1 //------------------------------------------------------------------------------
2 // Copyright (c) 2004-2010 Atheros Communications Inc.
3 // All rights reserved.
7 // Permission to use, copy, modify, and/or distribute this software for any
8 // purpose with or without fee is hereby granted, provided that the above
9 // copyright notice and this permission notice appear in all copies.
11 // THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
12 // WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
13 // MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
14 // ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
15 // WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
16 // ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
17 // OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
21 // Author(s): ="Atheros"
22 //------------------------------------------------------------------------------
25 * This driver is a pseudo ethernet driver to access the Atheros AR6000
29 #include "ar6000_drv.h"
30 #ifdef ATH6K_CONFIG_CFG80211
32 #endif /* ATH6K_CONFIG_CFG80211 */
34 #include "wmi_filter_linux.h"
35 #include "epping_test.h"
36 #include "wlan_config.h"
37 #include "ar3kconfig.h"
39 #include "AR6002/addrs.h"
42 /* LINUX_HACK_FUDGE_FACTOR -- this is used to provide a workaround for linux behavior. When
43 * the meta data was added to the header it was found that linux did not correctly provide
44 * enough headroom. However when more headroom was requested beyond what was truly needed
45 * Linux gave the requested headroom. Therefore to get the necessary headroom from Linux
46 * the driver requests more than is needed by the amount = LINUX_HACK_FUDGE_FACTOR */
47 #define LINUX_HACK_FUDGE_FACTOR 16
48 #define BDATA_BDADDR_OFFSET 28
50 u8 bcast_mac
[] = {0xff, 0xff, 0xff, 0xff, 0xff, 0xff};
51 u8 null_mac
[] = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0};
55 #define ATH_DEBUG_DBG_LOG ATH_DEBUG_MAKE_MODULE_MASK(0)
56 #define ATH_DEBUG_WLAN_CONNECT ATH_DEBUG_MAKE_MODULE_MASK(1)
57 #define ATH_DEBUG_WLAN_SCAN ATH_DEBUG_MAKE_MODULE_MASK(2)
58 #define ATH_DEBUG_WLAN_TX ATH_DEBUG_MAKE_MODULE_MASK(3)
59 #define ATH_DEBUG_WLAN_RX ATH_DEBUG_MAKE_MODULE_MASK(4)
60 #define ATH_DEBUG_HTC_RAW ATH_DEBUG_MAKE_MODULE_MASK(5)
61 #define ATH_DEBUG_HCI_BRIDGE ATH_DEBUG_MAKE_MODULE_MASK(6)
63 static ATH_DEBUG_MASK_DESCRIPTION driver_debug_desc
[] = {
64 { ATH_DEBUG_DBG_LOG
, "Target Debug Logs"},
65 { ATH_DEBUG_WLAN_CONNECT
, "WLAN connect"},
66 { ATH_DEBUG_WLAN_SCAN
, "WLAN scan"},
67 { ATH_DEBUG_WLAN_TX
, "WLAN Tx"},
68 { ATH_DEBUG_WLAN_RX
, "WLAN Rx"},
69 { ATH_DEBUG_HTC_RAW
, "HTC Raw IF tracing"},
70 { ATH_DEBUG_HCI_BRIDGE
, "HCI Bridge Setup"},
71 { ATH_DEBUG_HCI_RECV
, "HCI Recv tracing"},
72 { ATH_DEBUG_HCI_DUMP
, "HCI Packet dumps"},
75 ATH_DEBUG_INSTANTIATE_MODULE_VAR(driver
,
77 "Linux Driver Interface",
78 ATH_DEBUG_MASK_DEFAULTS
| ATH_DEBUG_WLAN_SCAN
|
80 ATH_DEBUG_DESCRIPTION_COUNT(driver_debug_desc
),
86 #define IS_MAC_NULL(mac) (mac[0]==0 && mac[1]==0 && mac[2]==0 && mac[3]==0 && mac[4]==0 && mac[5]==0)
87 #define IS_MAC_BCAST(mac) (*mac==0xff)
89 #define DESCRIPTION "Driver to access the Atheros AR600x Device, version " __stringify(__VER_MAJOR_) "." __stringify(__VER_MINOR_) "." __stringify(__VER_PATCH_) "." __stringify(__BUILD_NUMBER_)
91 MODULE_AUTHOR("Atheros Communications, Inc.");
92 MODULE_DESCRIPTION(DESCRIPTION
);
93 MODULE_LICENSE("Dual BSD/GPL");
95 #ifndef REORG_APTC_HEURISTICS
96 #undef ADAPTIVE_POWER_THROUGHPUT_CONTROL
97 #endif /* REORG_APTC_HEURISTICS */
99 #ifdef ADAPTIVE_POWER_THROUGHPUT_CONTROL
100 #define APTC_TRAFFIC_SAMPLING_INTERVAL 100 /* msec */
101 #define APTC_UPPER_THROUGHPUT_THRESHOLD 3000 /* Kbps */
102 #define APTC_LOWER_THROUGHPUT_THRESHOLD 2000 /* Kbps */
104 typedef struct aptc_traffic_record
{
106 struct timeval samplingTS
;
107 unsigned long bytesReceived
;
108 unsigned long bytesTransmitted
;
109 } APTC_TRAFFIC_RECORD
;
112 APTC_TRAFFIC_RECORD aptcTR
;
113 #endif /* ADAPTIVE_POWER_THROUGHPUT_CONTROL */
115 #ifdef EXPORT_HCI_BRIDGE_INTERFACE
116 // callbacks registered by HCI transport driver
117 HCI_TRANSPORT_CALLBACKS ar6kHciTransCallbacks
= { NULL
};
120 unsigned int processDot11Hdr
= 0;
121 int bmienable
= BMIENABLE_DEFAULT
;
123 char ifname
[IFNAMSIZ
] = {0,};
125 int wlaninitmode
= WLAN_INIT_MODE_DEFAULT
;
126 static bool bypasswmi
;
127 unsigned int debuglevel
= 0;
128 int tspecCompliance
= ATHEROS_COMPLIANCE
;
129 unsigned int busspeedlow
= 0;
130 unsigned int onebitmode
= 0;
131 unsigned int skipflash
= 0;
132 unsigned int wmitimeout
= 2;
133 unsigned int wlanNodeCaching
= 1;
134 unsigned int enableuartprint
= ENABLEUARTPRINT_DEFAULT
;
135 unsigned int logWmiRawMsgs
= 0;
136 unsigned int enabletimerwar
= 0;
137 unsigned int fwmode
= 1;
138 unsigned int mbox_yield_limit
= 99;
139 unsigned int enablerssicompensation
= 0;
140 int reduce_credit_dribble
= 1 + HTC_CONNECT_FLAGS_THRESHOLD_LEVEL_ONE_HALF
;
141 int allow_trace_signal
= 0;
142 #ifdef CONFIG_HOST_TCMD_SUPPORT
143 unsigned int testmode
=0;
146 unsigned int irqprocmode
= HIF_DEVICE_IRQ_SYNC_ONLY
;//HIF_DEVICE_IRQ_ASYNC_SYNC;
147 unsigned int panic_on_assert
= 1;
148 unsigned int nohifscattersupport
= NOHIFSCATTERSUPPORT_DEFAULT
;
150 unsigned int setuphci
= SETUPHCI_DEFAULT
;
151 unsigned int setuphcipal
= SETUPHCIPAL_DEFAULT
;
152 unsigned int loghci
= 0;
153 unsigned int setupbtdev
= SETUPBTDEV_DEFAULT
;
154 #ifndef EXPORT_HCI_BRIDGE_INTERFACE
155 unsigned int ar3khcibaud
= AR3KHCIBAUD_DEFAULT
;
156 unsigned int hciuartscale
= HCIUARTSCALE_DEFAULT
;
157 unsigned int hciuartstep
= HCIUARTSTEP_DEFAULT
;
159 #ifdef CONFIG_CHECKSUM_OFFLOAD
160 unsigned int csumOffload
=0;
161 unsigned int csumOffloadTest
=0;
163 unsigned int eppingtest
=0;
165 module_param_string(ifname
, ifname
, sizeof(ifname
), 0644);
166 module_param(wlaninitmode
, int, 0644);
167 module_param(bmienable
, int, 0644);
168 module_param(bypasswmi
, bool, 0644);
169 module_param(debuglevel
, uint
, 0644);
170 module_param(tspecCompliance
, int, 0644);
171 module_param(onebitmode
, uint
, 0644);
172 module_param(busspeedlow
, uint
, 0644);
173 module_param(skipflash
, uint
, 0644);
174 module_param(wmitimeout
, uint
, 0644);
175 module_param(wlanNodeCaching
, uint
, 0644);
176 module_param(logWmiRawMsgs
, uint
, 0644);
177 module_param(enableuartprint
, uint
, 0644);
178 module_param(enabletimerwar
, uint
, 0644);
179 module_param(fwmode
, uint
, 0644);
180 module_param(mbox_yield_limit
, uint
, 0644);
181 module_param(reduce_credit_dribble
, int, 0644);
182 module_param(allow_trace_signal
, int, 0644);
183 module_param(enablerssicompensation
, uint
, 0644);
184 module_param(processDot11Hdr
, uint
, 0644);
185 #ifdef CONFIG_CHECKSUM_OFFLOAD
186 module_param(csumOffload
, uint
, 0644);
188 #ifdef CONFIG_HOST_TCMD_SUPPORT
189 module_param(testmode
, uint
, 0644);
191 module_param(irqprocmode
, uint
, 0644);
192 module_param(nohifscattersupport
, uint
, 0644);
193 module_param(panic_on_assert
, uint
, 0644);
194 module_param(setuphci
, uint
, 0644);
195 module_param(setuphcipal
, uint
, 0644);
196 module_param(loghci
, uint
, 0644);
197 module_param(setupbtdev
, uint
, 0644);
198 #ifndef EXPORT_HCI_BRIDGE_INTERFACE
199 module_param(ar3khcibaud
, uint
, 0644);
200 module_param(hciuartscale
, uint
, 0644);
201 module_param(hciuartstep
, uint
, 0644);
203 module_param(eppingtest
, uint
, 0644);
205 /* in 2.6.10 and later this is now a pointer to a uint */
206 unsigned int _mboxnum
= HTC_MAILBOX_NUM_MAX
;
207 #define mboxnum &_mboxnum
210 u32 g_dbg_flags
= DBG_DEFAULTS
;
211 unsigned int debugflags
= 0;
213 unsigned int debughtc
= 0;
214 unsigned int debugbmi
= 0;
215 unsigned int debughif
= 0;
216 unsigned int txcreditsavailable
[HTC_MAILBOX_NUM_MAX
] = {0};
217 unsigned int txcreditsconsumed
[HTC_MAILBOX_NUM_MAX
] = {0};
218 unsigned int txcreditintrenable
[HTC_MAILBOX_NUM_MAX
] = {0};
219 unsigned int txcreditintrenableaggregate
[HTC_MAILBOX_NUM_MAX
] = {0};
220 module_param(debugflags
, uint
, 0644);
221 module_param(debugdriver
, int, 0644);
222 module_param(debughtc
, uint
, 0644);
223 module_param(debugbmi
, uint
, 0644);
224 module_param(debughif
, uint
, 0644);
225 module_param_array(txcreditsavailable
, uint
, mboxnum
, 0644);
226 module_param_array(txcreditsconsumed
, uint
, mboxnum
, 0644);
227 module_param_array(txcreditintrenable
, uint
, mboxnum
, 0644);
228 module_param_array(txcreditintrenableaggregate
, uint
, mboxnum
, 0644);
232 unsigned int resetok
= 1;
233 unsigned int tx_attempt
[HTC_MAILBOX_NUM_MAX
] = {0};
234 unsigned int tx_post
[HTC_MAILBOX_NUM_MAX
] = {0};
235 unsigned int tx_complete
[HTC_MAILBOX_NUM_MAX
] = {0};
236 unsigned int hifBusRequestNumMax
= 40;
237 unsigned int war23838_disabled
= 0;
238 #ifdef ADAPTIVE_POWER_THROUGHPUT_CONTROL
239 unsigned int enableAPTCHeuristics
= 1;
240 #endif /* ADAPTIVE_POWER_THROUGHPUT_CONTROL */
241 module_param_array(tx_attempt
, uint
, mboxnum
, 0644);
242 module_param_array(tx_post
, uint
, mboxnum
, 0644);
243 module_param_array(tx_complete
, uint
, mboxnum
, 0644);
244 module_param(hifBusRequestNumMax
, uint
, 0644);
245 module_param(war23838_disabled
, uint
, 0644);
246 module_param(resetok
, uint
, 0644);
247 #ifdef ADAPTIVE_POWER_THROUGHPUT_CONTROL
248 module_param(enableAPTCHeuristics
, uint
, 0644);
249 #endif /* ADAPTIVE_POWER_THROUGHPUT_CONTROL */
251 #ifdef BLOCK_TX_PATH_FLAG
253 module_param(blocktx
, int, 0644);
254 #endif /* BLOCK_TX_PATH_FLAG */
256 typedef struct user_rssi_compensation_t
{
268 } USER_RSSI_CPENSATION
;
270 static USER_RSSI_CPENSATION rssi_compensation_param
;
272 static A_INT16 rssi_compensation_table
[96];
274 int reconnect_flag
= 0;
275 static ar6k_pal_config_t ar6k_pal_config_g
;
277 /* Function declarations */
278 static int ar6000_init_module(void);
279 static void ar6000_cleanup_module(void);
281 int ar6000_init(struct net_device
*dev
);
282 static int ar6000_open(struct net_device
*dev
);
283 static int ar6000_close(struct net_device
*dev
);
284 static void ar6000_init_control_info(AR_SOFTC_T
*ar
);
285 static int ar6000_data_tx(struct sk_buff
*skb
, struct net_device
*dev
);
287 void ar6000_destroy(struct net_device
*dev
, unsigned int unregister
);
288 static void ar6000_detect_error(unsigned long ptr
);
289 static void ar6000_set_multicast_list(struct net_device
*dev
);
290 static struct net_device_stats
*ar6000_get_stats(struct net_device
*dev
);
291 static struct iw_statistics
*ar6000_get_iwstats(struct net_device
* dev
);
293 static void disconnect_timer_handler(unsigned long ptr
);
295 void read_rssi_compensation_param(AR_SOFTC_T
*ar
);
297 /* for android builds we call external APIs that handle firmware download and configuration */
299 /* !!!! Interim android support to make it easier to patch the default driver for
300 * android use. You must define an external source file ar6000_android.c that handles the following
302 extern void android_module_init(OSDRV_CALLBACKS
*osdrvCallbacks
);
303 extern void android_module_exit(void);
306 * HTC service connection handlers
308 static int ar6000_avail_ev(void *context
, void *hif_handle
);
310 static int ar6000_unavail_ev(void *context
, void *hif_handle
);
312 int ar6000_configure_target(AR_SOFTC_T
*ar
);
314 static void ar6000_target_failure(void *Instance
, int Status
);
316 static void ar6000_rx(void *Context
, HTC_PACKET
*pPacket
);
318 static void ar6000_rx_refill(void *Context
,HTC_ENDPOINT_ID Endpoint
);
320 static void ar6000_tx_complete(void *Context
, HTC_PACKET_QUEUE
*pPackets
);
322 static HTC_SEND_FULL_ACTION
ar6000_tx_queue_full(void *Context
, HTC_PACKET
*pPacket
);
324 #ifdef ATH_AR6K_11N_SUPPORT
325 static void ar6000_alloc_netbufs(A_NETBUF_QUEUE_T
*q
, u16 num
);
327 static void ar6000_deliver_frames_to_nw_stack(void * dev
, void *osbuf
);
328 //static void ar6000_deliver_frames_to_bt_stack(void * dev, void *osbuf);
330 static HTC_PACKET
*ar6000_alloc_amsdu_rxbuf(void *Context
, HTC_ENDPOINT_ID Endpoint
, int Length
);
332 static void ar6000_refill_amsdu_rxbufs(AR_SOFTC_T
*ar
, int Count
);
334 static void ar6000_cleanup_amsdu_rxbufs(AR_SOFTC_T
*ar
);
337 ar6000_sysfs_bmi_read(struct file
*fp
, struct kobject
*kobj
,
338 struct bin_attribute
*bin_attr
,
339 char *buf
, loff_t pos
, size_t count
);
342 ar6000_sysfs_bmi_write(struct file
*fp
, struct kobject
*kobj
,
343 struct bin_attribute
*bin_attr
,
344 char *buf
, loff_t pos
, size_t count
);
347 ar6000_sysfs_bmi_init(AR_SOFTC_T
*ar
);
349 /* HCI PAL callback function declarations */
350 int ar6k_setup_hci_pal(AR_SOFTC_T
*ar
);
351 void ar6k_cleanup_hci_pal(AR_SOFTC_T
*ar
);
354 ar6000_sysfs_bmi_deinit(AR_SOFTC_T
*ar
);
357 ar6000_sysfs_bmi_get_config(AR_SOFTC_T
*ar
, u32 mode
);
363 struct net_device
*ar6000_devices
[MAX_AR6000
];
364 static int is_netdev_registered
;
365 extern struct iw_handler_def ath_iw_handler_def
;
366 DECLARE_WAIT_QUEUE_HEAD(arEvent
);
367 static void ar6000_cookie_init(AR_SOFTC_T
*ar
);
368 static void ar6000_cookie_cleanup(AR_SOFTC_T
*ar
);
369 static void ar6000_free_cookie(AR_SOFTC_T
*ar
, struct ar_cookie
* cookie
);
370 static struct ar_cookie
*ar6000_alloc_cookie(AR_SOFTC_T
*ar
);
373 static int ar6000_reinstall_keys(AR_SOFTC_T
*ar
,u8 key_op_ctrl
);
376 #ifdef CONFIG_AP_VIRTUAL_ADAPTER_SUPPORT
377 struct net_device
*arApNetDev
;
378 #endif /* CONFIG_AP_VIRTUAL_ADAPTER_SUPPORT */
380 static struct ar_cookie s_ar_cookie_mem
[MAX_COOKIE_NUM
];
382 #define HOST_INTEREST_ITEM_ADDRESS(ar, item) \
383 (((ar)->arTargetType == TARGET_TYPE_AR6002) ? AR6002_HOST_INTEREST_ITEM_ADDRESS(item) : \
384 (((ar)->arTargetType == TARGET_TYPE_AR6003) ? AR6003_HOST_INTEREST_ITEM_ADDRESS(item) : 0))
387 static struct net_device_ops ar6000_netdev_ops
= {
389 .ndo_open
= ar6000_open
,
390 .ndo_stop
= ar6000_close
,
391 .ndo_get_stats
= ar6000_get_stats
,
392 .ndo_do_ioctl
= ar6000_ioctl
,
393 .ndo_start_xmit
= ar6000_data_tx
,
394 .ndo_set_multicast_list
= ar6000_set_multicast_list
,
397 /* Debug log support */
400 * Flag to govern whether the debug logs should be parsed in the kernel
401 * or reported to the application.
403 #define REPORT_DEBUG_LOGS_TO_APP
406 ar6000_set_host_app_area(AR_SOFTC_T
*ar
)
409 struct host_app_area_s host_app_area
;
411 /* Fetch the address of the host_app_area_s instance in the host interest area */
412 address
= TARG_VTOP(ar
->arTargetType
, HOST_INTEREST_ITEM_ADDRESS(ar
, hi_app_host_interest
));
413 if (ar6000_ReadRegDiag(ar
->arHifDevice
, &address
, &data
) != A_OK
) {
416 address
= TARG_VTOP(ar
->arTargetType
, data
);
417 host_app_area
.wmi_protocol_ver
= WMI_PROTOCOL_VERSION
;
418 if (ar6000_WriteDataDiag(ar
->arHifDevice
, address
,
419 (A_UCHAR
*)&host_app_area
,
420 sizeof(struct host_app_area_s
)) != A_OK
)
428 u32
dbglog_get_debug_hdr_ptr(AR_SOFTC_T
*ar
)
434 address
= TARG_VTOP(ar
->arTargetType
, HOST_INTEREST_ITEM_ADDRESS(ar
, hi_dbglog_hdr
));
435 if ((status
= ar6000_ReadDataDiag(ar
->arHifDevice
, address
,
436 (A_UCHAR
*)¶m
, 4)) != A_OK
)
445 * The dbglog module has been initialized. Its ok to access the relevant
446 * data stuctures over the diagnostic window.
449 ar6000_dbglog_init_done(AR_SOFTC_T
*ar
)
451 ar
->dbglog_init_done
= true;
454 u32
dbglog_get_debug_fragment(A_INT8
*datap
, u32 len
, u32 limit
)
463 buffer
= (A_INT32
*)datap
;
464 length
= (limit
>> 2);
469 while (count
< length
) {
470 numargs
= DBGLOG_GET_NUMARGS(buffer
[count
]);
471 fraglen
= (count
<< 2);
472 count
+= numargs
+ 1;
480 dbglog_parse_debug_logs(A_INT8
*datap
, u32 len
)
491 buffer
= (A_INT32
*)datap
;
493 while (count
< length
) {
494 debugid
= DBGLOG_GET_DBGID(buffer
[count
]);
495 moduleid
= DBGLOG_GET_MODULEID(buffer
[count
]);
496 numargs
= DBGLOG_GET_NUMARGS(buffer
[count
]);
497 timestamp
= DBGLOG_GET_TIMESTAMP(buffer
[count
]);
500 AR_DEBUG_PRINTF(ATH_DEBUG_DBG_LOG
,("%d %d (%d)\n", moduleid
, debugid
, timestamp
));
504 AR_DEBUG_PRINTF(ATH_DEBUG_DBG_LOG
,("%d %d (%d): 0x%x\n", moduleid
, debugid
,
505 timestamp
, buffer
[count
+1]));
509 AR_DEBUG_PRINTF(ATH_DEBUG_DBG_LOG
,("%d %d (%d): 0x%x, 0x%x\n", moduleid
, debugid
,
510 timestamp
, buffer
[count
+1], buffer
[count
+2]));
514 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
,("Invalid args: %d\n", numargs
));
516 count
+= numargs
+ 1;
521 ar6000_dbglog_get_debug_logs(AR_SOFTC_T
*ar
)
523 u32 data
[8]; /* Should be able to accomodate struct dbglog_buf_s */
530 if (!ar
->dbglog_init_done
) return A_ERROR
;
533 AR6000_SPIN_LOCK(&ar
->arLock
, 0);
535 if (ar
->dbgLogFetchInProgress
) {
536 AR6000_SPIN_UNLOCK(&ar
->arLock
, 0);
540 /* block out others */
541 ar
->dbgLogFetchInProgress
= true;
543 AR6000_SPIN_UNLOCK(&ar
->arLock
, 0);
545 debug_hdr_ptr
= dbglog_get_debug_hdr_ptr(ar
);
546 printk("debug_hdr_ptr: 0x%x\n", debug_hdr_ptr
);
548 /* Get the contents of the ring buffer */
550 address
= TARG_VTOP(ar
->arTargetType
, debug_hdr_ptr
);
551 length
= 4 /* sizeof(dbuf) */ + 4 /* sizeof(dropped) */;
552 A_MEMZERO(data
, sizeof(data
));
553 ar6000_ReadDataDiag(ar
->arHifDevice
, address
, (A_UCHAR
*)data
, length
);
554 address
= TARG_VTOP(ar
->arTargetType
, data
[0] /* dbuf */);
556 dropped
= data
[1]; /* dropped */
557 length
= 4 /* sizeof(next) */ + 4 /* sizeof(buffer) */ + 4 /* sizeof(bufsize) */ + 4 /* sizeof(length) */ + 4 /* sizeof(count) */ + 4 /* sizeof(free) */;
558 A_MEMZERO(data
, sizeof(data
));
559 ar6000_ReadDataDiag(ar
->arHifDevice
, address
, (A_UCHAR
*)&data
, length
);
562 address
= TARG_VTOP(ar
->arTargetType
, data
[1] /* buffer*/);
563 length
= data
[3]; /* length */
564 if ((length
) && (length
<= data
[2] /* bufsize*/)) {
565 /* Rewind the index if it is about to overrun the buffer */
566 if (ar
->log_cnt
> (DBGLOG_HOST_LOG_BUFFER_SIZE
- length
)) {
569 if(A_OK
!= ar6000_ReadDataDiag(ar
->arHifDevice
, address
,
570 (A_UCHAR
*)&ar
->log_buffer
[ar
->log_cnt
], length
))
574 ar6000_dbglog_event(ar
, dropped
, (A_INT8
*)&ar
->log_buffer
[ar
->log_cnt
], length
);
575 ar
->log_cnt
+= length
;
577 AR_DEBUG_PRINTF(ATH_DEBUG_DBG_LOG
,("Length: %d (Total size: %d)\n",
581 address
= TARG_VTOP(ar
->arTargetType
, data
[0] /* next */);
582 length
= 4 /* sizeof(next) */ + 4 /* sizeof(buffer) */ + 4 /* sizeof(bufsize) */ + 4 /* sizeof(length) */ + 4 /* sizeof(count) */ + 4 /* sizeof(free) */;
583 A_MEMZERO(data
, sizeof(data
));
584 if(A_OK
!= ar6000_ReadDataDiag(ar
->arHifDevice
, address
,
585 (A_UCHAR
*)&data
, length
))
590 } while (address
!= firstbuf
);
593 ar
->dbgLogFetchInProgress
= false;
599 ar6000_dbglog_event(AR_SOFTC_T
*ar
, u32 dropped
,
600 A_INT8
*buffer
, u32 length
)
602 #ifdef REPORT_DEBUG_LOGS_TO_APP
603 #define MAX_WIRELESS_EVENT_SIZE 252
605 * Break it up into chunks of MAX_WIRELESS_EVENT_SIZE bytes of messages.
606 * There seems to be a limitation on the length of message that could be
607 * transmitted to the user app via this mechanism.
