Linux kernel mirror (for testing) git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel os linux
1
fork

Configure Feed

Select the types of activity you want to include in your feed.

at v3.13 2052 lines 58 kB view raw
1/* src/prism2/driver/prism2sta.c 2* 3* Implements the station functionality for prism2 4* 5* Copyright (C) 1999 AbsoluteValue Systems, Inc. All Rights Reserved. 6* -------------------------------------------------------------------- 7* 8* linux-wlan 9* 10* The contents of this file are subject to the Mozilla Public 11* License Version 1.1 (the "License"); you may not use this file 12* except in compliance with the License. You may obtain a copy of 13* the License at http://www.mozilla.org/MPL/ 14* 15* Software distributed under the License is distributed on an "AS 16* IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or 17* implied. See the License for the specific language governing 18* rights and limitations under the License. 19* 20* Alternatively, the contents of this file may be used under the 21* terms of the GNU Public License version 2 (the "GPL"), in which 22* case the provisions of the GPL are applicable instead of the 23* above. If you wish to allow the use of your version of this file 24* only under the terms of the GPL and not to allow others to use 25* your version of this file under the MPL, indicate your decision 26* by deleting the provisions above and replace them with the notice 27* and other provisions required by the GPL. If you do not delete 28* the provisions above, a recipient may use your version of this 29* file under either the MPL or the GPL. 30* 31* -------------------------------------------------------------------- 32* 33* Inquiries regarding the linux-wlan Open Source project can be 34* made directly to: 35* 36* AbsoluteValue Systems Inc. 37* info@linux-wlan.com 38* http://www.linux-wlan.com 39* 40* -------------------------------------------------------------------- 41* 42* Portions of the development of this software were funded by 43* Intersil Corporation as part of PRISM(R) chipset product development. 44* 45* -------------------------------------------------------------------- 46* 47* This file implements the module and linux pcmcia routines for the 48* prism2 driver. 49* 50* -------------------------------------------------------------------- 51*/ 52 53#include <linux/module.h> 54#include <linux/moduleparam.h> 55#include <linux/kernel.h> 56#include <linux/sched.h> 57#include <linux/types.h> 58#include <linux/init.h> 59#include <linux/slab.h> 60#include <linux/wireless.h> 61#include <linux/netdevice.h> 62#include <linux/workqueue.h> 63#include <linux/byteorder/generic.h> 64#include <linux/ctype.h> 65 66#include <linux/io.h> 67#include <linux/delay.h> 68#include <asm/byteorder.h> 69#include <linux/if_arp.h> 70#include <linux/if_ether.h> 71#include <linux/bitops.h> 72 73#include "p80211types.h" 74#include "p80211hdr.h" 75#include "p80211mgmt.h" 76#include "p80211conv.h" 77#include "p80211msg.h" 78#include "p80211netdev.h" 79#include "p80211req.h" 80#include "p80211metadef.h" 81#include "p80211metastruct.h" 82#include "hfa384x.h" 83#include "prism2mgmt.h" 84 85/* Create a string of printable chars from something that might not be */ 86/* It's recommended that the str be 4*len + 1 bytes long */ 87#define wlan_mkprintstr(buf, buflen, str, strlen) \ 88{ \ 89 int i = 0; \ 90 int j = 0; \ 91 memset(str, 0, (strlen)); \ 92 for (i = 0; i < (buflen); i++) { \ 93 if (isprint((buf)[i])) { \ 94 (str)[j] = (buf)[i]; \ 95 j++; \ 96 } else { \ 97 (str)[j] = '\\'; \ 98 (str)[j+1] = 'x'; \ 99 (str)[j+2] = hex_asc_hi((buf)[i]); \ 100 (str)[j+3] = hex_asc_lo((buf)[i]); \ 101 j += 4; \ 102 } \ 103 } \ 104} 105 106static char *dev_info = "prism2_usb"; 107static wlandevice_t *create_wlan(void); 108 109int prism2_reset_holdtime = 30; /* Reset hold time in ms */ 110int prism2_reset_settletime = 100; /* Reset settle time in ms */ 111 112static int prism2_doreset; /* Do a reset at init? */ 113 114module_param(prism2_doreset, int, 0644); 115MODULE_PARM_DESC(prism2_doreset, "Issue a reset on initialization"); 116 117module_param(prism2_reset_holdtime, int, 0644); 118MODULE_PARM_DESC(prism2_reset_holdtime, "reset hold time in ms"); 119module_param(prism2_reset_settletime, int, 0644); 120MODULE_PARM_DESC(prism2_reset_settletime, "reset settle time in ms"); 121 122MODULE_LICENSE("Dual MPL/GPL"); 123 124void prism2_connect_result(wlandevice_t *wlandev, u8 failed); 125void prism2_disconnected(wlandevice_t *wlandev); 126void prism2_roamed(wlandevice_t *wlandev); 127 128static int prism2sta_open(wlandevice_t *wlandev); 129static int prism2sta_close(wlandevice_t *wlandev); 130static void prism2sta_reset(wlandevice_t *wlandev); 131static int prism2sta_txframe(wlandevice_t *wlandev, struct sk_buff *skb, 132 union p80211_hdr *p80211_hdr, 133 struct p80211_metawep *p80211_wep); 134static int prism2sta_mlmerequest(wlandevice_t *wlandev, struct p80211msg *msg); 135static int prism2sta_getcardinfo(wlandevice_t *wlandev); 136static int prism2sta_globalsetup(wlandevice_t *wlandev); 137static int prism2sta_setmulticast(wlandevice_t *wlandev, netdevice_t *dev); 138 139static void prism2sta_inf_handover(wlandevice_t *wlandev, 140 hfa384x_InfFrame_t *inf); 141static void prism2sta_inf_tallies(wlandevice_t *wlandev, 142 hfa384x_InfFrame_t *inf); 143static void prism2sta_inf_hostscanresults(wlandevice_t *wlandev, 144 hfa384x_InfFrame_t *inf); 145static void prism2sta_inf_scanresults(wlandevice_t *wlandev, 146 hfa384x_InfFrame_t *inf); 147static void prism2sta_inf_chinforesults(wlandevice_t *wlandev, 148 hfa384x_InfFrame_t *inf); 149static void prism2sta_inf_linkstatus(wlandevice_t *wlandev, 150 hfa384x_InfFrame_t *inf); 151static void prism2sta_inf_assocstatus(wlandevice_t *wlandev, 152 hfa384x_InfFrame_t *inf); 153static void prism2sta_inf_authreq(wlandevice_t *wlandev, 154 hfa384x_InfFrame_t *inf); 155static void prism2sta_inf_authreq_defer(wlandevice_t *wlandev, 156 hfa384x_InfFrame_t *inf); 157static void prism2sta_inf_psusercnt(wlandevice_t *wlandev, 158 hfa384x_InfFrame_t *inf); 159 160/*---------------------------------------------------------------- 161* prism2sta_open 162* 163* WLAN device open method. Called from p80211netdev when kernel 164* device open (start) method is called in response to the 165* SIOCSIIFFLAGS ioctl changing the flags bit IFF_UP 166* from clear to set. 167* 168* Arguments: 169* wlandev wlan device structure 170* 171* Returns: 172* 0 success 173* >0 f/w reported error 174* <0 driver reported error 175* 176* Side effects: 177* 178* Call context: 179* process thread 180----------------------------------------------------------------*/ 181static int prism2sta_open(wlandevice_t *wlandev) 182{ 183 /* We don't currently have to do anything else. 184 * The setup of the MAC should be subsequently completed via 185 * the mlme commands. 186 * Higher layers know we're ready from dev->start==1 and 187 * dev->tbusy==0. Our rx path knows to pass up received/ 188 * frames because of dev->flags&IFF_UP is true. 189 */ 190 191 return 0; 192} 193 194/*---------------------------------------------------------------- 195* prism2sta_close 196* 197* WLAN device close method. Called from p80211netdev when kernel 198* device close method is called in response to the 199* SIOCSIIFFLAGS ioctl changing the flags bit IFF_UP 200* from set to clear. 201* 202* Arguments: 203* wlandev wlan device structure 204* 205* Returns: 206* 0 success 207* >0 f/w reported error 208* <0 driver reported error 209* 210* Side effects: 211* 212* Call context: 213* process thread 214----------------------------------------------------------------*/ 215static int prism2sta_close(wlandevice_t *wlandev) 216{ 217 /* We don't currently have to do anything else. 218 * Higher layers know we're not ready from dev->start==0 and 219 * dev->tbusy==1. Our rx path knows to not pass up received 220 * frames because of dev->flags&IFF_UP is false. 