blob: 337a884f52df873700e0cbd62215abc6bde8302a [file] [log] [blame]
Zhu Yibb9f8692009-05-21 21:20:45 +08001/*
2 * Intel Wireless Multicomm 3200 WiFi driver
3 *
4 * Copyright (C) 2009 Intel Corporation. All rights reserved.
5 *
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
8 * are met:
9 *
10 * * Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * * Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in
14 * the documentation and/or other materials provided with the
15 * distribution.
16 * * Neither the name of Intel Corporation nor the names of its
17 * contributors may be used to endorse or promote products derived
18 * from this software without specific prior written permission.
19 *
20 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
21 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
22 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
23 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
24 * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
25 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
26 * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
27 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
28 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
29 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
30 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
31 *
32 *
33 * Intel Corporation <ilw@linux.intel.com>
34 * Samuel Ortiz <samuel.ortiz@intel.com>
35 * Zhu Yi <yi.zhu@intel.com>
36 *
37 */
38
39#include <linux/kernel.h>
40#include <linux/wireless.h>
41#include <linux/etherdevice.h>
42#include <linux/ieee80211.h>
43
44#include "iwm.h"
45#include "bus.h"
46#include "hal.h"
47#include "umac.h"
48#include "commands.h"
49#include "debug.h"
50
51static int iwm_send_lmac_ptrough_cmd(struct iwm_priv *iwm,
52 u8 lmac_cmd_id,
53 const void *lmac_payload,
54 u16 lmac_payload_size,
55 u8 resp)
56{
57 struct iwm_udma_wifi_cmd udma_cmd = UDMA_LMAC_INIT;
58 struct iwm_umac_cmd umac_cmd;
59 struct iwm_lmac_cmd lmac_cmd;
60
61 lmac_cmd.id = lmac_cmd_id;
62
63 umac_cmd.id = UMAC_CMD_OPCODE_WIFI_PASS_THROUGH;
64 umac_cmd.resp = resp;
65
66 return iwm_hal_send_host_cmd(iwm, &udma_cmd, &umac_cmd, &lmac_cmd,
67 lmac_payload, lmac_payload_size);
68}
69
70int iwm_send_wifi_if_cmd(struct iwm_priv *iwm, void *payload, u16 payload_size,
71 bool resp)
72{
Samuel Ortiza70742f2009-06-15 21:59:51 +020073 struct iwm_umac_wifi_if *hdr = (struct iwm_umac_wifi_if *)payload;
Zhu Yibb9f8692009-05-21 21:20:45 +080074 struct iwm_udma_wifi_cmd udma_cmd = UDMA_UMAC_INIT;
75 struct iwm_umac_cmd umac_cmd;
Samuel Ortiza70742f2009-06-15 21:59:51 +020076 int ret;
77 u8 oid = hdr->oid;
Zhu Yibb9f8692009-05-21 21:20:45 +080078
79 umac_cmd.id = UMAC_CMD_OPCODE_WIFI_IF_WRAPPER;
80 umac_cmd.resp = resp;
81
Samuel Ortiza70742f2009-06-15 21:59:51 +020082 ret = iwm_hal_send_umac_cmd(iwm, &udma_cmd, &umac_cmd,
83 payload, payload_size);
84
85 if (resp) {
86 ret = wait_event_interruptible_timeout(iwm->wifi_ntfy_queue,
87 test_and_clear_bit(oid, &iwm->wifi_ntfy[0]),
88 3 * HZ);
89
90 if (!ret)
91 ret = -EBUSY;
92 }
93
94 return ret;
Zhu Yibb9f8692009-05-21 21:20:45 +080095}
96
97static struct coex_event iwm_sta_xor_prio_tbl[COEX_EVENTS_NUM] =
98{
99 {4, 3, 0, COEX_UNASSOC_IDLE_FLAGS},
100 {4, 3, 0, COEX_UNASSOC_MANUAL_SCAN_FLAGS},
101 {4, 3, 0, COEX_UNASSOC_AUTO_SCAN_FLAGS},
102 {4, 3, 0, COEX_CALIBRATION_FLAGS},
103 {4, 3, 0, COEX_PERIODIC_CALIBRATION_FLAGS},
104 {4, 3, 0, COEX_CONNECTION_ESTAB_FLAGS},
105 {4, 3, 0, COEX_ASSOCIATED_IDLE_FLAGS},
106 {4, 3, 0, COEX_ASSOC_MANUAL_SCAN_FLAGS},
