blob: a37b30cef4894c6da466989be64546de3f38af94 [file] [log] [blame]
Kalle Valoef2f8d42009-06-12 14:17:19 +03001#include "wl1251_cmd.h"
Kalle Valo2f01a1f2009-04-29 23:33:31 +03002
3#include <linux/module.h>
Tejun Heo5a0e3ad2010-03-24 17:04:11 +09004#include <linux/slab.h>
Kalle Valo2f01a1f2009-04-29 23:33:31 +03005#include <linux/crc7.h>
Kalle Valo2f01a1f2009-04-29 23:33:31 +03006
Kalle Valo13674112009-06-12 14:17:25 +03007#include "wl1251.h"
Kalle Valo29d904c2009-08-07 13:35:11 +03008#include "wl1251_reg.h"
Bob Copeland0764de62009-08-07 13:32:56 +03009#include "wl1251_io.h"
Kalle Valoef2f8d42009-06-12 14:17:19 +030010#include "wl1251_ps.h"
11#include "wl1251_acx.h"
Kalle Valo2f01a1f2009-04-29 23:33:31 +030012
Kalle Valoff258392009-06-12 14:14:19 +030013/**
14 * send command to firmware
15 *
16 * @wl: wl struct
17 * @id: command id
18 * @buf: buffer containing the command, must work with dma
19 * @len: length of the buffer
20 */
Kalle Valo80301cd2009-06-12 14:17:39 +030021int wl1251_cmd_send(struct wl1251 *wl, u16 id, void *buf, size_t len)
Kalle Valo2f01a1f2009-04-29 23:33:31 +030022{
Kalle Valo80301cd2009-06-12 14:17:39 +030023 struct wl1251_cmd_header *cmd;
Kalle Valo2f01a1f2009-04-29 23:33:31 +030024 unsigned long timeout;
Kalle Valo2f01a1f2009-04-29 23:33:31 +030025 u32 intr;
26 int ret = 0;
27
Kalle Valoff258392009-06-12 14:14:19 +030028 cmd = buf;
29 cmd->id = id;
30 cmd->status = 0;
31
32 WARN_ON(len % 4 != 0);
Kalle Valo2f01a1f2009-04-29 23:33:31 +030033
Bob Copeland0764de62009-08-07 13:32:56 +030034 wl1251_mem_write(wl, wl->cmd_box_addr, buf, len);
Kalle Valo2f01a1f2009-04-29 23:33:31 +030035
Kalle Valo80301cd2009-06-12 14:17:39 +030036 wl1251_reg_write32(wl, ACX_REG_INTERRUPT_TRIG, INTR_TRIG_CMD);
Kalle Valo2f01a1f2009-04-29 23:33:31 +030037
Kalle Valo80301cd2009-06-12 14:17:39 +030038 timeout = jiffies + msecs_to_jiffies(WL1251_COMMAND_TIMEOUT);
Kalle Valo2f01a1f2009-04-29 23:33:31 +030039
Kalle Valo80301cd2009-06-12 14:17:39 +030040 intr = wl1251_reg_read32(wl, ACX_REG_INTERRUPT_NO_CLEAR);
Kalle Valo0e71bb02009-08-07 13:33:57 +030041 while (!(intr & WL1251_ACX_INTR_CMD_COMPLETE)) {
Kalle Valo2f01a1f2009-04-29 23:33:31 +030042 if (time_after(jiffies, timeout)) {
Kalle Valo80301cd2009-06-12 14:17:39 +030043 wl1251_error("command complete timeout");
Kalle Valo2f01a1f2009-04-29 23:33:31 +030044 ret = -ETIMEDOUT;
45 goto out;
46 }
47
48 msleep(1);
49
Kalle Valo80301cd2009-06-12 14:17:39 +030050 intr = wl1251_reg_read32(wl, ACX_REG_INTERRUPT_NO_CLEAR);
Kalle Valo2f01a1f2009-04-29 23:33:31 +030051 }
52
Kalle Valo80301cd2009-06-12 14:17:39 +030053 wl1251_reg_write32(wl, ACX_REG_INTERRUPT_ACK,
Kalle Valo0e71bb02009-08-07 13:33:57 +030054 WL1251_ACX_INTR_CMD_COMPLETE);
Kalle Valo2f01a1f2009-04-29 23:33:31 +030055
56out:
Kalle Valo2f01a1f2009-04-29 23:33:31 +030057 return ret;
58}
59
Kalle Valoff258392009-06-12 14:14:19 +030060/**
61 * send test command to firmware
62 *
63 * @wl: wl struct
Ari Kauppi6021b282009-06-12 14:16:13 +030064 * @buf: buffer containing the command, with all headers, must work with dma
Kalle Valoff258392009-06-12 14:14:19 +030065 * @len: length of the buffer
66 * @answer: is answer needed
Kalle Valoff258392009-06-12 14:14:19 +030067 */
Kalle Valo80301cd2009-06-12 14:17:39 +030068int wl1251_cmd_test(struct wl1251 *wl, void *buf, size_t buf_len, u8 answer)
Kalle Valo2f01a1f2009-04-29 23:33:31 +030069{
70 int ret;
71
Kalle Valo80301cd2009-06-12 14:17:39 +030072 wl1251_debug(DEBUG_CMD, "cmd test");
Kalle Valo2f01a1f2009-04-29 23:33:31 +030073
Kalle Valo80301cd2009-06-12 14:17:39 +030074 ret = wl1251_cmd_send(wl, CMD_TEST, buf, buf_len);
