1 /* 2 * cfg80211 MLME SAP interface 3 * 4 * Copyright (c) 2009, Jouni Malinen <j@w1.fi> 5 */ 6 7 #include <linux/kernel.h> 8 #include <linux/module.h> 9 #include <linux/netdevice.h> 10 #include <linux/nl80211.h> 11 #include <linux/slab.h> 12 #include <linux/wireless.h> 13 #include <net/cfg80211.h> 14 #include <net/iw_handler.h> 15 #include "core.h" 16 #include "nl80211.h" 17 18 void cfg80211_send_rx_auth(struct net_device *dev, const u8 *buf, size_t len) 19 { 20 struct wireless_dev *wdev = dev->ieee80211_ptr; 21 struct wiphy *wiphy = wdev->wiphy; 22 struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy); 23 struct ieee80211_mgmt *mgmt = (struct ieee80211_mgmt *)buf; 24 u8 *bssid = mgmt->bssid; 25 int i; 26 u16 status = le16_to_cpu(mgmt->u.auth.status_code); 27 bool done = false; 28 29 wdev_lock(wdev); 30 31 for (i = 0; i < MAX_AUTH_BSSES; i++) { 32 if (wdev->authtry_bsses[i] && 33 memcmp(wdev->authtry_bsses[i]->pub.bssid, bssid, 34 ETH_ALEN) == 0) { 35 if (status == WLAN_STATUS_SUCCESS) { 36 wdev->auth_bsses[i] = wdev->authtry_bsses[i]; 37 } else { 38 cfg80211_unhold_bss(wdev->authtry_bsses[i]); 39 cfg80211_put_bss(&wdev->authtry_bsses[i]->pub); 40 } 41 wdev->authtry_bsses[i] = NULL; 42 done = true; 43 break; 44 } 45 } 46 47 if (done) { 48 nl80211_send_rx_auth(rdev, dev, buf, len, GFP_KERNEL); 49 cfg80211_sme_rx_auth(dev, buf, len); 50 } 51 52 wdev_unlock(wdev); 53 } 54 EXPORT_SYMBOL(cfg80211_send_rx_auth); 55 56 void cfg80211_send_rx_assoc(struct net_device *dev, const u8 *buf, size_t len) 57 { 58 u16 status_code; 59 struct wireless_dev *wdev = dev->ieee80211_ptr; 60 struct wiphy *wiphy = wdev->wiphy; 61 struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy); 62 struct ieee80211_mgmt *mgmt = (struct ieee80211_mgmt *)buf; 63 u8 *ie = mgmt->u.assoc_resp.variable; 64 int i, ieoffs = offsetof(struct ieee80211_mgmt, u.assoc_resp.variable); 65 struct cfg80211_internal_bss *bss = NULL; 66 67 wdev_lock(wdev); 68 69 status_code = le16_to_cpu(mgmt->u.assoc_resp.status_code); 70 71 /* 72 * This is a bit of a hack, we don't notify userspace of 73 * a (re-)association reply if we tried to send a reassoc 74 * and got a reject -- we only try again with an assoc 75 * frame instead of reassoc. 76 */ 77 if (status_code != WLAN_STATUS_SUCCESS && wdev->conn && 78 cfg80211_sme_failed_reassoc(wdev)) 79 goto out; 80 81 nl80211_send_rx_assoc(rdev, dev, buf, len, GFP_KERNEL); 82 83 if (status_code == WLAN_STATUS_SUCCESS) { 84 for (i = 0; i < MAX_AUTH_BSSES; i++) { 85 if (!wdev->auth_bsses[i]) 86 continue; 87 if (memcmp(wdev->auth_bsses[i]->pub.bssid, mgmt->bssid, 88 ETH_ALEN) == 0) { 89 bss = wdev->auth_bsses[i]; 90 wdev->auth_bsses[i] = NULL; 91 /* additional reference to drop hold */ 92 cfg80211_ref_bss(bss); 93 break; 94 } 95 } 96 97 /* 98 * We might be coming here because the driver reported 99 * a successful association at the same time as the 100 * user requested a deauth. In that case, we will have 101 * removed the BSS from the auth_bsses list due to the 102 * deauth request when the assoc response makes it. If 103 * the two code paths acquire the lock the other way 104 * around, that's just the standard situation of a 105 * deauth being requested while connected. 106 */ 107 if (!bss) 108 goto out; 109 } else if (wdev->conn) { 110 cfg80211_sme_failed_assoc(wdev); 111 /* 112 * do not call connect_result() now because the 113 * sme will schedule work that does it later. 