]> bbs.cooldavid.org Git - net-next-2.6.git/blame - net/wireless/wext.c
wext: Pull ioctl permission checking out into helper function.
[net-next-2.6.git] / net / wireless / wext.c
CommitLineData
1da177e4
LT
1/*
2 * This file implement the Wireless Extensions APIs.
3 *
4 * Authors : Jean Tourrilhes - HPL - <jt@hpl.hp.com>
c2805fbb 5 * Copyright (c) 1997-2007 Jean Tourrilhes, All Rights Reserved.
1da177e4
LT
6 *
7 * (As all part of the Linux kernel, this file is GPL)
8 */
9
10/************************** DOCUMENTATION **************************/
11/*
12 * API definition :
13 * --------------
14 * See <linux/wireless.h> for details of the APIs and the rest.
15 *
16 * History :
17 * -------
18 *
19 * v1 - 5.12.01 - Jean II
20 * o Created this file.
21 *
22 * v2 - 13.12.01 - Jean II
23 * o Move /proc/net/wireless stuff from net/core/dev.c to here
24 * o Make Wireless Extension IOCTLs go through here
25 * o Added iw_handler handling ;-)
26 * o Added standard ioctl description
27 * o Initial dumb commit strategy based on orinoco.c
28 *
29 * v3 - 19.12.01 - Jean II
30 * o Make sure we don't go out of standard_ioctl[] in ioctl_standard_call
31 * o Add event dispatcher function
32 * o Add event description
33 * o Propagate events as rtnetlink IFLA_WIRELESS option
34 * o Generate event on selected SET requests
35 *
36 * v4 - 18.04.02 - Jean II
37 * o Fix stupid off by one in iw_ioctl_description : IW_ESSID_MAX_SIZE + 1
38 *
39 * v5 - 21.06.02 - Jean II
40 * o Add IW_PRIV_TYPE_ADDR in priv_type_size (+cleanup)
41 * o Reshuffle IW_HEADER_TYPE_XXX to map IW_PRIV_TYPE_XXX changes
42 * o Add IWEVCUSTOM for driver specific event/scanning token
43 * o Turn on WE_STRICT_WRITE by default + kernel warning
44 * o Fix WE_STRICT_WRITE in ioctl_export_private() (32 => iw_num)
45 * o Fix off-by-one in test (extra_size <= IFNAMSIZ)
46 *
47 * v6 - 9.01.03 - Jean II
48 * o Add common spy support : iw_handler_set_spy(), wireless_spy_update()
49 * o Add enhanced spy support : iw_handler_set_thrspy() and event.
50 * o Add WIRELESS_EXT version display in /proc/net/wireless
51 *
52 * v6 - 18.06.04 - Jean II
53 * o Change get_spydata() method for added safety
54 * o Remove spy #ifdef, they are always on -> cleaner code
55 * o Allow any size GET request if user specifies length > max
56 * and if request has IW_DESCR_FLAG_NOMAX flag or is SIOCGIWPRIV
57 * o Start migrating get_wireless_stats to struct iw_handler_def
58 * o Add wmb() in iw_handler_set_spy() for non-coherent archs/cpus
59 * Based on patch from Pavel Roskin <proski@gnu.org> :
60 * o Fix kernel data leak to user space in private handler handling
6582c164
JT
61 *
62 * v7 - 18.3.05 - Jean II
63 * o Remove (struct iw_point *)->pointer from events and streams
64 * o Remove spy_offset from struct iw_handler_def
65 * o Start deprecating dev->get_wireless_stats, output a warning
66 * o If IW_QUAL_DBM is set, show dBm values in /proc/net/wireless
67 * o Don't loose INVALID/DBM flags when clearing UPDATED flags (iwstats)
711e2c33
JT
68 *
69 * v8 - 17.02.06 - Jean II
70 * o RtNetlink requests support (SET/GET)
baef1865
JL
71 *
72 * v8b - 03.08.06 - Herbert Xu
73 * o Fix Wireless Event locking issues.
74 *
75 * v9 - 14.3.06 - Jean II
76 * o Change length in ESSID and NICK to strlen() instead of strlen()+1
77 * o Make standard_ioctl_num and standard_event_num unsigned
78 * o Remove (struct net_device *)->get_wireless_stats()
c2805fbb
JT
79 *
80 * v10 - 16.3.07 - Jean II
81 * o Prevent leaking of kernel space in stream on 64 bits.
1da177e4
LT
82 */
83
84/***************************** INCLUDES *****************************/
85
1da177e4
LT
86#include <linux/module.h>
87#include <linux/types.h> /* off_t */
88#include <linux/netdevice.h> /* struct ifreq, dev_get_by_name() */
89#include <linux/proc_fs.h>
90#include <linux/rtnetlink.h> /* rtnetlink stuff */
91#include <linux/seq_file.h>
92#include <linux/init.h> /* for __init */
93#include <linux/if_arp.h> /* ARPHRD_ETHER */
9819d85c 94#include <linux/etherdevice.h> /* compare_ether_addr */
782a6675 95#include <linux/interrupt.h>
457c4cbc 96#include <net/net_namespace.h>
1da177e4
LT
97
98#include <linux/wireless.h> /* Pretty obvious */
99#include <net/iw_handler.h> /* New driver API */
bd5785ba 100#include <net/netlink.h>
295f4a1f 101#include <net/wext.h>
1da177e4
LT
102
103#include <asm/uaccess.h> /* copy_to_user() */
104
1da177e4
LT
105/************************* GLOBAL VARIABLES *************************/
106/*
107 * You should not use global variables, because of re-entrancy.
108 * On our case, it's only const, so it's OK...
109 */
110/*
111 * Meta-data about all the standard Wireless Extension request we
112 * know about.
113 */
114static const struct iw_ioctl_description standard_ioctl[] = {
115 [SIOCSIWCOMMIT - SIOCIWFIRST] = {
116 .header_type = IW_HEADER_TYPE_NULL,
117 },
118 [SIOCGIWNAME - SIOCIWFIRST] = {
119 .header_type = IW_HEADER_TYPE_CHAR,
120 .flags = IW_DESCR_FLAG_DUMP,
121 },
122 [SIOCSIWNWID - SIOCIWFIRST] = {
123 .header_type = IW_HEADER_TYPE_PARAM,
124 .flags = IW_DESCR_FLAG_EVENT,
125 },
126 [SIOCGIWNWID - SIOCIWFIRST] = {
127 .header_type = IW_HEADER_TYPE_PARAM,
128 .flags = IW_DESCR_FLAG_DUMP,
129 },
130 [SIOCSIWFREQ - SIOCIWFIRST] = {
131 .header_type = IW_HEADER_TYPE_FREQ,
132 .flags = IW_DESCR_FLAG_EVENT,
133 },
134 [SIOCGIWFREQ - SIOCIWFIRST] = {
135 .header_type = IW_HEADER_TYPE_FREQ,
136 .flags = IW_DESCR_FLAG_DUMP,
137 },
138 [SIOCSIWMODE - SIOCIWFIRST] = {
139 .header_type = IW_HEADER_TYPE_UINT,
140 .flags = IW_DESCR_FLAG_EVENT,
141 },
142 [SIOCGIWMODE - SIOCIWFIRST] = {
143 .header_type = IW_HEADER_TYPE_UINT,
144 .flags = IW_DESCR_FLAG_DUMP,
145 },
146 [SIOCSIWSENS - SIOCIWFIRST] = {
147 .header_type = IW_HEADER_TYPE_PARAM,
148 },
149 [SIOCGIWSENS - SIOCIWFIRST] = {
150 .header_type = IW_HEADER_TYPE_PARAM,
151 },
152 [SIOCSIWRANGE - SIOCIWFIRST] = {
153 .header_type = IW_HEADER_TYPE_NULL,
154 },
155 [SIOCGIWRANGE - SIOCIWFIRST] = {
156 .header_type = IW_HEADER_TYPE_POINT,