Kalle Valoff258392009-06-12 14:14:19 +030075
Kalle Valo2f01a1f2009-04-29 23:33:31 +030076 if (ret < 0) {
Kalle Valo80301cd2009-06-12 14:17:39 +030077 wl1251_warning("TEST command failed");
Ari Kauppi6021b282009-06-12 14:16:13 +030078 return ret;
Kalle Valo2f01a1f2009-04-29 23:33:31 +030079 }
80
81 if (answer) {
Kalle Valo80301cd2009-06-12 14:17:39 +030082 struct wl1251_command *cmd_answer;
Ari Kauppi6021b282009-06-12 14:16:13 +030083
Kalle Valo2f01a1f2009-04-29 23:33:31 +030084 /*
85 * The test command got in, we can read the answer.
Kalle Valo80301cd2009-06-12 14:17:39 +030086 * The answer would be a wl1251_command, where the
Kalle Valo2f01a1f2009-04-29 23:33:31 +030087 * parameter array contains the actual answer.
88 */
Bob Copeland0764de62009-08-07 13:32:56 +030089 wl1251_mem_read(wl, wl->cmd_box_addr, buf, buf_len);
Kalle Valo2f01a1f2009-04-29 23:33:31 +030090
Ari Kauppi6021b282009-06-12 14:16:13 +030091 cmd_answer = buf;
92
93 if (cmd_answer->header.status != CMD_STATUS_SUCCESS)
Kalle Valo80301cd2009-06-12 14:17:39 +030094 wl1251_error("TEST command answer error: %d",
Ari Kauppi6021b282009-06-12 14:16:13 +030095 cmd_answer->header.status);
Kalle Valo2f01a1f2009-04-29 23:33:31 +030096 }
97
Ari Kauppi6021b282009-06-12 14:16:13 +030098 return 0;
Kalle Valo2f01a1f2009-04-29 23:33:31 +030099}
100
Kalle Valoff258392009-06-12 14:14:19 +0300101/**
102 * read acx from firmware
103 *
104 * @wl: wl struct
105 * @id: acx id
106 * @buf: buffer for the response, including all headers, must work with dma
107 * @len: lenght of buf
108 */
Kalle Valo80301cd2009-06-12 14:17:39 +0300109int wl1251_cmd_interrogate(struct wl1251 *wl, u16 id, void *buf, size_t len)
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300110{
Kalle Valoff258392009-06-12 14:14:19 +0300111 struct acx_header *acx = buf;
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300112 int ret;
113
Kalle Valo80301cd2009-06-12 14:17:39 +0300114 wl1251_debug(DEBUG_CMD, "cmd interrogate");
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300115
Kalle Valoff258392009-06-12 14:14:19 +0300116 acx->id = id;
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300117
Kalle Valoff258392009-06-12 14:14:19 +0300118 /* payload length, does not include any headers */
119 acx->len = len - sizeof(*acx);
120
Kalle Valo80301cd2009-06-12 14:17:39 +0300121 ret = wl1251_cmd_send(wl, CMD_INTERROGATE, acx, sizeof(*acx));
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300122 if (ret < 0) {
Kalle Valo80301cd2009-06-12 14:17:39 +0300123 wl1251_error("INTERROGATE command failed");
Kalle Valoff258392009-06-12 14:14:19 +0300124 goto out;
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300125 }
126
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300127 /* the interrogate command got in, we can read the answer */
Bob Copeland0764de62009-08-07 13:32:56 +0300128 wl1251_mem_read(wl, wl->cmd_box_addr, buf, len);
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300129
Kalle Valoff258392009-06-12 14:14:19 +0300130 acx = buf;
131 if (acx->cmd.status != CMD_STATUS_SUCCESS)
Kalle Valo80301cd2009-06-12 14:17:39 +0300132 wl1251_error("INTERROGATE command error: %d",
Kalle Valoff258392009-06-12 14:14:19 +0300133 acx->cmd.status);
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300134
Kalle Valoff258392009-06-12 14:14:19 +0300135out:
136 return ret;
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300137}
138
Kalle Valoff258392009-06-12 14:14:19 +0300139/**
140 * write acx value to firmware
141 *
142 * @wl: wl struct
143 * @id: acx id
