cfg80211: export interface stopping function
[deliverable/linux.git] / net / mac80211 / mlme.c
CommitLineData
f0706e82
JB
1/*
2 * BSS client mode implementation
5394af4d 3 * Copyright 2003-2008, Jouni Malinen <j@w1.fi>
f0706e82
JB
4 * Copyright 2004, Instant802 Networks, Inc.
5 * Copyright 2005, Devicescape Software, Inc.
6 * Copyright 2006-2007 Jiri Benc <jbenc@suse.cz>
7 * Copyright 2007, Michael Wu <flamingice@sourmilk.net>
8 *
9 * This program is free software; you can redistribute it and/or modify
10 * it under the terms of the GNU General Public License version 2 as
11 * published by the Free Software Foundation.
12 */
13
5b323edb 14#include <linux/delay.h>
f0706e82
JB
15#include <linux/if_ether.h>
16#include <linux/skbuff.h>
f0706e82 17#include <linux/if_arp.h>
f0706e82 18#include <linux/etherdevice.h>
d9b93842 19#include <linux/moduleparam.h>
d0709a65 20#include <linux/rtnetlink.h>
e8db0be1 21#include <linux/pm_qos.h>
d91f36db 22#include <linux/crc32.h>
5a0e3ad6 23#include <linux/slab.h>
bc3b2d7f 24#include <linux/export.h>
f0706e82 25#include <net/mac80211.h>
472dbc45 26#include <asm/unaligned.h>
60f8b39c 27
f0706e82 28#include "ieee80211_i.h"
24487981 29#include "driver-ops.h"
2c8dccc7
JB
30#include "rate.h"
31#include "led.h"
f0706e82 32
1672c0e3 33#define IEEE80211_AUTH_TIMEOUT (HZ / 5)
cb236d2d 34#define IEEE80211_AUTH_TIMEOUT_LONG (HZ / 2)
1672c0e3
JB
35#define IEEE80211_AUTH_TIMEOUT_SHORT (HZ / 10)
36#define IEEE80211_AUTH_MAX_TRIES 3
37#define IEEE80211_AUTH_WAIT_ASSOC (HZ * 5)
38#define IEEE80211_ASSOC_TIMEOUT (HZ / 5)
cb236d2d 39#define IEEE80211_ASSOC_TIMEOUT_LONG (HZ / 2)
1672c0e3
JB
40#define IEEE80211_ASSOC_TIMEOUT_SHORT (HZ / 10)
41#define IEEE80211_ASSOC_MAX_TRIES 3
66e67e41 42
180205bd
BG
43static int max_nullfunc_tries = 2;
44module_param(max_nullfunc_tries, int, 0644);
45MODULE_PARM_DESC(max_nullfunc_tries,
46 "Maximum nullfunc tx tries before disconnecting (reason 4).");
47
48static int max_probe_tries = 5;
49module_param(max_probe_tries, int, 0644);
50MODULE_PARM_DESC(max_probe_tries,
51 "Maximum probe tries before disconnecting (reason 4).");
b291ba11
JB
52
53/*
7ccc8bd7
FF
54 * Beacon loss timeout is calculated as N frames times the
55 * advertised beacon interval. This may need to be somewhat
56 * higher than what hardware might detect to account for
57 * delays in the host processing frames. But since we also
58 * probe on beacon miss before declaring the connection lost
59 * default to what we want.
b291ba11 60 */
59c1ec2b
BG
61static int beacon_loss_count = 7;
62module_param(beacon_loss_count, int, 0644);
63MODULE_PARM_DESC(beacon_loss_count,
64 "Number of beacon intervals before we decide beacon was lost.");
7ccc8bd7 65
b291ba11
JB
66/*
67 * Time the connection can be idle before we probe
68 * it to see if we can still talk to the AP.
69 */
d1c5091f 70#define IEEE80211_CONNECTION_IDLE_TIME (30 * HZ)
b291ba11
JB
71/*
72 * Time we wait for a probe response after sending
73 * a probe request because of beacon loss or for
74 * checking the connection still works.
75 */
180205bd
BG
76static int probe_wait_ms = 500;
77module_param(probe_wait_ms, int, 0644);
78MODULE_PARM_DESC(probe_wait_ms,
79 "Maximum time(ms) to wait for probe response"
80 " before disconnecting (reason 4).");
f0706e82 81
17e4ec14
JM
82/*
83 * Weight given to the latest Beacon frame when calculating average signal
84 * strength for Beacon frames received in the current BSS. This must be
85 * between 1 and 15.
86 */
87#define IEEE80211_SIGNAL_AVE_WEIGHT 3
88
391a200a
JM
89/*
90 * How many Beacon frames need to have been used in average signal strength
91 * before starting to indicate signal change events.
92 */
93#define IEEE80211_SIGNAL_AVE_MIN_COUNT 4
94
ca386f31
JB
95/*
96 * We can have multiple work items (and connection probing)
97 * scheduling this timer, but we need to take care to only
98 * reschedule it when it should fire _earlier_ than it was
99 * asked for before, or if it's not pending right now. This
100 * function ensures that. Note that it then is required to
101 * run this function for all timeouts after the first one
102 * has happened -- the work that runs from this timer will
103 * do that.
104 */
8d61ffa5
JB
105static void run_again(struct ieee80211_sub_if_data *sdata,
106 unsigned long timeout)
ca386f31 107{
8d61ffa5 108 sdata_assert_lock(sdata);
ca386f31 109
8d61ffa5
JB
110 if (!timer_pending(&sdata->u.mgd.timer) ||
111 time_before(timeout, sdata->u.mgd.timer.expires))
112 mod_timer(&sdata->u.mgd.timer, timeout);
ca386f31
JB
113}
114
d3a910a8 115void ieee80211_sta_reset_beacon_monitor(struct ieee80211_sub_if_data *sdata)
b291ba11 116{
c1288b12 117 if (sdata->vif.driver_flags & IEEE80211_VIF_BEACON_FILTER)
b291ba11
JB
118 return;
119
7eeff74c
JB
120 if (sdata->local->hw.flags & IEEE80211_HW_CONNECTION_MONITOR)
121 return;
122
b291ba11 123 mod_timer(&sdata->u.mgd.bcn_mon_timer,
7ccc8bd7 124 round_jiffies_up(jiffies + sdata->u.mgd.beacon_timeout));
b291ba11
JB
125}
126
be099e82
LR
127void ieee80211_sta_reset_conn_monitor(struct ieee80211_sub_if_data *sdata)
128{
0c699c3a
LR
129 struct ieee80211_if_managed *ifmgd = &sdata->u.mgd;
130
8628172f
SG
131 if (unlikely(!sdata->u.mgd.associated))
132 return;
133
448cd2e2
EP
134 ifmgd->probe_send_count = 0;
135
be099e82
LR
136 if (sdata->local->hw.flags & IEEE80211_HW_CONNECTION_MONITOR)
137 return;
138
139 mod_timer(&sdata->u.mgd.conn_mon_timer,
140 round_jiffies_up(jiffies + IEEE80211_CONNECTION_IDLE_TIME));
141}
142
5484e237 143static int ecw2cw(int ecw)
60f8b39c 144{
5484e237 145 return (1 << ecw) - 1;
60f8b39c
JB
146}
147
6565ec9b
JB
148static u32
149ieee80211_determine_chantype(struct ieee80211_sub_if_data *sdata,
150 struct ieee80211_supported_band *sband,
151 struct ieee80211_channel *channel,
152 const struct ieee80211_ht_operation *ht_oper,
153 const struct ieee80211_vht_operation *vht_oper,
5cdaed1e 154 struct cfg80211_chan_def *chandef, bool tracking)
6565ec9b 155{
5cdaed1e 156 struct ieee80211_if_managed *ifmgd = &sdata->u.mgd;
6565ec9b
JB
157 struct cfg80211_chan_def vht_chandef;
158 u32 ht_cfreq, ret;
159
160 chandef->chan = channel;
161 chandef->width = NL80211_CHAN_WIDTH_20_NOHT;
162 chandef->center_freq1 = channel->center_freq;
163 chandef->center_freq2 = 0;
164
165 if (!ht_oper || !sband->ht_cap.ht_supported) {
166 ret = IEEE80211_STA_DISABLE_HT | IEEE80211_STA_DISABLE_VHT;
167 goto out;
168 }
169
170 chandef->width = NL80211_CHAN_WIDTH_20;
171
172 ht_cfreq = ieee80211_channel_to_frequency(ht_oper->primary_chan,
173 channel->band);
174 /* check that channel matches the right operating channel */
5cdaed1e 175 if (!tracking && channel->center_freq != ht_cfreq) {
6565ec9b
JB
176 /*
177 * It's possible that some APs are confused here;
178 * Netgear WNDR3700 sometimes reports 4 higher than
179 * the actual channel in association responses, but
180 * since we look at probe response/beacon data here
181 * it should be OK.
182 */
5cdaed1e
JB
183 sdata_info(sdata,
184 "Wrong control channel: center-freq: %d ht-cfreq: %d ht->primary_chan: %d band: %d - Disabling HT\n",
185 channel->center_freq, ht_cfreq,
186 ht_oper->primary_chan, channel->band);
6565ec9b
JB
187 ret = IEEE80211_STA_DISABLE_HT | IEEE80211_STA_DISABLE_VHT;
188 goto out;
189 }
190
191 /* check 40 MHz support, if we have it */
192 if (sband->ht_cap.cap & IEEE80211_HT_CAP_SUP_WIDTH_20_40) {
193 switch (ht_oper->ht_param & IEEE80211_HT_PARAM_CHA_SEC_OFFSET) {
194 case IEEE80211_HT_PARAM_CHA_SEC_ABOVE:
195 chandef->width = NL80211_CHAN_WIDTH_40;
196 chandef->center_freq1 += 10;
197 break;
198 case IEEE80211_HT_PARAM_CHA_SEC_BELOW:
199 chandef->width = NL80211_CHAN_WIDTH_40;
200 chandef->center_freq1 -= 10;
201 break;
202 }
203 } else {
204 /* 40 MHz (and 80 MHz) must be supported for VHT */
205 ret = IEEE80211_STA_DISABLE_VHT;
85220d71
JB
206 /* also mark 40 MHz disabled */
207 ret |= IEEE80211_STA_DISABLE_40MHZ;
6565ec9b
JB
208 goto out;
209 }
210
211 if (!vht_oper || !sband->vht_cap.vht_supported) {
212 ret = IEEE80211_STA_DISABLE_VHT;
213 goto out;
214 }
215
216 vht_chandef.chan = channel;
217 vht_chandef.center_freq1 =
218 ieee80211_channel_to_frequency(vht_oper->center_freq_seg1_idx,
219 channel->band);
220 vht_chandef.center_freq2 = 0;
221
6565ec9b
JB
222 switch (vht_oper->chan_width) {
223 case IEEE80211_VHT_CHANWIDTH_USE_HT:
224 vht_chandef.width = chandef->width;
cb664981 225 vht_chandef.center_freq1 = chandef->center_freq1;
6565ec9b
JB
226 break;
227 case IEEE80211_VHT_CHANWIDTH_80MHZ:
228 vht_chandef.width = NL80211_CHAN_WIDTH_80;
229 break;
230 case IEEE80211_VHT_CHANWIDTH_160MHZ:
231 vht_chandef.width = NL80211_CHAN_WIDTH_160;
232 break;
233 case IEEE80211_VHT_CHANWIDTH_80P80MHZ:
234 vht_chandef.width = NL80211_CHAN_WIDTH_80P80;
6553bf04
JB
235 vht_chandef.center_freq2 =
236 ieee80211_channel_to_frequency(
237 vht_oper->center_freq_seg2_idx,
238 channel->band);
6565ec9b
JB
239 break;
240 default:
5cdaed1e 241 if (!(ifmgd->flags & IEEE80211_STA_DISABLE_VHT))
30eb1dc2
JB
242 sdata_info(sdata,
243 "AP VHT operation IE has invalid channel width (%d), disable VHT\n",
244 vht_oper->chan_width);
6565ec9b
JB
245 ret = IEEE80211_STA_DISABLE_VHT;
246 goto out;
247 }
248
249 if (!cfg80211_chandef_valid(&vht_chandef)) {
5cdaed1e 250 if (!(ifmgd->flags & IEEE80211_STA_DISABLE_VHT))
30eb1dc2
JB
251 sdata_info(sdata,
252 "AP VHT information is invalid, disable VHT\n");
6565ec9b
JB
253 ret = IEEE80211_STA_DISABLE_VHT;
254 goto out;
255 }
256
257 if (cfg80211_chandef_identical(chandef, &vht_chandef)) {
258 ret = 0;
259 goto out;
260 }
261
262 if (!cfg80211_chandef_compatible(chandef, &vht_chandef)) {
5cdaed1e 263 if (!(ifmgd->flags & IEEE80211_STA_DISABLE_VHT))
30eb1dc2
JB
264 sdata_info(sdata,
265 "AP VHT information doesn't match HT, disable VHT\n");
6565ec9b
JB
266 ret = IEEE80211_STA_DISABLE_VHT;
267 goto out;
268 }
269
270 *chandef = vht_chandef;
271
272 ret = 0;
273
274out:
963a1852
JB
275 /*
276 * When tracking the current AP, don't do any further checks if the
277 * new chandef is identical to the one we're currently using for the
278 * connection. This keeps us from playing ping-pong with regulatory,
279 * without it the following can happen (for example):
280 * - connect to an AP with 80 MHz, world regdom allows 80 MHz
281 * - AP advertises regdom US
282 * - CRDA loads regdom US with 80 MHz prohibited (old database)
283 * - the code below detects an unsupported channel, downgrades, and
284 * we disconnect from the AP in the caller
285 * - disconnect causes CRDA to reload world regdomain and the game
286 * starts anew.
287 * (see https://bugzilla.kernel.org/show_bug.cgi?id=70881)
288 *
289 * It seems possible that there are still scenarios with CSA or real
290 * bandwidth changes where a this could happen, but those cases are
291 * less common and wouldn't completely prevent using the AP.
292 */
293 if (tracking &&
294 cfg80211_chandef_identical(chandef, &sdata->vif.bss_conf.chandef))
295 return ret;
296
586e01ed
JB
297 /* don't print the message below for VHT mismatch if VHT is disabled */
298 if (ret & IEEE80211_STA_DISABLE_VHT)
299 vht_chandef = *chandef;
300
ddfe49b4
JB
301 /*
302 * Ignore the DISABLED flag when we're already connected and only
303 * tracking the APs beacon for bandwidth changes - otherwise we
304 * might get disconnected here if we connect to an AP, update our
305 * regulatory information based on the AP's country IE and the
306 * information we have is wrong/outdated and disables the channel
307 * that we're actually using for the connection to the AP.
308 */
6565ec9b 309 while (!cfg80211_chandef_usable(sdata->local->hw.wiphy, chandef,
ddfe49b4
JB
310 tracking ? 0 :
311 IEEE80211_CHAN_DISABLED)) {
6565ec9b
JB
312 if (WARN_ON(chandef->width == NL80211_CHAN_WIDTH_20_NOHT)) {
313 ret = IEEE80211_STA_DISABLE_HT |
314 IEEE80211_STA_DISABLE_VHT;
b56e4b85 315 break;
6565ec9b
JB
316 }
317
e6b7cde4 318 ret |= ieee80211_chandef_downgrade(chandef);
6565ec9b
JB
319 }
320
5cdaed1e 321 if (chandef->width != vht_chandef.width && !tracking)
6565ec9b
JB
322 sdata_info(sdata,
323 "capabilities/regulatory prevented using AP HT/VHT configuration, downgraded\n");
324
325 WARN_ON_ONCE(!cfg80211_chandef_valid(chandef));
326 return ret;
327}
328
30eb1dc2
JB
329static int ieee80211_config_bw(struct ieee80211_sub_if_data *sdata,
330 struct sta_info *sta,
331 const struct ieee80211_ht_operation *ht_oper,
332 const struct ieee80211_vht_operation *vht_oper,
333 const u8 *bssid, u32 *changed)
d5522e03
JB
334{
335 struct ieee80211_local *local = sdata->local;
30eb1dc2 336 struct ieee80211_if_managed *ifmgd = &sdata->u.mgd;
d5522e03 337 struct ieee80211_supported_band *sband;
55de908a 338 struct ieee80211_channel *chan;
30eb1dc2 339 struct cfg80211_chan_def chandef;
9ed6bcce 340 u16 ht_opmode;
30eb1dc2
JB
341 u32 flags;
342 enum ieee80211_sta_rx_bandwidth new_sta_bw;
343 int ret;
d5522e03 344
30eb1dc2
JB
345 /* if HT was/is disabled, don't track any bandwidth changes */
346 if (ifmgd->flags & IEEE80211_STA_DISABLE_HT || !ht_oper)
1128958d
JB
347 return 0;
348
30eb1dc2
JB
349 /* don't check VHT if we associated as non-VHT station */
350 if (ifmgd->flags & IEEE80211_STA_DISABLE_VHT)
351 vht_oper = NULL;
352
353 if (WARN_ON_ONCE(!sta))
354 return -EINVAL;
355
017b45bb
AA
356 /*
357 * if bss configuration changed store the new one -
358 * this may be applicable even if channel is identical
359 */
360 ht_opmode = le16_to_cpu(ht_oper->operation_mode);
361 if (sdata->vif.bss_conf.ht_operation_mode != ht_opmode) {
362 *changed |= BSS_CHANGED_HT;
363 sdata->vif.bss_conf.ht_operation_mode = ht_opmode;
364 }
365
f2d9330e 366 chan = sdata->vif.bss_conf.chandef.chan;
55de908a 367 sband = local->hw.wiphy->bands[chan->band];
d5522e03 368
30eb1dc2
JB
369 /* calculate new channel (type) based on HT/VHT operation IEs */
370 flags = ieee80211_determine_chantype(sdata, sband, chan, ht_oper,
5cdaed1e 371 vht_oper, &chandef, true);
30eb1dc2
JB
372
373 /*
374 * Downgrade the new channel if we associated with restricted
375 * capabilities. For example, if we associated as a 20 MHz STA
376 * to a 40 MHz AP (due to regulatory, capabilities or config
377 * reasons) then switching to a 40 MHz channel now won't do us
378 * any good -- we couldn't use it with the AP.
379 */
380 if (ifmgd->flags & IEEE80211_STA_DISABLE_80P80MHZ &&
381 chandef.width == NL80211_CHAN_WIDTH_80P80)
e6b7cde4 382 flags |= ieee80211_chandef_downgrade(&chandef);
30eb1dc2
JB
383 if (ifmgd->flags & IEEE80211_STA_DISABLE_160MHZ &&
384 chandef.width == NL80211_CHAN_WIDTH_160)
e6b7cde4 385 flags |= ieee80211_chandef_downgrade(&chandef);
30eb1dc2
JB
386 if (ifmgd->flags & IEEE80211_STA_DISABLE_40MHZ &&
387 chandef.width > NL80211_CHAN_WIDTH_20)
e6b7cde4 388 flags |= ieee80211_chandef_downgrade(&chandef);
30eb1dc2
JB
389
390 if (cfg80211_chandef_identical(&chandef, &sdata->vif.bss_conf.chandef))
391 return 0;
392
393 sdata_info(sdata,
394 "AP %pM changed bandwidth, new config is %d MHz, width %d (%d/%d MHz)\n",
395 ifmgd->bssid, chandef.chan->center_freq, chandef.width,
396 chandef.center_freq1, chandef.center_freq2);
397
398 if (flags != (ifmgd->flags & (IEEE80211_STA_DISABLE_HT |
399 IEEE80211_STA_DISABLE_VHT |
400 IEEE80211_STA_DISABLE_40MHZ |
401 IEEE80211_STA_DISABLE_80P80MHZ |
402 IEEE80211_STA_DISABLE_160MHZ)) ||
403 !cfg80211_chandef_valid(&chandef)) {
404 sdata_info(sdata,
405 "AP %pM changed bandwidth in a way we can't support - disconnect\n",
406 ifmgd->bssid);
407 return -EINVAL;
408 }
409
410 switch (chandef.width) {
411 case NL80211_CHAN_WIDTH_20_NOHT:
412 case NL80211_CHAN_WIDTH_20:
413 new_sta_bw = IEEE80211_STA_RX_BW_20;
414 break;
4bf88530 415 case NL80211_CHAN_WIDTH_40:
30eb1dc2 416 new_sta_bw = IEEE80211_STA_RX_BW_40;
64f68e5d 417 break;
30eb1dc2
JB
418 case NL80211_CHAN_WIDTH_80:
419 new_sta_bw = IEEE80211_STA_RX_BW_80;
420 break;
421 case NL80211_CHAN_WIDTH_80P80:
422 case NL80211_CHAN_WIDTH_160:
423 new_sta_bw = IEEE80211_STA_RX_BW_160;
64f68e5d 424 break;
30eb1dc2
JB
425 default:
426 return -EINVAL;
64f68e5d 427 }
d5522e03 428
30eb1dc2
JB
429 if (new_sta_bw > sta->cur_max_bandwidth)
430 new_sta_bw = sta->cur_max_bandwidth;
64f68e5d 431
30eb1dc2
JB
432 if (new_sta_bw < sta->sta.bandwidth) {
433 sta->sta.bandwidth = new_sta_bw;
434 rate_control_rate_update(local, sband, sta,
435 IEEE80211_RC_BW_CHANGED);
436 }
64f68e5d 437
30eb1dc2
JB
438 ret = ieee80211_vif_change_bandwidth(sdata, &chandef, changed);
439 if (ret) {
440 sdata_info(sdata,
441 "AP %pM changed bandwidth to incompatible one - disconnect\n",
442 ifmgd->bssid);
443 return ret;
444 }
7cc44ed4 445
30eb1dc2
JB
446 if (new_sta_bw > sta->sta.bandwidth) {
447 sta->sta.bandwidth = new_sta_bw;
448 rate_control_rate_update(local, sband, sta,
449 IEEE80211_RC_BW_CHANGED);
0aaffa9b 450 }
d5522e03 451
30eb1dc2 452 return 0;
d5522e03
JB
453}
454
9c6bd790
JB
455/* frame sending functions */
456
66e67e41 457static void ieee80211_add_ht_ie(struct ieee80211_sub_if_data *sdata,
9dde6423 458 struct sk_buff *skb, u8 ap_ht_param,
66e67e41
JB
459 struct ieee80211_supported_band *sband,
460 struct ieee80211_channel *channel,
461 enum ieee80211_smps_mode smps)
462{
66e67e41
JB
463 u8 *pos;
464 u32 flags = channel->flags;
465 u16 cap;
466 struct ieee80211_sta_ht_cap ht_cap;
467
468 BUILD_BUG_ON(sizeof(ht_cap) != sizeof(sband->ht_cap));
469
66e67e41
JB
470 memcpy(&ht_cap, &sband->ht_cap, sizeof(ht_cap));
471 ieee80211_apply_htcap_overrides(sdata, &ht_cap);
472
66e67e41
JB
473 /* determine capability flags */
474 cap = ht_cap.cap;
475
9dde6423 476 switch (ap_ht_param & IEEE80211_HT_PARAM_CHA_SEC_OFFSET) {
66e67e41
JB
477 case IEEE80211_HT_PARAM_CHA_SEC_ABOVE:
478 if (flags & IEEE80211_CHAN_NO_HT40PLUS) {
479 cap &= ~IEEE80211_HT_CAP_SUP_WIDTH_20_40;
480 cap &= ~IEEE80211_HT_CAP_SGI_40;
481 }
482 break;
483 case IEEE80211_HT_PARAM_CHA_SEC_BELOW:
484 if (flags & IEEE80211_CHAN_NO_HT40MINUS) {
485 cap &= ~IEEE80211_HT_CAP_SUP_WIDTH_20_40;
486 cap &= ~IEEE80211_HT_CAP_SGI_40;
487 }
488 break;
489 }
490
24398e39
JB
491 /*
492 * If 40 MHz was disabled associate as though we weren't
493 * capable of 40 MHz -- some broken APs will never fall
494 * back to trying to transmit in 20 MHz.
495 */
496 if (sdata->u.mgd.flags & IEEE80211_STA_DISABLE_40MHZ) {
497 cap &= ~IEEE80211_HT_CAP_SUP_WIDTH_20_40;
498 cap &= ~IEEE80211_HT_CAP_SGI_40;
499 }
500
66e67e41
JB
501 /* set SM PS mode properly */
502 cap &= ~IEEE80211_HT_CAP_SM_PS;
503 switch (smps) {
504 case IEEE80211_SMPS_AUTOMATIC:
505 case IEEE80211_SMPS_NUM_MODES:
506 WARN_ON(1);
507 case IEEE80211_SMPS_OFF:
508 cap |= WLAN_HT_CAP_SM_PS_DISABLED <<
509 IEEE80211_HT_CAP_SM_PS_SHIFT;
510 break;
511 case IEEE80211_SMPS_STATIC:
512 cap |= WLAN_HT_CAP_SM_PS_STATIC <<
513 IEEE80211_HT_CAP_SM_PS_SHIFT;
514 break;
515 case IEEE80211_SMPS_DYNAMIC:
516 cap |= WLAN_HT_CAP_SM_PS_DYNAMIC <<
517 IEEE80211_HT_CAP_SM_PS_SHIFT;
518 break;
519 }
520
521 /* reserve and fill IE */
522 pos = skb_put(skb, sizeof(struct ieee80211_ht_cap) + 2);
523 ieee80211_ie_build_ht_cap(pos, &ht_cap, cap);
524}
525
d545daba
MP
526static void ieee80211_add_vht_ie(struct ieee80211_sub_if_data *sdata,
527 struct sk_buff *skb,
b08fbbd8
JB
528 struct ieee80211_supported_band *sband,
529 struct ieee80211_vht_cap *ap_vht_cap)
d545daba
MP
530{
531 u8 *pos;
532 u32 cap;
533 struct ieee80211_sta_vht_cap vht_cap;
c1cf6d4e 534 u32 mask, ap_bf_sts, our_bf_sts;
d545daba
MP
535
536 BUILD_BUG_ON(sizeof(vht_cap) != sizeof(sband->vht_cap));
537
538 memcpy(&vht_cap, &sband->vht_cap, sizeof(vht_cap));
dd5ecfea 539 ieee80211_apply_vhtcap_overrides(sdata, &vht_cap);
d545daba
MP
540
541 /* determine capability flags */
542 cap = vht_cap.cap;
543
f2d9d270
JB
544 if (sdata->u.mgd.flags & IEEE80211_STA_DISABLE_80P80MHZ) {
545 cap &= ~IEEE80211_VHT_CAP_SUPP_CHAN_WIDTH_160_80PLUS80MHZ;
546 cap |= IEEE80211_VHT_CAP_SUPP_CHAN_WIDTH_160MHZ;
547 }
548
549 if (sdata->u.mgd.flags & IEEE80211_STA_DISABLE_160MHZ) {
550 cap &= ~IEEE80211_VHT_CAP_SHORT_GI_160;
551 cap &= ~IEEE80211_VHT_CAP_SUPP_CHAN_WIDTH_160MHZ;
552 }
553
b08fbbd8
JB
554 /*
555 * Some APs apparently get confused if our capabilities are better
556 * than theirs, so restrict what we advertise in the assoc request.
557 */
558 if (!(ap_vht_cap->vht_cap_info &
559 cpu_to_le32(IEEE80211_VHT_CAP_SU_BEAMFORMER_CAPABLE)))
560 cap &= ~IEEE80211_VHT_CAP_SU_BEAMFORMEE_CAPABLE;
561
c1cf6d4e
ES
562 mask = IEEE80211_VHT_CAP_BEAMFORMEE_STS_MASK;
563
564 ap_bf_sts = le32_to_cpu(ap_vht_cap->vht_cap_info) & mask;
565 our_bf_sts = cap & mask;
566
567 if (ap_bf_sts < our_bf_sts) {
568 cap &= ~mask;
569 cap |= ap_bf_sts;
570 }
571
d545daba 572 /* reserve and fill IE */
d4950281 573 pos = skb_put(skb, sizeof(struct ieee80211_vht_cap) + 2);
d545daba
MP
574 ieee80211_ie_build_vht_cap(pos, &vht_cap, cap);
575}
576
66e67e41
JB
577static void ieee80211_send_assoc(struct ieee80211_sub_if_data *sdata)
578{
579 struct ieee80211_local *local = sdata->local;
580 struct ieee80211_if_managed *ifmgd = &sdata->u.mgd;
581 struct ieee80211_mgd_assoc_data *assoc_data = ifmgd->assoc_data;
582 struct sk_buff *skb;
583 struct ieee80211_mgmt *mgmt;
584 u8 *pos, qos_info;
585 size_t offset = 0, noffset;
2103dec1 586 int i, count, rates_len, supp_rates_len, shift;
66e67e41
JB
587 u16 capab;
588 struct ieee80211_supported_band *sband;
55de908a
JB
589 struct ieee80211_chanctx_conf *chanctx_conf;
590 struct ieee80211_channel *chan;
2103dec1 591 u32 rate_flags, rates = 0;
66e67e41 592
8d61ffa5 593 sdata_assert_lock(sdata);
66e67e41 594
55de908a
JB
595 rcu_read_lock();
596 chanctx_conf = rcu_dereference(sdata->vif.chanctx_conf);
597 if (WARN_ON(!chanctx_conf)) {
598 rcu_read_unlock();
599 return;
600 }
4bf88530 601 chan = chanctx_conf->def.chan;
2103dec1 602 rate_flags = ieee80211_chandef_rate_flags(&chanctx_conf->def);
55de908a
JB
603 rcu_read_unlock();
604 sband = local->hw.wiphy->bands[chan->band];
2103dec1 605 shift = ieee80211_vif_get_shift(&sdata->vif);
66e67e41
JB
606
607 if (assoc_data->supp_rates_len) {
608 /*
609 * Get all rates supported by the device and the AP as
610 * some APs don't like getting a superset of their rates
611 * in the association request (e.g. D-Link DAP 1353 in
612 * b-only mode)...
