dhd_common.c 51 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981
  1. /*
  2. * Broadcom Dongle Host Driver (DHD), common DHD core.
  3. *
  4. * Copyright (C) 1999-2010, Broadcom Corporation
  5. *
  6. * Unless you and Broadcom execute a separate written software license
  7. * agreement governing use of this software, this software is licensed to you
  8. * under the terms of the GNU General Public License version 2 (the "GPL"),
  9. * available at http://www.broadcom.com/licenses/GPLv2.php, with the
  10. * following added to such license:
  11. *
  12. * As a special exception, the copyright holders of this software give you
  13. * permission to link this software with independent modules, and to copy and
  14. * distribute the resulting executable under terms of your choice, provided that
  15. * you also meet, for each linked independent module, the terms and conditions of
  16. * the license of that module. An independent module is a module which is not
  17. * derived from this software. The special exception does not apply to any
  18. * modifications of the software.
  19. *
  20. * Notwithstanding the above, under no circumstances may you combine this
  21. * software in any way with any other Broadcom software provided under a license
  22. * other than the GPL, without Broadcom's express prior written consent.
  23. *
  24. * $Id: dhd_common.c,v 1.5.6.8.2.6.6.65 2010/07/07 00:05:07 Exp $
  25. */
  26. #include <typedefs.h>
  27. #include <osl.h>
  28. #include <epivers.h>
  29. #include <bcmutils.h>
  30. #include <bcmendian.h>
  31. #include <dngl_stats.h>
  32. #include <dhd.h>
  33. #include <dhd_bus.h>
  34. #include <dhd_proto.h>
  35. #include <dhd_dbg.h>
  36. #include <msgtrace.h>
  37. #include <wlioctl.h>
  38. int dhd_msg_level;
  39. #if defined(CSCAN)
  40. #include <wl_iw.h>
  41. #endif
  42. char fw_path[MOD_PARAM_PATHLEN];
  43. char nv_path[MOD_PARAM_PATHLEN];
  44. /* Last connection success/failure status */
  45. uint32 dhd_conn_event;
  46. uint32 dhd_conn_status;
  47. uint32 dhd_conn_reason;
  48. #define htod32(i) i
  49. #define htod16(i) i
  50. #define dtoh32(i) i
  51. #define dtoh16(i) i
  52. extern int dhdcdc_set_ioctl(dhd_pub_t *dhd, int ifidx, uint cmd, void *buf, uint len);
  53. extern void dhd_ind_scan_confirm(void *h, bool status);
  54. extern int dhd_wl_ioctl(dhd_pub_t *dhd, uint cmd, char *buf, uint buflen);
  55. void dhd_iscan_lock(void);
  56. void dhd_iscan_unlock(void);
  57. /* Packet alignment for most efficient SDIO (can change based on platform) */
  58. #ifndef DHD_SDALIGN
  59. #define DHD_SDALIGN 32
  60. #endif
  61. #if !ISPOWEROF2(DHD_SDALIGN)
  62. #error DHD_SDALIGN is not a power of 2!
  63. #endif
  64. #ifdef DHD_DEBUG
  65. const char dhd_version[] = "Dongle Host Driver, version " EPI_VERSION_STR "\nCompiled on "
  66. __DATE__ " at " __TIME__;
  67. #else
  68. const char dhd_version[] = "Dongle Host Driver, version " EPI_VERSION_STR;
  69. #endif
  70. void dhd_set_timer(void *bus, uint wdtick);
  71. /* IOVar table */
  72. enum {
  73. IOV_VERSION = 1,
  74. IOV_MSGLEVEL,
  75. IOV_BCMERRORSTR,
  76. IOV_BCMERROR,
  77. IOV_WDTICK,
  78. IOV_DUMP,
  79. #ifdef DHD_DEBUG
  80. IOV_CONS,
  81. IOV_DCONSOLE_POLL,
  82. #endif
  83. IOV_CLEARCOUNTS,
  84. IOV_LOGDUMP,
  85. IOV_LOGCAL,
  86. IOV_LOGSTAMP,
  87. IOV_GPIOOB,
  88. IOV_IOCTLTIMEOUT,
  89. IOV_LAST
  90. };
  91. const bcm_iovar_t dhd_iovars[] = {
  92. {"version", IOV_VERSION, 0, IOVT_BUFFER, sizeof(dhd_version) },
  93. #ifdef DHD_DEBUG
  94. {"msglevel", IOV_MSGLEVEL, 0, IOVT_UINT32, 0 },
  95. #endif /* DHD_DEBUG */
  96. {"bcmerrorstr", IOV_BCMERRORSTR, 0, IOVT_BUFFER, BCME_STRLEN },
  97. {"bcmerror", IOV_BCMERROR, 0, IOVT_INT8, 0 },
  98. {"wdtick", IOV_WDTICK, 0, IOVT_UINT32, 0 },
  99. {"dump", IOV_DUMP, 0, IOVT_BUFFER, DHD_IOCTL_MAXLEN },
  100. #ifdef DHD_DEBUG
  101. {"dconpoll", IOV_DCONSOLE_POLL, 0, IOVT_UINT32, 0 },
  102. {"cons", IOV_CONS, 0, IOVT_BUFFER, 0 },
  103. #endif
  104. {"clearcounts", IOV_CLEARCOUNTS, 0, IOVT_VOID, 0 },
  105. {"gpioob", IOV_GPIOOB, 0, IOVT_UINT32, 0 },
  106. {"ioctl_timeout", IOV_IOCTLTIMEOUT, 0, IOVT_UINT32, 0 },
  107. {NULL, 0, 0, 0, 0 }
  108. };
  109. void
  110. dhd_common_init(void)
  111. {
  112. /* Init global variables at run-time, not as part of the declaration.
  113. * This is required to support init/de-init of the driver. Initialization
  114. * of globals as part of the declaration results in non-deterministic
  115. * behaviour since the value of the globals may be different on the
  116. * first time that the driver is initialized vs subsequent initializations.
  117. */
  118. dhd_msg_level = DHD_ERROR_VAL;
  119. #ifdef CONFIG_BCM4329_FW_PATH
  120. strncpy(fw_path, CONFIG_BCM4329_FW_PATH, MOD_PARAM_PATHLEN-1);
  121. #elif defined CONFIG_BCM4319_FW_PATH
  122. strncpy(fw_path, CONFIG_BCM4319_FW_PATH, MOD_PARAM_PATHLEN-1);
  123. #else
  124. fw_path[0] = '\0';
  125. #endif
  126. #ifdef CONFIG_BCM4329_NVRAM_PATH
  127. strncpy(nv_path, CONFIG_BCM4329_NVRAM_PATH, MOD_PARAM_PATHLEN-1);
  128. #elif defined CONFIG_BCM4319_NVRAM_PATH
  129. strncpy(nv_path, CONFIG_BCM4319_NVRAM_PATH, MOD_PARAM_PATHLEN-1);
  130. #else
  131. nv_path[0] = '\0';
  132. #endif
  133. }
  134. static int
  135. dhd_dump(dhd_pub_t *dhdp, char *buf, int buflen)
  136. {
  137. char eabuf[ETHER_ADDR_STR_LEN];
  138. struct bcmstrbuf b;
  139. struct bcmstrbuf *strbuf = &b;
  140. bcm_binit(strbuf, buf, buflen);
  141. /* Base DHD info */
  142. bcm_bprintf(strbuf, "%s\n", dhd_version);
  143. bcm_bprintf(strbuf, "\n");
  144. bcm_bprintf(strbuf, "pub.up %d pub.txoff %d pub.busstate %d\n",
  145. dhdp->up, dhdp->txoff, dhdp->busstate);
  146. bcm_bprintf(strbuf, "pub.hdrlen %d pub.maxctl %d pub.rxsz %d\n",
  147. dhdp->hdrlen, dhdp->maxctl, dhdp->rxsz);
  148. bcm_bprintf(strbuf, "pub.iswl %d pub.drv_version %ld pub.mac %s\n",
  149. dhdp->iswl, dhdp->drv_version, bcm_ether_ntoa(&dhdp->mac, eabuf));
  150. bcm_bprintf(strbuf, "pub.bcmerror %d tickcnt %d\n", dhdp->bcmerror, dhdp->tickcnt);
  151. bcm_bprintf(strbuf, "dongle stats:\n");
  152. bcm_bprintf(strbuf, "tx_packets %ld tx_bytes %ld tx_errors %ld tx_dropped %ld\n",
  153. dhdp->dstats.tx_packets, dhdp->dstats.tx_bytes,
  154. dhdp->dstats.tx_errors, dhdp->dstats.tx_dropped);
  155. bcm_bprintf(strbuf, "rx_packets %ld rx_bytes %ld rx_errors %ld rx_dropped %ld\n",
  156. dhdp->dstats.rx_packets, dhdp->dstats.rx_bytes,
  157. dhdp->dstats.rx_errors, dhdp->dstats.rx_dropped);
  158. bcm_bprintf(strbuf, "multicast %ld\n", dhdp->dstats.multicast);
  159. bcm_bprintf(strbuf, "bus stats:\n");
  160. bcm_bprintf(strbuf, "tx_packets %ld tx_multicast %ld tx_errors %ld\n",
  161. dhdp->tx_packets, dhdp->tx_multicast, dhdp->tx_errors);
  162. bcm_bprintf(strbuf, "tx_ctlpkts %ld tx_ctlerrs %ld\n",
  163. dhdp->tx_ctlpkts, dhdp->tx_ctlerrs);
  164. bcm_bprintf(strbuf, "rx_packets %ld rx_multicast %ld rx_errors %ld \n",
  165. dhdp->rx_packets, dhdp->rx_multicast, dhdp->rx_errors);
  166. bcm_bprintf(strbuf, "rx_ctlpkts %ld rx_ctlerrs %ld rx_dropped %ld rx_flushed %ld\n",
  167. dhdp->rx_ctlpkts, dhdp->rx_ctlerrs, dhdp->rx_dropped, dhdp->rx_flushed);
  168. bcm_bprintf(strbuf, "rx_readahead_cnt %ld tx_realloc %ld fc_packets %ld\n",
  169. dhdp->rx_readahead_cnt, dhdp->tx_realloc, dhdp->fc_packets);
  170. bcm_bprintf(strbuf, "wd_dpc_sched %ld\n", dhdp->wd_dpc_sched);
  171. bcm_bprintf(strbuf, "\n");
  172. /* Add any prot info */
  173. dhd_prot_dump(dhdp, strbuf);