114 */ 115 goto out; 116 } 117 118 if (!wdev->conn && wdev->sme_state == CFG80211_SME_IDLE) { 119 /* 120 * This is for the userspace SME, the CONNECTING 121 * state will be changed to CONNECTED by 122 * __cfg80211_connect_result() below. 123 */ 124 wdev->sme_state = CFG80211_SME_CONNECTING; 125 } 126 127 /* this consumes one bss reference (unless bss is NULL) */ 128 __cfg80211_connect_result(dev, mgmt->bssid, NULL, 0, ie, len - ieoffs, 129 status_code, 130 status_code == WLAN_STATUS_SUCCESS, 131 bss ? &bss->pub : NULL); 132 /* drop hold now, and also reference acquired above */ 133 if (bss) { 134 cfg80211_unhold_bss(bss); 135 cfg80211_put_bss(&bss->pub); 136 } 137 138 out: 139 wdev_unlock(wdev); 140 } 141 EXPORT_SYMBOL(cfg80211_send_rx_assoc); 142 143 void __cfg80211_send_deauth(struct net_device *dev, 144 const u8 *buf, size_t len) 145 { 146 struct wireless_dev *wdev = dev->ieee80211_ptr; 147 struct wiphy *wiphy = wdev->wiphy; 148 struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy); 149 struct ieee80211_mgmt *mgmt = (struct ieee80211_mgmt *)buf; 150 const u8 *bssid = mgmt->bssid; 151 int i; 152 bool found = false; 153 154 ASSERT_WDEV_LOCK(wdev); 155 156 if (wdev->current_bss && 157 memcmp(wdev->current_bss->pub.bssid, bssid, ETH_ALEN) == 0) { 158 cfg80211_unhold_bss(wdev->current_bss); 159 cfg80211_put_bss(&wdev->current_bss->pub); 160 wdev->current_bss = NULL; 161 found = true; 162 } else for (i = 0; i < MAX_AUTH_BSSES; i++) { 163 if (wdev->auth_bsses[i] && 164 memcmp(wdev->auth_bsses[i]->pub.bssid, bssid, ETH_ALEN) == 0) { 165 cfg80211_unhold_bss(wdev->auth_bsses[i]); 166 cfg80211_put_bss(&wdev->auth_bsses[i]->pub); 167 wdev->auth_bsses[i] = NULL; 168 found = true; 169 break; 170 } 171 if (wdev->authtry_bsses[i] && 172 memcmp(wdev->authtry_bsses[i]->pub.bssid, bssid, ETH_ALEN) == 0) { 173 cfg80211_unhold_bss(wdev->authtry_bsses[i]); 174 cfg80211_put_bss(&wdev->authtry_bsses[i]->pub); 175 wdev->authtry_bsses[i] = NULL; 176 found = true; 177 break; 178 } 179 } 180 181 if (!found) 182 return; 183 184 nl80211_send_deauth(rdev, dev, buf, len, GFP_KERNEL); 185 186 if (wdev->sme_state == CFG80211_SME_CONNECTED) { 187 u16 reason_code; 188 bool from_ap; 189 190 reason_code = le16_to_cpu(mgmt->u.deauth.reason_code); 191 192 from_ap = memcmp(mgmt->sa, dev->dev_addr, ETH_ALEN) != 0; 193 __cfg80211_disconnected(dev, NULL, 0, reason_code, from_ap); 194 } else if (wdev->sme_state == CFG80211_SME_CONNECTING) { 195 __cfg80211_connect_result(dev, mgmt->bssid, NULL, 0, NULL, 0, 196 WLAN_STATUS_UNSPECIFIED_FAILURE, 197 false, NULL); 198 } 199 } 200 EXPORT_SYMBOL(__cfg80211_send_deauth); 201 202 void cfg80211_send_deauth(struct net_device *dev, const u8 *buf, size_t len) 203 { 204 struct wireless_dev *wdev = dev->ieee80211_ptr; 205 206 wdev_lock(wdev); 207 __cfg80211_send_deauth(dev, buf, len); 208 wdev_unlock(wdev); 209 } 210 EXPORT_SYMBOL(cfg80211_send_deauth); 211 212 void __cfg80211_send_disassoc(struct net_device *dev, 213 const u8 *buf, size_t len) 214 { 215 struct wireless_dev *wdev = dev->ieee80211_ptr; 216 struct wiphy *wiphy = wdev->wiphy; 217 struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy); 218 struct ieee80211_mgmt *mgmt = (struct ieee80211_mgmt *)buf; 219 const u8 *bssid = mgmt->bssid; 220 int i; 221 u16 reason_code; 222 bool from_ap; 223 bool done = false; 224 225 