2 * Marvell Wireless LAN device driver: scan ioctl and command handling
4 * Copyright (C) 2011, Marvell International Ltd.
6 * This software file (the "File") is distributed by Marvell International
7 * Ltd. under the terms of the GNU General Public License Version 2, June 1991
8 * (the "License"). You may use, redistribute and/or modify this File in
9 * accordance with the terms and conditions of the License, a copy of which
10 * is available by writing to the Free Software Foundation, Inc.,
11 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA or on the
12 * worldwide web at http://www.gnu.org/licenses/old-licenses/gpl-2.0.txt.
14 * THE FILE IS DISTRIBUTED AS-IS, WITHOUT WARRANTY OF ANY KIND, AND THE
15 * IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE
16 * ARE EXPRESSLY DISCLAIMED. The License provides additional details about
17 * this warranty disclaimer.
28 /* The maximum number of channels the firmware can scan per command */
29 #define MWIFIEX_MAX_CHANNELS_PER_SPECIFIC_SCAN 14
31 #define MWIFIEX_CHANNELS_PER_SCAN_CMD 4
33 /* Memory needed to store a max sized Channel List TLV for a firmware scan */
34 #define CHAN_TLV_MAX_SIZE (sizeof(struct mwifiex_ie_types_header) \
35 + (MWIFIEX_MAX_CHANNELS_PER_SPECIFIC_SCAN \
36 *sizeof(struct mwifiex_chan_scan_param_set)))
38 /* Memory needed to store supported rate */
39 #define RATE_TLV_MAX_SIZE (sizeof(struct mwifiex_ie_types_rates_param_set) \
40 + HOSTCMD_SUPPORTED_RATES)
42 /* Memory needed to store a max number/size WildCard SSID TLV for a firmware
44 #define WILDCARD_SSID_TLV_MAX_SIZE \
45 (MWIFIEX_MAX_SSID_LIST_LENGTH * \
46 (sizeof(struct mwifiex_ie_types_wildcard_ssid_params) \
47 + IEEE80211_MAX_SSID_LEN))
49 /* Maximum memory needed for a mwifiex_scan_cmd_config with all TLVs at max */
50 #define MAX_SCAN_CFG_ALLOC (sizeof(struct mwifiex_scan_cmd_config) \
51 + sizeof(struct mwifiex_ie_types_num_probes) \
52 + sizeof(struct mwifiex_ie_types_htcap) \
55 + WILDCARD_SSID_TLV_MAX_SIZE)
58 union mwifiex_scan_cmd_config_tlv {
59 /* Scan configuration (variable length) */
60 struct mwifiex_scan_cmd_config config;
61 /* Max allocated block */
62 u8 config_alloc_buf[MAX_SCAN_CFG_ALLOC];
70 static u8 mwifiex_wpa_oui[CIPHER_SUITE_MAX][4] = {
71 { 0x00, 0x50, 0xf2, 0x02 }, /* TKIP */
72 { 0x00, 0x50, 0xf2, 0x04 }, /* AES */
74 static u8 mwifiex_rsn_oui[CIPHER_SUITE_MAX][4] = {
75 { 0x00, 0x0f, 0xac, 0x02 }, /* TKIP */
76 { 0x00, 0x0f, 0xac, 0x04 }, /* AES */
80 * This function parses a given IE for a given OUI.
82 * This is used to parse a WPA/RSN IE to find if it has
86 mwifiex_search_oui_in_ie(struct ie_body *iebody, u8 *oui)
90 count = iebody->ptk_cnt[0];
92 /* There could be multiple OUIs for PTK hence
94 2) Check all the OUIs for AES.
95 3) If one of them is AES then pass success. */
97 if (!memcmp(iebody->ptk_body, oui, sizeof(iebody->ptk_body)))
98 return MWIFIEX_OUI_PRESENT;
102 iebody = (struct ie_body *) ((u8 *) iebody +
103 sizeof(iebody->ptk_body));
106 pr_debug("info: %s: OUI is not found in PTK\n", __func__);
107 return MWIFIEX_OUI_NOT_PRESENT;
111 * This function checks if a given OUI is present in a RSN IE.
113 * The function first checks if a RSN IE is present or not in the
114 * BSS descriptor. It tries to locate the OUI only if such an IE is
118 mwifiex_is_rsn_oui_present(struct mwifiex_bssdescriptor *bss_desc, u32 cipher)
121 struct ie_body *iebody;
122 u8 ret = MWIFIEX_OUI_NOT_PRESENT;
124 if (((bss_desc->bcn_rsn_ie) && ((*(bss_desc->bcn_rsn_ie)).
125 ieee_hdr.element_id == WLAN_EID_RSN))) {
126 iebody = (struct ie_body *)
127 (((u8 *) bss_desc->bcn_rsn_ie->data) +
129 oui = &mwifiex_rsn_oui[cipher][0];
130 ret = mwifiex_search_oui_in_ie(iebody, oui);
138 * This function checks if a given OUI is present in a WPA IE.
140 * The function first checks if a WPA IE is present or not in the
141 * BSS descriptor. It tries to locate the OUI only if such an IE is
145 mwifiex_is_wpa_oui_present(struct mwifiex_bssdescriptor *bss_desc, u32 cipher)
148 struct ie_body *iebody;
149 u8 ret = MWIFIEX_OUI_NOT_PRESENT;
151 if (((bss_desc->bcn_wpa_ie) && ((*(bss_desc->bcn_wpa_ie)).
152 vend_hdr.element_id == WLAN_EID_WPA))) {
153 iebody = (struct ie_body *) bss_desc->bcn_wpa_ie->data;
154 oui = &mwifiex_wpa_oui[cipher][0];
155 ret = mwifiex_search_oui_in_ie(iebody, oui);
163 * This function compares two SSIDs and checks if they match.
166 mwifiex_ssid_cmp(struct mwifiex_802_11_ssid *ssid1,
167 struct mwifiex_802_11_ssid *ssid2)
169 if (!ssid1 || !ssid2 || (ssid1->ssid_len != ssid2->ssid_len))
171 return memcmp(ssid1->ssid, ssid2->ssid, ssid1->ssid_len);
175 * Sends IOCTL request to start a scan with user configurations.
177 * This function allocates the IOCTL request buffer, fills it
178 * with requisite parameters and calls the IOCTL handler.
180 * Upon completion, it also generates a wireless event to notify
183 int mwifiex_set_user_scan_ioctl(struct mwifiex_private *priv,
184 struct mwifiex_user_scan_cfg *scan_req)
188 priv->adapter->scan_wait_q_woken = false;
190 status = mwifiex_scan_networks(priv, scan_req);
192 status = mwifiex_wait_queue_complete(priv->adapter);
198 * This function checks if wapi is enabled in driver and scanned network is
199 * compatible with it.
202 mwifiex_is_network_compatible_for_wapi(struct mwifiex_private *priv,
203 struct mwifiex_bssdescriptor *bss_desc)
205 if (priv->sec_info.wapi_enabled &&
206 (bss_desc->bcn_wapi_ie &&
207 ((*(bss_desc->bcn_wapi_ie)).ieee_hdr.element_id ==
208 WLAN_EID_BSS_AC_ACCESS_DELAY))) {
215 * This function checks if driver is configured with no security mode and
216 * scanned network is compatible with it.
219 mwifiex_is_network_compatible_for_no_sec(struct mwifiex_private *priv,
220 struct mwifiex_bssdescriptor *bss_desc)
222 if (priv->sec_info.wep_status == MWIFIEX_802_11_WEP_DISABLED
223 && !priv->sec_info.wpa_enabled && !priv->sec_info.wpa2_enabled
224 && ((!bss_desc->bcn_wpa_ie) ||
225 ((*(bss_desc->bcn_wpa_ie)).vend_hdr.element_id !=
227 && ((!bss_desc->bcn_rsn_ie) ||
228 ((*(bss_desc->bcn_rsn_ie)).ieee_hdr.element_id !=
230 && !priv->sec_info.encryption_mode
231 && !bss_desc->privacy) {
238 * This function checks if static WEP is enabled in driver and scanned network
239 * is compatible with it.
242 mwifiex_is_network_compatible_for_static_wep(struct mwifiex_private *priv,
243 struct mwifiex_bssdescriptor *bss_desc)
245 if (priv->sec_info.wep_status == MWIFIEX_802_11_WEP_ENABLED
246 && !priv->sec_info.wpa_enabled && !priv->sec_info.wpa2_enabled
247 && bss_desc->privacy) {
254 * This function checks if wpa is enabled in driver and scanned network is
255 * compatible with it.
258 mwifiex_is_network_compatible_for_wpa(struct mwifiex_private *priv,
259 struct mwifiex_bssdescriptor *bss_desc)
261 if (priv->sec_info.wep_status == MWIFIEX_802_11_WEP_DISABLED
262 && priv->sec_info.wpa_enabled && !priv->sec_info.wpa2_enabled
263 && ((bss_desc->bcn_wpa_ie) && ((*(bss_desc->bcn_wpa_ie)).vend_hdr.
