microblaze: Fix IRQ entry/exit ftracing
[linux-2.6/libata-dev.git] / drivers / staging / wlan-ng / prism2sta.c
blob31ac8da39c815c4d39e885d09e463b7153e8020c
1 /* src/prism2/driver/prism2sta.c
3 * Implements the station functionality for prism2
5 * Copyright (C) 1999 AbsoluteValue Systems, Inc. All Rights Reserved.
6 * --------------------------------------------------------------------
8 * linux-wlan
10 * The contents of this file are subject to the Mozilla Public
11 * License Version 1.1 (the "License"); you may not use this file
12 * except in compliance with the License. You may obtain a copy of
13 * the License at http://www.mozilla.org/MPL/
15 * Software distributed under the License is distributed on an "AS
16 * IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or
17 * implied. See the License for the specific language governing
18 * rights and limitations under the License.
20 * Alternatively, the contents of this file may be used under the
21 * terms of the GNU Public License version 2 (the "GPL"), in which
22 * case the provisions of the GPL are applicable instead of the
23 * above. If you wish to allow the use of your version of this file
24 * only under the terms of the GPL and not to allow others to use
25 * your version of this file under the MPL, indicate your decision
26 * by deleting the provisions above and replace them with the notice
27 * and other provisions required by the GPL. If you do not delete
28 * the provisions above, a recipient may use your version of this
29 * file under either the MPL or the GPL.
31 * --------------------------------------------------------------------
33 * Inquiries regarding the linux-wlan Open Source project can be
34 * made directly to:
36 * AbsoluteValue Systems Inc.
37 * info@linux-wlan.com
38 * http://www.linux-wlan.com
40 * --------------------------------------------------------------------
42 * Portions of the development of this software were funded by
43 * Intersil Corporation as part of PRISM(R) chipset product development.
45 * --------------------------------------------------------------------
47 * This file implements the module and linux pcmcia routines for the
48 * prism2 driver.
50 * --------------------------------------------------------------------
53 #include <linux/version.h>
54 #include <linux/module.h>
55 #include <linux/moduleparam.h>
56 #include <linux/kernel.h>
57 #include <linux/sched.h>
58 #include <linux/types.h>
59 #include <linux/init.h>
60 #include <linux/slab.h>
61 #include <linux/wireless.h>
62 #include <linux/netdevice.h>
63 #include <linux/workqueue.h>
64 #include <linux/byteorder/generic.h>
65 #include <linux/ctype.h>
67 #include <linux/io.h>
68 #include <linux/delay.h>
69 #include <asm/byteorder.h>
70 #include <linux/if_arp.h>
71 #include <linux/if_ether.h>
72 #include <linux/bitops.h>
74 #include "p80211types.h"
75 #include "p80211hdr.h"
76 #include "p80211mgmt.h"
77 #include "p80211conv.h"
78 #include "p80211msg.h"
79 #include "p80211netdev.h"
80 #include "p80211req.h"
81 #include "p80211metadef.h"
82 #include "p80211metastruct.h"
83 #include "hfa384x.h"
84 #include "prism2mgmt.h"
86 #define wlan_hexchar(x) (((x) < 0x0a) ? ('0' + (x)) : ('a' + ((x) - 0x0a)))
88 /* Create a string of printable chars from something that might not be */
89 /* It's recommended that the str be 4*len + 1 bytes long */
90 #define wlan_mkprintstr(buf, buflen, str, strlen) \
91 { \
92 int i = 0; \
93 int j = 0; \
94 memset(str, 0, (strlen)); \
95 for (i = 0; i < (buflen); i++) { \
96 if (isprint((buf)[i])) { \
97 (str)[j] = (buf)[i]; \
98 j++; \
99 } else { \
100 (str)[j] = '\\'; \
101 (str)[j+1] = 'x'; \
102 (str)[j+2] = wlan_hexchar(((buf)[i] & 0xf0) >> 4); \
103 (str)[j+3] = wlan_hexchar(((buf)[i] & 0x0f)); \
104 j += 4; \
109 static char *dev_info = "prism2_usb";
110 static wlandevice_t *create_wlan(void);
112 int prism2_reset_holdtime = 30; /* Reset hold time in ms */
113 int prism2_reset_settletime = 100; /* Reset settle time in ms */
115 static int prism2_doreset; /* Do a reset at init? */
117 module_param(prism2_doreset, int, 0644);
118 MODULE_PARM_DESC(prism2_doreset, "Issue a reset on initialization");
120 module_param(prism2_reset_holdtime, int, 0644);
121 MODULE_PARM_DESC(prism2_reset_holdtime, "reset hold time in ms");
122 module_param(prism2_reset_settletime, int, 0644);
123 MODULE_PARM_DESC(prism2_reset_settletime, "reset settle time in ms");
125 MODULE_LICENSE("Dual MPL/GPL");
127 static int prism2sta_open(wlandevice_t *wlandev);
128 static int prism2sta_close(wlandevice_t *wlandev);
129 static void prism2sta_reset(wlandevice_t *wlandev);
130 static int prism2sta_txframe(wlandevice_t *wlandev, struct sk_buff *skb,
131 p80211_hdr_t *p80211_hdr,
132 p80211_metawep_t *p80211_wep);
133 static int prism2sta_mlmerequest(wlandevice_t *wlandev, p80211msg_t *msg);
134 static int prism2sta_getcardinfo(wlandevice_t *wlandev);
135 static int prism2sta_globalsetup(wlandevice_t *wlandev);
136 static int prism2sta_setmulticast(wlandevice_t *wlandev, netdevice_t *dev);
138 static void prism2sta_inf_handover(wlandevice_t *wlandev,
139 hfa384x_InfFrame_t *inf);
140 static void prism2sta_inf_tallies(wlandevice_t *wlandev,
141 hfa384x_InfFrame_t *inf);
142 static void prism2sta_inf_hostscanresults(wlandevice_t *wlandev,
143 hfa384x_InfFrame_t *inf);
144 static void prism2sta_inf_scanresults(wlandevice_t *wlandev,
145 hfa384x_InfFrame_t *inf);
146 static void prism2sta_inf_chinforesults(wlandevice_t *wlandev,
147 hfa384x_InfFrame_t *inf);
148 static void prism2sta_inf_linkstatus(wlandevice_t *wlandev,
149 hfa384x_InfFrame_t *inf);
150 static void prism2sta_inf_assocstatus(wlandevice_t *wlandev,
151 hfa384x_InfFrame_t *inf);
152 static void prism2sta_inf_authreq(wlandevice_t *wlandev,
153 hfa384x_InfFrame_t *inf);
154 static void prism2sta_inf_authreq_defer(wlandevice_t *wlandev,
155 hfa384x_InfFrame_t *inf);
156 static void prism2sta_inf_psusercnt(wlandevice_t *wlandev,
157 hfa384x_InfFrame_t *inf);
159 /*----------------------------------------------------------------
160 * prism2sta_open
162 * WLAN device open method. Called from p80211netdev when kernel
163 * device open (start) method is called in response to the
164 * SIOCSIIFFLAGS ioctl changing the flags bit IFF_UP
165 * from clear to set.
167 * Arguments:
168 * wlandev wlan device structure
170 * Returns:
171 * 0 success
172 * >0 f/w reported error
173 * <0 driver reported error
175 * Side effects:
177 * Call context:
178 * process thread
179 ----------------------------------------------------------------*/
180 static int prism2sta_open(wlandevice_t *wlandev)
182 /* We don't currently have to do anything else.
183 * The setup of the MAC should be subsequently completed via
184 * the mlme commands.
185 * Higher layers know we're ready from dev->start==1 and
186 * dev->tbusy==0. Our rx path knows to pass up received/
187 * frames because of dev->flags&IFF_UP is true.
190 return 0;
193 /*----------------------------------------------------------------
194 * prism2sta_close
196 * WLAN device close method. Called from p80211netdev when kernel
197 * device close method is called in response to the
198 * SIOCSIIFFLAGS ioctl changing the flags bit IFF_UP
199 * from set to clear.
201 * Arguments:
202 * wlandev wlan device structure
204 * Returns:
205 * 0 success
206 * >0 f/w reported error
207 * <0 driver reported error
209 * Side effects:
211 * Call context:
212 * process thread
213 ----------------------------------------------------------------*/
214 static int prism2sta_close(wlandevice_t *wlandev)
216 /* We don't currently have to do anything else.
217 * Higher layers know we're not ready from dev->start==0 and
218 * dev->tbusy==1. Our rx path knows to not pass up received
219 * frames because of dev->flags&IFF_UP is false.
222 return 0;
225 /*----------------------------------------------------------------
226 * prism2sta_reset
228 * Not currently implented.
230 * Arguments:
231 * wlandev wlan device structure
232 * none
234 * Returns:
235 * nothing
237 * Side effects:
239 * Call context:
240 * process thread
241 ----------------------------------------------------------------*/
242 static void prism2sta_reset(wlandevice_t *wlandev)
244 return;
247 /*----------------------------------------------------------------
248 * prism2sta_txframe
250 * Takes a frame from p80211 and queues it for transmission.
252 * Arguments:
253 * wlandev wlan device structure
254 * pb packet buffer struct. Contains an 802.11
255 * data frame.
