2 * Marvell Wireless LAN device driver: scan ioctl and command handling
4 * Copyright (C) 2011, Marvell International Ltd.
6 * This software file (the "File") is distributed by Marvell International
7 * Ltd. under the terms of the GNU General Public License Version 2, June 1991
8 * (the "License"). You may use, redistribute and/or modify this File in
9 * accordance with the terms and conditions of the License, a copy of which
10 * is available by writing to the Free Software Foundation, Inc.,
11 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA or on the
12 * worldwide web at http://www.gnu.org/licenses/old-licenses/gpl-2.0.txt.
14 * THE FILE IS DISTRIBUTED AS-IS, WITHOUT WARRANTY OF ANY KIND, AND THE
15 * IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE
16 * ARE EXPRESSLY DISCLAIMED. The License provides additional details about
17 * this warranty disclaimer.
28 /* The maximum number of channels the firmware can scan per command */
29 #define MWIFIEX_MAX_CHANNELS_PER_SPECIFIC_SCAN 14
31 #define MWIFIEX_CHANNELS_PER_SCAN_CMD 4
33 /* Memory needed to store a max sized Channel List TLV for a firmware scan */
34 #define CHAN_TLV_MAX_SIZE (sizeof(struct mwifiex_ie_types_header) \
35 + (MWIFIEX_MAX_CHANNELS_PER_SPECIFIC_SCAN \
36 *sizeof(struct mwifiex_chan_scan_param_set)))
38 /* Memory needed to store supported rate */
39 #define RATE_TLV_MAX_SIZE (sizeof(struct mwifiex_ie_types_rates_param_set) \
40 + HOSTCMD_SUPPORTED_RATES)
42 /* Memory needed to store a max number/size WildCard SSID TLV for a firmware
44 #define WILDCARD_SSID_TLV_MAX_SIZE \
45 (MWIFIEX_MAX_SSID_LIST_LENGTH * \
46 (sizeof(struct mwifiex_ie_types_wildcard_ssid_params) \
47 + IEEE80211_MAX_SSID_LEN))
49 /* Maximum memory needed for a mwifiex_scan_cmd_config with all TLVs at max */
50 #define MAX_SCAN_CFG_ALLOC (sizeof(struct mwifiex_scan_cmd_config) \
51 + sizeof(struct mwifiex_ie_types_num_probes) \
52 + sizeof(struct mwifiex_ie_types_htcap) \
55 + WILDCARD_SSID_TLV_MAX_SIZE)
58 union mwifiex_scan_cmd_config_tlv {
59 /* Scan configuration (variable length) */
60 struct mwifiex_scan_cmd_config config;
61 /* Max allocated block */
62 u8 config_alloc_buf[MAX_SCAN_CFG_ALLOC];
70 static u8 mwifiex_wpa_oui[CIPHER_SUITE_MAX][4] = {
71 { 0x00, 0x50, 0xf2, 0x02 }, /* TKIP */
72 { 0x00, 0x50, 0xf2, 0x04 }, /* AES */
74 static u8 mwifiex_rsn_oui[CIPHER_SUITE_MAX][4] = {
75 { 0x00, 0x0f, 0xac, 0x02 }, /* TKIP */
76 { 0x00, 0x0f, 0xac, 0x04 }, /* AES */
80 * This function parses a given IE for a given OUI.
82 * This is used to parse a WPA/RSN IE to find if it has
86 mwifiex_search_oui_in_ie(struct ie_body *iebody, u8 *oui)
90 count = iebody->ptk_cnt[0];
92 /* There could be multiple OUIs for PTK hence
94 2) Check all the OUIs for AES.
95 3) If one of them is AES then pass success. */
97 if (!memcmp(iebody->ptk_body, oui, sizeof(iebody->ptk_body)))
98 return MWIFIEX_OUI_PRESENT;
102 iebody = (struct ie_body *) ((u8 *) iebody +
103 sizeof(iebody->ptk_body));
106 pr_debug("info: %s: OUI is not found in PTK\n", __func__);
107 return MWIFIEX_OUI_NOT_PRESENT;
111 * This function checks if a given OUI is present in a RSN IE.
113 * The function first checks if a RSN IE is present or not in the
114 * BSS descriptor. It tries to locate the OUI only if such an IE is
118 mwifiex_is_rsn_oui_present(struct mwifiex_bssdescriptor *bss_desc, u32 cipher)
121 struct ie_body *iebody;
122 u8 ret = MWIFIEX_OUI_NOT_PRESENT;
124 if (((bss_desc->bcn_rsn_ie) && ((*(bss_desc->bcn_rsn_ie)).
125 ieee_hdr.element_id == WLAN_EID_RSN))) {
126 iebody = (struct ie_body *)
127 (((u8 *) bss_desc->bcn_rsn_ie->data) +
129 oui = &mwifiex_rsn_oui[cipher][0];
130 ret = mwifiex_search_oui_in_ie(iebody, oui);
138 * This function checks if a given OUI is present in a WPA IE.
140 * The function first checks if a WPA IE is present or not in the
141 * BSS descriptor. It tries to locate the OUI only if such an IE is
145 mwifiex_is_wpa_oui_present(struct mwifiex_bssdescriptor *bss_desc, u32 cipher)
148 struct ie_body *iebody;
149 u8 ret = MWIFIEX_OUI_NOT_PRESENT;
151 if (((bss_desc->bcn_wpa_ie) &&
152 ((*(bss_desc->bcn_wpa_ie)).vend_hdr.element_id ==
154 iebody = (struct ie_body *) bss_desc->bcn_wpa_ie->data;
155 oui = &mwifiex_wpa_oui[cipher][0];
156 ret = mwifiex_search_oui_in_ie(iebody, oui);
164 * This function compares two SSIDs and checks if they match.
167 mwifiex_ssid_cmp(struct cfg80211_ssid *ssid1, struct cfg80211_ssid *ssid2)
169 if (!ssid1 || !ssid2 || (ssid1->ssid_len != ssid2->ssid_len))
171 return memcmp(ssid1->ssid, ssid2->ssid, ssid1->ssid_len);
175 * This function checks if wapi is enabled in driver and scanned network is
176 * compatible with it.
179 mwifiex_is_bss_wapi(struct mwifiex_private *priv,
180 struct mwifiex_bssdescriptor *bss_desc)
182 if (priv->sec_info.wapi_enabled &&
183 (bss_desc->bcn_wapi_ie &&
184 ((*(bss_desc->bcn_wapi_ie)).ieee_hdr.element_id ==
185 WLAN_EID_BSS_AC_ACCESS_DELAY))) {
192 * This function checks if driver is configured with no security mode and
193 * scanned network is compatible with it.
196 mwifiex_is_bss_no_sec(struct mwifiex_private *priv,
197 struct mwifiex_bssdescriptor *bss_desc)
199 if (!priv->sec_info.wep_enabled && !priv->sec_info.wpa_enabled &&
200 !priv->sec_info.wpa2_enabled && ((!bss_desc->bcn_wpa_ie) ||
201 ((*(bss_desc->bcn_wpa_ie)).vend_hdr.element_id !=
203 ((!bss_desc->bcn_rsn_ie) ||
204 ((*(bss_desc->bcn_rsn_ie)).ieee_hdr.element_id !=
206 !priv->sec_info.encryption_mode && !bss_desc->privacy) {
213 * This function checks if static WEP is enabled in driver and scanned network
214 * is compatible with it.
217 mwifiex_is_bss_static_wep(struct mwifiex_private *priv,
218 struct mwifiex_bssdescriptor *bss_desc)
220 if (priv->sec_info.wep_enabled && !priv->sec_info.wpa_enabled &&
221 !priv->sec_info.wpa2_enabled && bss_desc->privacy) {
228 * This function checks if wpa is enabled in driver and scanned network is
229 * compatible with it.
232 mwifiex_is_bss_wpa(struct mwifiex_private *priv,
233 struct mwifiex_bssdescriptor *bss_desc)
235 if (!priv->sec_info.wep_enabled && priv->sec_info.wpa_enabled &&
236 !priv->sec_info.wpa2_enabled && ((bss_desc->bcn_wpa_ie) &&
237 ((*(bss_desc->bcn_wpa_ie)).vend_hdr.element_id == WLAN_EID_WPA))
239 * Privacy bit may NOT be set in some APs like
240 * LinkSys WRT54G && bss_desc->privacy
243 dev_dbg(priv->adapter->dev, "info: %s: WPA:"
244 " wpa_ie=%#x wpa2_ie=%#x WEP=%s WPA=%s WPA2=%s "
245 "EncMode=%#x privacy=%#x\n", __func__,
246 (bss_desc->bcn_wpa_ie) ?
247 (*(bss_desc->bcn_wpa_ie)).
248 vend_hdr.element_id : 0,
249 (bss_desc->bcn_rsn_ie) ?
250 (*(bss_desc->bcn_rsn_ie)).