144 * @buf: buffer containing acx, including all headers, must work with dma
145 * @len: length of buf
146 */
Kalle Valo80301cd2009-06-12 14:17:39 +0300147int wl1251_cmd_configure(struct wl1251 *wl, u16 id, void *buf, size_t len)
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300148{
Kalle Valoff258392009-06-12 14:14:19 +0300149 struct acx_header *acx = buf;
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300150 int ret;
151
Kalle Valo80301cd2009-06-12 14:17:39 +0300152 wl1251_debug(DEBUG_CMD, "cmd configure");
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300153
Kalle Valoff258392009-06-12 14:14:19 +0300154 acx->id = id;
155
156 /* payload length, does not include any headers */
157 acx->len = len - sizeof(*acx);
158
Kalle Valo80301cd2009-06-12 14:17:39 +0300159 ret = wl1251_cmd_send(wl, CMD_CONFIGURE, acx, len);
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300160 if (ret < 0) {
Kalle Valo80301cd2009-06-12 14:17:39 +0300161 wl1251_warning("CONFIGURE command NOK");
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300162 return ret;
163 }
164
165 return 0;
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300166}
167
Kalle Valo80301cd2009-06-12 14:17:39 +0300168int wl1251_cmd_vbm(struct wl1251 *wl, u8 identity,
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300169 void *bitmap, u16 bitmap_len, u8 bitmap_control)
170{
Kalle Valo80301cd2009-06-12 14:17:39 +0300171 struct wl1251_cmd_vbm_update *vbm;
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300172 int ret;
173
Kalle Valo80301cd2009-06-12 14:17:39 +0300174 wl1251_debug(DEBUG_CMD, "cmd vbm");
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300175
Kalle Valoff258392009-06-12 14:14:19 +0300176 vbm = kzalloc(sizeof(*vbm), GFP_KERNEL);
177 if (!vbm) {
178 ret = -ENOMEM;
179 goto out;
180 }
181
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300182 /* Count and period will be filled by the target */
Kalle Valoff258392009-06-12 14:14:19 +0300183 vbm->tim.bitmap_ctrl = bitmap_control;
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300184 if (bitmap_len > PARTIAL_VBM_MAX) {
Kalle Valo80301cd2009-06-12 14:17:39 +0300185 wl1251_warning("cmd vbm len is %d B, truncating to %d",
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300186 bitmap_len, PARTIAL_VBM_MAX);
187 bitmap_len = PARTIAL_VBM_MAX;
188 }
Kalle Valoff258392009-06-12 14:14:19 +0300189 memcpy(vbm->tim.pvb_field, bitmap, bitmap_len);
190 vbm->tim.identity = identity;
191 vbm->tim.length = bitmap_len + 3;
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300192
Kalle Valoff258392009-06-12 14:14:19 +0300193 vbm->len = cpu_to_le16(bitmap_len + 5);
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300194
Kalle Valo80301cd2009-06-12 14:17:39 +0300195 ret = wl1251_cmd_send(wl, CMD_VBM, vbm, sizeof(*vbm));
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300196 if (ret < 0) {
Kalle Valo80301cd2009-06-12 14:17:39 +0300197 wl1251_error("VBM command failed");
Kalle Valoff258392009-06-12 14:14:19 +0300198 goto out;
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300199 }
200
Kalle Valoff258392009-06-12 14:14:19 +0300201out:
202 kfree(vbm);
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300203 return 0;
204}
205
Kalle Valo80301cd2009-06-12 14:17:39 +0300206int wl1251_cmd_data_path(struct wl1251 *wl, u8 channel, bool enable)
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300207{
Kalle Valoff258392009-06-12 14:14:19 +0300208 struct cmd_enabledisable_path *cmd;
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300209 int ret;
210 u16 cmd_rx, cmd_tx;
