sme.c 28 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088
  1. /*
  2. * SME code for cfg80211
  3. * both driver SME event handling and the SME implementation
  4. * (for nl80211's connect() and wext)
  5. *
  6. * Copyright 2009 Johannes Berg <johannes@sipsolutions.net>
  7. * Copyright (C) 2009 Intel Corporation. All rights reserved.
  8. */
  9. #include <linux/etherdevice.h>
  10. #include <linux/if_arp.h>
  11. #include <linux/slab.h>
  12. #include <linux/workqueue.h>
  13. #include <linux/wireless.h>
  14. #include <linux/export.h>
  15. #include <net/iw_handler.h>
  16. #include <net/cfg80211.h>
  17. #include <net/rtnetlink.h>
  18. #include "nl80211.h"
  19. #include "reg.h"
  20. #include "rdev-ops.h"
  21. /*
  22. * Software SME in cfg80211, using auth/assoc/deauth calls to the
  23. * driver. This is is for implementing nl80211's connect/disconnect
  24. * and wireless extensions (if configured.)
  25. */
  26. struct cfg80211_conn {
  27. struct cfg80211_connect_params params;
  28. /* these are sub-states of the _CONNECTING sme_state */
  29. enum {
  30. CFG80211_CONN_SCANNING,
  31. CFG80211_CONN_SCAN_AGAIN,
  32. CFG80211_CONN_AUTHENTICATE_NEXT,
  33. CFG80211_CONN_AUTHENTICATING,
  34. CFG80211_CONN_AUTH_FAILED,
  35. CFG80211_CONN_ASSOCIATE_NEXT,
  36. CFG80211_CONN_ASSOCIATING,
  37. CFG80211_CONN_ASSOC_FAILED,
  38. CFG80211_CONN_DEAUTH,
  39. CFG80211_CONN_CONNECTED,
  40. } state;
  41. u8 bssid[ETH_ALEN], prev_bssid[ETH_ALEN];
  42. const u8 *ie;
  43. size_t ie_len;
  44. bool auto_auth, prev_bssid_valid;
  45. };
  46. static void cfg80211_sme_free(struct wireless_dev *wdev)
  47. {
  48. if (!wdev->conn)
  49. return;
  50. kfree(wdev->conn->ie);
  51. kfree(wdev->conn);
  52. wdev->conn = NULL;
  53. }
  54. static int cfg80211_conn_scan(struct wireless_dev *wdev)
  55. {
  56. struct cfg80211_registered_device *rdev = wiphy_to_rdev(wdev->wiphy);
  57. struct cfg80211_scan_request *request;
  58. int n_channels, err;
  59. ASSERT_RTNL();
  60. ASSERT_WDEV_LOCK(wdev);
  61. if (rdev->scan_req || rdev->scan_msg)
  62. return -EBUSY;
  63. if (wdev->conn->params.channel)
  64. n_channels = 1;
  65. else
  66. n_channels = ieee80211_get_num_supported_channels(wdev->wiphy);
  67. request = kzalloc(sizeof(*request) + sizeof(request->ssids[0]) +
  68. sizeof(request->channels[0]) * n_channels,
  69. GFP_KERNEL);
  70. if (!request)
  71. return -ENOMEM;
  72. if (wdev->conn->params.channel) {
  73. enum nl80211_band band = wdev->conn->params.channel->band;
  74. struct ieee80211_supported_band *sband =
  75. wdev->wiphy->bands[band];
  76. if (!sband) {
  77. kfree(request);
  78. return -EINVAL;
  79. }
  80. request->channels[0] = wdev->conn->params.channel;
  81. request->rates[band] = (1 << sband->n_bitrates) - 1;
  82. } else {
  83. int i = 0, j;
  84. enum nl80211_band band;
  85. struct ieee80211_supported_band *bands;
  86. struct ieee80211_channel *channel;
  87. for (band = 0; band < NUM_NL80211_BANDS; band++) {
  88. bands = wdev->wiphy->bands[band];
  89. if (!bands)
  90. continue;
  91. for (j = 0; j < bands->n_channels; j++) {
  92. channel = &bands->channels[j];
  93. if (channel->flags & IEEE80211_CHAN_DISABLED)
  94. continue;
  95. request->channels[i++] = channel;
  96. }
  97. request->rates[band] = (1 << bands->n_bitrates) - 1;
  98. }
  99. n_channels = i;
  100. }
  101. request->n_channels = n_channels;
  102. request->ssids = (void *)&request->channels[n_channels];
  103. request->n_ssids = 1;
  104. memcpy(request->ssids[0].ssid, wdev->conn->params.ssid,
  105. wdev->conn->params.ssid_len);
  106. request->ssids[0].ssid_len = wdev->conn->params.ssid_len;
  107. eth_broadcast_addr(request->bssid);
  108. request->wdev = wdev;
  109. request->wiphy = &rdev->wiphy;
  110. request->scan_start = jiffies;
  111. rdev->scan_req = request;