157 .token_size = 1,
158 .max_tokens = sizeof(struct iw_range),
159 .flags = IW_DESCR_FLAG_DUMP,
160 },
161 [SIOCSIWPRIV - SIOCIWFIRST] = {
162 .header_type = IW_HEADER_TYPE_NULL,
163 },
164 [SIOCGIWPRIV - SIOCIWFIRST] = { /* (handled directly by us) */
711e2c33
JT
165 .header_type = IW_HEADER_TYPE_POINT,
166 .token_size = sizeof(struct iw_priv_args),
167 .max_tokens = 16,
168 .flags = IW_DESCR_FLAG_NOMAX,
1da177e4
LT
169 },
170 [SIOCSIWSTATS - SIOCIWFIRST] = {
171 .header_type = IW_HEADER_TYPE_NULL,
172 },
173 [SIOCGIWSTATS - SIOCIWFIRST] = { /* (handled directly by us) */
711e2c33
JT
174 .header_type = IW_HEADER_TYPE_POINT,
175 .token_size = 1,
176 .max_tokens = sizeof(struct iw_statistics),
1da177e4
LT
177 .flags = IW_DESCR_FLAG_DUMP,
178 },
179 [SIOCSIWSPY - SIOCIWFIRST] = {
180 .header_type = IW_HEADER_TYPE_POINT,
181 .token_size = sizeof(struct sockaddr),
182 .max_tokens = IW_MAX_SPY,
183 },
184 [SIOCGIWSPY - SIOCIWFIRST] = {
185 .header_type = IW_HEADER_TYPE_POINT,
186 .token_size = sizeof(struct sockaddr) +
187 sizeof(struct iw_quality),
188 .max_tokens = IW_MAX_SPY,
189 },
190 [SIOCSIWTHRSPY - SIOCIWFIRST] = {
191 .header_type = IW_HEADER_TYPE_POINT,
192 .token_size = sizeof(struct iw_thrspy),
193 .min_tokens = 1,
194 .max_tokens = 1,
195 },
196 [SIOCGIWTHRSPY - SIOCIWFIRST] = {
197 .header_type = IW_HEADER_TYPE_POINT,
198 .token_size = sizeof(struct iw_thrspy),
199 .min_tokens = 1,
200 .max_tokens = 1,
201 },
202 [SIOCSIWAP - SIOCIWFIRST] = {
203 .header_type = IW_HEADER_TYPE_ADDR,
204 },
205 [SIOCGIWAP - SIOCIWFIRST] = {
206 .header_type = IW_HEADER_TYPE_ADDR,
207 .flags = IW_DESCR_FLAG_DUMP,
208 },
fff9cfd9
JT
209 [SIOCSIWMLME - SIOCIWFIRST] = {
210 .header_type = IW_HEADER_TYPE_POINT,
211 .token_size = 1,
212 .min_tokens = sizeof(struct iw_mlme),
213 .max_tokens = sizeof(struct iw_mlme),
214 },
1da177e4
LT
215 [SIOCGIWAPLIST - SIOCIWFIRST] = {
216 .header_type = IW_HEADER_TYPE_POINT,
217 .token_size = sizeof(struct sockaddr) +
218 sizeof(struct iw_quality),
219 .max_tokens = IW_MAX_AP,
220 .flags = IW_DESCR_FLAG_NOMAX,
221 },
222 [SIOCSIWSCAN - SIOCIWFIRST] = {
fff9cfd9
JT
223 .header_type = IW_HEADER_TYPE_POINT,
224 .token_size = 1,
225 .min_tokens = 0,
226 .max_tokens = sizeof(struct iw_scan_req),
1da177e4
LT
227 },
228 [SIOCGIWSCAN - SIOCIWFIRST] = {
229 .header_type = IW_HEADER_TYPE_POINT,
230 .token_size = 1,
231 .max_tokens = IW_SCAN_MAX_DATA,
232 .flags = IW_DESCR_FLAG_NOMAX,
233 },
234 [SIOCSIWESSID - SIOCIWFIRST] = {
235 .header_type = IW_HEADER_TYPE_POINT,
236 .token_size = 1,
baef1865 237 .max_tokens = IW_ESSID_MAX_SIZE,
1da177e4
LT
238 .flags = IW_DESCR_FLAG_EVENT,
239 },
240 [SIOCGIWESSID - SIOCIWFIRST] = {
241 .header_type = IW_HEADER_TYPE_POINT,
242 .token_size = 1,
baef1865 243 .max_tokens = IW_ESSID_MAX_SIZE,
1da177e4
LT
244 .flags = IW_DESCR_FLAG_DUMP,
245 },
246 [SIOCSIWNICKN - SIOCIWFIRST] = {
247 .header_type = IW_HEADER_TYPE_POINT,
248 .token_size = 1,
baef1865 249 .max_tokens = IW_ESSID_MAX_SIZE,
1da177e4
LT
250 },
251 [SIOCGIWNICKN - SIOCIWFIRST] = {
252 .header_type = IW_HEADER_TYPE_POINT,
253 .token_size = 1,
baef1865 254 .max_tokens = IW_ESSID_MAX_SIZE,
1da177e4
LT
255 },
256 [SIOCSIWRATE - SIOCIWFIRST] = {
257 .header_type = IW_HEADER_TYPE_PARAM,
258 },
259 [SIOCGIWRATE - SIOCIWFIRST] = {
260 .header_type = IW_HEADER_TYPE_PARAM,
261 },
262 [SIOCSIWRTS - SIOCIWFIRST] = {
263 .header_type = IW_HEADER_TYPE_PARAM,
264 },
265 [SIOCGIWRTS - SIOCIWFIRST] = {
266 .header_type = IW_HEADER_TYPE_PARAM,
267 },
268 [SIOCSIWFRAG - SIOCIWFIRST] = {
269 .header_type = IW_HEADER_TYPE_PARAM,
270 },
271 [SIOCGIWFRAG - SIOCIWFIRST] = {
272 .header_type = IW_HEADER_TYPE_PARAM,
273 },
274 [SIOCSIWTXPOW - SIOCIWFIRST] = {
275 .header_type = IW_HEADER_TYPE_PARAM,
276 },
277 [SIOCGIWTXPOW - SIOCIWFIRST] = {
278 .header_type = IW_HEADER_TYPE_PARAM,
279 },
280 [SIOCSIWRETRY - SIOCIWFIRST] = {
281 .header_type = IW_HEADER_TYPE_PARAM,
282 },
283 [SIOCGIWRETRY - SIOCIWFIRST] = {
284 .header_type = IW_HEADER_TYPE_PARAM,
285 },
286 [SIOCSIWENCODE - SIOCIWFIRST] = {
287 .header_type = IW_HEADER_TYPE_POINT,
288 .token_size = 1,
289 .max_tokens = IW_ENCODING_TOKEN_MAX,
290 .flags = IW_DESCR_FLAG_EVENT | IW_DESCR_FLAG_RESTRICT,
291 },
292 [SIOCGIWENCODE - SIOCIWFIRST] = {
293 .header_type = IW_HEADER_TYPE_POINT,
294 .token_size = 1,
295 .max_tokens = IW_ENCODING_TOKEN_MAX,
296 .flags = IW_DESCR_FLAG_DUMP | IW_DESCR_FLAG_RESTRICT,
297 },
298 [SIOCSIWPOWER - SIOCIWFIRST] = {
299 .header_type = IW_HEADER_TYPE_PARAM,
300 },
301 [SIOCGIWPOWER - SIOCIWFIRST] = {
302 .header_type = IW_HEADER_TYPE_PARAM,
303 },
fff9cfd9
JT
304 [SIOCSIWGENIE - SIOCIWFIRST] = {
305 .header_type = IW_HEADER_TYPE_POINT,
306 .token_size = 1,
307 .max_tokens = IW_GENERIC_IE_MAX,
308 },
309 [SIOCGIWGENIE - SIOCIWFIRST] = {
310 .header_type = IW_HEADER_TYPE_POINT,
311 .token_size = 1,
312 .max_tokens = IW_GENERIC_IE_MAX,
313 },
314 [SIOCSIWAUTH - SIOCIWFIRST] = {
315 .header_type = IW_HEADER_TYPE_PARAM,
316 },
317 [SIOCGIWAUTH - SIOCIWFIRST] = {
318 .header_type = IW_HEADER_TYPE_PARAM,
319 },
320 [SIOCSIWENCODEEXT - SIOCIWFIRST] = {
321 .header_type = IW_HEADER_TYPE_POINT,
322 .token_size = 1,
323 .min_tokens = sizeof(struct iw_encode_ext),
324 .max_tokens = sizeof(struct iw_encode_ext) +
325 IW_ENCODING_TOKEN_MAX,
326 },
327 [SIOCGIWENCODEEXT - SIOCIWFIRST] = {
328 .header_type = IW_HEADER_TYPE_POINT,
329 .token_size = 1,
330 .min_tokens = sizeof(struct iw_encode_ext),
331 .max_tokens = sizeof(struct iw_encode_ext) +
332 IW_ENCODING_TOKEN_MAX,
333 },
334 [SIOCSIWPMKSA - SIOCIWFIRST] = {
335 .header_type = IW_HEADER_TYPE_POINT,
336 .token_size = 1,
337 .min_tokens = sizeof(struct iw_pmksa),
338 .max_tokens = sizeof(struct iw_pmksa),
339 },
1da177e4 340};
1ac58ee3 341static const unsigned standard_ioctl_num = ARRAY_SIZE(standard_ioctl);
1da177e4
LT
342
343/*
344 * Meta-data about all the additional standard Wireless Extension events
345 * we know about.
