707755217696657d27ed53fac160aed4d5f30cfa
[GitHub/exynos8895/android_kernel_samsung_universal8895.git] / drivers / net / wireless / bcmdhd4361 / dhd_common.c
1 /*
2 * Broadcom Dongle Host Driver (DHD), common DHD core.
3 *
4 * Copyright (C) 1999-2019, Broadcom.
5 *
6 * Unless you and Broadcom execute a separate written software license
7 * agreement governing use of this software, this software is licensed to you
8 * under the terms of the GNU General Public License version 2 (the "GPL"),
9 * available at http://www.broadcom.com/licenses/GPLv2.php, with the
10 * following added to such license:
11 *
12 * As a special exception, the copyright holders of this software give you
13 * permission to link this software with independent modules, and to copy and
14 * distribute the resulting executable under terms of your choice, provided that
15 * you also meet, for each linked independent module, the terms and conditions of
16 * the license of that module. An independent module is a module which is not
17 * derived from this software. The special exception does not apply to any
18 * modifications of the software.
19 *
20 * Notwithstanding the above, under no circumstances may you combine this
21 * software in any way with any other Broadcom software provided under a license
22 * other than the GPL, without Broadcom's express prior written consent.
23 *
24 *
25 * <<Broadcom-WL-IPTag/Open:>>
26 *
27 * $Id: dhd_common.c 796845 2018-12-27 06:24:52Z $
28 */
29 #include <typedefs.h>
30 #include <osl.h>
31
32 #include <epivers.h>
33 #include <bcmutils.h>
34
35 #include <bcmendian.h>
36 #include <dngl_stats.h>
37 #include <dhd.h>
38 #include <dhd_ip.h>
39 #include <bcmevent.h>
40 #include <dhdioctl.h>
41
42 #ifdef PCIE_FULL_DONGLE
43 #include <bcmmsgbuf.h>
44 #endif /* PCIE_FULL_DONGLE */
45
46 #ifdef SHOW_LOGTRACE
47 #include <event_log.h>
48 #endif /* SHOW_LOGTRACE */
49
50 #ifdef BCMPCIE
51 #include <dhd_flowring.h>
52 #endif // endif
53
54 #include <dhd_bus.h>
55 #include <dhd_proto.h>
56 #include <dhd_dbg.h>
57 #include <802.1d.h>
58 #include <dhd_debug.h>
59 #include <dhd_dbg_ring.h>
60 #include <dhd_mschdbg.h>
61 #include <msgtrace.h>
62
63 #ifdef WL_CFG80211
64 #include <wl_cfg80211.h>
65 #endif // endif
66 #ifdef PNO_SUPPORT
67 #include <dhd_pno.h>
68 #endif // endif
69 #ifdef RTT_SUPPORT
70 #include <dhd_rtt.h>
71 #endif // endif
72
73 #ifdef DNGL_EVENT_SUPPORT
74 #include <dnglevent.h>
75 #endif // endif
76
77 #define htod32(i) (i)
78 #define htod16(i) (i)
79 #define dtoh32(i) (i)
80 #define dtoh16(i) (i)
81 #define htodchanspec(i) (i)
82 #define dtohchanspec(i) (i)
83
84 #ifdef PROP_TXSTATUS
85 #include <wlfc_proto.h>
86 #include <dhd_wlfc.h>
87 #endif // endif
88
89 #ifdef DHD_L2_FILTER
90 #include <dhd_l2_filter.h>
91 #endif /* DHD_L2_FILTER */
92
93 #ifdef DHD_PSTA
94 #include <dhd_psta.h>
95 #endif /* DHD_PSTA */
96
97 #ifdef DHD_WET
98 #include <dhd_wet.h>
99 #endif /* DHD_WET */
100
101 #ifdef DHD_LOG_DUMP
102 #include <dhd_dbg.h>
103 #ifdef DHD_PKT_LOGGING
104 #include <dhd_pktlog.h>
105 #endif /* DHD_PKT_LOGGING */
106 #endif /* DHD_LOG_DUMP */
107
108 #ifdef DHD_SSSR_DUMP
109 #include <bcmdevs.h>
110 #endif /* DHD_SSSR_DUMP */
111
112 int dhd_msg_level = DHD_ERROR_VAL | DHD_FWLOG_VAL | DHD_EVENT_VAL
113 /* For CUSTOMER_HW4 do not enable DHD_IOVAR_MEM_VAL by default */
114 #if !defined(CUSTOMER_HW4)
115 | DHD_IOVAR_MEM_VAL
116 #endif /* !defined(CUSTOMER_HW4) */
117 | DHD_PKT_MON_VAL;
118
119 #if defined(WL_WIRELESS_EXT)
120 #include <wl_iw.h>
121 #endif // endif
122
123 #ifdef DHD_ULP
124 #include <dhd_ulp.h>
125 #endif /* DHD_ULP */
126
127 #ifdef DHD_DEBUG
128 #include <sdiovar.h>
129 #endif /* DHD_DEBUG */
130
131 #ifdef DHD_PCIE_NATIVE_RUNTIMEPM
132 #include <linux/pm_runtime.h>
133 #endif /* DHD_PCIE_NATIVE_RUNTIMEPM */
134
135 #ifdef SOFTAP
136 char fw_path2[MOD_PARAM_PATHLEN];
137 extern bool softap_enabled;
138 #endif // endif
139
140 #ifdef SHOW_LOGTRACE
141 #define BYTES_AHEAD_NUM 10 /* address in map file is before these many bytes */
142 #define READ_NUM_BYTES 1000 /* read map file each time this No. of bytes */
143 #define GO_BACK_FILE_POS_NUM_BYTES 100 /* set file pos back to cur pos */
144 static char *ramstart_str = " text_start"; /* string in mapfile has addr ramstart */
145 static char *rodata_start_str = " rodata_start"; /* string in mapfile has addr rodata start */
146 static char *rodata_end_str = " rodata_end"; /* string in mapfile has addr rodata end */
147 #define RAMSTART_BIT 0x01
148 #define RDSTART_BIT 0x02
149 #define RDEND_BIT 0x04
150 #define ALL_MAP_VAL (RAMSTART_BIT | RDSTART_BIT | RDEND_BIT)
151 #endif /* SHOW_LOGTRACE */
152
153 #ifdef SHOW_LOGTRACE
154 /* the fw file path is taken from either the module parameter at
155 * insmod time or is defined as a constant of different values
156 * for different platforms
157 */
158 extern char *st_str_file_path;
159 #endif /* SHOW_LOGTRACE */
160
161 #define DHD_TPUT_MAX_TX_PKTS_BATCH 1000
162
163 /* Last connection success/failure status */
164 uint32 dhd_conn_event;
165 uint32 dhd_conn_status;
166 uint32 dhd_conn_reason;
167
168 extern int dhd_iscan_request(void * dhdp, uint16 action);
169 extern void dhd_ind_scan_confirm(void *h, bool status);
170 extern int dhd_iscan_in_progress(void *h);
171 void dhd_iscan_lock(void);
172 void dhd_iscan_unlock(void);
173 extern int dhd_change_mtu(dhd_pub_t *dhd, int new_mtu, int ifidx);
174 #if !defined(AP) && defined(WLP2P)
175 extern int dhd_get_concurrent_capabilites(dhd_pub_t *dhd);
176 #endif // endif
177
178 extern int dhd_socram_dump(struct dhd_bus *bus);
179 extern void dhd_set_packet_filter(dhd_pub_t *dhd);
180
181 #ifdef DNGL_EVENT_SUPPORT
182 static void dngl_host_event_process(dhd_pub_t *dhdp, bcm_dngl_event_t *event,
183 bcm_dngl_event_msg_t *dngl_event, size_t pktlen);
184 static int dngl_host_event(dhd_pub_t *dhdp, void *pktdata, bcm_dngl_event_msg_t *dngl_event,
185 size_t pktlen);
186 #endif /* DNGL_EVENT_SUPPORT */
187
188 #ifdef WL_CFGVENDOR_SEND_HANG_EVENT
189 static void copy_hang_info_ioctl_timeout(dhd_pub_t *dhd, int ifidx, wl_ioctl_t *ioc);
190 #endif /* WL_CFGVENDOR_SEND_HANG_EVENT */
191
192 #define MAX_CHUNK_LEN 1408 /* 8 * 8 * 22 */
193
194 bool ap_cfg_running = FALSE;
195 bool ap_fw_loaded = FALSE;
196
197 /* Version string to report */
198 #ifdef DHD_DEBUG
199 #ifndef SRCBASE
200 #define SRCBASE "drivers/net/wireless/bcmdhd"
201 #endif // endif
202 #define DHD_COMPILED "\nCompiled in " SRCBASE
203 #endif /* DHD_DEBUG */
204
205 #define CHIPID_MISMATCH 8
206
207 #if defined(DHD_DEBUG)
208 const char dhd_version[] = "Dongle Host Driver, version " EPI_VERSION_STR
209 DHD_COMPILED " on " __DATE__ " at " __TIME__;
210 #else
211 const char dhd_version[] = "\nDongle Host Driver, version " EPI_VERSION_STR "\nCompiled from ";
212 #endif // endif
213 char fw_version[FW_VER_STR_LEN] = "\0";
214 char clm_version[CLM_VER_STR_LEN] = "\0";
215
216 char bus_api_revision[BUS_API_REV_STR_LEN] = "\0";
217
218 void dhd_set_timer(void *bus, uint wdtick);
219
220 static char* ioctl2str(uint32 ioctl);
221
222 /* IOVar table */
223 enum {
224 IOV_VERSION = 1,
225 IOV_MSGLEVEL,
226 IOV_BCMERRORSTR,
227 IOV_BCMERROR,
228 IOV_WDTICK,
229 IOV_DUMP,
230 IOV_CLEARCOUNTS,
231 IOV_LOGDUMP,
232 IOV_LOGCAL,
233 IOV_LOGSTAMP,
234 IOV_GPIOOB,
235 IOV_IOCTLTIMEOUT,
236 IOV_CONS,
237 IOV_DCONSOLE_POLL,
238 #if defined(DHD_DEBUG)
239 IOV_DHD_JOIN_TIMEOUT_DBG,
240 IOV_SCAN_TIMEOUT,
241 IOV_MEM_DEBUG,
242 #ifdef BCMPCIE
243 IOV_FLOW_RING_DEBUG,
244 #endif /* BCMPCIE */
245 #endif /* defined(DHD_DEBUG) */
246 #ifdef PROP_TXSTATUS
247 IOV_PROPTXSTATUS_ENABLE,
248 IOV_PROPTXSTATUS_MODE,
249 IOV_PROPTXSTATUS_OPT,
250 IOV_PROPTXSTATUS_MODULE_IGNORE,
251 IOV_PROPTXSTATUS_CREDIT_IGNORE,
252 IOV_PROPTXSTATUS_TXSTATUS_IGNORE,
253 IOV_PROPTXSTATUS_RXPKT_CHK,
254 #endif /* PROP_TXSTATUS */
255 IOV_BUS_TYPE,
256 IOV_CHANGEMTU,
257 IOV_HOSTREORDER_FLOWS,
258 #ifdef DHDTCPACK_SUPPRESS
259 IOV_TCPACK_SUPPRESS,
260 #endif /* DHDTCPACK_SUPPRESS */
261 IOV_AP_ISOLATE,
262 #ifdef DHD_L2_FILTER
263 IOV_DHCP_UNICAST,
264 IOV_BLOCK_PING,
265 IOV_PROXY_ARP,
266 IOV_GRAT_ARP,
267 IOV_BLOCK_TDLS,
268 #endif /* DHD_L2_FILTER */
269 IOV_DHD_IE,
270 #ifdef DHD_PSTA
271 IOV_PSTA,
272 #endif /* DHD_PSTA */
273 #ifdef DHD_WET
274 IOV_WET,
275 IOV_WET_HOST_IPV4,
276 IOV_WET_HOST_MAC,
277 #endif /* DHD_WET */
278 IOV_CFG80211_OPMODE,
279 IOV_ASSERT_TYPE,
280 IOV_LMTEST,
281 #ifdef DHD_MCAST_REGEN
282 IOV_MCAST_REGEN_BSS_ENABLE,
283 #endif // endif
284 #ifdef SHOW_LOGTRACE
285 IOV_DUMP_TRACE_LOG,
286 #endif /* SHOW_LOGTRACE */
287 IOV_DONGLE_TRAP_TYPE,
288 IOV_DONGLE_TRAP_INFO,
289 IOV_BPADDR,
290 IOV_DUMP_DONGLE, /**< dumps core registers and d11 memories */
291 #if defined(DHD_LOG_DUMP)
292 IOV_LOG_DUMP,
293 #endif /* DHD_LOG_DUMP */
294 IOV_TPUT_TEST,
295 IOV_LAST
296 };
297
298 const bcm_iovar_t dhd_iovars[] = {
299 /* name varid flags flags2 type minlen */
300 {"version", IOV_VERSION, 0, 0, IOVT_BUFFER, sizeof(dhd_version)},
301 #ifdef DHD_DEBUG
302 {"msglevel", IOV_MSGLEVEL, 0, 0, IOVT_UINT32, 0},
303 {"mem_debug", IOV_MEM_DEBUG, 0, 0, IOVT_BUFFER, 0 },
304 #ifdef BCMPCIE
305 {"flow_ring_debug", IOV_FLOW_RING_DEBUG, 0, 0, IOVT_BUFFER, 0 },
306 #endif /* BCMPCIE */
307 #endif /* DHD_DEBUG */
308 {"bcmerrorstr", IOV_BCMERRORSTR, 0, 0, IOVT_BUFFER, BCME_STRLEN},
309 {"bcmerror", IOV_BCMERROR, 0, 0, IOVT_INT8, 0},
310 {"wdtick", IOV_WDTICK, 0, 0, IOVT_UINT32, 0},
311 {"dump", IOV_DUMP, 0, 0, IOVT_BUFFER, DHD_IOCTL_MAXLEN},
312 {"cons", IOV_CONS, 0, 0, IOVT_BUFFER, 0},
313 {"dconpoll", IOV_DCONSOLE_POLL, 0, 0, IOVT_UINT32, 0},
314 {"clearcounts", IOV_CLEARCOUNTS, 0, 0, IOVT_VOID, 0},
315 {"gpioob", IOV_GPIOOB, 0, 0, IOVT_UINT32, 0},
316 {"ioctl_timeout", IOV_IOCTLTIMEOUT, 0, 0, IOVT_UINT32, 0},
317 #ifdef PROP_TXSTATUS
318 {"proptx", IOV_PROPTXSTATUS_ENABLE, 0, 0, IOVT_BOOL, 0 },
319 /*
320 set the proptxtstatus operation mode:
321 0 - Do not do any proptxtstatus flow control
322 1 - Use implied credit from a packet status
323 2 - Use explicit credit
324 */
325 {"ptxmode", IOV_PROPTXSTATUS_MODE, 0, 0, IOVT_UINT32, 0 },
326 {"proptx_opt", IOV_PROPTXSTATUS_OPT, 0, 0, IOVT_UINT32, 0 },
327 {"pmodule_ignore", IOV_PROPTXSTATUS_MODULE_IGNORE, 0, 0, IOVT_BOOL, 0 },
328 {"pcredit_ignore", IOV_PROPTXSTATUS_CREDIT_IGNORE, 0, 0, IOVT_BOOL, 0 },
329 {"ptxstatus_ignore", IOV_PROPTXSTATUS_TXSTATUS_IGNORE, 0, 0, IOVT_BOOL, 0 },
330 {"rxpkt_chk", IOV_PROPTXSTATUS_RXPKT_CHK, 0, 0, IOVT_BOOL, 0 },
331 #endif /* PROP_TXSTATUS */
332 {"bustype", IOV_BUS_TYPE, 0, 0, IOVT_UINT32, 0},
333 {"changemtu", IOV_CHANGEMTU, 0, 0, IOVT_UINT32, 0 },
334 {"host_reorder_flows", IOV_HOSTREORDER_FLOWS, 0, 0, IOVT_BUFFER,
335 (WLHOST_REORDERDATA_MAXFLOWS + 1) },
336 #ifdef DHDTCPACK_SUPPRESS
337 {"tcpack_suppress", IOV_TCPACK_SUPPRESS, 0, 0, IOVT_UINT8, 0 },
338 #endif /* DHDTCPACK_SUPPRESS */
339 #ifdef DHD_L2_FILTER
340 {"dhcp_unicast", IOV_DHCP_UNICAST, (0), 0, IOVT_BOOL, 0 },
341 #endif /* DHD_L2_FILTER */
342 {"ap_isolate", IOV_AP_ISOLATE, (0), 0, IOVT_BOOL, 0},
343 #ifdef DHD_L2_FILTER
344 {"block_ping", IOV_BLOCK_PING, (0), 0, IOVT_BOOL, 0},
345 {"proxy_arp", IOV_PROXY_ARP, (0), 0, IOVT_BOOL, 0},
346 {"grat_arp", IOV_GRAT_ARP, (0), 0, IOVT_BOOL, 0},
347 {"block_tdls", IOV_BLOCK_TDLS, (0), IOVT_BOOL, 0},
348 #endif /* DHD_L2_FILTER */
349 {"dhd_ie", IOV_DHD_IE, (0), 0, IOVT_BUFFER, 0},
350 #ifdef DHD_PSTA
351 /* PSTA/PSR Mode configuration. 0: DIABLED 1: PSTA 2: PSR */
352 {"psta", IOV_PSTA, 0, 0, IOVT_UINT32, 0},
353 #endif /* DHD PSTA */
354 #ifdef DHD_WET
355 /* WET Mode configuration. 0: DIABLED 1: WET */
356 {"wet", IOV_WET, 0, 0, IOVT_UINT32, 0},
357 {"wet_host_ipv4", IOV_WET_HOST_IPV4, 0, 0, IOVT_UINT32, 0},
358 {"wet_host_mac", IOV_WET_HOST_MAC, 0, 0, IOVT_BUFFER, 0},
359 #endif /* DHD WET */
360 {"op_mode", IOV_CFG80211_OPMODE, 0, 0, IOVT_UINT32, 0 },
361 {"assert_type", IOV_ASSERT_TYPE, (0), 0, IOVT_UINT32, 0},
362 {"lmtest", IOV_LMTEST, 0, 0, IOVT_UINT32, 0 },
363 #ifdef DHD_MCAST_REGEN
364 {"mcast_regen_bss_enable", IOV_MCAST_REGEN_BSS_ENABLE, 0, 0, IOVT_BOOL, 0},
365 #endif // endif
366 #ifdef SHOW_LOGTRACE
367 {"dump_trace_buf", IOV_DUMP_TRACE_LOG, 0, 0, IOVT_BUFFER, sizeof(trace_buf_info_t) },
368 #endif /* SHOW_LOGTRACE */
369 {"trap_type", IOV_DONGLE_TRAP_TYPE, 0, 0, IOVT_UINT32, 0 },
370 {"trap_info", IOV_DONGLE_TRAP_INFO, 0, 0, IOVT_BUFFER, sizeof(trap_t) },
371 #ifdef DHD_DEBUG
372 {"bpaddr", IOV_BPADDR, 0, 0, IOVT_BUFFER, sizeof(sdreg_t) },
373 #endif /* DHD_DEBUG */
374 {"dump_dongle", IOV_DUMP_DONGLE, 0, 0, IOVT_BUFFER,
375 MAX(sizeof(dump_dongle_in_t), sizeof(dump_dongle_out_t)) },
376 #if defined(DHD_LOG_DUMP)
377 {"log_dump", IOV_LOG_DUMP, 0, 0, IOVT_UINT8, 0},
378 #endif /* DHD_LOG_DUMP */
379 {NULL, 0, 0, 0, 0, 0 }
380 };
381
382 #define DHD_IOVAR_BUF_SIZE 128
383
384 bool
385 dhd_query_bus_erros(dhd_pub_t *dhdp)
386 {
387 bool ret = FALSE;
388
389 if (dhdp->dongle_reset) {
390 DHD_ERROR(("%s: Dongle Reset occurred, cannot proceed\n",
391 __FUNCTION__));
392 ret = TRUE;
393 }
394
395 if (dhdp->dongle_trap_occured) {
396 DHD_ERROR(("%s: FW TRAP has occurred, cannot proceed\n",
397 __FUNCTION__));
398 ret = TRUE;
399 #if (LINUX_VERSION_CODE >= KERNEL_VERSION(2, 6, 27))
400 dhdp->hang_reason = HANG_REASON_DONGLE_TRAP;
401 dhd_os_send_hang_message(dhdp);
402 #endif /* LINUX_VERSION_CODE >= KERNEL_VERSION(2, 6, 27) */
403 }
404
405 if (dhdp->iovar_timeout_occured) {
406 DHD_ERROR(("%s: Resumed on timeout for previous IOVAR, cannot proceed\n",
407 __FUNCTION__));
408 ret = TRUE;
409 }
410
411 #ifdef PCIE_FULL_DONGLE
412 if (dhdp->d3ack_timeout_occured) {
413 DHD_ERROR(("%s: Resumed on timeout for previous D3ACK, cannot proceed\n",
414 __FUNCTION__));
415 ret = TRUE;
416 }
417 #endif /* PCIE_FULL_DONGLE */
418
419 #ifdef BCMPCIE
420 if (dhd_bus_get_linkdown(dhdp)) {
421 DHD_ERROR_RLMT(("%s : PCIE Link down occurred, cannot proceed\n",
422 __FUNCTION__));
423 ret = TRUE;
424 }
425 #endif /* BCMPCIE */
426
427 return ret;
428 }
429
430 #ifdef DHD_SSSR_DUMP
431 int
432 dhd_sssr_mempool_init(dhd_pub_t *dhd)
433 {
434 DHD_TRACE(("%s: ENTER\n", __FUNCTION__));
435 dhd->sssr_mempool = (uint8 *) MALLOCZ(dhd->osh, DHD_SSSR_MEMPOOL_SIZE);
436 if (dhd->sssr_mempool == NULL) {
437 DHD_ERROR(("%s: MALLOC of sssr_mempool failed\n",
438 __FUNCTION__));
439 return BCME_ERROR;
440 }
441 return BCME_OK;
442 }
443
444 void
445 dhd_sssr_mempool_deinit(dhd_pub_t *dhd)
446 {
447 DHD_TRACE(("%s: ENTER\n", __FUNCTION__));
448 if (dhd->sssr_mempool) {
449 MFREE(dhd->osh, dhd->sssr_mempool, DHD_SSSR_MEMPOOL_SIZE);
450 dhd->sssr_mempool = NULL;
451 }
452 }
453
454 void
455 dhd_dump_sssr_reg_info(sssr_reg_info_v1_t *sssr_reg_info)
456 {
457 }
458
459 int
460 dhd_get_sssr_reg_info_bcm4359(dhd_pub_t *dhd)
461 {
462 dhd->sssr_reg_info.version = SSSR_REG_INFO_VER;
463 dhd->sssr_reg_info.length = sizeof(sssr_reg_info_t);
464
465 /* PMU regs */
466 dhd->sssr_reg_info.pmu_regs.base_regs.pmuintmask0 = 0x18000700;
467 dhd->sssr_reg_info.pmu_regs.base_regs.pmuintmask1 = 0x18000704;
468 dhd->sssr_reg_info.pmu_regs.base_regs.resreqtimer = 0x18000644;
469 dhd->sssr_reg_info.pmu_regs.base_regs.macresreqtimer = 0x18000688;
470 dhd->sssr_reg_info.pmu_regs.base_regs.macresreqtimer1 = 0x180006f0;
471
472 /* chipcommon regs */
473 dhd->sssr_reg_info.chipcommon_regs.base_regs.intmask = 0x18000024;
474 dhd->sssr_reg_info.chipcommon_regs.base_regs.powerctrl = 0x180001e8;
475 dhd->sssr_reg_info.chipcommon_regs.base_regs.clockcontrolstatus = 0x180001e0;
476 dhd->sssr_reg_info.chipcommon_regs.base_regs.powerctrl_mask = 0xf00;
477
478 /* ARM regs */
479 dhd->sssr_reg_info.arm_regs.base_regs.clockcontrolstatus = 0x180021e0;
480 dhd->sssr_reg_info.arm_regs.base_regs.clockcontrolstatus_val = 0x20;
481 dhd->sssr_reg_info.arm_regs.wrapper_regs.resetctrl = 0x18102800;
482 dhd->sssr_reg_info.arm_regs.wrapper_regs.itopoobb = 0x18102f34;
483
484 /* PCIe regs */
485 dhd->sssr_reg_info.pcie_regs.base_regs.ltrstate = 0x180031a0;
486 dhd->sssr_reg_info.pcie_regs.base_regs.clockcontrolstatus = 0x180031e0;
487 dhd->sssr_reg_info.pcie_regs.base_regs.clockcontrolstatus_val = 0x0;
488 dhd->sssr_reg_info.pcie_regs.wrapper_regs.itopoobb = 0x18103f34;
489
490 /* MAC regs */
491 dhd->sssr_reg_info.mac_regs[0].base_regs.xmtdata = 0x18001134;
492 dhd->sssr_reg_info.mac_regs[0].base_regs.xmtaddress = 0x18001130;
493 dhd->sssr_reg_info.mac_regs[0].base_regs.clockcontrolstatus = 0x180011e0;
494 dhd->sssr_reg_info.mac_regs[0].base_regs.clockcontrolstatus_val = 0x20;
495 dhd->sssr_reg_info.mac_regs[0].wrapper_regs.resetctrl = 0x18101800;
496 dhd->sssr_reg_info.mac_regs[0].wrapper_regs.itopoobb = 0x18101f34;
497 dhd->sssr_reg_info.mac_regs[0].wrapper_regs.ioctrl = 0x18101408;
498 dhd->sssr_reg_info.mac_regs[0].wrapper_regs.ioctrl_resetseq_val[0] = 0xc7;
499 dhd->sssr_reg_info.mac_regs[0].wrapper_regs.ioctrl_resetseq_val[1] = 0x15f;
500 dhd->sssr_reg_info.mac_regs[0].wrapper_regs.ioctrl_resetseq_val[2] = 0x151;
501 dhd->sssr_reg_info.mac_regs[0].wrapper_regs.ioctrl_resetseq_val[3] = 0x155;
502 dhd->sssr_reg_info.mac_regs[0].wrapper_regs.ioctrl_resetseq_val[4] = 0xc5;
503 dhd->sssr_reg_info.mac_regs[0].sr_size = 0x40000;
504
505 return BCME_OK;
506 }
507
508 int
509 dhd_get_sssr_reg_info(dhd_pub_t *dhd)
510 {
511 int ret = BCME_OK;
512 uint16 chipid, chiprev;
513
514 chipid = dhd_get_chipid(dhd);
515 chiprev = dhd_bus_chiprev_id(dhd);
516
517 /* get sssr_reg_info from firmware */
518 memset((void *)&dhd->sssr_reg_info, 0, sizeof(dhd->sssr_reg_info));
519
520 if ((chipid == BCM4355_CHIP_ID || chipid == BCM4359_CHIP_ID) &&
521 chiprev == 9) {
522 /* Get SSSR reg info with alternative way for 4359C0/43596A0 */
523 ret = dhd_get_sssr_reg_info_bcm4359(dhd);
524 } else {
525 ret = dhd_iovar(dhd, 0, "sssr_reg_info", NULL, 0, (char *)&dhd->sssr_reg_info,
526 sizeof(dhd->sssr_reg_info), FALSE);
527 if (ret < 0) {
528 DHD_ERROR(("%s: sssr_reg_info failed (error=%d)\n",
529 __FUNCTION__, ret));
530 }
531 }
532
533 if (ret == BCME_OK) {
534 dhd_dump_sssr_reg_info(&dhd->sssr_reg_info);
535 }
536
537 return ret;
538 }
539
540 uint32
541 dhd_get_sssr_bufsize(dhd_pub_t *dhd)
542 {
543 int i;
544 uint32 sssr_bufsize = 0;
545 /* Init all pointers to NULL */
546 for (i = 0; i < MAX_NUM_D11CORES; i++) {
547 sssr_bufsize += dhd->sssr_reg_info.mac_regs[i].sr_size;
548 }
549 sssr_bufsize += dhd->sssr_reg_info.vasip_regs.vasip_sr_size;
550
551 /* Double the size as different dumps will be saved before and after SR */
552 sssr_bufsize = 2 * sssr_bufsize;
553
554 return sssr_bufsize;
555 }
556
557 int
558 dhd_sssr_dump_init(dhd_pub_t *dhd)
559 {
560 int i;
561 uint32 sssr_bufsize;
562 uint32 mempool_used = 0;
563
564 dhd->sssr_inited = FALSE;
565
566 /* check if sssr mempool is allocated */
567 if (dhd->sssr_mempool == NULL) {
568 DHD_ERROR(("%s: sssr_mempool is not allocated\n",
569 __FUNCTION__));
570 return BCME_ERROR;
571 }
572
573 /* Get SSSR reg info */
574 if (dhd_get_sssr_reg_info(dhd) != BCME_OK) {
575 DHD_ERROR(("%s: dhd_get_sssr_reg_info failed\n", __FUNCTION__));
576 return BCME_ERROR;
577 }
578
579 /* Validate structure version */
580 if (dhd->sssr_reg_info.version > SSSR_REG_INFO_VER_1) {
581 DHD_ERROR(("%s: dhd->sssr_reg_info.version (%d : %d) mismatch\n",
582 __FUNCTION__, (int)dhd->sssr_reg_info.version, SSSR_REG_INFO_VER));
583 return BCME_ERROR;
584 }
585
586 /* Validate structure length */
587 if (dhd->sssr_reg_info.length < sizeof(sssr_reg_info_v0_t)) {
588 DHD_ERROR(("%s: dhd->sssr_reg_info.length (%d : %d) mismatch\n",
589 __FUNCTION__, (int)dhd->sssr_reg_info.length,
590 (int)sizeof(dhd->sssr_reg_info)));
591 return BCME_ERROR;
592 }
593
594 /* validate fifo size */
595 sssr_bufsize = dhd_get_sssr_bufsize(dhd);
596 if (sssr_bufsize > DHD_SSSR_MEMPOOL_SIZE) {
597 DHD_ERROR(("%s: sssr_bufsize(%d) is greater than sssr_mempool(%d)\n",
598 __FUNCTION__, (int)sssr_bufsize, DHD_SSSR_MEMPOOL_SIZE));
599 return BCME_ERROR;
600 }
601
602 /* init all pointers to NULL */
603 for (i = 0; i < MAX_NUM_D11CORES; i++) {
604 dhd->sssr_d11_before[i] = NULL;
605 dhd->sssr_d11_after[i] = NULL;
606 }
607 dhd->sssr_dig_buf_before = NULL;
608 dhd->sssr_dig_buf_after = NULL;
609
610 /* Allocate memory */
611 for (i = 0; i < MAX_NUM_D11CORES; i++) {
612 if (dhd->sssr_reg_info.mac_regs[i].sr_size) {
613 dhd->sssr_d11_before[i] = (uint32 *)(dhd->sssr_mempool + mempool_used);
614 mempool_used += dhd->sssr_reg_info.mac_regs[i].sr_size;
615
616 dhd->sssr_d11_after[i] = (uint32 *)(dhd->sssr_mempool + mempool_used);
617 mempool_used += dhd->sssr_reg_info.mac_regs[i].sr_size;
618 } else {
619 DHD_ERROR(("%s: SR size for core[%d] is 0\n", __FUNCTION__, i));
620 }
621 }
622
623 if (dhd->sssr_reg_info.vasip_regs.vasip_sr_size) {
624 dhd->sssr_dig_buf_before = (uint32 *)(dhd->sssr_mempool + mempool_used);
625 mempool_used += dhd->sssr_reg_info.vasip_regs.vasip_sr_size;
626
627 dhd->sssr_dig_buf_after = (uint32 *)(dhd->sssr_mempool + mempool_used);
628 mempool_used += dhd->sssr_reg_info.vasip_regs.vasip_sr_size;
629 } else if ((dhd->sssr_reg_info.length > OFFSETOF(sssr_reg_info_v1_t, dig_mem_info)) &&
630 dhd->sssr_reg_info.dig_mem_info.dig_sr_addr) {
631 dhd->sssr_dig_buf_before = (uint32 *)(dhd->sssr_mempool + mempool_used);
632 mempool_used += dhd->sssr_reg_info.dig_mem_info.dig_sr_size;
633
634 dhd->sssr_dig_buf_after = (uint32 *)(dhd->sssr_mempool + mempool_used);
635 mempool_used += dhd->sssr_reg_info.dig_mem_info.dig_sr_size;
636 }
637
638 dhd->sssr_inited = TRUE;
639
640 return BCME_OK;
641 }
642
643 void
644 dhd_sssr_dump_deinit(dhd_pub_t *dhd)
645 {
646 int i;
647
648 dhd->sssr_inited = FALSE;
649 /* init all pointers to NULL */
650 for (i = 0; i < MAX_NUM_D11CORES; i++) {
651 dhd->sssr_d11_before[i] = NULL;
652 dhd->sssr_d11_after[i] = NULL;
653 }
654 dhd->sssr_dig_buf_before = NULL;
655 dhd->sssr_dig_buf_after = NULL;
656
657 return;
658 }
659
660 #endif /* DHD_SSSR_DUMP */
661
662 #ifdef DHD_FW_COREDUMP
663 void* dhd_get_fwdump_buf(dhd_pub_t *dhd_pub, uint32 length)
664 {
665 if (!dhd_pub->soc_ram) {
666 #if defined(CONFIG_DHD_USE_STATIC_BUF) && defined(DHD_USE_STATIC_MEMDUMP)
667 dhd_pub->soc_ram = (uint8*)DHD_OS_PREALLOC(dhd_pub,
668 DHD_PREALLOC_MEMDUMP_RAM, length);
669 #else
670 dhd_pub->soc_ram = (uint8*) MALLOC(dhd_pub->osh, length);
671 #endif /* CONFIG_DHD_USE_STATIC_BUF && DHD_USE_STATIC_MEMDUMP */
672 }
673
674 if (dhd_pub->soc_ram == NULL) {
675 DHD_ERROR(("%s: Failed to allocate memory for fw crash snap shot.\n",
676 __FUNCTION__));
677 dhd_pub->soc_ram_length = 0;
678 } else {
679 memset(dhd_pub->soc_ram, 0, length);
680 dhd_pub->soc_ram_length = length;
681 }
682
683 /* soc_ram free handled in dhd_{free,clear} */
684 return dhd_pub->soc_ram;
685 }
686 #endif /* DHD_FW_COREDUMP */
687
688 /* to NDIS developer, the structure dhd_common is redundant,
689 * please do NOT merge it back from other branches !!!
