]> Pileus Git - ~andy/linux/blob - drivers/staging/wlan-ng/prism2sta.c
Merge tag 'arc-v3.11-rc1-part2' of git://git.kernel.org/pub/scm/linux/kernel/git...
[~andy/linux] / drivers / staging / wlan-ng / prism2sta.c
1 /* src/prism2/driver/prism2sta.c
2 *
3 * Implements the station functionality for prism2
4 *
5 * Copyright (C) 1999 AbsoluteValue Systems, Inc.  All Rights Reserved.
6 * --------------------------------------------------------------------
7 *
8 * linux-wlan
9 *
10 *   The contents of this file are subject to the Mozilla Public
11 *   License Version 1.1 (the "License"); you may not use this file
12 *   except in compliance with the License. You may obtain a copy of
13 *   the License at http://www.mozilla.org/MPL/
14 *
15 *   Software distributed under the License is distributed on an "AS
16 *   IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or
17 *   implied. See the License for the specific language governing
18 *   rights and limitations under the License.
19 *
20 *   Alternatively, the contents of this file may be used under the
21 *   terms of the GNU Public License version 2 (the "GPL"), in which
22 *   case the provisions of the GPL are applicable instead of the
23 *   above.  If you wish to allow the use of your version of this file
24 *   only under the terms of the GPL and not to allow others to use
25 *   your version of this file under the MPL, indicate your decision
26 *   by deleting the provisions above and replace them with the notice
27 *   and other provisions required by the GPL.  If you do not delete
28 *   the provisions above, a recipient may use your version of this
29 *   file under either the MPL or the GPL.
30 *
31 * --------------------------------------------------------------------
32 *
33 * Inquiries regarding the linux-wlan Open Source project can be
34 * made directly to:
35 *
36 * AbsoluteValue Systems Inc.
37 * info@linux-wlan.com
38 * http://www.linux-wlan.com
39 *
40 * --------------------------------------------------------------------
41 *
42 * Portions of the development of this software were funded by
43 * Intersil Corporation as part of PRISM(R) chipset product development.
44 *
45 * --------------------------------------------------------------------
46 *
47 * This file implements the module and linux pcmcia routines for the
48 * prism2 driver.
49 *
50 * --------------------------------------------------------------------
51 */
52
53 #include <linux/module.h>
54 #include <linux/moduleparam.h>
55 #include <linux/kernel.h>
56 #include <linux/sched.h>
57 #include <linux/types.h>
58 #include <linux/init.h>
59 #include <linux/slab.h>
60 #include <linux/wireless.h>
61 #include <linux/netdevice.h>
62 #include <linux/workqueue.h>
63 #include <linux/byteorder/generic.h>
64 #include <linux/ctype.h>
65
66 #include <linux/io.h>
67 #include <linux/delay.h>
68 #include <asm/byteorder.h>
69 #include <linux/if_arp.h>
70 #include <linux/if_ether.h>
71 #include <linux/bitops.h>
72
73 #include "p80211types.h"
74 #include "p80211hdr.h"
75 #include "p80211mgmt.h"
76 #include "p80211conv.h"
77 #include "p80211msg.h"
78 #include "p80211netdev.h"
79 #include "p80211req.h"
80 #include "p80211metadef.h"
81 #include "p80211metastruct.h"
82 #include "hfa384x.h"
83 #include "prism2mgmt.h"
84
85 /* Create a string of printable chars from something that might not be */
86 /* It's recommended that the str be 4*len + 1 bytes long */
87 #define wlan_mkprintstr(buf, buflen, str, strlen) \
88 { \
89         int i = 0; \
90         int j = 0; \
91         memset(str, 0, (strlen)); \
92         for (i = 0; i < (buflen); i++) { \
93                 if (isprint((buf)[i])) { \
94                         (str)[j] = (buf)[i]; \
95                         j++; \
96                 } else { \
97                         (str)[j] = '\\'; \
98                         (str)[j+1] = 'x'; \
99                         (str)[j+2] = hex_asc_hi((buf)[i]); \
100                         (str)[j+3] = hex_asc_lo((buf)[i]); \
101                         j += 4; \
102                 } \
103         } \
104 }
105
106 static char *dev_info = "prism2_usb";
107 static wlandevice_t *create_wlan(void);
108
109 int prism2_reset_holdtime = 30; /* Reset hold time in ms */
110 int prism2_reset_settletime = 100;      /* Reset settle time in ms */
111
112 static int prism2_doreset;      /* Do a reset at init? */
113
114 module_param(prism2_doreset, int, 0644);
115 MODULE_PARM_DESC(prism2_doreset, "Issue a reset on initialization");
116
117 module_param(prism2_reset_holdtime, int, 0644);
118 MODULE_PARM_DESC(prism2_reset_holdtime, "reset hold time in ms");
119 module_param(prism2_reset_settletime, int, 0644);
120 MODULE_PARM_DESC(prism2_reset_settletime, "reset settle time in ms");
121
122 MODULE_LICENSE("Dual MPL/GPL");
123
124 void prism2_connect_result(wlandevice_t *wlandev, u8 failed);
125 void prism2_disconnected(wlandevice_t *wlandev);
126 void prism2_roamed(wlandevice_t *wlandev);
127
128 static int prism2sta_open(wlandevice_t *wlandev);
129 static int prism2sta_close(wlandevice_t *wlandev);
130 static void prism2sta_reset(wlandevice_t *wlandev);
131 static int prism2sta_txframe(wlandevice_t *wlandev, struct sk_buff *skb,
132                              union p80211_hdr *p80211_hdr,
133                              struct p80211_metawep *p80211_wep);
134 static int prism2sta_mlmerequest(wlandevice_t *wlandev, struct p80211msg *msg);
135 static int prism2sta_getcardinfo(wlandevice_t *wlandev);
136 static int prism2sta_globalsetup(wlandevice_t *wlandev);
137 static int prism2sta_setmulticast(wlandevice_t *wlandev, netdevice_t *dev);
138
139 static void prism2sta_inf_handover(wlandevice_t *wlandev,
140                                    hfa384x_InfFrame_t *inf);
141 static void prism2sta_inf_tallies(wlandevice_t *wlandev,
142                                   hfa384x_InfFrame_t *inf);
143 static void prism2sta_inf_hostscanresults(wlandevice_t *wlandev,
144                                           hfa384x_InfFrame_t *inf);
145 static void prism2sta_inf_scanresults(wlandevice_t *wlandev,
146                                       hfa384x_InfFrame_t *inf);
147 static void prism2sta_inf_chinforesults(wlandevice_t *wlandev,
148                                         hfa384x_InfFrame_t *inf);
149 static void prism2sta_inf_linkstatus(wlandevice_t *wlandev,
150                                      hfa384x_InfFrame_t *inf);
151 static void prism2sta_inf_assocstatus(wlandevice_t *wlandev,
152                                       hfa384x_InfFrame_t *inf);
153 static void prism2sta_inf_authreq(wlandevice_t *wlandev,
154                                   hfa384x_InfFrame_t *inf);
155 static void prism2sta_inf_authreq_defer(wlandevice_t *wlandev,
156                                         hfa384x_InfFrame_t *inf);
157 static void prism2sta_inf_psusercnt(wlandevice_t *wlandev,
158                                     hfa384x_InfFrame_t *inf);
159
160 /*----------------------------------------------------------------
161 * prism2sta_open
162 *
163 * WLAN device open method.  Called from p80211netdev when kernel
164 * device open (start) method is called in response to the
165 * SIOCSIIFFLAGS ioctl changing the flags bit IFF_UP
166 * from clear to set.
167 *
168 * Arguments:
169 *       wlandev         wlan device structure
170 *
171 * Returns:
172 *       0       success
173 *       >0      f/w reported error
174 *       <0      driver reported error
175 *
176 * Side effects:
177 *
178 * Call context:
179 *       process thread
180 ----------------------------------------------------------------*/
181 static int prism2sta_open(wlandevice_t *wlandev)
182 {
183         /* We don't currently have to do anything else.
184          * The setup of the MAC should be subsequently completed via
185          * the mlme commands.
186          * Higher layers know we're ready from dev->start==1 and
187          * dev->tbusy==0.  Our rx path knows to pass up received/
188          * frames because of dev->flags&IFF_UP is true.
189          */
190
191         return 0;
192 }
193
194 /*----------------------------------------------------------------
195 * prism2sta_close
196 *
197 * WLAN device close method.  Called from p80211netdev when kernel
198 * device close method is called in response to the
199 * SIOCSIIFFLAGS ioctl changing the flags bit IFF_UP
200 * from set to clear.
201 *
202 * Arguments:
203 *       wlandev         wlan device structure
204 *
205 * Returns:
206 *       0       success
207 *       >0      f/w reported error
208 *       <0      driver reported error
209 *
210 * Side effects:
211 *
212 * Call context:
213 *       process thread
214 ----------------------------------------------------------------*/
215 static int prism2sta_close(wlandevice_t *wlandev)
216 {
217         /* We don't currently have to do anything else.
218          * Higher layers know we're not ready from dev->start==0 and
219          * dev->tbusy==1.  Our rx path knows to not pass up received
220          * frames because of dev->flags&IFF_UP is false.
221          */
222
223         return 0;
224 }
225
226 /*----------------------------------------------------------------
227 * prism2sta_reset
228 *
229 * Not currently implented.
230 *
231 * Arguments:
232 *       wlandev         wlan device structure
233 *       none
234 *
235 * Returns:
236 *       nothing
237 *
238 * Side effects:
239 *
240 * Call context:
241 *       process thread
242 ----------------------------------------------------------------*/
243 static void prism2sta_reset(wlandevice_t *wlandev)
244 {
245 }
246
247 /*----------------------------------------------------------------
248 * prism2sta_txframe
249 *
250 * Takes a frame from p80211 and queues it for transmission.
251 *
252 * Arguments:
253 *       wlandev         wlan device structure
254 *       pb              packet buffer struct.  Contains an 802.11
255 *                       data frame.
256 *       p80211_hdr      points to the 802.11 header for the packet.
