Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp3554017pxj; Mon, 21 Jun 2021 01:02:49 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzUggj9Xc3jxvHKJ3+MS5sv5jgXJTtSqOt8mvN4Nh/674aUjf0LyXA6+jKap1wONKwT/izY X-Received: by 2002:a17:906:4fc7:: with SMTP id i7mr9782277ejw.46.1624262569294; Mon, 21 Jun 2021 01:02:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1624262569; cv=none; d=google.com; s=arc-20160816; b=cfgdssM3s7gOUJgl9lOezbsnPCLmYg9SUQD5JZ9+hbumQBI2fPJppWrL4OzH6kRkiK hjbNun1zHzQrzCWw3f127vhg0RV4jVFr4IW/39FJhey3VP515IBvnQwOVsQEnZGUrvXt b3cuZtLecHZ4rWRzUi09DkmXYy3di3lOh2gtB9h3Bcqg/oQrFrjkn922lgOH+t3sj3F8 U1I/VA3C/W1fbM6iwgssaJI10YGGP9bGRFDJrBbOEPmhL4gf19kkJyrg9MHrQfZExNYY 3OxKsUsQTbtJkgZUpjhstVYdOgdhIU3xsjuQhldVA1UQ/EKPxkXA81mij4kGm79z9i/6 ppdw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :ironport-sdr:ironport-sdr; bh=fdxFysXiKtvs4OjhjStNDKWq1gYUUsi9hOHZb42A0OY=; b=o1UzfX+GA57H0gyuWlFCfm0i3bbsf+6oSDeS9mSx7TIfPoT4CpUa+EKTlOYyYCI6B+ BNlC3Hr141SBLmUUlFOSVe3ylIM9cMjtZEDiniCkcnwMXXb7iSpOS9C8vRbvMVrKAsD1 2q48+fFi6kuoT245cKWBMsR7UF2SfCctT9/RWATR/ZT3VgSMMiFWhAeT/8zdn1xt59an CzXolrVNQwLk7B1Bnxn8O16uxsA4aLoOq5g7ZSsz+3hQ0i/HFLDgHsMTNlD9Fr40HZxT H25GRNtVjpSToxUGFOJFi3WStAsZRyfr4Utg0Iqnma38ydhSsY+lk6WI7H6WPCesfZ9g 9eZg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id f3si11086587ejl.557.2021.06.21.01.02.23; Mon, 21 Jun 2021 01:02:49 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230180AbhFUIEe (ORCPT + 99 others); Mon, 21 Jun 2021 04:04:34 -0400 Received: from mga17.intel.com ([192.55.52.151]:8994 "EHLO mga17.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230061AbhFUIEd (ORCPT ); Mon, 21 Jun 2021 04:04:33 -0400 IronPort-SDR: JnAJKpQ2zsZj7jV2q6PXsKQzNaI4K2cOSxwQINlPy1ymi+yzRwZutDHCiACmwXZayWt8KUg5EW zVatjNHIbOdA== X-IronPort-AV: E=McAfee;i="6200,9189,10021"; a="187172850" X-IronPort-AV: E=Sophos;i="5.83,289,1616482800"; d="scan'208";a="187172850" Received: from fmsmga005.fm.intel.com ([10.253.24.32]) by fmsmga107.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 21 Jun 2021 01:02:17 -0700 IronPort-SDR: mNg8vv3zpssOXGujvQdu4p4BLl6PiI1gcPgloGzrEfyFMUDMab7kLmG+zhep88BoLUElyzhjd9 Mt4/PDLUEr9Q== X-IronPort-AV: E=Sophos;i="5.83,289,1616482800"; d="scan'208";a="641250165" Received: from rdar-mobl.ger.corp.intel.com (HELO egrumbac-mobl1.lan) ([10.255.196.155]) by fmsmga005-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 21 Jun 2021 01:02:13 -0700 From: Emmanuel Grumbach To: luciano.coelho@intel.com, linux-wireless@vger.kernel.org Cc: Emmanuel Grumbach , Ayala Beker Subject: [PATCH v2 3/4] nl80211: vendor-cmd: add Intel vendor commands for iwlmei usage Date: Mon, 21 Jun 2021 11:01:58 +0300 Message-Id: <20210621080159.12883-3-emmanuel.grumbach@intel.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20210621080159.12883-1-emmanuel.grumbach@intel.com> References: <20210621080159.12883-1-emmanuel.grumbach@intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org iwlmei allows to integrate with the CSME firmware. There are flows that are prioprietary for this purpose: * Get the information the AP, the CSME firmware is connected to. This is useful when we need to speed up the connection process in case the CSME firmware has an TCP connection that must be kept alive across the ownership transition. * Forbid roaming, which will happen when the CSME firmware wants to tell the user space not disrupt the connection. * Request ownership, upon driver boot when the CSME firmware owns the device. Co-Developed-by: Ayala Beker Signed-off-by: Emmanuel Grumbach --- include/uapi/linux/nl80211-vnd-intel.h | 80 ++++++++++++++++++++++++++ 1 file changed, 80 insertions(+) create mode 100644 include/uapi/linux/nl80211-vnd-intel.h diff --git a/include/uapi/linux/nl80211-vnd-intel.h b/include/uapi/linux/nl80211-vnd-intel.h new file mode 100644 index 000000000000..d41c34b84f25 --- /dev/null +++ b/include/uapi/linux/nl80211-vnd-intel.h @@ -0,0 +1,80 @@ +/* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */ +/* + * Copyright (C) 2012-2014, 2018-2021 Intel Corporation + * Copyright (C) 2013-2015 Intel Mobile Communications GmbH + * Copyright (C) 2016-2017 Intel Deutschland GmbH + */ +#ifndef __VENDOR_CMD_INTEL_H__ +#define __VENDOR_CMD_INTEL_H__ + +#define INTEL_OUI 0x001735 + +/** + * enum iwl_mvm_vendor_cmd - supported vendor commands + * @IWL_MVM_VENDOR_CMD_GET_CSME_CONN_INFO: reports CSME connection info. + * @IWL_MVM_VENDOR_CMD_HOST_GET_OWNERSHIP: asks for ownership on the device. + * @IWL_MVM_VENDOR_CMD_ROAMING_FORBIDDEN_EVENT: notifies if roaming is allowed. + * It contains a &IWL_MVM_VENDOR_ATTR_ROAMING_FORBIDDEN and a + * &IWL_MVM_VENDOR_ATTR_VIF_ADDR attributes. + */ + +enum iwl_mvm_vendor_cmd { + IWL_MVM_VENDOR_CMD_GET_CSME_CONN_INFO = 0x2d, + IWL_MVM_VENDOR_CMD_HOST_GET_OWNERSHIP = 0x30, + IWL_MVM_VENDOR_CMD_ROAMING_FORBIDDEN_EVENT = 0x32, +}; + +enum iwl_vendor_auth_akm_mode { + IWL_VENDOR_AUTH_OPEN, + IWL_VENDOR_AUTH_SHARED, + IWL_VENDOR_AUTH_WPA = 0x3, + IWL_VENDOR_AUTH_WPA_PSK, + IWL_VENDOR_AUTH_RSNA = 0x6, + IWL_VENDOR_AUTH_RSNA_PSK, + IWL_VENDOR_AUTH_SAE = 0x9, + IWL_VENDOR_AUTH_MAX, +}; + +/** + * enum iwl_mvm_vendor_attr - attributes used in vendor commands + * @__IWL_MVM_VENDOR_ATTR_INVALID: attribute 0 is invalid + * @IWL_MVM_VENDOR_ATTR_VIF_ADDR: interface MAC address + * @IWL_MVM_VENDOR_ATTR_ADDR: MAC address + * @IWL_MVM_VENDOR_ATTR_SSID: SSID (binary attribute, 0..32 octets) + * @IWL_MVM_VENDOR_ATTR_STA_CIPHER: the cipher to use for the station with the + * mac address specified in &IWL_MVM_VENDOR_ATTR_ADDR. + * @IWL_MVM_VENDOR_ATTR_ROAMING_FORBIDDEN: u8 attribute. Indicates whether + * roaming is forbidden or not. Value 1 means roaming is forbidden, + * 0 mean roaming is allowed. + * @IWL_MVM_VENDOR_ATTR_AUTH_MODE: u32 attribute. Authentication mode type + * as specified in &enum iwl_vendor_auth_akm_mode. + * @IWL_MVM_VENDOR_ATTR_CHANNEL_NUM: u8 attribute. Contains channel number. + * @IWL_MVM_VENDOR_ATTR_BAND: u8 attribute. + * 0 for 2.4 GHz band, 1 for 5.2GHz band and 2 for 6GHz band. + * @IWL_MVM_VENDOR_ATTR_COLLOC_CHANNEL: u32 attribute. Channel number of + * collocated AP. Relevant for 6GHz AP info. + * @IWL_MVM_VENDOR_ATTR_COLLOC_ADDR: MAC address of a collocated AP. + * Relevant for 6GHz AP info. + * + * @NUM_IWL_MVM_VENDOR_ATTR: number of vendor attributes + * @MAX_IWL_MVM_VENDOR_ATTR: highest vendor attribute number + + */ +enum iwl_mvm_vendor_attr { + __IWL_MVM_VENDOR_ATTR_INVALID = 0x00, + IWL_MVM_VENDOR_ATTR_VIF_ADDR = 0x02, + IWL_MVM_VENDOR_ATTR_ADDR = 0x0a, + IWL_MVM_VENDOR_ATTR_SSID = 0x3d, + IWL_MVM_VENDOR_ATTR_STA_CIPHER = 0x51, + IWL_MVM_VENDOR_ATTR_ROAMING_FORBIDDEN = 0x64, + IWL_MVM_VENDOR_ATTR_AUTH_MODE = 0x65, + IWL_MVM_VENDOR_ATTR_CHANNEL_NUM = 0x66, + IWL_MVM_VENDOR_ATTR_BAND = 0x69, + IWL_MVM_VENDOR_ATTR_COLLOC_CHANNEL = 0x70, + IWL_MVM_VENDOR_ATTR_COLLOC_ADDR = 0x71, + + NUM_IWL_MVM_VENDOR_ATTR, + MAX_IWL_MVM_VENDOR_ATTR = NUM_IWL_MVM_VENDOR_ATTR - 1, +}; + +#endif /* __VENDOR_CMD_INTEL_H__ */ -- 2.25.1