mlme.c 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644
  1. /*
  2. * cfg80211 MLME SAP interface
  3. *
  4. * Copyright (c) 2009, Jouni Malinen <j@w1.fi>
  5. */
  6. #include <linux/kernel.h>
  7. #include <linux/module.h>
  8. #include <linux/netdevice.h>
  9. #include <linux/nl80211.h>
  10. #include <linux/wireless.h>
  11. #include <net/cfg80211.h>
  12. #include <net/iw_handler.h>
  13. #include "core.h"
  14. #include "nl80211.h"
  15. void cfg80211_send_rx_auth(struct net_device *dev, const u8 *buf, size_t len)
  16. {
  17. struct wireless_dev *wdev = dev->ieee80211_ptr;
  18. struct wiphy *wiphy = wdev->wiphy;
  19. struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
  20. struct ieee80211_mgmt *mgmt = (struct ieee80211_mgmt *)buf;
  21. u8 *bssid = mgmt->bssid;
  22. int i;
  23. u16 status = le16_to_cpu(mgmt->u.auth.status_code);
  24. bool done = false;
  25. wdev_lock(wdev);
  26. for (i = 0; i < MAX_AUTH_BSSES; i++) {
  27. if (wdev->authtry_bsses[i] &&
  28. memcmp(wdev->authtry_bsses[i]->pub.bssid, bssid,
  29. ETH_ALEN) == 0) {
  30. if (status == WLAN_STATUS_SUCCESS) {
  31. wdev->auth_bsses[i] = wdev->authtry_bsses[i];
  32. } else {
  33. cfg80211_unhold_bss(wdev->authtry_bsses[i]);
  34. cfg80211_put_bss(&wdev->authtry_bsses[i]->pub);
  35. }
  36. wdev->authtry_bsses[i] = NULL;
  37. done = true;
  38. break;
  39. }
  40. }
  41. WARN_ON(!done);
  42. nl80211_send_rx_auth(rdev, dev, buf, len, GFP_KERNEL);
  43. cfg80211_sme_rx_auth(dev, buf, len);
  44. wdev_unlock(wdev);
  45. }
  46. EXPORT_SYMBOL(cfg80211_send_rx_auth);
  47. void cfg80211_send_rx_assoc(struct net_device *dev, const u8 *buf, size_t len)
  48. {
  49. u16 status_code;
  50. struct wireless_dev *wdev = dev->ieee80211_ptr;
  51. struct wiphy *wiphy = wdev->wiphy;
  52. struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
  53. struct ieee80211_mgmt *mgmt = (struct ieee80211_mgmt *)buf;
  54. u8 *ie = mgmt->u.assoc_resp.variable;
  55. int i, ieoffs = offsetof(struct ieee80211_mgmt, u.assoc_resp.variable);
  56. struct cfg80211_internal_bss *bss = NULL;
  57. wdev_lock(wdev);
  58. status_code = le16_to_cpu(mgmt->u.assoc_resp.status_code);
  59. /*
  60. * This is a bit of a hack, we don't notify userspace of
  61. * a (re-)association reply if we tried to send a reassoc
  62. * and got a reject -- we only try again with an assoc
  63. * frame instead of reassoc.
  64. */
  65. if (status_code != WLAN_STATUS_SUCCESS && wdev->conn &&
  66. cfg80211_sme_failed_reassoc(wdev))
  67. goto out;
  68. nl80211_send_rx_assoc(rdev, dev, buf, len, GFP_KERNEL);
  69. if (status_code == WLAN_STATUS_SUCCESS) {
  70. for (i = 0; i < MAX_AUTH_BSSES; i++) {
  71. if (!wdev->auth_bsses[i])
  72. continue;
  73. if (memcmp(wdev->auth_bsses[i]->pub.bssid, mgmt->bssid,
  74. ETH_ALEN) == 0) {
  75. bss = wdev->auth_bsses[i];
  76. wdev->auth_bsses[i] = NULL;
  77. /* additional reference to drop hold */
  78. cfg80211_ref_bss(bss);
  79. break;
  80. }
  81. }
  82. WARN_ON(!bss);
  83. }
  84. if (!wdev->conn && wdev->sme_state == CFG80211_SME_IDLE) {
  85. /*
  86. * This is for the userspace SME, the CONNECTING
  87. * state will be changed to CONNECTED by
  88. * __cfg80211_connect_result() below.
