Linux Audio

Check our new training course

Loading...
v6.13.7
   1// SPDX-License-Identifier: GPL-2.0-only
   2/*
   3 * This file is part of wl1271
   4 *
   5 * Copyright (C) 2009-2010 Nokia Corporation
   6 *
   7 * Contact: Luciano Coelho <luciano.coelho@nokia.com>
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
   8 */
   9
  10#include <linux/module.h>
  11#include <linux/platform_device.h>
  12#include <linux/pm_runtime.h>
  13#include <linux/spi/spi.h>
  14#include <linux/etherdevice.h>
  15#include <linux/ieee80211.h>
  16#include <linux/slab.h>
  17
  18#include "wlcore.h"
  19#include "debug.h"
  20#include "io.h"
  21#include "acx.h"
  22#include "wl12xx_80211.h"
  23#include "cmd.h"
  24#include "event.h"
  25#include "tx.h"
  26#include "hw_ops.h"
  27
  28#define WL1271_CMD_FAST_POLL_COUNT       50
  29#define WL1271_WAIT_EVENT_FAST_POLL_COUNT 20
  30
  31/*
  32 * send command to firmware
  33 *
  34 * @wl: wl struct
  35 * @id: command id
  36 * @buf: buffer containing the command, must work with dma
  37 * @len: length of the buffer
  38 * return the cmd status code on success.
  39 */
  40static int __wlcore_cmd_send(struct wl1271 *wl, u16 id, void *buf,
  41			     size_t len, size_t res_len)
  42{
  43	struct wl1271_cmd_header *cmd;
  44	unsigned long timeout;
  45	u32 intr;
  46	int ret;
  47	u16 status;
  48	u16 poll_count = 0;
  49
  50	if (unlikely(wl->state == WLCORE_STATE_RESTARTING &&
  51		     id != CMD_STOP_FWLOGGER))
  52		return -EIO;
  53
  54	if (WARN_ON_ONCE(len < sizeof(*cmd)))
  55		return -EIO;
  56
  57	cmd = buf;
  58	cmd->id = cpu_to_le16(id);
  59	cmd->status = 0;
  60
  61	WARN_ON(len % 4 != 0);
  62	WARN_ON(test_bit(WL1271_FLAG_IN_ELP, &wl->flags));
  63
  64	ret = wlcore_write(wl, wl->cmd_box_addr, buf, len, false);
  65	if (ret < 0)
  66		return ret;
  67
  68	/*
  69	 * TODO: we just need this because one bit is in a different
  70	 * place.  Is there any better way?
  71	 */
  72	ret = wl->ops->trigger_cmd(wl, wl->cmd_box_addr, buf, len);
  73	if (ret < 0)
  74		return ret;
  75
  76	timeout = jiffies + msecs_to_jiffies(WL1271_COMMAND_TIMEOUT);
  77
  78	ret = wlcore_read_reg(wl, REG_INTERRUPT_NO_CLEAR, &intr);
  79	if (ret < 0)
  80		return ret;
  81
  82	while (!(intr & WL1271_ACX_INTR_CMD_COMPLETE)) {
  83		if (time_after(jiffies, timeout)) {
  84			wl1271_error("command complete timeout");
  85			return -ETIMEDOUT;
 
  86		}
  87
  88		poll_count++;
  89		if (poll_count < WL1271_CMD_FAST_POLL_COUNT)
  90			udelay(10);
  91		else
  92			msleep(1);
  93
  94		ret = wlcore_read_reg(wl, REG_INTERRUPT_NO_CLEAR, &intr);
  95		if (ret < 0)
  96			return ret;
  97	}
  98
  99	/* read back the status code of the command */
 100	if (res_len == 0)
 101		res_len = sizeof(struct wl1271_cmd_header);
 102
 103	ret = wlcore_read(wl, wl->cmd_box_addr, cmd, res_len, false);
 104	if (ret < 0)
 105		return ret;
 106
 107	status = le16_to_cpu(cmd->status);
 108
 109	ret = wlcore_write_reg(wl, REG_INTERRUPT_ACK,
 110			       WL1271_ACX_INTR_CMD_COMPLETE);
 111	if (ret < 0)
 112		return ret;
 113
 114	return status;
 115}
 116
 117/*
 118 * send command to fw and return cmd status on success
 119 * valid_rets contains a bitmap of allowed error codes
 120 */
 121static int wlcore_cmd_send_failsafe(struct wl1271 *wl, u16 id, void *buf,
 122				    size_t len, size_t res_len,
 123				    unsigned long valid_rets)
 124{
 125	int ret = __wlcore_cmd_send(wl, id, buf, len, res_len);
 126
 127	if (ret < 0)
 128		goto fail;
 129
 130	/* success is always a valid status */
 131	valid_rets |= BIT(CMD_STATUS_SUCCESS);
 132
 133	if (ret >= MAX_COMMAND_STATUS ||
 134	    !test_bit(ret, &valid_rets)) {
 135		wl1271_error("command execute failure %d", ret);
 136		ret = -EIO;
 137		goto fail;
 138	}
 139	return ret;
 
 
 
 140fail:
 
 141	wl12xx_queue_recovery_work(wl);
 142	return ret;
 143}
 144
 145/*
 146 * wrapper for wlcore_cmd_send that accept only CMD_STATUS_SUCCESS
 147 * return 0 on success.
 148 */
 149int wl1271_cmd_send(struct wl1271 *wl, u16 id, void *buf, size_t len,
 150		    size_t res_len)
 151{
 152	int ret = wlcore_cmd_send_failsafe(wl, id, buf, len, res_len, 0);
 153
 154	if (ret < 0)
 155		return ret;
 156	return 0;
 157}
 158EXPORT_SYMBOL_GPL(wl1271_cmd_send);
 159
 160/*
 161 * Poll the mailbox event field until any of the bits in the mask is set or a
 162 * timeout occurs (WL1271_EVENT_TIMEOUT in msecs)
 163 */
 164int wlcore_cmd_wait_for_event_or_timeout(struct wl1271 *wl,
 165					 u32 mask, bool *timeout)
 166{
 167	u32 *events_vector;
 168	u32 event;
 169	unsigned long timeout_time;
 170	u16 poll_count = 0;
 171	int ret = 0;
 172
 173	*timeout = false;
 174
 175	events_vector = kmalloc(sizeof(*events_vector), GFP_KERNEL | GFP_DMA);
 176	if (!events_vector)
 177		return -ENOMEM;
 178
 179	timeout_time = jiffies + msecs_to_jiffies(WL1271_EVENT_TIMEOUT);
 180
 181	ret = pm_runtime_resume_and_get(wl->dev);
 182	if (ret < 0)
 183		goto free_vector;
 184
 185	do {
 186		if (time_after(jiffies, timeout_time)) {
 187			wl1271_debug(DEBUG_CMD, "timeout waiting for event %d",
 188				     (int)mask);
 189			*timeout = true;
 190			goto out;
 191		}
 192
 193		poll_count++;
 194		if (poll_count < WL1271_WAIT_EVENT_FAST_POLL_COUNT)
 195			usleep_range(50, 51);
 196		else
 197			usleep_range(1000, 5000);
 198
 199		/* read from both event fields */
 200		ret = wlcore_read(wl, wl->mbox_ptr[0], events_vector,
 201				  sizeof(*events_vector), false);
 202		if (ret < 0)
 203			goto out;
 204
 205		event = *events_vector & mask;
 206
 207		ret = wlcore_read(wl, wl->mbox_ptr[1], events_vector,
 208				  sizeof(*events_vector), false);
 209		if (ret < 0)
 210			goto out;
 211
 212		event |= *events_vector & mask;
 213	} while (!event);
 214
 215out:
 216	pm_runtime_mark_last_busy(wl->dev);
 217	pm_runtime_put_autosuspend(wl->dev);
 218free_vector:
 219	kfree(events_vector);
 220	return ret;
 221}
 222EXPORT_SYMBOL_GPL(wlcore_cmd_wait_for_event_or_timeout);
 
 
 
 
 
 
 
 
 
 
 
 
 223
 224int wl12xx_cmd_role_enable(struct wl1271 *wl, u8 *addr, u8 role_type,
 225			   u8 *role_id)
 226{
 227	struct wl12xx_cmd_role_enable *cmd;
 228	int ret;
 229
 230	wl1271_debug(DEBUG_CMD, "cmd role enable");
 231
 232	if (WARN_ON(*role_id != WL12XX_INVALID_ROLE_ID))
 233		return -EBUSY;
 234
 235	cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
 236	if (!cmd) {
 237		ret = -ENOMEM;
 238		goto out;
 239	}
 240
 241	/* get role id */
 242	cmd->role_id = find_first_zero_bit(wl->roles_map, WL12XX_MAX_ROLES);
 243	if (cmd->role_id >= WL12XX_MAX_ROLES) {
 244		ret = -EBUSY;
 245		goto out_free;
 246	}
 247
 248	memcpy(cmd->mac_address, addr, ETH_ALEN);
 249	cmd->role_type = role_type;
 250
 251	ret = wl1271_cmd_send(wl, CMD_ROLE_ENABLE, cmd, sizeof(*cmd), 0);
 252	if (ret < 0) {
 253		wl1271_error("failed to initiate cmd role enable");
 254		goto out_free;
 255	}
 256
 257	__set_bit(cmd->role_id, wl->roles_map);
 258	*role_id = cmd->role_id;
 259
 260out_free:
 261	kfree(cmd);
 262
 263out:
 264	return ret;
 265}
 266
 267int wl12xx_cmd_role_disable(struct wl1271 *wl, u8 *role_id)
 268{
 269	struct wl12xx_cmd_role_disable *cmd;
 270	int ret;
 271
 272	wl1271_debug(DEBUG_CMD, "cmd role disable");
 273
 274	if (WARN_ON(*role_id == WL12XX_INVALID_ROLE_ID))
 275		return -ENOENT;
 276
 277	cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
 278	if (!cmd) {
 279		ret = -ENOMEM;
 280		goto out;
 281	}
 282	cmd->role_id = *role_id;
 283
 284	ret = wl1271_cmd_send(wl, CMD_ROLE_DISABLE, cmd, sizeof(*cmd), 0);
 285	if (ret < 0) {
 286		wl1271_error("failed to initiate cmd role disable");
 287		goto out_free;
 288	}
 289
 290	__clear_bit(*role_id, wl->roles_map);
 291	*role_id = WL12XX_INVALID_ROLE_ID;
 292
 293out_free:
 294	kfree(cmd);
 295
 296out:
 297	return ret;
 298}
 299
 300static int wlcore_get_new_session_id(struct wl1271 *wl, u8 hlid)
 301{
 302	if (wl->session_ids[hlid] >= SESSION_COUNTER_MAX)
 303		wl->session_ids[hlid] = 0;
 304
 305	wl->session_ids[hlid]++;
 306
 307	return wl->session_ids[hlid];
 308}
 309
 310int wl12xx_allocate_link(struct wl1271 *wl, struct wl12xx_vif *wlvif, u8 *hlid)
 311{
 312	unsigned long flags;
 313	u8 link = find_first_zero_bit(wl->links_map, wl->num_links);
 314	if (link >= wl->num_links)
 315		return -EBUSY;
 316
 317	wl->session_ids[link] = wlcore_get_new_session_id(wl, link);
 318
 319	/* these bits are used by op_tx */
 320	spin_lock_irqsave(&wl->wl_lock, flags);
 321	__set_bit(link, wl->links_map);
 322	__set_bit(link, wlvif->links_map);
 323	spin_unlock_irqrestore(&wl->wl_lock, flags);
 324
 325	/*
 326	 * take the last "freed packets" value from the current FW status.
 327	 * on recovery, we might not have fw_status yet, and
 328	 * tx_lnk_free_pkts will be NULL. check for it.
 329	 */
 330	if (wl->fw_status->counters.tx_lnk_free_pkts)
 331		wl->links[link].prev_freed_pkts =
 332			wl->fw_status->counters.tx_lnk_free_pkts[link];
 333	wl->links[link].wlvif = wlvif;
 334
 335	/*
 336	 * Take the last sec_pn16 value from the current FW status. On recovery,
 337	 * we might not have fw_status yet, and tx_lnk_sec_pn16[] will be NULL.
 338	 */
 339	if (wl->fw_status->counters.tx_lnk_sec_pn16)
 340		wl->links[link].prev_sec_pn16 =
 341			le16_to_cpu(wl->fw_status->counters.tx_lnk_sec_pn16[link]);
 342
 343	/*
 344	 * Take saved value for total freed packets from wlvif, in case this is
 345	 * recovery/resume
 346	 */
 347	if (wlvif->bss_type != BSS_TYPE_AP_BSS)
 348		wl->links[link].total_freed_pkts = wlvif->total_freed_pkts;
 349
 350	*hlid = link;
 351
 352	wl->active_link_count++;
 353	return 0;
 354}
 355
 356void wl12xx_free_link(struct wl1271 *wl, struct wl12xx_vif *wlvif, u8 *hlid)
 357{
 358	unsigned long flags;
 359
 360	if (*hlid == WL12XX_INVALID_LINK_ID)
 361		return;
 362
 363	/* these bits are used by op_tx */
 364	spin_lock_irqsave(&wl->wl_lock, flags);
 365	__clear_bit(*hlid, wl->links_map);
 366	__clear_bit(*hlid, wlvif->links_map);
 367	spin_unlock_irqrestore(&wl->wl_lock, flags);
 368
 369	wl->links[*hlid].allocated_pkts = 0;
 370	wl->links[*hlid].prev_freed_pkts = 0;
 371	wl->links[*hlid].prev_sec_pn16 = 0;
 372	wl->links[*hlid].ba_bitmap = 0;
 373	eth_zero_addr(wl->links[*hlid].addr);
 374
 375	/*
 376	 * At this point op_tx() will not add more packets to the queues. We
 377	 * can purge them.
 378	 */
 379	wl1271_tx_reset_link_queues(wl, *hlid);
 380	wl->links[*hlid].wlvif = NULL;
 381
 382	if (wlvif->bss_type == BSS_TYPE_AP_BSS &&
 383	    *hlid == wlvif->ap.bcast_hlid) {
 384		u32 sqn_padding = WL1271_TX_SQN_POST_RECOVERY_PADDING;
 385		/*
 386		 * save the total freed packets in the wlvif, in case this is
 387		 * recovery or suspend
 388		 */
 389		wlvif->total_freed_pkts = wl->links[*hlid].total_freed_pkts;
 390
 391		/*
 392		 * increment the initial seq number on recovery to account for
 393		 * transmitted packets that we haven't yet got in the FW status
 394		 */
 395		if (wlvif->encryption_type == KEY_GEM)
 396			sqn_padding = WL1271_TX_SQN_POST_RECOVERY_PADDING_GEM;
 397
 398		if (test_bit(WL1271_FLAG_RECOVERY_IN_PROGRESS, &wl->flags))
 399			wlvif->total_freed_pkts += sqn_padding;
 400	}
 401
 402	wl->links[*hlid].total_freed_pkts = 0;
 403
 404	*hlid = WL12XX_INVALID_LINK_ID;
 405	wl->active_link_count--;
 406	WARN_ON_ONCE(wl->active_link_count < 0);
 407}
 408
 409u8 wlcore_get_native_channel_type(u8 nl_channel_type)
 
 410{
 411	switch (nl_channel_type) {
 412	case NL80211_CHAN_NO_HT:
 413		return WLCORE_CHAN_NO_HT;
 414	case NL80211_CHAN_HT20:
 415		return WLCORE_CHAN_HT20;
 416	case NL80211_CHAN_HT40MINUS:
 417		return WLCORE_CHAN_HT40MINUS;
 418	case NL80211_CHAN_HT40PLUS:
 419		return WLCORE_CHAN_HT40PLUS;
 420	default:
 421		WARN_ON(1);
 422		return WLCORE_CHAN_NO_HT;
 423	}
 424}
 425EXPORT_SYMBOL_GPL(wlcore_get_native_channel_type);
 426
 427static int wl12xx_cmd_role_start_dev(struct wl1271 *wl,
 428				     struct wl12xx_vif *wlvif,
 429				     enum nl80211_band band,
 430				     int channel)
 431{
 432	struct wl12xx_cmd_role_start *cmd;
 433	int ret;
 434
 435	cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
 436	if (!cmd) {
 437		ret = -ENOMEM;
 438		goto out;
 439	}
 440
 441	wl1271_debug(DEBUG_CMD, "cmd role start dev %d", wlvif->dev_role_id);
 442
 443	cmd->role_id = wlvif->dev_role_id;
 444	if (band == NL80211_BAND_5GHZ)
 445		cmd->band = WLCORE_BAND_5GHZ;
 446	cmd->channel = channel;
 447
 448	if (wlvif->dev_hlid == WL12XX_INVALID_LINK_ID) {
 449		ret = wl12xx_allocate_link(wl, wlvif, &wlvif->dev_hlid);
 450		if (ret)
 451			goto out_free;
 452	}
 453	cmd->device.hlid = wlvif->dev_hlid;
 454	cmd->device.session = wl->session_ids[wlvif->dev_hlid];
 455
 456	wl1271_debug(DEBUG_CMD, "role start: roleid=%d, hlid=%d, session=%d",
 457		     cmd->role_id, cmd->device.hlid, cmd->device.session);
 458
 459	ret = wl1271_cmd_send(wl, CMD_ROLE_START, cmd, sizeof(*cmd), 0);
 460	if (ret < 0) {
 461		wl1271_error("failed to initiate cmd role enable");
 462		goto err_hlid;
 463	}
 464
 465	goto out_free;
 466
 467err_hlid:
 468	/* clear links on error */
 469	wl12xx_free_link(wl, wlvif, &wlvif->dev_hlid);
 470
 471out_free:
 472	kfree(cmd);
 473
 474out:
 475	return ret;
 476}
 477
 478static int wl12xx_cmd_role_stop_dev(struct wl1271 *wl,
 479				    struct wl12xx_vif *wlvif)
 480{
 481	struct wl12xx_cmd_role_stop *cmd;
 482	int ret;
 483
 484	if (WARN_ON(wlvif->dev_hlid == WL12XX_INVALID_LINK_ID))
 485		return -EINVAL;
 486
 487	cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
 488	if (!cmd) {
 489		ret = -ENOMEM;
 490		goto out;
 491	}
 492
 493	wl1271_debug(DEBUG_CMD, "cmd role stop dev");
 494
 495	cmd->role_id = wlvif->dev_role_id;
 496	cmd->disc_type = DISCONNECT_IMMEDIATE;
 497	cmd->reason = cpu_to_le16(WLAN_REASON_UNSPECIFIED);
 498
 499	ret = wl1271_cmd_send(wl, CMD_ROLE_STOP, cmd, sizeof(*cmd), 0);
 500	if (ret < 0) {
 501		wl1271_error("failed to initiate cmd role stop");
 502		goto out_free;
 503	}
 504
 
