2 * Marvell Wireless LAN device driver: scan ioctl and command handling
4 * Copyright (C) 2011, Marvell International Ltd.
6 * This software file (the "File") is distributed by Marvell International
7 * Ltd. under the terms of the GNU General Public License Version 2, June 1991
8 * (the "License"). You may use, redistribute and/or modify this File in
9 * accordance with the terms and conditions of the License, a copy of which
10 * is available by writing to the Free Software Foundation, Inc.,
11 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA or on the
12 * worldwide web at http://www.gnu.org/licenses/old-licenses/gpl-2.0.txt.
14 * THE FILE IS DISTRIBUTED AS-IS, WITHOUT WARRANTY OF ANY KIND, AND THE
15 * IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE
16 * ARE EXPRESSLY DISCLAIMED. The License provides additional details about
17 * this warranty disclaimer.
28 /* The maximum number of channels the firmware can scan per command */
29 #define MWIFIEX_MAX_CHANNELS_PER_SPECIFIC_SCAN 14
31 #define MWIFIEX_DEF_CHANNELS_PER_SCAN_CMD 4
32 #define MWIFIEX_LIMIT_1_CHANNEL_PER_SCAN_CMD 15
33 #define MWIFIEX_LIMIT_2_CHANNELS_PER_SCAN_CMD 27
34 #define MWIFIEX_LIMIT_3_CHANNELS_PER_SCAN_CMD 35
36 /* Memory needed to store a max sized Channel List TLV for a firmware scan */
37 #define CHAN_TLV_MAX_SIZE (sizeof(struct mwifiex_ie_types_header) \
38 + (MWIFIEX_MAX_CHANNELS_PER_SPECIFIC_SCAN \
39 *sizeof(struct mwifiex_chan_scan_param_set)))
41 /* Memory needed to store supported rate */
42 #define RATE_TLV_MAX_SIZE (sizeof(struct mwifiex_ie_types_rates_param_set) \
43 + HOSTCMD_SUPPORTED_RATES)
45 /* Memory needed to store a max number/size WildCard SSID TLV for a firmware
47 #define WILDCARD_SSID_TLV_MAX_SIZE \
48 (MWIFIEX_MAX_SSID_LIST_LENGTH * \
49 (sizeof(struct mwifiex_ie_types_wildcard_ssid_params) \
50 + IEEE80211_MAX_SSID_LEN))
52 /* Maximum memory needed for a mwifiex_scan_cmd_config with all TLVs at max */
53 #define MAX_SCAN_CFG_ALLOC (sizeof(struct mwifiex_scan_cmd_config) \
54 + sizeof(struct mwifiex_ie_types_num_probes) \
55 + sizeof(struct mwifiex_ie_types_htcap) \
58 + WILDCARD_SSID_TLV_MAX_SIZE)
61 union mwifiex_scan_cmd_config_tlv {
62 /* Scan configuration (variable length) */
63 struct mwifiex_scan_cmd_config config;
64 /* Max allocated block */
65 u8 config_alloc_buf[MAX_SCAN_CFG_ALLOC];
73 static u8 mwifiex_wpa_oui[CIPHER_SUITE_MAX][4] = {
74 { 0x00, 0x50, 0xf2, 0x02 }, /* TKIP */
75 { 0x00, 0x50, 0xf2, 0x04 }, /* AES */
77 static u8 mwifiex_rsn_oui[CIPHER_SUITE_MAX][4] = {
78 { 0x00, 0x0f, 0xac, 0x02 }, /* TKIP */
79 { 0x00, 0x0f, 0xac, 0x04 }, /* AES */
83 * This function parses a given IE for a given OUI.
85 * This is used to parse a WPA/RSN IE to find if it has
89 mwifiex_search_oui_in_ie(struct ie_body *iebody, u8 *oui)
93 count = iebody->ptk_cnt[0];
95 /* There could be multiple OUIs for PTK hence
97 2) Check all the OUIs for AES.
98 3) If one of them is AES then pass success. */
100 if (!memcmp(iebody->ptk_body, oui, sizeof(iebody->ptk_body)))
101 return MWIFIEX_OUI_PRESENT;
105 iebody = (struct ie_body *) ((u8 *) iebody +
106 sizeof(iebody->ptk_body));
109 pr_debug("info: %s: OUI is not found in PTK\n", __func__);
110 return MWIFIEX_OUI_NOT_PRESENT;
114 * This function checks if a given OUI is present in a RSN IE.
116 * The function first checks if a RSN IE is present or not in the
117 * BSS descriptor. It tries to locate the OUI only if such an IE is
121 mwifiex_is_rsn_oui_present(struct mwifiex_bssdescriptor *bss_desc, u32 cipher)
124 struct ie_body *iebody;
125 u8 ret = MWIFIEX_OUI_NOT_PRESENT;
127 if (((bss_desc->bcn_rsn_ie) && ((*(bss_desc->bcn_rsn_ie)).
128 ieee_hdr.element_id == WLAN_EID_RSN))) {
129 iebody = (struct ie_body *)
130 (((u8 *) bss_desc->bcn_rsn_ie->data) +
132 oui = &mwifiex_rsn_oui[cipher][0];
133 ret = mwifiex_search_oui_in_ie(iebody, oui);
141 * This function checks if a given OUI is present in a WPA IE.
143 * The function first checks if a WPA IE is present or not in the
144 * BSS descriptor. It tries to locate the OUI only if such an IE is
148 mwifiex_is_wpa_oui_present(struct mwifiex_bssdescriptor *bss_desc, u32 cipher)
151 struct ie_body *iebody;
152 u8 ret = MWIFIEX_OUI_NOT_PRESENT;
154 if (((bss_desc->bcn_wpa_ie) &&
155 ((*(bss_desc->bcn_wpa_ie)).vend_hdr.element_id ==
157 iebody = (struct ie_body *) bss_desc->bcn_wpa_ie->data;
158 oui = &mwifiex_wpa_oui[cipher][0];
159 ret = mwifiex_search_oui_in_ie(iebody, oui);
167 * This function compares two SSIDs and checks if they match.
170 mwifiex_ssid_cmp(struct cfg80211_ssid *ssid1, struct cfg80211_ssid *ssid2)
172 if (!ssid1 || !ssid2 || (ssid1->ssid_len != ssid2->ssid_len))
174 return memcmp(ssid1->ssid, ssid2->ssid, ssid1->ssid_len);
178 * This function checks if wapi is enabled in driver and scanned network is
179 * compatible with it.
182 mwifiex_is_bss_wapi(struct mwifiex_private *priv,
183 struct mwifiex_bssdescriptor *bss_desc)
185 if (priv->sec_info.wapi_enabled &&
186 (bss_desc->bcn_wapi_ie &&
187 ((*(bss_desc->bcn_wapi_ie)).ieee_hdr.element_id ==
188 WLAN_EID_BSS_AC_ACCESS_DELAY))) {
195 * This function checks if driver is configured with no security mode and
196 * scanned network is compatible with it.
199 mwifiex_is_bss_no_sec(struct mwifiex_private *priv,
200 struct mwifiex_bssdescriptor *bss_desc)
202 if (!priv->sec_info.wep_enabled && !priv->sec_info.wpa_enabled &&
203 !priv->sec_info.wpa2_enabled && ((!bss_desc->bcn_wpa_ie) ||
204 ((*(bss_desc->bcn_wpa_ie)).vend_hdr.element_id !=
206 ((!bss_desc->bcn_rsn_ie) ||
207 ((*(bss_desc->bcn_rsn_ie)).ieee_hdr.element_id !=
209 !priv->sec_info.encryption_mode && !bss_desc->privacy) {
216 * This function checks if static WEP is enabled in driver and scanned network
217 * is compatible with it.
220 mwifiex_is_bss_static_wep(struct mwifiex_private *priv,
221 struct mwifiex_bssdescriptor *bss_desc)
223 if (priv->sec_info.wep_enabled && !priv->sec_info.wpa_enabled &&
224 !priv->sec_info.wpa2_enabled && bss_desc->privacy) {
231 * This function checks if wpa is enabled in driver and scanned network is
232 * compatible with it.
235 mwifiex_is_bss_wpa(struct mwifiex_private *priv,
236 struct mwifiex_bssdescriptor *bss_desc)
238 if (!priv->sec_info.wep_enabled && priv->sec_info.wpa_enabled &&
239 !priv->sec_info.wpa2_enabled && ((bss_desc->bcn_wpa_ie) &&
240 ((*(bss_desc->bcn_wpa_ie)).vend_hdr.element_id == WLAN_EID_WPA))
242 * Privacy bit may NOT be set in some APs like
243 * LinkSys WRT54G && bss_desc->privacy
246 dev_dbg(priv->adapter->dev, "info: %s: WPA:"
247 " wpa_ie=%#x wpa2_ie=%#x WEP=%s WPA=%s WPA2=%s "
248 "EncMode=%#x privacy=%#x\n", __func__,
249 (bss_desc->bcn_wpa_ie) ?
250 (*(bss_desc->bcn_wpa_ie)).