613 */
2103dec1
SW
614 rates_len = ieee80211_parse_bitrates(&chanctx_conf->def, sband,
615 assoc_data->supp_rates,
616 assoc_data->supp_rates_len,
617 &rates);
66e67e41
JB
618 } else {
619 /*
620 * In case AP not provide any supported rates information
621 * before association, we send information element(s) with
622 * all rates that we support.
623 */
2103dec1
SW
624 rates_len = 0;
625 for (i = 0; i < sband->n_bitrates; i++) {
626 if ((rate_flags & sband->bitrates[i].flags)
627 != rate_flags)
628 continue;
629 rates |= BIT(i);
630 rates_len++;
631 }
66e67e41
JB
632 }
633
634 skb = alloc_skb(local->hw.extra_tx_headroom +
635 sizeof(*mgmt) + /* bit too much but doesn't matter */
636 2 + assoc_data->ssid_len + /* SSID */
637 4 + rates_len + /* (extended) rates */
638 4 + /* power capability */
639 2 + 2 * sband->n_channels + /* supported channels */
640 2 + sizeof(struct ieee80211_ht_cap) + /* HT */
d4950281 641 2 + sizeof(struct ieee80211_vht_cap) + /* VHT */
66e67e41
JB
642 assoc_data->ie_len + /* extra IEs */
643 9, /* WMM */
644 GFP_KERNEL);
645 if (!skb)
646 return;
647
648 skb_reserve(skb, local->hw.extra_tx_headroom);
649
650 capab = WLAN_CAPABILITY_ESS;
651
652 if (sband->band == IEEE80211_BAND_2GHZ) {
653 if (!(local->hw.flags & IEEE80211_HW_2GHZ_SHORT_SLOT_INCAPABLE))
654 capab |= WLAN_CAPABILITY_SHORT_SLOT_TIME;
655 if (!(local->hw.flags & IEEE80211_HW_2GHZ_SHORT_PREAMBLE_INCAPABLE))
656 capab |= WLAN_CAPABILITY_SHORT_PREAMBLE;
657 }
658
659 if (assoc_data->capability & WLAN_CAPABILITY_PRIVACY)
660 capab |= WLAN_CAPABILITY_PRIVACY;
661
662 if ((assoc_data->capability & WLAN_CAPABILITY_SPECTRUM_MGMT) &&
663 (local->hw.flags & IEEE80211_HW_SPECTRUM_MGMT))
664 capab |= WLAN_CAPABILITY_SPECTRUM_MGMT;
665
666 mgmt = (struct ieee80211_mgmt *) skb_put(skb, 24);
667 memset(mgmt, 0, 24);
668 memcpy(mgmt->da, assoc_data->bss->bssid, ETH_ALEN);
669 memcpy(mgmt->sa, sdata->vif.addr, ETH_ALEN);
670 memcpy(mgmt->bssid, assoc_data->bss->bssid, ETH_ALEN);
671
672 if (!is_zero_ether_addr(assoc_data->prev_bssid)) {
673 skb_put(skb, 10);
674 mgmt->frame_control = cpu_to_le16(IEEE80211_FTYPE_MGMT |
675 IEEE80211_STYPE_REASSOC_REQ);
676 mgmt->u.reassoc_req.capab_info = cpu_to_le16(capab);
677 mgmt->u.reassoc_req.listen_interval =
678 cpu_to_le16(local->hw.conf.listen_interval);
679 memcpy(mgmt->u.reassoc_req.current_ap, assoc_data->prev_bssid,
680 ETH_ALEN);
681 } else {
682 skb_put(skb, 4);
683 mgmt->frame_control = cpu_to_le16(IEEE80211_FTYPE_MGMT |
684 IEEE80211_STYPE_ASSOC_REQ);
685 mgmt->u.assoc_req.capab_info = cpu_to_le16(capab);
686 mgmt->u.assoc_req.listen_interval =
687 cpu_to_le16(local->hw.conf.listen_interval);
688 }
689
690 /* SSID */
691 pos = skb_put(skb, 2 + assoc_data->ssid_len);
692 *pos++ = WLAN_EID_SSID;
693 *pos++ = assoc_data->ssid_len;
694 memcpy(pos, assoc_data->ssid, assoc_data->ssid_len);
695
696 /* add all rates which were marked to be used above */
697 supp_rates_len = rates_len;
698 if (supp_rates_len > 8)
699 supp_rates_len = 8;
700
701 pos = skb_put(skb, supp_rates_len + 2);
702 *pos++ = WLAN_EID_SUPP_RATES;
703 *pos++ = supp_rates_len;
704
705 count = 0;
706 for (i = 0; i < sband->n_bitrates; i++) {
707 if (BIT(i) & rates) {
2103dec1
SW
708 int rate = DIV_ROUND_UP(sband->bitrates[i].bitrate,
709 5 * (1 << shift));
710 *pos++ = (u8) rate;
66e67e41
JB
711 if (++count == 8)
712 break;
713 }
714 }
715
716 if (rates_len > count) {
717 pos = skb_put(skb, rates_len - count + 2);
718 *pos++ = WLAN_EID_EXT_SUPP_RATES;
719 *pos++ = rates_len - count;
720
721 for (i++; i < sband->n_bitrates; i++) {
722 if (BIT(i) & rates) {
2103dec1
SW
723 int rate;
724 rate = DIV_ROUND_UP(sband->bitrates[i].bitrate,
725 5 * (1 << shift));
726 *pos++ = (u8) rate;
66e67e41
JB
727 }
728 }
729 }
730
731 if (capab & WLAN_CAPABILITY_SPECTRUM_MGMT) {
732 /* 1. power capabilities */
733 pos = skb_put(skb, 4);
734 *pos++ = WLAN_EID_PWR_CAPABILITY;
735 *pos++ = 2;
736 *pos++ = 0; /* min tx power */
0430c883
SW
737 /* max tx power */
738 *pos++ = ieee80211_chandef_max_power(&chanctx_conf->def);
66e67e41
JB
739
740 /* 2. supported channels */
741 /* TODO: get this in reg domain format */
742 pos = skb_put(skb, 2 * sband->n_channels + 2);
743 *pos++ = WLAN_EID_SUPPORTED_CHANNELS;
744 *pos++ = 2 * sband->n_channels;
745 for (i = 0; i < sband->n_channels; i++) {
746 *pos++ = ieee80211_frequency_to_channel(
747 sband->channels[i].center_freq);
748 *pos++ = 1; /* one channel in the subband*/
749 }
750 }
751
752 /* if present, add any custom IEs that go before HT */
b3f51e94 753 if (assoc_data->ie_len) {
66e67e41
JB
754 static const u8 before_ht[] = {
755 WLAN_EID_SSID,
756 WLAN_EID_SUPP_RATES,
757 WLAN_EID_EXT_SUPP_RATES,
758 WLAN_EID_PWR_CAPABILITY,
759 WLAN_EID_SUPPORTED_CHANNELS,
760 WLAN_EID_RSN,
761 WLAN_EID_QOS_CAPA,
762 WLAN_EID_RRM_ENABLED_CAPABILITIES,
763 WLAN_EID_MOBILITY_DOMAIN,
764 WLAN_EID_SUPPORTED_REGULATORY_CLASSES,
765 };
766 noffset = ieee80211_ie_split(assoc_data->ie, assoc_data->ie_len,
767 before_ht, ARRAY_SIZE(before_ht),
768 offset);
769 pos = skb_put(skb, noffset - offset);
770 memcpy(pos, assoc_data->ie + offset, noffset - offset);
771 offset = noffset;
772 }
773
f2d9d270
JB
774 if (WARN_ON_ONCE((ifmgd->flags & IEEE80211_STA_DISABLE_HT) &&
775 !(ifmgd->flags & IEEE80211_STA_DISABLE_VHT)))
776 ifmgd->flags |= IEEE80211_STA_DISABLE_VHT;
777
a8243b72 778 if (!(ifmgd->flags & IEEE80211_STA_DISABLE_HT))
9dde6423 779 ieee80211_add_ht_ie(sdata, skb, assoc_data->ap_ht_param,
04ecd257 780 sband, chan, sdata->smps_mode);
66e67e41 781
3de3802c
JB
782 /* if present, add any custom IEs that go before VHT */
783 if (assoc_data->ie_len) {
784 static const u8 before_vht[] = {
785 WLAN_EID_SSID,
786 WLAN_EID_SUPP_RATES,
787 WLAN_EID_EXT_SUPP_RATES,
788 WLAN_EID_PWR_CAPABILITY,
789 WLAN_EID_SUPPORTED_CHANNELS,
790 WLAN_EID_RSN,
791 WLAN_EID_QOS_CAPA,
792 WLAN_EID_RRM_ENABLED_CAPABILITIES,
793 WLAN_EID_MOBILITY_DOMAIN,
794 WLAN_EID_SUPPORTED_REGULATORY_CLASSES,
795 WLAN_EID_HT_CAPABILITY,
796 WLAN_EID_BSS_COEX_2040,
797 WLAN_EID_EXT_CAPABILITY,
798 WLAN_EID_QOS_TRAFFIC_CAPA,
799 WLAN_EID_TIM_BCAST_REQ,
800 WLAN_EID_INTERWORKING,
801 };
802 noffset = ieee80211_ie_split(assoc_data->ie, assoc_data->ie_len,
803 before_vht, ARRAY_SIZE(before_vht),
804 offset);
805 pos = skb_put(skb, noffset - offset);
806 memcpy(pos, assoc_data->ie + offset, noffset - offset);
807 offset = noffset;
808 }
809
d545daba 810 if (!(ifmgd->flags & IEEE80211_STA_DISABLE_VHT))
b08fbbd8
JB
811 ieee80211_add_vht_ie(sdata, skb, sband,
812 &assoc_data->ap_vht_cap);
d545daba 813
66e67e41 814 /* if present, add any custom non-vendor IEs that go after HT */
b3f51e94 815 if (assoc_data->ie_len) {
66e67e41
JB
816 noffset = ieee80211_ie_split_vendor(assoc_data->ie,
817 assoc_data->ie_len,
818 offset);
819 pos = skb_put(skb, noffset - offset);
820 memcpy(pos, assoc_data->ie + offset, noffset - offset);
821 offset = noffset;
822 }
823
76f0303d
JB
824 if (assoc_data->wmm) {
825 if (assoc_data->uapsd) {
dc41e4d4
EP
826 qos_info = ifmgd->uapsd_queues;
827 qos_info |= (ifmgd->uapsd_max_sp_len <<
66e67e41
JB
828 IEEE80211_WMM_IE_STA_QOSINFO_SP_SHIFT);
829 } else {
830 qos_info = 0;
831 }
832
833 pos = skb_put(skb, 9);
834 *pos++ = WLAN_EID_VENDOR_SPECIFIC;
835 *pos++ = 7; /* len */
836 *pos++ = 0x00; /* Microsoft OUI 00:50:F2 */
837 *pos++ = 0x50;
838 *pos++ = 0xf2;
839 *pos++ = 2; /* WME */
840 *pos++ = 0; /* WME info */
841 *pos++ = 1; /* WME ver */
842 *pos++ = qos_info;
843 }
844
845 /* add any remaining custom (i.e. vendor specific here) IEs */
b3f51e94 846 if (assoc_data->ie_len) {
66e67e41
JB
847 noffset = assoc_data->ie_len;
848 pos = skb_put(skb, noffset - offset);
849 memcpy(pos, assoc_data->ie + offset, noffset - offset);
850 }
851
a1845fc7
JB
852 drv_mgd_prepare_tx(local, sdata);
853
66e67e41 854 IEEE80211_SKB_CB(skb)->flags |= IEEE80211_TX_INTFL_DONT_ENCRYPT;
1672c0e3
JB
855 if (local->hw.flags & IEEE80211_HW_REPORTS_TX_ACK_STATUS)
856 IEEE80211_SKB_CB(skb)->flags |= IEEE80211_TX_CTL_REQ_TX_STATUS |
857 IEEE80211_TX_INTFL_MLME_CONN_TX;
66e67e41
JB
858 ieee80211_tx_skb(sdata, skb);
859}
860
572e0012
KV
861void ieee80211_send_pspoll(struct ieee80211_local *local,
862 struct ieee80211_sub_if_data *sdata)
863{
572e0012
KV
864 struct ieee80211_pspoll *pspoll;
865 struct sk_buff *skb;
572e0012 866
d8cd189e
KV
867 skb = ieee80211_pspoll_get(&local->hw, &sdata->vif);
868 if (!skb)
572e0012 869 return;
572e0012 870
d8cd189e
KV
871 pspoll = (struct ieee80211_pspoll *) skb->data;
872 pspoll->frame_control |= cpu_to_le16(IEEE80211_FCTL_PM);
572e0012 873
62ae67be
JB
874 IEEE80211_SKB_CB(skb)->flags |= IEEE80211_TX_INTFL_DONT_ENCRYPT;
875 ieee80211_tx_skb(sdata, skb);
572e0012
KV
876}
877
965bedad
JB
878void ieee80211_send_nullfunc(struct ieee80211_local *local,
879 struct ieee80211_sub_if_data *sdata,
880 int powersave)
881{
882 struct sk_buff *skb;
d8cd189e 883 struct ieee80211_hdr_3addr *nullfunc;
b6f35301 884 struct ieee80211_if_managed *ifmgd = &sdata->u.mgd;
965bedad 885
d8cd189e
KV
886 skb = ieee80211_nullfunc_get(&local->hw, &sdata->vif);
887 if (!skb)
965bedad 888 return;
965bedad 889
d8cd189e 890 nullfunc = (struct ieee80211_hdr_3addr *) skb->data;
965bedad 891 if (powersave)
d8cd189e 892 nullfunc->frame_control |= cpu_to_le16(IEEE80211_FCTL_PM);
965bedad 893
6c17b77b
SF
894 IEEE80211_SKB_CB(skb)->flags |= IEEE80211_TX_INTFL_DONT_ENCRYPT |
895 IEEE80211_TX_INTFL_OFFCHAN_TX_OK;
ff40b425
PF
896
897 if (local->hw.flags & IEEE80211_HW_REPORTS_TX_ACK_STATUS)
898 IEEE80211_SKB_CB(skb)->flags |= IEEE80211_TX_CTL_REQ_TX_STATUS;
899
392b9ffb 900 if (ifmgd->flags & IEEE80211_STA_CONNECTION_POLL)
b6f35301
RM
901 IEEE80211_SKB_CB(skb)->flags |= IEEE80211_TX_CTL_USE_MINRATE;
902
62ae67be 903 ieee80211_tx_skb(sdata, skb);
965bedad
JB
904}
905
d524215f
FF
906static void ieee80211_send_4addr_nullfunc(struct ieee80211_local *local,
907 struct ieee80211_sub_if_data *sdata)
908{
909 struct sk_buff *skb;
910 struct ieee80211_hdr *nullfunc;
911 __le16 fc;
912
913 if (WARN_ON(sdata->vif.type != NL80211_IFTYPE_STATION))
914 return;
915
916 skb = dev_alloc_skb(local->hw.extra_tx_headroom + 30);
d15b8459 917 if (!skb)
d524215f 918 return;
d15b8459 919
d524215f
FF
920 skb_reserve(skb, local->hw.extra_tx_headroom);
921
922 nullfunc = (struct ieee80211_hdr *) skb_put(skb, 30);
923 memset(nullfunc, 0, 30);
924 fc = cpu_to_le16(IEEE80211_FTYPE_DATA | IEEE80211_STYPE_NULLFUNC |
925 IEEE80211_FCTL_FROMDS | IEEE80211_FCTL_TODS);
926 nullfunc->frame_control = fc;
927 memcpy(nullfunc->addr1, sdata->u.mgd.bssid, ETH_ALEN);
928 memcpy(nullfunc->addr2, sdata->vif.addr, ETH_ALEN);
929 memcpy(nullfunc->addr3, sdata->u.mgd.bssid, ETH_ALEN);
930 memcpy(nullfunc->addr4, sdata->vif.addr, ETH_ALEN);
931
932 IEEE80211_SKB_CB(skb)->flags |= IEEE80211_TX_INTFL_DONT_ENCRYPT;
933 ieee80211_tx_skb(sdata, skb);
934}
935
cc32abd4
JB
936/* spectrum management related things */
937static void ieee80211_chswitch_work(struct work_struct *work)
938{
939 struct ieee80211_sub_if_data *sdata =
940 container_of(work, struct ieee80211_sub_if_data, u.mgd.chswitch_work);
675a0b04 941 struct ieee80211_local *local = sdata->local;
cc32abd4 942 struct ieee80211_if_managed *ifmgd = &sdata->u.mgd;
7578d575
AN
943 u32 changed = 0;
944 int ret;
cc32abd4 945
9607e6b6 946 if (!ieee80211_sdata_running(sdata))
cc32abd4
JB
947 return;
948
8d61ffa5 949 sdata_lock(sdata);
77fdaa12
JB
950 if (!ifmgd->associated)
951 goto out;
cc32abd4 952
34a3740d 953 mutex_lock(&local->mtx);
33787fc4 954 ret = ieee80211_vif_change_channel(sdata, &changed);
34a3740d 955 mutex_unlock(&local->mtx);
7578d575
AN
956 if (ret) {
957 sdata_info(sdata,
958 "vif channel switch failed, disconnecting\n");
959 ieee80211_queue_work(&sdata->local->hw,
960 &ifmgd->csa_connection_drop_work);
961 goto out;
962 }
675a0b04 963
7578d575 964 if (!local->use_chanctx) {
33787fc4 965 local->_oper_chandef = sdata->csa_chandef;
7578d575
AN
966 /* Call "hw_config" only if doing sw channel switch.
967 * Otherwise update the channel directly
968 */
969 if (!local->ops->channel_switch)
970 ieee80211_hw_config(local, 0);
971 else
972 local->hw.conf.chandef = local->_oper_chandef;
5ce6e438 973 }
77fdaa12 974
cc32abd4 975 /* XXX: shouldn't really modify cfg80211-owned data! */
33787fc4 976 ifmgd->associated->channel = sdata->csa_chandef.chan;
cc32abd4 977
59af6928
MK
978 ieee80211_bss_info_change_notify(sdata, changed);
979
980 mutex_lock(&local->mtx);
981 sdata->vif.csa_active = false;
57eebdf3 982 /* XXX: wait for a beacon first? */
59af6928
MK
983 if (!ieee80211_csa_needs_block_tx(local))
984 ieee80211_wake_queues_by_reason(&local->hw,
445ea4e8 985 IEEE80211_MAX_QUEUE_MAP,
cc32abd4 986 IEEE80211_QUEUE_STOP_REASON_CSA);
59af6928 987 mutex_unlock(&local->mtx);
7578d575 988
77fdaa12 989 ifmgd->flags &= ~IEEE80211_STA_CSA_RECEIVED;
59af6928
MK
990
991out:
8d61ffa5 992 sdata_unlock(sdata);
cc32abd4
JB
993}
994
5ce6e438
JB
995void ieee80211_chswitch_done(struct ieee80211_vif *vif, bool success)
996{
55de908a
JB
997 struct ieee80211_sub_if_data *sdata = vif_to_sdata(vif);
998 struct ieee80211_if_managed *ifmgd = &sdata->u.mgd;
5ce6e438
JB
999
1000 trace_api_chswitch_done(sdata, success);
1001 if (!success) {
882a7c69
JB
1002 sdata_info(sdata,
1003 "driver channel switch failed, disconnecting\n");
1004 ieee80211_queue_work(&sdata->local->hw,
1005 &ifmgd->csa_connection_drop_work);
1006 } else {
1007 ieee80211_queue_work(&sdata->local->hw, &ifmgd->chswitch_work);
5ce6e438 1008 }
5ce6e438
JB
1009}
1010EXPORT_SYMBOL(ieee80211_chswitch_done);
1011
cc32abd4
JB
1012static void ieee80211_chswitch_timer(unsigned long data)
1013{
1014 struct ieee80211_sub_if_data *sdata =
1015 (struct ieee80211_sub_if_data *) data;
5bb644a0 1016
9b7d72c1 1017 ieee80211_queue_work(&sdata->local->hw, &sdata->u.mgd.chswitch_work);
cc32abd4
JB
1018}
1019
37799e52 1020static void
4a3cb702 1021ieee80211_sta_process_chanswitch(struct ieee80211_sub_if_data *sdata,
04a161f4
JB
1022 u64 timestamp, struct ieee802_11_elems *elems,
1023 bool beacon)
cc32abd4 1024{
b4f286a1 1025 struct ieee80211_local *local = sdata->local;
cc32abd4 1026 struct ieee80211_if_managed *ifmgd = &sdata->u.mgd;
37799e52 1027 struct cfg80211_bss *cbss = ifmgd->associated;
55de908a 1028 struct ieee80211_chanctx *chanctx;
e6b7cde4 1029 enum ieee80211_band current_band;
c0f17eb9 1030 struct ieee80211_csa_ie csa_ie;
e6b7cde4 1031 int res;
cc32abd4 1032
8d61ffa5 1033 sdata_assert_lock(sdata);
77fdaa12 1034
37799e52 1035 if (!cbss)
cc32abd4
JB
1036 return;
1037
b4f286a1 1038 if (local->scanning)
cc32abd4
JB
1039 return;
1040
37799e52 1041 /* disregard subsequent announcements if we are already processing */
cc32abd4
JB
1042 if (ifmgd->flags & IEEE80211_STA_CSA_RECEIVED)
1043 return;
1044
e6b7cde4 1045 current_band = cbss->channel->band;
c0f17eb9 1046 memset(&csa_ie, 0, sizeof(csa_ie));
e6b7cde4
SW
1047 res = ieee80211_parse_ch_switch_ie(sdata, elems, beacon, current_band,
1048 ifmgd->flags,
c0f17eb9 1049 ifmgd->associated->bssid, &csa_ie);
e6b7cde4 1050 if (res < 0)
b4f286a1 1051 ieee80211_queue_work(&local->hw,
882a7c69 1052 &ifmgd->csa_connection_drop_work);
e6b7cde4 1053 if (res)
cc32abd4 1054 return;
cd64f2a9 1055
c0f17eb9 1056 if (!cfg80211_chandef_usable(local->hw.wiphy, &csa_ie.chandef,
85220d71
JB
1057 IEEE80211_CHAN_DISABLED)) {
1058 sdata_info(sdata,
1059 "AP %pM switches to unsupported channel (%d MHz, width:%d, CF1/2: %d/%d MHz), disconnecting\n",
e6b7cde4 1060 ifmgd->associated->bssid,
c0f17eb9
CYY
1061 csa_ie.chandef.chan->center_freq,
1062 csa_ie.chandef.width, csa_ie.chandef.center_freq1,
1063 csa_ie.chandef.center_freq2);
85220d71
JB
1064 ieee80211_queue_work(&local->hw,
1065 &ifmgd->csa_connection_drop_work);
1066 return;
1067 }
1068
57eebdf3
JB
1069 ifmgd->flags |= IEEE80211_STA_CSA_RECEIVED;
1070
7578d575 1071 mutex_lock(&local->chanctx_mtx);
b4f286a1 1072 if (local->use_chanctx) {
7578d575
AN
1073 u32 num_chanctx = 0;
1074 list_for_each_entry(chanctx, &local->chanctx_list, list)
1075 num_chanctx++;
1076
1077 if (num_chanctx > 1 ||
1078 !(local->hw.flags & IEEE80211_HW_CHANCTX_STA_CSA)) {
1079 sdata_info(sdata,
1080 "not handling chan-switch with channel contexts\n");
1081 ieee80211_queue_work(&local->hw,
1082 &ifmgd->csa_connection_drop_work);
1083 mutex_unlock(&local->chanctx_mtx);
1084 return;
1085 }
55de908a
JB
1086 }
1087
55de908a 1088 if (WARN_ON(!rcu_access_pointer(sdata->vif.chanctx_conf))) {
7578d575
AN
1089 ieee80211_queue_work(&local->hw,
1090 &ifmgd->csa_connection_drop_work);
b4f286a1 1091 mutex_unlock(&local->chanctx_mtx);
55de908a
JB
1092 return;
1093 }
1094 chanctx = container_of(rcu_access_pointer(sdata->vif.chanctx_conf),
1095 struct ieee80211_chanctx, conf);
c0166da9 1096 if (ieee80211_chanctx_refcount(local, chanctx) > 1) {
55de908a
JB
1097 sdata_info(sdata,
1098 "channel switch with multiple interfaces on the same channel, disconnecting\n");
b4f286a1 1099 ieee80211_queue_work(&local->hw,
55de908a 1100 &ifmgd->csa_connection_drop_work);
b4f286a1 1101 mutex_unlock(&local->chanctx_mtx);
55de908a
JB
1102 return;
1103 }
b4f286a1 1104 mutex_unlock(&local->chanctx_mtx);
55de908a 1105
33787fc4 1106 sdata->csa_chandef = csa_ie.chandef;
59af6928
MK
1107
1108 mutex_lock(&local->mtx);
c46a73f3 1109 sdata->vif.csa_active = true;
59af6928 1110 sdata->csa_block_tx = csa_ie.mode;
55de908a 1111
59af6928 1112 if (sdata->csa_block_tx)
b4f286a1 1113 ieee80211_stop_queues_by_reason(&local->hw,
59af6928
MK
1114 IEEE80211_MAX_QUEUE_MAP,
1115 IEEE80211_QUEUE_STOP_REASON_CSA);
1116 mutex_unlock(&local->mtx);
57eebdf3 1117
b4f286a1 1118 if (local->ops->channel_switch) {
5ce6e438 1119 /* use driver's channel switch callback */
57eebdf3
JB
1120 struct ieee80211_channel_switch ch_switch = {
1121 .timestamp = timestamp,
c0f17eb9
CYY
1122 .block_tx = csa_ie.mode,
1123 .chandef = csa_ie.chandef,
1124 .count = csa_ie.count,
57eebdf3
JB
1125 };
1126
b4f286a1 1127 drv_channel_switch(local, &ch_switch);
5ce6e438
JB
1128 return;
1129 }
1130
1131 /* channel switch handled in software */
c0f17eb9 1132 if (csa_ie.count <= 1)
b4f286a1 1133 ieee80211_queue_work(&local->hw, &ifmgd->chswitch_work);
57eebdf3 1134 else
cc32abd4 1135 mod_timer(&ifmgd->chswitch_timer,
c0f17eb9 1136 TU_TO_EXP_TIME(csa_ie.count * cbss->beacon_interval));
cc32abd4
JB
1137}
1138
1ea6f9c0
JB
1139static u32 ieee80211_handle_pwr_constr(struct ieee80211_sub_if_data *sdata,
1140 struct ieee80211_channel *channel,
1141 const u8 *country_ie, u8 country_ie_len,
1142 const u8 *pwr_constr_elem)
cc32abd4 1143{
04b7b2ff
JB
1144 struct ieee80211_country_ie_triplet *triplet;
1145 int chan = ieee80211_frequency_to_channel(channel->center_freq);
1146 int i, chan_pwr, chan_increment, new_ap_level;
1147 bool have_chan_pwr = false;
cc32abd4 1148
04b7b2ff
JB
1149 /* Invalid IE */
1150 if (country_ie_len % 2 || country_ie_len < IEEE80211_COUNTRY_IE_MIN_LEN)
1ea6f9c0 1151 return 0;
cc32abd4 1152
04b7b2ff
JB
1153 triplet = (void *)(country_ie + 3);
1154 country_ie_len -= 3;
1155
1156 switch (channel->band) {
1157 default:
1158 WARN_ON_ONCE(1);
1159 /* fall through */
1160 case IEEE80211_BAND_2GHZ:
1161 case IEEE80211_BAND_60GHZ:
1162 chan_increment = 1;
1163 break;
1164 case IEEE80211_BAND_5GHZ:
1165 chan_increment = 4;
1166 break;
cc32abd4 1167 }
04b7b2ff
JB
1168
1169 /* find channel */
1170 while (country_ie_len >= 3) {
1171 u8 first_channel = triplet->chans.first_channel;
1172
1173 if (first_channel >= IEEE80211_COUNTRY_EXTENSION_ID)
1174 goto next;
1175
1176 for (i = 0; i < triplet->chans.num_channels; i++) {
1177 if (first_channel + i * chan_increment == chan) {
1178 have_chan_pwr = true;
1179 chan_pwr = triplet->chans.max_power;
1180 break;
1181 }
1182 }
1183 if (have_chan_pwr)
1184 break;
1185
1186 next:
1187 triplet++;
1188 country_ie_len -= 3;
1189 }
1190
1191 if (!have_chan_pwr)
1ea6f9c0 1192 return 0;
04b7b2ff
JB
1193
1194 new_ap_level = max_t(int, 0, chan_pwr - *pwr_constr_elem);
1195
1ea6f9c0
JB
1196 if (sdata->ap_power_level == new_ap_level)
1197 return 0;
04b7b2ff
JB
1198
1199 sdata_info(sdata,
1200 "Limiting TX power to %d (%d - %d) dBm as advertised by %pM\n",
1201 new_ap_level, chan_pwr, *pwr_constr_elem,
1202 sdata->u.mgd.bssid);
1ea6f9c0
JB
1203 sdata->ap_power_level = new_ap_level;
1204 if (__ieee80211_recalc_txpower(sdata))
1205 return BSS_CHANGED_TXPOWER;
1206 return 0;
cc32abd4
JB
1207}
1208
965bedad
JB
1209/* powersave */
1210static void ieee80211_enable_ps(struct ieee80211_local *local,
1211 struct ieee80211_sub_if_data *sdata)
1212{
1213 struct ieee80211_conf *conf = &local->hw.conf;
1214
d5edaedc
JB
1215 /*
1216 * If we are scanning right now then the parameters will
1217 * take effect when scan finishes.