  89. */
  90. wdev->sme_state = CFG80211_SME_CONNECTING;
  91. }
  92. /* this consumes one bss reference (unless bss is NULL) */
  93. __cfg80211_connect_result(dev, mgmt->bssid, NULL, 0, ie, len - ieoffs,
  94. status_code,
  95. status_code == WLAN_STATUS_SUCCESS,
  96. bss ? &bss->pub : NULL);
  97. /* drop hold now, and also reference acquired above */
  98. if (bss) {
  99. cfg80211_unhold_bss(bss);
  100. cfg80211_put_bss(&bss->pub);
  101. }
  102. out:
  103. wdev_unlock(wdev);
  104. }
  105. EXPORT_SYMBOL(cfg80211_send_rx_assoc);
  106. void __cfg80211_send_deauth(struct net_device *dev,
  107. const u8 *buf, size_t len)
  108. {
  109. struct wireless_dev *wdev = dev->ieee80211_ptr;
  110. struct wiphy *wiphy = wdev->wiphy;
  111. struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
  112. struct ieee80211_mgmt *mgmt = (struct ieee80211_mgmt *)buf;
  113. const u8 *bssid = mgmt->bssid;
  114. int i;
  115. bool done = false;
  116. ASSERT_WDEV_LOCK(wdev);
  117. nl80211_send_deauth(rdev, dev, buf, len, GFP_KERNEL);
  118. if (wdev->current_bss &&
  119. memcmp(wdev->current_bss->pub.bssid, bssid, ETH_ALEN) == 0) {
  120. done = true;
  121. cfg80211_unhold_bss(wdev->current_bss);
  122. cfg80211_put_bss(&wdev->current_bss->pub);
  123. wdev->current_bss = NULL;
  124. } else for (i = 0; i < MAX_AUTH_BSSES; i++) {
  125. if (wdev->auth_bsses[i] &&
  126. memcmp(wdev->auth_bsses[i]->pub.bssid, bssid, ETH_ALEN) == 0) {
  127. cfg80211_unhold_bss(wdev->auth_bsses[i]);
  128. cfg80211_put_bss(&wdev->auth_bsses[i]->pub);
  129. wdev->auth_bsses[i] = NULL;
  130. done = true;
  131. break;
  132. }
  133. if (wdev->authtry_bsses[i] &&
  134. memcmp(wdev->authtry_bsses[i]->pub.bssid, bssid, ETH_ALEN) == 0) {
  135. cfg80211_unhold_bss(wdev->authtry_bsses[i]);
  136. cfg80211_put_bss(&wdev->authtry_bsses[i]->pub);
  137. wdev->authtry_bsses[i] = NULL;
  138. done = true;
  139. break;
  140. }
  141. }
  142. WARN_ON(!done);
  143. if (wdev->sme_state == CFG80211_SME_CONNECTED) {
  144. u16 reason_code;
  145. bool from_ap;
  146. reason_code = le16_to_cpu(mgmt->u.deauth.reason_code);
  147. from_ap = memcmp(mgmt->sa, dev->dev_addr, ETH_ALEN) != 0;
  148. __cfg80211_disconnected(dev, NULL, 0, reason_code, from_ap);
  149. } else if (wdev->sme_state == CFG80211_SME_CONNECTING) {
  150. __cfg80211_connect_result(dev, mgmt->bssid, NULL, 0, NULL, 0,
  151. WLAN_STATUS_UNSPECIFIED_FAILURE,
  152. false, NULL);
  153. }
  154. }
  155. EXPORT_SYMBOL(__cfg80211_send_deauth);
  156. void cfg80211_send_deauth(struct net_device *dev, const u8 *buf, size_t len)
  157. {
  158. struct wireless_dev *wdev = dev->ieee80211_ptr;
  159. wdev_lock(wdev);
  160. __cfg80211_send_deauth(dev, buf, len);