690 */
691
692 int
693 dhd_common_socram_dump(dhd_pub_t *dhdp)
694 {
695 return dhd_socram_dump(dhdp->bus);
696 }
697
698 int
699 dhd_dump(dhd_pub_t *dhdp, char *buf, int buflen)
700 {
701 char eabuf[ETHER_ADDR_STR_LEN];
702
703 struct bcmstrbuf b;
704 struct bcmstrbuf *strbuf = &b;
705
706 if (!dhdp || !dhdp->prot || !buf) {
707 return BCME_ERROR;
708 }
709
710 bcm_binit(strbuf, buf, buflen);
711
712 /* Base DHD info */
713 bcm_bprintf(strbuf, "%s\n", dhd_version);
714 bcm_bprintf(strbuf, "\n");
715 bcm_bprintf(strbuf, "pub.up %d pub.txoff %d pub.busstate %d\n",
716 dhdp->up, dhdp->txoff, dhdp->busstate);
717 bcm_bprintf(strbuf, "pub.hdrlen %u pub.maxctl %u pub.rxsz %u\n",
718 dhdp->hdrlen, dhdp->maxctl, dhdp->rxsz);
719 bcm_bprintf(strbuf, "pub.iswl %d pub.drv_version %ld pub.mac "MACDBG"\n",
720 dhdp->iswl, dhdp->drv_version, MAC2STRDBG(bcm_ether_ntoa(&dhdp->mac, eabuf)));
721 bcm_bprintf(strbuf, "pub.bcmerror %d tickcnt %u\n", dhdp->bcmerror, dhdp->tickcnt);
722
723 bcm_bprintf(strbuf, "dongle stats:\n");
724 bcm_bprintf(strbuf, "tx_packets %lu tx_bytes %lu tx_errors %lu tx_dropped %lu\n",
725 dhdp->dstats.tx_packets, dhdp->dstats.tx_bytes,
726 dhdp->dstats.tx_errors, dhdp->dstats.tx_dropped);
727 bcm_bprintf(strbuf, "rx_packets %lu rx_bytes %lu rx_errors %lu rx_dropped %lu\n",
728 dhdp->dstats.rx_packets, dhdp->dstats.rx_bytes,
729 dhdp->dstats.rx_errors, dhdp->dstats.rx_dropped);
730 bcm_bprintf(strbuf, "multicast %lu\n", dhdp->dstats.multicast);
731
732 bcm_bprintf(strbuf, "bus stats:\n");
733 bcm_bprintf(strbuf, "tx_packets %lu tx_dropped %lu tx_multicast %lu tx_errors %lu\n",
734 dhdp->tx_packets, dhdp->tx_dropped, dhdp->tx_multicast, dhdp->tx_errors);
735 bcm_bprintf(strbuf, "tx_ctlpkts %lu tx_ctlerrs %lu\n",
736 dhdp->tx_ctlpkts, dhdp->tx_ctlerrs);
737 bcm_bprintf(strbuf, "rx_packets %lu rx_multicast %lu rx_errors %lu \n",
738 dhdp->rx_packets, dhdp->rx_multicast, dhdp->rx_errors);
739 bcm_bprintf(strbuf, "rx_ctlpkts %lu rx_ctlerrs %lu rx_dropped %lu\n",
740 dhdp->rx_ctlpkts, dhdp->rx_ctlerrs, dhdp->rx_dropped);
741 bcm_bprintf(strbuf, "rx_readahead_cnt %lu tx_realloc %lu\n",
742 dhdp->rx_readahead_cnt, dhdp->tx_realloc);
743 bcm_bprintf(strbuf, "tx_pktgetfail %lu rx_pktgetfail %lu\n",
744 dhdp->tx_pktgetfail, dhdp->rx_pktgetfail);
745 bcm_bprintf(strbuf, "tx_big_packets %lu\n",
746 dhdp->tx_big_packets);
747 bcm_bprintf(strbuf, "\n");
748 #ifdef DMAMAP_STATS
749 /* Add DMA MAP info */
750 bcm_bprintf(strbuf, "DMA MAP stats: \n");
751 bcm_bprintf(strbuf, "txdata: %lu size: %luK, rxdata: %lu size: %luK\n",
752 dhdp->dma_stats.txdata, KB(dhdp->dma_stats.txdata_sz),
753 dhdp->dma_stats.rxdata, KB(dhdp->dma_stats.rxdata_sz));
754 #ifndef IOCTLRESP_USE_CONSTMEM
755 bcm_bprintf(strbuf, "IOCTL RX: %lu size: %luK ,",
756 dhdp->dma_stats.ioctl_rx, KB(dhdp->dma_stats.ioctl_rx_sz));
757 #endif /* !IOCTLRESP_USE_CONSTMEM */
758 bcm_bprintf(strbuf, "EVENT RX: %lu size: %luK, INFO RX: %lu size: %luK, "
759 "TSBUF RX: %lu size %luK\n",
760 dhdp->dma_stats.event_rx, KB(dhdp->dma_stats.event_rx_sz),
761 dhdp->dma_stats.info_rx, KB(dhdp->dma_stats.info_rx_sz),
762 dhdp->dma_stats.tsbuf_rx, KB(dhdp->dma_stats.tsbuf_rx_sz));
763 bcm_bprintf(strbuf, "Total : %luK \n",
764 KB(dhdp->dma_stats.txdata_sz + dhdp->dma_stats.rxdata_sz +
765 dhdp->dma_stats.ioctl_rx_sz + dhdp->dma_stats.event_rx_sz +
766 dhdp->dma_stats.tsbuf_rx_sz));
767 #endif /* DMAMAP_STATS */
768
769 /* Add any prot info */
770 dhd_prot_dump(dhdp, strbuf);
771 bcm_bprintf(strbuf, "\n");
772
773 /* Add any bus info */
774 dhd_bus_dump(dhdp, strbuf);
775
776 #if defined(DHD_LB_STATS)
777 dhd_lb_stats_dump(dhdp, strbuf);
778 #endif /* DHD_LB_STATS */
779 #ifdef DHD_WET
780 if (dhd_get_wet_mode(dhdp)) {
781 bcm_bprintf(strbuf, "Wet Dump:\n");
782 dhd_wet_dump(dhdp, strbuf);
783 }
784 #endif /* DHD_WET */
785
786 /* return remaining buffer length */
787 return (!strbuf->size ? BCME_BUFTOOSHORT : strbuf->size);
788 }
789
790 void
791 dhd_dump_to_kernelog(dhd_pub_t *dhdp)
792 {
793 char buf[512];
794
795 DHD_ERROR(("F/W version: %s\n", fw_version));
796 bcm_bprintf_bypass = TRUE;
797 dhd_dump(dhdp, buf, sizeof(buf));
798 bcm_bprintf_bypass = FALSE;
799 }
800
801 int
802 dhd_wl_ioctl_cmd(dhd_pub_t *dhd_pub, int cmd, void *arg, int len, uint8 set, int ifidx)
803 {
804 wl_ioctl_t ioc;
805
806 ioc.cmd = cmd;
807 ioc.buf = arg;
808 ioc.len = len;
809 ioc.set = set;
810
811 return dhd_wl_ioctl(dhd_pub, ifidx, &ioc, arg, len);
812 }
813
814 int
815 dhd_wl_ioctl_get_intiovar(dhd_pub_t *dhd_pub, char *name, uint *pval,
816 int cmd, uint8 set, int ifidx)
817 {
818 char iovbuf[WLC_IOCTL_SMLEN];
819 int ret = -1;
820
821 memset(iovbuf, 0, sizeof(iovbuf));
822 if (bcm_mkiovar(name, NULL, 0, iovbuf, sizeof(iovbuf))) {
823 ret = dhd_wl_ioctl_cmd(dhd_pub, cmd, iovbuf, sizeof(iovbuf), set, ifidx);
824 if (!ret) {
825 *pval = ltoh32(*((uint*)iovbuf));
826 } else {
827 DHD_ERROR(("%s: get int iovar %s failed, ERR %d\n",
828 __FUNCTION__, name, ret));
829 }
830 } else {
831 DHD_ERROR(("%s: mkiovar %s failed\n",
832 __FUNCTION__, name));
833 }
834
835 return ret;
836 }
837
838 int
839 dhd_wl_ioctl_set_intiovar(dhd_pub_t *dhd_pub, char *name, uint val,
840 int cmd, uint8 set, int ifidx)
841 {
842 char iovbuf[WLC_IOCTL_SMLEN];
843 int ret = -1;
844 int lval = htol32(val);
845 uint len;
846
847 len = bcm_mkiovar(name, (char*)&lval, sizeof(lval), iovbuf, sizeof(iovbuf));
848
849 if (len) {
850 ret = dhd_wl_ioctl_cmd(dhd_pub, cmd, iovbuf, len, set, ifidx);
851 if (ret) {
852 DHD_ERROR(("%s: set int iovar %s failed, ERR %d\n",
853 __FUNCTION__, name, ret));
854 }
855 } else {
856 DHD_ERROR(("%s: mkiovar %s failed\n",
857 __FUNCTION__, name));
858 }
859
860 return ret;
861 }
862
863 static struct ioctl2str_s {
864 uint32 ioctl;
865 char *name;
866 } ioctl2str_array[] = {
867 {WLC_UP, "UP"},
868 {WLC_DOWN, "DOWN"},
869 {WLC_SET_PROMISC, "SET_PROMISC"},
870 {WLC_SET_INFRA, "SET_INFRA"},
871 {WLC_SET_AUTH, "SET_AUTH"},
872 {WLC_SET_SSID, "SET_SSID"},
873 {WLC_RESTART, "RESTART"},
874 {WLC_SET_CHANNEL, "SET_CHANNEL"},
875 {WLC_SET_RATE_PARAMS, "SET_RATE_PARAMS"},
876 {WLC_SET_KEY, "SET_KEY"},
877 {WLC_SCAN, "SCAN"},
878 {WLC_DISASSOC, "DISASSOC"},
879 {WLC_REASSOC, "REASSOC"},
880 {WLC_SET_COUNTRY, "SET_COUNTRY"},
881 {WLC_SET_WAKE, "SET_WAKE"},
882 {WLC_SET_SCANSUPPRESS, "SET_SCANSUPPRESS"},
883 {WLC_SCB_DEAUTHORIZE, "SCB_DEAUTHORIZE"},
884 {WLC_SET_WSEC, "SET_WSEC"},
885 {WLC_SET_INTERFERENCE_MODE, "SET_INTERFERENCE_MODE"},
886 {WLC_SET_RADAR, "SET_RADAR"},
887 {0, NULL}
888 };
889
890 static char *
891 ioctl2str(uint32 ioctl)
892 {
893 struct ioctl2str_s *p = ioctl2str_array;
894
895 while (p->name != NULL) {
896 if (p->ioctl == ioctl) {
897 return p->name;
898 }
899 p++;
900 }
901
902 return "";
903 }
904
905 /**
906 * @param ioc IO control struct, members are partially used by this function.
907 * @param buf [inout] Contains parameters to send to dongle, contains dongle response on return.
908 * @param len Maximum number of bytes that dongle is allowed to write into 'buf'.
909 */
910 int
911 dhd_wl_ioctl(dhd_pub_t *dhd_pub, int ifidx, wl_ioctl_t *ioc, void *buf, int len)
912 {
913 int ret = BCME_ERROR;
914 unsigned long flags;
915 #ifdef DUMP_IOCTL_IOV_LIST
916 dhd_iov_li_t *iov_li;
917 #endif /* DUMP_IOCTL_IOV_LIST */
918
919 #ifdef DHD_PCIE_NATIVE_RUNTIMEPM
920 DHD_OS_WAKE_LOCK(dhd_pub);
921 if (pm_runtime_get_sync(dhd_bus_to_dev(dhd_pub->bus)) < 0) {
922 DHD_RPM(("%s: pm_runtime_get_sync error. \n", __FUNCTION__));
923 DHD_OS_WAKE_UNLOCK(dhd_pub);
924 return BCME_ERROR;
925 }
926 #endif /* DHD_PCIE_NATIVE_RUNTIMEPM */
927
928 #ifdef KEEPIF_ON_DEVICE_RESET
929 if (ioc->cmd == WLC_GET_VAR) {
930 dbus_config_t config;
931 config.general_param = 0;
932 if (buf) {
933 if (!strcmp(buf, "wowl_activate")) {
934 /* 1 (TRUE) after decreased by 1 */
935 config.general_param = 2;
936 } else if (!strcmp(buf, "wowl_clear")) {
937 /* 0 (FALSE) after decreased by 1 */
938 config.general_param = 1;
939 }
940 }
941 if (config.general_param) {
942 config.config_id = DBUS_CONFIG_ID_KEEPIF_ON_DEVRESET;
943 config.general_param--;
944 dbus_set_config(dhd_pub->dbus, &config);
945 }
946 }
947 #endif /* KEEPIF_ON_DEVICE_RESET */
948
949 if (dhd_os_proto_block(dhd_pub))
950 {
951 #ifdef DHD_LOG_DUMP
952 int slen, val, lval, min_len;
953 char *msg, tmp[64];
954
955 /* WLC_GET_VAR */
956 if (ioc->cmd == WLC_GET_VAR && buf) {
957 min_len = MIN(sizeof(tmp) - 1, strlen(buf));
958 memset(tmp, 0, sizeof(tmp));
959 bcopy(buf, tmp, min_len);
960 tmp[min_len] = '\0';
961 }
962 #endif /* DHD_LOG_DUMP */
963 /* logging of iovars that are send to the dongle, ./dhd msglevel +iovar */
964 if (ioc->set == TRUE) {
965 char *pars = (char *)buf; // points at user buffer
966 if (ioc->cmd == WLC_SET_VAR && buf) {
967 DHD_DNGL_IOVAR_SET(("iovar:%d: set %s", ifidx, pars));
968 if (ioc->len > 1 + sizeof(uint32)) {
969 // skip iovar name:
970 pars += strnlen(pars, ioc->len - 1 - sizeof(uint32));
971 pars++; // skip NULL character
972 }
973 } else {
974 DHD_DNGL_IOVAR_SET(("ioctl:%d: set %d %s",
975 ifidx, ioc->cmd, ioctl2str(ioc->cmd)));
976 }
977 if (pars != NULL) {
978 DHD_DNGL_IOVAR_SET((" 0x%x\n", *(uint32*)pars));
979 } else {
980 DHD_DNGL_IOVAR_SET((" NULL\n"));
981 }
982 }
983
984 DHD_LINUX_GENERAL_LOCK(dhd_pub, flags);
985 if (DHD_BUS_CHECK_DOWN_OR_DOWN_IN_PROGRESS(dhd_pub)) {
986 DHD_INFO(("%s: returning as busstate=%d\n",
987 __FUNCTION__, dhd_pub->busstate));
988 DHD_LINUX_GENERAL_UNLOCK(dhd_pub, flags);
989 dhd_os_proto_unblock(dhd_pub);
990 return -ENODEV;
991 }
992 DHD_BUS_BUSY_SET_IN_IOVAR(dhd_pub);
993 DHD_LINUX_GENERAL_UNLOCK(dhd_pub, flags);
994
995 #ifdef DHD_PCIE_RUNTIMEPM
996 dhdpcie_runtime_bus_wake(dhd_pub, TRUE, dhd_wl_ioctl);
997 #endif /* DHD_PCIE_RUNTIMEPM */
998
999 DHD_LINUX_GENERAL_LOCK(dhd_pub, flags);
1000 if (DHD_BUS_CHECK_SUSPEND_OR_SUSPEND_IN_PROGRESS(dhd_pub)) {
1001 DHD_ERROR(("%s: bus is in suspend(%d) or suspending(0x%x) state!!\n",
1002 __FUNCTION__, dhd_pub->busstate, dhd_pub->dhd_bus_busy_state));
1003 DHD_BUS_BUSY_CLEAR_IN_IOVAR(dhd_pub);
1004 dhd_os_busbusy_wake(dhd_pub);
1005 DHD_LINUX_GENERAL_UNLOCK(dhd_pub, flags);
1006 dhd_os_proto_unblock(dhd_pub);
1007 return -ENODEV;
1008 }
1009 DHD_LINUX_GENERAL_UNLOCK(dhd_pub, flags);
1010
1011 #ifdef DUMP_IOCTL_IOV_LIST
1012 if (ioc->cmd != WLC_GET_MAGIC && ioc->cmd != WLC_GET_VERSION && buf) {
1013 if (!(iov_li = MALLOC(dhd_pub->osh, sizeof(*iov_li)))) {
1014 DHD_ERROR(("iovar dump list item allocation Failed\n"));
1015 } else {
1016 iov_li->cmd = ioc->cmd;
1017 if (buf)
1018 bcopy((char *)buf, iov_li->buff, strlen((char *)buf)+1);
1019 dhd_iov_li_append(dhd_pub, &dhd_pub->dump_iovlist_head,
1020 &iov_li->list);
1021 }
1022 }
1023 #endif /* DUMP_IOCTL_IOV_LIST */
1024
1025 ret = dhd_prot_ioctl(dhd_pub, ifidx, ioc, buf, len);
1026
1027 #ifdef DUMP_IOCTL_IOV_LIST
1028 if (ret == -ETIMEDOUT) {
1029 DHD_ERROR(("Last %d issued commands: Latest one is at bottom.\n",
1030 IOV_LIST_MAX_LEN));
1031 dhd_iov_li_print(&dhd_pub->dump_iovlist_head);
1032 }
1033 #endif /* DUMP_IOCTL_IOV_LIST */
1034 #ifdef WL_CFGVENDOR_SEND_HANG_EVENT
1035 if (ret == -ETIMEDOUT) {
1036 copy_hang_info_ioctl_timeout(dhd_pub, ifidx, ioc);
1037 }
1038 #endif /* WL_CFGVENDOR_SEND_HANG_EVENT */
1039 #ifdef DHD_LOG_DUMP
1040 if ((ioc->cmd == WLC_GET_VAR || ioc->cmd == WLC_SET_VAR) &&
1041 buf != NULL) {
1042 if (buf) {
1043 lval = 0;
1044 slen = strlen(buf) + 1;
1045 msg = (char*)buf;
1046 if (len >= slen + sizeof(lval)) {
1047 if (ioc->cmd == WLC_GET_VAR) {
1048 msg = tmp;
1049 lval = *(int*)buf;
1050 } else {
1051 min_len = MIN(ioc->len - slen, sizeof(int));
1052 bcopy((msg + slen), &lval, min_len);
1053 }
1054 if (!strncmp(msg, "cur_etheraddr",
1055 strlen("cur_etheraddr"))) {
1056 lval = 0;
1057 }
1058 }
1059 DHD_IOVAR_MEM((
1060 "%s: cmd: %d, msg: %s val: 0x%x,"
1061 " len: %d, set: %d, txn-id: %d\n",
1062 ioc->cmd == WLC_GET_VAR ?
1063 "WLC_GET_VAR" : "WLC_SET_VAR",
1064 ioc->cmd, msg, lval, ioc->len, ioc->set,
1065 dhd_prot_get_ioctl_trans_id(dhd_pub)));
1066 } else {
1067 DHD_IOVAR_MEM(("%s: cmd: %d, len: %d, set: %d, txn-id: %d\n",
1068 ioc->cmd == WLC_GET_VAR ? "WLC_GET_VAR" : "WLC_SET_VAR",
1069 ioc->cmd, ioc->len, ioc->set,
1070 dhd_prot_get_ioctl_trans_id(dhd_pub)));
1071 }
1072 } else {
1073 slen = ioc->len;
1074 if (buf != NULL && slen != 0) {
1075 if (slen >= 4) {
1076 val = *(int*)buf;
1077 } else if (slen >= 2) {
1078 val = *(short*)buf;
1079 } else {
1080 val = *(char*)buf;
1081 }
1082 /* Do not dump for WLC_GET_MAGIC and WLC_GET_VERSION */
1083 if (ioc->cmd != WLC_GET_MAGIC && ioc->cmd != WLC_GET_VERSION)
1084 DHD_IOVAR_MEM(("WLC_IOCTL: cmd: %d, val: %d, len: %d, "
1085 "set: %d\n", ioc->cmd, val, ioc->len, ioc->set));
1086 } else {
1087 DHD_IOVAR_MEM(("WLC_IOCTL: cmd: %d, buf is NULL\n", ioc->cmd));
1088 }
1089 }
1090 #endif /* DHD_LOG_DUMP */
1091 if (ret && dhd_pub->up) {
1092 /* Send hang event only if dhd_open() was success */
1093 dhd_os_check_hang(dhd_pub, ifidx, ret);
1094 }
1095
1096 if (ret == -ETIMEDOUT && !dhd_pub->up) {
1097 DHD_ERROR(("%s: 'resumed on timeout' error is "
1098 "occurred before the interface does not"
1099 " bring up\n", __FUNCTION__));
1100 dhd_pub->busstate = DHD_BUS_DOWN;
1101 }
1102
1103 DHD_LINUX_GENERAL_LOCK(dhd_pub, flags);
1104 DHD_BUS_BUSY_CLEAR_IN_IOVAR(dhd_pub);
1105 dhd_os_busbusy_wake(dhd_pub);
1106 DHD_LINUX_GENERAL_UNLOCK(dhd_pub, flags);
1107
1108 dhd_os_proto_unblock(dhd_pub);
1109
1110 if (ret < 0) {
1111 if ((ioc->cmd == WLC_GET_VAR || ioc->cmd == WLC_SET_VAR) &&
1112 buf != NULL) {
1113 if (ret == BCME_UNSUPPORTED || ret == BCME_NOTASSOCIATED) {
1114 DHD_ERROR(("%s: %s: %s, %s\n",
1115 __FUNCTION__, ioc->cmd == WLC_GET_VAR ?
1116 "WLC_GET_VAR" : "WLC_SET_VAR",
1117 buf? (char *)buf:"NO MESSAGE",
1118 ret == BCME_UNSUPPORTED ? "UNSUPPORTED"
1119 : "NOT ASSOCIATED"));
1120 } else {
1121 DHD_ERROR(("%s: %s: %s, ret = %d\n",
1122 __FUNCTION__, ioc->cmd == WLC_GET_VAR ?
1123 "WLC_GET_VAR" : "WLC_SET_VAR",
1124 (char *)buf, ret));
1125 }
1126 } else {
1127 if (ret == BCME_UNSUPPORTED || ret == BCME_NOTASSOCIATED) {
1128 DHD_ERROR(("%s: WLC_IOCTL: cmd: %d, %s\n",
1129 __FUNCTION__, ioc->cmd,
1130 ret == BCME_UNSUPPORTED ? "UNSUPPORTED" :
1131 "NOT ASSOCIATED"));
1132 } else {
1133 DHD_ERROR(("%s: WLC_IOCTL: cmd: %d, ret = %d\n",
1134 __FUNCTION__, ioc->cmd, ret));
1135 }
1136 }
1137 }
1138 }
1139
1140 #ifdef DHD_PCIE_NATIVE_RUNTIMEPM
1141 pm_runtime_mark_last_busy(dhd_bus_to_dev(dhd_pub->bus));
1142 pm_runtime_put_autosuspend(dhd_bus_to_dev(dhd_pub->bus));
1143
1144 DHD_OS_WAKE_UNLOCK(dhd_pub);
1145 #endif /* DHD_PCIE_NATIVE_RUNTIMEPM */
1146
1147 return ret;
1148 }
1149
1150 uint wl_get_port_num(wl_io_pport_t *io_pport)
1151 {
1152 return 0;
1153 }
1154
1155 /* Get bssidx from iovar params
1156 * Input: dhd_pub - pointer to dhd_pub_t
1157 * params - IOVAR params
1158 * Output: idx - BSS index
1159 * val - ponter to the IOVAR arguments
1160 */
1161 static int
1162 dhd_iovar_parse_bssidx(dhd_pub_t *dhd_pub, const char *params, uint32 *idx, const char **val)
1163 {
1164 char *prefix = "bsscfg:";
1165 uint32 bssidx;
1166
1167 if (!(strncmp(params, prefix, strlen(prefix)))) {
1168 /* per bss setting should be prefixed with 'bsscfg:' */
1169 const char *p = params + strlen(prefix);
1170
1171 /* Skip Name */
1172 while (*p != '\0')
1173 p++;
1174 /* consider null */
1175 p = p + 1;
1176 bcopy(p, &bssidx, sizeof(uint32));
1177 /* Get corresponding dhd index */
1178 bssidx = dhd_bssidx2idx(dhd_pub, htod32(bssidx));
1179
1180 if (bssidx >= DHD_MAX_IFS) {
1181 DHD_ERROR(("%s Wrong bssidx provided\n", __FUNCTION__));
1182 return BCME_ERROR;
1183 }
1184
1185 /* skip bss idx */
1186 p += sizeof(uint32);
1187 *val = p;
1188 *idx = bssidx;
1189 } else {
1190 DHD_ERROR(("%s: bad parameter for per bss iovar\n", __FUNCTION__));
1191 return BCME_ERROR;
1192 }
1193
1194 return BCME_OK;
1195 }
1196
1197 #if defined(DHD_DEBUG) && defined(BCMDHDUSB)
1198 /* USB Device console input function */
1199 int dhd_bus_console_in(dhd_pub_t *dhd, uchar *msg, uint msglen)
1200 {
1201 DHD_TRACE(("%s \n", __FUNCTION__));
1202
1203 return dhd_iovar(dhd, 0, "cons", msg, msglen, NULL, 0, TRUE);
1204
1205 }
1206 #endif /* DHD_DEBUG && BCMDHDUSB */
1207
1208 #ifdef DHD_DEBUG
1209 int
1210 dhd_mem_debug(dhd_pub_t *dhd, uchar *msg, uint msglen)
1211 {
1212 unsigned long int_arg = 0;
1213 char *p;
1214 char *end_ptr = NULL;
1215 dhd_dbg_mwli_t *mw_li;
1216 dll_t *item, *next;
1217 /* check if mwalloc, mwquery or mwfree was supplied arguement with space */
1218 p = bcmstrstr((char *)msg, " ");
1219 if (p != NULL) {
1220 /* space should be converted to null as separation flag for firmware */
1221 *p = '\0';
1222 /* store the argument in int_arg */
1223 int_arg = bcm_strtoul(p+1, &end_ptr, 10);
1224 }
1225
1226 if (!p && !strcmp(msg, "query")) {
1227 /* lets query the list inetrnally */
1228 if (dll_empty(dll_head_p(&dhd->mw_list_head))) {
1229 DHD_ERROR(("memwaste list is empty, call mwalloc < size > to allocate\n"));
1230 } else {
1231 for (item = dll_head_p(&dhd->mw_list_head);
1232 !dll_end(&dhd->mw_list_head, item); item = next) {
1233 next = dll_next_p(item);
1234 mw_li = (dhd_dbg_mwli_t *)CONTAINEROF(item, dhd_dbg_mwli_t, list);
1235 DHD_ERROR(("item: <id=%d, size=%d>\n", mw_li->id, mw_li->size));
1236 }
1237 }
1238 } else if (p && end_ptr && (*end_ptr == '\0') && !strcmp(msg, "alloc")) {
1239 int32 alloc_handle;
1240 /* convert size into KB and append as integer */
1241 *((int32 *)(p+1)) = int_arg*1024;
1242 *(p+1+sizeof(int32)) = '\0';
1243
1244 /* recalculated length -> 5 bytes for "alloc" + 4 bytes for size +
1245 * 1 bytes for null caracter
1246 */
1247 msglen = strlen(msg) + sizeof(int32) + 1;
1248 if (dhd_wl_ioctl_cmd(dhd, WLC_GET_VAR, msg, msglen+1, FALSE, 0) < 0) {
1249 DHD_ERROR(("IOCTL failed for memdebug alloc\n"));
1250 }
1251
1252 /* returned allocated handle from dongle, basically address of the allocated unit */
1253 alloc_handle = *((int32 *)msg);
1254
1255 /* add a node in the list with tuple <id, handle, size> */
1256 if (alloc_handle == 0) {
1257 DHD_ERROR(("Reuqested size could not be allocated\n"));
1258 } else if (!(mw_li = MALLOC(dhd->osh, sizeof(*mw_li)))) {
1259 DHD_ERROR(("mw list item allocation Failed\n"));
1260 } else {
1261 mw_li->id = dhd->mw_id++;
1262 mw_li->handle = alloc_handle;
1263 mw_li->size = int_arg;
1264 /* append the node in the list */
1265 dll_append(&dhd->mw_list_head, &mw_li->list);
1266 }
1267 } else if (p && end_ptr && (*end_ptr == '\0') && !strcmp(msg, "free")) {
1268 /* inform dongle to free wasted chunk */
1269 int handle = 0;
1270 int size = 0;
1271 for (item = dll_head_p(&dhd->mw_list_head);
1272 !dll_end(&dhd->mw_list_head, item); item = next) {
1273 next = dll_next_p(item);
1274 mw_li = (dhd_dbg_mwli_t *)CONTAINEROF(item, dhd_dbg_mwli_t, list);
1275
1276 if (mw_li->id == (int)int_arg) {
1277 handle = mw_li->handle;
1278 size = mw_li->size;
1279 dll_delete(item);
1280 MFREE(dhd->osh, mw_li, sizeof(*mw_li));
1281 if (dll_empty(dll_head_p(&dhd->mw_list_head))) {
1282 /* reset the id */
1283 dhd->mw_id = 0;
1284 }
1285 }
1286 }
1287 if (handle) {
1288 int len;
1289 /* append the free handle and the chunk size in first 8 bytes
1290 * after the command and null character
1291 */
1292 *((int32 *)(p+1)) = handle;
1293 *((int32 *)((p+1)+sizeof(int32))) = size;
1294 /* append null as terminator */
1295 *(p+1+2*sizeof(int32)) = '\0';
1296 /* recalculated length -> 4 bytes for "free" + 8 bytes for hadnle and size
1297 * + 1 bytes for null caracter
1298 */
1299 len = strlen(msg) + 2*sizeof(int32) + 1;
1300 /* send iovar to free the chunk */
1301 if (dhd_wl_ioctl_cmd(dhd, WLC_GET_VAR, msg, len, FALSE, 0) < 0) {
1302 DHD_ERROR(("IOCTL failed for memdebug free\n"));
1303 }
1304 } else {
1305 DHD_ERROR(("specified id does not exist\n"));
1306 }
1307 } else {
1308 /* for all the wrong argument formats */
1309 return BCME_BADARG;
1310 }
1311 return 0;
1312 }
1313 extern void
1314 dhd_mw_list_delete(dhd_pub_t *dhd, dll_t *list_head)
1315 {
1316 dll_t *item;
1317 dhd_dbg_mwli_t *mw_li;
1318 while (!(dll_empty(list_head))) {
1319 item = dll_head_p(list_head);
1320 mw_li = (dhd_dbg_mwli_t *)CONTAINEROF(item, dhd_dbg_mwli_t, list);
1321 dll_delete(item);
1322 MFREE(dhd->osh, mw_li, sizeof(*mw_li));
1323 }
1324 }
1325 #ifdef BCMPCIE
1326 int
1327 dhd_flow_ring_debug(dhd_pub_t *dhd, char *msg, uint msglen)
1328 {
1329 flow_ring_table_t *flow_ring_table;
1330 char *cmd;
1331 char *end_ptr = NULL;
1332 uint8 prio;
1333 uint16 flowid;
1334 int i;
1335 int ret = 0;
1336 cmd = bcmstrstr(msg, " ");
1337 BCM_REFERENCE(prio);
1338 if (cmd != NULL) {
1339 /* in order to use string operations append null */
1340 *cmd = '\0';
1341 } else {
1342 DHD_ERROR(("missing: create/delete args\n"));
1343 return BCME_ERROR;
1344 }
1345 if (cmd && !strcmp(msg, "create")) {
1346 /* extract <"source address", "destination address", "priority"> */
1347 uint8 sa[ETHER_ADDR_LEN], da[ETHER_ADDR_LEN];
1348 BCM_REFERENCE(sa);
1349 BCM_REFERENCE(da);
1350 msg = msg + strlen("create") + 1;
1351 /* fill ethernet source address */
1352 for (i = 0; i < ETHER_ADDR_LEN; i++) {
1353 sa[i] = (uint8)bcm_strtoul(msg, &end_ptr, 16);
1354 if (*end_ptr == ':') {
1355 msg = (end_ptr + 1);
1356 } else if (i != 5) {
1357 DHD_ERROR(("not a valid source mac addr\n"));
1358 return BCME_ERROR;
1359 }
1360 }
1361 if (*end_ptr != ' ') {
1362 DHD_ERROR(("missing: destiantion mac id\n"));
1363 return BCME_ERROR;
1364 } else {
1365 /* skip space */
1366 msg = end_ptr + 1;
1367 }
1368 /* fill ethernet destination address */
1369 for (i = 0; i < ETHER_ADDR_LEN; i++) {
1370 da[i] = (uint8)bcm_strtoul(msg, &end_ptr, 16);
1371 if (*end_ptr == ':') {
1372 msg = (end_ptr + 1);
1373 } else if (i != 5) {
1374 DHD_ERROR(("not a valid destination mac addr\n"));
1375 return BCME_ERROR;
1376 }
1377 }
1378 if (*end_ptr != ' ') {
1379 DHD_ERROR(("missing: priority\n"));
1380 return BCME_ERROR;
1381 } else {
1382 msg = end_ptr + 1;
1383 }
1384 /* parse priority */
1385 prio = (uint8)bcm_strtoul(msg, &end_ptr, 10);
1386 if (prio > MAXPRIO) {
1387 DHD_ERROR(("%s: invalid priority. Must be between 0-7 inclusive\n",
1388 __FUNCTION__));
1389 return BCME_ERROR;
1390 }
1391
1392 if (*end_ptr != '\0') {
1393 DHD_ERROR(("msg not truncated with NULL character\n"));
1394 return BCME_ERROR;
1395 }
1396 ret = dhd_flowid_debug_create(dhd, 0, prio, (char *)sa, (char *)da, &flowid);
1397 if (ret != BCME_OK) {
1398 DHD_ERROR(("%s: flowring creation failed ret: %d\n", __FUNCTION__, ret));
1399 return BCME_ERROR;
1400 }
1401 return BCME_OK;
1402
1403 } else if (cmd && !strcmp(msg, "delete")) {
1404 msg = msg + strlen("delete") + 1;
1405 /* parse flowid */
1406 flowid = (uint16)bcm_strtoul(msg, &end_ptr, 10);
1407 if (*end_ptr != '\0') {
1408 DHD_ERROR(("msg not truncated with NULL character\n"));
1409 return BCME_ERROR;
1410 }
1411
1412 /* Find flowid from ifidx 0 since this IOVAR creating flowring with ifidx 0 */
1413 if (dhd_flowid_find_by_ifidx(dhd, 0, flowid) != BCME_OK)
1414 {
1415 DHD_ERROR(("%s : Deleting not created flowid: %u\n", __FUNCTION__, flowid));
1416 return BCME_ERROR;
1417 }
1418
1419 flow_ring_table = (flow_ring_table_t *)dhd->flow_ring_table;
1420 ret = dhd_bus_flow_ring_delete_request(dhd->bus, (void *)&flow_ring_table[flowid]);
1421 if (ret != BCME_OK) {
1422 DHD_ERROR(("%s: flowring deletion failed ret: %d\n", __FUNCTION__, ret));
1423 return BCME_ERROR;
1424 }
1425 return BCME_OK;
1426 }
1427 DHD_ERROR(("%s: neither create nor delete\n", __FUNCTION__));
1428 return BCME_ERROR;
1429 }
1430 #endif /* BCMPCIE */
1431 #endif /* DHD_DEBUG */
1432
1433 static int
1434 dhd_doiovar(dhd_pub_t *dhd_pub, const bcm_iovar_t *vi, uint32 actionid, const char *name,
1435 void *params, int plen, void *arg, int len, int val_size)
1436 {
1437 int bcmerror = 0;
1438 int32 int_val = 0;
1439 uint32 dhd_ver_len, bus_api_rev_len;
1440
1441 DHD_TRACE(("%s: Enter\n", __FUNCTION__));
1442 DHD_TRACE(("%s: actionid = %d; name %s\n", __FUNCTION__, actionid, name));
1443
1444 if ((bcmerror = bcm_iovar_lencheck(vi, arg, len, IOV_ISSET(actionid))) != 0)
1445 goto exit;
1446
1447 if (plen >= (int)sizeof(int_val))
1448 bcopy(params, &int_val, sizeof(int_val));
1449
1450 switch (actionid) {
1451 case IOV_GVAL(IOV_VERSION):
1452 /* Need to have checked buffer length */
1453 dhd_ver_len = strlen(dhd_version);
1454 bus_api_rev_len = strlen(bus_api_revision);
1455 if (dhd_ver_len)
1456 bcm_strncpy_s((char*)arg, dhd_ver_len, dhd_version, dhd_ver_len);
1457 if (bus_api_rev_len)
1458 bcm_strncat_s((char*)arg + dhd_ver_len, bus_api_rev_len, bus_api_revision,
1459 bus_api_rev_len);
1460 break;
1461
1462 case IOV_GVAL(IOV_MSGLEVEL):
1463 int_val = (int32)dhd_msg_level;
1464 bcopy(&int_val, arg, val_size);
1465 break;
1466
1467 case IOV_SVAL(IOV_MSGLEVEL):
1468 #ifdef WL_CFG80211
1469 /* Enable DHD and WL logs in oneshot */
1470 if (int_val & DHD_WL_VAL2)
1471 wl_cfg80211_enable_trace(TRUE, int_val & (~DHD_WL_VAL2));
1472 else if (int_val & DHD_WL_VAL)
1473 wl_cfg80211_enable_trace(FALSE, WL_DBG_DBG);
1474 if (!(int_val & DHD_WL_VAL2))
1475 #endif /* WL_CFG80211 */
1476 dhd_msg_level = int_val;
1477 break;
1478 case IOV_GVAL(IOV_BCMERRORSTR):
1479 bcm_strncpy_s((char *)arg, len, bcmerrorstr(dhd_pub->bcmerror), BCME_STRLEN);
1480 ((char *)arg)[BCME_STRLEN - 1] = 0x00;
1481 break;
1482
1483 case IOV_GVAL(IOV_BCMERROR):
1484 int_val = (int32)dhd_pub->bcmerror;
1485 bcopy(&int_val, arg, val_size);
1486 break;
1487
1488 case IOV_GVAL(IOV_WDTICK):
1489 int_val = (int32)dhd_watchdog_ms;
1490 bcopy(&int_val, arg, val_size);
1491 break;
1492
1493 case IOV_SVAL(IOV_WDTICK):
1494 if (!dhd_pub->up) {
1495 bcmerror = BCME_NOTUP;
1496 break;
1497 }
1498
1499 dhd_watchdog_ms = (uint)int_val;
1500
1501 dhd_os_wd_timer(dhd_pub, (uint)int_val);
1502 break;
1503
1504 case IOV_GVAL(IOV_DUMP):
1505 if (dhd_dump(dhd_pub, arg, len) <= 0)
1506 bcmerror = BCME_ERROR;
1507 else
1508 bcmerror = BCME_OK;
1509 break;
1510
1511 case IOV_GVAL(IOV_DCONSOLE_POLL):
1512 int_val = (int32)dhd_pub->dhd_console_ms;
1513 bcopy(&int_val, arg, val_size);
1514 break;
1515
1516 case IOV_SVAL(IOV_DCONSOLE_POLL):
1517 dhd_pub->dhd_console_ms = (uint)int_val;
1518 break;
1519
1520 #if defined(DHD_DEBUG)
1521 case IOV_SVAL(IOV_CONS):
1522 if (len > 0)
1523 bcmerror = dhd_bus_console_in(dhd_pub, arg, len - 1);
1524 break;
1525 #endif /* DHD_DEBUG */
1526
1527 case IOV_SVAL(IOV_CLEARCOUNTS):
1528 dhd_pub->tx_packets = dhd_pub->rx_packets = 0;
1529 dhd_pub->tx_errors = dhd_pub->rx_errors = 0;
1530 dhd_pub->tx_ctlpkts = dhd_pub->rx_ctlpkts = 0;
1531 dhd_pub->tx_ctlerrs = dhd_pub->rx_ctlerrs = 0;
1532 dhd_pub->tx_dropped = 0;
1533 dhd_pub->rx_dropped = 0;
1534 dhd_pub->tx_pktgetfail = 0;
1535 dhd_pub->rx_pktgetfail = 0;
1536 dhd_pub->rx_readahead_cnt = 0;
1537 dhd_pub->tx_realloc = 0;
1538 dhd_pub->wd_dpc_sched = 0;
1539 dhd_pub->tx_big_packets = 0;
1540 memset(&dhd_pub->dstats, 0, sizeof(dhd_pub->dstats));
1541 dhd_bus_clearcounts(dhd_pub);
1542 #ifdef PROP_TXSTATUS
1543 /* clear proptxstatus related counters */
1544 dhd_wlfc_clear_counts(dhd_pub);
1545 #endif /* PROP_TXSTATUS */
1546 #if defined(DHD_LB_STATS)
1547 DHD_LB_STATS_RESET(dhd_pub);
1548 #endif /* DHD_LB_STATS */
1549 break;
1550
1551 case IOV_GVAL(IOV_IOCTLTIMEOUT): {
1552 int_val = (int32)dhd_os_get_ioctl_resp_timeout();
1553 bcopy(&int_val, arg, sizeof(int_val));
1554 break;
1555 }
1556
1557 case IOV_SVAL(IOV_IOCTLTIMEOUT): {
1558 if (int_val <= 0)
1559 bcmerror = BCME_BADARG;
1560 else
1561 dhd_os_set_ioctl_resp_timeout((unsigned int)int_val);
1562 break;
1563 }
1564
1565 #ifdef PROP_TXSTATUS
1566 case IOV_GVAL(IOV_PROPTXSTATUS_ENABLE): {
1567 bool wlfc_enab = FALSE;
1568 bcmerror = dhd_wlfc_get_enable(dhd_pub, &wlfc_enab);
1569 if (bcmerror != BCME_OK)
1570 goto exit;
1571 int_val = wlfc_enab ? 1 : 0;
1572 bcopy(&int_val, arg, val_size);
1573 break;
1574 }
1575 case IOV_SVAL(IOV_PROPTXSTATUS_ENABLE): {
1576 bool wlfc_enab = FALSE;
1577 bcmerror = dhd_wlfc_get_enable(dhd_pub, &wlfc_enab);
1578 if (bcmerror != BCME_OK)
1579 goto exit;
1580
1581 /* wlfc is already set as desired */
1582 if (wlfc_enab == (int_val == 0 ? FALSE : TRUE))
1583 goto exit;
1584
1585 if (int_val == TRUE)
1586 bcmerror = dhd_wlfc_init(dhd_pub);
1587 else
1588 bcmerror = dhd_wlfc_deinit(dhd_pub);
1589
1590 break;
1591 }
1592 case IOV_GVAL(IOV_PROPTXSTATUS_MODE):
1593 bcmerror = dhd_wlfc_get_mode(dhd_pub, &int_val);
1594 if (bcmerror != BCME_OK)
1595 goto exit;
1596 bcopy(&int_val, arg, val_size);
1597 break;
1598
1599 case IOV_SVAL(IOV_PROPTXSTATUS_MODE):
1600 dhd_wlfc_set_mode(dhd_pub, int_val);
1601 break;
1602
1603 case IOV_GVAL(IOV_PROPTXSTATUS_MODULE_IGNORE):
1604 bcmerror = dhd_wlfc_get_module_ignore(dhd_pub, &int_val);
1605 if (bcmerror != BCME_OK)
1606 goto exit;
1607 bcopy(&int_val, arg, val_size);
1608 break;
1609
1610 case IOV_SVAL(IOV_PROPTXSTATUS_MODULE_IGNORE):
1611 dhd_wlfc_set_module_ignore(dhd_pub, int_val);
1612 break;
1613
1614 case IOV_GVAL(IOV_PROPTXSTATUS_CREDIT_IGNORE):
1615 bcmerror = dhd_wlfc_get_credit_ignore(dhd_pub, &int_val);
1616 if (bcmerror != BCME_OK)
1617 goto exit;
1618 bcopy(&int_val, arg, val_size);
1619 break;
1620
1621 case IOV_SVAL(IOV_PROPTXSTATUS_CREDIT_IGNORE):
1622 dhd_wlfc_set_credit_ignore(dhd_pub, int_val);
1623 break;
1624
1625 case IOV_GVAL(IOV_PROPTXSTATUS_TXSTATUS_IGNORE):
1626 bcmerror = dhd_wlfc_get_txstatus_ignore(dhd_pub, &int_val);
1627 if (bcmerror != BCME_OK)
1628 goto exit;
1629 bcopy(&int_val, arg, val_size);
1630 break;
1631
1632 case IOV_SVAL(IOV_PROPTXSTATUS_TXSTATUS_IGNORE):
1633 dhd_wlfc_set_txstatus_ignore(dhd_pub, int_val);
1634 break;
1635
1636 case IOV_GVAL(IOV_PROPTXSTATUS_RXPKT_CHK):
1637 bcmerror = dhd_wlfc_get_rxpkt_chk(dhd_pub, &int_val);
1638 if (bcmerror != BCME_OK)
1639 goto exit;
1640 bcopy(&int_val, arg, val_size);
1641 break;
1642
1643 case IOV_SVAL(IOV_PROPTXSTATUS_RXPKT_CHK):
1644 dhd_wlfc_set_rxpkt_chk(dhd_pub, int_val);
1645 break;
1646
1647 #endif /* PROP_TXSTATUS */
1648
1649 case IOV_GVAL(IOV_BUS_TYPE):
1650 /* The dhd application queries the driver to check if its usb or sdio. */
1651 #ifdef BCMDHDUSB
1652 int_val = BUS_TYPE_USB;
1653 #endif // endif
1654 #ifdef BCMSDIO
1655 int_val = BUS_TYPE_SDIO;
1656 #endif // endif
1657 #ifdef PCIE_FULL_DONGLE
1658 int_val = BUS_TYPE_PCIE;
1659 #endif // endif
1660 bcopy(&int_val, arg, val_size);
1661 break;
1662
1663 case IOV_SVAL(IOV_CHANGEMTU):
1664 int_val &= 0xffff;
1665 bcmerror = dhd_change_mtu(dhd_pub, int_val, 0);
1666 break;
1667
1668 case IOV_GVAL(IOV_HOSTREORDER_FLOWS):
1669 {
1670 uint i = 0;
1671 uint8 *ptr = (uint8 *)arg;
1672 uint8 count = 0;
1673
1674 ptr++;
1675 for (i = 0; i < WLHOST_REORDERDATA_MAXFLOWS; i++) {
1676 if (dhd_pub->reorder_bufs[i] != NULL) {
1677 *ptr = dhd_pub->reorder_bufs[i]->flow_id;
1678 ptr++;
1679 count++;
1680 }
1681 }
1682 ptr = (uint8 *)arg;
1683 *ptr = count;
1684 break;
1685 }
1686 #ifdef DHDTCPACK_SUPPRESS
1687 case IOV_GVAL(IOV_TCPACK_SUPPRESS): {
1688 int_val = (uint32)dhd_pub->tcpack_sup_mode;
1689 bcopy(&int_val, arg, val_size);
1690 break;
1691 }
1692 case IOV_SVAL(IOV_TCPACK_SUPPRESS): {
1693 bcmerror = dhd_tcpack_suppress_set(dhd_pub, (uint8)int_val);
1694 break;
1695 }
1696 #endif /* DHDTCPACK_SUPPRESS */
1697
1698 #ifdef DHD_L2_FILTER
1699 case IOV_GVAL(IOV_DHCP_UNICAST): {
1700 uint32 bssidx;
1701 const char *val;
1702 if (dhd_iovar_parse_bssidx(dhd_pub, name, &bssidx, &val) != BCME_OK) {
1703 DHD_ERROR(("%s: IOV_DHCP_UNICAST: bad parameterand name = %s\n",
1704 __FUNCTION__, name));
1705 bcmerror = BCME_BADARG;
1706 break;
1707 }
1708 int_val = dhd_get_dhcp_unicast_status(dhd_pub, bssidx);
1709 memcpy(arg, &int_val, val_size);
1710 break;
1711 }
1712 case IOV_SVAL(IOV_DHCP_UNICAST): {
1713 uint32 bssidx;
1714 const char *val;
1715 if (dhd_iovar_parse_bssidx(dhd_pub, name, &bssidx, &val) != BCME_OK) {
1716 DHD_ERROR(("%s: IOV_DHCP_UNICAST: bad parameterand name = %s\n",
1717 __FUNCTION__, name));
1718 bcmerror = BCME_BADARG;
1719 break;
1720 }
1721 memcpy(&int_val, val, sizeof(int_val));
1722 bcmerror = dhd_set_dhcp_unicast_status(dhd_pub, bssidx, int_val ? 1 : 0);
1723 break;
1724 }
1725 case IOV_GVAL(IOV_BLOCK_PING): {
1726 uint32 bssidx;
1727 const char *val;
1728
1729 if (dhd_iovar_parse_bssidx(dhd_pub, name, &bssidx, &val) != BCME_OK) {
1730 DHD_ERROR(("%s: IOV_BLOCK_PING: bad parameter\n", __FUNCTION__));
1731 bcmerror = BCME_BADARG;
1732 break;
1733 }
1734 int_val = dhd_get_block_ping_status(dhd_pub, bssidx);
1735 memcpy(arg, &int_val, val_size);
1736 break;
1737 }
1738 case IOV_SVAL(IOV_BLOCK_PING): {
1739 uint32 bssidx;
1740 const char *val;
1741
1742 if (dhd_iovar_parse_bssidx(dhd_pub, name, &bssidx, &val) != BCME_OK) {
1743 DHD_ERROR(("%s: IOV_BLOCK_PING: bad parameter\n", __FUNCTION__));
1744 bcmerror = BCME_BADARG;
1745 break;
1746 }
1747 memcpy(&int_val, val, sizeof(int_val));
1748 bcmerror = dhd_set_block_ping_status(dhd_pub, bssidx, int_val ? 1 : 0);
1749 break;
1750 }
1751 case IOV_GVAL(IOV_PROXY_ARP): {
1752 uint32 bssidx;
1753 const char *val;
1754
1755 if (dhd_iovar_parse_bssidx(dhd_pub, name, &bssidx, &val) != BCME_OK) {
1756 DHD_ERROR(("%s: IOV_PROXY_ARP: bad parameter\n", __FUNCTION__));
1757 bcmerror = BCME_BADARG;
1758 break;
1759 }
1760 int_val = dhd_get_parp_status(dhd_pub, bssidx);
1761 bcopy(&int_val, arg, val_size);
1762 break;
1763 }
1764 case IOV_SVAL(IOV_PROXY_ARP): {
1765 uint32 bssidx;
1766 const char *val;
1767
1768 if (dhd_iovar_parse_bssidx(dhd_pub, name, &bssidx, &val) != BCME_OK) {
1769 DHD_ERROR(("%s: IOV_PROXY_ARP: bad parameter\n", __FUNCTION__));
1770 bcmerror = BCME_BADARG;
1771 break;
1772 }
1773 bcopy(val, &int_val, sizeof(int_val));
1774
1775 /* Issue a iovar request to WL to update the proxy arp capability bit
1776 * in the Extended Capability IE of beacons/probe responses.