346 */
347static const struct iw_ioctl_description standard_event[] = {
348 [IWEVTXDROP - IWEVFIRST] = {
349 .header_type = IW_HEADER_TYPE_ADDR,
350 },
351 [IWEVQUAL - IWEVFIRST] = {
352 .header_type = IW_HEADER_TYPE_QUAL,
353 },
354 [IWEVCUSTOM - IWEVFIRST] = {
355 .header_type = IW_HEADER_TYPE_POINT,
356 .token_size = 1,
357 .max_tokens = IW_CUSTOM_MAX,
358 },
359 [IWEVREGISTERED - IWEVFIRST] = {
360 .header_type = IW_HEADER_TYPE_ADDR,
361 },
362 [IWEVEXPIRED - IWEVFIRST] = {
4ec93edb 363 .header_type = IW_HEADER_TYPE_ADDR,
1da177e4 364 },
fff9cfd9
JT
365 [IWEVGENIE - IWEVFIRST] = {
366 .header_type = IW_HEADER_TYPE_POINT,
367 .token_size = 1,
368 .max_tokens = IW_GENERIC_IE_MAX,
369 },
370 [IWEVMICHAELMICFAILURE - IWEVFIRST] = {
4ec93edb 371 .header_type = IW_HEADER_TYPE_POINT,
fff9cfd9
JT
372 .token_size = 1,
373 .max_tokens = sizeof(struct iw_michaelmicfailure),
374 },
375 [IWEVASSOCREQIE - IWEVFIRST] = {
376 .header_type = IW_HEADER_TYPE_POINT,
377 .token_size = 1,
378 .max_tokens = IW_GENERIC_IE_MAX,
379 },
380 [IWEVASSOCRESPIE - IWEVFIRST] = {
381 .header_type = IW_HEADER_TYPE_POINT,
382 .token_size = 1,
383 .max_tokens = IW_GENERIC_IE_MAX,
384 },
385 [IWEVPMKIDCAND - IWEVFIRST] = {
386 .header_type = IW_HEADER_TYPE_POINT,
387 .token_size = 1,
388 .max_tokens = sizeof(struct iw_pmkid_cand),
389 },
1da177e4 390};
1ac58ee3 391static const unsigned standard_event_num = ARRAY_SIZE(standard_event);
1da177e4
LT
392
393/* Size (in bytes) of the various private data types */
394static const char iw_priv_type_size[] = {
395 0, /* IW_PRIV_TYPE_NONE */
396 1, /* IW_PRIV_TYPE_BYTE */
397 1, /* IW_PRIV_TYPE_CHAR */
398 0, /* Not defined */
399 sizeof(__u32), /* IW_PRIV_TYPE_INT */
400 sizeof(struct iw_freq), /* IW_PRIV_TYPE_FLOAT */
401 sizeof(struct sockaddr), /* IW_PRIV_TYPE_ADDR */
402 0, /* Not defined */
403};
404
405/* Size (in bytes) of various events */
406static const int event_type_size[] = {
407 IW_EV_LCP_LEN, /* IW_HEADER_TYPE_NULL */
408 0,
409 IW_EV_CHAR_LEN, /* IW_HEADER_TYPE_CHAR */
410 0,
411 IW_EV_UINT_LEN, /* IW_HEADER_TYPE_UINT */
412 IW_EV_FREQ_LEN, /* IW_HEADER_TYPE_FREQ */
413 IW_EV_ADDR_LEN, /* IW_HEADER_TYPE_ADDR */
414 0,
415 IW_EV_POINT_LEN, /* Without variable payload */
416 IW_EV_PARAM_LEN, /* IW_HEADER_TYPE_PARAM */
417 IW_EV_QUAL_LEN, /* IW_HEADER_TYPE_QUAL */
418};
419
c2805fbb 420
1da177e4
LT
421/************************ COMMON SUBROUTINES ************************/
422/*
423 * Stuff that may be used in various place or doesn't fit in one
424 * of the section below.
425 */
426
427/* ---------------------------------------------------------------- */
428/*
429 * Return the driver handler associated with a specific Wireless Extension.
1da177e4 430 */
bdf51894 431static iw_handler get_handler(struct net_device *dev, unsigned int cmd)
1da177e4
LT
432{
433 /* Don't "optimise" the following variable, it will crash */
434 unsigned int index; /* *MUST* be unsigned */
435
436 /* Check if we have some wireless handlers defined */
e71a4783 437 if (dev->wireless_handlers == NULL)
1da177e4
LT
438 return NULL;
439
440 /* Try as a standard command */
441 index = cmd - SIOCIWFIRST;
e71a4783 442 if (index < dev->wireless_handlers->num_standard)
1da177e4
LT
443 return dev->wireless_handlers->standard[index];
444
445 /* Try as a private command */
446 index = cmd - SIOCIWFIRSTPRIV;
e71a4783 447 if (index < dev->wireless_handlers->num_private)
1da177e4
LT
448 return dev->wireless_handlers->private[index];
449
450 /* Not found */
451 return NULL;
452}
453
454/* ---------------------------------------------------------------- */
455/*
456 * Get statistics out of the driver
457 */
bdf51894 458static struct iw_statistics *get_wireless_stats(struct net_device *dev)
1da177e4
LT
459{
460 /* New location */
e71a4783 461 if ((dev->wireless_handlers != NULL) &&
1da177e4
LT
462 (dev->wireless_handlers->get_wireless_stats != NULL))
463 return dev->wireless_handlers->get_wireless_stats(dev);
464
6582c164 465 /* Not found */
4d44e0df 466 return NULL;
1da177e4
LT
467}
468
469/* ---------------------------------------------------------------- */
470/*
471 * Call the commit handler in the driver
472 * (if exist and if conditions are right)
473 *
474 * Note : our current commit strategy is currently pretty dumb,
475 * but we will be able to improve on that...
476 * The goal is to try to agreagate as many changes as possible
477 * before doing the commit. Drivers that will define a commit handler
478 * are usually those that need a reset after changing parameters, so
479 * we want to minimise the number of reset.
480 * A cool idea is to use a timer : at each "set" command, we re-set the
481 * timer, when the timer eventually fires, we call the driver.
482 * Hopefully, more on that later.
483 *
484 * Also, I'm waiting to see how many people will complain about the
485 * netif_running(dev) test. I'm open on that one...
486 * Hopefully, the driver will remember to do a commit in "open()" ;-)
487 */
bdf51894 488static int call_commit_handler(struct net_device *dev)
1da177e4 489{
e71a4783 490 if ((netif_running(dev)) &&
4d44e0df 491 (dev->wireless_handlers->standard[0] != NULL))
1da177e4
LT
492 /* Call the commit handler on the driver */
493 return dev->wireless_handlers->standard[0](dev, NULL,
494 NULL, NULL);
4d44e0df 495 else
1da177e4
LT
496 return 0; /* Command completed successfully */
497}
498
499/* ---------------------------------------------------------------- */
500/*
501 * Calculate size of private arguments
502 */
25519a2a 503static int get_priv_size(__u16 args)
1da177e4
LT
504{
505 int num = args & IW_PRIV_SIZE_MASK;
506 int type = (args & IW_PRIV_TYPE_MASK) >> 12;
507
508 return num * iw_priv_type_size[type];
509}
510
511/* ---------------------------------------------------------------- */
512/*
513 * Re-calculate the size of private arguments
514 */
208887d4 515static int adjust_priv_size(__u16 args, struct iw_point *iwp)
1da177e4 516{
208887d4 517 int num = iwp->length;
1da177e4
LT
518 int max = args & IW_PRIV_SIZE_MASK;
519 int type = (args & IW_PRIV_TYPE_MASK) >> 12;
520
521 /* Make sure the driver doesn't goof up */
522 if (max < num)
523 num = max;
524
525 return num * iw_priv_type_size[type];
526}
527
711e2c33
JT
528/* ---------------------------------------------------------------- */
529/*
530 * Standard Wireless Handler : get wireless stats
531 * Allow programatic access to /proc/net/wireless even if /proc
532 * doesn't exist... Also more efficient...