  161. wdev_unlock(wdev);
  162. }
  163. EXPORT_SYMBOL(cfg80211_send_deauth);
  164. void __cfg80211_send_disassoc(struct net_device *dev,
  165. const u8 *buf, size_t len)
  166. {
  167. struct wireless_dev *wdev = dev->ieee80211_ptr;
  168. struct wiphy *wiphy = wdev->wiphy;
  169. struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
  170. struct ieee80211_mgmt *mgmt = (struct ieee80211_mgmt *)buf;
  171. const u8 *bssid = mgmt->bssid;
  172. int i;
  173. u16 reason_code;
  174. bool from_ap;
  175. bool done = false;
  176. ASSERT_WDEV_LOCK(wdev);
  177. nl80211_send_disassoc(rdev, dev, buf, len, GFP_KERNEL);
  178. if (wdev->sme_state != CFG80211_SME_CONNECTED)
  179. return;
  180. if (wdev->current_bss &&
  181. memcmp(wdev->current_bss->pub.bssid, bssid, ETH_ALEN) == 0) {
  182. for (i = 0; i < MAX_AUTH_BSSES; i++) {
  183. if (wdev->authtry_bsses[i] || wdev->auth_bsses[i])
  184. continue;
  185. wdev->auth_bsses[i] = wdev->current_bss;
  186. wdev->current_bss = NULL;
  187. done = true;
  188. cfg80211_sme_disassoc(dev, i);
  189. break;
  190. }
  191. WARN_ON(!done);
  192. } else
  193. WARN_ON(1);
  194. reason_code = le16_to_cpu(mgmt->u.disassoc.reason_code);
  195. from_ap = memcmp(mgmt->sa, dev->dev_addr, ETH_ALEN) != 0;
  196. __cfg80211_disconnected(dev, NULL, 0, reason_code, from_ap);
  197. }
  198. EXPORT_SYMBOL(__cfg80211_send_disassoc);
  199. void cfg80211_send_disassoc(struct net_device *dev, const u8 *buf, size_t len)
  200. {
  201. struct wireless_dev *wdev = dev->ieee80211_ptr;
  202. wdev_lock(wdev);
  203. __cfg80211_send_disassoc(dev, buf, len);
  204. wdev_unlock(wdev);
  205. }
  206. EXPORT_SYMBOL(cfg80211_send_disassoc);
  207. void cfg80211_send_auth_timeout(struct net_device *dev, const u8 *addr)
  208. {
  209. struct wireless_dev *wdev = dev->ieee80211_ptr;
  210. struct wiphy *wiphy = wdev->wiphy;
  211. struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
  212. int i;
  213. bool done = false;
  214. wdev_lock(wdev);
  215. nl80211_send_auth_timeout(rdev, dev, addr, GFP_KERNEL);
  216. if (wdev->sme_state == CFG80211_SME_CONNECTING)
  217. __cfg80211_connect_result(dev, addr, NULL, 0, NULL, 0,
  218. WLAN_STATUS_UNSPECIFIED_FAILURE,
  219. false, NULL);
  220. for (i = 0; addr && i < MAX_AUTH_BSSES; i++) {
  221. if (wdev->authtry_bsses[i] &&
  222. memcmp(wdev->authtry_bsses[i]->pub.bssid,
  223. addr, ETH_ALEN) == 0) {
  224. cfg80211_unhold_bss(wdev->authtry_bsses[i]);
  225. cfg80211_put_bss(&wdev->authtry_bsses[i]->pub);
  226. wdev->authtry_bsses[i] = NULL;
  227. done = true;
  228. break;
  229. }
  230. }
  231. WARN_ON(!done);
  232. wdev_unlock(wdev);
  233. }
  234. EXPORT_SYMBOL(cfg80211_send_auth_timeout);