251 vend_hdr.element_id : 0,
252 (bss_desc->bcn_rsn_ie) ?
253 (*(bss_desc->bcn_rsn_ie)).
254 ieee_hdr.element_id : 0,
255 (priv->sec_info.wep_enabled) ? "e" : "d",
256 (priv->sec_info.wpa_enabled) ? "e" : "d",
257 (priv->sec_info.wpa2_enabled) ? "e" : "d",
258 priv->sec_info.encryption_mode,
266 * This function checks if wpa2 is enabled in driver and scanned network is
267 * compatible with it.
270 mwifiex_is_bss_wpa2(struct mwifiex_private *priv,
271 struct mwifiex_bssdescriptor *bss_desc)
273 if (!priv->sec_info.wep_enabled &&
274 !priv->sec_info.wpa_enabled &&
275 priv->sec_info.wpa2_enabled &&
276 ((bss_desc->bcn_rsn_ie) &&
277 ((*(bss_desc->bcn_rsn_ie)).ieee_hdr.element_id == WLAN_EID_RSN))) {
279 * Privacy bit may NOT be set in some APs like
280 * LinkSys WRT54G && bss_desc->privacy
282 dev_dbg(priv->adapter->dev, "info: %s: WPA2: "
283 " wpa_ie=%#x wpa2_ie=%#x WEP=%s WPA=%s WPA2=%s "
284 "EncMode=%#x privacy=%#x\n", __func__,
285 (bss_desc->bcn_wpa_ie) ?
286 (*(bss_desc->bcn_wpa_ie)).
287 vend_hdr.element_id : 0,
288 (bss_desc->bcn_rsn_ie) ?
289 (*(bss_desc->bcn_rsn_ie)).
290 ieee_hdr.element_id : 0,
291 (priv->sec_info.wep_enabled) ? "e" : "d",
292 (priv->sec_info.wpa_enabled) ? "e" : "d",
293 (priv->sec_info.wpa2_enabled) ? "e" : "d",
294 priv->sec_info.encryption_mode,
302 * This function checks if adhoc AES is enabled in driver and scanned network is
303 * compatible with it.
306 mwifiex_is_bss_adhoc_aes(struct mwifiex_private *priv,
307 struct mwifiex_bssdescriptor *bss_desc)
309 if (!priv->sec_info.wep_enabled && !priv->sec_info.wpa_enabled &&
310 !priv->sec_info.wpa2_enabled &&
311 ((!bss_desc->bcn_wpa_ie) ||
312 ((*(bss_desc->bcn_wpa_ie)).vend_hdr.element_id != WLAN_EID_WPA)) &&
313 ((!bss_desc->bcn_rsn_ie) ||
314 ((*(bss_desc->bcn_rsn_ie)).ieee_hdr.element_id != WLAN_EID_RSN)) &&
315 !priv->sec_info.encryption_mode && bss_desc->privacy) {
322 * This function checks if dynamic WEP is enabled in driver and scanned network
323 * is compatible with it.
326 mwifiex_is_bss_dynamic_wep(struct mwifiex_private *priv,
327 struct mwifiex_bssdescriptor *bss_desc)
329 if (!priv->sec_info.wep_enabled && !priv->sec_info.wpa_enabled &&
330 !priv->sec_info.wpa2_enabled &&
331 ((!bss_desc->bcn_wpa_ie) ||
332 ((*(bss_desc->bcn_wpa_ie)).vend_hdr.element_id != WLAN_EID_WPA)) &&
333 ((!bss_desc->bcn_rsn_ie) ||
334 ((*(bss_desc->bcn_rsn_ie)).ieee_hdr.element_id != WLAN_EID_RSN)) &&
335 priv->sec_info.encryption_mode && bss_desc->privacy) {
336 dev_dbg(priv->adapter->dev, "info: %s: dynamic "
337 "WEP: wpa_ie=%#x wpa2_ie=%#x "
338 "EncMode=%#x privacy=%#x\n",
340 (bss_desc->bcn_wpa_ie) ?
341 (*(bss_desc->bcn_wpa_ie)).
342 vend_hdr.element_id : 0,
343 (bss_desc->bcn_rsn_ie) ?
344 (*(bss_desc->bcn_rsn_ie)).
345 ieee_hdr.element_id : 0,
346 priv->sec_info.encryption_mode,
354 * This function checks if a scanned network is compatible with the driver
357 * WEP WPA WPA2 ad-hoc encrypt Network
358 * enabled enabled enabled AES mode Privacy WPA WPA2 Compatible
359 * 0 0 0 0 NONE 0 0 0 yes No security
360 * 0 1 0 0 x 1x 1 x yes WPA (disable
362 * 0 0 1 0 x 1x x 1 yes WPA2 (disable
364 * 0 0 0 1 NONE 1 0 0 yes Ad-hoc AES
365 * 1 0 0 0 NONE 1 0 0 yes Static WEP
367 * 0 0 0 0 !=NONE 1 0 0 yes Dynamic WEP
369 * Compatibility is not matched while roaming, except for mode.
372 mwifiex_is_network_compatible(struct mwifiex_private *priv,
373 struct mwifiex_bssdescriptor *bss_desc, u32 mode)
375 struct mwifiex_adapter *adapter = priv->adapter;
377 bss_desc->disable_11n = false;
379 /* Don't check for compatibility if roaming */
380 if (priv->media_connected &&
381 (priv->bss_mode == NL80211_IFTYPE_STATION) &&
382 (bss_desc->bss_mode == NL80211_IFTYPE_STATION))
385 if (priv->wps.session_enable) {
386 dev_dbg(adapter->dev,
387 "info: return success directly in WPS period\n");
391 if (mwifiex_is_bss_wapi(priv, bss_desc)) {
392 dev_dbg(adapter->dev, "info: return success for WAPI AP\n");
396 if (bss_desc->bss_mode == mode) {
397 if (mwifiex_is_bss_no_sec(priv, bss_desc)) {
400 } else if (mwifiex_is_bss_static_wep(priv, bss_desc)) {
401 /* Static WEP enabled */
402 dev_dbg(adapter->dev, "info: Disable 11n in WEP mode.\n");
403 bss_desc->disable_11n = true;
405 } else if (mwifiex_is_bss_wpa(priv, bss_desc)) {
407 if (((priv->adapter->config_bands & BAND_GN ||
408 priv->adapter->config_bands & BAND_AN) &&
409 bss_desc->bcn_ht_cap) &&
410 !mwifiex_is_wpa_oui_present(bss_desc,
411 CIPHER_SUITE_CCMP)) {
413 if (mwifiex_is_wpa_oui_present
414 (bss_desc, CIPHER_SUITE_TKIP)) {
415 dev_dbg(adapter->dev,
416 "info: Disable 11n if AES "
417 "is not supported by AP\n");
418 bss_desc->disable_11n = true;
424 } else if (mwifiex_is_bss_wpa2(priv, bss_desc)) {
426 if (((priv->adapter->config_bands & BAND_GN ||
427 priv->adapter->config_bands & BAND_AN) &&
428 bss_desc->bcn_ht_cap) &&
429 !mwifiex_is_rsn_oui_present(bss_desc,
430 CIPHER_SUITE_CCMP)) {
432 if (mwifiex_is_rsn_oui_present
433 (bss_desc, CIPHER_SUITE_TKIP)) {
434 dev_dbg(adapter->dev,
435 "info: Disable 11n if AES "
436 "is not supported by AP\n");
437 bss_desc->disable_11n = true;
443 } else if (mwifiex_is_bss_adhoc_aes(priv, bss_desc)) {
444 /* Ad-hoc AES enabled */
446 } else if (mwifiex_is_bss_dynamic_wep(priv, bss_desc)) {
447 /* Dynamic WEP enabled */
451 /* Security doesn't match */
452 dev_dbg(adapter->dev,
453 "info: %s: failed: wpa_ie=%#x wpa2_ie=%#x WEP=%s "
454 "WPA=%s WPA2=%s EncMode=%#x privacy=%#x\n", __func__,
455 (bss_desc->bcn_wpa_ie) ?
456 (*(bss_desc->bcn_wpa_ie)).vend_hdr.element_id : 0,
457 (bss_desc->bcn_rsn_ie) ?
458 (*(bss_desc->bcn_rsn_ie)).ieee_hdr.element_id : 0,
459 (priv->sec_info.wep_enabled) ? "e" : "d",
460 (priv->sec_info.wpa_enabled) ? "e" : "d",
461 (priv->sec_info.wpa2_enabled) ? "e" : "d",
462 priv->sec_info.encryption_mode, bss_desc->privacy);
466 /* Mode doesn't match */
471 * This function creates a channel list for the driver to scan, based
472 * on region/band information.
474 * This routine is used for any scan that is not provided with a
475 * specific channel list to scan.