107 {4, 3, 0, COEX_ASSOC_AUTO_SCAN_FLAGS},
108 {4, 3, 0, COEX_ASSOC_ACTIVE_LEVEL_FLAGS},
109 {6, 3, 0, COEX_XOR_RF_ON_FLAGS},
110 {4, 3, 0, COEX_RF_OFF_FLAGS},
111 {6, 6, 0, COEX_STAND_ALONE_DEBUG_FLAGS},
112 {4, 3, 0, COEX_IPAN_ASSOC_LEVEL_FLAGS},
113 {4, 3, 0, COEX_RSRVD1_FLAGS},
114 {4, 3, 0, COEX_RSRVD2_FLAGS}
115};
116
117static struct coex_event iwm_sta_cm_prio_tbl[COEX_EVENTS_NUM] =
118{
119 {1, 1, 0, COEX_UNASSOC_IDLE_FLAGS},
120 {4, 3, 0, COEX_UNASSOC_MANUAL_SCAN_FLAGS},
121 {3, 3, 0, COEX_UNASSOC_AUTO_SCAN_FLAGS},
122 {5, 5, 0, COEX_CALIBRATION_FLAGS},
123 {4, 4, 0, COEX_PERIODIC_CALIBRATION_FLAGS},
124 {5, 4, 0, COEX_CONNECTION_ESTAB_FLAGS},
125 {4, 4, 0, COEX_ASSOCIATED_IDLE_FLAGS},
126 {4, 4, 0, COEX_ASSOC_MANUAL_SCAN_FLAGS},
127 {4, 4, 0, COEX_ASSOC_AUTO_SCAN_FLAGS},
128 {4, 4, 0, COEX_ASSOC_ACTIVE_LEVEL_FLAGS},
129 {1, 1, 0, COEX_RF_ON_FLAGS},
130 {1, 1, 0, COEX_RF_OFF_FLAGS},
131 {6, 6, 0, COEX_STAND_ALONE_DEBUG_FLAGS},
132 {5, 4, 0, COEX_IPAN_ASSOC_LEVEL_FLAGS},
133 {1, 1, 0, COEX_RSRVD1_FLAGS},
134 {1, 1, 0, COEX_RSRVD2_FLAGS}
135};
136
137int iwm_send_prio_table(struct iwm_priv *iwm)
138{
139 struct iwm_coex_prio_table_cmd coex_table_cmd;
140 u32 coex_enabled, mode_enabled;
141
142 memset(&coex_table_cmd, 0, sizeof(struct iwm_coex_prio_table_cmd));
143
144 coex_table_cmd.flags = COEX_FLAGS_STA_TABLE_VALID_MSK;
145
146 switch (iwm->conf.coexist_mode) {
147 case COEX_MODE_XOR:
148 case COEX_MODE_CM:
149 coex_enabled = 1;
150 break;
151 default:
152 coex_enabled = 0;
153 break;
154 }
155
156 switch (iwm->conf.mode) {
157 case UMAC_MODE_BSS:
158 case UMAC_MODE_IBSS:
159 mode_enabled = 1;
160 break;
161 default:
162 mode_enabled = 0;
163 break;
164 }
165
166 if (coex_enabled && mode_enabled) {
167 coex_table_cmd.flags |= COEX_FLAGS_COEX_ENABLE_MSK |
168 COEX_FLAGS_ASSOC_WAKEUP_UMASK_MSK |
169 COEX_FLAGS_UNASSOC_WAKEUP_UMASK_MSK;
170
171 switch (iwm->conf.coexist_mode) {
172 case COEX_MODE_XOR:
173 memcpy(coex_table_cmd.sta_prio, iwm_sta_xor_prio_tbl,
174 sizeof(iwm_sta_xor_prio_tbl));
175 break;
176 case COEX_MODE_CM:
177 memcpy(coex_table_cmd.sta_prio, iwm_sta_cm_prio_tbl,
178 sizeof(iwm_sta_cm_prio_tbl));
179 break;
180 default:
181 IWM_ERR(iwm, "Invalid coex_mode 0x%x\n",
182 iwm->conf.coexist_mode);
183 break;
184 }
185 } else
186 IWM_WARN(iwm, "coexistense disabled\n");
187
188 return iwm_send_lmac_ptrough_cmd(iwm, COEX_PRIORITY_TABLE_CMD,
189 &coex_table_cmd,
190 sizeof(struct iwm_coex_prio_table_cmd), 1);
191}
192
193int iwm_send_init_calib_cfg(struct iwm_priv *iwm, u8 calib_requested)
194{
195 struct iwm_lmac_cal_cfg_cmd cal_cfg_cmd;
196
197 memset(&cal_cfg_cmd, 0, sizeof(struct iwm_lmac_cal_cfg_cmd));
198
199 cal_cfg_cmd.ucode_cfg.init.enable = cpu_to_le32(calib_requested);
200 cal_cfg_cmd.ucode_cfg.init.start = cpu_to_le32(calib_requested);
201 cal_cfg_cmd.ucode_cfg.init.send_res = cpu_to_le32(calib_requested);
202 cal_cfg_cmd.ucode_cfg.flags =
203 cpu_to_le32(CALIB_CFG_FLAG_SEND_COMPLETE_NTFY_AFTER_MSK);
204
205 return iwm_send_lmac_ptrough_cmd(iwm, CALIBRATION_CFG_CMD, &cal_cfg_cmd,
206 sizeof(struct iwm_lmac_cal_cfg_cmd), 1);
207}
208
209int iwm_send_periodic_calib_cfg(struct iwm_priv *iwm, u8 calib_requested)
210{
211 struct iwm_lmac_cal_cfg_cmd cal_cfg_cmd;
212
213 memset(&cal_cfg_cmd, 0, sizeof(struct iwm_lmac_cal_cfg_cmd));
214
215 cal_cfg_cmd.ucode_cfg.periodic.enable = cpu_to_le32(calib_requested);
216 cal_cfg_cmd.ucode_cfg.periodic.start = cpu_to_le32(calib_requested);
217
218 return iwm_send_lmac_ptrough_cmd(iwm, CALIBRATION_CFG_CMD, &cal_cfg_cmd,
219 sizeof(struct iwm_lmac_cal_cfg_cmd), 0);
