ARM: 7409/1: Do not call flush_cache_user_range with mmap_sem held
[linux/fpc-iii.git] / net / wireless / mlme.c
blob493b939970cd6cbefbd7ebad18cbf6c4d1405ed5
1 /*
2 * cfg80211 MLME SAP interface
4 * Copyright (c) 2009, Jouni Malinen <j@w1.fi>
5 */
7 #include <linux/kernel.h>
8 #include <linux/module.h>
9 #include <linux/netdevice.h>
10 #include <linux/nl80211.h>
11 #include <linux/slab.h>
12 #include <linux/wireless.h>
13 #include <net/cfg80211.h>
14 #include <net/iw_handler.h>
15 #include "core.h"
16 #include "nl80211.h"
18 void cfg80211_send_rx_auth(struct net_device *dev, const u8 *buf, size_t len)
20 struct wireless_dev *wdev = dev->ieee80211_ptr;
21 struct wiphy *wiphy = wdev->wiphy;
22 struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
23 struct ieee80211_mgmt *mgmt = (struct ieee80211_mgmt *)buf;
24 u8 *bssid = mgmt->bssid;
25 int i;
26 u16 status = le16_to_cpu(mgmt->u.auth.status_code);
27 bool done = false;
29 wdev_lock(wdev);
31 for (i = 0; i < MAX_AUTH_BSSES; i++) {
32 if (wdev->authtry_bsses[i] &&
33 memcmp(wdev->authtry_bsses[i]->pub.bssid, bssid,
34 ETH_ALEN) == 0) {
35 if (status == WLAN_STATUS_SUCCESS) {
36 wdev->auth_bsses[i] = wdev->authtry_bsses[i];
37 } else {
38 cfg80211_unhold_bss(wdev->authtry_bsses[i]);
39 cfg80211_put_bss(&wdev->authtry_bsses[i]->pub);
41 wdev->authtry_bsses[i] = NULL;
42 done = true;
43 break;
47 if (done) {
48 nl80211_send_rx_auth(rdev, dev, buf, len, GFP_KERNEL);
49 cfg80211_sme_rx_auth(dev, buf, len);
52 wdev_unlock(wdev);
54 EXPORT_SYMBOL(cfg80211_send_rx_auth);
56 void cfg80211_send_rx_assoc(struct net_device *dev, const u8 *buf, size_t len)
58 u16 status_code;
59 struct wireless_dev *wdev = dev->ieee80211_ptr;
60 struct wiphy *wiphy = wdev->wiphy;
61 struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
62 struct ieee80211_mgmt *mgmt = (struct ieee80211_mgmt *)buf;
63 u8 *ie = mgmt->u.assoc_resp.variable;
64 int i, ieoffs = offsetof(struct ieee80211_mgmt, u.assoc_resp.variable);
65 struct cfg80211_internal_bss *bss = NULL;
67 wdev_lock(wdev);
69 status_code = le16_to_cpu(mgmt->u.assoc_resp.status_code);
72 * This is a bit of a hack, we don't notify userspace of
73 * a (re-)association reply if we tried to send a reassoc
74 * and got a reject -- we only try again with an assoc
75 * frame instead of reassoc.
77 if (status_code != WLAN_STATUS_SUCCESS && wdev->conn &&
78 cfg80211_sme_failed_reassoc(wdev))
79 goto out;
81 nl80211_send_rx_assoc(rdev, dev, buf, len, GFP_KERNEL);
83 if (status_code == WLAN_STATUS_SUCCESS) {
84 for (i = 0; i < MAX_AUTH_BSSES; i++) {
85 if (!wdev->auth_bsses[i])
86 continue;
87 if (memcmp(wdev->auth_bsses[i]->pub.bssid, mgmt->bssid,
88 ETH_ALEN) == 0) {
89 bss = wdev->auth_bsses[i];
90 wdev->auth_bsses[i] = NULL;
91 /* additional reference to drop hold */
92 cfg80211_ref_bss(bss);
93 break;
98 * We might be coming here because the driver reported
99 * a successful association at the same time as the
100 * user requested a deauth. In that case, we will have
101 * removed the BSS from the auth_bsses list due to the
102 * deauth request when the assoc response makes it. If
103 * the two code paths acquire the lock the other way
104 * around, that's just the standard situation of a
105 * deauth being requested while connected.
107 if (!bss)
108 goto out;
109 } else if (wdev->conn) {
110 cfg80211_sme_failed_assoc(wdev);
112 * do not call connect_result() now because the
113 * sme will schedule work that does it later.
115 goto out;
118 if (!wdev->conn && wdev->sme_state == CFG80211_SME_IDLE) {
120 * This is for the userspace SME, the CONNECTING
121 * state will be changed to CONNECTED by
122 * __cfg80211_connect_result() below.
