Fix common misspellings
[GitHub/mt8127/android_kernel_alcatel_ttab.git] / drivers / staging / ath6kl / os / linux / ar6000_drv.c
CommitLineData
30295c89
VM
1//------------------------------------------------------------------------------
2// Copyright (c) 2004-2010 Atheros Communications Inc.
3// All rights reserved.
4//
5//
6//
7// Permission to use, copy, modify, and/or distribute this software for any
8// purpose with or without fee is hereby granted, provided that the above
9// copyright notice and this permission notice appear in all copies.
10//
11// THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
12// WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
13// MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
14// ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
15// WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
16// ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
17// OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
18//
19//
20//
21// Author(s): ="Atheros"
22//------------------------------------------------------------------------------
23
24/*
25 * This driver is a pseudo ethernet driver to access the Atheros AR6000
26 * WLAN Device
27 */
28
29#include "ar6000_drv.h"
30#ifdef ATH6K_CONFIG_CFG80211
31#include "cfg80211.h"
32#endif /* ATH6K_CONFIG_CFG80211 */
33#include "htc.h"
34#include "wmi_filter_linux.h"
35#include "epping_test.h"
36#include "wlan_config.h"
37#include "ar3kconfig.h"
38#include "ar6k_pal.h"
39#include "AR6002/addrs.h"
40
41
42/* LINUX_HACK_FUDGE_FACTOR -- this is used to provide a workaround for linux behavior. When
43 * the meta data was added to the header it was found that linux did not correctly provide
44 * enough headroom. However when more headroom was requested beyond what was truly needed
45 * Linux gave the requested headroom. Therefore to get the necessary headroom from Linux
46 * the driver requests more than is needed by the amount = LINUX_HACK_FUDGE_FACTOR */
47#define LINUX_HACK_FUDGE_FACTOR 16
48#define BDATA_BDADDR_OFFSET 28
49
ab3655da
JP
50u8 bcast_mac[] = {0xff, 0xff, 0xff, 0xff, 0xff, 0xff};
51u8 null_mac[] = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0};
30295c89
VM
52
53#ifdef DEBUG
54
55#define ATH_DEBUG_DBG_LOG ATH_DEBUG_MAKE_MODULE_MASK(0)
56#define ATH_DEBUG_WLAN_CONNECT ATH_DEBUG_MAKE_MODULE_MASK(1)
57#define ATH_DEBUG_WLAN_SCAN ATH_DEBUG_MAKE_MODULE_MASK(2)
58#define ATH_DEBUG_WLAN_TX ATH_DEBUG_MAKE_MODULE_MASK(3)
59#define ATH_DEBUG_WLAN_RX ATH_DEBUG_MAKE_MODULE_MASK(4)
60#define ATH_DEBUG_HTC_RAW ATH_DEBUG_MAKE_MODULE_MASK(5)
61#define ATH_DEBUG_HCI_BRIDGE ATH_DEBUG_MAKE_MODULE_MASK(6)
62
090f807a 63static struct ath_debug_mask_description driver_debug_desc[] = {
30295c89
VM
64 { ATH_DEBUG_DBG_LOG , "Target Debug Logs"},
65 { ATH_DEBUG_WLAN_CONNECT , "WLAN connect"},
66 { ATH_DEBUG_WLAN_SCAN , "WLAN scan"},
67 { ATH_DEBUG_WLAN_TX , "WLAN Tx"},
68 { ATH_DEBUG_WLAN_RX , "WLAN Rx"},
69 { ATH_DEBUG_HTC_RAW , "HTC Raw IF tracing"},
70 { ATH_DEBUG_HCI_BRIDGE , "HCI Bridge Setup"},
71 { ATH_DEBUG_HCI_RECV , "HCI Recv tracing"},
72 { ATH_DEBUG_HCI_DUMP , "HCI Packet dumps"},
73};
74
75ATH_DEBUG_INSTANTIATE_MODULE_VAR(driver,
76 "driver",
77 "Linux Driver Interface",
78 ATH_DEBUG_MASK_DEFAULTS | ATH_DEBUG_WLAN_SCAN |
79 ATH_DEBUG_HCI_BRIDGE,
80 ATH_DEBUG_DESCRIPTION_COUNT(driver_debug_desc),
81 driver_debug_desc);
82
83#endif
84
85
86#define IS_MAC_NULL(mac) (mac[0]==0 && mac[1]==0 && mac[2]==0 && mac[3]==0 && mac[4]==0 && mac[5]==0)
87#define IS_MAC_BCAST(mac) (*mac==0xff)
88
89#define DESCRIPTION "Driver to access the Atheros AR600x Device, version " __stringify(__VER_MAJOR_) "." __stringify(__VER_MINOR_) "." __stringify(__VER_PATCH_) "." __stringify(__BUILD_NUMBER_)
90
91MODULE_AUTHOR("Atheros Communications, Inc.");
92MODULE_DESCRIPTION(DESCRIPTION);
93MODULE_LICENSE("Dual BSD/GPL");
94
95#ifndef REORG_APTC_HEURISTICS
96#undef ADAPTIVE_POWER_THROUGHPUT_CONTROL
97#endif /* REORG_APTC_HEURISTICS */
98
99#ifdef ADAPTIVE_POWER_THROUGHPUT_CONTROL
100#define APTC_TRAFFIC_SAMPLING_INTERVAL 100 /* msec */
101#define APTC_UPPER_THROUGHPUT_THRESHOLD 3000 /* Kbps */
102#define APTC_LOWER_THROUGHPUT_THRESHOLD 2000 /* Kbps */
103
104typedef struct aptc_traffic_record {
1071a134 105 bool timerScheduled;
30295c89
VM
106 struct timeval samplingTS;
107 unsigned long bytesReceived;
108 unsigned long bytesTransmitted;
109} APTC_TRAFFIC_RECORD;
110
111A_TIMER aptcTimer;
112APTC_TRAFFIC_RECORD aptcTR;
113#endif /* ADAPTIVE_POWER_THROUGHPUT_CONTROL */
114
115#ifdef EXPORT_HCI_BRIDGE_INTERFACE
116// callbacks registered by HCI transport driver
ed8b361d 117struct hci_transport_callbacks ar6kHciTransCallbacks = { NULL };
30295c89
VM
118#endif
119
120unsigned int processDot11Hdr = 0;
121int bmienable = BMIENABLE_DEFAULT;
122
123char ifname[IFNAMSIZ] = {0,};
124
125int wlaninitmode = WLAN_INIT_MODE_DEFAULT;
f192c2bd 126static bool bypasswmi;
30295c89
VM
127unsigned int debuglevel = 0;
128int tspecCompliance = ATHEROS_COMPLIANCE;
129unsigned int busspeedlow = 0;
130unsigned int onebitmode = 0;
131unsigned int skipflash = 0;
132unsigned int wmitimeout = 2;
133unsigned int wlanNodeCaching = 1;
134unsigned int enableuartprint = ENABLEUARTPRINT_DEFAULT;
135unsigned int logWmiRawMsgs = 0;
136unsigned int enabletimerwar = 0;
137unsigned int fwmode = 1;
138unsigned int mbox_yield_limit = 99;
139unsigned int enablerssicompensation = 0;
140int reduce_credit_dribble = 1 + HTC_CONNECT_FLAGS_THRESHOLD_LEVEL_ONE_HALF;
141int allow_trace_signal = 0;
142#ifdef CONFIG_HOST_TCMD_SUPPORT
143unsigned int testmode =0;
144#endif
145
146unsigned int irqprocmode = HIF_DEVICE_IRQ_SYNC_ONLY;//HIF_DEVICE_IRQ_ASYNC_SYNC;
147unsigned int panic_on_assert = 1;
148unsigned int nohifscattersupport = NOHIFSCATTERSUPPORT_DEFAULT;
149
150unsigned int setuphci = SETUPHCI_DEFAULT;
151unsigned int setuphcipal = SETUPHCIPAL_DEFAULT;
152unsigned int loghci = 0;
153unsigned int setupbtdev = SETUPBTDEV_DEFAULT;
154#ifndef EXPORT_HCI_BRIDGE_INTERFACE
155unsigned int ar3khcibaud = AR3KHCIBAUD_DEFAULT;
156unsigned int hciuartscale = HCIUARTSCALE_DEFAULT;
157unsigned int hciuartstep = HCIUARTSTEP_DEFAULT;
158#endif
159#ifdef CONFIG_CHECKSUM_OFFLOAD
160unsigned int csumOffload=0;
161unsigned int csumOffloadTest=0;
162#endif
163unsigned int eppingtest=0;
164
165module_param_string(ifname, ifname, sizeof(ifname), 0644);
166module_param(wlaninitmode, int, 0644);
167module_param(bmienable, int, 0644);
f192c2bd 168module_param(bypasswmi, bool, 0644);
30295c89
VM
169module_param(debuglevel, uint, 0644);
170module_param(tspecCompliance, int, 0644);
171module_param(onebitmode, uint, 0644);
172module_param(busspeedlow, uint, 0644);
173module_param(skipflash, uint, 0644);
174module_param(wmitimeout, uint, 0644);
175module_param(wlanNodeCaching, uint, 0644);
176module_param(logWmiRawMsgs, uint, 0644);
177module_param(enableuartprint, uint, 0644);
178module_param(enabletimerwar, uint, 0644);
179module_param(fwmode, uint, 0644);
180module_param(mbox_yield_limit, uint, 0644);
181module_param(reduce_credit_dribble, int, 0644);
182module_param(allow_trace_signal, int, 0644);
183module_param(enablerssicompensation, uint, 0644);
184module_param(processDot11Hdr, uint, 0644);
185#ifdef CONFIG_CHECKSUM_OFFLOAD
186module_param(csumOffload, uint, 0644);
187#endif
188#ifdef CONFIG_HOST_TCMD_SUPPORT
189module_param(testmode, uint, 0644);
190#endif
191module_param(irqprocmode, uint, 0644);
192module_param(nohifscattersupport, uint, 0644);
193module_param(panic_on_assert, uint, 0644);
194module_param(setuphci, uint, 0644);
195module_param(setuphcipal, uint, 0644);
196module_param(loghci, uint, 0644);
197module_param(setupbtdev, uint, 0644);
198#ifndef EXPORT_HCI_BRIDGE_INTERFACE
199module_param(ar3khcibaud, uint, 0644);
200module_param(hciuartscale, uint, 0644);
201module_param(hciuartstep, uint, 0644);
202#endif
203module_param(eppingtest, uint, 0644);
204
205/* in 2.6.10 and later this is now a pointer to a uint */
206unsigned int _mboxnum = HTC_MAILBOX_NUM_MAX;
207#define mboxnum &_mboxnum
208
209#ifdef DEBUG
e1ce2a3a 210u32 g_dbg_flags = DBG_DEFAULTS;
30295c89
VM
211unsigned int debugflags = 0;
212int debugdriver = 0;
213unsigned int debughtc = 0;
214unsigned int debugbmi = 0;
215unsigned int debughif = 0;
216unsigned int txcreditsavailable[HTC_MAILBOX_NUM_MAX] = {0};
217unsigned int txcreditsconsumed[HTC_MAILBOX_NUM_MAX] = {0};
218unsigned int txcreditintrenable[HTC_MAILBOX_NUM_MAX] = {0};
219unsigned int txcreditintrenableaggregate[HTC_MAILBOX_NUM_MAX] = {0};
220module_param(debugflags, uint, 0644);
221module_param(debugdriver, int, 0644);
222module_param(debughtc, uint, 0644);
223module_param(debugbmi, uint, 0644);
224module_param(debughif, uint, 0644);
225module_param_array(txcreditsavailable, uint, mboxnum, 0644);
226module_param_array(txcreditsconsumed, uint, mboxnum, 0644);
227module_param_array(txcreditintrenable, uint, mboxnum, 0644);
228module_param_array(txcreditintrenableaggregate, uint, mboxnum, 0644);
229
230#endif /* DEBUG */
231
232unsigned int resetok = 1;
233unsigned int tx_attempt[HTC_MAILBOX_NUM_MAX] = {0};
234unsigned int tx_post[HTC_MAILBOX_NUM_MAX] = {0};
235unsigned int tx_complete[HTC_MAILBOX_NUM_MAX] = {0};
236unsigned int hifBusRequestNumMax = 40;
237unsigned int war23838_disabled = 0;
238#ifdef ADAPTIVE_POWER_THROUGHPUT_CONTROL
239unsigned int enableAPTCHeuristics = 1;
240#endif /* ADAPTIVE_POWER_THROUGHPUT_CONTROL */
241module_param_array(tx_attempt, uint, mboxnum, 0644);
242module_param_array(tx_post, uint, mboxnum, 0644);
243module_param_array(tx_complete, uint, mboxnum, 0644);
244module_param(hifBusRequestNumMax, uint, 0644);
245module_param(war23838_disabled, uint, 0644);
246module_param(resetok, uint, 0644);
247#ifdef ADAPTIVE_POWER_THROUGHPUT_CONTROL
248module_param(enableAPTCHeuristics, uint, 0644);
249#endif /* ADAPTIVE_POWER_THROUGHPUT_CONTROL */
250
251#ifdef BLOCK_TX_PATH_FLAG
252int blocktx = 0;
253module_param(blocktx, int, 0644);
254#endif /* BLOCK_TX_PATH_FLAG */
255
256typedef struct user_rssi_compensation_t {
4853ac05 257 u16 customerID;
30295c89 258 union {
4853ac05
JP
259 u16 a_enable;
260 u16 bg_enable;
261 u16 enable;
30295c89 262 };
cb1e3709
JP
263 s16 bg_param_a;
264 s16 bg_param_b;
265 s16 a_param_a;
266 s16 a_param_b;
e1ce2a3a 267 u32 reserved;
30295c89
VM
268} USER_RSSI_CPENSATION;
269
270static USER_RSSI_CPENSATION rssi_compensation_param;
271
cb1e3709 272static s16 rssi_compensation_table[96];
30295c89
VM
273
274int reconnect_flag = 0;
275static ar6k_pal_config_t ar6k_pal_config_g;
276
277/* Function declarations */
278static int ar6000_init_module(void);
279static void ar6000_cleanup_module(void);
280
281int ar6000_init(struct net_device *dev);
282static int ar6000_open(struct net_device *dev);
283static int ar6000_close(struct net_device *dev);
a71f0bf6 284static void ar6000_init_control_info(struct ar6_softc *ar);
30295c89
VM
285static int ar6000_data_tx(struct sk_buff *skb, struct net_device *dev);
286
287void ar6000_destroy(struct net_device *dev, unsigned int unregister);
288static void ar6000_detect_error(unsigned long ptr);
289static void ar6000_set_multicast_list(struct net_device *dev);
290static struct net_device_stats *ar6000_get_stats(struct net_device *dev);
291static struct iw_statistics *ar6000_get_iwstats(struct net_device * dev);
292
293static void disconnect_timer_handler(unsigned long ptr);
294
a71f0bf6 295void read_rssi_compensation_param(struct ar6_softc *ar);
30295c89
VM
296
297 /* for android builds we call external APIs that handle firmware download and configuration */
298#ifdef ANDROID_ENV
299/* !!!! Interim android support to make it easier to patch the default driver for
300 * android use. You must define an external source file ar6000_android.c that handles the following
301 * APIs */
302extern void android_module_init(OSDRV_CALLBACKS *osdrvCallbacks);
303extern void android_module_exit(void);
304#endif
305/*
306 * HTC service connection handlers
307 */
1f4c34bd 308static int ar6000_avail_ev(void *context, void *hif_handle);
30295c89 309
1f4c34bd 310static int ar6000_unavail_ev(void *context, void *hif_handle);
30295c89 311
a71f0bf6 312int ar6000_configure_target(struct ar6_softc *ar);
30295c89 313
1f4c34bd 314static void ar6000_target_failure(void *Instance, int Status);
30295c89 315
c6528e2f 316static void ar6000_rx(void *Context, struct htc_packet *pPacket);
30295c89
VM
317
318static void ar6000_rx_refill(void *Context,HTC_ENDPOINT_ID Endpoint);
319
6ca0f664 320static void ar6000_tx_complete(void *Context, struct htc_packet_queue *pPackets);
30295c89 321
c6528e2f 322static HTC_SEND_FULL_ACTION ar6000_tx_queue_full(void *Context, struct htc_packet *pPacket);
30295c89
VM
323
324#ifdef ATH_AR6K_11N_SUPPORT
4853ac05 325static void ar6000_alloc_netbufs(A_NETBUF_QUEUE_T *q, u16 num);
30295c89
VM
326#endif
327static void ar6000_deliver_frames_to_nw_stack(void * dev, void *osbuf);
328//static void ar6000_deliver_frames_to_bt_stack(void * dev, void *osbuf);
329
c6528e2f 330static struct htc_packet *ar6000_alloc_amsdu_rxbuf(void *Context, HTC_ENDPOINT_ID Endpoint, int Length);
30295c89 331
a71f0bf6 332static void ar6000_refill_amsdu_rxbufs(struct ar6_softc *ar, int Count);
30295c89 333
a71f0bf6 334static void ar6000_cleanup_amsdu_rxbufs(struct ar6_softc *ar);
30295c89
VM
335
336static ssize_t
337ar6000_sysfs_bmi_read(struct file *fp, struct kobject *kobj,
338 struct bin_attribute *bin_attr,
339 char *buf, loff_t pos, size_t count);
340
341static ssize_t
342ar6000_sysfs_bmi_write(struct file *fp, struct kobject *kobj,
343 struct bin_attribute *bin_attr,
344 char *buf, loff_t pos, size_t count);
345
1f4c34bd 346static int
a71f0bf6 347ar6000_sysfs_bmi_init(struct ar6_softc *ar);
30295c89
VM
348
349/* HCI PAL callback function declarations */
a71f0bf6
LR
350int ar6k_setup_hci_pal(struct ar6_softc *ar);
351void ar6k_cleanup_hci_pal(struct ar6_softc *ar);
30295c89
VM
352
353static void
a71f0bf6 354ar6000_sysfs_bmi_deinit(struct ar6_softc *ar);
30295c89 355
1f4c34bd 356int
a71f0bf6 357ar6000_sysfs_bmi_get_config(struct ar6_softc *ar, u32 mode);
30295c89
VM
358
359/*
360 * Static variables
361 */
362
363struct net_device *ar6000_devices[MAX_AR6000];
364static int is_netdev_registered;
365extern struct iw_handler_def ath_iw_handler_def;
366DECLARE_WAIT_QUEUE_HEAD(arEvent);
a71f0bf6
LR
367static void ar6000_cookie_init(struct ar6_softc *ar);
368static void ar6000_cookie_cleanup(struct ar6_softc *ar);
369static void ar6000_free_cookie(struct ar6_softc *ar, struct ar_cookie * cookie);
370static struct ar_cookie *ar6000_alloc_cookie(struct ar6_softc *ar);
30295c89
VM
371
372#ifdef USER_KEYS
a71f0bf6 373static int ar6000_reinstall_keys(struct ar6_softc *ar,u8 key_op_ctrl);
30295c89
VM
374#endif
375
376#ifdef CONFIG_AP_VIRTUAL_ADAPTER_SUPPORT
377struct net_device *arApNetDev;
378#endif /* CONFIG_AP_VIRTUAL_ADAPTER_SUPPORT */
379
380static struct ar_cookie s_ar_cookie_mem[MAX_COOKIE_NUM];
381
382#define HOST_INTEREST_ITEM_ADDRESS(ar, item) \
383 (((ar)->arTargetType == TARGET_TYPE_AR6002) ? AR6002_HOST_INTEREST_ITEM_ADDRESS(item) : \
384 (((ar)->arTargetType == TARGET_TYPE_AR6003) ? AR6003_HOST_INTEREST_ITEM_ADDRESS(item) : 0))
385
386
387static struct net_device_ops ar6000_netdev_ops = {
388 .ndo_init = NULL,
389 .ndo_open = ar6000_open,
390 .ndo_stop = ar6000_close,
391 .ndo_get_stats = ar6000_get_stats,
392 .ndo_do_ioctl = ar6000_ioctl,
393 .ndo_start_xmit = ar6000_data_tx,
394 .ndo_set_multicast_list = ar6000_set_multicast_list,
395};
396
397/* Debug log support */
398
399/*
400 * Flag to govern whether the debug logs should be parsed in the kernel
401 * or reported to the application.
402 */
403#define REPORT_DEBUG_LOGS_TO_APP
404
1f4c34bd 405int
a71f0bf6 406ar6000_set_host_app_area(struct ar6_softc *ar)
30295c89 407{
e1ce2a3a 408 u32 address, data;
30295c89
VM
409 struct host_app_area_s host_app_area;
410
411 /* Fetch the address of the host_app_area_s instance in the host interest area */
412 address = TARG_VTOP(ar->arTargetType, HOST_INTEREST_ITEM_ADDRESS(ar, hi_app_host_interest));
4f69cef0 413 if (ar6000_ReadRegDiag(ar->arHifDevice, &address, &data) != 0) {
30295c89
VM
414 return A_ERROR;
415 }
416 address = TARG_VTOP(ar->arTargetType, data);
417 host_app_area.wmi_protocol_ver = WMI_PROTOCOL_VERSION;
418 if (ar6000_WriteDataDiag(ar->arHifDevice, address,
d8cb316f 419 (u8 *)&host_app_area,
4f69cef0 420 sizeof(struct host_app_area_s)) != 0)
30295c89
VM
421 {
422 return A_ERROR;
423 }
424
4f69cef0 425 return 0;
30295c89
VM
426}
427
a71f0bf6 428u32 dbglog_get_debug_hdr_ptr(struct ar6_softc *ar)
30295c89 429{
e1ce2a3a
JP
430 u32 param;
431 u32 address;
1f4c34bd 432 int status;
30295c89
VM
433
434 address = TARG_VTOP(ar->arTargetType, HOST_INTEREST_ITEM_ADDRESS(ar, hi_dbglog_hdr));
435 if ((status = ar6000_ReadDataDiag(ar->arHifDevice, address,
d8cb316f 436 (u8 *)&param, 4)) != 0)
30295c89
VM
437 {
438 param = 0;
439 }
440
441 return param;
442}
443
444/*
445 * The dbglog module has been initialized. Its ok to access the relevant
446 * data stuctures over the diagnostic window.
447 */
448void
a71f0bf6 449ar6000_dbglog_init_done(struct ar6_softc *ar)
30295c89 450{
1071a134 451 ar->dbglog_init_done = true;
30295c89
VM
452}
453
f2ab1275 454u32 dbglog_get_debug_fragment(s8 *datap, u32 len, u32 limit)
30295c89 455{
f68057e6 456 s32 *buffer;
e1ce2a3a
JP
457 u32 count;
458 u32 numargs;
459 u32 length;
460 u32 fraglen;
30295c89
VM
461
462 count = fraglen = 0;
f68057e6 463 buffer = (s32 *)datap;
30295c89
VM
464 length = (limit >> 2);
465
466 if (len <= limit) {
467 fraglen = len;
468 } else {
469 while (count < length) {
470 numargs = DBGLOG_GET_NUMARGS(buffer[count]);
471 fraglen = (count << 2);
472 count += numargs + 1;
473 }
474 }
475
476 return fraglen;
477}
478
479void
f2ab1275 480dbglog_parse_debug_logs(s8 *datap, u32 len)
30295c89 481{
f68057e6 482 s32 *buffer;
e1ce2a3a
JP
483 u32 count;
484 u32 timestamp;
485 u32 debugid;
486 u32 moduleid;
487 u32 numargs;
488 u32 length;
30295c89
VM
489
490 count = 0;
f68057e6 491 buffer = (s32 *)datap;
30295c89
VM
492 length = (len >> 2);
493 while (count < length) {
494 debugid = DBGLOG_GET_DBGID(buffer[count]);
495 moduleid = DBGLOG_GET_MODULEID(buffer[count]);
496 numargs = DBGLOG_GET_NUMARGS(buffer[count]);
497 timestamp = DBGLOG_GET_TIMESTAMP(buffer[count]);
498 switch (numargs) {
499 case 0:
500 AR_DEBUG_PRINTF(ATH_DEBUG_DBG_LOG,("%d %d (%d)\n", moduleid, debugid, timestamp));
501 break;
502
503 case 1:
504 AR_DEBUG_PRINTF(ATH_DEBUG_DBG_LOG,("%d %d (%d): 0x%x\n", moduleid, debugid,
505 timestamp, buffer[count+1]));
506 break;
507
508 case 2:
509 AR_DEBUG_PRINTF(ATH_DEBUG_DBG_LOG,("%d %d (%d): 0x%x, 0x%x\n", moduleid, debugid,
510 timestamp, buffer[count+1], buffer[count+2]));
511 break;
512
513 default:
514 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,("Invalid args: %d\n", numargs));
515 }
516 count += numargs + 1;
517 }
518}
519
520int
a71f0bf6 521ar6000_dbglog_get_debug_logs(struct ar6_softc *ar)
30295c89 522{
25985edc 523 u32 data[8]; /* Should be able to accommodate struct dbglog_buf_s */
e1ce2a3a
JP
524 u32 address;
525 u32 length;
526 u32 dropped;
527 u32 firstbuf;
528 u32 debug_hdr_ptr;
30295c89
VM
529
530 if (!ar->dbglog_init_done) return A_ERROR;
531
532
533 AR6000_SPIN_LOCK(&ar->arLock, 0);
534
535 if (ar->dbgLogFetchInProgress) {
536 AR6000_SPIN_UNLOCK(&ar->arLock, 0);
537 return A_EBUSY;
538 }
539
540 /* block out others */
1071a134 541 ar->dbgLogFetchInProgress = true;
30295c89
VM
542
543 AR6000_SPIN_UNLOCK(&ar->arLock, 0);
544
545 debug_hdr_ptr = dbglog_get_debug_hdr_ptr(ar);
546 printk("debug_hdr_ptr: 0x%x\n", debug_hdr_ptr);
547
548 /* Get the contents of the ring buffer */
549 if (debug_hdr_ptr) {
550 address = TARG_VTOP(ar->arTargetType, debug_hdr_ptr);
551 length = 4 /* sizeof(dbuf) */ + 4 /* sizeof(dropped) */;
552 A_MEMZERO(data, sizeof(data));
d8cb316f 553 ar6000_ReadDataDiag(ar->arHifDevice, address, (u8 *)data, length);
30295c89
VM
554 address = TARG_VTOP(ar->arTargetType, data[0] /* dbuf */);
555 firstbuf = address;
556 dropped = data[1]; /* dropped */
557 length = 4 /* sizeof(next) */ + 4 /* sizeof(buffer) */ + 4 /* sizeof(bufsize) */ + 4 /* sizeof(length) */ + 4 /* sizeof(count) */ + 4 /* sizeof(free) */;
558 A_MEMZERO(data, sizeof(data));
d8cb316f 559 ar6000_ReadDataDiag(ar->arHifDevice, address, (u8 *)&data, length);
30295c89
VM
560
561 do {
562 address = TARG_VTOP(ar->arTargetType, data[1] /* buffer*/);
563 length = data[3]; /* length */
564 if ((length) && (length <= data[2] /* bufsize*/)) {
565 /* Rewind the index if it is about to overrun the buffer */
566 if (ar->log_cnt > (DBGLOG_HOST_LOG_BUFFER_SIZE - length)) {
567 ar->log_cnt = 0;
568 }
4f69cef0 569 if(0 != ar6000_ReadDataDiag(ar->arHifDevice, address,
d8cb316f 570 (u8 *)&ar->log_buffer[ar->log_cnt], length))
30295c89
VM
571 {
572 break;
573 }
f2ab1275 574 ar6000_dbglog_event(ar, dropped, (s8 *)&ar->log_buffer[ar->log_cnt], length);
30295c89
VM
575 ar->log_cnt += length;
576 } else {
577 AR_DEBUG_PRINTF(ATH_DEBUG_DBG_LOG,("Length: %d (Total size: %d)\n",
578 data[3], data[2]));
579 }
580
581 address = TARG_VTOP(ar->arTargetType, data[0] /* next */);
582 length = 4 /* sizeof(next) */ + 4 /* sizeof(buffer) */ + 4 /* sizeof(bufsize) */ + 4 /* sizeof(length) */ + 4 /* sizeof(count) */ + 4 /* sizeof(free) */;
583 A_MEMZERO(data, sizeof(data));
4f69cef0 584 if(0 != ar6000_ReadDataDiag(ar->arHifDevice, address,
d8cb316f 585 (u8 *)&data, length))
30295c89
VM
586 {
587 break;
588 }
589
590 } while (address != firstbuf);
591 }
592
1071a134 593 ar->dbgLogFetchInProgress = false;
30295c89 594
4f69cef0 595 return 0;
30295c89
VM
596}
597
598void
a71f0bf6 599ar6000_dbglog_event(struct ar6_softc *ar, u32 dropped,
f2ab1275 600 s8 *buffer, u32 length)
30295c89
VM
601{
602#ifdef REPORT_DEBUG_LOGS_TO_APP
603 #define MAX_WIRELESS_EVENT_SIZE 252
604 /*
605 * Break it up into chunks of MAX_WIRELESS_EVENT_SIZE bytes of messages.
606 * There seems to be a limitation on the length of message that could be
607 * transmitted to the user app via this mechanism.
