1/* src/prism2/driver/prism2sta.c 2* 3* Implements the station functionality for prism2 4* 5* Copyright (C) 1999 AbsoluteValue Systems, Inc. All Rights Reserved. 6* -------------------------------------------------------------------- 7* 8* linux-wlan 9* 10* The contents of this file are subject to the Mozilla Public 11* License Version 1.1 (the "License"); you may not use this file 12* except in compliance with the License. You may obtain a copy of 13* the License at http://www.mozilla.org/MPL/ 14* 15* Software distributed under the License is distributed on an "AS 16* IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or 17* implied. See the License for the specific language governing 18* rights and limitations under the License. 19* 20* Alternatively, the contents of this file may be used under the 21* terms of the GNU Public License version 2 (the "GPL"), in which 22* case the provisions of the GPL are applicable instead of the 23* above. If you wish to allow the use of your version of this file 24* only under the terms of the GPL and not to allow others to use 25* your version of this file under the MPL, indicate your decision 26* by deleting the provisions above and replace them with the notice 27* and other provisions required by the GPL. If you do not delete 28* the provisions above, a recipient may use your version of this 29* file under either the MPL or the GPL. 30* 31* -------------------------------------------------------------------- 32* 33* Inquiries regarding the linux-wlan Open Source project can be 34* made directly to: 35* 36* AbsoluteValue Systems Inc. 37* info@linux-wlan.com 38* http://www.linux-wlan.com 39* 40* -------------------------------------------------------------------- 41* 42* Portions of the development of this software were funded by 43* Intersil Corporation as part of PRISM(R) chipset product development. 44* 45* -------------------------------------------------------------------- 46* 47* This file implements the module and linux pcmcia routines for the 48* prism2 driver. 49* 50* -------------------------------------------------------------------- 51*/ 52 53#include <linux/version.h> 54#include <linux/module.h> 55#include <linux/moduleparam.h> 56#include <linux/kernel.h> 57#include <linux/sched.h> 58#include <linux/types.h> 59#include <linux/init.h> 60#include <linux/slab.h> 61#include <linux/wireless.h> 62#include <linux/netdevice.h> 63#include <linux/workqueue.h> 64#include <linux/byteorder/generic.h> 65#include <linux/ctype.h> 66 67#include <linux/io.h> 68#include <linux/delay.h> 69#include <asm/byteorder.h> 70#include <linux/if_arp.h> 71#include <linux/if_ether.h> 72#include <linux/bitops.h> 73 74#include "p80211types.h" 75#include "p80211hdr.h" 76#include "p80211mgmt.h" 77#include "p80211conv.h" 78#include "p80211msg.h" 79#include "p80211netdev.h" 80#include "p80211req.h" 81#include "p80211metadef.h" 82#include "p80211metastruct.h" 83#include "hfa384x.h" 84#include "prism2mgmt.h" 85 86/* Create a string of printable chars from something that might not be */ 87/* It's recommended that the str be 4*len + 1 bytes long */ 88#define wlan_mkprintstr(buf, buflen, str, strlen) \ 89{ \ 90 int i = 0; \ 91 int j = 0; \ 92 memset(str, 0, (strlen)); \ 93 for (i = 0; i < (buflen); i++) { \ 94 if (isprint((buf)[i])) { \ 95 (str)[j] = (buf)[i]; \ 96 j++; \ 97 } else { \ 98 (str)[j] = '\\'; \ 99 (str)[j+1] = 'x'; \ 100 (str)[j+2] = hex_asc_hi((buf)[i]); \ 101 (str)[j+3] = hex_asc_lo((buf)[i]); \ 102 j += 4; \ 103 } \ 104 } \ 105} 106 107static char *dev_info = "prism2_usb"; 108static wlandevice_t *create_wlan(void); 109 110int prism2_reset_holdtime = 30; /* Reset hold time in ms */ 111int prism2_reset_settletime = 100; /* Reset settle time in ms */ 112 113static int prism2_doreset; /* Do a reset at init? */ 114 115module_param(prism2_doreset, int, 0644); 116MODULE_PARM_DESC(prism2_doreset, "Issue a reset on initialization"); 117 118module_param(prism2_reset_holdtime, int, 0644); 119MODULE_PARM_DESC(prism2_reset_holdtime, "reset hold time in ms"); 120module_param(prism2_reset_settletime, int, 0644); 121MODULE_PARM_DESC(prism2_reset_settletime, "reset settle time in ms"); 122 123MODULE_LICENSE("Dual MPL/GPL"); 124 125void prism2_connect_result(wlandevice_t *wlandev, u8 failed); 126void prism2_disconnected(wlandevice_t *wlandev); 127void prism2_roamed(wlandevice_t *wlandev); 128 129static int prism2sta_open(wlandevice_t *wlandev); 130static int prism2sta_close(wlandevice_t *wlandev); 131static void prism2sta_reset(wlandevice_t *wlandev); 132static int prism2sta_txframe(wlandevice_t *wlandev, struct sk_buff *skb, 133 union p80211_hdr *p80211_hdr, 134 struct p80211_metawep *p80211_wep); 135static int prism2sta_mlmerequest(wlandevice_t *wlandev, struct p80211msg *msg); 136static int prism2sta_getcardinfo(wlandevice_t *wlandev); 137static int prism2sta_globalsetup(wlandevice_t *wlandev); 138static int prism2sta_setmulticast(wlandevice_t *wlandev, netdevice_t *dev); 139 140static void prism2sta_inf_handover(wlandevice_t *wlandev, 141 hfa384x_InfFrame_t *inf); 142static void prism2sta_inf_tallies(wlandevice_t *wlandev, 143 hfa384x_InfFrame_t *inf); 144static void prism2sta_inf_hostscanresults(wlandevice_t *wlandev, 145 hfa384x_InfFrame_t *inf); 146static void prism2sta_inf_scanresults(wlandevice_t *wlandev, 147 hfa384x_InfFrame_t *inf); 148static void prism2sta_inf_chinforesults(wlandevice_t *wlandev, 149 hfa384x_InfFrame_t *inf); 150static void prism2sta_inf_linkstatus(wlandevice_t *wlandev, 151 hfa384x_InfFrame_t *inf); 152static void prism2sta_inf_assocstatus(wlandevice_t *wlandev, 153 hfa384x_InfFrame_t *inf); 154static void prism2sta_inf_authreq(wlandevice_t *wlandev, 155 hfa384x_InfFrame_t *inf); 156static void prism2sta_inf_authreq_defer(wlandevice_t *wlandev, 157 hfa384x_InfFrame_t *inf); 158static void prism2sta_inf_psusercnt(wlandevice_t *wlandev, 159 hfa384x_InfFrame_t *inf); 160 161/*---------------------------------------------------------------- 162* prism2sta_open 163* 164* WLAN device open method. Called from p80211netdev when kernel 165* device open (start) method is called in response to the 166* SIOCSIIFFLAGS ioctl changing the flags bit IFF_UP 167* from clear to set. 168* 169* Arguments: 170* wlandev wlan device structure 171* 172* Returns: 173* 0 success 174* >0 f/w reported error 175* <0 driver reported error 176* 177* Side effects: 178* 179* Call context: 180* process thread 181----------------------------------------------------------------*/ 182static int prism2sta_open(wlandevice_t *wlandev) 183{ 184 /* We don't currently have to do anything else. 185 * The setup of the MAC should be subsequently completed via 186 * the mlme commands. 187 * Higher layers know we're ready from dev->start==1 and 188 * dev->tbusy==0. Our rx path knows to pass up received/ 189 * frames because of dev->flags&IFF_UP is true. 190 */ 191 192 return 0; 193} 194 195/*---------------------------------------------------------------- 196* prism2sta_close 197* 198* WLAN device close method. Called from p80211netdev when kernel 199* device close method is called in response to the 200* SIOCSIIFFLAGS ioctl changing the flags bit IFF_UP 201* from set to clear. 202* 203* Arguments: 204* wlandev wlan device structure 205* 206* Returns: 207* 0 success 208* >0 f/w reported error 209* <0 driver reported error 210* 211* Side effects: 212* 213* Call context: 214* process thread 215----------------------------------------------------------------*/ 216static int prism2sta_close(wlandevice_t *wlandev) 217{ 218 /* We don't currently have to do anything else. 219 * Higher layers know we're not ready from dev->start==0 and 220 * dev->tbusy==1. Our rx path knows to not pass up received 221 * frames because of dev->flags&IFF_UP is false. 222 */ 223 224 return 0; 225} 226 227/*---------------------------------------------------------------- 228* prism2sta_reset 229* 230* Not currently implented. 