  112. err = rdev_scan(rdev, request);
  113. if (!err) {
  114. wdev->conn->state = CFG80211_CONN_SCANNING;
  115. nl80211_send_scan_start(rdev, wdev);
  116. dev_hold(wdev->netdev);
  117. } else {
  118. rdev->scan_req = NULL;
  119. kfree(request);
  120. }
  121. return err;
  122. }
  123. static int cfg80211_conn_do_work(struct wireless_dev *wdev)
  124. {
  125. struct cfg80211_registered_device *rdev = wiphy_to_rdev(wdev->wiphy);
  126. struct cfg80211_connect_params *params;
  127. struct cfg80211_assoc_request req = {};
  128. int err;
  129. ASSERT_WDEV_LOCK(wdev);
  130. if (!wdev->conn)
  131. return 0;
  132. params = &wdev->conn->params;
  133. switch (wdev->conn->state) {
  134. case CFG80211_CONN_SCANNING:
  135. /* didn't find it during scan ... */
  136. return -ENOENT;
  137. case CFG80211_CONN_SCAN_AGAIN:
  138. return cfg80211_conn_scan(wdev);
  139. case CFG80211_CONN_AUTHENTICATE_NEXT:
  140. if (WARN_ON(!rdev->ops->auth))
  141. return -EOPNOTSUPP;
  142. wdev->conn->state = CFG80211_CONN_AUTHENTICATING;
  143. return cfg80211_mlme_auth(rdev, wdev->netdev,
  144. params->channel, params->auth_type,
  145. params->bssid,
  146. params->ssid, params->ssid_len,
  147. NULL, 0,
  148. params->key, params->key_len,
  149. params->key_idx, NULL, 0);
  150. case CFG80211_CONN_AUTH_FAILED:
  151. return -ENOTCONN;
  152. case CFG80211_CONN_ASSOCIATE_NEXT:
  153. if (WARN_ON(!rdev->ops->assoc))
  154. return -EOPNOTSUPP;
  155. wdev->conn->state = CFG80211_CONN_ASSOCIATING;
  156. if (wdev->conn->prev_bssid_valid)
  157. req.prev_bssid = wdev->conn->prev_bssid;
  158. req.ie = params->ie;
  159. req.ie_len = params->ie_len;
  160. req.use_mfp = params->mfp != NL80211_MFP_NO;
  161. req.crypto = params->crypto;
  162. req.flags = params->flags;
  163. req.ht_capa = params->ht_capa;
  164. req.ht_capa_mask = params->ht_capa_mask;
  165. req.vht_capa = params->vht_capa;
  166. req.vht_capa_mask = params->vht_capa_mask;
  167. err = cfg80211_mlme_assoc(rdev, wdev->netdev, params->channel,
  168. params->bssid, params->ssid,
  169. params->ssid_len, &req);
  170. if (err)
  171. cfg80211_mlme_deauth(rdev, wdev->netdev, params->bssid,
  172. NULL, 0,
  173. WLAN_REASON_DEAUTH_LEAVING,
  174. false);
  175. return err;
  176. case CFG80211_CONN_ASSOC_FAILED:
  177. cfg80211_mlme_deauth(rdev, wdev->netdev, params->bssid,
  178. NULL, 0,
  179. WLAN_REASON_DEAUTH_LEAVING, false);
  180. return -ENOTCONN;
  181. case CFG80211_CONN_DEAUTH:
  182. cfg80211_mlme_deauth(rdev, wdev->netdev, params->bssid,
  183. NULL, 0,
  184. WLAN_REASON_DEAUTH_LEAVING, false);
  185. /* free directly, disconnected event already sent */
  186. cfg80211_sme_free(wdev);
  187. return 0;
  188. default:
  189. return 0;
  190. }
  191. }
  192. void cfg80211_conn_work(struct work_struct *work)
  193. {
  194. struct cfg80211_registered_device *rdev =
  195. container_of(work, struct cfg80211_registered_device, conn_work);
  196. struct wireless_dev *wdev;
  197. u8 bssid_buf[ETH_ALEN], *bssid = NULL;
  198. rtnl_lock();
  199. list_for_each_entry(wdev, &rdev->wiphy.wdev_list, list) {
  200. if (!wdev->netdev)
  201. continue;
  202. wdev_lock(wdev);
  203. if (!netif_running(wdev->netdev)) {
  204. wdev_unlock(wdev);
  205. continue;
  206. }
  207. if (!wdev->conn ||
  208. wdev->conn->state == CFG80211_CONN_CONNECTED) {
  209. wdev_unlock(wdev);
  210. continue;
  211. }
  212. if (wdev->conn->params.bssid) {
  213. memcpy(bssid_buf, wdev->conn->params.bssid, ETH_ALEN);
  214. bssid = bssid_buf;
  215. }
  216. if (cfg80211_conn_do_work(wdev)) {
  217. __cfg80211_connect_result(
  218. wdev->netdev, bssid,
  219. NULL, 0, NULL, 0, -1, false, NULL);
  220. }
  221. wdev_unlock(wdev);
  222. }
  223. rtnl_unlock();
  224. }
  225. /* Returned bss is reference counted and must be cleaned up appropriately. */
