mlme.c 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629
  1. /*
  2. * cfg80211 MLME SAP interface
  3. *
  4. * Copyright (c) 2009, Jouni Malinen <j@w1.fi>
  5. */
  6. #include <linux/kernel.h>
  7. #include <linux/module.h>
  8. #include <linux/netdevice.h>
  9. #include <linux/nl80211.h>
  10. #include <linux/wireless.h>
  11. #include <net/cfg80211.h>
  12. #include <net/iw_handler.h>
  13. #include "core.h"
  14. #include "nl80211.h"
  15. void cfg80211_send_rx_auth(struct net_device *dev, const u8 *buf, size_t len)
  16. {
  17. struct wireless_dev *wdev = dev->ieee80211_ptr;
  18. struct wiphy *wiphy = wdev->wiphy;
  19. struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
  20. struct ieee80211_mgmt *mgmt = (struct ieee80211_mgmt *)buf;
  21. u8 *bssid = mgmt->bssid;
  22. int i;
  23. u16 status = le16_to_cpu(mgmt->u.auth.status_code);
  24. bool done = false;
  25. wdev_lock(wdev);
  26. for (i = 0; i < MAX_AUTH_BSSES; i++) {
  27. if (wdev->authtry_bsses[i] &&
  28. memcmp(wdev->authtry_bsses[i]->pub.bssid, bssid,
  29. ETH_ALEN) == 0) {
  30. if (status == WLAN_STATUS_SUCCESS) {
  31. wdev->auth_bsses[i] = wdev->authtry_bsses[i];
  32. } else {
  33. cfg80211_unhold_bss(wdev->authtry_bsses[i]);
  34. cfg80211_put_bss(&wdev->authtry_bsses[i]->pub);
  35. }
  36. wdev->authtry_bsses[i] = NULL;
  37. done = true;
  38. break;
  39. }
  40. }
  41. WARN_ON(!done);
  42. nl80211_send_rx_auth(rdev, dev, buf, len, GFP_KERNEL);
  43. cfg80211_sme_rx_auth(dev, buf, len);
  44. wdev_unlock(wdev);
  45. }
  46. EXPORT_SYMBOL(cfg80211_send_rx_auth);
  47. void cfg80211_send_rx_assoc(struct net_device *dev, const u8 *buf, size_t len)
  48. {
  49. u16 status_code;
  50. struct wireless_dev *wdev = dev->ieee80211_ptr;
  51. struct wiphy *wiphy = wdev->wiphy;
  52. struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
  53. struct ieee80211_mgmt *mgmt = (struct ieee80211_mgmt *)buf;
  54. u8 *ie = mgmt->u.assoc_resp.variable;
  55. int i, ieoffs = offsetof(struct ieee80211_mgmt, u.assoc_resp.variable);
  56. bool done;
  57. wdev_lock(wdev);
  58. status_code = le16_to_cpu(mgmt->u.assoc_resp.status_code);
  59. nl80211_send_rx_assoc(rdev, dev, buf, len, GFP_KERNEL);
  60. __cfg80211_connect_result(dev, mgmt->bssid, NULL, 0, ie, len - ieoffs,
  61. status_code,
  62. status_code == WLAN_STATUS_SUCCESS);
  63. if (status_code == WLAN_STATUS_SUCCESS) {
  64. for (i = 0; wdev->current_bss && i < MAX_AUTH_BSSES; i++) {
  65. if (wdev->auth_bsses[i] == wdev->current_bss) {
  66. cfg80211_unhold_bss(wdev->auth_bsses[i]);
  67. cfg80211_put_bss(&wdev->auth_bsses[i]->pub);
  68. wdev->auth_bsses[i] = NULL;
  69. done = true;
  70. break;
  71. }
  72. }
  73. WARN_ON(!done);
  74. }
  75. wdev_unlock(wdev);
  76. }
  77. EXPORT_SYMBOL(cfg80211_send_rx_assoc);
  78. static void __cfg80211_send_deauth(struct net_device *dev,
  79. const u8 *buf, size_t len)
  80. {
  81. struct wireless_dev *wdev = dev->ieee80211_ptr;
  82. struct wiphy *wiphy = wdev->wiphy;
  83. struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
  84. struct ieee80211_mgmt *mgmt = (struct ieee80211_mgmt *)buf;