257 * Returns:
258 *       0               Success and more buffs available
259 *       1               Success but no more buffs
260 *       2               Allocation failure
261 *       4               Buffer full or queue busy
262 *
263 * Side effects:
264 *
265 * Call context:
266 *       process thread
267 ----------------------------------------------------------------*/
268 static int prism2sta_txframe(wlandevice_t *wlandev, struct sk_buff *skb,
269                              union p80211_hdr *p80211_hdr,
270                              struct p80211_metawep *p80211_wep)
271 {
272         hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
273         int result;
274
275         /* If necessary, set the 802.11 WEP bit */
276         if ((wlandev->hostwep & (HOSTWEP_PRIVACYINVOKED | HOSTWEP_ENCRYPT)) ==
277             HOSTWEP_PRIVACYINVOKED) {
278                 p80211_hdr->a3.fc |= cpu_to_le16(WLAN_SET_FC_ISWEP(1));
279         }
280
281         result = hfa384x_drvr_txframe(hw, skb, p80211_hdr, p80211_wep);
282
283         return result;
284 }
285
286 /*----------------------------------------------------------------
287 * prism2sta_mlmerequest
288 *
289 * wlan command message handler.  All we do here is pass the message
290 * over to the prism2sta_mgmt_handler.
291 *
292 * Arguments:
293 *       wlandev         wlan device structure
294 *       msg             wlan command message
295 * Returns:
296 *       0               success
297 *       <0              successful acceptance of message, but we're
298 *                       waiting for an async process to finish before
299 *                       we're done with the msg.  When the asynch
300 *                       process is done, we'll call the p80211
301 *                       function p80211req_confirm() .
302 *       >0              An error occurred while we were handling
303 *                       the message.
304 *
305 * Side effects:
306 *
307 * Call context:
308 *       process thread
309 ----------------------------------------------------------------*/
310 static int prism2sta_mlmerequest(wlandevice_t *wlandev, struct p80211msg *msg)
311 {
312         hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
313
314         int result = 0;
315
316         switch (msg->msgcode) {
317         case DIDmsg_dot11req_mibget:
318                 pr_debug("Received mibget request\n");
319                 result = prism2mgmt_mibset_mibget(wlandev, msg);
320                 break;
321         case DIDmsg_dot11req_mibset:
322                 pr_debug("Received mibset request\n");
323                 result = prism2mgmt_mibset_mibget(wlandev, msg);
324                 break;
325         case DIDmsg_dot11req_scan:
326                 pr_debug("Received scan request\n");
327                 result = prism2mgmt_scan(wlandev, msg);
328                 break;
329         case DIDmsg_dot11req_scan_results:
330                 pr_debug("Received scan_results request\n");
331                 result = prism2mgmt_scan_results(wlandev, msg);
332                 break;
333         case DIDmsg_dot11req_start:
334                 pr_debug("Received mlme start request\n");
335                 result = prism2mgmt_start(wlandev, msg);
336                 break;
337                 /*
338                  * Prism2 specific messages
339                  */
340         case DIDmsg_p2req_readpda:
341                 pr_debug("Received mlme readpda request\n");
342                 result = prism2mgmt_readpda(wlandev, msg);
343                 break;
344         case DIDmsg_p2req_ramdl_state:
345                 pr_debug("Received mlme ramdl_state request\n");
346                 result = prism2mgmt_ramdl_state(wlandev, msg);
347                 break;
348         case DIDmsg_p2req_ramdl_write:
349                 pr_debug("Received mlme ramdl_write request\n");
350                 result = prism2mgmt_ramdl_write(wlandev, msg);
351                 break;
352         case DIDmsg_p2req_flashdl_state:
353                 pr_debug("Received mlme flashdl_state request\n");
354                 result = prism2mgmt_flashdl_state(wlandev, msg);
355                 break;
356         case DIDmsg_p2req_flashdl_write:
357                 pr_debug("Received mlme flashdl_write request\n");
358                 result = prism2mgmt_flashdl_write(wlandev, msg);
359                 break;
360                 /*
361                  * Linux specific messages
362                  */
363         case DIDmsg_lnxreq_hostwep:
364                 break;          /* ignore me. */
365         case DIDmsg_lnxreq_ifstate:
366                 {
367                         struct p80211msg_lnxreq_ifstate *ifstatemsg;
368                         pr_debug("Received mlme ifstate request\n");
369                         ifstatemsg = (struct p80211msg_lnxreq_ifstate *) msg;
370                         result =
371                             prism2sta_ifstate(wlandev,
372                                               ifstatemsg->ifstate.data);
373                         ifstatemsg->resultcode.status =
374                             P80211ENUM_msgitem_status_data_ok;
375                         ifstatemsg->resultcode.data = result;
376                         result = 0;
377                 }
378                 break;
379         case DIDmsg_lnxreq_wlansniff:
380                 pr_debug("Received mlme wlansniff request\n");
381                 result = prism2mgmt_wlansniff(wlandev, msg);
382                 break;
383         case DIDmsg_lnxreq_autojoin:
384                 pr_debug("Received mlme autojoin request\n");
385                 result = prism2mgmt_autojoin(wlandev, msg);
386                 break;
387         case DIDmsg_lnxreq_commsquality:{
388                         struct p80211msg_lnxreq_commsquality *qualmsg;
389
390                         pr_debug("Received commsquality request\n");
391
392                         qualmsg = (struct p80211msg_lnxreq_commsquality *) msg;
393
394                         qualmsg->link.status =
395                             P80211ENUM_msgitem_status_data_ok;
396                         qualmsg->level.status =
397                             P80211ENUM_msgitem_status_data_ok;
398                         qualmsg->noise.status =
399                             P80211ENUM_msgitem_status_data_ok;
400
401                         qualmsg->link.data = le16_to_cpu(hw->qual.CQ_currBSS);
402                         qualmsg->level.data = le16_to_cpu(hw->qual.ASL_currBSS);
403                         qualmsg->noise.data = le16_to_cpu(hw->qual.ANL_currFC);
404                         qualmsg->txrate.data = hw->txrate;
405
406                         break;
407                 }
408         default:
409                 printk(KERN_WARNING "Unknown mgmt request message 0x%08x",
410                        msg->msgcode);
411                 break;
412         }
413
414         return result;
415 }
416
417 /*----------------------------------------------------------------
418 * prism2sta_ifstate
419 *
420 * Interface state.  This is the primary WLAN interface enable/disable
421 * handler.  Following the driver/load/deviceprobe sequence, this
422 * function must be called with a state of "enable" before any other
423 * commands will be accepted.
424 *
425 * Arguments:
426 *       wlandev         wlan device structure
427 *       msgp            ptr to msg buffer
428 *
429 * Returns:
430 *       A p80211 message resultcode value.
431 *
432 * Side effects:
433 *
434 * Call context:
435 *       process thread  (usually)
436 *       interrupt
437 ----------------------------------------------------------------*/
438 u32 prism2sta_ifstate(wlandevice_t *wlandev, u32 ifstate)
439 {
440         hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
441         u32 result;
442
443         result = P80211ENUM_resultcode_implementation_failure;
444
445         pr_debug("Current MSD state(%d), requesting(%d)\n",
446                  wlandev->msdstate, ifstate);
447         switch (ifstate) {
448         case P80211ENUM_ifstate_fwload:
449                 switch (wlandev->msdstate) {
450                 case WLAN_MSD_HWPRESENT:
451                         wlandev->msdstate = WLAN_MSD_FWLOAD_PENDING;
452                         /*
453                          * Initialize the device+driver sufficiently
454                          * for firmware loading.
455                          */
456                         result = hfa384x_drvr_start(hw);
457                         if (result) {
458                                 printk(KERN_ERR
459                                        "hfa384x_drvr_start() failed,"
460                                        "result=%d\n", (int)result);
461                                 result =
462                                  P80211ENUM_resultcode_implementation_failure;
463                                 wlandev->msdstate = WLAN_MSD_HWPRESENT;
464                                 break;
465                         }
466                         wlandev->msdstate = WLAN_MSD_FWLOAD;
467                         result = P80211ENUM_resultcode_success;
468                         break;
469                 case WLAN_MSD_FWLOAD:
470                         hfa384x_cmd_initialize(hw);
471                         result = P80211ENUM_resultcode_success;
472                         break;
473                 case WLAN_MSD_RUNNING:
474                         printk(KERN_WARNING
475                                "Cannot enter fwload state from enable state,"
476                                "you must disable first.\n");
477                         result = P80211ENUM_resultcode_invalid_parameters;
478                         break;
479                 case WLAN_MSD_HWFAIL:
480                 default:
481                         /* probe() had a problem or the msdstate contains
482                          * an unrecognized value, there's nothing we can do.
483                          */
484                         result = P80211ENUM_resultcode_implementation_failure;
485                         break;
486                 }
487                 break;
488         case P80211ENUM_ifstate_enable:
489                 switch (wlandev->msdstate) {
490                 case WLAN_MSD_HWPRESENT:
491                 case WLAN_MSD_FWLOAD:
492                         wlandev->msdstate = WLAN_MSD_RUNNING_PENDING;
493                         /* Initialize the device+driver for full
494                          * operation. Note that this might me an FWLOAD to
495                          * to RUNNING transition so we must not do a chip
496                          * or board level reset.  Note that on failure,
497                          * the MSD state is set to HWPRESENT because we
498                          * can't make any assumptions about the state
499                          * of the hardware or a previous firmware load.
500                          */
501                         result = hfa384x_drvr_start(hw);
502                         if (result) {
503                                 printk(KERN_ERR
504                                        "hfa384x_drvr_start() failed,"
505                                        "result=%d\n", (int)result);
506                                 result =
507                                   P80211ENUM_resultcode_implementation_failure;
508                                 wlandev->msdstate = WLAN_MSD_HWPRESENT;
509                                 break;
510                         }
511
512                         result = prism2sta_getcardinfo(wlandev);
513                         if (result) {
514                                 printk(KERN_ERR
515                                        "prism2sta_getcardinfo() failed,"
516                                        "result=%d\n", (int)result);
517                                 result =
518                                   P80211ENUM_resultcode_implementation_failure;
519                                 hfa384x_drvr_stop(hw);
520                                 wlandev->msdstate = WLAN_MSD_HWPRESENT;
521                                 break;
522                         }
523                         result = prism2sta_globalsetup(wlandev);
524                         if (result) {
525                                 printk(KERN_ERR
526                                        "prism2sta_globalsetup() failed,"
527                                        "result=%d\n", (int)result);
528                                 result =
529                                   P80211ENUM_resultcode_implementation_failure;
530                                 hfa384x_drvr_stop(hw);
531                                 wlandev->msdstate = WLAN_MSD_HWPRESENT;
532                                 break;
533                         }
534                         wlandev->msdstate = WLAN_MSD_RUNNING;
535                         hw->join_ap = 0;
536                         hw->join_retries = 60;
537                         result = P80211ENUM_resultcode_success;
538                         break;
539                 case WLAN_MSD_RUNNING:
540                         /* Do nothing, we're already in this state. */
541                         result = P80211ENUM_resultcode_success;
542                         break;
543                 case WLAN_MSD_HWFAIL:
544                 default:
545                         /* probe() had a problem or the msdstate contains
546                          * an unrecognized value, there's nothing we can do.