124 wdev->sme_state = CFG80211_SME_CONNECTING;
127 /* this consumes one bss reference (unless bss is NULL) */
128 __cfg80211_connect_result(dev, mgmt->bssid, NULL, 0, ie, len - ieoffs,
129 status_code,
130 status_code == WLAN_STATUS_SUCCESS,
131 bss ? &bss->pub : NULL);
132 /* drop hold now, and also reference acquired above */
133 if (bss) {
134 cfg80211_unhold_bss(bss);
135 cfg80211_put_bss(&bss->pub);
138 out:
139 wdev_unlock(wdev);
141 EXPORT_SYMBOL(cfg80211_send_rx_assoc);
143 void __cfg80211_send_deauth(struct net_device *dev,
144 const u8 *buf, size_t len)
146 struct wireless_dev *wdev = dev->ieee80211_ptr;
147 struct wiphy *wiphy = wdev->wiphy;
148 struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
149 struct ieee80211_mgmt *mgmt = (struct ieee80211_mgmt *)buf;
150 const u8 *bssid = mgmt->bssid;
151 int i;
152 bool found = false, was_current = false;
154 ASSERT_WDEV_LOCK(wdev);
156 if (wdev->current_bss &&
157 memcmp(wdev->current_bss->pub.bssid, bssid, ETH_ALEN) == 0) {
158 cfg80211_unhold_bss(wdev->current_bss);
159 cfg80211_put_bss(&wdev->current_bss->pub);
160 wdev->current_bss = NULL;
161 found = true;
162 was_current = true;
163 } else for (i = 0; i < MAX_AUTH_BSSES; i++) {
164 if (wdev->auth_bsses[i] &&
165 memcmp(wdev->auth_bsses[i]->pub.bssid, bssid, ETH_ALEN) == 0) {
166 cfg80211_unhold_bss(wdev->auth_bsses[i]);
167 cfg80211_put_bss(&wdev->auth_bsses[i]->pub);
168 wdev->auth_bsses[i] = NULL;
169 found = true;
170 break;
172 if (wdev->authtry_bsses[i] &&
173 memcmp(wdev->authtry_bsses[i]->pub.bssid, bssid, ETH_ALEN) == 0) {
174 cfg80211_unhold_bss(wdev->authtry_bsses[i]);
175 cfg80211_put_bss(&wdev->authtry_bsses[i]->pub);
176 wdev->authtry_bsses[i] = NULL;
177 found = true;
178 break;
182 if (!found)
183 return;
185 nl80211_send_deauth(rdev, dev, buf, len, GFP_KERNEL);
187 if (wdev->sme_state == CFG80211_SME_CONNECTED && was_current) {
188 u16 reason_code;
189 bool from_ap;
191 reason_code = le16_to_cpu(mgmt->u.deauth.reason_code);
193 from_ap = memcmp(mgmt->sa, dev->dev_addr, ETH_ALEN) != 0;
194 __cfg80211_disconnected(dev, NULL, 0, reason_code, from_ap);
195 } else if (wdev->sme_state == CFG80211_SME_CONNECTING) {
196 __cfg80211_connect_result(dev, mgmt->bssid, NULL, 0, NULL, 0,
197 WLAN_STATUS_UNSPECIFIED_FAILURE,
198 false, NULL);
201 EXPORT_SYMBOL(__cfg80211_send_deauth);
203 void cfg80211_send_deauth(struct net_device *dev, const u8 *buf, size_t len)
205 struct wireless_dev *wdev = dev->ieee80211_ptr;
207 wdev_lock(wdev);
208 __cfg80211_send_deauth(dev, buf, len);
209 wdev_unlock(wdev);
211 EXPORT_SYMBOL(cfg80211_send_deauth);
213 void __cfg80211_send_disassoc(struct net_device *dev,
214 const u8 *buf, size_t len)
216 struct wireless_dev *wdev = dev->ieee80211_ptr;
217 struct wiphy *wiphy = wdev->wiphy;
218 struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
219 struct ieee80211_mgmt *mgmt = (struct ieee80211_mgmt *)buf;
220 const u8 *bssid = mgmt->bssid;
221 int i;
222 u16 reason_code;
223 bool from_ap;
224 bool done = false;
226 ASSERT_WDEV_LOCK(wdev);
228 nl80211_send_disassoc(rdev, dev, buf, len, GFP_KERNEL);
230 if (wdev->sme_state != CFG80211_SME_CONNECTED)
231 return;
233 if (wdev->current_bss &&
234 memcmp(wdev->current_bss->pub.bssid, bssid, ETH_ALEN) == 0) {
235 for (i = 0; i < MAX_AUTH_BSSES; i++) {
236 if (wdev->authtry_bsses[i] || wdev->auth_bsses[i])
237 continue;
238 wdev->auth_bsses[i] = wdev->current_bss;
239 wdev->current_bss = NULL;
240 done = true;
241 cfg80211_sme_disassoc(dev, i);
242 break;
244 WARN_ON(!done);
245 } else
246 WARN_ON(1);
249 reason_code = le16_to_cpu(mgmt->u.disassoc.reason_code);
251 from_ap = memcmp(mgmt->sa, dev->dev_addr, ETH_ALEN) != 0;
252 __cfg80211_disconnected(dev, NULL, 0, reason_code, from_ap);
254 EXPORT_SYMBOL(__cfg80211_send_disassoc);
