Commit | Line | Data |
---|---|---|
5b435de0 AS |
1 | /* |
2 | * Copyright (c) 2010 Broadcom Corporation | |
3 | * | |
4 | * Permission to use, copy, modify, and/or distribute this software for any | |
5 | * purpose with or without fee is hereby granted, provided that the above | |
6 | * copyright notice and this permission notice appear in all copies. | |
7 | * | |
8 | * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES | |
9 | * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF | |
10 | * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY | |
11 | * SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES | |
12 | * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION | |
13 | * OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN | |
14 | * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | |
15 | */ | |
16 | #include <linux/kernel.h> | |
17 | #include <linux/string.h> | |
18 | #include <linux/sched.h> | |
19 | #include <linux/netdevice.h> | |
20 | #include <asm/unaligned.h> | |
21 | #include <defs.h> | |
22 | #include <brcmu_wifi.h> | |
23 | #include <brcmu_utils.h> | |
24 | #include "dhd.h" | |
25 | #include "dhd_bus.h" | |
26 | #include "dhd_proto.h" | |
27 | #include "dhd_dbg.h" | |
28 | ||
29 | #define BRCM_OUI "\x00\x10\x18" | |
30 | #define DOT11_OUI_LEN 3 | |
31 | #define BCMILCP_BCM_SUBTYPE_EVENT 1 | |
32 | #define PKTFILTER_BUF_SIZE 2048 | |
33 | #define BRCMF_ARPOL_MODE 0xb /* agent|snoop|peer_autoreply */ | |
34 | ||
35 | int brcmf_msg_level; | |
36 | ||
37 | #define MSGTRACE_VERSION 1 | |
38 | ||
f7264adb | 39 | #define BRCMF_PKT_FILTER_FIXED_LEN offsetof(struct brcmf_pkt_filter_le, u) |
5b435de0 | 40 | #define BRCMF_PKT_FILTER_PATTERN_FIXED_LEN \ |
f7264adb | 41 | offsetof(struct brcmf_pkt_filter_pattern_le, mask_and_pattern) |
5b435de0 AS |
42 | |
43 | #ifdef BCMDBG | |
44 | static const char brcmf_version[] = | |
45 | "Dongle Host Driver, version " BRCMF_VERSION_STR "\nCompiled on " | |
46 | __DATE__ " at " __TIME__; | |
47 | #else | |
48 | static const char brcmf_version[] = | |
49 | "Dongle Host Driver, version " BRCMF_VERSION_STR; | |
50 | #endif | |
51 | ||
52 | /* Message trace header */ | |
53 | struct msgtrace_hdr { | |
54 | u8 version; | |
55 | u8 spare; | |
56 | __be16 len; /* Len of the trace */ | |
57 | __be32 seqnum; /* Sequence number of message. Useful | |
58 | * if the messsage has been lost | |
59 | * because of DMA error or a bus reset | |
60 | * (ex: SDIO Func2) | |
61 | */ | |
62 | __be32 discarded_bytes; /* Number of discarded bytes because of | |
63 | trace overflow */ | |
64 | __be32 discarded_printf; /* Number of discarded printf | |
65 | because of trace overflow */ | |
66 | } __packed; | |
67 | ||
53a2277d AB |
68 | |
69 | uint | |
70 | brcmf_c_mkiovar(char *name, char *data, uint datalen, char *buf, uint buflen) | |
71 | { | |
72 | uint len; | |
73 | ||
74 | len = strlen(name) + 1; | |
75 | ||
76 | if ((len + datalen) > buflen) | |
77 | return 0; | |
78 | ||
79 | strncpy(buf, name, buflen); | |
80 | ||
81 | /* append data onto the end of the name string */ | |
82 | memcpy(&buf[len], data, datalen); | |
83 | len += datalen; | |
84 | ||
85 | return len; | |
86 | } | |
87 | ||
5b435de0 AS |
88 | void brcmf_c_init(void) |
89 | { | |
90 | /* Init global variables at run-time, not as part of the declaration. | |
91 | * This is required to support init/de-init of the driver. | |
92 | * Initialization | |
93 | * of globals as part of the declaration results in non-deterministic | |
94 | * behaviour since the value of the globals may be different on the | |
95 | * first time that the driver is initialized vs subsequent | |
96 | * initializations. | |
97 | */ | |
98 | brcmf_msg_level = BRCMF_ERROR_VAL; | |
99 | } | |
100 | ||
101 | bool brcmf_c_prec_enq(struct brcmf_pub *drvr, struct pktq *q, | |
102 | struct sk_buff *pkt, int prec) | |
103 | { | |
104 | struct sk_buff *p; | |
105 | int eprec = -1; /* precedence to evict from */ | |
106 | bool discard_oldest; | |
107 | ||
108 | /* Fast case, precedence queue is not full and we are also not | |
109 | * exceeding total queue length | |
110 | */ | |