533 */
534static int iw_handler_get_iwstats(struct net_device * dev,
535 struct iw_request_info * info,
536 union iwreq_data * wrqu,
537 char * extra)
538{
539 /* Get stats from the driver */
540 struct iw_statistics *stats;
541
542 stats = get_wireless_stats(dev);
4d44e0df 543 if (stats) {
711e2c33
JT
544 /* Copy statistics to extra */
545 memcpy(extra, stats, sizeof(struct iw_statistics));
546 wrqu->data.length = sizeof(struct iw_statistics);
547
548 /* Check if we need to clear the updated flag */
e71a4783 549 if (wrqu->data.flags != 0)
711e2c33
JT
550 stats->qual.updated &= ~IW_QUAL_ALL_UPDATED;
551 return 0;
552 } else
553 return -EOPNOTSUPP;
554}
555
556/* ---------------------------------------------------------------- */
557/*
558 * Standard Wireless Handler : get iwpriv definitions
559 * Export the driver private handler definition
560 * They will be picked up by tools like iwpriv...
561 */
562static int iw_handler_get_private(struct net_device * dev,
563 struct iw_request_info * info,
564 union iwreq_data * wrqu,
565 char * extra)
566{
567 /* Check if the driver has something to export */
e71a4783 568 if ((dev->wireless_handlers->num_private_args == 0) ||
711e2c33
JT
569 (dev->wireless_handlers->private_args == NULL))
570 return -EOPNOTSUPP;
571
572 /* Check if there is enough buffer up there */
e71a4783 573 if (wrqu->data.length < dev->wireless_handlers->num_private_args) {
711e2c33
JT
574 /* User space can't know in advance how large the buffer
575 * needs to be. Give it a hint, so that we can support
576 * any size buffer we want somewhat efficiently... */
577 wrqu->data.length = dev->wireless_handlers->num_private_args;
578 return -E2BIG;
579 }
580
581 /* Set the number of available ioctls. */
582 wrqu->data.length = dev->wireless_handlers->num_private_args;
583
584 /* Copy structure to the user buffer. */
585 memcpy(extra, dev->wireless_handlers->private_args,
586 sizeof(struct iw_priv_args) * wrqu->data.length);
587
588 return 0;
589}
590
1da177e4
LT
591
592/******************** /proc/net/wireless SUPPORT ********************/
593/*
594 * The /proc/net/wireless file is a human readable user-space interface
595 * exporting various wireless specific statistics from the wireless devices.
596 * This is the most popular part of the Wireless Extensions ;-)
597 *
598 * This interface is a pure clone of /proc/net/dev (in net/core/dev.c).
599 * The content of the file is basically the content of "struct iw_statistics".
600 */
601
602#ifdef CONFIG_PROC_FS
603
604/* ---------------------------------------------------------------- */
605/*
606 * Print one entry (line) of /proc/net/wireless
607 */
bdf51894
JB
608static void wireless_seq_printf_stats(struct seq_file *seq,
609 struct net_device *dev)
1da177e4
LT
610{
611 /* Get stats from the driver */
612 struct iw_statistics *stats = get_wireless_stats(dev);
613
614 if (stats) {
615 seq_printf(seq, "%6s: %04x %3d%c %3d%c %3d%c %6d %6d %6d "
616 "%6d %6d %6d\n",
617 dev->name, stats->status, stats->qual.qual,
618 stats->qual.updated & IW_QUAL_QUAL_UPDATED
619 ? '.' : ' ',
4ec93edb 620 ((__s32) stats->qual.level) -
6582c164 621 ((stats->qual.updated & IW_QUAL_DBM) ? 0x100 : 0),
1da177e4
LT
622 stats->qual.updated & IW_QUAL_LEVEL_UPDATED
623 ? '.' : ' ',
4ec93edb 624 ((__s32) stats->qual.noise) -
6582c164 625 ((stats->qual.updated & IW_QUAL_DBM) ? 0x100 : 0),
1da177e4
LT
626 stats->qual.updated & IW_QUAL_NOISE_UPDATED
627 ? '.' : ' ',
628 stats->discard.nwid, stats->discard.code,
629 stats->discard.fragment, stats->discard.retries,
630 stats->discard.misc, stats->miss.beacon);
6582c164 631 stats->qual.updated &= ~IW_QUAL_ALL_UPDATED;
1da177e4
LT
632 }
633}
634
635/* ---------------------------------------------------------------- */
636/*
637 * Print info for /proc/net/wireless (print all entries)
638 */
639static int wireless_seq_show(struct seq_file *seq, void *v)
640{
641 if (v == SEQ_START_TOKEN)
642 seq_printf(seq, "Inter-| sta-| Quality | Discarded "
643 "packets | Missed | WE\n"
644 " face | tus | link level noise | nwid "
645 "crypt frag retry misc | beacon | %d\n",
646 WIRELESS_EXT);
647 else
648 wireless_seq_printf_stats(seq, v);
649 return 0;
650}
651
f690808e 652static const struct seq_operations wireless_seq_ops = {
1da177e4
LT
653 .start = dev_seq_start,
654 .next = dev_seq_next,
655 .stop = dev_seq_stop,
656 .show = wireless_seq_show,
657};
658
659static int wireless_seq_open(struct inode *inode, struct file *file)
660{
e372c414
DL
661 return seq_open_net(inode, file, &wireless_seq_ops,
662 sizeof(struct seq_net_private));
1da177e4
LT
663}
664
9a32144e 665static const struct file_operations wireless_seq_fops = {
1da177e4
LT
666 .owner = THIS_MODULE,
667 .open = wireless_seq_open,
668 .read = seq_read,
669 .llseek = seq_lseek,
e372c414 670 .release = seq_release_net,
1da177e4
LT
671};
672
881d966b 673int wext_proc_init(struct net *net)
1da177e4 674{
6582c164 675 /* Create /proc/net/wireless entry */
881d966b 676 if (!proc_net_fops_create(net, "wireless", S_IRUGO, &wireless_seq_fops))
1da177e4
LT
677 return -ENOMEM;
678
679 return 0;
680}
881d966b
EB
681
682void wext_proc_exit(struct net *net)
683{
684 proc_net_remove(net, "wireless");
685}
1da177e4
LT
686#endif /* CONFIG_PROC_FS */
687
688/************************** IOCTL SUPPORT **************************/
689/*
690 * The original user space API to configure all those Wireless Extensions
691 * is through IOCTLs.
692 * In there, we check if we need to call the new driver API (iw_handler)
693 * or just call the driver ioctl handler.
694 */
695
1da177e4 696/* ---------------------------------------------------------------- */
84149b0f
DM
697static int ioctl_standard_iw_point(struct iw_point *iwp, unsigned int cmd,
698 const struct iw_ioctl_description *descr,
699 iw_handler handler, struct net_device *dev,
700 struct iw_request_info *info)
701{
702 int err, extra_size, user_length = 0, essid_compat = 0;
703 char *extra;
704
705 /* Calculate space needed by arguments. Always allocate
706 * for max space.
707 */
708 extra_size = descr->max_tokens * descr->token_size;
709
710 /* Check need for ESSID compatibility for WE < 21 */
711 switch (cmd) {
712 case SIOCSIWESSID:
713 case SIOCGIWESSID:
714 case SIOCSIWNICKN:
715 case SIOCGIWNICKN:
716 if (iwp->length == descr->max_tokens + 1)
717 essid_compat = 1;
718 else if (IW_IS_SET(cmd) && (iwp->length != 0)) {
719 char essid[IW_ESSID_MAX_SIZE + 1];
720
721 err = copy_from_user(essid, iwp->pointer,
722 iwp->length *
723 descr->token_size);
724 if (err)
725 return -EFAULT;
726
727 if (essid[iwp->length - 1] == '\0')
728 essid_compat = 1;
729 }
730 break;
731 default:
732 break;
733 }
734
735 iwp->length -= essid_compat;
736
737 /* Check what user space is giving us */
738 if (IW_IS_SET(cmd)) {
739 /* Check NULL pointer */
740 if (!iwp->pointer && iwp->length != 0)
741 return -EFAULT;
742 /* Check if number of token fits within bounds */
743 if (iwp->length > descr->max_tokens)
744 return -E2BIG;
745 if (iwp->length < descr->min_tokens)
746 return -EINVAL;
747 } else {
748 /* Check NULL pointer */
749 if (!iwp->pointer)
750 return -EFAULT;
751 /* Save user space buffer size for checking */
752 user_length = iwp->length;
753
754 /* Don't check if user_length > max to allow forward
755 * compatibility. The test user_length < min is
756 * implied by the test at the end.