211
Kalle Valo80301cd2009-06-12 14:17:39 +0300212 wl1251_debug(DEBUG_CMD, "cmd data path");
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300213
Kalle Valoff258392009-06-12 14:14:19 +0300214 cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
215 if (!cmd) {
216 ret = -ENOMEM;
217 goto out;
218 }
219
220 cmd->channel = channel;
221
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300222 if (enable) {
223 cmd_rx = CMD_ENABLE_RX;
224 cmd_tx = CMD_ENABLE_TX;
225 } else {
226 cmd_rx = CMD_DISABLE_RX;
227 cmd_tx = CMD_DISABLE_TX;
228 }
229
Kalle Valo80301cd2009-06-12 14:17:39 +0300230 ret = wl1251_cmd_send(wl, cmd_rx, cmd, sizeof(*cmd));
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300231 if (ret < 0) {
Kalle Valo80301cd2009-06-12 14:17:39 +0300232 wl1251_error("rx %s cmd for channel %d failed",
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300233 enable ? "start" : "stop", channel);
Kalle Valoff258392009-06-12 14:14:19 +0300234 goto out;
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300235 }
236
Kalle Valo80301cd2009-06-12 14:17:39 +0300237 wl1251_debug(DEBUG_BOOT, "rx %s cmd channel %d",
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300238 enable ? "start" : "stop", channel);
239
Kalle Valo80301cd2009-06-12 14:17:39 +0300240 ret = wl1251_cmd_send(wl, cmd_tx, cmd, sizeof(*cmd));
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300241 if (ret < 0) {
Kalle Valo80301cd2009-06-12 14:17:39 +0300242 wl1251_error("tx %s cmd for channel %d failed",
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300243 enable ? "start" : "stop", channel);
244 return ret;
245 }
246
Kalle Valo80301cd2009-06-12 14:17:39 +0300247 wl1251_debug(DEBUG_BOOT, "tx %s cmd channel %d",
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300248 enable ? "start" : "stop", channel);
249
Kalle Valoff258392009-06-12 14:14:19 +0300250out:
251 kfree(cmd);
252 return ret;
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300253}
254
Kalle Valoc88f8752009-08-07 13:34:34 +0300255int wl1251_cmd_join(struct wl1251 *wl, u8 bss_type, u8 channel,
256 u16 beacon_interval, u8 dtim_interval)
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300257{
Kalle Valoff258392009-06-12 14:14:19 +0300258 struct cmd_join *join;
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300259 int ret, i;
260 u8 *bssid;
261
Kalle Valoff258392009-06-12 14:14:19 +0300262 join = kzalloc(sizeof(*join), GFP_KERNEL);
263 if (!join) {
264 ret = -ENOMEM;
265 goto out;
266 }
267
Kalle Valoc88f8752009-08-07 13:34:34 +0300268 wl1251_debug(DEBUG_CMD, "cmd join%s ch %d %d/%d",
Kalle Valoe2fd4612009-08-07 13:34:12 +0300269 bss_type == BSS_TYPE_IBSS ? " ibss" : "",
Kalle Valoc88f8752009-08-07 13:34:34 +0300270 channel, beacon_interval, dtim_interval);
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300271
272 /* Reverse order BSSID */
Kalle Valoff258392009-06-12 14:14:19 +0300273 bssid = (u8 *) &join->bssid_lsb;
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300274 for (i = 0; i < ETH_ALEN; i++)
275 bssid[i] = wl->bssid[ETH_ALEN - i - 1];
276
Kalle Valoff258392009-06-12 14:14:19 +0300277 join->rx_config_options = wl->rx_config;
278 join->rx_filter_options = wl->rx_filter;
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300279
Kalle Valof26b32e2009-08-07 13:35:33 +0300280 /*
281 * FIXME: disable temporarily all filters because after commit
282 * 9cef8737 "mac80211: fix managed mode BSSID handling" broke
283 * association. The filter logic needs to be implemented properly
284 * and once that is done, this hack can be removed.