111 | if (!pktq_pfull(q, prec) && !pktq_full(q)) { | |
112 | brcmu_pktq_penq(q, prec, pkt); | |
113 | return true; | |
114 | } | |
115 | ||
116 | /* Determine precedence from which to evict packet, if any */ | |
117 | if (pktq_pfull(q, prec)) | |
118 | eprec = prec; | |
119 | else if (pktq_full(q)) { | |
120 | p = brcmu_pktq_peek_tail(q, &eprec); | |
121 | if (eprec > prec) | |
122 | return false; | |
123 | } | |
124 | ||
125 | /* Evict if needed */ | |
126 | if (eprec >= 0) { | |
127 | /* Detect queueing to unconfigured precedence */ | |
128 | discard_oldest = ac_bitmap_tst(drvr->wme_dp, eprec); | |
129 | if (eprec == prec && !discard_oldest) | |
130 | return false; /* refuse newer (incoming) packet */ | |
131 | /* Evict packet according to discard policy */ | |
132 | p = discard_oldest ? brcmu_pktq_pdeq(q, eprec) : | |
133 | brcmu_pktq_pdeq_tail(q, eprec); | |
134 | if (p == NULL) | |
135 | brcmf_dbg(ERROR, "brcmu_pktq_penq() failed, oldest %d\n", | |
136 | discard_oldest); | |
137 | ||
138 | brcmu_pkt_buf_free_skb(p); | |
139 | } | |
140 | ||
141 | /* Enqueue */ | |
142 | p = brcmu_pktq_penq(q, prec, pkt); | |
143 | if (p == NULL) | |
144 | brcmf_dbg(ERROR, "brcmu_pktq_penq() failed\n"); | |
145 | ||
146 | return p != NULL; | |
147 | } | |
148 | ||
149 | #ifdef BCMDBG | |
150 | static void | |
151 | brcmf_c_show_host_event(struct brcmf_event_msg *event, void *event_data) | |
152 | { | |
153 | uint i, status, reason; | |
154 | bool group = false, flush_txq = false, link = false; | |
155 | char *auth_str, *event_name; | |
156 | unsigned char *buf; | |
157 | char err_msg[256], eabuf[ETHER_ADDR_STR_LEN]; | |
158 | static struct { | |
159 | uint event; | |
160 | char *event_name; | |
161 | } event_names[] = { | |
162 | { | |
163 | BRCMF_E_SET_SSID, "SET_SSID"}, { | |
164 | BRCMF_E_JOIN, "JOIN"}, { | |
165 | BRCMF_E_START, "START"}, { | |
166 | BRCMF_E_AUTH, "AUTH"}, { | |
167 | BRCMF_E_AUTH_IND, "AUTH_IND"}, { | |
168 | BRCMF_E_DEAUTH, "DEAUTH"}, { | |
169 | BRCMF_E_DEAUTH_IND, "DEAUTH_IND"}, { | |
170 | BRCMF_E_ASSOC, "ASSOC"}, { | |
171 | BRCMF_E_ASSOC_IND, "ASSOC_IND"}, { | |
172 | BRCMF_E_REASSOC, "REASSOC"}, { | |
173 | BRCMF_E_REASSOC_IND, "REASSOC_IND"}, { | |
174 | BRCMF_E_DISASSOC, "DISASSOC"}, { | |
175 | BRCMF_E_DISASSOC_IND, "DISASSOC_IND"}, { | |
176 | BRCMF_E_QUIET_START, "START_QUIET"}, { | |
177 | BRCMF_E_QUIET_END, "END_QUIET"}, { | |
178 | BRCMF_E_BEACON_RX, "BEACON_RX"}, { | |
179 | BRCMF_E_LINK, "LINK"}, { | |
180 | BRCMF_E_MIC_ERROR, "MIC_ERROR"}, { | |
181 | BRCMF_E_NDIS_LINK, "NDIS_LINK"}, { | |
182 | BRCMF_E_ROAM, "ROAM"}, { | |
183 | BRCMF_E_TXFAIL, "TXFAIL"}, { | |
184 | BRCMF_E_PMKID_CACHE, "PMKID_CACHE"}, { | |
185 | BRCMF_E_RETROGRADE_TSF, "RETROGRADE_TSF"}, { | |
186 | BRCMF_E_PRUNE, "PRUNE"}, { | |
187 | BRCMF_E_AUTOAUTH, "AUTOAUTH"}, { | |
188 | BRCMF_E_EAPOL_MSG, "EAPOL_MSG"}, { | |
189 | BRCMF_E_SCAN_COMPLETE, "SCAN_COMPLETE"}, { | |
190 | BRCMF_E_ADDTS_IND, "ADDTS_IND"}, { | |
191 | BRCMF_E_DELTS_IND, "DELTS_IND"}, { | |
192 | BRCMF_E_BCNSENT_IND, "BCNSENT_IND"}, { | |
193 | BRCMF_E_BCNRX_MSG, "BCNRX_MSG"}, { | |
194 | BRCMF_E_BCNLOST_MSG, "BCNLOST_MSG"}, { | |
195 | BRCMF_E_ROAM_PREP, "ROAM_PREP"}, { | |
196 | BRCMF_E_PFN_NET_FOUND, "PNO_NET_FOUND"}, { | |
197 | BRCMF_E_PFN_NET_LOST, "PNO_NET_LOST"}, { | |
198 | BRCMF_E_RESET_COMPLETE, "RESET_COMPLETE"}, { | |
199 | BRCMF_E_JOIN_START, "JOIN_START"}, { | |
200 | BRCMF_E_ROAM_START, "ROAM_START"}, { | |
201 | BRCMF_E_ASSOC_START, "ASSOC_START"}, { | |
202 | BRCMF_E_IBSS_ASSOC, "IBSS_ASSOC"}, { | |
203 | BRCMF_E_RADIO, "RADIO"}, { | |
204 | BRCMF_E_PSM_WATCHDOG, "PSM_WATCHDOG"}, { | |
205 | BRCMF_E_PROBREQ_MSG, "PROBREQ_MSG"}, { | |
206 | BRCMF_E_SCAN_CONFIRM_IND, "SCAN_CONFIRM_IND"}, { | |
207 | BRCMF_E_PSK_SUP, "PSK_SUP"}, { | |
208 | BRCMF_E_COUNTRY_CODE_CHANGED, "COUNTRY_CODE_CHANGED"}, { | |
209 | BRCMF_E_EXCEEDED_MEDIUM_TIME, "EXCEEDED_MEDIUM_TIME"}, { | |
210 | BRCMF_E_ICV_ERROR, "ICV_ERROR"}, { | |
211 | BRCMF_E_UNICAST_DECODE_ERROR, "UNICAST_DECODE_ERROR"}, { | |
212 | BRCMF_E_MULTICAST_DECODE_ERROR, "MULTICAST_DECODE_ERROR"}, { | |
213 | BRCMF_E_TRACE, "TRACE"}, { | |