547                          */
548                         result = P80211ENUM_resultcode_implementation_failure;
549                         break;
550                 }
551                 break;
552         case P80211ENUM_ifstate_disable:
553                 switch (wlandev->msdstate) {
554                 case WLAN_MSD_HWPRESENT:
555                         /* Do nothing, we're already in this state. */
556                         result = P80211ENUM_resultcode_success;
557                         break;
558                 case WLAN_MSD_FWLOAD:
559                 case WLAN_MSD_RUNNING:
560                         wlandev->msdstate = WLAN_MSD_HWPRESENT_PENDING;
561                         /*
562                          * TODO: Shut down the MAC completely. Here a chip
563                          * or board level reset is probably called for.
564                          * After a "disable" _all_ results are lost, even
565                          * those from a fwload.
566                          */
567                         if (!wlandev->hwremoved)
568                                 netif_carrier_off(wlandev->netdev);
569
570                         hfa384x_drvr_stop(hw);
571
572                         wlandev->macmode = WLAN_MACMODE_NONE;
573                         wlandev->msdstate = WLAN_MSD_HWPRESENT;
574                         result = P80211ENUM_resultcode_success;
575                         break;
576                 case WLAN_MSD_HWFAIL:
577                 default:
578                         /* probe() had a problem or the msdstate contains
579                          * an unrecognized value, there's nothing we can do.
580                          */
581                         result = P80211ENUM_resultcode_implementation_failure;
582                         break;
583                 }
584                 break;
585         default:
586                 result = P80211ENUM_resultcode_invalid_parameters;
587                 break;
588         }
589
590         return result;
591 }
592
593 /*----------------------------------------------------------------
594 * prism2sta_getcardinfo
595 *
596 * Collect the NICID, firmware version and any other identifiers
597 * we'd like to have in host-side data structures.
598 *
599 * Arguments:
600 *       wlandev         wlan device structure
601 *
602 * Returns:
603 *       0       success
604 *       >0      f/w reported error
605 *       <0      driver reported error
606 *
607 * Side effects:
608 *
609 * Call context:
610 *       Either.
611 ----------------------------------------------------------------*/
612 static int prism2sta_getcardinfo(wlandevice_t *wlandev)
613 {
614         int result = 0;
615         hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
616         u16 temp;
617         u8 snum[HFA384x_RID_NICSERIALNUMBER_LEN];
618         char pstr[(HFA384x_RID_NICSERIALNUMBER_LEN * 4) + 1];
619
620         /* Collect version and compatibility info */
621         /*  Some are critical, some are not */
622         /* NIC identity */
623         result = hfa384x_drvr_getconfig(hw, HFA384x_RID_NICIDENTITY,
624                                         &hw->ident_nic,
625                                         sizeof(hfa384x_compident_t));
626         if (result) {
627                 printk(KERN_ERR "Failed to retrieve NICIDENTITY\n");
628                 goto failed;
629         }
630
631         /* get all the nic id fields in host byte order */
632         hw->ident_nic.id = le16_to_cpu(hw->ident_nic.id);
633         hw->ident_nic.variant = le16_to_cpu(hw->ident_nic.variant);
634         hw->ident_nic.major = le16_to_cpu(hw->ident_nic.major);
635         hw->ident_nic.minor = le16_to_cpu(hw->ident_nic.minor);
636
637         printk(KERN_INFO "ident: nic h/w: id=0x%02x %d.%d.%d\n",
638                hw->ident_nic.id, hw->ident_nic.major,
639                hw->ident_nic.minor, hw->ident_nic.variant);
640
641         /* Primary f/w identity */
642         result = hfa384x_drvr_getconfig(hw, HFA384x_RID_PRIIDENTITY,
643                                         &hw->ident_pri_fw,
644                                         sizeof(hfa384x_compident_t));
645         if (result) {
646                 printk(KERN_ERR "Failed to retrieve PRIIDENTITY\n");
647                 goto failed;
648         }
649
650         /* get all the private fw id fields in host byte order */
651         hw->ident_pri_fw.id = le16_to_cpu(hw->ident_pri_fw.id);
652         hw->ident_pri_fw.variant = le16_to_cpu(hw->ident_pri_fw.variant);
653         hw->ident_pri_fw.major = le16_to_cpu(hw->ident_pri_fw.major);
654         hw->ident_pri_fw.minor = le16_to_cpu(hw->ident_pri_fw.minor);
655
656         printk(KERN_INFO "ident: pri f/w: id=0x%02x %d.%d.%d\n",
657                hw->ident_pri_fw.id, hw->ident_pri_fw.major,
658                hw->ident_pri_fw.minor, hw->ident_pri_fw.variant);
659
660         /* Station (Secondary?) f/w identity */
661         result = hfa384x_drvr_getconfig(hw, HFA384x_RID_STAIDENTITY,
662                                         &hw->ident_sta_fw,
663                                         sizeof(hfa384x_compident_t));
664         if (result) {
665                 printk(KERN_ERR "Failed to retrieve STAIDENTITY\n");
666                 goto failed;
667         }
668
669         if (hw->ident_nic.id < 0x8000) {
670                 printk(KERN_ERR
671                        "FATAL: Card is not an Intersil Prism2/2.5/3\n");
672                 result = -1;
673                 goto failed;
674         }
675
676         /* get all the station fw id fields in host byte order */
677         hw->ident_sta_fw.id = le16_to_cpu(hw->ident_sta_fw.id);
678         hw->ident_sta_fw.variant = le16_to_cpu(hw->ident_sta_fw.variant);
679         hw->ident_sta_fw.major = le16_to_cpu(hw->ident_sta_fw.major);
680         hw->ident_sta_fw.minor = le16_to_cpu(hw->ident_sta_fw.minor);
681
682         /* strip out the 'special' variant bits */
683         hw->mm_mods = hw->ident_sta_fw.variant & (BIT(14) | BIT(15));
684         hw->ident_sta_fw.variant &= ~((u16) (BIT(14) | BIT(15)));
685
686         if (hw->ident_sta_fw.id == 0x1f) {
687                 printk(KERN_INFO
688                        "ident: sta f/w: id=0x%02x %d.%d.%d\n",
689                        hw->ident_sta_fw.id, hw->ident_sta_fw.major,
690                        hw->ident_sta_fw.minor, hw->ident_sta_fw.variant);
691         } else {
692                 printk(KERN_INFO
693                        "ident:  ap f/w: id=0x%02x %d.%d.%d\n",
694                        hw->ident_sta_fw.id, hw->ident_sta_fw.major,
695                        hw->ident_sta_fw.minor, hw->ident_sta_fw.variant);
696                 printk(KERN_ERR "Unsupported Tertiary AP firmeare loaded!\n");
697                 goto failed;
698         }
699
700         /* Compatibility range, Modem supplier */
701         result = hfa384x_drvr_getconfig(hw, HFA384x_RID_MFISUPRANGE,
702                                         &hw->cap_sup_mfi,
703                                         sizeof(hfa384x_caplevel_t));
704         if (result) {
705                 printk(KERN_ERR "Failed to retrieve MFISUPRANGE\n");
706                 goto failed;
707         }
708
709         /* get all the Compatibility range, modem interface supplier
710            fields in byte order */
711         hw->cap_sup_mfi.role = le16_to_cpu(hw->cap_sup_mfi.role);
712         hw->cap_sup_mfi.id = le16_to_cpu(hw->cap_sup_mfi.id);
713         hw->cap_sup_mfi.variant = le16_to_cpu(hw->cap_sup_mfi.variant);
714         hw->cap_sup_mfi.bottom = le16_to_cpu(hw->cap_sup_mfi.bottom);
715         hw->cap_sup_mfi.top = le16_to_cpu(hw->cap_sup_mfi.top);
716
717         printk(KERN_INFO
718                "MFI:SUP:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n",
719                hw->cap_sup_mfi.role, hw->cap_sup_mfi.id,
720                hw->cap_sup_mfi.variant, hw->cap_sup_mfi.bottom,
721                hw->cap_sup_mfi.top);
722
723         /* Compatibility range, Controller supplier */
724         result = hfa384x_drvr_getconfig(hw, HFA384x_RID_CFISUPRANGE,
725                                         &hw->cap_sup_cfi,
726                                         sizeof(hfa384x_caplevel_t));
727         if (result) {
728                 printk(KERN_ERR "Failed to retrieve CFISUPRANGE\n");
729                 goto failed;
730         }
731
732         /* get all the Compatibility range, controller interface supplier
733            fields in byte order */
734         hw->cap_sup_cfi.role = le16_to_cpu(hw->cap_sup_cfi.role);
735         hw->cap_sup_cfi.id = le16_to_cpu(hw->cap_sup_cfi.id);
736         hw->cap_sup_cfi.variant = le16_to_cpu(hw->cap_sup_cfi.variant);
737         hw->cap_sup_cfi.bottom = le16_to_cpu(hw->cap_sup_cfi.bottom);
738         hw->cap_sup_cfi.top = le16_to_cpu(hw->cap_sup_cfi.top);
739
740         printk(KERN_INFO
741                "CFI:SUP:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n",
742                hw->cap_sup_cfi.role, hw->cap_sup_cfi.id,
743                hw->cap_sup_cfi.variant, hw->cap_sup_cfi.bottom,
744                hw->cap_sup_cfi.top);
745
746         /* Compatibility range, Primary f/w supplier */
747         result = hfa384x_drvr_getconfig(hw, HFA384x_RID_PRISUPRANGE,
748                                         &hw->cap_sup_pri,
749                                         sizeof(hfa384x_caplevel_t));
750         if (result) {
751                 printk(KERN_ERR "Failed to retrieve PRISUPRANGE\n");
752                 goto failed;
753         }
754
755         /* get all the Compatibility range, primary firmware supplier
756            fields in byte order */
757         hw->cap_sup_pri.role = le16_to_cpu(hw->cap_sup_pri.role);