612 send
= dbglog_get_debug_fragment(&buffer
[sent
], length
- sent
,
613 MAX_WIRELESS_EVENT_SIZE
);
615 ar6000_send_event_to_app(ar
, WMIX_DBGLOG_EVENTID
, (u8
*)&buffer
[sent
], send
);
617 send
= dbglog_get_debug_fragment(&buffer
[sent
], length
- sent
,
618 MAX_WIRELESS_EVENT_SIZE
);
621 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
,("Dropped logs: 0x%x\nDebug info length: %d\n",
624 /* Interpret the debug logs */
625 dbglog_parse_debug_logs((A_INT8
*)buffer
, length
);
626 #endif /* REPORT_DEBUG_LOGS_TO_APP */
631 ar6000_init_module(void)
633 static int probed
= 0;
635 OSDRV_CALLBACKS osdrvCallbacks
;
637 a_module_debug_support_init();
640 /* check for debug mask overrides */
642 ATH_DEBUG_SET_DEBUG_MASK(htc
,debughtc
);
645 ATH_DEBUG_SET_DEBUG_MASK(bmi
,debugbmi
);
648 ATH_DEBUG_SET_DEBUG_MASK(hif
,debughif
);
650 if (debugdriver
!= 0) {
651 ATH_DEBUG_SET_DEBUG_MASK(driver
,debugdriver
);
656 A_REGISTER_MODULE_DEBUG_INFO(driver
);
658 A_MEMZERO(&osdrvCallbacks
,sizeof(osdrvCallbacks
));
659 osdrvCallbacks
.deviceInsertedHandler
= ar6000_avail_ev
;
660 osdrvCallbacks
.deviceRemovedHandler
= ar6000_unavail_ev
;
662 osdrvCallbacks
.deviceSuspendHandler
= ar6000_suspend_ev
;
663 osdrvCallbacks
.deviceResumeHandler
= ar6000_resume_ev
;
664 osdrvCallbacks
.devicePowerChangeHandler
= ar6000_power_change_ev
;
670 android_module_init(&osdrvCallbacks
);
674 /* Set the debug flags if specified at load time */
677 g_dbg_flags
= debugflags
;
686 #ifdef ADAPTIVE_POWER_THROUGHPUT_CONTROL
687 memset(&aptcTR
, 0, sizeof(APTC_TRAFFIC_RECORD
));
688 #endif /* ADAPTIVE_POWER_THROUGHPUT_CONTROL */
690 #ifdef CONFIG_HOST_GPIO_SUPPORT
692 #endif /* CONFIG_HOST_GPIO_SUPPORT */
694 status
= HIFInit(&osdrvCallbacks
);
702 ar6000_cleanup_module(void)
705 struct net_device
*ar6000_netdev
;
707 #ifdef ADAPTIVE_POWER_THROUGHPUT_CONTROL
708 /* Delete the Adaptive Power Control timer */
709 if (timer_pending(&aptcTimer
)) {
710 del_timer_sync(&aptcTimer
);
712 #endif /* ADAPTIVE_POWER_THROUGHPUT_CONTROL */
714 for (i
=0; i
< MAX_AR6000
; i
++) {
715 if (ar6000_devices
[i
] != NULL
) {
716 ar6000_netdev
= ar6000_devices
[i
];
717 ar6000_devices
[i
] = NULL
;
718 ar6000_destroy(ar6000_netdev
, 1);
722 HIFShutDownDevice(NULL
);
724 a_module_debug_support_cleanup();
729 android_module_exit();
732 AR_DEBUG_PRINTF(ATH_DEBUG_INFO
,("ar6000_cleanup: success\n"));
735 #ifdef ADAPTIVE_POWER_THROUGHPUT_CONTROL
737 aptcTimerHandler(unsigned long arg
)
744 ar
= (AR_SOFTC_T
*)arg
;
745 A_ASSERT(ar
!= NULL
);
746 A_ASSERT(!timer_pending(&aptcTimer
));
748 AR6000_SPIN_LOCK(&ar
->arLock
, 0);
750 /* Get the number of bytes transferred */
751 numbytes
= aptcTR
.bytesTransmitted
+ aptcTR
.bytesReceived
;
752 aptcTR
.bytesTransmitted
= aptcTR
.bytesReceived
= 0;
754 /* Calculate and decide based on throughput thresholds */
755 throughput
= ((numbytes
* 8)/APTC_TRAFFIC_SAMPLING_INTERVAL
); /* Kbps */
756 if (throughput
< APTC_LOWER_THROUGHPUT_THRESHOLD
) {
757 /* Enable Sleep and delete the timer */
758 A_ASSERT(ar
->arWmiReady
== true);
759 AR6000_SPIN_UNLOCK(&ar
->arLock
, 0);
760 status
= wmi_powermode_cmd(ar
->arWmi
, REC_POWER
);
761 AR6000_SPIN_LOCK(&ar
->arLock
, 0);
762 A_ASSERT(status
== A_OK
);
763 aptcTR
.timerScheduled
= false;
765 A_TIMEOUT_MS(&aptcTimer
, APTC_TRAFFIC_SAMPLING_INTERVAL
, 0);
768 AR6000_SPIN_UNLOCK(&ar
->arLock
, 0);
770 #endif /* ADAPTIVE_POWER_THROUGHPUT_CONTROL */
772 #ifdef ATH_AR6K_11N_SUPPORT
774 ar6000_alloc_netbufs(A_NETBUF_QUEUE_T
*q
, u16 num
)
779 if((osbuf
= A_NETBUF_ALLOC(AR6000_BUFFER_SIZE
))) {
780 A_NETBUF_ENQUEUE(q
, osbuf
);
788 A_PRINTF("%s(), allocation of netbuf failed", __func__
);
793 static struct bin_attribute bmi_attr
= {
794 .attr
= {.name
= "bmi", .mode
= 0600},
795 .read
= ar6000_sysfs_bmi_read
,
796 .write
= ar6000_sysfs_bmi_write
,
800 ar6000_sysfs_bmi_read(struct file
*fp
, struct kobject
*kobj
,
801 struct bin_attribute
*bin_attr
,
802 char *buf
, loff_t pos
, size_t count
)
806 HIF_DEVICE_OS_DEVICE_INFO
*osDevInfo
;
808 AR_DEBUG_PRINTF(ATH_DEBUG_INFO
,("BMI: Read %d bytes\n", (u32
)count
));
809 for (index
=0; index
< MAX_AR6000
; index
++) {
810 ar
= (AR_SOFTC_T
*)ar6k_priv(ar6000_devices
[index
]);
811 osDevInfo
= &ar
->osDevInfo
;
812 if (kobj
== (&(((struct device
*)osDevInfo
->pOSDevice
)->kobj
))) {
817 if (index
== MAX_AR6000
) return 0;
819 if ((BMIRawRead(ar
->arHifDevice
, (A_UCHAR
*)buf
, count
, true)) != A_OK
) {
827 ar6000_sysfs_bmi_write(struct file
*fp
, struct kobject
*kobj
,
828 struct bin_attribute
*bin_attr
,
829 char *buf
, loff_t pos
, size_t count
)
833 HIF_DEVICE_OS_DEVICE_INFO
*osDevInfo
;
835 AR_DEBUG_PRINTF(ATH_DEBUG_INFO
,("BMI: Write %d bytes\n", (u32
)count
));
836 for (index
=0; index
< MAX_AR6000
; index
++) {
837 ar
= (AR_SOFTC_T
*)ar6k_priv(ar6000_devices
[index
]);
838 osDevInfo
= &ar
->osDevInfo
;
839 if (kobj
== (&(((struct device
*)osDevInfo
->pOSDevice
)->kobj
))) {
844 if (index
== MAX_AR6000
) return 0;
846 if ((BMIRawWrite(ar
->arHifDevice
, (A_UCHAR
*)buf
, count
)) != A_OK
) {
854 ar6000_sysfs_bmi_init(AR_SOFTC_T
*ar
)
858 AR_DEBUG_PRINTF(ATH_DEBUG_INFO
,("BMI: Creating sysfs entry\n"));
859 A_MEMZERO(&ar
->osDevInfo
, sizeof(HIF_DEVICE_OS_DEVICE_INFO
));
861 /* Get the underlying OS device */
862 status
= HIFConfigureDevice(ar
->arHifDevice
,
863 HIF_DEVICE_GET_OS_DEVICE
,
865 sizeof(HIF_DEVICE_OS_DEVICE_INFO
));
868 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
, ("BMI: Failed to get OS device info from HIF\n"));
872 /* Create a bmi entry in the sysfs filesystem */
873 if ((sysfs_create_bin_file(&(((struct device
*)ar
->osDevInfo
.pOSDevice
)->kobj
), &bmi_attr
)) < 0)
875 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
,("BMI: Failed to create entry for bmi in sysfs filesystem\n"));
883 ar6000_sysfs_bmi_deinit(AR_SOFTC_T
*ar
)
885 AR_DEBUG_PRINTF(ATH_DEBUG_INFO
,("BMI: Deleting sysfs entry\n"));
887 sysfs_remove_bin_file(&(((struct device
*)ar
->osDevInfo
.pOSDevice
)->kobj
), &bmi_attr
);
890 #define bmifn(fn) do { \
892 AR_DEBUG_PRINTF(ATH_DEBUG_ERR, ("BMI operation failed: %d\n", __LINE__)); \
897 #ifdef INIT_MODE_DRV_ENABLED
899 #ifdef SOFTMAC_FILE_USED
900 #define AR6002_MAC_ADDRESS_OFFSET 0x0A
901 #define AR6003_MAC_ADDRESS_OFFSET 0x16
903 void calculate_crc(u32 TargetType
, A_UCHAR
*eeprom_data
)
911 if (TargetType
== TARGET_TYPE_AR6001
)
914 ptr_crc
= (u16
*)eeprom_data
;
916 else if (TargetType
== TARGET_TYPE_AR6003
)
919 ptr_crc
= (u16
*)((A_UCHAR
*)eeprom_data
+ 0x04);
924 ptr_crc
= (u16
*)((A_UCHAR
*)eeprom_data
+ 0x04);
931 // Recalculate new CRC
933 ptr16_eeprom
= (u16
*)eeprom_data
;
934 for (i
= 0;i
< eeprom_size
; i
+= 2)
936 checksum
= checksum
^ (*ptr16_eeprom
);
939 checksum
= 0xFFFF ^ checksum
;
944 ar6000_softmac_update(AR_SOFTC_T
*ar
, A_UCHAR
*eeprom_data
, size_t size
)
946 const char *source
= "random generated";
947 const struct firmware
*softmac_entry
;
949 switch (ar
->arTargetType
) {
950 case TARGET_TYPE_AR6002
:
951 ptr_mac
= (u8
*)((A_UCHAR
*)eeprom_data
+ AR6002_MAC_ADDRESS_OFFSET
);
953 case TARGET_TYPE_AR6003
:
954 ptr_mac
= (u8
*)((A_UCHAR
*)eeprom_data
+ AR6003_MAC_ADDRESS_OFFSET
);
957 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
, ("Invalid Target Type\n"));
960 printk(KERN_DEBUG
"MAC from EEPROM %pM\n", ptr_mac
);
962 /* create a random MAC in case we cannot read file from system */
966 ptr_mac
[3] = random32() & 0xff;
967 ptr_mac
[4] = random32() & 0xff;
968 ptr_mac
[5] = random32() & 0xff;
969 if ((A_REQUEST_FIRMWARE(&softmac_entry
, "softmac", ((struct device
*)ar
->osDevInfo
.pOSDevice
))) == 0)
971 char *macbuf
= A_MALLOC_NOWAIT(softmac_entry
->size
+1);
973 unsigned int softmac
[6];
974 memcpy(macbuf
, softmac_entry
->data
, softmac_entry
->size
);
975 macbuf
[softmac_entry
->size
] = '\0';
976 if (sscanf(macbuf
, "%02x:%02x:%02x:%02x:%02x:%02x",
977 &softmac
[0], &softmac
[1], &softmac
[2],
978 &softmac
[3], &softmac
[4], &softmac
[5])==6) {
980 for (i
=0; i
<6; ++i
) {
981 ptr_mac
[i
] = softmac
[i
] & 0xff;
983 source
= "softmac file";
987 A_RELEASE_FIRMWARE(softmac_entry
);
989 printk(KERN_DEBUG
"MAC from %s %pM\n", source
, ptr_mac
);
990 calculate_crc(ar
->arTargetType
, eeprom_data
);
992 #endif /* SOFTMAC_FILE_USED */
995 ar6000_transfer_bin_file(AR_SOFTC_T
*ar
, AR6K_BIN_FILE file
, u32 address
, bool compressed
)
998 const char *filename
;
999 const struct firmware
*fw_entry
;
1004 if (ar
->arVersion
.target_ver
== AR6003_REV1_VERSION
) {
1005 filename
= AR6003_REV1_OTP_FILE
;
1006 } else if (ar
->arVersion
.target_ver
== AR6003_REV2_VERSION
) {
1007 filename
= AR6003_REV2_OTP_FILE
;
1009 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
, ("Unknown firmware revision: %d\n", ar
->arVersion
.target_ver
));
1014 case AR6K_FIRMWARE_FILE
:
1015 if (ar
->arVersion
.target_ver
== AR6003_REV1_VERSION
) {
1016 filename
= AR6003_REV1_FIRMWARE_FILE
;
1017 } else if (ar
->arVersion
.target_ver
== AR6003_REV2_VERSION
) {
1018 filename
= AR6003_REV2_FIRMWARE_FILE
;
1020 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
, ("Unknown firmware revision: %d\n", ar
->arVersion
.target_ver
));
1026 if (ar
->arVersion
.target_ver
== AR6003_REV1_VERSION
) {
1027 filename
= AR6003_REV1_EPPING_FIRMWARE_FILE
;
1028 } else if (ar
->arVersion
.target_ver
== AR6003_REV2_VERSION
) {
1029 filename
= AR6003_REV2_EPPING_FIRMWARE_FILE
;
1031 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
, ("eppingtest : unsupported firmware revision: %d\n",
1032 ar
->arVersion
.target_ver
));
1038 #ifdef CONFIG_HOST_TCMD_SUPPORT
1040 if (ar
->arVersion
.target_ver
== AR6003_REV1_VERSION
) {
1041 filename
= AR6003_REV1_TCMD_FIRMWARE_FILE
;
1042 } else if (ar
->arVersion
.target_ver
== AR6003_REV2_VERSION
) {
1043 filename
= AR6003_REV2_TCMD_FIRMWARE_FILE
;
1045 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
, ("Unknown firmware revision: %d\n", ar
->arVersion
.target_ver
));
1051 #ifdef HTC_RAW_INTERFACE
1052 if (!eppingtest
&& bypasswmi
) {
1053 if (ar
->arVersion
.target_ver
== AR6003_REV1_VERSION
) {
1054 filename
= AR6003_REV1_ART_FIRMWARE_FILE
;
1055 } else if (ar
->arVersion
.target_ver
== AR6003_REV2_VERSION
) {
1056 filename
= AR6003_REV2_ART_FIRMWARE_FILE
;
1058 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
, ("Unknown firmware revision: %d\n", ar
->arVersion
.target_ver
));
1066 case AR6K_PATCH_FILE
:
1067 if (ar
->arVersion
.target_ver
== AR6003_REV1_VERSION
) {
1068 filename
= AR6003_REV1_PATCH_FILE
;
1069 } else if (ar
->arVersion
.target_ver
== AR6003_REV2_VERSION
) {
1070 filename
= AR6003_REV2_PATCH_FILE
;
1072 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
, ("Unknown firmware revision: %d\n", ar
->arVersion
.target_ver
));
1077 case AR6K_BOARD_DATA_FILE
:
1078 if (ar
->arVersion
.target_ver
== AR6003_REV1_VERSION
) {
1079 filename
= AR6003_REV1_BOARD_DATA_FILE
;
1080 } else if (ar
->arVersion
.target_ver
== AR6003_REV2_VERSION
) {
1081 filename
= AR6003_REV2_BOARD_DATA_FILE
;
1083 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
, ("Unknown firmware revision: %d\n", ar
->arVersion
.target_ver
));
1089 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
, ("Unknown file type: %d\n", file
));
1092 if ((A_REQUEST_FIRMWARE(&fw_entry
, filename
, ((struct device
*)ar
->osDevInfo
.pOSDevice
))) != 0)
1094 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
, ("Failed to get %s\n", filename
));
1098 #ifdef SOFTMAC_FILE_USED
1099 if (file
==AR6K_BOARD_DATA_FILE
&& fw_entry
->data
) {
1100 ar6000_softmac_update(ar
, (A_UCHAR
*)fw_entry
->data
, fw_entry
->size
);
1105 fw_entry_size
= fw_entry
->size
;
1107 /* Load extended board data for AR6003 */
1108 if ((file
==AR6K_BOARD_DATA_FILE
) && (fw_entry
->data
)) {
1109 u32 board_ext_address
;
1110 u32 board_ext_data_size
;
1111 u32 board_data_size
;
1113 board_ext_data_size
= (((ar
)->arTargetType
== TARGET_TYPE_AR6002
) ? AR6002_BOARD_EXT_DATA_SZ
: \
1114 (((ar
)->arTargetType
== TARGET_TYPE_AR6003
) ? AR6003_BOARD_EXT_DATA_SZ
: 0));
1116 board_data_size
= (((ar
)->arTargetType
== TARGET_TYPE_AR6002
) ? AR6002_BOARD_DATA_SZ
: \
1117 (((ar
)->arTargetType
== TARGET_TYPE_AR6003
) ? AR6003_BOARD_DATA_SZ
: 0));
1119 /* Determine where in Target RAM to write Board Data */
1120 bmifn(BMIReadMemory(ar
->arHifDevice
, HOST_INTEREST_ITEM_ADDRESS(ar
, hi_board_ext_data
), (A_UCHAR
*)&board_ext_address
, 4));
1121 AR_DEBUG_PRINTF(ATH_DEBUG_INFO
, ("Board extended Data download address: 0x%x\n", board_ext_address
));
1123 /* check whether the target has allocated memory for extended board data and file contains extended board data */
1124 if ((board_ext_address
) && (fw_entry
->size
== (board_data_size
+ board_ext_data_size
))) {
1127 status
= BMIWriteMemory(ar
->arHifDevice
, board_ext_address
, (A_UCHAR
*)(fw_entry
->data
+ board_data_size
), board_ext_data_size
);
1129 if (status
!= A_OK
) {
1130 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
, ("BMI operation failed: %d\n", __LINE__
));
1131 A_RELEASE_FIRMWARE(fw_entry
);
1135 /* Record the fact that extended board Data IS initialized */
1137 bmifn(BMIWriteMemory(ar
->arHifDevice
, HOST_INTEREST_ITEM_ADDRESS(ar
, hi_board_ext_data_initialized
), (A_UCHAR
*)¶m
, 4));
1139 fw_entry_size
= board_data_size
;
1143 status
= BMIFastDownload(ar
->arHifDevice
, address
, (A_UCHAR
*)fw_entry
->data
, fw_entry_size
);
1145 status
= BMIWriteMemory(ar
->arHifDevice
, address
, (A_UCHAR
*)fw_entry
->data
, fw_entry_size
);
1148 if (status
!= A_OK
) {
1149 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
, ("BMI operation failed: %d\n", __LINE__
));
1150 A_RELEASE_FIRMWARE(fw_entry
);
1153 A_RELEASE_FIRMWARE(fw_entry
);
1156 #endif /* INIT_MODE_DRV_ENABLED */
1159 ar6000_update_bdaddr(AR_SOFTC_T
*ar
)
1162 if (setupbtdev
!= 0) {
1165 if (BMIReadMemory(ar
->arHifDevice
,
1166 HOST_INTEREST_ITEM_ADDRESS(ar
, hi_board_data
), (A_UCHAR
*)&address
, 4) != A_OK
)
1168 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
,("BMIReadMemory for hi_board_data failed\n"));
1172 if (BMIReadMemory(ar
->arHifDevice
, address
+ BDATA_BDADDR_OFFSET
, (A_UCHAR
*)ar
->bdaddr
, 6) != A_OK
)
1174 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
,("BMIReadMemory for BD address failed\n"));
1177 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
,("BDADDR 0x%x:0x%x:0x%x:0x%x:0x%x:0x%x\n", ar
->bdaddr
[0],
1178 ar
->bdaddr
[1], ar
->bdaddr
[2], ar
->bdaddr
[3],
1179 ar
->bdaddr
[4], ar
->bdaddr
[5]));
1186 ar6000_sysfs_bmi_get_config(AR_SOFTC_T
*ar
, u32 mode
)
1188 AR_DEBUG_PRINTF(ATH_DEBUG_INFO
,("BMI: Requesting device specific configuration\n"));
1190 if (mode
== WLAN_INIT_MODE_UDEV
) {
1192 const struct firmware
*fw_entry
;
1194 /* Get config using udev through a script in user space */
1195 sprintf(version
, "%2.2x", ar
->arVersion
.target_ver
);
1196 if ((A_REQUEST_FIRMWARE(&fw_entry
, version
, ((struct device
*)ar
->osDevInfo
.pOSDevice
))) != 0)
1198 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
, ("BMI: Failure to get configuration for target version: %s\n", version
));
1202 A_RELEASE_FIRMWARE(fw_entry
);
1203 #ifdef INIT_MODE_DRV_ENABLED
1205 /* The config is contained within the driver itself */
1207 u32 param
, options
, sleep
, address
;
1209 /* Temporarily disable system sleep */
1210 address
= MBOX_BASE_ADDRESS
+ LOCAL_SCRATCH_ADDRESS
;
1211 bmifn(BMIReadSOCRegister(ar
->arHifDevice
, address
, ¶m
));
1213 param
|= AR6K_OPTION_SLEEP_DISABLE
;
1214 bmifn(BMIWriteSOCRegister(ar
->arHifDevice
, address
, param
));
1216 address
= RTC_BASE_ADDRESS
+ SYSTEM_SLEEP_ADDRESS
;
1217 bmifn(BMIReadSOCRegister(ar
->arHifDevice
, address
, ¶m
));
1219 param
|= WLAN_SYSTEM_SLEEP_DISABLE_SET(1);
1220 bmifn(BMIWriteSOCRegister(ar
->arHifDevice
, address
, param
));
1221 AR_DEBUG_PRINTF(ATH_DEBUG_INFO
, ("old options: %d, old sleep: %d\n", options
, sleep
));
1223 if (ar
->arTargetType
== TARGET_TYPE_AR6003
) {
1224 /* Program analog PLL register */
1225 bmifn(BMIWriteSOCRegister(ar
->arHifDevice
, ANALOG_INTF_BASE_ADDRESS
+ 0x284, 0xF9104001));
1226 /* Run at 80/88MHz by default */
1227 param
= CPU_CLOCK_STANDARD_SET(1);
1229 /* Run at 40/44MHz by default */
1230 param
= CPU_CLOCK_STANDARD_SET(0);
1232 address
= RTC_BASE_ADDRESS
+ CPU_CLOCK_ADDRESS
;
1233 bmifn(BMIWriteSOCRegister(ar
->arHifDevice
, address
, param
));
1236 if (ar
->arTargetType
== TARGET_TYPE_AR6002
) {
1237 bmifn(BMIReadMemory(ar
->arHifDevice
, HOST_INTEREST_ITEM_ADDRESS(ar
, hi_ext_clk_detected
), (A_UCHAR
*)¶m
, 4));
1240 /* LPO_CAL.ENABLE = 1 if no external clk is detected */
1242 address
= RTC_BASE_ADDRESS
+ LPO_CAL_ADDRESS
;
1243 param
= LPO_CAL_ENABLE_SET(1);
1244 bmifn(BMIWriteSOCRegister(ar
->arHifDevice
, address
, param
));
1247 /* Venus2.0: Lower SDIO pad drive strength,
1248 * temporary WAR to avoid SDIO CRC error */
1249 if (ar
->arVersion
.target_ver
== AR6003_REV2_VERSION
) {
1250 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
, ("AR6K: Temporary WAR to avoid SDIO CRC error\n"));
1252 address
= GPIO_BASE_ADDRESS
+ GPIO_PIN10_ADDRESS
;
1253 bmifn(BMIWriteSOCRegister(ar
->arHifDevice
, address
, param
));
1255 address
= GPIO_BASE_ADDRESS
+ GPIO_PIN11_ADDRESS
;
1256 bmifn(BMIWriteSOCRegister(ar
->arHifDevice
, address
, param
));
1258 address
= GPIO_BASE_ADDRESS
+ GPIO_PIN12_ADDRESS
;
1259 bmifn(BMIWriteSOCRegister(ar
->arHifDevice
, address
, param
));
1261 address
= GPIO_BASE_ADDRESS
+ GPIO_PIN13_ADDRESS
;
1262 bmifn(BMIWriteSOCRegister(ar
->arHifDevice
, address
, param
));
1265 #ifdef FORCE_INTERNAL_CLOCK
1266 /* Ignore external clock, if any, and force use of internal clock */
1267 if (ar
->arTargetType
== TARGET_TYPE_AR6003
) {
1268 /* hi_ext_clk_detected = 0 */
1270 bmifn(BMIWriteMemory(ar
->arHifDevice
, HOST_INTEREST_ITEM_ADDRESS(ar
, hi_ext_clk_detected
), (A_UCHAR
*)¶m
, 4));
1272 /* CLOCK_CONTROL &= ~LF_CLK32 */
1273 address
= RTC_BASE_ADDRESS
+ CLOCK_CONTROL_ADDRESS
;
1274 bmifn(BMIReadSOCRegister(ar
->arHifDevice
, address
, ¶m
));
1275 param
&= (~CLOCK_CONTROL_LF_CLK32_SET(1));
1276 bmifn(BMIWriteSOCRegister(ar
->arHifDevice
, address
, param
));
1278 #endif /* FORCE_INTERNAL_CLOCK */
1280 /* Transfer Board Data from Target EEPROM to Target RAM */
1281 if (ar
->arTargetType
== TARGET_TYPE_AR6003
) {
1282 /* Determine where in Target RAM to write Board Data */
1283 bmifn(BMIReadMemory(ar
->arHifDevice
, HOST_INTEREST_ITEM_ADDRESS(ar
, hi_board_data
), (A_UCHAR
*)&address
, 4));
1284 AR_DEBUG_PRINTF(ATH_DEBUG_INFO
, ("Board Data download address: 0x%x\n", address
));
1286 /* Write EEPROM data to Target RAM */
1287 if ((ar6000_transfer_bin_file(ar
, AR6K_BOARD_DATA_FILE
, address
, false)) != A_OK
) {
1291 /* Record the fact that Board Data IS initialized */
1293 bmifn(BMIWriteMemory(ar
->arHifDevice
, HOST_INTEREST_ITEM_ADDRESS(ar
, hi_board_data_initialized
), (A_UCHAR
*)¶m
, 4));
1295 /* Transfer One time Programmable data */
1296 AR6K_DATA_DOWNLOAD_ADDRESS(address
, ar
->arVersion
.target_ver
);
1297 status
= ar6000_transfer_bin_file(ar
, AR6K_OTP_FILE
, address
, true);
1298 if (status
== A_OK
) {
1299 /* Execute the OTP code */
1301 AR6K_APP_START_OVERRIDE_ADDRESS(address
, ar
->arVersion
.target_ver
);
1302 bmifn(BMIExecute(ar
->arHifDevice
, address
, ¶m
));
1303 } else if (status
!= A_ENOENT
) {
1307 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
, ("Programming of board data for chip %d not supported\n", ar
->arTargetType
));
1311 /* Download Target firmware */
1312 AR6K_DATA_DOWNLOAD_ADDRESS(address
, ar
->arVersion
.target_ver
);
1313 if ((ar6000_transfer_bin_file(ar
, AR6K_FIRMWARE_FILE
, address
, true)) != A_OK
) {
1317 /* Set starting address for firmware */
1318 AR6K_APP_START_OVERRIDE_ADDRESS(address
, ar
->arVersion
.target_ver
);
1319 bmifn(BMISetAppStart(ar
->arHifDevice
, address
));
1321 /* Apply the patches */
1322 AR6K_PATCH_DOWNLOAD_ADDRESS(address
, ar
->arVersion
.target_ver
);
1323 if ((ar6000_transfer_bin_file(ar
, AR6K_PATCH_FILE
, address
, false)) != A_OK
) {
1328 bmifn(BMIWriteMemory(ar
->arHifDevice
, HOST_INTEREST_ITEM_ADDRESS(ar
, hi_dset_list_head
), (A_UCHAR
*)¶m
, 4));
1330 if (ar
->arTargetType
== TARGET_TYPE_AR6003
) {
1331 if (ar
->arVersion
.target_ver
== AR6003_REV1_VERSION
) {
1332 /* Reserve 5.5K of RAM */
1334 } else { /* AR6003_REV2_VERSION */
1335 /* Reserve 6.5K of RAM */
1338 bmifn(BMIWriteMemory(ar
->arHifDevice
, HOST_INTEREST_ITEM_ADDRESS(ar
, hi_end_RAM_reserve_sz
), (A_UCHAR
*)¶m
, 4));
1341 /* Restore system sleep */
1342 address
= RTC_BASE_ADDRESS
+ SYSTEM_SLEEP_ADDRESS
;
1343 bmifn(BMIWriteSOCRegister(ar
->arHifDevice
, address
, sleep
));
1345 address
= MBOX_BASE_ADDRESS
+ LOCAL_SCRATCH_ADDRESS
;
1346 param
= options
| 0x20;
1347 bmifn(BMIWriteSOCRegister(ar
->arHifDevice
, address
, param
));
1349 if (ar
->arTargetType
== TARGET_TYPE_AR6003
) {
1350 /* Configure GPIO AR6003 UART */
1351 #ifndef CONFIG_AR600x_DEBUG_UART_TX_PIN
1352 #define CONFIG_AR600x_DEBUG_UART_TX_PIN 8
1354 param
= CONFIG_AR600x_DEBUG_UART_TX_PIN
;
1355 bmifn(BMIWriteMemory(ar
->arHifDevice
, HOST_INTEREST_ITEM_ADDRESS(ar
, hi_dbg_uart_txpin
), (A_UCHAR
*)¶m
, 4));
1357 #if (CONFIG_AR600x_DEBUG_UART_TX_PIN == 23)
1359 address
= GPIO_BASE_ADDRESS
+ CLOCK_GPIO_ADDRESS
;
1360 bmifn(BMIReadSOCRegister(ar
->arHifDevice
, address
, ¶m
));
1361 param
|= CLOCK_GPIO_BT_CLK_OUT_EN_SET(1);
1362 bmifn(BMIWriteSOCRegister(ar
->arHifDevice
, address
, param
));
1366 /* Configure GPIO for BT Reset */
1367 #ifdef ATH6KL_CONFIG_GPIO_BT_RESET
1368 #define CONFIG_AR600x_BT_RESET_PIN 0x16
1369 param
= CONFIG_AR600x_BT_RESET_PIN
;
1370 bmifn(BMIWriteMemory(ar
->arHifDevice
, HOST_INTEREST_ITEM_ADDRESS(ar
, hi_hci_uart_support_pins
), (A_UCHAR
*)¶m
, 4));
1371 #endif /* ATH6KL_CONFIG_GPIO_BT_RESET */
1373 /* Configure UART flow control polarity */
1374 #ifndef CONFIG_ATH6KL_BT_UART_FC_POLARITY
1375 #define CONFIG_ATH6KL_BT_UART_FC_POLARITY 0
1378 #if (CONFIG_ATH6KL_BT_UART_FC_POLARITY == 1)
1379 if (ar
->arVersion
.target_ver
== AR6003_REV2_VERSION
) {
1380 param
= ((CONFIG_ATH6KL_BT_UART_FC_POLARITY
<< 1) & 0x2);
1381 bmifn(BMIWriteMemory(ar
->arHifDevice
, HOST_INTEREST_ITEM_ADDRESS(ar
, hi_hci_uart_pwr_mgmt_params
), (A_UCHAR
*)¶m
, 4));
1383 #endif /* CONFIG_ATH6KL_BT_UART_FC_POLARITY */
1386 #ifdef HTC_RAW_INTERFACE
1387 if (!eppingtest
&& bypasswmi
) {
1388 /* Don't run BMIDone for ART mode and force resetok=0 */
1392 #endif /* HTC_RAW_INTERFACE */
1394 #endif /* INIT_MODE_DRV_ENABLED */
1401 ar6000_configure_target(AR_SOFTC_T
*ar
)
1404 if (enableuartprint
) {
1406 if (BMIWriteMemory(ar
->arHifDevice
,
1407 HOST_INTEREST_ITEM_ADDRESS(ar
, hi_serial_enable
),
1411 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
,("BMIWriteMemory for enableuartprint failed \n"));
1414 AR_DEBUG_PRINTF(ATH_DEBUG_INFO
,("Serial console prints enabled\n"));
1417 /* Tell target which HTC version it is used*/
1418 param
= HTC_PROTOCOL_VERSION
;
1419 if (BMIWriteMemory(ar
->arHifDevice
,
1420 HOST_INTEREST_ITEM_ADDRESS(ar
, hi_app_host_interest
),
1424 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
,("BMIWriteMemory for htc version failed \n"));
1428 #ifdef CONFIG_HOST_TCMD_SUPPORT
1430 ar
->arTargetMode
= AR6000_TCMD_MODE
;
1432 ar
->arTargetMode
= AR6000_WLAN_MODE
;
1435 if (enabletimerwar
) {
1438 if (BMIReadMemory(ar
->arHifDevice
,
1439 HOST_INTEREST_ITEM_ADDRESS(ar
, hi_option_flag
),
1443 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
,("BMIReadMemory for enabletimerwar failed \n"));
1447 param
|= HI_OPTION_TIMER_WAR
;
1449 if (BMIWriteMemory(ar
->arHifDevice
,
1450 HOST_INTEREST_ITEM_ADDRESS(ar
, hi_option_flag
),
1454 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
,("BMIWriteMemory for enabletimerwar failed \n"));
1457 AR_DEBUG_PRINTF(ATH_DEBUG_INFO
,("Timer WAR enabled\n"));
1460 /* set the firmware mode to STA/IBSS/AP */
1464 if (BMIReadMemory(ar
->arHifDevice
,
1465 HOST_INTEREST_ITEM_ADDRESS(ar
, hi_option_flag
),
1469 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
,("BMIReadMemory for setting fwmode failed \n"));
1473 param
|= (fwmode
<< HI_OPTION_FW_MODE_SHIFT
);
1475 if (BMIWriteMemory(ar
->arHifDevice
,
1476 HOST_INTEREST_ITEM_ADDRESS(ar
, hi_option_flag
),
1480 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
,("BMIWriteMemory for setting fwmode failed \n"));
1483 AR_DEBUG_PRINTF(ATH_DEBUG_INFO
,("Firmware mode set\n"));
1486 #ifdef ATH6KL_DISABLE_TARGET_DBGLOGS
1490 if (BMIReadMemory(ar
->arHifDevice
,
1491 HOST_INTEREST_ITEM_ADDRESS(ar
, hi_option_flag
),
1495 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
,("BMIReadMemory for disabling debug logs failed\n"));
1499 param
|= HI_OPTION_DISABLE_DBGLOG
;
1501 if (BMIWriteMemory(ar
->arHifDevice
,
1502 HOST_INTEREST_ITEM_ADDRESS(ar
, hi_option_flag
),
1506 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
,("BMIWriteMemory for HI_OPTION_DISABLE_DBGLOG\n"));
1509 AR_DEBUG_PRINTF(ATH_DEBUG_INFO
,("Firmware mode set\n"));
1511 #endif /* ATH6KL_DISABLE_TARGET_DBGLOGS */
1514 * Hardcode the address use for the extended board data
1515 * Ideally this should be pre-allocate by the OS at boot time
1516 * But since it is a new feature and board data is loaded
1517 * at init time, we have to workaround this from host.
1518 * It is difficult to patch the firmware boot code,
1519 * but possible in theory.