1218 */
fbe9c429 1219 if (local->scanning)
d5edaedc
JB
1220 return;
1221
965bedad
JB
1222 if (conf->dynamic_ps_timeout > 0 &&
1223 !(local->hw.flags & IEEE80211_HW_SUPPORTS_DYNAMIC_PS)) {
1224 mod_timer(&local->dynamic_ps_timer, jiffies +
1225 msecs_to_jiffies(conf->dynamic_ps_timeout));
1226 } else {
1227 if (local->hw.flags & IEEE80211_HW_PS_NULLFUNC_STACK)
1228 ieee80211_send_nullfunc(local, sdata, 1);
375177bf 1229
2a13052f
JO
1230 if ((local->hw.flags & IEEE80211_HW_PS_NULLFUNC_STACK) &&
1231 (local->hw.flags & IEEE80211_HW_REPORTS_TX_ACK_STATUS))
1232 return;
1233
1234 conf->flags |= IEEE80211_CONF_PS;
1235 ieee80211_hw_config(local, IEEE80211_CONF_CHANGE_PS);
965bedad
JB
1236 }
1237}
1238
1239static void ieee80211_change_ps(struct ieee80211_local *local)
1240{
1241 struct ieee80211_conf *conf = &local->hw.conf;
1242
1243 if (local->ps_sdata) {
965bedad
JB
1244 ieee80211_enable_ps(local, local->ps_sdata);
1245 } else if (conf->flags & IEEE80211_CONF_PS) {
1246 conf->flags &= ~IEEE80211_CONF_PS;
1247 ieee80211_hw_config(local, IEEE80211_CONF_CHANGE_PS);
1248 del_timer_sync(&local->dynamic_ps_timer);
1249 cancel_work_sync(&local->dynamic_ps_enable_work);
1250 }
1251}
1252
808118cb
JY
1253static bool ieee80211_powersave_allowed(struct ieee80211_sub_if_data *sdata)
1254{
1255 struct ieee80211_if_managed *mgd = &sdata->u.mgd;
1256 struct sta_info *sta = NULL;
c2c98fde 1257 bool authorized = false;
808118cb
JY
1258
1259 if (!mgd->powersave)
1260 return false;
1261
05cb9108
JB
1262 if (mgd->broken_ap)
1263 return false;
1264
808118cb
JY
1265 if (!mgd->associated)
1266 return false;
1267
392b9ffb 1268 if (mgd->flags & IEEE80211_STA_CONNECTION_POLL)
808118cb
JY
1269 return false;
1270
989c6505 1271 if (!mgd->have_beacon)
ce857888
AB
1272 return false;
1273
808118cb
JY
1274 rcu_read_lock();
1275 sta = sta_info_get(sdata, mgd->bssid);
1276 if (sta)
c2c98fde 1277 authorized = test_sta_flag(sta, WLAN_STA_AUTHORIZED);
808118cb
JY
1278 rcu_read_unlock();
1279
c2c98fde 1280 return authorized;
808118cb
JY
1281}
1282
965bedad 1283/* need to hold RTNL or interface lock */
10f644a4 1284void ieee80211_recalc_ps(struct ieee80211_local *local, s32 latency)
965bedad
JB
1285{
1286 struct ieee80211_sub_if_data *sdata, *found = NULL;
1287 int count = 0;
195e294d 1288 int timeout;
965bedad
JB
1289
1290 if (!(local->hw.flags & IEEE80211_HW_SUPPORTS_PS)) {
1291 local->ps_sdata = NULL;
1292 return;
1293 }
1294
1295 list_for_each_entry(sdata, &local->interfaces, list) {
9607e6b6 1296 if (!ieee80211_sdata_running(sdata))
965bedad 1297 continue;
8c7914de
RM
1298 if (sdata->vif.type == NL80211_IFTYPE_AP) {
1299 /* If an AP vif is found, then disable PS
1300 * by setting the count to zero thereby setting
1301 * ps_sdata to NULL.
1302 */
1303 count = 0;
1304 break;
1305 }
965bedad
JB
1306 if (sdata->vif.type != NL80211_IFTYPE_STATION)
1307 continue;
1308 found = sdata;
1309 count++;
1310 }
1311
808118cb 1312 if (count == 1 && ieee80211_powersave_allowed(found)) {
10f644a4
JB
1313 s32 beaconint_us;
1314
1315 if (latency < 0)
ed77134b 1316 latency = pm_qos_request(PM_QOS_NETWORK_LATENCY);
10f644a4
JB
1317
1318 beaconint_us = ieee80211_tu_to_usec(
1319 found->vif.bss_conf.beacon_int);
1320
ff616381 1321 timeout = local->dynamic_ps_forced_timeout;
195e294d
JO
1322 if (timeout < 0) {
1323 /*
ff616381
JO
1324 * Go to full PSM if the user configures a very low
1325 * latency requirement.
0ab82b04
EP
1326 * The 2000 second value is there for compatibility
1327 * until the PM_QOS_NETWORK_LATENCY is configured
1328 * with real values.
195e294d 1329 */
0ab82b04
EP
1330 if (latency > (1900 * USEC_PER_MSEC) &&
1331 latency != (2000 * USEC_PER_SEC))
195e294d 1332 timeout = 0;
ff616381
JO
1333 else
1334 timeout = 100;
195e294d 1335 }
09b85568 1336 local->hw.conf.dynamic_ps_timeout = timeout;
195e294d 1337
04fe2037 1338 if (beaconint_us > latency) {
10f644a4 1339 local->ps_sdata = NULL;
04fe2037 1340 } else {
04fe2037 1341 int maxslp = 1;
826262c3 1342 u8 dtimper = found->u.mgd.dtim_period;
56007a02
JB
1343
1344 /* If the TIM IE is invalid, pretend the value is 1 */
1345 if (!dtimper)
1346 dtimper = 1;
1347 else if (dtimper > 1)
04fe2037
JB
1348 maxslp = min_t(int, dtimper,
1349 latency / beaconint_us);
1350
9ccebe61 1351 local->hw.conf.max_sleep_period = maxslp;
56007a02 1352 local->hw.conf.ps_dtim_period = dtimper;
10f644a4 1353 local->ps_sdata = found;
04fe2037 1354 }
10f644a4 1355 } else {
965bedad 1356 local->ps_sdata = NULL;
10f644a4 1357 }
965bedad
JB
1358
1359 ieee80211_change_ps(local);
1360}
1361
ab095877
EP
1362void ieee80211_recalc_ps_vif(struct ieee80211_sub_if_data *sdata)
1363{
1364 bool ps_allowed = ieee80211_powersave_allowed(sdata);
1365
1366 if (sdata->vif.bss_conf.ps != ps_allowed) {
1367 sdata->vif.bss_conf.ps = ps_allowed;
1368 ieee80211_bss_info_change_notify(sdata, BSS_CHANGED_PS);
1369 }
1370}
1371
965bedad
JB
1372void ieee80211_dynamic_ps_disable_work(struct work_struct *work)
1373{
1374 struct ieee80211_local *local =
1375 container_of(work, struct ieee80211_local,
1376 dynamic_ps_disable_work);
1377
1378 if (local->hw.conf.flags & IEEE80211_CONF_PS) {
1379 local->hw.conf.flags &= ~IEEE80211_CONF_PS;
1380 ieee80211_hw_config(local, IEEE80211_CONF_CHANGE_PS);
1381 }
1382
1383 ieee80211_wake_queues_by_reason(&local->hw,
445ea4e8 1384 IEEE80211_MAX_QUEUE_MAP,
965bedad
JB
1385 IEEE80211_QUEUE_STOP_REASON_PS);
1386}
1387
1388void ieee80211_dynamic_ps_enable_work(struct work_struct *work)
1389{
1390 struct ieee80211_local *local =
1391 container_of(work, struct ieee80211_local,
1392 dynamic_ps_enable_work);
1393 struct ieee80211_sub_if_data *sdata = local->ps_sdata;
5e34069c 1394 struct ieee80211_if_managed *ifmgd;
1ddc2867
RM
1395 unsigned long flags;
1396 int q;
965bedad
JB
1397
1398 /* can only happen when PS was just disabled anyway */
1399 if (!sdata)
1400 return;
1401
5e34069c
CL
1402 ifmgd = &sdata->u.mgd;
1403
965bedad
JB
1404 if (local->hw.conf.flags & IEEE80211_CONF_PS)
1405 return;
1406
09b85568 1407 if (local->hw.conf.dynamic_ps_timeout > 0) {
77b7023a
AN
1408 /* don't enter PS if TX frames are pending */
1409 if (drv_tx_frames_pending(local)) {
1ddc2867
RM
1410 mod_timer(&local->dynamic_ps_timer, jiffies +
1411 msecs_to_jiffies(
1412 local->hw.conf.dynamic_ps_timeout));
1413 return;
1414 }
77b7023a
AN
1415
1416 /*
1417 * transmission can be stopped by others which leads to
1418 * dynamic_ps_timer expiry. Postpone the ps timer if it
1419 * is not the actual idle state.
1420 */
1421 spin_lock_irqsave(&local->queue_stop_reason_lock, flags);
1422 for (q = 0; q < local->hw.queues; q++) {
1423 if (local->queue_stop_reasons[q]) {
1424 spin_unlock_irqrestore(&local->queue_stop_reason_lock,
1425 flags);
1426 mod_timer(&local->dynamic_ps_timer, jiffies +
1427 msecs_to_jiffies(
1428 local->hw.conf.dynamic_ps_timeout));
1429 return;
1430 }
1431 }
1432 spin_unlock_irqrestore(&local->queue_stop_reason_lock, flags);
1ddc2867 1433 }
1ddc2867 1434
375177bf 1435 if ((local->hw.flags & IEEE80211_HW_PS_NULLFUNC_STACK) &&
9c38a8b4 1436 !(ifmgd->flags & IEEE80211_STA_NULLFUNC_ACKED)) {
a1598383 1437 if (drv_tx_frames_pending(local)) {
e8306f98
VN
1438 mod_timer(&local->dynamic_ps_timer, jiffies +
1439 msecs_to_jiffies(
1440 local->hw.conf.dynamic_ps_timeout));
a1598383 1441 } else {
e8306f98
VN
1442 ieee80211_send_nullfunc(local, sdata, 1);
1443 /* Flush to get the tx status of nullfunc frame */
39ecc01d 1444 ieee80211_flush_queues(local, sdata);
e8306f98 1445 }
f3e85b9e
VN
1446 }
1447
2a13052f
JO
1448 if (!((local->hw.flags & IEEE80211_HW_REPORTS_TX_ACK_STATUS) &&
1449 (local->hw.flags & IEEE80211_HW_PS_NULLFUNC_STACK)) ||
375177bf
VN
1450 (ifmgd->flags & IEEE80211_STA_NULLFUNC_ACKED)) {
1451 ifmgd->flags &= ~IEEE80211_STA_NULLFUNC_ACKED;
1452 local->hw.conf.flags |= IEEE80211_CONF_PS;
1453 ieee80211_hw_config(local, IEEE80211_CONF_CHANGE_PS);
1454 }
965bedad
JB
1455}
1456
1457void ieee80211_dynamic_ps_timer(unsigned long data)
1458{
1459 struct ieee80211_local *local = (void *) data;
1460
78f1a8b7 1461 if (local->quiescing || local->suspended)
5bb644a0
JB
1462 return;
1463
42935eca 1464 ieee80211_queue_work(&local->hw, &local->dynamic_ps_enable_work);
965bedad
JB
1465}
1466
164eb02d
SW
1467void ieee80211_dfs_cac_timer_work(struct work_struct *work)
1468{
1469 struct delayed_work *delayed_work =
1470 container_of(work, struct delayed_work, work);
1471 struct ieee80211_sub_if_data *sdata =
1472 container_of(delayed_work, struct ieee80211_sub_if_data,
1473 dfs_cac_timer_work);
d2859df5 1474 struct cfg80211_chan_def chandef = sdata->vif.bss_conf.chandef;
164eb02d 1475
34a3740d
JB
1476 mutex_lock(&sdata->local->mtx);
1477 if (sdata->wdev.cac_started) {
1478 ieee80211_vif_release_channel(sdata);
1479 cfg80211_cac_event(sdata->dev, &chandef,
1480 NL80211_RADAR_CAC_FINISHED,
1481 GFP_KERNEL);
1482 }
1483 mutex_unlock(&sdata->local->mtx);
164eb02d
SW
1484}
1485
60f8b39c 1486/* MLME */
7d25745d 1487static bool ieee80211_sta_wmm_params(struct ieee80211_local *local,
4ced3f74 1488 struct ieee80211_sub_if_data *sdata,
4a3cb702 1489 const u8 *wmm_param, size_t wmm_param_len)
f0706e82 1490{
f0706e82 1491 struct ieee80211_tx_queue_params params;
4ced3f74 1492 struct ieee80211_if_managed *ifmgd = &sdata->u.mgd;
f0706e82
JB
1493 size_t left;
1494 int count;
4a3cb702
JB
1495 const u8 *pos;
1496 u8 uapsd_queues = 0;
f0706e82 1497
e1b3ec1a 1498 if (!local->ops->conf_tx)
7d25745d 1499 return false;
e1b3ec1a 1500
32c5057b 1501 if (local->hw.queues < IEEE80211_NUM_ACS)
7d25745d 1502 return false;
3434fbd3
JB
1503
1504 if (!wmm_param)
7d25745d 1505 return false;
3434fbd3 1506
f0706e82 1507 if (wmm_param_len < 8 || wmm_param[5] /* version */ != 1)
7d25745d 1508 return false;
ab13315a
KV
1509
1510 if (ifmgd->flags & IEEE80211_STA_UAPSD_ENABLED)
dc41e4d4 1511 uapsd_queues = ifmgd->uapsd_queues;
ab13315a 1512
f0706e82 1513 count = wmm_param[6] & 0x0f;
46900298 1514 if (count == ifmgd->wmm_last_param_set)
7d25745d 1515 return false;
46900298 1516 ifmgd->wmm_last_param_set = count;
f0706e82
JB
1517
1518 pos = wmm_param + 8;
1519 left = wmm_param_len - 8;
1520
1521 memset(&params, 0, sizeof(params));
1522
00e96dec 1523 sdata->wmm_acm = 0;
f0706e82
JB
1524 for (; left >= 4; left -= 4, pos += 4) {
1525 int aci = (pos[0] >> 5) & 0x03;
1526 int acm = (pos[0] >> 4) & 0x01;
ab13315a 1527 bool uapsd = false;
f0706e82
JB
1528 int queue;
1529
1530 switch (aci) {
0eeb59fe 1531 case 1: /* AC_BK */
e100bb64 1532 queue = 3;
988c0f72 1533 if (acm)
00e96dec 1534 sdata->wmm_acm |= BIT(1) | BIT(2); /* BK/- */
ab13315a
KV
1535 if (uapsd_queues & IEEE80211_WMM_IE_STA_QOSINFO_AC_BK)
1536 uapsd = true;
f0706e82 1537 break;
0eeb59fe 1538 case 2: /* AC_VI */
e100bb64 1539 queue = 1;
988c0f72 1540 if (acm)
00e96dec 1541 sdata->wmm_acm |= BIT(4) | BIT(5); /* CL/VI */
ab13315a
KV
1542 if (uapsd_queues & IEEE80211_WMM_IE_STA_QOSINFO_AC_VI)
1543 uapsd = true;
f0706e82 1544 break;
0eeb59fe 1545 case 3: /* AC_VO */
e100bb64 1546 queue = 0;
988c0f72 1547 if (acm)
00e96dec 1548 sdata->wmm_acm |= BIT(6) | BIT(7); /* VO/NC */
ab13315a
KV
1549 if (uapsd_queues & IEEE80211_WMM_IE_STA_QOSINFO_AC_VO)
1550 uapsd = true;
f0706e82 1551 break;
0eeb59fe 1552 case 0: /* AC_BE */
f0706e82 1553 default:
e100bb64 1554 queue = 2;
988c0f72 1555 if (acm)
00e96dec 1556 sdata->wmm_acm |= BIT(0) | BIT(3); /* BE/EE */
ab13315a
KV
1557 if (uapsd_queues & IEEE80211_WMM_IE_STA_QOSINFO_AC_BE)
1558 uapsd = true;
f0706e82
JB
1559 break;
1560 }
1561
1562 params.aifs = pos[0] & 0x0f;
1563 params.cw_max = ecw2cw((pos[1] & 0xf0) >> 4);
1564 params.cw_min = ecw2cw(pos[1] & 0x0f);
f434b2d1 1565 params.txop = get_unaligned_le16(pos + 2);
908f8d07 1566 params.acm = acm;
ab13315a
KV
1567 params.uapsd = uapsd;
1568
bdcbd8e0
JB
1569 mlme_dbg(sdata,
1570 "WMM queue=%d aci=%d acm=%d aifs=%d cWmin=%d cWmax=%d txop=%d uapsd=%d\n",
1571 queue, aci, acm,
1572 params.aifs, params.cw_min, params.cw_max,
1573 params.txop, params.uapsd);
f6f3def3
EP
1574 sdata->tx_conf[queue] = params;
1575 if (drv_conf_tx(local, sdata, queue, &params))
bdcbd8e0
JB
1576 sdata_err(sdata,
1577 "failed to set TX queue parameters for queue %d\n",
1578 queue);
f0706e82 1579 }
e1b3ec1a
SG
1580
1581 /* enable WMM or activate new settings */
4ced3f74 1582 sdata->vif.bss_conf.qos = true;
7d25745d 1583 return true;
f0706e82
JB
1584}
1585
925e64c3
SG
1586static void __ieee80211_stop_poll(struct ieee80211_sub_if_data *sdata)
1587{
1588 lockdep_assert_held(&sdata->local->mtx);
1589
392b9ffb 1590 sdata->u.mgd.flags &= ~IEEE80211_STA_CONNECTION_POLL;
925e64c3
SG
1591 ieee80211_run_deferred_scan(sdata->local);
1592}
1593
1594static void ieee80211_stop_poll(struct ieee80211_sub_if_data *sdata)
1595{
1596 mutex_lock(&sdata->local->mtx);
1597 __ieee80211_stop_poll(sdata);
1598 mutex_unlock(&sdata->local->mtx);
1599}
1600
7a5158ef
JB
1601static u32 ieee80211_handle_bss_capability(struct ieee80211_sub_if_data *sdata,
1602 u16 capab, bool erp_valid, u8 erp)
5628221c 1603{
bda3933a 1604 struct ieee80211_bss_conf *bss_conf = &sdata->vif.bss_conf;
471b3efd 1605 u32 changed = 0;
7a5158ef
JB
1606 bool use_protection;
1607 bool use_short_preamble;
1608 bool use_short_slot;
1609
1610 if (erp_valid) {
1611 use_protection = (erp & WLAN_ERP_USE_PROTECTION) != 0;
1612 use_short_preamble = (erp & WLAN_ERP_BARKER_PREAMBLE) == 0;
1613 } else {
1614 use_protection = false;
1615 use_short_preamble = !!(capab & WLAN_CAPABILITY_SHORT_PREAMBLE);
1616 }
1617
1618 use_short_slot = !!(capab & WLAN_CAPABILITY_SHORT_SLOT_TIME);
55de908a 1619 if (ieee80211_get_sdata_band(sdata) == IEEE80211_BAND_5GHZ)
43d35343 1620 use_short_slot = true;
5628221c 1621
471b3efd 1622 if (use_protection != bss_conf->use_cts_prot) {
471b3efd
JB
1623 bss_conf->use_cts_prot = use_protection;
1624 changed |= BSS_CHANGED_ERP_CTS_PROT;
5628221c 1625 }
7e9ed188 1626
d43c7b37 1627 if (use_short_preamble != bss_conf->use_short_preamble) {
d43c7b37 1628 bss_conf->use_short_preamble = use_short_preamble;
471b3efd 1629 changed |= BSS_CHANGED_ERP_PREAMBLE;
7e9ed188 1630 }
d9430a32 1631
7a5158ef 1632 if (use_short_slot != bss_conf->use_short_slot) {
7a5158ef
JB
1633 bss_conf->use_short_slot = use_short_slot;
1634 changed |= BSS_CHANGED_ERP_SLOT;
50c4afb9
JL
1635 }
1636
1637 return changed;
1638}
1639
f698d856 1640static void ieee80211_set_associated(struct ieee80211_sub_if_data *sdata,
0c1ad2ca 1641 struct cfg80211_bss *cbss,
ae5eb026 1642 u32 bss_info_changed)
f0706e82 1643{
0c1ad2ca 1644 struct ieee80211_bss *bss = (void *)cbss->priv;
471b3efd 1645 struct ieee80211_local *local = sdata->local;
68542962 1646 struct ieee80211_bss_conf *bss_conf = &sdata->vif.bss_conf;
d6f2da5b 1647
ae5eb026 1648 bss_info_changed |= BSS_CHANGED_ASSOC;
77fdaa12 1649 bss_info_changed |= ieee80211_handle_bss_capability(sdata,
50ae34a2 1650 bss_conf->assoc_capability, bss->has_erp_value, bss->erp_value);
21c0cbe7 1651
7ccc8bd7 1652 sdata->u.mgd.beacon_timeout = usecs_to_jiffies(ieee80211_tu_to_usec(
59c1ec2b 1653 beacon_loss_count * bss_conf->beacon_int));
7ccc8bd7 1654
0c1ad2ca
JB
1655 sdata->u.mgd.associated = cbss;
1656 memcpy(sdata->u.mgd.bssid, cbss->bssid, ETH_ALEN);
f0706e82 1657
17e4ec14
JM
1658 sdata->u.mgd.flags |= IEEE80211_STA_RESET_SIGNAL_AVE;
1659
488dd7b5 1660 if (sdata->vif.p2p) {
9caf0364 1661 const struct cfg80211_bss_ies *ies;
488dd7b5 1662
9caf0364
JB
1663 rcu_read_lock();
1664 ies = rcu_dereference(cbss->ies);
1665 if (ies) {
9caf0364
JB
1666 int ret;
1667
1668 ret = cfg80211_get_p2p_attr(
1669 ies->data, ies->len,
1670 IEEE80211_P2P_ATTR_ABSENCE_NOTICE,
67baf663
JD
1671 (u8 *) &bss_conf->p2p_noa_attr,
1672 sizeof(bss_conf->p2p_noa_attr));
9caf0364 1673 if (ret >= 2) {
67baf663
JD
1674 sdata->u.mgd.p2p_noa_index =
1675 bss_conf->p2p_noa_attr.index;
9caf0364 1676 bss_info_changed |= BSS_CHANGED_P2P_PS;
9caf0364 1677 }
488dd7b5 1678 }
9caf0364 1679 rcu_read_unlock();
488dd7b5
JB
1680 }
1681
b291ba11 1682 /* just to be sure */
925e64c3 1683 ieee80211_stop_poll(sdata);
b291ba11 1684
9ac19a90 1685 ieee80211_led_assoc(local, 1);
9306102e 1686
989c6505 1687 if (sdata->u.mgd.have_beacon) {
826262c3
JB
1688 /*
1689 * If the AP is buggy we may get here with no DTIM period
1690 * known, so assume it's 1 which is the only safe assumption
1691 * in that case, although if the TIM IE is broken powersave
1692 * probably just won't work at all.
1693 */
1694 bss_conf->dtim_period = sdata->u.mgd.dtim_period ?: 1;
817cee76 1695 bss_conf->beacon_rate = bss->beacon_rate;
989c6505 1696 bss_info_changed |= BSS_CHANGED_BEACON_INFO;
826262c3 1697 } else {
817cee76 1698 bss_conf->beacon_rate = NULL;
e5b900d2 1699 bss_conf->dtim_period = 0;
826262c3 1700 }
e5b900d2 1701
68542962 1702 bss_conf->assoc = 1;
9cef8737 1703
a97c13c3 1704 /* Tell the driver to monitor connection quality (if supported) */
ea086359 1705 if (sdata->vif.driver_flags & IEEE80211_VIF_SUPPORTS_CQM_RSSI &&
68542962 1706 bss_conf->cqm_rssi_thold)
a97c13c3
JO
1707 bss_info_changed |= BSS_CHANGED_CQM;
1708
68542962 1709 /* Enable ARP filtering */
0f19b41e 1710 if (bss_conf->arp_addr_cnt)
68542962 1711 bss_info_changed |= BSS_CHANGED_ARP_FILTER;
68542962 1712
ae5eb026 1713 ieee80211_bss_info_change_notify(sdata, bss_info_changed);
f0706e82 1714
056508dc
JB
1715 mutex_lock(&local->iflist_mtx);
1716 ieee80211_recalc_ps(local, -1);
1717 mutex_unlock(&local->iflist_mtx);
e0cb686f 1718
04ecd257 1719 ieee80211_recalc_smps(sdata);
ab095877
EP
1720 ieee80211_recalc_ps_vif(sdata);
1721
9ac19a90 1722 netif_carrier_on(sdata->dev);
f0706e82
JB
1723}
1724
e69e95db 1725static void ieee80211_set_disassoc(struct ieee80211_sub_if_data *sdata,
37ad3888
JB
1726 u16 stype, u16 reason, bool tx,
1727 u8 *frame_buf)
aa458d17 1728{
46900298 1729 struct ieee80211_if_managed *ifmgd = &sdata->u.mgd;
aa458d17 1730 struct ieee80211_local *local = sdata->local;
3cc5240b 1731 u32 changed = 0;
aa458d17 1732
8d61ffa5 1733 sdata_assert_lock(sdata);
77fdaa12 1734
37ad3888
JB
1735 if (WARN_ON_ONCE(tx && !frame_buf))
1736 return;
1737
b291ba11
JB
1738 if (WARN_ON(!ifmgd->associated))
1739 return;
1740
79543d8e
DS
1741 ieee80211_stop_poll(sdata);
1742
77fdaa12 1743 ifmgd->associated = NULL;
aa458d17
TW
1744 netif_carrier_off(sdata->dev);
1745
88bc40e8
EP
1746 /*
1747 * if we want to get out of ps before disassoc (why?) we have
1748 * to do it before sending disassoc, as otherwise the null-packet
1749 * won't be valid.