758         hw->cap_sup_pri.id = le16_to_cpu(hw->cap_sup_pri.id);
759         hw->cap_sup_pri.variant = le16_to_cpu(hw->cap_sup_pri.variant);
760         hw->cap_sup_pri.bottom = le16_to_cpu(hw->cap_sup_pri.bottom);
761         hw->cap_sup_pri.top = le16_to_cpu(hw->cap_sup_pri.top);
762
763         printk(KERN_INFO
764                "PRI:SUP:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n",
765                hw->cap_sup_pri.role, hw->cap_sup_pri.id,
766                hw->cap_sup_pri.variant, hw->cap_sup_pri.bottom,
767                hw->cap_sup_pri.top);
768
769         /* Compatibility range, Station f/w supplier */
770         result = hfa384x_drvr_getconfig(hw, HFA384x_RID_STASUPRANGE,
771                                         &hw->cap_sup_sta,
772                                         sizeof(hfa384x_caplevel_t));
773         if (result) {
774                 printk(KERN_ERR "Failed to retrieve STASUPRANGE\n");
775                 goto failed;
776         }
777
778         /* get all the Compatibility range, station firmware supplier
779            fields in byte order */
780         hw->cap_sup_sta.role = le16_to_cpu(hw->cap_sup_sta.role);
781         hw->cap_sup_sta.id = le16_to_cpu(hw->cap_sup_sta.id);
782         hw->cap_sup_sta.variant = le16_to_cpu(hw->cap_sup_sta.variant);
783         hw->cap_sup_sta.bottom = le16_to_cpu(hw->cap_sup_sta.bottom);
784         hw->cap_sup_sta.top = le16_to_cpu(hw->cap_sup_sta.top);
785
786         if (hw->cap_sup_sta.id == 0x04) {
787                 printk(KERN_INFO
788                        "STA:SUP:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n",
789                        hw->cap_sup_sta.role, hw->cap_sup_sta.id,
790                        hw->cap_sup_sta.variant, hw->cap_sup_sta.bottom,
791                        hw->cap_sup_sta.top);
792         } else {
793                 printk(KERN_INFO
794                        "AP:SUP:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n",
795                        hw->cap_sup_sta.role, hw->cap_sup_sta.id,
796                        hw->cap_sup_sta.variant, hw->cap_sup_sta.bottom,
797                        hw->cap_sup_sta.top);
798         }
799
800         /* Compatibility range, primary f/w actor, CFI supplier */
801         result = hfa384x_drvr_getconfig(hw, HFA384x_RID_PRI_CFIACTRANGES,
802                                         &hw->cap_act_pri_cfi,
803                                         sizeof(hfa384x_caplevel_t));
804         if (result) {
805                 printk(KERN_ERR "Failed to retrieve PRI_CFIACTRANGES\n");
806                 goto failed;
807         }
808
809         /* get all the Compatibility range, primary f/w actor, CFI supplier
810            fields in byte order */
811         hw->cap_act_pri_cfi.role = le16_to_cpu(hw->cap_act_pri_cfi.role);
812         hw->cap_act_pri_cfi.id = le16_to_cpu(hw->cap_act_pri_cfi.id);
813         hw->cap_act_pri_cfi.variant = le16_to_cpu(hw->cap_act_pri_cfi.variant);
814         hw->cap_act_pri_cfi.bottom = le16_to_cpu(hw->cap_act_pri_cfi.bottom);
815         hw->cap_act_pri_cfi.top = le16_to_cpu(hw->cap_act_pri_cfi.top);
816
817         printk(KERN_INFO
818                "PRI-CFI:ACT:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n",
819                hw->cap_act_pri_cfi.role, hw->cap_act_pri_cfi.id,
820                hw->cap_act_pri_cfi.variant, hw->cap_act_pri_cfi.bottom,
821                hw->cap_act_pri_cfi.top);
822
823         /* Compatibility range, sta f/w actor, CFI supplier */
824         result = hfa384x_drvr_getconfig(hw, HFA384x_RID_STA_CFIACTRANGES,
825                                         &hw->cap_act_sta_cfi,
826                                         sizeof(hfa384x_caplevel_t));
827         if (result) {
828                 printk(KERN_ERR "Failed to retrieve STA_CFIACTRANGES\n");
829                 goto failed;
830         }
831
832         /* get all the Compatibility range, station f/w actor, CFI supplier
833            fields in byte order */
834         hw->cap_act_sta_cfi.role = le16_to_cpu(hw->cap_act_sta_cfi.role);
835         hw->cap_act_sta_cfi.id = le16_to_cpu(hw->cap_act_sta_cfi.id);
836         hw->cap_act_sta_cfi.variant = le16_to_cpu(hw->cap_act_sta_cfi.variant);
837         hw->cap_act_sta_cfi.bottom = le16_to_cpu(hw->cap_act_sta_cfi.bottom);
838         hw->cap_act_sta_cfi.top = le16_to_cpu(hw->cap_act_sta_cfi.top);
839
840         printk(KERN_INFO
841                "STA-CFI:ACT:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n",
842                hw->cap_act_sta_cfi.role, hw->cap_act_sta_cfi.id,
843                hw->cap_act_sta_cfi.variant, hw->cap_act_sta_cfi.bottom,
844                hw->cap_act_sta_cfi.top);
845
846         /* Compatibility range, sta f/w actor, MFI supplier */
847         result = hfa384x_drvr_getconfig(hw, HFA384x_RID_STA_MFIACTRANGES,
848                                         &hw->cap_act_sta_mfi,
849                                         sizeof(hfa384x_caplevel_t));
850         if (result) {
851                 printk(KERN_ERR "Failed to retrieve STA_MFIACTRANGES\n");
852                 goto failed;
853         }
854
855         /* get all the Compatibility range, station f/w actor, MFI supplier
856            fields in byte order */
857         hw->cap_act_sta_mfi.role = le16_to_cpu(hw->cap_act_sta_mfi.role);
858         hw->cap_act_sta_mfi.id = le16_to_cpu(hw->cap_act_sta_mfi.id);
859         hw->cap_act_sta_mfi.variant = le16_to_cpu(hw->cap_act_sta_mfi.variant);
860         hw->cap_act_sta_mfi.bottom = le16_to_cpu(hw->cap_act_sta_mfi.bottom);
861         hw->cap_act_sta_mfi.top = le16_to_cpu(hw->cap_act_sta_mfi.top);
862
863         printk(KERN_INFO
864                "STA-MFI:ACT:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n",
865                hw->cap_act_sta_mfi.role, hw->cap_act_sta_mfi.id,
866                hw->cap_act_sta_mfi.variant, hw->cap_act_sta_mfi.bottom,
867                hw->cap_act_sta_mfi.top);
868
869         /* Serial Number */
870         result = hfa384x_drvr_getconfig(hw, HFA384x_RID_NICSERIALNUMBER,
871                                         snum, HFA384x_RID_NICSERIALNUMBER_LEN);
872         if (!result) {
873                 wlan_mkprintstr(snum, HFA384x_RID_NICSERIALNUMBER_LEN,
874                                 pstr, sizeof(pstr));
875                 printk(KERN_INFO "Prism2 card SN: %s\n", pstr);
876         } else {
877                 printk(KERN_ERR "Failed to retrieve Prism2 Card SN\n");
878                 goto failed;
879         }
880
881         /* Collect the MAC address */
882         result = hfa384x_drvr_getconfig(hw, HFA384x_RID_CNFOWNMACADDR,
883                                         wlandev->netdev->dev_addr, ETH_ALEN);
884         if (result != 0) {
885                 printk(KERN_ERR "Failed to retrieve mac address\n");
886                 goto failed;
887         }
888
889         /* short preamble is always implemented */
890         wlandev->nsdcaps |= P80211_NSDCAP_SHORT_PREAMBLE;
891
892         /* find out if hardware wep is implemented */
893         hfa384x_drvr_getconfig16(hw, HFA384x_RID_PRIVACYOPTIMP, &temp);
894         if (temp)
895                 wlandev->nsdcaps |= P80211_NSDCAP_HARDWAREWEP;
896
897         /* get the dBm Scaling constant */
898         hfa384x_drvr_getconfig16(hw, HFA384x_RID_CNFDBMADJUST, &temp);
899         hw->dbmadjust = temp;
900
901         /* Only enable scan by default on newer firmware */
902         if (HFA384x_FIRMWARE_VERSION(hw->ident_sta_fw.major,
903                                      hw->ident_sta_fw.minor,
904                                      hw->ident_sta_fw.variant) <
905             HFA384x_FIRMWARE_VERSION(1, 5, 5)) {
906                 wlandev->nsdcaps |= P80211_NSDCAP_NOSCAN;
907         }
908
909         /* TODO: Set any internally managed config items */
910
911         goto done;
912 failed:
913         printk(KERN_ERR "Failed, result=%d\n", result);
914 done:
915         return result;
916 }
917
918 /*----------------------------------------------------------------
919 * prism2sta_globalsetup
920 *
921 * Set any global RIDs that we want to set at device activation.
922 *
923 * Arguments:
924 *       wlandev         wlan device structure
925 *
926 * Returns:
927 *       0       success
928 *       >0      f/w reported error
929 *       <0      driver reported error
930 *
931 * Side effects:
932 *
933 * Call context:
934 *       process thread
935 ----------------------------------------------------------------*/
936 static int prism2sta_globalsetup(wlandevice_t *wlandev)
937 {
938         hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
939
940         /* Set the maximum frame size */
941         return hfa384x_drvr_setconfig16(hw, HFA384x_RID_CNFMAXDATALEN,
942                                         WLAN_DATA_MAXLEN);
943 }
944
945 static int prism2sta_setmulticast(wlandevice_t *wlandev, netdevice_t *dev)
946 {
947         int result = 0;
948         hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
949
950         u16 promisc;
951
952         /* If we're not ready, what's the point? */
953         if (hw->state != HFA384x_STATE_RUNNING)
954                 goto exit;
955
956         if ((dev->flags & (IFF_PROMISC | IFF_ALLMULTI)) != 0)
957                 promisc = P80211ENUM_truth_true;
958         else
959                 promisc = P80211ENUM_truth_false;
960
961         result =
962             hfa384x_drvr_setconfig16_async(hw, HFA384x_RID_PROMISCMODE,
963                                            promisc);
964 exit:
965         return result;
966 }
967
968 /*----------------------------------------------------------------
969 * prism2sta_inf_handover
970 *
971 * Handles the receipt of a Handover info frame. Should only be present
972 * in APs only.