220}
221
222int iwm_store_rxiq_calib_result(struct iwm_priv *iwm)
223{
224 struct iwm_calib_rxiq *rxiq;
225 u8 *eeprom_rxiq = iwm_eeprom_access(iwm, IWM_EEPROM_CALIB_RXIQ);
226 int grplen = sizeof(struct iwm_calib_rxiq_group);
227
228 rxiq = kzalloc(sizeof(struct iwm_calib_rxiq), GFP_KERNEL);
229 if (!rxiq) {
230 IWM_ERR(iwm, "Couldn't alloc memory for RX IQ\n");
231 return -ENOMEM;
232 }
233
234 eeprom_rxiq = iwm_eeprom_access(iwm, IWM_EEPROM_CALIB_RXIQ);
235 if (IS_ERR(eeprom_rxiq)) {
236 IWM_ERR(iwm, "Couldn't access EEPROM RX IQ entry\n");
237 return PTR_ERR(eeprom_rxiq);
238 }
239
240 iwm->calib_res[SHILOH_PHY_CALIBRATE_RX_IQ_CMD].buf = (u8 *)rxiq;
241 iwm->calib_res[SHILOH_PHY_CALIBRATE_RX_IQ_CMD].size = sizeof(*rxiq);
242
243 rxiq->hdr.opcode = SHILOH_PHY_CALIBRATE_RX_IQ_CMD;
244 rxiq->hdr.first_grp = 0;
245 rxiq->hdr.grp_num = 1;
246 rxiq->hdr.all_data_valid = 1;
247
248 memcpy(&rxiq->group[0], eeprom_rxiq, 4 * grplen);
249 memcpy(&rxiq->group[4], eeprom_rxiq + 6 * grplen, grplen);
250
251 return 0;
252}
253
254int iwm_send_calib_results(struct iwm_priv *iwm)
255{
256 int i, ret = 0;
257
258 for (i = PHY_CALIBRATE_OPCODES_NUM; i < CALIBRATION_CMD_NUM; i++) {
259 if (test_bit(i - PHY_CALIBRATE_OPCODES_NUM,
260 &iwm->calib_done_map)) {
261 IWM_DBG_CMD(iwm, DBG,
262 "Send calibration %d result\n", i);
263 ret |= iwm_send_lmac_ptrough_cmd(iwm,
264 REPLY_PHY_CALIBRATION_CMD,
265 iwm->calib_res[i].buf,
266 iwm->calib_res[i].size, 0);
267
268 kfree(iwm->calib_res[i].buf);
269 iwm->calib_res[i].buf = NULL;
270 iwm->calib_res[i].size = 0;
271 }
272 }
273
274 return ret;
275}
276
277int iwm_send_umac_reset(struct iwm_priv *iwm, __le32 reset_flags, bool resp)
278{
279 struct iwm_udma_wifi_cmd udma_cmd = UDMA_UMAC_INIT;
280 struct iwm_umac_cmd umac_cmd;
281 struct iwm_umac_cmd_reset reset;
282
283 reset.flags = reset_flags;
284
285 umac_cmd.id = UMAC_CMD_OPCODE_RESET;
286 umac_cmd.resp = resp;
287
288 return iwm_hal_send_umac_cmd(iwm, &udma_cmd, &umac_cmd, &reset,
289 sizeof(struct iwm_umac_cmd_reset));
290}
291
292int iwm_umac_set_config_fix(struct iwm_priv *iwm, u16 tbl, u16 key, u32 value)
293{
294 struct iwm_udma_wifi_cmd udma_cmd = UDMA_UMAC_INIT;
295 struct iwm_umac_cmd umac_cmd;
296 struct iwm_umac_cmd_set_param_fix param;
297
298 if ((tbl != UMAC_PARAM_TBL_CFG_FIX) &&
299 (tbl != UMAC_PARAM_TBL_FA_CFG_FIX))
300 return -EINVAL;
301
302 umac_cmd.id = UMAC_CMD_OPCODE_SET_PARAM_FIX;
303 umac_cmd.resp = 0;
304
305 param.tbl = cpu_to_le16(tbl);
306 param.key = cpu_to_le16(key);
307 param.value = cpu_to_le32(value);
308
309 return iwm_hal_send_umac_cmd(iwm, &udma_cmd, &umac_cmd, &param,
310 sizeof(struct iwm_umac_cmd_set_param_fix));
311}
312
313int iwm_umac_set_config_var(struct iwm_priv *iwm, u16 key,
314 void *payload, u16 payload_size)
315{
316 struct iwm_udma_wifi_cmd udma_cmd = UDMA_UMAC_INIT;
317 struct iwm_umac_cmd umac_cmd;
318 struct iwm_umac_cmd_set_param_var *param_hdr;
319 u8 *param;
320 int ret;
321
322 param = kzalloc(payload_size +
323 sizeof(struct iwm_umac_cmd_set_param_var), GFP_KERNEL);
324 if (!param) {
325 IWM_ERR(iwm, "Couldn't allocate param\n");
326 return -ENOMEM;
327 }
328
329 param_hdr = (struct iwm_umac_cmd_set_param_var *)param;
330
331 umac_cmd.id = UMAC_CMD_OPCODE_SET_PARAM_VAR;
332 umac_cmd.resp = 0;
333
334 param_hdr->tbl = cpu_to_le16(UMAC_PARAM_TBL_CFG_VAR);
335 param_hdr->key = cpu_to_le16(key);
336 param_hdr->len = cpu_to_le16(payload_size);
337 memcpy(param + sizeof(struct iwm_umac_cmd_set_param_var),
338 payload, payload_size);
339