256 * p80211_hdr points to the 802.11 header for the packet.
257 * Returns:
258 * 0 Success and more buffs available
259 * 1 Success but no more buffs
260 * 2 Allocation failure
261 * 4 Buffer full or queue busy
263 * Side effects:
265 * Call context:
266 * process thread
267 ----------------------------------------------------------------*/
268 static int prism2sta_txframe(wlandevice_t *wlandev, struct sk_buff *skb,
269 p80211_hdr_t *p80211_hdr,
270 p80211_metawep_t *p80211_wep)
272 hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
273 int result;
275 /* If necessary, set the 802.11 WEP bit */
276 if ((wlandev->hostwep & (HOSTWEP_PRIVACYINVOKED | HOSTWEP_ENCRYPT)) ==
277 HOSTWEP_PRIVACYINVOKED) {
278 p80211_hdr->a3.fc |= cpu_to_le16(WLAN_SET_FC_ISWEP(1));
281 result = hfa384x_drvr_txframe(hw, skb, p80211_hdr, p80211_wep);
283 return result;
286 /*----------------------------------------------------------------
287 * prism2sta_mlmerequest
289 * wlan command message handler. All we do here is pass the message
290 * over to the prism2sta_mgmt_handler.
292 * Arguments:
293 * wlandev wlan device structure
294 * msg wlan command message
295 * Returns:
296 * 0 success
297 * <0 successful acceptance of message, but we're
298 * waiting for an async process to finish before
299 * we're done with the msg. When the asynch
300 * process is done, we'll call the p80211
301 * function p80211req_confirm() .
302 * >0 An error occurred while we were handling
303 * the message.
305 * Side effects:
307 * Call context:
308 * process thread
309 ----------------------------------------------------------------*/
310 static int prism2sta_mlmerequest(wlandevice_t *wlandev, p80211msg_t *msg)
312 hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
314 int result = 0;
316 switch (msg->msgcode) {
317 case DIDmsg_dot11req_mibget:
318 pr_debug("Received mibget request\n");
319 result = prism2mgmt_mibset_mibget(wlandev, msg);
320 break;
321 case DIDmsg_dot11req_mibset:
322 pr_debug("Received mibset request\n");
323 result = prism2mgmt_mibset_mibget(wlandev, msg);
324 break;
325 case DIDmsg_dot11req_scan:
326 pr_debug("Received scan request\n");
327 result = prism2mgmt_scan(wlandev, msg);
328 break;
329 case DIDmsg_dot11req_scan_results:
330 pr_debug("Received scan_results request\n");
331 result = prism2mgmt_scan_results(wlandev, msg);
332 break;
333 case DIDmsg_dot11req_start:
334 pr_debug("Received mlme start request\n");
335 result = prism2mgmt_start(wlandev, msg);
336 break;
338 * Prism2 specific messages
340 case DIDmsg_p2req_readpda:
341 pr_debug("Received mlme readpda request\n");
342 result = prism2mgmt_readpda(wlandev, msg);
343 break;
344 case DIDmsg_p2req_ramdl_state:
345 pr_debug("Received mlme ramdl_state request\n");
346 result = prism2mgmt_ramdl_state(wlandev, msg);
347 break;
348 case DIDmsg_p2req_ramdl_write:
349 pr_debug("Received mlme ramdl_write request\n");
350 result = prism2mgmt_ramdl_write(wlandev, msg);
351 break;
352 case DIDmsg_p2req_flashdl_state:
353 pr_debug("Received mlme flashdl_state request\n");
354 result = prism2mgmt_flashdl_state(wlandev, msg);
355 break;
356 case DIDmsg_p2req_flashdl_write:
357 pr_debug("Received mlme flashdl_write request\n");
358 result = prism2mgmt_flashdl_write(wlandev, msg);
359 break;
361 * Linux specific messages
363 case DIDmsg_lnxreq_hostwep:
364 break; /* ignore me. */
365 case DIDmsg_lnxreq_ifstate:
367 p80211msg_lnxreq_ifstate_t *ifstatemsg;
368 pr_debug("Received mlme ifstate request\n");
369 ifstatemsg = (p80211msg_lnxreq_ifstate_t *) msg;
370 result =
371 prism2sta_ifstate(wlandev,
372 ifstatemsg->ifstate.data);
373 ifstatemsg->resultcode.status =
374 P80211ENUM_msgitem_status_data_ok;
375 ifstatemsg->resultcode.data = result;
376 result = 0;
378 break;
379 case DIDmsg_lnxreq_wlansniff:
380 pr_debug("Received mlme wlansniff request\n");
381 result = prism2mgmt_wlansniff(wlandev, msg);
382 break;
383 case DIDmsg_lnxreq_autojoin:
384 pr_debug("Received mlme autojoin request\n");
385 result = prism2mgmt_autojoin(wlandev, msg);
386 break;
387 case DIDmsg_lnxreq_commsquality:{
388 p80211msg_lnxreq_commsquality_t *qualmsg;
390 pr_debug("Received commsquality request\n");
392 qualmsg = (p80211msg_lnxreq_commsquality_t *) msg;
394 qualmsg->link.status =
395 P80211ENUM_msgitem_status_data_ok;
396 qualmsg->level.status =
397 P80211ENUM_msgitem_status_data_ok;
398 qualmsg->noise.status =
399 P80211ENUM_msgitem_status_data_ok;
401 qualmsg->link.data = le16_to_cpu(hw->qual.CQ_currBSS);
402 qualmsg->level.data = le16_to_cpu(hw->qual.ASL_currBSS);
403 qualmsg->noise.data = le16_to_cpu(hw->qual.ANL_currFC);
405 break;
407 default:
408 printk(KERN_WARNING "Unknown mgmt request message 0x%08x",
409 msg->msgcode);
410 break;
413 return result;
416 /*----------------------------------------------------------------
417 * prism2sta_ifstate
419 * Interface state. This is the primary WLAN interface enable/disable
420 * handler. Following the driver/load/deviceprobe sequence, this
421 * function must be called with a state of "enable" before any other
422 * commands will be accepted.
424 * Arguments:
425 * wlandev wlan device structure
426 * msgp ptr to msg buffer
428 * Returns:
429 * A p80211 message resultcode value.
431 * Side effects:
433 * Call context:
434 * process thread (usually)
435 * interrupt
436 ----------------------------------------------------------------*/
437 u32 prism2sta_ifstate(wlandevice_t *wlandev, u32 ifstate)
439 hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
440 u32 result;
442 result = P80211ENUM_resultcode_implementation_failure;
444 pr_debug("Current MSD state(%d), requesting(%d)\n",
445 wlandev->msdstate, ifstate);
446 switch (ifstate) {
447 case P80211ENUM_ifstate_fwload:
448 switch (wlandev->msdstate) {
449 case WLAN_MSD_HWPRESENT:
450 wlandev->msdstate = WLAN_MSD_FWLOAD_PENDING;
452 * Initialize the device+driver sufficiently
453 * for firmware loading.
455 result = hfa384x_drvr_start(hw);
456 if (result) {
457 printk(KERN_ERR
458 "hfa384x_drvr_start() failed,"
459 "result=%d\n", (int)result);
460 result =
461 P80211ENUM_resultcode_implementation_failure;
462 wlandev->msdstate = WLAN_MSD_HWPRESENT;
463 break;
465 wlandev->msdstate = WLAN_MSD_FWLOAD;
466 result = P80211ENUM_resultcode_success;
467 break;
468 case WLAN_MSD_FWLOAD:
469 hfa384x_cmd_initialize(hw);
470 result = P80211ENUM_resultcode_success;
471 break;
472 case WLAN_MSD_RUNNING:
473 printk(KERN_WARNING
474 "Cannot enter fwload state from enable state,"
475 "you must disable first.\n");
476 result = P80211ENUM_resultcode_invalid_parameters;
477 break;
478 case WLAN_MSD_HWFAIL:
479 default:
480 /* probe() had a problem or the msdstate contains
481 * an unrecognized value, there's nothing we can do.
483 result = P80211ENUM_resultcode_implementation_failure;
484 break;
486 break;
487 case P80211ENUM_ifstate_enable:
488 switch (wlandev->msdstate) {
489 case WLAN_MSD_HWPRESENT:
490 case WLAN_MSD_FWLOAD:
491 wlandev->msdstate = WLAN_MSD_RUNNING_PENDING;
492 /* Initialize the device+driver for full
493 * operation. Note that this might me an FWLOAD to
494 * to RUNNING transition so we must not do a chip
495 * or board level reset. Note that on failure,
496 * the MSD state is set to HWPRESENT because we
497 * can't make any assumptions about the state
498 * of the hardware or a previous firmware load.
