cfg80211: keep track of current_bss for userspace SME
When a userspace SME is active, we're currently not keeping track of the BSS properly for reporting the current link and for internal use. Additionally, it looks like there is a possible BSS leak in that the BSS never gets removed from auth_bsses[]. To fix it, pass the BSS struct to __cfg80211_connect_result in this case. Signed-off-by: Johannes Berg <johannes@sipsolutions.net> Signed-off-by: John W. Linville <linville@tuxdriver.com>
This commit is contained in:
committed by
John W. Linville
parent
97af743207
commit
df7fc0f973
@@ -61,7 +61,7 @@ void cfg80211_send_rx_assoc(struct net_device *dev, const u8 *buf, size_t len)
|
||||
struct ieee80211_mgmt *mgmt = (struct ieee80211_mgmt *)buf;
|
||||
u8 *ie = mgmt->u.assoc_resp.variable;
|
||||
int i, ieoffs = offsetof(struct ieee80211_mgmt, u.assoc_resp.variable);
|
||||
bool done;
|
||||
struct cfg80211_internal_bss *bss = NULL;
|
||||
|
||||
wdev_lock(wdev);
|
||||
|
||||
@@ -69,22 +69,32 @@ void cfg80211_send_rx_assoc(struct net_device *dev, const u8 *buf, size_t len)
|
||||
|
||||
nl80211_send_rx_assoc(rdev, dev, buf, len, GFP_KERNEL);
|
||||
|
||||
__cfg80211_connect_result(dev, mgmt->bssid, NULL, 0, ie, len - ieoffs,
|
||||
status_code,
|
||||
status_code == WLAN_STATUS_SUCCESS);
|
||||
|
||||
if (status_code == WLAN_STATUS_SUCCESS) {
|
||||
for (i = 0; wdev->current_bss && i < MAX_AUTH_BSSES; i++) {
|
||||
if (wdev->auth_bsses[i] == wdev->current_bss) {
|
||||
cfg80211_unhold_bss(wdev->auth_bsses[i]);
|
||||
cfg80211_put_bss(&wdev->auth_bsses[i]->pub);
|
||||
for (i = 0; i < MAX_AUTH_BSSES; i++) {
|
||||
if (!wdev->auth_bsses[i])
|
||||
continue;
|
||||
if (memcmp(wdev->auth_bsses[i]->pub.bssid, mgmt->bssid,
|
||||
ETH_ALEN) == 0) {
|
||||
bss = wdev->auth_bsses[i];
|
||||
wdev->auth_bsses[i] = NULL;
|
||||
done = true;
|
||||
/* additional reference to drop hold */
|
||||
cfg80211_ref_bss(bss);
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
WARN_ON(!done);
|
||||
WARN_ON(!bss);
|
||||
}
|
||||
|
||||
/* this consumes one bss reference (unless bss is NULL) */
|
||||
__cfg80211_connect_result(dev, mgmt->bssid, NULL, 0, ie, len - ieoffs,
|
||||
status_code,
|
||||
status_code == WLAN_STATUS_SUCCESS,
|
||||
bss ? &bss->pub : NULL);
|
||||
/* drop hold now, and also reference acquired above */
|
||||
if (bss) {
|
||||
cfg80211_unhold_bss(bss);
|
||||
cfg80211_put_bss(&bss->pub);
|
||||
}
|
||||
|
||||
wdev_unlock(wdev);
|
||||
@@ -144,7 +154,7 @@ static void __cfg80211_send_deauth(struct net_device *dev,
|
||||
} else if (wdev->sme_state == CFG80211_SME_CONNECTING) {
|
||||
__cfg80211_connect_result(dev, mgmt->bssid, NULL, 0, NULL, 0,
|
||||
WLAN_STATUS_UNSPECIFIED_FAILURE,
|
||||
false);
|
||||
false, NULL);
|
||||
}
|
||||
}
|
||||
|
||||
@@ -241,7 +251,7 @@ void cfg80211_send_auth_timeout(struct net_device *dev, const u8 *addr)
|
||||
if (wdev->sme_state == CFG80211_SME_CONNECTING)
|
||||
__cfg80211_connect_result(dev, addr, NULL, 0, NULL, 0,
|
||||
WLAN_STATUS_UNSPECIFIED_FAILURE,
|
||||
false);
|
||||
false, NULL);
|
||||
|
||||
for (i = 0; addr && i < MAX_AUTH_BSSES; i++) {
|
||||
if (wdev->authtry_bsses[i] &&
|
||||
@@ -275,7 +285,7 @@ void cfg80211_send_assoc_timeout(struct net_device *dev, const u8 *addr)
|
||||
if (wdev->sme_state == CFG80211_SME_CONNECTING)
|
||||
__cfg80211_connect_result(dev, addr, NULL, 0, NULL, 0,
|
||||
WLAN_STATUS_UNSPECIFIED_FAILURE,
|
||||
false);
|
||||
false, NULL);
|
||||
|
||||
for (i = 0; addr && i < MAX_AUTH_BSSES; i++) {
|
||||
if (wdev->auth_bsses[i] &&
|
||||
|
Reference in New Issue
Block a user