251 ieee_hdr.element_id : 0,
252 (priv->sec_info.wep_enabled) ? "e" : "d",
253 (priv->sec_info.wpa_enabled) ? "e" : "d",
254 (priv->sec_info.wpa2_enabled) ? "e" : "d",
255 priv->sec_info.encryption_mode,
263 * This function checks if wpa2 is enabled in driver and scanned network is
264 * compatible with it.
267 mwifiex_is_bss_wpa2(struct mwifiex_private *priv,
268 struct mwifiex_bssdescriptor *bss_desc)
270 if (!priv->sec_info.wep_enabled &&
271 !priv->sec_info.wpa_enabled &&
272 priv->sec_info.wpa2_enabled &&
273 ((bss_desc->bcn_rsn_ie) &&
274 ((*(bss_desc->bcn_rsn_ie)).ieee_hdr.element_id == WLAN_EID_RSN))) {
276 * Privacy bit may NOT be set in some APs like
277 * LinkSys WRT54G && bss_desc->privacy
279 dev_dbg(priv->adapter->dev, "info: %s: WPA2: "
280 " wpa_ie=%#x wpa2_ie=%#x WEP=%s WPA=%s WPA2=%s "
281 "EncMode=%#x privacy=%#x\n", __func__,
282 (bss_desc->bcn_wpa_ie) ?
283 (*(bss_desc->bcn_wpa_ie)).
284 vend_hdr.element_id : 0,
285 (bss_desc->bcn_rsn_ie) ?
286 (*(bss_desc->bcn_rsn_ie)).
287 ieee_hdr.element_id : 0,
288 (priv->sec_info.wep_enabled) ? "e" : "d",
289 (priv->sec_info.wpa_enabled) ? "e" : "d",
290 (priv->sec_info.wpa2_enabled) ? "e" : "d",
291 priv->sec_info.encryption_mode,
299 * This function checks if adhoc AES is enabled in driver and scanned network is
300 * compatible with it.
303 mwifiex_is_bss_adhoc_aes(struct mwifiex_private *priv,
304 struct mwifiex_bssdescriptor *bss_desc)
306 if (!priv->sec_info.wep_enabled && !priv->sec_info.wpa_enabled &&
307 !priv->sec_info.wpa2_enabled &&
308 ((!bss_desc->bcn_wpa_ie) ||
309 ((*(bss_desc->bcn_wpa_ie)).vend_hdr.element_id != WLAN_EID_WPA)) &&
310 ((!bss_desc->bcn_rsn_ie) ||
311 ((*(bss_desc->bcn_rsn_ie)).ieee_hdr.element_id != WLAN_EID_RSN)) &&
312 !priv->sec_info.encryption_mode && bss_desc->privacy) {
319 * This function checks if dynamic WEP is enabled in driver and scanned network
320 * is compatible with it.
323 mwifiex_is_bss_dynamic_wep(struct mwifiex_private *priv,
324 struct mwifiex_bssdescriptor *bss_desc)
326 if (!priv->sec_info.wep_enabled && !priv->sec_info.wpa_enabled &&
327 !priv->sec_info.wpa2_enabled &&
328 ((!bss_desc->bcn_wpa_ie) ||
329 ((*(bss_desc->bcn_wpa_ie)).vend_hdr.element_id != WLAN_EID_WPA)) &&
330 ((!bss_desc->bcn_rsn_ie) ||
331 ((*(bss_desc->bcn_rsn_ie)).ieee_hdr.element_id != WLAN_EID_RSN)) &&
332 priv->sec_info.encryption_mode && bss_desc->privacy) {
333 dev_dbg(priv->adapter->dev, "info: %s: dynamic "
334 "WEP: wpa_ie=%#x wpa2_ie=%#x "
335 "EncMode=%#x privacy=%#x\n",
337 (bss_desc->bcn_wpa_ie) ?
338 (*(bss_desc->bcn_wpa_ie)).
339 vend_hdr.element_id : 0,
340 (bss_desc->bcn_rsn_ie) ?
341 (*(bss_desc->bcn_rsn_ie)).
342 ieee_hdr.element_id : 0,
343 priv->sec_info.encryption_mode,
351 * This function checks if a scanned network is compatible with the driver
354 * WEP WPA WPA2 ad-hoc encrypt Network
355 * enabled enabled enabled AES mode Privacy WPA WPA2 Compatible
356 * 0 0 0 0 NONE 0 0 0 yes No security
357 * 0 1 0 0 x 1x 1 x yes WPA (disable
359 * 0 0 1 0 x 1x x 1 yes WPA2 (disable
361 * 0 0 0 1 NONE 1 0 0 yes Ad-hoc AES
362 * 1 0 0 0 NONE 1 0 0 yes Static WEP
364 * 0 0 0 0 !=NONE 1 0 0 yes Dynamic WEP
366 * Compatibility is not matched while roaming, except for mode.
369 mwifiex_is_network_compatible(struct mwifiex_private *priv,
370 struct mwifiex_bssdescriptor *bss_desc, u32 mode)
372 struct mwifiex_adapter *adapter = priv->adapter;
374 bss_desc->disable_11n = false;
376 /* Don't check for compatibility if roaming */
377 if (priv->media_connected &&
378 (priv->bss_mode == NL80211_IFTYPE_STATION) &&
379 (bss_desc->bss_mode == NL80211_IFTYPE_STATION))
382 if (priv->wps.session_enable) {
383 dev_dbg(adapter->dev,
384 "info: return success directly in WPS period\n");
388 if (mwifiex_is_bss_wapi(priv, bss_desc)) {
389 dev_dbg(adapter->dev, "info: return success for WAPI AP\n");
393 if (bss_desc->bss_mode == mode) {
394 if (mwifiex_is_bss_no_sec(priv, bss_desc)) {
397 } else if (mwifiex_is_bss_static_wep(priv, bss_desc)) {
398 /* Static WEP enabled */
399 dev_dbg(adapter->dev, "info: Disable 11n in WEP mode.\n");
400 bss_desc->disable_11n = true;
402 } else if (mwifiex_is_bss_wpa(priv, bss_desc)) {
404 if (((priv->adapter->config_bands & BAND_GN ||
405 priv->adapter->config_bands & BAND_AN) &&
406 bss_desc->bcn_ht_cap) &&
407 !mwifiex_is_wpa_oui_present(bss_desc,
408 CIPHER_SUITE_CCMP)) {
410 if (mwifiex_is_wpa_oui_present
411 (bss_desc, CIPHER_SUITE_TKIP)) {
412 dev_dbg(adapter->dev,
413 "info: Disable 11n if AES "
414 "is not supported by AP\n");
415 bss_desc->disable_11n = true;
421 } else if (mwifiex_is_bss_wpa2(priv, bss_desc)) {
423 if (((priv->adapter->config_bands & BAND_GN ||
424 priv->adapter->config_bands & BAND_AN) &&
425 bss_desc->bcn_ht_cap) &&
426 !mwifiex_is_rsn_oui_present(bss_desc,
427 CIPHER_SUITE_CCMP)) {
429 if (mwifiex_is_rsn_oui_present
430 (bss_desc, CIPHER_SUITE_TKIP)) {
431 dev_dbg(adapter->dev,
432 "info: Disable 11n if AES "
433 "is not supported by AP\n");
434 bss_desc->disable_11n = true;
440 } else if (mwifiex_is_bss_adhoc_aes(priv, bss_desc)) {
441 /* Ad-hoc AES enabled */
443 } else if (mwifiex_is_bss_dynamic_wep(priv, bss_desc)) {
444 /* Dynamic WEP enabled */
448 /* Security doesn't match */
449 dev_dbg(adapter->dev,
450 "info: %s: failed: wpa_ie=%#x wpa2_ie=%#x WEP=%s "
451 "WPA=%s WPA2=%s EncMode=%#x privacy=%#x\n", __func__,
452 (bss_desc->bcn_wpa_ie) ?
453 (*(bss_desc->bcn_wpa_ie)).vend_hdr.element_id : 0,
454 (bss_desc->bcn_rsn_ie) ?
455 (*(bss_desc->bcn_rsn_ie)).ieee_hdr.element_id : 0,
456 (priv->sec_info.wep_enabled) ? "e" : "d",
457 (priv->sec_info.wpa_enabled) ? "e" : "d",
458 (priv->sec_info.wpa2_enabled) ? "e" : "d",
459 priv->sec_info.encryption_mode, bss_desc->privacy);
463 /* Mode doesn't match */
468 * This function creates a channel list for the driver to scan, based
469 * on region/band information.
471 * This routine is used for any scan that is not provided with a
472 * specific channel list to scan.