500 result = hfa384x_drvr_start(hw);
501 if (result) {
502 printk(KERN_ERR
503 "hfa384x_drvr_start() failed,"
504 "result=%d\n", (int)result);
505 result =
506 P80211ENUM_resultcode_implementation_failure;
507 wlandev->msdstate = WLAN_MSD_HWPRESENT;
508 break;
511 result = prism2sta_getcardinfo(wlandev);
512 if (result) {
513 printk(KERN_ERR
514 "prism2sta_getcardinfo() failed,"
515 "result=%d\n", (int)result);
516 result =
517 P80211ENUM_resultcode_implementation_failure;
518 hfa384x_drvr_stop(hw);
519 wlandev->msdstate = WLAN_MSD_HWPRESENT;
520 break;
522 result = prism2sta_globalsetup(wlandev);
523 if (result) {
524 printk(KERN_ERR
525 "prism2sta_globalsetup() failed,"
526 "result=%d\n", (int)result);
527 result =
528 P80211ENUM_resultcode_implementation_failure;
529 hfa384x_drvr_stop(hw);
530 wlandev->msdstate = WLAN_MSD_HWPRESENT;
531 break;
533 wlandev->msdstate = WLAN_MSD_RUNNING;
534 hw->join_ap = 0;
535 hw->join_retries = 60;
536 result = P80211ENUM_resultcode_success;
537 break;
538 case WLAN_MSD_RUNNING:
539 /* Do nothing, we're already in this state. */
540 result = P80211ENUM_resultcode_success;
541 break;
542 case WLAN_MSD_HWFAIL:
543 default:
544 /* probe() had a problem or the msdstate contains
545 * an unrecognized value, there's nothing we can do.
547 result = P80211ENUM_resultcode_implementation_failure;
548 break;
550 break;
551 case P80211ENUM_ifstate_disable:
552 switch (wlandev->msdstate) {
553 case WLAN_MSD_HWPRESENT:
554 /* Do nothing, we're already in this state. */
555 result = P80211ENUM_resultcode_success;
556 break;
557 case WLAN_MSD_FWLOAD:
558 case WLAN_MSD_RUNNING:
559 wlandev->msdstate = WLAN_MSD_HWPRESENT_PENDING;
561 * TODO: Shut down the MAC completely. Here a chip
562 * or board level reset is probably called for.
563 * After a "disable" _all_ results are lost, even
564 * those from a fwload.
566 if (!wlandev->hwremoved)
567 netif_carrier_off(wlandev->netdev);
569 hfa384x_drvr_stop(hw);
571 wlandev->macmode = WLAN_MACMODE_NONE;
572 wlandev->msdstate = WLAN_MSD_HWPRESENT;
573 result = P80211ENUM_resultcode_success;
574 break;
575 case WLAN_MSD_HWFAIL:
576 default:
577 /* probe() had a problem or the msdstate contains
578 * an unrecognized value, there's nothing we can do.
580 result = P80211ENUM_resultcode_implementation_failure;
581 break;
583 break;
584 default:
585 result = P80211ENUM_resultcode_invalid_parameters;
586 break;
589 return result;
592 /*----------------------------------------------------------------
593 * prism2sta_getcardinfo
595 * Collect the NICID, firmware version and any other identifiers
596 * we'd like to have in host-side data structures.
598 * Arguments:
599 * wlandev wlan device structure
601 * Returns:
602 * 0 success
603 * >0 f/w reported error
604 * <0 driver reported error
606 * Side effects:
608 * Call context:
609 * Either.
610 ----------------------------------------------------------------*/
611 static int prism2sta_getcardinfo(wlandevice_t *wlandev)
613 int result = 0;
614 hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
615 u16 temp;
616 u8 snum[HFA384x_RID_NICSERIALNUMBER_LEN];
617 char pstr[(HFA384x_RID_NICSERIALNUMBER_LEN * 4) + 1];
619 /* Collect version and compatibility info */
620 /* Some are critical, some are not */
621 /* NIC identity */
622 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_NICIDENTITY,
623 &hw->ident_nic,
624 sizeof(hfa384x_compident_t));
625 if (result) {
626 printk(KERN_ERR "Failed to retrieve NICIDENTITY\n");
627 goto failed;
630 /* get all the nic id fields in host byte order */
631 hw->ident_nic.id = le16_to_cpu(hw->ident_nic.id);
632 hw->ident_nic.variant = le16_to_cpu(hw->ident_nic.variant);
633 hw->ident_nic.major = le16_to_cpu(hw->ident_nic.major);
634 hw->ident_nic.minor = le16_to_cpu(hw->ident_nic.minor);
636 printk(KERN_INFO "ident: nic h/w: id=0x%02x %d.%d.%d\n",
637 hw->ident_nic.id, hw->ident_nic.major,
638 hw->ident_nic.minor, hw->ident_nic.variant);
640 /* Primary f/w identity */
641 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_PRIIDENTITY,
642 &hw->ident_pri_fw,
643 sizeof(hfa384x_compident_t));
644 if (result) {
645 printk(KERN_ERR "Failed to retrieve PRIIDENTITY\n");
646 goto failed;
649 /* get all the private fw id fields in host byte order */
650 hw->ident_pri_fw.id = le16_to_cpu(hw->ident_pri_fw.id);
651 hw->ident_pri_fw.variant = le16_to_cpu(hw->ident_pri_fw.variant);
652 hw->ident_pri_fw.major = le16_to_cpu(hw->ident_pri_fw.major);
653 hw->ident_pri_fw.minor = le16_to_cpu(hw->ident_pri_fw.minor);
655 printk(KERN_INFO "ident: pri f/w: id=0x%02x %d.%d.%d\n",
656 hw->ident_pri_fw.id, hw->ident_pri_fw.major,
657 hw->ident_pri_fw.minor, hw->ident_pri_fw.variant);
659 /* Station (Secondary?) f/w identity */
660 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_STAIDENTITY,
661 &hw->ident_sta_fw,
662 sizeof(hfa384x_compident_t));
663 if (result) {
664 printk(KERN_ERR "Failed to retrieve STAIDENTITY\n");
665 goto failed;
668 if (hw->ident_nic.id < 0x8000) {
669 printk(KERN_ERR
670 "FATAL: Card is not an Intersil Prism2/2.5/3\n");
671 result = -1;
672 goto failed;
675 /* get all the station fw id fields in host byte order */
676 hw->ident_sta_fw.id = le16_to_cpu(hw->ident_sta_fw.id);
677 hw->ident_sta_fw.variant = le16_to_cpu(hw->ident_sta_fw.variant);
678 hw->ident_sta_fw.major = le16_to_cpu(hw->ident_sta_fw.major);
679 hw->ident_sta_fw.minor = le16_to_cpu(hw->ident_sta_fw.minor);
681 /* strip out the 'special' variant bits */
682 hw->mm_mods = hw->ident_sta_fw.variant & (BIT(14) | BIT(15));
683 hw->ident_sta_fw.variant &= ~((u16) (BIT(14) | BIT(15)));
685 if (hw->ident_sta_fw.id == 0x1f) {
686 printk(KERN_INFO
687 "ident: sta f/w: id=0x%02x %d.%d.%d\n",
688 hw->ident_sta_fw.id, hw->ident_sta_fw.major,
689 hw->ident_sta_fw.minor, hw->ident_sta_fw.variant);
690 } else {
691 printk(KERN_INFO
692 "ident: ap f/w: id=0x%02x %d.%d.%d\n",
693 hw->ident_sta_fw.id, hw->ident_sta_fw.major,
694 hw->ident_sta_fw.minor, hw->ident_sta_fw.variant);
695 printk(KERN_ERR "Unsupported Tertiary AP firmeare loaded!\n");
696 goto failed;
699 /* Compatibility range, Modem supplier */
700 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_MFISUPRANGE,
701 &hw->cap_sup_mfi,
702 sizeof(hfa384x_caplevel_t));
703 if (result) {
704 printk(KERN_ERR "Failed to retrieve MFISUPRANGE\n");
705 goto failed;
708 /* get all the Compatibility range, modem interface supplier
709 fields in byte order */
710 hw->cap_sup_mfi.role = le16_to_cpu(hw->cap_sup_mfi.role);
711 hw->cap_sup_mfi.id = le16_to_cpu(hw->cap_sup_mfi.id);
712 hw->cap_sup_mfi.variant = le16_to_cpu(hw->cap_sup_mfi.variant);
713 hw->cap_sup_mfi.bottom = le16_to_cpu(hw->cap_sup_mfi.bottom);
714 hw->cap_sup_mfi.top = le16_to_cpu(hw->cap_sup_mfi.top);
716 printk(KERN_INFO
717 "MFI:SUP:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n",
718 hw->cap_sup_mfi.role, hw->cap_sup_mfi.id,
719 hw->cap_sup_mfi.variant, hw->cap_sup_mfi.bottom,
720 hw->cap_sup_mfi.top);
722 /* Compatibility range, Controller supplier */
723 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_CFISUPRANGE,
724 &hw->cap_sup_cfi,
725 sizeof(hfa384x_caplevel_t));
726 if (result) {
727 printk(KERN_ERR "Failed to retrieve CFISUPRANGE\n");
728 goto failed;