264 element_id == WLAN_EID_WPA))
266 * Privacy bit may NOT be set in some APs like
267 * LinkSys WRT54G && bss_desc->privacy
270 dev_dbg(priv->adapter->dev, "info: %s: WPA:"
271 " wpa_ie=%#x wpa2_ie=%#x WEP=%s WPA=%s WPA2=%s "
272 "EncMode=%#x privacy=%#x\n", __func__,
273 (bss_desc->bcn_wpa_ie) ?
274 (*(bss_desc->bcn_wpa_ie)).
275 vend_hdr.element_id : 0,
276 (bss_desc->bcn_rsn_ie) ?
277 (*(bss_desc->bcn_rsn_ie)).
278 ieee_hdr.element_id : 0,
279 (priv->sec_info.wep_status ==
280 MWIFIEX_802_11_WEP_ENABLED) ? "e" : "d",
281 (priv->sec_info.wpa_enabled) ? "e" : "d",
282 (priv->sec_info.wpa2_enabled) ? "e" : "d",
283 priv->sec_info.encryption_mode,
291 * This function checks if wpa2 is enabled in driver and scanned network is
292 * compatible with it.
295 mwifiex_is_network_compatible_for_wpa2(struct mwifiex_private *priv,
296 struct mwifiex_bssdescriptor *bss_desc)
298 if (priv->sec_info.wep_status == MWIFIEX_802_11_WEP_DISABLED
299 && !priv->sec_info.wpa_enabled && priv->sec_info.wpa2_enabled
300 && ((bss_desc->bcn_rsn_ie) && ((*(bss_desc->bcn_rsn_ie)).ieee_hdr.
301 element_id == WLAN_EID_RSN))
303 * Privacy bit may NOT be set in some APs like
304 * LinkSys WRT54G && bss_desc->privacy
307 dev_dbg(priv->adapter->dev, "info: %s: WPA2: "
308 " wpa_ie=%#x wpa2_ie=%#x WEP=%s WPA=%s WPA2=%s "
309 "EncMode=%#x privacy=%#x\n", __func__,
310 (bss_desc->bcn_wpa_ie) ?
311 (*(bss_desc->bcn_wpa_ie)).
312 vend_hdr.element_id : 0,
313 (bss_desc->bcn_rsn_ie) ?
314 (*(bss_desc->bcn_rsn_ie)).
315 ieee_hdr.element_id : 0,
316 (priv->sec_info.wep_status ==
317 MWIFIEX_802_11_WEP_ENABLED) ? "e" : "d",
318 (priv->sec_info.wpa_enabled) ? "e" : "d",
319 (priv->sec_info.wpa2_enabled) ? "e" : "d",
320 priv->sec_info.encryption_mode,
328 * This function checks if adhoc AES is enabled in driver and scanned network is
329 * compatible with it.
332 mwifiex_is_network_compatible_for_adhoc_aes(struct mwifiex_private *priv,
333 struct mwifiex_bssdescriptor *bss_desc)
335 if (priv->sec_info.wep_status == MWIFIEX_802_11_WEP_DISABLED
336 && !priv->sec_info.wpa_enabled && !priv->sec_info.wpa2_enabled
337 && ((!bss_desc->bcn_wpa_ie) || ((*(bss_desc->bcn_wpa_ie)).vend_hdr.
338 element_id != WLAN_EID_WPA))
339 && ((!bss_desc->bcn_rsn_ie) || ((*(bss_desc->bcn_rsn_ie)).ieee_hdr.
340 element_id != WLAN_EID_RSN))
341 && !priv->sec_info.encryption_mode
342 && bss_desc->privacy) {
349 * This function checks if dynamic WEP is enabled in driver and scanned network
350 * is compatible with it.
353 mwifiex_is_network_compatible_for_dynamic_wep(struct mwifiex_private *priv,
354 struct mwifiex_bssdescriptor *bss_desc)
356 if (priv->sec_info.wep_status == MWIFIEX_802_11_WEP_DISABLED
357 && !priv->sec_info.wpa_enabled && !priv->sec_info.wpa2_enabled
358 && ((!bss_desc->bcn_wpa_ie) || ((*(bss_desc->bcn_wpa_ie)).vend_hdr.
359 element_id != WLAN_EID_WPA))
360 && ((!bss_desc->bcn_rsn_ie) || ((*(bss_desc->bcn_rsn_ie)).ieee_hdr.
361 element_id != WLAN_EID_RSN))
362 && priv->sec_info.encryption_mode
363 && bss_desc->privacy) {
364 dev_dbg(priv->adapter->dev, "info: %s: dynamic "
365 "WEP: wpa_ie=%#x wpa2_ie=%#x "
366 "EncMode=%#x privacy=%#x\n",
368 (bss_desc->bcn_wpa_ie) ?
369 (*(bss_desc->bcn_wpa_ie)).
370 vend_hdr.element_id : 0,
371 (bss_desc->bcn_rsn_ie) ?
372 (*(bss_desc->bcn_rsn_ie)).
373 ieee_hdr.element_id : 0,
374 priv->sec_info.encryption_mode,
382 * This function checks if a scanned network is compatible with the driver
385 * WEP WPA WPA2 ad-hoc encrypt Network
386 * enabled enabled enabled AES mode Privacy WPA WPA2 Compatible
387 * 0 0 0 0 NONE 0 0 0 yes No security
388 * 0 1 0 0 x 1x 1 x yes WPA (disable
390 * 0 0 1 0 x 1x x 1 yes WPA2 (disable
392 * 0 0 0 1 NONE 1 0 0 yes Ad-hoc AES
393 * 1 0 0 0 NONE 1 0 0 yes Static WEP
395 * 0 0 0 0 !=NONE 1 0 0 yes Dynamic WEP
397 * Compatibility is not matched while roaming, except for mode.
400 mwifiex_is_network_compatible(struct mwifiex_private *priv,
401 struct mwifiex_bssdescriptor *bss_desc, u32 mode)
403 struct mwifiex_adapter *adapter = priv->adapter;
405 bss_desc->disable_11n = false;
407 /* Don't check for compatibility if roaming */
408 if (priv->media_connected && (priv->bss_mode == NL80211_IFTYPE_STATION)
409 && (bss_desc->bss_mode == NL80211_IFTYPE_STATION))
412 if (priv->wps.session_enable) {
413 dev_dbg(adapter->dev,
414 "info: return success directly in WPS period\n");
418 if (mwifiex_is_network_compatible_for_wapi(priv, bss_desc)) {
419 dev_dbg(adapter->dev, "info: return success for WAPI AP\n");
423 if (bss_desc->bss_mode == mode) {
424 if (mwifiex_is_network_compatible_for_no_sec(priv, bss_desc)) {
427 } else if (mwifiex_is_network_compatible_for_static_wep(priv,
429 /* Static WEP enabled */
430 dev_dbg(adapter->dev, "info: Disable 11n in WEP mode.\n");
431 bss_desc->disable_11n = true;
433 } else if (mwifiex_is_network_compatible_for_wpa(priv,
436 if (((priv->adapter->config_bands & BAND_GN
437 || priv->adapter->config_bands & BAND_AN)
438 && bss_desc->bcn_ht_cap)
439 && !mwifiex_is_wpa_oui_present(bss_desc,
440 CIPHER_SUITE_CCMP)) {
442 if (mwifiex_is_wpa_oui_present(bss_desc,
443 CIPHER_SUITE_TKIP)) {
444 dev_dbg(adapter->dev,
445 "info: Disable 11n if AES "
446 "is not supported by AP\n");
447 bss_desc->disable_11n = true;
453 } else if (mwifiex_is_network_compatible_for_wpa2(priv,
456 if (((priv->adapter->config_bands & BAND_GN
457 || priv->adapter->config_bands & BAND_AN)
458 && bss_desc->bcn_ht_cap)
459 && !mwifiex_is_rsn_oui_present(bss_desc,
460 CIPHER_SUITE_CCMP)) {
462 if (mwifiex_is_rsn_oui_present(bss_desc,
463 CIPHER_SUITE_TKIP)) {
464 dev_dbg(adapter->dev,
465 "info: Disable 11n if AES "
466 "is not supported by AP\n");
467 bss_desc->disable_11n = true;
473 } else if (mwifiex_is_network_compatible_for_adhoc_aes(priv,
475 /* Ad-hoc AES enabled */
477 } else if (mwifiex_is_network_compatible_for_dynamic_wep(priv,
479 /* Dynamic WEP enabled */
483 /* Security doesn't match */
484 dev_dbg(adapter->dev, "info: %s: failed: "
485 "wpa_ie=%#x wpa2_ie=%#x WEP=%s WPA=%s WPA2=%s EncMode"
486 "=%#x privacy=%#x\n",
488 (bss_desc->bcn_wpa_ie) ?
489 (*(bss_desc->bcn_wpa_ie)).vend_hdr.
491 (bss_desc->bcn_rsn_ie) ?