  235. void cfg80211_send_assoc_timeout(struct net_device *dev, const u8 *addr)
  236. {
  237. struct wireless_dev *wdev = dev->ieee80211_ptr;
  238. struct wiphy *wiphy = wdev->wiphy;
  239. struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
  240. int i;
  241. bool done = false;
  242. wdev_lock(wdev);
  243. nl80211_send_assoc_timeout(rdev, dev, addr, GFP_KERNEL);
  244. if (wdev->sme_state == CFG80211_SME_CONNECTING)
  245. __cfg80211_connect_result(dev, addr, NULL, 0, NULL, 0,
  246. WLAN_STATUS_UNSPECIFIED_FAILURE,
  247. false, NULL);
  248. for (i = 0; addr && i < MAX_AUTH_BSSES; i++) {
  249. if (wdev->auth_bsses[i] &&
  250. memcmp(wdev->auth_bsses[i]->pub.bssid,
  251. addr, ETH_ALEN) == 0) {
  252. cfg80211_unhold_bss(wdev->auth_bsses[i]);
  253. cfg80211_put_bss(&wdev->auth_bsses[i]->pub);
  254. wdev->auth_bsses[i] = NULL;
  255. done = true;
  256. break;
  257. }
  258. }
  259. WARN_ON(!done);
  260. wdev_unlock(wdev);
  261. }
  262. EXPORT_SYMBOL(cfg80211_send_assoc_timeout);
  263. void cfg80211_michael_mic_failure(struct net_device *dev, const u8 *addr,
  264. enum nl80211_key_type key_type, int key_id,
  265. const u8 *tsc, gfp_t gfp)
  266. {
  267. struct wiphy *wiphy = dev->ieee80211_ptr->wiphy;
  268. struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
  269. #ifdef CONFIG_CFG80211_WEXT
  270. union iwreq_data wrqu;
  271. char *buf = kmalloc(128, gfp);
  272. if (buf) {
  273. sprintf(buf, "MLME-MICHAELMICFAILURE.indication("
  274. "keyid=%d %scast addr=%pM)", key_id,
  275. key_type == NL80211_KEYTYPE_GROUP ? "broad" : "uni",
  276. addr);
  277. memset(&wrqu, 0, sizeof(wrqu));
  278. wrqu.data.length = strlen(buf);
  279. wireless_send_event(dev, IWEVCUSTOM, &wrqu, buf);
  280. kfree(buf);
  281. }
  282. #endif
  283. nl80211_michael_mic_failure(rdev, dev, addr, key_type, key_id, tsc, gfp);
  284. }
  285. EXPORT_SYMBOL(cfg80211_michael_mic_failure);
  286. /* some MLME handling for userspace SME */
  287. int __cfg80211_mlme_auth(struct cfg80211_registered_device *rdev,
  288. struct net_device *dev,
  289. struct ieee80211_channel *chan,
  290. enum nl80211_auth_type auth_type,
  291. const u8 *bssid,
  292. const u8 *ssid, int ssid_len,
  293. const u8 *ie, int ie_len,
  294. const u8 *key, int key_len, int key_idx)
  295. {
  296. struct wireless_dev *wdev = dev->ieee80211_ptr;
  297. struct cfg80211_auth_request req;
  298. struct cfg80211_internal_bss *bss;
  299. int i, err, slot = -1, nfree = 0;
  300. ASSERT_WDEV_LOCK(wdev);
  301. if (auth_type == NL80211_AUTHTYPE_SHARED_KEY)
  302. if (!key || !key_len || key_idx < 0 || key_idx > 4)
  303. return -EINVAL;
  304. if (wdev->current_bss &&