478 mwifiex_scan_create_channel_list(struct mwifiex_private *priv,
479 const struct mwifiex_user_scan_cfg
481 struct mwifiex_chan_scan_param_set
485 enum ieee80211_band band;
486 struct ieee80211_supported_band *sband;
487 struct ieee80211_channel *ch;
488 struct mwifiex_adapter *adapter = priv->adapter;
491 for (band = 0; (band < IEEE80211_NUM_BANDS) ; band++) {
493 if (!priv->wdev->wiphy->bands[band])
496 sband = priv->wdev->wiphy->bands[band];
498 for (i = 0; (i < sband->n_channels) ; i++) {
499 ch = &sband->channels[i];
500 if (ch->flags & IEEE80211_CHAN_DISABLED)
502 scan_chan_list[chan_idx].radio_type = band;
505 user_scan_in->chan_list[0].scan_time)
506 scan_chan_list[chan_idx].max_scan_time =
507 cpu_to_le16((u16) user_scan_in->
508 chan_list[0].scan_time);
509 else if (ch->flags & IEEE80211_CHAN_PASSIVE_SCAN)
510 scan_chan_list[chan_idx].max_scan_time =
511 cpu_to_le16(adapter->passive_scan_time);
513 scan_chan_list[chan_idx].max_scan_time =
514 cpu_to_le16(adapter->active_scan_time);
516 if (ch->flags & IEEE80211_CHAN_PASSIVE_SCAN)
517 scan_chan_list[chan_idx].chan_scan_mode_bitmap
518 |= MWIFIEX_PASSIVE_SCAN;
520 scan_chan_list[chan_idx].chan_scan_mode_bitmap
521 &= ~MWIFIEX_PASSIVE_SCAN;
522 scan_chan_list[chan_idx].chan_number =
525 scan_chan_list[chan_idx].max_scan_time =
526 cpu_to_le16(adapter->specific_scan_time);
527 scan_chan_list[chan_idx].chan_scan_mode_bitmap
528 |= MWIFIEX_DISABLE_CHAN_FILT;
538 * This function constructs and sends multiple scan config commands to
541 * Previous routines in the code flow have created a scan command configuration
542 * with any requested TLVs. This function splits the channel TLV into maximum
543 * channels supported per scan lists and sends the portion of the channel TLV,
544 * along with the other TLVs, to the firmware.
547 mwifiex_scan_channel_list(struct mwifiex_private *priv,
548 u32 max_chan_per_scan, u8 filtered_scan,
549 struct mwifiex_scan_cmd_config *scan_cfg_out,
550 struct mwifiex_ie_types_chan_list_param_set
552 struct mwifiex_chan_scan_param_set *scan_chan_list)
555 struct mwifiex_chan_scan_param_set *tmp_chan_list;
556 struct mwifiex_chan_scan_param_set *start_chan;
562 if (!scan_cfg_out || !chan_tlv_out || !scan_chan_list) {
563 dev_dbg(priv->adapter->dev,
564 "info: Scan: Null detect: %p, %p, %p\n",
565 scan_cfg_out, chan_tlv_out, scan_chan_list);
569 chan_tlv_out->header.type = cpu_to_le16(TLV_TYPE_CHANLIST);
571 /* Set the temp channel struct pointer to the start of the desired
573 tmp_chan_list = scan_chan_list;
575 /* Loop through the desired channel list, sending a new firmware scan
576 commands for each max_chan_per_scan channels (or for 1,6,11
577 individually if configured accordingly) */
578 while (tmp_chan_list->chan_number) {
582 chan_tlv_out->header.len = 0;
583 start_chan = tmp_chan_list;
587 * Construct the Channel TLV for the scan command. Continue to
588 * insert channel TLVs until:
589 * - the tlv_idx hits the maximum configured per scan command
590 * - the next channel to insert is 0 (end of desired channel
592 * - done_early is set (controlling individual scanning of
595 while (tlv_idx < max_chan_per_scan &&
596 tmp_chan_list->chan_number && !done_early) {
598 dev_dbg(priv->adapter->dev,
599 "info: Scan: Chan(%3d), Radio(%d),"
600 " Mode(%d, %d), Dur(%d)\n",
601 tmp_chan_list->chan_number,
602 tmp_chan_list->radio_type,
603 tmp_chan_list->chan_scan_mode_bitmap
604 & MWIFIEX_PASSIVE_SCAN,
605 (tmp_chan_list->chan_scan_mode_bitmap
606 & MWIFIEX_DISABLE_CHAN_FILT) >> 1,
607 le16_to_cpu(tmp_chan_list->max_scan_time));
609 /* Copy the current channel TLV to the command being
611 memcpy(chan_tlv_out->chan_scan_param + tlv_idx,
613 sizeof(chan_tlv_out->chan_scan_param));
615 /* Increment the TLV header length by the size
617 chan_tlv_out->header.len =
618 cpu_to_le16(le16_to_cpu(chan_tlv_out->header.len) +
619 (sizeof(chan_tlv_out->chan_scan_param)));
622 * The tlv buffer length is set to the number of bytes
623 * of the between the channel tlv pointer and the start
624 * of the tlv buffer. This compensates for any TLVs
625 * that were appended before the channel list.
627 scan_cfg_out->tlv_buf_len = (u32) ((u8 *) chan_tlv_out -
628 scan_cfg_out->tlv_buf);
630 /* Add the size of the channel tlv header and the data
632 scan_cfg_out->tlv_buf_len +=
633 (sizeof(chan_tlv_out->header)
634 + le16_to_cpu(chan_tlv_out->header.len));
636 /* Increment the index to the channel tlv we are
640 /* Count the total scan time per command */
642 le16_to_cpu(tmp_chan_list->max_scan_time);
646 /* Stop the loop if the *current* channel is in the
647 1,6,11 set and we are not filtering on a BSSID
649 if (!filtered_scan &&
650 (tmp_chan_list->chan_number == 1 ||
651 tmp_chan_list->chan_number == 6 ||
652 tmp_chan_list->chan_number == 11))
655 /* Increment the tmp pointer to the next channel to
659 /* Stop the loop if the *next* channel is in the 1,6,11
660 set. This will cause it to be the only channel
661 scanned on the next interation */
662 if (!filtered_scan &&
663 (tmp_chan_list->chan_number == 1 ||
664 tmp_chan_list->chan_number == 6 ||
665 tmp_chan_list->chan_number == 11))
669 /* The total scan time should be less than scan command timeout
671 if (total_scan_time > MWIFIEX_MAX_TOTAL_SCAN_TIME) {
672 dev_err(priv->adapter->dev, "total scan time %dms"
673 " is over limit (%dms), scan skipped\n",
674 total_scan_time, MWIFIEX_MAX_TOTAL_SCAN_TIME);
679 priv->adapter->scan_channels = start_chan;
681 /* Send the scan command to the firmware with the specified
683 ret = mwifiex_send_cmd_async(priv, HostCmd_CMD_802_11_SCAN,
684 HostCmd_ACT_GEN_SET, 0,
697 * This function constructs a scan command configuration structure to use
700 * Application layer or other functions can invoke network scanning
701 * with a scan configuration supplied in a user scan configuration structure.
702 * This structure is used as the basis of one or many scan command configuration
703 * commands that are sent to the command processing module and eventually to the
706 * This function creates a scan command configuration structure based on the
707 * following user supplied parameters (if present):
710 * - Number of Probes to be sent
713 * If the SSID or BSSID filter is not present, the filter is disabled/cleared.
714 * If the number of probes is not set, adapter default setting is used.