1750 */
1751 if (local->hw.conf.flags & IEEE80211_CONF_PS) {
1752 local->hw.conf.flags &= ~IEEE80211_CONF_PS;
1753 ieee80211_hw_config(local, IEEE80211_CONF_CHANGE_PS);
1754 }
1755 local->ps_sdata = NULL;
1756
ab095877
EP
1757 /* disable per-vif ps */
1758 ieee80211_recalc_ps_vif(sdata);
1759
f823981e
EP
1760 /* flush out any pending frame (e.g. DELBA) before deauth/disassoc */
1761 if (tx)
39ecc01d 1762 ieee80211_flush_queues(local, sdata);
f823981e 1763
37ad3888
JB
1764 /* deauthenticate/disassociate now */
1765 if (tx || frame_buf)
88a9e31c
EP
1766 ieee80211_send_deauth_disassoc(sdata, ifmgd->bssid, stype,
1767 reason, tx, frame_buf);
37ad3888
JB
1768
1769 /* flush out frame */
1770 if (tx)
39ecc01d 1771 ieee80211_flush_queues(local, sdata);
37ad3888 1772
88a9e31c
EP
1773 /* clear bssid only after building the needed mgmt frames */
1774 memset(ifmgd->bssid, 0, ETH_ALEN);
1775
37ad3888 1776 /* remove AP and TDLS peers */
d34ba216 1777 sta_info_flush(sdata);
37ad3888
JB
1778
1779 /* finally reset all BSS / config parameters */
f5e5bf25
TW
1780 changed |= ieee80211_reset_erp_info(sdata);
1781
f5e5bf25 1782 ieee80211_led_assoc(local, 0);
ae5eb026
JB
1783 changed |= BSS_CHANGED_ASSOC;
1784 sdata->vif.bss_conf.assoc = false;
f5e5bf25 1785
67baf663
JD
1786 ifmgd->p2p_noa_index = -1;
1787 memset(&sdata->vif.bss_conf.p2p_noa_attr, 0,
1788 sizeof(sdata->vif.bss_conf.p2p_noa_attr));
488dd7b5 1789
dd5ecfea 1790 /* on the next assoc, re-program HT/VHT parameters */
ef96a842
BG
1791 memset(&ifmgd->ht_capa, 0, sizeof(ifmgd->ht_capa));
1792 memset(&ifmgd->ht_capa_mask, 0, sizeof(ifmgd->ht_capa_mask));
dd5ecfea
JB
1793 memset(&ifmgd->vht_capa, 0, sizeof(ifmgd->vht_capa));
1794 memset(&ifmgd->vht_capa_mask, 0, sizeof(ifmgd->vht_capa_mask));
413ad50a 1795
1ea6f9c0 1796 sdata->ap_power_level = IEEE80211_UNSET_POWER_LEVEL;
a8302de9 1797
520eb820
KV
1798 del_timer_sync(&local->dynamic_ps_timer);
1799 cancel_work_sync(&local->dynamic_ps_enable_work);
1800
68542962 1801 /* Disable ARP filtering */
0f19b41e 1802 if (sdata->vif.bss_conf.arp_addr_cnt)
68542962 1803 changed |= BSS_CHANGED_ARP_FILTER;
68542962 1804
3abead59
JB
1805 sdata->vif.bss_conf.qos = false;
1806 changed |= BSS_CHANGED_QOS;
1807
0aaffa9b
JB
1808 /* The BSSID (not really interesting) and HT changed */
1809 changed |= BSS_CHANGED_BSSID | BSS_CHANGED_HT;
ae5eb026 1810 ieee80211_bss_info_change_notify(sdata, changed);
8e268e47 1811
3abead59
JB
1812 /* disassociated - set to defaults now */
1813 ieee80211_set_wmm_default(sdata, false);
1814
b9dcf712
JB
1815 del_timer_sync(&sdata->u.mgd.conn_mon_timer);
1816 del_timer_sync(&sdata->u.mgd.bcn_mon_timer);
1817 del_timer_sync(&sdata->u.mgd.timer);
1818 del_timer_sync(&sdata->u.mgd.chswitch_timer);
2d9957cc 1819
826262c3 1820 sdata->vif.bss_conf.dtim_period = 0;
817cee76
AB
1821 sdata->vif.bss_conf.beacon_rate = NULL;
1822
989c6505 1823 ifmgd->have_beacon = false;
826262c3 1824
028e8da0 1825 ifmgd->flags = 0;
34a3740d 1826 mutex_lock(&local->mtx);
028e8da0 1827 ieee80211_vif_release_channel(sdata);
59af6928
MK
1828
1829 sdata->vif.csa_active = false;
1830 if (!ieee80211_csa_needs_block_tx(local))
1831 ieee80211_wake_queues_by_reason(&local->hw,
1832 IEEE80211_MAX_QUEUE_MAP,
1833 IEEE80211_QUEUE_STOP_REASON_CSA);
34a3740d 1834 mutex_unlock(&local->mtx);
2475b1cc
MS
1835
1836 sdata->encrypt_headroom = IEEE80211_ENCRYPT_HEADROOM;
aa458d17 1837}
f0706e82 1838
3cf335d5
KV
1839void ieee80211_sta_rx_notify(struct ieee80211_sub_if_data *sdata,
1840 struct ieee80211_hdr *hdr)
1841{
1842 /*
1843 * We can postpone the mgd.timer whenever receiving unicast frames
1844 * from AP because we know that the connection is working both ways
1845 * at that time. But multicast frames (and hence also beacons) must
1846 * be ignored here, because we need to trigger the timer during
b291ba11
JB
1847 * data idle periods for sending the periodic probe request to the
1848 * AP we're connected to.
3cf335d5 1849 */
b291ba11
JB
1850 if (is_multicast_ether_addr(hdr->addr1))
1851 return;
1852
be099e82 1853 ieee80211_sta_reset_conn_monitor(sdata);
3cf335d5 1854}
f0706e82 1855
4e5ff376
FF
1856static void ieee80211_reset_ap_probe(struct ieee80211_sub_if_data *sdata)
1857{
1858 struct ieee80211_if_managed *ifmgd = &sdata->u.mgd;
133d40f9 1859 struct ieee80211_local *local = sdata->local;
4e5ff376 1860
133d40f9 1861 mutex_lock(&local->mtx);
392b9ffb
SG
1862 if (!(ifmgd->flags & IEEE80211_STA_CONNECTION_POLL))
1863 goto out;
4e5ff376 1864
925e64c3 1865 __ieee80211_stop_poll(sdata);
133d40f9
SG
1866
1867 mutex_lock(&local->iflist_mtx);
1868 ieee80211_recalc_ps(local, -1);
1869 mutex_unlock(&local->iflist_mtx);
4e5ff376
FF
1870
1871 if (sdata->local->hw.flags & IEEE80211_HW_CONNECTION_MONITOR)
133d40f9 1872 goto out;
4e5ff376
FF
1873
1874 /*
1875 * We've received a probe response, but are not sure whether
1876 * we have or will be receiving any beacons or data, so let's
1877 * schedule the timers again, just in case.
1878 */
1879 ieee80211_sta_reset_beacon_monitor(sdata);
1880
1881 mod_timer(&ifmgd->conn_mon_timer,
1882 round_jiffies_up(jiffies +
1883 IEEE80211_CONNECTION_IDLE_TIME));
133d40f9 1884out:
133d40f9 1885 mutex_unlock(&local->mtx);
4e5ff376
FF
1886}
1887
1888void ieee80211_sta_tx_notify(struct ieee80211_sub_if_data *sdata,
04ac3c0e 1889 struct ieee80211_hdr *hdr, bool ack)
4e5ff376 1890{
75706d0e 1891 if (!ieee80211_is_data(hdr->frame_control))
4e5ff376
FF
1892 return;
1893
4e5ff376
FF
1894 if (ieee80211_is_nullfunc(hdr->frame_control) &&
1895 sdata->u.mgd.probe_send_count > 0) {
04ac3c0e 1896 if (ack)
cab1c7fd 1897 ieee80211_sta_reset_conn_monitor(sdata);
04ac3c0e
FF
1898 else
1899 sdata->u.mgd.nullfunc_failed = true;
4e5ff376 1900 ieee80211_queue_work(&sdata->local->hw, &sdata->work);
cab1c7fd 1901 return;
4e5ff376 1902 }
cab1c7fd
WD
1903
1904 if (ack)
1905 ieee80211_sta_reset_conn_monitor(sdata);
4e5ff376
FF
1906}
1907
a43abf29
ML
1908static void ieee80211_mgd_probe_ap_send(struct ieee80211_sub_if_data *sdata)
1909{
1910 struct ieee80211_if_managed *ifmgd = &sdata->u.mgd;
1911 const u8 *ssid;
f01a067d 1912 u8 *dst = ifmgd->associated->bssid;
180205bd 1913 u8 unicast_limit = max(1, max_probe_tries - 3);
f01a067d
LR
1914
1915 /*
1916 * Try sending broadcast probe requests for the last three
1917 * probe requests after the first ones failed since some
1918 * buggy APs only support broadcast probe requests.
1919 */
1920 if (ifmgd->probe_send_count >= unicast_limit)
1921 dst = NULL;
a43abf29 1922
4e5ff376
FF
1923 /*
1924 * When the hardware reports an accurate Tx ACK status, it's
1925 * better to send a nullfunc frame instead of a probe request,
1926 * as it will kick us off the AP quickly if we aren't associated
1927 * anymore. The timeout will be reset if the frame is ACKed by
1928 * the AP.
1929 */
992e68bf
SD
1930 ifmgd->probe_send_count++;
1931
04ac3c0e
FF
1932 if (sdata->local->hw.flags & IEEE80211_HW_REPORTS_TX_ACK_STATUS) {
1933 ifmgd->nullfunc_failed = false;
4e5ff376 1934 ieee80211_send_nullfunc(sdata->local, sdata, 0);
04ac3c0e 1935 } else {
88c868c4
SG
1936 int ssid_len;
1937
9caf0364 1938 rcu_read_lock();
4e5ff376 1939 ssid = ieee80211_bss_get_ie(ifmgd->associated, WLAN_EID_SSID);
88c868c4
SG
1940 if (WARN_ON_ONCE(ssid == NULL))
1941 ssid_len = 0;
1942 else
1943 ssid_len = ssid[1];
1944
1945 ieee80211_send_probe_req(sdata, dst, ssid + 2, ssid_len, NULL,
1672c0e3 1946 0, (u32) -1, true, 0,
55de908a 1947 ifmgd->associated->channel, false);
9caf0364 1948 rcu_read_unlock();
4e5ff376 1949 }
a43abf29 1950
180205bd 1951 ifmgd->probe_timeout = jiffies + msecs_to_jiffies(probe_wait_ms);
8d61ffa5 1952 run_again(sdata, ifmgd->probe_timeout);
f69b9c79 1953 if (sdata->local->hw.flags & IEEE80211_HW_REPORTS_TX_ACK_STATUS)
39ecc01d 1954 ieee80211_flush_queues(sdata->local, sdata);
a43abf29
ML
1955}
1956
b291ba11
JB
1957static void ieee80211_mgd_probe_ap(struct ieee80211_sub_if_data *sdata,
1958 bool beacon)
04de8381 1959{
04de8381 1960 struct ieee80211_if_managed *ifmgd = &sdata->u.mgd;
b291ba11 1961 bool already = false;
34bfc411 1962
9607e6b6 1963 if (!ieee80211_sdata_running(sdata))
0e2b6286
JB
1964 return;
1965
8d61ffa5 1966 sdata_lock(sdata);
77fdaa12
JB
1967
1968 if (!ifmgd->associated)
1969 goto out;
1970
133d40f9
SG
1971 mutex_lock(&sdata->local->mtx);
1972
1973 if (sdata->local->tmp_channel || sdata->local->scanning) {
1974 mutex_unlock(&sdata->local->mtx);
1975 goto out;
1976 }
1977
a13fbe54 1978 if (beacon) {
bdcbd8e0 1979 mlme_dbg_ratelimited(sdata,
59c1ec2b
BG
1980 "detected beacon loss from AP (missed %d beacons) - probing\n",
1981 beacon_loss_count);
bdcbd8e0 1982
a13fbe54
BG
1983 ieee80211_cqm_rssi_notify(&sdata->vif,
1984 NL80211_CQM_RSSI_BEACON_LOSS_EVENT,
1985 GFP_KERNEL);
1986 }
04de8381 1987
b291ba11
JB
1988 /*
1989 * The driver/our work has already reported this event or the
1990 * connection monitoring has kicked in and we have already sent
1991 * a probe request. Or maybe the AP died and the driver keeps
1992 * reporting until we disassociate...
1993 *
1994 * In either case we have to ignore the current call to this
1995 * function (except for setting the correct probe reason bit)
1996 * because otherwise we would reset the timer every time and
1997 * never check whether we received a probe response!
1998 */
392b9ffb 1999 if (ifmgd->flags & IEEE80211_STA_CONNECTION_POLL)
b291ba11
JB
2000 already = true;
2001
12b5f34d
EP
2002 ifmgd->flags |= IEEE80211_STA_CONNECTION_POLL;
2003
133d40f9
SG
2004 mutex_unlock(&sdata->local->mtx);
2005
b291ba11
JB
2006 if (already)
2007 goto out;
2008
4e751843
JB
2009 mutex_lock(&sdata->local->iflist_mtx);
2010 ieee80211_recalc_ps(sdata->local, -1);
2011 mutex_unlock(&sdata->local->iflist_mtx);
2012
a43abf29
ML
2013 ifmgd->probe_send_count = 0;
2014 ieee80211_mgd_probe_ap_send(sdata);
77fdaa12 2015 out:
8d61ffa5 2016 sdata_unlock(sdata);
04de8381
KV
2017}
2018
a619a4c0
JO
2019struct sk_buff *ieee80211_ap_probereq_get(struct ieee80211_hw *hw,
2020 struct ieee80211_vif *vif)
2021{
2022 struct ieee80211_sub_if_data *sdata = vif_to_sdata(vif);
2023 struct ieee80211_if_managed *ifmgd = &sdata->u.mgd;
d9b3b28b 2024 struct cfg80211_bss *cbss;
a619a4c0
JO
2025 struct sk_buff *skb;
2026 const u8 *ssid;
88c868c4 2027 int ssid_len;
a619a4c0
JO
2028
2029 if (WARN_ON(sdata->vif.type != NL80211_IFTYPE_STATION))
2030 return NULL;
2031
8d61ffa5 2032 sdata_assert_lock(sdata);
a619a4c0 2033
d9b3b28b
EP
2034 if (ifmgd->associated)
2035 cbss = ifmgd->associated;
2036 else if (ifmgd->auth_data)
2037 cbss = ifmgd->auth_data->bss;
2038 else if (ifmgd->assoc_data)
2039 cbss = ifmgd->assoc_data->bss;
2040 else
a619a4c0
JO
2041 return NULL;
2042
9caf0364 2043 rcu_read_lock();
d9b3b28b 2044 ssid = ieee80211_bss_get_ie(cbss, WLAN_EID_SSID);
88c868c4
SG
2045 if (WARN_ON_ONCE(ssid == NULL))
2046 ssid_len = 0;
2047 else
2048 ssid_len = ssid[1];
2049
d9b3b28b 2050 skb = ieee80211_build_probe_req(sdata, cbss->bssid,
55de908a 2051 (u32) -1, cbss->channel,
6b77863b 2052 ssid + 2, ssid_len,
85a237fe 2053 NULL, 0, true);
9caf0364 2054 rcu_read_unlock();
a619a4c0
JO
2055
2056 return skb;
2057}
2058EXPORT_SYMBOL(ieee80211_ap_probereq_get);
2059
eef9e54c 2060static void __ieee80211_disconnect(struct ieee80211_sub_if_data *sdata)
1e4dcd01 2061{
59af6928 2062 struct ieee80211_local *local = sdata->local;
1e4dcd01 2063 struct ieee80211_if_managed *ifmgd = &sdata->u.mgd;
6ae16775 2064 u8 frame_buf[IEEE80211_DEAUTH_FRAME_LEN];
1e4dcd01 2065
8d61ffa5 2066 sdata_lock(sdata);
1e4dcd01 2067 if (!ifmgd->associated) {
8d61ffa5 2068 sdata_unlock(sdata);
1e4dcd01
JO
2069 return;
2070 }
2071
37ad3888
JB
2072 ieee80211_set_disassoc(sdata, IEEE80211_STYPE_DEAUTH,
2073 WLAN_REASON_DISASSOC_DUE_TO_INACTIVITY,
eef9e54c 2074 true, frame_buf);
882a7c69 2075 ifmgd->flags &= ~IEEE80211_STA_CSA_RECEIVED;
59af6928
MK
2076
2077 mutex_lock(&local->mtx);
7578d575 2078 sdata->vif.csa_active = false;
59af6928
MK
2079 if (!ieee80211_csa_needs_block_tx(local))
2080 ieee80211_wake_queues_by_reason(&local->hw,
445ea4e8 2081 IEEE80211_MAX_QUEUE_MAP,
5b36ebd8 2082 IEEE80211_QUEUE_STOP_REASON_CSA);
59af6928 2083 mutex_unlock(&local->mtx);
7da7cc1d 2084
6ff57cf8
JB
2085 cfg80211_tx_mlme_mgmt(sdata->dev, frame_buf,
2086 IEEE80211_DEAUTH_FRAME_LEN);
8d61ffa5 2087 sdata_unlock(sdata);
1e4dcd01
JO
2088}
2089
cc74c0c7 2090static void ieee80211_beacon_connection_loss_work(struct work_struct *work)
b291ba11
JB
2091{
2092 struct ieee80211_sub_if_data *sdata =
2093 container_of(work, struct ieee80211_sub_if_data,
1e4dcd01 2094 u.mgd.beacon_connection_loss_work);
a85e1d55
PS
2095 struct ieee80211_if_managed *ifmgd = &sdata->u.mgd;
2096 struct sta_info *sta;
2097
2098 if (ifmgd->associated) {
30fa9047 2099 rcu_read_lock();
a85e1d55
PS
2100 sta = sta_info_get(sdata, ifmgd->bssid);
2101 if (sta)
2102 sta->beacon_loss_count++;
30fa9047 2103 rcu_read_unlock();
a85e1d55 2104 }
b291ba11 2105
682bd38b 2106 if (ifmgd->connection_loss) {
882a7c69
JB
2107 sdata_info(sdata, "Connection to AP %pM lost\n",
2108 ifmgd->bssid);
eef9e54c 2109 __ieee80211_disconnect(sdata);
882a7c69 2110 } else {
1e4dcd01 2111 ieee80211_mgd_probe_ap(sdata, true);
882a7c69
JB
2112 }
2113}
2114
2115static void ieee80211_csa_connection_drop_work(struct work_struct *work)
2116{
2117 struct ieee80211_sub_if_data *sdata =
2118 container_of(work, struct ieee80211_sub_if_data,
2119 u.mgd.csa_connection_drop_work);
2120
eef9e54c 2121 __ieee80211_disconnect(sdata);
b291ba11
JB
2122}
2123
04de8381
KV
2124void ieee80211_beacon_loss(struct ieee80211_vif *vif)
2125{
2126 struct ieee80211_sub_if_data *sdata = vif_to_sdata(vif);
1e4dcd01 2127 struct ieee80211_hw *hw = &sdata->local->hw;
04de8381 2128
b5878a2d
JB
2129 trace_api_beacon_loss(sdata);
2130
682bd38b 2131 sdata->u.mgd.connection_loss = false;
1e4dcd01 2132 ieee80211_queue_work(hw, &sdata->u.mgd.beacon_connection_loss_work);
04de8381
KV
2133}
2134EXPORT_SYMBOL(ieee80211_beacon_loss);
2135
1e4dcd01
JO
2136void ieee80211_connection_loss(struct ieee80211_vif *vif)
2137{
2138 struct ieee80211_sub_if_data *sdata = vif_to_sdata(vif);
2139 struct ieee80211_hw *hw = &sdata->local->hw;
2140
b5878a2d
JB
2141 trace_api_connection_loss(sdata);
2142
682bd38b 2143 sdata->u.mgd.connection_loss = true;
1e4dcd01
JO
2144 ieee80211_queue_work(hw, &sdata->u.mgd.beacon_connection_loss_work);
2145}
2146EXPORT_SYMBOL(ieee80211_connection_loss);
2147
2148
66e67e41
JB
2149static void ieee80211_destroy_auth_data(struct ieee80211_sub_if_data *sdata,
2150 bool assoc)
2151{
2152 struct ieee80211_mgd_auth_data *auth_data = sdata->u.mgd.auth_data;
2153
8d61ffa5 2154 sdata_assert_lock(sdata);
66e67e41 2155
66e67e41
JB
2156 if (!assoc) {
2157 sta_info_destroy_addr(sdata, auth_data->bss->bssid);
2158
2159 memset(sdata->u.mgd.bssid, 0, ETH_ALEN);
2160 ieee80211_bss_info_change_notify(sdata, BSS_CHANGED_BSSID);
028e8da0 2161 sdata->u.mgd.flags = 0;
34a3740d 2162 mutex_lock(&sdata->local->mtx);
55de908a 2163 ieee80211_vif_release_channel(sdata);
34a3740d 2164 mutex_unlock(&sdata->local->mtx);
66e67e41
JB
2165 }
2166
5b112d3d 2167 cfg80211_put_bss(sdata->local->hw.wiphy, auth_data->bss);
66e67e41
JB
2168 kfree(auth_data);
2169 sdata->u.mgd.auth_data = NULL;
2170}
2171
2172static void ieee80211_auth_challenge(struct ieee80211_sub_if_data *sdata,
2173 struct ieee80211_mgmt *mgmt, size_t len)
2174{
1672c0e3 2175 struct ieee80211_local *local = sdata->local;
66e67e41
JB
2176 struct ieee80211_mgd_auth_data *auth_data = sdata->u.mgd.auth_data;
2177 u8 *pos;
2178 struct ieee802_11_elems elems;
1672c0e3 2179 u32 tx_flags = 0;
66e67e41
JB
2180
2181 pos = mgmt->u.auth.variable;
b2e506bf 2182 ieee802_11_parse_elems(pos, len - (pos - (u8 *) mgmt), false, &elems);
66e67e41
JB
2183 if (!elems.challenge)
2184 return;
2185 auth_data->expected_transaction = 4;
a1845fc7 2186 drv_mgd_prepare_tx(sdata->local, sdata);
1672c0e3
JB
2187 if (local->hw.flags & IEEE80211_HW_REPORTS_TX_ACK_STATUS)
2188 tx_flags = IEEE80211_TX_CTL_REQ_TX_STATUS |
2189 IEEE80211_TX_INTFL_MLME_CONN_TX;
700e8ea6 2190 ieee80211_send_auth(sdata, 3, auth_data->algorithm, 0,
66e67e41
JB
2191 elems.challenge - 2, elems.challenge_len + 2,
2192 auth_data->bss->bssid, auth_data->bss->bssid,
2193 auth_data->key, auth_data->key_len,
1672c0e3 2194 auth_data->key_idx, tx_flags);
66e67e41
JB
2195}
2196
8d61ffa5
JB
2197static void ieee80211_rx_mgmt_auth(struct ieee80211_sub_if_data *sdata,
2198 struct ieee80211_mgmt *mgmt, size_t len)
66e67e41
JB
2199{
2200 struct ieee80211_if_managed *ifmgd = &sdata->u.mgd;
2201 u8 bssid[ETH_ALEN];
2202 u16 auth_alg, auth_transaction, status_code;
2203 struct sta_info *sta;
2204
8d61ffa5 2205 sdata_assert_lock(sdata);
66e67e41
JB
2206
2207 if (len < 24 + 6)
8d61ffa5 2208 return;
66e67e41
JB
2209
2210 if (!ifmgd->auth_data || ifmgd->auth_data->done)
8d61ffa5 2211 return;
66e67e41
JB
2212
2213 memcpy(bssid, ifmgd->auth_data->bss->bssid, ETH_ALEN);
2214
b203ca39 2215 if (!ether_addr_equal(bssid, mgmt->bssid))
8d61ffa5 2216 return;
66e67e41
JB
2217
2218 auth_alg = le16_to_cpu(mgmt->u.auth.auth_alg);
2219 auth_transaction = le16_to_cpu(mgmt->u.auth.auth_transaction);
2220 status_code = le16_to_cpu(mgmt->u.auth.status_code);
2221
2222 if (auth_alg != ifmgd->auth_data->algorithm ||
0f4126e8
JM
2223 auth_transaction != ifmgd->auth_data->expected_transaction) {
2224 sdata_info(sdata, "%pM unexpected authentication state: alg %d (expected %d) transact %d (expected %d)\n",
2225 mgmt->sa, auth_alg, ifmgd->auth_data->algorithm,
2226 auth_transaction,
2227 ifmgd->auth_data->expected_transaction);
8d61ffa5 2228 return;
0f4126e8 2229 }
66e67e41
JB
2230
2231 if (status_code != WLAN_STATUS_SUCCESS) {
bdcbd8e0
JB
2232 sdata_info(sdata, "%pM denied authentication (status %d)\n",
2233 mgmt->sa, status_code);
dac211ec 2234 ieee80211_destroy_auth_data(sdata, false);
6ff57cf8 2235 cfg80211_rx_mlme_mgmt(sdata->dev, (u8 *)mgmt, len);
8d61ffa5 2236 return;
66e67e41
JB
2237 }
2238
2239 switch (ifmgd->auth_data->algorithm) {
2240 case WLAN_AUTH_OPEN:
2241 case WLAN_AUTH_LEAP:
2242 case WLAN_AUTH_FT:
6b8ece3a 2243 case WLAN_AUTH_SAE:
66e67e41
JB
2244 break;
2245 case WLAN_AUTH_SHARED_KEY:
2246 if (ifmgd->auth_data->expected_transaction != 4) {
2247 ieee80211_auth_challenge(sdata, mgmt, len);
2248 /* need another frame */
8d61ffa5 2249 return;
66e67e41
JB
2250 }
2251 break;
2252 default:
2253 WARN_ONCE(1, "invalid auth alg %d",
2254 ifmgd->auth_data->algorithm);
8d61ffa5 2255 return;
66e67e41
JB
2256 }
2257
bdcbd8e0 2258 sdata_info(sdata, "authenticated\n");
66e67e41
JB
2259 ifmgd->auth_data->done = true;
2260 ifmgd->auth_data->timeout = jiffies + IEEE80211_AUTH_WAIT_ASSOC;
89afe614 2261 ifmgd->auth_data->timeout_started = true;
8d61ffa5 2262 run_again(sdata, ifmgd->auth_data->timeout);
66e67e41 2263
6b8ece3a
JM
2264 if (ifmgd->auth_data->algorithm == WLAN_AUTH_SAE &&
2265 ifmgd->auth_data->expected_transaction != 2) {
2266 /*
2267 * Report auth frame to user space for processing since another
2268 * round of Authentication frames is still needed.