492 (*(bss_desc->bcn_rsn_ie)).ieee_hdr.
494 (priv->sec_info.wep_status ==
495 MWIFIEX_802_11_WEP_ENABLED) ? "e" : "d",
496 (priv->sec_info.wpa_enabled) ? "e" : "d",
497 (priv->sec_info.wpa2_enabled) ? "e" : "d",
498 priv->sec_info.encryption_mode, bss_desc->privacy);
502 /* Mode doesn't match */
507 * This function creates a channel list for the driver to scan, based
508 * on region/band information.
510 * This routine is used for any scan that is not provided with a
511 * specific channel list to scan.
514 mwifiex_scan_create_channel_list(struct mwifiex_private *priv,
515 const struct mwifiex_user_scan_cfg
517 struct mwifiex_chan_scan_param_set
521 enum ieee80211_band band;
522 struct ieee80211_supported_band *sband;
523 struct ieee80211_channel *ch;
524 struct mwifiex_adapter *adapter = priv->adapter;
528 for (band = 0; (band < IEEE80211_NUM_BANDS) ; band++) {
530 if (!priv->wdev->wiphy->bands[band])
533 sband = priv->wdev->wiphy->bands[band];
535 for (i = 0; (i < sband->n_channels) ; i++) {
536 ch = &sband->channels[i];
537 if (ch->flags & IEEE80211_CHAN_DISABLED)
539 scan_chan_list[chan_idx].radio_type = band;
540 scan_type = ch->flags & IEEE80211_CHAN_PASSIVE_SCAN;
542 user_scan_in->chan_list[0].scan_time)
543 scan_chan_list[chan_idx].max_scan_time =
544 cpu_to_le16((u16) user_scan_in->
545 chan_list[0].scan_time);
546 else if (scan_type == MWIFIEX_SCAN_TYPE_PASSIVE)
547 scan_chan_list[chan_idx].max_scan_time =
548 cpu_to_le16(adapter->passive_scan_time);
550 scan_chan_list[chan_idx].max_scan_time =
551 cpu_to_le16(adapter->active_scan_time);
552 if (scan_type == MWIFIEX_SCAN_TYPE_PASSIVE)
553 scan_chan_list[chan_idx].chan_scan_mode_bitmap
554 |= MWIFIEX_PASSIVE_SCAN;
556 scan_chan_list[chan_idx].chan_scan_mode_bitmap
557 &= ~MWIFIEX_PASSIVE_SCAN;
558 scan_chan_list[chan_idx].chan_number =
561 scan_chan_list[chan_idx].max_scan_time =
562 cpu_to_le16(adapter->specific_scan_time);
563 scan_chan_list[chan_idx].chan_scan_mode_bitmap
564 |= MWIFIEX_DISABLE_CHAN_FILT;
573 * This function constructs and sends multiple scan config commands to
576 * Previous routines in the code flow have created a scan command configuration
577 * with any requested TLVs. This function splits the channel TLV into maximum
578 * channels supported per scan lists and sends the portion of the channel TLV,
579 * along with the other TLVs, to the firmware.
582 mwifiex_scan_channel_list(struct mwifiex_private *priv,
583 u32 max_chan_per_scan, u8 filtered_scan,
584 struct mwifiex_scan_cmd_config *scan_cfg_out,
585 struct mwifiex_ie_types_chan_list_param_set
587 struct mwifiex_chan_scan_param_set *scan_chan_list)
590 struct mwifiex_chan_scan_param_set *tmp_chan_list;
591 struct mwifiex_chan_scan_param_set *start_chan;
597 if (!scan_cfg_out || !chan_tlv_out || !scan_chan_list) {
598 dev_dbg(priv->adapter->dev,
599 "info: Scan: Null detect: %p, %p, %p\n",
600 scan_cfg_out, chan_tlv_out, scan_chan_list);
604 chan_tlv_out->header.type = cpu_to_le16(TLV_TYPE_CHANLIST);
606 /* Set the temp channel struct pointer to the start of the desired
608 tmp_chan_list = scan_chan_list;
610 /* Loop through the desired channel list, sending a new firmware scan
611 commands for each max_chan_per_scan channels (or for 1,6,11
612 individually if configured accordingly) */
613 while (tmp_chan_list->chan_number) {
617 chan_tlv_out->header.len = 0;
618 start_chan = tmp_chan_list;
622 * Construct the Channel TLV for the scan command. Continue to
623 * insert channel TLVs until:
624 * - the tlv_idx hits the maximum configured per scan command
625 * - the next channel to insert is 0 (end of desired channel
627 * - done_early is set (controlling individual scanning of
630 while (tlv_idx < max_chan_per_scan
631 && tmp_chan_list->chan_number && !done_early) {
633 dev_dbg(priv->adapter->dev,
634 "info: Scan: Chan(%3d), Radio(%d),"
635 " Mode(%d, %d), Dur(%d)\n",
636 tmp_chan_list->chan_number,
637 tmp_chan_list->radio_type,
638 tmp_chan_list->chan_scan_mode_bitmap
639 & MWIFIEX_PASSIVE_SCAN,
640 (tmp_chan_list->chan_scan_mode_bitmap
641 & MWIFIEX_DISABLE_CHAN_FILT) >> 1,
642 le16_to_cpu(tmp_chan_list->max_scan_time));
644 /* Copy the current channel TLV to the command being
646 memcpy(chan_tlv_out->chan_scan_param + tlv_idx,
648 sizeof(chan_tlv_out->chan_scan_param));
650 /* Increment the TLV header length by the size
652 chan_tlv_out->header.len =
653 cpu_to_le16(le16_to_cpu(chan_tlv_out->header.len) +
654 (sizeof(chan_tlv_out->chan_scan_param)));
657 * The tlv buffer length is set to the number of bytes
658 * of the between the channel tlv pointer and the start
659 * of the tlv buffer. This compensates for any TLVs
660 * that were appended before the channel list.
662 scan_cfg_out->tlv_buf_len = (u32) ((u8 *) chan_tlv_out -
663 scan_cfg_out->tlv_buf);
665 /* Add the size of the channel tlv header and the data
667 scan_cfg_out->tlv_buf_len +=
668 (sizeof(chan_tlv_out->header)
669 + le16_to_cpu(chan_tlv_out->header.len));
671 /* Increment the index to the channel tlv we are
675 /* Count the total scan time per command */
677 le16_to_cpu(tmp_chan_list->max_scan_time);
681 /* Stop the loop if the *current* channel is in the
682 1,6,11 set and we are not filtering on a BSSID
684 if (!filtered_scan && (tmp_chan_list->chan_number == 1
685 || tmp_chan_list->chan_number == 6
686 || tmp_chan_list->chan_number == 11))
689 /* Increment the tmp pointer to the next channel to
693 /* Stop the loop if the *next* channel is in the 1,6,11
694 set. This will cause it to be the only channel
695 scanned on the next interation */
696 if (!filtered_scan && (tmp_chan_list->chan_number == 1
697 || tmp_chan_list->chan_number == 6
698 || tmp_chan_list->chan_number == 11))
702 /* The total scan time should be less than scan command timeout
704 if (total_scan_time > MWIFIEX_MAX_TOTAL_SCAN_TIME) {
705 dev_err(priv->adapter->dev, "total scan time %dms"
706 " is over limit (%dms), scan skipped\n",
707 total_scan_time, MWIFIEX_MAX_TOTAL_SCAN_TIME);
712 priv->adapter->scan_channels = start_chan;
714 /* Send the scan command to the firmware with the specified
716 ret = mwifiex_send_cmd_async(priv, HostCmd_CMD_802_11_SCAN,
717 HostCmd_ACT_GEN_SET, 0,
730 * This function constructs a scan command configuration structure to use
733 * Application layer or other functions can invoke network scanning
734 * with a scan configuration supplied in a user scan configuration structure.
735 * This structure is used as the basis of one or many scan command configuration
736 * commands that are sent to the command processing module and eventually to the
739 * This function creates a scan command configuration structure based on the
740 * following user supplied parameters (if present):
743 * - Number of Probes to be sent
746 * If the SSID or BSSID filter is not present, the filter is disabled/cleared.
747 * If the number of probes is not set, adapter default setting is used.