1777 */
1778 bcmerror = dhd_iovar(dhd_pub, bssidx, "proxy_arp_advertise", val, sizeof(int_val),
1779 NULL, 0, TRUE);
1780 if (bcmerror == BCME_OK) {
1781 dhd_set_parp_status(dhd_pub, bssidx, int_val ? 1 : 0);
1782 }
1783 break;
1784 }
1785 case IOV_GVAL(IOV_GRAT_ARP): {
1786 uint32 bssidx;
1787 const char *val;
1788
1789 if (dhd_iovar_parse_bssidx(dhd_pub, name, &bssidx, &val) != BCME_OK) {
1790 DHD_ERROR(("%s: IOV_GRAT_ARP: bad parameter\n", __FUNCTION__));
1791 bcmerror = BCME_BADARG;
1792 break;
1793 }
1794 int_val = dhd_get_grat_arp_status(dhd_pub, bssidx);
1795 memcpy(arg, &int_val, val_size);
1796 break;
1797 }
1798 case IOV_SVAL(IOV_GRAT_ARP): {
1799 uint32 bssidx;
1800 const char *val;
1801
1802 if (dhd_iovar_parse_bssidx(dhd_pub, name, &bssidx, &val) != BCME_OK) {
1803 DHD_ERROR(("%s: IOV_GRAT_ARP: bad parameter\n", __FUNCTION__));
1804 bcmerror = BCME_BADARG;
1805 break;
1806 }
1807 memcpy(&int_val, val, sizeof(int_val));
1808 bcmerror = dhd_set_grat_arp_status(dhd_pub, bssidx, int_val ? 1 : 0);
1809 break;
1810 }
1811 case IOV_GVAL(IOV_BLOCK_TDLS): {
1812 uint32 bssidx;
1813 const char *val;
1814
1815 if (dhd_iovar_parse_bssidx(dhd_pub, name, &bssidx, &val) != BCME_OK) {
1816 DHD_ERROR(("%s: IOV_BLOCK_TDLS: bad parameter\n", __FUNCTION__));
1817 bcmerror = BCME_BADARG;
1818 break;
1819 }
1820 int_val = dhd_get_block_tdls_status(dhd_pub, bssidx);
1821 memcpy(arg, &int_val, val_size);
1822 break;
1823 }
1824 case IOV_SVAL(IOV_BLOCK_TDLS): {
1825 uint32 bssidx;
1826 const char *val;
1827
1828 if (dhd_iovar_parse_bssidx(dhd_pub, name, &bssidx, &val) != BCME_OK) {
1829 DHD_ERROR(("%s: IOV_BLOCK_TDLS: bad parameter\n", __FUNCTION__));
1830 bcmerror = BCME_BADARG;
1831 break;
1832 }
1833 memcpy(&int_val, val, sizeof(int_val));
1834 bcmerror = dhd_set_block_tdls_status(dhd_pub, bssidx, int_val ? 1 : 0);
1835 break;
1836 }
1837 #endif /* DHD_L2_FILTER */
1838 case IOV_SVAL(IOV_DHD_IE): {
1839 uint32 bssidx;
1840 const char *val;
1841
1842 if (dhd_iovar_parse_bssidx(dhd_pub, name, &bssidx, &val) != BCME_OK) {
1843 DHD_ERROR(("%s: dhd ie: bad parameter\n", __FUNCTION__));
1844 bcmerror = BCME_BADARG;
1845 break;
1846 }
1847
1848 break;
1849 }
1850 case IOV_GVAL(IOV_AP_ISOLATE): {
1851 uint32 bssidx;
1852 const char *val;
1853
1854 if (dhd_iovar_parse_bssidx(dhd_pub, name, &bssidx, &val) != BCME_OK) {
1855 DHD_ERROR(("%s: ap isoalate: bad parameter\n", __FUNCTION__));
1856 bcmerror = BCME_BADARG;
1857 break;
1858 }
1859
1860 int_val = dhd_get_ap_isolate(dhd_pub, bssidx);
1861 bcopy(&int_val, arg, val_size);
1862 break;
1863 }
1864 case IOV_SVAL(IOV_AP_ISOLATE): {
1865 uint32 bssidx;
1866 const char *val;
1867
1868 if (dhd_iovar_parse_bssidx(dhd_pub, name, &bssidx, &val) != BCME_OK) {
1869 DHD_ERROR(("%s: ap isolate: bad parameter\n", __FUNCTION__));
1870 bcmerror = BCME_BADARG;
1871 break;
1872 }
1873
1874 ASSERT(val);
1875 bcopy(val, &int_val, sizeof(uint32));
1876 dhd_set_ap_isolate(dhd_pub, bssidx, int_val);
1877 break;
1878 }
1879 #ifdef DHD_PSTA
1880 case IOV_GVAL(IOV_PSTA): {
1881 int_val = dhd_get_psta_mode(dhd_pub);
1882 bcopy(&int_val, arg, val_size);
1883 break;
1884 }
1885 case IOV_SVAL(IOV_PSTA): {
1886 if (int_val >= DHD_MODE_PSTA_DISABLED && int_val <= DHD_MODE_PSR) {
1887 dhd_set_psta_mode(dhd_pub, int_val);
1888 } else {
1889 bcmerror = BCME_RANGE;
1890 }
1891 break;
1892 }
1893 #endif /* DHD_PSTA */
1894 #ifdef DHD_WET
1895 case IOV_GVAL(IOV_WET):
1896 int_val = dhd_get_wet_mode(dhd_pub);
1897 bcopy(&int_val, arg, val_size);
1898 break;
1899
1900 case IOV_SVAL(IOV_WET):
1901 if (int_val == 0 || int_val == 1) {
1902 dhd_set_wet_mode(dhd_pub, int_val);
1903 /* Delete the WET DB when disabled */
1904 if (!int_val) {
1905 dhd_wet_sta_delete_list(dhd_pub);
1906 }
1907 } else {
1908 bcmerror = BCME_RANGE;
1909 }
1910 break;
1911 case IOV_SVAL(IOV_WET_HOST_IPV4):
1912 dhd_set_wet_host_ipv4(dhd_pub, params, plen);
1913 break;
1914 case IOV_SVAL(IOV_WET_HOST_MAC):
1915 dhd_set_wet_host_mac(dhd_pub, params, plen);
1916 break;
1917 #endif /* DHD_WET */
1918 #ifdef DHD_MCAST_REGEN
1919 case IOV_GVAL(IOV_MCAST_REGEN_BSS_ENABLE): {
1920 uint32 bssidx;
1921 const char *val;
1922
1923 if (dhd_iovar_parse_bssidx(dhd_pub, (char *)name, &bssidx, &val) != BCME_OK) {
1924 DHD_ERROR(("%s: mcast_regen_bss_enable: bad parameter\n", __FUNCTION__));
1925 bcmerror = BCME_BADARG;
1926 break;
1927 }
1928
1929 int_val = dhd_get_mcast_regen_bss_enable(dhd_pub, bssidx);
1930 bcopy(&int_val, arg, val_size);
1931 break;
1932 }
1933
1934 case IOV_SVAL(IOV_MCAST_REGEN_BSS_ENABLE): {
1935 uint32 bssidx;
1936 const char *val;
1937
1938 if (dhd_iovar_parse_bssidx(dhd_pub, (char *)name, &bssidx, &val) != BCME_OK) {
1939 DHD_ERROR(("%s: mcast_regen_bss_enable: bad parameter\n", __FUNCTION__));
1940 bcmerror = BCME_BADARG;
1941 break;
1942 }
1943
1944 ASSERT(val);
1945 bcopy(val, &int_val, sizeof(uint32));
1946 dhd_set_mcast_regen_bss_enable(dhd_pub, bssidx, int_val);
1947 break;
1948 }
1949 #endif /* DHD_MCAST_REGEN */
1950
1951 case IOV_GVAL(IOV_CFG80211_OPMODE): {
1952 int_val = (int32)dhd_pub->op_mode;
1953 bcopy(&int_val, arg, sizeof(int_val));
1954 break;
1955 }
1956 case IOV_SVAL(IOV_CFG80211_OPMODE): {
1957 if (int_val <= 0)
1958 bcmerror = BCME_BADARG;
1959 else
1960 dhd_pub->op_mode = int_val;
1961 break;
1962 }
1963
1964 case IOV_GVAL(IOV_ASSERT_TYPE):
1965 int_val = g_assert_type;
1966 bcopy(&int_val, arg, val_size);
1967 break;
1968
1969 case IOV_SVAL(IOV_ASSERT_TYPE):
1970 g_assert_type = (uint32)int_val;
1971 break;
1972
1973 #if !defined(MACOSX_DHD)
1974 case IOV_GVAL(IOV_LMTEST): {
1975 *(uint32 *)arg = (uint32)lmtest;
1976 break;
1977 }
1978
1979 case IOV_SVAL(IOV_LMTEST): {
1980 uint32 val = *(uint32 *)arg;
1981 if (val > 50)
1982 bcmerror = BCME_BADARG;
1983 else {
1984 lmtest = (uint)val;
1985 DHD_ERROR(("%s: lmtest %s\n",
1986 __FUNCTION__, (lmtest == FALSE)? "OFF" : "ON"));
1987 }
1988 break;
1989 }
1990 #endif // endif
1991
1992 #ifdef SHOW_LOGTRACE
1993 case IOV_GVAL(IOV_DUMP_TRACE_LOG): {
1994 trace_buf_info_t *trace_buf_info;
1995
1996 trace_buf_info = (trace_buf_info_t *)MALLOC(dhd_pub->osh,
1997 sizeof(trace_buf_info_t));
1998 if (trace_buf_info != NULL) {
1999 dhd_get_read_buf_ptr(dhd_pub, trace_buf_info);
2000 memcpy((void*)arg, (void*)trace_buf_info, sizeof(trace_buf_info_t));
2001 MFREE(dhd_pub->osh, trace_buf_info, sizeof(trace_buf_info_t));
2002 } else {
2003 DHD_ERROR(("Memory allocation Failed\n"));
2004 bcmerror = BCME_NOMEM;
2005 }
2006 break;
2007 }
2008 #endif /* SHOW_LOGTRACE */
2009 case IOV_GVAL(IOV_DONGLE_TRAP_TYPE):
2010 if (dhd_pub->dongle_trap_occured)
2011 int_val = ltoh32(dhd_pub->last_trap_info.type);
2012 else
2013 int_val = 0;
2014 bcopy(&int_val, arg, val_size);
2015 break;
2016
2017 case IOV_GVAL(IOV_DONGLE_TRAP_INFO):
2018 {
2019 struct bcmstrbuf strbuf;
2020 bcm_binit(&strbuf, arg, len);
2021 if (dhd_pub->dongle_trap_occured == FALSE) {
2022 bcm_bprintf(&strbuf, "no trap recorded\n");
2023 break;
2024 }
2025 dhd_bus_dump_trap_info(dhd_pub->bus, &strbuf);
2026 break;
2027 }
2028 #ifdef DHD_DEBUG
2029 #if defined(BCMSDIO) || defined(BCMPCIE)
2030
2031 case IOV_GVAL(IOV_BPADDR):
2032 {
2033 sdreg_t sdreg;
2034 uint32 addr, size;
2035
2036 memcpy(&sdreg, params, sizeof(sdreg));
2037
2038 addr = sdreg.offset;
2039 size = sdreg.func;
2040
2041 bcmerror = dhd_bus_readwrite_bp_addr(dhd_pub, addr, size,
2042 (uint *)&int_val, TRUE);
2043
2044 memcpy(arg, &int_val, sizeof(int32));
2045
2046 break;
2047 }
2048
2049 case IOV_SVAL(IOV_BPADDR):
2050 {
2051 sdreg_t sdreg;
2052 uint32 addr, size;
2053
2054 memcpy(&sdreg, params, sizeof(sdreg));
2055
2056 addr = sdreg.offset;
2057 size = sdreg.func;
2058
2059 bcmerror = dhd_bus_readwrite_bp_addr(dhd_pub, addr, size,
2060 (uint *)&sdreg.value,
2061 FALSE);
2062
2063 break;
2064 }
2065 #endif /* BCMSDIO || BCMPCIE */
2066 #ifdef BCMPCIE
2067 case IOV_SVAL(IOV_FLOW_RING_DEBUG):
2068 {
2069 bcmerror = dhd_flow_ring_debug(dhd_pub, arg, len);
2070 break;
2071 }
2072 #endif /* BCMPCIE */
2073 case IOV_SVAL(IOV_MEM_DEBUG):
2074 if (len > 0) {
2075 bcmerror = dhd_mem_debug(dhd_pub, arg, len - 1);
2076 }
2077 break;
2078 #endif /* DHD_DEBUG */
2079 #if defined(DHD_LOG_DUMP)
2080 case IOV_GVAL(IOV_LOG_DUMP):
2081 {
2082 dhd_prot_debug_info_print(dhd_pub);
2083 dhd_log_dump_trigger(dhd_pub, CMD_DEFAULT);
2084 break;
2085 }
2086 #endif /* DHD_LOG_DUMP */
2087 default:
2088 bcmerror = BCME_UNSUPPORTED;
2089 break;
2090 }
2091
2092 exit:
2093 DHD_TRACE(("%s: actionid %d, bcmerror %d\n", __FUNCTION__, actionid, bcmerror));
2094 return bcmerror;
2095 }
2096
2097 /* Store the status of a connection attempt for later retrieval by an iovar */
2098 void
2099 dhd_store_conn_status(uint32 event, uint32 status, uint32 reason)
2100 {
2101 /* Do not overwrite a WLC_E_PRUNE with a WLC_E_SET_SSID
2102 * because an encryption/rsn mismatch results in both events, and
2103 * the important information is in the WLC_E_PRUNE.
2104 */
2105 if (!(event == WLC_E_SET_SSID && status == WLC_E_STATUS_FAIL &&
2106 dhd_conn_event == WLC_E_PRUNE)) {
2107 dhd_conn_event = event;
2108 dhd_conn_status = status;
2109 dhd_conn_reason = reason;
2110 }
2111 }
2112
2113 bool
2114 dhd_prec_enq(dhd_pub_t *dhdp, struct pktq *q, void *pkt, int prec)
2115 {
2116 void *p;
2117 int eprec = -1; /* precedence to evict from */
2118 bool discard_oldest;
2119
2120 /* Fast case, precedence queue is not full and we are also not
2121 * exceeding total queue length
2122 */
2123 if (!pktqprec_full(q, prec) && !pktq_full(q)) {
2124 pktq_penq(q, prec, pkt);
2125 return TRUE;
2126 }
2127
2128 /* Determine precedence from which to evict packet, if any */
2129 if (pktqprec_full(q, prec))
2130 eprec = prec;
2131 else if (pktq_full(q)) {
2132 p = pktq_peek_tail(q, &eprec);
2133 ASSERT(p);
2134 if (eprec > prec || eprec < 0)
2135 return FALSE;
2136 }
2137
2138 /* Evict if needed */
2139 if (eprec >= 0) {
2140 /* Detect queueing to unconfigured precedence */
2141 ASSERT(!pktqprec_empty(q, eprec));
2142 discard_oldest = AC_BITMAP_TST(dhdp->wme_dp, eprec);
2143 if (eprec == prec && !discard_oldest)
2144 return FALSE; /* refuse newer (incoming) packet */
2145 /* Evict packet according to discard policy */
2146 p = discard_oldest ? pktq_pdeq(q, eprec) : pktq_pdeq_tail(q, eprec);
2147 ASSERT(p);
2148 #ifdef DHDTCPACK_SUPPRESS
2149 if (dhd_tcpack_check_xmit(dhdp, p) == BCME_ERROR) {
2150 DHD_ERROR(("%s %d: tcpack_suppress ERROR!!! Stop using it\n",
2151 __FUNCTION__, __LINE__));
2152 dhd_tcpack_suppress_set(dhdp, TCPACK_SUP_OFF);
2153 }
2154 #endif /* DHDTCPACK_SUPPRESS */
2155 PKTFREE(dhdp->osh, p, TRUE);
2156 }
2157
2158 /* Enqueue */
2159 p = pktq_penq(q, prec, pkt);
2160 ASSERT(p);
2161
2162 return TRUE;
2163 }
2164
2165 /*
2166 * Functions to drop proper pkts from queue:
2167 * If one pkt in queue is non-fragmented, drop first non-fragmented pkt only
2168 * If all pkts in queue are all fragmented, find and drop one whole set fragmented pkts
2169 * If can't find pkts matching upper 2 cases, drop first pkt anyway
2170 */
2171 bool
2172 dhd_prec_drop_pkts(dhd_pub_t *dhdp, struct pktq *pq, int prec, f_droppkt_t fn)
2173 {
2174 struct pktq_prec *q = NULL;
2175 void *p, *prev = NULL, *next = NULL, *first = NULL, *last = NULL, *prev_first = NULL;
2176 pkt_frag_t frag_info;
2177
2178 ASSERT(dhdp && pq);
2179 ASSERT(prec >= 0 && prec < pq->num_prec);
2180
2181 q = &pq->q[prec];
2182 p = q->head;
2183
2184 if (p == NULL)
2185 return FALSE;
2186
2187 while (p) {
2188 frag_info = pkt_frag_info(dhdp->osh, p);
2189 if (frag_info == DHD_PKT_FRAG_NONE) {
2190 break;
2191 } else if (frag_info == DHD_PKT_FRAG_FIRST) {
2192 if (first) {
2193 /* No last frag pkt, use prev as last */
2194 last = prev;
2195 break;
2196 } else {
2197 first = p;
2198 prev_first = prev;
2199 }
2200 } else if (frag_info == DHD_PKT_FRAG_LAST) {
2201 if (first) {
2202 last = p;
2203 break;
2204 }
2205 }
2206
2207 prev = p;
2208 p = PKTLINK(p);
2209 }
2210
2211 if ((p == NULL) || ((frag_info != DHD_PKT_FRAG_NONE) && !(first && last))) {
2212 /* Not found matching pkts, use oldest */
2213 prev = NULL;
2214 p = q->head;
2215 frag_info = 0;
2216 }
2217
2218 if (frag_info == DHD_PKT_FRAG_NONE) {
2219 first = last = p;
2220 prev_first = prev;
2221 }
2222
2223 p = first;
2224 while (p) {
2225 next = PKTLINK(p);
2226 q->n_pkts--;
2227 pq->n_pkts_tot--;
2228
2229 #ifdef WL_TXQ_STALL
2230 q->dequeue_count++;
2231 #endif // endif
2232
2233 PKTSETLINK(p, NULL);
2234
2235 if (fn)
2236 fn(dhdp, prec, p, TRUE);
2237
2238 if (p == last)
2239 break;
2240
2241 p = next;
2242 }
2243
2244 if (prev_first == NULL) {
2245 if ((q->head = next) == NULL)
2246 q->tail = NULL;
2247 } else {
2248 PKTSETLINK(prev_first, next);
2249 if (!next)
2250 q->tail = prev_first;
2251 }
2252
2253 return TRUE;
2254 }
2255
2256 static int
2257 dhd_iovar_op(dhd_pub_t *dhd_pub, const char *name,
2258 void *params, int plen, void *arg, int len, bool set)
2259 {
2260 int bcmerror = 0;
2261 int val_size;
2262 const bcm_iovar_t *vi = NULL;
2263 uint32 actionid;
2264
2265 DHD_TRACE(("%s: Enter\n", __FUNCTION__));
2266
2267 ASSERT(name);
2268 ASSERT(len >= 0);
2269
2270 /* Get MUST have return space */
2271 ASSERT(set || (arg && len));
2272
2273 /* Set does NOT take qualifiers */
2274 ASSERT(!set || (!params && !plen));
2275
2276 if ((vi = bcm_iovar_lookup(dhd_iovars, name)) == NULL) {
2277 bcmerror = BCME_UNSUPPORTED;
2278 goto exit;
2279 }
2280
2281 DHD_CTL(("%s: %s %s, len %d plen %d\n", __FUNCTION__,
2282 name, (set ? "set" : "get"), len, plen));
2283
2284 /* set up 'params' pointer in case this is a set command so that
2285 * the convenience int and bool code can be common to set and get
2286 */
2287 if (params == NULL) {
2288 params = arg;
2289 plen = len;
2290 }
2291
2292 if (vi->type == IOVT_VOID)
2293 val_size = 0;
2294 else if (vi->type == IOVT_BUFFER)
2295 val_size = len;
2296 else
2297 /* all other types are integer sized */
2298 val_size = sizeof(int);
2299
2300 actionid = set ? IOV_SVAL(vi->varid) : IOV_GVAL(vi->varid);
2301
2302 bcmerror = dhd_doiovar(dhd_pub, vi, actionid, name, params, plen, arg, len, val_size);
2303
2304 exit:
2305 return bcmerror;
2306 }
2307
2308 int
2309 dhd_ioctl(dhd_pub_t * dhd_pub, dhd_ioctl_t *ioc, void *buf, uint buflen)
2310 {
2311 int bcmerror = 0;
2312 unsigned long flags;
2313
2314 DHD_TRACE(("%s: Enter\n", __FUNCTION__));
2315
2316 if (!buf) {
2317 return BCME_BADARG;
2318 }
2319
2320 dhd_os_dhdiovar_lock(dhd_pub);
2321 switch (ioc->cmd) {
2322 case DHD_GET_MAGIC:
2323 if (buflen < sizeof(int))
2324 bcmerror = BCME_BUFTOOSHORT;
2325 else
2326 *(int*)buf = DHD_IOCTL_MAGIC;
2327 break;
2328
2329 case DHD_GET_VERSION:
2330 if (buflen < sizeof(int))
2331 bcmerror = BCME_BUFTOOSHORT;
2332 else
2333 *(int*)buf = DHD_IOCTL_VERSION;
2334 break;
2335
2336 case DHD_GET_VAR:
2337 case DHD_SET_VAR:
2338 {
2339 char *arg;
2340 uint arglen;
2341
2342 DHD_LINUX_GENERAL_LOCK(dhd_pub, flags);
2343 if (DHD_BUS_CHECK_DOWN_OR_DOWN_IN_PROGRESS(dhd_pub) &&
2344 bcmstricmp((char *)buf, "devreset")) {
2345 /* In platforms like FC19, the FW download is done via IOCTL
2346 * and should not return error for IOCTLs fired before FW
2347 * Download is done
2348 */
2349 if (dhd_fw_download_status(dhd_pub)) {
2350 DHD_ERROR(("%s: returning as busstate=%d\n",
2351 __FUNCTION__, dhd_pub->busstate));
2352 DHD_LINUX_GENERAL_UNLOCK(dhd_pub, flags);
2353 dhd_os_dhdiovar_unlock(dhd_pub);
2354 return -ENODEV;
2355 }
2356 }
2357 DHD_BUS_BUSY_SET_IN_DHD_IOVAR(dhd_pub);
2358 DHD_LINUX_GENERAL_UNLOCK(dhd_pub, flags);
2359
2360 #ifdef DHD_PCIE_RUNTIMEPM
2361 dhdpcie_runtime_bus_wake(dhd_pub, TRUE, dhd_ioctl);
2362 #endif /* DHD_PCIE_RUNTIMEPM */
2363
2364 DHD_LINUX_GENERAL_LOCK(dhd_pub, flags);
2365 if (DHD_BUS_CHECK_SUSPEND_OR_SUSPEND_IN_PROGRESS(dhd_pub)) {
2366 /* If Suspend/Resume is tested via pcie_suspend IOVAR
2367 * then continue to execute the IOVAR, return from here for
2368 * other IOVARs, also include pciecfgreg and devreset to go
2369 * through.
2370 */
2371 if (bcmstricmp((char *)buf, "pcie_suspend") &&
2372 bcmstricmp((char *)buf, "pciecfgreg") &&
2373 bcmstricmp((char *)buf, "devreset") &&
2374 bcmstricmp((char *)buf, "sdio_suspend")) {
2375 DHD_ERROR(("%s: bus is in suspend(%d)"
2376 "or suspending(0x%x) state\n",
2377 __FUNCTION__, dhd_pub->busstate,
2378 dhd_pub->dhd_bus_busy_state));
2379 DHD_BUS_BUSY_CLEAR_IN_DHD_IOVAR(dhd_pub);
2380 dhd_os_busbusy_wake(dhd_pub);
2381 DHD_LINUX_GENERAL_UNLOCK(dhd_pub, flags);
2382 dhd_os_dhdiovar_unlock(dhd_pub);
2383 return -ENODEV;
2384 }
2385 }
2386 /* During devreset ioctl, we call dhdpcie_advertise_bus_cleanup,
2387 * which will wait for all the busy contexts to get over for
2388 * particular time and call ASSERT if timeout happens. As during
2389 * devreset ioctal, we made DHD_BUS_BUSY_SET_IN_DHD_IOVAR,
2390 * to avoid ASSERT, clear the IOCTL busy state. "devreset" ioctl is
2391 * not used in Production platforms but only used in FC19 setups.