475 mwifiex_scan_create_channel_list(struct mwifiex_private *priv,
476 const struct mwifiex_user_scan_cfg
478 struct mwifiex_chan_scan_param_set
482 enum ieee80211_band band;
483 struct ieee80211_supported_band *sband;
484 struct ieee80211_channel *ch;
485 struct mwifiex_adapter *adapter = priv->adapter;
488 for (band = 0; (band < IEEE80211_NUM_BANDS) ; band++) {
490 if (!priv->wdev->wiphy->bands[band])
493 sband = priv->wdev->wiphy->bands[band];
495 for (i = 0; (i < sband->n_channels) ; i++) {
496 ch = &sband->channels[i];
497 if (ch->flags & IEEE80211_CHAN_DISABLED)
499 scan_chan_list[chan_idx].radio_type = band;
502 user_scan_in->chan_list[0].scan_time)
503 scan_chan_list[chan_idx].max_scan_time =
504 cpu_to_le16((u16) user_scan_in->
505 chan_list[0].scan_time);
506 else if (ch->flags & IEEE80211_CHAN_PASSIVE_SCAN)
507 scan_chan_list[chan_idx].max_scan_time =
508 cpu_to_le16(adapter->passive_scan_time);
510 scan_chan_list[chan_idx].max_scan_time =
511 cpu_to_le16(adapter->active_scan_time);
513 if (ch->flags & IEEE80211_CHAN_PASSIVE_SCAN)
514 scan_chan_list[chan_idx].chan_scan_mode_bitmap
515 |= MWIFIEX_PASSIVE_SCAN;
517 scan_chan_list[chan_idx].chan_scan_mode_bitmap
518 &= ~MWIFIEX_PASSIVE_SCAN;
519 scan_chan_list[chan_idx].chan_number =
522 scan_chan_list[chan_idx].max_scan_time =
523 cpu_to_le16(adapter->specific_scan_time);
524 scan_chan_list[chan_idx].chan_scan_mode_bitmap
525 |= MWIFIEX_DISABLE_CHAN_FILT;
534 * This function constructs and sends multiple scan config commands to
537 * Previous routines in the code flow have created a scan command configuration
538 * with any requested TLVs. This function splits the channel TLV into maximum
539 * channels supported per scan lists and sends the portion of the channel TLV,
540 * along with the other TLVs, to the firmware.
543 mwifiex_scan_channel_list(struct mwifiex_private *priv,
544 u32 max_chan_per_scan, u8 filtered_scan,
545 struct mwifiex_scan_cmd_config *scan_cfg_out,
546 struct mwifiex_ie_types_chan_list_param_set
548 struct mwifiex_chan_scan_param_set *scan_chan_list)
551 struct mwifiex_chan_scan_param_set *tmp_chan_list;
552 struct mwifiex_chan_scan_param_set *start_chan;
558 if (!scan_cfg_out || !chan_tlv_out || !scan_chan_list) {
559 dev_dbg(priv->adapter->dev,
560 "info: Scan: Null detect: %p, %p, %p\n",
561 scan_cfg_out, chan_tlv_out, scan_chan_list);
565 chan_tlv_out->header.type = cpu_to_le16(TLV_TYPE_CHANLIST);
567 /* Set the temp channel struct pointer to the start of the desired
569 tmp_chan_list = scan_chan_list;
571 /* Loop through the desired channel list, sending a new firmware scan
572 commands for each max_chan_per_scan channels (or for 1,6,11
573 individually if configured accordingly) */
574 while (tmp_chan_list->chan_number) {
578 chan_tlv_out->header.len = 0;
579 start_chan = tmp_chan_list;
583 * Construct the Channel TLV for the scan command. Continue to
584 * insert channel TLVs until:
585 * - the tlv_idx hits the maximum configured per scan command
586 * - the next channel to insert is 0 (end of desired channel
588 * - done_early is set (controlling individual scanning of
591 while (tlv_idx < max_chan_per_scan &&
592 tmp_chan_list->chan_number && !done_early) {
594 dev_dbg(priv->adapter->dev,
595 "info: Scan: Chan(%3d), Radio(%d),"
596 " Mode(%d, %d), Dur(%d)\n",
597 tmp_chan_list->chan_number,
598 tmp_chan_list->radio_type,
599 tmp_chan_list->chan_scan_mode_bitmap
600 & MWIFIEX_PASSIVE_SCAN,
601 (tmp_chan_list->chan_scan_mode_bitmap
602 & MWIFIEX_DISABLE_CHAN_FILT) >> 1,
603 le16_to_cpu(tmp_chan_list->max_scan_time));
605 /* Copy the current channel TLV to the command being
607 memcpy(chan_tlv_out->chan_scan_param + tlv_idx,
609 sizeof(chan_tlv_out->chan_scan_param));
611 /* Increment the TLV header length by the size
613 chan_tlv_out->header.len =
614 cpu_to_le16(le16_to_cpu(chan_tlv_out->header.len) +
615 (sizeof(chan_tlv_out->chan_scan_param)));
618 * The tlv buffer length is set to the number of bytes
619 * of the between the channel tlv pointer and the start
620 * of the tlv buffer. This compensates for any TLVs
621 * that were appended before the channel list.
623 scan_cfg_out->tlv_buf_len = (u32) ((u8 *) chan_tlv_out -
624 scan_cfg_out->tlv_buf);
626 /* Add the size of the channel tlv header and the data
628 scan_cfg_out->tlv_buf_len +=
629 (sizeof(chan_tlv_out->header)
630 + le16_to_cpu(chan_tlv_out->header.len));
632 /* Increment the index to the channel tlv we are
636 /* Count the total scan time per command */
638 le16_to_cpu(tmp_chan_list->max_scan_time);
642 /* Stop the loop if the *current* channel is in the
643 1,6,11 set and we are not filtering on a BSSID
645 if (!filtered_scan &&
646 (tmp_chan_list->chan_number == 1 ||
647 tmp_chan_list->chan_number == 6 ||
648 tmp_chan_list->chan_number == 11))
651 /* Increment the tmp pointer to the next channel to
655 /* Stop the loop if the *next* channel is in the 1,6,11
656 set. This will cause it to be the only channel
657 scanned on the next interation */
658 if (!filtered_scan &&
659 (tmp_chan_list->chan_number == 1 ||
660 tmp_chan_list->chan_number == 6 ||
661 tmp_chan_list->chan_number == 11))
665 /* The total scan time should be less than scan command timeout
667 if (total_scan_time > MWIFIEX_MAX_TOTAL_SCAN_TIME) {
668 dev_err(priv->adapter->dev, "total scan time %dms"
669 " is over limit (%dms), scan skipped\n",
670 total_scan_time, MWIFIEX_MAX_TOTAL_SCAN_TIME);
675 priv->adapter->scan_channels = start_chan;
677 /* Send the scan command to the firmware with the specified
679 ret = mwifiex_send_cmd_async(priv, HostCmd_CMD_802_11_SCAN,
680 HostCmd_ACT_GEN_SET, 0,
693 * This function constructs a scan command configuration structure to use
696 * Application layer or other functions can invoke network scanning
697 * with a scan configuration supplied in a user scan configuration structure.
698 * This structure is used as the basis of one or many scan command configuration
699 * commands that are sent to the command processing module and eventually to the
702 * This function creates a scan command configuration structure based on the
703 * following user supplied parameters (if present):
706 * - Number of Probes to be sent
709 * If the SSID or BSSID filter is not present, the filter is disabled/cleared.
710 * If the number of probes is not set, adapter default setting is used.
