Merge tag 'mac80211-next-for-davem-2015-02-03' of git://git.kernel.org/pub/scm/linux/kernel/git/jberg/mac80211-next
Last round of updates for net-next: * revert a patch that caused a regression with mesh userspace (Bob) * fix a number of suspend/resume related races (from Emmanuel, Luca and myself - we'll look at backporting later) * add software implementations for new ciphers (Jouni) * add a new ACPI ID for Broadcom's rfkill (Mika) * allow using netns FD for wireless (Vadim) * some other cleanups (various) Signed-off-by: David S. Miller <davem@davemloft.net>
This commit is contained in:
@@ -397,6 +397,8 @@ static const struct nla_policy nl80211_policy[NUM_NL80211_ATTR] = {
|
||||
[NL80211_ATTR_SMPS_MODE] = { .type = NLA_U8 },
|
||||
[NL80211_ATTR_MAC_MASK] = { .len = ETH_ALEN },
|
||||
[NL80211_ATTR_WIPHY_SELF_MANAGED_REG] = { .type = NLA_FLAG },
|
||||
[NL80211_ATTR_NETNS_FD] = { .type = NLA_U32 },
|
||||
[NL80211_ATTR_SCHED_SCAN_DELAY] = { .type = NLA_U32 },
|
||||
};
|
||||
|
||||
/* policy for the key attributes */
|
||||
@@ -5778,7 +5780,7 @@ static int nl80211_trigger_scan(struct sk_buff *skb, struct genl_info *info)
|
||||
request->ssids = (void *)&request->channels[n_channels];
|
||||
request->n_ssids = n_ssids;
|
||||
if (ie_len) {
|
||||
if (request->ssids)
|
||||
if (n_ssids)
|
||||
request->ie = (void *)(request->ssids + n_ssids);
|
||||
else
|
||||
request->ie = (void *)(request->channels + n_channels);
|
||||
@@ -5834,7 +5836,7 @@ static int nl80211_trigger_scan(struct sk_buff *skb, struct genl_info *info)
|
||||
request->n_channels = i;
|
||||
|
||||
i = 0;
|
||||
if (info->attrs[NL80211_ATTR_SCAN_SSIDS]) {
|
||||
if (n_ssids) {
|
||||
nla_for_each_nested(attr, info->attrs[NL80211_ATTR_SCAN_SSIDS], tmp) {
|
||||
if (nla_len(attr) > IEEE80211_MAX_SSID_LEN) {
|
||||
err = -EINVAL;
|
||||
@@ -6032,7 +6034,7 @@ nl80211_parse_sched_scan(struct wiphy *wiphy, struct wireless_dev *wdev,
|
||||
request->ssids = (void *)&request->channels[n_channels];
|
||||
request->n_ssids = n_ssids;
|
||||
if (ie_len) {
|
||||
if (request->ssids)
|
||||
if (n_ssids)
|
||||
request->ie = (void *)(request->ssids + n_ssids);
|
||||
else
|
||||
request->ie = (void *)(request->channels + n_channels);
|
||||
@@ -6041,7 +6043,7 @@ nl80211_parse_sched_scan(struct wiphy *wiphy, struct wireless_dev *wdev,
|
||||
if (n_match_sets) {
|
||||
if (request->ie)
|
||||
request->match_sets = (void *)(request->ie + ie_len);
|
||||
else if (request->ssids)
|
||||
else if (n_ssids)
|
||||
request->match_sets =
|
||||
(void *)(request->ssids + n_ssids);
|
||||
else
|
||||