2392 */
2393 if (!bcmstricmp((char *)buf, "devreset")) {
2394 DHD_BUS_BUSY_CLEAR_IN_DHD_IOVAR(dhd_pub);
2395 }
2396 DHD_LINUX_GENERAL_UNLOCK(dhd_pub, flags);
2397
2398 /* scan past the name to any arguments */
2399 for (arg = buf, arglen = buflen; *arg && arglen; arg++, arglen--)
2400 ;
2401
2402 if (*arg) {
2403 bcmerror = BCME_BUFTOOSHORT;
2404 goto unlock_exit;
2405 }
2406
2407 /* account for the NUL terminator */
2408 arg++, arglen--;
2409 /* call with the appropriate arguments */
2410 if (ioc->cmd == DHD_GET_VAR) {
2411 bcmerror = dhd_iovar_op(dhd_pub, buf, arg, arglen,
2412 buf, buflen, IOV_GET);
2413 } else {
2414 bcmerror = dhd_iovar_op(dhd_pub, buf, NULL, 0,
2415 arg, arglen, IOV_SET);
2416 }
2417 if (bcmerror != BCME_UNSUPPORTED) {
2418 goto unlock_exit;
2419 }
2420
2421 /* not in generic table, try protocol module */
2422 if (ioc->cmd == DHD_GET_VAR) {
2423 bcmerror = dhd_prot_iovar_op(dhd_pub, buf, arg,
2424 arglen, buf, buflen, IOV_GET);
2425 } else {
2426 bcmerror = dhd_prot_iovar_op(dhd_pub, buf,
2427 NULL, 0, arg, arglen, IOV_SET);
2428 }
2429 if (bcmerror != BCME_UNSUPPORTED) {
2430 goto unlock_exit;
2431 }
2432
2433 /* if still not found, try bus module */
2434 if (ioc->cmd == DHD_GET_VAR) {
2435 bcmerror = dhd_bus_iovar_op(dhd_pub, buf,
2436 arg, arglen, buf, buflen, IOV_GET);
2437 } else {
2438 bcmerror = dhd_bus_iovar_op(dhd_pub, buf,
2439 NULL, 0, arg, arglen, IOV_SET);
2440 }
2441 if (bcmerror != BCME_UNSUPPORTED) {
2442 goto unlock_exit;
2443 }
2444
2445 }
2446 goto unlock_exit;
2447
2448 default:
2449 bcmerror = BCME_UNSUPPORTED;
2450 }
2451 dhd_os_dhdiovar_unlock(dhd_pub);
2452 return bcmerror;
2453
2454 unlock_exit:
2455 DHD_LINUX_GENERAL_LOCK(dhd_pub, flags);
2456 DHD_BUS_BUSY_CLEAR_IN_DHD_IOVAR(dhd_pub);
2457 dhd_os_busbusy_wake(dhd_pub);
2458 DHD_LINUX_GENERAL_UNLOCK(dhd_pub, flags);
2459 dhd_os_dhdiovar_unlock(dhd_pub);
2460 return bcmerror;
2461 }
2462
2463 #ifdef SHOW_EVENTS
2464
2465 #if defined(SHOW_EVENTS) && defined(SUPPORT_EVT_SDB_LOG)
2466 #define SDB_ENABLE_AP 0x01
2467 #define SDB_ENABLE_P2P 0x02
2468 #define SDB_IS_AP(i) (i & SDB_ENABLE_AP)
2469 #define SDB_IS_P2P(i) (i & SDB_ENABLE_P2P)
2470
2471 #define WLC_RSDB_MODE_AUTO_MASK 0x80
2472 #define WLC_RSDB_EXTRACT_MODE(val) ((int8)((val) & (~(WLC_RSDB_MODE_AUTO_MASK))))
2473
2474 static void
2475 wl_event_sdb_transition_print(void *event_data, const char *event_name)
2476 {
2477 wl_event_sdb_trans_t *rdata;
2478 wl_event_sdb_data_t *value;
2479 char *sta_mode = "";
2480 int i;
2481 char chanbuf[CHANSPEC_STR_LEN];
2482 rdata = (wl_event_sdb_trans_t *)event_data;
2483
2484 if (!rdata) {
2485 DHD_ERROR(("%s: event_data is NULL\n", __FUNCTION__));
2486 return;
2487 }
2488
2489 if (rdata->version != WL_EVENT_SDB_TRANSITION_VER) {
2490 DHD_ERROR(("%s: invalid Version(%d)\n",
2491 __FUNCTION__, rdata->version));
2492 return;
2493 }
2494
2495 if (rdata->rsdb_mode & WLC_RSDB_MODE_AUTO_MASK) {
2496 DHD_ERROR((" RSDB Mode : Auto, "));
2497 }
2498 DHD_ERROR(("Current RSDB Mode : %d\n", WLC_RSDB_EXTRACT_MODE(rdata->rsdb_mode)));
2499
2500 for (i = 0; i < rdata->enable_bsscfg; i++) {
2501 value = &rdata->values[i];
2502
2503 if (SDB_IS_P2P(value->is_iftype)) {
2504 sta_mode = SDB_IS_AP(value->is_iftype) ? "P2P_GO" : "P2P_GC";
2505 } else {
2506 sta_mode = SDB_IS_AP(value->is_iftype) ? "SoftAP" : "Station";
2507 }
2508
2509 wf_chspec_ntoa_ex(value->chanspec, chanbuf);
2510 DHD_ERROR((" wlc%d <%s> \"%s\", %s(0x%04x)\n",
2511 value->wlunit, sta_mode,
2512 value->ssidbuf, chanbuf, value->chanspec));
2513 }
2514 }
2515 #endif /* SHOW_EVENTS && SUPPORT_EVT_SDB_LOG */
2516
2517 static void
2518 wl_show_host_event(dhd_pub_t *dhd_pub, wl_event_msg_t *event, void *event_data,
2519 void *raw_event_ptr, char *eventmask)
2520 {
2521 uint i, status, reason;
2522 bool group = FALSE, flush_txq = FALSE, link = FALSE;
2523 bool host_data = FALSE; /* prints event data after the case when set */
2524 const char *auth_str;
2525 const char *event_name;
2526 uchar *buf;
2527 char err_msg[256], eabuf[ETHER_ADDR_STR_LEN];
2528 uint event_type, flags, auth_type, datalen;
2529
2530 event_type = ntoh32(event->event_type);
2531 flags = ntoh16(event->flags);
2532 status = ntoh32(event->status);
2533 reason = ntoh32(event->reason);
2534 BCM_REFERENCE(reason);
2535 auth_type = ntoh32(event->auth_type);
2536 datalen = ntoh32(event->datalen);
2537
2538 /* debug dump of event messages */
2539 snprintf(eabuf, sizeof(eabuf), MACDBG, MAC2STRDBG(event->addr.octet));
2540
2541 event_name = bcmevent_get_name(event_type);
2542 BCM_REFERENCE(event_name);
2543
2544 if (flags & WLC_EVENT_MSG_LINK)
2545 link = TRUE;
2546 if (flags & WLC_EVENT_MSG_GROUP)
2547 group = TRUE;
2548 if (flags & WLC_EVENT_MSG_FLUSHTXQ)
2549 flush_txq = TRUE;
2550
2551 switch (event_type) {
2552 case WLC_E_START:
2553 case WLC_E_DEAUTH:
2554 case WLC_E_DISASSOC:
2555 DHD_EVENT(("MACEVENT: %s, MAC %s\n", event_name, eabuf));
2556 break;
2557
2558 case WLC_E_ASSOC_IND:
2559 case WLC_E_REASSOC_IND:
2560
2561 DHD_EVENT(("MACEVENT: %s, MAC %s\n", event_name, eabuf));
2562
2563 break;
2564
2565 case WLC_E_ASSOC:
2566 case WLC_E_REASSOC:
2567 if (status == WLC_E_STATUS_SUCCESS) {
2568 DHD_EVENT(("MACEVENT: %s, MAC %s, SUCCESS\n", event_name, eabuf));
2569 } else if (status == WLC_E_STATUS_TIMEOUT) {
2570 DHD_EVENT(("MACEVENT: %s, MAC %s, TIMEOUT\n", event_name, eabuf));
2571 } else if (status == WLC_E_STATUS_FAIL) {
2572 DHD_EVENT(("MACEVENT: %s, MAC %s, FAILURE, reason %d\n",
2573 event_name, eabuf, (int)reason));
2574 } else {
2575 DHD_EVENT(("MACEVENT: %s, MAC %s, unexpected status %d\n",
2576 event_name, eabuf, (int)status));
2577 }
2578
2579 break;
2580
2581 case WLC_E_DEAUTH_IND:
2582 case WLC_E_DISASSOC_IND:
2583 DHD_EVENT(("MACEVENT: %s, MAC %s, reason %d\n", event_name, eabuf, (int)reason));
2584 break;
2585
2586 case WLC_E_AUTH:
2587 case WLC_E_AUTH_IND:
2588 if (auth_type == DOT11_OPEN_SYSTEM)
2589 auth_str = "Open System";
2590 else if (auth_type == DOT11_SHARED_KEY)
2591 auth_str = "Shared Key";
2592 else {
2593 snprintf(err_msg, sizeof(err_msg), "AUTH unknown: %d", (int)auth_type);
2594 auth_str = err_msg;
2595 }
2596
2597 if (event_type == WLC_E_AUTH_IND) {
2598 DHD_EVENT(("MACEVENT: %s, MAC %s, %s\n", event_name, eabuf, auth_str));
2599 } else if (status == WLC_E_STATUS_SUCCESS) {
2600 DHD_EVENT(("MACEVENT: %s, MAC %s, %s, SUCCESS\n",
2601 event_name, eabuf, auth_str));
2602 } else if (status == WLC_E_STATUS_TIMEOUT) {
2603 DHD_EVENT(("MACEVENT: %s, MAC %s, %s, TIMEOUT\n",
2604 event_name, eabuf, auth_str));
2605 } else if (status == WLC_E_STATUS_FAIL) {
2606 DHD_EVENT(("MACEVENT: %s, MAC %s, %s, FAILURE, reason %d\n",
2607 event_name, eabuf, auth_str, (int)reason));
2608 }
2609 BCM_REFERENCE(auth_str);
2610
2611 break;
2612
2613 case WLC_E_JOIN:
2614 case WLC_E_ROAM:
2615 case WLC_E_SET_SSID:
2616 if (status == WLC_E_STATUS_SUCCESS) {
2617 DHD_EVENT(("MACEVENT: %s, MAC %s\n", event_name, eabuf));
2618 } else {
2619 if (status == WLC_E_STATUS_FAIL) {
2620 DHD_EVENT(("MACEVENT: %s, failed\n", event_name));
2621 } else if (status == WLC_E_STATUS_NO_NETWORKS) {
2622 DHD_EVENT(("MACEVENT: %s, no networks found\n", event_name));
2623 } else {
2624 DHD_EVENT(("MACEVENT: %s, unexpected status %d\n",
2625 event_name, (int)status));
2626 }
2627 }
2628 break;
2629
2630 case WLC_E_BEACON_RX:
2631 if (status == WLC_E_STATUS_SUCCESS) {
2632 DHD_EVENT(("MACEVENT: %s, SUCCESS\n", event_name));
2633 } else if (status == WLC_E_STATUS_FAIL) {
2634 DHD_EVENT(("MACEVENT: %s, FAIL\n", event_name));
2635 } else {
2636 DHD_EVENT(("MACEVENT: %s, status %d\n", event_name, status));
2637 }
2638 break;
2639
2640 case WLC_E_LINK:
2641 DHD_EVENT(("MACEVENT: %s %s flags:0x%x status:%d\n",
2642 event_name, link?"UP":"DOWN", flags, status));
2643 BCM_REFERENCE(link);
2644 break;
2645
2646 case WLC_E_MIC_ERROR:
2647 DHD_EVENT(("MACEVENT: %s, MAC %s, Group %d, Flush %d\n",
2648 event_name, eabuf, group, flush_txq));
2649 BCM_REFERENCE(group);
2650 BCM_REFERENCE(flush_txq);
2651 break;
2652
2653 case WLC_E_ICV_ERROR:
2654 case WLC_E_UNICAST_DECODE_ERROR:
2655 case WLC_E_MULTICAST_DECODE_ERROR:
2656 DHD_EVENT(("MACEVENT: %s, MAC %s\n",
2657 event_name, eabuf));
2658 break;
2659
2660 case WLC_E_TXFAIL:
2661 DHD_EVENT(("MACEVENT: %s, RA %s status %d\n", event_name, eabuf, status));
2662 break;
2663
2664 case WLC_E_ASSOC_REQ_IE:
2665 case WLC_E_ASSOC_RESP_IE:
2666 case WLC_E_PMKID_CACHE:
2667 DHD_EVENT(("MACEVENT: %s\n", event_name));
2668 break;
2669
2670 case WLC_E_SCAN_COMPLETE:
2671 DHD_EVENT(("MACEVENT: %s\n", event_name));
2672 break;
2673 case WLC_E_RSSI_LQM:
2674 case WLC_E_PFN_NET_FOUND:
2675 case WLC_E_PFN_NET_LOST:
2676 case WLC_E_PFN_SCAN_COMPLETE:
2677 case WLC_E_PFN_SCAN_NONE:
2678 case WLC_E_PFN_SCAN_ALLGONE:
2679 case WLC_E_PFN_GSCAN_FULL_RESULT:
2680 case WLC_E_PFN_SSID_EXT:
2681 DHD_EVENT(("PNOEVENT: %s\n", event_name));
2682 break;
2683
2684 case WLC_E_PFN_SCAN_BACKOFF:
2685 case WLC_E_PFN_BSSID_SCAN_BACKOFF:
2686 DHD_EVENT(("PNOEVENT: %s, status %d, reason %d\n",
2687 event_name, (int)status, (int)reason));
2688 break;
2689
2690 case WLC_E_PSK_SUP:
2691 case WLC_E_PRUNE:
2692 DHD_EVENT(("MACEVENT: %s, status %d, reason %d\n",
2693 event_name, (int)status, (int)reason));
2694 break;
2695
2696 #ifdef WIFI_ACT_FRAME
2697 case WLC_E_ACTION_FRAME:
2698 DHD_TRACE(("MACEVENT: %s Bssid %s\n", event_name, eabuf));
2699 break;
2700 #endif /* WIFI_ACT_FRAME */
2701
2702 #ifdef SHOW_LOGTRACE
2703 case WLC_E_TRACE:
2704 {
2705 dhd_dbg_trace_evnt_handler(dhd_pub, event_data, raw_event_ptr, datalen);
2706 break;
2707 }
2708 #endif /* SHOW_LOGTRACE */
2709
2710 case WLC_E_RSSI:
2711 DHD_EVENT(("MACEVENT: %s %d\n", event_name, ntoh32(*((int *)event_data))));
2712 break;
2713
2714 case WLC_E_SERVICE_FOUND:
2715 case WLC_E_P2PO_ADD_DEVICE:
2716 case WLC_E_P2PO_DEL_DEVICE:
2717 DHD_EVENT(("MACEVENT: %s, MAC %s\n", event_name, eabuf));
2718 break;
2719
2720 #ifdef BT_WIFI_HANDOBER
2721 case WLC_E_BT_WIFI_HANDOVER_REQ:
2722 DHD_EVENT(("MACEVENT: %s, MAC %s\n", event_name, eabuf));
2723 break;
2724 #endif // endif
2725
2726 case WLC_E_CCA_CHAN_QUAL:
2727 if (datalen) {
2728 cca_chan_qual_event_t *cca_event = (cca_chan_qual_event_t *)event_data;
2729 if (cca_event->id == WL_CHAN_QUAL_FULL_CCA) {
2730 DHD_EVENT((
2731 "MACEVENT: %s %d, MAC %s, status %d, reason %d, auth %d,"
2732 " channel 0x%02x (dur %dms ibss %dms obss %dms interf %dms"
2733 " ts 0x%08x)\n",
2734 event_name, event_type, eabuf, (int)status,
2735 (int)reason, (int)auth_type, cca_event->chanspec,
2736 cca_event->cca_busy_ext.duration,
2737 cca_event->cca_busy_ext.congest_ibss,
2738 cca_event->cca_busy_ext.congest_obss,
2739 cca_event->cca_busy_ext.interference,
2740 cca_event->cca_busy_ext.timestamp));
2741 } else if (cca_event->id == WL_CHAN_QUAL_CCA) {
2742 DHD_EVENT((
2743 "MACEVENT: %s %d, MAC %s, status %d, reason %d, auth %d,"
2744 " channel 0x%02x (dur %dms busy %dms ts 0x%08x)\n",
2745 event_name, event_type, eabuf, (int)status,
2746 (int)reason, (int)auth_type, cca_event->chanspec,
2747 cca_event->cca_busy.duration,
2748 cca_event->cca_busy.congest,
2749 cca_event->cca_busy.timestamp));
2750 } else if ((cca_event->id == WL_CHAN_QUAL_NF) ||
2751 (cca_event->id == WL_CHAN_QUAL_NF_LTE)) {
2752 DHD_EVENT((
2753 "MACEVENT: %s %d, MAC %s, status %d, reason %d, auth %d,"
2754 " channel 0x%02x (NF[%d] %ddB)\n",
2755 event_name, event_type, eabuf, (int)status,
2756 (int)reason, (int)auth_type, cca_event->chanspec,
2757 cca_event->id, cca_event->noise));
2758 } else {
2759 DHD_EVENT((
2760 "MACEVENT: %s %d, MAC %s, status %d, reason %d, auth %d,"
2761 " channel 0x%02x (unknown ID %d)\n",
2762 event_name, event_type, eabuf, (int)status,
2763 (int)reason, (int)auth_type, cca_event->chanspec,
2764 cca_event->id));
2765 }
2766 }
2767 break;
2768 case WLC_E_ESCAN_RESULT:
2769 {
2770 wl_escan_result_v2_t *escan_result =
2771 (wl_escan_result_v2_t *)event_data;
2772 BCM_REFERENCE(escan_result);
2773 if ((status == WLC_E_STATUS_SUCCESS) || (status == WLC_E_STATUS_ABORT)) {
2774 DHD_EVENT(("MACEVENT: %s %d, status %d sync-id %u\n",
2775 event_name, event_type, (int)status,
2776 dtoh16(escan_result->sync_id)));
2777 } else {
2778 DHD_TRACE(("MACEVENT: %s %d, MAC %s, status %d \n",
2779 event_name, event_type, eabuf, (int)status));
2780 }
2781
2782 break;
2783 }
2784 case WLC_E_IF:
2785 {
2786 struct wl_event_data_if *ifevent = (struct wl_event_data_if *)event_data;
2787 BCM_REFERENCE(ifevent);
2788
2789 DHD_EVENT(("MACEVENT: %s, opcode:0x%d ifidx:%d role:%d\n",
2790 event_name, ifevent->opcode, ifevent->ifidx, ifevent->role));
2791 break;
2792 }
2793 #ifdef SHOW_LOGTRACE
2794 case WLC_E_MSCH:
2795 {
2796 wl_mschdbg_event_handler(dhd_pub, raw_event_ptr, reason, event_data, datalen);
2797 break;
2798 }
2799 #endif /* SHOW_LOGTRACE */
2800
2801 case WLC_E_PSK_AUTH:
2802 DHD_EVENT(("MACEVENT: %s, RA %s status %d Reason:%d\n",
2803 event_name, eabuf, status, reason));
2804 break;
2805 case WLC_E_AGGR_EVENT:
2806 {
2807 event_aggr_data_t *aggrbuf = event_data;
2808 int j = 0, len = 0;
2809 uint8 *data = aggrbuf->data;
2810 DHD_EVENT(("MACEVENT: %s, num of events %d total len %d sub events: ",
2811 event_name, aggrbuf->num_events, aggrbuf->len));
2812 for (j = 0; j < aggrbuf->num_events; j++)
2813 {
2814 wl_event_msg_t * sub_event = (wl_event_msg_t *)data;
2815 if (len > aggrbuf->len) {
2816 DHD_ERROR(("%s: Aggr events corrupted!",
2817 __FUNCTION__));
2818 break;
2819 }
2820 DHD_EVENT(("\n Event type: %d ", ntoh32(sub_event->event_type)));
2821 len += ALIGN_SIZE((ntoh32(sub_event->datalen) +
2822 sizeof(wl_event_msg_t)), sizeof(uint64));
2823 buf = (uchar *)(data + sizeof(wl_event_msg_t));
2824 BCM_REFERENCE(buf);
2825 DHD_EVENT((" data (%d) : ", ntoh32(sub_event->datalen)));
2826 for (i = 0; i < ntoh32(sub_event->datalen); i++) {
2827 DHD_EVENT((" 0x%02x ", buf[i]));
2828 }
2829 data = aggrbuf->data + len;
2830 }
2831 DHD_EVENT(("\n"));
2832 }
2833 break;
2834 case WLC_E_NAN_CRITICAL:
2835 {
2836 DHD_LOG_MEM(("MACEVENT: %s, type:%d\n", event_name, reason));
2837 break;
2838 }
2839 case WLC_E_NAN_NON_CRITICAL:
2840 {
2841 DHD_TRACE(("MACEVENT: %s, type:%d\n", event_name, reason));
2842 break;
2843 }
2844 case WLC_E_RPSNOA:
2845 {
2846 rpsnoa_stats_t *stat = event_data;
2847 if (datalen == sizeof(*stat)) {
2848 DHD_EVENT(("MACEVENT: %s, band %s, status %d, pps %d\n", event_name,
2849 (stat->band == WLC_BAND_2G) ? "2G":"5G",
2850 stat->state, stat->last_pps));
2851 }
2852 break;
2853 }
2854 case WLC_E_PHY_CAL:
2855 {
2856 DHD_EVENT(("MACEVENT: %s, reason:%d\n", event_name, reason));
2857 break;
2858 }
2859 #ifdef SUPPORT_EVT_SDB_LOG
2860 case WLC_E_SDB_TRANSITION:
2861 {
2862 DHD_EVENT(("MACEVENT: %s, status %d, reason %d\n",
2863 event_name, (int)status, (int)reason));
2864 wl_event_sdb_transition_print(event_data, event_name);
2865 break;
2866 }
2867 #endif /* SUPPORT_EVT_SDB_LOG */
2868 default:
2869 DHD_INFO(("MACEVENT: %s %d, MAC %s, status %d, reason %d, auth %d\n",
2870 event_name, event_type, eabuf, (int)status, (int)reason,
2871 (int)auth_type));
2872 break;
2873 }
2874
2875 /* show any appended data if message level is set to bytes or host_data is set */
2876 if ((DHD_BYTES_ON() || (host_data == TRUE)) && DHD_EVENT_ON() && datalen) {
2877 buf = (uchar *) event_data;
2878 BCM_REFERENCE(buf);
2879 DHD_EVENT((" data (%d) : ", datalen));
2880 for (i = 0; i < datalen; i++) {
2881 DHD_EVENT((" 0x%02x ", buf[i]));
2882 }
2883 DHD_EVENT(("\n"));
2884 }
2885 } /* wl_show_host_event */
2886 #endif /* SHOW_EVENTS */
2887
2888 #ifdef DNGL_EVENT_SUPPORT
2889 /* Check whether packet is a BRCM dngl event pkt. If it is, process event data. */
2890 int
2891 dngl_host_event(dhd_pub_t *dhdp, void *pktdata, bcm_dngl_event_msg_t *dngl_event, size_t pktlen)
2892 {
2893 bcm_dngl_event_t *pvt_data = (bcm_dngl_event_t *)pktdata;
2894
2895 dngl_host_event_process(dhdp, pvt_data, dngl_event, pktlen);
2896 return BCME_OK;
2897 }
2898
2899 void
2900 dngl_host_event_process(dhd_pub_t *dhdp, bcm_dngl_event_t *event,
2901 bcm_dngl_event_msg_t *dngl_event, size_t pktlen)
2902 {
2903 uint8 *p = (uint8 *)(event + 1);
2904 uint16 type = ntoh16_ua((void *)&dngl_event->event_type);
2905 uint16 datalen = ntoh16_ua((void *)&dngl_event->datalen);
2906 uint16 version = ntoh16_ua((void *)&dngl_event->version);
2907
2908 DHD_EVENT(("VERSION:%d, EVENT TYPE:%d, DATALEN:%d\n", version, type, datalen));
2909 if (datalen > (pktlen - sizeof(bcm_dngl_event_t) + ETHER_TYPE_LEN)) {
2910 return;
2911 }
2912 if (version != BCM_DNGL_EVENT_MSG_VERSION) {
2913 DHD_ERROR(("%s:version mismatch:%d:%d\n", __FUNCTION__,
2914 version, BCM_DNGL_EVENT_MSG_VERSION));
2915 return;
2916 }
2917 switch (type) {
2918 case DNGL_E_SOCRAM_IND:
2919 {
2920 bcm_dngl_socramind_t *socramind_ptr = (bcm_dngl_socramind_t *)p;
2921 uint16 tag = ltoh32(socramind_ptr->tag);
2922 uint16 taglen = ltoh32(socramind_ptr->length);
2923 p = (uint8 *)socramind_ptr->value;
2924 DHD_EVENT(("Tag:%d Len:%d Datalen:%d\n", tag, taglen, datalen));
2925 switch (tag) {
2926 case SOCRAM_IND_ASSERT_TAG:
2927 {
2928 /*
2929 * The payload consists of -
2930 * null terminated function name padded till 32 bit boundary +
2931 * Line number - (32 bits)
2932 * Caller address (32 bits)
2933 */
2934 char *fnname = (char *)p;
2935 if (datalen < (ROUNDUP(strlen(fnname) + 1, sizeof(uint32)) +
2936 sizeof(uint32) * 2)) {
2937 DHD_ERROR(("Wrong length:%d\n", datalen));
2938 return;
2939 }
2940 DHD_EVENT(("ASSRT Function:%s ", p));
2941 p += ROUNDUP(strlen(p) + 1, sizeof(uint32));
2942 DHD_EVENT(("Line:%d ", *(uint32 *)p));
2943 p += sizeof(uint32);
2944 DHD_EVENT(("Caller Addr:0x%x\n", *(uint32 *)p));
2945 break;
2946 }
2947 case SOCRAM_IND_TAG_HEALTH_CHECK:
2948 {
2949 bcm_dngl_healthcheck_t *dngl_hc = (bcm_dngl_healthcheck_t *)p;
2950 DHD_EVENT(("SOCRAM_IND_HEALTHCHECK_TAG:%d Len:%d datalen:%d\n",
2951 ltoh32(dngl_hc->top_module_tag),
2952 ltoh32(dngl_hc->top_module_len),
2953 datalen));
2954 if (DHD_EVENT_ON()) {
2955 prhex("HEALTHCHECK", p, MIN(ltoh32(dngl_hc->top_module_len)
2956 + BCM_XTLV_HDR_SIZE, datalen));
2957 }
2958 #ifdef DHD_LOG_DUMP
2959 memset(dhdp->health_chk_event_data, 0, HEALTH_CHK_BUF_SIZE);
2960 memcpy(dhdp->health_chk_event_data, p,
2961 MIN(ltoh32(dngl_hc->top_module_len),
2962 HEALTH_CHK_BUF_SIZE));
2963 #endif /* DHD_LOG_DUMP */
2964 p = (uint8 *)dngl_hc->value;
2965
2966 switch (ltoh32(dngl_hc->top_module_tag)) {
2967 case HEALTH_CHECK_TOP_LEVEL_MODULE_PCIEDEV_RTE:
2968 {
2969 bcm_dngl_pcie_hc_t *pcie_hc;
2970 pcie_hc = (bcm_dngl_pcie_hc_t *)p;
2971 BCM_REFERENCE(pcie_hc);
2972 if (ltoh32(dngl_hc->top_module_len) <
2973 sizeof(bcm_dngl_pcie_hc_t)) {
2974 DHD_ERROR(("Wrong length:%d\n",
2975 ltoh32(dngl_hc->top_module_len)));
2976 return;
2977 }
2978 DHD_EVENT(("%d:PCIE HC error:%d flag:0x%x,"
2979 " control:0x%x\n",
2980 ltoh32(pcie_hc->version),
2981 ltoh32(pcie_hc->pcie_err_ind_type),
2982 ltoh32(pcie_hc->pcie_flag),
2983 ltoh32(pcie_hc->pcie_control_reg)));
2984 break;
2985 }
2986 #ifdef HCHK_COMMON_SW_EVENT
2987 case HCHK_SW_ENTITY_WL_PRIMARY:
2988 case HCHK_SW_ENTITY_WL_SECONDARY:
2989 {
2990 bcm_xtlv_t *wl_hc = (bcm_xtlv_t*)p;
2991
2992 if (ltoh32(dngl_hc->top_module_len) <
2993 sizeof(bcm_xtlv_t)) {
2994 DHD_ERROR(("WL SW HC Wrong length:%d\n",
2995 ltoh32(dngl_hc->top_module_len)));
2996 return;
2997 }
2998 BCM_REFERENCE(wl_hc);
2999 DHD_EVENT(("WL SW HC type %d len %d",
3000 ltoh16(wl_hc->id), ltoh16(wl_hc->len)));
3001 break;
3002 }
3003 #endif /* HCHK_COMMON_SW_EVENT */
3004 default:
3005 {
3006 DHD_ERROR(("%s:Unknown module TAG:%d\n",
3007 __FUNCTION__,
3008 ltoh32(dngl_hc->top_module_tag)));
3009 break;
3010 }
3011 }
3012 break;
3013 }
3014 default:
3015 DHD_ERROR(("%s:Unknown TAG", __FUNCTION__));
3016 if (p && DHD_EVENT_ON()) {
3017 prhex("SOCRAMIND", p, taglen);
3018 }
3019 break;
3020 }
3021 break;
3022 }
3023 default:
3024 DHD_ERROR(("%s:Unknown DNGL Event Type:%d", __FUNCTION__, type));
3025 if (p && DHD_EVENT_ON()) {
3026 prhex("SOCRAMIND", p, datalen);
3027 }
3028 break;
3029 }
3030 #ifdef DHD_FW_COREDUMP
3031 if (dhdp->memdump_enabled) {
3032 dhdp->memdump_type = DUMP_TYPE_DONGLE_HOST_EVENT;
3033 if (dhd_socram_dump(dhdp->bus)) {
3034 DHD_ERROR(("%s: socram dump failed\n", __FUNCTION__));
3035 }
3036 }
3037 #else
3038 dhd_dbg_send_urgent_evt(dhdp, p, datalen);
3039 #endif /* DHD_FW_COREDUMP */
3040 }
3041
3042 #endif /* DNGL_EVENT_SUPPORT */
3043
3044 /* Stub for now. Will become real function as soon as shim
3045 * is being integrated to Android, Linux etc.
3046 */
3047 int
3048 wl_event_process_default(wl_event_msg_t *event, struct wl_evt_pport *evt_pport)
3049 {
3050 return BCME_OK;
3051 }
3052
3053 int
3054 wl_event_process(dhd_pub_t *dhd_pub, int *ifidx, void *pktdata,
3055 uint pktlen, void **data_ptr, void *raw_event)
3056 {
3057 wl_evt_pport_t evt_pport;
3058 wl_event_msg_t event;
3059 bcm_event_msg_u_t evu;
3060 int ret;
3061
3062 /* make sure it is a BRCM event pkt and record event data */
3063 ret = wl_host_event_get_data(pktdata, pktlen, &evu);
3064 if (ret != BCME_OK) {
3065 return ret;
3066 }
3067
3068 memcpy(&event, &evu.event, sizeof(wl_event_msg_t));
3069
3070 /* convert event from network order to host order */
3071 wl_event_to_host_order(&event);
3072
3073 /* record event params to evt_pport */
3074 evt_pport.dhd_pub = dhd_pub;
3075 evt_pport.ifidx = ifidx;
3076 evt_pport.pktdata = pktdata;
3077 evt_pport.data_ptr = data_ptr;
3078 evt_pport.raw_event = raw_event;
3079 evt_pport.data_len = pktlen;
3080
3081 ret = wl_event_process_default(&event, &evt_pport);
3082
3083 return ret;
3084 } /* wl_event_process */
3085
3086 /* Check whether packet is a BRCM event pkt. If it is, record event data. */
3087 int
3088 wl_host_event_get_data(void *pktdata, uint pktlen, bcm_event_msg_u_t *evu)
3089 {
3090 int ret;
3091
3092 ret = is_wlc_event_frame(pktdata, pktlen, 0, evu);
3093 if (ret != BCME_OK) {
3094 DHD_ERROR(("%s: Invalid event frame, err = %d\n",
3095 __FUNCTION__, ret));
3096 }
3097
3098 return ret;
3099 }
3100
3101 int
3102 wl_process_host_event(dhd_pub_t *dhd_pub, int *ifidx, void *pktdata, uint pktlen,
3103 wl_event_msg_t *event, void **data_ptr, void *raw_event)
3104 {
3105 bcm_event_t *pvt_data = (bcm_event_t *)pktdata;
3106 bcm_event_msg_u_t evu;
3107 uint8 *event_data;
3108 uint32 type, status, datalen, reason;
3109 uint16 flags;
3110 uint evlen;
3111 int ret;
3112 uint16 usr_subtype;
3113
3114 ret = wl_host_event_get_data(pktdata, pktlen, &evu);
3115 if (ret != BCME_OK) {
3116 return ret;
3117 }
3118
3119 usr_subtype = ntoh16_ua((void *)&pvt_data->bcm_hdr.usr_subtype);
3120 switch (usr_subtype) {
3121 case BCMILCP_BCM_SUBTYPE_EVENT:
3122 memcpy(event, &evu.event, sizeof(wl_event_msg_t));
3123 *data_ptr = &pvt_data[1];
3124 break;
3125 case BCMILCP_BCM_SUBTYPE_DNGLEVENT:
3126 #ifdef DNGL_EVENT_SUPPORT
3127 /* If it is a DNGL event process it first */
3128 if (dngl_host_event(dhd_pub, pktdata, &evu.dngl_event, pktlen) == BCME_OK) {
3129 /*
3130 * Return error purposely to prevent DNGL event being processed
3131 * as BRCM event
3132 */
3133 return BCME_ERROR;
3134 }
3135 #endif /* DNGL_EVENT_SUPPORT */
3136 return BCME_NOTFOUND;
3137 default:
3138 return BCME_NOTFOUND;
3139 }
3140
3141 /* start wl_event_msg process */
3142 event_data = *data_ptr;
3143 type = ntoh32_ua((void *)&event->event_type);
3144 flags = ntoh16_ua((void *)&event->flags);
3145 status = ntoh32_ua((void *)&event->status);
3146 reason = ntoh32_ua((void *)&event->reason);
3147 datalen = ntoh32_ua((void *)&event->datalen);
3148 evlen = datalen + sizeof(bcm_event_t);
3149
3150 switch (type) {
3151 #ifdef PROP_TXSTATUS
3152 case WLC_E_FIFO_CREDIT_MAP:
3153 dhd_wlfc_enable(dhd_pub);
3154 dhd_wlfc_FIFOcreditmap_event(dhd_pub, event_data);
3155 WLFC_DBGMESG(("WLC_E_FIFO_CREDIT_MAP:(AC0,AC1,AC2,AC3),(BC_MC),(OTHER): "
3156 "(%d,%d,%d,%d),(%d),(%d)\n", event_data[0], event_data[1],
3157 event_data[2],
3158 event_data[3], event_data[4], event_data[5]));
3159 break;
3160
3161 case WLC_E_BCMC_CREDIT_SUPPORT:
3162 dhd_wlfc_BCMCCredit_support_event(dhd_pub);
3163 break;
3164 #ifdef LIMIT_BORROW
3165 case WLC_E_ALLOW_CREDIT_BORROW:
3166 dhd_wlfc_disable_credit_borrow_event(dhd_pub, event_data);
3167 break;
3168 #endif /* LIMIT_BORROW */
3169 #endif /* PROP_TXSTATUS */
3170
3171 case WLC_E_ULP:
3172 #ifdef DHD_ULP
3173 {
3174 wl_ulp_event_t *ulp_evt = (wl_ulp_event_t *)event_data;
3175
3176 /* Flush and disable console messages */
3177 if (ulp_evt->ulp_dongle_action == WL_ULP_DISABLE_CONSOLE) {
3178 #ifdef DHD_ULP_NOT_USED
3179 dhd_bus_ulp_disable_console(dhd_pub);
3180 #endif /* DHD_ULP_NOT_USED */
3181 }
3182 if (ulp_evt->ulp_dongle_action == WL_ULP_UCODE_DOWNLOAD) {
3183 dhd_bus_ucode_download(dhd_pub->bus);
3184 }
3185 }
3186 #endif /* DHD_ULP */
3187 break;
3188 case WLC_E_TDLS_PEER_EVENT:
3189 #if defined(WLTDLS) && defined(PCIE_FULL_DONGLE)
3190 {
3191 dhd_tdls_event_handler(dhd_pub, event);
3192 }
3193 #endif // endif
3194 break;
3195
3196 case WLC_E_IF:
3197 {
3198 struct wl_event_data_if *ifevent = (struct wl_event_data_if *)event_data;
3199
3200 /* Ignore the event if NOIF is set */
3201 if (ifevent->reserved & WLC_E_IF_FLAGS_BSSCFG_NOIF) {
3202 DHD_ERROR(("WLC_E_IF: NO_IF set, event Ignored\r\n"));
3203 return (BCME_UNSUPPORTED);
3204 }
3205 #ifdef PCIE_FULL_DONGLE
3206 dhd_update_interface_flow_info(dhd_pub, ifevent->ifidx,
3207 ifevent->opcode, ifevent->role);
3208 #endif // endif
3209 #ifdef PROP_TXSTATUS
3210 {
3211 uint8* ea = pvt_data->eth.ether_dhost;
3212 WLFC_DBGMESG(("WLC_E_IF: idx:%d, action:%s, iftype:%s, ["MACDBG"]\n"
3213 ifevent->ifidx,
3214 ((ifevent->opcode == WLC_E_IF_ADD) ? "ADD":"DEL"),
3215 ((ifevent->role == 0) ? "STA":"AP "),
3216 MAC2STRDBG(ea)));
3217 (void)ea;
3218
3219 if (ifevent->opcode == WLC_E_IF_CHANGE)
3220 dhd_wlfc_interface_event(dhd_pub,
3221 eWLFC_MAC_ENTRY_ACTION_UPDATE,
3222 ifevent->ifidx, ifevent->role, ea);
3223 else
3224 dhd_wlfc_interface_event(dhd_pub,
3225 ((ifevent->opcode == WLC_E_IF_ADD) ?
3226 eWLFC_MAC_ENTRY_ACTION_ADD : eWLFC_MAC_ENTRY_ACTION_DEL),
3227 ifevent->ifidx, ifevent->role, ea);
3228
3229 /* dhd already has created an interface by default, for 0 */
3230 if (ifevent->ifidx == 0)
3231 break;
3232 }
3233 #endif /* PROP_TXSTATUS */
3234
3235 if (ifevent->ifidx > 0 && ifevent->ifidx < DHD_MAX_IFS) {
3236 if (ifevent->opcode == WLC_E_IF_ADD) {
3237 if (dhd_event_ifadd(dhd_pub->info, ifevent, event->ifname,
3238 event->addr.octet)) {
3239
3240 DHD_ERROR(("%s: dhd_event_ifadd failed ifidx: %d %s\n",
3241 __FUNCTION__, ifevent->ifidx, event->ifname));
3242 return (BCME_ERROR);
3243 }
3244 } else if (ifevent->opcode == WLC_E_IF_DEL) {
3245 #ifdef PCIE_FULL_DONGLE
3246 /* Delete flowrings unconditionally for i/f delete */
3247 dhd_flow_rings_delete(dhd_pub, (uint8)dhd_ifname2idx(dhd_pub->info,
3248 event->ifname));
3249 #endif /* PCIE_FULL_DONGLE */
3250 dhd_event_ifdel(dhd_pub->info, ifevent, event->ifname,
3251 event->addr.octet);
3252 } else if (ifevent->opcode == WLC_E_IF_CHANGE) {
3253 #ifdef WL_CFG80211
3254 dhd_event_ifchange(dhd_pub->info, ifevent, event->ifname,
3255 event->addr.octet);
3256 #endif /* WL_CFG80211 */
3257 }
3258 } else {
3259 #if !defined(PROP_TXSTATUS) && !defined(PCIE_FULL_DONGLE) && defined(WL_CFG80211)
3260 DHD_INFO(("%s: Invalid ifidx %d for %s\n",
3261 __FUNCTION__, ifevent->ifidx, event->ifname));
3262 #endif /* !PROP_TXSTATUS && !PCIE_FULL_DONGLE && WL_CFG80211 */
3263 }
3264 /* send up the if event: btamp user needs it */
3265 *ifidx = dhd_ifname2idx(dhd_pub->info, event->ifname);
3266 /* push up to external supp/auth */
3267 dhd_event(dhd_pub->info, (char *)pvt_data, evlen, *ifidx);
3268 break;
3269 }
3270
3271 case WLC_E_NDIS_LINK:
3272 break;
3273 case WLC_E_PFN_NET_FOUND:
3274 case WLC_E_PFN_SCAN_ALLGONE: /* share with WLC_E_PFN_BSSID_NET_LOST */
3275 case WLC_E_PFN_NET_LOST:
3276 break;
3277 #if defined(PNO_SUPPORT)
3278 case WLC_E_PFN_BSSID_NET_FOUND:
3279 case WLC_E_PFN_BEST_BATCHING:
3280 dhd_pno_event_handler(dhd_pub, event, (void *)event_data);
3281 break;
3282 #endif // endif
3283 #if defined(RTT_SUPPORT)
3284 case WLC_E_PROXD:
3285 dhd_rtt_event_handler(dhd_pub, event, (void *)event_data);
3286 break;
3287 #endif /* RTT_SUPPORT */
3288 /* These are what external supplicant/authenticator wants */
3289 case WLC_E_ASSOC_IND:
3290 case WLC_E_AUTH_IND:
3291 case WLC_E_REASSOC_IND:
3292 dhd_findadd_sta(dhd_pub,
3293 dhd_ifname2idx(dhd_pub->info, event->ifname),
3294 &event->addr.octet);
3295 break;
3296 #if defined(DHD_FW_COREDUMP)
3297 case WLC_E_PSM_WATCHDOG:
3298 DHD_ERROR(("%s: WLC_E_PSM_WATCHDOG event received : \n", __FUNCTION__));
3299 if (dhd_socram_dump(dhd_pub->bus) != BCME_OK) {
3300 DHD_ERROR(("%s: socram dump ERROR : \n", __FUNCTION__));
3301 }
3302 break;
3303 #endif // endif
3304 case WLC_E_NATOE_NFCT:
3305 #ifdef WL_NATOE
3306 DHD_EVENT(("%s: WLC_E_NATOE_NFCT event received \n", __FUNCTION__));
3307 dhd_natoe_ct_event(dhd_pub, event_data);
3308 #endif /* WL_NATOE */
3309 break;
3310 #ifdef WL_NAN
3311 case WLC_E_SLOTTED_BSS_PEER_OP:
3312 DHD_EVENT(("%s: WLC_E_SLOTTED_BSS_PEER_OP event received for peer: "
3313 "" MACDBG ", status = %d\n",
3314 __FUNCTION__, MAC2STRDBG(event->addr.octet), status));
3315 if (status == WLC_E_STATUS_SLOTTED_PEER_ADD) {
3316 dhd_findadd_sta(dhd_pub, dhd_ifname2idx(dhd_pub->info,
3317 event->ifname), &event->addr.octet);
3318 } else if (status == WLC_E_STATUS_SLOTTED_PEER_DEL) {
3319 uint8 ifindex = (uint8)dhd_ifname2idx(dhd_pub->info, event->ifname);
3320 BCM_REFERENCE(ifindex);
3321 dhd_del_sta(dhd_pub, dhd_ifname2idx(dhd_pub->info,
3322 event->ifname), &event->addr.octet);
3323 #ifdef PCIE_FULL_DONGLE
3324 dhd_flow_rings_delete_for_peer(dhd_pub, ifindex,
3325 (char *)&event->addr.octet[0]);
3326 #endif // endif
3327 } else {
3328 DHD_ERROR(("%s: WLC_E_SLOTTED_BSS_PEER_OP: Status is not expected = %d\n",
3329 __FUNCTION__, status));
3330 }
3331 break;
3332 #endif /* WL_NAN */
3333 case WLC_E_LINK:
3334 #ifdef PCIE_FULL_DONGLE
3335 if (dhd_update_interface_link_status(dhd_pub, (uint8)dhd_ifname2idx(dhd_pub->info,
3336 event->ifname), (uint8)flags) != BCME_OK) {
3337 DHD_ERROR(("%s: dhd_update_interface_link_status Failed.\n",
3338 __FUNCTION__));
3339 break;
3340 }
3341 if (!flags) {
3342 DHD_ERROR(("%s: Deleting all STA from assoc list and flowrings.\n",
3343 __FUNCTION__));
3344 /* Delete all sta and flowrings */
3345 dhd_del_all_sta(dhd_pub, dhd_ifname2idx(dhd_pub->info, event->ifname));
3346 dhd_flow_rings_delete(dhd_pub, (uint8)dhd_ifname2idx(dhd_pub->info,
3347 event->ifname));
3348 }
3349 /* fall through */
3350 #endif /* PCIE_FULL_DONGLE */
3351 case WLC_E_DEAUTH:
3352 case WLC_E_DEAUTH_IND:
3353 case WLC_E_DISASSOC:
3354 case WLC_E_DISASSOC_IND:
3355 #ifdef PCIE_FULL_DONGLE
3356 if (type != WLC_E_LINK) {
3357 uint8 ifindex = (uint8)dhd_ifname2idx(dhd_pub->info, event->ifname);
3358 uint8 role = dhd_flow_rings_ifindex2role(dhd_pub, ifindex);
3359 uint8 del_sta = TRUE;
3360 #ifdef WL_CFG80211
3361 if (role == WLC_E_IF_ROLE_STA &&
3362 !wl_cfg80211_is_roam_offload(dhd_idx2net(dhd_pub, ifindex)) &&
3363 !wl_cfg80211_is_event_from_connected_bssid(
3364 dhd_idx2net(dhd_pub, ifindex), event, *ifidx)) {
3365 del_sta = FALSE;
3366 }
3367 #endif /* WL_CFG80211 */
3368 DHD_EVENT(("%s: Link event %d, flags %x, status %x, role %d, del_sta %d\n",
3369 __FUNCTION__, type, flags, status, role, del_sta));
3370
3371 if (del_sta) {
3372 DHD_EVENT(("%s: Deleting STA " MACDBG "\n",
3373 __FUNCTION__, MAC2STRDBG(event->addr.octet)));
3374
3375 dhd_del_sta(dhd_pub, dhd_ifname2idx(dhd_pub->info,
3376 event->ifname), &event->addr.octet);
3377 /* Delete all flowrings for STA and P2P Client */
3378 if (role == WLC_E_IF_ROLE_STA || role == WLC_E_IF_ROLE_P2P_CLIENT) {
3379 dhd_flow_rings_delete(dhd_pub, ifindex);
3380 } else {
3381 dhd_flow_rings_delete_for_peer(dhd_pub, ifindex,
3382 (char *)&event->addr.octet[0]);
3383 }
3384 }
3385 }
3386 #endif /* PCIE_FULL_DONGLE */
3387 /* fall through */
3388
3389 default:
3390 *ifidx = dhd_ifname2idx(dhd_pub->info, event->ifname);
3391 /* push up to external supp/auth */
3392 dhd_event(dhd_pub->info, (char *)pvt_data, evlen, *ifidx);
3393 DHD_TRACE(("%s: MAC event %d, flags %x, status %x\n",
3394 __FUNCTION__, type, flags, status));
3395 BCM_REFERENCE(flags);
3396 BCM_REFERENCE(status);
3397 BCM_REFERENCE(reason);
3398
3399 break;
3400 }
3401 #if defined(STBAP)
3402 /* For routers, EAPD will be working on these events.