  226. static struct cfg80211_bss *cfg80211_get_conn_bss(struct wireless_dev *wdev)
  227. {
  228. struct cfg80211_registered_device *rdev = wiphy_to_rdev(wdev->wiphy);
  229. struct cfg80211_bss *bss;
  230. ASSERT_WDEV_LOCK(wdev);
  231. bss = cfg80211_get_bss(wdev->wiphy, wdev->conn->params.channel,
  232. wdev->conn->params.bssid,
  233. wdev->conn->params.ssid,
  234. wdev->conn->params.ssid_len,
  235. wdev->conn_bss_type,
  236. IEEE80211_PRIVACY(wdev->conn->params.privacy));
  237. if (!bss)
  238. return NULL;
  239. memcpy(wdev->conn->bssid, bss->bssid, ETH_ALEN);
  240. wdev->conn->params.bssid = wdev->conn->bssid;
  241. wdev->conn->params.channel = bss->channel;
  242. wdev->conn->state = CFG80211_CONN_AUTHENTICATE_NEXT;
  243. schedule_work(&rdev->conn_work);
  244. return bss;
  245. }
  246. static void __cfg80211_sme_scan_done(struct net_device *dev)
  247. {
  248. struct wireless_dev *wdev = dev->ieee80211_ptr;
  249. struct cfg80211_registered_device *rdev = wiphy_to_rdev(wdev->wiphy);
  250. struct cfg80211_bss *bss;
  251. ASSERT_WDEV_LOCK(wdev);
  252. if (!wdev->conn)
  253. return;
  254. if (wdev->conn->state != CFG80211_CONN_SCANNING &&
  255. wdev->conn->state != CFG80211_CONN_SCAN_AGAIN)
  256. return;
  257. bss = cfg80211_get_conn_bss(wdev);
  258. if (bss)
  259. cfg80211_put_bss(&rdev->wiphy, bss);
  260. else
  261. schedule_work(&rdev->conn_work);
  262. }
  263. void cfg80211_sme_scan_done(struct net_device *dev)
  264. {
  265. struct wireless_dev *wdev = dev->ieee80211_ptr;
  266. wdev_lock(wdev);
  267. __cfg80211_sme_scan_done(dev);
  268. wdev_unlock(wdev);
  269. }
  270. void cfg80211_sme_rx_auth(struct wireless_dev *wdev, const u8 *buf, size_t len)
  271. {
  272. struct wiphy *wiphy = wdev->wiphy;
  273. struct cfg80211_registered_device *rdev = wiphy_to_rdev(wiphy);
  274. struct ieee80211_mgmt *mgmt = (struct ieee80211_mgmt *)buf;
  275. u16 status_code = le16_to_cpu(mgmt->u.auth.status_code);
  276. ASSERT_WDEV_LOCK(wdev);
  277. if (!wdev->conn || wdev->conn->state == CFG80211_CONN_CONNECTED)
  278. return;
  279. if (status_code == WLAN_STATUS_NOT_SUPPORTED_AUTH_ALG &&
  280. wdev->conn->auto_auth &&
  281. wdev->conn->params.auth_type != NL80211_AUTHTYPE_NETWORK_EAP) {
  282. /* select automatically between only open, shared, leap */
  283. switch (wdev->conn->params.auth_type) {
  284. case NL80211_AUTHTYPE_OPEN_SYSTEM:
  285. if (wdev->connect_keys)
  286. wdev->conn->params.auth_type =
  287. NL80211_AUTHTYPE_SHARED_KEY;
  288. else
  289. wdev->conn->params.auth_type =
  290. NL80211_AUTHTYPE_NETWORK_EAP;
  291. break;
  292. case NL80211_AUTHTYPE_SHARED_KEY:
  293. wdev->conn->params.auth_type =
  294. NL80211_AUTHTYPE_NETWORK_EAP;
  295. break;
  296. default:
  297. /* huh? */
  298. wdev->conn->params.auth_type =
  299. NL80211_AUTHTYPE_OPEN_SYSTEM;
  300. break;
  301. }
  302. wdev->conn->state = CFG80211_CONN_AUTHENTICATE_NEXT;
  303. schedule_work(&rdev->conn_work);
  304. } else if (status_code != WLAN_STATUS_SUCCESS) {
  305. __cfg80211_connect_result(wdev->netdev, mgmt->bssid,
  306. NULL, 0, NULL, 0,
  307. status_code, false, NULL);
  308. } else if (wdev->conn->state == CFG80211_CONN_AUTHENTICATING) {
  309. wdev->conn->state = CFG80211_CONN_ASSOCIATE_NEXT;
  310. schedule_work(&rdev->conn_work);
  311. }
  312. }
  313. bool cfg80211_sme_rx_assoc_resp(struct wireless_dev *wdev, u16 status)
  314. {
  315. struct cfg80211_registered_device *rdev = wiphy_to_rdev(wdev->wiphy);
  316. if (!wdev->conn)
  317. return false;
  318. if (status == WLAN_STATUS_SUCCESS) {
  319. wdev->conn->state = CFG80211_CONN_CONNECTED;
  320. return false;
  321. }
  322. if (wdev->conn->prev_bssid_valid) {
  323. /*
  324. * Some stupid APs don't accept reassoc, so we
  325. * need to fall back to trying regular assoc;
  326. * return true so no event is sent to userspace.
