Commit | Line | Data |
---|---|---|
00b3ed16 GKH |
1 | /* src/prism2/driver/prism2sta.c |
2 | * | |
3 | * Implements the station functionality for prism2 | |
4 | * | |
5 | * Copyright (C) 1999 AbsoluteValue Systems, Inc. All Rights Reserved. | |
6 | * -------------------------------------------------------------------- | |
7 | * | |
8 | * linux-wlan | |
9 | * | |
10 | * The contents of this file are subject to the Mozilla Public | |
11 | * License Version 1.1 (the "License"); you may not use this file | |
12 | * except in compliance with the License. You may obtain a copy of | |
13 | * the License at http://www.mozilla.org/MPL/ | |
14 | * | |
15 | * Software distributed under the License is distributed on an "AS | |
16 | * IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or | |
17 | * implied. See the License for the specific language governing | |
18 | * rights and limitations under the License. | |
19 | * | |
20 | * Alternatively, the contents of this file may be used under the | |
21 | * terms of the GNU Public License version 2 (the "GPL"), in which | |
22 | * case the provisions of the GPL are applicable instead of the | |
23 | * above. If you wish to allow the use of your version of this file | |
24 | * only under the terms of the GPL and not to allow others to use | |
25 | * your version of this file under the MPL, indicate your decision | |
26 | * by deleting the provisions above and replace them with the notice | |
27 | * and other provisions required by the GPL. If you do not delete | |
28 | * the provisions above, a recipient may use your version of this | |
29 | * file under either the MPL or the GPL. | |
30 | * | |
31 | * -------------------------------------------------------------------- | |
32 | * | |
33 | * Inquiries regarding the linux-wlan Open Source project can be | |
34 | * made directly to: | |
35 | * | |
36 | * AbsoluteValue Systems Inc. | |
37 | * info@linux-wlan.com | |
38 | * http://www.linux-wlan.com | |
39 | * | |
40 | * -------------------------------------------------------------------- | |
41 | * | |
42 | * Portions of the development of this software were funded by | |
43 | * Intersil Corporation as part of PRISM(R) chipset product development. | |
44 | * | |
45 | * -------------------------------------------------------------------- | |
46 | * | |
47 | * This file implements the module and linux pcmcia routines for the | |
48 | * prism2 driver. | |
49 | * | |
50 | * -------------------------------------------------------------------- | |
51 | */ | |
52 | ||
00b3ed16 | 53 | #include <linux/version.h> |
00b3ed16 | 54 | #include <linux/module.h> |
00b3ed16 | 55 | #include <linux/moduleparam.h> |
00b3ed16 GKH |
56 | #include <linux/kernel.h> |
57 | #include <linux/sched.h> | |
58 | #include <linux/types.h> | |
59 | #include <linux/init.h> | |
60 | #include <linux/slab.h> | |
61 | #include <linux/wireless.h> | |
62 | #include <linux/netdevice.h> | |
00b3ed16 | 63 | #include <linux/workqueue.h> |
ae26230b | 64 | #include <linux/byteorder/generic.h> |
a7cf7bae | 65 | #include <linux/ctype.h> |
00b3ed16 | 66 | |
ef1a0ed7 | 67 | #include <linux/io.h> |
00b3ed16 GKH |
68 | #include <linux/delay.h> |
69 | #include <asm/byteorder.h> | |
70 | #include <linux/if_arp.h> | |
28b17a4b | 71 | #include <linux/if_ether.h> |
7f6e0e44 | 72 | #include <linux/bitops.h> |
00b3ed16 | 73 | |
00b3ed16 GKH |
74 | #include "p80211types.h" |
75 | #include "p80211hdr.h" | |
76 | #include "p80211mgmt.h" | |
77 | #include "p80211conv.h" | |
78 | #include "p80211msg.h" | |
79 | #include "p80211netdev.h" | |
80 | #include "p80211req.h" | |
81 | #include "p80211metadef.h" | |
82 | #include "p80211metastruct.h" | |
83 | #include "hfa384x.h" | |
84 | #include "prism2mgmt.h" | |
85 | ||
16910554 MM |
86 | /* Create a string of printable chars from something that might not be */ |
87 | /* It's recommended that the str be 4*len + 1 bytes long */ | |
88 | #define wlan_mkprintstr(buf, buflen, str, strlen) \ | |
89 | { \ | |
90 | int i = 0; \ | |
91 | int j = 0; \ | |
92 | memset(str, 0, (strlen)); \ | |
93 | for (i = 0; i < (buflen); i++) { \ | |
f3422882 | 94 | if (isprint((buf)[i])) { \ |
16910554 MM |
95 | (str)[j] = (buf)[i]; \ |
96 | j++; \ | |
97 | } else { \ | |
98 | (str)[j] = '\\'; \ | |
99 | (str)[j+1] = 'x'; \ | |
cfa54896 AS |
100 | (str)[j+2] = hex_asc_hi((buf)[i]); \ |
101 | (str)[j+3] = hex_asc_lo((buf)[i]); \ | |
16910554 MM |
102 | j += 4; \ |
103 | } \ | |
104 | } \ | |
105 | } | |
00b3ed16 | 106 | |
e02c69b8 | 107 | static char *dev_info = "prism2_usb"; |
00b3ed16 GKH |
108 | static wlandevice_t *create_wlan(void); |
109 | ||
f3422882 MM |
110 | int prism2_reset_holdtime = 30; /* Reset hold time in ms */ |
111 | int prism2_reset_settletime = 100; /* Reset settle time in ms */ | |
00b3ed16 | 112 | |
297f06ce | 113 | static int prism2_doreset; /* Do a reset at init? */ |
00b3ed16 | 114 | |
f3422882 | 115 | module_param(prism2_doreset, int, 0644); |
00b3ed16 GKH |
116 | MODULE_PARM_DESC(prism2_doreset, "Issue a reset on initialization"); |
117 | ||
f3422882 MM |
118 | module_param(prism2_reset_holdtime, int, 0644); |
119 | MODULE_PARM_DESC(prism2_reset_holdtime, "reset hold time in ms"); | |
120 | module_param(prism2_reset_settletime, int, 0644); | |
121 | MODULE_PARM_DESC(prism2_reset_settletime, "reset settle time in ms"); | |
00b3ed16 | 122 | |
00b3ed16 GKH |
123 | MODULE_LICENSE("Dual MPL/GPL"); |
124 | ||
cb3126e6 KR |
125 | void prism2_connect_result(wlandevice_t *wlandev, u8 failed); |
126 | void prism2_disconnected(wlandevice_t *wlandev); | |
127 | void prism2_roamed(wlandevice_t *wlandev); | |
128 | ||
297f06ce MT |
129 | static int prism2sta_open(wlandevice_t *wlandev); |
130 | static int prism2sta_close(wlandevice_t *wlandev); | |
131 | static void prism2sta_reset(wlandevice_t *wlandev); | |
132 | static int prism2sta_txframe(wlandevice_t *wlandev, struct sk_buff *skb, | |
93df38e5 | 133 | union p80211_hdr *p80211_hdr, |
51e4896a | 134 | struct p80211_metawep *p80211_wep); |
3d049431 | 135 | static int prism2sta_mlmerequest(wlandevice_t *wlandev, struct p80211msg *msg); |
297f06ce MT |
136 | static int prism2sta_getcardinfo(wlandevice_t *wlandev); |
137 | static int prism2sta_globalsetup(wlandevice_t *wlandev); | |
138 | static int prism2sta_setmulticast(wlandevice_t *wlandev, netdevice_t *dev); | |
139 | ||
140 | static void prism2sta_inf_handover(wlandevice_t *wlandev, | |
141 | hfa384x_InfFrame_t *inf); | |
142 | static void prism2sta_inf_tallies(wlandevice_t *wlandev, | |
143 | hfa384x_InfFrame_t *inf); | |
144 | static void prism2sta_inf_hostscanresults(wlandevice_t *wlandev, | |
145 | hfa384x_InfFrame_t *inf); | |
146 | static void prism2sta_inf_scanresults(wlandevice_t *wlandev, | |
147 | hfa384x_InfFrame_t *inf); | |
148 | static void prism2sta_inf_chinforesults(wlandevice_t *wlandev, | |
149 | hfa384x_InfFrame_t *inf); | |
150 | static void prism2sta_inf_linkstatus(wlandevice_t *wlandev, | |
151 | hfa384x_InfFrame_t *inf); | |
152 | static void prism2sta_inf_assocstatus(wlandevice_t *wlandev, | |
153 | hfa384x_InfFrame_t *inf); | |
154 | static void prism2sta_inf_authreq(wlandevice_t *wlandev, | |
155 | hfa384x_InfFrame_t *inf); | |
156 | static void prism2sta_inf_authreq_defer(wlandevice_t *wlandev, | |
157 | hfa384x_InfFrame_t *inf); | |
158 | static void prism2sta_inf_psusercnt(wlandevice_t *wlandev, | |
159 | hfa384x_InfFrame_t *inf); | |
00b3ed16 GKH |
160 | |
161 | /*---------------------------------------------------------------- | |
162 | * prism2sta_open | |
163 | * | |
164 | * WLAN device open method. Called from p80211netdev when kernel | |
165 | * device open (start) method is called in response to the | |
166 | * SIOCSIIFFLAGS ioctl changing the flags bit IFF_UP | |
167 | * from clear to set. | |
168 | * | |
169 | * Arguments: | |
170 | * wlandev wlan device structure | |
171 | * | |
172 | * Returns: | |
173 | * 0 success | |
174 | * >0 f/w reported error | |
175 | * <0 driver reported error | |
176 | * | |
177 | * Side effects: | |
178 | * | |
179 | * Call context: | |
180 | * process thread | |
181 | ----------------------------------------------------------------*/ | |
297f06ce | 182 | static int prism2sta_open(wlandevice_t *wlandev) |
00b3ed16 | 183 | { |
00b3ed16 GKH |
184 | /* We don't currently have to do anything else. |
185 | * The setup of the MAC should be subsequently completed via | |
186 | * the mlme commands. | |
187 | * Higher layers know we're ready from dev->start==1 and | |
188 | * dev->tbusy==0. Our rx path knows to pass up received/ | |
189 | * frames because of dev->flags&IFF_UP is true. | |
190 | */ | |
191 | ||
00b3ed16 GKH |
192 | return 0; |
193 | } | |
194 | ||
00b3ed16 GKH |
195 | /*---------------------------------------------------------------- |
196 | * prism2sta_close | |
197 | * | |
198 | * WLAN device close method. Called from p80211netdev when kernel | |
199 | * device close method is called in response to the | |
200 | * SIOCSIIFFLAGS ioctl changing the flags bit IFF_UP | |
201 | * from set to clear. | |
202 | * | |
203 | * Arguments: | |
204 | * wlandev wlan device structure | |
205 | * | |
206 | * Returns: | |
207 | * 0 success | |
208 | * >0 f/w reported error | |
209 | * <0 driver reported error | |
210 | * | |
211 | * Side effects: | |
212 | * | |
213 | * Call context: | |
214 | * process thread | |
215 | ----------------------------------------------------------------*/ | |
297f06ce | 216 | static int prism2sta_close(wlandevice_t *wlandev) |
00b3ed16 | 217 | { |
00b3ed16 GKH |
218 | /* We don't currently have to do anything else. |
219 | * Higher layers know we're not ready from dev->start==0 and | |
220 | * dev->tbusy==1. Our rx path knows to not pass up received | |
221 | * frames because of dev->flags&IFF_UP is false. | |
222 | */ | |
223 | ||
00b3ed16 GKH |
224 | return 0; |
225 | } | |
226 | ||
00b3ed16 GKH |
227 | /*---------------------------------------------------------------- |
228 | * prism2sta_reset | |
229 | * | |
230 | * Not currently implented. | |
231 | * | |
232 | * Arguments: | |
233 | * wlandev wlan device structure | |
234 | * none | |
235 | * | |
236 | * Returns: | |
237 | * nothing | |
238 | * | |
239 | * Side effects: | |
240 | * | |
241 | * Call context: | |
242 | * process thread | |
243 | ----------------------------------------------------------------*/ | |
297f06ce | 244 | static void prism2sta_reset(wlandevice_t *wlandev) |
00b3ed16 | 245 | { |
00b3ed16 GKH |
246 | return; |