750 mwifiex_scan_setup_scan_config(struct mwifiex_private *priv,
751 const struct mwifiex_user_scan_cfg *user_scan_in,
752 struct mwifiex_scan_cmd_config *scan_cfg_out,
753 struct mwifiex_ie_types_chan_list_param_set
755 struct mwifiex_chan_scan_param_set
757 u8 *max_chan_per_scan, u8 *filtered_scan,
758 u8 *scan_current_only)
760 struct mwifiex_adapter *adapter = priv->adapter;
761 struct mwifiex_ie_types_num_probes *num_probes_tlv;
762 struct mwifiex_ie_types_wildcard_ssid_params *wildcard_ssid_tlv;
763 struct mwifiex_ie_types_rates_param_set *rates_tlv;
764 const u8 zero_mac[ETH_ALEN] = { 0, 0, 0, 0, 0, 0 };
775 u8 rates[MWIFIEX_SUPPORTED_RATES];
777 struct mwifiex_ie_types_htcap *ht_cap;
779 /* The tlv_buf_len is calculated for each scan command. The TLVs added
780 in this routine will be preserved since the routine that sends the
781 command will append channelTLVs at *chan_list_out. The difference
782 between the *chan_list_out and the tlv_buf start will be used to
783 calculate the size of anything we add in this routine. */
784 scan_cfg_out->tlv_buf_len = 0;
786 /* Running tlv pointer. Assigned to chan_list_out at end of function
787 so later routines know where channels can be added to the command
789 tlv_pos = scan_cfg_out->tlv_buf;
791 /* Initialize the scan as un-filtered; the flag is later set to TRUE
792 below if a SSID or BSSID filter is sent in the command */
793 *filtered_scan = false;
795 /* Initialize the scan as not being only on the current channel. If
796 the channel list is customized, only contains one channel, and is
797 the active channel, this is set true and data flow is not halted. */
798 *scan_current_only = false;
802 /* Default the ssid_filter flag to TRUE, set false under
803 certain wildcard conditions and qualified by the existence
804 of an SSID list before marking the scan as filtered */
807 /* Set the BSS type scan filter, use Adapter setting if
809 scan_cfg_out->bss_mode =
810 (user_scan_in->bss_mode ? (u8) user_scan_in->
811 bss_mode : (u8) adapter->scan_mode);
813 /* Set the number of probes to send, use Adapter setting
816 (user_scan_in->num_probes ? user_scan_in->
817 num_probes : adapter->scan_probes);
820 * Set the BSSID filter to the incoming configuration,
821 * if non-zero. If not set, it will remain disabled
824 memcpy(scan_cfg_out->specific_bssid,
825 user_scan_in->specific_bssid,
826 sizeof(scan_cfg_out->specific_bssid));
829 ((ssid_idx < ARRAY_SIZE(user_scan_in->ssid_list))
830 && (*user_scan_in->ssid_list[ssid_idx].ssid
831 || user_scan_in->ssid_list[ssid_idx].max_len));
834 ssid_len = strlen(user_scan_in->ssid_list[ssid_idx].
838 (struct mwifiex_ie_types_wildcard_ssid_params *)
840 wildcard_ssid_tlv->header.type =
841 cpu_to_le16(TLV_TYPE_WILDCARDSSID);
842 wildcard_ssid_tlv->header.len = cpu_to_le16(
843 (u16) (ssid_len + sizeof(wildcard_ssid_tlv->
845 wildcard_ssid_tlv->max_ssid_length =
846 user_scan_in->ssid_list[ssid_idx].max_len;
848 memcpy(wildcard_ssid_tlv->ssid,
849 user_scan_in->ssid_list[ssid_idx].ssid,
852 tlv_pos += (sizeof(wildcard_ssid_tlv->header)
853 + le16_to_cpu(wildcard_ssid_tlv->header.len));
855 dev_dbg(adapter->dev, "info: scan: ssid_list[%d]: %s, %d\n",
856 ssid_idx, wildcard_ssid_tlv->ssid,
857 wildcard_ssid_tlv->max_ssid_length);
859 /* Empty wildcard ssid with a maxlen will match many or
860 potentially all SSIDs (maxlen == 32), therefore do
861 not treat the scan as
863 if (!ssid_len && wildcard_ssid_tlv->max_ssid_length)
869 * The default number of channels sent in the command is low to
870 * ensure the response buffer from the firmware does not
871 * truncate scan results. That is not an issue with an SSID
872 * or BSSID filter applied to the scan results in the firmware.
874 if ((ssid_idx && ssid_filter)
875 || memcmp(scan_cfg_out->specific_bssid, &zero_mac,
877 *filtered_scan = true;
879 scan_cfg_out->bss_mode = (u8) adapter->scan_mode;
880 num_probes = adapter->scan_probes;
884 * If a specific BSSID or SSID is used, the number of channels in the
885 * scan command will be increased to the absolute maximum.
888 *max_chan_per_scan = MWIFIEX_MAX_CHANNELS_PER_SPECIFIC_SCAN;
890 *max_chan_per_scan = MWIFIEX_CHANNELS_PER_SCAN_CMD;
892 /* If the input config or adapter has the number of Probes set,
896 dev_dbg(adapter->dev, "info: scan: num_probes = %d\n",
899 num_probes_tlv = (struct mwifiex_ie_types_num_probes *) tlv_pos;
900 num_probes_tlv->header.type = cpu_to_le16(TLV_TYPE_NUMPROBES);
901 num_probes_tlv->header.len =
902 cpu_to_le16(sizeof(num_probes_tlv->num_probes));
903 num_probes_tlv->num_probes = cpu_to_le16((u16) num_probes);
905 tlv_pos += sizeof(num_probes_tlv->header) +
906 le16_to_cpu(num_probes_tlv->header.len);
910 /* Append rates tlv */
911 memset(rates, 0, sizeof(rates));
913 rates_size = mwifiex_get_supported_rates(priv, rates);
915 rates_tlv = (struct mwifiex_ie_types_rates_param_set *) tlv_pos;
916 rates_tlv->header.type = cpu_to_le16(WLAN_EID_SUPP_RATES);
917 rates_tlv->header.len = cpu_to_le16((u16) rates_size);
918 memcpy(rates_tlv->rates, rates, rates_size);
919 tlv_pos += sizeof(rates_tlv->header) + rates_size;
921 dev_dbg(adapter->dev, "info: SCAN_CMD: Rates size = %d\n", rates_size);
923 if (ISSUPP_11NENABLED(priv->adapter->fw_cap_info)
924 && (priv->adapter->config_bands & BAND_GN
925 || priv->adapter->config_bands & BAND_AN)) {
926 ht_cap = (struct mwifiex_ie_types_htcap *) tlv_pos;
927 memset(ht_cap, 0, sizeof(struct mwifiex_ie_types_htcap));
928 ht_cap->header.type = cpu_to_le16(WLAN_EID_HT_CAPABILITY);
930 cpu_to_le16(sizeof(struct ieee80211_ht_cap));
932 mwifiex_band_to_radio_type(priv->adapter->config_bands);
933 mwifiex_fill_cap_info(priv, radio_type, ht_cap);
934 tlv_pos += sizeof(struct mwifiex_ie_types_htcap);
937 /* Append vendor specific IE TLV */
938 mwifiex_cmd_append_vsie_tlv(priv, MWIFIEX_VSIE_MASK_SCAN, &tlv_pos);
941 * Set the output for the channel TLV to the address in the tlv buffer
942 * past any TLVs that were added in this function (SSID, num_probes).
943 * Channel TLVs will be added past this for each scan command,
944 * preserving the TLVs that were previously added.
947 (struct mwifiex_ie_types_chan_list_param_set *) tlv_pos;
949 if (user_scan_in && user_scan_in->chan_list[0].chan_number) {
951 dev_dbg(adapter->dev, "info: Scan: Using supplied channel list\n");
954 chan_idx < MWIFIEX_USER_SCAN_CHAN_MAX
955 && user_scan_in->chan_list[chan_idx].chan_number;
958 channel = user_scan_in->chan_list[chan_idx].chan_number;
959 (scan_chan_list + chan_idx)->chan_number = channel;
962 user_scan_in->chan_list[chan_idx].radio_type;
963 (scan_chan_list + chan_idx)->radio_type = radio_type;
965 scan_type = user_scan_in->chan_list[chan_idx].scan_type;
967 if (scan_type == MWIFIEX_SCAN_TYPE_PASSIVE)
969 chan_idx)->chan_scan_mode_bitmap
970 |= MWIFIEX_PASSIVE_SCAN;
973 chan_idx)->chan_scan_mode_bitmap
974 &= ~MWIFIEX_PASSIVE_SCAN;
976 if (user_scan_in->chan_list[chan_idx].scan_time) {
977 scan_dur = (u16) user_scan_in->
978 chan_list[chan_idx].scan_time;
980 if (scan_type == MWIFIEX_SCAN_TYPE_PASSIVE)
981 scan_dur = adapter->passive_scan_time;
982 else if (*filtered_scan)
983 scan_dur = adapter->specific_scan_time;
985 scan_dur = adapter->active_scan_time;
988 (scan_chan_list + chan_idx)->min_scan_time =
989 cpu_to_le16(scan_dur);
990 (scan_chan_list + chan_idx)->max_scan_time =
991 cpu_to_le16(scan_dur);
994 /* Check if we are only scanning the current channel */
996 && (user_scan_in->chan_list[0].chan_number
997 == priv->curr_bss_params.bss_descriptor.channel)) {
998 *scan_current_only = true;
999 dev_dbg(adapter->dev,
1000 "info: Scan: Scanning current channel only\n");
1004 dev_dbg(adapter->dev,
1005 "info: Scan: Creating full region channel list\n");
1006 mwifiex_scan_create_channel_list(priv, user_scan_in,
1013 * This function inspects the scan response buffer for pointers to
1016 * TLVs can be included at the end of the scan response BSS information.