608 */
e1ce2a3a 609 u32 send, sent;
30295c89
VM
610
611 sent = 0;
612 send = dbglog_get_debug_fragment(&buffer[sent], length - sent,
613 MAX_WIRELESS_EVENT_SIZE);
614 while (send) {
ab3655da 615 ar6000_send_event_to_app(ar, WMIX_DBGLOG_EVENTID, (u8 *)&buffer[sent], send);
30295c89
VM
616 sent += send;
617 send = dbglog_get_debug_fragment(&buffer[sent], length - sent,
618 MAX_WIRELESS_EVENT_SIZE);
619 }
620#else
621 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,("Dropped logs: 0x%x\nDebug info length: %d\n",
622 dropped, length));
623
624 /* Interpret the debug logs */
f2ab1275 625 dbglog_parse_debug_logs((s8 *)buffer, length);
30295c89
VM
626#endif /* REPORT_DEBUG_LOGS_TO_APP */
627}
628
629
630static int __init
631ar6000_init_module(void)
632{
633 static int probed = 0;
1f4c34bd 634 int status;
30295c89
VM
635 OSDRV_CALLBACKS osdrvCallbacks;
636
637 a_module_debug_support_init();
638
639#ifdef DEBUG
640 /* check for debug mask overrides */
641 if (debughtc != 0) {
642 ATH_DEBUG_SET_DEBUG_MASK(htc,debughtc);
643 }
644 if (debugbmi != 0) {
645 ATH_DEBUG_SET_DEBUG_MASK(bmi,debugbmi);
646 }
647 if (debughif != 0) {
648 ATH_DEBUG_SET_DEBUG_MASK(hif,debughif);
649 }
650 if (debugdriver != 0) {
651 ATH_DEBUG_SET_DEBUG_MASK(driver,debugdriver);
652 }
653
654#endif
655
656 A_REGISTER_MODULE_DEBUG_INFO(driver);
657
658 A_MEMZERO(&osdrvCallbacks,sizeof(osdrvCallbacks));
659 osdrvCallbacks.deviceInsertedHandler = ar6000_avail_ev;
660 osdrvCallbacks.deviceRemovedHandler = ar6000_unavail_ev;
661#ifdef CONFIG_PM
662 osdrvCallbacks.deviceSuspendHandler = ar6000_suspend_ev;
663 osdrvCallbacks.deviceResumeHandler = ar6000_resume_ev;
664 osdrvCallbacks.devicePowerChangeHandler = ar6000_power_change_ev;
665#endif
666
667 ar6000_pm_init();
668
669#ifdef ANDROID_ENV
670 android_module_init(&osdrvCallbacks);
671#endif
672
673#ifdef DEBUG
674 /* Set the debug flags if specified at load time */
675 if(debugflags != 0)
676 {
677 g_dbg_flags = debugflags;
678 }
679#endif
680
681 if (probed) {
682 return -ENODEV;
683 }
684 probed++;
685
686#ifdef ADAPTIVE_POWER_THROUGHPUT_CONTROL
687 memset(&aptcTR, 0, sizeof(APTC_TRAFFIC_RECORD));
688#endif /* ADAPTIVE_POWER_THROUGHPUT_CONTROL */
689
690#ifdef CONFIG_HOST_GPIO_SUPPORT
691 ar6000_gpio_init();
692#endif /* CONFIG_HOST_GPIO_SUPPORT */
693
694 status = HIFInit(&osdrvCallbacks);
a1d46529 695 if (status)
30295c89
VM
696 return -ENODEV;
697
698 return 0;
699}
700
701static void __exit
702ar6000_cleanup_module(void)
703{
704 int i = 0;
705 struct net_device *ar6000_netdev;
706
707#ifdef ADAPTIVE_POWER_THROUGHPUT_CONTROL
708 /* Delete the Adaptive Power Control timer */
709 if (timer_pending(&aptcTimer)) {
710 del_timer_sync(&aptcTimer);
711 }
712#endif /* ADAPTIVE_POWER_THROUGHPUT_CONTROL */
713
714 for (i=0; i < MAX_AR6000; i++) {
715 if (ar6000_devices[i] != NULL) {
716 ar6000_netdev = ar6000_devices[i];
717 ar6000_devices[i] = NULL;
718 ar6000_destroy(ar6000_netdev, 1);
719 }
720 }
721
722 HIFShutDownDevice(NULL);
723
724 a_module_debug_support_cleanup();
725
726 ar6000_pm_exit();
727
728#ifdef ANDROID_ENV
729 android_module_exit();
730#endif
731
732 AR_DEBUG_PRINTF(ATH_DEBUG_INFO,("ar6000_cleanup: success\n"));
733}
734
735#ifdef ADAPTIVE_POWER_THROUGHPUT_CONTROL
736void
737aptcTimerHandler(unsigned long arg)
738{
e1ce2a3a
JP
739 u32 numbytes;
740 u32 throughput;
a71f0bf6 741 struct ar6_softc *ar;
1f4c34bd 742 int status;
30295c89 743
a71f0bf6 744 ar = (struct ar6_softc *)arg;
30295c89
VM
745 A_ASSERT(ar != NULL);
746 A_ASSERT(!timer_pending(&aptcTimer));
747
748 AR6000_SPIN_LOCK(&ar->arLock, 0);
749
750 /* Get the number of bytes transferred */
751 numbytes = aptcTR.bytesTransmitted + aptcTR.bytesReceived;
752 aptcTR.bytesTransmitted = aptcTR.bytesReceived = 0;
753
754 /* Calculate and decide based on throughput thresholds */
755 throughput = ((numbytes * 8)/APTC_TRAFFIC_SAMPLING_INTERVAL); /* Kbps */
756 if (throughput < APTC_LOWER_THROUGHPUT_THRESHOLD) {
757 /* Enable Sleep and delete the timer */
1071a134 758 A_ASSERT(ar->arWmiReady == true);
30295c89
VM
759 AR6000_SPIN_UNLOCK(&ar->arLock, 0);
760 status = wmi_powermode_cmd(ar->arWmi, REC_POWER);
761 AR6000_SPIN_LOCK(&ar->arLock, 0);
4f69cef0 762 A_ASSERT(status == 0);
1071a134 763 aptcTR.timerScheduled = false;
30295c89
VM
764 } else {
765 A_TIMEOUT_MS(&aptcTimer, APTC_TRAFFIC_SAMPLING_INTERVAL, 0);
766 }
767
768 AR6000_SPIN_UNLOCK(&ar->arLock, 0);
769}
770#endif /* ADAPTIVE_POWER_THROUGHPUT_CONTROL */
771
772#ifdef ATH_AR6K_11N_SUPPORT
773static void
4853ac05 774ar6000_alloc_netbufs(A_NETBUF_QUEUE_T *q, u16 num)
30295c89
VM
775{
776 void * osbuf;
777
778 while(num) {
779 if((osbuf = A_NETBUF_ALLOC(AR6000_BUFFER_SIZE))) {
780 A_NETBUF_ENQUEUE(q, osbuf);
781 } else {
782 break;
783 }
784 num--;
785 }
786
787 if(num) {
788 A_PRINTF("%s(), allocation of netbuf failed", __func__);
789 }
790}
791#endif
792
793static struct bin_attribute bmi_attr = {
794 .attr = {.name = "bmi", .mode = 0600},
795 .read = ar6000_sysfs_bmi_read,
796 .write = ar6000_sysfs_bmi_write,
797};
798
799static ssize_t
800ar6000_sysfs_bmi_read(struct file *fp, struct kobject *kobj,
801 struct bin_attribute *bin_attr,
802 char *buf, loff_t pos, size_t count)
803{
804 int index;
a71f0bf6 805 struct ar6_softc *ar;
e6b5260e 806 struct hif_device_os_device_info *osDevInfo;
30295c89 807
e1ce2a3a 808 AR_DEBUG_PRINTF(ATH_DEBUG_INFO,("BMI: Read %d bytes\n", (u32)count));
30295c89 809 for (index=0; index < MAX_AR6000; index++) {
a71f0bf6 810 ar = (struct ar6_softc *)ar6k_priv(ar6000_devices[index]);
30295c89
VM
811 osDevInfo = &ar->osDevInfo;
812 if (kobj == (&(((struct device *)osDevInfo->pOSDevice)->kobj))) {
813 break;
814 }
815 }
816
817 if (index == MAX_AR6000) return 0;
818
d8cb316f 819 if ((BMIRawRead(ar->arHifDevice, (u8*)buf, count, true)) != 0) {
30295c89
VM
820 return 0;
821 }
822
823 return count;
824}
825
826static ssize_t
827ar6000_sysfs_bmi_write(struct file *fp, struct kobject *kobj,
828 struct bin_attribute *bin_attr,
829 char *buf, loff_t pos, size_t count)
830{
831 int index;
a71f0bf6 832 struct ar6_softc *ar;
e6b5260e 833 struct hif_device_os_device_info *osDevInfo;
30295c89 834
e1ce2a3a 835 AR_DEBUG_PRINTF(ATH_DEBUG_INFO,("BMI: Write %d bytes\n", (u32)count));
30295c89 836 for (index=0; index < MAX_AR6000; index++) {
a71f0bf6 837 ar = (struct ar6_softc *)ar6k_priv(ar6000_devices[index]);
30295c89
VM
838 osDevInfo = &ar->osDevInfo;
839 if (kobj == (&(((struct device *)osDevInfo->pOSDevice)->kobj))) {
840 break;
841 }
842 }
843
844 if (index == MAX_AR6000) return 0;
845
d8cb316f 846 if ((BMIRawWrite(ar->arHifDevice, (u8*)buf, count)) != 0) {
30295c89
VM
847 return 0;
848 }
849
850 return count;
851}
852
1f4c34bd 853static int
a71f0bf6 854ar6000_sysfs_bmi_init(struct ar6_softc *ar)
30295c89 855{
1f4c34bd 856 int status;
30295c89
VM
857
858 AR_DEBUG_PRINTF(ATH_DEBUG_INFO,("BMI: Creating sysfs entry\n"));
e6b5260e 859 A_MEMZERO(&ar->osDevInfo, sizeof(struct hif_device_os_device_info));
30295c89
VM
860
861 /* Get the underlying OS device */
862 status = HIFConfigureDevice(ar->arHifDevice,
863 HIF_DEVICE_GET_OS_DEVICE,
864 &ar->osDevInfo,
e6b5260e 865 sizeof(struct hif_device_os_device_info));
30295c89 866
391bb211 867 if (status) {
30295c89
VM
868 AR_DEBUG_PRINTF(ATH_DEBUG_ERR, ("BMI: Failed to get OS device info from HIF\n"));
869 return A_ERROR;
870 }
871
872 /* Create a bmi entry in the sysfs filesystem */
873 if ((sysfs_create_bin_file(&(((struct device *)ar->osDevInfo.pOSDevice)->kobj), &bmi_attr)) < 0)
874 {
875 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,("BMI: Failed to create entry for bmi in sysfs filesystem\n"));
876 return A_ERROR;
877 }
878
4f69cef0 879 return 0;
30295c89
VM
880}
881
882static void
a71f0bf6 883ar6000_sysfs_bmi_deinit(struct ar6_softc *ar)
30295c89
VM
884{
885 AR_DEBUG_PRINTF(ATH_DEBUG_INFO,("BMI: Deleting sysfs entry\n"));
886
887 sysfs_remove_bin_file(&(((struct device *)ar->osDevInfo.pOSDevice)->kobj), &bmi_attr);
888}
889
890#define bmifn(fn) do { \
4f69cef0 891 if ((fn) < 0) { \
30295c89
VM
892 AR_DEBUG_PRINTF(ATH_DEBUG_ERR, ("BMI operation failed: %d\n", __LINE__)); \
893 return A_ERROR; \
894 } \
895} while(0)
896
897#ifdef INIT_MODE_DRV_ENABLED
898
899#ifdef SOFTMAC_FILE_USED
900#define AR6002_MAC_ADDRESS_OFFSET 0x0A
901#define AR6003_MAC_ADDRESS_OFFSET 0x16
902static
d8cb316f 903void calculate_crc(u32 TargetType, u8 *eeprom_data)
30295c89 904{
4853ac05
JP
905 u16 *ptr_crc;
906 u16 *ptr16_eeprom;
907 u16 checksum;
e1ce2a3a
JP
908 u32 i;
909 u32 eeprom_size;
30295c89
VM
910
911 if (TargetType == TARGET_TYPE_AR6001)
912 {
913 eeprom_size = 512;
4853ac05 914 ptr_crc = (u16 *)eeprom_data;
30295c89
VM
915 }
916 else if (TargetType == TARGET_TYPE_AR6003)
917 {
918 eeprom_size = 1024;
d8cb316f 919 ptr_crc = (u16 *)((u8 *)eeprom_data + 0x04);
30295c89
VM
920 }
921 else
922 {
923 eeprom_size = 768;
d8cb316f 924 ptr_crc = (u16 *)((u8 *)eeprom_data + 0x04);
30295c89
VM
925 }
926
927
928 // Clear the crc
929 *ptr_crc = 0;
930
931 // Recalculate new CRC
932 checksum = 0;
4853ac05 933 ptr16_eeprom = (u16 *)eeprom_data;
30295c89
VM
934 for (i = 0;i < eeprom_size; i += 2)
935 {
936 checksum = checksum ^ (*ptr16_eeprom);
937 ptr16_eeprom++;
938 }
939 checksum = 0xFFFF ^ checksum;
940 *ptr_crc = checksum;
941}
942
943static void
a71f0bf6 944ar6000_softmac_update(struct ar6_softc *ar, u8 *eeprom_data, size_t size)
30295c89
VM
945{
946 const char *source = "random generated";
947 const struct firmware *softmac_entry;
d8cb316f 948 u8 *ptr_mac;
30295c89
VM
949 switch (ar->arTargetType) {
950 case TARGET_TYPE_AR6002:
d8cb316f 951 ptr_mac = (u8 *)((u8 *)eeprom_data + AR6002_MAC_ADDRESS_OFFSET);
30295c89
VM
952 break;
953 case TARGET_TYPE_AR6003:
d8cb316f 954 ptr_mac = (u8 *)((u8 *)eeprom_data + AR6003_MAC_ADDRESS_OFFSET);
30295c89
VM
955 break;
956 default:
fa1ae16c 957 AR_DEBUG_PRINTF(ATH_DEBUG_ERR, ("Invalid Target Type\n"));
30295c89
VM
958 return;
959 }
97d23545 960 printk(KERN_DEBUG "MAC from EEPROM %pM\n", ptr_mac);
30295c89
VM
961
962 /* create a random MAC in case we cannot read file from system */
963 ptr_mac[0] = 0;
964 ptr_mac[1] = 0x03;
965 ptr_mac[2] = 0x7F;
966 ptr_mac[3] = random32() & 0xff;
967 ptr_mac[4] = random32() & 0xff;
968 ptr_mac[5] = random32() & 0xff;
969 if ((A_REQUEST_FIRMWARE(&softmac_entry, "softmac", ((struct device *)ar->osDevInfo.pOSDevice))) == 0)
970 {
4c42080f 971 char *macbuf = A_MALLOC_NOWAIT(softmac_entry->size+1);
30295c89
VM
972 if (macbuf) {
973 unsigned int softmac[6];
974 memcpy(macbuf, softmac_entry->data, softmac_entry->size);
975 macbuf[softmac_entry->size] = '\0';
976 if (sscanf(macbuf, "%02x:%02x:%02x:%02x:%02x:%02x",
977 &softmac[0], &softmac[1], &softmac[2],
978 &softmac[3], &softmac[4], &softmac[5])==6) {
979 int i;
980 for (i=0; i<6; ++i) {
981 ptr_mac[i] = softmac[i] & 0xff;
982 }
983 source = "softmac file";
984 }
985 A_FREE(macbuf);
986 }
987 A_RELEASE_FIRMWARE(softmac_entry);
988 }
97d23545 989 printk(KERN_DEBUG "MAC from %s %pM\n", source, ptr_mac);
30295c89
VM
990 calculate_crc(ar->arTargetType, eeprom_data);
991}
992#endif /* SOFTMAC_FILE_USED */
993
1f4c34bd 994static int
a71f0bf6 995ar6000_transfer_bin_file(struct ar6_softc *ar, AR6K_BIN_FILE file, u32 address, bool compressed)
30295c89 996{
1f4c34bd 997 int status;
30295c89
VM
998 const char *filename;
999 const struct firmware *fw_entry;
e1ce2a3a 1000 u32 fw_entry_size;
30295c89
VM
1001
1002 switch (file) {
1003 case AR6K_OTP_FILE:
1004 if (ar->arVersion.target_ver == AR6003_REV1_VERSION) {
1005 filename = AR6003_REV1_OTP_FILE;
1006 } else if (ar->arVersion.target_ver == AR6003_REV2_VERSION) {
1007 filename = AR6003_REV2_OTP_FILE;
1008 } else {
1009 AR_DEBUG_PRINTF(ATH_DEBUG_ERR, ("Unknown firmware revision: %d\n", ar->arVersion.target_ver));
1010 return A_ERROR;
1011 }
1012 break;
1013
1014 case AR6K_FIRMWARE_FILE:
1015 if (ar->arVersion.target_ver == AR6003_REV1_VERSION) {
1016 filename = AR6003_REV1_FIRMWARE_FILE;
1017 } else if (ar->arVersion.target_ver == AR6003_REV2_VERSION) {
1018 filename = AR6003_REV2_FIRMWARE_FILE;
1019 } else {
1020 AR_DEBUG_PRINTF(ATH_DEBUG_ERR, ("Unknown firmware revision: %d\n", ar->arVersion.target_ver));
1021 return A_ERROR;
1022 }
1023
1024 if (eppingtest) {
f192c2bd 1025 bypasswmi = true;
30295c89
VM
1026 if (ar->arVersion.target_ver == AR6003_REV1_VERSION) {
1027 filename = AR6003_REV1_EPPING_FIRMWARE_FILE;
1028 } else if (ar->arVersion.target_ver == AR6003_REV2_VERSION) {
1029 filename = AR6003_REV2_EPPING_FIRMWARE_FILE;
1030 } else {
1031 AR_DEBUG_PRINTF(ATH_DEBUG_ERR, ("eppingtest : unsupported firmware revision: %d\n",
1032 ar->arVersion.target_ver));
1033 return A_ERROR;
1034 }
1071a134 1035 compressed = false;
30295c89
VM
1036 }
1037
1038#ifdef CONFIG_HOST_TCMD_SUPPORT
1039 if(testmode) {
1040 if (ar->arVersion.target_ver == AR6003_REV1_VERSION) {
1041 filename = AR6003_REV1_TCMD_FIRMWARE_FILE;
1042 } else if (ar->arVersion.target_ver == AR6003_REV2_VERSION) {
1043 filename = AR6003_REV2_TCMD_FIRMWARE_FILE;
1044 } else {
1045 AR_DEBUG_PRINTF(ATH_DEBUG_ERR, ("Unknown firmware revision: %d\n", ar->arVersion.target_ver));
1046 return A_ERROR;
1047 }
1071a134 1048 compressed = false;
30295c89
VM
1049 }
1050#endif
1051#ifdef HTC_RAW_INTERFACE
1052 if (!eppingtest && bypasswmi) {
1053 if (ar->arVersion.target_ver == AR6003_REV1_VERSION) {
1054 filename = AR6003_REV1_ART_FIRMWARE_FILE;
1055 } else if (ar->arVersion.target_ver == AR6003_REV2_VERSION) {
1056 filename = AR6003_REV2_ART_FIRMWARE_FILE;
1057 } else {
1058 AR_DEBUG_PRINTF(ATH_DEBUG_ERR, ("Unknown firmware revision: %d\n", ar->arVersion.target_ver));
1059 return A_ERROR;
1060 }
1071a134 1061 compressed = false;
30295c89
VM
1062 }
1063#endif
1064 break;
1065
1066 case AR6K_PATCH_FILE:
1067 if (ar->arVersion.target_ver == AR6003_REV1_VERSION) {
1068 filename = AR6003_REV1_PATCH_FILE;
1069 } else if (ar->arVersion.target_ver == AR6003_REV2_VERSION) {
1070 filename = AR6003_REV2_PATCH_FILE;
1071 } else {
1072 AR_DEBUG_PRINTF(ATH_DEBUG_ERR, ("Unknown firmware revision: %d\n", ar->arVersion.target_ver));
1073 return A_ERROR;
1074 }
1075 break;
1076
1077 case AR6K_BOARD_DATA_FILE:
1078 if (ar->arVersion.target_ver == AR6003_REV1_VERSION) {
1079 filename = AR6003_REV1_BOARD_DATA_FILE;
1080 } else if (ar->arVersion.target_ver == AR6003_REV2_VERSION) {
1081 filename = AR6003_REV2_BOARD_DATA_FILE;
1082 } else {
1083 AR_DEBUG_PRINTF(ATH_DEBUG_ERR, ("Unknown firmware revision: %d\n", ar->arVersion.target_ver));
1084 return A_ERROR;
1085 }
1086 break;
1087
1088 default:
1089 AR_DEBUG_PRINTF(ATH_DEBUG_ERR, ("Unknown file type: %d\n", file));
1090 return A_ERROR;
1091 }
1092 if ((A_REQUEST_FIRMWARE(&fw_entry, filename, ((struct device *)ar->osDevInfo.pOSDevice))) != 0)
1093 {
1094 AR_DEBUG_PRINTF(ATH_DEBUG_ERR, ("Failed to get %s\n", filename));
1095 return A_ENOENT;
1096 }
1097
1098#ifdef SOFTMAC_FILE_USED
1099 if (file==AR6K_BOARD_DATA_FILE && fw_entry->data) {
d8cb316f 1100 ar6000_softmac_update(ar, (u8 *)fw_entry->data, fw_entry->size);
30295c89
VM
1101 }
1102#endif
1103
1104
1105 fw_entry_size = fw_entry->size;
1106
1107 /* Load extended board data for AR6003 */
1108 if ((file==AR6K_BOARD_DATA_FILE) && (fw_entry->data)) {
e1ce2a3a
JP
1109 u32 board_ext_address;
1110 u32 board_ext_data_size;
1111 u32 board_data_size;
30295c89
VM
1112
1113 board_ext_data_size = (((ar)->arTargetType == TARGET_TYPE_AR6002) ? AR6002_BOARD_EXT_DATA_SZ : \
1114 (((ar)->arTargetType == TARGET_TYPE_AR6003) ? AR6003_BOARD_EXT_DATA_SZ : 0));
1115
1116 board_data_size = (((ar)->arTargetType == TARGET_TYPE_AR6002) ? AR6002_BOARD_DATA_SZ : \
1117 (((ar)->arTargetType == TARGET_TYPE_AR6003) ? AR6003_BOARD_DATA_SZ : 0));
1118
1119 /* Determine where in Target RAM to write Board Data */
d8cb316f 1120 bmifn(BMIReadMemory(ar->arHifDevice, HOST_INTEREST_ITEM_ADDRESS(ar, hi_board_ext_data), (u8 *)&board_ext_address, 4));
30295c89
VM
1121 AR_DEBUG_PRINTF(ATH_DEBUG_INFO, ("Board extended Data download address: 0x%x\n", board_ext_address));
1122
1123 /* check whether the target has allocated memory for extended board data and file contains extended board data */
1124 if ((board_ext_address) && (fw_entry->size == (board_data_size + board_ext_data_size))) {
e1ce2a3a 1125 u32 param;
30295c89 1126
d8cb316f 1127 status = BMIWriteMemory(ar->arHifDevice, board_ext_address, (u8 *)(fw_entry->data + board_data_size), board_ext_data_size);
30295c89 1128
a1d46529 1129 if (status) {
30295c89
VM
1130 AR_DEBUG_PRINTF(ATH_DEBUG_ERR, ("BMI operation failed: %d\n", __LINE__));
1131 A_RELEASE_FIRMWARE(fw_entry);
1132 return A_ERROR;
1133 }
1134
1135 /* Record the fact that extended board Data IS initialized */
1136 param = 1;
d8cb316f 1137 bmifn(BMIWriteMemory(ar->arHifDevice, HOST_INTEREST_ITEM_ADDRESS(ar, hi_board_ext_data_initialized), (u8 *)&param, 4));
30295c89
VM
1138 }
1139 fw_entry_size = board_data_size;
1140 }
1141
1142 if (compressed) {
d8cb316f 1143 status = BMIFastDownload(ar->arHifDevice, address, (u8 *)fw_entry->data, fw_entry_size);
30295c89 1144 } else {
d8cb316f 1145 status = BMIWriteMemory(ar->arHifDevice, address, (u8 *)fw_entry->data, fw_entry_size);
30295c89
VM
1146 }
1147
a1d46529 1148 if (status) {
30295c89
VM
1149 AR_DEBUG_PRINTF(ATH_DEBUG_ERR, ("BMI operation failed: %d\n", __LINE__));
1150 A_RELEASE_FIRMWARE(fw_entry);
1151 return A_ERROR;
1152 }
1153 A_RELEASE_FIRMWARE(fw_entry);
4f69cef0 1154 return 0;
30295c89
VM
1155}
1156#endif /* INIT_MODE_DRV_ENABLED */
1157
1f4c34bd 1158int
a71f0bf6 1159ar6000_update_bdaddr(struct ar6_softc *ar)
30295c89
VM
1160{
1161
1162 if (setupbtdev != 0) {
e1ce2a3a 1163 u32 address;
30295c89
VM
1164
1165 if (BMIReadMemory(ar->arHifDevice,
d8cb316f 1166 HOST_INTEREST_ITEM_ADDRESS(ar, hi_board_data), (u8 *)&address, 4) != 0)
30295c89
VM
1167 {
1168 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,("BMIReadMemory for hi_board_data failed\n"));
1169 return A_ERROR;
1170 }
1171
d8cb316f 1172 if (BMIReadMemory(ar->arHifDevice, address + BDATA_BDADDR_OFFSET, (u8 *)ar->bdaddr, 6) != 0)
30295c89
VM
1173 {
1174 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,("BMIReadMemory for BD address failed\n"));
1175 return A_ERROR;
1176 }
1177 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,("BDADDR 0x%x:0x%x:0x%x:0x%x:0x%x:0x%x\n", ar->bdaddr[0],
1178 ar->bdaddr[1], ar->bdaddr[2], ar->bdaddr[3],
1179 ar->bdaddr[4], ar->bdaddr[5]));
1180 }
1181
4f69cef0 1182return 0;
30295c89
VM
1183}
1184
1f4c34bd 1185int
a71f0bf6 1186ar6000_sysfs_bmi_get_config(struct ar6_softc *ar, u32 mode)
30295c89
VM
1187{
1188 AR_DEBUG_PRINTF(ATH_DEBUG_INFO,("BMI: Requesting device specific configuration\n"));
1189
1190 if (mode == WLAN_INIT_MODE_UDEV) {
4c42080f 1191 char version[16];
30295c89
VM
1192 const struct firmware *fw_entry;
1193
1194 /* Get config using udev through a script in user space */
1195 sprintf(version, "%2.2x", ar->arVersion.target_ver);
1196 if ((A_REQUEST_FIRMWARE(&fw_entry, version, ((struct device *)ar->osDevInfo.pOSDevice))) != 0)
1197 {
1198 AR_DEBUG_PRINTF(ATH_DEBUG_ERR, ("BMI: Failure to get configuration for target version: %s\n", version));
1199 return A_ERROR;
1200 }
1201
1202 A_RELEASE_FIRMWARE(fw_entry);
1203#ifdef INIT_MODE_DRV_ENABLED
1204 } else {
1205 /* The config is contained within the driver itself */
1f4c34bd 1206 int status;
e1ce2a3a 1207 u32 param, options, sleep, address;
30295c89
VM
1208
1209 /* Temporarily disable system sleep */
1210 address = MBOX_BASE_ADDRESS + LOCAL_SCRATCH_ADDRESS;
1211 bmifn(BMIReadSOCRegister(ar->arHifDevice, address, &param));
1212 options = param;
1213 param |= AR6K_OPTION_SLEEP_DISABLE;
1214 bmifn(BMIWriteSOCRegister(ar->arHifDevice, address, param));
1215
1216 address = RTC_BASE_ADDRESS + SYSTEM_SLEEP_ADDRESS;
1217 bmifn(BMIReadSOCRegister(ar->arHifDevice, address, &param));
1218 sleep = param;
1219 param |= WLAN_SYSTEM_SLEEP_DISABLE_SET(1);
1220 bmifn(BMIWriteSOCRegister(ar->arHifDevice, address, param));
1221 AR_DEBUG_PRINTF(ATH_DEBUG_INFO, ("old options: %d, old sleep: %d\n", options, sleep));
1222
1223 if (ar->arTargetType == TARGET_TYPE_AR6003) {
1224 /* Program analog PLL register */
1225 bmifn(BMIWriteSOCRegister(ar->arHifDevice, ANALOG_INTF_BASE_ADDRESS + 0x284, 0xF9104001));
1226 /* Run at 80/88MHz by default */
1227 param = CPU_CLOCK_STANDARD_SET(1);
1228 } else {
1229 /* Run at 40/44MHz by default */
1230 param = CPU_CLOCK_STANDARD_SET(0);
1231 }
1232 address = RTC_BASE_ADDRESS + CPU_CLOCK_ADDRESS;
1233 bmifn(BMIWriteSOCRegister(ar->arHifDevice, address, param));
1234
1235 param = 0;
1236 if (ar->arTargetType == TARGET_TYPE_AR6002) {
d8cb316f 1237 bmifn(BMIReadMemory(ar->arHifDevice, HOST_INTEREST_ITEM_ADDRESS(ar, hi_ext_clk_detected), (u8 *)&param, 4));
30295c89
VM
1238 }
1239
1240 /* LPO_CAL.ENABLE = 1 if no external clk is detected */
1241 if (param != 1) {
1242 address = RTC_BASE_ADDRESS + LPO_CAL_ADDRESS;
1243 param = LPO_CAL_ENABLE_SET(1);
1244 bmifn(BMIWriteSOCRegister(ar->arHifDevice, address, param));
1245 }
1246
1247 /* Venus2.0: Lower SDIO pad drive strength,
1248 * temporary WAR to avoid SDIO CRC error */
1249 if (ar->arVersion.target_ver == AR6003_REV2_VERSION) {
1250 AR_DEBUG_PRINTF(ATH_DEBUG_ERR, ("AR6K: Temporary WAR to avoid SDIO CRC error\n"));
1251 param = 0x20;
1252 address = GPIO_BASE_ADDRESS + GPIO_PIN10_ADDRESS;
1253 bmifn(BMIWriteSOCRegister(ar->arHifDevice, address, param));
1254
1255 address = GPIO_BASE_ADDRESS + GPIO_PIN11_ADDRESS;
1256 bmifn(BMIWriteSOCRegister(ar->arHifDevice, address, param));
1257
1258 address = GPIO_BASE_ADDRESS + GPIO_PIN12_ADDRESS;
1259 bmifn(BMIWriteSOCRegister(ar->arHifDevice, address, param));
1260
1261 address = GPIO_BASE_ADDRESS + GPIO_PIN13_ADDRESS;
1262 bmifn(BMIWriteSOCRegister(ar->arHifDevice, address, param));
1263 }
1264
1265#ifdef FORCE_INTERNAL_CLOCK
1266 /* Ignore external clock, if any, and force use of internal clock */
1267 if (ar->arTargetType == TARGET_TYPE_AR6003) {
1268 /* hi_ext_clk_detected = 0 */
1269 param = 0;
d8cb316f 1270 bmifn(BMIWriteMemory(ar->arHifDevice, HOST_INTEREST_ITEM_ADDRESS(ar, hi_ext_clk_detected), (u8 *)&param, 4));
30295c89
VM
1271
1272 /* CLOCK_CONTROL &= ~LF_CLK32 */
1273 address = RTC_BASE_ADDRESS + CLOCK_CONTROL_ADDRESS;
1274 bmifn(BMIReadSOCRegister(ar->arHifDevice, address, &param));
1275 param &= (~CLOCK_CONTROL_LF_CLK32_SET(1));
1276 bmifn(BMIWriteSOCRegister(ar->arHifDevice, address, param));
1277 }
1278#endif /* FORCE_INTERNAL_CLOCK */
1279
1280 /* Transfer Board Data from Target EEPROM to Target RAM */
1281 if (ar->arTargetType == TARGET_TYPE_AR6003) {
1282 /* Determine where in Target RAM to write Board Data */
d8cb316f 1283 bmifn(BMIReadMemory(ar->arHifDevice, HOST_INTEREST_ITEM_ADDRESS(ar, hi_board_data), (u8 *)&address, 4));
30295c89
VM
1284 AR_DEBUG_PRINTF(ATH_DEBUG_INFO, ("Board Data download address: 0x%x\n", address));
1285
1286 /* Write EEPROM data to Target RAM */
4f69cef0 1287 if ((ar6000_transfer_bin_file(ar, AR6K_BOARD_DATA_FILE, address, false)) != 0) {
30295c89
VM
1288 return A_ERROR;
1289 }
1290
1291 /* Record the fact that Board Data IS initialized */
1292 param = 1;
d8cb316f 1293 bmifn(BMIWriteMemory(ar->arHifDevice, HOST_INTEREST_ITEM_ADDRESS(ar, hi_board_data_initialized), (u8 *)&param, 4));
30295c89
VM
1294
1295 /* Transfer One time Programmable data */
1296 AR6K_DATA_DOWNLOAD_ADDRESS(address, ar->arVersion.target_ver);
1071a134 1297 status = ar6000_transfer_bin_file(ar, AR6K_OTP_FILE, address, true);
4f69cef0 1298 if (status == 0) {
30295c89
VM
1299 /* Execute the OTP code */
1300 param = 0;
1301 AR6K_APP_START_OVERRIDE_ADDRESS(address, ar->arVersion.target_ver);
1302 bmifn(BMIExecute(ar->arHifDevice, address, &param));
1303 } else if (status != A_ENOENT) {
1304 return A_ERROR;
1305 }
1306 } else {
1307 AR_DEBUG_PRINTF(ATH_DEBUG_ERR, ("Programming of board data for chip %d not supported\n", ar->arTargetType));
1308 return A_ERROR;
1309 }
1310
1311 /* Download Target firmware */
1312 AR6K_DATA_DOWNLOAD_ADDRESS(address, ar->arVersion.target_ver);
4f69cef0 1313 if ((ar6000_transfer_bin_file(ar, AR6K_FIRMWARE_FILE, address, true)) != 0) {
30295c89
VM
1314 return A_ERROR;
1315 }
1316
1317 /* Set starting address for firmware */
1318 AR6K_APP_START_OVERRIDE_ADDRESS(address, ar->arVersion.target_ver);
1319 bmifn(BMISetAppStart(ar->arHifDevice, address));
1320
1321 /* Apply the patches */
1322 AR6K_PATCH_DOWNLOAD_ADDRESS(address, ar->arVersion.target_ver);
4f69cef0 1323 if ((ar6000_transfer_bin_file(ar, AR6K_PATCH_FILE, address, false)) != 0) {
30295c89
VM
1324 return A_ERROR;
1325 }
1326
1327 param = address;
d8cb316f 1328 bmifn(BMIWriteMemory(ar->arHifDevice, HOST_INTEREST_ITEM_ADDRESS(ar, hi_dset_list_head), (u8 *)&param, 4));
30295c89
VM
1329
1330 if (ar->arTargetType == TARGET_TYPE_AR6003) {
1331 if (ar->arVersion.target_ver == AR6003_REV1_VERSION) {
1332 /* Reserve 5.5K of RAM */
1333 param = 5632;
1334 } else { /* AR6003_REV2_VERSION */
1335 /* Reserve 6.5K of RAM */
1336 param = 6656;
1337 }
d8cb316f 1338 bmifn(BMIWriteMemory(ar->arHifDevice, HOST_INTEREST_ITEM_ADDRESS(ar, hi_end_RAM_reserve_sz), (u8 *)&param, 4));
30295c89
VM
1339 }
1340
1341 /* Restore system sleep */
1342 address = RTC_BASE_ADDRESS + SYSTEM_SLEEP_ADDRESS;
1343 bmifn(BMIWriteSOCRegister(ar->arHifDevice, address, sleep));
1344
1345 address = MBOX_BASE_ADDRESS + LOCAL_SCRATCH_ADDRESS;
1346 param = options | 0x20;
1347 bmifn(BMIWriteSOCRegister(ar->arHifDevice, address, param));
1348
1349 if (ar->arTargetType == TARGET_TYPE_AR6003) {
1350 /* Configure GPIO AR6003 UART */
1351#ifndef CONFIG_AR600x_DEBUG_UART_TX_PIN
1352#define CONFIG_AR600x_DEBUG_UART_TX_PIN 8
1353#endif
1354 param = CONFIG_AR600x_DEBUG_UART_TX_PIN;
d8cb316f 1355 bmifn(BMIWriteMemory(ar->arHifDevice, HOST_INTEREST_ITEM_ADDRESS(ar, hi_dbg_uart_txpin), (u8 *)&param, 4));
30295c89
VM
1356
1357#if (CONFIG_AR600x_DEBUG_UART_TX_PIN == 23)
1358 {
1359 address = GPIO_BASE_ADDRESS + CLOCK_GPIO_ADDRESS;
1360 bmifn(BMIReadSOCRegister(ar->arHifDevice, address, &param));
1361 param |= CLOCK_GPIO_BT_CLK_OUT_EN_SET(1);
1362 bmifn(BMIWriteSOCRegister(ar->arHifDevice, address, param));
1363 }
1364#endif
1365
1366 /* Configure GPIO for BT Reset */
1367#ifdef ATH6KL_CONFIG_GPIO_BT_RESET
1368#define CONFIG_AR600x_BT_RESET_PIN 0x16
1369 param = CONFIG_AR600x_BT_RESET_PIN;
d8cb316f 1370 bmifn(BMIWriteMemory(ar->arHifDevice, HOST_INTEREST_ITEM_ADDRESS(ar, hi_hci_uart_support_pins), (u8 *)&param, 4));
30295c89
VM
1371#endif /* ATH6KL_CONFIG_GPIO_BT_RESET */
1372
1373 /* Configure UART flow control polarity */
1374#ifndef CONFIG_ATH6KL_BT_UART_FC_POLARITY
1375#define CONFIG_ATH6KL_BT_UART_FC_POLARITY 0
1376#endif
1377
1378#if (CONFIG_ATH6KL_BT_UART_FC_POLARITY == 1)
1379 if (ar->arVersion.target_ver == AR6003_REV2_VERSION) {
1380 param = ((CONFIG_ATH6KL_BT_UART_FC_POLARITY << 1) & 0x2);
d8cb316f 1381 bmifn(BMIWriteMemory(ar->arHifDevice, HOST_INTEREST_ITEM_ADDRESS(ar, hi_hci_uart_pwr_mgmt_params), (u8 *)&param, 4));
30295c89
VM
1382 }
1383#endif /* CONFIG_ATH6KL_BT_UART_FC_POLARITY */
1384 }
1385
1386#ifdef HTC_RAW_INTERFACE
1387 if (!eppingtest && bypasswmi) {
1388 /* Don't run BMIDone for ART mode and force resetok=0 */
1389 resetok = 0;
1390 msleep(1000);
1391 }
1392#endif /* HTC_RAW_INTERFACE */
1393
1394#endif /* INIT_MODE_DRV_ENABLED */
1395 }
1396
4f69cef0 1397 return 0;
30295c89
VM
1398}
1399
1f4c34bd 1400int
a71f0bf6 1401ar6000_configure_target(struct ar6_softc *ar)
30295c89 1402{
e1ce2a3a 1403 u32 param;
30295c89
VM
1404 if (enableuartprint) {
1405 param = 1;
1406 if (BMIWriteMemory(ar->arHifDevice,
1407 HOST_INTEREST_ITEM_ADDRESS(ar, hi_serial_enable),
d8cb316f 1408 (u8 *)&param,
4f69cef0 1409 4)!= 0)
30295c89
VM
1410 {
1411 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,("BMIWriteMemory for enableuartprint failed \n"));
1412 return A_ERROR;
1413 }
1414 AR_DEBUG_PRINTF(ATH_DEBUG_INFO,("Serial console prints enabled\n"));
1415 }
1416
1417 /* Tell target which HTC version it is used*/
1418 param = HTC_PROTOCOL_VERSION;
1419 if (BMIWriteMemory(ar->arHifDevice,
1420 HOST_INTEREST_ITEM_ADDRESS(ar, hi_app_host_interest),
d8cb316f 1421 (u8 *)&param,
4f69cef0 1422 4)!= 0)
30295c89
VM
1423 {
1424 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,("BMIWriteMemory for htc version failed \n"));
1425 return A_ERROR;
1426 }
1427
1428#ifdef CONFIG_HOST_TCMD_SUPPORT
1429 if(testmode) {
1430 ar->arTargetMode = AR6000_TCMD_MODE;
1431 }else {
1432 ar->arTargetMode = AR6000_WLAN_MODE;
1433 }
1434#endif
1435 if (enabletimerwar) {
e1ce2a3a 1436 u32 param;
30295c89
VM
1437
1438 if (BMIReadMemory(ar->arHifDevice,
1439 HOST_INTEREST_ITEM_ADDRESS(ar, hi_option_flag),
d8cb316f 1440 (u8 *)&param,
4f69cef0 1441 4)!= 0)
30295c89
VM
1442 {
1443 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,("BMIReadMemory for enabletimerwar failed \n"));
1444 return A_ERROR;
1445 }
1446
1447 param |= HI_OPTION_TIMER_WAR;
1448
1449 if (BMIWriteMemory(ar->arHifDevice,
1450 HOST_INTEREST_ITEM_ADDRESS(ar, hi_option_flag),
d8cb316f 1451 (u8 *)&param,
4f69cef0 1452 4) != 0)
30295c89
VM
1453 {
1454 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,("BMIWriteMemory for enabletimerwar failed \n"));
1455 return A_ERROR;
1456 }
1457 AR_DEBUG_PRINTF(ATH_DEBUG_INFO,("Timer WAR enabled\n"));
1458 }
1459
1460 /* set the firmware mode to STA/IBSS/AP */
1461 {
e1ce2a3a 1462 u32 param;
30295c89
VM
1463
1464 if (BMIReadMemory(ar->arHifDevice,
1465 HOST_INTEREST_ITEM_ADDRESS(ar, hi_option_flag),
d8cb316f 1466 (u8 *)&param,
4f69cef0 1467 4)!= 0)
30295c89
VM
1468 {
1469 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,("BMIReadMemory for setting fwmode failed \n"));
1470 return A_ERROR;
1471 }
1472
1473 param |= (fwmode << HI_OPTION_FW_MODE_SHIFT);
1474
1475 if (BMIWriteMemory(ar->arHifDevice,
1476 HOST_INTEREST_ITEM_ADDRESS(ar, hi_option_flag),
d8cb316f 1477 (u8 *)&param,
4f69cef0 1478 4) != 0)
30295c89
VM
1479 {
1480 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,("BMIWriteMemory for setting fwmode failed \n"));
1481 return A_ERROR;
1482 }
1483 AR_DEBUG_PRINTF(ATH_DEBUG_INFO,("Firmware mode set\n"));
1484 }
1485
1486#ifdef ATH6KL_DISABLE_TARGET_DBGLOGS
1487 {
e1ce2a3a 1488 u32 param;
30295c89
VM
1489
1490 if (BMIReadMemory(ar->arHifDevice,
1491 HOST_INTEREST_ITEM_ADDRESS(ar, hi_option_flag),
d8cb316f 1492 (u8 *)&param,
4f69cef0 1493 4)!= 0)
30295c89
VM
1494 {
1495 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,("BMIReadMemory for disabling debug logs failed\n"));
1496 return A_ERROR;
1497 }
1498
1499 param |= HI_OPTION_DISABLE_DBGLOG;
1500
1501 if (BMIWriteMemory(ar->arHifDevice,
1502 HOST_INTEREST_ITEM_ADDRESS(ar, hi_option_flag),
d8cb316f 1503 (u8 *)&param,
4f69cef0 1504 4) != 0)
30295c89
VM
1505 {
1506 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,("BMIWriteMemory for HI_OPTION_DISABLE_DBGLOG\n"));
1507 return A_ERROR;
1508 }
1509 AR_DEBUG_PRINTF(ATH_DEBUG_INFO,("Firmware mode set\n"));
1510 }
1511#endif /* ATH6KL_DISABLE_TARGET_DBGLOGS */
1512
1513 /*
1514 * Hardcode the address use for the extended board data
1515 * Ideally this should be pre-allocate by the OS at boot time
1516 * But since it is a new feature and board data is loaded
1517 * at init time, we have to workaround this from host.
1518 * It is difficult to patch the firmware boot code,
1519 * but possible in theory.