 
 
 
 
 
 505	wl12xx_free_link(wl, wlvif, &wlvif->dev_hlid);
 506
 507out_free:
 508	kfree(cmd);
 509
 510out:
 511	return ret;
 512}
 513
 514int wl12xx_cmd_role_start_sta(struct wl1271 *wl, struct wl12xx_vif *wlvif)
 515{
 516	struct ieee80211_vif *vif = wl12xx_wlvif_to_vif(wlvif);
 517	struct wl12xx_cmd_role_start *cmd;
 518	u32 supported_rates;
 519	int ret;
 520
 521	cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
 522	if (!cmd) {
 523		ret = -ENOMEM;
 524		goto out;
 525	}
 526
 527	wl1271_debug(DEBUG_CMD, "cmd role start sta %d", wlvif->role_id);
 528
 529	cmd->role_id = wlvif->role_id;
 530	if (wlvif->band == NL80211_BAND_5GHZ)
 531		cmd->band = WLCORE_BAND_5GHZ;
 532	cmd->channel = wlvif->channel;
 533	cmd->sta.basic_rate_set = cpu_to_le32(wlvif->basic_rate_set);
 534	cmd->sta.beacon_interval = cpu_to_le16(wlvif->beacon_int);
 535	cmd->sta.ssid_type = WL12XX_SSID_TYPE_ANY;
 536	cmd->sta.ssid_len = wlvif->ssid_len;
 537	memcpy(cmd->sta.ssid, wlvif->ssid, wlvif->ssid_len);
 538	memcpy(cmd->sta.bssid, vif->bss_conf.bssid, ETH_ALEN);
 539
 540	supported_rates = CONF_TX_ENABLED_RATES | CONF_TX_MCS_RATES |
 541			  wlcore_hw_sta_get_ap_rate_mask(wl, wlvif);
 542	if (wlvif->p2p)
 543		supported_rates &= ~CONF_TX_CCK_RATES;
 544
 545	cmd->sta.local_rates = cpu_to_le32(supported_rates);
 546
 547	cmd->channel_type = wlcore_get_native_channel_type(wlvif->channel_type);
 548
 549	if (wlvif->sta.hlid == WL12XX_INVALID_LINK_ID) {
 550		ret = wl12xx_allocate_link(wl, wlvif, &wlvif->sta.hlid);
 551		if (ret)
 552			goto out_free;
 553	}
 554	cmd->sta.hlid = wlvif->sta.hlid;
 555	cmd->sta.session = wl->session_ids[wlvif->sta.hlid];
 556	/*
 557	 * We don't have the correct remote rates in this stage.  The
 558	 * rates will be reconfigured later, after association, if the
 559	 * firmware supports ACX_PEER_CAP.  Otherwise, there's nothing
 560	 * we can do, so use all supported_rates here.
 561	 */
 562	cmd->sta.remote_rates = cpu_to_le32(supported_rates);
 563
 564	wl1271_debug(DEBUG_CMD, "role start: roleid=%d, hlid=%d, session=%d "
 565		     "basic_rate_set: 0x%x, remote_rates: 0x%x",
 566		     wlvif->role_id, cmd->sta.hlid, cmd->sta.session,
 567		     wlvif->basic_rate_set, wlvif->rate_set);
 568
 569	ret = wl1271_cmd_send(wl, CMD_ROLE_START, cmd, sizeof(*cmd), 0);
 570	if (ret < 0) {
 571		wl1271_error("failed to initiate cmd role start sta");
 572		goto err_hlid;
 573	}
 574
 575	wlvif->sta.role_chan_type = wlvif->channel_type;
 576	goto out_free;
 577
 578err_hlid:
 579	/* clear links on error. */
 580	wl12xx_free_link(wl, wlvif, &wlvif->sta.hlid);
 581
 582out_free:
 583	kfree(cmd);
 584
 585out:
 586	return ret;
 587}
 588
 589/* use this function to stop ibss as well */
 590int wl12xx_cmd_role_stop_sta(struct wl1271 *wl, struct wl12xx_vif *wlvif)
 591{
 592	struct wl12xx_cmd_role_stop *cmd;
 593	int ret;
 594
 595	if (WARN_ON(wlvif->sta.hlid == WL12XX_INVALID_LINK_ID))
 596		return -EINVAL;
 597
 598	cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
 599	if (!cmd) {
 600		ret = -ENOMEM;
 601		goto out;
 602	}
 603
 604	wl1271_debug(DEBUG_CMD, "cmd role stop sta %d", wlvif->role_id);
 605
 606	cmd->role_id = wlvif->role_id;
 607	cmd->disc_type = DISCONNECT_IMMEDIATE;
 608	cmd->reason = cpu_to_le16(WLAN_REASON_UNSPECIFIED);
 609
 610	ret = wl1271_cmd_send(wl, CMD_ROLE_STOP, cmd, sizeof(*cmd), 0);
 611	if (ret < 0) {
 612		wl1271_error("failed to initiate cmd role stop sta");
 613		goto out_free;
 614	}
 615
 616	wl12xx_free_link(wl, wlvif, &wlvif->sta.hlid);
 617
 618out_free:
 619	kfree(cmd);
 620
 621out:
 622	return ret;
 623}
 624
 625int wl12xx_cmd_role_start_ap(struct wl1271 *wl, struct wl12xx_vif *wlvif)
 626{
 627	struct wl12xx_cmd_role_start *cmd;
 628	struct ieee80211_vif *vif = wl12xx_wlvif_to_vif(wlvif);
 629	struct ieee80211_bss_conf *bss_conf = &vif->bss_conf;
 630	u32 supported_rates;
 631	int ret;
 632
 633	wl1271_debug(DEBUG_CMD, "cmd role start ap %d", wlvif->role_id);
 634
 635	/* If MESH --> ssid_len is always 0 */
 636	if (!ieee80211_vif_is_mesh(vif)) {
 637		/* trying to use hidden SSID with an old hostapd version */
 638		if (wlvif->ssid_len == 0 && !bss_conf->hidden_ssid) {
 639			wl1271_error("got a null SSID from beacon/bss");
 640			ret = -EINVAL;
 641			goto out;
 642		}
 643	}
 644
 645	cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
 646	if (!cmd) {
 647		ret = -ENOMEM;
 648		goto out;
 649	}
 650
 651	ret = wl12xx_allocate_link(wl, wlvif, &wlvif->ap.global_hlid);
 652	if (ret < 0)
 653		goto out_free;
 654
 655	ret = wl12xx_allocate_link(wl, wlvif, &wlvif->ap.bcast_hlid);
 656	if (ret < 0)
 657		goto out_free_global;
 658
 659	/* use the previous security seq, if this is a recovery/resume */
 660	wl->links[wlvif->ap.bcast_hlid].total_freed_pkts =
 661						wlvif->total_freed_pkts;
 662
 663	cmd->role_id = wlvif->role_id;
 664	cmd->ap.aging_period = cpu_to_le16(wl->conf.tx.ap_aging_period);
 665	cmd->ap.bss_index = WL1271_AP_BSS_INDEX;
 666	cmd->ap.global_hlid = wlvif->ap.global_hlid;
 667	cmd->ap.broadcast_hlid = wlvif->ap.bcast_hlid;
 668	cmd->ap.global_session_id = wl->session_ids[wlvif->ap.global_hlid];
 669	cmd->ap.bcast_session_id = wl->session_ids[wlvif->ap.bcast_hlid];
 670	cmd->ap.basic_rate_set = cpu_to_le32(wlvif->basic_rate_set);
 671	cmd->ap.beacon_interval = cpu_to_le16(wlvif->beacon_int);
 672	cmd->ap.dtim_interval = bss_conf->dtim_period;
 673	cmd->ap.beacon_expiry = WL1271_AP_DEF_BEACON_EXP;
 674	/* FIXME: Change when adding DFS */
 675	cmd->ap.reset_tsf = 1;  /* By default reset AP TSF */
 676	cmd->ap.wmm = wlvif->wmm_enabled;
 677	cmd->channel = wlvif->channel;
 678	cmd->channel_type = wlcore_get_native_channel_type(wlvif->channel_type);
 679
 680	if (!bss_conf->hidden_ssid) {
 681		/* take the SSID from the beacon for backward compatibility */
 682		cmd->ap.ssid_type = WL12XX_SSID_TYPE_PUBLIC;
 683		cmd->ap.ssid_len = wlvif->ssid_len;
 684		memcpy(cmd->ap.ssid, wlvif->ssid, wlvif->ssid_len);
 685	} else {
 686		cmd->ap.ssid_type = WL12XX_SSID_TYPE_HIDDEN;
 687		cmd->ap.ssid_len = vif->cfg.ssid_len;
 688		memcpy(cmd->ap.ssid, vif->cfg.ssid, vif->cfg.ssid_len);
 689	}
 690
 691	supported_rates = CONF_TX_ENABLED_RATES | CONF_TX_MCS_RATES |
 692		wlcore_hw_ap_get_mimo_wide_rate_mask(wl, wlvif);
 693	if (wlvif->p2p)
 694		supported_rates &= ~CONF_TX_CCK_RATES;
 695
 696	wl1271_debug(DEBUG_CMD, "cmd role start ap with supported_rates 0x%08x",
 697		     supported_rates);
 698
 699	cmd->ap.local_rates = cpu_to_le32(supported_rates);
 700
 701	switch (wlvif->band) {
 702	case NL80211_BAND_2GHZ:
 703		cmd->band = WLCORE_BAND_2_4GHZ;
 704		break;
 705	case NL80211_BAND_5GHZ:
 706		cmd->band = WLCORE_BAND_5GHZ;
 707		break;
 708	default:
 709		wl1271_warning("ap start - unknown band: %d", (int)wlvif->band);
 710		cmd->band = WLCORE_BAND_2_4GHZ;
 711		break;
 712	}
 713
 714	ret = wl1271_cmd_send(wl, CMD_ROLE_START, cmd, sizeof(*cmd), 0);
 715	if (ret < 0) {
 716		wl1271_error("failed to initiate cmd role start ap");
 717		goto out_free_bcast;
 718	}
 719
 720	goto out_free;
 721
 722out_free_bcast:
 723	wl12xx_free_link(wl, wlvif, &wlvif->ap.bcast_hlid);
 724
 725out_free_global:
 726	wl12xx_free_link(wl, wlvif, &wlvif->ap.global_hlid);
 727
 728out_free:
 729	kfree(cmd);
 730
 731out:
 732	return ret;
 733}
 734
 735int wl12xx_cmd_role_stop_ap(struct wl1271 *wl, struct wl12xx_vif *wlvif)
 736{
 737	struct wl12xx_cmd_role_stop *cmd;
 738	int ret;
 739
 740	cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
 741	if (!cmd) {
 742		ret = -ENOMEM;
 743		goto out;
 744	}
 745
 746	wl1271_debug(DEBUG_CMD, "cmd role stop ap %d", wlvif->role_id);
 747
 748	cmd->role_id = wlvif->role_id;
 749
 750	ret = wl1271_cmd_send(wl, CMD_ROLE_STOP, cmd, sizeof(*cmd), 0);
 751	if (ret < 0) {
 752		wl1271_error("failed to initiate cmd role stop ap");
 753		goto out_free;
 754	}
 755
 756	wl12xx_free_link(wl, wlvif, &wlvif->ap.bcast_hlid);
 757	wl12xx_free_link(wl, wlvif, &wlvif->ap.global_hlid);
 758
 759out_free:
 760	kfree(cmd);
 761
 762out:
 763	return ret;
 764}
 765
 766int wl12xx_cmd_role_start_ibss(struct wl1271 *wl, struct wl12xx_vif *wlvif)
 767{
 768	struct ieee80211_vif *vif = wl12xx_wlvif_to_vif(wlvif);
 769	struct wl12xx_cmd_role_start *cmd;
 770	struct ieee80211_bss_conf *bss_conf = &vif->bss_conf;
 771	int ret;
 772
 773	cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
 774	if (!cmd) {
 775		ret = -ENOMEM;
 776		goto out;
 777	}
 778
 779	wl1271_debug(DEBUG_CMD, "cmd role start ibss %d", wlvif->role_id);
 780
 781	cmd->role_id = wlvif->role_id;
 782	if (wlvif->band == NL80211_BAND_5GHZ)
 783		cmd->band = WLCORE_BAND_5GHZ;
 784	cmd->channel = wlvif->channel;
 785	cmd->ibss.basic_rate_set = cpu_to_le32(wlvif->basic_rate_set);
 786	cmd->ibss.beacon_interval = cpu_to_le16(wlvif->beacon_int);
 787	cmd->ibss.dtim_interval = bss_conf->dtim_period;
 788	cmd->ibss.ssid_type = WL12XX_SSID_TYPE_ANY;
 789	cmd->ibss.ssid_len = wlvif->ssid_len;
 790	memcpy(cmd->ibss.ssid, wlvif->ssid, wlvif->ssid_len);
 791	memcpy(cmd->ibss.bssid, vif->bss_conf.bssid, ETH_ALEN);
 792	cmd->sta.local_rates = cpu_to_le32(wlvif->rate_set);
 793
 794	if (wlvif->sta.hlid == WL12XX_INVALID_LINK_ID) {
 795		ret = wl12xx_allocate_link(wl, wlvif, &wlvif->sta.hlid);
 796		if (ret)
 797			goto out_free;
 798	}
 799	cmd->ibss.hlid = wlvif->sta.hlid;
 800	cmd->ibss.remote_rates = cpu_to_le32(wlvif->rate_set);
 801
 802	wl1271_debug(DEBUG_CMD, "role start: roleid=%d, hlid=%d, session=%d "
 803		     "basic_rate_set: 0x%x, remote_rates: 0x%x",
 804		     wlvif->role_id, cmd->sta.hlid, cmd->sta.session,
 805		     wlvif->basic_rate_set, wlvif->rate_set);
 806
 807	wl1271_debug(DEBUG_CMD, "vif->bss_conf.bssid = %pM",
 808		     vif->bss_conf.bssid);
 809
 810	ret = wl1271_cmd_send(wl, CMD_ROLE_START, cmd, sizeof(*cmd), 0);
 811	if (ret < 0) {
 812		wl1271_error("failed to initiate cmd role enable");
 813		goto err_hlid;
 814	}
 815
 816	goto out_free;
 817
 818err_hlid:
 819	/* clear links on error. */
 820	wl12xx_free_link(wl, wlvif, &wlvif->sta.hlid);
 821
 822out_free:
 823	kfree(cmd);
 824
 825out:
 826	return ret;
 827}
 828
 829
 830/**
 831 * wl1271_cmd_test - send test command to firmware
 832 *
 833 * @wl: wl struct
 834 * @buf: buffer containing the command, with all headers, must work with dma
 835 * @buf_len: length of the buffer
 836 * @answer: is answer needed
 837 */
 838int wl1271_cmd_test(struct wl1271 *wl, void *buf, size_t buf_len, u8 answer)
 839{
 840	int ret;
 841	size_t res_len = 0;
 842
 843	wl1271_debug(DEBUG_CMD, "cmd test");
 844
 845	if (answer)
 846		res_len = buf_len;
 847
 848	ret = wl1271_cmd_send(wl, CMD_TEST, buf, buf_len, res_len);
 849
 850	if (ret < 0) {
 851		wl1271_warning("TEST command failed");
 852		return ret;
 853	}
 854
 855	return ret;