256 void cfg80211_send_disassoc(struct net_device *dev, const u8 *buf, size_t len)
258 struct wireless_dev *wdev = dev->ieee80211_ptr;
260 wdev_lock(wdev);
261 __cfg80211_send_disassoc(dev, buf, len);
262 wdev_unlock(wdev);
264 EXPORT_SYMBOL(cfg80211_send_disassoc);
266 void cfg80211_send_unprot_deauth(struct net_device *dev, const u8 *buf,
267 size_t len)
269 struct wireless_dev *wdev = dev->ieee80211_ptr;
270 struct wiphy *wiphy = wdev->wiphy;
271 struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
273 nl80211_send_unprot_deauth(rdev, dev, buf, len, GFP_ATOMIC);
275 EXPORT_SYMBOL(cfg80211_send_unprot_deauth);
277 void cfg80211_send_unprot_disassoc(struct net_device *dev, const u8 *buf,
278 size_t len)
280 struct wireless_dev *wdev = dev->ieee80211_ptr;
281 struct wiphy *wiphy = wdev->wiphy;
282 struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
284 nl80211_send_unprot_disassoc(rdev, dev, buf, len, GFP_ATOMIC);
286 EXPORT_SYMBOL(cfg80211_send_unprot_disassoc);
288 static void __cfg80211_auth_remove(struct wireless_dev *wdev, const u8 *addr)
290 int i;
291 bool done = false;
293 ASSERT_WDEV_LOCK(wdev);
295 for (i = 0; addr && i < MAX_AUTH_BSSES; i++) {
296 if (wdev->authtry_bsses[i] &&
297 memcmp(wdev->authtry_bsses[i]->pub.bssid,
298 addr, ETH_ALEN) == 0) {
299 cfg80211_unhold_bss(wdev->authtry_bsses[i]);
300 cfg80211_put_bss(&wdev->authtry_bsses[i]->pub);
301 wdev->authtry_bsses[i] = NULL;
302 done = true;
303 break;
307 WARN_ON(!done);
310 void __cfg80211_auth_canceled(struct net_device *dev, const u8 *addr)
312 __cfg80211_auth_remove(dev->ieee80211_ptr, addr);
314 EXPORT_SYMBOL(__cfg80211_auth_canceled);
316 void cfg80211_send_auth_timeout(struct net_device *dev, const u8 *addr)
318 struct wireless_dev *wdev = dev->ieee80211_ptr;
319 struct wiphy *wiphy = wdev->wiphy;
320 struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
322 wdev_lock(wdev);
324 nl80211_send_auth_timeout(rdev, dev, addr, GFP_KERNEL);
325 if (wdev->sme_state == CFG80211_SME_CONNECTING)
326 __cfg80211_connect_result(dev, addr, NULL, 0, NULL, 0,
327 WLAN_STATUS_UNSPECIFIED_FAILURE,
328 false, NULL);
330 __cfg80211_auth_remove(wdev, addr);
332 wdev_unlock(wdev);
334 EXPORT_SYMBOL(cfg80211_send_auth_timeout);
336 void cfg80211_send_assoc_timeout(struct net_device *dev, const u8 *addr)
338 struct wireless_dev *wdev = dev->ieee80211_ptr;
339 struct wiphy *wiphy = wdev->wiphy;
340 struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
341 int i;
342 bool done = false;
344 wdev_lock(wdev);
346 nl80211_send_assoc_timeout(rdev, dev, addr, GFP_KERNEL);
347 if (wdev->sme_state == CFG80211_SME_CONNECTING)
348 __cfg80211_connect_result(dev, addr, NULL, 0, NULL, 0,
349 WLAN_STATUS_UNSPECIFIED_FAILURE,
350 false, NULL);
352 for (i = 0; addr && i < MAX_AUTH_BSSES; i++) {
353 if (wdev->auth_bsses[i] &&
354 memcmp(wdev->auth_bsses[i]->pub.bssid,
355 addr, ETH_ALEN) == 0) {
356 cfg80211_unhold_bss(wdev->auth_bsses[i]);
357 cfg80211_put_bss(&wdev->auth_bsses[i]->pub);
358 wdev->auth_bsses[i] = NULL;
359 done = true;
360 break;
364 WARN_ON(!done);
366 wdev_unlock(wdev);
368 EXPORT_SYMBOL(cfg80211_send_assoc_timeout);
370 void cfg80211_michael_mic_failure(struct net_device *dev, const u8 *addr,
371 enum nl80211_key_type key_type, int key_id,
372 const u8 *tsc, gfp_t gfp)
374 struct wiphy *wiphy = dev->ieee80211_ptr->wiphy;
375 struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
376 #ifdef CONFIG_CFG80211_WEXT
377 union iwreq_data wrqu;
378 char *buf = kmalloc(128, gfp);
380 if (buf) {
381 sprintf(buf, "MLME-MICHAELMICFAILURE.indication("
382 "keyid=%d %scast addr=%pM)", key_id,
383 key_type == NL80211_KEYTYPE_GROUP ? "broad" : "uni",
384 addr);
385 memset(&wrqu, 0, sizeof(wrqu));
386 wrqu.data.length = strlen(buf);