ASSERT_WDEV_LOCK(wdev); 226 227 nl80211_send_disassoc(rdev, dev, buf, len, GFP_KERNEL); 228 229 if (wdev->sme_state != CFG80211_SME_CONNECTED) 230 return; 231 232 if (wdev->current_bss && 233 memcmp(wdev->current_bss->pub.bssid, bssid, ETH_ALEN) == 0) { 234 for (i = 0; i < MAX_AUTH_BSSES; i++) { 235 if (wdev->authtry_bsses[i] || wdev->auth_bsses[i]) 236 continue; 237 wdev->auth_bsses[i] = wdev->current_bss; 238 wdev->current_bss = NULL; 239 done = true; 240 cfg80211_sme_disassoc(dev, i); 241 break; 242 } 243 WARN_ON(!done); 244 } else 245 WARN_ON(1); 246 247 248 reason_code = le16_to_cpu(mgmt->u.disassoc.reason_code); 249 250 from_ap = memcmp(mgmt->sa, dev->dev_addr, ETH_ALEN) != 0; 251 __cfg80211_disconnected(dev, NULL, 0, reason_code, from_ap); 252 } 253 EXPORT_SYMBOL(__cfg80211_send_disassoc); 254 255 void cfg80211_send_disassoc(struct net_device *dev, const u8 *buf, size_t len) 256 { 257 struct wireless_dev *wdev = dev->ieee80211_ptr; 258 259 wdev_lock(wdev); 260 __cfg80211_send_disassoc(dev, buf, len); 261 wdev_unlock(wdev); 262 } 263 EXPORT_SYMBOL(cfg80211_send_disassoc); 264 265 static void __cfg80211_auth_remove(struct wireless_dev *wdev, const u8 *addr) 266 { 267 int i; 268 bool done = false; 269 270 ASSERT_WDEV_LOCK(wdev); 271 272 for (i = 0; addr && i < MAX_AUTH_BSSES; i++) { 273 if (wdev->authtry_bsses[i] && 274 memcmp(wdev->authtry_bsses[i]->pub.bssid, 275 addr, ETH_ALEN) == 0) { 276 cfg80211_unhold_bss(wdev->authtry_bsses[i]); 277 cfg80211_put_bss(&wdev->authtry_bsses[i]->pub); 278 wdev->authtry_bsses[i] = NULL; 279 done = true; 280 break; 281 } 282 } 283 284 WARN_ON(!done); 285 } 286 287 void __cfg80211_auth_canceled(struct net_device *dev, const u8 *addr) 288 { 289 __cfg80211_auth_remove(dev->ieee80211_ptr, addr); 290 } 291 EXPORT_SYMBOL(__cfg80211_auth_canceled); 292 293 void cfg80211_send_auth_timeout(struct net_device *dev, const u8 *addr) 294 { 295 struct wireless_dev *wdev = dev->ieee80211_ptr; 296 struct wiphy *wiphy = wdev->wiphy; 297 struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy); 298 299 wdev_lock(wdev); 300 301 nl80211_send_auth_timeout(rdev, dev, addr, GFP_KERNEL); 302 if (wdev->sme_state == CFG80211_SME_CONNECTING) 303 __cfg80211_connect_result(dev, addr, NULL, 0, NULL, 0, 304 WLAN_STATUS_UNSPECIFIED_FAILURE, 305 false, NULL); 306 307 __cfg80211_auth_remove(wdev, addr); 308 309 wdev_unlock(wdev); 310 } 311 EXPORT_SYMBOL(cfg80211_send_auth_timeout); 312 313 void cfg80211_send_assoc_timeout(struct net_device *dev, const u8 *addr) 314 { 315 struct wireless_dev *wdev = dev->ieee80211_ptr; 316 struct wiphy *wiphy = wdev->wiphy; 317 struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy); 318 int i; 319 bool done = false; 320 321 wdev_lock(wdev); 322 323 nl80211_send_assoc_timeout(rdev, dev, addr, GFP_KERNEL); 324 if (wdev->sme_state == CFG80211_SME_CONNECTING) 325 __cfg80211_connect_result(dev, addr, NULL, 0, NULL, 0, 326 WLAN_STATUS_UNSPECIFIED_FAILURE, 327 false, NULL); 328 329 for (i = 0; addr && i < MAX_AUTH_BSSES; i++) { 330 if (wdev->auth_bsses[i] && 331 memcmp(wdev->auth_bsses[i]->pub.bssid, 332 addr, ETH_ALEN) == 0) { 333 cfg80211_unhold_bss(wdev->auth_bsses[i]); 334 cfg80211_put_bss(&wdev->auth_bsses[i]->pub); 335 wdev->auth_bsses[i] = NULL; 336 done = true; 337 break; 338 } 339 } 340 341 WARN_ON(!done); 342 343 wdev_unlock(wdev); 344 } 345 EXPORT_SYMBOL(cfg80211_send_assoc_timeout); 346 347 