk(KERN_INFO "linkstatus=AP_INRANGE\n");
1407 hw->link_status = HFA384x_LINK_CONNECTED;
1408 netif_carrier_on(wlandev->netdev);
1410 break;
1412 case HFA384x_LINK_ASSOCFAIL:
1413 /* This one is actually a peer to CONNECTED. We've
1414 * requested a join for a given SSID and optionally BSSID.
1415 * We can use this one to indicate authentication and
1416 * association failures. The trick is going to be
1417 * 1) identifying the failure, and 2) state management.
1418 * Response:
1419 * Disable Transmits, Ignore receives of data frames
1421 if (hw->join_ap && --hw->join_retries > 0) {
1422 hfa384x_JoinRequest_data_t joinreq;
1423 joinreq = hw->joinreq;
1424 /* Send the join request */
1425 hfa384x_drvr_setconfig(hw,
1426 HFA384x_RID_JOINREQUEST,
1427 &joinreq,
1428 HFA384x_RID_JOINREQUEST_LEN);
1429 printk(KERN_INFO
1430 "linkstatus=ASSOCFAIL (re-submitting join)\n");
1431 } else {
1432 printk(KERN_INFO "linkstatus=ASSOCFAIL (unhandled)\n");
1435 netif_carrier_off(wlandev->netdev);
1437 /* signal back up to cfg80211 layer */
1438 prism2_connect_result(wlandev, P80211ENUM_truth_true);
1440 break;
1442 default:
1443 /* This is bad, IO port problems? */
1444 printk(KERN_WARNING
1445 "unknown linkstatus=0x%02x\n", hw->link_status);
1446 goto failed;
1447 break;
1450 wlandev->linkstatus = (hw->link_status == HFA384x_LINK_CONNECTED);
1452 failed:
1453 return;
1456 /*----------------------------------------------------------------
1457 * prism2sta_inf_linkstatus
1459 * Handles the receipt of a Link Status info frame.
1461 * Arguments:
1462 * wlandev wlan device structure
1463 * inf ptr to info frame (contents in hfa384x order)
1465 * Returns:
1466 * nothing
1468 * Side effects:
1470 * Call context:
1471 * interrupt
1472 ----------------------------------------------------------------*/
1473 static void prism2sta_inf_linkstatus(wlandevice_t *wlandev,
1474 hfa384x_InfFrame_t *inf)
1476 hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
1478 hw->link_status_new = le16_to_cpu(inf->info.linkstatus.linkstatus);
1480 schedule_work(&hw->link_bh);
1482 return;
1485 /*----------------------------------------------------------------
1486 * prism2sta_inf_assocstatus
1488 * Handles the receipt of an Association Status info frame. Should
1489 * be present in APs only.
1491 * Arguments:
1492 * wlandev wlan device structure
1493 * inf ptr to info frame (contents in hfa384x order)
1495 * Returns:
1496 * nothing
1498 * Side effects:
1500 * Call context:
1501 * interrupt
1502 ----------------------------------------------------------------*/
1503 static void prism2sta_inf_assocstatus(wlandevice_t *wlandev,
1504 hfa384x_InfFrame_t *inf)
1506 hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
1507 hfa384x_AssocStatus_t rec;
1508 int i;
1510 memcpy(&rec, &inf->info.assocstatus, sizeof(rec));
1511 rec.assocstatus = le16_to_cpu(rec.assocstatus);
1512 rec.reason = le16_to_cpu(rec.reason);
1515 ** Find the address in the list of authenticated stations.
1516 ** If it wasn't found, then this address has not been previously
1517 ** authenticated and something weird has happened if this is
1518 ** anything other than an "authentication failed" message.
1519 ** If the address was found, then set the "associated" flag for
1520 ** that station, based on whether the station is associating or
1521 ** losing its association. Something weird has also happened
1522 ** if we find the address in the list of authenticated stations
1523 ** but we are getting an "authentication failed" message.