3403 * Overwrite interface name to that event is pushed
3404 * to host with its registered interface name
3405 */
3406 memcpy(pvt_data->event.ifname, dhd_ifname(dhd_pub, *ifidx), IFNAMSIZ);
3407 #endif // endif
3408
3409 #ifdef SHOW_EVENTS
3410 if (DHD_FWLOG_ON() || DHD_EVENT_ON()) {
3411 wl_show_host_event(dhd_pub, event,
3412 (void *)event_data, raw_event, dhd_pub->enable_log);
3413 }
3414 #endif /* SHOW_EVENTS */
3415
3416 return (BCME_OK);
3417 } /* wl_process_host_event */
3418
3419 int
3420 wl_host_event(dhd_pub_t *dhd_pub, int *ifidx, void *pktdata, uint pktlen,
3421 wl_event_msg_t *event, void **data_ptr, void *raw_event)
3422 {
3423 return wl_process_host_event(dhd_pub, ifidx, pktdata, pktlen, event, data_ptr,
3424 raw_event);
3425 }
3426
3427 void
3428 dhd_print_buf(void *pbuf, int len, int bytes_per_line)
3429 {
3430 #ifdef DHD_DEBUG
3431 int i, j = 0;
3432 unsigned char *buf = pbuf;
3433
3434 if (bytes_per_line == 0) {
3435 bytes_per_line = len;
3436 }
3437
3438 for (i = 0; i < len; i++) {
3439 printf("%2.2x", *buf++);
3440 j++;
3441 if (j == bytes_per_line) {
3442 printf("\n");
3443 j = 0;
3444 } else {
3445 printf(":");
3446 }
3447 }
3448 printf("\n");
3449 #endif /* DHD_DEBUG */
3450 }
3451 #ifndef strtoul
3452 #define strtoul(nptr, endptr, base) bcm_strtoul((nptr), (endptr), (base))
3453 #endif // endif
3454
3455 #if defined(PKT_FILTER_SUPPORT) || defined(DHD_PKT_LOGGING)
3456 /* Convert user's input in hex pattern to byte-size mask */
3457 int
3458 wl_pattern_atoh(char *src, char *dst)
3459 {
3460 int i;
3461 if (strncmp(src, "0x", 2) != 0 &&
3462 strncmp(src, "0X", 2) != 0) {
3463 DHD_ERROR(("Mask invalid format. Needs to start with 0x\n"));
3464 return -1;
3465 }
3466 src = src + 2; /* Skip past 0x */
3467 if (strlen(src) % 2 != 0) {
3468 DHD_ERROR(("Mask invalid format. Needs to be of even length\n"));
3469 return -1;
3470 }
3471 for (i = 0; *src != '\0'; i++) {
3472 char num[3];
3473 bcm_strncpy_s(num, sizeof(num), src, 2);
3474 num[2] = '\0';
3475 dst[i] = (uint8)strtoul(num, NULL, 16);
3476 src += 2;
3477 }
3478 return i;
3479 }
3480
3481 int
3482 pattern_atoh_len(char *src, char *dst, int len)
3483 {
3484 int i;
3485 if (strncmp(src, "0x", HD_PREFIX_SIZE) != 0 &&
3486 strncmp(src, "0X", HD_PREFIX_SIZE) != 0) {
3487 DHD_ERROR(("Mask invalid format. Needs to start with 0x\n"));
3488 return -1;
3489 }
3490 src = src + HD_PREFIX_SIZE; /* Skip past 0x */
3491 if (strlen(src) % HD_BYTE_SIZE != 0) {
3492 DHD_ERROR(("Mask invalid format. Needs to be of even length\n"));
3493 return -1;
3494 }
3495 for (i = 0; *src != '\0'; i++) {
3496 char num[HD_BYTE_SIZE + 1];
3497
3498 if (i > len - 1) {
3499 DHD_ERROR(("pattern not in range, idx: %d len: %d\n", i, len));
3500 return -1;
3501 }
3502 bcm_strncpy_s(num, sizeof(num), src, HD_BYTE_SIZE);
3503 num[HD_BYTE_SIZE] = '\0';
3504 dst[i] = (uint8)strtoul(num, NULL, 16);
3505 src += HD_BYTE_SIZE;
3506 }
3507 return i;
3508 }
3509 #endif /* PKT_FILTER_SUPPORT || DHD_PKT_LOGGING */
3510
3511 #ifdef PKT_FILTER_SUPPORT
3512 void
3513 dhd_pktfilter_offload_enable(dhd_pub_t * dhd, char *arg, int enable, int master_mode)
3514 {
3515 char *argv[8];
3516 int i = 0;
3517 const char *str;
3518 int buf_len;
3519 int str_len;
3520 char *arg_save = 0, *arg_org = 0;
3521 int rc;
3522 char buf[32] = {0};
3523 wl_pkt_filter_enable_t enable_parm;
3524 wl_pkt_filter_enable_t * pkt_filterp;
3525
3526 if (!arg)
3527 return;
3528
3529 if (!(arg_save = MALLOC(dhd->osh, strlen(arg) + 1))) {
3530 DHD_ERROR(("%s: malloc failed\n", __FUNCTION__));
3531 goto fail;
3532 }
3533 arg_org = arg_save;
3534 memcpy(arg_save, arg, strlen(arg) + 1);
3535
3536 argv[i] = bcmstrtok(&arg_save, " ", 0);
3537
3538 i = 0;
3539 if (argv[i] == NULL) {
3540 DHD_ERROR(("No args provided\n"));
3541 goto fail;
3542 }
3543
3544 str = "pkt_filter_enable";
3545 str_len = strlen(str);
3546 bcm_strncpy_s(buf, sizeof(buf) - 1, str, sizeof(buf) - 1);
3547 buf[ sizeof(buf) - 1 ] = '\0';
3548 buf_len = str_len + 1;
3549
3550 pkt_filterp = (wl_pkt_filter_enable_t *)(buf + str_len + 1);
3551
3552 /* Parse packet filter id. */
3553 enable_parm.id = htod32(strtoul(argv[i], NULL, 0));
3554
3555 /* Parse enable/disable value. */
3556 enable_parm.enable = htod32(enable);
3557
3558 buf_len += sizeof(enable_parm);
3559 memcpy((char *)pkt_filterp,
3560 &enable_parm,
3561 sizeof(enable_parm));
3562
3563 /* Enable/disable the specified filter. */
3564 rc = dhd_wl_ioctl_cmd(dhd, WLC_SET_VAR, buf, buf_len, TRUE, 0);
3565 rc = rc >= 0 ? 0 : rc;
3566 if (rc) {
3567 DHD_TRACE(("%s: failed to add pktfilter %s, retcode = %d\n",
3568 __FUNCTION__, arg, rc));
3569 dhd_set_packet_filter(dhd);
3570 rc = dhd_wl_ioctl_cmd(dhd, WLC_SET_VAR, buf, buf_len, TRUE, 0);
3571 rc = rc >= 0 ? 0 : rc;
3572 if (rc) {
3573 DHD_TRACE_HW4(("%s: 2nd retry failed to add pktfilter %s, retcode = %d\n",
3574 __FUNCTION__, arg, rc));
3575 } else {
3576 DHD_TRACE_HW4(("%s: 2nd retry successfully added pktfilter %s\n",
3577 __FUNCTION__, arg));
3578 }
3579 }
3580 else
3581 DHD_TRACE(("%s: successfully added pktfilter %s\n",
3582 __FUNCTION__, arg));
3583
3584 /* Contorl the master mode */
3585 rc = dhd_wl_ioctl_set_intiovar(dhd, "pkt_filter_mode",
3586 master_mode, WLC_SET_VAR, TRUE, 0);
3587 rc = rc >= 0 ? 0 : rc;
3588 if (rc)
3589 DHD_TRACE(("%s: failed to add pktfilter %s, retcode = %d\n",
3590 __FUNCTION__, arg, rc));
3591
3592 fail:
3593 if (arg_org)
3594 MFREE(dhd->osh, arg_org, strlen(arg) + 1);
3595 }
3596
3597 /* Packet filter section: extended filters have named offsets, add table here */
3598 typedef struct {
3599 char *name;
3600 uint16 base;
3601 } wl_pfbase_t;
3602
3603 static wl_pfbase_t basenames[] = { WL_PKT_FILTER_BASE_NAMES };
3604
3605 static int
3606 wl_pkt_filter_base_parse(char *name)
3607 {
3608 uint i;
3609 char *bname, *uname;
3610
3611 for (i = 0; i < ARRAYSIZE(basenames); i++) {
3612 bname = basenames[i].name;
3613 for (uname = name; *uname; bname++, uname++) {
3614 if (*bname != bcm_toupper(*uname)) {
3615 break;
3616 }
3617 }
3618 if (!*uname && !*bname) {
3619 break;
3620 }
3621 }
3622
3623 if (i < ARRAYSIZE(basenames)) {
3624 return basenames[i].base;
3625 } else {
3626 return -1;
3627 }
3628 }
3629
3630 void
3631 dhd_pktfilter_offload_set(dhd_pub_t * dhd, char *arg)
3632 {
3633 const char *str;
3634 wl_pkt_filter_t pkt_filter;
3635 wl_pkt_filter_t *pkt_filterp;
3636 int buf_len;
3637 int str_len;
3638 int rc;
3639 uint32 mask_size;
3640 uint32 pattern_size;
3641 char *argv[16], * buf = 0;
3642 int i = 0;
3643 char *arg_save = 0, *arg_org = 0;
3644
3645 if (!arg)
3646 return;
3647
3648 if (!(arg_save = MALLOC(dhd->osh, strlen(arg) + 1))) {
3649 DHD_ERROR(("%s: malloc failed\n", __FUNCTION__));
3650 goto fail;
3651 }
3652
3653 arg_org = arg_save;
3654
3655 if (!(buf = MALLOC(dhd->osh, MAX_PKTFLT_BUF_SIZE))) {
3656 DHD_ERROR(("%s: malloc failed\n", __FUNCTION__));
3657 goto fail;
3658 }
3659
3660 memset(buf, 0, MAX_PKTFLT_BUF_SIZE);
3661 memcpy(arg_save, arg, strlen(arg) + 1);
3662
3663 if (strlen(arg) > MAX_PKTFLT_BUF_SIZE) {
3664 DHD_ERROR(("Not enough buffer %d < %d\n", (int)strlen(arg), (int)sizeof(buf)));
3665 goto fail;
3666 }
3667
3668 argv[i] = bcmstrtok(&arg_save, " ", 0);
3669 while (argv[i++])
3670 argv[i] = bcmstrtok(&arg_save, " ", 0);
3671
3672 i = 0;
3673 if (argv[i] == NULL) {
3674 DHD_ERROR(("No args provided\n"));
3675 goto fail;
3676 }
3677
3678 str = "pkt_filter_add";
3679 str_len = strlen(str);
3680 bcm_strncpy_s(buf, MAX_PKTFLT_BUF_SIZE, str, str_len);
3681 buf[ str_len ] = '\0';
3682 buf_len = str_len + 1;
3683
3684 pkt_filterp = (wl_pkt_filter_t *) (buf + str_len + 1);
3685
3686 /* Parse packet filter id. */
3687 pkt_filter.id = htod32(strtoul(argv[i], NULL, 0));
3688
3689 if (argv[++i] == NULL) {
3690 DHD_ERROR(("Polarity not provided\n"));
3691 goto fail;
3692 }
3693
3694 /* Parse filter polarity. */
3695 pkt_filter.negate_match = htod32(strtoul(argv[i], NULL, 0));
3696
3697 if (argv[++i] == NULL) {
3698 DHD_ERROR(("Filter type not provided\n"));
3699 goto fail;
3700 }
3701
3702 /* Parse filter type. */
3703 pkt_filter.type = htod32(strtoul(argv[i], NULL, 0));
3704
3705 if ((pkt_filter.type == 0) || (pkt_filter.type == 1)) {
3706 if (argv[++i] == NULL) {
3707 DHD_ERROR(("Offset not provided\n"));
3708 goto fail;
3709 }
3710
3711 /* Parse pattern filter offset. */
3712 pkt_filter.u.pattern.offset = htod32(strtoul(argv[i], NULL, 0));
3713
3714 if (argv[++i] == NULL) {
3715 DHD_ERROR(("Bitmask not provided\n"));
3716 goto fail;
3717 }
3718
3719 /* Parse pattern filter mask. */
3720 rc = wl_pattern_atoh(argv[i],
3721 (char *) pkt_filterp->u.pattern.mask_and_pattern);
3722
3723 if (rc == -1) {
3724 DHD_ERROR(("Rejecting: %s\n", argv[i]));
3725 goto fail;
3726 }
3727 mask_size = htod32(rc);
3728 if (argv[++i] == NULL) {
3729 DHD_ERROR(("Pattern not provided\n"));
3730 goto fail;
3731 }
3732
3733 /* Parse pattern filter pattern. */
3734 rc = wl_pattern_atoh(argv[i],
3735 (char *) &pkt_filterp->u.pattern.mask_and_pattern[mask_size]);
3736
3737 if (rc == -1) {
3738 DHD_ERROR(("Rejecting: %s\n", argv[i]));
3739 goto fail;
3740 }
3741 pattern_size = htod32(rc);
3742 if (mask_size != pattern_size) {
3743 DHD_ERROR(("Mask and pattern not the same size\n"));
3744 goto fail;
3745 }
3746
3747 pkt_filter.u.pattern.size_bytes = mask_size;
3748 buf_len += WL_PKT_FILTER_FIXED_LEN;
3749 buf_len += (WL_PKT_FILTER_PATTERN_FIXED_LEN + 2 * mask_size);
3750
3751 /* Keep-alive attributes are set in local variable (keep_alive_pkt), and
3752 * then memcpy'ed into buffer (keep_alive_pktp) since there is no
3753 * guarantee that the buffer is properly aligned.
3754 */
3755 memcpy((char *)pkt_filterp,
3756 &pkt_filter,
3757 WL_PKT_FILTER_FIXED_LEN + WL_PKT_FILTER_PATTERN_FIXED_LEN);
3758 } else if ((pkt_filter.type == 2) || (pkt_filter.type == 6)) {
3759 int list_cnt = 0;
3760 char *endptr = '\0';
3761 wl_pkt_filter_pattern_listel_t *pf_el =
3762 (wl_pkt_filter_pattern_listel_t *)&pkt_filterp->u.patlist.patterns[0];
3763
3764 while (argv[++i] != NULL) {
3765 /* Check valid buffer size. */
3766 if ((buf_len + MAX_PKTFLT_FIXED_BUF_SIZE) > MAX_PKTFLT_BUF_SIZE) {
3767 DHD_ERROR(("buffer over length MAX_PKTFLT_FIXED_BUF_SIZE\n"));
3768 goto fail;
3769 }
3770
3771 /* Parse pattern filter base and offset. */
3772 if (bcm_isdigit(*argv[i])) {
3773 /* Numeric base */
3774 rc = strtoul(argv[i], &endptr, 0);
3775 } else {
3776 endptr = strchr(argv[i], ':');
3777 if (endptr) {
3778 *endptr = '\0';
3779 rc = wl_pkt_filter_base_parse(argv[i]);
3780 if (rc == -1) {
3781 printf("Invalid base %s\n", argv[i]);
3782 goto fail;
3783 }
3784 *endptr = ':';
3785 } else {
3786 printf("Invalid [base:]offset format: %s\n", argv[i]);
3787 goto fail;
3788 }
3789 }
3790
3791 if (*endptr == ':') {
3792 pf_el->base_offs = htod16(rc);
3793 rc = strtoul(endptr + 1, &endptr, 0);
3794 } else {
3795 /* Must have had a numeric offset only */
3796 pf_el->base_offs = htod16(0);
3797 }
3798
3799 if (*endptr) {
3800 printf("Invalid [base:]offset format: %s\n", argv[i]);
3801 goto fail;
3802 }
3803 if (rc > 0x0000FFFF) {
3804 printf("Offset too large\n");
3805 goto fail;
3806 }
3807 pf_el->rel_offs = htod16(rc);
3808
3809 /* Clear match_flag (may be set in parsing which follows) */
3810 pf_el->match_flags = htod16(0);
3811
3812 /* Parse pattern filter mask and pattern directly into ioctl buffer */
3813 if (argv[++i] == NULL) {
3814 printf("Bitmask not provided\n");
3815 goto fail;
3816 }
3817 rc = wl_pattern_atoh(argv[i], (char*)pf_el->mask_and_data);
3818 if ((rc == -1) || (rc > MAX_PKTFLT_FIXED_PATTERN_SIZE)) {
3819 printf("Rejecting: %s\n", argv[i]);
3820 goto fail;
3821 }
3822 mask_size = htod16(rc);
3823
3824 if (argv[++i] == NULL) {
3825 printf("Pattern not provided\n");
3826 goto fail;
3827 }
3828
3829 if (*argv[i] == '!') {
3830 pf_el->match_flags =
3831 htod16(WL_PKT_FILTER_MFLAG_NEG);
3832 (argv[i])++;
3833 }
3834 if (argv[i] == '\0') {
3835 printf("Pattern not provided\n");
3836 goto fail;
3837 }
3838 rc = wl_pattern_atoh(argv[i], (char*)&pf_el->mask_and_data[rc]);
3839 if ((rc == -1) || (rc > MAX_PKTFLT_FIXED_PATTERN_SIZE)) {
3840 printf("Rejecting: %s\n", argv[i]);
3841 goto fail;
3842 }
3843 pattern_size = htod16(rc);
3844
3845 if (mask_size != pattern_size) {
3846 printf("Mask and pattern not the same size\n");
3847 goto fail;
3848 }
3849
3850 pf_el->size_bytes = mask_size;
3851
3852 /* Account for the size of this pattern element */
3853 buf_len += WL_PKT_FILTER_PATTERN_LISTEL_FIXED_LEN + 2 * rc;
3854
3855 /* Move to next element location in ioctl buffer */
3856 pf_el = (wl_pkt_filter_pattern_listel_t*)
3857 ((uint8*)pf_el + WL_PKT_FILTER_PATTERN_LISTEL_FIXED_LEN + 2 * rc);
3858
3859 /* Count list element */
3860 list_cnt++;
3861 }
3862
3863 /* Account for initial fixed size, and copy initial fixed fields */
3864 buf_len += WL_PKT_FILTER_FIXED_LEN + WL_PKT_FILTER_PATTERN_LIST_FIXED_LEN;
3865
3866 if (buf_len > MAX_PKTFLT_BUF_SIZE) {
3867 DHD_ERROR(("buffer over length MAX_PKTFLT_BUF_SIZE\n"));
3868 goto fail;
3869 }
3870 /* Update list count and total size */
3871 pkt_filter.u.patlist.list_cnt = list_cnt;
3872 pkt_filter.u.patlist.PAD1[0] = 0;
3873 pkt_filter.u.patlist.totsize = buf + buf_len - (char*)pkt_filterp;
3874 pkt_filter.u.patlist.totsize -= WL_PKT_FILTER_FIXED_LEN;
3875
3876 memcpy((char *)pkt_filterp, &pkt_filter,
3877 WL_PKT_FILTER_FIXED_LEN + WL_PKT_FILTER_PATTERN_LIST_FIXED_LEN);
3878 } else {
3879 DHD_ERROR(("Invalid filter type %d\n", pkt_filter.type));
3880 goto fail;
3881 }
3882
3883 rc = dhd_wl_ioctl_cmd(dhd, WLC_SET_VAR, buf, buf_len, TRUE, 0);
3884 rc = rc >= 0 ? 0 : rc;
3885
3886 if (rc)
3887 DHD_TRACE(("%s: failed to add pktfilter %s, retcode = %d\n",
3888 __FUNCTION__, arg, rc));
3889 else
3890 DHD_TRACE(("%s: successfully added pktfilter %s\n",
3891 __FUNCTION__, arg));
3892
3893 fail:
3894 if (arg_org)
3895 MFREE(dhd->osh, arg_org, strlen(arg) + 1);
3896
3897 if (buf)
3898 MFREE(dhd->osh, buf, MAX_PKTFLT_BUF_SIZE);
3899 }
3900
3901 void
3902 dhd_pktfilter_offload_delete(dhd_pub_t *dhd, int id)
3903 {
3904 int ret;
3905
3906 ret = dhd_wl_ioctl_set_intiovar(dhd, "pkt_filter_delete",
3907 id, WLC_SET_VAR, TRUE, 0);
3908 if (ret < 0) {
3909 DHD_ERROR(("%s: Failed to delete filter ID:%d, ret=%d\n",
3910 __FUNCTION__, id, ret));
3911 }
3912 }
3913 #endif /* PKT_FILTER_SUPPORT */
3914
3915 /* ========================== */
3916 /* ==== ARP OFFLOAD SUPPORT = */
3917 /* ========================== */
3918 #ifdef ARP_OFFLOAD_SUPPORT
3919 void
3920 dhd_arp_offload_set(dhd_pub_t * dhd, int arp_mode)
3921 {
3922 int retcode;
3923
3924 retcode = dhd_wl_ioctl_set_intiovar(dhd, "arp_ol",
3925 arp_mode, WLC_SET_VAR, TRUE, 0);
3926
3927 retcode = retcode >= 0 ? 0 : retcode;
3928 if (retcode)
3929 DHD_TRACE(("%s: failed to set ARP offload mode to 0x%x, retcode = %d\n",
3930 __FUNCTION__, arp_mode, retcode));
3931 else
3932 DHD_TRACE(("%s: successfully set ARP offload mode to 0x%x\n",
3933 __FUNCTION__, arp_mode));
3934 }
3935
3936 void
3937 dhd_arp_offload_enable(dhd_pub_t * dhd, int arp_enable)
3938 {
3939 int retcode;
3940
3941 retcode = dhd_wl_ioctl_set_intiovar(dhd, "arpoe",
3942 arp_enable, WLC_SET_VAR, TRUE, 0);
3943
3944 retcode = retcode >= 0 ? 0 : retcode;
3945 if (retcode)
3946 DHD_TRACE(("%s: failed to enabe ARP offload to %d, retcode = %d\n",
3947 __FUNCTION__, arp_enable, retcode));
3948 else
3949 DHD_TRACE(("%s: successfully enabed ARP offload to %d\n",
3950 __FUNCTION__, arp_enable));
3951 if (arp_enable) {
3952 uint32 version;
3953 retcode = dhd_wl_ioctl_get_intiovar(dhd, "arp_version",
3954 &version, WLC_GET_VAR, FALSE, 0);
3955 if (retcode) {
3956 DHD_INFO(("%s: fail to get version (maybe version 1:retcode = %d\n",
3957 __FUNCTION__, retcode));
3958 dhd->arp_version = 1;
3959 }
3960 else {
3961 DHD_INFO(("%s: ARP Version= %x\n", __FUNCTION__, version));
3962 dhd->arp_version = version;
3963 }
3964 }
3965 }
3966
3967 void
3968 dhd_aoe_arp_clr(dhd_pub_t *dhd, int idx)
3969 {
3970 int ret = 0;
3971
3972 if (dhd == NULL) return;
3973 if (dhd->arp_version == 1)
3974 idx = 0;
3975
3976 ret = dhd_iovar(dhd, idx, "arp_table_clear", NULL, 0, NULL, 0, TRUE);
3977 if (ret < 0)
3978 DHD_ERROR(("%s failed code %d\n", __FUNCTION__, ret));
3979 }
3980
3981 void
3982 dhd_aoe_hostip_clr(dhd_pub_t *dhd, int idx)
3983 {
3984 int ret = 0;
3985
3986 if (dhd == NULL) return;
3987 if (dhd->arp_version == 1)
3988 idx = 0;
3989
3990 ret = dhd_iovar(dhd, idx, "arp_hostip_clear", NULL, 0, NULL, 0, TRUE);
3991 if (ret < 0)
3992 DHD_ERROR(("%s failed code %d\n", __FUNCTION__, ret));
3993 }
3994
3995 void
3996 dhd_arp_offload_add_ip(dhd_pub_t *dhd, uint32 ipaddr, int idx)
3997 {
3998 int ret;
3999
4000 if (dhd == NULL) return;
4001 if (dhd->arp_version == 1)
4002 idx = 0;
4003
4004 ret = dhd_iovar(dhd, idx, "arp_hostip", (char *)&ipaddr, sizeof(ipaddr),
4005 NULL, 0, TRUE);
4006 if (ret)
4007 DHD_TRACE(("%s: ARP ip addr add failed, ret = %d\n", __FUNCTION__, ret));
4008 else
4009 DHD_TRACE(("%s: sARP H ipaddr entry added \n",
4010 __FUNCTION__));
4011 }
4012
4013 int
4014 dhd_arp_get_arp_hostip_table(dhd_pub_t *dhd, void *buf, int buflen, int idx)
4015 {
4016 int ret, i;
4017 uint32 *ptr32 = buf;
4018 bool clr_bottom = FALSE;
4019
4020 if (!buf)
4021 return -1;
4022 if (dhd == NULL) return -1;
4023 if (dhd->arp_version == 1)
4024 idx = 0;
4025
4026 ret = dhd_iovar(dhd, idx, "arp_hostip", NULL, 0, (char *)buf, buflen,
4027 FALSE);
4028 if (ret) {
4029 DHD_TRACE(("%s: ioctl WLC_GET_VAR error %d\n",
4030 __FUNCTION__, ret));
4031
4032 return -1;
4033 }
4034
4035 /* clean up the buf, ascii reminder */
4036 for (i = 0; i < MAX_IPV4_ENTRIES; i++) {
4037 if (!clr_bottom) {
4038 if (*ptr32 == 0)
4039 clr_bottom = TRUE;
4040 } else {
4041 *ptr32 = 0;
4042 }
4043 ptr32++;
4044 }
4045
4046 return 0;
4047 }
4048 #endif /* ARP_OFFLOAD_SUPPORT */
4049
4050 /*
4051 * Neighbor Discovery Offload: enable NDO feature
4052 * Called by ipv6 event handler when interface comes up/goes down
4053 */
4054 int
4055 dhd_ndo_enable(dhd_pub_t * dhd, int ndo_enable)
4056 {
4057 int retcode;
4058
4059 if (dhd == NULL)
4060 return -1;
4061
4062 #if defined(WL_CFG80211) && defined(WL_NAN)
4063 if (wl_cfgnan_is_dp_active(dhd_linux_get_primary_netdev(dhd))) {
4064 /* If nan dp is active, skip NDO */
4065 DHD_INFO(("Active NAN DP, skip NDO\n"));
4066 return 0;
4067 }
4068 #endif /* WL_CFG80211 && WL_NAN */
4069 #ifdef WL_CFG80211
4070 if (dhd->op_mode & DHD_FLAG_HOSTAP_MODE) {
4071 /* NDO disable on STA+SOFTAP mode */
4072 ndo_enable = FALSE;
4073 }
4074 #endif /* WL_CFG80211 */
4075 retcode = dhd_wl_ioctl_set_intiovar(dhd, "ndoe",
4076 ndo_enable, WLC_SET_VAR, TRUE, 0);
4077 if (retcode)
4078 DHD_ERROR(("%s: failed to enabe ndo to %d, retcode = %d\n",
4079 __FUNCTION__, ndo_enable, retcode));
4080 else
4081 DHD_TRACE(("%s: successfully enabed ndo offload to %d\n",
4082 __FUNCTION__, ndo_enable));
4083
4084 return retcode;
4085 }
4086
4087 /*
4088 * Neighbor Discover Offload: enable NDO feature
4089 * Called by ipv6 event handler when interface comes up
4090 */
4091 int
4092 dhd_ndo_add_ip(dhd_pub_t *dhd, char* ipv6addr, int idx)
4093 {
4094 int iov_len = 0;
4095 char iovbuf[DHD_IOVAR_BUF_SIZE];
4096 int retcode;
4097
4098 if (dhd == NULL)
4099 return -1;
4100
4101 iov_len = bcm_mkiovar("nd_hostip", (char *)ipv6addr,
4102 IPV6_ADDR_LEN, iovbuf, sizeof(iovbuf));
4103 if (!iov_len) {
4104 DHD_ERROR(("%s: Insufficient iovar buffer size %zu \n",
4105 __FUNCTION__, sizeof(iovbuf)));
4106 return -1;
4107 }
4108 retcode = dhd_wl_ioctl_cmd(dhd, WLC_SET_VAR, iovbuf, iov_len, TRUE, idx);
4109
4110 if (retcode)
4111 DHD_ERROR(("%s: ndo ip addr add failed, retcode = %d\n",
4112 __FUNCTION__, retcode));
4113 else
4114 DHD_TRACE(("%s: ndo ipaddr entry added \n",
4115 __FUNCTION__));
4116
4117 return retcode;
4118 }
4119 /*
4120 * Neighbor Discover Offload: enable NDO feature
4121 * Called by ipv6 event handler when interface goes down
4122 */
4123 int
4124 dhd_ndo_remove_ip(dhd_pub_t *dhd, int idx)
4125 {
4126 int iov_len = 0;
4127 char iovbuf[DHD_IOVAR_BUF_SIZE];
4128 int retcode;
4129
4130 if (dhd == NULL)
4131 return -1;
4132
4133 iov_len = bcm_mkiovar("nd_hostip_clear", NULL,
4134 0, iovbuf, sizeof(iovbuf));
4135 if (!iov_len) {
4136 DHD_ERROR(("%s: Insufficient iovar buffer size %zu \n",
4137 __FUNCTION__, sizeof(iovbuf)));
4138 return -1;
4139 }
4140 retcode = dhd_wl_ioctl_cmd(dhd, WLC_SET_VAR, iovbuf, iov_len, TRUE, idx);
4141
4142 if (retcode)
4143 DHD_ERROR(("%s: ndo ip addr remove failed, retcode = %d\n",
4144 __FUNCTION__, retcode));
4145 else
4146 DHD_TRACE(("%s: ndo ipaddr entry removed \n",
4147 __FUNCTION__));
4148
4149 return retcode;
4150 }
4151 /* Enhanced ND offload */
4152 uint16
4153 dhd_ndo_get_version(dhd_pub_t *dhdp)
4154 {
4155 char iovbuf[DHD_IOVAR_BUF_SIZE];
4156 wl_nd_hostip_t ndo_get_ver;
4157 int iov_len;
4158 int retcode;
4159 uint16 ver = 0;
4160
4161 if (dhdp == NULL) {
4162 return BCME_ERROR;
4163 }
4164
4165 memset(&iovbuf, 0, sizeof(iovbuf));
4166 ndo_get_ver.version = htod16(WL_ND_HOSTIP_IOV_VER);
4167 ndo_get_ver.op_type = htod16(WL_ND_HOSTIP_OP_VER);
4168 ndo_get_ver.length = htod32(WL_ND_HOSTIP_FIXED_LEN + sizeof(uint16));
4169 ndo_get_ver.u.version = 0;
4170 iov_len = bcm_mkiovar("nd_hostip", (char *)&ndo_get_ver,
4171 WL_ND_HOSTIP_FIXED_LEN + sizeof(uint16), iovbuf, sizeof(iovbuf));
4172
4173 if (!iov_len) {
4174 DHD_ERROR(("%s: Insufficient iovar buffer size %zu \n",
4175 __FUNCTION__, sizeof(iovbuf)));
4176 return BCME_ERROR;
4177 }
4178
4179 retcode = dhd_wl_ioctl_cmd(dhdp, WLC_GET_VAR, iovbuf, iov_len, FALSE, 0);
4180
4181 if (retcode) {
4182 DHD_ERROR(("%s: failed, retcode = %d\n", __FUNCTION__, retcode));
4183 /* ver iovar not supported. NDO version is 0 */
4184 ver = 0;
4185 } else {
4186 wl_nd_hostip_t *ndo_ver_ret = (wl_nd_hostip_t *)iovbuf;
4187
4188 if ((dtoh16(ndo_ver_ret->version) == WL_ND_HOSTIP_IOV_VER) &&
4189 (dtoh16(ndo_ver_ret->op_type) == WL_ND_HOSTIP_OP_VER) &&
4190 (dtoh32(ndo_ver_ret->length) == WL_ND_HOSTIP_FIXED_LEN
4191 + sizeof(uint16))) {
4192 /* nd_hostip iovar version */
4193 ver = dtoh16(ndo_ver_ret->u.version);
4194 }
4195
4196 DHD_TRACE(("%s: successfully get version: %d\n", __FUNCTION__, ver));
4197 }
4198
4199 return ver;
4200 }
4201
4202 int
4203 dhd_ndo_add_ip_with_type(dhd_pub_t *dhdp, char *ipv6addr, uint8 type, int idx)
4204 {
4205 char iovbuf[DHD_IOVAR_BUF_SIZE];
4206 wl_nd_hostip_t ndo_add_addr;
4207 int iov_len;
4208 int retcode;
4209
4210 if (dhdp == NULL || ipv6addr == 0) {
4211 return BCME_ERROR;
4212 }
4213
4214 /* wl_nd_hostip_t fixed param */
4215 ndo_add_addr.version = htod16(WL_ND_HOSTIP_IOV_VER);
4216 ndo_add_addr.op_type = htod16(WL_ND_HOSTIP_OP_ADD);
4217 ndo_add_addr.length = htod32(WL_ND_HOSTIP_WITH_ADDR_LEN);
4218 /* wl_nd_host_ip_addr_t param for add */
4219 memcpy(&ndo_add_addr.u.host_ip.ip_addr, ipv6addr, IPV6_ADDR_LEN);
4220 ndo_add_addr.u.host_ip.type = type;
4221
4222 iov_len = bcm_mkiovar("nd_hostip", (char *)&ndo_add_addr,
4223 WL_ND_HOSTIP_WITH_ADDR_LEN, iovbuf, sizeof(iovbuf));
4224 if (!iov_len) {
4225 DHD_ERROR(("%s: Insufficient iovar buffer size %zu \n",
4226 __FUNCTION__, sizeof(iovbuf)));
4227 return BCME_ERROR;
4228 }
4229
4230 retcode = dhd_wl_ioctl_cmd(dhdp, WLC_SET_VAR, iovbuf, iov_len, TRUE, idx);
4231 if (retcode) {
4232 DHD_ERROR(("%s: failed, retcode = %d\n", __FUNCTION__, retcode));
4233 #ifdef NDO_CONFIG_SUPPORT
4234 if (retcode == BCME_NORESOURCE) {
4235 /* number of host ip addr exceeds FW capacity, Deactivate ND offload */
4236 DHD_INFO(("%s: Host IP count exceed device capacity,"
4237 "ND offload deactivated\n", __FUNCTION__));
4238 dhdp->ndo_host_ip_overflow = TRUE;
4239 dhd_ndo_enable(dhdp, FALSE);
4240 }
4241 #endif /* NDO_CONFIG_SUPPORT */
4242 } else {
4243 DHD_TRACE(("%s: successfully added: %d\n", __FUNCTION__, retcode));
4244 }
4245
4246 return retcode;
4247 }
4248
4249 int
4250 dhd_ndo_remove_ip_by_addr(dhd_pub_t *dhdp, char *ipv6addr, int idx)
4251 {
4252 char iovbuf[DHD_IOVAR_BUF_SIZE];
4253 wl_nd_hostip_t ndo_del_addr;
4254 int iov_len;
4255 int retcode;
4256
4257 if (dhdp == NULL || ipv6addr == 0) {
4258 return BCME_ERROR;
4259 }
4260
4261 /* wl_nd_hostip_t fixed param */
4262 ndo_del_addr.version = htod16(WL_ND_HOSTIP_IOV_VER);
4263 ndo_del_addr.op_type = htod16(WL_ND_HOSTIP_OP_DEL);
4264 ndo_del_addr.length = htod32(WL_ND_HOSTIP_WITH_ADDR_LEN);
4265 /* wl_nd_host_ip_addr_t param for del */
4266 memcpy(&ndo_del_addr.u.host_ip.ip_addr, ipv6addr, IPV6_ADDR_LEN);
4267 ndo_del_addr.u.host_ip.type = 0; /* don't care */
4268
4269 iov_len = bcm_mkiovar("nd_hostip", (char *)&ndo_del_addr,
4270 WL_ND_HOSTIP_WITH_ADDR_LEN, iovbuf, sizeof(iovbuf));
4271
4272 if (!iov_len) {
4273 DHD_ERROR(("%s: Insufficient iovar buffer size %zu \n",
4274 __FUNCTION__, sizeof(iovbuf)));
4275 return BCME_ERROR;
4276 }
4277
4278 retcode = dhd_wl_ioctl_cmd(dhdp, WLC_SET_VAR, iovbuf, iov_len, TRUE, idx);
4279 if (retcode) {
4280 DHD_ERROR(("%s: failed, retcode = %d\n", __FUNCTION__, retcode));
4281 } else {
4282 DHD_TRACE(("%s: successfully removed: %d\n", __FUNCTION__, retcode));
4283 }
4284
4285 return retcode;
4286 }
4287
4288 int
4289 dhd_ndo_remove_ip_by_type(dhd_pub_t *dhdp, uint8 type, int idx)
4290 {
4291 char iovbuf[DHD_IOVAR_BUF_SIZE];
4292 wl_nd_hostip_t ndo_del_addr;
4293 int iov_len;
4294 int retcode;
4295
4296 if (dhdp == NULL) {
4297 return BCME_ERROR;
4298 }
4299
4300 /* wl_nd_hostip_t fixed param */
4301 ndo_del_addr.version = htod16(WL_ND_HOSTIP_IOV_VER);
4302 if (type == WL_ND_IPV6_ADDR_TYPE_UNICAST) {
4303 ndo_del_addr.op_type = htod16(WL_ND_HOSTIP_OP_DEL_UC);
4304 } else if (type == WL_ND_IPV6_ADDR_TYPE_ANYCAST) {
4305 ndo_del_addr.op_type = htod16(WL_ND_HOSTIP_OP_DEL_AC);
4306 } else {
4307 return BCME_BADARG;
4308 }
4309 ndo_del_addr.length = htod32(WL_ND_HOSTIP_FIXED_LEN);
4310
4311 iov_len = bcm_mkiovar("nd_hostip", (char *)&ndo_del_addr, WL_ND_HOSTIP_FIXED_LEN,
4312 iovbuf, sizeof(iovbuf));
4313
4314 if (!iov_len) {
4315 DHD_ERROR(("%s: Insufficient iovar buffer size %zu \n",
4316 __FUNCTION__, sizeof(iovbuf)));
4317 return BCME_ERROR;
4318 }
4319
4320 retcode = dhd_wl_ioctl_cmd(dhdp, WLC_SET_VAR, iovbuf, iov_len, TRUE, idx);
4321 if (retcode) {