231* 232* Arguments: 233* wlandev wlan device structure 234* none 235* 236* Returns: 237* nothing 238* 239* Side effects: 240* 241* Call context: 242* process thread 243----------------------------------------------------------------*/ 244static void prism2sta_reset(wlandevice_t *wlandev) 245{ 246 return; 247} 248 249/*---------------------------------------------------------------- 250* prism2sta_txframe 251* 252* Takes a frame from p80211 and queues it for transmission. 253* 254* Arguments: 255* wlandev wlan device structure 256* pb packet buffer struct. Contains an 802.11 257* data frame. 258* p80211_hdr points to the 802.11 header for the packet. 259* Returns: 260* 0 Success and more buffs available 261* 1 Success but no more buffs 262* 2 Allocation failure 263* 4 Buffer full or queue busy 264* 265* Side effects: 266* 267* Call context: 268* process thread 269----------------------------------------------------------------*/ 270static int prism2sta_txframe(wlandevice_t *wlandev, struct sk_buff *skb, 271 union p80211_hdr *p80211_hdr, 272 struct p80211_metawep *p80211_wep) 273{ 274 hfa384x_t *hw = (hfa384x_t *) wlandev->priv; 275 int result; 276 277 /* If necessary, set the 802.11 WEP bit */ 278 if ((wlandev->hostwep & (HOSTWEP_PRIVACYINVOKED | HOSTWEP_ENCRYPT)) == 279 HOSTWEP_PRIVACYINVOKED) { 280 p80211_hdr->a3.fc |= cpu_to_le16(WLAN_SET_FC_ISWEP(1)); 281 } 282 283 result = hfa384x_drvr_txframe(hw, skb, p80211_hdr, p80211_wep); 284 285 return result; 286} 287 288/*---------------------------------------------------------------- 289* prism2sta_mlmerequest 290* 291* wlan command message handler. All we do here is pass the message 292* over to the prism2sta_mgmt_handler. 293* 294* Arguments: 295* wlandev wlan device structure 296* msg wlan command message 297* Returns: 298* 0 success 299* <0 successful acceptance of message, but we're 300* waiting for an async process to finish before 301* we're done with the msg. When the asynch 302* process is done, we'll call the p80211 303* function p80211req_confirm() . 304* >0 An error occurred while we were handling 305* the message. 306* 307* Side effects: 308* 309* Call context: 310* process thread 311----------------------------------------------------------------*/ 312static int prism2sta_mlmerequest(wlandevice_t *wlandev, struct p80211msg *msg) 313{ 314 hfa384x_t *hw = (hfa384x_t *) wlandev->priv; 315 316 int result = 0; 317 318 switch (msg->msgcode) { 319 case DIDmsg_dot11req_mibget: 320 pr_debug("Received mibget request\n"); 321 result = prism2mgmt_mibset_mibget(wlandev, msg); 322 break; 323 case DIDmsg_dot11req_mibset: 324 pr_debug("Received mibset request\n"); 325 result = prism2mgmt_mibset_mibget(wlandev, msg); 326 break; 327 case DIDmsg_dot11req_scan: 328 pr_debug("Received scan request\n"); 329 result = prism2mgmt_scan(wlandev, msg); 330 break; 331 case DIDmsg_dot11req_scan_results: 332 pr_debug("Received scan_results request\n"); 333 result = prism2mgmt_scan_results(wlandev, msg); 334 break; 335 case DIDmsg_dot11req_start: 336 pr_debug("Received mlme start request\n"); 337 result = prism2mgmt_start(wlandev, msg); 338 break; 339 /* 340 * Prism2 specific messages 341 */ 342 case DIDmsg_p2req_readpda: 343 pr_debug("Received mlme readpda request\n"); 344 result = prism2mgmt_readpda(wlandev, msg); 345 break; 346 case DIDmsg_p2req_ramdl_state: 347 pr_debug("Received mlme ramdl_state request\n"); 348 result = prism2mgmt_ramdl_state(wlandev, msg); 349 break; 350 case DIDmsg_p2req_ramdl_write: 351 pr_debug("Received mlme ramdl_write request\n"); 352 result = prism2mgmt_ramdl_write(wlandev, msg); 353 break; 354 case DIDmsg_p2req_flashdl_state: 355 pr_debug("Received mlme flashdl_state request\n"); 356 result = prism2mgmt_flashdl_state(wlandev, msg); 357 break; 358 case DIDmsg_p2req_flashdl_write: 359 pr_debug("Received mlme flashdl_write request\n"); 360 result = prism2mgmt_flashdl_write(wlandev, msg); 361 break; 362 /* 363 * Linux specific messages 364 */ 365 case DIDmsg_lnxreq_hostwep: 366 break; /* ignore me. */ 367 case DIDmsg_lnxreq_ifstate: 368 { 369 struct p80211msg_lnxreq_ifstate *ifstatemsg; 370 pr_debug("Received mlme ifstate request\n"); 371 ifstatemsg = (struct p80211msg_lnxreq_ifstate *) msg; 372 result = 373 prism2sta_ifstate(wlandev, 374 ifstatemsg->ifstate.data); 375 ifstatemsg->resultcode.status = 376 P80211ENUM_msgitem_status_data_ok; 377 ifstatemsg->resultcode.data = result; 378 result = 0; 379 } 380 break; 381 case DIDmsg_lnxreq_wlansniff: 382 pr_debug("Received mlme wlansniff request\n"); 383 result = prism2mgmt_wlansniff(wlandev, msg); 384 break; 385 case DIDmsg_lnxreq_autojoin: 386 pr_debug("Received mlme autojoin request\n"); 387 result = prism2mgmt_autojoin(wlandev, msg); 388 break; 389 case DIDmsg_lnxreq_commsquality:{ 390 struct p80211msg_lnxreq_commsquality *qualmsg; 391 392 pr_debug("Received commsquality request\n"); 393 394 qualmsg = (struct p80211msg_lnxreq_commsquality *) msg; 395 396 qualmsg->link.status = 397 P80211ENUM_msgitem_status_data_ok; 398 qualmsg->level.status = 399 P80211ENUM_msgitem_status_data_ok; 400 qualmsg->noise.status = 401 P80211ENUM_msgitem_status_data_ok; 402 403 qualmsg->link.data = le16_to_cpu(hw->qual.CQ_currBSS); 404 qualmsg->level.data = le16_to_cpu(hw->qual.ASL_currBSS); 405 qualmsg->noise.data = le16_to_cpu(hw->qual.ANL_currFC); 406 qualmsg->txrate.data = hw->txrate; 407 408 break; 409 } 410 default: 411 printk(KERN_WARNING "Unknown mgmt request message 0x%08x", 412 msg->msgcode); 413 break; 414 } 415 416 return result; 417} 418 419/*---------------------------------------------------------------- 420* prism2sta_ifstate 421* 422* Interface state. This is the primary WLAN interface enable/disable 423* handler. Following the driver/load/deviceprobe sequence, this 424* function must be called with a state of "enable" before any other 425* commands will be accepted. 426* 427* Arguments: 428* wlandev wlan device structure 429* msgp ptr to msg buffer 430* 431* Returns: 432* A p80211 message resultcode value. 433* 434* Side effects: 435* 436* Call context: 437* process thread (usually) 438* interrupt 439----------------------------------------------------------------*/ 440u32 prism2sta_ifstate(wlandevice_t *wlandev, u32 ifstate) 441{ 442 hfa384x_t *hw = (hfa384x_t *) wlandev->priv; 443 u32 result; 444 445 result = P80211ENUM_resultcode_implementation_failure; 446 447 pr_debug("Current MSD state(%d), requesting(%d)\n", 448 wlandev->msdstate, ifstate); 449 switch (ifstate) { 450 case P80211ENUM_ifstate_fwload: 451 switch (wlandev->msdstate) { 452 case WLAN_MSD_HWPRESENT: 453 wlandev->msdstate = WLAN_MSD_FWLOAD_PENDING; 454 /* 455 * Initialize the device+driver sufficiently 456 * for firmware loading. 457 */ 458 result = hfa384x_drvr_start(hw); 459 if (result) { 460 printk(KERN_ERR 461 "hfa384x_drvr_start() failed," 462 "result=%d\n", (int)result); 463 result = 464 P80211ENUM_resultcode_implementation_failure; 465 wlandev->msdstate = WLAN_MSD_HWPRESENT; 466 break; 467 } 468 wlandev->msdstate = WLAN_MSD_FWLOAD; 469 result = P80211ENUM_resultcode_success; 470 break; 471 case WLAN_MSD_FWLOAD: 472 hfa384x_cmd_initialize(hw); 473 result = P80211ENUM_resultcode_success; 474 break; 475 case WLAN_MSD_RUNNING: 476 printk(KERN_WARNING 477 "Cannot enter fwload state from enable state," 478 "you must disable first.