713 mwifiex_config_scan(struct mwifiex_private *priv,
714 const struct mwifiex_user_scan_cfg *user_scan_in,
715 struct mwifiex_scan_cmd_config *scan_cfg_out,
716 struct mwifiex_ie_types_chan_list_param_set **chan_list_out,
717 struct mwifiex_chan_scan_param_set *scan_chan_list,
718 u8 *max_chan_per_scan, u8 *filtered_scan,
719 u8 *scan_current_only)
721 struct mwifiex_adapter *adapter = priv->adapter;
722 struct mwifiex_ie_types_num_probes *num_probes_tlv;
723 struct mwifiex_ie_types_wildcard_ssid_params *wildcard_ssid_tlv;
724 struct mwifiex_ie_types_rates_param_set *rates_tlv;
725 const u8 zero_mac[ETH_ALEN] = { 0, 0, 0, 0, 0, 0 };
736 u8 rates[MWIFIEX_SUPPORTED_RATES];
738 struct mwifiex_ie_types_htcap *ht_cap;
740 /* The tlv_buf_len is calculated for each scan command. The TLVs added
741 in this routine will be preserved since the routine that sends the
742 command will append channelTLVs at *chan_list_out. The difference
743 between the *chan_list_out and the tlv_buf start will be used to
744 calculate the size of anything we add in this routine. */
745 scan_cfg_out->tlv_buf_len = 0;
747 /* Running tlv pointer. Assigned to chan_list_out at end of function
748 so later routines know where channels can be added to the command
750 tlv_pos = scan_cfg_out->tlv_buf;
752 /* Initialize the scan as un-filtered; the flag is later set to TRUE
753 below if a SSID or BSSID filter is sent in the command */
754 *filtered_scan = false;
756 /* Initialize the scan as not being only on the current channel. If
757 the channel list is customized, only contains one channel, and is
758 the active channel, this is set true and data flow is not halted. */
759 *scan_current_only = false;
763 /* Default the ssid_filter flag to TRUE, set false under
764 certain wildcard conditions and qualified by the existence
765 of an SSID list before marking the scan as filtered */
768 /* Set the BSS type scan filter, use Adapter setting if
770 scan_cfg_out->bss_mode =
771 (user_scan_in->bss_mode ? (u8) user_scan_in->
772 bss_mode : (u8) adapter->scan_mode);
774 /* Set the number of probes to send, use Adapter setting
777 (user_scan_in->num_probes ? user_scan_in->
778 num_probes : adapter->scan_probes);
781 * Set the BSSID filter to the incoming configuration,
782 * if non-zero. If not set, it will remain disabled
785 memcpy(scan_cfg_out->specific_bssid,
786 user_scan_in->specific_bssid,
787 sizeof(scan_cfg_out->specific_bssid));
789 for (i = 0; i < user_scan_in->num_ssids; i++) {
790 ssid_len = user_scan_in->ssid_list[i].ssid_len;
793 (struct mwifiex_ie_types_wildcard_ssid_params *)
795 wildcard_ssid_tlv->header.type =
796 cpu_to_le16(TLV_TYPE_WILDCARDSSID);
797 wildcard_ssid_tlv->header.len = cpu_to_le16(
798 (u16) (ssid_len + sizeof(wildcard_ssid_tlv->
802 * max_ssid_length = 0 tells firmware to perform
803 * specific scan for the SSID filled, whereas
804 * max_ssid_length = IEEE80211_MAX_SSID_LEN is for
808 wildcard_ssid_tlv->max_ssid_length = 0;
810 wildcard_ssid_tlv->max_ssid_length =
811 IEEE80211_MAX_SSID_LEN;
813 memcpy(wildcard_ssid_tlv->ssid,
814 user_scan_in->ssid_list[i].ssid, ssid_len);
816 tlv_pos += (sizeof(wildcard_ssid_tlv->header)
817 + le16_to_cpu(wildcard_ssid_tlv->header.len));
819 dev_dbg(adapter->dev, "info: scan: ssid[%d]: %s, %d\n",
820 i, wildcard_ssid_tlv->ssid,
821 wildcard_ssid_tlv->max_ssid_length);
823 /* Empty wildcard ssid with a maxlen will match many or
824 potentially all SSIDs (maxlen == 32), therefore do
825 not treat the scan as
827 if (!ssid_len && wildcard_ssid_tlv->max_ssid_length)
832 * The default number of channels sent in the command is low to
833 * ensure the response buffer from the firmware does not
834 * truncate scan results. That is not an issue with an SSID
835 * or BSSID filter applied to the scan results in the firmware.
837 if ((i && ssid_filter) ||
838 memcmp(scan_cfg_out->specific_bssid, &zero_mac,
840 *filtered_scan = true;
842 scan_cfg_out->bss_mode = (u8) adapter->scan_mode;
843 num_probes = adapter->scan_probes;
847 * If a specific BSSID or SSID is used, the number of channels in the
848 * scan command will be increased to the absolute maximum.
851 *max_chan_per_scan = MWIFIEX_MAX_CHANNELS_PER_SPECIFIC_SCAN;
853 *max_chan_per_scan = MWIFIEX_CHANNELS_PER_SCAN_CMD;
855 /* If the input config or adapter has the number of Probes set,
859 dev_dbg(adapter->dev, "info: scan: num_probes = %d\n",
862 num_probes_tlv = (struct mwifiex_ie_types_num_probes *) tlv_pos;
863 num_probes_tlv->header.type = cpu_to_le16(TLV_TYPE_NUMPROBES);
864 num_probes_tlv->header.len =
865 cpu_to_le16(sizeof(num_probes_tlv->num_probes));
866 num_probes_tlv->num_probes = cpu_to_le16((u16) num_probes);
868 tlv_pos += sizeof(num_probes_tlv->header) +
869 le16_to_cpu(num_probes_tlv->header.len);
873 /* Append rates tlv */
874 memset(rates, 0, sizeof(rates));
876 rates_size = mwifiex_get_supported_rates(priv, rates);
878 rates_tlv = (struct mwifiex_ie_types_rates_param_set *) tlv_pos;
879 rates_tlv->header.type = cpu_to_le16(WLAN_EID_SUPP_RATES);
880 rates_tlv->header.len = cpu_to_le16((u16) rates_size);
881 memcpy(rates_tlv->rates, rates, rates_size);
882 tlv_pos += sizeof(rates_tlv->header) + rates_size;
884 dev_dbg(adapter->dev, "info: SCAN_CMD: Rates size = %d\n", rates_size);
886 if (ISSUPP_11NENABLED(priv->adapter->fw_cap_info) &&
887 (priv->adapter->config_bands & BAND_GN ||
888 priv->adapter->config_bands & BAND_AN)) {
889 ht_cap = (struct mwifiex_ie_types_htcap *) tlv_pos;
890 memset(ht_cap, 0, sizeof(struct mwifiex_ie_types_htcap));
891 ht_cap->header.type = cpu_to_le16(WLAN_EID_HT_CAPABILITY);
893 cpu_to_le16(sizeof(struct ieee80211_ht_cap));
895 mwifiex_band_to_radio_type(priv->adapter->config_bands);
896 mwifiex_fill_cap_info(priv, radio_type, ht_cap);
897 tlv_pos += sizeof(struct mwifiex_ie_types_htcap);
900 /* Append vendor specific IE TLV */
901 mwifiex_cmd_append_vsie_tlv(priv, MWIFIEX_VSIE_MASK_SCAN, &tlv_pos);
904 * Set the output for the channel TLV to the address in the tlv buffer
905 * past any TLVs that were added in this function (SSID, num_probes).
906 * Channel TLVs will be added past this for each scan command,
907 * preserving the TLVs that were previously added.
910 (struct mwifiex_ie_types_chan_list_param_set *) tlv_pos;
912 if (user_scan_in && user_scan_in->chan_list[0].chan_number) {
914 dev_dbg(adapter->dev, "info: Scan: Using supplied channel list\n");
917 chan_idx < MWIFIEX_USER_SCAN_CHAN_MAX &&
918 user_scan_in->chan_list[chan_idx].chan_number;
921 channel = user_scan_in->chan_list[chan_idx].chan_number;
922 (scan_chan_list + chan_idx)->chan_number = channel;
925 user_scan_in->chan_list[chan_idx].radio_type;
926 (scan_chan_list + chan_idx)->radio_type = radio_type;
928 scan_type = user_scan_in->chan_list[chan_idx].scan_type;
930 if (scan_type == MWIFIEX_SCAN_TYPE_PASSIVE)
932 chan_idx)->chan_scan_mode_bitmap
933 |= MWIFIEX_PASSIVE_SCAN;
936 chan_idx)->chan_scan_mode_bitmap
937 &= ~MWIFIEX_PASSIVE_SCAN;
939 if (user_scan_in->chan_list[chan_idx].scan_time) {
940 scan_dur = (u16) user_scan_in->
941 chan_list[chan_idx].scan_time;
943 if (scan_type == MWIFIEX_SCAN_TYPE_PASSIVE)
944 scan_dur = adapter->passive_scan_time;
945 else if (*filtered_scan)
946 scan_dur = adapter->specific_scan_time;
948 scan_dur = adapter->active_scan_time;
951 (scan_chan_list + chan_idx)->min_scan_time =
952 cpu_to_le16(scan_dur);
953 (scan_chan_list + chan_idx)->max_scan_time =
954 cpu_to_le16(scan_dur);
957 /* Check if we are only scanning the current channel */
958 if ((chan_idx == 1) &&
959 (user_scan_in->chan_list[0].chan_number ==
960 priv->curr_bss_params.bss_descriptor.channel)) {
961 *scan_current_only = true;
962 dev_dbg(adapter->dev,
963 "info: Scan: Scanning current channel only\n");
967 dev_dbg(adapter->dev,
968 "info: Scan: Creating full region channel list\n");
969 mwifiex_scan_create_channel_list(priv, user_scan_in,
976 * This function inspects the scan response buffer for pointers to
979 * TLVs can be included at the end of the scan response BSS information.
981 * Data in the buffer is parsed pointers to TLVs that can potentially
982 * be passed back in the response.