 856}
 857EXPORT_SYMBOL_GPL(wl1271_cmd_test);
 858
 859/**
 860 * wl1271_cmd_interrogate - read acx from firmware
 861 *
 862 * @wl: wl struct
 863 * @id: acx id
 864 * @buf: buffer for the response, including all headers, must work with dma
 865 * @cmd_len: length of command
 866 * @res_len: length of payload
 867 */
 868int wl1271_cmd_interrogate(struct wl1271 *wl, u16 id, void *buf,
 869			   size_t cmd_len, size_t res_len)
 870{
 871	struct acx_header *acx = buf;
 872	int ret;
 873
 874	wl1271_debug(DEBUG_CMD, "cmd interrogate");
 875
 876	acx->id = cpu_to_le16(id);
 877
 878	/* response payload length, does not include any headers */
 879	acx->len = cpu_to_le16(res_len - sizeof(*acx));
 880
 881	ret = wl1271_cmd_send(wl, CMD_INTERROGATE, acx, cmd_len, res_len);
 882	if (ret < 0)
 883		wl1271_error("INTERROGATE command failed");
 884
 885	return ret;
 886}
 887
 888/**
 889 * wlcore_cmd_configure_failsafe - write acx value to firmware
 890 *
 891 * @wl: wl struct
 892 * @id: acx id
 893 * @buf: buffer containing acx, including all headers, must work with dma
 894 * @len: length of buf
 895 * @valid_rets: bitmap of valid cmd status codes (i.e. return values).
 896 * return the cmd status on success.
 897 */
 898int wlcore_cmd_configure_failsafe(struct wl1271 *wl, u16 id, void *buf,
 899				  size_t len, unsigned long valid_rets)
 900{
 901	struct acx_header *acx = buf;
 902	int ret;
 903
 904	wl1271_debug(DEBUG_CMD, "cmd configure (%d)", id);
 905
 906	if (WARN_ON_ONCE(len < sizeof(*acx)))
 907		return -EIO;
 908
 909	acx->id = cpu_to_le16(id);
 910
 911	/* payload length, does not include any headers */
 912	acx->len = cpu_to_le16(len - sizeof(*acx));
 913
 914	ret = wlcore_cmd_send_failsafe(wl, CMD_CONFIGURE, acx, len, 0,
 915				       valid_rets);
 916	if (ret < 0) {
 917		wl1271_warning("CONFIGURE command NOK");
 918		return ret;
 919	}
 920
 921	return ret;
 922}
 923
 924/*
 925 * wrapper for wlcore_cmd_configure that accepts only success status.
 926 * return 0 on success
 927 */
 928int wl1271_cmd_configure(struct wl1271 *wl, u16 id, void *buf, size_t len)
 929{
 930	int ret = wlcore_cmd_configure_failsafe(wl, id, buf, len, 0);
 931
 932	if (ret < 0)
 933		return ret;
 934	return 0;
 935}
 936EXPORT_SYMBOL_GPL(wl1271_cmd_configure);
 937
 938int wl1271_cmd_data_path(struct wl1271 *wl, bool enable)
 939{
 940	struct cmd_enabledisable_path *cmd;
 941	int ret;
 942	u16 cmd_rx, cmd_tx;
 943
 944	wl1271_debug(DEBUG_CMD, "cmd data path");
 945
 946	cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
 947	if (!cmd) {
 948		ret = -ENOMEM;
 949		goto out;
 950	}
 951
 952	/* the channel here is only used for calibration, so hardcoded to 1 */
 953	cmd->channel = 1;
 954
 955	if (enable) {
 956		cmd_rx = CMD_ENABLE_RX;
 957		cmd_tx = CMD_ENABLE_TX;
 958	} else {
 959		cmd_rx = CMD_DISABLE_RX;
 960		cmd_tx = CMD_DISABLE_TX;
 961	}
 962
 963	ret = wl1271_cmd_send(wl, cmd_rx, cmd, sizeof(*cmd), 0);
 964	if (ret < 0) {
 965		wl1271_error("rx %s cmd for channel %d failed",
 966			     enable ? "start" : "stop", cmd->channel);
 967		goto out;
 968	}
 969
 970	wl1271_debug(DEBUG_BOOT, "rx %s cmd channel %d",
 971		     enable ? "start" : "stop", cmd->channel);
 972
 973	ret = wl1271_cmd_send(wl, cmd_tx, cmd, sizeof(*cmd), 0);
 974	if (ret < 0) {
 975		wl1271_error("tx %s cmd for channel %d failed",
 976			     enable ? "start" : "stop", cmd->channel);
 977		goto out;
 978	}
 979
 980	wl1271_debug(DEBUG_BOOT, "tx %s cmd channel %d",
 981		     enable ? "start" : "stop", cmd->channel);
 982
 983out:
 984	kfree(cmd);
 985	return ret;
 986}
 987EXPORT_SYMBOL_GPL(wl1271_cmd_data_path);
 988
 989int wl1271_cmd_ps_mode(struct wl1271 *wl, struct wl12xx_vif *wlvif,
 990		       u8 ps_mode, u16 auto_ps_timeout)
 991{
 992	struct wl1271_cmd_ps_params *ps_params = NULL;
 993	int ret = 0;
 994
 995	wl1271_debug(DEBUG_CMD, "cmd set ps mode");
 996
 997	ps_params = kzalloc(sizeof(*ps_params), GFP_KERNEL);
 998	if (!ps_params) {
 999		ret = -ENOMEM;
1000		goto out;
1001	}
1002
1003	ps_params->role_id = wlvif->role_id;
1004	ps_params->ps_mode = ps_mode;
1005	ps_params->auto_ps_timeout = auto_ps_timeout;
1006
1007	ret = wl1271_cmd_send(wl, CMD_SET_PS_MODE, ps_params,
1008			      sizeof(*ps_params), 0);
1009	if (ret < 0) {
1010		wl1271_error("cmd set_ps_mode failed");
1011		goto out;
1012	}
1013
1014out:
1015	kfree(ps_params);
1016	return ret;
1017}
1018
1019int wl1271_cmd_template_set(struct wl1271 *wl, u8 role_id,
1020			    u16 template_id, void *buf, size_t buf_len,
1021			    int index, u32 rates)
1022{
1023	struct wl1271_cmd_template_set *cmd;
1024	int ret = 0;
1025
1026	wl1271_debug(DEBUG_CMD, "cmd template_set %d (role %d)",
1027		     template_id, role_id);
1028
1029	WARN_ON(buf_len > WL1271_CMD_TEMPL_MAX_SIZE);
1030	buf_len = min_t(size_t, buf_len, WL1271_CMD_TEMPL_MAX_SIZE);
1031
1032	cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
1033	if (!cmd) {
1034		ret = -ENOMEM;
1035		goto out;
1036	}
1037
1038	/* during initialization wlvif is NULL */
1039	cmd->role_id = role_id;
1040	cmd->len = cpu_to_le16(buf_len);
1041	cmd->template_type = template_id;
1042	cmd->enabled_rates = cpu_to_le32(rates);
1043	cmd->short_retry_limit = wl->conf.tx.tmpl_short_retry_limit;
1044	cmd->long_retry_limit = wl->conf.tx.tmpl_long_retry_limit;
1045	cmd->index = index;
1046
1047	if (buf)
1048		memcpy(cmd->template_data, buf, buf_len);
1049
1050	ret = wl1271_cmd_send(wl, CMD_SET_TEMPLATE, cmd, sizeof(*cmd), 0);
1051	if (ret < 0) {
1052		wl1271_warning("cmd set_template failed: %d", ret);
1053		goto out_free;
1054	}
1055
1056out_free:
1057	kfree(cmd);
1058
1059out:
1060	return ret;
1061}
1062
1063int wl12xx_cmd_build_null_data(struct wl1271 *wl, struct wl12xx_vif *wlvif)
1064{
1065	struct sk_buff *skb = NULL;
1066	int size;
1067	void *ptr;
1068	int ret = -ENOMEM;
1069
1070
1071	if (wlvif->bss_type == BSS_TYPE_IBSS) {
1072		size = sizeof(struct wl12xx_null_data_template);
1073		ptr = NULL;
1074	} else {
1075		skb = ieee80211_nullfunc_get(wl->hw,
1076					     wl12xx_wlvif_to_vif(wlvif),
1077					     -1, false);
1078		if (!skb)
1079			goto out;
1080		size = skb->len;
1081		ptr = skb->data;
1082	}
1083
1084	ret = wl1271_cmd_template_set(wl, wlvif->role_id,
1085				      CMD_TEMPL_NULL_DATA, ptr, size, 0,
1086				      wlvif->basic_rate);
1087
1088out:
1089	dev_kfree_skb(skb);
1090	if (ret)
1091		wl1271_warning("cmd build null data failed %d", ret);
1092
1093	return ret;
1094
1095}
1096
1097int wl12xx_cmd_build_klv_null_data(struct wl1271 *wl,
1098				   struct wl12xx_vif *wlvif)
1099{
1100	struct ieee80211_vif *vif = wl12xx_wlvif_to_vif(wlvif);
1101	struct sk_buff *skb = NULL;
1102	int ret = -ENOMEM;
1103
1104	skb = ieee80211_nullfunc_get(wl->hw, vif,-1, false);
1105	if (!skb)
1106		goto out;
1107
1108	ret = wl1271_cmd_template_set(wl, wlvif->role_id, CMD_TEMPL_KLV,
1109				      skb->data, skb->len,
1110				      wlvif->sta.klv_template_id,
1111				      wlvif->basic_rate);
1112
1113out:
1114	dev_kfree_skb(skb);
1115	if (ret)
1116		wl1271_warning("cmd build klv null data failed %d", ret);
1117
1118	return ret;
1119
1120}
1121
1122int wl1271_cmd_build_ps_poll(struct wl1271 *wl, struct wl12xx_vif *wlvif,
1123			     u16 aid)
1124{
1125	struct ieee80211_vif *vif = wl12xx_wlvif_to_vif(wlvif);
1126	struct sk_buff *skb;
1127	int ret = 0;
1128
1129	skb = ieee80211_pspoll_get(wl->hw, vif);
1130	if (!skb)
1131		goto out;
1132
1133	ret = wl1271_cmd_template_set(wl, wlvif->role_id,
1134				      CMD_TEMPL_PS_POLL, skb->data,
1135				      skb->len, 0, wlvif->basic_rate_set);
1136
1137out:
1138	dev_kfree_skb(skb);
1139	return ret;
1140}
1141
1142int wl12xx_cmd_build_probe_req(struct wl1271 *wl, struct wl12xx_vif *wlvif,
1143			       u8 role_id, u8 band,
1144			       const u8 *ssid, size_t ssid_len,
1145			       const u8 *ie0, size_t ie0_len, const u8 *ie1,
1146			       size_t ie1_len, bool sched_scan)
1147{
1148	struct ieee80211_vif *vif = wl12xx_wlvif_to_vif(wlvif);
1149	struct sk_buff *skb;
1150	int ret;
1151	u32 rate;
1152	u16 template_id_2_4 = wl->scan_templ_id_2_4;
1153	u16 template_id_5 = wl->scan_templ_id_5;
1154
1155	wl1271_debug(DEBUG_SCAN, "build probe request band %d", band);
1156
1157	skb = ieee80211_probereq_get(wl->hw, vif->addr, ssid, ssid_len,
1158				     ie0_len + ie1_len);
1159	if (!skb) {
1160		ret = -ENOMEM;
1161		goto out;
1162	}
1163	if (ie0_len)
1164		skb_put_data(skb, ie0, ie0_len);
1165	if (ie1_len)
1166		skb_put_data(skb, ie1, ie1_len);
1167
1168	if (sched_scan &&
1169	    (wl->quirks & WLCORE_QUIRK_DUAL_PROBE_TMPL)) {
1170		template_id_2_4 = wl->sched_scan_templ_id_2_4;
1171		template_id_5 = wl->sched_scan_templ_id_5;
1172	}
1173
1174	rate = wl1271_tx_min_rate_get(wl, wlvif->bitrate_masks[band]);
1175	if (band == NL80211_BAND_2GHZ)
1176		ret = wl1271_cmd_template_set(wl, role_id,
1177					      template_id_2_4,
1178					      skb->data, skb->len, 0, rate);
1179	else
1180		ret = wl1271_cmd_template_set(wl, role_id,
1181					      template_id_5,
1182					      skb->data, skb->len, 0, rate);
1183
1184out:
1185	dev_kfree_skb(skb);
1186	return ret;
1187}
1188EXPORT_SYMBOL_GPL(wl12xx_cmd_build_probe_req);
1189
1190struct sk_buff *wl1271_cmd_build_ap_probe_req(struct wl1271 *wl,
1191					      struct wl12xx_vif *wlvif,
1192					      struct sk_buff *skb)
1193{
1194	struct ieee80211_vif *vif = wl12xx_wlvif_to_vif(wlvif);
1195	int ret;
1196	u32 rate;
1197
1198	if (!skb)
1199		skb = ieee80211_ap_probereq_get(wl->hw, vif);
1200	if (!skb)
1201		goto out;
1202
1203	wl1271_debug(DEBUG_SCAN, "set ap probe request template");
1204
1205	rate = wl1271_tx_min_rate_get(wl, wlvif->bitrate_masks[wlvif->band]);
1206	if (wlvif->band == NL80211_BAND_2GHZ)
1207		ret = wl1271_cmd_template_set(wl, wlvif->role_id,
1208					      CMD_TEMPL_CFG_PROBE_REQ_2_4,
1209					      skb->data, skb->len, 0, rate);
1210	else
1211		ret = wl1271_cmd_template_set(wl, wlvif->role_id,
1212					      CMD_TEMPL_CFG_PROBE_REQ_5,
1213					      skb->data, skb->len, 0, rate);
1214
1215	if (ret < 0)
1216		wl1271_error("Unable to set ap probe request template.");
1217
1218out:
1219	return skb;
1220}
1221
1222int wl1271_cmd_build_arp_rsp(struct wl1271 *wl, struct wl12xx_vif *wlvif)
1223{
1224	int ret, extra = 0;
1225	u16 fc;
1226	struct ieee80211_vif *vif = wl12xx_wlvif_to_vif(wlvif);
1227	struct sk_buff *skb;
1228	struct wl12xx_arp_rsp_template *tmpl;
1229	struct ieee80211_hdr_3addr *hdr;
1230	struct arphdr *arp_hdr;
1231
1232	skb = dev_alloc_skb(sizeof(*hdr) + sizeof(__le16) + sizeof(*tmpl) +
1233			    WL1271_EXTRA_SPACE_MAX);
1234	if (!skb) {
1235		wl1271_error("failed to allocate buffer for arp rsp template");
1236		return -ENOMEM;
1237	}
1238
1239	skb_reserve(skb, sizeof(*hdr) + WL1271_EXTRA_SPACE_MAX);
1240
1241	tmpl = skb_put_zero(skb, sizeof(*tmpl));
 