1521 if (ar
->arTargetType
== TARGET_TYPE_AR6003
) {
1522 param
= AR6003_BOARD_EXT_DATA_ADDRESS
;
1523 if (BMIWriteMemory(ar
->arHifDevice
,
1524 HOST_INTEREST_ITEM_ADDRESS(ar
, hi_board_ext_data
),
1528 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
,("BMIWriteMemory for hi_board_ext_data failed \n"));
1534 /* since BMIInit is called in the driver layer, we have to set the block
1535 * size here for the target */
1537 if (ar6000_set_htc_params(ar
->arHifDevice
, ar
->arTargetType
,
1538 mbox_yield_limit
, 0)) {
1539 /* use default number of control buffers */
1543 if (setupbtdev
!= 0) {
1544 if (ar6000_set_hci_bridge_flags(ar
->arHifDevice
,
1554 init_netdev(struct net_device
*dev
, char *name
)
1556 dev
->netdev_ops
= &ar6000_netdev_ops
;
1557 dev
->watchdog_timeo
= AR6000_TX_TIMEOUT
;
1558 dev
->wireless_handlers
= &ath_iw_handler_def
;
1560 ath_iw_handler_def
.get_wireless_stats
= ar6000_get_iwstats
; /*Displayed via proc fs */
1563 * We need the OS to provide us with more headroom in order to
1564 * perform dix to 802.3, WMI header encap, and the HTC header
1566 if (processDot11Hdr
) {
1567 dev
->hard_header_len
= sizeof(struct ieee80211_qosframe
) + sizeof(ATH_LLC_SNAP_HDR
) + sizeof(WMI_DATA_HDR
) + HTC_HEADER_LEN
+ WMI_MAX_TX_META_SZ
+ LINUX_HACK_FUDGE_FACTOR
;
1569 dev
->hard_header_len
= ETH_HLEN
+ sizeof(ATH_LLC_SNAP_HDR
) +
1570 sizeof(WMI_DATA_HDR
) + HTC_HEADER_LEN
+ WMI_MAX_TX_META_SZ
+ LINUX_HACK_FUDGE_FACTOR
;
1575 strcpy(dev
->name
, name
);
1578 #ifdef SET_MODULE_OWNER
1579 SET_MODULE_OWNER(dev
);
1582 #ifdef CONFIG_CHECKSUM_OFFLOAD
1584 dev
->features
|= NETIF_F_IP_CSUM
; /*advertise kernel capability to do TCP/UDP CSUM offload for IPV4*/
1592 * HTC Event handlers
1595 ar6000_avail_ev(void *context
, void *hif_handle
)
1598 struct net_device
*dev
;
1601 int device_index
= 0;
1602 HTC_INIT_INFO htcInfo
;
1603 #ifdef ATH6K_CONFIG_CFG80211
1604 struct wireless_dev
*wdev
;
1605 #endif /* ATH6K_CONFIG_CFG80211 */
1606 int init_status
= A_OK
;
1608 AR_DEBUG_PRINTF(ATH_DEBUG_INFO
,("ar6000_available\n"));
1610 for (i
=0; i
< MAX_AR6000
; i
++) {
1611 if (ar6000_devices
[i
] == NULL
) {
1616 if (i
== MAX_AR6000
) {
1617 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
,("ar6000_available: max devices reached\n"));
1621 /* Save this. It gives a bit better readability especially since */
1622 /* we use another local "i" variable below. */
1625 #ifdef ATH6K_CONFIG_CFG80211
1626 wdev
= ar6k_cfg80211_init(NULL
);
1628 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
, ("%s: ar6k_cfg80211_init failed\n", __func__
));
1631 ar_netif
= wdev_priv(wdev
);
1633 dev
= alloc_etherdev(sizeof(AR_SOFTC_T
));
1635 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
,("ar6000_available: can't alloc etherdev\n"));
1639 ar_netif
= ar6k_priv(dev
);
1640 #endif /* ATH6K_CONFIG_CFG80211 */
1642 if (ar_netif
== NULL
) {
1643 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
, ("%s: Can't allocate ar6k priv memory\n", __func__
));
1647 A_MEMZERO(ar_netif
, sizeof(AR_SOFTC_T
));
1648 ar
= (AR_SOFTC_T
*)ar_netif
;
1650 #ifdef ATH6K_CONFIG_CFG80211
1652 wdev
->iftype
= NL80211_IFTYPE_STATION
;
1654 dev
= alloc_netdev_mq(0, "wlan%d", ether_setup
, 1);
1656 printk(KERN_CRIT
"AR6K: no memory for network device instance\n");
1657 ar6k_cfg80211_deinit(ar
);
1661 dev
->ieee80211_ptr
= wdev
;
1662 SET_NETDEV_DEV(dev
, wiphy_dev(wdev
->wiphy
));
1664 ar
->arNetworkType
= INFRA_NETWORK
;
1665 #endif /* ATH6K_CONFIG_CFG80211 */
1667 init_netdev(dev
, ifname
);
1669 #ifdef SET_NETDEV_DEV
1671 HIF_DEVICE_OS_DEVICE_INFO osDevInfo
;
1672 A_MEMZERO(&osDevInfo
, sizeof(osDevInfo
));
1673 if (!HIFConfigureDevice(hif_handle
, HIF_DEVICE_GET_OS_DEVICE
,
1674 &osDevInfo
, sizeof(osDevInfo
))) {
1675 SET_NETDEV_DEV(dev
, osDevInfo
.pOSDevice
);
1681 ar
->arHifDevice
= hif_handle
;
1682 ar
->arWlanState
= WLAN_ENABLED
;
1683 ar
->arDeviceIndex
= device_index
;
1685 ar
->arWlanPowerState
= WLAN_POWER_STATE_ON
;
1686 ar
->arWlanOff
= false; /* We are in ON state */
1688 ar
->arWowState
= WLAN_WOW_STATE_NONE
;
1689 ar
->arBTOff
= true; /* BT chip assumed to be OFF */
1690 ar
->arBTSharing
= WLAN_CONFIG_BT_SHARING
;
1691 ar
->arWlanOffConfig
= WLAN_CONFIG_WLAN_OFF
;
1692 ar
->arSuspendConfig
= WLAN_CONFIG_PM_SUSPEND
;
1693 ar
->arWow2Config
= WLAN_CONFIG_PM_WOW2
;
1694 #endif /* CONFIG_PM */
1696 A_INIT_TIMER(&ar
->arHBChallengeResp
.timer
, ar6000_detect_error
, dev
);
1697 ar
->arHBChallengeResp
.seqNum
= 0;
1698 ar
->arHBChallengeResp
.outstanding
= false;
1699 ar
->arHBChallengeResp
.missCnt
= 0;
1700 ar
->arHBChallengeResp
.frequency
= AR6000_HB_CHALLENGE_RESP_FREQ_DEFAULT
;
1701 ar
->arHBChallengeResp
.missThres
= AR6000_HB_CHALLENGE_RESP_MISS_THRES_DEFAULT
;
1703 ar6000_init_control_info(ar
);
1704 init_waitqueue_head(&arEvent
);
1705 sema_init(&ar
->arSem
, 1);
1706 ar
->bIsDestroyProgress
= false;
1708 INIT_HTC_PACKET_QUEUE(&ar
->amsdu_rx_buffer_queue
);
1710 #ifdef ADAPTIVE_POWER_THROUGHPUT_CONTROL
1711 A_INIT_TIMER(&aptcTimer
, aptcTimerHandler
, ar
);
1712 #endif /* ADAPTIVE_POWER_THROUGHPUT_CONTROL */
1714 A_INIT_TIMER(&ar
->disconnect_timer
, disconnect_timer_handler
, dev
);
1719 ar6000_sysfs_bmi_init(ar
);
1723 struct bmi_target_info targ_info
;
1725 if (BMIGetTargetInfo(ar
->arHifDevice
, &targ_info
) != A_OK
) {
1726 init_status
= A_ERROR
;
1727 goto avail_ev_failed
;
1730 ar
->arVersion
.target_ver
= targ_info
.target_ver
;
1731 ar
->arTargetType
= targ_info
.target_type
;
1733 /* do any target-specific preparation that can be done through BMI */
1734 if (ar6000_prepare_target(ar
->arHifDevice
,
1735 targ_info
.target_type
,
1736 targ_info
.target_ver
) != A_OK
) {
1737 init_status
= A_ERROR
;
1738 goto avail_ev_failed
;
1743 if (ar6000_configure_target(ar
) != A_OK
) {
1744 init_status
= A_ERROR
;
1745 goto avail_ev_failed
;
1748 A_MEMZERO(&htcInfo
,sizeof(htcInfo
));
1749 htcInfo
.pContext
= ar
;
1750 htcInfo
.TargetFailure
= ar6000_target_failure
;
1752 ar
->arHtcTarget
= HTCCreate(ar
->arHifDevice
,&htcInfo
);
1754 if (ar
->arHtcTarget
== NULL
) {
1755 init_status
= A_ERROR
;
1756 goto avail_ev_failed
;
1759 spin_lock_init(&ar
->arLock
);
1762 ar
->arWapiEnable
= 0;
1766 #ifdef CONFIG_CHECKSUM_OFFLOAD
1768 /*if external frame work is also needed, change and use an extended rxMetaVerion*/
1769 ar
->rxMetaVersion
=WMI_META_VERSION_2
;
1773 #ifdef ATH_AR6K_11N_SUPPORT
1774 if((ar
->aggr_cntxt
= aggr_init(ar6000_alloc_netbufs
)) == NULL
) {
1775 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
,("%s() Failed to initialize aggr.\n", __func__
));
1776 init_status
= A_ERROR
;
1777 goto avail_ev_failed
;
1780 aggr_register_rx_dispatcher(ar
->aggr_cntxt
, (void *)dev
, ar6000_deliver_frames_to_nw_stack
);
1783 HIFClaimDevice(ar
->arHifDevice
, ar
);
1785 /* We only register the device in the global list if we succeed. */
1786 /* If the device is in the global list, it will be destroyed */
1787 /* when the module is unloaded. */
1788 ar6000_devices
[device_index
] = dev
;
1790 /* Don't install the init function if BMI is requested */
1792 ar6000_netdev_ops
.ndo_init
= ar6000_init
;
1794 AR_DEBUG_PRINTF(ATH_DEBUG_INFO
, ("BMI enabled: %d\n", wlaninitmode
));
1795 if ((wlaninitmode
== WLAN_INIT_MODE_UDEV
) ||
1796 (wlaninitmode
== WLAN_INIT_MODE_DRV
))
1800 if ((status
= ar6000_sysfs_bmi_get_config(ar
, wlaninitmode
)) != A_OK
)
1802 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
,("ar6000_avail: ar6000_sysfs_bmi_get_config failed\n"));
1805 #ifdef HTC_RAW_INTERFACE
1806 break; /* Don't call ar6000_init for ART */
1809 status
= (ar6000_init(dev
)==0) ? A_OK
: A_ERROR
;
1811 if (status
!= A_OK
) {
1812 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
,("ar6000_avail: ar6000_init\n"));
1816 if (status
!= A_OK
) {
1817 init_status
= status
;
1818 goto avail_ev_failed
;
1823 /* This runs the init function if registered */
1824 if (register_netdev(dev
)) {
1825 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
,("ar6000_avail: register_netdev failed\n"));
1826 ar6000_destroy(dev
, 0);
1830 is_netdev_registered
= 1;
1832 #ifdef CONFIG_AP_VIRTUAL_ADAPTER_SUPPORT
1834 #endif /* CONFIG_AP_VIRTUAL_ADAPTER_SUPPORT */
1835 AR_DEBUG_PRINTF(ATH_DEBUG_INFO
,("ar6000_avail: name=%s hifdevice=0x%lx, dev=0x%lx (%d), ar=0x%lx\n",
1836 dev
->name
, (unsigned long)ar
->arHifDevice
, (unsigned long)dev
, device_index
,
1837 (unsigned long)ar
));
1842 ar6000_sysfs_bmi_deinit(ar
);
1849 static void ar6000_target_failure(void *Instance
, int Status
)
1851 AR_SOFTC_T
*ar
= (AR_SOFTC_T
*)Instance
;
1852 WMI_TARGET_ERROR_REPORT_EVENT errEvent
;
1853 static bool sip
= false;
1855 if (Status
!= A_OK
) {
1857 printk(KERN_ERR
"ar6000_target_failure: target asserted \n");
1859 if (timer_pending(&ar
->arHBChallengeResp
.timer
)) {
1860 A_UNTIMEOUT(&ar
->arHBChallengeResp
.timer
);
1863 /* try dumping target assertion information (if any) */
1864 ar6000_dump_target_assert_info(ar
->arHifDevice
,ar
->arTargetType
);
1867 * Fetch the logs from the target via the diagnostic
1870 ar6000_dbglog_get_debug_logs(ar
);
1872 /* Report the error only once */
1875 errEvent
.errorVal
= WMI_TARGET_COM_ERR
|
1876 WMI_TARGET_FATAL_ERR
;
1877 ar6000_send_event_to_app(ar
, WMI_ERROR_REPORT_EVENTID
,
1879 sizeof(WMI_TARGET_ERROR_REPORT_EVENT
));
1885 ar6000_unavail_ev(void *context
, void *hif_handle
)
1887 AR_SOFTC_T
*ar
= (AR_SOFTC_T
*)context
;
1888 /* NULL out it's entry in the global list */
1889 ar6000_devices
[ar
->arDeviceIndex
] = NULL
;
1890 ar6000_destroy(ar
->arNetDev
, 1);
1896 ar6000_restart_endpoint(struct net_device
*dev
)
1899 AR_SOFTC_T
*ar
= (AR_SOFTC_T
*)ar6k_priv(dev
);
1903 if ( (status
=ar6000_configure_target(ar
))!=A_OK
)
1905 if ( (status
=ar6000_sysfs_bmi_get_config(ar
, wlaninitmode
)) != A_OK
)
1907 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
,("ar6000_avail: ar6000_sysfs_bmi_get_config failed\n"));
1911 status
= (ar6000_init(dev
)==0) ? A_OK
: A_ERROR
;
1917 if (ar
->arSsidLen
&& ar
->arWlanState
== WLAN_ENABLED
) {
1918 ar6000_connect_to_ap(ar
);
1926 ar6000_devices
[ar
->arDeviceIndex
] = NULL
;
1927 ar6000_destroy(ar
->arNetDev
, 1);
1931 ar6000_stop_endpoint(struct net_device
*dev
, bool keepprofile
, bool getdbglogs
)
1933 AR_SOFTC_T
*ar
= (AR_SOFTC_T
*)ar6k_priv(dev
);
1935 /* Stop the transmit queues */
1936 netif_stop_queue(dev
);
1938 /* Disable the target and the interrupts associated with it */
1939 if (ar
->arWmiReady
== true)
1943 if (ar
->arConnected
== true || ar
->arConnectPending
== true)
1945 AR_DEBUG_PRINTF(ATH_DEBUG_INFO
,("%s(): Disconnect\n", __func__
));
1947 AR6000_SPIN_LOCK(&ar
->arLock
, 0);
1948 ar6000_init_profile_info(ar
);
1949 AR6000_SPIN_UNLOCK(&ar
->arLock
, 0);
1951 wmi_disconnect_cmd(ar
->arWmi
);
1954 A_UNTIMEOUT(&ar
->disconnect_timer
);
1957 ar6000_dbglog_get_debug_logs(ar
);
1960 ar
->arWmiReady
= false;
1961 wmi_shutdown(ar
->arWmi
);
1962 ar
->arWmiEnabled
= false;
1965 * After wmi_shudown all WMI events will be dropped.
1966 * We need to cleanup the buffers allocated in AP mode
1967 * and give disconnect notification to stack, which usually
1968 * happens in the disconnect_event.
1969 * Simulate the disconnect_event by calling the function directly.
1970 * Sometimes disconnect_event will be received when the debug logs
1973 if (ar
->arConnected
== true || ar
->arConnectPending
== true) {
1974 if(ar
->arNetworkType
& AP_NETWORK
) {
1975 ar6000_disconnect_event(ar
, DISCONNECT_CMD
, bcast_mac
, 0, NULL
, 0);
1977 ar6000_disconnect_event(ar
, DISCONNECT_CMD
, ar
->arBssid
, 0, NULL
, 0);
1979 ar
->arConnected
= false;
1980 ar
->arConnectPending
= false;
1983 ar
->user_savedkeys_stat
= USER_SAVEDKEYS_STAT_INIT
;
1984 ar
->user_key_ctrl
= 0;
1988 AR_DEBUG_PRINTF(ATH_DEBUG_INFO
,("%s(): WMI stopped\n", __func__
));
1992 AR_DEBUG_PRINTF(ATH_DEBUG_INFO
,("%s(): WMI not ready 0x%lx 0x%lx\n",
1993 __func__
, (unsigned long) ar
, (unsigned long) ar
->arWmi
));
1995 /* Shut down WMI if we have started it */
1996 if(ar
->arWmiEnabled
== true)
1998 AR_DEBUG_PRINTF(ATH_DEBUG_INFO
,("%s(): Shut down WMI\n", __func__
));
1999 wmi_shutdown(ar
->arWmi
);
2000 ar
->arWmiEnabled
= false;
2005 if (ar
->arHtcTarget
!= NULL
) {
2006 #ifdef EXPORT_HCI_BRIDGE_INTERFACE
2007 if (NULL
!= ar6kHciTransCallbacks
.cleanupTransport
) {
2008 ar6kHciTransCallbacks
.cleanupTransport(NULL
);
2011 // FIXME: workaround to reset BT's UART baud rate to default
2012 if (NULL
!= ar
->exitCallback
) {
2013 AR3K_CONFIG_INFO ar3kconfig
;
2016 A_MEMZERO(&ar3kconfig
,sizeof(ar3kconfig
));
2017 ar6000_set_default_ar3kconfig(ar
, (void *)&ar3kconfig
);
2018 status
= ar
->exitCallback(&ar3kconfig
);
2019 if (A_OK
!= status
) {
2020 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
,("Failed to reset AR3K baud rate! \n"));
2025 ar6000_cleanup_hci(ar
);
2027 #ifdef EXPORT_HCI_PAL_INTERFACE
2028 if (setuphcipal
&& (NULL
!= ar6kHciPalCallbacks_g
.cleanupTransport
)) {
2029 ar6kHciPalCallbacks_g
.cleanupTransport(ar
);
2032 /* cleanup hci pal driver data structures */
2034 ar6k_cleanup_hci_pal(ar
);
2036 AR_DEBUG_PRINTF(ATH_DEBUG_INFO
,(" Shutting down HTC .... \n"));
2038 HTCStop(ar
->arHtcTarget
);
2042 /* try to reset the device if we can
2043 * The driver may have been configure NOT to reset the target during
2044 * a debug session */
2045 AR_DEBUG_PRINTF(ATH_DEBUG_INFO
,(" Attempting to reset target on instance destroy.... \n"));
2046 if (ar
->arHifDevice
!= NULL
) {
2047 bool coldReset
= (ar
->arTargetType
== TARGET_TYPE_AR6003
) ? true: false;
2048 ar6000_reset_device(ar
->arHifDevice
, ar
->arTargetType
, true, coldReset
);
2051 AR_DEBUG_PRINTF(ATH_DEBUG_INFO
,(" Host does not want target reset. \n"));
2053 /* Done with cookies */
2054 ar6000_cookie_cleanup(ar
);
2057 * We need to differentiate between the surprise and planned removal of the
2058 * device because of the following consideration:
2059 * - In case of surprise removal, the hcd already frees up the pending
2060 * for the device and hence there is no need to unregister the function
2061 * driver inorder to get these requests. For planned removal, the function
2062 * driver has to explictly unregister itself to have the hcd return all the
2063 * pending requests before the data structures for the devices are freed up.
2064 * Note that as per the current implementation, the function driver will
2065 * end up releasing all the devices since there is no API to selectively
2066 * release a particular device.
2067 * - Certain commands issued to the target can be skipped for surprise
2068 * removal since they will anyway not go through.
2071 ar6000_destroy(struct net_device
*dev
, unsigned int unregister
)
2075 AR_DEBUG_PRINTF(ATH_DEBUG_INFO
,("+ar6000_destroy \n"));
2077 if((dev
== NULL
) || ((ar
= ar6k_priv(dev
)) == NULL
))
2079 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
,("%s(): Failed to get device structure.\n", __func__
));
2083 ar
->bIsDestroyProgress
= true;
2085 if (down_interruptible(&ar
->arSem
)) {
2086 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
,("%s(): down_interruptible failed \n", __func__
));
2090 if (ar
->arWlanPowerState
!= WLAN_POWER_STATE_CUT_PWR
) {
2091 /* only stop endpoint if we are not stop it in suspend_ev */
2092 ar6000_stop_endpoint(dev
, false, true);
2094 /* clear up the platform power state before rmmod */
2095 plat_setup_power(1,0);
2098 ar
->arWlanState
= WLAN_DISABLED
;
2099 if (ar
->arHtcTarget
!= NULL
) {
2101 HTCDestroy(ar
->arHtcTarget
);
2103 if (ar
->arHifDevice
!= NULL
) {
2104 /*release the device so we do not get called back on remove incase we
2105 * we're explicity destroyed by module unload */
2106 HIFReleaseDevice(ar
->arHifDevice
);
2107 HIFShutDownDevice(ar
->arHifDevice
);
2109 #ifdef ATH_AR6K_11N_SUPPORT
2110 aggr_module_destroy(ar
->aggr_cntxt
);
2113 /* Done with cookies */
2114 ar6000_cookie_cleanup(ar
);
2116 /* cleanup any allocated AMSDU buffers */
2117 ar6000_cleanup_amsdu_rxbufs(ar
);
2120 ar6000_sysfs_bmi_deinit(ar
);
2126 /* Clear the tx counters */
2127 memset(tx_attempt
, 0, sizeof(tx_attempt
));
2128 memset(tx_post
, 0, sizeof(tx_post
));
2129 memset(tx_complete
, 0, sizeof(tx_complete
));
2131 #ifdef HTC_RAW_INTERFACE
2133 A_FREE(ar
->arRawHtc
);
2134 ar
->arRawHtc
= NULL
;
2137 /* Free up the device data structure */
2138 if (unregister
&& is_netdev_registered
) {
2139 unregister_netdev(dev
);
2140 is_netdev_registered
= 0;
2144 #ifdef ATH6K_CONFIG_CFG80211
2145 ar6k_cfg80211_deinit(ar
);
2146 #endif /* ATH6K_CONFIG_CFG80211 */
2148 #ifdef CONFIG_AP_VIRTUL_ADAPTER_SUPPORT
2149 ar6000_remove_ap_interface();
2150 #endif /*CONFIG_AP_VIRTUAL_ADAPTER_SUPPORT */
2152 AR_DEBUG_PRINTF(ATH_DEBUG_INFO
,("-ar6000_destroy \n"));
2155 static void disconnect_timer_handler(unsigned long ptr
)
2157 struct net_device
*dev
= (struct net_device
*)ptr
;
2158 AR_SOFTC_T
*ar
= (AR_SOFTC_T
*)ar6k_priv(dev
);
2160 A_UNTIMEOUT(&ar
->disconnect_timer
);
2162 ar6000_init_profile_info(ar
);
2163 wmi_disconnect_cmd(ar
->arWmi
);
2166 static void ar6000_detect_error(unsigned long ptr
)
2168 struct net_device
*dev
= (struct net_device
*)ptr
;
2169 AR_SOFTC_T
*ar
= (AR_SOFTC_T
*)ar6k_priv(dev
);
2170 WMI_TARGET_ERROR_REPORT_EVENT errEvent
;
2172 AR6000_SPIN_LOCK(&ar
->arLock
, 0);
2174 if (ar
->arHBChallengeResp
.outstanding
) {
2175 ar
->arHBChallengeResp
.missCnt
++;
2177 ar
->arHBChallengeResp
.missCnt
= 0;
2180 if (ar
->arHBChallengeResp
.missCnt
> ar
->arHBChallengeResp
.missThres
) {
2181 /* Send Error Detect event to the application layer and do not reschedule the error detection module timer */
2182 ar
->arHBChallengeResp
.missCnt
= 0;
2183 ar
->arHBChallengeResp
.seqNum
= 0;
2184 errEvent
.errorVal
= WMI_TARGET_COM_ERR
| WMI_TARGET_FATAL_ERR
;
2185 AR6000_SPIN_UNLOCK(&ar
->arLock
, 0);
2186 ar6000_send_event_to_app(ar
, WMI_ERROR_REPORT_EVENTID
,
2188 sizeof(WMI_TARGET_ERROR_REPORT_EVENT
));
2192 /* Generate the sequence number for the next challenge */
2193 ar
->arHBChallengeResp
.seqNum
++;
2194 ar
->arHBChallengeResp
.outstanding
= true;
2196 AR6000_SPIN_UNLOCK(&ar
->arLock
, 0);
2198 /* Send the challenge on the control channel */
2199 if (wmi_get_challenge_resp_cmd(ar
->arWmi
, ar
->arHBChallengeResp
.seqNum
, DRV_HB_CHALLENGE
) != A_OK
) {
2200 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
,("Unable to send heart beat challenge\n"));
2204 /* Reschedule the timer for the next challenge */
2205 A_TIMEOUT_MS(&ar
->arHBChallengeResp
.timer
, ar
->arHBChallengeResp
.frequency
* 1000, 0);
2208 void ar6000_init_profile_info(AR_SOFTC_T
*ar
)
2211 A_MEMZERO(ar
->arSsid
, sizeof(ar
->arSsid
));
2214 case HI_OPTION_FW_MODE_IBSS
:
2215 ar
->arNetworkType
= ar
->arNextMode
= ADHOC_NETWORK
;
2217 case HI_OPTION_FW_MODE_BSS_STA
:
2218 ar
->arNetworkType
= ar
->arNextMode
= INFRA_NETWORK
;
2220 case HI_OPTION_FW_MODE_AP
:
2221 ar
->arNetworkType
= ar
->arNextMode
= AP_NETWORK
;
2225 ar
->arDot11AuthMode
= OPEN_AUTH
;
2226 ar
->arAuthMode
= NONE_AUTH
;
2227 ar
->arPairwiseCrypto
= NONE_CRYPT
;
2228 ar
->arPairwiseCryptoLen
= 0;
2229 ar
->arGroupCrypto
= NONE_CRYPT
;
2230 ar
->arGroupCryptoLen
= 0;
2231 A_MEMZERO(ar
->arWepKeyList
, sizeof(ar
->arWepKeyList
));
2232 A_MEMZERO(ar
->arReqBssid
, sizeof(ar
->arReqBssid
));
2233 A_MEMZERO(ar
->arBssid
, sizeof(ar
->arBssid
));
2234 ar
->arBssChannel
= 0;
2235 ar
->arConnected
= false;
2239 ar6000_init_control_info(AR_SOFTC_T
*ar
)
2241 ar
->arWmiEnabled
= false;
2242 ar6000_init_profile_info(ar
);
2243 ar
->arDefTxKeyIndex
= 0;
2244 A_MEMZERO(ar
->arWepKeyList
, sizeof(ar
->arWepKeyList
));
2245 ar
->arChannelHint
= 0;
2246 ar
->arListenIntervalT
= A_DEFAULT_LISTEN_INTERVAL
;
2247 ar
->arListenIntervalB
= 0;
2248 ar
->arVersion
.host_ver
= AR6K_SW_VERSION
;
2251 ar
->arTxPwrSet
= false;
2253 ar
->arBeaconInterval
= 0;
2255 ar
->arMaxRetries
= 0;
2256 ar
->arWmmEnabled
= true;
2258 ar
->scan_triggered
= 0;
2259 A_MEMZERO(&ar
->scParams
, sizeof(ar
->scParams
));
2260 ar
->scParams
.shortScanRatio
= WMI_SHORTSCANRATIO_DEFAULT
;
2261 ar
->scParams
.scanCtrlFlags
= DEFAULT_SCAN_CTRL_FLAGS
;
2263 /* Initialize the AP mode state info */
2266 A_MEMZERO((u8
*)ar
->sta_list
, AP_MAX_NUM_STA
* sizeof(sta_t
));
2268 /* init the Mutexes */
2269 A_MUTEX_INIT(&ar
->mcastpsqLock
);
2271 /* Init the PS queues */
2272 for (ctr
=0; ctr
< AP_MAX_NUM_STA
; ctr
++) {
2273 A_MUTEX_INIT(&ar
->sta_list
[ctr
].psqLock
);
2274 A_NETBUF_QUEUE_INIT(&ar
->sta_list
[ctr
].psq
);
2277 ar
->ap_profile_flag
= 0;
2278 A_NETBUF_QUEUE_INIT(&ar
->mcastpsq
);
2280 A_MEMCPY(ar
->ap_country_code
, DEF_AP_COUNTRY_CODE
, 3);
2281 ar
->ap_wmode
= DEF_AP_WMODE_G
;
2282 ar
->ap_dtim_period
= DEF_AP_DTIM
;
2283 ar
->ap_beacon_interval
= DEF_BEACON_INTERVAL
;
2288 ar6000_open(struct net_device
*dev
)
2290 unsigned long flags
;
2291 AR_SOFTC_T
*ar
= (AR_SOFTC_T
*)ar6k_priv(dev
);
2293 spin_lock_irqsave(&ar
->arLock
, flags
);
2295 #ifdef ATH6K_CONFIG_CFG80211
2296 if(ar
->arWlanState
== WLAN_DISABLED
) {
2297 ar
->arWlanState
= WLAN_ENABLED
;
2299 #endif /* ATH6K_CONFIG_CFG80211 */
2301 if( ar
->arConnected
|| bypasswmi
) {
2302 netif_carrier_on(dev
);
2303 /* Wake up the queues */
2304 netif_wake_queue(dev
);
2307 netif_carrier_off(dev
);
2309 spin_unlock_irqrestore(&ar
->arLock
, flags
);
2314 ar6000_close(struct net_device
*dev
)
2316 #ifdef ATH6K_CONFIG_CFG80211
2317 AR_SOFTC_T
*ar
= (AR_SOFTC_T
*)ar6k_priv(dev
);
2318 #endif /* ATH6K_CONFIG_CFG80211 */
2319 netif_stop_queue(dev
);
2321 #ifdef ATH6K_CONFIG_CFG80211
2322 AR6000_SPIN_LOCK(&ar
->arLock
, 0);
2323 if (ar
->arConnected
== true || ar
->arConnectPending
== true) {
2324 AR6000_SPIN_UNLOCK(&ar
->arLock
, 0);
2325 wmi_disconnect_cmd(ar
->arWmi
);
2327 AR6000_SPIN_UNLOCK(&ar
->arLock
, 0);
2330 if(ar
->arWmiReady
== true) {
2331 if (wmi_scanparams_cmd(ar
->arWmi
, 0xFFFF, 0,
2332 0, 0, 0, 0, 0, 0, 0, 0) != A_OK
) {
2335 ar
->arWlanState
= WLAN_DISABLED
;
2337 #endif /* ATH6K_CONFIG_CFG80211 */
2342 /* connect to a service */
2343 static int ar6000_connectservice(AR_SOFTC_T
*ar
,
2344 HTC_SERVICE_CONNECT_REQ
*pConnect
,
2348 HTC_SERVICE_CONNECT_RESP response
;
2352 A_MEMZERO(&response
,sizeof(response
));
2354 status
= HTCConnectService(ar
->arHtcTarget
,
2359 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
,(" Failed to connect to %s service status:%d \n",
2363 switch (pConnect
->ServiceID
) {
2364 case WMI_CONTROL_SVC
:
2365 if (ar
->arWmiEnabled
) {
2366 /* set control endpoint for WMI use */
2367 wmi_set_control_ep(ar
->arWmi
, response
.Endpoint
);
2369 /* save EP for fast lookup */
2370 ar
->arControlEp
= response
.Endpoint
;
2372 case WMI_DATA_BE_SVC
:
2373 arSetAc2EndpointIDMap(ar
, WMM_AC_BE
, response
.Endpoint
);
2375 case WMI_DATA_BK_SVC
:
2376 arSetAc2EndpointIDMap(ar
, WMM_AC_BK
, response
.Endpoint
);
2378 case WMI_DATA_VI_SVC
:
2379 arSetAc2EndpointIDMap(ar
, WMM_AC_VI
, response
.Endpoint
);
2381 case WMI_DATA_VO_SVC
:
2382 arSetAc2EndpointIDMap(ar
, WMM_AC_VO
, response
.Endpoint
);
2385 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
,("ServiceID not mapped %d\n", pConnect
->ServiceID
));
2395 void ar6000_TxDataCleanup(AR_SOFTC_T
*ar
)
2397 /* flush all the data (non-control) streams
2398 * we only flush packets that are tagged as data, we leave any control packets that
2399 * were in the TX queues alone */
2400 HTCFlushEndpoint(ar
->arHtcTarget
,
2401 arAc2EndpointID(ar
, WMM_AC_BE
),
2403 HTCFlushEndpoint(ar
->arHtcTarget
,
2404 arAc2EndpointID(ar
, WMM_AC_BK
),
2406 HTCFlushEndpoint(ar
->arHtcTarget
,
2407 arAc2EndpointID(ar
, WMM_AC_VI
),
2409 HTCFlushEndpoint(ar
->arHtcTarget
,
2410 arAc2EndpointID(ar
, WMM_AC_VO
),
2415 ar6000_ac2_endpoint_id ( void * devt
, u8 ac
)
2417 AR_SOFTC_T
*ar
= (AR_SOFTC_T
*) devt
;
2418 return(arAc2EndpointID(ar
, ac
));
2421 u8
ar6000_endpoint_id2_ac(void * devt
, HTC_ENDPOINT_ID ep
)
2423 AR_SOFTC_T
*ar
= (AR_SOFTC_T
*) devt
;
2424 return(arEndpoint2Ac(ar
, ep
));
2427 /* This function does one time initialization for the lifetime of the device */
2428 int ar6000_init(struct net_device
*dev
)
2435 #if defined(INIT_MODE_DRV_ENABLED) && defined(ENABLE_COEXISTENCE)
2436 WMI_SET_BTCOEX_COLOCATED_BT_DEV_CMD sbcb_cmd
;
2437 WMI_SET_BTCOEX_FE_ANT_CMD sbfa_cmd
;
2438 #endif /* INIT_MODE_DRV_ENABLED && ENABLE_COEXISTENCE */
2440 if((ar
= ar6k_priv(dev
)) == NULL
)
2445 if (wlaninitmode
== WLAN_INIT_MODE_USR
|| wlaninitmode
== WLAN_INIT_MODE_DRV
) {
2447 ar6000_update_bdaddr(ar
);
2449 if (enablerssicompensation
) {
2450 ar6000_copy_cust_data_from_target(ar
->arHifDevice
, ar
->arTargetType
);
2451 read_rssi_compensation_param(ar
);
2452 for (i
=-95; i
<=0; i
++) {
2453 rssi_compensation_table
[0-i
] = rssi_compensation_calc(ar
,i
);
2461 /* Do we need to finish the BMI phase */
2462 if ((wlaninitmode
== WLAN_INIT_MODE_USR
|| wlaninitmode
== WLAN_INIT_MODE_DRV
) &&
2463 (BMIDone(ar
->arHifDevice
) != A_OK
))
2466 goto ar6000_init_done
;
2472 if (ar
->arVersion
.host_ver
!= ar
->arVersion
.target_ver
) {
2473 A_PRINTF("WARNING: Host version 0x%x does not match Target "
2475 ar
->arVersion
.host_ver
, ar
->arVersion
.target_ver
);
2479 /* Indicate that WMI is enabled (although not ready yet) */
2480 ar
->arWmiEnabled
= true;
2481 if ((ar
->arWmi
= wmi_init((void *) ar
)) == NULL
)
2483 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
,("%s() Failed to initialize WMI.\n", __func__
));
2485 goto ar6000_init_done
;
2488 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
,("%s() Got WMI @ 0x%lx.\n", __func__
,
2489 (unsigned long) ar
->arWmi
));
2493 HTC_SERVICE_CONNECT_REQ connect
;
2495 /* the reason we have to wait for the target here is that the driver layer
2496 * has to init BMI in order to set the host block size,
2498 status
= HTCWaitTarget(ar
->arHtcTarget
);
2504 A_MEMZERO(&connect
,sizeof(connect
));
2505 /* meta data is unused for now */
2506 connect
.pMetaData
= NULL
;
2507 connect
.MetaDataLength
= 0;
2508 /* these fields are the same for all service endpoints */
2509 connect
.EpCallbacks
.pContext
= ar
;
2510 connect
.EpCallbacks
.EpTxCompleteMultiple
= ar6000_tx_complete
;
2511 connect
.EpCallbacks
.EpRecv
= ar6000_rx
;
2512 connect
.EpCallbacks
.EpRecvRefill
= ar6000_rx_refill
;
2513 connect
.EpCallbacks
.EpSendFull
= ar6000_tx_queue_full
;
2514 /* set the max queue depth so that our ar6000_tx_queue_full handler gets called.