  327. */
  328. wdev->conn->prev_bssid_valid = false;
  329. wdev->conn->state = CFG80211_CONN_ASSOCIATE_NEXT;
  330. schedule_work(&rdev->conn_work);
  331. return true;
  332. }
  333. wdev->conn->state = CFG80211_CONN_ASSOC_FAILED;
  334. schedule_work(&rdev->conn_work);
  335. return false;
  336. }
  337. void cfg80211_sme_deauth(struct wireless_dev *wdev)
  338. {
  339. cfg80211_sme_free(wdev);
  340. }
  341. void cfg80211_sme_auth_timeout(struct wireless_dev *wdev)
  342. {
  343. struct cfg80211_registered_device *rdev = wiphy_to_rdev(wdev->wiphy);
  344. if (!wdev->conn)
  345. return;
  346. wdev->conn->state = CFG80211_CONN_AUTH_FAILED;
  347. schedule_work(&rdev->conn_work);
  348. }
  349. void cfg80211_sme_disassoc(struct wireless_dev *wdev)
  350. {
  351. struct cfg80211_registered_device *rdev = wiphy_to_rdev(wdev->wiphy);
  352. if (!wdev->conn)
  353. return;
  354. wdev->conn->state = CFG80211_CONN_DEAUTH;
  355. schedule_work(&rdev->conn_work);
  356. }
  357. void cfg80211_sme_assoc_timeout(struct wireless_dev *wdev)
  358. {
  359. struct cfg80211_registered_device *rdev = wiphy_to_rdev(wdev->wiphy);
  360. if (!wdev->conn)
  361. return;
  362. wdev->conn->state = CFG80211_CONN_ASSOC_FAILED;
  363. schedule_work(&rdev->conn_work);
  364. }
  365. static int cfg80211_sme_get_conn_ies(struct wireless_dev *wdev,
  366. const u8 *ies, size_t ies_len,
  367. const u8 **out_ies, size_t *out_ies_len)
  368. {
  369. struct cfg80211_registered_device *rdev = wiphy_to_rdev(wdev->wiphy);
  370. u8 *buf;
  371. size_t offs;
  372. if (!rdev->wiphy.extended_capabilities_len ||
  373. (ies && cfg80211_find_ie(WLAN_EID_EXT_CAPABILITY, ies, ies_len))) {
  374. *out_ies = kmemdup(ies, ies_len, GFP_KERNEL);
  375. if (!*out_ies)
  376. return -ENOMEM;
  377. *out_ies_len = ies_len;
  378. return 0;
  379. }
  380. buf = kmalloc(ies_len + rdev->wiphy.extended_capabilities_len + 2,
  381. GFP_KERNEL);
  382. if (!buf)
  383. return -ENOMEM;
  384. if (ies_len) {
  385. static const u8 before_extcapa[] = {
  386. /* not listing IEs expected to be created by driver */
  387. WLAN_EID_RSN,
  388. WLAN_EID_QOS_CAPA,
  389. WLAN_EID_RRM_ENABLED_CAPABILITIES,
  390. WLAN_EID_MOBILITY_DOMAIN,
  391. WLAN_EID_SUPPORTED_REGULATORY_CLASSES,
  392. WLAN_EID_BSS_COEX_2040,
  393. };
  394. offs = ieee80211_ie_split(ies, ies_len, before_extcapa,
  395. ARRAY_SIZE(before_extcapa), 0);
  396. memcpy(buf, ies, offs);
  397. /* leave a whole for extended capabilities IE */
  398. memcpy(buf + offs + rdev->wiphy.extended_capabilities_len + 2,
  399. ies + offs, ies_len - offs);
  400. } else {
  401. offs = 0;
  402. }
  403. /* place extended capabilities IE (with only driver capabilities) */
  404. buf[offs] = WLAN_EID_EXT_CAPABILITY;
  405. buf[offs + 1] = rdev->wiphy.extended_capabilities_len;
  406. memcpy(buf + offs + 2,
  407. rdev->wiphy.extended_capabilities,
  408. rdev->wiphy.extended_capabilities_len);
  409. *out_ies = buf;
  410. *out_ies_len = ies_len + rdev->wiphy.extended_capabilities_len + 2;
  411. return 0;
  412. }
  413. static int cfg80211_sme_connect(struct wireless_dev *wdev,
  414. struct cfg80211_connect_params *connect,
  415. const u8 *prev_bssid)
  416. {
  417. struct cfg80211_registered_device *rdev = wiphy_to_rdev(wdev->wiphy);
  418. struct cfg80211_bss *bss;
  419. int err;
  420. if (!rdev->ops->auth || !rdev->ops->assoc)
  421. return -EOPNOTSUPP;
  422. if (wdev->current_bss) {
  423. if (!prev_bssid)
  424. return -EALREADY;
  425. if (prev_bssid &&
  426. !ether_addr_equal(prev_bssid, wdev->current_bss->pub.bssid))
  427. return -ENOTCONN;
  428. cfg80211_unhold_bss(wdev->current_bss);
  429. cfg80211_put_bss(wdev->wiphy, &wdev->current_bss->pub);
  430. wdev->current_bss = NULL;
  431. cfg80211_sme_free(wdev);
  432. }
  433. if (WARN_ON(wdev->conn))
  434. return -EINPROGRESS;
  435. wdev->conn = kzalloc(sizeof(*wdev->conn), GFP_KERNEL);
  436. if (!wdev->conn)
  437. return -ENOMEM;
  438. /*
  439. * Copy all parameters, and treat explicitly IEs, BSSID, SSID.
  440. */
  441. memcpy(&wdev->conn->params, connect, sizeof(*connect));
  442. if (connect->bssid) {
  443. wdev->conn->params.bssid = wdev->conn->bssid;
  444. memcpy(wdev->conn->bssid, connect->bssid, ETH_ALEN);
  445. }
  446. if (cfg80211_sme_get_conn_ies(wdev, connect->ie, connect->ie_len,
  447. &wdev->conn->ie,
  448. &wdev->conn->params.ie_len)) {
  449. kfree(wdev->conn);
  450. wdev->conn = NULL;
  451. return -ENOMEM;
  452. }
  453. wdev->conn->params.ie = wdev->conn->ie;
  454. if (connect->auth_type == NL80211_AUTHTYPE_AUTOMATIC) {
  455. wdev->conn->auto_auth = true;
  456. /* start with open system ... should mostly work */
  457. wdev->conn->params.auth_type =
  458. NL80211_AUTHTYPE_OPEN_SYSTEM;
  459. } else {
  460. wdev->conn->auto_auth = false;
  461. }
  462. wdev->conn->params.ssid = wdev->ssid;
  463. wdev->conn->params.ssid_len = wdev->ssid_len;
  464. /* see if we have the bss already */
  465. bss = cfg80211_get_conn_bss(wdev);
  466. if (prev_bssid) {
  467. memcpy(wdev->conn->prev_bssid, prev_bssid, ETH_ALEN);
  468. wdev->conn->prev_bssid_valid = true;
  469. }
  470. /* we're good if we have a matching bss struct */
  471. if (bss) {
  472. err = cfg80211_conn_do_work(wdev);
  473. cfg80211_put_bss(wdev->wiphy, bss);
  474. } else {
  475. /* otherwise we'll need to scan for the AP first */
  476. err = cfg80211_conn_scan(wdev);
  477. /*
  478. * If we can't scan right now, then we need to scan again
  479. * after the current scan finished, since the parameters
  480. * changed (unless we find a good AP anyway).