731 /* get all the Compatibility range, controller interface supplier
732 fields in byte order */
733 hw->cap_sup_cfi.role = le16_to_cpu(hw->cap_sup_cfi.role);
734 hw->cap_sup_cfi.id = le16_to_cpu(hw->cap_sup_cfi.id);
735 hw->cap_sup_cfi.variant = le16_to_cpu(hw->cap_sup_cfi.variant);
736 hw->cap_sup_cfi.bottom = le16_to_cpu(hw->cap_sup_cfi.bottom);
737 hw->cap_sup_cfi.top = le16_to_cpu(hw->cap_sup_cfi.top);
739 printk(KERN_INFO
740 "CFI:SUP:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n",
741 hw->cap_sup_cfi.role, hw->cap_sup_cfi.id,
742 hw->cap_sup_cfi.variant, hw->cap_sup_cfi.bottom,
743 hw->cap_sup_cfi.top);
745 /* Compatibility range, Primary f/w supplier */
746 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_PRISUPRANGE,
747 &hw->cap_sup_pri,
748 sizeof(hfa384x_caplevel_t));
749 if (result) {
750 printk(KERN_ERR "Failed to retrieve PRISUPRANGE\n");
751 goto failed;
754 /* get all the Compatibility range, primary firmware supplier
755 fields in byte order */
756 hw->cap_sup_pri.role = le16_to_cpu(hw->cap_sup_pri.role);
757 hw->cap_sup_pri.id = le16_to_cpu(hw->cap_sup_pri.id);
758 hw->cap_sup_pri.variant = le16_to_cpu(hw->cap_sup_pri.variant);
759 hw->cap_sup_pri.bottom = le16_to_cpu(hw->cap_sup_pri.bottom);
760 hw->cap_sup_pri.top = le16_to_cpu(hw->cap_sup_pri.top);
762 printk(KERN_INFO
763 "PRI:SUP:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n",
764 hw->cap_sup_pri.role, hw->cap_sup_pri.id,
765 hw->cap_sup_pri.variant, hw->cap_sup_pri.bottom,
766 hw->cap_sup_pri.top);
768 /* Compatibility range, Station f/w supplier */
769 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_STASUPRANGE,
770 &hw->cap_sup_sta,
771 sizeof(hfa384x_caplevel_t));
772 if (result) {
773 printk(KERN_ERR "Failed to retrieve STASUPRANGE\n");
774 goto failed;
777 /* get all the Compatibility range, station firmware supplier
778 fields in byte order */
779 hw->cap_sup_sta.role = le16_to_cpu(hw->cap_sup_sta.role);
780 hw->cap_sup_sta.id = le16_to_cpu(hw->cap_sup_sta.id);
781 hw->cap_sup_sta.variant = le16_to_cpu(hw->cap_sup_sta.variant);
782 hw->cap_sup_sta.bottom = le16_to_cpu(hw->cap_sup_sta.bottom);
783 hw->cap_sup_sta.top = le16_to_cpu(hw->cap_sup_sta.top);
785 if (hw->cap_sup_sta.id == 0x04) {
786 printk(KERN_INFO
787 "STA:SUP:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n",
788 hw->cap_sup_sta.role, hw->cap_sup_sta.id,
789 hw->cap_sup_sta.variant, hw->cap_sup_sta.bottom,
790 hw->cap_sup_sta.top);
791 } else {
792 printk(KERN_INFO
793 "AP:SUP:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n",
794 hw->cap_sup_sta.role, hw->cap_sup_sta.id,
795 hw->cap_sup_sta.variant, hw->cap_sup_sta.bottom,
796 hw->cap_sup_sta.top);
799 /* Compatibility range, primary f/w actor, CFI supplier */
800 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_PRI_CFIACTRANGES,
801 &hw->cap_act_pri_cfi,
802 sizeof(hfa384x_caplevel_t));
803 if (result) {
804 printk(KERN_ERR "Failed to retrieve PRI_CFIACTRANGES\n");
805 goto failed;
808 /* get all the Compatibility range, primary f/w actor, CFI supplier
809 fields in byte order */
810 hw->cap_act_pri_cfi.role = le16_to_cpu(hw->cap_act_pri_cfi.role);
811 hw->cap_act_pri_cfi.id = le16_to_cpu(hw->cap_act_pri_cfi.id);
812 hw->cap_act_pri_cfi.variant = le16_to_cpu(hw->cap_act_pri_cfi.variant);
813 hw->cap_act_pri_cfi.bottom = le16_to_cpu(hw->cap_act_pri_cfi.bottom);
814 hw->cap_act_pri_cfi.top = le16_to_cpu(hw->cap_act_pri_cfi.top);
816 printk(KERN_INFO
817 "PRI-CFI:ACT:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n",
818 hw->cap_act_pri_cfi.role, hw->cap_act_pri_cfi.id,
819 hw->cap_act_pri_cfi.variant, hw->cap_act_pri_cfi.bottom,
820 hw->cap_act_pri_cfi.top);
822 /* Compatibility range, sta f/w actor, CFI supplier */
823 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_STA_CFIACTRANGES,
824 &hw->cap_act_sta_cfi,
825 sizeof(hfa384x_caplevel_t));
826 if (result) {
827 printk(KERN_ERR "Failed to retrieve STA_CFIACTRANGES\n");
828 goto failed;
831 /* get all the Compatibility range, station f/w actor, CFI supplier
832 fields in byte order */
833 hw->cap_act_sta_cfi.role = le16_to_cpu(hw->cap_act_sta_cfi.role);
834 hw->cap_act_sta_cfi.id = le16_to_cpu(hw->cap_act_sta_cfi.id);
835 hw->cap_act_sta_cfi.variant = le16_to_cpu(hw->cap_act_sta_cfi.variant);
836 hw->cap_act_sta_cfi.bottom = le16_to_cpu(hw->cap_act_sta_cfi.bottom);
837 hw->cap_act_sta_cfi.top = le16_to_cpu(hw->cap_act_sta_cfi.top);
839 printk(KERN_INFO
840 "STA-CFI:ACT:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n",
841 hw->cap_act_sta_cfi.role, hw->cap_act_sta_cfi.id,
842 hw->cap_act_sta_cfi.variant, hw->cap_act_sta_cfi.bottom,
843 hw->cap_act_sta_cfi.top);
845 /* Compatibility range, sta f/w actor, MFI supplier */
846 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_STA_MFIACTRANGES,
847 &hw->cap_act_sta_mfi,
848 sizeof(hfa384x_caplevel_t));
849 if (result) {
850 printk(KERN_ERR "Failed to retrieve STA_MFIACTRANGES\n");
851 goto failed;
854 /* get all the Compatibility range, station f/w actor, MFI supplier
855 fields in byte order */
856 hw->cap_act_sta_mfi.role = le16_to_cpu(hw->cap_act_sta_mfi.role);
857 hw->cap_act_sta_mfi.id = le16_to_cpu(hw->cap_act_sta_mfi.id);
858 hw->cap_act_sta_mfi.variant = le16_to_cpu(hw->cap_act_sta_mfi.variant);
859 hw->cap_act_sta_mfi.bottom = le16_to_cpu(hw->cap_act_sta_mfi.bottom);
860 hw->cap_act_sta_mfi.top = le16_to_cpu(hw->cap_act_sta_mfi.top);
862 printk(KERN_INFO
863 "STA-MFI:ACT:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n",
864 hw->cap_act_sta_mfi.role, hw->cap_act_sta_mfi.id,
865 hw->cap_act_sta_mfi.variant, hw->cap_act_sta_mfi.bottom,
866 hw->cap_act_sta_mfi.top);
868 /* Serial Number */
869 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_NICSERIALNUMBER,
870 snum, HFA384x_RID_NICSERIALNUMBER_LEN);
871 if (!result) {
872 wlan_mkprintstr(snum, HFA384x_RID_NICSERIALNUMBER_LEN,
873 pstr, sizeof(pstr));
874 printk(KERN_INFO "Prism2 card SN: %s\n", pstr);
875 } else {
876 printk(KERN_ERR "Failed to retrieve Prism2 Card SN\n");
877 goto failed;
880 /* Collect the MAC address */
881 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_CNFOWNMACADDR,
882 wlandev->netdev->dev_addr, ETH_ALEN);
883 if (result != 0) {
884 printk(KERN_ERR "Failed to retrieve mac address\n");
885 goto failed;
888 /* short preamble is always implemented */
889 wlandev->nsdcaps |= P80211_NSDCAP_SHORT_PREAMBLE;
891 /* find out if hardware wep is implemented */
892 hfa384x_drvr_getconfig16(hw, HFA384x_RID_PRIVACYOPTIMP, &temp);
893 if (temp)
894 wlandev->nsdcaps |= P80211_NSDCAP_HARDWAREWEP;
896 /* get the dBm Scaling constant */
897 hfa384x_drvr_getconfig16(hw, HFA384x_RID_CNFDBMADJUST, &temp);
898 hw->dbmadjust = temp;
900 /* Only enable scan by default on newer firmware */
901 if (HFA384x_FIRMWARE_VERSION(hw->ident_sta_fw.major,
902 hw->ident_sta_fw.minor,
903 hw->ident_sta_fw.variant) <
904 HFA384x_FIRMWARE_VERSION(1, 5, 5)) {
905 wlandev->nsdcaps |= P80211_NSDCAP_NOSCAN;
908 /* TODO: Set any internally managed config items */
910 goto done;
911 failed:
912 printk(KERN_ERR "Failed, result=%d\n", result);
913 done:
914 return result;
917 /*----------------------------------------------------------------
918 * prism2sta_globalsetup
920 * Set any global RIDs that we want to set at device activation.