985 mwifiex_ret_802_11_scan_get_tlv_ptrs(struct mwifiex_adapter *adapter,
986 struct mwifiex_ie_types_data *tlv,
987 u32 tlv_buf_size, u32 req_tlv_type,
988 struct mwifiex_ie_types_data **tlv_data)
990 struct mwifiex_ie_types_data *current_tlv;
996 tlv_buf_left = tlv_buf_size;
999 dev_dbg(adapter->dev, "info: SCAN_RESP: tlv_buf_size = %d\n",
1002 while (tlv_buf_left >= sizeof(struct mwifiex_ie_types_header)) {
1004 tlv_type = le16_to_cpu(current_tlv->header.type);
1005 tlv_len = le16_to_cpu(current_tlv->header.len);
1007 if (sizeof(tlv->header) + tlv_len > tlv_buf_left) {
1008 dev_err(adapter->dev, "SCAN_RESP: TLV buffer corrupt\n");
1012 if (req_tlv_type == tlv_type) {
1014 case TLV_TYPE_TSFTIMESTAMP:
1015 dev_dbg(adapter->dev, "info: SCAN_RESP: TSF "
1016 "timestamp TLV, len = %d\n", tlv_len);
1017 *tlv_data = (struct mwifiex_ie_types_data *)
1020 case TLV_TYPE_CHANNELBANDLIST:
1021 dev_dbg(adapter->dev, "info: SCAN_RESP: channel"
1022 " band list TLV, len = %d\n", tlv_len);
1023 *tlv_data = (struct mwifiex_ie_types_data *)
1027 dev_err(adapter->dev,
1028 "SCAN_RESP: unhandled TLV = %d\n",
1030 /* Give up, this seems corrupted */
1039 tlv_buf_left -= (sizeof(tlv->header) + tlv_len);
1041 (struct mwifiex_ie_types_data *) (current_tlv->data +
1048 * This function parses provided beacon buffer and updates
1049 * respective fields in bss descriptor structure.
1051 int mwifiex_update_bss_desc_with_ie(struct mwifiex_adapter *adapter,
1052 struct mwifiex_bssdescriptor *bss_entry)
1056 struct ieee_types_fh_param_set *fh_param_set;
1057 struct ieee_types_ds_param_set *ds_param_set;
1058 struct ieee_types_cf_param_set *cf_param_set;
1059 struct ieee_types_ibss_param_set *ibss_param_set;
1066 u8 found_data_rate_ie;
1068 struct ieee_types_vendor_specific *vendor_ie;
1069 const u8 wpa_oui[4] = { 0x00, 0x50, 0xf2, 0x01 };
1070 const u8 wmm_oui[4] = { 0x00, 0x50, 0xf2, 0x02 };
1072 found_data_rate_ie = false;
1074 current_ptr = bss_entry->beacon_buf;
1075 bytes_left = bss_entry->beacon_buf_size;
1077 /* Process variable IE */
1078 while (bytes_left >= 2) {
1079 element_id = *current_ptr;
1080 element_len = *(current_ptr + 1);
1081 total_ie_len = element_len + sizeof(struct ieee_types_header);
1083 if (bytes_left < total_ie_len) {
1084 dev_err(adapter->dev, "err: InterpretIE: in processing"
1085 " IE, bytes left < IE length\n");
1088 switch (element_id) {
1090 bss_entry->ssid.ssid_len = element_len;
1091 memcpy(bss_entry->ssid.ssid, (current_ptr + 2),
1093 dev_dbg(adapter->dev,
1094 "info: InterpretIE: ssid: %-32s\n",
1095 bss_entry->ssid.ssid);
1098 case WLAN_EID_SUPP_RATES:
1099 memcpy(bss_entry->data_rates, current_ptr + 2,
1101 memcpy(bss_entry->supported_rates, current_ptr + 2,
1103 rate_size = element_len;
1104 found_data_rate_ie = true;
1107 case WLAN_EID_FH_PARAMS:
1109 (struct ieee_types_fh_param_set *) current_ptr;
1110 memcpy(&bss_entry->phy_param_set.fh_param_set,
1112 sizeof(struct ieee_types_fh_param_set));
1115 case WLAN_EID_DS_PARAMS:
1117 (struct ieee_types_ds_param_set *) current_ptr;
1119 bss_entry->channel = ds_param_set->current_chan;
1121 memcpy(&bss_entry->phy_param_set.ds_param_set,
1123 sizeof(struct ieee_types_ds_param_set));
1126 case WLAN_EID_CF_PARAMS:
1128 (struct ieee_types_cf_param_set *) current_ptr;
1129 memcpy(&bss_entry->ss_param_set.cf_param_set,
1131 sizeof(struct ieee_types_cf_param_set));
1134 case WLAN_EID_IBSS_PARAMS:
1136 (struct ieee_types_ibss_param_set *)
1138 memcpy(&bss_entry->ss_param_set.ibss_param_set,
1140 sizeof(struct ieee_types_ibss_param_set));
1143 case WLAN_EID_ERP_INFO:
1144 bss_entry->erp_flags = *(current_ptr + 2);
1147 case WLAN_EID_EXT_SUPP_RATES:
1149 * Only process extended supported rate
1150 * if data rate is already found.
1151 * Data rate IE should come before
1152 * extended supported rate IE
1154 if (found_data_rate_ie) {
1155 if ((element_len + rate_size) >
1156 MWIFIEX_SUPPORTED_RATES)
1158 (MWIFIEX_SUPPORTED_RATES -
1161 bytes_to_copy = element_len;
1163 rate = (u8 *) bss_entry->data_rates;
1165 memcpy(rate, current_ptr + 2, bytes_to_copy);
1167 rate = (u8 *) bss_entry->supported_rates;
1169 memcpy(rate, current_ptr + 2, bytes_to_copy);
1173 case WLAN_EID_VENDOR_SPECIFIC:
1174 vendor_ie = (struct ieee_types_vendor_specific *)
1178 (vendor_ie->vend_hdr.oui, wpa_oui,
1180 bss_entry->bcn_wpa_ie =
1181 (struct ieee_types_vendor_specific *)
1183 bss_entry->wpa_offset = (u16)
1184 (current_ptr - bss_entry->beacon_buf);
1185 } else if (!memcmp(vendor_ie->vend_hdr.oui, wmm_oui,
1188 sizeof(struct ieee_types_wmm_parameter) ||
1190 sizeof(struct ieee_types_wmm_info))
1192 * Only accept and copy the WMM IE if
1193 * it matches the size expected for the
1194 * WMM Info IE or the WMM Parameter IE.
1196 memcpy((u8 *) &bss_entry->wmm_ie,
1197 current_ptr, total_ie_len);
1201 bss_entry->bcn_rsn_ie =
1202 (struct ieee_types_generic *) current_ptr;
1203 bss_entry->rsn_offset = (u16) (current_ptr -
1204 bss_entry->beacon_buf);
1206 case WLAN_EID_BSS_AC_ACCESS_DELAY:
1207 bss_entry->bcn_wapi_ie =
1208 (struct ieee_types_generic *) current_ptr;
1209 bss_entry->wapi_offset = (u16) (current_ptr -
1210 bss_entry->beacon_buf);
1212 case WLAN_EID_HT_CAPABILITY:
1213 bss_entry->bcn_ht_cap = (struct ieee80211_ht_cap *)
1215 sizeof(struct ieee_types_header));
1216 bss_entry->ht_cap_offset = (u16) (current_ptr +
1217 sizeof(struct ieee_types_header) -
1218 bss_entry->beacon_buf);
1220 case WLAN_EID_HT_OPERATION:
1221 bss_entry->bcn_ht_oper =
1222 (struct ieee80211_ht_operation *)(current_ptr +
1223 sizeof(struct ieee_types_header));
1224 bss_entry->ht_info_offset = (u16) (current_ptr +
1225 sizeof(struct ieee_types_header) -
1226 bss_entry->beacon_buf);
1228 case WLAN_EID_BSS_COEX_2040:
1229 bss_entry->bcn_bss_co_2040 = (u8 *) (current_ptr +
1230 sizeof(struct ieee_types_header));
1231 bss_entry->bss_co_2040_offset = (u16) (current_ptr +
1232 sizeof(struct ieee_types_header) -
1233 bss_entry->beacon_buf);
1235 case WLAN_EID_EXT_CAPABILITY:
1236 bss_entry->bcn_ext_cap = (u8 *) (current_ptr +
1237 sizeof(struct ieee_types_header));
1238 bss_entry->ext_cap_offset = (u16) (current_ptr +
1239 sizeof(struct ieee_types_header) -
1240 bss_entry->beacon_buf);
1246 current_ptr += element_len + 2;
1248 /* Need to account for IE ID and IE Len */
1249 bytes_left -= (element_len + 2);
1251 } /* while (bytes_left > 2) */
1256 * This function converts radio type scan parameter to a band configuration
1257 * to be used in join command.
1260 mwifiex_radio_type_to_band(u8 radio_type)
1262 switch (radio_type) {
1263 case HostCmd_SCAN_RADIO_TYPE_A:
1265 case HostCmd_SCAN_RADIO_TYPE_BG:
1272 * This is an internal function used to start a scan based on an input
1275 * This uses the input user scan configuration information when provided in
1276 * order to send the appropriate scan commands to firmware to populate or
1277 * update the internal driver scan table.