2515 * Linux has the peculiarity of not providing flow control between the
2516 * NIC and the network stack. There is no API to indicate that a TX packet
2517 * was sent which could provide some back pressure to the network stack.
2518 * Under linux you would have to wait till the network stack consumed all sk_buffs
2519 * before any back-flow kicked in. Which isn't very friendly.
2520 * So we have to manage this ourselves */
2521 connect
.MaxSendQueueDepth
= MAX_DEFAULT_SEND_QUEUE_DEPTH
;
2522 connect
.EpCallbacks
.RecvRefillWaterMark
= AR6000_MAX_RX_BUFFERS
/ 4; /* set to 25 % */
2523 if (0 == connect
.EpCallbacks
.RecvRefillWaterMark
) {
2524 connect
.EpCallbacks
.RecvRefillWaterMark
++;
2526 /* connect to control service */
2527 connect
.ServiceID
= WMI_CONTROL_SVC
;
2528 status
= ar6000_connectservice(ar
,
2535 connect
.LocalConnectionFlags
|= HTC_LOCAL_CONN_FLAGS_ENABLE_SEND_BUNDLE_PADDING
;
2536 /* limit the HTC message size on the send path, although we can receive A-MSDU frames of
2537 * 4K, we will only send ethernet-sized (802.3) frames on the send path. */
2538 connect
.MaxSendMsgSize
= WMI_MAX_TX_DATA_FRAME_LENGTH
;
2540 /* to reduce the amount of committed memory for larger A_MSDU frames, use the recv-alloc threshold
2541 * mechanism for larger packets */
2542 connect
.EpCallbacks
.RecvAllocThreshold
= AR6000_BUFFER_SIZE
;
2543 connect
.EpCallbacks
.EpRecvAllocThresh
= ar6000_alloc_amsdu_rxbuf
;
2545 /* for the remaining data services set the connection flag to reduce dribbling,
2546 * if configured to do so */
2547 if (reduce_credit_dribble
) {
2548 connect
.ConnectionFlags
|= HTC_CONNECT_FLAGS_REDUCE_CREDIT_DRIBBLE
;
2549 /* the credit dribble trigger threshold is (reduce_credit_dribble - 1) for a value
2551 connect
.ConnectionFlags
&= ~HTC_CONNECT_FLAGS_THRESHOLD_LEVEL_MASK
;
2552 connect
.ConnectionFlags
|=
2553 ((u16
)reduce_credit_dribble
- 1) & HTC_CONNECT_FLAGS_THRESHOLD_LEVEL_MASK
;
2555 /* connect to best-effort service */
2556 connect
.ServiceID
= WMI_DATA_BE_SVC
;
2558 status
= ar6000_connectservice(ar
,
2565 /* connect to back-ground
2566 * map this to WMI LOW_PRI */
2567 connect
.ServiceID
= WMI_DATA_BK_SVC
;
2568 status
= ar6000_connectservice(ar
,
2575 /* connect to Video service, map this to
2577 connect
.ServiceID
= WMI_DATA_VI_SVC
;
2578 status
= ar6000_connectservice(ar
,
2585 /* connect to VO service, this is currently not
2586 * mapped to a WMI priority stream due to historical reasons.
2587 * WMI originally defined 3 priorities over 3 mailboxes
2588 * We can change this when WMI is reworked so that priorities are not
2589 * dependent on mailboxes */
2590 connect
.ServiceID
= WMI_DATA_VO_SVC
;
2591 status
= ar6000_connectservice(ar
,
2598 A_ASSERT(arAc2EndpointID(ar
,WMM_AC_BE
) != 0);
2599 A_ASSERT(arAc2EndpointID(ar
,WMM_AC_BK
) != 0);
2600 A_ASSERT(arAc2EndpointID(ar
,WMM_AC_VI
) != 0);
2601 A_ASSERT(arAc2EndpointID(ar
,WMM_AC_VO
) != 0);
2603 /* setup access class priority mappings */
2604 ar
->arAcStreamPriMap
[WMM_AC_BK
] = 0; /* lowest */
2605 ar
->arAcStreamPriMap
[WMM_AC_BE
] = 1; /* */
2606 ar
->arAcStreamPriMap
[WMM_AC_VI
] = 2; /* */
2607 ar
->arAcStreamPriMap
[WMM_AC_VO
] = 3; /* highest */
2609 #ifdef EXPORT_HCI_BRIDGE_INTERFACE
2610 if (setuphci
&& (NULL
!= ar6kHciTransCallbacks
.setupTransport
)) {
2611 HCI_TRANSPORT_MISC_HANDLES hciHandles
;
2613 hciHandles
.netDevice
= ar
->arNetDev
;
2614 hciHandles
.hifDevice
= ar
->arHifDevice
;
2615 hciHandles
.htcHandle
= ar
->arHtcTarget
;
2616 status
= (int)(ar6kHciTransCallbacks
.setupTransport(&hciHandles
));
2621 status
= ar6000_setup_hci(ar
);
2624 #ifdef EXPORT_HCI_PAL_INTERFACE
2625 if (setuphcipal
&& (NULL
!= ar6kHciPalCallbacks_g
.setupTransport
))
2626 status
= ar6kHciPalCallbacks_g
.setupTransport(ar
);
2629 status
= ar6k_setup_hci_pal(ar
);
2636 goto ar6000_init_done
;
2640 * give our connected endpoints some buffers
2643 ar6000_rx_refill(ar
, ar
->arControlEp
);
2644 ar6000_rx_refill(ar
, arAc2EndpointID(ar
,WMM_AC_BE
));
2647 * We will post the receive buffers only for SPE or endpoint ping testing so we are
2648 * making it conditional on the 'bypasswmi' flag.
2651 ar6000_rx_refill(ar
,arAc2EndpointID(ar
,WMM_AC_BK
));
2652 ar6000_rx_refill(ar
,arAc2EndpointID(ar
,WMM_AC_VI
));
2653 ar6000_rx_refill(ar
,arAc2EndpointID(ar
,WMM_AC_VO
));
2656 /* allocate some buffers that handle larger AMSDU frames */
2657 ar6000_refill_amsdu_rxbufs(ar
,AR6000_MAX_AMSDU_RX_BUFFERS
);
2659 /* setup credit distribution */
2660 ar6000_setup_credit_dist(ar
->arHtcTarget
, &ar
->arCreditStateInfo
);
2662 /* Since cookies are used for HTC transports, they should be */
2663 /* initialized prior to enabling HTC. */
2664 ar6000_cookie_init(ar
);
2667 status
= HTCStart(ar
->arHtcTarget
);
2669 if (status
!= A_OK
) {
2670 if (ar
->arWmiEnabled
== true) {
2671 wmi_shutdown(ar
->arWmi
);
2672 ar
->arWmiEnabled
= false;
2675 ar6000_cookie_cleanup(ar
);
2677 goto ar6000_init_done
;
2681 /* Wait for Wmi event to be ready */
2682 timeleft
= wait_event_interruptible_timeout(arEvent
,
2683 (ar
->arWmiReady
== true), wmitimeout
* HZ
);
2685 if (ar
->arVersion
.abi_ver
!= AR6K_ABI_VERSION
) {
2686 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
,("ABI Version mismatch: Host(0x%x), Target(0x%x)\n", AR6K_ABI_VERSION
, ar
->arVersion
.abi_ver
));
2687 #ifndef ATH6K_SKIP_ABI_VERSION_CHECK
2689 goto ar6000_init_done
;
2690 #endif /* ATH6K_SKIP_ABI_VERSION_CHECK */
2693 if(!timeleft
|| signal_pending(current
))
2695 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
,("WMI is not ready or wait was interrupted\n"));
2697 goto ar6000_init_done
;
2700 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
,("%s() WMI is ready\n", __func__
));
2702 /* Communicate the wmi protocol verision to the target */
2703 if ((ar6000_set_host_app_area(ar
)) != A_OK
) {
2704 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
,("Unable to set the host app area\n"));
2707 /* configure the device for rx dot11 header rules 0,0 are the default values
2708 * therefore this command can be skipped if the inputs are 0,false,false.Required
2709 if checksum offload is needed. Set RxMetaVersion to 2*/
2710 if ((wmi_set_rx_frame_format_cmd(ar
->arWmi
,ar
->rxMetaVersion
, processDot11Hdr
, processDot11Hdr
)) != A_OK
) {
2711 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
,("Unable to set the rx frame format.\n"));
2714 #if defined(INIT_MODE_DRV_ENABLED) && defined(ENABLE_COEXISTENCE)
2715 /* Configure the type of BT collocated with WLAN */
2716 A_MEMZERO(&sbcb_cmd
, sizeof(WMI_SET_BTCOEX_COLOCATED_BT_DEV_CMD
));
2717 #ifdef CONFIG_AR600x_BT_QCOM
2718 sbcb_cmd
.btcoexCoLocatedBTdev
= 1;
2719 #elif defined(CONFIG_AR600x_BT_CSR)
2720 sbcb_cmd
.btcoexCoLocatedBTdev
= 2;
2721 #elif defined(CONFIG_AR600x_BT_AR3001)
2722 sbcb_cmd
.btcoexCoLocatedBTdev
= 3;
2724 #error Unsupported Bluetooth Type
2725 #endif /* Collocated Bluetooth Type */
2727 if ((wmi_set_btcoex_colocated_bt_dev_cmd(ar
->arWmi
, &sbcb_cmd
)) != A_OK
)
2729 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
,("Unable to set collocated BT type\n"));
2732 /* Configure the type of BT collocated with WLAN */
2733 A_MEMZERO(&sbfa_cmd
, sizeof(WMI_SET_BTCOEX_FE_ANT_CMD
));
2734 #ifdef CONFIG_AR600x_DUAL_ANTENNA
2735 sbfa_cmd
.btcoexFeAntType
= 2;
2736 #elif defined(CONFIG_AR600x_SINGLE_ANTENNA)
2737 sbfa_cmd
.btcoexFeAntType
= 1;
2739 #error Unsupported Front-End Antenna Configuration
2740 #endif /* AR600x Front-End Antenna Configuration */
2742 if ((wmi_set_btcoex_fe_ant_cmd(ar
->arWmi
, &sbfa_cmd
)) != A_OK
) {
2743 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
,("Unable to set fornt end antenna configuration\n"));
2745 #endif /* INIT_MODE_DRV_ENABLED && ENABLE_COEXISTENCE */
2748 ar
->arNumDataEndPts
= 1;
2751 /* for tests like endpoint ping, the MAC address needs to be non-zero otherwise
2752 * the data path through a raw socket is disabled */
2753 dev
->dev_addr
[0] = 0x00;
2754 dev
->dev_addr
[1] = 0x01;
2755 dev
->dev_addr
[2] = 0x02;
2756 dev
->dev_addr
[3] = 0xAA;
2757 dev
->dev_addr
[4] = 0xBB;
2758 dev
->dev_addr
[5] = 0xCC;
2770 ar6000_bitrate_rx(void *devt
, A_INT32 rateKbps
)
2772 AR_SOFTC_T
*ar
= (AR_SOFTC_T
*)devt
;
2774 ar
->arBitRate
= rateKbps
;
2779 ar6000_ratemask_rx(void *devt
, u32 ratemask
)
2781 AR_SOFTC_T
*ar
= (AR_SOFTC_T
*)devt
;
2783 ar
->arRateMask
= ratemask
;
2788 ar6000_txPwr_rx(void *devt
, u8 txPwr
)
2790 AR_SOFTC_T
*ar
= (AR_SOFTC_T
*)devt
;
2792 ar
->arTxPwr
= txPwr
;
2798 ar6000_channelList_rx(void *devt
, A_INT8 numChan
, u16
*chanList
)
2800 AR_SOFTC_T
*ar
= (AR_SOFTC_T
*)devt
;
2802 A_MEMCPY(ar
->arChannelList
, chanList
, numChan
* sizeof (u16
));
2803 ar
->arNumChannels
= numChan
;
2808 u8
ar6000_ibss_map_epid(struct sk_buff
*skb
, struct net_device
*dev
, u32
*mapNo
)
2810 AR_SOFTC_T
*ar
= (AR_SOFTC_T
*)ar6k_priv(dev
);
2812 ATH_MAC_HDR
*macHdr
;
2816 datap
= A_NETBUF_DATA(skb
);
2817 macHdr
= (ATH_MAC_HDR
*)(datap
+ sizeof(WMI_DATA_HDR
));
2818 if (IEEE80211_IS_MULTICAST(macHdr
->dstMac
)) {
2823 for (i
= 0; i
< ar
->arNodeNum
; i
++) {
2824 if (IEEE80211_ADDR_EQ(macHdr
->dstMac
, ar
->arNodeMap
[i
].macAddress
)) {
2826 ar
->arNodeMap
[i
].txPending
++;
2827 return ar
->arNodeMap
[i
].epId
;
2830 if ((eptMap
== -1) && !ar
->arNodeMap
[i
].txPending
) {
2836 eptMap
= ar
->arNodeNum
;
2838 A_ASSERT(ar
->arNodeNum
<= MAX_NODE_NUM
);
2841 A_MEMCPY(ar
->arNodeMap
[eptMap
].macAddress
, macHdr
->dstMac
, IEEE80211_ADDR_LEN
);
2843 for (i
= ENDPOINT_2
; i
<= ENDPOINT_5
; i
++) {
2844 if (!ar
->arTxPending
[i
]) {
2845 ar
->arNodeMap
[eptMap
].epId
= i
;
2848 // No free endpoint is available, start redistribution on the inuse endpoints.
2849 if (i
== ENDPOINT_5
) {
2850 ar
->arNodeMap
[eptMap
].epId
= ar
->arNexEpId
;
2852 if (ar
->arNexEpId
> ENDPOINT_5
) {
2853 ar
->arNexEpId
= ENDPOINT_2
;
2858 (*mapNo
) = eptMap
+ 1;
2859 ar
->arNodeMap
[eptMap
].txPending
++;
2861 return ar
->arNodeMap
[eptMap
].epId
;
2865 static void ar6000_dump_skb(struct sk_buff
*skb
)
2868 for (ch
= A_NETBUF_DATA(skb
);
2869 (unsigned long)ch
< ((unsigned long)A_NETBUF_DATA(skb
) +
2870 A_NETBUF_LEN(skb
)); ch
++)
2872 AR_DEBUG_PRINTF(ATH_DEBUG_WARN
,("%2.2x ", *ch
));
2874 AR_DEBUG_PRINTF(ATH_DEBUG_WARN
,("\n"));
2878 #ifdef HTC_TEST_SEND_PKTS
2879 static void DoHTCSendPktsTest(AR_SOFTC_T
*ar
, int MapNo
, HTC_ENDPOINT_ID eid
, struct sk_buff
*skb
);
2883 ar6000_data_tx(struct sk_buff
*skb
, struct net_device
*dev
)
2885 #define AC_NOT_MAPPED 99
2886 AR_SOFTC_T
*ar
= (AR_SOFTC_T
*)ar6k_priv(dev
);
2887 u8 ac
= AC_NOT_MAPPED
;
2888 HTC_ENDPOINT_ID eid
= ENDPOINT_UNUSED
;
2891 struct ar_cookie
*cookie
;
2892 bool checkAdHocPsMapping
= false,bMoreData
= false;
2893 HTC_TX_TAG htc_tag
= AR6K_DATA_PKT_TAG
;
2894 u8 dot11Hdr
= processDot11Hdr
;
2896 if (ar
->arWowState
!= WLAN_WOW_STATE_NONE
) {
2900 #endif /* CONFIG_PM */
2902 AR_DEBUG_PRINTF(ATH_DEBUG_WLAN_TX
,("ar6000_data_tx start - skb=0x%lx, data=0x%lx, len=0x%x\n",
2903 (unsigned long)skb
, (unsigned long)A_NETBUF_DATA(skb
),
2904 A_NETBUF_LEN(skb
)));
2906 /* If target is not associated */
2907 if( (!ar
->arConnected
&& !bypasswmi
)
2908 #ifdef CONFIG_HOST_TCMD_SUPPORT
2909 /* TCMD doesnt support any data, free the buf and return */
2910 || (ar
->arTargetMode
== AR6000_TCMD_MODE
)
2919 if (ar
->arWmiReady
== false && bypasswmi
== 0) {
2923 #ifdef BLOCK_TX_PATH_FLAG
2927 #endif /* BLOCK_TX_PATH_FLAG */
2929 /* AP mode Power save processing */
2930 /* If the dst STA is in sleep state, queue the pkt in its PS queue */
2932 if (ar
->arNetworkType
== AP_NETWORK
) {
2933 ATH_MAC_HDR
*datap
= (ATH_MAC_HDR
*)A_NETBUF_DATA(skb
);
2936 /* If the dstMac is a Multicast address & atleast one of the
2937 * associated STA is in PS mode, then queue the pkt to the
2940 if (IEEE80211_IS_MULTICAST(datap
->dstMac
)) {
2945 for (ctr
=0; ctr
<AP_MAX_NUM_STA
; ctr
++) {
2946 if (STA_IS_PWR_SLEEP((&ar
->sta_list
[ctr
]))) {
2952 /* If this transmit is not because of a Dtim Expiry q it */
2953 if (ar
->DTIMExpired
== false) {
2954 bool isMcastqEmpty
= false;
2956 A_MUTEX_LOCK(&ar
->mcastpsqLock
);
2957 isMcastqEmpty
= A_NETBUF_QUEUE_EMPTY(&ar
->mcastpsq
);
2958 A_NETBUF_ENQUEUE(&ar
->mcastpsq
, skb
);
2959 A_MUTEX_UNLOCK(&ar
->mcastpsqLock
);
2961 /* If this is the first Mcast pkt getting queued
2962 * indicate to the target to set the BitmapControl LSB
2965 if (isMcastqEmpty
) {
2966 wmi_set_pvb_cmd(ar
->arWmi
, MCAST_AID
, 1);
2970 /* This transmit is because of Dtim expiry. Determine if
2971 * MoreData bit has to be set.
2973 A_MUTEX_LOCK(&ar
->mcastpsqLock
);
2974 if(!A_NETBUF_QUEUE_EMPTY(&ar
->mcastpsq
)) {
2977 A_MUTEX_UNLOCK(&ar
->mcastpsqLock
);
2981 conn
= ieee80211_find_conn(ar
, datap
->dstMac
);
2983 if (STA_IS_PWR_SLEEP(conn
)) {
2984 /* If this transmit is not because of a PsPoll q it*/
2985 if (!STA_IS_PS_POLLED(conn
)) {
2986 bool isPsqEmpty
= false;
2987 /* Queue the frames if the STA is sleeping */
2988 A_MUTEX_LOCK(&conn
->psqLock
);
2989 isPsqEmpty
= A_NETBUF_QUEUE_EMPTY(&conn
->psq
);
2990 A_NETBUF_ENQUEUE(&conn
->psq
, skb
);
2991 A_MUTEX_UNLOCK(&conn
->psqLock
);
2993 /* If this is the first pkt getting queued
2994 * for this STA, update the PVB for this STA
2997 wmi_set_pvb_cmd(ar
->arWmi
, conn
->aid
, 1);
3002 /* This tx is because of a PsPoll. Determine if
3003 * MoreData bit has to be set
3005 A_MUTEX_LOCK(&conn
->psqLock
);
3006 if (!A_NETBUF_QUEUE_EMPTY(&conn
->psq
)) {
3009 A_MUTEX_UNLOCK(&conn
->psqLock
);
3014 /* non existent STA. drop the frame */
3021 if (ar
->arWmiEnabled
) {
3022 #ifdef CONFIG_CHECKSUM_OFFLOAD
3025 u8 csum
=skb
->ip_summed
;
3026 if(csumOffload
&& (csum
==CHECKSUM_PARTIAL
)){
3027 csumStart
= (skb
->head
+ skb
->csum_start
- skb_network_header(skb
) +
3028 sizeof(ATH_LLC_SNAP_HDR
));
3029 csumDest
=skb
->csum_offset
+csumStart
;
3032 if (A_NETBUF_HEADROOM(skb
) < dev
->hard_header_len
- LINUX_HACK_FUDGE_FACTOR
) {
3033 struct sk_buff
*newbuf
;
3036 * We really should have gotten enough headroom but sometimes
3037 * we still get packets with not enough headroom. Copy the packet.
