perf tools: Fix libaudit test
[linux/fpc-iii.git] / net / wireless / wext-core.c
blobc8717c1d082e702f9b071c480e873b408b400daf
1 /*
2 * This file implement the Wireless Extensions core API.
4 * Authors : Jean Tourrilhes - HPL - <jt@hpl.hp.com>
5 * Copyright (c) 1997-2007 Jean Tourrilhes, All Rights Reserved.
6 * Copyright 2009 Johannes Berg <johannes@sipsolutions.net>
8 * (As all part of the Linux kernel, this file is GPL)
9 */
10 #include <linux/kernel.h>
11 #include <linux/netdevice.h>
12 #include <linux/rtnetlink.h>
13 #include <linux/slab.h>
14 #include <linux/wireless.h>
15 #include <linux/uaccess.h>
16 #include <linux/export.h>
17 #include <net/cfg80211.h>
18 #include <net/iw_handler.h>
19 #include <net/netlink.h>
20 #include <net/wext.h>
21 #include <net/net_namespace.h>
23 typedef int (*wext_ioctl_func)(struct net_device *, struct iwreq *,
24 unsigned int, struct iw_request_info *,
25 iw_handler);
29 * Meta-data about all the standard Wireless Extension request we
30 * know about.
32 static const struct iw_ioctl_description standard_ioctl[] = {
33 [IW_IOCTL_IDX(SIOCSIWCOMMIT)] = {
34 .header_type = IW_HEADER_TYPE_NULL,
36 [IW_IOCTL_IDX(SIOCGIWNAME)] = {
37 .header_type = IW_HEADER_TYPE_CHAR,
38 .flags = IW_DESCR_FLAG_DUMP,
40 [IW_IOCTL_IDX(SIOCSIWNWID)] = {
41 .header_type = IW_HEADER_TYPE_PARAM,
42 .flags = IW_DESCR_FLAG_EVENT,
44 [IW_IOCTL_IDX(SIOCGIWNWID)] = {
45 .header_type = IW_HEADER_TYPE_PARAM,
46 .flags = IW_DESCR_FLAG_DUMP,
48 [IW_IOCTL_IDX(SIOCSIWFREQ)] = {
49 .header_type = IW_HEADER_TYPE_FREQ,
50 .flags = IW_DESCR_FLAG_EVENT,
52 [IW_IOCTL_IDX(SIOCGIWFREQ)] = {
53 .header_type = IW_HEADER_TYPE_FREQ,
54 .flags = IW_DESCR_FLAG_DUMP,
56 [IW_IOCTL_IDX(SIOCSIWMODE)] = {
57 .header_type = IW_HEADER_TYPE_UINT,
58 .flags = IW_DESCR_FLAG_EVENT,
60 [IW_IOCTL_IDX(SIOCGIWMODE)] = {
61 .header_type = IW_HEADER_TYPE_UINT,
62 .flags = IW_DESCR_FLAG_DUMP,
64 [IW_IOCTL_IDX(SIOCSIWSENS)] = {
65 .header_type = IW_HEADER_TYPE_PARAM,
67 [IW_IOCTL_IDX(SIOCGIWSENS)] = {
68 .header_type = IW_HEADER_TYPE_PARAM,
70 [IW_IOCTL_IDX(SIOCSIWRANGE)] = {
71 .header_type = IW_HEADER_TYPE_NULL,
73 [IW_IOCTL_IDX(SIOCGIWRANGE)] = {
74 .header_type = IW_HEADER_TYPE_POINT,
75 .token_size = 1,
76 .max_tokens = sizeof(struct iw_range),
77 .flags = IW_DESCR_FLAG_DUMP,
79 [IW_IOCTL_IDX(SIOCSIWPRIV)] = {
80 .header_type = IW_HEADER_TYPE_NULL,
82 [IW_IOCTL_IDX(SIOCGIWPRIV)] = { /* (handled directly by us) */
83 .header_type = IW_HEADER_TYPE_POINT,
84 .token_size = sizeof(struct iw_priv_args),
85 .max_tokens = 16,
86 .flags = IW_DESCR_FLAG_NOMAX,
88 [IW_IOCTL_IDX(SIOCSIWSTATS)] = {
89 .header_type = IW_HEADER_TYPE_NULL,
91 [IW_IOCTL_IDX(SIOCGIWSTATS)] = { /* (handled directly by us) */
92 .header_type = IW_HEADER_TYPE_POINT,
93 .token_size = 1,
94 .max_tokens = sizeof(struct iw_statistics),
95 .flags = IW_DESCR_FLAG_DUMP,
97 [IW_IOCTL_IDX(SIOCSIWSPY)] = {
98 .header_type = IW_HEADER_TYPE_POINT,
99 .token_size = sizeof(struct sockaddr),
100 .max_tokens = IW_MAX_SPY,
102 [IW_IOCTL_IDX(SIOCGIWSPY)] = {
103 .header_type = IW_HEADER_TYPE_POINT,
104 .token_size = sizeof(struct sockaddr) +
105 sizeof(struct iw_quality),
106 .max_tokens = IW_MAX_SPY,
108 [IW_IOCTL_IDX(SIOCSIWTHRSPY)] = {
109 .header_type = IW_HEADER_TYPE_POINT,
110 .token_size = sizeof(struct iw_thrspy),
111 .min_tokens = 1,
112 .max_tokens = 1,
114 [IW_IOCTL_IDX(SIOCGIWTHRSPY)] = {