1526 for (i = 0; i < hw->authlist.cnt; i++)
1527 if (memcmp(rec.sta_addr, hw->authlist.addr[i], ETH_ALEN) == 0)
1528 break;
1530 if (i >= hw->authlist.cnt) {
1531 if (rec.assocstatus != HFA384x_ASSOCSTATUS_AUTHFAIL)
1532 printk(KERN_WARNING
1533 "assocstatus info frame received for non-authenticated station.\n");
1534 } else {
1535 hw->authlist.assoc[i] =
1536 (rec.assocstatus == HFA384x_ASSOCSTATUS_STAASSOC ||
1537 rec.assocstatus == HFA384x_ASSOCSTATUS_REASSOC);
1539 if (rec.assocstatus == HFA384x_ASSOCSTATUS_AUTHFAIL)
1540 printk(KERN_WARNING
1541 "authfail assocstatus info frame received for authenticated station.\n");
1544 return;
1547 /*----------------------------------------------------------------
1548 * prism2sta_inf_authreq
1550 * Handles the receipt of an Authentication Request info frame. Should
1551 * be present in APs only.
1553 * Arguments:
1554 * wlandev wlan device structure
1555 * inf ptr to info frame (contents in hfa384x order)
1557 * Returns:
1558 * nothing
1560 * Side effects:
1562 * Call context:
1563 * interrupt
1565 ----------------------------------------------------------------*/
1566 static void prism2sta_inf_authreq(wlandevice_t *wlandev,
1567 hfa384x_InfFrame_t *inf)
1569 hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
1570 struct sk_buff *skb;
1572 skb = dev_alloc_skb(sizeof(*inf));
1573 if (skb) {
1574 skb_put(skb, sizeof(*inf));
1575 memcpy(skb->data, inf, sizeof(*inf));
1576 skb_queue_tail(&hw->authq, skb);
1577 schedule_work(&hw->link_bh);
1581 static void prism2sta_inf_authreq_defer(wlandevice_t *wlandev,
1582 hfa384x_InfFrame_t *inf)
1584 hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
1585 hfa384x_authenticateStation_data_t rec;
1587 int i, added, result, cnt;
1588 u8 *addr;
1591 ** Build the AuthenticateStation record. Initialize it for denying
1592 ** authentication.
1595 memcpy(rec.address, inf->info.authreq.sta_addr, ETH_ALEN);
1596 rec.status = P80211ENUM_status_unspec_failure;
1599 ** Authenticate based on the access mode.
1602 switch (hw->accessmode) {
1603 case WLAN_ACCESS_NONE:
1606 ** Deny all new authentications. However, if a station
1607 ** is ALREADY authenticated, then accept it.
1610 for (i = 0; i < hw->authlist.cnt; i++)
1611 if (memcmp(rec.address, hw->authlist.addr[i],
1612 ETH_ALEN) == 0) {
1613 rec.status = P80211ENUM_status_successful;
1614 break;
1617 break;
1619 case WLAN_ACCESS_ALL:
1622 ** Allow all authentications.
1625 rec.status = P80211ENUM_status_successful;
1626 break;
1628 case WLAN_ACCESS_ALLOW:
1631 ** Only allow the authentication if the MAC address
1632 ** is in the list of allowed addresses.
1634 ** Since this is the interrupt handler, we may be here
1635 ** while the access list is in the middle of being
1636 ** updated. Choose the list which is currently okay.
1637 ** See "prism2mib_priv_accessallow()" for details.
1640 if (hw->allow.modify == 0) {
1641 cnt = hw->allow.cnt;
1642 addr = hw->allow.addr[0];
1643 } else {
1644 cnt = hw->allow.cnt1;
1645 addr = hw->allow.addr1[0];
1648 for (i = 0; i < cnt; i++, addr += ETH_ALEN)
1649 if (memcmp(rec.address, addr, ETH_ALEN) == 0) {
1650 rec.status = P80211ENUM_status_successful;
1651 break;
1654 break;
1656 case WLAN_ACCESS_DENY:
1659 ** Allow the authentication UNLESS the MAC address is
1660 ** in the list of denied addresses.
1662 ** Since this is the interrupt handler, we may be here
1663 ** while the access list is in the middle of being
1664 ** updated. Choose the list which is currently okay.
1665 ** See "prism2mib_priv_accessdeny()" for details.
1668 if (hw->deny.modify == 0) {
1669 cnt = hw->deny.cnt;
1670 addr = hw->deny.addr[0];
1671 } else {
1672 cnt = hw->deny.cnt1;
1673 addr = hw->deny.addr1[0];
1676 rec.status = P80211ENUM_status_successful;
1678 for (i = 0; i < cnt; i++, addr += ETH_ALEN)
1679 if (memcmp(rec.address, addr, ETH_ALEN) == 0) {
1680 rec.status = P80211ENUM_status_unspec_failure;
1681 break;
1684 break;
1688 ** If the authentication is okay, then add the MAC address to the
1689 ** list of authenticated stations. Don't add the address if it
1690 ** is already in the list. (802.11b does not seem to disallow
1691 ** a station from issuing an authentication request when the
1692 ** station is already authenticated. Does this sort of thing
1693 ** ever happen? We might as well do the check just in case.)