214 | BRCMF_E_ACTION_FRAME, "ACTION FRAME"}, { | |
215 | BRCMF_E_ACTION_FRAME_COMPLETE, "ACTION FRAME TX COMPLETE"}, { | |
216 | BRCMF_E_IF, "IF"}, { | |
217 | BRCMF_E_RSSI, "RSSI"}, { | |
218 | BRCMF_E_PFN_SCAN_COMPLETE, "SCAN_COMPLETE"} | |
219 | }; | |
220 | uint event_type, flags, auth_type, datalen; | |
221 | static u32 seqnum_prev; | |
222 | struct msgtrace_hdr hdr; | |
223 | u32 nblost; | |
224 | char *s, *p; | |
225 | ||
226 | event_type = be32_to_cpu(event->event_type); | |
227 | flags = be16_to_cpu(event->flags); | |
228 | status = be32_to_cpu(event->status); | |
229 | reason = be32_to_cpu(event->reason); | |
230 | auth_type = be32_to_cpu(event->auth_type); | |
231 | datalen = be32_to_cpu(event->datalen); | |
232 | /* debug dump of event messages */ | |
233 | sprintf(eabuf, "%pM", event->addr); | |
234 | ||
235 | event_name = "UNKNOWN"; | |
236 | for (i = 0; i < ARRAY_SIZE(event_names); i++) { | |
237 | if (event_names[i].event == event_type) | |
238 | event_name = event_names[i].event_name; | |
239 | } | |
240 | ||
241 | brcmf_dbg(EVENT, "EVENT: %s, event ID = %d\n", event_name, event_type); | |
242 | brcmf_dbg(EVENT, "flags 0x%04x, status %d, reason %d, auth_type %d MAC %s\n", | |
243 | flags, status, reason, auth_type, eabuf); | |
244 | ||
245 | if (flags & BRCMF_EVENT_MSG_LINK) | |
246 | link = true; | |
247 | if (flags & BRCMF_EVENT_MSG_GROUP) | |
248 | group = true; | |
249 | if (flags & BRCMF_EVENT_MSG_FLUSHTXQ) | |
250 | flush_txq = true; | |
251 | ||
252 | switch (event_type) { | |
253 | case BRCMF_E_START: | |
254 | case BRCMF_E_DEAUTH: | |
255 | case BRCMF_E_DISASSOC: | |
256 | brcmf_dbg(EVENT, "MACEVENT: %s, MAC %s\n", event_name, eabuf); | |
257 | break; | |
258 | ||
259 | case BRCMF_E_ASSOC_IND: | |
260 | case BRCMF_E_REASSOC_IND: | |
261 | brcmf_dbg(EVENT, "MACEVENT: %s, MAC %s\n", event_name, eabuf); | |
262 | break; | |
263 | ||
264 | case BRCMF_E_ASSOC: | |
265 | case BRCMF_E_REASSOC: | |
266 | if (status == BRCMF_E_STATUS_SUCCESS) | |
267 | brcmf_dbg(EVENT, "MACEVENT: %s, MAC %s, SUCCESS\n", | |
268 | event_name, eabuf); | |
269 | else if (status == BRCMF_E_STATUS_TIMEOUT) | |
270 | brcmf_dbg(EVENT, "MACEVENT: %s, MAC %s, TIMEOUT\n", | |
271 | event_name, eabuf); | |
272 | else if (status == BRCMF_E_STATUS_FAIL) | |
273 | brcmf_dbg(EVENT, "MACEVENT: %s, MAC %s, FAILURE, reason %d\n", | |
274 | event_name, eabuf, (int)reason); | |
275 | else | |
276 | brcmf_dbg(EVENT, "MACEVENT: %s, MAC %s, unexpected status %d\n", | |
277 | event_name, eabuf, (int)status); | |
278 | break; | |
279 | ||
280 | case BRCMF_E_DEAUTH_IND: | |
281 | case BRCMF_E_DISASSOC_IND: | |
282 | brcmf_dbg(EVENT, "MACEVENT: %s, MAC %s, reason %d\n", | |
283 | event_name, eabuf, (int)reason); | |
284 | break; | |
285 | ||
286 | case BRCMF_E_AUTH: | |
287 | case BRCMF_E_AUTH_IND: | |
288 | if (auth_type == WLAN_AUTH_OPEN) | |
289 | auth_str = "Open System"; | |
290 | else if (auth_type == WLAN_AUTH_SHARED_KEY) | |
291 | auth_str = "Shared Key"; | |
292 | else { | |
293 | sprintf(err_msg, "AUTH unknown: %d", (int)auth_type); | |
294 | auth_str = err_msg; | |
295 | } | |
296 | if (event_type == BRCMF_E_AUTH_IND) | |
297 | brcmf_dbg(EVENT, "MACEVENT: %s, MAC %s, %s\n", | |
298 | event_name, eabuf, auth_str); | |
299 | else if (status == BRCMF_E_STATUS_SUCCESS) | |
300 | brcmf_dbg(EVENT, "MACEVENT: %s, MAC %s, %s, SUCCESS\n", | |
301 | event_name, eabuf, auth_str); | |
302 | else if (status == BRCMF_E_STATUS_TIMEOUT) | |
303 | brcmf_dbg(EVENT, "MACEVENT: %s, MAC %s, %s, TIMEOUT\n", | |
304 | event_name, eabuf, auth_str); | |
305 | else if (status == BRCMF_E_STATUS_FAIL) { | |
306 | brcmf_dbg(EVENT, "MACEVENT: %s, MAC %s, %s, FAILURE, reason %d\n", | |
307 | event_name, eabuf, auth_str, (int)reason); | |
308 | } | |
309 | ||
310 | break; | |
311 | ||
312 | case BRCMF_E_JOIN: | |
313 | case BRCMF_E_ROAM: | |
314 | case BRCMF_E_SET_SSID: | |
315 | if (status == BRCMF_E_STATUS_SUCCESS) | |
316 | brcmf_dbg(EVENT, "MACEVENT: %s, MAC %s\n", | |
317 | event_name, eabuf); | |
318 | else if (status == BRCMF_E_STATUS_FAIL) | |