  85. const u8 *bssid = mgmt->bssid;
  86. int i;
  87. bool done = false;
  88. ASSERT_WDEV_LOCK(wdev);
  89. nl80211_send_deauth(rdev, dev, buf, len, GFP_KERNEL);
  90. if (wdev->current_bss &&
  91. memcmp(wdev->current_bss->pub.bssid, bssid, ETH_ALEN) == 0) {
  92. done = true;
  93. cfg80211_unhold_bss(wdev->current_bss);
  94. cfg80211_put_bss(&wdev->current_bss->pub);
  95. wdev->current_bss = NULL;
  96. } else for (i = 0; i < MAX_AUTH_BSSES; i++) {
  97. if (wdev->auth_bsses[i] &&
  98. memcmp(wdev->auth_bsses[i]->pub.bssid, bssid, ETH_ALEN) == 0) {
  99. cfg80211_unhold_bss(wdev->auth_bsses[i]);
  100. cfg80211_put_bss(&wdev->auth_bsses[i]->pub);
  101. wdev->auth_bsses[i] = NULL;
  102. done = true;
  103. break;
  104. }
  105. if (wdev->authtry_bsses[i] &&
  106. memcmp(wdev->authtry_bsses[i]->pub.bssid, bssid, ETH_ALEN) == 0) {
  107. cfg80211_unhold_bss(wdev->authtry_bsses[i]);
  108. cfg80211_put_bss(&wdev->authtry_bsses[i]->pub);
  109. wdev->authtry_bsses[i] = NULL;
  110. done = true;
  111. break;
  112. }
  113. }
  114. WARN_ON(!done);
  115. if (wdev->sme_state == CFG80211_SME_CONNECTED) {
  116. u16 reason_code;
  117. bool from_ap;
  118. reason_code = le16_to_cpu(mgmt->u.deauth.reason_code);
  119. from_ap = memcmp(mgmt->da, dev->dev_addr, ETH_ALEN) == 0;
  120. __cfg80211_disconnected(dev, NULL, 0, reason_code, from_ap);
  121. } else if (wdev->sme_state == CFG80211_SME_CONNECTING) {
  122. __cfg80211_connect_result(dev, mgmt->bssid, NULL, 0, NULL, 0,
  123. WLAN_STATUS_UNSPECIFIED_FAILURE,
  124. false);
  125. }
  126. }
  127. void cfg80211_send_deauth(struct net_device *dev, const u8 *buf, size_t len,
  128. void *cookie)
  129. {
  130. struct wireless_dev *wdev = dev->ieee80211_ptr;
  131. BUG_ON(cookie && wdev != cookie);
  132. if (cookie) {
  133. /* called within callback */
  134. __cfg80211_send_deauth(dev, buf, len);
  135. } else {
  136. wdev_lock(wdev);
  137. __cfg80211_send_deauth(dev, buf, len);
  138. wdev_unlock(wdev);
  139. }
  140. }
  141. EXPORT_SYMBOL(cfg80211_send_deauth);
  142. static void __cfg80211_send_disassoc(struct net_device *dev,
  143. const u8 *buf, size_t len)
  144. {
  145. struct wireless_dev *wdev = dev->ieee80211_ptr;
  146. struct wiphy *wiphy = wdev->wiphy;
  147. struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
  148. struct ieee80211_mgmt *mgmt = (struct ieee80211_mgmt *)buf;
  149. const u8 *bssid = mgmt->bssid;
  150. int i;
  151. u16 reason_code;
  152. bool from_ap;
  153. bool done = false;
  154. ASSERT_WDEV_LOCK(wdev);
  155. nl80211_send_disassoc(rdev, dev, buf, len, GFP_KERNEL);
  156. if (wdev->sme_state != CFG80211_SME_CONNECTED)
  157. return;
  158. if (wdev->current_bss &&
  159. memcmp(wdev->current_bss, bssid, ETH_ALEN) == 0) {
  160. for (i = 0; i < MAX_AUTH_BSSES; i++) {
  161. if (wdev->authtry_bsses[i] || wdev->auth_bsses[i])
  162. continue;
  163. wdev->auth_bsses[i] = wdev->current_bss;
  164. wdev->current_bss = NULL;
  165. done = true;
  166. cfg80211_sme_disassoc(dev, i);
  167. break;
  168. }
  169. WARN_ON(!done);
  170. } else
  171. WARN_ON(1);