void cfg80211_michael_mic_failure(struct net_device *dev, const u8 *addr, 348 enum nl80211_key_type key_type, int key_id, 349 const u8 *tsc, gfp_t gfp) 350 { 351 struct wiphy *wiphy = dev->ieee80211_ptr->wiphy; 352 struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy); 353 #ifdef CONFIG_CFG80211_WEXT 354 union iwreq_data wrqu; 355 char *buf = kmalloc(128, gfp); 356 357 if (buf) { 358 sprintf(buf, "MLME-MICHAELMICFAILURE.indication(" 359 "keyid=%d %scast addr=%pM)", key_id, 360 key_type == NL80211_KEYTYPE_GROUP ? "broad" : "uni", 361 addr); 362 memset(&wrqu, 0, sizeof(wrqu)); 363 wrqu.data.length = strlen(buf); 364 wireless_send_event(dev, IWEVCUSTOM, &wrqu, buf); 365 kfree(buf); 366 } 367 #endif 368 369 nl80211_michael_mic_failure(rdev, dev, addr, key_type, key_id, tsc, gfp); 370 } 371 EXPORT_SYMBOL(cfg80211_michael_mic_failure); 372 373 /* some MLME handling for userspace SME */ 374 int __cfg80211_mlme_auth(struct cfg80211_registered_device *rdev, 375 struct net_device *dev, 376 struct ieee80211_channel *chan, 377 enum nl80211_auth_type auth_type, 378 const u8 *bssid, 379 const u8 *ssid, int ssid_len, 380 const u8 *ie, int ie_len, 381 const u8 *key, int key_len, int key_idx, 382 bool local_state_change) 383 { 384 struct wireless_dev *wdev = dev->ieee80211_ptr; 385 struct cfg80211_auth_request req; 386 struct cfg80211_internal_bss *bss; 387 int i, err, slot = -1, nfree = 0; 388 389 ASSERT_WDEV_LOCK(wdev); 390 391 if (auth_type == NL80211_AUTHTYPE_SHARED_KEY) 392 if (!key || !key_len || key_idx < 0 || key_idx > 4) 393 return -EINVAL; 394 395 if (wdev->current_bss && 396 memcmp(bssid, wdev->current_bss->pub.bssid, ETH_ALEN) == 0) 397 return -EALREADY; 398 399 for (i = 0; i < MAX_AUTH_BSSES; i++) { 400 if (wdev->authtry_bsses[i] && 401 memcmp(bssid, wdev->authtry_bsses[i]->pub.bssid, 402 ETH_ALEN) == 0) 403 return -EALREADY; 404 if (wdev->auth_bsses[i] && 405 memcmp(bssid, wdev->auth_bsses[i]->pub.bssid, 406 ETH_ALEN) == 0) 407 return -EALREADY; 408 } 409 410 memset(&req, 0, sizeof(req)); 411 412 req.local_state_change = local_state_change; 413 req.ie = ie; 414 req.ie_len = ie_len; 415 req.auth_type = auth_type; 416 req.bss = cfg80211_get_bss(&rdev->wiphy, chan, bssid, ssid, ssid_len, 417 WLAN_CAPABILITY_ESS, WLAN_CAPABILITY_ESS); 418 req.key = key; 419 req.key_len = key_len; 420 req.key_idx = key_idx; 421 if (!req.bss) 422 return -ENOENT; 423 424 bss = bss_from_pub(req.bss); 425 426 for (i = 0; i < MAX_AUTH_BSSES; i++) { 427 if (!wdev->auth_bsses[i] && !wdev->authtry_bsses[i]) { 428 slot = i; 429 nfree++; 430 } 431 } 432 433 /* we need one free slot for disassoc and one for this auth */ 434 if (nfree < 2) { 435 err = -ENOSPC; 436 goto out; 437 } 438 439 if (local_state_change) 440 wdev->auth_bsses[slot] = bss; 441 else 442 wdev->authtry_bsses[slot] = bss; 443 cfg80211_hold_bss(bss); 444 445 err = rdev->ops->auth(&rdev->wiphy, dev, &req); 446 if (err) { 447 if (local_state_change) 448 wdev->auth_bsses[slot] = NULL; 449 else 450 wdev->authtry_bsses[slot] = NULL; 451 cfg80211_unhold_bss(bss); 452 } 453 454 out: 455 if (err) 456 cfg80211_put_bss(req.bss); 457 return err; 458 } 459 460 int cfg80211_mlme_auth(struct cfg80211_registered_device *rdev, 461 struct net_device *dev, struct ieee80211_channel *chan, 462 enum nl80211_auth_type auth_type, const u8 *bssid, 463 const u8 *ssid, int ssid_len, 464 const u8 *ie, int ie_len, 465 