757 */
758
759 /* Support for very large requests */
760 if ((descr->flags & IW_DESCR_FLAG_NOMAX) &&
761 (user_length > descr->max_tokens)) {
762 /* Allow userspace to GET more than max so
763 * we can support any size GET requests.
764 * There is still a limit : -ENOMEM.
765 */
766 extra_size = user_length * descr->token_size;
767
768 /* Note : user_length is originally a __u16,
769 * and token_size is controlled by us,
770 * so extra_size won't get negative and
771 * won't overflow...
772 */
773 }
774 }
775
776 /* kzalloc() ensures NULL-termination for essid_compat. */
777 extra = kzalloc(extra_size, GFP_KERNEL);
778 if (!extra)
779 return -ENOMEM;
780
781 /* If it is a SET, get all the extra data in here */
782 if (IW_IS_SET(cmd) && (iwp->length != 0)) {
783 if (copy_from_user(extra, iwp->pointer,
784 iwp->length *
785 descr->token_size)) {
786 err = -EFAULT;
787 goto out;
788 }
789 }
790
791 err = handler(dev, info, (union iwreq_data *) iwp, extra);
792
793 iwp->length += essid_compat;
794
795 /* If we have something to return to the user */
796 if (!err && IW_IS_GET(cmd)) {
797 /* Check if there is enough buffer up there */
798 if (user_length < iwp->length) {
799 err = -E2BIG;
800 goto out;
801 }
802
803 if (copy_to_user(iwp->pointer, extra,
804 iwp->length *
805 descr->token_size)) {
806 err = -EFAULT;
807 goto out;
808 }
809 }
810
811 /* Generate an event to notify listeners of the change */
812 if ((descr->flags & IW_DESCR_FLAG_EVENT) && err == -EIWCOMMIT) {
813 union iwreq_data *data = (union iwreq_data *) iwp;
814
815 if (descr->flags & IW_DESCR_FLAG_RESTRICT)
816 /* If the event is restricted, don't
817 * export the payload.
818 */
819 wireless_send_event(dev, cmd, data, NULL);
820 else
821 wireless_send_event(dev, cmd, data, extra);
822 }
823
824out:
825 kfree(extra);
826 return err;
827}
828
1da177e4
LT
829/*
830 * Wrapper to call a standard Wireless Extension handler.
831 * We do various checks and also take care of moving data between
832 * user space and kernel space.
833 */
711e2c33
JT
834static int ioctl_standard_call(struct net_device * dev,
835 struct ifreq * ifr,
836 unsigned int cmd,
837 iw_handler handler)
1da177e4
LT
838{
839 struct iwreq * iwr = (struct iwreq *) ifr;
840 const struct iw_ioctl_description * descr;
841 struct iw_request_info info;
842 int ret = -EINVAL;
843
844 /* Get the description of the IOCTL */
e71a4783 845 if ((cmd - SIOCIWFIRST) >= standard_ioctl_num)
1da177e4
LT
846 return -EOPNOTSUPP;
847 descr = &(standard_ioctl[cmd - SIOCIWFIRST]);
848
1da177e4
LT
849 /* Prepare the call */
850 info.cmd = cmd;
851 info.flags = 0;
852
853 /* Check if we have a pointer to user space data or not */
e71a4783 854 if (descr->header_type != IW_HEADER_TYPE_POINT) {
1da177e4
LT
855
856 /* No extra arguments. Trivial to handle */
857 ret = handler(dev, &info, &(iwr->u), NULL);
858
1da177e4 859 /* Generate an event to notify listeners of the change */
e71a4783 860 if ((descr->flags & IW_DESCR_FLAG_EVENT) &&
1da177e4
LT
861 ((ret == 0) || (ret == -EIWCOMMIT)))
862 wireless_send_event(dev, cmd, &(iwr->u), NULL);
1da177e4 863 } else {
84149b0f
DM
864 ret = ioctl_standard_iw_point(&iwr->u.data, cmd, descr,
865 handler, dev, &info);
1da177e4
LT
866 }
867
868 /* Call commit handler if needed and defined */
e71a4783 869 if (ret == -EIWCOMMIT)
1da177e4
LT
870 ret = call_commit_handler(dev);
871
872 /* Here, we will generate the appropriate event if needed */
873
874 return ret;
875}
876
877/* ---------------------------------------------------------------- */
878/*
879 * Wrapper to call a private Wireless Extension handler.
880 * We do various checks and also take care of moving data between
881 * user space and kernel space.
882 * It's not as nice and slimline as the standard wrapper. The cause
883 * is struct iw_priv_args, which was not really designed for the
884 * job we are going here.
885 *
886 * IMPORTANT : This function prevent to set and get data on the same
887 * IOCTL and enforce the SET/GET convention. Not doing it would be
888 * far too hairy...
889 * If you need to set and get data at the same time, please don't use
890 * a iw_handler but process it in your ioctl handler (i.e. use the
891 * old driver API).
892 */
d88174e4
DM
893static int get_priv_descr_and_size(struct net_device *dev, unsigned int cmd,
894 const struct iw_priv_args **descrp)
1da177e4 895{
d88174e4
DM
896 const struct iw_priv_args *descr;
897 int i, extra_size;
1da177e4 898
d88174e4
DM
899 descr = NULL;
900 for (i = 0; i < dev->wireless_handlers->num_private_args; i++) {
e71a4783 901 if (cmd == dev->wireless_handlers->private_args[i].cmd) {
d88174e4 902 descr = &dev->wireless_handlers->private_args[i];
1da177e4
LT
903 break;
904 }
d88174e4 905 }
1da177e4 906
d88174e4
DM
907 extra_size = 0;
908 if (descr) {
e71a4783 909 if (IW_IS_SET(cmd)) {
1da177e4
LT
910 int offset = 0; /* For sub-ioctls */
911 /* Check for sub-ioctl handler */
e71a4783 912 if (descr->name[0] == '\0')
1da177e4
LT
913 /* Reserve one int for sub-ioctl index */
914 offset = sizeof(__u32);
915
916 /* Size of set arguments */
917 extra_size = get_priv_size(descr->set_args);
918
919 /* Does it fits in iwr ? */
e71a4783 920 if ((descr->set_args & IW_PRIV_SIZE_FIXED) &&
1da177e4
LT
921 ((extra_size + offset) <= IFNAMSIZ))
922 extra_size = 0;
923 } else {
924 /* Size of get arguments */
925 extra_size = get_priv_size(descr->get_args);
926
927 /* Does it fits in iwr ? */
e71a4783 928 if ((descr->get_args & IW_PRIV_SIZE_FIXED) &&
1da177e4
LT
929 (extra_size <= IFNAMSIZ))
930 extra_size = 0;
931 }
932 }
d88174e4
DM
933 *descrp = descr;
934 return extra_size;
935}
1da177e4 936
d88174e4
DM
937static int ioctl_private_iw_point(struct iw_point *iwp, unsigned int cmd,
938 const struct iw_priv_args *descr,
939 iw_handler handler, struct net_device *dev,
940 struct iw_request_info *info, int extra_size)
941{
942 char *extra;
943 int err;
1da177e4 944
d88174e4
DM
945 /* Check what user space is giving us */
946 if (IW_IS_SET(cmd)) {
947 if (!iwp->pointer && iwp->length != 0)
948 return -EFAULT;
1da177e4 949
d88174e4
DM
950 if (iwp->length > (descr->set_args & IW_PRIV_SIZE_MASK))
951 return -E2BIG;
952 } else if (!iwp->pointer)
953 return -EFAULT;
1da177e4 954
d88174e4
DM
955 extra = kmalloc(extra_size, GFP_KERNEL);
956 if (!extra)
957 return -ENOMEM;
1da177e4 958
d88174e4
DM
959 /* If it is a SET, get all the extra data in here */
960 if (IW_IS_SET(cmd) && (iwp->length != 0)) {
961 if (copy_from_user(extra, iwp->pointer, extra_size)) {
962 err = -EFAULT;
963 goto out;
1da177e4 964 }
d88174e4 965 }
1da177e4 966
d88174e4
DM
967 /* Call the handler */
968 err = handler(dev, info, (union iwreq_data *) iwp, extra);
1da177e4 969
d88174e4
DM
970 /* If we have something to return to the user */
971 if (!err && IW_IS_GET(cmd)) {
972 /* Adjust for the actual length if it's variable,
973 * avoid leaking kernel bits outside.