221 */ 222 223 return 0; 224} 225 226/*---------------------------------------------------------------- 227* prism2sta_reset 228* 229* Not currently implented. 230* 231* Arguments: 232* wlandev wlan device structure 233* none 234* 235* Returns: 236* nothing 237* 238* Side effects: 239* 240* Call context: 241* process thread 242----------------------------------------------------------------*/ 243static void prism2sta_reset(wlandevice_t *wlandev) 244{ 245} 246 247/*---------------------------------------------------------------- 248* prism2sta_txframe 249* 250* Takes a frame from p80211 and queues it for transmission. 251* 252* Arguments: 253* wlandev wlan device structure 254* pb packet buffer struct. Contains an 802.11 255* data frame. 256* p80211_hdr points to the 802.11 header for the packet. 257* Returns: 258* 0 Success and more buffs available 259* 1 Success but no more buffs 260* 2 Allocation failure 261* 4 Buffer full or queue busy 262* 263* Side effects: 264* 265* Call context: 266* process thread 267----------------------------------------------------------------*/ 268static int prism2sta_txframe(wlandevice_t *wlandev, struct sk_buff *skb, 269 union p80211_hdr *p80211_hdr, 270 struct p80211_metawep *p80211_wep) 271{ 272 hfa384x_t *hw = (hfa384x_t *) wlandev->priv; 273 int result; 274 275 /* If necessary, set the 802.11 WEP bit */ 276 if ((wlandev->hostwep & (HOSTWEP_PRIVACYINVOKED | HOSTWEP_ENCRYPT)) == 277 HOSTWEP_PRIVACYINVOKED) { 278 p80211_hdr->a3.fc |= cpu_to_le16(WLAN_SET_FC_ISWEP(1)); 279 } 280 281 result = hfa384x_drvr_txframe(hw, skb, p80211_hdr, p80211_wep); 282 283 return result; 284} 285 286/*---------------------------------------------------------------- 287* prism2sta_mlmerequest 288* 289* wlan command message handler. All we do here is pass the message 290* over to the prism2sta_mgmt_handler. 291* 292* Arguments: 293* wlandev wlan device structure 294* msg wlan command message 295* Returns: 296* 0 success 297* <0 successful acceptance of message, but we're 298* waiting for an async process to finish before 299* we're done with the msg. When the asynch 300* process is done, we'll call the p80211 301* function p80211req_confirm() . 302* >0 An error occurred while we were handling 303* the message. 304* 305* Side effects: 306* 307* Call context: 308* process thread 309----------------------------------------------------------------*/ 310static int prism2sta_mlmerequest(wlandevice_t *wlandev, struct p80211msg *msg) 311{ 312 hfa384x_t *hw = (hfa384x_t *) wlandev->priv; 313 314 int result = 0; 315 316 switch (msg->msgcode) { 317 case DIDmsg_dot11req_mibget: 318 pr_debug("Received mibget request\n"); 319 result = prism2mgmt_mibset_mibget(wlandev, msg); 320 break; 321 case DIDmsg_dot11req_mibset: 322 pr_debug("Received mibset request\n"); 323 result = prism2mgmt_mibset_mibget(wlandev, msg); 324 break; 325 case DIDmsg_dot11req_scan: 326 pr_debug("Received scan request\n"); 327 result = prism2mgmt_scan(wlandev, msg); 328 break; 329 case DIDmsg_dot11req_scan_results: 330 pr_debug("Received scan_results request\n"); 331 result = prism2mgmt_scan_results(wlandev, msg); 332 break; 333 case DIDmsg_dot11req_start: 334 pr_debug("Received mlme start request\n"); 335 result = prism2mgmt_start(wlandev, msg); 336 break; 337 /* 338 * Prism2 specific messages 339 */ 340 case DIDmsg_p2req_readpda: 341 pr_debug("Received mlme readpda request\n"); 342 result = prism2mgmt_readpda(wlandev, msg); 343 break; 344 case DIDmsg_p2req_ramdl_state: 345 pr_debug("Received mlme ramdl_state request\n"); 346 result = prism2mgmt_ramdl_state(wlandev, msg); 347 break; 348 case DIDmsg_p2req_ramdl_write: 349 pr_debug("Received mlme ramdl_write request\n"); 350 result = prism2mgmt_ramdl_write(wlandev, msg); 351 break; 352 case DIDmsg_p2req_flashdl_state: 353 pr_debug("Received mlme flashdl_state request\n"); 354 result = prism2mgmt_flashdl_state(wlandev, msg); 355 break; 356 case DIDmsg_p2req_flashdl_write: 357 pr_debug("Received mlme flashdl_write request\n"); 358 result = prism2mgmt_flashdl_write(wlandev, msg); 359 break; 360 /* 361 * Linux specific messages 362 */ 363 case DIDmsg_lnxreq_hostwep: 364 break; /* ignore me. */ 365 case DIDmsg_lnxreq_ifstate: 366 { 367 struct p80211msg_lnxreq_ifstate *ifstatemsg; 368 pr_debug("Received mlme ifstate request\n"); 369 ifstatemsg = (struct p80211msg_lnxreq_ifstate *) msg; 370 result = 371 prism2sta_ifstate(wlandev, 372 ifstatemsg->ifstate.data); 373 ifstatemsg->resultcode.status = 374 P80211ENUM_msgitem_status_data_ok; 375 ifstatemsg->resultcode.data = result; 376 result = 0; 377 } 378 break; 379 case DIDmsg_lnxreq_wlansniff: 380 pr_debug("Received mlme wlansniff request\n"); 381 result = prism2mgmt_wlansniff(wlandev, msg); 382 break; 383 case DIDmsg_lnxreq_autojoin: 384 pr_debug("Received mlme autojoin request\n"); 385 result = prism2mgmt_autojoin(wlandev, msg); 386 break; 387 case DIDmsg_lnxreq_commsquality:{ 388 struct p80211msg_lnxreq_commsquality *qualmsg; 389 390 pr_debug("Received commsquality request\n"); 391 392 qualmsg = (struct p80211msg_lnxreq_commsquality *) msg; 393 394 qualmsg->link.status = 395 P80211ENUM_msgitem_status_data_ok; 396 qualmsg->level.status = 397 P80211ENUM_msgitem_status_data_ok; 398 qualmsg->noise.status = 399 P80211ENUM_msgitem_status_data_ok; 400 401 qualmsg->link.data = le16_to_cpu(hw->qual.CQ_currBSS); 402 qualmsg->level.data = le16_to_cpu(hw->qual.ASL_currBSS); 403 qualmsg->noise.data = le16_to_cpu(hw->qual.ANL_currFC); 404 qualmsg->txrate.data = hw->txrate; 405 406 break; 407 } 408 default: 409 printk(KERN_WARNING "Unknown mgmt request message 0x%08x", 410 msg->msgcode); 411 break; 412 } 413 414 return result; 415} 416 417/*---------------------------------------------------------------- 418* prism2sta_ifstate 419* 420* Interface state. This is the primary WLAN interface enable/disable 421* handler. Following the driver/load/deviceprobe sequence, this 422* function must be called with a state of "enable" before any other 423* commands will be accepted. 424* 425* Arguments: 426* wlandev wlan device structure 427* msgp ptr to msg buffer 428* 429* Returns: 430* A p80211 message resultcode value. 431* 432* Side effects: 433* 434* Call context: 435* process thread (usually) 436* interrupt 437----------------------------------------------------------------*/ 438u32 prism2sta_ifstate(wlandevice_t *wlandev, u32 ifstate) 439{ 440 hfa384x_t *hw = (hfa384x_t *) wlandev->priv; 441 u32 result; 442 443 result = P80211ENUM_resultcode_implementation_failure; 444 445 pr_debug("Current MSD state(%d), requesting(%d)\n", 446 wlandev->msdstate, ifstate); 447 switch (ifstate) { 448 case P80211ENUM_ifstate_fwload: 449 switch (wlandev->msdstate) { 450 case WLAN_MSD_HWPRESENT: 451 wlandev->msdstate = WLAN_MSD_FWLOAD_PENDING; 452 /* 453 * Initialize the device+driver sufficiently 454 * for firmware loading. 455 */ 456 result = hfa384x_drvr_start(hw); 457 if (result) { 458 printk(KERN_ERR 459 "hfa384x_drvr_start() failed," 460 "result=%d\n", (int)result); 461 result = 462 P80211ENUM_resultcode_implementation_failure; 463 wlandev->msdstate = WLAN_MSD_HWPRESENT; 464 break; 465 } 466 wlandev->msdstate = WLAN_MSD_FWLOAD; 467 result = P80211ENUM_resultcode_success; 468 break; 469 case WLAN_MSD_FWLOAD: 470 hfa384x_cmd_initialize(hw); 471 result = P80211ENUM_resultcode_success; 472 break; 473 case WLAN_MSD_RUNNING: 474 printk(KERN_WARNING 475 "Cannot enter fwload state from enable state," 476 "you must disable first.