4322 DHD_ERROR(("%s: failed, retcode = %d\n", __FUNCTION__, retcode));
4323 } else {
4324 DHD_TRACE(("%s: successfully removed: %d\n", __FUNCTION__, retcode));
4325 }
4326
4327 return retcode;
4328 }
4329
4330 int
4331 dhd_ndo_unsolicited_na_filter_enable(dhd_pub_t *dhdp, int enable)
4332 {
4333 char iovbuf[DHD_IOVAR_BUF_SIZE];
4334 int iov_len;
4335 int retcode;
4336
4337 if (dhdp == NULL) {
4338 return BCME_ERROR;
4339 }
4340
4341 iov_len = bcm_mkiovar("nd_unsolicited_na_filter", (char *)&enable, sizeof(int),
4342 iovbuf, sizeof(iovbuf));
4343
4344 if (!iov_len) {
4345 DHD_ERROR(("%s: Insufficient iovar buffer size %zu \n",
4346 __FUNCTION__, sizeof(iovbuf)));
4347 return BCME_ERROR;
4348 }
4349
4350 retcode = dhd_wl_ioctl_cmd(dhdp, WLC_SET_VAR, iovbuf, iov_len, TRUE, 0);
4351 if (retcode)
4352 DHD_ERROR(("%s: failed to enable Unsolicited NA filter to %d, retcode = %d\n",
4353 __FUNCTION__, enable, retcode));
4354 else {
4355 DHD_TRACE(("%s: successfully enabled Unsolicited NA filter to %d\n",
4356 __FUNCTION__, enable));
4357 }
4358
4359 return retcode;
4360 }
4361 #ifdef SIMPLE_ISCAN
4362
4363 uint iscan_thread_id = 0;
4364 iscan_buf_t * iscan_chain = 0;
4365
4366 iscan_buf_t *
4367 dhd_iscan_allocate_buf(dhd_pub_t *dhd, iscan_buf_t **iscanbuf)
4368 {
4369 iscan_buf_t *iscanbuf_alloc = 0;
4370 iscan_buf_t *iscanbuf_head;
4371
4372 DHD_ISCAN(("%s: Entered\n", __FUNCTION__));
4373 dhd_iscan_lock();
4374
4375 iscanbuf_alloc = (iscan_buf_t*)MALLOC(dhd->osh, sizeof(iscan_buf_t));
4376 if (iscanbuf_alloc == NULL)
4377 goto fail;
4378
4379 iscanbuf_alloc->next = NULL;
4380 iscanbuf_head = *iscanbuf;
4381
4382 DHD_ISCAN(("%s: addr of allocated node = 0x%X"
4383 "addr of iscanbuf_head = 0x%X dhd = 0x%X\n",
4384 __FUNCTION__, iscanbuf_alloc, iscanbuf_head, dhd));
4385
4386 if (iscanbuf_head == NULL) {
4387 *iscanbuf = iscanbuf_alloc;
4388 DHD_ISCAN(("%s: Head is allocated\n", __FUNCTION__));
4389 goto fail;
4390 }
4391
4392 while (iscanbuf_head->next)
4393 iscanbuf_head = iscanbuf_head->next;
4394
4395 iscanbuf_head->next = iscanbuf_alloc;
4396
4397 fail:
4398 dhd_iscan_unlock();
4399 return iscanbuf_alloc;
4400 }
4401
4402 void
4403 dhd_iscan_free_buf(void *dhdp, iscan_buf_t *iscan_delete)
4404 {
4405 iscan_buf_t *iscanbuf_free = 0;
4406 iscan_buf_t *iscanbuf_prv = 0;
4407 iscan_buf_t *iscanbuf_cur;
4408 dhd_pub_t *dhd = dhd_bus_pub(dhdp);
4409 DHD_ISCAN(("%s: Entered\n", __FUNCTION__));
4410
4411 dhd_iscan_lock();
4412
4413 iscanbuf_cur = iscan_chain;
4414
4415 /* If iscan_delete is null then delete the entire
4416 * chain or else delete specific one provided
4417 */
4418 if (!iscan_delete) {
4419 while (iscanbuf_cur) {
4420 iscanbuf_free = iscanbuf_cur;
4421 iscanbuf_cur = iscanbuf_cur->next;
4422 iscanbuf_free->next = 0;
4423 MFREE(dhd->osh, iscanbuf_free, sizeof(iscan_buf_t));
4424 }
4425 iscan_chain = 0;
4426 } else {
4427 while (iscanbuf_cur) {
4428 if (iscanbuf_cur == iscan_delete)
4429 break;
4430 iscanbuf_prv = iscanbuf_cur;
4431 iscanbuf_cur = iscanbuf_cur->next;
4432 }
4433 if (iscanbuf_prv)
4434 iscanbuf_prv->next = iscan_delete->next;
4435
4436 iscan_delete->next = 0;
4437 MFREE(dhd->osh, iscan_delete, sizeof(iscan_buf_t));
4438
4439 if (!iscanbuf_prv)
4440 iscan_chain = 0;
4441 }
4442 dhd_iscan_unlock();
4443 }
4444
4445 iscan_buf_t *
4446 dhd_iscan_result_buf(void)
4447 {
4448 return iscan_chain;
4449 }
4450
4451 int
4452 dhd_iscan_issue_request(void * dhdp, wl_iscan_params_t *pParams, uint32 size)
4453 {
4454 int rc = -1;
4455 dhd_pub_t *dhd = dhd_bus_pub(dhdp);
4456 char *buf;
4457 char iovar[] = "iscan";
4458 uint32 allocSize = 0;
4459 wl_ioctl_t ioctl;
4460 int len;
4461
4462 if (pParams) {
4463 allocSize = (size + strlen(iovar) + 1);
4464 if ((allocSize < size) || (allocSize < strlen(iovar)))
4465 {
4466 DHD_ERROR(("%s: overflow - allocation size too large %d < %d + %d!\n",
4467 __FUNCTION__, allocSize, size, strlen(iovar)));
4468 goto cleanUp;
4469 }
4470 buf = MALLOC(dhd->osh, allocSize);
4471
4472 if (buf == NULL)
4473 {
4474 DHD_ERROR(("%s: malloc of size %d failed!\n", __FUNCTION__, allocSize));
4475 goto cleanUp;
4476 }
4477 ioctl.cmd = WLC_SET_VAR;
4478 len = bcm_mkiovar(iovar, (char *)pParams, size, buf, allocSize);
4479 if (len == 0) {
4480 rc = BCME_BUFTOOSHORT;
4481 goto cleanUp;
4482 }
4483 rc = dhd_wl_ioctl(dhd, 0, &ioctl, buf, len);
4484 }
4485
4486 cleanUp:
4487 if (buf) {
4488 MFREE(dhd->osh, buf, allocSize);
4489 }
4490
4491 return rc;
4492 }
4493
4494 static int
4495 dhd_iscan_get_partial_result(void *dhdp, uint *scan_count)
4496 {
4497 wl_iscan_results_t *list_buf;
4498 wl_iscan_results_t list;
4499 wl_scan_results_t *results;
4500 iscan_buf_t *iscan_cur;
4501 int status = -1;
4502 dhd_pub_t *dhd = dhd_bus_pub(dhdp);
4503 int rc;
4504 wl_ioctl_t ioctl;
4505 int len;
4506
4507 DHD_ISCAN(("%s: Enter\n", __FUNCTION__));
4508
4509 iscan_cur = dhd_iscan_allocate_buf(dhd, &iscan_chain);
4510 if (!iscan_cur) {
4511 DHD_ERROR(("%s: Failed to allocate node\n", __FUNCTION__));
4512 dhd_iscan_free_buf(dhdp, 0);
4513 dhd_iscan_request(dhdp, WL_SCAN_ACTION_ABORT);
4514 dhd_ind_scan_confirm(dhdp, FALSE);
4515 goto fail;
4516 }
4517
4518 dhd_iscan_lock();
4519
4520 memset(iscan_cur->iscan_buf, 0, WLC_IW_ISCAN_MAXLEN);
4521 list_buf = (wl_iscan_results_t*)iscan_cur->iscan_buf;
4522 results = &list_buf->results;
4523 results->buflen = WL_ISCAN_RESULTS_FIXED_SIZE;
4524 results->version = 0;
4525 results->count = 0;
4526
4527 memset(&list, 0, sizeof(list));
4528 list.results.buflen = htod32(WLC_IW_ISCAN_MAXLEN);
4529 len = bcm_mkiovar("iscanresults", (char *)&list, WL_ISCAN_RESULTS_FIXED_SIZE,
4530 iscan_cur->iscan_buf, WLC_IW_ISCAN_MAXLEN);
4531 if (len == 0) {
4532 dhd_iscan_free_buf(dhdp, 0);
4533 dhd_iscan_request(dhdp, WL_SCAN_ACTION_ABORT);
4534 dhd_ind_scan_confirm(dhdp, FALSE);
4535 status = BCME_BUFTOOSHORT;
4536 goto fail;
4537 }
4538 ioctl.cmd = WLC_GET_VAR;
4539 ioctl.set = FALSE;
4540 rc = dhd_wl_ioctl(dhd, 0, &ioctl, iscan_cur->iscan_buf, WLC_IW_ISCAN_MAXLEN);
4541
4542 results->buflen = dtoh32(results->buflen);
4543 results->version = dtoh32(results->version);
4544 *scan_count = results->count = dtoh32(results->count);
4545 status = dtoh32(list_buf->status);
4546 DHD_ISCAN(("%s: Got %d resuls status = (%x)\n", __FUNCTION__, results->count, status));
4547
4548 dhd_iscan_unlock();
4549
4550 if (!(*scan_count)) {
4551 /* TODO: race condition when FLUSH already called */
4552 dhd_iscan_free_buf(dhdp, 0);
4553 }
4554 fail:
4555 return status;
4556 }
4557
4558 #endif /* SIMPLE_ISCAN */
4559
4560 /*
4561 * returns = TRUE if associated, FALSE if not associated
4562 */
4563 bool dhd_is_associated(dhd_pub_t *dhd, uint8 ifidx, int *retval)
4564 {
4565 char bssid[6], zbuf[6];
4566 int ret = -1;
4567
4568 bzero(bssid, 6);
4569 bzero(zbuf, 6);
4570
4571 ret = dhd_wl_ioctl_cmd(dhd, WLC_GET_BSSID, (char *)&bssid,
4572 ETHER_ADDR_LEN, FALSE, ifidx);
4573 DHD_TRACE((" %s WLC_GET_BSSID ioctl res = %d\n", __FUNCTION__, ret));
4574
4575 if (ret == BCME_NOTASSOCIATED) {
4576 DHD_TRACE(("%s: not associated! res:%d\n", __FUNCTION__, ret));
4577 }
4578
4579 if (retval)
4580 *retval = ret;
4581
4582 if (ret < 0)
4583 return FALSE;
4584
4585 if ((memcmp(bssid, zbuf, ETHER_ADDR_LEN) == 0)) {
4586 DHD_TRACE(("%s: WLC_GET_BSSID ioctl returned zero bssid\n", __FUNCTION__));
4587 return FALSE;
4588 }
4589 return TRUE;
4590 }
4591
4592 /* Function to estimate possible DTIM_SKIP value */
4593 #if defined(BCMPCIE)
4594 int
4595 dhd_get_suspend_bcn_li_dtim(dhd_pub_t *dhd, int *dtim_period, int *bcn_interval)
4596 {
4597 int bcn_li_dtim = 1; /* deafult no dtim skip setting */
4598 int ret = -1;
4599 int allowed_skip_dtim_cnt = 0;
4600
4601 /* Check if associated */
4602 if (dhd_is_associated(dhd, 0, NULL) == FALSE) {
4603 DHD_TRACE(("%s NOT assoc ret %d\n", __FUNCTION__, ret));
4604 return bcn_li_dtim;
4605 }
4606
4607 if (dtim_period == NULL || bcn_interval == NULL)
4608 return bcn_li_dtim;
4609
4610 /* read associated AP beacon interval */
4611 if ((ret = dhd_wl_ioctl_cmd(dhd, WLC_GET_BCNPRD,
4612 bcn_interval, sizeof(*bcn_interval), FALSE, 0)) < 0) {
4613 DHD_ERROR(("%s get beacon failed code %d\n", __FUNCTION__, ret));
4614 return bcn_li_dtim;
4615 }
4616
4617 /* read associated AP dtim setup */
4618 if ((ret = dhd_wl_ioctl_cmd(dhd, WLC_GET_DTIMPRD,
4619 dtim_period, sizeof(*dtim_period), FALSE, 0)) < 0) {
4620 DHD_ERROR(("%s failed code %d\n", __FUNCTION__, ret));
4621 return bcn_li_dtim;
4622 }
4623
4624 /* if not assocated just return */
4625 if (*dtim_period == 0) {
4626 return bcn_li_dtim;
4627 }
4628
4629 if (dhd->max_dtim_enable) {
4630 bcn_li_dtim =
4631 (int) (MAX_DTIM_ALLOWED_INTERVAL / ((*dtim_period) * (*bcn_interval)));
4632 if (bcn_li_dtim == 0) {
4633 bcn_li_dtim = 1;
4634 }
4635 } else {
4636 /* attemp to use platform defined dtim skip interval */
4637 bcn_li_dtim = dhd->suspend_bcn_li_dtim;
4638
4639 /* check if sta listen interval fits into AP dtim */
4640 if (*dtim_period > CUSTOM_LISTEN_INTERVAL) {
4641 /* AP DTIM to big for our Listen Interval : no dtim skiping */
4642 bcn_li_dtim = NO_DTIM_SKIP;
4643 DHD_ERROR(("%s DTIM=%d > Listen=%d : too big ...\n",
4644 __FUNCTION__, *dtim_period, CUSTOM_LISTEN_INTERVAL));
4645 return bcn_li_dtim;
4646 }
4647
4648 if (((*dtim_period) * (*bcn_interval) * bcn_li_dtim) > MAX_DTIM_ALLOWED_INTERVAL) {
4649 allowed_skip_dtim_cnt =
4650 MAX_DTIM_ALLOWED_INTERVAL / ((*dtim_period) * (*bcn_interval));
4651 bcn_li_dtim =
4652 (allowed_skip_dtim_cnt != 0) ? allowed_skip_dtim_cnt : NO_DTIM_SKIP;
4653 }
4654
4655 if ((bcn_li_dtim * (*dtim_period)) > CUSTOM_LISTEN_INTERVAL) {
4656 /* Round up dtim_skip to fit into STAs Listen Interval */
4657 bcn_li_dtim = (int)(CUSTOM_LISTEN_INTERVAL / *dtim_period);
4658 DHD_TRACE(("%s agjust dtim_skip as %d\n", __FUNCTION__, bcn_li_dtim));
4659 }
4660 }
4661
4662 DHD_ERROR(("%s beacon=%d bcn_li_dtim=%d DTIM=%d Listen=%d\n",
4663 __FUNCTION__, *bcn_interval, bcn_li_dtim, *dtim_period, CUSTOM_LISTEN_INTERVAL));
4664
4665 return bcn_li_dtim;
4666 }
4667 #else /* OEM_ANDROID && BCMPCIE */
4668 int
4669 dhd_get_suspend_bcn_li_dtim(dhd_pub_t *dhd)
4670 {
4671 int bcn_li_dtim = 1; /* deafult no dtim skip setting */
4672 int ret = -1;
4673 int dtim_period = 0;
4674 int ap_beacon = 0;
4675 int allowed_skip_dtim_cnt = 0;
4676
4677 /* Check if associated */
4678 if (dhd_is_associated(dhd, 0, NULL) == FALSE) {
4679 DHD_TRACE(("%s NOT assoc ret %d\n", __FUNCTION__, ret));
4680 goto exit;
4681 }
4682
4683 /* read associated AP beacon interval */
4684 if ((ret = dhd_wl_ioctl_cmd(dhd, WLC_GET_BCNPRD,
4685 &ap_beacon, sizeof(ap_beacon), FALSE, 0)) < 0) {
4686 DHD_ERROR(("%s get beacon failed code %d\n", __FUNCTION__, ret));
4687 goto exit;
4688 }
4689
4690 /* read associated ap's dtim setup */
4691 if ((ret = dhd_wl_ioctl_cmd(dhd, WLC_GET_DTIMPRD,
4692 &dtim_period, sizeof(dtim_period), FALSE, 0)) < 0) {
4693 DHD_ERROR(("%s failed code %d\n", __FUNCTION__, ret));
4694 goto exit;
4695 }
4696
4697 /* if not assocated just exit */
4698 if (dtim_period == 0) {
4699 goto exit;
4700 }
4701
4702 if (dhd->max_dtim_enable) {
4703 bcn_li_dtim =
4704 (int) (MAX_DTIM_ALLOWED_INTERVAL / (ap_beacon * dtim_period));
4705 if (bcn_li_dtim == 0) {
4706 bcn_li_dtim = 1;
4707 }
4708 } else {
4709 /* attemp to use platform defined dtim skip interval */
4710 bcn_li_dtim = dhd->suspend_bcn_li_dtim;
4711
4712 /* check if sta listen interval fits into AP dtim */
4713 if (dtim_period > CUSTOM_LISTEN_INTERVAL) {
4714 /* AP DTIM to big for our Listen Interval : no dtim skiping */
4715 bcn_li_dtim = NO_DTIM_SKIP;
4716 DHD_ERROR(("%s DTIM=%d > Listen=%d : too big ...\n",
4717 __FUNCTION__, dtim_period, CUSTOM_LISTEN_INTERVAL));
4718 goto exit;
4719 }
4720
4721 if ((dtim_period * ap_beacon * bcn_li_dtim) > MAX_DTIM_ALLOWED_INTERVAL) {
4722 allowed_skip_dtim_cnt =
4723 MAX_DTIM_ALLOWED_INTERVAL / (dtim_period * ap_beacon);
4724 bcn_li_dtim =
4725 (allowed_skip_dtim_cnt != 0) ? allowed_skip_dtim_cnt : NO_DTIM_SKIP;
4726 }
4727
4728 if ((bcn_li_dtim * dtim_period) > CUSTOM_LISTEN_INTERVAL) {
4729 /* Round up dtim_skip to fit into STAs Listen Interval */
4730 bcn_li_dtim = (int)(CUSTOM_LISTEN_INTERVAL / dtim_period);
4731 DHD_TRACE(("%s agjust dtim_skip as %d\n", __FUNCTION__, bcn_li_dtim));
4732 }
4733 }
4734
4735 DHD_ERROR(("%s beacon=%d bcn_li_dtim=%d DTIM=%d Listen=%d\n",
4736 __FUNCTION__, ap_beacon, bcn_li_dtim, dtim_period, CUSTOM_LISTEN_INTERVAL));
4737
4738 exit:
4739 return bcn_li_dtim;
4740 }
4741 #endif /* OEM_ANDROID && BCMPCIE */
4742
4743 /* Check if the mode supports STA MODE */
4744 bool dhd_support_sta_mode(dhd_pub_t *dhd)
4745 {
4746
4747 #ifdef WL_CFG80211
4748 if (!(dhd->op_mode & DHD_FLAG_STA_MODE))
4749 return FALSE;
4750 else
4751 #endif /* WL_CFG80211 */
4752 return TRUE;
4753 }
4754
4755 #if defined(KEEP_ALIVE)
4756 int dhd_keep_alive_onoff(dhd_pub_t *dhd)
4757 {
4758 char buf[32] = {0};
4759 const char *str;
4760 wl_mkeep_alive_pkt_t mkeep_alive_pkt = {0, 0, 0, 0, 0, {0}};
4761 wl_mkeep_alive_pkt_t *mkeep_alive_pktp;
4762 int buf_len;
4763 int str_len;
4764 int res = -1;
4765
4766 if (!dhd_support_sta_mode(dhd))
4767 return res;
4768
4769 DHD_TRACE(("%s execution\n", __FUNCTION__));
4770
4771 str = "mkeep_alive";
4772 str_len = strlen(str);
4773 strncpy(buf, str, sizeof(buf) - 1);
4774 buf[ sizeof(buf) - 1 ] = '\0';
4775 mkeep_alive_pktp = (wl_mkeep_alive_pkt_t *) (buf + str_len + 1);
4776 mkeep_alive_pkt.period_msec = CUSTOM_KEEP_ALIVE_SETTING;
4777 buf_len = str_len + 1;
4778 mkeep_alive_pkt.version = htod16(WL_MKEEP_ALIVE_VERSION);
4779 mkeep_alive_pkt.length = htod16(WL_MKEEP_ALIVE_FIXED_LEN);
4780 /* Setup keep alive zero for null packet generation */
4781 mkeep_alive_pkt.keep_alive_id = 0;
4782 mkeep_alive_pkt.len_bytes = 0;
4783 buf_len += WL_MKEEP_ALIVE_FIXED_LEN;
4784 bzero(mkeep_alive_pkt.data, sizeof(mkeep_alive_pkt.data));
4785 /* Keep-alive attributes are set in local variable (mkeep_alive_pkt), and
4786 * then memcpy'ed into buffer (mkeep_alive_pktp) since there is no
4787 * guarantee that the buffer is properly aligned.
4788 */
4789 memcpy((char *)mkeep_alive_pktp, &mkeep_alive_pkt, WL_MKEEP_ALIVE_FIXED_LEN);
4790
4791 res = dhd_wl_ioctl_cmd(dhd, WLC_SET_VAR, buf, buf_len, TRUE, 0);
4792
4793 return res;
4794 }
4795 #endif /* defined(KEEP_ALIVE) */
4796 #define CSCAN_TLV_TYPE_SSID_IE 'S'
4797 /*
4798 * SSIDs list parsing from cscan tlv list
4799 */
4800 int
4801 wl_parse_ssid_list_tlv(char** list_str, wlc_ssid_ext_t* ssid, int max, int *bytes_left)
4802 {
4803 char* str;
4804 int idx = 0;
4805 uint8 len;
4806
4807 if ((list_str == NULL) || (*list_str == NULL) || (*bytes_left < 0)) {
4808 DHD_ERROR(("%s error paramters\n", __FUNCTION__));
4809 return BCME_BADARG;
4810 }
4811 str = *list_str;
4812 while (*bytes_left > 0) {
4813 if (str[0] != CSCAN_TLV_TYPE_SSID_IE) {
4814 *list_str = str;
4815 DHD_TRACE(("nssid=%d left_parse=%d %d\n", idx, *bytes_left, str[0]));
4816 return idx;
4817 }
4818
4819 if (idx >= max) {
4820 DHD_ERROR(("%s number of SSIDs more than %d\n", __FUNCTION__, idx));
4821 return BCME_BADARG;
4822 }
4823
4824 /* Get proper CSCAN_TLV_TYPE_SSID_IE */
4825 *bytes_left -= 1;
4826 if (*bytes_left == 0) {
4827 DHD_ERROR(("%s no length field.\n", __FUNCTION__));
4828 return BCME_BADARG;
4829 }
4830 str += 1;
4831 ssid[idx].rssi_thresh = 0;
4832 ssid[idx].flags = 0;
4833 len = str[0];
4834 if (len == 0) {
4835 /* Broadcast SSID */
4836 ssid[idx].SSID_len = 0;
4837 memset((char*)ssid[idx].SSID, 0x0, DOT11_MAX_SSID_LEN);
4838 *bytes_left -= 1;
4839 str += 1;
4840
4841 DHD_TRACE(("BROADCAST SCAN left=%d\n", *bytes_left));
4842 } else if (len <= DOT11_MAX_SSID_LEN) {
4843 /* Get proper SSID size */
4844 ssid[idx].SSID_len = len;
4845 *bytes_left -= 1;
4846 /* Get SSID */
4847 if (ssid[idx].SSID_len > *bytes_left) {
4848 DHD_ERROR(("%s out of memory range len=%d but left=%d\n",
4849 __FUNCTION__, ssid[idx].SSID_len, *bytes_left));
4850 return BCME_BADARG;
4851 }
4852 str += 1;
4853 memcpy((char*)ssid[idx].SSID, str, ssid[idx].SSID_len);
4854
4855 *bytes_left -= ssid[idx].SSID_len;
4856 str += ssid[idx].SSID_len;
4857 ssid[idx].hidden = TRUE;
4858
4859 DHD_TRACE(("%s :size=%d left=%d\n",
4860 (char*)ssid[idx].SSID, ssid[idx].SSID_len, *bytes_left));
4861 } else {
4862 DHD_ERROR(("### SSID size more than %d\n", str[0]));
4863 return BCME_BADARG;
4864 }
4865 idx++;
4866 }
4867
4868 *list_str = str;
4869 return idx;
4870 }
4871 /* Android ComboSCAN support */
4872
4873 /*
4874 * data parsing from ComboScan tlv list
4875 */
4876 int
4877 wl_iw_parse_data_tlv(char** list_str, void *dst, int dst_size, const char token,
4878 int input_size, int *bytes_left)
4879 {
4880 char* str;
4881 uint16 short_temp;
4882 uint32 int_temp;
4883
4884 if ((list_str == NULL) || (*list_str == NULL) ||(bytes_left == NULL) || (*bytes_left < 0)) {
4885 DHD_ERROR(("%s error paramters\n", __FUNCTION__));
4886 return -1;
4887 }
4888 str = *list_str;
4889
4890 /* Clean all dest bytes */
4891 memset(dst, 0, dst_size);
4892 if (*bytes_left > 0) {
4893
4894 if (str[0] != token) {
4895 DHD_TRACE(("%s NOT Type=%d get=%d left_parse=%d \n",
4896 __FUNCTION__, token, str[0], *bytes_left));
4897 return -1;
4898 }
4899
4900 *bytes_left -= 1;
4901 str += 1;
4902
4903 if (input_size == 1) {
4904 memcpy(dst, str, input_size);
4905 }
4906 else if (input_size == 2) {
4907 memcpy(dst, (char *)htod16(memcpy(&short_temp, str, input_size)),
4908 input_size);
4909 }
4910 else if (input_size == 4) {
4911 memcpy(dst, (char *)htod32(memcpy(&int_temp, str, input_size)),
4912 input_size);
4913 }
4914
4915 *bytes_left -= input_size;
4916 str += input_size;
4917 *list_str = str;
4918 return 1;
4919 }
4920 return 1;
4921 }
4922
4923 /*
4924 * channel list parsing from cscan tlv list
4925 */
4926 int
4927 wl_iw_parse_channel_list_tlv(char** list_str, uint16* channel_list,
4928 int channel_num, int *bytes_left)
4929 {
4930 char* str;
4931 int idx = 0;
4932
4933 if ((list_str == NULL) || (*list_str == NULL) ||(bytes_left == NULL) || (*bytes_left < 0)) {
4934 DHD_ERROR(("%s error paramters\n", __FUNCTION__));
4935 return -1;
4936 }
4937 str = *list_str;
4938
4939 while (*bytes_left > 0) {
4940
4941 if (str[0] != CSCAN_TLV_TYPE_CHANNEL_IE) {
4942 *list_str = str;
4943 DHD_TRACE(("End channel=%d left_parse=%d %d\n", idx, *bytes_left, str[0]));
4944 return idx;
4945 }
4946 /* Get proper CSCAN_TLV_TYPE_CHANNEL_IE */
4947 *bytes_left -= 1;
4948 str += 1;
4949
4950 if (str[0] == 0) {
4951 /* All channels */
4952 channel_list[idx] = 0x0;
4953 }
4954 else {
4955 channel_list[idx] = (uint16)str[0];
4956 DHD_TRACE(("%s channel=%d \n", __FUNCTION__, channel_list[idx]));
4957 }
4958 *bytes_left -= 1;
4959 str += 1;
4960
4961 if (idx++ > 255) {
4962 DHD_ERROR(("%s Too many channels \n", __FUNCTION__));
4963 return -1;
4964 }
4965 }
4966
4967 *list_str = str;
4968 return idx;
4969 }
4970
4971 /* Parse a comma-separated list from list_str into ssid array, starting
4972 * at index idx. Max specifies size of the ssid array. Parses ssids
4973 * and returns updated idx; if idx >= max not all fit, the excess have
4974 * not been copied. Returns -1 on empty string, or on ssid too long.
4975 */
4976 int
4977 wl_iw_parse_ssid_list(char** list_str, wlc_ssid_t* ssid, int idx, int max)
4978 {
4979 char* str, *ptr;
4980
4981 if ((list_str == NULL) || (*list_str == NULL))
4982 return -1;
4983
4984 for (str = *list_str; str != NULL; str = ptr) {
4985
4986 /* check for next TAG */
4987 if (!strncmp(str, GET_CHANNEL, strlen(GET_CHANNEL))) {
4988 *list_str = str + strlen(GET_CHANNEL);
4989 return idx;
4990 }
4991
4992 if ((ptr = strchr(str, ',')) != NULL) {
4993 *ptr++ = '\0';
4994 }
4995
4996 if (strlen(str) > DOT11_MAX_SSID_LEN) {
4997 DHD_ERROR(("ssid <%s> exceeds %d\n", str, DOT11_MAX_SSID_LEN));
4998 return -1;
4999 }
5000
5001 if (strlen(str) == 0)
5002 ssid[idx].SSID_len = 0;
5003
5004 if (idx < max) {
5005 bzero(ssid[idx].SSID, sizeof(ssid[idx].SSID));
5006 strncpy((char*)ssid[idx].SSID, str, sizeof(ssid[idx].SSID) - 1);
5007 ssid[idx].SSID_len = strlen(str);
5008 }
5009 idx++;
5010 }
5011 return idx;
5012 }
5013
5014 /*
5015 * Parse channel list from iwpriv CSCAN
5016 */
5017 int
5018 wl_iw_parse_channel_list(char** list_str, uint16* channel_list, int channel_num)
5019 {
5020 int num;
5021 int val;
5022 char* str;
5023 char* endptr = NULL;
5024
5025 if ((list_str == NULL)||(*list_str == NULL))
5026 return -1;
5027
5028 str = *list_str;
5029 num = 0;
5030 while (strncmp(str, GET_NPROBE, strlen(GET_NPROBE))) {
5031 val = (int)strtoul(str, &endptr, 0);
5032 if (endptr == str) {
5033 printf("could not parse channel number starting at"
5034 " substring \"%s\" in list:\n%s\n",
5035 str, *list_str);
5036 return -1;
5037 }
5038 str = endptr + strspn(endptr, " ,");
5039
5040 if (num == channel_num) {
5041 DHD_ERROR(("too many channels (more than %d) in channel list:\n%s\n",
5042 channel_num, *list_str));
5043 return -1;
5044 }
5045
5046 channel_list[num++] = (uint16)val;
5047 }
5048 *list_str = str;
5049 return num;
5050 }
5051
5052 /* Given filename and download type, returns a buffer pointer and length
5053 * for download to f/w. Type can be FW or NVRAM.
5054 *
5055 */
5056 int dhd_get_download_buffer(dhd_pub_t *dhd, char *file_path, download_type_t component,
5057 char ** buffer, int *length)
5058
5059 {
5060 int ret = BCME_ERROR;
5061 int len = 0;
5062 int file_len;
5063 void *image = NULL;
5064 uint8 *buf = NULL;
5065
5066 /* Point to cache if available. */
5067 /* No Valid cache found on this call */
5068 if (!len) {
5069 file_len = *length;
5070 *length = 0;
5071
5072 if (file_path) {
5073 image = dhd_os_open_image1(dhd, file_path);
5074 if (image == NULL) {
5075 goto err;
5076 }
5077 }
5078
5079 buf = MALLOCZ(dhd->osh, file_len);
5080 if (buf == NULL) {
5081 DHD_ERROR(("%s: Failed to allocate memory %d bytes\n",
5082 __FUNCTION__, file_len));
5083 goto err;
5084 }
5085
5086 /* Download image */
5087 len = dhd_os_get_image_block((char *)buf, file_len, image);
5088 if ((len <= 0 || len > file_len)) {
5089 MFREE(dhd->osh, buf, file_len);
5090 goto err;
5091 }
5092 }
5093
5094 ret = BCME_OK;
5095 *length = len;
5096 *buffer = (char *)buf;
5097
5098 /* Cache if first call. */
5099
5100 err:
5101 if (image)
5102 dhd_os_close_image1(dhd, image);
5103
5104 return ret;
5105 }
5106
5107 int
5108 dhd_download_2_dongle(dhd_pub_t *dhd, char *iovar, uint16 flag, uint16 dload_type,
5109 unsigned char *dload_buf, int len)
5110 {
5111 struct wl_dload_data *dload_ptr = (struct wl_dload_data *)dload_buf;
5112 int err = 0;
5113 int dload_data_offset;
5114 static char iovar_buf[WLC_IOCTL_MEDLEN];
5115 int iovar_len;
5116
5117 memset(iovar_buf, 0, sizeof(iovar_buf));
5118
5119 dload_data_offset = OFFSETOF(wl_dload_data_t, data);
5120 dload_ptr->flag = (DLOAD_HANDLER_VER << DLOAD_FLAG_VER_SHIFT) | flag;
5121 dload_ptr->dload_type = dload_type;
5122 dload_ptr->len = htod32(len - dload_data_offset);
5123 dload_ptr->crc = 0;
5124 len = ROUNDUP(len, 8);
5125
5126 iovar_len = bcm_mkiovar(iovar, (char *)dload_buf,
5127 (uint)len, iovar_buf, sizeof(iovar_buf));
5128 if (iovar_len == 0) {
5129 DHD_ERROR(("%s: insufficient buffer space passed to bcm_mkiovar for '%s' \n",
5130 __FUNCTION__, iovar));
5131 return BCME_BUFTOOSHORT;
5132 }
5133
5134 err = dhd_wl_ioctl_cmd(dhd, WLC_SET_VAR, iovar_buf,
5135 iovar_len, IOV_SET, 0);
5136
5137 return err;
5138 }
5139
5140 int
5141 dhd_download_blob(dhd_pub_t *dhd, unsigned char *buf,
5142 uint32 len, char *iovar)
5143
5144 {
5145 int chunk_len;
5146 int size2alloc;
5147 unsigned char *new_buf;
5148 int err = 0, data_offset;
5149 uint16 dl_flag = DL_BEGIN;
5150
5151 data_offset = OFFSETOF(wl_dload_data_t, data);
5152 size2alloc = data_offset + MAX_CHUNK_LEN;
5153 size2alloc = ROUNDUP(size2alloc, 8);
5154
5155 if ((new_buf = (unsigned char *)MALLOCZ(dhd->osh, size2alloc)) != NULL) {
5156 do {
5157 chunk_len = dhd_os_get_image_block((char *)(new_buf + data_offset),
5158 MAX_CHUNK_LEN, buf);
5159 if (chunk_len < 0) {
5160 DHD_ERROR(("%s: dhd_os_get_image_block failed (%d)\n",
5161 __FUNCTION__, chunk_len));
5162 err = BCME_ERROR;
5163 goto exit;
5164 }
5165 if (len - chunk_len == 0)
5166 dl_flag |= DL_END;
5167
5168 err = dhd_download_2_dongle(dhd, iovar, dl_flag, DL_TYPE_CLM,
5169 new_buf, data_offset + chunk_len);
5170
5171 dl_flag &= ~DL_BEGIN;
5172
5173 len = len - chunk_len;
5174 } while ((len > 0) && (err == 0));
5175 } else {
5176 err = BCME_NOMEM;
5177 }
5178 exit:
5179 if (new_buf) {
5180 MFREE(dhd->osh, new_buf, size2alloc);
5181 }
5182 return err;
5183 }
5184
5185 int
5186 dhd_apply_default_txcap(dhd_pub_t *dhd, char *path)
5187 {
5188 return 0;
5189 }
5190
5191 int
5192 dhd_check_current_clm_data(dhd_pub_t *dhd)
5193 {
5194 char iovbuf[WLC_IOCTL_SMLEN];
5195 wl_country_t *cspec;
5196 int err = BCME_OK;
5197
5198 memset(iovbuf, 0, sizeof(iovbuf));
5199 err = bcm_mkiovar("country", NULL, 0, iovbuf, sizeof(iovbuf));
5200 if (err == 0) {
5201 err = BCME_BUFTOOSHORT;
5202 DHD_ERROR(("%s: bcm_mkiovar failed.", __FUNCTION__));
5203 return err;
5204 }
5205 err = dhd_wl_ioctl_cmd(dhd, WLC_GET_VAR, iovbuf, sizeof(iovbuf), FALSE, 0);
5206 if (err) {
5207 DHD_ERROR(("%s: country code get failed\n", __FUNCTION__));
5208 return err;
5209 }
5210 cspec = (wl_country_t *)iovbuf;
5211 if ((strncmp(cspec->ccode, WL_CCODE_NULL_COUNTRY, WLC_CNTRY_BUF_SZ)) == 0) {
5212 DHD_ERROR(("%s: ----- This FW is not included CLM data -----\n",
5213 __FUNCTION__));
5214 return FALSE;
5215 }
5216 DHD_ERROR(("%s: ----- This FW is included CLM data -----\n",
5217 __FUNCTION__));
5218 return TRUE;
5219 }
5220
5221 int
5222 dhd_apply_default_clm(dhd_pub_t *dhd, char *clm_path)
5223 {
5224 char *clm_blob_path;
5225 int len;
5226 char *memblock = NULL;
5227 int err = BCME_OK;
5228 char iovbuf[WLC_IOCTL_SMLEN];
5229 int status = FALSE;
5230
5231 if (clm_path[0] != '\0') {
5232 if (strlen(clm_path) > MOD_PARAM_PATHLEN) {
5233 DHD_ERROR(("clm path exceeds max len\n"));
5234 return BCME_ERROR;
5235 }
5236 clm_blob_path = clm_path;
5237 DHD_TRACE(("clm path from module param:%s\n", clm_path));
5238 } else {
5239 clm_blob_path = VENDOR_PATH CONFIG_BCMDHD_CLM_PATH;
5240 }
5241
5242 /* If CLM blob file is found on the filesystem, download the file.