974 */
975 if (!(descr->get_args & IW_PRIV_SIZE_FIXED))
976 extra_size = adjust_priv_size(descr->get_args, iwp);
1da177e4 977
d88174e4
DM
978 if (copy_to_user(iwp->pointer, extra, extra_size))
979 err = -EFAULT;
980 }
1da177e4 981
d88174e4
DM
982out:
983 kfree(extra);
984 return err;
985}
1da177e4 986
d88174e4
DM
987static int ioctl_private_call(struct net_device *dev, struct ifreq *ifr,
988 unsigned int cmd, iw_handler handler)
989{
990 struct iwreq *iwr = (struct iwreq *) ifr;
991 int extra_size = 0, ret = -EINVAL;
992 const struct iw_priv_args *descr;
993 struct iw_request_info info;
994
995 extra_size = get_priv_descr_and_size(dev, cmd, &descr);
996
997 /* Prepare the call */
998 info.cmd = cmd;
999 info.flags = 0;
1da177e4 1000
d88174e4
DM
1001 /* Check if we have a pointer to user space data or not. */
1002 if (extra_size == 0) {
1003 /* No extra arguments. Trivial to handle */
1004 ret = handler(dev, &info, &(iwr->u), (char *) &(iwr->u));
1005 } else {
1006 ret = ioctl_private_iw_point(&iwr->u.data, cmd, descr,
1007 handler, dev, &info, extra_size);
1008 }
1da177e4
LT
1009
1010 /* Call commit handler if needed and defined */
e71a4783 1011 if (ret == -EIWCOMMIT)
1da177e4
LT
1012 ret = call_commit_handler(dev);
1013
1014 return ret;
1015}
1016
1017/* ---------------------------------------------------------------- */
1018/*
295f4a1f 1019 * Main IOCTl dispatcher.
1da177e4
LT
1020 * Check the type of IOCTL and call the appropriate wrapper...
1021 */
881d966b 1022static int wireless_process_ioctl(struct net *net, struct ifreq *ifr, unsigned int cmd)
1da177e4
LT
1023{
1024 struct net_device *dev;
1025 iw_handler handler;
1026
1027 /* Permissions are already checked in dev_ioctl() before calling us.
1028 * The copy_to/from_user() of ifr is also dealt with in there */
1029
1030 /* Make sure the device exist */
881d966b 1031 if ((dev = __dev_get_by_name(net, ifr->ifr_name)) == NULL)
1da177e4
LT
1032 return -ENODEV;
1033
1034 /* A bunch of special cases, then the generic case...
1035 * Note that 'cmd' is already filtered in dev_ioctl() with
1036 * (cmd >= SIOCIWFIRST && cmd <= SIOCIWLAST) */
dd8ceabc
JB
1037 if (cmd == SIOCGIWSTATS)
1038 return ioctl_standard_call(dev, ifr, cmd,
e71a4783
SH
1039 &iw_handler_get_iwstats);
1040
dd8ceabc
JB
1041 if (cmd == SIOCGIWPRIV && dev->wireless_handlers)
1042 return ioctl_standard_call(dev, ifr, cmd,
1043 &iw_handler_get_private);
1044
1045 /* Basic check */
1046 if (!netif_device_present(dev))
1047 return -ENODEV;
1048
1049 /* New driver API : try to find the handler */
1050 handler = get_handler(dev, cmd);
1051 if (handler) {
1052 /* Standard and private are not the same */
1053 if (cmd < SIOCIWFIRSTPRIV)
1054 return ioctl_standard_call(dev, ifr, cmd, handler);
1055 else
1056 return ioctl_private_call(dev, ifr, cmd, handler);
1da177e4 1057 }
dd8ceabc
JB
1058 /* Old driver API : call driver ioctl handler */
1059 if (dev->do_ioctl)
1060 return dev->do_ioctl(dev, ifr, cmd);
1061 return -EOPNOTSUPP;
1da177e4
LT
1062}
1063
67dd7608
DM
1064/* If command is `set a parameter', or `get the encoding parameters',
1065 * check if the user has the right to do it.
1066 */
1067static int wext_permission_check(unsigned int cmd)
1068{
1069 if ((IW_IS_SET(cmd) || cmd == SIOCGIWENCODE || cmd == SIOCGIWENCODEEXT)
1070 && !capable(CAP_NET_ADMIN))
1071 return -EPERM;
1072
1073 return 0;
1074}
1075
295f4a1f 1076/* entry point from dev ioctl */
881d966b 1077int wext_handle_ioctl(struct net *net, struct ifreq *ifr, unsigned int cmd,
295f4a1f
JB
1078 void __user *arg)
1079{
67dd7608 1080 int ret = wext_permission_check(cmd);
295f4a1f 1081
67dd7608
DM
1082 if (ret)
1083 return ret;
dd8ceabc 1084
881d966b 1085 dev_load(net, ifr->ifr_name);
295f4a1f 1086 rtnl_lock();
881d966b 1087 ret = wireless_process_ioctl(net, ifr, cmd);
295f4a1f 1088 rtnl_unlock();
0a06ea87 1089 if (IW_IS_GET(cmd) && copy_to_user(arg, ifr, sizeof(struct iwreq)))
295f4a1f
JB
1090 return -EFAULT;
1091 return ret;
1092}
711e2c33 1093
1da177e4
LT
1094/************************* EVENT PROCESSING *************************/
1095/*
1096 * Process events generated by the wireless layer or the driver.
1097 * Most often, the event will be propagated through rtnetlink
1098 */
1099
baef1865
JL
1100/* ---------------------------------------------------------------- */
1101/*
1102 * Locking...
1103 * ----------
1104 *
1105 * Thanks to Herbert Xu <herbert@gondor.apana.org.au> for fixing
1106 * the locking issue in here and implementing this code !
1107 *
1108 * The issue : wireless_send_event() is often called in interrupt context,
1109 * while the Netlink layer can never be called in interrupt context.
1110 * The fully formed RtNetlink events are queued, and then a tasklet is run
1111 * to feed those to Netlink.
1112 * The skb_queue is interrupt safe, and its lock is not held while calling
1113 * Netlink, so there is no possibility of dealock.
1114 * Jean II
1115 */
1116
782a6675
HX
1117static struct sk_buff_head wireless_nlevent_queue;
1118
baef1865
JL
1119static int __init wireless_nlevent_init(void)
1120{
1121 skb_queue_head_init(&wireless_nlevent_queue);
1122 return 0;
1123}
1124
1125subsys_initcall(wireless_nlevent_init);
1126
782a6675
HX
1127static void wireless_nlevent_process(unsigned long data)
1128{
1129 struct sk_buff *skb;
1130
1131 while ((skb = skb_dequeue(&wireless_nlevent_queue)))
97c53cac 1132 rtnl_notify(skb, &init_net, 0, RTNLGRP_LINK, NULL, GFP_ATOMIC);
782a6675
HX
1133}
1134
1135static DECLARE_TASKLET(wireless_nlevent_tasklet, wireless_nlevent_process, 0);
1136
1da177e4
LT
1137/* ---------------------------------------------------------------- */
1138/*
1139 * Fill a rtnetlink message with our event data.
1140 * Note that we propage only the specified event and don't dump the
1141 * current wireless config. Dumping the wireless config is far too
1142 * expensive (for each parameter, the driver need to query the hardware).