  305. memcmp(bssid, wdev->current_bss->pub.bssid, ETH_ALEN) == 0)
  306. return -EALREADY;
  307. for (i = 0; i < MAX_AUTH_BSSES; i++) {
  308. if (wdev->authtry_bsses[i] &&
  309. memcmp(bssid, wdev->authtry_bsses[i]->pub.bssid,
  310. ETH_ALEN) == 0)
  311. return -EALREADY;
  312. if (wdev->auth_bsses[i] &&
  313. memcmp(bssid, wdev->auth_bsses[i]->pub.bssid,
  314. ETH_ALEN) == 0)
  315. return -EALREADY;
  316. }
  317. memset(&req, 0, sizeof(req));
  318. req.ie = ie;
  319. req.ie_len = ie_len;
  320. req.auth_type = auth_type;
  321. req.bss = cfg80211_get_bss(&rdev->wiphy, chan, bssid, ssid, ssid_len,
  322. WLAN_CAPABILITY_ESS, WLAN_CAPABILITY_ESS);
  323. req.key = key;
  324. req.key_len = key_len;
  325. req.key_idx = key_idx;
  326. if (!req.bss)
  327. return -ENOENT;
  328. bss = bss_from_pub(req.bss);
  329. for (i = 0; i < MAX_AUTH_BSSES; i++) {
  330. if (!wdev->auth_bsses[i] && !wdev->authtry_bsses[i]) {
  331. slot = i;
  332. nfree++;
  333. }
  334. }
  335. /* we need one free slot for disassoc and one for this auth */
  336. if (nfree < 2) {
  337. err = -ENOSPC;
  338. goto out;
  339. }
  340. wdev->authtry_bsses[slot] = bss;
  341. cfg80211_hold_bss(bss);
  342. err = rdev->ops->auth(&rdev->wiphy, dev, &req);
  343. if (err) {
  344. wdev->authtry_bsses[slot] = NULL;
  345. cfg80211_unhold_bss(bss);
  346. }
  347. out:
  348. if (err)
  349. cfg80211_put_bss(req.bss);
  350. return err;
  351. }
  352. int cfg80211_mlme_auth(struct cfg80211_registered_device *rdev,
  353. struct net_device *dev, struct ieee80211_channel *chan,
  354. enum nl80211_auth_type auth_type, const u8 *bssid,
  355. const u8 *ssid, int ssid_len,
  356. const u8 *ie, int ie_len,
  357. const u8 *key, int key_len, int key_idx)
  358. {
  359. int err;
  360. wdev_lock(dev->ieee80211_ptr);
  361. err = __cfg80211_mlme_auth(rdev, dev, chan, auth_type, bssid,
  362. ssid, ssid_len, ie, ie_len,
  363. key, key_len, key_idx);
  364. wdev_unlock(dev->ieee80211_ptr);
  365. return err;
  366. }
  367. int __cfg80211_mlme_assoc(struct cfg80211_registered_device *rdev,
  368. struct net_device *dev,
  369. struct ieee80211_channel *chan,
  370. const u8 *bssid, const u8 *prev_bssid,
  371. const u8 *ssid, int ssid_len,
  372. const u8 *ie, int ie_len, bool use_mfp,
  373. struct cfg80211_crypto_settings *crypt)
  374. {
  375. struct wireless_dev *wdev = dev->ieee80211_ptr;
  376. struct cfg80211_assoc_request req;
  377. struct cfg80211_internal_bss *bss;
  378. int i, err, slot = -1;
  379. ASSERT_WDEV_LOCK(wdev);
  380. memset(&req, 0, sizeof(req));
  381. if (wdev->current_bss)
  382. return -EALREADY;
  383. req.ie = ie;
  384. req.ie_len = ie_len;
  385. memcpy(&req.crypto, crypt, sizeof(req.crypto));