1018 * Data in the buffer is parsed pointers to TLVs that can potentially
1019 * be passed back in the response.
1022 mwifiex_ret_802_11_scan_get_tlv_ptrs(struct mwifiex_adapter *adapter,
1023 struct mwifiex_ie_types_data *tlv,
1024 u32 tlv_buf_size, u32 req_tlv_type,
1025 struct mwifiex_ie_types_data **tlv_data)
1027 struct mwifiex_ie_types_data *current_tlv;
1033 tlv_buf_left = tlv_buf_size;
1036 dev_dbg(adapter->dev, "info: SCAN_RESP: tlv_buf_size = %d\n",
1039 while (tlv_buf_left >= sizeof(struct mwifiex_ie_types_header)) {
1041 tlv_type = le16_to_cpu(current_tlv->header.type);
1042 tlv_len = le16_to_cpu(current_tlv->header.len);
1044 if (sizeof(tlv->header) + tlv_len > tlv_buf_left) {
1045 dev_err(adapter->dev, "SCAN_RESP: TLV buffer corrupt\n");
1049 if (req_tlv_type == tlv_type) {
1051 case TLV_TYPE_TSFTIMESTAMP:
1052 dev_dbg(adapter->dev, "info: SCAN_RESP: TSF "
1053 "timestamp TLV, len = %d\n", tlv_len);
1054 *tlv_data = (struct mwifiex_ie_types_data *)
1057 case TLV_TYPE_CHANNELBANDLIST:
1058 dev_dbg(adapter->dev, "info: SCAN_RESP: channel"
1059 " band list TLV, len = %d\n", tlv_len);
1060 *tlv_data = (struct mwifiex_ie_types_data *)
1064 dev_err(adapter->dev,
1065 "SCAN_RESP: unhandled TLV = %d\n",
1067 /* Give up, this seems corrupted */
1076 tlv_buf_left -= (sizeof(tlv->header) + tlv_len);
1078 (struct mwifiex_ie_types_data *) (current_tlv->data +
1085 * This function parses provided beacon buffer and updates
1086 * respective fields in bss descriptor structure.
1089 mwifiex_update_bss_desc_with_ie(struct mwifiex_adapter *adapter,
1090 struct mwifiex_bssdescriptor *bss_entry,
1091 u8 *ie_buf, u32 ie_len)
1095 struct ieee_types_fh_param_set *fh_param_set;
1096 struct ieee_types_ds_param_set *ds_param_set;
1097 struct ieee_types_cf_param_set *cf_param_set;
1098 struct ieee_types_ibss_param_set *ibss_param_set;
1105 u8 found_data_rate_ie;
1107 struct ieee_types_vendor_specific *vendor_ie;
1108 const u8 wpa_oui[4] = { 0x00, 0x50, 0xf2, 0x01 };
1109 const u8 wmm_oui[4] = { 0x00, 0x50, 0xf2, 0x02 };
1111 found_data_rate_ie = false;
1113 current_ptr = ie_buf;
1114 bytes_left = ie_len;
1115 bss_entry->beacon_buf = ie_buf;
1116 bss_entry->beacon_buf_size = ie_len;
1118 /* Process variable IE */
1119 while (bytes_left >= 2) {
1120 element_id = *current_ptr;
1121 element_len = *(current_ptr + 1);
1122 total_ie_len = element_len + sizeof(struct ieee_types_header);
1124 if (bytes_left < total_ie_len) {
1125 dev_err(adapter->dev, "err: InterpretIE: in processing"
1126 " IE, bytes left < IE length\n");
1129 switch (element_id) {
1131 bss_entry->ssid.ssid_len = element_len;
1132 memcpy(bss_entry->ssid.ssid, (current_ptr + 2),
1134 dev_dbg(adapter->dev, "info: InterpretIE: ssid: "
1135 "%-32s\n", bss_entry->ssid.ssid);
1138 case WLAN_EID_SUPP_RATES:
1139 memcpy(bss_entry->data_rates, current_ptr + 2,
1141 memcpy(bss_entry->supported_rates, current_ptr + 2,
1143 rate_size = element_len;
1144 found_data_rate_ie = true;
1147 case WLAN_EID_FH_PARAMS:
1149 (struct ieee_types_fh_param_set *) current_ptr;
1150 memcpy(&bss_entry->phy_param_set.fh_param_set,
1152 sizeof(struct ieee_types_fh_param_set));
1155 case WLAN_EID_DS_PARAMS:
1157 (struct ieee_types_ds_param_set *) current_ptr;
1159 bss_entry->channel = ds_param_set->current_chan;
1161 memcpy(&bss_entry->phy_param_set.ds_param_set,
1163 sizeof(struct ieee_types_ds_param_set));
1166 case WLAN_EID_CF_PARAMS:
1168 (struct ieee_types_cf_param_set *) current_ptr;
1169 memcpy(&bss_entry->ss_param_set.cf_param_set,
1171 sizeof(struct ieee_types_cf_param_set));
1174 case WLAN_EID_IBSS_PARAMS:
1176 (struct ieee_types_ibss_param_set *)
1178 memcpy(&bss_entry->ss_param_set.ibss_param_set,
1180 sizeof(struct ieee_types_ibss_param_set));
1183 case WLAN_EID_ERP_INFO:
1184 bss_entry->erp_flags = *(current_ptr + 2);
1187 case WLAN_EID_EXT_SUPP_RATES:
1189 * Only process extended supported rate
1190 * if data rate is already found.
1191 * Data rate IE should come before
1192 * extended supported rate IE
1194 if (found_data_rate_ie) {
1195 if ((element_len + rate_size) >
1196 MWIFIEX_SUPPORTED_RATES)
1198 (MWIFIEX_SUPPORTED_RATES -
1201 bytes_to_copy = element_len;
1203 rate = (u8 *) bss_entry->data_rates;
1205 memcpy(rate, current_ptr + 2, bytes_to_copy);
1207 rate = (u8 *) bss_entry->supported_rates;
1209 memcpy(rate, current_ptr + 2, bytes_to_copy);
1213 case WLAN_EID_VENDOR_SPECIFIC:
1214 vendor_ie = (struct ieee_types_vendor_specific *)
1218 (vendor_ie->vend_hdr.oui, wpa_oui,
1220 bss_entry->bcn_wpa_ie =
1221 (struct ieee_types_vendor_specific *)
1223 bss_entry->wpa_offset = (u16) (current_ptr -
1224 bss_entry->beacon_buf);
1225 } else if (!memcmp(vendor_ie->vend_hdr.oui, wmm_oui,
1228 sizeof(struct ieee_types_wmm_parameter)
1230 sizeof(struct ieee_types_wmm_info))
1232 * Only accept and copy the WMM IE if
1233 * it matches the size expected for the
1234 * WMM Info IE or the WMM Parameter IE.
1236 memcpy((u8 *) &bss_entry->wmm_ie,
1237 current_ptr, total_ie_len);
1241 bss_entry->bcn_rsn_ie =
1242 (struct ieee_types_generic *) current_ptr;
1243 bss_entry->rsn_offset = (u16) (current_ptr -
1244 bss_entry->beacon_buf);
1246 case WLAN_EID_BSS_AC_ACCESS_DELAY:
1247 bss_entry->bcn_wapi_ie =
1248 (struct ieee_types_generic *) current_ptr;
1249 bss_entry->wapi_offset = (u16) (current_ptr -
1250 bss_entry->beacon_buf);
1252 case WLAN_EID_HT_CAPABILITY:
1253 bss_entry->bcn_ht_cap = (struct ieee80211_ht_cap *)
1255 sizeof(struct ieee_types_header));
1256 bss_entry->ht_cap_offset = (u16) (current_ptr +
1257 sizeof(struct ieee_types_header) -
1258 bss_entry->beacon_buf);
1260 case WLAN_EID_HT_INFORMATION:
1261 bss_entry->bcn_ht_info = (struct ieee80211_ht_info *)
1263 sizeof(struct ieee_types_header));
1264 bss_entry->ht_info_offset = (u16) (current_ptr +
1265 sizeof(struct ieee_types_header) -
1266 bss_entry->beacon_buf);
1268 case WLAN_EID_BSS_COEX_2040:
1269 bss_entry->bcn_bss_co_2040 = (u8 *) (current_ptr +
1270 sizeof(struct ieee_types_header));
1271 bss_entry->bss_co_2040_offset = (u16) (current_ptr +
1272 sizeof(struct ieee_types_header) -
1273 bss_entry->beacon_buf);
1275 case WLAN_EID_EXT_CAPABILITY:
1276 bss_entry->bcn_ext_cap = (u8 *) (current_ptr +
1277 sizeof(struct ieee_types_header));
1278 bss_entry->ext_cap_offset = (u16) (current_ptr +
1279 sizeof(struct ieee_types_header) -
1280 bss_entry->beacon_buf);
1286 current_ptr += element_len + 2;
1288 /* Need to account for IE ID and IE Len */
1289 bytes_left -= (element_len + 2);
1291 } /* while (bytes_left > 2) */
1296 * This function converts radio type scan parameter to a band configuration
1297 * to be used in join command.