\n"); 479 result = P80211ENUM_resultcode_invalid_parameters; 480 break; 481 case WLAN_MSD_HWFAIL: 482 default: 483 /* probe() had a problem or the msdstate contains 484 * an unrecognized value, there's nothing we can do. 485 */ 486 result = P80211ENUM_resultcode_implementation_failure; 487 break; 488 } 489 break; 490 case P80211ENUM_ifstate_enable: 491 switch (wlandev->msdstate) { 492 case WLAN_MSD_HWPRESENT: 493 case WLAN_MSD_FWLOAD: 494 wlandev->msdstate = WLAN_MSD_RUNNING_PENDING; 495 /* Initialize the device+driver for full 496 * operation. Note that this might me an FWLOAD to 497 * to RUNNING transition so we must not do a chip 498 * or board level reset. Note that on failure, 499 * the MSD state is set to HWPRESENT because we 500 * can't make any assumptions about the state 501 * of the hardware or a previous firmware load. 502 */ 503 result = hfa384x_drvr_start(hw); 504 if (result) { 505 printk(KERN_ERR 506 "hfa384x_drvr_start() failed," 507 "result=%d\n", (int)result); 508 result = 509 P80211ENUM_resultcode_implementation_failure; 510 wlandev->msdstate = WLAN_MSD_HWPRESENT; 511 break; 512 } 513 514 result = prism2sta_getcardinfo(wlandev); 515 if (result) { 516 printk(KERN_ERR 517 "prism2sta_getcardinfo() failed," 518 "result=%d\n", (int)result); 519 result = 520 P80211ENUM_resultcode_implementation_failure; 521 hfa384x_drvr_stop(hw); 522 wlandev->msdstate = WLAN_MSD_HWPRESENT; 523 break; 524 } 525 result = prism2sta_globalsetup(wlandev); 526 if (result) { 527 printk(KERN_ERR 528 "prism2sta_globalsetup() failed," 529 "result=%d\n", (int)result); 530 result = 531 P80211ENUM_resultcode_implementation_failure; 532 hfa384x_drvr_stop(hw); 533 wlandev->msdstate = WLAN_MSD_HWPRESENT; 534 break; 535 } 536 wlandev->msdstate = WLAN_MSD_RUNNING; 537 hw->join_ap = 0; 538 hw->join_retries = 60; 539 result = P80211ENUM_resultcode_success; 540 break; 541 case WLAN_MSD_RUNNING: 542 /* Do nothing, we're already in this state. */ 543 result = P80211ENUM_resultcode_success; 544 break; 545 case WLAN_MSD_HWFAIL: 546 default: 547 /* probe() had a problem or the msdstate contains 548 * an unrecognized value, there's nothing we can do. 549 */ 550 result = P80211ENUM_resultcode_implementation_failure; 551 break; 552 } 553 break; 554 case P80211ENUM_ifstate_disable: 555 switch (wlandev->msdstate) { 556 case WLAN_MSD_HWPRESENT: 557 /* Do nothing, we're already in this state. */ 558 result = P80211ENUM_resultcode_success; 559 break; 560 case WLAN_MSD_FWLOAD: 561 case WLAN_MSD_RUNNING: 562 wlandev->msdstate = WLAN_MSD_HWPRESENT_PENDING; 563 /* 564 * TODO: Shut down the MAC completely. Here a chip 565 * or board level reset is probably called for. 566 * After a "disable" _all_ results are lost, even 567 * those from a fwload. 568 */ 569 if (!wlandev->hwremoved) 570 netif_carrier_off(wlandev->netdev); 571 572 hfa384x_drvr_stop(hw); 573 574 wlandev->macmode = WLAN_MACMODE_NONE; 575 wlandev->msdstate = WLAN_MSD_HWPRESENT; 576 result = P80211ENUM_resultcode_success; 577 break; 578 case WLAN_MSD_HWFAIL: 579 default: 580 /* probe() had a problem or the msdstate contains 581 * an unrecognized value, there's nothing we can do. 582 */ 583 result = P80211ENUM_resultcode_implementation_failure; 584 break; 585 } 586 break; 587 default: 588 result = P80211ENUM_resultcode_invalid_parameters; 589 break; 590 } 591 592 return result; 593} 594 595/*---------------------------------------------------------------- 596* prism2sta_getcardinfo 597* 598* Collect the NICID, firmware version and any other identifiers 599* we'd like to have in host-side data structures. 600* 601* Arguments: 602* wlandev wlan device structure 603* 604* Returns: 605* 0 success 606* >0 f/w reported error 607* <0 driver reported error 608* 609* Side effects: 610* 611* Call context: 612* Either. 613----------------------------------------------------------------*/ 614static int prism2sta_getcardinfo(wlandevice_t *wlandev) 615{ 616 int result = 0; 617 hfa384x_t *hw = (hfa384x_t *) wlandev->priv; 618 u16 temp; 619 u8 snum[HFA384x_RID_NICSERIALNUMBER_LEN]; 620 char pstr[(HFA384x_RID_NICSERIALNUMBER_LEN * 4) + 1]; 621 622 /* Collect version and compatibility info */ 623 /* Some are critical, some are not */ 624 /* NIC identity */ 625 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_NICIDENTITY, 626 &hw->ident_nic, 627 sizeof(hfa384x_compident_t)); 628 if (result) { 629 printk(KERN_ERR "Failed to retrieve NICIDENTITY\n"); 630 goto failed; 631 } 632 633 /* get all the nic id fields in host byte order */ 634 hw->ident_nic.id = le16_to_cpu(hw->ident_nic.id); 635 hw->ident_nic.variant = le16_to_cpu(hw->ident_nic.variant); 636 hw->ident_nic.major = le16_to_cpu(hw->ident_nic.major); 637 hw->ident_nic.minor = le16_to_cpu(hw->ident_nic.minor); 638 639 printk(KERN_INFO "ident: nic h/w: id=0x%02x %d.%d.%d\n", 640 hw->ident_nic.id, hw->ident_nic.major, 641 hw->ident_nic.minor, hw->ident_nic.variant); 642 643 /* Primary f/w identity */ 644 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_PRIIDENTITY, 645 &hw->ident_pri_fw, 646 sizeof(hfa384x_compident_t)); 647 if (result) { 648 printk(KERN_ERR "Failed to retrieve PRIIDENTITY\n"); 649 goto failed; 650 } 651 652 /* get all the private fw id fields in host byte order */ 653 hw->ident_pri_fw.id = le16_to_cpu(hw->ident_pri_fw.id); 654 hw->ident_pri_fw.variant = le16_to_cpu(hw->ident_pri_fw.variant); 655 hw->ident_pri_fw.major = le16_to_cpu(hw->ident_pri_fw.major); 656 hw->ident_pri_fw.minor = le16_to_cpu(hw->ident_pri_fw.minor); 657 658 printk(KERN_INFO "ident: pri f/w: id=0x%02x %d.%d.%d\n", 659 hw->ident_pri_fw.id, hw->ident_pri_fw.major, 660 hw->ident_pri_fw.minor, hw->ident_pri_fw.variant); 661 662 /* Station (Secondary?) f/w identity */ 663 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_STAIDENTITY, 664 &hw->ident_sta_fw, 665 sizeof(hfa384x_compident_t)); 666 if (result) { 667 printk(KERN_ERR "Failed to retrieve STAIDENTITY\n"); 668 goto failed; 669 } 670 671 if (hw->ident_nic.id < 0x8000) { 672 printk(KERN_ERR 673 "FATAL: Card is not an Intersil Prism2/2.5/3\n"); 674 result = -1; 675 goto failed; 676 } 677 678 /* get all the station fw id fields in host byte order */ 679 hw->ident_sta_fw.id = le16_to_cpu(hw->ident_sta_fw.id); 680 hw->ident_sta_fw.variant = le16_to_cpu(hw->ident_sta_fw.variant); 681 hw->ident_sta_fw.major = le16_to_cpu(hw->ident_sta_fw.major); 682 hw->ident_sta_fw.minor = le16_to_cpu(hw->ident_sta_fw.minor); 683 684 /* strip out the 'special' variant bits */ 685 hw->mm_mods = hw->ident_sta_fw.variant & (BIT(14) | BIT(15)); 686 hw->ident_sta_fw.variant &= ~((u16) (BIT(14) | BIT(15))); 687 688 if (hw->ident_sta_fw.id == 0x1f) { 689 printk(KERN_INFO 690 "ident: sta f/w: id=0x%02x %d.%d.%d\n", 691 hw->ident_sta_fw.id, hw->ident_sta_fw.major, 692 hw->ident_sta_fw.minor, hw->ident_sta_fw.variant); 693 } else { 694 printk(KERN_INFO 695 "ident: ap f/w: id=0x%02x %d.%d.%d\n", 696 hw->ident_sta_fw.id, hw->ident_sta_fw.major, 697 hw->ident_sta_fw.minor, hw->ident_sta_fw.variant); 698 printk(KERN_ERR "Unsupported Tertiary AP firmeare loaded!\n"); 699 goto failed; 700 } 701 702 /* Compatibility range, Modem supplier */ 703 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_MFISUPRANGE, 704 &hw->cap_sup_mfi, 705 sizeof(hfa384x_caplevel_t)); 706 if (result) { 707 printk(KERN_ERR "Failed to retrieve MFISUPRANGE\n"); 708 goto failed; 709 } 710 711 /* get all the Compatibility range, modem interface supplier 712 fields in byte order */ 713 hw->cap_sup_mfi.role = le16_to_cpu(hw->cap_sup_mfi.role); 714 hw->cap_sup_mfi.id = le16_to_cpu(hw->cap_sup_mfi.id); 715 hw->cap_sup_mfi.variant = le16_to_cpu(hw->cap_sup_mfi.variant); 716 hw->cap_sup_mfi.bottom = le16_to_cpu(hw->cap_sup_mfi.bottom); 717 hw->cap_sup_mfi.top = le16_to_cpu(hw->cap_sup_mfi.top); 718 719 printk(KERN_INFO 720 "MFI:SUP:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n", 721 hw->cap_sup_mfi.role, hw->cap_sup_mfi.id, 722 hw->cap_sup_mfi.variant, hw->cap_sup_mfi.bottom, 723 hw->cap_sup_mfi.top); 724 725 /* Compatibility range, Controller supplier */ 726 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_CFISUPRANGE, 727 &hw->cap_sup_cfi, 728 sizeof(hfa384x_caplevel_t)); 729 if (result) { 730 printk(KERN_ERR "Failed to retrieve CFISUPRANGE\n"); 731 goto failed; 732 } 733 734 /* get all the Compatibility range, controller interface supplier 735 fields in byte order */ 736 hw->cap_sup_cfi.role = le16_to_cpu(hw->cap_sup_cfi.role); 737 hw->cap_sup_cfi.id = le16_to_cpu(hw->cap_sup_cfi.id); 738 hw->cap_sup_cfi.variant = le16_to_cpu(hw->cap_sup_cfi.variant); 739 hw->cap_sup_cfi.bottom = le16_to_cpu(hw->cap_sup_cfi.bottom); 740 hw->cap_sup_cfi.top = le16_to_cpu(hw->cap_sup_cfi.top); 741 742 printk(KERN_INFO 743 "CFI:SUP:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n", 744 hw->cap_sup_cfi.role, hw->cap_sup_cfi.id, 745 hw->cap_sup_cfi.variant, hw->cap_sup_cfi.bottom, 746 hw->cap_sup_cfi.top); 747 748 /* Compatibility range, Primary f/w supplier */ 749 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_PRISUPRANGE, 750 &hw->cap_sup_pri, 751 sizeof(hfa384x_caplevel_t)); 752 if (result) { 753 printk(KERN_ERR "Failed to retrieve PRISUPRANGE\n"); 754 goto failed; 755 } 756 757 /* get all the Compatibility range, primary firmware supplier 758 fields in byte order */ 759 hw->cap_sup_pri.role = le16_to_cpu(hw->cap_sup_pri.role); 760 hw->cap_sup_pri.id = le16_to_cpu(hw->cap_sup_pri.id); 761 hw->cap_sup_pri.variant = le16_to_cpu(hw->cap_sup_pri.variant); 762 hw->cap_sup_pri.bottom = le16_to_cpu(hw->cap_sup_pri.bottom); 763 hw->cap_sup_pri.top = le16_to_cpu(hw->cap_sup_pri.top); 764 765 printk(KERN_INFO 766 "PRI:SUP:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n", 767 hw->cap_sup_pri.role, hw->cap_sup_pri.id, 768 hw->cap_sup_pri.variant, hw->cap_sup_pri.bottom, 769 hw->cap_sup_pri.top); 770 771 /* Compatibility range, Station f/w supplier */ 772 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_STASUPRANGE, 773 &hw->cap_sup_sta, 774 sizeof(hfa384x_caplevel_t)); 775 if (result) { 776 printk(KERN_ERR "Failed to retrieve STASUPRANGE\n"); 777 goto failed; 778 } 779 780 /* get all the Compatibility range, station firmware supplier 781 fields in byte order */ 782 hw->cap_sup_sta.role = le16_to_cpu(hw->cap_sup_sta.role); 783 hw->cap_sup_sta.id = le16_to_cpu(hw->cap_sup_sta.id); 784 hw->cap_sup_sta.variant = le16_to_cpu(hw->cap_sup_sta.variant); 785 hw->cap_sup_sta.bottom = le16_to_cpu(hw->cap_sup_sta.bottom); 786 hw->cap_sup_sta.top = le16_to_cpu(hw->cap_sup_sta.top); 787 788 if (hw->cap_sup_sta.id == 0x04) { 789 printk(KERN_INFO 790 "STA:SUP:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n", 791 hw->cap_sup_sta.role, hw->cap_sup_sta.id, 792 hw->cap_sup_sta.variant, hw->cap_sup_sta.bottom, 793 hw->cap_sup_sta.top); 794 } else { 795 printk(KERN_INFO 796 "AP:SUP:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n", 797 hw->cap_sup_sta.role, hw->cap_sup_sta.id, 798 hw->cap_sup_sta.variant, hw->cap_sup_sta.bottom, 799 hw->cap_sup_sta.top); 800 } 801 802 /* Compatibility range, primary f/w actor, CFI supplier */ 803 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_PRI_CFIACTRANGES, 804 &hw->cap_act_pri_cfi, 805 sizeof(hfa384x_caplevel_t)); 806 if (result) { 807 printk(KERN_ERR "Failed to retrieve PRI_CFIACTRANGES\n"); 808 goto failed; 809 } 810 811 /* get all the Compatibility range, primary f/w actor, CFI supplier 812 fields in byte order */ 813 hw->cap_act_pri_cfi.role = le16_to_cpu(hw->cap_act_pri_cfi.role); 814 hw->cap_act_pri_cfi.id = le16_to_cpu(hw->cap_act_pri_cfi.id); 815 hw->cap_act_pri_cfi.variant = le16_to_cpu(hw->cap_act_pri_cfi.variant); 816 hw->cap_act_pri_cfi.bottom = le16_to_cpu(hw->cap_act_pri_cfi.bottom); 817 hw->cap_act_pri_cfi.top = le16_to_cpu(hw->cap_act_pri_cfi.top); 818 819 printk(KERN_INFO 820 "PRI-CFI:ACT:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n", 821 hw->cap_act_pri_cfi.role, hw->cap_act_pri_cfi.id, 822 hw->cap_act_pri_cfi.variant, hw->cap_act_pri_cfi.bottom, 823 hw->cap_act_pri_cfi.top); 824 825 /* Compatibility range, sta f/w actor, CFI supplier */ 826 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_STA_CFIACTRANGES, 827 &hw->cap_act_sta_cfi, 828 sizeof(hfa384x_caplevel_t)); 829 if (result) { 830 printk(KERN_ERR "Failed to retrieve STA_CFIACTRANGES\n"); 831 goto failed; 832 } 833 834 /* get all the Compatibility range, station f/w actor, CFI supplier 835 fields in byte order */ 836 hw->cap_act_sta_cfi.role = le16_to_cpu(hw->cap_act_sta_cfi.role); 837 hw->cap_act_sta_cfi.id = le16_to_cpu(hw->cap_act_sta_cfi.id); 838 hw->cap_act_sta_cfi.variant = le16_to_cpu(hw->cap_act_sta_cfi.variant); 839 hw->cap_act_sta_cfi.bottom = le16_to_cpu(hw->cap_act_sta_cfi.bottom); 840 hw->cap_act_sta_cfi.top = le16_to_cpu(hw->cap_act_sta_cfi.top); 841 842 printk(KERN_INFO 843 "STA-CFI:ACT:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n", 844 hw->cap_act_sta_cfi.role, hw->cap_act_sta_cfi.id, 845 hw->cap_act_sta_cfi.variant, hw->cap_act_sta_cfi.bottom, 846 hw->cap_act_sta_cfi.top); 847 848 /* Compatibility range, sta f/w actor, MFI supplier */ 849 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_STA_MFIACTRANGES, 850 &hw->cap_act_sta_mfi, 851 sizeof(hfa384x_caplevel_t)); 852 if (result) { 853 printk(KERN_ERR "Failed to retrieve STA_MFIACTRANGES\n"); 854 goto failed; 855 } 856 857 /* get all the Compatibility range, station f/w actor, MFI supplier 858 fields in byte order */ 859 hw->cap_act_sta_mfi.role = le16_to_cpu(hw->cap_act_sta_mfi.role); 860 hw->cap_act_sta_mfi.id = le16_to_cpu(hw->cap_act_sta_mfi.id); 861 hw->cap_act_sta_mfi.variant = le16_to_cpu(hw->cap_act_sta_mfi.variant); 862 hw->cap_act_sta_mfi.bottom = le16_to_cpu(hw->cap_act_sta_mfi.bottom); 863 hw->cap_act_sta_mfi.top = le16_to_cpu(hw->cap_act_sta_mfi.top); 864 865 printk(KERN_INFO 866 "STA-MFI:ACT:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n", 867 hw->cap_act_sta_mfi.role, hw->cap_act_sta_mfi.id, 868 hw->cap_act_sta_mfi.variant, hw->cap_act_sta_mfi.bottom, 869 hw->cap_act_sta_mfi.top); 870 871 /* Serial Number */ 872 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_NICSERIALNUMBER, 873 snum, HFA384x_RID_NICSERIALNUMBER_LEN); 874 if (!result) { 875 wlan_mkprintstr(snum, HFA384x_RID_NICSERIALNUMBER_LEN, 876 pstr, sizeof(pstr)); 877 printk(KERN_INFO "Prism2 card SN: %s\n", pstr); 878 } else { 879 printk(KERN_ERR "Failed to retrieve Prism2 Card SN\n"); 880 goto failed; 881 } 882 883 /* Collect the MAC address */ 884 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_CNFOWNMACADDR, 885 wlandev->netdev->dev_addr, ETH_ALEN); 886 if (result != 0) { 887 printk(KERN_ERR "Failed to retrieve mac address\n"); 888 goto failed; 889 } 890 891 /* short preamble is always implemented */ 892 wlandev->nsdcaps |= P80211_NSDCAP_SHORT_PREAMBLE; 893 894 /* find out if hardware wep is implemented */ 895 hfa384x_drvr_getconfig16(hw, HFA384x_RID_PRIVACYOPTIMP, &temp); 896 if (temp) 897 wlandev->nsdcaps |= P80211_NSDCAP_HARDWAREWEP; 898 899 /* get the dBm Scaling constant */ 900 hfa384x_drvr_getconfig16(hw, HFA384x_RID_CNFDBMADJUST, &temp); 901 hw->dbmadjust = temp; 902 903 /* Only enable scan by default on newer firmware */ 904 if (HFA384x_FIRMWARE_VERSION(hw->ident_sta_fw.major, 905 hw->ident_sta_fw.minor, 906 hw->ident_sta_fw.variant) < 907 HFA384x_FIRMWARE_VERSION(1, 5, 5)) { 908 wlandev->nsdcaps |= P80211_NSDCAP_NOSCAN; 909 } 910 911 /* TODO: Set any internally managed config items */ 912 913 goto done; 914failed: 915 printk(KERN_ERR "Failed, result=%d\n", result); 916done: 917 return result; 918} 919 920/*---------------------------------------------------------------- 921* prism2sta_globalsetup 922* 923* Set any global RIDs that we want to set at device activation. 924* 925* Arguments: 926* wlandev wlan device structure 927* 928* Returns: 929* 0 success 930* >0 f/w reported error 931* <0 driver reported error 932* 933* Side effects: 934* 935* Call context: 936* process thread 937----------------------------------------------------------------*/ 938static int prism2sta_globalsetup(wlandevice_t *wlandev) 939{ 940 hfa384x_t *hw = (hfa384x_t *) wlandev->priv; 941 942 /* Set the maximum frame size */ 943 return hfa384x_drvr_setconfig16(hw, HFA384x_RID_CNFMAXDATALEN, 944 WLAN_DATA_MAXLEN); 945} 946 947static int prism2sta_setmulticast(wlandevice_t *wlandev, netdevice_t *dev) 948{ 949 int result = 0; 950 hfa384x_t *hw = (hfa384x_t *) wlandev->priv; 951 952 u16 promisc; 953 954 /* If we're not ready, what's the point? */ 955 if (hw->state != HFA384x_STATE_RUNNING) 956 goto exit; 957 958 if ((dev->flags & (IFF_PROMISC | IFF_ALLMULTI)) != 0) 959 promisc = P80211ENUM_truth_true; 960 else 961 promisc = P80211ENUM_truth_false; 962 963 result = 964 hfa384x_drvr_setconfig16_async(hw, HFA384x_RID_PROMISCMODE, 965 promisc); 966exit: 967 return result; 968} 969 970/*---------------------------------------------------------------- 971* prism2sta_inf_handover 972* 973* Handles the receipt of a Handover info frame. Should only be present 974* in APs only. 975* 976* Arguments: 977* wlandev wlan device structure 978* inf ptr to info frame (contents in hfa384x order) 979* 980* Returns: 981* nothing 982* 983* Side effects: 984* 985* Call context: 986* interrupt 987----------------------------------------------------------------*/ 988static void prism2sta_inf_handover(wlandevice_t *wlandev, 989 hfa384x_InfFrame_t *inf) 990{ 991 pr_debug("received infoframe:HANDOVER (unhandled)\n"); 992 return; 993} 994 995/*---------------------------------------------------------------- 996* prism2sta_inf_tallies 997* 998* Handles the receipt of a CommTallies info frame. 