115 .header_type = IW_HEADER_TYPE_POINT,
116 .token_size = sizeof(struct iw_thrspy),
117 .min_tokens = 1,
118 .max_tokens = 1,
120 [IW_IOCTL_IDX(SIOCSIWAP)] = {
121 .header_type = IW_HEADER_TYPE_ADDR,
123 [IW_IOCTL_IDX(SIOCGIWAP)] = {
124 .header_type = IW_HEADER_TYPE_ADDR,
125 .flags = IW_DESCR_FLAG_DUMP,
127 [IW_IOCTL_IDX(SIOCSIWMLME)] = {
128 .header_type = IW_HEADER_TYPE_POINT,
129 .token_size = 1,
130 .min_tokens = sizeof(struct iw_mlme),
131 .max_tokens = sizeof(struct iw_mlme),
133 [IW_IOCTL_IDX(SIOCGIWAPLIST)] = {
134 .header_type = IW_HEADER_TYPE_POINT,
135 .token_size = sizeof(struct sockaddr) +
136 sizeof(struct iw_quality),
137 .max_tokens = IW_MAX_AP,
138 .flags = IW_DESCR_FLAG_NOMAX,
140 [IW_IOCTL_IDX(SIOCSIWSCAN)] = {
141 .header_type = IW_HEADER_TYPE_POINT,
142 .token_size = 1,
143 .min_tokens = 0,
144 .max_tokens = sizeof(struct iw_scan_req),
146 [IW_IOCTL_IDX(SIOCGIWSCAN)] = {
147 .header_type = IW_HEADER_TYPE_POINT,
148 .token_size = 1,
149 .max_tokens = IW_SCAN_MAX_DATA,
150 .flags = IW_DESCR_FLAG_NOMAX,
152 [IW_IOCTL_IDX(SIOCSIWESSID)] = {
153 .header_type = IW_HEADER_TYPE_POINT,
154 .token_size = 1,
155 .max_tokens = IW_ESSID_MAX_SIZE,
156 .flags = IW_DESCR_FLAG_EVENT,
158 [IW_IOCTL_IDX(SIOCGIWESSID)] = {
159 .header_type = IW_HEADER_TYPE_POINT,
160 .token_size = 1,
161 .max_tokens = IW_ESSID_MAX_SIZE,
162 .flags = IW_DESCR_FLAG_DUMP,
164 [IW_IOCTL_IDX(SIOCSIWNICKN)] = {
165 .header_type = IW_HEADER_TYPE_POINT,
166 .token_size = 1,
167 .max_tokens = IW_ESSID_MAX_SIZE,
169 [IW_IOCTL_IDX(SIOCGIWNICKN)] = {
170 .header_type = IW_HEADER_TYPE_POINT,
171 .token_size = 1,
172 .max_tokens = IW_ESSID_MAX_SIZE,
174 [IW_IOCTL_IDX(SIOCSIWRATE)] = {
175 .header_type = IW_HEADER_TYPE_PARAM,
177 [IW_IOCTL_IDX(SIOCGIWRATE)] = {
178 .header_type = IW_HEADER_TYPE_PARAM,
180 [IW_IOCTL_IDX(SIOCSIWRTS)] = {
181 .header_type = IW_HEADER_TYPE_PARAM,
183 [IW_IOCTL_IDX(SIOCGIWRTS)] = {
184 .header_type = IW_HEADER_TYPE_PARAM,
186 [IW_IOCTL_IDX(SIOCSIWFRAG)] = {
187 .header_type = IW_HEADER_TYPE_PARAM,
189 [IW_IOCTL_IDX(SIOCGIWFRAG)] = {
190 .header_type = IW_HEADER_TYPE_PARAM,
192 [IW_IOCTL_IDX(SIOCSIWTXPOW)] = {
193 .header_type = IW_HEADER_TYPE_PARAM,
195 [IW_IOCTL_IDX(SIOCGIWTXPOW)] = {
196 .header_type = IW_HEADER_TYPE_PARAM,
198 [IW_IOCTL_IDX(SIOCSIWRETRY)] = {
199 .header_type = IW_HEADER_TYPE_PARAM,
201 [IW_IOCTL_IDX(SIOCGIWRETRY)] = {
202 .header_type = IW_HEADER_TYPE_PARAM,
204 [IW_IOCTL_IDX(SIOCSIWENCODE)] = {
205 .header_type = IW_HEADER_TYPE_POINT,
206 .token_size = 1,
207 .max_tokens = IW_ENCODING_TOKEN_MAX,
208 .flags = IW_DESCR_FLAG_EVENT | IW_DESCR_FLAG_RESTRICT,
210 [IW_IOCTL_IDX(SIOCGIWENCODE)] = {
211 .header_type = IW_HEADER_TYPE_POINT,
212 .token_size = 1,
213 .max_tokens = IW_ENCODING_TOKEN_MAX,
214 .flags = IW_DESCR_FLAG_DUMP | IW_DESCR_FLAG_RESTRICT,
216 [IW_IOCTL_IDX(SIOCSIWPOWER)] = {
217 .header_type = IW_HEADER_TYPE_PARAM,
219 [IW_IOCTL_IDX(SIOCGIWPOWER)] = {
220 .header_type = IW_HEADER_TYPE_PARAM,
222 [IW_IOCTL_IDX(SIOCSIWGENIE)] = {
223 .header_type = IW_HEADER_TYPE_POINT,
224 .token_size = 1,
225 .max_tokens = IW_GENERIC_IE_MAX,
227 [IW_IOCTL_IDX(SIOCGIWGENIE)] = {
228 .header_type = IW_HEADER_TYPE_POINT,
229 .token_size = 1,
230 .max_tokens = IW_GENERIC_IE_MAX,
232 [IW_IOCTL_IDX(SIOCSIWAUTH)] = {
233 .header_type = IW_HEADER_TYPE_PARAM,
235 [IW_IOCTL_IDX(SIOCGIWAUTH)] = {