717 mwifiex_config_scan(struct mwifiex_private *priv,
718 const struct mwifiex_user_scan_cfg *user_scan_in,
719 struct mwifiex_scan_cmd_config *scan_cfg_out,
720 struct mwifiex_ie_types_chan_list_param_set **chan_list_out,
721 struct mwifiex_chan_scan_param_set *scan_chan_list,
722 u8 *max_chan_per_scan, u8 *filtered_scan,
723 u8 *scan_current_only)
725 struct mwifiex_adapter *adapter = priv->adapter;
726 struct mwifiex_ie_types_num_probes *num_probes_tlv;
727 struct mwifiex_ie_types_wildcard_ssid_params *wildcard_ssid_tlv;
728 struct mwifiex_ie_types_rates_param_set *rates_tlv;
729 const u8 zero_mac[ETH_ALEN] = { 0, 0, 0, 0, 0, 0 };
741 u8 rates[MWIFIEX_SUPPORTED_RATES];
743 struct mwifiex_ie_types_htcap *ht_cap;
745 /* The tlv_buf_len is calculated for each scan command. The TLVs added
746 in this routine will be preserved since the routine that sends the
747 command will append channelTLVs at *chan_list_out. The difference
748 between the *chan_list_out and the tlv_buf start will be used to
749 calculate the size of anything we add in this routine. */
750 scan_cfg_out->tlv_buf_len = 0;
752 /* Running tlv pointer. Assigned to chan_list_out at end of function
753 so later routines know where channels can be added to the command
755 tlv_pos = scan_cfg_out->tlv_buf;
757 /* Initialize the scan as un-filtered; the flag is later set to TRUE
758 below if a SSID or BSSID filter is sent in the command */
759 *filtered_scan = false;
761 /* Initialize the scan as not being only on the current channel. If
762 the channel list is customized, only contains one channel, and is
763 the active channel, this is set true and data flow is not halted. */
764 *scan_current_only = false;
768 /* Default the ssid_filter flag to TRUE, set false under
769 certain wildcard conditions and qualified by the existence
770 of an SSID list before marking the scan as filtered */
773 /* Set the BSS type scan filter, use Adapter setting if
775 scan_cfg_out->bss_mode =
776 (user_scan_in->bss_mode ? (u8) user_scan_in->
777 bss_mode : (u8) adapter->scan_mode);
779 /* Set the number of probes to send, use Adapter setting
782 (user_scan_in->num_probes ? user_scan_in->
783 num_probes : adapter->scan_probes);
786 * Set the BSSID filter to the incoming configuration,
787 * if non-zero. If not set, it will remain disabled
790 memcpy(scan_cfg_out->specific_bssid,
791 user_scan_in->specific_bssid,
792 sizeof(scan_cfg_out->specific_bssid));
794 for (i = 0; i < user_scan_in->num_ssids; i++) {
795 ssid_len = user_scan_in->ssid_list[i].ssid_len;
798 (struct mwifiex_ie_types_wildcard_ssid_params *)
800 wildcard_ssid_tlv->header.type =
801 cpu_to_le16(TLV_TYPE_WILDCARDSSID);
802 wildcard_ssid_tlv->header.len = cpu_to_le16(
803 (u16) (ssid_len + sizeof(wildcard_ssid_tlv->
807 * max_ssid_length = 0 tells firmware to perform
808 * specific scan for the SSID filled, whereas
809 * max_ssid_length = IEEE80211_MAX_SSID_LEN is for
813 wildcard_ssid_tlv->max_ssid_length = 0;
815 wildcard_ssid_tlv->max_ssid_length =
816 IEEE80211_MAX_SSID_LEN;
818 memcpy(wildcard_ssid_tlv->ssid,
819 user_scan_in->ssid_list[i].ssid, ssid_len);
821 tlv_pos += (sizeof(wildcard_ssid_tlv->header)
822 + le16_to_cpu(wildcard_ssid_tlv->header.len));
824 dev_dbg(adapter->dev, "info: scan: ssid[%d]: %s, %d\n",
825 i, wildcard_ssid_tlv->ssid,
826 wildcard_ssid_tlv->max_ssid_length);
828 /* Empty wildcard ssid with a maxlen will match many or
829 potentially all SSIDs (maxlen == 32), therefore do
830 not treat the scan as
832 if (!ssid_len && wildcard_ssid_tlv->max_ssid_length)
837 * The default number of channels sent in the command is low to
838 * ensure the response buffer from the firmware does not
839 * truncate scan results. That is not an issue with an SSID
840 * or BSSID filter applied to the scan results in the firmware.
842 if ((i && ssid_filter) ||
843 memcmp(scan_cfg_out->specific_bssid, &zero_mac,
845 *filtered_scan = true;
847 scan_cfg_out->bss_mode = (u8) adapter->scan_mode;
848 num_probes = adapter->scan_probes;
852 * If a specific BSSID or SSID is used, the number of channels in the
853 * scan command will be increased to the absolute maximum.
856 *max_chan_per_scan = MWIFIEX_MAX_CHANNELS_PER_SPECIFIC_SCAN;
858 *max_chan_per_scan = MWIFIEX_DEF_CHANNELS_PER_SCAN_CMD;
860 /* If the input config or adapter has the number of Probes set,
864 dev_dbg(adapter->dev, "info: scan: num_probes = %d\n",
867 num_probes_tlv = (struct mwifiex_ie_types_num_probes *) tlv_pos;
868 num_probes_tlv->header.type = cpu_to_le16(TLV_TYPE_NUMPROBES);
869 num_probes_tlv->header.len =
870 cpu_to_le16(sizeof(num_probes_tlv->num_probes));
871 num_probes_tlv->num_probes = cpu_to_le16((u16) num_probes);
873 tlv_pos += sizeof(num_probes_tlv->header) +
874 le16_to_cpu(num_probes_tlv->header.len);
878 /* Append rates tlv */
879 memset(rates, 0, sizeof(rates));
881 rates_size = mwifiex_get_supported_rates(priv, rates);
883 rates_tlv = (struct mwifiex_ie_types_rates_param_set *) tlv_pos;
884 rates_tlv->header.type = cpu_to_le16(WLAN_EID_SUPP_RATES);
885 rates_tlv->header.len = cpu_to_le16((u16) rates_size);
886 memcpy(rates_tlv->rates, rates, rates_size);
887 tlv_pos += sizeof(rates_tlv->header) + rates_size;
889 dev_dbg(adapter->dev, "info: SCAN_CMD: Rates size = %d\n", rates_size);
891 if (ISSUPP_11NENABLED(priv->adapter->fw_cap_info) &&
892 (priv->adapter->config_bands & BAND_GN ||
893 priv->adapter->config_bands & BAND_AN)) {
894 ht_cap = (struct mwifiex_ie_types_htcap *) tlv_pos;
895 memset(ht_cap, 0, sizeof(struct mwifiex_ie_types_htcap));
896 ht_cap->header.type = cpu_to_le16(WLAN_EID_HT_CAPABILITY);
898 cpu_to_le16(sizeof(struct ieee80211_ht_cap));
900 mwifiex_band_to_radio_type(priv->adapter->config_bands);
901 mwifiex_fill_cap_info(priv, radio_type, ht_cap);
902 tlv_pos += sizeof(struct mwifiex_ie_types_htcap);
905 /* Append vendor specific IE TLV */
906 mwifiex_cmd_append_vsie_tlv(priv, MWIFIEX_VSIE_MASK_SCAN, &tlv_pos);
909 * Set the output for the channel TLV to the address in the tlv buffer
910 * past any TLVs that were added in this function (SSID, num_probes).
911 * Channel TLVs will be added past this for each scan command,
912 * preserving the TLVs that were previously added.
915 (struct mwifiex_ie_types_chan_list_param_set *) tlv_pos;
917 if (user_scan_in && user_scan_in->chan_list[0].chan_number) {
919 dev_dbg(adapter->dev, "info: Scan: Using supplied channel list\n");
922 chan_idx < MWIFIEX_USER_SCAN_CHAN_MAX &&
923 user_scan_in->chan_list[chan_idx].chan_number;
926 channel = user_scan_in->chan_list[chan_idx].chan_number;
927 (scan_chan_list + chan_idx)->chan_number = channel;
930 user_scan_in->chan_list[chan_idx].radio_type;
931 (scan_chan_list + chan_idx)->radio_type = radio_type;
933 scan_type = user_scan_in->chan_list[chan_idx].scan_type;
935 if (scan_type == MWIFIEX_SCAN_TYPE_PASSIVE)
937 chan_idx)->chan_scan_mode_bitmap
938 |= MWIFIEX_PASSIVE_SCAN;
941 chan_idx)->chan_scan_mode_bitmap
942 &= ~MWIFIEX_PASSIVE_SCAN;
944 if (user_scan_in->chan_list[chan_idx].scan_time) {
945 scan_dur = (u16) user_scan_in->
946 chan_list[chan_idx].scan_time;
948 if (scan_type == MWIFIEX_SCAN_TYPE_PASSIVE)
949 scan_dur = adapter->passive_scan_time;
950 else if (*filtered_scan)
951 scan_dur = adapter->specific_scan_time;
953 scan_dur = adapter->active_scan_time;
956 (scan_chan_list + chan_idx)->min_scan_time =
957 cpu_to_le16(scan_dur);
958 (scan_chan_list + chan_idx)->max_scan_time =
959 cpu_to_le16(scan_dur);
962 /* Check if we are only scanning the current channel */
963 if ((chan_idx == 1) &&
964 (user_scan_in->chan_list[0].chan_number ==
965 priv->curr_bss_params.bss_descriptor.channel)) {
966 *scan_current_only = true;
967 dev_dbg(adapter->dev,
968 "info: Scan: Scanning current channel only\n");
972 dev_dbg(adapter->dev,
973 "info: Scan: Creating full region channel list\n");
974 chan_num = mwifiex_scan_create_channel_list(priv, user_scan_in,
980 * In associated state we will reduce the number of channels scanned per
981 * scan command to avoid any traffic delay/loss. This number is decided
982 * based on total number of channels to be scanned due to constraints
983 * of command buffers.
985 if (priv->media_connected) {
986 if (chan_num < MWIFIEX_LIMIT_1_CHANNEL_PER_SCAN_CMD)
987 *max_chan_per_scan = 1;
988 else if (chan_num < MWIFIEX_LIMIT_2_CHANNELS_PER_SCAN_CMD)
989 *max_chan_per_scan = 2;
990 else if (chan_num < MWIFIEX_LIMIT_3_CHANNELS_PER_SCAN_CMD)
991 *max_chan_per_scan = 3;
993 *max_chan_per_scan = 4;
998 * This function inspects the scan response buffer for pointers to
1001 * TLVs can be included at the end of the scan response BSS information.