247 | } | |
248 | ||
00b3ed16 GKH |
249 | /*---------------------------------------------------------------- |
250 | * prism2sta_txframe | |
251 | * | |
252 | * Takes a frame from p80211 and queues it for transmission. | |
253 | * | |
254 | * Arguments: | |
255 | * wlandev wlan device structure | |
256 | * pb packet buffer struct. Contains an 802.11 | |
257 | * data frame. | |
258 | * p80211_hdr points to the 802.11 header for the packet. | |
259 | * Returns: | |
260 | * 0 Success and more buffs available | |
261 | * 1 Success but no more buffs | |
262 | * 2 Allocation failure | |
263 | * 4 Buffer full or queue busy | |
264 | * | |
265 | * Side effects: | |
266 | * | |
267 | * Call context: | |
268 | * process thread | |
269 | ----------------------------------------------------------------*/ | |
297f06ce | 270 | static int prism2sta_txframe(wlandevice_t *wlandev, struct sk_buff *skb, |
93df38e5 | 271 | union p80211_hdr *p80211_hdr, |
51e4896a | 272 | struct p80211_metawep *p80211_wep) |
00b3ed16 | 273 | { |
f3422882 MM |
274 | hfa384x_t *hw = (hfa384x_t *) wlandev->priv; |
275 | int result; | |
00b3ed16 GKH |
276 | |
277 | /* If necessary, set the 802.11 WEP bit */ | |
f3422882 MM |
278 | if ((wlandev->hostwep & (HOSTWEP_PRIVACYINVOKED | HOSTWEP_ENCRYPT)) == |
279 | HOSTWEP_PRIVACYINVOKED) { | |
ae26230b | 280 | p80211_hdr->a3.fc |= cpu_to_le16(WLAN_SET_FC_ISWEP(1)); |
00b3ed16 GKH |
281 | } |
282 | ||
283 | result = hfa384x_drvr_txframe(hw, skb, p80211_hdr, p80211_wep); | |
284 | ||
00b3ed16 GKH |
285 | return result; |
286 | } | |
287 | ||
00b3ed16 GKH |
288 | /*---------------------------------------------------------------- |
289 | * prism2sta_mlmerequest | |
290 | * | |
291 | * wlan command message handler. All we do here is pass the message | |
292 | * over to the prism2sta_mgmt_handler. | |
293 | * | |
294 | * Arguments: | |
295 | * wlandev wlan device structure | |
296 | * msg wlan command message | |
297 | * Returns: | |
298 | * 0 success | |
299 | * <0 successful acceptance of message, but we're | |
300 | * waiting for an async process to finish before | |
301 | * we're done with the msg. When the asynch | |
302 | * process is done, we'll call the p80211 | |
303 | * function p80211req_confirm() . | |
304 | * >0 An error occurred while we were handling | |
305 | * the message. | |
306 | * | |
307 | * Side effects: | |
308 | * | |
309 | * Call context: | |
310 | * process thread | |
311 | ----------------------------------------------------------------*/ | |
3d049431 | 312 | static int prism2sta_mlmerequest(wlandevice_t *wlandev, struct p80211msg *msg) |
00b3ed16 | 313 | { |
f3422882 | 314 | hfa384x_t *hw = (hfa384x_t *) wlandev->priv; |
00b3ed16 GKH |
315 | |
316 | int result = 0; | |
00b3ed16 | 317 | |
f3422882 MM |
318 | switch (msg->msgcode) { |
319 | case DIDmsg_dot11req_mibget: | |
a7cf7bae | 320 | pr_debug("Received mibget request\n"); |
00b3ed16 GKH |
321 | result = prism2mgmt_mibset_mibget(wlandev, msg); |
322 | break; | |
f3422882 | 323 | case DIDmsg_dot11req_mibset: |
a7cf7bae | 324 | pr_debug("Received mibset request\n"); |
00b3ed16 GKH |
325 | result = prism2mgmt_mibset_mibget(wlandev, msg); |
326 | break; | |
f3422882 | 327 | case DIDmsg_dot11req_scan: |
a7cf7bae | 328 | pr_debug("Received scan request\n"); |
00b3ed16 GKH |
329 | result = prism2mgmt_scan(wlandev, msg); |
330 | break; | |
f3422882 | 331 | case DIDmsg_dot11req_scan_results: |
a7cf7bae | 332 | pr_debug("Received scan_results request\n"); |
00b3ed16 GKH |
333 | result = prism2mgmt_scan_results(wlandev, msg); |
334 | break; | |
f3422882 | 335 | case DIDmsg_dot11req_start: |
a7cf7bae | 336 | pr_debug("Received mlme start request\n"); |
00b3ed16 GKH |
337 | result = prism2mgmt_start(wlandev, msg); |
338 | break; | |
f3422882 MM |
339 | /* |
340 | * Prism2 specific messages | |
341 | */ | |
342 | case DIDmsg_p2req_readpda: | |
a7cf7bae | 343 | pr_debug("Received mlme readpda request\n"); |
00b3ed16 GKH |
344 | result = prism2mgmt_readpda(wlandev, msg); |
345 | break; | |
f3422882 | 346 | case DIDmsg_p2req_ramdl_state: |
a7cf7bae | 347 | pr_debug("Received mlme ramdl_state request\n"); |
00b3ed16 GKH |
348 | result = prism2mgmt_ramdl_state(wlandev, msg); |
349 | break; | |
f3422882 | 350 | case DIDmsg_p2req_ramdl_write: |
a7cf7bae | 351 | pr_debug("Received mlme ramdl_write request\n"); |
00b3ed16 GKH |
352 | result = prism2mgmt_ramdl_write(wlandev, msg); |
353 | break; | |
f3422882 | 354 | case DIDmsg_p2req_flashdl_state: |
a7cf7bae | 355 | pr_debug("Received mlme flashdl_state request\n"); |
00b3ed16 GKH |
356 | result = prism2mgmt_flashdl_state(wlandev, msg); |
357 | break; | |
f3422882 | 358 | case DIDmsg_p2req_flashdl_write: |
a7cf7bae | 359 | pr_debug("Received mlme flashdl_write request\n"); |
00b3ed16 GKH |
360 | result = prism2mgmt_flashdl_write(wlandev, msg); |
361 | break; | |
f3422882 MM |
362 | /* |
363 | * Linux specific messages | |
364 | */ | |
365 | case DIDmsg_lnxreq_hostwep: | |
366 | break; /* ignore me. */ | |
367 | case DIDmsg_lnxreq_ifstate: | |
00b3ed16 | 368 | { |
b6bb56e6 | 369 | struct p80211msg_lnxreq_ifstate *ifstatemsg; |
f3422882 | 370 | pr_debug("Received mlme ifstate request\n"); |
b6bb56e6 | 371 | ifstatemsg = (struct p80211msg_lnxreq_ifstate *) msg; |
f3422882 MM |
372 | result = |
373 | prism2sta_ifstate(wlandev, | |
374 | ifstatemsg->ifstate.data); | |
375 | ifstatemsg->resultcode.status = | |
376 | P80211ENUM_msgitem_status_data_ok; | |
377 | ifstatemsg->resultcode.data = result; | |
378 | result = 0; | |
00b3ed16 | 379 | } |
f3422882 MM |
380 | break; |
381 | case DIDmsg_lnxreq_wlansniff: | |
382 | pr_debug("Received mlme wlansniff request\n"); | |
383 | result = prism2mgmt_wlansniff(wlandev, msg); | |
384 | break; | |
385 | case DIDmsg_lnxreq_autojoin: | |
a7cf7bae | 386 | pr_debug("Received mlme autojoin request\n"); |
00b3ed16 GKH |
387 | result = prism2mgmt_autojoin(wlandev, msg); |
388 | break; | |
f3422882 | 389 | case DIDmsg_lnxreq_commsquality:{ |
b6bb56e6 | 390 | struct p80211msg_lnxreq_commsquality *qualmsg; |
00b3ed16 | 391 | |
f3422882 | 392 | pr_debug("Received commsquality request\n"); |
00b3ed16 | 393 | |
b6bb56e6 | 394 | qualmsg = (struct p80211msg_lnxreq_commsquality *) msg; |
00b3ed16 | 395 | |
f3422882 MM |
396 | qualmsg->link.status = |
397 | P80211ENUM_msgitem_status_data_ok; | |
398 | qualmsg->level.status = | |
399 | P80211ENUM_msgitem_status_data_ok; | |
400 | qualmsg->noise.status = | |
401 | P80211ENUM_msgitem_status_data_ok; | |
00b3ed16 | 402 | |
75f49e07 MT |
403 | qualmsg->link.data = le16_to_cpu(hw->qual.CQ_currBSS); |
404 | qualmsg->level.data = le16_to_cpu(hw->qual.ASL_currBSS); | |
405 | qualmsg->noise.data = le16_to_cpu(hw->qual.ANL_currFC); | |
cb3126e6 | 406 | qualmsg->txrate.data = hw->txrate; |
00b3ed16 | 407 | |
f3422882 MM |
408 | break; |
409 | } | |
00b3ed16 | 410 | default: |
f3422882 MM |
411 | printk(KERN_WARNING "Unknown mgmt request message 0x%08x", |
412 | msg->msgcode); | |
00b3ed16 GKH |
413 | break; |
414 | } | |
415 | ||
00b3ed16 GKH |
416 | return result; |
417 | } | |
418 | ||
00b3ed16 GKH |
419 | /*---------------------------------------------------------------- |
420 | * prism2sta_ifstate | |
421 | * | |
422 | * Interface state. This is the primary WLAN interface enable/disable | |
423 | * handler. Following the driver/load/deviceprobe sequence, this | |
424 | * function must be called with a state of "enable" before any other | |
425 | * commands will be accepted. | |
426 | * | |
427 | * Arguments: | |
428 | * wlandev wlan device structure | |
429 | * msgp ptr to msg buffer | |
430 | * | |
431 | * Returns: | |
f9bd6495 | 432 | * A p80211 message resultcode value. |
00b3ed16 GKH |
433 | * |
434 | * Side effects: | |
435 | * | |
436 | * Call context: | |
437 | * process thread (usually) | |
438 | * interrupt | |
439 | ----------------------------------------------------------------*/ | |
297f06ce | 440 | u32 prism2sta_ifstate(wlandevice_t *wlandev, u32 ifstate) |
00b3ed16 | 441 | { |
f3422882 MM |
442 | hfa384x_t *hw = (hfa384x_t *) wlandev->priv; |
443 | u32 result; | |
00b3ed16 GKH |
444 | |
445 | result = P80211ENUM_resultcode_implementation_failure; | |
446 | ||
a7cf7bae | 447 | pr_debug("Current MSD state(%d), requesting(%d)\n", |
75f49e07 | 448 | wlandev->msdstate, ifstate); |
f3422882 | 449 | switch (ifstate) { |
00b3ed16 GKH |
450 | case P80211ENUM_ifstate_fwload: |
451 | switch (wlandev->msdstate) { | |
452 | case WLAN_MSD_HWPRESENT: | |
453 | wlandev->msdstate = WLAN_MSD_FWLOAD_PENDING; | |
454 | /* | |
455 | * Initialize the device+driver sufficiently | |
456 | * for firmware loading. | |
457 | */ | |
297f06ce MT |
458 | result = hfa384x_drvr_start(hw); |
459 | if (result) { | |
edbd606c | 460 | printk(KERN_ERR |
f3422882 MM |
461 | "hfa384x_drvr_start() failed," |
462 | "result=%d\n", (int)result); | |
00b3ed16 | 463 | result = |
f9bd6495 | 464 | P80211ENUM_resultcode_implementation_failure; |
00b3ed16 GKH |
465 | wlandev->msdstate = WLAN_MSD_HWPRESENT; |
466 | break; | |
467 | } | |
00b3ed16 GKH |
468 | wlandev->msdstate = WLAN_MSD_FWLOAD; |
469 | result = P80211ENUM_resultcode_success; | |
470 | break; | |
471 | case WLAN_MSD_FWLOAD: | |
472 | hfa384x_cmd_initialize(hw); | |
473 | result = P80211ENUM_resultcode_success; | |
474 | break; | |
475 | case WLAN_MSD_RUNNING: | |
9b9556ec | 476 | printk(KERN_WARNING |
f3422882 MM |
477 | "Cannot enter fwload state from enable state," |
478 | "you must disable first.\n"); | |
00b3ed16 GKH |
479 | result = P80211ENUM_resultcode_invalid_parameters; |
480 | break; | |
481 | case WLAN_MSD_HWFAIL: | |
482 | default: | |
483 | /* probe() had a problem or the msdstate contains | |
484 | * an unrecognized value, there's nothing we can do. | |
485 | */ | |
486 | result = P80211ENUM_resultcode_implementation_failure; | |
487 | break; | |
488 | } | |
489 | break; | |
490 | case P80211ENUM_ifstate_enable: | |
491 | switch (wlandev->msdstate) { | |
492 | case WLAN_MSD_HWPRESENT: | |
493 | case WLAN_MSD_FWLOAD: | |
494 | wlandev->msdstate = WLAN_MSD_RUNNING_PENDING; | |
495 | /* Initialize the device+driver for full | |
496 | * operation. Note that this might me an FWLOAD to | |
497 | * to RUNNING transition so we must not do a chip | |
498 | * or board level reset. Note that on failure, | |
499 | * the MSD state is set to HWPRESENT because we | |
500 | * can't make any assumptions about the state | |
501 | * of the hardware or a previous firmware load. | |