  174. bcm_bprintf(strbuf, "\n");
  175. /* Add any bus info */
  176. dhd_bus_dump(dhdp, strbuf);
  177. return (!strbuf->size ? BCME_BUFTOOSHORT : 0);
  178. }
  179. static int
  180. dhd_doiovar(dhd_pub_t *dhd_pub, const bcm_iovar_t *vi, uint32 actionid, const char *name,
  181. void *params, int plen, void *arg, int len, int val_size)
  182. {
  183. int bcmerror = 0;
  184. int32 int_val = 0;
  185. DHD_TRACE(("%s: Enter\n", __FUNCTION__));
  186. if ((bcmerror = bcm_iovar_lencheck(vi, arg, len, IOV_ISSET(actionid))) != 0)
  187. goto exit;
  188. if (plen >= (int)sizeof(int_val))
  189. bcopy(params, &int_val, sizeof(int_val));
  190. switch (actionid) {
  191. case IOV_GVAL(IOV_VERSION):
  192. /* Need to have checked buffer length */
  193. strncpy((char*)arg, dhd_version, len);
  194. break;
  195. case IOV_GVAL(IOV_MSGLEVEL):
  196. int_val = (int32)dhd_msg_level;
  197. bcopy(&int_val, arg, val_size);
  198. break;
  199. case IOV_SVAL(IOV_MSGLEVEL):
  200. dhd_msg_level = int_val;
  201. break;
  202. case IOV_GVAL(IOV_BCMERRORSTR):
  203. strncpy((char *)arg, bcmerrorstr(dhd_pub->bcmerror), BCME_STRLEN);
  204. ((char *)arg)[BCME_STRLEN - 1] = 0x00;
  205. break;
  206. case IOV_GVAL(IOV_BCMERROR):
  207. int_val = (int32)dhd_pub->bcmerror;
  208. bcopy(&int_val, arg, val_size);
  209. break;
  210. case IOV_GVAL(IOV_WDTICK):
  211. int_val = (int32)dhd_watchdog_ms;
  212. bcopy(&int_val, arg, val_size);
  213. break;
  214. case IOV_SVAL(IOV_WDTICK):
  215. if (!dhd_pub->up) {
  216. bcmerror = BCME_NOTUP;
  217. break;
  218. }
  219. dhd_os_wd_timer(dhd_pub, (uint)int_val);
  220. break;
  221. case IOV_GVAL(IOV_DUMP):
  222. bcmerror = dhd_dump(dhd_pub, arg, len);
  223. break;
  224. #ifdef DHD_DEBUG
  225. case IOV_GVAL(IOV_DCONSOLE_POLL):
  226. int_val = (int32)dhd_console_ms;
  227. bcopy(&int_val, arg, val_size);
  228. break;
  229. case IOV_SVAL(IOV_DCONSOLE_POLL):
  230. dhd_console_ms = (uint)int_val;
  231. break;
  232. case IOV_SVAL(IOV_CONS):
  233. if (len > 0)
  234. bcmerror = dhd_bus_console_in(dhd_pub, arg, len - 1);
  235. break;
  236. #endif
  237. case IOV_SVAL(IOV_CLEARCOUNTS):
  238. dhd_pub->tx_packets = dhd_pub->rx_packets = 0;
  239. dhd_pub->tx_errors = dhd_pub->rx_errors = 0;
  240. dhd_pub->tx_ctlpkts = dhd_pub->rx_ctlpkts = 0;
  241. dhd_pub->tx_ctlerrs = dhd_pub->rx_ctlerrs = 0;
  242. dhd_pub->rx_dropped = 0;
  243. dhd_pub->rx_readahead_cnt = 0;
  244. dhd_pub->tx_realloc = 0;
  245. dhd_pub->wd_dpc_sched = 0;
  246. memset(&dhd_pub->dstats, 0, sizeof(dhd_pub->dstats));
  247. dhd_bus_clearcounts(dhd_pub);
  248. break;
  249. case IOV_GVAL(IOV_IOCTLTIMEOUT): {
  250. int_val = (int32)dhd_os_get_ioctl_resp_timeout();
  251. bcopy(&int_val, arg, sizeof(int_val));
  252. break;
  253. }
  254. case IOV_SVAL(IOV_IOCTLTIMEOUT): {
  255. if (int_val <= 0)
  256. bcmerror = BCME_BADARG;
  257. else
  258. dhd_os_set_ioctl_resp_timeout((unsigned int)int_val);
  259. break;
  260. }
  261. default:
  262. bcmerror = BCME_UNSUPPORTED;
  263. break;
  264. }
  265. exit:
  266. return bcmerror;
  267. }
  268. /* Store the status of a connection attempt for later retrieval by an iovar */
  269. void
  270. dhd_store_conn_status(uint32 event, uint32 status, uint32 reason)
  271. {
  272. /* Do not overwrite a WLC_E_PRUNE with a WLC_E_SET_SSID
  273. * because an encryption/rsn mismatch results in both events, and
  274. * the important information is in the WLC_E_PRUNE.
  275. */
  276. if (!(event == WLC_E_SET_SSID && status == WLC_E_STATUS_FAIL &&
  277. dhd_conn_event == WLC_E_PRUNE)) {
  278. dhd_conn_event = event;
  279. dhd_conn_status = status;
  280. dhd_conn_reason = reason;
  281. }
  282. }
  283. bool
  284. dhd_prec_enq(dhd_pub_t *dhdp, struct pktq *q, void *pkt, int prec)
  285. {
  286. void *p;
  287. int eprec = -1; /* precedence to evict from */
  288. bool discard_oldest;
  289. /* Fast case, precedence queue is not full and we are also not
  290. * exceeding total queue length
  291. */
  292. if (!pktq_pfull(q, prec) && !pktq_full(q)) {
  293. pktq_penq(q, prec, pkt);
  294. return TRUE;
  295. }
  296. /* Determine precedence from which to evict packet, if any */
  297. if (pktq_pfull(q, prec))
  298. eprec = prec;
  299. else if (pktq_full(q)) {
  300. p = pktq_peek_tail(q, &eprec);
  301. ASSERT(p);
  302. if (eprec > prec)
  303. return FALSE;
  304. }
  305. /* Evict if needed */
  306. if (eprec >= 0) {
  307. /* Detect queueing to unconfigured precedence */
  308. ASSERT(!pktq_pempty(q, eprec));
  309. discard_oldest = AC_BITMAP_TST(dhdp->wme_dp, eprec);
  310. if (eprec == prec && !discard_oldest)
  311. return FALSE; /* refuse newer (incoming) packet */
  312. /* Evict packet according to discard policy */
  313. p = discard_oldest ? pktq_pdeq(q, eprec) : pktq_pdeq_tail(q, eprec);
  314. if (p == NULL) {
  315. DHD_ERROR(("%s: pktq_penq() failed, oldest %d.",
  316. __FUNCTION__, discard_oldest));
  317. ASSERT(p);
  318. }
  319. PKTFREE(dhdp->osh, p, TRUE);
  320. }
  321. /* Enqueue */
  322. p = pktq_penq(q, prec, pkt);
  323. if (p == NULL) {
  324. DHD_ERROR(("%s: pktq_penq() failed.", __FUNCTION__));
  325. ASSERT(p);
  326. }
  327. return TRUE;
  328. }
  329. static int
  330. dhd_iovar_op(dhd_pub_t *dhd_pub, const char *name,
  331. void *params, int plen, void *arg, int len, bool set)
  332. {
  333. int bcmerror = 0;
  334. int val_size;
  335. const bcm_iovar_t *vi = NULL;
  336. uint32 actionid;
  337. DHD_TRACE(("%s: Enter\n", __FUNCTION__));
  338. ASSERT(name);
  339. ASSERT(len >= 0);
  340. /* Get MUST have return space */
  341. ASSERT(set || (arg && len));
  342. /* Set does NOT take qualifiers */
  343. ASSERT(!set || (!params && !plen));
  344. if ((vi = bcm_iovar_lookup(dhd_iovars, name)) == NULL) {
  345. bcmerror = BCME_UNSUPPORTED;
  346. goto exit;
  347. }
  348. DHD_CTL(("%s: %s %s, len %d plen %d\n", __FUNCTION__,
  349. name, (set ? "set" : "get"), len, plen));
  350. /* set up 'params' pointer in case this is a set command so that
  351. * the convenience int and bool code can be common to set and get
  352. */
  353. if (params == NULL) {
  354. params = arg;
  355. plen = len;
  356. }
  357. if (vi->type == IOVT_VOID)
  358. val_size = 0;
  359. else if (vi->type == IOVT_BUFFER)
  360. val_size = len;
  361. else
  362. /* all other types are integer sized */
  363. val_size = sizeof(int);
  364. actionid = set ? IOV_SVAL(vi->varid) : IOV_GVAL(vi->varid);
  365. bcmerror = dhd_doiovar(dhd_pub, vi, actionid, name, params, plen, arg, len, val_size);
  366. exit:
  367. return bcmerror;
  368. }
  369. int
  370. dhd_ioctl(dhd_pub_t *dhd_pub, dhd_ioctl_t *ioc, void *buf, uint buflen)
  371. {
  372. int bcmerror = 0;
  373. DHD_TRACE(("%s: Enter\n", __FUNCTION__));
  374. if (!buf) return BCME_BADARG;
  375. switch (ioc->cmd) {
  376. case DHD_GET_MAGIC:
  377. if (buflen < sizeof(int))
  378. bcmerror = BCME_BUFTOOSHORT;
  379. else
  380. *(int*)buf = DHD_IOCTL_MAGIC;
  381. break;
  382. case DHD_GET_VERSION:
  383. if (buflen < sizeof(int))
  384. bcmerror = -BCME_BUFTOOSHORT;
  385. else
  386. *(int*)buf = DHD_IOCTL_VERSION;
  387. break;
  388. case DHD_GET_VAR:
  389. case DHD_SET_VAR: {
  390. char *arg;
  391. uint arglen;
  392. /* scan past the name to any arguments */
  393. for (arg = buf, arglen = buflen; *arg && arglen; arg++, arglen--);
  394. if (*arg) {
  395. bcmerror = BCME_BUFTOOSHORT;
  396. break;
  397. }
  398. /* account for the NUL terminator */