340 ret = iwm_hal_send_umac_cmd(iwm, &udma_cmd, &umac_cmd, param,
341 sizeof(struct iwm_umac_cmd_set_param_var) +
342 payload_size);
343 kfree(param);
344
345 return ret;
346}
347
348int iwm_send_umac_config(struct iwm_priv *iwm,
349 __le32 reset_flags)
350{
351 int ret;
352
353 /* Use UMAC default values */
354 ret = iwm_umac_set_config_fix(iwm, UMAC_PARAM_TBL_CFG_FIX,
355 CFG_POWER_INDEX, iwm->conf.power_index);
356 if (ret < 0)
357 return ret;
358
359 ret = iwm_umac_set_config_fix(iwm, UMAC_PARAM_TBL_FA_CFG_FIX,
360 CFG_FRAG_THRESHOLD,
361 iwm->conf.frag_threshold);
362 if (ret < 0)
363 return ret;
364
365 ret = iwm_umac_set_config_fix(iwm, UMAC_PARAM_TBL_CFG_FIX,
366 CFG_RTS_THRESHOLD,
367 iwm->conf.rts_threshold);
368 if (ret < 0)
369 return ret;
370
371 ret = iwm_umac_set_config_fix(iwm, UMAC_PARAM_TBL_CFG_FIX,
372 CFG_CTS_TO_SELF, iwm->conf.cts_to_self);
373 if (ret < 0)
374 return ret;
375
376 ret = iwm_umac_set_config_fix(iwm, UMAC_PARAM_TBL_CFG_FIX,
377 CFG_COEX_MODE, iwm->conf.coexist_mode);
378 if (ret < 0)
379 return ret;
380
381 /*
382 ret = iwm_umac_set_config_fix(iwm, UMAC_PARAM_TBL_CFG_FIX,
383 CFG_ASSOCIATION_TIMEOUT,
384 iwm->conf.assoc_timeout);
385 if (ret < 0)
386 return ret;
387
388 ret = iwm_umac_set_config_fix(iwm, UMAC_PARAM_TBL_CFG_FIX,
389 CFG_ROAM_TIMEOUT,
390 iwm->conf.roam_timeout);
391 if (ret < 0)
392 return ret;
393
394 ret = iwm_umac_set_config_fix(iwm, UMAC_PARAM_TBL_CFG_FIX,
395 CFG_WIRELESS_MODE,
396 WIRELESS_MODE_11A | WIRELESS_MODE_11G);
397 if (ret < 0)
398 return ret;
399 */
400
401 ret = iwm_umac_set_config_var(iwm, CFG_NET_ADDR,
402 iwm_to_ndev(iwm)->dev_addr, ETH_ALEN);
403 if (ret < 0)
404 return ret;
405
406 /* UMAC PM static configurations */
407 ret = iwm_umac_set_config_fix(iwm, UMAC_PARAM_TBL_CFG_FIX,
408 CFG_PM_LEGACY_RX_TIMEOUT, 0x12C);
409 if (ret < 0)
410 return ret;
411
412 ret = iwm_umac_set_config_fix(iwm, UMAC_PARAM_TBL_CFG_FIX,
413 CFG_PM_LEGACY_TX_TIMEOUT, 0x15E);
414 if (ret < 0)
415 return ret;
416
417 ret = iwm_umac_set_config_fix(iwm, UMAC_PARAM_TBL_CFG_FIX,
418 CFG_PM_CTRL_FLAGS, 0x30001);
419 if (ret < 0)
420 return ret;
421
422 ret = iwm_umac_set_config_fix(iwm, UMAC_PARAM_TBL_CFG_FIX,
423 CFG_PM_KEEP_ALIVE_IN_BEACONS, 0x80);
424 if (ret < 0)
425 return ret;
426
427 /* reset UMAC */
428 ret = iwm_send_umac_reset(iwm, reset_flags, 1);
429 if (ret < 0)
430 return ret;
431
432 ret = iwm_notif_handle(iwm, UMAC_CMD_OPCODE_RESET, IWM_SRC_UMAC,
433 WAIT_NOTIF_TIMEOUT);
434 if (ret) {
435 IWM_ERR(iwm, "Wait for UMAC RESET timeout\n");
436 return ret;
437 }
438
439 return ret;
440}
441
442int iwm_send_packet(struct iwm_priv *iwm, struct sk_buff *skb, int pool_id)
443{
444 struct iwm_udma_wifi_cmd udma_cmd;
445 struct iwm_umac_cmd umac_cmd;
446 struct iwm_tx_info *tx_info = skb_to_tx_info(skb);
447
448 udma_cmd.eop = 1; /* always set eop for non-concatenated Tx */
449 udma_cmd.credit_group = pool_id;
450 udma_cmd.ra_tid = tx_info->sta << 4 | tx_info->tid;
451 udma_cmd.lmac_offset = 0;
452
453 umac_cmd.id = REPLY_TX;
454 umac_cmd.color = tx_info->color;
455 umac_cmd.resp = 0;
456
457 return iwm_hal_send_umac_cmd(iwm, &udma_cmd, &umac_cmd,
458 skb->data, skb->len);
459}
460
461static int iwm_target_read(struct iwm_priv *iwm, __le32 address,
462 u8 *response, u32 resp_size)
463{
464 struct iwm_udma_nonwifi_cmd target_cmd;
465 struct iwm_nonwifi_cmd *cmd;
466 u16 seq_num;
467 int ret = 0;
468
469 target_cmd.opcode = UMAC_HDI_OUT_OPCODE_READ;
470 target_cmd.addr = address;
471 target_cmd.op1_sz = cpu_to_le32(resp_size);
472 target_cmd.op2 = 0;
473 target_cmd.handle_by_hw = 0;