502 | */ | |
297f06ce MT |
503 | result = hfa384x_drvr_start(hw); |
504 | if (result) { | |
edbd606c | 505 | printk(KERN_ERR |
f3422882 MM |
506 | "hfa384x_drvr_start() failed," |
507 | "result=%d\n", (int)result); | |
00b3ed16 | 508 | result = |
f9bd6495 | 509 | P80211ENUM_resultcode_implementation_failure; |
00b3ed16 GKH |
510 | wlandev->msdstate = WLAN_MSD_HWPRESENT; |
511 | break; | |
512 | } | |
513 | ||
297f06ce MT |
514 | result = prism2sta_getcardinfo(wlandev); |
515 | if (result) { | |
edbd606c | 516 | printk(KERN_ERR |
f3422882 MM |
517 | "prism2sta_getcardinfo() failed," |
518 | "result=%d\n", (int)result); | |
00b3ed16 | 519 | result = |
f9bd6495 | 520 | P80211ENUM_resultcode_implementation_failure; |
00b3ed16 GKH |
521 | hfa384x_drvr_stop(hw); |
522 | wlandev->msdstate = WLAN_MSD_HWPRESENT; | |
523 | break; | |
524 | } | |
297f06ce MT |
525 | result = prism2sta_globalsetup(wlandev); |
526 | if (result) { | |
edbd606c | 527 | printk(KERN_ERR |
f3422882 MM |
528 | "prism2sta_globalsetup() failed," |
529 | "result=%d\n", (int)result); | |
00b3ed16 | 530 | result = |
f9bd6495 | 531 | P80211ENUM_resultcode_implementation_failure; |
00b3ed16 GKH |
532 | hfa384x_drvr_stop(hw); |
533 | wlandev->msdstate = WLAN_MSD_HWPRESENT; | |
534 | break; | |
535 | } | |
536 | wlandev->msdstate = WLAN_MSD_RUNNING; | |
537 | hw->join_ap = 0; | |
538 | hw->join_retries = 60; | |
539 | result = P80211ENUM_resultcode_success; | |
540 | break; | |
541 | case WLAN_MSD_RUNNING: | |
f3422882 | 542 | /* Do nothing, we're already in this state. */ |
00b3ed16 GKH |
543 | result = P80211ENUM_resultcode_success; |
544 | break; | |
545 | case WLAN_MSD_HWFAIL: | |
546 | default: | |
547 | /* probe() had a problem or the msdstate contains | |
548 | * an unrecognized value, there's nothing we can do. | |
549 | */ | |
550 | result = P80211ENUM_resultcode_implementation_failure; | |
551 | break; | |
552 | } | |
553 | break; | |
554 | case P80211ENUM_ifstate_disable: | |
555 | switch (wlandev->msdstate) { | |
556 | case WLAN_MSD_HWPRESENT: | |
f3422882 | 557 | /* Do nothing, we're already in this state. */ |
00b3ed16 GKH |
558 | result = P80211ENUM_resultcode_success; |
559 | break; | |
560 | case WLAN_MSD_FWLOAD: | |
561 | case WLAN_MSD_RUNNING: | |
562 | wlandev->msdstate = WLAN_MSD_HWPRESENT_PENDING; | |
563 | /* | |
564 | * TODO: Shut down the MAC completely. Here a chip | |
565 | * or board level reset is probably called for. | |
566 | * After a "disable" _all_ results are lost, even | |
567 | * those from a fwload. | |
568 | */ | |
569 | if (!wlandev->hwremoved) | |
570 | netif_carrier_off(wlandev->netdev); | |
571 | ||
572 | hfa384x_drvr_stop(hw); | |
573 | ||
574 | wlandev->macmode = WLAN_MACMODE_NONE; | |
575 | wlandev->msdstate = WLAN_MSD_HWPRESENT; | |
576 | result = P80211ENUM_resultcode_success; | |
577 | break; | |
578 | case WLAN_MSD_HWFAIL: | |
579 | default: | |
580 | /* probe() had a problem or the msdstate contains | |
581 | * an unrecognized value, there's nothing we can do. | |
582 | */ | |
583 | result = P80211ENUM_resultcode_implementation_failure; | |
584 | break; | |
585 | } | |
586 | break; | |
587 | default: | |
588 | result = P80211ENUM_resultcode_invalid_parameters; | |
589 | break; | |
590 | } | |
591 | ||
00b3ed16 GKH |
592 | return result; |
593 | } | |
594 | ||
00b3ed16 GKH |
595 | /*---------------------------------------------------------------- |
596 | * prism2sta_getcardinfo | |
597 | * | |
598 | * Collect the NICID, firmware version and any other identifiers | |
599 | * we'd like to have in host-side data structures. | |
600 | * | |
601 | * Arguments: | |
602 | * wlandev wlan device structure | |
603 | * | |
604 | * Returns: | |
605 | * 0 success | |
606 | * >0 f/w reported error | |
607 | * <0 driver reported error | |
608 | * | |
609 | * Side effects: | |
610 | * | |
611 | * Call context: | |
612 | * Either. | |
613 | ----------------------------------------------------------------*/ | |
297f06ce | 614 | static int prism2sta_getcardinfo(wlandevice_t *wlandev) |
00b3ed16 | 615 | { |
f3422882 MM |
616 | int result = 0; |
617 | hfa384x_t *hw = (hfa384x_t *) wlandev->priv; | |
618 | u16 temp; | |
619 | u8 snum[HFA384x_RID_NICSERIALNUMBER_LEN]; | |
620 | char pstr[(HFA384x_RID_NICSERIALNUMBER_LEN * 4) + 1]; | |
00b3ed16 | 621 | |
00b3ed16 GKH |
622 | /* Collect version and compatibility info */ |
623 | /* Some are critical, some are not */ | |
624 | /* NIC identity */ | |
625 | result = hfa384x_drvr_getconfig(hw, HFA384x_RID_NICIDENTITY, | |
f3422882 MM |
626 | &hw->ident_nic, |
627 | sizeof(hfa384x_compident_t)); | |
628 | if (result) { | |
edbd606c | 629 | printk(KERN_ERR "Failed to retrieve NICIDENTITY\n"); |
00b3ed16 GKH |
630 | goto failed; |
631 | } | |
632 | ||
633 | /* get all the nic id fields in host byte order */ | |
18c7f792 MM |
634 | hw->ident_nic.id = le16_to_cpu(hw->ident_nic.id); |
635 | hw->ident_nic.variant = le16_to_cpu(hw->ident_nic.variant); | |
636 | hw->ident_nic.major = le16_to_cpu(hw->ident_nic.major); | |
637 | hw->ident_nic.minor = le16_to_cpu(hw->ident_nic.minor); | |
00b3ed16 | 638 | |
f3422882 MM |
639 | printk(KERN_INFO "ident: nic h/w: id=0x%02x %d.%d.%d\n", |
640 | hw->ident_nic.id, hw->ident_nic.major, | |
641 | hw->ident_nic.minor, hw->ident_nic.variant); | |
00b3ed16 GKH |
642 | |
643 | /* Primary f/w identity */ | |
644 | result = hfa384x_drvr_getconfig(hw, HFA384x_RID_PRIIDENTITY, | |
f3422882 MM |
645 | &hw->ident_pri_fw, |
646 | sizeof(hfa384x_compident_t)); | |
647 | if (result) { | |
edbd606c | 648 | printk(KERN_ERR "Failed to retrieve PRIIDENTITY\n"); |
00b3ed16 GKH |
649 | goto failed; |
650 | } | |
651 | ||
652 | /* get all the private fw id fields in host byte order */ | |
18c7f792 MM |
653 | hw->ident_pri_fw.id = le16_to_cpu(hw->ident_pri_fw.id); |
654 | hw->ident_pri_fw.variant = le16_to_cpu(hw->ident_pri_fw.variant); | |
655 | hw->ident_pri_fw.major = le16_to_cpu(hw->ident_pri_fw.major); | |
656 | hw->ident_pri_fw.minor = le16_to_cpu(hw->ident_pri_fw.minor); | |
00b3ed16 | 657 | |
f3422882 MM |
658 | printk(KERN_INFO "ident: pri f/w: id=0x%02x %d.%d.%d\n", |
659 | hw->ident_pri_fw.id, hw->ident_pri_fw.major, | |
660 | hw->ident_pri_fw.minor, hw->ident_pri_fw.variant); | |
00b3ed16 GKH |
661 | |
662 | /* Station (Secondary?) f/w identity */ | |
663 | result = hfa384x_drvr_getconfig(hw, HFA384x_RID_STAIDENTITY, | |
f3422882 MM |
664 | &hw->ident_sta_fw, |
665 | sizeof(hfa384x_compident_t)); | |
666 | if (result) { | |
edbd606c | 667 | printk(KERN_ERR "Failed to retrieve STAIDENTITY\n"); |
00b3ed16 GKH |
668 | goto failed; |
669 | } | |
670 | ||
671 | if (hw->ident_nic.id < 0x8000) { | |
f3422882 MM |
672 | printk(KERN_ERR |
673 | "FATAL: Card is not an Intersil Prism2/2.5/3\n"); | |
00b3ed16 GKH |
674 | result = -1; |
675 | goto failed; | |
676 | } | |
677 | ||
678 | /* get all the station fw id fields in host byte order */ | |
18c7f792 MM |
679 | hw->ident_sta_fw.id = le16_to_cpu(hw->ident_sta_fw.id); |
680 | hw->ident_sta_fw.variant = le16_to_cpu(hw->ident_sta_fw.variant); | |
681 | hw->ident_sta_fw.major = le16_to_cpu(hw->ident_sta_fw.major); | |
682 | hw->ident_sta_fw.minor = le16_to_cpu(hw->ident_sta_fw.minor); | |
00b3ed16 GKH |
683 | |
684 | /* strip out the 'special' variant bits */ | |
7f6e0e44 | 685 | hw->mm_mods = hw->ident_sta_fw.variant & (BIT(14) | BIT(15)); |
f3422882 | 686 | hw->ident_sta_fw.variant &= ~((u16) (BIT(14) | BIT(15))); |
00b3ed16 | 687 | |
f3422882 | 688 | if (hw->ident_sta_fw.id == 0x1f) { |
350f2f4b | 689 | printk(KERN_INFO |
f3422882 MM |
690 | "ident: sta f/w: id=0x%02x %d.%d.%d\n", |
691 | hw->ident_sta_fw.id, hw->ident_sta_fw.major, | |
692 | hw->ident_sta_fw.minor, hw->ident_sta_fw.variant); | |
00b3ed16 | 693 | } else { |
350f2f4b | 694 | printk(KERN_INFO |
f3422882 MM |
695 | "ident: ap f/w: id=0x%02x %d.%d.%d\n", |
696 | hw->ident_sta_fw.id, hw->ident_sta_fw.major, | |
697 | hw->ident_sta_fw.minor, hw->ident_sta_fw.variant); | |
edbd606c | 698 | printk(KERN_ERR "Unsupported Tertiary AP firmeare loaded!\n"); |
5db8dcc9 | 699 | goto failed; |
00b3ed16 GKH |
700 | } |
701 | ||
702 | /* Compatibility range, Modem supplier */ | |
703 | result = hfa384x_drvr_getconfig(hw, HFA384x_RID_MFISUPRANGE, | |
f3422882 MM |
704 | &hw->cap_sup_mfi, |
705 | sizeof(hfa384x_caplevel_t)); | |
706 | if (result) { | |
edbd606c | 707 | printk(KERN_ERR "Failed to retrieve MFISUPRANGE\n"); |
00b3ed16 GKH |
708 | goto failed; |
709 | } | |
710 | ||
711 | /* get all the Compatibility range, modem interface supplier | |
f3422882 | 712 | fields in byte order */ |
18c7f792 MM |
713 | hw->cap_sup_mfi.role = le16_to_cpu(hw->cap_sup_mfi.role); |
714 | hw->cap_sup_mfi.id = le16_to_cpu(hw->cap_sup_mfi.id); | |
715 | hw->cap_sup_mfi.variant = le16_to_cpu(hw->cap_sup_mfi.variant); | |
716 | hw->cap_sup_mfi.bottom = le16_to_cpu(hw->cap_sup_mfi.bottom); | |
717 | hw->cap_sup_mfi.top = le16_to_cpu(hw->cap_sup_mfi.top); | |
00b3ed16 | 718 | |
350f2f4b | 719 | printk(KERN_INFO |
f3422882 MM |
720 | "MFI:SUP:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n", |
721 | hw->cap_sup_mfi.role, hw->cap_sup_mfi.id, | |
722 | hw->cap_sup_mfi.variant, hw->cap_sup_mfi.bottom, | |
723 | hw->cap_sup_mfi.top); | |
00b3ed16 GKH |
724 | |
725 | /* Compatibility range, Controller supplier */ | |
726 | result = hfa384x_drvr_getconfig(hw, HFA384x_RID_CFISUPRANGE, | |
f3422882 MM |
727 | &hw->cap_sup_cfi, |
728 | sizeof(hfa384x_caplevel_t)); | |
729 | if (result) { | |
edbd606c | 730 | printk(KERN_ERR "Failed to retrieve CFISUPRANGE\n"); |
00b3ed16 GKH |
731 | goto failed; |
732 | } | |
733 | ||
734 | /* get all the Compatibility range, controller interface supplier | |
f3422882 | 735 | fields in byte order */ |
18c7f792 MM |
736 | hw->cap_sup_cfi.role = le16_to_cpu(hw->cap_sup_cfi.role); |
737 | hw->cap_sup_cfi.id = le16_to_cpu(hw->cap_sup_cfi.id); | |
738 | hw->cap_sup_cfi.variant = le16_to_cpu(hw->cap_sup_cfi.variant); | |
739 | hw->cap_sup_cfi.bottom = le16_to_cpu(hw->cap_sup_cfi.bottom); | |
740 | hw->cap_sup_cfi.top = le16_to_cpu(hw->cap_sup_cfi.top); | |
00b3ed16 | 741 | |
350f2f4b | 742 | printk(KERN_INFO |
f3422882 MM |
743 | "CFI:SUP:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n", |
744 | hw->cap_sup_cfi.role, hw->cap_sup_cfi.id, | |
745 | hw->cap_sup_cfi.variant, hw->cap_sup_cfi.bottom, | |
746 | hw->cap_sup_cfi.top); | |
00b3ed16 GKH |
747 | |
748 | /* Compatibility range, Primary f/w supplier */ | |