  399. arg++, arglen--;
  400. /* call with the appropriate arguments */
  401. if (ioc->cmd == DHD_GET_VAR)
  402. bcmerror = dhd_iovar_op(dhd_pub, buf, arg, arglen,
  403. buf, buflen, IOV_GET);
  404. else
  405. bcmerror = dhd_iovar_op(dhd_pub, buf, NULL, 0, arg, arglen, IOV_SET);
  406. if (bcmerror != BCME_UNSUPPORTED)
  407. break;
  408. /* not in generic table, try protocol module */
  409. if (ioc->cmd == DHD_GET_VAR)
  410. bcmerror = dhd_prot_iovar_op(dhd_pub, buf, arg,
  411. arglen, buf, buflen, IOV_GET);
  412. else
  413. bcmerror = dhd_prot_iovar_op(dhd_pub, buf,
  414. NULL, 0, arg, arglen, IOV_SET);
  415. if (bcmerror != BCME_UNSUPPORTED)
  416. break;
  417. /* if still not found, try bus module */
  418. if (ioc->cmd == DHD_GET_VAR)
  419. bcmerror = dhd_bus_iovar_op(dhd_pub, buf,
  420. arg, arglen, buf, buflen, IOV_GET);
  421. else
  422. bcmerror = dhd_bus_iovar_op(dhd_pub, buf,
  423. NULL, 0, arg, arglen, IOV_SET);
  424. break;
  425. }
  426. default:
  427. bcmerror = BCME_UNSUPPORTED;
  428. }
  429. return bcmerror;
  430. }
  431. #ifdef APSTA_PINGTEST
  432. struct ether_addr guest_eas[MAX_GUEST];
  433. #endif
  434. #ifdef SHOW_EVENTS
  435. static void
  436. wl_show_host_event(wl_event_msg_t *event, void *event_data)
  437. {
  438. uint i, status, reason;
  439. bool group = FALSE, flush_txq = FALSE, link = FALSE;
  440. char *auth_str, *event_name;
  441. uchar *buf;
  442. char err_msg[256], eabuf[ETHER_ADDR_STR_LEN];
  443. static struct {uint event; char *event_name;} event_names[] = {
  444. {WLC_E_SET_SSID, "SET_SSID"},
  445. {WLC_E_JOIN, "JOIN"},
  446. {WLC_E_START, "START"},
  447. {WLC_E_AUTH, "AUTH"},
  448. {WLC_E_AUTH_IND, "AUTH_IND"},
  449. {WLC_E_DEAUTH, "DEAUTH"},
  450. {WLC_E_DEAUTH_IND, "DEAUTH_IND"},
  451. {WLC_E_ASSOC, "ASSOC"},
  452. {WLC_E_ASSOC_IND, "ASSOC_IND"},
  453. {WLC_E_REASSOC, "REASSOC"},
  454. {WLC_E_REASSOC_IND, "REASSOC_IND"},
  455. {WLC_E_DISASSOC, "DISASSOC"},
  456. {WLC_E_DISASSOC_IND, "DISASSOC_IND"},
  457. {WLC_E_QUIET_START, "START_QUIET"},
  458. {WLC_E_QUIET_END, "END_QUIET"},
  459. {WLC_E_BEACON_RX, "BEACON_RX"},
  460. {WLC_E_LINK, "LINK"},
  461. {WLC_E_MIC_ERROR, "MIC_ERROR"},
  462. {WLC_E_NDIS_LINK, "NDIS_LINK"},
  463. {WLC_E_ROAM, "ROAM"},
  464. {WLC_E_TXFAIL, "TXFAIL"},
  465. {WLC_E_PMKID_CACHE, "PMKID_CACHE"},
  466. {WLC_E_RETROGRADE_TSF, "RETROGRADE_TSF"},
  467. {WLC_E_PRUNE, "PRUNE"},
  468. {WLC_E_AUTOAUTH, "AUTOAUTH"},
  469. {WLC_E_EAPOL_MSG, "EAPOL_MSG"},
  470. {WLC_E_SCAN_COMPLETE, "SCAN_COMPLETE"},
  471. {WLC_E_ADDTS_IND, "ADDTS_IND"},
  472. {WLC_E_DELTS_IND, "DELTS_IND"},
  473. {WLC_E_BCNSENT_IND, "BCNSENT_IND"},
  474. {WLC_E_BCNRX_MSG, "BCNRX_MSG"},
  475. {WLC_E_BCNLOST_MSG, "BCNLOST_MSG"},
  476. {WLC_E_ROAM_PREP, "ROAM_PREP"},
  477. {WLC_E_PFN_NET_FOUND, "PNO_NET_FOUND"},
  478. {WLC_E_PFN_NET_LOST, "PNO_NET_LOST"},
  479. {WLC_E_RESET_COMPLETE, "RESET_COMPLETE"},
  480. {WLC_E_JOIN_START, "JOIN_START"},
  481. {WLC_E_ROAM_START, "ROAM_START"},
  482. {WLC_E_ASSOC_START, "ASSOC_START"},
  483. {WLC_E_IBSS_ASSOC, "IBSS_ASSOC"},
  484. {WLC_E_RADIO, "RADIO"},
  485. {WLC_E_PSM_WATCHDOG, "PSM_WATCHDOG"},
  486. {WLC_E_PROBREQ_MSG, "PROBREQ_MSG"},
  487. {WLC_E_SCAN_CONFIRM_IND, "SCAN_CONFIRM_IND"},
  488. {WLC_E_PSK_SUP, "PSK_SUP"},
  489. {WLC_E_COUNTRY_CODE_CHANGED, "COUNTRY_CODE_CHANGED"},
  490. {WLC_E_EXCEEDED_MEDIUM_TIME, "EXCEEDED_MEDIUM_TIME"},
  491. {WLC_E_ICV_ERROR, "ICV_ERROR"},
  492. {WLC_E_UNICAST_DECODE_ERROR, "UNICAST_DECODE_ERROR"},
  493. {WLC_E_MULTICAST_DECODE_ERROR, "MULTICAST_DECODE_ERROR"},
  494. {WLC_E_TRACE, "TRACE"},
  495. {WLC_E_ACTION_FRAME, "ACTION FRAME"},
  496. {WLC_E_ACTION_FRAME_COMPLETE, "ACTION FRAME TX COMPLETE"},
  497. {WLC_E_IF, "IF"},
  498. {WLC_E_RSSI, "RSSI"},
  499. {WLC_E_PFN_SCAN_COMPLETE, "SCAN_COMPLETE"}
  500. };
  501. uint event_type, flags, auth_type, datalen;
  502. event_type = ntoh32(event->event_type);
  503. flags = ntoh16(event->flags);
  504. status = ntoh32(event->status);
  505. reason = ntoh32(event->reason);
  506. auth_type = ntoh32(event->auth_type);
  507. datalen = ntoh32(event->datalen);
  508. /* debug dump of event messages */
  509. sprintf(eabuf, "%02x:%02x:%02x:%02x:%02x:%02x",
  510. (uchar)event->addr.octet[0]&0xff,
  511. (uchar)event->addr.octet[1]&0xff,
  512. (uchar)event->addr.octet[2]&0xff,
  513. (uchar)event->addr.octet[3]&0xff,
  514. (uchar)event->addr.octet[4]&0xff,
  515. (uchar)event->addr.octet[5]&0xff);
  516. event_name = "UNKNOWN";
  517. for (i = 0; i < ARRAYSIZE(event_names); i++) {
  518. if (event_names[i].event == event_type)
  519. event_name = event_names[i].event_name;
  520. }
  521. DHD_EVENT(("EVENT: %s, event ID = %d\n", event_name, event_type));
  522. if (flags & WLC_EVENT_MSG_LINK)
  523. link = TRUE;
  524. if (flags & WLC_EVENT_MSG_GROUP)
  525. group = TRUE;
  526. if (flags & WLC_EVENT_MSG_FLUSHTXQ)
  527. flush_txq = TRUE;
  528. switch (event_type) {
  529. case WLC_E_START:
  530. case WLC_E_DEAUTH:
  531. case WLC_E_DISASSOC:
  532. DHD_EVENT(("MACEVENT: %s, MAC %s\n", event_name, eabuf));
  533. break;
  534. case WLC_E_ASSOC_IND:
  535. case WLC_E_REASSOC_IND:
  536. #ifdef APSTA_PINGTEST
  537. {
  538. int i;
  539. for (i = 0; i < MAX_GUEST; ++i)
  540. if (ETHER_ISNULLADDR(&guest_eas[i]))
  541. break;
  542. if (i < MAX_GUEST)
  543. bcopy(event->addr.octet, guest_eas[i].octet, ETHER_ADDR_LEN);
  544. }
  545. #endif /* APSTA_PINGTEST */
  546. DHD_EVENT(("MACEVENT: %s, MAC %s\n", event_name, eabuf));
  547. break;
  548. case WLC_E_ASSOC:
  549. case WLC_E_REASSOC:
  550. if (status == WLC_E_STATUS_SUCCESS) {
  551. DHD_EVENT(("MACEVENT: %s, MAC %s, SUCCESS\n", event_name, eabuf));
  552. } else if (status == WLC_E_STATUS_TIMEOUT) {
  553. DHD_EVENT(("MACEVENT: %s, MAC %s, TIMEOUT\n", event_name, eabuf));
  554. } else if (status == WLC_E_STATUS_FAIL) {
  555. DHD_EVENT(("MACEVENT: %s, MAC %s, FAILURE, reason %d\n",
  556. event_name, eabuf, (int)reason));
  557. } else {
  558. DHD_EVENT(("MACEVENT: %s, MAC %s, unexpected status %d\n",
  559. event_name, eabuf, (int)status));
  560. }
  561. break;
  562. case WLC_E_DEAUTH_IND:
  563. case WLC_E_DISASSOC_IND:
  564. #ifdef APSTA_PINGTEST
  565. {
  566. int i;
  567. for (i = 0; i < MAX_GUEST; ++i) {
  568. if (bcmp(guest_eas[i].octet, event->addr.octet,
  569. ETHER_ADDR_LEN) == 0) {
  570. bzero(guest_eas[i].octet, ETHER_ADDR_LEN);
  571. break;
  572. }
  573. }
  574. }
  575. #endif /* APSTA_PINGTEST */
  576. DHD_EVENT(("MACEVENT: %s, MAC %s, reason %d\n", event_name, eabuf, (int)reason));
  577. break;
  578. case WLC_E_AUTH:
  579. case WLC_E_AUTH_IND:
  580. if (auth_type == DOT11_OPEN_SYSTEM)
  581. auth_str = "Open System";
  582. else if (auth_type == DOT11_SHARED_KEY)
  583. auth_str = "Shared Key";
  584. else {
  585. sprintf(err_msg, "AUTH unknown: %d", (int)auth_type);
  586. auth_str = err_msg;
  587. }
  588. if (event_type == WLC_E_AUTH_IND) {
  589. DHD_EVENT(("MACEVENT: %s, MAC %s, %s\n", event_name, eabuf, auth_str));
  590. } else if (status == WLC_E_STATUS_SUCCESS) {
  591. DHD_EVENT(("MACEVENT: %s, MAC %s, %s, SUCCESS\n",
  592. event_name, eabuf, auth_str));
  593. } else if (status == WLC_E_STATUS_TIMEOUT) {
  594. DHD_EVENT(("MACEVENT: %s, MAC %s, %s, TIMEOUT\n",
  595. event_name, eabuf, auth_str));
  596. } else if (status == WLC_E_STATUS_FAIL) {
  597. DHD_EVENT(("MACEVENT: %s, MAC %s, %s, FAILURE, reason %d\n",
  598. event_name, eabuf, auth_str, (int)reason));