999* 1000* Arguments: 1001* wlandev wlan device structure 1002* inf ptr to info frame (contents in hfa384x order) 1003* 1004* Returns: 1005* nothing 1006* 1007* Side effects: 1008* 1009* Call context: 1010* interrupt 1011----------------------------------------------------------------*/ 1012static void prism2sta_inf_tallies(wlandevice_t *wlandev, 1013 hfa384x_InfFrame_t *inf) 1014{ 1015 hfa384x_t *hw = (hfa384x_t *) wlandev->priv; 1016 u16 *src16; 1017 u32 *dst; 1018 u32 *src32; 1019 int i; 1020 int cnt; 1021 1022 /* 1023 ** Determine if these are 16-bit or 32-bit tallies, based on the 1024 ** record length of the info record. 1025 */ 1026 1027 cnt = sizeof(hfa384x_CommTallies32_t) / sizeof(u32); 1028 if (inf->framelen > 22) { 1029 dst = (u32 *) &hw->tallies; 1030 src32 = (u32 *) &inf->info.commtallies32; 1031 for (i = 0; i < cnt; i++, dst++, src32++) 1032 *dst += le32_to_cpu(*src32); 1033 } else { 1034 dst = (u32 *) &hw->tallies; 1035 src16 = (u16 *) &inf->info.commtallies16; 1036 for (i = 0; i < cnt; i++, dst++, src16++) 1037 *dst += le16_to_cpu(*src16); 1038 } 1039 1040 return; 1041} 1042 1043/*---------------------------------------------------------------- 1044* prism2sta_inf_scanresults 1045* 1046* Handles the receipt of a Scan Results info frame. 1047* 1048* Arguments: 1049* wlandev wlan device structure 1050* inf ptr to info frame (contents in hfa384x order) 1051* 1052* Returns: 1053* nothing 1054* 1055* Side effects: 1056* 1057* Call context: 1058* interrupt 1059----------------------------------------------------------------*/ 1060static void prism2sta_inf_scanresults(wlandevice_t *wlandev, 1061 hfa384x_InfFrame_t *inf) 1062{ 1063 1064 hfa384x_t *hw = (hfa384x_t *) wlandev->priv; 1065 int nbss; 1066 hfa384x_ScanResult_t *sr = &(inf->info.scanresult); 1067 int i; 1068 hfa384x_JoinRequest_data_t joinreq; 1069 int result; 1070 1071 /* Get the number of results, first in bytes, then in results */ 1072 nbss = (inf->framelen * sizeof(u16)) - 1073 sizeof(inf->infotype) - sizeof(inf->info.scanresult.scanreason); 1074 nbss /= sizeof(hfa384x_ScanResultSub_t); 1075 1076 /* Print em */ 1077 pr_debug("rx scanresults, reason=%d, nbss=%d:\n", 1078 inf->info.scanresult.scanreason, nbss); 1079 for (i = 0; i < nbss; i++) { 1080 pr_debug("chid=%d anl=%d sl=%d bcnint=%d\n", 1081 sr->result[i].chid, 1082 sr->result[i].anl, 1083 sr->result[i].sl, sr->result[i].bcnint); 1084 pr_debug(" capinfo=0x%04x proberesp_rate=%d\n", 1085 sr->result[i].capinfo, sr->result[i].proberesp_rate); 1086 } 1087 /* issue a join request */ 1088 joinreq.channel = sr->result[0].chid; 1089 memcpy(joinreq.bssid, sr->result[0].bssid, WLAN_BSSID_LEN); 1090 result = hfa384x_drvr_setconfig(hw, 1091 HFA384x_RID_JOINREQUEST, 1092 &joinreq, HFA384x_RID_JOINREQUEST_LEN); 1093 if (result) { 1094 printk(KERN_ERR "setconfig(joinreq) failed, result=%d\n", 1095 result); 1096 } 1097 1098 return; 1099} 1100 1101/*---------------------------------------------------------------- 1102* prism2sta_inf_hostscanresults 1103* 1104* Handles the receipt of a Scan Results info frame. 1105* 1106* Arguments: 1107* wlandev wlan device structure 1108* inf ptr to info frame (contents in hfa384x order) 1109* 1110* Returns: 1111* nothing 1112* 1113* Side effects: 1114* 1115* Call context: 1116* interrupt 1117----------------------------------------------------------------*/ 1118static void prism2sta_inf_hostscanresults(wlandevice_t *wlandev, 1119 hfa384x_InfFrame_t *inf) 1120{ 1121 hfa384x_t *hw = (hfa384x_t *) wlandev->priv; 1122 int nbss; 1123 1124 nbss = (inf->framelen - 3) / 32; 1125 pr_debug("Received %d hostscan results\n", nbss); 1126 1127 if (nbss > 32) 1128 nbss = 32; 1129 1130 kfree(hw->scanresults); 1131 1132 hw->scanresults = kmalloc(sizeof(hfa384x_InfFrame_t), GFP_ATOMIC); 1133 memcpy(hw->scanresults, inf, sizeof(hfa384x_InfFrame_t)); 1134 1135 if (nbss == 0) 1136 nbss = -1; 1137 1138 /* Notify/wake the sleeping caller. */ 1139 hw->scanflag = nbss; 1140 wake_up_interruptible(&hw->cmdq); 1141}; 1142 1143/*---------------------------------------------------------------- 1144* prism2sta_inf_chinforesults 1145* 1146* Handles the receipt of a Channel Info Results info frame. 1147* 1148* Arguments: 1149* wlandev wlan device structure 1150* inf ptr to info frame (contents in hfa384x order) 1151* 1152* Returns: 1153* nothing 1154* 1155* Side effects: 1156* 1157* Call context: 1158* interrupt 1159----------------------------------------------------------------*/ 1160static void prism2sta_inf_chinforesults(wlandevice_t *wlandev, 1161 hfa384x_InfFrame_t *inf) 1162{ 1163 hfa384x_t *hw = (hfa384x_t *) wlandev->priv; 1164 unsigned int i, n; 1165 1166 hw->channel_info.results.scanchannels = 1167 le16_to_cpu(inf->info.chinforesult.scanchannels); 1168 1169 for (i = 0, n = 0; i < HFA384x_CHINFORESULT_MAX; i++) { 1170 if (hw->channel_info.results.scanchannels & (1 << i)) { 1171 int channel = 1172 le16_to_cpu(inf->info.chinforesult.result[n].chid) - 1173 1; 1174 hfa384x_ChInfoResultSub_t *chinforesult = 1175 &hw->channel_info.results.result[channel]; 1176 chinforesult->chid = channel; 1177 chinforesult->anl = 1178 le16_to_cpu(inf->info.chinforesult.result[n].anl); 1179 chinforesult->pnl = 1180 le16_to_cpu(inf->info.chinforesult.result[n].pnl); 1181 chinforesult->active = 1182 le16_to_cpu(inf->info.chinforesult.result[n]. 1183 active); 1184 pr_debug 1185 ("chinfo: channel %d, %s level (avg/peak)=%d/%d dB, pcf %d\n", 1186 channel + 1, 1187 chinforesult-> 1188 active & HFA384x_CHINFORESULT_BSSACTIVE ? "signal" 1189 : "noise", chinforesult->anl, chinforesult->pnl, 1190 chinforesult-> 1191 active & HFA384x_CHINFORESULT_PCFACTIVE ? 1 : 0); 1192 n++; 1193 } 1194 } 1195 atomic_set(&hw->channel_info.done, 2); 1196 1197 hw->channel_info.count = n; 1198 return; 1199} 1200 1201void prism2sta_processing_defer(struct work_struct *data) 1202{ 1203 hfa384x_t *hw = container_of(data, struct hfa384x, link_bh); 1204 wlandevice_t *wlandev = hw->wlandev; 1205 hfa384x_bytestr32_t ssid; 1206 int result; 1207 1208 /* First let's process the auth frames */ 1209 { 1210 struct sk_buff *skb; 1211 hfa384x_InfFrame_t *inf; 1212 1213 while ((skb = skb_dequeue(&hw->authq))) { 1214 inf = (hfa384x_InfFrame_t *) skb->data; 1215 prism2sta_inf_authreq_defer(wlandev, inf); 1216 } 1217 1218 } 1219 1220 /* Now let's handle the linkstatus stuff */ 1221 if (hw->link_status == hw->link_status_new) 1222 goto failed; 1223 1224 hw->link_status = hw->link_status_new; 1225 1226 switch (hw->link_status) { 1227 case HFA384x_LINK_NOTCONNECTED: 1228 /* I'm currently assuming that this is the initial link 1229 * state. It should only be possible immediately 1230 * following an Enable command. 1231 * Response: 1232 * Block Transmits, Ignore receives of data frames 1233 */ 1234 netif_carrier_off(wlandev->netdev); 1235 1236 printk(KERN_INFO "linkstatus=NOTCONNECTED (unhandled)\n"); 1237 break; 1238 1239 case HFA384x_LINK_CONNECTED: 1240 /* This one indicates a successful scan/join/auth/assoc. 