1143 */
bdf51894
JB
1144static int rtnetlink_fill_iwinfo(struct sk_buff *skb, struct net_device *dev,
1145 int type, char *event, int event_len)
1da177e4
LT
1146{
1147 struct ifinfomsg *r;
1148 struct nlmsghdr *nlh;
1da177e4 1149
744b096e
TG
1150 nlh = nlmsg_put(skb, 0, 0, type, sizeof(*r), 0);
1151 if (nlh == NULL)
1152 return -EMSGSIZE;
1153
1154 r = nlmsg_data(nlh);
1da177e4 1155 r->ifi_family = AF_UNSPEC;
9ef1d4c7 1156 r->__ifi_pad = 0;
1da177e4
LT
1157 r->ifi_type = dev->type;
1158 r->ifi_index = dev->ifindex;
711e2c33 1159 r->ifi_flags = dev_get_flags(dev);
1da177e4
LT
1160 r->ifi_change = 0; /* Wireless changes don't affect those flags */
1161
1162 /* Add the wireless events in the netlink packet */
744b096e 1163 NLA_PUT(skb, IFLA_WIRELESS, event_len, event);
1da177e4 1164
744b096e 1165 return nlmsg_end(skb, nlh);
1da177e4 1166
744b096e
TG
1167nla_put_failure:
1168 nlmsg_cancel(skb, nlh);
1169 return -EMSGSIZE;
1da177e4
LT
1170}
1171
1172/* ---------------------------------------------------------------- */
1173/*
1174 * Create and broadcast and send it on the standard rtnetlink socket
1175 * This is a pure clone rtmsg_ifinfo() in net/core/rtnetlink.c
1176 * Andrzej Krzysztofowicz mandated that I used a IFLA_XXX field
1177 * within a RTM_NEWLINK event.
1178 */
bdf51894 1179static void rtmsg_iwinfo(struct net_device *dev, char *event, int event_len)
1da177e4
LT
1180{
1181 struct sk_buff *skb;
744b096e 1182 int err;
1da177e4 1183
c346dca1 1184 if (dev_net(dev) != &init_net)
97c53cac
DL
1185 return;
1186
744b096e 1187 skb = nlmsg_new(NLMSG_DEFAULT_SIZE, GFP_ATOMIC);
1da177e4
LT
1188 if (!skb)
1189 return;
1190
744b096e
TG
1191 err = rtnetlink_fill_iwinfo(skb, dev, RTM_NEWLINK, event, event_len);
1192 if (err < 0) {
1193 WARN_ON(err == -EMSGSIZE);
1da177e4
LT
1194 kfree_skb(skb);
1195 return;
1196 }
744b096e 1197
ac6d439d 1198 NETLINK_CB(skb).dst_group = RTNLGRP_LINK;
782a6675
HX
1199 skb_queue_tail(&wireless_nlevent_queue, skb);
1200 tasklet_schedule(&wireless_nlevent_tasklet);
1201}
1202
1da177e4
LT
1203/* ---------------------------------------------------------------- */
1204/*
1205 * Main event dispatcher. Called from other parts and drivers.
1206 * Send the event on the appropriate channels.
1207 * May be called from interrupt context.
1208 */
1209void wireless_send_event(struct net_device * dev,
1210 unsigned int cmd,
1211 union iwreq_data * wrqu,
1212 char * extra)
1213{
1214 const struct iw_ioctl_description * descr = NULL;
1215 int extra_len = 0;
1216 struct iw_event *event; /* Mallocated whole event */
1217 int event_len; /* Its size */
1218 int hdr_len; /* Size of the event header */
6582c164 1219 int wrqu_off = 0; /* Offset in wrqu */
1da177e4
LT
1220 /* Don't "optimise" the following variable, it will crash */
1221 unsigned cmd_index; /* *MUST* be unsigned */
1222
6582c164 1223 /* Get the description of the Event */
e71a4783 1224 if (cmd <= SIOCIWLAST) {
1da177e4 1225 cmd_index = cmd - SIOCIWFIRST;
e71a4783 1226 if (cmd_index < standard_ioctl_num)
1da177e4
LT
1227 descr = &(standard_ioctl[cmd_index]);
1228 } else {
1229 cmd_index = cmd - IWEVFIRST;
e71a4783 1230 if (cmd_index < standard_event_num)
1da177e4
LT
1231 descr = &(standard_event[cmd_index]);
1232 }
1233 /* Don't accept unknown events */
e71a4783 1234 if (descr == NULL) {
1da177e4
LT
1235 /* Note : we don't return an error to the driver, because
1236 * the driver would not know what to do about it. It can't
1237 * return an error to the user, because the event is not
1238 * initiated by a user request.
1239 * The best the driver could do is to log an error message.
1240 * We will do it ourselves instead...
1241 */
4ec93edb 1242 printk(KERN_ERR "%s (WE) : Invalid/Unknown Wireless Event (0x%04X)\n",
1da177e4
LT
1243 dev->name, cmd);
1244 return;
1245 }
1da177e4
LT
1246
1247 /* Check extra parameters and set extra_len */
e71a4783 1248 if (descr->header_type == IW_HEADER_TYPE_POINT) {
1da177e4 1249 /* Check if number of token fits within bounds */
e71a4783 1250 if (wrqu->data.length > descr->max_tokens) {
4ec93edb 1251 printk(KERN_ERR "%s (WE) : Wireless Event too big (%d)\n", dev->name, wrqu->data.length);
1da177e4
LT
1252 return;
1253 }
e71a4783 1254 if (wrqu->data.length < descr->min_tokens) {
4ec93edb 1255 printk(KERN_ERR "%s (WE) : Wireless Event too small (%d)\n", dev->name, wrqu->data.length);
1da177e4
LT
1256 return;
1257 }
1258 /* Calculate extra_len - extra is NULL for restricted events */
e71a4783 1259 if (extra != NULL)
1da177e4 1260 extra_len = wrqu->data.length * descr->token_size;
6582c164
JT
1261 /* Always at an offset in wrqu */
1262 wrqu_off = IW_EV_POINT_OFF;
1da177e4
LT
1263 }
1264
1265 /* Total length of the event */
1266 hdr_len = event_type_size[descr->header_type];
1267 event_len = hdr_len + extra_len;
1268
1da177e4
LT
1269 /* Create temporary buffer to hold the event */
1270 event = kmalloc(event_len, GFP_ATOMIC);
e71a4783 1271 if (event == NULL)
1da177e4
LT
1272 return;
1273
1274 /* Fill event */
1275 event->len = event_len;
1276 event->cmd = cmd;
6582c164 1277 memcpy(&event->u, ((char *) wrqu) + wrqu_off, hdr_len - IW_EV_LCP_LEN);
4d44e0df 1278 if (extra)
1da177e4
LT
1279 memcpy(((char *) event) + hdr_len, extra, extra_len);
1280
711e2c33 1281 /* Send via the RtNetlink event channel */
1da177e4 1282 rtmsg_iwinfo(dev, (char *) event, event_len);
1da177e4
LT
1283
1284 /* Cleanup */
1285 kfree(event);
1286
1287 return; /* Always success, I guess ;-) */
1288}
7a9df167 1289EXPORT_SYMBOL(wireless_send_event);
1da177e4
LT
1290
1291/********************** ENHANCED IWSPY SUPPORT **********************/
1292/*
1293 * In the old days, the driver was handling spy support all by itself.
1294 * Now, the driver can delegate this task to Wireless Extensions.
1295 * It needs to use those standard spy iw_handler in struct iw_handler_def,
1296 * push data to us via wireless_spy_update() and include struct iw_spy_data
6582c164 1297 * in its private part (and export it in net_device->wireless_data->spy_data).
1da177e4
LT
1298 * One of the main advantage of centralising spy support here is that
1299 * it becomes much easier to improve and extend it without having to touch
1300 * the drivers. One example is the addition of the Spy-Threshold events.
1301 */
1302
1303/* ---------------------------------------------------------------- */
1304/*
1305 * Return the pointer to the spy data in the driver.
1306 * Because this is called on the Rx path via wireless_spy_update(),
1307 * we want it to be efficient...
1308 */
4d44e0df 1309static inline struct iw_spy_data *get_spydata(struct net_device *dev)
1da177e4
LT
1310{
1311 /* This is the new way */
e71a4783 1312 if (dev->wireless_data)
4d44e0df 1313 return dev->wireless_data->spy_data;
6582c164 1314 return NULL;
1da177e4
LT
1315}
1316
1317/*------------------------------------------------------------------*/
1318/*
1319 * Standard Wireless Handler : set Spy List
1320 */
1321int iw_handler_set_spy(struct net_device * dev,
1322 struct iw_request_info * info,
1323 union iwreq_data * wrqu,
1324 char * extra)
1325{
1326 struct iw_spy_data * spydata = get_spydata(dev);
1327 struct sockaddr * address = (struct sockaddr *) extra;
1328
1da177e4 1329 /* Make sure driver is not buggy or using the old API */
e71a4783 1330 if (!spydata)
1da177e4
LT
1331 return -EOPNOTSUPP;
1332
1333 /* Disable spy collection while we copy the addresses.