1003 * Data in the buffer is parsed pointers to TLVs that can potentially
1004 * be passed back in the response.
1007 mwifiex_ret_802_11_scan_get_tlv_ptrs(struct mwifiex_adapter *adapter,
1008 struct mwifiex_ie_types_data *tlv,
1009 u32 tlv_buf_size, u32 req_tlv_type,
1010 struct mwifiex_ie_types_data **tlv_data)
1012 struct mwifiex_ie_types_data *current_tlv;
1018 tlv_buf_left = tlv_buf_size;
1021 dev_dbg(adapter->dev, "info: SCAN_RESP: tlv_buf_size = %d\n",
1024 while (tlv_buf_left >= sizeof(struct mwifiex_ie_types_header)) {
1026 tlv_type = le16_to_cpu(current_tlv->header.type);
1027 tlv_len = le16_to_cpu(current_tlv->header.len);
1029 if (sizeof(tlv->header) + tlv_len > tlv_buf_left) {
1030 dev_err(adapter->dev, "SCAN_RESP: TLV buffer corrupt\n");
1034 if (req_tlv_type == tlv_type) {
1036 case TLV_TYPE_TSFTIMESTAMP:
1037 dev_dbg(adapter->dev, "info: SCAN_RESP: TSF "
1038 "timestamp TLV, len = %d\n", tlv_len);
1039 *tlv_data = (struct mwifiex_ie_types_data *)
1042 case TLV_TYPE_CHANNELBANDLIST:
1043 dev_dbg(adapter->dev, "info: SCAN_RESP: channel"
1044 " band list TLV, len = %d\n", tlv_len);
1045 *tlv_data = (struct mwifiex_ie_types_data *)
1049 dev_err(adapter->dev,
1050 "SCAN_RESP: unhandled TLV = %d\n",
1052 /* Give up, this seems corrupted */
1061 tlv_buf_left -= (sizeof(tlv->header) + tlv_len);
1063 (struct mwifiex_ie_types_data *) (current_tlv->data +
1070 * This function parses provided beacon buffer and updates
1071 * respective fields in bss descriptor structure.
1073 int mwifiex_update_bss_desc_with_ie(struct mwifiex_adapter *adapter,
1074 struct mwifiex_bssdescriptor *bss_entry)
1078 struct ieee_types_fh_param_set *fh_param_set;
1079 struct ieee_types_ds_param_set *ds_param_set;
1080 struct ieee_types_cf_param_set *cf_param_set;
1081 struct ieee_types_ibss_param_set *ibss_param_set;
1088 u8 found_data_rate_ie;
1090 struct ieee_types_vendor_specific *vendor_ie;
1091 const u8 wpa_oui[4] = { 0x00, 0x50, 0xf2, 0x01 };
1092 const u8 wmm_oui[4] = { 0x00, 0x50, 0xf2, 0x02 };
1094 found_data_rate_ie = false;
1096 current_ptr = bss_entry->beacon_buf;
1097 bytes_left = bss_entry->beacon_buf_size;
1099 /* Process variable IE */
1100 while (bytes_left >= 2) {
1101 element_id = *current_ptr;
1102 element_len = *(current_ptr + 1);
1103 total_ie_len = element_len + sizeof(struct ieee_types_header);
1105 if (bytes_left < total_ie_len) {
1106 dev_err(adapter->dev, "err: InterpretIE: in processing"
1107 " IE, bytes left < IE length\n");
1110 switch (element_id) {
1112 bss_entry->ssid.ssid_len = element_len;
1113 memcpy(bss_entry->ssid.ssid, (current_ptr + 2),
1115 dev_dbg(adapter->dev,
1116 "info: InterpretIE: ssid: %-32s\n",
1117 bss_entry->ssid.ssid);
1120 case WLAN_EID_SUPP_RATES:
1121 memcpy(bss_entry->data_rates, current_ptr + 2,
1123 memcpy(bss_entry->supported_rates, current_ptr + 2,
1125 rate_size = element_len;
1126 found_data_rate_ie = true;
1129 case WLAN_EID_FH_PARAMS:
1131 (struct ieee_types_fh_param_set *) current_ptr;
1132 memcpy(&bss_entry->phy_param_set.fh_param_set,
1134 sizeof(struct ieee_types_fh_param_set));
1137 case WLAN_EID_DS_PARAMS:
1139 (struct ieee_types_ds_param_set *) current_ptr;
1141 bss_entry->channel = ds_param_set->current_chan;
1143 memcpy(&bss_entry->phy_param_set.ds_param_set,
1145 sizeof(struct ieee_types_ds_param_set));
1148 case WLAN_EID_CF_PARAMS:
1150 (struct ieee_types_cf_param_set *) current_ptr;
1151 memcpy(&bss_entry->ss_param_set.cf_param_set,
1153 sizeof(struct ieee_types_cf_param_set));
1156 case WLAN_EID_IBSS_PARAMS:
1158 (struct ieee_types_ibss_param_set *)
1160 memcpy(&bss_entry->ss_param_set.ibss_param_set,
1162 sizeof(struct ieee_types_ibss_param_set));
1165 case WLAN_EID_ERP_INFO:
1166 bss_entry->erp_flags = *(current_ptr + 2);
1169 case WLAN_EID_EXT_SUPP_RATES:
1171 * Only process extended supported rate
1172 * if data rate is already found.
1173 * Data rate IE should come before
1174 * extended supported rate IE
1176 if (found_data_rate_ie) {
1177 if ((element_len + rate_size) >
1178 MWIFIEX_SUPPORTED_RATES)
1180 (MWIFIEX_SUPPORTED_RATES -
1183 bytes_to_copy = element_len;
1185 rate = (u8 *) bss_entry->data_rates;
1187 memcpy(rate, current_ptr + 2, bytes_to_copy);
1189 rate = (u8 *) bss_entry->supported_rates;
1191 memcpy(rate, current_ptr + 2, bytes_to_copy);
1195 case WLAN_EID_VENDOR_SPECIFIC:
1196 vendor_ie = (struct ieee_types_vendor_specific *)
1200 (vendor_ie->vend_hdr.oui, wpa_oui,
1202 bss_entry->bcn_wpa_ie =
1203 (struct ieee_types_vendor_specific *)
1205 bss_entry->wpa_offset = (u16)
1206 (current_ptr - bss_entry->beacon_buf);
1207 } else if (!memcmp(vendor_ie->vend_hdr.oui, wmm_oui,
1210 sizeof(struct ieee_types_wmm_parameter) ||
1212 sizeof(struct ieee_types_wmm_info))
1214 * Only accept and copy the WMM IE if
1215 * it matches the size expected for the
1216 * WMM Info IE or the WMM Parameter IE.
1218 memcpy((u8 *) &bss_entry->wmm_ie,
1219 current_ptr, total_ie_len);
1223 bss_entry->bcn_rsn_ie =
1224 (struct ieee_types_generic *) current_ptr;
1225 bss_entry->rsn_offset = (u16) (current_ptr -
1226 bss_entry->beacon_buf);
1228 case WLAN_EID_BSS_AC_ACCESS_DELAY:
1229 bss_entry->bcn_wapi_ie =
1230 (struct ieee_types_generic *) current_ptr;
1231 bss_entry->wapi_offset = (u16) (current_ptr -
1232 bss_entry->beacon_buf);
1234 case WLAN_EID_HT_CAPABILITY:
1235 bss_entry->bcn_ht_cap = (struct ieee80211_ht_cap *)
1237 sizeof(struct ieee_types_header));
1238 bss_entry->ht_cap_offset = (u16) (current_ptr +
1239 sizeof(struct ieee_types_header) -
1240 bss_entry->beacon_buf);
1242 case WLAN_EID_HT_INFORMATION:
1243 bss_entry->bcn_ht_info = (struct ieee80211_ht_info *)
1245 sizeof(struct ieee_types_header));
1246 bss_entry->ht_info_offset = (u16) (current_ptr +
1247 sizeof(struct ieee_types_header) -
1248 bss_entry->beacon_buf);
1250 case WLAN_EID_BSS_COEX_2040:
1251 bss_entry->bcn_bss_co_2040 = (u8 *) (current_ptr +
1252 sizeof(struct ieee_types_header));
1253 bss_entry->bss_co_2040_offset = (u16) (current_ptr +
1254 sizeof(struct ieee_types_header) -
1255 bss_entry->beacon_buf);
1257 case WLAN_EID_EXT_CAPABILITY:
1258 bss_entry->bcn_ext_cap = (u8 *) (current_ptr +
1259 sizeof(struct ieee_types_header));
1260 bss_entry->ext_cap_offset = (u16) (current_ptr +
1261 sizeof(struct ieee_types_header) -
1262 bss_entry->beacon_buf);
1268 current_ptr += element_len + 2;
1270 /* Need to account for IE ID and IE Len */
1271 bytes_left -= (element_len + 2);
1273 } /* while (bytes_left > 2) */
1278 * This function converts radio type scan parameter to a band configuration
1279 * to be used in join command.