1242
1243	/* llc layer */
1244	memcpy(tmpl->llc_hdr, rfc1042_header, sizeof(rfc1042_header));
1245	tmpl->llc_type = cpu_to_be16(ETH_P_ARP);
1246
1247	/* arp header */
1248	arp_hdr = &tmpl->arp_hdr;
1249	arp_hdr->ar_hrd = cpu_to_be16(ARPHRD_ETHER);
1250	arp_hdr->ar_pro = cpu_to_be16(ETH_P_IP);
1251	arp_hdr->ar_hln = ETH_ALEN;
1252	arp_hdr->ar_pln = 4;
1253	arp_hdr->ar_op = cpu_to_be16(ARPOP_REPLY);
1254
1255	/* arp payload */
1256	memcpy(tmpl->sender_hw, vif->addr, ETH_ALEN);
1257	tmpl->sender_ip = wlvif->ip_addr;
1258
1259	/* encryption space */
1260	switch (wlvif->encryption_type) {
1261	case KEY_TKIP:
1262		if (wl->quirks & WLCORE_QUIRK_TKIP_HEADER_SPACE)
1263			extra = WL1271_EXTRA_SPACE_TKIP;
1264		break;
1265	case KEY_AES:
1266		extra = WL1271_EXTRA_SPACE_AES;
1267		break;
1268	case KEY_NONE:
1269	case KEY_WEP:
1270	case KEY_GEM:
1271		extra = 0;
1272		break;
1273	default:
1274		wl1271_warning("Unknown encryption type: %d",
1275			       wlvif->encryption_type);
1276		ret = -EINVAL;
1277		goto out;
1278	}
1279
1280	if (extra) {
1281		u8 *space = skb_push(skb, extra);
1282		memset(space, 0, extra);
1283	}
1284
1285	/* QoS header - BE */
1286	if (wlvif->sta.qos)
1287		memset(skb_push(skb, sizeof(__le16)), 0, sizeof(__le16));
1288
1289	/* mac80211 header */
1290	hdr = skb_push(skb, sizeof(*hdr));
1291	memset(hdr, 0, sizeof(*hdr));
1292	fc = IEEE80211_FTYPE_DATA | IEEE80211_FCTL_TODS;
1293	if (wlvif->sta.qos)
1294		fc |= IEEE80211_STYPE_QOS_DATA;
1295	else
1296		fc |= IEEE80211_STYPE_DATA;
1297	if (wlvif->encryption_type != KEY_NONE)
1298		fc |= IEEE80211_FCTL_PROTECTED;
1299
1300	hdr->frame_control = cpu_to_le16(fc);
1301	memcpy(hdr->addr1, vif->bss_conf.bssid, ETH_ALEN);
1302	memcpy(hdr->addr2, vif->addr, ETH_ALEN);
1303	eth_broadcast_addr(hdr->addr3);
1304
1305	ret = wl1271_cmd_template_set(wl, wlvif->role_id, CMD_TEMPL_ARP_RSP,
1306				      skb->data, skb->len, 0,
1307				      wlvif->basic_rate);
1308out:
1309	dev_kfree_skb(skb);
1310	return ret;
1311}
1312
1313int wl1271_build_qos_null_data(struct wl1271 *wl, struct ieee80211_vif *vif)
1314{
1315	struct wl12xx_vif *wlvif = wl12xx_vif_to_data(vif);
1316	struct ieee80211_qos_hdr template;
1317
1318	memset(&template, 0, sizeof(template));
1319
1320	memcpy(template.addr1, vif->bss_conf.bssid, ETH_ALEN);
1321	memcpy(template.addr2, vif->addr, ETH_ALEN);
1322	memcpy(template.addr3, vif->bss_conf.bssid, ETH_ALEN);
1323
1324	template.frame_control = cpu_to_le16(IEEE80211_FTYPE_DATA |
1325					     IEEE80211_STYPE_QOS_NULLFUNC |
1326					     IEEE80211_FCTL_TODS);
1327
1328	/* FIXME: not sure what priority to use here */
1329	template.qos_ctrl = cpu_to_le16(0);
1330
1331	return wl1271_cmd_template_set(wl, wlvif->role_id,
1332				       CMD_TEMPL_QOS_NULL_DATA, &template,
1333				       sizeof(template), 0,
1334				       wlvif->basic_rate);
1335}
1336
1337int wl12xx_cmd_set_default_wep_key(struct wl1271 *wl, u8 id, u8 hlid)
1338{
1339	struct wl1271_cmd_set_keys *cmd;
1340	int ret = 0;
1341
1342	wl1271_debug(DEBUG_CMD, "cmd set_default_wep_key %d", id);
1343
1344	cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
1345	if (!cmd) {
1346		ret = -ENOMEM;
1347		goto out;
1348	}
1349
1350	cmd->hlid = hlid;
1351	cmd->key_id = id;
1352	cmd->lid_key_type = WEP_DEFAULT_LID_TYPE;
1353	cmd->key_action = cpu_to_le16(KEY_SET_ID);
1354	cmd->key_type = KEY_WEP;
1355
1356	ret = wl1271_cmd_send(wl, CMD_SET_KEYS, cmd, sizeof(*cmd), 0);
1357	if (ret < 0) {
1358		wl1271_warning("cmd set_default_wep_key failed: %d", ret);
1359		goto out;
1360	}
1361
1362out:
1363	kfree(cmd);
1364
1365	return ret;
1366}
1367
1368int wl1271_cmd_set_sta_key(struct wl1271 *wl, struct wl12xx_vif *wlvif,
1369		       u16 action, u8 id, u8 key_type,
1370		       u8 key_size, const u8 *key, const u8 *addr,
1371		       u32 tx_seq_32, u16 tx_seq_16)
1372{
1373	struct wl1271_cmd_set_keys *cmd;
1374	int ret = 0;
1375
1376	/* hlid might have already been deleted */
1377	if (wlvif->sta.hlid == WL12XX_INVALID_LINK_ID)
1378		return 0;
1379
1380	cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
1381	if (!cmd) {
1382		ret = -ENOMEM;
1383		goto out;
1384	}
1385
1386	cmd->hlid = wlvif->sta.hlid;
1387
1388	if (key_type == KEY_WEP)
1389		cmd->lid_key_type = WEP_DEFAULT_LID_TYPE;
1390	else if (is_broadcast_ether_addr(addr))
1391		cmd->lid_key_type = BROADCAST_LID_TYPE;
1392	else
1393		cmd->lid_key_type = UNICAST_LID_TYPE;
1394
1395	cmd->key_action = cpu_to_le16(action);
1396	cmd->key_size = key_size;
1397	cmd->key_type = key_type;
1398
1399	cmd->ac_seq_num16[0] = cpu_to_le16(tx_seq_16);
1400	cmd->ac_seq_num32[0] = cpu_to_le32(tx_seq_32);
1401
1402	cmd->key_id = id;
1403
1404	if (key_type == KEY_TKIP) {
1405		/*
1406		 * We get the key in the following form:
1407		 * TKIP (16 bytes) - TX MIC (8 bytes) - RX MIC (8 bytes)
1408		 * but the target is expecting:
1409		 * TKIP - RX MIC - TX MIC
1410		 */
1411		memcpy(cmd->key, key, 16);
1412		memcpy(cmd->key + 16, key + 24, 8);
1413		memcpy(cmd->key + 24, key + 16, 8);
1414
1415	} else {
1416		memcpy(cmd->key, key, key_size);
1417	}
1418
1419	wl1271_dump(DEBUG_CRYPT, "TARGET KEY: ", cmd, sizeof(*cmd));
1420
1421	ret = wl1271_cmd_send(wl, CMD_SET_KEYS, cmd, sizeof(*cmd), 0);
1422	if (ret < 0) {
1423		wl1271_warning("could not set keys");
1424		goto out;
1425	}
1426
1427out:
1428	kfree(cmd);
1429
1430	return ret;
1431}
1432
1433/*
1434 * TODO: merge with sta/ibss into 1 set_key function.
1435 * note there are slight diffs
1436 */
1437int wl1271_cmd_set_ap_key(struct wl1271 *wl, struct wl12xx_vif *wlvif,
1438			  u16 action, u8 id, u8 key_type,
1439			  u8 key_size, const u8 *key, u8 hlid, u32 tx_seq_32,
1440			  u16 tx_seq_16, bool is_pairwise)
1441{
1442	struct wl1271_cmd_set_keys *cmd;
1443	int ret = 0;
1444	u8 lid_type;
1445
1446	cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
1447	if (!cmd)
1448		return -ENOMEM;
1449
1450	if (hlid == wlvif->ap.bcast_hlid) {
1451		if (key_type == KEY_WEP)
1452			lid_type = WEP_DEFAULT_LID_TYPE;
1453		else
1454			lid_type = BROADCAST_LID_TYPE;
1455	} else if (is_pairwise) {
1456		lid_type = UNICAST_LID_TYPE;
1457	} else {
1458		lid_type = BROADCAST_LID_TYPE;
1459	}
1460
1461	wl1271_debug(DEBUG_CRYPT, "ap key action: %d id: %d lid: %d type: %d"
1462		     " hlid: %d", (int)action, (int)id, (int)lid_type,
1463		     (int)key_type, (int)hlid);
1464
1465	cmd->lid_key_type = lid_type;
1466	cmd->hlid = hlid;
1467	cmd->key_action = cpu_to_le16(action);
1468	cmd->key_size = key_size;
1469	cmd->key_type = key_type;
1470	cmd->key_id = id;
1471	cmd->ac_seq_num16[0] = cpu_to_le16(tx_seq_16);
1472	cmd->ac_seq_num32[0] = cpu_to_le32(tx_seq_32);
1473
1474	if (key_type == KEY_TKIP) {
1475		/*
1476		 * We get the key in the following form:
1477		 * TKIP (16 bytes) - TX MIC (8 bytes) - RX MIC (8 bytes)
1478		 * but the target is expecting:
1479		 * TKIP - RX MIC - TX MIC
1480		 */
1481		memcpy(cmd->key, key, 16);
1482		memcpy(cmd->key + 16, key + 24, 8);
1483		memcpy(cmd->key + 24, key + 16, 8);
1484	} else {
1485		memcpy(cmd->key, key, key_size);
1486	}
1487
1488	wl1271_dump(DEBUG_CRYPT, "TARGET AP KEY: ", cmd, sizeof(*cmd));
1489
1490	ret = wl1271_cmd_send(wl, CMD_SET_KEYS, cmd, sizeof(*cmd), 0);
1491	if (ret < 0) {
1492		wl1271_warning("could not set ap keys");
1493		goto out;
1494	}
1495
1496out:
1497	kfree(cmd);
1498	return ret;
1499}
1500
1501int wl12xx_cmd_set_peer_state(struct wl1271 *wl, struct wl12xx_vif *wlvif,
1502			      u8 hlid)
1503{
1504	struct wl12xx_cmd_set_peer_state *cmd;
1505	int ret = 0;
1506
1507	wl1271_debug(DEBUG_CMD, "cmd set peer state (hlid=%d)", hlid);
1508
1509	cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
1510	if (!cmd) {
1511		ret = -ENOMEM;
1512		goto out;
1513	}
1514
1515	cmd->hlid = hlid;
1516	cmd->state = WL1271_CMD_STA_STATE_CONNECTED;
1517
1518	/* wmm param is valid only for station role */
1519	if (wlvif->bss_type == BSS_TYPE_STA_BSS)
1520		cmd->wmm = wlvif->wmm_enabled;
1521
1522	ret = wl1271_cmd_send(wl, CMD_SET_PEER_STATE, cmd, sizeof(*cmd), 0);
1523	if (ret < 0) {
1524		wl1271_error("failed to send set peer state command");
1525		goto out_free;
1526	}
1527
1528out_free:
1529	kfree(cmd);
1530
1531out:
1532	return ret;
1533}
1534
1535int wl12xx_cmd_add_peer(struct wl1271 *wl, struct wl12xx_vif *wlvif,
1536			struct ieee80211_sta *sta, u8 hlid)
1537{
1538	struct wl12xx_cmd_add_peer *cmd;
1539	int i, ret;
1540	u32 sta_rates;
1541
1542	wl1271_debug(DEBUG_CMD, "cmd add peer %d", (int)hlid);
1543
1544	cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
1545	if (!cmd) {
1546		ret = -ENOMEM;
1547		goto out;
1548	}
1549
1550	memcpy(cmd->addr, sta->addr, ETH_ALEN);
1551	cmd->bss_index = WL1271_AP_BSS_INDEX;
1552	cmd->aid = sta->aid;
1553	cmd->hlid = hlid;
1554	cmd->sp_len = sta->max_sp;
1555	cmd->wmm = sta->wme ? 1 : 0;
1556	cmd->session_id = wl->session_ids[hlid];
1557	cmd->role_id = wlvif->role_id;
1558
1559	for (i = 0; i < NUM_ACCESS_CATEGORIES_COPY; i++)
1560		if (sta->wme && (sta->uapsd_queues & BIT(i)))
1561			cmd->psd_type[NUM_ACCESS_CATEGORIES_COPY-1-i] =
1562					WL1271_PSD_UPSD_TRIGGER;
1563		else
1564			cmd->psd_type[NUM_ACCESS_CATEGORIES_COPY-1-i] =
1565					WL1271_PSD_LEGACY;
1566
1567
1568	sta_rates = sta->deflink.supp_rates[wlvif->band];
1569	if (sta->deflink.ht_cap.ht_supported)
1570		sta_rates |=
1571			(sta->deflink.ht_cap.mcs.rx_mask[0] << HW_HT_RATES_OFFSET) |
1572			(sta->deflink.ht_cap.mcs.rx_mask[1] << HW_MIMO_RATES_OFFSET);
1573
1574	cmd->supported_rates =
1575		cpu_to_le32(wl1271_tx_enabled_rates_get(wl, sta_rates,
1576							wlvif->band));
1577
1578	wl1271_debug(DEBUG_CMD, "new peer rates=0x%x queues=0x%x",
1579		     cmd->supported_rates, sta->uapsd_queues);
1580
1581	ret = wl1271_cmd_send(wl, CMD_ADD_PEER, cmd, sizeof(*cmd), 0);
1582	if (ret < 0) {
1583		wl1271_error("failed to initiate cmd add peer");
1584		goto out_free;
1585	}
1586
1587out_free:
1588	kfree(cmd);
1589
1590out:
1591	return ret;
1592}
1593
1594int wl12xx_cmd_remove_peer(struct wl1271 *wl, struct wl12xx_vif *wlvif,
1595			   u8 hlid)
1596{
1597	struct wl12xx_cmd_remove_peer *cmd;
1598	int ret;
1599	bool timeout = false;
1600
1601	wl1271_debug(DEBUG_CMD, "cmd remove peer %d", (int)hlid);
1602
1603	cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
1604	if (!cmd) {
1605		ret = -ENOMEM;
1606		goto out;
1607	}
1608
1609	cmd->hlid = hlid;
1610	/* We never send a deauth, mac80211 is in charge of this */
1611	cmd->reason_opcode = 0;
1612	cmd->send_deauth_flag = 0;
1613	cmd->role_id = wlvif->role_id;
1614
1615	ret = wl1271_cmd_send(wl, CMD_REMOVE_PEER, cmd, sizeof(*cmd), 0);
1616	if (ret < 0) {
1617		wl1271_error("failed to initiate cmd remove peer");
1618		goto out_free;
1619	}
1620
1621	ret = wl->ops->wait_for_event(wl,
1622				      WLCORE_EVENT_PEER_REMOVE_COMPLETE,
1623				      &timeout);
1624
1625	/*
1626	 * We are ok with a timeout here. The event is sometimes not sent
1627	 * due to a firmware bug. In case of another error (like SDIO timeout)
1628	 * queue a recovery.
1629	 */
1630	if (ret)
1631		wl12xx_queue_recovery_work(wl);
1632
1633out_free:
1634	kfree(cmd);
1635
1636out:
1637	return ret;
1638}
1639
1640static int wlcore_get_reg_conf_ch_idx(enum nl80211_band band, u16 ch)
1641{
1642	/*
1643	 * map the given band/channel to the respective predefined
1644	 * bit expected by the fw
1645	 */
1646	switch (band) {
1647	case NL80211_BAND_2GHZ:
1648		/* channels 1..14 are mapped to 0..13 */
1649		if (ch >= 1 && ch <= 14)
1650			return ch - 1;
1651		break;
1652	case NL80211_BAND_5GHZ:
1653		switch (ch) {
1654		case 8 ... 16:
1655			/* channels 8,12,16 are mapped to 18,19,20 */
1656			return 18 + (ch-8)/4;
1657		case 34 ... 48:
1658			/* channels 34,36..48 are mapped to 21..28 */
1659			return 21 + (ch-34)/2;
1660		case 52 ... 64:
1661			/* channels 52,56..64 are mapped to 29..32 */
1662			return 29 + (ch-52)/4;
1663		case 100 ... 140:
1664			/* channels 100,104..140 are mapped to 33..43 */
1665			return 33 + (ch-100)/4;
1666		case 149 ... 165:
1667			/* channels 149,153..165 are mapped to 44..48 */
1668			return 44 + (ch-149)/4;
1669		default:
1670			break;
1671		}
1672		break;
1673	default:
1674		break;
1675	}
1676
1677	wl1271_error("%s: unknown band/channel: %d/%d", __func__, band, ch);
1678	return -1;
1679}
1680
1681void wlcore_set_pending_regdomain_ch(struct wl1271 *wl, u16 channel,
1682				     enum nl80211_band band)
1683{
1684	int ch_bit_idx = 0;
1685
1686	if (!(wl->quirks & WLCORE_QUIRK_REGDOMAIN_CONF))
1687		return;
1688
1689	ch_bit_idx = wlcore_get_reg_conf_ch_idx(band, channel);
1690
1691	if (ch_bit_idx >= 0 && ch_bit_idx <= WL1271_MAX_CHANNELS)
1692		__set_bit_le(ch_bit_idx, (long *)wl->reg_ch_conf_pending);
1693}
1694
1695int wlcore_cmd_regdomain_config_locked(struct wl1271 *wl)
1696{
1697	struct wl12xx_cmd_regdomain_dfs_config *cmd = NULL;
1698	int ret = 0, i, b, ch_bit_idx;
1699	__le32 tmp_ch_bitmap[2] __aligned(sizeof(unsigned long));
1700	struct wiphy *wiphy = wl->hw->wiphy;
1701	struct ieee80211_supported_band *band;
1702	bool timeout = false;
1703
1704	if (!(wl->quirks & WLCORE_QUIRK_REGDOMAIN_CONF))
1705		return 0;
1706
1707	wl1271_debug(DEBUG_CMD, "cmd reg domain config");
1708
1709	memcpy(tmp_ch_bitmap, wl->reg_ch_conf_pending, sizeof(tmp_ch_bitmap));
1710
1711	for (b = NL80211_BAND_2GHZ; b <= NL80211_BAND_5GHZ; b++) {
1712		band = wiphy->bands[b];
1713		for (i = 0; i < band->n_channels; i++) {
1714			struct ieee80211_channel *channel = &band->channels[i];
1715			u16 ch = channel->hw_value;
1716			u32 flags = channel->flags;
1717
1718			if (flags & (IEEE80211_CHAN_DISABLED |
1719				     IEEE80211_CHAN_NO_IR))
1720				continue;
1721
1722			if ((flags & IEEE80211_CHAN_RADAR) &&
1723			    channel->dfs_state != NL80211_DFS_AVAILABLE)
1724				continue;
1725
1726			ch_bit_idx = wlcore_get_reg_conf_ch_idx(b, ch);
1727			if (ch_bit_idx < 0)
1728				continue;
1729
1730			__set_bit_le(ch_bit_idx, (long *)tmp_ch_bitmap);
1731		}
1732	}
1733
1734	if (!memcmp(tmp_ch_bitmap, wl->reg_ch_conf_last, sizeof(tmp_ch_bitmap)))
1735		goto out;
1736
1737	cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
1738	if (!cmd) {
1739		ret = -ENOMEM;
1740		goto out;
1741	}
1742
1743	cmd->ch_bit_map1 = tmp_ch_bitmap[0];
1744	cmd->ch_bit_map2 = tmp_ch_bitmap[1];
1745	cmd->dfs_region = wl->dfs_region;
1746
1747	wl1271_debug(DEBUG_CMD,
1748		     "cmd reg domain bitmap1: 0x%08x, bitmap2: 0x%08x",
1749		     cmd->ch_bit_map1, cmd->ch_bit_map2);
1750
1751	ret = wl1271_cmd_send(wl, CMD_DFS_CHANNEL_CONFIG, cmd, sizeof(*cmd), 0);
1752	if (ret < 0) {
1753		wl1271_error("failed to send reg domain dfs config");
1754		goto out;
1755	}
1756
1757	ret = wl->ops->wait_for_event(wl,
1758				      WLCORE_EVENT_DFS_CONFIG_COMPLETE,
1759				      &timeout);
1760	if (ret < 0 || timeout) {
1761		wl1271_error("reg domain conf %serror",
1762			     timeout ? "completion " : "");
1763		ret = timeout ? -ETIMEDOUT : ret;
1764		goto out;
1765	}
1766
1767	memcpy(wl->reg_ch_conf_last, tmp_ch_bitmap, sizeof(tmp_ch_bitmap));
1768	memset(wl->reg_ch_conf_pending, 0, sizeof(wl->reg_ch_conf_pending));
1769
1770out:
1771	kfree(cmd);
1772	return ret;
1773}
1774
1775int wl12xx_cmd_config_fwlog(struct wl1271 *wl)
1776{
1777	struct wl12xx_cmd_config_fwlog *cmd;
1778	int ret = 0;
1779
1780	wl1271_debug(DEBUG_CMD, "cmd config firmware logger");
1781
1782	cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
1783	if (!cmd) {
1784		ret = -ENOMEM;
1785		goto out;
1786	}
1787
1788	cmd->logger_mode = wl->conf.fwlog.mode;
1789	cmd->log_severity = wl->conf.fwlog.severity;
1790	cmd->timestamp = wl->conf.fwlog.timestamp;
1791	cmd->output = wl->conf.fwlog.output;
1792	cmd->threshold = wl->conf.fwlog.threshold;
1793
1794	ret = wl1271_cmd_send(wl, CMD_CONFIG_FWLOGGER, cmd, sizeof(*cmd), 0);
1795	if (ret < 0) {
1796		wl1271_error("failed to send config firmware logger command");
1797		goto out_free;
1798	}
1799
1800out_free:
1801	kfree(cmd);
1802
1803out:
1804	return ret;
1805}
1806
1807int wl12xx_cmd_start_fwlog(struct wl1271 *wl)
1808{
1809	struct wl12xx_cmd_start_fwlog *cmd;
1810	int ret = 0;
1811
1812	wl1271_debug(DEBUG_CMD, "cmd start firmware logger");
1813
1814	cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
1815	if (!cmd) {
1816		ret = -ENOMEM;
1817		goto out;
1818	}
1819
1820	ret = wl1271_cmd_send(wl, CMD_START_FWLOGGER, cmd, sizeof(*cmd), 0);
1821	if (ret < 0) {
1822		wl1271_error("failed to send start firmware logger command");
1823		goto out_free;
1824	}
1825
1826out_free:
1827	kfree(cmd);
1828
1829out:
1830	return ret;
1831}
1832
1833int wl12xx_cmd_stop_fwlog(struct wl1271 *wl)
1834{
1835	struct wl12xx_cmd_stop_fwlog *cmd;
1836	int ret = 0;
1837
1838	wl1271_debug(DEBUG_CMD, "cmd stop firmware logger");
1839
1840	cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
1841	if (!cmd) {
1842		ret = -ENOMEM;
1843		goto out;
1844	}
1845
1846	ret = wl1271_cmd_send(wl, CMD_STOP_FWLOGGER, cmd, sizeof(*cmd), 0);
1847	if (ret < 0) {
1848		wl1271_error("failed to send stop firmware logger command");
1849		goto out_free;
1850	}
1851
1852out_free:
1853	kfree(cmd);
1854
1855out:
1856	return ret;
1857}
1858
1859static int wl12xx_cmd_roc(struct wl1271 *wl, struct wl12xx_vif *wlvif,
1860			  u8 role_id, enum nl80211_band band, u8 channel)
1861{
1862	struct wl12xx_cmd_roc *cmd;
1863	int ret = 0;
1864
1865	wl1271_debug(DEBUG_CMD, "cmd roc %d (%d)", channel, role_id);
1866
1867	if (WARN_ON(role_id == WL12XX_INVALID_ROLE_ID))
1868		return -EINVAL;
1869
1870	cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
1871	if (!cmd) {
1872		ret = -ENOMEM;
1873		goto out;
1874	}
1875
1876	cmd->role_id = role_id;
1877	cmd->channel = channel;
1878	switch (band) {
1879	case NL80211_BAND_2GHZ:
1880		cmd->band = WLCORE_BAND_2_4GHZ;
1881		break;
1882	case NL80211_BAND_5GHZ:
1883		cmd->band = WLCORE_BAND_5GHZ;
1884		break;
1885	default:
1886		wl1271_error("roc - unknown band: %d", (int)wlvif->band);
1887		ret = -EINVAL;
1888		goto out_free;
1889	}
1890
1891
1892	ret = wl1271_cmd_send(wl, CMD_REMAIN_ON_CHANNEL, cmd, sizeof(*cmd), 0);
1893	if (ret < 0) {
1894		wl1271_error("failed to send ROC command");
1895		goto out_free;
1896	}
1897
1898out_free:
1899	kfree(cmd);
1900
1901out:
1902	return ret;
1903}
1904
1905static int wl12xx_cmd_croc(struct wl1271 *wl, u8 role_id)
1906{
1907	struct wl12xx_cmd_croc *cmd;
1908	int ret = 0;
1909
1910	wl1271_debug(DEBUG_CMD, "cmd croc (%d)", role_id);
1911
1912	cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
1913	if (!cmd) {
1914		ret = -ENOMEM;
1915		goto out;
1916	}
1917	cmd->role_id = role_id;
1918
1919	ret = wl1271_cmd_send(wl, CMD_CANCEL_REMAIN_ON_CHANNEL, cmd,
1920			      sizeof(*cmd), 0);
1921	if (ret < 0) {
1922		wl1271_error("failed to send ROC command");
1923		goto out_free;
1924	}
1925
1926out_free:
1927	kfree(cmd);
1928
1929out:
1930	return ret;
1931}
1932
1933int wl12xx_roc(struct wl1271 *wl, struct wl12xx_vif *wlvif, u8 role_id,
1934	       enum nl80211_band band, u8 channel)
1935{
1936	int ret = 0;
1937
1938	if (WARN_ON(test_bit(role_id, wl->roc_map)))
1939		return 0;
1940
1941	ret = wl12xx_cmd_roc(wl, wlvif, role_id, band, channel);
1942	if (ret < 0)
1943		goto out;
1944
 