285 */
286 join->rx_config_options = 0;
287 join->rx_filter_options = WL1251_DEFAULT_RX_FILTER;
288
Kalle Valoff258392009-06-12 14:14:19 +0300289 join->basic_rate_set = RATE_MASK_1MBPS | RATE_MASK_2MBPS |
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300290 RATE_MASK_5_5MBPS | RATE_MASK_11MBPS;
291
Kalle Valoff258392009-06-12 14:14:19 +0300292 join->beacon_interval = beacon_interval;
293 join->dtim_interval = dtim_interval;
294 join->bss_type = bss_type;
Kalle Valoc88f8752009-08-07 13:34:34 +0300295 join->channel = channel;
Kalle Valoff258392009-06-12 14:14:19 +0300296 join->ctrl = JOIN_CMD_CTRL_TX_FLUSH;
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300297
Kalle Valo80301cd2009-06-12 14:17:39 +0300298 ret = wl1251_cmd_send(wl, CMD_START_JOIN, join, sizeof(*join));
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300299 if (ret < 0) {
Kalle Valo80301cd2009-06-12 14:17:39 +0300300 wl1251_error("failed to initiate cmd join");
Kalle Valoff258392009-06-12 14:14:19 +0300301 goto out;
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300302 }
303
Kalle Valoff258392009-06-12 14:14:19 +0300304out:
305 kfree(join);
306 return ret;
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300307}
308
Kalle Valo80301cd2009-06-12 14:17:39 +0300309int wl1251_cmd_ps_mode(struct wl1251 *wl, u8 ps_mode)
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300310{
Kalle Valo80301cd2009-06-12 14:17:39 +0300311 struct wl1251_cmd_ps_params *ps_params = NULL;
Kalle Valoff258392009-06-12 14:14:19 +0300312 int ret = 0;
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300313
Kalle Valo80301cd2009-06-12 14:17:39 +0300314 wl1251_debug(DEBUG_CMD, "cmd set ps mode");
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300315
Kalle Valoff258392009-06-12 14:14:19 +0300316 ps_params = kzalloc(sizeof(*ps_params), GFP_KERNEL);
317 if (!ps_params) {
318 ret = -ENOMEM;
319 goto out;
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300320 }
321
Kalle Valoff258392009-06-12 14:14:19 +0300322 ps_params->ps_mode = ps_mode;
323 ps_params->send_null_data = 1;
324 ps_params->retries = 5;
325 ps_params->hang_over_period = 128;
326 ps_params->null_data_rate = 1; /* 1 Mbps */
327
Kalle Valo80301cd2009-06-12 14:17:39 +0300328 ret = wl1251_cmd_send(wl, CMD_SET_PS_MODE, ps_params,
Kalle Valoff258392009-06-12 14:14:19 +0300329 sizeof(*ps_params));
330 if (ret < 0) {
Kalle Valo80301cd2009-06-12 14:17:39 +0300331 wl1251_error("cmd set_ps_mode failed");
Kalle Valoff258392009-06-12 14:14:19 +0300332 goto out;
333 }
334
335out:
336 kfree(ps_params);
337 return ret;
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300338}
339
Kalle Valo80301cd2009-06-12 14:17:39 +0300340int wl1251_cmd_read_memory(struct wl1251 *wl, u32 addr, void *answer,
Kalle Valoff258392009-06-12 14:14:19 +0300341 size_t len)
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300342{
Kalle Valoff258392009-06-12 14:14:19 +0300343 struct cmd_read_write_memory *cmd;
344 int ret = 0;