749 | result = hfa384x_drvr_getconfig(hw, HFA384x_RID_PRISUPRANGE, | |
f3422882 MM |
750 | &hw->cap_sup_pri, |
751 | sizeof(hfa384x_caplevel_t)); | |
752 | if (result) { | |
edbd606c | 753 | printk(KERN_ERR "Failed to retrieve PRISUPRANGE\n"); |
00b3ed16 GKH |
754 | goto failed; |
755 | } | |
756 | ||
757 | /* get all the Compatibility range, primary firmware supplier | |
f3422882 | 758 | fields in byte order */ |
18c7f792 MM |
759 | hw->cap_sup_pri.role = le16_to_cpu(hw->cap_sup_pri.role); |
760 | hw->cap_sup_pri.id = le16_to_cpu(hw->cap_sup_pri.id); | |
761 | hw->cap_sup_pri.variant = le16_to_cpu(hw->cap_sup_pri.variant); | |
762 | hw->cap_sup_pri.bottom = le16_to_cpu(hw->cap_sup_pri.bottom); | |
763 | hw->cap_sup_pri.top = le16_to_cpu(hw->cap_sup_pri.top); | |
00b3ed16 | 764 | |
350f2f4b | 765 | printk(KERN_INFO |
f3422882 MM |
766 | "PRI:SUP:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n", |
767 | hw->cap_sup_pri.role, hw->cap_sup_pri.id, | |
768 | hw->cap_sup_pri.variant, hw->cap_sup_pri.bottom, | |
769 | hw->cap_sup_pri.top); | |
00b3ed16 GKH |
770 | |
771 | /* Compatibility range, Station f/w supplier */ | |
772 | result = hfa384x_drvr_getconfig(hw, HFA384x_RID_STASUPRANGE, | |
f3422882 MM |
773 | &hw->cap_sup_sta, |
774 | sizeof(hfa384x_caplevel_t)); | |
775 | if (result) { | |
edbd606c | 776 | printk(KERN_ERR "Failed to retrieve STASUPRANGE\n"); |
00b3ed16 GKH |
777 | goto failed; |
778 | } | |
779 | ||
780 | /* get all the Compatibility range, station firmware supplier | |
f3422882 | 781 | fields in byte order */ |
18c7f792 MM |
782 | hw->cap_sup_sta.role = le16_to_cpu(hw->cap_sup_sta.role); |
783 | hw->cap_sup_sta.id = le16_to_cpu(hw->cap_sup_sta.id); | |
784 | hw->cap_sup_sta.variant = le16_to_cpu(hw->cap_sup_sta.variant); | |
785 | hw->cap_sup_sta.bottom = le16_to_cpu(hw->cap_sup_sta.bottom); | |
786 | hw->cap_sup_sta.top = le16_to_cpu(hw->cap_sup_sta.top); | |
00b3ed16 | 787 | |
f3422882 | 788 | if (hw->cap_sup_sta.id == 0x04) { |
350f2f4b | 789 | printk(KERN_INFO |
f3422882 MM |
790 | "STA:SUP:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n", |
791 | hw->cap_sup_sta.role, hw->cap_sup_sta.id, | |
792 | hw->cap_sup_sta.variant, hw->cap_sup_sta.bottom, | |
793 | hw->cap_sup_sta.top); | |
00b3ed16 | 794 | } else { |
350f2f4b | 795 | printk(KERN_INFO |
f3422882 MM |
796 | "AP:SUP:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n", |
797 | hw->cap_sup_sta.role, hw->cap_sup_sta.id, | |
798 | hw->cap_sup_sta.variant, hw->cap_sup_sta.bottom, | |
799 | hw->cap_sup_sta.top); | |
00b3ed16 GKH |
800 | } |
801 | ||
802 | /* Compatibility range, primary f/w actor, CFI supplier */ | |
803 | result = hfa384x_drvr_getconfig(hw, HFA384x_RID_PRI_CFIACTRANGES, | |
f3422882 MM |
804 | &hw->cap_act_pri_cfi, |
805 | sizeof(hfa384x_caplevel_t)); | |
806 | if (result) { | |
edbd606c | 807 | printk(KERN_ERR "Failed to retrieve PRI_CFIACTRANGES\n"); |
00b3ed16 GKH |
808 | goto failed; |
809 | } | |
810 | ||
811 | /* get all the Compatibility range, primary f/w actor, CFI supplier | |
f3422882 | 812 | fields in byte order */ |
18c7f792 MM |
813 | hw->cap_act_pri_cfi.role = le16_to_cpu(hw->cap_act_pri_cfi.role); |
814 | hw->cap_act_pri_cfi.id = le16_to_cpu(hw->cap_act_pri_cfi.id); | |
75f49e07 MT |
815 | hw->cap_act_pri_cfi.variant = le16_to_cpu(hw->cap_act_pri_cfi.variant); |
816 | hw->cap_act_pri_cfi.bottom = le16_to_cpu(hw->cap_act_pri_cfi.bottom); | |
18c7f792 | 817 | hw->cap_act_pri_cfi.top = le16_to_cpu(hw->cap_act_pri_cfi.top); |
00b3ed16 | 818 | |
350f2f4b | 819 | printk(KERN_INFO |
f3422882 MM |
820 | "PRI-CFI:ACT:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n", |
821 | hw->cap_act_pri_cfi.role, hw->cap_act_pri_cfi.id, | |
822 | hw->cap_act_pri_cfi.variant, hw->cap_act_pri_cfi.bottom, | |
823 | hw->cap_act_pri_cfi.top); | |
00b3ed16 GKH |
824 | |
825 | /* Compatibility range, sta f/w actor, CFI supplier */ | |
826 | result = hfa384x_drvr_getconfig(hw, HFA384x_RID_STA_CFIACTRANGES, | |
f3422882 MM |
827 | &hw->cap_act_sta_cfi, |
828 | sizeof(hfa384x_caplevel_t)); | |
829 | if (result) { | |
edbd606c | 830 | printk(KERN_ERR "Failed to retrieve STA_CFIACTRANGES\n"); |
00b3ed16 GKH |
831 | goto failed; |
832 | } | |
833 | ||
834 | /* get all the Compatibility range, station f/w actor, CFI supplier | |
f3422882 | 835 | fields in byte order */ |
18c7f792 MM |
836 | hw->cap_act_sta_cfi.role = le16_to_cpu(hw->cap_act_sta_cfi.role); |
837 | hw->cap_act_sta_cfi.id = le16_to_cpu(hw->cap_act_sta_cfi.id); | |
75f49e07 MT |
838 | hw->cap_act_sta_cfi.variant = le16_to_cpu(hw->cap_act_sta_cfi.variant); |
839 | hw->cap_act_sta_cfi.bottom = le16_to_cpu(hw->cap_act_sta_cfi.bottom); | |
18c7f792 | 840 | hw->cap_act_sta_cfi.top = le16_to_cpu(hw->cap_act_sta_cfi.top); |
00b3ed16 | 841 | |
350f2f4b | 842 | printk(KERN_INFO |
f3422882 MM |
843 | "STA-CFI:ACT:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n", |
844 | hw->cap_act_sta_cfi.role, hw->cap_act_sta_cfi.id, | |
845 | hw->cap_act_sta_cfi.variant, hw->cap_act_sta_cfi.bottom, | |
846 | hw->cap_act_sta_cfi.top); | |
00b3ed16 GKH |
847 | |
848 | /* Compatibility range, sta f/w actor, MFI supplier */ | |
849 | result = hfa384x_drvr_getconfig(hw, HFA384x_RID_STA_MFIACTRANGES, | |
f3422882 MM |
850 | &hw->cap_act_sta_mfi, |
851 | sizeof(hfa384x_caplevel_t)); | |
852 | if (result) { | |
edbd606c | 853 | printk(KERN_ERR "Failed to retrieve STA_MFIACTRANGES\n"); |
00b3ed16 GKH |
854 | goto failed; |
855 | } | |
856 | ||
857 | /* get all the Compatibility range, station f/w actor, MFI supplier | |
f3422882 | 858 | fields in byte order */ |
18c7f792 MM |
859 | hw->cap_act_sta_mfi.role = le16_to_cpu(hw->cap_act_sta_mfi.role); |
860 | hw->cap_act_sta_mfi.id = le16_to_cpu(hw->cap_act_sta_mfi.id); | |
75f49e07 MT |
861 | hw->cap_act_sta_mfi.variant = le16_to_cpu(hw->cap_act_sta_mfi.variant); |
862 | hw->cap_act_sta_mfi.bottom = le16_to_cpu(hw->cap_act_sta_mfi.bottom); | |
18c7f792 | 863 | hw->cap_act_sta_mfi.top = le16_to_cpu(hw->cap_act_sta_mfi.top); |
00b3ed16 | 864 | |
350f2f4b | 865 | printk(KERN_INFO |
f3422882 MM |
866 | "STA-MFI:ACT:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n", |
867 | hw->cap_act_sta_mfi.role, hw->cap_act_sta_mfi.id, | |
868 | hw->cap_act_sta_mfi.variant, hw->cap_act_sta_mfi.bottom, | |
869 | hw->cap_act_sta_mfi.top); | |
00b3ed16 GKH |
870 | |
871 | /* Serial Number */ | |
872 | result = hfa384x_drvr_getconfig(hw, HFA384x_RID_NICSERIALNUMBER, | |
f3422882 MM |
873 | snum, HFA384x_RID_NICSERIALNUMBER_LEN); |
874 | if (!result) { | |
00b3ed16 GKH |
875 | wlan_mkprintstr(snum, HFA384x_RID_NICSERIALNUMBER_LEN, |
876 | pstr, sizeof(pstr)); | |
350f2f4b | 877 | printk(KERN_INFO "Prism2 card SN: %s\n", pstr); |
00b3ed16 | 878 | } else { |
edbd606c | 879 | printk(KERN_ERR "Failed to retrieve Prism2 Card SN\n"); |
00b3ed16 GKH |
880 | goto failed; |
881 | } | |
882 | ||
883 | /* Collect the MAC address */ | |
884 | result = hfa384x_drvr_getconfig(hw, HFA384x_RID_CNFOWNMACADDR, | |
f3422882 MM |
885 | wlandev->netdev->dev_addr, ETH_ALEN); |
886 | if (result != 0) { | |
edbd606c | 887 | printk(KERN_ERR "Failed to retrieve mac address\n"); |
00b3ed16 GKH |
888 | goto failed; |
889 | } | |
890 | ||
891 | /* short preamble is always implemented */ | |
892 | wlandev->nsdcaps |= P80211_NSDCAP_SHORT_PREAMBLE; | |
893 | ||
894 | /* find out if hardware wep is implemented */ | |
895 | hfa384x_drvr_getconfig16(hw, HFA384x_RID_PRIVACYOPTIMP, &temp); | |
896 | if (temp) | |
897 | wlandev->nsdcaps |= P80211_NSDCAP_HARDWAREWEP; | |
898 | ||
899 | /* get the dBm Scaling constant */ | |
900 | hfa384x_drvr_getconfig16(hw, HFA384x_RID_CNFDBMADJUST, &temp); | |
901 | hw->dbmadjust = temp; | |
902 | ||
903 | /* Only enable scan by default on newer firmware */ | |
f3422882 MM |
904 | if (HFA384x_FIRMWARE_VERSION(hw->ident_sta_fw.major, |
905 | hw->ident_sta_fw.minor, | |
906 | hw->ident_sta_fw.variant) < | |
907 | HFA384x_FIRMWARE_VERSION(1, 5, 5)) { | |
00b3ed16 GKH |
908 | wlandev->nsdcaps |= P80211_NSDCAP_NOSCAN; |
909 | } | |
910 | ||
911 | /* TODO: Set any internally managed config items */ | |
912 | ||
913 | goto done; | |
914 | failed: | |
edbd606c | 915 | printk(KERN_ERR "Failed, result=%d\n", result); |
00b3ed16 | 916 | done: |
00b3ed16 GKH |
917 | return result; |
918 | } | |
919 | ||
00b3ed16 GKH |
920 | /*---------------------------------------------------------------- |
921 | * prism2sta_globalsetup | |
922 | * | |
923 | * Set any global RIDs that we want to set at device activation. | |
924 | * | |
925 | * Arguments: | |
926 | * wlandev wlan device structure | |
927 | * | |
928 | * Returns: | |
929 | * 0 success | |
930 | * >0 f/w reported error | |
931 | * <0 driver reported error | |
932 | * | |
933 | * Side effects: | |
934 | * | |
935 | * Call context: | |
936 | * process thread | |
937 | ----------------------------------------------------------------*/ | |
297f06ce | 938 | static int prism2sta_globalsetup(wlandevice_t *wlandev) |
00b3ed16 | 939 | { |
f3422882 | 940 | hfa384x_t *hw = (hfa384x_t *) wlandev->priv; |
00b3ed16 GKH |
941 | |
942 | /* Set the maximum frame size */ | |
943 | return hfa384x_drvr_setconfig16(hw, HFA384x_RID_CNFMAXDATALEN, | |
f3422882 | 944 | WLAN_DATA_MAXLEN); |
00b3ed16 GKH |
945 | } |
946 | ||
297f06ce | 947 | static int prism2sta_setmulticast(wlandevice_t *wlandev, netdevice_t *dev) |
00b3ed16 GKH |
948 | { |
949 | int result = 0; | |
f3422882 | 950 | hfa384x_t *hw = (hfa384x_t *) wlandev->priv; |
00b3ed16 | 951 | |
f3422882 | 952 | u16 promisc; |
00b3ed16 | 953 | |
00b3ed16 | 954 | /* If we're not ready, what's the point? */ |
f3422882 | 955 | if (hw->state != HFA384x_STATE_RUNNING) |
00b3ed16 GKH |
956 | goto exit; |
957 | ||
f3422882 | 958 | if ((dev->flags & (IFF_PROMISC | IFF_ALLMULTI)) != 0) |
00b3ed16 GKH |
959 | promisc = P80211ENUM_truth_true; |
960 | else | |
961 | promisc = P80211ENUM_truth_false; | |
962 | ||
f3422882 MM |
963 | result = |
964 | hfa384x_drvr_setconfig16_async(hw, HFA384x_RID_PROMISCMODE, | |
965 | promisc); | |
966 | exit: | |
00b3ed16 GKH |
967 | return result; |
968 | } | |
969 | ||
970 | /*---------------------------------------------------------------- | |
971 | * prism2sta_inf_handover | |
972 | * | |
973 | * Handles the receipt of a Handover info frame. Should only be present | |
974 | * in APs only. | |
975 | * | |
976 | * Arguments: | |
977 | * wlandev wlan device structure | |
978 | * inf ptr to info frame (contents in hfa384x order) | |
979 | * | |
980 | * Returns: | |