  172. reason_code = le16_to_cpu(mgmt->u.disassoc.reason_code);
  173. from_ap = memcmp(mgmt->da, dev->dev_addr, ETH_ALEN) == 0;
  174. __cfg80211_disconnected(dev, NULL, 0, reason_code, from_ap);
  175. }
  176. void cfg80211_send_disassoc(struct net_device *dev, const u8 *buf, size_t len,
  177. void *cookie)
  178. {
  179. struct wireless_dev *wdev = dev->ieee80211_ptr;
  180. BUG_ON(cookie && wdev != cookie);
  181. if (cookie) {
  182. /* called within callback */
  183. __cfg80211_send_disassoc(dev, buf, len);
  184. } else {
  185. wdev_lock(wdev);
  186. __cfg80211_send_disassoc(dev, buf, len);
  187. wdev_unlock(wdev);
  188. }
  189. }
  190. EXPORT_SYMBOL(cfg80211_send_disassoc);
  191. void cfg80211_send_auth_timeout(struct net_device *dev, const u8 *addr)
  192. {
  193. struct wireless_dev *wdev = dev->ieee80211_ptr;
  194. struct wiphy *wiphy = wdev->wiphy;
  195. struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
  196. int i;
  197. bool done = false;
  198. wdev_lock(wdev);
  199. nl80211_send_auth_timeout(rdev, dev, addr, GFP_KERNEL);
  200. if (wdev->sme_state == CFG80211_SME_CONNECTING)
  201. __cfg80211_connect_result(dev, addr, NULL, 0, NULL, 0,
  202. WLAN_STATUS_UNSPECIFIED_FAILURE,
  203. false);
  204. for (i = 0; addr && i < MAX_AUTH_BSSES; i++) {
  205. if (wdev->authtry_bsses[i] &&
  206. memcmp(wdev->authtry_bsses[i]->pub.bssid,
  207. addr, ETH_ALEN) == 0) {
  208. cfg80211_unhold_bss(wdev->authtry_bsses[i]);
  209. cfg80211_put_bss(&wdev->authtry_bsses[i]->pub);
  210. wdev->authtry_bsses[i] = NULL;
  211. done = true;
  212. break;
  213. }
  214. }
  215. WARN_ON(!done);
  216. wdev_unlock(wdev);
  217. }
  218. EXPORT_SYMBOL(cfg80211_send_auth_timeout);
  219. void cfg80211_send_assoc_timeout(struct net_device *dev, const u8 *addr)
  220. {
  221. struct wireless_dev *wdev = dev->ieee80211_ptr;
  222. struct wiphy *wiphy = wdev->wiphy;
  223. struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
  224. int i;
  225. bool done = false;
  226. wdev_lock(wdev);
  227. nl80211_send_assoc_timeout(rdev, dev, addr, GFP_KERNEL);
  228. if (wdev->sme_state == CFG80211_SME_CONNECTING)
  229. __cfg80211_connect_result(dev, addr, NULL, 0, NULL, 0,
  230. WLAN_STATUS_UNSPECIFIED_FAILURE,
  231. false);
  232. for (i = 0; addr && i < MAX_AUTH_BSSES; i++) {
  233. if (wdev->auth_bsses[i] &&
  234. memcmp(wdev->auth_bsses[i]->pub.bssid,
  235. addr, ETH_ALEN) == 0) {
  236. cfg80211_unhold_bss(wdev->auth_bsses[i]);
  237. cfg80211_put_bss(&wdev->auth_bsses[i]->pub);
  238. wdev->auth_bsses[i] = NULL;
  239. done = true;
  240. break;
  241. }
  242. }
  243. WARN_ON(!done);
  244. wdev_unlock(wdev);
  245. }
  246. EXPORT_SYMBOL(cfg80211_send_assoc_timeout);
  247. void cfg80211_michael_mic_failure(struct net_device *dev, const u8 *addr,
  248. enum nl80211_key_type key_type, int key_id,
  249. const u8 *tsc, gfp_t gfp)
  250. {
  251. struct wiphy *wiphy = dev->ieee80211_ptr->wiphy;
  252. struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
  253. #ifdef CONFIG_WIRELESS_EXT
  254. union iwreq_data wrqu;
  255. char *buf = kmalloc(128, gfp);
  256. if (buf) {