@@ -6100,7 +6102,7 @@ nl80211_parse_sched_scan(struct wiphy *wiphy, struct wireless_dev *wdev,
|
||||
request->n_channels = i;
|
||||
|
||||
i = 0;
|
||||
if (attrs[NL80211_ATTR_SCAN_SSIDS]) {
|
||||
if (n_ssids) {
|
||||
nla_for_each_nested(attr, attrs[NL80211_ATTR_SCAN_SSIDS],
|
||||
tmp) {
|
||||
if (nla_len(attr) > IEEE80211_MAX_SSID_LEN) {
|
||||
@@ -6208,6 +6210,10 @@ nl80211_parse_sched_scan(struct wiphy *wiphy, struct wireless_dev *wdev,
|
||||
}
|
||||
}
|
||||
|
||||
if (attrs[NL80211_ATTR_SCHED_SCAN_DELAY])
|
||||
request->delay =
|
||||
nla_get_u32(attrs[NL80211_ATTR_SCHED_SCAN_DELAY]);
|
||||
|
||||
request->interval = interval;
|
||||
request->scan_start = jiffies;
|
||||
|
||||
@@ -7768,14 +7774,19 @@ static int nl80211_wiphy_netns(struct sk_buff *skb, struct genl_info *info)
|
||||
struct cfg80211_registered_device *rdev = info->user_ptr[0];
|
||||
struct net *net;
|
||||
int err;
|
||||
u32 pid;
|
||||
|
||||
if (!info->attrs[NL80211_ATTR_PID])
|
||||
if (info->attrs[NL80211_ATTR_PID]) {
|
||||
u32 pid = nla_get_u32(info->attrs[NL80211_ATTR_PID]);
|
||||
|
||||
net = get_net_ns_by_pid(pid);
|
||||
} else if (info->attrs[NL80211_ATTR_NETNS_FD]) {
|
||||
u32 fd = nla_get_u32(info->attrs[NL80211_ATTR_NETNS_FD]);
|
||||
|
||||
net = get_net_ns_by_fd(fd);
|
||||
} else {
|
||||
return -EINVAL;
|
||||
}
|
||||
|
||||
pid = nla_get_u32(info->attrs[NL80211_ATTR_PID]);
|
||||
|
||||
net = get_net_ns_by_pid(pid);
|
||||
if (IS_ERR(net))
|
||||
return PTR_ERR(net);
|
||||
|
||||
|
@@ -227,18 +227,32 @@ int cfg80211_validate_key_settings(struct cfg80211_registered_device *rdev,
|
||||
if (pairwise && !mac_addr)
|
||||
return -EINVAL;
|
||||
|
||||
/*
|
||||
* Disallow pairwise keys with non-zero index unless it's WEP
|
||||
* or a vendor specific cipher (because current deployments use
|
||||
* pairwise WEP keys with non-zero indices and for vendor specific
|
||||
* ciphers this should be validated in the driver or hardware level
|
||||
* - but 802.11i clearly specifies to use zero)
|
||||
*/
|
||||
if (pairwise && key_idx &&
|
||||
((params->cipher == WLAN_CIPHER_SUITE_TKIP) ||
|
||||
(params->cipher == WLAN_CIPHER_SUITE_CCMP) ||
|
||||
(params->cipher == WLAN_CIPHER_SUITE_AES_CMAC)))
|
||||
return -EINVAL;
|
||||
switch (params->cipher) {
|
||||
case WLAN_CIPHER_SUITE_TKIP:
|
||||
case WLAN_CIPHER_SUITE_CCMP:
|
||||
case WLAN_CIPHER_SUITE_CCMP_256:
|
||||
case WLAN_CIPHER_SUITE_GCMP:
|
||||
case WLAN_CIPHER_SUITE_GCMP_256:
|
||||
/* Disallow pairwise keys with non-zero index unless it's WEP
|
||||
* or a vendor specific cipher (because current deployments use
|
||||
* pairwise WEP keys with non-zero indices and for vendor