3039 len
= A_NETBUF_LEN(skb
);
3040 newbuf
= A_NETBUF_ALLOC(len
);
3041 if (newbuf
== NULL
) {
3044 A_NETBUF_PUT(newbuf
, len
);
3045 A_MEMCPY(A_NETBUF_DATA(newbuf
), A_NETBUF_DATA(skb
), len
);
3048 /* fall through and assemble header */
3052 if (wmi_dot11_hdr_add(ar
->arWmi
,skb
,ar
->arNetworkType
) != A_OK
) {
3053 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
,("ar6000_data_tx-wmi_dot11_hdr_add failed\n"));
3057 if (wmi_dix_2_dot3(ar
->arWmi
, skb
) != A_OK
) {
3058 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
,("ar6000_data_tx - wmi_dix_2_dot3 failed\n"));
3062 #ifdef CONFIG_CHECKSUM_OFFLOAD
3063 if(csumOffload
&& (csum
==CHECKSUM_PARTIAL
)){
3064 WMI_TX_META_V2 metaV2
;
3065 metaV2
.csumStart
=csumStart
;
3066 metaV2
.csumDest
= csumDest
;
3067 metaV2
.csumFlags
= 0x1;/*instruct target to calculate checksum*/
3068 if (wmi_data_hdr_add(ar
->arWmi
, skb
, DATA_MSGTYPE
, bMoreData
, dot11Hdr
,
3069 WMI_META_VERSION_2
,&metaV2
) != A_OK
) {
3070 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
,("ar6000_data_tx - wmi_data_hdr_add failed\n"));
3078 if (wmi_data_hdr_add(ar
->arWmi
, skb
, DATA_MSGTYPE
, bMoreData
, dot11Hdr
,0,NULL
) != A_OK
) {
3079 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
,("ar6000_data_tx - wmi_data_hdr_add failed\n"));
3085 if ((ar
->arNetworkType
== ADHOC_NETWORK
) &&
3086 ar
->arIbssPsEnable
&& ar
->arConnected
) {
3087 /* flag to check adhoc mapping once we take the lock below: */
3088 checkAdHocPsMapping
= true;
3091 /* get the stream mapping */
3092 ac
= wmi_implicit_create_pstream(ar
->arWmi
, skb
, 0, ar
->arWmmEnabled
);
3096 EPPING_HEADER
*eppingHdr
;
3098 eppingHdr
= A_NETBUF_DATA(skb
);
3100 if (IS_EPPING_PACKET(eppingHdr
)) {
3101 /* the stream ID is mapped to an access class */
3102 ac
= eppingHdr
->StreamNo_h
;
3103 /* some EPPING packets cannot be dropped no matter what access class it was
3104 * sent on. We can change the packet tag to guarantee it will not get dropped */
3105 if (IS_EPING_PACKET_NO_DROP(eppingHdr
)) {
3106 htc_tag
= AR6K_CONTROL_PKT_TAG
;
3109 if (ac
== HCI_TRANSPORT_STREAM_NUM
) {
3110 /* pass this to HCI */
3111 #ifndef EXPORT_HCI_BRIDGE_INTERFACE
3112 if (!hci_test_send(ar
,skb
)) {
3116 /* set AC to discard this skb */
3119 /* a quirk of linux, the payload of the frame is 32-bit aligned and thus the addition
3120 * of the HTC header will mis-align the start of the HTC frame, so we add some
3121 * padding which will be stripped off in the target */
3122 if (EPPING_ALIGNMENT_PAD
> 0) {
3123 A_NETBUF_PUSH(skb
, EPPING_ALIGNMENT_PAD
);
3128 /* not a ping packet, drop it */
3135 /* did we succeed ? */
3136 if ((ac
== AC_NOT_MAPPED
) && !checkAdHocPsMapping
) {
3137 /* cleanup and exit */
3139 AR6000_STAT_INC(ar
, tx_dropped
);
3140 AR6000_STAT_INC(ar
, tx_aborted_errors
);
3146 /* take the lock to protect driver data */
3147 AR6000_SPIN_LOCK(&ar
->arLock
, 0);
3151 if (checkAdHocPsMapping
) {
3152 eid
= ar6000_ibss_map_epid(skb
, dev
, &mapNo
);
3154 eid
= arAc2EndpointID (ar
, ac
);
3156 /* validate that the endpoint is connected */
3157 if (eid
== 0 || eid
== ENDPOINT_UNUSED
) {
3158 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
,(" eid %d is NOT mapped!\n", eid
));
3161 /* allocate resource for this packet */
3162 cookie
= ar6000_alloc_cookie(ar
);
3164 if (cookie
!= NULL
) {
3165 /* update counts while the lock is held */
3166 ar
->arTxPending
[eid
]++;
3167 ar
->arTotalTxDataPending
++;
3172 AR6000_SPIN_UNLOCK(&ar
->arLock
, 0);
3174 if (cookie
!= NULL
) {
3175 cookie
->arc_bp
[0] = (unsigned long)skb
;
3176 cookie
->arc_bp
[1] = mapNo
;
3177 SET_HTC_PACKET_INFO_TX(&cookie
->HtcPkt
,
3185 if (debugdriver
>= 3) {
3186 ar6000_dump_skb(skb
);
3189 #ifdef HTC_TEST_SEND_PKTS
3190 DoHTCSendPktsTest(ar
,mapNo
,eid
,skb
);
3192 /* HTC interface is asynchronous, if this fails, cleanup will happen in
3193 * the ar6000_tx_complete callback */
3194 HTCSendPkt(ar
->arHtcTarget
, &cookie
->HtcPkt
);
3196 /* no packet to send, cleanup */
3198 AR6000_STAT_INC(ar
, tx_dropped
);
3199 AR6000_STAT_INC(ar
, tx_aborted_errors
);
3206 ar6000_acl_data_tx(struct sk_buff
*skb
, struct net_device
*dev
)
3208 AR_SOFTC_T
*ar
= (AR_SOFTC_T
*)ar6k_priv(dev
);
3209 struct ar_cookie
*cookie
;
3210 HTC_ENDPOINT_ID eid
= ENDPOINT_UNUSED
;
3213 AR6000_SPIN_LOCK(&ar
->arLock
, 0);
3215 /* For now we send ACL on BE endpoint: We can also have a dedicated EP */
3216 eid
= arAc2EndpointID (ar
, 0);
3217 /* allocate resource for this packet */
3218 cookie
= ar6000_alloc_cookie(ar
);
3220 if (cookie
!= NULL
) {
3221 /* update counts while the lock is held */
3222 ar
->arTxPending
[eid
]++;
3223 ar
->arTotalTxDataPending
++;
3227 AR6000_SPIN_UNLOCK(&ar
->arLock
, 0);
3229 if (cookie
!= NULL
) {
3230 cookie
->arc_bp
[0] = (unsigned long)skb
;
3231 cookie
->arc_bp
[1] = 0;
3232 SET_HTC_PACKET_INFO_TX(&cookie
->HtcPkt
,
3239 /* HTC interface is asynchronous, if this fails, cleanup will happen in
3240 * the ar6000_tx_complete callback */
3241 HTCSendPkt(ar
->arHtcTarget
, &cookie
->HtcPkt
);
3243 /* no packet to send, cleanup */
3245 AR6000_STAT_INC(ar
, tx_dropped
);
3246 AR6000_STAT_INC(ar
, tx_aborted_errors
);
3252 #ifdef ADAPTIVE_POWER_THROUGHPUT_CONTROL
3254 tvsub(register struct timeval
*out
, register struct timeval
*in
)
3256 if((out
->tv_usec
-= in
->tv_usec
) < 0) {
3258 out
->tv_usec
+= 1000000;
3260 out
->tv_sec
-= in
->tv_sec
;
3264 applyAPTCHeuristics(AR_SOFTC_T
*ar
)
3272 AR6000_SPIN_LOCK(&ar
->arLock
, 0);
3274 if ((enableAPTCHeuristics
) && (!aptcTR
.timerScheduled
)) {
3275 do_gettimeofday(&ts
);
3276 tvsub(&ts
, &aptcTR
.samplingTS
);
3277 duration
= ts
.tv_sec
* 1000 + ts
.tv_usec
/ 1000; /* ms */
3278 numbytes
= aptcTR
.bytesTransmitted
+ aptcTR
.bytesReceived
;
3280 if (duration
> APTC_TRAFFIC_SAMPLING_INTERVAL
) {
3281 /* Initialize the time stamp and byte count */
3282 aptcTR
.bytesTransmitted
= aptcTR
.bytesReceived
= 0;
3283 do_gettimeofday(&aptcTR
.samplingTS
);
3285 /* Calculate and decide based on throughput thresholds */
3286 throughput
= ((numbytes
* 8) / duration
);
3287 if (throughput
> APTC_UPPER_THROUGHPUT_THRESHOLD
) {
3288 /* Disable Sleep and schedule a timer */
3289 A_ASSERT(ar
->arWmiReady
== true);
3290 AR6000_SPIN_UNLOCK(&ar
->arLock
, 0);
3291 status
= wmi_powermode_cmd(ar
->arWmi
, MAX_PERF_POWER
);
3292 AR6000_SPIN_LOCK(&ar
->arLock
, 0);
3293 A_TIMEOUT_MS(&aptcTimer
, APTC_TRAFFIC_SAMPLING_INTERVAL
, 0);
3294 aptcTR
.timerScheduled
= true;
3299 AR6000_SPIN_UNLOCK(&ar
->arLock
, 0);
3301 #endif /* ADAPTIVE_POWER_THROUGHPUT_CONTROL */
3303 static HTC_SEND_FULL_ACTION
ar6000_tx_queue_full(void *Context
, HTC_PACKET
*pPacket
)
3305 AR_SOFTC_T
*ar
= (AR_SOFTC_T
*)Context
;
3306 HTC_SEND_FULL_ACTION action
= HTC_SEND_FULL_KEEP
;
3307 bool stopNet
= false;
3308 HTC_ENDPOINT_ID Endpoint
= HTC_GET_ENDPOINT_FROM_PKT(pPacket
);
3315 if (HTC_GET_TAG_FROM_PKT(pPacket
) == AR6K_CONTROL_PKT_TAG
) {
3316 /* don't drop special control packets */
3320 accessClass
= arEndpoint2Ac(ar
,Endpoint
);
3321 /* for endpoint ping testing drop Best Effort and Background */
3322 if ((accessClass
== WMM_AC_BE
) || (accessClass
== WMM_AC_BK
)) {
3323 action
= HTC_SEND_FULL_DROP
;
3326 /* keep but stop the netqueues */
3332 if (Endpoint
== ar
->arControlEp
) {
3333 /* under normal WMI if this is getting full, then something is running rampant
3334 * the host should not be exhausting the WMI queue with too many commands
3335 * the only exception to this is during testing using endpointping */
3336 AR6000_SPIN_LOCK(&ar
->arLock
, 0);
3337 /* set flag to handle subsequent messages */
3338 ar
->arWMIControlEpFull
= true;
3339 AR6000_SPIN_UNLOCK(&ar
->arLock
, 0);
3340 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
,("WMI Control Endpoint is FULL!!! \n"));
3341 /* no need to stop the network */
3346 /* if we get here, we are dealing with data endpoints getting full */
3348 if (HTC_GET_TAG_FROM_PKT(pPacket
) == AR6K_CONTROL_PKT_TAG
) {
3349 /* don't drop control packets issued on ANY data endpoint */
3353 if (ar
->arNetworkType
== ADHOC_NETWORK
) {
3354 /* in adhoc mode, we cannot differentiate traffic priorities so there is no need to
3355 * continue, however we should stop the network */
3359 /* the last MAX_HI_COOKIE_NUM "batch" of cookies are reserved for the highest
3361 if (ar
->arAcStreamPriMap
[arEndpoint2Ac(ar
,Endpoint
)] < ar
->arHiAcStreamActivePri
&&
3362 ar
->arCookieCount
<= MAX_HI_COOKIE_NUM
) {
3363 /* this stream's priority is less than the highest active priority, we
3364 * give preference to the highest priority stream by directing
3365 * HTC to drop the packet that overflowed */
3366 action
= HTC_SEND_FULL_DROP
;
3367 /* since we are dropping packets, no need to stop the network */
3375 AR6000_SPIN_LOCK(&ar
->arLock
, 0);
3376 ar
->arNetQueueStopped
= true;
3377 AR6000_SPIN_UNLOCK(&ar
->arLock
, 0);
3378 /* one of the data endpoints queues is getting full..need to stop network stack
3379 * the queue will resume in ar6000_tx_complete() */
3380 netif_stop_queue(ar
->arNetDev
);
3388 ar6000_tx_complete(void *Context
, HTC_PACKET_QUEUE
*pPacketQueue
)
3390 AR_SOFTC_T
*ar
= (AR_SOFTC_T
*)Context
;
3393 struct ar_cookie
* ar_cookie
;
3394 HTC_ENDPOINT_ID eid
;
3395 bool wakeEvent
= false;
3396 struct sk_buff_head skb_queue
;
3397 HTC_PACKET
*pPacket
;
3398 struct sk_buff
*pktSkb
;
3399 bool flushing
= false;
3401 skb_queue_head_init(&skb_queue
);
3403 /* lock the driver as we update internal state */
3404 AR6000_SPIN_LOCK(&ar
->arLock
, 0);
3406 /* reap completed packets */
3407 while (!HTC_QUEUE_EMPTY(pPacketQueue
)) {
3409 pPacket
= HTC_PACKET_DEQUEUE(pPacketQueue
);
3411 ar_cookie
= (struct ar_cookie
*)pPacket
->pPktContext
;
3412 A_ASSERT(ar_cookie
);
3414 status
= pPacket
->Status
;
3415 pktSkb
= (struct sk_buff
*)ar_cookie
->arc_bp
[0];
3416 eid
= pPacket
->Endpoint
;
3417 mapNo
= ar_cookie
->arc_bp
[1];
3420 A_ASSERT(pPacket
->pBuffer
== A_NETBUF_DATA(pktSkb
));
3422 /* add this to the list, use faster non-lock API */
3423 __skb_queue_tail(&skb_queue
,pktSkb
);
3426 A_ASSERT(pPacket
->ActualLength
== A_NETBUF_LEN(pktSkb
));
3429 AR_DEBUG_PRINTF(ATH_DEBUG_WLAN_TX
,("ar6000_tx_complete skb=0x%lx data=0x%lx len=0x%x eid=%d ",
3430 (unsigned long)pktSkb
, (unsigned long)pPacket
->pBuffer
,
3431 pPacket
->ActualLength
,
3434 ar
->arTxPending
[eid
]--;
3436 if ((eid
!= ar
->arControlEp
) || bypasswmi
) {
3437 ar
->arTotalTxDataPending
--;
3440 if (eid
== ar
->arControlEp
)
3442 if (ar
->arWMIControlEpFull
) {
3443 /* since this packet completed, the WMI EP is no longer full */
3444 ar
->arWMIControlEpFull
= false;
3447 if (ar
->arTxPending
[eid
] == 0) {
3453 if (status
== A_ECANCELED
) {
3454 /* a packet was flushed */
3457 AR6000_STAT_INC(ar
, tx_errors
);
3458 if (status
!= A_NO_RESOURCE
) {
3459 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
,("%s() -TX ERROR, status: 0x%x\n", __func__
,
3463 AR_DEBUG_PRINTF(ATH_DEBUG_WLAN_TX
,("OK\n"));
3465 AR6000_STAT_INC(ar
, tx_packets
);
3466 ar
->arNetStats
.tx_bytes
+= A_NETBUF_LEN(pktSkb
);
3467 #ifdef ADAPTIVE_POWER_THROUGHPUT_CONTROL
3468 aptcTR
.bytesTransmitted
+= a_netbuf_to_len(pktSkb
);
3469 applyAPTCHeuristics(ar
);
3470 #endif /* ADAPTIVE_POWER_THROUGHPUT_CONTROL */
3473 // TODO this needs to be looked at
3474 if ((ar
->arNetworkType
== ADHOC_NETWORK
) && ar
->arIbssPsEnable
3475 && (eid
!= ar
->arControlEp
) && mapNo
)
3478 ar
->arNodeMap
[mapNo
].txPending
--;
3480 if (!ar
->arNodeMap
[mapNo
].txPending
&& (mapNo
== (ar
->arNodeNum
- 1))) {
3482 for (i
= ar
->arNodeNum
; i
> 0; i
--) {
3483 if (!ar
->arNodeMap
[i
- 1].txPending
) {
3484 A_MEMZERO(&ar
->arNodeMap
[i
- 1], sizeof(struct ar_node_mapping
));
3493 ar6000_free_cookie(ar
, ar_cookie
);
3495 if (ar
->arNetQueueStopped
) {
3496 ar
->arNetQueueStopped
= false;
3500 AR6000_SPIN_UNLOCK(&ar
->arLock
, 0);
3502 /* lock is released, we can freely call other kernel APIs */
3504 /* free all skbs in our local list */
3505 while (!skb_queue_empty(&skb_queue
)) {
3506 /* use non-lock version */
3507 pktSkb
= __skb_dequeue(&skb_queue
);
3508 A_NETBUF_FREE(pktSkb
);
3511 if ((ar
->arConnected
== true) || bypasswmi
) {
3513 /* don't wake the queue if we are flushing, other wise it will just
3514 * keep queueing packets, which will keep failing */
3515 netif_wake_queue(ar
->arNetDev
);
3526 ieee80211_find_conn(AR_SOFTC_T
*ar
, u8
*node_addr
)
3531 switch(ar
->arNetworkType
) {
3533 max_conn
= AP_MAX_NUM_STA
;
3540 for (i
= 0; i
< max_conn
; i
++) {
3541 if (IEEE80211_ADDR_EQ(node_addr
, ar
->sta_list
[i
].mac
)) {
3542 conn
= &ar
->sta_list
[i
];
3550 sta_t
*ieee80211_find_conn_for_aid(AR_SOFTC_T
*ar
, u8 aid
)
3555 for (ctr
= 0; ctr
< AP_MAX_NUM_STA
; ctr
++) {
3556 if (ar
->sta_list
[ctr
].aid
== aid
) {
3557 conn
= &ar
->sta_list
[ctr
];
3565 * Receive event handler. This is called by HTC when a packet is received
3569 ar6000_rx(void *Context
, HTC_PACKET
*pPacket
)
3571 AR_SOFTC_T
*ar
= (AR_SOFTC_T
*)Context
;
3572 struct sk_buff
*skb
= (struct sk_buff
*)pPacket
->pPktContext
;
3574 u8 containsDot11Hdr
= 0;
3575 int status
= pPacket
->Status
;
3576 HTC_ENDPOINT_ID ept
= pPacket
->Endpoint
;
3578 A_ASSERT((status
!= A_OK
) ||
3579 (pPacket
->pBuffer
== (A_NETBUF_DATA(skb
) + HTC_HEADER_LEN
)));
3581 AR_DEBUG_PRINTF(ATH_DEBUG_WLAN_RX
,("ar6000_rx ar=0x%lx eid=%d, skb=0x%lx, data=0x%lx, len=0x%x status:%d",
3582 (unsigned long)ar
, ept
, (unsigned long)skb
, (unsigned long)pPacket
->pBuffer
,
3583 pPacket
->ActualLength
, status
));
3584 if (status
!= A_OK
) {
3585 if (status
!= A_ECANCELED
) {
3586 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
,("RX ERR (%d) \n",status
));
3590 /* take lock to protect buffer counts
3591 * and adaptive power throughput state */
3592 AR6000_SPIN_LOCK(&ar
->arLock
, 0);
3595 AR6000_STAT_INC(ar
, rx_packets
);
3596 ar
->arNetStats
.rx_bytes
+= pPacket
->ActualLength
;
3597 #ifdef ADAPTIVE_POWER_THROUGHPUT_CONTROL
3598 aptcTR
.bytesReceived
+= a_netbuf_to_len(skb
);
3599 applyAPTCHeuristics(ar
);
3600 #endif /* ADAPTIVE_POWER_THROUGHPUT_CONTROL */
3602 A_NETBUF_PUT(skb
, pPacket
->ActualLength
+ HTC_HEADER_LEN
);
3603 A_NETBUF_PULL(skb
, HTC_HEADER_LEN
);
3606 if (debugdriver
>= 2) {
3607 ar6000_dump_skb(skb
);
3612 AR6000_SPIN_UNLOCK(&ar
->arLock
, 0);
3614 skb
->dev
= ar
->arNetDev
;
3615 if (status
!= A_OK
) {
3616 AR6000_STAT_INC(ar
, rx_errors
);
3618 } else if (ar
->arWmiEnabled
== true) {
3619 if (ept
== ar
->arControlEp
) {
3621 * this is a wmi control msg
3624 ar6000_check_wow_status(ar
, skb
, true);
3625 #endif /* CONFIG_PM */
3626 wmi_control_rx(ar
->arWmi
, skb
);
3628 WMI_DATA_HDR
*dhdr
= (WMI_DATA_HDR
*)A_NETBUF_DATA(skb
);
3631 bool is_acl_data_frame
;
3632 is_acl_data_frame
= WMI_DATA_HDR_GET_DATA_TYPE(dhdr
) == WMI_DATA_HDR_DATA_TYPE_ACL
;
3634 ar6000_check_wow_status(ar
, NULL
, false);
3635 #endif /* CONFIG_PM */
3637 * this is a wmi data packet
3641 if (processDot11Hdr
) {
3642 minHdrLen
= sizeof(WMI_DATA_HDR
) + sizeof(struct ieee80211_frame
) + sizeof(ATH_LLC_SNAP_HDR
);
3644 minHdrLen
= sizeof (WMI_DATA_HDR
) + sizeof(ATH_MAC_HDR
) +
3645 sizeof(ATH_LLC_SNAP_HDR
);
3648 /* In the case of AP mode we may receive NULL data frames
3649 * that do not have LLC hdr. They are 16 bytes in size.
3650 * Allow these frames in the AP mode.
3651 * ACL data frames don't follow ethernet frame bounds for
3654 if (ar
->arNetworkType
!= AP_NETWORK
&& !is_acl_data_frame
&&
3655 ((pPacket
->ActualLength
< minHdrLen
) ||
3656 (pPacket
->ActualLength
> AR6000_MAX_RX_MESSAGE_SIZE
)))
3659 * packet is too short or too long
3661 AR_DEBUG_PRINTF(ATH_DEBUG_INFO
,("TOO SHORT or TOO LONG\n"));
3662 AR6000_STAT_INC(ar
, rx_errors
);
3663 AR6000_STAT_INC(ar
, rx_length_errors
);
3670 /* Access RSSI values here */
3671 AR_DEBUG_PRINTF(ATH_DEBUG_INFO
,("RSSI %d\n",
3672 ((WMI_DATA_HDR
*) A_NETBUF_DATA(skb
))->rssi
));
3674 /* Get the Power save state of the STA */
3675 if (ar
->arNetworkType
== AP_NETWORK
) {
3677 u8 psState
=0,prevPsState
;
3678 ATH_MAC_HDR
*datap
=NULL
;
3681 meta_type
= WMI_DATA_HDR_GET_META(dhdr
);
3683 psState
= (((WMI_DATA_HDR
*)A_NETBUF_DATA(skb
))->info
3684 >> WMI_DATA_HDR_PS_SHIFT
) & WMI_DATA_HDR_PS_MASK
;
3686 offset
= sizeof(WMI_DATA_HDR
);
3688 switch (meta_type
) {
3691 case WMI_META_VERSION_1
:
3692 offset
+= sizeof(WMI_RX_META_V1
);
3694 #ifdef CONFIG_CHECKSUM_OFFLOAD
3695 case WMI_META_VERSION_2
:
3696 offset
+= sizeof(WMI_RX_META_V2
);
3703 datap
= (ATH_MAC_HDR
*)(A_NETBUF_DATA(skb
)+offset
);
3704 conn
= ieee80211_find_conn(ar
, datap
->srcMac
);
3707 /* if there is a change in PS state of the STA,
3708 * take appropriate steps.
3709 * 1. If Sleep-->Awake, flush the psq for the STA
3710 * Clear the PVB for the STA.
3711 * 2. If Awake-->Sleep, Starting queueing frames
3714 prevPsState
= STA_IS_PWR_SLEEP(conn
);
3716 STA_SET_PWR_SLEEP(conn
);
3718 STA_CLR_PWR_SLEEP(conn
);
3721 if (prevPsState
^ STA_IS_PWR_SLEEP(conn
)) {
3723 if (!STA_IS_PWR_SLEEP(conn
)) {
3725 A_MUTEX_LOCK(&conn
->psqLock
);
3726 while (!A_NETBUF_QUEUE_EMPTY(&conn
->psq
)) {
3727 struct sk_buff
*skb
=NULL
;
3729 skb
= A_NETBUF_DEQUEUE(&conn
->psq
);
3730 A_MUTEX_UNLOCK(&conn
->psqLock
);
3731 ar6000_data_tx(skb
,ar
->arNetDev
);
3732 A_MUTEX_LOCK(&conn
->psqLock
);
3734 A_MUTEX_UNLOCK(&conn
->psqLock
);
3735 /* Clear the PVB for this STA */
3736 wmi_set_pvb_cmd(ar
->arWmi
, conn
->aid
, 0);
3740 /* This frame is from a STA that is not associated*/
3744 /* Drop NULL data frames here */
3745 if((pPacket
->ActualLength
< minHdrLen
) ||
3746 (pPacket
->ActualLength
> AR6000_MAX_RX_MESSAGE_SIZE
)) {
3752 is_amsdu
= WMI_DATA_HDR_IS_AMSDU(dhdr
) ? true : false;
3753 tid
= WMI_DATA_HDR_GET_UP(dhdr
);
3754 seq_no
= WMI_DATA_HDR_GET_SEQNO(dhdr
);
3755 meta_type
= WMI_DATA_HDR_GET_META(dhdr
);
3756 containsDot11Hdr
= WMI_DATA_HDR_GET_DOT11(dhdr
);
3758 wmi_data_hdr_remove(ar
->arWmi
, skb
);
3760 switch (meta_type
) {
3761 case WMI_META_VERSION_1
:
3763 WMI_RX_META_V1
*pMeta
= (WMI_RX_META_V1
*)A_NETBUF_DATA(skb
);
3764 A_PRINTF("META %d %d %d %d %x\n", pMeta
->status
, pMeta
->rix
, pMeta
->rssi
, pMeta
->channel
, pMeta
->flags
);
3765 A_NETBUF_PULL((void*)skb
, sizeof(WMI_RX_META_V1
));
3768 #ifdef CONFIG_CHECKSUM_OFFLOAD
3769 case WMI_META_VERSION_2
:
3771 WMI_RX_META_V2
*pMeta
= (WMI_RX_META_V2
*)A_NETBUF_DATA(skb
);
3772 if(pMeta
->csumFlags
& 0x1){
3773 skb
->ip_summed
=CHECKSUM_COMPLETE
;
3774 skb
->csum
=(pMeta
->csum
);
3776 A_NETBUF_PULL((void*)skb
, sizeof(WMI_RX_META_V2
));
3784 A_ASSERT(status
== A_OK
);
3786 /* NWF: print the 802.11 hdr bytes */
3787 if(containsDot11Hdr
) {
3788 status
= wmi_dot11_hdr_remove(ar
->arWmi
,skb
);
3789 } else if(!is_amsdu
&& !is_acl_data_frame
) {
3790 status
= wmi_dot3_2_dix(skb
);
3793 if (status
!= A_OK
) {
3794 /* Drop frames that could not be processed (lack of memory, etc.) */
3799 if (is_acl_data_frame
) {
3800 A_NETBUF_PUSH(skb
, sizeof(int));
3801 *((short *)A_NETBUF_DATA(skb
)) = WMI_ACL_DATA_EVENTID
;
3802 /* send the data packet to PAL driver */
3803 if(ar6k_pal_config_g
.fpar6k_pal_recv_pkt
) {
3804 if((*ar6k_pal_config_g
.fpar6k_pal_recv_pkt
)(ar
->hcipal_info
, skb
) == true)
3809 if ((ar
->arNetDev
->flags
& IFF_UP
) == IFF_UP
) {
3810 if (ar
->arNetworkType
== AP_NETWORK
) {
3811 struct sk_buff
*skb1
= NULL
;
3814 datap
= (ATH_MAC_HDR
*)A_NETBUF_DATA(skb
);
3815 if (IEEE80211_IS_MULTICAST(datap
->dstMac
)) {
3816 /* Bcast/Mcast frames should be sent to the OS
3817 * stack as well as on the air.
3819 skb1
= skb_copy(skb
,GFP_ATOMIC
);
3821 /* Search for a connected STA with dstMac as
3822 * the Mac address. If found send the frame to
3823 * it on the air else send the frame up the
3827 conn
= ieee80211_find_conn(ar
, datap
->dstMac
);
3829 if (conn
&& ar
->intra_bss
) {
3832 } else if(conn
&& !ar
->intra_bss
) {
3838 ar6000_data_tx(skb1
, ar
->arNetDev
);
3842 #ifdef ATH_AR6K_11N_SUPPORT
3843 aggr_process_recv_frm(ar
->aggr_cntxt
, tid
, seq_no
, is_amsdu
, (void **)&skb
);
3845 ar6000_deliver_frames_to_nw_stack((void *) ar
->arNetDev
, (void *)skb
);
3849 if (EPPING_ALIGNMENT_PAD
> 0) {
3850 A_NETBUF_PULL(skb
, EPPING_ALIGNMENT_PAD
);
3852 ar6000_deliver_frames_to_nw_stack((void *)ar
->arNetDev
, (void *)skb
);
3861 ar6000_deliver_frames_to_nw_stack(void *dev
, void *osbuf
)
3863 struct sk_buff
*skb
= (struct sk_buff
*)osbuf
;
3867 if ((skb
->dev
->flags
& IFF_UP
) == IFF_UP
) {
3869 ar6000_check_wow_status((AR_SOFTC_T
*)ar6k_priv(dev
), skb
, false);
3870 #endif /* CONFIG_PM */
3871 skb
->protocol
= eth_type_trans(skb
, skb
->dev
);
3873 * If this routine is called on a ISR (Hard IRQ) or DSR (Soft IRQ)
3874 * or tasklet use the netif_rx to deliver the packet to the stack
3875 * netif_rx will queue the packet onto the receive queue and mark
3876 * the softirq thread has a pending action to complete. Kernel will
3877 * schedule the softIrq kernel thread after processing the DSR.
3879 * If this routine is called on a process context, use netif_rx_ni
3880 * which will schedle the softIrq kernel thread after queuing the packet.
3882 if (in_interrupt()) {
3895 ar6000_deliver_frames_to_bt_stack(void *dev
, void *osbuf
)
3897 struct sk_buff
*skb
= (struct sk_buff
*)osbuf
;
3901 if ((skb
->dev
->flags
& IFF_UP
) == IFF_UP
) {
3902 skb
->protocol
= htons(ETH_P_CONTROL
);
3912 ar6000_rx_refill(void *Context
, HTC_ENDPOINT_ID Endpoint
)
3914 AR_SOFTC_T
*ar
= (AR_SOFTC_T
*)Context
;
3917 int buffersToRefill
;
3918 HTC_PACKET
*pPacket
;
3919 HTC_PACKET_QUEUE queue
;
3921 buffersToRefill
= (int)AR6000_MAX_RX_BUFFERS
-
3922 HTCGetNumRecvBuffers(ar
->arHtcTarget
, Endpoint
);
3924 if (buffersToRefill
<= 0) {
3925 /* fast return, nothing to fill */
3929 INIT_HTC_PACKET_QUEUE(&queue
);
3931 AR_DEBUG_PRINTF(ATH_DEBUG_WLAN_RX
,("ar6000_rx_refill: providing htc with %d buffers at eid=%d\n",
3932 buffersToRefill
, Endpoint
));
3934 for (RxBuffers
= 0; RxBuffers
< buffersToRefill
; RxBuffers
++) {
3935 osBuf
= A_NETBUF_ALLOC(AR6000_BUFFER_SIZE
);
3936 if (NULL
== osBuf
) {
3939 /* the HTC packet wrapper is at the head of the reserved area
3941 pPacket
= (HTC_PACKET
*)(A_NETBUF_HEAD(osBuf
));
3942 /* set re-fill info */
3943 SET_HTC_PACKET_INFO_RX_REFILL(pPacket
,osBuf
,A_NETBUF_DATA(osBuf
),AR6000_BUFFER_SIZE
,Endpoint
);
3945 HTC_PACKET_ENQUEUE(&queue
,pPacket
);
3948 if (!HTC_QUEUE_EMPTY(&queue
)) {
3950 HTCAddReceivePktMultiple(ar
->arHtcTarget
, &queue
);
3955 /* clean up our amsdu buffer list */
3956 static void ar6000_cleanup_amsdu_rxbufs(AR_SOFTC_T
*ar
)
3958 HTC_PACKET
*pPacket
;
3961 /* empty AMSDU buffer queue and free OS bufs */
3964 AR6000_SPIN_LOCK(&ar
->arLock
, 0);
3965 pPacket
= HTC_PACKET_DEQUEUE(&ar
->amsdu_rx_buffer_queue
);
3966 AR6000_SPIN_UNLOCK(&ar
->arLock
, 0);
3968 if (NULL
== pPacket
) {
3972 osBuf
= pPacket
->pPktContext
;
3973 if (NULL
== osBuf
) {
3978 A_NETBUF_FREE(osBuf
);
3984 /* refill the amsdu buffer list */
3985 static void ar6000_refill_amsdu_rxbufs(AR_SOFTC_T
*ar
, int Count
)
3987 HTC_PACKET
*pPacket
;
3991 osBuf
= A_NETBUF_ALLOC(AR6000_AMSDU_BUFFER_SIZE
);
3992 if (NULL
== osBuf
) {
3995 /* the HTC packet wrapper is at the head of the reserved area
3997 pPacket
= (HTC_PACKET
*)(A_NETBUF_HEAD(osBuf
));
3998 /* set re-fill info */
3999 SET_HTC_PACKET_INFO_RX_REFILL(pPacket
,osBuf
,A_NETBUF_DATA(osBuf
),AR6000_AMSDU_BUFFER_SIZE
,0);
4001 AR6000_SPIN_LOCK(&ar
->arLock
, 0);
4002 /* put it in the list */
4003 HTC_PACKET_ENQUEUE(&ar
->amsdu_rx_buffer_queue
,pPacket
);
4004 AR6000_SPIN_UNLOCK(&ar
->arLock
, 0);
4010 /* callback to allocate a large receive buffer for a pending packet. This function is called when
4011 * an HTC packet arrives whose length exceeds a threshold value
4013 * We use a pre-allocated list of buffers of maximum AMSDU size (4K). Under linux it is more optimal to
4014 * keep the allocation size the same to optimize cached-slab allocations.
4017 static HTC_PACKET
*ar6000_alloc_amsdu_rxbuf(void *Context
, HTC_ENDPOINT_ID Endpoint
, int Length
)
4019 HTC_PACKET
*pPacket
= NULL
;
4020 AR_SOFTC_T
*ar
= (AR_SOFTC_T
*)Context
;
4021 int refillCount
= 0;
4023 AR_DEBUG_PRINTF(ATH_DEBUG_WLAN_RX
,("ar6000_alloc_amsdu_rxbuf: eid=%d, Length:%d\n",Endpoint
,Length
));
4027 if (Length
<= AR6000_BUFFER_SIZE
) {
4028 /* shouldn't be getting called on normal sized packets */
4033 if (Length
> AR6000_AMSDU_BUFFER_SIZE
) {
4038 AR6000_SPIN_LOCK(&ar
->arLock
, 0);
4039 /* allocate a packet from the list */
4040 pPacket
= HTC_PACKET_DEQUEUE(&ar
->amsdu_rx_buffer_queue
);
4041 /* see if we need to refill again */
4042 refillCount
= AR6000_MAX_AMSDU_RX_BUFFERS
- HTC_PACKET_QUEUE_DEPTH(&ar
->amsdu_rx_buffer_queue
);
4043 AR6000_SPIN_UNLOCK(&ar
->arLock
, 0);
4045 if (NULL
== pPacket
) {
4048 /* set actual endpoint ID */
4049 pPacket
->Endpoint
= Endpoint
;
4053 if (refillCount
>= AR6000_AMSDU_REFILL_THRESHOLD
) {
4054 ar6000_refill_amsdu_rxbufs(ar
,refillCount
);
4061 ar6000_set_multicast_list(struct net_device
*dev
)
4063 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
,("ar6000: Multicast filter not supported\n"));
4066 static struct net_device_stats
*
4067 ar6000_get_stats(struct net_device
*dev
)
4069 AR_SOFTC_T
*ar
= (AR_SOFTC_T
*)ar6k_priv(dev
);
4070 return &ar
->arNetStats
;
4073 static struct iw_statistics
*
4074 ar6000_get_iwstats(struct net_device
* dev
)
4076 AR_SOFTC_T
*ar
= (AR_SOFTC_T
*)ar6k_priv(dev
);
4077 TARGET_STATS
*pStats
= &ar
->arTargetStats
;
4078 struct iw_statistics
* pIwStats
= &ar
->arIwStats
;
4081 if (ar
->bIsDestroyProgress
|| ar
->arWmiReady
== false || ar
->arWlanState
== WLAN_DISABLED
)
4083 pIwStats
->status
= 0;
4084 pIwStats
->qual
.qual
= 0;
4085 pIwStats
->qual
.level
=0;
4086 pIwStats
->qual
.noise
= 0;
4087 pIwStats
->discard
.code
=0;
4088 pIwStats
->discard
.retries
=0;
4089 pIwStats
->miss
.beacon
=0;
4094 * The in_atomic function is used to determine if the scheduling is
4095 * allowed in the current context or not. This was introduced in 2.6
4096 * From what I have read on the differences between 2.4 and 2.6, the
4097 * 2.4 kernel did not support preemption and so this check might not
4098 * be required for 2.4 kernels.