981 | * nothing | |
982 | * | |
983 | * Side effects: | |
984 | * | |
985 | * Call context: | |
986 | * interrupt | |
987 | ----------------------------------------------------------------*/ | |
297f06ce MT |
988 | static void prism2sta_inf_handover(wlandevice_t *wlandev, |
989 | hfa384x_InfFrame_t *inf) | |
00b3ed16 | 990 | { |
a7cf7bae | 991 | pr_debug("received infoframe:HANDOVER (unhandled)\n"); |
00b3ed16 GKH |
992 | return; |
993 | } | |
994 | ||
00b3ed16 GKH |
995 | /*---------------------------------------------------------------- |
996 | * prism2sta_inf_tallies | |
997 | * | |
998 | * Handles the receipt of a CommTallies info frame. | |
999 | * | |
1000 | * Arguments: | |
1001 | * wlandev wlan device structure | |
1002 | * inf ptr to info frame (contents in hfa384x order) | |
1003 | * | |
1004 | * Returns: | |
1005 | * nothing | |
1006 | * | |
1007 | * Side effects: | |
1008 | * | |
1009 | * Call context: | |
1010 | * interrupt | |
1011 | ----------------------------------------------------------------*/ | |
297f06ce MT |
1012 | static void prism2sta_inf_tallies(wlandevice_t *wlandev, |
1013 | hfa384x_InfFrame_t *inf) | |
00b3ed16 | 1014 | { |
f3422882 MM |
1015 | hfa384x_t *hw = (hfa384x_t *) wlandev->priv; |
1016 | u16 *src16; | |
1017 | u32 *dst; | |
1018 | u32 *src32; | |
1019 | int i; | |
1020 | int cnt; | |
00b3ed16 | 1021 | |
00b3ed16 | 1022 | /* |
f3422882 MM |
1023 | ** Determine if these are 16-bit or 32-bit tallies, based on the |
1024 | ** record length of the info record. | |
1025 | */ | |
00b3ed16 | 1026 | |
aaad4303 | 1027 | cnt = sizeof(hfa384x_CommTallies32_t) / sizeof(u32); |
00b3ed16 | 1028 | if (inf->framelen > 22) { |
5dd8acc8 SK |
1029 | dst = (u32 *) &hw->tallies; |
1030 | src32 = (u32 *) &inf->info.commtallies32; | |
00b3ed16 | 1031 | for (i = 0; i < cnt; i++, dst++, src32++) |
18c7f792 | 1032 | *dst += le32_to_cpu(*src32); |
00b3ed16 | 1033 | } else { |
5dd8acc8 SK |
1034 | dst = (u32 *) &hw->tallies; |
1035 | src16 = (u16 *) &inf->info.commtallies16; | |
00b3ed16 | 1036 | for (i = 0; i < cnt; i++, dst++, src16++) |
18c7f792 | 1037 | *dst += le16_to_cpu(*src16); |
00b3ed16 GKH |
1038 | } |
1039 | ||
00b3ed16 GKH |
1040 | return; |
1041 | } | |
1042 | ||
1043 | /*---------------------------------------------------------------- | |
1044 | * prism2sta_inf_scanresults | |
1045 | * | |
1046 | * Handles the receipt of a Scan Results info frame. | |
1047 | * | |
1048 | * Arguments: | |
1049 | * wlandev wlan device structure | |
1050 | * inf ptr to info frame (contents in hfa384x order) | |
1051 | * | |
1052 | * Returns: | |
1053 | * nothing | |
1054 | * | |
1055 | * Side effects: | |
1056 | * | |
1057 | * Call context: | |
1058 | * interrupt | |
1059 | ----------------------------------------------------------------*/ | |
297f06ce MT |
1060 | static void prism2sta_inf_scanresults(wlandevice_t *wlandev, |
1061 | hfa384x_InfFrame_t *inf) | |
00b3ed16 GKH |
1062 | { |
1063 | ||
f3422882 MM |
1064 | hfa384x_t *hw = (hfa384x_t *) wlandev->priv; |
1065 | int nbss; | |
1066 | hfa384x_ScanResult_t *sr = &(inf->info.scanresult); | |
1067 | int i; | |
1068 | hfa384x_JoinRequest_data_t joinreq; | |
1069 | int result; | |
00b3ed16 GKH |
1070 | |
1071 | /* Get the number of results, first in bytes, then in results */ | |
aaad4303 | 1072 | nbss = (inf->framelen * sizeof(u16)) - |
f3422882 | 1073 | sizeof(inf->infotype) - sizeof(inf->info.scanresult.scanreason); |
00b3ed16 GKH |
1074 | nbss /= sizeof(hfa384x_ScanResultSub_t); |
1075 | ||
1076 | /* Print em */ | |
a7cf7bae | 1077 | pr_debug("rx scanresults, reason=%d, nbss=%d:\n", |
75f49e07 | 1078 | inf->info.scanresult.scanreason, nbss); |
f3422882 | 1079 | for (i = 0; i < nbss; i++) { |
a7cf7bae | 1080 | pr_debug("chid=%d anl=%d sl=%d bcnint=%d\n", |
75f49e07 MT |
1081 | sr->result[i].chid, |
1082 | sr->result[i].anl, | |
1083 | sr->result[i].sl, sr->result[i].bcnint); | |
a7cf7bae | 1084 | pr_debug(" capinfo=0x%04x proberesp_rate=%d\n", |
75f49e07 | 1085 | sr->result[i].capinfo, sr->result[i].proberesp_rate); |
00b3ed16 GKH |
1086 | } |
1087 | /* issue a join request */ | |
1088 | joinreq.channel = sr->result[0].chid; | |
f3422882 MM |
1089 | memcpy(joinreq.bssid, sr->result[0].bssid, WLAN_BSSID_LEN); |
1090 | result = hfa384x_drvr_setconfig(hw, | |
1091 | HFA384x_RID_JOINREQUEST, | |
1092 | &joinreq, HFA384x_RID_JOINREQUEST_LEN); | |
00b3ed16 | 1093 | if (result) { |
f3422882 MM |
1094 | printk(KERN_ERR "setconfig(joinreq) failed, result=%d\n", |
1095 | result); | |
00b3ed16 GKH |
1096 | } |
1097 | ||
00b3ed16 GKH |
1098 | return; |
1099 | } | |
1100 | ||
1101 | /*---------------------------------------------------------------- | |
1102 | * prism2sta_inf_hostscanresults | |
1103 | * | |
1104 | * Handles the receipt of a Scan Results info frame. | |
1105 | * | |
1106 | * Arguments: | |
1107 | * wlandev wlan device structure | |
1108 | * inf ptr to info frame (contents in hfa384x order) | |
1109 | * | |
1110 | * Returns: | |
1111 | * nothing | |
1112 | * | |
1113 | * Side effects: | |
1114 | * | |
1115 | * Call context: | |
1116 | * interrupt | |
1117 | ----------------------------------------------------------------*/ | |
297f06ce MT |
1118 | static void prism2sta_inf_hostscanresults(wlandevice_t *wlandev, |
1119 | hfa384x_InfFrame_t *inf) | |
00b3ed16 | 1120 | { |
f3422882 MM |
1121 | hfa384x_t *hw = (hfa384x_t *) wlandev->priv; |
1122 | int nbss; | |
00b3ed16 GKH |
1123 | |
1124 | nbss = (inf->framelen - 3) / 32; | |
a7cf7bae | 1125 | pr_debug("Received %d hostscan results\n", nbss); |
00b3ed16 GKH |
1126 | |
1127 | if (nbss > 32) | |
1128 | nbss = 32; | |
1129 | ||
7c98f718 | 1130 | kfree(hw->scanresults); |
00b3ed16 GKH |
1131 | |
1132 | hw->scanresults = kmalloc(sizeof(hfa384x_InfFrame_t), GFP_ATOMIC); | |
1133 | memcpy(hw->scanresults, inf, sizeof(hfa384x_InfFrame_t)); | |
1134 | ||
1135 | if (nbss == 0) | |
1136 | nbss = -1; | |
1137 | ||
f3422882 MM |
1138 | /* Notify/wake the sleeping caller. */ |
1139 | hw->scanflag = nbss; | |
1140 | wake_up_interruptible(&hw->cmdq); | |
00b3ed16 GKH |
1141 | }; |
1142 | ||
1143 | /*---------------------------------------------------------------- | |
1144 | * prism2sta_inf_chinforesults | |
1145 | * | |
1146 | * Handles the receipt of a Channel Info Results info frame. | |
1147 | * | |
1148 | * Arguments: | |
1149 | * wlandev wlan device structure | |
1150 | * inf ptr to info frame (contents in hfa384x order) | |
1151 | * | |
1152 | * Returns: | |
1153 | * nothing | |
1154 | * | |
1155 | * Side effects: | |
1156 | * | |
1157 | * Call context: | |
1158 | * interrupt | |
1159 | ----------------------------------------------------------------*/ | |
297f06ce MT |
1160 | static void prism2sta_inf_chinforesults(wlandevice_t *wlandev, |
1161 | hfa384x_InfFrame_t *inf) | |
00b3ed16 | 1162 | { |
f3422882 MM |
1163 | hfa384x_t *hw = (hfa384x_t *) wlandev->priv; |
1164 | unsigned int i, n; | |
00b3ed16 | 1165 | |
00b3ed16 | 1166 | hw->channel_info.results.scanchannels = |
18c7f792 | 1167 | le16_to_cpu(inf->info.chinforesult.scanchannels); |
f3422882 MM |
1168 | |
1169 | for (i = 0, n = 0; i < HFA384x_CHINFORESULT_MAX; i++) { | |
1170 | if (hw->channel_info.results.scanchannels & (1 << i)) { | |
1171 | int channel = | |
75f49e07 MT |
1172 | le16_to_cpu(inf->info.chinforesult.result[n].chid) - |
1173 | 1; | |
f3422882 MM |
1174 | hfa384x_ChInfoResultSub_t *chinforesult = |
1175 | &hw->channel_info.results.result[channel]; | |
1176 | chinforesult->chid = channel; | |
1177 | chinforesult->anl = | |
75f49e07 | 1178 | le16_to_cpu(inf->info.chinforesult.result[n].anl); |
f3422882 | 1179 | chinforesult->pnl = |
75f49e07 | 1180 | le16_to_cpu(inf->info.chinforesult.result[n].pnl); |
f3422882 | 1181 | chinforesult->active = |
18c7f792 | 1182 | le16_to_cpu(inf->info.chinforesult.result[n]. |
75f49e07 | 1183 | active); |
f9bd6495 CT |
1184 | pr_debug |
1185 | ("chinfo: channel %d, %s level (avg/peak)=%d/%d dB, pcf %d\n", | |
75f49e07 MT |
1186 | channel + 1, |
1187 | chinforesult-> | |
1188 | active & HFA384x_CHINFORESULT_BSSACTIVE ? "signal" | |
1189 | : "noise", chinforesult->anl, chinforesult->pnl, | |
1190 | chinforesult-> | |
1191 | active & HFA384x_CHINFORESULT_PCFACTIVE ? 1 : 0); | |
00b3ed16 GKH |
1192 | n++; |
1193 | } | |
1194 | } | |
1195 | atomic_set(&hw->channel_info.done, 2); | |
1196 | ||
1197 | hw->channel_info.count = n; | |
00b3ed16 GKH |
1198 | return; |
1199 | } | |
1200 | ||
1201 | void prism2sta_processing_defer(struct work_struct *data) | |
1202 | { | |
f3422882 MM |
1203 | hfa384x_t *hw = container_of(data, struct hfa384x, link_bh); |
1204 | wlandevice_t *wlandev = hw->wlandev; | |
00b3ed16 | 1205 | hfa384x_bytestr32_t ssid; |
f3422882 | 1206 | int result; |
00b3ed16 | 1207 | |
00b3ed16 GKH |
1208 | /* First let's process the auth frames */ |
1209 | { | |
f3422882 | 1210 | struct sk_buff *skb; |
00b3ed16 GKH |
1211 | hfa384x_InfFrame_t *inf; |
1212 | ||
f3422882 | 1213 | while ((skb = skb_dequeue(&hw->authq))) { |
00b3ed16 GKH |
1214 | inf = (hfa384x_InfFrame_t *) skb->data; |
1215 | prism2sta_inf_authreq_defer(wlandev, inf); | |
1216 | } | |
1217 | ||
1218 | } | |
1219 | ||
1220 | /* Now let's handle the linkstatus stuff */ | |
1221 | if (hw->link_status == hw->link_status_new) | |
1222 | goto failed; | |
1223 | ||
1224 | hw->link_status = hw->link_status_new; | |
1225 | ||
f3422882 | 1226 | switch (hw->link_status) { |
00b3ed16 GKH |
1227 | case HFA384x_LINK_NOTCONNECTED: |
1228 | /* I'm currently assuming that this is the initial link | |
1229 | * state. It should only be possible immediately | |
1230 | * following an Enable command. | |
1231 | * Response: | |
1232 | * Block Transmits, Ignore receives of data frames | |
1233 | */ | |
1234 | netif_carrier_off(wlandev->netdev); | |
1235 | ||
350f2f4b | 1236 | printk(KERN_INFO "linkstatus=NOTCONNECTED (unhandled)\n"); |
00b3ed16 GKH |
1237 | break; |
1238 | ||
1239 | case HFA384x_LINK_CONNECTED: | |
1240 | /* This one indicates a successful scan/join/auth/assoc. | |
1241 | * When we have the full MLME complement, this event will | |
1242 | * signify successful completion of both mlme_authenticate | |
1243 | * and mlme_associate. State management will get a little | |
1244 | * ugly here. | |
1245 | * Response: | |
1246 | * Indicate authentication and/or association | |
1247 | * Enable Transmits, Receives and pass up data frames | |
1248 | */ | |
1249 | ||
1250 | netif_carrier_on(wlandev->netdev); | |
1251 | ||
f9bd6495 CT |