236 .header_type = IW_HEADER_TYPE_PARAM,
238 [IW_IOCTL_IDX(SIOCSIWENCODEEXT)] = {
239 .header_type = IW_HEADER_TYPE_POINT,
240 .token_size = 1,
241 .min_tokens = sizeof(struct iw_encode_ext),
242 .max_tokens = sizeof(struct iw_encode_ext) +
243 IW_ENCODING_TOKEN_MAX,
245 [IW_IOCTL_IDX(SIOCGIWENCODEEXT)] = {
246 .header_type = IW_HEADER_TYPE_POINT,
247 .token_size = 1,
248 .min_tokens = sizeof(struct iw_encode_ext),
249 .max_tokens = sizeof(struct iw_encode_ext) +
250 IW_ENCODING_TOKEN_MAX,
252 [IW_IOCTL_IDX(SIOCSIWPMKSA)] = {
253 .header_type = IW_HEADER_TYPE_POINT,
254 .token_size = 1,
255 .min_tokens = sizeof(struct iw_pmksa),
256 .max_tokens = sizeof(struct iw_pmksa),
259 static const unsigned int standard_ioctl_num = ARRAY_SIZE(standard_ioctl);
262 * Meta-data about all the additional standard Wireless Extension events
263 * we know about.
265 static const struct iw_ioctl_description standard_event[] = {
266 [IW_EVENT_IDX(IWEVTXDROP)] = {
267 .header_type = IW_HEADER_TYPE_ADDR,
269 [IW_EVENT_IDX(IWEVQUAL)] = {
270 .header_type = IW_HEADER_TYPE_QUAL,
272 [IW_EVENT_IDX(IWEVCUSTOM)] = {
273 .header_type = IW_HEADER_TYPE_POINT,
274 .token_size = 1,
275 .max_tokens = IW_CUSTOM_MAX,
277 [IW_EVENT_IDX(IWEVREGISTERED)] = {
278 .header_type = IW_HEADER_TYPE_ADDR,
280 [IW_EVENT_IDX(IWEVEXPIRED)] = {
281 .header_type = IW_HEADER_TYPE_ADDR,
283 [IW_EVENT_IDX(IWEVGENIE)] = {
284 .header_type = IW_HEADER_TYPE_POINT,
285 .token_size = 1,
286 .max_tokens = IW_GENERIC_IE_MAX,
288 [IW_EVENT_IDX(IWEVMICHAELMICFAILURE)] = {
289 .header_type = IW_HEADER_TYPE_POINT,
290 .token_size = 1,
291 .max_tokens = sizeof(struct iw_michaelmicfailure),
293 [IW_EVENT_IDX(IWEVASSOCREQIE)] = {
294 .header_type = IW_HEADER_TYPE_POINT,
295 .token_size = 1,
296 .max_tokens = IW_GENERIC_IE_MAX,
298 [IW_EVENT_IDX(IWEVASSOCRESPIE)] = {
299 .header_type = IW_HEADER_TYPE_POINT,
300 .token_size = 1,
301 .max_tokens = IW_GENERIC_IE_MAX,
303 [IW_EVENT_IDX(IWEVPMKIDCAND)] = {
304 .header_type = IW_HEADER_TYPE_POINT,
305 .token_size = 1,
306 .max_tokens = sizeof(struct iw_pmkid_cand),
309 static const unsigned int standard_event_num = ARRAY_SIZE(standard_event);
311 /* Size (in bytes) of various events */
312 static const int event_type_size[] = {
313 IW_EV_LCP_LEN, /* IW_HEADER_TYPE_NULL */
315 IW_EV_CHAR_LEN, /* IW_HEADER_TYPE_CHAR */
317 IW_EV_UINT_LEN, /* IW_HEADER_TYPE_UINT */
318 IW_EV_FREQ_LEN, /* IW_HEADER_TYPE_FREQ */
319 IW_EV_ADDR_LEN, /* IW_HEADER_TYPE_ADDR */
321 IW_EV_POINT_LEN, /* Without variable payload */
322 IW_EV_PARAM_LEN, /* IW_HEADER_TYPE_PARAM */
323 IW_EV_QUAL_LEN, /* IW_HEADER_TYPE_QUAL */
326 #ifdef CONFIG_COMPAT
327 static const int compat_event_type_size[] = {
328 IW_EV_COMPAT_LCP_LEN, /* IW_HEADER_TYPE_NULL */
330 IW_EV_COMPAT_CHAR_LEN, /* IW_HEADER_TYPE_CHAR */
332 IW_EV_COMPAT_UINT_LEN, /* IW_HEADER_TYPE_UINT */
333 IW_EV_COMPAT_FREQ_LEN, /* IW_HEADER_TYPE_FREQ */
334 IW_EV_COMPAT_ADDR_LEN, /* IW_HEADER_TYPE_ADDR */
336 IW_EV_COMPAT_POINT_LEN, /* Without variable payload */
337 IW_EV_COMPAT_PARAM_LEN, /* IW_HEADER_TYPE_PARAM */
338 IW_EV_COMPAT_QUAL_LEN, /* IW_HEADER_TYPE_QUAL */
340 #endif
343 /* IW event code */
345 static int __net_init wext_pernet_init(struct net *net)
347 skb_queue_head_init(&net->wext_nlevents);
348 return 0;
351 static void __net_exit wext_pernet_exit(struct net *net)
353 skb_queue_purge(&net->wext_nlevents);