1241 * When we have the full MLME complement, this event will 1242 * signify successful completion of both mlme_authenticate 1243 * and mlme_associate. State management will get a little 1244 * ugly here. 1245 * Response: 1246 * Indicate authentication and/or association 1247 * Enable Transmits, Receives and pass up data frames 1248 */ 1249 1250 netif_carrier_on(wlandev->netdev); 1251 1252 /* If we are joining a specific AP, set our 1253 * state and reset retries 1254 */ 1255 if (hw->join_ap == 1) 1256 hw->join_ap = 2; 1257 hw->join_retries = 60; 1258 1259 /* Don't call this in monitor mode */ 1260 if (wlandev->netdev->type == ARPHRD_ETHER) { 1261 u16 portstatus; 1262 1263 printk(KERN_INFO "linkstatus=CONNECTED\n"); 1264 1265 /* For non-usb devices, we can use the sync versions */ 1266 /* Collect the BSSID, and set state to allow tx */ 1267 1268 result = hfa384x_drvr_getconfig(hw, 1269 HFA384x_RID_CURRENTBSSID, 1270 wlandev->bssid, 1271 WLAN_BSSID_LEN); 1272 if (result) { 1273 pr_debug 1274 ("getconfig(0x%02x) failed, result = %d\n", 1275 HFA384x_RID_CURRENTBSSID, result); 1276 goto failed; 1277 } 1278 1279 result = hfa384x_drvr_getconfig(hw, 1280 HFA384x_RID_CURRENTSSID, 1281 &ssid, sizeof(ssid)); 1282 if (result) { 1283 pr_debug 1284 ("getconfig(0x%02x) failed, result = %d\n", 1285 HFA384x_RID_CURRENTSSID, result); 1286 goto failed; 1287 } 1288 prism2mgmt_bytestr2pstr((hfa384x_bytestr_t *) &ssid, 1289 (p80211pstrd_t *) & 1290 wlandev->ssid); 1291 1292 /* Collect the port status */ 1293 result = hfa384x_drvr_getconfig16(hw, 1294 HFA384x_RID_PORTSTATUS, 1295 &portstatus); 1296 if (result) { 1297 pr_debug 1298 ("getconfig(0x%02x) failed, result = %d\n", 1299 HFA384x_RID_PORTSTATUS, result); 1300 goto failed; 1301 } 1302 wlandev->macmode = 1303 (portstatus == HFA384x_PSTATUS_CONN_IBSS) ? 1304 WLAN_MACMODE_IBSS_STA : WLAN_MACMODE_ESS_STA; 1305 1306 /* signal back up to cfg80211 layer */ 1307 prism2_connect_result(wlandev, P80211ENUM_truth_false); 1308 1309 /* Get the ball rolling on the comms quality stuff */ 1310 prism2sta_commsqual_defer(&hw->commsqual_bh); 1311 } 1312 break; 1313 1314 case HFA384x_LINK_DISCONNECTED: 1315 /* This one indicates that our association is gone. We've 1316 * lost connection with the AP and/or been disassociated. 1317 * This indicates that the MAC has completely cleared it's 1318 * associated state. We * should send a deauth indication 1319 * (implying disassoc) up * to the MLME. 1320 * Response: 1321 * Indicate Deauthentication 1322 * Block Transmits, Ignore receives of data frames 1323 */ 1324 if (wlandev->netdev->type == ARPHRD_ETHER) 1325 printk(KERN_INFO 1326 "linkstatus=DISCONNECTED (unhandled)\n"); 1327 wlandev->macmode = WLAN_MACMODE_NONE; 1328 1329 netif_carrier_off(wlandev->netdev); 1330 1331 /* signal back up to cfg80211 layer */ 1332 prism2_disconnected(wlandev); 1333 1334 break; 1335 1336 case HFA384x_LINK_AP_CHANGE: 1337 /* This one indicates that the MAC has decided to and 1338 * successfully completed a change to another AP. We 1339 * should probably implement a reassociation indication 1340 * in response to this one. I'm thinking that the the 1341 * p80211 layer needs to be notified in case of 1342 * buffering/queueing issues. User mode also needs to be 1343 * notified so that any BSS dependent elements can be 1344 * updated. 1345 * associated state. We * should send a deauth indication 1346 * (implying disassoc) up * to the MLME. 1347 * Response: 1348 * Indicate Reassociation 1349 * Enable Transmits, Receives and pass up data frames 1350 */ 1351 printk(KERN_INFO "linkstatus=AP_CHANGE\n"); 1352 1353 result = hfa384x_drvr_getconfig(hw, 1354 HFA384x_RID_CURRENTBSSID, 1355 wlandev->bssid, WLAN_BSSID_LEN); 1356 if (result) { 1357 pr_debug("getconfig(0x%02x) failed, result = %d\n", 1358 HFA384x_RID_CURRENTBSSID, result); 1359 goto failed; 1360 } 1361 1362 result = hfa384x_drvr_getconfig(hw, 1363 HFA384x_RID_CURRENTSSID, 1364 &ssid, sizeof(ssid)); 1365 if (result) { 1366 pr_debug("getconfig(0x%02x) failed, result = %d\n", 1367 HFA384x_RID_CURRENTSSID, result); 1368 goto failed; 1369 } 1370 prism2mgmt_bytestr2pstr((hfa384x_bytestr_t *) &ssid, 1371 (p80211pstrd_t *) &wlandev->ssid); 1372 1373 hw->link_status = HFA384x_LINK_CONNECTED; 1374 netif_carrier_on(wlandev->netdev); 1375 1376 /* signal back up to cfg80211 layer */ 1377 prism2_roamed(wlandev); 1378 1379 break; 1380 1381 case HFA384x_LINK_AP_OUTOFRANGE: 1382 /* This one indicates that the MAC has decided that the 1383 * AP is out of range, but hasn't found a better candidate 1384 * so the MAC maintains its "associated" state in case 1385 * we get back in range. We should block transmits and 1386 * receives in this state. Do we need an indication here? 1387 * Probably not since a polling user-mode element would 1388 * get this status from from p2PortStatus(FD40). What about 1389 * p80211? 1390 * Response: 1391 * Block Transmits, Ignore receives of data frames 1392 */ 1393 printk(KERN_INFO "linkstatus=AP_OUTOFRANGE (unhandled)\n"); 1394 1395 netif_carrier_off(wlandev->netdev); 1396 1397 break; 1398 1399 case HFA384x_LINK_AP_INRANGE: 1400 /* This one indicates that the MAC has decided that the 1401 * AP is back in range. We continue working with our 1402 * existing association. 1403 * Response: 1404 * Enable Transmits, Receives and pass up data frames 1405 */ 1406 printk(KERN_INFO "linkstatus=AP_INRANGE\n"); 1407 1408 hw->link_status = HFA384x_LINK_CONNECTED; 1409 netif_carrier_on(wlandev->netdev); 1410 1411 break; 1412 1413 case HFA384x_LINK_ASSOCFAIL: 1414 /* This one is actually a peer to CONNECTED. We've 1415 * requested a join for a given SSID and optionally BSSID. 1416 * We can use this one to indicate authentication and 1417 * association failures. The trick is going to be 1418 * 1) identifying the failure, and 2) state management. 1419 * Response: 1420 * Disable Transmits, Ignore receives of data frames 1421 */ 1422 if (hw->join_ap && --hw->join_retries > 0) { 1423 hfa384x_JoinRequest_data_t joinreq; 1424 joinreq = hw->joinreq; 1425 /* Send the join request */ 1426 hfa384x_drvr_setconfig(hw, 1427 HFA384x_RID_JOINREQUEST, 1428 &joinreq, 1429 HFA384x_RID_JOINREQUEST_LEN); 1430 printk(KERN_INFO 1431 "linkstatus=ASSOCFAIL (re-submitting join)\n"); 1432 } else { 1433 printk(KERN_INFO "linkstatus=ASSOCFAIL (unhandled)\n"); 1434 } 1435 1436 netif_carrier_off(wlandev->netdev); 1437 1438 /* signal back up to cfg80211 layer */ 1439 prism2_connect_result(wlandev, P80211ENUM_truth_true); 1440 1441 break; 1442 1443 default: 1444 /* This is bad, IO port problems? */ 1445 printk(KERN_WARNING 1446 "unknown linkstatus=0x%02x\n", hw->link_status); 1447 goto failed; 1448 break; 1449 } 1450 1451 wlandev->linkstatus = (hw->link_status == HFA384x_LINK_CONNECTED); 1452 1453failed: 1454 return; 1455} 1456 1457/*---------------------------------------------------------------- 1458* prism2sta_inf_linkstatus 1459* 1460* Handles the receipt of a Link Status info frame. 1461* 1462* Arguments: 1463* wlandev wlan device structure 1464* inf ptr to info frame (contents in hfa384x order) 1465* 1466* Returns: 1467* nothing 1468* 1469* Side effects: 1470* 1471* Call context: 1472* interrupt 1473----------------------------------------------------------------*/ 1474static void prism2sta_inf_linkstatus(wlandevice_t *wlandev, 1475 hfa384x_InfFrame_t *inf) 1476{ 1477 hfa384x_t *hw = (hfa384x_t *) wlandev->priv; 1478 1479 hw->link_status_new = le16_to_cpu(inf->info.linkstatus.linkstatus); 1480 1481 schedule_work(&hw->link_bh); 1482 1483 return; 1484} 1485 1486/*---------------------------------------------------------------- 1487* prism2sta_inf_assocstatus 1488* 1489* Handles the receipt of an Association Status info frame. Should 1490* be present in APs only. 1491* 1492* Arguments: 1493* wlandev wlan device structure 1494* inf ptr to info frame (contents in hfa384x order) 1495* 1496* Returns: 1497* nothing 1498* 1499* Side effects: 1500* 1501* Call context: 1502* interrupt 1503----------------------------------------------------------------*/ 1504static void prism2sta_inf_assocstatus(wlandevice_t *wlandev, 1505 hfa384x_InfFrame_t *inf) 1506{ 1507 hfa384x_t *hw = (hfa384x_t *) wlandev->priv; 1508 hfa384x_AssocStatus_t rec; 1509 int i; 1510 1511 memcpy(&rec, &inf->info.assocstatus, sizeof(rec)); 1512 rec.assocstatus = le16_to_cpu(rec.assocstatus); 1513 rec.reason = le16_to_cpu(rec.reason); 1514 1515 /* 1516 ** Find the address in the list of authenticated stations. 