1520 */
1521 if (ar->arTargetType == TARGET_TYPE_AR6003) {
1522 param = AR6003_BOARD_EXT_DATA_ADDRESS;
1523 if (BMIWriteMemory(ar->arHifDevice,
1524 HOST_INTEREST_ITEM_ADDRESS(ar, hi_board_ext_data),
d8cb316f 1525 (u8 *)&param,
4f69cef0 1526 4) != 0)
30295c89
VM
1527 {
1528 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,("BMIWriteMemory for hi_board_ext_data failed \n"));
1529 return A_ERROR;
1530 }
1531 }
1532
1533
1534 /* since BMIInit is called in the driver layer, we have to set the block
1535 * size here for the target */
1536
391bb211
JP
1537 if (ar6000_set_htc_params(ar->arHifDevice, ar->arTargetType,
1538 mbox_yield_limit, 0)) {
1539 /* use default number of control buffers */
30295c89
VM
1540 return A_ERROR;
1541 }
1542
1543 if (setupbtdev != 0) {
391bb211
JP
1544 if (ar6000_set_hci_bridge_flags(ar->arHifDevice,
1545 ar->arTargetType,
1546 setupbtdev)) {
30295c89
VM
1547 return A_ERROR;
1548 }
1549 }
4f69cef0 1550 return 0;
30295c89
VM
1551}
1552
1553static void
1554init_netdev(struct net_device *dev, char *name)
1555{
1556 dev->netdev_ops = &ar6000_netdev_ops;
1557 dev->watchdog_timeo = AR6000_TX_TIMEOUT;
1558 dev->wireless_handlers = &ath_iw_handler_def;
1559
1560 ath_iw_handler_def.get_wireless_stats = ar6000_get_iwstats; /*Displayed via proc fs */
1561
1562 /*
1563 * We need the OS to provide us with more headroom in order to
1564 * perform dix to 802.3, WMI header encap, and the HTC header
1565 */
1566 if (processDot11Hdr) {
1567 dev->hard_header_len = sizeof(struct ieee80211_qosframe) + sizeof(ATH_LLC_SNAP_HDR) + sizeof(WMI_DATA_HDR) + HTC_HEADER_LEN + WMI_MAX_TX_META_SZ + LINUX_HACK_FUDGE_FACTOR;
1568 } else {
1569 dev->hard_header_len = ETH_HLEN + sizeof(ATH_LLC_SNAP_HDR) +
1570 sizeof(WMI_DATA_HDR) + HTC_HEADER_LEN + WMI_MAX_TX_META_SZ + LINUX_HACK_FUDGE_FACTOR;
1571 }
1572
1573 if (name[0])
1574 {
1575 strcpy(dev->name, name);
1576 }
1577
1578#ifdef SET_MODULE_OWNER
1579 SET_MODULE_OWNER(dev);
1580#endif
1581
1582#ifdef CONFIG_CHECKSUM_OFFLOAD
1583 if(csumOffload){
1584 dev->features |= NETIF_F_IP_CSUM; /*advertise kernel capability to do TCP/UDP CSUM offload for IPV4*/
1585 }
1586#endif
1587
1588 return;
1589}
1590
1591/*
1592 * HTC Event handlers
1593 */
1f4c34bd 1594static int
30295c89
VM
1595ar6000_avail_ev(void *context, void *hif_handle)
1596{
1597 int i;
1598 struct net_device *dev;
1599 void *ar_netif;
a71f0bf6 1600 struct ar6_softc *ar;
30295c89 1601 int device_index = 0;
4f0cce96 1602 struct htc_init_info htcInfo;
30295c89
VM
1603#ifdef ATH6K_CONFIG_CFG80211
1604 struct wireless_dev *wdev;
1605#endif /* ATH6K_CONFIG_CFG80211 */
4f69cef0 1606 int init_status = 0;
e6b5260e 1607 struct hif_device_os_device_info osDevInfo;
da101d56
VM
1608
1609 memset(&osDevInfo, 0, sizeof(osDevInfo));
1610 if (HIFConfigureDevice(hif_handle, HIF_DEVICE_GET_OS_DEVICE,
1611 &osDevInfo, sizeof(osDevInfo))) {
1612 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,("%s: Failed to get OS device instance\n", __func__));
1613 return A_ERROR;
1614 }
30295c89
VM
1615
1616 AR_DEBUG_PRINTF(ATH_DEBUG_INFO,("ar6000_available\n"));
1617
1618 for (i=0; i < MAX_AR6000; i++) {
1619 if (ar6000_devices[i] == NULL) {
1620 break;
1621 }
1622 }
1623
1624 if (i == MAX_AR6000) {
1625 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,("ar6000_available: max devices reached\n"));
1626 return A_ERROR;
1627 }
1628
1629 /* Save this. It gives a bit better readability especially since */
1630 /* we use another local "i" variable below. */
1631 device_index = i;
1632
1633#ifdef ATH6K_CONFIG_CFG80211
da101d56 1634 wdev = ar6k_cfg80211_init(osDevInfo.pOSDevice);
30295c89
VM
1635 if (IS_ERR(wdev)) {
1636 AR_DEBUG_PRINTF(ATH_DEBUG_ERR, ("%s: ar6k_cfg80211_init failed\n", __func__));
1637 return A_ERROR;
1638 }
1639 ar_netif = wdev_priv(wdev);
1640#else
a71f0bf6 1641 dev = alloc_etherdev(sizeof(struct ar6_softc));
30295c89
VM
1642 if (dev == NULL) {
1643 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,("ar6000_available: can't alloc etherdev\n"));
1644 return A_ERROR;
1645 }
1646 ether_setup(dev);
1647 ar_netif = ar6k_priv(dev);
1648#endif /* ATH6K_CONFIG_CFG80211 */
1649
1650 if (ar_netif == NULL) {
1651 AR_DEBUG_PRINTF(ATH_DEBUG_ERR, ("%s: Can't allocate ar6k priv memory\n", __func__));
1652 return A_ERROR;
1653 }
1654
a71f0bf6
LR
1655 A_MEMZERO(ar_netif, sizeof(struct ar6_softc));
1656 ar = (struct ar6_softc *)ar_netif;
30295c89
VM
1657
1658#ifdef ATH6K_CONFIG_CFG80211
1659 ar->wdev = wdev;
1660 wdev->iftype = NL80211_IFTYPE_STATION;
1661
1662 dev = alloc_netdev_mq(0, "wlan%d", ether_setup, 1);
1663 if (!dev) {
1664 printk(KERN_CRIT "AR6K: no memory for network device instance\n");
1665 ar6k_cfg80211_deinit(ar);
1666 return A_ERROR;
1667 }
1668
1669 dev->ieee80211_ptr = wdev;
1670 SET_NETDEV_DEV(dev, wiphy_dev(wdev->wiphy));
1671 wdev->netdev = dev;
1672 ar->arNetworkType = INFRA_NETWORK;
98b6d238 1673 ar->smeState = SME_DISCONNECTED;
30295c89
VM
1674#endif /* ATH6K_CONFIG_CFG80211 */
1675
1676 init_netdev(dev, ifname);
1677
1678#ifdef SET_NETDEV_DEV
1679 if (ar_netif) {
da101d56 1680 SET_NETDEV_DEV(dev, osDevInfo.pOSDevice);
30295c89
VM
1681 }
1682#endif
1683
1684 ar->arNetDev = dev;
1685 ar->arHifDevice = hif_handle;
1686 ar->arWlanState = WLAN_ENABLED;
1687 ar->arDeviceIndex = device_index;
1688
1689 ar->arWlanPowerState = WLAN_POWER_STATE_ON;
1071a134 1690 ar->arWlanOff = false; /* We are in ON state */
30295c89
VM
1691#ifdef CONFIG_PM
1692 ar->arWowState = WLAN_WOW_STATE_NONE;
1071a134 1693 ar->arBTOff = true; /* BT chip assumed to be OFF */
30295c89
VM
1694 ar->arBTSharing = WLAN_CONFIG_BT_SHARING;
1695 ar->arWlanOffConfig = WLAN_CONFIG_WLAN_OFF;
1696 ar->arSuspendConfig = WLAN_CONFIG_PM_SUSPEND;
1697 ar->arWow2Config = WLAN_CONFIG_PM_WOW2;
1698#endif /* CONFIG_PM */
1699
1700 A_INIT_TIMER(&ar->arHBChallengeResp.timer, ar6000_detect_error, dev);
1701 ar->arHBChallengeResp.seqNum = 0;
1071a134 1702 ar->arHBChallengeResp.outstanding = false;
30295c89
VM
1703 ar->arHBChallengeResp.missCnt = 0;
1704 ar->arHBChallengeResp.frequency = AR6000_HB_CHALLENGE_RESP_FREQ_DEFAULT;
1705 ar->arHBChallengeResp.missThres = AR6000_HB_CHALLENGE_RESP_MISS_THRES_DEFAULT;
1706
1707 ar6000_init_control_info(ar);
1708 init_waitqueue_head(&arEvent);
1709 sema_init(&ar->arSem, 1);
1071a134 1710 ar->bIsDestroyProgress = false;
30295c89
VM
1711
1712 INIT_HTC_PACKET_QUEUE(&ar->amsdu_rx_buffer_queue);
1713
1714#ifdef ADAPTIVE_POWER_THROUGHPUT_CONTROL
1715 A_INIT_TIMER(&aptcTimer, aptcTimerHandler, ar);
1716#endif /* ADAPTIVE_POWER_THROUGHPUT_CONTROL */
1717
1718 A_INIT_TIMER(&ar->disconnect_timer, disconnect_timer_handler, dev);
1719
1720 BMIInit();
1721
1722 if (bmienable) {
1723 ar6000_sysfs_bmi_init(ar);
1724 }
1725
1726 {
1727 struct bmi_target_info targ_info;
1728
4f69cef0 1729 if (BMIGetTargetInfo(ar->arHifDevice, &targ_info) != 0) {
30295c89
VM
1730 init_status = A_ERROR;
1731 goto avail_ev_failed;
1732 }
1733
1734 ar->arVersion.target_ver = targ_info.target_ver;
1735 ar->arTargetType = targ_info.target_type;
1736
1737 /* do any target-specific preparation that can be done through BMI */
1738 if (ar6000_prepare_target(ar->arHifDevice,
1739 targ_info.target_type,
4f69cef0 1740 targ_info.target_ver) != 0) {
30295c89
VM
1741 init_status = A_ERROR;
1742 goto avail_ev_failed;
1743 }
1744
1745 }
1746
4f69cef0 1747 if (ar6000_configure_target(ar) != 0) {
30295c89
VM
1748 init_status = A_ERROR;
1749 goto avail_ev_failed;
1750 }
1751
1752 A_MEMZERO(&htcInfo,sizeof(htcInfo));
1753 htcInfo.pContext = ar;
1754 htcInfo.TargetFailure = ar6000_target_failure;
1755
1756 ar->arHtcTarget = HTCCreate(ar->arHifDevice,&htcInfo);
1757
1758 if (ar->arHtcTarget == NULL) {
1759 init_status = A_ERROR;
1760 goto avail_ev_failed;
1761 }
1762
1763 spin_lock_init(&ar->arLock);
1764
1765#ifdef WAPI_ENABLE
1766 ar->arWapiEnable = 0;
1767#endif
1768
1769
1770#ifdef CONFIG_CHECKSUM_OFFLOAD
1771 if(csumOffload){
1772 /*if external frame work is also needed, change and use an extended rxMetaVerion*/
1773 ar->rxMetaVersion=WMI_META_VERSION_2;
1774 }
1775#endif
1776
1777#ifdef ATH_AR6K_11N_SUPPORT
1778 if((ar->aggr_cntxt = aggr_init(ar6000_alloc_netbufs)) == NULL) {
1779 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,("%s() Failed to initialize aggr.\n", __func__));
1780 init_status = A_ERROR;
1781 goto avail_ev_failed;
1782 }
1783
1784 aggr_register_rx_dispatcher(ar->aggr_cntxt, (void *)dev, ar6000_deliver_frames_to_nw_stack);
1785#endif
1786
1787 HIFClaimDevice(ar->arHifDevice, ar);
1788
1789 /* We only register the device in the global list if we succeed. */
1790 /* If the device is in the global list, it will be destroyed */
1791 /* when the module is unloaded. */
1792 ar6000_devices[device_index] = dev;
1793
1794 /* Don't install the init function if BMI is requested */
1795 if (!bmienable) {
1796 ar6000_netdev_ops.ndo_init = ar6000_init;
1797 } else {
1798 AR_DEBUG_PRINTF(ATH_DEBUG_INFO, ("BMI enabled: %d\n", wlaninitmode));
1799 if ((wlaninitmode == WLAN_INIT_MODE_UDEV) ||
1800 (wlaninitmode == WLAN_INIT_MODE_DRV))
1801 {
4f69cef0 1802 int status = 0;
30295c89 1803 do {
4f69cef0 1804 if ((status = ar6000_sysfs_bmi_get_config(ar, wlaninitmode)) != 0)
30295c89
VM
1805 {
1806 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,("ar6000_avail: ar6000_sysfs_bmi_get_config failed\n"));
1807 break;
1808 }
1809#ifdef HTC_RAW_INTERFACE
caf3fb41
VM
1810 if (!eppingtest && bypasswmi) {
1811 break; /* Don't call ar6000_init for ART */
1812 }
30295c89
VM
1813#endif
1814 rtnl_lock();
4f69cef0 1815 status = (ar6000_init(dev)==0) ? 0 : A_ERROR;
30295c89 1816 rtnl_unlock();
a1d46529 1817 if (status) {
30295c89
VM
1818 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,("ar6000_avail: ar6000_init\n"));
1819 }
1071a134 1820 } while (false);
30295c89 1821
a1d46529 1822 if (status) {
30295c89
VM
1823 init_status = status;
1824 goto avail_ev_failed;
1825 }
1826 }
1827 }
1828
1829 /* This runs the init function if registered */
1830 if (register_netdev(dev)) {
1831 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,("ar6000_avail: register_netdev failed\n"));
1832 ar6000_destroy(dev, 0);
1833 return A_ERROR;
1834 }
1835
1836 is_netdev_registered = 1;
1837
1838#ifdef CONFIG_AP_VIRTUAL_ADAPTER_SUPPORT
1839 arApNetDev = NULL;
1840#endif /* CONFIG_AP_VIRTUAL_ADAPTER_SUPPORT */
1841 AR_DEBUG_PRINTF(ATH_DEBUG_INFO,("ar6000_avail: name=%s hifdevice=0x%lx, dev=0x%lx (%d), ar=0x%lx\n",
1842 dev->name, (unsigned long)ar->arHifDevice, (unsigned long)dev, device_index,
1843 (unsigned long)ar));
1844
1845avail_ev_failed :
391bb211 1846 if (init_status) {
30295c89
VM
1847 if (bmienable) {
1848 ar6000_sysfs_bmi_deinit(ar);
1849 }
1850 }
1851
1852 return init_status;
1853}
1854
1f4c34bd 1855static void ar6000_target_failure(void *Instance, int Status)
30295c89 1856{
a71f0bf6 1857 struct ar6_softc *ar = (struct ar6_softc *)Instance;
30295c89 1858 WMI_TARGET_ERROR_REPORT_EVENT errEvent;
1071a134 1859 static bool sip = false;
30295c89 1860
4f69cef0 1861 if (Status != 0) {
30295c89
VM
1862
1863 printk(KERN_ERR "ar6000_target_failure: target asserted \n");
1864
1865 if (timer_pending(&ar->arHBChallengeResp.timer)) {
1866 A_UNTIMEOUT(&ar->arHBChallengeResp.timer);
1867 }
1868
1869 /* try dumping target assertion information (if any) */
1870 ar6000_dump_target_assert_info(ar->arHifDevice,ar->arTargetType);
1871
1872 /*
1873 * Fetch the logs from the target via the diagnostic
1874 * window.
1875 */
1876 ar6000_dbglog_get_debug_logs(ar);
1877
1878 /* Report the error only once */
1879 if (!sip) {
1071a134 1880 sip = true;
30295c89
VM
1881 errEvent.errorVal = WMI_TARGET_COM_ERR |
1882 WMI_TARGET_FATAL_ERR;
1883 ar6000_send_event_to_app(ar, WMI_ERROR_REPORT_EVENTID,
ab3655da 1884 (u8 *)&errEvent,
30295c89
VM
1885 sizeof(WMI_TARGET_ERROR_REPORT_EVENT));
1886 }
1887 }
1888}
1889
1f4c34bd 1890static int
30295c89
VM
1891ar6000_unavail_ev(void *context, void *hif_handle)
1892{
a71f0bf6 1893 struct ar6_softc *ar = (struct ar6_softc *)context;
30295c89
VM
1894 /* NULL out it's entry in the global list */
1895 ar6000_devices[ar->arDeviceIndex] = NULL;
1896 ar6000_destroy(ar->arNetDev, 1);
1897
4f69cef0 1898 return 0;
30295c89
VM
1899}
1900
1901void
1902ar6000_restart_endpoint(struct net_device *dev)
1903{
4f69cef0 1904 int status = 0;
a71f0bf6 1905 struct ar6_softc *ar = (struct ar6_softc *)ar6k_priv(dev);
30295c89
VM
1906
1907 BMIInit();
1908 do {
4f69cef0 1909 if ( (status=ar6000_configure_target(ar))!= 0)
30295c89 1910 break;
4f69cef0 1911 if ( (status=ar6000_sysfs_bmi_get_config(ar, wlaninitmode)) != 0)
30295c89
VM
1912 {
1913 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,("ar6000_avail: ar6000_sysfs_bmi_get_config failed\n"));
1914 break;
1915 }
1916 rtnl_lock();
4f69cef0 1917 status = (ar6000_init(dev)==0) ? 0 : A_ERROR;
30295c89
VM
1918 rtnl_unlock();
1919
a1d46529 1920 if (status) {
30295c89
VM
1921 break;
1922 }
1923 if (ar->arSsidLen && ar->arWlanState == WLAN_ENABLED) {
1924 ar6000_connect_to_ap(ar);
1925 }
1926 } while (0);
1927
4f69cef0 1928 if (status== 0) {
30295c89
VM
1929 return;
1930 }
1931
1932 ar6000_devices[ar->arDeviceIndex] = NULL;
1933 ar6000_destroy(ar->arNetDev, 1);
1934}
1935
1936void
1071a134 1937ar6000_stop_endpoint(struct net_device *dev, bool keepprofile, bool getdbglogs)
30295c89 1938{
a71f0bf6 1939 struct ar6_softc *ar = (struct ar6_softc *)ar6k_priv(dev);
30295c89
VM
1940
1941 /* Stop the transmit queues */
1942 netif_stop_queue(dev);
1943
1944 /* Disable the target and the interrupts associated with it */
1071a134 1945 if (ar->arWmiReady == true)
30295c89
VM
1946 {
1947 if (!bypasswmi)
1948 {
83195cc8
VM
1949 bool disconnectIssued;
1950
1951 disconnectIssued = (ar->arConnected) || (ar->arConnectPending);
1952 ar6000_disconnect(ar);
1953 if (!keepprofile) {
1954 ar6000_init_profile_info(ar);
30295c89
VM
1955 }
1956
1957 A_UNTIMEOUT(&ar->disconnect_timer);
1958
1959 if (getdbglogs) {
1960 ar6000_dbglog_get_debug_logs(ar);
1961 }
1962
1071a134 1963 ar->arWmiReady = false;
30295c89 1964 wmi_shutdown(ar->arWmi);
1071a134 1965 ar->arWmiEnabled = false;
30295c89
VM
1966 ar->arWmi = NULL;
1967 /*
1968 * After wmi_shudown all WMI events will be dropped.
1969 * We need to cleanup the buffers allocated in AP mode
1970 * and give disconnect notification to stack, which usually
1971 * happens in the disconnect_event.
1972 * Simulate the disconnect_event by calling the function directly.
1973 * Sometimes disconnect_event will be received when the debug logs
1974 * are collected.
1975 */
83195cc8 1976 if (disconnectIssued) {
30295c89
VM
1977 if(ar->arNetworkType & AP_NETWORK) {
1978 ar6000_disconnect_event(ar, DISCONNECT_CMD, bcast_mac, 0, NULL, 0);
1979 } else {
1980 ar6000_disconnect_event(ar, DISCONNECT_CMD, ar->arBssid, 0, NULL, 0);
1981 }
30295c89
VM
1982 }
1983#ifdef USER_KEYS
1984 ar->user_savedkeys_stat = USER_SAVEDKEYS_STAT_INIT;
1985 ar->user_key_ctrl = 0;
1986#endif
1987 }
1988
1989 AR_DEBUG_PRINTF(ATH_DEBUG_INFO,("%s(): WMI stopped\n", __func__));
1990 }
1991 else
1992 {
1993 AR_DEBUG_PRINTF(ATH_DEBUG_INFO,("%s(): WMI not ready 0x%lx 0x%lx\n",
1994 __func__, (unsigned long) ar, (unsigned long) ar->arWmi));
1995
1996 /* Shut down WMI if we have started it */
1071a134 1997 if(ar->arWmiEnabled == true)
30295c89
VM
1998 {
1999 AR_DEBUG_PRINTF(ATH_DEBUG_INFO,("%s(): Shut down WMI\n", __func__));
2000 wmi_shutdown(ar->arWmi);
1071a134 2001 ar->arWmiEnabled = false;
30295c89
VM
2002 ar->arWmi = NULL;
2003 }
2004 }
2005
2006 if (ar->arHtcTarget != NULL) {
2007#ifdef EXPORT_HCI_BRIDGE_INTERFACE
2008 if (NULL != ar6kHciTransCallbacks.cleanupTransport) {
2009 ar6kHciTransCallbacks.cleanupTransport(NULL);
2010 }
2011#else
2012 // FIXME: workaround to reset BT's UART baud rate to default
2013 if (NULL != ar->exitCallback) {
854019a3 2014 struct ar3k_config_info ar3kconfig;
1f4c34bd 2015 int status;
30295c89
VM
2016
2017 A_MEMZERO(&ar3kconfig,sizeof(ar3kconfig));
2018 ar6000_set_default_ar3kconfig(ar, (void *)&ar3kconfig);
2019 status = ar->exitCallback(&ar3kconfig);
4f69cef0 2020 if (0 != status) {
30295c89
VM
2021 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,("Failed to reset AR3K baud rate! \n"));
2022 }
2023 }
2024 // END workaround
2025 if (setuphci)
2026 ar6000_cleanup_hci(ar);
2027#endif
2028#ifdef EXPORT_HCI_PAL_INTERFACE
2029 if (setuphcipal && (NULL != ar6kHciPalCallbacks_g.cleanupTransport)) {
2030 ar6kHciPalCallbacks_g.cleanupTransport(ar);
2031 }
2032#else
2033 /* cleanup hci pal driver data structures */
2034 if(setuphcipal)
2035 ar6k_cleanup_hci_pal(ar);
2036#endif
2037 AR_DEBUG_PRINTF(ATH_DEBUG_INFO,(" Shutting down HTC .... \n"));
2038 /* stop HTC */
2039 HTCStop(ar->arHtcTarget);
2040 }
2041
2042 if (resetok) {
2043 /* try to reset the device if we can
2044 * The driver may have been configure NOT to reset the target during
2045 * a debug session */
2046 AR_DEBUG_PRINTF(ATH_DEBUG_INFO,(" Attempting to reset target on instance destroy.... \n"));
2047 if (ar->arHifDevice != NULL) {
1071a134
JP
2048 bool coldReset = (ar->arTargetType == TARGET_TYPE_AR6003) ? true: false;
2049 ar6000_reset_device(ar->arHifDevice, ar->arTargetType, true, coldReset);
30295c89
VM
2050 }
2051 } else {
2052 AR_DEBUG_PRINTF(ATH_DEBUG_INFO,(" Host does not want target reset. \n"));
2053 }
2054 /* Done with cookies */
2055 ar6000_cookie_cleanup(ar);
1581595d
VM
2056
2057 /* cleanup any allocated AMSDU buffers */
2058 ar6000_cleanup_amsdu_rxbufs(ar);
30295c89
VM
2059}
2060/*
2061 * We need to differentiate between the surprise and planned removal of the
2062 * device because of the following consideration:
2063 * - In case of surprise removal, the hcd already frees up the pending
2064 * for the device and hence there is no need to unregister the function
2065 * driver inorder to get these requests. For planned removal, the function
25985edc 2066 * driver has to explicitly unregister itself to have the hcd return all the
30295c89
VM
2067 * pending requests before the data structures for the devices are freed up.
2068 * Note that as per the current implementation, the function driver will
2069 * end up releasing all the devices since there is no API to selectively
2070 * release a particular device.
2071 * - Certain commands issued to the target can be skipped for surprise
2072 * removal since they will anyway not go through.
2073 */
2074void
2075ar6000_destroy(struct net_device *dev, unsigned int unregister)
2076{
a71f0bf6 2077 struct ar6_softc *ar;
30295c89
VM
2078
2079 AR_DEBUG_PRINTF(ATH_DEBUG_INFO,("+ar6000_destroy \n"));
2080
2081 if((dev == NULL) || ((ar = ar6k_priv(dev)) == NULL))
2082 {
2083 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,("%s(): Failed to get device structure.\n", __func__));
2084 return;
2085 }
2086
1071a134 2087 ar->bIsDestroyProgress = true;
30295c89
VM
2088
2089 if (down_interruptible(&ar->arSem)) {
2090 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,("%s(): down_interruptible failed \n", __func__));
2091 return;
2092 }
2093
2094 if (ar->arWlanPowerState != WLAN_POWER_STATE_CUT_PWR) {
2095 /* only stop endpoint if we are not stop it in suspend_ev */
1071a134 2096 ar6000_stop_endpoint(dev, false, true);
30295c89
VM
2097 } else {
2098 /* clear up the platform power state before rmmod */
2099 plat_setup_power(1,0);
2100 }
2101
2102 ar->arWlanState = WLAN_DISABLED;
2103 if (ar->arHtcTarget != NULL) {
2104 /* destroy HTC */
2105 HTCDestroy(ar->arHtcTarget);
2106 }
2107 if (ar->arHifDevice != NULL) {
2108 /*release the device so we do not get called back on remove incase we
2109 * we're explicity destroyed by module unload */
2110 HIFReleaseDevice(ar->arHifDevice);
2111 HIFShutDownDevice(ar->arHifDevice);
2112 }
2113#ifdef ATH_AR6K_11N_SUPPORT
2114 aggr_module_destroy(ar->aggr_cntxt);
2115#endif
2116
2117 /* Done with cookies */
2118 ar6000_cookie_cleanup(ar);
2119
2120 /* cleanup any allocated AMSDU buffers */
2121 ar6000_cleanup_amsdu_rxbufs(ar);
2122
2123 if (bmienable) {
2124 ar6000_sysfs_bmi_deinit(ar);
2125 }
2126
2127 /* Cleanup BMI */
2128 BMICleanup();
2129
2130 /* Clear the tx counters */
2131 memset(tx_attempt, 0, sizeof(tx_attempt));
2132 memset(tx_post, 0, sizeof(tx_post));
2133 memset(tx_complete, 0, sizeof(tx_complete));
2134
2135#ifdef HTC_RAW_INTERFACE
2136 if (ar->arRawHtc) {
2137 A_FREE(ar->arRawHtc);
2138 ar->arRawHtc = NULL;
2139 }
2140#endif
2141 /* Free up the device data structure */
2142 if (unregister && is_netdev_registered) {
2143 unregister_netdev(dev);
2144 is_netdev_registered = 0;
2145 }
30295c89 2146 free_netdev(dev);
30295c89
VM
2147
2148#ifdef ATH6K_CONFIG_CFG80211
2149 ar6k_cfg80211_deinit(ar);
2150#endif /* ATH6K_CONFIG_CFG80211 */
2151
2152#ifdef CONFIG_AP_VIRTUL_ADAPTER_SUPPORT
2153 ar6000_remove_ap_interface();
2154#endif /*CONFIG_AP_VIRTUAL_ADAPTER_SUPPORT */
2155
2156 AR_DEBUG_PRINTF(ATH_DEBUG_INFO,("-ar6000_destroy \n"));
2157}
2158
2159static void disconnect_timer_handler(unsigned long ptr)
2160{
2161 struct net_device *dev = (struct net_device *)ptr;
a71f0bf6 2162 struct ar6_softc *ar = (struct ar6_softc *)ar6k_priv(dev);
30295c89
VM
2163
2164 A_UNTIMEOUT(&ar->disconnect_timer);
2165
2166 ar6000_init_profile_info(ar);
83195cc8 2167 ar6000_disconnect(ar);
30295c89
VM
2168}
2169
2170static void ar6000_detect_error(unsigned long ptr)
2171{
2172 struct net_device *dev = (struct net_device *)ptr;
a71f0bf6 2173 struct ar6_softc *ar = (struct ar6_softc *)ar6k_priv(dev);
30295c89
VM
2174 WMI_TARGET_ERROR_REPORT_EVENT errEvent;
2175
2176 AR6000_SPIN_LOCK(&ar->arLock, 0);
2177
2178 if (ar->arHBChallengeResp.outstanding) {
2179 ar->arHBChallengeResp.missCnt++;
2180 } else {
2181 ar->arHBChallengeResp.missCnt = 0;
2182 }
2183
2184 if (ar->arHBChallengeResp.missCnt > ar->arHBChallengeResp.missThres) {
2185 /* Send Error Detect event to the application layer and do not reschedule the error detection module timer */
2186 ar->arHBChallengeResp.missCnt = 0;
2187 ar->arHBChallengeResp.seqNum = 0;
2188 errEvent.errorVal = WMI_TARGET_COM_ERR | WMI_TARGET_FATAL_ERR;
2189 AR6000_SPIN_UNLOCK(&ar->arLock, 0);
2190 ar6000_send_event_to_app(ar, WMI_ERROR_REPORT_EVENTID,
ab3655da 2191 (u8 *)&errEvent,
30295c89
VM
2192 sizeof(WMI_TARGET_ERROR_REPORT_EVENT));
2193 return;
2194 }
2195
2196 /* Generate the sequence number for the next challenge */
2197 ar->arHBChallengeResp.seqNum++;
1071a134 2198 ar->arHBChallengeResp.outstanding = true;
30295c89
VM
2199
2200 AR6000_SPIN_UNLOCK(&ar->arLock, 0);
2201
2202 /* Send the challenge on the control channel */
4f69cef0 2203 if (wmi_get_challenge_resp_cmd(ar->arWmi, ar->arHBChallengeResp.seqNum, DRV_HB_CHALLENGE) != 0) {
30295c89
VM
2204 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,("Unable to send heart beat challenge\n"));
2205 }
2206
2207
2208 /* Reschedule the timer for the next challenge */
2209 A_TIMEOUT_MS(&ar->arHBChallengeResp.timer, ar->arHBChallengeResp.frequency * 1000, 0);
2210}
2211
a71f0bf6 2212void ar6000_init_profile_info(struct ar6_softc *ar)
30295c89
VM
2213{
2214 ar->arSsidLen = 0;
2215 A_MEMZERO(ar->arSsid, sizeof(ar->arSsid));
2216
2217 switch(fwmode) {
2218 case HI_OPTION_FW_MODE_IBSS:
2219 ar->arNetworkType = ar->arNextMode = ADHOC_NETWORK;
2220 break;
2221 case HI_OPTION_FW_MODE_BSS_STA:
2222 ar->arNetworkType = ar->arNextMode = INFRA_NETWORK;
2223 break;
2224 case HI_OPTION_FW_MODE_AP:
2225 ar->arNetworkType = ar->arNextMode = AP_NETWORK;
2226 break;
2227 }
2228
2229 ar->arDot11AuthMode = OPEN_AUTH;
2230 ar->arAuthMode = NONE_AUTH;
2231 ar->arPairwiseCrypto = NONE_CRYPT;
2232 ar->arPairwiseCryptoLen = 0;
2233 ar->arGroupCrypto = NONE_CRYPT;
2234 ar->arGroupCryptoLen = 0;
2235 A_MEMZERO(ar->arWepKeyList, sizeof(ar->arWepKeyList));
2236 A_MEMZERO(ar->arReqBssid, sizeof(ar->arReqBssid));
2237 A_MEMZERO(ar->arBssid, sizeof(ar->arBssid));
2238 ar->arBssChannel = 0;
30295c89
VM
2239}
2240
2241static void
a71f0bf6 2242ar6000_init_control_info(struct ar6_softc *ar)
30295c89 2243{
1071a134 2244 ar->arWmiEnabled = false;
30295c89
VM
2245 ar6000_init_profile_info(ar);
2246 ar->arDefTxKeyIndex = 0;
2247 A_MEMZERO(ar->arWepKeyList, sizeof(ar->arWepKeyList));
2248 ar->arChannelHint = 0;
2249 ar->arListenIntervalT = A_DEFAULT_LISTEN_INTERVAL;
2250 ar->arListenIntervalB = 0;
2251 ar->arVersion.host_ver = AR6K_SW_VERSION;
2252 ar->arRssi = 0;
2253 ar->arTxPwr = 0;
1071a134 2254 ar->arTxPwrSet = false;
30295c89
VM
2255 ar->arSkipScan = 0;
2256 ar->arBeaconInterval = 0;
2257 ar->arBitRate = 0;
2258 ar->arMaxRetries = 0;
1071a134 2259 ar->arWmmEnabled = true;
30295c89
VM
2260 ar->intra_bss = 1;
2261 ar->scan_triggered = 0;
2262 A_MEMZERO(&ar->scParams, sizeof(ar->scParams));
2263 ar->scParams.shortScanRatio = WMI_SHORTSCANRATIO_DEFAULT;
2264 ar->scParams.scanCtrlFlags = DEFAULT_SCAN_CTRL_FLAGS;
2265
2266 /* Initialize the AP mode state info */
2267 {
ab3655da
JP
2268 u8 ctr;
2269 A_MEMZERO((u8 *)ar->sta_list, AP_MAX_NUM_STA * sizeof(sta_t));
30295c89
VM
2270
2271 /* init the Mutexes */
2272 A_MUTEX_INIT(&ar->mcastpsqLock);
2273
2274 /* Init the PS queues */
2275 for (ctr=0; ctr < AP_MAX_NUM_STA ; ctr++) {
2276 A_MUTEX_INIT(&ar->sta_list[ctr].psqLock);
2277 A_NETBUF_QUEUE_INIT(&ar->sta_list[ctr].psq);
2278 }
2279
2280 ar->ap_profile_flag = 0;
2281 A_NETBUF_QUEUE_INIT(&ar->mcastpsq);
2282
05209262 2283 memcpy(ar->ap_country_code, DEF_AP_COUNTRY_CODE, 3);
30295c89
VM
2284 ar->ap_wmode = DEF_AP_WMODE_G;
2285 ar->ap_dtim_period = DEF_AP_DTIM;
2286 ar->ap_beacon_interval = DEF_BEACON_INTERVAL;
2287 }
2288}
2289
2290static int
2291ar6000_open(struct net_device *dev)
2292{
2293 unsigned long flags;
a71f0bf6 2294 struct ar6_softc *ar = (struct ar6_softc *)ar6k_priv(dev);
30295c89
VM
2295
2296 spin_lock_irqsave(&ar->arLock, flags);
2297
2298#ifdef ATH6K_CONFIG_CFG80211
2299 if(ar->arWlanState == WLAN_DISABLED) {
2300 ar->arWlanState = WLAN_ENABLED;
2301 }
2302#endif /* ATH6K_CONFIG_CFG80211 */
2303
2304 if( ar->arConnected || bypasswmi) {
2305 netif_carrier_on(dev);
2306 /* Wake up the queues */
2307 netif_wake_queue(dev);
2308 }
2309 else
2310 netif_carrier_off(dev);
2311
2312 spin_unlock_irqrestore(&ar->arLock, flags);
2313 return 0;
2314}
2315
2316static int
2317ar6000_close(struct net_device *dev)
2318{
2319#ifdef ATH6K_CONFIG_CFG80211
a71f0bf6 2320 struct ar6_softc *ar = (struct ar6_softc *)ar6k_priv(dev);
30295c89
VM
2321#endif /* ATH6K_CONFIG_CFG80211 */
2322 netif_stop_queue(dev);
2323
2324#ifdef ATH6K_CONFIG_CFG80211
83195cc8 2325 ar6000_disconnect(ar);
30295c89 2326
1071a134 2327 if(ar->arWmiReady == true) {
30295c89 2328 if (wmi_scanparams_cmd(ar->arWmi, 0xFFFF, 0,
4f69cef0 2329 0, 0, 0, 0, 0, 0, 0, 0) != 0) {
30295c89
VM
2330 return -EIO;
2331 }
2332 ar->arWlanState = WLAN_DISABLED;
2333 }
5caf8fca 2334 ar6k_cfg80211_scanComplete_event(ar, A_ECANCELED);
30295c89
VM
2335#endif /* ATH6K_CONFIG_CFG80211 */
2336
2337 return 0;
2338}
2339
2340/* connect to a service */
a71f0bf6 2341static int ar6000_connectservice(struct ar6_softc *ar,
3d82b15e 2342 struct htc_service_connect_req *pConnect,
4c42080f 2343 char *pDesc)
30295c89 2344{
1f4c34bd 2345 int status;
cb3ea094 2346 struct htc_service_connect_resp response;
30295c89
VM
2347
2348 do {
2349
2350 A_MEMZERO(&response,sizeof(response));
2351
2352 status = HTCConnectService(ar->arHtcTarget,
2353 pConnect,
2354 &response);
2355
391bb211 2356 if (status) {
30295c89
VM
2357 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,(" Failed to connect to %s service status:%d \n",
2358 pDesc, status));
2359 break;
2360 }
2361 switch (pConnect->ServiceID) {
2362 case WMI_CONTROL_SVC :
2363 if (ar->arWmiEnabled) {
2364 /* set control endpoint for WMI use */
2365 wmi_set_control_ep(ar->arWmi, response.Endpoint);
2366 }
2367 /* save EP for fast lookup */
2368 ar->arControlEp = response.Endpoint;
2369 break;
2370 case WMI_DATA_BE_SVC :
2371 arSetAc2EndpointIDMap(ar, WMM_AC_BE, response.Endpoint);
2372 break;
2373 case WMI_DATA_BK_SVC :
2374 arSetAc2EndpointIDMap(ar, WMM_AC_BK, response.Endpoint);
2375 break;
2376 case WMI_DATA_VI_SVC :
2377 arSetAc2EndpointIDMap(ar, WMM_AC_VI, response.Endpoint);
2378 break;
2379 case WMI_DATA_VO_SVC :
2380 arSetAc2EndpointIDMap(ar, WMM_AC_VO, response.Endpoint);
2381 break;
2382 default:
2383 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,("ServiceID not mapped %d\n", pConnect->ServiceID));
2384 status = A_EINVAL;
2385 break;
2386 }
2387
1071a134 2388 } while (false);
30295c89
VM
2389
2390 return status;
2391}
2392
a71f0bf6 2393void ar6000_TxDataCleanup(struct ar6_softc *ar)
30295c89
VM
2394{
2395 /* flush all the data (non-control) streams
2396 * we only flush packets that are tagged as data, we leave any control packets that
2397 * were in the TX queues alone */
2398 HTCFlushEndpoint(ar->arHtcTarget,
2399 arAc2EndpointID(ar, WMM_AC_BE),
2400 AR6K_DATA_PKT_TAG);
2401 HTCFlushEndpoint(ar->arHtcTarget,
2402 arAc2EndpointID(ar, WMM_AC_BK),
2403 AR6K_DATA_PKT_TAG);
2404 HTCFlushEndpoint(ar->arHtcTarget,
2405 arAc2EndpointID(ar, WMM_AC_VI),
2406 AR6K_DATA_PKT_TAG);
2407 HTCFlushEndpoint(ar->arHtcTarget,
2408 arAc2EndpointID(ar, WMM_AC_VO),
2409 AR6K_DATA_PKT_TAG);
2410}
2411
2412HTC_ENDPOINT_ID
ab3655da 2413ar6000_ac2_endpoint_id ( void * devt, u8 ac)
30295c89 2414{
a71f0bf6 2415 struct ar6_softc *ar = (struct ar6_softc *) devt;
30295c89
VM
2416 return(arAc2EndpointID(ar, ac));
2417}
2418
ab3655da 2419u8 ar6000_endpoint_id2_ac(void * devt, HTC_ENDPOINT_ID ep )
30295c89 2420{
a71f0bf6 2421 struct ar6_softc *ar = (struct ar6_softc *) devt;
30295c89
VM
2422 return(arEndpoint2Ac(ar, ep ));
2423}
2424
15eccc06
VM
2425/*
2426 * This function applies WLAN specific configuration defined in wlan_config.h
2427 */
a71f0bf6 2428int ar6000_target_config_wlan_params(struct ar6_softc *ar)
15eccc06
VM
2429{
2430 int status = 0;
2431#if defined(INIT_MODE_DRV_ENABLED) && defined(ENABLE_COEXISTENCE)
2432 WMI_SET_BTCOEX_COLOCATED_BT_DEV_CMD sbcb_cmd;
2433 WMI_SET_BTCOEX_FE_ANT_CMD sbfa_cmd;
2434#endif /* INIT_MODE_DRV_ENABLED && ENABLE_COEXISTENCE */
2435
2436#ifdef CONFIG_HOST_TCMD_SUPPORT
2437 if (ar->arTargetMode != AR6000_WLAN_MODE) {
2438 return 0;
2439 }
2440#endif /* CONFIG_HOST_TCMD_SUPPORT */
2441
2442 /*
2443 * configure the device for rx dot11 header rules 0,0 are the default values
2444 * therefore this command can be skipped if the inputs are 0,FALSE,FALSE.Required
2445 * if checksum offload is needed. Set RxMetaVersion to 2
2446 */
2447 if ((wmi_set_rx_frame_format_cmd(ar->arWmi,ar->rxMetaVersion, processDot11Hdr, processDot11Hdr)) != 0) {
2448 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,("Unable to set the rx frame format.\n"));
2449 status = A_ERROR;
2450 }
2451
2452#if defined(INIT_MODE_DRV_ENABLED) && defined(ENABLE_COEXISTENCE)
2453 /* Configure the type of BT collocated with WLAN */
2454 memset(&sbcb_cmd, 0, sizeof(WMI_SET_BTCOEX_COLOCATED_BT_DEV_CMD));
2455#ifdef CONFIG_AR600x_BT_QCOM
2456 sbcb_cmd.btcoexCoLocatedBTdev = 1;
2457#elif defined(CONFIG_AR600x_BT_CSR)
2458 sbcb_cmd.btcoexCoLocatedBTdev = 2;
2459#elif defined(CONFIG_AR600x_BT_AR3001)
2460 sbcb_cmd.btcoexCoLocatedBTdev = 3;
2461#else
2462#error Unsupported Bluetooth Type
2463#endif /* Collocated Bluetooth Type */
2464
2465 if ((wmi_set_btcoex_colocated_bt_dev_cmd(ar->arWmi, &sbcb_cmd)) != 0) {
2466 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,("Unable to set collocated BT type\n"));
2467 status = A_ERROR;
2468 }
2469
2470 /* Configure the type of BT collocated with WLAN */
2471 memset(&sbfa_cmd, 0, sizeof(WMI_SET_BTCOEX_FE_ANT_CMD));
2472#ifdef CONFIG_AR600x_DUAL_ANTENNA
2473 sbfa_cmd.btcoexFeAntType = 2;
2474#elif defined(CONFIG_AR600x_SINGLE_ANTENNA)
2475 sbfa_cmd.btcoexFeAntType = 1;
2476#else
2477#error Unsupported Front-End Antenna Configuration
2478#endif /* AR600x Front-End Antenna Configuration */
2479
2480 if ((wmi_set_btcoex_fe_ant_cmd(ar->arWmi, &sbfa_cmd)) != 0) {
2481 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,("Unable to set fornt end antenna configuration\n"));
2482 status = A_ERROR;
2483 }
2484#endif /* INIT_MODE_DRV_ENABLED && ENABLE_COEXISTENCE */
2485
2486#if WLAN_CONFIG_IGNORE_POWER_SAVE_FAIL_EVENT_DURING_SCAN
2487 if ((wmi_pmparams_cmd(ar->arWmi, 0, 1, 0, 0, 1, IGNORE_POWER_SAVE_FAIL_EVENT_DURING_SCAN)) != 0) {
2488 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,("Unable to set power save fail event policy\n"));
2489 status = A_ERROR;
2490 }
2491#endif
2492
2493#if WLAN_CONFIG_DONOT_IGNORE_BARKER_IN_ERP
2494 if ((wmi_set_lpreamble_cmd(ar->arWmi, 0, WMI_DONOT_IGNORE_BARKER_IN_ERP)) != 0) {
2495 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,("Unable to set barker preamble policy\n"));
2496 status = A_ERROR;
2497 }
2498#endif
2499
2500 if ((wmi_set_keepalive_cmd(ar->arWmi, WLAN_CONFIG_KEEP_ALIVE_INTERVAL)) != 0) {
2501 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,("Unable to set keep alive interval\n"));
2502 status = A_ERROR;
2503 }
2504
2505#if WLAN_CONFIG_DISABLE_11N
2506 {
2507 WMI_SET_HT_CAP_CMD htCap;
2508
2509 memset(&htCap, 0, sizeof(WMI_SET_HT_CAP_CMD));
2510 htCap.band = 0;
2511 if ((wmi_set_ht_cap_cmd(ar->arWmi, &htCap)) != 0) {
2512 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,("Unable to set ht capabilities \n"));
2513 status = A_ERROR;
2514 }
2515
2516 htCap.band = 1;
2517 if ((wmi_set_ht_cap_cmd(ar->arWmi, &htCap)) != 0) {
2518 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,("Unable to set ht capabilities \n"));
2519 status = A_ERROR;
2520 }
2521 }
2522#endif /* WLAN_CONFIG_DISABLE_11N */
2523
2524#ifdef ATH6K_CONFIG_OTA_MODE
2525 if ((wmi_powermode_cmd(ar->arWmi, MAX_PERF_POWER)) != 0) {
2526 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,("Unable to set power mode \n"));
2527 status = A_ERROR;
2528 }
2529#endif
2530
2531 if ((wmi_disctimeout_cmd(ar->arWmi, WLAN_CONFIG_DISCONNECT_TIMEOUT)) != 0) {
2532 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,("Unable to set disconnect timeout \n"));
2533 status = A_ERROR;
2534 }
2535
fb9b5487
VM
2536#if WLAN_CONFIG_DISABLE_TX_BURSTING
2537 if ((wmi_set_wmm_txop(ar->arWmi, WMI_TXOP_DISABLED)) != 0) {
2538 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,("Unable to set txop bursting \n"));
2539 status = A_ERROR;
2540 }
2541#endif
2542
15eccc06
VM
2543 return status;
2544}
2545
30295c89
VM
2546/* This function does one time initialization for the lifetime of the device */
2547int ar6000_init(struct net_device *dev)
2548{
a71f0bf6 2549 struct ar6_softc *ar;
1f4c34bd 2550 int status;
f68057e6 2551 s32 timeleft;
cb1e3709 2552 s16 i;
30295c89 2553 int ret = 0;
30295c89
VM
2554
2555 if((ar = ar6k_priv(dev)) == NULL)
2556 {
2557 return -EIO;
2558 }
2559
2560 if (wlaninitmode == WLAN_INIT_MODE_USR || wlaninitmode == WLAN_INIT_MODE_DRV) {
2561
2562 ar6000_update_bdaddr(ar);
2563
2564 if (enablerssicompensation) {
2565 ar6000_copy_cust_data_from_target(ar->arHifDevice, ar->arTargetType);
2566 read_rssi_compensation_param(ar);
2567 for (i=-95; i<=0; i++) {
2568 rssi_compensation_table[0-i] = rssi_compensation_calc(ar,i);
2569 }
2570 }
2571 }
2572
2573 dev_hold(dev);
2574 rtnl_unlock();
2575
2576 /* Do we need to finish the BMI phase */
2577 if ((wlaninitmode == WLAN_INIT_MODE_USR || wlaninitmode == WLAN_INIT_MODE_DRV) &&
4f69cef0 2578 (BMIDone(ar->arHifDevice) != 0))
30295c89
VM
2579 {
2580 ret = -EIO;
2581 goto ar6000_init_done;
2582 }
2583
2584 if (!bypasswmi)
2585 {
2586#if 0 /* TBDXXX */
2587 if (ar->arVersion.host_ver != ar->arVersion.target_ver) {
2588 A_PRINTF("WARNING: Host version 0x%x does not match Target "
2589 " version 0x%x!\n",
2590 ar->arVersion.host_ver, ar->arVersion.target_ver);
2591 }
2592#endif
2593
2594 /* Indicate that WMI is enabled (although not ready yet) */
1071a134 2595 ar->arWmiEnabled = true;
30295c89
VM
2596 if ((ar->arWmi = wmi_init((void *) ar)) == NULL)
2597 {
2598 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,("%s() Failed to initialize WMI.\n", __func__));
2599 ret = -EIO;
2600 goto ar6000_init_done;
2601 }
2602
2603 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,("%s() Got WMI @ 0x%lx.\n", __func__,
2604 (unsigned long) ar->arWmi));
2605 }
2606
2607 do {
3d82b15e 2608 struct htc_service_connect_req connect;
30295c89
VM
2609
2610 /* the reason we have to wait for the target here is that the driver layer
2611 * has to init BMI in order to set the host block size,
2612 */
2613 status = HTCWaitTarget(ar->arHtcTarget);
2614
391bb211 2615 if (status) {
30295c89
VM
2616 break;
2617 }
2618
2619 A_MEMZERO(&connect,sizeof(connect));
2620 /* meta data is unused for now */
2621 connect.pMetaData = NULL;
2622 connect.MetaDataLength = 0;
2623 /* these fields are the same for all service endpoints */
2624 connect.EpCallbacks.pContext = ar;
2625 connect.EpCallbacks.EpTxCompleteMultiple = ar6000_tx_complete;
2626 connect.EpCallbacks.EpRecv = ar6000_rx;
2627 connect.EpCallbacks.EpRecvRefill = ar6000_rx_refill;
2628 connect.EpCallbacks.EpSendFull = ar6000_tx_queue_full;
2629 /* set the max queue depth so that our ar6000_tx_queue_full handler gets called.