356 static struct pernet_operations wext_pernet_ops = {
357 .init = wext_pernet_init,
358 .exit = wext_pernet_exit,
361 static int __init wireless_nlevent_init(void)
363 return register_pernet_subsys(&wext_pernet_ops);
366 subsys_initcall(wireless_nlevent_init);
368 /* Process events generated by the wireless layer or the driver. */
369 static void wireless_nlevent_process(struct work_struct *work)
371 struct sk_buff *skb;
372 struct net *net;
374 rtnl_lock();
376 for_each_net(net) {
377 while ((skb = skb_dequeue(&net->wext_nlevents)))
378 rtnl_notify(skb, net, 0, RTNLGRP_LINK, NULL,
379 GFP_KERNEL);
382 rtnl_unlock();
385 static DECLARE_WORK(wireless_nlevent_work, wireless_nlevent_process);
387 static struct nlmsghdr *rtnetlink_ifinfo_prep(struct net_device *dev,
388 struct sk_buff *skb)
390 struct ifinfomsg *r;
391 struct nlmsghdr *nlh;
393 nlh = nlmsg_put(skb, 0, 0, RTM_NEWLINK, sizeof(*r), 0);
394 if (!nlh)
395 return NULL;
397 r = nlmsg_data(nlh);
398 r->ifi_family = AF_UNSPEC;
399 r->__ifi_pad = 0;
400 r->ifi_type = dev->type;
401 r->ifi_index = dev->ifindex;
402 r->ifi_flags = dev_get_flags(dev);
403 r->ifi_change = 0; /* Wireless changes don't affect those flags */
405 if (nla_put_string(skb, IFLA_IFNAME, dev->name))
406 goto nla_put_failure;
408 return nlh;
409 nla_put_failure:
410 nlmsg_cancel(skb, nlh);
411 return NULL;
416 * Main event dispatcher. Called from other parts and drivers.
417 * Send the event on the appropriate channels.
418 * May be called from interrupt context.
420 void wireless_send_event(struct net_device * dev,
421 unsigned int cmd,
422 union iwreq_data * wrqu,
423 const char * extra)
425 const struct iw_ioctl_description * descr = NULL;
426 int extra_len = 0;
427 struct iw_event *event; /* Mallocated whole event */
428 int event_len; /* Its size */
429 int hdr_len; /* Size of the event header */
430 int wrqu_off = 0; /* Offset in wrqu */
431 /* Don't "optimise" the following variable, it will crash */
432 unsigned int cmd_index; /* *MUST* be unsigned */
433 struct sk_buff *skb;
434 struct nlmsghdr *nlh;
435 struct nlattr *nla;
436 #ifdef CONFIG_COMPAT
437 struct __compat_iw_event *compat_event;
438 struct compat_iw_point compat_wrqu;
439 struct sk_buff *compskb;
440 #endif
443 * Nothing in the kernel sends scan events with data, be safe.
444 * This is necessary because we cannot fix up scan event data
445 * for compat, due to being contained in 'extra', but normally
446 * applications are required to retrieve the scan data anyway
447 * and no data is included in the event, this codifies that
448 * practice.
450 if (WARN_ON(cmd == SIOCGIWSCAN && extra))
451 extra = NULL;
453 /* Get the description of the Event */
454 if (cmd <= SIOCIWLAST) {
455 cmd_index = IW_IOCTL_IDX(cmd);
456 if (cmd_index < standard_ioctl_num)
457 descr = &(standard_ioctl[cmd_index]);
458 } else {
459 cmd_index = IW_EVENT_IDX(cmd);
460 if (cmd_index < standard_event_num)
461 descr = &(standard_event[cmd_index]);
463 /* Don't accept unknown events */
464 if (descr == NULL) {
465 /* Note : we don't return an error to the driver, because
466 * the driver would not know what to do about it. It can't
467 * return an error to the user, because the event is not
468 * initiated by a user request.
469 * The best the driver could do is to log an error message.
470 * We will do it ourselves instead...