  386. req.use_mfp = use_mfp;
  387. req.prev_bssid = prev_bssid;
  388. req.bss = cfg80211_get_bss(&rdev->wiphy, chan, bssid, ssid, ssid_len,
  389. WLAN_CAPABILITY_ESS, WLAN_CAPABILITY_ESS);
  390. if (!req.bss)
  391. return -ENOENT;
  392. bss = bss_from_pub(req.bss);
  393. for (i = 0; i < MAX_AUTH_BSSES; i++) {
  394. if (bss == wdev->auth_bsses[i]) {
  395. slot = i;
  396. break;
  397. }
  398. }
  399. if (slot < 0) {
  400. err = -ENOTCONN;
  401. goto out;
  402. }
  403. err = rdev->ops->assoc(&rdev->wiphy, dev, &req);
  404. out:
  405. /* still a reference in wdev->auth_bsses[slot] */
  406. cfg80211_put_bss(req.bss);
  407. return err;
  408. }
  409. int cfg80211_mlme_assoc(struct cfg80211_registered_device *rdev,
  410. struct net_device *dev,
  411. struct ieee80211_channel *chan,
  412. const u8 *bssid, const u8 *prev_bssid,
  413. const u8 *ssid, int ssid_len,
  414. const u8 *ie, int ie_len, bool use_mfp,
  415. struct cfg80211_crypto_settings *crypt)
  416. {
  417. struct wireless_dev *wdev = dev->ieee80211_ptr;
  418. int err;
  419. wdev_lock(wdev);
  420. err = __cfg80211_mlme_assoc(rdev, dev, chan, bssid, prev_bssid,
  421. ssid, ssid_len, ie, ie_len, use_mfp, crypt);
  422. wdev_unlock(wdev);
  423. return err;
  424. }
  425. int __cfg80211_mlme_deauth(struct cfg80211_registered_device *rdev,
  426. struct net_device *dev, const u8 *bssid,
  427. const u8 *ie, int ie_len, u16 reason)
  428. {
  429. struct wireless_dev *wdev = dev->ieee80211_ptr;
  430. struct cfg80211_deauth_request req;
  431. int i;
  432. ASSERT_WDEV_LOCK(wdev);
  433. memset(&req, 0, sizeof(req));
  434. req.reason_code = reason;
  435. req.ie = ie;
  436. req.ie_len = ie_len;
  437. if (wdev->current_bss &&
  438. memcmp(wdev->current_bss->pub.bssid, bssid, ETH_ALEN) == 0) {
  439. req.bss = &wdev->current_bss->pub;
  440. } else for (i = 0; i < MAX_AUTH_BSSES; i++) {
  441. if (wdev->auth_bsses[i] &&
  442. memcmp(bssid, wdev->auth_bsses[i]->pub.bssid, ETH_ALEN) == 0) {
  443. req.bss = &wdev->auth_bsses[i]->pub;
  444. break;
  445. }
  446. if (wdev->authtry_bsses[i] &&
  447. memcmp(bssid, wdev->authtry_bsses[i]->pub.bssid, ETH_ALEN) == 0) {
  448. req.bss = &wdev->authtry_bsses[i]->pub;
  449. break;
  450. }
  451. }
  452. if (!req.bss)
  453. return -ENOTCONN;
  454. return rdev->ops->deauth(&rdev->wiphy, dev, &req, wdev);
  455. }
  456. int cfg80211_mlme_deauth(struct cfg80211_registered_device *rdev,
  457. struct net_device *dev, const u8 *bssid,
  458. const u8 *ie, int ie_len, u16 reason)
  459. {
  460. struct wireless_dev *wdev = dev->ieee80211_ptr;
  461. int err;
  462. wdev_lock(wdev);
  463. err = __cfg80211_mlme_deauth(rdev, dev, bssid, ie, ie_len, reason);