474 target_cmd.resp = 1;
475 target_cmd.eop = 1;
476
477 ret = iwm_hal_send_target_cmd(iwm, &target_cmd, NULL);
478 if (ret < 0)
479 IWM_ERR(iwm, "Couldn't send READ command\n");
480
481 /* When succeding, the send_target routine returns the seq number */
482 seq_num = ret;
483
484 ret = wait_event_interruptible_timeout(iwm->nonwifi_queue,
485 (cmd = iwm_get_pending_nonwifi_cmd(iwm, seq_num,
486 UMAC_HDI_OUT_OPCODE_READ)) != NULL,
487 2 * HZ);
488
489 if (!ret) {
490 IWM_ERR(iwm, "Didn't receive a target READ answer\n");
491 return ret;
492 }
493
494 memcpy(response, cmd->buf.hdr + sizeof(struct iwm_udma_in_hdr),
495 resp_size);
496
497 kfree(cmd);
498
499 return ret;
500}
501
502int iwm_read_mac(struct iwm_priv *iwm, u8 *mac)
503{
504 int ret;
505 u8 mac_align[ALIGN(ETH_ALEN, 8)];
506
507 ret = iwm_target_read(iwm, cpu_to_le32(WICO_MAC_ADDRESS_ADDR),
508 mac_align, sizeof(mac_align));
509 if (ret < 0)
510 return ret;
511
512 if (is_valid_ether_addr(mac_align))
513 memcpy(mac, mac_align, ETH_ALEN);
514 else {
515 IWM_ERR(iwm, "Invalid EEPROM MAC\n");
516 memcpy(mac, iwm->conf.mac_addr, ETH_ALEN);
517 get_random_bytes(&mac[3], 3);
518 }
519
520 return 0;
521}
522
523int iwm_set_tx_key(struct iwm_priv *iwm, u8 key_idx)
524{
525 struct iwm_umac_tx_key_id tx_key_id;
526
527 if (!iwm->default_key || !iwm->default_key->in_use)
528 return -EINVAL;
529
530 tx_key_id.hdr.oid = UMAC_WIFI_IF_CMD_GLOBAL_TX_KEY_ID;
531 tx_key_id.hdr.buf_size = cpu_to_le16(sizeof(struct iwm_umac_tx_key_id) -
532 sizeof(struct iwm_umac_wifi_if));
533
534 tx_key_id.key_idx = key_idx;
535
536 return iwm_send_wifi_if_cmd(iwm, &tx_key_id, sizeof(tx_key_id), 1);
537}
538
539static int iwm_check_profile(struct iwm_priv *iwm)
540{
541 if (!iwm->umac_profile_active)
542 return -EAGAIN;
543
544 if (iwm->umac_profile->sec.ucast_cipher != UMAC_CIPHER_TYPE_WEP_40 &&
545 iwm->umac_profile->sec.ucast_cipher != UMAC_CIPHER_TYPE_WEP_104 &&
546 iwm->umac_profile->sec.ucast_cipher != UMAC_CIPHER_TYPE_TKIP &&
547 iwm->umac_profile->sec.ucast_cipher != UMAC_CIPHER_TYPE_CCMP) {
548 IWM_ERR(iwm, "Wrong unicast cipher: 0x%x\n",
549 iwm->umac_profile->sec.ucast_cipher);
550 return -EAGAIN;
551 }
552
553 if (iwm->umac_profile->sec.mcast_cipher != UMAC_CIPHER_TYPE_WEP_40 &&
554 iwm->umac_profile->sec.mcast_cipher != UMAC_CIPHER_TYPE_WEP_104 &&
555 iwm->umac_profile->sec.mcast_cipher != UMAC_CIPHER_TYPE_TKIP &&
556 iwm->umac_profile->sec.mcast_cipher != UMAC_CIPHER_TYPE_CCMP) {
557 IWM_ERR(iwm, "Wrong multicast cipher: 0x%x\n",
558 iwm->umac_profile->sec.mcast_cipher);
559 return -EAGAIN;
560 }
561
562 if ((iwm->umac_profile->sec.ucast_cipher == UMAC_CIPHER_TYPE_WEP_40 ||
563 iwm->umac_profile->sec.ucast_cipher == UMAC_CIPHER_TYPE_WEP_104) &&
564 (iwm->umac_profile->sec.ucast_cipher !=
565 iwm->umac_profile->sec.mcast_cipher)) {
566 IWM_ERR(iwm, "Unicast and multicast ciphers differ for WEP\n");
567 }
568
569 return 0;
570}
571
572int iwm_set_key(struct iwm_priv *iwm, bool remove, bool set_tx_key,
573 struct iwm_key *key)
574{
575 int ret;
576 u8 cmd[64], *sta_addr, *key_data, key_len;
577 s8 key_idx;
578 u16 cmd_size = 0;
579 struct iwm_umac_key_hdr *key_hdr = &key->hdr;
580 struct iwm_umac_key_wep40 *wep40 = (struct iwm_umac_key_wep40 *)cmd;
581 struct iwm_umac_key_wep104 *wep104 = (struct iwm_umac_key_wep104 *)cmd;
582 struct iwm_umac_key_tkip *tkip = (struct iwm_umac_key_tkip *)cmd;
583 struct iwm_umac_key_ccmp *ccmp = (struct iwm_umac_key_ccmp *)cmd;
584
585 if (set_tx_key)
586 iwm->default_key = key;
587
588 /*
589 * We check if our current profile is valid.