319 | brcmf_dbg(EVENT, "MACEVENT: %s, failed\n", event_name); | |
320 | else if (status == BRCMF_E_STATUS_NO_NETWORKS) | |
321 | brcmf_dbg(EVENT, "MACEVENT: %s, no networks found\n", | |
322 | event_name); | |
323 | else | |
324 | brcmf_dbg(EVENT, "MACEVENT: %s, unexpected status %d\n", | |
325 | event_name, (int)status); | |
326 | break; | |
327 | ||
328 | case BRCMF_E_BEACON_RX: | |
329 | if (status == BRCMF_E_STATUS_SUCCESS) | |
330 | brcmf_dbg(EVENT, "MACEVENT: %s, SUCCESS\n", event_name); | |
331 | else if (status == BRCMF_E_STATUS_FAIL) | |
332 | brcmf_dbg(EVENT, "MACEVENT: %s, FAIL\n", event_name); | |
333 | else | |
334 | brcmf_dbg(EVENT, "MACEVENT: %s, status %d\n", | |
335 | event_name, status); | |
336 | break; | |
337 | ||
338 | case BRCMF_E_LINK: | |
339 | brcmf_dbg(EVENT, "MACEVENT: %s %s\n", | |
340 | event_name, link ? "UP" : "DOWN"); | |
341 | break; | |
342 | ||
343 | case BRCMF_E_MIC_ERROR: | |
344 | brcmf_dbg(EVENT, "MACEVENT: %s, MAC %s, Group %d, Flush %d\n", | |
345 | event_name, eabuf, group, flush_txq); | |
346 | break; | |
347 | ||
348 | case BRCMF_E_ICV_ERROR: | |
349 | case BRCMF_E_UNICAST_DECODE_ERROR: | |
350 | case BRCMF_E_MULTICAST_DECODE_ERROR: | |
351 | brcmf_dbg(EVENT, "MACEVENT: %s, MAC %s\n", event_name, eabuf); | |
352 | break; | |
353 | ||
354 | case BRCMF_E_TXFAIL: | |
355 | brcmf_dbg(EVENT, "MACEVENT: %s, RA %s\n", event_name, eabuf); | |
356 | break; | |
357 | ||
358 | case BRCMF_E_SCAN_COMPLETE: | |
359 | case BRCMF_E_PMKID_CACHE: | |
360 | brcmf_dbg(EVENT, "MACEVENT: %s\n", event_name); | |
361 | break; | |
362 | ||
363 | case BRCMF_E_PFN_NET_FOUND: | |
364 | case BRCMF_E_PFN_NET_LOST: | |
365 | case BRCMF_E_PFN_SCAN_COMPLETE: | |
366 | brcmf_dbg(EVENT, "PNOEVENT: %s\n", event_name); | |
367 | break; | |
368 | ||
369 | case BRCMF_E_PSK_SUP: | |
370 | case BRCMF_E_PRUNE: | |
371 | brcmf_dbg(EVENT, "MACEVENT: %s, status %d, reason %d\n", | |
372 | event_name, (int)status, (int)reason); | |
373 | break; | |
374 | ||
375 | case BRCMF_E_TRACE: | |
376 | buf = (unsigned char *) event_data; | |
377 | memcpy(&hdr, buf, sizeof(struct msgtrace_hdr)); | |
378 | ||
379 | if (hdr.version != MSGTRACE_VERSION) { | |
380 | brcmf_dbg(ERROR, | |
381 | "MACEVENT: %s [unsupported version --> brcmf" | |
382 | " version:%d dongle version:%d]\n", | |
383 | event_name, MSGTRACE_VERSION, hdr.version); | |
384 | /* Reset datalen to avoid display below */ | |
385 | datalen = 0; | |
386 | break; | |
387 | } | |
388 | ||
389 | /* There are 2 bytes available at the end of data */ | |
390 | *(buf + sizeof(struct msgtrace_hdr) | |
391 | + be16_to_cpu(hdr.len)) = '\0'; | |
392 | ||
393 | if (be32_to_cpu(hdr.discarded_bytes) | |
394 | || be32_to_cpu(hdr.discarded_printf)) | |
395 | brcmf_dbg(ERROR, | |
396 | "WLC_E_TRACE: [Discarded traces in dongle -->" | |
397 | " discarded_bytes %d discarded_printf %d]\n", | |
398 | be32_to_cpu(hdr.discarded_bytes), | |
399 | be32_to_cpu(hdr.discarded_printf)); | |
400 | ||
401 | nblost = be32_to_cpu(hdr.seqnum) - seqnum_prev - 1; | |
402 | if (nblost > 0) | |
403 | brcmf_dbg(ERROR, "WLC_E_TRACE: [Event lost --> seqnum " | |
404 | " %d nblost %d\n", be32_to_cpu(hdr.seqnum), | |
405 | nblost); | |
406 | seqnum_prev = be32_to_cpu(hdr.seqnum); | |
407 | ||
408 | /* Display the trace buffer. Advance from \n to \n to | |
409 | * avoid display big | |
410 | * printf (issue with Linux printk ) | |
411 | */ | |
412 | p = (char *)&buf[sizeof(struct msgtrace_hdr)]; | |
413 | while ((s = strstr(p, "\n")) != NULL) { | |
414 | *s = '\0'; | |
415 | printk(KERN_DEBUG"%s\n", p); | |
416 | p = s + 1; | |
417 | } | |
418 | printk(KERN_DEBUG "%s\n", p); | |
419 | ||
420 | /* Reset datalen to avoid display below */ | |
421 | datalen = 0; | |
422 | break; | |
423 | ||
424 | case BRCMF_E_RSSI: | |
425 | brcmf_dbg(EVENT, "MACEVENT: %s %d\n", | |
426 | event_name, be32_to_cpu(*((__be32 *)event_data))); | |
427 | break; | |
428 | ||
429 | default: | |
430 | brcmf_dbg(EVENT, | |
431 | "MACEVENT: %s %d, MAC %s, status %d, reason %d, " | |
432 | "auth %d\n", event_name, event_type, eabuf, | |
433 | (int)status, (int)reason, (int)auth_type); | |
434 | break; | |