2269 */
6ff57cf8 2270 cfg80211_rx_mlme_mgmt(sdata->dev, (u8 *)mgmt, len);
8d61ffa5 2271 return;
6b8ece3a
JM
2272 }
2273
66e67e41
JB
2274 /* move station state to auth */
2275 mutex_lock(&sdata->local->sta_mtx);
2276 sta = sta_info_get(sdata, bssid);
2277 if (!sta) {
2278 WARN_ONCE(1, "%s: STA %pM not found", sdata->name, bssid);
2279 goto out_err;
2280 }
2281 if (sta_info_move_state(sta, IEEE80211_STA_AUTH)) {
bdcbd8e0 2282 sdata_info(sdata, "failed moving %pM to auth\n", bssid);
66e67e41
JB
2283 goto out_err;
2284 }
2285 mutex_unlock(&sdata->local->sta_mtx);
2286
6ff57cf8 2287 cfg80211_rx_mlme_mgmt(sdata->dev, (u8 *)mgmt, len);
8d61ffa5 2288 return;
66e67e41
JB
2289 out_err:
2290 mutex_unlock(&sdata->local->sta_mtx);
2291 /* ignore frame -- wait for timeout */
66e67e41
JB
2292}
2293
dfa1ad29
CO
2294#define case_WLAN(type) \
2295 case WLAN_REASON_##type: return #type
2296
2297static const char *ieee80211_get_reason_code_string(u16 reason_code)
2298{
2299 switch (reason_code) {
2300 case_WLAN(UNSPECIFIED);
2301 case_WLAN(PREV_AUTH_NOT_VALID);
2302 case_WLAN(DEAUTH_LEAVING);
2303 case_WLAN(DISASSOC_DUE_TO_INACTIVITY);
2304 case_WLAN(DISASSOC_AP_BUSY);
2305 case_WLAN(CLASS2_FRAME_FROM_NONAUTH_STA);
2306 case_WLAN(CLASS3_FRAME_FROM_NONASSOC_STA);
2307 case_WLAN(DISASSOC_STA_HAS_LEFT);
2308 case_WLAN(STA_REQ_ASSOC_WITHOUT_AUTH);
2309 case_WLAN(DISASSOC_BAD_POWER);
2310 case_WLAN(DISASSOC_BAD_SUPP_CHAN);
2311 case_WLAN(INVALID_IE);
2312 case_WLAN(MIC_FAILURE);
2313 case_WLAN(4WAY_HANDSHAKE_TIMEOUT);
2314 case_WLAN(GROUP_KEY_HANDSHAKE_TIMEOUT);
2315 case_WLAN(IE_DIFFERENT);
2316 case_WLAN(INVALID_GROUP_CIPHER);
2317 case_WLAN(INVALID_PAIRWISE_CIPHER);
2318 case_WLAN(INVALID_AKMP);
2319 case_WLAN(UNSUPP_RSN_VERSION);
2320 case_WLAN(INVALID_RSN_IE_CAP);
2321 case_WLAN(IEEE8021X_FAILED);
2322 case_WLAN(CIPHER_SUITE_REJECTED);
2323 case_WLAN(DISASSOC_UNSPECIFIED_QOS);
2324 case_WLAN(DISASSOC_QAP_NO_BANDWIDTH);
2325 case_WLAN(DISASSOC_LOW_ACK);
2326 case_WLAN(DISASSOC_QAP_EXCEED_TXOP);
2327 case_WLAN(QSTA_LEAVE_QBSS);
2328 case_WLAN(QSTA_NOT_USE);
2329 case_WLAN(QSTA_REQUIRE_SETUP);
2330 case_WLAN(QSTA_TIMEOUT);
2331 case_WLAN(QSTA_CIPHER_NOT_SUPP);
2332 case_WLAN(MESH_PEER_CANCELED);
2333 case_WLAN(MESH_MAX_PEERS);
2334 case_WLAN(MESH_CONFIG);
2335 case_WLAN(MESH_CLOSE);
2336 case_WLAN(MESH_MAX_RETRIES);
2337 case_WLAN(MESH_CONFIRM_TIMEOUT);
2338 case_WLAN(MESH_INVALID_GTK);
2339 case_WLAN(MESH_INCONSISTENT_PARAM);
2340 case_WLAN(MESH_INVALID_SECURITY);
2341 case_WLAN(MESH_PATH_ERROR);
2342 case_WLAN(MESH_PATH_NOFORWARD);
2343 case_WLAN(MESH_PATH_DEST_UNREACHABLE);
2344 case_WLAN(MAC_EXISTS_IN_MBSS);
2345 case_WLAN(MESH_CHAN_REGULATORY);
2346 case_WLAN(MESH_CHAN);
2347 default: return "<unknown>";
2348 }
2349}
66e67e41 2350
8d61ffa5
JB
2351static void ieee80211_rx_mgmt_deauth(struct ieee80211_sub_if_data *sdata,
2352 struct ieee80211_mgmt *mgmt, size_t len)
f0706e82 2353{
46900298 2354 struct ieee80211_if_managed *ifmgd = &sdata->u.mgd;
77fdaa12 2355 const u8 *bssid = NULL;
f0706e82
JB
2356 u16 reason_code;
2357
8d61ffa5 2358 sdata_assert_lock(sdata);
66e67e41 2359
f4ea83dd 2360 if (len < 24 + 2)
8d61ffa5 2361 return;
f0706e82 2362
66e67e41 2363 if (!ifmgd->associated ||
b203ca39 2364 !ether_addr_equal(mgmt->bssid, ifmgd->associated->bssid))
8d61ffa5 2365 return;
77fdaa12 2366
0c1ad2ca 2367 bssid = ifmgd->associated->bssid;
f0706e82
JB
2368
2369 reason_code = le16_to_cpu(mgmt->u.deauth.reason_code);
2370
dfa1ad29
CO
2371 sdata_info(sdata, "deauthenticated from %pM (Reason: %u=%s)\n",
2372 bssid, reason_code, ieee80211_get_reason_code_string(reason_code));
77fdaa12 2373
37ad3888
JB
2374 ieee80211_set_disassoc(sdata, 0, 0, false, NULL);
2375
6ff57cf8 2376 cfg80211_rx_mlme_mgmt(sdata->dev, (u8 *)mgmt, len);
f0706e82
JB
2377}
2378
2379
8d61ffa5
JB
2380static void ieee80211_rx_mgmt_disassoc(struct ieee80211_sub_if_data *sdata,
2381 struct ieee80211_mgmt *mgmt, size_t len)
f0706e82 2382{
46900298 2383 struct ieee80211_if_managed *ifmgd = &sdata->u.mgd;
f0706e82
JB
2384 u16 reason_code;
2385
8d61ffa5 2386 sdata_assert_lock(sdata);
77fdaa12 2387
66e67e41 2388 if (len < 24 + 2)
8d61ffa5 2389 return;
77fdaa12 2390
66e67e41 2391 if (!ifmgd->associated ||
b203ca39 2392 !ether_addr_equal(mgmt->bssid, ifmgd->associated->bssid))
8d61ffa5 2393 return;
f0706e82
JB
2394
2395 reason_code = le16_to_cpu(mgmt->u.disassoc.reason_code);
2396
bdcbd8e0
JB
2397 sdata_info(sdata, "disassociated from %pM (Reason: %u)\n",
2398 mgmt->sa, reason_code);
f0706e82 2399
37ad3888
JB
2400 ieee80211_set_disassoc(sdata, 0, 0, false, NULL);
2401
6ff57cf8 2402 cfg80211_rx_mlme_mgmt(sdata->dev, (u8 *)mgmt, len);
f0706e82
JB
2403}
2404
c74d084f
CL
2405static void ieee80211_get_rates(struct ieee80211_supported_band *sband,
2406 u8 *supp_rates, unsigned int supp_rates_len,
2407 u32 *rates, u32 *basic_rates,
2408 bool *have_higher_than_11mbit,
2103dec1
SW
2409 int *min_rate, int *min_rate_index,
2410 int shift, u32 rate_flags)
c74d084f
CL
2411{
2412 int i, j;
2413
2414 for (i = 0; i < supp_rates_len; i++) {
2103dec1 2415 int rate = supp_rates[i] & 0x7f;
c74d084f
CL
2416 bool is_basic = !!(supp_rates[i] & 0x80);
2417
2103dec1 2418 if ((rate * 5 * (1 << shift)) > 110)
c74d084f
CL
2419 *have_higher_than_11mbit = true;
2420
2421 /*
2422 * BSS_MEMBERSHIP_SELECTOR_HT_PHY is defined in 802.11n-2009
2423 * 7.3.2.2 as a magic value instead of a rate. Hence, skip it.
2424 *
2425 * Note: Even through the membership selector and the basic
2426 * rate flag share the same bit, they are not exactly
2427 * the same.
2428 */
2429 if (!!(supp_rates[i] & 0x80) &&
2430 (supp_rates[i] & 0x7f) == BSS_MEMBERSHIP_SELECTOR_HT_PHY)
2431 continue;
2432
2433 for (j = 0; j < sband->n_bitrates; j++) {
2103dec1
SW
2434 struct ieee80211_rate *br;
2435 int brate;
2436
2437 br = &sband->bitrates[j];
2438 if ((rate_flags & br->flags) != rate_flags)
2439 continue;
2440
2441 brate = DIV_ROUND_UP(br->bitrate, (1 << shift) * 5);
2442 if (brate == rate) {
c74d084f
CL
2443 *rates |= BIT(j);
2444 if (is_basic)
2445 *basic_rates |= BIT(j);
2103dec1
SW
2446 if ((rate * 5) < *min_rate) {
2447 *min_rate = rate * 5;
c74d084f
CL
2448 *min_rate_index = j;
2449 }
2450 break;
2451 }
2452 }
2453 }
2454}
f0706e82 2455
66e67e41
JB
2456static void ieee80211_destroy_assoc_data(struct ieee80211_sub_if_data *sdata,
2457 bool assoc)
2458{
2459 struct ieee80211_mgd_assoc_data *assoc_data = sdata->u.mgd.assoc_data;
2460
8d61ffa5 2461 sdata_assert_lock(sdata);
66e67e41 2462
66e67e41
JB
2463 if (!assoc) {
2464 sta_info_destroy_addr(sdata, assoc_data->bss->bssid);
2465
2466 memset(sdata->u.mgd.bssid, 0, ETH_ALEN);
2467 ieee80211_bss_info_change_notify(sdata, BSS_CHANGED_BSSID);
028e8da0 2468 sdata->u.mgd.flags = 0;
34a3740d 2469 mutex_lock(&sdata->local->mtx);
55de908a 2470 ieee80211_vif_release_channel(sdata);
34a3740d 2471 mutex_unlock(&sdata->local->mtx);
66e67e41
JB
2472 }
2473
2474 kfree(assoc_data);
2475 sdata->u.mgd.assoc_data = NULL;
2476}
2477
2478static bool ieee80211_assoc_success(struct ieee80211_sub_if_data *sdata,
2479 struct cfg80211_bss *cbss,
af6b6374 2480 struct ieee80211_mgmt *mgmt, size_t len)
f0706e82 2481{
46900298 2482 struct ieee80211_if_managed *ifmgd = &sdata->u.mgd;
471b3efd 2483 struct ieee80211_local *local = sdata->local;
8318d78a 2484 struct ieee80211_supported_band *sband;
f0706e82 2485 struct sta_info *sta;
af6b6374 2486 u8 *pos;
af6b6374 2487 u16 capab_info, aid;
f0706e82 2488 struct ieee802_11_elems elems;
bda3933a 2489 struct ieee80211_bss_conf *bss_conf = &sdata->vif.bss_conf;
35d865af
JB
2490 const struct cfg80211_bss_ies *bss_ies = NULL;
2491 struct ieee80211_mgd_assoc_data *assoc_data = ifmgd->assoc_data;
ae5eb026 2492 u32 changed = 0;
c74d084f 2493 int err;
35d865af 2494 bool ret;
f0706e82 2495
af6b6374 2496 /* AssocResp and ReassocResp have identical structure */
f0706e82 2497
f0706e82 2498 aid = le16_to_cpu(mgmt->u.assoc_resp.aid);
af6b6374 2499 capab_info = le16_to_cpu(mgmt->u.assoc_resp.capab_info);
f0706e82 2500
1dd84aa2 2501 if ((aid & (BIT(15) | BIT(14))) != (BIT(15) | BIT(14)))
bdcbd8e0
JB
2502 sdata_info(sdata, "invalid AID value 0x%x; bits 15:14 not set\n",
2503 aid);
1dd84aa2
JB
2504 aid &= ~(BIT(15) | BIT(14));
2505
05cb9108
JB
2506 ifmgd->broken_ap = false;
2507
2508 if (aid == 0 || aid > IEEE80211_MAX_AID) {
bdcbd8e0
JB
2509 sdata_info(sdata, "invalid AID value %d (out of range), turn off PS\n",
2510 aid);
05cb9108
JB
2511 aid = 0;
2512 ifmgd->broken_ap = true;
2513 }
2514
af6b6374 2515 pos = mgmt->u.assoc_resp.variable;
b2e506bf 2516 ieee802_11_parse_elems(pos, len - (pos - (u8 *) mgmt), false, &elems);
af6b6374 2517
f0706e82 2518 if (!elems.supp_rates) {
bdcbd8e0 2519 sdata_info(sdata, "no SuppRates element in AssocResp\n");
af6b6374 2520 return false;
f0706e82
JB
2521 }
2522
46900298 2523 ifmgd->aid = aid;
f0706e82 2524
35d865af
JB
2525 /*
2526 * Some APs are erroneously not including some information in their
2527 * (re)association response frames. Try to recover by using the data
2528 * from the beacon or probe response. This seems to afflict mobile
2529 * 2G/3G/4G wifi routers, reported models include the "Onda PN51T",
2530 * "Vodafone PocketWiFi 2", "ZTE MF60" and a similar T-Mobile device.
2531 */
2532 if ((assoc_data->wmm && !elems.wmm_param) ||
2533 (!(ifmgd->flags & IEEE80211_STA_DISABLE_HT) &&
2534 (!elems.ht_cap_elem || !elems.ht_operation)) ||
2535 (!(ifmgd->flags & IEEE80211_STA_DISABLE_VHT) &&
2536 (!elems.vht_cap_elem || !elems.vht_operation))) {
2537 const struct cfg80211_bss_ies *ies;
2538 struct ieee802_11_elems bss_elems;
2539
2540 rcu_read_lock();
2541 ies = rcu_dereference(cbss->ies);
2542 if (ies)
2543 bss_ies = kmemdup(ies, sizeof(*ies) + ies->len,
2544 GFP_ATOMIC);
2545 rcu_read_unlock();
2546 if (!bss_ies)
2547 return false;
2548
2549 ieee802_11_parse_elems(bss_ies->data, bss_ies->len,
2550 false, &bss_elems);
2551 if (assoc_data->wmm &&
2552 !elems.wmm_param && bss_elems.wmm_param) {
2553 elems.wmm_param = bss_elems.wmm_param;
2554 sdata_info(sdata,
2555 "AP bug: WMM param missing from AssocResp\n");
2556 }
2557
2558 /*
2559 * Also check if we requested HT/VHT, otherwise the AP doesn't
2560 * have to include the IEs in the (re)association response.
2561 */
2562 if (!elems.ht_cap_elem && bss_elems.ht_cap_elem &&
2563 !(ifmgd->flags & IEEE80211_STA_DISABLE_HT)) {
2564 elems.ht_cap_elem = bss_elems.ht_cap_elem;
2565 sdata_info(sdata,
2566 "AP bug: HT capability missing from AssocResp\n");
2567 }
2568 if (!elems.ht_operation && bss_elems.ht_operation &&
2569 !(ifmgd->flags & IEEE80211_STA_DISABLE_HT)) {
2570 elems.ht_operation = bss_elems.ht_operation;
2571 sdata_info(sdata,
2572 "AP bug: HT operation missing from AssocResp\n");
2573 }
2574 if (!elems.vht_cap_elem && bss_elems.vht_cap_elem &&
2575 !(ifmgd->flags & IEEE80211_STA_DISABLE_VHT)) {
2576 elems.vht_cap_elem = bss_elems.vht_cap_elem;
2577 sdata_info(sdata,
2578 "AP bug: VHT capa missing from AssocResp\n");
2579 }
2580 if (!elems.vht_operation && bss_elems.vht_operation &&
2581 !(ifmgd->flags & IEEE80211_STA_DISABLE_VHT)) {
2582 elems.vht_operation = bss_elems.vht_operation;
2583 sdata_info(sdata,
2584 "AP bug: VHT operation missing from AssocResp\n");
2585 }
2586 }
2587
30eb1dc2
JB
2588 /*
2589 * We previously checked these in the beacon/probe response, so
2590 * they should be present here. This is just a safety net.
2591 */
2592 if (!(ifmgd->flags & IEEE80211_STA_DISABLE_HT) &&
2593 (!elems.wmm_param || !elems.ht_cap_elem || !elems.ht_operation)) {
2594 sdata_info(sdata,
35d865af
JB
2595 "HT AP is missing WMM params or HT capability/operation\n");
2596 ret = false;
2597 goto out;
30eb1dc2
JB
2598 }
2599
2600 if (!(ifmgd->flags & IEEE80211_STA_DISABLE_VHT) &&
2601 (!elems.vht_cap_elem || !elems.vht_operation)) {
2602 sdata_info(sdata,
35d865af
JB
2603 "VHT AP is missing VHT capability/operation\n");
2604 ret = false;
2605 goto out;
30eb1dc2
JB
2606 }
2607
2a33bee2
GE
2608 mutex_lock(&sdata->local->sta_mtx);
2609 /*
2610 * station info was already allocated and inserted before
2611 * the association and should be available to us
2612 */
7852e361 2613 sta = sta_info_get(sdata, cbss->bssid);
2a33bee2
GE
2614 if (WARN_ON(!sta)) {
2615 mutex_unlock(&sdata->local->sta_mtx);
35d865af
JB
2616 ret = false;
2617 goto out;
77fdaa12 2618 }
05e5e883 2619
55de908a 2620 sband = local->hw.wiphy->bands[ieee80211_get_sdata_band(sdata)];
f709fc69 2621
30eb1dc2 2622 /* Set up internal HT/VHT capabilities */
a8243b72 2623 if (elems.ht_cap_elem && !(ifmgd->flags & IEEE80211_STA_DISABLE_HT))
ef96a842 2624 ieee80211_ht_cap_ie_to_sta_ht_cap(sdata, sband,
e1a0c6b3 2625 elems.ht_cap_elem, sta);
64f68e5d 2626
818255ea
MP
2627 if (elems.vht_cap_elem && !(ifmgd->flags & IEEE80211_STA_DISABLE_VHT))
2628 ieee80211_vht_cap_ie_to_sta_vht_cap(sdata, sband,
4a34215e 2629 elems.vht_cap_elem, sta);
818255ea 2630
30eb1dc2
JB
2631 /*
2632 * Some APs, e.g. Netgear WNDR3700, report invalid HT operation data
2633 * in their association response, so ignore that data for our own
2634 * configuration. If it changed since the last beacon, we'll get the
2635 * next beacon and update then.
2636 */
1128958d 2637
bee7f586
JB
2638 /*
2639 * If an operating mode notification IE is present, override the
2640 * NSS calculation (that would be done in rate_control_rate_init())
2641 * and use the # of streams from that element.
2642 */
2643 if (elems.opmode_notif &&
2644 !(*elems.opmode_notif & IEEE80211_OPMODE_NOTIF_RX_NSS_TYPE_BF)) {
2645 u8 nss;
2646
2647 nss = *elems.opmode_notif & IEEE80211_OPMODE_NOTIF_RX_NSS_MASK;
2648 nss >>= IEEE80211_OPMODE_NOTIF_RX_NSS_SHIFT;
2649 nss += 1;
2650 sta->sta.rx_nss = nss;
2651 }
2652
4b7679a5 2653 rate_control_rate_init(sta);
f0706e82 2654
46900298 2655 if (ifmgd->flags & IEEE80211_STA_MFP_ENABLED)
c2c98fde 2656 set_sta_flag(sta, WLAN_STA_MFP);
5394af4d 2657
ddf4ac53 2658 if (elems.wmm_param)
c2c98fde 2659 set_sta_flag(sta, WLAN_STA_WME);
ddf4ac53 2660
3e4d40fa 2661 err = sta_info_move_state(sta, IEEE80211_STA_ASSOC);
c8987876
JB
2662 if (!err && !(ifmgd->flags & IEEE80211_STA_CONTROL_PORT))
2663 err = sta_info_move_state(sta, IEEE80211_STA_AUTHORIZED);
2664 if (err) {
bdcbd8e0
JB
2665 sdata_info(sdata,
2666 "failed to move station %pM to desired state\n",
2667 sta->sta.addr);
c8987876
JB
2668 WARN_ON(__sta_info_destroy(sta));
2669 mutex_unlock(&sdata->local->sta_mtx);
35d865af
JB
2670 ret = false;
2671 goto out;
c8987876
JB
2672 }
2673
7852e361 2674 mutex_unlock(&sdata->local->sta_mtx);
ddf4ac53 2675
f2176d72
JO
2676 /*
2677 * Always handle WMM once after association regardless
2678 * of the first value the AP uses. Setting -1 here has
2679 * that effect because the AP values is an unsigned
2680 * 4-bit value.
2681 */
2682 ifmgd->wmm_last_param_set = -1;
2683
095d81ce 2684 if (!(ifmgd->flags & IEEE80211_STA_DISABLE_WMM) && elems.wmm_param)
4ced3f74 2685 ieee80211_sta_wmm_params(local, sdata, elems.wmm_param,
60f8b39c 2686 elems.wmm_param_len);
aa837e1d 2687 else
3abead59
JB
2688 ieee80211_set_wmm_default(sdata, false);
2689 changed |= BSS_CHANGED_QOS;
f0706e82 2690
60f8b39c
JB
2691 /* set AID and assoc capability,
2692 * ieee80211_set_associated() will tell the driver */
2693 bss_conf->aid = aid;
2694 bss_conf->assoc_capability = capab_info;
0c1ad2ca 2695 ieee80211_set_associated(sdata, cbss, changed);
f0706e82 2696
d524215f
FF
2697 /*
2698 * If we're using 4-addr mode, let the AP know that we're
2699 * doing so, so that it can create the STA VLAN on its side
2700 */
2701 if (ifmgd->use_4addr)
2702 ieee80211_send_4addr_nullfunc(local, sdata);
2703
15b7b062 2704 /*
b291ba11
JB
2705 * Start timer to probe the connection to the AP now.
2706 * Also start the timer that will detect beacon loss.
15b7b062 2707 */
b291ba11 2708 ieee80211_sta_rx_notify(sdata, (struct ieee80211_hdr *)mgmt);
d3a910a8 2709 ieee80211_sta_reset_beacon_monitor(sdata);
15b7b062 2710
35d865af
JB
2711 ret = true;
2712 out:
2713 kfree(bss_ies);
2714 return ret;
f0706e82
JB
2715}
2716
8d61ffa5
JB
2717static void ieee80211_rx_mgmt_assoc_resp(struct ieee80211_sub_if_data *sdata,
2718 struct ieee80211_mgmt *mgmt,
2719 size_t len)
66e67e41
JB
2720{
2721 struct ieee80211_if_managed *ifmgd = &sdata->u.mgd;
2722 struct ieee80211_mgd_assoc_data *assoc_data = ifmgd->assoc_data;
2723 u16 capab_info, status_code, aid;
2724 struct ieee802_11_elems elems;
2725 u8 *pos;
2726 bool reassoc;
8d61ffa5 2727 struct cfg80211_bss *bss;
66e67e41 2728
8d61ffa5 2729 sdata_assert_lock(sdata);
66e67e41
JB
2730
2731 if (!assoc_data)
8d61ffa5 2732 return;
b203ca39 2733 if (!ether_addr_equal(assoc_data->bss->bssid, mgmt->bssid))
8d61ffa5 2734 return;
66e67e41
JB
2735
2736 /*
2737 * AssocResp and ReassocResp have identical structure, so process both
2738 * of them in this function.
2739 */
2740
2741 if (len < 24 + 6)
8d61ffa5 2742 return;
66e67e41
JB
2743
2744 reassoc = ieee80211_is_reassoc_req(mgmt->frame_control);
2745 capab_info = le16_to_cpu(mgmt->u.assoc_resp.capab_info);
2746 status_code = le16_to_cpu(mgmt->u.assoc_resp.status_code);
2747 aid = le16_to_cpu(mgmt->u.assoc_resp.aid);
2748
bdcbd8e0
JB
2749 sdata_info(sdata,
2750 "RX %sssocResp from %pM (capab=0x%x status=%d aid=%d)\n",
2751 reassoc ? "Rea" : "A", mgmt->sa,
2752 capab_info, status_code, (u16)(aid & ~(BIT(15) | BIT(14))));
66e67e41
JB
2753
2754 pos = mgmt->u.assoc_resp.variable;
b2e506bf 2755 ieee802_11_parse_elems(pos, len - (pos - (u8 *) mgmt), false, &elems);
66e67e41
JB
2756
2757 if (status_code == WLAN_STATUS_ASSOC_REJECTED_TEMPORARILY &&
79ba1d89
JB
2758 elems.timeout_int &&
2759 elems.timeout_int->type == WLAN_TIMEOUT_ASSOC_COMEBACK) {
66e67e41 2760 u32 tu, ms;
79ba1d89 2761 tu = le32_to_cpu(elems.timeout_int->value);
66e67e41 2762 ms = tu * 1024 / 1000;
bdcbd8e0
JB
2763 sdata_info(sdata,
2764 "%pM rejected association temporarily; comeback duration %u TU (%u ms)\n",
2765 mgmt->sa, tu, ms);
66e67e41 2766 assoc_data->timeout = jiffies + msecs_to_jiffies(ms);
89afe614 2767 assoc_data->timeout_started = true;
66e67e41 2768 if (ms > IEEE80211_ASSOC_TIMEOUT)
8d61ffa5
JB
2769 run_again(sdata, assoc_data->timeout);
2770 return;
66e67e41
JB
2771 }
2772
8d61ffa5 2773 bss = assoc_data->bss;
66e67e41
JB
2774
2775 if (status_code != WLAN_STATUS_SUCCESS) {
bdcbd8e0
JB
2776 sdata_info(sdata, "%pM denied association (code=%d)\n",
2777 mgmt->sa, status_code);
66e67e41
JB
2778 ieee80211_destroy_assoc_data(sdata, false);
2779 } else {
8d61ffa5 2780 if (!ieee80211_assoc_success(sdata, bss, mgmt, len)) {
66e67e41 2781 /* oops -- internal error -- send timeout for now */
10a9109f 2782 ieee80211_destroy_assoc_data(sdata, false);
959867fa 2783 cfg80211_assoc_timeout(sdata->dev, bss);
8d61ffa5 2784 return;
66e67e41 2785 }
635d999f 2786 sdata_info(sdata, "associated\n");
79ebfb85
JB
2787
2788 /*
2789 * destroy assoc_data afterwards, as otherwise an idle
2790 * recalc after assoc_data is NULL but before associated
2791 * is set can cause the interface to go idle
2792 */
2793 ieee80211_destroy_assoc_data(sdata, true);
66e67e41
JB
2794 }
2795
6ff57cf8 2796 cfg80211_rx_assoc_resp(sdata->dev, bss, (u8 *)mgmt, len);
66e67e41 2797}
8e3c1b77 2798
98c8fccf 2799static void ieee80211_rx_bss_info(struct ieee80211_sub_if_data *sdata,
8e3c1b77 2800 struct ieee80211_mgmt *mgmt, size_t len,
98c8fccf 2801 struct ieee80211_rx_status *rx_status,
d45c4172 2802 struct ieee802_11_elems *elems)
98c8fccf
JB
2803{
2804 struct ieee80211_local *local = sdata->local;
c2b13452 2805 struct ieee80211_bss *bss;
98c8fccf 2806 struct ieee80211_channel *channel;
56007a02 2807
8d61ffa5 2808 sdata_assert_lock(sdata);
b4f286a1 2809
3afc2167
EG
2810 channel = ieee80211_get_channel(local->hw.wiphy, rx_status->freq);
2811 if (!channel)
98c8fccf
JB
2812 return;
2813
98c8fccf 2814 bss = ieee80211_bss_info_update(local, rx_status, mgmt, len, elems,
d45c4172 2815 channel);
817cee76 2816 if (bss) {
817cee76 2817 sdata->vif.bss_conf.beacon_rate = bss->beacon_rate;
d2722f8b 2818 ieee80211_rx_bss_put(local, bss);
817cee76 2819 }
f0706e82
JB
2820}
2821
2822
f698d856 2823static void ieee80211_rx_mgmt_probe_resp(struct ieee80211_sub_if_data *sdata,
af6b6374 2824 struct sk_buff *skb)
f0706e82 2825{
af6b6374 2826 struct ieee80211_mgmt *mgmt = (void *)skb->data;
15b7b062 2827 struct ieee80211_if_managed *ifmgd;
af6b6374
JB
2828 struct ieee80211_rx_status *rx_status = (void *) skb->cb;
2829 size_t baselen, len = skb->len;
ae6a44e3
EK
2830 struct ieee802_11_elems elems;
2831
15b7b062
KV
2832 ifmgd = &sdata->u.mgd;
2833
8d61ffa5 2834 sdata_assert_lock(sdata);
77fdaa12 2835
b203ca39 2836 if (!ether_addr_equal(mgmt->da, sdata->vif.addr))
8e7cdbb6
TW
2837 return; /* ignore ProbeResp to foreign address */
2838
ae6a44e3
EK
2839 baselen = (u8 *) mgmt->u.probe_resp.variable - (u8 *) mgmt;
2840 if (baselen > len)
2841 return;
2842
2843 ieee802_11_parse_elems(mgmt->u.probe_resp.variable, len - baselen,
b2e506bf 2844 false, &elems);
ae6a44e3 2845
d45c4172 2846 ieee80211_rx_bss_info(sdata, mgmt, len, rx_status, &elems);
9859b81e 2847
77fdaa12 2848 if (ifmgd->associated &&
b203ca39 2849 ether_addr_equal(mgmt->bssid, ifmgd->associated->bssid))
4e5ff376 2850 ieee80211_reset_ap_probe(sdata);
66e67e41
JB
2851
2852 if (ifmgd->auth_data && !ifmgd->auth_data->bss->proberesp_ies &&
b203ca39 2853 ether_addr_equal(mgmt->bssid, ifmgd->auth_data->bss->bssid)) {
66e67e41 2854 /* got probe response, continue with auth */
bdcbd8e0 2855 sdata_info(sdata, "direct probe responded\n");
66e67e41
JB
2856 ifmgd->auth_data->tries = 0;
2857 ifmgd->auth_data->timeout = jiffies;
89afe614 2858 ifmgd->auth_data->timeout_started = true;
8d61ffa5 2859 run_again(sdata, ifmgd->auth_data->timeout);
66e67e41 2860 }
f0706e82
JB
2861}
2862
d91f36db
JB
2863/*
2864 * This is the canonical list of information elements we care about,
2865 * the filter code also gives us all changes to the Microsoft OUI
2866 * (00:50:F2) vendor IE which is used for WMM which we need to track.
2867 *
2868 * We implement beacon filtering in software since that means we can
2869 * avoid processing the frame here and in cfg80211, and userspace
2870 * will not be able to tell whether the hardware supports it or not.
2871 *
2872 * XXX: This list needs to be dynamic -- userspace needs to be able to
2873 * add items it requires. It also needs to be able to tell us to
2874 * look out for other vendor IEs.