|
||||
* specific ciphers this should be validated in the driver or
|
||||
* hardware level - but 802.11i clearly specifies to use zero)
|
||||
*/
|
||||
if (pairwise && key_idx)
|
||||
return -EINVAL;
|
||||
break;
|
||||
case WLAN_CIPHER_SUITE_AES_CMAC:
|
||||
case WLAN_CIPHER_SUITE_BIP_CMAC_256:
|
||||
case WLAN_CIPHER_SUITE_BIP_GMAC_128:
|
||||
case WLAN_CIPHER_SUITE_BIP_GMAC_256:
|
||||
/* Disallow BIP (group-only) cipher as pairwise cipher */
|
||||
if (pairwise)
|
||||
return -EINVAL;
|
||||
break;
|
||||
default:
|
||||
break;
|
||||
}
|
||||
|
||||
switch (params->cipher) {
|
||||
case WLAN_CIPHER_SUITE_WEP40:
|
||||
@@ -253,6 +267,18 @@ int cfg80211_validate_key_settings(struct cfg80211_registered_device *rdev,
|
||||
if (params->key_len != WLAN_KEY_LEN_CCMP)
|
||||
return -EINVAL;
|
||||
break;
|
||||
case WLAN_CIPHER_SUITE_CCMP_256:
|
||||
if (params->key_len != WLAN_KEY_LEN_CCMP_256)
|
||||
return -EINVAL;
|
||||
break;
|
||||
case WLAN_CIPHER_SUITE_GCMP:
|
||||
if (params->key_len != WLAN_KEY_LEN_GCMP)
|
||||
return -EINVAL;
|
||||
break;
|
||||
case WLAN_CIPHER_SUITE_GCMP_256:
|
||||
if (params->key_len != WLAN_KEY_LEN_GCMP_256)
|
||||
return -EINVAL;
|
||||
break;
|
||||
case WLAN_CIPHER_SUITE_WEP104:
|
||||
if (params->key_len != WLAN_KEY_LEN_WEP104)
|
||||
return -EINVAL;
|
||||
@@ -261,6 +287,18 @@ int cfg80211_validate_key_settings(struct cfg80211_registered_device *rdev,
|
||||
if (params->key_len != WLAN_KEY_LEN_AES_CMAC)
|
||||
return -EINVAL;
|
||||
break;
|
||||
case WLAN_CIPHER_SUITE_BIP_CMAC_256:
|
||||
if (params->key_len != WLAN_KEY_LEN_BIP_CMAC_256)
|
||||
return -EINVAL;
|
||||
break;
|
||||
case WLAN_CIPHER_SUITE_BIP_GMAC_128:
|
||||
if (params->key_len != WLAN_KEY_LEN_BIP_GMAC_128)
|
||||
return -EINVAL;
|
||||
break;
|
||||
case WLAN_CIPHER_SUITE_BIP_GMAC_256:
|
||||
if (params->key_len != WLAN_KEY_LEN_BIP_GMAC_256)
|
||||
return -EINVAL;
|
||||
break;
|
||||
default:
|
||||
/*
|
||||
* We don't know anything about this algorithm,
|
||||
@@ -280,7 +318,13 @@ int cfg80211_validate_key_settings(struct cfg80211_registered_device *rdev,
|
||||
return -EINVAL;
|
||||
case WLAN_CIPHER_SUITE_TKIP:
|
||||
case WLAN_CIPHER_SUITE_CCMP:
|
||||
case WLAN_CIPHER_SUITE_CCMP_256:
|
||||
case WLAN_CIPHER_SUITE_GCMP:
|
||||
case WLAN_CIPHER_SUITE_GCMP_256:
|
||||
case WLAN_CIPHER_SUITE_AES_CMAC:
|
||||
case WLAN_CIPHER_SUITE_BIP_CMAC_256:
|
||||
case WLAN_CIPHER_SUITE_BIP_GMAC_128:
|
||||
case WLAN_CIPHER_SUITE_BIP_GMAC_256:
|
||||
if (params->seq_len != 6)
|
||||
return -EINVAL;
|
||||
break;
|
||||
|
Reference in New Issue
Block a user