387 wireless_send_event(dev, IWEVCUSTOM, &wrqu, buf);
388 kfree(buf);
390 #endif
392 nl80211_michael_mic_failure(rdev, dev, addr, key_type, key_id, tsc, gfp);
394 EXPORT_SYMBOL(cfg80211_michael_mic_failure);
396 /* some MLME handling for userspace SME */
397 int __cfg80211_mlme_auth(struct cfg80211_registered_device *rdev,
398 struct net_device *dev,
399 struct ieee80211_channel *chan,
400 enum nl80211_auth_type auth_type,
401 const u8 *bssid,
402 const u8 *ssid, int ssid_len,
403 const u8 *ie, int ie_len,
404 const u8 *key, int key_len, int key_idx,
405 bool local_state_change)
407 struct wireless_dev *wdev = dev->ieee80211_ptr;
408 struct cfg80211_auth_request req;
409 struct cfg80211_internal_bss *bss;
410 int i, err, slot = -1, nfree = 0;
412 ASSERT_WDEV_LOCK(wdev);
414 if (auth_type == NL80211_AUTHTYPE_SHARED_KEY)
415 if (!key || !key_len || key_idx < 0 || key_idx > 4)
416 return -EINVAL;
418 if (wdev->current_bss &&
419 memcmp(bssid, wdev->current_bss->pub.bssid, ETH_ALEN) == 0)
420 return -EALREADY;
422 for (i = 0; i < MAX_AUTH_BSSES; i++) {
423 if (wdev->authtry_bsses[i] &&
424 memcmp(bssid, wdev->authtry_bsses[i]->pub.bssid,
425 ETH_ALEN) == 0)
426 return -EALREADY;
427 if (wdev->auth_bsses[i] &&
428 memcmp(bssid, wdev->auth_bsses[i]->pub.bssid,
429 ETH_ALEN) == 0)
430 return -EALREADY;
433 memset(&req, 0, sizeof(req));
435 req.local_state_change = local_state_change;
436 req.ie = ie;
437 req.ie_len = ie_len;
438 req.auth_type = auth_type;
439 req.bss = cfg80211_get_bss(&rdev->wiphy, chan, bssid, ssid, ssid_len,
440 WLAN_CAPABILITY_ESS, WLAN_CAPABILITY_ESS);
441 req.key = key;
442 req.key_len = key_len;
443 req.key_idx = key_idx;
444 if (!req.bss)
445 return -ENOENT;
447 bss = bss_from_pub(req.bss);
449 for (i = 0; i < MAX_AUTH_BSSES; i++) {
450 if (!wdev->auth_bsses[i] && !wdev->authtry_bsses[i]) {
451 slot = i;
452 nfree++;
456 /* we need one free slot for disassoc and one for this auth */
457 if (nfree < 2) {
458 err = -ENOSPC;
459 goto out;
462 if (local_state_change)
463 wdev->auth_bsses[slot] = bss;
464 else
465 wdev->authtry_bsses[slot] = bss;
466 cfg80211_hold_bss(bss);
468 err = rdev->ops->auth(&rdev->wiphy, dev, &req);
469 if (err) {
470 if (local_state_change)
471 wdev->auth_bsses[slot] = NULL;
472 else
473 wdev->authtry_bsses[slot] = NULL;
474 cfg80211_unhold_bss(bss);
477 out:
478 if (err)
479 cfg80211_put_bss(req.bss);
480 return err;
483 int cfg80211_mlme_auth(struct cfg80211_registered_device *rdev,
484 struct net_device *dev, struct ieee80211_channel *chan,
485 enum nl80211_auth_type auth_type, const u8 *bssid,
486 const u8 *ssid, int ssid_len,
487 const u8 *ie, int ie_len,
488 const u8 *key, int key_len, int key_idx,
489 bool local_state_change)
491 int err;
493 wdev_lock(dev->ieee80211_ptr);
494 err = __cfg80211_mlme_auth(rdev, dev, chan, auth_type, bssid,
495 ssid, ssid_len, ie, ie_len,
496 key, key_len, key_idx, local_state_change);
497 wdev_unlock(dev->ieee80211_ptr);
499 return err;
502 int __cfg80211_mlme_assoc(struct cfg80211_registered_device *rdev,
503 struct net_device *dev,
504 struct ieee80211_channel *chan,
505 const u8 *bssid, const u8 *prev_bssid,
506 const u8 *ssid, int ssid_len,
507 const u8 *ie, int ie_len, bool use_mfp,
508 struct cfg80211_crypto_settings *crypt)
510 struct wireless_dev *wdev = dev->ieee80211_ptr;
511 struct cfg80211_assoc_request req;
512 struct cfg80211_internal_bss *bss;
513 int i, err, slot = -1;
514 bool was_connected = false;
516 ASSERT_WDEV_LOCK(wdev);
518 memset(&req, 0, sizeof(req));
520 if (wdev->current_bss && prev_bssid &&
521 memcmp(wdev->current_bss->pub.bssid, prev_bssid, ETH_ALEN) == 0) {
523 * Trying to reassociate: Allow this to proceed and let the old
524 * association to be dropped when the new one is completed.