  257. sprintf(buf, "MLME-MICHAELMICFAILURE.indication("
  258. "keyid=%d %scast addr=%pM)", key_id,
  259. key_type == NL80211_KEYTYPE_GROUP ? "broad" : "uni",
  260. addr);
  261. memset(&wrqu, 0, sizeof(wrqu));
  262. wrqu.data.length = strlen(buf);
  263. wireless_send_event(dev, IWEVCUSTOM, &wrqu, buf);
  264. kfree(buf);
  265. }
  266. #endif
  267. nl80211_michael_mic_failure(rdev, dev, addr, key_type, key_id, tsc, gfp);
  268. }
  269. EXPORT_SYMBOL(cfg80211_michael_mic_failure);
  270. /* some MLME handling for userspace SME */
  271. int __cfg80211_mlme_auth(struct cfg80211_registered_device *rdev,
  272. struct net_device *dev,
  273. struct ieee80211_channel *chan,
  274. enum nl80211_auth_type auth_type,
  275. const u8 *bssid,
  276. const u8 *ssid, int ssid_len,
  277. const u8 *ie, int ie_len,
  278. const u8 *key, int key_len, int key_idx)
  279. {
  280. struct wireless_dev *wdev = dev->ieee80211_ptr;
  281. struct cfg80211_auth_request req;
  282. struct cfg80211_internal_bss *bss;
  283. int i, err, slot = -1, nfree = 0;
  284. ASSERT_WDEV_LOCK(wdev);
  285. if (auth_type == NL80211_AUTHTYPE_SHARED_KEY)
  286. if (!key || !key_len || key_idx < 0 || key_idx > 4)
  287. return -EINVAL;
  288. if (wdev->current_bss &&
  289. memcmp(bssid, wdev->current_bss->pub.bssid, ETH_ALEN) == 0)
  290. return -EALREADY;
  291. for (i = 0; i < MAX_AUTH_BSSES; i++) {
  292. if (wdev->authtry_bsses[i] &&
  293. memcmp(bssid, wdev->authtry_bsses[i]->pub.bssid,
  294. ETH_ALEN) == 0)
  295. return -EALREADY;
  296. if (wdev->auth_bsses[i] &&
  297. memcmp(bssid, wdev->auth_bsses[i]->pub.bssid,
  298. ETH_ALEN) == 0)
  299. return -EALREADY;
  300. }
  301. memset(&req, 0, sizeof(req));
  302. req.ie = ie;
  303. req.ie_len = ie_len;
  304. req.auth_type = auth_type;
  305. req.bss = cfg80211_get_bss(&rdev->wiphy, chan, bssid, ssid, ssid_len,
  306. WLAN_CAPABILITY_ESS, WLAN_CAPABILITY_ESS);
  307. req.key = key;
  308. req.key_len = key_len;
  309. req.key_idx = key_idx;
  310. if (!req.bss)
  311. return -ENOENT;
  312. bss = bss_from_pub(req.bss);
  313. for (i = 0; i < MAX_AUTH_BSSES; i++) {
  314. if (!wdev->auth_bsses[i] && !wdev->authtry_bsses[i]) {
  315. slot = i;
  316. nfree++;
  317. }
  318. }
  319. /* we need one free slot for disassoc and one for this auth */
  320. if (nfree < 2) {
  321. err = -ENOSPC;
  322. goto out;
  323. }
  324. wdev->authtry_bsses[slot] = bss;
  325. cfg80211_hold_bss(bss);
  326. err = rdev->ops->auth(&rdev->wiphy, dev, &req);
  327. if (err) {
  328. wdev->authtry_bsses[slot] = NULL;
  329. cfg80211_unhold_bss(bss);
  330. }
  331. out:
  332. if (err)
  333. cfg80211_put_bss(req.bss);
  334. return err;
  335. }
  336. int cfg80211_mlme_auth(struct cfg80211_registered_device *rdev,
  337. struct net_device *dev, struct ieee80211_channel *chan,
  338. enum nl80211_auth_type auth_type, const u8 *bssid,
  339. const u8 *ssid, int ssid_len,
  340. const u8 *ie, int ie_len,
  341. const u8 *key, int key_len, int key_idx)
  342. {
  343. int err;
  344. wdev_lock(dev->ieee80211_ptr);
  345. err = __cfg80211_mlme_auth(rdev, dev, chan, auth_type, bssid,
  346. ssid, ssid_len, ie, ie_len,