922 * Arguments:
923 * wlandev wlan device structure
925 * Returns:
926 * 0 success
927 * >0 f/w reported error
928 * <0 driver reported error
930 * Side effects:
932 * Call context:
933 * process thread
934 ----------------------------------------------------------------*/
935 static int prism2sta_globalsetup(wlandevice_t *wlandev)
937 hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
939 /* Set the maximum frame size */
940 return hfa384x_drvr_setconfig16(hw, HFA384x_RID_CNFMAXDATALEN,
941 WLAN_DATA_MAXLEN);
944 static int prism2sta_setmulticast(wlandevice_t *wlandev, netdevice_t *dev)
946 int result = 0;
947 hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
949 u16 promisc;
951 /* If we're not ready, what's the point? */
952 if (hw->state != HFA384x_STATE_RUNNING)
953 goto exit;
955 if ((dev->flags & (IFF_PROMISC | IFF_ALLMULTI)) != 0)
956 promisc = P80211ENUM_truth_true;
957 else
958 promisc = P80211ENUM_truth_false;
960 result =
961 hfa384x_drvr_setconfig16_async(hw, HFA384x_RID_PROMISCMODE,
962 promisc);
963 exit:
964 return result;
967 /*----------------------------------------------------------------
968 * prism2sta_inf_handover
970 * Handles the receipt of a Handover info frame. Should only be present
971 * in APs only.
973 * Arguments:
974 * wlandev wlan device structure
975 * inf ptr to info frame (contents in hfa384x order)
977 * Returns:
978 * nothing
980 * Side effects:
982 * Call context:
983 * interrupt
984 ----------------------------------------------------------------*/
985 static void prism2sta_inf_handover(wlandevice_t *wlandev,
986 hfa384x_InfFrame_t *inf)
988 pr_debug("received infoframe:HANDOVER (unhandled)\n");
989 return;
992 /*----------------------------------------------------------------
993 * prism2sta_inf_tallies
995 * Handles the receipt of a CommTallies info frame.
997 * Arguments:
998 * wlandev wlan device structure
999 * inf ptr to info frame (contents in hfa384x order)
1001 * Returns:
1002 * nothing
1004 * Side effects:
1006 * Call context:
1007 * interrupt
1008 ----------------------------------------------------------------*/
1009 static void prism2sta_inf_tallies(wlandevice_t *wlandev,
1010 hfa384x_InfFrame_t *inf)
1012 hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
1013 u16 *src16;
1014 u32 *dst;
1015 u32 *src32;
1016 int i;
1017 int cnt;
1020 ** Determine if these are 16-bit or 32-bit tallies, based on the
1021 ** record length of the info record.
1024 cnt = sizeof(hfa384x_CommTallies32_t) / sizeof(u32);
1025 if (inf->framelen > 22) {
1026 dst = (u32 *) &hw->tallies;
1027 src32 = (u32 *) &inf->info.commtallies32;
1028 for (i = 0; i < cnt; i++, dst++, src32++)
1029 *dst += le32_to_cpu(*src32);
1030 } else {
1031 dst = (u32 *) &hw->tallies;
1032 src16 = (u16 *) &inf->info.commtallies16;
1033 for (i = 0; i < cnt; i++, dst++, src16++)
1034 *dst += le16_to_cpu(*src16);
1037 return;
1040 /*----------------------------------------------------------------
1041 * prism2sta_inf_scanresults
1043 * Handles the receipt of a Scan Results info frame.
1045 * Arguments:
1046 * wlandev wlan device structure
1047 * inf ptr to info frame (contents in hfa384x order)
1049 * Returns:
1050 * nothing
1052 * Side effects:
1054 * Call context:
1055 * interrupt
1056 ----------------------------------------------------------------*/
1057 static void prism2sta_inf_scanresults(wlandevice_t *wlandev,
1058 hfa384x_InfFrame_t *inf)
1061 hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
1062 int nbss;
1063 hfa384x_ScanResult_t *sr = &(inf->info.scanresult);
1064 int i;
1065 hfa384x_JoinRequest_data_t joinreq;
1066 int result;
1068 /* Get the number of results, first in bytes, then in results */
1069 nbss = (inf->framelen * sizeof(u16)) -
1070 sizeof(inf->infotype) - sizeof(inf->info.scanresult.scanreason);
1071 nbss /= sizeof(hfa384x_ScanResultSub_t);
1073 /* Print em */
1074 pr_debug("rx scanresults, reason=%d, nbss=%d:\n",
1075 inf->info.scanresult.scanreason, nbss);
1076 for (i = 0; i < nbss; i++) {
1077 pr_debug("chid=%d anl=%d sl=%d bcnint=%d\n",
1078 sr->result[i].chid,
1079 sr->result[i].anl,
1080 sr->result[i].sl, sr->result[i].bcnint);
1081 pr_debug(" capinfo=0x%04x proberesp_rate=%d\n",
1082 sr->result[i].capinfo, sr->result[i].proberesp_rate);
1084 /* issue a join request */
1085 joinreq.channel = sr->result[0].chid;
1086 memcpy(joinreq.bssid, sr->result[0].bssid, WLAN_BSSID_LEN);
1087 result = hfa384x_drvr_setconfig(hw,
1088 HFA384x_RID_JOINREQUEST,
1089 &joinreq, HFA384x_RID_JOINREQUEST_LEN);
1090 if (result) {
1091 printk(KERN_ERR "setconfig(joinreq) failed, result=%d\n",
1092 result);
1095 return;
1098 /*----------------------------------------------------------------
1099 * prism2sta_inf_hostscanresults
1101 * Handles the receipt of a Scan Results info frame.
1103 * Arguments:
1104 * wlandev wlan device structure
1105 * inf ptr to info frame (contents in hfa384x order)
1107 * Returns:
1108 * nothing
1110 * Side effects:
1112 * Call context:
1113 * interrupt
1114 ----------------------------------------------------------------*/
1115 static void prism2sta_inf_hostscanresults(wlandevice_t *wlandev,
1116 hfa384x_InfFrame_t *inf)
1118 hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
1119 int nbss;
1121 nbss = (inf->framelen - 3) / 32;
1122 pr_debug("Received %d hostscan results\n", nbss);
1124 if (nbss > 32)
1125 nbss = 32;
1127 kfree(hw->scanresults);
1129 hw->scanresults = kmalloc(sizeof(hfa384x_InfFrame_t), GFP_ATOMIC);
1130 memcpy(hw->scanresults, inf, sizeof(hfa384x_InfFrame_t));
1132 if (nbss == 0)
1133 nbss = -1;
1135 /* Notify/wake the sleeping caller. */
1136 hw->scanflag = nbss;
1137 wake_up_interruptible(&hw->cmdq);
1140 /*----------------------------------------------------------------
1141 * prism2sta_inf_chinforesults
1143 * Handles the receipt of a Channel Info Results info frame.
1145 * Arguments:
1146 * wlandev wlan device structure
1147 * inf ptr to info frame (contents in hfa384x order)
1149 * Returns:
1150 * nothing
1152 * Side effects:
1154 * Call context:
1155 * interrupt
1156 ----------------------------------------------------------------*/
1157 static void prism2sta_inf_chinforesults(wlandevice_t *wlandev,
1158 hfa384x_InfFrame_t *inf)
1160 hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
1161 unsigned int i, n;
1163 hw->channel_info.results.scanchannels =
1164 le16_to_cpu(inf->info.chinforesult.scanchannels);
1166 for (i = 0, n = 0; i < HFA384x_CHINFORESULT_MAX; i++) {
1167 if (hw->channel_info.results.scanchannels & (1 << i)) {
1168 int channel =
1169 le16_to_cpu(inf->info.chinforesult.result[n].chid) -
1171 hfa384x_ChInfoResultSub_t *chinforesult =
1172 &hw->channel_info.results.result[channel];
1173 chinforesult->chid = channel;
1174 chinforesult->anl =
1175 le16_to_cpu(inf->info.chinforesult.result[n].anl);
1176 chinforesult->pnl =
1177 le16_to_cpu(inf->info.chinforesult.result[n].pnl);
1178 chinforesult->active =
1179 le16_to_cpu(inf->info.chinforesult.result[n].
1180 active);
1181 pr_debug
1182 ("chinfo: channel %d, %s level (avg/peak)=%d/%d dB, pcf %d\n",
1183 channel + 1,
1184 chinforesult->
1185 active & HFA384x_CHINFORESULT_BSSACTIVE ? "signal"
1186 : "noise", chinforesult->anl, chinforesult->pnl,
1187 chinforesult->
1188 active & HFA384x_CHINFORESULT_PCFACTIVE ? 1 : 0);
1189 n++;
1192 atomic_set(&hw->channel_info.done, 2);
1194 hw->channel_info.count = n;
1195 return;
1198 void prism2sta_processing_defer(struct work_struct *data)
1200 hfa384x_t *hw = container_of(data, struct hfa384x, link_bh);
1201 wlandevice_t *wlandev = hw->wlandev;
1202 hfa384x_bytestr32_t ssid;
1203 int result;
1205 /* First let's process the auth frames */
1207 struct sk_buff *skb;
1208 hfa384x_InfFrame_t *inf;
1210 while ((skb = skb_dequeue(&hw->authq))) {
1211 inf = (hfa384x_InfFrame_t *) skb->data;
1212 prism2sta_inf_authreq_defer(wlandev, inf);
1217 /* Now let's handle the linkstatus stuff */
1218 if (hw->link_status == hw->link_status_new)
1219 goto failed;
1221 hw->link_status = hw->link_status_new;
1223 switch (hw->link_status) {
1224 case HFA384x_LINK_NOTCONNECTED:
1225 /* I'm currently assuming that this is the initial link
1226 * state. It should only be possible immediately
1227 * following an Enable command.