2630 * Linux has the peculiarity of not providing flow control between the
2631 * NIC and the network stack. There is no API to indicate that a TX packet
2632 * was sent which could provide some back pressure to the network stack.
2633 * Under linux you would have to wait till the network stack consumed all sk_buffs
2634 * before any back-flow kicked in. Which isn't very friendly.
2635 * So we have to manage this ourselves */
2636 connect.MaxSendQueueDepth = MAX_DEFAULT_SEND_QUEUE_DEPTH;
2637 connect.EpCallbacks.RecvRefillWaterMark = AR6000_MAX_RX_BUFFERS / 4; /* set to 25 % */
2638 if (0 == connect.EpCallbacks.RecvRefillWaterMark) {
2639 connect.EpCallbacks.RecvRefillWaterMark++;
2640 }
2641 /* connect to control service */
2642 connect.ServiceID = WMI_CONTROL_SVC;
2643 status = ar6000_connectservice(ar,
2644 &connect,
2645 "WMI CONTROL");
391bb211 2646 if (status) {
30295c89
VM
2647 break;
2648 }
2649
2650 connect.LocalConnectionFlags |= HTC_LOCAL_CONN_FLAGS_ENABLE_SEND_BUNDLE_PADDING;
2651 /* limit the HTC message size on the send path, although we can receive A-MSDU frames of
2652 * 4K, we will only send ethernet-sized (802.3) frames on the send path. */
2653 connect.MaxSendMsgSize = WMI_MAX_TX_DATA_FRAME_LENGTH;
2654
2655 /* to reduce the amount of committed memory for larger A_MSDU frames, use the recv-alloc threshold
2656 * mechanism for larger packets */
2657 connect.EpCallbacks.RecvAllocThreshold = AR6000_BUFFER_SIZE;
2658 connect.EpCallbacks.EpRecvAllocThresh = ar6000_alloc_amsdu_rxbuf;
2659
2660 /* for the remaining data services set the connection flag to reduce dribbling,
2661 * if configured to do so */
2662 if (reduce_credit_dribble) {
2663 connect.ConnectionFlags |= HTC_CONNECT_FLAGS_REDUCE_CREDIT_DRIBBLE;
2664 /* the credit dribble trigger threshold is (reduce_credit_dribble - 1) for a value
2665 * of 0-3 */
2666 connect.ConnectionFlags &= ~HTC_CONNECT_FLAGS_THRESHOLD_LEVEL_MASK;
2667 connect.ConnectionFlags |=
4853ac05 2668 ((u16)reduce_credit_dribble - 1) & HTC_CONNECT_FLAGS_THRESHOLD_LEVEL_MASK;
30295c89
VM
2669 }
2670 /* connect to best-effort service */
2671 connect.ServiceID = WMI_DATA_BE_SVC;
2672
2673 status = ar6000_connectservice(ar,
2674 &connect,
2675 "WMI DATA BE");
391bb211 2676 if (status) {
30295c89
VM
2677 break;
2678 }
2679
2680 /* connect to back-ground
2681 * map this to WMI LOW_PRI */
2682 connect.ServiceID = WMI_DATA_BK_SVC;
2683 status = ar6000_connectservice(ar,
2684 &connect,
2685 "WMI DATA BK");
391bb211 2686 if (status) {
30295c89
VM
2687 break;
2688 }
2689
2690 /* connect to Video service, map this to
2691 * to HI PRI */
2692 connect.ServiceID = WMI_DATA_VI_SVC;
2693 status = ar6000_connectservice(ar,
2694 &connect,
2695 "WMI DATA VI");
391bb211 2696 if (status) {
30295c89
VM
2697 break;
2698 }
2699
2700 /* connect to VO service, this is currently not
2701 * mapped to a WMI priority stream due to historical reasons.
2702 * WMI originally defined 3 priorities over 3 mailboxes
2703 * We can change this when WMI is reworked so that priorities are not
2704 * dependent on mailboxes */
2705 connect.ServiceID = WMI_DATA_VO_SVC;
2706 status = ar6000_connectservice(ar,
2707 &connect,
2708 "WMI DATA VO");
391bb211 2709 if (status) {
30295c89
VM
2710 break;
2711 }
2712
2713 A_ASSERT(arAc2EndpointID(ar,WMM_AC_BE) != 0);
2714 A_ASSERT(arAc2EndpointID(ar,WMM_AC_BK) != 0);
2715 A_ASSERT(arAc2EndpointID(ar,WMM_AC_VI) != 0);
2716 A_ASSERT(arAc2EndpointID(ar,WMM_AC_VO) != 0);
2717
2718 /* setup access class priority mappings */
2719 ar->arAcStreamPriMap[WMM_AC_BK] = 0; /* lowest */
2720 ar->arAcStreamPriMap[WMM_AC_BE] = 1; /* */
2721 ar->arAcStreamPriMap[WMM_AC_VI] = 2; /* */
2722 ar->arAcStreamPriMap[WMM_AC_VO] = 3; /* highest */
2723
2724#ifdef EXPORT_HCI_BRIDGE_INTERFACE
2725 if (setuphci && (NULL != ar6kHciTransCallbacks.setupTransport)) {
e83750e7 2726 struct hci_transport_misc_handles hciHandles;
30295c89
VM
2727
2728 hciHandles.netDevice = ar->arNetDev;
2729 hciHandles.hifDevice = ar->arHifDevice;
2730 hciHandles.htcHandle = ar->arHtcTarget;
1f4c34bd 2731 status = (int)(ar6kHciTransCallbacks.setupTransport(&hciHandles));
30295c89
VM
2732 }
2733#else
2734 if (setuphci) {
2735 /* setup HCI */
2736 status = ar6000_setup_hci(ar);
2737 }
2738#endif
2739#ifdef EXPORT_HCI_PAL_INTERFACE
2740 if (setuphcipal && (NULL != ar6kHciPalCallbacks_g.setupTransport))
2741 status = ar6kHciPalCallbacks_g.setupTransport(ar);
2742#else
2743 if(setuphcipal)
2744 status = ar6k_setup_hci_pal(ar);
2745#endif
2746
1071a134 2747 } while (false);
30295c89 2748
391bb211 2749 if (status) {
30295c89
VM
2750 ret = -EIO;
2751 goto ar6000_init_done;
2752 }
2753
2754 /*
2755 * give our connected endpoints some buffers
2756 */
2757
2758 ar6000_rx_refill(ar, ar->arControlEp);
2759 ar6000_rx_refill(ar, arAc2EndpointID(ar,WMM_AC_BE));
2760
2761 /*
2762 * We will post the receive buffers only for SPE or endpoint ping testing so we are
2763 * making it conditional on the 'bypasswmi' flag.
2764 */
2765 if (bypasswmi) {
2766 ar6000_rx_refill(ar,arAc2EndpointID(ar,WMM_AC_BK));
2767 ar6000_rx_refill(ar,arAc2EndpointID(ar,WMM_AC_VI));
2768 ar6000_rx_refill(ar,arAc2EndpointID(ar,WMM_AC_VO));
2769 }
2770
2771 /* allocate some buffers that handle larger AMSDU frames */
2772 ar6000_refill_amsdu_rxbufs(ar,AR6000_MAX_AMSDU_RX_BUFFERS);
2773
2774 /* setup credit distribution */
2775 ar6000_setup_credit_dist(ar->arHtcTarget, &ar->arCreditStateInfo);
2776
2777 /* Since cookies are used for HTC transports, they should be */
2778 /* initialized prior to enabling HTC. */
2779 ar6000_cookie_init(ar);
2780
2781 /* start HTC */
2782 status = HTCStart(ar->arHtcTarget);
2783
a1d46529 2784 if (status) {
1071a134 2785 if (ar->arWmiEnabled == true) {
30295c89 2786 wmi_shutdown(ar->arWmi);
1071a134 2787 ar->arWmiEnabled = false;
30295c89
VM
2788 ar->arWmi = NULL;
2789 }
2790 ar6000_cookie_cleanup(ar);
2791 ret = -EIO;
2792 goto ar6000_init_done;
2793 }
2794
2795 if (!bypasswmi) {
2796 /* Wait for Wmi event to be ready */
2797 timeleft = wait_event_interruptible_timeout(arEvent,
1071a134 2798 (ar->arWmiReady == true), wmitimeout * HZ);
30295c89
VM
2799
2800 if (ar->arVersion.abi_ver != AR6K_ABI_VERSION) {
2801 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,("ABI Version mismatch: Host(0x%x), Target(0x%x)\n", AR6K_ABI_VERSION, ar->arVersion.abi_ver));
2802#ifndef ATH6K_SKIP_ABI_VERSION_CHECK
2803 ret = -EIO;
2804 goto ar6000_init_done;
2805#endif /* ATH6K_SKIP_ABI_VERSION_CHECK */
2806 }
2807
2808 if(!timeleft || signal_pending(current))
2809 {
2810 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,("WMI is not ready or wait was interrupted\n"));
2811 ret = -EIO;
2812 goto ar6000_init_done;
2813 }
2814
2815 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,("%s() WMI is ready\n", __func__));
2816
2817 /* Communicate the wmi protocol verision to the target */
4f69cef0 2818 if ((ar6000_set_host_app_area(ar)) != 0) {
30295c89
VM
2819 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,("Unable to set the host app area\n"));
2820 }
15eccc06 2821 ar6000_target_config_wlan_params(ar);
30295c89
VM
2822 }
2823
2824 ar->arNumDataEndPts = 1;
2825
2826 if (bypasswmi) {
2827 /* for tests like endpoint ping, the MAC address needs to be non-zero otherwise
2828 * the data path through a raw socket is disabled */
2829 dev->dev_addr[0] = 0x00;
2830 dev->dev_addr[1] = 0x01;
2831 dev->dev_addr[2] = 0x02;
2832 dev->dev_addr[3] = 0xAA;
2833 dev->dev_addr[4] = 0xBB;
2834 dev->dev_addr[5] = 0xCC;
2835 }
2836
2837ar6000_init_done:
2838 rtnl_lock();
2839 dev_put(dev);
2840
2841 return ret;
2842}
2843
2844
2845void
f68057e6 2846ar6000_bitrate_rx(void *devt, s32 rateKbps)
30295c89 2847{
a71f0bf6 2848 struct ar6_softc *ar = (struct ar6_softc *)devt;
30295c89
VM
2849
2850 ar->arBitRate = rateKbps;
2851 wake_up(&arEvent);
2852}
2853
2854void
e1ce2a3a 2855ar6000_ratemask_rx(void *devt, u32 ratemask)
30295c89 2856{
a71f0bf6 2857 struct ar6_softc *ar = (struct ar6_softc *)devt;
30295c89
VM
2858
2859 ar->arRateMask = ratemask;
2860 wake_up(&arEvent);
2861}
2862
2863void
ab3655da 2864ar6000_txPwr_rx(void *devt, u8 txPwr)
30295c89 2865{
a71f0bf6 2866 struct ar6_softc *ar = (struct ar6_softc *)devt;
30295c89
VM
2867
2868 ar->arTxPwr = txPwr;
2869 wake_up(&arEvent);
2870}
2871
2872
2873void
f2ab1275 2874ar6000_channelList_rx(void *devt, s8 numChan, u16 *chanList)
30295c89 2875{
a71f0bf6 2876 struct ar6_softc *ar = (struct ar6_softc *)devt;
30295c89 2877
05209262 2878 memcpy(ar->arChannelList, chanList, numChan * sizeof (u16));
30295c89
VM
2879 ar->arNumChannels = numChan;
2880
2881 wake_up(&arEvent);
2882}
2883
e1ce2a3a 2884u8 ar6000_ibss_map_epid(struct sk_buff *skb, struct net_device *dev, u32 *mapNo)
30295c89 2885{
a71f0bf6 2886 struct ar6_softc *ar = (struct ar6_softc *)ar6k_priv(dev);
ab3655da 2887 u8 *datap;
30295c89 2888 ATH_MAC_HDR *macHdr;
e1ce2a3a 2889 u32 i, eptMap;
30295c89
VM
2890
2891 (*mapNo) = 0;
2892 datap = A_NETBUF_DATA(skb);
2893 macHdr = (ATH_MAC_HDR *)(datap + sizeof(WMI_DATA_HDR));
2894 if (IEEE80211_IS_MULTICAST(macHdr->dstMac)) {
2895 return ENDPOINT_2;
2896 }
2897
2898 eptMap = -1;
2899 for (i = 0; i < ar->arNodeNum; i ++) {
2900 if (IEEE80211_ADDR_EQ(macHdr->dstMac, ar->arNodeMap[i].macAddress)) {
2901 (*mapNo) = i + 1;
2902 ar->arNodeMap[i].txPending ++;
2903 return ar->arNodeMap[i].epId;
2904 }
2905
2906 if ((eptMap == -1) && !ar->arNodeMap[i].txPending) {
2907 eptMap = i;
2908 }
2909 }
2910
2911 if (eptMap == -1) {
2912 eptMap = ar->arNodeNum;
2913 ar->arNodeNum ++;
2914 A_ASSERT(ar->arNodeNum <= MAX_NODE_NUM);
2915 }
2916
05209262 2917 memcpy(ar->arNodeMap[eptMap].macAddress, macHdr->dstMac, IEEE80211_ADDR_LEN);
30295c89
VM
2918
2919 for (i = ENDPOINT_2; i <= ENDPOINT_5; i ++) {
2920 if (!ar->arTxPending[i]) {
2921 ar->arNodeMap[eptMap].epId = i;
2922 break;
2923 }
2924 // No free endpoint is available, start redistribution on the inuse endpoints.
2925 if (i == ENDPOINT_5) {
2926 ar->arNodeMap[eptMap].epId = ar->arNexEpId;
2927 ar->arNexEpId ++;
2928 if (ar->arNexEpId > ENDPOINT_5) {
2929 ar->arNexEpId = ENDPOINT_2;
2930 }
2931 }
2932 }
2933
2934 (*mapNo) = eptMap + 1;
2935 ar->arNodeMap[eptMap].txPending ++;
2936
2937 return ar->arNodeMap[eptMap].epId;
2938}
2939
2940#ifdef DEBUG
2941static void ar6000_dump_skb(struct sk_buff *skb)
2942{
2943 u_char *ch;
2944 for (ch = A_NETBUF_DATA(skb);
2945 (unsigned long)ch < ((unsigned long)A_NETBUF_DATA(skb) +
2946 A_NETBUF_LEN(skb)); ch++)
2947 {
2948 AR_DEBUG_PRINTF(ATH_DEBUG_WARN,("%2.2x ", *ch));
2949 }
2950 AR_DEBUG_PRINTF(ATH_DEBUG_WARN,("\n"));
2951}
2952#endif
2953
2954#ifdef HTC_TEST_SEND_PKTS
a71f0bf6 2955static void DoHTCSendPktsTest(struct ar6_softc *ar, int MapNo, HTC_ENDPOINT_ID eid, struct sk_buff *skb);
30295c89
VM
2956#endif
2957
2958static int
2959ar6000_data_tx(struct sk_buff *skb, struct net_device *dev)
2960{
2961#define AC_NOT_MAPPED 99
a71f0bf6 2962 struct ar6_softc *ar = (struct ar6_softc *)ar6k_priv(dev);
ab3655da 2963 u8 ac = AC_NOT_MAPPED;
30295c89 2964 HTC_ENDPOINT_ID eid = ENDPOINT_UNUSED;
e1ce2a3a 2965 u32 mapNo = 0;
30295c89
VM
2966 int len;
2967 struct ar_cookie *cookie;
1071a134 2968 bool checkAdHocPsMapping = false,bMoreData = false;
30295c89 2969 HTC_TX_TAG htc_tag = AR6K_DATA_PKT_TAG;
ab3655da 2970 u8 dot11Hdr = processDot11Hdr;
30295c89
VM
2971#ifdef CONFIG_PM
2972 if (ar->arWowState != WLAN_WOW_STATE_NONE) {
2973 A_NETBUF_FREE(skb);
2974 return 0;
2975 }
2976#endif /* CONFIG_PM */
2977
2978 AR_DEBUG_PRINTF(ATH_DEBUG_WLAN_TX,("ar6000_data_tx start - skb=0x%lx, data=0x%lx, len=0x%x\n",
2979 (unsigned long)skb, (unsigned long)A_NETBUF_DATA(skb),
2980 A_NETBUF_LEN(skb)));
2981
2982 /* If target is not associated */
2983 if( (!ar->arConnected && !bypasswmi)
2984#ifdef CONFIG_HOST_TCMD_SUPPORT
25985edc 2985 /* TCMD doesn't support any data, free the buf and return */
30295c89
VM
2986 || (ar->arTargetMode == AR6000_TCMD_MODE)
2987#endif
2988 ) {
2989 A_NETBUF_FREE(skb);
2990 return 0;
2991 }
2992
2993 do {
2994
1071a134 2995 if (ar->arWmiReady == false && bypasswmi == 0) {
30295c89
VM
2996 break;
2997 }
2998
2999#ifdef BLOCK_TX_PATH_FLAG
3000 if (blocktx) {
3001 break;
3002 }
3003#endif /* BLOCK_TX_PATH_FLAG */
3004
3005 /* AP mode Power save processing */
3006 /* If the dst STA is in sleep state, queue the pkt in its PS queue */
3007
3008 if (ar->arNetworkType == AP_NETWORK) {
3009 ATH_MAC_HDR *datap = (ATH_MAC_HDR *)A_NETBUF_DATA(skb);
3010 sta_t *conn = NULL;
3011
3012 /* If the dstMac is a Multicast address & atleast one of the
3013 * associated STA is in PS mode, then queue the pkt to the
3014 * mcastq
3015 */
3016 if (IEEE80211_IS_MULTICAST(datap->dstMac)) {
ab3655da 3017 u8 ctr=0;
1071a134 3018 bool qMcast=false;
30295c89
VM
3019
3020
3021 for (ctr=0; ctr<AP_MAX_NUM_STA; ctr++) {
3022 if (STA_IS_PWR_SLEEP((&ar->sta_list[ctr]))) {
1071a134 3023 qMcast = true;
30295c89
VM
3024 }
3025 }
3026 if(qMcast) {
3027
3028 /* If this transmit is not because of a Dtim Expiry q it */
1071a134
JP
3029 if (ar->DTIMExpired == false) {
3030 bool isMcastqEmpty = false;
30295c89
VM
3031
3032 A_MUTEX_LOCK(&ar->mcastpsqLock);
3033 isMcastqEmpty = A_NETBUF_QUEUE_EMPTY(&ar->mcastpsq);
3034 A_NETBUF_ENQUEUE(&ar->mcastpsq, skb);
3035 A_MUTEX_UNLOCK(&ar->mcastpsqLock);
3036
3037 /* If this is the first Mcast pkt getting queued
3038 * indicate to the target to set the BitmapControl LSB
3039 * of the TIM IE.
3040 */
3041 if (isMcastqEmpty) {
3042 wmi_set_pvb_cmd(ar->arWmi, MCAST_AID, 1);
3043 }
3044 return 0;
3045 } else {
3046 /* This transmit is because of Dtim expiry. Determine if
3047 * MoreData bit has to be set.
3048 */
3049 A_MUTEX_LOCK(&ar->mcastpsqLock);
3050 if(!A_NETBUF_QUEUE_EMPTY(&ar->mcastpsq)) {
1071a134 3051 bMoreData = true;
30295c89
VM
3052 }
3053 A_MUTEX_UNLOCK(&ar->mcastpsqLock);
3054 }
3055 }
3056 } else {
3057 conn = ieee80211_find_conn(ar, datap->dstMac);
3058 if (conn) {
3059 if (STA_IS_PWR_SLEEP(conn)) {
3060 /* If this transmit is not because of a PsPoll q it*/
3061 if (!STA_IS_PS_POLLED(conn)) {
1071a134 3062 bool isPsqEmpty = false;
30295c89
VM
3063 /* Queue the frames if the STA is sleeping */
3064 A_MUTEX_LOCK(&conn->psqLock);
3065 isPsqEmpty = A_NETBUF_QUEUE_EMPTY(&conn->psq);
3066 A_NETBUF_ENQUEUE(&conn->psq, skb);
3067 A_MUTEX_UNLOCK(&conn->psqLock);
3068
3069 /* If this is the first pkt getting queued
3070 * for this STA, update the PVB for this STA
3071 */
3072 if (isPsqEmpty) {
3073 wmi_set_pvb_cmd(ar->arWmi, conn->aid, 1);
3074 }
3075
3076 return 0;
3077 } else {
3078 /* This tx is because of a PsPoll. Determine if
3079 * MoreData bit has to be set
3080 */
3081 A_MUTEX_LOCK(&conn->psqLock);
3082 if (!A_NETBUF_QUEUE_EMPTY(&conn->psq)) {
1071a134 3083 bMoreData = true;
30295c89
VM
3084 }
3085 A_MUTEX_UNLOCK(&conn->psqLock);
3086 }
3087 }
3088 } else {
3089
3090 /* non existent STA. drop the frame */
3091 A_NETBUF_FREE(skb);
3092 return 0;
3093 }
3094 }
3095 }
3096
3097 if (ar->arWmiEnabled) {
3098#ifdef CONFIG_CHECKSUM_OFFLOAD
ab3655da
JP
3099 u8 csumStart=0;
3100 u8 csumDest=0;
3101 u8 csum=skb->ip_summed;
30295c89 3102 if(csumOffload && (csum==CHECKSUM_PARTIAL)){
5f2e8773
BH
3103 csumStart = (skb->head + skb->csum_start - skb_network_header(skb) +
3104 sizeof(ATH_LLC_SNAP_HDR));
30295c89
VM
3105 csumDest=skb->csum_offset+csumStart;
3106 }
3107#endif
3108 if (A_NETBUF_HEADROOM(skb) < dev->hard_header_len - LINUX_HACK_FUDGE_FACTOR) {
3109 struct sk_buff *newbuf;
3110
3111 /*
3112 * We really should have gotten enough headroom but sometimes
3113 * we still get packets with not enough headroom. Copy the packet.