1282 mwifiex_radio_type_to_band(u8 radio_type)
1284 switch (radio_type) {
1285 case HostCmd_SCAN_RADIO_TYPE_A:
1287 case HostCmd_SCAN_RADIO_TYPE_BG:
1294 * This is an internal function used to start a scan based on an input
1297 * This uses the input user scan configuration information when provided in
1298 * order to send the appropriate scan commands to firmware to populate or
1299 * update the internal driver scan table.
1301 int mwifiex_scan_networks(struct mwifiex_private *priv,
1302 const struct mwifiex_user_scan_cfg *user_scan_in)
1305 struct mwifiex_adapter *adapter = priv->adapter;
1306 struct cmd_ctrl_node *cmd_node;
1307 union mwifiex_scan_cmd_config_tlv *scan_cfg_out;
1308 struct mwifiex_ie_types_chan_list_param_set *chan_list_out;
1310 struct mwifiex_chan_scan_param_set *scan_chan_list;
1312 u8 scan_current_chan_only;
1313 u8 max_chan_per_scan;
1314 unsigned long flags;
1316 if (adapter->scan_processing) {
1317 dev_err(adapter->dev, "cmd: Scan already in process...\n");
1321 if (priv->scan_block) {
1322 dev_err(adapter->dev,
1323 "cmd: Scan is blocked during association...\n");
1327 spin_lock_irqsave(&adapter->mwifiex_cmd_lock, flags);
1328 adapter->scan_processing = true;
1329 spin_unlock_irqrestore(&adapter->mwifiex_cmd_lock, flags);
1331 scan_cfg_out = kzalloc(sizeof(union mwifiex_scan_cmd_config_tlv),
1333 if (!scan_cfg_out) {
1334 dev_err(adapter->dev, "failed to alloc scan_cfg_out\n");
1339 buf_size = sizeof(struct mwifiex_chan_scan_param_set) *
1340 MWIFIEX_USER_SCAN_CHAN_MAX;
1341 scan_chan_list = kzalloc(buf_size, GFP_KERNEL);
1342 if (!scan_chan_list) {
1343 dev_err(adapter->dev, "failed to alloc scan_chan_list\n");
1344 kfree(scan_cfg_out);
1349 mwifiex_config_scan(priv, user_scan_in, &scan_cfg_out->config,
1350 &chan_list_out, scan_chan_list, &max_chan_per_scan,
1351 &filtered_scan, &scan_current_chan_only);
1353 ret = mwifiex_scan_channel_list(priv, max_chan_per_scan, filtered_scan,
1354 &scan_cfg_out->config, chan_list_out,
1357 /* Get scan command from scan_pending_q and put to cmd_pending_q */
1359 spin_lock_irqsave(&adapter->scan_pending_q_lock, flags);
1360 if (!list_empty(&adapter->scan_pending_q)) {
1361 cmd_node = list_first_entry(&adapter->scan_pending_q,
1362 struct cmd_ctrl_node, list);
1363 list_del(&cmd_node->list);
1364 spin_unlock_irqrestore(&adapter->scan_pending_q_lock,
1366 adapter->cmd_queued = cmd_node;
1367 mwifiex_insert_cmd_to_pending_q(adapter, cmd_node,
1369 queue_work(adapter->workqueue, &adapter->main_work);
1371 spin_unlock_irqrestore(&adapter->scan_pending_q_lock,
1376 kfree(scan_cfg_out);
1377 kfree(scan_chan_list);
1380 spin_lock_irqsave(&adapter->mwifiex_cmd_lock, flags);
1381 adapter->scan_processing = false;
1382 spin_unlock_irqrestore(&adapter->mwifiex_cmd_lock, flags);
1388 * This function prepares a scan command to be sent to the firmware.
1390 * This uses the scan command configuration sent to the command processing
1391 * module in command preparation stage to configure a scan command structure
1392 * to send to firmware.
1394 * The fixed fields specifying the BSS type and BSSID filters as well as a
1395 * variable number/length of TLVs are sent in the command to firmware.
1397 * Preparation also includes -
1398 * - Setting command ID, and proper size
1399 * - Ensuring correct endian-ness
1401 int mwifiex_cmd_802_11_scan(struct host_cmd_ds_command *cmd,
1402 struct mwifiex_scan_cmd_config *scan_cfg)
1404 struct host_cmd_ds_802_11_scan *scan_cmd = &cmd->params.scan;
1406 /* Set fixed field variables in scan command */
1407 scan_cmd->bss_mode = scan_cfg->bss_mode;
1408 memcpy(scan_cmd->bssid, scan_cfg->specific_bssid,
1409 sizeof(scan_cmd->bssid));
1410 memcpy(scan_cmd->tlv_buffer, scan_cfg->tlv_buf, scan_cfg->tlv_buf_len);
1412 cmd->command = cpu_to_le16(HostCmd_CMD_802_11_SCAN);
1414 /* Size is equal to the sizeof(fixed portions) + the TLV len + header */
1415 cmd->size = cpu_to_le16((u16) (sizeof(scan_cmd->bss_mode)
1416 + sizeof(scan_cmd->bssid)
1417 + scan_cfg->tlv_buf_len + S_DS_GEN));
1423 * This function checks compatibility of requested network with current
1426 int mwifiex_check_network_compatibility(struct mwifiex_private *priv,
1427 struct mwifiex_bssdescriptor *bss_desc)
1434 if ((mwifiex_get_cfp(priv, (u8) bss_desc->bss_band,
1435 (u16) bss_desc->channel, 0))) {
1436 switch (priv->bss_mode) {
1437 case NL80211_IFTYPE_STATION:
1438 case NL80211_IFTYPE_ADHOC:
1439 ret = mwifiex_is_network_compatible(priv, bss_desc,
1442 dev_err(priv->adapter->dev, "cannot find ssid "
1443 "%s\n", bss_desc->ssid.ssid);
1453 static int mwifiex_update_curr_bss_params(struct mwifiex_private *priv,
1454 struct cfg80211_bss *bss)
1456 struct mwifiex_bssdescriptor *bss_desc;
1458 unsigned long flags;
1460 /* Allocate and fill new bss descriptor */
1461 bss_desc = kzalloc(sizeof(struct mwifiex_bssdescriptor),
1464 dev_err(priv->adapter->dev, " failed to alloc bss_desc\n");
1468 ret = mwifiex_fill_new_bss_desc(priv, bss, bss_desc);
1472 ret = mwifiex_check_network_compatibility(priv, bss_desc);
1476 /* Update current bss descriptor parameters */
1477 spin_lock_irqsave(&priv->curr_bcn_buf_lock, flags);
1478 priv->curr_bss_params.bss_descriptor.bcn_wpa_ie = NULL;
1479 priv->curr_bss_params.bss_descriptor.wpa_offset = 0;
1480 priv->curr_bss_params.bss_descriptor.bcn_rsn_ie = NULL;
1481 priv->curr_bss_params.bss_descriptor.rsn_offset = 0;
1482 priv->curr_bss_params.bss_descriptor.bcn_wapi_ie = NULL;
1483 priv->curr_bss_params.bss_descriptor.wapi_offset = 0;
1484 priv->curr_bss_params.bss_descriptor.bcn_ht_cap = NULL;
1485 priv->curr_bss_params.bss_descriptor.ht_cap_offset =
1487 priv->curr_bss_params.bss_descriptor.bcn_ht_info = NULL;
1488 priv->curr_bss_params.bss_descriptor.ht_info_offset =
1490 priv->curr_bss_params.bss_descriptor.bcn_bss_co_2040 =
1492 priv->curr_bss_params.bss_descriptor.
1493 bss_co_2040_offset = 0;
1494 priv->curr_bss_params.bss_descriptor.bcn_ext_cap = NULL;
1495 priv->curr_bss_params.bss_descriptor.ext_cap_offset = 0;
1496 priv->curr_bss_params.bss_descriptor.beacon_buf = NULL;
1497 priv->curr_bss_params.bss_descriptor.beacon_buf_size =
1500 /* Make a copy of current BSSID descriptor */
1501 memcpy(&priv->curr_bss_params.bss_descriptor, bss_desc,
1502 sizeof(priv->curr_bss_params.bss_descriptor));
1503 mwifiex_save_curr_bcn(priv);
1504 spin_unlock_irqrestore(&priv->curr_bcn_buf_lock, flags);
1512 * This function handles the command response of scan.
1514 * The response buffer for the scan command has the following
1517 * .-------------------------------------------------------------.
1518 * | Header (4 * sizeof(t_u16)): Standard command response hdr |
1519 * .-------------------------------------------------------------.
1520 * | BufSize (t_u16) : sizeof the BSS Description data |
1521 * .-------------------------------------------------------------.
1522 * | NumOfSet (t_u8) : Number of BSS Descs returned |
1523 * .-------------------------------------------------------------.
1524 * | BSSDescription data (variable, size given in BufSize) |
1525 * .-------------------------------------------------------------.
1526 * | TLV data (variable, size calculated using Header->Size, |
1527 * | BufSize and sizeof the fixed fields above) |
1528 * .-------------------------------------------------------------.