const u8 *key, int key_len, int key_idx, 466 bool local_state_change) 467 { 468 int err; 469 470 wdev_lock(dev->ieee80211_ptr); 471 err = __cfg80211_mlme_auth(rdev, dev, chan, auth_type, bssid, 472 ssid, ssid_len, ie, ie_len, 473 key, key_len, key_idx, local_state_change); 474 wdev_unlock(dev->ieee80211_ptr); 475 476 return err; 477 } 478 479 int __cfg80211_mlme_assoc(struct cfg80211_registered_device *rdev, 480 struct net_device *dev, 481 struct ieee80211_channel *chan, 482 const u8 *bssid, const u8 *prev_bssid, 483 const u8 *ssid, int ssid_len, 484 const u8 *ie, int ie_len, bool use_mfp, 485 struct cfg80211_crypto_settings *crypt) 486 { 487 struct wireless_dev *wdev = dev->ieee80211_ptr; 488 struct cfg80211_assoc_request req; 489 struct cfg80211_internal_bss *bss; 490 int i, err, slot = -1; 491 bool was_connected = false; 492 493 ASSERT_WDEV_LOCK(wdev); 494 495 memset(&req, 0, sizeof(req)); 496 497 if (wdev->current_bss && prev_bssid && 498 memcmp(wdev->current_bss->pub.bssid, prev_bssid, ETH_ALEN) == 0) { 499 /* 500 * Trying to reassociate: Allow this to proceed and let the old 501 * association to be dropped when the new one is completed. 502 */ 503 if (wdev->sme_state == CFG80211_SME_CONNECTED) { 504 was_connected = true; 505 wdev->sme_state = CFG80211_SME_CONNECTING; 506 } 507 } else if (wdev->current_bss) 508 return -EALREADY; 509 510 req.ie = ie; 511 req.ie_len = ie_len; 512 memcpy(&req.crypto, crypt, sizeof(req.crypto)); 513 req.use_mfp = use_mfp; 514 req.prev_bssid = prev_bssid; 515 req.bss = cfg80211_get_bss(&rdev->wiphy, chan, bssid, ssid, ssid_len, 516 WLAN_CAPABILITY_ESS, WLAN_CAPABILITY_ESS); 517 if (!req.bss) { 518 if (was_connected) 519 wdev->sme_state = CFG80211_SME_CONNECTED; 520 return -ENOENT; 521 } 522 523 bss = bss_from_pub(req.bss); 524 525 for (i = 0; i < MAX_AUTH_BSSES; i++) { 526 if (bss == wdev->auth_bsses[i]) { 527 slot = i; 528 break; 529 } 530 } 531 532 if (slot < 0) { 533 err = -ENOTCONN; 534 goto out; 535 } 536 537 err = rdev->ops->assoc(&rdev->wiphy, dev, &req); 538 out: 539 if (err && was_connected) 540 wdev->sme_state = CFG80211_SME_CONNECTED; 541 /* still a reference in wdev->auth_bsses[slot] */ 542 cfg80211_put_bss(req.bss); 543 return err; 544 } 545 546 int cfg80211_mlme_assoc(struct cfg80211_registered_device *rdev, 547 struct net_device *dev, 548 struct ieee80211_channel *chan, 549 const u8 *bssid, const u8 *prev_bssid, 550 const u8 *ssid, int ssid_len, 551 const u8 *ie, int ie_len, bool use_mfp, 552 struct cfg80211_crypto_settings *crypt) 553 { 554 struct wireless_dev *wdev = dev->ieee80211_ptr; 555 int err; 556 557 wdev_lock(wdev); 558 err = __cfg80211_mlme_assoc(rdev, dev, chan, bssid, prev_bssid, 559 ssid, ssid_len, ie, ie_len, use_mfp, crypt); 560 wdev_unlock(wdev); 561 562 return err; 563 } 564 565 int __cfg80211_mlme_deauth(struct cfg80211_registered_device *rdev, 566 struct net_device *dev, const u8 *bssid, 567 const u8 *ie, int ie_len, u16 reason, 568 bool local_state_change) 569 { 570 struct wireless_dev *wdev = dev->ieee80211_ptr; 571 struct cfg80211_deauth_request req; 572 int i; 573 574 ASSERT_WDEV_LOCK(wdev); 575 576 memset(&req, 0, sizeof(req)); 577 req.reason_code = reason; 578 req.local_state_change = local_state_change; 579 req.ie = ie; 580 req.ie_len = ie_len; 581 if (wdev->current_bss && 582 memcmp(wdev->current_bss->pub.bssid, bssid, ETH_ALEN) == 0) { 583 req.bss = &wdev->current_bss->pub; 584 } else for (i = 0; i < MAX_AUTH_BSSES; i++) { 585 if (wdev->auth_bsses[i] && 586 memcmp(bssid, wdev->auth_bsses[i]->pub.bssid, ETH_ALEN) == 0) { 587 req.bss = &wdev->auth_bsses[i]->pub; 588 break; 589 } 590 if (wdev->authtry_bsses[i] && 591 memcmp(bssid, wdev->authtry_bsses[i]->pub.bssid, ETH_ALEN) == 0) { 592 req.bss = &wdev->authtry_bsses[i]->pub; 593 break; 594 } 595 } 596 597 if (!req.bss) 598 return -ENOTCONN; 599 600 return rdev->ops->deauth(&rdev->wiphy, dev, &req, wdev); 601 } 602 603 int cfg80211_mlme_deauth(struct cfg80211_registered_device *rdev, 604 struct net_device *dev, const u8 *bssid, 605 const u8 *ie, int ie_len, u16 reason, 606 bool local_state_change) 607 { 608 struct wireless_dev *wdev = dev->ieee80211_ptr; 609 int err; 610 611 wdev_lock(wdev); 612 err = __cfg80211_mlme_deauth(rdev, dev, bssid, ie, ie_len, reason, 613 local_state_change); 614 wdev_unlock(wdev); 615 616 return err; 617 } 618 619 static int __cfg80211_mlme_disassoc(struct cfg80211_registered_device *rdev, 620 struct net_device *dev, const u8 *bssid, 621 const u8 *ie, int ie_len, u16 reason, 622 bool local_state_change) 623 { 624 struct wireless_dev *wdev = dev->ieee80211_ptr; 625 struct cfg80211_disassoc_request req; 626 627 ASSERT_WDEV_LOCK(wdev); 628 629 if (wdev->sme_state != CFG80211_SME_CONNECTED) 630 return -ENOTCONN; 631 632 if (WARN_ON(!wdev->current_bss)) 633 return -ENOTCONN; 634 635 memset(&req, 0, sizeof(req)); 636 req.reason_code = reason; 637 req.local_state_change = local_state_change; 638 req.ie = ie; 639 req.ie_len = ie_len; 640 if (memcmp(wdev->current_bss->pub.bssid, bssid, ETH_ALEN) == 0) 641 req.bss = &wdev->current_bss->pub; 642 else 643 return -ENOTCONN; 644 645 return rdev->ops->disassoc(&rdev->wiphy, dev, &req, wdev); 646 } 647 648 int cfg80211_mlme_disassoc(struct cfg80211_registered_device *rdev, 649 struct net_device *dev, const u8 *bssid, 650 const u8 *ie, int ie_len, u16 reason, 651 bool local_state_change) 652 { 653 struct wireless_dev *wdev = dev->ieee80211_ptr; 654 int err; 655 656 wdev_lock(wdev); 657 err = __cfg80211_mlme_disassoc(rdev, dev, bssid, ie, ie_len, reason, 658 local_state_change); 659 wdev_unlock(wdev); 660 661 return err; 662 } 663 664 void cfg80211_mlme_down(struct cfg80211_registered_device *rdev, 665 struct net_device *dev) 666 { 667 struct wireless_dev *wdev = dev->ieee80211_ptr; 668 struct cfg80211_deauth_request req; 669 int i; 670 671 ASSERT_WDEV_LOCK(wdev); 672 673 if (!rdev->ops->deauth) 674 return; 675 676 memset(&req, 0, sizeof(req)); 677 req.reason_code = WLAN_REASON_DEAUTH_LEAVING; 678 req.ie = NULL; 679 req.ie_len = 0; 680 681 if (wdev->current_bss) { 682 req.bss = &wdev->current_bss->pub; 683 rdev->ops->deauth(&rdev->wiphy, dev, &req, wdev); 684 if (wdev->current_bss) { 685 cfg80211_unhold_bss(wdev->current_bss); 686 cfg80211_put_bss(&wdev->current_bss->pub); 687 wdev->current_bss = NULL; 688 } 689 } 690 691 for (i = 0; i < MAX_AUTH_BSSES; i++) { 692 if (wdev->auth_bsses[i]) { 693 req.bss = &wdev->auth_bsses[i]->pub; 694 rdev->ops->deauth(&rdev->wiphy, dev, &req, wdev); 695 if (wdev->auth_bsses[i]) { 696 cfg80211_unhold_bss(wdev->auth_bsses[i]); 697 cfg80211_put_bss(&wdev->auth_bsses[i]->pub); 698 wdev->auth_bsses[i] = NULL; 699 } 700 } 701 if (wdev->authtry_bsses[i]) { 702 req.bss = &wdev->authtry_bsses[i]->pub; 703 rdev->ops->deauth(&rdev->wiphy, dev, &req, wdev); 