590 * If not, we dont push the key, we just cache them,
591 * so that with the next siwsessid call, the keys
592 * will be actually pushed.
593 */
594 if (!remove) {
595 ret = iwm_check_profile(iwm);
596 if (ret < 0)
597 return ret;
598 }
599
600 sta_addr = key->hdr.mac;
601 key_data = key->key;
602 key_len = key->key_len;
603 key_idx = key->hdr.key_idx;
604
605 if (!remove) {
606 IWM_DBG_WEXT(iwm, DBG, "key_idx:%d set tx key:%d\n",
607 key_idx, set_tx_key);
608 IWM_DBG_WEXT(iwm, DBG, "key_len:%d\n", key_len);
609 IWM_DBG_WEXT(iwm, DBG, "MAC:%pM, idx:%d, multicast:%d\n",
610 key_hdr->mac, key_hdr->key_idx, key_hdr->multicast);
611
612 IWM_DBG_WEXT(iwm, DBG, "profile: mcast:0x%x, ucast:0x%x\n",
613 iwm->umac_profile->sec.mcast_cipher,
614 iwm->umac_profile->sec.ucast_cipher);
615 IWM_DBG_WEXT(iwm, DBG, "profile: auth_type:0x%x, flags:0x%x\n",
616 iwm->umac_profile->sec.auth_type,
617 iwm->umac_profile->sec.flags);
618
619 switch (key->alg) {
620 case UMAC_CIPHER_TYPE_WEP_40:
621 wep40->hdr.oid = UMAC_WIFI_IF_CMD_ADD_WEP40_KEY;
622 wep40->hdr.buf_size =
623 cpu_to_le16(sizeof(struct iwm_umac_key_wep40) -
624 sizeof(struct iwm_umac_wifi_if));
625
626 memcpy(&wep40->key_hdr, key_hdr,
627 sizeof(struct iwm_umac_key_hdr));
628 memcpy(wep40->key, key_data, key_len);
629 wep40->static_key = 1;
630
631 cmd_size = sizeof(struct iwm_umac_key_wep40);
632 break;
633
634 case UMAC_CIPHER_TYPE_WEP_104:
635 wep104->hdr.oid = UMAC_WIFI_IF_CMD_ADD_WEP104_KEY;
636 wep104->hdr.buf_size =
637 cpu_to_le16(sizeof(struct iwm_umac_key_wep104) -
638 sizeof(struct iwm_umac_wifi_if));
639
640 memcpy(&wep104->key_hdr, key_hdr,
641 sizeof(struct iwm_umac_key_hdr));
642 memcpy(wep104->key, key_data, key_len);
643 wep104->static_key = 1;
644
645 cmd_size = sizeof(struct iwm_umac_key_wep104);
646 break;
647
648 case UMAC_CIPHER_TYPE_CCMP:
649 key_hdr->key_idx++;
650 ccmp->hdr.oid = UMAC_WIFI_IF_CMD_ADD_CCMP_KEY;
651 ccmp->hdr.buf_size =
652 cpu_to_le16(sizeof(struct iwm_umac_key_ccmp) -
653 sizeof(struct iwm_umac_wifi_if));
654
655 memcpy(&ccmp->key_hdr, key_hdr,
656 sizeof(struct iwm_umac_key_hdr));
657
658 memcpy(ccmp->key, key_data, key_len);
659
660 if (key->flags & IW_ENCODE_EXT_RX_SEQ_VALID)
661 memcpy(ccmp->iv_count, key->rx_seq, 6);
662
663 cmd_size = sizeof(struct iwm_umac_key_ccmp);
664 break;
665
666 case UMAC_CIPHER_TYPE_TKIP:
667 key_hdr->key_idx++;
668 tkip->hdr.oid = UMAC_WIFI_IF_CMD_ADD_TKIP_KEY;
669 tkip->hdr.buf_size =
670 cpu_to_le16(sizeof(struct iwm_umac_key_tkip) -
671 sizeof(struct iwm_umac_wifi_if));
672
673 memcpy(&tkip->key_hdr, key_hdr,
674 sizeof(struct iwm_umac_key_hdr));
675
676 memcpy(tkip->tkip_key, key_data, IWM_TKIP_KEY_SIZE);
677 memcpy(tkip->mic_tx_key, key_data + IWM_TKIP_KEY_SIZE,
678 IWM_TKIP_MIC_SIZE);
679 memcpy(tkip->mic_rx_key,
680 key_data + IWM_TKIP_KEY_SIZE + IWM_TKIP_MIC_SIZE,
681 IWM_TKIP_MIC_SIZE);
682
683 if (key->flags & IW_ENCODE_EXT_RX_SEQ_VALID)
684 memcpy(ccmp->iv_count, key->rx_seq, 6);
685
686 cmd_size = sizeof(struct iwm_umac_key_tkip);
687 break;
688
689 default:
690 return -ENOTSUPP;
691 }
692
693 if ((key->alg == UMAC_CIPHER_TYPE_CCMP) ||
694 (key->alg == UMAC_CIPHER_TYPE_TKIP))
695 /*
696 * UGLY_UGLY_UGLY
697 * Copied HACK from the MWG driver.