435 | } | |
436 | ||
437 | /* show any appended data */ | |
438 | if (datalen) { | |
439 | buf = (unsigned char *) event_data; | |
440 | brcmf_dbg(EVENT, " data (%d) : ", datalen); | |
441 | for (i = 0; i < datalen; i++) | |
442 | brcmf_dbg(EVENT, " 0x%02x ", *buf++); | |
443 | brcmf_dbg(EVENT, "\n"); | |
444 | } | |
445 | } | |
446 | #endif /* BCMDBG */ | |
447 | ||
448 | int | |
449 | brcmf_c_host_event(struct brcmf_info *drvr_priv, int *ifidx, void *pktdata, | |
450 | struct brcmf_event_msg *event, void **data_ptr) | |
451 | { | |
452 | /* check whether packet is a BRCM event pkt */ | |
453 | struct brcmf_event *pvt_data = (struct brcmf_event *) pktdata; | |
454 | struct brcmf_if_event *ifevent; | |
455 | char *event_data; | |
456 | u32 type, status; | |
457 | u16 flags; | |
458 | int evlen; | |
459 | ||
460 | if (memcmp(BRCM_OUI, &pvt_data->hdr.oui[0], DOT11_OUI_LEN)) { | |
461 | brcmf_dbg(ERROR, "mismatched OUI, bailing\n"); | |
462 | return -EBADE; | |
463 | } | |
464 | ||
465 | /* BRCM event pkt may be unaligned - use xxx_ua to load user_subtype. */ | |
466 | if (get_unaligned_be16(&pvt_data->hdr.usr_subtype) != | |
467 | BCMILCP_BCM_SUBTYPE_EVENT) { | |
468 | brcmf_dbg(ERROR, "mismatched subtype, bailing\n"); | |
469 | return -EBADE; | |
470 | } | |
471 | ||
472 | *data_ptr = &pvt_data[1]; | |
473 | event_data = *data_ptr; | |
474 | ||
475 | /* memcpy since BRCM event pkt may be unaligned. */ | |
476 | memcpy(event, &pvt_data->msg, sizeof(struct brcmf_event_msg)); | |
477 | ||
478 | type = get_unaligned_be32(&event->event_type); | |
479 | flags = get_unaligned_be16(&event->flags); | |
480 | status = get_unaligned_be32(&event->status); | |
481 | evlen = get_unaligned_be32(&event->datalen) + | |
482 | sizeof(struct brcmf_event); | |
483 | ||
484 | switch (type) { | |
485 | case BRCMF_E_IF: | |
486 | ifevent = (struct brcmf_if_event *) event_data; | |
487 | brcmf_dbg(TRACE, "if event\n"); | |
488 | ||
489 | if (ifevent->ifidx > 0 && ifevent->ifidx < BRCMF_MAX_IFS) { | |
490 | if (ifevent->action == BRCMF_E_IF_ADD) | |
491 | brcmf_add_if(drvr_priv, ifevent->ifidx, NULL, | |
492 | event->ifname, | |
493 | pvt_data->eth.h_dest, | |
494 | ifevent->flags, ifevent->bssidx); | |
495 | else | |
496 | brcmf_del_if(drvr_priv, ifevent->ifidx); | |
497 | } else { | |
498 | brcmf_dbg(ERROR, "Invalid ifidx %d for %s\n", | |
499 | ifevent->ifidx, event->ifname); | |
500 | } | |
501 | ||
502 | /* send up the if event: btamp user needs it */ | |
503 | *ifidx = brcmf_ifname2idx(drvr_priv, event->ifname); | |
504 | break; | |
505 | ||
506 | /* These are what external supplicant/authenticator wants */ | |
507 | case BRCMF_E_LINK: | |
508 | case BRCMF_E_ASSOC_IND: | |
509 | case BRCMF_E_REASSOC_IND: | |
510 | case BRCMF_E_DISASSOC_IND: | |
511 | case BRCMF_E_MIC_ERROR: | |
512 | default: | |
513 | /* Fall through: this should get _everything_ */ | |
514 | ||
515 | *ifidx = brcmf_ifname2idx(drvr_priv, event->ifname); | |
516 | brcmf_dbg(TRACE, "MAC event %d, flags %x, status %x\n", | |
517 | type, flags, status); | |
518 | ||
519 | /* put it back to BRCMF_E_NDIS_LINK */ | |
520 | if (type == BRCMF_E_NDIS_LINK) { | |
521 | u32 temp1; | |
522 | __be32 temp2; | |
523 | ||
524 | temp1 = get_unaligned_be32(&event->event_type); | |
525 | brcmf_dbg(TRACE, "Converted to WLC_E_LINK type %d\n", | |
526 | temp1); | |
527 | ||
528 | temp2 = cpu_to_be32(BRCMF_E_NDIS_LINK); | |
529 | memcpy((void *)(&pvt_data->msg.event_type), &temp2, | |
530 | sizeof(pvt_data->msg.event_type)); | |
531 | } | |
532 | break; | |
533 | } | |
534 | ||
535 | #ifdef BCMDBG | |
536 | brcmf_c_show_host_event(event, event_data); | |
537 | #endif /* BCMDBG */ | |
538 | ||
539 | return 0; | |
540 | } | |
541 | ||
542 | /* Convert user's input in hex pattern to byte-size mask */ | |
543 | static int brcmf_c_pattern_atoh(char *src, char *dst) | |
544 | { | |
545 | int i; | |
546 | if (strncmp(src, "0x", 2) != 0 && strncmp(src, "0X", 2) != 0) { | |
547 | brcmf_dbg(ERROR, "Mask invalid format. Needs to start with 0x\n"); | |
548 | return -EINVAL; | |
549 | } | |
550 | src = src + 2; /* Skip past 0x */ | |