4102 wmi_get_stats_cmd(ar
->arWmi
);
4104 pIwStats
->status
= 1 ;
4105 pIwStats
->qual
.qual
= pStats
->cs_aveBeacon_rssi
- 161;
4106 pIwStats
->qual
.level
=pStats
->cs_aveBeacon_rssi
; /* noise is -95 dBm */
4107 pIwStats
->qual
.noise
= pStats
->noise_floor_calibation
;
4108 pIwStats
->discard
.code
= pStats
->rx_decrypt_err
;
4109 pIwStats
->discard
.retries
= pStats
->tx_retry_cnt
;
4110 pIwStats
->miss
.beacon
= pStats
->cs_bmiss_cnt
;
4115 rtnllocked
= rtnl_is_locked();
4119 pIwStats
->status
= 0;
4121 if (down_interruptible(&ar
->arSem
)) {
4127 if (ar
->bIsDestroyProgress
|| ar
->arWlanState
== WLAN_DISABLED
) {
4131 ar
->statsUpdatePending
= true;
4133 if(wmi_get_stats_cmd(ar
->arWmi
) != A_OK
) {
4137 wait_event_interruptible_timeout(arEvent
, ar
->statsUpdatePending
== false, wmitimeout
* HZ
);
4138 if (signal_pending(current
)) {
4139 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
,("ar6000 : WMI get stats timeout \n"));
4142 pIwStats
->status
= 1 ;
4143 pIwStats
->qual
.qual
= pStats
->cs_aveBeacon_rssi
- 161;
4144 pIwStats
->qual
.level
=pStats
->cs_aveBeacon_rssi
; /* noise is -95 dBm */
4145 pIwStats
->qual
.noise
= pStats
->noise_floor_calibation
;
4146 pIwStats
->discard
.code
= pStats
->rx_decrypt_err
;
4147 pIwStats
->discard
.retries
= pStats
->tx_retry_cnt
;
4148 pIwStats
->miss
.beacon
= pStats
->cs_bmiss_cnt
;
4161 ar6000_ready_event(void *devt
, u8
*datap
, u8 phyCap
, u32 sw_ver
, u32 abi_ver
)
4163 AR_SOFTC_T
*ar
= (AR_SOFTC_T
*)devt
;
4164 struct net_device
*dev
= ar
->arNetDev
;
4166 A_MEMCPY(dev
->dev_addr
, datap
, AR6000_ETH_ADDR_LEN
);
4167 AR_DEBUG_PRINTF(ATH_DEBUG_INFO
,("mac address = %2.2x:%2.2x:%2.2x:%2.2x:%2.2x:%2.2x\n",
4168 dev
->dev_addr
[0], dev
->dev_addr
[1],
4169 dev
->dev_addr
[2], dev
->dev_addr
[3],
4170 dev
->dev_addr
[4], dev
->dev_addr
[5]));
4172 ar
->arPhyCapability
= phyCap
;
4173 ar
->arVersion
.wlan_ver
= sw_ver
;
4174 ar
->arVersion
.abi_ver
= abi_ver
;
4176 /* Indicate to the waiting thread that the ready event was received */
4177 ar
->arWmiReady
= true;
4180 #if WLAN_CONFIG_IGNORE_POWER_SAVE_FAIL_EVENT_DURING_SCAN
4181 wmi_pmparams_cmd(ar
->arWmi
, 0, 1, 0, 0, 1, IGNORE_POWER_SAVE_FAIL_EVENT_DURING_SCAN
);
4183 #if WLAN_CONFIG_DONOT_IGNORE_BARKER_IN_ERP
4184 wmi_set_lpreamble_cmd(ar
->arWmi
, 0, WMI_DONOT_IGNORE_BARKER_IN_ERP
);
4186 wmi_set_keepalive_cmd(ar
->arWmi
, WLAN_CONFIG_KEEP_ALIVE_INTERVAL
);
4187 #if WLAN_CONFIG_DISABLE_11N
4189 WMI_SET_HT_CAP_CMD htCap
;
4191 A_MEMZERO(&htCap
, sizeof(WMI_SET_HT_CAP_CMD
));
4193 wmi_set_ht_cap_cmd(ar
->arWmi
, &htCap
);
4196 wmi_set_ht_cap_cmd(ar
->arWmi
, &htCap
);
4198 #endif /* WLAN_CONFIG_DISABLE_11N */
4200 #ifdef ATH6K_CONFIG_OTA_MODE
4201 wmi_powermode_cmd(ar
->arWmi
, MAX_PERF_POWER
);
4203 wmi_disctimeout_cmd(ar
->arWmi
, WLAN_CONFIG_DISCONNECT_TIMEOUT
);
4207 add_new_sta(AR_SOFTC_T
*ar
, u8
*mac
, u16 aid
, u8
*wpaie
,
4208 u8 ielen
, u8 keymgmt
, u8 ucipher
, u8 auth
)
4212 A_MEMCPY(ar
->sta_list
[free_slot
].mac
, mac
, ATH_MAC_LEN
);
4213 A_MEMCPY(ar
->sta_list
[free_slot
].wpa_ie
, wpaie
, ielen
);
4214 ar
->sta_list
[free_slot
].aid
= aid
;
4215 ar
->sta_list
[free_slot
].keymgmt
= keymgmt
;
4216 ar
->sta_list
[free_slot
].ucipher
= ucipher
;
4217 ar
->sta_list
[free_slot
].auth
= auth
;
4218 ar
->sta_list_index
= ar
->sta_list_index
| (1 << free_slot
);
4219 ar
->arAPStats
.sta
[free_slot
].aid
= aid
;
4223 ar6000_connect_event(AR_SOFTC_T
*ar
, u16 channel
, u8
*bssid
,
4224 u16 listenInterval
, u16 beaconInterval
,
4225 NETWORK_TYPE networkType
, u8 beaconIeLen
,
4226 u8 assocReqLen
, u8 assocRespLen
,
4229 union iwreq_data wrqu
;
4230 int i
, beacon_ie_pos
, assoc_resp_ie_pos
, assoc_req_ie_pos
;
4231 static const char *tag1
= "ASSOCINFO(ReqIEs=";
4232 static const char *tag2
= "ASSOCRESPIE=";
4233 static const char *beaconIetag
= "BEACONIE=";
4234 char buf
[WMI_CONTROL_MSG_MAX_LEN
* 2 + strlen(tag1
) + 1];
4237 unsigned long flags
;
4238 struct ieee80211req_key
*ik
;
4239 CRYPTO_TYPE keyType
= NONE_CRYPT
;
4241 if(ar
->arNetworkType
& AP_NETWORK
) {
4242 struct net_device
*dev
= ar
->arNetDev
;
4243 if(A_MEMCMP(dev
->dev_addr
, bssid
, ATH_MAC_LEN
)==0) {
4244 ar
->arACS
= channel
;
4245 ik
= &ar
->ap_mode_bkey
;
4247 switch(ar
->arAuthMode
) {
4249 if(ar
->arPairwiseCrypto
== WEP_CRYPT
) {
4250 ar6000_install_static_wep_keys(ar
);
4253 else if(ar
->arPairwiseCrypto
== WAPI_CRYPT
) {
4254 ap_set_wapi_key(ar
, ik
);
4260 case (WPA_PSK_AUTH
|WPA2_PSK_AUTH
):
4261 switch (ik
->ik_type
) {
4262 case IEEE80211_CIPHER_TKIP
:
4263 keyType
= TKIP_CRYPT
;
4265 case IEEE80211_CIPHER_AES_CCM
:
4266 keyType
= AES_CRYPT
;
4271 wmi_addKey_cmd(ar
->arWmi
, ik
->ik_keyix
, keyType
, GROUP_USAGE
,
4272 ik
->ik_keylen
, (u8
*)&ik
->ik_keyrsc
,
4273 ik
->ik_keydata
, KEY_OP_INIT_VAL
, ik
->ik_macaddr
,
4279 ar
->arConnected
= true;
4283 A_PRINTF("NEW STA %2.2x:%2.2x:%2.2x:%2.2x:%2.2x:%2.2x \n "
4284 " AID=%d \n", bssid
[0], bssid
[1], bssid
[2],
4285 bssid
[3], bssid
[4], bssid
[5], channel
);
4286 switch ((listenInterval
>>8)&0xFF) {
4288 A_PRINTF("AUTH: OPEN\n");
4291 A_PRINTF("AUTH: SHARED\n");
4294 A_PRINTF("AUTH: Unknown\n");
4297 switch (listenInterval
&0xFF) {
4299 A_PRINTF("KeyMgmt: WPA-PSK\n");
4302 A_PRINTF("KeyMgmt: WPA2-PSK\n");
4305 A_PRINTF("KeyMgmt: NONE\n");
4308 switch (beaconInterval
) {
4310 A_PRINTF("Cipher: AES\n");
4313 A_PRINTF("Cipher: TKIP\n");
4316 A_PRINTF("Cipher: WEP\n");
4320 A_PRINTF("Cipher: WAPI\n");
4324 A_PRINTF("Cipher: NONE\n");
4328 add_new_sta(ar
, bssid
, channel
/*aid*/,
4329 assocInfo
/* WPA IE */, assocRespLen
/* IE len */,
4330 listenInterval
&0xFF /* Keymgmt */, beaconInterval
/* cipher */,
4331 (listenInterval
>>8)&0xFF /* auth alg */);
4333 /* Send event to application */
4334 A_MEMZERO(&wrqu
, sizeof(wrqu
));
4335 A_MEMCPY(wrqu
.addr
.sa_data
, bssid
, ATH_MAC_LEN
);
4336 wireless_send_event(ar
->arNetDev
, IWEVREGISTERED
, &wrqu
, NULL
);
4337 /* In case the queue is stopped when we switch modes, this will
4340 netif_wake_queue(ar
->arNetDev
);
4344 #ifdef ATH6K_CONFIG_CFG80211
4345 ar6k_cfg80211_connect_event(ar
, channel
, bssid
,
4346 listenInterval
, beaconInterval
,
4347 networkType
, beaconIeLen
,
4348 assocReqLen
, assocRespLen
,
4350 #endif /* ATH6K_CONFIG_CFG80211 */
4352 A_MEMCPY(ar
->arBssid
, bssid
, sizeof(ar
->arBssid
));
4353 ar
->arBssChannel
= channel
;
4355 A_PRINTF("AR6000 connected event on freq %d ", channel
);
4356 A_PRINTF("with bssid %2.2x:%2.2x:%2.2x:%2.2x:%2.2x:%2.2x "
4357 " listenInterval=%d, beaconInterval = %d, beaconIeLen = %d assocReqLen=%d"
4358 " assocRespLen =%d\n",
4359 bssid
[0], bssid
[1], bssid
[2],
4360 bssid
[3], bssid
[4], bssid
[5],
4361 listenInterval
, beaconInterval
,
4362 beaconIeLen
, assocReqLen
, assocRespLen
);
4363 if (networkType
& ADHOC_NETWORK
) {
4364 if (networkType
& ADHOC_CREATOR
) {
4365 A_PRINTF("Network: Adhoc (Creator)\n");
4367 A_PRINTF("Network: Adhoc (Joiner)\n");
4370 A_PRINTF("Network: Infrastructure\n");
4373 if ((ar
->arNetworkType
== INFRA_NETWORK
)) {
4374 wmi_listeninterval_cmd(ar
->arWmi
, ar
->arListenIntervalT
, ar
->arListenIntervalB
);
4377 if (beaconIeLen
&& (sizeof(buf
) > (9 + beaconIeLen
* 2))) {
4378 AR_DEBUG_PRINTF(ATH_DEBUG_WLAN_CONNECT
,("\nBeaconIEs= "));
4381 A_MEMZERO(buf
, sizeof(buf
));
4382 sprintf(buf
, "%s", beaconIetag
);
4384 for (i
= beacon_ie_pos
; i
< beacon_ie_pos
+ beaconIeLen
; i
++) {
4385 AR_DEBUG_PRINTF(ATH_DEBUG_WLAN_CONNECT
,("%2.2x ", assocInfo
[i
]));
4386 sprintf(pos
, "%2.2x", assocInfo
[i
]);
4389 AR_DEBUG_PRINTF(ATH_DEBUG_WLAN_CONNECT
,("\n"));
4391 A_MEMZERO(&wrqu
, sizeof(wrqu
));
4392 wrqu
.data
.length
= strlen(buf
);
4393 wireless_send_event(ar
->arNetDev
, IWEVCUSTOM
, &wrqu
, buf
);
4396 if (assocRespLen
&& (sizeof(buf
) > (12 + (assocRespLen
* 2))))
4398 assoc_resp_ie_pos
= beaconIeLen
+ assocReqLen
+
4399 sizeof(u16
) + /* capinfo*/
4400 sizeof(u16
) + /* status Code */
4401 sizeof(u16
) ; /* associd */
4402 A_MEMZERO(buf
, sizeof(buf
));
4403 sprintf(buf
, "%s", tag2
);
4405 AR_DEBUG_PRINTF(ATH_DEBUG_WLAN_CONNECT
,("\nAssocRespIEs= "));
4407 * The Association Response Frame w.o. the WLAN header is delivered to
4408 * the host, so skip over to the IEs
4410 for (i
= assoc_resp_ie_pos
; i
< assoc_resp_ie_pos
+ assocRespLen
- 6; i
++)
4412 AR_DEBUG_PRINTF(ATH_DEBUG_WLAN_CONNECT
,("%2.2x ", assocInfo
[i
]));
4413 sprintf(pos
, "%2.2x", assocInfo
[i
]);
4416 AR_DEBUG_PRINTF(ATH_DEBUG_WLAN_CONNECT
,("\n"));
4418 A_MEMZERO(&wrqu
, sizeof(wrqu
));
4419 wrqu
.data
.length
= strlen(buf
);
4420 wireless_send_event(ar
->arNetDev
, IWEVCUSTOM
, &wrqu
, buf
);
4423 if (assocReqLen
&& (sizeof(buf
) > (17 + (assocReqLen
* 2)))) {
4425 * assoc Request includes capability and listen interval. Skip these.
4427 assoc_req_ie_pos
= beaconIeLen
+
4428 sizeof(u16
) + /* capinfo*/
4429 sizeof(u16
); /* listen interval */
4431 A_MEMZERO(buf
, sizeof(buf
));
4432 sprintf(buf
, "%s", tag1
);
4434 AR_DEBUG_PRINTF(ATH_DEBUG_WLAN_CONNECT
,("AssocReqIEs= "));
4435 for (i
= assoc_req_ie_pos
; i
< assoc_req_ie_pos
+ assocReqLen
- 4; i
++) {
4436 AR_DEBUG_PRINTF(ATH_DEBUG_WLAN_CONNECT
,("%2.2x ", assocInfo
[i
]));
4437 sprintf(pos
, "%2.2x", assocInfo
[i
]);
4440 AR_DEBUG_PRINTF(ATH_DEBUG_WLAN_CONNECT
,("\n"));
4442 A_MEMZERO(&wrqu
, sizeof(wrqu
));
4443 wrqu
.data
.length
= strlen(buf
);
4444 wireless_send_event(ar
->arNetDev
, IWEVCUSTOM
, &wrqu
, buf
);
4448 if (ar
->user_savedkeys_stat
== USER_SAVEDKEYS_STAT_RUN
&&
4449 ar
->user_saved_keys
.keyOk
== true)
4451 key_op_ctrl
= KEY_OP_VALID_MASK
& ~KEY_OP_INIT_TSC
;
4453 if (ar
->user_key_ctrl
& AR6000_USER_SETKEYS_RSC_UNCHANGED
) {
4454 key_op_ctrl
&= ~KEY_OP_INIT_RSC
;
4456 key_op_ctrl
|= KEY_OP_INIT_RSC
;
4458 ar6000_reinstall_keys(ar
, key_op_ctrl
);
4460 #endif /* USER_KEYS */
4462 netif_wake_queue(ar
->arNetDev
);
4464 /* For CFG80211 the key configuration and the default key comes in after connect so no point in plumbing invalid keys */
4465 #ifndef ATH6K_CONFIG_CFG80211
4466 if ((networkType
& ADHOC_NETWORK
) &&
4467 (OPEN_AUTH
== ar
->arDot11AuthMode
) &&
4468 (NONE_AUTH
== ar
->arAuthMode
) &&
4469 (WEP_CRYPT
== ar
->arPairwiseCrypto
))
4471 if (!ar
->arConnected
) {
4472 wmi_addKey_cmd(ar
->arWmi
,
4473 ar
->arDefTxKeyIndex
,
4475 GROUP_USAGE
| TX_USAGE
,
4476 ar
->arWepKeyList
[ar
->arDefTxKeyIndex
].arKeyLen
,
4478 ar
->arWepKeyList
[ar
->arDefTxKeyIndex
].arKey
, KEY_OP_INIT_VAL
, NULL
,
4482 #endif /* ATH6K_CONFIG_CFG80211 */
4484 /* Update connect & link status atomically */
4485 spin_lock_irqsave(&ar
->arLock
, flags
);
4486 ar
->arConnected
= true;
4487 ar
->arConnectPending
= false;
4488 netif_carrier_on(ar
->arNetDev
);
4489 spin_unlock_irqrestore(&ar
->arLock
, flags
);
4490 /* reset the rx aggr state */
4491 aggr_reset_state(ar
->aggr_cntxt
);
4494 A_MEMZERO(&wrqu
, sizeof(wrqu
));
4495 A_MEMCPY(wrqu
.addr
.sa_data
, bssid
, IEEE80211_ADDR_LEN
);
4496 wrqu
.addr
.sa_family
= ARPHRD_ETHER
;
4497 wireless_send_event(ar
->arNetDev
, SIOCGIWAP
, &wrqu
, NULL
);
4498 if ((ar
->arNetworkType
== ADHOC_NETWORK
) && ar
->arIbssPsEnable
) {
4499 A_MEMZERO(ar
->arNodeMap
, sizeof(ar
->arNodeMap
));
4501 ar
->arNexEpId
= ENDPOINT_2
;
4503 if (!ar
->arUserBssFilter
) {
4504 wmi_bssfilter_cmd(ar
->arWmi
, NONE_BSS_FILTER
, 0);
4509 void ar6000_set_numdataendpts(AR_SOFTC_T
*ar
, u32 num
)
4511 A_ASSERT(num
<= (HTC_MAILBOX_NUM_MAX
- 1));
4512 ar
->arNumDataEndPts
= num
;
4516 sta_cleanup(AR_SOFTC_T
*ar
, u8 i
)
4518 struct sk_buff
*skb
;
4520 /* empty the queued pkts in the PS queue if any */
4521 A_MUTEX_LOCK(&ar
->sta_list
[i
].psqLock
);
4522 while (!A_NETBUF_QUEUE_EMPTY(&ar
->sta_list
[i
].psq
)) {
4523 skb
= A_NETBUF_DEQUEUE(&ar
->sta_list
[i
].psq
);
4526 A_MUTEX_UNLOCK(&ar
->sta_list
[i
].psqLock
);
4528 /* Zero out the state fields */
4529 A_MEMZERO(&ar
->arAPStats
.sta
[ar
->sta_list
[i
].aid
-1], sizeof(WMI_PER_STA_STAT
));
4530 A_MEMZERO(&ar
->sta_list
[i
].mac
, ATH_MAC_LEN
);
4531 A_MEMZERO(&ar
->sta_list
[i
].wpa_ie
, IEEE80211_MAX_IE
);
4532 ar
->sta_list
[i
].aid
= 0;
4533 ar
->sta_list
[i
].flags
= 0;
4535 ar
->sta_list_index
= ar
->sta_list_index
& ~(1 << i
);
4539 u8
remove_sta(AR_SOFTC_T
*ar
, u8
*mac
, u16 reason
)
4543 if(IS_MAC_NULL(mac
)) {
4547 if(IS_MAC_BCAST(mac
)) {
4548 A_PRINTF("DEL ALL STA\n");
4549 for(i
=0; i
< AP_MAX_NUM_STA
; i
++) {
4550 if(!IS_MAC_NULL(ar
->sta_list
[i
].mac
)) {
4556 for(i
=0; i
< AP_MAX_NUM_STA
; i
++) {
4557 if(A_MEMCMP(ar
->sta_list
[i
].mac
, mac
, ATH_MAC_LEN
)==0) {
4558 A_PRINTF("DEL STA %2.2x:%2.2x:%2.2x:%2.2x:%2.2x:%2.2x "
4559 " aid=%d REASON=%d\n", mac
[0], mac
[1], mac
[2],
4560 mac
[3], mac
[4], mac
[5], ar
->sta_list
[i
].aid
, reason
);
4572 ar6000_disconnect_event(AR_SOFTC_T
*ar
, u8 reason
, u8
*bssid
,
4573 u8 assocRespLen
, u8
*assocInfo
, u16 protocolReasonStatus
)
4576 unsigned long flags
;
4577 union iwreq_data wrqu
;
4579 if(ar
->arNetworkType
& AP_NETWORK
) {
4580 union iwreq_data wrqu
;
4581 struct sk_buff
*skb
;
4583 if(!remove_sta(ar
, bssid
, protocolReasonStatus
)) {
4587 /* If there are no more associated STAs, empty the mcast PS q */
4588 if (ar
->sta_list_index
== 0) {
4589 A_MUTEX_LOCK(&ar
->mcastpsqLock
);
4590 while (!A_NETBUF_QUEUE_EMPTY(&ar
->mcastpsq
)) {
4591 skb
= A_NETBUF_DEQUEUE(&ar
->mcastpsq
);
4594 A_MUTEX_UNLOCK(&ar
->mcastpsqLock
);
4596 /* Clear the LSB of the BitMapCtl field of the TIM IE */
4597 if (ar
->arWmiReady
) {
4598 wmi_set_pvb_cmd(ar
->arWmi
, MCAST_AID
, 0);
4602 if(!IS_MAC_BCAST(bssid
)) {
4603 /* Send event to application */
4604 A_MEMZERO(&wrqu
, sizeof(wrqu
));
4605 A_MEMCPY(wrqu
.addr
.sa_data
, bssid
, ATH_MAC_LEN
);
4606 wireless_send_event(ar
->arNetDev
, IWEVEXPIRED
, &wrqu
, NULL
);
4611 #ifdef ATH6K_CONFIG_CFG80211
4612 ar6k_cfg80211_disconnect_event(ar
, reason
, bssid
,
4613 assocRespLen
, assocInfo
,
4614 protocolReasonStatus
);
4615 #endif /* ATH6K_CONFIG_CFG80211 */
4617 /* Send disconnect event to supplicant */
4618 A_MEMZERO(&wrqu
, sizeof(wrqu
));
4619 wrqu
.addr
.sa_family
= ARPHRD_ETHER
;
4620 wireless_send_event(ar
->arNetDev
, SIOCGIWAP
, &wrqu
, NULL
);
4622 /* it is necessary to clear the host-side rx aggregation state */
4623 aggr_reset_state(ar
->aggr_cntxt
);
4625 A_UNTIMEOUT(&ar
->disconnect_timer
);
4627 A_PRINTF("AR6000 disconnected");
4628 if (bssid
[0] || bssid
[1] || bssid
[2] || bssid
[3] || bssid
[4] || bssid
[5]) {
4629 A_PRINTF(" from %2.2x:%2.2x:%2.2x:%2.2x:%2.2x:%2.2x ",
4630 bssid
[0], bssid
[1], bssid
[2], bssid
[3], bssid
[4], bssid
[5]);
4633 AR_DEBUG_PRINTF(ATH_DEBUG_WLAN_CONNECT
,("\nDisconnect Reason is %d", reason
));
4634 AR_DEBUG_PRINTF(ATH_DEBUG_WLAN_CONNECT
,("\nProtocol Reason/Status Code is %d", protocolReasonStatus
));
4635 AR_DEBUG_PRINTF(ATH_DEBUG_WLAN_CONNECT
,("\nAssocResp Frame = %s",
4636 assocRespLen
? " " : "NULL"));
4637 for (i
= 0; i
< assocRespLen
; i
++) {
4639 AR_DEBUG_PRINTF(ATH_DEBUG_WLAN_CONNECT
,("\n"));
4641 AR_DEBUG_PRINTF(ATH_DEBUG_WLAN_CONNECT
,("%2.2x ", assocInfo
[i
]));
4643 AR_DEBUG_PRINTF(ATH_DEBUG_WLAN_CONNECT
,("\n"));
4645 * If the event is due to disconnect cmd from the host, only they the target
4646 * would stop trying to connect. Under any other condition, target would
4647 * keep trying to connect.
4650 if( reason
== DISCONNECT_CMD
)
4652 ar
->arConnectPending
= false;
4653 if ((!ar
->arUserBssFilter
) && (ar
->arWmiReady
)) {
4654 wmi_bssfilter_cmd(ar
->arWmi
, NONE_BSS_FILTER
, 0);
4657 ar
->arConnectPending
= true;
4658 if (((reason
== ASSOC_FAILED
) && (protocolReasonStatus
== 0x11)) ||
4659 ((reason
== ASSOC_FAILED
) && (protocolReasonStatus
== 0x0) && (reconnect_flag
== 1))) {
4660 ar
->arConnected
= true;
4665 if ((reason
== NO_NETWORK_AVAIL
) && (ar
->arWmiReady
))
4667 bss_t
*pWmiSsidnode
= NULL
;
4669 /* remove the current associated bssid node */
4670 wmi_free_node (ar
->arWmi
, bssid
);
4673 * In case any other same SSID nodes are present
4674 * remove it, since those nodes also not available now
4679 * Find the nodes based on SSID and remove it
4680 * NOTE :: This case will not work out for Hidden-SSID
4682 pWmiSsidnode
= wmi_find_Ssidnode (ar
->arWmi
, ar
->arSsid
, ar
->arSsidLen
, false, true);
4686 wmi_free_node (ar
->arWmi
, pWmiSsidnode
->ni_macaddr
);
4689 } while (pWmiSsidnode
);
4692 /* Update connect & link status atomically */
4693 spin_lock_irqsave(&ar
->arLock
, flags
);
4694 ar
->arConnected
= false;
4695 netif_carrier_off(ar
->arNetDev
);
4696 spin_unlock_irqrestore(&ar
->arLock
, flags
);
4698 if( (reason
!= CSERV_DISCONNECT
) || (reconnect_flag
!= 1) ) {
4703 if (reason
!= CSERV_DISCONNECT
)
4705 ar
->user_savedkeys_stat
= USER_SAVEDKEYS_STAT_INIT
;
4706 ar
->user_key_ctrl
= 0;
4708 #endif /* USER_KEYS */
4710 netif_stop_queue(ar
->arNetDev
);
4711 A_MEMZERO(ar
->arBssid
, sizeof(ar
->arBssid
));
4712 ar
->arBssChannel
= 0;
4713 ar
->arBeaconInterval
= 0;
4715 ar6000_TxDataCleanup(ar
);
4719 ar6000_regDomain_event(AR_SOFTC_T
*ar
, u32 regCode
)
4721 A_PRINTF("AR6000 Reg Code = 0x%x\n", regCode
);
4722 ar
->arRegCode
= regCode
;
4725 #ifdef ATH_AR6K_11N_SUPPORT
4727 ar6000_aggr_rcv_addba_req_evt(AR_SOFTC_T
*ar
, WMI_ADDBA_REQ_EVENT
*evt
)
4729 if(evt
->status
== 0) {
4730 aggr_recv_addba_req_evt(ar
->aggr_cntxt
, evt
->tid
, evt
->st_seq_no
, evt
->win_sz
);
4735 ar6000_aggr_rcv_addba_resp_evt(AR_SOFTC_T
*ar
, WMI_ADDBA_RESP_EVENT
*evt
)
4737 A_PRINTF("ADDBA RESP. tid %d status %d, sz %d\n", evt
->tid
, evt
->status
, evt
->amsdu_sz
);
4738 if(evt
->status
== 0) {
4743 ar6000_aggr_rcv_delba_req_evt(AR_SOFTC_T
*ar
, WMI_DELBA_EVENT
*evt
)
4745 aggr_recv_delba_req_evt(ar
->aggr_cntxt
, evt
->tid
);
4749 void register_pal_cb(ar6k_pal_config_t
*palConfig_p
)
4751 ar6k_pal_config_g
= *palConfig_p
;
4755 ar6000_hci_event_rcv_evt(struct ar6_softc
*ar
, WMI_HCI_EVENT
*cmd
)
4762 size
= cmd
->evt_buf_sz
+ 4;
4763 osbuf
= A_NETBUF_ALLOC(size
);
4764 if (osbuf
== NULL
) {
4766 A_PRINTF("Error in allocating netbuf \n");
4770 A_NETBUF_PUT(osbuf
, size
);
4771 buf
= (u8
*)A_NETBUF_DATA(osbuf
);
4772 /* First 2-bytes carry HCI event/ACL data type
4773 * the next 2 are free
4775 *((short *)buf
) = WMI_HCI_EVENT_EVENTID
;
4777 A_MEMCPY(buf
, cmd
->buf
, cmd
->evt_buf_sz
);
4779 if(ar6k_pal_config_g
.fpar6k_pal_recv_pkt
)
4781 /* pass the cmd packet to PAL driver */
4782 if((*ar6k_pal_config_g
.fpar6k_pal_recv_pkt
)(ar
->hcipal_info
, osbuf
) == true)
4785 ar6000_deliver_frames_to_nw_stack(ar
->arNetDev
, osbuf
);
4787 A_PRINTF_LOG("HCI Event From PAL <-- \n");
4788 for(i
= 0; i
< cmd
->evt_buf_sz
; i
++) {
4789 A_PRINTF_LOG("0x%02x ", cmd
->buf
[i
]);
4795 A_PRINTF_LOG("==================================\n");
4800 ar6000_neighborReport_event(AR_SOFTC_T
*ar
, int numAps
, WMI_NEIGHBOR_INFO
*info
)
4802 #if WIRELESS_EXT >= 18
4803 struct iw_pmkid_cand
*pmkcand
;
4804 #else /* WIRELESS_EXT >= 18 */
4805 static const char *tag
= "PRE-AUTH";
4807 #endif /* WIRELESS_EXT >= 18 */
4809 union iwreq_data wrqu
;
4812 AR_DEBUG_PRINTF(ATH_DEBUG_WLAN_SCAN
,("AR6000 Neighbor Report Event\n"));
4813 for (i
=0; i
< numAps
; info
++, i
++) {
4814 AR_DEBUG_PRINTF(ATH_DEBUG_WLAN_SCAN
,("bssid %2.2x:%2.2x:%2.2x:%2.2x:%2.2x:%2.2x ",
4815 info
->bssid
[0], info
->bssid
[1], info
->bssid
[2],
4816 info
->bssid
[3], info
->bssid
[4], info
->bssid
[5]));
4817 if (info
->bssFlags
& WMI_PREAUTH_CAPABLE_BSS
) {
4818 AR_DEBUG_PRINTF(ATH_DEBUG_WLAN_SCAN
,("preauth-cap"));
4820 if (info
->bssFlags
& WMI_PMKID_VALID_BSS
) {
4821 AR_DEBUG_PRINTF(ATH_DEBUG_WLAN_SCAN
,(" pmkid-valid\n"));
4822 continue; /* we skip bss if the pmkid is already valid */
4824 AR_DEBUG_PRINTF(ATH_DEBUG_WLAN_SCAN
,("\n"));
4825 A_MEMZERO(&wrqu
, sizeof(wrqu
));
4826 #if WIRELESS_EXT >= 18
4827 pmkcand
= A_MALLOC_NOWAIT(sizeof(struct iw_pmkid_cand
));
4828 A_MEMZERO(pmkcand
, sizeof(struct iw_pmkid_cand
));
4830 pmkcand
->flags
= info
->bssFlags
;
4831 A_MEMCPY(pmkcand
->bssid
.sa_data
, info
->bssid
, ATH_MAC_LEN
);
4832 wrqu
.data
.length
= sizeof(struct iw_pmkid_cand
);
4833 wireless_send_event(ar
->arNetDev
, IWEVPMKIDCAND
, &wrqu
, (char *)pmkcand
);
4835 #else /* WIRELESS_EXT >= 18 */
4836 snprintf(buf
, sizeof(buf
), "%s%2.2x%2.2x%2.2x%2.2x%2.2x%2.2x%2.2x%2.2x",
4838 info
->bssid
[0], info
->bssid
[1], info
->bssid
[2],
4839 info
->bssid
[3], info
->bssid
[4], info
->bssid
[5],
4841 wrqu
.data
.length
= strlen(buf
);
4842 wireless_send_event(ar
->arNetDev
, IWEVCUSTOM
, &wrqu
, buf
);
4843 #endif /* WIRELESS_EXT >= 18 */
4848 ar6000_tkip_micerr_event(AR_SOFTC_T
*ar
, u8 keyid
, bool ismcast
)
4850 static const char *tag
= "MLME-MICHAELMICFAILURE.indication";
4852 union iwreq_data wrqu
;
4855 * For AP case, keyid will have aid of STA which sent pkt with
4856 * MIC error. Use this aid to get MAC & send it to hostapd.