 
 
 
 
 
 
1945	__set_bit(role_id, wl->roc_map);
1946out:
1947	return ret;
1948}
1949
1950int wl12xx_croc(struct wl1271 *wl, u8 role_id)
1951{
1952	int ret = 0;
1953
1954	if (WARN_ON(!test_bit(role_id, wl->roc_map)))
1955		return 0;
1956
1957	ret = wl12xx_cmd_croc(wl, role_id);
1958	if (ret < 0)
1959		goto out;
1960
1961	__clear_bit(role_id, wl->roc_map);
1962
1963	/*
1964	 * Rearm the tx watchdog when removing the last ROC. This prevents
1965	 * recoveries due to just finished ROCs - when Tx hasn't yet had
1966	 * a chance to get out.
1967	 */
1968	if (find_first_bit(wl->roc_map, WL12XX_MAX_ROLES) >= WL12XX_MAX_ROLES)
1969		wl12xx_rearm_tx_watchdog_locked(wl);
1970out:
1971	return ret;
1972}
1973
1974int wl12xx_cmd_stop_channel_switch(struct wl1271 *wl, struct wl12xx_vif *wlvif)
 
 
1975{
1976	struct wl12xx_cmd_stop_channel_switch *cmd;
1977	int ret;
1978
1979	wl1271_debug(DEBUG_ACX, "cmd stop channel switch");
1980
1981	cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
1982	if (!cmd) {
1983		ret = -ENOMEM;
1984		goto out;
1985	}
1986
1987	cmd->role_id = wlvif->role_id;
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1988
1989	ret = wl1271_cmd_send(wl, CMD_STOP_CHANNEL_SWICTH, cmd, sizeof(*cmd), 0);
1990	if (ret < 0) {
1991		wl1271_error("failed to stop channel switch command");
1992		goto out_free;
1993	}
1994
1995out_free:
1996	kfree(cmd);
1997
1998out:
1999	return ret;
2000}
2001
2002/* start dev role and roc on its channel */
2003int wl12xx_start_dev(struct wl1271 *wl, struct wl12xx_vif *wlvif,
2004		     enum nl80211_band band, int channel)
2005{
2006	int ret;
2007
2008	if (WARN_ON(!(wlvif->bss_type == BSS_TYPE_STA_BSS ||
2009		      wlvif->bss_type == BSS_TYPE_IBSS)))
2010		return -EINVAL;
2011
2012	/* the dev role is already started for p2p mgmt interfaces */
2013	if (!wlcore_is_p2p_mgmt(wlvif)) {
2014		ret = wl12xx_cmd_role_enable(wl,
2015					     wl12xx_wlvif_to_vif(wlvif)->addr,
2016					     WL1271_ROLE_DEVICE,
2017					     &wlvif->dev_role_id);
2018		if (ret < 0)
2019			goto out;
2020	}
2021
2022	ret = wl12xx_cmd_role_start_dev(wl, wlvif, band, channel);
2023	if (ret < 0)
2024		goto out_disable;
2025
2026	ret = wl12xx_roc(wl, wlvif, wlvif->dev_role_id, band, channel);
2027	if (ret < 0)
2028		goto out_stop;
2029
2030	return 0;
2031
2032out_stop:
2033	wl12xx_cmd_role_stop_dev(wl, wlvif);
2034out_disable:
2035	if (!wlcore_is_p2p_mgmt(wlvif))
2036		wl12xx_cmd_role_disable(wl, &wlvif->dev_role_id);
2037out:
2038	return ret;
2039}
2040
2041/* croc dev hlid, and stop the role */
2042int wl12xx_stop_dev(struct wl1271 *wl, struct wl12xx_vif *wlvif)
2043{
2044	int ret;
2045
2046	if (WARN_ON(!(wlvif->bss_type == BSS_TYPE_STA_BSS ||
2047		      wlvif->bss_type == BSS_TYPE_IBSS)))
2048		return -EINVAL;
2049
2050	/* flush all pending packets */
2051	ret = wlcore_tx_work_locked(wl);
2052	if (ret < 0)
2053		goto out;
2054
2055	if (test_bit(wlvif->dev_role_id, wl->roc_map)) {
2056		ret = wl12xx_croc(wl, wlvif->dev_role_id);
2057		if (ret < 0)
2058			goto out;
2059	}
2060
2061	ret = wl12xx_cmd_role_stop_dev(wl, wlvif);
2062	if (ret < 0)
2063		goto out;
2064
2065	if (!wlcore_is_p2p_mgmt(wlvif)) {
2066		ret = wl12xx_cmd_role_disable(wl, &wlvif->dev_role_id);
2067		if (ret < 0)
2068			goto out;
2069	}
2070
2071out:
2072	return ret;
2073}
2074
2075int wlcore_cmd_generic_cfg(struct wl1271 *wl, struct wl12xx_vif *wlvif,
2076			   u8 feature, u8 enable, u8 value)
2077{
2078	struct wlcore_cmd_generic_cfg *cmd;
2079	int ret;
2080
2081	wl1271_debug(DEBUG_CMD,
2082		     "cmd generic cfg (role %d feature %d enable %d value %d)",
2083		     wlvif->role_id, feature, enable, value);
2084
2085	cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
2086	if (!cmd)
2087		return -ENOMEM;
2088
2089	cmd->role_id = wlvif->role_id;
2090	cmd->feature = feature;
2091	cmd->enable = enable;
2092	cmd->value = value;
2093
2094	ret = wl1271_cmd_send(wl, CMD_GENERIC_CFG, cmd, sizeof(*cmd), 0);
2095	if (ret < 0) {
2096		wl1271_error("failed to send generic cfg command");
2097		goto out_free;
2098	}
2099out_free:
2100	kfree(cmd);
2101	return ret;
2102}
2103EXPORT_SYMBOL_GPL(wlcore_cmd_generic_cfg);
v3.5.6
 
   1/*
   2 * This file is part of wl1271
   3 *
   4 * Copyright (C) 2009-2010 Nokia Corporation
   5 *
   6 * Contact: Luciano Coelho <luciano.coelho@nokia.com>
   7 *
   8 * This program is free software; you can redistribute it and/or
   9 * modify it under the terms of the GNU General Public License
  10 * version 2 as published by the Free Software Foundation.
  11 *
  12 * This program is distributed in the hope that it will be useful, but
  13 * WITHOUT ANY WARRANTY; without even the implied warranty of
  14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
  15 * General Public License for more details.
  16 *
  17 * You should have received a copy of the GNU General Public License
  18 * along with this program; if not, write to the Free Software
  19 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA
  20 * 02110-1301 USA
  21 *
  22 */
  23
  24#include <linux/module.h>
  25#include <linux/platform_device.h>
 
  26#include <linux/spi/spi.h>
  27#include <linux/etherdevice.h>
  28#include <linux/ieee80211.h>
  29#include <linux/slab.h>
  30
  31#include "wlcore.h"
  32#include "debug.h"
  33#include "io.h"
  34#include "acx.h"
  35#include "wl12xx_80211.h"
  36#include "cmd.h"
  37#include "event.h"
  38#include "tx.h"
 
  39
  40#define WL1271_CMD_FAST_POLL_COUNT       50
 
  41
  42/*
  43 * send command to firmware
  44 *
  45 * @wl: wl struct
  46 * @id: command id
  47 * @buf: buffer containing the command, must work with dma
  48 * @len: length of the buffer
 
  49 */
  50int wl1271_cmd_send(struct wl1271 *wl, u16 id, void *buf, size_t len,
  51		    size_t res_len)
  52{
  53	struct wl1271_cmd_header *cmd;
  54	unsigned long timeout;
  55	u32 intr;
  56	int ret = 0;
  57	u16 status;
  58	u16 poll_count = 0;
  59
 
 
 
 
 
 
 
  60	cmd = buf;
  61	cmd->id = cpu_to_le16(id);
  62	cmd->status = 0;
  63
  64	WARN_ON(len % 4 != 0);
  65	WARN_ON(test_bit(WL1271_FLAG_IN_ELP, &wl->flags));
  66
  67	wl1271_write(wl, wl->cmd_box_addr, buf, len, false);
 
 
  68
  69	/*
  70	 * TODO: we just need this because one bit is in a different
  71	 * place.  Is there any better way?
  72	 */
  73	wl->ops->trigger_cmd(wl, wl->cmd_box_addr, buf, len);
 
 
  74
  75	timeout = jiffies + msecs_to_jiffies(WL1271_COMMAND_TIMEOUT);
  76
  77	intr = wlcore_read_reg(wl, REG_INTERRUPT_NO_CLEAR);
 
 
 
  78	while (!(intr & WL1271_ACX_INTR_CMD_COMPLETE)) {
  79		if (time_after(jiffies, timeout)) {
  80			wl1271_error("command complete timeout");
  81			ret = -ETIMEDOUT;
  82			goto fail;
  83		}
  84
  85		poll_count++;
  86		if (poll_count < WL1271_CMD_FAST_POLL_COUNT)
  87			udelay(10);
  88		else
  89			msleep(1);
  90
  91		intr = wlcore_read_reg(wl, REG_INTERRUPT_NO_CLEAR);
 
 
  92	}
  93
  94	/* read back the status code of the command */
  95	if (res_len == 0)
  96		res_len = sizeof(struct wl1271_cmd_header);
  97	wl1271_read(wl, wl->cmd_box_addr, cmd, res_len, false);
 
 
 
  98
  99	status = le16_to_cpu(cmd->status);
 100	if (status != CMD_STATUS_SUCCESS) {
 101		wl1271_error("command execute failure %d", status);
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 102		ret = -EIO;
 103		goto fail;
 104	}
 105
 106	wlcore_write_reg(wl, REG_INTERRUPT_ACK, WL1271_ACX_INTR_CMD_COMPLETE);
 107	return 0;
 108
 109fail:
 110	WARN_ON(1);
 111	wl12xx_queue_recovery_work(wl);
 112	return ret;
 113}
 114
 115/*
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 116 * Poll the mailbox event field until any of the bits in the mask is set or a
 117 * timeout occurs (WL1271_EVENT_TIMEOUT in msecs)
 118 */
 119static int wl1271_cmd_wait_for_event_or_timeout(struct wl1271 *wl, u32 mask)
 
 120{
 121	u32 *events_vector;
 122	u32 event;
 123	unsigned long timeout;
 
 124	int ret = 0;
 125
 
 
 126	events_vector = kmalloc(sizeof(*events_vector), GFP_KERNEL | GFP_DMA);
 127	if (!events_vector)
 128		return -ENOMEM;
 129
 130	timeout = jiffies + msecs_to_jiffies(WL1271_EVENT_TIMEOUT);
 
 
 
 
 131
 132	do {
 133		if (time_after(jiffies, timeout)) {
 134			wl1271_debug(DEBUG_CMD, "timeout waiting for event %d",
 135				     (int)mask);
 136			ret = -ETIMEDOUT;
 137			goto out;
 138		}
 139
 140		msleep(1);
 
 
 
 
 141
 142		/* read from both event fields */
 143		wl1271_read(wl, wl->mbox_ptr[0], events_vector,
 144			    sizeof(*events_vector), false);
 
 
 
 145		event = *events_vector & mask;
 146		wl1271_read(wl, wl->mbox_ptr[1], events_vector,
 147			    sizeof(*events_vector), false);
 
 
 
 
 148		event |= *events_vector & mask;
 149	} while (!event);
 150
 151out:
 
 
 
 152	kfree(events_vector);
 153	return ret;
 154}
 155
 156static int wl1271_cmd_wait_for_event(struct wl1271 *wl, u32 mask)
 157{
 158	int ret;
 159
 160	ret = wl1271_cmd_wait_for_event_or_timeout(wl, mask);
 161	if (ret != 0) {
 162		wl12xx_queue_recovery_work(wl);
 163		return ret;
 164	}
 165
 166	return 0;
 167}
 168
 169int wl12xx_cmd_role_enable(struct wl1271 *wl, u8 *addr, u8 role_type,
 170			   u8 *role_id)
 171{
 172	struct wl12xx_cmd_role_enable *cmd;
 173	int ret;
 174
 175	wl1271_debug(DEBUG_CMD, "cmd role enable");
 176
 177	if (WARN_ON(*role_id != WL12XX_INVALID_ROLE_ID))
 178		return -EBUSY;
 179
 180	cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
 181	if (!cmd) {
 182		ret = -ENOMEM;
 183		goto out;
 184	}
 185
 186	/* get role id */
 187	cmd->role_id = find_first_zero_bit(wl->roles_map, WL12XX_MAX_ROLES);
 188	if (cmd->role_id >= WL12XX_MAX_ROLES) {
 189		ret = -EBUSY;
 190		goto out_free;
 191	}
 192
 193	memcpy(cmd->mac_address, addr, ETH_ALEN);
 194	cmd->role_type = role_type;
 195
 196	ret = wl1271_cmd_send(wl, CMD_ROLE_ENABLE, cmd, sizeof(*cmd), 0);
 197	if (ret < 0) {
 198		wl1271_error("failed to initiate cmd role enable");
 199		goto out_free;
 200	}
 201
 202	__set_bit(cmd->role_id, wl->roles_map);
 203	*role_id = cmd->role_id;
 204
 205out_free:
 206	kfree(cmd);
 207
 208out:
 209	return ret;
 210}
 211
 212int wl12xx_cmd_role_disable(struct wl1271 *wl, u8 *role_id)
 213{
 214	struct wl12xx_cmd_role_disable *cmd;
 215	int ret;
 216
 217	wl1271_debug(DEBUG_CMD, "cmd role disable");
 218
 219	if (WARN_ON(*role_id == WL12XX_INVALID_ROLE_ID))
 220		return -ENOENT;
 221
 222	cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
 223	if (!cmd) {
 224		ret = -ENOMEM;
 225		goto out;
 226	}
 227	cmd->role_id = *role_id;
 228
 229	ret = wl1271_cmd_send(wl, CMD_ROLE_DISABLE, cmd, sizeof(*cmd), 0);
 230	if (ret < 0) {
 231		wl1271_error("failed to initiate cmd role disable");
 232		goto out_free;
 233	}
 234
 235	__clear_bit(*role_id, wl->roles_map);
 236	*role_id = WL12XX_INVALID_ROLE_ID;
 237
 238out_free:
 239	kfree(cmd);
 240
 241out:
 242	return ret;
 243}
 244
 
 
 
 
 
 
 
 
 
 
 245int wl12xx_allocate_link(struct wl1271 *wl, struct wl12xx_vif *wlvif, u8 *hlid)
 246{
 247	unsigned long flags;
 248	u8 link = find_first_zero_bit(wl->links_map, WL12XX_MAX_LINKS);
 249	if (link >= WL12XX_MAX_LINKS)
 250		return -EBUSY;
 251
 
 
 252	/* these bits are used by op_tx */
 253	spin_lock_irqsave(&wl->wl_lock, flags);
 254	__set_bit(link, wl->links_map);
 255	__set_bit(link, wlvif->links_map);
 256	spin_unlock_irqrestore(&wl->wl_lock, flags);
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 257	*hlid = link;
 
 
 258	return 0;
 259}
 260
 261void wl12xx_free_link(struct wl1271 *wl, struct wl12xx_vif *wlvif, u8 *hlid)
 262{
 263	unsigned long flags;
 264
 265	if (*hlid == WL12XX_INVALID_LINK_ID)
 266		return;
 267
 268	/* these bits are used by op_tx */
 269	spin_lock_irqsave(&wl->wl_lock, flags);
 270	__clear_bit(*hlid, wl->links_map);
 271	__clear_bit(*hlid, wlvif->links_map);
 272	spin_unlock_irqrestore(&wl->wl_lock, flags);
 273
 
 
 
 
 
 
 274	/*
 275	 * At this point op_tx() will not add more packets to the queues. We
 276	 * can purge them.
 277	 */
 278	wl1271_tx_reset_link_queues(wl, *hlid);
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 279
 280	*hlid = WL12XX_INVALID_LINK_ID;
 
 
 281}
 282
 283static int wl12xx_get_new_session_id(struct wl1271 *wl,
 284				     struct wl12xx_vif *wlvif)
 285{
 286	if (wlvif->session_counter >= SESSION_COUNTER_MAX)
 287		wlvif->session_counter = 0;
 288
 289	wlvif->session_counter++;
 290
 291	return wlvif->session_counter;
 
 
 
 
 
 
 
 292}
 
 293
 294static int wl12xx_cmd_role_start_dev(struct wl1271 *wl,
 295				     struct wl12xx_vif *wlvif)
 