  599. }
  600. break;
  601. case WLC_E_JOIN:
  602. case WLC_E_ROAM:
  603. case WLC_E_SET_SSID:
  604. if (status == WLC_E_STATUS_SUCCESS) {
  605. DHD_EVENT(("MACEVENT: %s, MAC %s\n", event_name, eabuf));
  606. } else if (status == WLC_E_STATUS_FAIL) {
  607. DHD_EVENT(("MACEVENT: %s, failed\n", event_name));
  608. } else if (status == WLC_E_STATUS_NO_NETWORKS) {
  609. DHD_EVENT(("MACEVENT: %s, no networks found\n", event_name));
  610. } else {
  611. DHD_EVENT(("MACEVENT: %s, unexpected status %d\n",
  612. event_name, (int)status));
  613. }
  614. break;
  615. case WLC_E_BEACON_RX:
  616. if (status == WLC_E_STATUS_SUCCESS) {
  617. DHD_EVENT(("MACEVENT: %s, SUCCESS\n", event_name));
  618. } else if (status == WLC_E_STATUS_FAIL) {
  619. DHD_EVENT(("MACEVENT: %s, FAIL\n", event_name));
  620. } else {
  621. DHD_EVENT(("MACEVENT: %s, status %d\n", event_name, status));
  622. }
  623. break;
  624. case WLC_E_LINK:
  625. DHD_EVENT(("MACEVENT: %s %s\n", event_name, link?"UP":"DOWN"));
  626. break;
  627. case WLC_E_MIC_ERROR:
  628. DHD_EVENT(("MACEVENT: %s, MAC %s, Group %d, Flush %d\n",
  629. event_name, eabuf, group, flush_txq));
  630. break;
  631. case WLC_E_ICV_ERROR:
  632. case WLC_E_UNICAST_DECODE_ERROR:
  633. case WLC_E_MULTICAST_DECODE_ERROR:
  634. DHD_EVENT(("MACEVENT: %s, MAC %s\n",
  635. event_name, eabuf));
  636. break;
  637. case WLC_E_TXFAIL:
  638. DHD_EVENT(("MACEVENT: %s, RA %s\n", event_name, eabuf));
  639. break;
  640. case WLC_E_SCAN_COMPLETE:
  641. case WLC_E_PMKID_CACHE:
  642. DHD_EVENT(("MACEVENT: %s\n", event_name));
  643. break;
  644. case WLC_E_PFN_NET_FOUND:
  645. case WLC_E_PFN_NET_LOST:
  646. case WLC_E_PFN_SCAN_COMPLETE:
  647. DHD_EVENT(("PNOEVENT: %s\n", event_name));
  648. break;
  649. case WLC_E_PSK_SUP:
  650. case WLC_E_PRUNE:
  651. DHD_EVENT(("MACEVENT: %s, status %d, reason %d\n",
  652. event_name, (int)status, (int)reason));
  653. break;
  654. case WLC_E_TRACE:
  655. {
  656. static uint32 seqnum_prev = 0;
  657. msgtrace_hdr_t hdr;
  658. uint32 nblost;
  659. char *s, *p;
  660. buf = (uchar *) event_data;
  661. memcpy(&hdr, buf, MSGTRACE_HDRLEN);
  662. if (hdr.version != MSGTRACE_VERSION) {
  663. printf("\nMACEVENT: %s [unsupported version --> "
  664. "dhd version:%d dongle version:%d]\n",
  665. event_name, MSGTRACE_VERSION, hdr.version);
  666. /* Reset datalen to avoid display below */
  667. datalen = 0;
  668. break;
  669. }
  670. /* There are 2 bytes available at the end of data */
  671. buf[MSGTRACE_HDRLEN + ntoh16(hdr.len)] = '\0';
  672. if (ntoh32(hdr.discarded_bytes) || ntoh32(hdr.discarded_printf)) {
  673. printf("\nWLC_E_TRACE: [Discarded traces in dongle -->"
  674. "discarded_bytes %d discarded_printf %d]\n",
  675. ntoh32(hdr.discarded_bytes), ntoh32(hdr.discarded_printf));
  676. }
  677. nblost = ntoh32(hdr.seqnum) - seqnum_prev - 1;
  678. if (nblost > 0) {
  679. printf("\nWLC_E_TRACE: [Event lost --> seqnum %d nblost %d\n",
  680. ntoh32(hdr.seqnum), nblost);
  681. }
  682. seqnum_prev = ntoh32(hdr.seqnum);
  683. /* Display the trace buffer. Advance from \n to \n to avoid display big
  684. * printf (issue with Linux printk )
  685. */
  686. p = (char *)&buf[MSGTRACE_HDRLEN];
  687. while ((s = strstr(p, "\n")) != NULL) {
  688. *s = '\0';
  689. printf("%s\n", p);
  690. p = s + 1;
  691. }
  692. printf("%s\n", p);
  693. /* Reset datalen to avoid display below */
  694. datalen = 0;
  695. }
  696. break;
  697. case WLC_E_RSSI:
  698. DHD_EVENT(("MACEVENT: %s %d\n", event_name, ntoh32(*((int *)event_data))));
  699. break;
  700. default:
  701. DHD_EVENT(("MACEVENT: %s %d, MAC %s, status %d, reason %d, auth %d\n",
  702. event_name, event_type, eabuf, (int)status, (int)reason,
  703. (int)auth_type));
  704. break;
  705. }
  706. /* show any appended data */
  707. if (datalen) {
  708. buf = (uchar *) event_data;
  709. DHD_EVENT((" data (%d) : ", datalen));
  710. for (i = 0; i < datalen; i++)
  711. DHD_EVENT((" 0x%02x ", *buf++));
  712. DHD_EVENT(("\n"));
  713. }
  714. }
  715. #endif /* SHOW_EVENTS */
  716. int
  717. wl_host_event(struct dhd_info *dhd, int *ifidx, void *pktdata,
  718. wl_event_msg_t *event, void **data_ptr)
  719. {
  720. /* check whether packet is a BRCM event pkt */
  721. bcm_event_t *pvt_data = (bcm_event_t *)pktdata;
  722. char *event_data;
  723. uint32 type, status;
  724. uint16 flags;
  725. int evlen;
  726. if (bcmp(BRCM_OUI, &pvt_data->bcm_hdr.oui[0], DOT11_OUI_LEN)) {
  727. DHD_ERROR(("%s: mismatched OUI, bailing\n", __FUNCTION__));
  728. return (BCME_ERROR);
  729. }
  730. /* BRCM event pkt may be unaligned - use xxx_ua to load user_subtype. */
  731. if (ntoh16_ua((void *)&pvt_data->bcm_hdr.usr_subtype) != BCMILCP_BCM_SUBTYPE_EVENT) {
  732. DHD_ERROR(("%s: mismatched subtype, bailing\n", __FUNCTION__));
  733. return (BCME_ERROR);
  734. }
  735. *data_ptr = &pvt_data[1];
  736. event_data = *data_ptr;
  737. /* memcpy since BRCM event pkt may be unaligned. */
  738. memcpy(event, &pvt_data->event, sizeof(wl_event_msg_t));
  739. type = ntoh32_ua((void *)&event->event_type);
  740. flags = ntoh16_ua((void *)&event->flags);
  741. status = ntoh32_ua((void *)&event->status);
  742. evlen = ntoh32_ua((void *)&event->datalen) + sizeof(bcm_event_t);
  743. switch (type) {
  744. case WLC_E_IF:
  745. {
  746. dhd_if_event_t *ifevent = (dhd_if_event_t *)event_data;
  747. DHD_TRACE(("%s: if event\n", __FUNCTION__));
  748. if (ifevent->ifidx > 0 && ifevent->ifidx < DHD_MAX_IFS)
  749. {
  750. if (ifevent->action == WLC_E_IF_ADD)
  751. dhd_add_if(dhd, ifevent->ifidx,
  752. NULL, event->ifname,
  753. pvt_data->eth.ether_dhost,
  754. ifevent->flags, ifevent->bssidx);
  755. else
  756. dhd_del_if(dhd, ifevent->ifidx);
  757. } else {
  758. DHD_ERROR(("%s: Invalid ifidx %d for %s\n",
  759. __FUNCTION__, ifevent->ifidx, event->ifname));
  760. }
  761. }
  762. /* send up the if event: btamp user needs it */
  763. *ifidx = dhd_ifname2idx(dhd, event->ifname);
  764. /* push up to external supp/auth */
  765. dhd_event(dhd, (char *)pvt_data, evlen, *ifidx);
  766. break;
  767. #ifdef P2P
  768. case WLC_E_NDIS_LINK:
  769. break;
  770. #endif
  771. /* fall through */
  772. /* These are what external supplicant/authenticator wants */
  773. case WLC_E_LINK:
  774. case WLC_E_ASSOC_IND:
  775. case WLC_E_REASSOC_IND:
  776. case WLC_E_DISASSOC_IND:
  777. case WLC_E_MIC_ERROR:
  778. default:
  779. /* Fall through: this should get _everything_ */
  780. *ifidx = dhd_ifname2idx(dhd, event->ifname);
  781. /* push up to external supp/auth */
  782. dhd_event(dhd, (char *)pvt_data, evlen, *ifidx);
  783. DHD_TRACE(("%s: MAC event %d, flags %x, status %x\n",
  784. __FUNCTION__, type, flags, status));
  785. /* put it back to WLC_E_NDIS_LINK */
  786. if (type == WLC_E_NDIS_LINK) {
  787. uint32 temp;
  788. temp = ntoh32_ua((void *)&event->event_type);
  789. DHD_TRACE(("Converted to WLC_E_LINK type %d\n", temp));
  790. temp = ntoh32(WLC_E_NDIS_LINK);
  791. memcpy((void *)(&pvt_data->event.event_type), &temp,
  792. sizeof(pvt_data->event.event_type));
  793. }
  794. break;
  795. }
  796. #ifdef SHOW_EVENTS
  797. wl_show_host_event(event, event_data);
  798. #endif /* SHOW_EVENTS */
  799. return (BCME_OK);
  800. }
  801. void
  802. wl_event_to_host_order(wl_event_msg_t *evt)
  803. {
  804. /* Event struct members passed from dongle to host are stored in network
  805. * byte order. Convert all members to host-order.