2875 */
2876static const u64 care_about_ies =
1d4df3a5
JB
2877 (1ULL << WLAN_EID_COUNTRY) |
2878 (1ULL << WLAN_EID_ERP_INFO) |
2879 (1ULL << WLAN_EID_CHANNEL_SWITCH) |
2880 (1ULL << WLAN_EID_PWR_CONSTRAINT) |
2881 (1ULL << WLAN_EID_HT_CAPABILITY) |
074d46d1 2882 (1ULL << WLAN_EID_HT_OPERATION);
d91f36db 2883
8d61ffa5
JB
2884static void ieee80211_rx_mgmt_beacon(struct ieee80211_sub_if_data *sdata,
2885 struct ieee80211_mgmt *mgmt, size_t len,
2886 struct ieee80211_rx_status *rx_status)
f0706e82 2887{
d91f36db 2888 struct ieee80211_if_managed *ifmgd = &sdata->u.mgd;
17e4ec14 2889 struct ieee80211_bss_conf *bss_conf = &sdata->vif.bss_conf;
f0706e82
JB
2890 size_t baselen;
2891 struct ieee802_11_elems elems;
f698d856 2892 struct ieee80211_local *local = sdata->local;
55de908a
JB
2893 struct ieee80211_chanctx_conf *chanctx_conf;
2894 struct ieee80211_channel *chan;
bee7f586 2895 struct sta_info *sta;
471b3efd 2896 u32 changed = 0;
f87ad637 2897 bool erp_valid;
7a5158ef 2898 u8 erp_value = 0;
d91f36db 2899 u32 ncrc;
77fdaa12 2900 u8 *bssid;
8d61ffa5 2901 u8 deauth_buf[IEEE80211_DEAUTH_FRAME_LEN];
77fdaa12 2902
8d61ffa5 2903 sdata_assert_lock(sdata);
f0706e82 2904
ae6a44e3
EK
2905 /* Process beacon from the current BSS */
2906 baselen = (u8 *) mgmt->u.beacon.variable - (u8 *) mgmt;
2907 if (baselen > len)
8d61ffa5 2908 return;
ae6a44e3 2909
55de908a
JB
2910 rcu_read_lock();
2911 chanctx_conf = rcu_dereference(sdata->vif.chanctx_conf);
2912 if (!chanctx_conf) {
2913 rcu_read_unlock();
8d61ffa5 2914 return;
55de908a
JB
2915 }
2916
4bf88530 2917 if (rx_status->freq != chanctx_conf->def.chan->center_freq) {
55de908a 2918 rcu_read_unlock();
8d61ffa5 2919 return;
55de908a 2920 }
4bf88530 2921 chan = chanctx_conf->def.chan;
55de908a 2922 rcu_read_unlock();
f0706e82 2923
c65dd147 2924 if (ifmgd->assoc_data && ifmgd->assoc_data->need_beacon &&
b203ca39 2925 ether_addr_equal(mgmt->bssid, ifmgd->assoc_data->bss->bssid)) {
66e67e41 2926 ieee802_11_parse_elems(mgmt->u.beacon.variable,
b2e506bf 2927 len - baselen, false, &elems);
77fdaa12 2928
d45c4172 2929 ieee80211_rx_bss_info(sdata, mgmt, len, rx_status, &elems);
482a9c74
AB
2930 if (elems.tim && !elems.parse_error) {
2931 const struct ieee80211_tim_ie *tim_ie = elems.tim;
2932 ifmgd->dtim_period = tim_ie->dtim_period;
2933 }
989c6505 2934 ifmgd->have_beacon = true;
c65dd147 2935 ifmgd->assoc_data->need_beacon = false;
ef429dad
JB
2936 if (local->hw.flags & IEEE80211_HW_TIMING_BEACON_ONLY) {
2937 sdata->vif.bss_conf.sync_tsf =
2938 le64_to_cpu(mgmt->u.beacon.timestamp);
2939 sdata->vif.bss_conf.sync_device_ts =
2940 rx_status->device_timestamp;
2941 if (elems.tim)
2942 sdata->vif.bss_conf.sync_dtim_count =
2943 elems.tim->dtim_count;
2944 else
2945 sdata->vif.bss_conf.sync_dtim_count = 0;
2946 }
66e67e41
JB
2947 /* continue assoc process */
2948 ifmgd->assoc_data->timeout = jiffies;
89afe614 2949 ifmgd->assoc_data->timeout_started = true;
8d61ffa5
JB
2950 run_again(sdata, ifmgd->assoc_data->timeout);
2951 return;
66e67e41 2952 }
77fdaa12 2953
66e67e41 2954 if (!ifmgd->associated ||
b203ca39 2955 !ether_addr_equal(mgmt->bssid, ifmgd->associated->bssid))
8d61ffa5 2956 return;
66e67e41 2957 bssid = ifmgd->associated->bssid;
f0706e82 2958
17e4ec14
JM
2959 /* Track average RSSI from the Beacon frames of the current AP */
2960 ifmgd->last_beacon_signal = rx_status->signal;
2961 if (ifmgd->flags & IEEE80211_STA_RESET_SIGNAL_AVE) {
2962 ifmgd->flags &= ~IEEE80211_STA_RESET_SIGNAL_AVE;
3ba06c6f 2963 ifmgd->ave_beacon_signal = rx_status->signal * 16;
17e4ec14 2964 ifmgd->last_cqm_event_signal = 0;
391a200a 2965 ifmgd->count_beacon_signal = 1;
615f7b9b 2966 ifmgd->last_ave_beacon_signal = 0;
17e4ec14
JM
2967 } else {
2968 ifmgd->ave_beacon_signal =
2969 (IEEE80211_SIGNAL_AVE_WEIGHT * rx_status->signal * 16 +
2970 (16 - IEEE80211_SIGNAL_AVE_WEIGHT) *
2971 ifmgd->ave_beacon_signal) / 16;
391a200a 2972 ifmgd->count_beacon_signal++;
17e4ec14 2973 }
615f7b9b
MV
2974
2975 if (ifmgd->rssi_min_thold != ifmgd->rssi_max_thold &&
2976 ifmgd->count_beacon_signal >= IEEE80211_SIGNAL_AVE_MIN_COUNT) {
2977 int sig = ifmgd->ave_beacon_signal;
2978 int last_sig = ifmgd->last_ave_beacon_signal;
2979
2980 /*
2981 * if signal crosses either of the boundaries, invoke callback
2982 * with appropriate parameters
2983 */
2984 if (sig > ifmgd->rssi_max_thold &&
2985 (last_sig <= ifmgd->rssi_min_thold || last_sig == 0)) {
2986 ifmgd->last_ave_beacon_signal = sig;
887da917 2987 drv_rssi_callback(local, sdata, RSSI_EVENT_HIGH);
615f7b9b
MV
2988 } else if (sig < ifmgd->rssi_min_thold &&
2989 (last_sig >= ifmgd->rssi_max_thold ||
2990 last_sig == 0)) {
2991 ifmgd->last_ave_beacon_signal = sig;
887da917 2992 drv_rssi_callback(local, sdata, RSSI_EVENT_LOW);
615f7b9b
MV
2993 }
2994 }
2995
17e4ec14 2996 if (bss_conf->cqm_rssi_thold &&
391a200a 2997 ifmgd->count_beacon_signal >= IEEE80211_SIGNAL_AVE_MIN_COUNT &&
ea086359 2998 !(sdata->vif.driver_flags & IEEE80211_VIF_SUPPORTS_CQM_RSSI)) {
17e4ec14
JM
2999 int sig = ifmgd->ave_beacon_signal / 16;
3000 int last_event = ifmgd->last_cqm_event_signal;
3001 int thold = bss_conf->cqm_rssi_thold;
3002 int hyst = bss_conf->cqm_rssi_hyst;
3003 if (sig < thold &&
3004 (last_event == 0 || sig < last_event - hyst)) {
3005 ifmgd->last_cqm_event_signal = sig;
3006 ieee80211_cqm_rssi_notify(
3007 &sdata->vif,
3008 NL80211_CQM_RSSI_THRESHOLD_EVENT_LOW,
3009 GFP_KERNEL);
3010 } else if (sig > thold &&
3011 (last_event == 0 || sig > last_event + hyst)) {
3012 ifmgd->last_cqm_event_signal = sig;
3013 ieee80211_cqm_rssi_notify(
3014 &sdata->vif,
3015 NL80211_CQM_RSSI_THRESHOLD_EVENT_HIGH,
3016 GFP_KERNEL);
3017 }
3018 }
3019
392b9ffb 3020 if (ifmgd->flags & IEEE80211_STA_CONNECTION_POLL) {
bdcbd8e0 3021 mlme_dbg_ratelimited(sdata,
112c31f0 3022 "cancelling AP probe due to a received beacon\n");
392b9ffb 3023 ieee80211_reset_ap_probe(sdata);
92778180
JM
3024 }
3025
b291ba11
JB
3026 /*
3027 * Push the beacon loss detection into the future since
3028 * we are processing a beacon from the AP just now.
3029 */
d3a910a8 3030 ieee80211_sta_reset_beacon_monitor(sdata);
b291ba11 3031
d91f36db
JB
3032 ncrc = crc32_be(0, (void *)&mgmt->u.beacon.beacon_int, 4);
3033 ncrc = ieee802_11_parse_elems_crc(mgmt->u.beacon.variable,
b2e506bf 3034 len - baselen, false, &elems,
d91f36db
JB
3035 care_about_ies, ncrc);
3036
25c9c875 3037 if (local->hw.flags & IEEE80211_HW_PS_NULLFUNC_STACK) {
f87ad637
RR
3038 bool directed_tim = ieee80211_check_tim(elems.tim,
3039 elems.tim_len,
3040 ifmgd->aid);
1fb3606b 3041 if (directed_tim) {
572e0012 3042 if (local->hw.conf.dynamic_ps_timeout > 0) {
70b12f26
RW
3043 if (local->hw.conf.flags & IEEE80211_CONF_PS) {
3044 local->hw.conf.flags &= ~IEEE80211_CONF_PS;
3045 ieee80211_hw_config(local,
3046 IEEE80211_CONF_CHANGE_PS);
3047 }
572e0012 3048 ieee80211_send_nullfunc(local, sdata, 0);
6f0756a3 3049 } else if (!local->pspolling && sdata->u.mgd.powersave) {
572e0012
KV
3050 local->pspolling = true;
3051
3052 /*
3053 * Here is assumed that the driver will be
3054 * able to send ps-poll frame and receive a
3055 * response even though power save mode is
3056 * enabled, but some drivers might require
3057 * to disable power save here. This needs
3058 * to be investigated.
3059 */
3060 ieee80211_send_pspoll(local, sdata);
3061 }
a97b77b9
VN
3062 }
3063 }
7a5158ef 3064
488dd7b5 3065 if (sdata->vif.p2p) {
67baf663 3066 struct ieee80211_p2p_noa_attr noa = {};
488dd7b5
JB
3067 int ret;
3068
3069 ret = cfg80211_get_p2p_attr(mgmt->u.beacon.variable,
3070 len - baselen,
3071 IEEE80211_P2P_ATTR_ABSENCE_NOTICE,
934457ee 3072 (u8 *) &noa, sizeof(noa));
67baf663
JD
3073 if (ret >= 2) {
3074 if (sdata->u.mgd.p2p_noa_index != noa.index) {
3075 /* valid noa_attr and index changed */
3076 sdata->u.mgd.p2p_noa_index = noa.index;
3077 memcpy(&bss_conf->p2p_noa_attr, &noa, sizeof(noa));
3078 changed |= BSS_CHANGED_P2P_PS;
3079 /*
3080 * make sure we update all information, the CRC
3081 * mechanism doesn't look at P2P attributes.
3082 */
3083 ifmgd->beacon_crc_valid = false;
3084 }
3085 } else if (sdata->u.mgd.p2p_noa_index != -1) {
3086 /* noa_attr not found and we had valid noa_attr before */
3087 sdata->u.mgd.p2p_noa_index = -1;
3088 memset(&bss_conf->p2p_noa_attr, 0, sizeof(bss_conf->p2p_noa_attr));
488dd7b5 3089 changed |= BSS_CHANGED_P2P_PS;
488dd7b5
JB
3090 ifmgd->beacon_crc_valid = false;
3091 }
3092 }
3093
d8ec4433 3094 if (ncrc == ifmgd->beacon_crc && ifmgd->beacon_crc_valid)
8d61ffa5 3095 return;
30196673 3096 ifmgd->beacon_crc = ncrc;
d8ec4433 3097 ifmgd->beacon_crc_valid = true;
30196673 3098
d45c4172 3099 ieee80211_rx_bss_info(sdata, mgmt, len, rx_status, &elems);
7d25745d 3100
d70b7616
JB
3101 ieee80211_sta_process_chanswitch(sdata, rx_status->mactime,
3102 &elems, true);
3103
095d81ce
JB
3104 if (!(ifmgd->flags & IEEE80211_STA_DISABLE_WMM) &&
3105 ieee80211_sta_wmm_params(local, sdata, elems.wmm_param,
7d25745d
JB
3106 elems.wmm_param_len))
3107 changed |= BSS_CHANGED_QOS;
3108
c65dd147
EG
3109 /*
3110 * If we haven't had a beacon before, tell the driver about the
ef429dad 3111 * DTIM period (and beacon timing if desired) now.
c65dd147 3112 */
989c6505 3113 if (!ifmgd->have_beacon) {
c65dd147
EG
3114 /* a few bogus AP send dtim_period = 0 or no TIM IE */
3115 if (elems.tim)
3116 bss_conf->dtim_period = elems.tim->dtim_period ?: 1;
3117 else
3118 bss_conf->dtim_period = 1;
ef429dad
JB
3119
3120 if (local->hw.flags & IEEE80211_HW_TIMING_BEACON_ONLY) {
3121 sdata->vif.bss_conf.sync_tsf =
3122 le64_to_cpu(mgmt->u.beacon.timestamp);
3123 sdata->vif.bss_conf.sync_device_ts =
3124 rx_status->device_timestamp;
3125 if (elems.tim)
3126 sdata->vif.bss_conf.sync_dtim_count =
3127 elems.tim->dtim_count;
3128 else
3129 sdata->vif.bss_conf.sync_dtim_count = 0;
3130 }
3131
989c6505
AB
3132 changed |= BSS_CHANGED_BEACON_INFO;
3133 ifmgd->have_beacon = true;
482a9c74
AB
3134
3135 mutex_lock(&local->iflist_mtx);
3136 ieee80211_recalc_ps(local, -1);
3137 mutex_unlock(&local->iflist_mtx);
3138
ce857888 3139 ieee80211_recalc_ps_vif(sdata);
c65dd147
EG
3140 }
3141
1946bed9 3142 if (elems.erp_info) {
7a5158ef
JB
3143 erp_valid = true;
3144 erp_value = elems.erp_info[0];
3145 } else {
3146 erp_valid = false;
50c4afb9 3147 }
7a5158ef
JB
3148 changed |= ieee80211_handle_bss_capability(sdata,
3149 le16_to_cpu(mgmt->u.beacon.capab_info),
3150 erp_valid, erp_value);
f0706e82 3151
1128958d 3152 mutex_lock(&local->sta_mtx);
bee7f586
JB
3153 sta = sta_info_get(sdata, bssid);
3154
30eb1dc2
JB
3155 if (ieee80211_config_bw(sdata, sta, elems.ht_operation,
3156 elems.vht_operation, bssid, &changed)) {
3157 mutex_unlock(&local->sta_mtx);
3158 ieee80211_set_disassoc(sdata, IEEE80211_STYPE_DEAUTH,
3159 WLAN_REASON_DEAUTH_LEAVING,
3160 true, deauth_buf);
6ff57cf8
JB
3161 cfg80211_tx_mlme_mgmt(sdata->dev, deauth_buf,
3162 sizeof(deauth_buf));
8d61ffa5 3163 return;
30eb1dc2 3164 }
bee7f586
JB
3165
3166 if (sta && elems.opmode_notif)
3167 ieee80211_vht_handle_opmode(sdata, sta, *elems.opmode_notif,
3168 rx_status->band, true);
1128958d 3169 mutex_unlock(&local->sta_mtx);
d3c990fb 3170
04b7b2ff
JB
3171 if (elems.country_elem && elems.pwr_constr_elem &&
3172 mgmt->u.probe_resp.capab_info &
3173 cpu_to_le16(WLAN_CAPABILITY_SPECTRUM_MGMT))
1ea6f9c0
JB
3174 changed |= ieee80211_handle_pwr_constr(sdata, chan,
3175 elems.country_elem,
3176 elems.country_elem_len,
3177 elems.pwr_constr_elem);
3f2355cb 3178
471b3efd 3179 ieee80211_bss_info_change_notify(sdata, changed);
f0706e82
JB
3180}
3181
1fa57d01
JB
3182void ieee80211_sta_rx_queued_mgmt(struct ieee80211_sub_if_data *sdata,
3183 struct sk_buff *skb)
f0706e82
JB
3184{
3185 struct ieee80211_rx_status *rx_status;
f0706e82
JB
3186 struct ieee80211_mgmt *mgmt;
3187 u16 fc;
1b3a2e49
JB
3188 struct ieee802_11_elems elems;
3189 int ies_len;
f0706e82 3190
f0706e82
JB
3191 rx_status = (struct ieee80211_rx_status *) skb->cb;
3192 mgmt = (struct ieee80211_mgmt *) skb->data;
3193 fc = le16_to_cpu(mgmt->frame_control);
3194
8d61ffa5 3195 sdata_lock(sdata);
77fdaa12 3196
66e67e41
JB
3197 switch (fc & IEEE80211_FCTL_STYPE) {
3198 case IEEE80211_STYPE_BEACON:
8d61ffa5 3199 ieee80211_rx_mgmt_beacon(sdata, mgmt, skb->len, rx_status);
66e67e41
JB
3200 break;
3201 case IEEE80211_STYPE_PROBE_RESP:
3202 ieee80211_rx_mgmt_probe_resp(sdata, skb);
3203 break;
3204 case IEEE80211_STYPE_AUTH:
8d61ffa5 3205 ieee80211_rx_mgmt_auth(sdata, mgmt, skb->len);
66e67e41
JB
3206 break;
3207 case IEEE80211_STYPE_DEAUTH:
8d61ffa5 3208 ieee80211_rx_mgmt_deauth(sdata, mgmt, skb->len);
66e67e41
JB
3209 break;
3210 case IEEE80211_STYPE_DISASSOC:
8d61ffa5 3211 ieee80211_rx_mgmt_disassoc(sdata, mgmt, skb->len);
66e67e41
JB
3212 break;
3213 case IEEE80211_STYPE_ASSOC_RESP:
3214 case IEEE80211_STYPE_REASSOC_RESP:
8d61ffa5 3215 ieee80211_rx_mgmt_assoc_resp(sdata, mgmt, skb->len);
66e67e41
JB
3216 break;
3217 case IEEE80211_STYPE_ACTION:
37799e52 3218 if (mgmt->u.action.category == WLAN_CATEGORY_SPECTRUM_MGMT) {
1b3a2e49
JB
3219 ies_len = skb->len -
3220 offsetof(struct ieee80211_mgmt,
3221 u.action.u.chan_switch.variable);
37799e52
JB
3222
3223 if (ies_len < 0)
3224 break;
3225
3226 ieee802_11_parse_elems(
3227 mgmt->u.action.u.chan_switch.variable,
b2e506bf 3228 ies_len, true, &elems);
37799e52
JB
3229
3230 if (elems.parse_error)
3231 break;
3232
1b3a2e49
JB
3233 ieee80211_sta_process_chanswitch(sdata,
3234 rx_status->mactime,
04a161f4 3235 &elems, false);
1b3a2e49
JB
3236 } else if (mgmt->u.action.category == WLAN_CATEGORY_PUBLIC) {
3237 ies_len = skb->len -
3238 offsetof(struct ieee80211_mgmt,
3239 u.action.u.ext_chan_switch.variable);
3240
3241 if (ies_len < 0)
3242 break;
3243
3244 ieee802_11_parse_elems(
3245 mgmt->u.action.u.ext_chan_switch.variable,
b2e506bf 3246 ies_len, true, &elems);
1b3a2e49
JB
3247
3248 if (elems.parse_error)
3249 break;
3250
3251 /* for the handling code pretend this was also an IE */
3252 elems.ext_chansw_ie =
3253 &mgmt->u.action.u.ext_chan_switch.data;
3254
66e67e41 3255 ieee80211_sta_process_chanswitch(sdata,
37799e52 3256 rx_status->mactime,
04a161f4 3257 &elems, false);
77fdaa12 3258 }
37799e52 3259 break;
77fdaa12 3260 }
8d61ffa5 3261 sdata_unlock(sdata);
f0706e82
JB
3262}
3263
9c6bd790 3264static void ieee80211_sta_timer(unsigned long data)
f0706e82 3265{
60f8b39c
JB
3266 struct ieee80211_sub_if_data *sdata =
3267 (struct ieee80211_sub_if_data *) data;
5bb644a0 3268
9b7d72c1 3269 ieee80211_queue_work(&sdata->local->hw, &sdata->work);
f0706e82
JB
3270}
3271
04ac3c0e 3272static void ieee80211_sta_connection_lost(struct ieee80211_sub_if_data *sdata,
6b684db1 3273 u8 *bssid, u8 reason, bool tx)
04ac3c0e 3274{
6ae16775 3275 u8 frame_buf[IEEE80211_DEAUTH_FRAME_LEN];
04ac3c0e 3276
37ad3888 3277 ieee80211_set_disassoc(sdata, IEEE80211_STYPE_DEAUTH, reason,
6b684db1 3278 tx, frame_buf);
37ad3888 3279
6ff57cf8
JB
3280 cfg80211_tx_mlme_mgmt(sdata->dev, frame_buf,
3281 IEEE80211_DEAUTH_FRAME_LEN);
04ac3c0e
FF
3282}
3283
66e67e41
JB
3284static int ieee80211_probe_auth(struct ieee80211_sub_if_data *sdata)
3285{
3286 struct ieee80211_local *local = sdata->local;
3287 struct ieee80211_if_managed *ifmgd = &sdata->u.mgd;
3288 struct ieee80211_mgd_auth_data *auth_data = ifmgd->auth_data;
1672c0e3 3289 u32 tx_flags = 0;
66e67e41 3290
8d61ffa5 3291 sdata_assert_lock(sdata);
66e67e41
JB
3292
3293 if (WARN_ON_ONCE(!auth_data))
3294 return -EINVAL;
3295
66e67e41
JB
3296 auth_data->tries++;
3297
3298 if (auth_data->tries > IEEE80211_AUTH_MAX_TRIES) {
bdcbd8e0
JB
3299 sdata_info(sdata, "authentication with %pM timed out\n",
3300 auth_data->bss->bssid);
66e67e41
JB
3301
3302 /*
3303 * Most likely AP is not in the range so remove the
3304 * bss struct for that AP.
3305 */
3306 cfg80211_unlink_bss(local->hw.wiphy, auth_data->bss);
3307
3308 return -ETIMEDOUT;
3309 }
3310
a1845fc7
JB
3311 drv_mgd_prepare_tx(local, sdata);
3312
66e67e41 3313 if (auth_data->bss->proberesp_ies) {
6b8ece3a
JM
3314 u16 trans = 1;
3315 u16 status = 0;
3316
bdcbd8e0
JB
3317 sdata_info(sdata, "send auth to %pM (try %d/%d)\n",
3318 auth_data->bss->bssid, auth_data->tries,
3319 IEEE80211_AUTH_MAX_TRIES);
66e67e41
JB
3320
3321 auth_data->expected_transaction = 2;
6b8ece3a
JM
3322
3323 if (auth_data->algorithm == WLAN_AUTH_SAE) {
3324 trans = auth_data->sae_trans;
3325 status = auth_data->sae_status;
3326 auth_data->expected_transaction = trans;
3327 }
3328
6211dd12
SG
3329 if (local->hw.flags & IEEE80211_HW_REPORTS_TX_ACK_STATUS)
3330 tx_flags = IEEE80211_TX_CTL_REQ_TX_STATUS |
3331 IEEE80211_TX_INTFL_MLME_CONN_TX;
3332
6b8ece3a
JM
3333 ieee80211_send_auth(sdata, trans, auth_data->algorithm, status,
3334 auth_data->data, auth_data->data_len,
66e67e41 3335 auth_data->bss->bssid,
1672c0e3
JB
3336 auth_data->bss->bssid, NULL, 0, 0,
3337 tx_flags);
66e67e41
JB
3338 } else {
3339 const u8 *ssidie;
3340
bdcbd8e0
JB
3341 sdata_info(sdata, "direct probe to %pM (try %d/%i)\n",
3342 auth_data->bss->bssid, auth_data->tries,
3343 IEEE80211_AUTH_MAX_TRIES);
66e67e41 3344
9caf0364 3345 rcu_read_lock();
66e67e41 3346 ssidie = ieee80211_bss_get_ie(auth_data->bss, WLAN_EID_SSID);
9caf0364
JB
3347 if (!ssidie) {
3348 rcu_read_unlock();
66e67e41 3349 return -EINVAL;
9caf0364 3350 }
66e67e41
JB
3351 /*
3352 * Direct probe is sent to broadcast address as some APs
3353 * will not answer to direct packet in unassociated state.
3354 */
3355 ieee80211_send_probe_req(sdata, NULL, ssidie + 2, ssidie[1],
6211dd12 3356 NULL, 0, (u32) -1, true, 0,
55de908a 3357 auth_data->bss->channel, false);
9caf0364 3358 rcu_read_unlock();
66e67e41
JB
3359 }
3360
6211dd12 3361 if (tx_flags == 0) {
1672c0e3 3362 auth_data->timeout = jiffies + IEEE80211_AUTH_TIMEOUT;
cb236d2d 3363 auth_data->timeout_started = true;
8d61ffa5 3364 run_again(sdata, auth_data->timeout);
89afe614 3365 } else {
cb236d2d
JB
3366 auth_data->timeout =
3367 round_jiffies_up(jiffies + IEEE80211_AUTH_TIMEOUT_LONG);
3368 auth_data->timeout_started = true;
3369 run_again(sdata, auth_data->timeout);
1672c0e3 3370 }
66e67e41
JB
3371
3372 return 0;
3373}
3374
3375static int ieee80211_do_assoc(struct ieee80211_sub_if_data *sdata)
3376{
3377 struct ieee80211_mgd_assoc_data *assoc_data = sdata->u.mgd.assoc_data;
3378 struct ieee80211_local *local = sdata->local;
3379
8d61ffa5 3380 sdata_assert_lock(sdata);
66e67e41 3381
66e67e41
JB
3382 assoc_data->tries++;
3383 if (assoc_data->tries > IEEE80211_ASSOC_MAX_TRIES) {
bdcbd8e0
JB
3384 sdata_info(sdata, "association with %pM timed out\n",
3385 assoc_data->bss->bssid);
66e67e41
JB
3386
3387 /*
3388 * Most likely AP is not in the range so remove the
3389 * bss struct for that AP.