1334 * While we copy addresses, any call to wireless_spy_update()
1335 * will NOP. This is OK, as anyway the addresses are changing. */
1336 spydata->spy_number = 0;
1337
1338 /* We want to operate without locking, because wireless_spy_update()
1339 * most likely will happen in the interrupt handler, and therefore
1340 * have its own locking constraints and needs performance.
1341 * The rtnl_lock() make sure we don't race with the other iw_handlers.
1342 * This make sure wireless_spy_update() "see" that the spy list
1343 * is temporarily disabled. */
e16aa207 1344 smp_wmb();
1da177e4
LT
1345
1346 /* Are there are addresses to copy? */
e71a4783 1347 if (wrqu->data.length > 0) {
1da177e4
LT
1348 int i;
1349
1350 /* Copy addresses */
e71a4783 1351 for (i = 0; i < wrqu->data.length; i++)
1da177e4
LT
1352 memcpy(spydata->spy_address[i], address[i].sa_data,
1353 ETH_ALEN);
1354 /* Reset stats */
1355 memset(spydata->spy_stat, 0,
1356 sizeof(struct iw_quality) * IW_MAX_SPY);
1da177e4
LT
1357 }
1358
1359 /* Make sure above is updated before re-enabling */
e16aa207 1360 smp_wmb();
1da177e4
LT
1361
1362 /* Enable addresses */
1363 spydata->spy_number = wrqu->data.length;
1364
1365 return 0;
1366}
7a9df167 1367EXPORT_SYMBOL(iw_handler_set_spy);
1da177e4
LT
1368
1369/*------------------------------------------------------------------*/
1370/*
1371 * Standard Wireless Handler : get Spy List
1372 */
1373int iw_handler_get_spy(struct net_device * dev,
1374 struct iw_request_info * info,
1375 union iwreq_data * wrqu,
1376 char * extra)
1377{
1378 struct iw_spy_data * spydata = get_spydata(dev);
1379 struct sockaddr * address = (struct sockaddr *) extra;
1380 int i;
1381
1382 /* Make sure driver is not buggy or using the old API */
e71a4783 1383 if (!spydata)
1da177e4
LT
1384 return -EOPNOTSUPP;
1385
1386 wrqu->data.length = spydata->spy_number;
1387
1388 /* Copy addresses. */
e71a4783 1389 for (i = 0; i < spydata->spy_number; i++) {
1da177e4
LT
1390 memcpy(address[i].sa_data, spydata->spy_address[i], ETH_ALEN);
1391 address[i].sa_family = AF_UNIX;
1392 }
1393 /* Copy stats to the user buffer (just after). */
e71a4783 1394 if (spydata->spy_number > 0)
1da177e4
LT
1395 memcpy(extra + (sizeof(struct sockaddr) *spydata->spy_number),
1396 spydata->spy_stat,
1397 sizeof(struct iw_quality) * spydata->spy_number);
1398 /* Reset updated flags. */
e71a4783 1399 for (i = 0; i < spydata->spy_number; i++)
6582c164 1400 spydata->spy_stat[i].updated &= ~IW_QUAL_ALL_UPDATED;
1da177e4
LT
1401 return 0;
1402}
7a9df167 1403EXPORT_SYMBOL(iw_handler_get_spy);
1da177e4
LT
1404
1405/*------------------------------------------------------------------*/
1406/*
1407 * Standard Wireless Handler : set spy threshold
1408 */
1409int iw_handler_set_thrspy(struct net_device * dev,
1410 struct iw_request_info *info,
1411 union iwreq_data * wrqu,
1412 char * extra)
1413{
1414 struct iw_spy_data * spydata = get_spydata(dev);
1415 struct iw_thrspy * threshold = (struct iw_thrspy *) extra;
1416
1417 /* Make sure driver is not buggy or using the old API */
e71a4783 1418 if (!spydata)
1da177e4
LT
1419 return -EOPNOTSUPP;
1420
1421 /* Just do it */
1422 memcpy(&(spydata->spy_thr_low), &(threshold->low),
1423 2 * sizeof(struct iw_quality));
1424
1425 /* Clear flag */
1426 memset(spydata->spy_thr_under, '\0', sizeof(spydata->spy_thr_under));
1427
1da177e4
LT
1428 return 0;
1429}
7a9df167 1430EXPORT_SYMBOL(iw_handler_set_thrspy);
1da177e4
LT
1431
1432/*------------------------------------------------------------------*/
1433/*
1434 * Standard Wireless Handler : get spy threshold
1435 */
1436int iw_handler_get_thrspy(struct net_device * dev,
1437 struct iw_request_info *info,
1438 union iwreq_data * wrqu,
1439 char * extra)
1440{
1441 struct iw_spy_data * spydata = get_spydata(dev);
1442 struct iw_thrspy * threshold = (struct iw_thrspy *) extra;
1443
1444 /* Make sure driver is not buggy or using the old API */
e71a4783 1445 if (!spydata)
1da177e4
LT
1446 return -EOPNOTSUPP;
1447
1448 /* Just do it */
1449 memcpy(&(threshold->low), &(spydata->spy_thr_low),
1450 2 * sizeof(struct iw_quality));
1451
1452 return 0;
1453}
7a9df167 1454EXPORT_SYMBOL(iw_handler_get_thrspy);
1da177e4
LT
1455
1456/*------------------------------------------------------------------*/
1457/*
1458 * Prepare and send a Spy Threshold event
1459 */
1460static void iw_send_thrspy_event(struct net_device * dev,
1461 struct iw_spy_data * spydata,
1462 unsigned char * address,
1463 struct iw_quality * wstats)
1464{
1465 union iwreq_data wrqu;
1466 struct iw_thrspy threshold;
1467
1468 /* Init */
1469 wrqu.data.length = 1;
1470 wrqu.data.flags = 0;
1471 /* Copy address */
1472 memcpy(threshold.addr.sa_data, address, ETH_ALEN);
1473 threshold.addr.sa_family = ARPHRD_ETHER;
1474 /* Copy stats */
1475 memcpy(&(threshold.qual), wstats, sizeof(struct iw_quality));
1476 /* Copy also thresholds */
1477 memcpy(&(threshold.low), &(spydata->spy_thr_low),
1478 2 * sizeof(struct iw_quality));
1479
1da177e4
LT
1480 /* Send event to user space */
1481 wireless_send_event(dev, SIOCGIWTHRSPY, &wrqu, (char *) &threshold);
1482}
1483
1484/* ---------------------------------------------------------------- */
1485/*
1486 * Call for the driver to update the spy data.
1487 * For now, the spy data is a simple array. As the size of the array is
1488 * small, this is good enough. If we wanted to support larger number of
1489 * spy addresses, we should use something more efficient...
1490 */
1491void wireless_spy_update(struct net_device * dev,
1492 unsigned char * address,
1493 struct iw_quality * wstats)
1494{
1495 struct iw_spy_data * spydata = get_spydata(dev);
1496 int i;
1497 int match = -1;
1498
1499 /* Make sure driver is not buggy or using the old API */
e71a4783 1500 if (!spydata)
1da177e4
LT
1501 return;
1502
1da177e4 1503 /* Update all records that match */
e71a4783
SH
1504 for (i = 0; i < spydata->spy_number; i++)
1505 if (!compare_ether_addr(address, spydata->spy_address[i])) {
1da177e4
LT
1506 memcpy(&(spydata->spy_stat[i]), wstats,
1507 sizeof(struct iw_quality));
1508 match = i;
1509 }
1510
1511 /* Generate an event if we cross the spy threshold.
1512 * To avoid event storms, we have a simple hysteresis : we generate
1513 * event only when we go under the low threshold or above the
1514 * high threshold. */
e71a4783
SH
1515 if (match >= 0) {
1516 if (spydata->spy_thr_under[match]) {
1517 if (wstats->level > spydata->spy_thr_high.level) {
1da177e4
LT
1518 spydata->spy_thr_under[match] = 0;
1519 iw_send_thrspy_event(dev, spydata,
1520 address, wstats);
1521 }
1522 } else {
e71a4783 1523 if (wstats->level < spydata->spy_thr_low.level) {
1da177e4
LT
1524 spydata->spy_thr_under[match] = 1;
1525 iw_send_thrspy_event(dev, spydata,
1526 address, wstats);
1527 }
1528 }
1529 }
1530}
1da177e4 1531EXPORT_SYMBOL(wireless_spy_update);