1696 added = 0;
1698 if (rec.status == P80211ENUM_status_successful) {
1699 for (i = 0; i < hw->authlist.cnt; i++)
1700 if (memcmp(rec.address, hw->authlist.addr[i], ETH_ALEN)
1701 == 0)
1702 break;
1704 if (i >= hw->authlist.cnt) {
1705 if (hw->authlist.cnt >= WLAN_AUTH_MAX) {
1706 rec.status = P80211ENUM_status_ap_full;
1707 } else {
1708 memcpy(hw->authlist.addr[hw->authlist.cnt],
1709 rec.address, ETH_ALEN);
1710 hw->authlist.cnt++;
1711 added = 1;
1717 ** Send back the results of the authentication. If this doesn't work,
1718 ** then make sure to remove the address from the authenticated list if
1719 ** it was added.
1722 rec.status = cpu_to_le16(rec.status);
1723 rec.algorithm = inf->info.authreq.algorithm;
1725 result = hfa384x_drvr_setconfig(hw, HFA384x_RID_AUTHENTICATESTA,
1726 &rec, sizeof(rec));
1727 if (result) {
1728 if (added)
1729 hw->authlist.cnt--;
1730 printk(KERN_ERR
1731 "setconfig(authenticatestation) failed, result=%d\n",
1732 result);
1734 return;
1737 /*----------------------------------------------------------------
1738 * prism2sta_inf_psusercnt
1740 * Handles the receipt of a PowerSaveUserCount info frame. Should
1741 * be present in APs only.
1743 * Arguments:
1744 * wlandev wlan device structure
1745 * inf ptr to info frame (contents in hfa384x order)
1747 * Returns:
1748 * nothing
1750 * Side effects:
1752 * Call context:
1753 * interrupt
1754 ----------------------------------------------------------------*/
1755 static void prism2sta_inf_psusercnt(wlandevice_t *wlandev,
1756 hfa384x_InfFrame_t *inf)
1758 hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
1760 hw->psusercount = le16_to_cpu(inf->info.psusercnt.usercnt);
1762 return;
1765 /*----------------------------------------------------------------
1766 * prism2sta_ev_info
1768 * Handles the Info event.
1770 * Arguments:
1771 * wlandev wlan device structure
1772 * inf ptr to a generic info frame
1774 * Returns:
1775 * nothing
1777 * Side effects:
1779 * Call context:
1780 * interrupt
1781 ----------------------------------------------------------------*/
1782 void prism2sta_ev_info(wlandevice_t *wlandev, hfa384x_InfFrame_t *inf)
1784 inf->infotype = le16_to_cpu(inf->infotype);
1785 /* Dispatch */
1786 switch (inf->infotype) {
1787 case HFA384x_IT_HANDOVERADDR:
1788 prism2sta_inf_handover(wlandev, inf);
1789 break;
1790 case HFA384x_IT_COMMTALLIES:
1791 prism2sta_inf_tallies(wlandev, inf);
1792 break;
1793 case HFA384x_IT_HOSTSCANRESULTS:
1794 prism2sta_inf_hostscanresults(wlandev, inf);
1795 break;
1796 case HFA384x_IT_SCANRESULTS:
1797 prism2sta_inf_scanresults(wlandev, inf);
1798 break;
1799 case HFA384x_IT_CHINFORESULTS:
1800 prism2sta_inf_chinforesults(wlandev, inf);
1801 break;
1802 case HFA384x_IT_LINKSTATUS:
1803 prism2sta_inf_linkstatus(wlandev, inf);
1804 break;
1805 case HFA384x_IT_ASSOCSTATUS:
1806 prism2sta_inf_assocstatus(wlandev, inf);
1807 break;
1808 case HFA384x_IT_AUTHREQ:
1809 prism2sta_inf_authreq(wlandev, inf);
1810 break;
1811 case HFA384x_IT_PSUSERCNT:
1812 prism2sta_inf_psusercnt(wlandev, inf);
1813 break;
1814 case HFA384x_IT_KEYIDCHANGED:
1815 printk(KERN_WARNING "Unhandled IT_KEYIDCHANGED\n");
1816 break;
1817 case HFA384x_IT_ASSOCREQ:
1818 printk(KERN_WARNING "Unhandled IT_ASSOCREQ\n");
1819 break;
1820 case HFA384x_IT_MICFAILURE:
1821 printk(KERN_WARNING "Unhandled IT_MICFAILURE\n");
1822 break;
1823 default:
1824 printk(KERN_WARNING
1825 "Unknown info type=0x%02x\n", inf->infotype);
1826 break;
1828 return;
1831 /*----------------------------------------------------------------
1832 * prism2sta_ev_txexc
1834 * Handles the TxExc event. A Transmit Exception event indicates
1835 * that the MAC's TX process was unsuccessful - so the packet did
1836 * not get transmitted.