704 if (wdev->authtry_bsses[i]) { 705 cfg80211_unhold_bss(wdev->authtry_bsses[i]); 706 cfg80211_put_bss(&wdev->authtry_bsses[i]->pub); 707 wdev->authtry_bsses[i] = NULL; 708 } 709 } 710 } 711 } 712 713 void cfg80211_ready_on_channel(struct net_device *dev, u64 cookie, 714 struct ieee80211_channel *chan, 715 enum nl80211_channel_type channel_type, 716 unsigned int duration, gfp_t gfp) 717 { 718 struct wiphy *wiphy = dev->ieee80211_ptr->wiphy; 719 struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy); 720 721 nl80211_send_remain_on_channel(rdev, dev, cookie, chan, channel_type, 722 duration, gfp); 723 } 724 EXPORT_SYMBOL(cfg80211_ready_on_channel); 725 726 void cfg80211_remain_on_channel_expired(struct net_device *dev, 727 u64 cookie, 728 struct ieee80211_channel *chan, 729 enum nl80211_channel_type channel_type, 730 gfp_t gfp) 731 { 732 struct wiphy *wiphy = dev->ieee80211_ptr->wiphy; 733 struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy); 734 735 nl80211_send_remain_on_channel_cancel(rdev, dev, cookie, chan, 736 channel_type, gfp); 737 } 738 EXPORT_SYMBOL(cfg80211_remain_on_channel_expired); 739 740 void cfg80211_new_sta(struct net_device *dev, const u8 *mac_addr, 741 struct station_info *sinfo, gfp_t gfp) 742 { 743 struct wiphy *wiphy = dev->ieee80211_ptr->wiphy; 744 struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy); 745 746 nl80211_send_sta_event(rdev, dev, mac_addr, sinfo, gfp); 747 } 748 EXPORT_SYMBOL(cfg80211_new_sta); 749 750 struct cfg80211_action_registration { 751 struct list_head list; 752 753 u32 nlpid; 754 755 int match_len; 756 757 u8 match[]; 758 }; 759 760 int cfg80211_mlme_register_action(struct wireless_dev *wdev, u32 snd_pid, 761 const u8 *match_data, int match_len) 762 { 763 struct cfg80211_action_registration *reg, *nreg; 764 int err = 0; 765 766 nreg = kzalloc(sizeof(*reg) + match_len, GFP_KERNEL); 767 if (!nreg) 768 return -ENOMEM; 769 770 spin_lock_bh(&wdev->action_registrations_lock); 771 772 list_for_each_entry(reg, &wdev->action_registrations, list) { 773 int mlen = min(match_len, reg->match_len); 774 775 if (memcmp(reg->match, match_data, mlen) == 0) { 776 err = -EALREADY; 777 break; 778 } 779 } 780 781 if (err) { 782 kfree(nreg); 783 goto out; 784 } 785 786 memcpy(nreg->match, match_data, match_len); 787 nreg->match_len = match_len; 788 nreg->nlpid = snd_pid; 789 list_add(&nreg->list, &wdev->action_registrations); 790 791 out: 792 spin_unlock_bh(&wdev->action_registrations_lock); 793 return err; 794 } 795 796 void cfg80211_mlme_unregister_actions(struct wireless_dev *wdev, u32 nlpid) 797 { 798 struct cfg80211_action_registration *reg, *tmp; 799 800 spin_lock_bh(&wdev->action_registrations_lock); 801 802 list_for_each_entry_safe(reg, tmp, &wdev->action_registrations, list) { 803 if (reg->nlpid == nlpid) { 804 list_del(®->list); 805 kfree(reg); 806 } 807 } 808 809 spin_unlock_bh(&wdev->action_registrations_lock); 810 } 811 812 void cfg80211_mlme_purge_actions(struct wireless_dev *wdev) 813 { 814 struct cfg80211_action_registration *reg, *tmp; 815 816 spin_lock_bh(&wdev->action_registrations_lock); 817 818 list_for_each_entry_safe(reg, tmp, &wdev->action_registrations, list) { 819 list_del(®->list); 820 kfree(reg); 821 } 822 823 spin_unlock_bh(&wdev->action_registrations_lock); 824 } 825 826 int cfg80211_mlme_action(struct cfg80211_registered_device *rdev, 827 