1300 mwifiex_radio_type_to_band(u8 radio_type)
1302 switch (radio_type) {
1303 case HostCmd_SCAN_RADIO_TYPE_A:
1305 case HostCmd_SCAN_RADIO_TYPE_BG:
1312 * This is an internal function used to start a scan based on an input
1315 * This uses the input user scan configuration information when provided in
1316 * order to send the appropriate scan commands to firmware to populate or
1317 * update the internal driver scan table.
1319 int mwifiex_scan_networks(struct mwifiex_private *priv,
1320 const struct mwifiex_user_scan_cfg *user_scan_in)
1323 struct mwifiex_adapter *adapter = priv->adapter;
1324 struct cmd_ctrl_node *cmd_node;
1325 union mwifiex_scan_cmd_config_tlv *scan_cfg_out;
1326 struct mwifiex_ie_types_chan_list_param_set *chan_list_out;
1328 struct mwifiex_chan_scan_param_set *scan_chan_list;
1330 u8 scan_current_chan_only;
1331 u8 max_chan_per_scan;
1332 unsigned long flags;
1334 if (adapter->scan_processing) {
1335 dev_dbg(adapter->dev, "cmd: Scan already in process...\n");
1339 spin_lock_irqsave(&adapter->mwifiex_cmd_lock, flags);
1340 adapter->scan_processing = true;
1341 spin_unlock_irqrestore(&adapter->mwifiex_cmd_lock, flags);
1343 if (priv->scan_block) {
1344 dev_dbg(adapter->dev,
1345 "cmd: Scan is blocked during association...\n");
1349 scan_cfg_out = kzalloc(sizeof(union mwifiex_scan_cmd_config_tlv),
1351 if (!scan_cfg_out) {
1352 dev_err(adapter->dev, "failed to alloc scan_cfg_out\n");
1356 buf_size = sizeof(struct mwifiex_chan_scan_param_set) *
1357 MWIFIEX_USER_SCAN_CHAN_MAX;
1358 scan_chan_list = kzalloc(buf_size, GFP_KERNEL);
1359 if (!scan_chan_list) {
1360 dev_err(adapter->dev, "failed to alloc scan_chan_list\n");
1361 kfree(scan_cfg_out);
1365 mwifiex_scan_setup_scan_config(priv, user_scan_in,
1366 &scan_cfg_out->config, &chan_list_out,
1367 scan_chan_list, &max_chan_per_scan,
1368 &filtered_scan, &scan_current_chan_only);
1370 ret = mwifiex_scan_channel_list(priv, max_chan_per_scan, filtered_scan,
1371 &scan_cfg_out->config, chan_list_out,
1374 /* Get scan command from scan_pending_q and put to cmd_pending_q */
1376 spin_lock_irqsave(&adapter->scan_pending_q_lock, flags);
1377 if (!list_empty(&adapter->scan_pending_q)) {
1378 cmd_node = list_first_entry(&adapter->scan_pending_q,
1379 struct cmd_ctrl_node, list);
1380 list_del(&cmd_node->list);
1381 spin_unlock_irqrestore(&adapter->scan_pending_q_lock,
1383 adapter->cmd_queued = cmd_node;
1384 mwifiex_insert_cmd_to_pending_q(adapter, cmd_node,
1387 spin_unlock_irqrestore(&adapter->scan_pending_q_lock,
1391 spin_lock_irqsave(&adapter->mwifiex_cmd_lock, flags);
1392 adapter->scan_processing = true;
1393 spin_unlock_irqrestore(&adapter->mwifiex_cmd_lock, flags);
1396 kfree(scan_cfg_out);
1397 kfree(scan_chan_list);
1402 * This function prepares a scan command to be sent to the firmware.
1404 * This uses the scan command configuration sent to the command processing
1405 * module in command preparation stage to configure a scan command structure
1406 * to send to firmware.
1408 * The fixed fields specifying the BSS type and BSSID filters as well as a
1409 * variable number/length of TLVs are sent in the command to firmware.
1411 * Preparation also includes -
1412 * - Setting command ID, and proper size
1413 * - Ensuring correct endian-ness
1415 int mwifiex_cmd_802_11_scan(struct host_cmd_ds_command *cmd,
1416 struct mwifiex_scan_cmd_config *scan_cfg)
1418 struct host_cmd_ds_802_11_scan *scan_cmd = &cmd->params.scan;
1420 /* Set fixed field variables in scan command */
1421 scan_cmd->bss_mode = scan_cfg->bss_mode;
1422 memcpy(scan_cmd->bssid, scan_cfg->specific_bssid,
1423 sizeof(scan_cmd->bssid));
1424 memcpy(scan_cmd->tlv_buffer, scan_cfg->tlv_buf, scan_cfg->tlv_buf_len);
1426 cmd->command = cpu_to_le16(HostCmd_CMD_802_11_SCAN);
1428 /* Size is equal to the sizeof(fixed portions) + the TLV len + header */
1429 cmd->size = cpu_to_le16((u16) (sizeof(scan_cmd->bss_mode)
1430 + sizeof(scan_cmd->bssid)
1431 + scan_cfg->tlv_buf_len + S_DS_GEN));
1437 * This function checks compatibility of requested network with current
1440 int mwifiex_check_network_compatibility(struct mwifiex_private *priv,
1441 struct mwifiex_bssdescriptor *bss_desc)
1448 if ((mwifiex_get_cfp_by_band_and_channel_from_cfg80211(priv,
1449 (u8) bss_desc->bss_band, (u16) bss_desc->channel))) {
1450 switch (priv->bss_mode) {
1451 case NL80211_IFTYPE_STATION:
1452 case NL80211_IFTYPE_ADHOC:
1453 ret = mwifiex_is_network_compatible(priv, bss_desc,
1456 dev_err(priv->adapter->dev, "cannot find ssid "
1457 "%s\n", bss_desc->ssid.ssid);
1468 mwifiex_update_curr_bss_params(struct mwifiex_private *priv, u8 *bssid,
1469 s32 rssi, const u8 *ie_buf, size_t ie_len,
1470 u16 beacon_period, u16 cap_info_bitmap, u8 band)
1472 struct mwifiex_bssdescriptor *bss_desc = NULL;
1474 unsigned long flags;
1477 /* Allocate and fill new bss descriptor */
1478 bss_desc = kzalloc(sizeof(struct mwifiex_bssdescriptor),
1481 dev_err(priv->adapter->dev, " failed to alloc bss_desc\n");
1485 beacon_ie = kmemdup(ie_buf, ie_len, GFP_KERNEL);
1487 dev_err(priv->adapter->dev, " failed to alloc beacon_ie\n");
1491 ret = mwifiex_fill_new_bss_desc(priv, bssid, rssi, beacon_ie,
1492 ie_len, beacon_period,
1493 cap_info_bitmap, band, bss_desc);
1497 ret = mwifiex_check_network_compatibility(priv, bss_desc);
1501 /* Update current bss descriptor parameters */
1502 spin_lock_irqsave(&priv->curr_bcn_buf_lock, flags);
1503 priv->curr_bss_params.bss_descriptor.bcn_wpa_ie = NULL;
1504 priv->curr_bss_params.bss_descriptor.wpa_offset = 0;
1505 priv->curr_bss_params.bss_descriptor.bcn_rsn_ie = NULL;
1506 priv->curr_bss_params.bss_descriptor.rsn_offset = 0;
1507 priv->curr_bss_params.bss_descriptor.bcn_wapi_ie = NULL;
1508 priv->curr_bss_params.bss_descriptor.wapi_offset = 0;
1509 priv->curr_bss_params.bss_descriptor.bcn_ht_cap = NULL;
1510 priv->curr_bss_params.bss_descriptor.ht_cap_offset =
1512 priv->curr_bss_params.bss_descriptor.bcn_ht_info = NULL;
1513 priv->curr_bss_params.bss_descriptor.ht_info_offset =
1515 priv->curr_bss_params.bss_descriptor.bcn_bss_co_2040 =
1517 priv->curr_bss_params.bss_descriptor.
1518 bss_co_2040_offset = 0;
1519 priv->curr_bss_params.bss_descriptor.bcn_ext_cap = NULL;
1520 priv->curr_bss_params.bss_descriptor.ext_cap_offset = 0;
1521 priv->curr_bss_params.bss_descriptor.beacon_buf = NULL;
1522 priv->curr_bss_params.bss_descriptor.beacon_buf_size =
1525 /* Make a copy of current BSSID descriptor */
1526 memcpy(&priv->curr_bss_params.bss_descriptor, bss_desc,
1527 sizeof(priv->curr_bss_params.bss_descriptor));
1528 mwifiex_save_curr_bcn(priv);
1529 spin_unlock_irqrestore(&priv->curr_bcn_buf_lock, flags);
1537 static void mwifiex_free_bss_priv(struct cfg80211_bss *bss)
1543 * This function handles the command response of scan.