3390 */
3391 cfg80211_unlink_bss(local->hw.wiphy, assoc_data->bss);
3392
3393 return -ETIMEDOUT;
3394 }
3395
bdcbd8e0
JB
3396 sdata_info(sdata, "associate with %pM (try %d/%d)\n",
3397 assoc_data->bss->bssid, assoc_data->tries,
3398 IEEE80211_ASSOC_MAX_TRIES);
66e67e41
JB
3399 ieee80211_send_assoc(sdata);
3400
1672c0e3
JB
3401 if (!(local->hw.flags & IEEE80211_HW_REPORTS_TX_ACK_STATUS)) {
3402 assoc_data->timeout = jiffies + IEEE80211_ASSOC_TIMEOUT;
89afe614 3403 assoc_data->timeout_started = true;
8d61ffa5 3404 run_again(sdata, assoc_data->timeout);
89afe614 3405 } else {
cb236d2d
JB
3406 assoc_data->timeout =
3407 round_jiffies_up(jiffies +
3408 IEEE80211_ASSOC_TIMEOUT_LONG);
3409 assoc_data->timeout_started = true;
3410 run_again(sdata, assoc_data->timeout);
1672c0e3 3411 }
66e67e41
JB
3412
3413 return 0;
3414}
3415
1672c0e3
JB
3416void ieee80211_mgd_conn_tx_status(struct ieee80211_sub_if_data *sdata,
3417 __le16 fc, bool acked)
3418{
3419 struct ieee80211_local *local = sdata->local;
3420
3421 sdata->u.mgd.status_fc = fc;
3422 sdata->u.mgd.status_acked = acked;
3423 sdata->u.mgd.status_received = true;
3424
3425 ieee80211_queue_work(&local->hw, &sdata->work);
3426}
3427
1fa57d01 3428void ieee80211_sta_work(struct ieee80211_sub_if_data *sdata)
9c6bd790 3429{
9c6bd790 3430 struct ieee80211_local *local = sdata->local;
1fa57d01 3431 struct ieee80211_if_managed *ifmgd = &sdata->u.mgd;
9c6bd790 3432
8d61ffa5 3433 sdata_lock(sdata);
77fdaa12 3434
1672c0e3
JB
3435 if (ifmgd->status_received) {
3436 __le16 fc = ifmgd->status_fc;
3437 bool status_acked = ifmgd->status_acked;
3438
3439 ifmgd->status_received = false;
3440 if (ifmgd->auth_data &&
3441 (ieee80211_is_probe_req(fc) || ieee80211_is_auth(fc))) {
3442 if (status_acked) {
3443 ifmgd->auth_data->timeout =
3444 jiffies + IEEE80211_AUTH_TIMEOUT_SHORT;
8d61ffa5 3445 run_again(sdata, ifmgd->auth_data->timeout);
1672c0e3
JB
3446 } else {
3447 ifmgd->auth_data->timeout = jiffies - 1;
3448 }
89afe614 3449 ifmgd->auth_data->timeout_started = true;
1672c0e3
JB
3450 } else if (ifmgd->assoc_data &&
3451 (ieee80211_is_assoc_req(fc) ||
3452 ieee80211_is_reassoc_req(fc))) {
3453 if (status_acked) {
3454 ifmgd->assoc_data->timeout =
3455 jiffies + IEEE80211_ASSOC_TIMEOUT_SHORT;
8d61ffa5 3456 run_again(sdata, ifmgd->assoc_data->timeout);
1672c0e3
JB
3457 } else {
3458 ifmgd->assoc_data->timeout = jiffies - 1;
3459 }
89afe614 3460 ifmgd->assoc_data->timeout_started = true;
1672c0e3
JB
3461 }
3462 }
3463
89afe614 3464 if (ifmgd->auth_data && ifmgd->auth_data->timeout_started &&
66e67e41
JB
3465 time_after(jiffies, ifmgd->auth_data->timeout)) {
3466 if (ifmgd->auth_data->done) {
3467 /*
3468 * ok ... we waited for assoc but userspace didn't,
3469 * so let's just kill the auth data
3470 */
3471 ieee80211_destroy_auth_data(sdata, false);
3472 } else if (ieee80211_probe_auth(sdata)) {
3473 u8 bssid[ETH_ALEN];
3474
3475 memcpy(bssid, ifmgd->auth_data->bss->bssid, ETH_ALEN);
3476
3477 ieee80211_destroy_auth_data(sdata, false);
3478
6ff57cf8 3479 cfg80211_auth_timeout(sdata->dev, bssid);
66e67e41 3480 }
89afe614 3481 } else if (ifmgd->auth_data && ifmgd->auth_data->timeout_started)
8d61ffa5 3482 run_again(sdata, ifmgd->auth_data->timeout);
66e67e41 3483
89afe614 3484 if (ifmgd->assoc_data && ifmgd->assoc_data->timeout_started &&
66e67e41 3485 time_after(jiffies, ifmgd->assoc_data->timeout)) {
989c6505 3486 if ((ifmgd->assoc_data->need_beacon && !ifmgd->have_beacon) ||
66e67e41 3487 ieee80211_do_assoc(sdata)) {
959867fa 3488 struct cfg80211_bss *bss = ifmgd->assoc_data->bss;
66e67e41
JB
3489
3490 ieee80211_destroy_assoc_data(sdata, false);
959867fa 3491 cfg80211_assoc_timeout(sdata->dev, bss);
66e67e41 3492 }
89afe614 3493 } else if (ifmgd->assoc_data && ifmgd->assoc_data->timeout_started)
8d61ffa5 3494 run_again(sdata, ifmgd->assoc_data->timeout);
66e67e41 3495
392b9ffb 3496 if (ifmgd->flags & IEEE80211_STA_CONNECTION_POLL &&
b291ba11 3497 ifmgd->associated) {
a43abf29 3498 u8 bssid[ETH_ALEN];
72a8a3ed 3499 int max_tries;
a43abf29 3500
0c1ad2ca 3501 memcpy(bssid, ifmgd->associated->bssid, ETH_ALEN);
4e5ff376 3502
72a8a3ed 3503 if (local->hw.flags & IEEE80211_HW_REPORTS_TX_ACK_STATUS)
180205bd 3504 max_tries = max_nullfunc_tries;
72a8a3ed 3505 else
180205bd 3506 max_tries = max_probe_tries;
72a8a3ed 3507
4e5ff376
FF
3508 /* ACK received for nullfunc probing frame */
3509 if (!ifmgd->probe_send_count)
3510 ieee80211_reset_ap_probe(sdata);
04ac3c0e
FF
3511 else if (ifmgd->nullfunc_failed) {
3512 if (ifmgd->probe_send_count < max_tries) {
bdcbd8e0
JB
3513 mlme_dbg(sdata,
3514 "No ack for nullfunc frame to AP %pM, try %d/%i\n",
3515 bssid, ifmgd->probe_send_count,
3516 max_tries);
04ac3c0e
FF
3517 ieee80211_mgd_probe_ap_send(sdata);
3518 } else {
bdcbd8e0
JB
3519 mlme_dbg(sdata,
3520 "No ack for nullfunc frame to AP %pM, disconnecting.\n",
3521 bssid);
95acac61 3522 ieee80211_sta_connection_lost(sdata, bssid,
6b684db1
JB
3523 WLAN_REASON_DISASSOC_DUE_TO_INACTIVITY,
3524 false);
04ac3c0e
FF
3525 }
3526 } else if (time_is_after_jiffies(ifmgd->probe_timeout))
8d61ffa5 3527 run_again(sdata, ifmgd->probe_timeout);
04ac3c0e 3528 else if (local->hw.flags & IEEE80211_HW_REPORTS_TX_ACK_STATUS) {
bdcbd8e0
JB
3529 mlme_dbg(sdata,
3530 "Failed to send nullfunc to AP %pM after %dms, disconnecting\n",
3531 bssid, probe_wait_ms);
95acac61 3532 ieee80211_sta_connection_lost(sdata, bssid,
6b684db1 3533 WLAN_REASON_DISASSOC_DUE_TO_INACTIVITY, false);
04ac3c0e 3534 } else if (ifmgd->probe_send_count < max_tries) {
bdcbd8e0
JB
3535 mlme_dbg(sdata,
3536 "No probe response from AP %pM after %dms, try %d/%i\n",
3537 bssid, probe_wait_ms,
3538 ifmgd->probe_send_count, max_tries);
a43abf29
ML
3539 ieee80211_mgd_probe_ap_send(sdata);
3540 } else {
b291ba11
JB
3541 /*
3542 * We actually lost the connection ... or did we?
3543 * Let's make sure!
3544 */
b38afa87
BG
3545 wiphy_debug(local->hw.wiphy,
3546 "%s: No probe response from AP %pM"
3547 " after %dms, disconnecting.\n",
3548 sdata->name,
180205bd 3549 bssid, probe_wait_ms);
04ac3c0e 3550
95acac61 3551 ieee80211_sta_connection_lost(sdata, bssid,
6b684db1 3552 WLAN_REASON_DISASSOC_DUE_TO_INACTIVITY, false);
b291ba11
JB
3553 }
3554 }
3555
8d61ffa5 3556 sdata_unlock(sdata);
f0706e82
JB
3557}
3558
b291ba11
JB
3559static void ieee80211_sta_bcn_mon_timer(unsigned long data)
3560{
3561 struct ieee80211_sub_if_data *sdata =
3562 (struct ieee80211_sub_if_data *) data;
3563 struct ieee80211_local *local = sdata->local;
3564
3565 if (local->quiescing)
3566 return;
3567
682bd38b 3568 sdata->u.mgd.connection_loss = false;
1e4dcd01
JO
3569 ieee80211_queue_work(&sdata->local->hw,
3570 &sdata->u.mgd.beacon_connection_loss_work);
b291ba11
JB
3571}
3572
3573static void ieee80211_sta_conn_mon_timer(unsigned long data)
3574{
3575 struct ieee80211_sub_if_data *sdata =
3576 (struct ieee80211_sub_if_data *) data;
3577 struct ieee80211_if_managed *ifmgd = &sdata->u.mgd;
3578 struct ieee80211_local *local = sdata->local;
3579
3580 if (local->quiescing)
3581 return;
3582
42935eca 3583 ieee80211_queue_work(&local->hw, &ifmgd->monitor_work);
b291ba11
JB
3584}
3585
3586static void ieee80211_sta_monitor_work(struct work_struct *work)
3587{
3588 struct ieee80211_sub_if_data *sdata =
3589 container_of(work, struct ieee80211_sub_if_data,
3590 u.mgd.monitor_work);
3591
3592 ieee80211_mgd_probe_ap(sdata, false);
3593}
3594
9c6bd790
JB
3595static void ieee80211_restart_sta_timer(struct ieee80211_sub_if_data *sdata)
3596{
494f1fe5
EP
3597 u32 flags;
3598
ad935687 3599 if (sdata->vif.type == NL80211_IFTYPE_STATION) {
925e64c3 3600 __ieee80211_stop_poll(sdata);
ad935687 3601
b291ba11 3602 /* let's probe the connection once */
494f1fe5
EP
3603 flags = sdata->local->hw.flags;
3604 if (!(flags & IEEE80211_HW_CONNECTION_MONITOR))
3605 ieee80211_queue_work(&sdata->local->hw,
3606 &sdata->u.mgd.monitor_work);
b291ba11 3607 /* and do all the other regular work too */
64592c8f 3608 ieee80211_queue_work(&sdata->local->hw, &sdata->work);
ad935687 3609 }
9c6bd790 3610}
f0706e82 3611
b8360ab8 3612#ifdef CONFIG_PM
1a1cb744
JB
3613void ieee80211_mgd_quiesce(struct ieee80211_sub_if_data *sdata)
3614{
3615 struct ieee80211_if_managed *ifmgd = &sdata->u.mgd;
3616 u8 frame_buf[IEEE80211_DEAUTH_FRAME_LEN];
3617
3618 sdata_lock(sdata);
3619
3620 if (ifmgd->auth_data) {
3621 /*
3622 * If we are trying to authenticate while suspending, cfg80211
3623 * won't know and won't actually abort those attempts, thus we
3624 * need to do that ourselves.
3625 */
3626 ieee80211_send_deauth_disassoc(sdata,
3627 ifmgd->auth_data->bss->bssid,
3628 IEEE80211_STYPE_DEAUTH,
3629 WLAN_REASON_DEAUTH_LEAVING,
3630 false, frame_buf);
3631 ieee80211_destroy_auth_data(sdata, false);
3632 cfg80211_tx_mlme_mgmt(sdata->dev, frame_buf,
3633 IEEE80211_DEAUTH_FRAME_LEN);
3634 }
3635
3636 sdata_unlock(sdata);
3637}
3638
b8360ab8
JB
3639void ieee80211_sta_restart(struct ieee80211_sub_if_data *sdata)
3640{
3641 struct ieee80211_if_managed *ifmgd = &sdata->u.mgd;
3642
8d61ffa5 3643 sdata_lock(sdata);
b8360ab8 3644 if (!ifmgd->associated) {
8d61ffa5 3645 sdata_unlock(sdata);
b8360ab8
JB
3646 return;
3647 }
3648
3649 if (sdata->flags & IEEE80211_SDATA_DISCONNECT_RESUME) {
3650 sdata->flags &= ~IEEE80211_SDATA_DISCONNECT_RESUME;
3651 mlme_dbg(sdata, "driver requested disconnect after resume\n");
3652 ieee80211_sta_connection_lost(sdata,
3653 ifmgd->associated->bssid,
3654 WLAN_REASON_UNSPECIFIED,
3655 true);
8d61ffa5 3656 sdata_unlock(sdata);
b8360ab8
JB
3657 return;
3658 }
8d61ffa5 3659 sdata_unlock(sdata);
b8360ab8
JB
3660}
3661#endif
3662
9c6bd790
JB
3663/* interface setup */
3664void ieee80211_sta_setup_sdata(struct ieee80211_sub_if_data *sdata)
f0706e82 3665{
46900298 3666 struct ieee80211_if_managed *ifmgd;
988c0f72 3667
46900298 3668 ifmgd = &sdata->u.mgd;
b291ba11 3669 INIT_WORK(&ifmgd->monitor_work, ieee80211_sta_monitor_work);
46900298 3670 INIT_WORK(&ifmgd->chswitch_work, ieee80211_chswitch_work);
1e4dcd01
JO
3671 INIT_WORK(&ifmgd->beacon_connection_loss_work,
3672 ieee80211_beacon_connection_loss_work);
882a7c69
JB
3673 INIT_WORK(&ifmgd->csa_connection_drop_work,
3674 ieee80211_csa_connection_drop_work);
687da132 3675 INIT_WORK(&ifmgd->request_smps_work, ieee80211_request_smps_mgd_work);
46900298 3676 setup_timer(&ifmgd->timer, ieee80211_sta_timer,
c481ec97 3677 (unsigned long) sdata);
b291ba11
JB
3678 setup_timer(&ifmgd->bcn_mon_timer, ieee80211_sta_bcn_mon_timer,
3679 (unsigned long) sdata);
3680 setup_timer(&ifmgd->conn_mon_timer, ieee80211_sta_conn_mon_timer,
3681 (unsigned long) sdata);
46900298 3682 setup_timer(&ifmgd->chswitch_timer, ieee80211_chswitch_timer,
9c6bd790 3683 (unsigned long) sdata);
9c6bd790 3684
ab1faead 3685 ifmgd->flags = 0;
1478acb3 3686 ifmgd->powersave = sdata->wdev.ps;
219c3867
AB
3687 ifmgd->uapsd_queues = sdata->local->hw.uapsd_queues;
3688 ifmgd->uapsd_max_sp_len = sdata->local->hw.uapsd_max_sp_len;
67baf663 3689 ifmgd->p2p_noa_index = -1;
bbbdff9e 3690
0f78231b
JB
3691 if (sdata->local->hw.flags & IEEE80211_HW_SUPPORTS_DYNAMIC_SMPS)
3692 ifmgd->req_smps = IEEE80211_SMPS_AUTOMATIC;
3693 else
3694 ifmgd->req_smps = IEEE80211_SMPS_OFF;
f0706e82
JB
3695}
3696
77fdaa12
JB
3697/* scan finished notification */
3698void ieee80211_mlme_notify_scan_completed(struct ieee80211_local *local)
60f8b39c 3699{
31ee67a1 3700 struct ieee80211_sub_if_data *sdata;
60f8b39c 3701
77fdaa12
JB
3702 /* Restart STA timers */
3703 rcu_read_lock();
370bd005
BG
3704 list_for_each_entry_rcu(sdata, &local->interfaces, list) {
3705 if (ieee80211_sdata_running(sdata))
3706 ieee80211_restart_sta_timer(sdata);
3707 }
77fdaa12
JB
3708 rcu_read_unlock();
3709}
60f8b39c 3710
77fdaa12
JB
3711int ieee80211_max_network_latency(struct notifier_block *nb,
3712 unsigned long data, void *dummy)
3713{
3714 s32 latency_usec = (s32) data;
3715 struct ieee80211_local *local =
3716 container_of(nb, struct ieee80211_local,
3717 network_latency_notifier);
1fa6f4af 3718
77fdaa12
JB
3719 mutex_lock(&local->iflist_mtx);
3720 ieee80211_recalc_ps(local, latency_usec);
3721 mutex_unlock(&local->iflist_mtx);
dfe67012 3722
8bd811aa 3723 return NOTIFY_OK;
9c6bd790
JB
3724}
3725
f2d9d270
JB
3726static u8 ieee80211_ht_vht_rx_chains(struct ieee80211_sub_if_data *sdata,
3727 struct cfg80211_bss *cbss)
3728{
3729 struct ieee80211_if_managed *ifmgd = &sdata->u.mgd;
3730 const u8 *ht_cap_ie, *vht_cap_ie;
3731 const struct ieee80211_ht_cap *ht_cap;
3732 const struct ieee80211_vht_cap *vht_cap;
3733 u8 chains = 1;
3734
3735 if (ifmgd->flags & IEEE80211_STA_DISABLE_HT)
3736 return chains;
3737
9caf0364 3738 ht_cap_ie = ieee80211_bss_get_ie(cbss, WLAN_EID_HT_CAPABILITY);
f2d9d270
JB
3739 if (ht_cap_ie && ht_cap_ie[1] >= sizeof(*ht_cap)) {
3740 ht_cap = (void *)(ht_cap_ie + 2);
3741 chains = ieee80211_mcs_to_chains(&ht_cap->mcs);
3742 /*
3743 * TODO: use "Tx Maximum Number Spatial Streams Supported" and
3744 * "Tx Unequal Modulation Supported" fields.
3745 */
3746 }
3747
3748 if (ifmgd->flags & IEEE80211_STA_DISABLE_VHT)
3749 return chains;
3750
9caf0364 3751 vht_cap_ie = ieee80211_bss_get_ie(cbss, WLAN_EID_VHT_CAPABILITY);
f2d9d270
JB
3752 if (vht_cap_ie && vht_cap_ie[1] >= sizeof(*vht_cap)) {
3753 u8 nss;
3754 u16 tx_mcs_map;
3755
3756 vht_cap = (void *)(vht_cap_ie + 2);
3757 tx_mcs_map = le16_to_cpu(vht_cap->supp_mcs.tx_mcs_map);
3758 for (nss = 8; nss > 0; nss--) {
3759 if (((tx_mcs_map >> (2 * (nss - 1))) & 3) !=
3760 IEEE80211_VHT_MCS_NOT_SUPPORTED)
3761 break;
3762 }
3763 /* TODO: use "Tx Highest Supported Long GI Data Rate" field? */
3764 chains = max(chains, nss);
3765 }
3766
3767 return chains;
3768}
3769
b17166a7
JB
3770static int ieee80211_prep_channel(struct ieee80211_sub_if_data *sdata,
3771 struct cfg80211_bss *cbss)
a1cf775d
JB
3772{
3773 struct ieee80211_local *local = sdata->local;
3774 struct ieee80211_if_managed *ifmgd = &sdata->u.mgd;
24398e39 3775 const struct ieee80211_ht_operation *ht_oper = NULL;
f2d9d270 3776 const struct ieee80211_vht_operation *vht_oper = NULL;
24398e39 3777 struct ieee80211_supported_band *sband;
4bf88530 3778 struct cfg80211_chan_def chandef;
f2d9d270 3779 int ret;
a1cf775d 3780
24398e39
JB
3781 sband = local->hw.wiphy->bands[cbss->channel->band];
3782
f2d9d270
JB
3783 ifmgd->flags &= ~(IEEE80211_STA_DISABLE_40MHZ |
3784 IEEE80211_STA_DISABLE_80P80MHZ |
3785 IEEE80211_STA_DISABLE_160MHZ);
3786
9caf0364
JB
3787 rcu_read_lock();
3788
f2d9d270
JB
3789 if (!(ifmgd->flags & IEEE80211_STA_DISABLE_HT) &&
3790 sband->ht_cap.ht_supported) {
08e6effa 3791 const u8 *ht_oper_ie, *ht_cap;
24398e39 3792
9caf0364 3793 ht_oper_ie = ieee80211_bss_get_ie(cbss, WLAN_EID_HT_OPERATION);
24398e39
JB
3794 if (ht_oper_ie && ht_oper_ie[1] >= sizeof(*ht_oper))
3795 ht_oper = (void *)(ht_oper_ie + 2);
08e6effa
JB
3796
3797 ht_cap = ieee80211_bss_get_ie(cbss, WLAN_EID_HT_CAPABILITY);
3798 if (!ht_cap || ht_cap[1] < sizeof(struct ieee80211_ht_cap)) {
3799 ifmgd->flags |= IEEE80211_STA_DISABLE_HT;
3800 ht_oper = NULL;
3801 }
24398e39
JB
3802 }
3803
f2d9d270
JB
3804 if (!(ifmgd->flags & IEEE80211_STA_DISABLE_VHT) &&
3805 sband->vht_cap.vht_supported) {
08e6effa 3806 const u8 *vht_oper_ie, *vht_cap;
f2d9d270 3807
9caf0364
JB
3808 vht_oper_ie = ieee80211_bss_get_ie(cbss,
3809 WLAN_EID_VHT_OPERATION);
f2d9d270
JB
3810 if (vht_oper_ie && vht_oper_ie[1] >= sizeof(*vht_oper))
3811 vht_oper = (void *)(vht_oper_ie + 2);
3812 if (vht_oper && !ht_oper) {
3813 vht_oper = NULL;
bdcbd8e0 3814 sdata_info(sdata,
f2d9d270 3815 "AP advertised VHT without HT, disabling both\n");
cb145022
JB
3816 ifmgd->flags |= IEEE80211_STA_DISABLE_HT;
3817 ifmgd->flags |= IEEE80211_STA_DISABLE_VHT;
24398e39 3818 }
08e6effa
JB
3819
3820 vht_cap = ieee80211_bss_get_ie(cbss, WLAN_EID_VHT_CAPABILITY);
3821 if (!vht_cap || vht_cap[1] < sizeof(struct ieee80211_vht_cap)) {
3822 ifmgd->flags |= IEEE80211_STA_DISABLE_VHT;
3823 vht_oper = NULL;
3824 }
24398e39
JB
3825 }
3826
f2d9d270
JB
3827 ifmgd->flags |= ieee80211_determine_chantype(sdata, sband,
3828 cbss->channel,
3829 ht_oper, vht_oper,
5cdaed1e 3830 &chandef, false);
04ecd257 3831
f2d9d270
JB
3832 sdata->needed_rx_chains = min(ieee80211_ht_vht_rx_chains(sdata, cbss),
3833 local->rx_chains);
24398e39 3834
9caf0364
JB
3835 rcu_read_unlock();
3836
04ecd257
JB
3837 /* will change later if needed */
3838 sdata->smps_mode = IEEE80211_SMPS_OFF;
3839
34a3740d 3840 mutex_lock(&local->mtx);
f2d9d270
JB
3841 /*
3842 * If this fails (possibly due to channel context sharing
3843 * on incompatible channels, e.g. 80+80 and 160 sharing the
3844 * same control channel) try to use a smaller bandwidth.
3845 */
3846 ret = ieee80211_vif_use_channel(sdata, &chandef,
3847 IEEE80211_CHANCTX_SHARED);
0418a445
SW
3848
3849 /* don't downgrade for 5 and 10 MHz channels, though. */
3850 if (chandef.width == NL80211_CHAN_WIDTH_5 ||
3851 chandef.width == NL80211_CHAN_WIDTH_10)
34a3740d 3852 goto out;
0418a445 3853
d601cd8d 3854 while (ret && chandef.width != NL80211_CHAN_WIDTH_20_NOHT) {
e6b7cde4 3855 ifmgd->flags |= ieee80211_chandef_downgrade(&chandef);
d601cd8d
JB
3856 ret = ieee80211_vif_use_channel(sdata, &chandef,
3857 IEEE80211_CHANCTX_SHARED);
3858 }
34a3740d
JB
3859 out:
3860 mutex_unlock(&local->mtx);
f2d9d270 3861 return ret;
b17166a7
JB
3862}
3863
3864static int ieee80211_prep_connection(struct ieee80211_sub_if_data *sdata,
3865 struct cfg80211_bss *cbss, bool assoc)
3866{
3867 struct ieee80211_local *local = sdata->local;
3868 struct ieee80211_if_managed *ifmgd = &sdata->u.mgd;
3869 struct ieee80211_bss *bss = (void *)cbss->priv;
3870 struct sta_info *new_sta = NULL;
3871 bool have_sta = false;
3872 int err;
3873
3874 if (WARN_ON(!ifmgd->auth_data && !ifmgd->assoc_data))
3875 return -EINVAL;
3876
3877 if (assoc) {
3878 rcu_read_lock();
3879 have_sta = sta_info_get(sdata, cbss->bssid);
3880 rcu_read_unlock();
3881 }
3882
3883 if (!have_sta) {
3884 new_sta = sta_info_alloc(sdata, cbss->bssid, GFP_KERNEL);
3885 if (!new_sta)
3886 return -ENOMEM;
3887 }
13e0c8e3 3888 if (new_sta) {
5d6a1b06
JB
3889 u32 rates = 0, basic_rates = 0;
3890 bool have_higher_than_11mbit;
3891 int min_rate = INT_MAX, min_rate_index = -1;
2103dec1 3892 struct ieee80211_chanctx_conf *chanctx_conf;
b17166a7 3893 struct ieee80211_supported_band *sband;
8cef2c9d 3894 const struct cfg80211_bss_ies *ies;
2103dec1
SW
3895 int shift;
3896 u32 rate_flags;
b17166a7
JB
3897
3898 sband = local->hw.wiphy->bands[cbss->channel->band];
3899
3900 err = ieee80211_prep_channel(sdata, cbss);
3901 if (err) {
3902 sta_info_free(local, new_sta);
2103dec1 3903 return -EINVAL;
b17166a7 3904 }
2103dec1
SW
3905 shift = ieee80211_vif_get_shift(&sdata->vif);
3906
3907 rcu_read_lock();
3908 chanctx_conf = rcu_dereference(sdata->vif.chanctx_conf);
3909 if (WARN_ON(!chanctx_conf)) {
3910 rcu_read_unlock();
c368ddaa 3911 sta_info_free(local, new_sta);
2103dec1
SW
3912 return -EINVAL;
3913 }
3914 rate_flags = ieee80211_chandef_rate_flags(&chanctx_conf->def);
3915 rcu_read_unlock();
5d6a1b06 3916
5d6a1b06
JB
3917 ieee80211_get_rates(sband, bss->supp_rates,
3918 bss->supp_rates_len,
3919 &rates, &basic_rates,
3920 &have_higher_than_11mbit,
2103dec1
SW
3921 &min_rate, &min_rate_index,
3922 shift, rate_flags);
5d6a1b06
JB
3923
3924 /*
3925 * This used to be a workaround for basic rates missing
3926 * in the association response frame. Now that we no
3927 * longer use the basic rates from there, it probably
3928 * doesn't happen any more, but keep the workaround so
3929 * in case some *other* APs are buggy in different ways
3930 * we can connect -- with a warning.