1279 static int mwifiex_scan_networks(struct mwifiex_private *priv,
1280 const struct mwifiex_user_scan_cfg *user_scan_in)
1283 struct mwifiex_adapter *adapter = priv->adapter;
1284 struct cmd_ctrl_node *cmd_node;
1285 union mwifiex_scan_cmd_config_tlv *scan_cfg_out;
1286 struct mwifiex_ie_types_chan_list_param_set *chan_list_out;
1288 struct mwifiex_chan_scan_param_set *scan_chan_list;
1290 u8 scan_current_chan_only;
1291 u8 max_chan_per_scan;
1292 unsigned long flags;
1294 if (adapter->scan_processing) {
1295 dev_dbg(adapter->dev, "cmd: Scan already in process...\n");
1299 spin_lock_irqsave(&adapter->mwifiex_cmd_lock, flags);
1300 adapter->scan_processing = true;
1301 spin_unlock_irqrestore(&adapter->mwifiex_cmd_lock, flags);
1303 if (priv->scan_block) {
1304 dev_dbg(adapter->dev,
1305 "cmd: Scan is blocked during association...\n");
1309 scan_cfg_out = kzalloc(sizeof(union mwifiex_scan_cmd_config_tlv),
1311 if (!scan_cfg_out) {
1312 dev_err(adapter->dev, "failed to alloc scan_cfg_out\n");
1316 buf_size = sizeof(struct mwifiex_chan_scan_param_set) *
1317 MWIFIEX_USER_SCAN_CHAN_MAX;
1318 scan_chan_list = kzalloc(buf_size, GFP_KERNEL);
1319 if (!scan_chan_list) {
1320 dev_err(adapter->dev, "failed to alloc scan_chan_list\n");
1321 kfree(scan_cfg_out);
1325 mwifiex_config_scan(priv, user_scan_in, &scan_cfg_out->config,
1326 &chan_list_out, scan_chan_list, &max_chan_per_scan,
1327 &filtered_scan, &scan_current_chan_only);
1329 ret = mwifiex_scan_channel_list(priv, max_chan_per_scan, filtered_scan,
1330 &scan_cfg_out->config, chan_list_out,
1333 /* Get scan command from scan_pending_q and put to cmd_pending_q */
1335 spin_lock_irqsave(&adapter->scan_pending_q_lock, flags);
1336 if (!list_empty(&adapter->scan_pending_q)) {
1337 cmd_node = list_first_entry(&adapter->scan_pending_q,
1338 struct cmd_ctrl_node, list);
1339 list_del(&cmd_node->list);
1340 spin_unlock_irqrestore(&adapter->scan_pending_q_lock,
1342 adapter->cmd_queued = cmd_node;
1343 mwifiex_insert_cmd_to_pending_q(adapter, cmd_node,
1346 spin_unlock_irqrestore(&adapter->scan_pending_q_lock,
1350 spin_lock_irqsave(&adapter->mwifiex_cmd_lock, flags);
1351 adapter->scan_processing = true;
1352 spin_unlock_irqrestore(&adapter->mwifiex_cmd_lock, flags);
1355 kfree(scan_cfg_out);
1356 kfree(scan_chan_list);
1361 * Sends IOCTL request to start a scan with user configurations.
1363 * This function allocates the IOCTL request buffer, fills it
1364 * with requisite parameters and calls the IOCTL handler.
1366 * Upon completion, it also generates a wireless event to notify
1369 int mwifiex_set_user_scan_ioctl(struct mwifiex_private *priv,
1370 struct mwifiex_user_scan_cfg *scan_req)
1374 status = mwifiex_scan_networks(priv, scan_req);
1375 queue_work(priv->adapter->workqueue, &priv->adapter->main_work);
1381 * This function prepares a scan command to be sent to the firmware.
1383 * This uses the scan command configuration sent to the command processing
1384 * module in command preparation stage to configure a scan command structure
1385 * to send to firmware.
1387 * The fixed fields specifying the BSS type and BSSID filters as well as a
1388 * variable number/length of TLVs are sent in the command to firmware.
1390 * Preparation also includes -
1391 * - Setting command ID, and proper size
1392 * - Ensuring correct endian-ness
1394 int mwifiex_cmd_802_11_scan(struct host_cmd_ds_command *cmd,
1395 struct mwifiex_scan_cmd_config *scan_cfg)
1397 struct host_cmd_ds_802_11_scan *scan_cmd = &cmd->params.scan;
1399 /* Set fixed field variables in scan command */
1400 scan_cmd->bss_mode = scan_cfg->bss_mode;
1401 memcpy(scan_cmd->bssid, scan_cfg->specific_bssid,
1402 sizeof(scan_cmd->bssid));
1403 memcpy(scan_cmd->tlv_buffer, scan_cfg->tlv_buf, scan_cfg->tlv_buf_len);
1405 cmd->command = cpu_to_le16(HostCmd_CMD_802_11_SCAN);
1407 /* Size is equal to the sizeof(fixed portions) + the TLV len + header */
1408 cmd->size = cpu_to_le16((u16) (sizeof(scan_cmd->bss_mode)
1409 + sizeof(scan_cmd->bssid)
1410 + scan_cfg->tlv_buf_len + S_DS_GEN));
1416 * This function checks compatibility of requested network with current
1419 int mwifiex_check_network_compatibility(struct mwifiex_private *priv,
1420 struct mwifiex_bssdescriptor *bss_desc)
1427 if ((mwifiex_get_cfp(priv, (u8) bss_desc->bss_band,
1428 (u16) bss_desc->channel, 0))) {
1429 switch (priv->bss_mode) {
1430 case NL80211_IFTYPE_STATION:
1431 case NL80211_IFTYPE_ADHOC:
1432 ret = mwifiex_is_network_compatible(priv, bss_desc,
1435 dev_err(priv->adapter->dev, "cannot find ssid "
1436 "%s\n", bss_desc->ssid.ssid);
1446 static int mwifiex_update_curr_bss_params(struct mwifiex_private *priv,
1447 struct cfg80211_bss *bss)
1449 struct mwifiex_bssdescriptor *bss_desc;
1451 unsigned long flags;
1453 /* Allocate and fill new bss descriptor */
1454 bss_desc = kzalloc(sizeof(struct mwifiex_bssdescriptor),
1457 dev_err(priv->adapter->dev, " failed to alloc bss_desc\n");
1461 ret = mwifiex_fill_new_bss_desc(priv, bss, bss_desc);
1465 ret = mwifiex_check_network_compatibility(priv, bss_desc);
1469 /* Update current bss descriptor parameters */
1470 spin_lock_irqsave(&priv->curr_bcn_buf_lock, flags);
1471 priv->curr_bss_params.bss_descriptor.bcn_wpa_ie = NULL;
1472 priv->curr_bss_params.bss_descriptor.wpa_offset = 0;
1473 priv->curr_bss_params.bss_descriptor.bcn_rsn_ie = NULL;
1474 priv->curr_bss_params.bss_descriptor.rsn_offset = 0;
1475 priv->curr_bss_params.bss_descriptor.bcn_wapi_ie = NULL;
1476 priv->curr_bss_params.bss_descriptor.wapi_offset = 0;
1477 priv->curr_bss_params.bss_descriptor.bcn_ht_cap = NULL;
1478 priv->curr_bss_params.bss_descriptor.ht_cap_offset =
1480 priv->curr_bss_params.bss_descriptor.bcn_ht_oper = NULL;
1481 priv->curr_bss_params.bss_descriptor.ht_info_offset =
1483 priv->curr_bss_params.bss_descriptor.bcn_bss_co_2040 =
1485 priv->curr_bss_params.bss_descriptor.
1486 bss_co_2040_offset = 0;
1487 priv->curr_bss_params.bss_descriptor.bcn_ext_cap = NULL;
1488 priv->curr_bss_params.bss_descriptor.ext_cap_offset = 0;
1489 priv->curr_bss_params.bss_descriptor.beacon_buf = NULL;
1490 priv->curr_bss_params.bss_descriptor.beacon_buf_size =
1493 /* Make a copy of current BSSID descriptor */
1494 memcpy(&priv->curr_bss_params.bss_descriptor, bss_desc,
1495 sizeof(priv->curr_bss_params.bss_descriptor));
1496 mwifiex_save_curr_bcn(priv);
1497 spin_unlock_irqrestore(&priv->curr_bcn_buf_lock, flags);
1505 * This function handles the command response of scan.
1507 * The response buffer for the scan command has the following
1510 * .-------------------------------------------------------------.
1511 * | Header (4 * sizeof(t_u16)): Standard command response hdr |
1512 * .-------------------------------------------------------------.
1513 * | BufSize (t_u16) : sizeof the BSS Description data |
1514 * .-------------------------------------------------------------.