973 *
974 * Arguments:
975 *       wlandev         wlan device structure
976 *       inf             ptr to info frame (contents in hfa384x order)
977 *
978 * Returns:
979 *       nothing
980 *
981 * Side effects:
982 *
983 * Call context:
984 *       interrupt
985 ----------------------------------------------------------------*/
986 static void prism2sta_inf_handover(wlandevice_t *wlandev,
987                                    hfa384x_InfFrame_t *inf)
988 {
989         pr_debug("received infoframe:HANDOVER (unhandled)\n");
990 }
991
992 /*----------------------------------------------------------------
993 * prism2sta_inf_tallies
994 *
995 * Handles the receipt of a CommTallies info frame.
996 *
997 * Arguments:
998 *       wlandev         wlan device structure
999 *       inf             ptr to info frame (contents in hfa384x order)
1000 *
1001 * Returns:
1002 *       nothing
1003 *
1004 * Side effects:
1005 *
1006 * Call context:
1007 *       interrupt
1008 ----------------------------------------------------------------*/
1009 static void prism2sta_inf_tallies(wlandevice_t *wlandev,
1010                                   hfa384x_InfFrame_t *inf)
1011 {
1012         hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
1013         u16 *src16;
1014         u32 *dst;
1015         u32 *src32;
1016         int i;
1017         int cnt;
1018
1019         /*
1020          ** Determine if these are 16-bit or 32-bit tallies, based on the
1021          ** record length of the info record.
1022          */
1023
1024         cnt = sizeof(hfa384x_CommTallies32_t) / sizeof(u32);
1025         if (inf->framelen > 22) {
1026                 dst = (u32 *) &hw->tallies;
1027                 src32 = (u32 *) &inf->info.commtallies32;
1028                 for (i = 0; i < cnt; i++, dst++, src32++)
1029                         *dst += le32_to_cpu(*src32);
1030         } else {
1031                 dst = (u32 *) &hw->tallies;
1032                 src16 = (u16 *) &inf->info.commtallies16;
1033                 for (i = 0; i < cnt; i++, dst++, src16++)
1034                         *dst += le16_to_cpu(*src16);
1035         }
1036 }
1037
1038 /*----------------------------------------------------------------
1039 * prism2sta_inf_scanresults
1040 *
1041 * Handles the receipt of a Scan Results info frame.
1042 *
1043 * Arguments:
1044 *       wlandev         wlan device structure
1045 *       inf             ptr to info frame (contents in hfa384x order)
1046 *
1047 * Returns:
1048 *       nothing
1049 *
1050 * Side effects:
1051 *
1052 * Call context:
1053 *       interrupt
1054 ----------------------------------------------------------------*/
1055 static void prism2sta_inf_scanresults(wlandevice_t *wlandev,
1056                                       hfa384x_InfFrame_t *inf)
1057 {
1058
1059         hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
1060         int nbss;
1061         hfa384x_ScanResult_t *sr = &(inf->info.scanresult);
1062         int i;
1063         hfa384x_JoinRequest_data_t joinreq;
1064         int result;
1065
1066         /* Get the number of results, first in bytes, then in results */
1067         nbss = (inf->framelen * sizeof(u16)) -
1068             sizeof(inf->infotype) - sizeof(inf->info.scanresult.scanreason);
1069         nbss /= sizeof(hfa384x_ScanResultSub_t);
1070
1071         /* Print em */
1072         pr_debug("rx scanresults, reason=%d, nbss=%d:\n",
1073                  inf->info.scanresult.scanreason, nbss);
1074         for (i = 0; i < nbss; i++) {
1075                 pr_debug("chid=%d anl=%d sl=%d bcnint=%d\n",
1076                          sr->result[i].chid,
1077                          sr->result[i].anl,
1078                          sr->result[i].sl, sr->result[i].bcnint);
1079                 pr_debug("  capinfo=0x%04x proberesp_rate=%d\n",
1080                          sr->result[i].capinfo, sr->result[i].proberesp_rate);
1081         }
1082         /* issue a join request */
1083         joinreq.channel = sr->result[0].chid;
1084         memcpy(joinreq.bssid, sr->result[0].bssid, WLAN_BSSID_LEN);
1085         result = hfa384x_drvr_setconfig(hw,
1086                                         HFA384x_RID_JOINREQUEST,
1087                                         &joinreq, HFA384x_RID_JOINREQUEST_LEN);
1088         if (result) {
1089                 printk(KERN_ERR "setconfig(joinreq) failed, result=%d\n",
1090                        result);
1091         }
1092 }
1093
1094 /*----------------------------------------------------------------
1095 * prism2sta_inf_hostscanresults
1096 *
1097 * Handles the receipt of a Scan Results info frame.
1098 *
1099 * Arguments:
1100 *       wlandev         wlan device structure
1101 *       inf             ptr to info frame (contents in hfa384x order)
1102 *
1103 * Returns:
1104 *       nothing
1105 *
1106 * Side effects:
1107 *
1108 * Call context:
1109 *       interrupt
1110 ----------------------------------------------------------------*/
1111 static void prism2sta_inf_hostscanresults(wlandevice_t *wlandev,
1112                                           hfa384x_InfFrame_t *inf)
1113 {
1114         hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
1115         int nbss;
1116
1117         nbss = (inf->framelen - 3) / 32;
1118         pr_debug("Received %d hostscan results\n", nbss);
1119
1120         if (nbss > 32)
1121                 nbss = 32;
1122
1123         kfree(hw->scanresults);
1124
1125         hw->scanresults = kmemdup(inf, sizeof(hfa384x_InfFrame_t), GFP_ATOMIC);
1126
1127         if (nbss == 0)
1128                 nbss = -1;
1129
1130         /* Notify/wake the sleeping caller. */
1131         hw->scanflag = nbss;
1132         wake_up_interruptible(&hw->cmdq);
1133 };
1134
1135 /*----------------------------------------------------------------
1136 * prism2sta_inf_chinforesults
1137 *
1138 * Handles the receipt of a Channel Info Results info frame.
1139 *
1140 * Arguments:
1141 *       wlandev         wlan device structure
1142 *       inf             ptr to info frame (contents in hfa384x order)
1143 *
1144 * Returns:
1145 *       nothing
1146 *
1147 * Side effects:
1148 *
1149 * Call context:
1150 *       interrupt
1151 ----------------------------------------------------------------*/
1152 static void prism2sta_inf_chinforesults(wlandevice_t *wlandev,
1153                                         hfa384x_InfFrame_t *inf)
1154 {
1155         hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
1156         unsigned int i, n;
1157
1158         hw->channel_info.results.scanchannels =
1159             le16_to_cpu(inf->info.chinforesult.scanchannels);
1160
1161         for (i = 0, n = 0; i < HFA384x_CHINFORESULT_MAX; i++) {
1162                 hfa384x_ChInfoResultSub_t *result;
1163                 hfa384x_ChInfoResultSub_t *chinforesult;
1164                 int chan;
1165
1166                 if (!(hw->channel_info.results.scanchannels & (1 << i)))
1167                         continue;
1168
1169                 result = &inf->info.chinforesult.result[n];
1170                 chan = le16_to_cpu(result->chid) - 1;
1171
1172                 if (chan < 0 || chan >= HFA384x_CHINFORESULT_MAX)
1173                         continue;
1174
1175                 chinforesult = &hw->channel_info.results.result[chan];
1176                 chinforesult->chid = chan;
1177                 chinforesult->anl = le16_to_cpu(result->anl);
1178                 chinforesult->pnl = le16_to_cpu(result->pnl);
1179                 chinforesult->active = le16_to_cpu(result->active);
1180
1181                 pr_debug("chinfo: channel %d, %s level (avg/peak)=%d/%d dB, pcf %d\n",
1182                          chan + 1,
1183                          (chinforesult->active & HFA384x_CHINFORESULT_BSSACTIVE)
1184                                 ? "signal" : "noise",
1185                          chinforesult->anl, chinforesult->pnl,
1186                          (chinforesult->active & HFA384x_CHINFORESULT_PCFACTIVE)
1187                                 ? 1 : 0);
1188                 n++;
1189         }
1190         atomic_set(&hw->channel_info.done, 2);
1191
1192         hw->channel_info.count = n;
1193 }
1194
1195 void prism2sta_processing_defer(struct work_struct *data)
1196 {
1197         hfa384x_t *hw = container_of(data, struct hfa384x, link_bh);
1198         wlandevice_t *wlandev = hw->wlandev;
1199         hfa384x_bytestr32_t ssid;
1200         int result;
1201
1202         /* First let's process the auth frames */
1203         {
1204                 struct sk_buff *skb;
1205                 hfa384x_InfFrame_t *inf;
1206
1207                 while ((skb = skb_dequeue(&hw->authq))) {
1208                         inf = (hfa384x_InfFrame_t *) skb->data;
1209                         prism2sta_inf_authreq_defer(wlandev, inf);
1210                 }
1211
1212         }
1213
1214         /* Now let's handle the linkstatus stuff */
1215         if (hw->link_status == hw->link_status_new)
1216                 return;
1217
1218         hw->link_status = hw->link_status_new;
1219
1220         switch (hw->link_status) {
1221         case HFA384x_LINK_NOTCONNECTED:
1222                 /* I'm currently assuming that this is the initial link
1223                  * state.  It should only be possible immediately
1224                  * following an Enable command.
1225                  * Response:
1226                  * Block Transmits, Ignore receives of data frames
1227                  */
1228                 netif_carrier_off(wlandev->netdev);
1229
1230                 printk(KERN_INFO "linkstatus=NOTCONNECTED (unhandled)\n");
1231                 break;
1232
1233         case HFA384x_LINK_CONNECTED:
1234                 /* This one indicates a successful scan/join/auth/assoc.