1545 * The response buffer for the scan command has the following
1548 * .-------------------------------------------------------------.
1549 * | Header (4 * sizeof(t_u16)): Standard command response hdr |
1550 * .-------------------------------------------------------------.
1551 * | BufSize (t_u16) : sizeof the BSS Description data |
1552 * .-------------------------------------------------------------.
1553 * | NumOfSet (t_u8) : Number of BSS Descs returned |
1554 * .-------------------------------------------------------------.
1555 * | BSSDescription data (variable, size given in BufSize) |
1556 * .-------------------------------------------------------------.
1557 * | TLV data (variable, size calculated using Header->Size, |
1558 * | BufSize and sizeof the fixed fields above) |
1559 * .-------------------------------------------------------------.
1561 int mwifiex_ret_802_11_scan(struct mwifiex_private *priv,
1562 struct host_cmd_ds_command *resp)
1565 struct mwifiex_adapter *adapter = priv->adapter;
1566 struct cmd_ctrl_node *cmd_node;
1567 struct host_cmd_ds_802_11_scan_rsp *scan_rsp;
1568 struct mwifiex_ie_types_data *tlv_data;
1569 struct mwifiex_ie_types_tsf_timestamp *tsf_tlv;
1575 struct mwifiex_chan_freq_power *cfp;
1576 struct mwifiex_ie_types_chan_band_list_param_set *chan_band_tlv;
1577 struct chan_band_param_set *chan_band;
1579 unsigned long flags;
1580 struct cfg80211_bss *bss;
1582 is_bgscan_resp = (le16_to_cpu(resp->command)
1583 == HostCmd_CMD_802_11_BG_SCAN_QUERY);
1585 scan_rsp = &resp->params.bg_scan_query_resp.scan_resp;
1587 scan_rsp = &resp->params.scan_resp;
1590 if (scan_rsp->number_of_sets > MWIFIEX_MAX_AP) {
1591 dev_err(adapter->dev, "SCAN_RESP: too many AP returned (%d)\n",
1592 scan_rsp->number_of_sets);
1597 bytes_left = le16_to_cpu(scan_rsp->bss_descript_size);
1598 dev_dbg(adapter->dev, "info: SCAN_RESP: bss_descript_size %d\n",
1601 scan_resp_size = le16_to_cpu(resp->size);
1603 dev_dbg(adapter->dev,
1604 "info: SCAN_RESP: returned %d APs before parsing\n",
1605 scan_rsp->number_of_sets);
1607 bss_info = scan_rsp->bss_desc_and_tlv_buffer;
1610 * The size of the TLV buffer is equal to the entire command response
1611 * size (scan_resp_size) minus the fixed fields (sizeof()'s), the
1612 * BSS Descriptions (bss_descript_size as bytesLef) and the command
1613 * response header (S_DS_GEN)
1615 tlv_buf_size = scan_resp_size - (bytes_left
1616 + sizeof(scan_rsp->bss_descript_size)
1617 + sizeof(scan_rsp->number_of_sets)
1620 tlv_data = (struct mwifiex_ie_types_data *) (scan_rsp->
1621 bss_desc_and_tlv_buffer +
1624 /* Search the TLV buffer space in the scan response for any valid
1626 mwifiex_ret_802_11_scan_get_tlv_ptrs(adapter, tlv_data, tlv_buf_size,
1627 TLV_TYPE_TSFTIMESTAMP,
1628 (struct mwifiex_ie_types_data **)
1631 /* Search the TLV buffer space in the scan response for any valid
1633 mwifiex_ret_802_11_scan_get_tlv_ptrs(adapter, tlv_data, tlv_buf_size,
1634 TLV_TYPE_CHANNELBANDLIST,
1635 (struct mwifiex_ie_types_data **)
1638 for (idx = 0; idx < scan_rsp->number_of_sets && bytes_left; idx++) {
1644 u64 network_tsf = 0;
1645 u16 beacon_size = 0;
1649 u16 cap_info_bitmap;
1651 struct mwifiex_bcn_param *bcn_param;
1653 if (bytes_left >= sizeof(beacon_size)) {
1654 /* Extract & convert beacon size from command buffer */
1655 memcpy(&beacon_size, bss_info, sizeof(beacon_size));
1656 bytes_left -= sizeof(beacon_size);
1657 bss_info += sizeof(beacon_size);
1660 if (!beacon_size || beacon_size > bytes_left) {
1661 bss_info += bytes_left;
1666 /* Initialize the current working beacon pointer for this BSS
1668 current_ptr = bss_info;
1670 /* Advance the return beacon pointer past the current beacon */
1671 bss_info += beacon_size;
1672 bytes_left -= beacon_size;
1674 curr_bcn_bytes = beacon_size;
1677 * First 5 fields are bssid, RSSI, time stamp, beacon interval,
1678 * and capability information
1680 if (curr_bcn_bytes < sizeof(struct mwifiex_bcn_param)) {
1681 dev_err(adapter->dev, "InterpretIE: not enough bytes left\n");
1684 bcn_param = (struct mwifiex_bcn_param *)current_ptr;
1685 current_ptr += sizeof(*bcn_param);
1686 curr_bcn_bytes -= sizeof(*bcn_param);
1688 memcpy(bssid, bcn_param->bssid, ETH_ALEN);
1690 rssi = (s32) (bcn_param->rssi);
1691 dev_dbg(adapter->dev, "info: InterpretIE: RSSI=%02X\n",
1694 beacon_period = le16_to_cpu(bcn_param->beacon_period);
1696 cap_info_bitmap = le16_to_cpu(bcn_param->cap_info_bitmap);
1697 dev_dbg(adapter->dev, "info: InterpretIE: capabilities=0x%X\n",
1700 /* Rest of the current buffer are IE's */
1701 ie_buf = current_ptr;
1702 ie_len = curr_bcn_bytes;
1703 dev_dbg(adapter->dev, "info: InterpretIE: IELength for this AP"
1704 " = %d\n", curr_bcn_bytes);
1706 while (curr_bcn_bytes >= sizeof(struct ieee_types_header)) {
1707 u8 element_id, element_len;
1709 element_id = *current_ptr;
1710 element_len = *(current_ptr + 1);
1711 if (curr_bcn_bytes < element_len +
1712 sizeof(struct ieee_types_header)) {
1713 dev_err(priv->adapter->dev, "%s: in processing"
1714 " IE, bytes left < IE length\n",
1718 if (element_id == WLAN_EID_DS_PARAMS) {
1719 channel = *(u8 *) (current_ptr +
1720 sizeof(struct ieee_types_header));
1724 current_ptr += element_len +
1725 sizeof(struct ieee_types_header);
1726 curr_bcn_bytes -= element_len +
1727 sizeof(struct ieee_types_header);
1731 * If the TSF TLV was appended to the scan results, save this
1732 * entry's TSF value in the networkTSF field.The networkTSF is
1733 * the firmware's TSF value at the time the beacon or probe
1734 * response was received.
1737 memcpy(&network_tsf,
1738 &tsf_tlv->tsf_data[idx * TSF_DATA_SIZE],
1739 sizeof(network_tsf));
1741 if (channel != -1) {
1742 struct ieee80211_channel *chan;
1746 if (chan_band_tlv) {
1748 &chan_band_tlv->chan_band_param[idx];
1749 band = mwifiex_radio_type_to_band(
1750 chan_band->radio_type
1751 & (BIT(0) | BIT(1)));
1754 cfp = mwifiex_get_cfp_by_band_and_channel_from_cfg80211(
1755 priv, (u8)band, (u16)channel);
1757 freq = cfp ? cfp->freq : 0;
1759 chan = ieee80211_get_channel(priv->wdev->wiphy, freq);
1761 if (chan && !(chan->flags & IEEE80211_CHAN_DISABLED)) {
1762 bss = cfg80211_inform_bss(priv->wdev->wiphy,
1763 chan, bssid, network_tsf,
1764 cap_info_bitmap, beacon_period,
1765 ie_buf, ie_len, rssi, GFP_KERNEL);
1766 *(u8 *)bss->priv = band;
1767 bss->free_priv = mwifiex_free_bss_priv;
1769 if (priv->media_connected && !memcmp(bssid,
1770 priv->curr_bss_params.bss_descriptor
1771 .mac_address, ETH_ALEN))
1772 mwifiex_update_curr_bss_params(priv,
1773 bssid, rssi, ie_buf,
1774 ie_len, beacon_period,
1775 cap_info_bitmap, band);
1778 dev_dbg(adapter->dev, "missing BSS channel IE\n");
1782 spin_lock_irqsave(&adapter->scan_pending_q_lock, flags);
1783 if (list_empty(&adapter->scan_pending_q)) {
1784 spin_unlock_irqrestore(&adapter->scan_pending_q_lock, flags);
1785 spin_lock_irqsave(&adapter->mwifiex_cmd_lock, flags);
1786 adapter->scan_processing = false;
1787 spin_unlock_irqrestore(&adapter->mwifiex_cmd_lock, flags);
1789 /* Need to indicate IOCTL complete */
1790 if (adapter->curr_cmd->wait_q_enabled) {
1791 adapter->cmd_wait_q.status = 0;
1792 mwifiex_complete_cmd(adapter, adapter->curr_cmd);
1794 if (priv->report_scan_result)
1795 priv->report_scan_result = false;
1796 if (priv->scan_pending_on_block) {
1797 priv->scan_pending_on_block = false;
1798 up(&priv->async_sem);
1802 /* Get scan command from scan_pending_q and put to
1804 cmd_node = list_first_entry(&adapter->scan_pending_q,
1805 struct cmd_ctrl_node, list);
1806 list_del(&cmd_node->list);
1807 spin_unlock_irqrestore(&adapter->scan_pending_q_lock, flags);
1809 mwifiex_insert_cmd_to_pending_q(adapter, cmd_node, true);
1817 * This function prepares command for background scan query.