  481. */
  482. if (err == -EBUSY) {
  483. err = 0;
  484. wdev->conn->state = CFG80211_CONN_SCAN_AGAIN;
  485. }
  486. }
  487. if (err)
  488. cfg80211_sme_free(wdev);
  489. return err;
  490. }
  491. static int cfg80211_sme_disconnect(struct wireless_dev *wdev, u16 reason)
  492. {
  493. struct cfg80211_registered_device *rdev = wiphy_to_rdev(wdev->wiphy);
  494. int err;
  495. if (!wdev->conn)
  496. return 0;
  497. if (!rdev->ops->deauth)
  498. return -EOPNOTSUPP;
  499. if (wdev->conn->state == CFG80211_CONN_SCANNING ||
  500. wdev->conn->state == CFG80211_CONN_SCAN_AGAIN) {
  501. err = 0;
  502. goto out;
  503. }
  504. /* wdev->conn->params.bssid must be set if > SCANNING */
  505. err = cfg80211_mlme_deauth(rdev, wdev->netdev,
  506. wdev->conn->params.bssid,
  507. NULL, 0, reason, false);
  508. out:
  509. cfg80211_sme_free(wdev);
  510. return err;
  511. }
  512. /*
  513. * code shared for in-device and software SME
  514. */
  515. static bool cfg80211_is_all_idle(void)
  516. {
  517. struct cfg80211_registered_device *rdev;
  518. struct wireless_dev *wdev;
  519. bool is_all_idle = true;
  520. /*
  521. * All devices must be idle as otherwise if you are actively
  522. * scanning some new beacon hints could be learned and would
  523. * count as new regulatory hints.
  524. */
  525. list_for_each_entry(rdev, &cfg80211_rdev_list, list) {
  526. list_for_each_entry(wdev, &rdev->wiphy.wdev_list, list) {
  527. wdev_lock(wdev);
  528. if (wdev->conn || wdev->current_bss)
  529. is_all_idle = false;
  530. wdev_unlock(wdev);
  531. }
  532. }
  533. return is_all_idle;
  534. }
  535. static void disconnect_work(struct work_struct *work)
  536. {
  537. rtnl_lock();
  538. if (cfg80211_is_all_idle())
  539. regulatory_hint_disconnect();
  540. rtnl_unlock();
  541. }
  542. static DECLARE_WORK(cfg80211_disconnect_work, disconnect_work);
  543. /*
  544. * API calls for drivers implementing connect/disconnect and
  545. * SME event handling
  546. */
  547. /* This method must consume bss one way or another */
  548. void __cfg80211_connect_result(struct net_device *dev, const u8 *bssid,
  549. const u8 *req_ie, size_t req_ie_len,
  550. const u8 *resp_ie, size_t resp_ie_len,
  551. int status, bool wextev,
  552. struct cfg80211_bss *bss)
  553. {
  554. struct wireless_dev *wdev = dev->ieee80211_ptr;
  555. const u8 *country_ie;
  556. #ifdef CONFIG_CFG80211_WEXT
  557. union iwreq_data wrqu;
  558. #endif
  559. ASSERT_WDEV_LOCK(wdev);
  560. if (WARN_ON(wdev->iftype != NL80211_IFTYPE_STATION &&
  561. wdev->iftype != NL80211_IFTYPE_P2P_CLIENT)) {
  562. cfg80211_put_bss(wdev->wiphy, bss);
  563. return;
  564. }
  565. nl80211_send_connect_result(wiphy_to_rdev(wdev->wiphy), dev,
  566. bssid, req_ie, req_ie_len,
  567. resp_ie, resp_ie_len,
  568. status, GFP_KERNEL);
  569. #ifdef CONFIG_CFG80211_WEXT
  570. if (wextev) {
  571. if (req_ie && status == WLAN_STATUS_SUCCESS) {
  572. memset(&wrqu, 0, sizeof(wrqu));
  573. wrqu.data.length = req_ie_len;
  574. wireless_send_event(dev, IWEVASSOCREQIE, &wrqu, req_ie);
  575. }
  576. if (resp_ie && status == WLAN_STATUS_SUCCESS) {
  577. memset(&wrqu, 0, sizeof(wrqu));
  578. wrqu.data.length = resp_ie_len;
  579. wireless_send_event(dev, IWEVASSOCRESPIE, &wrqu, resp_ie);
  580. }
  581. memset(&wrqu, 0, sizeof(wrqu));
  582. wrqu.ap_addr.sa_family = ARPHRD_ETHER;
  583. if (bssid && status == WLAN_STATUS_SUCCESS) {
  584. memcpy(wrqu.ap_addr.sa_data, bssid, ETH_ALEN);
  585. memcpy(wdev->wext.prev_bssid, bssid, ETH_ALEN);
  586. wdev->wext.prev_bssid_valid = true;
  587. }
  588. wireless_send_event(dev, SIOCGIWAP, &wrqu, NULL);
  589. }
  590. #endif
  591. if (!bss && (status == WLAN_STATUS_SUCCESS)) {
  592. WARN_ON_ONCE(!wiphy_to_rdev(wdev->wiphy)->ops->connect);
  593. bss = cfg80211_get_bss(wdev->wiphy, NULL, bssid,
  594. wdev->ssid, wdev->ssid_len,
  595. wdev->conn_bss_type,
  596. IEEE80211_PRIVACY_ANY);