1235                  * When we have the full MLME complement, this event will
1236                  * signify successful completion of both mlme_authenticate
1237                  * and mlme_associate.  State management will get a little
1238                  * ugly here.
1239                  * Response:
1240                  * Indicate authentication and/or association
1241                  * Enable Transmits, Receives and pass up data frames
1242                  */
1243
1244                 netif_carrier_on(wlandev->netdev);
1245
1246                 /* If we are joining a specific AP, set our
1247                  * state and reset retries
1248                  */
1249                 if (hw->join_ap == 1)
1250                         hw->join_ap = 2;
1251                 hw->join_retries = 60;
1252
1253                 /* Don't call this in monitor mode */
1254                 if (wlandev->netdev->type == ARPHRD_ETHER) {
1255                         u16 portstatus;
1256
1257                         printk(KERN_INFO "linkstatus=CONNECTED\n");
1258
1259                         /* For non-usb devices, we can use the sync versions */
1260                         /* Collect the BSSID, and set state to allow tx */
1261
1262                         result = hfa384x_drvr_getconfig(hw,
1263                                                 HFA384x_RID_CURRENTBSSID,
1264                                                 wlandev->bssid,
1265                                                 WLAN_BSSID_LEN);
1266                         if (result) {
1267                                 pr_debug
1268                                     ("getconfig(0x%02x) failed, result = %d\n",
1269                                      HFA384x_RID_CURRENTBSSID, result);
1270                                 return;
1271                         }
1272
1273                         result = hfa384x_drvr_getconfig(hw,
1274                                                         HFA384x_RID_CURRENTSSID,
1275                                                         &ssid, sizeof(ssid));
1276                         if (result) {
1277                                 pr_debug
1278                                     ("getconfig(0x%02x) failed, result = %d\n",
1279                                      HFA384x_RID_CURRENTSSID, result);
1280                                 return;
1281                         }
1282                         prism2mgmt_bytestr2pstr((hfa384x_bytestr_t *) &ssid,
1283                                                 (p80211pstrd_t *) &
1284                                                 wlandev->ssid);
1285
1286                         /* Collect the port status */
1287                         result = hfa384x_drvr_getconfig16(hw,
1288                                                         HFA384x_RID_PORTSTATUS,
1289                                                         &portstatus);
1290                         if (result) {
1291                                 pr_debug
1292                                     ("getconfig(0x%02x) failed, result = %d\n",
1293                                      HFA384x_RID_PORTSTATUS, result);
1294                                 return;
1295                         }
1296                         wlandev->macmode =
1297                             (portstatus == HFA384x_PSTATUS_CONN_IBSS) ?
1298                             WLAN_MACMODE_IBSS_STA : WLAN_MACMODE_ESS_STA;
1299
1300                         /* signal back up to cfg80211 layer */
1301                         prism2_connect_result(wlandev, P80211ENUM_truth_false);
1302
1303                         /* Get the ball rolling on the comms quality stuff */
1304                         prism2sta_commsqual_defer(&hw->commsqual_bh);
1305                 }
1306                 break;
1307
1308         case HFA384x_LINK_DISCONNECTED:
1309                 /* This one indicates that our association is gone.  We've
1310                  * lost connection with the AP and/or been disassociated.
1311                  * This indicates that the MAC has completely cleared it's
1312                  * associated state.  We * should send a deauth indication
1313                  * (implying disassoc) up * to the MLME.
1314                  * Response:
1315                  * Indicate Deauthentication
1316                  * Block Transmits, Ignore receives of data frames
1317                  */
1318                 if (wlandev->netdev->type == ARPHRD_ETHER)
1319                         printk(KERN_INFO
1320                                "linkstatus=DISCONNECTED (unhandled)\n");
1321                 wlandev->macmode = WLAN_MACMODE_NONE;
1322
1323                 netif_carrier_off(wlandev->netdev);
1324
1325                 /* signal back up to cfg80211 layer */
1326                 prism2_disconnected(wlandev);
1327
1328                 break;
1329
1330         case HFA384x_LINK_AP_CHANGE:
1331                 /* This one indicates that the MAC has decided to and
1332                  * successfully completed a change to another AP.  We
1333                  * should probably implement a reassociation indication
1334                  * in response to this one.  I'm thinking that the the
1335                  * p80211 layer needs to be notified in case of
1336                  * buffering/queueing issues.  User mode also needs to be
1337                  * notified so that any BSS dependent elements can be
1338                  * updated.
1339                  * associated state.  We * should send a deauth indication
1340                  * (implying disassoc) up * to the MLME.
1341                  * Response:
1342                  * Indicate Reassociation
1343                  * Enable Transmits, Receives and pass up data frames
1344                  */
1345                 printk(KERN_INFO "linkstatus=AP_CHANGE\n");
1346
1347                 result = hfa384x_drvr_getconfig(hw,
1348                                                 HFA384x_RID_CURRENTBSSID,
1349                                                 wlandev->bssid, WLAN_BSSID_LEN);
1350                 if (result) {
1351                         pr_debug("getconfig(0x%02x) failed, result = %d\n",
1352                                  HFA384x_RID_CURRENTBSSID, result);
1353                         return;
1354                 }
1355
1356                 result = hfa384x_drvr_getconfig(hw,
1357                                                 HFA384x_RID_CURRENTSSID,
1358                                                 &ssid, sizeof(ssid));
1359                 if (result) {
1360                         pr_debug("getconfig(0x%02x) failed, result = %d\n",
1361                                  HFA384x_RID_CURRENTSSID, result);
1362                         return;
1363                 }
1364                 prism2mgmt_bytestr2pstr((hfa384x_bytestr_t *) &ssid,
1365                                         (p80211pstrd_t *) &wlandev->ssid);
1366
1367                 hw->link_status = HFA384x_LINK_CONNECTED;
1368                 netif_carrier_on(wlandev->netdev);
1369
1370                 /* signal back up to cfg80211 layer */
1371                 prism2_roamed(wlandev);
1372
1373                 break;
1374
1375         case HFA384x_LINK_AP_OUTOFRANGE:
1376                 /* This one indicates that the MAC has decided that the
1377                  * AP is out of range, but hasn't found a better candidate
1378                  * so the MAC maintains its "associated" state in case
1379                  * we get back in range.  We should block transmits and
1380                  * receives in this state.  Do we need an indication here?
1381                  * Probably not since a polling user-mode element would
1382                  * get this status from from p2PortStatus(FD40). What about
1383                  * p80211?
1384                  * Response:
1385                  * Block Transmits, Ignore receives of data frames
1386                  */
1387                 printk(KERN_INFO "linkstatus=AP_OUTOFRANGE (unhandled)\n");
1388
1389                 netif_carrier_off(wlandev->netdev);
1390
1391                 break;
1392
1393         case HFA384x_LINK_AP_INRANGE:
1394                 /* This one indicates that the MAC has decided that the
1395                  * AP is back in range.  We continue working with our
1396                  * existing association.
1397                  * Response:
1398                  * Enable Transmits, Receives and pass up data frames
1399                  */
1400                 printk(KERN_INFO "linkstatus=AP_INRANGE\n");
1401
1402                 hw->link_status = HFA384x_LINK_CONNECTED;
1403                 netif_carrier_on(wlandev->netdev);
1404
1405                 break;
1406
1407         case HFA384x_LINK_ASSOCFAIL:
1408                 /* This one is actually a peer to CONNECTED.  We've
1409                  * requested a join for a given SSID and optionally BSSID.
1410                  * We can use this one to indicate authentication and
1411                  * association failures.  The trick is going to be
1412                  * 1) identifying the failure, and 2) state management.
1413                  * Response:
1414                  * Disable Transmits, Ignore receives of data frames
1415                  */
1416                 if (hw->join_ap && --hw->join_retries > 0) {
1417                         hfa384x_JoinRequest_data_t joinreq;
1418                         joinreq = hw->joinreq;
1419                         /* Send the join request */
1420                         hfa384x_drvr_setconfig(hw,
1421                                                HFA384x_RID_JOINREQUEST,
1422                                                &joinreq,
1423                                                HFA384x_RID_JOINREQUEST_LEN);
1424                         printk(KERN_INFO
1425                                "linkstatus=ASSOCFAIL (re-submitting join)\n");
1426                 } else {
1427                         printk(KERN_INFO "linkstatus=ASSOCFAIL (unhandled)\n");
1428                 }
1429
1430                 netif_carrier_off(wlandev->netdev);
1431
1432                 /* signal back up to cfg80211 layer */
1433                 prism2_connect_result(wlandev, P80211ENUM_truth_true);
1434
1435                 break;
1436
1437         default:
1438                 /* This is bad, IO port problems? */
1439                 printk(KERN_WARNING
1440                        "unknown linkstatus=0x%02x\n", hw->link_status);
1441                 return;
1442         }
1443
1444         wlandev->linkstatus = (hw->link_status == HFA384x_LINK_CONNECTED);
1445 }
1446
1447 /*----------------------------------------------------------------
1448 * prism2sta_inf_linkstatus
1449 *
1450 * Handles the receipt of a Link Status info frame.
1451 *
1452 * Arguments:
1453 *       wlandev         wlan device structure
1454 *       inf             ptr to info frame (contents in hfa384x order)
1455 *
1456 * Returns:
1457 *       nothing
1458 *
1459 * Side effects:
1460 *
1461 * Call context:
1462 *       interrupt
1463 ----------------------------------------------------------------*/
1464 static void prism2sta_inf_linkstatus(wlandevice_t *wlandev,
1465                                      hfa384x_InfFrame_t *inf)
1466 {
1467         hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
1468
1469         hw->link_status_new = le16_to_cpu(inf->info.linkstatus.linkstatus);
1470
1471         schedule_work(&hw->link_bh);
1472 }
1473
1474 /*----------------------------------------------------------------
1475 * prism2sta_inf_assocstatus
1476 *
1477 * Handles the receipt of an Association Status info frame. Should
1478 * be present in APs only.