1252 | /* If we are joining a specific AP, set our |
1253 | * state and reset retries | |
1254 | */ | |
f3422882 | 1255 | if (hw->join_ap == 1) |
00b3ed16 GKH |
1256 | hw->join_ap = 2; |
1257 | hw->join_retries = 60; | |
1258 | ||
1259 | /* Don't call this in monitor mode */ | |
f3422882 MM |
1260 | if (wlandev->netdev->type == ARPHRD_ETHER) { |
1261 | u16 portstatus; | |
00b3ed16 | 1262 | |
350f2f4b | 1263 | printk(KERN_INFO "linkstatus=CONNECTED\n"); |
00b3ed16 GKH |
1264 | |
1265 | /* For non-usb devices, we can use the sync versions */ | |
1266 | /* Collect the BSSID, and set state to allow tx */ | |
1267 | ||
1268 | result = hfa384x_drvr_getconfig(hw, | |
f9bd6495 CT |
1269 | HFA384x_RID_CURRENTBSSID, |
1270 | wlandev->bssid, | |
1271 | WLAN_BSSID_LEN); | |
f3422882 | 1272 | if (result) { |
75f49e07 MT |
1273 | pr_debug |
1274 | ("getconfig(0x%02x) failed, result = %d\n", | |
1275 | HFA384x_RID_CURRENTBSSID, result); | |
00b3ed16 GKH |
1276 | goto failed; |
1277 | } | |
1278 | ||
1279 | result = hfa384x_drvr_getconfig(hw, | |
1280 | HFA384x_RID_CURRENTSSID, | |
1281 | &ssid, sizeof(ssid)); | |
f3422882 | 1282 | if (result) { |
75f49e07 MT |
1283 | pr_debug |
1284 | ("getconfig(0x%02x) failed, result = %d\n", | |
1285 | HFA384x_RID_CURRENTSSID, result); | |
00b3ed16 GKH |
1286 | goto failed; |
1287 | } | |
5dd8acc8 | 1288 | prism2mgmt_bytestr2pstr((hfa384x_bytestr_t *) &ssid, |
75f49e07 MT |
1289 | (p80211pstrd_t *) & |
1290 | wlandev->ssid); | |
00b3ed16 GKH |
1291 | |
1292 | /* Collect the port status */ | |
1293 | result = hfa384x_drvr_getconfig16(hw, | |
f9bd6495 CT |
1294 | HFA384x_RID_PORTSTATUS, |
1295 | &portstatus); | |
f3422882 | 1296 | if (result) { |
75f49e07 MT |
1297 | pr_debug |
1298 | ("getconfig(0x%02x) failed, result = %d\n", | |
1299 | HFA384x_RID_PORTSTATUS, result); | |
00b3ed16 GKH |
1300 | goto failed; |
1301 | } | |
1302 | wlandev->macmode = | |
f3422882 MM |
1303 | (portstatus == HFA384x_PSTATUS_CONN_IBSS) ? |
1304 | WLAN_MACMODE_IBSS_STA : WLAN_MACMODE_ESS_STA; | |
00b3ed16 | 1305 | |
cb3126e6 KR |
1306 | /* signal back up to cfg80211 layer */ |
1307 | prism2_connect_result(wlandev, P80211ENUM_truth_false); | |
1308 | ||
00b3ed16 GKH |
1309 | /* Get the ball rolling on the comms quality stuff */ |
1310 | prism2sta_commsqual_defer(&hw->commsqual_bh); | |
1311 | } | |
1312 | break; | |
1313 | ||
1314 | case HFA384x_LINK_DISCONNECTED: | |
1315 | /* This one indicates that our association is gone. We've | |
1316 | * lost connection with the AP and/or been disassociated. | |
1317 | * This indicates that the MAC has completely cleared it's | |
1318 | * associated state. We * should send a deauth indication | |
1319 | * (implying disassoc) up * to the MLME. | |
1320 | * Response: | |
1321 | * Indicate Deauthentication | |
1322 | * Block Transmits, Ignore receives of data frames | |
1323 | */ | |
cb3126e6 | 1324 | if (wlandev->netdev->type == ARPHRD_ETHER) |
f3422882 | 1325 | printk(KERN_INFO |
cb3126e6 | 1326 | "linkstatus=DISCONNECTED (unhandled)\n"); |
00b3ed16 GKH |
1327 | wlandev->macmode = WLAN_MACMODE_NONE; |
1328 | ||
1329 | netif_carrier_off(wlandev->netdev); | |
1330 | ||
cb3126e6 KR |
1331 | /* signal back up to cfg80211 layer */ |
1332 | prism2_disconnected(wlandev); | |
1333 | ||
00b3ed16 GKH |
1334 | break; |
1335 | ||
1336 | case HFA384x_LINK_AP_CHANGE: | |
1337 | /* This one indicates that the MAC has decided to and | |
1338 | * successfully completed a change to another AP. We | |
1339 | * should probably implement a reassociation indication | |
1340 | * in response to this one. I'm thinking that the the | |
1341 | * p80211 layer needs to be notified in case of | |
1342 | * buffering/queueing issues. User mode also needs to be | |
1343 | * notified so that any BSS dependent elements can be | |
1344 | * updated. | |
1345 | * associated state. We * should send a deauth indication | |
1346 | * (implying disassoc) up * to the MLME. | |
1347 | * Response: | |
1348 | * Indicate Reassociation | |
1349 | * Enable Transmits, Receives and pass up data frames | |
1350 | */ | |
350f2f4b | 1351 | printk(KERN_INFO "linkstatus=AP_CHANGE\n"); |
00b3ed16 GKH |
1352 | |
1353 | result = hfa384x_drvr_getconfig(hw, | |
1354 | HFA384x_RID_CURRENTBSSID, | |
1355 | wlandev->bssid, WLAN_BSSID_LEN); | |
f3422882 | 1356 | if (result) { |
75f49e07 MT |
1357 | pr_debug("getconfig(0x%02x) failed, result = %d\n", |
1358 | HFA384x_RID_CURRENTBSSID, result); | |
00b3ed16 GKH |
1359 | goto failed; |
1360 | } | |
1361 | ||
1362 | result = hfa384x_drvr_getconfig(hw, | |
1363 | HFA384x_RID_CURRENTSSID, | |
1364 | &ssid, sizeof(ssid)); | |
f3422882 | 1365 | if (result) { |
75f49e07 MT |
1366 | pr_debug("getconfig(0x%02x) failed, result = %d\n", |
1367 | HFA384x_RID_CURRENTSSID, result); | |
00b3ed16 GKH |
1368 | goto failed; |
1369 | } | |
5dd8acc8 SK |
1370 | prism2mgmt_bytestr2pstr((hfa384x_bytestr_t *) &ssid, |
1371 | (p80211pstrd_t *) &wlandev->ssid); | |
00b3ed16 GKH |
1372 | |
1373 | hw->link_status = HFA384x_LINK_CONNECTED; | |
1374 | netif_carrier_on(wlandev->netdev); | |
1375 | ||
cb3126e6 KR |
1376 | /* signal back up to cfg80211 layer */ |
1377 | prism2_roamed(wlandev); | |
1378 | ||
00b3ed16 GKH |
1379 | break; |
1380 | ||
1381 | case HFA384x_LINK_AP_OUTOFRANGE: | |
1382 | /* This one indicates that the MAC has decided that the | |
1383 | * AP is out of range, but hasn't found a better candidate | |
1384 | * so the MAC maintains its "associated" state in case | |
1385 | * we get back in range. We should block transmits and | |
1386 | * receives in this state. Do we need an indication here? | |
1387 | * Probably not since a polling user-mode element would | |
1388 | * get this status from from p2PortStatus(FD40). What about | |
1389 | * p80211? | |
1390 | * Response: | |
1391 | * Block Transmits, Ignore receives of data frames | |
1392 | */ | |
350f2f4b | 1393 | printk(KERN_INFO "linkstatus=AP_OUTOFRANGE (unhandled)\n"); |
00b3ed16 GKH |
1394 | |
1395 | netif_carrier_off(wlandev->netdev); | |
1396 | ||
1397 | break; | |
1398 | ||
1399 | case HFA384x_LINK_AP_INRANGE: | |
1400 | /* This one indicates that the MAC has decided that the | |
1401 | * AP is back in range. We continue working with our | |
1402 | * existing association. | |
1403 | * Response: | |
1404 | * Enable Transmits, Receives and pass up data frames | |
1405 | */ | |
350f2f4b | 1406 | printk(KERN_INFO "linkstatus=AP_INRANGE\n"); |
00b3ed16 GKH |
1407 | |
1408 | hw->link_status = HFA384x_LINK_CONNECTED; | |
1409 | netif_carrier_on(wlandev->netdev); | |
1410 | ||
1411 | break; | |
1412 | ||
1413 | case HFA384x_LINK_ASSOCFAIL: | |
1414 | /* This one is actually a peer to CONNECTED. We've | |
1415 | * requested a join for a given SSID and optionally BSSID. | |
1416 | * We can use this one to indicate authentication and | |
1417 | * association failures. The trick is going to be | |
1418 | * 1) identifying the failure, and 2) state management. | |
1419 | * Response: | |
1420 | * Disable Transmits, Ignore receives of data frames | |
1421 | */ | |
f3422882 MM |
1422 | if (hw->join_ap && --hw->join_retries > 0) { |
1423 | hfa384x_JoinRequest_data_t joinreq; | |
00b3ed16 GKH |
1424 | joinreq = hw->joinreq; |
1425 | /* Send the join request */ | |
f3422882 MM |
1426 | hfa384x_drvr_setconfig(hw, |
1427 | HFA384x_RID_JOINREQUEST, | |
1428 | &joinreq, | |
1429 | HFA384x_RID_JOINREQUEST_LEN); | |
1430 | printk(KERN_INFO | |
1431 | "linkstatus=ASSOCFAIL (re-submitting join)\n"); | |
00b3ed16 | 1432 | } else { |
350f2f4b | 1433 | printk(KERN_INFO "linkstatus=ASSOCFAIL (unhandled)\n"); |
00b3ed16 GKH |
1434 | } |
1435 | ||
1436 | netif_carrier_off(wlandev->netdev); | |
1437 | ||
cb3126e6 KR |
1438 | /* signal back up to cfg80211 layer */ |
1439 | prism2_connect_result(wlandev, P80211ENUM_truth_true); | |
1440 | ||
00b3ed16 GKH |
1441 | break; |
1442 | ||
1443 | default: | |
1444 | /* This is bad, IO port problems? */ | |
9b9556ec | 1445 | printk(KERN_WARNING |
f3422882 | 1446 | "unknown linkstatus=0x%02x\n", hw->link_status); |
00b3ed16 GKH |
1447 | goto failed; |
1448 | break; | |
1449 | } | |
1450 | ||
1451 | wlandev->linkstatus = (hw->link_status == HFA384x_LINK_CONNECTED); | |
00b3ed16 | 1452 | |
f3422882 MM |
1453 | failed: |
1454 | return; | |
00b3ed16 GKH |
1455 | } |
1456 | ||
1457 | /*---------------------------------------------------------------- | |
1458 | * prism2sta_inf_linkstatus | |
1459 | * | |
1460 | * Handles the receipt of a Link Status info frame. | |
1461 | * | |
1462 | * Arguments: | |
1463 | * wlandev wlan device structure | |
1464 | * inf ptr to info frame (contents in hfa384x order) | |
1465 | * | |
1466 | * Returns: | |
1467 | * nothing | |
1468 | * | |
1469 | * Side effects: | |
1470 | * | |
1471 | * Call context: | |
1472 | * interrupt | |
1473 | ----------------------------------------------------------------*/ | |
297f06ce MT |
1474 | static void prism2sta_inf_linkstatus(wlandevice_t *wlandev, |
1475 | hfa384x_InfFrame_t *inf) | |
00b3ed16 | 1476 | { |
f3422882 | 1477 | hfa384x_t *hw = (hfa384x_t *) wlandev->priv; |
00b3ed16 | 1478 | |
18c7f792 | 1479 | hw->link_status_new = le16_to_cpu(inf->info.linkstatus.linkstatus); |
00b3ed16 GKH |
1480 | |
1481 | schedule_work(&hw->link_bh); | |
1482 | ||
00b3ed16 GKH |
1483 | return; |
1484 | } | |
1485 | ||
1486 | /*---------------------------------------------------------------- | |
1487 | * prism2sta_inf_assocstatus | |
1488 | * | |
1489 | * Handles the receipt of an Association Status info frame. Should | |
1490 | * be present in APs only. | |
1491 | * | |
1492 | * Arguments: | |
1493 | * wlandev wlan device structure | |
1494 | * inf ptr to info frame (contents in hfa384x order) | |
1495 | * | |
1496 | * Returns: | |
1497 | * nothing | |
1498 | * | |
1499 | * Side effects: | |
1500 | * | |
1501 | * Call context: | |
1502 | * interrupt | |
1503 | ----------------------------------------------------------------*/ | |
297f06ce MT |
1504 | static void prism2sta_inf_assocstatus(wlandevice_t *wlandev, |
1505 | hfa384x_InfFrame_t *inf) | |
00b3ed16 | 1506 | { |
f3422882 MM |
1507 | hfa384x_t *hw = (hfa384x_t *) wlandev->priv; |
1508 | hfa384x_AssocStatus_t rec; | |
1509 | int i; | |
00b3ed16 | 1510 | |
00b3ed16 | 1511 | memcpy(&rec, &inf->info.assocstatus, sizeof(rec)); |
18c7f792 MM |
1512 | rec.assocstatus = le16_to_cpu(rec.assocstatus); |
1513 | rec.reason = le16_to_cpu(rec.reason); | |
00b3ed16 GKH |
1514 | |
1515 | /* | |
f9bd6495 CT |