 
 296{
 297	struct wl12xx_cmd_role_start *cmd;
 298	int ret;
 299
 300	cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
 301	if (!cmd) {
 302		ret = -ENOMEM;
 303		goto out;
 304	}
 305
 306	wl1271_debug(DEBUG_CMD, "cmd role start dev %d", wlvif->dev_role_id);
 307
 308	cmd->role_id = wlvif->dev_role_id;
 309	if (wlvif->band == IEEE80211_BAND_5GHZ)
 310		cmd->band = WLCORE_BAND_5GHZ;
 311	cmd->channel = wlvif->channel;
 312
 313	if (wlvif->dev_hlid == WL12XX_INVALID_LINK_ID) {
 314		ret = wl12xx_allocate_link(wl, wlvif, &wlvif->dev_hlid);
 315		if (ret)
 316			goto out_free;
 317	}
 318	cmd->device.hlid = wlvif->dev_hlid;
 319	cmd->device.session = wl12xx_get_new_session_id(wl, wlvif);
 320
 321	wl1271_debug(DEBUG_CMD, "role start: roleid=%d, hlid=%d, session=%d",
 322		     cmd->role_id, cmd->device.hlid, cmd->device.session);
 323
 324	ret = wl1271_cmd_send(wl, CMD_ROLE_START, cmd, sizeof(*cmd), 0);
 325	if (ret < 0) {
 326		wl1271_error("failed to initiate cmd role enable");
 327		goto err_hlid;
 328	}
 329
 330	goto out_free;
 331
 332err_hlid:
 333	/* clear links on error */
 334	wl12xx_free_link(wl, wlvif, &wlvif->dev_hlid);
 335
 336out_free:
 337	kfree(cmd);
 338
 339out:
 340	return ret;
 341}
 342
 343static int wl12xx_cmd_role_stop_dev(struct wl1271 *wl,
 344				    struct wl12xx_vif *wlvif)
 345{
 346	struct wl12xx_cmd_role_stop *cmd;
 347	int ret;
 348
 349	if (WARN_ON(wlvif->dev_hlid == WL12XX_INVALID_LINK_ID))
 350		return -EINVAL;
 351
 352	cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
 353	if (!cmd) {
 354		ret = -ENOMEM;
 355		goto out;
 356	}
 357
 358	wl1271_debug(DEBUG_CMD, "cmd role stop dev");
 359
 360	cmd->role_id = wlvif->dev_role_id;
 361	cmd->disc_type = DISCONNECT_IMMEDIATE;
 362	cmd->reason = cpu_to_le16(WLAN_REASON_UNSPECIFIED);
 363
 364	ret = wl1271_cmd_send(wl, CMD_ROLE_STOP, cmd, sizeof(*cmd), 0);
 365	if (ret < 0) {
 366		wl1271_error("failed to initiate cmd role stop");
 367		goto out_free;
 368	}
 369
 370	ret = wl1271_cmd_wait_for_event(wl, ROLE_STOP_COMPLETE_EVENT_ID);
 371	if (ret < 0) {
 372		wl1271_error("cmd role stop dev event completion error");
 373		goto out_free;
 374	}
 375
 376	wl12xx_free_link(wl, wlvif, &wlvif->dev_hlid);
 377
 378out_free:
 379	kfree(cmd);
 380
 381out:
 382	return ret;
 383}
 384
 385int wl12xx_cmd_role_start_sta(struct wl1271 *wl, struct wl12xx_vif *wlvif)
 386{
 387	struct ieee80211_vif *vif = wl12xx_wlvif_to_vif(wlvif);
 388	struct wl12xx_cmd_role_start *cmd;
 
 389	int ret;
 390
 391	cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
 392	if (!cmd) {
 393		ret = -ENOMEM;
 394		goto out;
 395	}
 396
 397	wl1271_debug(DEBUG_CMD, "cmd role start sta %d", wlvif->role_id);
 398
 399	cmd->role_id = wlvif->role_id;
 400	if (wlvif->band == IEEE80211_BAND_5GHZ)
 401		cmd->band = WLCORE_BAND_5GHZ;
 402	cmd->channel = wlvif->channel;
 403	cmd->sta.basic_rate_set = cpu_to_le32(wlvif->basic_rate_set);
 404	cmd->sta.beacon_interval = cpu_to_le16(wlvif->beacon_int);
 405	cmd->sta.ssid_type = WL12XX_SSID_TYPE_ANY;
 406	cmd->sta.ssid_len = wlvif->ssid_len;
 407	memcpy(cmd->sta.ssid, wlvif->ssid, wlvif->ssid_len);
 408	memcpy(cmd->sta.bssid, vif->bss_conf.bssid, ETH_ALEN);
 409	cmd->sta.local_rates = cpu_to_le32(wlvif->rate_set);
 
 
 
 
 
 
 
 
 410
 411	if (wlvif->sta.hlid == WL12XX_INVALID_LINK_ID) {
 412		ret = wl12xx_allocate_link(wl, wlvif, &wlvif->sta.hlid);
 413		if (ret)
 414			goto out_free;
 415	}
 416	cmd->sta.hlid = wlvif->sta.hlid;
 417	cmd->sta.session = wl12xx_get_new_session_id(wl, wlvif);
 418	cmd->sta.remote_rates = cpu_to_le32(wlvif->rate_set);
 
 
 
 
 
 
 419
 420	wl1271_debug(DEBUG_CMD, "role start: roleid=%d, hlid=%d, session=%d "
 421		     "basic_rate_set: 0x%x, remote_rates: 0x%x",
 422		     wlvif->role_id, cmd->sta.hlid, cmd->sta.session,
 423		     wlvif->basic_rate_set, wlvif->rate_set);
 424
 425	ret = wl1271_cmd_send(wl, CMD_ROLE_START, cmd, sizeof(*cmd), 0);
 426	if (ret < 0) {
 427		wl1271_error("failed to initiate cmd role start sta");
 428		goto err_hlid;
 429	}
 430
 
 431	goto out_free;
 432
 433err_hlid:
 434	/* clear links on error. */
 435	wl12xx_free_link(wl, wlvif, &wlvif->sta.hlid);
 436
 437out_free:
 438	kfree(cmd);
 439
 440out:
 441	return ret;
 442}
 443
 444/* use this function to stop ibss as well */
 445int wl12xx_cmd_role_stop_sta(struct wl1271 *wl, struct wl12xx_vif *wlvif)
 446{
 447	struct wl12xx_cmd_role_stop *cmd;
 448	int ret;
 449
 450	if (WARN_ON(wlvif->sta.hlid == WL12XX_INVALID_LINK_ID))
 451		return -EINVAL;
 452
 453	cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
 454	if (!cmd) {
 455		ret = -ENOMEM;
 456		goto out;
 457	}
 458
 459	wl1271_debug(DEBUG_CMD, "cmd role stop sta %d", wlvif->role_id);
 460
 461	cmd->role_id = wlvif->role_id;
 462	cmd->disc_type = DISCONNECT_IMMEDIATE;
 463	cmd->reason = cpu_to_le16(WLAN_REASON_UNSPECIFIED);
 464
 465	ret = wl1271_cmd_send(wl, CMD_ROLE_STOP, cmd, sizeof(*cmd), 0);
 466	if (ret < 0) {
 467		wl1271_error("failed to initiate cmd role stop sta");
 468		goto out_free;
 469	}
 470
 471	wl12xx_free_link(wl, wlvif, &wlvif->sta.hlid);
 472
 473out_free:
 474	kfree(cmd);
 475
 476out:
 477	return ret;
 478}
 479
 480int wl12xx_cmd_role_start_ap(struct wl1271 *wl, struct wl12xx_vif *wlvif)
 481{
 482	struct wl12xx_cmd_role_start *cmd;
 483	struct ieee80211_vif *vif = wl12xx_wlvif_to_vif(wlvif);
 484	struct ieee80211_bss_conf *bss_conf = &vif->bss_conf;
 
 485	int ret;
 486
 487	wl1271_debug(DEBUG_CMD, "cmd role start ap %d", wlvif->role_id);
 488
 489	/* trying to use hidden SSID with an old hostapd version */
 490	if (wlvif->ssid_len == 0 && !bss_conf->hidden_ssid) {
 491		wl1271_error("got a null SSID from beacon/bss");
 492		ret = -EINVAL;
 493		goto out;
 
 
 
 494	}
 495
 496	cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
 497	if (!cmd) {
 498		ret = -ENOMEM;
 499		goto out;
 500	}
 501
 502	ret = wl12xx_allocate_link(wl, wlvif, &wlvif->ap.global_hlid);
 503	if (ret < 0)
 504		goto out_free;
 505
 506	ret = wl12xx_allocate_link(wl, wlvif, &wlvif->ap.bcast_hlid);
 507	if (ret < 0)
 508		goto out_free_global;
 509
 
 
 
 
 510	cmd->role_id = wlvif->role_id;
 511	cmd->ap.aging_period = cpu_to_le16(wl->conf.tx.ap_aging_period);
 512	cmd->ap.bss_index = WL1271_AP_BSS_INDEX;
 513	cmd->ap.global_hlid = wlvif->ap.global_hlid;
 514	cmd->ap.broadcast_hlid = wlvif->ap.bcast_hlid;
 
 
 515	cmd->ap.basic_rate_set = cpu_to_le32(wlvif->basic_rate_set);
 516	cmd->ap.beacon_interval = cpu_to_le16(wlvif->beacon_int);
 517	cmd->ap.dtim_interval = bss_conf->dtim_period;
 518	cmd->ap.beacon_expiry = WL1271_AP_DEF_BEACON_EXP;
 519	/* FIXME: Change when adding DFS */
 520	cmd->ap.reset_tsf = 1;  /* By default reset AP TSF */
 
 521	cmd->channel = wlvif->channel;
 
 522
 523	if (!bss_conf->hidden_ssid) {
 524		/* take the SSID from the beacon for backward compatibility */
 525		cmd->ap.ssid_type = WL12XX_SSID_TYPE_PUBLIC;
 526		cmd->ap.ssid_len = wlvif->ssid_len;
 527		memcpy(cmd->ap.ssid, wlvif->ssid, wlvif->ssid_len);
 528	} else {
 529		cmd->ap.ssid_type = WL12XX_SSID_TYPE_HIDDEN;
 530		cmd->ap.ssid_len = bss_conf->ssid_len;
 531		memcpy(cmd->ap.ssid, bss_conf->ssid, bss_conf->ssid_len);
 532	}
 533
 534	cmd->ap.local_rates = cpu_to_le32(0xffffffff);
 
 
 
 
 
 
 
 
 535
 536	switch (wlvif->band) {
 537	case IEEE80211_BAND_2GHZ:
 538		cmd->band = WLCORE_BAND_2_4GHZ;
 539		break;
 540	case IEEE80211_BAND_5GHZ:
 541		cmd->band = WLCORE_BAND_5GHZ;
 542		break;
 543	default:
 544		wl1271_warning("ap start - unknown band: %d", (int)wlvif->band);
 545		cmd->band = WLCORE_BAND_2_4GHZ;
 546		break;
 547	}
 548
 549	ret = wl1271_cmd_send(wl, CMD_ROLE_START, cmd, sizeof(*cmd), 0);
 550	if (ret < 0) {
 551		wl1271_error("failed to initiate cmd role start ap");
 552		goto out_free_bcast;
 553	}
 554
 555	goto out_free;
 556
 557out_free_bcast:
 558	wl12xx_free_link(wl, wlvif, &wlvif->ap.bcast_hlid);
 559
 560out_free_global:
 561	wl12xx_free_link(wl, wlvif, &wlvif->ap.global_hlid);
 562
 563out_free:
 564	kfree(cmd);
 565
 566out:
 567	return ret;
 568}
 569
 570int wl12xx_cmd_role_stop_ap(struct wl1271 *wl, struct wl12xx_vif *wlvif)
 571{
 572	struct wl12xx_cmd_role_stop *cmd;
 573	int ret;
 574
 575	cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
 576	if (!cmd) {
 577		ret = -ENOMEM;
 578		goto out;
 579	}
 580
 581	wl1271_debug(DEBUG_CMD, "cmd role stop ap %d", wlvif->role_id);
 582
 583	cmd->role_id = wlvif->role_id;
 584
 585	ret = wl1271_cmd_send(wl, CMD_ROLE_STOP, cmd, sizeof(*cmd), 0);
 586	if (ret < 0) {
 587		wl1271_error("failed to initiate cmd role stop ap");
 588		goto out_free;
 589	}
 590
 591	wl12xx_free_link(wl, wlvif, &wlvif->ap.bcast_hlid);
 592	wl12xx_free_link(wl, wlvif, &wlvif->ap.global_hlid);
 593
 594out_free:
 595	kfree(cmd);
 596
 597out:
 598	return ret;
 599}
 600
 601int wl12xx_cmd_role_start_ibss(struct wl1271 *wl, struct wl12xx_vif *wlvif)
 602{
 603	struct ieee80211_vif *vif = wl12xx_wlvif_to_vif(wlvif);
 604	struct wl12xx_cmd_role_start *cmd;
 605	struct ieee80211_bss_conf *bss_conf = &vif->bss_conf;
 606	int ret;
 607
 608	cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
 609	if (!cmd) {
 610		ret = -ENOMEM;
 611		goto out;
 612	}
 613
 614	wl1271_debug(DEBUG_CMD, "cmd role start ibss %d", wlvif->role_id);
 615
 616	cmd->role_id = wlvif->role_id;
 617	if (wlvif->band == IEEE80211_BAND_5GHZ)
 618		cmd->band = WLCORE_BAND_5GHZ;
 619	cmd->channel = wlvif->channel;
 620	cmd->ibss.basic_rate_set = cpu_to_le32(wlvif->basic_rate_set);
 621	cmd->ibss.beacon_interval = cpu_to_le16(wlvif->beacon_int);
 622	cmd->ibss.dtim_interval = bss_conf->dtim_period;
 623	cmd->ibss.ssid_type = WL12XX_SSID_TYPE_ANY;
 624	cmd->ibss.ssid_len = wlvif->ssid_len;
 625	memcpy(cmd->ibss.ssid, wlvif->ssid, wlvif->ssid_len);
 626	memcpy(cmd->ibss.bssid, vif->bss_conf.bssid, ETH_ALEN);
 627	cmd->sta.local_rates = cpu_to_le32(wlvif->rate_set);
 628
 629	if (wlvif->sta.hlid == WL12XX_INVALID_LINK_ID) {
 630		ret = wl12xx_allocate_link(wl, wlvif, &wlvif->sta.hlid);
 631		if (ret)
 632			goto out_free;
 633	}
 634	cmd->ibss.hlid = wlvif->sta.hlid;
 635	cmd->ibss.remote_rates = cpu_to_le32(wlvif->rate_set);
 636
 637	wl1271_debug(DEBUG_CMD, "role start: roleid=%d, hlid=%d, session=%d "
 638		     "basic_rate_set: 0x%x, remote_rates: 0x%x",
 639		     wlvif->role_id, cmd->sta.hlid, cmd->sta.session,
 640		     wlvif->basic_rate_set, wlvif->rate_set);
 641
 642	wl1271_debug(DEBUG_CMD, "vif->bss_conf.bssid = %pM",
 643		     vif->bss_conf.bssid);
 644
 645	ret = wl1271_cmd_send(wl, CMD_ROLE_START, cmd, sizeof(*cmd), 0);
 646	if (ret < 0) {
 647		wl1271_error("failed to initiate cmd role enable");
 648		goto err_hlid;
 649	}
 650
 651	goto out_free;
 652
 653err_hlid:
 654	/* clear links on error. */
 655	wl12xx_free_link(wl, wlvif, &wlvif->sta.hlid);
 656
 657out_free:
 658	kfree(cmd);
 659
 660out:
 661	return ret;
 662}
 663
 664
 665/**
 666 * send test command to firmware
 667 *
 668 * @wl: wl struct
 669 * @buf: buffer containing the command, with all headers, must work with dma
 670 * @len: length of the buffer
 671 * @answer: is answer needed
 672 */
 673int wl1271_cmd_test(struct wl1271 *wl, void *buf, size_t buf_len, u8 answer)
 674{
 675	int ret;
 676	size_t res_len = 0;
 677
 678	wl1271_debug(DEBUG_CMD, "cmd test");
 679
 680	if (answer)
 681		res_len = buf_len;
 682
 683	ret = wl1271_cmd_send(wl, CMD_TEST, buf, buf_len, res_len);
 684
 685	if (ret < 0) {
 686		wl1271_warning("TEST command failed");
 687		return ret;
 688	}
 689
 690	return ret;
 691}
 692EXPORT_SYMBOL_GPL(wl1271_cmd_test);
 693
 694/**
 695 * read acx from firmware
 696 *
 697 * @wl: wl struct
 698 * @id: acx id
 699 * @buf: buffer for the response, including all headers, must work with dma
 700 * @len: length of buf
 
 701 */
 702int wl1271_cmd_interrogate(struct wl1271 *wl, u16 id, void *buf, size_t len)
 
 703{
 704	struct acx_header *acx = buf;
 705	int ret;
 706
 707	wl1271_debug(DEBUG_CMD, "cmd interrogate");
 708
 709	acx->id = cpu_to_le16(id);
 710
 711	/* payload length, does not include any headers */
 712	acx->len = cpu_to_le16(len - sizeof(*acx));
 713
 714	ret = wl1271_cmd_send(wl, CMD_INTERROGATE, acx, sizeof(*acx), len);
 715	if (ret < 0)
 716		wl1271_error("INTERROGATE command failed");
 717
 718	return ret;
 719}
 720
 721/**
 722 * write acx value to firmware
 723 *
 724 * @wl: wl struct
 725 * @id: acx id
 726 * @buf: buffer containing acx, including all headers, must work with dma
 727 * @len: length of buf
 
 
 728 */
 729int wl1271_cmd_configure(struct wl1271 *wl, u16 id, void *buf, size_t len)
 
 730{
 731	struct acx_header *acx = buf;
 732	int ret;
 733
 734	wl1271_debug(DEBUG_CMD, "cmd configure (%d)", id);
 735
 
 
 
 736	acx->id = cpu_to_le16(id);
 737
 738	/* payload length, does not include any headers */
 739	acx->len = cpu_to_le16(len - sizeof(*acx));
 740
 741	ret = wl1271_cmd_send(wl, CMD_CONFIGURE, acx, len, 0);
 
 742	if (ret < 0) {
 743		wl1271_warning("CONFIGURE command NOK");
 744		return ret;
 745	}
 746
 