\n"); 477 result = P80211ENUM_resultcode_invalid_parameters; 478 break; 479 case WLAN_MSD_HWFAIL: 480 default: 481 /* probe() had a problem or the msdstate contains 482 * an unrecognized value, there's nothing we can do. 483 */ 484 result = P80211ENUM_resultcode_implementation_failure; 485 break; 486 } 487 break; 488 case P80211ENUM_ifstate_enable: 489 switch (wlandev->msdstate) { 490 case WLAN_MSD_HWPRESENT: 491 case WLAN_MSD_FWLOAD: 492 wlandev->msdstate = WLAN_MSD_RUNNING_PENDING; 493 /* Initialize the device+driver for full 494 * operation. Note that this might me an FWLOAD to 495 * to RUNNING transition so we must not do a chip 496 * or board level reset. Note that on failure, 497 * the MSD state is set to HWPRESENT because we 498 * can't make any assumptions about the state 499 * of the hardware or a previous firmware load. 500 */ 501 result = hfa384x_drvr_start(hw); 502 if (result) { 503 printk(KERN_ERR 504 "hfa384x_drvr_start() failed," 505 "result=%d\n", (int)result); 506 result = 507 P80211ENUM_resultcode_implementation_failure; 508 wlandev->msdstate = WLAN_MSD_HWPRESENT; 509 break; 510 } 511 512 result = prism2sta_getcardinfo(wlandev); 513 if (result) { 514 printk(KERN_ERR 515 "prism2sta_getcardinfo() failed," 516 "result=%d\n", (int)result); 517 result = 518 P80211ENUM_resultcode_implementation_failure; 519 hfa384x_drvr_stop(hw); 520 wlandev->msdstate = WLAN_MSD_HWPRESENT; 521 break; 522 } 523 result = prism2sta_globalsetup(wlandev); 524 if (result) { 525 printk(KERN_ERR 526 "prism2sta_globalsetup() failed," 527 "result=%d\n", (int)result); 528 result = 529 P80211ENUM_resultcode_implementation_failure; 530 hfa384x_drvr_stop(hw); 531 wlandev->msdstate = WLAN_MSD_HWPRESENT; 532 break; 533 } 534 wlandev->msdstate = WLAN_MSD_RUNNING; 535 hw->join_ap = 0; 536 hw->join_retries = 60; 537 result = P80211ENUM_resultcode_success; 538 break; 539 case WLAN_MSD_RUNNING: 540 /* Do nothing, we're already in this state. */ 541 result = P80211ENUM_resultcode_success; 542 break; 543 case WLAN_MSD_HWFAIL: 544 default: 545 /* probe() had a problem or the msdstate contains 546 * an unrecognized value, there's nothing we can do. 547 */ 548 result = P80211ENUM_resultcode_implementation_failure; 549 break; 550 } 551 break; 552 case P80211ENUM_ifstate_disable: 553 switch (wlandev->msdstate) { 554 case WLAN_MSD_HWPRESENT: 555 /* Do nothing, we're already in this state. */ 556 result = P80211ENUM_resultcode_success; 557 break; 558 case WLAN_MSD_FWLOAD: 559 case WLAN_MSD_RUNNING: 560 wlandev->msdstate = WLAN_MSD_HWPRESENT_PENDING; 561 /* 562 * TODO: Shut down the MAC completely. Here a chip 563 * or board level reset is probably called for. 564 * After a "disable" _all_ results are lost, even 565 * those from a fwload. 566 */ 567 if (!wlandev->hwremoved) 568 netif_carrier_off(wlandev->netdev); 569 570 hfa384x_drvr_stop(hw); 571 572 wlandev->macmode = WLAN_MACMODE_NONE; 573 wlandev->msdstate = WLAN_MSD_HWPRESENT; 574 result = P80211ENUM_resultcode_success; 575 break; 576 case WLAN_MSD_HWFAIL: 577 default: 578 /* probe() had a problem or the msdstate contains 579 * an unrecognized value, there's nothing we can do. 580 */ 581 result = P80211ENUM_resultcode_implementation_failure; 582 break; 583 } 584 break; 585 default: 586 result = P80211ENUM_resultcode_invalid_parameters; 587 break; 588 } 589 590 return result; 591} 592 593/*---------------------------------------------------------------- 594* prism2sta_getcardinfo 595* 596* Collect the NICID, firmware version and any other identifiers 597* we'd like to have in host-side data structures. 598* 599* Arguments: 600* wlandev wlan device structure 601* 602* Returns: 603* 0 success 604* >0 f/w reported error 605* <0 driver reported error 606* 607* Side effects: 608* 609* Call context: 610* Either. 611----------------------------------------------------------------*/ 612static int prism2sta_getcardinfo(wlandevice_t *wlandev) 613{ 614 int result = 0; 615 hfa384x_t *hw = (hfa384x_t *) wlandev->priv; 616 u16 temp; 617 u8 snum[HFA384x_RID_NICSERIALNUMBER_LEN]; 618 char pstr[(HFA384x_RID_NICSERIALNUMBER_LEN * 4) + 1]; 619 620 /* Collect version and compatibility info */ 621 /* Some are critical, some are not */ 622 /* NIC identity */ 623 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_NICIDENTITY, 624 &hw->ident_nic, 625 sizeof(hfa384x_compident_t)); 626 if (result) { 627 printk(KERN_ERR "Failed to retrieve NICIDENTITY\n"); 628 goto failed; 629 } 630 631 /* get all the nic id fields in host byte order */ 632 hw->ident_nic.id = le16_to_cpu(hw->ident_nic.id); 633 hw->ident_nic.variant = le16_to_cpu(hw->ident_nic.variant); 634 hw->ident_nic.major = le16_to_cpu(hw->ident_nic.major); 635 hw->ident_nic.minor = le16_to_cpu(hw->ident_nic.minor); 636 637 printk(KERN_INFO "ident: nic h/w: id=0x%02x %d.%d.%d\n", 638 hw->ident_nic.id, hw->ident_nic.major, 639 hw->ident_nic.minor, hw->ident_nic.variant); 640 641 /* Primary f/w identity */ 642 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_PRIIDENTITY, 643 &hw->ident_pri_fw, 644 sizeof(hfa384x_compident_t)); 645 if (result) { 646 printk(KERN_ERR "Failed to retrieve PRIIDENTITY\n"); 647 goto failed; 648 } 649 650 /* get all the private fw id fields in host byte order */ 651 hw->ident_pri_fw.id = le16_to_cpu(hw->ident_pri_fw.id); 652 hw->ident_pri_fw.variant = le16_to_cpu(hw->ident_pri_fw.variant); 653 hw->ident_pri_fw.major = le16_to_cpu(hw->ident_pri_fw.major); 654 hw->ident_pri_fw.minor = le16_to_cpu(hw->ident_pri_fw.minor); 655 656 printk(KERN_INFO "ident: pri f/w: id=0x%02x %d.%d.%d\n", 657 hw->ident_pri_fw.id, hw->ident_pri_fw.major, 658 hw->ident_pri_fw.minor, hw->ident_pri_fw.variant); 659 660 /* Station (Secondary?) f/w identity */ 661 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_STAIDENTITY, 662 &hw->ident_sta_fw, 663 sizeof(hfa384x_compident_t)); 664 if (result) { 665 printk(KERN_ERR "Failed to retrieve STAIDENTITY\n"); 666 goto failed; 667 } 668 669 if (hw->ident_nic.id < 0x8000) { 670 printk(KERN_ERR 671 "FATAL: Card is not an Intersil Prism2/2.5/3\n"); 672 result = -1; 673 goto failed; 674 } 675 676 /* get all the station fw id fields in host byte order */ 677 hw->ident_sta_fw.id = le16_to_cpu(hw->ident_sta_fw.id); 678 hw->ident_sta_fw.variant = le16_to_cpu(hw->ident_sta_fw.variant); 679 hw->ident_sta_fw.major = le16_to_cpu(hw->ident_sta_fw.major); 680 hw->ident_sta_fw.minor = le16_to_cpu(hw->ident_sta_fw.minor); 681 682 /* strip out the 'special' variant bits */ 683 hw->mm_mods = hw->ident_sta_fw.variant & (BIT(14) | BIT(15)); 684 hw->ident_sta_fw.variant &= ~((u16) (BIT(14) | BIT(15))); 685 686 if (hw->ident_sta_fw.id == 0x1f) { 687 printk(KERN_INFO 688 "ident: sta f/w: id=0x%02x %d.%d.%d\n", 689 hw->ident_sta_fw.id, hw->ident_sta_fw.major, 690 hw->ident_sta_fw.minor, hw->ident_sta_fw.variant); 691 } else { 692 printk(KERN_INFO 693 "ident: ap f/w: id=0x%02x %d.%d.%d\n", 694 hw->ident_sta_fw.id, hw->ident_sta_fw.major, 695 hw->ident_sta_fw.minor, hw->ident_sta_fw.variant); 696 printk(KERN_ERR "Unsupported Tertiary AP firmeare loaded!\n"); 697 goto failed; 698 } 699 700 /* Compatibility range, Modem supplier */ 701 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_MFISUPRANGE, 702 &hw->cap_sup_mfi, 703 sizeof(hfa384x_caplevel_t)); 704 if (result) { 705 printk(KERN_ERR "Failed to retrieve MFISUPRANGE\n"); 706 goto failed; 707 } 708 709 /* get all the Compatibility range, modem interface supplier 710 fields in byte order */ 711 hw->cap_sup_mfi.role = le16_to_cpu(hw->cap_sup_mfi.role); 712 hw->cap_sup_mfi.id = le16_to_cpu(hw->cap_sup_mfi.id); 713 hw->cap_sup_mfi.variant = le16_to_cpu(hw->cap_sup_mfi.variant); 714 hw->cap_sup_mfi.bottom = le16_to_cpu(hw->cap_sup_mfi.bottom); 715 hw->cap_sup_mfi.top = le16_to_cpu(hw->cap_sup_mfi.top); 716 717 printk(KERN_INFO 718 "MFI:SUP:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n", 719 hw->cap_sup_mfi.role, hw->cap_sup_mfi.id, 720 hw->cap_sup_mfi.variant, hw->cap_sup_mfi.bottom, 721 hw->cap_sup_mfi.top); 722 723 /* Compatibility range, Controller supplier */ 724 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_CFISUPRANGE, 725 &hw->cap_sup_cfi, 726 sizeof(hfa384x_caplevel_t)); 727 if (result) { 728 printk(KERN_ERR "Failed to retrieve CFISUPRANGE\n"); 729 goto failed; 730 } 731 732 /* get all the Compatibility range, controller interface supplier 733 fields in byte order */ 734 hw->cap_sup_cfi.role = le16_to_cpu(hw->cap_sup_cfi.role); 735 