3114 */
3115 len = A_NETBUF_LEN(skb);
3116 newbuf = A_NETBUF_ALLOC(len);
3117 if (newbuf == NULL) {
3118 break;
3119 }
3120 A_NETBUF_PUT(newbuf, len);
05209262 3121 memcpy(A_NETBUF_DATA(newbuf), A_NETBUF_DATA(skb), len);
30295c89
VM
3122 A_NETBUF_FREE(skb);
3123 skb = newbuf;
3124 /* fall through and assemble header */
3125 }
3126
3127 if (dot11Hdr) {
4f69cef0 3128 if (wmi_dot11_hdr_add(ar->arWmi,skb,ar->arNetworkType) != 0) {
30295c89
VM
3129 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,("ar6000_data_tx-wmi_dot11_hdr_add failed\n"));
3130 break;
3131 }
3132 } else {
4f69cef0 3133 if (wmi_dix_2_dot3(ar->arWmi, skb) != 0) {
30295c89
VM
3134 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,("ar6000_data_tx - wmi_dix_2_dot3 failed\n"));
3135 break;
3136 }
3137 }
3138#ifdef CONFIG_CHECKSUM_OFFLOAD
3139 if(csumOffload && (csum ==CHECKSUM_PARTIAL)){
3140 WMI_TX_META_V2 metaV2;
3141 metaV2.csumStart =csumStart;
3142 metaV2.csumDest = csumDest;
3143 metaV2.csumFlags = 0x1;/*instruct target to calculate checksum*/
3144 if (wmi_data_hdr_add(ar->arWmi, skb, DATA_MSGTYPE, bMoreData, dot11Hdr,
4f69cef0 3145 WMI_META_VERSION_2,&metaV2) != 0) {
30295c89
VM
3146 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,("ar6000_data_tx - wmi_data_hdr_add failed\n"));
3147 break;
3148 }
3149
3150 }
3151 else
3152#endif
3153 {
4f69cef0 3154 if (wmi_data_hdr_add(ar->arWmi, skb, DATA_MSGTYPE, bMoreData, dot11Hdr,0,NULL) != 0) {
30295c89
VM
3155 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,("ar6000_data_tx - wmi_data_hdr_add failed\n"));
3156 break;
3157 }
3158 }
3159
3160
3161 if ((ar->arNetworkType == ADHOC_NETWORK) &&
3162 ar->arIbssPsEnable && ar->arConnected) {
3163 /* flag to check adhoc mapping once we take the lock below: */
1071a134 3164 checkAdHocPsMapping = true;
30295c89
VM
3165
3166 } else {
3167 /* get the stream mapping */
3168 ac = wmi_implicit_create_pstream(ar->arWmi, skb, 0, ar->arWmmEnabled);
3169 }
3170
3171 } else {
3172 EPPING_HEADER *eppingHdr;
3173
3174 eppingHdr = A_NETBUF_DATA(skb);
3175
3176 if (IS_EPPING_PACKET(eppingHdr)) {
3177 /* the stream ID is mapped to an access class */
3178 ac = eppingHdr->StreamNo_h;
3179 /* some EPPING packets cannot be dropped no matter what access class it was
3180 * sent on. We can change the packet tag to guarantee it will not get dropped */
3181 if (IS_EPING_PACKET_NO_DROP(eppingHdr)) {
3182 htc_tag = AR6K_CONTROL_PKT_TAG;
3183 }
3184
3185 if (ac == HCI_TRANSPORT_STREAM_NUM) {
3186 /* pass this to HCI */
3187#ifndef EXPORT_HCI_BRIDGE_INTERFACE
509c9d97 3188 if (!hci_test_send(ar,skb)) {
30295c89
VM
3189 return 0;
3190 }
3191#endif
3192 /* set AC to discard this skb */
3193 ac = AC_NOT_MAPPED;
3194 } else {
3195 /* a quirk of linux, the payload of the frame is 32-bit aligned and thus the addition
3196 * of the HTC header will mis-align the start of the HTC frame, so we add some
3197 * padding which will be stripped off in the target */
3198 if (EPPING_ALIGNMENT_PAD > 0) {
3199 A_NETBUF_PUSH(skb, EPPING_ALIGNMENT_PAD);
3200 }
3201 }
3202
3203 } else {
3204 /* not a ping packet, drop it */
3205 ac = AC_NOT_MAPPED;
3206 }
3207 }
3208
1071a134 3209 } while (false);
30295c89
VM
3210
3211 /* did we succeed ? */
3212 if ((ac == AC_NOT_MAPPED) && !checkAdHocPsMapping) {
3213 /* cleanup and exit */
3214 A_NETBUF_FREE(skb);
3215 AR6000_STAT_INC(ar, tx_dropped);
3216 AR6000_STAT_INC(ar, tx_aborted_errors);
3217 return 0;
3218 }
3219
3220 cookie = NULL;
3221
3222 /* take the lock to protect driver data */
3223 AR6000_SPIN_LOCK(&ar->arLock, 0);
3224
3225 do {
3226
3227 if (checkAdHocPsMapping) {
3228 eid = ar6000_ibss_map_epid(skb, dev, &mapNo);
3229 }else {
3230 eid = arAc2EndpointID (ar, ac);
3231 }
3232 /* validate that the endpoint is connected */
3233 if (eid == 0 || eid == ENDPOINT_UNUSED ) {
3234 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,(" eid %d is NOT mapped!\n", eid));
3235 break;
3236 }
3237 /* allocate resource for this packet */
3238 cookie = ar6000_alloc_cookie(ar);
3239
3240 if (cookie != NULL) {
3241 /* update counts while the lock is held */
3242 ar->arTxPending[eid]++;
3243 ar->arTotalTxDataPending++;
3244 }
3245
1071a134 3246 } while (false);
30295c89
VM
3247
3248 AR6000_SPIN_UNLOCK(&ar->arLock, 0);
3249
3250 if (cookie != NULL) {
3251 cookie->arc_bp[0] = (unsigned long)skb;
3252 cookie->arc_bp[1] = mapNo;
3253 SET_HTC_PACKET_INFO_TX(&cookie->HtcPkt,
3254 cookie,
3255 A_NETBUF_DATA(skb),
3256 A_NETBUF_LEN(skb),
3257 eid,
3258 htc_tag);
3259
3260#ifdef DEBUG
3261 if (debugdriver >= 3) {
3262 ar6000_dump_skb(skb);
3263 }
3264#endif
3265#ifdef HTC_TEST_SEND_PKTS
3266 DoHTCSendPktsTest(ar,mapNo,eid,skb);
3267#endif
3268 /* HTC interface is asynchronous, if this fails, cleanup will happen in
3269 * the ar6000_tx_complete callback */
3270 HTCSendPkt(ar->arHtcTarget, &cookie->HtcPkt);
3271 } else {
3272 /* no packet to send, cleanup */
3273 A_NETBUF_FREE(skb);
3274 AR6000_STAT_INC(ar, tx_dropped);
3275 AR6000_STAT_INC(ar, tx_aborted_errors);
3276 }
3277
3278 return 0;
3279}
3280
3281int
3282ar6000_acl_data_tx(struct sk_buff *skb, struct net_device *dev)
3283{
a71f0bf6 3284 struct ar6_softc *ar = (struct ar6_softc *)ar6k_priv(dev);
30295c89
VM
3285 struct ar_cookie *cookie;
3286 HTC_ENDPOINT_ID eid = ENDPOINT_UNUSED;
3287
3288 cookie = NULL;
3289 AR6000_SPIN_LOCK(&ar->arLock, 0);
3290
3291 /* For now we send ACL on BE endpoint: We can also have a dedicated EP */
3292 eid = arAc2EndpointID (ar, 0);
3293 /* allocate resource for this packet */
3294 cookie = ar6000_alloc_cookie(ar);
3295
3296 if (cookie != NULL) {
3297 /* update counts while the lock is held */
3298 ar->arTxPending[eid]++;
3299 ar->arTotalTxDataPending++;
3300 }
3301
3302
3303 AR6000_SPIN_UNLOCK(&ar->arLock, 0);
3304
3305 if (cookie != NULL) {
3306 cookie->arc_bp[0] = (unsigned long)skb;
3307 cookie->arc_bp[1] = 0;
3308 SET_HTC_PACKET_INFO_TX(&cookie->HtcPkt,
3309 cookie,
3310 A_NETBUF_DATA(skb),
3311 A_NETBUF_LEN(skb),
3312 eid,
3313 AR6K_DATA_PKT_TAG);
3314
3315 /* HTC interface is asynchronous, if this fails, cleanup will happen in
3316 * the ar6000_tx_complete callback */
3317 HTCSendPkt(ar->arHtcTarget, &cookie->HtcPkt);
3318 } else {
3319 /* no packet to send, cleanup */
3320 A_NETBUF_FREE(skb);
3321 AR6000_STAT_INC(ar, tx_dropped);
3322 AR6000_STAT_INC(ar, tx_aborted_errors);
3323 }
3324 return 0;
3325}
3326
3327
3328#ifdef ADAPTIVE_POWER_THROUGHPUT_CONTROL
3329static void
3330tvsub(register struct timeval *out, register struct timeval *in)
3331{
3332 if((out->tv_usec -= in->tv_usec) < 0) {
3333 out->tv_sec--;
3334 out->tv_usec += 1000000;
3335 }
3336 out->tv_sec -= in->tv_sec;
3337}
3338
3339void
a71f0bf6 3340applyAPTCHeuristics(struct ar6_softc *ar)
30295c89 3341{
e1ce2a3a
JP
3342 u32 duration;
3343 u32 numbytes;
3344 u32 throughput;
30295c89 3345 struct timeval ts;
1f4c34bd 3346 int status;
30295c89
VM
3347
3348 AR6000_SPIN_LOCK(&ar->arLock, 0);
3349
3350 if ((enableAPTCHeuristics) && (!aptcTR.timerScheduled)) {
3351 do_gettimeofday(&ts);
3352 tvsub(&ts, &aptcTR.samplingTS);
3353 duration = ts.tv_sec * 1000 + ts.tv_usec / 1000; /* ms */
3354 numbytes = aptcTR.bytesTransmitted + aptcTR.bytesReceived;
3355
3356 if (duration > APTC_TRAFFIC_SAMPLING_INTERVAL) {
3357 /* Initialize the time stamp and byte count */
3358 aptcTR.bytesTransmitted = aptcTR.bytesReceived = 0;
3359 do_gettimeofday(&aptcTR.samplingTS);
3360
3361 /* Calculate and decide based on throughput thresholds */
3362 throughput = ((numbytes * 8) / duration);
3363 if (throughput > APTC_UPPER_THROUGHPUT_THRESHOLD) {
3364 /* Disable Sleep and schedule a timer */
1071a134 3365 A_ASSERT(ar->arWmiReady == true);
30295c89
VM
3366 AR6000_SPIN_UNLOCK(&ar->arLock, 0);
3367 status = wmi_powermode_cmd(ar->arWmi, MAX_PERF_POWER);
3368 AR6000_SPIN_LOCK(&ar->arLock, 0);
3369 A_TIMEOUT_MS(&aptcTimer, APTC_TRAFFIC_SAMPLING_INTERVAL, 0);
1071a134 3370 aptcTR.timerScheduled = true;
30295c89
VM
3371 }
3372 }
3373 }
3374
3375 AR6000_SPIN_UNLOCK(&ar->arLock, 0);
3376}
3377#endif /* ADAPTIVE_POWER_THROUGHPUT_CONTROL */
3378
c6528e2f 3379static HTC_SEND_FULL_ACTION ar6000_tx_queue_full(void *Context, struct htc_packet *pPacket)
30295c89 3380{
a71f0bf6 3381 struct ar6_softc *ar = (struct ar6_softc *)Context;
30295c89 3382 HTC_SEND_FULL_ACTION action = HTC_SEND_FULL_KEEP;
1071a134 3383 bool stopNet = false;
30295c89
VM
3384 HTC_ENDPOINT_ID Endpoint = HTC_GET_ENDPOINT_FROM_PKT(pPacket);
3385
3386 do {
3387
3388 if (bypasswmi) {
3389 int accessClass;
3390
3391 if (HTC_GET_TAG_FROM_PKT(pPacket) == AR6K_CONTROL_PKT_TAG) {
3392 /* don't drop special control packets */
3393 break;
3394 }
3395
3396 accessClass = arEndpoint2Ac(ar,Endpoint);
3397 /* for endpoint ping testing drop Best Effort and Background */
3398 if ((accessClass == WMM_AC_BE) || (accessClass == WMM_AC_BK)) {
3399 action = HTC_SEND_FULL_DROP;
1071a134 3400 stopNet = false;
30295c89
VM
3401 } else {
3402 /* keep but stop the netqueues */
1071a134 3403 stopNet = true;
30295c89
VM
3404 }
3405 break;
3406 }
3407
3408 if (Endpoint == ar->arControlEp) {
3409 /* under normal WMI if this is getting full, then something is running rampant
3410 * the host should not be exhausting the WMI queue with too many commands
3411 * the only exception to this is during testing using endpointping */
3412 AR6000_SPIN_LOCK(&ar->arLock, 0);
3413 /* set flag to handle subsequent messages */
1071a134 3414 ar->arWMIControlEpFull = true;
30295c89
VM
3415 AR6000_SPIN_UNLOCK(&ar->arLock, 0);
3416 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,("WMI Control Endpoint is FULL!!! \n"));
3417 /* no need to stop the network */
1071a134 3418 stopNet = false;
30295c89
VM
3419 break;
3420 }
3421
3422 /* if we get here, we are dealing with data endpoints getting full */
3423
3424 if (HTC_GET_TAG_FROM_PKT(pPacket) == AR6K_CONTROL_PKT_TAG) {
3425 /* don't drop control packets issued on ANY data endpoint */
3426 break;
3427 }
3428
3429 if (ar->arNetworkType == ADHOC_NETWORK) {
3430 /* in adhoc mode, we cannot differentiate traffic priorities so there is no need to
3431 * continue, however we should stop the network */
1071a134 3432 stopNet = true;
30295c89
VM
3433 break;
3434 }
3435 /* the last MAX_HI_COOKIE_NUM "batch" of cookies are reserved for the highest
3436 * active stream */
3437 if (ar->arAcStreamPriMap[arEndpoint2Ac(ar,Endpoint)] < ar->arHiAcStreamActivePri &&
3438 ar->arCookieCount <= MAX_HI_COOKIE_NUM) {
3439 /* this stream's priority is less than the highest active priority, we
3440 * give preference to the highest priority stream by directing
3441 * HTC to drop the packet that overflowed */
3442 action = HTC_SEND_FULL_DROP;
3443 /* since we are dropping packets, no need to stop the network */
1071a134 3444 stopNet = false;
30295c89
VM
3445 break;
3446 }
3447
1071a134 3448 } while (false);
30295c89
VM
3449
3450 if (stopNet) {
3451 AR6000_SPIN_LOCK(&ar->arLock, 0);
1071a134 3452 ar->arNetQueueStopped = true;
30295c89
VM
3453 AR6000_SPIN_UNLOCK(&ar->arLock, 0);
3454 /* one of the data endpoints queues is getting full..need to stop network stack
3455 * the queue will resume in ar6000_tx_complete() */
3456 netif_stop_queue(ar->arNetDev);
3457 }
3458
3459 return action;
3460}
3461
3462
3463static void
6ca0f664 3464ar6000_tx_complete(void *Context, struct htc_packet_queue *pPacketQueue)
30295c89 3465{
a71f0bf6 3466 struct ar6_softc *ar = (struct ar6_softc *)Context;
e1ce2a3a 3467 u32 mapNo = 0;
1f4c34bd 3468 int status;
30295c89
VM
3469 struct ar_cookie * ar_cookie;
3470 HTC_ENDPOINT_ID eid;
1071a134 3471 bool wakeEvent = false;
30295c89 3472 struct sk_buff_head skb_queue;
c6528e2f 3473 struct htc_packet *pPacket;
30295c89 3474 struct sk_buff *pktSkb;
1071a134 3475 bool flushing = false;
30295c89
VM
3476
3477 skb_queue_head_init(&skb_queue);
3478
3479 /* lock the driver as we update internal state */
3480 AR6000_SPIN_LOCK(&ar->arLock, 0);
3481
3482 /* reap completed packets */
3483 while (!HTC_QUEUE_EMPTY(pPacketQueue)) {
3484
3485 pPacket = HTC_PACKET_DEQUEUE(pPacketQueue);
3486
3487 ar_cookie = (struct ar_cookie *)pPacket->pPktContext;
3488 A_ASSERT(ar_cookie);
3489
3490 status = pPacket->Status;
3491 pktSkb = (struct sk_buff *)ar_cookie->arc_bp[0];
3492 eid = pPacket->Endpoint;
3493 mapNo = ar_cookie->arc_bp[1];
3494
3495 A_ASSERT(pktSkb);
3496 A_ASSERT(pPacket->pBuffer == A_NETBUF_DATA(pktSkb));
3497
3498 /* add this to the list, use faster non-lock API */
3499 __skb_queue_tail(&skb_queue,pktSkb);
3500
509c9d97 3501 if (!status) {
30295c89
VM
3502 A_ASSERT(pPacket->ActualLength == A_NETBUF_LEN(pktSkb));
3503 }
3504
3505 AR_DEBUG_PRINTF(ATH_DEBUG_WLAN_TX,("ar6000_tx_complete skb=0x%lx data=0x%lx len=0x%x eid=%d ",
3506 (unsigned long)pktSkb, (unsigned long)pPacket->pBuffer,
3507 pPacket->ActualLength,
3508 eid));
3509
3510 ar->arTxPending[eid]--;
3511
3512 if ((eid != ar->arControlEp) || bypasswmi) {
3513 ar->arTotalTxDataPending--;
3514 }
3515
3516 if (eid == ar->arControlEp)
3517 {
3518 if (ar->arWMIControlEpFull) {
3519 /* since this packet completed, the WMI EP is no longer full */
1071a134 3520 ar->arWMIControlEpFull = false;
30295c89
VM
3521 }
3522
3523 if (ar->arTxPending[eid] == 0) {
1071a134 3524 wakeEvent = true;
30295c89
VM
3525 }
3526 }
3527
391bb211 3528 if (status) {
30295c89
VM
3529 if (status == A_ECANCELED) {
3530 /* a packet was flushed */
1071a134 3531 flushing = true;
30295c89
VM
3532 }
3533 AR6000_STAT_INC(ar, tx_errors);
3534 if (status != A_NO_RESOURCE) {
3535 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,("%s() -TX ERROR, status: 0x%x\n", __func__,
3536 status));
3537 }
3538 } else {
3539 AR_DEBUG_PRINTF(ATH_DEBUG_WLAN_TX,("OK\n"));
1071a134 3540 flushing = false;
30295c89
VM
3541 AR6000_STAT_INC(ar, tx_packets);
3542 ar->arNetStats.tx_bytes += A_NETBUF_LEN(pktSkb);
3543#ifdef ADAPTIVE_POWER_THROUGHPUT_CONTROL
3544 aptcTR.bytesTransmitted += a_netbuf_to_len(pktSkb);
3545 applyAPTCHeuristics(ar);
3546#endif /* ADAPTIVE_POWER_THROUGHPUT_CONTROL */
3547 }
3548
3549 // TODO this needs to be looked at
3550 if ((ar->arNetworkType == ADHOC_NETWORK) && ar->arIbssPsEnable
3551 && (eid != ar->arControlEp) && mapNo)
3552 {
3553 mapNo --;
3554 ar->arNodeMap[mapNo].txPending --;
3555
3556 if (!ar->arNodeMap[mapNo].txPending && (mapNo == (ar->arNodeNum - 1))) {
e1ce2a3a 3557 u32 i;
30295c89
VM
3558 for (i = ar->arNodeNum; i > 0; i --) {
3559 if (!ar->arNodeMap[i - 1].txPending) {
3560 A_MEMZERO(&ar->arNodeMap[i - 1], sizeof(struct ar_node_mapping));
3561 ar->arNodeNum --;
3562 } else {
3563 break;
3564 }
3565 }
3566 }
3567 }
3568
3569 ar6000_free_cookie(ar, ar_cookie);
3570
3571 if (ar->arNetQueueStopped) {
1071a134 3572 ar->arNetQueueStopped = false;
30295c89
VM
3573 }
3574 }
3575
3576 AR6000_SPIN_UNLOCK(&ar->arLock, 0);
3577
3578 /* lock is released, we can freely call other kernel APIs */
3579
3580 /* free all skbs in our local list */
3581 while (!skb_queue_empty(&skb_queue)) {
3582 /* use non-lock version */
3583 pktSkb = __skb_dequeue(&skb_queue);
3584 A_NETBUF_FREE(pktSkb);
3585 }
3586
1071a134 3587 if ((ar->arConnected == true) || bypasswmi) {
30295c89
VM
3588 if (!flushing) {
3589 /* don't wake the queue if we are flushing, other wise it will just
3590 * keep queueing packets, which will keep failing */
3591 netif_wake_queue(ar->arNetDev);
3592 }
3593 }
3594
3595 if (wakeEvent) {
3596 wake_up(&arEvent);
3597 }
3598
3599}
3600
3601sta_t *
a71f0bf6 3602ieee80211_find_conn(struct ar6_softc *ar, u8 *node_addr)
30295c89
VM
3603{
3604 sta_t *conn = NULL;
ab3655da 3605 u8 i, max_conn;
30295c89
VM
3606
3607 switch(ar->arNetworkType) {
3608 case AP_NETWORK:
3609 max_conn = AP_MAX_NUM_STA;
3610 break;
3611 default:
3612 max_conn=0;
3613 break;
3614 }
3615
3616 for (i = 0; i < max_conn; i++) {
3617 if (IEEE80211_ADDR_EQ(node_addr, ar->sta_list[i].mac)) {
3618 conn = &ar->sta_list[i];
3619 break;
3620 }
3621 }
3622
3623 return conn;
3624}
3625
a71f0bf6 3626sta_t *ieee80211_find_conn_for_aid(struct ar6_softc *ar, u8 aid)
30295c89
VM
3627{
3628 sta_t *conn = NULL;
ab3655da 3629 u8 ctr;
30295c89
VM
3630
3631 for (ctr = 0; ctr < AP_MAX_NUM_STA; ctr++) {
3632 if (ar->sta_list[ctr].aid == aid) {
3633 conn = &ar->sta_list[ctr];
3634 break;
3635 }
3636 }
3637 return conn;
3638}
3639
3640/*
3641 * Receive event handler. This is called by HTC when a packet is received
3642 */
3643int pktcount;
3644static void
c6528e2f 3645ar6000_rx(void *Context, struct htc_packet *pPacket)
30295c89 3646{
a71f0bf6 3647 struct ar6_softc *ar = (struct ar6_softc *)Context;
30295c89
VM
3648 struct sk_buff *skb = (struct sk_buff *)pPacket->pPktContext;
3649 int minHdrLen;
ab3655da 3650 u8 containsDot11Hdr = 0;
1f4c34bd 3651 int status = pPacket->Status;
30295c89
VM
3652 HTC_ENDPOINT_ID ept = pPacket->Endpoint;
3653
a1d46529 3654 A_ASSERT((status) ||
30295c89
VM
3655 (pPacket->pBuffer == (A_NETBUF_DATA(skb) + HTC_HEADER_LEN)));
3656
3657 AR_DEBUG_PRINTF(ATH_DEBUG_WLAN_RX,("ar6000_rx ar=0x%lx eid=%d, skb=0x%lx, data=0x%lx, len=0x%x status:%d",
3658 (unsigned long)ar, ept, (unsigned long)skb, (unsigned long)pPacket->pBuffer,
3659 pPacket->ActualLength, status));
a1d46529 3660 if (status) {
30295c89
VM
3661 if (status != A_ECANCELED) {
3662 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,("RX ERR (%d) \n",status));
3663 }
3664 }
3665
3666 /* take lock to protect buffer counts
3667 * and adaptive power throughput state */
3668 AR6000_SPIN_LOCK(&ar->arLock, 0);
3669
509c9d97 3670 if (!status) {
30295c89
VM
3671 AR6000_STAT_INC(ar, rx_packets);
3672 ar->arNetStats.rx_bytes += pPacket->ActualLength;
3673#ifdef ADAPTIVE_POWER_THROUGHPUT_CONTROL
3674 aptcTR.bytesReceived += a_netbuf_to_len(skb);
3675 applyAPTCHeuristics(ar);
3676#endif /* ADAPTIVE_POWER_THROUGHPUT_CONTROL */
3677
3678 A_NETBUF_PUT(skb, pPacket->ActualLength + HTC_HEADER_LEN);
3679 A_NETBUF_PULL(skb, HTC_HEADER_LEN);
3680
3681#ifdef DEBUG
3682 if (debugdriver >= 2) {
3683 ar6000_dump_skb(skb);
3684 }
3685#endif /* DEBUG */
3686 }
3687
3688 AR6000_SPIN_UNLOCK(&ar->arLock, 0);
3689
3690 skb->dev = ar->arNetDev;
a1d46529 3691 if (status) {
30295c89
VM
3692 AR6000_STAT_INC(ar, rx_errors);
3693 A_NETBUF_FREE(skb);
1071a134 3694 } else if (ar->arWmiEnabled == true) {
30295c89
VM
3695 if (ept == ar->arControlEp) {
3696 /*
3697 * this is a wmi control msg
3698 */
3699#ifdef CONFIG_PM
1071a134 3700 ar6000_check_wow_status(ar, skb, true);
30295c89
VM
3701#endif /* CONFIG_PM */
3702 wmi_control_rx(ar->arWmi, skb);
3703 } else {
3704 WMI_DATA_HDR *dhdr = (WMI_DATA_HDR *)A_NETBUF_DATA(skb);
1071a134 3705 bool is_amsdu;
ab3655da 3706 u8 tid;
1071a134 3707 bool is_acl_data_frame;
30295c89
VM
3708 is_acl_data_frame = WMI_DATA_HDR_GET_DATA_TYPE(dhdr) == WMI_DATA_HDR_DATA_TYPE_ACL;
3709#ifdef CONFIG_PM
1071a134 3710 ar6000_check_wow_status(ar, NULL, false);
30295c89
VM
3711#endif /* CONFIG_PM */
3712 /*
3713 * this is a wmi data packet
3714 */
3715 // NWF
3716
3717 if (processDot11Hdr) {
3718 minHdrLen = sizeof(WMI_DATA_HDR) + sizeof(struct ieee80211_frame) + sizeof(ATH_LLC_SNAP_HDR);
3719 } else {
3720 minHdrLen = sizeof (WMI_DATA_HDR) + sizeof(ATH_MAC_HDR) +
3721 sizeof(ATH_LLC_SNAP_HDR);
3722 }
3723
3724 /* In the case of AP mode we may receive NULL data frames
3725 * that do not have LLC hdr. They are 16 bytes in size.
3726 * Allow these frames in the AP mode.
3727 * ACL data frames don't follow ethernet frame bounds for
3728 * min length
3729 */
3730 if (ar->arNetworkType != AP_NETWORK && !is_acl_data_frame &&
3731 ((pPacket->ActualLength < minHdrLen) ||
3732 (pPacket->ActualLength > AR6000_MAX_RX_MESSAGE_SIZE)))
3733 {
3734 /*
3735 * packet is too short or too long
3736 */
3737 AR_DEBUG_PRINTF(ATH_DEBUG_INFO,("TOO SHORT or TOO LONG\n"));
3738 AR6000_STAT_INC(ar, rx_errors);
3739 AR6000_STAT_INC(ar, rx_length_errors);
3740 A_NETBUF_FREE(skb);
3741 } else {
4853ac05 3742 u16 seq_no;
ab3655da 3743 u8 meta_type;
30295c89
VM
3744
3745#if 0
3746 /* Access RSSI values here */
3747 AR_DEBUG_PRINTF(ATH_DEBUG_INFO,("RSSI %d\n",
3748 ((WMI_DATA_HDR *) A_NETBUF_DATA(skb))->rssi));
3749#endif
3750 /* Get the Power save state of the STA */
3751 if (ar->arNetworkType == AP_NETWORK) {
3752 sta_t *conn = NULL;
ab3655da 3753 u8 psState=0,prevPsState;
30295c89 3754 ATH_MAC_HDR *datap=NULL;
4853ac05 3755 u16 offset;
30295c89
VM
3756
3757 meta_type = WMI_DATA_HDR_GET_META(dhdr);
3758
3759 psState = (((WMI_DATA_HDR *)A_NETBUF_DATA(skb))->info
3760 >> WMI_DATA_HDR_PS_SHIFT) & WMI_DATA_HDR_PS_MASK;
3761
3762 offset = sizeof(WMI_DATA_HDR);
3763
3764 switch (meta_type) {
3765 case 0:
3766 break;
3767 case WMI_META_VERSION_1:
3768 offset += sizeof(WMI_RX_META_V1);
3769 break;
3770#ifdef CONFIG_CHECKSUM_OFFLOAD
3771 case WMI_META_VERSION_2:
3772 offset += sizeof(WMI_RX_META_V2);
3773 break;
3774#endif
3775 default:
3776 break;
3777 }
3778
3779 datap = (ATH_MAC_HDR *)(A_NETBUF_DATA(skb)+offset);
3780 conn = ieee80211_find_conn(ar, datap->srcMac);
3781
3782 if (conn) {
3783 /* if there is a change in PS state of the STA,
3784 * take appropriate steps.
3785 * 1. If Sleep-->Awake, flush the psq for the STA
3786 * Clear the PVB for the STA.
3787 * 2. If Awake-->Sleep, Starting queueing frames
3788 * the STA.
3789 */
3790 prevPsState = STA_IS_PWR_SLEEP(conn);
3791 if (psState) {
3792 STA_SET_PWR_SLEEP(conn);
3793 } else {
3794 STA_CLR_PWR_SLEEP(conn);
3795 }
3796
3797 if (prevPsState ^ STA_IS_PWR_SLEEP(conn)) {
3798
3799 if (!STA_IS_PWR_SLEEP(conn)) {
3800
3801 A_MUTEX_LOCK(&conn->psqLock);
3802 while (!A_NETBUF_QUEUE_EMPTY(&conn->psq)) {
3803 struct sk_buff *skb=NULL;
3804
3805 skb = A_NETBUF_DEQUEUE(&conn->psq);
3806 A_MUTEX_UNLOCK(&conn->psqLock);
3807 ar6000_data_tx(skb,ar->arNetDev);
3808 A_MUTEX_LOCK(&conn->psqLock);
3809 }
3810 A_MUTEX_UNLOCK(&conn->psqLock);
3811 /* Clear the PVB for this STA */
3812 wmi_set_pvb_cmd(ar->arWmi, conn->aid, 0);
3813 }
3814 }
3815 } else {
3816 /* This frame is from a STA that is not associated*/
1071a134 3817 A_ASSERT(false);
30295c89
VM
3818 }
3819
3820 /* Drop NULL data frames here */
3821 if((pPacket->ActualLength < minHdrLen) ||
3822 (pPacket->ActualLength > AR6000_MAX_RX_MESSAGE_SIZE)) {
3823 A_NETBUF_FREE(skb);
3824 goto rx_done;
3825 }
3826 }
3827
1071a134 3828 is_amsdu = WMI_DATA_HDR_IS_AMSDU(dhdr) ? true : false;
30295c89
VM
3829 tid = WMI_DATA_HDR_GET_UP(dhdr);
3830 seq_no = WMI_DATA_HDR_GET_SEQNO(dhdr);
3831 meta_type = WMI_DATA_HDR_GET_META(dhdr);
3832 containsDot11Hdr = WMI_DATA_HDR_GET_DOT11(dhdr);
3833
3834 wmi_data_hdr_remove(ar->arWmi, skb);
3835
3836 switch (meta_type) {
3837 case WMI_META_VERSION_1:
3838 {
3839 WMI_RX_META_V1 *pMeta = (WMI_RX_META_V1 *)A_NETBUF_DATA(skb);
3840 A_PRINTF("META %d %d %d %d %x\n", pMeta->status, pMeta->rix, pMeta->rssi, pMeta->channel, pMeta->flags);
3841 A_NETBUF_PULL((void*)skb, sizeof(WMI_RX_META_V1));
3842 break;
3843 }
3844#ifdef CONFIG_CHECKSUM_OFFLOAD
3845 case WMI_META_VERSION_2:
3846 {
3847 WMI_RX_META_V2 *pMeta = (WMI_RX_META_V2 *)A_NETBUF_DATA(skb);
3848 if(pMeta->csumFlags & 0x1){
3849 skb->ip_summed=CHECKSUM_COMPLETE;
3850 skb->csum=(pMeta->csum);
3851 }
3852 A_NETBUF_PULL((void*)skb, sizeof(WMI_RX_META_V2));
3853 break;
3854 }
3855#endif
3856 default:
3857 break;
3858 }
3859
4f69cef0 3860 A_ASSERT(status == 0);
30295c89
VM
3861
3862 /* NWF: print the 802.11 hdr bytes */
3863 if(containsDot11Hdr) {
3864 status = wmi_dot11_hdr_remove(ar->arWmi,skb);
3865 } else if(!is_amsdu && !is_acl_data_frame) {
3866 status = wmi_dot3_2_dix(skb);
3867 }
3868
a1d46529 3869 if (status) {
30295c89
VM
3870 /* Drop frames that could not be processed (lack of memory, etc.) */
3871 A_NETBUF_FREE(skb);
3872 goto rx_done;
3873 }
3874
3875 if (is_acl_data_frame) {
3876 A_NETBUF_PUSH(skb, sizeof(int));
3877 *((short *)A_NETBUF_DATA(skb)) = WMI_ACL_DATA_EVENTID;
3878 /* send the data packet to PAL driver */
3879 if(ar6k_pal_config_g.fpar6k_pal_recv_pkt) {
1071a134 3880 if((*ar6k_pal_config_g.fpar6k_pal_recv_pkt)(ar->hcipal_info, skb) == true)
30295c89
VM
3881 goto rx_done;
3882 }
3883 }
3884
3885 if ((ar->arNetDev->flags & IFF_UP) == IFF_UP) {
3886 if (ar->arNetworkType == AP_NETWORK) {
3887 struct sk_buff *skb1 = NULL;
3888 ATH_MAC_HDR *datap;
3889
3890 datap = (ATH_MAC_HDR *)A_NETBUF_DATA(skb);
3891 if (IEEE80211_IS_MULTICAST(datap->dstMac)) {
3892 /* Bcast/Mcast frames should be sent to the OS
3893 * stack as well as on the air.
3894 */
3895 skb1 = skb_copy(skb,GFP_ATOMIC);
3896 } else {
3897 /* Search for a connected STA with dstMac as
3898 * the Mac address. If found send the frame to
3899 * it on the air else send the frame up the
3900 * stack
3901 */
3902 sta_t *conn = NULL;
3903 conn = ieee80211_find_conn(ar, datap->dstMac);
3904
3905 if (conn && ar->intra_bss) {
3906 skb1 = skb;
3907 skb = NULL;
3908 } else if(conn && !ar->intra_bss) {
3909 A_NETBUF_FREE(skb);
3910 skb = NULL;
3911 }
3912 }
3913 if (skb1) {
3914 ar6000_data_tx(skb1, ar->arNetDev);
3915 }
3916 }
3917 }
3918#ifdef ATH_AR6K_11N_SUPPORT
3919 aggr_process_recv_frm(ar->aggr_cntxt, tid, seq_no, is_amsdu, (void **)&skb);
3920#endif
3921 ar6000_deliver_frames_to_nw_stack((void *) ar->arNetDev, (void *)skb);
3922 }
3923 }
3924 } else {
3925 if (EPPING_ALIGNMENT_PAD > 0) {
3926 A_NETBUF_PULL(skb, EPPING_ALIGNMENT_PAD);
3927 }
3928 ar6000_deliver_frames_to_nw_stack((void *)ar->arNetDev, (void *)skb);
3929 }
3930
3931rx_done:
3932
3933 return;
3934}
3935
3936static void
3937ar6000_deliver_frames_to_nw_stack(void *dev, void *osbuf)
3938{
3939 struct sk_buff *skb = (struct sk_buff *)osbuf;
3940
3941 if(skb) {
3942 skb->dev = dev;
3943 if ((skb->dev->flags & IFF_UP) == IFF_UP) {
3944#ifdef CONFIG_PM
a71f0bf6 3945 ar6000_check_wow_status((struct ar6_softc *)ar6k_priv(dev), skb, false);
30295c89
VM
3946#endif /* CONFIG_PM */
3947 skb->protocol = eth_type_trans(skb, skb->dev);
3948 /*
3949 * If this routine is called on a ISR (Hard IRQ) or DSR (Soft IRQ)
3950 * or tasklet use the netif_rx to deliver the packet to the stack
3951 * netif_rx will queue the packet onto the receive queue and mark
3952 * the softirq thread has a pending action to complete. Kernel will
3953 * schedule the softIrq kernel thread after processing the DSR.
3954 *
3955 * If this routine is called on a process context, use netif_rx_ni
3956 * which will schedle the softIrq kernel thread after queuing the packet.
3957 */
3958 if (in_interrupt()) {
3959 netif_rx(skb);
3960 } else {
3961 netif_rx_ni(skb);
3962 }
3963 } else {
3964 A_NETBUF_FREE(skb);
3965 }
3966 }
3967}
3968
3969#if 0
3970static void
3971ar6000_deliver_frames_to_bt_stack(void *dev, void *osbuf)
3972{
3973 struct sk_buff *skb = (struct sk_buff *)osbuf;
3974
3975 if(skb) {
3976 skb->dev = dev;
3977 if ((skb->dev->flags & IFF_UP) == IFF_UP) {
3978 skb->protocol = htons(ETH_P_CONTROL);
3979 netif_rx(skb);
3980 } else {
3981 A_NETBUF_FREE(skb);
3982 }
3983 }
3984}
3985#endif
3986
3987static void
3988ar6000_rx_refill(void *Context, HTC_ENDPOINT_ID Endpoint)
3989{
a71f0bf6 3990 struct ar6_softc *ar = (struct ar6_softc *)Context;
30295c89
VM
3991 void *osBuf;
3992 int RxBuffers;
3993 int buffersToRefill;
c6528e2f 3994 struct htc_packet *pPacket;
6ca0f664 3995 struct htc_packet_queue queue;
30295c89
VM
3996
3997 buffersToRefill = (int)AR6000_MAX_RX_BUFFERS -
3998 HTCGetNumRecvBuffers(ar->arHtcTarget, Endpoint);
3999
4000 if (buffersToRefill <= 0) {
4001 /* fast return, nothing to fill */
4002 return;
4003 }
4004
4005 INIT_HTC_PACKET_QUEUE(&queue);
4006
4007 AR_DEBUG_PRINTF(ATH_DEBUG_WLAN_RX,("ar6000_rx_refill: providing htc with %d buffers at eid=%d\n",
4008 buffersToRefill, Endpoint));
4009
4010 for (RxBuffers = 0; RxBuffers < buffersToRefill; RxBuffers++) {
4011 osBuf = A_NETBUF_ALLOC(AR6000_BUFFER_SIZE);
4012 if (NULL == osBuf) {
4013 break;
4014 }
4015 /* the HTC packet wrapper is at the head of the reserved area
4016 * in the skb */
c6528e2f 4017 pPacket = (struct htc_packet *)(A_NETBUF_HEAD(osBuf));
30295c89
VM
4018 /* set re-fill info */
4019 SET_HTC_PACKET_INFO_RX_REFILL(pPacket,osBuf,A_NETBUF_DATA(osBuf),AR6000_BUFFER_SIZE,Endpoint);
4020 /* add to queue */
4021 HTC_PACKET_ENQUEUE(&queue,pPacket);
4022 }
4023
4024 if (!HTC_QUEUE_EMPTY(&queue)) {
4025 /* add packets */
4026 HTCAddReceivePktMultiple(ar->arHtcTarget, &queue);
4027 }
4028
4029}
4030
4031 /* clean up our amsdu buffer list */
a71f0bf6 4032static void ar6000_cleanup_amsdu_rxbufs(struct ar6_softc *ar)
30295c89 4033{
c6528e2f 4034 struct htc_packet *pPacket;
30295c89
VM
4035 void *osBuf;
4036
4037 /* empty AMSDU buffer queue and free OS bufs */
1071a134 4038 while (true) {
30295c89
VM
4039
4040 AR6000_SPIN_LOCK(&ar->arLock, 0);
4041 pPacket = HTC_PACKET_DEQUEUE(&ar->amsdu_rx_buffer_queue);
4042 AR6000_SPIN_UNLOCK(&ar->arLock, 0);
4043
4044 if (NULL == pPacket) {
4045 break;
4046 }
4047
4048 osBuf = pPacket->pPktContext;
4049 if (NULL == osBuf) {
1071a134 4050 A_ASSERT(false);
30295c89
VM
4051 break;
4052 }
4053
4054 A_NETBUF_FREE(osBuf);
4055 }
4056
4057}
4058
4059
4060 /* refill the amsdu buffer list */
a71f0bf6 4061static void ar6000_refill_amsdu_rxbufs(struct ar6_softc *ar, int Count)
30295c89 4062{
c6528e2f 4063 struct htc_packet *pPacket;
30295c89
VM
4064 void *osBuf;
4065
4066 while (Count > 0) {
4067 osBuf = A_NETBUF_ALLOC(AR6000_AMSDU_BUFFER_SIZE);
4068 if (NULL == osBuf) {
4069 break;
4070 }
4071 /* the HTC packet wrapper is at the head of the reserved area
4072 * in the skb */
c6528e2f 4073 pPacket = (struct htc_packet *)(A_NETBUF_HEAD(osBuf));
30295c89
VM
4074 /* set re-fill info */
4075 SET_HTC_PACKET_INFO_RX_REFILL(pPacket,osBuf,A_NETBUF_DATA(osBuf),AR6000_AMSDU_BUFFER_SIZE,0);
4076
4077 AR6000_SPIN_LOCK(&ar->arLock, 0);
4078 /* put it in the list */
4079 HTC_PACKET_ENQUEUE(&ar->amsdu_rx_buffer_queue,pPacket);
4080 AR6000_SPIN_UNLOCK(&ar->arLock, 0);
4081 Count--;
4082 }
4083
4084}
4085
4086 /* callback to allocate a large receive buffer for a pending packet. This function is called when
4087 * an HTC packet arrives whose length exceeds a threshold value
4088 *
4089 * We use a pre-allocated list of buffers of maximum AMSDU size (4K). Under linux it is more optimal to
4090 * keep the allocation size the same to optimize cached-slab allocations.