472 netdev_err(dev, "(WE) : Invalid/Unknown Wireless Event (0x%04X)\n",
473 cmd);
474 return;
477 /* Check extra parameters and set extra_len */
478 if (descr->header_type == IW_HEADER_TYPE_POINT) {
479 /* Check if number of token fits within bounds */
480 if (wrqu->data.length > descr->max_tokens) {
481 netdev_err(dev, "(WE) : Wireless Event (cmd=0x%04X) too big (%d)\n",
482 cmd, wrqu->data.length);
483 return;
485 if (wrqu->data.length < descr->min_tokens) {
486 netdev_err(dev, "(WE) : Wireless Event (cmd=0x%04X) too small (%d)\n",
487 cmd, wrqu->data.length);
488 return;
490 /* Calculate extra_len - extra is NULL for restricted events */
491 if (extra != NULL)
492 extra_len = wrqu->data.length * descr->token_size;
493 /* Always at an offset in wrqu */
494 wrqu_off = IW_EV_POINT_OFF;
497 /* Total length of the event */
498 hdr_len = event_type_size[descr->header_type];
499 event_len = hdr_len + extra_len;
502 * The problem for 64/32 bit.
504 * On 64-bit, a regular event is laid out as follows:
505 * | 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 |
506 * | event.len | event.cmd | p a d d i n g |
507 * | wrqu data ... (with the correct size) |
509 * This padding exists because we manipulate event->u,
510 * and 'event' is not packed.
512 * An iw_point event is laid out like this instead:
513 * | 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 |
514 * | event.len | event.cmd | p a d d i n g |
515 * | iwpnt.len | iwpnt.flg | p a d d i n g |
516 * | extra data ...
518 * The second padding exists because struct iw_point is extended,
519 * but this depends on the platform...
521 * On 32-bit, all the padding shouldn't be there.
524 skb = nlmsg_new(NLMSG_DEFAULT_SIZE, GFP_ATOMIC);
525 if (!skb)
526 return;
528 /* Send via the RtNetlink event channel */
529 nlh = rtnetlink_ifinfo_prep(dev, skb);
530 if (WARN_ON(!nlh)) {
531 kfree_skb(skb);
532 return;
535 /* Add the wireless events in the netlink packet */
536 nla = nla_reserve(skb, IFLA_WIRELESS, event_len);
537 if (!nla) {
538 kfree_skb(skb);
539 return;
541 event = nla_data(nla);
543 /* Fill event - first clear to avoid data leaking */
544 memset(event, 0, hdr_len);
545 event->len = event_len;
546 event->cmd = cmd;
547 memcpy(&event->u, ((char *) wrqu) + wrqu_off, hdr_len - IW_EV_LCP_LEN);
548 if (extra_len)
549 memcpy(((char *) event) + hdr_len, extra, extra_len);
551 nlmsg_end(skb, nlh);
552 #ifdef CONFIG_COMPAT
553 hdr_len = compat_event_type_size[descr->header_type];
554 event_len = hdr_len + extra_len;
556 compskb = nlmsg_new(NLMSG_DEFAULT_SIZE, GFP_ATOMIC);
557 if (!compskb) {
558 kfree_skb(skb);
559 return;
562 /* Send via the RtNetlink event channel */
563 nlh = rtnetlink_ifinfo_prep(dev, compskb);
564 if (WARN_ON(!nlh)) {
565 kfree_skb(skb);
566 kfree_skb(compskb);
567 return;
570 /* Add the wireless events in the netlink packet */
571 nla = nla_reserve(compskb, IFLA_WIRELESS, event_len);
572 if (!nla) {
573 kfree_skb(skb);
574 kfree_skb(compskb);
575 return;
577 compat_event = nla_data(nla);
579 compat_event->len = event_len;
580 compat_event->cmd = cmd;
581 if (descr->header_type == IW_HEADER_TYPE_POINT) {
582 compat_wrqu.length = wrqu->data.length;
583 compat_wrqu.flags = wrqu->data.flags;
584 memcpy(&compat_event->pointer,
585 ((char *) &compat_wrqu) + IW_EV_COMPAT_POINT_OFF,
586 hdr_len - IW_EV_COMPAT_LCP_LEN);
587 if (extra_len)
588 memcpy(((char *) compat_event) + hdr_len,
589 extra, extra_len);
590 } else {
591 /* extra_len must be zero, so no if (extra) needed */
592 memcpy(&compat_event->pointer, wrqu,
593 hdr_len - IW_EV_COMPAT_LCP_LEN);
596 nlmsg_end(compskb, nlh);
598 skb_shinfo(skb)->frag_list = compskb;
599 #endif
600 skb_queue_tail(&dev_net(dev)->wext_nlevents, skb);
601 schedule_work(&wireless_nlevent_work);
603 EXPORT_SYMBOL(wireless_send_event);
607 /* IW handlers */
609 struct iw_statistics *get_wireless_stats(struct net_device *dev)
611 #ifdef CONFIG_WIRELESS_EXT
612 if ((dev->wireless_handlers != NULL) &&
613 (dev->wireless_handlers->get_wireless_stats != NULL))
614 return dev->wireless_handlers->get_wireless_stats(dev);
615 #endif
617 #ifdef CONFIG_CFG80211_WEXT
618 if (dev->ieee80211_ptr &&
619 dev->ieee80211_ptr->wiphy &&
620 dev->ieee80211_ptr->wiphy->wext &&
621 dev->ieee80211_ptr->wiphy->wext->get_wireless_stats)
622 return dev->ieee80211_ptr->wiphy->wext->get_wireless_stats(dev);
623 #endif
625 /* not found */
626 return NULL;
629 static int iw_handler_get_iwstats(struct net_device * dev,