1515 * | NumOfSet (t_u8) : Number of BSS Descs returned |
1516 * .-------------------------------------------------------------.
1517 * | BSSDescription data (variable, size given in BufSize) |
1518 * .-------------------------------------------------------------.
1519 * | TLV data (variable, size calculated using Header->Size, |
1520 * | BufSize and sizeof the fixed fields above) |
1521 * .-------------------------------------------------------------.
1523 int mwifiex_ret_802_11_scan(struct mwifiex_private *priv,
1524 struct host_cmd_ds_command *resp)
1527 struct mwifiex_adapter *adapter = priv->adapter;
1528 struct cmd_ctrl_node *cmd_node;
1529 struct host_cmd_ds_802_11_scan_rsp *scan_rsp;
1530 struct mwifiex_ie_types_data *tlv_data;
1531 struct mwifiex_ie_types_tsf_timestamp *tsf_tlv;
1537 struct mwifiex_chan_freq_power *cfp;
1538 struct mwifiex_ie_types_chan_band_list_param_set *chan_band_tlv;
1539 struct chan_band_param_set *chan_band;
1541 unsigned long flags;
1542 struct cfg80211_bss *bss;
1544 is_bgscan_resp = (le16_to_cpu(resp->command)
1545 == HostCmd_CMD_802_11_BG_SCAN_QUERY);
1547 scan_rsp = &resp->params.bg_scan_query_resp.scan_resp;
1549 scan_rsp = &resp->params.scan_resp;
1552 if (scan_rsp->number_of_sets > MWIFIEX_MAX_AP) {
1553 dev_err(adapter->dev, "SCAN_RESP: too many AP returned (%d)\n",
1554 scan_rsp->number_of_sets);
1559 bytes_left = le16_to_cpu(scan_rsp->bss_descript_size);
1560 dev_dbg(adapter->dev, "info: SCAN_RESP: bss_descript_size %d\n",
1563 scan_resp_size = le16_to_cpu(resp->size);
1565 dev_dbg(adapter->dev,
1566 "info: SCAN_RESP: returned %d APs before parsing\n",
1567 scan_rsp->number_of_sets);
1569 bss_info = scan_rsp->bss_desc_and_tlv_buffer;
1572 * The size of the TLV buffer is equal to the entire command response
1573 * size (scan_resp_size) minus the fixed fields (sizeof()'s), the
1574 * BSS Descriptions (bss_descript_size as bytesLef) and the command
1575 * response header (S_DS_GEN)
1577 tlv_buf_size = scan_resp_size - (bytes_left
1578 + sizeof(scan_rsp->bss_descript_size)
1579 + sizeof(scan_rsp->number_of_sets)
1582 tlv_data = (struct mwifiex_ie_types_data *) (scan_rsp->
1583 bss_desc_and_tlv_buffer +
1586 /* Search the TLV buffer space in the scan response for any valid
1588 mwifiex_ret_802_11_scan_get_tlv_ptrs(adapter, tlv_data, tlv_buf_size,
1589 TLV_TYPE_TSFTIMESTAMP,
1590 (struct mwifiex_ie_types_data **)
1593 /* Search the TLV buffer space in the scan response for any valid
1595 mwifiex_ret_802_11_scan_get_tlv_ptrs(adapter, tlv_data, tlv_buf_size,
1596 TLV_TYPE_CHANNELBANDLIST,
1597 (struct mwifiex_ie_types_data **)
1600 for (idx = 0; idx < scan_rsp->number_of_sets && bytes_left; idx++) {
1607 u16 beacon_size = 0;
1611 u16 cap_info_bitmap;
1614 struct mwifiex_bcn_param *bcn_param;
1615 struct mwifiex_bss_priv *bss_priv;
1617 if (bytes_left >= sizeof(beacon_size)) {
1618 /* Extract & convert beacon size from command buffer */
1619 memcpy(&beacon_size, bss_info, sizeof(beacon_size));
1620 bytes_left -= sizeof(beacon_size);
1621 bss_info += sizeof(beacon_size);
1624 if (!beacon_size || beacon_size > bytes_left) {
1625 bss_info += bytes_left;
1630 /* Initialize the current working beacon pointer for this BSS
1632 current_ptr = bss_info;
1634 /* Advance the return beacon pointer past the current beacon */
1635 bss_info += beacon_size;
1636 bytes_left -= beacon_size;
1638 curr_bcn_bytes = beacon_size;
1641 * First 5 fields are bssid, RSSI, time stamp, beacon interval,
1642 * and capability information
1644 if (curr_bcn_bytes < sizeof(struct mwifiex_bcn_param)) {
1645 dev_err(adapter->dev,
1646 "InterpretIE: not enough bytes left\n");
1649 bcn_param = (struct mwifiex_bcn_param *)current_ptr;
1650 current_ptr += sizeof(*bcn_param);
1651 curr_bcn_bytes -= sizeof(*bcn_param);
1653 memcpy(bssid, bcn_param->bssid, ETH_ALEN);
1655 rssi = (s32) bcn_param->rssi;
1656 rssi = (-rssi) * 100; /* Convert dBm to mBm */
1657 dev_dbg(adapter->dev, "info: InterpretIE: RSSI=%d\n", rssi);
1659 timestamp = le64_to_cpu(bcn_param->timestamp);
1660 beacon_period = le16_to_cpu(bcn_param->beacon_period);
1662 cap_info_bitmap = le16_to_cpu(bcn_param->cap_info_bitmap);
1663 dev_dbg(adapter->dev, "info: InterpretIE: capabilities=0x%X\n",
1666 /* Rest of the current buffer are IE's */
1667 ie_buf = current_ptr;
1668 ie_len = curr_bcn_bytes;
1669 dev_dbg(adapter->dev,
1670 "info: InterpretIE: IELength for this AP = %d\n",
1673 while (curr_bcn_bytes >= sizeof(struct ieee_types_header)) {
1674 u8 element_id, element_len;
1676 element_id = *current_ptr;
1677 element_len = *(current_ptr + 1);
1678 if (curr_bcn_bytes < element_len +
1679 sizeof(struct ieee_types_header)) {
1680 dev_err(priv->adapter->dev,
1681 "%s: bytes left < IE length\n",
1685 if (element_id == WLAN_EID_DS_PARAMS) {
1686 channel = *(u8 *) (current_ptr +
1687 sizeof(struct ieee_types_header));
1691 current_ptr += element_len +
1692 sizeof(struct ieee_types_header);
1693 curr_bcn_bytes -= element_len +
1694 sizeof(struct ieee_types_header);
1698 * If the TSF TLV was appended to the scan results, save this
1699 * entry's TSF value in the fw_tsf field. It is the firmware's
1700 * TSF value at the time the beacon or probe response was
1704 memcpy(&fw_tsf, &tsf_tlv->tsf_data[idx * TSF_DATA_SIZE],
1708 struct ieee80211_channel *chan;
1712 if (chan_band_tlv) {
1714 &chan_band_tlv->chan_band_param[idx];
1715 band = mwifiex_radio_type_to_band(
1716 chan_band->radio_type
1717 & (BIT(0) | BIT(1)));
1720 cfp = mwifiex_get_cfp(priv, band, channel, 0);
1722 freq = cfp ? cfp->freq : 0;
1724 chan = ieee80211_get_channel(priv->wdev->wiphy, freq);
1726 if (chan && !(chan->flags & IEEE80211_CHAN_DISABLED)) {
1727 bss = cfg80211_inform_bss(priv->wdev->wiphy,
1728 chan, bssid, timestamp,
1729 cap_info_bitmap, beacon_period,
1730 ie_buf, ie_len, rssi, GFP_KERNEL);
1731 bss_priv = (struct mwifiex_bss_priv *)bss->priv;
1732 bss_priv->band = band;
1733 bss_priv->fw_tsf = fw_tsf;
1734 if (priv->media_connected &&
1736 priv->curr_bss_params.bss_descriptor
1737 .mac_address, ETH_ALEN))
1738 mwifiex_update_curr_bss_params(priv,
1740 cfg80211_put_bss(bss);
1743 dev_dbg(adapter->dev, "missing BSS channel IE\n");
1747 spin_lock_irqsave(&adapter->scan_pending_q_lock, flags);
1748 if (list_empty(&adapter->scan_pending_q)) {
1749 spin_unlock_irqrestore(&adapter->scan_pending_q_lock, flags);
1750 spin_lock_irqsave(&adapter->mwifiex_cmd_lock, flags);
1751 adapter->scan_processing = false;
1752 spin_unlock_irqrestore(&adapter->mwifiex_cmd_lock, flags);
1754 /* Need to indicate IOCTL complete */
1755 if (adapter->curr_cmd->wait_q_enabled) {
1756 adapter->cmd_wait_q.status = 0;
1757 mwifiex_complete_cmd(adapter, adapter->curr_cmd);
1759 if (priv->report_scan_result)
1760 priv->report_scan_result = false;
1761 if (priv->scan_pending_on_block) {
1762 priv->scan_pending_on_block = false;
1763 up(&priv->async_sem);
1766 if (priv->user_scan_cfg) {
1767 dev_dbg(priv->adapter->dev,
1768 "info: %s: sending scan results\n", __func__);
1769 cfg80211_scan_done(priv->scan_request, 0);
1770 priv->scan_request = NULL;
1771 kfree(priv->user_scan_cfg);
1772 priv->user_scan_cfg = NULL;
1775 /* Get scan command from scan_pending_q and put to
1777 cmd_node = list_first_entry(&adapter->scan_pending_q,
1778 struct cmd_ctrl_node, list);
1779 list_del(&cmd_node->list);
1780 spin_unlock_irqrestore(&adapter->scan_pending_q_lock, flags);
1782 mwifiex_insert_cmd_to_pending_q(adapter, cmd_node, true);
1790 * This function prepares command for background scan query.