4091 *
4092 * */
c6528e2f 4093static struct htc_packet *ar6000_alloc_amsdu_rxbuf(void *Context, HTC_ENDPOINT_ID Endpoint, int Length)
30295c89 4094{
c6528e2f 4095 struct htc_packet *pPacket = NULL;
a71f0bf6 4096 struct ar6_softc *ar = (struct ar6_softc *)Context;
30295c89
VM
4097 int refillCount = 0;
4098
4099 AR_DEBUG_PRINTF(ATH_DEBUG_WLAN_RX,("ar6000_alloc_amsdu_rxbuf: eid=%d, Length:%d\n",Endpoint,Length));
4100
4101 do {
4102
4103 if (Length <= AR6000_BUFFER_SIZE) {
4104 /* shouldn't be getting called on normal sized packets */
1071a134 4105 A_ASSERT(false);
30295c89
VM
4106 break;
4107 }
4108
4109 if (Length > AR6000_AMSDU_BUFFER_SIZE) {
1071a134 4110 A_ASSERT(false);
30295c89
VM
4111 break;
4112 }
4113
4114 AR6000_SPIN_LOCK(&ar->arLock, 0);
4115 /* allocate a packet from the list */
4116 pPacket = HTC_PACKET_DEQUEUE(&ar->amsdu_rx_buffer_queue);
4117 /* see if we need to refill again */
4118 refillCount = AR6000_MAX_AMSDU_RX_BUFFERS - HTC_PACKET_QUEUE_DEPTH(&ar->amsdu_rx_buffer_queue);
4119 AR6000_SPIN_UNLOCK(&ar->arLock, 0);
4120
4121 if (NULL == pPacket) {
4122 break;
4123 }
4124 /* set actual endpoint ID */
4125 pPacket->Endpoint = Endpoint;
4126
1071a134 4127 } while (false);
30295c89
VM
4128
4129 if (refillCount >= AR6000_AMSDU_REFILL_THRESHOLD) {
4130 ar6000_refill_amsdu_rxbufs(ar,refillCount);
4131 }
4132
4133 return pPacket;
4134}
4135
4136static void
4137ar6000_set_multicast_list(struct net_device *dev)
4138{
4139 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,("ar6000: Multicast filter not supported\n"));
4140}
4141
4142static struct net_device_stats *
4143ar6000_get_stats(struct net_device *dev)
4144{
a71f0bf6 4145 struct ar6_softc *ar = (struct ar6_softc *)ar6k_priv(dev);
30295c89
VM
4146 return &ar->arNetStats;
4147}
4148
4149static struct iw_statistics *
4150ar6000_get_iwstats(struct net_device * dev)
4151{
a71f0bf6 4152 struct ar6_softc *ar = (struct ar6_softc *)ar6k_priv(dev);
30295c89
VM
4153 TARGET_STATS *pStats = &ar->arTargetStats;
4154 struct iw_statistics * pIwStats = &ar->arIwStats;
4155 int rtnllocked;
4156
1071a134 4157 if (ar->bIsDestroyProgress || ar->arWmiReady == false || ar->arWlanState == WLAN_DISABLED)
30295c89
VM
4158 {
4159 pIwStats->status = 0;
4160 pIwStats->qual.qual = 0;
4161 pIwStats->qual.level =0;
4162 pIwStats->qual.noise = 0;
4163 pIwStats->discard.code =0;
4164 pIwStats->discard.retries=0;
4165 pIwStats->miss.beacon =0;
4166 return pIwStats;
4167 }
4168
4169 /*
4170 * The in_atomic function is used to determine if the scheduling is
4171 * allowed in the current context or not. This was introduced in 2.6
4172 * From what I have read on the differences between 2.4 and 2.6, the
4173 * 2.4 kernel did not support preemption and so this check might not
4174 * be required for 2.4 kernels.
4175 */
4176 if (in_atomic())
4177 {
4178 wmi_get_stats_cmd(ar->arWmi);
4179
4180 pIwStats->status = 1 ;
4181 pIwStats->qual.qual = pStats->cs_aveBeacon_rssi - 161;
4182 pIwStats->qual.level =pStats->cs_aveBeacon_rssi; /* noise is -95 dBm */
4183 pIwStats->qual.noise = pStats->noise_floor_calibation;
4184 pIwStats->discard.code = pStats->rx_decrypt_err;
4185 pIwStats->discard.retries = pStats->tx_retry_cnt;
4186 pIwStats->miss.beacon = pStats->cs_bmiss_cnt;
4187 return pIwStats;
4188 }
4189
4190 dev_hold(dev);
4191 rtnllocked = rtnl_is_locked();
4192 if (rtnllocked) {
4193 rtnl_unlock();
4194 }
4195 pIwStats->status = 0;
4196
4197 if (down_interruptible(&ar->arSem)) {
4198 goto err_exit;
4199 }
4200
4201 do {
4202
4203 if (ar->bIsDestroyProgress || ar->arWlanState == WLAN_DISABLED) {
4204 break;
4205 }
4206
1071a134 4207 ar->statsUpdatePending = true;
30295c89 4208
4f69cef0 4209 if(wmi_get_stats_cmd(ar->arWmi) != 0) {
30295c89
VM
4210 break;
4211 }
4212
1071a134 4213 wait_event_interruptible_timeout(arEvent, ar->statsUpdatePending == false, wmitimeout * HZ);
30295c89
VM
4214 if (signal_pending(current)) {
4215 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,("ar6000 : WMI get stats timeout \n"));
4216 break;
4217 }
4218 pIwStats->status = 1 ;
4219 pIwStats->qual.qual = pStats->cs_aveBeacon_rssi - 161;
4220 pIwStats->qual.level =pStats->cs_aveBeacon_rssi; /* noise is -95 dBm */
4221 pIwStats->qual.noise = pStats->noise_floor_calibation;
4222 pIwStats->discard.code = pStats->rx_decrypt_err;
4223 pIwStats->discard.retries = pStats->tx_retry_cnt;
4224 pIwStats->miss.beacon = pStats->cs_bmiss_cnt;
4225 } while (0);
4226 up(&ar->arSem);
4227
4228err_exit:
4229 if (rtnllocked) {
4230 rtnl_lock();
4231 }
4232 dev_put(dev);
4233 return pIwStats;
4234}
4235
4236void
e1ce2a3a 4237ar6000_ready_event(void *devt, u8 *datap, u8 phyCap, u32 sw_ver, u32 abi_ver)
30295c89 4238{
a71f0bf6 4239 struct ar6_softc *ar = (struct ar6_softc *)devt;
30295c89
VM
4240 struct net_device *dev = ar->arNetDev;
4241
05209262 4242 memcpy(dev->dev_addr, datap, AR6000_ETH_ADDR_LEN);
30295c89
VM
4243 AR_DEBUG_PRINTF(ATH_DEBUG_INFO,("mac address = %2.2x:%2.2x:%2.2x:%2.2x:%2.2x:%2.2x\n",
4244 dev->dev_addr[0], dev->dev_addr[1],
4245 dev->dev_addr[2], dev->dev_addr[3],
4246 dev->dev_addr[4], dev->dev_addr[5]));
4247
4248 ar->arPhyCapability = phyCap;
4249 ar->arVersion.wlan_ver = sw_ver;
4250 ar->arVersion.abi_ver = abi_ver;
4251
9b906a33 4252 /* Indicate to the waiting thread that the ready event was received */
1071a134 4253 ar->arWmiReady = true;
9b906a33 4254 wake_up(&arEvent);
30295c89
VM
4255}
4256
4257void
a71f0bf6 4258add_new_sta(struct ar6_softc *ar, u8 *mac, u16 aid, u8 *wpaie,
ab3655da 4259 u8 ielen, u8 keymgmt, u8 ucipher, u8 auth)
30295c89 4260{
ab3655da 4261 u8 free_slot=aid-1;
30295c89 4262
05209262
LR
4263 memcpy(ar->sta_list[free_slot].mac, mac, ATH_MAC_LEN);
4264 memcpy(ar->sta_list[free_slot].wpa_ie, wpaie, ielen);
30295c89
VM
4265 ar->sta_list[free_slot].aid = aid;
4266 ar->sta_list[free_slot].keymgmt = keymgmt;
4267 ar->sta_list[free_slot].ucipher = ucipher;
4268 ar->sta_list[free_slot].auth = auth;
4269 ar->sta_list_index = ar->sta_list_index | (1 << free_slot);
4270 ar->arAPStats.sta[free_slot].aid = aid;
4271}
4272
4273void
a71f0bf6 4274ar6000_connect_event(struct ar6_softc *ar, u16 channel, u8 *bssid,
4853ac05 4275 u16 listenInterval, u16 beaconInterval,
ab3655da
JP
4276 NETWORK_TYPE networkType, u8 beaconIeLen,
4277 u8 assocReqLen, u8 assocRespLen,
4278 u8 *assocInfo)
30295c89
VM
4279{
4280 union iwreq_data wrqu;
4281 int i, beacon_ie_pos, assoc_resp_ie_pos, assoc_req_ie_pos;
4282 static const char *tag1 = "ASSOCINFO(ReqIEs=";
4283 static const char *tag2 = "ASSOCRESPIE=";
4284 static const char *beaconIetag = "BEACONIE=";
4285 char buf[WMI_CONTROL_MSG_MAX_LEN * 2 + strlen(tag1) + 1];
4286 char *pos;
ab3655da 4287 u8 key_op_ctrl;
30295c89
VM
4288 unsigned long flags;
4289 struct ieee80211req_key *ik;
4290 CRYPTO_TYPE keyType = NONE_CRYPT;
4291
4292 if(ar->arNetworkType & AP_NETWORK) {
4293 struct net_device *dev = ar->arNetDev;
395e1cae 4294 if(memcmp(dev->dev_addr, bssid, ATH_MAC_LEN)==0) {
30295c89
VM
4295 ar->arACS = channel;
4296 ik = &ar->ap_mode_bkey;
4297
4298 switch(ar->arAuthMode) {
4299 case NONE_AUTH:
4300 if(ar->arPairwiseCrypto == WEP_CRYPT) {
4301 ar6000_install_static_wep_keys(ar);
4302 }
4303#ifdef WAPI_ENABLE
4304 else if(ar->arPairwiseCrypto == WAPI_CRYPT) {
4305 ap_set_wapi_key(ar, ik);
4306 }
4307#endif
4308 break;
4309 case WPA_PSK_AUTH:
4310 case WPA2_PSK_AUTH:
4311 case (WPA_PSK_AUTH|WPA2_PSK_AUTH):
4312 switch (ik->ik_type) {
4313 case IEEE80211_CIPHER_TKIP:
4314 keyType = TKIP_CRYPT;
4315 break;
4316 case IEEE80211_CIPHER_AES_CCM:
4317 keyType = AES_CRYPT;
4318 break;
4319 default:
4320 goto skip_key;
4321 }
4322 wmi_addKey_cmd(ar->arWmi, ik->ik_keyix, keyType, GROUP_USAGE,
ab3655da 4323 ik->ik_keylen, (u8 *)&ik->ik_keyrsc,
30295c89
VM
4324 ik->ik_keydata, KEY_OP_INIT_VAL, ik->ik_macaddr,
4325 SYNC_BOTH_WMIFLAG);
4326
4327 break;
4328 }
4329skip_key:
1071a134 4330 ar->arConnected = true;
30295c89
VM
4331 return;
4332 }
4333
4334 A_PRINTF("NEW STA %2.2x:%2.2x:%2.2x:%2.2x:%2.2x:%2.2x \n "
4335 " AID=%d \n", bssid[0], bssid[1], bssid[2],
4336 bssid[3], bssid[4], bssid[5], channel);
4337 switch ((listenInterval>>8)&0xFF) {
4338 case OPEN_AUTH:
4339 A_PRINTF("AUTH: OPEN\n");
4340 break;
4341 case SHARED_AUTH:
4342 A_PRINTF("AUTH: SHARED\n");
4343 break;
4344 default:
4345 A_PRINTF("AUTH: Unknown\n");
4346 break;
4347 };
4348 switch (listenInterval&0xFF) {
4349 case WPA_PSK_AUTH:
4350 A_PRINTF("KeyMgmt: WPA-PSK\n");
4351 break;
4352 case WPA2_PSK_AUTH:
4353 A_PRINTF("KeyMgmt: WPA2-PSK\n");
4354 break;
4355 default:
4356 A_PRINTF("KeyMgmt: NONE\n");
4357 break;
4358 };
4359 switch (beaconInterval) {
4360 case AES_CRYPT:
4361 A_PRINTF("Cipher: AES\n");
4362 break;
4363 case TKIP_CRYPT:
4364 A_PRINTF("Cipher: TKIP\n");
4365 break;
4366 case WEP_CRYPT:
4367 A_PRINTF("Cipher: WEP\n");
4368 break;
4369#ifdef WAPI_ENABLE
4370 case WAPI_CRYPT:
4371 A_PRINTF("Cipher: WAPI\n");
4372 break;
4373#endif
4374 default:
4375 A_PRINTF("Cipher: NONE\n");
4376 break;
4377 };
4378
4379 add_new_sta(ar, bssid, channel /*aid*/,
4380 assocInfo /* WPA IE */, assocRespLen /* IE len */,
4381 listenInterval&0xFF /* Keymgmt */, beaconInterval /* cipher */,
4382 (listenInterval>>8)&0xFF /* auth alg */);
4383
4384 /* Send event to application */
4385 A_MEMZERO(&wrqu, sizeof(wrqu));
05209262 4386 memcpy(wrqu.addr.sa_data, bssid, ATH_MAC_LEN);
30295c89
VM
4387 wireless_send_event(ar->arNetDev, IWEVREGISTERED, &wrqu, NULL);
4388 /* In case the queue is stopped when we switch modes, this will
4389 * wake it up
4390 */
4391 netif_wake_queue(ar->arNetDev);
4392 return;
4393 }
4394
4395#ifdef ATH6K_CONFIG_CFG80211
4396 ar6k_cfg80211_connect_event(ar, channel, bssid,
4397 listenInterval, beaconInterval,
4398 networkType, beaconIeLen,
4399 assocReqLen, assocRespLen,
4400 assocInfo);
4401#endif /* ATH6K_CONFIG_CFG80211 */
4402
05209262 4403 memcpy(ar->arBssid, bssid, sizeof(ar->arBssid));
30295c89
VM
4404 ar->arBssChannel = channel;
4405
4406 A_PRINTF("AR6000 connected event on freq %d ", channel);
4407 A_PRINTF("with bssid %2.2x:%2.2x:%2.2x:%2.2x:%2.2x:%2.2x "
4408 " listenInterval=%d, beaconInterval = %d, beaconIeLen = %d assocReqLen=%d"
4409 " assocRespLen =%d\n",
4410 bssid[0], bssid[1], bssid[2],
4411 bssid[3], bssid[4], bssid[5],
4412 listenInterval, beaconInterval,
4413 beaconIeLen, assocReqLen, assocRespLen);
4414 if (networkType & ADHOC_NETWORK) {
4415 if (networkType & ADHOC_CREATOR) {
4416 A_PRINTF("Network: Adhoc (Creator)\n");
4417 } else {
4418 A_PRINTF("Network: Adhoc (Joiner)\n");
4419 }
4420 } else {
4421 A_PRINTF("Network: Infrastructure\n");
4422 }
4423
4424 if ((ar->arNetworkType == INFRA_NETWORK)) {
4425 wmi_listeninterval_cmd(ar->arWmi, ar->arListenIntervalT, ar->arListenIntervalB);
4426 }
4427
4428 if (beaconIeLen && (sizeof(buf) > (9 + beaconIeLen * 2))) {
4429 AR_DEBUG_PRINTF(ATH_DEBUG_WLAN_CONNECT,("\nBeaconIEs= "));
4430
4431 beacon_ie_pos = 0;
4432 A_MEMZERO(buf, sizeof(buf));
4433 sprintf(buf, "%s", beaconIetag);
4434 pos = buf + 9;
4435 for (i = beacon_ie_pos; i < beacon_ie_pos + beaconIeLen; i++) {
4436 AR_DEBUG_PRINTF(ATH_DEBUG_WLAN_CONNECT,("%2.2x ", assocInfo[i]));
4437 sprintf(pos, "%2.2x", assocInfo[i]);
4438 pos += 2;
4439 }
4440 AR_DEBUG_PRINTF(ATH_DEBUG_WLAN_CONNECT,("\n"));
4441
4442 A_MEMZERO(&wrqu, sizeof(wrqu));
4443 wrqu.data.length = strlen(buf);
4444 wireless_send_event(ar->arNetDev, IWEVCUSTOM, &wrqu, buf);
4445 }
4446
4447 if (assocRespLen && (sizeof(buf) > (12 + (assocRespLen * 2))))
4448 {
4449 assoc_resp_ie_pos = beaconIeLen + assocReqLen +
4853ac05
JP
4450 sizeof(u16) + /* capinfo*/
4451 sizeof(u16) + /* status Code */
4452 sizeof(u16) ; /* associd */
30295c89
VM
4453 A_MEMZERO(buf, sizeof(buf));
4454 sprintf(buf, "%s", tag2);
4455 pos = buf + 12;
4456 AR_DEBUG_PRINTF(ATH_DEBUG_WLAN_CONNECT,("\nAssocRespIEs= "));
4457 /*
4458 * The Association Response Frame w.o. the WLAN header is delivered to
4459 * the host, so skip over to the IEs
4460 */
4461 for (i = assoc_resp_ie_pos; i < assoc_resp_ie_pos + assocRespLen - 6; i++)
4462 {
4463 AR_DEBUG_PRINTF(ATH_DEBUG_WLAN_CONNECT,("%2.2x ", assocInfo[i]));
4464 sprintf(pos, "%2.2x", assocInfo[i]);
4465 pos += 2;
4466 }
4467 AR_DEBUG_PRINTF(ATH_DEBUG_WLAN_CONNECT,("\n"));
4468
4469 A_MEMZERO(&wrqu, sizeof(wrqu));
4470 wrqu.data.length = strlen(buf);
4471 wireless_send_event(ar->arNetDev, IWEVCUSTOM, &wrqu, buf);
4472 }
4473
4474 if (assocReqLen && (sizeof(buf) > (17 + (assocReqLen * 2)))) {
4475 /*
4476 * assoc Request includes capability and listen interval. Skip these.
4477 */
4478 assoc_req_ie_pos = beaconIeLen +
4853ac05
JP
4479 sizeof(u16) + /* capinfo*/
4480 sizeof(u16); /* listen interval */
30295c89
VM
4481
4482 A_MEMZERO(buf, sizeof(buf));
4483 sprintf(buf, "%s", tag1);
4484 pos = buf + 17;
4485 AR_DEBUG_PRINTF(ATH_DEBUG_WLAN_CONNECT,("AssocReqIEs= "));
4486 for (i = assoc_req_ie_pos; i < assoc_req_ie_pos + assocReqLen - 4; i++) {
4487 AR_DEBUG_PRINTF(ATH_DEBUG_WLAN_CONNECT,("%2.2x ", assocInfo[i]));
4488 sprintf(pos, "%2.2x", assocInfo[i]);
859171ca 4489 pos += 2;
30295c89
VM
4490 }
4491 AR_DEBUG_PRINTF(ATH_DEBUG_WLAN_CONNECT,("\n"));
4492
4493 A_MEMZERO(&wrqu, sizeof(wrqu));
4494 wrqu.data.length = strlen(buf);
4495 wireless_send_event(ar->arNetDev, IWEVCUSTOM, &wrqu, buf);
4496 }
4497
4498#ifdef USER_KEYS
4499 if (ar->user_savedkeys_stat == USER_SAVEDKEYS_STAT_RUN &&
1071a134 4500 ar->user_saved_keys.keyOk == true)
30295c89
VM
4501 {
4502 key_op_ctrl = KEY_OP_VALID_MASK & ~KEY_OP_INIT_TSC;
4503
4504 if (ar->user_key_ctrl & AR6000_USER_SETKEYS_RSC_UNCHANGED) {
4505 key_op_ctrl &= ~KEY_OP_INIT_RSC;
4506 } else {
4507 key_op_ctrl |= KEY_OP_INIT_RSC;
4508 }
4509 ar6000_reinstall_keys(ar, key_op_ctrl);
4510 }
4511#endif /* USER_KEYS */
4512
4513 netif_wake_queue(ar->arNetDev);
4514
4515 /* For CFG80211 the key configuration and the default key comes in after connect so no point in plumbing invalid keys */
4516#ifndef ATH6K_CONFIG_CFG80211
4517 if ((networkType & ADHOC_NETWORK) &&
4518 (OPEN_AUTH == ar->arDot11AuthMode) &&
4519 (NONE_AUTH == ar->arAuthMode) &&
4520 (WEP_CRYPT == ar->arPairwiseCrypto))
4521 {
4522 if (!ar->arConnected) {
4523 wmi_addKey_cmd(ar->arWmi,
4524 ar->arDefTxKeyIndex,
4525 WEP_CRYPT,
4526 GROUP_USAGE | TX_USAGE,
4527 ar->arWepKeyList[ar->arDefTxKeyIndex].arKeyLen,
4528 NULL,
4529 ar->arWepKeyList[ar->arDefTxKeyIndex].arKey, KEY_OP_INIT_VAL, NULL,
4530 NO_SYNC_WMIFLAG);
4531 }
4532 }
4533#endif /* ATH6K_CONFIG_CFG80211 */
4534
4535 /* Update connect & link status atomically */
4536 spin_lock_irqsave(&ar->arLock, flags);
1071a134
JP
4537 ar->arConnected = true;
4538 ar->arConnectPending = false;
30295c89
VM
4539 netif_carrier_on(ar->arNetDev);
4540 spin_unlock_irqrestore(&ar->arLock, flags);
4541 /* reset the rx aggr state */
4542 aggr_reset_state(ar->aggr_cntxt);
4543 reconnect_flag = 0;
4544
4545 A_MEMZERO(&wrqu, sizeof(wrqu));
05209262 4546 memcpy(wrqu.addr.sa_data, bssid, IEEE80211_ADDR_LEN);
30295c89
VM
4547 wrqu.addr.sa_family = ARPHRD_ETHER;
4548 wireless_send_event(ar->arNetDev, SIOCGIWAP, &wrqu, NULL);
4549 if ((ar->arNetworkType == ADHOC_NETWORK) && ar->arIbssPsEnable) {
4550 A_MEMZERO(ar->arNodeMap, sizeof(ar->arNodeMap));
4551 ar->arNodeNum = 0;
4552 ar->arNexEpId = ENDPOINT_2;
4553 }
4554 if (!ar->arUserBssFilter) {
4555 wmi_bssfilter_cmd(ar->arWmi, NONE_BSS_FILTER, 0);
4556 }
4557
4558}
4559
a71f0bf6 4560void ar6000_set_numdataendpts(struct ar6_softc *ar, u32 num)
30295c89
VM
4561{
4562 A_ASSERT(num <= (HTC_MAILBOX_NUM_MAX - 1));
4563 ar->arNumDataEndPts = num;
4564}
4565
4566void
a71f0bf6 4567sta_cleanup(struct ar6_softc *ar, u8 i)
30295c89
VM
4568{
4569 struct sk_buff *skb;
4570
4571 /* empty the queued pkts in the PS queue if any */
4572 A_MUTEX_LOCK(&ar->sta_list[i].psqLock);
4573 while (!A_NETBUF_QUEUE_EMPTY(&ar->sta_list[i].psq)) {
4574 skb = A_NETBUF_DEQUEUE(&ar->sta_list[i].psq);
4575 A_NETBUF_FREE(skb);
4576 }
4577 A_MUTEX_UNLOCK(&ar->sta_list[i].psqLock);
4578
4579 /* Zero out the state fields */
4580 A_MEMZERO(&ar->arAPStats.sta[ar->sta_list[i].aid-1], sizeof(WMI_PER_STA_STAT));
4581 A_MEMZERO(&ar->sta_list[i].mac, ATH_MAC_LEN);
4582 A_MEMZERO(&ar->sta_list[i].wpa_ie, IEEE80211_MAX_IE);
4583 ar->sta_list[i].aid = 0;
4584 ar->sta_list[i].flags = 0;
4585
4586 ar->sta_list_index = ar->sta_list_index & ~(1 << i);
4587
4588}
4589
a71f0bf6 4590u8 remove_sta(struct ar6_softc *ar, u8 *mac, u16 reason)
30295c89 4591{
ab3655da 4592 u8 i, removed=0;
30295c89
VM
4593
4594 if(IS_MAC_NULL(mac)) {
4595 return removed;
4596 }
4597
4598 if(IS_MAC_BCAST(mac)) {
4599 A_PRINTF("DEL ALL STA\n");
4600 for(i=0; i < AP_MAX_NUM_STA; i++) {
4601 if(!IS_MAC_NULL(ar->sta_list[i].mac)) {
4602 sta_cleanup(ar, i);
4603 removed = 1;
4604 }
4605 }
4606 } else {
4607 for(i=0; i < AP_MAX_NUM_STA; i++) {
395e1cae 4608 if(memcmp(ar->sta_list[i].mac, mac, ATH_MAC_LEN)==0) {
30295c89
VM
4609 A_PRINTF("DEL STA %2.2x:%2.2x:%2.2x:%2.2x:%2.2x:%2.2x "
4610 " aid=%d REASON=%d\n", mac[0], mac[1], mac[2],
4611 mac[3], mac[4], mac[5], ar->sta_list[i].aid, reason);
4612
4613 sta_cleanup(ar, i);
4614 removed = 1;
4615 break;
4616 }
4617 }
4618 }
4619 return removed;
4620}
4621
4622void
a71f0bf6 4623ar6000_disconnect_event(struct ar6_softc *ar, u8 reason, u8 *bssid,
4853ac05 4624 u8 assocRespLen, u8 *assocInfo, u16 protocolReasonStatus)
30295c89 4625{
ab3655da 4626 u8 i;
30295c89
VM
4627 unsigned long flags;
4628 union iwreq_data wrqu;
4629
4630 if(ar->arNetworkType & AP_NETWORK) {
4631 union iwreq_data wrqu;
4632 struct sk_buff *skb;
4633
4634 if(!remove_sta(ar, bssid, protocolReasonStatus)) {
4635 return;
4636 }
4637
4638 /* If there are no more associated STAs, empty the mcast PS q */
4639 if (ar->sta_list_index == 0) {
4640 A_MUTEX_LOCK(&ar->mcastpsqLock);
4641 while (!A_NETBUF_QUEUE_EMPTY(&ar->mcastpsq)) {
4642 skb = A_NETBUF_DEQUEUE(&ar->mcastpsq);
4643 A_NETBUF_FREE(skb);
4644 }
4645 A_MUTEX_UNLOCK(&ar->mcastpsqLock);
4646
4647 /* Clear the LSB of the BitMapCtl field of the TIM IE */
4648 if (ar->arWmiReady) {
4649 wmi_set_pvb_cmd(ar->arWmi, MCAST_AID, 0);
4650 }
4651 }
4652
4653 if(!IS_MAC_BCAST(bssid)) {
4654 /* Send event to application */
4655 A_MEMZERO(&wrqu, sizeof(wrqu));
05209262 4656 memcpy(wrqu.addr.sa_data, bssid, ATH_MAC_LEN);
30295c89
VM
4657 wireless_send_event(ar->arNetDev, IWEVEXPIRED, &wrqu, NULL);
4658 }
83195cc8
VM
4659
4660 ar->arConnected = false;
30295c89
VM
4661 return;
4662 }
4663
4664#ifdef ATH6K_CONFIG_CFG80211
4665 ar6k_cfg80211_disconnect_event(ar, reason, bssid,
4666 assocRespLen, assocInfo,
4667 protocolReasonStatus);
4668#endif /* ATH6K_CONFIG_CFG80211 */
4669
4670 /* Send disconnect event to supplicant */
4671 A_MEMZERO(&wrqu, sizeof(wrqu));
4672 wrqu.addr.sa_family = ARPHRD_ETHER;
4673 wireless_send_event(ar->arNetDev, SIOCGIWAP, &wrqu, NULL);
4674
4675 /* it is necessary to clear the host-side rx aggregation state */
4676 aggr_reset_state(ar->aggr_cntxt);
4677
4678 A_UNTIMEOUT(&ar->disconnect_timer);
4679
4680 A_PRINTF("AR6000 disconnected");
4681 if (bssid[0] || bssid[1] || bssid[2] || bssid[3] || bssid[4] || bssid[5]) {
4682 A_PRINTF(" from %2.2x:%2.2x:%2.2x:%2.2x:%2.2x:%2.2x ",
4683 bssid[0], bssid[1], bssid[2], bssid[3], bssid[4], bssid[5]);
4684 }
4685
4686 AR_DEBUG_PRINTF(ATH_DEBUG_WLAN_CONNECT,("\nDisconnect Reason is %d", reason));
4687 AR_DEBUG_PRINTF(ATH_DEBUG_WLAN_CONNECT,("\nProtocol Reason/Status Code is %d", protocolReasonStatus));
4688 AR_DEBUG_PRINTF(ATH_DEBUG_WLAN_CONNECT,("\nAssocResp Frame = %s",
4689 assocRespLen ? " " : "NULL"));
4690 for (i = 0; i < assocRespLen; i++) {
4691 if (!(i % 0x10)) {
4692 AR_DEBUG_PRINTF(ATH_DEBUG_WLAN_CONNECT,("\n"));
4693 }
4694 AR_DEBUG_PRINTF(ATH_DEBUG_WLAN_CONNECT,("%2.2x ", assocInfo[i]));
4695 }
4696 AR_DEBUG_PRINTF(ATH_DEBUG_WLAN_CONNECT,("\n"));
4697 /*
4698 * If the event is due to disconnect cmd from the host, only they the target
4699 * would stop trying to connect. Under any other condition, target would
4700 * keep trying to connect.
4701 *
4702 */
4703 if( reason == DISCONNECT_CMD)
4704 {
30295c89
VM
4705 if ((!ar->arUserBssFilter) && (ar->arWmiReady)) {
4706 wmi_bssfilter_cmd(ar->arWmi, NONE_BSS_FILTER, 0);
4707 }
4708 } else {
1071a134 4709 ar->arConnectPending = true;
30295c89
VM
4710 if (((reason == ASSOC_FAILED) && (protocolReasonStatus == 0x11)) ||
4711 ((reason == ASSOC_FAILED) && (protocolReasonStatus == 0x0) && (reconnect_flag == 1))) {
1071a134 4712 ar->arConnected = true;
30295c89
VM
4713 return;
4714 }
4715 }
4716
4717 if ((reason == NO_NETWORK_AVAIL) && (ar->arWmiReady))
4718 {
4719 bss_t *pWmiSsidnode = NULL;
4720
4721 /* remove the current associated bssid node */
4722 wmi_free_node (ar->arWmi, bssid);
4723
4724 /*
4725 * In case any other same SSID nodes are present
4726 * remove it, since those nodes also not available now
4727 */
4728 do
4729 {
4730 /*
4731 * Find the nodes based on SSID and remove it
4732 * NOTE :: This case will not work out for Hidden-SSID
4733 */
1071a134 4734 pWmiSsidnode = wmi_find_Ssidnode (ar->arWmi, ar->arSsid, ar->arSsidLen, false, true);
30295c89
VM
4735
4736 if (pWmiSsidnode)
4737 {
4738 wmi_free_node (ar->arWmi, pWmiSsidnode->ni_macaddr);
4739 }
4740
4741 } while (pWmiSsidnode);
4742 }
4743
4744 /* Update connect & link status atomically */
4745 spin_lock_irqsave(&ar->arLock, flags);
1071a134 4746 ar->arConnected = false;
30295c89
VM
4747 netif_carrier_off(ar->arNetDev);
4748 spin_unlock_irqrestore(&ar->arLock, flags);
4749
4750 if( (reason != CSERV_DISCONNECT) || (reconnect_flag != 1) ) {
4751 reconnect_flag = 0;
4752 }
4753
4754#ifdef USER_KEYS
4755 if (reason != CSERV_DISCONNECT)
4756 {
4757 ar->user_savedkeys_stat = USER_SAVEDKEYS_STAT_INIT;
4758 ar->user_key_ctrl = 0;
4759 }
4760#endif /* USER_KEYS */
4761
4762 netif_stop_queue(ar->arNetDev);
4763 A_MEMZERO(ar->arBssid, sizeof(ar->arBssid));
4764 ar->arBssChannel = 0;
4765 ar->arBeaconInterval = 0;
4766
4767 ar6000_TxDataCleanup(ar);
4768}
4769
4770void
a71f0bf6 4771ar6000_regDomain_event(struct ar6_softc *ar, u32 regCode)
30295c89
VM
4772{
4773 A_PRINTF("AR6000 Reg Code = 0x%x\n", regCode);
4774 ar->arRegCode = regCode;
4775}
4776
4777#ifdef ATH_AR6K_11N_SUPPORT
4778void
a71f0bf6 4779ar6000_aggr_rcv_addba_req_evt(struct ar6_softc *ar, WMI_ADDBA_REQ_EVENT *evt)
30295c89
VM
4780{
4781 if(evt->status == 0) {
4782 aggr_recv_addba_req_evt(ar->aggr_cntxt, evt->tid, evt->st_seq_no, evt->win_sz);
4783 }
4784}
4785
4786void
a71f0bf6 4787ar6000_aggr_rcv_addba_resp_evt(struct ar6_softc *ar, WMI_ADDBA_RESP_EVENT *evt)
30295c89
VM
4788{
4789 A_PRINTF("ADDBA RESP. tid %d status %d, sz %d\n", evt->tid, evt->status, evt->amsdu_sz);
4790 if(evt->status == 0) {
4791 }
4792}
4793
4794void
a71f0bf6 4795ar6000_aggr_rcv_delba_req_evt(struct ar6_softc *ar, WMI_DELBA_EVENT *evt)
30295c89
VM
4796{
4797 aggr_recv_delba_req_evt(ar->aggr_cntxt, evt->tid);
4798}
4799#endif
4800
4801void register_pal_cb(ar6k_pal_config_t *palConfig_p)
4802{
4803 ar6k_pal_config_g = *palConfig_p;
4804}
4805
4806void
4807ar6000_hci_event_rcv_evt(struct ar6_softc *ar, WMI_HCI_EVENT *cmd)
4808{
4809 void *osbuf = NULL;
f2ab1275 4810 s8 i;
ab3655da 4811 u8 size, *buf;
4f69cef0 4812 int ret = 0;
30295c89
VM
4813
4814 size = cmd->evt_buf_sz + 4;
4815 osbuf = A_NETBUF_ALLOC(size);
4816 if (osbuf == NULL) {
4817 ret = A_NO_MEMORY;
4818 A_PRINTF("Error in allocating netbuf \n");
4819 return;
4820 }
4821
4822 A_NETBUF_PUT(osbuf, size);
ab3655da 4823 buf = (u8 *)A_NETBUF_DATA(osbuf);
30295c89
VM
4824 /* First 2-bytes carry HCI event/ACL data type
4825 * the next 2 are free
4826 */
4827 *((short *)buf) = WMI_HCI_EVENT_EVENTID;
4828 buf += sizeof(int);
05209262 4829 memcpy(buf, cmd->buf, cmd->evt_buf_sz);
30295c89
VM
4830
4831 if(ar6k_pal_config_g.fpar6k_pal_recv_pkt)
4832 {
4833 /* pass the cmd packet to PAL driver */
1071a134 4834 if((*ar6k_pal_config_g.fpar6k_pal_recv_pkt)(ar->hcipal_info, osbuf) == true)
30295c89
VM
4835 return;
4836 }
4837 ar6000_deliver_frames_to_nw_stack(ar->arNetDev, osbuf);
4838 if(loghci) {
4839 A_PRINTF_LOG("HCI Event From PAL <-- \n");
4840 for(i = 0; i < cmd->evt_buf_sz; i++) {
4841 A_PRINTF_LOG("0x%02x ", cmd->buf[i]);
4842 if((i % 10) == 0) {
4843 A_PRINTF_LOG("\n");
4844 }
4845 }
4846 A_PRINTF_LOG("\n");
4847 A_PRINTF_LOG("==================================\n");
4848 }
4849}
4850
4851void
a71f0bf6 4852ar6000_neighborReport_event(struct ar6_softc *ar, int numAps, WMI_NEIGHBOR_INFO *info)
30295c89
VM
4853{
4854#if WIRELESS_EXT >= 18
4855 struct iw_pmkid_cand *pmkcand;
4856#else /* WIRELESS_EXT >= 18 */
4857 static const char *tag = "PRE-AUTH";
4858 char buf[128];
4859#endif /* WIRELESS_EXT >= 18 */
4860
4861 union iwreq_data wrqu;
4862 int i;
4863
4864 AR_DEBUG_PRINTF(ATH_DEBUG_WLAN_SCAN,("AR6000 Neighbor Report Event\n"));
4865 for (i=0; i < numAps; info++, i++) {
4866 AR_DEBUG_PRINTF(ATH_DEBUG_WLAN_SCAN,("bssid %2.2x:%2.2x:%2.2x:%2.2x:%2.2x:%2.2x ",
4867 info->bssid[0], info->bssid[1], info->bssid[2],
4868 info->bssid[3], info->bssid[4], info->bssid[5]));
4869 if (info->bssFlags & WMI_PREAUTH_CAPABLE_BSS) {
4870 AR_DEBUG_PRINTF(ATH_DEBUG_WLAN_SCAN,("preauth-cap"));
4871 }
4872 if (info->bssFlags & WMI_PMKID_VALID_BSS) {
4873 AR_DEBUG_PRINTF(ATH_DEBUG_WLAN_SCAN,(" pmkid-valid\n"));
4874 continue; /* we skip bss if the pmkid is already valid */
4875 }
4876 AR_DEBUG_PRINTF(ATH_DEBUG_WLAN_SCAN,("\n"));
4877 A_MEMZERO(&wrqu, sizeof(wrqu));
4878#if WIRELESS_EXT >= 18
4879 pmkcand = A_MALLOC_NOWAIT(sizeof(struct iw_pmkid_cand));
4880 A_MEMZERO(pmkcand, sizeof(struct iw_pmkid_cand));
4881 pmkcand->index = i;
4882 pmkcand->flags = info->bssFlags;
05209262 4883 memcpy(pmkcand->bssid.sa_data, info->bssid, ATH_MAC_LEN);
30295c89
VM
4884 wrqu.data.length = sizeof(struct iw_pmkid_cand);
4885 wireless_send_event(ar->arNetDev, IWEVPMKIDCAND, &wrqu, (char *)pmkcand);
4886 A_FREE(pmkcand);
4887#else /* WIRELESS_EXT >= 18 */
4888 snprintf(buf, sizeof(buf), "%s%2.2x%2.2x%2.2x%2.2x%2.2x%2.2x%2.2x%2.2x",
4889 tag,
4890 info->bssid[0], info->bssid[1], info->bssid[2],
4891 info->bssid[3], info->bssid[4], info->bssid[5],
4892 i, info->bssFlags);
4893 wrqu.data.length = strlen(buf);
4894 wireless_send_event(ar->arNetDev, IWEVCUSTOM, &wrqu, buf);
4895#endif /* WIRELESS_EXT >= 18 */
4896 }
4897}
4898
4899void
a71f0bf6 4900ar6000_tkip_micerr_event(struct ar6_softc *ar, u8 keyid, bool ismcast)
30295c89
VM
4901{
4902 static const char *tag = "MLME-MICHAELMICFAILURE.indication";
4903 char buf[128];
4904 union iwreq_data wrqu;
4905
4906 /*
4907 * For AP case, keyid will have aid of STA which sent pkt with
4908 * MIC error. Use this aid to get MAC & send it to hostapd.