630 struct iw_request_info * info,
631 union iwreq_data * wrqu,
632 char * extra)
634 /* Get stats from the driver */
635 struct iw_statistics *stats;
637 stats = get_wireless_stats(dev);
638 if (stats) {
639 /* Copy statistics to extra */
640 memcpy(extra, stats, sizeof(struct iw_statistics));
641 wrqu->data.length = sizeof(struct iw_statistics);
643 /* Check if we need to clear the updated flag */
644 if (wrqu->data.flags != 0)
645 stats->qual.updated &= ~IW_QUAL_ALL_UPDATED;
646 return 0;
647 } else
648 return -EOPNOTSUPP;
651 static iw_handler get_handler(struct net_device *dev, unsigned int cmd)
653 /* Don't "optimise" the following variable, it will crash */
654 unsigned int index; /* *MUST* be unsigned */
655 const struct iw_handler_def *handlers = NULL;
657 #ifdef CONFIG_CFG80211_WEXT
658 if (dev->ieee80211_ptr && dev->ieee80211_ptr->wiphy)
659 handlers = dev->ieee80211_ptr->wiphy->wext;
660 #endif
661 #ifdef CONFIG_WIRELESS_EXT
662 if (dev->wireless_handlers)
663 handlers = dev->wireless_handlers;
664 #endif
666 if (!handlers)
667 return NULL;
669 /* Try as a standard command */
670 index = IW_IOCTL_IDX(cmd);
671 if (index < handlers->num_standard)
672 return handlers->standard[index];
674 #ifdef CONFIG_WEXT_PRIV
675 /* Try as a private command */
676 index = cmd - SIOCIWFIRSTPRIV;
677 if (index < handlers->num_private)
678 return handlers->private[index];
679 #endif
681 /* Not found */
682 return NULL;
685 static int ioctl_standard_iw_point(struct iw_point *iwp, unsigned int cmd,
686 const struct iw_ioctl_description *descr,
687 iw_handler handler, struct net_device *dev,
688 struct iw_request_info *info)
690 int err, extra_size, user_length = 0, essid_compat = 0;
691 char *extra;
693 /* Calculate space needed by arguments. Always allocate
694 * for max space.
696 extra_size = descr->max_tokens * descr->token_size;
698 /* Check need for ESSID compatibility for WE < 21 */
699 switch (cmd) {
700 case SIOCSIWESSID:
701 case SIOCGIWESSID:
702 case SIOCSIWNICKN:
703 case SIOCGIWNICKN:
704 if (iwp->length == descr->max_tokens + 1)
705 essid_compat = 1;
706 else if (IW_IS_SET(cmd) && (iwp->length != 0)) {
707 char essid[IW_ESSID_MAX_SIZE + 1];
708 unsigned int len;
709 len = iwp->length * descr->token_size;
711 if (len > IW_ESSID_MAX_SIZE)
712 return -EFAULT;
714 err = copy_from_user(essid, iwp->pointer, len);
715 if (err)
716 return -EFAULT;
718 if (essid[iwp->length - 1] == '\0')
719 essid_compat = 1;
721 break;
722 default:
723 break;
726 iwp->length -= essid_compat;
728 /* Check what user space is giving us */
729 if (IW_IS_SET(cmd)) {
730 /* Check NULL pointer */
731 if (!iwp->pointer && iwp->length != 0)
732 return -EFAULT;
733 /* Check if number of token fits within bounds */
734 if (iwp->length > descr->max_tokens)
735 return -E2BIG;
736 if (iwp->length < descr->min_tokens)
737 return -EINVAL;
738 } else {
739 /* Check NULL pointer */
740 if (!iwp->pointer)
741 return -EFAULT;
742 /* Save user space buffer size for checking */
743 user_length = iwp->length;
745 /* Don't check if user_length > max to allow forward
746 * compatibility. The test user_length < min is
747 * implied by the test at the end.
750 /* Support for very large requests */
751 if ((descr->flags & IW_DESCR_FLAG_NOMAX) &&
752 (user_length > descr->max_tokens)) {
753 /* Allow userspace to GET more than max so
754 * we can support any size GET requests.
755 * There is still a limit : -ENOMEM.
757 extra_size = user_length * descr->token_size;
759 /* Note : user_length is originally a __u16,
760 * and token_size is controlled by us,
761 * so extra_size won't get negative and
762 * won't overflow...
767 /* kzalloc() ensures NULL-termination for essid_compat. */
768 extra = kzalloc(extra_size, GFP_KERNEL);
769 if (!extra)
770 return -ENOMEM;
772 /* If it is a SET, get all the extra data in here */
773 if (IW_IS_SET(cmd) && (iwp->length != 0)) {
774 if (copy_from_user(extra, iwp->pointer,
775 iwp->length *
776 descr->token_size)) {
777 err = -EFAULT;
778 goto out;
781 if (cmd == SIOCSIWENCODEEXT) {
782 struct iw_encode_ext *ee = (void *) extra;
784 if (iwp->length < sizeof(*ee) + ee->key_len) {
785 err = -EFAULT;
786 goto out;
791 if (IW_IS_GET(cmd) && !(descr->flags & IW_DESCR_FLAG_NOMAX)) {
793 * If this is a GET, but not NOMAX, it means that the extra
794 * data is not bounded by userspace, but by max_tokens. Thus
795 * set the length to max_tokens. This matches the extra data
796 * allocation.