526 if (wdev->sme_state == CFG80211_SME_CONNECTED) {
527 was_connected = true;
528 wdev->sme_state = CFG80211_SME_CONNECTING;
530 } else if (wdev->current_bss)
531 return -EALREADY;
533 req.ie = ie;
534 req.ie_len = ie_len;
535 memcpy(&req.crypto, crypt, sizeof(req.crypto));
536 req.use_mfp = use_mfp;
537 req.prev_bssid = prev_bssid;
538 req.bss = cfg80211_get_bss(&rdev->wiphy, chan, bssid, ssid, ssid_len,
539 WLAN_CAPABILITY_ESS, WLAN_CAPABILITY_ESS);
540 if (!req.bss) {
541 if (was_connected)
542 wdev->sme_state = CFG80211_SME_CONNECTED;
543 return -ENOENT;
546 bss = bss_from_pub(req.bss);
548 for (i = 0; i < MAX_AUTH_BSSES; i++) {
549 if (bss == wdev->auth_bsses[i]) {
550 slot = i;
551 break;
555 if (slot < 0) {
556 err = -ENOTCONN;
557 goto out;
560 err = rdev->ops->assoc(&rdev->wiphy, dev, &req);
561 out:
562 if (err && was_connected)
563 wdev->sme_state = CFG80211_SME_CONNECTED;
564 /* still a reference in wdev->auth_bsses[slot] */
565 cfg80211_put_bss(req.bss);
566 return err;
569 int cfg80211_mlme_assoc(struct cfg80211_registered_device *rdev,
570 struct net_device *dev,
571 struct ieee80211_channel *chan,
572 const u8 *bssid, const u8 *prev_bssid,
573 const u8 *ssid, int ssid_len,
574 const u8 *ie, int ie_len, bool use_mfp,
575 struct cfg80211_crypto_settings *crypt)
577 struct wireless_dev *wdev = dev->ieee80211_ptr;
578 int err;
580 wdev_lock(wdev);
581 err = __cfg80211_mlme_assoc(rdev, dev, chan, bssid, prev_bssid,
582 ssid, ssid_len, ie, ie_len, use_mfp, crypt);
583 wdev_unlock(wdev);
585 return err;
588 int __cfg80211_mlme_deauth(struct cfg80211_registered_device *rdev,
589 struct net_device *dev, const u8 *bssid,
590 const u8 *ie, int ie_len, u16 reason,
591 bool local_state_change)
593 struct wireless_dev *wdev = dev->ieee80211_ptr;
594 struct cfg80211_deauth_request req;
595 int i;
597 ASSERT_WDEV_LOCK(wdev);
599 memset(&req, 0, sizeof(req));
600 req.reason_code = reason;
601 req.local_state_change = local_state_change;
602 req.ie = ie;
603 req.ie_len = ie_len;
604 if (wdev->current_bss &&
605 memcmp(wdev->current_bss->pub.bssid, bssid, ETH_ALEN) == 0) {
606 req.bss = &wdev->current_bss->pub;
607 } else for (i = 0; i < MAX_AUTH_BSSES; i++) {
608 if (wdev->auth_bsses[i] &&
609 memcmp(bssid, wdev->auth_bsses[i]->pub.bssid, ETH_ALEN) == 0) {
610 req.bss = &wdev->auth_bsses[i]->pub;
611 break;
613 if (wdev->authtry_bsses[i] &&
614 memcmp(bssid, wdev->authtry_bsses[i]->pub.bssid, ETH_ALEN) == 0) {
615 req.bss = &wdev->authtry_bsses[i]->pub;
616 break;
620 if (!req.bss)
621 return -ENOTCONN;
623 return rdev->ops->deauth(&rdev->wiphy, dev, &req, wdev);
626 int cfg80211_mlme_deauth(struct cfg80211_registered_device *rdev,
627 struct net_device *dev, const u8 *bssid,
628 const u8 *ie, int ie_len, u16 reason,
629 bool local_state_change)
631 struct wireless_dev *wdev = dev->ieee80211_ptr;
632 int err;
634 wdev_lock(wdev);
635 err = __cfg80211_mlme_deauth(rdev, dev, bssid, ie, ie_len, reason,
636 local_state_change);
637 wdev_unlock(wdev);
639 return err;
642 static int __cfg80211_mlme_disassoc(struct cfg80211_registered_device *rdev,
643 struct net_device *dev, const u8 *bssid,
644 const u8 *ie, int ie_len, u16 reason,
645 bool local_state_change)
647 struct wireless_dev *wdev = dev->ieee80211_ptr;
648 struct cfg80211_disassoc_request req;
650 ASSERT_WDEV_LOCK(wdev);
652 if (wdev->sme_state != CFG80211_SME_CONNECTED)
653 return -ENOTCONN;
655 if (WARN_ON(!wdev->current_bss))
656 return -ENOTCONN;
658 memset(&req, 0, sizeof(req));
659 req.reason_code = reason;
660 req.local_state_change = local_state_change;
661 req.ie = ie;
662 req.ie_len = ie_len;
663 if (memcmp(wdev->current_bss->pub.bssid, bssid, ETH_ALEN) == 0)
664 req.bss = &wdev->current_bss->pub;