1228 * Response:
1229 * Block Transmits, Ignore receives of data frames
1231 netif_carrier_off(wlandev->netdev);
1233 printk(KERN_INFO "linkstatus=NOTCONNECTED (unhandled)\n");
1234 break;
1236 case HFA384x_LINK_CONNECTED:
1237 /* This one indicates a successful scan/join/auth/assoc.
1238 * When we have the full MLME complement, this event will
1239 * signify successful completion of both mlme_authenticate
1240 * and mlme_associate. State management will get a little
1241 * ugly here.
1242 * Response:
1243 * Indicate authentication and/or association
1244 * Enable Transmits, Receives and pass up data frames
1247 netif_carrier_on(wlandev->netdev);
1249 /* If we are joining a specific AP, set our state and reset retries */
1250 if (hw->join_ap == 1)
1251 hw->join_ap = 2;
1252 hw->join_retries = 60;
1254 /* Don't call this in monitor mode */
1255 if (wlandev->netdev->type == ARPHRD_ETHER) {
1256 u16 portstatus;
1258 printk(KERN_INFO "linkstatus=CONNECTED\n");
1260 /* For non-usb devices, we can use the sync versions */
1261 /* Collect the BSSID, and set state to allow tx */
1263 result = hfa384x_drvr_getconfig(hw,
1264 HFA384x_RID_CURRENTBSSID,
1265 wlandev->bssid,
1266 WLAN_BSSID_LEN);
1267 if (result) {
1268 pr_debug
1269 ("getconfig(0x%02x) failed, result = %d\n",
1270 HFA384x_RID_CURRENTBSSID, result);
1271 goto failed;
1274 result = hfa384x_drvr_getconfig(hw,
1275 HFA384x_RID_CURRENTSSID,
1276 &ssid, sizeof(ssid));
1277 if (result) {
1278 pr_debug
1279 ("getconfig(0x%02x) failed, result = %d\n",
1280 HFA384x_RID_CURRENTSSID, result);
1281 goto failed;
1283 prism2mgmt_bytestr2pstr((hfa384x_bytestr_t *) &ssid,
1284 (p80211pstrd_t *) &
1285 wlandev->ssid);
1287 /* Collect the port status */
1288 result = hfa384x_drvr_getconfig16(hw,
1289 HFA384x_RID_PORTSTATUS,
1290 &portstatus);
1291 if (result) {
1292 pr_debug
1293 ("getconfig(0x%02x) failed, result = %d\n",
1294 HFA384x_RID_PORTSTATUS, result);
1295 goto failed;
1297 wlandev->macmode =
1298 (portstatus == HFA384x_PSTATUS_CONN_IBSS) ?
1299 WLAN_MACMODE_IBSS_STA : WLAN_MACMODE_ESS_STA;
1301 /* Get the ball rolling on the comms quality stuff */
1302 prism2sta_commsqual_defer(&hw->commsqual_bh);
1304 break;
1306 case HFA384x_LINK_DISCONNECTED:
1307 /* This one indicates that our association is gone. We've
1308 * lost connection with the AP and/or been disassociated.
1309 * This indicates that the MAC has completely cleared it's
1310 * associated state. We * should send a deauth indication
1311 * (implying disassoc) up * to the MLME.
1312 * Response:
1313 * Indicate Deauthentication
1314 * Block Transmits, Ignore receives of data frames
1316 if (hw->join_ap == 2) {
1317 hfa384x_JoinRequest_data_t joinreq;
1318 joinreq = hw->joinreq;
1319 /* Send the join request */
1320 hfa384x_drvr_setconfig(hw,
1321 HFA384x_RID_JOINREQUEST,
1322 &joinreq,
1323 HFA384x_RID_JOINREQUEST_LEN);
1324 printk(KERN_INFO
1325 "linkstatus=DISCONNECTED (re-submitting join)\n");
1326 } else {
1327 if (wlandev->netdev->type == ARPHRD_ETHER)
1328 printk(KERN_INFO
1329 "linkstatus=DISCONNECTED (unhandled)\n");
1331 wlandev->macmode = WLAN_MACMODE_NONE;
1333 netif_carrier_off(wlandev->netdev);
1335 break;
1337 case HFA384x_LINK_AP_CHANGE:
1338 /* This one indicates that the MAC has decided to and
1339 * successfully completed a change to another AP. We
1340 * should probably implement a reassociation indication
1341 * in response to this one. I'm thinking that the the
1342 * p80211 layer needs to be notified in case of
1343 * buffering/queueing issues. User mode also needs to be
1344 * notified so that any BSS dependent elements can be
1345 * updated.
1346 * associated state. We * should send a deauth indication
1347 * (implying disassoc) up * to the MLME.
1348 * Response:
1349 * Indicate Reassociation
1350 * Enable Transmits, Receives and pass up data frames
1352 printk(KERN_INFO "linkstatus=AP_CHANGE\n");
1354 result = hfa384x_drvr_getconfig(hw,
1355 HFA384x_RID_CURRENTBSSID,
1356 wlandev->bssid, WLAN_BSSID_LEN);
1357 if (result) {
1358 pr_debug("getconfig(0x%02x) failed, result = %d\n",
1359 HFA384x_RID_CURRENTBSSID, result);
1360 goto failed;
1363 result = hfa384x_drvr_getconfig(hw,
1364 HFA384x_RID_CURRENTSSID,
1365 &ssid, sizeof(ssid));
1366 if (result) {
1367 pr_debug("getconfig(0x%02x) failed, result = %d\n",
1368 HFA384x_RID_CURRENTSSID, result);
1369 goto failed;
1371 prism2mgmt_bytestr2pstr((hfa384x_bytestr_t *) &ssid,
1372 (p80211pstrd_t *) &wlandev->ssid);
1374 hw->link_status = HFA384x_LINK_CONNECTED;
1375 netif_carrier_on(wlandev->netdev);
1377 break;
1379 case HFA384x_LINK_AP_OUTOFRANGE:
1380 /* This one indicates that the MAC has decided that the
1381 * AP is out of range, but hasn't found a better candidate
1382 * so the MAC maintains its "associated" state in case
1383 * we get back in range. We should block transmits and
1384 * receives in this state. Do we need an indication here?
1385 * Probably not since a polling user-mode element would
1386 * get this status from from p2PortStatus(FD40). What about
1387 * p80211?
1388 * Response:
1389 * Block Transmits, Ignore receives of data frames
1391 printk(KERN_INFO "linkstatus=AP_OUTOFRANGE (unhandled)\n");
1393 netif_carrier_off(wlandev->netdev);
1395 break;
1397 case HFA384x_LINK_AP_INRANGE:
1398 /* This one indicates that the MAC has decided that the
1399 * AP is back in range. We continue working with our
1400 * existing association.
1401 * Response:
1402 * Enable Transmits, Receives and pass up data frames
1404 printk(KERN_INFO "linkstatus=AP_INRANGE\n");
1406 hw->link_status = HFA384x_LINK_CONNECTED;
1407 netif_carrier_on(wlandev->netdev);
1409 break;
1411 case HFA384x_LINK_ASSOCFAIL:
1412 /* This one is actually a peer to CONNECTED. We've
1413 * requested a join for a given SSID and optionally BSSID.
1414 * We can use this one to indicate authentication and
1415 * association failures. The trick is going to be
1416 * 1) identifying the failure, and 2) state management.
1417 * Response:
1418 * Disable Transmits, Ignore receives of data frames
1420 if (hw->join_ap && --hw->join_retries > 0) {
1421 hfa384x_JoinRequest_data_t joinreq;
1422 joinreq = hw->joinreq;
1423 /* Send the join request */
1424 hfa384x_drvr_setconfig(hw,
1425 HFA384x_RID_JOINREQUEST,
1426 &joinreq,
1427 HFA384x_RID_JOINREQUEST_LEN);
1428 printk(KERN_INFO
1429 "linkstatus=ASSOCFAIL (re-submitting join)\n");
1430 } else {
1431 printk(KERN_INFO "linkstatus=ASSOCFAIL (unhandled)\n");
1434 netif_carrier_off(wlandev->netdev);
1436 break;
1438 default:
1439 /* This is bad, IO port problems? */
1440 printk(KERN_WARNING
1441 "unknown linkstatus=0x%02x\n", hw->link_status);
1442 goto failed;
1443 break;
1446 wlandev->linkstatus = (hw->link_status == HFA384x_LINK_CONNECTED);
1447 p80211wext_event_associated(wlandev, wlandev->linkstatus);
1449 failed:
1450 return;
1453 /*----------------------------------------------------------------
1454 * prism2sta_inf_linkstatus
1456 * Handles the receipt of a Link Status info frame.