1516 | ** Find the address in the list of authenticated stations. |
1517 | ** If it wasn't found, then this address has not been previously | |
1518 | ** authenticated and something weird has happened if this is | |
1519 | ** anything other than an "authentication failed" message. | |
1520 | ** If the address was found, then set the "associated" flag for | |
1521 | ** that station, based on whether the station is associating or | |
1522 | ** losing its association. Something weird has also happened | |
1523 | ** if we find the address in the list of authenticated stations | |
1524 | ** but we are getting an "authentication failed" message. | |
f3422882 | 1525 | */ |
00b3ed16 GKH |
1526 | |
1527 | for (i = 0; i < hw->authlist.cnt; i++) | |
28b17a4b | 1528 | if (memcmp(rec.sta_addr, hw->authlist.addr[i], ETH_ALEN) == 0) |
00b3ed16 GKH |
1529 | break; |
1530 | ||
1531 | if (i >= hw->authlist.cnt) { | |
1532 | if (rec.assocstatus != HFA384x_ASSOCSTATUS_AUTHFAIL) | |
f3422882 | 1533 | printk(KERN_WARNING |
f9bd6495 | 1534 | "assocstatus info frame received for non-authenticated station.\n"); |
00b3ed16 GKH |
1535 | } else { |
1536 | hw->authlist.assoc[i] = | |
f3422882 MM |
1537 | (rec.assocstatus == HFA384x_ASSOCSTATUS_STAASSOC || |
1538 | rec.assocstatus == HFA384x_ASSOCSTATUS_REASSOC); | |
00b3ed16 GKH |
1539 | |
1540 | if (rec.assocstatus == HFA384x_ASSOCSTATUS_AUTHFAIL) | |
f3422882 | 1541 | printk(KERN_WARNING |
f9bd6495 | 1542 | "authfail assocstatus info frame received for authenticated station.\n"); |
00b3ed16 GKH |
1543 | } |
1544 | ||
00b3ed16 GKH |
1545 | return; |
1546 | } | |
1547 | ||
1548 | /*---------------------------------------------------------------- | |
1549 | * prism2sta_inf_authreq | |
1550 | * | |
1551 | * Handles the receipt of an Authentication Request info frame. Should | |
1552 | * be present in APs only. | |
1553 | * | |
1554 | * Arguments: | |
1555 | * wlandev wlan device structure | |
1556 | * inf ptr to info frame (contents in hfa384x order) | |
1557 | * | |
1558 | * Returns: | |
1559 | * nothing | |
1560 | * | |
1561 | * Side effects: | |
1562 | * | |
1563 | * Call context: | |
1564 | * interrupt | |
1565 | * | |
1566 | ----------------------------------------------------------------*/ | |
297f06ce MT |
1567 | static void prism2sta_inf_authreq(wlandevice_t *wlandev, |
1568 | hfa384x_InfFrame_t *inf) | |
00b3ed16 | 1569 | { |
f3422882 | 1570 | hfa384x_t *hw = (hfa384x_t *) wlandev->priv; |
00b3ed16 GKH |
1571 | struct sk_buff *skb; |
1572 | ||
00b3ed16 GKH |
1573 | skb = dev_alloc_skb(sizeof(*inf)); |
1574 | if (skb) { | |
1575 | skb_put(skb, sizeof(*inf)); | |
1576 | memcpy(skb->data, inf, sizeof(*inf)); | |
1577 | skb_queue_tail(&hw->authq, skb); | |
1578 | schedule_work(&hw->link_bh); | |
1579 | } | |
00b3ed16 GKH |
1580 | } |
1581 | ||
297f06ce MT |
1582 | static void prism2sta_inf_authreq_defer(wlandevice_t *wlandev, |
1583 | hfa384x_InfFrame_t *inf) | |
00b3ed16 | 1584 | { |
f3422882 MM |
1585 | hfa384x_t *hw = (hfa384x_t *) wlandev->priv; |
1586 | hfa384x_authenticateStation_data_t rec; | |
00b3ed16 | 1587 | |
f3422882 MM |
1588 | int i, added, result, cnt; |
1589 | u8 *addr; | |
00b3ed16 | 1590 | |
00b3ed16 | 1591 | /* |
f3422882 MM |
1592 | ** Build the AuthenticateStation record. Initialize it for denying |
1593 | ** authentication. | |
1594 | */ | |
00b3ed16 | 1595 | |
28b17a4b | 1596 | memcpy(rec.address, inf->info.authreq.sta_addr, ETH_ALEN); |
00b3ed16 GKH |
1597 | rec.status = P80211ENUM_status_unspec_failure; |
1598 | ||
1599 | /* | |
f3422882 MM |
1600 | ** Authenticate based on the access mode. |
1601 | */ | |
00b3ed16 GKH |
1602 | |
1603 | switch (hw->accessmode) { | |
f3422882 | 1604 | case WLAN_ACCESS_NONE: |
00b3ed16 | 1605 | |
f3422882 MM |
1606 | /* |
1607 | ** Deny all new authentications. However, if a station | |
1608 | ** is ALREADY authenticated, then accept it. | |
1609 | */ | |
00b3ed16 | 1610 | |
f3422882 MM |
1611 | for (i = 0; i < hw->authlist.cnt; i++) |
1612 | if (memcmp(rec.address, hw->authlist.addr[i], | |
1613 | ETH_ALEN) == 0) { | |
1614 | rec.status = P80211ENUM_status_successful; | |
1615 | break; | |
1616 | } | |
00b3ed16 | 1617 | |
f3422882 | 1618 | break; |
00b3ed16 | 1619 | |
f3422882 | 1620 | case WLAN_ACCESS_ALL: |
00b3ed16 | 1621 | |
f3422882 MM |
1622 | /* |
1623 | ** Allow all authentications. | |
1624 | */ | |
00b3ed16 | 1625 | |
f3422882 MM |
1626 | rec.status = P80211ENUM_status_successful; |
1627 | break; | |
00b3ed16 | 1628 | |
f3422882 | 1629 | case WLAN_ACCESS_ALLOW: |
00b3ed16 | 1630 | |
f3422882 MM |
1631 | /* |
1632 | ** Only allow the authentication if the MAC address | |
1633 | ** is in the list of allowed addresses. | |
1634 | ** | |
1635 | ** Since this is the interrupt handler, we may be here | |
1636 | ** while the access list is in the middle of being | |
1637 | ** updated. Choose the list which is currently okay. | |
1638 | ** See "prism2mib_priv_accessallow()" for details. | |
1639 | */ | |
1640 | ||
1641 | if (hw->allow.modify == 0) { | |
1642 | cnt = hw->allow.cnt; | |
1643 | addr = hw->allow.addr[0]; | |
1644 | } else { | |
1645 | cnt = hw->allow.cnt1; | |
1646 | addr = hw->allow.addr1[0]; | |
1647 | } | |
1648 | ||
1649 | for (i = 0; i < cnt; i++, addr += ETH_ALEN) | |
1650 | if (memcmp(rec.address, addr, ETH_ALEN) == 0) { | |
1651 | rec.status = P80211ENUM_status_successful; | |
1652 | break; | |
00b3ed16 GKH |
1653 | } |
1654 | ||
f3422882 | 1655 | break; |
00b3ed16 | 1656 | |
f3422882 | 1657 | case WLAN_ACCESS_DENY: |
00b3ed16 | 1658 | |
f3422882 MM |
1659 | /* |
1660 | ** Allow the authentication UNLESS the MAC address is | |
1661 | ** in the list of denied addresses. | |
1662 | ** | |
1663 | ** Since this is the interrupt handler, we may be here | |
1664 | ** while the access list is in the middle of being | |
1665 | ** updated. Choose the list which is currently okay. | |
1666 | ** See "prism2mib_priv_accessdeny()" for details. | |
1667 | */ | |
00b3ed16 | 1668 | |
f3422882 MM |
1669 | if (hw->deny.modify == 0) { |
1670 | cnt = hw->deny.cnt; | |
1671 | addr = hw->deny.addr[0]; | |
1672 | } else { | |
1673 | cnt = hw->deny.cnt1; | |
1674 | addr = hw->deny.addr1[0]; | |
1675 | } | |
00b3ed16 | 1676 | |
f3422882 | 1677 | rec.status = P80211ENUM_status_successful; |
00b3ed16 | 1678 | |
f3422882 MM |
1679 | for (i = 0; i < cnt; i++, addr += ETH_ALEN) |
1680 | if (memcmp(rec.address, addr, ETH_ALEN) == 0) { | |
1681 | rec.status = P80211ENUM_status_unspec_failure; | |
1682 | break; | |
1683 | } | |
00b3ed16 | 1684 | |
f3422882 | 1685 | break; |
00b3ed16 GKH |
1686 | } |
1687 | ||
1688 | /* | |
f9bd6495 CT |
1689 | ** If the authentication is okay, then add the MAC address to the |
1690 | ** list of authenticated stations. Don't add the address if it | |
1691 | ** is already in the list. (802.11b does not seem to disallow | |
1692 | ** a station from issuing an authentication request when the | |
1693 | ** station is already authenticated. Does this sort of thing | |
1694 | ** ever happen? We might as well do the check just in case.) | |
f3422882 | 1695 | */ |
00b3ed16 GKH |
1696 | |
1697 | added = 0; | |
1698 | ||
1699 | if (rec.status == P80211ENUM_status_successful) { | |
1700 | for (i = 0; i < hw->authlist.cnt; i++) | |
f3422882 MM |
1701 | if (memcmp(rec.address, hw->authlist.addr[i], ETH_ALEN) |
1702 | == 0) | |
00b3ed16 GKH |
1703 | break; |
1704 | ||
1705 | if (i >= hw->authlist.cnt) { | |
1706 | if (hw->authlist.cnt >= WLAN_AUTH_MAX) { | |
1707 | rec.status = P80211ENUM_status_ap_full; | |
1708 | } else { | |
1709 | memcpy(hw->authlist.addr[hw->authlist.cnt], | |
f3422882 | 1710 | rec.address, ETH_ALEN); |
00b3ed16 GKH |
1711 | hw->authlist.cnt++; |
1712 | added = 1; | |
1713 | } | |
1714 | } | |
1715 | } | |
1716 | ||
1717 | /* | |
f3422882 MM |
1718 | ** Send back the results of the authentication. If this doesn't work, |
1719 | ** then make sure to remove the address from the authenticated list if | |
1720 | ** it was added. | |
1721 | */ | |
00b3ed16 | 1722 | |
18c7f792 | 1723 | rec.status = cpu_to_le16(rec.status); |
00b3ed16 GKH |
1724 | rec.algorithm = inf->info.authreq.algorithm; |
1725 | ||
1726 | result = hfa384x_drvr_setconfig(hw, HFA384x_RID_AUTHENTICATESTA, | |
f3422882 | 1727 | &rec, sizeof(rec)); |
00b3ed16 | 1728 | if (result) { |
f3422882 MM |
1729 | if (added) |
1730 | hw->authlist.cnt--; | |
1731 | printk(KERN_ERR | |
1732 | "setconfig(authenticatestation) failed, result=%d\n", | |
1733 | result); | |
00b3ed16 | 1734 | } |
00b3ed16 GKH |
1735 | return; |
1736 | } | |
1737 | ||
00b3ed16 GKH |
1738 | /*---------------------------------------------------------------- |
1739 | * prism2sta_inf_psusercnt | |
1740 | * | |
1741 | * Handles the receipt of a PowerSaveUserCount info frame. Should | |
1742 | * be present in APs only. | |
1743 | * | |
1744 | * Arguments: | |
1745 | * wlandev wlan device structure | |
1746 | * inf ptr to info frame (contents in hfa384x order) | |
1747 | * | |
1748 | * Returns: | |
1749 | * nothing | |
1750 | * | |
1751 | * Side effects: | |
1752 | * | |
1753 | * Call context: | |
1754 | * interrupt | |
1755 | ----------------------------------------------------------------*/ | |
297f06ce MT |
1756 | static void prism2sta_inf_psusercnt(wlandevice_t *wlandev, |
1757 | hfa384x_InfFrame_t *inf) | |
00b3ed16 | 1758 | { |
f3422882 | 1759 | hfa384x_t *hw = (hfa384x_t *) wlandev->priv; |
00b3ed16 | 1760 | |
18c7f792 | 1761 | hw->psusercount = le16_to_cpu(inf->info.psusercnt.usercnt); |
00b3ed16 | 1762 | |
00b3ed16 GKH |
1763 | return; |
1764 | } | |
1765 | ||
00b3ed16 GKH |
1766 | /*---------------------------------------------------------------- |
1767 | * prism2sta_ev_info | |
1768 | * | |
1769 | * Handles the Info event. | |
1770 | * | |
1771 | * Arguments: | |
1772 | * wlandev wlan device structure | |
1773 | * inf ptr to a generic info frame | |
1774 | * | |
1775 | * Returns: | |
1776 | * nothing | |
1777 | * | |
1778 | * Side effects: | |
1779 | * | |
1780 | * Call context: | |
1781 | * interrupt | |
1782 | ----------------------------------------------------------------*/ | |
297f06ce | 1783 | void prism2sta_ev_info(wlandevice_t *wlandev, hfa384x_InfFrame_t *inf) |
00b3ed16 | 1784 | { |
18c7f792 | 1785 | inf->infotype = le16_to_cpu(inf->infotype); |
00b3ed16 | 1786 | /* Dispatch */ |
f3422882 MM |
1787 | switch (inf->infotype) { |
1788 | case HFA384x_IT_HANDOVERADDR: | |
1789 | prism2sta_inf_handover(wlandev, inf); | |
1790 | break; | |
1791 | case HFA384x_IT_COMMTALLIES: | |