3931 */
3932 if (!basic_rates && min_rate_index >= 0) {
bdcbd8e0
JB
3933 sdata_info(sdata,
3934 "No basic rates, using min rate instead\n");
5d6a1b06
JB
3935 basic_rates = BIT(min_rate_index);
3936 }
3937
13e0c8e3 3938 new_sta->sta.supp_rates[cbss->channel->band] = rates;
5d6a1b06
JB
3939 sdata->vif.bss_conf.basic_rates = basic_rates;
3940
3941 /* cf. IEEE 802.11 9.2.12 */
55de908a 3942 if (cbss->channel->band == IEEE80211_BAND_2GHZ &&
5d6a1b06
JB
3943 have_higher_than_11mbit)
3944 sdata->flags |= IEEE80211_SDATA_OPERATING_GMODE;
3945 else
3946 sdata->flags &= ~IEEE80211_SDATA_OPERATING_GMODE;
3947
3948 memcpy(ifmgd->bssid, cbss->bssid, ETH_ALEN);
3949
8c358bcd
JB
3950 /* set timing information */
3951 sdata->vif.bss_conf.beacon_int = cbss->beacon_interval;
8cef2c9d 3952 rcu_read_lock();
ef429dad
JB
3953 ies = rcu_dereference(cbss->beacon_ies);
3954 if (ies) {
3955 const u8 *tim_ie;
3956
3957 sdata->vif.bss_conf.sync_tsf = ies->tsf;
3958 sdata->vif.bss_conf.sync_device_ts =
3959 bss->device_ts_beacon;
3960 tim_ie = cfg80211_find_ie(WLAN_EID_TIM,
3961 ies->data, ies->len);
3962 if (tim_ie && tim_ie[1] >= 2)
3963 sdata->vif.bss_conf.sync_dtim_count = tim_ie[2];
3964 else
3965 sdata->vif.bss_conf.sync_dtim_count = 0;
3966 } else if (!(local->hw.flags &
3967 IEEE80211_HW_TIMING_BEACON_ONLY)) {
3968 ies = rcu_dereference(cbss->proberesp_ies);
3969 /* must be non-NULL since beacon IEs were NULL */
3970 sdata->vif.bss_conf.sync_tsf = ies->tsf;
3971 sdata->vif.bss_conf.sync_device_ts =
3972 bss->device_ts_presp;
3973 sdata->vif.bss_conf.sync_dtim_count = 0;
3974 } else {
3975 sdata->vif.bss_conf.sync_tsf = 0;
3976 sdata->vif.bss_conf.sync_device_ts = 0;
3977 sdata->vif.bss_conf.sync_dtim_count = 0;
3978 }
8cef2c9d 3979 rcu_read_unlock();
8c358bcd
JB
3980
3981 /* tell driver about BSSID, basic rates and timing */
5d6a1b06 3982 ieee80211_bss_info_change_notify(sdata,
8c358bcd
JB
3983 BSS_CHANGED_BSSID | BSS_CHANGED_BASIC_RATES |
3984 BSS_CHANGED_BEACON_INT);
a1cf775d
JB
3985
3986 if (assoc)
13e0c8e3 3987 sta_info_pre_move_state(new_sta, IEEE80211_STA_AUTH);
a1cf775d 3988
13e0c8e3
JB
3989 err = sta_info_insert(new_sta);
3990 new_sta = NULL;
a1cf775d 3991 if (err) {
bdcbd8e0
JB
3992 sdata_info(sdata,
3993 "failed to insert STA entry for the AP (error %d)\n",
3994 err);
a1cf775d
JB
3995 return err;
3996 }
3997 } else
b203ca39 3998 WARN_ON_ONCE(!ether_addr_equal(ifmgd->bssid, cbss->bssid));
a1cf775d
JB
3999
4000 return 0;
4001}
4002
77fdaa12
JB
4003/* config hooks */
4004int ieee80211_mgd_auth(struct ieee80211_sub_if_data *sdata,
4005 struct cfg80211_auth_request *req)
9c6bd790 4006{
66e67e41
JB
4007 struct ieee80211_local *local = sdata->local;
4008 struct ieee80211_if_managed *ifmgd = &sdata->u.mgd;
4009 struct ieee80211_mgd_auth_data *auth_data;
77fdaa12 4010 u16 auth_alg;
66e67e41
JB
4011 int err;
4012
4013 /* prepare auth data structure */
9c6bd790 4014
77fdaa12
JB
4015 switch (req->auth_type) {
4016 case NL80211_AUTHTYPE_OPEN_SYSTEM:
4017 auth_alg = WLAN_AUTH_OPEN;
4018 break;
4019 case NL80211_AUTHTYPE_SHARED_KEY:
66e67e41 4020 if (IS_ERR(local->wep_tx_tfm))
9dca9c49 4021 return -EOPNOTSUPP;
77fdaa12
JB
4022 auth_alg = WLAN_AUTH_SHARED_KEY;
4023 break;
4024 case NL80211_AUTHTYPE_FT:
4025 auth_alg = WLAN_AUTH_FT;
4026 break;
4027 case NL80211_AUTHTYPE_NETWORK_EAP:
4028 auth_alg = WLAN_AUTH_LEAP;
4029 break;
6b8ece3a
JM
4030 case NL80211_AUTHTYPE_SAE:
4031 auth_alg = WLAN_AUTH_SAE;
4032 break;
77fdaa12
JB
4033 default:
4034 return -EOPNOTSUPP;
60f8b39c 4035 }
77fdaa12 4036
6b8ece3a
JM
4037 auth_data = kzalloc(sizeof(*auth_data) + req->sae_data_len +
4038 req->ie_len, GFP_KERNEL);
66e67e41 4039 if (!auth_data)
9c6bd790 4040 return -ENOMEM;
77fdaa12 4041
66e67e41 4042 auth_data->bss = req->bss;
77fdaa12 4043
6b8ece3a
JM
4044 if (req->sae_data_len >= 4) {
4045 __le16 *pos = (__le16 *) req->sae_data;
4046 auth_data->sae_trans = le16_to_cpu(pos[0]);
4047 auth_data->sae_status = le16_to_cpu(pos[1]);
4048 memcpy(auth_data->data, req->sae_data + 4,
4049 req->sae_data_len - 4);
4050 auth_data->data_len += req->sae_data_len - 4;
4051 }
4052
77fdaa12 4053 if (req->ie && req->ie_len) {
6b8ece3a
JM
4054 memcpy(&auth_data->data[auth_data->data_len],
4055 req->ie, req->ie_len);
4056 auth_data->data_len += req->ie_len;
9c6bd790 4057 }
77fdaa12 4058
fffd0934 4059 if (req->key && req->key_len) {
66e67e41
JB
4060 auth_data->key_len = req->key_len;
4061 auth_data->key_idx = req->key_idx;
4062 memcpy(auth_data->key, req->key, req->key_len);
fffd0934
JB
4063 }
4064
66e67e41 4065 auth_data->algorithm = auth_alg;
60f8b39c 4066
66e67e41 4067 /* try to authenticate/probe */
2a33bee2 4068
66e67e41
JB
4069 if ((ifmgd->auth_data && !ifmgd->auth_data->done) ||
4070 ifmgd->assoc_data) {
4071 err = -EBUSY;
4072 goto err_free;
2a33bee2
GE
4073 }
4074
66e67e41
JB
4075 if (ifmgd->auth_data)
4076 ieee80211_destroy_auth_data(sdata, false);
2a33bee2 4077
66e67e41
JB
4078 /* prep auth_data so we don't go into idle on disassoc */
4079 ifmgd->auth_data = auth_data;
af6b6374 4080
7b119dc0
JB
4081 if (ifmgd->associated) {
4082 u8 frame_buf[IEEE80211_DEAUTH_FRAME_LEN];
4083
4084 ieee80211_set_disassoc(sdata, IEEE80211_STYPE_DEAUTH,
4085 WLAN_REASON_UNSPECIFIED,
4086 false, frame_buf);
4087
6ff57cf8
JB
4088 cfg80211_tx_mlme_mgmt(sdata->dev, frame_buf,
4089 sizeof(frame_buf));
7b119dc0 4090 }
af6b6374 4091
bdcbd8e0 4092 sdata_info(sdata, "authenticate with %pM\n", req->bss->bssid);
e5b900d2 4093
a1cf775d
JB
4094 err = ieee80211_prep_connection(sdata, req->bss, false);
4095 if (err)
66e67e41 4096 goto err_clear;
af6b6374 4097
66e67e41
JB
4098 err = ieee80211_probe_auth(sdata);
4099 if (err) {
66e67e41
JB
4100 sta_info_destroy_addr(sdata, req->bss->bssid);
4101 goto err_clear;
4102 }
4103
4104 /* hold our own reference */
5b112d3d 4105 cfg80211_ref_bss(local->hw.wiphy, auth_data->bss);
8d61ffa5 4106 return 0;
66e67e41
JB
4107
4108 err_clear:
3d2abdfd
EP
4109 memset(ifmgd->bssid, 0, ETH_ALEN);
4110 ieee80211_bss_info_change_notify(sdata, BSS_CHANGED_BSSID);
66e67e41
JB
4111 ifmgd->auth_data = NULL;
4112 err_free:
4113 kfree(auth_data);
66e67e41 4114 return err;
af6b6374
JB
4115}
4116
095d81ce
JB
4117static bool ieee80211_usable_wmm_params(struct ieee80211_sub_if_data *sdata,
4118 const u8 *wmm_param, int len)
4119{
4120 const u8 *pos;
4121 size_t left;
4122
4123 if (len < 8)
4124 return false;
4125
4126 if (wmm_param[5] != 1 /* version */)
4127 return false;
4128
4129 pos = wmm_param + 8;
4130 left = len - 8;
4131
4132 for (; left >= 4; left -= 4, pos += 4) {
4133 u8 aifsn = pos[0] & 0x0f;
4134 u8 ecwmin = pos[1] & 0x0f;
4135 u8 ecwmax = (pos[1] & 0xf0) >> 4;
4136 int aci = (pos[0] >> 5) & 0x03;
4137
4138 if (aifsn < 2) {
4139 sdata_info(sdata,
4140 "AP has invalid WMM params (AIFSN=%d for ACI %d), disabling WMM\n",
4141 aifsn, aci);
4142 return false;
4143 }
4144 if (ecwmin > ecwmax) {
4145 sdata_info(sdata,
4146 "AP has invalid WMM params (ECWmin/max=%d/%d for ACI %d), disabling WMM\n",
4147 ecwmin, ecwmax, aci);
4148 return false;
4149 }
4150 }
4151
4152 return true;
4153}
4154
77fdaa12
JB
4155int ieee80211_mgd_assoc(struct ieee80211_sub_if_data *sdata,
4156 struct cfg80211_assoc_request *req)
f0706e82 4157{
66e67e41 4158 struct ieee80211_local *local = sdata->local;
77fdaa12 4159 struct ieee80211_if_managed *ifmgd = &sdata->u.mgd;
0c1ad2ca 4160 struct ieee80211_bss *bss = (void *)req->bss->priv;
66e67e41 4161 struct ieee80211_mgd_assoc_data *assoc_data;
c65dd147 4162 const struct cfg80211_bss_ies *beacon_ies;
4e74bfdb 4163 struct ieee80211_supported_band *sband;
b08fbbd8 4164 const u8 *ssidie, *ht_ie, *vht_ie;
2a33bee2 4165 int i, err;
f0706e82 4166
66e67e41
JB
4167 assoc_data = kzalloc(sizeof(*assoc_data) + req->ie_len, GFP_KERNEL);
4168 if (!assoc_data)
4169 return -ENOMEM;
4170
9caf0364
JB
4171 rcu_read_lock();
4172 ssidie = ieee80211_bss_get_ie(req->bss, WLAN_EID_SSID);
4173 if (!ssidie) {
4174 rcu_read_unlock();
4175 kfree(assoc_data);
4176 return -EINVAL;
4177 }
4178 memcpy(assoc_data->ssid, ssidie + 2, ssidie[1]);
4179 assoc_data->ssid_len = ssidie[1];
4180 rcu_read_unlock();
4181
7b119dc0
JB
4182 if (ifmgd->associated) {
4183 u8 frame_buf[IEEE80211_DEAUTH_FRAME_LEN];
4184
4185 ieee80211_set_disassoc(sdata, IEEE80211_STYPE_DEAUTH,
4186 WLAN_REASON_UNSPECIFIED,
4187 false, frame_buf);
4188
6ff57cf8
JB
4189 cfg80211_tx_mlme_mgmt(sdata->dev, frame_buf,
4190 sizeof(frame_buf));
7b119dc0 4191 }
66e67e41
JB
4192
4193 if (ifmgd->auth_data && !ifmgd->auth_data->done) {
4194 err = -EBUSY;
4195 goto err_free;
af6b6374 4196 }
77fdaa12 4197
66e67e41
JB
4198 if (ifmgd->assoc_data) {
4199 err = -EBUSY;
4200 goto err_free;
4201 }
77fdaa12 4202
66e67e41
JB
4203 if (ifmgd->auth_data) {
4204 bool match;
4205
4206 /* keep sta info, bssid if matching */
b203ca39 4207 match = ether_addr_equal(ifmgd->bssid, req->bss->bssid);
66e67e41 4208 ieee80211_destroy_auth_data(sdata, match);
2a33bee2
GE
4209 }
4210
66e67e41 4211 /* prepare assoc data */
095d81ce 4212
d8ec4433
JO
4213 ifmgd->beacon_crc_valid = false;
4214
095d81ce
JB
4215 assoc_data->wmm = bss->wmm_used &&
4216 (local->hw.queues >= IEEE80211_NUM_ACS);
4217 if (assoc_data->wmm) {
4218 /* try to check validity of WMM params IE */
4219 const struct cfg80211_bss_ies *ies;
4220 const u8 *wp, *start, *end;
4221
4222 rcu_read_lock();
4223 ies = rcu_dereference(req->bss->ies);
4224 start = ies->data;
4225 end = start + ies->len;
4226
4227 while (true) {
4228 wp = cfg80211_find_vendor_ie(
4229 WLAN_OUI_MICROSOFT,
4230 WLAN_OUI_TYPE_MICROSOFT_WMM,
4231 start, end - start);
4232 if (!wp)
4233 break;
4234 start = wp + wp[1] + 2;
4235 /* if this IE is too short, try the next */
4236 if (wp[1] <= 4)
4237 continue;
4238 /* if this IE is WMM params, we found what we wanted */
4239 if (wp[6] == 1)
4240 break;
4241 }
4242
4243 if (!wp || !ieee80211_usable_wmm_params(sdata, wp + 2,
4244 wp[1] - 2)) {
4245 assoc_data->wmm = false;
4246 ifmgd->flags |= IEEE80211_STA_DISABLE_WMM;
4247 }
4248 rcu_read_unlock();
4249 }
4250
de5036aa
JB
4251 /*
4252 * IEEE802.11n does not allow TKIP/WEP as pairwise ciphers in HT mode.
4253 * We still associate in non-HT mode (11a/b/g) if any one of these
4254 * ciphers is configured as pairwise.
4255 * We can set this to true for non-11n hardware, that'll be checked
4256 * separately along with the peer capabilities.
4257 */
1c4cb928 4258 for (i = 0; i < req->crypto.n_ciphers_pairwise; i++) {
77fdaa12
JB
4259 if (req->crypto.ciphers_pairwise[i] == WLAN_CIPHER_SUITE_WEP40 ||
4260 req->crypto.ciphers_pairwise[i] == WLAN_CIPHER_SUITE_TKIP ||
1c4cb928 4261 req->crypto.ciphers_pairwise[i] == WLAN_CIPHER_SUITE_WEP104) {
a8243b72 4262 ifmgd->flags |= IEEE80211_STA_DISABLE_HT;
d545daba 4263 ifmgd->flags |= IEEE80211_STA_DISABLE_VHT;
1c4cb928 4264 netdev_info(sdata->dev,
d545daba 4265 "disabling HT/VHT due to WEP/TKIP use\n");
1c4cb928
JB
4266 }
4267 }
77fdaa12 4268
d545daba 4269 if (req->flags & ASSOC_REQ_DISABLE_HT) {
a8243b72 4270 ifmgd->flags |= IEEE80211_STA_DISABLE_HT;
d545daba
MP
4271 ifmgd->flags |= IEEE80211_STA_DISABLE_VHT;
4272 }
ef96a842 4273
dd5ecfea
JB
4274 if (req->flags & ASSOC_REQ_DISABLE_VHT)
4275 ifmgd->flags |= IEEE80211_STA_DISABLE_VHT;
4276
4e74bfdb
JB
4277 /* Also disable HT if we don't support it or the AP doesn't use WMM */
4278 sband = local->hw.wiphy->bands[req->bss->channel->band];
4279 if (!sband->ht_cap.ht_supported ||
095d81ce
JB
4280 local->hw.queues < IEEE80211_NUM_ACS || !bss->wmm_used ||
4281 ifmgd->flags & IEEE80211_STA_DISABLE_WMM) {
a8243b72 4282 ifmgd->flags |= IEEE80211_STA_DISABLE_HT;
095d81ce
JB
4283 if (!bss->wmm_used &&
4284 !(ifmgd->flags & IEEE80211_STA_DISABLE_WMM))
1b49de26
JB
4285 netdev_info(sdata->dev,
4286 "disabling HT as WMM/QoS is not supported by the AP\n");
1c4cb928 4287 }
4e74bfdb 4288
d545daba
MP
4289 /* disable VHT if we don't support it or the AP doesn't use WMM */
4290 if (!sband->vht_cap.vht_supported ||
095d81ce
JB
4291 local->hw.queues < IEEE80211_NUM_ACS || !bss->wmm_used ||
4292 ifmgd->flags & IEEE80211_STA_DISABLE_WMM) {
d545daba 4293 ifmgd->flags |= IEEE80211_STA_DISABLE_VHT;
095d81ce
JB
4294 if (!bss->wmm_used &&
4295 !(ifmgd->flags & IEEE80211_STA_DISABLE_WMM))
1b49de26
JB
4296 netdev_info(sdata->dev,
4297 "disabling VHT as WMM/QoS is not supported by the AP\n");
d545daba
MP
4298 }
4299
ef96a842
BG
4300 memcpy(&ifmgd->ht_capa, &req->ht_capa, sizeof(ifmgd->ht_capa));
4301 memcpy(&ifmgd->ht_capa_mask, &req->ht_capa_mask,
4302 sizeof(ifmgd->ht_capa_mask));
4303
dd5ecfea
JB
4304 memcpy(&ifmgd->vht_capa, &req->vht_capa, sizeof(ifmgd->vht_capa));
4305 memcpy(&ifmgd->vht_capa_mask, &req->vht_capa_mask,
4306 sizeof(ifmgd->vht_capa_mask));
4307
77fdaa12 4308 if (req->ie && req->ie_len) {
66e67e41
JB
4309 memcpy(assoc_data->ie, req->ie, req->ie_len);
4310 assoc_data->ie_len = req->ie_len;
4311 }
f679f65d 4312
66e67e41 4313 assoc_data->bss = req->bss;
f679f65d 4314
af6b6374
JB
4315 if (ifmgd->req_smps == IEEE80211_SMPS_AUTOMATIC) {
4316 if (ifmgd->powersave)
04ecd257 4317 sdata->smps_mode = IEEE80211_SMPS_DYNAMIC;
af6b6374 4318 else
04ecd257 4319 sdata->smps_mode = IEEE80211_SMPS_OFF;
af6b6374 4320 } else
04ecd257 4321 sdata->smps_mode = ifmgd->req_smps;
af6b6374 4322
66e67e41 4323 assoc_data->capability = req->bss->capability;
66e67e41
JB
4324 assoc_data->supp_rates = bss->supp_rates;
4325 assoc_data->supp_rates_len = bss->supp_rates_len;
9dde6423 4326
9caf0364 4327 rcu_read_lock();
9dde6423
JB
4328 ht_ie = ieee80211_bss_get_ie(req->bss, WLAN_EID_HT_OPERATION);
4329 if (ht_ie && ht_ie[1] >= sizeof(struct ieee80211_ht_operation))
4330 assoc_data->ap_ht_param =
4331 ((struct ieee80211_ht_operation *)(ht_ie + 2))->ht_param;
4332 else
a8243b72 4333 ifmgd->flags |= IEEE80211_STA_DISABLE_HT;
b08fbbd8
JB
4334 vht_ie = ieee80211_bss_get_ie(req->bss, WLAN_EID_VHT_CAPABILITY);
4335 if (vht_ie && vht_ie[1] >= sizeof(struct ieee80211_vht_cap))
4336 memcpy(&assoc_data->ap_vht_cap, vht_ie + 2,
4337 sizeof(struct ieee80211_vht_cap));
4338 else
4339 ifmgd->flags |= IEEE80211_STA_DISABLE_VHT;
9caf0364 4340 rcu_read_unlock();
63f170e0 4341
ab13315a 4342 if (bss->wmm_used && bss->uapsd_supported &&
24aa11ab
AB
4343 (sdata->local->hw.flags & IEEE80211_HW_SUPPORTS_UAPSD) &&
4344 sdata->wmm_acm != 0xff) {
76f0303d 4345 assoc_data->uapsd = true;
ab13315a
KV
4346 ifmgd->flags |= IEEE80211_STA_UAPSD_ENABLED;
4347 } else {
76f0303d 4348 assoc_data->uapsd = false;
ab13315a
KV
4349 ifmgd->flags &= ~IEEE80211_STA_UAPSD_ENABLED;
4350 }
4351
77fdaa12 4352 if (req->prev_bssid)
66e67e41 4353 memcpy(assoc_data->prev_bssid, req->prev_bssid, ETH_ALEN);
77fdaa12
JB
4354
4355 if (req->use_mfp) {
4356 ifmgd->mfp = IEEE80211_MFP_REQUIRED;
4357 ifmgd->flags |= IEEE80211_STA_MFP_ENABLED;
4358 } else {
4359 ifmgd->mfp = IEEE80211_MFP_DISABLED;
4360 ifmgd->flags &= ~IEEE80211_STA_MFP_ENABLED;
4361 }
4362
4363 if (req->crypto.control_port)
4364 ifmgd->flags |= IEEE80211_STA_CONTROL_PORT;
4365 else
4366 ifmgd->flags &= ~IEEE80211_STA_CONTROL_PORT;
4367
a621fa4d
JB
4368 sdata->control_port_protocol = req->crypto.control_port_ethertype;
4369 sdata->control_port_no_encrypt = req->crypto.control_port_no_encrypt;
2475b1cc
MS
4370 sdata->encrypt_headroom = ieee80211_cs_headroom(local, &req->crypto,
4371 sdata->vif.type);
a621fa4d 4372
66e67e41
JB
4373 /* kick off associate process */
4374
4375 ifmgd->assoc_data = assoc_data;
826262c3 4376 ifmgd->dtim_period = 0;
989c6505 4377 ifmgd->have_beacon = false;
66e67e41 4378
a1cf775d
JB
4379 err = ieee80211_prep_connection(sdata, req->bss, true);
4380 if (err)
4381 goto err_clear;
66e67e41 4382
c65dd147
EG
4383 rcu_read_lock();
4384 beacon_ies = rcu_dereference(req->bss->beacon_ies);
826262c3 4385
c65dd147
EG
4386 if (sdata->local->hw.flags & IEEE80211_HW_NEED_DTIM_BEFORE_ASSOC &&
4387 !beacon_ies) {
4388 /*
4389 * Wait up to one beacon interval ...
4390 * should this be more if we miss one?
4391 */
4392 sdata_info(sdata, "waiting for beacon from %pM\n",
4393 ifmgd->bssid);
4394 assoc_data->timeout = TU_TO_EXP_TIME(req->bss->beacon_interval);
89afe614 4395 assoc_data->timeout_started = true;
c65dd147
EG
4396 assoc_data->need_beacon = true;
4397 } else if (beacon_ies) {
4398 const u8 *tim_ie = cfg80211_find_ie(WLAN_EID_TIM,
4399 beacon_ies->data,
4400 beacon_ies->len);
ef429dad
JB
4401 u8 dtim_count = 0;
4402
c65dd147
EG
4403 if (tim_ie && tim_ie[1] >= sizeof(struct ieee80211_tim_ie)) {
4404 const struct ieee80211_tim_ie *tim;
4405 tim = (void *)(tim_ie + 2);
4406 ifmgd->dtim_period = tim->dtim_period;
ef429dad 4407 dtim_count = tim->dtim_count;
826262c3 4408 }
989c6505 4409 ifmgd->have_beacon = true;
66e67e41 4410 assoc_data->timeout = jiffies;
89afe614 4411 assoc_data->timeout_started = true;
ef429dad
JB
4412
4413 if (local->hw.flags & IEEE80211_HW_TIMING_BEACON_ONLY) {
4414 sdata->vif.bss_conf.sync_tsf = beacon_ies->tsf;
4415 sdata->vif.bss_conf.sync_device_ts =
4416 bss->device_ts_beacon;
4417 sdata->vif.bss_conf.sync_dtim_count = dtim_count;
4418 }
c65dd147
EG
4419 } else {
4420 assoc_data->timeout = jiffies;
89afe614 4421 assoc_data->timeout_started = true;
66e67e41 4422 }
c65dd147
EG
4423 rcu_read_unlock();
4424
8d61ffa5 4425 run_again(sdata, assoc_data->timeout);
66e67e41 4426
fcff4f10
PS
4427 if (bss->corrupt_data) {
4428 char *corrupt_type = "data";
4429 if (bss->corrupt_data & IEEE80211_BSS_CORRUPT_BEACON) {
4430 if (bss->corrupt_data &
4431 IEEE80211_BSS_CORRUPT_PROBE_RESP)
4432 corrupt_type = "beacon and probe response";
4433 else
4434 corrupt_type = "beacon";
4435 } else if (bss->corrupt_data & IEEE80211_BSS_CORRUPT_PROBE_RESP)
4436 corrupt_type = "probe response";
bdcbd8e0
JB
4437 sdata_info(sdata, "associating with AP with corrupt %s\n",
4438 corrupt_type);
fcff4f10
PS
4439 }
4440
8d61ffa5 4441 return 0;
66e67e41 4442 err_clear:
3d2abdfd
EP
4443 memset(ifmgd->bssid, 0, ETH_ALEN);
4444 ieee80211_bss_info_change_notify(sdata, BSS_CHANGED_BSSID);
66e67e41
JB
4445 ifmgd->assoc_data = NULL;
4446 err_free:
4447 kfree(assoc_data);
66e67e41 4448 return err;
f0706e82
JB
4449}
4450
77fdaa12 4451int ieee80211_mgd_deauth(struct ieee80211_sub_if_data *sdata,
63c9c5e7 4452 struct cfg80211_deauth_request *req)
f0706e82 4453{
46900298 4454 struct ieee80211_if_managed *ifmgd = &sdata->u.mgd;
6ae16775 4455 u8 frame_buf[IEEE80211_DEAUTH_FRAME_LEN];
6863255b 4456 bool tx = !req->local_state_change;
f0706e82 4457
c9c3a060
JB
4458 if (ifmgd->auth_data &&
4459 ether_addr_equal(ifmgd->auth_data->bss->bssid, req->bssid)) {
4460 sdata_info(sdata,
4461 "aborting authentication with %pM by local choice (Reason: %u=%s)\n",
4462 req->bssid, req->reason_code,
4463 ieee80211_get_reason_code_string(req->reason_code));
0ff71613 4464
8c7d857c 4465 drv_mgd_prepare_tx(sdata->local, sdata);
37ad3888
JB
4466 ieee80211_send_deauth_disassoc(sdata, req->bssid,
4467 IEEE80211_STYPE_DEAUTH,
6863255b 4468 req->reason_code, tx,
37ad3888 4469 frame_buf);
86552017 4470 ieee80211_destroy_auth_data(sdata, false);
c9c3a060
JB
4471 cfg80211_tx_mlme_mgmt(sdata->dev, frame_buf,
4472 IEEE80211_DEAUTH_FRAME_LEN);
86552017 4473
c9c3a060 4474 return 0;
8c7d857c
EG
4475 }
4476
86552017
JB
4477 if (ifmgd->associated &&
4478 ether_addr_equal(ifmgd->associated->bssid, req->bssid)) {
c9c3a060
JB
4479 sdata_info(sdata,
4480 "deauthenticating from %pM by local choice (Reason: %u=%s)\n",
4481 req->bssid, req->reason_code,
4482 ieee80211_get_reason_code_string(req->reason_code));
4483
86552017
JB
4484 ieee80211_set_disassoc(sdata, IEEE80211_STYPE_DEAUTH,
4485 req->reason_code, tx, frame_buf);
6ff57cf8
JB
4486 cfg80211_tx_mlme_mgmt(sdata->dev, frame_buf,
4487 IEEE80211_DEAUTH_FRAME_LEN);
c9c3a060
JB
4488 return 0;
4489 }
86552017 4490
c9c3a060 4491 return -ENOTCONN;
f0706e82 4492}
84363e6e 4493
77fdaa12 4494int ieee80211_mgd_disassoc(struct ieee80211_sub_if_data *sdata,
63c9c5e7 4495 struct cfg80211_disassoc_request *req)
9c6bd790 4496{
77fdaa12 4497 struct ieee80211_if_managed *ifmgd = &sdata->u.mgd;
e69e95db 4498 u8 bssid[ETH_ALEN];
6ae16775 4499 u8 frame_buf[IEEE80211_DEAUTH_FRAME_LEN];
9c6bd790 4500
8d8b261a
JB
4501 /*
4502 * cfg80211 should catch this ... but it's racy since
4503 * we can receive a disassoc frame, process it, hand it
4504 * to cfg80211 while that's in a locked section already
4505 * trying to tell us that the user wants to disconnect.
4506 */
8d61ffa5 4507 if (ifmgd->associated != req->bss)
77fdaa12 4508 return -ENOLINK;
77fdaa12 4509
bdcbd8e0 4510 sdata_info(sdata,
dfa1ad29
CO
4511 "disassociating from %pM by local choice (Reason: %u=%s)\n",
4512 req->bss->bssid, req->reason_code, ieee80211_get_reason_code_string(req->reason_code));
0ff71613 4513
e69e95db 4514 memcpy(bssid, req->bss->bssid, ETH_ALEN);
37ad3888
JB
4515 ieee80211_set_disassoc(sdata, IEEE80211_STYPE_DISASSOC,
4516 req->reason_code, !req->local_state_change,
4517 frame_buf);
10f644a4 4518
6ff57cf8
JB
4519 cfg80211_tx_mlme_mgmt(sdata->dev, frame_buf,
4520 IEEE80211_DEAUTH_FRAME_LEN);
bc83b681 4521
10f644a4
JB
4522 return 0;
4523}
026331c4 4524
afa762f6 4525void ieee80211_mgd_stop(struct ieee80211_sub_if_data *sdata)
54e4ffb2
JB
4526{
4527 struct ieee80211_if_managed *ifmgd = &sdata->u.mgd;
4528
49921859
BG
4529 /*
4530 * Make sure some work items will not run after this,
4531 * they will not do anything but might not have been
4532 * cancelled when disconnecting.
4533 */
4534 cancel_work_sync(&ifmgd->monitor_work);
4535 cancel_work_sync(&ifmgd->beacon_connection_loss_work);
4536 cancel_work_sync(&ifmgd->request_smps_work);
4537 cancel_work_sync(&ifmgd->csa_connection_drop_work);
4538 cancel_work_sync(&ifmgd->chswitch_work);
4539
8d61ffa5 4540 sdata_lock(sdata);
959867fa
JB
4541 if (ifmgd->assoc_data) {
4542 struct cfg80211_bss *bss = ifmgd->assoc_data->bss;
54e4ffb2 4543 ieee80211_destroy_assoc_data(sdata, false);
959867fa
JB
4544 cfg80211_assoc_timeout(sdata->dev, bss);
4545 }
54e4ffb2
JB
4546 if (ifmgd->auth_data)
4547 ieee80211_destroy_auth_data(sdata, false);
4548 del_timer_sync(&ifmgd->timer);
8d61ffa5 4549 sdata_unlock(sdata);
54e4ffb2
JB
4550}
4551
a97c13c3
JO
4552void ieee80211_cqm_rssi_notify(struct ieee80211_vif *vif,
4553 enum nl80211_cqm_rssi_threshold_event rssi_event,
4554 gfp_t gfp)
4555{
4556 struct ieee80211_sub_if_data *sdata = vif_to_sdata(vif);
4557
b5878a2d
JB
4558 trace_api_cqm_rssi_notify(sdata, rssi_event);
4559
a97c13c3
JO
4560 cfg80211_cqm_rssi_notify(sdata->dev, rssi_event, gfp);
4561}
4562EXPORT_SYMBOL(ieee80211_cqm_rssi_notify);
This page took 0.989898 seconds and 5 git commands to generate.