1479 *
1480 * Arguments:
1481 *       wlandev         wlan device structure
1482 *       inf             ptr to info frame (contents in hfa384x order)
1483 *
1484 * Returns:
1485 *       nothing
1486 *
1487 * Side effects:
1488 *
1489 * Call context:
1490 *       interrupt
1491 ----------------------------------------------------------------*/
1492 static void prism2sta_inf_assocstatus(wlandevice_t *wlandev,
1493                                       hfa384x_InfFrame_t *inf)
1494 {
1495         hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
1496         hfa384x_AssocStatus_t rec;
1497         int i;
1498
1499         memcpy(&rec, &inf->info.assocstatus, sizeof(rec));
1500         rec.assocstatus = le16_to_cpu(rec.assocstatus);
1501         rec.reason = le16_to_cpu(rec.reason);
1502
1503         /*
1504          ** Find the address in the list of authenticated stations.
1505          ** If it wasn't found, then this address has not been previously
1506          ** authenticated and something weird has happened if this is
1507          ** anything other than an "authentication failed" message.
1508          ** If the address was found, then set the "associated" flag for
1509          ** that station, based on whether the station is associating or
1510          ** losing its association.  Something weird has also happened
1511          ** if we find the address in the list of authenticated stations
1512          ** but we are getting an "authentication failed" message.
1513          */
1514
1515         for (i = 0; i < hw->authlist.cnt; i++)
1516                 if (memcmp(rec.sta_addr, hw->authlist.addr[i], ETH_ALEN) == 0)
1517                         break;
1518
1519         if (i >= hw->authlist.cnt) {
1520                 if (rec.assocstatus != HFA384x_ASSOCSTATUS_AUTHFAIL)
1521                         printk(KERN_WARNING
1522         "assocstatus info frame received for non-authenticated station.\n");
1523         } else {
1524                 hw->authlist.assoc[i] =
1525                     (rec.assocstatus == HFA384x_ASSOCSTATUS_STAASSOC ||
1526                      rec.assocstatus == HFA384x_ASSOCSTATUS_REASSOC);
1527
1528                 if (rec.assocstatus == HFA384x_ASSOCSTATUS_AUTHFAIL)
1529                         printk(KERN_WARNING
1530 "authfail assocstatus info frame received for authenticated station.\n");
1531         }
1532 }
1533
1534 /*----------------------------------------------------------------
1535 * prism2sta_inf_authreq
1536 *
1537 * Handles the receipt of an Authentication Request info frame. Should
1538 * be present in APs only.
1539 *
1540 * Arguments:
1541 *       wlandev         wlan device structure
1542 *       inf             ptr to info frame (contents in hfa384x order)
1543 *
1544 * Returns:
1545 *       nothing
1546 *
1547 * Side effects:
1548 *
1549 * Call context:
1550 *       interrupt
1551 *
1552 ----------------------------------------------------------------*/
1553 static void prism2sta_inf_authreq(wlandevice_t *wlandev,
1554                                   hfa384x_InfFrame_t *inf)
1555 {
1556         hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
1557         struct sk_buff *skb;
1558
1559         skb = dev_alloc_skb(sizeof(*inf));
1560         if (skb) {
1561                 skb_put(skb, sizeof(*inf));
1562                 memcpy(skb->data, inf, sizeof(*inf));
1563                 skb_queue_tail(&hw->authq, skb);
1564                 schedule_work(&hw->link_bh);
1565         }
1566 }
1567
1568 static void prism2sta_inf_authreq_defer(wlandevice_t *wlandev,
1569                                         hfa384x_InfFrame_t *inf)
1570 {
1571         hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
1572         hfa384x_authenticateStation_data_t rec;
1573
1574         int i, added, result, cnt;
1575         u8 *addr;
1576
1577         /*
1578          ** Build the AuthenticateStation record.  Initialize it for denying
1579          ** authentication.
1580          */
1581
1582         memcpy(rec.address, inf->info.authreq.sta_addr, ETH_ALEN);
1583         rec.status = P80211ENUM_status_unspec_failure;
1584
1585         /*
1586          ** Authenticate based on the access mode.
1587          */
1588
1589         switch (hw->accessmode) {
1590         case WLAN_ACCESS_NONE:
1591
1592                 /*
1593                  ** Deny all new authentications.  However, if a station
1594                  ** is ALREADY authenticated, then accept it.
1595                  */
1596
1597                 for (i = 0; i < hw->authlist.cnt; i++)
1598                         if (memcmp(rec.address, hw->authlist.addr[i],
1599                                    ETH_ALEN) == 0) {
1600                                 rec.status = P80211ENUM_status_successful;
1601                                 break;
1602                         }
1603
1604                 break;
1605
1606         case WLAN_ACCESS_ALL:
1607
1608                 /*
1609                  ** Allow all authentications.
1610                  */
1611
1612                 rec.status = P80211ENUM_status_successful;
1613                 break;
1614
1615         case WLAN_ACCESS_ALLOW:
1616
1617                 /*
1618                  ** Only allow the authentication if the MAC address
1619                  ** is in the list of allowed addresses.
1620                  **
1621                  ** Since this is the interrupt handler, we may be here
1622                  ** while the access list is in the middle of being
1623                  ** updated.  Choose the list which is currently okay.
1624                  ** See "prism2mib_priv_accessallow()" for details.
1625                  */
1626
1627                 if (hw->allow.modify == 0) {
1628                         cnt = hw->allow.cnt;
1629                         addr = hw->allow.addr[0];
1630                 } else {
1631                         cnt = hw->allow.cnt1;
1632                         addr = hw->allow.addr1[0];
1633                 }
1634
1635                 for (i = 0; i < cnt; i++, addr += ETH_ALEN)
1636                         if (memcmp(rec.address, addr, ETH_ALEN) == 0) {
1637                                 rec.status = P80211ENUM_status_successful;
1638                                 break;
1639                         }
1640
1641                 break;
1642
1643         case WLAN_ACCESS_DENY:
1644
1645                 /*
1646                  ** Allow the authentication UNLESS the MAC address is
1647                  ** in the list of denied addresses.
1648                  **
1649                  ** Since this is the interrupt handler, we may be here
1650                  ** while the access list is in the middle of being
1651                  ** updated.  Choose the list which is currently okay.
1652                  ** See "prism2mib_priv_accessdeny()" for details.
1653                  */
1654
1655                 if (hw->deny.modify == 0) {
1656                         cnt = hw->deny.cnt;
1657                         addr = hw->deny.addr[0];
1658                 } else {
1659                         cnt = hw->deny.cnt1;
1660                         addr = hw->deny.addr1[0];
1661                 }
1662
1663                 rec.status = P80211ENUM_status_successful;
1664
1665                 for (i = 0; i < cnt; i++, addr += ETH_ALEN)
1666                         if (memcmp(rec.address, addr, ETH_ALEN) == 0) {
1667                                 rec.status = P80211ENUM_status_unspec_failure;
1668                                 break;
1669                         }
1670
1671                 break;
1672         }
1673
1674         /*
1675          ** If the authentication is okay, then add the MAC address to the
1676          ** list of authenticated stations.  Don't add the address if it
1677          ** is already in the list. (802.11b does not seem to disallow
1678          ** a station from issuing an authentication request when the
1679          ** station is already authenticated. Does this sort of thing
1680          ** ever happen?  We might as well do the check just in case.)
1681          */
1682
1683         added = 0;
1684
1685         if (rec.status == P80211ENUM_status_successful) {
1686                 for (i = 0; i < hw->authlist.cnt; i++)
1687                         if (memcmp(rec.address, hw->authlist.addr[i], ETH_ALEN)
1688                             == 0)
1689                                 break;
1690
1691                 if (i >= hw->authlist.cnt) {
1692                         if (hw->authlist.cnt >= WLAN_AUTH_MAX) {
1693                                 rec.status = P80211ENUM_status_ap_full;
1694                         } else {
1695                                 memcpy(hw->authlist.addr[hw->authlist.cnt],
1696                                        rec.address, ETH_ALEN);
1697                                 hw->authlist.cnt++;
1698                                 added = 1;
1699                         }
1700                 }
1701         }
1702
1703         /*
1704          ** Send back the results of the authentication.  If this doesn't work,
1705          ** then make sure to remove the address from the authenticated list if
1706          ** it was added.
1707          */
1708
1709         rec.status = cpu_to_le16(rec.status);
1710         rec.algorithm = inf->info.authreq.algorithm;
1711
1712         result = hfa384x_drvr_setconfig(hw, HFA384x_RID_AUTHENTICATESTA,
1713                                         &rec, sizeof(rec));
1714         if (result) {
1715                 if (added)
1716                         hw->authlist.cnt--;
1717                 printk(KERN_ERR
1718                        "setconfig(authenticatestation) failed, result=%d\n",
1719                        result);
1720         }
1721 }
1722
1723 /*----------------------------------------------------------------
1724 * prism2sta_inf_psusercnt
1725 *
1726 * Handles the receipt of a PowerSaveUserCount info frame. Should
1727 * be present in APs only.
1728 *
1729 * Arguments:
1730 *       wlandev         wlan device structure
1731 *       inf             ptr to info frame (contents in hfa384x order)
1732 *
1733 * Returns:
1734 *       nothing
1735 *
1736 * Side effects:
1737 *
1738 * Call context:
1739 *       interrupt
1740 ----------------------------------------------------------------*/
1741 static void prism2sta_inf_psusercnt(wlandevice_t *wlandev,
1742                                     hfa384x_InfFrame_t *inf)
1743 {
1744         hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
1745
1746         hw->psusercount = le16_to_cpu(inf->info.psusercnt.usercnt);
1747 }
1748
1749 /*----------------------------------------------------------------
1750 * prism2sta_ev_info
1751 *
1752 * Handles the Info event.