  347. key, key_len, key_idx);
  348. wdev_unlock(dev->ieee80211_ptr);
  349. return err;
  350. }
  351. int __cfg80211_mlme_assoc(struct cfg80211_registered_device *rdev,
  352. struct net_device *dev,
  353. struct ieee80211_channel *chan,
  354. const u8 *bssid, const u8 *prev_bssid,
  355. const u8 *ssid, int ssid_len,
  356. const u8 *ie, int ie_len, bool use_mfp,
  357. struct cfg80211_crypto_settings *crypt)
  358. {
  359. struct wireless_dev *wdev = dev->ieee80211_ptr;
  360. struct cfg80211_assoc_request req;
  361. struct cfg80211_internal_bss *bss;
  362. int i, err, slot = -1;
  363. ASSERT_WDEV_LOCK(wdev);
  364. memset(&req, 0, sizeof(req));
  365. if (wdev->current_bss)
  366. return -EALREADY;
  367. req.ie = ie;
  368. req.ie_len = ie_len;
  369. memcpy(&req.crypto, crypt, sizeof(req.crypto));
  370. req.use_mfp = use_mfp;
  371. req.prev_bssid = prev_bssid;
  372. req.bss = cfg80211_get_bss(&rdev->wiphy, chan, bssid, ssid, ssid_len,
  373. WLAN_CAPABILITY_ESS, WLAN_CAPABILITY_ESS);
  374. if (!req.bss)
  375. return -ENOENT;
  376. bss = bss_from_pub(req.bss);
  377. for (i = 0; i < MAX_AUTH_BSSES; i++) {
  378. if (bss == wdev->auth_bsses[i]) {
  379. slot = i;
  380. break;
  381. }
  382. }
  383. if (slot < 0) {
  384. err = -ENOTCONN;
  385. goto out;
  386. }
  387. err = rdev->ops->assoc(&rdev->wiphy, dev, &req);
  388. out:
  389. /* still a reference in wdev->auth_bsses[slot] */
  390. cfg80211_put_bss(req.bss);
  391. return err;
  392. }
  393. int cfg80211_mlme_assoc(struct cfg80211_registered_device *rdev,
  394. struct net_device *dev,
  395. struct ieee80211_channel *chan,
  396. const u8 *bssid, const u8 *prev_bssid,
  397. const u8 *ssid, int ssid_len,
  398. const u8 *ie, int ie_len, bool use_mfp,
  399. struct cfg80211_crypto_settings *crypt)
  400. {
  401. struct wireless_dev *wdev = dev->ieee80211_ptr;
  402. int err;
  403. wdev_lock(wdev);
  404. err = __cfg80211_mlme_assoc(rdev, dev, chan, bssid, prev_bssid,
  405. ssid, ssid_len, ie, ie_len, use_mfp, crypt);
  406. wdev_unlock(wdev);
  407. return err;
  408. }
  409. int __cfg80211_mlme_deauth(struct cfg80211_registered_device *rdev,
  410. struct net_device *dev, const u8 *bssid,
  411. const u8 *ie, int ie_len, u16 reason)
  412. {
  413. struct wireless_dev *wdev = dev->ieee80211_ptr;
  414. struct cfg80211_deauth_request req;
  415. int i;
  416. ASSERT_WDEV_LOCK(wdev);
  417. memset(&req, 0, sizeof(req));
  418. req.reason_code = reason;
  419. req.ie = ie;
  420. req.ie_len = ie_len;
  421. if (wdev->current_bss &&
  422. memcmp(wdev->current_bss->pub.bssid, bssid, ETH_ALEN) == 0) {
  423. req.bss = &wdev->current_bss->pub;
  424. } else for (i = 0; i < MAX_AUTH_BSSES; i++) {
  425. if (wdev->auth_bsses[i] &&
  426. memcmp(bssid, wdev->auth_bsses[i]->pub.bssid, ETH_ALEN) == 0) {
  427. req.bss = &wdev->auth_bsses[i]->pub;
  428. break;
  429. }
  430. if (wdev->authtry_bsses[i] &&
  431. memcmp(bssid, wdev->authtry_bsses[i]->pub.bssid, ETH_ALEN) == 0) {
  432. req.bss = &wdev->authtry_bsses[i]->pub;
  433. break;
  434. }
  435. }
  436. if (!req.bss)
  437. return -ENOTCONN;