4858 if (ar
->arNetworkType
== AP_NETWORK
) {
4859 sta_t
*s
= ieee80211_find_conn_for_aid(ar
, (keyid
>> 2));
4861 A_PRINTF("AP TKIP MIC error received from Invalid aid / STA not found =%d\n", keyid
);
4864 A_PRINTF("AP TKIP MIC error received from aid=%d\n", keyid
);
4865 snprintf(buf
,sizeof(buf
), "%s addr=%2.2x:%2.2x:%2.2x:%2.2x:%2.2x:%2.2x",
4866 tag
, s
->mac
[0],s
->mac
[1],s
->mac
[2],s
->mac
[3],s
->mac
[4],s
->mac
[5]);
4869 #ifdef ATH6K_CONFIG_CFG80211
4870 ar6k_cfg80211_tkip_micerr_event(ar
, keyid
, ismcast
);
4871 #endif /* ATH6K_CONFIG_CFG80211 */
4873 A_PRINTF("AR6000 TKIP MIC error received for keyid %d %scast\n",
4874 keyid
& 0x3, ismcast
? "multi": "uni");
4875 snprintf(buf
, sizeof(buf
), "%s(keyid=%d %sicast)", tag
, keyid
& 0x3,
4876 ismcast
? "mult" : "un");
4879 memset(&wrqu
, 0, sizeof(wrqu
));
4880 wrqu
.data
.length
= strlen(buf
);
4881 wireless_send_event(ar
->arNetDev
, IWEVCUSTOM
, &wrqu
, buf
);
4885 ar6000_scanComplete_event(AR_SOFTC_T
*ar
, int status
)
4888 #ifdef ATH6K_CONFIG_CFG80211
4889 ar6k_cfg80211_scanComplete_event(ar
, status
);
4890 #endif /* ATH6K_CONFIG_CFG80211 */
4892 if (!ar
->arUserBssFilter
) {
4893 wmi_bssfilter_cmd(ar
->arWmi
, NONE_BSS_FILTER
, 0);
4895 if (ar
->scan_triggered
) {
4897 union iwreq_data wrqu
;
4898 A_MEMZERO(&wrqu
, sizeof(wrqu
));
4899 wireless_send_event(ar
->arNetDev
, SIOCGIWSCAN
, &wrqu
, NULL
);
4901 ar
->scan_triggered
= 0;
4904 AR_DEBUG_PRINTF(ATH_DEBUG_WLAN_SCAN
,( "AR6000 scan complete: %d\n", status
));
4908 ar6000_targetStats_event(AR_SOFTC_T
*ar
, u8
*ptr
, u32 len
)
4912 if(ar
->arNetworkType
== AP_NETWORK
) {
4913 WMI_AP_MODE_STAT
*p
= (WMI_AP_MODE_STAT
*)ptr
;
4914 WMI_AP_MODE_STAT
*ap
= &ar
->arAPStats
;
4916 if (len
< sizeof(*p
)) {
4920 for(ac
=0;ac
<AP_MAX_NUM_STA
;ac
++) {
4921 ap
->sta
[ac
].tx_bytes
+= p
->sta
[ac
].tx_bytes
;
4922 ap
->sta
[ac
].tx_pkts
+= p
->sta
[ac
].tx_pkts
;
4923 ap
->sta
[ac
].tx_error
+= p
->sta
[ac
].tx_error
;
4924 ap
->sta
[ac
].tx_discard
+= p
->sta
[ac
].tx_discard
;
4925 ap
->sta
[ac
].rx_bytes
+= p
->sta
[ac
].rx_bytes
;
4926 ap
->sta
[ac
].rx_pkts
+= p
->sta
[ac
].rx_pkts
;
4927 ap
->sta
[ac
].rx_error
+= p
->sta
[ac
].rx_error
;
4928 ap
->sta
[ac
].rx_discard
+= p
->sta
[ac
].rx_discard
;
4932 WMI_TARGET_STATS
*pTarget
= (WMI_TARGET_STATS
*)ptr
;
4933 TARGET_STATS
*pStats
= &ar
->arTargetStats
;
4935 if (len
< sizeof(*pTarget
)) {
4939 // Update the RSSI of the connected bss.
4940 if (ar
->arConnected
) {
4941 bss_t
*pConnBss
= NULL
;
4943 pConnBss
= wmi_find_node(ar
->arWmi
,ar
->arBssid
);
4946 pConnBss
->ni_rssi
= pTarget
->cservStats
.cs_aveBeacon_rssi
;
4947 pConnBss
->ni_snr
= pTarget
->cservStats
.cs_aveBeacon_snr
;
4948 wmi_node_return(ar
->arWmi
, pConnBss
);
4952 AR_DEBUG_PRINTF(ATH_DEBUG_INFO
,("AR6000 updating target stats\n"));
4953 pStats
->tx_packets
+= pTarget
->txrxStats
.tx_stats
.tx_packets
;
4954 pStats
->tx_bytes
+= pTarget
->txrxStats
.tx_stats
.tx_bytes
;
4955 pStats
->tx_unicast_pkts
+= pTarget
->txrxStats
.tx_stats
.tx_unicast_pkts
;
4956 pStats
->tx_unicast_bytes
+= pTarget
->txrxStats
.tx_stats
.tx_unicast_bytes
;
4957 pStats
->tx_multicast_pkts
+= pTarget
->txrxStats
.tx_stats
.tx_multicast_pkts
;
4958 pStats
->tx_multicast_bytes
+= pTarget
->txrxStats
.tx_stats
.tx_multicast_bytes
;
4959 pStats
->tx_broadcast_pkts
+= pTarget
->txrxStats
.tx_stats
.tx_broadcast_pkts
;
4960 pStats
->tx_broadcast_bytes
+= pTarget
->txrxStats
.tx_stats
.tx_broadcast_bytes
;
4961 pStats
->tx_rts_success_cnt
+= pTarget
->txrxStats
.tx_stats
.tx_rts_success_cnt
;
4962 for(ac
= 0; ac
< WMM_NUM_AC
; ac
++)
4963 pStats
->tx_packet_per_ac
[ac
] += pTarget
->txrxStats
.tx_stats
.tx_packet_per_ac
[ac
];
4964 pStats
->tx_errors
+= pTarget
->txrxStats
.tx_stats
.tx_errors
;
4965 pStats
->tx_failed_cnt
+= pTarget
->txrxStats
.tx_stats
.tx_failed_cnt
;
4966 pStats
->tx_retry_cnt
+= pTarget
->txrxStats
.tx_stats
.tx_retry_cnt
;
4967 pStats
->tx_mult_retry_cnt
+= pTarget
->txrxStats
.tx_stats
.tx_mult_retry_cnt
;
4968 pStats
->tx_rts_fail_cnt
+= pTarget
->txrxStats
.tx_stats
.tx_rts_fail_cnt
;
4969 pStats
->tx_unicast_rate
= wmi_get_rate(pTarget
->txrxStats
.tx_stats
.tx_unicast_rate
);
4971 pStats
->rx_packets
+= pTarget
->txrxStats
.rx_stats
.rx_packets
;
4972 pStats
->rx_bytes
+= pTarget
->txrxStats
.rx_stats
.rx_bytes
;
4973 pStats
->rx_unicast_pkts
+= pTarget
->txrxStats
.rx_stats
.rx_unicast_pkts
;
4974 pStats
->rx_unicast_bytes
+= pTarget
->txrxStats
.rx_stats
.rx_unicast_bytes
;
4975 pStats
->rx_multicast_pkts
+= pTarget
->txrxStats
.rx_stats
.rx_multicast_pkts
;
4976 pStats
->rx_multicast_bytes
+= pTarget
->txrxStats
.rx_stats
.rx_multicast_bytes
;
4977 pStats
->rx_broadcast_pkts
+= pTarget
->txrxStats
.rx_stats
.rx_broadcast_pkts
;
4978 pStats
->rx_broadcast_bytes
+= pTarget
->txrxStats
.rx_stats
.rx_broadcast_bytes
;
4979 pStats
->rx_fragment_pkt
+= pTarget
->txrxStats
.rx_stats
.rx_fragment_pkt
;
4980 pStats
->rx_errors
+= pTarget
->txrxStats
.rx_stats
.rx_errors
;
4981 pStats
->rx_crcerr
+= pTarget
->txrxStats
.rx_stats
.rx_crcerr
;
4982 pStats
->rx_key_cache_miss
+= pTarget
->txrxStats
.rx_stats
.rx_key_cache_miss
;
4983 pStats
->rx_decrypt_err
+= pTarget
->txrxStats
.rx_stats
.rx_decrypt_err
;
4984 pStats
->rx_duplicate_frames
+= pTarget
->txrxStats
.rx_stats
.rx_duplicate_frames
;
4985 pStats
->rx_unicast_rate
= wmi_get_rate(pTarget
->txrxStats
.rx_stats
.rx_unicast_rate
);
4988 pStats
->tkip_local_mic_failure
4989 += pTarget
->txrxStats
.tkipCcmpStats
.tkip_local_mic_failure
;
4990 pStats
->tkip_counter_measures_invoked
4991 += pTarget
->txrxStats
.tkipCcmpStats
.tkip_counter_measures_invoked
;
4992 pStats
->tkip_replays
+= pTarget
->txrxStats
.tkipCcmpStats
.tkip_replays
;
4993 pStats
->tkip_format_errors
+= pTarget
->txrxStats
.tkipCcmpStats
.tkip_format_errors
;
4994 pStats
->ccmp_format_errors
+= pTarget
->txrxStats
.tkipCcmpStats
.ccmp_format_errors
;
4995 pStats
->ccmp_replays
+= pTarget
->txrxStats
.tkipCcmpStats
.ccmp_replays
;
4997 pStats
->power_save_failure_cnt
+= pTarget
->pmStats
.power_save_failure_cnt
;
4998 pStats
->noise_floor_calibation
= pTarget
->noise_floor_calibation
;
5000 pStats
->cs_bmiss_cnt
+= pTarget
->cservStats
.cs_bmiss_cnt
;
5001 pStats
->cs_lowRssi_cnt
+= pTarget
->cservStats
.cs_lowRssi_cnt
;
5002 pStats
->cs_connect_cnt
+= pTarget
->cservStats
.cs_connect_cnt
;
5003 pStats
->cs_disconnect_cnt
+= pTarget
->cservStats
.cs_disconnect_cnt
;
5004 pStats
->cs_aveBeacon_snr
= pTarget
->cservStats
.cs_aveBeacon_snr
;
5005 pStats
->cs_aveBeacon_rssi
= pTarget
->cservStats
.cs_aveBeacon_rssi
;
5007 if (enablerssicompensation
) {
5008 pStats
->cs_aveBeacon_rssi
=
5009 rssi_compensation_calc(ar
, pStats
->cs_aveBeacon_rssi
);
5011 pStats
->cs_lastRoam_msec
= pTarget
->cservStats
.cs_lastRoam_msec
;
5012 pStats
->cs_snr
= pTarget
->cservStats
.cs_snr
;
5013 pStats
->cs_rssi
= pTarget
->cservStats
.cs_rssi
;
5015 pStats
->lq_val
= pTarget
->lqVal
;
5017 pStats
->wow_num_pkts_dropped
+= pTarget
->wowStats
.wow_num_pkts_dropped
;
5018 pStats
->wow_num_host_pkt_wakeups
+= pTarget
->wowStats
.wow_num_host_pkt_wakeups
;
5019 pStats
->wow_num_host_event_wakeups
+= pTarget
->wowStats
.wow_num_host_event_wakeups
;
5020 pStats
->wow_num_events_discarded
+= pTarget
->wowStats
.wow_num_events_discarded
;
5021 pStats
->arp_received
+= pTarget
->arpStats
.arp_received
;
5022 pStats
->arp_matched
+= pTarget
->arpStats
.arp_matched
;
5023 pStats
->arp_replied
+= pTarget
->arpStats
.arp_replied
;
5025 if (ar
->statsUpdatePending
) {
5026 ar
->statsUpdatePending
= false;
5033 ar6000_rssiThreshold_event(AR_SOFTC_T
*ar
, WMI_RSSI_THRESHOLD_VAL newThreshold
, A_INT16 rssi
)
5035 USER_RSSI_THOLD userRssiThold
;
5037 rssi
= rssi
+ SIGNAL_QUALITY_NOISE_FLOOR
;
5039 if (enablerssicompensation
) {
5040 rssi
= rssi_compensation_calc(ar
, rssi
);
5043 /* Send an event to the app */
5044 userRssiThold
.tag
= ar
->rssi_map
[newThreshold
].tag
;
5045 userRssiThold
.rssi
= rssi
;
5046 A_PRINTF("rssi Threshold range = %d tag = %d rssi = %d\n", newThreshold
,
5047 userRssiThold
.tag
, userRssiThold
.rssi
);
5049 ar6000_send_event_to_app(ar
, WMI_RSSI_THRESHOLD_EVENTID
,(u8
*)&userRssiThold
, sizeof(USER_RSSI_THOLD
));
5054 ar6000_hbChallengeResp_event(AR_SOFTC_T
*ar
, u32 cookie
, u32 source
)
5056 if (source
== APP_HB_CHALLENGE
) {
5057 /* Report it to the app in case it wants a positive acknowledgement */
5058 ar6000_send_event_to_app(ar
, WMIX_HB_CHALLENGE_RESP_EVENTID
,
5059 (u8
*)&cookie
, sizeof(cookie
));
5061 /* This would ignore the replys that come in after their due time */
5062 if (cookie
== ar
->arHBChallengeResp
.seqNum
) {
5063 ar
->arHBChallengeResp
.outstanding
= false;
5070 ar6000_reportError_event(AR_SOFTC_T
*ar
, WMI_TARGET_ERROR_VAL errorVal
)
5072 static const char * const errString
[] = {
5073 [WMI_TARGET_PM_ERR_FAIL
] "WMI_TARGET_PM_ERR_FAIL",
5074 [WMI_TARGET_KEY_NOT_FOUND
] "WMI_TARGET_KEY_NOT_FOUND",
5075 [WMI_TARGET_DECRYPTION_ERR
] "WMI_TARGET_DECRYPTION_ERR",
5076 [WMI_TARGET_BMISS
] "WMI_TARGET_BMISS",
5077 [WMI_PSDISABLE_NODE_JOIN
] "WMI_PSDISABLE_NODE_JOIN"
5080 A_PRINTF("AR6000 Error on Target. Error = 0x%x\n", errorVal
);
5082 /* One error is reported at a time, and errorval is a bitmask */
5083 if(errorVal
& (errorVal
- 1))
5086 A_PRINTF("AR6000 Error type = ");
5089 case WMI_TARGET_PM_ERR_FAIL
:
5090 case WMI_TARGET_KEY_NOT_FOUND
:
5091 case WMI_TARGET_DECRYPTION_ERR
:
5092 case WMI_TARGET_BMISS
:
5093 case WMI_PSDISABLE_NODE_JOIN
:
5094 A_PRINTF("%s\n", errString
[errorVal
]);
5097 A_PRINTF("INVALID\n");
5105 ar6000_cac_event(AR_SOFTC_T
*ar
, u8 ac
, u8 cacIndication
,
5106 u8 statusCode
, u8
*tspecSuggestion
)
5108 WMM_TSPEC_IE
*tspecIe
;
5111 * This is the TSPEC IE suggestion from AP.
5112 * Suggestion provided by AP under some error
5113 * cases, could be helpful for the host app.
5114 * Check documentation.
5116 tspecIe
= (WMM_TSPEC_IE
*)tspecSuggestion
;
5119 * What do we do, if we get TSPEC rejection? One thought
5120 * that comes to mind is implictly delete the pstream...
5122 A_PRINTF("AR6000 CAC notification. "
5123 "AC = %d, cacIndication = 0x%x, statusCode = 0x%x\n",
5124 ac
, cacIndication
, statusCode
);
5128 ar6000_channel_change_event(AR_SOFTC_T
*ar
, u16 oldChannel
,
5131 A_PRINTF("Channel Change notification\nOld Channel: %d, New Channel: %d\n",
5132 oldChannel
, newChannel
);
5135 #define AR6000_PRINT_BSSID(_pBss) do { \
5136 A_PRINTF("%2.2x:%2.2x:%2.2x:%2.2x:%2.2x:%2.2x ",\
5137 (_pBss)[0],(_pBss)[1],(_pBss)[2],(_pBss)[3],\
5138 (_pBss)[4],(_pBss)[5]); \
5142 ar6000_roam_tbl_event(AR_SOFTC_T
*ar
, WMI_TARGET_ROAM_TBL
*pTbl
)
5146 A_PRINTF("ROAM TABLE NO OF ENTRIES is %d ROAM MODE is %d\n",
5147 pTbl
->numEntries
, pTbl
->roamMode
);
5148 for (i
= 0; i
< pTbl
->numEntries
; i
++) {
5149 A_PRINTF("[%d]bssid %2.2x:%2.2x:%2.2x:%2.2x:%2.2x:%2.2x ", i
,
5150 pTbl
->bssRoamInfo
[i
].bssid
[0], pTbl
->bssRoamInfo
[i
].bssid
[1],
5151 pTbl
->bssRoamInfo
[i
].bssid
[2],
5152 pTbl
->bssRoamInfo
[i
].bssid
[3],
5153 pTbl
->bssRoamInfo
[i
].bssid
[4],
5154 pTbl
->bssRoamInfo
[i
].bssid
[5]);
5155 A_PRINTF("RSSI %d RSSIDT %d LAST RSSI %d UTIL %d ROAM_UTIL %d"
5157 pTbl
->bssRoamInfo
[i
].rssi
,
5158 pTbl
->bssRoamInfo
[i
].rssidt
,
5159 pTbl
->bssRoamInfo
[i
].last_rssi
,
5160 pTbl
->bssRoamInfo
[i
].util
,
5161 pTbl
->bssRoamInfo
[i
].roam_util
,
5162 pTbl
->bssRoamInfo
[i
].bias
);
5167 ar6000_wow_list_event(struct ar6_softc
*ar
, u8 num_filters
, WMI_GET_WOW_LIST_REPLY
*wow_reply
)
5171 /*Each event now contains exactly one filter, see bug 26613*/
5172 A_PRINTF("WOW pattern %d of %d patterns\n", wow_reply
->this_filter_num
, wow_reply
->num_filters
);
5173 A_PRINTF("wow mode = %s host mode = %s\n",
5174 (wow_reply
->wow_mode
== 0? "disabled":"enabled"),
5175 (wow_reply
->host_mode
== 1 ? "awake":"asleep"));
5178 /*If there are no patterns, the reply will only contain generic
5179 WoW information. Pattern information will exist only if there are
5180 patterns present. Bug 26716*/
5182 /* If this event contains pattern information, display it*/
5183 if (wow_reply
->this_filter_num
) {
5185 A_PRINTF("id=%d size=%d offset=%d\n",
5186 wow_reply
->wow_filters
[i
].wow_filter_id
,
5187 wow_reply
->wow_filters
[i
].wow_filter_size
,
5188 wow_reply
->wow_filters
[i
].wow_filter_offset
);
5189 A_PRINTF("wow pattern = ");
5190 for (j
=0; j
< wow_reply
->wow_filters
[i
].wow_filter_size
; j
++) {
5191 A_PRINTF("%2.2x",wow_reply
->wow_filters
[i
].wow_filter_pattern
[j
]);
5194 A_PRINTF("\nwow mask = ");
5195 for (j
=0; j
< wow_reply
->wow_filters
[i
].wow_filter_size
; j
++) {
5196 A_PRINTF("%2.2x",wow_reply
->wow_filters
[i
].wow_filter_mask
[j
]);
5203 * Report the Roaming related data collected on the target
5206 ar6000_display_roam_time(WMI_TARGET_ROAM_TIME
*p
)
5208 A_PRINTF("Disconnect Data : BSSID: ");
5209 AR6000_PRINT_BSSID(p
->disassoc_bssid
);
5210 A_PRINTF(" RSSI %d DISASSOC Time %d NO_TXRX_TIME %d\n",
5211 p
->disassoc_bss_rssi
,p
->disassoc_time
,
5213 A_PRINTF("Connect Data: BSSID: ");
5214 AR6000_PRINT_BSSID(p
->assoc_bssid
);
5215 A_PRINTF(" RSSI %d ASSOC Time %d TXRX_TIME %d\n",
5216 p
->assoc_bss_rssi
,p
->assoc_time
,
5217 p
->allow_txrx_time
);
5221 ar6000_roam_data_event(AR_SOFTC_T
*ar
, WMI_TARGET_ROAM_DATA
*p
)
5223 switch (p
->roamDataType
) {
5224 case ROAM_DATA_TIME
:
5225 ar6000_display_roam_time(&p
->u
.roamTime
);
5233 ar6000_bssInfo_event_rx(AR_SOFTC_T
*ar
, u8
*datap
, int len
)
5235 struct sk_buff
*skb
;
5236 WMI_BSS_INFO_HDR
*bih
= (WMI_BSS_INFO_HDR
*)datap
;
5239 if (!ar
->arMgmtFilter
) {
5242 if (((ar
->arMgmtFilter
& IEEE80211_FILTER_TYPE_BEACON
) &&
5243 (bih
->frameType
!= BEACON_FTYPE
)) ||
5244 ((ar
->arMgmtFilter
& IEEE80211_FILTER_TYPE_PROBE_RESP
) &&
5245 (bih
->frameType
!= PROBERESP_FTYPE
)))
5250 if ((skb
= A_NETBUF_ALLOC_RAW(len
)) != NULL
) {
5252 A_NETBUF_PUT(skb
, len
);
5253 A_MEMCPY(A_NETBUF_DATA(skb
), datap
, len
);
5254 skb
->dev
= ar
->arNetDev
;
5255 A_MEMCPY(skb_mac_header(skb
), A_NETBUF_DATA(skb
), 6);
5256 skb
->ip_summed
= CHECKSUM_NONE
;
5257 skb
->pkt_type
= PACKET_OTHERHOST
;
5258 skb
->protocol
= __constant_htons(0x0019);
5266 ar6000_control_tx(void *devt
, void *osbuf
, HTC_ENDPOINT_ID eid
)
5268 AR_SOFTC_T
*ar
= (AR_SOFTC_T
*)devt
;
5270 struct ar_cookie
*cookie
= NULL
;
5273 if (ar
->arWowState
!= WLAN_WOW_STATE_NONE
) {
5274 A_NETBUF_FREE(osbuf
);
5277 #endif /* CONFIG_PM */
5278 /* take lock to protect ar6000_alloc_cookie() */
5279 AR6000_SPIN_LOCK(&ar
->arLock
, 0);
5283 AR_DEBUG_PRINTF(ATH_DEBUG_WLAN_TX
,("ar_contrstatus = ol_tx: skb=0x%lx, len=0x%x eid =%d\n",
5284 (unsigned long)osbuf
, A_NETBUF_LEN(osbuf
), eid
));
5286 if (ar
->arWMIControlEpFull
&& (eid
== ar
->arControlEp
)) {
5287 /* control endpoint is full, don't allocate resources, we
5288 * are just going to drop this packet */
5290 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
,(" WMI Control EP full, dropping packet : 0x%lX, len:%d \n",
5291 (unsigned long)osbuf
, A_NETBUF_LEN(osbuf
)));
5293 cookie
= ar6000_alloc_cookie(ar
);
5296 if (cookie
== NULL
) {
5297 status
= A_NO_MEMORY
;
5302 A_PRINTF("WMI cmd send, msgNo %d :", wmiSendCmdNum
);
5303 for(i
= 0; i
< a_netbuf_to_len(osbuf
); i
++)
5304 A_PRINTF("%x ", ((u8
*)a_netbuf_to_data(osbuf
))[i
]);
5312 if (cookie
!= NULL
) {
5313 /* got a structure to send it out on */
5314 ar
->arTxPending
[eid
]++;
5316 if (eid
!= ar
->arControlEp
) {
5317 ar
->arTotalTxDataPending
++;
5321 AR6000_SPIN_UNLOCK(&ar
->arLock
, 0);
5323 if (cookie
!= NULL
) {
5324 cookie
->arc_bp
[0] = (unsigned long)osbuf
;
5325 cookie
->arc_bp
[1] = 0;
5326 SET_HTC_PACKET_INFO_TX(&cookie
->HtcPkt
,
5328 A_NETBUF_DATA(osbuf
),
5329 A_NETBUF_LEN(osbuf
),
5331 AR6K_CONTROL_PKT_TAG
);
5332 /* this interface is asynchronous, if there is an error, cleanup will happen in the
5333 * TX completion callback */
5334 HTCSendPkt(ar
->arHtcTarget
, &cookie
->HtcPkt
);
5338 if (status
!= A_OK
) {
5339 A_NETBUF_FREE(osbuf
);
5344 /* indicate tx activity or inactivity on a WMI stream */
5345 void ar6000_indicate_tx_activity(void *devt
, u8 TrafficClass
, bool Active
)
5347 AR_SOFTC_T
*ar
= (AR_SOFTC_T
*)devt
;
5348 HTC_ENDPOINT_ID eid
;
5351 if (ar
->arWmiEnabled
) {
5352 eid
= arAc2EndpointID(ar
, TrafficClass
);
5354 AR6000_SPIN_LOCK(&ar
->arLock
, 0);
5356 ar
->arAcStreamActive
[TrafficClass
] = Active
;
5359 /* when a stream goes active, keep track of the active stream with the highest priority */
5361 if (ar
->arAcStreamPriMap
[TrafficClass
] > ar
->arHiAcStreamActivePri
) {
5362 /* set the new highest active priority */
5363 ar
->arHiAcStreamActivePri
= ar
->arAcStreamPriMap
[TrafficClass
];
5367 /* when a stream goes inactive, we may have to search for the next active stream
5368 * that is the highest priority */
5370 if (ar
->arHiAcStreamActivePri
== ar
->arAcStreamPriMap
[TrafficClass
]) {
5372 /* the highest priority stream just went inactive */
5374 /* reset and search for the "next" highest "active" priority stream */
5375 ar
->arHiAcStreamActivePri
= 0;
5376 for (i
= 0; i
< WMM_NUM_AC
; i
++) {
5377 if (ar
->arAcStreamActive
[i
]) {
5378 if (ar
->arAcStreamPriMap
[i
] > ar
->arHiAcStreamActivePri
) {
5379 /* set the new highest active priority */
5380 ar
->arHiAcStreamActivePri
= ar
->arAcStreamPriMap
[i
];
5387 AR6000_SPIN_UNLOCK(&ar
->arLock
, 0);
5390 /* for mbox ping testing, the traffic class is mapped directly as a stream ID,
5391 * see handling of AR6000_XIOCTL_TRAFFIC_ACTIVITY_CHANGE in ioctl.c
5392 * convert the stream ID to a endpoint */
5393 eid
= arAc2EndpointID(ar
, TrafficClass
);
5396 /* notify HTC, this may cause credit distribution changes */
5398 HTCIndicateActivityChange(ar
->arHtcTarget
,
5405 ar6000_btcoex_config_event(struct ar6_softc
*ar
, u8
*ptr
, u32 len
)
5408 WMI_BTCOEX_CONFIG_EVENT
*pBtcoexConfig
= (WMI_BTCOEX_CONFIG_EVENT
*)ptr
;
5409 WMI_BTCOEX_CONFIG_EVENT
*pArbtcoexConfig
=&ar
->arBtcoexConfig
;
5411 AR_DEBUG_PRINTF(ATH_DEBUG_INFO
,("AR6000 BTCOEX CONFIG EVENT \n"));
5413 A_PRINTF("received config event\n");
5414 pArbtcoexConfig
->btProfileType
= pBtcoexConfig
->btProfileType
;
5415 pArbtcoexConfig
->linkId
= pBtcoexConfig
->linkId
;
5417 switch (pBtcoexConfig
->btProfileType
) {
5418 case WMI_BTCOEX_BT_PROFILE_SCO
:
5419 A_MEMCPY(&pArbtcoexConfig
->info
.scoConfigCmd
, &pBtcoexConfig
->info
.scoConfigCmd
,
5420 sizeof(WMI_SET_BTCOEX_SCO_CONFIG_CMD
));
5422 case WMI_BTCOEX_BT_PROFILE_A2DP
:
5423 A_MEMCPY(&pArbtcoexConfig
->info
.a2dpConfigCmd
, &pBtcoexConfig
->info
.a2dpConfigCmd
,
5424 sizeof(WMI_SET_BTCOEX_A2DP_CONFIG_CMD
));
5426 case WMI_BTCOEX_BT_PROFILE_ACLCOEX
:
5427 A_MEMCPY(&pArbtcoexConfig
->info
.aclcoexConfig
, &pBtcoexConfig
->info
.aclcoexConfig
,
5428 sizeof(WMI_SET_BTCOEX_ACLCOEX_CONFIG_CMD
));
5430 case WMI_BTCOEX_BT_PROFILE_INQUIRY_PAGE
:
5431 A_MEMCPY(&pArbtcoexConfig
->info
.btinquiryPageConfigCmd
, &pBtcoexConfig
->info
.btinquiryPageConfigCmd
,
5432 sizeof(WMI_SET_BTCOEX_ACLCOEX_CONFIG_CMD
));
5435 if (ar
->statsUpdatePending
) {
5436 ar
->statsUpdatePending
= false;
5442 ar6000_btcoex_stats_event(struct ar6_softc
*ar
, u8
*ptr
, u32 len
)
5444 WMI_BTCOEX_STATS_EVENT
*pBtcoexStats
= (WMI_BTCOEX_STATS_EVENT
*)ptr
;
5446 AR_DEBUG_PRINTF(ATH_DEBUG_INFO
,("AR6000 BTCOEX CONFIG EVENT \n"));
5448 A_MEMCPY(&ar
->arBtcoexStats
, pBtcoexStats
, sizeof(WMI_BTCOEX_STATS_EVENT
));
5450 if (ar
->statsUpdatePending
) {
5451 ar
->statsUpdatePending
= false;
5456 module_init(ar6000_init_module
);
5457 module_exit(ar6000_cleanup_module
);
5459 /* Init cookie queue */
5461 ar6000_cookie_init(AR_SOFTC_T
*ar
)
5465 ar
->arCookieList
= NULL
;
5466 ar
->arCookieCount
= 0;
5468 A_MEMZERO(s_ar_cookie_mem
, sizeof(s_ar_cookie_mem
));
5470 for (i
= 0; i
< MAX_COOKIE_NUM
; i
++) {
5471 ar6000_free_cookie(ar
, &s_ar_cookie_mem
[i
]);
5475 /* cleanup cookie queue */
5477 ar6000_cookie_cleanup(AR_SOFTC_T
*ar
)
5479 /* It is gone .... */
5480 ar
->arCookieList
= NULL
;
5481 ar
->arCookieCount
= 0;
5484 /* Init cookie queue */
5486 ar6000_free_cookie(AR_SOFTC_T
*ar
, struct ar_cookie
* cookie
)
5489 A_ASSERT(ar
!= NULL
);
5490 A_ASSERT(cookie
!= NULL
);
5492 cookie
->arc_list_next
= ar
->arCookieList
;
5493 ar
->arCookieList
= cookie
;
5494 ar
->arCookieCount
++;
5497 /* cleanup cookie queue */
5498 static struct ar_cookie
*
5499 ar6000_alloc_cookie(AR_SOFTC_T
*ar
)
5501 struct ar_cookie
*cookie
;
5503 cookie
= ar
->arCookieList
;
5506 ar
->arCookieList
= cookie
->arc_list_next
;
5507 ar
->arCookieCount
--;
5513 #ifdef SEND_EVENT_TO_APP
5515 * This function is used to send event which come from taget to
5516 * the application. The buf which send to application is include
5517 * the event ID and event content.
5519 #define EVENT_ID_LEN 2
5520 void ar6000_send_event_to_app(AR_SOFTC_T
*ar
, u16 eventId
,
5524 #if (WIRELESS_EXT >= 15)
5526 /* note: IWEVCUSTOM only exists in wireless extensions after version 15 */
5530 union iwreq_data wrqu
;
5532 size
= len
+ EVENT_ID_LEN
;
5534 if (size
> IW_CUSTOM_MAX
) {
5535 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
,("WMI event ID : 0x%4.4X, len = %d too big for IWEVCUSTOM (max=%d) \n",
5536 eventId
, size
, IW_CUSTOM_MAX
));
5540 buf
= A_MALLOC_NOWAIT(size
);
5542 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
,("%s: failed to allocate %d bytes\n", __func__
, size
));
5546 A_MEMZERO(buf
, size
);
5547 A_MEMCPY(buf
, &eventId
, EVENT_ID_LEN
);
5548 A_MEMCPY(buf
+EVENT_ID_LEN
, datap
, len
);
5550 //AR_DEBUG_PRINTF(ATH_DEBUG_INFO,("event ID = %d,len = %d\n",*(u16 *)buf, size));
5551 A_MEMZERO(&wrqu
, sizeof(wrqu
));
5552 wrqu
.data
.length
= size
;
5553 wireless_send_event(ar
->arNetDev
, IWEVCUSTOM
, &wrqu
, buf
);
5561 * This function is used to send events larger than 256 bytes
5562 * to the application. The buf which is sent to application
5563 * includes the event ID and event content.