1753 *
1754 * Arguments:
1755 *       wlandev         wlan device structure
1756 *       inf             ptr to a generic info frame
1757 *
1758 * Returns:
1759 *       nothing
1760 *
1761 * Side effects:
1762 *
1763 * Call context:
1764 *       interrupt
1765 ----------------------------------------------------------------*/
1766 void prism2sta_ev_info(wlandevice_t *wlandev, hfa384x_InfFrame_t *inf)
1767 {
1768         inf->infotype = le16_to_cpu(inf->infotype);
1769         /* Dispatch */
1770         switch (inf->infotype) {
1771         case HFA384x_IT_HANDOVERADDR:
1772                 prism2sta_inf_handover(wlandev, inf);
1773                 break;
1774         case HFA384x_IT_COMMTALLIES:
1775                 prism2sta_inf_tallies(wlandev, inf);
1776                 break;
1777         case HFA384x_IT_HOSTSCANRESULTS:
1778                 prism2sta_inf_hostscanresults(wlandev, inf);
1779                 break;
1780         case HFA384x_IT_SCANRESULTS:
1781                 prism2sta_inf_scanresults(wlandev, inf);
1782                 break;
1783         case HFA384x_IT_CHINFORESULTS:
1784                 prism2sta_inf_chinforesults(wlandev, inf);
1785                 break;
1786         case HFA384x_IT_LINKSTATUS:
1787                 prism2sta_inf_linkstatus(wlandev, inf);
1788                 break;
1789         case HFA384x_IT_ASSOCSTATUS:
1790                 prism2sta_inf_assocstatus(wlandev, inf);
1791                 break;
1792         case HFA384x_IT_AUTHREQ:
1793                 prism2sta_inf_authreq(wlandev, inf);
1794                 break;
1795         case HFA384x_IT_PSUSERCNT:
1796                 prism2sta_inf_psusercnt(wlandev, inf);
1797                 break;
1798         case HFA384x_IT_KEYIDCHANGED:
1799                 printk(KERN_WARNING "Unhandled IT_KEYIDCHANGED\n");
1800                 break;
1801         case HFA384x_IT_ASSOCREQ:
1802                 printk(KERN_WARNING "Unhandled IT_ASSOCREQ\n");
1803                 break;
1804         case HFA384x_IT_MICFAILURE:
1805                 printk(KERN_WARNING "Unhandled IT_MICFAILURE\n");
1806                 break;
1807         default:
1808                 printk(KERN_WARNING
1809                        "Unknown info type=0x%02x\n", inf->infotype);
1810                 break;
1811         }
1812 }
1813
1814 /*----------------------------------------------------------------
1815 * prism2sta_ev_txexc
1816 *
1817 * Handles the TxExc event.  A Transmit Exception event indicates
1818 * that the MAC's TX process was unsuccessful - so the packet did
1819 * not get transmitted.
1820 *
1821 * Arguments:
1822 *       wlandev         wlan device structure
1823 *       status          tx frame status word
1824 *
1825 * Returns:
1826 *       nothing
1827 *
1828 * Side effects:
1829 *
1830 * Call context:
1831 *       interrupt
1832 ----------------------------------------------------------------*/
1833 void prism2sta_ev_txexc(wlandevice_t *wlandev, u16 status)
1834 {
1835         pr_debug("TxExc status=0x%x.\n", status);
1836 }
1837
1838 /*----------------------------------------------------------------
1839 * prism2sta_ev_tx
1840 *
1841 * Handles the Tx event.
1842 *
1843 * Arguments:
1844 *       wlandev         wlan device structure
1845 *       status          tx frame status word
1846 * Returns:
1847 *       nothing
1848 *
1849 * Side effects:
1850 *
1851 * Call context:
1852 *       interrupt
1853 ----------------------------------------------------------------*/
1854 void prism2sta_ev_tx(wlandevice_t *wlandev, u16 status)
1855 {
1856         pr_debug("Tx Complete, status=0x%04x\n", status);
1857         /* update linux network stats */
1858         wlandev->linux_stats.tx_packets++;
1859 }
1860
1861 /*----------------------------------------------------------------
1862 * prism2sta_ev_rx
1863 *
1864 * Handles the Rx event.
1865 *
1866 * Arguments:
1867 *       wlandev         wlan device structure
1868 *
1869 * Returns:
1870 *       nothing
1871 *
1872 * Side effects:
1873 *
1874 * Call context:
1875 *       interrupt
1876 ----------------------------------------------------------------*/
1877 void prism2sta_ev_rx(wlandevice_t *wlandev, struct sk_buff *skb)
1878 {
1879         p80211netdev_rx(wlandev, skb);
1880 }
1881
1882 /*----------------------------------------------------------------
1883 * prism2sta_ev_alloc
1884 *
1885 * Handles the Alloc event.
1886 *
1887 * Arguments:
1888 *       wlandev         wlan device structure
1889 *
1890 * Returns:
1891 *       nothing
1892 *
1893 * Side effects:
1894 *
1895 * Call context:
1896 *       interrupt
1897 ----------------------------------------------------------------*/
1898 void prism2sta_ev_alloc(wlandevice_t *wlandev)
1899 {
1900         netif_wake_queue(wlandev->netdev);
1901 }
1902
1903 /*----------------------------------------------------------------
1904 * create_wlan
1905 *
1906 * Called at module init time.  This creates the wlandevice_t structure
1907 * and initializes it with relevant bits.
1908 *
1909 * Arguments:
1910 *       none
1911 *
1912 * Returns:
1913 *       the created wlandevice_t structure.
1914 *
1915 * Side effects:
1916 *       also allocates the priv/hw structures.
1917 *
1918 * Call context:
1919 *       process thread
1920 *
1921 ----------------------------------------------------------------*/
1922 static wlandevice_t *create_wlan(void)
1923 {
1924         wlandevice_t *wlandev = NULL;
1925         hfa384x_t *hw = NULL;
1926
1927         /* Alloc our structures */
1928         wlandev = kzalloc(sizeof(wlandevice_t), GFP_KERNEL);
1929         hw = kzalloc(sizeof(hfa384x_t), GFP_KERNEL);
1930
1931         if (!wlandev || !hw) {
1932                 printk(KERN_ERR "%s: Memory allocation failure.\n", dev_info);
1933                 kfree(wlandev);
1934                 kfree(hw);
1935                 return NULL;
1936         }
1937
1938         /* Initialize the network device object. */
1939         wlandev->nsdname = dev_info;
1940         wlandev->msdstate = WLAN_MSD_HWPRESENT_PENDING;
1941         wlandev->priv = hw;
1942         wlandev->open = prism2sta_open;
1943         wlandev->close = prism2sta_close;
1944         wlandev->reset = prism2sta_reset;
1945         wlandev->txframe = prism2sta_txframe;
1946         wlandev->mlmerequest = prism2sta_mlmerequest;
1947         wlandev->set_multicast_list = prism2sta_setmulticast;
1948         wlandev->tx_timeout = hfa384x_tx_timeout;
1949
1950         wlandev->nsdcaps = P80211_NSDCAP_HWFRAGMENT | P80211_NSDCAP_AUTOJOIN;
1951
1952         /* Initialize the device private data structure. */
1953         hw->dot11_desired_bss_type = 1;
1954
1955         return wlandev;
1956 }
1957
1958 void prism2sta_commsqual_defer(struct work_struct *data)
1959 {
1960         hfa384x_t *hw = container_of(data, struct hfa384x, commsqual_bh);
1961         wlandevice_t *wlandev = hw->wlandev;
1962         hfa384x_bytestr32_t ssid;
1963         struct p80211msg_dot11req_mibget msg;
1964         p80211item_uint32_t *mibitem = (p80211item_uint32_t *)
1965                                                 &msg.mibattribute.data;
1966         int result = 0;
1967
1968         if (hw->wlandev->hwremoved)
1969                 return;
1970
1971         /* we don't care if we're in AP mode */
1972         if ((wlandev->macmode == WLAN_MACMODE_NONE) ||
1973             (wlandev->macmode == WLAN_MACMODE_ESS_AP)) {
1974                 return;
1975         }
1976
1977         /* It only makes sense to poll these in non-IBSS */
1978         if (wlandev->macmode != WLAN_MACMODE_IBSS_STA) {
1979                 result = hfa384x_drvr_getconfig(
1980                                 hw, HFA384x_RID_DBMCOMMSQUALITY,
1981                                 &hw->qual, HFA384x_RID_DBMCOMMSQUALITY_LEN);
1982
1983                 if (result) {
1984                         printk(KERN_ERR "error fetching commsqual\n");
1985                         return;
1986                 }
1987
1988                 pr_debug("commsqual %d %d %d\n",
1989                          le16_to_cpu(hw->qual.CQ_currBSS),
1990                          le16_to_cpu(hw->qual.ASL_currBSS),
1991                          le16_to_cpu(hw->qual.ANL_currFC));
1992         }
1993
1994         /* Get the signal rate */
1995         msg.msgcode = DIDmsg_dot11req_mibget;
1996         mibitem->did = DIDmib_p2_p2MAC_p2CurrentTxRate;
1997         result = p80211req_dorequest(wlandev, (u8 *) &msg);
1998
1999         if (result) {
2000                 pr_debug("get signal rate failed, result = %d\n",
2001                          result);
2002                 return;
2003         }
2004
2005         switch (mibitem->data) {
2006         case HFA384x_RATEBIT_1:
2007                 hw->txrate = 10;
2008                 break;
2009         case HFA384x_RATEBIT_2:
2010                 hw->txrate = 20;
2011                 break;
2012         case HFA384x_RATEBIT_5dot5:
2013                 hw->txrate = 55;
2014                 break;
2015         case HFA384x_RATEBIT_11:
2016                 hw->txrate = 110;
2017                 break;
2018         default:
2019                 pr_debug("Bad ratebit (%d)\n", mibitem->data);
2020         }
2021
2022         /* Lastly, we need to make sure the BSSID didn't change on us */
2023         result = hfa384x_drvr_getconfig(hw,
2024                                         HFA384x_RID_CURRENTBSSID,
2025                                         wlandev->bssid, WLAN_BSSID_LEN);
2026         if (result) {
2027                 pr_debug("getconfig(0x%02x) failed, result = %d\n",
2028                          HFA384x_RID_CURRENTBSSID, result);
2029                 return;
2030         }
2031
2032         result = hfa384x_drvr_getconfig(hw,
2033                                         HFA384x_RID_CURRENTSSID,
2034                                         &ssid, sizeof(ssid));
2035         if (result) {
2036                 pr_debug("getconfig(0x%02x) failed, result = %d\n",
2037                          HFA384x_RID_CURRENTSSID, result);
2038                 return;
2039         }
2040         prism2mgmt_bytestr2pstr((hfa384x_bytestr_t *) &ssid,
2041                                 (p80211pstrd_t *) &wlandev->ssid);
2042
2043         /* Reschedule timer */
2044         mod_timer(&hw->commsqual_timer, jiffies + HZ);
2045 }
2046
2047 void prism2sta_commsqual_timer(unsigned long data)
2048 {
2049         hfa384x_t *hw = (hfa384x_t *) data;
2050
2051         schedule_work(&hw->commsqual_bh);
2052 }