698 * Without it, the key is set before the second
699 * EAPOL frame is sent, and the latter is thus
700 * encrypted.
701 */
702 schedule_timeout_interruptible(usecs_to_jiffies(300));
703
704 ret = iwm_send_wifi_if_cmd(iwm, cmd, cmd_size, 1);
705 if (ret < 0)
706 goto err;
707
708 /*
709 * We need a default key only if it is set and
710 * if we're doing WEP.
711 */
712 if (iwm->default_key == key &&
713 ((key->alg == UMAC_CIPHER_TYPE_WEP_40) ||
714 (key->alg == UMAC_CIPHER_TYPE_WEP_104))) {
715 ret = iwm_set_tx_key(iwm, key_idx);
716 if (ret < 0)
717 goto err;
718 }
719 } else {
720 struct iwm_umac_key_remove key_remove;
721
722 key_remove.hdr.oid = UMAC_WIFI_IF_CMD_REMOVE_KEY;
723 key_remove.hdr.buf_size =
724 cpu_to_le16(sizeof(struct iwm_umac_key_remove) -
725 sizeof(struct iwm_umac_wifi_if));
726 memcpy(&key_remove.key_hdr, key_hdr,
727 sizeof(struct iwm_umac_key_hdr));
728
729 ret = iwm_send_wifi_if_cmd(iwm, &key_remove,
730 sizeof(struct iwm_umac_key_remove),
731 1);
732 if (ret < 0)
733 return ret;
734
735 iwm->keys[key_idx].in_use = 0;
736 }
737
738 return 0;
739
740 err:
741 kfree(key);
742 return ret;
743}
744
745
746int iwm_send_mlme_profile(struct iwm_priv *iwm)
747{
748 int ret, i;
749 struct iwm_umac_profile profile;
750
751 memcpy(&profile, iwm->umac_profile, sizeof(profile));
752
753 profile.hdr.oid = UMAC_WIFI_IF_CMD_SET_PROFILE;
754 profile.hdr.buf_size = cpu_to_le16(sizeof(struct iwm_umac_profile) -
755 sizeof(struct iwm_umac_wifi_if));
756
757 ret = iwm_send_wifi_if_cmd(iwm, &profile, sizeof(profile), 1);
758 if (ret < 0) {
759 IWM_ERR(iwm, "Send profile command failed\n");
760 return ret;
761 }
762
Zhu Yibb9f8692009-05-21 21:20:45 +0800763 for (i = 0; i < IWM_NUM_KEYS; i++)
764 if (iwm->keys[i].in_use) {
765 int default_key = 0;
766 struct iwm_key *key = &iwm->keys[i];
767
768 if (key == iwm->default_key)
769 default_key = 1;
770
771 /* Wait for the profile before sending the keys */
772 wait_event_interruptible_timeout(iwm->mlme_queue,
773 (test_bit(IWM_STATUS_ASSOCIATING, &iwm->status) ||
774 test_bit(IWM_STATUS_ASSOCIATED, &iwm->status)),
775 3 * HZ);
776
777 ret = iwm_set_key(iwm, 0, default_key, key);
778 if (ret < 0)
779 return ret;
780 }
781
782 return 0;
783}
784
785int iwm_invalidate_mlme_profile(struct iwm_priv *iwm)
786{
Zhu Yibb9f8692009-05-21 21:20:45 +0800787 struct iwm_umac_invalidate_profile invalid;
Samuel Ortiza70742f2009-06-15 21:59:51 +0200788 int ret;
Zhu Yibb9f8692009-05-21 21:20:45 +0800789
790 invalid.hdr.oid = UMAC_WIFI_IF_CMD_INVALIDATE_PROFILE;
791 invalid.hdr.buf_size =
792 cpu_to_le16(sizeof(struct iwm_umac_invalidate_profile) -
793 sizeof(struct iwm_umac_wifi_if));
794
795 invalid.reason = WLAN_REASON_UNSPECIFIED;
796
797 ret = iwm_send_wifi_if_cmd(iwm, &invalid, sizeof(invalid), 1);
798 if (ret < 0)
799 return ret;
800
801 ret = wait_event_interruptible_timeout(iwm->mlme_queue,
Samuel Ortiza70742f2009-06-15 21:59:51 +0200802 (iwm->umac_profile_active == 0), 2 * HZ);
Zhu Yibb9f8692009-05-21 21:20:45 +0800803 if (!ret)
804 return -EBUSY;
805
806 return 0;
807}
808
809int iwm_send_umac_stats_req(struct iwm_priv *iwm, u32 flags)
810{
811 struct iwm_udma_wifi_cmd udma_cmd = UDMA_UMAC_INIT;
812 struct iwm_umac_cmd umac_cmd;
813 struct iwm_umac_cmd_stats_req stats_req;
814
815 stats_req.flags = cpu_to_le32(flags);