 
 
 
 
 
 
 
 
 
 
 
 
 747	return 0;
 748}
 749EXPORT_SYMBOL_GPL(wl1271_cmd_configure);
 750
 751int wl1271_cmd_data_path(struct wl1271 *wl, bool enable)
 752{
 753	struct cmd_enabledisable_path *cmd;
 754	int ret;
 755	u16 cmd_rx, cmd_tx;
 756
 757	wl1271_debug(DEBUG_CMD, "cmd data path");
 758
 759	cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
 760	if (!cmd) {
 761		ret = -ENOMEM;
 762		goto out;
 763	}
 764
 765	/* the channel here is only used for calibration, so hardcoded to 1 */
 766	cmd->channel = 1;
 767
 768	if (enable) {
 769		cmd_rx = CMD_ENABLE_RX;
 770		cmd_tx = CMD_ENABLE_TX;
 771	} else {
 772		cmd_rx = CMD_DISABLE_RX;
 773		cmd_tx = CMD_DISABLE_TX;
 774	}
 775
 776	ret = wl1271_cmd_send(wl, cmd_rx, cmd, sizeof(*cmd), 0);
 777	if (ret < 0) {
 778		wl1271_error("rx %s cmd for channel %d failed",
 779			     enable ? "start" : "stop", cmd->channel);
 780		goto out;
 781	}
 782
 783	wl1271_debug(DEBUG_BOOT, "rx %s cmd channel %d",
 784		     enable ? "start" : "stop", cmd->channel);
 785
 786	ret = wl1271_cmd_send(wl, cmd_tx, cmd, sizeof(*cmd), 0);
 787	if (ret < 0) {
 788		wl1271_error("tx %s cmd for channel %d failed",
 789			     enable ? "start" : "stop", cmd->channel);
 790		goto out;
 791	}
 792
 793	wl1271_debug(DEBUG_BOOT, "tx %s cmd channel %d",
 794		     enable ? "start" : "stop", cmd->channel);
 795
 796out:
 797	kfree(cmd);
 798	return ret;
 799}
 
 800
 801int wl1271_cmd_ps_mode(struct wl1271 *wl, struct wl12xx_vif *wlvif,
 802		       u8 ps_mode, u16 auto_ps_timeout)
 803{
 804	struct wl1271_cmd_ps_params *ps_params = NULL;
 805	int ret = 0;
 806
 807	wl1271_debug(DEBUG_CMD, "cmd set ps mode");
 808
 809	ps_params = kzalloc(sizeof(*ps_params), GFP_KERNEL);
 810	if (!ps_params) {
 811		ret = -ENOMEM;
 812		goto out;
 813	}
 814
 815	ps_params->role_id = wlvif->role_id;
 816	ps_params->ps_mode = ps_mode;
 817	ps_params->auto_ps_timeout = auto_ps_timeout;
 818
 819	ret = wl1271_cmd_send(wl, CMD_SET_PS_MODE, ps_params,
 820			      sizeof(*ps_params), 0);
 821	if (ret < 0) {
 822		wl1271_error("cmd set_ps_mode failed");
 823		goto out;
 824	}
 825
 826out:
 827	kfree(ps_params);
 828	return ret;
 829}
 830
 831int wl1271_cmd_template_set(struct wl1271 *wl, u8 role_id,
 832			    u16 template_id, void *buf, size_t buf_len,
 833			    int index, u32 rates)
 834{
 835	struct wl1271_cmd_template_set *cmd;
 836	int ret = 0;
 837
 838	wl1271_debug(DEBUG_CMD, "cmd template_set %d (role %d)",
 839		     template_id, role_id);
 840
 841	WARN_ON(buf_len > WL1271_CMD_TEMPL_MAX_SIZE);
 842	buf_len = min_t(size_t, buf_len, WL1271_CMD_TEMPL_MAX_SIZE);
 843
 844	cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
 845	if (!cmd) {
 846		ret = -ENOMEM;
 847		goto out;
 848	}
 849
 850	/* during initialization wlvif is NULL */
 851	cmd->role_id = role_id;
 852	cmd->len = cpu_to_le16(buf_len);
 853	cmd->template_type = template_id;
 854	cmd->enabled_rates = cpu_to_le32(rates);
 855	cmd->short_retry_limit = wl->conf.tx.tmpl_short_retry_limit;
 856	cmd->long_retry_limit = wl->conf.tx.tmpl_long_retry_limit;
 857	cmd->index = index;
 858
 859	if (buf)
 860		memcpy(cmd->template_data, buf, buf_len);
 861
 862	ret = wl1271_cmd_send(wl, CMD_SET_TEMPLATE, cmd, sizeof(*cmd), 0);
 863	if (ret < 0) {
 864		wl1271_warning("cmd set_template failed: %d", ret);
 865		goto out_free;
 866	}
 867
 868out_free:
 869	kfree(cmd);
 870
 871out:
 872	return ret;
 873}
 874
 875int wl12xx_cmd_build_null_data(struct wl1271 *wl, struct wl12xx_vif *wlvif)
 876{
 877	struct sk_buff *skb = NULL;
 878	int size;
 879	void *ptr;
 880	int ret = -ENOMEM;
 881
 882
 883	if (wlvif->bss_type == BSS_TYPE_IBSS) {
 884		size = sizeof(struct wl12xx_null_data_template);
 885		ptr = NULL;
 886	} else {
 887		skb = ieee80211_nullfunc_get(wl->hw,
 888					     wl12xx_wlvif_to_vif(wlvif));
 
 889		if (!skb)
 890			goto out;
 891		size = skb->len;
 892		ptr = skb->data;
 893	}
 894
 895	ret = wl1271_cmd_template_set(wl, wlvif->role_id,
 896				      CMD_TEMPL_NULL_DATA, ptr, size, 0,
 897				      wlvif->basic_rate);
 898
 899out:
 900	dev_kfree_skb(skb);
 901	if (ret)
 902		wl1271_warning("cmd buld null data failed %d", ret);
 903
 904	return ret;
 905
 906}
 907
 908int wl12xx_cmd_build_klv_null_data(struct wl1271 *wl,
 909				   struct wl12xx_vif *wlvif)
 910{
 911	struct ieee80211_vif *vif = wl12xx_wlvif_to_vif(wlvif);
 912	struct sk_buff *skb = NULL;
 913	int ret = -ENOMEM;
 914
 915	skb = ieee80211_nullfunc_get(wl->hw, vif);
 916	if (!skb)
 917		goto out;
 918
 919	ret = wl1271_cmd_template_set(wl, wlvif->role_id, CMD_TEMPL_KLV,
 920				      skb->data, skb->len,
 921				      CMD_TEMPL_KLV_IDX_NULL_DATA,
 922				      wlvif->basic_rate);
 923
 924out:
 925	dev_kfree_skb(skb);
 926	if (ret)
 927		wl1271_warning("cmd build klv null data failed %d", ret);
 928
 929	return ret;
 930
 931}
 932
 933int wl1271_cmd_build_ps_poll(struct wl1271 *wl, struct wl12xx_vif *wlvif,
 934			     u16 aid)
 935{
 936	struct ieee80211_vif *vif = wl12xx_wlvif_to_vif(wlvif);
 937	struct sk_buff *skb;
 938	int ret = 0;
 939
 940	skb = ieee80211_pspoll_get(wl->hw, vif);
 941	if (!skb)
 942		goto out;
 943
 944	ret = wl1271_cmd_template_set(wl, wlvif->role_id,
 945				      CMD_TEMPL_PS_POLL, skb->data,
 946				      skb->len, 0, wlvif->basic_rate_set);
 947
 948out:
 949	dev_kfree_skb(skb);
 950	return ret;
 951}
 952
 953int wl12xx_cmd_build_probe_req(struct wl1271 *wl, struct wl12xx_vif *wlvif,
 954			       u8 role_id, u8 band,
 955			       const u8 *ssid, size_t ssid_len,
 956			       const u8 *ie, size_t ie_len)
 
 957{
 958	struct ieee80211_vif *vif = wl12xx_wlvif_to_vif(wlvif);
 959	struct sk_buff *skb;
 960	int ret;
 961	u32 rate;
 
 
 962
 963	skb = ieee80211_probereq_get(wl->hw, vif, ssid, ssid_len,
 964				     ie, ie_len);
 
 
 965	if (!skb) {
 966		ret = -ENOMEM;
 967		goto out;
 968	}
 969
 970	wl1271_dump(DEBUG_SCAN, "PROBE REQ: ", skb->data, skb->len);
 
 
 
 
 
 
 
 
 971
 972	rate = wl1271_tx_min_rate_get(wl, wlvif->bitrate_masks[band]);
 973	if (band == IEEE80211_BAND_2GHZ)
 974		ret = wl1271_cmd_template_set(wl, role_id,
 975					      CMD_TEMPL_CFG_PROBE_REQ_2_4,
 976					      skb->data, skb->len, 0, rate);
 977	else
 978		ret = wl1271_cmd_template_set(wl, role_id,
 979					      CMD_TEMPL_CFG_PROBE_REQ_5,
 980					      skb->data, skb->len, 0, rate);
 981
 982out:
 983	dev_kfree_skb(skb);
 984	return ret;
 985}
 
 986
 987struct sk_buff *wl1271_cmd_build_ap_probe_req(struct wl1271 *wl,
 988					      struct wl12xx_vif *wlvif,
 989					      struct sk_buff *skb)
 990{
 991	struct ieee80211_vif *vif = wl12xx_wlvif_to_vif(wlvif);
 992	int ret;
 993	u32 rate;
 994
 995	if (!skb)
 996		skb = ieee80211_ap_probereq_get(wl->hw, vif);
 997	if (!skb)
 998		goto out;
 999
1000	wl1271_dump(DEBUG_SCAN, "AP PROBE REQ: ", skb->data, skb->len);
1001
1002	rate = wl1271_tx_min_rate_get(wl, wlvif->bitrate_masks[wlvif->band]);
1003	if (wlvif->band == IEEE80211_BAND_2GHZ)
1004		ret = wl1271_cmd_template_set(wl, wlvif->role_id,
1005					      CMD_TEMPL_CFG_PROBE_REQ_2_4,
1006					      skb->data, skb->len, 0, rate);
1007	else
1008		ret = wl1271_cmd_template_set(wl, wlvif->role_id,
1009					      CMD_TEMPL_CFG_PROBE_REQ_5,
1010					      skb->data, skb->len, 0, rate);
1011
1012	if (ret < 0)
1013		wl1271_error("Unable to set ap probe request template.");
1014
1015out:
1016	return skb;
1017}
1018
1019int wl1271_cmd_build_arp_rsp(struct wl1271 *wl, struct wl12xx_vif *wlvif)
1020{
1021	int ret, extra;
1022	u16 fc;
1023	struct ieee80211_vif *vif = wl12xx_wlvif_to_vif(wlvif);
1024	struct sk_buff *skb;
1025	struct wl12xx_arp_rsp_template *tmpl;
1026	struct ieee80211_hdr_3addr *hdr;
1027	struct arphdr *arp_hdr;
1028
1029	skb = dev_alloc_skb(sizeof(*hdr) + sizeof(__le16) + sizeof(*tmpl) +
1030			    WL1271_EXTRA_SPACE_MAX);
1031	if (!skb) {
1032		wl1271_error("failed to allocate buffer for arp rsp template");
1033		return -ENOMEM;
1034	}
1035
1036	skb_reserve(skb, sizeof(*hdr) + WL1271_EXTRA_SPACE_MAX);
1037
1038	tmpl = (struct wl12xx_arp_rsp_template *)skb_put(skb, sizeof(*tmpl));
1039	memset(tmpl, 0, sizeof(*tmpl));
1040
1041	/* llc layer */
1042	memcpy(tmpl->llc_hdr, rfc1042_header, sizeof(rfc1042_header));
1043	tmpl->llc_type = cpu_to_be16(ETH_P_ARP);
1044
1045	/* arp header */
1046	arp_hdr = &tmpl->arp_hdr;
1047	arp_hdr->ar_hrd = cpu_to_be16(ARPHRD_ETHER);
1048	arp_hdr->ar_pro = cpu_to_be16(ETH_P_IP);
1049	arp_hdr->ar_hln = ETH_ALEN;
1050	arp_hdr->ar_pln = 4;
1051	arp_hdr->ar_op = cpu_to_be16(ARPOP_REPLY);
1052
1053	/* arp payload */
1054	memcpy(tmpl->sender_hw, vif->addr, ETH_ALEN);
1055	tmpl->sender_ip = wlvif->ip_addr;
1056
1057	/* encryption space */
1058	switch (wlvif->encryption_type) {
1059	case KEY_TKIP:
1060		extra = WL1271_EXTRA_SPACE_TKIP;
 
1061		break;
1062	case KEY_AES:
1063		extra = WL1271_EXTRA_SPACE_AES;
1064		break;
1065	case KEY_NONE:
1066	case KEY_WEP:
1067	case KEY_GEM:
1068		extra = 0;
1069		break;
1070	default:
1071		wl1271_warning("Unknown encryption type: %d",
1072			       wlvif->encryption_type);
1073		ret = -EINVAL;
1074		goto out;
1075	}
1076
1077	if (extra) {
1078		u8 *space = skb_push(skb, extra);
1079		memset(space, 0, extra);
1080	}
1081
1082	/* QoS header - BE */
1083	if (wlvif->sta.qos)
1084		memset(skb_push(skb, sizeof(__le16)), 0, sizeof(__le16));
1085
1086	/* mac80211 header */
1087	hdr = (struct ieee80211_hdr_3addr *)skb_push(skb, sizeof(*hdr));
1088	memset(hdr, 0, sizeof(*hdr));
1089	fc = IEEE80211_FTYPE_DATA | IEEE80211_FCTL_TODS;
1090	if (wlvif->sta.qos)
1091		fc |= IEEE80211_STYPE_QOS_DATA;
1092	else
1093		fc |= IEEE80211_STYPE_DATA;
1094	if (wlvif->encryption_type != KEY_NONE)
1095		fc |= IEEE80211_FCTL_PROTECTED;
1096
1097	hdr->frame_control = cpu_to_le16(fc);
1098	memcpy(hdr->addr1, vif->bss_conf.bssid, ETH_ALEN);
1099	memcpy(hdr->addr2, vif->addr, ETH_ALEN);
1100	memset(hdr->addr3, 0xff, ETH_ALEN);
1101
1102	ret = wl1271_cmd_template_set(wl, wlvif->role_id, CMD_TEMPL_ARP_RSP,
1103				      skb->data, skb->len, 0,
1104				      wlvif->basic_rate);
1105out:
1106	dev_kfree_skb(skb);
1107	return ret;
1108}
1109
1110int wl1271_build_qos_null_data(struct wl1271 *wl, struct ieee80211_vif *vif)
1111{
1112	struct wl12xx_vif *wlvif = wl12xx_vif_to_data(vif);
1113	struct ieee80211_qos_hdr template;
1114
1115	memset(&template, 0, sizeof(template));
1116
1117	memcpy(template.addr1, vif->bss_conf.bssid, ETH_ALEN);
1118	memcpy(template.addr2, vif->addr, ETH_ALEN);
1119	memcpy(template.addr3, vif->bss_conf.bssid, ETH_ALEN);
1120
1121	template.frame_control = cpu_to_le16(IEEE80211_FTYPE_DATA |
1122					     IEEE80211_STYPE_QOS_NULLFUNC |
1123					     IEEE80211_FCTL_TODS);
1124
1125	/* FIXME: not sure what priority to use here */
1126	template.qos_ctrl = cpu_to_le16(0);
1127
1128	return wl1271_cmd_template_set(wl, wlvif->role_id,
1129				       CMD_TEMPL_QOS_NULL_DATA, &template,
1130				       sizeof(template), 0,
1131				       wlvif->basic_rate);
1132}
1133
1134int wl12xx_cmd_set_default_wep_key(struct wl1271 *wl, u8 id, u8 hlid)
1135{
1136	struct wl1271_cmd_set_keys *cmd;
1137	int ret = 0;
1138
1139	wl1271_debug(DEBUG_CMD, "cmd set_default_wep_key %d", id);
1140
1141	cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
1142	if (!cmd) {
1143		ret = -ENOMEM;
1144		goto out;
1145	}
1146
1147	cmd->hlid = hlid;
1148	cmd->key_id = id;
1149	cmd->lid_key_type = WEP_DEFAULT_LID_TYPE;
1150	cmd->key_action = cpu_to_le16(KEY_SET_ID);
1151	cmd->key_type = KEY_WEP;
1152
1153	ret = wl1271_cmd_send(wl, CMD_SET_KEYS, cmd, sizeof(*cmd), 0);
1154	if (ret < 0) {
1155		wl1271_warning("cmd set_default_wep_key failed: %d", ret);
1156		goto out;
1157	}
1158
1159out:
1160	kfree(cmd);
1161
1162	return ret;
1163}
1164
1165int wl1271_cmd_set_sta_key(struct wl1271 *wl, struct wl12xx_vif *wlvif,
1166		       u16 action, u8 id, u8 key_type,
1167		       u8 key_size, const u8 *key, const u8 *addr,
1168		       u32 tx_seq_32, u16 tx_seq_16)
1169{
1170	struct wl1271_cmd_set_keys *cmd;
1171	int ret = 0;
1172
1173	/* hlid might have already been deleted */
1174	if (wlvif->sta.hlid == WL12XX_INVALID_LINK_ID)
1175		return 0;
1176
1177	cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
1178	if (!cmd) {
1179		ret = -ENOMEM;
1180		goto out;
1181	}
1182
1183	cmd->hlid = wlvif->sta.hlid;
1184
1185	if (key_type == KEY_WEP)
1186		cmd->lid_key_type = WEP_DEFAULT_LID_TYPE;
1187	else if (is_broadcast_ether_addr(addr))
1188		cmd->lid_key_type = BROADCAST_LID_TYPE;
1189	else
1190		cmd->lid_key_type = UNICAST_LID_TYPE;
1191
1192	cmd->key_action = cpu_to_le16(action);
1193	cmd->key_size = key_size;
1194	cmd->key_type = key_type;
1195
1196	cmd->ac_seq_num16[0] = cpu_to_le16(tx_seq_16);
1197	cmd->ac_seq_num32[0] = cpu_to_le32(tx_seq_32);
1198
1199	cmd->key_id = id;
1200
1201	if (key_type == KEY_TKIP) {
1202		/*
1203		 * We get the key in the following form:
1204		 * TKIP (16 bytes) - TX MIC (8 bytes) - RX MIC (8 bytes)
1205		 * but the target is expecting:
1206		 * TKIP - RX MIC - TX MIC
1207		 */
1208		memcpy(cmd->key, key, 16);
1209		memcpy(cmd->key + 16, key + 24, 8);
1210		memcpy(cmd->key + 24, key + 16, 8);
1211
1212	} else {
1213		memcpy(cmd->key, key, key_size);
1214	}
1215
1216	wl1271_dump(DEBUG_CRYPT, "TARGET KEY: ", cmd, sizeof(*cmd));
1217
1218	ret = wl1271_cmd_send(wl, CMD_SET_KEYS, cmd, sizeof(*cmd), 0);
1219	if (ret < 0) {
1220		wl1271_warning("could not set keys");
1221	goto out;
1222	}
1223
1224out:
1225	kfree(cmd);
1226
1227	return ret;
1228}
1229
1230/*
1231 * TODO: merge with sta/ibss into 1 set_key function.
1232 * note there are slight diffs
1233 */
1234int wl1271_cmd_set_ap_key(struct wl1271 *wl, struct wl12xx_vif *wlvif,
1235			  u16 action, u8 id, u8 key_type,
1236			  u8 key_size, const u8 *key, u8 hlid, u32 tx_seq_32,
1237			  u16 tx_seq_16)
1238{
1239	struct wl1271_cmd_set_keys *cmd;
1240	int ret = 0;
1241	u8 lid_type;
1242
1243	cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
1244	if (!cmd)
1245		return -ENOMEM;
1246
1247	if (hlid == wlvif->ap.bcast_hlid) {
1248		if (key_type == KEY_WEP)
1249			lid_type = WEP_DEFAULT_LID_TYPE;
1250		else
1251			lid_type = BROADCAST_LID_TYPE;
 