  806. */
  807. evt->event_type = ntoh32(evt->event_type);
  808. evt->flags = ntoh16(evt->flags);
  809. evt->status = ntoh32(evt->status);
  810. evt->reason = ntoh32(evt->reason);
  811. evt->auth_type = ntoh32(evt->auth_type);
  812. evt->datalen = ntoh32(evt->datalen);
  813. evt->version = ntoh16(evt->version);
  814. }
  815. void print_buf(void *pbuf, int len, int bytes_per_line)
  816. {
  817. int i, j = 0;
  818. unsigned char *buf = pbuf;
  819. if (bytes_per_line == 0) {
  820. bytes_per_line = len;
  821. }
  822. for (i = 0; i < len; i++) {
  823. printf("%2.2x", *buf++);
  824. j++;
  825. if (j == bytes_per_line) {
  826. printf("\n");
  827. j = 0;
  828. } else {
  829. printf(":");
  830. }
  831. }
  832. printf("\n");
  833. }
  834. #define strtoul(nptr, endptr, base) bcm_strtoul((nptr), (endptr), (base))
  835. /* Convert user's input in hex pattern to byte-size mask */
  836. static int
  837. wl_pattern_atoh(char *src, char *dst)
  838. {
  839. int i;
  840. if (strncmp(src, "0x", 2) != 0 &&
  841. strncmp(src, "0X", 2) != 0) {
  842. DHD_ERROR(("Mask invalid format. Needs to start with 0x\n"));
  843. return -1;
  844. }
  845. src = src + 2; /* Skip past 0x */
  846. if (strlen(src) % 2 != 0) {
  847. DHD_ERROR(("Mask invalid format. Needs to be of even length\n"));
  848. return -1;
  849. }
  850. for (i = 0; *src != '\0'; i++) {
  851. char num[3];
  852. strncpy(num, src, 2);
  853. num[2] = '\0';
  854. dst[i] = (uint8)strtoul(num, NULL, 16);
  855. src += 2;
  856. }
  857. return i;
  858. }
  859. void
  860. dhd_pktfilter_offload_enable(dhd_pub_t * dhd, char *arg, int enable, int master_mode)
  861. {
  862. char *argv[8];
  863. int i = 0;
  864. const char *str;
  865. int buf_len;
  866. int str_len;
  867. char *arg_save = 0, *arg_org = 0;
  868. int rc;
  869. char buf[128];
  870. wl_pkt_filter_enable_t enable_parm;
  871. wl_pkt_filter_enable_t * pkt_filterp;
  872. if (!(arg_save = MALLOC(dhd->osh, strlen(arg) + 1))) {
  873. DHD_ERROR(("%s: kmalloc failed\n", __FUNCTION__));
  874. goto fail;
  875. }
  876. arg_org = arg_save;
  877. memcpy(arg_save, arg, strlen(arg) + 1);
  878. argv[i] = bcmstrtok(&arg_save, " ", 0);
  879. i = 0;
  880. if (NULL == argv[i]) {
  881. DHD_ERROR(("No args provided\n"));
  882. goto fail;
  883. }
  884. str = "pkt_filter_enable";
  885. str_len = strlen(str);
  886. strncpy(buf, str, str_len);
  887. buf[str_len] = '\0';
  888. buf_len = str_len + 1;
  889. pkt_filterp = (wl_pkt_filter_enable_t *)(buf + str_len + 1);
  890. /* Parse packet filter id. */
  891. enable_parm.id = htod32(strtoul(argv[i], NULL, 0));
  892. /* Parse enable/disable value. */
  893. enable_parm.enable = htod32(enable);
  894. buf_len += sizeof(enable_parm);
  895. memcpy((char *)pkt_filterp,
  896. &enable_parm,
  897. sizeof(enable_parm));
  898. /* Enable/disable the specified filter. */
  899. rc = dhdcdc_set_ioctl(dhd, 0, WLC_SET_VAR, buf, buf_len);
  900. rc = rc >= 0 ? 0 : rc;
  901. if (rc)
  902. DHD_TRACE(("%s: failed to add pktfilter %s, retcode = %d\n",
  903. __FUNCTION__, arg, rc));
  904. else
  905. DHD_TRACE(("%s: successfully added pktfilter %s\n",
  906. __FUNCTION__, arg));
  907. /* Contorl the master mode */
  908. bcm_mkiovar("pkt_filter_mode", (char *)&master_mode, 4, buf, sizeof(buf));
  909. rc = dhdcdc_set_ioctl(dhd, 0, WLC_SET_VAR, buf, sizeof(buf));
  910. rc = rc >= 0 ? 0 : rc;
  911. if (rc)
  912. DHD_TRACE(("%s: failed to add pktfilter %s, retcode = %d\n",
  913. __FUNCTION__, arg, rc));
  914. fail:
  915. if (arg_org)
  916. MFREE(dhd->osh, arg_org, strlen(arg) + 1);
  917. }
  918. void
  919. dhd_pktfilter_offload_set(dhd_pub_t * dhd, char *arg)
  920. {
  921. const char *str;
  922. wl_pkt_filter_t pkt_filter;
  923. wl_pkt_filter_t *pkt_filterp;
  924. int buf_len;
  925. int str_len;
  926. int rc;
  927. uint32 mask_size;
  928. uint32 pattern_size;
  929. char *argv[8], * buf = 0;
  930. int i = 0;
  931. char *arg_save = 0, *arg_org = 0;
  932. #define BUF_SIZE 2048
  933. if (!(arg_save = MALLOC(dhd->osh, strlen(arg) + 1))) {
  934. DHD_ERROR(("%s: kmalloc failed\n", __FUNCTION__));
  935. goto fail;
  936. }
  937. arg_org = arg_save;
  938. if (!(buf = MALLOC(dhd->osh, BUF_SIZE))) {
  939. DHD_ERROR(("%s: kmalloc failed\n", __FUNCTION__));
  940. goto fail;
  941. }
  942. memcpy(arg_save, arg, strlen(arg) + 1);
  943. if (strlen(arg) > BUF_SIZE) {
  944. DHD_ERROR(("Not enough buffer %d < %d\n", (int)strlen(arg), (int)sizeof(buf)));
  945. goto fail;
  946. }
  947. argv[i] = bcmstrtok(&arg_save, " ", 0);
  948. while (argv[i++])
  949. argv[i] = bcmstrtok(&arg_save, " ", 0);
  950. i = 0;
  951. if (NULL == argv[i]) {
  952. DHD_ERROR(("No args provided\n"));
  953. goto fail;
  954. }
  955. str = "pkt_filter_add";
  956. str_len = strlen(str);
  957. strncpy(buf, str, str_len);
  958. buf[ str_len ] = '\0';
  959. buf_len = str_len + 1;
  960. pkt_filterp = (wl_pkt_filter_t *) (buf + str_len + 1);
  961. /* Parse packet filter id. */
  962. pkt_filter.id = htod32(strtoul(argv[i], NULL, 0));
  963. if (NULL == argv[++i]) {
  964. DHD_ERROR(("Polarity not provided\n"));
  965. goto fail;
  966. }
  967. /* Parse filter polarity. */
  968. pkt_filter.negate_match = htod32(strtoul(argv[i], NULL, 0));
  969. if (NULL == argv[++i]) {
  970. DHD_ERROR(("Filter type not provided\n"));
  971. goto fail;
  972. }
  973. /* Parse filter type. */
  974. pkt_filter.type = htod32(strtoul(argv[i], NULL, 0));
  975. if (NULL == argv[++i]) {
  976. DHD_ERROR(("Offset not provided\n"));
  977. goto fail;
  978. }
  979. /* Parse pattern filter offset. */
  980. pkt_filter.u.pattern.offset = htod32(strtoul(argv[i], NULL, 0));
  981. if (NULL == argv[++i]) {
  982. DHD_ERROR(("Bitmask not provided\n"));
  983. goto fail;
  984. }
  985. /* Parse pattern filter mask. */
  986. mask_size =
  987. htod32(wl_pattern_atoh(argv[i], (char *) pkt_filterp->u.pattern.mask_and_pattern));
  988. if (NULL == argv[++i]) {
  989. DHD_ERROR(("Pattern not provided\n"));
  990. goto fail;
  991. }
  992. /* Parse pattern filter pattern. */
  993. pattern_size =
  994. htod32(wl_pattern_atoh(argv[i],
  995. (char *) &pkt_filterp->u.pattern.mask_and_pattern[mask_size]));
  996. if (mask_size != pattern_size) {
  997. DHD_ERROR(("Mask and pattern not the same size\n"));
  998. goto fail;
  999. }
  1000. pkt_filter.u.pattern.size_bytes = mask_size;
  1001. buf_len += WL_PKT_FILTER_FIXED_LEN;
  1002. buf_len += (WL_PKT_FILTER_PATTERN_FIXED_LEN + 2 * mask_size);
  1003. /* Keep-alive attributes are set in local variable (keep_alive_pkt), and
  1004. ** then memcpy'ed into buffer (keep_alive_pktp) since there is no
  1005. ** guarantee that the buffer is properly aligned.