551 | if (strlen(src) % 2 != 0) { | |
552 | brcmf_dbg(ERROR, "Mask invalid format. Length must be even.\n"); | |
553 | return -EINVAL; | |
554 | } | |
555 | for (i = 0; *src != '\0'; i++) { | |
556 | unsigned long res; | |
557 | char num[3]; | |
558 | strncpy(num, src, 2); | |
559 | num[2] = '\0'; | |
560 | if (kstrtoul(num, 16, &res)) | |
561 | return -EINVAL; | |
562 | dst[i] = (u8)res; | |
563 | src += 2; | |
564 | } | |
565 | return i; | |
566 | } | |
567 | ||
568 | void | |
569 | brcmf_c_pktfilter_offload_enable(struct brcmf_pub *drvr, char *arg, int enable, | |
570 | int master_mode) | |
571 | { | |
572 | unsigned long res; | |
573 | char *argv[8]; | |
574 | int i = 0; | |
575 | const char *str; | |
576 | int buf_len; | |
577 | int str_len; | |
578 | char *arg_save = NULL, *arg_org = NULL; | |
579 | int rc; | |
580 | char buf[128]; | |
f7264adb AS |
581 | struct brcmf_pkt_filter_enable_le enable_parm; |
582 | struct brcmf_pkt_filter_enable_le *pkt_filterp; | |
583 | __le32 mmode_le; | |
5b435de0 AS |
584 | |
585 | arg_save = kmalloc(strlen(arg) + 1, GFP_ATOMIC); | |
586 | if (!arg_save) | |
587 | goto fail; | |
588 | ||
589 | arg_org = arg_save; | |
590 | memcpy(arg_save, arg, strlen(arg) + 1); | |
591 | ||
592 | argv[i] = strsep(&arg_save, " "); | |
593 | ||
594 | i = 0; | |
595 | if (NULL == argv[i]) { | |
596 | brcmf_dbg(ERROR, "No args provided\n"); | |
597 | goto fail; | |
598 | } | |
599 | ||
600 | str = "pkt_filter_enable"; | |
601 | str_len = strlen(str); | |
602 | strncpy(buf, str, str_len); | |
603 | buf[str_len] = '\0'; | |
604 | buf_len = str_len + 1; | |
605 | ||
f7264adb | 606 | pkt_filterp = (struct brcmf_pkt_filter_enable_le *) (buf + str_len + 1); |
5b435de0 AS |
607 | |
608 | /* Parse packet filter id. */ | |
609 | enable_parm.id = 0; | |
610 | if (!kstrtoul(argv[i], 0, &res)) | |
f7264adb | 611 | enable_parm.id = cpu_to_le32((u32)res); |
5b435de0 AS |
612 | |
613 | /* Parse enable/disable value. */ | |
f7264adb | 614 | enable_parm.enable = cpu_to_le32(enable); |
5b435de0 AS |
615 | |
616 | buf_len += sizeof(enable_parm); | |
617 | memcpy((char *)pkt_filterp, &enable_parm, sizeof(enable_parm)); | |
618 | ||
619 | /* Enable/disable the specified filter. */ | |
620 | rc = brcmf_proto_cdc_set_dcmd(drvr, 0, BRCMF_C_SET_VAR, buf, buf_len); | |
621 | rc = rc >= 0 ? 0 : rc; | |
622 | if (rc) | |
623 | brcmf_dbg(TRACE, "failed to add pktfilter %s, retcode = %d\n", | |
624 | arg, rc); | |
625 | else | |
626 | brcmf_dbg(TRACE, "successfully added pktfilter %s\n", arg); | |
627 | ||
628 | /* Contorl the master mode */ | |
f7264adb | 629 | mmode_le = cpu_to_le32(master_mode); |
53a2277d | 630 | brcmf_c_mkiovar("pkt_filter_mode", (char *)&mmode_le, 4, buf, |
5b435de0 AS |
631 | sizeof(buf)); |
632 | rc = brcmf_proto_cdc_set_dcmd(drvr, 0, BRCMF_C_SET_VAR, buf, | |
633 | sizeof(buf)); | |
634 | rc = rc >= 0 ? 0 : rc; | |
635 | if (rc) | |
636 | brcmf_dbg(TRACE, "failed to add pktfilter %s, retcode = %d\n", | |
637 | arg, rc); | |
638 | ||
639 | fail: | |
640 | kfree(arg_org); | |
641 | } | |
642 | ||
643 | void brcmf_c_pktfilter_offload_set(struct brcmf_pub *drvr, char *arg) | |
644 | { | |
645 | const char *str; | |
f7264adb AS |
646 | struct brcmf_pkt_filter_le pkt_filter; |
647 | struct brcmf_pkt_filter_le *pkt_filterp; | |
5b435de0 AS |
648 | unsigned long res; |
649 | int buf_len; | |
650 | int str_len; | |
651 | int rc; | |
652 | u32 mask_size; | |
653 | u32 pattern_size; | |
654 | char *argv[8], *buf = NULL; | |
655 | int i = 0; | |
656 | char *arg_save = NULL, *arg_org = NULL; | |
657 | ||
658 | arg_save = kstrdup(arg, GFP_ATOMIC); | |
659 | if (!arg_save) | |
660 | goto fail; | |
661 | ||
662 | arg_org = arg_save; | |
663 | ||
664 | buf = kmalloc(PKTFILTER_BUF_SIZE, GFP_ATOMIC); | |
665 | if (!buf) | |
666 | goto fail; | |
667 | ||
668 | argv[i] = strsep(&arg_save, " "); | |
669 | while (argv[i++]) | |
670 | argv[i] = strsep(&arg_save, " "); | |
671 | ||
672 | i = 0; | |
673 | if (NULL == argv[i]) { | |
674 | brcmf_dbg(ERROR, "No args provided\n"); | |
675 | goto fail; | |
676 | } | |
677 | ||
678 | str = "pkt_filter_add"; | |