hw->cap_sup_cfi.id = le16_to_cpu(hw->cap_sup_cfi.id); 736 hw->cap_sup_cfi.variant = le16_to_cpu(hw->cap_sup_cfi.variant); 737 hw->cap_sup_cfi.bottom = le16_to_cpu(hw->cap_sup_cfi.bottom); 738 hw->cap_sup_cfi.top = le16_to_cpu(hw->cap_sup_cfi.top); 739 740 printk(KERN_INFO 741 "CFI:SUP:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n", 742 hw->cap_sup_cfi.role, hw->cap_sup_cfi.id, 743 hw->cap_sup_cfi.variant, hw->cap_sup_cfi.bottom, 744 hw->cap_sup_cfi.top); 745 746 /* Compatibility range, Primary f/w supplier */ 747 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_PRISUPRANGE, 748 &hw->cap_sup_pri, 749 sizeof(hfa384x_caplevel_t)); 750 if (result) { 751 printk(KERN_ERR "Failed to retrieve PRISUPRANGE\n"); 752 goto failed; 753 } 754 755 /* get all the Compatibility range, primary firmware supplier 756 fields in byte order */ 757 hw->cap_sup_pri.role = le16_to_cpu(hw->cap_sup_pri.role); 758 hw->cap_sup_pri.id = le16_to_cpu(hw->cap_sup_pri.id); 759 hw->cap_sup_pri.variant = le16_to_cpu(hw->cap_sup_pri.variant); 760 hw->cap_sup_pri.bottom = le16_to_cpu(hw->cap_sup_pri.bottom); 761 hw->cap_sup_pri.top = le16_to_cpu(hw->cap_sup_pri.top); 762 763 printk(KERN_INFO 764 "PRI:SUP:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n", 765 hw->cap_sup_pri.role, hw->cap_sup_pri.id, 766 hw->cap_sup_pri.variant, hw->cap_sup_pri.bottom, 767 hw->cap_sup_pri.top); 768 769 /* Compatibility range, Station f/w supplier */ 770 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_STASUPRANGE, 771 &hw->cap_sup_sta, 772 sizeof(hfa384x_caplevel_t)); 773 if (result) { 774 printk(KERN_ERR "Failed to retrieve STASUPRANGE\n"); 775 goto failed; 776 } 777 778 /* get all the Compatibility range, station firmware supplier 779 fields in byte order */ 780 hw->cap_sup_sta.role = le16_to_cpu(hw->cap_sup_sta.role); 781 hw->cap_sup_sta.id = le16_to_cpu(hw->cap_sup_sta.id); 782 hw->cap_sup_sta.variant = le16_to_cpu(hw->cap_sup_sta.variant); 783 hw->cap_sup_sta.bottom = le16_to_cpu(hw->cap_sup_sta.bottom); 784 hw->cap_sup_sta.top = le16_to_cpu(hw->cap_sup_sta.top); 785 786 if (hw->cap_sup_sta.id == 0x04) { 787 printk(KERN_INFO 788 "STA:SUP:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n", 789 hw->cap_sup_sta.role, hw->cap_sup_sta.id, 790 hw->cap_sup_sta.variant, hw->cap_sup_sta.bottom, 791 hw->cap_sup_sta.top); 792 } else { 793 printk(KERN_INFO 794 "AP:SUP:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n", 795 hw->cap_sup_sta.role, hw->cap_sup_sta.id, 796 hw->cap_sup_sta.variant, hw->cap_sup_sta.bottom, 797 hw->cap_sup_sta.top); 798 } 799 800 /* Compatibility range, primary f/w actor, CFI supplier */ 801 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_PRI_CFIACTRANGES, 802 &hw->cap_act_pri_cfi, 803 sizeof(hfa384x_caplevel_t)); 804 if (result) { 805 printk(KERN_ERR "Failed to retrieve PRI_CFIACTRANGES\n"); 806 goto failed; 807 } 808 809 /* get all the Compatibility range, primary f/w actor, CFI supplier 810 fields in byte order */ 811 hw->cap_act_pri_cfi.role = le16_to_cpu(hw->cap_act_pri_cfi.role); 812 hw->cap_act_pri_cfi.id = le16_to_cpu(hw->cap_act_pri_cfi.id); 813 hw->cap_act_pri_cfi.variant = le16_to_cpu(hw->cap_act_pri_cfi.variant); 814 hw->cap_act_pri_cfi.bottom = le16_to_cpu(hw->cap_act_pri_cfi.bottom); 815 hw->cap_act_pri_cfi.top = le16_to_cpu(hw->cap_act_pri_cfi.top); 816 817 printk(KERN_INFO 818 "PRI-CFI:ACT:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n", 819 hw->cap_act_pri_cfi.role, hw->cap_act_pri_cfi.id, 820 hw->cap_act_pri_cfi.variant, hw->cap_act_pri_cfi.bottom, 821 hw->cap_act_pri_cfi.top); 822 823 /* Compatibility range, sta f/w actor, CFI supplier */ 824 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_STA_CFIACTRANGES, 825 &hw->cap_act_sta_cfi, 826 sizeof(hfa384x_caplevel_t)); 827 if (result) { 828 printk(KERN_ERR "Failed to retrieve STA_CFIACTRANGES\n"); 829 goto failed; 830 } 831 832 /* get all the Compatibility range, station f/w actor, CFI supplier 833 fields in byte order */ 834 hw->cap_act_sta_cfi.role = le16_to_cpu(hw->cap_act_sta_cfi.role); 835 hw->cap_act_sta_cfi.id = le16_to_cpu(hw->cap_act_sta_cfi.id); 836 hw->cap_act_sta_cfi.variant = le16_to_cpu(hw->cap_act_sta_cfi.variant); 837 hw->cap_act_sta_cfi.bottom = le16_to_cpu(hw->cap_act_sta_cfi.bottom); 838 hw->cap_act_sta_cfi.top = le16_to_cpu(hw->cap_act_sta_cfi.top); 839 840 printk(KERN_INFO 841 "STA-CFI:ACT:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n", 842 hw->cap_act_sta_cfi.role, hw->cap_act_sta_cfi.id, 843 hw->cap_act_sta_cfi.variant, hw->cap_act_sta_cfi.bottom, 844 hw->cap_act_sta_cfi.top); 845 846 /* Compatibility range, sta f/w actor, MFI supplier */ 847 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_STA_MFIACTRANGES, 848 &hw->cap_act_sta_mfi, 849 sizeof(hfa384x_caplevel_t)); 850 if (result) { 851 printk(KERN_ERR "Failed to retrieve STA_MFIACTRANGES\n"); 852 goto failed; 853 } 854 855 /* get all the Compatibility range, station f/w actor, MFI supplier 856 fields in byte order */ 857 hw->cap_act_sta_mfi.role = le16_to_cpu(hw->cap_act_sta_mfi.role); 858 hw->cap_act_sta_mfi.id = le16_to_cpu(hw->cap_act_sta_mfi.id); 859 hw->cap_act_sta_mfi.variant = le16_to_cpu(hw->cap_act_sta_mfi.variant); 860 hw->cap_act_sta_mfi.bottom = le16_to_cpu(hw->cap_act_sta_mfi.bottom); 861 hw->cap_act_sta_mfi.top = le16_to_cpu(hw->cap_act_sta_mfi.top); 862 863 printk(KERN_INFO 864 "STA-MFI:ACT:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n", 865 hw->cap_act_sta_mfi.role, hw->cap_act_sta_mfi.id, 866 hw->cap_act_sta_mfi.variant, hw->cap_act_sta_mfi.bottom, 867 hw->cap_act_sta_mfi.top); 868 869 /* Serial Number */ 870 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_NICSERIALNUMBER, 871 snum, HFA384x_RID_NICSERIALNUMBER_LEN); 872 if (!result) { 873 wlan_mkprintstr(snum, HFA384x_RID_NICSERIALNUMBER_LEN, 874 pstr, sizeof(pstr)); 875 printk(KERN_INFO "Prism2 card SN: %s\n", pstr); 876 } else { 877 printk(KERN_ERR "Failed to retrieve Prism2 Card SN\n"); 878 goto failed; 879 } 880 881 /* Collect the MAC address */ 882 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_CNFOWNMACADDR, 883 wlandev->netdev->dev_addr, ETH_ALEN); 884 if (result != 0) { 885 printk(KERN_ERR "Failed to retrieve mac address\n"); 886 goto failed; 887 } 888 889 /* short preamble is always implemented */ 890 wlandev->nsdcaps |= P80211_NSDCAP_SHORT_PREAMBLE; 891 892 /* find out if hardware wep is implemented */ 893 hfa384x_drvr_getconfig16(hw, HFA384x_RID_PRIVACYOPTIMP, &temp); 894 if (temp) 895 wlandev->nsdcaps |= P80211_NSDCAP_HARDWAREWEP; 896 897 /* get the dBm Scaling constant */ 898 hfa384x_drvr_getconfig16(hw, HFA384x_RID_CNFDBMADJUST, &temp); 899 hw->dbmadjust = temp; 900 901 /* Only enable scan by default on newer firmware */ 902 if (HFA384x_FIRMWARE_VERSION(hw->ident_sta_fw.major, 903 hw->ident_sta_fw.minor, 904 hw->ident_sta_fw.variant) < 905 HFA384x_FIRMWARE_VERSION(1, 5, 5)) { 906 wlandev->nsdcaps |= P80211_NSDCAP_NOSCAN; 907 } 908 909 /* TODO: Set any internally managed config items */ 910 911 goto done; 912failed: 913 printk(KERN_ERR "Failed, result=%d\n", result); 914done: 915 return result; 916} 917 918/*---------------------------------------------------------------- 919* prism2sta_globalsetup 920* 921* Set any global RIDs that we want to set at device activation. 