  1006. */
  1007. memcpy((char *)pkt_filterp,
  1008. &pkt_filter,
  1009. WL_PKT_FILTER_FIXED_LEN + WL_PKT_FILTER_PATTERN_FIXED_LEN);
  1010. rc = dhdcdc_set_ioctl(dhd, 0, WLC_SET_VAR, buf, buf_len);
  1011. rc = rc >= 0 ? 0 : rc;
  1012. if (rc)
  1013. DHD_TRACE(("%s: failed to add pktfilter %s, retcode = %d\n",
  1014. __FUNCTION__, arg, rc));
  1015. else
  1016. DHD_TRACE(("%s: successfully added pktfilter %s\n",
  1017. __FUNCTION__, arg));
  1018. fail:
  1019. if (arg_org)
  1020. MFREE(dhd->osh, arg_org, strlen(arg) + 1);
  1021. if (buf)
  1022. MFREE(dhd->osh, buf, BUF_SIZE);
  1023. }
  1024. void
  1025. dhd_arp_offload_set(dhd_pub_t * dhd, int arp_mode)
  1026. {
  1027. char iovbuf[32];
  1028. int retcode;
  1029. bcm_mkiovar("arp_ol", (char *)&arp_mode, 4, iovbuf, sizeof(iovbuf));
  1030. retcode = dhdcdc_set_ioctl(dhd, 0, WLC_SET_VAR, iovbuf, sizeof(iovbuf));
  1031. retcode = retcode >= 0 ? 0 : retcode;
  1032. if (retcode)
  1033. DHD_TRACE(("%s: failed to set ARP offload mode to 0x%x, retcode = %d\n",
  1034. __FUNCTION__, arp_mode, retcode));
  1035. else
  1036. DHD_TRACE(("%s: successfully set ARP offload mode to 0x%x\n",
  1037. __FUNCTION__, arp_mode));
  1038. }
  1039. void
  1040. dhd_arp_offload_enable(dhd_pub_t * dhd, int arp_enable)
  1041. {
  1042. char iovbuf[32];
  1043. int retcode;
  1044. bcm_mkiovar("arpoe", (char *)&arp_enable, 4, iovbuf, sizeof(iovbuf));
  1045. retcode = dhdcdc_set_ioctl(dhd, 0, WLC_SET_VAR, iovbuf, sizeof(iovbuf));
  1046. retcode = retcode >= 0 ? 0 : retcode;
  1047. if (retcode)
  1048. DHD_TRACE(("%s: failed to enabe ARP offload to %d, retcode = %d\n",
  1049. __FUNCTION__, arp_enable, retcode));
  1050. else
  1051. DHD_TRACE(("%s: successfully enabed ARP offload to %d\n",
  1052. __FUNCTION__, arp_enable));
  1053. }
  1054. int
  1055. dhd_preinit_ioctls(dhd_pub_t *dhd)
  1056. {
  1057. char iovbuf[WL_EVENTING_MASK_LEN + 12]; /* Room for "event_msgs" + '\0' + bitvec */
  1058. uint up = 0;
  1059. char buf[128], *ptr;
  1060. uint power_mode = PM_FAST;
  1061. uint32 dongle_align = DHD_SDALIGN;
  1062. uint32 glom = 0;
  1063. uint bcn_timeout = 3;
  1064. int scan_assoc_time = 40;
  1065. int scan_unassoc_time = 80;
  1066. #ifdef GET_CUSTOM_MAC_ENABLE
  1067. int ret = 0;
  1068. struct ether_addr ea_addr;
  1069. #endif /* GET_CUSTOM_MAC_ENABLE */
  1070. dhd_os_proto_block(dhd);
  1071. #ifdef GET_CUSTOM_MAC_ENABLE
  1072. /* Read MAC address from external customer place
  1073. ** NOTE that default mac address has to be present in otp or nvram file to bring up
  1074. ** firmware but unique per board mac address maybe provided by customer code
  1075. */
  1076. ret = dhd_custom_get_mac_address(ea_addr.octet);
  1077. if (!ret) {
  1078. bcm_mkiovar("cur_etheraddr", (void *)&ea_addr, ETHER_ADDR_LEN, buf, sizeof(buf));
  1079. ret = dhdcdc_set_ioctl(dhd, 0, WLC_SET_VAR, buf, sizeof(buf));
  1080. if (ret < 0) {
  1081. DHD_ERROR(("%s: can't set MAC address , error=%d\n", __FUNCTION__, ret));
  1082. }
  1083. else
  1084. memcpy(dhd->mac.octet, (void *)&ea_addr, ETHER_ADDR_LEN);
  1085. }
  1086. #endif /* GET_CUSTOM_MAC_ENABLE */
  1087. /* Set Country code */
  1088. if (dhd->country_code[0] != 0) {
  1089. if (dhdcdc_set_ioctl(dhd, 0, WLC_SET_COUNTRY,
  1090. dhd->country_code, sizeof(dhd->country_code)) < 0) {
  1091. DHD_ERROR(("%s: country code setting failed\n", __FUNCTION__));
  1092. }
  1093. }
  1094. /* query for 'ver' to get version info from firmware */
  1095. memset(buf, 0, sizeof(buf));
  1096. ptr = buf;
  1097. bcm_mkiovar("ver", 0, 0, buf, sizeof(buf));
  1098. dhdcdc_query_ioctl(dhd, 0, WLC_GET_VAR, buf, sizeof(buf));
  1099. bcmstrtok(&ptr, "\n", 0);
  1100. /* Print fw version info */
  1101. DHD_ERROR(("Firmware version = %s\n", buf));
  1102. /* Set PowerSave mode */
  1103. dhdcdc_set_ioctl(dhd, 0, WLC_SET_PM, (char *)&power_mode, sizeof(power_mode));
  1104. /* Match Host and Dongle rx alignment */
  1105. bcm_mkiovar("bus:txglomalign", (char *)&dongle_align, 4, iovbuf, sizeof(iovbuf));
  1106. dhdcdc_set_ioctl(dhd, 0, WLC_SET_VAR, iovbuf, sizeof(iovbuf));
  1107. /* disable glom option per default */
  1108. bcm_mkiovar("bus:txglom", (char *)&glom, 4, iovbuf, sizeof(iovbuf));
  1109. dhdcdc_set_ioctl(dhd, 0, WLC_SET_VAR, iovbuf, sizeof(iovbuf));
  1110. /* Setup timeout if Beacons are lost and roam is off to report link down */
  1111. bcm_mkiovar("bcn_timeout", (char *)&bcn_timeout, 4, iovbuf, sizeof(iovbuf));
  1112. dhdcdc_set_ioctl(dhd, 0, WLC_SET_VAR, iovbuf, sizeof(iovbuf));
  1113. /* Enable/Disable build-in roaming to allowed ext supplicant to take of romaing */
  1114. bcm_mkiovar("roam_off", (char *)&dhd_roam, 4, iovbuf, sizeof(iovbuf));
  1115. dhdcdc_set_ioctl(dhd, 0, WLC_SET_VAR, iovbuf, sizeof(iovbuf));
  1116. /* Force STA UP */
  1117. if (dhd_radio_up)
  1118. dhdcdc_set_ioctl(dhd, 0, WLC_UP, (char *)&up, sizeof(up));
  1119. /* Setup event_msgs */
  1120. bcm_mkiovar("event_msgs", dhd->eventmask, WL_EVENTING_MASK_LEN, iovbuf, sizeof(iovbuf));
  1121. dhdcdc_set_ioctl(dhd, 0, WLC_SET_VAR, iovbuf, sizeof(iovbuf));
  1122. dhdcdc_set_ioctl(dhd, 0, WLC_SET_SCAN_CHANNEL_TIME, (char *)&scan_assoc_time,
  1123. sizeof(scan_assoc_time));
  1124. dhdcdc_set_ioctl(dhd, 0, WLC_SET_SCAN_UNASSOC_TIME, (char *)&scan_unassoc_time,
  1125. sizeof(scan_unassoc_time));
  1126. #ifdef ARP_OFFLOAD_SUPPORT
  1127. /* Set and enable ARP offload feature */
  1128. if (dhd_arp_enable)
  1129. dhd_arp_offload_set(dhd, dhd_arp_mode);
  1130. dhd_arp_offload_enable(dhd, dhd_arp_enable);
  1131. #endif /* ARP_OFFLOAD_SUPPORT */
  1132. #ifdef PKT_FILTER_SUPPORT
  1133. {
  1134. int i;
  1135. /* Set up pkt filter */
  1136. if (dhd_pkt_filter_enable) {
  1137. for (i = 0; i < dhd->pktfilter_count; i++) {
  1138. dhd_pktfilter_offload_set(dhd, dhd->pktfilter[i]);
  1139. dhd_pktfilter_offload_enable(dhd, dhd->pktfilter[i],
  1140. dhd_pkt_filter_init, dhd_master_mode);
  1141. }
  1142. }
  1143. }
  1144. #endif /* PKT_FILTER_SUPPORT */
  1145. dhd_os_proto_unblock(dhd);
  1146. return 0;
  1147. }
  1148. #ifdef SIMPLE_ISCAN
  1149. uint iscan_thread_id;
  1150. iscan_buf_t * iscan_chain = 0;
  1151. iscan_buf_t *
  1152. dhd_iscan_allocate_buf(dhd_pub_t *dhd, iscan_buf_t **iscanbuf)
  1153. {
  1154. iscan_buf_t *iscanbuf_alloc = 0;
  1155. iscan_buf_t *iscanbuf_head;
  1156. dhd_iscan_lock();
  1157. iscanbuf_alloc = (iscan_buf_t*)MALLOC(dhd->osh, sizeof(iscan_buf_t));
  1158. if (iscanbuf_alloc == NULL)
  1159. goto fail;
  1160. iscanbuf_alloc->next = NULL;
  1161. iscanbuf_head = *iscanbuf;
  1162. DHD_ISCAN(("%s: addr of allocated node = 0x%X, addr of iscanbuf_head \
  1163. = 0x%X dhd = 0x%X\n", __FUNCTION__, iscanbuf_alloc,
  1164. iscanbuf_head, dhd));
  1165. if (iscanbuf_head == NULL) {
  1166. *iscanbuf = iscanbuf_alloc;
  1167. DHD_ISCAN(("%s: Head is allocated\n", __FUNCTION__));
  1168. goto fail;
  1169. }
  1170. while (iscanbuf_head->next)
  1171. iscanbuf_head = iscanbuf_head->next;
  1172. iscanbuf_head->next = iscanbuf_alloc;
  1173. fail:
  1174. dhd_iscan_unlock();
  1175. return iscanbuf_alloc;
  1176. }
  1177. void
  1178. dhd_iscan_free_buf(void *dhdp, iscan_buf_t *iscan_delete)
  1179. {
  1180. iscan_buf_t *iscanbuf_free = 0;
  1181. iscan_buf_t *iscanbuf_prv = 0;
  1182. iscan_buf_t *iscanbuf_cur = iscan_chain;
  1183. dhd_pub_t *dhd = dhd_bus_pub(dhdp);
  1184. dhd_iscan_lock();
  1185. /* If iscan_delete is null then delete the entire
  1186. * chain or else delete specific one provided
  1187. */
  1188. if (!iscan_delete) {
  1189. while (iscanbuf_cur) {
  1190. iscanbuf_free = iscanbuf_cur;
  1191. iscanbuf_cur = iscanbuf_cur->next;
  1192. iscanbuf_free->next = 0;
  1193. MFREE(dhd->osh, iscanbuf_free, sizeof(iscan_buf_t));
  1194. }
  1195. iscan_chain = 0;
  1196. } else {
  1197. while (iscanbuf_cur) {
  1198. if (iscanbuf_cur == iscan_delete)