5565 void ar6000_send_generic_event_to_app(AR_SOFTC_T
*ar
, u16 eventId
,
5569 #if (WIRELESS_EXT >= 18)
5571 /* IWEVGENIE exists in wireless extensions version 18 onwards */
5575 union iwreq_data wrqu
;
5577 size
= len
+ EVENT_ID_LEN
;
5579 if (size
> IW_GENERIC_IE_MAX
) {
5580 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
,("WMI event ID : 0x%4.4X, len = %d too big for IWEVGENIE (max=%d) \n",
5581 eventId
, size
, IW_GENERIC_IE_MAX
));
5585 buf
= A_MALLOC_NOWAIT(size
);
5587 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
,("%s: failed to allocate %d bytes\n", __func__
, size
));
5591 A_MEMZERO(buf
, size
);
5592 A_MEMCPY(buf
, &eventId
, EVENT_ID_LEN
);
5593 A_MEMCPY(buf
+EVENT_ID_LEN
, datap
, len
);
5595 A_MEMZERO(&wrqu
, sizeof(wrqu
));
5596 wrqu
.data
.length
= size
;
5597 wireless_send_event(ar
->arNetDev
, IWEVGENIE
, &wrqu
, buf
);
5601 #endif /* (WIRELESS_EXT >= 18) */
5604 #endif /* SEND_EVENT_TO_APP */
5608 ar6000_tx_retry_err_event(void *devt
)
5610 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
,("Tx retries reach maximum!\n"));
5614 ar6000_snrThresholdEvent_rx(void *devt
, WMI_SNR_THRESHOLD_VAL newThreshold
, u8 snr
)
5616 WMI_SNR_THRESHOLD_EVENT event
;
5617 AR_SOFTC_T
*ar
= (AR_SOFTC_T
*)devt
;
5619 event
.range
= newThreshold
;
5622 ar6000_send_event_to_app(ar
, WMI_SNR_THRESHOLD_EVENTID
, (u8
*)&event
,
5623 sizeof(WMI_SNR_THRESHOLD_EVENT
));
5627 ar6000_lqThresholdEvent_rx(void *devt
, WMI_LQ_THRESHOLD_VAL newThreshold
, u8 lq
)
5629 AR_DEBUG_PRINTF(ATH_DEBUG_INFO
,("lq threshold range %d, lq %d\n", newThreshold
, lq
));
5634 u32
a_copy_to_user(void *to
, const void *from
, u32 n
)
5636 return(copy_to_user(to
, from
, n
));
5639 u32
a_copy_from_user(void *to
, const void *from
, u32 n
)
5641 return(copy_from_user(to
, from
, n
));
5646 ar6000_get_driver_cfg(struct net_device
*dev
,
5655 case AR6000_DRIVER_CFG_GET_WLANNODECACHING
:
5656 *((u32
*)result
) = wlanNodeCaching
;
5658 case AR6000_DRIVER_CFG_LOG_RAW_WMI_MSGS
:
5659 *((u32
*)result
) = logWmiRawMsgs
;
5670 ar6000_keepalive_rx(void *devt
, u8 configured
)
5672 AR_SOFTC_T
*ar
= (AR_SOFTC_T
*)devt
;
5674 ar
->arKeepaliveConfigured
= configured
;
5679 ar6000_pmkid_list_event(void *devt
, u8 numPMKID
, WMI_PMKID
*pmkidList
,
5684 A_PRINTF("Number of Cached PMKIDs is %d\n", numPMKID
);
5686 for (i
= 0; i
< numPMKID
; i
++) {
5687 A_PRINTF("\nBSSID %d ", i
);
5688 for (j
= 0; j
< ATH_MAC_LEN
; j
++) {
5689 A_PRINTF("%2.2x", bssidList
[j
]);
5691 bssidList
+= (ATH_MAC_LEN
+ WMI_PMKID_LEN
);
5692 A_PRINTF("\nPMKID %d ", i
);
5693 for (j
= 0; j
< WMI_PMKID_LEN
; j
++) {
5694 A_PRINTF("%2.2x", pmkidList
->pmkid
[j
]);
5696 pmkidList
= (WMI_PMKID
*)((u8
*)pmkidList
+ ATH_MAC_LEN
+
5701 void ar6000_pspoll_event(AR_SOFTC_T
*ar
,u8 aid
)
5704 bool isPsqEmpty
= false;
5706 conn
= ieee80211_find_conn_for_aid(ar
, aid
);
5708 /* If the PS q for this STA is not empty, dequeue and send a pkt from
5709 * the head of the q. Also update the More data bit in the WMI_DATA_HDR
5710 * if there are more pkts for this STA in the PS q. If there are no more
5711 * pkts for this STA, update the PVB for this STA.
5713 A_MUTEX_LOCK(&conn
->psqLock
);
5714 isPsqEmpty
= A_NETBUF_QUEUE_EMPTY(&conn
->psq
);
5715 A_MUTEX_UNLOCK(&conn
->psqLock
);
5718 /* TODO:No buffered pkts for this STA. Send out a NULL data frame */
5720 struct sk_buff
*skb
= NULL
;
5722 A_MUTEX_LOCK(&conn
->psqLock
);
5723 skb
= A_NETBUF_DEQUEUE(&conn
->psq
);
5724 A_MUTEX_UNLOCK(&conn
->psqLock
);
5725 /* Set the STA flag to PSPolled, so that the frame will go out */
5726 STA_SET_PS_POLLED(conn
);
5727 ar6000_data_tx(skb
, ar
->arNetDev
);
5728 STA_CLR_PS_POLLED(conn
);
5730 /* Clear the PVB for this STA if the queue has become empty */
5731 A_MUTEX_LOCK(&conn
->psqLock
);
5732 isPsqEmpty
= A_NETBUF_QUEUE_EMPTY(&conn
->psq
);
5733 A_MUTEX_UNLOCK(&conn
->psqLock
);
5736 wmi_set_pvb_cmd(ar
->arWmi
, conn
->aid
, 0);
5741 void ar6000_dtimexpiry_event(AR_SOFTC_T
*ar
)
5743 bool isMcastQueued
= false;
5744 struct sk_buff
*skb
= NULL
;
5746 /* If there are no associated STAs, ignore the DTIM expiry event.
5747 * There can be potential race conditions where the last associated
5748 * STA may disconnect & before the host could clear the 'Indicate DTIM'
5749 * request to the firmware, the firmware would have just indicated a DTIM
5750 * expiry event. The race is between 'clear DTIM expiry cmd' going
5751 * from the host to the firmware & the DTIM expiry event happening from
5752 * the firmware to the host.
5754 if (ar
->sta_list_index
== 0) {
5758 A_MUTEX_LOCK(&ar
->mcastpsqLock
);
5759 isMcastQueued
= A_NETBUF_QUEUE_EMPTY(&ar
->mcastpsq
);
5760 A_MUTEX_UNLOCK(&ar
->mcastpsqLock
);
5762 A_ASSERT(isMcastQueued
== false);
5764 /* Flush the mcast psq to the target */
5765 /* Set the STA flag to DTIMExpired, so that the frame will go out */
5766 ar
->DTIMExpired
= true;
5768 A_MUTEX_LOCK(&ar
->mcastpsqLock
);
5769 while (!A_NETBUF_QUEUE_EMPTY(&ar
->mcastpsq
)) {
5770 skb
= A_NETBUF_DEQUEUE(&ar
->mcastpsq
);
5771 A_MUTEX_UNLOCK(&ar
->mcastpsqLock
);
5773 ar6000_data_tx(skb
, ar
->arNetDev
);
5775 A_MUTEX_LOCK(&ar
->mcastpsqLock
);
5777 A_MUTEX_UNLOCK(&ar
->mcastpsqLock
);
5779 /* Reset the DTIMExpired flag back to 0 */
5780 ar
->DTIMExpired
= false;
5782 /* Clear the LSB of the BitMapCtl field of the TIM IE */
5783 wmi_set_pvb_cmd(ar
->arWmi
, MCAST_AID
, 0);
5787 read_rssi_compensation_param(AR_SOFTC_T
*ar
)
5791 //#define RSSICOMPENSATION_PRINT
5793 #ifdef RSSICOMPENSATION_PRINT
5795 cust_data_ptr
= ar6000_get_cust_data_buffer(ar
->arTargetType
);
5796 for (i
=0; i
<16; i
++) {
5797 A_PRINTF("cust_data_%d = %x \n", i
, *(u8
*)cust_data_ptr
);
5802 cust_data_ptr
= ar6000_get_cust_data_buffer(ar
->arTargetType
);
5804 rssi_compensation_param
.customerID
= *(u16
*)cust_data_ptr
& 0xffff;
5805 rssi_compensation_param
.enable
= *(u16
*)(cust_data_ptr
+2) & 0xffff;
5806 rssi_compensation_param
.bg_param_a
= *(u16
*)(cust_data_ptr
+4) & 0xffff;
5807 rssi_compensation_param
.bg_param_b
= *(u16
*)(cust_data_ptr
+6) & 0xffff;
5808 rssi_compensation_param
.a_param_a
= *(u16
*)(cust_data_ptr
+8) & 0xffff;
5809 rssi_compensation_param
.a_param_b
= *(u16
*)(cust_data_ptr
+10) &0xffff;
5810 rssi_compensation_param
.reserved
= *(u32
*)(cust_data_ptr
+12);
5812 #ifdef RSSICOMPENSATION_PRINT
5813 A_PRINTF("customerID = 0x%x \n", rssi_compensation_param
.customerID
);
5814 A_PRINTF("enable = 0x%x \n", rssi_compensation_param
.enable
);
5815 A_PRINTF("bg_param_a = 0x%x and %d \n", rssi_compensation_param
.bg_param_a
, rssi_compensation_param
.bg_param_a
);
5816 A_PRINTF("bg_param_b = 0x%x and %d \n", rssi_compensation_param
.bg_param_b
, rssi_compensation_param
.bg_param_b
);
5817 A_PRINTF("a_param_a = 0x%x and %d \n", rssi_compensation_param
.a_param_a
, rssi_compensation_param
.a_param_a
);
5818 A_PRINTF("a_param_b = 0x%x and %d \n", rssi_compensation_param
.a_param_b
, rssi_compensation_param
.a_param_b
);
5819 A_PRINTF("Last 4 bytes = 0x%x \n", rssi_compensation_param
.reserved
);
5822 if (rssi_compensation_param
.enable
!= 0x1) {
5823 rssi_compensation_param
.enable
= 0;
5830 rssi_compensation_calc_tcmd(u32 freq
, A_INT32 rssi
, u32 totalPkt
)
5835 if (rssi_compensation_param
.enable
)
5837 AR_DEBUG_PRINTF(ATH_DEBUG_INFO
, (">>> 11a\n"));
5838 AR_DEBUG_PRINTF(ATH_DEBUG_INFO
, ("rssi before compensation = %d, totalPkt = %d\n", rssi
,totalPkt
));
5839 rssi
= rssi
* rssi_compensation_param
.a_param_a
+ totalPkt
* rssi_compensation_param
.a_param_b
;
5840 rssi
= (rssi
-50) /100;
5841 AR_DEBUG_PRINTF(ATH_DEBUG_INFO
, ("rssi after compensation = %d\n", rssi
));
5846 if (rssi_compensation_param
.enable
)
5848 AR_DEBUG_PRINTF(ATH_DEBUG_INFO
, (">>> 11bg\n"));
5849 AR_DEBUG_PRINTF(ATH_DEBUG_INFO
, ("rssi before compensation = %d, totalPkt = %d\n", rssi
,totalPkt
));
5850 rssi
= rssi
* rssi_compensation_param
.bg_param_a
+ totalPkt
* rssi_compensation_param
.bg_param_b
;
5851 rssi
= (rssi
-50) /100;
5852 AR_DEBUG_PRINTF(ATH_DEBUG_INFO
, ("rssi after compensation = %d\n", rssi
));
5860 rssi_compensation_calc(AR_SOFTC_T
*ar
, A_INT16 rssi
)
5862 if (ar
->arBssChannel
> 5000)
5864 if (rssi_compensation_param
.enable
)
5866 AR_DEBUG_PRINTF(ATH_DEBUG_INFO
, (">>> 11a\n"));
5867 AR_DEBUG_PRINTF(ATH_DEBUG_INFO
, ("rssi before compensation = %d\n", rssi
));
5868 rssi
= rssi
* rssi_compensation_param
.a_param_a
+ rssi_compensation_param
.a_param_b
;
5869 rssi
= (rssi
-50) /100;
5870 AR_DEBUG_PRINTF(ATH_DEBUG_INFO
, ("rssi after compensation = %d\n", rssi
));
5875 if (rssi_compensation_param
.enable
)
5877 AR_DEBUG_PRINTF(ATH_DEBUG_INFO
, (">>> 11bg\n"));
5878 AR_DEBUG_PRINTF(ATH_DEBUG_INFO
, ("rssi before compensation = %d\n", rssi
));
5879 rssi
= rssi
* rssi_compensation_param
.bg_param_a
+ rssi_compensation_param
.bg_param_b
;
5880 rssi
= (rssi
-50) /100;
5881 AR_DEBUG_PRINTF(ATH_DEBUG_INFO
, ("rssi after compensation = %d\n", rssi
));
5889 rssi_compensation_reverse_calc(AR_SOFTC_T
*ar
, A_INT16 rssi
, bool Above
)
5893 if (ar
->arBssChannel
> 5000)
5895 if (rssi_compensation_param
.enable
)
5897 AR_DEBUG_PRINTF(ATH_DEBUG_INFO
, (">>> 11a\n"));
5898 AR_DEBUG_PRINTF(ATH_DEBUG_INFO
, ("rssi before rev compensation = %d\n", rssi
));
5900 rssi
= (rssi
- rssi_compensation_param
.a_param_b
) / rssi_compensation_param
.a_param_a
;
5901 AR_DEBUG_PRINTF(ATH_DEBUG_INFO
, ("rssi after rev compensation = %d\n", rssi
));
5906 if (rssi_compensation_param
.enable
)
5908 AR_DEBUG_PRINTF(ATH_DEBUG_INFO
, (">>> 11bg\n"));
5909 AR_DEBUG_PRINTF(ATH_DEBUG_INFO
, ("rssi before rev compensation = %d\n", rssi
));
5912 for (i
=95; i
>=0; i
--) {
5913 if (rssi
<= rssi_compensation_table
[i
]) {
5919 for (i
=0; i
<=95; i
++) {
5920 if (rssi
>= rssi_compensation_table
[i
]) {
5926 AR_DEBUG_PRINTF(ATH_DEBUG_INFO
, ("rssi after rev compensation = %d\n", rssi
));
5934 void ap_wapi_rekey_event(AR_SOFTC_T
*ar
, u8 type
, u8
*mac
)
5936 union iwreq_data wrqu
;
5939 A_MEMZERO(buf
, sizeof(buf
));
5941 strcpy(buf
, "WAPI_REKEY");
5943 A_MEMCPY(&buf
[11], mac
, ATH_MAC_LEN
);
5945 A_MEMZERO(&wrqu
, sizeof(wrqu
));
5946 wrqu
.data
.length
= 10+1+ATH_MAC_LEN
;
5947 wireless_send_event(ar
->arNetDev
, IWEVCUSTOM
, &wrqu
, buf
);
5949 A_PRINTF("WAPI REKEY - %d - %02x:%02x\n", type
, mac
[4], mac
[5]);
5956 ar6000_reinstall_keys(AR_SOFTC_T
*ar
, u8 key_op_ctrl
)
5959 struct ieee80211req_key
*uik
= &ar
->user_saved_keys
.ucast_ik
;
5960 struct ieee80211req_key
*bik
= &ar
->user_saved_keys
.bcast_ik
;
5961 CRYPTO_TYPE keyType
= ar
->user_saved_keys
.keyType
;
5963 if (IEEE80211_CIPHER_CCKM_KRK
!= uik
->ik_type
) {
5964 if (NONE_CRYPT
== keyType
) {
5965 goto _reinstall_keys_out
;
5968 if (uik
->ik_keylen
) {
5969 status
= wmi_addKey_cmd(ar
->arWmi
, uik
->ik_keyix
,
5970 ar
->user_saved_keys
.keyType
, PAIRWISE_USAGE
,
5971 uik
->ik_keylen
, (u8
*)&uik
->ik_keyrsc
,
5972 uik
->ik_keydata
, key_op_ctrl
, uik
->ik_macaddr
, SYNC_BEFORE_WMIFLAG
);
5976 status
= wmi_add_krk_cmd(ar
->arWmi
, uik
->ik_keydata
);
5979 if (IEEE80211_CIPHER_CCKM_KRK
!= bik
->ik_type
) {
5980 if (NONE_CRYPT
== keyType
) {
5981 goto _reinstall_keys_out
;
5984 if (bik
->ik_keylen
) {
5985 status
= wmi_addKey_cmd(ar
->arWmi
, bik
->ik_keyix
,
5986 ar
->user_saved_keys
.keyType
, GROUP_USAGE
,
5987 bik
->ik_keylen
, (u8
*)&bik
->ik_keyrsc
,
5988 bik
->ik_keydata
, key_op_ctrl
, bik
->ik_macaddr
, NO_SYNC_WMIFLAG
);
5991 status
= wmi_add_krk_cmd(ar
->arWmi
, bik
->ik_keydata
);
5994 _reinstall_keys_out
:
5995 ar
->user_savedkeys_stat
= USER_SAVEDKEYS_STAT_INIT
;
5996 ar
->user_key_ctrl
= 0;
6000 #endif /* USER_KEYS */
6004 ar6000_dset_open_req(
6022 ar6000_dset_data_req(
6034 ar6000_ap_mode_profile_commit(struct ar6_softc
*ar
)
6037 unsigned long flags
;
6039 /* No change in AP's profile configuration */
6040 if(ar
->ap_profile_flag
==0) {
6041 A_PRINTF("COMMIT: No change in profile!!!\n");
6045 if(!ar
->arSsidLen
) {
6046 A_PRINTF("SSID not set!!!\n");
6050 switch(ar
->arAuthMode
) {
6052 if((ar
->arPairwiseCrypto
!= NONE_CRYPT
) &&
6054 (ar
->arPairwiseCrypto
!= WAPI_CRYPT
) &&
6056 (ar
->arPairwiseCrypto
!= WEP_CRYPT
)) {
6057 A_PRINTF("Cipher not supported in AP mode Open auth\n");
6063 case (WPA_PSK_AUTH
|WPA2_PSK_AUTH
):
6066 A_PRINTF("This key mgmt type not supported in AP mode\n");
6070 /* Update the arNetworkType */
6071 ar
->arNetworkType
= ar
->arNextMode
;
6073 A_MEMZERO(&p
,sizeof(p
));
6074 p
.ssidLength
= ar
->arSsidLen
;
6075 A_MEMCPY(p
.ssid
,ar
->arSsid
,p
.ssidLength
);
6076 p
.channel
= ar
->arChannelHint
;
6077 p
.networkType
= ar
->arNetworkType
;
6079 p
.dot11AuthMode
= ar
->arDot11AuthMode
;
6080 p
.authMode
= ar
->arAuthMode
;
6081 p
.pairwiseCryptoType
= ar
->arPairwiseCrypto
;
6082 p
.pairwiseCryptoLen
= ar
->arPairwiseCryptoLen
;
6083 p
.groupCryptoType
= ar
->arGroupCrypto
;
6084 p
.groupCryptoLen
= ar
->arGroupCryptoLen
;
6085 p
.ctrl_flags
= ar
->arConnectCtrlFlags
;
6087 ar
->arConnected
= false;
6089 wmi_ap_profile_commit(ar
->arWmi
, &p
);
6090 spin_lock_irqsave(&ar
->arLock
, flags
);
6091 ar
->arConnected
= true;
6092 netif_carrier_on(ar
->arNetDev
);
6093 spin_unlock_irqrestore(&ar
->arLock
, flags
);
6094 ar
->ap_profile_flag
= 0;
6099 ar6000_connect_to_ap(struct ar6_softc
*ar
)
6101 /* The ssid length check prevents second "essid off" from the user,
6102 to be treated as a connect cmd. The second "essid off" is ignored.
6104 if((ar
->arWmiReady
== true) && (ar
->arSsidLen
> 0) && ar
->arNetworkType
!=AP_NETWORK
)
6107 if((ADHOC_NETWORK
!= ar
->arNetworkType
) &&
6108 (NONE_AUTH
==ar
->arAuthMode
) &&
6109 (WEP_CRYPT
==ar
->arPairwiseCrypto
)) {
6110 ar6000_install_static_wep_keys(ar
);
6113 if (!ar
->arUserBssFilter
) {
6114 if (wmi_bssfilter_cmd(ar
->arWmi
, ALL_BSS_FILTER
, 0) != A_OK
) {
6119 if (ar
->arWapiEnable
) {
6120 ar
->arPairwiseCrypto
= WAPI_CRYPT
;
6121 ar
->arPairwiseCryptoLen
= 0;
6122 ar
->arGroupCrypto
= WAPI_CRYPT
;
6123 ar
->arGroupCryptoLen
= 0;
6124 ar
->arAuthMode
= NONE_AUTH
;
6125 ar
->arConnectCtrlFlags
|= CONNECT_IGNORE_WPAx_GROUP_CIPHER
;
6128 AR_DEBUG_PRINTF(ATH_DEBUG_WLAN_CONNECT
,("Connect called with authmode %d dot11 auth %d"\
6129 " PW crypto %d PW crypto Len %d GRP crypto %d"\
6130 " GRP crypto Len %d\n",
6131 ar
->arAuthMode
, ar
->arDot11AuthMode
,
6132 ar
->arPairwiseCrypto
, ar
->arPairwiseCryptoLen
,
6133 ar
->arGroupCrypto
, ar
->arGroupCryptoLen
));
6135 /* Set the listen interval into 1000TUs or more. This value will be indicated to Ap in the conn.
6136 later set it back locally at the STA to 100/1000 TUs depending on the power mode */
6137 if ((ar
->arNetworkType
== INFRA_NETWORK
)) {
6138 wmi_listeninterval_cmd(ar
->arWmi
, max(ar
->arListenIntervalT
, (u16
)A_MAX_WOW_LISTEN_INTERVAL
), 0);
6140 status
= wmi_connect_cmd(ar
->arWmi
, ar
->arNetworkType
,
6141 ar
->arDot11AuthMode
, ar
->arAuthMode
,
6142 ar
->arPairwiseCrypto
, ar
->arPairwiseCryptoLen
,
6143 ar
->arGroupCrypto
,ar
->arGroupCryptoLen
,
6144 ar
->arSsidLen
, ar
->arSsid
,
6145 ar
->arReqBssid
, ar
->arChannelHint
,
6146 ar
->arConnectCtrlFlags
);
6147 if (status
!= A_OK
) {
6148 wmi_listeninterval_cmd(ar
->arWmi
, ar
->arListenIntervalT
, ar
->arListenIntervalB
);
6149 if (!ar
->arUserBssFilter
) {
6150 wmi_bssfilter_cmd(ar
->arWmi
, NONE_BSS_FILTER
, 0);
6155 if ((!(ar
->arConnectCtrlFlags
& CONNECT_DO_WPA_OFFLOAD
)) &&
6156 ((WPA_PSK_AUTH
== ar
->arAuthMode
) || (WPA2_PSK_AUTH
== ar
->arAuthMode
)))
6158 A_TIMEOUT_MS(&ar
->disconnect_timer
, A_DISCONNECT_TIMER_INTERVAL
, 0);
6161 ar
->arConnectCtrlFlags
&= ~CONNECT_DO_WPA_OFFLOAD
;
6163 ar
->arConnectPending
= true;
6170 ar6000_ap_mode_get_wpa_ie(struct ar6_softc
*ar
, struct ieee80211req_wpaie
*wpaie
)
6173 conn
= ieee80211_find_conn(ar
, wpaie
->wpa_macaddr
);
6175 A_MEMZERO(wpaie
->wpa_ie
, IEEE80211_MAX_IE
);
6176 A_MEMZERO(wpaie
->rsn_ie
, IEEE80211_MAX_IE
);
6179 A_MEMCPY(wpaie
->wpa_ie
, conn
->wpa_ie
, IEEE80211_MAX_IE
);
6186 is_iwioctl_allowed(u8 mode
, u16 cmd
)
6188 if(cmd
>= SIOCSIWCOMMIT
&& cmd
<= SIOCGIWPOWER
) {
6189 cmd
-= SIOCSIWCOMMIT
;
6190 if(sioctl_filter
[cmd
] == 0xFF) return A_OK
;
6191 if(sioctl_filter
[cmd
] & mode
) return A_OK
;
6192 } else if(cmd
>= SIOCIWFIRSTPRIV
&& cmd
<= (SIOCIWFIRSTPRIV
+30)) {
6193 cmd
-= SIOCIWFIRSTPRIV
;
6194 if(pioctl_filter
[cmd
] == 0xFF) return A_OK
;
6195 if(pioctl_filter
[cmd
] & mode
) return A_OK
;
6203 is_xioctl_allowed(u8 mode
, int cmd
)
6205 if(sizeof(xioctl_filter
)-1 < cmd
) {
6206 A_PRINTF("Filter for this cmd=%d not defined\n",cmd
);
6209 if(xioctl_filter
[cmd
] == 0xFF) return A_OK
;
6210 if(xioctl_filter
[cmd
] & mode
) return A_OK
;
6216 ap_set_wapi_key(struct ar6_softc
*ar
, void *ikey
)
6218 struct ieee80211req_key
*ik
= (struct ieee80211req_key
*)ikey
;
6219 KEY_USAGE keyUsage
= 0;
6222 if (A_MEMCMP(ik
->ik_macaddr
, bcast_mac
, IEEE80211_ADDR_LEN
) == 0) {
6223 keyUsage
= GROUP_USAGE
;
6225 keyUsage
= PAIRWISE_USAGE
;
6227 A_PRINTF("WAPI_KEY: Type:%d ix:%d mac:%02x:%02x len:%d\n",
6228 keyUsage
, ik
->ik_keyix
, ik
->ik_macaddr
[4], ik
->ik_macaddr
[5],
6231 status
= wmi_addKey_cmd(ar
->arWmi
, ik
->ik_keyix
, WAPI_CRYPT
, keyUsage
,
6232 ik
->ik_keylen
, (u8
*)&ik
->ik_keyrsc
,
6233 ik
->ik_keydata
, KEY_OP_INIT_VAL
, ik
->ik_macaddr
,
6236 if (A_OK
!= status
) {
6243 void ar6000_peer_event(
6250 for (pos
=0;pos
<6;pos
++)
6251 printk("%02x: ",*(macAddr
+pos
));
6255 #ifdef HTC_TEST_SEND_PKTS
6256 #define HTC_TEST_DUPLICATE 8
6257 static void DoHTCSendPktsTest(AR_SOFTC_T
*ar
, int MapNo
, HTC_ENDPOINT_ID eid
, struct sk_buff
*dupskb
)
6259 struct ar_cookie
*cookie
;
6260 struct ar_cookie
*cookieArray
[HTC_TEST_DUPLICATE
];
6261 struct sk_buff
*new_skb
;
6264 HTC_PACKET_QUEUE pktQueue
;
6265 EPPING_HEADER
*eppingHdr
;
6267 eppingHdr
= A_NETBUF_DATA(dupskb
);
6269 if (eppingHdr
->Cmd_h
== EPPING_CMD_NO_ECHO
) {
6270 /* skip test if this is already a tx perf test */
6274 for (i
= 0; i
< HTC_TEST_DUPLICATE
; i
++,pkts
++) {
6275 AR6000_SPIN_LOCK(&ar
->arLock
, 0);
6276 cookie
= ar6000_alloc_cookie(ar
);
6277 if (cookie
!= NULL
) {
6278 ar
->arTxPending
[eid
]++;
6279 ar
->arTotalTxDataPending
++;
6282 AR6000_SPIN_UNLOCK(&ar
->arLock
, 0);
6284 if (NULL
== cookie
) {
6288 new_skb
= A_NETBUF_ALLOC(A_NETBUF_LEN(dupskb
));
6290 if (new_skb
== NULL
) {
6291 AR6000_SPIN_LOCK(&ar
->arLock
, 0);
6292 ar6000_free_cookie(ar
,cookie
);
6293 AR6000_SPIN_UNLOCK(&ar
->arLock
, 0);
6297 A_NETBUF_PUT_DATA(new_skb
, A_NETBUF_DATA(dupskb
), A_NETBUF_LEN(dupskb
));
6298 cookie
->arc_bp
[0] = (unsigned long)new_skb
;
6299 cookie
->arc_bp
[1] = MapNo
;
6300 SET_HTC_PACKET_INFO_TX(&cookie
->HtcPkt
,
6302 A_NETBUF_DATA(new_skb
),
6303 A_NETBUF_LEN(new_skb
),
6307 cookieArray
[i
] = cookie
;
6310 EPPING_HEADER
*pHdr
= (EPPING_HEADER
*)A_NETBUF_DATA(new_skb
);
6311 pHdr
->Cmd_h
= EPPING_CMD_NO_ECHO
; /* do not echo the packet */
6319 INIT_HTC_PACKET_QUEUE(&pktQueue
);
6321 for (i
= 0; i
< pkts
; i
++) {
6322 HTC_PACKET_ENQUEUE(&pktQueue
,&cookieArray
[i
]->HtcPkt
);
6325 HTCSendPktsMultiple(ar
->arHtcTarget
, &pktQueue
);
6330 #ifdef CONFIG_AP_VIRTUAL_ADAPTER_SUPPORT
6332 * Add support for adding and removing a virtual adapter for soft AP.
6333 * Some OS requires different adapters names for station and soft AP mode.
6334 * To support these requirement, create and destory a netdevice instance
6335 * when the AP mode is operational. A full fledged support for virual device
6336 * is not implemented. Rather a virtual interface is created and is linked
6337 * with the existing physical device instance during the operation of the
6341 int ar6000_start_ap_interface(AR_SOFTC_T
*ar
)
6343 AR_VIRTUAL_INTERFACE_T
*arApDev
;
6345 /* Change net_device to point to AP instance */
6346 arApDev
= (AR_VIRTUAL_INTERFACE_T
*)ar
->arApDev
;
6347 ar
->arNetDev
= arApDev
->arNetDev
;
6352 int ar6000_stop_ap_interface(AR_SOFTC_T
*ar
)
6354 AR_VIRTUAL_INTERFACE_T
*arApDev
;
6356 /* Change net_device to point to sta instance */
6357 arApDev
= (AR_VIRTUAL_INTERFACE_T
*)ar
->arApDev
;
6359 ar
->arNetDev
= arApDev
->arStaNetDev
;
6366 int ar6000_create_ap_interface(AR_SOFTC_T
*ar
, char *ap_ifname
)
6368 struct net_device
*dev
;
6369 AR_VIRTUAL_INTERFACE_T
*arApDev
;
6371 dev
= alloc_etherdev(sizeof(AR_VIRTUAL_INTERFACE_T
));
6373 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
,("ar6000_create_ap_interface: can't alloc etherdev\n"));
6378 init_netdev(dev
, ap_ifname
);
6380 if (register_netdev(dev
)) {
6381 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
,("ar6000_create_ap_interface: register_netdev failed\n"));
6385 arApDev
= netdev_priv(dev
);
6386 arApDev
->arDev
= ar
;
6387 arApDev
->arNetDev
= dev
;
6388 arApDev
->arStaNetDev
= ar
->arNetDev
;
6390 ar
->arApDev
= arApDev
;
6393 /* Copy the MAC address */
6394 A_MEMCPY(dev
->dev_addr
, ar
->arNetDev
->dev_addr
, AR6000_ETH_ADDR_LEN
);
6399 int ar6000_add_ap_interface(AR_SOFTC_T
*ar
, char *ap_ifname
)
6401 /* Interface already added, need not proceed further */
6402 if (ar
->arApDev
!= NULL
) {
6403 AR_DEBUG_PRINTF(ATH_DEBUG_ERR
,("ar6000_add_ap_interface: interface already present \n"));
6407 if (ar6000_create_ap_interface(ar
, ap_ifname
) != A_OK
) {
6411 A_PRINTF("Add AP interface %s \n",ap_ifname
);
6413 return ar6000_start_ap_interface(ar
);
6416 int ar6000_remove_ap_interface(AR_SOFTC_T
*ar
)
6419 ar6000_stop_ap_interface(ar
);
6421 unregister_netdev(arApNetDev
);
6422 free_netdev(apApNetDev
);
6424 A_PRINTF("Remove AP interface\n");
6432 #endif /* CONFIG_AP_VIRTUAL_ADAPTER_SUPPORT */
6435 #ifdef EXPORT_HCI_BRIDGE_INTERFACE
6436 EXPORT_SYMBOL(setupbtdev
);