922* 923* Arguments: 924* wlandev wlan device structure 925* 926* Returns: 927* 0 success 928* >0 f/w reported error 929* <0 driver reported error 930* 931* Side effects: 932* 933* Call context: 934* process thread 935----------------------------------------------------------------*/ 936static int prism2sta_globalsetup(wlandevice_t *wlandev) 937{ 938 hfa384x_t *hw = (hfa384x_t *) wlandev->priv; 939 940 /* Set the maximum frame size */ 941 return hfa384x_drvr_setconfig16(hw, HFA384x_RID_CNFMAXDATALEN, 942 WLAN_DATA_MAXLEN); 943} 944 945static int prism2sta_setmulticast(wlandevice_t *wlandev, netdevice_t *dev) 946{ 947 int result = 0; 948 hfa384x_t *hw = (hfa384x_t *) wlandev->priv; 949 950 u16 promisc; 951 952 /* If we're not ready, what's the point? */ 953 if (hw->state != HFA384x_STATE_RUNNING) 954 goto exit; 955 956 if ((dev->flags & (IFF_PROMISC | IFF_ALLMULTI)) != 0) 957 promisc = P80211ENUM_truth_true; 958 else 959 promisc = P80211ENUM_truth_false; 960 961 result = 962 hfa384x_drvr_setconfig16_async(hw, HFA384x_RID_PROMISCMODE, 963 promisc); 964exit: 965 return result; 966} 967 968/*---------------------------------------------------------------- 969* prism2sta_inf_handover 970* 971* Handles the receipt of a Handover info frame. Should only be present 972* in APs only. 973* 974* Arguments: 975* wlandev wlan device structure 976* inf ptr to info frame (contents in hfa384x order) 977* 978* Returns: 979* nothing 980* 981* Side effects: 982* 983* Call context: 984* interrupt 985----------------------------------------------------------------*/ 986static void prism2sta_inf_handover(wlandevice_t *wlandev, 987 hfa384x_InfFrame_t *inf) 988{ 989 pr_debug("received infoframe:HANDOVER (unhandled)\n"); 990} 991 992/*---------------------------------------------------------------- 993* prism2sta_inf_tallies 994* 995* Handles the receipt of a CommTallies info frame. 996* 997* Arguments: 998* wlandev wlan device structure 999* inf ptr to info frame (contents in hfa384x order) 1000* 1001* Returns: 1002* nothing 1003* 1004* Side effects: 1005* 1006* Call context: 1007* interrupt 1008----------------------------------------------------------------*/ 1009static void prism2sta_inf_tallies(wlandevice_t *wlandev, 1010 hfa384x_InfFrame_t *inf) 1011{ 1012 hfa384x_t *hw = (hfa384x_t *) wlandev->priv; 1013 u16 *src16; 1014 u32 *dst; 1015 u32 *src32; 1016 int i; 1017 int cnt; 1018 1019 /* 1020 ** Determine if these are 16-bit or 32-bit tallies, based on the 1021 ** record length of the info record. 1022 */ 1023 1024 cnt = sizeof(hfa384x_CommTallies32_t) / sizeof(u32); 1025 if (inf->framelen > 22) { 1026 dst = (u32 *) &hw->tallies; 1027 src32 = (u32 *) &inf->info.commtallies32; 1028 for (i = 0; i < cnt; i++, dst++, src32++) 1029 *dst += le32_to_cpu(*src32); 1030 } else { 1031 dst = (u32 *) &hw->tallies; 1032 src16 = (u16 *) &inf->info.commtallies16; 1033 for (i = 0; i < cnt; i++, dst++, src16++) 1034 *dst += le16_to_cpu(*src16); 1035 } 1036} 1037 1038/*---------------------------------------------------------------- 1039* prism2sta_inf_scanresults 1040* 1041* Handles the receipt of a Scan Results info frame. 1042* 1043* Arguments: 1044* wlandev wlan device structure 1045* inf ptr to info frame (contents in hfa384x order) 1046* 1047* Returns: 1048* nothing 1049* 1050* Side effects: 1051* 1052* Call context: 1053* interrupt 1054----------------------------------------------------------------*/ 1055static void prism2sta_inf_scanresults(wlandevice_t *wlandev, 1056 hfa384x_InfFrame_t *inf) 1057{ 1058 1059 hfa384x_t *hw = (hfa384x_t *) wlandev->priv; 1060 int nbss; 1061 hfa384x_ScanResult_t *sr = &(inf->info.scanresult); 1062 int i; 1063 hfa384x_JoinRequest_data_t joinreq; 1064 int result; 1065 1066 /* Get the number of results, first in bytes, then in results */ 1067 nbss = (inf->framelen * sizeof(u16)) - 1068 sizeof(inf->infotype) - sizeof(inf->info.scanresult.scanreason); 1069 nbss /= sizeof(hfa384x_ScanResultSub_t); 1070 1071 /* Print em */ 1072 pr_debug("rx scanresults, reason=%d, nbss=%d:\n", 1073 inf->info.scanresult.scanreason, nbss); 1074 for (i = 0; i < nbss; i++) { 1075 pr_debug("chid=%d anl=%d sl=%d bcnint=%d\n", 1076 sr->result[i].chid, 1077 sr->result[i].anl, 1078 sr->result[i].sl, sr->result[i].bcnint); 1079 pr_debug(" capinfo=0x%04x proberesp_rate=%d\n", 1080 sr->result[i].capinfo, sr->result[i].proberesp_rate); 1081 } 1082 /* issue a join request */ 1083 joinreq.channel = sr->result[0].chid; 1084 memcpy(joinreq.bssid, sr->result[0].bssid, WLAN_BSSID_LEN); 1085 result = hfa384x_drvr_setconfig(hw, 1086 HFA384x_RID_JOINREQUEST, 1087 &joinreq, HFA384x_RID_JOINREQUEST_LEN); 1088 if (result) { 1089 printk(KERN_ERR "setconfig(joinreq) failed, result=%d\n", 1090 result); 1091 } 1092} 1093 1094/*---------------------------------------------------------------- 1095* prism2sta_inf_hostscanresults 1096* 1097* Handles the receipt of a Scan Results info frame. 1098* 1099* Arguments: 1100* wlandev wlan device structure 1101* inf ptr to info frame (contents in hfa384x order) 1102* 1103* Returns: 1104* nothing 1105* 1106* Side effects: 1107* 1108* Call context: 1109* interrupt 1110----------------------------------------------------------------*/ 1111static void prism2sta_inf_hostscanresults(wlandevice_t *wlandev, 1112 hfa384x_InfFrame_t *inf) 1113{ 1114 hfa384x_t *hw = (hfa384x_t *) wlandev->priv; 1115 int nbss; 1116 1117 nbss = (inf->framelen - 3) / 32; 1118 pr_debug("Received %d hostscan results\n", nbss); 1119 1120 if (nbss > 32) 1121 nbss = 32; 1122 1123 kfree(hw->scanresults); 1124 1125 hw->scanresults = kmemdup(inf, sizeof(hfa384x_InfFrame_t), GFP_ATOMIC); 1126 1127 if (nbss == 0) 1128 nbss = -1; 1129 1130 /* Notify/wake the sleeping caller. */ 1131 hw->scanflag = nbss; 1132 wake_up_interruptible(&hw->cmdq); 1133}; 1134 1135/*---------------------------------------------------------------- 1136* prism2sta_inf_chinforesults 1137* 1138* Handles the receipt of a Channel Info Results info frame. 1139* 1140* Arguments: 1141* wlandev wlan device structure 1142* inf ptr to info frame (contents in hfa384x order) 1143* 1144* Returns: 1145* nothing 1146* 1147* Side effects: 1148* 1149* Call context: 1150* interrupt 1151----------------------------------------------------------------*/ 1152static void prism2sta_inf_chinforesults(wlandevice_t *wlandev, 1153 hfa384x_InfFrame_t *inf) 1154{ 1155 hfa384x_t *hw = (hfa384x_t *) wlandev->priv; 1156 unsigned int i, n; 1157 1158 hw->channel_info.results.scanchannels = 1159 le16_to_cpu(inf->info.chinforesult.scanchannels); 1160 1161 for (i = 0, n = 0; i < HFA384x_CHINFORESULT_MAX; i++) { 1162 hfa384x_ChInfoResultSub_t *result; 1163 hfa384x_ChInfoResultSub_t *chinforesult; 1164 int chan; 1165 1166 if (!(hw->channel_info.results.scanchannels & (1 << i))) 1167 continue; 1168 1169 result = &inf->info.chinforesult.result[n]; 1170 chan = le16_to_cpu(result->chid) - 1; 1171 1172 if (chan < 0 || chan >= HFA384x_CHINFORESULT_MAX) 1173 continue; 1174 1175 chinforesult = &hw->channel_info.results.result[chan]; 1176 chinforesult->chid = chan; 1177 chinforesult->anl = le16_to_cpu(result->anl); 1178 chinforesult->pnl = le16_to_cpu(result->pnl); 1179 chinforesult->active = le16_to_cpu(result->active); 1180 1181 pr_debug("chinfo: channel %d, %s level (avg/peak)=%d/%d dB, pcf %d\n", 1182 chan + 1, 1183 (chinforesult->active & HFA384x_CHINFORESULT_BSSACTIVE) 1184 ? "signal" : "noise", 1185 chinforesult->anl, chinforesult->pnl, 1186 (chinforesult->active & HFA384x_CHINFORESULT_PCFACTIVE) 1187 ? 1 : 0); 1188 n++; 1189 } 1190 atomic_set(&hw->channel_info.done, 2); 1191 1192 hw->channel_info.count = n; 1193} 1194 1195void prism2sta_processing_defer(struct work_struct *data) 1196{ 1197 hfa384x_t *hw = container_of(data, struct hfa384x, link_bh); 1198 wlandevice_t *wlandev = hw->wlandev; 1199 hfa384x_bytestr32_t ssid; 1200 int result; 1201 1202 /* First let's process the auth frames */ 1203 { 1204 struct sk_buff *skb; 1205 hfa384x_InfFrame_t *inf; 1206 1207 while ((skb = skb_dequeue(&hw->authq))) { 1208 inf = (hfa384x_InfFrame_t *) skb->data; 1209 prism2sta_inf_authreq_defer(wlandev, inf); 1210 } 1211 1212 } 1213 1214 /* Now let's handle the linkstatus stuff */ 1215 if (hw->link_status == hw->link_status_new) 1216 return; 1217 1218 hw->link_status = hw->link_status_new; 1219 1220 switch (hw->link_status) { 1221 case HFA384x_LINK_NOTCONNECTED: 1222 /* I'm currently assuming that this is the initial link 1223 * state. It should only be possible immediately 1224 * following an Enable command. 