1530 int mwifiex_ret_802_11_scan(struct mwifiex_private *priv,
1531 struct host_cmd_ds_command *resp)
1534 struct mwifiex_adapter *adapter = priv->adapter;
1535 struct cmd_ctrl_node *cmd_node;
1536 struct host_cmd_ds_802_11_scan_rsp *scan_rsp;
1537 struct mwifiex_ie_types_data *tlv_data;
1538 struct mwifiex_ie_types_tsf_timestamp *tsf_tlv;
1544 struct mwifiex_chan_freq_power *cfp;
1545 struct mwifiex_ie_types_chan_band_list_param_set *chan_band_tlv;
1546 struct chan_band_param_set *chan_band;
1548 unsigned long flags;
1549 struct cfg80211_bss *bss;
1551 is_bgscan_resp = (le16_to_cpu(resp->command)
1552 == HostCmd_CMD_802_11_BG_SCAN_QUERY);
1554 scan_rsp = &resp->params.bg_scan_query_resp.scan_resp;
1556 scan_rsp = &resp->params.scan_resp;
1559 if (scan_rsp->number_of_sets > MWIFIEX_MAX_AP) {
1560 dev_err(adapter->dev, "SCAN_RESP: too many AP returned (%d)\n",
1561 scan_rsp->number_of_sets);
1566 bytes_left = le16_to_cpu(scan_rsp->bss_descript_size);
1567 dev_dbg(adapter->dev, "info: SCAN_RESP: bss_descript_size %d\n",
1570 scan_resp_size = le16_to_cpu(resp->size);
1572 dev_dbg(adapter->dev,
1573 "info: SCAN_RESP: returned %d APs before parsing\n",
1574 scan_rsp->number_of_sets);
1576 bss_info = scan_rsp->bss_desc_and_tlv_buffer;
1579 * The size of the TLV buffer is equal to the entire command response
1580 * size (scan_resp_size) minus the fixed fields (sizeof()'s), the
1581 * BSS Descriptions (bss_descript_size as bytesLef) and the command
1582 * response header (S_DS_GEN)
1584 tlv_buf_size = scan_resp_size - (bytes_left
1585 + sizeof(scan_rsp->bss_descript_size)
1586 + sizeof(scan_rsp->number_of_sets)
1589 tlv_data = (struct mwifiex_ie_types_data *) (scan_rsp->
1590 bss_desc_and_tlv_buffer +
1593 /* Search the TLV buffer space in the scan response for any valid
1595 mwifiex_ret_802_11_scan_get_tlv_ptrs(adapter, tlv_data, tlv_buf_size,
1596 TLV_TYPE_TSFTIMESTAMP,
1597 (struct mwifiex_ie_types_data **)
1600 /* Search the TLV buffer space in the scan response for any valid
1602 mwifiex_ret_802_11_scan_get_tlv_ptrs(adapter, tlv_data, tlv_buf_size,
1603 TLV_TYPE_CHANNELBANDLIST,
1604 (struct mwifiex_ie_types_data **)
1607 for (idx = 0; idx < scan_rsp->number_of_sets && bytes_left; idx++) {
1614 u16 beacon_size = 0;
1618 u16 cap_info_bitmap;
1621 struct mwifiex_bcn_param *bcn_param;
1622 struct mwifiex_bss_priv *bss_priv;
1624 if (bytes_left >= sizeof(beacon_size)) {
1625 /* Extract & convert beacon size from command buffer */
1626 memcpy(&beacon_size, bss_info, sizeof(beacon_size));
1627 bytes_left -= sizeof(beacon_size);
1628 bss_info += sizeof(beacon_size);
1631 if (!beacon_size || beacon_size > bytes_left) {
1632 bss_info += bytes_left;
1637 /* Initialize the current working beacon pointer for this BSS
1639 current_ptr = bss_info;
1641 /* Advance the return beacon pointer past the current beacon */
1642 bss_info += beacon_size;
1643 bytes_left -= beacon_size;
1645 curr_bcn_bytes = beacon_size;
1648 * First 5 fields are bssid, RSSI, time stamp, beacon interval,
1649 * and capability information
1651 if (curr_bcn_bytes < sizeof(struct mwifiex_bcn_param)) {
1652 dev_err(adapter->dev,
1653 "InterpretIE: not enough bytes left\n");
1656 bcn_param = (struct mwifiex_bcn_param *)current_ptr;
1657 current_ptr += sizeof(*bcn_param);
1658 curr_bcn_bytes -= sizeof(*bcn_param);
1660 memcpy(bssid, bcn_param->bssid, ETH_ALEN);
1662 rssi = (s32) bcn_param->rssi;
1663 rssi = (-rssi) * 100; /* Convert dBm to mBm */
1664 dev_dbg(adapter->dev, "info: InterpretIE: RSSI=%d\n", rssi);
1666 timestamp = le64_to_cpu(bcn_param->timestamp);
1667 beacon_period = le16_to_cpu(bcn_param->beacon_period);
1669 cap_info_bitmap = le16_to_cpu(bcn_param->cap_info_bitmap);
1670 dev_dbg(adapter->dev, "info: InterpretIE: capabilities=0x%X\n",
1673 /* Rest of the current buffer are IE's */
1674 ie_buf = current_ptr;
1675 ie_len = curr_bcn_bytes;
1676 dev_dbg(adapter->dev,
1677 "info: InterpretIE: IELength for this AP = %d\n",
1680 while (curr_bcn_bytes >= sizeof(struct ieee_types_header)) {
1681 u8 element_id, element_len;
1683 element_id = *current_ptr;
1684 element_len = *(current_ptr + 1);
1685 if (curr_bcn_bytes < element_len +
1686 sizeof(struct ieee_types_header)) {
1687 dev_err(priv->adapter->dev,
1688 "%s: bytes left < IE length\n",
1692 if (element_id == WLAN_EID_DS_PARAMS) {
1693 channel = *(u8 *) (current_ptr +
1694 sizeof(struct ieee_types_header));
1698 current_ptr += element_len +
1699 sizeof(struct ieee_types_header);
1700 curr_bcn_bytes -= element_len +
1701 sizeof(struct ieee_types_header);
1705 * If the TSF TLV was appended to the scan results, save this
1706 * entry's TSF value in the fw_tsf field. It is the firmware's
1707 * TSF value at the time the beacon or probe response was
1711 memcpy(&fw_tsf, &tsf_tlv->tsf_data[idx * TSF_DATA_SIZE],
1715 struct ieee80211_channel *chan;
1719 if (chan_band_tlv) {
1721 &chan_band_tlv->chan_band_param[idx];
1722 band = mwifiex_radio_type_to_band(
1723 chan_band->radio_type
1724 & (BIT(0) | BIT(1)));
1727 cfp = mwifiex_get_cfp(priv, band, channel, 0);
1729 freq = cfp ? cfp->freq : 0;
1731 chan = ieee80211_get_channel(priv->wdev->wiphy, freq);
1733 if (chan && !(chan->flags & IEEE80211_CHAN_DISABLED)) {
1734 bss = cfg80211_inform_bss(priv->wdev->wiphy,
1735 chan, bssid, timestamp,
1736 cap_info_bitmap, beacon_period,
1737 ie_buf, ie_len, rssi, GFP_KERNEL);
1738 bss_priv = (struct mwifiex_bss_priv *)bss->priv;
1739 bss_priv->band = band;
1740 bss_priv->fw_tsf = fw_tsf;
1741 if (priv->media_connected &&
1743 priv->curr_bss_params.bss_descriptor
1744 .mac_address, ETH_ALEN))
1745 mwifiex_update_curr_bss_params(priv,
1747 cfg80211_put_bss(bss);
1750 dev_dbg(adapter->dev, "missing BSS channel IE\n");
1754 spin_lock_irqsave(&adapter->scan_pending_q_lock, flags);
1755 if (list_empty(&adapter->scan_pending_q)) {
1756 spin_unlock_irqrestore(&adapter->scan_pending_q_lock, flags);
1757 spin_lock_irqsave(&adapter->mwifiex_cmd_lock, flags);
1758 adapter->scan_processing = false;
1759 spin_unlock_irqrestore(&adapter->mwifiex_cmd_lock, flags);
1761 /* Need to indicate IOCTL complete */
1762 if (adapter->curr_cmd->wait_q_enabled) {
1763 adapter->cmd_wait_q.status = 0;
1764 mwifiex_complete_cmd(adapter, adapter->curr_cmd);
1766 if (priv->report_scan_result)
1767 priv->report_scan_result = false;
1768 if (priv->scan_pending_on_block) {
1769 priv->scan_pending_on_block = false;
1770 up(&priv->async_sem);
1773 if (priv->user_scan_cfg) {
1774 dev_dbg(priv->adapter->dev,
1775 "info: %s: sending scan results\n", __func__);
1776 cfg80211_scan_done(priv->scan_request, 0);
1777 priv->scan_request = NULL;
1778 kfree(priv->user_scan_cfg);
1779 priv->user_scan_cfg = NULL;
1782 if (!mwifiex_wmm_lists_empty(adapter) &&
1783 (priv->scan_request && (priv->scan_request->flags &
1784 CFG80211_SCAN_FLAG_TX_ABORT))) {
1785 spin_unlock_irqrestore(&adapter->scan_pending_q_lock,
1787 adapter->scan_delay_cnt = 1;
1788 mod_timer(&priv->scan_delay_timer, jiffies +
1789 msecs_to_jiffies(MWIFIEX_SCAN_DELAY_MSEC));
1790 dev_dbg(priv->adapter->dev,
1791 "info: %s: deferring scan\n", __func__);
1793 /* Get scan command from scan_pending_q and put to
1795 cmd_node = list_first_entry(&adapter->scan_pending_q,
1796 struct cmd_ctrl_node, list);
1797 list_del(&cmd_node->list);
1798 spin_unlock_irqrestore(&adapter->scan_pending_q_lock,
1800 mwifiex_insert_cmd_to_pending_q(adapter, cmd_node,
1810 * This function prepares command for background scan query.