1517 ** If it wasn't found, then this address has not been previously 1518 ** authenticated and something weird has happened if this is 1519 ** anything other than an "authentication failed" message. 1520 ** If the address was found, then set the "associated" flag for 1521 ** that station, based on whether the station is associating or 1522 ** losing its association. Something weird has also happened 1523 ** if we find the address in the list of authenticated stations 1524 ** but we are getting an "authentication failed" message. 1525 */ 1526 1527 for (i = 0; i < hw->authlist.cnt; i++) 1528 if (memcmp(rec.sta_addr, hw->authlist.addr[i], ETH_ALEN) == 0) 1529 break; 1530 1531 if (i >= hw->authlist.cnt) { 1532 if (rec.assocstatus != HFA384x_ASSOCSTATUS_AUTHFAIL) 1533 printk(KERN_WARNING 1534 "assocstatus info frame received for non-authenticated station.\n"); 1535 } else { 1536 hw->authlist.assoc[i] = 1537 (rec.assocstatus == HFA384x_ASSOCSTATUS_STAASSOC || 1538 rec.assocstatus == HFA384x_ASSOCSTATUS_REASSOC); 1539 1540 if (rec.assocstatus == HFA384x_ASSOCSTATUS_AUTHFAIL) 1541 printk(KERN_WARNING 1542"authfail assocstatus info frame received for authenticated station.\n"); 1543 } 1544 1545 return; 1546} 1547 1548/*---------------------------------------------------------------- 1549* prism2sta_inf_authreq 1550* 1551* Handles the receipt of an Authentication Request info frame. Should 1552* be present in APs only. 1553* 1554* Arguments: 1555* wlandev wlan device structure 1556* inf ptr to info frame (contents in hfa384x order) 1557* 1558* Returns: 1559* nothing 1560* 1561* Side effects: 1562* 1563* Call context: 1564* interrupt 1565* 1566----------------------------------------------------------------*/ 1567static void prism2sta_inf_authreq(wlandevice_t *wlandev, 1568 hfa384x_InfFrame_t *inf) 1569{ 1570 hfa384x_t *hw = (hfa384x_t *) wlandev->priv; 1571 struct sk_buff *skb; 1572 1573 skb = dev_alloc_skb(sizeof(*inf)); 1574 if (skb) { 1575 skb_put(skb, sizeof(*inf)); 1576 memcpy(skb->data, inf, sizeof(*inf)); 1577 skb_queue_tail(&hw->authq, skb); 1578 schedule_work(&hw->link_bh); 1579 } 1580} 1581 1582static void prism2sta_inf_authreq_defer(wlandevice_t *wlandev, 1583 hfa384x_InfFrame_t *inf) 1584{ 1585 hfa384x_t *hw = (hfa384x_t *) wlandev->priv; 1586 hfa384x_authenticateStation_data_t rec; 1587 1588 int i, added, result, cnt; 1589 u8 *addr; 1590 1591 /* 1592 ** Build the AuthenticateStation record. Initialize it for denying 1593 ** authentication. 1594 */ 1595 1596 memcpy(rec.address, inf->info.authreq.sta_addr, ETH_ALEN); 1597 rec.status = P80211ENUM_status_unspec_failure; 1598 1599 /* 1600 ** Authenticate based on the access mode. 1601 */ 1602 1603 switch (hw->accessmode) { 1604 case WLAN_ACCESS_NONE: 1605 1606 /* 1607 ** Deny all new authentications. However, if a station 1608 ** is ALREADY authenticated, then accept it. 1609 */ 1610 1611 for (i = 0; i < hw->authlist.cnt; i++) 1612 if (memcmp(rec.address, hw->authlist.addr[i], 1613 ETH_ALEN) == 0) { 1614 rec.status = P80211ENUM_status_successful; 1615 break; 1616 } 1617 1618 break; 1619 1620 case WLAN_ACCESS_ALL: 1621 1622 /* 1623 ** Allow all authentications. 1624 */ 1625 1626 rec.status = P80211ENUM_status_successful; 1627 break; 1628 1629 case WLAN_ACCESS_ALLOW: 1630 1631 /* 1632 ** Only allow the authentication if the MAC address 1633 ** is in the list of allowed addresses. 1634 ** 1635 ** Since this is the interrupt handler, we may be here 1636 ** while the access list is in the middle of being 1637 ** updated. Choose the list which is currently okay. 1638 ** See "prism2mib_priv_accessallow()" for details. 1639 */ 1640 1641 if (hw->allow.modify == 0) { 1642 cnt = hw->allow.cnt; 1643 addr = hw->allow.addr[0]; 1644 } else { 1645 cnt = hw->allow.cnt1; 1646 addr = hw->allow.addr1[0]; 1647 } 1648 1649 for (i = 0; i < cnt; i++, addr += ETH_ALEN) 1650 if (memcmp(rec.address, addr, ETH_ALEN) == 0) { 1651 rec.status = P80211ENUM_status_successful; 1652 break; 1653 } 1654 1655 break; 1656 1657 case WLAN_ACCESS_DENY: 1658 1659 /* 1660 ** Allow the authentication UNLESS the MAC address is 1661 ** in the list of denied addresses. 1662 ** 1663 ** Since this is the interrupt handler, we may be here 1664 ** while the access list is in the middle of being 1665 ** updated. Choose the list which is currently okay. 1666 ** See "prism2mib_priv_accessdeny()" for details. 1667 */ 1668 1669 if (hw->deny.modify == 0) { 1670 cnt = hw->deny.cnt; 1671 addr = hw->deny.addr[0]; 1672 } else { 1673 cnt = hw->deny.cnt1; 1674 addr = hw->deny.addr1[0]; 1675 } 1676 1677 rec.status = P80211ENUM_status_successful; 1678 1679 for (i = 0; i < cnt; i++, addr += ETH_ALEN) 1680 if (memcmp(rec.address, addr, ETH_ALEN) == 0) { 1681 rec.status = P80211ENUM_status_unspec_failure; 1682 break; 1683 } 1684 1685 break; 1686 } 1687 1688 /* 1689 ** If the authentication is okay, then add the MAC address to the 1690 ** list of authenticated stations. Don't add the address if it 1691 ** is already in the list. (802.11b does not seem to disallow 1692 ** a station from issuing an authentication request when the 1693 ** station is already authenticated. Does this sort of thing 1694 ** ever happen? We might as well do the check just in case.) 1695 */ 1696 1697 added = 0; 1698 1699 if (rec.status == P80211ENUM_status_successful) { 1700 for (i = 0; i < hw->authlist.cnt; i++) 1701 if (memcmp(rec.address, hw->authlist.addr[i], ETH_ALEN) 1702 == 0) 1703 break; 1704 1705 if (i >= hw->authlist.cnt) { 1706 if (hw->authlist.cnt >= WLAN_AUTH_MAX) { 1707 rec.status = P80211ENUM_status_ap_full; 1708 } else { 1709 memcpy(hw->authlist.addr[hw->authlist.cnt], 1710 rec.address, ETH_ALEN); 1711 hw->authlist.cnt++; 1712 added = 1; 1713 } 1714 } 1715 } 1716 1717 /* 1718 ** Send back the results of the authentication. If this doesn't work, 1719 ** then make sure to remove the address from the authenticated list if 1720 ** it was added. 1721 */ 1722 1723 rec.status = cpu_to_le16(rec.status); 1724 rec.algorithm = inf->info.authreq.algorithm; 1725 1726 result = hfa384x_drvr_setconfig(hw, HFA384x_RID_AUTHENTICATESTA, 1727 &rec, sizeof(rec)); 1728 if (result) { 1729 if (added) 1730 hw->authlist.cnt--; 1731 printk(KERN_ERR 1732 "setconfig(authenticatestation) failed, result=%d\n", 1733 result); 1734 } 1735 return; 1736} 1737 1738/*---------------------------------------------------------------- 1739* prism2sta_inf_psusercnt 1740* 1741* Handles the receipt of a PowerSaveUserCount info frame. Should 1742* be present in APs only. 1743* 1744* Arguments: 1745* wlandev wlan device structure 1746* inf ptr to info frame (contents in hfa384x order) 1747* 1748* Returns: 1749* nothing 1750* 1751* Side effects: 1752* 1753* Call context: 1754* interrupt 1755----------------------------------------------------------------*/ 1756static void prism2sta_inf_psusercnt(wlandevice_t *wlandev, 1757 hfa384x_InfFrame_t *inf) 1758{ 1759 hfa384x_t *hw = (hfa384x_t *) wlandev->priv; 1760 1761 hw->psusercount = le16_to_cpu(inf->info.psusercnt.usercnt); 1762 1763 return; 1764} 1765 1766/*---------------------------------------------------------------- 1767* prism2sta_ev_info 1768* 1769* Handles the Info event. 