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300345
Kalle Valo80301cd2009-06-12 14:17:39 +0300346 wl1251_debug(DEBUG_CMD, "cmd read memory");
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300347
Kalle Valoff258392009-06-12 14:14:19 +0300348 cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
349 if (!cmd) {
350 ret = -ENOMEM;
351 goto out;
352 }
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300353
Kalle Valoff258392009-06-12 14:14:19 +0300354 WARN_ON(len > MAX_READ_SIZE);
355 len = min_t(size_t, len, MAX_READ_SIZE);
356
357 cmd->addr = addr;
358 cmd->size = len;
359
Kalle Valo80301cd2009-06-12 14:17:39 +0300360 ret = wl1251_cmd_send(wl, CMD_READ_MEMORY, cmd, sizeof(*cmd));
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300361 if (ret < 0) {
Kalle Valo80301cd2009-06-12 14:17:39 +0300362 wl1251_error("read memory command failed: %d", ret);
Kalle Valoff258392009-06-12 14:14:19 +0300363 goto out;
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300364 }
365
366 /* the read command got in, we can now read the answer */
Bob Copeland0764de62009-08-07 13:32:56 +0300367 wl1251_mem_read(wl, wl->cmd_box_addr, cmd, sizeof(*cmd));
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300368
Kalle Valoff258392009-06-12 14:14:19 +0300369 if (cmd->header.status != CMD_STATUS_SUCCESS)
Kalle Valo80301cd2009-06-12 14:17:39 +0300370 wl1251_error("error in read command result: %d",
Kalle Valoff258392009-06-12 14:14:19 +0300371 cmd->header.status);
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300372
Kalle Valoff258392009-06-12 14:14:19 +0300373 memcpy(answer, cmd->value, len);
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300374
Kalle Valoff258392009-06-12 14:14:19 +0300375out:
376 kfree(cmd);
377 return ret;
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300378}
379
Kalle Valo80301cd2009-06-12 14:17:39 +0300380int wl1251_cmd_template_set(struct wl1251 *wl, u16 cmd_id,
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300381 void *buf, size_t buf_len)
382{
Kalle Valo80301cd2009-06-12 14:17:39 +0300383 struct wl1251_cmd_packet_template *cmd;
Kalle Valoff258392009-06-12 14:14:19 +0300384 size_t cmd_len;
385 int ret = 0;
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300386
Kalle Valo80301cd2009-06-12 14:17:39 +0300387 wl1251_debug(DEBUG_CMD, "cmd template %d", cmd_id);
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300388
Kalle Valo80301cd2009-06-12 14:17:39 +0300389 WARN_ON(buf_len > WL1251_MAX_TEMPLATE_SIZE);
390 buf_len = min_t(size_t, buf_len, WL1251_MAX_TEMPLATE_SIZE);
Kalle Valoff258392009-06-12 14:14:19 +0300391 cmd_len = ALIGN(sizeof(*cmd) + buf_len, 4);
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300392
Kalle Valoff258392009-06-12 14:14:19 +0300393 cmd = kzalloc(cmd_len, GFP_KERNEL);
394 if (!cmd) {
395 ret = -ENOMEM;
396 goto out;
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300397 }
398
Kalle Valoff258392009-06-12 14:14:19 +0300399 cmd->size = cpu_to_le16(buf_len);