1458 * Arguments:
1459 * wlandev wlan device structure
1460 * inf ptr to info frame (contents in hfa384x order)
1462 * Returns:
1463 * nothing
1465 * Side effects:
1467 * Call context:
1468 * interrupt
1469 ----------------------------------------------------------------*/
1470 static void prism2sta_inf_linkstatus(wlandevice_t *wlandev,
1471 hfa384x_InfFrame_t *inf)
1473 hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
1475 hw->link_status_new = le16_to_cpu(inf->info.linkstatus.linkstatus);
1477 schedule_work(&hw->link_bh);
1479 return;
1482 /*----------------------------------------------------------------
1483 * prism2sta_inf_assocstatus
1485 * Handles the receipt of an Association Status info frame. Should
1486 * be present in APs only.
1488 * Arguments:
1489 * wlandev wlan device structure
1490 * inf ptr to info frame (contents in hfa384x order)
1492 * Returns:
1493 * nothing
1495 * Side effects:
1497 * Call context:
1498 * interrupt
1499 ----------------------------------------------------------------*/
1500 static void prism2sta_inf_assocstatus(wlandevice_t *wlandev,
1501 hfa384x_InfFrame_t *inf)
1503 hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
1504 hfa384x_AssocStatus_t rec;
1505 int i;
1507 memcpy(&rec, &inf->info.assocstatus, sizeof(rec));
1508 rec.assocstatus = le16_to_cpu(rec.assocstatus);
1509 rec.reason = le16_to_cpu(rec.reason);
1512 ** Find the address in the list of authenticated stations. If it wasn't
1513 ** found, then this address has not been previously authenticated and
1514 ** something weird has happened if this is anything other than an
1515 ** "authentication failed" message. If the address was found, then
1516 ** set the "associated" flag for that station, based on whether the
1517 ** station is associating or losing its association. Something weird
1518 ** has also happened if we find the address in the list of authenticated
1519 ** stations but we are getting an "authentication failed" message.
1522 for (i = 0; i < hw->authlist.cnt; i++)
1523 if (memcmp(rec.sta_addr, hw->authlist.addr[i], ETH_ALEN) == 0)
1524 break;
1526 if (i >= hw->authlist.cnt) {
1527 if (rec.assocstatus != HFA384x_ASSOCSTATUS_AUTHFAIL)
1528 printk(KERN_WARNING
1529 "assocstatus info frame received for non-authenticated station.\n");
1530 } else {
1531 hw->authlist.assoc[i] =
1532 (rec.assocstatus == HFA384x_ASSOCSTATUS_STAASSOC ||
1533 rec.assocstatus == HFA384x_ASSOCSTATUS_REASSOC);
1535 if (rec.assocstatus == HFA384x_ASSOCSTATUS_AUTHFAIL)
1536 printk(KERN_WARNING
1537 "authfail assocstatus info frame received for authenticated station.\n");
1540 return;
1543 /*----------------------------------------------------------------
1544 * prism2sta_inf_authreq
1546 * Handles the receipt of an Authentication Request info frame. Should
1547 * be present in APs only.
1549 * Arguments:
1550 * wlandev wlan device structure
1551 * inf ptr to info frame (contents in hfa384x order)
1553 * Returns:
1554 * nothing
1556 * Side effects:
1558 * Call context:
1559 * interrupt
1561 ----------------------------------------------------------------*/
1562 static void prism2sta_inf_authreq(wlandevice_t *wlandev,
1563 hfa384x_InfFrame_t *inf)
1565 hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
1566 struct sk_buff *skb;
1568 skb = dev_alloc_skb(sizeof(*inf));
1569 if (skb) {
1570 skb_put(skb, sizeof(*inf));
1571 memcpy(skb->data, inf, sizeof(*inf));
1572 skb_queue_tail(&hw->authq, skb);
1573 schedule_work(&hw->link_bh);
1577 static void prism2sta_inf_authreq_defer(wlandevice_t *wlandev,
1578 hfa384x_InfFrame_t *inf)
1580 hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
1581 hfa384x_authenticateStation_data_t rec;
1583 int i, added, result, cnt;
1584 u8 *addr;
1587 ** Build the AuthenticateStation record. Initialize it for denying
1588 ** authentication.
1591 memcpy(rec.address, inf->info.authreq.sta_addr, ETH_ALEN);
1592 rec.status = P80211ENUM_status_unspec_failure;
1595 ** Authenticate based on the access mode.
1598 switch (hw->accessmode) {
1599 case WLAN_ACCESS_NONE:
1602 ** Deny all new authentications. However, if a station
1603 ** is ALREADY authenticated, then accept it.
1606 for (i = 0; i < hw->authlist.cnt; i++)
1607 if (memcmp(rec.address, hw->authlist.addr[i],
1608 ETH_ALEN) == 0) {
1609 rec.status = P80211ENUM_status_successful;
1610 break;
1613 break;
1615 case WLAN_ACCESS_ALL:
1618 ** Allow all authentications.
1621 rec.status = P80211ENUM_status_successful;
1622 break;
1624 case WLAN_ACCESS_ALLOW:
1627 ** Only allow the authentication if the MAC address
1628 ** is in the list of allowed addresses.
1630 ** Since this is the interrupt handler, we may be here
1631 ** while the access list is in the middle of being
1632 ** updated. Choose the list which is currently okay.
1633 ** See "prism2mib_priv_accessallow()" for details.
1636 if (hw->allow.modify == 0) {
1637 cnt = hw->allow.cnt;
1638 addr = hw->allow.addr[0];
1639 } else {
1640 cnt = hw->allow.cnt1;
1641 addr = hw->allow.addr1[0];
1644 for (i = 0; i < cnt; i++, addr += ETH_ALEN)
1645 if (memcmp(rec.address, addr, ETH_ALEN) == 0) {
1646 rec.status = P80211ENUM_status_successful;
1647 break;
1650 break;
1652 case WLAN_ACCESS_DENY:
1655 ** Allow the authentication UNLESS the MAC address is
1656 ** in the list of denied addresses.
1658 ** Since this is the interrupt handler, we may be here
1659 ** while the access list is in the middle of being
1660 ** updated. Choose the list which is currently okay.
1661 ** See "prism2mib_priv_accessdeny()" for details.
1664 if (hw->deny.modify == 0) {
1665 cnt = hw->deny.cnt;
1666 addr = hw->deny.addr[0];
1667 } else {
1668 cnt = hw->deny.cnt1;
1669 addr = hw->deny.addr1[0];
1672 rec.status = P80211ENUM_status_successful;
1674 for (i = 0; i < cnt; i++, addr += ETH_ALEN)
1675 if (memcmp(rec.address, addr, ETH_ALEN) == 0) {
1676 rec.status = P80211ENUM_status_unspec_failure;
1677 break;
1680 break;
1684 ** If the authentication is okay, then add the MAC address to the list
1685 ** of authenticated stations. Don't add the address if it is already in
1686 ** the list. (802.11b does not seem to disallow a station from issuing
1687 ** an authentication request when the station is already authenticated.
1688 ** Does this sort of thing ever happen? We might as well do the check
1689 ** just in case.)
1692 added = 0;
1694 if (rec.status == P80211ENUM_status_successful) {
1695 for (i = 0; i < hw->authlist.cnt; i++)
1696 if (memcmp(rec.address, hw->authlist.addr[i], ETH_ALEN)
1697 == 0)
1698 break;
1700 if (i >= hw->authlist.cnt) {
1701 if (hw->authlist.cnt >= WLAN_AUTH_MAX) {
1702 rec.status = P80211ENUM_status_ap_full;
1703 } else {
1704 memcpy(hw->authlist.addr[hw->authlist.cnt],
1705 rec.address, ETH_ALEN);
1706 hw->authlist.cnt++;
1707 added = 1;
1713 ** Send back the results of the authentication. If this doesn't work,
1714 ** then make sure to remove the address from the authenticated list if
1715 ** it was added.
1718 rec.status = cpu_to_le16(rec.status);
1719 rec.algorithm = inf->info.authreq.algorithm;
1721 result = hfa384x_drvr_setconfig(hw, HFA384x_RID_AUTHENTICATESTA,
1722 &rec, sizeof(rec));
1723 if (result) {
1724 if (added)
1725 hw->authlist.cnt--;
1726 printk(KERN_ERR
1727 "setconfig(authenticatestation) failed, result=%d\n",
1728 result);
1730 return;
1733 /*----------------------------------------------------------------
1734 * prism2sta_inf_psusercnt
1736 * Handles the receipt of a PowerSaveUserCount info frame. Should
1737 * be present in APs only.
1739 * Arguments:
1740 * wlandev wlan device structure
1741 * inf ptr to info frame (contents in hfa384x order)
1743 * Returns:
1744 * nothing
1746 * Side effects:
1748 * Call context:
1749 * interrupt
1750 ----------------------------------------------------------------*/
1751 static void prism2sta_inf_psusercnt(wlandevice_t *wlandev,
1752 hfa384x_InfFrame_t *inf)
1754 hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
1756 hw->psusercount = le16_to_cpu(inf->info.psusercnt.usercnt);
1758 return;
1761 /*----------------------------------------------------------------
1762 * prism2sta_ev_info
1764 * Handles the Info event.