struct net_device *dev, 828 struct ieee80211_channel *chan, 829 enum nl80211_channel_type channel_type, 830 bool channel_type_valid, 831 const u8 *buf, size_t len, u64 *cookie) 832 { 833 struct wireless_dev *wdev = dev->ieee80211_ptr; 834 const struct ieee80211_mgmt *mgmt; 835 836 if (rdev->ops->action == NULL) 837 return -EOPNOTSUPP; 838 if (len < 24 + 1) 839 return -EINVAL; 840 841 mgmt = (const struct ieee80211_mgmt *) buf; 842 if (!ieee80211_is_action(mgmt->frame_control)) 843 return -EINVAL; 844 if (mgmt->u.action.category != WLAN_CATEGORY_PUBLIC) { 845 /* Verify that we are associated with the destination AP */ 846 wdev_lock(wdev); 847 848 if (!wdev->current_bss || 849 memcmp(wdev->current_bss->pub.bssid, mgmt->bssid, 850 ETH_ALEN) != 0 || 851 (wdev->iftype == NL80211_IFTYPE_STATION && 852 memcmp(wdev->current_bss->pub.bssid, mgmt->da, 853 ETH_ALEN) != 0)) { 854 wdev_unlock(wdev); 855 return -ENOTCONN; 856 } 857 858 wdev_unlock(wdev); 859 } 860 861 if (memcmp(mgmt->sa, dev->dev_addr, ETH_ALEN) != 0) 862 return -EINVAL; 863 864 /* Transmit the Action frame as requested by user space */ 865 return rdev->ops->action(&rdev->wiphy, dev, chan, channel_type, 866 channel_type_valid, buf, len, cookie); 867 } 868 869 bool cfg80211_rx_action(struct net_device *dev, int freq, const u8 *buf, 870 size_t len, gfp_t gfp) 871 { 872 struct wireless_dev *wdev = dev->ieee80211_ptr; 873 struct wiphy *wiphy = wdev->wiphy; 874 struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy); 875 struct cfg80211_action_registration *reg; 876 const u8 *action_data; 877 int action_data_len; 878 bool result = false; 879 880 /* frame length - min size excluding category */ 881 action_data_len = len - (IEEE80211_MIN_ACTION_SIZE - 1); 882 883 /* action data starts with category */ 884 action_data = buf + IEEE80211_MIN_ACTION_SIZE - 1; 885 886 spin_lock_bh(&wdev->action_registrations_lock); 887 888 list_for_each_entry(reg, &wdev->action_registrations, list) { 889 if (reg->match_len > action_data_len) 890 continue; 891 892 if (memcmp(reg->match, action_data, reg->match_len)) 893 continue; 894 895 /* found match! */ 896 897 /* Indicate the received Action frame to user space */ 898 if (nl80211_send_action(rdev, dev, reg->nlpid, freq, 899 buf, len, gfp)) 900 continue; 901 902 result = true; 903 break; 904 } 905 906 spin_unlock_bh(&wdev->action_registrations_lock); 907 908 return result; 909 } 910 EXPORT_SYMBOL(cfg80211_rx_action); 911 912 void cfg80211_action_tx_status(struct net_device *dev, u64 cookie, 913 const u8 *buf, size_t len, bool ack, gfp_t gfp) 914 { 915 struct wireless_dev *wdev = dev->ieee80211_ptr; 916 struct wiphy *wiphy = wdev->wiphy; 917 struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy); 918 919 /* Indicate TX status of the Action frame to user space */ 920 nl80211_send_action_tx_status(rdev, dev, cookie, buf, len, ack, gfp); 921 } 922 EXPORT_SYMBOL(cfg80211_action_tx_status); 923 924 void cfg80211_cqm_rssi_notify(struct net_device *dev, 925 enum nl80211_cqm_rssi_threshold_event rssi_event, 926 gfp_t gfp) 927 { 928 struct wireless_dev *wdev = dev->ieee80211_ptr; 929 struct wiphy *wiphy = wdev->wiphy; 930 struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy); 931 932 /* Indicate roaming trigger event to user space */ 933 nl80211_send_cqm_rssi_notify(rdev, dev, rssi_event, gfp); 934 } 935 EXPORT_SYMBOL(cfg80211_cqm_rssi_notify); 936