1792 | prism2sta_inf_tallies(wlandev, inf); | |
1793 | break; | |
1794 | case HFA384x_IT_HOSTSCANRESULTS: | |
1795 | prism2sta_inf_hostscanresults(wlandev, inf); | |
1796 | break; | |
1797 | case HFA384x_IT_SCANRESULTS: | |
1798 | prism2sta_inf_scanresults(wlandev, inf); | |
1799 | break; | |
1800 | case HFA384x_IT_CHINFORESULTS: | |
1801 | prism2sta_inf_chinforesults(wlandev, inf); | |
1802 | break; | |
1803 | case HFA384x_IT_LINKSTATUS: | |
1804 | prism2sta_inf_linkstatus(wlandev, inf); | |
1805 | break; | |
1806 | case HFA384x_IT_ASSOCSTATUS: | |
1807 | prism2sta_inf_assocstatus(wlandev, inf); | |
1808 | break; | |
1809 | case HFA384x_IT_AUTHREQ: | |
1810 | prism2sta_inf_authreq(wlandev, inf); | |
1811 | break; | |
1812 | case HFA384x_IT_PSUSERCNT: | |
1813 | prism2sta_inf_psusercnt(wlandev, inf); | |
1814 | break; | |
1815 | case HFA384x_IT_KEYIDCHANGED: | |
1816 | printk(KERN_WARNING "Unhandled IT_KEYIDCHANGED\n"); | |
1817 | break; | |
1818 | case HFA384x_IT_ASSOCREQ: | |
1819 | printk(KERN_WARNING "Unhandled IT_ASSOCREQ\n"); | |
1820 | break; | |
1821 | case HFA384x_IT_MICFAILURE: | |
1822 | printk(KERN_WARNING "Unhandled IT_MICFAILURE\n"); | |
1823 | break; | |
1824 | default: | |
1825 | printk(KERN_WARNING | |
1826 | "Unknown info type=0x%02x\n", inf->infotype); | |
1827 | break; | |
00b3ed16 | 1828 | } |
00b3ed16 GKH |
1829 | return; |
1830 | } | |
1831 | ||
00b3ed16 GKH |
1832 | /*---------------------------------------------------------------- |
1833 | * prism2sta_ev_txexc | |
1834 | * | |
1835 | * Handles the TxExc event. A Transmit Exception event indicates | |
1836 | * that the MAC's TX process was unsuccessful - so the packet did | |
1837 | * not get transmitted. | |
1838 | * | |
1839 | * Arguments: | |
1840 | * wlandev wlan device structure | |
1841 | * status tx frame status word | |
1842 | * | |
1843 | * Returns: | |
1844 | * nothing | |
1845 | * | |
1846 | * Side effects: | |
1847 | * | |
1848 | * Call context: | |
1849 | * interrupt | |
1850 | ----------------------------------------------------------------*/ | |
297f06ce | 1851 | void prism2sta_ev_txexc(wlandevice_t *wlandev, u16 status) |
00b3ed16 | 1852 | { |
a7cf7bae | 1853 | pr_debug("TxExc status=0x%x.\n", status); |
00b3ed16 | 1854 | |
00b3ed16 GKH |
1855 | return; |
1856 | } | |
1857 | ||
00b3ed16 GKH |
1858 | /*---------------------------------------------------------------- |
1859 | * prism2sta_ev_tx | |
1860 | * | |
1861 | * Handles the Tx event. | |
1862 | * | |
1863 | * Arguments: | |
1864 | * wlandev wlan device structure | |
1865 | * status tx frame status word | |
1866 | * Returns: | |
1867 | * nothing | |
1868 | * | |
1869 | * Side effects: | |
1870 | * | |
1871 | * Call context: | |
1872 | * interrupt | |
1873 | ----------------------------------------------------------------*/ | |
297f06ce | 1874 | void prism2sta_ev_tx(wlandevice_t *wlandev, u16 status) |
00b3ed16 | 1875 | { |
a7cf7bae | 1876 | pr_debug("Tx Complete, status=0x%04x\n", status); |
00b3ed16 GKH |
1877 | /* update linux network stats */ |
1878 | wlandev->linux_stats.tx_packets++; | |
00b3ed16 GKH |
1879 | return; |
1880 | } | |
1881 | ||
00b3ed16 GKH |
1882 | /*---------------------------------------------------------------- |
1883 | * prism2sta_ev_rx | |
1884 | * | |
1885 | * Handles the Rx event. | |
1886 | * | |
1887 | * Arguments: | |
1888 | * wlandev wlan device structure | |
1889 | * | |
1890 | * Returns: | |
1891 | * nothing | |
1892 | * | |
1893 | * Side effects: | |
1894 | * | |
1895 | * Call context: | |
1896 | * interrupt | |
1897 | ----------------------------------------------------------------*/ | |
297f06ce | 1898 | void prism2sta_ev_rx(wlandevice_t *wlandev, struct sk_buff *skb) |
00b3ed16 | 1899 | { |
00b3ed16 | 1900 | p80211netdev_rx(wlandev, skb); |
00b3ed16 GKH |
1901 | return; |
1902 | } | |
1903 | ||
1904 | /*---------------------------------------------------------------- | |
1905 | * prism2sta_ev_alloc | |
1906 | * | |
1907 | * Handles the Alloc event. | |
1908 | * | |
1909 | * Arguments: | |
1910 | * wlandev wlan device structure | |
1911 | * | |
1912 | * Returns: | |
1913 | * nothing | |
1914 | * | |
1915 | * Side effects: | |
1916 | * | |
1917 | * Call context: | |
1918 | * interrupt | |
1919 | ----------------------------------------------------------------*/ | |
297f06ce | 1920 | void prism2sta_ev_alloc(wlandevice_t *wlandev) |
00b3ed16 | 1921 | { |
cbec30c4 | 1922 | netif_wake_queue(wlandev->netdev); |
00b3ed16 GKH |
1923 | return; |
1924 | } | |
1925 | ||
00b3ed16 GKH |
1926 | /*---------------------------------------------------------------- |
1927 | * create_wlan | |
1928 | * | |
1929 | * Called at module init time. This creates the wlandevice_t structure | |
1930 | * and initializes it with relevant bits. | |
1931 | * | |
1932 | * Arguments: | |
1933 | * none | |
1934 | * | |
1935 | * Returns: | |
1936 | * the created wlandevice_t structure. | |
1937 | * | |
1938 | * Side effects: | |
f9bd6495 | 1939 | * also allocates the priv/hw structures. |
00b3ed16 GKH |
1940 | * |
1941 | * Call context: | |
1942 | * process thread | |
1943 | * | |
1944 | ----------------------------------------------------------------*/ | |
1945 | static wlandevice_t *create_wlan(void) | |
1946 | { | |
f3422882 MM |
1947 | wlandevice_t *wlandev = NULL; |
1948 | hfa384x_t *hw = NULL; | |
00b3ed16 | 1949 | |
f3422882 MM |
1950 | /* Alloc our structures */ |
1951 | wlandev = kmalloc(sizeof(wlandevice_t), GFP_KERNEL); | |
1952 | hw = kmalloc(sizeof(hfa384x_t), GFP_KERNEL); | |
00b3ed16 GKH |
1953 | |
1954 | if (!wlandev || !hw) { | |
edbd606c | 1955 | printk(KERN_ERR "%s: Memory allocation failure.\n", dev_info); |
7c98f718 MM |
1956 | kfree(wlandev); |
1957 | kfree(hw); | |
00b3ed16 GKH |
1958 | return NULL; |
1959 | } | |
1960 | ||
1961 | /* Clear all the structs */ | |
1962 | memset(wlandev, 0, sizeof(wlandevice_t)); | |
1963 | memset(hw, 0, sizeof(hfa384x_t)); | |
1964 | ||
1965 | /* Initialize the network device object. */ | |
1966 | wlandev->nsdname = dev_info; | |
1967 | wlandev->msdstate = WLAN_MSD_HWPRESENT_PENDING; | |
1968 | wlandev->priv = hw; | |
1969 | wlandev->open = prism2sta_open; | |
1970 | wlandev->close = prism2sta_close; | |
1971 | wlandev->reset = prism2sta_reset; | |
00b3ed16 GKH |
1972 | wlandev->txframe = prism2sta_txframe; |
1973 | wlandev->mlmerequest = prism2sta_mlmerequest; | |
1974 | wlandev->set_multicast_list = prism2sta_setmulticast; | |
1975 | wlandev->tx_timeout = hfa384x_tx_timeout; | |
1976 | ||
f3422882 | 1977 | wlandev->nsdcaps = P80211_NSDCAP_HWFRAGMENT | P80211_NSDCAP_AUTOJOIN; |
00b3ed16 | 1978 | |
25985edc | 1979 | /* Initialize the device private data structure. */ |
f3422882 | 1980 | hw->dot11_desired_bss_type = 1; |
00b3ed16 GKH |
1981 | |
1982 | return wlandev; | |
1983 | } | |
1984 | ||
00b3ed16 GKH |
1985 | void prism2sta_commsqual_defer(struct work_struct *data) |
1986 | { | |
f3422882 MM |
1987 | hfa384x_t *hw = container_of(data, struct hfa384x, commsqual_bh); |
1988 | wlandevice_t *wlandev = hw->wlandev; | |
00b3ed16 | 1989 | hfa384x_bytestr32_t ssid; |
b6bb56e6 EH |
1990 | struct p80211msg_dot11req_mibget msg; |
1991 | p80211item_uint32_t *mibitem = (p80211item_uint32_t *) | |
1992 | &msg.mibattribute.data; | |
00b3ed16 GKH |
1993 | int result = 0; |
1994 | ||
00b3ed16 GKH |
1995 | if (hw->wlandev->hwremoved) |
1996 | goto done; | |
1997 | ||
1998 | /* we don't care if we're in AP mode */ | |
1999 | if ((wlandev->macmode == WLAN_MACMODE_NONE) || | |
2000 | (wlandev->macmode == WLAN_MACMODE_ESS_AP)) { | |
2001 | goto done; | |
2002 | } | |
2003 | ||
2004 | /* It only makes sense to poll these in non-IBSS */ | |
2005 | if (wlandev->macmode != WLAN_MACMODE_IBSS_STA) { | |
f9bd6495 CT |
2006 | result = hfa384x_drvr_getconfig( |
2007 | hw, HFA384x_RID_DBMCOMMSQUALITY, | |
2008 | &hw->qual, HFA384x_RID_DBMCOMMSQUALITY_LEN); | |
00b3ed16 GKH |
2009 | |
2010 | if (result) { | |
edbd606c | 2011 | printk(KERN_ERR "error fetching commsqual\n"); |
00b3ed16 GKH |
2012 | goto done; |
2013 | } | |
2014 | ||
a7cf7bae | 2015 | pr_debug("commsqual %d %d %d\n", |
75f49e07 MT |
2016 | le16_to_cpu(hw->qual.CQ_currBSS), |
2017 | le16_to_cpu(hw->qual.ASL_currBSS), | |
2018 | le16_to_cpu(hw->qual.ANL_currFC)); | |
00b3ed16 GKH |
2019 | } |
2020 | ||
cb3126e6 KR |
2021 | /* Get the signal rate */ |
2022 | msg.msgcode = DIDmsg_dot11req_mibget; | |
2023 | mibitem->did = DIDmib_p2_p2MAC_p2CurrentTxRate; | |
b6bb56e6 | 2024 | result = p80211req_dorequest(wlandev, (u8 *) &msg); |
cb3126e6 KR |
2025 | |
2026 | if (result) { | |
2027 | pr_debug("get signal rate failed, result = %d\n", | |
2028 | result); | |
2029 | goto done; | |
2030 | } | |
2031 | ||
2032 | switch (mibitem->data) { | |
2033 | case HFA384x_RATEBIT_1: | |
2034 | hw->txrate = 10; | |
2035 | break; | |
2036 | case HFA384x_RATEBIT_2: | |
2037 | hw->txrate = 20; | |
2038 | break; | |
2039 | case HFA384x_RATEBIT_5dot5: | |
2040 | hw->txrate = 55; | |
2041 | break; | |
2042 | case HFA384x_RATEBIT_11: | |
2043 | hw->txrate = 110; | |
2044 | break; | |
2045 | default: | |
2046 | pr_debug("Bad ratebit (%d)\n", mibitem->data); | |
2047 | } | |
2048 | ||
00b3ed16 GKH |
2049 | /* Lastly, we need to make sure the BSSID didn't change on us */ |
2050 | result = hfa384x_drvr_getconfig(hw, | |
2051 | HFA384x_RID_CURRENTBSSID, | |
2052 | wlandev->bssid, WLAN_BSSID_LEN); | |
f3422882 | 2053 | if (result) { |
75f49e07 MT |
2054 | pr_debug("getconfig(0x%02x) failed, result = %d\n", |
2055 | HFA384x_RID_CURRENTBSSID, result); | |
00b3ed16 GKH |
2056 | goto done; |
2057 | } | |
2058 | ||
2059 | result = hfa384x_drvr_getconfig(hw, | |
2060 | HFA384x_RID_CURRENTSSID, | |
2061 | &ssid, sizeof(ssid)); | |
f3422882 | 2062 | if (result) { |
75f49e07 MT |
2063 | pr_debug("getconfig(0x%02x) failed, result = %d\n", |
2064 | HFA384x_RID_CURRENTSSID, result); | |
00b3ed16 GKH |
2065 | goto done; |
2066 | } | |
5dd8acc8 SK |
2067 | prism2mgmt_bytestr2pstr((hfa384x_bytestr_t *) &ssid, |
2068 | (p80211pstrd_t *) &wlandev->ssid); | |
00b3ed16 GKH |
2069 | |
2070 | /* Reschedule timer */ | |
2071 | mod_timer(&hw->commsqual_timer, jiffies + HZ); | |
2072 | ||
f3422882 | 2073 | done: |
8a251b55 | 2074 | ; |
00b3ed16 GKH |
2075 | } |
2076 | ||
2077 | void prism2sta_commsqual_timer(unsigned long data) | |
2078 | { | |
f3422882 | 2079 | hfa384x_t *hw = (hfa384x_t *) data; |
00b3ed16 | 2080 | |
00b3ed16 | 2081 | schedule_work(&hw->commsqual_bh); |
00b3ed16 | 2082 | } |