1225 * Response: 1226 * Block Transmits, Ignore receives of data frames 1227 */ 1228 netif_carrier_off(wlandev->netdev); 1229 1230 printk(KERN_INFO "linkstatus=NOTCONNECTED (unhandled)\n"); 1231 break; 1232 1233 case HFA384x_LINK_CONNECTED: 1234 /* This one indicates a successful scan/join/auth/assoc. 1235 * When we have the full MLME complement, this event will 1236 * signify successful completion of both mlme_authenticate 1237 * and mlme_associate. State management will get a little 1238 * ugly here. 1239 * Response: 1240 * Indicate authentication and/or association 1241 * Enable Transmits, Receives and pass up data frames 1242 */ 1243 1244 netif_carrier_on(wlandev->netdev); 1245 1246 /* If we are joining a specific AP, set our 1247 * state and reset retries 1248 */ 1249 if (hw->join_ap == 1) 1250 hw->join_ap = 2; 1251 hw->join_retries = 60; 1252 1253 /* Don't call this in monitor mode */ 1254 if (wlandev->netdev->type == ARPHRD_ETHER) { 1255 u16 portstatus; 1256 1257 printk(KERN_INFO "linkstatus=CONNECTED\n"); 1258 1259 /* For non-usb devices, we can use the sync versions */ 1260 /* Collect the BSSID, and set state to allow tx */ 1261 1262 result = hfa384x_drvr_getconfig(hw, 1263 HFA384x_RID_CURRENTBSSID, 1264 wlandev->bssid, 1265 WLAN_BSSID_LEN); 1266 if (result) { 1267 pr_debug 1268 ("getconfig(0x%02x) failed, result = %d\n", 1269 HFA384x_RID_CURRENTBSSID, result); 1270 return; 1271 } 1272 1273 result = hfa384x_drvr_getconfig(hw, 1274 HFA384x_RID_CURRENTSSID, 1275 &ssid, sizeof(ssid)); 1276 if (result) { 1277 pr_debug 1278 ("getconfig(0x%02x) failed, result = %d\n", 1279 HFA384x_RID_CURRENTSSID, result); 1280 return; 1281 } 1282 prism2mgmt_bytestr2pstr((hfa384x_bytestr_t *) &ssid, 1283 (p80211pstrd_t *) & 1284 wlandev->ssid); 1285 1286 /* Collect the port status */ 1287 result = hfa384x_drvr_getconfig16(hw, 1288 HFA384x_RID_PORTSTATUS, 1289 &portstatus); 1290 if (result) { 1291 pr_debug 1292 ("getconfig(0x%02x) failed, result = %d\n", 1293 HFA384x_RID_PORTSTATUS, result); 1294 return; 1295 } 1296 wlandev->macmode = 1297 (portstatus == HFA384x_PSTATUS_CONN_IBSS) ? 1298 WLAN_MACMODE_IBSS_STA : WLAN_MACMODE_ESS_STA; 1299 1300 /* signal back up to cfg80211 layer */ 1301 prism2_connect_result(wlandev, P80211ENUM_truth_false); 1302 1303 /* Get the ball rolling on the comms quality stuff */ 1304 prism2sta_commsqual_defer(&hw->commsqual_bh); 1305 } 1306 break; 1307 1308 case HFA384x_LINK_DISCONNECTED: 1309 /* This one indicates that our association is gone. We've 1310 * lost connection with the AP and/or been disassociated. 1311 * This indicates that the MAC has completely cleared it's 1312 * associated state. We * should send a deauth indication 1313 * (implying disassoc) up * to the MLME. 1314 * Response: 1315 * Indicate Deauthentication 1316 * Block Transmits, Ignore receives of data frames 1317 */ 1318 if (wlandev->netdev->type == ARPHRD_ETHER) 1319 printk(KERN_INFO 1320 "linkstatus=DISCONNECTED (unhandled)\n"); 1321 wlandev->macmode = WLAN_MACMODE_NONE; 1322 1323 netif_carrier_off(wlandev->netdev); 1324 1325 /* signal back up to cfg80211 layer */ 1326 prism2_disconnected(wlandev); 1327 1328 break; 1329 1330 case HFA384x_LINK_AP_CHANGE: 1331 /* This one indicates that the MAC has decided to and 1332 * successfully completed a change to another AP. We 1333 * should probably implement a reassociation indication 1334 * in response to this one. I'm thinking that the the 1335 * p80211 layer needs to be notified in case of 1336 * buffering/queueing issues. User mode also needs to be 1337 * notified so that any BSS dependent elements can be 1338 * updated. 1339 * associated state. We * should send a deauth indication 1340 * (implying disassoc) up * to the MLME. 1341 * Response: 1342 * Indicate Reassociation 1343 * Enable Transmits, Receives and pass up data frames 1344 */ 1345 printk(KERN_INFO "linkstatus=AP_CHANGE\n"); 1346 1347 result = hfa384x_drvr_getconfig(hw, 1348 HFA384x_RID_CURRENTBSSID, 1349 wlandev->bssid, WLAN_BSSID_LEN); 1350 if (result) { 1351 pr_debug("getconfig(0x%02x) failed, result = %d\n", 1352 HFA384x_RID_CURRENTBSSID, result); 1353 return; 1354 } 1355 1356 result = hfa384x_drvr_getconfig(hw, 1357 HFA384x_RID_CURRENTSSID, 1358 &ssid, sizeof(ssid)); 1359 if (result) { 1360 pr_debug("getconfig(0x%02x) failed, result = %d\n", 1361 HFA384x_RID_CURRENTSSID, result); 1362 return; 1363 } 1364 prism2mgmt_bytestr2pstr((hfa384x_bytestr_t *) &ssid, 1365 (p80211pstrd_t *) &wlandev->ssid); 1366 1367 hw->link_status = HFA384x_LINK_CONNECTED; 1368 netif_carrier_on(wlandev->netdev); 1369 1370 /* signal back up to cfg80211 layer */ 1371 prism2_roamed(wlandev); 1372 1373 break; 1374 1375 case HFA384x_LINK_AP_OUTOFRANGE: 1376 /* This one indicates that the MAC has decided that the 1377 * AP is out of range, but hasn't found a better candidate 1378 * so the MAC maintains its "associated" state in case 1379 * we get back in range. We should block transmits and 1380 * receives in this state. Do we need an indication here? 1381 * Probably not since a polling user-mode element would 1382 * get this status from from p2PortStatus(FD40). What about 1383 * p80211? 1384 * Response: 1385 * Block Transmits, Ignore receives of data frames 1386 */ 1387 printk(KERN_INFO "linkstatus=AP_OUTOFRANGE (unhandled)\n"); 1388 1389 netif_carrier_off(wlandev->netdev); 1390 1391 break; 1392 1393 case HFA384x_LINK_AP_INRANGE: 1394 /* This one indicates that the MAC has decided that the 1395 * AP is back in range. We continue working with our 1396 * existing association. 1397 * Response: 1398 * Enable Transmits, Receives and pass up data frames 1399 */ 1400 printk(KERN_INFO "linkstatus=AP_INRANGE\n"); 1401 1402 hw->link_status = HFA384x_LINK_CONNECTED; 1403 netif_carrier_on(wlandev->netdev); 1404 1405 break; 1406 1407 case HFA384x_LINK_ASSOCFAIL: 1408 /* This one is actually a peer to CONNECTED. We've 1409 * requested a join for a given SSID and optionally BSSID. 1410 * We can use this one to indicate authentication and 1411 * association failures. The trick is going to be 1412 * 1) identifying the failure, and 2) state management. 1413 * Response: 1414 * Disable Transmits, Ignore receives of data frames 1415 */ 1416 if (hw->join_ap && --hw->join_retries > 0) { 1417 hfa384x_JoinRequest_data_t joinreq; 1418 joinreq = hw->joinreq; 1419 /* Send the join request */ 1420 hfa384x_drvr_setconfig(hw, 1421 HFA384x_RID_JOINREQUEST, 1422 &joinreq, 1423 HFA384x_RID_JOINREQUEST_LEN); 1424 printk(KERN_INFO 1425 "linkstatus=ASSOCFAIL (re-submitting join)\n"); 1426 } else { 1427 printk(KERN_INFO "linkstatus=ASSOCFAIL (unhandled)\n"); 1428 } 1429 1430 netif_carrier_off(wlandev->netdev); 1431 1432 /* signal back up to cfg80211 layer */ 1433 prism2_connect_result(wlandev, P80211ENUM_truth_true); 1434 1435 break; 1436 1437 default: 1438 /* This is bad, IO port problems? */ 1439 printk(KERN_WARNING 1440 "unknown linkstatus=0x%02x\n", hw->link_status); 1441 return; 1442 } 1443 1444 wlandev->linkstatus = (hw->link_status == HFA384x_LINK_CONNECTED); 1445} 1446 1447/*---------------------------------------------------------------- 1448* prism2sta_inf_linkstatus 1449* 1450* Handles the receipt of a Link Status info frame. 1451* 1452* Arguments: 1453* wlandev wlan device structure 1454* inf ptr to info frame (contents in hfa384x order) 1455* 1456* Returns: 1457* nothing 1458* 1459* Side effects: 1460* 1461* Call context: 1462* interrupt 1463----------------------------------------------------------------*/ 1464static void prism2sta_inf_linkstatus(wlandevice_t *wlandev, 1465 hfa384x_InfFrame_t *inf) 1466{ 1467 hfa384x_t *hw = (hfa384x_t *) wlandev->priv; 1468 1469 hw->link_status_new = le16_to_cpu(inf->info.linkstatus.linkstatus); 1470 1471 schedule_work(&hw->link_bh); 1472} 1473 1474/*---------------------------------------------------------------- 1475* prism2sta_inf_assocstatus 1476* 1477* Handles the receipt of an Association Status info frame. Should 1478* be present in APs only. 1479* 1480* Arguments: 1481* wlandev wlan device structure 1482* inf ptr to info frame (contents in hfa384x order) 1483* 1484* Returns: 1485* nothing 1486* 1487* Side effects: 1488* 1489* Call context: 1490* interrupt 1491----------------------------------------------------------------*/ 1492static void prism2sta_inf_assocstatus(wlandevice_t *wlandev, 1493 hfa384x_InfFrame_t *inf) 1494{ 1495 hfa384x_t *hw = (hfa384x_t *) wlandev->priv; 1496 hfa384x_AssocStatus_t rec; 1497 int i; 1498 1499 memcpy(&rec, &inf->info.assocstatus, sizeof(rec)); 1500 rec.assocstatus = le16_to_cpu(rec.assocstatus); 1501 rec.reason = le16_to_cpu(rec.reason); 1502 1503 /* 1504 ** Find the address in the list of authenticated stations. 