797 * The driver should fill it with the number of tokens it
798 * provided, and it may check iwp->length rather than having
799 * knowledge of max_tokens. If the driver doesn't change the
800 * iwp->length, this ioctl just copies back max_token tokens
801 * filled with zeroes. Hopefully the driver isn't claiming
802 * them to be valid data.
804 iwp->length = descr->max_tokens;
807 err = handler(dev, info, (union iwreq_data *) iwp, extra);
809 iwp->length += essid_compat;
811 /* If we have something to return to the user */
812 if (!err && IW_IS_GET(cmd)) {
813 /* Check if there is enough buffer up there */
814 if (user_length < iwp->length) {
815 err = -E2BIG;
816 goto out;
819 if (copy_to_user(iwp->pointer, extra,
820 iwp->length *
821 descr->token_size)) {
822 err = -EFAULT;
823 goto out;
827 /* Generate an event to notify listeners of the change */
828 if ((descr->flags & IW_DESCR_FLAG_EVENT) &&
829 ((err == 0) || (err == -EIWCOMMIT))) {
830 union iwreq_data *data = (union iwreq_data *) iwp;
832 if (descr->flags & IW_DESCR_FLAG_RESTRICT)
833 /* If the event is restricted, don't
834 * export the payload.
836 wireless_send_event(dev, cmd, data, NULL);
837 else
838 wireless_send_event(dev, cmd, data, extra);
841 out:
842 kfree(extra);
843 return err;
847 * Call the commit handler in the driver
848 * (if exist and if conditions are right)
850 * Note : our current commit strategy is currently pretty dumb,
851 * but we will be able to improve on that...
852 * The goal is to try to agreagate as many changes as possible
853 * before doing the commit. Drivers that will define a commit handler
854 * are usually those that need a reset after changing parameters, so
855 * we want to minimise the number of reset.
856 * A cool idea is to use a timer : at each "set" command, we re-set the
857 * timer, when the timer eventually fires, we call the driver.
858 * Hopefully, more on that later.
860 * Also, I'm waiting to see how many people will complain about the
861 * netif_running(dev) test. I'm open on that one...
862 * Hopefully, the driver will remember to do a commit in "open()" ;-)
864 int call_commit_handler(struct net_device *dev)
866 #ifdef CONFIG_WIRELESS_EXT
867 if ((netif_running(dev)) &&
868 (dev->wireless_handlers->standard[0] != NULL))
869 /* Call the commit handler on the driver */
870 return dev->wireless_handlers->standard[0](dev, NULL,
871 NULL, NULL);
872 else
873 return 0; /* Command completed successfully */
874 #else
875 /* cfg80211 has no commit */
876 return 0;
877 #endif
881 * Main IOCTl dispatcher.
882 * Check the type of IOCTL and call the appropriate wrapper...
884 static int wireless_process_ioctl(struct net *net, struct ifreq *ifr,
885 unsigned int cmd,
886 struct iw_request_info *info,
887 wext_ioctl_func standard,
888 wext_ioctl_func private)
890 struct iwreq *iwr = (struct iwreq *) ifr;
891 struct net_device *dev;
892 iw_handler handler;
894 /* Permissions are already checked in dev_ioctl() before calling us.
895 * The copy_to/from_user() of ifr is also dealt with in there */
897 /* Make sure the device exist */
898 if ((dev = __dev_get_by_name(net, ifr->ifr_name)) == NULL)
899 return -ENODEV;
901 /* A bunch of special cases, then the generic case...
902 * Note that 'cmd' is already filtered in dev_ioctl() with
903 * (cmd >= SIOCIWFIRST && cmd <= SIOCIWLAST) */
904 if (cmd == SIOCGIWSTATS)
905 return standard(dev, iwr, cmd, info,
906 &iw_handler_get_iwstats);
908 #ifdef CONFIG_WEXT_PRIV
909 if (cmd == SIOCGIWPRIV && dev->wireless_handlers)
910 return standard(dev, iwr, cmd, info,
911 iw_handler_get_private);
912 #endif
914 /* Basic check */
915 if (!netif_device_present(dev))
916 return -ENODEV;
918 /* New driver API : try to find the handler */
919 handler = get_handler(dev, cmd);
920 if (handler) {
921 /* Standard and private are not the same */
922 if (cmd < SIOCIWFIRSTPRIV)
923 return standard(dev, iwr, cmd, info, handler);
924 else if (private)
925 return private(dev, iwr, cmd, info, handler);
927 /* Old driver API : call driver ioctl handler */
928 if (dev->netdev_ops->ndo_do_ioctl)
929 return dev->netdev_ops->ndo_do_ioctl(dev, ifr, cmd);
930 return -EOPNOTSUPP;
933 /* If command is `set a parameter', or `get the encoding parameters',
934 * check if the user has the right to do it.