665 else
666 return -ENOTCONN;
668 return rdev->ops->disassoc(&rdev->wiphy, dev, &req, wdev);
671 int cfg80211_mlme_disassoc(struct cfg80211_registered_device *rdev,
672 struct net_device *dev, const u8 *bssid,
673 const u8 *ie, int ie_len, u16 reason,
674 bool local_state_change)
676 struct wireless_dev *wdev = dev->ieee80211_ptr;
677 int err;
679 wdev_lock(wdev);
680 err = __cfg80211_mlme_disassoc(rdev, dev, bssid, ie, ie_len, reason,
681 local_state_change);
682 wdev_unlock(wdev);
684 return err;
687 void cfg80211_mlme_down(struct cfg80211_registered_device *rdev,
688 struct net_device *dev)
690 struct wireless_dev *wdev = dev->ieee80211_ptr;
691 struct cfg80211_deauth_request req;
692 int i;
694 ASSERT_WDEV_LOCK(wdev);
696 if (!rdev->ops->deauth)
697 return;
699 memset(&req, 0, sizeof(req));
700 req.reason_code = WLAN_REASON_DEAUTH_LEAVING;
701 req.ie = NULL;
702 req.ie_len = 0;
704 if (wdev->current_bss) {
705 req.bss = &wdev->current_bss->pub;
706 rdev->ops->deauth(&rdev->wiphy, dev, &req, wdev);
707 if (wdev->current_bss) {
708 cfg80211_unhold_bss(wdev->current_bss);
709 cfg80211_put_bss(&wdev->current_bss->pub);
710 wdev->current_bss = NULL;
714 for (i = 0; i < MAX_AUTH_BSSES; i++) {
715 if (wdev->auth_bsses[i]) {
716 req.bss = &wdev->auth_bsses[i]->pub;
717 rdev->ops->deauth(&rdev->wiphy, dev, &req, wdev);
718 if (wdev->auth_bsses[i]) {
719 cfg80211_unhold_bss(wdev->auth_bsses[i]);
720 cfg80211_put_bss(&wdev->auth_bsses[i]->pub);
721 wdev->auth_bsses[i] = NULL;
724 if (wdev->authtry_bsses[i]) {
725 req.bss = &wdev->authtry_bsses[i]->pub;
726 rdev->ops->deauth(&rdev->wiphy, dev, &req, wdev);
727 if (wdev->authtry_bsses[i]) {
728 cfg80211_unhold_bss(wdev->authtry_bsses[i]);
729 cfg80211_put_bss(&wdev->authtry_bsses[i]->pub);
730 wdev->authtry_bsses[i] = NULL;
736 void cfg80211_ready_on_channel(struct net_device *dev, u64 cookie,
737 struct ieee80211_channel *chan,
738 enum nl80211_channel_type channel_type,
739 unsigned int duration, gfp_t gfp)
741 struct wiphy *wiphy = dev->ieee80211_ptr->wiphy;
742 struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
744 nl80211_send_remain_on_channel(rdev, dev, cookie, chan, channel_type,
745 duration, gfp);
747 EXPORT_SYMBOL(cfg80211_ready_on_channel);
749 void cfg80211_remain_on_channel_expired(struct net_device *dev,
750 u64 cookie,
751 struct ieee80211_channel *chan,
752 enum nl80211_channel_type channel_type,
753 gfp_t gfp)
755 struct wiphy *wiphy = dev->ieee80211_ptr->wiphy;
756 struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
758 nl80211_send_remain_on_channel_cancel(rdev, dev, cookie, chan,
759 channel_type, gfp);
761 EXPORT_SYMBOL(cfg80211_remain_on_channel_expired);
763 void cfg80211_new_sta(struct net_device *dev, const u8 *mac_addr,
764 struct station_info *sinfo, gfp_t gfp)
766 struct wiphy *wiphy = dev->ieee80211_ptr->wiphy;
767 struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
769 nl80211_send_sta_event(rdev, dev, mac_addr, sinfo, gfp);
771 EXPORT_SYMBOL(cfg80211_new_sta);
773 void cfg80211_del_sta(struct net_device *dev, const u8 *mac_addr, gfp_t gfp)
775 struct wiphy *wiphy = dev->ieee80211_ptr->wiphy;
776 struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
778 nl80211_send_sta_del_event(rdev, dev, mac_addr, gfp);
780 EXPORT_SYMBOL(cfg80211_del_sta);
782 struct cfg80211_mgmt_registration {
783 struct list_head list;
785 u32 nlpid;
787 int match_len;
789 __le16 frame_type;
791 u8 match[];
794 int cfg80211_mlme_register_mgmt(struct wireless_dev *wdev, u32 snd_pid,
795 u16 frame_type, const u8 *match_data,
796 int match_len)
798 struct wiphy *wiphy = wdev->wiphy;
799 struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
800 struct cfg80211_mgmt_registration *reg, *nreg;