1505 ** If it wasn't found, then this address has not been previously 1506 ** authenticated and something weird has happened if this is 1507 ** anything other than an "authentication failed" message. 1508 ** If the address was found, then set the "associated" flag for 1509 ** that station, based on whether the station is associating or 1510 ** losing its association. Something weird has also happened 1511 ** if we find the address in the list of authenticated stations 1512 ** but we are getting an "authentication failed" message. 1513 */ 1514 1515 for (i = 0; i < hw->authlist.cnt; i++) 1516 if (memcmp(rec.sta_addr, hw->authlist.addr[i], ETH_ALEN) == 0) 1517 break; 1518 1519 if (i >= hw->authlist.cnt) { 1520 if (rec.assocstatus != HFA384x_ASSOCSTATUS_AUTHFAIL) 1521 printk(KERN_WARNING 1522 "assocstatus info frame received for non-authenticated station.\n"); 1523 } else { 1524 hw->authlist.assoc[i] = 1525 (rec.assocstatus == HFA384x_ASSOCSTATUS_STAASSOC || 1526 rec.assocstatus == HFA384x_ASSOCSTATUS_REASSOC); 1527 1528 if (rec.assocstatus == HFA384x_ASSOCSTATUS_AUTHFAIL) 1529 printk(KERN_WARNING 1530"authfail assocstatus info frame received for authenticated station.\n"); 1531 } 1532} 1533 1534/*---------------------------------------------------------------- 1535* prism2sta_inf_authreq 1536* 1537* Handles the receipt of an Authentication Request info frame. Should 1538* be present in APs only. 1539* 1540* Arguments: 1541* wlandev wlan device structure 1542* inf ptr to info frame (contents in hfa384x order) 1543* 1544* Returns: 1545* nothing 1546* 1547* Side effects: 1548* 1549* Call context: 1550* interrupt 1551* 1552----------------------------------------------------------------*/ 1553static void prism2sta_inf_authreq(wlandevice_t *wlandev, 1554 hfa384x_InfFrame_t *inf) 1555{ 1556 hfa384x_t *hw = (hfa384x_t *) wlandev->priv; 1557 struct sk_buff *skb; 1558 1559 skb = dev_alloc_skb(sizeof(*inf)); 1560 if (skb) { 1561 skb_put(skb, sizeof(*inf)); 1562 memcpy(skb->data, inf, sizeof(*inf)); 1563 skb_queue_tail(&hw->authq, skb); 1564 schedule_work(&hw->link_bh); 1565 } 1566} 1567 1568static void prism2sta_inf_authreq_defer(wlandevice_t *wlandev, 1569 hfa384x_InfFrame_t *inf) 1570{ 1571 hfa384x_t *hw = (hfa384x_t *) wlandev->priv; 1572 hfa384x_authenticateStation_data_t rec; 1573 1574 int i, added, result, cnt; 1575 u8 *addr; 1576 1577 /* 1578 ** Build the AuthenticateStation record. Initialize it for denying 1579 ** authentication. 1580 */ 1581 1582 memcpy(rec.address, inf->info.authreq.sta_addr, ETH_ALEN); 1583 rec.status = P80211ENUM_status_unspec_failure; 1584 1585 /* 1586 ** Authenticate based on the access mode. 1587 */ 1588 1589 switch (hw->accessmode) { 1590 case WLAN_ACCESS_NONE: 1591 1592 /* 1593 ** Deny all new authentications. However, if a station 1594 ** is ALREADY authenticated, then accept it. 1595 */ 1596 1597 for (i = 0; i < hw->authlist.cnt; i++) 1598 if (memcmp(rec.address, hw->authlist.addr[i], 1599 ETH_ALEN) == 0) { 1600 rec.status = P80211ENUM_status_successful; 1601 break; 1602 } 1603 1604 break; 1605 1606 case WLAN_ACCESS_ALL: 1607 1608 /* 1609 ** Allow all authentications. 1610 */ 1611 1612 rec.status = P80211ENUM_status_successful; 1613 break; 1614 1615 case WLAN_ACCESS_ALLOW: 1616 1617 /* 1618 ** Only allow the authentication if the MAC address 1619 ** is in the list of allowed addresses. 1620 ** 1621 ** Since this is the interrupt handler, we may be here 1622 ** while the access list is in the middle of being 1623 ** updated. Choose the list which is currently okay. 1624 ** See "prism2mib_priv_accessallow()" for details. 1625 */ 1626 1627 if (hw->allow.modify == 0) { 1628 cnt = hw->allow.cnt; 1629 addr = hw->allow.addr[0]; 1630 } else { 1631 cnt = hw->allow.cnt1; 1632 addr = hw->allow.addr1[0]; 1633 } 1634 1635 for (i = 0; i < cnt; i++, addr += ETH_ALEN) 1636 if (memcmp(rec.address, addr, ETH_ALEN) == 0) { 1637 rec.status = P80211ENUM_status_successful; 1638 break; 1639 } 1640 1641 break; 1642 1643 case WLAN_ACCESS_DENY: 1644 1645 /* 1646 ** Allow the authentication UNLESS the MAC address is 1647 ** in the list of denied addresses. 1648 ** 1649 ** Since this is the interrupt handler, we may be here 1650 ** while the access list is in the middle of being 1651 ** updated. Choose the list which is currently okay. 1652 ** See "prism2mib_priv_accessdeny()" for details. 1653 */ 1654 1655 if (hw->deny.modify == 0) { 1656 cnt = hw->deny.cnt; 1657 addr = hw->deny.addr[0]; 1658 } else { 1659 cnt = hw->deny.cnt1; 1660 addr = hw->deny.addr1[0]; 1661 } 1662 1663 rec.status = P80211ENUM_status_successful; 1664 1665 for (i = 0; i < cnt; i++, addr += ETH_ALEN) 1666 if (memcmp(rec.address, addr, ETH_ALEN) == 0) { 1667 rec.status = P80211ENUM_status_unspec_failure; 1668 break; 1669 } 1670 1671 break; 1672 } 1673 1674 /* 1675 ** If the authentication is okay, then add the MAC address to the 1676 ** list of authenticated stations. Don't add the address if it 1677 ** is already in the list. (802.11b does not seem to disallow 1678 ** a station from issuing an authentication request when the 1679 ** station is already authenticated. Does this sort of thing 1680 ** ever happen? We might as well do the check just in case.) 1681 */ 1682 1683 added = 0; 1684 1685 if (rec.status == P80211ENUM_status_successful) { 1686 for (i = 0; i < hw->authlist.cnt; i++) 1687 if (memcmp(rec.address, hw->authlist.addr[i], ETH_ALEN) 1688 == 0) 1689 break; 1690 1691 if (i >= hw->authlist.cnt) { 1692 if (hw->authlist.cnt >= WLAN_AUTH_MAX) { 1693 rec.status = P80211ENUM_status_ap_full; 1694 } else { 1695 memcpy(hw->authlist.addr[hw->authlist.cnt], 1696 rec.address, ETH_ALEN); 1697 hw->authlist.cnt++; 1698 added = 1; 1699 } 1700 } 1701 } 1702 1703 /* 1704 ** Send back the results of the authentication. If this doesn't work, 1705 ** then make sure to remove the address from the authenticated list if 1706 ** it was added. 1707 */ 1708 1709 rec.status = cpu_to_le16(rec.status); 1710 rec.algorithm = inf->info.authreq.algorithm; 1711 1712 result = hfa384x_drvr_setconfig(hw, HFA384x_RID_AUTHENTICATESTA, 1713 &rec, sizeof(rec)); 1714 if (result) { 1715 if (added) 1716 hw->authlist.cnt--; 1717 printk(KERN_ERR 1718 "setconfig(authenticatestation) failed, result=%d\n", 1719 result); 1720 } 1721} 1722 1723/*---------------------------------------------------------------- 1724* prism2sta_inf_psusercnt 1725* 1726* Handles the receipt of a PowerSaveUserCount info frame. Should 1727* be present in APs only. 1728* 1729* Arguments: 1730* wlandev wlan device structure 1731* inf ptr to info frame (contents in hfa384x order) 1732* 1733* Returns: 1734* nothing 1735* 1736* Side effects: 1737* 1738* Call context: 1739* interrupt 1740----------------------------------------------------------------*/ 1741static void prism2sta_inf_psusercnt(wlandevice_t *wlandev, 1742 hfa384x_InfFrame_t *inf) 1743{ 1744 hfa384x_t *hw = (hfa384x_t *) wlandev->priv; 1745 1746 hw->psusercount = le16_to_cpu(inf->info.psusercnt.usercnt); 1747} 1748 1749/*---------------------------------------------------------------- 1750* prism2sta_ev_info 1751* 1752* Handles the Info event. 