400
401 if (buf)
402 memcpy(cmd->data, buf, buf_len);
403
Kalle Valo80301cd2009-06-12 14:17:39 +0300404 ret = wl1251_cmd_send(wl, cmd_id, cmd, cmd_len);
Kalle Valoff258392009-06-12 14:14:19 +0300405 if (ret < 0) {
Kalle Valo80301cd2009-06-12 14:17:39 +0300406 wl1251_warning("cmd set_template failed: %d", ret);
Kalle Valoff258392009-06-12 14:14:19 +0300407 goto out;
408 }
409
410out:
411 kfree(cmd);
412 return ret;
Kalle Valo2f01a1f2009-04-29 23:33:31 +0300413}
Kalle Valo3a98c302010-01-05 20:16:51 +0200414
415int wl1251_cmd_scan(struct wl1251 *wl, u8 *ssid, size_t ssid_len,
Kalle Valodc52f0a2010-01-05 20:17:03 +0200416 struct ieee80211_channel *channels[],
Kalle Valo3a98c302010-01-05 20:16:51 +0200417 unsigned int n_channels, unsigned int n_probes)
418{
419 struct wl1251_cmd_scan *cmd;
420 int i, ret = 0;
421
422 wl1251_debug(DEBUG_CMD, "cmd scan");
423
424 cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
425 if (!cmd)
426 return -ENOMEM;
427
428 cmd->params.rx_config_options = cpu_to_le32(CFG_RX_ALL_GOOD);
429 cmd->params.rx_filter_options = cpu_to_le32(CFG_RX_PRSP_EN |
430 CFG_RX_MGMT_EN |
431 CFG_RX_BCN_EN);
432 cmd->params.scan_options = 0;
433 cmd->params.num_channels = n_channels;
434 cmd->params.num_probe_requests = n_probes;
435 cmd->params.tx_rate = cpu_to_le16(1 << 1); /* 2 Mbps */
436 cmd->params.tid_trigger = 0;
437
438 for (i = 0; i < n_channels; i++) {
439 cmd->channels[i].min_duration =
440 cpu_to_le32(WL1251_SCAN_MIN_DURATION);
441 cmd->channels[i].max_duration =
442 cpu_to_le32(WL1251_SCAN_MAX_DURATION);
443 memset(&cmd->channels[i].bssid_lsb, 0xff, 4);
444 memset(&cmd->channels[i].bssid_msb, 0xff, 2);
445 cmd->channels[i].early_termination = 0;
446 cmd->channels[i].tx_power_att = 0;
Kalle Valodc52f0a2010-01-05 20:17:03 +0200447 cmd->channels[i].channel = channels[i]->hw_value;
Kalle Valo3a98c302010-01-05 20:16:51 +0200448 }
449
450 cmd->params.ssid_len = ssid_len;
451 if (ssid)
452 memcpy(cmd->params.ssid, ssid, ssid_len);
453
454 ret = wl1251_cmd_send(wl, CMD_SCAN, cmd, sizeof(*cmd));
455 if (ret < 0) {
456 wl1251_error("cmd scan failed: %d", ret);
457 goto out;
458 }
459
460 wl1251_mem_read(wl, wl->cmd_box_addr, cmd, sizeof(*cmd));
461
462 if (cmd->header.status != CMD_STATUS_SUCCESS) {
463 wl1251_error("cmd scan status wasn't success: %d",
464 cmd->header.status);
465 ret = -EIO;
466 goto out;
467 }
468
469out:
470 kfree(cmd);
471 return ret;
472}
473
474int wl1251_cmd_trigger_scan_to(struct wl1251 *wl, u32 timeout)
475{
476 struct wl1251_cmd_trigger_scan_to *cmd;
477 int ret;
478
479 wl1251_debug(DEBUG_CMD, "cmd trigger scan to");
480
481 cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
482 if (!cmd)
483 return -ENOMEM;
484
485 cmd->timeout = timeout;
486
487 ret = wl1251_cmd_send(wl, CMD_SCAN, cmd, sizeof(*cmd));
488 if (ret < 0) {
489 wl1251_error("cmd trigger scan to failed: %d", ret);
490 goto out;
491 }
492
493out:
494 kfree(cmd);
495 return ret;
496}