5243 * After CLM file download or If the blob file is not present,
5244 * validate the country code before proceeding with the initialization.
5245 * If country code is not valid, fail the initialization.
5246 */
5247 memblock = dhd_os_open_image1(dhd, (char *)clm_blob_path);
5248 if (memblock == NULL) {
5249 #if defined(DHD_BLOB_EXISTENCE_CHECK)
5250 if (dhd->is_blob) {
5251 err = BCME_ERROR;
5252 } else {
5253 status = dhd_check_current_clm_data(dhd);
5254 if (status == TRUE) {
5255 err = BCME_OK;
5256 } else {
5257 err = status;
5258 }
5259 }
5260 #endif /* DHD_BLOB_EXISTENCE_CHECK */
5261 goto exit;
5262 }
5263
5264 len = dhd_os_get_image_size(memblock);
5265
5266 if ((len > 0) && (len < MAX_CLM_BUF_SIZE) && memblock) {
5267 status = dhd_check_current_clm_data(dhd);
5268 if (status == TRUE) {
5269 #if defined(DHD_BLOB_EXISTENCE_CHECK)
5270 if (dhd->op_mode != DHD_FLAG_MFG_MODE) {
5271 if (dhd->is_blob) {
5272 err = BCME_ERROR;
5273 }
5274 goto exit;
5275 }
5276 #else
5277 DHD_ERROR(("%s: CLM already exist in F/W, "
5278 "new CLM data will be added to the end of existing CLM data!\n",
5279 __FUNCTION__));
5280 #endif /* DHD_BLOB_EXISTENCE_CHECK */
5281 } else if (status != FALSE) {
5282 err = status;
5283 goto exit;
5284 }
5285
5286 /* Found blob file. Download the file */
5287 DHD_TRACE(("clm file download from %s \n", clm_blob_path));
5288 err = dhd_download_blob(dhd, (unsigned char*)memblock, len, "clmload");
5289 if (err) {
5290 DHD_ERROR(("%s: CLM download failed err=%d\n", __FUNCTION__, err));
5291 /* Retrieve clmload_status and print */
5292 memset(iovbuf, 0, sizeof(iovbuf));
5293 len = bcm_mkiovar("clmload_status", NULL, 0, iovbuf, sizeof(iovbuf));
5294 if (len == 0) {
5295 err = BCME_BUFTOOSHORT;
5296 goto exit;
5297 }
5298 err = dhd_wl_ioctl_cmd(dhd, WLC_GET_VAR, iovbuf, sizeof(iovbuf), FALSE, 0);
5299 if (err) {
5300 DHD_ERROR(("%s: clmload_status get failed err=%d \n",
5301 __FUNCTION__, err));
5302 } else {
5303 DHD_ERROR(("%s: clmload_status: %d \n",
5304 __FUNCTION__, *((int *)iovbuf)));
5305 if (*((int *)iovbuf) == CHIPID_MISMATCH) {
5306 DHD_ERROR(("Chip ID mismatch error \n"));
5307 }
5308 }
5309 err = BCME_ERROR;
5310 goto exit;
5311 } else {
5312 DHD_INFO(("%s: CLM download succeeded \n", __FUNCTION__));
5313 }
5314 } else {
5315 DHD_INFO(("Skipping the clm download. len:%d memblk:%p \n", len, memblock));
5316 #ifdef DHD_USE_CLMINFO_PARSER
5317 err = BCME_ERROR;
5318 goto exit;
5319 #endif /* DHD_USE_CLMINFO_PARSER */
5320 }
5321
5322 /* Verify country code */
5323 status = dhd_check_current_clm_data(dhd);
5324
5325 if (status != TRUE) {
5326 /* Country code not initialized or CLM download not proper */
5327 DHD_ERROR(("country code not initialized\n"));
5328 err = status;
5329 }
5330 exit:
5331
5332 if (memblock) {
5333 dhd_os_close_image1(dhd, memblock);
5334 }
5335
5336 return err;
5337 }
5338
5339 #ifdef DHD_USE_CLMINFO_PARSER
5340 #ifdef CUSTOMER_HW4
5341 #ifdef PLATFORM_SLP
5342 #define CLMINFO_PATH PLATFORM_PATH".clminfo"
5343 #else
5344 #define CLMINFO_PATH VENDOR_PATH"/etc/wifi/.clminfo"
5345 #endif /* PLATFORM_SLP */
5346 #else
5347 #define CLMINFO_PATH "/installmedia/.clminfo"
5348 #endif /* CUSTOMER_HW4 */
5349
5350 extern struct cntry_locales_custom translate_custom_table[NUM_OF_COUNTRYS];
5351
5352 unsigned int
5353 process_clarification_vars(char *varbuf, unsigned int varbuf_size)
5354 {
5355 char *dp;
5356 bool findNewline;
5357 int column;
5358 unsigned int buf_len, len;
5359
5360 dp = varbuf;
5361
5362 findNewline = FALSE;
5363 column = 0;
5364
5365 for (len = 0; len < varbuf_size; len++) {
5366 if ((varbuf[len] == '\r') || (varbuf[len] == ' ')) {
5367 continue;
5368 }
5369 if (findNewline && varbuf[len] != '\n') {
5370 continue;
5371 }
5372 findNewline = FALSE;
5373 if (varbuf[len] == '#') {
5374 findNewline = TRUE;
5375 continue;
5376 }
5377 if (varbuf[len] == '\n') {
5378 if (column == 0) {
5379 continue;
5380 }
5381 column = 0;
5382 continue;
5383 }
5384 *dp++ = varbuf[len];
5385 column++;
5386 }
5387 buf_len = (unsigned int)(dp - varbuf);
5388
5389 while (dp < varbuf + len)
5390 *dp++ = 0;
5391
5392 return buf_len;
5393 }
5394
5395 int
5396 dhd_get_clminfo(dhd_pub_t *dhd, char *clm_path)
5397 {
5398 int bcmerror = BCME_OK;
5399 char *clminfo_path = CLMINFO_PATH;
5400
5401 char *memblock = NULL;
5402 char *bufp;
5403 uint len = MAX_CLMINFO_BUF_SIZE;
5404 uint str_ln;
5405 char *tokenp = NULL;
5406 int cnt = 0;
5407 char *temp_buf = NULL;
5408 char tokdelim;
5409 int parse_step = 0;
5410
5411 char *clm_blob_vendor_path = VENDOR_PATH;
5412 char *clm_blob_path = NULL;
5413 int clm_blob_path_len = 0;
5414
5415 /* Clears clm_path and translate_custom_table */
5416 memset(clm_path, 0, MOD_PARAM_PATHLEN);
5417 memset(translate_custom_table, 0, sizeof(translate_custom_table));
5418
5419 /*
5420 * Read clm info from the .clminfo file
5421 * 1st line : CLM blob file path
5422 * 2nd ~ end of line: Country locales table
5423 */
5424 if (dhd_get_download_buffer(dhd, clminfo_path, CLMINFO, &memblock, &len) != 0) {
5425 DHD_ERROR(("%s: Cannot open .clminfo file\n", __FUNCTION__));
5426 bcmerror = BCME_ERROR;
5427 dhd->is_clm_mult_regrev = FALSE;
5428 goto out;
5429 }
5430
5431 dhd->is_clm_mult_regrev = TRUE;
5432
5433 if ((len > 0) && (len < MAX_CLMINFO_BUF_SIZE) && memblock) {
5434 /* Found clminfo file. Parsing the file */
5435 DHD_INFO(("clminfo file parsing from %s \n", clminfo_path));
5436
5437 bufp = (char *) memblock;
5438 bufp[len] = 0;
5439
5440 /* clean up the file */
5441 len = process_clarification_vars(bufp, len);
5442
5443 tokenp = bcmstrtok(&bufp, "=", &tokdelim);
5444 /* reduce the len of bufp by token byte(1) and ptr length */
5445 len -= (strlen(tokenp) + 1);
5446
5447 if (strncmp(tokenp, "clm_path", 8) != 0) {
5448 DHD_ERROR(("%s: Cannot found clm_path\n", __FUNCTION__));
5449 bcmerror = BCME_ERROR;
5450 goto out;
5451 }
5452 temp_buf = bcmstrtok(&bufp, ";", &tokdelim);
5453 str_ln = strlen(temp_buf);
5454 /* read clm_path */
5455 strncpy(clm_path, temp_buf, str_ln);
5456 len -= (strlen(clm_path) + 1);
5457
5458 clm_blob_path_len = strlen(clm_path);
5459 clm_blob_path = (char *)MALLOCZ(dhd->osh, clm_blob_path_len);
5460 if (clm_blob_path == NULL) {
5461 bcmerror = BCME_NOMEM;
5462 DHD_ERROR(("%s: Failed to allocate memory!\n", __FUNCTION__));
5463 goto out;
5464 }
5465 memset(clm_blob_path, 0, clm_blob_path_len);
5466 strncpy(clm_blob_path, clm_path, strlen(clm_path));
5467
5468 /* Concannate VENDOR_PATH + CLM_PATH */
5469 memset(clm_path, 0, MOD_PARAM_PATHLEN);
5470 snprintf(clm_path, (int)strlen(clm_blob_vendor_path) + clm_blob_path_len + 1,
5471 "%s%s", clm_blob_vendor_path, clm_blob_path);
5472 clm_path[strlen(clm_path)] = '\0';
5473
5474 DHD_INFO(("%s: Found clm_path %s\n", __FUNCTION__, clm_path));
5475
5476 if (len <= 0) {
5477 DHD_ERROR(("%s: Length is invalid\n", __FUNCTION__));
5478 bcmerror = BCME_ERROR;
5479 goto out;
5480 }
5481
5482 /* reserved relocale map[0] to XZ/11 */
5483 memcpy(translate_custom_table[cnt].custom_locale, "XZ", strlen("XZ"));
5484 translate_custom_table[cnt].custom_locale_rev = 11;
5485 DHD_INFO(("%s: Relocale map - iso_aabrev %s custom locale %s "
5486 "custom locale rev %d\n",
5487 __FUNCTION__,
5488 translate_custom_table[cnt].iso_abbrev,
5489 translate_custom_table[cnt].custom_locale,
5490 translate_custom_table[cnt].custom_locale_rev));
5491
5492 cnt++;
5493
5494 /* start parsing relocale map */
5495 do {
5496
5497 if ((bufp[0] == 0) && (len > 0)) {
5498 DHD_ERROR(("%s: First byte is NULL character\n", __FUNCTION__));
5499 bcmerror = BCME_ERROR;
5500 goto out;
5501 }
5502 if ((bufp[0] == '=') || (bufp[0] == '/') || (bufp[0] == ';')) {
5503 DHD_ERROR(("%s: Data is invalid\n", __FUNCTION__));
5504 bcmerror = BCME_ERROR;
5505 goto out;
5506 }
5507
5508 /* parsing relocale data */
5509 tokenp = bcmstrtok(&bufp, "=/;", &tokdelim);
5510 len -= (strlen(tokenp) + 1);
5511
5512 if ((parse_step == 0) && (tokdelim == '=')) {
5513 memcpy(translate_custom_table[cnt].iso_abbrev,
5514 tokenp, strlen(tokenp));
5515 parse_step++;
5516 } else if ((parse_step == 1) && (tokdelim == '/')) {
5517 memcpy(translate_custom_table[cnt].custom_locale,
5518 tokenp, strlen(tokenp));
5519 parse_step++;
5520 } else if ((parse_step == 2) && (tokdelim == ';')) {
5521 char *str, *endptr = NULL;
5522 int locale_rev;
5523
5524 str = tokenp;
5525 locale_rev = (int)strtoul(str, &endptr, 0);
5526 if (*endptr != 0) {
5527 bcmerror = BCME_ERROR;
5528 goto out;
5529 }
5530
5531 translate_custom_table[cnt].custom_locale_rev = locale_rev;
5532
5533 DHD_INFO(("%s: Relocale map - iso_aabrev %s"
5534 " custom locale %s custom locale rev %d\n",
5535 __FUNCTION__,
5536 translate_custom_table[cnt].iso_abbrev,
5537 translate_custom_table[cnt].custom_locale,
5538 translate_custom_table[cnt].custom_locale_rev));
5539
5540 parse_step = 0;
5541 cnt++;
5542 } else {
5543 DHD_ERROR(("%s: CLM info data format is invalid\n", __FUNCTION__));
5544 bcmerror = BCME_ERROR;
5545 goto out;
5546 }
5547
5548 } while (len > 0);
5549 }
5550 out:
5551 if (clm_blob_path) {
5552 MFREE(dhd->osh, clm_blob_path, clm_blob_path_len);
5553 }
5554 if (memblock) {
5555 dhd_free_download_buffer(dhd, memblock, MAX_CLMINFO_BUF_SIZE);
5556 }
5557 if (bcmerror != BCME_OK) {
5558 DHD_ERROR(("%s: .clminfo parsing fail!!\n", __FUNCTION__));
5559 }
5560
5561 return bcmerror;
5562 }
5563 #endif /* DHD_USE_CLMINFO_PARSER */
5564
5565 void dhd_free_download_buffer(dhd_pub_t *dhd, void *buffer, int length)
5566 {
5567 MFREE(dhd->osh, buffer, length);
5568 }
5569
5570 /* Parse EAPOL 4 way handshake messages */
5571 int
5572 dhd_check_eapol_4way_message(char *dump_data)
5573 {
5574 unsigned char type;
5575 int pair, ack, mic, kerr, req, sec, install;
5576 unsigned short us_tmp;
5577 type = dump_data[18];
5578 if (type == 2) {
5579 us_tmp = (dump_data[19] << 8) | dump_data[20];
5580 pair = 0 != (us_tmp & 0x08);
5581 ack = 0 != (us_tmp & 0x80);
5582 mic = 0 != (us_tmp & 0x100);
5583 kerr = 0 != (us_tmp & 0x400);
5584 req = 0 != (us_tmp & 0x800);
5585 sec = 0 != (us_tmp & 0x200);
5586 install = 0 != (us_tmp & 0x40);
5587 if (!sec && !mic && ack && !install && pair && !kerr && !req) {
5588 return EAPOL_4WAY_M1;
5589 } else if (pair && !install && !ack && mic && !sec && !kerr && !req) {
5590 return EAPOL_4WAY_M2;
5591 } else if (pair && ack && mic && sec && !kerr && !req) {
5592 return EAPOL_4WAY_M3;
5593 } else if (pair && !install && !ack && mic && sec && !req && !kerr) {
5594 return EAPOL_4WAY_M4;
5595 } else {
5596 return 0;
5597 }
5598 }
5599
5600 return 0;
5601 }
5602
5603 #if defined(DHD_8021X_DUMP)
5604 #define EAP_PRINT(str) \
5605 DHD_ERROR(("ETHER_TYPE_802_1X[%s] [%s]: " str "\n", \
5606 ifname, direction ? "TX" : "RX"));
5607 /* Parse EAPOL 4 way handshake messages */
5608 void
5609 dhd_dump_eapol_4way_message(char *ifname, unsigned char *dump_data, bool direction)
5610 {
5611 unsigned char type;
5612
5613 type = dump_data[15];
5614 if (type == 0) {
5615 if ((dump_data[22] == 1) && (dump_data[18] == 1)) {
5616 EAP_PRINT("EAP Packet, Request, Identity");
5617 } else if ((dump_data[22] == 1) && (dump_data[18] == 2)) {
5618 EAP_PRINT("EAP Packet, Response, Identity");
5619 } else if (dump_data[22] == 254) {
5620 if (dump_data[30] == 1) {
5621 EAP_PRINT("EAP Packet, WSC Start");
5622 } else if (dump_data[30] == 4) {
5623 if (dump_data[41] == 4) {
5624 EAP_PRINT("EAP Packet, WPS M1");
5625 } else if (dump_data[41] == 5) {
5626 EAP_PRINT("EAP Packet, WPS M2");
5627 } else if (dump_data[41] == 7) {
5628 EAP_PRINT("EAP Packet, WPS M3");
5629 } else if (dump_data[41] == 8) {
5630 EAP_PRINT("EAP Packet, WPS M4");
5631 } else if (dump_data[41] == 9) {
5632 EAP_PRINT("EAP Packet, WPS M5");
5633 } else if (dump_data[41] == 10) {
5634 EAP_PRINT("EAP Packet, WPS M6");
5635 } else if (dump_data[41] == 11) {
5636 EAP_PRINT("EAP Packet, WPS M7");
5637 } else if (dump_data[41] == 12) {
5638 EAP_PRINT("EAP Packet, WPS M8");
5639 }
5640 } else if (dump_data[30] == 5) {
5641 EAP_PRINT("EAP Packet, WSC Done");
5642 }
5643 } else {
5644 DHD_ERROR(("ETHER_TYPE_802_1X[%s] [%s]: ver %d, type %d, replay %d\n",
5645 ifname, direction ? "TX" : "RX",
5646 dump_data[14], dump_data[15], dump_data[30]));
5647 }
5648 } else if (type == 3 && dump_data[18] == 2) {
5649 switch (dhd_check_eapol_4way_message(dump_data)) {
5650 case EAPOL_4WAY_M1:
5651 EAP_PRINT("EAPOL Packet, 4-way handshake, M1");
5652 break;
5653 case EAPOL_4WAY_M2:
5654 EAP_PRINT("EAPOL Packet, 4-way handshake, M2");
5655 break;
5656 case EAPOL_4WAY_M3:
5657 EAP_PRINT("EAPOL Packet, 4-way handshake, M3");
5658 break;
5659 case EAPOL_4WAY_M4:
5660 EAP_PRINT("EAPOL Packet, 4-way handshake, M4");
5661 break;
5662 default:
5663 DHD_ERROR(("ETHER_TYPE_802_1X[%s] [%s]: ver %d, type %d, replay %d\n",
5664 ifname, direction ? "TX" : "RX",
5665 dump_data[14], dump_data[15], dump_data[30]));
5666 }
5667 } else {
5668 DHD_ERROR(("ETHER_TYPE_802_1X[%s] [%s]: ver %d, type %d, replay %d\n",
5669 ifname, direction ? "TX" : "RX",
5670 dump_data[14], dump_data[15], dump_data[30]));
5671 }
5672 }
5673 #endif /* DHD_8021X_DUMP */
5674
5675 #ifdef SHOW_LOGTRACE
5676 int
5677 dhd_parse_logstrs_file(osl_t *osh, char *raw_fmts, int logstrs_size,
5678 dhd_event_log_t *event_log)
5679 {
5680 uint32 *lognums = NULL;
5681 char *logstrs = NULL;
5682 logstr_trailer_t *trailer = NULL;
5683 int ram_index = 0;
5684 char **fmts = NULL;
5685 int num_fmts = 0;
5686 bool match_fail = TRUE;
5687 int32 i = 0;
5688 uint8 *pfw_id = NULL;
5689 uint32 fwid = 0;
5690 void *file = NULL;
5691 int file_len = 0;
5692 char fwid_str[64];
5693 uint32 hdr_logstrs_size = 0;
5694
5695 /* Read last three words in the logstrs.bin file */
5696 trailer = (logstr_trailer_t *) (raw_fmts + logstrs_size -
5697 sizeof(logstr_trailer_t));
5698
5699 if (trailer->log_magic == LOGSTRS_MAGIC) {
5700 /*
5701 * logstrs.bin has a header.
5702 */
5703 if (trailer->version == 1) {
5704 logstr_header_v1_t *hdr_v1 = (logstr_header_v1_t *) (raw_fmts +
5705 logstrs_size - sizeof(logstr_header_v1_t));
5706 DHD_INFO(("%s: logstr header version = %u\n",
5707 __FUNCTION__, hdr_v1->version));
5708 num_fmts = hdr_v1->rom_logstrs_offset / sizeof(uint32);
5709 ram_index = (hdr_v1->ram_lognums_offset -
5710 hdr_v1->rom_lognums_offset) / sizeof(uint32);
5711 lognums = (uint32 *) &raw_fmts[hdr_v1->rom_lognums_offset];
5712 logstrs = (char *) &raw_fmts[hdr_v1->rom_logstrs_offset];
5713 hdr_logstrs_size = hdr_v1->logstrs_size;
5714 } else if (trailer->version == 2) {
5715 logstr_header_t *hdr = (logstr_header_t *) (raw_fmts + logstrs_size -
5716 sizeof(logstr_header_t));
5717 DHD_INFO(("%s: logstr header version = %u; flags = %x\n",
5718 __FUNCTION__, hdr->trailer.version, hdr->trailer.flags));
5719
5720 /* For ver. 2 of the header, need to match fwid of
5721 * both logstrs.bin and fw bin
5722 */
5723
5724 /* read the FWID from fw bin */
5725 file = dhd_os_open_image1(NULL, st_str_file_path);
5726 if (!file) {
5727 DHD_ERROR(("%s: cannot open fw file !\n", __FUNCTION__));
5728 goto error;
5729 }
5730 file_len = dhd_os_get_image_size(file);
5731 if (file_len <= 0) {
5732 DHD_ERROR(("%s: bad fw file length !\n", __FUNCTION__));
5733 goto error;
5734 }
5735 /* fwid is at the end of fw bin in string format */
5736 if (dhd_os_seek_file(file, file_len - 32) < 0) {
5737 DHD_ERROR(("%s: can't seek file \n", __FUNCTION__));
5738 goto error;
5739 }
5740
5741 memset(fwid_str, 0, 64);
5742 if (dhd_os_get_image_block(fwid_str, 32, file) <= 0) {
5743 DHD_ERROR(("%s: read fw file failed !\n", __FUNCTION__));
5744 goto error;
5745 }
5746 pfw_id = (uint8 *)bcmstrnstr(fwid_str, 64, "FWID: 01-", 9);
5747 if (!pfw_id) {
5748 DHD_ERROR(("%s: could not find id in FW bin!\n", __FUNCTION__));
5749 goto error;
5750 }
5751 /* search for the '-' in the fw id str, after which the
5752 * actual 4 byte fw id is present
5753 */
5754 while (pfw_id && *pfw_id != '-') {
5755 ++pfw_id;
5756 }
5757 ++pfw_id;
5758 fwid = bcm_strtoul((char *)pfw_id, NULL, 16);
5759
5760 /* check if fw id in logstrs.bin matches the fw one */
5761 if (hdr->trailer.fw_id != fwid) {
5762 DHD_ERROR(("%s: logstr id does not match FW!\n", __FUNCTION__));
5763 goto error;
5764 }
5765
5766 match_fail = FALSE;
5767 num_fmts = hdr->rom_logstrs_offset / sizeof(uint32);
5768 ram_index = (hdr->ram_lognums_offset -
5769 hdr->rom_lognums_offset) / sizeof(uint32);
5770 lognums = (uint32 *) &raw_fmts[hdr->rom_lognums_offset];
5771 logstrs = (char *) &raw_fmts[hdr->rom_logstrs_offset];
5772 hdr_logstrs_size = hdr->logstrs_size;
5773
5774 error:
5775 if (file) {
5776 dhd_os_close_image1(NULL, file);
5777 }
5778 if (match_fail) {
5779 return BCME_DECERR;
5780 }
5781 } else {
5782 DHD_ERROR(("%s: Invalid logstr version %u\n", __FUNCTION__,
5783 trailer->version));
5784 return BCME_ERROR;
5785 }
5786 if (logstrs_size != hdr_logstrs_size) {
5787 DHD_ERROR(("%s: bad logstrs_size %d\n", __FUNCTION__, hdr_logstrs_size));
5788 return BCME_ERROR;
5789 }
5790 } else {
5791 /*
5792 * Legacy logstrs.bin format without header.
5793 */
5794 num_fmts = *((uint32 *) (raw_fmts)) / sizeof(uint32);
5795
5796 /* Legacy RAM-only logstrs.bin format:
5797 * - RAM 'lognums' section
5798 * - RAM 'logstrs' section.
5799 *
5800 * 'lognums' is an array of indexes for the strings in the
5801 * 'logstrs' section. The first uint32 is an index to the
5802 * start of 'logstrs'. Therefore, if this index is divided
5803 * by 'sizeof(uint32)' it provides the number of logstr
5804 * entries.
5805 */
5806 ram_index = 0;
5807 lognums = (uint32 *) raw_fmts;
5808 logstrs = (char *) &raw_fmts[num_fmts << 2];
5809 }
5810 if (num_fmts)
5811 fmts = MALLOC(osh, num_fmts * sizeof(char *));
5812 if (fmts == NULL) {
5813 DHD_ERROR(("%s: Failed to allocate fmts memory\n", __FUNCTION__));
5814 return BCME_ERROR;
5815 }
5816 event_log->fmts_size = num_fmts * sizeof(char *);
5817
5818 for (i = 0; i < num_fmts; i++) {
5819 /* ROM lognums index into logstrs using 'rom_logstrs_offset' as a base
5820 * (they are 0-indexed relative to 'rom_logstrs_offset').
5821 *
5822 * RAM lognums are already indexed to point to the correct RAM logstrs (they
5823 * are 0-indexed relative to the start of the logstrs.bin file).
5824 */
5825 if (i == ram_index) {
5826 logstrs = raw_fmts;
5827 }
5828 fmts[i] = &logstrs[lognums[i]];
5829 }
5830 event_log->fmts = fmts;
5831 event_log->raw_fmts_size = logstrs_size;
5832 event_log->raw_fmts = raw_fmts;
5833 event_log->num_fmts = num_fmts;
5834 return BCME_OK;
5835 } /* dhd_parse_logstrs_file */
5836
5837 int dhd_parse_map_file(osl_t *osh, void *file, uint32 *ramstart, uint32 *rodata_start,
5838 uint32 *rodata_end)
5839 {
5840 char *raw_fmts = NULL, *raw_fmts_loc = NULL;
5841 uint32 read_size = READ_NUM_BYTES;
5842 int error = 0;
5843 char * cptr = NULL;
5844 char c;
5845 uint8 count = 0;
5846
5847 *ramstart = 0;
5848 *rodata_start = 0;
5849 *rodata_end = 0;
5850
5851 /* Allocate 1 byte more than read_size to terminate it with NULL */
5852 raw_fmts = MALLOCZ(osh, read_size + 1);
5853 if (raw_fmts == NULL) {
5854 DHD_ERROR(("%s: Failed to allocate raw_fmts memory \n", __FUNCTION__));
5855 goto fail;
5856 }
5857
5858 /* read ram start, rodata_start and rodata_end values from map file */
5859 while (count != ALL_MAP_VAL)
5860 {
5861 error = dhd_os_read_file(file, raw_fmts, read_size);
5862 if (error < 0) {
5863 DHD_ERROR(("%s: map file read failed err:%d \n", __FUNCTION__,
5864 error));
5865 goto fail;
5866 }
5867
5868 /* End raw_fmts with NULL as strstr expects NULL terminated strings */
5869 raw_fmts[read_size] = '\0';
5870
5871 /* Get ramstart address */
5872 raw_fmts_loc = raw_fmts;
5873 if (!(count & RAMSTART_BIT) &&
5874 (cptr = bcmstrnstr(raw_fmts_loc, read_size, ramstart_str,
5875 strlen(ramstart_str)))) {
5876 cptr = cptr - BYTES_AHEAD_NUM;
5877 sscanf(cptr, "%x %c text_start", ramstart, &c);
5878 count |= RAMSTART_BIT;
5879 }
5880
5881 /* Get ram rodata start address */
5882 raw_fmts_loc = raw_fmts;
5883 if (!(count & RDSTART_BIT) &&
5884 (cptr = bcmstrnstr(raw_fmts_loc, read_size, rodata_start_str,
5885 strlen(rodata_start_str)))) {
5886 cptr = cptr - BYTES_AHEAD_NUM;
5887 sscanf(cptr, "%x %c rodata_start", rodata_start, &c);
5888 count |= RDSTART_BIT;
5889 }
5890
5891 /* Get ram rodata end address */
5892 raw_fmts_loc = raw_fmts;
5893 if (!(count & RDEND_BIT) &&
5894 (cptr = bcmstrnstr(raw_fmts_loc, read_size, rodata_end_str,
5895 strlen(rodata_end_str)))) {
5896 cptr = cptr - BYTES_AHEAD_NUM;
5897 sscanf(cptr, "%x %c rodata_end", rodata_end, &c);
5898 count |= RDEND_BIT;
5899 }
5900
5901 if (error < (int)read_size) {
5902 /*
5903 * since we reset file pos back to earlier pos by
5904 * GO_BACK_FILE_POS_NUM_BYTES bytes we won't reach EOF.
5905 * The reason for this is if string is spreaded across
5906 * bytes, the read function should not miss it.
5907 * So if ret value is less than read_size, reached EOF don't read further
5908 */
5909 break;
5910 }
5911 memset(raw_fmts, 0, read_size);
5912 /*
5913 * go back to predefined NUM of bytes so that we won't miss
5914 * the string and addr even if it comes as splited in next read.
5915 */
5916 dhd_os_seek_file(file, -GO_BACK_FILE_POS_NUM_BYTES);
5917 }
5918
5919 fail:
5920 if (raw_fmts) {
5921 MFREE(osh, raw_fmts, read_size + 1);
5922 raw_fmts = NULL;
5923 }
5924 if (count == ALL_MAP_VAL) {
5925 return BCME_OK;
5926 }
5927 else {
5928 DHD_ERROR(("%s: readmap error 0X%x \n", __FUNCTION__,
5929 count));
5930 return BCME_ERROR;
5931 }
5932
5933 } /* dhd_parse_map_file */
5934
5935 #ifdef PCIE_FULL_DONGLE
5936 int
5937 dhd_event_logtrace_infobuf_pkt_process(dhd_pub_t *dhdp, void *pktbuf,
5938 dhd_event_log_t *event_data)
5939 {
5940 uint32 infobuf_version;
5941 info_buf_payload_hdr_t *payload_hdr_ptr;
5942 uint16 payload_hdr_type;
5943 uint16 payload_hdr_length;
5944
5945 DHD_TRACE(("%s:Enter\n", __FUNCTION__));
5946
5947 if (PKTLEN(dhdp->osh, pktbuf) < sizeof(uint32)) {
5948 DHD_ERROR(("%s: infobuf too small for version field\n",
5949 __FUNCTION__));
5950 goto exit;
5951 }
5952 infobuf_version = *((uint32 *)PKTDATA(dhdp->osh, pktbuf));
5953 PKTPULL(dhdp->osh, pktbuf, sizeof(uint32));
5954 if (infobuf_version != PCIE_INFOBUF_V1) {
5955 DHD_ERROR(("%s: infobuf version %d is not PCIE_INFOBUF_V1\n",
5956 __FUNCTION__, infobuf_version));
5957 goto exit;
5958 }
5959
5960 /* Version 1 infobuf has a single type/length (and then value) field */
5961 if (PKTLEN(dhdp->osh, pktbuf) < sizeof(info_buf_payload_hdr_t)) {
5962 DHD_ERROR(("%s: infobuf too small for v1 type/length fields\n",
5963 __FUNCTION__));
5964 goto exit;
5965 }
5966 /* Process/parse the common info payload header (type/length) */
5967 payload_hdr_ptr = (info_buf_payload_hdr_t *)PKTDATA(dhdp->osh, pktbuf);
5968 payload_hdr_type = ltoh16(payload_hdr_ptr->type);
5969 payload_hdr_length = ltoh16(payload_hdr_ptr->length);
5970 if (payload_hdr_type != PCIE_INFOBUF_V1_TYPE_LOGTRACE) {
5971 DHD_ERROR(("%s: payload_hdr_type %d is not V1_TYPE_LOGTRACE\n",
5972 __FUNCTION__, payload_hdr_type));
5973 goto exit;
5974 }
5975 PKTPULL(dhdp->osh, pktbuf, sizeof(info_buf_payload_hdr_t));
5976
5977 /* Validate that the specified length isn't bigger than the
5978 * provided data.