1838 * Arguments:
1839 * wlandev wlan device structure
1840 * status tx frame status word
1842 * Returns:
1843 * nothing
1845 * Side effects:
1847 * Call context:
1848 * interrupt
1849 ----------------------------------------------------------------*/
1850 void prism2sta_ev_txexc(wlandevice_t *wlandev, u16 status)
1852 pr_debug("TxExc status=0x%x.\n", status);
1854 return;
1857 /*----------------------------------------------------------------
1858 * prism2sta_ev_tx
1860 * Handles the Tx event.
1862 * Arguments:
1863 * wlandev wlan device structure
1864 * status tx frame status word
1865 * Returns:
1866 * nothing
1868 * Side effects:
1870 * Call context:
1871 * interrupt
1872 ----------------------------------------------------------------*/
1873 void prism2sta_ev_tx(wlandevice_t *wlandev, u16 status)
1875 pr_debug("Tx Complete, status=0x%04x\n", status);
1876 /* update linux network stats */
1877 wlandev->linux_stats.tx_packets++;
1878 return;
1881 /*----------------------------------------------------------------
1882 * prism2sta_ev_rx
1884 * Handles the Rx event.
1886 * Arguments:
1887 * wlandev wlan device structure
1889 * Returns:
1890 * nothing
1892 * Side effects:
1894 * Call context:
1895 * interrupt
1896 ----------------------------------------------------------------*/
1897 void prism2sta_ev_rx(wlandevice_t *wlandev, struct sk_buff *skb)
1899 p80211netdev_rx(wlandev, skb);
1900 return;
1903 /*----------------------------------------------------------------
1904 * prism2sta_ev_alloc
1906 * Handles the Alloc event.
1908 * Arguments:
1909 * wlandev wlan device structure
1911 * Returns:
1912 * nothing
1914 * Side effects:
1916 * Call context:
1917 * interrupt
1918 ----------------------------------------------------------------*/
1919 void prism2sta_ev_alloc(wlandevice_t *wlandev)
1921 netif_wake_queue(wlandev->netdev);
1922 return;
1925 /*----------------------------------------------------------------
1926 * create_wlan
1928 * Called at module init time. This creates the wlandevice_t structure
1929 * and initializes it with relevant bits.
1931 * Arguments:
1932 * none
1934 * Returns:
1935 * the created wlandevice_t structure.
1937 * Side effects:
1938 * also allocates the priv/hw structures.