1766 * Arguments:
1767 * wlandev wlan device structure
1768 * inf ptr to a generic info frame
1770 * Returns:
1771 * nothing
1773 * Side effects:
1775 * Call context:
1776 * interrupt
1777 ----------------------------------------------------------------*/
1778 void prism2sta_ev_info(wlandevice_t *wlandev, hfa384x_InfFrame_t *inf)
1780 inf->infotype = le16_to_cpu(inf->infotype);
1781 /* Dispatch */
1782 switch (inf->infotype) {
1783 case HFA384x_IT_HANDOVERADDR:
1784 prism2sta_inf_handover(wlandev, inf);
1785 break;
1786 case HFA384x_IT_COMMTALLIES:
1787 prism2sta_inf_tallies(wlandev, inf);
1788 break;
1789 case HFA384x_IT_HOSTSCANRESULTS:
1790 prism2sta_inf_hostscanresults(wlandev, inf);
1791 break;
1792 case HFA384x_IT_SCANRESULTS:
1793 prism2sta_inf_scanresults(wlandev, inf);
1794 break;
1795 case HFA384x_IT_CHINFORESULTS:
1796 prism2sta_inf_chinforesults(wlandev, inf);
1797 break;
1798 case HFA384x_IT_LINKSTATUS:
1799 prism2sta_inf_linkstatus(wlandev, inf);
1800 break;
1801 case HFA384x_IT_ASSOCSTATUS:
1802 prism2sta_inf_assocstatus(wlandev, inf);
1803 break;
1804 case HFA384x_IT_AUTHREQ:
1805 prism2sta_inf_authreq(wlandev, inf);
1806 break;
1807 case HFA384x_IT_PSUSERCNT:
1808 prism2sta_inf_psusercnt(wlandev, inf);
1809 break;
1810 case HFA384x_IT_KEYIDCHANGED:
1811 printk(KERN_WARNING "Unhandled IT_KEYIDCHANGED\n");
1812 break;
1813 case HFA384x_IT_ASSOCREQ:
1814 printk(KERN_WARNING "Unhandled IT_ASSOCREQ\n");
1815 break;
1816 case HFA384x_IT_MICFAILURE:
1817 printk(KERN_WARNING "Unhandled IT_MICFAILURE\n");
1818 break;
1819 default:
1820 printk(KERN_WARNING
1821 "Unknown info type=0x%02x\n", inf->infotype);
1822 break;
1824 return;
1827 /*----------------------------------------------------------------
1828 * prism2sta_ev_txexc
1830 * Handles the TxExc event. A Transmit Exception event indicates
1831 * that the MAC's TX process was unsuccessful - so the packet did
1832 * not get transmitted.
1834 * Arguments:
1835 * wlandev wlan device structure
1836 * status tx frame status word
1838 * Returns:
1839 * nothing
1841 * Side effects:
1843 * Call context:
1844 * interrupt
1845 ----------------------------------------------------------------*/
1846 void prism2sta_ev_txexc(wlandevice_t *wlandev, u16 status)
1848 pr_debug("TxExc status=0x%x.\n", status);
1850 return;
1853 /*----------------------------------------------------------------
1854 * prism2sta_ev_tx
1856 * Handles the Tx event.
1858 * Arguments:
1859 * wlandev wlan device structure
1860 * status tx frame status word
1861 * Returns:
1862 * nothing
1864 * Side effects:
1866 * Call context:
1867 * interrupt
1868 ----------------------------------------------------------------*/
1869 void prism2sta_ev_tx(wlandevice_t *wlandev, u16 status)
1871 pr_debug("Tx Complete, status=0x%04x\n", status);
1872 /* update linux network stats */
1873 wlandev->linux_stats.tx_packets++;
1874 return;
1877 /*----------------------------------------------------------------
1878 * prism2sta_ev_rx
1880 * Handles the Rx event.
1882 * Arguments:
1883 * wlandev wlan device structure
1885 * Returns:
1886 * nothing
1888 * Side effects:
1890 * Call context:
1891 * interrupt
1892 ----------------------------------------------------------------*/
1893 void prism2sta_ev_rx(wlandevice_t *wlandev, struct sk_buff *skb)
1895 p80211netdev_rx(wlandev, skb);
1896 return;
1899 /*----------------------------------------------------------------
1900 * prism2sta_ev_alloc
1902 * Handles the Alloc event.
1904 * Arguments:
1905 * wlandev wlan device structure
1907 * Returns:
1908 * nothing
1910 * Side effects:
1912 * Call context:
1913 * interrupt
1914 ----------------------------------------------------------------*/
1915 void prism2sta_ev_alloc(wlandevice_t *wlandev)
1917 netif_wake_queue(wlandev->netdev);
1918 return;
1921 /*----------------------------------------------------------------
1922 * create_wlan
1924 * Called at module init time. This creates the wlandevice_t structure
1925 * and initializes it with relevant bits.
1927 * Arguments:
1928 * none
1930 * Returns:
1931 * the created wlandevice_t structure.
1933 * Side effects:
1934 * also allocates the priv/hw structures.
1936 * Call context:
1937 * process thread
1939 ----------------------------------------------------------------*/
1940 static wlandevice_t *create_wlan(void)
1942 wlandevice_t *wlandev = NULL;
1943 hfa384x_t *hw = NULL;
1945 /* Alloc our structures */
1946 wlandev = kmalloc(sizeof(wlandevice_t), GFP_KERNEL);
1947 hw = kmalloc(sizeof(hfa384x_t), GFP_KERNEL);
1949 if (!wlandev || !hw) {
1950 printk(KERN_ERR "%s: Memory allocation failure.\n", dev_info);
1951 kfree(wlandev);
1952 kfree(hw);
1953 return NULL;
1956 /* Clear all the structs */
1957 memset(wlandev, 0, sizeof(wlandevice_t));
1958 memset(hw, 0, sizeof(hfa384x_t));
1960 /* Initialize the network device object. */
1961 wlandev->nsdname = dev_info;
1962 wlandev->msdstate = WLAN_MSD_HWPRESENT_PENDING;
1963 wlandev->priv = hw;
1964 wlandev->open = prism2sta_open;
1965 wlandev->close = prism2sta_close;
1966 wlandev->reset = prism2sta_reset;
1967 wlandev->txframe = prism2sta_txframe;
1968 wlandev->mlmerequest = prism2sta_mlmerequest;
1969 wlandev->set_multicast_list = prism2sta_setmulticast;
1970 wlandev->tx_timeout = hfa384x_tx_timeout;
1972 wlandev->nsdcaps = P80211_NSDCAP_HWFRAGMENT | P80211_NSDCAP_AUTOJOIN;
1974 /* Initialize the device private data stucture. */
1975 hw->dot11_desired_bss_type = 1;
1977 return wlandev;
1980 void prism2sta_commsqual_defer(struct work_struct *data)
1982 hfa384x_t *hw = container_of(data, struct hfa384x, commsqual_bh);
1983 wlandevice_t *wlandev = hw->wlandev;
1984 hfa384x_bytestr32_t ssid;
1985 int result = 0;
1987 if (hw->wlandev->hwremoved)
1988 goto done;
1990 /* we don't care if we're in AP mode */
1991 if ((wlandev->macmode == WLAN_MACMODE_NONE) ||
1992 (wlandev->macmode == WLAN_MACMODE_ESS_AP)) {
1993 goto done;
1996 /* It only makes sense to poll these in non-IBSS */
1997 if (wlandev->macmode != WLAN_MACMODE_IBSS_STA) {
1998 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_DBMCOMMSQUALITY,
1999 &hw->qual,
2000 HFA384x_RID_DBMCOMMSQUALITY_LEN);
2002 if (result) {
2003 printk(KERN_ERR "error fetching commsqual\n");
2004 goto done;
2007 pr_debug("commsqual %d %d %d\n",
2008 le16_to_cpu(hw->qual.CQ_currBSS),
2009 le16_to_cpu(hw->qual.ASL_currBSS),
2010 le16_to_cpu(hw->qual.ANL_currFC));
2013 /* Lastly, we need to make sure the BSSID didn't change on us */
2014 result = hfa384x_drvr_getconfig(hw,
2015 HFA384x_RID_CURRENTBSSID,
2016 wlandev->bssid, WLAN_BSSID_LEN);
2017 if (result) {
2018 pr_debug("getconfig(0x%02x) failed, result = %d\n",
2019 HFA384x_RID_CURRENTBSSID, result);
2020 goto done;
2023 result = hfa384x_drvr_getconfig(hw,
2024 HFA384x_RID_CURRENTSSID,
2025 &ssid, sizeof(ssid));
2026 if (result) {
2027 pr_debug("getconfig(0x%02x) failed, result = %d\n",
2028 HFA384x_RID_CURRENTSSID, result);
2029 goto done;
2031 prism2mgmt_bytestr2pstr((hfa384x_bytestr_t *) &ssid,
2032 (p80211pstrd_t *) &wlandev->ssid);
2034 /* Reschedule timer */
2035 mod_timer(&hw->commsqual_timer, jiffies + HZ);
2037 done:
2041 void prism2sta_commsqual_timer(unsigned long data)
2043 hfa384x_t *hw = (hfa384x_t *) data;
2045 schedule_work(&hw->commsqual_bh);