1753* 1754* Arguments: 1755* wlandev wlan device structure 1756* inf ptr to a generic info frame 1757* 1758* Returns: 1759* nothing 1760* 1761* Side effects: 1762* 1763* Call context: 1764* interrupt 1765----------------------------------------------------------------*/ 1766void prism2sta_ev_info(wlandevice_t *wlandev, hfa384x_InfFrame_t *inf) 1767{ 1768 inf->infotype = le16_to_cpu(inf->infotype); 1769 /* Dispatch */ 1770 switch (inf->infotype) { 1771 case HFA384x_IT_HANDOVERADDR: 1772 prism2sta_inf_handover(wlandev, inf); 1773 break; 1774 case HFA384x_IT_COMMTALLIES: 1775 prism2sta_inf_tallies(wlandev, inf); 1776 break; 1777 case HFA384x_IT_HOSTSCANRESULTS: 1778 prism2sta_inf_hostscanresults(wlandev, inf); 1779 break; 1780 case HFA384x_IT_SCANRESULTS: 1781 prism2sta_inf_scanresults(wlandev, inf); 1782 break; 1783 case HFA384x_IT_CHINFORESULTS: 1784 prism2sta_inf_chinforesults(wlandev, inf); 1785 break; 1786 case HFA384x_IT_LINKSTATUS: 1787 prism2sta_inf_linkstatus(wlandev, inf); 1788 break; 1789 case HFA384x_IT_ASSOCSTATUS: 1790 prism2sta_inf_assocstatus(wlandev, inf); 1791 break; 1792 case HFA384x_IT_AUTHREQ: 1793 prism2sta_inf_authreq(wlandev, inf); 1794 break; 1795 case HFA384x_IT_PSUSERCNT: 1796 prism2sta_inf_psusercnt(wlandev, inf); 1797 break; 1798 case HFA384x_IT_KEYIDCHANGED: 1799 printk(KERN_WARNING "Unhandled IT_KEYIDCHANGED\n"); 1800 break; 1801 case HFA384x_IT_ASSOCREQ: 1802 printk(KERN_WARNING "Unhandled IT_ASSOCREQ\n"); 1803 break; 1804 case HFA384x_IT_MICFAILURE: 1805 printk(KERN_WARNING "Unhandled IT_MICFAILURE\n"); 1806 break; 1807 default: 1808 printk(KERN_WARNING 1809 "Unknown info type=0x%02x\n", inf->infotype); 1810 break; 1811 } 1812} 1813 1814/*---------------------------------------------------------------- 1815* prism2sta_ev_txexc 1816* 1817* Handles the TxExc event. A Transmit Exception event indicates 1818* that the MAC's TX process was unsuccessful - so the packet did 1819* not get transmitted. 1820* 1821* Arguments: 1822* wlandev wlan device structure 1823* status tx frame status word 1824* 1825* Returns: 1826* nothing 1827* 1828* Side effects: 1829* 1830* Call context: 1831* interrupt 1832----------------------------------------------------------------*/ 1833void prism2sta_ev_txexc(wlandevice_t *wlandev, u16 status) 1834{ 1835 pr_debug("TxExc status=0x%x.\n", status); 1836} 1837 1838/*---------------------------------------------------------------- 1839* prism2sta_ev_tx 1840* 1841* Handles the Tx event. 1842* 1843* Arguments: 1844* wlandev wlan device structure 1845* status tx frame status word 1846* Returns: 1847* nothing 1848* 1849* Side effects: 1850* 1851* Call context: 1852* interrupt 1853----------------------------------------------------------------*/ 1854void prism2sta_ev_tx(wlandevice_t *wlandev, u16 status) 1855{ 1856 pr_debug("Tx Complete, status=0x%04x\n", status); 1857 /* update linux network stats */ 1858 wlandev->linux_stats.tx_packets++; 1859} 1860 1861/*---------------------------------------------------------------- 1862* prism2sta_ev_rx 1863* 1864* Handles the Rx event. 1865* 1866* Arguments: 1867* wlandev wlan device structure 1868* 1869* Returns: 1870* nothing 1871* 1872* Side effects: 1873* 1874* Call context: 1875* interrupt 1876----------------------------------------------------------------*/ 1877void prism2sta_ev_rx(wlandevice_t *wlandev, struct sk_buff *skb) 1878{ 1879 p80211netdev_rx(wlandev, skb); 1880} 1881 1882/*---------------------------------------------------------------- 1883* prism2sta_ev_alloc 1884* 1885* Handles the Alloc event. 1886* 1887* Arguments: 1888* wlandev wlan device structure 1889* 1890* Returns: 1891* nothing 1892* 1893* Side effects: 1894* 1895* Call context: 1896* interrupt 1897----------------------------------------------------------------*/ 1898void prism2sta_ev_alloc(wlandevice_t *wlandev) 1899{ 1900 netif_wake_queue(wlandev->netdev); 1901} 1902 1903/*---------------------------------------------------------------- 1904* create_wlan 1905* 1906* Called at module init time. This creates the wlandevice_t structure 1907* and initializes it with relevant bits. 1908* 1909* Arguments: 1910* none 1911* 1912* Returns: 1913* the created wlandevice_t structure. 1914* 1915* Side effects: 1916* also allocates the priv/hw structures. 1917* 1918* Call context: 1919* process thread 1920* 1921----------------------------------------------------------------*/ 1922static wlandevice_t *create_wlan(void) 1923{ 1924 wlandevice_t *wlandev = NULL; 1925 hfa384x_t *hw = NULL; 1926 1927 /* Alloc our structures */ 1928 wlandev = kzalloc(sizeof(wlandevice_t), GFP_KERNEL); 1929 hw = kzalloc(sizeof(hfa384x_t), GFP_KERNEL); 1930 1931 if (!wlandev || !hw) { 1932 printk(KERN_ERR "%s: Memory allocation failure.\n", dev_info); 1933 kfree(wlandev); 1934 kfree(hw); 1935 return NULL; 1936 } 1937 1938 /* Initialize the network device object. */ 1939 wlandev->nsdname = dev_info; 1940 wlandev->msdstate = WLAN_MSD_HWPRESENT_PENDING; 1941 wlandev->priv = hw; 1942 wlandev->open = prism2sta_open; 1943 wlandev->close = prism2sta_close; 1944 wlandev->reset = prism2sta_reset; 1945 wlandev->txframe = prism2sta_txframe; 1946 wlandev->mlmerequest = prism2sta_mlmerequest; 1947 wlandev->set_multicast_list = prism2sta_setmulticast; 1948 wlandev->tx_timeout = hfa384x_tx_timeout; 1949 1950 wlandev->nsdcaps = P80211_NSDCAP_HWFRAGMENT | P80211_NSDCAP_AUTOJOIN; 1951 1952 /* Initialize the device private data structure. */ 1953 hw->dot11_desired_bss_type = 1; 1954 1955 return wlandev; 1956} 1957 1958void prism2sta_commsqual_defer(struct work_struct *data) 1959{ 1960 hfa384x_t *hw = container_of(data, struct hfa384x, commsqual_bh); 1961 wlandevice_t *wlandev = hw->wlandev; 1962 hfa384x_bytestr32_t ssid; 1963 struct p80211msg_dot11req_mibget msg; 1964 p80211item_uint32_t *mibitem = (p80211item_uint32_t *) 1965 &msg.mibattribute.data; 1966 int result = 0; 1967 1968 if (hw->wlandev->hwremoved) 1969 return; 1970 1971 /* we don't care if we're in AP mode */ 1972 if ((wlandev->macmode == WLAN_MACMODE_NONE) || 1973 (wlandev->macmode == WLAN_MACMODE_ESS_AP)) { 1974 return; 1975 } 1976 1977 /* It only makes sense to poll these in non-IBSS */ 1978 if (wlandev->macmode != WLAN_MACMODE_IBSS_STA) { 1979 result = hfa384x_drvr_getconfig( 1980 hw, HFA384x_RID_DBMCOMMSQUALITY, 1981 &hw->qual, HFA384x_RID_DBMCOMMSQUALITY_LEN); 1982 1983 if (result) { 1984 printk(KERN_ERR "error fetching commsqual\n"); 1985 return; 1986 } 1987 1988 pr_debug("commsqual %d %d %d\n", 1989 le16_to_cpu(hw->qual.CQ_currBSS), 1990 le16_to_cpu(hw->qual.ASL_currBSS), 1991 le16_to_cpu(hw->qual.ANL_currFC)); 1992 } 1993 1994 /* Get the signal rate */ 1995 msg.msgcode = DIDmsg_dot11req_mibget; 1996 mibitem->did = DIDmib_p2_p2MAC_p2CurrentTxRate; 1997 result = p80211req_dorequest(wlandev, (u8 *) &msg); 1998 1999 if (result) { 2000 pr_debug("get signal rate failed, result = %d\n", 2001 result); 2002 return; 2003 } 2004 2005 switch (mibitem->data) { 2006 case HFA384x_RATEBIT_1: 2007 hw->txrate = 10; 2008 break; 2009 case HFA384x_RATEBIT_2: 2010 hw->txrate = 20; 2011 break; 2012 case HFA384x_RATEBIT_5dot5: 2013 hw->txrate = 55; 2014 break; 2015 case HFA384x_RATEBIT_11: 2016 hw->txrate = 110; 2017 break; 2018 default: 2019 pr_debug("Bad ratebit (%d)\n", mibitem->data); 2020 } 2021 2022 /* Lastly, we need to make sure the BSSID didn't change on us */ 2023 result = hfa384x_drvr_getconfig(hw, 2024 HFA384x_RID_CURRENTBSSID, 2025 wlandev->bssid, WLAN_BSSID_LEN); 2026 if (result) { 2027 pr_debug("getconfig(0x%02x) failed, result = %d\n", 2028 HFA384x_RID_CURRENTBSSID, result); 2029 return; 2030 } 2031 2032 result = hfa384x_drvr_getconfig(hw, 2033 HFA384x_RID_CURRENTSSID, 2034 &ssid, sizeof(ssid)); 2035 if (result) { 2036 pr_debug("getconfig(0x%02x) failed, result = %d\n", 2037 HFA384x_RID_CURRENTSSID, result); 2038 return; 2039 } 2040 prism2mgmt_bytestr2pstr((hfa384x_bytestr_t *) &ssid, 2041 (p80211pstrd_t *) &wlandev->ssid); 2042 2043 /* Reschedule timer */ 2044 mod_timer(&hw->commsqual_timer, jiffies + HZ); 2045} 2046 2047void prism2sta_commsqual_timer(unsigned long data) 2048{ 2049 hfa384x_t *hw = (hfa384x_t *) data; 2050 2051 schedule_work(&hw->commsqual_bh); 2052}