1819 * Preparation includes -
1820 * - Setting command ID and proper size
1821 * - Setting background scan flush parameter
1822 * - Ensuring correct endian-ness
1824 int mwifiex_cmd_802_11_bg_scan_query(struct host_cmd_ds_command *cmd)
1826 struct host_cmd_ds_802_11_bg_scan_query *bg_query =
1827 &cmd->params.bg_scan_query;
1829 cmd->command = cpu_to_le16(HostCmd_CMD_802_11_BG_SCAN_QUERY);
1830 cmd->size = cpu_to_le16(sizeof(struct host_cmd_ds_802_11_bg_scan_query)
1833 bg_query->flush = 1;
1839 * This function inserts scan command node to the scan pending queue.
1842 mwifiex_queue_scan_cmd(struct mwifiex_private *priv,
1843 struct cmd_ctrl_node *cmd_node)
1845 struct mwifiex_adapter *adapter = priv->adapter;
1846 unsigned long flags;
1848 cmd_node->wait_q_enabled = true;
1849 cmd_node->condition = &adapter->scan_wait_q_woken;
1850 spin_lock_irqsave(&adapter->scan_pending_q_lock, flags);
1851 list_add_tail(&cmd_node->list, &adapter->scan_pending_q);
1852 spin_unlock_irqrestore(&adapter->scan_pending_q_lock, flags);
1856 * This function sends a scan command for all available channels to the
1857 * firmware, filtered on a specific SSID.
1859 static int mwifiex_scan_specific_ssid(struct mwifiex_private *priv,
1860 struct mwifiex_802_11_ssid *req_ssid)
1862 struct mwifiex_adapter *adapter = priv->adapter;
1864 struct mwifiex_user_scan_cfg *scan_cfg;
1869 if (adapter->scan_processing) {
1870 dev_dbg(adapter->dev, "cmd: Scan already in process...\n");
1874 if (priv->scan_block) {
1875 dev_dbg(adapter->dev,
1876 "cmd: Scan is blocked during association...\n");
1880 scan_cfg = kzalloc(sizeof(struct mwifiex_user_scan_cfg), GFP_KERNEL);
1882 dev_err(adapter->dev, "failed to alloc scan_cfg\n");
1886 memcpy(scan_cfg->ssid_list[0].ssid, req_ssid->ssid,
1887 req_ssid->ssid_len);
1889 ret = mwifiex_scan_networks(priv, scan_cfg);
1896 * Sends IOCTL request to start a scan.
1898 * This function allocates the IOCTL request buffer, fills it
1899 * with requisite parameters and calls the IOCTL handler.
1901 * Scan command can be issued for both normal scan and specific SSID
1902 * scan, depending upon whether an SSID is provided or not.
1904 int mwifiex_request_scan(struct mwifiex_private *priv,
1905 struct mwifiex_802_11_ssid *req_ssid)
1909 if (down_interruptible(&priv->async_sem)) {
1910 dev_err(priv->adapter->dev, "%s: acquire semaphore\n",
1914 priv->scan_pending_on_block = true;
1916 priv->adapter->scan_wait_q_woken = false;
1918 if (req_ssid && req_ssid->ssid_len != 0)
1919 /* Specific SSID scan */
1920 ret = mwifiex_scan_specific_ssid(priv, req_ssid);
1923 ret = mwifiex_scan_networks(priv, NULL);
1926 ret = mwifiex_wait_queue_complete(priv->adapter);
1929 priv->scan_pending_on_block = false;
1930 up(&priv->async_sem);
1937 * This function appends the vendor specific IE TLV to a buffer.
1940 mwifiex_cmd_append_vsie_tlv(struct mwifiex_private *priv,
1941 u16 vsie_mask, u8 **buffer)
1943 int id, ret_len = 0;
1944 struct mwifiex_ie_types_vendor_param_set *vs_param_set;
1952 * Traverse through the saved vendor specific IE array and append
1953 * the selected(scan/assoc/adhoc) IE as TLV to the command
1955 for (id = 0; id < MWIFIEX_MAX_VSIE_NUM; id++) {
1956 if (priv->vs_ie[id].mask & vsie_mask) {
1958 (struct mwifiex_ie_types_vendor_param_set *)
1960 vs_param_set->header.type =
1961 cpu_to_le16(TLV_TYPE_PASSTHROUGH);
1962 vs_param_set->header.len =
1963 cpu_to_le16((((u16) priv->vs_ie[id].ie[1])
1965 memcpy(vs_param_set->ie, priv->vs_ie[id].ie,
1966 le16_to_cpu(vs_param_set->header.len));
1967 *buffer += le16_to_cpu(vs_param_set->header.len) +
1968 sizeof(struct mwifiex_ie_types_header);
1969 ret_len += le16_to_cpu(vs_param_set->header.len) +
1970 sizeof(struct mwifiex_ie_types_header);
1977 * This function saves a beacon buffer of the current BSS descriptor.
1979 * The current beacon buffer is saved so that it can be restored in the
1980 * following cases that makes the beacon buffer not to contain the current
1981 * ssid's beacon buffer.
1982 * - The current ssid was not found somehow in the last scan.
1983 * - The current ssid was the last entry of the scan table and overloaded.
1986 mwifiex_save_curr_bcn(struct mwifiex_private *priv)
1988 struct mwifiex_bssdescriptor *curr_bss =
1989 &priv->curr_bss_params.bss_descriptor;
1991 if (!curr_bss->beacon_buf_size)
1994 /* allocate beacon buffer at 1st time; or if it's size has changed */
1995 if (!priv->curr_bcn_buf ||
1996 priv->curr_bcn_size != curr_bss->beacon_buf_size) {
1997 priv->curr_bcn_size = curr_bss->beacon_buf_size;
1999 kfree(priv->curr_bcn_buf);
2000 priv->curr_bcn_buf = kmalloc(curr_bss->beacon_buf_size,
2002 if (!priv->curr_bcn_buf) {
2003 dev_err(priv->adapter->dev,
2004 "failed to alloc curr_bcn_buf\n");
2009 memcpy(priv->curr_bcn_buf, curr_bss->beacon_buf,
2010 curr_bss->beacon_buf_size);
2011 dev_dbg(priv->adapter->dev, "info: current beacon saved %d\n",
2012 priv->curr_bcn_size);
2014 curr_bss->beacon_buf = priv->curr_bcn_buf;
2016 /* adjust the pointers in the current BSS descriptor */
2017 if (curr_bss->bcn_wpa_ie)
2018 curr_bss->bcn_wpa_ie =
2019 (struct ieee_types_vendor_specific *)
2020 (curr_bss->beacon_buf +
2021 curr_bss->wpa_offset);
2023 if (curr_bss->bcn_rsn_ie)
2024 curr_bss->bcn_rsn_ie = (struct ieee_types_generic *)
2025 (curr_bss->beacon_buf +
2026 curr_bss->rsn_offset);
2028 if (curr_bss->bcn_ht_cap)
2029 curr_bss->bcn_ht_cap = (struct ieee80211_ht_cap *)
2030 (curr_bss->beacon_buf +
2031 curr_bss->ht_cap_offset);
2033 if (curr_bss->bcn_ht_info)
2034 curr_bss->bcn_ht_info = (struct ieee80211_ht_info *)
2035 (curr_bss->beacon_buf +
2036 curr_bss->ht_info_offset);
2038 if (curr_bss->bcn_bss_co_2040)
2039 curr_bss->bcn_bss_co_2040 =
2040 (u8 *) (curr_bss->beacon_buf +
2041 curr_bss->bss_co_2040_offset);
2043 if (curr_bss->bcn_ext_cap)
2044 curr_bss->bcn_ext_cap = (u8 *) (curr_bss->beacon_buf +
2045 curr_bss->ext_cap_offset);
2049 * This function frees the current BSS descriptor beacon buffer.
2052 mwifiex_free_curr_bcn(struct mwifiex_private *priv)
2054 kfree(priv->curr_bcn_buf);
2055 priv->curr_bcn_buf = NULL;