1792 * Preparation includes -
1793 * - Setting command ID and proper size
1794 * - Setting background scan flush parameter
1795 * - Ensuring correct endian-ness
1797 int mwifiex_cmd_802_11_bg_scan_query(struct host_cmd_ds_command *cmd)
1799 struct host_cmd_ds_802_11_bg_scan_query *bg_query =
1800 &cmd->params.bg_scan_query;
1802 cmd->command = cpu_to_le16(HostCmd_CMD_802_11_BG_SCAN_QUERY);
1803 cmd->size = cpu_to_le16(sizeof(struct host_cmd_ds_802_11_bg_scan_query)
1806 bg_query->flush = 1;
1812 * This function inserts scan command node to the scan pending queue.
1815 mwifiex_queue_scan_cmd(struct mwifiex_private *priv,
1816 struct cmd_ctrl_node *cmd_node)
1818 struct mwifiex_adapter *adapter = priv->adapter;
1819 unsigned long flags;
1821 cmd_node->wait_q_enabled = true;
1822 cmd_node->condition = &adapter->scan_wait_q_woken;
1823 spin_lock_irqsave(&adapter->scan_pending_q_lock, flags);
1824 list_add_tail(&cmd_node->list, &adapter->scan_pending_q);
1825 spin_unlock_irqrestore(&adapter->scan_pending_q_lock, flags);
1829 * This function sends a scan command for all available channels to the
1830 * firmware, filtered on a specific SSID.
1832 static int mwifiex_scan_specific_ssid(struct mwifiex_private *priv,
1833 struct cfg80211_ssid *req_ssid)
1835 struct mwifiex_adapter *adapter = priv->adapter;
1837 struct mwifiex_user_scan_cfg *scan_cfg;
1842 if (adapter->scan_processing) {
1843 dev_dbg(adapter->dev, "cmd: Scan already in process...\n");
1847 if (priv->scan_block) {
1848 dev_dbg(adapter->dev,
1849 "cmd: Scan is blocked during association...\n");
1853 scan_cfg = kzalloc(sizeof(struct mwifiex_user_scan_cfg), GFP_KERNEL);
1855 dev_err(adapter->dev, "failed to alloc scan_cfg\n");
1859 scan_cfg->ssid_list = req_ssid;
1860 scan_cfg->num_ssids = 1;
1862 ret = mwifiex_scan_networks(priv, scan_cfg);
1869 * Sends IOCTL request to start a scan.
1871 * This function allocates the IOCTL request buffer, fills it
1872 * with requisite parameters and calls the IOCTL handler.
1874 * Scan command can be issued for both normal scan and specific SSID
1875 * scan, depending upon whether an SSID is provided or not.
1877 int mwifiex_request_scan(struct mwifiex_private *priv,
1878 struct cfg80211_ssid *req_ssid)
1882 if (down_interruptible(&priv->async_sem)) {
1883 dev_err(priv->adapter->dev, "%s: acquire semaphore\n",
1887 priv->scan_pending_on_block = true;
1889 priv->adapter->scan_wait_q_woken = false;
1891 if (req_ssid && req_ssid->ssid_len != 0)
1892 /* Specific SSID scan */
1893 ret = mwifiex_scan_specific_ssid(priv, req_ssid);
1896 ret = mwifiex_scan_networks(priv, NULL);
1899 ret = mwifiex_wait_queue_complete(priv->adapter);
1902 priv->scan_pending_on_block = false;
1903 up(&priv->async_sem);
1910 * This function appends the vendor specific IE TLV to a buffer.
1913 mwifiex_cmd_append_vsie_tlv(struct mwifiex_private *priv,
1914 u16 vsie_mask, u8 **buffer)
1916 int id, ret_len = 0;
1917 struct mwifiex_ie_types_vendor_param_set *vs_param_set;
1925 * Traverse through the saved vendor specific IE array and append
1926 * the selected(scan/assoc/adhoc) IE as TLV to the command
1928 for (id = 0; id < MWIFIEX_MAX_VSIE_NUM; id++) {
1929 if (priv->vs_ie[id].mask & vsie_mask) {
1931 (struct mwifiex_ie_types_vendor_param_set *)
1933 vs_param_set->header.type =
1934 cpu_to_le16(TLV_TYPE_PASSTHROUGH);
1935 vs_param_set->header.len =
1936 cpu_to_le16((((u16) priv->vs_ie[id].ie[1])
1938 memcpy(vs_param_set->ie, priv->vs_ie[id].ie,
1939 le16_to_cpu(vs_param_set->header.len));
1940 *buffer += le16_to_cpu(vs_param_set->header.len) +
1941 sizeof(struct mwifiex_ie_types_header);
1942 ret_len += le16_to_cpu(vs_param_set->header.len) +
1943 sizeof(struct mwifiex_ie_types_header);
1950 * This function saves a beacon buffer of the current BSS descriptor.
1952 * The current beacon buffer is saved so that it can be restored in the
1953 * following cases that makes the beacon buffer not to contain the current
1954 * ssid's beacon buffer.
1955 * - The current ssid was not found somehow in the last scan.
1956 * - The current ssid was the last entry of the scan table and overloaded.
1959 mwifiex_save_curr_bcn(struct mwifiex_private *priv)
1961 struct mwifiex_bssdescriptor *curr_bss =
1962 &priv->curr_bss_params.bss_descriptor;
1964 if (!curr_bss->beacon_buf_size)
1967 /* allocate beacon buffer at 1st time; or if it's size has changed */
1968 if (!priv->curr_bcn_buf ||
1969 priv->curr_bcn_size != curr_bss->beacon_buf_size) {
1970 priv->curr_bcn_size = curr_bss->beacon_buf_size;
1972 kfree(priv->curr_bcn_buf);
1973 priv->curr_bcn_buf = kmalloc(curr_bss->beacon_buf_size,
1975 if (!priv->curr_bcn_buf) {
1976 dev_err(priv->adapter->dev,
1977 "failed to alloc curr_bcn_buf\n");
1982 memcpy(priv->curr_bcn_buf, curr_bss->beacon_buf,
1983 curr_bss->beacon_buf_size);
1984 dev_dbg(priv->adapter->dev, "info: current beacon saved %d\n",
1985 priv->curr_bcn_size);
1987 curr_bss->beacon_buf = priv->curr_bcn_buf;
1989 /* adjust the pointers in the current BSS descriptor */
1990 if (curr_bss->bcn_wpa_ie)
1991 curr_bss->bcn_wpa_ie =
1992 (struct ieee_types_vendor_specific *)
1993 (curr_bss->beacon_buf +
1994 curr_bss->wpa_offset);
1996 if (curr_bss->bcn_rsn_ie)
1997 curr_bss->bcn_rsn_ie = (struct ieee_types_generic *)
1998 (curr_bss->beacon_buf +
1999 curr_bss->rsn_offset);
2001 if (curr_bss->bcn_ht_cap)
2002 curr_bss->bcn_ht_cap = (struct ieee80211_ht_cap *)
2003 (curr_bss->beacon_buf +
2004 curr_bss->ht_cap_offset);
2006 if (curr_bss->bcn_ht_oper)
2007 curr_bss->bcn_ht_oper = (struct ieee80211_ht_operation *)
2008 (curr_bss->beacon_buf +
2009 curr_bss->ht_info_offset);
2011 if (curr_bss->bcn_bss_co_2040)
2012 curr_bss->bcn_bss_co_2040 =
2013 (u8 *) (curr_bss->beacon_buf +
2014 curr_bss->bss_co_2040_offset);
2016 if (curr_bss->bcn_ext_cap)
2017 curr_bss->bcn_ext_cap = (u8 *) (curr_bss->beacon_buf +
2018 curr_bss->ext_cap_offset);
2022 * This function frees the current BSS descriptor beacon buffer.
2025 mwifiex_free_curr_bcn(struct mwifiex_private *priv)
2027 kfree(priv->curr_bcn_buf);
2028 priv->curr_bcn_buf = NULL;