  597. if (bss)
  598. cfg80211_hold_bss(bss_from_pub(bss));
  599. }
  600. if (wdev->current_bss) {
  601. cfg80211_unhold_bss(wdev->current_bss);
  602. cfg80211_put_bss(wdev->wiphy, &wdev->current_bss->pub);
  603. wdev->current_bss = NULL;
  604. }
  605. if (status != WLAN_STATUS_SUCCESS) {
  606. kzfree(wdev->connect_keys);
  607. wdev->connect_keys = NULL;
  608. wdev->ssid_len = 0;
  609. if (bss) {
  610. cfg80211_unhold_bss(bss_from_pub(bss));
  611. cfg80211_put_bss(wdev->wiphy, bss);
  612. }
  613. cfg80211_sme_free(wdev);
  614. return;
  615. }
  616. if (WARN_ON(!bss))
  617. return;
  618. wdev->current_bss = bss_from_pub(bss);
  619. cfg80211_upload_connect_keys(wdev);
  620. rcu_read_lock();
  621. country_ie = ieee80211_bss_get_ie(bss, WLAN_EID_COUNTRY);
  622. if (!country_ie) {
  623. rcu_read_unlock();
  624. return;
  625. }
  626. country_ie = kmemdup(country_ie, 2 + country_ie[1], GFP_ATOMIC);
  627. rcu_read_unlock();
  628. if (!country_ie)
  629. return;
  630. /*
  631. * ieee80211_bss_get_ie() ensures we can access:
  632. * - country_ie + 2, the start of the country ie data, and
  633. * - and country_ie[1] which is the IE length
  634. */
  635. regulatory_hint_country_ie(wdev->wiphy, bss->channel->band,
  636. country_ie + 2, country_ie[1]);
  637. kfree(country_ie);
  638. }
  639. /* Consumes bss object one way or another */
  640. void cfg80211_connect_bss(struct net_device *dev, const u8 *bssid,
  641. struct cfg80211_bss *bss, const u8 *req_ie,
  642. size_t req_ie_len, const u8 *resp_ie,
  643. size_t resp_ie_len, int status, gfp_t gfp)
  644. {
  645. struct wireless_dev *wdev = dev->ieee80211_ptr;
  646. struct cfg80211_registered_device *rdev = wiphy_to_rdev(wdev->wiphy);
  647. struct cfg80211_event *ev;
  648. unsigned long flags;
  649. if (bss) {
  650. /* Make sure the bss entry provided by the driver is valid. */
  651. struct cfg80211_internal_bss *ibss = bss_from_pub(bss);
  652. if (WARN_ON(list_empty(&ibss->list))) {
  653. cfg80211_put_bss(wdev->wiphy, bss);
  654. return;
  655. }
  656. }
  657. ev = kzalloc(sizeof(*ev) + req_ie_len + resp_ie_len, gfp);
  658. if (!ev) {
  659. cfg80211_put_bss(wdev->wiphy, bss);
  660. return;
  661. }
  662. ev->type = EVENT_CONNECT_RESULT;
  663. if (bssid)
  664. memcpy(ev->cr.bssid, bssid, ETH_ALEN);
  665. if (req_ie_len) {
  666. ev->cr.req_ie = ((u8 *)ev) + sizeof(*ev);
  667. ev->cr.req_ie_len = req_ie_len;
  668. memcpy((void *)ev->cr.req_ie, req_ie, req_ie_len);
  669. }
  670. if (resp_ie_len) {
  671. ev->cr.resp_ie = ((u8 *)ev) + sizeof(*ev) + req_ie_len;
  672. ev->cr.resp_ie_len = resp_ie_len;
  673. memcpy((void *)ev->cr.resp_ie, resp_ie, resp_ie_len);
  674. }
  675. if (bss)
  676. cfg80211_hold_bss(bss_from_pub(bss));
  677. ev->cr.bss = bss;
  678. ev->cr.status = status;
  679. spin_lock_irqsave(&wdev->event_lock, flags);
  680. list_add_tail(&ev->list, &wdev->event_list);
  681. spin_unlock_irqrestore(&wdev->event_lock, flags);
  682. queue_work(cfg80211_wq, &rdev->event_work);
  683. }
  684. EXPORT_SYMBOL(cfg80211_connect_bss);
  685. /* Consumes bss object one way or another */
  686. void __cfg80211_roamed(struct wireless_dev *wdev,
  687. struct cfg80211_bss *bss,
  688. const u8 *req_ie, size_t req_ie_len,
  689. const u8 *resp_ie, size_t resp_ie_len)
  690. {
  691. #ifdef CONFIG_CFG80211_WEXT
  692. union iwreq_data wrqu;
  693. #endif
  694. ASSERT_WDEV_LOCK(wdev);
  695. if (WARN_ON(wdev->iftype != NL80211_IFTYPE_STATION &&
  696. wdev->iftype != NL80211_IFTYPE_P2P_CLIENT))
  697. goto out;
  698. if (WARN_ON(!wdev->current_bss))
  699. goto out;
  700. cfg80211_unhold_bss(wdev->current_bss);
  701. cfg80211_put_bss(wdev->wiphy, &wdev->current_bss->pub);
  702. wdev->current_bss = NULL;
  703. cfg80211_hold_bss(bss_from_pub(bss));
  704. wdev->current_bss = bss_from_pub(bss);
  705. nl80211_send_roamed(wiphy_to_rdev(wdev->wiphy),