1940 * Call context:
1941 * process thread
1943 ----------------------------------------------------------------*/
1944 static wlandevice_t *create_wlan(void)
1946 wlandevice_t *wlandev = NULL;
1947 hfa384x_t *hw = NULL;
1949 /* Alloc our structures */
1950 wlandev = kmalloc(sizeof(wlandevice_t), GFP_KERNEL);
1951 hw = kmalloc(sizeof(hfa384x_t), GFP_KERNEL);
1953 if (!wlandev || !hw) {
1954 printk(KERN_ERR "%s: Memory allocation failure.\n", dev_info);
1955 kfree(wlandev);
1956 kfree(hw);
1957 return NULL;
1960 /* Clear all the structs */
1961 memset(wlandev, 0, sizeof(wlandevice_t));
1962 memset(hw, 0, sizeof(hfa384x_t));
1964 /* Initialize the network device object. */
1965 wlandev->nsdname = dev_info;
1966 wlandev->msdstate = WLAN_MSD_HWPRESENT_PENDING;
1967 wlandev->priv = hw;
1968 wlandev->open = prism2sta_open;
1969 wlandev->close = prism2sta_close;
1970 wlandev->reset = prism2sta_reset;
1971 wlandev->txframe = prism2sta_txframe;
1972 wlandev->mlmerequest = prism2sta_mlmerequest;
1973 wlandev->set_multicast_list = prism2sta_setmulticast;
1974 wlandev->tx_timeout = hfa384x_tx_timeout;
1976 wlandev->nsdcaps = P80211_NSDCAP_HWFRAGMENT | P80211_NSDCAP_AUTOJOIN;
1978 /* Initialize the device private data structure. */
1979 hw->dot11_desired_bss_type = 1;
1981 return wlandev;
1984 void prism2sta_commsqual_defer(struct work_struct *data)
1986 hfa384x_t *hw = container_of(data, struct hfa384x, commsqual_bh);
1987 wlandevice_t *wlandev = hw->wlandev;
1988 hfa384x_bytestr32_t ssid;
1989 struct p80211msg_dot11req_mibget msg;
1990 p80211item_uint32_t *mibitem = (p80211item_uint32_t *)
1991 &msg.mibattribute.data;
1992 int result = 0;
1994 if (hw->wlandev->hwremoved)
1995 goto done;
1997 /* we don't care if we're in AP mode */
1998 if ((wlandev->macmode == WLAN_MACMODE_NONE) ||
1999 (wlandev->macmode == WLAN_MACMODE_ESS_AP)) {
2000 goto done;
2003 /* It only makes sense to poll these in non-IBSS */
2004 if (wlandev->macmode != WLAN_MACMODE_IBSS_STA) {
2005 result = hfa384x_drvr_getconfig(
2006 hw, HFA384x_RID_DBMCOMMSQUALITY,
2007 &hw->qual, HFA384x_RID_DBMCOMMSQUALITY_LEN);
2009 if (result) {
2010 printk(KERN_ERR "error fetching commsqual\n");
2011 goto done;
2014 pr_debug("commsqual %d %d %d\n",
2015 le16_to_cpu(hw->qual.CQ_currBSS),
2016 le16_to_cpu(hw->qual.ASL_currBSS),
2017 le16_to_cpu(hw->qual.ANL_currFC));
2020 /* Get the signal rate */
2021 msg.msgcode = DIDmsg_dot11req_mibget;
2022 mibitem->did = DIDmib_p2_p2MAC_p2CurrentTxRate;
2023 result = p80211req_dorequest(wlandev, (u8 *) &msg);
2025 if (result) {
2026 pr_debug("get signal rate failed, result = %d\n",
2027 result);
2028 goto done;
2031 switch (mibitem->data) {
2032 case HFA384x_RATEBIT_1:
2033 hw->txrate = 10;
2034 break;
2035 case HFA384x_RATEBIT_2:
2036 hw->txrate = 20;
2037 break;
2038 case HFA384x_RATEBIT_5dot5:
2039 hw->txrate = 55;
2040 break;
2041 case HFA384x_RATEBIT_11:
2042 hw->txrate = 110;
2043 break;
2044 default:
2045 pr_debug("Bad ratebit (%d)\n", mibitem->data);
2048 /* Lastly, we need to make sure the BSSID didn't change on us */
2049 result = hfa384x_drvr_getconfig(hw,
2050 HFA384x_RID_CURRENTBSSID,
2051 wlandev->bssid, WLAN_BSSID_LEN);
2052 if (result) {
2053 pr_debug("getconfig(0x%02x) failed, result = %d\n",
2054 HFA384x_RID_CURRENTBSSID, result);
2055 goto done;
2058 result = hfa384x_drvr_getconfig(hw,
2059 HFA384x_RID_CURRENTSSID,
2060 &ssid, sizeof(ssid));
2061 if (result) {
2062 pr_debug("getconfig(0x%02x) failed, result = %d\n",
2063 HFA384x_RID_CURRENTSSID, result);
2064 goto done;
2066 prism2mgmt_bytestr2pstr((hfa384x_bytestr_t *) &ssid,
2067 (p80211pstrd_t *) &wlandev->ssid);
2069 /* Reschedule timer */
2070 mod_timer(&hw->commsqual_timer, jiffies + HZ);
2072 done:
2076 void prism2sta_commsqual_timer(unsigned long data)
2078 hfa384x_t *hw = (hfa384x_t *) data;
2080 schedule_work(&hw->commsqual_bh);