  438. return rdev->ops->deauth(&rdev->wiphy, dev, &req, wdev);
  439. }
  440. int cfg80211_mlme_deauth(struct cfg80211_registered_device *rdev,
  441. struct net_device *dev, const u8 *bssid,
  442. const u8 *ie, int ie_len, u16 reason)
  443. {
  444. struct wireless_dev *wdev = dev->ieee80211_ptr;
  445. int err;
  446. wdev_lock(wdev);
  447. err = __cfg80211_mlme_deauth(rdev, dev, bssid, ie, ie_len, reason);
  448. wdev_unlock(wdev);
  449. return err;
  450. }
  451. static int __cfg80211_mlme_disassoc(struct cfg80211_registered_device *rdev,
  452. struct net_device *dev, const u8 *bssid,
  453. const u8 *ie, int ie_len, u16 reason)
  454. {
  455. struct wireless_dev *wdev = dev->ieee80211_ptr;
  456. struct cfg80211_disassoc_request req;
  457. ASSERT_WDEV_LOCK(wdev);
  458. if (wdev->sme_state != CFG80211_SME_CONNECTED)
  459. return -ENOTCONN;
  460. if (WARN_ON(!wdev->current_bss))
  461. return -ENOTCONN;
  462. memset(&req, 0, sizeof(req));
  463. req.reason_code = reason;
  464. req.ie = ie;
  465. req.ie_len = ie_len;
  466. if (memcmp(wdev->current_bss->pub.bssid, bssid, ETH_ALEN) == 0)
  467. req.bss = &wdev->current_bss->pub;
  468. else
  469. return -ENOTCONN;
  470. return rdev->ops->disassoc(&rdev->wiphy, dev, &req, wdev);
  471. }
  472. int cfg80211_mlme_disassoc(struct cfg80211_registered_device *rdev,
  473. struct net_device *dev, const u8 *bssid,
  474. const u8 *ie, int ie_len, u16 reason)
  475. {
  476. struct wireless_dev *wdev = dev->ieee80211_ptr;
  477. int err;
  478. wdev_lock(wdev);
  479. err = __cfg80211_mlme_disassoc(rdev, dev, bssid, ie, ie_len, reason);
  480. wdev_unlock(wdev);
  481. return err;
  482. }
  483. void cfg80211_mlme_down(struct cfg80211_registered_device *rdev,
  484. struct net_device *dev)
  485. {
  486. struct wireless_dev *wdev = dev->ieee80211_ptr;
  487. struct cfg80211_deauth_request req;
  488. int i;
  489. ASSERT_WDEV_LOCK(wdev);
  490. if (!rdev->ops->deauth)
  491. return;
  492. memset(&req, 0, sizeof(req));
  493. req.reason_code = WLAN_REASON_DEAUTH_LEAVING;
  494. req.ie = NULL;
  495. req.ie_len = 0;
  496. if (wdev->current_bss) {
  497. req.bss = &wdev->current_bss->pub;
  498. rdev->ops->deauth(&rdev->wiphy, dev, &req, wdev);
  499. if (wdev->current_bss) {
  500. cfg80211_unhold_bss(wdev->current_bss);
  501. cfg80211_put_bss(&wdev->current_bss->pub);
  502. wdev->current_bss = NULL;
  503. }
  504. }
  505. for (i = 0; i < MAX_AUTH_BSSES; i++) {
  506. if (wdev->auth_bsses[i]) {
  507. req.bss = &wdev->auth_bsses[i]->pub;
  508. rdev->ops->deauth(&rdev->wiphy, dev, &req, wdev);
  509. if (wdev->auth_bsses[i]) {
  510. cfg80211_unhold_bss(wdev->auth_bsses[i]);
  511. cfg80211_put_bss(&wdev->auth_bsses[i]->pub);
  512. wdev->auth_bsses[i] = NULL;
  513. }
  514. }
  515. if (wdev->authtry_bsses[i]) {
  516. req.bss = &wdev->authtry_bsses[i]->pub;
  517. rdev->ops->deauth(&rdev->wiphy, dev, &req, wdev);
  518. if (wdev->authtry_bsses[i]) {
  519. cfg80211_unhold_bss(wdev->authtry_bsses[i]);
  520. cfg80211_put_bss(&wdev->authtry_bsses[i]->pub);
  521. wdev->authtry_bsses[i] = NULL;
  522. }
  523. }
  524. }
  525. }