1770* 1771* Arguments: 1772* wlandev wlan device structure 1773* inf ptr to a generic info frame 1774* 1775* Returns: 1776* nothing 1777* 1778* Side effects: 1779* 1780* Call context: 1781* interrupt 1782----------------------------------------------------------------*/ 1783void prism2sta_ev_info(wlandevice_t *wlandev, hfa384x_InfFrame_t *inf) 1784{ 1785 inf->infotype = le16_to_cpu(inf->infotype); 1786 /* Dispatch */ 1787 switch (inf->infotype) { 1788 case HFA384x_IT_HANDOVERADDR: 1789 prism2sta_inf_handover(wlandev, inf); 1790 break; 1791 case HFA384x_IT_COMMTALLIES: 1792 prism2sta_inf_tallies(wlandev, inf); 1793 break; 1794 case HFA384x_IT_HOSTSCANRESULTS: 1795 prism2sta_inf_hostscanresults(wlandev, inf); 1796 break; 1797 case HFA384x_IT_SCANRESULTS: 1798 prism2sta_inf_scanresults(wlandev, inf); 1799 break; 1800 case HFA384x_IT_CHINFORESULTS: 1801 prism2sta_inf_chinforesults(wlandev, inf); 1802 break; 1803 case HFA384x_IT_LINKSTATUS: 1804 prism2sta_inf_linkstatus(wlandev, inf); 1805 break; 1806 case HFA384x_IT_ASSOCSTATUS: 1807 prism2sta_inf_assocstatus(wlandev, inf); 1808 break; 1809 case HFA384x_IT_AUTHREQ: 1810 prism2sta_inf_authreq(wlandev, inf); 1811 break; 1812 case HFA384x_IT_PSUSERCNT: 1813 prism2sta_inf_psusercnt(wlandev, inf); 1814 break; 1815 case HFA384x_IT_KEYIDCHANGED: 1816 printk(KERN_WARNING "Unhandled IT_KEYIDCHANGED\n"); 1817 break; 1818 case HFA384x_IT_ASSOCREQ: 1819 printk(KERN_WARNING "Unhandled IT_ASSOCREQ\n"); 1820 break; 1821 case HFA384x_IT_MICFAILURE: 1822 printk(KERN_WARNING "Unhandled IT_MICFAILURE\n"); 1823 break; 1824 default: 1825 printk(KERN_WARNING 1826 "Unknown info type=0x%02x\n", inf->infotype); 1827 break; 1828 } 1829 return; 1830} 1831 1832/*---------------------------------------------------------------- 1833* prism2sta_ev_txexc 1834* 1835* Handles the TxExc event. A Transmit Exception event indicates 1836* that the MAC's TX process was unsuccessful - so the packet did 1837* not get transmitted. 1838* 1839* Arguments: 1840* wlandev wlan device structure 1841* status tx frame status word 1842* 1843* Returns: 1844* nothing 1845* 1846* Side effects: 1847* 1848* Call context: 1849* interrupt 1850----------------------------------------------------------------*/ 1851void prism2sta_ev_txexc(wlandevice_t *wlandev, u16 status) 1852{ 1853 pr_debug("TxExc status=0x%x.\n", status); 1854 1855 return; 1856} 1857 1858/*---------------------------------------------------------------- 1859* prism2sta_ev_tx 1860* 1861* Handles the Tx event. 1862* 1863* Arguments: 1864* wlandev wlan device structure 1865* status tx frame status word 1866* Returns: 1867* nothing 1868* 1869* Side effects: 1870* 1871* Call context: 1872* interrupt 1873----------------------------------------------------------------*/ 1874void prism2sta_ev_tx(wlandevice_t *wlandev, u16 status) 1875{ 1876 pr_debug("Tx Complete, status=0x%04x\n", status); 1877 /* update linux network stats */ 1878 wlandev->linux_stats.tx_packets++; 1879 return; 1880} 1881 1882/*---------------------------------------------------------------- 1883* prism2sta_ev_rx 1884* 1885* Handles the Rx event. 1886* 1887* Arguments: 1888* wlandev wlan device structure 1889* 1890* Returns: 1891* nothing 1892* 1893* Side effects: 1894* 1895* Call context: 1896* interrupt 1897----------------------------------------------------------------*/ 1898void prism2sta_ev_rx(wlandevice_t *wlandev, struct sk_buff *skb) 1899{ 1900 p80211netdev_rx(wlandev, skb); 1901 return; 1902} 1903 1904/*---------------------------------------------------------------- 1905* prism2sta_ev_alloc 1906* 1907* Handles the Alloc event. 1908* 1909* Arguments: 1910* wlandev wlan device structure 1911* 1912* Returns: 1913* nothing 1914* 1915* Side effects: 1916* 1917* Call context: 1918* interrupt 1919----------------------------------------------------------------*/ 1920void prism2sta_ev_alloc(wlandevice_t *wlandev) 1921{ 1922 netif_wake_queue(wlandev->netdev); 1923 return; 1924} 1925 1926/*---------------------------------------------------------------- 1927* create_wlan 1928* 1929* Called at module init time. This creates the wlandevice_t structure 1930* and initializes it with relevant bits. 1931* 1932* Arguments: 1933* none 1934* 1935* Returns: 1936* the created wlandevice_t structure. 1937* 1938* Side effects: 1939* also allocates the priv/hw structures. 1940* 1941* Call context: 1942* process thread 1943* 1944----------------------------------------------------------------*/ 1945static wlandevice_t *create_wlan(void) 1946{ 1947 wlandevice_t *wlandev = NULL; 1948 hfa384x_t *hw = NULL; 1949 1950 /* Alloc our structures */ 1951 wlandev = kmalloc(sizeof(wlandevice_t), GFP_KERNEL); 1952 hw = kmalloc(sizeof(hfa384x_t), GFP_KERNEL); 1953 1954 if (!wlandev || !hw) { 1955 printk(KERN_ERR "%s: Memory allocation failure.\n", dev_info); 1956 kfree(wlandev); 1957 kfree(hw); 1958 return NULL; 1959 } 1960 1961 /* Clear all the structs */ 1962 memset(wlandev, 0, sizeof(wlandevice_t)); 1963 memset(hw, 0, sizeof(hfa384x_t)); 1964 1965 /* Initialize the network device object. */ 1966 wlandev->nsdname = dev_info; 1967 wlandev->msdstate = WLAN_MSD_HWPRESENT_PENDING; 1968 wlandev->priv = hw; 1969 wlandev->open = prism2sta_open; 1970 wlandev->close = prism2sta_close; 1971 wlandev->reset = prism2sta_reset; 1972 wlandev->txframe = prism2sta_txframe; 1973 wlandev->mlmerequest = prism2sta_mlmerequest; 1974 wlandev->set_multicast_list = prism2sta_setmulticast; 1975 wlandev->tx_timeout = hfa384x_tx_timeout; 1976 1977 wlandev->nsdcaps = P80211_NSDCAP_HWFRAGMENT | P80211_NSDCAP_AUTOJOIN; 1978 1979 /* Initialize the device private data stucture. */ 1980 hw->dot11_desired_bss_type = 1; 1981 1982 return wlandev; 1983} 1984 1985void prism2sta_commsqual_defer(struct work_struct *data) 1986{ 1987 hfa384x_t *hw = container_of(data, struct hfa384x, commsqual_bh); 1988 wlandevice_t *wlandev = hw->wlandev; 1989 hfa384x_bytestr32_t ssid; 1990 struct p80211msg_dot11req_mibget msg; 1991 p80211item_uint32_t *mibitem = (p80211item_uint32_t *) 1992 &msg.mibattribute.data; 1993 int result = 0; 1994 1995 if (hw->wlandev->hwremoved) 1996 goto done; 1997 1998 /* we don't care if we're in AP mode */ 1999 if ((wlandev->macmode == WLAN_MACMODE_NONE) || 2000 (wlandev->macmode == WLAN_MACMODE_ESS_AP)) { 2001 goto done; 2002 } 2003 2004 /* It only makes sense to poll these in non-IBSS */ 2005 if (wlandev->macmode != WLAN_MACMODE_IBSS_STA) { 2006 result = hfa384x_drvr_getconfig( 2007 hw, HFA384x_RID_DBMCOMMSQUALITY, 2008 &hw->qual, HFA384x_RID_DBMCOMMSQUALITY_LEN); 2009 2010 if (result) { 2011 printk(KERN_ERR "error fetching commsqual\n"); 2012 goto done; 2013 } 2014 2015 pr_debug("commsqual %d %d %d\n", 2016 le16_to_cpu(hw->qual.CQ_currBSS), 2017 le16_to_cpu(hw->qual.ASL_currBSS), 2018 le16_to_cpu(hw->qual.ANL_currFC)); 2019 } 2020 2021 /* Get the signal rate */ 2022 msg.msgcode = DIDmsg_dot11req_mibget; 2023 mibitem->did = DIDmib_p2_p2MAC_p2CurrentTxRate; 2024 result = p80211req_dorequest(wlandev, (u8 *) &msg); 2025 2026 if (result) { 2027 pr_debug("get signal rate failed, result = %d\n", 2028 result); 2029 goto done; 2030 } 2031 2032 switch (mibitem->data) { 2033 case HFA384x_RATEBIT_1: 2034 hw->txrate = 10; 2035 break; 2036 case HFA384x_RATEBIT_2: 2037 hw->txrate = 20; 2038 break; 2039 case HFA384x_RATEBIT_5dot5: 2040 hw->txrate = 55; 2041 break; 2042 case HFA384x_RATEBIT_11: 2043 hw->txrate = 110; 2044 break; 2045 default: 2046 pr_debug("Bad ratebit (%d)\n", mibitem->data); 2047 } 2048 2049 /* Lastly, we need to make sure the BSSID didn't change on us */ 2050 result = hfa384x_drvr_getconfig(hw, 2051 HFA384x_RID_CURRENTBSSID, 2052 wlandev->bssid, WLAN_BSSID_LEN); 2053 if (result) { 2054 pr_debug("getconfig(0x%02x) failed, result = %d\n", 2055 HFA384x_RID_CURRENTBSSID, result); 2056 goto done; 2057 } 2058 2059 result = hfa384x_drvr_getconfig(hw, 2060 HFA384x_RID_CURRENTSSID, 2061 &ssid, sizeof(ssid)); 2062 if (result) { 2063 pr_debug("getconfig(0x%02x) failed, result = %d\n", 2064 HFA384x_RID_CURRENTSSID, result); 2065 goto done; 2066 } 2067 prism2mgmt_bytestr2pstr((hfa384x_bytestr_t *) &ssid, 2068 (p80211pstrd_t *) &wlandev->ssid); 2069 2070 /* Reschedule timer */ 2071 mod_timer(&hw->commsqual_timer, jiffies + HZ); 2072 2073done: 2074 ; 2075} 2076 2077void prism2sta_commsqual_timer(unsigned long data) 2078{ 2079 hfa384x_t *hw = (hfa384x_t *) data; 2080 2081 schedule_work(&hw->commsqual_bh); 2082} 2083