679 | strcpy(buf, str); | |
680 | str_len = strlen(str); | |
681 | buf_len = str_len + 1; | |
682 | ||
f7264adb | 683 | pkt_filterp = (struct brcmf_pkt_filter_le *) (buf + str_len + 1); |
5b435de0 AS |
684 | |
685 | /* Parse packet filter id. */ | |
686 | pkt_filter.id = 0; | |
687 | if (!kstrtoul(argv[i], 0, &res)) | |
f7264adb | 688 | pkt_filter.id = cpu_to_le32((u32)res); |
5b435de0 AS |
689 | |
690 | if (NULL == argv[++i]) { | |
691 | brcmf_dbg(ERROR, "Polarity not provided\n"); | |
692 | goto fail; | |
693 | } | |
694 | ||
695 | /* Parse filter polarity. */ | |
696 | pkt_filter.negate_match = 0; | |
697 | if (!kstrtoul(argv[i], 0, &res)) | |
f7264adb | 698 | pkt_filter.negate_match = cpu_to_le32((u32)res); |
5b435de0 AS |
699 | |
700 | if (NULL == argv[++i]) { | |
701 | brcmf_dbg(ERROR, "Filter type not provided\n"); | |
702 | goto fail; | |
703 | } | |
704 | ||
705 | /* Parse filter type. */ | |
706 | pkt_filter.type = 0; | |
707 | if (!kstrtoul(argv[i], 0, &res)) | |
f7264adb | 708 | pkt_filter.type = cpu_to_le32((u32)res); |
5b435de0 AS |
709 | |
710 | if (NULL == argv[++i]) { | |
711 | brcmf_dbg(ERROR, "Offset not provided\n"); | |
712 | goto fail; | |
713 | } | |
714 | ||
715 | /* Parse pattern filter offset. */ | |
716 | pkt_filter.u.pattern.offset = 0; | |
717 | if (!kstrtoul(argv[i], 0, &res)) | |
f7264adb | 718 | pkt_filter.u.pattern.offset = cpu_to_le32((u32)res); |
5b435de0 AS |
719 | |
720 | if (NULL == argv[++i]) { | |
721 | brcmf_dbg(ERROR, "Bitmask not provided\n"); | |
722 | goto fail; | |
723 | } | |
724 | ||
725 | /* Parse pattern filter mask. */ | |
726 | mask_size = | |
727 | brcmf_c_pattern_atoh | |
728 | (argv[i], (char *)pkt_filterp->u.pattern.mask_and_pattern); | |
729 | ||
730 | if (NULL == argv[++i]) { | |
731 | brcmf_dbg(ERROR, "Pattern not provided\n"); | |
732 | goto fail; | |
733 | } | |
734 | ||
735 | /* Parse pattern filter pattern. */ | |
736 | pattern_size = | |
737 | brcmf_c_pattern_atoh(argv[i], | |
738 | (char *)&pkt_filterp->u.pattern. | |
739 | mask_and_pattern[mask_size]); | |
740 | ||
741 | if (mask_size != pattern_size) { | |
742 | brcmf_dbg(ERROR, "Mask and pattern not the same size\n"); | |
743 | goto fail; | |
744 | } | |
745 | ||
f7264adb | 746 | pkt_filter.u.pattern.size_bytes = cpu_to_le32(mask_size); |
5b435de0 AS |
747 | buf_len += BRCMF_PKT_FILTER_FIXED_LEN; |
748 | buf_len += (BRCMF_PKT_FILTER_PATTERN_FIXED_LEN + 2 * mask_size); | |
749 | ||
750 | /* Keep-alive attributes are set in local | |
751 | * variable (keep_alive_pkt), and | |
752 | ** then memcpy'ed into buffer (keep_alive_pktp) since there is no | |
753 | ** guarantee that the buffer is properly aligned. | |
754 | */ | |
755 | memcpy((char *)pkt_filterp, | |
756 | &pkt_filter, | |
757 | BRCMF_PKT_FILTER_FIXED_LEN + BRCMF_PKT_FILTER_PATTERN_FIXED_LEN); | |
758 | ||
759 | rc = brcmf_proto_cdc_set_dcmd(drvr, 0, BRCMF_C_SET_VAR, buf, buf_len); | |
760 | rc = rc >= 0 ? 0 : rc; | |
761 | ||
762 | if (rc) | |
763 | brcmf_dbg(TRACE, "failed to add pktfilter %s, retcode = %d\n", | |
764 | arg, rc); | |
765 | else | |
766 | brcmf_dbg(TRACE, "successfully added pktfilter %s\n", arg); | |
767 | ||
768 | fail: | |
769 | kfree(arg_org); | |
770 | ||
771 | kfree(buf); | |
772 | } | |
773 | ||
774 | static void brcmf_c_arp_offload_set(struct brcmf_pub *drvr, int arp_mode) | |
775 | { | |
776 | char iovbuf[32]; | |
777 | int retcode; | |
778 | ||
53a2277d | 779 | brcmf_c_mkiovar("arp_ol", (char *)&arp_mode, 4, iovbuf, sizeof(iovbuf)); |
5b435de0 AS |
780 | retcode = brcmf_proto_cdc_set_dcmd(drvr, 0, BRCMF_C_SET_VAR, |
781 | iovbuf, sizeof(iovbuf)); | |
782 | retcode = retcode >= 0 ? 0 : retcode; | |
783 | if (retcode) | |
784 | brcmf_dbg(TRACE, "failed to set ARP offload mode to 0x%x, retcode = %d\n", | |
785 | arp_mode, retcode); | |
786 | else | |
787 | brcmf_dbg(TRACE, "successfully set ARP offload mode to 0x%x\n", | |
788 | arp_mode); | |
789 | } | |
790 | ||
791 | static void brcmf_c_arp_offload_enable(struct brcmf_pub *drvr, int arp_enable) | |
792 | { | |
793 | char iovbuf[32]; | |
794 | int retcode; | |
795 | ||
53a2277d AB |