 
1252	} else {
1253		lid_type = UNICAST_LID_TYPE;
1254	}
1255
1256	wl1271_debug(DEBUG_CRYPT, "ap key action: %d id: %d lid: %d type: %d"
1257		     " hlid: %d", (int)action, (int)id, (int)lid_type,
1258		     (int)key_type, (int)hlid);
1259
1260	cmd->lid_key_type = lid_type;
1261	cmd->hlid = hlid;
1262	cmd->key_action = cpu_to_le16(action);
1263	cmd->key_size = key_size;
1264	cmd->key_type = key_type;
1265	cmd->key_id = id;
1266	cmd->ac_seq_num16[0] = cpu_to_le16(tx_seq_16);
1267	cmd->ac_seq_num32[0] = cpu_to_le32(tx_seq_32);
1268
1269	if (key_type == KEY_TKIP) {
1270		/*
1271		 * We get the key in the following form:
1272		 * TKIP (16 bytes) - TX MIC (8 bytes) - RX MIC (8 bytes)
1273		 * but the target is expecting:
1274		 * TKIP - RX MIC - TX MIC
1275		 */
1276		memcpy(cmd->key, key, 16);
1277		memcpy(cmd->key + 16, key + 24, 8);
1278		memcpy(cmd->key + 24, key + 16, 8);
1279	} else {
1280		memcpy(cmd->key, key, key_size);
1281	}
1282
1283	wl1271_dump(DEBUG_CRYPT, "TARGET AP KEY: ", cmd, sizeof(*cmd));
1284
1285	ret = wl1271_cmd_send(wl, CMD_SET_KEYS, cmd, sizeof(*cmd), 0);
1286	if (ret < 0) {
1287		wl1271_warning("could not set ap keys");
1288		goto out;
1289	}
1290
1291out:
1292	kfree(cmd);
1293	return ret;
1294}
1295
1296int wl12xx_cmd_set_peer_state(struct wl1271 *wl, u8 hlid)
 
1297{
1298	struct wl12xx_cmd_set_peer_state *cmd;
1299	int ret = 0;
1300
1301	wl1271_debug(DEBUG_CMD, "cmd set peer state (hlid=%d)", hlid);
1302
1303	cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
1304	if (!cmd) {
1305		ret = -ENOMEM;
1306		goto out;
1307	}
1308
1309	cmd->hlid = hlid;
1310	cmd->state = WL1271_CMD_STA_STATE_CONNECTED;
1311
 
 
 
 
1312	ret = wl1271_cmd_send(wl, CMD_SET_PEER_STATE, cmd, sizeof(*cmd), 0);
1313	if (ret < 0) {
1314		wl1271_error("failed to send set peer state command");
1315		goto out_free;
1316	}
1317
1318out_free:
1319	kfree(cmd);
1320
1321out:
1322	return ret;
1323}
1324
1325int wl12xx_cmd_add_peer(struct wl1271 *wl, struct wl12xx_vif *wlvif,
1326			struct ieee80211_sta *sta, u8 hlid)
1327{
1328	struct wl12xx_cmd_add_peer *cmd;
1329	int i, ret;
1330	u32 sta_rates;
1331
1332	wl1271_debug(DEBUG_CMD, "cmd add peer %d", (int)hlid);
1333
1334	cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
1335	if (!cmd) {
1336		ret = -ENOMEM;
1337		goto out;
1338	}
1339
1340	memcpy(cmd->addr, sta->addr, ETH_ALEN);
1341	cmd->bss_index = WL1271_AP_BSS_INDEX;
1342	cmd->aid = sta->aid;
1343	cmd->hlid = hlid;
1344	cmd->sp_len = sta->max_sp;
1345	cmd->wmm = sta->wme ? 1 : 0;
 
 
1346
1347	for (i = 0; i < NUM_ACCESS_CATEGORIES_COPY; i++)
1348		if (sta->wme && (sta->uapsd_queues & BIT(i)))
1349			cmd->psd_type[i] = WL1271_PSD_UPSD_TRIGGER;
 
1350		else
1351			cmd->psd_type[i] = WL1271_PSD_LEGACY;
 
1352
1353	sta_rates = sta->supp_rates[wlvif->band];
1354	if (sta->ht_cap.ht_supported)
1355		sta_rates |= sta->ht_cap.mcs.rx_mask[0] << HW_HT_RATES_OFFSET;
 
 
 
1356
1357	cmd->supported_rates =
1358		cpu_to_le32(wl1271_tx_enabled_rates_get(wl, sta_rates,
1359							wlvif->band));
1360
1361	wl1271_debug(DEBUG_CMD, "new peer rates=0x%x queues=0x%x",
1362		     cmd->supported_rates, sta->uapsd_queues);
1363
1364	ret = wl1271_cmd_send(wl, CMD_ADD_PEER, cmd, sizeof(*cmd), 0);
1365	if (ret < 0) {
1366		wl1271_error("failed to initiate cmd add peer");
1367		goto out_free;
1368	}
1369
1370out_free:
1371	kfree(cmd);
1372
1373out:
1374	return ret;
1375}
1376
1377int wl12xx_cmd_remove_peer(struct wl1271 *wl, u8 hlid)
 
1378{
1379	struct wl12xx_cmd_remove_peer *cmd;
1380	int ret;
 
1381
1382	wl1271_debug(DEBUG_CMD, "cmd remove peer %d", (int)hlid);
1383
1384	cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
1385	if (!cmd) {
1386		ret = -ENOMEM;
1387		goto out;
1388	}
1389
1390	cmd->hlid = hlid;
1391	/* We never send a deauth, mac80211 is in charge of this */
1392	cmd->reason_opcode = 0;
1393	cmd->send_deauth_flag = 0;
 
1394
1395	ret = wl1271_cmd_send(wl, CMD_REMOVE_PEER, cmd, sizeof(*cmd), 0);
1396	if (ret < 0) {
1397		wl1271_error("failed to initiate cmd remove peer");
1398		goto out_free;
1399	}
1400
 
 
 
 
1401	/*
1402	 * We are ok with a timeout here. The event is sometimes not sent
1403	 * due to a firmware bug.
 
1404	 */
1405	wl1271_cmd_wait_for_event_or_timeout(wl,
1406					     PEER_REMOVE_COMPLETE_EVENT_ID);
1407
1408out_free:
1409	kfree(cmd);
1410
1411out:
1412	return ret;
1413}
1414
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1415int wl12xx_cmd_config_fwlog(struct wl1271 *wl)
1416{
1417	struct wl12xx_cmd_config_fwlog *cmd;
1418	int ret = 0;
1419
1420	wl1271_debug(DEBUG_CMD, "cmd config firmware logger");
1421
1422	cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
1423	if (!cmd) {
1424		ret = -ENOMEM;
1425		goto out;
1426	}
1427
1428	cmd->logger_mode = wl->conf.fwlog.mode;
1429	cmd->log_severity = wl->conf.fwlog.severity;
1430	cmd->timestamp = wl->conf.fwlog.timestamp;
1431	cmd->output = wl->conf.fwlog.output;
1432	cmd->threshold = wl->conf.fwlog.threshold;
1433
1434	ret = wl1271_cmd_send(wl, CMD_CONFIG_FWLOGGER, cmd, sizeof(*cmd), 0);
1435	if (ret < 0) {
1436		wl1271_error("failed to send config firmware logger command");
1437		goto out_free;
1438	}
1439
1440out_free:
1441	kfree(cmd);
1442
1443out:
1444	return ret;
1445}
1446
1447int wl12xx_cmd_start_fwlog(struct wl1271 *wl)
1448{
1449	struct wl12xx_cmd_start_fwlog *cmd;
1450	int ret = 0;
1451
1452	wl1271_debug(DEBUG_CMD, "cmd start firmware logger");
1453
1454	cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
1455	if (!cmd) {
1456		ret = -ENOMEM;
1457		goto out;
1458	}
1459
1460	ret = wl1271_cmd_send(wl, CMD_START_FWLOGGER, cmd, sizeof(*cmd), 0);
1461	if (ret < 0) {
1462		wl1271_error("failed to send start firmware logger command");
1463		goto out_free;
1464	}
1465
1466out_free:
1467	kfree(cmd);
1468
1469out:
1470	return ret;
1471}
1472
1473int wl12xx_cmd_stop_fwlog(struct wl1271 *wl)
1474{
1475	struct wl12xx_cmd_stop_fwlog *cmd;
1476	int ret = 0;
1477
1478	wl1271_debug(DEBUG_CMD, "cmd stop firmware logger");
1479
1480	cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
1481	if (!cmd) {
1482		ret = -ENOMEM;
1483		goto out;
1484	}
1485
1486	ret = wl1271_cmd_send(wl, CMD_STOP_FWLOGGER, cmd, sizeof(*cmd), 0);
1487	if (ret < 0) {
1488		wl1271_error("failed to send stop firmware logger command");
1489		goto out_free;
1490	}
1491
1492out_free:
1493	kfree(cmd);
1494
1495out:
1496	return ret;
1497}
1498
1499static int wl12xx_cmd_roc(struct wl1271 *wl, struct wl12xx_vif *wlvif,
1500			  u8 role_id)
1501{
1502	struct wl12xx_cmd_roc *cmd;
1503	int ret = 0;
1504
1505	wl1271_debug(DEBUG_CMD, "cmd roc %d (%d)", wlvif->channel, role_id);
1506
1507	if (WARN_ON(role_id == WL12XX_INVALID_ROLE_ID))
1508		return -EINVAL;
1509
1510	cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
1511	if (!cmd) {
1512		ret = -ENOMEM;
1513		goto out;
1514	}
1515
1516	cmd->role_id = role_id;
1517	cmd->channel = wlvif->channel;
1518	switch (wlvif->band) {
1519	case IEEE80211_BAND_2GHZ:
1520		cmd->band = WLCORE_BAND_2_4GHZ;
1521		break;
1522	case IEEE80211_BAND_5GHZ:
1523		cmd->band = WLCORE_BAND_5GHZ;
1524		break;
1525	default:
1526		wl1271_error("roc - unknown band: %d", (int)wlvif->band);
1527		ret = -EINVAL;
1528		goto out_free;
1529	}
1530
1531
1532	ret = wl1271_cmd_send(wl, CMD_REMAIN_ON_CHANNEL, cmd, sizeof(*cmd), 0);
1533	if (ret < 0) {
1534		wl1271_error("failed to send ROC command");
1535		goto out_free;
1536	}
1537
1538out_free:
1539	kfree(cmd);
1540
1541out:
1542	return ret;
1543}
1544
1545static int wl12xx_cmd_croc(struct wl1271 *wl, u8 role_id)
1546{
1547	struct wl12xx_cmd_croc *cmd;
1548	int ret = 0;
1549
1550	wl1271_debug(DEBUG_CMD, "cmd croc (%d)", role_id);
1551
1552	cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
1553	if (!cmd) {
1554		ret = -ENOMEM;
1555		goto out;
1556	}
1557	cmd->role_id = role_id;
1558
1559	ret = wl1271_cmd_send(wl, CMD_CANCEL_REMAIN_ON_CHANNEL, cmd,
1560			      sizeof(*cmd), 0);
1561	if (ret < 0) {
1562		wl1271_error("failed to send ROC command");
1563		goto out_free;
1564	}
1565
1566out_free:
1567	kfree(cmd);
1568
1569out:
1570	return ret;
1571}
1572
1573int wl12xx_roc(struct wl1271 *wl, struct wl12xx_vif *wlvif, u8 role_id)
 
1574{
1575	int ret = 0;
1576
1577	if (WARN_ON(test_bit(role_id, wl->roc_map)))
1578		return 0;
1579
1580	ret = wl12xx_cmd_roc(wl, wlvif, role_id);
1581	if (ret < 0)
1582		goto out;
1583
1584	ret = wl1271_cmd_wait_for_event(wl,
1585					REMAIN_ON_CHANNEL_COMPLETE_EVENT_ID);
1586	if (ret < 0) {
1587		wl1271_error("cmd roc event completion error");
1588		goto out;
1589	}
1590
1591	__set_bit(role_id, wl->roc_map);
1592out:
1593	return ret;
1594}
1595
1596int wl12xx_croc(struct wl1271 *wl, u8 role_id)
1597{
1598	int ret = 0;
1599
1600	if (WARN_ON(!test_bit(role_id, wl->roc_map)))
1601		return 0;
1602
1603	ret = wl12xx_cmd_croc(wl, role_id);
1604	if (ret < 0)
1605		goto out;
1606
1607	__clear_bit(role_id, wl->roc_map);
1608
1609	/*
1610	 * Rearm the tx watchdog when removing the last ROC. This prevents
1611	 * recoveries due to just finished ROCs - when Tx hasn't yet had
1612	 * a chance to get out.
1613	 */
1614	if (find_first_bit(wl->roc_map, WL12XX_MAX_ROLES) >= WL12XX_MAX_ROLES)
1615		wl12xx_rearm_tx_watchdog_locked(wl);
1616out:
1617	return ret;
1618}
1619
1620int wl12xx_cmd_channel_switch(struct wl1271 *wl,
1621			      struct wl12xx_vif *wlvif,
1622			      struct ieee80211_channel_switch *ch_switch)
1623{
1624	struct wl12xx_cmd_channel_switch *cmd;
1625	int ret;
1626
1627	wl1271_debug(DEBUG_ACX, "cmd channel switch");
1628
1629	cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
1630	if (!cmd) {
1631		ret = -ENOMEM;
1632		goto out;
1633	}
1634
1635	cmd->role_id = wlvif->role_id;
1636	cmd->channel = ch_switch->channel->hw_value;
1637	cmd->switch_time = ch_switch->count;
1638	cmd->stop_tx = ch_switch->block_tx;
1639
1640	/* FIXME: control from mac80211 in the future */
1641	cmd->post_switch_tx_disable = 0;  /* Enable TX on the target channel */
1642
1643	ret = wl1271_cmd_send(wl, CMD_CHANNEL_SWITCH, cmd, sizeof(*cmd), 0);
1644	if (ret < 0) {
1645		wl1271_error("failed to send channel switch command");
1646		goto out_free;
1647	}
1648
1649out_free:
1650	kfree(cmd);
1651
1652out:
1653	return ret;
1654}
1655
1656int wl12xx_cmd_stop_channel_switch(struct wl1271 *wl)
1657{
1658	struct wl12xx_cmd_stop_channel_switch *cmd;
1659	int ret;
1660
1661	wl1271_debug(DEBUG_ACX, "cmd stop channel switch");
1662
1663	cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
1664	if (!cmd) {
1665		ret = -ENOMEM;
1666		goto out;
1667	}
1668
1669	ret = wl1271_cmd_send(wl, CMD_STOP_CHANNEL_SWICTH, cmd, sizeof(*cmd), 0);
1670	if (ret < 0) {
1671		wl1271_error("failed to stop channel switch command");
1672		goto out_free;
1673	}
1674
1675out_free:
1676	kfree(cmd);
1677
1678out:
1679	return ret;
1680}
1681
1682/* start dev role and roc on its channel */
1683int wl12xx_start_dev(struct wl1271 *wl, struct wl12xx_vif *wlvif)
 
1684{
1685	int ret;
1686
1687	if (WARN_ON(!(wlvif->bss_type == BSS_TYPE_STA_BSS ||
1688		      wlvif->bss_type == BSS_TYPE_IBSS)))
1689		return -EINVAL;
1690
1691	ret = wl12xx_cmd_role_start_dev(wl, wlvif);
 
 
 
 
 
 
 
 
 
 
1692	if (ret < 0)
1693		goto out;
1694
1695	ret = wl12xx_roc(wl, wlvif, wlvif->dev_role_id);
1696	if (ret < 0)
1697		goto out_stop;
1698
1699	return 0;
1700
1701out_stop:
1702	wl12xx_cmd_role_stop_dev(wl, wlvif);
 
 
 
1703out:
1704	return ret;
1705}
1706
1707/* croc dev hlid, and stop the role */
1708int wl12xx_stop_dev(struct wl1271 *wl, struct wl12xx_vif *wlvif)
1709{
1710	int ret;
1711
1712	if (WARN_ON(!(wlvif->bss_type == BSS_TYPE_STA_BSS ||
1713		      wlvif->bss_type == BSS_TYPE_IBSS)))
1714		return -EINVAL;
1715
1716	/* flush all pending packets */
1717	wl1271_tx_work_locked(wl);
 
 
1718
1719	if (test_bit(wlvif->dev_role_id, wl->roc_map)) {
1720		ret = wl12xx_croc(wl, wlvif->dev_role_id);
1721		if (ret < 0)
1722			goto out;
1723	}
1724
1725	ret = wl12xx_cmd_role_stop_dev(wl, wlvif);
1726	if (ret < 0)
1727		goto out;
 
 
 
 
 
 
 
1728out:
1729	return ret;
1730}