936 static int wext_permission_check(unsigned int cmd)
938 if ((IW_IS_SET(cmd) || cmd == SIOCGIWENCODE ||
939 cmd == SIOCGIWENCODEEXT) &&
940 !capable(CAP_NET_ADMIN))
941 return -EPERM;
943 return 0;
946 /* entry point from dev ioctl */
947 static int wext_ioctl_dispatch(struct net *net, struct ifreq *ifr,
948 unsigned int cmd, struct iw_request_info *info,
949 wext_ioctl_func standard,
950 wext_ioctl_func private)
952 int ret = wext_permission_check(cmd);
954 if (ret)
955 return ret;
957 dev_load(net, ifr->ifr_name);
958 rtnl_lock();
959 ret = wireless_process_ioctl(net, ifr, cmd, info, standard, private);
960 rtnl_unlock();
962 return ret;
966 * Wrapper to call a standard Wireless Extension handler.
967 * We do various checks and also take care of moving data between
968 * user space and kernel space.
970 static int ioctl_standard_call(struct net_device * dev,
971 struct iwreq *iwr,
972 unsigned int cmd,
973 struct iw_request_info *info,
974 iw_handler handler)
976 const struct iw_ioctl_description * descr;
977 int ret = -EINVAL;
979 /* Get the description of the IOCTL */
980 if (IW_IOCTL_IDX(cmd) >= standard_ioctl_num)
981 return -EOPNOTSUPP;
982 descr = &(standard_ioctl[IW_IOCTL_IDX(cmd)]);
984 /* Check if we have a pointer to user space data or not */
985 if (descr->header_type != IW_HEADER_TYPE_POINT) {
987 /* No extra arguments. Trivial to handle */
988 ret = handler(dev, info, &(iwr->u), NULL);
990 /* Generate an event to notify listeners of the change */
991 if ((descr->flags & IW_DESCR_FLAG_EVENT) &&
992 ((ret == 0) || (ret == -EIWCOMMIT)))
993 wireless_send_event(dev, cmd, &(iwr->u), NULL);
994 } else {
995 ret = ioctl_standard_iw_point(&iwr->u.data, cmd, descr,
996 handler, dev, info);
999 /* Call commit handler if needed and defined */
1000 if (ret == -EIWCOMMIT)
1001 ret = call_commit_handler(dev);
1003 /* Here, we will generate the appropriate event if needed */
1005 return ret;
1009 int wext_handle_ioctl(struct net *net, struct ifreq *ifr, unsigned int cmd,
1010 void __user *arg)
1012 struct iw_request_info info = { .cmd = cmd, .flags = 0 };
1013 int ret;
1015 ret = wext_ioctl_dispatch(net, ifr, cmd, &info,
1016 ioctl_standard_call,
1017 ioctl_private_call);
1018 if (ret >= 0 &&
1019 IW_IS_GET(cmd) &&
1020 copy_to_user(arg, ifr, sizeof(struct iwreq)))
1021 return -EFAULT;
1023 return ret;
1026 #ifdef CONFIG_COMPAT
1027 static int compat_standard_call(struct net_device *dev,
1028 struct iwreq *iwr,
1029 unsigned int cmd,
1030 struct iw_request_info *info,
1031 iw_handler handler)
1033 const struct iw_ioctl_description *descr;
1034 struct compat_iw_point *iwp_compat;
1035 struct iw_point iwp;
1036 int err;
1038 descr = standard_ioctl + IW_IOCTL_IDX(cmd);
1040 if (descr->header_type != IW_HEADER_TYPE_POINT)
1041 return ioctl_standard_call(dev, iwr, cmd, info, handler);
1043 iwp_compat = (struct compat_iw_point *) &iwr->u.data;
1044 iwp.pointer = compat_ptr(iwp_compat->pointer);
1045 iwp.length = iwp_compat->length;
1046 iwp.flags = iwp_compat->flags;
1048 err = ioctl_standard_iw_point(&iwp, cmd, descr, handler, dev, info);
1050 iwp_compat->pointer = ptr_to_compat(iwp.pointer);
1051 iwp_compat->length = iwp.length;
1052 iwp_compat->flags = iwp.flags;
1054 return err;
1057 int compat_wext_handle_ioctl(struct net *net, unsigned int cmd,
1058 unsigned long arg)
1060 void __user *argp = (void __user *)arg;
1061 struct iw_request_info info;
1062 struct iwreq iwr;
1063 char *colon;
1064 int ret;
1066 if (copy_from_user(&iwr, argp, sizeof(struct iwreq)))
1067 return -EFAULT;
1069 iwr.ifr_name[IFNAMSIZ-1] = 0;
1070 colon = strchr(iwr.ifr_name, ':');
1071 if (colon)
1072 *colon = 0;
1074 info.cmd = cmd;
1075 info.flags = IW_REQUEST_FLAG_COMPAT;
1077 ret = wext_ioctl_dispatch(net, (struct ifreq *) &iwr, cmd, &info,
1078 compat_standard_call,
1079 compat_private_call);
1081 if (ret >= 0 &&
1082 IW_IS_GET(cmd) &&
1083 copy_to_user(argp, &iwr, sizeof(struct iwreq)))
1084 return -EFAULT;
1086 return ret;
1088 #endif