796 | brcmf_c_mkiovar("arpoe", (char *)&arp_enable, 4, |
797 | iovbuf, sizeof(iovbuf)); | |
5b435de0 AS |
798 | retcode = brcmf_proto_cdc_set_dcmd(drvr, 0, BRCMF_C_SET_VAR, |
799 | iovbuf, sizeof(iovbuf)); | |
800 | retcode = retcode >= 0 ? 0 : retcode; | |
801 | if (retcode) | |
802 | brcmf_dbg(TRACE, "failed to enable ARP offload to %d, retcode = %d\n", | |
803 | arp_enable, retcode); | |
804 | else | |
805 | brcmf_dbg(TRACE, "successfully enabled ARP offload to %d\n", | |
806 | arp_enable); | |
807 | } | |
808 | ||
809 | int brcmf_c_preinit_dcmds(struct brcmf_pub *drvr) | |
810 | { | |
811 | char iovbuf[BRCMF_EVENTING_MASK_LEN + 12]; /* Room for | |
812 | "event_msgs" + '\0' + bitvec */ | |
813 | uint up = 0; | |
814 | char buf[128], *ptr; | |
815 | u32 dongle_align = BRCMF_SDALIGN; | |
816 | u32 glom = 0; | |
817 | u32 roaming = 1; | |
818 | uint bcn_timeout = 3; | |
819 | int scan_assoc_time = 40; | |
820 | int scan_unassoc_time = 40; | |
821 | int i; | |
822 | ||
823 | brcmf_os_proto_block(drvr); | |
824 | ||
825 | /* Set Country code */ | |
826 | if (drvr->country_code[0] != 0) { | |
827 | if (brcmf_proto_cdc_set_dcmd(drvr, 0, BRCMF_C_SET_COUNTRY, | |
828 | drvr->country_code, | |
829 | sizeof(drvr->country_code)) < 0) | |
830 | brcmf_dbg(ERROR, "country code setting failed\n"); | |
831 | } | |
832 | ||
833 | /* query for 'ver' to get version info from firmware */ | |
834 | memset(buf, 0, sizeof(buf)); | |
835 | ptr = buf; | |
53a2277d | 836 | brcmf_c_mkiovar("ver", NULL, 0, buf, sizeof(buf)); |
5b435de0 AS |
837 | brcmf_proto_cdc_query_dcmd(drvr, 0, BRCMF_C_GET_VAR, buf, sizeof(buf)); |
838 | strsep(&ptr, "\n"); | |
839 | /* Print fw version info */ | |
840 | brcmf_dbg(ERROR, "Firmware version = %s\n", buf); | |
841 | ||
842 | /* Match Host and Dongle rx alignment */ | |
53a2277d | 843 | brcmf_c_mkiovar("bus:txglomalign", (char *)&dongle_align, 4, iovbuf, |
5b435de0 AS |
844 | sizeof(iovbuf)); |
845 | brcmf_proto_cdc_set_dcmd(drvr, 0, BRCMF_C_SET_VAR, iovbuf, | |
846 | sizeof(iovbuf)); | |
847 | ||
848 | /* disable glom option per default */ | |
53a2277d | 849 | brcmf_c_mkiovar("bus:txglom", (char *)&glom, 4, iovbuf, sizeof(iovbuf)); |
5b435de0 AS |
850 | brcmf_proto_cdc_set_dcmd(drvr, 0, BRCMF_C_SET_VAR, iovbuf, |
851 | sizeof(iovbuf)); | |
852 | ||
853 | /* Setup timeout if Beacons are lost and roam is off to report | |
854 | link down */ | |
53a2277d | 855 | brcmf_c_mkiovar("bcn_timeout", (char *)&bcn_timeout, 4, iovbuf, |
5b435de0 AS |
856 | sizeof(iovbuf)); |
857 | brcmf_proto_cdc_set_dcmd(drvr, 0, BRCMF_C_SET_VAR, iovbuf, | |
858 | sizeof(iovbuf)); | |
859 | ||
860 | /* Enable/Disable build-in roaming to allowed ext supplicant to take | |
861 | of romaing */ | |
53a2277d | 862 | brcmf_c_mkiovar("roam_off", (char *)&roaming, 4, |
5b435de0 AS |
863 | iovbuf, sizeof(iovbuf)); |
864 | brcmf_proto_cdc_set_dcmd(drvr, 0, BRCMF_C_SET_VAR, iovbuf, | |
865 | sizeof(iovbuf)); | |
866 | ||
867 | /* Force STA UP */ | |
868 | brcmf_proto_cdc_set_dcmd(drvr, 0, BRCMF_C_UP, (char *)&up, sizeof(up)); | |
869 | ||
870 | /* Setup event_msgs */ | |
53a2277d | 871 | brcmf_c_mkiovar("event_msgs", drvr->eventmask, BRCMF_EVENTING_MASK_LEN, |
5b435de0 AS |
872 | iovbuf, sizeof(iovbuf)); |
873 | brcmf_proto_cdc_set_dcmd(drvr, 0, BRCMF_C_SET_VAR, iovbuf, | |
874 | sizeof(iovbuf)); | |
875 | ||
876 | brcmf_proto_cdc_set_dcmd(drvr, 0, BRCMF_C_SET_SCAN_CHANNEL_TIME, | |
877 | (char *)&scan_assoc_time, sizeof(scan_assoc_time)); | |
878 | brcmf_proto_cdc_set_dcmd(drvr, 0, BRCMF_C_SET_SCAN_UNASSOC_TIME, | |
879 | (char *)&scan_unassoc_time, sizeof(scan_unassoc_time)); | |
880 | ||
881 | /* Set and enable ARP offload feature */ | |
882 | brcmf_c_arp_offload_set(drvr, BRCMF_ARPOL_MODE); | |
883 | brcmf_c_arp_offload_enable(drvr, true); | |
884 | ||
885 | /* Set up pkt filter */ | |
886 | for (i = 0; i < drvr->pktfilter_count; i++) { | |
887 | brcmf_c_pktfilter_offload_set(drvr, drvr->pktfilter[i]); | |
888 | brcmf_c_pktfilter_offload_enable(drvr, drvr->pktfilter[i], | |
889 | 0, true); | |
890 | } | |
891 | ||
892 | brcmf_os_proto_unblock(drvr); | |
893 | ||
894 | return 0; | |
895 | } |