  706. wdev->netdev, bss->bssid,
  707. req_ie, req_ie_len, resp_ie, resp_ie_len,
  708. GFP_KERNEL);
  709. #ifdef CONFIG_CFG80211_WEXT
  710. if (req_ie) {
  711. memset(&wrqu, 0, sizeof(wrqu));
  712. wrqu.data.length = req_ie_len;
  713. wireless_send_event(wdev->netdev, IWEVASSOCREQIE,
  714. &wrqu, req_ie);
  715. }
  716. if (resp_ie) {
  717. memset(&wrqu, 0, sizeof(wrqu));
  718. wrqu.data.length = resp_ie_len;
  719. wireless_send_event(wdev->netdev, IWEVASSOCRESPIE,
  720. &wrqu, resp_ie);
  721. }
  722. memset(&wrqu, 0, sizeof(wrqu));
  723. wrqu.ap_addr.sa_family = ARPHRD_ETHER;
  724. memcpy(wrqu.ap_addr.sa_data, bss->bssid, ETH_ALEN);
  725. memcpy(wdev->wext.prev_bssid, bss->bssid, ETH_ALEN);
  726. wdev->wext.prev_bssid_valid = true;
  727. wireless_send_event(wdev->netdev, SIOCGIWAP, &wrqu, NULL);
  728. #endif
  729. return;
  730. out:
  731. cfg80211_put_bss(wdev->wiphy, bss);
  732. }
  733. void cfg80211_roamed(struct net_device *dev,
  734. struct ieee80211_channel *channel,
  735. const u8 *bssid,
  736. const u8 *req_ie, size_t req_ie_len,
  737. const u8 *resp_ie, size_t resp_ie_len, gfp_t gfp)
  738. {
  739. struct wireless_dev *wdev = dev->ieee80211_ptr;
  740. struct cfg80211_bss *bss;
  741. bss = cfg80211_get_bss(wdev->wiphy, channel, bssid, wdev->ssid,
  742. wdev->ssid_len,
  743. wdev->conn_bss_type, IEEE80211_PRIVACY_ANY);
  744. if (WARN_ON(!bss))
  745. return;
  746. cfg80211_roamed_bss(dev, bss, req_ie, req_ie_len, resp_ie,
  747. resp_ie_len, gfp);
  748. }
  749. EXPORT_SYMBOL(cfg80211_roamed);
  750. /* Consumes bss object one way or another */
  751. void cfg80211_roamed_bss(struct net_device *dev,
  752. struct cfg80211_bss *bss, const u8 *req_ie,
  753. size_t req_ie_len, const u8 *resp_ie,
  754. size_t resp_ie_len, gfp_t gfp)
  755. {
  756. struct wireless_dev *wdev = dev->ieee80211_ptr;
  757. struct cfg80211_registered_device *rdev = wiphy_to_rdev(wdev->wiphy);
  758. struct cfg80211_event *ev;
  759. unsigned long flags;
  760. if (WARN_ON(!bss))
  761. return;
  762. ev = kzalloc(sizeof(*ev) + req_ie_len + resp_ie_len, gfp);
  763. if (!ev) {
  764. cfg80211_put_bss(wdev->wiphy, bss);
  765. return;
  766. }
  767. ev->type = EVENT_ROAMED;
  768. ev->rm.req_ie = ((u8 *)ev) + sizeof(*ev);
  769. ev->rm.req_ie_len = req_ie_len;
  770. memcpy((void *)ev->rm.req_ie, req_ie, req_ie_len);
  771. ev->rm.resp_ie = ((u8 *)ev) + sizeof(*ev) + req_ie_len;
  772. ev->rm.resp_ie_len = resp_ie_len;
  773. memcpy((void *)ev->rm.resp_ie, resp_ie, resp_ie_len);
  774. ev->rm.bss = bss;
  775. spin_lock_irqsave(&wdev->event_lock, flags);
  776. list_add_tail(&ev->list, &wdev->event_list);
  777. spin_unlock_irqrestore(&wdev->event_lock, flags);
  778. queue_work(cfg80211_wq, &rdev->event_work);
  779. }
  780. EXPORT_SYMBOL(cfg80211_roamed_bss);
  781. void __cfg80211_disconnected(struct net_device *dev, const u8 *ie,
  782. size_t ie_len, u16 reason, bool from_ap)
  783. {
  784. struct wireless_dev *wdev = dev->ieee80211_ptr;
  785. struct cfg80211_registered_device *rdev = wiphy_to_rdev(wdev->wiphy);
  786. int i;
  787. #ifdef CONFIG_CFG80211_WEXT
  788. union iwreq_data wrqu;
  789. #endif
  790. ASSERT_WDEV_LOCK(wdev);
  791. if (WARN_ON(wdev->iftype != NL80211_IFTYPE_STATION &&
  792. wdev->iftype != NL80211_IFTYPE_P2P_CLIENT))
  793. return;
  794. if (wdev->current_bss) {
  795. cfg80211_unhold_bss(wdev->current_bss);
  796. cfg80211_put_bss(wdev->wiphy, &wdev->current_bss->pub);
  797. }
  798. wdev->current_bss = NULL;
  799. wdev->ssid_len = 0;
  800. nl80211_send_disconnected(rdev, dev, reason, ie, ie_len, from_ap);
  801. /* stop critical protocol if supported */
  802. if (rdev->ops->crit_proto_stop && rdev->crit_proto_nlportid) {
  803. rdev->crit_proto_nlportid = 0;
  804. rdev_crit_proto_stop(rdev, wdev);
  805. }
  806. /*
  807. * Delete all the keys ... pairwise keys can't really
  808. * exist any more anyway, but default keys might.