1812 * Preparation includes -
1813 * - Setting command ID and proper size
1814 * - Setting background scan flush parameter
1815 * - Ensuring correct endian-ness
1817 int mwifiex_cmd_802_11_bg_scan_query(struct host_cmd_ds_command *cmd)
1819 struct host_cmd_ds_802_11_bg_scan_query *bg_query =
1820 &cmd->params.bg_scan_query;
1822 cmd->command = cpu_to_le16(HostCmd_CMD_802_11_BG_SCAN_QUERY);
1823 cmd->size = cpu_to_le16(sizeof(struct host_cmd_ds_802_11_bg_scan_query)
1826 bg_query->flush = 1;
1832 * This function inserts scan command node to the scan pending queue.
1835 mwifiex_queue_scan_cmd(struct mwifiex_private *priv,
1836 struct cmd_ctrl_node *cmd_node)
1838 struct mwifiex_adapter *adapter = priv->adapter;
1839 unsigned long flags;
1841 cmd_node->wait_q_enabled = true;
1842 cmd_node->condition = &adapter->scan_wait_q_woken;
1843 spin_lock_irqsave(&adapter->scan_pending_q_lock, flags);
1844 list_add_tail(&cmd_node->list, &adapter->scan_pending_q);
1845 spin_unlock_irqrestore(&adapter->scan_pending_q_lock, flags);
1849 * This function sends a scan command for all available channels to the
1850 * firmware, filtered on a specific SSID.
1852 static int mwifiex_scan_specific_ssid(struct mwifiex_private *priv,
1853 struct cfg80211_ssid *req_ssid)
1855 struct mwifiex_adapter *adapter = priv->adapter;
1857 struct mwifiex_user_scan_cfg *scan_cfg;
1862 if (adapter->scan_processing) {
1863 dev_dbg(adapter->dev, "cmd: Scan already in process...\n");
1867 if (priv->scan_block) {
1868 dev_dbg(adapter->dev,
1869 "cmd: Scan is blocked during association...\n");
1873 scan_cfg = kzalloc(sizeof(struct mwifiex_user_scan_cfg), GFP_KERNEL);
1875 dev_err(adapter->dev, "failed to alloc scan_cfg\n");
1879 scan_cfg->ssid_list = req_ssid;
1880 scan_cfg->num_ssids = 1;
1882 ret = mwifiex_scan_networks(priv, scan_cfg);
1889 * Sends IOCTL request to start a scan.
1891 * This function allocates the IOCTL request buffer, fills it
1892 * with requisite parameters and calls the IOCTL handler.
1894 * Scan command can be issued for both normal scan and specific SSID
1895 * scan, depending upon whether an SSID is provided or not.
1897 int mwifiex_request_scan(struct mwifiex_private *priv,
1898 struct cfg80211_ssid *req_ssid)
1902 if (down_interruptible(&priv->async_sem)) {
1903 dev_err(priv->adapter->dev, "%s: acquire semaphore\n",
1907 priv->scan_pending_on_block = true;
1909 priv->adapter->scan_wait_q_woken = false;
1911 if (req_ssid && req_ssid->ssid_len != 0)
1912 /* Specific SSID scan */
1913 ret = mwifiex_scan_specific_ssid(priv, req_ssid);
1916 ret = mwifiex_scan_networks(priv, NULL);
1919 ret = mwifiex_wait_queue_complete(priv->adapter);
1922 priv->scan_pending_on_block = false;
1923 up(&priv->async_sem);
1930 * This function appends the vendor specific IE TLV to a buffer.
1933 mwifiex_cmd_append_vsie_tlv(struct mwifiex_private *priv,
1934 u16 vsie_mask, u8 **buffer)
1936 int id, ret_len = 0;
1937 struct mwifiex_ie_types_vendor_param_set *vs_param_set;
1945 * Traverse through the saved vendor specific IE array and append
1946 * the selected(scan/assoc/adhoc) IE as TLV to the command
1948 for (id = 0; id < MWIFIEX_MAX_VSIE_NUM; id++) {
1949 if (priv->vs_ie[id].mask & vsie_mask) {
1951 (struct mwifiex_ie_types_vendor_param_set *)
1953 vs_param_set->header.type =
1954 cpu_to_le16(TLV_TYPE_PASSTHROUGH);
1955 vs_param_set->header.len =
1956 cpu_to_le16((((u16) priv->vs_ie[id].ie[1])
1958 memcpy(vs_param_set->ie, priv->vs_ie[id].ie,
1959 le16_to_cpu(vs_param_set->header.len));
1960 *buffer += le16_to_cpu(vs_param_set->header.len) +
1961 sizeof(struct mwifiex_ie_types_header);
1962 ret_len += le16_to_cpu(vs_param_set->header.len) +
1963 sizeof(struct mwifiex_ie_types_header);
1970 * This function saves a beacon buffer of the current BSS descriptor.
1972 * The current beacon buffer is saved so that it can be restored in the
1973 * following cases that makes the beacon buffer not to contain the current
1974 * ssid's beacon buffer.
1975 * - The current ssid was not found somehow in the last scan.
1976 * - The current ssid was the last entry of the scan table and overloaded.
1979 mwifiex_save_curr_bcn(struct mwifiex_private *priv)
1981 struct mwifiex_bssdescriptor *curr_bss =
1982 &priv->curr_bss_params.bss_descriptor;
1984 if (!curr_bss->beacon_buf_size)
1987 /* allocate beacon buffer at 1st time; or if it's size has changed */
1988 if (!priv->curr_bcn_buf ||
1989 priv->curr_bcn_size != curr_bss->beacon_buf_size) {
1990 priv->curr_bcn_size = curr_bss->beacon_buf_size;
1992 kfree(priv->curr_bcn_buf);
1993 priv->curr_bcn_buf = kmalloc(curr_bss->beacon_buf_size,
1995 if (!priv->curr_bcn_buf) {
1996 dev_err(priv->adapter->dev,
1997 "failed to alloc curr_bcn_buf\n");
2002 memcpy(priv->curr_bcn_buf, curr_bss->beacon_buf,
2003 curr_bss->beacon_buf_size);
2004 dev_dbg(priv->adapter->dev, "info: current beacon saved %d\n",
2005 priv->curr_bcn_size);
2007 curr_bss->beacon_buf = priv->curr_bcn_buf;
2009 /* adjust the pointers in the current BSS descriptor */
2010 if (curr_bss->bcn_wpa_ie)
2011 curr_bss->bcn_wpa_ie =
2012 (struct ieee_types_vendor_specific *)
2013 (curr_bss->beacon_buf +
2014 curr_bss->wpa_offset);
2016 if (curr_bss->bcn_rsn_ie)
2017 curr_bss->bcn_rsn_ie = (struct ieee_types_generic *)
2018 (curr_bss->beacon_buf +
2019 curr_bss->rsn_offset);
2021 if (curr_bss->bcn_ht_cap)
2022 curr_bss->bcn_ht_cap = (struct ieee80211_ht_cap *)
2023 (curr_bss->beacon_buf +
2024 curr_bss->ht_cap_offset);
2026 if (curr_bss->bcn_ht_info)
2027 curr_bss->bcn_ht_info = (struct ieee80211_ht_info *)
2028 (curr_bss->beacon_buf +
2029 curr_bss->ht_info_offset);
2031 if (curr_bss->bcn_bss_co_2040)
2032 curr_bss->bcn_bss_co_2040 =
2033 (u8 *) (curr_bss->beacon_buf +
2034 curr_bss->bss_co_2040_offset);
2036 if (curr_bss->bcn_ext_cap)
2037 curr_bss->bcn_ext_cap = (u8 *) (curr_bss->beacon_buf +
2038 curr_bss->ext_cap_offset);
2042 * This function frees the current BSS descriptor beacon buffer.
2045 mwifiex_free_curr_bcn(struct mwifiex_private *priv)
2047 kfree(priv->curr_bcn_buf);
2048 priv->curr_bcn_buf = NULL;