  1199. break;
  1200. iscanbuf_prv = iscanbuf_cur;
  1201. iscanbuf_cur = iscanbuf_cur->next;
  1202. }
  1203. if (iscanbuf_prv)
  1204. iscanbuf_prv->next = iscan_delete->next;
  1205. iscan_delete->next = 0;
  1206. MFREE(dhd->osh, iscan_delete, sizeof(iscan_buf_t));
  1207. if (!iscanbuf_prv)
  1208. iscan_chain = 0;
  1209. }
  1210. dhd_iscan_unlock();
  1211. }
  1212. iscan_buf_t *
  1213. dhd_iscan_result_buf(void)
  1214. {
  1215. return iscan_chain;
  1216. }
  1217. /*
  1218. * print scan cache
  1219. * print partial iscan_skip list differently
  1220. */
  1221. int
  1222. dhd_iscan_print_cache(iscan_buf_t *iscan_skip)
  1223. {
  1224. int i = 0, l = 0;
  1225. iscan_buf_t *iscan_cur;
  1226. wl_iscan_results_t *list;
  1227. wl_scan_results_t *results;
  1228. wl_bss_info_t UNALIGNED *bi;
  1229. dhd_iscan_lock();
  1230. iscan_cur = dhd_iscan_result_buf();
  1231. while (iscan_cur) {
  1232. list = (wl_iscan_results_t *)iscan_cur->iscan_buf;
  1233. if (!list)
  1234. break;
  1235. results = (wl_scan_results_t *)&list->results;
  1236. if (!results)
  1237. break;
  1238. if (results->version != WL_BSS_INFO_VERSION) {
  1239. DHD_ISCAN(("%s: results->version %d != WL_BSS_INFO_VERSION\n",
  1240. __FUNCTION__, results->version));
  1241. goto done;
  1242. }
  1243. bi = results->bss_info;
  1244. for (i = 0; i < results->count; i++) {
  1245. if (!bi)
  1246. break;
  1247. DHD_ISCAN(("%s[%2.2d:%2.2d] %X:%X:%X:%X:%X:%X\n",
  1248. iscan_cur != iscan_skip?"BSS":"bss", l, i,
  1249. bi->BSSID.octet[0], bi->BSSID.octet[1], bi->BSSID.octet[2],
  1250. bi->BSSID.octet[3], bi->BSSID.octet[4], bi->BSSID.octet[5]));
  1251. bi = (wl_bss_info_t *)((uintptr)bi + dtoh32(bi->length));
  1252. }
  1253. iscan_cur = iscan_cur->next;
  1254. l++;
  1255. }
  1256. done:
  1257. dhd_iscan_unlock();
  1258. return 0;
  1259. }
  1260. /*
  1261. * delete disappeared AP from specific scan cache but skip partial list in iscan_skip
  1262. */
  1263. int
  1264. dhd_iscan_delete_bss(void *dhdp, void *addr, iscan_buf_t *iscan_skip)
  1265. {
  1266. int i = 0, j = 0, l = 0;
  1267. iscan_buf_t *iscan_cur;
  1268. wl_iscan_results_t *list;
  1269. wl_scan_results_t *results;
  1270. wl_bss_info_t UNALIGNED *bi, *bi_new, *bi_next;
  1271. uchar *s_addr = addr;
  1272. dhd_iscan_lock();
  1273. DHD_ISCAN(("%s: BSS to remove %X:%X:%X:%X:%X:%X\n",
  1274. __FUNCTION__, s_addr[0], s_addr[1], s_addr[2],
  1275. s_addr[3], s_addr[4], s_addr[5]));
  1276. iscan_cur = dhd_iscan_result_buf();
  1277. while (iscan_cur) {
  1278. if (iscan_cur != iscan_skip) {
  1279. list = (wl_iscan_results_t *)iscan_cur->iscan_buf;
  1280. if (!list)
  1281. break;
  1282. results = (wl_scan_results_t *)&list->results;
  1283. if (!results)
  1284. break;
  1285. if (results->version != WL_BSS_INFO_VERSION) {
  1286. DHD_ERROR(("%s: results->version %d != WL_BSS_INFO_VERSION\n",
  1287. __FUNCTION__, results->version));
  1288. goto done;
  1289. }
  1290. bi = results->bss_info;
  1291. for (i = 0; i < results->count; i++) {
  1292. if (!bi)
  1293. break;
  1294. if (!memcmp(bi->BSSID.octet, addr, ETHER_ADDR_LEN)) {
  1295. DHD_ISCAN(("%s: Del BSS[%2.2d:%2.2d] %X:%X:%X:%X:%X:%X\n", \
  1296. __FUNCTION__, l, i, bi->BSSID.octet[0], \
  1297. bi->BSSID.octet[1], bi->BSSID.octet[2], \
  1298. bi->BSSID.octet[3], bi->BSSID.octet[4], \
  1299. bi->BSSID.octet[5]));
  1300. bi_new = bi;
  1301. bi = (wl_bss_info_t *)((uintptr)bi + dtoh32(bi->length));
  1302. /*
  1303. if(bi && bi_new) {
  1304. bcopy(bi, bi_new, results->buflen -
  1305. dtoh32(bi_new->length));
  1306. results->buflen -= dtoh32(bi_new->length);
  1307. }
  1308. */
  1309. results->buflen -= dtoh32(bi_new->length);
  1310. results->count--;
  1311. for (j = i; j < results->count; j++) {
  1312. if (bi && bi_new) {
  1313. DHD_ISCAN(("%s: Moved up BSS[%2.2d:%2.2d] \
  1314. %X:%X:%X:%X:%X:%X\n",
  1315. __FUNCTION__, l, j, bi->BSSID.octet[0],
  1316. bi->BSSID.octet[1], bi->BSSID.octet[2],
  1317. bi->BSSID.octet[3], bi->BSSID.octet[4],
  1318. bi->BSSID.octet[5]));
  1319. bi_next = (wl_bss_info_t *)((uintptr)bi +
  1320. dtoh32(bi->length));
  1321. bcopy(bi, bi_new, dtoh32(bi->length));
  1322. bi_new = (wl_bss_info_t *)((uintptr)bi_new +
  1323. dtoh32(bi_new->length));
  1324. bi = bi_next;
  1325. }
  1326. }
  1327. if (results->count == 0) {
  1328. /* Prune now empty partial scan list */
  1329. dhd_iscan_free_buf(dhdp, iscan_cur);
  1330. goto done;
  1331. }
  1332. break;
  1333. }
  1334. bi = (wl_bss_info_t *)((uintptr)bi + dtoh32(bi->length));
  1335. }
  1336. }
  1337. iscan_cur = iscan_cur->next;
  1338. l++;
  1339. }
  1340. done:
  1341. dhd_iscan_unlock();
  1342. return 0;
  1343. }
  1344. int
  1345. dhd_iscan_remove_duplicates(void * dhdp, iscan_buf_t *iscan_cur)
  1346. {
  1347. int i = 0;
  1348. wl_iscan_results_t *list;
  1349. wl_scan_results_t *results;
  1350. wl_bss_info_t UNALIGNED *bi, *bi_new, *bi_next;
  1351. dhd_iscan_lock();
  1352. DHD_ISCAN(("%s: Scan cache before delete\n",
  1353. __FUNCTION__));
  1354. dhd_iscan_print_cache(iscan_cur);
  1355. if (!iscan_cur)
  1356. goto done;
  1357. list = (wl_iscan_results_t *)iscan_cur->iscan_buf;
  1358. if (!list)
  1359. goto done;
  1360. results = (wl_scan_results_t *)&list->results;
  1361. if (!results)
  1362. goto done;
  1363. if (results->version != WL_BSS_INFO_VERSION) {
  1364. DHD_ERROR(("%s: results->version %d != WL_BSS_INFO_VERSION\n",
  1365. __FUNCTION__, results->version));
  1366. goto done;
  1367. }
  1368. bi = results->bss_info;
  1369. for (i = 0; i < results->count; i++) {
  1370. if (!bi)
  1371. break;
  1372. DHD_ISCAN(("%s: Find dups for BSS[%2.2d] %X:%X:%X:%X:%X:%X\n",
  1373. __FUNCTION__, i, bi->BSSID.octet[0], bi->BSSID.octet[1], bi->BSSID.octet[2],
  1374. bi->BSSID.octet[3], bi->BSSID.octet[4], bi->BSSID.octet[5]));
  1375. dhd_iscan_delete_bss(dhdp, bi->BSSID.octet, iscan_cur);
  1376. bi = (wl_bss_info_t *)((uintptr)bi + dtoh32(bi->length));
  1377. }
  1378. done:
  1379. DHD_ISCAN(("%s: Scan cache after delete\n", __FUNCTION__));
  1380. dhd_iscan_print_cache(iscan_cur);
  1381. dhd_iscan_unlock();
  1382. return 0;
  1383. }
  1384. void
  1385. dhd_iscan_ind_scan_confirm(void *dhdp, bool status)
  1386. {
  1387. dhd_ind_scan_confirm(dhdp, status);
  1388. }
  1389. int
  1390. dhd_iscan_request(void * dhdp, uint16 action)
  1391. {
  1392. int rc;
  1393. wl_iscan_params_t params;
  1394. dhd_pub_t *dhd = dhd_bus_pub(dhdp);
  1395. char buf[WLC_IOCTL_SMLEN];
  1396. memset(&params, 0, sizeof(wl_iscan_params_t));
  1397. memcpy(&params.params.bssid, &ether_bcast, ETHER_ADDR_LEN);
  1398. params.params.bss_type = DOT11_BSSTYPE_ANY;
  1399. params.params.scan_type = DOT11_SCANTYPE_ACTIVE;
  1400. params.params.nprobes = htod32(-1);
  1401. params.params.active_time = htod32(-1);
  1402. params.params.passive_time = htod32(-1);
  1403. params.params.home_time = htod32(-1);
  1404. params.params.channel_num = htod32(0);
  1405. params.version = htod32(ISCAN_REQ_VERSION);
  1406. params.action = htod16(action);
  1407. params.scan_duration = htod16(0);
  1408. bcm_mkiovar("iscan", (char *)&params, sizeof(wl_iscan_params_t), buf, WLC_IOCTL_SMLEN);
  1409. rc = dhd_wl_ioctl(dhdp, WLC_SET_VAR, buf, WLC_IOCTL_SMLEN);
  1410. return rc;
  1411. }
  1412. static int
  1413. dhd_iscan_get_partial_result(void *dhdp, uint *scan_count)
  1414. {
  1415. wl_iscan_results_t *list_buf;
  1416. wl_iscan_results_t list;
  1417. wl_scan_results_t *results;
  1418. iscan_buf_t *iscan_cur;
  1419. int status = -1;
  1420. dhd_pub_t *dhd = dhd_bus_pub(dhdp);
  1421. int rc;
  1422. iscan_cur = dhd_iscan_allocate_buf(dhd, &iscan_chain);
  1423. if (!iscan_cur) {
  1424. DHD_ERROR(("%s: Failed to allocate node\n", __FUNCTION__));
  1425. dhd_iscan_free_buf(dhdp, 0);
  1426. dhd_iscan_request(dhdp, WL_SCAN_ACTION_ABORT);