801 int err = 0;
802 u16 mgmt_type;
804 if (!wdev->wiphy->mgmt_stypes)
805 return -EOPNOTSUPP;
807 if ((frame_type & IEEE80211_FCTL_FTYPE) != IEEE80211_FTYPE_MGMT)
808 return -EINVAL;
810 if (frame_type & ~(IEEE80211_FCTL_FTYPE | IEEE80211_FCTL_STYPE))
811 return -EINVAL;
813 mgmt_type = (frame_type & IEEE80211_FCTL_STYPE) >> 4;
814 if (!(wdev->wiphy->mgmt_stypes[wdev->iftype].rx & BIT(mgmt_type)))
815 return -EINVAL;
817 nreg = kzalloc(sizeof(*reg) + match_len, GFP_KERNEL);
818 if (!nreg)
819 return -ENOMEM;
821 spin_lock_bh(&wdev->mgmt_registrations_lock);
823 list_for_each_entry(reg, &wdev->mgmt_registrations, list) {
824 int mlen = min(match_len, reg->match_len);
826 if (frame_type != le16_to_cpu(reg->frame_type))
827 continue;
829 if (memcmp(reg->match, match_data, mlen) == 0) {
830 err = -EALREADY;
831 break;
835 if (err) {
836 kfree(nreg);
837 goto out;
840 memcpy(nreg->match, match_data, match_len);
841 nreg->match_len = match_len;
842 nreg->nlpid = snd_pid;
843 nreg->frame_type = cpu_to_le16(frame_type);
844 list_add(&nreg->list, &wdev->mgmt_registrations);
846 if (rdev->ops->mgmt_frame_register)
847 rdev->ops->mgmt_frame_register(wiphy, wdev->netdev,
848 frame_type, true);
850 out:
851 spin_unlock_bh(&wdev->mgmt_registrations_lock);
853 return err;
856 void cfg80211_mlme_unregister_socket(struct wireless_dev *wdev, u32 nlpid)
858 struct wiphy *wiphy = wdev->wiphy;
859 struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
860 struct cfg80211_mgmt_registration *reg, *tmp;
862 spin_lock_bh(&wdev->mgmt_registrations_lock);
864 list_for_each_entry_safe(reg, tmp, &wdev->mgmt_registrations, list) {
865 if (reg->nlpid != nlpid)
866 continue;
868 if (rdev->ops->mgmt_frame_register) {
869 u16 frame_type = le16_to_cpu(reg->frame_type);
871 rdev->ops->mgmt_frame_register(wiphy, wdev->netdev,
872 frame_type, false);
875 list_del(&reg->list);
876 kfree(reg);
879 spin_unlock_bh(&wdev->mgmt_registrations_lock);
882 void cfg80211_mlme_purge_registrations(struct wireless_dev *wdev)
884 struct cfg80211_mgmt_registration *reg, *tmp;
886 spin_lock_bh(&wdev->mgmt_registrations_lock);
888 list_for_each_entry_safe(reg, tmp, &wdev->mgmt_registrations, list) {
889 list_del(&reg->list);
890 kfree(reg);
893 spin_unlock_bh(&wdev->mgmt_registrations_lock);
896 int cfg80211_mlme_mgmt_tx(struct cfg80211_registered_device *rdev,
897 struct net_device *dev,
898 struct ieee80211_channel *chan, bool offchan,
899 enum nl80211_channel_type channel_type,
900 bool channel_type_valid, unsigned int wait,
901 const u8 *buf, size_t len, u64 *cookie)
903 struct wireless_dev *wdev = dev->ieee80211_ptr;
904 const struct ieee80211_mgmt *mgmt;
905 u16 stype;
907 if (!wdev->wiphy->mgmt_stypes)
908 return -EOPNOTSUPP;
910 if (!rdev->ops->mgmt_tx)
911 return -EOPNOTSUPP;
913 if (len < 24 + 1)
914 return -EINVAL;
916 mgmt = (const struct ieee80211_mgmt *) buf;
918 if (!ieee80211_is_mgmt(mgmt->frame_control))
919 return -EINVAL;
921 stype = le16_to_cpu(mgmt->frame_control) & IEEE80211_FCTL_STYPE;
922 if (!(wdev->wiphy->mgmt_stypes[wdev->iftype].tx & BIT(stype >> 4)))
923 return -EINVAL;
925 if (ieee80211_is_action(mgmt->frame_control) &&
926 mgmt->u.action.category != WLAN_CATEGORY_PUBLIC) {
927 int err = 0;
929 wdev_lock(wdev);
931 switch (wdev->iftype) {
932 case NL80211_IFTYPE_ADHOC:
933 case NL80211_IFTYPE_STATION:
934 case NL80211_IFTYPE_P2P_CLIENT:
935 if (!wdev->current_bss) {
936 err = -ENOTCONN;
937 break;
940 if (memcmp(wdev->current_bss->pub.bssid,
941 mgmt->bssid, ETH_ALEN)) {
942 err = -ENOTCONN;
943 break;
947 * check for IBSS DA must be done by driver as
948 * cfg80211 doesn't track the stations
950 if (wdev->iftype == NL80211_IFTYPE_ADHOC)
951 break;
953 /* for station, check that DA is the AP */