  464. wdev_unlock(wdev);
  465. return err;
  466. }
  467. static int __cfg80211_mlme_disassoc(struct cfg80211_registered_device *rdev,
  468. struct net_device *dev, const u8 *bssid,
  469. const u8 *ie, int ie_len, u16 reason)
  470. {
  471. struct wireless_dev *wdev = dev->ieee80211_ptr;
  472. struct cfg80211_disassoc_request req;
  473. ASSERT_WDEV_LOCK(wdev);
  474. if (wdev->sme_state != CFG80211_SME_CONNECTED)
  475. return -ENOTCONN;
  476. if (WARN_ON(!wdev->current_bss))
  477. return -ENOTCONN;
  478. memset(&req, 0, sizeof(req));
  479. req.reason_code = reason;
  480. req.ie = ie;
  481. req.ie_len = ie_len;
  482. if (memcmp(wdev->current_bss->pub.bssid, bssid, ETH_ALEN) == 0)
  483. req.bss = &wdev->current_bss->pub;
  484. else
  485. return -ENOTCONN;
  486. return rdev->ops->disassoc(&rdev->wiphy, dev, &req, wdev);
  487. }
  488. int cfg80211_mlme_disassoc(struct cfg80211_registered_device *rdev,
  489. struct net_device *dev, const u8 *bssid,
  490. const u8 *ie, int ie_len, u16 reason)
  491. {
  492. struct wireless_dev *wdev = dev->ieee80211_ptr;
  493. int err;
  494. wdev_lock(wdev);
  495. err = __cfg80211_mlme_disassoc(rdev, dev, bssid, ie, ie_len, reason);
  496. wdev_unlock(wdev);
  497. return err;
  498. }
  499. void cfg80211_mlme_down(struct cfg80211_registered_device *rdev,
  500. struct net_device *dev)
  501. {
  502. struct wireless_dev *wdev = dev->ieee80211_ptr;
  503. struct cfg80211_deauth_request req;
  504. int i;
  505. ASSERT_WDEV_LOCK(wdev);
  506. if (!rdev->ops->deauth)
  507. return;
  508. memset(&req, 0, sizeof(req));
  509. req.reason_code = WLAN_REASON_DEAUTH_LEAVING;
  510. req.ie = NULL;
  511. req.ie_len = 0;
  512. if (wdev->current_bss) {
  513. req.bss = &wdev->current_bss->pub;
  514. rdev->ops->deauth(&rdev->wiphy, dev, &req, wdev);
  515. if (wdev->current_bss) {
  516. cfg80211_unhold_bss(wdev->current_bss);
  517. cfg80211_put_bss(&wdev->current_bss->pub);
  518. wdev->current_bss = NULL;
  519. }
  520. }
  521. for (i = 0; i < MAX_AUTH_BSSES; i++) {
  522. if (wdev->auth_bsses[i]) {
  523. req.bss = &wdev->auth_bsses[i]->pub;
  524. rdev->ops->deauth(&rdev->wiphy, dev, &req, wdev);
  525. if (wdev->auth_bsses[i]) {
  526. cfg80211_unhold_bss(wdev->auth_bsses[i]);
  527. cfg80211_put_bss(&wdev->auth_bsses[i]->pub);
  528. wdev->auth_bsses[i] = NULL;
  529. }
  530. }
  531. if (wdev->authtry_bsses[i]) {
  532. req.bss = &wdev->authtry_bsses[i]->pub;
  533. rdev->ops->deauth(&rdev->wiphy, dev, &req, wdev);
  534. if (wdev->authtry_bsses[i]) {
  535. cfg80211_unhold_bss(wdev->authtry_bsses[i]);
  536. cfg80211_put_bss(&wdev->authtry_bsses[i]->pub);
  537. wdev->authtry_bsses[i] = NULL;
  538. }
  539. }
  540. }
  541. }