4909 */
4910 if (ar->arNetworkType == AP_NETWORK) {
4911 sta_t *s = ieee80211_find_conn_for_aid(ar, (keyid >> 2));
4912 if(!s){
4913 A_PRINTF("AP TKIP MIC error received from Invalid aid / STA not found =%d\n", keyid);
4914 return;
4915 }
4916 A_PRINTF("AP TKIP MIC error received from aid=%d\n", keyid);
4917 snprintf(buf,sizeof(buf), "%s addr=%2.2x:%2.2x:%2.2x:%2.2x:%2.2x:%2.2x",
4918 tag, s->mac[0],s->mac[1],s->mac[2],s->mac[3],s->mac[4],s->mac[5]);
4919 } else {
4920
4921#ifdef ATH6K_CONFIG_CFG80211
4922 ar6k_cfg80211_tkip_micerr_event(ar, keyid, ismcast);
4923#endif /* ATH6K_CONFIG_CFG80211 */
4924
4925 A_PRINTF("AR6000 TKIP MIC error received for keyid %d %scast\n",
4926 keyid & 0x3, ismcast ? "multi": "uni");
4927 snprintf(buf, sizeof(buf), "%s(keyid=%d %sicast)", tag, keyid & 0x3,
4928 ismcast ? "mult" : "un");
4929 }
4930
4931 memset(&wrqu, 0, sizeof(wrqu));
4932 wrqu.data.length = strlen(buf);
4933 wireless_send_event(ar->arNetDev, IWEVCUSTOM, &wrqu, buf);
4934}
4935
4936void
a71f0bf6 4937ar6000_scanComplete_event(struct ar6_softc *ar, int status)
30295c89
VM
4938{
4939
4940#ifdef ATH6K_CONFIG_CFG80211
4941 ar6k_cfg80211_scanComplete_event(ar, status);
4942#endif /* ATH6K_CONFIG_CFG80211 */
4943
4944 if (!ar->arUserBssFilter) {
4945 wmi_bssfilter_cmd(ar->arWmi, NONE_BSS_FILTER, 0);
4946 }
4947 if (ar->scan_triggered) {
4f69cef0 4948 if (status== 0) {
30295c89
VM
4949 union iwreq_data wrqu;
4950 A_MEMZERO(&wrqu, sizeof(wrqu));
4951 wireless_send_event(ar->arNetDev, SIOCGIWSCAN, &wrqu, NULL);
4952 }
4953 ar->scan_triggered = 0;
4954 }
4955
4956 AR_DEBUG_PRINTF(ATH_DEBUG_WLAN_SCAN,( "AR6000 scan complete: %d\n", status));
4957}
4958
4959void
a71f0bf6 4960ar6000_targetStats_event(struct ar6_softc *ar, u8 *ptr, u32 len)
30295c89 4961{
ab3655da 4962 u8 ac;
30295c89
VM
4963
4964 if(ar->arNetworkType == AP_NETWORK) {
4965 WMI_AP_MODE_STAT *p = (WMI_AP_MODE_STAT *)ptr;
4966 WMI_AP_MODE_STAT *ap = &ar->arAPStats;
4967
4968 if (len < sizeof(*p)) {
4969 return;
4970 }
4971
4972 for(ac=0;ac<AP_MAX_NUM_STA;ac++) {
4973 ap->sta[ac].tx_bytes += p->sta[ac].tx_bytes;
4974 ap->sta[ac].tx_pkts += p->sta[ac].tx_pkts;
4975 ap->sta[ac].tx_error += p->sta[ac].tx_error;
4976 ap->sta[ac].tx_discard += p->sta[ac].tx_discard;
4977 ap->sta[ac].rx_bytes += p->sta[ac].rx_bytes;
4978 ap->sta[ac].rx_pkts += p->sta[ac].rx_pkts;
4979 ap->sta[ac].rx_error += p->sta[ac].rx_error;
4980 ap->sta[ac].rx_discard += p->sta[ac].rx_discard;
4981 }
4982
4983 } else {
4984 WMI_TARGET_STATS *pTarget = (WMI_TARGET_STATS *)ptr;
4985 TARGET_STATS *pStats = &ar->arTargetStats;
4986
4987 if (len < sizeof(*pTarget)) {
4988 return;
4989 }
4990
4991 // Update the RSSI of the connected bss.
4992 if (ar->arConnected) {
4993 bss_t *pConnBss = NULL;
4994
4995 pConnBss = wmi_find_node(ar->arWmi,ar->arBssid);
4996 if (pConnBss)
4997 {
4998 pConnBss->ni_rssi = pTarget->cservStats.cs_aveBeacon_rssi;
4999 pConnBss->ni_snr = pTarget->cservStats.cs_aveBeacon_snr;
5000 wmi_node_return(ar->arWmi, pConnBss);
5001 }
5002 }
5003
5004 AR_DEBUG_PRINTF(ATH_DEBUG_INFO,("AR6000 updating target stats\n"));
5005 pStats->tx_packets += pTarget->txrxStats.tx_stats.tx_packets;
5006 pStats->tx_bytes += pTarget->txrxStats.tx_stats.tx_bytes;
5007 pStats->tx_unicast_pkts += pTarget->txrxStats.tx_stats.tx_unicast_pkts;
5008 pStats->tx_unicast_bytes += pTarget->txrxStats.tx_stats.tx_unicast_bytes;
5009 pStats->tx_multicast_pkts += pTarget->txrxStats.tx_stats.tx_multicast_pkts;
5010 pStats->tx_multicast_bytes += pTarget->txrxStats.tx_stats.tx_multicast_bytes;
5011 pStats->tx_broadcast_pkts += pTarget->txrxStats.tx_stats.tx_broadcast_pkts;
5012 pStats->tx_broadcast_bytes += pTarget->txrxStats.tx_stats.tx_broadcast_bytes;
5013 pStats->tx_rts_success_cnt += pTarget->txrxStats.tx_stats.tx_rts_success_cnt;
5014 for(ac = 0; ac < WMM_NUM_AC; ac++)
5015 pStats->tx_packet_per_ac[ac] += pTarget->txrxStats.tx_stats.tx_packet_per_ac[ac];
5016 pStats->tx_errors += pTarget->txrxStats.tx_stats.tx_errors;
5017 pStats->tx_failed_cnt += pTarget->txrxStats.tx_stats.tx_failed_cnt;
5018 pStats->tx_retry_cnt += pTarget->txrxStats.tx_stats.tx_retry_cnt;
5019 pStats->tx_mult_retry_cnt += pTarget->txrxStats.tx_stats.tx_mult_retry_cnt;
5020 pStats->tx_rts_fail_cnt += pTarget->txrxStats.tx_stats.tx_rts_fail_cnt;
5021 pStats->tx_unicast_rate = wmi_get_rate(pTarget->txrxStats.tx_stats.tx_unicast_rate);
5022
5023 pStats->rx_packets += pTarget->txrxStats.rx_stats.rx_packets;
5024 pStats->rx_bytes += pTarget->txrxStats.rx_stats.rx_bytes;
5025 pStats->rx_unicast_pkts += pTarget->txrxStats.rx_stats.rx_unicast_pkts;
5026 pStats->rx_unicast_bytes += pTarget->txrxStats.rx_stats.rx_unicast_bytes;
5027 pStats->rx_multicast_pkts += pTarget->txrxStats.rx_stats.rx_multicast_pkts;
5028 pStats->rx_multicast_bytes += pTarget->txrxStats.rx_stats.rx_multicast_bytes;
5029 pStats->rx_broadcast_pkts += pTarget->txrxStats.rx_stats.rx_broadcast_pkts;
5030 pStats->rx_broadcast_bytes += pTarget->txrxStats.rx_stats.rx_broadcast_bytes;
5031 pStats->rx_fragment_pkt += pTarget->txrxStats.rx_stats.rx_fragment_pkt;
5032 pStats->rx_errors += pTarget->txrxStats.rx_stats.rx_errors;
5033 pStats->rx_crcerr += pTarget->txrxStats.rx_stats.rx_crcerr;
5034 pStats->rx_key_cache_miss += pTarget->txrxStats.rx_stats.rx_key_cache_miss;
5035 pStats->rx_decrypt_err += pTarget->txrxStats.rx_stats.rx_decrypt_err;
5036 pStats->rx_duplicate_frames += pTarget->txrxStats.rx_stats.rx_duplicate_frames;
5037 pStats->rx_unicast_rate = wmi_get_rate(pTarget->txrxStats.rx_stats.rx_unicast_rate);
5038
5039
5040 pStats->tkip_local_mic_failure
5041 += pTarget->txrxStats.tkipCcmpStats.tkip_local_mic_failure;
5042 pStats->tkip_counter_measures_invoked
5043 += pTarget->txrxStats.tkipCcmpStats.tkip_counter_measures_invoked;
5044 pStats->tkip_replays += pTarget->txrxStats.tkipCcmpStats.tkip_replays;
5045 pStats->tkip_format_errors += pTarget->txrxStats.tkipCcmpStats.tkip_format_errors;
5046 pStats->ccmp_format_errors += pTarget->txrxStats.tkipCcmpStats.ccmp_format_errors;
5047 pStats->ccmp_replays += pTarget->txrxStats.tkipCcmpStats.ccmp_replays;
5048
5049 pStats->power_save_failure_cnt += pTarget->pmStats.power_save_failure_cnt;
5050 pStats->noise_floor_calibation = pTarget->noise_floor_calibation;
5051
5052 pStats->cs_bmiss_cnt += pTarget->cservStats.cs_bmiss_cnt;
5053 pStats->cs_lowRssi_cnt += pTarget->cservStats.cs_lowRssi_cnt;
5054 pStats->cs_connect_cnt += pTarget->cservStats.cs_connect_cnt;
5055 pStats->cs_disconnect_cnt += pTarget->cservStats.cs_disconnect_cnt;
5056 pStats->cs_aveBeacon_snr = pTarget->cservStats.cs_aveBeacon_snr;
5057 pStats->cs_aveBeacon_rssi = pTarget->cservStats.cs_aveBeacon_rssi;
5058
5059 if (enablerssicompensation) {
5060 pStats->cs_aveBeacon_rssi =
5061 rssi_compensation_calc(ar, pStats->cs_aveBeacon_rssi);
5062 }
5063 pStats->cs_lastRoam_msec = pTarget->cservStats.cs_lastRoam_msec;
5064 pStats->cs_snr = pTarget->cservStats.cs_snr;
5065 pStats->cs_rssi = pTarget->cservStats.cs_rssi;
5066
5067 pStats->lq_val = pTarget->lqVal;
5068
5069 pStats->wow_num_pkts_dropped += pTarget->wowStats.wow_num_pkts_dropped;
5070 pStats->wow_num_host_pkt_wakeups += pTarget->wowStats.wow_num_host_pkt_wakeups;
5071 pStats->wow_num_host_event_wakeups += pTarget->wowStats.wow_num_host_event_wakeups;
5072 pStats->wow_num_events_discarded += pTarget->wowStats.wow_num_events_discarded;
5073 pStats->arp_received += pTarget->arpStats.arp_received;
5074 pStats->arp_matched += pTarget->arpStats.arp_matched;
5075 pStats->arp_replied += pTarget->arpStats.arp_replied;
5076
5077 if (ar->statsUpdatePending) {
1071a134 5078 ar->statsUpdatePending = false;
30295c89
VM
5079 wake_up(&arEvent);
5080 }
5081 }
5082}
5083
5084void
a71f0bf6 5085ar6000_rssiThreshold_event(struct ar6_softc *ar, WMI_RSSI_THRESHOLD_VAL newThreshold, s16 rssi)
30295c89
VM
5086{
5087 USER_RSSI_THOLD userRssiThold;
5088
5089 rssi = rssi + SIGNAL_QUALITY_NOISE_FLOOR;
5090
5091 if (enablerssicompensation) {
5092 rssi = rssi_compensation_calc(ar, rssi);
5093 }
5094
5095 /* Send an event to the app */
5096 userRssiThold.tag = ar->rssi_map[newThreshold].tag;
5097 userRssiThold.rssi = rssi;
5098 A_PRINTF("rssi Threshold range = %d tag = %d rssi = %d\n", newThreshold,
5099 userRssiThold.tag, userRssiThold.rssi);
5100
ab3655da 5101 ar6000_send_event_to_app(ar, WMI_RSSI_THRESHOLD_EVENTID,(u8 *)&userRssiThold, sizeof(USER_RSSI_THOLD));
30295c89
VM
5102}
5103
5104
5105void
a71f0bf6 5106ar6000_hbChallengeResp_event(struct ar6_softc *ar, u32 cookie, u32 source)
30295c89
VM
5107{
5108 if (source == APP_HB_CHALLENGE) {
5109 /* Report it to the app in case it wants a positive acknowledgement */
5110 ar6000_send_event_to_app(ar, WMIX_HB_CHALLENGE_RESP_EVENTID,
ab3655da 5111 (u8 *)&cookie, sizeof(cookie));
30295c89
VM
5112 } else {
5113 /* This would ignore the replys that come in after their due time */
5114 if (cookie == ar->arHBChallengeResp.seqNum) {
1071a134 5115 ar->arHBChallengeResp.outstanding = false;
30295c89
VM
5116 }
5117 }
5118}
5119
5120
5121void
a71f0bf6 5122ar6000_reportError_event(struct ar6_softc *ar, WMI_TARGET_ERROR_VAL errorVal)
30295c89 5123{
03a6cddb
JP
5124 static const char * const errString[] = {
5125 [WMI_TARGET_PM_ERR_FAIL] "WMI_TARGET_PM_ERR_FAIL",
5126 [WMI_TARGET_KEY_NOT_FOUND] "WMI_TARGET_KEY_NOT_FOUND",
5127 [WMI_TARGET_DECRYPTION_ERR] "WMI_TARGET_DECRYPTION_ERR",
5128 [WMI_TARGET_BMISS] "WMI_TARGET_BMISS",
5129 [WMI_PSDISABLE_NODE_JOIN] "WMI_PSDISABLE_NODE_JOIN"
5130 };
30295c89
VM
5131
5132 A_PRINTF("AR6000 Error on Target. Error = 0x%x\n", errorVal);
5133
5134 /* One error is reported at a time, and errorval is a bitmask */
5135 if(errorVal & (errorVal - 1))
5136 return;
5137
5138 A_PRINTF("AR6000 Error type = ");
5139 switch(errorVal)
5140 {
5141 case WMI_TARGET_PM_ERR_FAIL:
5142 case WMI_TARGET_KEY_NOT_FOUND:
5143 case WMI_TARGET_DECRYPTION_ERR:
5144 case WMI_TARGET_BMISS:
5145 case WMI_PSDISABLE_NODE_JOIN:
5146 A_PRINTF("%s\n", errString[errorVal]);
5147 break;
5148 default:
5149 A_PRINTF("INVALID\n");
5150 break;
5151 }
5152
5153}
5154
5155
5156void
a71f0bf6 5157ar6000_cac_event(struct ar6_softc *ar, u8 ac, u8 cacIndication,
ab3655da 5158 u8 statusCode, u8 *tspecSuggestion)
30295c89
VM
5159{
5160 WMM_TSPEC_IE *tspecIe;
5161
5162 /*
5163 * This is the TSPEC IE suggestion from AP.
5164 * Suggestion provided by AP under some error
5165 * cases, could be helpful for the host app.
5166 * Check documentation.
5167 */
5168 tspecIe = (WMM_TSPEC_IE *)tspecSuggestion;
5169
5170 /*
5171 * What do we do, if we get TSPEC rejection? One thought
5172 * that comes to mind is implictly delete the pstream...
5173 */
5174 A_PRINTF("AR6000 CAC notification. "
5175 "AC = %d, cacIndication = 0x%x, statusCode = 0x%x\n",
5176 ac, cacIndication, statusCode);
5177}
5178
5179void
a71f0bf6 5180ar6000_channel_change_event(struct ar6_softc *ar, u16 oldChannel,
4853ac05 5181 u16 newChannel)
30295c89
VM
5182{
5183 A_PRINTF("Channel Change notification\nOld Channel: %d, New Channel: %d\n",
5184 oldChannel, newChannel);
5185}
5186
5187#define AR6000_PRINT_BSSID(_pBss) do { \
5188 A_PRINTF("%2.2x:%2.2x:%2.2x:%2.2x:%2.2x:%2.2x ",\
5189 (_pBss)[0],(_pBss)[1],(_pBss)[2],(_pBss)[3],\
5190 (_pBss)[4],(_pBss)[5]); \
5191} while(0)
5192
5193void
a71f0bf6 5194ar6000_roam_tbl_event(struct ar6_softc *ar, WMI_TARGET_ROAM_TBL *pTbl)
30295c89 5195{
ab3655da 5196 u8 i;
30295c89
VM
5197
5198 A_PRINTF("ROAM TABLE NO OF ENTRIES is %d ROAM MODE is %d\n",
5199 pTbl->numEntries, pTbl->roamMode);
5200 for (i= 0; i < pTbl->numEntries; i++) {
5201 A_PRINTF("[%d]bssid %2.2x:%2.2x:%2.2x:%2.2x:%2.2x:%2.2x ", i,
5202 pTbl->bssRoamInfo[i].bssid[0], pTbl->bssRoamInfo[i].bssid[1],
5203 pTbl->bssRoamInfo[i].bssid[2],
5204 pTbl->bssRoamInfo[i].bssid[3],
5205 pTbl->bssRoamInfo[i].bssid[4],
5206 pTbl->bssRoamInfo[i].bssid[5]);
5207 A_PRINTF("RSSI %d RSSIDT %d LAST RSSI %d UTIL %d ROAM_UTIL %d"
5208 " BIAS %d\n",
5209 pTbl->bssRoamInfo[i].rssi,
5210 pTbl->bssRoamInfo[i].rssidt,
5211 pTbl->bssRoamInfo[i].last_rssi,
5212 pTbl->bssRoamInfo[i].util,
5213 pTbl->bssRoamInfo[i].roam_util,
5214 pTbl->bssRoamInfo[i].bias);
5215 }
5216}
5217
5218void
ab3655da 5219ar6000_wow_list_event(struct ar6_softc *ar, u8 num_filters, WMI_GET_WOW_LIST_REPLY *wow_reply)
30295c89 5220{
ab3655da 5221 u8 i,j;
30295c89
VM
5222
5223 /*Each event now contains exactly one filter, see bug 26613*/
5224 A_PRINTF("WOW pattern %d of %d patterns\n", wow_reply->this_filter_num, wow_reply->num_filters);
5225 A_PRINTF("wow mode = %s host mode = %s\n",
5226 (wow_reply->wow_mode == 0? "disabled":"enabled"),
5227 (wow_reply->host_mode == 1 ? "awake":"asleep"));
5228
5229
5230 /*If there are no patterns, the reply will only contain generic
5231 WoW information. Pattern information will exist only if there are
5232 patterns present. Bug 26716*/
5233
5234 /* If this event contains pattern information, display it*/
5235 if (wow_reply->this_filter_num) {
5236 i=0;
5237 A_PRINTF("id=%d size=%d offset=%d\n",
5238 wow_reply->wow_filters[i].wow_filter_id,
5239 wow_reply->wow_filters[i].wow_filter_size,
5240 wow_reply->wow_filters[i].wow_filter_offset);
5241 A_PRINTF("wow pattern = ");
5242 for (j=0; j< wow_reply->wow_filters[i].wow_filter_size; j++) {
5243 A_PRINTF("%2.2x",wow_reply->wow_filters[i].wow_filter_pattern[j]);
5244 }
5245
5246 A_PRINTF("\nwow mask = ");
5247 for (j=0; j< wow_reply->wow_filters[i].wow_filter_size; j++) {
5248 A_PRINTF("%2.2x",wow_reply->wow_filters[i].wow_filter_mask[j]);
5249 }
5250 A_PRINTF("\n");
5251 }
5252}
5253
5254/*
5255 * Report the Roaming related data collected on the target
5256 */
5257void
5258ar6000_display_roam_time(WMI_TARGET_ROAM_TIME *p)
5259{
5260 A_PRINTF("Disconnect Data : BSSID: ");
5261 AR6000_PRINT_BSSID(p->disassoc_bssid);
5262 A_PRINTF(" RSSI %d DISASSOC Time %d NO_TXRX_TIME %d\n",
5263 p->disassoc_bss_rssi,p->disassoc_time,
5264 p->no_txrx_time);
5265 A_PRINTF("Connect Data: BSSID: ");
5266 AR6000_PRINT_BSSID(p->assoc_bssid);
5267 A_PRINTF(" RSSI %d ASSOC Time %d TXRX_TIME %d\n",
5268 p->assoc_bss_rssi,p->assoc_time,
5269 p->allow_txrx_time);
5270}
5271
5272void
a71f0bf6 5273ar6000_roam_data_event(struct ar6_softc *ar, WMI_TARGET_ROAM_DATA *p)
30295c89
VM
5274{
5275 switch (p->roamDataType) {
5276 case ROAM_DATA_TIME:
5277 ar6000_display_roam_time(&p->u.roamTime);
5278 break;
5279 default:
5280 break;
5281 }
5282}
5283
5284void
a71f0bf6 5285ar6000_bssInfo_event_rx(struct ar6_softc *ar, u8 *datap, int len)
30295c89
VM
5286{
5287 struct sk_buff *skb;
5288 WMI_BSS_INFO_HDR *bih = (WMI_BSS_INFO_HDR *)datap;
5289
5290
5291 if (!ar->arMgmtFilter) {
5292 return;
5293 }
5294 if (((ar->arMgmtFilter & IEEE80211_FILTER_TYPE_BEACON) &&
5295 (bih->frameType != BEACON_FTYPE)) ||
5296 ((ar->arMgmtFilter & IEEE80211_FILTER_TYPE_PROBE_RESP) &&
5297 (bih->frameType != PROBERESP_FTYPE)))
5298 {
5299 return;
5300 }
5301
5302 if ((skb = A_NETBUF_ALLOC_RAW(len)) != NULL) {
5303
5304 A_NETBUF_PUT(skb, len);
05209262 5305 memcpy(A_NETBUF_DATA(skb), datap, len);
30295c89 5306 skb->dev = ar->arNetDev;
05209262 5307 memcpy(skb_mac_header(skb), A_NETBUF_DATA(skb), 6);
30295c89
VM
5308 skb->ip_summed = CHECKSUM_NONE;
5309 skb->pkt_type = PACKET_OTHERHOST;
5310 skb->protocol = __constant_htons(0x0019);
5311 netif_rx(skb);
5312 }
5313}
5314
e1ce2a3a 5315u32 wmiSendCmdNum;
30295c89 5316
1f4c34bd 5317int
30295c89
VM
5318ar6000_control_tx(void *devt, void *osbuf, HTC_ENDPOINT_ID eid)
5319{
a71f0bf6 5320 struct ar6_softc *ar = (struct ar6_softc *)devt;
4f69cef0 5321 int status = 0;
30295c89
VM
5322 struct ar_cookie *cookie = NULL;
5323 int i;
5324#ifdef CONFIG_PM
5325 if (ar->arWowState != WLAN_WOW_STATE_NONE) {
5326 A_NETBUF_FREE(osbuf);
5327 return A_EACCES;
5328 }
5329#endif /* CONFIG_PM */
5330 /* take lock to protect ar6000_alloc_cookie() */
5331 AR6000_SPIN_LOCK(&ar->arLock, 0);
5332
5333 do {
5334
5335 AR_DEBUG_PRINTF(ATH_DEBUG_WLAN_TX,("ar_contrstatus = ol_tx: skb=0x%lx, len=0x%x eid =%d\n",
5336 (unsigned long)osbuf, A_NETBUF_LEN(osbuf), eid));
5337
5338 if (ar->arWMIControlEpFull && (eid == ar->arControlEp)) {
5339 /* control endpoint is full, don't allocate resources, we
5340 * are just going to drop this packet */
5341 cookie = NULL;
5342 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,(" WMI Control EP full, dropping packet : 0x%lX, len:%d \n",
5343 (unsigned long)osbuf, A_NETBUF_LEN(osbuf)));
5344 } else {
5345 cookie = ar6000_alloc_cookie(ar);
5346 }
5347
5348 if (cookie == NULL) {
5349 status = A_NO_MEMORY;
5350 break;
5351 }
5352
5353 if(logWmiRawMsgs) {
5354 A_PRINTF("WMI cmd send, msgNo %d :", wmiSendCmdNum);
5355 for(i = 0; i < a_netbuf_to_len(osbuf); i++)
ab3655da 5356 A_PRINTF("%x ", ((u8 *)a_netbuf_to_data(osbuf))[i]);
30295c89
VM
5357 A_PRINTF("\n");
5358 }
5359
5360 wmiSendCmdNum++;
5361
1071a134 5362 } while (false);
30295c89
VM
5363
5364 if (cookie != NULL) {
5365 /* got a structure to send it out on */
5366 ar->arTxPending[eid]++;
5367
5368 if (eid != ar->arControlEp) {
5369 ar->arTotalTxDataPending++;
5370 }
5371 }
5372
5373 AR6000_SPIN_UNLOCK(&ar->arLock, 0);
5374
5375 if (cookie != NULL) {
5376 cookie->arc_bp[0] = (unsigned long)osbuf;
5377 cookie->arc_bp[1] = 0;
5378 SET_HTC_PACKET_INFO_TX(&cookie->HtcPkt,
5379 cookie,
5380 A_NETBUF_DATA(osbuf),
5381 A_NETBUF_LEN(osbuf),
5382 eid,
5383 AR6K_CONTROL_PKT_TAG);
5384 /* this interface is asynchronous, if there is an error, cleanup will happen in the
5385 * TX completion callback */
5386 HTCSendPkt(ar->arHtcTarget, &cookie->HtcPkt);
4f69cef0 5387 status = 0;
30295c89
VM
5388 }
5389
a1d46529 5390 if (status) {
30295c89
VM
5391 A_NETBUF_FREE(osbuf);
5392 }
5393 return status;
5394}
5395
5396/* indicate tx activity or inactivity on a WMI stream */
ab3655da 5397void ar6000_indicate_tx_activity(void *devt, u8 TrafficClass, bool Active)
30295c89 5398{
a71f0bf6 5399 struct ar6_softc *ar = (struct ar6_softc *)devt;
30295c89
VM
5400 HTC_ENDPOINT_ID eid ;
5401 int i;
5402
5403 if (ar->arWmiEnabled) {
5404 eid = arAc2EndpointID(ar, TrafficClass);
5405
5406 AR6000_SPIN_LOCK(&ar->arLock, 0);
5407
5408 ar->arAcStreamActive[TrafficClass] = Active;
5409
5410 if (Active) {
5411 /* when a stream goes active, keep track of the active stream with the highest priority */
5412
5413 if (ar->arAcStreamPriMap[TrafficClass] > ar->arHiAcStreamActivePri) {
5414 /* set the new highest active priority */
5415 ar->arHiAcStreamActivePri = ar->arAcStreamPriMap[TrafficClass];
5416 }
5417
5418 } else {
5419 /* when a stream goes inactive, we may have to search for the next active stream
5420 * that is the highest priority */
5421
5422 if (ar->arHiAcStreamActivePri == ar->arAcStreamPriMap[TrafficClass]) {
5423
5424 /* the highest priority stream just went inactive */
5425
5426 /* reset and search for the "next" highest "active" priority stream */
5427 ar->arHiAcStreamActivePri = 0;
5428 for (i = 0; i < WMM_NUM_AC; i++) {
5429 if (ar->arAcStreamActive[i]) {
5430 if (ar->arAcStreamPriMap[i] > ar->arHiAcStreamActivePri) {
5431 /* set the new highest active priority */
5432 ar->arHiAcStreamActivePri = ar->arAcStreamPriMap[i];
5433 }
5434 }
5435 }
5436 }
5437 }
5438
5439 AR6000_SPIN_UNLOCK(&ar->arLock, 0);
5440
5441 } else {
5442 /* for mbox ping testing, the traffic class is mapped directly as a stream ID,
5443 * see handling of AR6000_XIOCTL_TRAFFIC_ACTIVITY_CHANGE in ioctl.c
5444 * convert the stream ID to a endpoint */
5445 eid = arAc2EndpointID(ar, TrafficClass);
5446 }
5447
5448 /* notify HTC, this may cause credit distribution changes */
5449
5450 HTCIndicateActivityChange(ar->arHtcTarget,
5451 eid,
5452 Active);
5453
5454}
5455
5456void
e1ce2a3a 5457ar6000_btcoex_config_event(struct ar6_softc *ar, u8 *ptr, u32 len)
30295c89
VM
5458{
5459
5460 WMI_BTCOEX_CONFIG_EVENT *pBtcoexConfig = (WMI_BTCOEX_CONFIG_EVENT *)ptr;
5461 WMI_BTCOEX_CONFIG_EVENT *pArbtcoexConfig =&ar->arBtcoexConfig;
5462
5463 AR_DEBUG_PRINTF(ATH_DEBUG_INFO,("AR6000 BTCOEX CONFIG EVENT \n"));
5464
5465 A_PRINTF("received config event\n");
5466 pArbtcoexConfig->btProfileType = pBtcoexConfig->btProfileType;
5467 pArbtcoexConfig->linkId = pBtcoexConfig->linkId;
5468
5469 switch (pBtcoexConfig->btProfileType) {
5470 case WMI_BTCOEX_BT_PROFILE_SCO:
05209262 5471 memcpy(&pArbtcoexConfig->info.scoConfigCmd, &pBtcoexConfig->info.scoConfigCmd,
30295c89
VM
5472 sizeof(WMI_SET_BTCOEX_SCO_CONFIG_CMD));
5473 break;
5474 case WMI_BTCOEX_BT_PROFILE_A2DP:
05209262 5475 memcpy(&pArbtcoexConfig->info.a2dpConfigCmd, &pBtcoexConfig->info.a2dpConfigCmd,
30295c89
VM
5476 sizeof(WMI_SET_BTCOEX_A2DP_CONFIG_CMD));
5477 break;
5478 case WMI_BTCOEX_BT_PROFILE_ACLCOEX:
05209262 5479 memcpy(&pArbtcoexConfig->info.aclcoexConfig, &pBtcoexConfig->info.aclcoexConfig,
30295c89
VM
5480 sizeof(WMI_SET_BTCOEX_ACLCOEX_CONFIG_CMD));
5481 break;
5482 case WMI_BTCOEX_BT_PROFILE_INQUIRY_PAGE:
05209262 5483 memcpy(&pArbtcoexConfig->info.btinquiryPageConfigCmd, &pBtcoexConfig->info.btinquiryPageConfigCmd,
30295c89
VM
5484 sizeof(WMI_SET_BTCOEX_ACLCOEX_CONFIG_CMD));
5485 break;
5486 }
5487 if (ar->statsUpdatePending) {
1071a134 5488 ar->statsUpdatePending = false;
30295c89
VM
5489 wake_up(&arEvent);
5490 }
5491}
5492
5493void
e1ce2a3a 5494ar6000_btcoex_stats_event(struct ar6_softc *ar, u8 *ptr, u32 len)
30295c89
VM
5495{
5496 WMI_BTCOEX_STATS_EVENT *pBtcoexStats = (WMI_BTCOEX_STATS_EVENT *)ptr;
5497
5498 AR_DEBUG_PRINTF(ATH_DEBUG_INFO,("AR6000 BTCOEX CONFIG EVENT \n"));
5499
05209262 5500 memcpy(&ar->arBtcoexStats, pBtcoexStats, sizeof(WMI_BTCOEX_STATS_EVENT));
30295c89
VM
5501
5502 if (ar->statsUpdatePending) {
1071a134 5503 ar->statsUpdatePending = false;
30295c89
VM
5504 wake_up(&arEvent);
5505 }
5506
5507}
5508module_init(ar6000_init_module);
5509module_exit(ar6000_cleanup_module);
5510
5511/* Init cookie queue */
5512static void
a71f0bf6 5513ar6000_cookie_init(struct ar6_softc *ar)
30295c89 5514{
e1ce2a3a 5515 u32 i;
30295c89
VM
5516
5517 ar->arCookieList = NULL;
5518 ar->arCookieCount = 0;
5519
5520 A_MEMZERO(s_ar_cookie_mem, sizeof(s_ar_cookie_mem));
5521
5522 for (i = 0; i < MAX_COOKIE_NUM; i++) {
5523 ar6000_free_cookie(ar, &s_ar_cookie_mem[i]);
5524 }
5525}
5526
5527/* cleanup cookie queue */
5528static void
a71f0bf6 5529ar6000_cookie_cleanup(struct ar6_softc *ar)
30295c89
VM
5530{
5531 /* It is gone .... */
5532 ar->arCookieList = NULL;
5533 ar->arCookieCount = 0;
5534}
5535
5536/* Init cookie queue */
5537static void
a71f0bf6 5538ar6000_free_cookie(struct ar6_softc *ar, struct ar_cookie * cookie)
30295c89
VM
5539{
5540 /* Insert first */
5541 A_ASSERT(ar != NULL);
5542 A_ASSERT(cookie != NULL);
5543
5544 cookie->arc_list_next = ar->arCookieList;
5545 ar->arCookieList = cookie;
5546 ar->arCookieCount++;
5547}
5548
5549/* cleanup cookie queue */
5550static struct ar_cookie *
a71f0bf6 5551ar6000_alloc_cookie(struct ar6_softc *ar)
30295c89
VM
5552{
5553 struct ar_cookie *cookie;
5554
5555 cookie = ar->arCookieList;
5556 if(cookie != NULL)
5557 {
5558 ar->arCookieList = cookie->arc_list_next;
5559 ar->arCookieCount--;
5560 }
5561
5562 return cookie;
5563}
5564
5565#ifdef SEND_EVENT_TO_APP
5566/*
5567 * This function is used to send event which come from taget to
5568 * the application. The buf which send to application is include
5569 * the event ID and event content.
5570 */
5571#define EVENT_ID_LEN 2
a71f0bf6 5572void ar6000_send_event_to_app(struct ar6_softc *ar, u16 eventId,
ab3655da 5573 u8 *datap, int len)
30295c89
VM
5574{
5575
5576#if (WIRELESS_EXT >= 15)
5577
5578/* note: IWEVCUSTOM only exists in wireless extensions after version 15 */
5579
5580 char *buf;
4853ac05 5581 u16 size;
30295c89
VM
5582 union iwreq_data wrqu;
5583
5584 size = len + EVENT_ID_LEN;
5585
5586 if (size > IW_CUSTOM_MAX) {
5587 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,("WMI event ID : 0x%4.4X, len = %d too big for IWEVCUSTOM (max=%d) \n",
5588 eventId, size, IW_CUSTOM_MAX));
5589 return;
5590 }
5591
5592 buf = A_MALLOC_NOWAIT(size);
5593 if (NULL == buf){
5594 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,("%s: failed to allocate %d bytes\n", __func__, size));
5595 return;
5596 }
5597
5598 A_MEMZERO(buf, size);
05209262
LR
5599 memcpy(buf, &eventId, EVENT_ID_LEN);
5600 memcpy(buf+EVENT_ID_LEN, datap, len);
30295c89 5601
4853ac05 5602 //AR_DEBUG_PRINTF(ATH_DEBUG_INFO,("event ID = %d,len = %d\n",*(u16 *)buf, size));
30295c89
VM
5603 A_MEMZERO(&wrqu, sizeof(wrqu));
5604 wrqu.data.length = size;
5605 wireless_send_event(ar->arNetDev, IWEVCUSTOM, &wrqu, buf);
5606 A_FREE(buf);
5607#endif
5608
5609
5610}
5611
5612/*
5613 * This function is used to send events larger than 256 bytes
5614 * to the application. The buf which is sent to application
5615 * includes the event ID and event content.