  1427. goto fail;
  1428. }
  1429. dhd_iscan_lock();
  1430. memset(iscan_cur->iscan_buf, 0, WLC_IW_ISCAN_MAXLEN);
  1431. list_buf = (wl_iscan_results_t*)iscan_cur->iscan_buf;
  1432. results = &list_buf->results;
  1433. results->buflen = WL_ISCAN_RESULTS_FIXED_SIZE;
  1434. results->version = 0;
  1435. results->count = 0;
  1436. memset(&list, 0, sizeof(list));
  1437. list.results.buflen = htod32(WLC_IW_ISCAN_MAXLEN);
  1438. bcm_mkiovar("iscanresults", (char *)&list, WL_ISCAN_RESULTS_FIXED_SIZE,
  1439. iscan_cur->iscan_buf, WLC_IW_ISCAN_MAXLEN);
  1440. rc = dhd_wl_ioctl(dhdp, WLC_GET_VAR, iscan_cur->iscan_buf, WLC_IW_ISCAN_MAXLEN);
  1441. results->buflen = dtoh32(results->buflen);
  1442. results->version = dtoh32(results->version);
  1443. *scan_count = results->count = dtoh32(results->count);
  1444. status = dtoh32(list_buf->status);
  1445. dhd_iscan_unlock();
  1446. if (!(*scan_count))
  1447. dhd_iscan_free_buf(dhdp, iscan_cur);
  1448. else
  1449. dhd_iscan_remove_duplicates(dhdp, iscan_cur);
  1450. fail:
  1451. return status;
  1452. }
  1453. #endif
  1454. /* Android ComboSCAN support */
  1455. #if defined(CSCAN)
  1456. /*
  1457. * data parsing from ComboScan tlv list
  1458. */
  1459. int
  1460. wl_iw_parse_data_tlv(char** list_str, void *dst, int dst_size, const char token, \
  1461. int input_size, int *bytes_left)
  1462. {
  1463. char* str = *list_str;
  1464. uint16 short_temp;
  1465. uint32 int_temp;
  1466. if ((list_str == NULL) || (*list_str == NULL) ||(bytes_left == NULL) || (*bytes_left < 0)) {
  1467. DHD_ERROR(("%s error paramters\n", __FUNCTION__));
  1468. return -1;
  1469. }
  1470. /* Clean all dest bytes */
  1471. memset(dst, 0, dst_size);
  1472. while (*bytes_left > 0) {
  1473. if (str[0] != token) {
  1474. DHD_TRACE(("%s NOT Type=%d get=%d left_parse=%d \n", __FUNCTION__, \
  1475. token, str[0], *bytes_left));
  1476. return -1;
  1477. }
  1478. *bytes_left -= 1;
  1479. str += 1;
  1480. if (input_size == 1) {
  1481. memcpy(dst, str, input_size);
  1482. }
  1483. else if (input_size == 2) {
  1484. memcpy(dst, (char *)htod16(memcpy(&short_temp, str, input_size)), \
  1485. input_size);
  1486. }
  1487. else if (input_size == 4) {
  1488. memcpy(dst, (char *)htod32(memcpy(&int_temp, str, input_size)), \
  1489. input_size);
  1490. }
  1491. *bytes_left -= input_size;
  1492. str += input_size;
  1493. *list_str = str;
  1494. return 1;
  1495. }
  1496. return 1;
  1497. }
  1498. /*
  1499. * channel list parsing from cscan tlv list
  1500. */
  1501. int
  1502. wl_iw_parse_channel_list_tlv(char** list_str, uint16* channel_list, \
  1503. int channel_num, int *bytes_left)
  1504. {
  1505. char* str = *list_str;
  1506. int idx = 0;
  1507. if ((list_str == NULL) || (*list_str == NULL) ||(bytes_left == NULL) || (*bytes_left < 0)) {
  1508. DHD_ERROR(("%s error paramters\n", __FUNCTION__));
  1509. return -1;
  1510. }
  1511. while (*bytes_left > 0) {
  1512. if (str[0] != CSCAN_TLV_TYPE_CHANNEL_IE) {
  1513. *list_str = str;
  1514. DHD_TRACE(("End channel=%d left_parse=%d %d\n", idx, *bytes_left, str[0]));
  1515. return idx;
  1516. }
  1517. /* Get proper CSCAN_TLV_TYPE_CHANNEL_IE */
  1518. *bytes_left -= 1;
  1519. str += 1;
  1520. if (str[0] == 0) {
  1521. /* All channels */
  1522. channel_list[idx] = 0x0;
  1523. }
  1524. else {
  1525. channel_list[idx] = (uint16)str[0];
  1526. DHD_TRACE(("%s channel=%d \n", __FUNCTION__, channel_list[idx]));
  1527. }
  1528. *bytes_left -= 1;
  1529. str += 1;
  1530. if (idx++ > 255) {
  1531. DHD_ERROR(("%s Too many channels \n", __FUNCTION__));
  1532. return -1;
  1533. }
  1534. }
  1535. *list_str = str;
  1536. return idx;
  1537. }
  1538. /*
  1539. * SSIDs list parsing from cscan tlv list
  1540. */
  1541. int
  1542. wl_iw_parse_ssid_list_tlv(char** list_str, wlc_ssid_t* ssid, int max, int *bytes_left)
  1543. {
  1544. char* str = *list_str;
  1545. int idx = 0;
  1546. if ((list_str == NULL) || (*list_str == NULL) || (*bytes_left < 0)) {
  1547. DHD_ERROR(("%s error paramters\n", __FUNCTION__));
  1548. return -1;
  1549. }
  1550. while (*bytes_left > 0) {
  1551. if (str[0] != CSCAN_TLV_TYPE_SSID_IE) {
  1552. *list_str = str;
  1553. DHD_TRACE(("nssid=%d left_parse=%d %d\n", idx, *bytes_left, str[0]));
  1554. return idx;
  1555. }
  1556. /* Get proper CSCAN_TLV_TYPE_SSID_IE */
  1557. *bytes_left -= 1;
  1558. str += 1;
  1559. if (str[0] == 0) {
  1560. /* Broadcast SSID */
  1561. ssid[idx].SSID_len = 0;
  1562. memset((char*)ssid[idx].SSID, 0x0, DOT11_MAX_SSID_LEN);
  1563. *bytes_left -= 1;
  1564. str += 1;
  1565. DHD_TRACE(("BROADCAST SCAN left=%d\n", *bytes_left));
  1566. }
  1567. else if (str[0] <= DOT11_MAX_SSID_LEN) {
  1568. /* Get proper SSID size */
  1569. ssid[idx].SSID_len = str[0];
  1570. *bytes_left -= 1;
  1571. str += 1;
  1572. /* Get SSID */
  1573. if (ssid[idx].SSID_len > *bytes_left) {
  1574. DHD_ERROR(("%s out of memory range len=%d but left=%d\n", \
  1575. __FUNCTION__, ssid[idx].SSID_len, *bytes_left));
  1576. return -1;
  1577. }
  1578. memcpy((char*)ssid[idx].SSID, str, ssid[idx].SSID_len);
  1579. *bytes_left -= ssid[idx].SSID_len;
  1580. str += ssid[idx].SSID_len;
  1581. DHD_TRACE(("%s :size=%d left=%d\n", (char*)ssid[idx].SSID, \
  1582. ssid[idx].SSID_len, *bytes_left));
  1583. }
  1584. else {
  1585. DHD_ERROR(("### SSID size more that %d\n", str[0]));
  1586. return -1;
  1587. }
  1588. if (idx++ > max) {
  1589. DHD_ERROR(("%s number of SSIDs more that %d\n", __FUNCTION__, idx));
  1590. return -1;
  1591. }
  1592. }
  1593. *list_str = str;
  1594. return idx;
  1595. }
  1596. /* Parse a comma-separated list from list_str into ssid array, starting
  1597. * at index idx. Max specifies size of the ssid array. Parses ssids
  1598. * and returns updated idx; if idx >= max not all fit, the excess have
  1599. * not been copied. Returns -1 on empty string, or on ssid too long.
  1600. */
  1601. int
  1602. wl_iw_parse_ssid_list(char** list_str, wlc_ssid_t* ssid, int idx, int max)
  1603. {
  1604. char* str, *ptr;
  1605. if ((list_str == NULL) || (*list_str == NULL))
  1606. return -1;
  1607. for (str = *list_str; str != NULL; str = ptr) {
  1608. /* check for next TAG */
  1609. if (!strncmp(str, GET_CHANNEL, strlen(GET_CHANNEL))) {
  1610. *list_str = str + strlen(GET_CHANNEL);
  1611. return idx;
  1612. }
  1613. if ((ptr = strchr(str, ',')) != NULL) {
  1614. *ptr++ = '\0';
  1615. }
  1616. if (strlen(str) > DOT11_MAX_SSID_LEN) {
  1617. DHD_ERROR(("ssid <%s> exceeds %d\n", str, DOT11_MAX_SSID_LEN));
  1618. return -1;
  1619. }
  1620. if (strlen(str) == 0)
  1621. ssid[idx].SSID_len = 0;
  1622. if (idx < max) {
  1623. strcpy((char*)ssid[idx].SSID, str);
  1624. ssid[idx].SSID_len = strlen(str);
  1625. }
  1626. idx++;
  1627. }
  1628. return idx;
  1629. }
  1630. /*
  1631. * Parse channel list from iwpriv CSCAN
  1632. */
  1633. int
  1634. wl_iw_parse_channel_list(char** list_str, uint16* channel_list, int channel_num)
  1635. {
  1636. int num;
  1637. int val;
  1638. char* str;
  1639. char* endptr = NULL;
  1640. if ((list_str == NULL)||(*list_str == NULL))
  1641. return -1;
  1642. str = *list_str;
  1643. num = 0;
  1644. while (strncmp(str, GET_NPROBE, strlen(GET_NPROBE))) {
  1645. val = (int)strtoul(str, &endptr, 0);
  1646. if (endptr == str) {
  1647. printf("could not parse channel number starting at"
  1648. " substring \"%s\" in list:\n%s\n",
  1649. str, *list_str);
  1650. return -1;
  1651. }
  1652. str = endptr + strspn(endptr, " ,");
  1653. if (num == channel_num) {
  1654. DHD_ERROR(("too many channels (more than %d) in channel list:\n%s\n",
  1655. channel_num, *list_str));
  1656. return -1;
  1657. }
  1658. channel_list[num++] = (uint16)val;
  1659. }
  1660. *list_str = str;
  1661. return num;
  1662. }
  1663. #endif