954 if (memcmp(wdev->current_bss->pub.bssid,
955 mgmt->da, ETH_ALEN)) {
956 err = -ENOTCONN;
957 break;
959 break;
960 case NL80211_IFTYPE_AP:
961 case NL80211_IFTYPE_P2P_GO:
962 case NL80211_IFTYPE_AP_VLAN:
963 if (memcmp(mgmt->bssid, dev->dev_addr, ETH_ALEN))
964 err = -EINVAL;
965 break;
966 case NL80211_IFTYPE_MESH_POINT:
967 if (memcmp(mgmt->sa, mgmt->bssid, ETH_ALEN)) {
968 err = -EINVAL;
969 break;
972 * check for mesh DA must be done by driver as
973 * cfg80211 doesn't track the stations
975 break;
976 default:
977 err = -EOPNOTSUPP;
978 break;
980 wdev_unlock(wdev);
982 if (err)
983 return err;
986 if (memcmp(mgmt->sa, dev->dev_addr, ETH_ALEN) != 0)
987 return -EINVAL;
989 /* Transmit the Action frame as requested by user space */
990 return rdev->ops->mgmt_tx(&rdev->wiphy, dev, chan, offchan,
991 channel_type, channel_type_valid,
992 wait, buf, len, cookie);
995 bool cfg80211_rx_mgmt(struct net_device *dev, int freq, const u8 *buf,
996 size_t len, gfp_t gfp)
998 struct wireless_dev *wdev = dev->ieee80211_ptr;
999 struct wiphy *wiphy = wdev->wiphy;
1000 struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
1001 struct cfg80211_mgmt_registration *reg;
1002 const struct ieee80211_txrx_stypes *stypes =
1003 &wiphy->mgmt_stypes[wdev->iftype];
1004 struct ieee80211_mgmt *mgmt = (void *)buf;
1005 const u8 *data;
1006 int data_len;
1007 bool result = false;
1008 __le16 ftype = mgmt->frame_control &
1009 cpu_to_le16(IEEE80211_FCTL_FTYPE | IEEE80211_FCTL_STYPE);
1010 u16 stype;
1012 stype = (le16_to_cpu(mgmt->frame_control) & IEEE80211_FCTL_STYPE) >> 4;
1014 if (!(stypes->rx & BIT(stype)))
1015 return false;
1017 data = buf + ieee80211_hdrlen(mgmt->frame_control);
1018 data_len = len - ieee80211_hdrlen(mgmt->frame_control);
1020 spin_lock_bh(&wdev->mgmt_registrations_lock);
1022 list_for_each_entry(reg, &wdev->mgmt_registrations, list) {
1023 if (reg->frame_type != ftype)
1024 continue;
1026 if (reg->match_len > data_len)
1027 continue;
1029 if (memcmp(reg->match, data, reg->match_len))
1030 continue;
1032 /* found match! */
1034 /* Indicate the received Action frame to user space */
1035 if (nl80211_send_mgmt(rdev, dev, reg->nlpid, freq,
1036 buf, len, gfp))
1037 continue;
1039 result = true;
1040 break;
1043 spin_unlock_bh(&wdev->mgmt_registrations_lock);
1045 return result;
1047 EXPORT_SYMBOL(cfg80211_rx_mgmt);
1049 void cfg80211_mgmt_tx_status(struct net_device *dev, u64 cookie,
1050 const u8 *buf, size_t len, bool ack, gfp_t gfp)
1052 struct wireless_dev *wdev = dev->ieee80211_ptr;
1053 struct wiphy *wiphy = wdev->wiphy;
1054 struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
1056 /* Indicate TX status of the Action frame to user space */
1057 nl80211_send_mgmt_tx_status(rdev, dev, cookie, buf, len, ack, gfp);
1059 EXPORT_SYMBOL(cfg80211_mgmt_tx_status);
1061 void cfg80211_cqm_rssi_notify(struct net_device *dev,
1062 enum nl80211_cqm_rssi_threshold_event rssi_event,
1063 gfp_t gfp)
1065 struct wireless_dev *wdev = dev->ieee80211_ptr;
1066 struct wiphy *wiphy = wdev->wiphy;
1067 struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
1069 /* Indicate roaming trigger event to user space */
1070 nl80211_send_cqm_rssi_notify(rdev, dev, rssi_event, gfp);
1072 EXPORT_SYMBOL(cfg80211_cqm_rssi_notify);
1074 void cfg80211_cqm_pktloss_notify(struct net_device *dev,
1075 const u8 *peer, u32 num_packets, gfp_t gfp)
1077 struct wireless_dev *wdev = dev->ieee80211_ptr;
1078 struct wiphy *wiphy = wdev->wiphy;
1079 struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
1081 /* Indicate roaming trigger event to user space */
1082 nl80211_send_cqm_pktloss_notify(rdev, dev, peer, num_packets, gfp);
1084 EXPORT_SYMBOL(cfg80211_cqm_pktloss_notify);