5616 */
a71f0bf6 5617void ar6000_send_generic_event_to_app(struct ar6_softc *ar, u16 eventId,
ab3655da 5618 u8 *datap, int len)
30295c89
VM
5619{
5620
5621#if (WIRELESS_EXT >= 18)
5622
5623/* IWEVGENIE exists in wireless extensions version 18 onwards */
5624
5625 char *buf;
4853ac05 5626 u16 size;
30295c89
VM
5627 union iwreq_data wrqu;
5628
5629 size = len + EVENT_ID_LEN;
5630
5631 if (size > IW_GENERIC_IE_MAX) {
5632 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,("WMI event ID : 0x%4.4X, len = %d too big for IWEVGENIE (max=%d) \n",
5633 eventId, size, IW_GENERIC_IE_MAX));
5634 return;
5635 }
5636
5637 buf = A_MALLOC_NOWAIT(size);
5638 if (NULL == buf){
5639 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,("%s: failed to allocate %d bytes\n", __func__, size));
5640 return;
5641 }
5642
5643 A_MEMZERO(buf, size);
05209262
LR
5644 memcpy(buf, &eventId, EVENT_ID_LEN);
5645 memcpy(buf+EVENT_ID_LEN, datap, len);
30295c89
VM
5646
5647 A_MEMZERO(&wrqu, sizeof(wrqu));
5648 wrqu.data.length = size;
5649 wireless_send_event(ar->arNetDev, IWEVGENIE, &wrqu, buf);
5650
5651 A_FREE(buf);
5652
5653#endif /* (WIRELESS_EXT >= 18) */
5654
5655}
5656#endif /* SEND_EVENT_TO_APP */
5657
5658
5659void
5660ar6000_tx_retry_err_event(void *devt)
5661{
5662 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,("Tx retries reach maximum!\n"));
5663}
5664
5665void
ab3655da 5666ar6000_snrThresholdEvent_rx(void *devt, WMI_SNR_THRESHOLD_VAL newThreshold, u8 snr)
30295c89
VM
5667{
5668 WMI_SNR_THRESHOLD_EVENT event;
a71f0bf6 5669 struct ar6_softc *ar = (struct ar6_softc *)devt;
30295c89
VM
5670
5671 event.range = newThreshold;
5672 event.snr = snr;
5673
ab3655da 5674 ar6000_send_event_to_app(ar, WMI_SNR_THRESHOLD_EVENTID, (u8 *)&event,
30295c89
VM
5675 sizeof(WMI_SNR_THRESHOLD_EVENT));
5676}
5677
5678void
ab3655da 5679ar6000_lqThresholdEvent_rx(void *devt, WMI_LQ_THRESHOLD_VAL newThreshold, u8 lq)
30295c89
VM
5680{
5681 AR_DEBUG_PRINTF(ATH_DEBUG_INFO,("lq threshold range %d, lq %d\n", newThreshold, lq));
5682}
5683
5684
5685
e1ce2a3a 5686u32 a_copy_to_user(void *to, const void *from, u32 n)
30295c89
VM
5687{
5688 return(copy_to_user(to, from, n));
5689}
5690
e1ce2a3a 5691u32 a_copy_from_user(void *to, const void *from, u32 n)
30295c89
VM
5692{
5693 return(copy_from_user(to, from, n));
5694}
5695
5696
1f4c34bd 5697int
30295c89 5698ar6000_get_driver_cfg(struct net_device *dev,
4853ac05 5699 u16 cfgParam,
30295c89
VM
5700 void *result)
5701{
5702
1f4c34bd 5703 int ret = 0;
30295c89
VM
5704
5705 switch(cfgParam)
5706 {
5707 case AR6000_DRIVER_CFG_GET_WLANNODECACHING:
e1ce2a3a 5708 *((u32 *)result) = wlanNodeCaching;
30295c89
VM
5709 break;
5710 case AR6000_DRIVER_CFG_LOG_RAW_WMI_MSGS:
e1ce2a3a 5711 *((u32 *)result) = logWmiRawMsgs;
30295c89
VM
5712 break;
5713 default:
5714 ret = EINVAL;
5715 break;
5716 }
5717
5718 return ret;
5719}
5720
5721void
ab3655da 5722ar6000_keepalive_rx(void *devt, u8 configured)
30295c89 5723{
a71f0bf6 5724 struct ar6_softc *ar = (struct ar6_softc *)devt;
30295c89
VM
5725
5726 ar->arKeepaliveConfigured = configured;
5727 wake_up(&arEvent);
5728}
5729
5730void
ab3655da
JP
5731ar6000_pmkid_list_event(void *devt, u8 numPMKID, WMI_PMKID *pmkidList,
5732 u8 *bssidList)
30295c89 5733{
ab3655da 5734 u8 i, j;
30295c89
VM
5735
5736 A_PRINTF("Number of Cached PMKIDs is %d\n", numPMKID);
5737
5738 for (i = 0; i < numPMKID; i++) {
5739 A_PRINTF("\nBSSID %d ", i);
5740 for (j = 0; j < ATH_MAC_LEN; j++) {
5741 A_PRINTF("%2.2x", bssidList[j]);
5742 }
5743 bssidList += (ATH_MAC_LEN + WMI_PMKID_LEN);
5744 A_PRINTF("\nPMKID %d ", i);
5745 for (j = 0; j < WMI_PMKID_LEN; j++) {
5746 A_PRINTF("%2.2x", pmkidList->pmkid[j]);
5747 }
ab3655da 5748 pmkidList = (WMI_PMKID *)((u8 *)pmkidList + ATH_MAC_LEN +
30295c89
VM
5749 WMI_PMKID_LEN);
5750 }
5751}
5752
a71f0bf6 5753void ar6000_pspoll_event(struct ar6_softc *ar,u8 aid)
30295c89
VM
5754{
5755 sta_t *conn=NULL;
1071a134 5756 bool isPsqEmpty = false;
30295c89
VM
5757
5758 conn = ieee80211_find_conn_for_aid(ar, aid);
5759
5760 /* If the PS q for this STA is not empty, dequeue and send a pkt from
5761 * the head of the q. Also update the More data bit in the WMI_DATA_HDR
5762 * if there are more pkts for this STA in the PS q. If there are no more
5763 * pkts for this STA, update the PVB for this STA.
5764 */
5765 A_MUTEX_LOCK(&conn->psqLock);
5766 isPsqEmpty = A_NETBUF_QUEUE_EMPTY(&conn->psq);
5767 A_MUTEX_UNLOCK(&conn->psqLock);
5768
5769 if (isPsqEmpty) {
5770 /* TODO:No buffered pkts for this STA. Send out a NULL data frame */
5771 } else {
5772 struct sk_buff *skb = NULL;
5773
5774 A_MUTEX_LOCK(&conn->psqLock);
5775 skb = A_NETBUF_DEQUEUE(&conn->psq);
5776 A_MUTEX_UNLOCK(&conn->psqLock);
5777 /* Set the STA flag to PSPolled, so that the frame will go out */
5778 STA_SET_PS_POLLED(conn);
5779 ar6000_data_tx(skb, ar->arNetDev);
5780 STA_CLR_PS_POLLED(conn);
5781
5782 /* Clear the PVB for this STA if the queue has become empty */
5783 A_MUTEX_LOCK(&conn->psqLock);
5784 isPsqEmpty = A_NETBUF_QUEUE_EMPTY(&conn->psq);
5785 A_MUTEX_UNLOCK(&conn->psqLock);
5786
5787 if (isPsqEmpty) {
5788 wmi_set_pvb_cmd(ar->arWmi, conn->aid, 0);
5789 }
5790 }
5791}
5792
a71f0bf6 5793void ar6000_dtimexpiry_event(struct ar6_softc *ar)
30295c89 5794{
1071a134 5795 bool isMcastQueued = false;
30295c89
VM
5796 struct sk_buff *skb = NULL;
5797
5798 /* If there are no associated STAs, ignore the DTIM expiry event.
5799 * There can be potential race conditions where the last associated
5800 * STA may disconnect & before the host could clear the 'Indicate DTIM'
5801 * request to the firmware, the firmware would have just indicated a DTIM
5802 * expiry event. The race is between 'clear DTIM expiry cmd' going
5803 * from the host to the firmware & the DTIM expiry event happening from
5804 * the firmware to the host.
5805 */
5806 if (ar->sta_list_index == 0) {
5807 return;
5808 }
5809
5810 A_MUTEX_LOCK(&ar->mcastpsqLock);
5811 isMcastQueued = A_NETBUF_QUEUE_EMPTY(&ar->mcastpsq);
5812 A_MUTEX_UNLOCK(&ar->mcastpsqLock);
5813
1071a134 5814 A_ASSERT(isMcastQueued == false);
30295c89
VM
5815
5816 /* Flush the mcast psq to the target */
5817 /* Set the STA flag to DTIMExpired, so that the frame will go out */
1071a134 5818 ar->DTIMExpired = true;
30295c89
VM
5819
5820 A_MUTEX_LOCK(&ar->mcastpsqLock);
5821 while (!A_NETBUF_QUEUE_EMPTY(&ar->mcastpsq)) {
5822 skb = A_NETBUF_DEQUEUE(&ar->mcastpsq);
5823 A_MUTEX_UNLOCK(&ar->mcastpsqLock);
5824
5825 ar6000_data_tx(skb, ar->arNetDev);
5826
5827 A_MUTEX_LOCK(&ar->mcastpsqLock);
5828 }
5829 A_MUTEX_UNLOCK(&ar->mcastpsqLock);
5830
5831 /* Reset the DTIMExpired flag back to 0 */
1071a134 5832 ar->DTIMExpired = false;
30295c89
VM
5833
5834 /* Clear the LSB of the BitMapCtl field of the TIM IE */
5835 wmi_set_pvb_cmd(ar->arWmi, MCAST_AID, 0);
5836}
5837
5838void
a71f0bf6 5839read_rssi_compensation_param(struct ar6_softc *ar)
30295c89 5840{
ab3655da 5841 u8 *cust_data_ptr;
30295c89
VM
5842
5843//#define RSSICOMPENSATION_PRINT
5844
5845#ifdef RSSICOMPENSATION_PRINT
cb1e3709 5846 s16 i;
30295c89
VM
5847 cust_data_ptr = ar6000_get_cust_data_buffer(ar->arTargetType);
5848 for (i=0; i<16; i++) {
ab3655da 5849 A_PRINTF("cust_data_%d = %x \n", i, *(u8 *)cust_data_ptr);
30295c89
VM
5850 cust_data_ptr += 1;
5851 }
5852#endif
5853
5854 cust_data_ptr = ar6000_get_cust_data_buffer(ar->arTargetType);
5855
4853ac05
JP
5856 rssi_compensation_param.customerID = *(u16 *)cust_data_ptr & 0xffff;
5857 rssi_compensation_param.enable = *(u16 *)(cust_data_ptr+2) & 0xffff;
5858 rssi_compensation_param.bg_param_a = *(u16 *)(cust_data_ptr+4) & 0xffff;
5859 rssi_compensation_param.bg_param_b = *(u16 *)(cust_data_ptr+6) & 0xffff;
5860 rssi_compensation_param.a_param_a = *(u16 *)(cust_data_ptr+8) & 0xffff;
5861 rssi_compensation_param.a_param_b = *(u16 *)(cust_data_ptr+10) &0xffff;
e1ce2a3a 5862 rssi_compensation_param.reserved = *(u32 *)(cust_data_ptr+12);
30295c89
VM
5863
5864#ifdef RSSICOMPENSATION_PRINT
5865 A_PRINTF("customerID = 0x%x \n", rssi_compensation_param.customerID);
5866 A_PRINTF("enable = 0x%x \n", rssi_compensation_param.enable);
5867 A_PRINTF("bg_param_a = 0x%x and %d \n", rssi_compensation_param.bg_param_a, rssi_compensation_param.bg_param_a);
5868 A_PRINTF("bg_param_b = 0x%x and %d \n", rssi_compensation_param.bg_param_b, rssi_compensation_param.bg_param_b);
5869 A_PRINTF("a_param_a = 0x%x and %d \n", rssi_compensation_param.a_param_a, rssi_compensation_param.a_param_a);
5870 A_PRINTF("a_param_b = 0x%x and %d \n", rssi_compensation_param.a_param_b, rssi_compensation_param.a_param_b);
5871 A_PRINTF("Last 4 bytes = 0x%x \n", rssi_compensation_param.reserved);
5872#endif
5873
5874 if (rssi_compensation_param.enable != 0x1) {
5875 rssi_compensation_param.enable = 0;
5876 }
5877
5878 return;
5879}
5880
f68057e6 5881s32 rssi_compensation_calc_tcmd(u32 freq, s32 rssi, u32 totalPkt)
30295c89
VM
5882{
5883
5884 if (freq > 5000)
5885 {
5886 if (rssi_compensation_param.enable)
5887 {
5888 AR_DEBUG_PRINTF(ATH_DEBUG_INFO, (">>> 11a\n"));
5889 AR_DEBUG_PRINTF(ATH_DEBUG_INFO, ("rssi before compensation = %d, totalPkt = %d\n", rssi,totalPkt));
5890 rssi = rssi * rssi_compensation_param.a_param_a + totalPkt * rssi_compensation_param.a_param_b;
5891 rssi = (rssi-50) /100;
5892 AR_DEBUG_PRINTF(ATH_DEBUG_INFO, ("rssi after compensation = %d\n", rssi));
5893 }
5894 }
5895 else
5896 {
5897 if (rssi_compensation_param.enable)
5898 {
5899 AR_DEBUG_PRINTF(ATH_DEBUG_INFO, (">>> 11bg\n"));
5900 AR_DEBUG_PRINTF(ATH_DEBUG_INFO, ("rssi before compensation = %d, totalPkt = %d\n", rssi,totalPkt));
5901 rssi = rssi * rssi_compensation_param.bg_param_a + totalPkt * rssi_compensation_param.bg_param_b;
5902 rssi = (rssi-50) /100;
5903 AR_DEBUG_PRINTF(ATH_DEBUG_INFO, ("rssi after compensation = %d\n", rssi));
5904 }
5905 }
5906
5907 return rssi;
5908}
5909
a71f0bf6 5910s16 rssi_compensation_calc(struct ar6_softc *ar, s16 rssi)
30295c89
VM
5911{
5912 if (ar->arBssChannel > 5000)
5913 {
5914 if (rssi_compensation_param.enable)
5915 {
5916 AR_DEBUG_PRINTF(ATH_DEBUG_INFO, (">>> 11a\n"));
5917 AR_DEBUG_PRINTF(ATH_DEBUG_INFO, ("rssi before compensation = %d\n", rssi));
5918 rssi = rssi * rssi_compensation_param.a_param_a + rssi_compensation_param.a_param_b;
5919 rssi = (rssi-50) /100;
5920 AR_DEBUG_PRINTF(ATH_DEBUG_INFO, ("rssi after compensation = %d\n", rssi));
5921 }
5922 }
5923 else
5924 {
5925 if (rssi_compensation_param.enable)
5926 {
5927 AR_DEBUG_PRINTF(ATH_DEBUG_INFO, (">>> 11bg\n"));
5928 AR_DEBUG_PRINTF(ATH_DEBUG_INFO, ("rssi before compensation = %d\n", rssi));
5929 rssi = rssi * rssi_compensation_param.bg_param_a + rssi_compensation_param.bg_param_b;
5930 rssi = (rssi-50) /100;
5931 AR_DEBUG_PRINTF(ATH_DEBUG_INFO, ("rssi after compensation = %d\n", rssi));
5932 }
5933 }
5934
5935 return rssi;
5936}
5937
a71f0bf6 5938s16 rssi_compensation_reverse_calc(struct ar6_softc *ar, s16 rssi, bool Above)
30295c89 5939{
cb1e3709 5940 s16 i;
30295c89
VM
5941
5942 if (ar->arBssChannel > 5000)
5943 {
5944 if (rssi_compensation_param.enable)
5945 {
5946 AR_DEBUG_PRINTF(ATH_DEBUG_INFO, (">>> 11a\n"));
5947 AR_DEBUG_PRINTF(ATH_DEBUG_INFO, ("rssi before rev compensation = %d\n", rssi));
5948 rssi = rssi * 100;
5949 rssi = (rssi - rssi_compensation_param.a_param_b) / rssi_compensation_param.a_param_a;
5950 AR_DEBUG_PRINTF(ATH_DEBUG_INFO, ("rssi after rev compensation = %d\n", rssi));
5951 }
5952 }
5953 else
5954 {
5955 if (rssi_compensation_param.enable)
5956 {
5957 AR_DEBUG_PRINTF(ATH_DEBUG_INFO, (">>> 11bg\n"));
5958 AR_DEBUG_PRINTF(ATH_DEBUG_INFO, ("rssi before rev compensation = %d\n", rssi));
5959
5960 if (Above) {
5961 for (i=95; i>=0; i--) {
5962 if (rssi <= rssi_compensation_table[i]) {
5963 rssi = 0 - i;
5964 break;
5965 }
5966 }
5967 } else {
5968 for (i=0; i<=95; i++) {
5969 if (rssi >= rssi_compensation_table[i]) {
5970 rssi = 0 - i;
5971 break;
5972 }
5973 }
5974 }
5975 AR_DEBUG_PRINTF(ATH_DEBUG_INFO, ("rssi after rev compensation = %d\n", rssi));
5976 }
5977 }
5978
5979 return rssi;
5980}
5981
5982#ifdef WAPI_ENABLE
a71f0bf6 5983void ap_wapi_rekey_event(struct ar6_softc *ar, u8 type, u8 *mac)
30295c89
VM
5984{
5985 union iwreq_data wrqu;
4c42080f 5986 char buf[20];
30295c89
VM
5987
5988 A_MEMZERO(buf, sizeof(buf));
5989
5990 strcpy(buf, "WAPI_REKEY");
5991 buf[10] = type;
05209262 5992 memcpy(&buf[11], mac, ATH_MAC_LEN);
30295c89
VM
5993
5994 A_MEMZERO(&wrqu, sizeof(wrqu));
5995 wrqu.data.length = 10+1+ATH_MAC_LEN;
5996 wireless_send_event(ar->arNetDev, IWEVCUSTOM, &wrqu, buf);
5997
5998 A_PRINTF("WAPI REKEY - %d - %02x:%02x\n", type, mac[4], mac[5]);
5999}
6000#endif
6001
6002#ifdef USER_KEYS
1f4c34bd 6003static int
30295c89 6004
a71f0bf6 6005ar6000_reinstall_keys(struct ar6_softc *ar, u8 key_op_ctrl)
30295c89 6006{
4f69cef0 6007 int status = 0;
30295c89
VM
6008 struct ieee80211req_key *uik = &ar->user_saved_keys.ucast_ik;
6009 struct ieee80211req_key *bik = &ar->user_saved_keys.bcast_ik;
6010 CRYPTO_TYPE keyType = ar->user_saved_keys.keyType;
6011
6012 if (IEEE80211_CIPHER_CCKM_KRK != uik->ik_type) {
6013 if (NONE_CRYPT == keyType) {
6014 goto _reinstall_keys_out;
6015 }
6016
6017 if (uik->ik_keylen) {
6018 status = wmi_addKey_cmd(ar->arWmi, uik->ik_keyix,
6019 ar->user_saved_keys.keyType, PAIRWISE_USAGE,
ab3655da 6020 uik->ik_keylen, (u8 *)&uik->ik_keyrsc,
30295c89
VM
6021 uik->ik_keydata, key_op_ctrl, uik->ik_macaddr, SYNC_BEFORE_WMIFLAG);
6022 }
6023
6024 } else {
6025 status = wmi_add_krk_cmd(ar->arWmi, uik->ik_keydata);
6026 }
6027
6028 if (IEEE80211_CIPHER_CCKM_KRK != bik->ik_type) {
6029 if (NONE_CRYPT == keyType) {
6030 goto _reinstall_keys_out;
6031 }
6032
6033 if (bik->ik_keylen) {
6034 status = wmi_addKey_cmd(ar->arWmi, bik->ik_keyix,
6035 ar->user_saved_keys.keyType, GROUP_USAGE,
ab3655da 6036 bik->ik_keylen, (u8 *)&bik->ik_keyrsc,
30295c89
VM
6037 bik->ik_keydata, key_op_ctrl, bik->ik_macaddr, NO_SYNC_WMIFLAG);
6038 }
6039 } else {
6040 status = wmi_add_krk_cmd(ar->arWmi, bik->ik_keydata);
6041 }
6042
6043_reinstall_keys_out:
6044 ar->user_savedkeys_stat = USER_SAVEDKEYS_STAT_INIT;
6045 ar->user_key_ctrl = 0;
6046
6047 return status;
6048}
6049#endif /* USER_KEYS */
6050
6051
6052void
6053ar6000_dset_open_req(
6054 void *context,
e1ce2a3a
JP
6055 u32 id,
6056 u32 targHandle,
6057 u32 targReplyFn,
6058 u32 targReplyArg)
30295c89
VM
6059{
6060}
6061
6062void
6063ar6000_dset_close(
6064 void *context,
e1ce2a3a 6065 u32 access_cookie)
30295c89
VM
6066{
6067 return;
6068}
6069
6070void
6071ar6000_dset_data_req(
6072 void *context,
e1ce2a3a
JP
6073 u32 accessCookie,
6074 u32 offset,
6075 u32 length,
6076 u32 targBuf,
6077 u32 targReplyFn,
6078 u32 targReplyArg)
30295c89
VM
6079{
6080}
6081
6082int
6083ar6000_ap_mode_profile_commit(struct ar6_softc *ar)
6084{
6085 WMI_CONNECT_CMD p;
6086 unsigned long flags;
6087
6088 /* No change in AP's profile configuration */
6089 if(ar->ap_profile_flag==0) {
6090 A_PRINTF("COMMIT: No change in profile!!!\n");
6091 return -ENODATA;
6092 }
6093
6094 if(!ar->arSsidLen) {
6095 A_PRINTF("SSID not set!!!\n");
6096 return -ECHRNG;
6097 }
6098
6099 switch(ar->arAuthMode) {
6100 case NONE_AUTH:
6101 if((ar->arPairwiseCrypto != NONE_CRYPT) &&
6102#ifdef WAPI_ENABLE
6103 (ar->arPairwiseCrypto != WAPI_CRYPT) &&
6104#endif
6105 (ar->arPairwiseCrypto != WEP_CRYPT)) {
6106 A_PRINTF("Cipher not supported in AP mode Open auth\n");
6107 return -EOPNOTSUPP;
6108 }
6109 break;
6110 case WPA_PSK_AUTH:
6111 case WPA2_PSK_AUTH:
6112 case (WPA_PSK_AUTH|WPA2_PSK_AUTH):
6113 break;
6114 default:
6115 A_PRINTF("This key mgmt type not supported in AP mode\n");
6116 return -EOPNOTSUPP;
6117 }
6118
6119 /* Update the arNetworkType */
6120 ar->arNetworkType = ar->arNextMode;
6121
6122 A_MEMZERO(&p,sizeof(p));
6123 p.ssidLength = ar->arSsidLen;
05209262 6124 memcpy(p.ssid,ar->arSsid,p.ssidLength);
30295c89
VM
6125 p.channel = ar->arChannelHint;
6126 p.networkType = ar->arNetworkType;
6127
6128 p.dot11AuthMode = ar->arDot11AuthMode;
6129 p.authMode = ar->arAuthMode;
6130 p.pairwiseCryptoType = ar->arPairwiseCrypto;
6131 p.pairwiseCryptoLen = ar->arPairwiseCryptoLen;
6132 p.groupCryptoType = ar->arGroupCrypto;
6133 p.groupCryptoLen = ar->arGroupCryptoLen;
6134 p.ctrl_flags = ar->arConnectCtrlFlags;
6135
30295c89
VM
6136 wmi_ap_profile_commit(ar->arWmi, &p);
6137 spin_lock_irqsave(&ar->arLock, flags);
1071a134 6138 ar->arConnected = true;
30295c89
VM
6139 netif_carrier_on(ar->arNetDev);
6140 spin_unlock_irqrestore(&ar->arLock, flags);
6141 ar->ap_profile_flag = 0;
6142 return 0;
6143}
6144
1f4c34bd 6145int
30295c89
VM
6146ar6000_connect_to_ap(struct ar6_softc *ar)
6147{
6148 /* The ssid length check prevents second "essid off" from the user,
6149 to be treated as a connect cmd. The second "essid off" is ignored.
6150 */
1071a134 6151 if((ar->arWmiReady == true) && (ar->arSsidLen > 0) && ar->arNetworkType!=AP_NETWORK)
30295c89 6152 {
1f4c34bd 6153 int status;
30295c89
VM
6154 if((ADHOC_NETWORK != ar->arNetworkType) &&
6155 (NONE_AUTH==ar->arAuthMode) &&
6156 (WEP_CRYPT==ar->arPairwiseCrypto)) {
6157 ar6000_install_static_wep_keys(ar);
6158 }
6159
6160 if (!ar->arUserBssFilter) {
4f69cef0 6161 if (wmi_bssfilter_cmd(ar->arWmi, ALL_BSS_FILTER, 0) != 0) {
30295c89
VM
6162 return -EIO;
6163 }
6164 }
6165#ifdef WAPI_ENABLE
6166 if (ar->arWapiEnable) {
6167 ar->arPairwiseCrypto = WAPI_CRYPT;
6168 ar->arPairwiseCryptoLen = 0;
6169 ar->arGroupCrypto = WAPI_CRYPT;
6170 ar->arGroupCryptoLen = 0;
6171 ar->arAuthMode = NONE_AUTH;
6172 ar->arConnectCtrlFlags |= CONNECT_IGNORE_WPAx_GROUP_CIPHER;
6173 }
6174#endif
6175 AR_DEBUG_PRINTF(ATH_DEBUG_WLAN_CONNECT,("Connect called with authmode %d dot11 auth %d"\
6176 " PW crypto %d PW crypto Len %d GRP crypto %d"\
6177 " GRP crypto Len %d\n",
6178 ar->arAuthMode, ar->arDot11AuthMode,
6179 ar->arPairwiseCrypto, ar->arPairwiseCryptoLen,
6180 ar->arGroupCrypto, ar->arGroupCryptoLen));
6181 reconnect_flag = 0;
6182 /* Set the listen interval into 1000TUs or more. This value will be indicated to Ap in the conn.
6183 later set it back locally at the STA to 100/1000 TUs depending on the power mode */
6184 if ((ar->arNetworkType == INFRA_NETWORK)) {
4853ac05 6185 wmi_listeninterval_cmd(ar->arWmi, max(ar->arListenIntervalT, (u16)A_MAX_WOW_LISTEN_INTERVAL), 0);
30295c89
VM
6186 }
6187 status = wmi_connect_cmd(ar->arWmi, ar->arNetworkType,
6188 ar->arDot11AuthMode, ar->arAuthMode,
6189 ar->arPairwiseCrypto, ar->arPairwiseCryptoLen,
6190 ar->arGroupCrypto,ar->arGroupCryptoLen,
6191 ar->arSsidLen, ar->arSsid,
6192 ar->arReqBssid, ar->arChannelHint,
6193 ar->arConnectCtrlFlags);
a1d46529 6194 if (status) {
30295c89
VM
6195 wmi_listeninterval_cmd(ar->arWmi, ar->arListenIntervalT, ar->arListenIntervalB);
6196 if (!ar->arUserBssFilter) {
6197 wmi_bssfilter_cmd(ar->arWmi, NONE_BSS_FILTER, 0);
6198 }
6199 return status;
6200 }
6201
6202 if ((!(ar->arConnectCtrlFlags & CONNECT_DO_WPA_OFFLOAD)) &&
6203 ((WPA_PSK_AUTH == ar->arAuthMode) || (WPA2_PSK_AUTH == ar->arAuthMode)))
6204 {
6205 A_TIMEOUT_MS(&ar->disconnect_timer, A_DISCONNECT_TIMER_INTERVAL, 0);
6206 }
6207
6208 ar->arConnectCtrlFlags &= ~CONNECT_DO_WPA_OFFLOAD;
6209
1071a134 6210 ar->arConnectPending = true;
30295c89
VM
6211 return status;
6212 }
6213 return A_ERROR;
6214}
6215
83195cc8
VM
6216int
6217ar6000_disconnect(struct ar6_softc *ar)
6218{
6219 if ((ar->arConnected == true) || (ar->arConnectPending == true)) {
6220 wmi_disconnect_cmd(ar->arWmi);
6221 /*
6222 * Disconnect cmd is issued, clear connectPending.
6223 * arConnected will be cleard in disconnect_event notification.
6224 */
6225 ar->arConnectPending = false;
6226 }
6227
6228 return 0;
6229}
6230
1f4c34bd 6231int
30295c89
VM
6232ar6000_ap_mode_get_wpa_ie(struct ar6_softc *ar, struct ieee80211req_wpaie *wpaie)
6233{
6234 sta_t *conn = NULL;
6235 conn = ieee80211_find_conn(ar, wpaie->wpa_macaddr);
6236
6237 A_MEMZERO(wpaie->wpa_ie, IEEE80211_MAX_IE);
6238 A_MEMZERO(wpaie->rsn_ie, IEEE80211_MAX_IE);
6239
6240 if(conn) {
05209262 6241 memcpy(wpaie->wpa_ie, conn->wpa_ie, IEEE80211_MAX_IE);
30295c89
VM
6242 }
6243
6244 return 0;
6245}
6246
1f4c34bd 6247int
4853ac05 6248is_iwioctl_allowed(u8 mode, u16 cmd)
30295c89
VM
6249{
6250 if(cmd >= SIOCSIWCOMMIT && cmd <= SIOCGIWPOWER) {
6251 cmd -= SIOCSIWCOMMIT;
4f69cef0
JP
6252 if(sioctl_filter[cmd] == 0xFF) return 0;
6253 if(sioctl_filter[cmd] & mode) return 0;
30295c89
VM
6254 } else if(cmd >= SIOCIWFIRSTPRIV && cmd <= (SIOCIWFIRSTPRIV+30)) {
6255 cmd -= SIOCIWFIRSTPRIV;
4f69cef0
JP
6256 if(pioctl_filter[cmd] == 0xFF) return 0;
6257 if(pioctl_filter[cmd] & mode) return 0;
30295c89
VM
6258 } else {
6259 return A_ERROR;
6260 }
6261 return A_ENOTSUP;
6262}
6263
1f4c34bd 6264int
ab3655da 6265is_xioctl_allowed(u8 mode, int cmd)
30295c89
VM
6266{
6267 if(sizeof(xioctl_filter)-1 < cmd) {
6268 A_PRINTF("Filter for this cmd=%d not defined\n",cmd);
6269 return 0;
6270 }
4f69cef0
JP
6271 if(xioctl_filter[cmd] == 0xFF) return 0;
6272 if(xioctl_filter[cmd] & mode) return 0;
30295c89
VM
6273 return A_ERROR;
6274}
6275
6276#ifdef WAPI_ENABLE
6277int
6278ap_set_wapi_key(struct ar6_softc *ar, void *ikey)
6279{
6280 struct ieee80211req_key *ik = (struct ieee80211req_key *)ikey;
6281 KEY_USAGE keyUsage = 0;
1f4c34bd 6282 int status;
30295c89 6283
395e1cae 6284 if (memcmp(ik->ik_macaddr, bcast_mac, IEEE80211_ADDR_LEN) == 0) {
30295c89
VM
6285 keyUsage = GROUP_USAGE;
6286 } else {
6287 keyUsage = PAIRWISE_USAGE;
6288 }
6289 A_PRINTF("WAPI_KEY: Type:%d ix:%d mac:%02x:%02x len:%d\n",
6290 keyUsage, ik->ik_keyix, ik->ik_macaddr[4], ik->ik_macaddr[5],
6291 ik->ik_keylen);
6292
6293 status = wmi_addKey_cmd(ar->arWmi, ik->ik_keyix, WAPI_CRYPT, keyUsage,
ab3655da 6294 ik->ik_keylen, (u8 *)&ik->ik_keyrsc,
30295c89
VM
6295 ik->ik_keydata, KEY_OP_INIT_VAL, ik->ik_macaddr,
6296 SYNC_BOTH_WMIFLAG);
6297
4f69cef0 6298 if (0 != status) {
30295c89
VM
6299 return -EIO;
6300 }
6301 return 0;
6302}
6303#endif
6304
6305void ar6000_peer_event(
6306 void *context,
ab3655da
JP
6307 u8 eventCode,
6308 u8 *macAddr)
30295c89 6309{
ab3655da 6310 u8 pos;
30295c89
VM
6311
6312 for (pos=0;pos<6;pos++)
6313 printk("%02x: ",*(macAddr+pos));
6314 printk("\n");
6315}
6316
6317#ifdef HTC_TEST_SEND_PKTS
6318#define HTC_TEST_DUPLICATE 8
a71f0bf6 6319static void DoHTCSendPktsTest(struct ar6_softc *ar, int MapNo, HTC_ENDPOINT_ID eid, struct sk_buff *dupskb)
30295c89
VM
6320{
6321 struct ar_cookie *cookie;
6322 struct ar_cookie *cookieArray[HTC_TEST_DUPLICATE];
6323 struct sk_buff *new_skb;
6324 int i;
6325 int pkts = 0;
6ca0f664 6326 struct htc_packet_queue pktQueue;
30295c89
VM
6327 EPPING_HEADER *eppingHdr;
6328
6329 eppingHdr = A_NETBUF_DATA(dupskb);
6330
6331 if (eppingHdr->Cmd_h == EPPING_CMD_NO_ECHO) {
6332 /* skip test if this is already a tx perf test */
6333 return;
6334 }
6335
6336 for (i = 0; i < HTC_TEST_DUPLICATE; i++,pkts++) {
6337 AR6000_SPIN_LOCK(&ar->arLock, 0);
6338 cookie = ar6000_alloc_cookie(ar);
6339 if (cookie != NULL) {
6340 ar->arTxPending[eid]++;
6341 ar->arTotalTxDataPending++;
6342 }
6343
6344 AR6000_SPIN_UNLOCK(&ar->arLock, 0);
6345
6346 if (NULL == cookie) {
6347 break;
6348 }
6349
6350 new_skb = A_NETBUF_ALLOC(A_NETBUF_LEN(dupskb));
6351
6352 if (new_skb == NULL) {
6353 AR6000_SPIN_LOCK(&ar->arLock, 0);
6354 ar6000_free_cookie(ar,cookie);
6355 AR6000_SPIN_UNLOCK(&ar->arLock, 0);
6356 break;
6357 }
6358
6359 A_NETBUF_PUT_DATA(new_skb, A_NETBUF_DATA(dupskb), A_NETBUF_LEN(dupskb));
6360 cookie->arc_bp[0] = (unsigned long)new_skb;
6361 cookie->arc_bp[1] = MapNo;
6362 SET_HTC_PACKET_INFO_TX(&cookie->HtcPkt,
6363 cookie,
6364 A_NETBUF_DATA(new_skb),
6365 A_NETBUF_LEN(new_skb),
6366 eid,
6367 AR6K_DATA_PKT_TAG);
6368
6369 cookieArray[i] = cookie;
6370
6371 {
6372 EPPING_HEADER *pHdr = (EPPING_HEADER *)A_NETBUF_DATA(new_skb);
6373 pHdr->Cmd_h = EPPING_CMD_NO_ECHO; /* do not echo the packet */
6374 }
6375 }
6376
6377 if (pkts == 0) {
6378 return;
6379 }
6380
6381 INIT_HTC_PACKET_QUEUE(&pktQueue);
6382
6383 for (i = 0; i < pkts; i++) {
6384 HTC_PACKET_ENQUEUE(&pktQueue,&cookieArray[i]->HtcPkt);
6385 }
6386
6387 HTCSendPktsMultiple(ar->arHtcTarget, &pktQueue);
6388
6389}
6390#endif
6391
6392#ifdef CONFIG_AP_VIRTUAL_ADAPTER_SUPPORT
6393/*
6394 * Add support for adding and removing a virtual adapter for soft AP.
6395 * Some OS requires different adapters names for station and soft AP mode.
25985edc 6396 * To support these requirement, create and destroy a netdevice instance
30295c89
VM
6397 * when the AP mode is operational. A full fledged support for virual device
6398 * is not implemented. Rather a virtual interface is created and is linked
6399 * with the existing physical device instance during the operation of the
6400 * AP mode.
6401 */
6402
a71f0bf6 6403int ar6000_start_ap_interface(struct ar6_softc *ar)
30295c89 6404{
cbe70751 6405 struct ar_virtual_interface *arApDev;
30295c89
VM
6406
6407 /* Change net_device to point to AP instance */
cbe70751 6408 arApDev = (struct ar_virtual_interface *)ar->arApDev;
30295c89
VM
6409 ar->arNetDev = arApDev->arNetDev;
6410
4f69cef0 6411 return 0;
30295c89
VM
6412}
6413
a71f0bf6 6414int ar6000_stop_ap_interface(struct ar6_softc *ar)
30295c89 6415{
cbe70751 6416 struct ar_virtual_interface *arApDev;
30295c89
VM
6417
6418 /* Change net_device to point to sta instance */
cbe70751 6419 arApDev = (struct ar_virtual_interface *)ar->arApDev;
30295c89
VM
6420 if (arApDev) {
6421 ar->arNetDev = arApDev->arStaNetDev;
6422 }
6423
4f69cef0 6424 return 0;
30295c89
VM
6425}
6426
6427
a71f0bf6 6428int ar6000_create_ap_interface(struct ar6_softc *ar, char *ap_ifname)
30295c89
VM
6429{
6430 struct net_device *dev;
cbe70751 6431 struct ar_virtual_interface *arApDev;
30295c89 6432
cbe70751 6433 dev = alloc_etherdev(sizeof(struct ar_virtual_interface));
30295c89
VM
6434 if (dev == NULL) {
6435 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,("ar6000_create_ap_interface: can't alloc etherdev\n"));
6436 return A_ERROR;
6437 }
6438
6439 ether_setup(dev);
6440 init_netdev(dev, ap_ifname);
6441
6442 if (register_netdev(dev)) {
6443 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,("ar6000_create_ap_interface: register_netdev failed\n"));
6444 return A_ERROR;
6445 }
6446
6447 arApDev = netdev_priv(dev);
6448 arApDev->arDev = ar;
6449 arApDev->arNetDev = dev;
6450 arApDev->arStaNetDev = ar->arNetDev;
6451
6452 ar->arApDev = arApDev;
6453 arApNetDev = dev;
6454
6455 /* Copy the MAC address */
05209262 6456 memcpy(dev->dev_addr, ar->arNetDev->dev_addr, AR6000_ETH_ADDR_LEN);
30295c89 6457
4f69cef0 6458 return 0;
30295c89
VM
6459}
6460
a71f0bf6 6461int ar6000_add_ap_interface(struct ar6_softc *ar, char *ap_ifname)
30295c89
VM
6462{
6463 /* Interface already added, need not proceed further */
6464 if (ar->arApDev != NULL) {
6465 AR_DEBUG_PRINTF(ATH_DEBUG_ERR,("ar6000_add_ap_interface: interface already present \n"));
4f69cef0 6466 return 0;
30295c89
VM
6467 }
6468
4f69cef0 6469 if (ar6000_create_ap_interface(ar, ap_ifname) != 0) {
30295c89
VM
6470 return A_ERROR;
6471 }
6472
6473 A_PRINTF("Add AP interface %s \n",ap_ifname);
6474
6475 return ar6000_start_ap_interface(ar);
6476}
6477
a71f0bf6 6478int ar6000_remove_ap_interface(struct ar6_softc *ar)
30295c89
VM
6479{
6480 if (arApNetDev) {
6481 ar6000_stop_ap_interface(ar);
6482
6483 unregister_netdev(arApNetDev);
30295c89 6484 free_netdev(apApNetDev);
30295c89
VM
6485
6486 A_PRINTF("Remove AP interface\n");
6487 }
6488 ar->arApDev = NULL;
6489 arApNetDev = NULL;
6490
6491
4f69cef0 6492 return 0;
30295c89
VM
6493}
6494#endif /* CONFIG_AP_VIRTUAL_ADAPTER_SUPPORT */
6495
6496
6497#ifdef EXPORT_HCI_BRIDGE_INTERFACE
6498EXPORT_SYMBOL(setupbtdev);
6499#endif