816
817 umac_cmd.id = UMAC_CMD_OPCODE_STATISTIC_REQUEST;
818 umac_cmd.resp = 0;
819
820 return iwm_hal_send_umac_cmd(iwm, &udma_cmd, &umac_cmd, &stats_req,
821 sizeof(struct iwm_umac_cmd_stats_req));
822}
823
824int iwm_send_umac_channel_list(struct iwm_priv *iwm)
825{
826 struct iwm_udma_wifi_cmd udma_cmd = UDMA_UMAC_INIT;
827 struct iwm_umac_cmd umac_cmd;
828 struct iwm_umac_cmd_get_channel_list *ch_list;
829 int size = sizeof(struct iwm_umac_cmd_get_channel_list) +
830 sizeof(struct iwm_umac_channel_info) * 4;
831 int ret;
832
833 ch_list = kzalloc(size, GFP_KERNEL);
834 if (!ch_list) {
835 IWM_ERR(iwm, "Couldn't allocate channel list cmd\n");
836 return -ENOMEM;
837 }
838
839 ch_list->ch[0].band = UMAC_BAND_2GHZ;
840 ch_list->ch[0].type = UMAC_CHANNEL_WIDTH_20MHZ;
841 ch_list->ch[0].flags = UMAC_CHANNEL_FLAG_VALID;
842
843 ch_list->ch[1].band = UMAC_BAND_5GHZ;
844 ch_list->ch[1].type = UMAC_CHANNEL_WIDTH_20MHZ;
845 ch_list->ch[1].flags = UMAC_CHANNEL_FLAG_VALID;
846
847 ch_list->ch[2].band = UMAC_BAND_2GHZ;
848 ch_list->ch[2].type = UMAC_CHANNEL_WIDTH_20MHZ;
849 ch_list->ch[2].flags = UMAC_CHANNEL_FLAG_VALID | UMAC_CHANNEL_FLAG_IBSS;
850
851 ch_list->ch[3].band = UMAC_BAND_5GHZ;
852 ch_list->ch[3].type = UMAC_CHANNEL_WIDTH_20MHZ;
853 ch_list->ch[3].flags = UMAC_CHANNEL_FLAG_VALID | UMAC_CHANNEL_FLAG_IBSS;
854
855 ch_list->count = cpu_to_le16(4);
856
857 umac_cmd.id = UMAC_CMD_OPCODE_GET_CHAN_INFO_LIST;
858 umac_cmd.resp = 1;
859
860 ret = iwm_hal_send_umac_cmd(iwm, &udma_cmd, &umac_cmd, ch_list, size);
861
862 kfree(ch_list);
863
864 return ret;
865}
866
867int iwm_scan_ssids(struct iwm_priv *iwm, struct cfg80211_ssid *ssids,
868 int ssid_num)
869{
870 struct iwm_umac_cmd_scan_request req;
871 int i, ret;
872
873 memset(&req, 0, sizeof(struct iwm_umac_cmd_scan_request));
874
875 req.hdr.oid = UMAC_WIFI_IF_CMD_SCAN_REQUEST;
876 req.hdr.buf_size = cpu_to_le16(sizeof(struct iwm_umac_cmd_scan_request)
877 - sizeof(struct iwm_umac_wifi_if));
878 req.type = UMAC_WIFI_IF_SCAN_TYPE_USER;
879 req.timeout = 2;
880 req.seq_num = iwm->scan_id;
881 req.ssid_num = min(ssid_num, UMAC_WIFI_IF_PROBE_OPTION_MAX);
882
883 for (i = 0; i < req.ssid_num; i++) {
884 memcpy(req.ssids[i].ssid, ssids[i].ssid, ssids[i].ssid_len);
885 req.ssids[i].ssid_len = ssids[i].ssid_len;
886 }
887
888 ret = iwm_send_wifi_if_cmd(iwm, &req, sizeof(req), 0);
889 if (ret < 0) {
890 IWM_ERR(iwm, "Couldn't send scan request\n");
891 return ret;
892 }
893
894 iwm->scan_id = iwm->scan_id++ % IWM_SCAN_ID_MAX;
895
896 return 0;
897}
898
899int iwm_scan_one_ssid(struct iwm_priv *iwm, u8 *ssid, int ssid_len)
900{
901 struct cfg80211_ssid one_ssid;
902
903 if (test_and_set_bit(IWM_STATUS_SCANNING, &iwm->status))
904 return 0;
905
906 one_ssid.ssid_len = min(ssid_len, IEEE80211_MAX_SSID_LEN);
907 memcpy(&one_ssid.ssid, ssid, one_ssid.ssid_len);
908
909 return iwm_scan_ssids(iwm, &one_ssid, 1);
910}
911
912int iwm_target_reset(struct iwm_priv *iwm)
913{
914 struct iwm_udma_nonwifi_cmd target_cmd;
915
916 target_cmd.opcode = UMAC_HDI_OUT_OPCODE_REBOOT;
917 target_cmd.addr = 0;
918 target_cmd.op1_sz = 0;
919 target_cmd.op2 = 0;
920 target_cmd.handle_by_hw = 0;
921 target_cmd.resp = 0;
922 target_cmd.eop = 1;
923
924 return iwm_hal_send_target_cmd(iwm, &target_cmd, NULL);
925}