  809. */
  810. if (rdev->ops->del_key)
  811. for (i = 0; i < 6; i++)
  812. rdev_del_key(rdev, dev, i, false, NULL);
  813. rdev_set_qos_map(rdev, dev, NULL);
  814. #ifdef CONFIG_CFG80211_WEXT
  815. memset(&wrqu, 0, sizeof(wrqu));
  816. wrqu.ap_addr.sa_family = ARPHRD_ETHER;
  817. wireless_send_event(dev, SIOCGIWAP, &wrqu, NULL);
  818. wdev->wext.connect.ssid_len = 0;
  819. #endif
  820. schedule_work(&cfg80211_disconnect_work);
  821. }
  822. void cfg80211_disconnected(struct net_device *dev, u16 reason,
  823. const u8 *ie, size_t ie_len,
  824. bool locally_generated, gfp_t gfp)
  825. {
  826. struct wireless_dev *wdev = dev->ieee80211_ptr;
  827. struct cfg80211_registered_device *rdev = wiphy_to_rdev(wdev->wiphy);
  828. struct cfg80211_event *ev;
  829. unsigned long flags;
  830. ev = kzalloc(sizeof(*ev) + ie_len, gfp);
  831. if (!ev)
  832. return;
  833. ev->type = EVENT_DISCONNECTED;
  834. ev->dc.ie = ((u8 *)ev) + sizeof(*ev);
  835. ev->dc.ie_len = ie_len;
  836. memcpy((void *)ev->dc.ie, ie, ie_len);
  837. ev->dc.reason = reason;
  838. ev->dc.locally_generated = locally_generated;
  839. spin_lock_irqsave(&wdev->event_lock, flags);
  840. list_add_tail(&ev->list, &wdev->event_list);
  841. spin_unlock_irqrestore(&wdev->event_lock, flags);
  842. queue_work(cfg80211_wq, &rdev->event_work);
  843. }
  844. EXPORT_SYMBOL(cfg80211_disconnected);
  845. /*
  846. * API calls for nl80211/wext compatibility code
  847. */
  848. int cfg80211_connect(struct cfg80211_registered_device *rdev,
  849. struct net_device *dev,
  850. struct cfg80211_connect_params *connect,
  851. struct cfg80211_cached_keys *connkeys,
  852. const u8 *prev_bssid)
  853. {
  854. struct wireless_dev *wdev = dev->ieee80211_ptr;
  855. int err;
  856. ASSERT_WDEV_LOCK(wdev);
  857. if (WARN_ON(wdev->connect_keys)) {
  858. kzfree(wdev->connect_keys);
  859. wdev->connect_keys = NULL;
  860. }
  861. cfg80211_oper_and_ht_capa(&connect->ht_capa_mask,
  862. rdev->wiphy.ht_capa_mod_mask);
  863. if (connkeys && connkeys->def >= 0) {
  864. int idx;
  865. u32 cipher;
  866. idx = connkeys->def;
  867. cipher = connkeys->params[idx].cipher;
  868. /* If given a WEP key we may need it for shared key auth */
  869. if (cipher == WLAN_CIPHER_SUITE_WEP40 ||
  870. cipher == WLAN_CIPHER_SUITE_WEP104) {
  871. connect->key_idx = idx;
  872. connect->key = connkeys->params[idx].key;
  873. connect->key_len = connkeys->params[idx].key_len;
  874. /*
  875. * If ciphers are not set (e.g. when going through
  876. * iwconfig), we have to set them appropriately here.
  877. */
  878. if (connect->crypto.cipher_group == 0)
  879. connect->crypto.cipher_group = cipher;
  880. if (connect->crypto.n_ciphers_pairwise == 0) {
  881. connect->crypto.n_ciphers_pairwise = 1;
  882. connect->crypto.ciphers_pairwise[0] = cipher;
  883. }
  884. }
  885. }
  886. wdev->connect_keys = connkeys;
  887. memcpy(wdev->ssid, connect->ssid, connect->ssid_len);
  888. wdev->ssid_len = connect->ssid_len;
  889. wdev->conn_bss_type = connect->pbss ? IEEE80211_BSS_TYPE_PBSS :
  890. IEEE80211_BSS_TYPE_ESS;
  891. if (!rdev->ops->connect)
  892. err = cfg80211_sme_connect(wdev, connect, prev_bssid);
  893. else
  894. err = rdev_connect(rdev, dev, connect);
  895. if (err) {
  896. wdev->connect_keys = NULL;
  897. wdev->ssid_len = 0;
  898. return err;
  899. }
  900. return 0;
  901. }
  902. int cfg80211_disconnect(struct cfg80211_registered_device *rdev,
  903. struct net_device *dev, u16 reason, bool wextev)
  904. {
  905. struct wireless_dev *wdev = dev->ieee80211_ptr;
  906. int err = 0;
  907. ASSERT_WDEV_LOCK(wdev);
  908. kzfree(wdev->connect_keys);
  909. wdev->connect_keys = NULL;
  910. if (wdev->conn)
  911. err = cfg80211_sme_disconnect(wdev, reason);
  912. else if (!rdev->ops->disconnect)
  913. cfg80211_mlme_down(rdev, dev);
  914. else if (wdev->current_bss)
  915. err = rdev_disconnect(rdev, dev, reason);
  916. return err;
  917. }