5979 */
5980 if (payload_hdr_length > PKTLEN(dhdp->osh, pktbuf)) {
5981 DHD_ERROR(("%s: infobuf logtrace length is bigger"
5982 " than actual buffer data\n", __FUNCTION__));
5983 goto exit;
5984 }
5985 dhd_dbg_trace_evnt_handler(dhdp, PKTDATA(dhdp->osh, pktbuf),
5986 event_data, payload_hdr_length);
5987
5988 return BCME_OK;
5989
5990 exit:
5991 return BCME_ERROR;
5992 } /* dhd_event_logtrace_infobuf_pkt_process */
5993 #endif /* PCIE_FULL_DONGLE */
5994 #endif /* SHOW_LOGTRACE */
5995
5996 #if defined(WLTDLS) && defined(PCIE_FULL_DONGLE)
5997
5998 /* To handle the TDLS event in the dhd_common.c
5999 */
6000 int dhd_tdls_event_handler(dhd_pub_t *dhd_pub, wl_event_msg_t *event)
6001 {
6002 int ret = BCME_OK;
6003 #if defined(STRICT_GCC_WARNINGS) && defined(__GNUC__)
6004 #pragma GCC diagnostic push
6005 #pragma GCC diagnostic ignored "-Wcast-qual"
6006 #endif // endif
6007 ret = dhd_tdls_update_peer_info(dhd_pub, event);
6008 #if defined(STRICT_GCC_WARNINGS) && defined(__GNUC__)
6009 #pragma GCC diagnostic pop
6010 #endif // endif
6011 return ret;
6012 }
6013
6014 int dhd_free_tdls_peer_list(dhd_pub_t *dhd_pub)
6015 {
6016 tdls_peer_node_t *cur = NULL, *prev = NULL;
6017 if (!dhd_pub)
6018 return BCME_ERROR;
6019 cur = dhd_pub->peer_tbl.node;
6020
6021 if ((dhd_pub->peer_tbl.node == NULL) && !dhd_pub->peer_tbl.tdls_peer_count)
6022 return BCME_ERROR;
6023
6024 while (cur != NULL) {
6025 prev = cur;
6026 cur = cur->next;
6027 MFREE(dhd_pub->osh, prev, sizeof(tdls_peer_node_t));
6028 }
6029 dhd_pub->peer_tbl.tdls_peer_count = 0;
6030 dhd_pub->peer_tbl.node = NULL;
6031 return BCME_OK;
6032 }
6033 #endif /* #if defined(WLTDLS) && defined(PCIE_FULL_DONGLE) */
6034
6035 /* pretty hex print a contiguous buffer
6036 * based on the debug level specified
6037 */
6038 void
6039 dhd_prhex(const char *msg, volatile uchar *buf, uint nbytes, uint8 dbg_level)
6040 {
6041 char line[128], *p;
6042 int len = sizeof(line);
6043 int nchar;
6044 uint i;
6045
6046 if (msg && (msg[0] != '\0')) {
6047 if (dbg_level == DHD_ERROR_VAL)
6048 DHD_ERROR(("%s:\n", msg));
6049 else if (dbg_level == DHD_INFO_VAL)
6050 DHD_INFO(("%s:\n", msg));
6051 else if (dbg_level == DHD_TRACE_VAL)
6052 DHD_TRACE(("%s:\n", msg));
6053 }
6054
6055 p = line;
6056 for (i = 0; i < nbytes; i++) {
6057 if (i % 16 == 0) {
6058 nchar = snprintf(p, len, " %04x: ", i); /* line prefix */
6059 p += nchar;
6060 len -= nchar;
6061 }
6062 if (len > 0) {
6063 nchar = snprintf(p, len, "%02x ", buf[i]);
6064 p += nchar;
6065 len -= nchar;
6066 }
6067
6068 if (i % 16 == 15) {
6069 /* flush line */
6070 if (dbg_level == DHD_ERROR_VAL)
6071 DHD_ERROR(("%s:\n", line));
6072 else if (dbg_level == DHD_INFO_VAL)
6073 DHD_INFO(("%s:\n", line));
6074 else if (dbg_level == DHD_TRACE_VAL)
6075 DHD_TRACE(("%s:\n", line));
6076 p = line;
6077 len = sizeof(line);
6078 }
6079 }
6080
6081 /* flush last partial line */
6082 if (p != line) {
6083 if (dbg_level == DHD_ERROR_VAL)
6084 DHD_ERROR(("%s:\n", line));
6085 else if (dbg_level == DHD_INFO_VAL)
6086 DHD_INFO(("%s:\n", line));
6087 else if (dbg_level == DHD_TRACE_VAL)
6088 DHD_TRACE(("%s:\n", line));
6089 }
6090 }
6091
6092 #ifdef DUMP_IOCTL_IOV_LIST
6093 void
6094 dhd_iov_li_append(dhd_pub_t *dhd, dll_t *list_head, dll_t *node)
6095 {
6096 dll_t *item;
6097 dhd_iov_li_t *iov_li;
6098 dhd->dump_iovlist_len++;
6099
6100 if (dhd->dump_iovlist_len == IOV_LIST_MAX_LEN+1) {
6101 item = dll_head_p(list_head);
6102 iov_li = (dhd_iov_li_t *)CONTAINEROF(item, dhd_iov_li_t, list);
6103 dll_delete(item);
6104 MFREE(dhd->osh, iov_li, sizeof(*iov_li));
6105 dhd->dump_iovlist_len--;
6106 }
6107 dll_append(list_head, node);
6108 }
6109
6110 void
6111 dhd_iov_li_print(dll_t *list_head)
6112 {
6113 dhd_iov_li_t *iov_li;
6114 dll_t *item, *next;
6115 uint8 index = 0;
6116 for (item = dll_head_p(list_head); !dll_end(list_head, item); item = next) {
6117 next = dll_next_p(item);
6118 iov_li = (dhd_iov_li_t *)CONTAINEROF(item, dhd_iov_li_t, list);
6119 DHD_ERROR(("%d:cmd_name = %s, cmd = %d.\n", ++index, iov_li->buff, iov_li->cmd));
6120 }
6121 }
6122
6123 void
6124 dhd_iov_li_delete(dhd_pub_t *dhd, dll_t *list_head)
6125 {
6126 dll_t *item;
6127 dhd_iov_li_t *iov_li;
6128 while (!(dll_empty(list_head))) {
6129 item = dll_head_p(list_head);
6130 iov_li = (dhd_iov_li_t *)CONTAINEROF(item, dhd_iov_li_t, list);
6131 dll_delete(item);
6132 MFREE(dhd->osh, iov_li, sizeof(*iov_li));
6133 }
6134 }
6135 #endif /* DUMP_IOCTL_IOV_LIST */
6136
6137 /* configuations of ecounters to be enabled by default in FW */
6138 static ecounters_cfg_t ecounters_cfg_tbl[] = {
6139 /* Global ecounters */
6140 {ECOUNTERS_STATS_TYPES_FLAG_GLOBAL, 0x0, WL_IFSTATS_XTLV_BUS_PCIE},
6141 // {ECOUNTERS_STATS_TYPES_FLAG_GLOBAL, 0x0, WL_IFSTATS_XTLV_TX_AMPDU_STATS},
6142 // {ECOUNTERS_STATS_TYPES_FLAG_GLOBAL, 0x0, WL_IFSTATS_XTLV_RX_AMPDU_STATS},
6143
6144 /* Slice specific ecounters */
6145 {ECOUNTERS_STATS_TYPES_FLAG_SLICE, 0x0, WL_SLICESTATS_XTLV_PERIODIC_STATE},
6146 {ECOUNTERS_STATS_TYPES_FLAG_SLICE, 0x1, WL_SLICESTATS_XTLV_PERIODIC_STATE},
6147 {ECOUNTERS_STATS_TYPES_FLAG_SLICE, 0x1, WL_IFSTATS_XTLV_WL_SLICE_BTCOEX},
6148
6149 /* Interface specific ecounters */
6150 {ECOUNTERS_STATS_TYPES_FLAG_IFACE, 0x0, WL_IFSTATS_XTLV_IF_PERIODIC_STATE},
6151 {ECOUNTERS_STATS_TYPES_FLAG_IFACE, 0x0, WL_IFSTATS_XTLV_GENERIC},
6152 {ECOUNTERS_STATS_TYPES_FLAG_IFACE, 0x0, WL_IFSTATS_XTLV_INFRA_SPECIFIC},
6153 {ECOUNTERS_STATS_TYPES_FLAG_IFACE, 0x0, WL_IFSTATS_XTLV_MGT_CNT},
6154
6155 /* secondary interface */
6156 };
6157
6158 static event_ecounters_cfg_t event_ecounters_cfg_tbl[] = {
6159 /* Interface specific event ecounters */
6160 {WLC_E_LINK, ECOUNTERS_STATS_TYPES_FLAG_IFACE, 0x0, WL_IFSTATS_XTLV_IF_EVENT_STATS},
6161 };
6162
6163 /* Accepts an argument to -s, -g or -f and creates an XTLV */
6164 int
6165 dhd_create_ecounters_params(dhd_pub_t *dhd, uint16 type, uint16 if_slice_idx,
6166 uint16 stats_rep, uint8 **xtlv)
6167 {
6168 uint8 *req_xtlv = NULL;
6169 ecounters_stats_types_report_req_t *req;
6170 bcm_xtlvbuf_t xtlvbuf, container_xtlvbuf;
6171 ecountersv2_xtlv_list_elt_t temp;
6172 uint16 xtlv_len = 0, total_len = 0;
6173 int rc = BCME_OK;
6174
6175 /* fill in the stat type XTLV. For now there is no explicit TLV for the stat type. */
6176 temp.id = stats_rep;
6177 temp.len = 0;
6178
6179 /* Hence len/data = 0/NULL */
6180 xtlv_len += temp.len + BCM_XTLV_HDR_SIZE;
6181
6182 /* Total length of the container */
6183 total_len = BCM_XTLV_HDR_SIZE +
6184 OFFSETOF(ecounters_stats_types_report_req_t, stats_types_req) + xtlv_len;
6185
6186 /* Now allocate a structure for the entire request */
6187 if ((req_xtlv = (uint8 *)MALLOCZ(dhd->osh, total_len)) == NULL) {
6188 rc = BCME_NOMEM;
6189 goto fail;
6190 }
6191
6192 /* container XTLV context */
6193 bcm_xtlv_buf_init(&container_xtlvbuf, (uint8 *)req_xtlv, total_len,
6194 BCM_XTLV_OPTION_ALIGN32);
6195
6196 /* Fill other XTLVs in the container. Leave space for XTLV headers */
6197 req = (ecounters_stats_types_report_req_t *)(req_xtlv + BCM_XTLV_HDR_SIZE);
6198 req->flags = type;
6199 if (type == ECOUNTERS_STATS_TYPES_FLAG_SLICE) {
6200 req->slice_mask = 0x1 << if_slice_idx;
6201 } else if (type == ECOUNTERS_STATS_TYPES_FLAG_IFACE) {
6202 req->if_index = if_slice_idx;
6203 }
6204
6205 /* Fill remaining XTLVs */
6206 bcm_xtlv_buf_init(&xtlvbuf, (uint8*) req->stats_types_req, xtlv_len,
6207 BCM_XTLV_OPTION_ALIGN32);
6208 if (bcm_xtlv_put_data(&xtlvbuf, temp.id, NULL, temp.len)) {
6209 DHD_ERROR(("Error creating XTLV for requested stats type = %d\n", temp.id));
6210 rc = BCME_ERROR;
6211 goto fail;
6212 }
6213
6214 /* fill the top level container and get done with the XTLV container */
6215 rc = bcm_xtlv_put_data(&container_xtlvbuf, WL_ECOUNTERS_XTLV_REPORT_REQ, NULL,
6216 bcm_xtlv_buf_len(&xtlvbuf) + OFFSETOF(ecounters_stats_types_report_req_t,
6217 stats_types_req));
6218
6219 if (rc) {
6220 DHD_ERROR(("Error creating parent XTLV for type = %d\n", req->flags));
6221 goto fail;
6222 }
6223
6224 fail:
6225 if (rc && req_xtlv) {
6226 MFREE(dhd->osh, req_xtlv, total_len);
6227 req_xtlv = NULL;
6228 }
6229
6230 /* update the xtlv pointer */
6231 *xtlv = req_xtlv;
6232 return rc;
6233 }
6234
6235 int
6236 dhd_get_preserve_log_numbers(dhd_pub_t *dhd, uint32 *logset_mask)
6237 {
6238 wl_el_set_type_t logset_type, logset_op;
6239 int ret = BCME_ERROR;
6240 int i = 0, err = 0;
6241
6242 if (!dhd || !logset_mask)
6243 return BCME_BADARG;
6244
6245 *logset_mask = 0;
6246 memset(&logset_type, 0, sizeof(logset_type));
6247 memset(&logset_op, 0, sizeof(logset_op));
6248 logset_type.version = htod16(EVENT_LOG_SET_TYPE_CURRENT_VERSION);
6249 logset_type.len = htod16(sizeof(wl_el_set_type_t));
6250 for (i = 0; i < WL_MAX_PRESERVE_BUFFER; i++) {
6251 logset_type.set = i;
6252 err = dhd_iovar(dhd, 0, "event_log_set_type", (char *)&logset_type,
6253 sizeof(logset_type), (char *)&logset_op, sizeof(logset_op), FALSE);
6254 /* the iovar may return 'unsupported' error if a log set number is not present
6255 * in the fw, so we should not return on error !
6256 */
6257 if (err == BCME_OK &&
6258 logset_op.type == EVENT_LOG_SET_TYPE_PRSRV) {
6259 *logset_mask |= 0x01u << i;
6260 ret = BCME_OK;
6261 }
6262 }
6263
6264 return ret;
6265 }
6266
6267 int
6268 dhd_start_ecounters(dhd_pub_t *dhd)
6269 {
6270 uint8 i = 0;
6271 uint8 *start_ptr;
6272 uint32 buf;
6273 int rc = BCME_OK;
6274 bcm_xtlv_t *elt;
6275 ecounters_config_request_v2_t *req = NULL;
6276 ecountersv2_processed_xtlv_list_elt *list_elt, *tail = NULL;
6277 ecountersv2_processed_xtlv_list_elt *processed_containers_list = NULL;
6278 uint16 total_processed_containers_len = 0;
6279
6280 rc = dhd_iovar(dhd, 0, "ecounters_autoconfig", NULL, 0, (char *)&buf, sizeof(buf), FALSE);
6281
6282 if (rc != BCME_UNSUPPORTED)
6283 return rc;
6284
6285 rc = BCME_OK;
6286
6287 for (i = 0; i < ARRAYSIZE(ecounters_cfg_tbl); i++) {
6288 ecounters_cfg_t *ecounter_stat = &ecounters_cfg_tbl[i];
6289
6290 if ((list_elt = (ecountersv2_processed_xtlv_list_elt *)
6291 MALLOCZ(dhd->osh, sizeof(*list_elt))) == NULL) {
6292 DHD_ERROR(("Ecounters v2: No memory to process\n"));
6293 goto fail;
6294 }
6295
6296 rc = dhd_create_ecounters_params(dhd, ecounter_stat->type,
6297 ecounter_stat->if_slice_idx, ecounter_stat->stats_rep, &list_elt->data);
6298
6299 if (rc) {
6300 DHD_ERROR(("Ecounters v2: Could not process: stat: %d return code: %d\n",
6301 ecounter_stat->stats_rep, rc));
6302
6303 /* Free allocated memory and go to fail to release any memories allocated
6304 * in previous iterations. Note that list_elt->data gets populated in
6305 * dhd_create_ecounters_params() and gets freed there itself.
6306 */
6307 MFREE(dhd->osh, list_elt, sizeof(*list_elt));
6308 list_elt = NULL;
6309 goto fail;
6310 }
6311 elt = (bcm_xtlv_t *) list_elt->data;
6312
6313 /* Put the elements in the order they are processed */
6314 if (processed_containers_list == NULL) {
6315 processed_containers_list = list_elt;
6316 } else {
6317 tail->next = list_elt;
6318 }
6319 tail = list_elt;
6320 /* Size of the XTLV returned */
6321 total_processed_containers_len += BCM_XTLV_LEN(elt) + BCM_XTLV_HDR_SIZE;
6322 }
6323
6324 /* Now create ecounters config request with totallength */
6325 req = (ecounters_config_request_v2_t *)MALLOCZ(dhd->osh, sizeof(*req) +
6326 total_processed_containers_len);
6327
6328 if (req == NULL) {
6329 rc = BCME_NOMEM;
6330 goto fail;
6331 }
6332
6333 req->version = ECOUNTERS_VERSION_2;
6334 req->logset = EVENT_LOG_SET_ECOUNTERS;
6335 req->reporting_period = ECOUNTERS_DEFAULT_PERIOD;
6336 req->num_reports = ECOUNTERS_NUM_REPORTS;
6337 req->len = total_processed_containers_len +
6338 OFFSETOF(ecounters_config_request_v2_t, ecounters_xtlvs);
6339
6340 /* Copy config */
6341 start_ptr = req->ecounters_xtlvs;
6342
6343 /* Now go element by element in the list */
6344 while (processed_containers_list) {
6345 list_elt = processed_containers_list;
6346
6347 elt = (bcm_xtlv_t *)list_elt->data;
6348
6349 memcpy(start_ptr, list_elt->data, BCM_XTLV_LEN(elt) + BCM_XTLV_HDR_SIZE);
6350 start_ptr += (size_t)(BCM_XTLV_LEN(elt) + BCM_XTLV_HDR_SIZE);
6351 processed_containers_list = processed_containers_list->next;
6352
6353 /* Free allocated memories */
6354 MFREE(dhd->osh, elt, elt->len + BCM_XTLV_HDR_SIZE);
6355 MFREE(dhd->osh, list_elt, sizeof(*list_elt));
6356 }
6357
6358 if ((rc = dhd_iovar(dhd, 0, "ecounters", (char *)req, req->len, NULL, 0, TRUE)) < 0) {
6359 DHD_ERROR(("failed to start ecounters\n"));
6360 }
6361
6362 fail:
6363 if (req) {
6364 MFREE(dhd->osh, req, sizeof(*req) + total_processed_containers_len);
6365 }
6366
6367 /* Now go element by element in the list */
6368 while (processed_containers_list) {
6369 list_elt = processed_containers_list;
6370 elt = (bcm_xtlv_t *)list_elt->data;
6371 processed_containers_list = processed_containers_list->next;
6372
6373 /* Free allocated memories */
6374 MFREE(dhd->osh, elt, elt->len + BCM_XTLV_HDR_SIZE);
6375 MFREE(dhd->osh, list_elt, sizeof(*list_elt));
6376 }
6377 return rc;
6378 }
6379
6380 int
6381 dhd_stop_ecounters(dhd_pub_t *dhd)
6382 {
6383 int rc = BCME_OK;
6384 ecounters_config_request_v2_t *req;
6385
6386 /* Now create ecounters config request with totallength */
6387 req = (ecounters_config_request_v2_t *)MALLOCZ(dhd->osh, sizeof(*req));
6388
6389 if (req == NULL) {
6390 rc = BCME_NOMEM;
6391 goto fail;
6392 }
6393
6394 req->version = ECOUNTERS_VERSION_2;
6395 req->len = OFFSETOF(ecounters_config_request_v2_t, ecounters_xtlvs);
6396
6397 if ((rc = dhd_iovar(dhd, 0, "ecounters", (char *)req, req->len, NULL, 0, TRUE)) < 0) {
6398 DHD_ERROR(("failed to stop ecounters\n"));
6399 }
6400
6401 fail:
6402 if (req) {
6403 MFREE(dhd->osh, req, sizeof(*req));
6404 }
6405 return rc;
6406 }
6407
6408 /* configured event_id_array for event ecounters */
6409 typedef struct event_id_array {
6410 uint8 event_id;
6411 uint8 str_idx;
6412 } event_id_array_t;
6413
6414 /* get event id array only from event_ecounters_cfg_tbl[] */
6415 static inline int __dhd_event_ecounters_get_event_id_array(event_id_array_t *event_array)
6416 {
6417 uint8 i;
6418 uint8 idx = 0;
6419 int32 prev_evt_id = -1;
6420
6421 for (i = 0; i < (uint8)ARRAYSIZE(event_ecounters_cfg_tbl); i++) {
6422 if (prev_evt_id != event_ecounters_cfg_tbl[i].event_id) {
6423 if (prev_evt_id >= 0)
6424 idx++;
6425 event_array[idx].event_id = event_ecounters_cfg_tbl[i].event_id;
6426 event_array[idx].str_idx = i;
6427 }
6428 prev_evt_id = event_ecounters_cfg_tbl[i].event_id;
6429 }
6430 return idx;
6431 }
6432
6433 /* One event id has limit xtlv num to request based on wl_ifstats_xtlv_id * 2 interface */
6434 #define ECNTRS_MAX_XTLV_NUM (31 * 2)
6435
6436 int
6437 dhd_start_event_ecounters(dhd_pub_t *dhd)
6438 {
6439 uint8 i, j = 0;
6440 uint8 event_id_cnt = 0;
6441 uint16 processed_containers_len = 0;
6442 uint16 max_xtlv_len = 0;
6443 int rc = BCME_OK;
6444 uint8 *ptr;
6445 uint8 *data;
6446 event_id_array_t *id_array;
6447 bcm_xtlv_t *elt = NULL;
6448 event_ecounters_config_request_v2_t *req = NULL;
6449
6450 id_array = (event_id_array_t *)MALLOCZ(dhd->osh, sizeof(event_id_array_t) *
6451 ARRAYSIZE(event_ecounters_cfg_tbl));
6452
6453 if (id_array == NULL) {
6454 rc = BCME_NOMEM;
6455 goto fail;
6456 }
6457 event_id_cnt = __dhd_event_ecounters_get_event_id_array(id_array);
6458
6459 max_xtlv_len = ((BCM_XTLV_HDR_SIZE +
6460 OFFSETOF(event_ecounters_config_request_v2_t, ecounters_xtlvs)) *
6461 ECNTRS_MAX_XTLV_NUM);
6462
6463 /* Now create ecounters config request with max allowed length */
6464 req = (event_ecounters_config_request_v2_t *)MALLOCZ(dhd->osh,
6465 sizeof(event_ecounters_config_request_v2_t *) + max_xtlv_len);
6466
6467 if (req == NULL) {
6468 rc = BCME_NOMEM;
6469 goto fail;
6470 }
6471
6472 for (i = 0; i <= event_id_cnt; i++) {
6473 /* req initialization by event id */
6474 req->version = ECOUNTERS_VERSION_2;
6475 req->logset = EVENT_LOG_SET_ECOUNTERS;
6476 req->event_id = id_array[i].event_id;
6477 req->flags = EVENT_ECOUNTERS_FLAGS_ADD;
6478 req->len = 0;
6479 processed_containers_len = 0;
6480
6481 /* Copy config */
6482 ptr = req->ecounters_xtlvs;
6483
6484 for (j = id_array[i].str_idx; j < (uint8)ARRAYSIZE(event_ecounters_cfg_tbl); j++) {
6485 event_ecounters_cfg_t *event_ecounter_stat = &event_ecounters_cfg_tbl[j];
6486 if (id_array[i].event_id != event_ecounter_stat->event_id)
6487 break;
6488
6489 rc = dhd_create_ecounters_params(dhd, event_ecounter_stat->type,
6490 event_ecounter_stat->if_slice_idx, event_ecounter_stat->stats_rep,
6491 &data);
6492
6493 if (rc) {
6494 DHD_ERROR(("%s: Could not process: stat: %d return code: %d\n",
6495 __FUNCTION__, event_ecounter_stat->stats_rep, rc));
6496 goto fail;
6497 }
6498
6499 elt = (bcm_xtlv_t *)data;
6500
6501 memcpy(ptr, elt, BCM_XTLV_LEN(elt) + BCM_XTLV_HDR_SIZE);
6502 ptr += (size_t)(BCM_XTLV_LEN(elt) + BCM_XTLV_HDR_SIZE);
6503 processed_containers_len += BCM_XTLV_LEN(elt) + BCM_XTLV_HDR_SIZE;
6504
6505 /* Free allocated memories alloced by dhd_create_ecounters_params */
6506 MFREE(dhd->osh, elt, elt->len + BCM_XTLV_HDR_SIZE);
6507
6508 if (processed_containers_len > max_xtlv_len) {
6509 DHD_ERROR(("%s XTLV NUM IS OVERFLOWED THAN ALLOWED!!\n",
6510 __FUNCTION__));
6511 rc = BCME_BADLEN;
6512 goto fail;
6513 }
6514 }
6515
6516 req->len = processed_containers_len +
6517 OFFSETOF(event_ecounters_config_request_v2_t, ecounters_xtlvs);
6518
6519 DHD_INFO(("%s req version %d logset %d event_id %d flags %d len %d\n",
6520 __FUNCTION__, req->version, req->logset, req->event_id,
6521 req->flags, req->len));
6522
6523 rc = dhd_iovar(dhd, 0, "event_ecounters", (char *)req, req->len, NULL, 0, TRUE);
6524
6525 if (rc < 0) {
6526 DHD_ERROR(("failed to start event_ecounters(event id %d) with rc %d\n",
6527 req->event_id, rc));
6528 goto fail;
6529 }
6530 }
6531
6532 fail:
6533 /* Free allocated memories */
6534 if (req) {
6535 MFREE(dhd->osh, req, sizeof(event_ecounters_config_request_v2_t *) + max_xtlv_len);
6536 }
6537 if (id_array) {
6538 MFREE(dhd->osh, id_array, sizeof(event_id_array_t) *
6539 ARRAYSIZE(event_ecounters_cfg_tbl));
6540 }
6541
6542 return rc;
6543 }
6544
6545 int
6546 dhd_stop_event_ecounters(dhd_pub_t *dhd)
6547 {
6548 int rc = BCME_OK;
6549 event_ecounters_config_request_v2_t *req;
6550
6551 /* Now create ecounters config request with totallength */
6552 req = (event_ecounters_config_request_v2_t *)MALLOCZ(dhd->osh, sizeof(*req));
6553
6554 if (req == NULL) {
6555 rc = BCME_NOMEM;
6556 goto fail;
6557 }
6558
6559 req->version = ECOUNTERS_VERSION_2;
6560 req->flags = EVENT_ECOUNTERS_FLAGS_DEL_ALL;
6561 req->len = OFFSETOF(event_ecounters_config_request_v2_t, ecounters_xtlvs);
6562
6563 if ((rc = dhd_iovar(dhd, 0, "event_ecounters", (char *)req, req->len, NULL, 0, TRUE)) < 0) {
6564 DHD_ERROR(("failed to stop event_ecounters\n"));
6565 }
6566
6567 fail:
6568 if (req) {
6569 MFREE(dhd->osh, req, sizeof(*req));
6570 }
6571 return rc;
6572 }
6573
6574 #ifdef DHD_LOG_DUMP
6575 int
6576 dhd_log_dump_ring_to_file(dhd_pub_t *dhdp, void *ring_ptr, void *file,
6577 unsigned long *file_posn, log_dump_section_hdr_t *sec_hdr)
6578 {
6579 uint32 rlen = 0;
6580 uint32 data_len = 0, total_len = 0;
6581 void *data = NULL;
6582 unsigned long fpos_sechdr = 0;
6583 unsigned long flags = 0;
6584 int ret = 0;
6585 dhd_dbg_ring_t *ring = (dhd_dbg_ring_t *)ring_ptr;
6586
6587 if (!dhdp || !ring || !file || !sec_hdr || !file_posn)
6588 return BCME_BADARG;
6589
6590 /* do not allow further writes to the ring
6591 * till we flush it
6592 */
6593 DHD_DBG_RING_LOCK(ring->lock, flags);
6594 ring->state = RING_SUSPEND;
6595 DHD_DBG_RING_UNLOCK(ring->lock, flags);
6596
6597 if (dhdp->concise_dbg_buf) {
6598 /* re-use concise debug buffer temporarily
6599 * to pull ring data, to write
6600 * record by record to file
6601 */
6602 data_len = CONCISE_DUMP_BUFLEN;
6603 data = dhdp->concise_dbg_buf;
6604 dhd_os_write_file_posn(file, file_posn, ECNTRS_LOG_HDR,
6605 strlen(ECNTRS_LOG_HDR));
6606 /* write the section header now with zero length,
6607 * once the correct length is found out, update
6608 * it later
6609 */
6610 fpos_sechdr = *file_posn;
6611 sec_hdr->type = LOG_DUMP_SECTION_ECNTRS;
6612 sec_hdr->length = 0;
6613 dhd_os_write_file_posn(file, file_posn, (char *)sec_hdr,
6614 sizeof(*sec_hdr));
6615 do {
6616 rlen = dhd_dbg_ring_pull_single(ring, data, data_len, TRUE);
6617 if (rlen > 0) {
6618 /* write the log */
6619 ret = dhd_os_write_file_posn(file, file_posn, data, rlen);
6620 if (ret < 0) {
6621 DHD_ERROR(("%s: write file error !\n", __FUNCTION__));
6622 DHD_DBG_RING_LOCK(ring->lock, flags);
6623 ring->state = RING_ACTIVE;
6624 DHD_DBG_RING_UNLOCK(ring->lock, flags);
6625 return BCME_ERROR;
6626 }
6627 }
6628 total_len += rlen;
6629 } while (rlen > 0);
6630 /* now update the section header length in the file */
6631 sec_hdr->length = total_len;
6632 dhd_os_write_file_posn(file, &fpos_sechdr, (char *)sec_hdr, sizeof(*sec_hdr));
6633 } else {
6634 DHD_ERROR(("%s: No concise buffer available !\n", __FUNCTION__));
6635 }
6636
6637 DHD_DBG_RING_LOCK(ring->lock, flags);
6638 ring->state = RING_ACTIVE;
6639 DHD_DBG_RING_UNLOCK(ring->lock, flags);
6640
6641 return BCME_OK;
6642 }
6643
6644 /* logdump cookie */
6645 #define MAX_LOGUDMP_COOKIE_CNT 10u
6646 #define LOGDUMP_COOKIE_STR_LEN 50u
6647 int
6648 dhd_logdump_cookie_init(dhd_pub_t *dhdp, uint8 *buf, uint32 buf_size)
6649 {
6650 uint32 ring_size;
6651
6652 if (!dhdp || !buf) {
6653 DHD_ERROR(("INVALID PTR: dhdp:%p buf:%p\n", dhdp, buf));
6654 return BCME_ERROR;
6655 }
6656
6657 ring_size = dhd_ring_get_hdr_size() + LOGDUMP_COOKIE_STR_LEN * MAX_LOGUDMP_COOKIE_CNT;
6658 if (buf_size < ring_size) {
6659 DHD_ERROR(("BUF SIZE IS TO SHORT: req:%d buf_size:%d\n",
6660 ring_size, buf_size));
6661 return BCME_ERROR;
6662 }
6663
6664 dhdp->logdump_cookie = dhd_ring_init(buf, buf_size,
6665 LOGDUMP_COOKIE_STR_LEN, MAX_LOGUDMP_COOKIE_CNT);
6666 if (!dhdp->logdump_cookie) {
6667 DHD_ERROR(("FAIL TO INIT COOKIE RING\n"));
6668 return BCME_ERROR;
6669 }
6670
6671 return BCME_OK;
6672 }
6673
6674 void
6675 dhd_logdump_cookie_deinit(dhd_pub_t *dhdp)
6676 {
6677 if (!dhdp) {
6678 return;
6679 }
6680 if (dhdp->logdump_cookie) {
6681 dhd_ring_deinit(dhdp->logdump_cookie);
6682 }
6683
6684 return;
6685 }
6686
6687 void
6688 dhd_logdump_cookie_save(dhd_pub_t *dhdp, char *cookie, char *type)
6689 {
6690 char *ptr;
6691
6692 if (!dhdp || !cookie || !type || !dhdp->logdump_cookie) {
6693 DHD_ERROR(("%s: At least one buffer ptr is NULL dhdp=%p cookie=%p"
6694 " type = %p, cookie_cfg:%p\n", __FUNCTION__,
6695 dhdp, cookie, type, dhdp?dhdp->logdump_cookie: NULL));
6696 return;
6697 }
6698 ptr = (char *)dhd_ring_get_empty(dhdp->logdump_cookie);
6699 if (ptr == NULL) {
6700 DHD_ERROR(("%s : Skip to save due to locking\n", __FUNCTION__));
6701 return;
6702 }
6703 scnprintf(ptr, LOGDUMP_COOKIE_STR_LEN, "%s: %s\n", type, cookie);
6704 return;
6705 }
6706
6707 int
6708 dhd_logdump_cookie_get(dhd_pub_t *dhdp, char *ret_cookie, uint32 buf_size)
6709 {
6710 char *ptr;
6711
6712 if (!dhdp || !ret_cookie || !dhdp->logdump_cookie) {
6713 DHD_ERROR(("%s: At least one buffer ptr is NULL dhdp=%p"
6714 "cookie=%p cookie_cfg:%p\n", __FUNCTION__,
6715 dhdp, ret_cookie, dhdp?dhdp->logdump_cookie: NULL));
6716 return BCME_ERROR;
6717 }
6718 ptr = (char *)dhd_ring_get_first(dhdp->logdump_cookie);
6719 if (ptr == NULL) {
6720 DHD_ERROR(("%s : Skip to save due to locking\n", __FUNCTION__));
6721 return BCME_ERROR;
6722 }
6723 memcpy(ret_cookie, ptr, MIN(buf_size, strlen(ptr)));
6724 dhd_ring_free_first(dhdp->logdump_cookie);
6725 return BCME_OK;
6726 }
6727
6728 int
6729 dhd_logdump_cookie_count(dhd_pub_t *dhdp)
6730 {
6731 if (!dhdp || !dhdp->logdump_cookie) {
6732 DHD_ERROR(("%s: At least one buffer ptr is NULL dhdp=%p cookie=%p\n",
6733 __FUNCTION__, dhdp, dhdp?dhdp->logdump_cookie: NULL));
6734 return 0;
6735 }
6736 return dhd_ring_get_cur_size(dhdp->logdump_cookie);
6737 }
6738
6739 static inline int
6740 __dhd_log_dump_cookie_to_file(
6741 dhd_pub_t *dhdp, void *fp, unsigned long *f_pos, char *buf, uint32 buf_size)
6742 {
6743
6744 uint32 remain = buf_size;
6745 int ret = BCME_ERROR;
6746 char tmp_buf[LOGDUMP_COOKIE_STR_LEN];
6747 log_dump_section_hdr_t sec_hdr;
6748 while (dhd_logdump_cookie_count(dhdp) > 0) {
6749 memset(tmp_buf, 0, sizeof(tmp_buf));
6750 ret = dhd_logdump_cookie_get(dhdp, tmp_buf, LOGDUMP_COOKIE_STR_LEN);
6751 if (ret != BCME_OK) {
6752 return ret;
6753 }
6754 remain -= scnprintf(&buf[buf_size - remain], remain, "%s", tmp_buf);
6755 }
6756 ret = dhd_os_write_file_posn(fp, f_pos, COOKIE_LOG_HDR, strlen(COOKIE_LOG_HDR));
6757 if (ret < 0) {
6758 DHD_ERROR(("%s : Write file Error for cookie hdr\n", __FUNCTION__));
6759 return ret;
6760 }
6761 sec_hdr.magic = LOG_DUMP_MAGIC;
6762 sec_hdr.timestamp = local_clock();
6763 sec_hdr.type = LOG_DUMP_SECTION_COOKIE;
6764 sec_hdr.length = buf_size - remain;
6765 ret = dhd_os_write_file_posn(fp, f_pos, (char *)&sec_hdr, sizeof(sec_hdr));
6766 if (ret < 0) {
6767 DHD_ERROR(("%s : Write file Error for section hdr\n", __FUNCTION__));
6768 return ret;
6769 }
6770
6771 ret = dhd_os_write_file_posn(fp, f_pos, buf, sec_hdr.length);
6772 if (ret < 0) {
6773 DHD_ERROR(("%s : Write file Error for cookie data\n", __FUNCTION__));
6774 }
6775
6776 return ret;
6777 }
6778
6779 int
6780 dhd_log_dump_cookie_to_file(dhd_pub_t *dhdp, void *fp, unsigned long *f_pos)
6781 {
6782 char *buf;
6783 int ret = BCME_ERROR;
6784 uint32 buf_size = MAX_LOGUDMP_COOKIE_CNT * LOGDUMP_COOKIE_STR_LEN;
6785
6786 if (!dhdp || !dhdp->logdump_cookie ||!fp || !f_pos) {
6787 DHD_ERROR(("%s At least one ptr is NULL "
6788 "dhdp = %p cookie %p fp = %p f_pos = %p\n",
6789 __FUNCTION__, dhdp, dhdp?dhdp->logdump_cookie:NULL, fp, f_pos));
6790 return ret;
6791 }
6792
6793 buf = (char *)MALLOCZ(dhdp->osh, buf_size);
6794 if (!buf) {
6795 DHD_ERROR(("%s Fail to malloc buffer\n", __FUNCTION__));
6796 return ret;
6797 }
6798 ret = __dhd_log_dump_cookie_to_file(dhdp, fp, f_pos, buf, buf_size);
6799 MFREE(dhdp->osh, buf, buf_size);
6800
6801 return ret;
6802 }
6803
6804 #endif /* DHD_LOG_DUMP */
6805
6806 #ifdef DHD_LOG_DUMP
6807 void
6808 dhd_log_dump_trigger(dhd_pub_t *dhdp, int subcmd)
6809 {
6810 log_dump_type_t *flush_type;
6811
6812 if (!dhdp) {
6813 DHD_ERROR(("dhdp is NULL !\n"));
6814 return;
6815 }
6816
6817 if (subcmd >= CMD_MAX || subcmd < CMD_DEFAULT) {
6818 DHD_ERROR(("%s : Invalid subcmd \n", __FUNCTION__));
6819 return;
6820 }
6821
6822 flush_type = MALLOCZ(dhdp->osh, sizeof(log_dump_type_t));
6823 if (!flush_type) {
6824 DHD_ERROR(("%s Fail to malloc flush_type\n", __FUNCTION__));
6825 return;
6826 }
6827 clear_debug_dump_time(dhdp->debug_dump_time_str);
6828 #ifdef DHD_PCIE_RUNTIMEPM
6829 /* wake up RPM if SYSDUMP is triggered */
6830 dhdpcie_runtime_bus_wake(dhdp, TRUE, __builtin_return_address(0));
6831 #endif /* DHD_PCIE_RUNTIMEPM */
6832 /* */
6833 dhdp->debug_dump_subcmd = subcmd;
6834
6835 if (flush_type) {
6836 *flush_type = DLD_BUF_TYPE_ALL;
6837 dhd_schedule_log_dump(dhdp, flush_type);
6838 }
6839 #if defined(BCMPCIE) && defined(DHD_FW_COREDUMP)
6840 dhdp->memdump_type = DUMP_TYPE_BY_SYSDUMP;
6841 dhd_bus_mem_dump(dhdp);
6842 #endif /* BCMPCIE && DHD_FW_COREDUMP */
6843 #ifdef DHD_PKT_LOGGING
6844 dhd_schedule_pktlog_dump(dhdp);
6845 #endif /* DHD_PKT_LOGGING */
6846 }
6847 #endif /* DHD_LOG_DUMP */
6848
6849 #ifdef WL_CFGVENDOR_SEND_HANG_EVENT
6850 static void
6851 copy_hang_info_ioctl_timeout(dhd_pub_t *dhd, int ifidx, wl_ioctl_t *ioc)
6852 {
6853 int remain_len;
6854 int i;
6855 int *cnt;
6856 char *dest;
6857 int bytes_written;
6858 uint32 ioc_dwlen = 0;
6859
6860 if (!dhd || !dhd->hang_info) {
6861 DHD_ERROR(("%s dhd=%p hang_info=%p\n",
6862 __FUNCTION__, dhd, (dhd ? dhd->hang_info : NULL)));
6863 return;
6864 }
6865
6866 cnt = &dhd->hang_info_cnt;
6867 dest = dhd->hang_info;
6868
6869 memset(dest, 0, VENDOR_SEND_HANG_EXT_INFO_LEN);
6870 (*cnt) = 0;
6871
6872 bytes_written = 0;
6873 remain_len = VENDOR_SEND_HANG_EXT_INFO_LEN - bytes_written;
6874
6875 get_debug_dump_time(dhd->debug_dump_time_hang_str);
6876 copy_debug_dump_time(dhd->debug_dump_time_str, dhd->debug_dump_time_hang_str);
6877
6878 bytes_written += scnprintf(&dest[bytes_written], remain_len, "%d %d %s %d %d %d %d %d %d ",
6879 HANG_REASON_IOCTL_RESP_TIMEOUT, VENDOR_SEND_HANG_EXT_INFO_VER,
6880 dhd->debug_dump_time_hang_str,
6881 ifidx, ioc->cmd, ioc->len, ioc->set, ioc->used, ioc->needed);
6882 (*cnt) = HANG_FIELD_IOCTL_RESP_TIMEOUT_CNT;
6883
6884 clear_debug_dump_time(dhd->debug_dump_time_hang_str);
6885
6886 /* Access ioc->buf only if the ioc->len is more than 4 bytes */
6887 ioc_dwlen = (uint32)(ioc->len / sizeof(uint32));
6888 if (ioc_dwlen > 0) {
6889 const uint32 *ioc_buf = (const uint32 *)ioc->buf;
6890
6891 remain_len = VENDOR_SEND_HANG_EXT_INFO_LEN - bytes_written;
6892 bytes_written += scnprintf(&dest[bytes_written], remain_len,
6893 "%08x", *(uint32 *)(ioc_buf++));
6894 (*cnt)++;
6895 if ((*cnt) >= HANG_FIELD_CNT_MAX) {
6896 return;
6897 }
6898
6899 for (i = 1; i < ioc_dwlen && *cnt <= HANG_FIELD_CNT_MAX;
6900 i++, (*cnt)++) {
6901 remain_len = VENDOR_SEND_HANG_EXT_INFO_LEN - bytes_written;
6902 bytes_written += scnprintf(&dest[bytes_written], remain_len, "%c%08x",
6903 HANG_RAW_DEL, *(uint32 *)(ioc_buf++));
6904 }
6905 }
6906
6907 DHD_INFO(("%s hang info len: %d data: %s\n",
6908 __FUNCTION__, (int)strlen(dhd->hang_info), dhd->hang_info));
6909 }
6910 #endif /* WL_CFGVENDOR_SEND_HANG_EVENT */